| caliptra-api |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| checksum::tests::test_calc_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_checksum_overflow |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.4s |
| checksum::tests::test_round_trip |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| checksum::tests::test_verify_checksum |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_capabilities |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_populate_checksum_resp_header |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-api-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_security_state |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-auth-man-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-man-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-auth-manifest-app::bin/caliptra-auth-manifest-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-builder |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| elf_symbols::test::test_elf_symbols |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::cargo_invocations_from_fwid::test_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_build_firmware_not_registered |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf2rom_golden |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_elf_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_fwid_elf_filename |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_image_revision_from_str |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-builder::bin/image |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_binaries_are_identical |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
112.6s |
111.1s |
113.3s |
112.1s |
70.1s |
69.2s |
70.5s |
70.4s |
72.3s |
71.7s |
73.7s |
70.5s |
| test_image_options_imports_correctly |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| caliptra-cfi-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cfi_asm_test::test::test_launder |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| caliptra-cfi-lib |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_asm |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-cfi-lib::test_derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_rand |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rand_stress |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_with_not_initialized_counter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_coverage_map_creation_data_files |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_coverage_map_creation_no_data_files_found |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_parse_trace_file |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-coverage::bin/caliptra-coverage |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| array::tests::test_array_4x4_from_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array::tests::test_array_4x4_to_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_large |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_result_too_small |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u16 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| array_concat::tests::test_array_concat3_u8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bounded_address::tests::test_rom_address_validate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fuse_bank::tests::test_first_set_msbit |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_dv_nonsticky_384bit_set |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fht_is_valid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hand_off::tests::test_fmc_priv_key_store |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_estack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_persistent_data |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| memory_layout::mem_layout_test_stack |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_err |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| okref::tests::test_okref_ok |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| persistent::tests::test_layout |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-drivers-test-bin |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-drivers::drivers_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_csrng |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng2 |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_csrng_adaptive_proportion |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_csrng_repetition_count |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
SKIP |
SKIP |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
| test_doe_when_debug_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_doe_when_debug_not_locked |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_ecc384 |
2.0s |
2.0s |
2.2s |
2.2s |
1.5s |
1.5s |
1.8s |
1.8s |
1.5s |
1.5s |
1.8s |
1.8s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.6s |
| test_ecc384_sign_validation_failure |
0.1s |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_error_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_generate_doe_vectors_when_debug_not_locked |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_hmac384 |
1.8s |
1.8s |
2.1s |
2.1s |
1.4s |
1.4s |
2.0s |
2.0s |
1.4s |
1.4s |
2.0s |
2.0s |
0.6s |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
| test_keyvault |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms_24 |
0.4s |
0.4s |
0.4s |
0.4s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.5s |
0.6s |
0.5s |
0.5s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_lms_32 |
4.1s |
4.1s |
4.1s |
4.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
7.3s |
7.8s |
8.3s |
8.5s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_mailbox_soc_to_uc |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_txn_drop |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mailbox_uc_to_soc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_negative_lms |
0.7s |
0.7s |
0.7s |
0.7s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.8s |
0.9s |
0.9s |
0.9s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_pcrbank |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_persistent |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_sha1 |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.8s |
2.9s |
2.9s |
3.6s |
3.0s |
2.6s |
3.4s |
3.0s |
3.1s |
3.0s |
2.7s |
2.9s |
| test_sha256 |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
3.3s |
6.6s |
6.9s |
6.8s |
6.7s |
4.4s |
4.0s |
4.4s |
4.6s |
4.8s |
4.7s |
4.5s |
4.4s |
| test_sha2_512_384acc |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.0s |
0.0s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
| test_sha384 |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
3.5s |
5.3s |
5.3s |
5.0s |
5.2s |
3.9s |
3.2s |
3.8s |
3.7s |
3.8s |
3.9s |
4.0s |
3.5s |
| test_status_reporter |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_etrng_mode |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_trng_in_itrng_mode |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uart |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uc_to_soc_error_state |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-bus |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| clock::tests::test_clock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_and_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_increment_too_far |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_mixup_timer_actions_on_cancel |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_schedule_too_far_in_future |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_searchback_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_clock_wraparound |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| clock::tests::test_timer_schedule_with_clock_at_12327834 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_attach_dev |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| dynamic_bus::test::test_dynamic_bus_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_read_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_aligned_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_half_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mem::tests::test_write_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mmio::tests::test_bus_mmio |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ram::tests::test_write_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_read_write_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u16_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u32_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_read_write_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_readonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_u8_writeonly_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register::tests::test_write_only_mem |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_bus_faults_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| register_array::tests::test_read_and_write_16bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_mmap_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_read_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rom::tests::test_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::fake_bus::tests::test_fake_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| testing::log::tests::test_clone |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-cpu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| cpu::tests::test_bus_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_pc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| cpu::tests::test_xreg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_only_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csr_file::tests::test_read_write_masked_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::auipc::tests::test_auipc_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_beq_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bge_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bgeu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_blt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::branch::tests::test_bne_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jal::tests::test_jal_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::jalr::tests::test_jalr_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lbu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::load::tests::test_lw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::lui::tests::test_lui_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_add_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_and_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_div_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_divu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mul_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhsu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_28 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_29 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_30 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_31 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_33 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_mulhu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_or_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_rem_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_remu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sll_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_slt_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_38 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sltu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sra_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_19 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_20 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_21 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_22 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_23 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_40 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_41 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_42 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_43 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_srl_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_18 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_34 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_35 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_36 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_37 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_sub_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_26 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_27 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op::tests::test_xor_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_addi_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_andi_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_ori_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_slti_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_sltiu_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srai_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_12 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_15 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_16 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_17 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_24 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_25 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_srli_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_13 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_14 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::op_imm::tests::test_xori_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sb_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sh_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_10 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_11 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_7 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::store::tests::test_sw_9 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrc |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrci |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrs |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrsi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrw |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_csrrwi |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ebreak |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_ecall |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| instr::system::tests::test_unknown_csr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| pic::tests::test_interrupt_priority_order |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_new |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_write_invalid_reg |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| xreg_file::tests::test_x0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| aes256cbc::tests::test_decrypt_1024bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_256bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| aes256cbc::tests::test_decrypt_384bit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_gen_key_pair |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ecc384::tests::test_verify_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u64 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::test::test_change_endianness_u8 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_0 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac512::tests::test_hmac_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_127byte_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_finalize_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bus::tests::test_derive_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_derive_empty_bus |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_mask_lsbs_contiguous |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_organize_fields_by_mask |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bus::tests::test_parse_peripheral_fields_duplicate |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_hex_literal_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_hex_u32_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::literal::tests::test_parse_usize |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::sort::tests::test_sorted_by_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_group_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_of_panic3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_ident_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_literal_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_expect_punct_of_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_attribute_or_ident |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_field_with_attributes |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_group_panic1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| util::token_iter::tests::test_skip_to_struct |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-derive::derive_bus_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_poll |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_read_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_write_dispatch |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-periph |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| asym_ecc384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_gen_key_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.5s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| asym_ecc384::tests::test_gen_key_kv_seed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.4s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| asym_ecc384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_sign_kv_privkey |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.3s |
0.3s |
0.2s |
0.2s |
0.1s |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
| asym_ecc384::tests::test_sign_kv_privkey_not_allowed |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_verify |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| asym_ecc384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_max_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_non_zero_first_byte |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::block_increment_zero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_nist_test_vector |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_single_word |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_two_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| csrng::ctr_drbg::tests::massage_seed_zero_words |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_clear_secrets |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_fe |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| doe::tests::test_deobfuscate_uds |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_sha256_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_error_if_w_is_not_valid |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_is_enabled |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_by_default |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha256::tests::test_wntz_params |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_block_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_control_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_hash_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_name_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_block_read_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_kv_hash_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha384_pcr_hash_extend_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_224 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_256 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_sha512_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_status_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hash_sha512::tests::test_version_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_from_words_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_bytes_swap_word_endian |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_be |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_words_from_bytes_le |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_control |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_exact_single_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_small_block_read |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_hmac_sha384_multi_block |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_key |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_name |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_status |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_tag |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| hmac_sha384::tests::test_version |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_byte_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_locked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| iccm::tests::test_unlocked_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_clear_with_debug_values |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_read_write_small |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_private_write_blocked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_key_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_generic_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_lock_clear |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_pcr_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_dv_entry_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| key_vault::tests::test_sticky_lockable_scratch_read_write |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_send_receive_max_limit |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyforcmd_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_arc_rdyfordata_unlock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_init |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| mailbox::tests::test_soc_to_caliptra_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_locked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha384_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_1 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_2 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_3 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_4 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_5 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_6 |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_mailbox_max_size |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_no_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_accelerator_sha512_stream_mode |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sha_acc_check_state |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| sha512_acc::tests::test_sm_lock |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_idev_id_csr_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_ldev_id_cert_download |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_secrets_when_debug_not_locked |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_tb_services_cb |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| soc_reg::tests::test_wdt |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exception::tests::test_breakpoint |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_environment_call |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_instr |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_illegal_register |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_instr_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_load_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_access_fault |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exception::tests::test_store_addr_misaligned |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-emu::bin/caliptra-emu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-error |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_error_constants_uniqueness |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_try_from |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::bin/caliptra-file-header-fix |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_check_failures |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_check_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-file-header-fix::integration_test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_check_only_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_check_only_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_fix |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_usage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-fmc::bin/caliptra-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-fmc::fmc_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_hand_off::test_hand_off |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.6s |
1.4s |
1.4s |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rtalias::test_boot_status_reporting |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.6s |
1.3s |
1.5s |
1.5s |
1.7s |
1.5s |
1.6s |
1.4s |
1.5s |
1.4s |
1.6s |
1.6s |
| test_rtalias::test_fht_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.6s |
1.7s |
1.5s |
1.6s |
1.4s |
1.7s |
1.6s |
| test_rtalias::test_pcr_log |
2.6s |
2.6s |
2.6s |
2.6s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.6s |
2.4s |
2.5s |
2.3s |
2.1s |
1.9s |
1.9s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
| caliptra-gen-linker-scripts |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| mmio::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::test_pretty_u64 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_failed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_passed |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_peek |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_search |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_take |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| output::tests::test_unknown_generic_load |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_builder::tests::test_rv32gen_mmio |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_apb |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_cold_reset |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| tests::test_execution |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_execute_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mailbox_receive |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_mbox_negative |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_negative_soc_mgr_mbox_users |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_output_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_sha512_acc |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_exec_req |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_soc_mgr_mbox_api |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model-c-binding |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_hex_bytes |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_hex_slice |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-hw-model::bin/fpga_realtime_mbox_pauser |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-hw-model::model_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_dccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_byte_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_double_bit_ecc_nmi_failure |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_unaligned_write_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_iccm_write_locked_nmi_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_invalid_instruction_exception_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_mbox_pauser_sigbus |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
3.1s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_pcr_extend |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_uninitialized_dccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_iccm_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_uninitialized_mbox_read |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| test_write_to_rom |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-app::bin/caliptra-image-app |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-crypto |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_lms |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests::test_lms_sig_h15 |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_print_lms_private_pub_key |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-elf |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test::test_load_into_image |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test::test_load_into_image_bad_address |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-fake-keys |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_write_lms_keys |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| caliptra-image-gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-serde |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-image-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_image_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-image-verify |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| verifier::tests::test_fmc_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_rt_load_address_range_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_fmc_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_lms_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_incorrect_pubkey_index |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_owner_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_lms_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_pubkey_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_header_vendor_signature_invalid_arg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_marker |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_manifest_size |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_pk_digest_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_owner_verify_preamble_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_owner_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_preamble_vendor_pubkey_digest |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_contained_in_iccm |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_rt_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_failure |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_size_success |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_digest_mismatch |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_order |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_fmc_rt_overlap |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_toc_incorrect_length |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_vendor_ecc_pk_idx_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_mismatch_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| verifier::tests::test_verify_fmc_update_rst |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-lms-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_bytes_to_words_6 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_bytes_to_words_8 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-registers |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-1_0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-registers-latest |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-fmc::bin/caliptra-rom-test-fmc |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom-test-rt::bin/caliptra-rom-test-rt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/asm_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::bin/caliptra-rom |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-rom::rom_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| helpers::tests::test_get_data |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| helpers::tests::test_get_data_not_found |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rv32_unit_tests::test_asm |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_capabilities::test_capabilities |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
| test_cfi::test_memcpy_not_called_before_cfi_init |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.2s |
0.2s |
0.2s |
0.1s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
| test_cpu_fault::test_cpu_fault |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_dice_derivations::test_cold_reset_no_rng |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.2s |
1.3s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_dice_derivations::test_cold_reset_status_reporting |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.6s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_dice_derivations::test_cold_reset_success |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.2s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_fake_rom::test_fake_rom_fw_load |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.8s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
0.6s |
| test_fake_rom::test_fake_rom_production_enabled |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_production_error |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_fake_rom_update_reset |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.4s |
0.4s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.2s |
1.1s |
1.1s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
0.9s |
| test_fake_rom::test_fake_rom_version |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fake_rom::test_image_verify |
n/a |
n/a |
n/a |
n/a |
0.2s |
0.2s |
0.2s |
0.2s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.4s |
0.5s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| test_fake_rom::test_skip_kats |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.2s |
0.2s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| test_fips_hooks::test_fips_hook_exit |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.1s |
1.0s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
| test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.2s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_fmcalias_derivation::test_check_rom_cold_boot_status_reg |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.3s |
1.4s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_fht_info |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.4s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_fmcalias_derivation::test_firmware_gt_max_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.8s |
0.9s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_fmcalias_derivation::test_fuse_log |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_fmcalias_derivation::test_pcr_log |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_fmcalias_derivation::test_pcr_log_across_update_reset |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.9s |
2.0s |
2.0s |
2.0s |
1.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.8s |
| test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_fmcalias_derivation::test_upload_measurement_limit |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_upload_measurement_limit_plus_one |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.6s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| test_fmcalias_derivation::test_upload_no_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.0s |
| test_fmcalias_derivation::test_upload_single_measurement |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.0s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_fmcalias_derivation::test_zero_firmware_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_idevid_derivation::test_generate_csr |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.3s |
1.5s |
1.8s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_idevid_derivation::test_generate_csr_stress |
n/a |
n/a |
n/a |
n/a |
1541.8s |
1521.9s |
1541.4s |
1521.5s |
n/a |
n/a |
n/a |
n/a |
1066.2s |
1002.4s |
1039.2s |
991.4s |
1017.2s |
987.8s |
922.2s |
990.1s |
1012.4s |
979.2s |
925.6s |
887.4s |
| test_idevid_derivation::test_idev_subj_key_id_algo |
n/a |
n/a |
n/a |
n/a |
5.7s |
5.6s |
5.7s |
5.6s |
n/a |
n/a |
n/a |
n/a |
6.1s |
5.8s |
6.0s |
5.9s |
6.7s |
5.0s |
5.3s |
5.5s |
5.4s |
5.9s |
5.3s |
5.2s |
| test_image_validation::cert_test |
n/a |
n/a |
n/a |
n/a |
1.7s |
2.1s |
1.9s |
2.0s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.3s |
1.3s |
1.6s |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.2s |
| test_image_validation::cert_test_with_custom_dates |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.6s |
1.5s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.7s |
1.5s |
1.7s |
1.2s |
1.3s |
1.2s |
1.3s |
1.5s |
1.4s |
1.3s |
| test_image_validation::cert_test_with_ueid |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.3s |
1.3s |
1.4s |
1.3s |
1.1s |
1.2s |
1.2s |
1.3s |
1.5s |
1.2s |
1.1s |
| test_image_validation::test_fmc_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
0.8s |
0.8s |
1.0s |
0.8s |
1.0s |
0.8s |
0.7s |
| test_image_validation::test_fmc_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
1.0s |
0.9s |
0.8s |
0.9s |
1.0s |
0.8s |
1.1s |
0.8s |
0.8s |
| test_image_validation::test_fmc_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.8s |
0.8s |
1.2s |
0.8s |
1.0s |
1.1s |
1.1s |
0.8s |
1.0s |
0.8s |
0.8s |
| test_image_validation::test_fmc_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
0.8s |
0.9s |
1.1s |
0.9s |
1.0s |
1.1s |
1.1s |
0.9s |
0.9s |
0.8s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.3s |
0.8s |
0.9s |
1.1s |
0.8s |
1.0s |
1.0s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.8s |
0.9s |
1.0s |
0.8s |
1.1s |
1.2s |
1.1s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.3s |
0.8s |
0.9s |
1.1s |
0.8s |
1.0s |
1.0s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.2s |
0.8s |
1.1s |
1.0s |
0.8s |
1.0s |
1.1s |
1.0s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_fmc_rt_load_address_range_overlap |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
2.1s |
1.9s |
2.1s |
1.7s |
1.7s |
1.9s |
1.7s |
1.6s |
1.7s |
1.5s |
1.5s |
1.4s |
| test_image_validation::test_fmc_svn_greater_than_32 |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.2s |
1.4s |
1.0s |
1.0s |
1.1s |
0.9s |
0.9s |
1.1s |
1.0s |
1.0s |
0.8s |
| test_image_validation::test_fmc_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.5s |
1.5s |
1.1s |
0.9s |
0.9s |
0.9s |
1.0s |
1.5s |
1.0s |
1.3s |
0.9s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_r |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.9s |
1.2s |
1.1s |
0.9s |
0.6s |
0.7s |
0.7s |
0.8s |
1.1s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_invalid_signature_s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.9s |
1.0s |
0.9s |
0.7s |
0.7s |
0.7s |
0.6s |
0.9s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_x |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.8s |
0.7s |
1.2s |
0.6s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_pubkey_y |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
1.0s |
0.8s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_r |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
1.1s |
0.7s |
1.0s |
0.7s |
0.7s |
0.7s |
0.7s |
1.1s |
0.7s |
0.9s |
0.9s |
| test_image_validation::test_header_verify_owner_ecc_sig_zero_signature_s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.9s |
0.7s |
0.9s |
0.9s |
| test_image_validation::test_header_verify_owner_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.5s |
2.5s |
2.3s |
2.3s |
2.1s |
2.2s |
2.3s |
2.5s |
2.2s |
2.2s |
2.5s |
| test_image_validation::test_header_verify_owner_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.5s |
1.6s |
1.6s |
1.7s |
1.7s |
1.6s |
2.0s |
| test_image_validation::test_header_verify_owner_sig_zero_fuses |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.2s |
1.1s |
0.9s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
0.9s |
| test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
| test_image_validation::test_header_verify_vendor_ecc_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.4s |
1.4s |
1.5s |
1.3s |
1.3s |
1.4s |
1.5s |
1.4s |
1.3s |
1.3s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_image_validation::test_header_verify_vendor_lms_optional_no_sig_mismatch_check |
n/a |
n/a |
n/a |
n/a |
2.1s |
2.1s |
2.1s |
2.1s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.4s |
2.3s |
2.3s |
2.3s |
2.1s |
2.2s |
2.2s |
2.3s |
2.2s |
2.2s |
2.1s |
| test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
| test_image_validation::test_header_verify_vendor_lms_sig_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.6s |
1.5s |
1.5s |
1.4s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_pubkey |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
| test_image_validation::test_header_verify_vendor_sig_zero_ecc_signature |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.3s |
1.2s |
| test_image_validation::test_invalid_manifest_marker |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_invalid_manifest_size |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
| test_image_validation::test_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.1s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
| test_image_validation::test_preamble_owner_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_ecc_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
2.5s |
2.5s |
2.6s |
2.5s |
n/a |
n/a |
n/a |
n/a |
3.4s |
3.2s |
3.6s |
3.0s |
3.2s |
2.8s |
2.9s |
3.0s |
3.1s |
2.9s |
3.0s |
2.8s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check |
n/a |
n/a |
n/a |
n/a |
30.0s |
29.7s |
30.3s |
30.0s |
n/a |
n/a |
n/a |
n/a |
36.5s |
35.0s |
36.7s |
35.0s |
34.5s |
31.1s |
33.9s |
33.6s |
34.8s |
33.3s |
33.9s |
32.6s |
| test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
1.1s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_vendor_lms_pubkey_revocation |
n/a |
n/a |
n/a |
n/a |
17.3s |
17.1s |
17.7s |
17.5s |
n/a |
n/a |
n/a |
n/a |
21.9s |
20.7s |
21.8s |
20.9s |
20.7s |
18.8s |
19.9s |
19.7s |
20.7s |
19.7s |
20.1s |
18.9s |
| test_image_validation::test_preamble_vendor_pubkey_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_preamble_zero_vendor_pubkey_digest |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_image_validation::test_runtime_digest_mismatch |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.0s |
1.0s |
1.1s |
0.9s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_entry_point_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
| test_image_validation::test_runtime_invalid_entry_point_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_invalid_entry_point_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_after_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_invalid_load_addr_before_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.1s |
1.0s |
1.0s |
| test_image_validation::test_runtime_load_addr_unaligned |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
| test_image_validation::test_runtime_not_contained_in_iccm |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_image_validation::test_runtime_svn_greater_than_max |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_image_validation::test_runtime_svn_less_than_fuse_svn |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_image_validation::test_toc_fmc_range_incorrect_order |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_fmc_range_overlap |
n/a |
n/a |
n/a |
n/a |
2.2s |
2.2s |
2.2s |
2.2s |
n/a |
n/a |
n/a |
n/a |
2.4s |
2.3s |
2.4s |
2.3s |
2.4s |
2.2s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.2s |
| test_image_validation::test_toc_fmc_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_invalid_entry_count |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_invalid_toc_digest |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_image_validation::test_toc_rt_size_zero |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.8s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_checksum |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_large |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_small |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_mailbox_errors::test_mailbox_invalid_req_size_zero |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
| test_mailbox_errors::test_mailbox_reserved_pauser |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox_errors::test_unknown_command_is_fatal |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
| test_panic_missing::test_panic_missing |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_rom_integrity::test_read_rom_info_from_fmc |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
| test_rom_integrity::test_rom_integrity_failure |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
0.3s |
0.2s |
| test_symbols::test_linker_symbols_match_memory_layout |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_update_reset::test_check_rom_update_reset_status_reg |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.6s |
1.6s |
1.5s |
1.4s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_fmc_is_16k |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.6s |
0.6s |
0.6s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
| test_update_reset::test_update_reset_boot_status |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_update_reset::test_update_reset_max_fw_image |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.6s |
1.6s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
| test_update_reset::test_update_reset_no_mailbox_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_update_reset::test_update_reset_non_fw_load_cmd |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_update_reset::test_update_reset_success |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.5s |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.5s |
1.6s |
1.5s |
1.5s |
1.5s |
| test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
| test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
| test_update_reset::test_update_reset_verify_image_failure |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.2s |
1.2s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_version::test_version |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
| test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.2s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
| test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.8s |
1.3s |
1.3s |
n/a |
n/a |
n/a |
n/a |
1.0s |
0.9s |
1.0s |
0.9s |
0.9s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
1.0s |
0.9s |
| test_warm_reset::test_warm_reset_during_update_reset |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.9s |
2.3s |
2.3s |
n/a |
n/a |
n/a |
n/a |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.0s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.2s |
| test_warm_reset::test_warm_reset_success |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.6s |
1.6s |
1.6s |
| test_warm_reset::test_warm_reset_version |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.9s |
2.6s |
2.6s |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_wdt_activation_and_stoppage::test_rom_wdt_timeout |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
| test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.1s |
0.1s |
n/a |
n/a |
n/a |
n/a |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
| tests_get_idev_csr::test_get_csr |
n/a |
n/a |
n/a |
n/a |
0.8s |
0.7s |
0.8s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
| tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
| caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| set_auth_manifest::tests::test_sort_and_duplicate_dupe |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_empty |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| set_auth_manifest::tests::test_sort_and_duplicate_sort |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-runtime::bin/caliptra-runtime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-runtime::runtime_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.5s |
2.5s |
2.5s |
2.5s |
2.5s |
2.3s |
2.5s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.3s |
2.5s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest |
3.7s |
3.7s |
3.6s |
3.7s |
3.0s |
3.0s |
3.0s |
3.0s |
3.1s |
3.1s |
3.0s |
3.1s |
2.8s |
2.7s |
2.9s |
2.8s |
2.8s |
2.6s |
2.8s |
2.7s |
2.8s |
2.6s |
2.8s |
2.7s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.4s |
2.5s |
2.5s |
2.7s |
2.4s |
2.5s |
2.4s |
2.4s |
2.4s |
2.8s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id |
3.2s |
3.2s |
3.2s |
3.2s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.7s |
2.6s |
2.6s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.4s |
2.5s |
2.4s |
2.5s |
2.3s |
3.0s |
2.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.1s |
2.2s |
2.1s |
2.2s |
2.0s |
2.1s |
2.0s |
2.1s |
2.0s |
2.7s |
2.0s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
2.0s |
1.7s |
1.4s |
1.4s |
1.4s |
1.3s |
1.7s |
1.4s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.4s |
2.0s |
1.7s |
1.4s |
1.4s |
1.4s |
1.4s |
1.7s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.7s |
1.4s |
1.4s |
1.4s |
1.3s |
1.8s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash |
4.5s |
4.5s |
4.5s |
4.5s |
3.7s |
3.6s |
3.7s |
3.6s |
3.7s |
3.7s |
3.7s |
3.7s |
3.1s |
2.7s |
2.8s |
2.9s |
3.5s |
3.5s |
2.8s |
2.8s |
2.8s |
2.7s |
3.3s |
2.7s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success |
3.1s |
3.2s |
3.1s |
3.1s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.6s |
2.8s |
2.4s |
2.5s |
2.6s |
2.8s |
2.7s |
2.4s |
2.3s |
2.4s |
2.3s |
2.8s |
2.3s |
| test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
2.0s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_0 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.4s |
1.5s |
1.7s |
1.6s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.6s |
1.3s |
| test_authorize_and_stash::test_authorize_and_stash_fwid_127 |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.7s |
1.4s |
1.7s |
1.5s |
1.8s |
1.7s |
1.4s |
1.4s |
1.4s |
1.6s |
1.5s |
1.3s |
| test_boot::test_boot |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
0.9s |
1.1s |
1.0s |
1.2s |
1.1s |
0.9s |
0.9s |
0.9s |
1.2s |
0.9s |
0.8s |
| test_boot::test_boot_tci_data |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.0s |
1.2s |
1.3s |
1.6s |
1.4s |
1.1s |
1.1s |
1.1s |
1.2s |
1.0s |
1.0s |
| test_boot::test_fw_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.1s |
1.5s |
1.3s |
1.3s |
1.3s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.0s |
| test_boot::test_measurement_in_measurement_log_added_to_dpe |
1.6s |
1.7s |
1.6s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.4s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.2s |
1.5s |
1.2s |
1.2s |
| test_boot::test_persistent_data |
1.7s |
1.7s |
1.7s |
1.7s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.4s |
1.1s |
0.9s |
1.2s |
1.1s |
1.0s |
1.1s |
0.9s |
0.9s |
0.9s |
1.2s |
0.9s |
0.8s |
| test_boot::test_standard |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.3s |
1.1s |
1.4s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
1.1s |
| test_boot::test_stress_update |
404.3s |
411.2s |
398.4s |
405.2s |
330.1s |
329.7s |
336.0s |
336.0s |
337.7s |
344.8s |
336.0s |
340.8s |
360.5s |
348.9s |
371.0s |
361.3s |
358.6s |
323.4s |
344.9s |
345.3s |
353.1s |
346.0s |
342.1s |
331.6s |
| test_boot::test_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.6s |
2.4s |
2.8s |
2.8s |
2.2s |
2.0s |
2.2s |
2.2s |
2.2s |
2.5s |
2.2s |
2.1s |
| test_certify_key_extended::test_dmtf_other_name_extension_not_present |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.6s |
1.3s |
1.5s |
1.6s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.7s |
1.3s |
1.3s |
| test_certify_key_extended::test_dmtf_other_name_extension_present |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.4s |
1.6s |
1.6s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.2s |
| test_certify_key_extended::test_dmtf_other_name_validation_fail |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.5s |
1.1s |
1.4s |
1.4s |
1.5s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.3s |
1.1s |
1.0s |
| test_certs::test_all_measurement_apis |
6.0s |
6.0s |
6.1s |
6.1s |
4.7s |
4.7s |
5.7s |
5.6s |
4.8s |
4.8s |
5.7s |
5.7s |
4.1s |
4.7s |
4.4s |
4.1s |
4.2s |
3.7s |
4.1s |
3.9s |
4.0s |
4.2s |
4.1s |
3.9s |
| test_certs::test_dpe_leaf_cert |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.7s |
1.6s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.4s |
1.2s |
1.2s |
| test_certs::test_fmc_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_certs::test_full_cert_chain |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_certs::test_idev_id_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.4s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_certs::test_idev_id_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_certs::test_ldev_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.3s |
| test_certs::test_rt_alias_cert |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.3s |
| test_certs::test_rt_cert_with_custom_dates |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.4s |
| test_disable::test_attestation_disabled_flag_after_update_reset |
3.3s |
3.4s |
3.3s |
3.3s |
2.7s |
2.7s |
2.7s |
2.6s |
2.7s |
2.7s |
2.7s |
2.7s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.2s |
2.9s |
2.9s |
2.4s |
2.3s |
2.4s |
2.8s |
| test_disable::test_disable_attestation_cmd |
2.5s |
2.5s |
2.5s |
2.5s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
2.0s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.6s |
1.8s |
1.4s |
1.4s |
1.4s |
1.9s |
| test_ecdsa::ecdsa_cmd_run_wycheproof |
10.3s |
10.3s |
10.3s |
10.3s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
7.9s |
4.7s |
4.6s |
4.7s |
4.6s |
4.7s |
4.4s |
5.5s |
5.6s |
4.6s |
4.6s |
4.6s |
5.0s |
| test_ecdsa::test_ecdsa_hw_failure |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_ecdsa::test_ecdsa_verify_bad_chksum |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.3s |
| test_ecdsa::test_ecdsa_verify_cmd |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.5s |
1.3s |
1.1s |
1.1s |
1.1s |
1.4s |
| test_fips::test_fips_shutdown |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.4s |
1.7s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_fips::test_fips_version |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.3s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_get_fmc_alias_csr::test_get_fmc_alias_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_get_idev_csr::test_get_csr |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_get_idev_csr::test_missing_csr |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_info::test_capabilities |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_info::test_fw_info |
4.4s |
4.5s |
4.4s |
4.4s |
3.6s |
3.6s |
3.6s |
3.6s |
3.7s |
3.7s |
3.6s |
3.7s |
4.2s |
4.1s |
4.3s |
4.2s |
4.1s |
3.8s |
4.2s |
4.0s |
4.2s |
4.0s |
4.1s |
4.0s |
| test_info::test_idev_id_info |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_dpe_header_error_code |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.2s |
2.4s |
2.3s |
2.4s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.2s |
| test_invoke_dpe::test_export_cdi_destroyed_root_context |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
2.3s |
2.1s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.2s |
| test_invoke_dpe::test_invoke_dpe_asymmetric_sign |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.2s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_certify_key_csr |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.6s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_get_profile_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_invoke_dpe::test_invoke_dpe_rotate_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_invoke_dpe::test_invoke_dpe_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_lms::test_lms_verify_cmd |
2.1s |
2.1s |
2.1s |
2.1s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
3.1s |
3.1s |
3.4s |
3.2s |
1.8s |
1.6s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_lms::test_lms_verify_failure |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.4s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_lms::test_lms_verify_invalid_key_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_lms::test_lms_verify_invalid_lmots_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
| test_lms::test_lms_verify_invalid_sig_lms_type |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_mailbox::test_error_cleared |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_mailbox::test_reserved_pauser |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| test_mailbox::test_unimplemented_cmds |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_panic_missing::test_panic_missing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_change_locality |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_measurement_log_pl_context_threshold |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_pauser_privilege_levels::test_pl0_unset_in_header |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds |
1.9s |
1.9s |
1.8s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.4s |
1.5s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.4s |
1.3s |
1.4s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
| test_pauser_privilege_levels::test_user_not_pl0 |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_pcr::test_extend_pcr_cmd_invalid_pcr_index |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_pcr::test_extend_pcr_cmd_multiple_extensions |
2.0s |
2.0s |
2.0s |
2.0s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_pcr::test_extend_pcr_cmd_reserved_range |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_pcr::test_pcr_quote |
1.9s |
1.9s |
1.9s |
1.9s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_populate_idev::test_populate_idev_cert_cmd |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.3s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.1s |
| test_populate_idev::test_populate_idev_cert_size_too_big |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used |
1.8s |
1.8s |
1.8s |
1.8s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range |
55.8s |
56.1s |
55.8s |
56.0s |
45.3s |
45.0s |
45.3s |
45.0s |
45.7s |
45.8s |
45.8s |
45.8s |
45.6s |
44.3s |
46.7s |
45.4s |
46.8s |
43.1s |
46.4s |
46.0s |
44.8s |
44.0s |
45.8s |
44.3s |
| test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.3s |
2.3s |
2.5s |
2.4s |
2.6s |
2.5s |
2.5s |
2.3s |
2.5s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
| test_revoke_exported_cdi_handle::test_export_cdi_after_revoke |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.3s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
| test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_set_auth_manifest::test_set_auth_manifest_cmd |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.5s |
2.7s |
2.7s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.4s |
2.3s |
1.7s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.8s |
1.9s |
1.9s |
2.3s |
2.4s |
2.4s |
2.3s |
1.7s |
1.5s |
1.6s |
1.6s |
1.6s |
1.6s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len |
2.0s |
2.0s |
2.1s |
2.0s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.2s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit |
2.7s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.6s |
2.6s |
2.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.1s |
2.0s |
2.1s |
2.0s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.1s |
2.1s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_fw_info_digest |
2.7s |
2.6s |
2.7s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
2.6s |
2.5s |
2.7s |
2.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count |
2.4s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.0s |
2.0s |
2.0s |
2.0s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig |
2.4s |
2.3s |
2.4s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig |
2.4s |
2.4s |
2.4s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.7s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig |
2.6s |
2.6s |
2.6s |
2.6s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.3s |
2.2s |
2.4s |
2.3s |
1.6s |
1.5s |
1.6s |
1.6s |
1.6s |
1.5s |
1.6s |
1.6s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.6s |
1.5s |
1.7s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
2.0s |
1.5s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.7s |
1.5s |
1.5s |
1.6s |
1.6s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig |
2.3s |
2.3s |
2.3s |
2.3s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.6s |
1.6s |
1.6s |
1.7s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig |
2.5s |
2.4s |
2.5s |
2.4s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
2.1s |
2.0s |
2.1s |
2.0s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig |
2.5s |
2.5s |
2.5s |
2.5s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
2.1s |
2.2s |
2.1s |
2.1s |
1.6s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
| test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms |
2.3s |
2.3s |
2.3s |
2.3s |
1.8s |
1.8s |
1.8s |
1.8s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| test_sign_with_export_ecdsa::test_sign_with_disabled_attestation |
2.8s |
2.8s |
2.8s |
2.8s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.5s |
1.5s |
1.4s |
1.5s |
1.4s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.3s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.5s |
1.5s |
1.5s |
1.6s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi |
2.7s |
2.7s |
2.7s |
2.7s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
1.5s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.6s |
2.5s |
2.7s |
2.5s |
2.6s |
2.3s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent |
3.6s |
3.6s |
3.6s |
3.6s |
2.9s |
2.9s |
2.9s |
2.8s |
2.9s |
2.9s |
2.9s |
2.9s |
2.5s |
2.5s |
2.6s |
2.5s |
2.5s |
2.4s |
2.5s |
2.5s |
2.5s |
2.4s |
2.5s |
2.4s |
| test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.7s |
1.7s |
1.7s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| test_sign_with_export_ecdsa::test_sign_with_exported_never_derived |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi |
2.4s |
2.4s |
2.4s |
2.4s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.9s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.4s |
1.3s |
1.3s |
1.3s |
1.3s |
| test_stash_measurement::test_pcr31_extended_upon_stash_measurement |
4.3s |
4.3s |
4.3s |
4.3s |
3.5s |
3.5s |
3.5s |
3.5s |
3.6s |
3.6s |
3.5s |
3.6s |
4.5s |
4.0s |
4.3s |
4.2s |
4.1s |
3.7s |
4.1s |
3.9s |
4.0s |
3.9s |
4.0s |
3.9s |
| test_stash_measurement::test_stash_measurement |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.0s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.1s |
2.0s |
2.0s |
2.1s |
2.0s |
| test_tagging::test_duplicate_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_get_tagged_tci_on_non_existent_tag |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_a_tagged_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_default_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.1s |
1.1s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_destroyed_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
| test_tagging::test_tagging_inactive_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.1s |
1.3s |
1.2s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.1s |
1.0s |
| test_tagging::test_tagging_retired_context |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.2s |
1.2s |
1.2s |
1.2s |
1.2s |
1.1s |
1.2s |
1.2s |
1.2s |
1.1s |
1.1s |
1.1s |
| test_update_reset::test_context_has_tag_validation |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
2.2s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_context_tags_validation |
2.7s |
2.7s |
2.7s |
2.7s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_deformed_structure |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.2s |
2.3s |
2.2s |
2.5s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
2.1s |
2.1s |
| test_update_reset::test_dpe_validation_illegal_state |
2.8s |
2.8s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
2.5s |
2.0s |
2.1s |
2.1s |
2.1s |
2.1s |
2.1s |
2.0s |
| test_update_reset::test_dpe_validation_used_context_threshold_exceeded |
2.8s |
2.9s |
2.8s |
2.8s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.3s |
2.3s |
2.2s |
2.2s |
2.0s |
2.2s |
2.4s |
2.1s |
2.1s |
2.1s |
2.1s |
| test_update_reset::test_pcr_reset_counter_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.1s |
3.1s |
3.0s |
2.8s |
3.2s |
3.3s |
3.0s |
3.0s |
3.0s |
2.9s |
| test_update_reset::test_rt_journey_pcr_updated_in_dpe |
2.7s |
2.7s |
2.6s |
2.7s |
2.2s |
2.1s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
2.0s |
2.2s |
2.1s |
2.1s |
1.9s |
2.2s |
2.1s |
2.0s |
2.3s |
2.0s |
2.0s |
| test_update_reset::test_tags_persistence |
3.5s |
3.6s |
3.5s |
3.5s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
2.9s |
3.1s |
3.0s |
3.1s |
3.1s |
3.1s |
2.8s |
3.2s |
3.0s |
3.0s |
3.1s |
3.0s |
2.9s |
| test_warm_reset::test_mbox_busy_during_warm_reset |
2.3s |
2.3s |
2.7s |
2.7s |
1.9s |
1.8s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
1.6s |
1.5s |
1.6s |
1.5s |
1.6s |
1.4s |
1.5s |
1.6s |
1.5s |
1.6s |
1.5s |
1.5s |
| test_warm_reset::test_mbox_idle_during_warm_reset |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.5s |
1.7s |
1.6s |
1.7s |
1.5s |
1.6s |
1.5s |
| test_warm_reset::test_rt_journey_pcr_validation |
2.5s |
2.5s |
2.9s |
2.9s |
2.0s |
2.0s |
2.7s |
2.7s |
2.0s |
2.0s |
2.7s |
2.7s |
1.7s |
1.6s |
1.7s |
1.6s |
1.7s |
1.5s |
1.6s |
1.6s |
1.9s |
1.5s |
1.6s |
1.5s |
| caliptra-size-history::bin/caliptra-size-history |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| git::tests::test_commit_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| bits::tests::test_from_str |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| bits::tests::test_new |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| lexer::test::test_foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_scope_def |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_stuff |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| scope::tests::test_type_instantiation |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| string_arena::test::foo |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-systemrdl::bin/parse |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| crypto::test_derive_ecdsa_key |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_derive_ecdsa_keypair |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_drbg_keygen |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_hmac384_kdf |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_is_valid_privkey |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| crypto::test_pubkey_ecdsa_der |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_cert_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_fmc_alias_key |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_derive_pcr0 |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_doe_output |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_idevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_issuer_serial_number |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_key_id |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| derive::test_ldevid |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| redact::test_redact |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_none |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_single |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| unwrap_single::test_two |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_get_cert_extension |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_replace_sig |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| x509::test_tcb_info_parse |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-test-harness |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test-harness-types |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-test::caliptra_integration_tests |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| build_test::test_hw_1_0_bin_identical |
n/a |
n/a |
n/a |
n/a |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
n/a |
n/a |
n/a |
n/a |
0.4s |
0.4s |
0.3s |
0.3s |
0.4s |
0.4s |
0.3s |
0.3s |
| fake_collateral_boot_test::fake_boot_test |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
| jtag_test::gdb_test |
6.5s |
6.6s |
6.6s |
6.6s |
5.9s |
5.9s |
6.0s |
5.9s |
6.0s |
6.1s |
6.0s |
6.0s |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
| smoke_test::retrieve_csr_test |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
0.4s |
0.4s |
0.5s |
0.4s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.4s |
0.5s |
0.4s |
| smoke_test::smoke_test |
3.3s |
3.2s |
3.3s |
3.2s |
2.4s |
2.4s |
2.4s |
2.4s |
2.5s |
2.5s |
2.4s |
2.4s |
3.1s |
3.0s |
3.0s |
3.1s |
2.5s |
2.2s |
2.4s |
2.4s |
2.4s |
2.5s |
2.4s |
2.4s |
| smoke_test::test_fmc_wdt_timeout |
2.8s |
2.8s |
2.8s |
2.9s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
2.3s |
2.0s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
| smoke_test::test_golden_idevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_golden_ldevid_pubkey_matches_generated |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| smoke_test::test_rt_wdt_timeout |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
SKIP |
2.5s |
2.4s |
2.5s |
2.4s |
2.6s |
2.7s |
2.5s |
2.5s |
2.5s |
2.4s |
2.4s |
2.3s |
| test_code_coverage::test_emu_coverage |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
8.4s |
7.5s |
8.5s |
7.0s |
8.7s |
7.7s |
8.0s |
7.2s |
7.7s |
7.0s |
7.8s |
6.6s |
| warm_reset::warm_reset_basic |
2.4s |
2.4s |
2.7s |
2.7s |
1.9s |
1.9s |
2.6s |
2.6s |
1.9s |
1.9s |
2.6s |
2.6s |
2.1s |
1.8s |
2.1s |
1.7s |
1.8s |
1.8s |
2.0s |
1.7s |
1.6s |
1.6s |
1.6s |
1.5s |
| warm_reset::warm_reset_during_fw_load |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.5s |
0.5s |
1.3s |
1.3s |
0.8s |
0.9s |
0.9s |
0.7s |
0.9s |
0.8s |
0.8s |
0.9s |
0.7s |
0.6s |
0.6s |
0.6s |
| caliptra-test::fips_test_suite |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fw_load::corrupted_fw_load_version |
0.9s |
0.9s |
0.9s |
0.9s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
1.4s |
1.4s |
1.4s |
1.0s |
1.4s |
1.1s |
1.4s |
1.3s |
1.0s |
0.9s |
1.0s |
0.9s |
| fw_load::fw_load_bad_owner_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
1.2s |
1.3s |
1.0s |
1.1s |
1.3s |
1.2s |
1.1s |
1.0s |
0.8s |
0.8s |
1.0s |
0.7s |
| fw_load::fw_load_bad_owner_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.1s |
1.1s |
1.2s |
1.3s |
1.0s |
0.8s |
1.0s |
0.8s |
1.1s |
1.1s |
0.7s |
| fw_load::fw_load_bad_vendor_ecc_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
1.0s |
0.9s |
1.1s |
1.0s |
1.1s |
0.8s |
1.2s |
0.8s |
1.0s |
1.1s |
1.1s |
| fw_load::fw_load_bad_vendor_lms_pub_key |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.9s |
0.9s |
1.2s |
0.9s |
1.1s |
0.8s |
1.1s |
0.8s |
1.1s |
1.1s |
1.1s |
| fw_load::fw_load_blank_pub_key_hashes |
0.8s |
0.8s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.7s |
0.8s |
0.7s |
| fw_load::fw_load_blank_pub_keys |
0.9s |
0.9s |
0.9s |
0.9s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
1.2s |
0.9s |
0.8s |
0.8s |
0.9s |
0.8s |
0.9s |
1.1s |
1.0s |
| fw_load::fw_load_error_fmc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.7s |
1.8s |
1.8s |
1.7s |
2.1s |
2.0s |
2.1s |
| fw_load::fw_load_error_fmc_digest_mismatch |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
2.3s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
2.3s |
2.2s |
2.1s |
| fw_load::fw_load_error_fmc_entry_point_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.3s |
2.1s |
1.9s |
2.0s |
2.0s |
2.0s |
2.1s |
1.9s |
2.0s |
| fw_load::fw_load_error_fmc_entry_point_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
1.9s |
2.1s |
2.0s |
2.1s |
1.9s |
2.0s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
| fw_load::fw_load_error_fmc_load_addr_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
1.9s |
2.1s |
1.9s |
2.1s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_load_addr_unaligned |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
2.1s |
1.9s |
2.0s |
2.0s |
2.0s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.1s |
1.9s |
1.9s |
1.9s |
1.9s |
1.8s |
1.9s |
2.1s |
| fw_load::fw_load_error_fmc_runtime_incorrect_order |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
2.2s |
| fw_load::fw_load_error_fmc_runtime_load_addr_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.5s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
| fw_load::fw_load_error_fmc_runtime_overlap |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.1s |
1.9s |
2.8s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.6s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.8s |
| fw_load::fw_load_error_fmc_svn_greater_than_max_supported |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.3s |
1.8s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_fmc_svn_less_than_fuse |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
2.0s |
1.9s |
2.0s |
1.9s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_header_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.6s |
1.6s |
| fw_load::fw_load_error_image_len_more_than_bundle_size |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.0s |
2.0s |
2.1s |
1.9s |
1.9s |
2.1s |
1.9s |
1.8s |
1.8s |
1.8s |
| fw_load::fw_load_error_manifest_marker_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_manifest_size_mismatch |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_signature_invalid |
2.0s |
2.0s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.7s |
1.7s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
2.0s |
1.8s |
1.9s |
2.0s |
1.9s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_owner_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.6s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_owner_lms_signature_invalid |
2.2s |
2.2s |
2.3s |
2.2s |
1.7s |
1.7s |
2.0s |
2.0s |
1.8s |
1.7s |
2.0s |
2.0s |
2.3s |
2.5s |
2.4s |
2.4s |
2.1s |
1.9s |
2.0s |
2.1s |
2.0s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_owner_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.8s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.7s |
1.9s |
1.9s |
1.8s |
1.7s |
1.7s |
1.7s |
| fw_load::fw_load_error_owner_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.8s |
1.6s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_owner_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.7s |
1.8s |
1.6s |
1.8s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_runtime_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
1.7s |
1.7s |
| fw_load::fw_load_error_runtime_digest_mismatch |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.6s |
2.2s |
2.2s |
2.3s |
2.1s |
2.2s |
2.2s |
2.1s |
2.0s |
2.1s |
2.0s |
| fw_load::fw_load_error_runtime_entry_point_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.8s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
| fw_load::fw_load_error_runtime_entry_point_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.4s |
2.3s |
2.2s |
2.3s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
| fw_load::fw_load_error_runtime_load_addr_invalid |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.4s |
2.3s |
2.2s |
2.4s |
2.1s |
2.2s |
2.2s |
2.2s |
2.1s |
2.2s |
2.0s |
| fw_load::fw_load_error_runtime_load_addr_unaligned |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
2.1s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.2s |
2.3s |
2.2s |
2.1s |
2.1s |
2.1s |
| fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_size_zero |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_runtime_svn_greater_than_max_supported |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.2s |
2.4s |
2.1s |
2.2s |
2.2s |
2.1s |
2.1s |
2.1s |
2.0s |
| fw_load::fw_load_error_runtime_svn_less_than_fuse |
2.1s |
2.1s |
2.1s |
2.1s |
1.8s |
1.7s |
2.0s |
2.0s |
1.8s |
1.8s |
2.0s |
2.0s |
2.2s |
2.1s |
2.2s |
2.1s |
2.3s |
2.0s |
2.2s |
2.2s |
2.2s |
2.0s |
2.1s |
2.0s |
| fw_load::fw_load_error_toc_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.6s |
1.6s |
1.9s |
1.9s |
1.6s |
1.6s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.7s |
1.7s |
1.9s |
1.7s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_toc_digest_mismatch |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
2.1s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_count_invalid |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
2.0s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_toc_entry_range_arithmetic_overflow |
2.1s |
2.1s |
2.2s |
2.2s |
1.8s |
1.8s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.0s |
1.9s |
2.0s |
1.9s |
2.1s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
| fw_load::fw_load_error_update_reset_fmc_digest_mismatch |
3.2s |
3.2s |
3.2s |
3.2s |
2.7s |
2.6s |
2.8s |
2.8s |
2.7s |
2.7s |
2.8s |
2.8s |
3.2s |
3.0s |
3.3s |
3.1s |
3.2s |
2.8s |
3.1s |
3.1s |
3.1s |
3.0s |
3.1s |
2.9s |
| fw_load::fw_load_error_update_reset_owner_digest_failure |
3.0s |
3.0s |
3.0s |
3.0s |
2.4s |
2.4s |
2.7s |
2.7s |
2.5s |
2.5s |
2.7s |
2.7s |
3.0s |
2.8s |
3.0s |
2.9s |
3.0s |
2.6s |
2.9s |
2.8s |
2.9s |
2.7s |
2.9s |
2.8s |
| fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch |
3.1s |
3.1s |
3.1s |
3.1s |
2.6s |
2.5s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
3.2s |
3.0s |
3.3s |
3.2s |
3.1s |
2.8s |
3.0s |
3.0s |
3.1s |
2.9s |
3.2s |
2.9s |
| fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch |
3.4s |
3.4s |
3.4s |
3.4s |
2.6s |
2.6s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
3.9s |
3.8s |
4.1s |
3.9s |
3.2s |
2.8s |
3.1s |
3.1s |
3.1s |
3.0s |
3.4s |
3.0s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch |
2.0s |
2.0s |
2.2s |
2.2s |
1.7s |
1.7s |
2.1s |
2.1s |
1.7s |
1.7s |
2.1s |
2.1s |
1.9s |
1.9s |
2.1s |
1.9s |
2.0s |
1.9s |
1.9s |
2.0s |
1.9s |
1.8s |
2.3s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
1.9s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
2.3s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
1.8s |
1.7s |
2.0s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
2.0s |
1.9s |
2.0s |
1.8s |
1.9s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_signature_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.8s |
2.0s |
1.7s |
1.8s |
1.8s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_ecc_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.9s |
n/a |
n/a |
n/a |
n/a |
1.9s |
1.6s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch |
2.2s |
2.2s |
2.2s |
2.2s |
1.8s |
1.7s |
2.1s |
2.1s |
1.8s |
1.8s |
2.1s |
2.1s |
2.2s |
2.2s |
2.2s |
2.2s |
2.1s |
1.9s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.8s |
| fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.9s |
1.9s |
1.9s |
2.0s |
1.7s |
1.8s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_lms_pub_key_revoked |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
1.9s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.8s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_lms_signature_invalid |
2.1s |
2.1s |
2.1s |
2.1s |
1.7s |
1.6s |
2.0s |
1.9s |
1.7s |
1.7s |
2.0s |
2.0s |
2.1s |
2.1s |
2.2s |
2.1s |
2.1s |
1.8s |
1.9s |
2.0s |
1.9s |
1.8s |
1.9s |
1.7s |
| fw_load::fw_load_error_vendor_lms_verify_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.8s |
1.8s |
n/a |
n/a |
n/a |
n/a |
2.0s |
1.7s |
1.7s |
1.8s |
1.7s |
1.7s |
1.7s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_failure |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.5s |
1.9s |
1.9s |
1.5s |
1.5s |
1.9s |
1.9s |
n/a |
n/a |
n/a |
n/a |
2.2s |
1.7s |
1.7s |
1.8s |
1.7s |
1.6s |
1.6s |
1.6s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.7s |
1.7s |
1.7s |
2.2s |
1.6s |
1.7s |
1.7s |
1.7s |
1.6s |
1.7s |
1.5s |
| fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg |
1.9s |
1.9s |
2.1s |
2.1s |
1.6s |
1.6s |
2.0s |
2.0s |
1.6s |
1.6s |
2.0s |
2.0s |
1.9s |
1.8s |
1.9s |
1.9s |
2.0s |
1.8s |
1.8s |
1.9s |
1.8s |
1.7s |
1.8s |
1.7s |
| fw_load::fw_load_error_vendor_pub_key_digest_mismatch |
1.8s |
1.8s |
2.0s |
2.0s |
1.5s |
1.5s |
1.9s |
1.8s |
1.5s |
1.5s |
1.9s |
1.9s |
1.7s |
1.6s |
1.8s |
1.7s |
1.8s |
1.6s |
1.7s |
1.7s |
1.6s |
1.6s |
1.7s |
1.5s |
| jtag_locked::jtag_locked |
2.9s |
2.8s |
3.0s |
2.9s |
2.6s |
2.6s |
2.8s |
2.8s |
2.6s |
2.6s |
2.8s |
2.8s |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
| security_parameters::attempt_ssp_access_fw_load |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.8s |
0.9s |
0.9s |
0.8s |
0.8s |
0.9s |
0.9s |
n/a |
n/a |
n/a |
n/a |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
| security_parameters::attempt_ssp_access_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.3s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.4s |
0.3s |
0.3s |
0.3s |
0.3s |
0.3s |
| security_parameters::attempt_ssp_access_rt |
1.0s |
1.0s |
1.0s |
1.0s |
0.9s |
0.8s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
0.9s |
1.0s |
1.0s |
1.1s |
1.1s |
1.1s |
1.0s |
1.0s |
1.1s |
1.0s |
1.0s |
1.0s |
1.0s |
| security_parameters::zeroize_check_inaccessible |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.4s |
1.5s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| self_tests::fw_load_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
n/a |
n/a |
n/a |
n/a |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
| self_tests::integrity_check_failure_rom |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.2s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.4s |
0.4s |
0.4s |
0.4s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.3s |
1.7s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.6s |
2.3s |
2.0s |
2.3s |
2.8s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.3s |
1.7s |
1.3s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.7s |
2.3s |
2.1s |
2.8s |
2.3s |
2.2s |
2.2s |
2.3s |
2.2s |
| self_tests::kat_ecc384_signature_generate_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.6s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_ecc384_signature_generate_failure_rt |
2.7s |
2.8s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.1s |
2.3s |
2.7s |
2.3s |
2.1s |
2.6s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_ecc384_signature_verify_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.4s |
1.4s |
1.2s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_ecc384_signature_verify_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.2s |
2.4s |
2.5s |
2.4s |
2.1s |
2.3s |
2.5s |
2.2s |
2.2s |
2.2s |
2.2s |
| self_tests::kat_halt_check_no_output |
n/a |
n/a |
n/a |
n/a |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
108.2s |
n/a |
n/a |
n/a |
n/a |
9.4s |
8.5s |
10.2s |
9.7s |
10.2s |
9.3s |
10.2s |
10.5s |
| self_tests::kat_hmac384_failure_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.3s |
1.9s |
1.4s |
1.3s |
1.3s |
1.2s |
| self_tests::kat_hmac384_failure_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.5s |
2.2s |
2.4s |
2.2s |
2.4s |
2.1s |
2.3s |
2.8s |
2.4s |
2.2s |
2.2s |
2.2s |
| self_tests::kat_hmac384_tag_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.2s |
1.2s |
1.6s |
| self_tests::kat_hmac384_tag_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
2.4s |
2.2s |
2.3s |
2.2s |
2.4s |
3.0s |
2.4s |
2.3s |
2.6s |
2.2s |
2.3s |
2.3s |
| self_tests::kat_lms_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
1.0s |
1.0s |
1.7s |
1.7s |
1.0s |
1.0s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.5s |
1.9s |
1.4s |
1.5s |
1.6s |
1.3s |
1.3s |
1.4s |
| self_tests::kat_lms_digest_mismatch_rt |
2.9s |
2.9s |
3.0s |
3.0s |
2.3s |
2.3s |
2.9s |
2.9s |
2.3s |
2.3s |
2.9s |
2.9s |
3.2s |
2.4s |
2.6s |
2.5s |
2.4s |
2.7s |
2.4s |
2.4s |
2.5s |
2.2s |
2.4s |
2.6s |
| self_tests::kat_sha1_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.5s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.6s |
| self_tests::kat_sha1_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.9s |
2.1s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.3s |
2.2s |
2.1s |
2.3s |
2.5s |
| self_tests::kat_sha1_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.2s |
1.3s |
1.4s |
1.2s |
1.2s |
1.6s |
1.4s |
| self_tests::kat_sha1_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.4s |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.3s |
2.1s |
| self_tests::kat_sha256_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.2s |
1.0s |
| self_tests::kat_sha256_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.0s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha256_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.2s |
1.1s |
1.1s |
1.2s |
1.1s |
1.1s |
1.1s |
1.0s |
| self_tests::kat_sha256_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.0s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.4s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.3s |
1.3s |
1.3s |
1.2s |
1.2s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.2s |
2.2s |
2.3s |
2.0s |
2.3s |
2.3s |
2.2s |
2.1s |
2.2s |
2.1s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.3s |
1.2s |
1.2s |
| self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.3s |
2.2s |
2.2s |
2.2s |
2.4s |
2.0s |
2.3s |
2.3s |
2.2s |
2.2s |
2.2s |
2.1s |
| self_tests::kat_sha384_digest_failure_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
1.6s |
1.2s |
1.2s |
| self_tests::kat_sha384_digest_failure_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.5s |
2.2s |
2.3s |
2.2s |
2.3s |
2.1s |
2.3s |
2.3s |
2.2s |
2.3s |
2.2s |
2.1s |
| self_tests::kat_sha384_digest_mismatch_rom |
n/a |
n/a |
n/a |
n/a |
0.9s |
0.9s |
1.7s |
1.7s |
0.9s |
0.9s |
1.7s |
1.7s |
n/a |
n/a |
n/a |
n/a |
1.3s |
1.2s |
1.3s |
1.3s |
1.2s |
1.5s |
1.2s |
1.2s |
| self_tests::kat_sha384_digest_mismatch_rt |
2.7s |
2.7s |
3.0s |
3.0s |
2.2s |
2.2s |
2.9s |
2.9s |
2.2s |
2.2s |
2.9s |
2.9s |
2.4s |
2.2s |
2.3s |
2.2s |
2.4s |
2.1s |
2.3s |
2.2s |
2.2s |
2.1s |
2.2s |
2.1s |
| services::check_version_rom |
0.7s |
0.7s |
0.7s |
0.7s |
0.5s |
0.5s |
0.6s |
0.5s |
0.5s |
0.5s |
0.6s |
0.5s |
0.6s |
0.5s |
0.8s |
0.5s |
0.5s |
0.5s |
0.5s |
0.5s |
0.4s |
0.4s |
0.5s |
0.4s |
| services::check_version_rt |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.4s |
1.5s |
1.7s |
1.3s |
1.8s |
1.4s |
1.4s |
1.3s |
1.4s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| services::execute_all_services_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
1.0s |
0.8s |
1.1s |
0.8s |
0.8s |
0.7s |
0.8s |
0.8s |
0.7s |
0.6s |
0.7s |
0.7s |
| services::execute_all_services_rt |
3.2s |
3.2s |
3.2s |
3.2s |
2.5s |
2.5s |
2.5s |
2.5s |
2.6s |
2.6s |
2.5s |
2.5s |
2.5s |
2.3s |
2.6s |
2.4s |
2.5s |
2.2s |
2.6s |
2.4s |
2.3s |
2.3s |
2.4s |
2.3s |
| services::fips_self_test_rom |
0.9s |
0.8s |
0.9s |
0.8s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.7s |
0.8s |
0.7s |
0.9s |
0.8s |
0.8s |
0.7s |
0.8s |
0.7s |
0.7s |
0.6s |
0.8s |
0.7s |
| services::fips_self_test_rt |
2.2s |
2.2s |
2.2s |
2.2s |
1.7s |
1.7s |
1.7s |
1.7s |
1.8s |
1.8s |
1.8s |
1.8s |
1.8s |
1.7s |
1.9s |
1.8s |
1.8s |
1.6s |
1.8s |
1.8s |
1.7s |
1.7s |
1.8s |
1.7s |
| services::version_info_update |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.5s |
1.4s |
1.3s |
1.4s |
1.3s |
1.4s |
1.3s |
1.8s |
1.4s |
1.4s |
1.3s |
1.4s |
1.3s |
| services::zeroize_halt_check_no_output |
1.8s |
1.8s |
1.8s |
1.8s |
1.4s |
1.4s |
1.4s |
1.4s |
1.4s |
1.5s |
1.5s |
1.5s |
1.3s |
1.3s |
1.3s |
1.3s |
1.4s |
1.2s |
1.6s |
1.4s |
1.3s |
1.3s |
1.3s |
1.2s |
| caliptra-verilated |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test_tracing |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-x509 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| fmc_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fmc_alias_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_csr_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| idevid_csr::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ldevid_cert::tests::test_extensions |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| rt_alias_cert::tests::test_cert_signing |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.1s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| caliptra-zeros::bin/caliptra-zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra-zeros::test_zeros |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| test_zeros |
1.2s |
1.2s |
1.2s |
1.2s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
1.0s |
0.6s |
0.6s |
0.7s |
0.6s |
0.7s |
0.7s |
0.9s |
0.7s |
0.7s |
0.7s |
0.6s |
0.6s |
| caliptra_common |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| caliptra_registers_generator::bin/caliptra_registers_generator |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| compliance-test::bin/compliance-test |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| exec::tests::test_exec_process_not_found |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_process_returned_nonzero |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| exec::tests::test_exec_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_create_dir_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_and_write_success |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_read_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_delete_error |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempdir_deleted |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_tempfile_drop_on_panic |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| fs::tests::test_write_failure |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_check_reference_data |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
n/a |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_of_arrays_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_oob_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| tests::test_reg_array_truncate_panic |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-codegen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| camel_ident_tests::test_camel_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| generate_enums_test::test_generate_enums |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| snake_ident_tests::test_snake_ident |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-schema |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| registerfield_tests::test_mask |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| validate::compute_reg_type_name_tests::test |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
0.0s |
| ureg-systemrdl |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| vector_gen::bin/vector_gen |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_calc_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.05s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.41s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.47s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.42s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_checksum_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.40s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_round_trip ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test checksum::tests::test_verify_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_populate_checksum_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 5 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test test::test_security_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test elf_symbols::test::test_elf_symbols ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_duplicate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::cargo_invocations_from_fwid::test_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_build_firmware_not_registered ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf2rom_golden ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_elf_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_fwid_elf_filename ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test test::test_image_revision_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 112.62s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 111.06s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 113.30s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 112.13s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.14s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 69.23s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.47s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.44s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 72.30s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 71.74s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 73.67s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
stdout:
running 1 test
test test_binaries_are_identical has been running for over 60 seconds
test test_binaries_are_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 70.46s
stderr:
Truncated 4518 bytes from beginning
the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
warning: unknown feature specified for `-Ctarget-feature`: `unaligned-scalar-mem`
|
= note: it is still passed through to the codegen backend
= help: consider filing a feature request
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.09s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.09s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.08s
running 1 test
test test_image_options_imports_correctly ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.07s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.18s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.20s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.19s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.17s
running 1 test
test cfi_asm_test::test::test_launder ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.16s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_rand_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
running 1 test
test test_with_initialized_counter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test test_with_not_initialized_counter - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.00s
stderr:
thread 'test_with_not_initialized_counter' panicked at 'CFI Panic = CounterCorrupt', cfi/lib/src/cfi.rs:218:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_data_files ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_coverage_map_creation_no_data_files_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_parse_trace_file ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_from_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array::tests::test_array_4x4_to_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_large - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_large' panicked at 'TOTAL_LEN should be 6, was 7', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test array_concat::tests::test_array_concat3_result_too_small - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
stderr:
thread 'array_concat::tests::test_array_concat3_result_too_small' panicked at 'TOTAL_LEN should be 6, was 5', drivers/src/array_concat.rs:21:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test array_concat::tests::test_array_concat3_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test bounded_address::tests::test_rom_address_validate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test fuse_bank::tests::test_first_set_msbit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_dv_nonsticky_384bit_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fht_is_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test hand_off::tests::test_fmc_priv_key_store ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_estack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test memory_layout::mem_layout_test_stack ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_err ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test okref::tests::test_okref_ok ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
test persistent::tests::test_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 17 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,417 writing to cptra_bootfsm_go
19,913 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,680 UART: csrng::test_entropy_src_seed...[ok]
438,907 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
19,886 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,575 UART: csrng::test_entropy_src_seed...[ok]
438,853 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
19,777 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,760 UART: csrng::test_entropy_src_seed...[ok]
439,003 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
19,880 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,743 UART: csrng::test_entropy_src_seed...[ok]
438,963 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
20,010 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,889 UART: csrng::test_entropy_src_seed...[ok]
439,126 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
19,761 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
434,717 UART: csrng::test_entropy_src_seed...[ok]
438,942 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "59ff15bf0aaabee21112e0ae6eb9ff7e65fcf5da75ac5b409c770c3f35f21347a59832223e35afd6b9676c670be2d1d3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,567 UART: csrng::test_ctr_drbg_ctr0_smoke...[ok]
4,466 UART: csrng::test_entropy_src_seed...[ok]
5,896 UART: csrng::test_zero_health_fails...[ok]
* TESTCASE PASSED
test test_csrng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
16,782 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
16,658 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
16,916 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
17,993 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,613 writing to cptra_bootfsm_go
17,069 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
16,666 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "30db153a615f9ceeff73175ecab6cbca89b9277fc9e38c845c57f25ba3b19dd0cc200b99f5184b412e377452c1eda956",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,113 UART: csrng2::test_assume_initialized...[ok]
* TESTCASE PASSED
test test_csrng2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
16,026 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
15,927 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
15,894 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
15,891 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
16,043 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
15,958 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,920 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
16,109 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
15,942 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
15,841 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
16,061 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
15,886 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
16,080 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
15,948 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
15,887 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
16,146 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
15,997 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,412 writing to cptra_bootfsm_go
16,189 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
15,906 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
15,929 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
15,752 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
15,974 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
15,930 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
15,903 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
16,095 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
15,885 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
16,032 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
15,949 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
15,803 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,229 writing to cptra_bootfsm_go
16,880 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
16,057 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
16,209 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
16,062 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
15,756 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
16,152 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
16,015 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
15,931 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
15,801 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
15,973 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
15,946 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,993 writing to cptra_bootfsm_go
16,822 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
15,817 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
15,844 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
16,116 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
15,772 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
16,721 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
16,050 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
16,130 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c88eccc6c5f1bcc43737508e45d9b6b18182998acc4b803ba5dd7ed01d6b8cd1742f9b0f5f69389e652961882c0d892e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_adaptp_tests::test_boot_fail_adaptp_check...[ok]
* TESTCASE PASSED
test test_csrng_adaptive_proportion ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,776 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
15,940 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
16,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
16,520 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,780 writing to cptra_bootfsm_go
16,856 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
15,949 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
15,922 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
15,993 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
16,073 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
16,115 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
15,950 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
15,975 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
16,267 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
15,845 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
16,139 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
16,117 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
16,008 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
16,031 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
16,064 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
15,955 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
15,837 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
16,126 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
16,037 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
16,109 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
16,130 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
16,239 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
15,923 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
16,001 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
15,738 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
16,030 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
16,015 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
17,267 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
16,136 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
15,752 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
15,944 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
15,851 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
16,177 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
16,010 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
16,184 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
16,367 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
15,971 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
16,273 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "2b2ff4e39d67e225b9298dca5499cd75f8474ffe7de84a8674ad11e1c948a08eda65414e6b050f232e94a10114468b94",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,000 UART: csrng_pass_health_tests::test_boot_and_generate_pass...[ok]
* TESTCASE PASSED
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "742b1fe5e1dc08706a71764a1e5ee49ba84c9b4c13630a5114ace76c78e4ea5e7c65d8235ac19a90c2695012ba9ec9d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,023 UART: csrng_fail_repcnt_tests::test_boot_fail_repcnt_check...[ok]
* TESTCASE PASSED
test test_csrng_repetition_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
21,823 UART: doe::test_decrypt...[ok]
13,268,024 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
21,955 UART: doe::test_decrypt...[ok]
13,265,376 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
22,069 UART: doe::test_decrypt...[ok]
13,457,462 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
21,803 UART: doe::test_decrypt...[ok]
13,459,851 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
22,163 UART: doe::test_decrypt...[ok]
9,942,696 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
21,715 UART: doe::test_decrypt...[ok]
9,941,581 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
22,154 UART: doe::test_decrypt...[ok]
10,195,857 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
21,994 UART: doe::test_decrypt...[ok]
10,199,119 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,593 writing to cptra_bootfsm_go
22,347 UART: doe::test_decrypt...[ok]
9,941,360 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
21,896 UART: doe::test_decrypt...[ok]
9,942,287 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
21,946 UART: doe::test_decrypt...[ok]
10,192,826 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
21,915 UART: doe::test_decrypt...[ok]
10,191,177 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,743 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,453 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,053 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,197 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,841 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,269 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,965 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
48,183 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,293 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
46,989 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,597 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...[ok]
47,705 UART: doe::test_clear_secrets...[ok]
* TESTCASE PASSED
test test_doe_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
22,122 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,716 writing to cptra_bootfsm_go
22,928 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
22,602 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
22,479 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
22,286 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
22,245 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
22,392 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
22,572 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
22,240 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
22,111 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
22,578 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
22,648 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7c3db743ac8f5f2b0e23cb6aeb6235711f0223f472cf99bbb034e1ff5095adabcc02851222e17028a6a9a4960bb618ad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,034 UART: doe::test_decrypt...test test_doe_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
29,525 UART: ecc384::test_kat...[ok]
3,328,074 UART: ecc384::test_gen_key_pair...[ok]
6,614,990 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,282 UART: ecc384::test_sign...[ok]
12,197,402 UART: ecc384::test_verify...[ok]
15,793,267 UART: ecc384::test_verify_r...[ok]
19,373,260 UART: ecc384::test_verify_failure...[ok]
22,958,522 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,827,763 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,979,849 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
29,467 UART: ecc384::test_kat...[ok]
3,332,147 UART: ecc384::test_gen_key_pair...[ok]
6,616,976 UART: ecc384::test_gen_key_pair_with_iv...[ok]
9,898,187 UART: ecc384::test_sign...[ok]
12,197,109 UART: ecc384::test_verify...[ok]
15,795,003 UART: ecc384::test_verify_r...[ok]
19,375,091 UART: ecc384::test_verify_failure...[ok]
22,962,347 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
29,830,584 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
39,986,761 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
29,993 UART: ecc384::test_kat...[ok]
3,695,419 UART: ecc384::test_gen_key_pair...[ok]
6,954,804 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,213,869 UART: ecc384::test_sign...[ok]
12,500,602 UART: ecc384::test_verify...[ok]
16,079,914 UART: ecc384::test_verify_r...[ok]
23,827,401 UART: ecc384::test_verify_failure...[ok]
27,408,915 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,242,183 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,324,488 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
29,847 UART: ecc384::test_kat...[ok]
3,695,313 UART: ecc384::test_gen_key_pair...[ok]
6,954,185 UART: ecc384::test_gen_key_pair_with_iv...[ok]
10,210,885 UART: ecc384::test_sign...[ok]
12,496,919 UART: ecc384::test_verify...[ok]
16,074,743 UART: ecc384::test_verify_r...[ok]
23,828,903 UART: ecc384::test_verify_failure...[ok]
27,405,784 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
34,239,988 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
44,325,879 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
29,432 UART: ecc384::test_kat...[ok]
2,498,623 UART: ecc384::test_gen_key_pair...[ok]
4,951,438 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,404,353 UART: ecc384::test_sign...[ok]
9,126,290 UART: ecc384::test_verify...[ok]
11,822,899 UART: ecc384::test_verify_r...[ok]
14,507,614 UART: ecc384::test_verify_failure...[ok]
17,196,932 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,336,473 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,931,722 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
29,749 UART: ecc384::test_kat...[ok]
2,499,426 UART: ecc384::test_gen_key_pair...[ok]
4,952,699 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,273 UART: ecc384::test_sign...[ok]
9,126,735 UART: ecc384::test_verify...[ok]
11,820,146 UART: ecc384::test_verify_r...[ok]
14,505,247 UART: ecc384::test_verify_failure...[ok]
17,196,950 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,337,383 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,930,853 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
29,883 UART: ecc384::test_kat...[ok]
2,884,125 UART: ecc384::test_gen_key_pair...[ok]
5,330,392 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,769,854 UART: ecc384::test_sign...[ok]
9,481,816 UART: ecc384::test_verify...[ok]
12,160,207 UART: ecc384::test_verify_r...[ok]
14,836,990 UART: ecc384::test_verify_failure...[ok]
22,940,352 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,058,294 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,607,426 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
29,876 UART: ecc384::test_kat...[ok]
2,881,024 UART: ecc384::test_gen_key_pair...[ok]
5,323,736 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,767,007 UART: ecc384::test_sign...[ok]
9,479,871 UART: ecc384::test_verify...[ok]
12,160,763 UART: ecc384::test_verify_r...[ok]
14,836,017 UART: ecc384::test_verify_failure...[ok]
22,936,005 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,056,799 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,613,630 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
29,527 UART: ecc384::test_kat...[ok]
2,496,101 UART: ecc384::test_gen_key_pair...[ok]
4,954,450 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,403,245 UART: ecc384::test_sign...[ok]
9,124,266 UART: ecc384::test_verify...[ok]
11,817,363 UART: ecc384::test_verify_r...[ok]
14,505,600 UART: ecc384::test_verify_failure...[ok]
17,192,979 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,336,298 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,928,449 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
29,552 UART: ecc384::test_kat...[ok]
2,499,117 UART: ecc384::test_gen_key_pair...[ok]
4,951,715 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,402,995 UART: ecc384::test_sign...[ok]
9,125,476 UART: ecc384::test_verify...[ok]
11,819,901 UART: ecc384::test_verify_r...[ok]
14,503,887 UART: ecc384::test_verify_failure...[ok]
17,195,195 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
22,324,861 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
29,917,829 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
29,957 UART: ecc384::test_kat...[ok]
2,882,306 UART: ecc384::test_gen_key_pair...[ok]
5,326,529 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,768,657 UART: ecc384::test_sign...[ok]
9,481,154 UART: ecc384::test_verify...[ok]
12,160,189 UART: ecc384::test_verify_r...[ok]
14,834,306 UART: ecc384::test_verify_failure...[ok]
22,940,346 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,058,242 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,609,729 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
29,777 UART: ecc384::test_kat...[ok]
2,880,221 UART: ecc384::test_gen_key_pair...[ok]
5,324,939 UART: ecc384::test_gen_key_pair_with_iv...[ok]
7,763,663 UART: ecc384::test_sign...[ok]
9,474,115 UART: ecc384::test_verify...[ok]
12,154,799 UART: ecc384::test_verify_r...[ok]
14,830,138 UART: ecc384::test_verify_failure...[ok]
22,928,057 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
28,047,012 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
35,604,304 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,583 UART: ecc384::test_gen_key_pair...[ok]
25,879 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,371 UART: ecc384::test_sign...[ok]
43,309 UART: ecc384::test_verify...[ok]
52,703 UART: ecc384::test_verify_r...[ok]
61,414 UART: ecc384::test_verify_failure...[ok]
69,828 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,180 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,591 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,343 UART: ecc384::test_gen_key_pair...[ok]
25,661 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,697 UART: ecc384::test_sign...[ok]
42,561 UART: ecc384::test_verify...[ok]
51,891 UART: ecc384::test_verify_r...[ok]
60,480 UART: ecc384::test_verify_failure...[ok]
69,552 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,144 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,449 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,779 UART: ecc384::test_gen_key_pair...[ok]
26,257 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,505 UART: ecc384::test_sign...[ok]
43,087 UART: ecc384::test_verify...[ok]
52,071 UART: ecc384::test_verify_r...[ok]
60,796 UART: ecc384::test_verify_failure...[ok]
69,530 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,160 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,931 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,701 UART: ecc384::test_gen_key_pair...[ok]
26,153 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,811 UART: ecc384::test_sign...[ok]
43,783 UART: ecc384::test_verify...[ok]
52,889 UART: ecc384::test_verify_r...[ok]
61,666 UART: ecc384::test_verify_failure...[ok]
70,214 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,786 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,503 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,455 UART: ecc384::test_gen_key_pair...[ok]
25,261 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,699 UART: ecc384::test_sign...[ok]
42,189 UART: ecc384::test_verify...[ok]
51,295 UART: ecc384::test_verify_r...[ok]
59,770 UART: ecc384::test_verify_failure...[ok]
68,626 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
86,522 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
114,063 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,059 UART: ecc384::test_gen_key_pair...[ok]
25,935 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,259 UART: ecc384::test_sign...[ok]
42,985 UART: ecc384::test_verify...[ok]
52,175 UART: ecc384::test_verify_r...[ok]
60,506 UART: ecc384::test_verify_failure...[ok]
69,310 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,886 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,487 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,835 UART: ecc384::test_gen_key_pair...[ok]
25,753 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,191 UART: ecc384::test_sign...[ok]
43,127 UART: ecc384::test_verify...[ok]
51,943 UART: ecc384::test_verify_r...[ok]
60,532 UART: ecc384::test_verify_failure...[ok]
69,682 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,982 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,401 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,147 UART: ecc384::test_gen_key_pair...[ok]
26,069 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,157 UART: ecc384::test_sign...[ok]
43,177 UART: ecc384::test_verify...[ok]
52,447 UART: ecc384::test_verify_r...[ok]
61,054 UART: ecc384::test_verify_failure...[ok]
70,048 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,218 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,213 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,687 UART: ecc384::test_gen_key_pair...[ok]
25,365 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,531 UART: ecc384::test_sign...[ok]
42,279 UART: ecc384::test_verify...[ok]
51,225 UART: ecc384::test_verify_r...[ok]
59,802 UART: ecc384::test_verify_failure...[ok]
68,176 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
87,152 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,327 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,311 UART: ecc384::test_gen_key_pair...[ok]
25,645 UART: ecc384::test_gen_key_pair_with_iv...[ok]
35,777 UART: ecc384::test_sign...[ok]
42,661 UART: ecc384::test_verify...[ok]
51,969 UART: ecc384::test_verify_r...[ok]
60,738 UART: ecc384::test_verify_failure...[ok]
69,488 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,026 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
115,181 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
14,655 UART: ecc384::test_gen_key_pair...[ok]
25,753 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,303 UART: ecc384::test_sign...[ok]
43,291 UART: ecc384::test_verify...[ok]
52,927 UART: ecc384::test_verify_r...[ok]
61,334 UART: ecc384::test_verify_failure...[ok]
70,242 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
88,880 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
116,767 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "026caab58683ca9b693170a6ce7c8aa8dbb7a7d7687be1769c04de7596b6a4acfc1ae5231381509bc3c5048efd81affa",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,117 UART: ecc384::test_kat...[ok]
15,183 UART: ecc384::test_gen_key_pair...[ok]
26,047 UART: ecc384::test_gen_key_pair_with_iv...[ok]
36,787 UART: ecc384::test_sign...[ok]
43,347 UART: ecc384::test_verify...[ok]
52,577 UART: ecc384::test_verify_r...[ok]
61,340 UART: ecc384::test_verify_failure...[ok]
70,426 UART: ecc384::test_kv_seed_from_input_msg_from_input...[ok]
89,396 UART: ecc384::test_kv_seed_from_kv_msg_from_input...[ok]
117,763 UART: ecc384::test_no_private_key_usage...[ok]
* TESTCASE PASSED
test test_ecc384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
19,374 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
19,258 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
19,686 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
19,551 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
19,250 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
21,090 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
19,665 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
19,644 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
19,183 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
19,322 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
19,580 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
19,635 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "318016c7643b3f05d574c012b5c9daa9163f2f5a1a367bfe095b5ff4c0c5149f6c6b74d05970848e8bc5d70201e3d966",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,560 UART: ecc384_sign_validation_failure::test_sign_validation_failure...[test] CFI Panic code=0x01040055test test_ecc384_sign_validation_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
13,540 UART: error_reporter::test_report_fw_error...[ok]
16,564 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,793 writing to cptra_bootfsm_go
13,591 UART: error_reporter::test_report_fw_error...[ok]
16,580 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,528 writing to cptra_bootfsm_go
14,232 UART: error_reporter::test_report_fw_error...[ok]
17,218 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
14,039 UART: error_reporter::test_report_fw_error...[ok]
17,044 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
13,599 UART: error_reporter::test_report_fw_error...[ok]
16,616 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
13,572 UART: error_reporter::test_report_fw_error...[ok]
16,551 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
13,930 UART: error_reporter::test_report_fw_error...[ok]
16,919 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
13,952 UART: error_reporter::test_report_fw_error...[ok]
16,916 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
13,623 UART: error_reporter::test_report_fw_error...[ok]
16,631 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
13,799 UART: error_reporter::test_report_fw_error...[ok]
16,792 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
13,885 UART: error_reporter::test_report_fw_error...[ok]
16,915 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
13,837 UART: error_reporter::test_report_fw_error...[ok]
16,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "05e7956707108e66f77180817f91d3d5c54533e339adcb0f44ef27cc00689ee91650ee50b74ee678084e5a9a5e82a5de",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,706 UART: error_reporter::test_report_fw_error...[ok]
2,864 UART: error_reporter::test_report_fw_error_fatal...[ok]
* TESTCASE PASSED
test test_error_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test test_generate_doe_vectors_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
30,733 UART: hmac384::test_kat...[ok]
71,707 UART: hmac384::test_hmac0...[ok]
87,964 UART: hmac384::test_hmac1...[ok]
109,159 UART: hmac384::test_hmac2...[ok]
6,677,783 UART: hmac384::test_hmac3...[ok]
13,268,671 UART: hmac384::test_hmac4...[ok]
19,840,930 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,431,732 UART: hmac384::test_hmac5...[ok]
29,802,621 UART: hmac384::test_kdf0...[ok]
33,130,557 UART: hmac384::test_kdf1...[ok]
36,455,491 UART: hmac384::test_kdf2...[ok]
36,483,755 UART: hmac384::test_hmac_multi_block...[ok]
36,502,641 UART: hmac384::test_hmac_exact_single_block...[ok]
36,523,724 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,662 writing to cptra_bootfsm_go
31,368 UART: hmac384::test_kat...[ok]
72,021 UART: hmac384::test_hmac0...[ok]
88,986 UART: hmac384::test_hmac1...[ok]
109,965 UART: hmac384::test_hmac2...[ok]
6,676,073 UART: hmac384::test_hmac3...[ok]
13,266,149 UART: hmac384::test_hmac4...[ok]
19,852,524 UART: hmac384::test_hmac_kv_multiblock...[ok]
26,419,557 UART: hmac384::test_hmac5...[ok]
29,790,207 UART: hmac384::test_kdf0...[ok]
33,116,253 UART: hmac384::test_kdf1...[ok]
36,443,315 UART: hmac384::test_kdf2...[ok]
36,471,904 UART: hmac384::test_hmac_multi_block...[ok]
36,488,713 UART: hmac384::test_hmac_exact_single_block...[ok]
36,510,144 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
30,895 UART: hmac384::test_kat...[ok]
456,747 UART: hmac384::test_hmac0...[ok]
652,502 UART: hmac384::test_hmac1...[ok]
857,303 UART: hmac384::test_hmac2...[ok]
7,562,148 UART: hmac384::test_hmac3...[ok]
14,068,779 UART: hmac384::test_hmac4...[ok]
20,579,792 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,090,482 UART: hmac384::test_hmac5...[ok]
30,368,140 UART: hmac384::test_kdf0...[ok]
33,636,738 UART: hmac384::test_kdf1...[ok]
36,905,270 UART: hmac384::test_kdf2...[ok]
36,919,728 UART: hmac384::test_hmac_multi_block...[ok]
40,330,641 UART: hmac384::test_hmac_exact_single_block...[ok]
40,536,192 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
31,145 UART: hmac384::test_kat...[ok]
455,154 UART: hmac384::test_hmac0...[ok]
654,434 UART: hmac384::test_hmac1...[ok]
857,524 UART: hmac384::test_hmac2...[ok]
7,562,843 UART: hmac384::test_hmac3...[ok]
14,069,463 UART: hmac384::test_hmac4...[ok]
20,578,377 UART: hmac384::test_hmac_kv_multiblock...[ok]
27,089,110 UART: hmac384::test_hmac5...[ok]
30,365,208 UART: hmac384::test_kdf0...[ok]
33,634,615 UART: hmac384::test_kdf1...[ok]
36,902,417 UART: hmac384::test_kdf2...[ok]
36,916,615 UART: hmac384::test_hmac_multi_block...[ok]
40,326,627 UART: hmac384::test_hmac_exact_single_block...[ok]
40,531,858 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
30,826 UART: hmac384::test_kat...[ok]
70,808 UART: hmac384::test_hmac0...[ok]
86,801 UART: hmac384::test_hmac1...[ok]
109,481 UART: hmac384::test_hmac2...[ok]
5,036,146 UART: hmac384::test_hmac3...[ok]
9,960,793 UART: hmac384::test_hmac4...[ok]
14,891,500 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,817,678 UART: hmac384::test_hmac5...[ok]
22,353,932 UART: hmac384::test_kdf0...[ok]
24,850,553 UART: hmac384::test_kdf1...[ok]
27,344,084 UART: hmac384::test_kdf2...[ok]
27,370,753 UART: hmac384::test_hmac_multi_block...[ok]
27,388,531 UART: hmac384::test_hmac_exact_single_block...[ok]
27,410,697 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
30,673 UART: hmac384::test_kat...[ok]
72,655 UART: hmac384::test_hmac0...[ok]
88,520 UART: hmac384::test_hmac1...[ok]
109,485 UART: hmac384::test_hmac2...[ok]
5,034,610 UART: hmac384::test_hmac3...[ok]
9,956,171 UART: hmac384::test_hmac4...[ok]
14,884,681 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,810,763 UART: hmac384::test_hmac5...[ok]
22,346,664 UART: hmac384::test_kdf0...[ok]
24,840,588 UART: hmac384::test_kdf1...[ok]
27,339,575 UART: hmac384::test_kdf2...[ok]
27,366,070 UART: hmac384::test_hmac_multi_block...[ok]
27,384,017 UART: hmac384::test_hmac_exact_single_block...[ok]
27,404,821 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,405 writing to cptra_bootfsm_go
31,162 UART: hmac384::test_kat...[ok]
456,731 UART: hmac384::test_hmac0...[ok]
652,735 UART: hmac384::test_hmac1...[ok]
858,218 UART: hmac384::test_hmac2...[ok]
5,930,908 UART: hmac384::test_hmac3...[ok]
10,808,033 UART: hmac384::test_hmac4...[ok]
15,682,619 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,565,083 UART: hmac384::test_hmac5...[ok]
23,025,541 UART: hmac384::test_kdf0...[ok]
25,478,307 UART: hmac384::test_kdf1...[ok]
27,932,610 UART: hmac384::test_kdf2...[ok]
27,947,889 UART: hmac384::test_hmac_multi_block...[ok]
27,960,095 UART: hmac384::test_hmac_exact_single_block...[ok]
27,972,898 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
31,169 UART: hmac384::test_kat...[ok]
456,291 UART: hmac384::test_hmac0...[ok]
653,015 UART: hmac384::test_hmac1...[ok]
857,830 UART: hmac384::test_hmac2...[ok]
5,926,545 UART: hmac384::test_hmac3...[ok]
10,807,851 UART: hmac384::test_hmac4...[ok]
15,689,926 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,567,150 UART: hmac384::test_hmac5...[ok]
23,026,925 UART: hmac384::test_kdf0...[ok]
25,483,607 UART: hmac384::test_kdf1...[ok]
27,938,787 UART: hmac384::test_kdf2...[ok]
27,954,291 UART: hmac384::test_hmac_multi_block...[ok]
27,966,775 UART: hmac384::test_hmac_exact_single_block...[ok]
27,979,390 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
30,568 UART: hmac384::test_kat...[ok]
72,677 UART: hmac384::test_hmac0...[ok]
89,305 UART: hmac384::test_hmac1...[ok]
110,440 UART: hmac384::test_hmac2...[ok]
5,038,093 UART: hmac384::test_hmac3...[ok]
9,961,774 UART: hmac384::test_hmac4...[ok]
14,891,816 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,818,449 UART: hmac384::test_hmac5...[ok]
22,354,000 UART: hmac384::test_kdf0...[ok]
24,853,103 UART: hmac384::test_kdf1...[ok]
27,344,932 UART: hmac384::test_kdf2...[ok]
27,373,477 UART: hmac384::test_hmac_multi_block...[ok]
27,390,422 UART: hmac384::test_hmac_exact_single_block...[ok]
27,411,856 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
30,669 UART: hmac384::test_kat...[ok]
71,110 UART: hmac384::test_hmac0...[ok]
87,594 UART: hmac384::test_hmac1...[ok]
109,636 UART: hmac384::test_hmac2...[ok]
5,044,667 UART: hmac384::test_hmac3...[ok]
9,973,213 UART: hmac384::test_hmac4...[ok]
14,897,019 UART: hmac384::test_hmac_kv_multiblock...[ok]
19,827,865 UART: hmac384::test_hmac5...[ok]
22,366,481 UART: hmac384::test_kdf0...[ok]
24,862,580 UART: hmac384::test_kdf1...[ok]
27,356,479 UART: hmac384::test_kdf2...[ok]
27,386,821 UART: hmac384::test_hmac_multi_block...[ok]
27,403,394 UART: hmac384::test_hmac_exact_single_block...[ok]
27,426,347 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
31,066 UART: hmac384::test_kat...[ok]
456,178 UART: hmac384::test_hmac0...[ok]
653,293 UART: hmac384::test_hmac1...[ok]
857,489 UART: hmac384::test_hmac2...[ok]
5,933,507 UART: hmac384::test_hmac3...[ok]
10,814,042 UART: hmac384::test_hmac4...[ok]
15,689,475 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,572,718 UART: hmac384::test_hmac5...[ok]
23,034,778 UART: hmac384::test_kdf0...[ok]
25,491,729 UART: hmac384::test_kdf1...[ok]
27,944,267 UART: hmac384::test_kdf2...[ok]
27,959,813 UART: hmac384::test_hmac_multi_block...[ok]
27,972,275 UART: hmac384::test_hmac_exact_single_block...[ok]
27,984,848 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
31,063 UART: hmac384::test_kat...[ok]
455,385 UART: hmac384::test_hmac0...[ok]
653,070 UART: hmac384::test_hmac1...[ok]
857,692 UART: hmac384::test_hmac2...[ok]
5,931,093 UART: hmac384::test_hmac3...[ok]
10,814,803 UART: hmac384::test_hmac4...[ok]
15,695,215 UART: hmac384::test_hmac_kv_multiblock...[ok]
20,577,657 UART: hmac384::test_hmac5...[ok]
23,039,229 UART: hmac384::test_kdf0...[ok]
25,491,084 UART: hmac384::test_kdf1...[ok]
27,946,363 UART: hmac384::test_kdf2...[ok]
27,963,315 UART: hmac384::test_hmac_multi_block...[ok]
27,976,739 UART: hmac384::test_hmac_exact_single_block...[ok]
27,990,893 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,859 UART: hmac384::test_hmac0...[ok]
14,151 UART: hmac384::test_hmac1...[ok]
18,057 UART: hmac384::test_hmac2...[ok]
37,715 UART: hmac384::test_hmac3...[ok]
57,298 UART: hmac384::test_hmac4...[ok]
76,700 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,374 UART: hmac384::test_hmac5...[ok]
120,544 UART: hmac384::test_kdf0...[ok]
136,694 UART: hmac384::test_kdf1...[ok]
151,886 UART: hmac384::test_kdf2...[ok]
157,326 UART: hmac384::test_hmac_multi_block...[ok]
163,096 UART: hmac384::test_hmac_exact_single_block...[ok]
169,047 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,791 UART: hmac384::test_hmac0...[ok]
13,665 UART: hmac384::test_hmac1...[ok]
17,777 UART: hmac384::test_hmac2...[ok]
37,199 UART: hmac384::test_hmac3...[ok]
57,154 UART: hmac384::test_hmac4...[ok]
76,694 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,552 UART: hmac384::test_hmac5...[ok]
120,088 UART: hmac384::test_kdf0...[ok]
136,770 UART: hmac384::test_kdf1...[ok]
152,178 UART: hmac384::test_kdf2...[ok]
157,674 UART: hmac384::test_hmac_multi_block...[ok]
163,452 UART: hmac384::test_hmac_exact_single_block...[ok]
169,585 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,767 UART: hmac384::test_hmac0...[ok]
14,023 UART: hmac384::test_hmac1...[ok]
18,283 UART: hmac384::test_hmac2...[ok]
38,509 UART: hmac384::test_hmac3...[ok]
59,000 UART: hmac384::test_hmac4...[ok]
79,128 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,076 UART: hmac384::test_hmac5...[ok]
124,056 UART: hmac384::test_kdf0...[ok]
140,756 UART: hmac384::test_kdf1...[ok]
156,662 UART: hmac384::test_kdf2...[ok]
162,486 UART: hmac384::test_hmac_multi_block...[ok]
168,432 UART: hmac384::test_hmac_exact_single_block...[ok]
174,371 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,869 UART: hmac384::test_hmac0...[ok]
13,931 UART: hmac384::test_hmac1...[ok]
18,089 UART: hmac384::test_hmac2...[ok]
37,881 UART: hmac384::test_hmac3...[ok]
57,366 UART: hmac384::test_hmac4...[ok]
77,946 UART: hmac384::test_hmac_kv_multiblock...[ok]
102,846 UART: hmac384::test_hmac5...[ok]
122,840 UART: hmac384::test_kdf0...[ok]
139,360 UART: hmac384::test_kdf1...[ok]
155,350 UART: hmac384::test_kdf2...[ok]
161,072 UART: hmac384::test_hmac_multi_block...[ok]
167,058 UART: hmac384::test_hmac_exact_single_block...[ok]
173,279 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,816 UART: hmac384::test_hmac0...[ok]
13,893 UART: hmac384::test_hmac1...[ok]
18,224 UART: hmac384::test_hmac2...[ok]
38,075 UART: hmac384::test_hmac3...[ok]
57,493 UART: hmac384::test_hmac4...[ok]
77,356 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,507 UART: hmac384::test_hmac5...[ok]
121,719 UART: hmac384::test_kdf0...[ok]
139,083 UART: hmac384::test_kdf1...[ok]
154,773 UART: hmac384::test_kdf2...[ok]
160,574 UART: hmac384::test_hmac_multi_block...[ok]
166,547 UART: hmac384::test_hmac_exact_single_block...[ok]
172,693 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,874 UART: hmac384::test_hmac0...[ok]
14,019 UART: hmac384::test_hmac1...[ok]
18,016 UART: hmac384::test_hmac2...[ok]
38,401 UART: hmac384::test_hmac3...[ok]
58,957 UART: hmac384::test_hmac4...[ok]
79,350 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,377 UART: hmac384::test_hmac5...[ok]
123,433 UART: hmac384::test_kdf0...[ok]
139,907 UART: hmac384::test_kdf1...[ok]
155,521 UART: hmac384::test_kdf2...[ok]
161,130 UART: hmac384::test_hmac_multi_block...[ok]
166,929 UART: hmac384::test_hmac_exact_single_block...[ok]
172,961 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,072 UART: hmac384::test_hmac0...[ok]
14,307 UART: hmac384::test_hmac1...[ok]
18,592 UART: hmac384::test_hmac2...[ok]
38,699 UART: hmac384::test_hmac3...[ok]
59,031 UART: hmac384::test_hmac4...[ok]
79,140 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,635 UART: hmac384::test_hmac5...[ok]
123,957 UART: hmac384::test_kdf0...[ok]
140,689 UART: hmac384::test_kdf1...[ok]
156,763 UART: hmac384::test_kdf2...[ok]
162,376 UART: hmac384::test_hmac_multi_block...[ok]
168,491 UART: hmac384::test_hmac_exact_single_block...[ok]
174,535 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,998 UART: hmac384::test_hmac0...[ok]
14,321 UART: hmac384::test_hmac1...[ok]
18,432 UART: hmac384::test_hmac2...[ok]
38,811 UART: hmac384::test_hmac3...[ok]
59,307 UART: hmac384::test_hmac4...[ok]
79,388 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,449 UART: hmac384::test_hmac5...[ok]
123,919 UART: hmac384::test_kdf0...[ok]
140,439 UART: hmac384::test_kdf1...[ok]
156,445 UART: hmac384::test_kdf2...[ok]
162,318 UART: hmac384::test_hmac_multi_block...[ok]
168,599 UART: hmac384::test_hmac_exact_single_block...[ok]
174,803 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,894 UART: hmac384::test_hmac0...[ok]
13,873 UART: hmac384::test_hmac1...[ok]
17,956 UART: hmac384::test_hmac2...[ok]
37,649 UART: hmac384::test_hmac3...[ok]
57,457 UART: hmac384::test_hmac4...[ok]
77,354 UART: hmac384::test_hmac_kv_multiblock...[ok]
100,975 UART: hmac384::test_hmac5...[ok]
120,917 UART: hmac384::test_kdf0...[ok]
137,597 UART: hmac384::test_kdf1...[ok]
152,931 UART: hmac384::test_kdf2...[ok]
158,594 UART: hmac384::test_hmac_multi_block...[ok]
164,509 UART: hmac384::test_hmac_exact_single_block...[ok]
170,341 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
9,878 UART: hmac384::test_hmac0...[ok]
14,001 UART: hmac384::test_hmac1...[ok]
18,112 UART: hmac384::test_hmac2...[ok]
37,403 UART: hmac384::test_hmac3...[ok]
57,801 UART: hmac384::test_hmac4...[ok]
77,998 UART: hmac384::test_hmac_kv_multiblock...[ok]
101,339 UART: hmac384::test_hmac5...[ok]
121,973 UART: hmac384::test_kdf0...[ok]
138,971 UART: hmac384::test_kdf1...[ok]
154,515 UART: hmac384::test_kdf2...[ok]
160,072 UART: hmac384::test_hmac_multi_block...[ok]
166,039 UART: hmac384::test_hmac_exact_single_block...[ok]
172,053 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,056 UART: hmac384::test_hmac0...[ok]
14,421 UART: hmac384::test_hmac1...[ok]
18,510 UART: hmac384::test_hmac2...[ok]
38,797 UART: hmac384::test_hmac3...[ok]
59,009 UART: hmac384::test_hmac4...[ok]
79,476 UART: hmac384::test_hmac_kv_multiblock...[ok]
103,399 UART: hmac384::test_hmac5...[ok]
123,667 UART: hmac384::test_kdf0...[ok]
140,497 UART: hmac384::test_kdf1...[ok]
156,285 UART: hmac384::test_kdf2...[ok]
162,048 UART: hmac384::test_hmac_multi_block...[ok]
168,119 UART: hmac384::test_hmac_exact_single_block...[ok]
174,333 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dc508ab59928b30ec0cb5310bd74e7fc079978f61ca17881989ad4cb05474fe754c6b444853189f6d43a137d2592e883",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4,345 UART: hmac384::test_kat...[ok]
10,034 UART: hmac384::test_hmac0...[ok]
14,233 UART: hmac384::test_hmac1...[ok]
18,366 UART: hmac384::test_hmac2...[ok]
39,161 UART: hmac384::test_hmac3...[ok]
59,503 UART: hmac384::test_hmac4...[ok]
79,792 UART: hmac384::test_hmac_kv_multiblock...[ok]
104,533 UART: hmac384::test_hmac5...[ok]
124,901 UART: hmac384::test_kdf0...[ok]
141,997 UART: hmac384::test_kdf1...[ok]
157,183 UART: hmac384::test_kdf2...[ok]
162,894 UART: hmac384::test_hmac_multi_block...[ok]
169,079 UART: hmac384::test_hmac_exact_single_block...[ok]
175,271 UART: hmac384::test_hmac_multi_block_two_step...[ok]
* TESTCASE PASSED
test test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,117 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,819 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "99e6d14e40a1a86325818d16abe72f6916c3e25ed5cd69e9d0e033b2160ed66f3d5185dbf0622efd1d6cedf0ec238304",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "84a37e60b846e2fec429bffed766cd3f657461318e63f65e84f31200a0626eb5b8ff575a2b5f302cb44c4bee0fc5179f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,053 UART: keyvault::test_write_lock_and_erase_keys...[ok]
4,239 UART: keyvault::test_erase_all_keys...[ok]
5,767 UART: keyvault::test_read_key_usage...[ok]
7,295 UART: keyvault::test_use_lock...[ok]
8,791 UART: keyvault::test_write_protection_stickiness...[ok]
10,591 UART: keyvault::test_use_protection_stickiness...[ok]
* TESTCASE PASSED
test test_keyvault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
23,783 UART: test_lms_24::test_coefficient...[ok]
26,534 UART: test_lms_24::test_get_lms_parameters...[ok]
29,612 UART: test_lms_24::test_hash_message_24...[ok]
42,463 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
23,737 UART: test_lms_24::test_coefficient...[ok]
26,547 UART: test_lms_24::test_get_lms_parameters...[ok]
29,540 UART: test_lms_24::test_hash_message_24...[ok]
42,410 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
24,095 UART: test_lms_24::test_coefficient...[ok]
26,840 UART: test_lms_24::test_get_lms_parameters...[ok]
29,878 UART: test_lms_24::test_hash_message_24...[ok]
42,710 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
24,207 UART: test_lms_24::test_coefficient...[ok]
26,963 UART: test_lms_24::test_get_lms_parameters...[ok]
30,011 UART: test_lms_24::test_hash_message_24...[ok]
42,821 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
24,044 UART: test_lms_24::test_coefficient...[ok]
26,784 UART: test_lms_24::test_get_lms_parameters...[ok]
29,831 UART: test_lms_24::test_hash_message_24...[ok]
42,675 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
23,747 UART: test_lms_24::test_coefficient...[ok]
26,470 UART: test_lms_24::test_get_lms_parameters...[ok]
29,530 UART: test_lms_24::test_hash_message_24...[ok]
42,420 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
23,988 UART: test_lms_24::test_coefficient...[ok]
26,717 UART: test_lms_24::test_get_lms_parameters...[ok]
29,788 UART: test_lms_24::test_hash_message_24...[ok]
42,588 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,154 writing to cptra_bootfsm_go
24,932 UART: test_lms_24::test_coefficient...[ok]
27,726 UART: test_lms_24::test_get_lms_parameters...[ok]
30,741 UART: test_lms_24::test_hash_message_24...[ok]
43,610 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
23,678 UART: test_lms_24::test_coefficient...[ok]
26,478 UART: test_lms_24::test_get_lms_parameters...[ok]
29,523 UART: test_lms_24::test_hash_message_24...[ok]
42,311 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
23,849 UART: test_lms_24::test_coefficient...[ok]
27,391 UART: test_lms_24::test_get_lms_parameters...[ok]
29,625 UART: test_lms_24::test_hash_message_24...[ok]
42,469 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
24,212 UART: test_lms_24::test_coefficient...[ok]
26,927 UART: test_lms_24::test_get_lms_parameters...[ok]
29,958 UART: test_lms_24::test_hash_message_24...[ok]
43,083 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
24,137 UART: test_lms_24::test_coefficient...[ok]
26,901 UART: test_lms_24::test_get_lms_parameters...[ok]
29,930 UART: test_lms_24::test_hash_message_24...[ok]
42,750 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c064aad83b580f06f9f0a29a9d6e7ecb1dd4efb03ccf27c6c27cd364d682b2c3d58d965ec50e0d6ba2b5de1b767e78ba",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,246 UART: test_lms_24::test_coefficient...[ok]
4,281 UART: test_lms_24::test_get_lms_parameters...[ok]
5,419 UART: test_lms_24::test_hash_message_24...[ok]
11,621 UART: test_lms_24::test_lms_24_height_15...[ok]
* TESTCASE PASSED
test test_lms_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
23,842 UART: test_lms_32::test_hash_message_32...[ok]
42,685 UART: test_lms_32::test_ots_32...[ok]
20,101,632 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,713 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
23,755 UART: test_lms_32::test_hash_message_32...[ok]
42,608 UART: test_lms_32::test_ots_32...[ok]
20,101,502 UART: test_lms_32::test_lms_lower_32...[ok]
60,343,696 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
24,429 UART: test_lms_32::test_hash_message_32...[ok]
43,276 UART: test_lms_32::test_ots_32...[ok]
20,102,253 UART: test_lms_32::test_lms_lower_32...[ok]
60,344,302 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
24,151 UART: test_lms_32::test_hash_message_32...[ok]
43,058 UART: test_lms_32::test_ots_32...[ok]
20,101,921 UART: test_lms_32::test_lms_lower_32...[ok]
60,344,124 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
23,994 UART: test_lms_32::test_hash_message_32...[ok]
42,906 UART: test_lms_32::test_ots_32...[ok]
642,704 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,517 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
23,732 UART: test_lms_32::test_hash_message_32...[ok]
42,644 UART: test_lms_32::test_ots_32...[ok]
642,462 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,265 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,388 writing to cptra_bootfsm_go
24,393 UART: test_lms_32::test_hash_message_32...[ok]
43,353 UART: test_lms_32::test_ots_32...[ok]
643,102 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,871 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,024 writing to cptra_bootfsm_go
24,929 UART: test_lms_32::test_hash_message_32...[ok]
43,785 UART: test_lms_32::test_ots_32...[ok]
643,629 UART: test_lms_32::test_lms_lower_32...[ok]
1,931,429 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
23,685 UART: test_lms_32::test_hash_message_32...[ok]
42,585 UART: test_lms_32::test_ots_32...[ok]
642,355 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,192 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
23,741 UART: test_lms_32::test_hash_message_32...[ok]
42,689 UART: test_lms_32::test_ots_32...[ok]
642,609 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,225 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
24,378 UART: test_lms_32::test_hash_message_32...[ok]
43,312 UART: test_lms_32::test_ots_32...[ok]
643,111 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,893 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
24,324 UART: test_lms_32::test_hash_message_32...[ok]
43,173 UART: test_lms_32::test_ots_32...[ok]
643,007 UART: test_lms_32::test_lms_lower_32...[ok]
1,930,772 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 7.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
10,926,373 UART: test_lms_32::test_lms_lower_32...[ok]
32,804,432 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 8.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "bd26802b80aa7942b260969c6dbec6b74fa65d1fa915ba678b50b80cdffe54b8ded577a41722370cd8e94d1669b7a706",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,240 UART: test_lms_32::test_hash_message_32...[ok]
13,735 UART: test_lms_32::test_ots_32...[ok]
182,413 UART: test_lms_32::test_lms_lower_32...[ok]
572,552 UART: test_lms_32::test_hss_upper_32...[ok]
* TESTCASE PASSED
test test_lms_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,176 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,347 UART: cmd: 0x50000000
19,172 UART: dlen: 8
20,207 >>> mbox cmd response: success
20,654 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,536 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,246 UART: cmd: 0x50000000
29,139 UART: dlen: 7
30,195 >>> mbox cmd response: success
30,670 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,682 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,370 UART: cmd: 0x50000000
39,253 UART: dlen: 0
40,253 >>> mbox cmd response: success
40,673 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,965 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,661 UART: cmd: 0x50000001
49,550 UART: dlen: 5
50,603 >>> mbox cmd response: success
51,076 UART: buf: [01, 23, 45, 67, 89]
55,684 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,384 UART: cmd: 0x50000001
58,267 UART: dlen: 6
59,314 >>> mbox cmd response: success
59,787 UART: buf: [01, 23, 45, 67, 89]
64,417 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,114 UART: cmd: 0x50000001
66,994 UART: dlen: 9
68,048 >>> mbox cmd response: success
68,527 UART: buf: [01, 23, 45, 67, 89]
73,101 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,824 UART: cmd: 0x60000000
75,712 UART: dlen: 16
77,195 UART: buf: [67452301, efcdab89]
80,739 UART: buf: [33221100, 77665544]
83,896 >>> mbox cmd response: success
84,156 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,848 UART: cmd: 0x60000000
86,780 UART: dlen: 13
88,257 UART: buf: [67452301, efcdab89]
91,743 UART: buf: [33221100, 00000044]
95,258 >>> mbox cmd response: success
95,547 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,246 UART: cmd: 0x60000000
98,138 UART: dlen: 12
99,620 UART: buf: [67452301, efcdab89]
103,112 UART: buf: [33221100, 00000000]
106,505 >>> mbox cmd response: success
106,768 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,443 UART: cmd: 0x60000000
109,323 UART: dlen: 0
110,370 >>> mbox cmd response: success
110,628 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,307 UART: cmd: 0x70000000
112,898 >>> mbox cmd response: success
113,156 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,838 UART: cmd: 0x60000000
115,722 UART: dlen: 5
117,210 UART: buf: [04050607, 00000003]
120,695 >>> mbox cmd response: success
120,955 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,633 UART: cmd: 0x80000000
123,173 >>> mbox cmd response: failed
123,503 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,190 UART: cmd: 0x60000000
126,068 UART: dlen: 5
127,515 UART: buf: [04050607, 00000003]
131,002 >>> mbox cmd response: success
131,266 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,946 UART: cmd: 0x90000000
133,826 UART: dlen: 8
135,268 UART: buf: [08070605]
137,366 >>> mbox cmd response: success
137,628 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,303 UART: cmd: 0xa0000000
139,859 >>> mbox cmd response data (4 bytes)
140,264 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,962 UART: cmd: 0xb0000000
142,847 UART: dlen: 6
144,350 UART: buf: [0c0d0e0f, 00000a0b]
147,911 >>> mbox cmd response data (2 bytes)
148,282 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,965 UART: cmd: 0xc0000000
150,633 >>> mbox cmd response data (9 bytes)
151,022 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,706 UART: cmd: 0xd0000000
153,264 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,269 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,460 UART: cmd: 0x50000000
19,240 UART: dlen: 8
20,309 >>> mbox cmd response: success
20,746 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,629 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,333 UART: cmd: 0x50000000
29,224 UART: dlen: 7
30,285 >>> mbox cmd response: success
30,761 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,736 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,424 UART: cmd: 0x50000000
39,318 UART: dlen: 0
40,335 >>> mbox cmd response: success
40,757 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,028 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,731 UART: cmd: 0x50000001
50,402 UART: dlen: 5
51,052 >>> mbox cmd response: success
51,283 UART: buf: [01, 23, 45, 67, 89]
55,780 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,482 UART: cmd: 0x50000001
58,370 UART: dlen: 6
59,428 >>> mbox cmd response: success
59,901 UART: buf: [01, 23, 45, 67, 89]
64,507 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,232 UART: cmd: 0x50000001
67,121 UART: dlen: 9
68,183 >>> mbox cmd response: success
68,658 UART: buf: [01, 23, 45, 67, 89]
73,243 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,951 UART: cmd: 0x60000000
75,841 UART: dlen: 16
77,323 UART: buf: [67452301, efcdab89]
80,876 UART: buf: [33221100, 77665544]
84,036 >>> mbox cmd response: success
84,305 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,007 UART: cmd: 0x60000000
86,894 UART: dlen: 13
88,380 UART: buf: [67452301, efcdab89]
91,884 UART: buf: [33221100, 00000044]
95,267 >>> mbox cmd response: success
95,554 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,250 UART: cmd: 0x60000000
98,135 UART: dlen: 12
99,617 UART: buf: [67452301, efcdab89]
103,120 UART: buf: [33221100, 00000000]
106,492 >>> mbox cmd response: success
106,753 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,426 UART: cmd: 0x60000000
109,305 UART: dlen: 0
110,353 >>> mbox cmd response: success
110,612 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,287 UART: cmd: 0x70000000
112,878 >>> mbox cmd response: success
113,136 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,835 UART: cmd: 0x60000000
115,717 UART: dlen: 5
117,227 UART: buf: [04050607, 00000003]
120,719 >>> mbox cmd response: success
120,979 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,659 UART: cmd: 0x80000000
123,254 >>> mbox cmd response: failed
123,557 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,242 UART: cmd: 0x60000000
126,121 UART: dlen: 5
127,612 UART: buf: [04050607, 00000003]
131,130 >>> mbox cmd response: success
131,399 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,086 UART: cmd: 0x90000000
133,972 UART: dlen: 8
135,419 UART: buf: [08070605]
137,503 >>> mbox cmd response: success
137,765 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,456 UART: cmd: 0xa0000000
140,020 >>> mbox cmd response data (4 bytes)
140,413 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,108 UART: cmd: 0xb0000000
142,989 UART: dlen: 6
144,473 UART: buf: [0c0d0e0f, 00000a0b]
148,079 >>> mbox cmd response data (2 bytes)
148,461 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,143 UART: cmd: 0xc0000000
150,813 >>> mbox cmd response data (9 bytes)
151,200 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,881 UART: cmd: 0xd0000000
153,439 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,647 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,786 UART: cmd: 0x50000000
19,613 UART: dlen: 8
20,647 >>> mbox cmd response: success
21,145 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,073 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,797 UART: cmd: 0x50000000
29,656 UART: dlen: 7
30,748 >>> mbox cmd response: success
31,240 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,794 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,517 UART: cmd: 0x50000000
40,422 UART: dlen: 0
41,362 >>> mbox cmd response: success
41,854 UART: buf: [00000000, 00000000, 00000000, 00000000]
48,152 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,859 UART: cmd: 0x50000001
50,750 UART: dlen: 5
51,827 >>> mbox cmd response: success
52,305 UART: buf: [01, 23, 45, 67, 89]
56,885 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,591 UART: cmd: 0x50000001
59,476 UART: dlen: 6
60,525 >>> mbox cmd response: success
61,000 UART: buf: [01, 23, 45, 67, 89]
65,603 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,310 UART: cmd: 0x50000001
68,199 UART: dlen: 9
69,251 >>> mbox cmd response: success
69,728 UART: buf: [01, 23, 45, 67, 89]
74,306 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,016 UART: cmd: 0x60000000
76,906 UART: dlen: 16
78,385 UART: buf: [67452301, efcdab89]
81,952 UART: buf: [33221100, 77665544]
85,108 >>> mbox cmd response: success
85,378 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,083 UART: cmd: 0x60000000
88,024 UART: dlen: 13
89,456 UART: buf: [67452301, efcdab89]
93,002 UART: buf: [33221100, 00000044]
96,384 >>> mbox cmd response: success
96,656 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,353 UART: cmd: 0x60000000
99,236 UART: dlen: 12
100,726 UART: buf: [67452301, efcdab89]
104,221 UART: buf: [33221100, 00000000]
107,608 >>> mbox cmd response: success
107,876 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,555 UART: cmd: 0x60000000
110,457 UART: dlen: 0
111,509 >>> mbox cmd response: success
111,773 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,459 UART: cmd: 0x70000000
114,054 >>> mbox cmd response: success
114,321 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,008 UART: cmd: 0x60000000
116,887 UART: dlen: 5
118,403 UART: buf: [04050607, 00000003]
121,897 >>> mbox cmd response: success
122,167 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,894 UART: cmd: 0x80000000
124,489 >>> mbox cmd response: failed
124,798 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,489 UART: cmd: 0x60000000
127,371 UART: dlen: 5
128,836 UART: buf: [04050607, 00000003]
132,324 >>> mbox cmd response: success
132,584 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,269 UART: cmd: 0x90000000
135,150 UART: dlen: 8
136,596 UART: buf: [08070605]
138,689 >>> mbox cmd response: success
138,951 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,631 UART: cmd: 0xa0000000
141,197 >>> mbox cmd response data (4 bytes)
141,590 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,290 UART: cmd: 0xb0000000
144,176 UART: dlen: 6
145,661 UART: buf: [0c0d0e0f, 00000a0b]
149,229 >>> mbox cmd response data (2 bytes)
149,609 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,314 UART: cmd: 0xc0000000
151,989 >>> mbox cmd response data (9 bytes)
152,385 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,068 UART: cmd: 0xd0000000
154,631 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,665 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,800 UART: cmd: 0x50000000
19,804 UART: dlen: 8
20,670 >>> mbox cmd response: success
21,124 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,074 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,815 UART: cmd: 0x50000000
29,682 UART: dlen: 7
30,779 >>> mbox cmd response: success
31,227 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,260 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,979 UART: cmd: 0x50000000
39,867 UART: dlen: 0
40,909 >>> mbox cmd response: success
41,303 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,577 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,280 UART: cmd: 0x50000001
50,167 UART: dlen: 5
51,222 >>> mbox cmd response: success
51,700 UART: buf: [01, 23, 45, 67, 89]
56,299 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,002 UART: cmd: 0x50000001
58,892 UART: dlen: 6
59,944 >>> mbox cmd response: success
60,437 UART: buf: [01, 23, 45, 67, 89]
65,026 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,733 UART: cmd: 0x50000001
67,620 UART: dlen: 9
68,673 >>> mbox cmd response: success
69,150 UART: buf: [01, 23, 45, 67, 89]
73,737 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,449 UART: cmd: 0x60000000
76,342 UART: dlen: 16
77,824 UART: buf: [67452301, efcdab89]
81,380 UART: buf: [33221100, 77665544]
84,536 >>> mbox cmd response: success
84,803 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,505 UART: cmd: 0x60000000
87,446 UART: dlen: 13
88,876 UART: buf: [67452301, efcdab89]
92,393 UART: buf: [33221100, 00000044]
95,784 >>> mbox cmd response: success
96,053 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,753 UART: cmd: 0x60000000
98,668 UART: dlen: 12
100,114 UART: buf: [67452301, efcdab89]
103,615 UART: buf: [33221100, 00000000]
107,003 >>> mbox cmd response: success
107,280 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,962 UART: cmd: 0x60000000
109,847 UART: dlen: 0
110,902 >>> mbox cmd response: success
111,171 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,860 UART: cmd: 0x70000000
113,456 >>> mbox cmd response: success
113,718 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,429 UART: cmd: 0x60000000
116,315 UART: dlen: 5
117,807 UART: buf: [04050607, 00000003]
121,299 >>> mbox cmd response: success
121,562 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,247 UART: cmd: 0x80000000
123,846 >>> mbox cmd response: failed
124,151 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,838 UART: cmd: 0x60000000
126,722 UART: dlen: 5
128,165 UART: buf: [04050607, 00000003]
131,664 >>> mbox cmd response: success
131,929 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,618 UART: cmd: 0x90000000
134,502 UART: dlen: 8
135,948 UART: buf: [08070605]
138,061 >>> mbox cmd response: success
138,330 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,012 UART: cmd: 0xa0000000
140,578 >>> mbox cmd response data (4 bytes)
140,972 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,668 UART: cmd: 0xb0000000
143,554 UART: dlen: 6
145,047 UART: buf: [0c0d0e0f, 00000a0b]
148,617 >>> mbox cmd response data (2 bytes)
148,991 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,679 UART: cmd: 0xc0000000
151,352 >>> mbox cmd response data (9 bytes)
151,745 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,431 UART: cmd: 0xd0000000
153,998 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,369 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,503 UART: cmd: 0x50000000
19,356 UART: dlen: 8
20,375 >>> mbox cmd response: success
20,864 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,684 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,386 UART: cmd: 0x50000000
29,272 UART: dlen: 7
30,331 >>> mbox cmd response: success
30,806 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,810 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,497 UART: cmd: 0x50000000
39,402 UART: dlen: 0
40,398 >>> mbox cmd response: success
40,821 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,092 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,791 UART: cmd: 0x50000001
49,669 UART: dlen: 5
50,722 >>> mbox cmd response: success
51,193 UART: buf: [01, 23, 45, 67, 89]
55,819 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,516 UART: cmd: 0x50000001
58,397 UART: dlen: 6
59,441 >>> mbox cmd response: success
59,912 UART: buf: [01, 23, 45, 67, 89]
64,568 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,282 UART: cmd: 0x50000001
67,168 UART: dlen: 9
68,241 >>> mbox cmd response: success
68,713 UART: buf: [01, 23, 45, 67, 89]
73,294 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,001 UART: cmd: 0x60000000
75,884 UART: dlen: 16
77,414 UART: buf: [67452301, efcdab89]
80,966 UART: buf: [33221100, 77665544]
84,065 >>> mbox cmd response: success
84,328 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,026 UART: cmd: 0x60000000
86,963 UART: dlen: 13
88,438 UART: buf: [67452301, efcdab89]
91,924 UART: buf: [33221100, 00000044]
95,293 >>> mbox cmd response: success
95,557 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,248 UART: cmd: 0x60000000
98,152 UART: dlen: 12
99,631 UART: buf: [67452301, efcdab89]
103,121 UART: buf: [33221100, 00000000]
106,492 >>> mbox cmd response: success
106,755 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,427 UART: cmd: 0x60000000
109,301 UART: dlen: 0
110,348 >>> mbox cmd response: success
110,607 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,281 UART: cmd: 0x70000000
112,869 >>> mbox cmd response: success
113,124 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,805 UART: cmd: 0x60000000
115,678 UART: dlen: 5
117,215 UART: buf: [04050607, 00000003]
120,690 >>> mbox cmd response: success
120,972 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,652 UART: cmd: 0x80000000
123,247 >>> mbox cmd response: failed
123,556 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,242 UART: cmd: 0x60000000
126,118 UART: dlen: 5
127,609 UART: buf: [04050607, 00000003]
131,087 >>> mbox cmd response: success
131,347 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,028 UART: cmd: 0x90000000
133,906 UART: dlen: 8
135,345 UART: buf: [08070605]
137,429 >>> mbox cmd response: success
137,690 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,357 UART: cmd: 0xa0000000
139,916 >>> mbox cmd response data (4 bytes)
140,330 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,029 UART: cmd: 0xb0000000
142,912 UART: dlen: 6
144,417 UART: buf: [0c0d0e0f, 00000a0b]
147,971 >>> mbox cmd response data (2 bytes)
148,348 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,035 UART: cmd: 0xc0000000
150,708 >>> mbox cmd response data (9 bytes)
151,098 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,782 UART: cmd: 0xd0000000
153,341 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
3,254 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,411 UART: cmd: 0x50000000
19,239 UART: dlen: 8
20,309 >>> mbox cmd response: success
20,754 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,626 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,332 UART: cmd: 0x50000000
29,222 UART: dlen: 7
30,278 >>> mbox cmd response: success
30,758 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,760 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,446 UART: cmd: 0x50000000
39,329 UART: dlen: 0
40,332 >>> mbox cmd response: success
40,803 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,082 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,803 UART: cmd: 0x50000001
49,690 UART: dlen: 5
50,742 >>> mbox cmd response: success
51,213 UART: buf: [01, 23, 45, 67, 89]
55,841 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,540 UART: cmd: 0x50000001
58,419 UART: dlen: 6
59,469 >>> mbox cmd response: success
59,939 UART: buf: [01, 23, 45, 67, 89]
64,578 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,280 UART: cmd: 0x50000001
67,163 UART: dlen: 9
68,213 >>> mbox cmd response: success
68,685 UART: buf: [01, 23, 45, 67, 89]
73,309 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,016 UART: cmd: 0x60000000
75,919 UART: dlen: 16
77,403 UART: buf: [67452301, efcdab89]
80,947 UART: buf: [33221100, 77665544]
84,095 >>> mbox cmd response: success
84,364 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,060 UART: cmd: 0x60000000
86,944 UART: dlen: 13
89,272 UART: buf: [67452301, efcdab89]
91,949 UART: buf: [33221100, 00000044]
95,330 >>> mbox cmd response: success
95,602 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,295 UART: cmd: 0x60000000
98,179 UART: dlen: 12
99,662 UART: buf: [67452301, efcdab89]
103,158 UART: buf: [33221100, 00000000]
106,548 >>> mbox cmd response: success
106,835 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,512 UART: cmd: 0x60000000
109,394 UART: dlen: 0
110,441 >>> mbox cmd response: success
110,704 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,395 UART: cmd: 0x70000000
112,993 >>> mbox cmd response: success
113,248 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,928 UART: cmd: 0x60000000
115,804 UART: dlen: 5
117,344 UART: buf: [04050607, 00000003]
120,825 >>> mbox cmd response: success
121,085 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,766 UART: cmd: 0x80000000
123,358 >>> mbox cmd response: failed
123,663 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,367 UART: cmd: 0x60000000
126,248 UART: dlen: 5
127,747 UART: buf: [04050607, 00000003]
131,228 >>> mbox cmd response: success
131,489 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,170 UART: cmd: 0x90000000
134,046 UART: dlen: 8
135,487 UART: buf: [08070605]
137,569 >>> mbox cmd response: success
137,829 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,504 UART: cmd: 0xa0000000
140,058 >>> mbox cmd response data (4 bytes)
140,457 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,152 UART: cmd: 0xb0000000
143,030 UART: dlen: 6
144,515 UART: buf: [0c0d0e0f, 00000a0b]
148,089 >>> mbox cmd response data (2 bytes)
148,470 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,159 UART: cmd: 0xc0000000
150,822 >>> mbox cmd response data (9 bytes)
151,212 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,893 UART: cmd: 0xd0000000
153,452 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,715 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,853 UART: cmd: 0x50000000
19,670 UART: dlen: 8
20,717 >>> mbox cmd response: success
21,166 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,125 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,832 UART: cmd: 0x50000000
29,728 UART: dlen: 7
30,773 >>> mbox cmd response: success
31,255 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,274 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,976 UART: cmd: 0x50000000
39,853 UART: dlen: 0
40,826 >>> mbox cmd response: success
41,315 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,617 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,319 UART: cmd: 0x50000001
50,212 UART: dlen: 5
51,266 >>> mbox cmd response: success
51,738 UART: buf: [01, 23, 45, 67, 89]
56,412 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,122 UART: cmd: 0x50000001
59,023 UART: dlen: 6
60,038 >>> mbox cmd response: success
60,519 UART: buf: [01, 23, 45, 67, 89]
65,164 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,865 UART: cmd: 0x50000001
67,748 UART: dlen: 9
68,795 >>> mbox cmd response: success
69,269 UART: buf: [01, 23, 45, 67, 89]
73,853 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,578 UART: cmd: 0x60000000
76,469 UART: dlen: 16
77,947 UART: buf: [67452301, efcdab89]
81,497 UART: buf: [33221100, 77665544]
84,708 >>> mbox cmd response: success
84,980 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,676 UART: cmd: 0x60000000
87,618 UART: dlen: 13
89,050 UART: buf: [67452301, efcdab89]
92,556 UART: buf: [33221100, 00000044]
95,938 >>> mbox cmd response: success
96,203 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,894 UART: cmd: 0x60000000
98,780 UART: dlen: 12
100,260 UART: buf: [67452301, efcdab89]
103,761 UART: buf: [33221100, 00000000]
107,163 >>> mbox cmd response: success
107,425 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,099 UART: cmd: 0x60000000
109,991 UART: dlen: 0
111,038 >>> mbox cmd response: success
111,297 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,976 UART: cmd: 0x70000000
113,574 >>> mbox cmd response: success
113,842 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,523 UART: cmd: 0x60000000
116,400 UART: dlen: 5
117,886 UART: buf: [04050607, 00000003]
121,381 >>> mbox cmd response: success
121,643 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,318 UART: cmd: 0x80000000
123,916 >>> mbox cmd response: failed
124,244 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,928 UART: cmd: 0x60000000
126,811 UART: dlen: 5
128,252 UART: buf: [04050607, 00000003]
131,753 >>> mbox cmd response: success
132,012 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,702 UART: cmd: 0x90000000
134,596 UART: dlen: 8
136,060 UART: buf: [08070605]
138,102 >>> mbox cmd response: success
138,370 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,041 UART: cmd: 0xa0000000
140,608 >>> mbox cmd response data (4 bytes)
141,003 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,699 UART: cmd: 0xb0000000
143,582 UART: dlen: 6
145,083 UART: buf: [0c0d0e0f, 00000a0b]
148,656 >>> mbox cmd response data (2 bytes)
149,023 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,713 UART: cmd: 0xc0000000
151,385 >>> mbox cmd response data (9 bytes)
151,772 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,454 UART: cmd: 0xd0000000
154,016 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,722 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,898 UART: cmd: 0x50000000
19,666 UART: dlen: 8
20,735 >>> mbox cmd response: success
21,184 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,120 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,846 UART: cmd: 0x50000000
29,715 UART: dlen: 7
30,772 >>> mbox cmd response: success
31,260 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,354 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,060 UART: cmd: 0x50000000
39,960 UART: dlen: 0
40,920 >>> mbox cmd response: success
41,401 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,645 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,337 UART: cmd: 0x50000001
50,223 UART: dlen: 5
51,271 >>> mbox cmd response: success
51,743 UART: buf: [01, 23, 45, 67, 89]
56,379 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,075 UART: cmd: 0x50000001
58,964 UART: dlen: 6
60,013 >>> mbox cmd response: success
60,508 UART: buf: [01, 23, 45, 67, 89]
65,907 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
66,627 UART: cmd: 0x50000001
68,526 UART: dlen: 9
69,582 >>> mbox cmd response: success
70,058 UART: buf: [01, 23, 45, 67, 89]
74,645 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
75,351 UART: cmd: 0x60000000
77,232 UART: dlen: 16
78,710 UART: buf: [67452301, efcdab89]
82,261 UART: buf: [33221100, 77665544]
85,416 >>> mbox cmd response: success
85,675 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
86,371 UART: cmd: 0x60000000
88,304 UART: dlen: 13
89,784 UART: buf: [67452301, efcdab89]
93,292 UART: buf: [33221100, 00000044]
96,668 >>> mbox cmd response: success
96,933 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
97,625 UART: cmd: 0x60000000
99,520 UART: dlen: 12
101,001 UART: buf: [67452301, efcdab89]
104,496 UART: buf: [33221100, 00000000]
107,874 >>> mbox cmd response: success
108,130 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,800 UART: cmd: 0x60000000
110,678 UART: dlen: 0
111,720 >>> mbox cmd response: success
111,978 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
112,656 UART: cmd: 0x70000000
114,246 >>> mbox cmd response: success
114,503 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
115,205 UART: cmd: 0x60000000
117,090 UART: dlen: 5
118,575 UART: buf: [04050607, 00000003]
122,064 >>> mbox cmd response: success
122,328 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,006 UART: cmd: 0x80000000
124,550 >>> mbox cmd response: failed
124,852 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,533 UART: cmd: 0x60000000
127,412 UART: dlen: 5
128,910 UART: buf: [04050607, 00000003]
132,395 >>> mbox cmd response: success
132,652 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,333 UART: cmd: 0x90000000
135,209 UART: dlen: 8
136,700 UART: buf: [08070605]
138,750 >>> mbox cmd response: success
139,010 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,682 UART: cmd: 0xa0000000
141,241 >>> mbox cmd response data (4 bytes)
141,625 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,317 UART: cmd: 0xb0000000
144,198 UART: dlen: 6
145,709 UART: buf: [0c0d0e0f, 00000a0b]
149,243 >>> mbox cmd response data (2 bytes)
149,621 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,300 UART: cmd: 0xc0000000
151,977 >>> mbox cmd response data (9 bytes)
152,367 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,051 UART: cmd: 0xd0000000
154,617 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,193 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,366 UART: cmd: 0x50000000
19,191 UART: dlen: 8
20,221 >>> mbox cmd response: success
20,655 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,537 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,236 UART: cmd: 0x50000000
29,125 UART: dlen: 7
30,195 >>> mbox cmd response: success
30,669 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,634 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,323 UART: cmd: 0x50000000
39,208 UART: dlen: 0
40,205 >>> mbox cmd response: success
40,677 UART: buf: [00000000, 00000000, 00000000, 00000000]
46,946 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,642 UART: cmd: 0x50000001
49,543 UART: dlen: 5
50,591 >>> mbox cmd response: success
51,065 UART: buf: [01, 23, 45, 67, 89]
55,674 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,376 UART: cmd: 0x50000001
58,256 UART: dlen: 6
59,307 >>> mbox cmd response: success
59,779 UART: buf: [01, 23, 45, 67, 89]
64,407 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,106 UART: cmd: 0x50000001
66,988 UART: dlen: 9
68,039 >>> mbox cmd response: success
68,513 UART: buf: [01, 23, 45, 67, 89]
73,140 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,846 UART: cmd: 0x60000000
75,727 UART: dlen: 16
77,226 UART: buf: [67452301, efcdab89]
80,772 UART: buf: [33221100, 77665544]
83,922 >>> mbox cmd response: success
84,189 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,885 UART: cmd: 0x60000000
86,821 UART: dlen: 13
88,297 UART: buf: [67452301, efcdab89]
91,782 UART: buf: [33221100, 00000044]
95,201 >>> mbox cmd response: success
95,486 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,183 UART: cmd: 0x60000000
98,075 UART: dlen: 12
99,567 UART: buf: [67452301, efcdab89]
103,057 UART: buf: [33221100, 00000000]
106,427 >>> mbox cmd response: success
106,687 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,380 UART: cmd: 0x60000000
109,263 UART: dlen: 0
110,314 >>> mbox cmd response: success
110,575 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,254 UART: cmd: 0x70000000
112,847 >>> mbox cmd response: success
113,099 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,782 UART: cmd: 0x60000000
115,659 UART: dlen: 5
117,145 UART: buf: [04050607, 00000003]
120,678 >>> mbox cmd response: success
120,933 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,607 UART: cmd: 0x80000000
123,200 >>> mbox cmd response: failed
123,505 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,187 UART: cmd: 0x60000000
126,081 UART: dlen: 5
127,526 UART: buf: [04050607, 00000003]
131,003 >>> mbox cmd response: success
131,264 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
131,946 UART: cmd: 0x90000000
133,822 UART: dlen: 8
135,264 UART: buf: [08070605]
137,360 >>> mbox cmd response: success
137,624 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,295 UART: cmd: 0xa0000000
139,856 >>> mbox cmd response data (4 bytes)
140,253 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,943 UART: cmd: 0xb0000000
142,822 UART: dlen: 6
144,306 UART: buf: [0c0d0e0f, 00000a0b]
147,865 >>> mbox cmd response data (2 bytes)
148,259 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
148,941 UART: cmd: 0xc0000000
150,608 >>> mbox cmd response data (9 bytes)
151,002 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,686 UART: cmd: 0xd0000000
153,245 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,211 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,403 UART: cmd: 0x50000000
19,216 UART: dlen: 8
20,275 >>> mbox cmd response: success
20,712 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,596 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,306 UART: cmd: 0x50000000
29,200 UART: dlen: 7
30,270 >>> mbox cmd response: success
30,745 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
36,703 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,388 UART: cmd: 0x50000000
39,280 UART: dlen: 0
40,285 >>> mbox cmd response: success
40,707 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,021 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
47,729 UART: cmd: 0x50000001
49,625 UART: dlen: 5
50,677 >>> mbox cmd response: success
51,152 UART: buf: [01, 23, 45, 67, 89]
55,749 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,447 UART: cmd: 0x50000001
58,327 UART: dlen: 6
59,371 >>> mbox cmd response: success
59,846 UART: buf: [01, 23, 45, 67, 89]
64,484 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,184 UART: cmd: 0x50000001
67,074 UART: dlen: 9
68,130 >>> mbox cmd response: success
68,605 UART: buf: [01, 23, 45, 67, 89]
73,195 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
73,920 UART: cmd: 0x60000000
75,803 UART: dlen: 16
77,285 UART: buf: [67452301, efcdab89]
80,835 UART: buf: [33221100, 77665544]
83,991 >>> mbox cmd response: success
84,258 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
84,956 UART: cmd: 0x60000000
86,892 UART: dlen: 13
88,367 UART: buf: [67452301, efcdab89]
91,856 UART: buf: [33221100, 00000044]
95,256 >>> mbox cmd response: success
95,522 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,211 UART: cmd: 0x60000000
98,108 UART: dlen: 12
99,558 UART: buf: [67452301, efcdab89]
103,102 UART: buf: [33221100, 00000000]
106,495 >>> mbox cmd response: success
106,757 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,431 UART: cmd: 0x60000000
109,314 UART: dlen: 0
110,364 >>> mbox cmd response: success
110,625 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,300 UART: cmd: 0x70000000
112,895 >>> mbox cmd response: success
113,153 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
113,854 UART: cmd: 0x60000000
115,739 UART: dlen: 5
117,224 UART: buf: [04050607, 00000003]
120,716 >>> mbox cmd response: success
120,977 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
121,652 UART: cmd: 0x80000000
123,247 >>> mbox cmd response: failed
123,572 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,254 UART: cmd: 0x60000000
126,137 UART: dlen: 5
127,574 UART: buf: [04050607, 00000003]
131,069 >>> mbox cmd response: success
131,333 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,022 UART: cmd: 0x90000000
133,905 UART: dlen: 8
135,342 UART: buf: [08070605]
137,429 >>> mbox cmd response: success
137,688 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
138,357 UART: cmd: 0xa0000000
139,915 >>> mbox cmd response data (4 bytes)
140,308 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
140,997 UART: cmd: 0xb0000000
142,878 UART: dlen: 6
144,379 UART: buf: [0c0d0e0f, 00000a0b]
147,949 >>> mbox cmd response data (2 bytes)
148,322 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,001 UART: cmd: 0xc0000000
150,637 >>> mbox cmd response data (9 bytes)
151,033 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
151,717 UART: cmd: 0xd0000000
153,278 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,538 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,716 UART: cmd: 0x50000000
19,545 UART: dlen: 8
20,590 >>> mbox cmd response: success
21,033 UART: buf: [67452301, efcdab89, 00000000, 00000000]
26,981 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,703 UART: cmd: 0x50000000
29,551 UART: dlen: 7
30,631 >>> mbox cmd response: success
31,119 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,129 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
37,847 UART: cmd: 0x50000000
39,750 UART: dlen: 0
40,785 >>> mbox cmd response: success
41,170 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,537 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,253 UART: cmd: 0x50000001
50,150 UART: dlen: 5
51,210 >>> mbox cmd response: success
51,686 UART: buf: [01, 23, 45, 67, 89]
56,273 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
56,968 UART: cmd: 0x50000001
58,859 UART: dlen: 6
59,875 >>> mbox cmd response: success
60,386 UART: buf: [01, 23, 45, 67, 89]
64,960 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,660 UART: cmd: 0x50000001
67,569 UART: dlen: 9
68,586 >>> mbox cmd response: success
69,048 UART: buf: [01, 23, 45, 67, 89]
73,685 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,390 UART: cmd: 0x60000000
76,279 UART: dlen: 16
77,761 UART: buf: [67452301, efcdab89]
81,311 UART: buf: [33221100, 77665544]
84,468 >>> mbox cmd response: success
84,731 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,425 UART: cmd: 0x60000000
87,363 UART: dlen: 13
88,840 UART: buf: [67452301, efcdab89]
92,334 UART: buf: [33221100, 00000044]
95,715 >>> mbox cmd response: success
95,978 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,688 UART: cmd: 0x60000000
98,573 UART: dlen: 12
100,054 UART: buf: [67452301, efcdab89]
103,556 UART: buf: [33221100, 00000000]
106,937 >>> mbox cmd response: success
107,200 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
107,892 UART: cmd: 0x60000000
109,780 UART: dlen: 0
110,822 >>> mbox cmd response: success
111,085 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,768 UART: cmd: 0x70000000
113,315 >>> mbox cmd response: success
113,571 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,257 UART: cmd: 0x60000000
116,136 UART: dlen: 5
117,625 UART: buf: [04050607, 00000003]
121,132 >>> mbox cmd response: success
121,395 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
123,160 UART: cmd: 0x80000000
124,737 >>> mbox cmd response: failed
125,051 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
125,741 UART: cmd: 0x60000000
127,628 UART: dlen: 5
129,065 UART: buf: [04050607, 00000003]
132,569 >>> mbox cmd response: success
132,827 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
133,512 UART: cmd: 0x90000000
135,395 UART: dlen: 8
136,832 UART: buf: [08070605]
138,928 >>> mbox cmd response: success
139,189 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,862 UART: cmd: 0xa0000000
141,448 >>> mbox cmd response data (4 bytes)
141,848 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
142,541 UART: cmd: 0xb0000000
144,431 UART: dlen: 6
145,921 UART: buf: [0c0d0e0f, 00000a0b]
149,486 >>> mbox cmd response data (2 bytes)
149,855 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
150,539 UART: cmd: 0xc0000000
152,215 >>> mbox cmd response data (9 bytes)
152,602 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
153,281 UART: cmd: 0xd0000000
154,844 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,665 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
17,815 UART: cmd: 0x50000000
19,627 UART: dlen: 8
20,665 >>> mbox cmd response: success
21,163 UART: buf: [67452301, efcdab89, 00000000, 00000000]
27,075 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
27,805 UART: cmd: 0x50000000
29,677 UART: dlen: 7
30,744 >>> mbox cmd response: success
31,230 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
37,417 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
38,154 UART: cmd: 0x50000000
40,031 UART: dlen: 0
41,018 >>> mbox cmd response: success
41,499 UART: buf: [00000000, 00000000, 00000000, 00000000]
47,783 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
48,483 UART: cmd: 0x50000001
50,375 UART: dlen: 5
51,427 >>> mbox cmd response: success
51,899 UART: buf: [01, 23, 45, 67, 89]
56,497 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
57,196 UART: cmd: 0x50000001
59,083 UART: dlen: 6
60,136 >>> mbox cmd response: success
60,612 UART: buf: [01, 23, 45, 67, 89]
65,197 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
65,920 UART: cmd: 0x50000001
67,812 UART: dlen: 9
68,860 >>> mbox cmd response: success
69,334 UART: buf: [01, 23, 45, 67, 89]
73,922 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
74,627 UART: cmd: 0x60000000
76,517 UART: dlen: 16
78,000 UART: buf: [67452301, efcdab89]
81,564 UART: buf: [33221100, 77665544]
84,665 >>> mbox cmd response: success
84,929 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
85,626 UART: cmd: 0x60000000
87,519 UART: dlen: 13
89,000 UART: buf: [67452301, efcdab89]
92,510 UART: buf: [33221100, 00000044]
95,898 >>> mbox cmd response: success
96,184 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
96,882 UART: cmd: 0x60000000
98,768 UART: dlen: 12
100,250 UART: buf: [67452301, efcdab89]
103,759 UART: buf: [33221100, 00000000]
107,138 >>> mbox cmd response: success
107,401 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
108,076 UART: cmd: 0x60000000
109,963 UART: dlen: 0
111,007 >>> mbox cmd response: success
111,274 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
111,950 UART: cmd: 0x70000000
113,548 >>> mbox cmd response: success
113,803 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
114,487 UART: cmd: 0x60000000
116,389 UART: dlen: 5
117,862 UART: buf: [04050607, 00000003]
121,360 >>> mbox cmd response: success
121,632 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
122,312 UART: cmd: 0x80000000
123,857 >>> mbox cmd response: failed
124,158 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
124,842 UART: cmd: 0x60000000
126,725 UART: dlen: 5
128,219 UART: buf: [04050607, 00000003]
131,710 >>> mbox cmd response: success
131,971 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
132,655 UART: cmd: 0x90000000
134,537 UART: dlen: 8
135,983 UART: buf: [08070605]
138,074 >>> mbox cmd response: success
138,343 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
139,036 UART: cmd: 0xa0000000
140,605 >>> mbox cmd response data (4 bytes)
141,021 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
141,723 UART: cmd: 0xb0000000
143,605 UART: dlen: 6
145,089 UART: buf: [0c0d0e0f, 00000a0b]
148,661 >>> mbox cmd response data (2 bytes)
149,032 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
149,718 UART: cmd: 0xc0000000
151,392 >>> mbox cmd response data (9 bytes)
151,776 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
152,458 UART: cmd: 0xd0000000
154,018 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d4bf3d66428f6bf0aeb784a5d7275d6d18b18f332ac3046b4e858db7a59dc1b8e9dc105a3d0c27d10fc633309f15bbad",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (8 bytes) from SoC
2,340 UART: cmd: 0x50000000
3,042 UART: dlen: 8
3,397 >>> mbox cmd response: success
3,604 UART: buf: [67452301, efcdab89, 00000000, 00000000]
5,731 <<< Executing mbox cmd 0x50000000 (7 bytes) from SoC
5,958 UART: cmd: 0x50000000
6,660 UART: dlen: 7
7,039 >>> mbox cmd response: success
7,246 UART: buf: [67452301, 00cdab89, 00000000, 00000000]
9,406 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
9,633 UART: cmd: 0x50000000
10,335 UART: dlen: 0
10,675 >>> mbox cmd response: success
10,882 UART: buf: [00000000, 00000000, 00000000, 00000000]
13,151 <<< Executing mbox cmd 0x50000001 (5 bytes) from SoC
13,378 UART: cmd: 0x50000001
14,077 UART: dlen: 5
14,446 >>> mbox cmd response: success
14,654 UART: buf: [01, 23, 45, 67, 89]
16,260 <<< Executing mbox cmd 0x50000001 (6 bytes) from SoC
16,487 UART: cmd: 0x50000001
17,186 UART: dlen: 6
17,555 >>> mbox cmd response: success
17,763 UART: buf: [01, 23, 45, 67, 89]
19,369 <<< Executing mbox cmd 0x50000001 (9 bytes) from SoC
19,596 UART: cmd: 0x50000001
20,295 UART: dlen: 9
20,664 >>> mbox cmd response: success
20,872 UART: buf: [01, 23, 45, 67, 89]
22,478 <<< Executing mbox cmd 0x60000000 (16 bytes) from SoC
22,705 UART: cmd: 0x60000000
23,406 UART: dlen: 16
23,967 UART: buf: [67452301, efcdab89]
25,324 UART: buf: [33221100, 77665544]
26,431 >>> mbox cmd response: success
26,431 <<< Executing mbox cmd 0x60000000 (13 bytes) from SoC
26,641 UART: cmd: 0x60000000
27,342 UART: dlen: 13
27,903 UART: buf: [67452301, efcdab89]
29,260 UART: buf: [33221100, 00000044]
30,436 >>> mbox cmd response: success
30,436 <<< Executing mbox cmd 0x60000000 (12 bytes) from SoC
30,646 UART: cmd: 0x60000000
31,347 UART: dlen: 12
31,908 UART: buf: [67452301, efcdab89]
33,265 UART: buf: [33221100, 00000000]
34,449 >>> mbox cmd response: success
34,449 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
34,659 UART: cmd: 0x60000000
35,360 UART: dlen: 0
35,659 >>> mbox cmd response: success
35,659 <<< Executing mbox cmd 0x70000000 (4 bytes) from SoC
35,869 UART: cmd: 0x70000000
36,383 >>> mbox cmd response: success
36,383 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
36,590 UART: cmd: 0x60000000
37,291 UART: dlen: 5
37,845 UART: buf: [04050607, 00000003]
39,058 >>> mbox cmd response: success
39,058 <<< Executing mbox cmd 0x80000000 (4 bytes) from SoC
39,268 UART: cmd: 0x80000000
39,778 >>> mbox cmd response: failed
39,778 <<< Executing mbox cmd 0x60000000 (5 bytes) from SoC
39,986 UART: cmd: 0x60000000
40,687 UART: dlen: 5
41,241 UART: buf: [04050607, 00000003]
42,454 >>> mbox cmd response: success
42,454 <<< Executing mbox cmd 0x90000000 (8 bytes) from SoC
42,664 UART: cmd: 0x90000000
43,366 UART: dlen: 8
43,909 UART: buf: [08070605]
44,606 >>> mbox cmd response: success
44,606 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
44,816 UART: cmd: 0xa0000000
45,357 >>> mbox cmd response data (4 bytes)
45,358 <<< Executing mbox cmd 0xb0000000 (6 bytes) from SoC
45,567 UART: cmd: 0xb0000000
46,276 UART: dlen: 6
46,834 UART: buf: [0c0d0e0f, 00000a0b]
48,089 >>> mbox cmd response data (2 bytes)
48,090 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,300 UART: cmd: 0xc0000000
48,872 >>> mbox cmd response data (9 bytes)
48,873 <<< Executing mbox cmd 0xd0000000 (0 bytes) from SoC
49,080 UART: cmd: 0xd0000000
49,609 >>> mbox cmd response data (0 bytes)
test test_mailbox_soc_to_uc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,233 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "25c9150a6c90aa18611e62a8a20acab460e63d3613b742f2063e414aec72e83c72ae55c4ab5521e6eac7c85d5cbc5db5",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_mailbox_txn_drop ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,681 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b4f1b913ee8e52a0fc9c31c46d7162de87df7472f8913957261c988422727b786c498e0483d243fda60f66e60db00077",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_mailbox_uc_to_soc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,955 writing to cptra_bootfsm_go
23,521 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
22,316 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
22,869 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
22,960 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
22,673 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
22,504 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
22,822 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
22,802 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
22,550 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
22,423 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
22,957 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
22,812 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0f45d968d893adf7563cc87f95db78036ffecba323376c2cfc46caa0b880ded91bdbf3aa6f2aa7f3330c726995b00c98",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,046 UART: test_negative_lms::test_failures_lms_24...[ok]
* TESTCASE PASSED
test test_negative_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
12,035 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,366 UART: pcrbank::test_erase_all_pcrs...[ok]
21,517 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
11,582 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,886 UART: pcrbank::test_erase_all_pcrs...[ok]
20,977 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
12,003 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,350 UART: pcrbank::test_erase_all_pcrs...[ok]
21,482 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
11,941 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,307 UART: pcrbank::test_erase_all_pcrs...[ok]
21,397 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
11,874 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,236 UART: pcrbank::test_erase_all_pcrs...[ok]
21,371 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
11,656 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,024 UART: pcrbank::test_erase_all_pcrs...[ok]
21,108 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
12,055 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,307 UART: pcrbank::test_erase_all_pcrs...[ok]
21,445 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
11,926 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,255 UART: pcrbank::test_erase_all_pcrs...[ok]
21,375 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
11,743 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,037 UART: pcrbank::test_erase_all_pcrs...[ok]
21,187 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
11,569 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
16,912 UART: pcrbank::test_erase_all_pcrs...[ok]
21,071 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
12,089 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,389 UART: pcrbank::test_erase_all_pcrs...[ok]
21,506 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
11,919 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
17,235 UART: pcrbank::test_erase_all_pcrs...[ok]
21,373 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1d008443d44c6d252c90708f446968f555e430c4186aba32cee547ef623f2497965406f83e94da40d174c3c5165ff3e0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,393 UART: pcrbank::test_lock_and_erase_pcrs...[ok]
3,274 UART: pcrbank::test_erase_all_pcrs...[ok]
4,689 UART: pcrbank::test_write_protection_stickiness...[ok]
* TESTCASE PASSED
test test_pcrbank ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
11,482 UART: persistent::test_persistent_data_layout...[ok]
15,067 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
11,672 UART: persistent::test_persistent_data_layout...[ok]
14,904 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
11,823 UART: persistent::test_persistent_data_layout...[ok]
15,370 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
11,794 UART: persistent::test_persistent_data_layout...[ok]
15,345 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
11,798 UART: persistent::test_persistent_data_layout...[ok]
15,414 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
11,305 UART: persistent::test_persistent_data_layout...[ok]
14,880 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
11,804 UART: persistent::test_persistent_data_layout...[ok]
15,366 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
11,665 UART: persistent::test_persistent_data_layout...[ok]
15,243 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
11,543 UART: persistent::test_persistent_data_layout...[ok]
15,127 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
11,477 UART: persistent::test_persistent_data_layout...[ok]
15,068 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
11,920 UART: persistent::test_persistent_data_layout...[ok]
15,494 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
11,848 UART: persistent::test_persistent_data_layout...[ok]
15,392 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "220899317f16c44e9b837a320a2e239cf99f9fe0a14a1b84f29e0cdb150e8e0a4f6f7ce471a7c335cb0d3e00e5fe9f92",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,374 UART: persistent::test_persistent_data_layout...[ok]
2,569 UART: persistent::test_read_write...[ok]
* TESTCASE PASSED
test test_persistent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
22,379 UART: sha1::test_kat...[ok]
37,383 UART: sha1::test_digest0...[ok]
51,708 UART: sha1::test_digest1...[ok]
65,861 UART: sha1::test_digest2...[ok]
87,250 UART: sha1::test_digest3...[ok]
108,173 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
22,515 UART: sha1::test_kat...[ok]
37,036 UART: sha1::test_digest0...[ok]
49,682 UART: sha1::test_digest1...[ok]
63,840 UART: sha1::test_digest2...[ok]
86,251 UART: sha1::test_digest3...[ok]
108,751 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
22,557 UART: sha1::test_kat...[ok]
36,191 UART: sha1::test_digest0...[ok]
48,474 UART: sha1::test_digest1...[ok]
63,602 UART: sha1::test_digest2...[ok]
85,001 UART: sha1::test_digest3...[ok]
106,680 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
22,970 UART: sha1::test_kat...[ok]
36,648 UART: sha1::test_digest0...[ok]
50,473 UART: sha1::test_digest1...[ok]
64,628 UART: sha1::test_digest2...[ok]
87,249 UART: sha1::test_digest3...[ok]
108,812 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,996 writing to cptra_bootfsm_go
23,542 UART: sha1::test_kat...[ok]
37,300 UART: sha1::test_digest0...[ok]
50,145 UART: sha1::test_digest1...[ok]
63,324 UART: sha1::test_digest2...[ok]
85,220 UART: sha1::test_digest3...[ok]
108,293 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
22,851 UART: sha1::test_kat...[ok]
35,523 UART: sha1::test_digest0...[ok]
48,943 UART: sha1::test_digest1...[ok]
63,855 UART: sha1::test_digest2...[ok]
87,279 UART: sha1::test_digest3...[ok]
110,320 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
22,606 UART: sha1::test_kat...[ok]
36,766 UART: sha1::test_digest0...[ok]
49,443 UART: sha1::test_digest1...[ok]
61,602 UART: sha1::test_digest2...[ok]
85,465 UART: sha1::test_digest3...[ok]
105,872 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
22,789 UART: sha1::test_kat...[ok]
36,678 UART: sha1::test_digest0...[ok]
50,483 UART: sha1::test_digest1...[ok]
64,683 UART: sha1::test_digest2...[ok]
85,656 UART: sha1::test_digest3...[ok]
107,755 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
22,367 UART: sha1::test_kat...[ok]
35,385 UART: sha1::test_digest0...[ok]
47,887 UART: sha1::test_digest1...[ok]
61,337 UART: sha1::test_digest2...[ok]
83,622 UART: sha1::test_digest3...[ok]
106,119 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
22,316 UART: sha1::test_kat...[ok]
35,647 UART: sha1::test_digest0...[ok]
48,962 UART: sha1::test_digest1...[ok]
63,120 UART: sha1::test_digest2...[ok]
85,284 UART: sha1::test_digest3...[ok]
106,538 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
22,691 UART: sha1::test_kat...[ok]
35,849 UART: sha1::test_digest0...[ok]
48,453 UART: sha1::test_digest1...[ok]
63,507 UART: sha1::test_digest2...[ok]
85,721 UART: sha1::test_digest3...[ok]
107,255 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
22,639 UART: sha1::test_kat...[ok]
36,354 UART: sha1::test_digest0...[ok]
49,628 UART: sha1::test_digest1...[ok]
63,372 UART: sha1::test_digest2...[ok]
85,165 UART: sha1::test_digest3...[ok]
107,662 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8a6c0f06985ffb75a1a31d4d6105f2260660aa124ecba77d4c8f074890e3ccc64b72cc1bca41f46f7b366322cebe05f1",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,031 UART: sha1::test_kat...[ok]
7,881 UART: sha1::test_digest0...[ok]
12,940 UART: sha1::test_digest1...[ok]
18,035 UART: sha1::test_digest2...[ok]
26,832 UART: sha1::test_digest3...[ok]
35,659 UART: sha1::test_op1...[ok]
* TESTCASE PASSED
test test_sha1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
22,620 UART: sha256::test_kat...[ok]
27,004 UART: sha256::test_digest0...[ok]
31,459 UART: sha256::test_digest1...[ok]
35,897 UART: sha256::test_digest2...[ok]
41,367 UART: sha256::test_digest3...[ok]
46,790 UART: sha256::test_op0...[ok]
51,344 UART: sha256::test_op1...[ok]
55,905 UART: sha256::test_op2...[ok]
61,080 UART: sha256::test_op3...[ok]
69,914 UART: sha256::test_op4...[ok]
81,719 UART: sha256::test_op5...[ok]
64,969,393 UART: sha256::test_op6...[ok]
64,991,853 UART: sha256::test_op7...[ok]
65,007,875 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
21,966 UART: sha256::test_kat...[ok]
26,386 UART: sha256::test_digest0...[ok]
31,455 UART: sha256::test_digest1...[ok]
35,250 UART: sha256::test_digest2...[ok]
40,752 UART: sha256::test_digest3...[ok]
46,159 UART: sha256::test_op0...[ok]
50,724 UART: sha256::test_op1...[ok]
55,278 UART: sha256::test_op2...[ok]
60,429 UART: sha256::test_op3...[ok]
69,268 UART: sha256::test_op4...[ok]
81,087 UART: sha256::test_op5...[ok]
64,968,869 UART: sha256::test_op6...[ok]
64,991,190 UART: sha256::test_op7...[ok]
65,007,237 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
22,303 UART: sha256::test_kat...[ok]
26,722 UART: sha256::test_digest0...[ok]
31,163 UART: sha256::test_digest1...[ok]
35,632 UART: sha256::test_digest2...[ok]
41,095 UART: sha256::test_digest3...[ok]
46,513 UART: sha256::test_op0...[ok]
51,072 UART: sha256::test_op1...[ok]
55,590 UART: sha256::test_op2...[ok]
60,798 UART: sha256::test_op3...[ok]
69,631 UART: sha256::test_op4...[ok]
81,447 UART: sha256::test_op5...[ok]
64,969,223 UART: sha256::test_op6...[ok]
64,991,601 UART: sha256::test_op7...[ok]
65,007,576 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,825 writing to cptra_bootfsm_go
22,998 UART: sha256::test_kat...[ok]
27,406 UART: sha256::test_digest0...[ok]
31,871 UART: sha256::test_digest1...[ok]
36,329 UART: sha256::test_digest2...[ok]
41,767 UART: sha256::test_digest3...[ok]
47,214 UART: sha256::test_op0...[ok]
51,771 UART: sha256::test_op1...[ok]
56,337 UART: sha256::test_op2...[ok]
61,500 UART: sha256::test_op3...[ok]
70,321 UART: sha256::test_op4...[ok]
82,133 UART: sha256::test_op5...[ok]
64,969,865 UART: sha256::test_op6...[ok]
64,992,232 UART: sha256::test_op7...[ok]
65,008,296 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
21,992 UART: sha256::test_kat...[ok]
26,422 UART: sha256::test_digest0...[ok]
30,877 UART: sha256::test_digest1...[ok]
35,333 UART: sha256::test_digest2...[ok]
40,803 UART: sha256::test_digest3...[ok]
46,186 UART: sha256::test_op0...[ok]
50,741 UART: sha256::test_op1...[ok]
55,263 UART: sha256::test_op2...[ok]
60,507 UART: sha256::test_op3...[ok]
69,328 UART: sha256::test_op4...[ok]
81,111 UART: sha256::test_op5...[ok]
64,968,871 UART: sha256::test_op6...[ok]
64,991,219 UART: sha256::test_op7...[ok]
65,007,276 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
21,901 UART: sha256::test_kat...[ok]
26,344 UART: sha256::test_digest0...[ok]
30,770 UART: sha256::test_digest1...[ok]
35,213 UART: sha256::test_digest2...[ok]
40,686 UART: sha256::test_digest3...[ok]
46,079 UART: sha256::test_op0...[ok]
50,671 UART: sha256::test_op1...[ok]
55,212 UART: sha256::test_op2...[ok]
60,364 UART: sha256::test_op3...[ok]
69,196 UART: sha256::test_op4...[ok]
81,057 UART: sha256::test_op5...[ok]
64,968,767 UART: sha256::test_op6...[ok]
64,991,138 UART: sha256::test_op7...[ok]
65,007,125 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
22,201 UART: sha256::test_kat...[ok]
26,630 UART: sha256::test_digest0...[ok]
31,042 UART: sha256::test_digest1...[ok]
35,503 UART: sha256::test_digest2...[ok]
40,967 UART: sha256::test_digest3...[ok]
46,415 UART: sha256::test_op0...[ok]
50,946 UART: sha256::test_op1...[ok]
55,507 UART: sha256::test_op2...[ok]
60,677 UART: sha256::test_op3...[ok]
69,507 UART: sha256::test_op4...[ok]
81,298 UART: sha256::test_op5...[ok]
64,968,828 UART: sha256::test_op6...[ok]
64,991,472 UART: sha256::test_op7...[ok]
65,007,422 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
22,318 UART: sha256::test_kat...[ok]
26,771 UART: sha256::test_digest0...[ok]
31,217 UART: sha256::test_digest1...[ok]
35,631 UART: sha256::test_digest2...[ok]
41,132 UART: sha256::test_digest3...[ok]
46,851 UART: sha256::test_op0...[ok]
51,096 UART: sha256::test_op1...[ok]
55,641 UART: sha256::test_op2...[ok]
60,790 UART: sha256::test_op3...[ok]
69,653 UART: sha256::test_op4...[ok]
81,451 UART: sha256::test_op5...[ok]
64,969,139 UART: sha256::test_op6...[ok]
64,991,602 UART: sha256::test_op7...[ok]
65,007,577 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
21,989 UART: sha256::test_kat...[ok]
26,406 UART: sha256::test_digest0...[ok]
30,857 UART: sha256::test_digest1...[ok]
35,289 UART: sha256::test_digest2...[ok]
40,753 UART: sha256::test_digest3...[ok]
46,177 UART: sha256::test_op0...[ok]
50,739 UART: sha256::test_op1...[ok]
55,294 UART: sha256::test_op2...[ok]
60,447 UART: sha256::test_op3...[ok]
69,299 UART: sha256::test_op4...[ok]
81,104 UART: sha256::test_op5...[ok]
64,968,804 UART: sha256::test_op6...[ok]
64,991,237 UART: sha256::test_op7...[ok]
65,007,260 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
22,090 UART: sha256::test_kat...[ok]
26,511 UART: sha256::test_digest0...[ok]
30,942 UART: sha256::test_digest1...[ok]
35,375 UART: sha256::test_digest2...[ok]
40,843 UART: sha256::test_digest3...[ok]
46,264 UART: sha256::test_op0...[ok]
50,829 UART: sha256::test_op1...[ok]
55,384 UART: sha256::test_op2...[ok]
60,538 UART: sha256::test_op3...[ok]
69,408 UART: sha256::test_op4...[ok]
81,234 UART: sha256::test_op5...[ok]
64,968,923 UART: sha256::test_op6...[ok]
64,991,306 UART: sha256::test_op7...[ok]
65,007,354 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
22,100 UART: sha256::test_kat...[ok]
26,565 UART: sha256::test_digest0...[ok]
30,972 UART: sha256::test_digest1...[ok]
35,419 UART: sha256::test_digest2...[ok]
40,923 UART: sha256::test_digest3...[ok]
46,332 UART: sha256::test_op0...[ok]
50,871 UART: sha256::test_op1...[ok]
55,421 UART: sha256::test_op2...[ok]
60,584 UART: sha256::test_op3...[ok]
69,418 UART: sha256::test_op4...[ok]
81,228 UART: sha256::test_op5...[ok]
64,968,846 UART: sha256::test_op6...[ok]
64,991,426 UART: sha256::test_op7...[ok]
65,007,392 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
22,407 UART: sha256::test_kat...[ok]
26,826 UART: sha256::test_digest0...[ok]
31,303 UART: sha256::test_digest1...[ok]
35,734 UART: sha256::test_digest2...[ok]
41,188 UART: sha256::test_digest3...[ok]
46,603 UART: sha256::test_op0...[ok]
51,168 UART: sha256::test_op1...[ok]
55,720 UART: sha256::test_op2...[ok]
60,869 UART: sha256::test_op3...[ok]
69,727 UART: sha256::test_op4...[ok]
81,536 UART: sha256::test_op5...[ok]
64,969,335 UART: sha256::test_op6...[ok]
64,991,686 UART: sha256::test_op7...[ok]
65,007,640 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 6.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "d99d1411902d881ec37f91ce71b0f5a25a019074cd7e7d448e66e7a258e3bc690d56e014babfed00921bc52c529c73e9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,964 UART: sha256::test_kat...[ok]
5,566 UART: sha256::test_digest0...[ok]
8,271 UART: sha256::test_digest1...[ok]
10,990 UART: sha256::test_digest2...[ok]
15,023 UART: sha256::test_digest3...[ok]
18,975 UART: sha256::test_op0...[ok]
21,675 UART: sha256::test_op1...[ok]
24,375 UART: sha256::test_op2...[ok]
27,297 UART: sha256::test_op3...[ok]
32,276 UART: sha256::test_op4...[ok]
38,038 UART: sha256::test_op5...[ok]
33,696,241 UART: sha256::test_op6...[ok]
33,709,520 UART: sha256::test_op7...[ok]
33,717,505 UART: sha256::test_op8...[ok]
* TESTCASE PASSED
test test_sha256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
21,408 UART: sha2_512_384acc::test_kat...[ok]
26,365 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,326 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,113 UART: sha2_512_384acc::test_digest0...[ok]
1,071,383 UART: sha2_512_384acc::test_digest1...[ok]
1,079,314 UART: sha2_512_384acc::test_digest2...[ok]
1,087,360 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
21,344 UART: sha2_512_384acc::test_kat...[ok]
26,093 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,218 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,034 UART: sha2_512_384acc::test_digest0...[ok]
1,071,294 UART: sha2_512_384acc::test_digest1...[ok]
1,079,273 UART: sha2_512_384acc::test_digest2...[ok]
1,087,297 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
21,747 UART: sha2_512_384acc::test_kat...[ok]
26,481 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,660 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,443 UART: sha2_512_384acc::test_digest0...[ok]
1,071,723 UART: sha2_512_384acc::test_digest1...[ok]
1,079,702 UART: sha2_512_384acc::test_digest2...[ok]
1,087,681 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
21,797 UART: sha2_512_384acc::test_kat...[ok]
26,514 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,685 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,458 UART: sha2_512_384acc::test_digest0...[ok]
1,071,754 UART: sha2_512_384acc::test_digest1...[ok]
1,079,674 UART: sha2_512_384acc::test_digest2...[ok]
1,087,713 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
21,722 UART: sha2_512_384acc::test_kat...[ok]
26,431 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,572 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,411 UART: sha2_512_384acc::test_digest0...[ok]
1,071,646 UART: sha2_512_384acc::test_digest1...[ok]
1,079,619 UART: sha2_512_384acc::test_digest2...[ok]
1,087,664 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
21,437 UART: sha2_512_384acc::test_kat...[ok]
26,205 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,344 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,125 UART: sha2_512_384acc::test_digest0...[ok]
1,071,400 UART: sha2_512_384acc::test_digest1...[ok]
1,079,355 UART: sha2_512_384acc::test_digest2...[ok]
1,087,374 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,418 writing to cptra_bootfsm_go
21,876 UART: sha2_512_384acc::test_kat...[ok]
26,632 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,764 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,522 UART: sha2_512_384acc::test_digest0...[ok]
1,071,832 UART: sha2_512_384acc::test_digest1...[ok]
1,079,815 UART: sha2_512_384acc::test_digest2...[ok]
1,087,802 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
21,813 UART: sha2_512_384acc::test_kat...[ok]
26,503 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,653 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,424 UART: sha2_512_384acc::test_digest0...[ok]
1,071,720 UART: sha2_512_384acc::test_digest1...[ok]
1,079,691 UART: sha2_512_384acc::test_digest2...[ok]
1,087,725 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
21,344 UART: sha2_512_384acc::test_kat...[ok]
26,084 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,238 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,047 UART: sha2_512_384acc::test_digest0...[ok]
1,071,354 UART: sha2_512_384acc::test_digest1...[ok]
1,079,267 UART: sha2_512_384acc::test_digest2...[ok]
1,087,289 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
21,702 UART: sha2_512_384acc::test_kat...[ok]
26,462 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,604 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,393 UART: sha2_512_384acc::test_digest0...[ok]
1,071,678 UART: sha2_512_384acc::test_digest1...[ok]
1,079,586 UART: sha2_512_384acc::test_digest2...[ok]
1,087,626 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
21,569 UART: sha2_512_384acc::test_kat...[ok]
26,306 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,479 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,259 UART: sha2_512_384acc::test_digest0...[ok]
1,071,566 UART: sha2_512_384acc::test_digest1...[ok]
1,079,479 UART: sha2_512_384acc::test_digest2...[ok]
1,087,545 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
21,832 UART: sha2_512_384acc::test_kat...[ok]
26,598 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
1,056,717 UART: sha2_512_384acc::test_digest_offset...[ok]
1,064,489 UART: sha2_512_384acc::test_digest0...[ok]
1,071,785 UART: sha2_512_384acc::test_digest1...[ok]
1,079,764 UART: sha2_512_384acc::test_digest2...[ok]
1,087,742 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a800a0fbc19fa7c246f4b2d91a4663c719825ee2338c878419a294470083e651f3ec3dee40730312371a2039611971b7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
2,887 UART: sha2_512_384acc::test_kat...[ok]
5,447 UART: sha2_512_384acc::test_digest_max_mailbox_size...[ok]
108,529 UART: sha2_512_384acc::test_digest_offset...[ok]
113,193 UART: sha2_512_384acc::test_digest0...[ok]
117,756 UART: sha2_512_384acc::test_digest1...[ok]
122,437 UART: sha2_512_384acc::test_digest2...[ok]
127,159 UART: sha2_512_384acc::test_digest_zero_size_buffer...[ok]
* TESTCASE PASSED
test test_sha2_512_384acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
24,568 UART: sha384::test_kat...[ok]
31,246 UART: sha384::test_digest0...[ok]
41,039 UART: sha384::test_digest1...[ok]
49,981 UART: sha384::test_digest2...[ok]
59,565 UART: sha384::test_digest3...[ok]
71,754 UART: sha384::test_op0...[ok]
78,650 UART: sha384::test_op1...[ok]
85,544 UART: sha384::test_op2...[ok]
93,338 UART: sha384::test_op3...[ok]
104,182 UART: sha384::test_op4...[ok]
120,184 UART: sha384::test_op5...[ok]
69,347,770 UART: sha384::test_op6...[ok]
69,378,719 UART: sha384::test_op7...[ok]
69,409,331 UART: sha384::test_op8...[ok]
69,438,815 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,457,092 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,734 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,393 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
24,560 UART: sha384::test_kat...[ok]
32,614 UART: sha384::test_digest0...[ok]
41,597 UART: sha384::test_digest1...[ok]
50,362 UART: sha384::test_digest2...[ok]
58,732 UART: sha384::test_digest3...[ok]
69,183 UART: sha384::test_op0...[ok]
76,147 UART: sha384::test_op1...[ok]
82,995 UART: sha384::test_op2...[ok]
90,807 UART: sha384::test_op3...[ok]
101,612 UART: sha384::test_op4...[ok]
117,617 UART: sha384::test_op5...[ok]
69,345,169 UART: sha384::test_op6...[ok]
69,376,183 UART: sha384::test_op7...[ok]
69,406,767 UART: sha384::test_op8...[ok]
69,436,252 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,517 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,179 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,836 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
24,674 UART: sha384::test_kat...[ok]
31,809 UART: sha384::test_digest0...[ok]
40,175 UART: sha384::test_digest1...[ok]
50,027 UART: sha384::test_digest2...[ok]
57,931 UART: sha384::test_digest3...[ok]
68,008 UART: sha384::test_op0...[ok]
74,911 UART: sha384::test_op1...[ok]
81,808 UART: sha384::test_op2...[ok]
89,625 UART: sha384::test_op3...[ok]
100,468 UART: sha384::test_op4...[ok]
116,448 UART: sha384::test_op5...[ok]
69,344,110 UART: sha384::test_op6...[ok]
69,374,968 UART: sha384::test_op7...[ok]
69,405,612 UART: sha384::test_op8...[ok]
69,435,020 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,453,339 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,468,993 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,484,665 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
24,734 UART: sha384::test_kat...[ok]
31,648 UART: sha384::test_digest0...[ok]
39,854 UART: sha384::test_digest1...[ok]
49,050 UART: sha384::test_digest2...[ok]
58,702 UART: sha384::test_digest3...[ok]
69,912 UART: sha384::test_op0...[ok]
76,821 UART: sha384::test_op1...[ok]
83,687 UART: sha384::test_op2...[ok]
91,462 UART: sha384::test_op3...[ok]
102,292 UART: sha384::test_op4...[ok]
118,302 UART: sha384::test_op5...[ok]
69,345,839 UART: sha384::test_op6...[ok]
69,376,831 UART: sha384::test_op7...[ok]
69,407,475 UART: sha384::test_op8...[ok]
69,436,917 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,261 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,470,845 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,514 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
24,300 UART: sha384::test_kat...[ok]
31,200 UART: sha384::test_digest0...[ok]
40,076 UART: sha384::test_digest1...[ok]
47,564 UART: sha384::test_digest2...[ok]
55,062 UART: sha384::test_digest3...[ok]
66,389 UART: sha384::test_op0...[ok]
73,281 UART: sha384::test_op1...[ok]
80,238 UART: sha384::test_op2...[ok]
87,984 UART: sha384::test_op3...[ok]
98,810 UART: sha384::test_op4...[ok]
114,802 UART: sha384::test_op5...[ok]
69,342,494 UART: sha384::test_op6...[ok]
69,373,361 UART: sha384::test_op7...[ok]
69,403,956 UART: sha384::test_op8...[ok]
69,433,443 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,451,743 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,467,398 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,483,035 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
24,391 UART: sha384::test_kat...[ok]
33,467 UART: sha384::test_digest0...[ok]
43,077 UART: sha384::test_digest1...[ok]
51,667 UART: sha384::test_digest2...[ok]
61,145 UART: sha384::test_digest3...[ok]
71,568 UART: sha384::test_op0...[ok]
78,501 UART: sha384::test_op1...[ok]
85,390 UART: sha384::test_op2...[ok]
93,224 UART: sha384::test_op3...[ok]
104,013 UART: sha384::test_op4...[ok]
120,021 UART: sha384::test_op5...[ok]
69,347,563 UART: sha384::test_op6...[ok]
69,378,521 UART: sha384::test_op7...[ok]
69,409,210 UART: sha384::test_op8...[ok]
69,438,601 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,972 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,557 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,488,218 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
24,700 UART: sha384::test_kat...[ok]
32,600 UART: sha384::test_digest0...[ok]
41,186 UART: sha384::test_digest1...[ok]
50,303 UART: sha384::test_digest2...[ok]
58,525 UART: sha384::test_digest3...[ok]
71,030 UART: sha384::test_op0...[ok]
77,930 UART: sha384::test_op1...[ok]
84,822 UART: sha384::test_op2...[ok]
92,619 UART: sha384::test_op3...[ok]
103,448 UART: sha384::test_op4...[ok]
119,455 UART: sha384::test_op5...[ok]
69,347,114 UART: sha384::test_op6...[ok]
69,378,019 UART: sha384::test_op7...[ok]
69,408,656 UART: sha384::test_op8...[ok]
69,438,087 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,372 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,019 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,691 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
13,873 writing to cptra_bootfsm_go
35,297 UART: sha384::test_kat...[ok]
43,491 UART: sha384::test_digest0...[ok]
52,553 UART: sha384::test_digest1...[ok]
61,001 UART: sha384::test_digest2...[ok]
69,796 UART: sha384::test_digest3...[ok]
80,164 UART: sha384::test_op0...[ok]
87,059 UART: sha384::test_op1...[ok]
93,973 UART: sha384::test_op2...[ok]
101,762 UART: sha384::test_op3...[ok]
112,589 UART: sha384::test_op4...[ok]
128,590 UART: sha384::test_op5...[ok]
69,356,097 UART: sha384::test_op6...[ok]
69,387,125 UART: sha384::test_op7...[ok]
69,417,734 UART: sha384::test_op8...[ok]
69,447,202 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,465,520 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,481,151 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,496,810 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
24,384 UART: sha384::test_kat...[ok]
33,615 UART: sha384::test_digest0...[ok]
41,084 UART: sha384::test_digest1...[ok]
50,494 UART: sha384::test_digest2...[ok]
60,408 UART: sha384::test_digest3...[ok]
72,794 UART: sha384::test_op0...[ok]
79,730 UART: sha384::test_op1...[ok]
86,624 UART: sha384::test_op2...[ok]
94,419 UART: sha384::test_op3...[ok]
105,218 UART: sha384::test_op4...[ok]
121,286 UART: sha384::test_op5...[ok]
69,348,753 UART: sha384::test_op6...[ok]
69,379,738 UART: sha384::test_op7...[ok]
69,410,434 UART: sha384::test_op8...[ok]
69,439,862 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,458,175 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,473,833 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,489,461 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
24,396 UART: sha384::test_kat...[ok]
32,180 UART: sha384::test_digest0...[ok]
41,547 UART: sha384::test_digest1...[ok]
50,210 UART: sha384::test_digest2...[ok]
59,787 UART: sha384::test_digest3...[ok]
70,011 UART: sha384::test_op0...[ok]
76,910 UART: sha384::test_op1...[ok]
83,817 UART: sha384::test_op2...[ok]
91,604 UART: sha384::test_op3...[ok]
102,431 UART: sha384::test_op4...[ok]
118,478 UART: sha384::test_op5...[ok]
69,345,988 UART: sha384::test_op6...[ok]
69,376,963 UART: sha384::test_op7...[ok]
69,407,566 UART: sha384::test_op8...[ok]
69,437,036 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,455,344 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,471,024 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,486,684 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
24,885 UART: sha384::test_kat...[ok]
33,348 UART: sha384::test_digest0...[ok]
41,715 UART: sha384::test_digest1...[ok]
50,190 UART: sha384::test_digest2...[ok]
60,136 UART: sha384::test_digest3...[ok]
71,092 UART: sha384::test_op0...[ok]
77,989 UART: sha384::test_op1...[ok]
84,909 UART: sha384::test_op2...[ok]
92,684 UART: sha384::test_op3...[ok]
103,534 UART: sha384::test_op4...[ok]
119,535 UART: sha384::test_op5...[ok]
69,347,164 UART: sha384::test_op6...[ok]
69,378,079 UART: sha384::test_op7...[ok]
69,408,658 UART: sha384::test_op8...[ok]
69,438,136 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,456,465 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,472,110 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,487,731 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
24,786 UART: sha384::test_kat...[ok]
33,470 UART: sha384::test_digest0...[ok]
41,561 UART: sha384::test_digest1...[ok]
49,992 UART: sha384::test_digest2...[ok]
58,252 UART: sha384::test_digest3...[ok]
68,901 UART: sha384::test_op0...[ok]
75,793 UART: sha384::test_op1...[ok]
82,761 UART: sha384::test_op2...[ok]
90,530 UART: sha384::test_op3...[ok]
101,335 UART: sha384::test_op4...[ok]
117,338 UART: sha384::test_op5...[ok]
69,344,961 UART: sha384::test_op6...[ok]
69,375,834 UART: sha384::test_op7...[ok]
69,406,491 UART: sha384::test_op8...[ok]
69,435,902 UART: sha384::test_pcr_hash_extend_single_block...[ok]
69,454,290 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
69,469,876 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
69,485,545 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 5.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 4.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "db5ef10e7180a17605a2b10c6eb341aa1b060f2ea111f4a09d0f94ef9cecedefc728161dd944ab48de3e57478fc78f54",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
3,343 UART: sha384::test_kat...[ok]
6,521 UART: sha384::test_digest0...[ok]
10,030 UART: sha384::test_digest1...[ok]
13,576 UART: sha384::test_digest2...[ok]
17,269 UART: sha384::test_digest3...[ok]
22,709 UART: sha384::test_op0...[ok]
25,949 UART: sha384::test_op1...[ok]
29,189 UART: sha384::test_op2...[ok]
32,734 UART: sha384::test_op3...[ok]
37,088 UART: sha384::test_op4...[ok]
43,857 UART: sha384::test_op5...[ok]
26,458,797 UART: sha384::test_op6...[ok]
26,471,641 UART: sha384::test_op7...[ok]
26,484,351 UART: sha384::test_op8...[ok]
26,496,238 UART: sha384::test_pcr_hash_extend_single_block...[ok]
26,504,796 UART: sha384::test_pcr_hash_extend_single_block_2...[ok]
26,511,982 UART: sha384::test_pcr_hash_extend_single_block_3...[ok]
26,519,182 UART: sha384::test_pcr_hash_extend_limit...[ok]
* TESTCASE PASSED
test test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
13,737 UART: status_reporter::test_report_boot_status...[ok]
18,921 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,608 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
13,655 UART: status_reporter::test_report_boot_status...[ok]
17,526 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,557 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
14,059 UART: status_reporter::test_report_boot_status...[ok]
17,847 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,934 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
14,049 UART: status_reporter::test_report_boot_status...[ok]
17,862 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,951 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
13,994 UART: status_reporter::test_report_boot_status...[ok]
17,827 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,865 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,850 writing to cptra_bootfsm_go
13,685 UART: status_reporter::test_report_boot_status...[ok]
17,482 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,573 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
14,192 UART: status_reporter::test_report_boot_status...[ok]
17,977 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,322 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
14,091 UART: status_reporter::test_report_boot_status...[ok]
17,920 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,994 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,526 writing to cptra_bootfsm_go
14,527 UART: status_reporter::test_report_boot_status...[ok]
18,374 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,392 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
14,106 UART: status_reporter::test_report_boot_status...[ok]
17,925 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,947 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
14,092 UART: status_reporter::test_report_boot_status...[ok]
17,953 UART: status_reporter::test_report_idevid_csr_ready...[ok]
22,022 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
14,086 UART: status_reporter::test_report_boot_status...[ok]
17,904 UART: status_reporter::test_report_idevid_csr_ready...[ok]
21,951 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4d6a92ffe35027f60f0d368fbd39b58d7474c902da8ab92e45275fea61316acf6292423b7c95ca68023faaf87b00771",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,734 UART: status_reporter::test_report_boot_status...[ok]
2,966 UART: status_reporter::test_report_idevid_csr_ready...[ok]
4,255 UART: status_reporter::test_report_ready_for_firmware...[ok]
* TESTCASE PASSED
test test_status_reporter ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
3,261 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,543 >>> mbox cmd response data (48 bytes)
18,263 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,985 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,821 writing to cptra_bootfsm_go
3,247 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,540 >>> mbox cmd response data (48 bytes)
18,190 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,017 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,583 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,038 >>> mbox cmd response data (48 bytes)
17,699 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,362 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,351 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,724 >>> mbox cmd response data (48 bytes)
18,392 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
39,774 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,537 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
17,527 >>> mbox cmd response data (48 bytes)
18,184 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
38,897 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,373 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
15,927 >>> mbox cmd response data (48 bytes)
16,598 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
37,319 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,735 >>> mbox cmd response data (48 bytes)
1,736 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,968 >>> mbox cmd response data (48 bytes)
test test_trng_in_etrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,622 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,916 >>> mbox cmd response data (48 bytes)
424,687 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,874 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
3,636 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,895 >>> mbox cmd response data (48 bytes)
424,674 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,878 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,655 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,783 >>> mbox cmd response data (48 bytes)
424,561 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,733 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,455 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,692 >>> mbox cmd response data (48 bytes)
424,468 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,640 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,558 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,743 >>> mbox cmd response data (48 bytes)
424,509 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,685 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,643 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
423,903 >>> mbox cmd response data (48 bytes)
424,625 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
425,817 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "230a6a101b01e971d86436d915549382cec394b1f1286cc86b97f3a5d1d0e00a939dbf8928848f1675ebe3814b19d5f9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
1,890 >>> mbox cmd response data (48 bytes)
1,891 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
2,147 >>> mbox cmd response data (48 bytes)
test test_trng_in_itrng_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,616 writing to cptra_bootfsm_go
4,139 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
3,400 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,775 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,781 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,813 writing to cptra_bootfsm_go
3,394 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,752 writing to cptra_bootfsm_go
3,328 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,666 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,528 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,439 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,839 writing to cptra_bootfsm_go
3,412 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,608 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,619 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6e0d6e5a1ce5c4a91f9b3b14cc4d4b4b83ed806ba0447c59a51ecd25562c3d7d5f7e4f5265c559957d95436118fa9e97",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
51 UART: aaaaaahello* TESTCASE PASSED
test test_uart ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a519ddbcc79e176c9dfedf30616dbc353d0d11513284bd61f2e9afb4a2737b6f214b5069b28f0cbe002606019df4e376",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_uc_to_soc_error_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 29 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_clock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_increment_and_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_increment_too_far - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_increment_too_far' panicked at 'Cannot increment the current time by more than 9223372036854775807 clock cycles.', sw-emulator/lib/bus/src/clock.rs:280:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f8848000ed0`,
right: `0x7f8848000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fee9c000ed0`,
right: `0x7fee9c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4410000ed0`,
right: `0x7f4410000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fb81c000ed0`,
right: `0x7fb81c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7faad8000ed0`,
right: `0x7faad8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f11b8000ed0`,
right: `0x7f11b8000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fc114000ed0`,
right: `0x7fc114000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f38c4000ed0`,
right: `0x7f38c4000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f824c000ed0`,
right: `0x7f824c000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7ff044000ed0`,
right: `0x7ff044000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7fef84000ed0`,
right: `0x7fef84000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_mixup_timer_actions_on_cancel - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_mixup_timer_actions_on_cancel' panicked at 'assertion failed: `(left == right)`
left: `0x7f4898000ed0`,
right: `0x7f4898000cf0`: Supplied action was not created by this timer.', sw-emulator/lib/bus/src/clock.rs:313:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test clock::tests::test_schedule_too_far_in_future - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
stderr:
thread 'clock::tests::test_schedule_too_far_in_future' panicked at 'Cannot schedule a timer action more than 9223372036854775807 clock cycles from now.', sw-emulator/lib/bus/src/clock.rs:296:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_searchback_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_clock_wraparound ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test clock::tests::test_timer_schedule_with_clock_at_12327834 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_attach_dev ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test dynamic_bus::test::test_dynamic_bus_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_read_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_aligned_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_half_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mem::tests::test_write_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_bus_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test ram::tests::test_write_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_read_write_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u16_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u32_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_read_write_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_readonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_u8_writeonly_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register::tests::test_write_only_mem ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_bus_faults_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test register_array::tests::test_read_and_write_16bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_mmap_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test rom::tests::test_read_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test rom::tests::test_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.01s
running 1 test
test testing::fake_bus::tests::test_fake_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test testing::log::tests::test_clone ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 55 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_bus_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_pc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test cpu::tests::test_xreg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_only_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test csr_file::tests::test_read_write_masked_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::auipc::tests::test_auipc_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::auipc::tests::test_auipc_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_beq_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_beq_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bge_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bgeu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_blt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::branch::tests::test_bne_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jal::tests::test_jal_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::jalr::tests::test_jalr_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lbu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::load::tests::test_lw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::lui::tests::test_lui_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_add_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_and_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_div_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_divu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mul_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhsu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_28 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_29 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_30 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_31 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_33 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_mulhu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_or_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_rem_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_remu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sll_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_slt_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_38 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sltu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sra_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_19 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_20 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_21 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_22 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_23 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_40 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_41 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_42 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_43 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_srl_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_18 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_34 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_35 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_36 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_37 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_sub_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_26 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_27 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op::tests::test_xor_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_addi_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_andi_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_ori_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_slti_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_sltiu_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srai_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_12 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_16 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_17 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_24 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_25 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_srli_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_13 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_14 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::op_imm::tests::test_xori_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sb_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sh_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_10 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_11 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_7 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::store::tests::test_sw_9 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrci ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrs ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrsi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrw ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_csrrwi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ebreak ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_ecall ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test instr::system::tests::test_unknown_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test pic::tests::test_interrupt_priority_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.01s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_write_invalid_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test xreg_file::tests::test_x0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 603 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_1024bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_256bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test aes256cbc::tests::test_decrypt_384bit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_gen_key_pair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.02s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.07s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.06s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.05s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.04s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test ecc384::tests::test_verify_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.03s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test helpers::test::test_change_endianness_u8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha384_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha384_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test hmac512::tests::test_hmac_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test hmac512::tests::test_hmac_sha512_5 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
stderr:
thread 'hmac512::tests::test_hmac_sha512_5' panicked at 'key is larger than block size', sw-emulator/lib/crypto/src/hmac512.rs:107:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_127byte_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_finalize_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.01s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 28 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.02s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_derive_empty_bus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_mask_lsbs_contiguous ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_organize_fields_by_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test bus::tests::test_parse_peripheral_fields ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test bus::tests::test_parse_peripheral_fields_duplicate - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'bus::tests::test_parse_peripheral_fields_duplicate' panicked at 'More than one #[peripheral] attribute attached to field', sw-emulator/lib/derive/src/bus.rs:230:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_hex_literal_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_hex_u32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic1' panicked at 'Can't parse literal 0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic2' panicked at 'Can't parse literal 0o0 as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::literal::tests::test_parse_hex_u32_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::literal::tests::test_parse_hex_u32_panic3' panicked at 'Can't parse identifier foo as hex', sw-emulator/lib/derive/src/util/literal.rs:47:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::literal::tests::test_parse_usize ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::sort::tests::test_sorted_by_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic1' panicked at 'Expected group with delimiter 'Bracket', found group (35 , 42)', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_group_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_group_panic2' panicked at 'Expected group with delimiter 'Bracket', found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:109:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_ident_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic1' panicked at 'Expected identifier foo, found identifier bar', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic2 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic2' panicked at 'Expected identifier foo, found <none>', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_of_panic3 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_of_panic3' panicked at 'Expected identifier foo, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:52:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_ident_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_ident_panic1' panicked at 'Expected identifier, found literal 35', sw-emulator/lib/derive/src/util/token_iter.rs:64:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_literal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_literal_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_literal_panic1' panicked at 'Expected literal, found identifier foo', sw-emulator/lib/derive/src/util/token_iter.rs:73:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_expect_punct_of ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_expect_punct_of_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_expect_punct_of_panic1' panicked at 'Expected punctuation '.', found punctuation ','', sw-emulator/lib/derive/src/util/token_iter.rs:95:5
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_attribute_or_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_field_with_attributes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_group ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.01s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test util::token_iter::tests::test_skip_to_group_panic1 - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
stderr:
thread 'util::token_iter::tests::test_skip_to_group_panic1' panicked at 'Unexpected end of tokens while searching for group', sw-emulator/lib/derive/src/util/token_iter.rs:169:21
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test util::token_iter::tests::test_skip_to_struct ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 30 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_poll ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_read_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.01s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test test_write_dispatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.03s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.49s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.43s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.29s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.38s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.39s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.26s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.31s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_gen_key_kv_seed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.27s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.30s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.28s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.17s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.16s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.14s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_sign_kv_privkey_not_allowed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.04s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test asym_ecc384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_max_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_non_zero_first_byte ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::block_increment_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::ctr_drbg_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_nist_test_vector ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_single_word ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_two_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test csrng::ctr_drbg::tests::massage_seed_zero_words ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_clear_secrets ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_fe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test doe::tests::test_deobfuscate_uds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_sha256_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_error_if_w_is_not_valid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_is_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_by_default ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_mode_disabled_if_init_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha256::tests::test_wntz_params ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_block_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_control_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_hash_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_name_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_block_read_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_kv_hash_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha384_pcr_hash_extend_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_224 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_256 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_sha512_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_status_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hash_sha512::tests::test_version_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_from_words_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_bytes_swap_word_endian ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_be ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_words_from_bytes_le ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_control ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_exact_single_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_block_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_block_read_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_key_read_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_small_block_read ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_kv_tag_write_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_hmac_sha384_multi_block ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_name ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test hmac_sha384::tests::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_byte_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_locked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test iccm::tests::test_unlocked_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_clear_with_debug_values ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_read_write_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_private_write_blocked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_key_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_generic_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_nonsticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_lock_clear ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_pcr_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_dv_entry_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_ctrl_reset_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test key_vault::tests::test_sticky_lockable_scratch_read_write ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_send_receive_max_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyforcmd_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_arc_rdyfordata_unlock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test mailbox::tests::test_soc_to_caliptra_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_locked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test root_bus::tests::test_keyvault_init_val_in_debug_unlocked_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha384_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_2 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_3 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_4 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_5 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.02s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_mailbox_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.01s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_no_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_accelerator_sha512_stream_mode ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sha_acc_check_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test sha512_acc::tests::test_sm_lock ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_idev_id_csr_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_ldev_id_cert_download ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_secrets_when_debug_not_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_tb_services_cb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test soc_reg::tests::test_wdt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 135 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_breakpoint ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_environment_call ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_instr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_illegal_register ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_instr_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_load_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_access_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test exception::tests::test_store_addr_misaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_error_constants_uniqueness ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_try_from ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,180 UART:
192,534 UART: Running Caliptra ROM ...
193,722 UART:
193,865 UART: [state] CFI Enabled
262,824 UART: [state] LifecycleState = Unprovisioned
264,751 UART: [state] DebugLocked = No
267,068 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,216 UART: [kat] SHA2-256
441,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,410 UART: [kat] ++
452,883 UART: [kat] sha1
465,269 UART: [kat] SHA2-256
467,955 UART: [kat] SHA2-384
473,449 UART: [kat] SHA2-512-ACC
475,811 UART: [kat] ECC-384
2,767,136 UART: [kat] HMAC-384Kdf
2,798,919 UART: [kat] LMS
3,989,207 UART: [kat] --
3,992,540 UART: [cold-reset] ++
3,994,972 UART: [fht] Storing FHT @ 0x50003400
4,007,863 UART: [idev] ++
4,008,450 UART: [idev] CDI.KEYID = 6
4,009,368 UART: [idev] SUBJECT.KEYID = 7
4,010,613 UART: [idev] UDS.KEYID = 0
4,011,702 ready_for_fw is high
4,011,922 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,056,137 UART: [idev] Erasing UDS.KEYID = 0
7,346,524 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,751 UART: [idev] --
7,372,371 UART: [ldev] ++
7,372,937 UART: [ldev] CDI.KEYID = 6
7,373,947 UART: [ldev] SUBJECT.KEYID = 5
7,375,097 UART: [ldev] AUTHORITY.KEYID = 7
7,376,378 UART: [ldev] FE.KEYID = 1
7,421,530 UART: [ldev] Erasing FE.KEYID = 1
10,754,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,790 UART: [ldev] --
13,116,268 UART: [fwproc] Waiting for Commands...
13,119,002 UART: [fwproc] Received command 0x46574c44
13,121,182 UART: [fwproc] Received Image of size 34948 bytes
16,203,631 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,280,556 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,353,727 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,389,554 >>> mbox cmd response: success
16,394,614 UART: [afmc] ++
16,395,231 UART: [afmc] CDI.KEYID = 6
16,396,156 UART: [afmc] SUBJECT.KEYID = 7
16,397,410 UART: [afmc] AUTHORITY.KEYID = 5
19,772,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,071,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,073,842 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,088,264 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,102,985 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,117,404 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,138,248 UART: [afmc] --
22,142,192 UART: [cold-reset] --
22,147,291 UART: [state] Locking Datavault
22,151,197 UART: [state] Locking PCR0, PCR1 and PCR31
22,152,881 UART: [state] Locking ICCM
22,155,150 UART: [exit] Launching FMC @ 0x40000130
22,163,583 UART:
22,163,838 UART: Running Caliptra FMC ...
22,164,977 UART:
22,165,133 UART: [state] CFI Enabled
22,229,605 UART: [fht] FMC Alias Private Key: 7
24,570,325 UART: [art] Extend RT PCRs Done
24,571,609 UART: [art] Lock RT PCRs Done
24,573,280 UART: [art] Populate DV Done
24,578,528 UART: [fht] FMC Alias Private Key: 7
24,580,184 UART: [art] Derive CDI
24,580,948 UART: [art] Store in slot 0x4
24,638,815 UART: [art] Derive Key Pair
24,639,888 UART: [art] Store priv key in slot 0x5
27,932,178 UART: [art] Derive Key Pair - Done
27,945,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,234,750 UART: [art] Erasing AUTHORITY.KEYID = 7
30,236,305 UART: [art] PUB.X = FDC234A6B956400368006054B8C68CC995F35896A1E1A9A68D32EFCDAC10A53D1F2C5CAD6C9A764FAA6409E544769104
30,243,532 UART: [art] PUB.Y = 8D55E7F20E145BDBF74B8C8870574D48392EFFD1B22EB4BE39ED0CFCBB06AE93EDAD21AB4E105016BDD713A9D75CA236
30,250,764 UART: [art] SIG.R = 69ACDCB6985DDDF948BA6C1BA726254CB63C3F9A94CEF530F2C04E81B930862B0DF96BE9F2367C201D2F3C55D78F08D5
30,258,185 UART: [art] SIG.S = 2FB847BFA21C97A72AFE3B77B219742A4285798BF4D695DD4BE4FF0CEE20336FEF98845F8472FDB59155FFC308053937
31,562,823 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,780,970 ready_for_fw is high
3,781,368 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,241,313 >>> mbox cmd response: success
21,932,847 UART:
21,933,623 UART: Running Caliptra FMC ...
21,934,882 UART:
21,935,065 UART: [state] CFI Enabled
21,997,876 UART: [fht] FMC Alias Private Key: 7
24,338,229 UART: [art] Extend RT PCRs Done
24,339,499 UART: [art] Lock RT PCRs Done
24,341,303 UART: [art] Populate DV Done
24,346,907 UART: [fht] FMC Alias Private Key: 7
24,348,572 UART: [art] Derive CDI
24,349,426 UART: [art] Store in slot 0x4
24,406,379 UART: [art] Derive Key Pair
24,407,463 UART: [art] Store priv key in slot 0x5
27,700,522 UART: [art] Derive Key Pair - Done
27,713,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,002,403 UART: [art] Erasing AUTHORITY.KEYID = 7
30,003,982 UART: [art] PUB.X = 630F799D30432D69A7A9699989E38B4D2EFDF616F14174EEDF8CA751163A0AD61CC53988122BFDB8FE26419116362E0E
30,011,229 UART: [art] PUB.Y = 818AEA189BDAE8B7CCD012263BCFAB863491584346AA4BD44F36C49070CF3F574765F9A96A3F9A79C8DFD992005C5D63
30,018,392 UART: [art] SIG.R = EC05BFA8931310BD9C19C0715416F6F8C034A60C6FE1213F268BA1D9BB7C0D3C832D85045CC6D85D1912333E2687F59E
30,025,831 UART: [art] SIG.S = 7140B6A55CF5278D25B4456B93FB31AB286A24B49E59AD4BE61C933B1315AAA7B4516FA7FB4E928007AC251A9B83D77A
31,330,081 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,409 writing to cptra_bootfsm_go
193,665 UART:
194,025 UART: Running Caliptra ROM ...
195,125 UART:
604,854 UART: [state] CFI Enabled
622,053 UART: [state] LifecycleState = Unprovisioned
623,995 UART: [state] DebugLocked = No
625,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,262 UART: [kat] SHA2-256
801,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,513 UART: [kat] ++
811,954 UART: [kat] sha1
822,465 UART: [kat] SHA2-256
825,113 UART: [kat] SHA2-384
830,750 UART: [kat] SHA2-512-ACC
833,113 UART: [kat] ECC-384
3,115,676 UART: [kat] HMAC-384Kdf
3,127,777 UART: [kat] LMS
4,317,859 UART: [kat] --
4,324,151 UART: [cold-reset] ++
4,326,602 UART: [fht] Storing FHT @ 0x50003400
4,337,799 UART: [idev] ++
4,338,425 UART: [idev] CDI.KEYID = 6
4,339,317 UART: [idev] SUBJECT.KEYID = 7
4,340,559 UART: [idev] UDS.KEYID = 0
4,341,500 ready_for_fw is high
4,341,679 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,385,683 UART: [idev] Erasing UDS.KEYID = 0
7,628,426 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,843 UART: [idev] --
7,652,468 UART: [ldev] ++
7,653,032 UART: [ldev] CDI.KEYID = 6
7,653,997 UART: [ldev] SUBJECT.KEYID = 5
7,655,206 UART: [ldev] AUTHORITY.KEYID = 7
7,656,488 UART: [ldev] FE.KEYID = 1
7,669,287 UART: [ldev] Erasing FE.KEYID = 1
10,953,527 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,947 UART: [ldev] --
13,313,880 UART: [fwproc] Waiting for Commands...
13,316,290 UART: [fwproc] Received command 0x46574c44
13,318,459 UART: [fwproc] Received Image of size 34948 bytes
16,409,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,489,933 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,563,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,599,256 >>> mbox cmd response: success
16,603,141 UART: [afmc] ++
16,603,743 UART: [afmc] CDI.KEYID = 6
16,604,674 UART: [afmc] SUBJECT.KEYID = 7
16,605,933 UART: [afmc] AUTHORITY.KEYID = 5
19,924,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,218,614 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,220,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,235,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,250,054 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,264,437 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,285,669 UART: [afmc] --
22,290,066 UART: [cold-reset] --
22,293,644 UART: [state] Locking Datavault
22,298,097 UART: [state] Locking PCR0, PCR1 and PCR31
22,299,853 UART: [state] Locking ICCM
22,302,332 UART: [exit] Launching FMC @ 0x40000130
22,310,711 UART:
22,310,951 UART: Running Caliptra FMC ...
22,312,085 UART:
22,312,240 UART: [state] CFI Enabled
22,320,308 UART: [fht] FMC Alias Private Key: 7
24,659,609 UART: [art] Extend RT PCRs Done
24,660,896 UART: [art] Lock RT PCRs Done
24,662,838 UART: [art] Populate DV Done
24,668,156 UART: [fht] FMC Alias Private Key: 7
24,669,679 UART: [art] Derive CDI
24,670,440 UART: [art] Store in slot 0x4
24,713,091 UART: [art] Derive Key Pair
24,714,121 UART: [art] Store priv key in slot 0x5
27,955,871 UART: [art] Derive Key Pair - Done
27,968,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,249,081 UART: [art] Erasing AUTHORITY.KEYID = 7
30,250,639 UART: [art] PUB.X = 9CCA6EDB4056069016A86EFE5F180BE55F059E1FB4EF56BE30E77333F939F169854737225F0F34C60D4BEBF411BC09ED
30,257,881 UART: [art] PUB.Y = F25858279CA186A8527457BE10612830A2E1E4978E36D8D6CEB0281BBB54B6DE1340831604621EE0E475041C6975AC50
30,265,131 UART: [art] SIG.R = BB2B5363F34E0F5A8B3D5C014518100F9E58D5457D2BF8C03347D7E4B2B83DC4D2D786297B6D477BF3E27B4BF2BD16EB
30,272,472 UART: [art] SIG.S = BDD14A13A4F93C53CCBDDB898E4322B10801DAA3C6E9EC7B0919F5999430BCEBBC330CBCF9E4DFB352681691C3FBF35B
31,576,985 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,127,066 ready_for_fw is high
4,127,516 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,463,697 >>> mbox cmd response: success
22,103,711 UART:
22,104,109 UART: Running Caliptra FMC ...
22,105,285 UART:
22,105,435 UART: [state] CFI Enabled
22,113,142 UART: [fht] FMC Alias Private Key: 7
24,453,061 UART: [art] Extend RT PCRs Done
24,454,344 UART: [art] Lock RT PCRs Done
24,455,909 UART: [art] Populate DV Done
24,461,320 UART: [fht] FMC Alias Private Key: 7
24,462,849 UART: [art] Derive CDI
24,463,624 UART: [art] Store in slot 0x4
24,506,388 UART: [art] Derive Key Pair
24,507,436 UART: [art] Store priv key in slot 0x5
27,749,291 UART: [art] Derive Key Pair - Done
27,762,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,042,231 UART: [art] Erasing AUTHORITY.KEYID = 7
30,043,804 UART: [art] PUB.X = 22F52FFA93D9C7729D8DCFB868E8D68D76B83673980CE0357C9167C152FA370D66D3358797C20F4579489E7B3304E8D5
30,051,008 UART: [art] PUB.Y = 0A64C21096B433C1D8946EE6CBD77D36A7B13C8FA51A6F4DA2ACDA008D9356854E162D87AABB807A43C316EE6D10EC3E
30,058,190 UART: [art] SIG.R = 1933889ADF675C59FDABA24C74981BA8D381C0829523108E503BFEFED84F18D3E0A3AE5F5568B0957F601D0A01D6C819
30,065,633 UART: [art] SIG.S = 5344EB1ED5B846FB02EAB0F9DDD059DFA44EA323B8E7FFB6A547D626D8FDFAE2A0974DE2CFD086C37E274C8347BF448F
31,370,815 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,789 writing to cptra_bootfsm_go
192,991 UART:
193,353 UART: Running Caliptra ROM ...
194,534 UART:
194,689 UART: [state] CFI Enabled
261,924 UART: [state] LifecycleState = Unprovisioned
263,862 UART: [state] DebugLocked = No
265,334 UART: [state] WD Timer not started. Device not locked for debugging
269,174 UART: [kat] SHA2-256
448,798 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,579 UART: [kat] ++
460,036 UART: [kat] sha1
471,193 UART: [kat] SHA2-256
473,844 UART: [kat] SHA2-384
479,899 UART: [kat] SHA2-512-ACC
482,261 UART: [kat] ECC-384
2,947,870 UART: [kat] HMAC-384Kdf
2,972,243 UART: [kat] LMS
3,448,738 UART: [kat] --
3,453,938 UART: [cold-reset] ++
3,455,299 UART: [fht] FHT @ 0x50003400
3,465,992 UART: [idev] ++
3,466,584 UART: [idev] CDI.KEYID = 6
3,467,497 UART: [idev] SUBJECT.KEYID = 7
3,468,742 UART: [idev] UDS.KEYID = 0
3,469,662 ready_for_fw is high
3,469,872 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,514,036 UART: [idev] Erasing UDS.KEYID = 0
5,984,843 UART: [idev] Sha1 KeyId Algorithm
6,008,309 UART: [idev] --
6,013,262 UART: [ldev] ++
6,013,840 UART: [ldev] CDI.KEYID = 6
6,014,751 UART: [ldev] SUBJECT.KEYID = 5
6,015,965 UART: [ldev] AUTHORITY.KEYID = 7
6,017,195 UART: [ldev] FE.KEYID = 1
6,057,384 UART: [ldev] Erasing FE.KEYID = 1
8,563,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,969 UART: [ldev] --
10,372,720 UART: [fwproc] Wait for Commands...
10,374,324 UART: [fwproc] Recv command 0x46574c44
10,376,310 UART: [fwproc] Recv'd Img size: 34948 bytes
12,833,111 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,918,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,991,587 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,027,869 >>> mbox cmd response: success
13,031,916 UART: [afmc] ++
13,032,541 UART: [afmc] CDI.KEYID = 6
13,033,557 UART: [afmc] SUBJECT.KEYID = 7
13,034,702 UART: [afmc] AUTHORITY.KEYID = 5
15,574,962 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,315,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,317,620 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,333,391 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,349,436 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,365,078 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,389,599 UART: [afmc] --
17,393,601 UART: [cold-reset] --
17,397,214 UART: [state] Locking Datavault
17,404,157 UART: [state] Locking PCR0, PCR1 and PCR31
17,405,906 UART: [state] Locking ICCM
17,408,194 UART: [exit] Launching FMC @ 0x40000130
17,416,587 UART:
17,416,833 UART: Running Caliptra FMC ...
17,417,971 UART:
17,418,149 UART: [state] CFI Enabled
17,475,125 UART: [fht] FMC Alias Private Key: 7
19,241,744 UART: [art] Extend RT PCRs Done
19,243,010 UART: [art] Lock RT PCRs Done
19,244,819 UART: [art] Populate DV Done
19,250,415 UART: [fht] FMC Alias Private Key: 7
19,251,940 UART: [art] Derive CDI
19,252,732 UART: [art] Store in slot 0x4
19,308,102 UART: [art] Derive Key Pair
19,309,174 UART: [art] Store priv key in slot 0x5
21,772,334 UART: [art] Derive Key Pair - Done
21,785,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,497,627 UART: [art] Erasing AUTHORITY.KEYID = 7
23,499,184 UART: [art] PUB.X = 9759BCEC5E47BED3BA1E2E95615E3DEFBE34B33A4FF21A4498249B0DC191082A1E684410DE2242D75BD8499CBC342BF9
23,506,416 UART: [art] PUB.Y = EE80324154625C213E329A133C3911219E9C185C582C5C0A68B3E44FD8868DC4C2F7AFA61B773AC4C83087A449ECBA25
23,513,662 UART: [art] SIG.R = 7542FAD618743E367229DA00542A6C7FEC8DE7D1ADA8A33A0A1B197C99E72B7D87BD93188998E9CF5D8F6B6786842955
23,521,015 UART: [art] SIG.S = CBD753577B159B86C48F0462E191B5FAF7691438432208B2B738AD81FC8FB5834578B51F8ED852329DD5DB1B76C9111B
24,499,858 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,459,874 ready_for_fw is high
3,460,295 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,898,624 >>> mbox cmd response: success
17,195,483 UART:
17,195,858 UART: Running Caliptra FMC ...
17,197,133 UART:
17,197,310 UART: [state] CFI Enabled
17,261,850 UART: [fht] FMC Alias Private Key: 7
19,028,112 UART: [art] Extend RT PCRs Done
19,029,401 UART: [art] Lock RT PCRs Done
19,030,939 UART: [art] Populate DV Done
19,036,617 UART: [fht] FMC Alias Private Key: 7
19,038,302 UART: [art] Derive CDI
19,039,088 UART: [art] Store in slot 0x4
19,094,398 UART: [art] Derive Key Pair
19,095,524 UART: [art] Store priv key in slot 0x5
21,558,356 UART: [art] Derive Key Pair - Done
21,571,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,284,626 UART: [art] Erasing AUTHORITY.KEYID = 7
23,286,199 UART: [art] PUB.X = 9B035933998A93D23CF13568BC6753197FA6899FC4F24B0A252C5401D0EF44DBECC1CFDD562642137EB88805E6B1C23F
23,293,392 UART: [art] PUB.Y = C97D275BA33AFE09974D0EC2D0CBC682C96B434B5BA11809A1EA8E31013923E519CC8B383A4232A244B7A36EEA188E85
23,300,660 UART: [art] SIG.R = 875BC762D4EC8232501D7221A020637DC8C7E203A8700C2304671D13820FA3687342FF63149E64E8FC0FB933A7DEA3DC
23,307,995 UART: [art] SIG.S = 749A455D6AC4629850FC81582470CC4DEDD0D40C52ED06E23EAC6953E21883A91E66CE4AA79397F11EBAD84991DB8842
24,285,693 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,473 UART:
192,828 UART: Running Caliptra ROM ...
194,007 UART:
603,550 UART: [state] CFI Enabled
616,240 UART: [state] LifecycleState = Unprovisioned
618,193 UART: [state] DebugLocked = No
619,801 UART: [state] WD Timer not started. Device not locked for debugging
624,276 UART: [kat] SHA2-256
803,941 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,724 UART: [kat] ++
815,209 UART: [kat] sha1
825,088 UART: [kat] SHA2-256
827,810 UART: [kat] SHA2-384
832,965 UART: [kat] SHA2-512-ACC
835,329 UART: [kat] ECC-384
3,276,978 UART: [kat] HMAC-384Kdf
3,289,638 UART: [kat] LMS
3,766,069 UART: [kat] --
3,771,131 UART: [cold-reset] ++
3,772,707 UART: [fht] FHT @ 0x50003400
3,784,608 UART: [idev] ++
3,785,167 UART: [idev] CDI.KEYID = 6
3,786,193 UART: [idev] SUBJECT.KEYID = 7
3,787,364 UART: [idev] UDS.KEYID = 0
3,788,406 ready_for_fw is high
3,788,600 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,832,796 UART: [idev] Erasing UDS.KEYID = 0
6,270,890 UART: [idev] Sha1 KeyId Algorithm
6,293,371 UART: [idev] --
6,297,928 UART: [ldev] ++
6,298,552 UART: [ldev] CDI.KEYID = 6
6,299,637 UART: [ldev] SUBJECT.KEYID = 5
6,300,761 UART: [ldev] AUTHORITY.KEYID = 7
6,301,939 UART: [ldev] FE.KEYID = 1
6,312,799 UART: [ldev] Erasing FE.KEYID = 1
8,793,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,169 UART: [ldev] --
10,589,399 UART: [fwproc] Wait for Commands...
10,591,386 UART: [fwproc] Recv command 0x46574c44
10,593,422 UART: [fwproc] Recv'd Img size: 34948 bytes
13,048,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,136,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,209,110 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,244,848 >>> mbox cmd response: success
13,249,120 UART: [afmc] ++
13,249,731 UART: [afmc] CDI.KEYID = 6
13,250,678 UART: [afmc] SUBJECT.KEYID = 7
13,251,944 UART: [afmc] AUTHORITY.KEYID = 5
15,753,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,476,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,478,518 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,494,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,510,473 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,526,060 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,549,856 UART: [afmc] --
17,553,434 UART: [cold-reset] --
17,557,224 UART: [state] Locking Datavault
17,560,458 UART: [state] Locking PCR0, PCR1 and PCR31
17,562,218 UART: [state] Locking ICCM
17,564,190 UART: [exit] Launching FMC @ 0x40000130
17,572,557 UART:
17,572,811 UART: Running Caliptra FMC ...
17,573,865 UART:
17,574,013 UART: [state] CFI Enabled
17,582,267 UART: [fht] FMC Alias Private Key: 7
19,348,434 UART: [art] Extend RT PCRs Done
19,349,704 UART: [art] Lock RT PCRs Done
19,351,307 UART: [art] Populate DV Done
19,356,835 UART: [fht] FMC Alias Private Key: 7
19,358,568 UART: [art] Derive CDI
19,359,337 UART: [art] Store in slot 0x4
19,402,196 UART: [art] Derive Key Pair
19,403,226 UART: [art] Store priv key in slot 0x5
21,830,233 UART: [art] Derive Key Pair - Done
21,843,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,549,887 UART: [art] Erasing AUTHORITY.KEYID = 7
23,551,454 UART: [art] PUB.X = 2712EBD473A79482431554DEDCD8C83EAF2FFE9F975D95CC9D2D7E699440C76014C7BF8639EF587F31826E8DF422223A
23,558,617 UART: [art] PUB.Y = 54B55A254E9C4C657D9822667EDD6006FFE4CF95C7C9E68610491C0C495F51A19B3BE1DD27C3C2A35D4627FDE92D685B
23,565,972 UART: [art] SIG.R = 04DF1C1953BD2C8D64677C3123AE43CC1C4750DD84822DA8E9F92EE43278F5C8E727BD3DA6A693171965714D298CEF6B
23,573,344 UART: [art] SIG.S = EA49B097DA1554E9CC723E003EB2F52C1012C57544654521C42A1CF773A3039D781D46C40D8D2829CA4EF34231A6D1F4
24,550,992 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,781,814 ready_for_fw is high
3,782,362 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,112,893 >>> mbox cmd response: success
17,360,224 UART:
17,360,966 UART: Running Caliptra FMC ...
17,362,153 UART:
17,362,307 UART: [state] CFI Enabled
17,369,987 UART: [fht] FMC Alias Private Key: 7
19,135,510 UART: [art] Extend RT PCRs Done
19,136,805 UART: [art] Lock RT PCRs Done
19,138,465 UART: [art] Populate DV Done
19,143,742 UART: [fht] FMC Alias Private Key: 7
19,145,416 UART: [art] Derive CDI
19,146,193 UART: [art] Store in slot 0x4
19,189,240 UART: [art] Derive Key Pair
19,190,293 UART: [art] Store priv key in slot 0x5
21,617,132 UART: [art] Derive Key Pair - Done
21,629,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,336,517 UART: [art] Erasing AUTHORITY.KEYID = 7
23,338,081 UART: [art] PUB.X = A4121D838F3D2ECA388B13BF3D9DAA5E771099EB28886A8D8F2C06076E2B57348FD75552B5911F5AC70F99CF2C768209
23,345,291 UART: [art] PUB.Y = 6A8777325A979D71F0AC6B47BCB2C2E131B1D8E5C7F1D924E0C1A0DE31494267CF7CA42F4646C0D4660DACFC35E2D980
23,352,554 UART: [art] SIG.R = 22137C6608CB1576CBBE1FF0562B6AD8A38AF845215C825D51EC37A2E45C01E52E66A70A1A7AE5C7D5930D6C5FA499ED
23,359,995 UART: [art] SIG.S = 44B86F01D8289DCF447F932DD60EFA71AAEFC2E3F0ABE2BE1067D071E39370678CE3DBDEDE598814EF7BC6CDFF1B5E78
24,338,072 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
192,173 UART:
192,519 UART: Running Caliptra ROM ...
193,707 UART:
193,861 UART: [state] CFI Enabled
264,042 UART: [state] LifecycleState = Unprovisioned
266,461 UART: [state] DebugLocked = No
267,781 UART: [state] WD Timer not started. Device not locked for debugging
272,875 UART: [kat] SHA2-256
462,753 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,551 UART: [kat] ++
474,025 UART: [kat] sha1
486,252 UART: [kat] SHA2-256
489,259 UART: [kat] SHA2-384
495,244 UART: [kat] SHA2-512-ACC
497,819 UART: [kat] ECC-384
2,947,281 UART: [kat] HMAC-384Kdf
2,970,483 UART: [kat] LMS
3,502,274 UART: [kat] --
3,508,433 UART: [cold-reset] ++
3,509,866 UART: [fht] FHT @ 0x50003400
3,520,926 UART: [idev] ++
3,521,637 UART: [idev] CDI.KEYID = 6
3,522,670 UART: [idev] SUBJECT.KEYID = 7
3,523,774 UART: [idev] UDS.KEYID = 0
3,524,717 ready_for_fw is high
3,524,929 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,569,127 UART: [idev] Erasing UDS.KEYID = 0
6,025,532 UART: [idev] Sha1 KeyId Algorithm
6,048,144 UART: [idev] --
6,052,680 UART: [ldev] ++
6,053,365 UART: [ldev] CDI.KEYID = 6
6,054,451 UART: [ldev] SUBJECT.KEYID = 5
6,055,510 UART: [ldev] AUTHORITY.KEYID = 7
6,056,703 UART: [ldev] FE.KEYID = 1
6,100,103 UART: [ldev] Erasing FE.KEYID = 1
8,607,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,370 UART: [ldev] --
10,415,283 UART: [fwproc] Wait for Commands...
10,418,563 UART: [fwproc] Recv command 0x46574c44
10,420,818 UART: [fwproc] Recv'd Img size: 34948 bytes
12,889,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,968,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,091,786 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,150,229 >>> mbox cmd response: success
13,153,582 UART: [afmc] ++
13,154,298 UART: [afmc] CDI.KEYID = 6
13,155,522 UART: [afmc] SUBJECT.KEYID = 7
13,156,937 UART: [afmc] AUTHORITY.KEYID = 5
15,699,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,423,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,425,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,440,624 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,455,762 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,470,639 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,495,183 UART: [afmc] --
17,498,108 UART: [cold-reset] --
17,500,993 UART: [state] Locking Datavault
17,505,856 UART: [state] Locking PCR0, PCR1 and PCR31
17,508,057 UART: [state] Locking ICCM
17,510,896 UART: [exit] Launching FMC @ 0x40000130
17,519,565 UART:
17,519,810 UART: Running Caliptra FMC ...
17,520,954 UART:
17,521,111 UART: [state] CFI Enabled
17,578,427 UART: [fht] FMC Alias Private Key: 7
19,344,594 UART: [art] Extend RT PCRs Done
19,345,873 UART: [art] Lock RT PCRs Done
19,347,140 UART: [art] Populate DV Done
19,352,761 UART: [fht] FMC Alias Private Key: 7
19,354,296 UART: [art] Derive CDI
19,355,068 UART: [art] Store in slot 0x4
19,411,323 UART: [art] Derive Key Pair
19,412,371 UART: [art] Store priv key in slot 0x5
21,875,274 UART: [art] Derive Key Pair - Done
21,887,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,601,143 UART: [art] Erasing AUTHORITY.KEYID = 7
23,602,700 UART: [art] PUB.X = 001D64089A7C90765EA7607EFD8D658310412F65B8D8CCF4DABB6DDBFE32161E8AAD71596A57827FC23EBE836994884B
23,609,920 UART: [art] PUB.Y = F7BBDA5406C1EE959CB2A405E0216F2CBE3AEEF9FFCF90CFEEDA6580BC1CBCE5042FC53A0C0B2BE736D83AD64141BF14
23,617,160 UART: [art] SIG.R = 8B1541E102EA31F569DAFEB51E017D6A9CB19A32E3766997721B325DB23D9554FAA872AE69718BFA8D9DC61CEE25030E
23,624,591 UART: [art] SIG.S = D69AE0043F45AD0455794F391C46A4B1A767FFFC7EDEBAF99C39C485B3D6B62232FCE5AD0D8CD7C0523A7BC38B4B51AA
24,602,624 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,437,453 ready_for_fw is high
3,437,832 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,025,361 >>> mbox cmd response: success
17,340,301 UART:
17,340,681 UART: Running Caliptra FMC ...
17,341,853 UART:
17,342,006 UART: [state] CFI Enabled
17,404,236 UART: [fht] FMC Alias Private Key: 7
19,170,834 UART: [art] Extend RT PCRs Done
19,172,100 UART: [art] Lock RT PCRs Done
19,173,745 UART: [art] Populate DV Done
19,179,367 UART: [fht] FMC Alias Private Key: 7
19,180,845 UART: [art] Derive CDI
19,181,657 UART: [art] Store in slot 0x4
19,237,064 UART: [art] Derive Key Pair
19,238,120 UART: [art] Store priv key in slot 0x5
21,700,904 UART: [art] Derive Key Pair - Done
21,714,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,426,851 UART: [art] Erasing AUTHORITY.KEYID = 7
23,428,443 UART: [art] PUB.X = F3A371F8E5E03875B5CA51EB2F06D34ADD9ACF6B90BF34268DFE56C84F4CF9774A8D16562F4C2A450DE376C8156308A1
23,435,658 UART: [art] PUB.Y = A3BA5353F3D357B9AB1B93EB3A94C16767C3B523A5FEDBC2C7C2AB7E5CA7C422D81301769554D1F78C70724A7E859A06
23,442,929 UART: [art] SIG.R = 6BFFE67BB87B0CEC5217BE5B50C85F19370CA55FEEE9262B4BF57ED00182EEED5E63F28000C3A6E4BA3388B279F08FF4
23,450,382 UART: [art] SIG.S = 24E241CE1E43FBAC22C3252BD282DF1FE52FD1F78799778E7371C17ADE0FDB3434D4D7B122B4F306A90B59C55B34BFA2
24,429,138 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,410 UART:
192,773 UART: Running Caliptra ROM ...
193,956 UART:
603,493 UART: [state] CFI Enabled
616,876 UART: [state] LifecycleState = Unprovisioned
619,184 UART: [state] DebugLocked = No
622,047 UART: [state] WD Timer not started. Device not locked for debugging
627,154 UART: [kat] SHA2-256
817,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,832 UART: [kat] ++
828,373 UART: [kat] sha1
839,954 UART: [kat] SHA2-256
842,956 UART: [kat] SHA2-384
849,751 UART: [kat] SHA2-512-ACC
852,307 UART: [kat] ECC-384
3,294,041 UART: [kat] HMAC-384Kdf
3,308,617 UART: [kat] LMS
3,840,476 UART: [kat] --
3,845,890 UART: [cold-reset] ++
3,846,984 UART: [fht] FHT @ 0x50003400
3,858,311 UART: [idev] ++
3,858,944 UART: [idev] CDI.KEYID = 6
3,859,970 UART: [idev] SUBJECT.KEYID = 7
3,861,136 UART: [idev] UDS.KEYID = 0
3,862,031 ready_for_fw is high
3,862,220 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,906,434 UART: [idev] Erasing UDS.KEYID = 0
6,340,740 UART: [idev] Sha1 KeyId Algorithm
6,363,044 UART: [idev] --
6,366,584 UART: [ldev] ++
6,367,295 UART: [ldev] CDI.KEYID = 6
6,368,180 UART: [ldev] SUBJECT.KEYID = 5
6,369,272 UART: [ldev] AUTHORITY.KEYID = 7
6,370,553 UART: [ldev] FE.KEYID = 1
6,380,923 UART: [ldev] Erasing FE.KEYID = 1
8,864,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,618 UART: [ldev] --
10,654,610 UART: [fwproc] Wait for Commands...
10,656,804 UART: [fwproc] Recv command 0x46574c44
10,659,054 UART: [fwproc] Recv'd Img size: 34948 bytes
13,125,755 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,210,838 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,334,449 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,393,406 >>> mbox cmd response: success
13,397,432 UART: [afmc] ++
13,398,041 UART: [afmc] CDI.KEYID = 6
13,399,267 UART: [afmc] SUBJECT.KEYID = 7
13,400,701 UART: [afmc] AUTHORITY.KEYID = 5
15,905,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,628,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,630,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,645,496 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,660,635 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,675,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,697,768 UART: [afmc] --
17,700,599 UART: [cold-reset] --
17,704,021 UART: [state] Locking Datavault
17,711,258 UART: [state] Locking PCR0, PCR1 and PCR31
17,713,464 UART: [state] Locking ICCM
17,716,240 UART: [exit] Launching FMC @ 0x40000130
17,724,933 UART:
17,725,212 UART: Running Caliptra FMC ...
17,726,367 UART:
17,726,542 UART: [state] CFI Enabled
17,734,771 UART: [fht] FMC Alias Private Key: 7
19,501,039 UART: [art] Extend RT PCRs Done
19,502,309 UART: [art] Lock RT PCRs Done
19,504,019 UART: [art] Populate DV Done
19,509,615 UART: [fht] FMC Alias Private Key: 7
19,511,283 UART: [art] Derive CDI
19,512,133 UART: [art] Store in slot 0x4
19,554,451 UART: [art] Derive Key Pair
19,555,494 UART: [art] Store priv key in slot 0x5
21,982,675 UART: [art] Derive Key Pair - Done
21,996,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,702,108 UART: [art] Erasing AUTHORITY.KEYID = 7
23,703,657 UART: [art] PUB.X = B88B51C761CC41E8ABC32338ACD10D0B49CD8C3ED6FB951FE65D941BC293FAC0C28A473DABC138308DAA274537B560D0
23,710,924 UART: [art] PUB.Y = 40ECC924FD1CDC58C0A315A8F0942917E6BA218C04CBE64258A6C1A5E6AB49ACE1F927FBAA16FC0FF0AE6EE6D091A383
23,718,190 UART: [art] SIG.R = 1FD115E3A9A5D74B1B0066307C5B7A91DAB1AA4502241B26EE59CD0D608DEFC7A03BE34471AAF2572FBC60A06DBBF8D7
23,725,602 UART: [art] SIG.S = 2CD28ADC509A9F23505891FA71760BF7280DB3DF8ED6C02B7200A8DFDE07A1DA1627D8B7DA07BE5303A3F7C3631E3FC7
24,704,320 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,761,359 ready_for_fw is high
3,761,799 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,262,444 >>> mbox cmd response: success
17,512,949 UART:
17,513,341 UART: Running Caliptra FMC ...
17,514,511 UART:
17,514,662 UART: [state] CFI Enabled
17,522,306 UART: [fht] FMC Alias Private Key: 7
19,287,851 UART: [art] Extend RT PCRs Done
19,289,128 UART: [art] Lock RT PCRs Done
19,290,763 UART: [art] Populate DV Done
19,296,424 UART: [fht] FMC Alias Private Key: 7
19,297,902 UART: [art] Derive CDI
19,298,707 UART: [art] Store in slot 0x4
19,341,734 UART: [art] Derive Key Pair
19,342,824 UART: [art] Store priv key in slot 0x5
21,770,393 UART: [art] Derive Key Pair - Done
21,783,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,489,637 UART: [art] Erasing AUTHORITY.KEYID = 7
23,491,388 UART: [art] PUB.X = F5E8BDA54259DC5AAE8925DF621E126E10B3E2D82802E0DB0EAF5BB7835A783C8B3F0F8739132A4D165547F104009A8B
23,498,436 UART: [art] PUB.Y = F91297ABE4CB3214739EB6060DD110CE7D793CA98F7C9568BA2FA22C7075D12B48453C949BACDE65B547CB0E195FA570
23,505,715 UART: [art] SIG.R = E70F6043F460B004EAF8C3C28C35EA71D208B290104486168A76203ED21524314B9F37CBEAC63C839457F111FF4DB4CB
23,513,088 UART: [art] SIG.S = 470E016E112C4E5873DA0E6EAA55CF12B6F368BC16791A30D376458E6B8593BD6E8CA46EABA6290DDF22819D8F247DD1
24,491,743 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,261 UART: [kat] SHA2-256
882,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,307 UART: [kat] ++
886,459 UART: [kat] sha1
890,637 UART: [kat] SHA2-256
892,575 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,366 UART: [kat] LMS
1,475,562 UART: [kat] --
1,476,477 UART: [cold-reset] ++
1,477,055 UART: [fht] Storing FHT @ 0x50003400
1,479,876 UART: [idev] ++
1,480,044 UART: [idev] CDI.KEYID = 6
1,480,404 UART: [idev] SUBJECT.KEYID = 7
1,480,828 UART: [idev] UDS.KEYID = 0
1,481,173 ready_for_fw is high
1,481,173 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,694 UART: [idev] Erasing UDS.KEYID = 0
1,505,100 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,514,867 UART: [ldev] ++
1,515,035 UART: [ldev] CDI.KEYID = 6
1,515,398 UART: [ldev] SUBJECT.KEYID = 5
1,515,824 UART: [ldev] AUTHORITY.KEYID = 7
1,516,287 UART: [ldev] FE.KEYID = 1
1,521,253 UART: [ldev] Erasing FE.KEYID = 1
1,546,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,592 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,740 UART: [fwproc] Received command 0x46574c44
1,587,531 UART: [fwproc] Received Image of size 34948 bytes
1,975,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,135 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,353 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,200 >>> mbox cmd response: success
2,049,308 UART: [afmc] ++
2,049,476 UART: [afmc] CDI.KEYID = 6
2,049,838 UART: [afmc] SUBJECT.KEYID = 7
2,050,263 UART: [afmc] AUTHORITY.KEYID = 5
2,085,242 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,556 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,336 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,113,928 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,611 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,445 UART: [afmc] --
2,128,559 UART: [cold-reset] --
2,129,271 UART: [state] Locking Datavault
2,130,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,130 UART: [state] Locking ICCM
2,131,564 UART: [exit] Launching FMC @ 0x40000130
2,136,894 UART:
2,136,910 UART: Running Caliptra FMC ...
2,137,318 UART:
2,137,372 UART: [state] CFI Enabled
2,147,602 UART: [fht] FMC Alias Private Key: 7
2,266,686 UART: [art] Extend RT PCRs Done
2,267,114 UART: [art] Lock RT PCRs Done
2,268,766 UART: [art] Populate DV Done
2,277,011 UART: [fht] FMC Alias Private Key: 7
2,278,189 UART: [art] Derive CDI
2,278,469 UART: [art] Store in slot 0x4
2,364,763 UART: [art] Derive Key Pair
2,365,123 UART: [art] Store priv key in slot 0x5
2,378,282 UART: [art] Derive Key Pair - Done
2,392,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,648 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,413 UART: [art] PUB.X = DD73A96DD1942418B8022FE814154F90BDA96B232F8815F7B6644E8C9AF23F5D3BB69D9B150878E99D3B76A5EF2DAF67
2,416,185 UART: [art] PUB.Y = 4C551E96C41EB4A3297E6471967E95AC38BABD23C9A40BE13DB47392B27CECC7EA57D2F71F5FDCB07CCE0E31AFC69D47
2,423,151 UART: [art] SIG.R = 0DB990E0A6F48867A0A59A176FE11B06254791EDA69DC9C069BEA175E2FA72F2BC844BDB112A0C245E3DE69AA8161B49
2,429,924 UART: [art] SIG.S = 76E2B05F0010CCF4E1F73CB1621ACADB83AFB9E59513537160A79F487674564C6834F38EC85A064962615CFD60E47741
2,453,308 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,387 ready_for_fw is high
1,362,387 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,897,372 >>> mbox cmd response: success
1,958,959 UART:
1,958,975 UART: Running Caliptra FMC ...
1,959,383 UART:
1,959,437 UART: [state] CFI Enabled
1,969,747 UART: [fht] FMC Alias Private Key: 7
2,088,567 UART: [art] Extend RT PCRs Done
2,088,995 UART: [art] Lock RT PCRs Done
2,090,615 UART: [art] Populate DV Done
2,098,946 UART: [fht] FMC Alias Private Key: 7
2,100,102 UART: [art] Derive CDI
2,100,382 UART: [art] Store in slot 0x4
2,186,328 UART: [art] Derive Key Pair
2,186,688 UART: [art] Store priv key in slot 0x5
2,199,939 UART: [art] Derive Key Pair - Done
2,214,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,230,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,231,363 UART: [art] PUB.X = F272A3E88881411BCBA3541F97300A7EEA90D00422DCFBB5B0671FF6A2D092D93DF7E2367872E984DAC0681C7EBBF1EA
2,238,141 UART: [art] PUB.Y = 974F06C50D85BC3D79510902ED47010DBF0AE9F10A33AFD9A0C9280412EAC527B5A4E395DDD3E408FA33ABC148BEEFE1
2,245,079 UART: [art] SIG.R = 441BE6948DFE4ECDDC04DFFCAAF4380D7EB506A67476797F6859E6E9DCCF63C02D60A1114D29D1BB09CE0C812EB86003
2,251,849 UART: [art] SIG.S = 05A52D5D5511BB971EC5F954D7BE002027A7C3B3D6AA94811BD687B8807909EDC0743646B214CC96EAE19D675FC3421A
2,275,492 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,416 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,898 UART: [kat] SHA2-256
881,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,944 UART: [kat] ++
886,096 UART: [kat] sha1
890,144 UART: [kat] SHA2-256
892,082 UART: [kat] SHA2-384
894,801 UART: [kat] SHA2-512-ACC
896,702 UART: [kat] ECC-384
902,603 UART: [kat] HMAC-384Kdf
907,149 UART: [kat] LMS
1,475,345 UART: [kat] --
1,476,192 UART: [cold-reset] ++
1,476,612 UART: [fht] Storing FHT @ 0x50003400
1,479,303 UART: [idev] ++
1,479,471 UART: [idev] CDI.KEYID = 6
1,479,831 UART: [idev] SUBJECT.KEYID = 7
1,480,255 UART: [idev] UDS.KEYID = 0
1,480,600 ready_for_fw is high
1,480,600 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,259 UART: [idev] Erasing UDS.KEYID = 0
1,505,025 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,503 UART: [idev] --
1,514,440 UART: [ldev] ++
1,514,608 UART: [ldev] CDI.KEYID = 6
1,514,971 UART: [ldev] SUBJECT.KEYID = 5
1,515,397 UART: [ldev] AUTHORITY.KEYID = 7
1,515,860 UART: [ldev] FE.KEYID = 1
1,521,414 UART: [ldev] Erasing FE.KEYID = 1
1,546,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,603 UART: [ldev] --
1,585,926 UART: [fwproc] Waiting for Commands...
1,586,659 UART: [fwproc] Received command 0x46574c44
1,587,450 UART: [fwproc] Received Image of size 34948 bytes
1,975,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,508 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,726 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,605 >>> mbox cmd response: success
2,049,639 UART: [afmc] ++
2,049,807 UART: [afmc] CDI.KEYID = 6
2,050,169 UART: [afmc] SUBJECT.KEYID = 7
2,050,594 UART: [afmc] AUTHORITY.KEYID = 5
2,086,335 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,109,270 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,153 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,836 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,742 UART: [afmc] --
2,129,670 UART: [cold-reset] --
2,130,266 UART: [state] Locking Datavault
2,131,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,289 UART: [state] Locking ICCM
2,132,827 UART: [exit] Launching FMC @ 0x40000130
2,138,157 UART:
2,138,173 UART: Running Caliptra FMC ...
2,138,581 UART:
2,138,724 UART: [state] CFI Enabled
2,149,250 UART: [fht] FMC Alias Private Key: 7
2,268,290 UART: [art] Extend RT PCRs Done
2,268,718 UART: [art] Lock RT PCRs Done
2,270,270 UART: [art] Populate DV Done
2,278,493 UART: [fht] FMC Alias Private Key: 7
2,279,667 UART: [art] Derive CDI
2,279,947 UART: [art] Store in slot 0x4
2,365,817 UART: [art] Derive Key Pair
2,366,177 UART: [art] Store priv key in slot 0x5
2,379,420 UART: [art] Derive Key Pair - Done
2,393,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,509 UART: [art] PUB.X = 8C7B36774D4345BB795B925A970441AFC918A9E0CBCE040536990B4614B65A5FA65C854D6B1DAC004FD335524DB14239
2,417,245 UART: [art] PUB.Y = C49DA6025DD099A4561F28BB47F5C74D2479B7515E9C89955F9D9459A9E8F90691A7725CBBAC038EE73BDBC3C6BD1B9C
2,424,198 UART: [art] SIG.R = 5065DC6080B52BAA7122BD9F41D8D5EE06AC630AC741C2FF476B29CF0C10BDC1A27CF44D17CF48FC9FA8ED133CA85520
2,430,979 UART: [art] SIG.S = 9574472EC90806CE184BBF18DF5EF76AD747B3B34158265FFD7C525EE24867FE60BB0FC15F53C9B50BB21099FA530858
2,454,391 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,120 ready_for_fw is high
1,363,120 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,339 >>> mbox cmd response: success
1,961,166 UART:
1,961,182 UART: Running Caliptra FMC ...
1,961,590 UART:
1,961,733 UART: [state] CFI Enabled
1,972,081 UART: [fht] FMC Alias Private Key: 7
2,090,953 UART: [art] Extend RT PCRs Done
2,091,381 UART: [art] Lock RT PCRs Done
2,093,023 UART: [art] Populate DV Done
2,101,178 UART: [fht] FMC Alias Private Key: 7
2,102,208 UART: [art] Derive CDI
2,102,488 UART: [art] Store in slot 0x4
2,188,150 UART: [art] Derive Key Pair
2,188,510 UART: [art] Store priv key in slot 0x5
2,201,109 UART: [art] Derive Key Pair - Done
2,216,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,231,881 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,646 UART: [art] PUB.X = 65FE923564D3A6B98E7A62F63F319B4AC3CF44E704760FE7C08CA22060E43DDB34095120EB9F3CFA02896034E7C9A664
2,239,408 UART: [art] PUB.Y = 84CBAEDEF3B424E8B87309D82727977D2FDF311535C4FCABB572C909270C6C7E0B3EAE14120DDD0F91A142F6377522F5
2,246,350 UART: [art] SIG.R = A34FCA84C41E6A89C5FC22BAE2AEC67BF9043124C5670E0B5C3795D620824349E8B996CDA87205DD9856CBE094A83A6E
2,253,118 UART: [art] SIG.S = A15972837046B03112AC0ADC8CB3FF576F1F8CE69976D1FFE5BF94AB2E7DC6D9BCF058B938D3054946336F0EE3683F12
2,277,242 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,012 UART: [state] LifecycleState = Unprovisioned
85,667 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,514 UART: [fht] FHT @ 0x50003400
1,173,330 UART: [idev] ++
1,173,498 UART: [idev] CDI.KEYID = 6
1,173,859 UART: [idev] SUBJECT.KEYID = 7
1,174,284 UART: [idev] UDS.KEYID = 0
1,174,630 ready_for_fw is high
1,174,630 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,233 UART: [idev] Erasing UDS.KEYID = 0
1,199,575 UART: [idev] Sha1 KeyId Algorithm
1,208,433 UART: [idev] --
1,209,588 UART: [ldev] ++
1,209,756 UART: [ldev] CDI.KEYID = 6
1,210,120 UART: [ldev] SUBJECT.KEYID = 5
1,210,547 UART: [ldev] AUTHORITY.KEYID = 7
1,211,010 UART: [ldev] FE.KEYID = 1
1,215,804 UART: [ldev] Erasing FE.KEYID = 1
1,242,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,152 UART: [ldev] --
1,281,459 UART: [fwproc] Wait for Commands...
1,282,090 UART: [fwproc] Recv command 0x46574c44
1,282,823 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,382 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,153 >>> mbox cmd response: success
1,743,207 UART: [afmc] ++
1,743,375 UART: [afmc] CDI.KEYID = 6
1,743,738 UART: [afmc] SUBJECT.KEYID = 7
1,744,164 UART: [afmc] AUTHORITY.KEYID = 5
1,779,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,444 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,145 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,816 UART: [afmc] --
1,822,855 UART: [cold-reset] --
1,823,929 UART: [state] Locking Datavault
1,825,290 UART: [state] Locking PCR0, PCR1 and PCR31
1,825,894 UART: [state] Locking ICCM
1,826,328 UART: [exit] Launching FMC @ 0x40000130
1,831,658 UART:
1,831,674 UART: Running Caliptra FMC ...
1,832,082 UART:
1,832,136 UART: [state] CFI Enabled
1,842,454 UART: [fht] FMC Alias Private Key: 7
1,960,828 UART: [art] Extend RT PCRs Done
1,961,256 UART: [art] Lock RT PCRs Done
1,962,916 UART: [art] Populate DV Done
1,971,237 UART: [fht] FMC Alias Private Key: 7
1,972,243 UART: [art] Derive CDI
1,972,523 UART: [art] Store in slot 0x4
2,058,858 UART: [art] Derive Key Pair
2,059,218 UART: [art] Store priv key in slot 0x5
2,072,420 UART: [art] Derive Key Pair - Done
2,087,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,988 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,753 UART: [art] PUB.X = 0B28DF9EABA67AE335B85D56F090AAD57DBAA263FC04CFBF33C932CBD4310C9D805C01BD485A292FF641E4931ABA9D56
2,110,533 UART: [art] PUB.Y = 4B19A3024FAEBD811574EB0BFB4D82DCD34C87DFDCC76B43CBA5A295A4234918653A54B9C237942EDC1FCDFB996580D7
2,117,495 UART: [art] SIG.R = 91BC34DC469F9BC89190B6D18C679BFBAD72C3243180D3EB890417625AE676D324569865E55D95C387959EC7BD20F1B2
2,124,262 UART: [art] SIG.S = 4C41BF53F8E98B8F1F04FE3935E423CCB3FCBCD68AE79E24BDBECAFF862D0BDF5D1F91150FEB7D697063DF33158B38D9
2,148,228 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,074 ready_for_fw is high
1,059,074 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,594,940 >>> mbox cmd response: success
1,656,479 UART:
1,656,495 UART: Running Caliptra FMC ...
1,656,903 UART:
1,656,957 UART: [state] CFI Enabled
1,667,351 UART: [fht] FMC Alias Private Key: 7
1,786,303 UART: [art] Extend RT PCRs Done
1,786,731 UART: [art] Lock RT PCRs Done
1,788,587 UART: [art] Populate DV Done
1,796,646 UART: [fht] FMC Alias Private Key: 7
1,797,690 UART: [art] Derive CDI
1,797,970 UART: [art] Store in slot 0x4
1,883,483 UART: [art] Derive Key Pair
1,883,843 UART: [art] Store priv key in slot 0x5
1,896,985 UART: [art] Derive Key Pair - Done
1,911,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,927,428 UART: [art] Erasing AUTHORITY.KEYID = 7
1,928,193 UART: [art] PUB.X = 1F3B8503921CFCB7A1BCFEC35A4BBCA9FDA13D669C27BDED53EAFD96774DC7F261FCCCA8E567DA42733FFD8ECEFD4813
1,934,996 UART: [art] PUB.Y = 52E592D68EA59ABC2F8557165605D2B55536220544EB3EA20C315CB53BB40EB714C1F9671758C2C02773A7158A4CDEAF
1,941,936 UART: [art] SIG.R = 6A201A38D74372DC8B487766771852A5CB1E439836E0D55DE53A4D14D4304AE67E4FF18614E0A345F81467E1390B932F
1,948,697 UART: [art] SIG.S = B8E9A60F22F04CE6EE213829DD46D7087F8B4D2D1B5262E7979278A5EA02D1E6A9D7EF1A83F9062FDC9C0B24026BF73B
1,972,516 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Unprovisioned
85,718 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
890,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,475 UART: [kat] SHA2-256
901,415 UART: [kat] SHA2-384
904,104 UART: [kat] SHA2-512-ACC
906,005 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,382 UART: [kat] LMS
1,168,694 UART: [kat] --
1,169,283 UART: [cold-reset] ++
1,169,625 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,173,545 ready_for_fw is high
1,173,545 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,432 UART: [idev] Erasing UDS.KEYID = 0
1,198,650 UART: [idev] Sha1 KeyId Algorithm
1,207,558 UART: [idev] --
1,208,651 UART: [ldev] ++
1,208,819 UART: [ldev] CDI.KEYID = 6
1,209,183 UART: [ldev] SUBJECT.KEYID = 5
1,209,610 UART: [ldev] AUTHORITY.KEYID = 7
1,210,073 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,241,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,321 UART: [ldev] --
1,281,656 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,773 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,668 >>> mbox cmd response: success
1,744,836 UART: [afmc] ++
1,745,004 UART: [afmc] CDI.KEYID = 6
1,745,367 UART: [afmc] SUBJECT.KEYID = 7
1,745,793 UART: [afmc] AUTHORITY.KEYID = 5
1,781,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,319 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,020 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,737 UART: [afmc] --
1,824,676 UART: [cold-reset] --
1,825,604 UART: [state] Locking Datavault
1,826,779 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,383 UART: [state] Locking ICCM
1,828,013 UART: [exit] Launching FMC @ 0x40000130
1,833,343 UART:
1,833,359 UART: Running Caliptra FMC ...
1,833,767 UART:
1,833,910 UART: [state] CFI Enabled
1,844,672 UART: [fht] FMC Alias Private Key: 7
1,963,680 UART: [art] Extend RT PCRs Done
1,964,108 UART: [art] Lock RT PCRs Done
1,965,942 UART: [art] Populate DV Done
1,974,413 UART: [fht] FMC Alias Private Key: 7
1,975,397 UART: [art] Derive CDI
1,975,677 UART: [art] Store in slot 0x4
2,061,378 UART: [art] Derive Key Pair
2,061,738 UART: [art] Store priv key in slot 0x5
2,075,320 UART: [art] Derive Key Pair - Done
2,090,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,461 UART: [art] Erasing AUTHORITY.KEYID = 7
2,106,226 UART: [art] PUB.X = 405FD5097C2910E731D39E04400A8A207D96E95D882520EDD673EB44C858D1DF0BB8FE3837EED02185EB0DE35EBD1DF4
2,112,991 UART: [art] PUB.Y = 739BD0B71E7D4C47604FC886EFFC0F20CDCD39A3978930B6A34CC476E01C18348C8553F78FE17C0D7DE4FA54A865FFB0
2,119,949 UART: [art] SIG.R = 65EA047E0E279091EC6C746D9EC815E98E7FE652CC157B9DF962F535BAA2041A5D571F12B2B5D3F94D84709C2598A45E
2,126,716 UART: [art] SIG.S = BEBDB7B2586CE8B5B13D1DAE443754E448823FD738659E0EE61664925B8FDE66C89ABFC4467DF96A8008ACE02BA8B46D
2,150,881 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,919 ready_for_fw is high
1,059,919 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,039 >>> mbox cmd response: success
1,658,660 UART:
1,658,676 UART: Running Caliptra FMC ...
1,659,084 UART:
1,659,227 UART: [state] CFI Enabled
1,669,979 UART: [fht] FMC Alias Private Key: 7
1,790,045 UART: [art] Extend RT PCRs Done
1,790,473 UART: [art] Lock RT PCRs Done
1,792,139 UART: [art] Populate DV Done
1,800,252 UART: [fht] FMC Alias Private Key: 7
1,801,286 UART: [art] Derive CDI
1,801,566 UART: [art] Store in slot 0x4
1,887,125 UART: [art] Derive Key Pair
1,887,485 UART: [art] Store priv key in slot 0x5
1,901,557 UART: [art] Derive Key Pair - Done
1,915,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,084 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,849 UART: [art] PUB.X = EA9853FD12D5BFE2E673C09F75C1D4D3606CC5C8C5A7A2E82A8C517338C259B972B91B58111D179BCA3AA6A32EE8DA3A
1,938,635 UART: [art] PUB.Y = 94F856479742BB36FA6130880DDAF8EC03AA32DDF625B4F23FAA8AF5ADDDDC6A38C1B0522C7CCD6553ECF667D0346CC3
1,945,601 UART: [art] SIG.R = DB370BAE694E4249E90ED0317B1C2CCBC57937C755E8984CCBBBA354C3144AD4A293D8B152A3F453BC588C255787093A
1,952,370 UART: [art] SIG.S = 929919C8684B10A03E1C8C1EB31021D2A7E06A7491F866EF8844A7DFE6B6464B146913FB60EFCB7A7741094F8F96019B
1,976,359 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
893,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,523 UART: [kat] ++
897,675 UART: [kat] sha1
901,979 UART: [kat] SHA2-256
903,919 UART: [kat] SHA2-384
906,742 UART: [kat] SHA2-512-ACC
908,643 UART: [kat] ECC-384
918,286 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,169 UART: [cold-reset] ++
1,172,613 UART: [fht] FHT @ 0x50003400
1,175,318 UART: [idev] ++
1,175,486 UART: [idev] CDI.KEYID = 6
1,175,846 UART: [idev] SUBJECT.KEYID = 7
1,176,270 UART: [idev] UDS.KEYID = 0
1,176,615 ready_for_fw is high
1,176,615 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,780 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,173 UART: [idev] --
1,210,131 UART: [ldev] ++
1,210,299 UART: [ldev] CDI.KEYID = 6
1,210,662 UART: [ldev] SUBJECT.KEYID = 5
1,211,088 UART: [ldev] AUTHORITY.KEYID = 7
1,211,551 UART: [ldev] FE.KEYID = 1
1,216,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,111 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,924 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,918 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,663 >>> mbox cmd response: success
1,743,723 UART: [afmc] ++
1,743,891 UART: [afmc] CDI.KEYID = 6
1,744,253 UART: [afmc] SUBJECT.KEYID = 7
1,744,678 UART: [afmc] AUTHORITY.KEYID = 5
1,779,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,796,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,797,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,822,285 UART: [afmc] --
1,823,329 UART: [cold-reset] --
1,824,051 UART: [state] Locking Datavault
1,825,108 UART: [state] Locking PCR0, PCR1 and PCR31
1,825,712 UART: [state] Locking ICCM
1,826,292 UART: [exit] Launching FMC @ 0x40000130
1,831,622 UART:
1,831,638 UART: Running Caliptra FMC ...
1,832,046 UART:
1,832,100 UART: [state] CFI Enabled
1,842,732 UART: [fht] FMC Alias Private Key: 7
1,961,938 UART: [art] Extend RT PCRs Done
1,962,366 UART: [art] Lock RT PCRs Done
1,963,818 UART: [art] Populate DV Done
1,972,145 UART: [fht] FMC Alias Private Key: 7
1,973,215 UART: [art] Derive CDI
1,973,495 UART: [art] Store in slot 0x4
2,059,236 UART: [art] Derive Key Pair
2,059,596 UART: [art] Store priv key in slot 0x5
2,072,166 UART: [art] Derive Key Pair - Done
2,086,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,110 UART: [art] Erasing AUTHORITY.KEYID = 7
2,102,875 UART: [art] PUB.X = 27F51521A36462F6A600685AA4350B8FA28BE0A82346F39CE102AD108F8F77BE97D7390F4643F366BA4B41116A4D4304
2,109,607 UART: [art] PUB.Y = 8B5A6D2C91CE8137B4ACFFCD08029220E274984C640EEE2D744D96CB08821347627DC60FEF19C757BF6860DE2428EF30
2,116,548 UART: [art] SIG.R = 620A3EB89EE47A5CFFF54FEBF78DF8AEF23CDE0551FB43C6F07A43E5AC46E646010538053348B79D9272F78DF0CD2722
2,123,317 UART: [art] SIG.S = FFFEE96D30FB78F117509AF6B1D530207EC9BFCA3E6DFE0E7E4C8D484D3926F0AC36835A4FFE82604113C19C7671A149
2,147,209 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,649 ready_for_fw is high
1,060,649 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,372 >>> mbox cmd response: success
1,659,123 UART:
1,659,139 UART: Running Caliptra FMC ...
1,659,547 UART:
1,659,601 UART: [state] CFI Enabled
1,670,097 UART: [fht] FMC Alias Private Key: 7
1,789,129 UART: [art] Extend RT PCRs Done
1,789,557 UART: [art] Lock RT PCRs Done
1,791,297 UART: [art] Populate DV Done
1,799,708 UART: [fht] FMC Alias Private Key: 7
1,800,760 UART: [art] Derive CDI
1,801,040 UART: [art] Store in slot 0x4
1,886,467 UART: [art] Derive Key Pair
1,886,827 UART: [art] Store priv key in slot 0x5
1,900,261 UART: [art] Derive Key Pair - Done
1,914,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,343 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,108 UART: [art] PUB.X = CD808E35216B380D54DAF66B4406AB10C9734B76D083DC62B7A4493B7EF9E72DAD77E2902D5048C06150390543564368
1,937,863 UART: [art] PUB.Y = AD493E4E0B2039EFFFB061740905A68633B04B904BDA63728D13670E4EEA7D505192495C808AF9EFFBE0E34E31D40EFB
1,944,808 UART: [art] SIG.R = 3F90BA01E3BCC6A05A681717ED27F6113AC58B64B198614FA32652D745BD2435EE27A75CBAEFD06C6C5A163D298C2CC8
1,951,587 UART: [art] SIG.S = 89B46AA528D900288063215E79DDFBC20297DE6A4024A0B36C7078ACF847F708A0113F20D1117C55D7276949913C631F
1,975,352 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
893,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,950 UART: [kat] ++
898,102 UART: [kat] sha1
902,452 UART: [kat] SHA2-256
904,392 UART: [kat] SHA2-384
907,243 UART: [kat] SHA2-512-ACC
909,144 UART: [kat] ECC-384
918,753 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,788 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 ready_for_fw is high
1,176,802 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,679 UART: [idev] Erasing UDS.KEYID = 0
1,202,132 UART: [idev] Sha1 KeyId Algorithm
1,210,534 UART: [idev] --
1,211,434 UART: [ldev] ++
1,211,602 UART: [ldev] CDI.KEYID = 6
1,211,965 UART: [ldev] SUBJECT.KEYID = 5
1,212,391 UART: [ldev] AUTHORITY.KEYID = 7
1,212,854 UART: [ldev] FE.KEYID = 1
1,218,074 UART: [ldev] Erasing FE.KEYID = 1
1,244,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,952 UART: [ldev] --
1,284,411 UART: [fwproc] Wait for Commands...
1,285,043 UART: [fwproc] Recv command 0x46574c44
1,285,771 UART: [fwproc] Recv'd Img size: 34948 bytes
1,673,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,731,129 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,746,042 >>> mbox cmd response: success
1,747,170 UART: [afmc] ++
1,747,338 UART: [afmc] CDI.KEYID = 6
1,747,700 UART: [afmc] SUBJECT.KEYID = 7
1,748,125 UART: [afmc] AUTHORITY.KEYID = 5
1,784,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,801,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,807,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,813,523 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,819,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,827,164 UART: [afmc] --
1,828,174 UART: [cold-reset] --
1,829,042 UART: [state] Locking Datavault
1,830,429 UART: [state] Locking PCR0, PCR1 and PCR31
1,831,033 UART: [state] Locking ICCM
1,831,637 UART: [exit] Launching FMC @ 0x40000130
1,836,967 UART:
1,836,983 UART: Running Caliptra FMC ...
1,837,391 UART:
1,837,534 UART: [state] CFI Enabled
1,848,244 UART: [fht] FMC Alias Private Key: 7
1,967,378 UART: [art] Extend RT PCRs Done
1,967,806 UART: [art] Lock RT PCRs Done
1,969,242 UART: [art] Populate DV Done
1,977,509 UART: [fht] FMC Alias Private Key: 7
1,978,479 UART: [art] Derive CDI
1,978,759 UART: [art] Store in slot 0x4
2,064,778 UART: [art] Derive Key Pair
2,065,138 UART: [art] Store priv key in slot 0x5
2,078,418 UART: [art] Derive Key Pair - Done
2,093,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,108,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,109,471 UART: [art] PUB.X = 466E3897F511CDBFBE020AD1BB3BA9D8038B925EF797F21118D34ACC268DECF667E984B0EC70C5303FAD8B778C002C70
2,116,224 UART: [art] PUB.Y = 8B59ABB893334441808567D89C93320C12E496E67FC667A423104488469DCAC64D10B572DBA0E8394B3BD72001F4009F
2,123,138 UART: [art] SIG.R = 8C5664CAB58F8FB529DFB18585A273496646386D27FE0FFE681A2DB6C37F43CD423F54AAEA6790640C5E25DCB5F893AD
2,129,914 UART: [art] SIG.S = B827E1E3A743AFD502DB09E6495A5636231AC1F243509ECD14E4BF224095146CE0B94B12945FAA6E8ACCFD4327045CC7
2,153,626 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,134 ready_for_fw is high
1,061,134 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,013 >>> mbox cmd response: success
1,658,946 UART:
1,658,962 UART: Running Caliptra FMC ...
1,659,370 UART:
1,659,513 UART: [state] CFI Enabled
1,670,329 UART: [fht] FMC Alias Private Key: 7
1,788,527 UART: [art] Extend RT PCRs Done
1,788,955 UART: [art] Lock RT PCRs Done
1,790,515 UART: [art] Populate DV Done
1,798,942 UART: [fht] FMC Alias Private Key: 7
1,800,020 UART: [art] Derive CDI
1,800,300 UART: [art] Store in slot 0x4
1,886,397 UART: [art] Derive Key Pair
1,886,757 UART: [art] Store priv key in slot 0x5
1,900,417 UART: [art] Derive Key Pair - Done
1,915,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,082 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,847 UART: [art] PUB.X = 39EBE909389CF80220DEAA2906511A21C638E159E57C75A4434DB34B765814CB3222AC1CA2B16B43192F5588DB0A40A5
1,937,605 UART: [art] PUB.Y = 311A976D16D7C1C29CB4FDEB892809BC6F32B02A5AFD65842291EFC4DE4460E42E677E51C8B66B27B1775ACD862F1E9F
1,944,564 UART: [art] SIG.R = B7AC4226364EA3CD468DE3174F74E1E29DE5C719513CF214BBDB45199CDE555F391E5BC53970C955E8BCF41BE6BB36C3
1,951,348 UART: [art] SIG.S = 5687765A5CBBF5BF965AAEC277DC47648B2C5E799EBBDD007A7B502A9419978A21A896EC3F4C306DFD19E97F82195D94
1,974,741 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_hand_off::test_hand_off ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
191,990 UART:
192,345 UART: Running Caliptra ROM ...
193,468 UART:
193,611 UART: [state] CFI Enabled
266,233 UART: [state] LifecycleState = Unprovisioned
268,215 UART: [state] DebugLocked = No
270,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,858 UART: [kat] SHA2-256
445,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,090 UART: [kat] ++
456,537 UART: [kat] sha1
468,251 UART: [kat] SHA2-256
470,971 UART: [kat] SHA2-384
475,961 UART: [kat] SHA2-512-ACC
478,321 UART: [kat] ECC-384
2,768,249 UART: [kat] HMAC-384Kdf
2,801,527 UART: [kat] LMS
3,991,858 UART: [kat] --
3,997,645 UART: [cold-reset] ++
3,999,577 UART: [fht] Storing FHT @ 0x50003400
4,012,419 UART: [idev] ++
4,012,993 UART: [idev] CDI.KEYID = 6
4,013,970 UART: [idev] SUBJECT.KEYID = 7
4,015,213 UART: [idev] UDS.KEYID = 0
4,016,365 ready_for_fw is high
4,016,572 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,060,758 UART: [idev] Erasing UDS.KEYID = 0
7,344,926 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,523 UART: [idev] --
7,370,243 UART: [ldev] ++
7,370,808 UART: [ldev] CDI.KEYID = 6
7,371,737 UART: [ldev] SUBJECT.KEYID = 5
7,372,995 UART: [ldev] AUTHORITY.KEYID = 7
7,374,136 UART: [ldev] FE.KEYID = 1
7,422,074 UART: [ldev] Erasing FE.KEYID = 1
10,753,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,322 UART: [ldev] --
13,115,801 UART: [fwproc] Waiting for Commands...
13,118,969 UART: [fwproc] Received command 0x46574c44
13,121,141 UART: [fwproc] Received Image of size 34948 bytes
16,200,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,278,538 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,351,705 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,387,432 >>> mbox cmd response: success
16,391,555 UART: [afmc] ++
16,392,125 UART: [afmc] CDI.KEYID = 6
16,393,007 UART: [afmc] SUBJECT.KEYID = 7
16,394,274 UART: [afmc] AUTHORITY.KEYID = 5
19,747,963 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,046,259 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,048,516 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,062,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,077,713 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,092,109 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,113,982 UART: [afmc] --
22,116,936 UART: [cold-reset] --
22,121,878 UART: [state] Locking Datavault
22,127,014 UART: [state] Locking PCR0, PCR1 and PCR31
22,128,720 UART: [state] Locking ICCM
22,131,190 UART: [exit] Launching FMC @ 0x40000130
22,139,585 UART:
22,139,819 UART: Running Caliptra FMC ...
22,140,916 UART:
22,141,070 UART: [state] CFI Enabled
22,206,456 UART: [fht] FMC Alias Private Key: 7
24,568,692 UART: [art] Extend RT PCRs Done
24,569,909 UART: [art] Lock RT PCRs Done
24,571,772 UART: [art] Populate DV Done
24,577,122 UART: [fht] FMC Alias Private Key: 7
24,578,800 UART: [art] Derive CDI
24,579,538 UART: [art] Store in slot 0x4
24,635,746 UART: [art] Derive Key Pair
24,636,745 UART: [art] Store priv key in slot 0x5
27,929,622 UART: [art] Derive Key Pair - Done
27,942,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,231,292 UART: [art] Erasing AUTHORITY.KEYID = 7
30,232,799 UART: [art] PUB.X = 8D472AAE6B39EE5E3605E56FE874BC88C5B5E74935DB6769355648E998CF3AE14435B70571EC7B98DE6F96B71B8030B2
30,240,034 UART: [art] PUB.Y = 4446ADE251891E3B0E6F6C1F762B35E0C650C1541A864BB66FCF3EA066FD3D003C52389FEEF2ECE6F2A5BE93F55A6E6C
30,247,297 UART: [art] SIG.R = 353E3A1747329FF5CC4A822A8BDA69DB72AE0EB3131C59116581FAF800544564E913A37AE67088C66D3FE85A45F54530
30,254,668 UART: [art] SIG.S = B4EE51B929CCA443EA113E58E36D2CCD5E4B80017F324BA41AEEC0021FA14A5B18211D2340617E9B40F4088A6467184A
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,786,223 ready_for_fw is high
3,786,632 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,269,046 >>> mbox cmd response: success
21,966,174 UART:
21,966,572 UART: Running Caliptra FMC ...
21,967,860 UART:
21,968,027 UART: [state] CFI Enabled
22,032,288 UART: [fht] FMC Alias Private Key: 7
24,372,549 UART: [art] Extend RT PCRs Done
24,373,770 UART: [art] Lock RT PCRs Done
24,375,400 UART: [art] Populate DV Done
24,380,827 UART: [fht] FMC Alias Private Key: 7
24,382,543 UART: [art] Derive CDI
24,383,360 UART: [art] Store in slot 0x4
24,439,870 UART: [art] Derive Key Pair
24,440,903 UART: [art] Store priv key in slot 0x5
27,733,117 UART: [art] Derive Key Pair - Done
27,745,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,035,044 UART: [art] Erasing AUTHORITY.KEYID = 7
30,036,564 UART: [art] PUB.X = 574C785A1FD83612A005A0BDE7A6ED37DAC2BE07913CB0A68A8AEE9D159BDAEC53ADE848F5FCA84A907ABF55CE7B00EF
30,043,858 UART: [art] PUB.Y = D460DAFB8DEC6F94147C5301E3183E810589F085825F59680BD3B601D69A391F9C5E5E31B35765460198E74CC76844B2
30,051,101 UART: [art] SIG.R = C215008BE9915BCA6BEF43C4E49DBD59BEBC637F0913BDD482664FFC5AA69CB4B2750A6BF31B6020652689D887943F8A
30,058,470 UART: [art] SIG.S = AA1541231ECCEAAF7CCE28F1C61A1F3DB6AF991B4DFEA317FAA2494B4BA5CF853D4F8D772F22284669C0D3F11DBEB3DA
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,267 writing to cptra_bootfsm_go
193,357 UART:
193,714 UART: Running Caliptra ROM ...
194,906 UART:
604,627 UART: [state] CFI Enabled
619,558 UART: [state] LifecycleState = Unprovisioned
621,491 UART: [state] DebugLocked = No
623,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,511 UART: [kat] SHA2-256
798,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,823 UART: [kat] ++
809,263 UART: [kat] sha1
821,619 UART: [kat] SHA2-256
824,335 UART: [kat] SHA2-384
830,389 UART: [kat] SHA2-512-ACC
832,749 UART: [kat] ECC-384
3,117,746 UART: [kat] HMAC-384Kdf
3,128,575 UART: [kat] LMS
4,318,685 UART: [kat] --
4,323,488 UART: [cold-reset] ++
4,325,165 UART: [fht] Storing FHT @ 0x50003400
4,336,357 UART: [idev] ++
4,336,984 UART: [idev] CDI.KEYID = 6
4,337,887 UART: [idev] SUBJECT.KEYID = 7
4,339,124 UART: [idev] UDS.KEYID = 0
4,340,182 ready_for_fw is high
4,340,375 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,384,411 UART: [idev] Erasing UDS.KEYID = 0
7,626,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,531 UART: [idev] --
7,653,494 UART: [ldev] ++
7,654,059 UART: [ldev] CDI.KEYID = 6
7,654,993 UART: [ldev] SUBJECT.KEYID = 5
7,656,197 UART: [ldev] AUTHORITY.KEYID = 7
7,657,477 UART: [ldev] FE.KEYID = 1
7,669,602 UART: [ldev] Erasing FE.KEYID = 1
10,962,005 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,918 UART: [ldev] --
13,322,497 UART: [fwproc] Waiting for Commands...
13,324,430 UART: [fwproc] Received command 0x46574c44
13,326,661 UART: [fwproc] Received Image of size 34948 bytes
16,409,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,482,645 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,555,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,591,081 >>> mbox cmd response: success
16,594,782 UART: [afmc] ++
16,595,370 UART: [afmc] CDI.KEYID = 6
16,596,330 UART: [afmc] SUBJECT.KEYID = 7
16,597,541 UART: [afmc] AUTHORITY.KEYID = 5
19,910,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,206,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,208,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,222,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,237,777 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,252,196 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,274,186 UART: [afmc] --
22,277,560 UART: [cold-reset] --
22,281,965 UART: [state] Locking Datavault
22,287,312 UART: [state] Locking PCR0, PCR1 and PCR31
22,289,061 UART: [state] Locking ICCM
22,291,521 UART: [exit] Launching FMC @ 0x40000130
22,299,916 UART:
22,300,154 UART: Running Caliptra FMC ...
22,301,248 UART:
22,301,401 UART: [state] CFI Enabled
22,309,444 UART: [fht] FMC Alias Private Key: 7
24,649,585 UART: [art] Extend RT PCRs Done
24,650,821 UART: [art] Lock RT PCRs Done
24,652,817 UART: [art] Populate DV Done
24,658,176 UART: [fht] FMC Alias Private Key: 7
24,659,710 UART: [art] Derive CDI
24,660,521 UART: [art] Store in slot 0x4
24,703,038 UART: [art] Derive Key Pair
24,704,039 UART: [art] Store priv key in slot 0x5
27,946,178 UART: [art] Derive Key Pair - Done
27,959,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,239,887 UART: [art] Erasing AUTHORITY.KEYID = 7
30,241,388 UART: [art] PUB.X = 8C49BB19A3BF504D2501EF3F7A7C05186D6228B65CA32D6E156D6B7F36859D07AF377595CB90CC08AB0297BE28057853
30,248,702 UART: [art] PUB.Y = A64050A3F600FBFEA3C9E58A924546A3524593ED23734079B325F77176BF851179F111F27D351FC23647181544CB733B
30,255,854 UART: [art] SIG.R = 4117E3906BC23BCCACF5FD18A6ADD7FFA57388E8261C579EFEBE87F4B51FA2C4395ED768BD9BA132B4F8B3912289DC33
30,263,274 UART: [art] SIG.S = 8E61BEEF4023C34A5D3B10B907361D9EBE35656528A7C092977B6ECD03E6BFA9CE1049AD5C15C11EC4F9F39D67058E6D
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
4,131,768 ready_for_fw is high
4,132,317 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,463,412 >>> mbox cmd response: success
22,108,380 UART:
22,108,761 UART: Running Caliptra FMC ...
22,110,028 UART:
22,110,208 UART: [state] CFI Enabled
22,118,361 UART: [fht] FMC Alias Private Key: 7
24,458,389 UART: [art] Extend RT PCRs Done
24,459,610 UART: [art] Lock RT PCRs Done
24,461,156 UART: [art] Populate DV Done
24,466,725 UART: [fht] FMC Alias Private Key: 7
24,468,264 UART: [art] Derive CDI
24,469,095 UART: [art] Store in slot 0x4
24,511,834 UART: [art] Derive Key Pair
24,512,871 UART: [art] Store priv key in slot 0x5
27,755,336 UART: [art] Derive Key Pair - Done
27,768,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,048,237 UART: [art] Erasing AUTHORITY.KEYID = 7
30,049,747 UART: [art] PUB.X = 505FCF106BFBC6030BA2E4AC057FA7C41AC60E22D1BF632A53328C0CB8AA817F2DC8E89A5905EA8D6A54BFF436468B4B
30,057,056 UART: [art] PUB.Y = 76C41CAE6A6423E83B902E0D24401FC0E7398E6E5F133A1E20FF8580F57164A825F770F476FC8F6AAFC08C213B0ADFBE
30,064,292 UART: [art] SIG.R = F5B9F315A67BADAC6E99BC3BEDA4A3980DAF688144E6274FBCA78E6583C0C0362C58ADC449D81E12A9DCDEB5EF836D16
30,071,747 UART: [art] SIG.S = 05917B9DC3E03CC22F91E5E01899F37DAC2F8ACACE5CFB8865ECED06835B03A481CAD952D7E965BC39D654F8C77C2BE4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,072 UART:
192,439 UART: Running Caliptra ROM ...
193,626 UART:
193,775 UART: [state] CFI Enabled
264,798 UART: [state] LifecycleState = Unprovisioned
266,768 UART: [state] DebugLocked = No
269,437 UART: [state] WD Timer not started. Device not locked for debugging
272,827 UART: [kat] SHA2-256
452,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,232 UART: [kat] ++
463,707 UART: [kat] sha1
473,870 UART: [kat] SHA2-256
476,597 UART: [kat] SHA2-384
482,801 UART: [kat] SHA2-512-ACC
485,192 UART: [kat] ECC-384
2,950,075 UART: [kat] HMAC-384Kdf
2,972,826 UART: [kat] LMS
3,449,285 UART: [kat] --
3,455,136 UART: [cold-reset] ++
3,456,360 UART: [fht] FHT @ 0x50003400
3,466,585 UART: [idev] ++
3,467,194 UART: [idev] CDI.KEYID = 6
3,468,105 UART: [idev] SUBJECT.KEYID = 7
3,469,355 UART: [idev] UDS.KEYID = 0
3,470,275 ready_for_fw is high
3,470,463 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,514,549 UART: [idev] Erasing UDS.KEYID = 0
5,989,037 UART: [idev] Sha1 KeyId Algorithm
6,012,970 UART: [idev] --
6,018,201 UART: [ldev] ++
6,018,834 UART: [ldev] CDI.KEYID = 6
6,019,767 UART: [ldev] SUBJECT.KEYID = 5
6,020,941 UART: [ldev] AUTHORITY.KEYID = 7
6,022,175 UART: [ldev] FE.KEYID = 1
6,059,670 UART: [ldev] Erasing FE.KEYID = 1
8,571,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,989 UART: [ldev] --
10,378,795 UART: [fwproc] Wait for Commands...
10,382,022 UART: [fwproc] Recv command 0x46574c44
10,384,065 UART: [fwproc] Recv'd Img size: 34948 bytes
12,840,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,917,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,990,262 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,025,787 >>> mbox cmd response: success
13,030,043 UART: [afmc] ++
13,030,641 UART: [afmc] CDI.KEYID = 6
13,031,551 UART: [afmc] SUBJECT.KEYID = 7
13,032,773 UART: [afmc] AUTHORITY.KEYID = 5
15,576,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,298,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,301,124 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,316,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,332,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,348,520 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,373,244 UART: [afmc] --
17,376,358 UART: [cold-reset] --
17,380,167 UART: [state] Locking Datavault
17,385,289 UART: [state] Locking PCR0, PCR1 and PCR31
17,387,075 UART: [state] Locking ICCM
17,388,634 UART: [exit] Launching FMC @ 0x40000130
17,397,030 UART:
17,397,270 UART: Running Caliptra FMC ...
17,398,376 UART:
17,398,543 UART: [state] CFI Enabled
17,454,690 UART: [fht] FMC Alias Private Key: 7
19,221,231 UART: [art] Extend RT PCRs Done
19,222,457 UART: [art] Lock RT PCRs Done
19,224,163 UART: [art] Populate DV Done
19,229,625 UART: [fht] FMC Alias Private Key: 7
19,231,217 UART: [art] Derive CDI
19,231,965 UART: [art] Store in slot 0x4
19,287,368 UART: [art] Derive Key Pair
19,288,367 UART: [art] Store priv key in slot 0x5
21,750,753 UART: [art] Derive Key Pair - Done
21,763,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,488,428 UART: [art] Erasing AUTHORITY.KEYID = 7
23,489,946 UART: [art] PUB.X = 088FBD0DC0FECC2BD8834744B2137320A4481F6D5A4AACF705E17A89FF8A71FBE97BD5C297D210B846E88CBE489FC8A0
23,497,216 UART: [art] PUB.Y = 4A2DF885B34B00A42D2FAC1B1991F0CAFA3B3633EC3FF2A3DD8DB427B0982715339FE1062D0A25BCE5FE090390799074
23,504,462 UART: [art] SIG.R = FD006845E9ED667D1FB03EA96C1AF023F872A93BB08492C9C0E19186800768D7CE34922222628DAFC4D88BE34FED800B
23,511,805 UART: [art] SIG.S = 90D98B95C63255D502CDE1ACD50A2DF0C698D5839D7439389E78217AC74E3904B2DDCA38810C9F85A8FAAB3F9B0E2058
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,463,115 ready_for_fw is high
3,463,497 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,900,411 >>> mbox cmd response: success
17,185,729 UART:
17,186,147 UART: Running Caliptra FMC ...
17,187,369 UART:
17,187,541 UART: [state] CFI Enabled
17,252,662 UART: [fht] FMC Alias Private Key: 7
19,019,684 UART: [art] Extend RT PCRs Done
19,020,908 UART: [art] Lock RT PCRs Done
19,022,231 UART: [art] Populate DV Done
19,027,486 UART: [fht] FMC Alias Private Key: 7
19,029,143 UART: [art] Derive CDI
19,029,966 UART: [art] Store in slot 0x4
19,085,597 UART: [art] Derive Key Pair
19,086,646 UART: [art] Store priv key in slot 0x5
21,549,122 UART: [art] Derive Key Pair - Done
21,562,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,275,706 UART: [art] Erasing AUTHORITY.KEYID = 7
23,277,218 UART: [art] PUB.X = 19144B3F76C77A40FF32254622B0E16B0BF2074DC57F22F5A16DB29888FB55351A251CADE363C158AB5D3D8C29045DCE
23,284,441 UART: [art] PUB.Y = AF68EB431ABEF980D1CF18A63CB68CA468E5F8ECE1D503F79AC98EB91DCE23E9B90A8A9E2834007CA1F10E4F9E0A6F04
23,291,713 UART: [art] SIG.R = 8E4768005FDCF25FCD5B06E1302B7A9D49EF9181E802D532540E91885E0910885855B6BF9CD52556974FD8106ABBD727
23,299,086 UART: [art] SIG.S = AF1811DD6AEF892D67FD86FC2758E4FEAA244D9F0D57AF76B49284A19F7ED600777A3FA252750FABD1BCF9B80585B264
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,432 UART:
192,793 UART: Running Caliptra ROM ...
193,896 UART:
603,622 UART: [state] CFI Enabled
616,926 UART: [state] LifecycleState = Unprovisioned
618,796 UART: [state] DebugLocked = No
621,764 UART: [state] WD Timer not started. Device not locked for debugging
626,304 UART: [kat] SHA2-256
805,911 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,757 UART: [kat] ++
817,288 UART: [kat] sha1
828,536 UART: [kat] SHA2-256
831,218 UART: [kat] SHA2-384
837,285 UART: [kat] SHA2-512-ACC
839,651 UART: [kat] ECC-384
3,283,396 UART: [kat] HMAC-384Kdf
3,294,932 UART: [kat] LMS
3,771,458 UART: [kat] --
3,776,298 UART: [cold-reset] ++
3,777,301 UART: [fht] FHT @ 0x50003400
3,788,650 UART: [idev] ++
3,789,258 UART: [idev] CDI.KEYID = 6
3,790,268 UART: [idev] SUBJECT.KEYID = 7
3,791,442 UART: [idev] UDS.KEYID = 0
3,792,485 ready_for_fw is high
3,792,686 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,836,705 UART: [idev] Erasing UDS.KEYID = 0
6,270,121 UART: [idev] Sha1 KeyId Algorithm
6,292,966 UART: [idev] --
6,297,280 UART: [ldev] ++
6,297,850 UART: [ldev] CDI.KEYID = 6
6,298,862 UART: [ldev] SUBJECT.KEYID = 5
6,300,017 UART: [ldev] AUTHORITY.KEYID = 7
6,301,244 UART: [ldev] FE.KEYID = 1
6,313,611 UART: [ldev] Erasing FE.KEYID = 1
8,791,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,229 UART: [ldev] --
10,583,925 UART: [fwproc] Wait for Commands...
10,586,551 UART: [fwproc] Recv command 0x46574c44
10,588,641 UART: [fwproc] Recv'd Img size: 34948 bytes
13,048,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,127,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,200,132 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,235,959 >>> mbox cmd response: success
13,240,378 UART: [afmc] ++
13,240,962 UART: [afmc] CDI.KEYID = 6
13,241,927 UART: [afmc] SUBJECT.KEYID = 7
13,243,135 UART: [afmc] AUTHORITY.KEYID = 5
15,745,963 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,465,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,468,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,483,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,499,952 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,515,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,539,385 UART: [afmc] --
17,542,602 UART: [cold-reset] --
17,545,499 UART: [state] Locking Datavault
17,551,007 UART: [state] Locking PCR0, PCR1 and PCR31
17,552,824 UART: [state] Locking ICCM
17,554,384 UART: [exit] Launching FMC @ 0x40000130
17,562,785 UART:
17,563,018 UART: Running Caliptra FMC ...
17,564,122 UART:
17,564,277 UART: [state] CFI Enabled
17,572,379 UART: [fht] FMC Alias Private Key: 7
19,338,328 UART: [art] Extend RT PCRs Done
19,339,565 UART: [art] Lock RT PCRs Done
19,341,084 UART: [art] Populate DV Done
19,346,595 UART: [fht] FMC Alias Private Key: 7
19,348,131 UART: [art] Derive CDI
19,348,860 UART: [art] Store in slot 0x4
19,391,750 UART: [art] Derive Key Pair
19,392,784 UART: [art] Store priv key in slot 0x5
21,819,346 UART: [art] Derive Key Pair - Done
21,832,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,538,227 UART: [art] Erasing AUTHORITY.KEYID = 7
23,539,735 UART: [art] PUB.X = A8143A72EC3F86E0DDD57A082ECA616690437D9C282D5214F7CFB8E8050C123176F0A1E5D955821B54B9B90E4DD9046C
23,547,038 UART: [art] PUB.Y = 4A9317A9ABF76A919549BCACFA10EEE0A6B62D42199D7917DC2F3CC3E59D4A1C4C098390AA216D89179660B36BF1ABD3
23,554,298 UART: [art] SIG.R = F1BCD7A0AA4EAA6461E90862F93117927CD69466046877E5E42C1D7DB7DBF009D99B221D163CAC98E301D78F6E8331D7
23,561,700 UART: [art] SIG.S = 6B1507BF293BE4F30C69A2E98DE4984636055BB60FC21C59F2A8825E348335A7188A6EE4D3E56B2A602684C62BCB5058
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,784,876 ready_for_fw is high
3,785,706 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,117,241 >>> mbox cmd response: success
17,370,887 UART:
17,371,274 UART: Running Caliptra FMC ...
17,372,547 UART:
17,372,713 UART: [state] CFI Enabled
17,380,485 UART: [fht] FMC Alias Private Key: 7
19,146,917 UART: [art] Extend RT PCRs Done
19,148,148 UART: [art] Lock RT PCRs Done
19,149,768 UART: [art] Populate DV Done
19,154,887 UART: [fht] FMC Alias Private Key: 7
19,156,374 UART: [art] Derive CDI
19,157,524 UART: [art] Store in slot 0x4
19,200,525 UART: [art] Derive Key Pair
19,201,524 UART: [art] Store priv key in slot 0x5
21,628,638 UART: [art] Derive Key Pair - Done
21,641,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,348,520 UART: [art] Erasing AUTHORITY.KEYID = 7
23,350,440 UART: [art] PUB.X = 87B9F995DFFA3B1FDDA1B7EC28063B0B6418E6DE1BA7E8428ADFBE2FE39D4D59CEFC6AC65ED9024270D51F0798AC176F
23,357,348 UART: [art] PUB.Y = 28A7C1F1A8947C5B633E8187CB2F83AC2EFFB8FC4E164318CCC97D6100EBD8909376FC6A7B604019DA15FCA3B0802D86
23,364,572 UART: [art] SIG.R = DF6A44D200BF9663AA2D8FE39DA3C610D2BF8164C705C6FE4A4119EFE4980644C94E7A23F7635D410878CF95CF69754E
23,371,983 UART: [art] SIG.S = 0014625BFB02ACA0000C222ED7E0BCE6EADDAAC1AD9BC1B3D7126BABF707ACAD178AA6BE64CA0AE5CCA0677DF249E937
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
192,172 UART:
192,558 UART: Running Caliptra ROM ...
193,749 UART:
193,901 UART: [state] CFI Enabled
267,072 UART: [state] LifecycleState = Unprovisioned
269,490 UART: [state] DebugLocked = No
272,303 UART: [state] WD Timer not started. Device not locked for debugging
277,123 UART: [kat] SHA2-256
466,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,769 UART: [kat] ++
478,258 UART: [kat] sha1
489,926 UART: [kat] SHA2-256
492,896 UART: [kat] SHA2-384
499,603 UART: [kat] SHA2-512-ACC
502,191 UART: [kat] ECC-384
2,950,782 UART: [kat] HMAC-384Kdf
2,972,970 UART: [kat] LMS
3,504,686 UART: [kat] --
3,509,101 UART: [cold-reset] ++
3,511,244 UART: [fht] FHT @ 0x50003400
3,523,284 UART: [idev] ++
3,524,001 UART: [idev] CDI.KEYID = 6
3,524,916 UART: [idev] SUBJECT.KEYID = 7
3,526,160 UART: [idev] UDS.KEYID = 0
3,527,081 ready_for_fw is high
3,527,289 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,571,611 UART: [idev] Erasing UDS.KEYID = 0
6,030,215 UART: [idev] Sha1 KeyId Algorithm
6,051,715 UART: [idev] --
6,056,356 UART: [ldev] ++
6,057,047 UART: [ldev] CDI.KEYID = 6
6,057,960 UART: [ldev] SUBJECT.KEYID = 5
6,059,174 UART: [ldev] AUTHORITY.KEYID = 7
6,060,353 UART: [ldev] FE.KEYID = 1
6,100,980 UART: [ldev] Erasing FE.KEYID = 1
8,604,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,737 UART: [ldev] --
10,414,411 UART: [fwproc] Wait for Commands...
10,417,216 UART: [fwproc] Recv command 0x46574c44
10,419,530 UART: [fwproc] Recv'd Img size: 34948 bytes
12,892,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,973,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,097,262 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,155,082 >>> mbox cmd response: success
13,160,036 UART: [afmc] ++
13,160,623 UART: [afmc] CDI.KEYID = 6
13,161,866 UART: [afmc] SUBJECT.KEYID = 7
13,163,298 UART: [afmc] AUTHORITY.KEYID = 5
15,700,425 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,423,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,425,697 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,440,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,455,945 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,470,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,493,618 UART: [afmc] --
17,497,047 UART: [cold-reset] --
17,503,288 UART: [state] Locking Datavault
17,508,753 UART: [state] Locking PCR0, PCR1 and PCR31
17,510,888 UART: [state] Locking ICCM
17,513,472 UART: [exit] Launching FMC @ 0x40000130
17,522,137 UART:
17,522,369 UART: Running Caliptra FMC ...
17,523,467 UART:
17,523,623 UART: [state] CFI Enabled
17,579,748 UART: [fht] FMC Alias Private Key: 7
19,346,092 UART: [art] Extend RT PCRs Done
19,347,311 UART: [art] Lock RT PCRs Done
19,349,419 UART: [art] Populate DV Done
19,354,649 UART: [fht] FMC Alias Private Key: 7
19,356,326 UART: [art] Derive CDI
19,357,142 UART: [art] Store in slot 0x4
19,412,107 UART: [art] Derive Key Pair
19,413,148 UART: [art] Store priv key in slot 0x5
21,875,817 UART: [art] Derive Key Pair - Done
21,888,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,601,782 UART: [art] Erasing AUTHORITY.KEYID = 7
23,603,282 UART: [art] PUB.X = 3A21B9F5C6807331290AE90A2D103EEA5947169F791DD58BDF3460A692B20F7B73337FAD59B4AE1C4E28637C9B046819
23,610,596 UART: [art] PUB.Y = 0F6F2A94177926E466C1DAE053A0CED1C1B25846A7D341FBD430E01B81A948B03FA627EAD9177F4AE386619C3F543306
23,617,802 UART: [art] SIG.R = C2A5F7B777629863392D06D77CB82A48577F44853FA16556809000BBB25ED6B6C9377EBAE956E27E6097BC1D354FA5EA
23,625,198 UART: [art] SIG.S = 6ED193F192BA37530298CE9309EF8F9FDDEB4D0F305D535E6AA02B072E38400000B3EEB32F3D1D0B1110F262A01C2691
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,438,297 ready_for_fw is high
3,438,877 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,029,933 >>> mbox cmd response: success
17,318,030 UART:
17,318,411 UART: Running Caliptra FMC ...
17,319,610 UART:
17,319,764 UART: [state] CFI Enabled
17,389,933 UART: [fht] FMC Alias Private Key: 7
19,155,755 UART: [art] Extend RT PCRs Done
19,156,981 UART: [art] Lock RT PCRs Done
19,158,822 UART: [art] Populate DV Done
19,164,390 UART: [fht] FMC Alias Private Key: 7
19,165,932 UART: [art] Derive CDI
19,166,747 UART: [art] Store in slot 0x4
19,222,582 UART: [art] Derive Key Pair
19,223,583 UART: [art] Store priv key in slot 0x5
21,686,553 UART: [art] Derive Key Pair - Done
21,699,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,412,295 UART: [art] Erasing AUTHORITY.KEYID = 7
23,413,800 UART: [art] PUB.X = 10D58E53A7F1FC77C3E24571F5783FC9B7E8DBA0470880C68049F2800369A2A7646602D24F6E95645EEF07D79B645D62
23,421,046 UART: [art] PUB.Y = 3CC52A5A0FB2AFB00AA096C865A5D8C7A7B449E4A510BC6866E76045126BFDE3F441D24679EFB5A3DBD82BF616DB82BF
23,428,362 UART: [art] SIG.R = 95D528636FFC4C4D6C4DD924854BE7E903A018416D3E61C04643A76568C95BC419E420F3B8EAB6126943D743F46E88E7
23,435,706 UART: [art] SIG.S = 8EED0D1FA3466668A3308BD429EF3116ADCB5390414EAC8288DAA7041AD7F2B1EA3F5F62D5C6C7FE7540787EAAE1753E
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,515 UART:
192,873 UART: Running Caliptra ROM ...
193,994 UART:
603,677 UART: [state] CFI Enabled
620,978 UART: [state] LifecycleState = Unprovisioned
623,308 UART: [state] DebugLocked = No
626,102 UART: [state] WD Timer not started. Device not locked for debugging
629,846 UART: [kat] SHA2-256
819,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,294 UART: [kat] ++
830,810 UART: [kat] sha1
841,820 UART: [kat] SHA2-256
844,819 UART: [kat] SHA2-384
851,397 UART: [kat] SHA2-512-ACC
853,975 UART: [kat] ECC-384
3,296,605 UART: [kat] HMAC-384Kdf
3,310,541 UART: [kat] LMS
3,842,365 UART: [kat] --
3,847,840 UART: [cold-reset] ++
3,849,774 UART: [fht] FHT @ 0x50003400
3,861,528 UART: [idev] ++
3,862,158 UART: [idev] CDI.KEYID = 6
3,863,133 UART: [idev] SUBJECT.KEYID = 7
3,864,374 UART: [idev] UDS.KEYID = 0
3,865,293 ready_for_fw is high
3,865,480 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,909,708 UART: [idev] Erasing UDS.KEYID = 0
6,341,124 UART: [idev] Sha1 KeyId Algorithm
6,363,489 UART: [idev] --
6,367,314 UART: [ldev] ++
6,368,099 UART: [ldev] CDI.KEYID = 6
6,369,021 UART: [ldev] SUBJECT.KEYID = 5
6,370,225 UART: [ldev] AUTHORITY.KEYID = 7
6,371,404 UART: [ldev] FE.KEYID = 1
6,384,480 UART: [ldev] Erasing FE.KEYID = 1
8,865,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,710 UART: [ldev] --
10,657,888 UART: [fwproc] Wait for Commands...
10,660,841 UART: [fwproc] Recv command 0x46574c44
10,663,145 UART: [fwproc] Recv'd Img size: 34948 bytes
13,131,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,213,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,337,283 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,395,703 >>> mbox cmd response: success
13,399,228 UART: [afmc] ++
13,399,811 UART: [afmc] CDI.KEYID = 6
13,401,055 UART: [afmc] SUBJECT.KEYID = 7
13,402,499 UART: [afmc] AUTHORITY.KEYID = 5
15,910,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,631,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,633,736 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,648,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,664,000 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,678,896 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,701,918 UART: [afmc] --
17,705,129 UART: [cold-reset] --
17,709,529 UART: [state] Locking Datavault
17,712,895 UART: [state] Locking PCR0, PCR1 and PCR31
17,715,053 UART: [state] Locking ICCM
17,717,321 UART: [exit] Launching FMC @ 0x40000130
17,725,998 UART:
17,726,232 UART: Running Caliptra FMC ...
17,727,328 UART:
17,727,482 UART: [state] CFI Enabled
17,735,212 UART: [fht] FMC Alias Private Key: 7
19,501,310 UART: [art] Extend RT PCRs Done
19,502,518 UART: [art] Lock RT PCRs Done
19,504,518 UART: [art] Populate DV Done
19,509,806 UART: [fht] FMC Alias Private Key: 7
19,511,452 UART: [art] Derive CDI
19,512,268 UART: [art] Store in slot 0x4
19,554,417 UART: [art] Derive Key Pair
19,555,407 UART: [art] Store priv key in slot 0x5
21,982,327 UART: [art] Derive Key Pair - Done
21,994,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,701,143 UART: [art] Erasing AUTHORITY.KEYID = 7
23,702,647 UART: [art] PUB.X = 63F21F5F2281DB33D10436172E71F9826D4B4A2B4FAF07E396613B9E0BA2F4A0E5BFF2C6891DC055EAA87D0A052E2450
23,709,914 UART: [art] PUB.Y = D89A8B785C600C414D4D9ED776537F8ECD18AEFF903AE70F3504862872BA091296030FA5DDC692B3E88967C886A4095D
23,717,157 UART: [art] SIG.R = 91A0259DB42462A15256781710E47FEAE9F786057357E9CBBC94CAC210A2DD31678E231AB8E68A36BF8D82C0826BF0A9
23,724,568 UART: [art] SIG.S = C6CC01B5ECB4C67AB70B7193B9CD5BAE3F74EF8607352641123EFC4395CE050EBAFD389C92F33D72A545064BF58101D8
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,676 writing to cptra_bootfsm_go
3,758,883 ready_for_fw is high
3,759,714 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,264,847 >>> mbox cmd response: success
17,514,107 UART:
17,514,545 UART: Running Caliptra FMC ...
17,515,729 UART:
17,515,882 UART: [state] CFI Enabled
17,523,664 UART: [fht] FMC Alias Private Key: 7
19,290,180 UART: [art] Extend RT PCRs Done
19,291,392 UART: [art] Lock RT PCRs Done
19,293,092 UART: [art] Populate DV Done
19,298,556 UART: [fht] FMC Alias Private Key: 7
19,300,207 UART: [art] Derive CDI
19,300,944 UART: [art] Store in slot 0x4
19,343,978 UART: [art] Derive Key Pair
19,345,043 UART: [art] Store priv key in slot 0x5
21,771,709 UART: [art] Derive Key Pair - Done
21,784,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,491,195 UART: [art] Erasing AUTHORITY.KEYID = 7
23,492,697 UART: [art] PUB.X = 5274CABA6916A64AB0AA7CCE87C93A8F9C972077207A0CF7F289F676DDE23EF51F758E612A8CE0744325B41103B9F3C5
23,500,010 UART: [art] PUB.Y = 97C7DCAB73CDBDF01B0AAE4087FCE4AC1D36A520E8F4D10C6EB48397A9C3AD679924779B5D62A2F802A20E246039B5B3
23,507,243 UART: [art] SIG.R = 251D548A474145C15A75117C97510DE38BF35637AAEA70F3097AA491E8C0D92175F4B31F46B8B2236340867257A812DD
23,514,644 UART: [art] SIG.S = 8B2EB0B0DC01BA1BB59BC9141F9B56206154DB4A7D0C069AC9605DB0E899B49501F5C517D815635FF610FA74470CB096
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,560 UART: [kat] HMAC-384Kdf
906,934 UART: [kat] LMS
1,475,130 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,461 UART: [fht] Storing FHT @ 0x50003400
1,479,414 UART: [idev] ++
1,479,582 UART: [idev] CDI.KEYID = 6
1,479,942 UART: [idev] SUBJECT.KEYID = 7
1,480,366 UART: [idev] UDS.KEYID = 0
1,480,711 ready_for_fw is high
1,480,711 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,258 UART: [idev] Erasing UDS.KEYID = 0
1,505,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,008 UART: [idev] --
1,514,867 UART: [ldev] ++
1,515,035 UART: [ldev] CDI.KEYID = 6
1,515,398 UART: [ldev] SUBJECT.KEYID = 5
1,515,824 UART: [ldev] AUTHORITY.KEYID = 7
1,516,287 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,313 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,950 UART: [ldev] --
1,586,435 UART: [fwproc] Waiting for Commands...
1,587,184 UART: [fwproc] Received command 0x46574c44
1,587,975 UART: [fwproc] Received Image of size 34948 bytes
1,975,927 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,003,241 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,034,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,049,378 >>> mbox cmd response: success
2,050,512 UART: [afmc] ++
2,050,680 UART: [afmc] CDI.KEYID = 6
2,051,042 UART: [afmc] SUBJECT.KEYID = 7
2,051,467 UART: [afmc] AUTHORITY.KEYID = 5
2,086,130 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,108,921 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,114,804 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,487 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,359 UART: [afmc] --
2,129,373 UART: [cold-reset] --
2,130,237 UART: [state] Locking Datavault
2,131,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,906 UART: [state] Locking ICCM
2,132,414 UART: [exit] Launching FMC @ 0x40000130
2,137,744 UART:
2,137,760 UART: Running Caliptra FMC ...
2,138,168 UART:
2,138,222 UART: [state] CFI Enabled
2,148,550 UART: [fht] FMC Alias Private Key: 7
2,267,078 UART: [art] Extend RT PCRs Done
2,267,506 UART: [art] Lock RT PCRs Done
2,269,078 UART: [art] Populate DV Done
2,277,351 UART: [fht] FMC Alias Private Key: 7
2,278,425 UART: [art] Derive CDI
2,278,705 UART: [art] Store in slot 0x4
2,364,353 UART: [art] Derive Key Pair
2,364,713 UART: [art] Store priv key in slot 0x5
2,378,104 UART: [art] Derive Key Pair - Done
2,392,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,408,407 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,172 UART: [art] PUB.X = A129391BC42D846158BE091FF505E14650BF7CE67138160AC9CB3F1C338A76627EDB9E155C00BFD9ABB728C6012A21AE
2,415,916 UART: [art] PUB.Y = 8236FE03C2AD5A1A3F2F6FB6C5B550F468E27429480901C5B7FE587133EC2E03A140C6EE9BAEF32C2E5B8F4C9C6EE84C
2,422,870 UART: [art] SIG.R = F82D3801A501699CC4E3286FE2B8EF54379AE282F4E35CBD1208F20208BF1E07ECCA0C5E14FECA05A72C39F46761F462
2,429,626 UART: [art] SIG.S = 421CA63B4B6B3E50747DAF4BACB88641192D013882C940DF30C0A52F6CD6E4DEB03BDCDD965A3F3562095BC93E769663
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,323 ready_for_fw is high
1,362,323 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,897,846 >>> mbox cmd response: success
1,959,809 UART:
1,959,825 UART: Running Caliptra FMC ...
1,960,233 UART:
1,960,287 UART: [state] CFI Enabled
1,970,591 UART: [fht] FMC Alias Private Key: 7
2,090,679 UART: [art] Extend RT PCRs Done
2,091,107 UART: [art] Lock RT PCRs Done
2,092,681 UART: [art] Populate DV Done
2,101,054 UART: [fht] FMC Alias Private Key: 7
2,101,982 UART: [art] Derive CDI
2,102,262 UART: [art] Store in slot 0x4
2,188,074 UART: [art] Derive Key Pair
2,188,434 UART: [art] Store priv key in slot 0x5
2,201,745 UART: [art] Derive Key Pair - Done
2,216,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,231,759 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,524 UART: [art] PUB.X = 9E52B4F791692A19F176BD65F18DD18B676C7C6E8BCBC512D1CD27F00D23A93ECCE4C80335B2422D0B03E9CABF7C48DA
2,239,300 UART: [art] PUB.Y = D8DC7B01680D3C306A273D398C7F60A5E54E749C4C698B7CB76E1E1E2C72040EEC57F9AC7BE30948CAD5DDE1E5D1268F
2,246,251 UART: [art] SIG.R = 81996A932EB392ACBD2C0456A037E1EA0DDC46A6696D400946AFFA11FF124B4305D427E346611BD03E0762FEC1CD84AE
2,253,016 UART: [art] SIG.S = 2A685DBFDAF4C5B6BAC59D5FC3900CE8E086F98568309DE4F0A7593BF47718BC0823AEE08BF32D418EEFCB72494AB076
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,266 UART: [kat] SHA2-256
882,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,312 UART: [kat] ++
886,464 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,141 UART: [kat] SHA2-512-ACC
897,042 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
907,287 UART: [kat] LMS
1,475,483 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,030 UART: [fht] Storing FHT @ 0x50003400
1,479,847 UART: [idev] ++
1,480,015 UART: [idev] CDI.KEYID = 6
1,480,375 UART: [idev] SUBJECT.KEYID = 7
1,480,799 UART: [idev] UDS.KEYID = 0
1,481,144 ready_for_fw is high
1,481,144 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,867 UART: [idev] Erasing UDS.KEYID = 0
1,505,345 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,117 UART: [idev] --
1,515,210 UART: [ldev] ++
1,515,378 UART: [ldev] CDI.KEYID = 6
1,515,741 UART: [ldev] SUBJECT.KEYID = 5
1,516,167 UART: [ldev] AUTHORITY.KEYID = 7
1,516,630 UART: [ldev] FE.KEYID = 1
1,522,076 UART: [ldev] Erasing FE.KEYID = 1
1,547,531 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,489 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 34948 bytes
1,974,590 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,001,556 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,032,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,047,701 >>> mbox cmd response: success
2,048,711 UART: [afmc] ++
2,048,879 UART: [afmc] CDI.KEYID = 6
2,049,241 UART: [afmc] SUBJECT.KEYID = 7
2,049,666 UART: [afmc] AUTHORITY.KEYID = 5
2,085,267 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,363 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,107,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,113,735 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,418 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,400 UART: [afmc] --
2,128,442 UART: [cold-reset] --
2,129,336 UART: [state] Locking Datavault
2,130,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,131,049 UART: [state] Locking ICCM
2,131,511 UART: [exit] Launching FMC @ 0x40000130
2,136,841 UART:
2,136,857 UART: Running Caliptra FMC ...
2,137,265 UART:
2,137,408 UART: [state] CFI Enabled
2,148,486 UART: [fht] FMC Alias Private Key: 7
2,267,706 UART: [art] Extend RT PCRs Done
2,268,134 UART: [art] Lock RT PCRs Done
2,269,774 UART: [art] Populate DV Done
2,278,123 UART: [fht] FMC Alias Private Key: 7
2,279,183 UART: [art] Derive CDI
2,279,463 UART: [art] Store in slot 0x4
2,365,331 UART: [art] Derive Key Pair
2,365,691 UART: [art] Store priv key in slot 0x5
2,379,564 UART: [art] Derive Key Pair - Done
2,394,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,838 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,603 UART: [art] PUB.X = 575F1C62537E0BD7A96F2770D5299CE8AE2D1BB29EA136E60FC8524DB601FC5D4ADE4F3AEEF423506A74804B9F6AA0AB
2,417,382 UART: [art] PUB.Y = 2D829704D88E82FD08854A220F70031B663CFB9D4F25D681DF7C53F9CDF08BCEEFA41C1594A8A125B5656E28DCD177A5
2,424,330 UART: [art] SIG.R = BC2ABB8B311FE8303BD039706531C3CA76B92B56F977C42C67D736921BB5601892C863D7A0C820EAC5C031ACDCC4B694
2,431,108 UART: [art] SIG.S = 7311F01FC9300404EE4B50871073E4118AA0441669690F1F0872D156256892A790B3C5308073946E1430E1127748EBF1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,899,253 >>> mbox cmd response: success
1,960,444 UART:
1,960,460 UART: Running Caliptra FMC ...
1,960,868 UART:
1,961,011 UART: [state] CFI Enabled
1,971,709 UART: [fht] FMC Alias Private Key: 7
2,090,785 UART: [art] Extend RT PCRs Done
2,091,213 UART: [art] Lock RT PCRs Done
2,093,199 UART: [art] Populate DV Done
2,101,508 UART: [fht] FMC Alias Private Key: 7
2,102,476 UART: [art] Derive CDI
2,102,756 UART: [art] Store in slot 0x4
2,188,434 UART: [art] Derive Key Pair
2,188,794 UART: [art] Store priv key in slot 0x5
2,202,381 UART: [art] Derive Key Pair - Done
2,217,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,934 UART: [art] PUB.X = 77460460C8B570378EC5217717690E74C974749F48F1D5C7684EA9924D744221A7D380CD4680BC83B6A62497FE3E4A2F
2,239,688 UART: [art] PUB.Y = CDA87BBB9EA0EBD912AA71D7379BF0D7137FD322B3E85F2FEB5F80AF9AA295E6A59B8615CB6B643992444526B98E3BF9
2,246,656 UART: [art] SIG.R = FC02189430506C19917308D7F7562824C5F4F872031E41B423A04EF989CE98D676B84F9709CA1B59D415AA253E4E68A9
2,253,406 UART: [art] SIG.S = E1BEE618188E40ACB35FCDB030A94966DF9E4A218D6B2E093F9EB162E55712568BB5C1A21D4056BE72E9915B3DB906A7
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,155 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,084 UART: [kat] ++
895,236 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,800 UART: [idev] ++
1,172,968 UART: [idev] CDI.KEYID = 6
1,173,329 UART: [idev] SUBJECT.KEYID = 7
1,173,754 UART: [idev] UDS.KEYID = 0
1,174,100 ready_for_fw is high
1,174,100 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,199,117 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,208,870 UART: [ldev] ++
1,209,038 UART: [ldev] CDI.KEYID = 6
1,209,402 UART: [ldev] SUBJECT.KEYID = 5
1,209,829 UART: [ldev] AUTHORITY.KEYID = 7
1,210,292 UART: [ldev] FE.KEYID = 1
1,215,654 UART: [ldev] Erasing FE.KEYID = 1
1,241,517 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,604 UART: [ldev] --
1,280,835 UART: [fwproc] Wait for Commands...
1,281,542 UART: [fwproc] Recv command 0x46574c44
1,282,275 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,538 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,485 >>> mbox cmd response: success
1,744,639 UART: [afmc] ++
1,744,807 UART: [afmc] CDI.KEYID = 6
1,745,170 UART: [afmc] SUBJECT.KEYID = 7
1,745,596 UART: [afmc] AUTHORITY.KEYID = 5
1,781,239 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,651 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,372 UART: [afmc] --
1,824,325 UART: [cold-reset] --
1,825,361 UART: [state] Locking Datavault
1,826,792 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,396 UART: [state] Locking ICCM
1,828,058 UART: [exit] Launching FMC @ 0x40000130
1,833,388 UART:
1,833,404 UART: Running Caliptra FMC ...
1,833,812 UART:
1,833,866 UART: [state] CFI Enabled
1,844,594 UART: [fht] FMC Alias Private Key: 7
1,963,184 UART: [art] Extend RT PCRs Done
1,963,612 UART: [art] Lock RT PCRs Done
1,965,064 UART: [art] Populate DV Done
1,973,277 UART: [fht] FMC Alias Private Key: 7
1,974,237 UART: [art] Derive CDI
1,974,517 UART: [art] Store in slot 0x4
2,060,336 UART: [art] Derive Key Pair
2,060,696 UART: [art] Store priv key in slot 0x5
2,074,236 UART: [art] Derive Key Pair - Done
2,088,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,249 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,014 UART: [art] PUB.X = 958AB43A7BFDEE489C817B161315B8E9D3448B967AA622D837AACD8E1284F597717D94943F611BC8FCA825C8E574B55C
2,111,790 UART: [art] PUB.Y = 18BC1D3B7117B1B2A293E6A102FC58D77C3090013CB7D82E46174567F799EE45BF55C4BFDB1EC7D19F9D84A086DDCDE2
2,118,748 UART: [art] SIG.R = 125154754ADE7D7675C1CE4902813553B208C1166FDCD1CBF9C7DD013119282C1D85445DB522FCA854BE40F5C789B59D
2,125,511 UART: [art] SIG.S = 9767BBBA6ACE02276662AA611BC6FCA8D25DCCA09704271C6181317FECD2C8D013379933848532103A61FDC2C0CBD166
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,662 ready_for_fw is high
1,059,662 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,800 >>> mbox cmd response: success
1,657,877 UART:
1,657,893 UART: Running Caliptra FMC ...
1,658,301 UART:
1,658,355 UART: [state] CFI Enabled
1,668,653 UART: [fht] FMC Alias Private Key: 7
1,787,547 UART: [art] Extend RT PCRs Done
1,787,975 UART: [art] Lock RT PCRs Done
1,789,537 UART: [art] Populate DV Done
1,797,584 UART: [fht] FMC Alias Private Key: 7
1,798,514 UART: [art] Derive CDI
1,798,794 UART: [art] Store in slot 0x4
1,884,835 UART: [art] Derive Key Pair
1,885,195 UART: [art] Store priv key in slot 0x5
1,898,059 UART: [art] Derive Key Pair - Done
1,912,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,576 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,341 UART: [art] PUB.X = D19BD32158E77182AC619B6739527A76C1C5569F65B5A34FEA4ADD9FB1A7D4035969E87091DD566957077C492DA09CA8
1,936,105 UART: [art] PUB.Y = 08A8B9126D3D74DEFDA6DC700D4390570C2C9424EC0AE62B89B4972E69A269933BD6382A98A2D4645D32CC800EDC31C8
1,943,046 UART: [art] SIG.R = 4660E3493B6EA529C7511D33A86DC9AECF0F72C7EF49B0021346784E1BF882E346A04A0FAEB01EA35D31280D7BE444BB
1,949,814 UART: [art] SIG.S = 54783BBF44442A7E0D139FE86CD107C7912BC9D42D98B265BC07F53FE6D4C78DE7DC63966431EA3B2265C3E4A813A8D4
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,658 UART: [kat] HMAC-384Kdf
921,392 UART: [kat] LMS
1,169,704 UART: [kat] --
1,170,645 UART: [cold-reset] ++
1,171,193 UART: [fht] FHT @ 0x50003400
1,173,729 UART: [idev] ++
1,173,897 UART: [idev] CDI.KEYID = 6
1,174,258 UART: [idev] SUBJECT.KEYID = 7
1,174,683 UART: [idev] UDS.KEYID = 0
1,175,029 ready_for_fw is high
1,175,029 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,199,484 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,331 UART: [ldev] ++
1,209,499 UART: [ldev] CDI.KEYID = 6
1,209,863 UART: [ldev] SUBJECT.KEYID = 5
1,210,290 UART: [ldev] AUTHORITY.KEYID = 7
1,210,753 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,057 UART: [ldev] --
1,281,330 UART: [fwproc] Wait for Commands...
1,282,013 UART: [fwproc] Recv command 0x46574c44
1,282,746 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,281 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,961 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,904 >>> mbox cmd response: success
1,745,000 UART: [afmc] ++
1,745,168 UART: [afmc] CDI.KEYID = 6
1,745,531 UART: [afmc] SUBJECT.KEYID = 7
1,745,957 UART: [afmc] AUTHORITY.KEYID = 5
1,782,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,798,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,816,676 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,629 UART: [afmc] --
1,825,566 UART: [cold-reset] --
1,826,390 UART: [state] Locking Datavault
1,827,349 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,953 UART: [state] Locking ICCM
1,828,577 UART: [exit] Launching FMC @ 0x40000130
1,833,907 UART:
1,833,923 UART: Running Caliptra FMC ...
1,834,331 UART:
1,834,474 UART: [state] CFI Enabled
1,845,338 UART: [fht] FMC Alias Private Key: 7
1,963,838 UART: [art] Extend RT PCRs Done
1,964,266 UART: [art] Lock RT PCRs Done
1,965,676 UART: [art] Populate DV Done
1,973,773 UART: [fht] FMC Alias Private Key: 7
1,974,919 UART: [art] Derive CDI
1,975,199 UART: [art] Store in slot 0x4
2,060,950 UART: [art] Derive Key Pair
2,061,310 UART: [art] Store priv key in slot 0x5
2,074,716 UART: [art] Derive Key Pair - Done
2,089,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,583 UART: [art] PUB.X = C430F8252764758450CCEEDFA5C2679ABD32E4B6D89098F0AAE42A871F69DCEE92FC1152B84B13A2619ED418467F1788
2,112,359 UART: [art] PUB.Y = D6CA7BD2B6257EBAC007A9C6E5222AED226656FF16A6EEC21D72729F2FF9A8C91EE23B16F392B63E11A524AE82D21055
2,119,320 UART: [art] SIG.R = 3E614E5A83C83EF82F843A8A5A1C694A0BAF053737FB729905EEBADB8316BA8A7B5A0679D7DF666773B7067429DAE33F
2,126,085 UART: [art] SIG.S = 1EB505D958183FE9D313772BF8712BD96B486C7A6B2A3B194AF78D60BEA61178E58D103C1E4DA1B97521F2D95B686FD5
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 ready_for_fw is high
1,059,771 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,675 >>> mbox cmd response: success
1,659,532 UART:
1,659,548 UART: Running Caliptra FMC ...
1,659,956 UART:
1,660,099 UART: [state] CFI Enabled
1,670,867 UART: [fht] FMC Alias Private Key: 7
1,789,557 UART: [art] Extend RT PCRs Done
1,789,985 UART: [art] Lock RT PCRs Done
1,791,545 UART: [art] Populate DV Done
1,800,038 UART: [fht] FMC Alias Private Key: 7
1,801,136 UART: [art] Derive CDI
1,801,416 UART: [art] Store in slot 0x4
1,887,471 UART: [art] Derive Key Pair
1,887,831 UART: [art] Store priv key in slot 0x5
1,901,273 UART: [art] Derive Key Pair - Done
1,915,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,931,361 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,126 UART: [art] PUB.X = 49C05509F5F94FD9EBB32A074D2F8EEED6208EFBD2E1A3E7CC88F4ADBFCD7F9A9460992BBA299262FF84D011D3719D1F
1,938,912 UART: [art] PUB.Y = 4B5CA4DFCE14B76C208E277806421CFECE3574DC39F6688AFFDFAE4EFFE45D0FCED2E05E29219E2EE2AC533D754C99F1
1,945,882 UART: [art] SIG.R = 21F9E49C135B02D6C6E68BBF71AD01D228B029CAF45AC2BD73E81C608633D9722A986B48095A797D0C5568725E22B0A4
1,952,642 UART: [art] SIG.S = 9BA7272E93DD18D11369B97375338A45AA28EE149A81C43F999F6A0C51E36210E3D1F12BD9FC3C2D66F1C015D060DF24
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,114 UART: [state] LifecycleState = Unprovisioned
85,769 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,580 UART: [kat] SHA2-256
893,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,355 UART: [kat] ++
897,507 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,528 UART: [kat] SHA2-512-ACC
908,429 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,770 UART: [kat] LMS
1,171,098 UART: [kat] --
1,171,847 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,800 UART: [idev] ++
1,174,968 UART: [idev] CDI.KEYID = 6
1,175,328 UART: [idev] SUBJECT.KEYID = 7
1,175,752 UART: [idev] UDS.KEYID = 0
1,176,097 ready_for_fw is high
1,176,097 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,183,418 UART: [idev] Erasing UDS.KEYID = 0
1,200,685 UART: [idev] Sha1 KeyId Algorithm
1,209,059 UART: [idev] --
1,210,101 UART: [ldev] ++
1,210,269 UART: [ldev] CDI.KEYID = 6
1,210,632 UART: [ldev] SUBJECT.KEYID = 5
1,211,058 UART: [ldev] AUTHORITY.KEYID = 7
1,211,521 UART: [ldev] FE.KEYID = 1
1,216,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,500 UART: [fwproc] Recv command 0x46574c44
1,283,228 UART: [fwproc] Recv'd Img size: 34948 bytes
1,670,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,156 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,744,017 >>> mbox cmd response: success
1,745,087 UART: [afmc] ++
1,745,255 UART: [afmc] CDI.KEYID = 6
1,745,617 UART: [afmc] SUBJECT.KEYID = 7
1,746,042 UART: [afmc] AUTHORITY.KEYID = 5
1,780,841 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,184 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,776 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,477 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,309 UART: [afmc] --
1,824,305 UART: [cold-reset] --
1,825,225 UART: [state] Locking Datavault
1,826,656 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,260 UART: [state] Locking ICCM
1,827,896 UART: [exit] Launching FMC @ 0x40000130
1,833,226 UART:
1,833,242 UART: Running Caliptra FMC ...
1,833,650 UART:
1,833,704 UART: [state] CFI Enabled
1,843,970 UART: [fht] FMC Alias Private Key: 7
1,963,148 UART: [art] Extend RT PCRs Done
1,963,576 UART: [art] Lock RT PCRs Done
1,965,044 UART: [art] Populate DV Done
1,973,241 UART: [fht] FMC Alias Private Key: 7
1,974,313 UART: [art] Derive CDI
1,974,593 UART: [art] Store in slot 0x4
2,060,218 UART: [art] Derive Key Pair
2,060,578 UART: [art] Store priv key in slot 0x5
2,073,578 UART: [art] Derive Key Pair - Done
2,088,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,554 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,319 UART: [art] PUB.X = 6D111325C1AF9B2296B6EDEB299ECAE949746DBDCACDB7FD9A9374F4B272C663132C02783A273D8FB41534E5D05B4570
2,111,096 UART: [art] PUB.Y = C0CDF0ACFB52850B7B74AFC30F5DB09D76DAF4F6E516AD569269BED5B83BE0335CCE1EFD2469670AC9D6161D27409381
2,118,055 UART: [art] SIG.R = D7C27161CB6DCBFF0B1BD5C069A1F829AFE0B2E235A13AF5C4C0A8ACC280AC0DDB7539E6E0CF9CBAB56A9A7FCA1B315B
2,124,855 UART: [art] SIG.S = 6835B244A02833AC53A0DBB6AA857F1B09BAD34B92834D9B9ADDC20041E3E23B0513D875F6E3C81D169E97852AD45247
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,873 ready_for_fw is high
1,059,873 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,595,360 >>> mbox cmd response: success
1,657,777 UART:
1,657,793 UART: Running Caliptra FMC ...
1,658,201 UART:
1,658,255 UART: [state] CFI Enabled
1,668,415 UART: [fht] FMC Alias Private Key: 7
1,787,767 UART: [art] Extend RT PCRs Done
1,788,195 UART: [art] Lock RT PCRs Done
1,789,613 UART: [art] Populate DV Done
1,797,926 UART: [fht] FMC Alias Private Key: 7
1,798,974 UART: [art] Derive CDI
1,799,254 UART: [art] Store in slot 0x4
1,884,899 UART: [art] Derive Key Pair
1,885,259 UART: [art] Store priv key in slot 0x5
1,898,169 UART: [art] Derive Key Pair - Done
1,913,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,278 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,043 UART: [art] PUB.X = 84DCADD1ED49FBAC806763C6272A5871CDDD9D374589077254304619B03C841DB09DBB86F8762940D198E70C06D047E8
1,935,804 UART: [art] PUB.Y = C78B1169C7FD42D223E2C5CFAE0258F040AC72FA2C6ABBA56F95442227E7DE76226E76367BF9D119664AA2728C57376C
1,942,757 UART: [art] SIG.R = DB70809F3E328F97C1A67AAF6D199E3CCC662F2123642B2E926AE9FDFD378786465995A20D952B4E8A39D0D4705E0F9A
1,949,527 UART: [art] SIG.S = 86F0275F041349D693FF2E527BBEF89F73FFA5A1CF38FBAD2B596014E4CC341882E8635831E506F7AF7A3ABFCDFDD5B1
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
893,597 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,722 UART: [kat] ++
897,874 UART: [kat] sha1
902,184 UART: [kat] SHA2-256
904,124 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,493 UART: [kat] HMAC-384Kdf
923,065 UART: [kat] LMS
1,171,393 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,176,850 ready_for_fw is high
1,176,850 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,593 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,088 UART: [idev] --
1,211,118 UART: [ldev] ++
1,211,286 UART: [ldev] CDI.KEYID = 6
1,211,649 UART: [ldev] SUBJECT.KEYID = 5
1,212,075 UART: [ldev] AUTHORITY.KEYID = 7
1,212,538 UART: [ldev] FE.KEYID = 1
1,217,502 UART: [ldev] Erasing FE.KEYID = 1
1,244,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,072 UART: [ldev] --
1,283,535 UART: [fwproc] Wait for Commands...
1,284,281 UART: [fwproc] Recv command 0x46574c44
1,285,009 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,731,085 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,746,000 >>> mbox cmd response: success
1,747,142 UART: [afmc] ++
1,747,310 UART: [afmc] CDI.KEYID = 6
1,747,672 UART: [afmc] SUBJECT.KEYID = 7
1,748,097 UART: [afmc] AUTHORITY.KEYID = 5
1,783,748 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,101 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,810 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,693 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,818,394 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,168 UART: [afmc] --
1,827,152 UART: [cold-reset] --
1,827,982 UART: [state] Locking Datavault
1,829,293 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,897 UART: [state] Locking ICCM
1,830,353 UART: [exit] Launching FMC @ 0x40000130
1,835,683 UART:
1,835,699 UART: Running Caliptra FMC ...
1,836,107 UART:
1,836,250 UART: [state] CFI Enabled
1,846,956 UART: [fht] FMC Alias Private Key: 7
1,965,664 UART: [art] Extend RT PCRs Done
1,966,092 UART: [art] Lock RT PCRs Done
1,967,568 UART: [art] Populate DV Done
1,975,765 UART: [fht] FMC Alias Private Key: 7
1,976,739 UART: [art] Derive CDI
1,977,019 UART: [art] Store in slot 0x4
2,062,850 UART: [art] Derive Key Pair
2,063,210 UART: [art] Store priv key in slot 0x5
2,077,112 UART: [art] Derive Key Pair - Done
2,091,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,107,351 UART: [art] Erasing AUTHORITY.KEYID = 7
2,108,116 UART: [art] PUB.X = 14F452FB79E351F97738B2096762BB862127B1B6AC07D7C34AAC9F086C729122620CB6C2028B61A041D916D5E2DCAB4B
2,114,873 UART: [art] PUB.Y = B5BC826E2B1D75DA8F2CA790066671018B3D056D245C0275F52D03206EA5C49CCC916720344D8A408A69BFD733FF7D8A
2,121,812 UART: [art] SIG.R = CCB6594A87E356E06D427F89AB88D68DE1ED50F5AACD6556F33AE7221976BB9458435974B736DEC7CBAA55199BB61B86
2,128,592 UART: [art] SIG.S = 448CDF797F8FE44FC79984CD5CCD192D22E2F1FE3845FA77F5B0B9A92493D7B97664ED1A7808C2A62F3D8762E943F628
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,433 >>> mbox cmd response: success
1,657,934 UART:
1,657,950 UART: Running Caliptra FMC ...
1,658,358 UART:
1,658,501 UART: [state] CFI Enabled
1,669,127 UART: [fht] FMC Alias Private Key: 7
1,788,181 UART: [art] Extend RT PCRs Done
1,788,609 UART: [art] Lock RT PCRs Done
1,789,887 UART: [art] Populate DV Done
1,798,136 UART: [fht] FMC Alias Private Key: 7
1,799,134 UART: [art] Derive CDI
1,799,414 UART: [art] Store in slot 0x4
1,885,677 UART: [art] Derive Key Pair
1,886,037 UART: [art] Store priv key in slot 0x5
1,899,381 UART: [art] Derive Key Pair - Done
1,914,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,493 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,258 UART: [art] PUB.X = E556A6658EECE1BB81FCD71C630538122CDDE63E213ED93321D7A201BA4D1C3DD95484E7339CB5EA5DF8F3162821573B
1,938,032 UART: [art] PUB.Y = 6851FD4814472717A52CF48AB7FD1BF86038E2FF634DB79C6C68BCAD6D2C95ECB98DD0661EDCBA0D76033DC84E25D635
1,944,992 UART: [art] SIG.R = 0B50332E7F9400B774E8B75DB25F6CEF08FDC813A93C898F6A8B55A0B36870AAE551F4683BB5F13CE87080CBF9476B53
1,951,742 UART: [art] SIG.S = 91B54AB9A5B27AF6E461CD2AEF5703E85BFC606197B40E368B646DE93E119FD3953B3321244221E05D558D729689CF0B
test test_rtalias::test_boot_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,050 UART:
192,449 UART: Running Caliptra ROM ...
193,550 UART:
193,689 UART: [state] CFI Enabled
262,624 UART: [state] LifecycleState = Unprovisioned
264,479 UART: [state] DebugLocked = No
266,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,698 UART: [kat] SHA2-256
441,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,916 UART: [kat] ++
452,390 UART: [kat] sha1
463,402 UART: [kat] SHA2-256
466,119 UART: [kat] SHA2-384
472,174 UART: [kat] SHA2-512-ACC
474,530 UART: [kat] ECC-384
2,767,482 UART: [kat] HMAC-384Kdf
2,799,857 UART: [kat] LMS
3,990,180 UART: [kat] --
3,994,905 UART: [cold-reset] ++
3,997,263 UART: [fht] Storing FHT @ 0x50003400
4,008,806 UART: [idev] ++
4,009,447 UART: [idev] CDI.KEYID = 6
4,010,355 UART: [idev] SUBJECT.KEYID = 7
4,011,598 UART: [idev] UDS.KEYID = 0
4,012,584 ready_for_fw is high
4,012,777 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,113,031 UART: [idev] Erasing UDS.KEYID = 0
7,344,094 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,516 UART: [idev] --
7,371,265 UART: [ldev] ++
7,371,829 UART: [ldev] CDI.KEYID = 6
7,372,763 UART: [ldev] SUBJECT.KEYID = 5
7,374,021 UART: [ldev] AUTHORITY.KEYID = 7
7,375,246 UART: [ldev] FE.KEYID = 1
7,420,325 UART: [ldev] Erasing FE.KEYID = 1
10,750,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,122 UART: [ldev] --
13,114,166 UART: [fwproc] Waiting for Commands...
13,117,330 UART: [fwproc] Received command 0x46574c44
13,119,501 UART: [fwproc] Received Image of size 79496 bytes
16,747,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,822,896 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,896,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,088,163 >>> mbox cmd response: success
17,088,587 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,092,245 UART: [afmc] ++
17,092,822 UART: [afmc] CDI.KEYID = 6
17,093,697 UART: [afmc] SUBJECT.KEYID = 7
17,094,957 UART: [afmc] AUTHORITY.KEYID = 5
20,447,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,749,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,751,670 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,766,115 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,780,817 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,795,235 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,817,732 UART: [afmc] --
22,822,458 UART: [cold-reset] --
22,826,049 UART: [state] Locking Datavault
22,831,895 UART: [state] Locking PCR0, PCR1 and PCR31
22,833,627 UART: [state] Locking ICCM
22,835,136 UART: [exit] Launching FMC @ 0x40000130
22,843,558 UART:
22,843,795 UART: Running Caliptra FMC ...
22,844,896 UART:
22,845,050 UART: [state] CFI Enabled
22,911,104 UART: [fht] FMC Alias Private Key: 7
25,272,438 UART: [art] Extend RT PCRs Done
25,273,659 UART: [art] Lock RT PCRs Done
25,275,135 UART: [art] Populate DV Done
25,280,706 UART: [fht] FMC Alias Private Key: 7
25,282,237 UART: [art] Derive CDI
25,282,962 UART: [art] Store in slot 0x4
25,341,471 UART: [art] Derive Key Pair
25,342,507 UART: [art] Store priv key in slot 0x5
28,635,184 UART: [art] Derive Key Pair - Done
28,647,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,936,981 UART: [art] Erasing AUTHORITY.KEYID = 7
30,938,501 UART: [art] PUB.X = 03745B5F89B1D887C54E5B93D014B701D4B96BC782072996968A6F9E86B0D211B36CB87980FB2277D1174D31C7B6478A
30,945,740 UART: [art] PUB.Y = 5070290BA5F60FFBD22815F32B2F280A181404156D7085BEE0B3B1EBC48E14E7859ABC1D6A663BEE0B9D150A4A37B4CA
30,952,974 UART: [art] SIG.R = D232A0E2CB08C1B83201EA277ABDC092EEF7F195CE55A7BAD7F0479A7D5422721E9FFB87A98C541B8C652C30AD0A9D9D
30,960,363 UART: [art] SIG.S = 7A782B8EC2B16B605C54D46C6485A7E594D00C01BE9FA4EB53F8EEC238C202F367EE9BF671A3144E5CB9946CBAA84311
32,264,835 UART: mock_rt_interact::rt_entry...FMC Tester
32,396,726 UART: [rt] Runtime listening for mailbox commands...
32,401,024 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,784,404 ready_for_fw is high
3,785,008 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,169,262 >>> mbox cmd response: success
17,169,899 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,858,548 UART:
22,858,943 UART: Running Caliptra FMC ...
22,860,157 UART:
22,860,315 UART: [state] CFI Enabled
22,931,178 UART: [fht] FMC Alias Private Key: 7
25,271,691 UART: [art] Extend RT PCRs Done
25,272,915 UART: [art] Lock RT PCRs Done
25,274,671 UART: [art] Populate DV Done
25,280,091 UART: [fht] FMC Alias Private Key: 7
25,281,631 UART: [art] Derive CDI
25,282,445 UART: [art] Store in slot 0x4
25,339,895 UART: [art] Derive Key Pair
25,340,935 UART: [art] Store priv key in slot 0x5
28,633,418 UART: [art] Derive Key Pair - Done
28,646,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,935,824 UART: [art] Erasing AUTHORITY.KEYID = 7
30,937,355 UART: [art] PUB.X = 37949CA8428B3F2A4D40A97B9CA3C1B38F751C409A5AE479C4FF6D162BD816B0CB95ED421059BAA478E3443A6017B282
30,944,610 UART: [art] PUB.Y = 0617818DD482211D7950C97D873CDA670021535DCD2300D4A03CC0F91FD88C06CF801B93C50806314073B2EECD6671E7
30,951,795 UART: [art] SIG.R = 53E3AD7D73586ECC0D68303710E7D0A7E536AC373D7653ADEA1387F760269062461BF57D4768FD91C90BBA8F28DA2484
30,959,198 UART: [art] SIG.S = AE67F201B848ED07432C7F33596193E26E7B3724BE1F0F636B8592584976A9E49E22A86D01343D76803CEBA8C2075661
32,263,857 UART: mock_rt_interact::rt_entry...FMC Tester
32,395,238 UART: [rt] Runtime listening for mailbox commands...
32,399,519 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,326 UART:
192,688 UART: Running Caliptra ROM ...
193,771 UART:
603,596 UART: [state] CFI Enabled
619,876 UART: [state] LifecycleState = Unprovisioned
621,748 UART: [state] DebugLocked = No
624,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,955 UART: [kat] SHA2-256
799,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,265 UART: [kat] ++
810,717 UART: [kat] sha1
822,581 UART: [kat] SHA2-256
825,275 UART: [kat] SHA2-384
831,561 UART: [kat] SHA2-512-ACC
833,956 UART: [kat] ECC-384
3,118,301 UART: [kat] HMAC-384Kdf
3,131,618 UART: [kat] LMS
4,321,770 UART: [kat] --
4,325,576 UART: [cold-reset] ++
4,328,012 UART: [fht] Storing FHT @ 0x50003400
4,341,055 UART: [idev] ++
4,341,617 UART: [idev] CDI.KEYID = 6
4,342,590 UART: [idev] SUBJECT.KEYID = 7
4,343,831 UART: [idev] UDS.KEYID = 0
4,344,945 ready_for_fw is high
4,345,184 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,445,217 UART: [idev] Erasing UDS.KEYID = 0
7,629,591 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,105 UART: [idev] --
7,656,002 UART: [ldev] ++
7,656,586 UART: [ldev] CDI.KEYID = 6
7,657,548 UART: [ldev] SUBJECT.KEYID = 5
7,658,758 UART: [ldev] AUTHORITY.KEYID = 7
7,659,983 UART: [ldev] FE.KEYID = 1
7,672,402 UART: [ldev] Erasing FE.KEYID = 1
10,959,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,796 UART: [ldev] --
13,320,617 UART: [fwproc] Waiting for Commands...
13,323,411 UART: [fwproc] Received command 0x46574c44
13,325,588 UART: [fwproc] Received Image of size 79496 bytes
16,963,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,044,100 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,117,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,309,429 >>> mbox cmd response: success
17,309,859 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,312,787 UART: [afmc] ++
17,313,358 UART: [afmc] CDI.KEYID = 6
17,314,314 UART: [afmc] SUBJECT.KEYID = 7
17,315,522 UART: [afmc] AUTHORITY.KEYID = 5
20,631,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,925,354 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,927,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,942,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,956,809 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,971,263 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,992,527 UART: [afmc] --
22,995,961 UART: [cold-reset] --
23,000,410 UART: [state] Locking Datavault
23,005,407 UART: [state] Locking PCR0, PCR1 and PCR31
23,007,162 UART: [state] Locking ICCM
23,009,472 UART: [exit] Launching FMC @ 0x40000130
23,017,870 UART:
23,018,102 UART: Running Caliptra FMC ...
23,019,201 UART:
23,019,353 UART: [state] CFI Enabled
23,026,960 UART: [fht] FMC Alias Private Key: 7
25,366,498 UART: [art] Extend RT PCRs Done
25,367,717 UART: [art] Lock RT PCRs Done
25,369,415 UART: [art] Populate DV Done
25,375,033 UART: [fht] FMC Alias Private Key: 7
25,376,671 UART: [art] Derive CDI
25,377,477 UART: [art] Store in slot 0x4
25,419,790 UART: [art] Derive Key Pair
25,420,781 UART: [art] Store priv key in slot 0x5
28,662,644 UART: [art] Derive Key Pair - Done
28,675,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,955,729 UART: [art] Erasing AUTHORITY.KEYID = 7
30,957,223 UART: [art] PUB.X = 8F07BFF2FB8C24FEB4161C544962C86D8CAFA46D5E83A9EC1FDC8AD9D0E22CB7AE629C6B187E5AD094FF3205BBA504C0
30,964,572 UART: [art] PUB.Y = 96C41159B366E133B0E1F984380649945BF702A45B43A9C767A51DBDF85134628A924ACF4981AE7A51306653D3E3D57A
30,971,754 UART: [art] SIG.R = 452959971FBED530757EF265D86E04023B6A8BF0B93C1A792A99898079BBCB2217E41D38B3ED7C00ED22531797E3B0EA
30,979,152 UART: [art] SIG.S = 9A97897D8C6F85A826132A2D078D20F259E72A49B8783C67697291222D3A60D97297CFBDF54B53B6CA86398049F9485A
32,283,958 UART: mock_rt_interact::rt_entry...FMC Tester
32,417,655 UART: [rt] Runtime listening for mailbox commands...
32,421,939 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
4,125,133 ready_for_fw is high
4,125,688 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,358,866 >>> mbox cmd response: success
17,359,388 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,998,328 UART:
22,998,727 UART: Running Caliptra FMC ...
22,999,985 UART:
23,000,173 UART: [state] CFI Enabled
23,007,899 UART: [fht] FMC Alias Private Key: 7
25,347,340 UART: [art] Extend RT PCRs Done
25,348,565 UART: [art] Lock RT PCRs Done
25,350,248 UART: [art] Populate DV Done
25,355,548 UART: [fht] FMC Alias Private Key: 7
25,357,140 UART: [art] Derive CDI
25,357,871 UART: [art] Store in slot 0x4
25,400,627 UART: [art] Derive Key Pair
25,401,661 UART: [art] Store priv key in slot 0x5
28,643,969 UART: [art] Derive Key Pair - Done
28,657,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,936,845 UART: [art] Erasing AUTHORITY.KEYID = 7
30,938,355 UART: [art] PUB.X = 287A94EE0910E4A62CDDEB9C7A03720E73E58F9F50A4E1D2180ED2FFE178ABC5A8B6E573038D21814457B8BC3773EEA8
30,945,613 UART: [art] PUB.Y = F817E657D0EDEB9671D4A016804E7E68E386CFD4AD3ABD3EE541C9100C5A3F7CE27A918CB63A9ABC2800EB225CBFFC59
30,952,912 UART: [art] SIG.R = DF66DD8EA8B5A3E7D1B364D1A49A3DCF423B93BAC9AAAC6983CDDD6D36A6B7BFB8D898A26B9471B82AD276933286D2D7
30,960,340 UART: [art] SIG.S = 2453D03266C6902C75FF5B325FA2521B83758F6A95ECB1091F22F17FC265DC9648C9ECB66375CBD0E817C59A5045181D
32,264,700 UART: mock_rt_interact::rt_entry...FMC Tester
32,397,537 UART: [rt] Runtime listening for mailbox commands...
32,401,797 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,028 UART:
192,433 UART: Running Caliptra ROM ...
193,548 UART:
193,694 UART: [state] CFI Enabled
262,243 UART: [state] LifecycleState = Unprovisioned
264,243 UART: [state] DebugLocked = No
266,137 UART: [state] WD Timer not started. Device not locked for debugging
269,823 UART: [kat] SHA2-256
449,463 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,240 UART: [kat] ++
460,772 UART: [kat] sha1
470,750 UART: [kat] SHA2-256
473,468 UART: [kat] SHA2-384
478,460 UART: [kat] SHA2-512-ACC
480,826 UART: [kat] ECC-384
2,925,273 UART: [kat] HMAC-384Kdf
2,949,863 UART: [kat] LMS
3,426,311 UART: [kat] --
3,430,130 UART: [cold-reset] ++
3,432,492 UART: [fht] FHT @ 0x50003400
3,444,109 UART: [idev] ++
3,444,677 UART: [idev] CDI.KEYID = 6
3,445,654 UART: [idev] SUBJECT.KEYID = 7
3,446,898 UART: [idev] UDS.KEYID = 0
3,447,818 ready_for_fw is high
3,448,009 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,548,260 UART: [idev] Erasing UDS.KEYID = 0
5,967,104 UART: [idev] Sha1 KeyId Algorithm
5,989,755 UART: [idev] --
5,994,453 UART: [ldev] ++
5,995,023 UART: [ldev] CDI.KEYID = 6
5,995,931 UART: [ldev] SUBJECT.KEYID = 5
5,997,148 UART: [ldev] AUTHORITY.KEYID = 7
5,998,461 UART: [ldev] FE.KEYID = 1
6,037,663 UART: [ldev] Erasing FE.KEYID = 1
8,542,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,705 UART: [ldev] --
10,353,823 UART: [fwproc] Wait for Commands...
10,355,495 UART: [fwproc] Recv command 0x46574c44
10,357,538 UART: [fwproc] Recv'd Img size: 79496 bytes
13,360,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,444,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,517,740 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,709,749 >>> mbox cmd response: success
13,710,174 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,713,556 UART: [afmc] ++
13,714,142 UART: [afmc] CDI.KEYID = 6
13,715,111 UART: [afmc] SUBJECT.KEYID = 7
13,716,329 UART: [afmc] AUTHORITY.KEYID = 5
16,261,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,001,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,003,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,019,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,035,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,051,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,075,157 UART: [afmc] --
18,078,918 UART: [cold-reset] --
18,082,629 UART: [state] Locking Datavault
18,089,234 UART: [state] Locking PCR0, PCR1 and PCR31
18,090,936 UART: [state] Locking ICCM
18,092,197 UART: [exit] Launching FMC @ 0x40000130
18,100,618 UART:
18,100,900 UART: Running Caliptra FMC ...
18,102,014 UART:
18,102,182 UART: [state] CFI Enabled
18,158,096 UART: [fht] FMC Alias Private Key: 7
19,924,353 UART: [art] Extend RT PCRs Done
19,925,600 UART: [art] Lock RT PCRs Done
19,927,392 UART: [art] Populate DV Done
19,932,430 UART: [fht] FMC Alias Private Key: 7
19,934,134 UART: [art] Derive CDI
19,934,955 UART: [art] Store in slot 0x4
19,990,696 UART: [art] Derive Key Pair
19,991,742 UART: [art] Store priv key in slot 0x5
22,454,633 UART: [art] Derive Key Pair - Done
22,467,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,180,452 UART: [art] Erasing AUTHORITY.KEYID = 7
24,182,011 UART: [art] PUB.X = 8FE466D1B9754841CA9482DE94D170DA40620C8842FCA75724FAF87DE6E5521F8DDD9472F59602F0C9F063E2D6C8C05C
24,189,225 UART: [art] PUB.Y = A12AAE4E79FD022B3E7509EFC3EB85E6EEAF4E8AE85D2165F2E6EEBF6C833F73A31029AD9A7F8B4CD015B0F1000C04D0
24,196,546 UART: [art] SIG.R = D38B69A596C433A0260C57DFF01D4EFD7641BFF4B683A97B032BCA1EA8B385EC09D11E05CC92B160300F99D190B25FB1
24,203,924 UART: [art] SIG.S = 0426713BF35A8916A2F763B851EC7E4AA86A11EE20549ADC388934E685BC9C09BF12EF306ED46942C6AE4713106FF2E0
25,182,020 UART: mock_rt_interact::rt_entry...FMC Tester
25,313,570 UART: [rt] Runtime listening for mailbox commands...
25,317,866 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,461,317 ready_for_fw is high
3,461,878 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,620,347 >>> mbox cmd response: success
13,620,933 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,896,580 UART:
17,896,968 UART: Running Caliptra FMC ...
17,898,242 UART:
17,898,412 UART: [state] CFI Enabled
17,967,063 UART: [fht] FMC Alias Private Key: 7
19,754,154 UART: [art] Extend RT PCRs Done
19,755,379 UART: [art] Lock RT PCRs Done
19,757,302 UART: [art] Populate DV Done
19,762,725 UART: [fht] FMC Alias Private Key: 7
19,764,325 UART: [art] Derive CDI
19,765,066 UART: [art] Store in slot 0x4
19,820,957 UART: [art] Derive Key Pair
19,822,022 UART: [art] Store priv key in slot 0x5
22,285,000 UART: [art] Derive Key Pair - Done
22,298,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,010,730 UART: [art] Erasing AUTHORITY.KEYID = 7
24,012,254 UART: [art] PUB.X = 4A165D736CE711FEC47A07D36CFFE5C6911B238854DF85CB14AD612F9AC67F1BADF58FAB347A2CAC42893AB7EF2A5854
24,019,521 UART: [art] PUB.Y = D4546793A681CAC5039D8EAD44E69C0E9057D840A76FD0D3052BC2E8C52FE308D76E04DC5CED0BA775C5A7C97EECB848
24,026,758 UART: [art] SIG.R = 70ECE62E7D9DE98EA7162CC5F51BB1D1CC1892BDC2DF731117D01180C781AAD218B2F30A13F17C3EE7A3508256DD4041
24,034,149 UART: [art] SIG.S = E84E3CDE9B391B7D99B343CCE302437FBEA00C4F63849C72543376ED79646CFF4C1C445374AEEEE8F01C1A7E628150B8
25,013,000 UART: mock_rt_interact::rt_entry...FMC Tester
25,145,694 UART: [rt] Runtime listening for mailbox commands...
25,149,929 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,490 UART:
192,850 UART: Running Caliptra ROM ...
194,052 UART:
603,693 UART: [state] CFI Enabled
617,458 UART: [state] LifecycleState = Unprovisioned
619,435 UART: [state] DebugLocked = No
621,108 UART: [state] WD Timer not started. Device not locked for debugging
625,142 UART: [kat] SHA2-256
804,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,537 UART: [kat] ++
816,071 UART: [kat] sha1
828,730 UART: [kat] SHA2-256
831,376 UART: [kat] SHA2-384
837,006 UART: [kat] SHA2-512-ACC
839,389 UART: [kat] ECC-384
3,282,038 UART: [kat] HMAC-384Kdf
3,294,283 UART: [kat] LMS
3,770,729 UART: [kat] --
3,775,020 UART: [cold-reset] ++
3,776,241 UART: [fht] FHT @ 0x50003400
3,788,916 UART: [idev] ++
3,789,546 UART: [idev] CDI.KEYID = 6
3,790,468 UART: [idev] SUBJECT.KEYID = 7
3,791,708 UART: [idev] UDS.KEYID = 0
3,792,628 ready_for_fw is high
3,792,842 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,892,944 UART: [idev] Erasing UDS.KEYID = 0
6,265,618 UART: [idev] Sha1 KeyId Algorithm
6,289,826 UART: [idev] --
6,294,444 UART: [ldev] ++
6,295,021 UART: [ldev] CDI.KEYID = 6
6,296,093 UART: [ldev] SUBJECT.KEYID = 5
6,297,198 UART: [ldev] AUTHORITY.KEYID = 7
6,298,373 UART: [ldev] FE.KEYID = 1
6,309,468 UART: [ldev] Erasing FE.KEYID = 1
8,792,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,421 UART: [ldev] --
10,588,711 UART: [fwproc] Wait for Commands...
10,590,810 UART: [fwproc] Recv command 0x46574c44
10,592,851 UART: [fwproc] Recv'd Img size: 79496 bytes
13,593,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,681,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,754,480 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,946,369 >>> mbox cmd response: success
13,946,784 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,949,977 UART: [afmc] ++
13,950,628 UART: [afmc] CDI.KEYID = 6
13,951,539 UART: [afmc] SUBJECT.KEYID = 7
13,952,756 UART: [afmc] AUTHORITY.KEYID = 5
16,451,136 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,173,595 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,175,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,191,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,207,703 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,223,286 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,246,543 UART: [afmc] --
18,249,495 UART: [cold-reset] --
18,254,383 UART: [state] Locking Datavault
18,260,007 UART: [state] Locking PCR0, PCR1 and PCR31
18,261,762 UART: [state] Locking ICCM
18,263,123 UART: [exit] Launching FMC @ 0x40000130
18,271,513 UART:
18,271,773 UART: Running Caliptra FMC ...
18,272,875 UART:
18,273,030 UART: [state] CFI Enabled
18,280,834 UART: [fht] FMC Alias Private Key: 7
20,046,738 UART: [art] Extend RT PCRs Done
20,048,105 UART: [art] Lock RT PCRs Done
20,049,653 UART: [art] Populate DV Done
20,055,171 UART: [fht] FMC Alias Private Key: 7
20,056,759 UART: [art] Derive CDI
20,057,495 UART: [art] Store in slot 0x4
20,100,188 UART: [art] Derive Key Pair
20,101,273 UART: [art] Store priv key in slot 0x5
22,527,936 UART: [art] Derive Key Pair - Done
22,540,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,247,397 UART: [art] Erasing AUTHORITY.KEYID = 7
24,248,894 UART: [art] PUB.X = 881BA2A370FDDB47C46B9FD7E1DA1F4F82EB00F1A1483C8605F42EB19BD9BE83BD0429AD95BA21B509600B48954C4762
24,256,157 UART: [art] PUB.Y = 5D5DBCBE5F758E8DA0DED02770C13BAF328C47F87E5419DE25B95C8AAFA733EC7D9A97305BEC179A5ABC94B9F1B75002
24,263,449 UART: [art] SIG.R = 51C9BD8A1E3621DAB120D893F394ADA6B2345617C6B6C8A604D404B68FA0DE6ABA72D44D748F757D497E59C6AE06A3C4
24,270,851 UART: [art] SIG.S = 966884867DE20289B524C9D80AC636F2A62316B8E5753C27EC8BEDAEBB9F04ABA0A12596289B7679A936F9FBCCAC8A40
25,249,240 UART: mock_rt_interact::rt_entry...FMC Tester
25,381,512 UART: [rt] Runtime listening for mailbox commands...
25,385,798 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
3,780,802 ready_for_fw is high
3,781,247 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,825,762 >>> mbox cmd response: success
13,826,449 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,076,924 UART:
18,077,322 UART: Running Caliptra FMC ...
18,078,489 UART:
18,078,645 UART: [state] CFI Enabled
18,086,908 UART: [fht] FMC Alias Private Key: 7
19,853,225 UART: [art] Extend RT PCRs Done
19,854,454 UART: [art] Lock RT PCRs Done
19,856,462 UART: [art] Populate DV Done
19,862,099 UART: [fht] FMC Alias Private Key: 7
19,863,569 UART: [art] Derive CDI
19,864,330 UART: [art] Store in slot 0x4
19,907,366 UART: [art] Derive Key Pair
19,908,410 UART: [art] Store priv key in slot 0x5
22,335,500 UART: [art] Derive Key Pair - Done
22,348,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,054,851 UART: [art] Erasing AUTHORITY.KEYID = 7
24,056,359 UART: [art] PUB.X = 12CD2E8178637E8359362A1524ED0F1AEE1F613528E0F87550BE63008B24B861AED8AD444AFE64B9D47046D1F2EBEAB1
24,063,604 UART: [art] PUB.Y = D3250D943DDA2DAEC55E386A603FD892BA722A155D084632311841EA0C9FB38DA766C30931D3EF7805B98819422BD485
24,070,902 UART: [art] SIG.R = 71965BDB43853A8FC058FC5775B484B0FD6FFB66539C3FFF3D1DF77391BBD01DC2DFED66CBC3E9AD9375C0C4A2026FD4
24,078,280 UART: [art] SIG.S = 9166CB7E11D8D05CD3748FE436A5B20366961173EE5BA4C1DA8E65931ECFCAA491AFB9B854D316A28AA260011A6D5618
25,056,601 UART: mock_rt_interact::rt_entry...FMC Tester
25,189,215 UART: [rt] Runtime listening for mailbox commands...
25,193,472 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,029 UART:
192,423 UART: Running Caliptra ROM ...
193,609 UART:
193,765 UART: [state] CFI Enabled
265,924 UART: [state] LifecycleState = Unprovisioned
268,333 UART: [state] DebugLocked = No
269,585 UART: [state] WD Timer not started. Device not locked for debugging
274,972 UART: [kat] SHA2-256
464,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,640 UART: [kat] ++
476,114 UART: [kat] sha1
487,622 UART: [kat] SHA2-256
490,628 UART: [kat] SHA2-384
497,275 UART: [kat] SHA2-512-ACC
499,892 UART: [kat] ECC-384
2,947,560 UART: [kat] HMAC-384Kdf
2,971,377 UART: [kat] LMS
3,503,154 UART: [kat] --
3,506,386 UART: [cold-reset] ++
3,508,466 UART: [fht] FHT @ 0x50003400
3,521,213 UART: [idev] ++
3,521,846 UART: [idev] CDI.KEYID = 6
3,522,880 UART: [idev] SUBJECT.KEYID = 7
3,524,052 UART: [idev] UDS.KEYID = 0
3,524,980 ready_for_fw is high
3,525,181 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,625,497 UART: [idev] Erasing UDS.KEYID = 0
6,030,992 UART: [idev] Sha1 KeyId Algorithm
6,053,191 UART: [idev] --
6,057,829 UART: [ldev] ++
6,058,507 UART: [ldev] CDI.KEYID = 6
6,059,415 UART: [ldev] SUBJECT.KEYID = 5
6,060,575 UART: [ldev] AUTHORITY.KEYID = 7
6,061,827 UART: [ldev] FE.KEYID = 1
6,100,553 UART: [ldev] Erasing FE.KEYID = 1
8,601,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,717 UART: [ldev] --
10,411,335 UART: [fwproc] Wait for Commands...
10,413,639 UART: [fwproc] Recv command 0x46574c44
10,415,888 UART: [fwproc] Recv'd Img size: 79496 bytes
13,445,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,524,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,647,730 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,974,476 >>> mbox cmd response: success
13,974,910 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,977,852 UART: [afmc] ++
13,978,551 UART: [afmc] CDI.KEYID = 6
13,979,798 UART: [afmc] SUBJECT.KEYID = 7
13,981,235 UART: [afmc] AUTHORITY.KEYID = 5
16,510,551 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,233,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,235,219 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,250,292 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,265,498 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,280,402 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,303,870 UART: [afmc] --
18,307,997 UART: [cold-reset] --
18,311,205 UART: [state] Locking Datavault
18,317,592 UART: [state] Locking PCR0, PCR1 and PCR31
18,319,779 UART: [state] Locking ICCM
18,321,225 UART: [exit] Launching FMC @ 0x40000130
18,329,909 UART:
18,330,145 UART: Running Caliptra FMC ...
18,331,244 UART:
18,331,397 UART: [state] CFI Enabled
18,389,645 UART: [fht] FMC Alias Private Key: 7
20,155,727 UART: [art] Extend RT PCRs Done
20,156,949 UART: [art] Lock RT PCRs Done
20,158,654 UART: [art] Populate DV Done
20,164,114 UART: [fht] FMC Alias Private Key: 7
20,165,756 UART: [art] Derive CDI
20,166,486 UART: [art] Store in slot 0x4
20,221,617 UART: [art] Derive Key Pair
20,222,659 UART: [art] Store priv key in slot 0x5
22,685,562 UART: [art] Derive Key Pair - Done
22,698,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,410,982 UART: [art] Erasing AUTHORITY.KEYID = 7
24,412,504 UART: [art] PUB.X = 84D84FC6E68D4AD6C631B1C46C8D3E55539B488557DD09FADCDC778F718F820372770B3C7CD07A4ED644C5B0E712F7D7
24,419,743 UART: [art] PUB.Y = E2BED88B88E9350B4F3922DC87ACF98E90A9873662ED6945A2A920F481C73B3EAD9E49EFA86373F938BE8A53DE3F2162
24,427,000 UART: [art] SIG.R = 5F6CF494667D46B11E9AB77B869537644A935AD7EF1526CD303069456FD9D530314697287F0AEB4E6A0ECC688F116F6E
24,434,383 UART: [art] SIG.S = AC775F37728B2164C405B0BA12676B4172E12AC65ED78738432B64D775F8A0779B2CD66D8A526762663B9A2418336B9C
25,413,187 UART: mock_rt_interact::rt_entry...FMC Tester
25,545,399 UART: [rt] Runtime listening for mailbox commands...
25,549,628 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,439,968 ready_for_fw is high
3,440,368 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,985,796 >>> mbox cmd response: success
13,986,457 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,281,690 UART:
18,282,056 UART: Running Caliptra FMC ...
18,283,325 UART:
18,283,492 UART: [state] CFI Enabled
18,349,391 UART: [fht] FMC Alias Private Key: 7
20,115,521 UART: [art] Extend RT PCRs Done
20,116,753 UART: [art] Lock RT PCRs Done
20,118,623 UART: [art] Populate DV Done
20,123,768 UART: [fht] FMC Alias Private Key: 7
20,125,473 UART: [art] Derive CDI
20,126,287 UART: [art] Store in slot 0x4
20,182,665 UART: [art] Derive Key Pair
20,183,704 UART: [art] Store priv key in slot 0x5
22,646,832 UART: [art] Derive Key Pair - Done
22,659,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,372,469 UART: [art] Erasing AUTHORITY.KEYID = 7
24,373,950 UART: [art] PUB.X = 965AFB39CD23822280F897C32FB27FA69B5F5D3B13D85269B8E809C826C6942704CF8EEA145DA1C279F1872AD930785E
24,381,263 UART: [art] PUB.Y = 5A1BA4448DA742B70565ED58BF2EC98BC3ABEC689F749A937678A1F1AD4C139A0E0BF772C47FA44101224285C0CF16BB
24,388,539 UART: [art] SIG.R = F7E98BC6B8E06FA06FBE9B464D9417CBA897899B774ADA70C96F1CFE70AD59E92A9AF541AC8957EBB9FB341CEA64502A
24,395,947 UART: [art] SIG.S = C050958ED605F4A1D6DD4CFF080A65644C8BE25689698767394096412094BE60EB805635311A480FC24289C09FC96BFA
25,374,563 UART: mock_rt_interact::rt_entry...FMC Tester
25,506,931 UART: [rt] Runtime listening for mailbox commands...
25,511,173 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,423 UART:
192,790 UART: Running Caliptra ROM ...
193,969 UART:
603,816 UART: [state] CFI Enabled
617,827 UART: [state] LifecycleState = Unprovisioned
620,192 UART: [state] DebugLocked = No
622,133 UART: [state] WD Timer not started. Device not locked for debugging
627,438 UART: [kat] SHA2-256
817,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,112 UART: [kat] ++
828,714 UART: [kat] sha1
840,414 UART: [kat] SHA2-256
843,388 UART: [kat] SHA2-384
849,883 UART: [kat] SHA2-512-ACC
852,464 UART: [kat] ECC-384
3,294,042 UART: [kat] HMAC-384Kdf
3,307,376 UART: [kat] LMS
3,839,172 UART: [kat] --
3,844,978 UART: [cold-reset] ++
3,846,568 UART: [fht] FHT @ 0x50003400
3,858,679 UART: [idev] ++
3,859,312 UART: [idev] CDI.KEYID = 6
3,860,290 UART: [idev] SUBJECT.KEYID = 7
3,861,534 UART: [idev] UDS.KEYID = 0
3,862,453 ready_for_fw is high
3,862,674 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,962,821 UART: [idev] Erasing UDS.KEYID = 0
6,332,790 UART: [idev] Sha1 KeyId Algorithm
6,354,617 UART: [idev] --
6,358,453 UART: [ldev] ++
6,359,175 UART: [ldev] CDI.KEYID = 6
6,360,061 UART: [ldev] SUBJECT.KEYID = 5
6,361,164 UART: [ldev] AUTHORITY.KEYID = 7
6,362,451 UART: [ldev] FE.KEYID = 1
6,372,846 UART: [ldev] Erasing FE.KEYID = 1
8,850,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,741 UART: [ldev] --
10,640,619 UART: [fwproc] Wait for Commands...
10,642,487 UART: [fwproc] Recv command 0x46574c44
10,644,756 UART: [fwproc] Recv'd Img size: 79496 bytes
13,665,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,743,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,866,989 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,192,266 >>> mbox cmd response: success
14,192,700 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,195,663 UART: [afmc] ++
14,196,346 UART: [afmc] CDI.KEYID = 6
14,197,503 UART: [afmc] SUBJECT.KEYID = 7
14,199,239 UART: [afmc] AUTHORITY.KEYID = 5
16,700,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,423,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,425,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,440,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,455,469 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,470,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,493,999 UART: [afmc] --
18,498,296 UART: [cold-reset] --
18,502,044 UART: [state] Locking Datavault
18,505,304 UART: [state] Locking PCR0, PCR1 and PCR31
18,507,437 UART: [state] Locking ICCM
18,510,447 UART: [exit] Launching FMC @ 0x40000130
18,519,126 UART:
18,519,399 UART: Running Caliptra FMC ...
18,520,511 UART:
18,520,671 UART: [state] CFI Enabled
18,529,123 UART: [fht] FMC Alias Private Key: 7
20,295,907 UART: [art] Extend RT PCRs Done
20,297,111 UART: [art] Lock RT PCRs Done
20,298,793 UART: [art] Populate DV Done
20,304,356 UART: [fht] FMC Alias Private Key: 7
20,306,058 UART: [art] Derive CDI
20,306,892 UART: [art] Store in slot 0x4
20,349,915 UART: [art] Derive Key Pair
20,350,913 UART: [art] Store priv key in slot 0x5
22,777,595 UART: [art] Derive Key Pair - Done
22,790,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,496,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,497,934 UART: [art] PUB.X = 49D1050D1F81243855816B7A5AFF3C01375731479ABF25178076D217471BFB443AD3FF3DC0E5CE53DD1BE74BB650B41D
24,505,177 UART: [art] PUB.Y = 2C01A9F8CB2FA462FDCE87E4BEF0F57A59B8177138F70B1509E69C27905EA45D85319E867FDFA1F12B842E8D76756644
24,512,462 UART: [art] SIG.R = 138E433D4E008DD83BFD183A01449F1C4BD374140586AFF80D043D35A4E7A5584342ADCFAA1A5118FE72E7F3951AB53F
24,519,891 UART: [art] SIG.S = 5F37A49B4482BA8131B743A0FB9D81DF5EF2A50D598A9DDB1F90E8B41F40701FC121EA9A0B416BB2EE6070DBECDB5063
25,498,213 UART: mock_rt_interact::rt_entry...FMC Tester
25,629,832 UART: [rt] Runtime listening for mailbox commands...
25,634,057 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,759,601 ready_for_fw is high
3,760,138 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,211,830 >>> mbox cmd response: success
14,212,390 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,462,895 UART:
18,463,277 UART: Running Caliptra FMC ...
18,464,542 UART:
18,464,708 UART: [state] CFI Enabled
18,472,748 UART: [fht] FMC Alias Private Key: 7
20,238,381 UART: [art] Extend RT PCRs Done
20,239,598 UART: [art] Lock RT PCRs Done
20,241,017 UART: [art] Populate DV Done
20,246,388 UART: [fht] FMC Alias Private Key: 7
20,247,932 UART: [art] Derive CDI
20,248,748 UART: [art] Store in slot 0x4
20,291,446 UART: [art] Derive Key Pair
20,292,438 UART: [art] Store priv key in slot 0x5
22,718,973 UART: [art] Derive Key Pair - Done
22,731,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,437,682 UART: [art] Erasing AUTHORITY.KEYID = 7
24,439,180 UART: [art] PUB.X = 2FB19825DEE20DC26030ABBC7A4181C2D40797AB3FE0954AEC2F45E190D8A7F1E66D33C232C2AD643622E18B2F8D55F4
24,446,486 UART: [art] PUB.Y = 35FD1BDBF9D949938C5824B91D3A6FA6C5D48FFDF45F89C9E1AF500A08D949CF50CFA85545115DDB8B7C975CF6CAFB52
24,453,758 UART: [art] SIG.R = 0E50ACCF21B0B9CD9E7D9E20889207BFA8EAEE483D56DE33061CBF04430117C2EEE3E9910C1F7889F9A66144139A174F
24,461,176 UART: [art] SIG.S = 801E8C5DF3BC8685ABFC6F87C8FB70E2BB56C7D190DF633B3232324F4F497D25F6D387E3EE3980841E1F8D1EE40453D0
25,439,964 UART: mock_rt_interact::rt_entry...FMC Tester
25,572,882 UART: [rt] Runtime listening for mailbox commands...
25,577,138 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
895,138 UART: [kat] SHA2-512-ACC
897,039 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,573 UART: [cold-reset] ++
1,477,147 UART: [fht] Storing FHT @ 0x50003400
1,479,940 UART: [idev] ++
1,480,108 UART: [idev] CDI.KEYID = 6
1,480,468 UART: [idev] SUBJECT.KEYID = 7
1,480,892 UART: [idev] UDS.KEYID = 0
1,481,237 ready_for_fw is high
1,481,237 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,768 UART: [idev] Erasing UDS.KEYID = 0
1,505,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,100 UART: [idev] --
1,515,263 UART: [ldev] ++
1,515,431 UART: [ldev] CDI.KEYID = 6
1,515,794 UART: [ldev] SUBJECT.KEYID = 5
1,516,220 UART: [ldev] AUTHORITY.KEYID = 7
1,516,683 UART: [ldev] FE.KEYID = 1
1,521,731 UART: [ldev] Erasing FE.KEYID = 1
1,546,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,718 UART: [ldev] --
1,586,103 UART: [fwproc] Waiting for Commands...
1,586,820 UART: [fwproc] Received command 0x46574c44
1,587,611 UART: [fwproc] Received Image of size 79496 bytes
2,485,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,513,112 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,544,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,626,015 >>> mbox cmd response: success
2,626,015 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,627,099 UART: [afmc] ++
2,627,267 UART: [afmc] CDI.KEYID = 6
2,627,629 UART: [afmc] SUBJECT.KEYID = 7
2,628,054 UART: [afmc] AUTHORITY.KEYID = 5
2,662,655 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,678,529 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,679,309 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,685,018 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,690,901 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,696,584 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,704,550 UART: [afmc] --
2,705,678 UART: [cold-reset] --
2,706,586 UART: [state] Locking Datavault
2,707,787 UART: [state] Locking PCR0, PCR1 and PCR31
2,708,391 UART: [state] Locking ICCM
2,708,987 UART: [exit] Launching FMC @ 0x40000130
2,714,317 UART:
2,714,333 UART: Running Caliptra FMC ...
2,714,741 UART:
2,714,795 UART: [state] CFI Enabled
2,724,797 UART: [fht] FMC Alias Private Key: 7
2,843,309 UART: [art] Extend RT PCRs Done
2,843,737 UART: [art] Lock RT PCRs Done
2,845,177 UART: [art] Populate DV Done
2,853,218 UART: [fht] FMC Alias Private Key: 7
2,854,388 UART: [art] Derive CDI
2,854,668 UART: [art] Store in slot 0x4
2,940,162 UART: [art] Derive Key Pair
2,940,522 UART: [art] Store priv key in slot 0x5
2,954,099 UART: [art] Derive Key Pair - Done
2,968,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,984,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,984,988 UART: [art] PUB.X = 45CC415F1B9EF34D75659E77AA3BDE9BDC23F061BFCE32413B14D96487311C2BB19E4ADBFF607D6765034B3F63F86D34
2,991,767 UART: [art] PUB.Y = 50551A2EF46D64F17915F2720BA8F72A0114A7BE4529DE10D084FDCD639FE5BDA9A2EFB18B218EC980B4B101370EA081
2,998,715 UART: [art] SIG.R = FA03076FBF409C7F23A76022FE354997C3D828F3EA2999763D24D3452AFEBF1A87225C2A143391082004CB244929F6C2
3,005,469 UART: [art] SIG.S = 1A376841996D0F38A952EF889E11FCE254F34B1AB6A1CF9D2F2351B421F8712CCA33885B91A16D1F9C241B25DC4B9F73
3,028,722 UART: mock_rt_interact::rt_entry...FMC Tester
3,148,275 UART: [rt] Runtime listening for mailbox commands...
3,151,665 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,353 ready_for_fw is high
1,363,353 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,055 >>> mbox cmd response: success
2,475,055 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,536,304 UART:
2,536,320 UART: Running Caliptra FMC ...
2,536,728 UART:
2,536,782 UART: [state] CFI Enabled
2,547,496 UART: [fht] FMC Alias Private Key: 7
2,666,520 UART: [art] Extend RT PCRs Done
2,666,948 UART: [art] Lock RT PCRs Done
2,668,062 UART: [art] Populate DV Done
2,676,067 UART: [fht] FMC Alias Private Key: 7
2,677,083 UART: [art] Derive CDI
2,677,363 UART: [art] Store in slot 0x4
2,763,069 UART: [art] Derive Key Pair
2,763,429 UART: [art] Store priv key in slot 0x5
2,777,104 UART: [art] Derive Key Pair - Done
2,791,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,807,400 UART: [art] Erasing AUTHORITY.KEYID = 7
2,808,165 UART: [art] PUB.X = C2772D2DBF67634E40668C412FA6CEE8EC3CD0FF9E80F84EB618ABB0031F92F02A565837264AA9B99C3E22AE297F4F84
2,814,944 UART: [art] PUB.Y = 4A9AF7FDBF9DBA2181659E07C865B7FDF85135217249D7628377D166195142EB07CDECA0FC59D1D5BED7E43CC0491F4F
2,821,900 UART: [art] SIG.R = BB9562754C72415329B74379552E273C2E16DE12403BD017766B1621E66F352F38C1743637080DEA1123B6E8E11C9118
2,828,648 UART: [art] SIG.S = 99864D0B1EBCF3343FEE1A580F11D353C3B6A5BFD74C9EEC35CA2C622F7E60BA8084D808EF114E93C750D0903617DC28
2,852,185 UART: mock_rt_interact::rt_entry...FMC Tester
2,971,111 UART: [rt] Runtime listening for mailbox commands...
2,974,501 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,754 UART: [kat] SHA2-256
882,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,800 UART: [kat] ++
886,952 UART: [kat] sha1
891,076 UART: [kat] SHA2-256
893,014 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,543 UART: [kat] LMS
1,475,739 UART: [kat] --
1,476,654 UART: [cold-reset] ++
1,477,100 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 ready_for_fw is high
1,481,060 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,549 UART: [idev] Erasing UDS.KEYID = 0
1,505,299 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,907 UART: [idev] --
1,514,958 UART: [ldev] ++
1,515,126 UART: [ldev] CDI.KEYID = 6
1,515,489 UART: [ldev] SUBJECT.KEYID = 5
1,515,915 UART: [ldev] AUTHORITY.KEYID = 7
1,516,378 UART: [ldev] FE.KEYID = 1
1,521,816 UART: [ldev] Erasing FE.KEYID = 1
1,547,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,541 UART: [ldev] --
1,586,864 UART: [fwproc] Waiting for Commands...
1,587,621 UART: [fwproc] Received command 0x46574c44
1,588,412 UART: [fwproc] Received Image of size 79496 bytes
2,486,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,513,709 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,544,927 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,626,704 >>> mbox cmd response: success
2,626,704 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,627,922 UART: [afmc] ++
2,628,090 UART: [afmc] CDI.KEYID = 6
2,628,452 UART: [afmc] SUBJECT.KEYID = 7
2,628,877 UART: [afmc] AUTHORITY.KEYID = 5
2,664,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,680,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,681,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,687,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,693,326 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,699,009 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,706,991 UART: [afmc] --
2,708,031 UART: [cold-reset] --
2,709,113 UART: [state] Locking Datavault
2,710,180 UART: [state] Locking PCR0, PCR1 and PCR31
2,710,784 UART: [state] Locking ICCM
2,711,304 UART: [exit] Launching FMC @ 0x40000130
2,716,634 UART:
2,716,650 UART: Running Caliptra FMC ...
2,717,058 UART:
2,717,201 UART: [state] CFI Enabled
2,728,371 UART: [fht] FMC Alias Private Key: 7
2,846,703 UART: [art] Extend RT PCRs Done
2,847,131 UART: [art] Lock RT PCRs Done
2,848,717 UART: [art] Populate DV Done
2,856,752 UART: [fht] FMC Alias Private Key: 7
2,857,910 UART: [art] Derive CDI
2,858,190 UART: [art] Store in slot 0x4
2,943,920 UART: [art] Derive Key Pair
2,944,280 UART: [art] Store priv key in slot 0x5
2,958,201 UART: [art] Derive Key Pair - Done
2,972,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,987,907 UART: [art] Erasing AUTHORITY.KEYID = 7
2,988,672 UART: [art] PUB.X = 9B06CF88275242F9BA85DFFCED71BC85D96D4C421DC1475FDEA700AEC05117521F347612A598102ED8A7F655D49BDAE5
2,995,429 UART: [art] PUB.Y = CDACE214A01F71D14D90B7695DAD80036471BB1E9488A5CF7DAD12F8C6904419223AD2EF3DF7F940AC2817AAB7B855F7
3,002,390 UART: [art] SIG.R = E8B433768C8939988C1918A6DD24C64AC94220A4AC4C06E45D223E7F411E75C8F5B94ADCA53D6EB2C523A7B3EBBDB38A
3,009,171 UART: [art] SIG.S = 361B8688901516365EADA5849B6216378EE2AB58C9A6B0321BEC458BDA912500A454C0200EDB9D43EA5664908A04C643
3,033,303 UART: mock_rt_interact::rt_entry...FMC Tester
3,152,940 UART: [rt] Runtime listening for mailbox commands...
3,156,330 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,576 ready_for_fw is high
1,362,576 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,658 >>> mbox cmd response: success
2,475,658 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,537,301 UART:
2,537,317 UART: Running Caliptra FMC ...
2,537,725 UART:
2,537,868 UART: [state] CFI Enabled
2,548,536 UART: [fht] FMC Alias Private Key: 7
2,667,392 UART: [art] Extend RT PCRs Done
2,667,820 UART: [art] Lock RT PCRs Done
2,669,226 UART: [art] Populate DV Done
2,677,529 UART: [fht] FMC Alias Private Key: 7
2,678,619 UART: [art] Derive CDI
2,678,899 UART: [art] Store in slot 0x4
2,764,995 UART: [art] Derive Key Pair
2,765,355 UART: [art] Store priv key in slot 0x5
2,778,878 UART: [art] Derive Key Pair - Done
2,793,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,809,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,809,930 UART: [art] PUB.X = 83725F72FCF93A8C5F0E352739C7BB115FF789D02DC0A86F69E5E53146A5ACDA2AAE713318B0404C9612118246E38747
2,816,697 UART: [art] PUB.Y = 13616F8FE09E435AC478A83B642466F580C74B31BF2ACEB896774E72B34533A85699E53D864E897A1DCF3B00689ED6D4
2,823,625 UART: [art] SIG.R = A6D4F183D5E965477D45F7CF2F958F2144D85934FED9D522E351D8416E886ED8207C8FF83F82AA908E28FF3816CC4F58
2,830,399 UART: [art] SIG.S = F96016ED490802F1383727B8C35D32018A14797439BD6416A0D2AA2575A1519FB72C03895D75F38F767A9A9C39E5BF41
2,854,353 UART: mock_rt_interact::rt_entry...FMC Tester
2,973,005 UART: [rt] Runtime listening for mailbox commands...
2,976,395 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,641 UART: [kat] SHA2-512-ACC
906,542 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,144 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,244 UART: [idev] ++
1,173,412 UART: [idev] CDI.KEYID = 6
1,173,773 UART: [idev] SUBJECT.KEYID = 7
1,174,198 UART: [idev] UDS.KEYID = 0
1,174,544 ready_for_fw is high
1,174,544 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,102 UART: [ldev] ++
1,209,270 UART: [ldev] CDI.KEYID = 6
1,209,634 UART: [ldev] SUBJECT.KEYID = 5
1,210,061 UART: [ldev] AUTHORITY.KEYID = 7
1,210,524 UART: [ldev] FE.KEYID = 1
1,215,796 UART: [ldev] Erasing FE.KEYID = 1
1,242,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,772 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,670 UART: [fwproc] Recv command 0x46574c44
1,282,403 UART: [fwproc] Recv'd Img size: 79496 bytes
2,178,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,205,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,236,623 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,318,394 >>> mbox cmd response: success
2,318,394 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,319,582 UART: [afmc] ++
2,319,750 UART: [afmc] CDI.KEYID = 6
2,320,113 UART: [afmc] SUBJECT.KEYID = 7
2,320,539 UART: [afmc] AUTHORITY.KEYID = 5
2,356,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,372,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,373,070 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,378,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,384,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,390,362 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,398,231 UART: [afmc] --
2,399,184 UART: [cold-reset] --
2,400,230 UART: [state] Locking Datavault
2,401,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,401,947 UART: [state] Locking ICCM
2,402,473 UART: [exit] Launching FMC @ 0x40000130
2,407,803 UART:
2,407,819 UART: Running Caliptra FMC ...
2,408,227 UART:
2,408,281 UART: [state] CFI Enabled
2,418,767 UART: [fht] FMC Alias Private Key: 7
2,537,529 UART: [art] Extend RT PCRs Done
2,537,957 UART: [art] Lock RT PCRs Done
2,539,581 UART: [art] Populate DV Done
2,547,680 UART: [fht] FMC Alias Private Key: 7
2,548,706 UART: [art] Derive CDI
2,548,986 UART: [art] Store in slot 0x4
2,634,765 UART: [art] Derive Key Pair
2,635,125 UART: [art] Store priv key in slot 0x5
2,647,999 UART: [art] Derive Key Pair - Done
2,662,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,678,302 UART: [art] Erasing AUTHORITY.KEYID = 7
2,679,067 UART: [art] PUB.X = 18725D401F3CACFAA61476EBE9B25190B72C4065296E1A92BBC3856C7EE765514F819A35DB394BEF783BA498ECC41BD7
2,685,847 UART: [art] PUB.Y = 4E86F3208121605943819DFF3CC9ED9972FA8E65F746900BDEAC4B3D27DA48C1291C83101D235D45C08BA956F45C0467
2,692,791 UART: [art] SIG.R = 1C1154207725A818C46CDF79C17DF49881352F6F2010B3D4CCE1C3B99141C13C78581711E09FBE2C321DF8D36ECCA3B3
2,699,565 UART: [art] SIG.S = FB23530F4D6BA0CE6A18B8C9386D1DB6B5955969D2A8FF8AB42B5417EB598AA554D61B315DB43F282ED464771533D4B1
2,722,838 UART: mock_rt_interact::rt_entry...FMC Tester
2,842,842 UART: [rt] Runtime listening for mailbox commands...
2,846,232 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,182 ready_for_fw is high
1,059,182 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,299 >>> mbox cmd response: success
2,172,299 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,233,852 UART:
2,233,868 UART: Running Caliptra FMC ...
2,234,276 UART:
2,234,330 UART: [state] CFI Enabled
2,244,580 UART: [fht] FMC Alias Private Key: 7
2,363,032 UART: [art] Extend RT PCRs Done
2,363,460 UART: [art] Lock RT PCRs Done
2,365,060 UART: [art] Populate DV Done
2,373,245 UART: [fht] FMC Alias Private Key: 7
2,374,209 UART: [art] Derive CDI
2,374,489 UART: [art] Store in slot 0x4
2,460,436 UART: [art] Derive Key Pair
2,460,796 UART: [art] Store priv key in slot 0x5
2,474,218 UART: [art] Derive Key Pair - Done
2,489,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,504,391 UART: [art] Erasing AUTHORITY.KEYID = 7
2,505,156 UART: [art] PUB.X = 426BB52AACBF8245D491CF2C34CF209F257EE5076894F9542648BC71B58FC997496D28D0CF2859A1C01F1B2257717D3C
2,511,925 UART: [art] PUB.Y = 9F178DEEE19B8BC0DE7DC8FCDE20C08A0D1FB159697788EE3D93FCBEEDDC252C74EE4137B7D895C453F0D7ACE65CF1A5
2,518,902 UART: [art] SIG.R = E73AB6FB3B2AF116335B350218E52D5380A39D96727CADCE58DBC94CF916FCD4E04EE74013CCC8EC6A224B60D0719884
2,525,681 UART: [art] SIG.S = 8CAB85ACCB640CBAB19C1F652E20510C7430E2E1F6E648904359D547A53A81AC5ECC455DD3CB760058A800C27B1885F5
2,549,903 UART: mock_rt_interact::rt_entry...FMC Tester
2,668,298 UART: [rt] Runtime listening for mailbox commands...
2,671,688 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,531 UART: [kat] SHA2-256
901,471 UART: [kat] SHA2-384
904,162 UART: [kat] SHA2-512-ACC
906,063 UART: [kat] ECC-384
915,558 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,307 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,633 UART: [idev] ++
1,172,801 UART: [idev] CDI.KEYID = 6
1,173,162 UART: [idev] SUBJECT.KEYID = 7
1,173,587 UART: [idev] UDS.KEYID = 0
1,173,933 ready_for_fw is high
1,173,933 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,750 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,796 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,242,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,615 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,857 UART: [fwproc] Recv command 0x46574c44
1,282,590 UART: [fwproc] Recv'd Img size: 79496 bytes
2,179,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,065 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,237,240 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,318,985 >>> mbox cmd response: success
2,318,985 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,139 UART: [afmc] ++
2,320,307 UART: [afmc] CDI.KEYID = 6
2,320,670 UART: [afmc] SUBJECT.KEYID = 7
2,321,096 UART: [afmc] AUTHORITY.KEYID = 5
2,357,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,439 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,380,149 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,391,731 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,399,384 UART: [afmc] --
2,400,255 UART: [cold-reset] --
2,401,153 UART: [state] Locking Datavault
2,402,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,403,010 UART: [state] Locking ICCM
2,403,446 UART: [exit] Launching FMC @ 0x40000130
2,408,776 UART:
2,408,792 UART: Running Caliptra FMC ...
2,409,200 UART:
2,409,343 UART: [state] CFI Enabled
2,420,009 UART: [fht] FMC Alias Private Key: 7
2,539,047 UART: [art] Extend RT PCRs Done
2,539,475 UART: [art] Lock RT PCRs Done
2,541,243 UART: [art] Populate DV Done
2,549,688 UART: [fht] FMC Alias Private Key: 7
2,550,708 UART: [art] Derive CDI
2,550,988 UART: [art] Store in slot 0x4
2,636,977 UART: [art] Derive Key Pair
2,637,337 UART: [art] Store priv key in slot 0x5
2,651,019 UART: [art] Derive Key Pair - Done
2,665,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,681,458 UART: [art] Erasing AUTHORITY.KEYID = 7
2,682,223 UART: [art] PUB.X = 6CF87CD2BB3602D31A2DDE9D6F5FBFA718D1276AFA79670314068AAA53970DE4E6BE28349F9EF9CA04CFBF3C13F04F54
2,688,998 UART: [art] PUB.Y = 4806A2BB90E09233D61EAE0531EF289EE56C42F551B919CD96546B5783A17E705376EB61FF6BC56319FC214C3654270E
2,695,937 UART: [art] SIG.R = D67A86E7B6B73865D6704E7BBE7E4C310F3C1DB1E74B34CA65EEBF1DFACEA57A27B203384FF7C1B6891ED06F49495734
2,702,717 UART: [art] SIG.S = 2217E4EBA1C9253FCE6D314012859A2BDB96AF0E4EFF4D8C8D162D53B04F4C3A2D8E11BFE3A251F0C9CC17D23C87B372
2,726,014 UART: mock_rt_interact::rt_entry...FMC Tester
2,845,712 UART: [rt] Runtime listening for mailbox commands...
2,849,102 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,683 ready_for_fw is high
1,059,683 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,366 >>> mbox cmd response: success
2,174,366 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,409 UART:
2,236,425 UART: Running Caliptra FMC ...
2,236,833 UART:
2,236,976 UART: [state] CFI Enabled
2,247,780 UART: [fht] FMC Alias Private Key: 7
2,366,758 UART: [art] Extend RT PCRs Done
2,367,186 UART: [art] Lock RT PCRs Done
2,368,696 UART: [art] Populate DV Done
2,377,099 UART: [fht] FMC Alias Private Key: 7
2,378,145 UART: [art] Derive CDI
2,378,425 UART: [art] Store in slot 0x4
2,463,862 UART: [art] Derive Key Pair
2,464,222 UART: [art] Store priv key in slot 0x5
2,478,372 UART: [art] Derive Key Pair - Done
2,493,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,508,622 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,387 UART: [art] PUB.X = 8418F8FEBC297FB32EB6152470C494F855ADDEDB27EB729F364CDA5BBD1863CE7B50766DEEBC85DDBC3635C37C0C13DB
2,516,178 UART: [art] PUB.Y = 8C97E73DCC2809E1F3D58E18A71C315E3876AD79F4655E4DF3170BC234F9406D586A1E52A5432D4012E087F08703A67E
2,523,117 UART: [art] SIG.R = A02850BECA40A7B0493BC0E8B4B23D127DEADB1D48D97BF816CA9E29C2A4A947D2F70B39A6E04B17AC501AF79C3B4A0B
2,529,903 UART: [art] SIG.S = 443046F6D763AB73A13D19A7C557488081DB3EF24D093F3DE3EC6724F65DB27E65C9DE4ED6970F662CE18A263540F7E0
2,553,083 UART: mock_rt_interact::rt_entry...FMC Tester
2,672,003 UART: [rt] Runtime listening for mailbox commands...
2,675,393 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
892,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,079 UART: [kat] ++
897,231 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,210 UART: [kat] SHA2-512-ACC
908,111 UART: [kat] ECC-384
917,970 UART: [kat] HMAC-384Kdf
922,594 UART: [kat] LMS
1,170,922 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,145 UART: [fht] FHT @ 0x50003400
1,174,804 UART: [idev] ++
1,174,972 UART: [idev] CDI.KEYID = 6
1,175,332 UART: [idev] SUBJECT.KEYID = 7
1,175,756 UART: [idev] UDS.KEYID = 0
1,176,101 ready_for_fw is high
1,176,101 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,183,802 UART: [idev] Erasing UDS.KEYID = 0
1,201,073 UART: [idev] Sha1 KeyId Algorithm
1,209,589 UART: [idev] --
1,210,683 UART: [ldev] ++
1,210,851 UART: [ldev] CDI.KEYID = 6
1,211,214 UART: [ldev] SUBJECT.KEYID = 5
1,211,640 UART: [ldev] AUTHORITY.KEYID = 7
1,212,103 UART: [ldev] FE.KEYID = 1
1,217,205 UART: [ldev] Erasing FE.KEYID = 1
1,244,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,359 UART: [ldev] --
1,283,666 UART: [fwproc] Wait for Commands...
1,284,236 UART: [fwproc] Recv command 0x46574c44
1,284,964 UART: [fwproc] Recv'd Img size: 79496 bytes
2,182,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,995 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,664 >>> mbox cmd response: success
2,321,664 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,724 UART: [afmc] ++
2,322,892 UART: [afmc] CDI.KEYID = 6
2,323,254 UART: [afmc] SUBJECT.KEYID = 7
2,323,679 UART: [afmc] AUTHORITY.KEYID = 5
2,359,636 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,376,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,382,476 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,388,359 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,394,060 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,402,066 UART: [afmc] --
2,403,112 UART: [cold-reset] --
2,403,994 UART: [state] Locking Datavault
2,405,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,629 UART: [state] Locking ICCM
2,406,289 UART: [exit] Launching FMC @ 0x40000130
2,411,619 UART:
2,411,635 UART: Running Caliptra FMC ...
2,412,043 UART:
2,412,097 UART: [state] CFI Enabled
2,422,325 UART: [fht] FMC Alias Private Key: 7
2,541,905 UART: [art] Extend RT PCRs Done
2,542,333 UART: [art] Lock RT PCRs Done
2,543,933 UART: [art] Populate DV Done
2,552,136 UART: [fht] FMC Alias Private Key: 7
2,553,286 UART: [art] Derive CDI
2,553,566 UART: [art] Store in slot 0x4
2,639,925 UART: [art] Derive Key Pair
2,640,285 UART: [art] Store priv key in slot 0x5
2,653,965 UART: [art] Derive Key Pair - Done
2,668,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,684,179 UART: [art] Erasing AUTHORITY.KEYID = 7
2,684,944 UART: [art] PUB.X = E2D70CDB6546C6B12C58F7C7F061774CF77E83034F341BBA0D614A472DD18FF8597470E685D509114CC161A538EE0E15
2,691,701 UART: [art] PUB.Y = D5B015CD46E9A3AFFF5A0531969E7D6854EBFEE5675CCD7FC5AE78D11B6BC1B0B524D8A203CC044CCC83BAC21DD3CFDD
2,698,674 UART: [art] SIG.R = 9F7D8598345213BE4B62329DF09DD5EFB100FA7927832B2E0F110974B32F6CC5E9CCA6C0E5598D1151837D16F7CF2E59
2,705,420 UART: [art] SIG.S = 6B142691EF86896305846B994830CBAC9E6255FA3E46F9D53BC53B10C945D1F3B16793B0AD68E7B69644296C08AF9C9B
2,728,620 UART: mock_rt_interact::rt_entry...FMC Tester
2,847,446 UART: [rt] Runtime listening for mailbox commands...
2,850,836 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 ready_for_fw is high
1,059,777 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,767 >>> mbox cmd response: success
2,173,767 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,262 UART:
2,235,278 UART: Running Caliptra FMC ...
2,235,686 UART:
2,235,740 UART: [state] CFI Enabled
2,246,172 UART: [fht] FMC Alias Private Key: 7
2,365,542 UART: [art] Extend RT PCRs Done
2,365,970 UART: [art] Lock RT PCRs Done
2,367,536 UART: [art] Populate DV Done
2,375,597 UART: [fht] FMC Alias Private Key: 7
2,376,687 UART: [art] Derive CDI
2,376,967 UART: [art] Store in slot 0x4
2,462,624 UART: [art] Derive Key Pair
2,462,984 UART: [art] Store priv key in slot 0x5
2,476,422 UART: [art] Derive Key Pair - Done
2,490,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,185 UART: [art] Erasing AUTHORITY.KEYID = 7
2,506,950 UART: [art] PUB.X = 2A08F4277112016B6C99D5BDC8CE4BBF3F1BA8C46AE84DBF87154C821628B18AB6E32F58F7600AE048C427ABCBDE7DD7
2,513,729 UART: [art] PUB.Y = 33D51D62ADF5ABFB10CF69458DFDB69C55FE6D32375345766B1FC5A42ED55394C73398B5CFEB0848AB1694215919A8F8
2,520,684 UART: [art] SIG.R = 30DD81C1767B06D61F99F9412FCE42A0E8FF81221D5DE5263EDF454315319A43D660E6C9E49F11915DDBBC9A064333FB
2,527,454 UART: [art] SIG.S = 516EF4BF3BF6ABE16D6B9BFAEBE0FDA0DF2AEA8B8B83E4357E73AF6200D25296D05F0B7EE586F72C3B6E2B1B1F77D045
2,551,151 UART: mock_rt_interact::rt_entry...FMC Tester
2,669,508 UART: [rt] Runtime listening for mailbox commands...
2,672,898 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,103 UART: [state] LifecycleState = Unprovisioned
86,758 UART: [state] DebugLocked = No
87,312 UART: [state] WD Timer not started. Device not locked for debugging
88,647 UART: [kat] SHA2-256
894,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,422 UART: [kat] ++
898,574 UART: [kat] sha1
902,974 UART: [kat] SHA2-256
904,914 UART: [kat] SHA2-384
907,677 UART: [kat] SHA2-512-ACC
909,578 UART: [kat] ECC-384
919,671 UART: [kat] HMAC-384Kdf
924,267 UART: [kat] LMS
1,172,595 UART: [kat] --
1,173,604 UART: [cold-reset] ++
1,173,978 UART: [fht] FHT @ 0x50003400
1,176,667 UART: [idev] ++
1,176,835 UART: [idev] CDI.KEYID = 6
1,177,195 UART: [idev] SUBJECT.KEYID = 7
1,177,619 UART: [idev] UDS.KEYID = 0
1,177,964 ready_for_fw is high
1,177,964 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,185,355 UART: [idev] Erasing UDS.KEYID = 0
1,203,044 UART: [idev] Sha1 KeyId Algorithm
1,211,422 UART: [idev] --
1,212,432 UART: [ldev] ++
1,212,600 UART: [ldev] CDI.KEYID = 6
1,212,963 UART: [ldev] SUBJECT.KEYID = 5
1,213,389 UART: [ldev] AUTHORITY.KEYID = 7
1,213,852 UART: [ldev] FE.KEYID = 1
1,219,146 UART: [ldev] Erasing FE.KEYID = 1
1,245,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,298 UART: [ldev] --
1,284,639 UART: [fwproc] Wait for Commands...
1,285,403 UART: [fwproc] Recv command 0x46574c44
1,286,131 UART: [fwproc] Recv'd Img size: 79496 bytes
2,183,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,210,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,241,238 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,322,875 >>> mbox cmd response: success
2,322,875 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,323,911 UART: [afmc] ++
2,324,079 UART: [afmc] CDI.KEYID = 6
2,324,441 UART: [afmc] SUBJECT.KEYID = 7
2,324,866 UART: [afmc] AUTHORITY.KEYID = 5
2,360,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,377,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,378,490 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,384,199 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,390,082 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,395,783 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,403,503 UART: [afmc] --
2,404,421 UART: [cold-reset] --
2,405,199 UART: [state] Locking Datavault
2,406,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,407,064 UART: [state] Locking ICCM
2,407,720 UART: [exit] Launching FMC @ 0x40000130
2,413,050 UART:
2,413,066 UART: Running Caliptra FMC ...
2,413,474 UART:
2,413,617 UART: [state] CFI Enabled
2,424,063 UART: [fht] FMC Alias Private Key: 7
2,543,489 UART: [art] Extend RT PCRs Done
2,543,917 UART: [art] Lock RT PCRs Done
2,545,421 UART: [art] Populate DV Done
2,553,622 UART: [fht] FMC Alias Private Key: 7
2,554,594 UART: [art] Derive CDI
2,554,874 UART: [art] Store in slot 0x4
2,640,381 UART: [art] Derive Key Pair
2,640,741 UART: [art] Store priv key in slot 0x5
2,654,095 UART: [art] Derive Key Pair - Done
2,668,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,684,662 UART: [art] Erasing AUTHORITY.KEYID = 7
2,685,427 UART: [art] PUB.X = 58ED3074F952BD83BF37354606FDCA1DC72062F450BF301BDA9AF8CC3F0169CBBC3E0BB3D65869FB7F812D25DC505AE0
2,692,206 UART: [art] PUB.Y = 1AD1997CDE26D205BB9A353BDAADE386FA2566245E1F9ADBC828640713E82E0DD180FF9A8D72495472CC48B2F1492A60
2,699,157 UART: [art] SIG.R = F1E9FDD7D136C46D5DAF39655B268D22B719C039E87D719AFB90B4E37F6C096AEF550AA165989DA247B5FEF0B0ED8245
2,705,935 UART: [art] SIG.S = F10C5090597CAFE9397970862D163034C8EFDFAA320596B4BA464AEA9A95A474094C0B2D2272A84D8FA29B365FB64D10
2,729,191 UART: mock_rt_interact::rt_entry...FMC Tester
2,849,462 UART: [rt] Runtime listening for mailbox commands...
2,852,852 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 ready_for_fw is high
1,060,748 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,174,404 >>> mbox cmd response: success
2,174,404 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,236,353 UART:
2,236,369 UART: Running Caliptra FMC ...
2,236,777 UART:
2,236,920 UART: [state] CFI Enabled
2,247,708 UART: [fht] FMC Alias Private Key: 7
2,367,544 UART: [art] Extend RT PCRs Done
2,367,972 UART: [art] Lock RT PCRs Done
2,369,690 UART: [art] Populate DV Done
2,377,845 UART: [fht] FMC Alias Private Key: 7
2,378,915 UART: [art] Derive CDI
2,379,195 UART: [art] Store in slot 0x4
2,465,346 UART: [art] Derive Key Pair
2,465,706 UART: [art] Store priv key in slot 0x5
2,479,986 UART: [art] Derive Key Pair - Done
2,494,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,510,048 UART: [art] Erasing AUTHORITY.KEYID = 7
2,510,813 UART: [art] PUB.X = 5C38F3E0DC00942E2D80B8A0F7E2408E471CC11B567539EBCE421E2B4A70C684BB88ADF8C43700062C6FAD0DDED9E08B
2,517,549 UART: [art] PUB.Y = 4AE44D2B095D8E0F8FB04CB606D475C35B4B7A65B8C070E512EAF3D1BE7C7830CE939716AFDBB8E0419AD8276933106C
2,524,502 UART: [art] SIG.R = EFE99D78B92CD1C50A7859CDDA5B58D3A06CEB94C654E9D8951EF53C60F690BB67DF196D8A8F5D4B057D876394D3CFFB
2,531,286 UART: [art] SIG.S = B877F97F8ABE8991D04C18CA452F9636A7D3E56A9E2060576A7E8CFABF33ECE5A2454160E87396F52622272DD87210EC
2,554,706 UART: mock_rt_interact::rt_entry...FMC Tester
2,674,049 UART: [rt] Runtime listening for mailbox commands...
2,677,439 >>> mbox cmd response data (2048 bytes)
test test_rtalias::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
192,189 UART:
192,533 UART: Running Caliptra ROM ...
193,709 UART:
193,858 UART: [state] CFI Enabled
259,832 UART: [state] LifecycleState = Unprovisioned
261,814 UART: [state] DebugLocked = No
264,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,353 UART: [kat] SHA2-256
439,016 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,529 UART: [kat] ++
450,014 UART: [kat] sha1
461,896 UART: [kat] SHA2-256
464,599 UART: [kat] SHA2-384
469,639 UART: [kat] SHA2-512-ACC
472,012 UART: [kat] ECC-384
2,766,919 UART: [kat] HMAC-384Kdf
2,778,236 UART: [kat] LMS
3,968,568 UART: [kat] --
3,972,143 UART: [cold-reset] ++
3,974,494 UART: [fht] Storing FHT @ 0x50003400
3,986,696 UART: [idev] ++
3,987,314 UART: [idev] CDI.KEYID = 6
3,988,231 UART: [idev] SUBJECT.KEYID = 7
3,989,404 UART: [idev] UDS.KEYID = 0
3,990,389 ready_for_fw is high
3,990,579 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,090,696 UART: [idev] Erasing UDS.KEYID = 0
7,327,727 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,741 UART: [idev] --
7,353,057 UART: [ldev] ++
7,353,631 UART: [ldev] CDI.KEYID = 6
7,354,592 UART: [ldev] SUBJECT.KEYID = 5
7,355,796 UART: [ldev] AUTHORITY.KEYID = 7
7,357,078 UART: [ldev] FE.KEYID = 1
7,403,772 UART: [ldev] Erasing FE.KEYID = 1
10,736,049 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,313 UART: [ldev] --
13,093,768 UART: [fwproc] Waiting for Commands...
13,096,397 UART: [fwproc] Received command 0x46574c44
13,098,580 UART: [fwproc] Received Image of size 79496 bytes
16,729,523 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,808,702 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,881,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,072,845 >>> mbox cmd response: success
17,073,249 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,077,900 UART: [afmc] ++
17,078,476 UART: [afmc] CDI.KEYID = 6
17,079,380 UART: [afmc] SUBJECT.KEYID = 7
17,080,645 UART: [afmc] AUTHORITY.KEYID = 5
20,453,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,752,638 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,754,896 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,769,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,784,040 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,798,509 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,820,910 UART: [afmc] --
22,824,716 UART: [cold-reset] --
22,829,378 UART: [state] Locking Datavault
22,834,781 UART: [state] Locking PCR0, PCR1 and PCR31
22,836,536 UART: [state] Locking ICCM
22,839,171 UART: [exit] Launching FMC @ 0x40000130
22,847,564 UART:
22,847,796 UART: Running Caliptra FMC ...
22,848,897 UART:
22,849,051 UART: [state] CFI Enabled
22,911,508 UART: [fht] FMC Alias Private Key: 7
25,252,404 UART: [art] Extend RT PCRs Done
25,253,615 UART: [art] Lock RT PCRs Done
25,255,228 UART: [art] Populate DV Done
25,260,584 UART: [fht] FMC Alias Private Key: 7
25,262,332 UART: [art] Derive CDI
25,263,149 UART: [art] Store in slot 0x4
25,320,037 UART: [art] Derive Key Pair
25,321,072 UART: [art] Store priv key in slot 0x5
28,613,788 UART: [art] Derive Key Pair - Done
28,626,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,914,353 UART: [art] Erasing AUTHORITY.KEYID = 7
30,915,862 UART: [art] PUB.X = DE5F4BFCAE9919DEBCED0EA4AA669C9E004D58239EF7D0D2A2F5575DDA1262689539AAFA08B476D66881AB0AE9662FC5
30,923,169 UART: [art] PUB.Y = 2AF07B506EAFA93D60111AA1239F303C81C92067467A0F049982B83787500B442D4BCF318E29C43A2BA9083F3B088B50
30,930,406 UART: [art] SIG.R = 011F155E0EED84C9E3582AF22268B0AFC24710ADB39668A235C20E6F029C568DB867A330BC8FF827B54BC0AF2A37284D
30,937,781 UART: [art] SIG.S = 0D046044D6DF8339DA1BFEE7774FB59051BC42923DC1C2EE60D1E726BF45A291171FFFC32C04F758D3E1C44865024641
32,242,350 UART: mock_rt_interact::rt_entry...FMC Tester
32,375,271 UART: [rt] Runtime listening for mailbox commands...
32,379,554 >>> mbox cmd response data (2048 bytes)
32,389,665 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,391,380 >>> mbox cmd response data (336 bytes)
32,395,238 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,411,040 >>> mbox cmd response data (1536 bytes)
34,487,392 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,588,240 UART:
34,588,593 UART: Running Caliptra ROM ...
34,589,721 UART:
34,589,879 UART: [state] CFI Enabled
34,667,535 UART: [state] LifecycleState = Unprovisioned
34,669,474 UART: [state] DebugLocked = No
34,670,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,675,960 UART: [kat] SHA2-256
34,845,652 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,856,123 UART: [kat] ++
34,856,613 UART: [kat] sha1
34,868,035 UART: [kat] SHA2-256
34,870,764 UART: [kat] SHA2-384
34,876,760 UART: [kat] SHA2-512-ACC
34,879,160 UART: [kat] ECC-384
37,169,596 UART: [kat] HMAC-384Kdf
37,200,929 UART: [kat] LMS
38,391,286 UART: [kat] --
38,394,486 UART: [update-reset] ++
42,110,586 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,115,096 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,376,126 >>> mbox cmd response: success
42,376,532 UART: [update-reset] Copying MAN_2 To MAN_1
42,398,833 UART: [update-reset Success] --
42,404,069 UART: [state] Locking Datavault
42,406,680 UART: [state] Locking PCR0, PCR1 and PCR31
42,408,432 UART: [state] Locking ICCM
42,410,501 UART: [exit] Launching FMC @ 0x40000130
42,418,943 UART:
42,419,174 UART: Running Caliptra FMC ...
42,420,194 UART:
42,420,337 UART: [state] CFI Enabled
42,524,188 UART: [art] Extend RT PCRs Done
42,525,367 UART: [art] Lock RT PCRs Done
42,526,734 UART: [art] Populate DV Done
42,532,241 UART: [fht] FMC Alias Private Key: 7
42,533,793 UART: [art] Derive CDI
42,534,606 UART: [art] Store in slot 0x4
42,593,687 UART: [art] Derive Key Pair
42,594,733 UART: [art] Store priv key in slot 0x5
45,886,938 UART: [art] Derive Key Pair - Done
45,900,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,188,591 UART: [art] Erasing AUTHORITY.KEYID = 7
48,190,103 UART: [art] PUB.X = 6E3ABA371792707A78A7B9087EDFC616642CA345C299C9A79315E6BE043E75D4A18FA1AD0B355E8713F539B97A55E768
48,197,334 UART: [art] PUB.Y = 8C0D98ABD8C89AE3D76EFD430A0A1B45A25B437C4AE6FA20D0129C30E2538C991B7D51FBD15E4CBB8F75DB48E2970A09
48,204,633 UART: [art] SIG.R = 41F140C4944ED6C4F62DA9D20B9DB2B90A321618CB0ECD23520EEE5B59F3EF3EB9254B54114C5CF0791B6D26EB6AF85A
48,212,060 UART: [art] SIG.S = 85A62A7A78FFE8C8E6A660EB0B0763235C0D3A16B3A898E35521521FE2ACDE10EB5D805C052595683CC56D6F2A4E237C
49,515,803 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,516,825 UART: mock_rt_interact::rt_entry...FMC Tester
49,890,146 UART: [rt] Runtime listening for mailbox commands...
49,893,131 >>> mbox cmd response data (336 bytes)
49,896,924 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,912,772 >>> mbox cmd response data (1536 bytes)
49,920,120 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,920,520 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
3,782,928 ready_for_fw is high
3,783,318 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,135,901 >>> mbox cmd response: success
17,136,811 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
22,833,080 UART:
22,833,470 UART: Running Caliptra FMC ...
22,834,751 UART:
22,834,914 UART: [state] CFI Enabled
22,901,075 UART: [fht] FMC Alias Private Key: 7
25,241,608 UART: [art] Extend RT PCRs Done
25,242,852 UART: [art] Lock RT PCRs Done
25,244,753 UART: [art] Populate DV Done
25,250,432 UART: [fht] FMC Alias Private Key: 7
25,252,085 UART: [art] Derive CDI
25,252,901 UART: [art] Store in slot 0x4
25,309,912 UART: [art] Derive Key Pair
25,310,945 UART: [art] Store priv key in slot 0x5
28,603,553 UART: [art] Derive Key Pair - Done
28,616,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,904,702 UART: [art] Erasing AUTHORITY.KEYID = 7
30,906,204 UART: [art] PUB.X = 2308B5F2B8F8E262DDDACA9CA75C0F6657F58C582D4B030F8DC3856D216E11B749A739AAB3324F81B381897C45BD0F3D
30,913,494 UART: [art] PUB.Y = 4A7BD957C5EB00E216C648D250503F9EAA93A445F4EBB5700FF789F2550D6DB530C73729F7A4526475E2CA10FB703F09
30,920,733 UART: [art] SIG.R = DDDE83547ED7CA693FBE798AA980DEE770102B729554CF5FD18AEC466A6E91B608CC45E75D06BC14C2122B2B0CB1E0BA
30,928,126 UART: [art] SIG.S = 8ADAF2767D7609B10EA29657289620FC8EAB91FC11824609175CB82FF22CB9857B8EF6A65A0CB89196C3B9B55B29B60C
32,233,369 UART: mock_rt_interact::rt_entry...FMC Tester
32,365,106 UART: [rt] Runtime listening for mailbox commands...
32,369,402 >>> mbox cmd response data (2048 bytes)
32,379,342 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,381,053 >>> mbox cmd response data (336 bytes)
32,384,929 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,400,734 >>> mbox cmd response data (1536 bytes)
34,471,086 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,454,847 >>> mbox cmd response: success
42,489,779 UART:
42,490,069 UART: Running Caliptra FMC ...
42,491,101 UART:
42,491,260 UART: [state] CFI Enabled
42,598,739 UART: [art] Extend RT PCRs Done
42,599,951 UART: [art] Lock RT PCRs Done
42,601,377 UART: [art] Populate DV Done
42,607,057 UART: [fht] FMC Alias Private Key: 7
42,608,706 UART: [art] Derive CDI
42,609,438 UART: [art] Store in slot 0x4
42,667,727 UART: [art] Derive Key Pair
42,668,770 UART: [art] Store priv key in slot 0x5
45,960,592 UART: [art] Derive Key Pair - Done
45,973,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,262,683 UART: [art] Erasing AUTHORITY.KEYID = 7
48,264,187 UART: [art] PUB.X = 1C04710143196BF48871F0C6932C8CA39B303E081C030DE3FB7F219EEE4D7E3CFDC5E3C27C14F246263F12AAAACC1830
48,271,463 UART: [art] PUB.Y = 55F34F99B710F414F73D3A05751A8D06E5DA29979C6CE8EF8B9ADC1F7715DCE5E8A0DF6C6CE206888E70F50A98552DB1
48,278,725 UART: [art] SIG.R = 568CF9794B9603A75CCE81390AAF7ABC6305B7F3F0C6F527333CF26149A7E800F0ADC7D0C57C27590B9A2B0E8C263097
48,286,047 UART: [art] SIG.S = 64C88C7FD504E713FB521DAD564EDB63005243F30172FF3F5AFA47D3901CC183EF6C19871E9BAA7DEEB3F017E80049AC
49,589,527 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,590,541 UART: mock_rt_interact::rt_entry...FMC Tester
49,964,860 UART: [rt] Runtime listening for mailbox commands...
49,967,795 >>> mbox cmd response data (336 bytes)
49,971,664 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,987,468 >>> mbox cmd response data (1536 bytes)
49,994,804 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,995,205 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,422 UART:
192,789 UART: Running Caliptra ROM ...
194,076 UART:
603,422 UART: [state] CFI Enabled
617,924 UART: [state] LifecycleState = Unprovisioned
619,795 UART: [state] DebugLocked = No
622,452 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,592 UART: [kat] SHA2-256
796,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,880 UART: [kat] ++
807,326 UART: [kat] sha1
817,595 UART: [kat] SHA2-256
820,289 UART: [kat] SHA2-384
824,862 UART: [kat] SHA2-512-ACC
827,227 UART: [kat] ECC-384
3,110,966 UART: [kat] HMAC-384Kdf
3,124,066 UART: [kat] LMS
4,314,152 UART: [kat] --
4,319,867 UART: [cold-reset] ++
4,321,096 UART: [fht] Storing FHT @ 0x50003400
4,332,593 UART: [idev] ++
4,333,194 UART: [idev] CDI.KEYID = 6
4,334,226 UART: [idev] SUBJECT.KEYID = 7
4,335,398 UART: [idev] UDS.KEYID = 0
4,336,396 ready_for_fw is high
4,336,619 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,436,604 UART: [idev] Erasing UDS.KEYID = 0
7,620,569 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,238 UART: [idev] --
7,643,708 UART: [ldev] ++
7,644,270 UART: [ldev] CDI.KEYID = 6
7,645,385 UART: [ldev] SUBJECT.KEYID = 5
7,646,489 UART: [ldev] AUTHORITY.KEYID = 7
7,647,711 UART: [ldev] FE.KEYID = 1
7,659,374 UART: [ldev] Erasing FE.KEYID = 1
10,942,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,758 UART: [ldev] --
13,306,211 UART: [fwproc] Waiting for Commands...
13,308,678 UART: [fwproc] Received command 0x46574c44
13,310,852 UART: [fwproc] Received Image of size 79496 bytes
16,944,880 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,023,426 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,096,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
17,288,833 >>> mbox cmd response: success
17,289,238 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,293,300 UART: [afmc] ++
17,293,908 UART: [afmc] CDI.KEYID = 6
17,294,819 UART: [afmc] SUBJECT.KEYID = 7
17,296,083 UART: [afmc] AUTHORITY.KEYID = 5
20,611,197 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,908,756 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,911,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,925,427 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,940,172 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,954,528 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,976,211 UART: [afmc] --
22,980,107 UART: [cold-reset] --
22,983,320 UART: [state] Locking Datavault
22,990,242 UART: [state] Locking PCR0, PCR1 and PCR31
22,991,992 UART: [state] Locking ICCM
22,994,247 UART: [exit] Launching FMC @ 0x40000130
23,002,640 UART:
23,002,878 UART: Running Caliptra FMC ...
23,003,979 UART:
23,004,136 UART: [state] CFI Enabled
23,012,070 UART: [fht] FMC Alias Private Key: 7
25,352,954 UART: [art] Extend RT PCRs Done
25,354,177 UART: [art] Lock RT PCRs Done
25,355,984 UART: [art] Populate DV Done
25,361,357 UART: [fht] FMC Alias Private Key: 7
25,362,942 UART: [art] Derive CDI
25,363,672 UART: [art] Store in slot 0x4
25,406,747 UART: [art] Derive Key Pair
25,407,784 UART: [art] Store priv key in slot 0x5
28,650,013 UART: [art] Derive Key Pair - Done
28,663,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,943,886 UART: [art] Erasing AUTHORITY.KEYID = 7
30,945,395 UART: [art] PUB.X = F045AAA86024E261570E01F18033728B8F0819DE9C387C46C4396B7F941C637E36FCC08E9DFB5A4EAE5E80C020E987AD
30,952,653 UART: [art] PUB.Y = D874CA0934F2A5D6A1BC22D9868D2BFD29CB854CA60D289D18FFA5057EE6F4A20875C0287DB1DC6BB72887EE1C5E656A
30,959,934 UART: [art] SIG.R = 906B3F9973A146B5F157024E0B19C9901F240BFF9404ABFDF78086E95FA886ABF4336212DC7529374ADE93B9634F6B4F
30,967,307 UART: [art] SIG.S = 6A9F3F6691EBFDD798964D5AA2377AC5729F240FC3E03FDF463B61D8E7E07CB60121491DDCFA243538882461F64324FF
32,272,147 UART: mock_rt_interact::rt_entry...FMC Tester
32,404,731 UART: [rt] Runtime listening for mailbox commands...
32,409,022 >>> mbox cmd response data (2048 bytes)
32,419,122 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,420,847 >>> mbox cmd response data (336 bytes)
32,424,761 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,440,562 >>> mbox cmd response data (1536 bytes)
34,510,719 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,611,568 UART:
34,611,923 UART: Running Caliptra ROM ...
34,613,056 UART:
34,613,231 UART: [state] CFI Enabled
34,625,125 UART: [state] LifecycleState = Unprovisioned
34,627,013 UART: [state] DebugLocked = No
34,628,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,632,737 UART: [kat] SHA2-256
34,802,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,812,981 UART: [kat] ++
34,813,437 UART: [kat] sha1
34,823,935 UART: [kat] SHA2-256
34,826,622 UART: [kat] SHA2-384
34,833,140 UART: [kat] SHA2-512-ACC
34,835,492 UART: [kat] ECC-384
37,117,955 UART: [kat] HMAC-384Kdf
37,129,428 UART: [kat] LMS
38,319,531 UART: [kat] --
38,325,043 UART: [update-reset] ++
42,052,524 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,057,114 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
42,318,167 >>> mbox cmd response: success
42,320,133 UART: [update-reset] Copying MAN_2 To MAN_1
42,342,557 UART: [update-reset Success] --
42,348,328 UART: [state] Locking Datavault
42,352,890 UART: [state] Locking PCR0, PCR1 and PCR31
42,354,644 UART: [state] Locking ICCM
42,356,904 UART: [exit] Launching FMC @ 0x40000130
42,365,298 UART:
42,365,541 UART: Running Caliptra FMC ...
42,366,639 UART:
42,366,792 UART: [state] CFI Enabled
42,410,926 UART: [art] Extend RT PCRs Done
42,412,102 UART: [art] Lock RT PCRs Done
42,413,496 UART: [art] Populate DV Done
42,419,006 UART: [fht] FMC Alias Private Key: 7
42,420,647 UART: [art] Derive CDI
42,421,454 UART: [art] Store in slot 0x4
42,463,964 UART: [art] Derive Key Pair
42,464,963 UART: [art] Store priv key in slot 0x5
45,707,023 UART: [art] Derive Key Pair - Done
45,720,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,000,766 UART: [art] Erasing AUTHORITY.KEYID = 7
48,002,289 UART: [art] PUB.X = 7DDB52AE91132F8F69A0699AADAC5CEBE443F853BA0B82D692FF0932396A1A6654D0BFC7F1D5CDD394BA3D4B14E4E6F6
48,009,579 UART: [art] PUB.Y = 46A8576E1986DB5662A2A4FEA08B9FCE4A742FB14BBEB0C8FDFFC85A9384CC5B0AD4AFBD52391ED28A426C3FF3B996ED
48,016,836 UART: [art] SIG.R = 658F30523A3E6C39E2F1A1EF6F318EB22CBEFEA9E359336A68D2509141EB843AD565953311338ED240B1C8D02E21826B
48,024,274 UART: [art] SIG.S = AE697AC56DB02CD9DD5ECB7AA3527EDBA018EE2B874AA8107393E4CB243883B94B95708B8E8F2117A9F1738F6324BBE3
49,327,600 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,328,776 UART: mock_rt_interact::rt_entry...FMC Tester
49,703,613 UART: [rt] Runtime listening for mailbox commands...
49,706,561 >>> mbox cmd response data (336 bytes)
49,710,441 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,726,239 >>> mbox cmd response data (1536 bytes)
49,733,549 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,733,942 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,124,286 ready_for_fw is high
4,124,667 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
17,366,766 >>> mbox cmd response: success
17,367,612 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
23,008,331 UART:
23,008,798 UART: Running Caliptra FMC ...
23,009,991 UART:
23,010,152 UART: [state] CFI Enabled
23,018,168 UART: [fht] FMC Alias Private Key: 7
25,357,912 UART: [art] Extend RT PCRs Done
25,359,137 UART: [art] Lock RT PCRs Done
25,360,725 UART: [art] Populate DV Done
25,366,187 UART: [fht] FMC Alias Private Key: 7
25,367,837 UART: [art] Derive CDI
25,368,650 UART: [art] Store in slot 0x4
25,411,020 UART: [art] Derive Key Pair
25,412,015 UART: [art] Store priv key in slot 0x5
28,654,097 UART: [art] Derive Key Pair - Done
28,667,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,948,002 UART: [art] Erasing AUTHORITY.KEYID = 7
30,949,509 UART: [art] PUB.X = AEFACF70ACD9DA8827952C793A922F7037AE9A213E840D308EB6C6CD828B50182FADA2258E1C5A35984E8714F585C289
30,956,782 UART: [art] PUB.Y = 9EA39AA1DEEF3DC2B8567577144893E9DCD79EB5537315EA7BC2E8F0EEFF84C11AFE625BDF19AFD5B70E2FA46CAC231C
30,964,086 UART: [art] SIG.R = 3D522AED9D15D03E2CAE29D015070721C1B9A55E6635D12705465D86BCB5752EA5C093D889CEA66BAD83CA4C21AB9602
30,971,504 UART: [art] SIG.S = ACF9CE9E47569FC24C586E6044EEF2762CF46836B70E685B81D19C1FC934C6B9C4DF3BB6FDA6317582B55C90308397C2
32,276,082 UART: mock_rt_interact::rt_entry...FMC Tester
32,408,737 UART: [rt] Runtime listening for mailbox commands...
32,412,972 >>> mbox cmd response data (2048 bytes)
32,422,654 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
32,424,319 >>> mbox cmd response data (336 bytes)
32,428,263 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
32,444,064 >>> mbox cmd response data (1536 bytes)
34,519,847 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
42,424,060 >>> mbox cmd response: success
42,462,078 UART:
42,462,422 UART: Running Caliptra FMC ...
42,463,549 UART:
42,463,719 UART: [state] CFI Enabled
42,507,684 UART: [art] Extend RT PCRs Done
42,508,836 UART: [art] Lock RT PCRs Done
42,510,449 UART: [art] Populate DV Done
42,515,880 UART: [fht] FMC Alias Private Key: 7
42,517,643 UART: [art] Derive CDI
42,518,462 UART: [art] Store in slot 0x4
42,560,667 UART: [art] Derive Key Pair
42,561,710 UART: [art] Store priv key in slot 0x5
45,803,847 UART: [art] Derive Key Pair - Done
45,817,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,097,354 UART: [art] Erasing AUTHORITY.KEYID = 7
48,098,867 UART: [art] PUB.X = 1BA93886955719188C932868E01E05B6D6A7EF39A28DA8E88F86520A3A4EFA44BFCDA9F4D4AFBAD286886F5707C25DDA
48,106,124 UART: [art] PUB.Y = 15711121747D6A8BF0C6E4EB78C36F92CC7535919D0966110369F3F7D0874B593D2C913207E3FD410A8AC953A5428933
48,113,348 UART: [art] SIG.R = A26CFFFA5123C5BEE86F51F760850DFE71466D11FFA709E436BB4E24CA493A2A9953C8DB2367D94E25632BDC03BB2506
48,120,740 UART: [art] SIG.S = 9668D47F73289EF6753517399D1AE83C14817A52DD24BD3ED503B322C213CF11EEEE80009171CB74CF61B02622838DB1
49,423,889 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
49,425,090 UART: mock_rt_interact::rt_entry...FMC Tester
49,800,725 UART: [rt] Runtime listening for mailbox commands...
49,803,667 >>> mbox cmd response data (336 bytes)
49,807,606 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
49,823,431 >>> mbox cmd response data (1536 bytes)
49,830,778 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
49,831,178 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,237 UART:
192,605 UART: Running Caliptra ROM ...
193,799 UART:
193,955 UART: [state] CFI Enabled
266,725 UART: [state] LifecycleState = Unprovisioned
268,643 UART: [state] DebugLocked = No
270,112 UART: [state] WD Timer not started. Device not locked for debugging
274,731 UART: [kat] SHA2-256
454,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,202 UART: [kat] ++
465,703 UART: [kat] sha1
477,003 UART: [kat] SHA2-256
479,669 UART: [kat] SHA2-384
485,025 UART: [kat] SHA2-512-ACC
487,403 UART: [kat] ECC-384
2,947,981 UART: [kat] HMAC-384Kdf
2,971,371 UART: [kat] LMS
3,447,827 UART: [kat] --
3,453,097 UART: [cold-reset] ++
3,455,744 UART: [fht] FHT @ 0x50003400
3,466,024 UART: [idev] ++
3,466,600 UART: [idev] CDI.KEYID = 6
3,467,552 UART: [idev] SUBJECT.KEYID = 7
3,468,793 UART: [idev] UDS.KEYID = 0
3,469,691 ready_for_fw is high
3,469,873 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,569,974 UART: [idev] Erasing UDS.KEYID = 0
5,987,351 UART: [idev] Sha1 KeyId Algorithm
6,011,815 UART: [idev] --
6,016,186 UART: [ldev] ++
6,016,757 UART: [ldev] CDI.KEYID = 6
6,017,728 UART: [ldev] SUBJECT.KEYID = 5
6,018,888 UART: [ldev] AUTHORITY.KEYID = 7
6,020,174 UART: [ldev] FE.KEYID = 1
6,056,793 UART: [ldev] Erasing FE.KEYID = 1
8,560,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,571 UART: [ldev] --
10,374,181 UART: [fwproc] Wait for Commands...
10,376,919 UART: [fwproc] Recv command 0x46574c44
10,378,948 UART: [fwproc] Recv'd Img size: 79496 bytes
13,377,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,458,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,531,093 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,722,067 >>> mbox cmd response: success
13,722,500 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,725,909 UART: [afmc] ++
13,726,488 UART: [afmc] CDI.KEYID = 6
13,727,426 UART: [afmc] SUBJECT.KEYID = 7
13,728,662 UART: [afmc] AUTHORITY.KEYID = 5
16,255,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,980,796 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,983,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,998,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,014,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,030,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,055,032 UART: [afmc] --
18,058,752 UART: [cold-reset] --
18,062,279 UART: [state] Locking Datavault
18,067,210 UART: [state] Locking PCR0, PCR1 and PCR31
18,068,965 UART: [state] Locking ICCM
18,071,031 UART: [exit] Launching FMC @ 0x40000130
18,079,438 UART:
18,079,683 UART: Running Caliptra FMC ...
18,080,793 UART:
18,080,974 UART: [state] CFI Enabled
18,135,333 UART: [fht] FMC Alias Private Key: 7
19,923,097 UART: [art] Extend RT PCRs Done
19,924,322 UART: [art] Lock RT PCRs Done
19,925,920 UART: [art] Populate DV Done
19,931,493 UART: [fht] FMC Alias Private Key: 7
19,933,135 UART: [art] Derive CDI
19,933,866 UART: [art] Store in slot 0x4
19,988,779 UART: [art] Derive Key Pair
19,989,819 UART: [art] Store priv key in slot 0x5
22,452,898 UART: [art] Derive Key Pair - Done
22,465,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,178,041 UART: [art] Erasing AUTHORITY.KEYID = 7
24,179,551 UART: [art] PUB.X = D60592DB2F79E6544FD9DFEE07C5CCE9815702EDD617E071A71E776211C0D569EDE0EBC668F80727771646E31D6400D6
24,186,744 UART: [art] PUB.Y = 87945EE255CD611D4D9D3A8C75DE10ABDDB6DCA86A4B1D3B78497E9DB5FFADA5D08B47380CF30775447DFDCB00B559C5
24,194,041 UART: [art] SIG.R = E86AD822203111399C43873F091276D619BB43E84C4C0CBA5D9FFD0DFACB5612D2C9ABD472E4149D5CF52C31A2EF9E3A
24,201,469 UART: [art] SIG.S = DE1743F7EC28F8226AE47114611946887323B1980ACCB1F14F9AB1FD22535585642D9D94080BB4E4D00B225F6F1C7359
25,179,390 UART: mock_rt_interact::rt_entry...FMC Tester
25,310,533 UART: [rt] Runtime listening for mailbox commands...
25,314,819 >>> mbox cmd response data (2048 bytes)
25,324,780 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,326,479 >>> mbox cmd response data (336 bytes)
25,330,296 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,346,113 >>> mbox cmd response data (1536 bytes)
27,422,156 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,523,120 UART:
27,523,508 UART: Running Caliptra ROM ...
27,524,607 UART:
27,524,794 UART: [state] CFI Enabled
27,591,244 UART: [state] LifecycleState = Unprovisioned
27,593,235 UART: [state] DebugLocked = No
27,595,653 UART: [state] WD Timer not started. Device not locked for debugging
27,598,957 UART: [kat] SHA2-256
27,778,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,789,408 UART: [kat] ++
27,789,953 UART: [kat] sha1
27,801,062 UART: [kat] SHA2-256
27,803,754 UART: [kat] SHA2-384
27,809,359 UART: [kat] SHA2-512-ACC
27,811,714 UART: [kat] ECC-384
30,272,871 UART: [kat] HMAC-384Kdf
30,293,858 UART: [kat] LMS
30,770,324 UART: [kat] --
30,774,189 UART: [update-reset] ++
33,790,927 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,795,130 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,056,044 >>> mbox cmd response: success
34,056,842 UART: [update-reset] Copying MAN_2 To MAN_1
34,093,982 UART: [update-reset Success] --
34,098,810 UART: [state] Locking Datavault
34,101,476 UART: [state] Locking PCR0, PCR1 and PCR31
34,103,229 UART: [state] Locking ICCM
34,105,996 UART: [exit] Launching FMC @ 0x40000130
34,114,388 UART:
34,114,622 UART: Running Caliptra FMC ...
34,115,642 UART:
34,115,783 UART: [state] CFI Enabled
34,208,537 UART: [art] Extend RT PCRs Done
34,209,720 UART: [art] Lock RT PCRs Done
34,211,092 UART: [art] Populate DV Done
34,216,685 UART: [fht] FMC Alias Private Key: 7
34,218,370 UART: [art] Derive CDI
34,219,112 UART: [art] Store in slot 0x4
34,277,831 UART: [art] Derive Key Pair
34,278,835 UART: [art] Store priv key in slot 0x5
36,740,865 UART: [art] Derive Key Pair - Done
36,753,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,466,926 UART: [art] Erasing AUTHORITY.KEYID = 7
38,468,454 UART: [art] PUB.X = 5200B0078D7F1750C9189164B5FA89B6AF3FE746C86EE314DE87E1991596ED79F0576E312C29424508679CA69E37E032
38,475,688 UART: [art] PUB.Y = 5DCA171284E7558B117A8293F50AE482ACE90E7C64E60FB713FA9D4E6B298A43B4BEBF861C6ACECAB455210DEE94A855
38,482,965 UART: [art] SIG.R = EBE99784DA3AD8C4D4B3B8FB1D3718DB23A361619FE4EDA5A87D08CD088C3ED971264D14F298C64AB5E7FC3A3209C9C8
38,490,340 UART: [art] SIG.S = 85E1FFFBC43AABF1F2DAFE67EB8C173484F83EECE52FF33AA2B61DCF9EA384DD24E12A35B527E042246C6E64DB4A7158
39,467,807 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,469,096 UART: mock_rt_interact::rt_entry...FMC Tester
39,841,878 UART: [rt] Runtime listening for mailbox commands...
39,844,873 >>> mbox cmd response data (336 bytes)
39,848,812 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,864,620 >>> mbox cmd response data (1536 bytes)
39,871,941 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,872,342 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,462,224 ready_for_fw is high
3,462,715 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,614,280 >>> mbox cmd response: success
13,614,910 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
17,916,491 UART:
17,916,881 UART: Running Caliptra FMC ...
17,918,094 UART:
17,918,259 UART: [state] CFI Enabled
17,982,424 UART: [fht] FMC Alias Private Key: 7
19,748,852 UART: [art] Extend RT PCRs Done
19,750,100 UART: [art] Lock RT PCRs Done
19,751,805 UART: [art] Populate DV Done
19,757,440 UART: [fht] FMC Alias Private Key: 7
19,758,911 UART: [art] Derive CDI
19,759,648 UART: [art] Store in slot 0x4
19,815,040 UART: [art] Derive Key Pair
19,816,044 UART: [art] Store priv key in slot 0x5
22,278,610 UART: [art] Derive Key Pair - Done
22,291,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,004,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,005,826 UART: [art] PUB.X = 134454E624F02B0F64E0ACAFB1A8B05D424E1D42FC7ECF2954F3ADA15AE6549CA843084A57476A8CFCB66EF2CA78304B
24,013,091 UART: [art] PUB.Y = CA686F315D38594228E46DD5BB18F2229D6631566DE6FDFB17E102635D7F4608947A649DF63DE8F1906ED81869C6F5C2
24,020,352 UART: [art] SIG.R = F328CA139347F983688AB083530BF6766A4F1B3EC0F05518A65D3E0EE9F8839708942D2F18B1C8C4905A231EE3D32A15
24,027,695 UART: [art] SIG.S = 8170975A14CF432E0C7483E6EBAAD451A49E5E5C6720C958AF61E1FA73B15968F707824DADFCCCCB255792F9C5E97165
25,006,155 UART: mock_rt_interact::rt_entry...FMC Tester
25,137,596 UART: [rt] Runtime listening for mailbox commands...
25,141,866 >>> mbox cmd response data (2048 bytes)
25,151,564 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,153,236 >>> mbox cmd response data (336 bytes)
25,157,119 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,172,927 >>> mbox cmd response data (1536 bytes)
27,235,710 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,858,671 >>> mbox cmd response: success
33,892,886 UART:
33,893,192 UART: Running Caliptra FMC ...
33,894,232 UART:
33,894,380 UART: [state] CFI Enabled
33,995,723 UART: [art] Extend RT PCRs Done
33,996,941 UART: [art] Lock RT PCRs Done
33,998,317 UART: [art] Populate DV Done
34,003,820 UART: [fht] FMC Alias Private Key: 7
34,005,384 UART: [art] Derive CDI
34,006,124 UART: [art] Store in slot 0x4
34,064,785 UART: [art] Derive Key Pair
34,065,783 UART: [art] Store priv key in slot 0x5
36,528,594 UART: [art] Derive Key Pair - Done
36,541,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,255,029 UART: [art] Erasing AUTHORITY.KEYID = 7
38,256,541 UART: [art] PUB.X = DE5BB40E86D4F42419AFD561995AB330F168653BED997875CF266EA81C27A29EC49D8536E174B91F090213F662EE083E
38,263,835 UART: [art] PUB.Y = 4A7AD3E8DD83854F884ACB4696EE9ADCAC8BCA2CA3D45F6CF681BA4556D3F4C7C44E18ECEB0FD7D1AB8DB5A848FD896E
38,271,102 UART: [art] SIG.R = 522DEA7650DB4206FE37F73F5594F5B0230B74672C3D3469FE00E1C709D5DF604505EF722B9D35BDF972B3E5AAC35848
38,278,474 UART: [art] SIG.S = C0E5212104FAE27CE174D661DAB38F6854B7E6B34CBC71DD0FC5424EBFB857DBC9C82CFE4257187BB02B8E3DAE31FAB9
39,255,751 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,256,954 UART: mock_rt_interact::rt_entry...FMC Tester
39,629,484 UART: [rt] Runtime listening for mailbox commands...
39,632,474 >>> mbox cmd response data (336 bytes)
39,636,276 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,652,088 >>> mbox cmd response data (1536 bytes)
39,659,408 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,659,808 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,356 UART:
192,720 UART: Running Caliptra ROM ...
193,799 UART:
603,535 UART: [state] CFI Enabled
614,282 UART: [state] LifecycleState = Unprovisioned
616,231 UART: [state] DebugLocked = No
618,898 UART: [state] WD Timer not started. Device not locked for debugging
622,790 UART: [kat] SHA2-256
802,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,174 UART: [kat] ++
813,724 UART: [kat] sha1
824,188 UART: [kat] SHA2-256
826,876 UART: [kat] SHA2-384
832,038 UART: [kat] SHA2-512-ACC
834,416 UART: [kat] ECC-384
3,273,964 UART: [kat] HMAC-384Kdf
3,286,766 UART: [kat] LMS
3,763,221 UART: [kat] --
3,768,920 UART: [cold-reset] ++
3,771,416 UART: [fht] FHT @ 0x50003400
3,783,399 UART: [idev] ++
3,784,009 UART: [idev] CDI.KEYID = 6
3,784,900 UART: [idev] SUBJECT.KEYID = 7
3,786,217 UART: [idev] UDS.KEYID = 0
3,787,108 ready_for_fw is high
3,787,298 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,887,192 UART: [idev] Erasing UDS.KEYID = 0
6,264,775 UART: [idev] Sha1 KeyId Algorithm
6,288,927 UART: [idev] --
6,293,971 UART: [ldev] ++
6,294,603 UART: [ldev] CDI.KEYID = 6
6,295,484 UART: [ldev] SUBJECT.KEYID = 5
6,296,695 UART: [ldev] AUTHORITY.KEYID = 7
6,297,985 UART: [ldev] FE.KEYID = 1
6,308,541 UART: [ldev] Erasing FE.KEYID = 1
8,786,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,153 UART: [ldev] --
10,580,363 UART: [fwproc] Wait for Commands...
10,582,075 UART: [fwproc] Recv command 0x46574c44
10,584,081 UART: [fwproc] Recv'd Img size: 79496 bytes
13,590,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,670,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,743,592 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,934,832 >>> mbox cmd response: success
13,935,264 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,939,811 UART: [afmc] ++
13,940,580 UART: [afmc] CDI.KEYID = 6
13,941,504 UART: [afmc] SUBJECT.KEYID = 7
13,942,610 UART: [afmc] AUTHORITY.KEYID = 5
16,450,082 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,169,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,171,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,187,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,203,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,219,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,243,623 UART: [afmc] --
18,247,380 UART: [cold-reset] --
18,253,311 UART: [state] Locking Datavault
18,259,263 UART: [state] Locking PCR0, PCR1 and PCR31
18,261,105 UART: [state] Locking ICCM
18,262,725 UART: [exit] Launching FMC @ 0x40000130
18,271,119 UART:
18,271,354 UART: Running Caliptra FMC ...
18,272,451 UART:
18,272,606 UART: [state] CFI Enabled
18,280,457 UART: [fht] FMC Alias Private Key: 7
20,046,573 UART: [art] Extend RT PCRs Done
20,047,800 UART: [art] Lock RT PCRs Done
20,049,317 UART: [art] Populate DV Done
20,054,834 UART: [fht] FMC Alias Private Key: 7
20,056,479 UART: [art] Derive CDI
20,057,294 UART: [art] Store in slot 0x4
20,099,719 UART: [art] Derive Key Pair
20,101,039 UART: [art] Store priv key in slot 0x5
22,526,963 UART: [art] Derive Key Pair - Done
22,539,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,245,749 UART: [art] Erasing AUTHORITY.KEYID = 7
24,247,253 UART: [art] PUB.X = D2A89476D756976E3F100FB35781B07108473E6347340B097C051BE0D8BFE130FC630B5D6399FFD614EBE59BB83770F0
24,254,522 UART: [art] PUB.Y = C358E0CD5298BDFC5B9456C618233BBA0C63663A0FFC7419E5E13F435F97D61E184AB017D7E9208F87CFF363E42D2ED0
24,261,797 UART: [art] SIG.R = 3C3179C448D076ACB01EF368F14586A4DF055099D495DB692087D87CC5BE762B53D2DC14F1926C756A4E3B6E829B5D72
24,269,148 UART: [art] SIG.S = 679FAAE941064990E4DBD5BBD1815E991ABAC1D5FF5CA37350E021F46D212F5514B17B709B1742A7282BBD822573ACF3
25,247,776 UART: mock_rt_interact::rt_entry...FMC Tester
25,380,159 UART: [rt] Runtime listening for mailbox commands...
25,384,428 >>> mbox cmd response data (2048 bytes)
25,394,369 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,396,056 >>> mbox cmd response data (336 bytes)
25,399,965 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,415,762 >>> mbox cmd response data (1536 bytes)
27,478,236 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,579,084 UART:
27,579,449 UART: Running Caliptra ROM ...
27,580,590 UART:
27,580,756 UART: [state] CFI Enabled
27,594,004 UART: [state] LifecycleState = Unprovisioned
27,595,909 UART: [state] DebugLocked = No
27,598,154 UART: [state] WD Timer not started. Device not locked for debugging
27,601,238 UART: [kat] SHA2-256
27,780,906 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,791,717 UART: [kat] ++
27,792,205 UART: [kat] sha1
27,803,195 UART: [kat] SHA2-256
27,805,859 UART: [kat] SHA2-384
27,812,070 UART: [kat] SHA2-512-ACC
27,814,428 UART: [kat] ECC-384
30,255,797 UART: [kat] HMAC-384Kdf
30,268,673 UART: [kat] LMS
30,745,162 UART: [kat] --
30,750,166 UART: [update-reset] ++
33,766,383 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,769,055 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,029,981 >>> mbox cmd response: success
34,030,647 UART: [update-reset] Copying MAN_2 To MAN_1
34,067,784 UART: [update-reset Success] --
34,072,619 UART: [state] Locking Datavault
34,077,119 UART: [state] Locking PCR0, PCR1 and PCR31
34,078,879 UART: [state] Locking ICCM
34,081,406 UART: [exit] Launching FMC @ 0x40000130
34,089,825 UART:
34,090,073 UART: Running Caliptra FMC ...
34,091,182 UART:
34,091,356 UART: [state] CFI Enabled
34,135,485 UART: [art] Extend RT PCRs Done
34,136,669 UART: [art] Lock RT PCRs Done
34,138,283 UART: [art] Populate DV Done
34,143,541 UART: [fht] FMC Alias Private Key: 7
34,145,024 UART: [art] Derive CDI
34,145,947 UART: [art] Store in slot 0x4
34,188,917 UART: [art] Derive Key Pair
34,189,963 UART: [art] Store priv key in slot 0x5
36,616,752 UART: [art] Derive Key Pair - Done
36,629,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,335,696 UART: [art] Erasing AUTHORITY.KEYID = 7
38,337,218 UART: [art] PUB.X = 74C7F94199598C677544412E41EF3A25352E9BF1FD58D65E34C73C94DC083512037CD8AEEA134B7465BA87344B00A550
38,344,511 UART: [art] PUB.Y = B5C69F748247E732E8F0BFAA6135D6B6BDFA931ACD698AB95A9E7EC18245A5C9A1435CEFF2E86EFAA47712798455278B
38,351,755 UART: [art] SIG.R = DA53D8CD80313A8D14B2A785DD318B688BEBCA784F2C4E28AE977086BF81DF72BBD9412BC1E87ECB1CE2DB26DDE36506
38,359,144 UART: [art] SIG.S = B09A5746B27CE8DEDA5C30C9AEFB518D1B1A8717D1FBEB7F087DD4D862C9037B6C461FFE9D8D0CA86007303376C4AE26
39,336,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,337,402 UART: mock_rt_interact::rt_entry...FMC Tester
39,709,831 UART: [rt] Runtime listening for mailbox commands...
39,712,784 >>> mbox cmd response data (336 bytes)
39,716,456 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,732,261 >>> mbox cmd response data (1536 bytes)
39,739,575 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,739,969 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
3,784,933 ready_for_fw is high
3,785,368 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,825,580 >>> mbox cmd response: success
13,826,087 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,073,675 UART:
18,074,072 UART: Running Caliptra FMC ...
18,075,242 UART:
18,075,401 UART: [state] CFI Enabled
18,083,274 UART: [fht] FMC Alias Private Key: 7
19,849,432 UART: [art] Extend RT PCRs Done
19,850,664 UART: [art] Lock RT PCRs Done
19,852,556 UART: [art] Populate DV Done
19,858,022 UART: [fht] FMC Alias Private Key: 7
19,859,520 UART: [art] Derive CDI
19,860,282 UART: [art] Store in slot 0x4
19,903,400 UART: [art] Derive Key Pair
19,904,449 UART: [art] Store priv key in slot 0x5
22,331,225 UART: [art] Derive Key Pair - Done
22,344,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,050,658 UART: [art] Erasing AUTHORITY.KEYID = 7
24,052,180 UART: [art] PUB.X = 1D7D7B6E7FC7C30554A363F419BB8188B88E80BC638317683B571266E6C25904E60ED50DB90EAD1A308991E9596152A1
24,059,425 UART: [art] PUB.Y = CCD786EC8003D96D32A730AAE69CBAFC5C5A6AD25740C2D5BCCD6A16D156DF98946F275054C59923348B0EADF65F77D8
24,066,699 UART: [art] SIG.R = 203F9169559651422BCD0927461A125608214CB56B8E5D163EDCE78973E306924799EEE8AE6A406F694A94E75ECF62B3
24,074,082 UART: [art] SIG.S = 3663DD3195B8FF32137D2597A2BD296F1E0DF8A3F4F8DC825E98A564D4285ADAE7A3DEE63ACD1C0C62EEBE14F2848883
25,052,590 UART: mock_rt_interact::rt_entry...FMC Tester
25,184,165 UART: [rt] Runtime listening for mailbox commands...
25,188,396 >>> mbox cmd response data (2048 bytes)
25,198,074 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,199,736 >>> mbox cmd response data (336 bytes)
25,203,618 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,219,426 >>> mbox cmd response data (1536 bytes)
27,281,679 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
33,834,969 >>> mbox cmd response: success
33,870,922 UART:
33,871,219 UART: Running Caliptra FMC ...
33,872,343 UART:
33,872,509 UART: [state] CFI Enabled
33,916,918 UART: [art] Extend RT PCRs Done
33,918,110 UART: [art] Lock RT PCRs Done
33,919,681 UART: [art] Populate DV Done
33,924,979 UART: [fht] FMC Alias Private Key: 7
33,926,688 UART: [art] Derive CDI
33,927,511 UART: [art] Store in slot 0x4
33,970,447 UART: [art] Derive Key Pair
33,971,512 UART: [art] Store priv key in slot 0x5
36,397,962 UART: [art] Derive Key Pair - Done
36,411,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,117,341 UART: [art] Erasing AUTHORITY.KEYID = 7
38,118,881 UART: [art] PUB.X = D4FE9CEEA736F9BA981F909CA06DB03407D1C8F37FF5B27CD506C22C6FB1684AC95964BDC783F537B516E973E1569C45
38,126,163 UART: [art] PUB.Y = 3274C97714F8BEA87331D0421FF5AC77F09CE787FF39459054A3BA3FA2087FA076CDFC8886BB035650B2AFA5297542AE
38,133,358 UART: [art] SIG.R = 345AD53A31A31AFC4C6ADA77B1BC2ADB3514AF16BD99EFE3A1E322AB550BE9D14525637E72BE322A6472FA3A34107E99
38,140,809 UART: [art] SIG.S = F7FB08364EFCDB3F0CDAF8F55C136D6E12D2F251ED61D05CFDFEFB0D5F675C5F2541E18DC6B4DDEF4751E41A0D962E6B
39,118,701 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,119,881 UART: mock_rt_interact::rt_entry...FMC Tester
39,493,957 UART: [rt] Runtime listening for mailbox commands...
39,496,893 >>> mbox cmd response data (336 bytes)
39,500,774 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
39,516,565 >>> mbox cmd response data (1536 bytes)
39,523,872 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
39,524,270 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,985 UART:
192,341 UART: Running Caliptra ROM ...
193,419 UART:
193,583 UART: [state] CFI Enabled
263,720 UART: [state] LifecycleState = Unprovisioned
266,276 UART: [state] DebugLocked = No
268,083 UART: [state] WD Timer not started. Device not locked for debugging
273,546 UART: [kat] SHA2-256
463,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,181 UART: [kat] ++
474,712 UART: [kat] sha1
486,157 UART: [kat] SHA2-256
489,170 UART: [kat] SHA2-384
495,014 UART: [kat] SHA2-512-ACC
497,667 UART: [kat] ECC-384
2,947,247 UART: [kat] HMAC-384Kdf
2,970,963 UART: [kat] LMS
3,502,750 UART: [kat] --
3,507,695 UART: [cold-reset] ++
3,510,285 UART: [fht] FHT @ 0x50003400
3,521,973 UART: [idev] ++
3,522,613 UART: [idev] CDI.KEYID = 6
3,523,565 UART: [idev] SUBJECT.KEYID = 7
3,524,808 UART: [idev] UDS.KEYID = 0
3,525,704 ready_for_fw is high
3,525,913 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,626,230 UART: [idev] Erasing UDS.KEYID = 0
6,028,431 UART: [idev] Sha1 KeyId Algorithm
6,049,947 UART: [idev] --
6,054,757 UART: [ldev] ++
6,055,440 UART: [ldev] CDI.KEYID = 6
6,056,380 UART: [ldev] SUBJECT.KEYID = 5
6,057,543 UART: [ldev] AUTHORITY.KEYID = 7
6,058,723 UART: [ldev] FE.KEYID = 1
6,100,258 UART: [ldev] Erasing FE.KEYID = 1
8,606,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,840 UART: [ldev] --
10,414,047 UART: [fwproc] Wait for Commands...
10,416,519 UART: [fwproc] Recv command 0x46574c44
10,418,774 UART: [fwproc] Recv'd Img size: 79496 bytes
13,432,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,507,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,631,075 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
13,956,413 >>> mbox cmd response: success
13,956,862 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
13,959,837 UART: [afmc] ++
13,960,534 UART: [afmc] CDI.KEYID = 6
13,961,791 UART: [afmc] SUBJECT.KEYID = 7
13,963,223 UART: [afmc] AUTHORITY.KEYID = 5
16,486,533 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,211,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,213,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,228,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,244,160 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,259,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,283,347 UART: [afmc] --
18,285,986 UART: [cold-reset] --
18,288,986 UART: [state] Locking Datavault
18,295,416 UART: [state] Locking PCR0, PCR1 and PCR31
18,297,546 UART: [state] Locking ICCM
18,300,458 UART: [exit] Launching FMC @ 0x40000130
18,309,131 UART:
18,309,366 UART: Running Caliptra FMC ...
18,310,403 UART:
18,310,551 UART: [state] CFI Enabled
18,369,073 UART: [fht] FMC Alias Private Key: 7
20,135,914 UART: [art] Extend RT PCRs Done
20,137,132 UART: [art] Lock RT PCRs Done
20,138,780 UART: [art] Populate DV Done
20,143,973 UART: [fht] FMC Alias Private Key: 7
20,145,561 UART: [art] Derive CDI
20,146,294 UART: [art] Store in slot 0x4
20,202,126 UART: [art] Derive Key Pair
20,203,166 UART: [art] Store priv key in slot 0x5
22,666,008 UART: [art] Derive Key Pair - Done
22,678,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,392,155 UART: [art] Erasing AUTHORITY.KEYID = 7
24,393,666 UART: [art] PUB.X = BA263B4F17CFA41757B8DD985874C6BE2DBBFD7414F782726E758C6B87DF7F20BD85CE584F007414C55B2AB3D206C9D6
24,400,915 UART: [art] PUB.Y = 3F0EBC5313DC7895C537AAA4055367324B36BC5E055EA31BC4DFF72C6F175211D5DE0D1D4BED471DE50668848B61EA58
24,408,181 UART: [art] SIG.R = A762536584FC1DC718219FE030F8E90E8F368397B2A1F86E6062269AF14410901715304521D4D9D5AC942A69D32436FE
24,415,547 UART: [art] SIG.S = 797712BA16681D45576937C8C487EE42B3FFD7EEB8750DF95F170DAFE252BD165C5F5B87321A47199214500E87DCFF88
25,394,774 UART: mock_rt_interact::rt_entry...FMC Tester
25,527,619 UART: [rt] Runtime listening for mailbox commands...
25,531,903 >>> mbox cmd response data (2048 bytes)
25,541,978 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,543,692 >>> mbox cmd response data (336 bytes)
25,547,879 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,563,754 >>> mbox cmd response data (1536 bytes)
27,624,479 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,725,510 UART:
27,725,878 UART: Running Caliptra ROM ...
27,727,041 UART:
27,727,220 UART: [state] CFI Enabled
27,803,749 UART: [state] LifecycleState = Unprovisioned
27,805,843 UART: [state] DebugLocked = No
27,807,942 UART: [state] WD Timer not started. Device not locked for debugging
27,812,643 UART: [kat] SHA2-256
28,002,505 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,013,236 UART: [kat] ++
28,013,723 UART: [kat] sha1
28,025,151 UART: [kat] SHA2-256
28,028,158 UART: [kat] SHA2-384
28,034,808 UART: [kat] SHA2-512-ACC
28,037,383 UART: [kat] ECC-384
30,489,040 UART: [kat] HMAC-384Kdf
30,517,862 UART: [kat] LMS
31,049,452 UART: [kat] --
31,052,152 UART: [update-reset] ++
34,074,545 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,077,820 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,473,287 >>> mbox cmd response: success
34,473,699 UART: [update-reset] Copying MAN_2 To MAN_1
34,511,069 UART: [update-reset Success] --
34,515,442 UART: [state] Locking Datavault
34,518,870 UART: [state] Locking PCR0, PCR1 and PCR31
34,521,006 UART: [state] Locking ICCM
34,522,522 UART: [exit] Launching FMC @ 0x40000130
34,531,187 UART:
34,531,421 UART: Running Caliptra FMC ...
34,532,523 UART:
34,532,697 UART: [state] CFI Enabled
34,625,993 UART: [art] Extend RT PCRs Done
34,627,170 UART: [art] Lock RT PCRs Done
34,628,322 UART: [art] Populate DV Done
34,634,002 UART: [fht] FMC Alias Private Key: 7
34,635,545 UART: [art] Derive CDI
34,636,357 UART: [art] Store in slot 0x4
34,695,158 UART: [art] Derive Key Pair
34,696,218 UART: [art] Store priv key in slot 0x5
37,158,725 UART: [art] Derive Key Pair - Done
37,172,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,884,589 UART: [art] Erasing AUTHORITY.KEYID = 7
38,886,096 UART: [art] PUB.X = 0DAF583A61C6BF1B4E8339A1A62298AED7CF4713E6267F616885A54F650230E8C80E6CBD25C726088997328C0628F004
38,893,303 UART: [art] PUB.Y = B20EDE863713B5696033DEA8E3CF100F6A6AE01761580E14E5AEBA5645A9BE8671B679E1F23E105B8BF27197269C884F
38,900,602 UART: [art] SIG.R = 051AAE20D4935D6277260E68CDAD43044EA85009C3310A934ADABB318E462DE0C8D88761C2DFCCEF9EC0FFB290922461
38,908,007 UART: [art] SIG.S = CA33C3A06EDBF74B080696FB612C21C34D27AE8FDF427F548897502F76CEBDF072C058CA545824B84BB9394AEB22B301
39,885,330 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,886,349 UART: mock_rt_interact::rt_entry...FMC Tester
40,263,243 UART: [rt] Runtime listening for mailbox commands...
40,266,396 >>> mbox cmd response data (336 bytes)
40,270,514 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,286,310 >>> mbox cmd response data (1536 bytes)
40,293,644 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,294,048 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,433,283 ready_for_fw is high
3,433,706 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
13,950,714 >>> mbox cmd response: success
13,951,411 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,229,372 UART:
18,229,763 UART: Running Caliptra FMC ...
18,231,020 UART:
18,231,193 UART: [state] CFI Enabled
18,296,599 UART: [fht] FMC Alias Private Key: 7
20,063,675 UART: [art] Extend RT PCRs Done
20,064,901 UART: [art] Lock RT PCRs Done
20,066,480 UART: [art] Populate DV Done
20,071,953 UART: [fht] FMC Alias Private Key: 7
20,073,623 UART: [art] Derive CDI
20,074,445 UART: [art] Store in slot 0x4
20,129,055 UART: [art] Derive Key Pair
20,130,107 UART: [art] Store priv key in slot 0x5
22,592,318 UART: [art] Derive Key Pair - Done
22,605,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,317,910 UART: [art] Erasing AUTHORITY.KEYID = 7
24,319,416 UART: [art] PUB.X = 0D2AE5C51B39E78525E6818D44E06E22E64B1BFD55900B1DD1252B47F3138280FC85C52C717712D21E9311EC9CABFFFC
24,326,673 UART: [art] PUB.Y = 046D0ADD151F17244F18649BE742BB46C7C012177643D3688978A9448022384928A05E02C9347DB159E3D88603F89A24
24,333,873 UART: [art] SIG.R = 71F4E2EE7C12040CC36DB5DF7703EF2D28A811BBDEE6769247E1B45CEAB4449F08528187A834B2D874CBD619C5D3F0F1
24,341,279 UART: [art] SIG.S = 18AB0A2F00023062981488115BF9227CC6E111A7DF3BFE38528CF1F4E5EB7D1B297F39AE770FBAC01AF6970FCB237A6E
25,319,993 UART: mock_rt_interact::rt_entry...FMC Tester
25,451,224 UART: [rt] Runtime listening for mailbox commands...
25,455,451 >>> mbox cmd response data (2048 bytes)
25,465,156 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,466,833 >>> mbox cmd response data (336 bytes)
25,470,761 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,486,599 >>> mbox cmd response data (1536 bytes)
27,548,837 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,567,113 >>> mbox cmd response: success
34,603,139 UART:
34,603,470 UART: Running Caliptra FMC ...
34,604,597 UART:
34,604,761 UART: [state] CFI Enabled
34,710,890 UART: [art] Extend RT PCRs Done
34,712,080 UART: [art] Lock RT PCRs Done
34,713,594 UART: [art] Populate DV Done
34,718,663 UART: [fht] FMC Alias Private Key: 7
34,720,229 UART: [art] Derive CDI
34,721,050 UART: [art] Store in slot 0x4
34,779,781 UART: [art] Derive Key Pair
34,780,820 UART: [art] Store priv key in slot 0x5
37,243,595 UART: [art] Derive Key Pair - Done
37,256,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,969,323 UART: [art] Erasing AUTHORITY.KEYID = 7
38,970,837 UART: [art] PUB.X = 897B2BF6E0B16013CF126C824BC72B5363166F4B8F84EB0713136375E445B73A09A4D4CCAEE4885606E5B0E749222C76
38,978,093 UART: [art] PUB.Y = 00FAD991D6F338E079BD3EC7507579EB41DD98F2C74E550F1C6534B691157373511D9BCAB208D328330AD3EDC708F99C
38,985,333 UART: [art] SIG.R = B06C0EAC58044209786F25D9B546AE413F05F77F7A60EF824140FEADD40B4D42A8FBECE4F84AEDE13CCA7673C29E66AA
38,992,734 UART: [art] SIG.S = B5427DC4FCD19654299314CC2AF399F667EFFF6972411A09FA779EC3E1A49D64A98319B89D9B8AF8CE272FE2E0242C28
39,970,503 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,971,619 UART: mock_rt_interact::rt_entry...FMC Tester
40,340,887 UART: [rt] Runtime listening for mailbox commands...
40,343,880 >>> mbox cmd response data (336 bytes)
40,347,680 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,363,528 >>> mbox cmd response data (1536 bytes)
40,370,877 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,371,284 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,422 UART:
192,938 UART: Running Caliptra ROM ...
194,083 UART:
603,396 UART: [state] CFI Enabled
616,565 UART: [state] LifecycleState = Unprovisioned
618,938 UART: [state] DebugLocked = No
621,883 UART: [state] WD Timer not started. Device not locked for debugging
626,615 UART: [kat] SHA2-256
816,467 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,248 UART: [kat] ++
827,851 UART: [kat] sha1
840,033 UART: [kat] SHA2-256
843,081 UART: [kat] SHA2-384
848,511 UART: [kat] SHA2-512-ACC
851,095 UART: [kat] ECC-384
3,292,011 UART: [kat] HMAC-384Kdf
3,304,684 UART: [kat] LMS
3,836,533 UART: [kat] --
3,841,657 UART: [cold-reset] ++
3,844,015 UART: [fht] FHT @ 0x50003400
3,853,998 UART: [idev] ++
3,854,700 UART: [idev] CDI.KEYID = 6
3,855,649 UART: [idev] SUBJECT.KEYID = 7
3,856,889 UART: [idev] UDS.KEYID = 0
3,857,779 ready_for_fw is high
3,857,984 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,958,109 UART: [idev] Erasing UDS.KEYID = 0
6,340,286 UART: [idev] Sha1 KeyId Algorithm
6,362,909 UART: [idev] --
6,367,847 UART: [ldev] ++
6,368,528 UART: [ldev] CDI.KEYID = 6
6,369,413 UART: [ldev] SUBJECT.KEYID = 5
6,370,641 UART: [ldev] AUTHORITY.KEYID = 7
6,371,872 UART: [ldev] FE.KEYID = 1
6,382,153 UART: [ldev] Erasing FE.KEYID = 1
8,859,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,091 UART: [ldev] --
10,647,363 UART: [fwproc] Wait for Commands...
10,649,612 UART: [fwproc] Recv command 0x46574c44
10,651,913 UART: [fwproc] Recv'd Img size: 79496 bytes
13,663,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,747,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,871,237 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
14,198,024 >>> mbox cmd response: success
14,198,545 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
14,202,937 UART: [afmc] ++
14,203,623 UART: [afmc] CDI.KEYID = 6
14,204,860 UART: [afmc] SUBJECT.KEYID = 7
14,206,290 UART: [afmc] AUTHORITY.KEYID = 5
16,707,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,428,516 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,430,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,445,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,460,701 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,475,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,499,854 UART: [afmc] --
18,502,633 UART: [cold-reset] --
18,507,303 UART: [state] Locking Datavault
18,510,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,512,901 UART: [state] Locking ICCM
18,515,221 UART: [exit] Launching FMC @ 0x40000130
18,523,917 UART:
18,524,154 UART: Running Caliptra FMC ...
18,525,260 UART:
18,525,433 UART: [state] CFI Enabled
18,533,369 UART: [fht] FMC Alias Private Key: 7
20,300,038 UART: [art] Extend RT PCRs Done
20,301,259 UART: [art] Lock RT PCRs Done
20,302,825 UART: [art] Populate DV Done
20,308,233 UART: [fht] FMC Alias Private Key: 7
20,309,935 UART: [art] Derive CDI
20,310,667 UART: [art] Store in slot 0x4
20,353,421 UART: [art] Derive Key Pair
20,354,456 UART: [art] Store priv key in slot 0x5
22,781,640 UART: [art] Derive Key Pair - Done
22,794,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,500,621 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,122 UART: [art] PUB.X = A34223C3BD27D2B9EF0EE047E73E02B88D431755CEAD77CE1991D1554D838E013EB33BF12C0B11FFA45F5CD39066DA78
24,509,373 UART: [art] PUB.Y = FBDF6B605E6B9B648ED4F0419C5C80AFC192633873821DE5640257E78C66A9ECC32AECAC82182F601A47843DC205EE5F
24,516,637 UART: [art] SIG.R = E7262895D54AE3889CFF47FEEDA5E8908184BF3874944EA5FA499C227C4930525EA68A1BE621D39638A11D0E8F1108C6
24,524,056 UART: [art] SIG.S = EEFD159F74CB4FD6931D7B5CC0A8CBC341729603A80B43B7E49FD395F5F9D892FE92D0FD95E30856981735570D04BCBC
25,502,523 UART: mock_rt_interact::rt_entry...FMC Tester
25,634,648 UART: [rt] Runtime listening for mailbox commands...
25,638,944 >>> mbox cmd response data (2048 bytes)
25,649,252 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,650,947 >>> mbox cmd response data (336 bytes)
25,654,795 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,670,597 >>> mbox cmd response data (1536 bytes)
27,744,673 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
27,845,563 UART:
27,845,907 UART: Running Caliptra ROM ...
27,847,045 UART:
27,847,213 UART: [state] CFI Enabled
27,863,642 UART: [state] LifecycleState = Unprovisioned
27,865,477 UART: [state] DebugLocked = No
27,868,422 UART: [state] WD Timer not started. Device not locked for debugging
27,873,424 UART: [kat] SHA2-256
28,063,288 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,074,038 UART: [kat] ++
28,074,644 UART: [kat] sha1
28,085,860 UART: [kat] SHA2-256
28,088,872 UART: [kat] SHA2-384
28,094,327 UART: [kat] SHA2-512-ACC
28,096,899 UART: [kat] ECC-384
30,538,670 UART: [kat] HMAC-384Kdf
30,551,949 UART: [kat] LMS
31,083,522 UART: [kat] --
31,088,582 UART: [update-reset] ++
34,115,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,118,085 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
34,513,527 >>> mbox cmd response: success
34,513,990 UART: [update-reset] Copying MAN_2 To MAN_1
34,551,512 UART: [update-reset Success] --
34,556,446 UART: [state] Locking Datavault
34,559,863 UART: [state] Locking PCR0, PCR1 and PCR31
34,562,054 UART: [state] Locking ICCM
34,564,359 UART: [exit] Launching FMC @ 0x40000130
34,573,033 UART:
34,573,270 UART: Running Caliptra FMC ...
34,574,290 UART:
34,574,454 UART: [state] CFI Enabled
34,618,529 UART: [art] Extend RT PCRs Done
34,619,710 UART: [art] Lock RT PCRs Done
34,620,973 UART: [art] Populate DV Done
34,626,326 UART: [fht] FMC Alias Private Key: 7
34,627,858 UART: [art] Derive CDI
34,628,589 UART: [art] Store in slot 0x4
34,671,310 UART: [art] Derive Key Pair
34,672,312 UART: [art] Store priv key in slot 0x5
37,099,047 UART: [art] Derive Key Pair - Done
37,112,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,818,546 UART: [art] Erasing AUTHORITY.KEYID = 7
38,820,052 UART: [art] PUB.X = D29D983607D62F914DA608677B717D05E9E40C0F17C1C08FDD3CCB1D07B9EEE774C25895BE23E93B1FC149DA31EB051F
38,827,308 UART: [art] PUB.Y = 74F73FA1D6BC19110F62E6335CA28465A21E54C272988F1AA3A0EEED1DA598160931D9E5318A2A286455B3E172F4977A
38,834,571 UART: [art] SIG.R = F7B1AF0300F0BB9A950B207EA7A71B9B627BB3F55B04B1E8BDFD585C1B4FCDFA989D6F9640043F8760E884DF51EC204D
38,841,969 UART: [art] SIG.S = 6B8B0AE6B5E092969651A74EFCF427CDB09A6AD6128894C00DFED38B823196AECA825D77C7FF46A76ACA62C643770537
39,819,463 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,820,420 UART: mock_rt_interact::rt_entry...FMC Tester
40,194,085 UART: [rt] Runtime listening for mailbox commands...
40,197,087 >>> mbox cmd response data (336 bytes)
40,201,175 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,217,042 >>> mbox cmd response data (1536 bytes)
40,224,365 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,224,760 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,751,614 ready_for_fw is high
3,752,089 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
14,205,441 >>> mbox cmd response: success
14,206,078 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
18,458,696 UART:
18,459,082 UART: Running Caliptra FMC ...
18,460,266 UART:
18,460,433 UART: [state] CFI Enabled
18,468,111 UART: [fht] FMC Alias Private Key: 7
20,233,897 UART: [art] Extend RT PCRs Done
20,235,101 UART: [art] Lock RT PCRs Done
20,236,643 UART: [art] Populate DV Done
20,242,432 UART: [fht] FMC Alias Private Key: 7
20,243,976 UART: [art] Derive CDI
20,244,706 UART: [art] Store in slot 0x4
20,286,947 UART: [art] Derive Key Pair
20,287,985 UART: [art] Store priv key in slot 0x5
22,715,216 UART: [art] Derive Key Pair - Done
22,728,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,434,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,435,630 UART: [art] PUB.X = E7020677D88F1C9CB7E312CF06DAC658EF586911024EE2B015BC2AB819377893B34109412716005389A55D8C32C8252F
24,442,894 UART: [art] PUB.Y = DBDBDFF3B1179EE47EF747C401D6513351336832846708BAB7C8857FEC378187D9AE7E9B817ED0E27972251818D5B769
24,450,147 UART: [art] SIG.R = A10AB0092F75173487D290763D444FD27D9BD7B95D7F3909320304883DAC9C758EA68DEFF40EDEB9C08A67E7169022AE
24,457,529 UART: [art] SIG.S = 8B363EB97DC78A23E20AFCD0B18DAEFB4E590DCABC81D81437215DA8CBDC768CF65DD3D6302318A9C7B1FF038145B7B8
25,435,996 UART: mock_rt_interact::rt_entry...FMC Tester
25,568,560 UART: [rt] Runtime listening for mailbox commands...
25,572,797 >>> mbox cmd response data (2048 bytes)
25,582,501 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,584,160 >>> mbox cmd response data (336 bytes)
25,588,061 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
25,603,858 >>> mbox cmd response data (1536 bytes)
27,665,252 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
34,603,617 >>> mbox cmd response: success
34,638,151 UART:
34,638,444 UART: Running Caliptra FMC ...
34,639,507 UART:
34,639,657 UART: [state] CFI Enabled
34,683,852 UART: [art] Extend RT PCRs Done
34,685,176 UART: [art] Lock RT PCRs Done
34,686,506 UART: [art] Populate DV Done
34,692,188 UART: [fht] FMC Alias Private Key: 7
34,693,796 UART: [art] Derive CDI
34,694,612 UART: [art] Store in slot 0x4
34,737,530 UART: [art] Derive Key Pair
34,738,526 UART: [art] Store priv key in slot 0x5
37,165,471 UART: [art] Derive Key Pair - Done
37,178,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,884,648 UART: [art] Erasing AUTHORITY.KEYID = 7
38,886,146 UART: [art] PUB.X = 38265852DC72E90F793B0032EF438DD42DBDE9B6478E21FCF6BC6EBAC83AAB5D5BC9933F594374E26188212986FAE478
38,893,409 UART: [art] PUB.Y = 1451E60E7C3C0672E62FA67F03415830EB8A306213CC19BAB047AD6C05B6A684681936C7DE05026822FD73C2F0288E3A
38,900,609 UART: [art] SIG.R = 986F41ECE389AC63B24706DE2788CE98B263B8130605039C2277A85444882402C7798BE5457514B6CDA7F36298B0740A
38,908,020 UART: [art] SIG.S = 90E151E8BD7EF4CD4819772A3CEE85494D8B274C83C34530CF18001BB41A8FBBBD9075B13A91BE58E9EE2A1B65D90F0D
39,885,207 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
39,886,455 UART: mock_rt_interact::rt_entry...FMC Tester
40,260,006 UART: [rt] Runtime listening for mailbox commands...
40,262,946 >>> mbox cmd response data (336 bytes)
40,266,941 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
40,282,765 >>> mbox cmd response data (1536 bytes)
40,290,074 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
40,290,477 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,342 UART: [kat] SHA2-512-ACC
897,243 UART: [kat] ECC-384
902,966 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,471 UART: [cold-reset] ++
1,476,803 UART: [fht] Storing FHT @ 0x50003400
1,479,540 UART: [idev] ++
1,479,708 UART: [idev] CDI.KEYID = 6
1,480,068 UART: [idev] SUBJECT.KEYID = 7
1,480,492 UART: [idev] UDS.KEYID = 0
1,480,837 ready_for_fw is high
1,480,837 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,488,070 UART: [idev] Erasing UDS.KEYID = 0
1,504,540 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,054 UART: [idev] --
1,513,945 UART: [ldev] ++
1,514,113 UART: [ldev] CDI.KEYID = 6
1,514,476 UART: [ldev] SUBJECT.KEYID = 5
1,514,902 UART: [ldev] AUTHORITY.KEYID = 7
1,515,365 UART: [ldev] FE.KEYID = 1
1,520,737 UART: [ldev] Erasing FE.KEYID = 1
1,545,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,856 UART: [ldev] --
1,585,339 UART: [fwproc] Waiting for Commands...
1,586,180 UART: [fwproc] Received command 0x46574c44
1,586,971 UART: [fwproc] Received Image of size 79496 bytes
2,484,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,511,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,542,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,624,253 >>> mbox cmd response: success
2,624,253 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,625,499 UART: [afmc] ++
2,625,667 UART: [afmc] CDI.KEYID = 6
2,626,029 UART: [afmc] SUBJECT.KEYID = 7
2,626,454 UART: [afmc] AUTHORITY.KEYID = 5
2,661,287 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,677,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,678,657 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,684,366 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,690,249 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,695,932 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,703,822 UART: [afmc] --
2,704,902 UART: [cold-reset] --
2,705,422 UART: [state] Locking Datavault
2,706,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,707,069 UART: [state] Locking ICCM
2,707,743 UART: [exit] Launching FMC @ 0x40000130
2,713,073 UART:
2,713,089 UART: Running Caliptra FMC ...
2,713,497 UART:
2,713,551 UART: [state] CFI Enabled
2,723,997 UART: [fht] FMC Alias Private Key: 7
2,843,851 UART: [art] Extend RT PCRs Done
2,844,279 UART: [art] Lock RT PCRs Done
2,845,899 UART: [art] Populate DV Done
2,854,144 UART: [fht] FMC Alias Private Key: 7
2,855,222 UART: [art] Derive CDI
2,855,502 UART: [art] Store in slot 0x4
2,941,450 UART: [art] Derive Key Pair
2,941,810 UART: [art] Store priv key in slot 0x5
2,954,635 UART: [art] Derive Key Pair - Done
2,969,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,984,671 UART: [art] Erasing AUTHORITY.KEYID = 7
2,985,436 UART: [art] PUB.X = 6E14123EA2B903CCD519B14E4BF6C60CE982859BF38E54708E420F881E88B215A5AD97521FFEADFDB88414F66CC7D25B
2,992,209 UART: [art] PUB.Y = 7A25F28F28B910D5526C6271AF1DBDF1615D73EA4B565D7BEE15F13B7736607FCA1676C82C286AD6572D9D019882DC8D
2,999,162 UART: [art] SIG.R = 576810BFC9FCC7814D596BD640EBF50E6BC089AA9ED42A9120A5E6886797C9E7FF4414F3B9906BA7211FCCB05F2EB53D
3,005,943 UART: [art] SIG.S = 49560B4821280943C05AEFA1089141A88EE3C7B65526E39B85F3145D728789105B8AABD9BEDA8DA6B070B35973EEAFE0
3,029,700 UART: mock_rt_interact::rt_entry...FMC Tester
3,149,878 UART: [rt] Runtime listening for mailbox commands...
3,153,268 >>> mbox cmd response data (2048 bytes)
3,153,269 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,154,501 >>> mbox cmd response data (336 bytes)
3,154,502 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,167,093 >>> mbox cmd response data (1536 bytes)
3,167,094 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,167,200 UART:
3,167,216 UART: Running Caliptra ROM ...
3,167,624 UART:
3,167,678 UART: [state] CFI Enabled
3,170,080 UART: [state] LifecycleState = Unprovisioned
3,170,735 UART: [state] DebugLocked = No
3,171,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,173,086 UART: [kat] SHA2-256
3,967,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,971,132 UART: [kat] ++
3,971,284 UART: [kat] sha1
3,975,706 UART: [kat] SHA2-256
3,977,644 UART: [kat] SHA2-384
3,980,217 UART: [kat] SHA2-512-ACC
3,982,117 UART: [kat] ECC-384
3,987,466 UART: [kat] HMAC-384Kdf
3,992,030 UART: [kat] LMS
4,560,226 UART: [kat] --
4,561,105 UART: [update-reset] ++
5,494,840 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,495,992 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,592,681 >>> mbox cmd response: success
5,592,886 UART: [update-reset] Copying MAN_2 To MAN_1
5,600,900 UART: [update-reset Success] --
5,601,845 UART: [state] Locking Datavault
5,602,607 UART: [state] Locking PCR0, PCR1 and PCR31
5,603,211 UART: [state] Locking ICCM
5,603,751 UART: [exit] Launching FMC @ 0x40000130
5,609,081 UART:
5,609,097 UART: Running Caliptra FMC ...
5,609,505 UART:
5,609,559 UART: [state] CFI Enabled
5,698,456 UART: [art] Extend RT PCRs Done
5,698,884 UART: [art] Lock RT PCRs Done
5,700,333 UART: [art] Populate DV Done
5,708,744 UART: [fht] FMC Alias Private Key: 7
5,709,760 UART: [art] Derive CDI
5,710,040 UART: [art] Store in slot 0x4
5,795,496 UART: [art] Derive Key Pair
5,795,856 UART: [art] Store priv key in slot 0x5
5,809,161 UART: [art] Derive Key Pair - Done
5,823,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,839,434 UART: [art] Erasing AUTHORITY.KEYID = 7
5,840,199 UART: [art] PUB.X = A35FAD1C89D9E8072E9E17E4AAB0B34FDD1833B85ACC1DD5243502C49B0E5C339483D8E14DED7D7B4B9B0282279E229E
5,846,971 UART: [art] PUB.Y = 53A082898BF448BE07E3D4D79A8964BA317C81D6153A52B7F135B7D6DD55CB626F5DF9F36AE6A7DCCA5905515CEA001A
5,853,905 UART: [art] SIG.R = D2956CA860F1F9BD52A08D6D499FB41B79D6D04EAA68A661E465903DF40568C0C5D416882B8E723010A9071CDE4C02D6
5,860,670 UART: [art] SIG.S = 814AF80A18EF9A2E416EB27C600D12026EDD4941BC4D017A69C40FB1622FC1341D1EDA5D182A087321B9927E069290A5
5,883,086 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,884,045 UART: mock_rt_interact::rt_entry...FMC Tester
6,248,617 UART: [rt] Runtime listening for mailbox commands...
6,250,652 >>> mbox cmd response data (336 bytes)
6,250,653 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,263,244 >>> mbox cmd response data (1536 bytes)
6,263,245 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,263,262 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,625 ready_for_fw is high
1,362,625 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,873 >>> mbox cmd response: success
2,475,873 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,536,950 UART:
2,536,966 UART: Running Caliptra FMC ...
2,537,374 UART:
2,537,428 UART: [state] CFI Enabled
2,547,560 UART: [fht] FMC Alias Private Key: 7
2,665,982 UART: [art] Extend RT PCRs Done
2,666,410 UART: [art] Lock RT PCRs Done
2,667,878 UART: [art] Populate DV Done
2,675,923 UART: [fht] FMC Alias Private Key: 7
2,677,023 UART: [art] Derive CDI
2,677,303 UART: [art] Store in slot 0x4
2,762,963 UART: [art] Derive Key Pair
2,763,323 UART: [art] Store priv key in slot 0x5
2,776,118 UART: [art] Derive Key Pair - Done
2,790,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,806,812 UART: [art] Erasing AUTHORITY.KEYID = 7
2,807,577 UART: [art] PUB.X = AF67D040550B59BA6FF7929314F147DE8CD8D2095A28BAD7E6744D178D7CAD55567234D5332F3D7BB934D4087D04E107
2,814,334 UART: [art] PUB.Y = 0A0221242747F2CAC5F640DDA1948D28EE9047D8E66E4255CCBBDF669C005241F714123B16BB6849DA2FB85D8F8C9452
2,821,260 UART: [art] SIG.R = 2B5771C55405545F8E68D5FA50D2B8D1EB4DC0B2E93A43969A8E23C291ACBEAD6680E4128C88E5E58DB1A35EFC39EB57
2,828,041 UART: [art] SIG.S = ACDEB14FBF637984ED7D471051EFDA7BE71DB830B8459AC85B6F558C1C5D1FBB6DFEDAD029583BA7CF84309610CC6BB6
2,852,387 UART: mock_rt_interact::rt_entry...FMC Tester
2,972,138 UART: [rt] Runtime listening for mailbox commands...
2,975,528 >>> mbox cmd response data (2048 bytes)
2,975,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,976,761 >>> mbox cmd response data (336 bytes)
2,976,762 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,989,353 >>> mbox cmd response data (1536 bytes)
2,989,354 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,295,435 >>> mbox cmd response: success
5,308,795 UART:
5,308,811 UART: Running Caliptra FMC ...
5,309,219 UART:
5,309,273 UART: [state] CFI Enabled
5,398,052 UART: [art] Extend RT PCRs Done
5,398,480 UART: [art] Lock RT PCRs Done
5,399,801 UART: [art] Populate DV Done
5,407,956 UART: [fht] FMC Alias Private Key: 7
5,409,100 UART: [art] Derive CDI
5,409,380 UART: [art] Store in slot 0x4
5,494,832 UART: [art] Derive Key Pair
5,495,192 UART: [art] Store priv key in slot 0x5
5,508,211 UART: [art] Derive Key Pair - Done
5,522,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,538,543 UART: [art] Erasing AUTHORITY.KEYID = 7
5,539,308 UART: [art] PUB.X = AB9E2DAA09DF26A4221C7022A784F590C9CB0D0606FA923A0AB116BC73AF3FE49ABA122C4CCDF47ED23226B7A9C5AF8B
5,546,087 UART: [art] PUB.Y = 8A7F9A634974D303B3EEDFE8059A389CBAE6C189FADB37F35F6907C4A52F4C62AF4AABE708D12DA0BAC96D5FC4FF4F6C
5,553,053 UART: [art] SIG.R = EC9678E524B79CC5DE3FD89732EC295BBF639BAC938F23A953775F942395C13DD4E9A263020DD0EA9253121F9DB4734C
5,559,823 UART: [art] SIG.S = ECBCFC66E6478819BB0DE601A8F9CB2153BAC642E50760FD034C7515F92C7ED43E25B8FC4639C7A619B87C73F6018630
5,582,975 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,584,132 UART: mock_rt_interact::rt_entry...FMC Tester
5,953,208 UART: [rt] Runtime listening for mailbox commands...
5,955,243 >>> mbox cmd response data (336 bytes)
5,955,244 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,967,835 >>> mbox cmd response data (1536 bytes)
5,967,836 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,967,853 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,957 UART: [state] LifecycleState = Unprovisioned
86,612 UART: [state] DebugLocked = No
87,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,972 UART: [kat] SHA2-256
882,903 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,018 UART: [kat] ++
887,170 UART: [kat] sha1
891,298 UART: [kat] SHA2-256
893,236 UART: [kat] SHA2-384
895,909 UART: [kat] SHA2-512-ACC
897,810 UART: [kat] ECC-384
903,557 UART: [kat] HMAC-384Kdf
908,173 UART: [kat] LMS
1,476,369 UART: [kat] --
1,477,176 UART: [cold-reset] ++
1,477,636 UART: [fht] Storing FHT @ 0x50003400
1,480,421 UART: [idev] ++
1,480,589 UART: [idev] CDI.KEYID = 6
1,480,949 UART: [idev] SUBJECT.KEYID = 7
1,481,373 UART: [idev] UDS.KEYID = 0
1,481,718 ready_for_fw is high
1,481,718 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,489,683 UART: [idev] Erasing UDS.KEYID = 0
1,506,499 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,073 UART: [idev] --
1,516,070 UART: [ldev] ++
1,516,238 UART: [ldev] CDI.KEYID = 6
1,516,601 UART: [ldev] SUBJECT.KEYID = 5
1,517,027 UART: [ldev] AUTHORITY.KEYID = 7
1,517,490 UART: [ldev] FE.KEYID = 1
1,522,690 UART: [ldev] Erasing FE.KEYID = 1
1,548,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,045 UART: [ldev] --
1,587,336 UART: [fwproc] Waiting for Commands...
1,588,073 UART: [fwproc] Received command 0x46574c44
1,588,864 UART: [fwproc] Received Image of size 79496 bytes
2,485,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,513,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,544,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 53568
2,626,304 >>> mbox cmd response: success
2,626,304 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,627,356 UART: [afmc] ++
2,627,524 UART: [afmc] CDI.KEYID = 6
2,627,886 UART: [afmc] SUBJECT.KEYID = 7
2,628,311 UART: [afmc] AUTHORITY.KEYID = 5
2,663,294 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,679,306 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,680,086 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,685,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,691,678 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,697,361 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,705,159 UART: [afmc] --
2,706,107 UART: [cold-reset] --
2,706,763 UART: [state] Locking Datavault
2,707,794 UART: [state] Locking PCR0, PCR1 and PCR31
2,708,398 UART: [state] Locking ICCM
2,708,892 UART: [exit] Launching FMC @ 0x40000130
2,714,222 UART:
2,714,238 UART: Running Caliptra FMC ...
2,714,646 UART:
2,714,789 UART: [state] CFI Enabled
2,725,795 UART: [fht] FMC Alias Private Key: 7
2,845,179 UART: [art] Extend RT PCRs Done
2,845,607 UART: [art] Lock RT PCRs Done
2,847,003 UART: [art] Populate DV Done
2,855,208 UART: [fht] FMC Alias Private Key: 7
2,856,142 UART: [art] Derive CDI
2,856,422 UART: [art] Store in slot 0x4
2,941,974 UART: [art] Derive Key Pair
2,942,334 UART: [art] Store priv key in slot 0x5
2,955,859 UART: [art] Derive Key Pair - Done
2,970,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,986,500 UART: [art] Erasing AUTHORITY.KEYID = 7
2,987,265 UART: [art] PUB.X = 75C41772EE401C5D33D66E9BDBA94461B1CB271FF36E6A19977D48EACFAAA1AAA5BF9321878DC71E093E9C3DFDE38B6F
2,994,054 UART: [art] PUB.Y = C7E2C509A8BA5DD6F23C4579DFE9D156DA49A3591A9262565336F2AF1A549E706F03CCA1B3EF01577E1FAF28A2CC8397
3,001,007 UART: [art] SIG.R = E93CA62297E5328C41213DFF8C68591B6C9174E46C041E32B5CBE7AF90DEC89995949F15F45CBC9D74ABE52AE6895868
3,007,780 UART: [art] SIG.S = 1C5217B06B30C2B2A8C68193A42EA4A9BB27C3806821204DFA9BDCFE2811CCB3C86E78725FCD8038C005F0DC4C4D84B6
3,031,803 UART: mock_rt_interact::rt_entry...FMC Tester
3,150,646 UART: [rt] Runtime listening for mailbox commands...
3,154,036 >>> mbox cmd response data (2048 bytes)
3,154,037 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,155,269 >>> mbox cmd response data (336 bytes)
3,155,270 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,167,861 >>> mbox cmd response data (1536 bytes)
3,167,862 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
3,167,968 UART:
3,167,984 UART: Running Caliptra ROM ...
3,168,392 UART:
3,168,533 UART: [state] CFI Enabled
3,171,543 UART: [state] LifecycleState = Unprovisioned
3,172,198 UART: [state] DebugLocked = No
3,172,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,174,453 UART: [kat] SHA2-256
3,968,384 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,972,499 UART: [kat] ++
3,972,651 UART: [kat] sha1
3,976,811 UART: [kat] SHA2-256
3,978,749 UART: [kat] SHA2-384
3,981,464 UART: [kat] SHA2-512-ACC
3,983,364 UART: [kat] ECC-384
3,988,761 UART: [kat] HMAC-384Kdf
3,993,561 UART: [kat] LMS
4,561,757 UART: [kat] --
4,562,500 UART: [update-reset] ++
5,495,767 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,496,915 UART: [update-reset] Loading Runtime at address 0x40005000 len 53568
5,593,604 >>> mbox cmd response: success
5,593,953 UART: [update-reset] Copying MAN_2 To MAN_1
5,601,967 UART: [update-reset Success] --
5,603,068 UART: [state] Locking Datavault
5,603,994 UART: [state] Locking PCR0, PCR1 and PCR31
5,604,598 UART: [state] Locking ICCM
5,605,022 UART: [exit] Launching FMC @ 0x40000130
5,610,352 UART:
5,610,368 UART: Running Caliptra FMC ...
5,610,776 UART:
5,610,919 UART: [state] CFI Enabled
5,700,328 UART: [art] Extend RT PCRs Done
5,700,756 UART: [art] Lock RT PCRs Done
5,702,059 UART: [art] Populate DV Done
5,710,248 UART: [fht] FMC Alias Private Key: 7
5,711,314 UART: [art] Derive CDI
5,711,594 UART: [art] Store in slot 0x4
5,797,290 UART: [art] Derive Key Pair
5,797,650 UART: [art] Store priv key in slot 0x5
5,810,805 UART: [art] Derive Key Pair - Done
5,825,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,841,442 UART: [art] Erasing AUTHORITY.KEYID = 7
5,842,207 UART: [art] PUB.X = 91A2505A6E96BB620894090DC5B67681DC792E1301514114F2380F0F8C268E3835F38CC8981AB13B142DE70CBD67E854
5,848,950 UART: [art] PUB.Y = BFD57AAB325078F72A5CBBBB60907BC4E70806772675616492558AA756618E6992B0DA54F15E8ADFD6483A29DC2F0361
5,855,893 UART: [art] SIG.R = 73FF0AA64D36A444E893BF42A574762CAA5E2C20CE98ED086E79E1ECE6AE5262242224974D8F193786C16C0664177CFA
5,862,658 UART: [art] SIG.S = 7972306465D7F6CA9B8DBB77038B92F43894223BB3BA448B8BCC173D029869F7F47D4D210F75ED1761EA839F60B14DCF
5,885,222 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,886,365 UART: mock_rt_interact::rt_entry...FMC Tester
6,250,261 UART: [rt] Runtime listening for mailbox commands...
6,252,296 >>> mbox cmd response data (336 bytes)
6,252,297 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
6,264,888 >>> mbox cmd response data (1536 bytes)
6,264,889 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
6,264,906 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 ready_for_fw is high
1,363,030 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,475,420 >>> mbox cmd response: success
2,475,420 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,536,573 UART:
2,536,589 UART: Running Caliptra FMC ...
2,536,997 UART:
2,537,140 UART: [state] CFI Enabled
2,547,856 UART: [fht] FMC Alias Private Key: 7
2,667,006 UART: [art] Extend RT PCRs Done
2,667,434 UART: [art] Lock RT PCRs Done
2,668,844 UART: [art] Populate DV Done
2,676,943 UART: [fht] FMC Alias Private Key: 7
2,677,873 UART: [art] Derive CDI
2,678,153 UART: [art] Store in slot 0x4
2,763,817 UART: [art] Derive Key Pair
2,764,177 UART: [art] Store priv key in slot 0x5
2,777,268 UART: [art] Derive Key Pair - Done
2,791,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,806,729 UART: [art] Erasing AUTHORITY.KEYID = 7
2,807,494 UART: [art] PUB.X = FA5EB32430F067F77583A19513ACFC996C798DF9C9CC94332F34BB17AF4987769431FC89F3364E2684676D90513A852E
2,814,260 UART: [art] PUB.Y = F90DE36112068CD177AA7DB0FA3B32323B7CDF48FE5E55920312D1AEC10BC62F0DA99674D5AA5BABBF9C0D23854EFF39
2,821,212 UART: [art] SIG.R = C3DA47F790FE2CF0EFB6059AA7C90970D3A3CFC66E72A651931F9BDF0D54D3A4CEAA59472AFCB043E9FD3B196B9B9117
2,827,995 UART: [art] SIG.S = FE28EF7A47324EA15B8F7E8C65A6C4A8267957473DEC1D56AB3902096AFD228FF86A8FF4BC5EE6BB70250E6316BFEB35
2,852,474 UART: mock_rt_interact::rt_entry...FMC Tester
2,972,396 UART: [rt] Runtime listening for mailbox commands...
2,975,786 >>> mbox cmd response data (2048 bytes)
2,975,787 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,977,019 >>> mbox cmd response data (336 bytes)
2,977,020 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,989,611 >>> mbox cmd response data (1536 bytes)
2,989,612 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
5,298,068 >>> mbox cmd response: success
5,311,694 UART:
5,311,710 UART: Running Caliptra FMC ...
5,312,118 UART:
5,312,261 UART: [state] CFI Enabled
5,401,846 UART: [art] Extend RT PCRs Done
5,402,274 UART: [art] Lock RT PCRs Done
5,403,669 UART: [art] Populate DV Done
5,411,938 UART: [fht] FMC Alias Private Key: 7
5,412,888 UART: [art] Derive CDI
5,413,168 UART: [art] Store in slot 0x4
5,499,212 UART: [art] Derive Key Pair
5,499,572 UART: [art] Store priv key in slot 0x5
5,512,049 UART: [art] Derive Key Pair - Done
5,526,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,542,458 UART: [art] Erasing AUTHORITY.KEYID = 7
5,543,223 UART: [art] PUB.X = 0D0DDD525A436D6F7D9EAA92FAF1794D9F3F47678F752AC29F47EAE06348A6C4A63D8140CB6CBB033CE66165F485A82E
5,549,998 UART: [art] PUB.Y = 8A268181C3D7D263FD29B49085F087F27228A87595115BC1313150A6A2E72BE000BD7AD2EE1EDBFE2164F76DAD7A8380
5,556,930 UART: [art] SIG.R = DB48067452D501C388E0D2CF87E71CDDACB439CE6CF3D9E5E540CB0E383865AD92F93A8B1CC051FAD85019EA92052F7B
5,563,704 UART: [art] SIG.S = F4B58479984D27A02E9D2CFF9442C2F4A6727ED6E94835A067CACD4A08E9F24C668334F627A2CDA98EA274CCC264F635
5,586,078 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,587,279 UART: mock_rt_interact::rt_entry...FMC Tester
5,954,133 UART: [rt] Runtime listening for mailbox commands...
5,956,168 >>> mbox cmd response data (336 bytes)
5,956,169 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,968,760 >>> mbox cmd response data (1536 bytes)
5,968,761 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,968,778 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
891,098 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,202 UART: [kat] ++
895,354 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,784 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 ready_for_fw is high
1,174,220 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,867 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,677 UART: [idev] --
1,208,632 UART: [ldev] ++
1,208,800 UART: [ldev] CDI.KEYID = 6
1,209,164 UART: [ldev] SUBJECT.KEYID = 5
1,209,591 UART: [ldev] AUTHORITY.KEYID = 7
1,210,054 UART: [ldev] FE.KEYID = 1
1,215,350 UART: [ldev] Erasing FE.KEYID = 1
1,242,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,244 UART: [ldev] --
1,281,507 UART: [fwproc] Wait for Commands...
1,282,246 UART: [fwproc] Recv command 0x46574c44
1,282,979 UART: [fwproc] Recv'd Img size: 79496 bytes
2,180,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,238,169 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,782 >>> mbox cmd response: success
2,319,782 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,970 UART: [afmc] ++
2,321,138 UART: [afmc] CDI.KEYID = 6
2,321,501 UART: [afmc] SUBJECT.KEYID = 7
2,321,927 UART: [afmc] AUTHORITY.KEYID = 5
2,357,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,374,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,374,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,380,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,386,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,392,108 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,399,669 UART: [afmc] --
2,400,540 UART: [cold-reset] --
2,401,234 UART: [state] Locking Datavault
2,402,525 UART: [state] Locking PCR0, PCR1 and PCR31
2,403,129 UART: [state] Locking ICCM
2,403,717 UART: [exit] Launching FMC @ 0x40000130
2,409,047 UART:
2,409,063 UART: Running Caliptra FMC ...
2,409,471 UART:
2,409,525 UART: [state] CFI Enabled
2,419,917 UART: [fht] FMC Alias Private Key: 7
2,538,501 UART: [art] Extend RT PCRs Done
2,538,929 UART: [art] Lock RT PCRs Done
2,540,653 UART: [art] Populate DV Done
2,548,956 UART: [fht] FMC Alias Private Key: 7
2,549,892 UART: [art] Derive CDI
2,550,172 UART: [art] Store in slot 0x4
2,636,035 UART: [art] Derive Key Pair
2,636,395 UART: [art] Store priv key in slot 0x5
2,649,553 UART: [art] Derive Key Pair - Done
2,664,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,679,921 UART: [art] Erasing AUTHORITY.KEYID = 7
2,680,686 UART: [art] PUB.X = 446DF31B7F1BF6049372342B4B76C842DEF8EAC95A6A714AE179C8A646C4F785152AADA969EE3C17AA93BB213C5EAFDC
2,687,471 UART: [art] PUB.Y = D8D612DD52F41970A27289E9BA23286A4EE8D50A60C96D3CF7944DEFE257532146780AB56FA6B3B9A7265F9E6D0EFC7D
2,694,422 UART: [art] SIG.R = 3D8E4A89C3A0510CA7C4CBBF8C909862A4703509AD189FB842F6001ABCFFADB839CF4CAF70090A39F1DADDF9C7A0196B
2,701,180 UART: [art] SIG.S = 49FF468CE80E1BC983CB60173922396BE8EE254C9C7A341918CB614B624F0B7581B70A829E925C5B82A3A56059FE3BE8
2,724,943 UART: mock_rt_interact::rt_entry...FMC Tester
2,844,254 UART: [rt] Runtime listening for mailbox commands...
2,847,644 >>> mbox cmd response data (2048 bytes)
2,847,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,848,877 >>> mbox cmd response data (336 bytes)
2,848,878 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,861,469 >>> mbox cmd response data (1536 bytes)
2,861,470 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,861,573 UART:
2,861,589 UART: Running Caliptra ROM ...
2,861,997 UART:
2,862,052 UART: [state] CFI Enabled
2,864,474 UART: [state] LifecycleState = Unprovisioned
2,865,129 UART: [state] DebugLocked = No
2,865,755 UART: [state] WD Timer not started. Device not locked for debugging
2,866,867 UART: [kat] SHA2-256
3,670,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,674,521 UART: [kat] ++
3,674,673 UART: [kat] sha1
3,678,835 UART: [kat] SHA2-256
3,680,775 UART: [kat] SHA2-384
3,683,466 UART: [kat] SHA2-512-ACC
3,685,366 UART: [kat] ECC-384
3,695,253 UART: [kat] HMAC-384Kdf
3,699,819 UART: [kat] LMS
3,948,131 UART: [kat] --
3,949,321 UART: [update-reset] ++
4,860,927 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,861,934 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,958,571 >>> mbox cmd response: success
4,958,824 UART: [update-reset] Copying MAN_2 To MAN_1
4,966,838 UART: [update-reset Success] --
4,967,799 UART: [state] Locking Datavault
4,968,419 UART: [state] Locking PCR0, PCR1 and PCR31
4,969,023 UART: [state] Locking ICCM
4,969,595 UART: [exit] Launching FMC @ 0x40000130
4,974,925 UART:
4,974,941 UART: Running Caliptra FMC ...
4,975,349 UART:
4,975,403 UART: [state] CFI Enabled
5,064,362 UART: [art] Extend RT PCRs Done
5,064,790 UART: [art] Lock RT PCRs Done
5,066,151 UART: [art] Populate DV Done
5,074,458 UART: [fht] FMC Alias Private Key: 7
5,075,434 UART: [art] Derive CDI
5,075,714 UART: [art] Store in slot 0x4
5,161,703 UART: [art] Derive Key Pair
5,162,063 UART: [art] Store priv key in slot 0x5
5,175,389 UART: [art] Derive Key Pair - Done
5,190,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,205,581 UART: [art] Erasing AUTHORITY.KEYID = 7
5,206,346 UART: [art] PUB.X = C9A12B19DE25A44ED4095B7B7C5A197D968BAC35C2DCFDEA936DDF50D6CB74CD38BA8826D6333F5775E5D46A2B74560A
5,213,128 UART: [art] PUB.Y = 14F4D3660CB103BCC22EB782DB321A077F67B80204527ED4CC868CF81385E10306F1CCC11D9669EA3CEF58546ADFB80E
5,220,064 UART: [art] SIG.R = 9584C91883FF132CA910E9FECCCDA4F042F109D329F279EF576467A0F476012293BF8A8841C40B2064B8400394F47CC8
5,226,820 UART: [art] SIG.S = 7A1466CED4DB7F58610353C383D800363FB9C8FBB30220FD7C01A54BD53E619B2658E87CE55F4AD858A4A1566FB2DE7C
5,249,164 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,250,285 UART: mock_rt_interact::rt_entry...FMC Tester
5,619,113 UART: [rt] Runtime listening for mailbox commands...
5,621,148 >>> mbox cmd response data (336 bytes)
5,621,149 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,633,740 >>> mbox cmd response data (1536 bytes)
5,633,741 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,633,758 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,338 ready_for_fw is high
1,059,338 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,172,659 >>> mbox cmd response: success
2,172,659 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,234,882 UART:
2,234,898 UART: Running Caliptra FMC ...
2,235,306 UART:
2,235,360 UART: [state] CFI Enabled
2,246,038 UART: [fht] FMC Alias Private Key: 7
2,365,138 UART: [art] Extend RT PCRs Done
2,365,566 UART: [art] Lock RT PCRs Done
2,366,948 UART: [art] Populate DV Done
2,374,995 UART: [fht] FMC Alias Private Key: 7
2,376,087 UART: [art] Derive CDI
2,376,367 UART: [art] Store in slot 0x4
2,462,220 UART: [art] Derive Key Pair
2,462,580 UART: [art] Store priv key in slot 0x5
2,476,514 UART: [art] Derive Key Pair - Done
2,491,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,748 UART: [art] PUB.X = DF771A6104E8ECE566105ACFDF1CFC1CF551D7D5EA351AD9533384B031DFC75216A45376592065E9DF5D0F6B728AF621
2,514,522 UART: [art] PUB.Y = 9DDDAC25CFFCD15509FD9C353AF4398853643641C712F4CB756DC628A8CB7421B572358A1473EAB1BA5D0AA703AD187A
2,521,475 UART: [art] SIG.R = C41395EAC6BFF458340158C37EDCF625EF733116FCBB97135A232B05046551858EC23F8B6E813A780575706B5235EF22
2,528,229 UART: [art] SIG.S = BD7C2C9FD1C191A9FDBE210C28874D7809ABFD1860E0BFC966F6AB532F9EEF7A64E2E0B2F54E209C5B417B6D27568AF2
2,552,137 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,414 UART: [rt] Runtime listening for mailbox commands...
2,674,804 >>> mbox cmd response data (2048 bytes)
2,674,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,037 >>> mbox cmd response data (336 bytes)
2,676,038 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,629 >>> mbox cmd response data (1536 bytes)
2,688,630 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,672,817 >>> mbox cmd response: success
4,686,038 UART:
4,686,054 UART: Running Caliptra FMC ...
4,686,462 UART:
4,686,516 UART: [state] CFI Enabled
4,775,601 UART: [art] Extend RT PCRs Done
4,776,029 UART: [art] Lock RT PCRs Done
4,777,252 UART: [art] Populate DV Done
4,785,691 UART: [fht] FMC Alias Private Key: 7
4,786,869 UART: [art] Derive CDI
4,787,149 UART: [art] Store in slot 0x4
4,872,902 UART: [art] Derive Key Pair
4,873,262 UART: [art] Store priv key in slot 0x5
4,886,578 UART: [art] Derive Key Pair - Done
4,901,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,916,470 UART: [art] Erasing AUTHORITY.KEYID = 7
4,917,235 UART: [art] PUB.X = E665B899676AF648AADCBE1F4E5427F683A3CFE584E07208E986C1B39168F6A35C8F250BB5509C11B8FF16B7E787E3E1
4,924,007 UART: [art] PUB.Y = 3C88CD942CD196468956EDA376D2E22160C1E2478FA4F1D5DC54D0F5F450DBAEEBF89ADF41357C7CED58412B9A04E8B5
4,930,970 UART: [art] SIG.R = 7B3635A273BCF3052919736BB5662A5828065D0D568356BF6D490F8851BCCF03194E15C95257077BABFB4D658580F41D
4,937,716 UART: [art] SIG.S = 03C0606830CE1C3D7E839A24679CBA46DD84557D6659095BF576996A22365141D7DBE4CC9DF5EDCDFF2D48C71EF78DF7
4,959,765 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,960,856 UART: mock_rt_interact::rt_entry...FMC Tester
5,330,981 UART: [rt] Runtime listening for mailbox commands...
5,333,016 >>> mbox cmd response data (336 bytes)
5,333,017 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,345,608 >>> mbox cmd response data (1536 bytes)
5,345,609 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,345,626 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,225 UART: [state] LifecycleState = Unprovisioned
85,880 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,517 UART: [kat] SHA2-256
901,457 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,975 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,174,303 ready_for_fw is high
1,174,303 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,198,582 UART: [idev] Sha1 KeyId Algorithm
1,207,354 UART: [idev] --
1,208,493 UART: [ldev] ++
1,208,661 UART: [ldev] CDI.KEYID = 6
1,209,025 UART: [ldev] SUBJECT.KEYID = 5
1,209,452 UART: [ldev] AUTHORITY.KEYID = 7
1,209,915 UART: [ldev] FE.KEYID = 1
1,215,029 UART: [ldev] Erasing FE.KEYID = 1
1,241,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,403 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,503 UART: [fwproc] Recv command 0x46574c44
1,282,236 UART: [fwproc] Recv'd Img size: 79496 bytes
2,178,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,206,291 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,237,466 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,319,123 >>> mbox cmd response: success
2,319,123 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,320,325 UART: [afmc] ++
2,320,493 UART: [afmc] CDI.KEYID = 6
2,320,856 UART: [afmc] SUBJECT.KEYID = 7
2,321,282 UART: [afmc] AUTHORITY.KEYID = 5
2,356,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,373,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,373,805 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,379,515 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,385,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,391,097 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,398,974 UART: [afmc] --
2,399,801 UART: [cold-reset] --
2,400,501 UART: [state] Locking Datavault
2,401,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,402,434 UART: [state] Locking ICCM
2,402,992 UART: [exit] Launching FMC @ 0x40000130
2,408,322 UART:
2,408,338 UART: Running Caliptra FMC ...
2,408,746 UART:
2,408,889 UART: [state] CFI Enabled
2,419,501 UART: [fht] FMC Alias Private Key: 7
2,537,979 UART: [art] Extend RT PCRs Done
2,538,407 UART: [art] Lock RT PCRs Done
2,539,883 UART: [art] Populate DV Done
2,548,108 UART: [fht] FMC Alias Private Key: 7
2,549,076 UART: [art] Derive CDI
2,549,356 UART: [art] Store in slot 0x4
2,634,903 UART: [art] Derive Key Pair
2,635,263 UART: [art] Store priv key in slot 0x5
2,648,541 UART: [art] Derive Key Pair - Done
2,663,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,679,088 UART: [art] Erasing AUTHORITY.KEYID = 7
2,679,853 UART: [art] PUB.X = 7BFB9AE94DF57D36374DA5801C708AEE179065D29DBF5B6B375F6C80B158344D29305BA009B4FC9D2B8BC9608645AC2C
2,686,630 UART: [art] PUB.Y = 9CA3EC37DC135BF5BD612C65F6AC637B3E308CBE814A5992047B792E99621CC718CC2EA56CE9F65715F8D26A6B63D9AA
2,693,591 UART: [art] SIG.R = 4C7AA4F4271524A56AB37B49F447BCFC3407B382E1956A6F13D2F965D7841D0EC75834AEA63C9FF4DB69A6B27ADBA30A
2,700,366 UART: [art] SIG.S = 2AF96672B4432A89BD7EF09CF2FEF39A47EBCACF90AA2F10F3DE77D1DC6F2433193C6D51DB58C7E82976DEA1EE51BD4B
2,724,436 UART: mock_rt_interact::rt_entry...FMC Tester
2,842,937 UART: [rt] Runtime listening for mailbox commands...
2,846,327 >>> mbox cmd response data (2048 bytes)
2,846,328 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,847,560 >>> mbox cmd response data (336 bytes)
2,847,561 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,860,152 >>> mbox cmd response data (1536 bytes)
2,860,153 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,860,256 UART:
2,860,272 UART: Running Caliptra ROM ...
2,860,680 UART:
2,860,822 UART: [state] CFI Enabled
2,863,296 UART: [state] LifecycleState = Unprovisioned
2,863,951 UART: [state] DebugLocked = No
2,864,607 UART: [state] WD Timer not started. Device not locked for debugging
2,865,731 UART: [kat] SHA2-256
3,669,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,673,385 UART: [kat] ++
3,673,537 UART: [kat] sha1
3,677,793 UART: [kat] SHA2-256
3,679,733 UART: [kat] SHA2-384
3,682,328 UART: [kat] SHA2-512-ACC
3,684,228 UART: [kat] ECC-384
3,694,231 UART: [kat] HMAC-384Kdf
3,698,861 UART: [kat] LMS
3,947,173 UART: [kat] --
3,947,773 UART: [update-reset] ++
4,858,237 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,859,396 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,956,033 >>> mbox cmd response: success
4,956,310 UART: [update-reset] Copying MAN_2 To MAN_1
4,964,324 UART: [update-reset Success] --
4,965,335 UART: [state] Locking Datavault
4,966,131 UART: [state] Locking PCR0, PCR1 and PCR31
4,966,735 UART: [state] Locking ICCM
4,967,213 UART: [exit] Launching FMC @ 0x40000130
4,972,543 UART:
4,972,559 UART: Running Caliptra FMC ...
4,972,967 UART:
4,973,110 UART: [state] CFI Enabled
5,062,035 UART: [art] Extend RT PCRs Done
5,062,463 UART: [art] Lock RT PCRs Done
5,063,606 UART: [art] Populate DV Done
5,071,963 UART: [fht] FMC Alias Private Key: 7
5,072,945 UART: [art] Derive CDI
5,073,225 UART: [art] Store in slot 0x4
5,158,554 UART: [art] Derive Key Pair
5,158,914 UART: [art] Store priv key in slot 0x5
5,172,412 UART: [art] Derive Key Pair - Done
5,186,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,202,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,203,050 UART: [art] PUB.X = 4134D856561F049B7D232238008D81671C380C7B12D96712D3FB627776AC69C1C9D9A245E57708E9B2EC5301AB494E92
5,209,776 UART: [art] PUB.Y = 8B0D9C14B12A8B0F6C8F7B72B317039CCF7604F13178DD8172D0589B5D46D6E1D2635DB4B0B5ED6BCCEE375FF5E9B3D3
5,216,730 UART: [art] SIG.R = 2830979AC8B15EB9771BB7F869AFB8B1DBA94CE1193D8A110180572D90D88B46B0FAAFE7CC0EBF167B6A233167FD7012
5,223,506 UART: [art] SIG.S = 982C02E2885C0AE4CFA9BA2436BAAF84BB0F40C0CA44C81F7ED27957A62754F3445E3A2396D661EB7845AD2E5BB33119
5,246,260 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,247,443 UART: mock_rt_interact::rt_entry...FMC Tester
5,610,755 UART: [rt] Runtime listening for mailbox commands...
5,612,790 >>> mbox cmd response data (336 bytes)
5,612,791 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,625,382 >>> mbox cmd response data (1536 bytes)
5,625,383 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,625,400 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,959 ready_for_fw is high
1,059,959 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,304 >>> mbox cmd response: success
2,173,304 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,775 UART:
2,235,791 UART: Running Caliptra FMC ...
2,236,199 UART:
2,236,342 UART: [state] CFI Enabled
2,247,136 UART: [fht] FMC Alias Private Key: 7
2,366,666 UART: [art] Extend RT PCRs Done
2,367,094 UART: [art] Lock RT PCRs Done
2,368,560 UART: [art] Populate DV Done
2,376,537 UART: [fht] FMC Alias Private Key: 7
2,377,559 UART: [art] Derive CDI
2,377,839 UART: [art] Store in slot 0x4
2,463,446 UART: [art] Derive Key Pair
2,463,806 UART: [art] Store priv key in slot 0x5
2,477,046 UART: [art] Derive Key Pair - Done
2,491,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,507,299 UART: [art] Erasing AUTHORITY.KEYID = 7
2,508,064 UART: [art] PUB.X = 0BCDA8BDA175ED5E4E3F57AE725BBABAE03FDC76A109EBCB5E1B55A99154514A12AAE5F67EB39D1287C2B8BE46465F47
2,514,854 UART: [art] PUB.Y = 0022067A0632C82B238815EC94EAF747957930395104303F39AA727DF62C7C231CB63F79304B8F428821DF7CC674CA89
2,521,763 UART: [art] SIG.R = A77029D4A6683B4E1B9E20C60C4C479D5CE77C54287416D6298E04BD562FF41E4ECE42084475DA93DBEEC264F343DAE6
2,528,532 UART: [art] SIG.S = 9773C864E660180D9486B7E1FB1E479A0C95B6CDDBC8505B684FA980ED94D7E81E175DB0C2D30B93030873386685B789
2,552,299 UART: mock_rt_interact::rt_entry...FMC Tester
2,671,582 UART: [rt] Runtime listening for mailbox commands...
2,674,972 >>> mbox cmd response data (2048 bytes)
2,674,973 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,676,205 >>> mbox cmd response data (336 bytes)
2,676,206 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,688,797 >>> mbox cmd response data (1536 bytes)
2,688,798 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,671,364 >>> mbox cmd response: success
4,684,687 UART:
4,684,703 UART: Running Caliptra FMC ...
4,685,111 UART:
4,685,254 UART: [state] CFI Enabled
4,774,947 UART: [art] Extend RT PCRs Done
4,775,375 UART: [art] Lock RT PCRs Done
4,777,032 UART: [art] Populate DV Done
4,784,907 UART: [fht] FMC Alias Private Key: 7
4,785,963 UART: [art] Derive CDI
4,786,243 UART: [art] Store in slot 0x4
4,871,932 UART: [art] Derive Key Pair
4,872,292 UART: [art] Store priv key in slot 0x5
4,885,246 UART: [art] Derive Key Pair - Done
4,899,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,915,591 UART: [art] Erasing AUTHORITY.KEYID = 7
4,916,356 UART: [art] PUB.X = 871761C610FC1F8AC30EA7BFD28B06822B05F9601CA9DCA7780602732CA6A3E11377AB33039E72CB623C9B2093AB8025
4,923,110 UART: [art] PUB.Y = 7E03EDEDFED89733090924D2AEFCA50718CC2703A73C9C1D45BE9C05CB98874C7266910156AD8FDDDA9CA47B1A40D742
4,930,053 UART: [art] SIG.R = 55445CF378BAFFC12F6D7568CA83D54081812B9FF95AD9824719ACB5DEE10B0E7FF5BD1A3A63660EA9A1D9F83A1F6478
4,936,828 UART: [art] SIG.S = CCB319B9F6E25FEAA6870DBD26A3B3064B0211825A8771D12F7DA4CD6B8A25A3253C576C78C1EB3C2D7D7AB65F6ED8AA
4,959,260 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,960,271 UART: mock_rt_interact::rt_entry...FMC Tester
5,321,213 UART: [rt] Runtime listening for mailbox commands...
5,323,248 >>> mbox cmd response data (336 bytes)
5,323,249 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,335,840 >>> mbox cmd response data (1536 bytes)
5,335,841 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,335,858 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,292 UART: [kat] SHA2-256
892,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,067 UART: [kat] ++
897,219 UART: [kat] sha1
901,271 UART: [kat] SHA2-256
903,211 UART: [kat] SHA2-384
906,008 UART: [kat] SHA2-512-ACC
907,909 UART: [kat] ECC-384
917,490 UART: [kat] HMAC-384Kdf
922,010 UART: [kat] LMS
1,170,338 UART: [kat] --
1,171,585 UART: [cold-reset] ++
1,171,937 UART: [fht] FHT @ 0x50003400
1,174,486 UART: [idev] ++
1,174,654 UART: [idev] CDI.KEYID = 6
1,175,014 UART: [idev] SUBJECT.KEYID = 7
1,175,438 UART: [idev] UDS.KEYID = 0
1,175,783 ready_for_fw is high
1,175,783 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,183,596 UART: [idev] Erasing UDS.KEYID = 0
1,200,561 UART: [idev] Sha1 KeyId Algorithm
1,208,915 UART: [idev] --
1,210,113 UART: [ldev] ++
1,210,281 UART: [ldev] CDI.KEYID = 6
1,210,644 UART: [ldev] SUBJECT.KEYID = 5
1,211,070 UART: [ldev] AUTHORITY.KEYID = 7
1,211,533 UART: [ldev] FE.KEYID = 1
1,216,565 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,009 UART: [ldev] --
1,282,472 UART: [fwproc] Wait for Commands...
1,283,150 UART: [fwproc] Recv command 0x46574c44
1,283,878 UART: [fwproc] Recv'd Img size: 79496 bytes
2,181,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,208,527 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,239,697 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,321,278 >>> mbox cmd response: success
2,321,278 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,322,354 UART: [afmc] ++
2,322,522 UART: [afmc] CDI.KEYID = 6
2,322,884 UART: [afmc] SUBJECT.KEYID = 7
2,323,309 UART: [afmc] AUTHORITY.KEYID = 5
2,358,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,375,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,376,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,381,716 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,387,599 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,393,300 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,401,192 UART: [afmc] --
2,402,140 UART: [cold-reset] --
2,402,716 UART: [state] Locking Datavault
2,404,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,404,623 UART: [state] Locking ICCM
2,405,283 UART: [exit] Launching FMC @ 0x40000130
2,410,613 UART:
2,410,629 UART: Running Caliptra FMC ...
2,411,037 UART:
2,411,091 UART: [state] CFI Enabled
2,421,775 UART: [fht] FMC Alias Private Key: 7
2,541,461 UART: [art] Extend RT PCRs Done
2,541,889 UART: [art] Lock RT PCRs Done
2,543,359 UART: [art] Populate DV Done
2,551,226 UART: [fht] FMC Alias Private Key: 7
2,552,288 UART: [art] Derive CDI
2,552,568 UART: [art] Store in slot 0x4
2,638,105 UART: [art] Derive Key Pair
2,638,465 UART: [art] Store priv key in slot 0x5
2,652,347 UART: [art] Derive Key Pair - Done
2,667,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,682,772 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,537 UART: [art] PUB.X = 42FE08F67DCA211A4EB02CAEE7BB6311A8B22B76FE4C6D59EC6F8C884EDDC9A31B816070354BCD8AF16ED8E19EE0A8D6
2,690,330 UART: [art] PUB.Y = 8E2F0F380EAF19E28867080016D3F3253CC7EDD5805ECCF14CE1F835683E94B37870C47DB4872BD700F74907F5D5C3B3
2,697,228 UART: [art] SIG.R = A3228D2C851F190D91FE6052CCCE2D262FB87E143541503BF89DC91F1CF35AE4D45706B0144C2279B597070213349D54
2,703,982 UART: [art] SIG.S = A92691A5649E72A7372377B1E1154FB32FE3406FCE05197F37559F53A792380E1495218246796DF79F176A56DC363546
2,727,344 UART: mock_rt_interact::rt_entry...FMC Tester
2,846,053 UART: [rt] Runtime listening for mailbox commands...
2,849,443 >>> mbox cmd response data (2048 bytes)
2,849,444 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,850,676 >>> mbox cmd response data (336 bytes)
2,850,677 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,863,268 >>> mbox cmd response data (1536 bytes)
2,863,269 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,863,372 UART:
2,863,388 UART: Running Caliptra ROM ...
2,863,796 UART:
2,863,851 UART: [state] CFI Enabled
2,866,539 UART: [state] LifecycleState = Unprovisioned
2,867,194 UART: [state] DebugLocked = No
2,867,676 UART: [state] WD Timer not started. Device not locked for debugging
2,869,026 UART: [kat] SHA2-256
3,674,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,678,801 UART: [kat] ++
3,678,953 UART: [kat] sha1
3,683,223 UART: [kat] SHA2-256
3,685,163 UART: [kat] SHA2-384
3,687,832 UART: [kat] SHA2-512-ACC
3,689,732 UART: [kat] ECC-384
3,699,147 UART: [kat] HMAC-384Kdf
3,703,849 UART: [kat] LMS
3,952,177 UART: [kat] --
3,953,175 UART: [update-reset] ++
4,864,798 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,865,777 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,962,414 >>> mbox cmd response: success
4,962,587 UART: [update-reset] Copying MAN_2 To MAN_1
4,970,601 UART: [update-reset Success] --
4,971,516 UART: [state] Locking Datavault
4,972,318 UART: [state] Locking PCR0, PCR1 and PCR31
4,972,922 UART: [state] Locking ICCM
4,973,546 UART: [exit] Launching FMC @ 0x40000130
4,978,876 UART:
4,978,892 UART: Running Caliptra FMC ...
4,979,300 UART:
4,979,354 UART: [state] CFI Enabled
5,069,265 UART: [art] Extend RT PCRs Done
5,069,693 UART: [art] Lock RT PCRs Done
5,070,898 UART: [art] Populate DV Done
5,079,053 UART: [fht] FMC Alias Private Key: 7
5,080,163 UART: [art] Derive CDI
5,080,443 UART: [art] Store in slot 0x4
5,166,184 UART: [art] Derive Key Pair
5,166,544 UART: [art] Store priv key in slot 0x5
5,179,780 UART: [art] Derive Key Pair - Done
5,194,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,210,002 UART: [art] Erasing AUTHORITY.KEYID = 7
5,210,767 UART: [art] PUB.X = 81EDF0F29C313E00E82C9D32B2B001068CCE88002B4DB39BB94BB56BDADE5477B6CD7F5A81BF5EAE5CA82CBC6FB0A285
5,217,513 UART: [art] PUB.Y = EFA87C4E5D65BB45F963F34710872D6C1E64F8506D552CFD44DEAB6E30902D6254C458E0D5C821E2DCD950A895ED5EB3
5,224,475 UART: [art] SIG.R = 0066D099232A06A913BEB39436D192988F1E8E074FEC08D0BB0E69959591C40AF1305E92C26B99398F37C306C1AE0202
5,231,193 UART: [art] SIG.S = 3960A0E07F8617F2B41938FF9E8EAE81B41353D11DE2F727C4FFDD236B471BAC5E20F6EDC96AF835B532516270B786D6
5,253,724 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,254,765 UART: mock_rt_interact::rt_entry...FMC Tester
5,620,697 UART: [rt] Runtime listening for mailbox commands...
5,622,732 >>> mbox cmd response data (336 bytes)
5,622,733 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,635,324 >>> mbox cmd response data (1536 bytes)
5,635,325 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,635,342 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 ready_for_fw is high
1,060,397 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,173,847 >>> mbox cmd response: success
2,173,847 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,235,762 UART:
2,235,778 UART: Running Caliptra FMC ...
2,236,186 UART:
2,236,240 UART: [state] CFI Enabled
2,246,368 UART: [fht] FMC Alias Private Key: 7
2,365,086 UART: [art] Extend RT PCRs Done
2,365,514 UART: [art] Lock RT PCRs Done
2,366,982 UART: [art] Populate DV Done
2,375,273 UART: [fht] FMC Alias Private Key: 7
2,376,301 UART: [art] Derive CDI
2,376,581 UART: [art] Store in slot 0x4
2,462,236 UART: [art] Derive Key Pair
2,462,596 UART: [art] Store priv key in slot 0x5
2,475,800 UART: [art] Derive Key Pair - Done
2,490,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,506,399 UART: [art] Erasing AUTHORITY.KEYID = 7
2,507,164 UART: [art] PUB.X = A72A67686E1E9CD581B2B4998C10A0EC9CA684BEA7ED7FE816A1DB5D8A5363E8FD8A33D3F64248A280DD9CBE7AD37C1C
2,513,956 UART: [art] PUB.Y = 3D67C3B336C52ADC0940CAC9C32AF1BB168E16CCEF00A1C745156D103240E672FEE530653D9AAC447DCD343144BCC28A
2,520,895 UART: [art] SIG.R = BCF181BDAF751022A6783ED46D374099D0EE520FF77FA15C8099CEC4F51536705DAD5EDA31D846066D1AD23936D10F78
2,527,664 UART: [art] SIG.S = F2CA2C466461202F67F9FB8C1D9A30287F48BB8901459A4405B66EA82B079442C485B0165BF9947DB52BD7494CAB1976
2,551,249 UART: mock_rt_interact::rt_entry...FMC Tester
2,670,490 UART: [rt] Runtime listening for mailbox commands...
2,673,880 >>> mbox cmd response data (2048 bytes)
2,673,881 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,675,113 >>> mbox cmd response data (336 bytes)
2,675,114 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,687,705 >>> mbox cmd response data (1536 bytes)
2,687,706 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,671,836 >>> mbox cmd response: success
4,685,139 UART:
4,685,155 UART: Running Caliptra FMC ...
4,685,563 UART:
4,685,617 UART: [state] CFI Enabled
4,774,984 UART: [art] Extend RT PCRs Done
4,775,412 UART: [art] Lock RT PCRs Done
4,776,671 UART: [art] Populate DV Done
4,784,982 UART: [fht] FMC Alias Private Key: 7
4,786,048 UART: [art] Derive CDI
4,786,328 UART: [art] Store in slot 0x4
4,872,027 UART: [art] Derive Key Pair
4,872,387 UART: [art] Store priv key in slot 0x5
4,885,811 UART: [art] Derive Key Pair - Done
4,900,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,916,290 UART: [art] Erasing AUTHORITY.KEYID = 7
4,917,055 UART: [art] PUB.X = CB9DBFEB8D64E9BA3513E48649BE4D4FE2443B1B760925CCE3F7FD5BE6DB5D393E8386E4133EE4B466C9FA70DFC7FF84
4,923,846 UART: [art] PUB.Y = BAB0F0F27135A1FE3BD2FC573D07012EC583A303A08ABD3B6A19209DFC357605100D11C674FC6FC42AA7762B347CFE48
4,930,793 UART: [art] SIG.R = DE53459998883496DAA65BC126BF48B6793BBB1D184BFFC1D9C5B26BE3FD68EE1FC8D80BECA8C1778C184142DE677C16
4,937,576 UART: [art] SIG.S = 61FD893DB29E4ED5E2F706721C2DF2388BFDC30E6920ED8CFBBCAACD297B099FA0BBB6743843670C71A41B39C8E87F5B
4,960,529 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,961,648 UART: mock_rt_interact::rt_entry...FMC Tester
5,325,106 UART: [rt] Runtime listening for mailbox commands...
5,327,141 >>> mbox cmd response data (336 bytes)
5,327,142 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,339,733 >>> mbox cmd response data (1536 bytes)
5,339,734 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,339,751 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
902,094 UART: [kat] SHA2-256
904,034 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,375 UART: [kat] HMAC-384Kdf
923,037 UART: [kat] LMS
1,171,365 UART: [kat] --
1,172,324 UART: [cold-reset] ++
1,172,758 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 ready_for_fw is high
1,176,874 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
1,184,553 UART: [idev] Erasing UDS.KEYID = 0
1,201,850 UART: [idev] Sha1 KeyId Algorithm
1,210,278 UART: [idev] --
1,211,352 UART: [ldev] ++
1,211,520 UART: [ldev] CDI.KEYID = 6
1,211,883 UART: [ldev] SUBJECT.KEYID = 5
1,212,309 UART: [ldev] AUTHORITY.KEYID = 7
1,212,772 UART: [ldev] FE.KEYID = 1
1,218,340 UART: [ldev] Erasing FE.KEYID = 1
1,243,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,124 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,727 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,746 UART: [ldev] --
1,283,077 UART: [fwproc] Wait for Commands...
1,283,889 UART: [fwproc] Recv command 0x46574c44
1,284,617 UART: [fwproc] Recv'd Img size: 79496 bytes
2,182,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,209,614 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,240,784 UART: [fwproc] Load Runtime at address 0x40005000 len 53568
2,322,549 >>> mbox cmd response: success
2,322,549 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,323,601 UART: [afmc] ++
2,323,769 UART: [afmc] CDI.KEYID = 6
2,324,131 UART: [afmc] SUBJECT.KEYID = 7
2,324,556 UART: [afmc] AUTHORITY.KEYID = 5
2,359,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,376,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,377,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,383,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,388,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,394,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,402,421 UART: [afmc] --
2,403,371 UART: [cold-reset] --
2,404,337 UART: [state] Locking Datavault
2,405,508 UART: [state] Locking PCR0, PCR1 and PCR31
2,406,112 UART: [state] Locking ICCM
2,406,754 UART: [exit] Launching FMC @ 0x40000130
2,412,084 UART:
2,412,100 UART: Running Caliptra FMC ...
2,412,508 UART:
2,412,651 UART: [state] CFI Enabled
2,423,049 UART: [fht] FMC Alias Private Key: 7
2,541,475 UART: [art] Extend RT PCRs Done
2,541,903 UART: [art] Lock RT PCRs Done
2,543,325 UART: [art] Populate DV Done
2,551,564 UART: [fht] FMC Alias Private Key: 7
2,552,638 UART: [art] Derive CDI
2,552,918 UART: [art] Store in slot 0x4
2,638,831 UART: [art] Derive Key Pair
2,639,191 UART: [art] Store priv key in slot 0x5
2,652,671 UART: [art] Derive Key Pair - Done
2,667,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,682,701 UART: [art] Erasing AUTHORITY.KEYID = 7
2,683,466 UART: [art] PUB.X = 205666BB5661DB05B88FE24FA04E643A1A0D6997AF48614B0BDC495EA2931E50E125A1157E9E89BC958F0BD189892BC4
2,690,228 UART: [art] PUB.Y = 566326834FDCF87F10C0D34E3363A608D407B4BA9BBE5490FF24308A55A73BC615840B93BD70F6DC868ED294C59A53F6
2,697,173 UART: [art] SIG.R = 8B14ADB1E000A6138119DB18370CD1FB4232FDB3BBBF85991135E4CA65D7D160915D62249953C858EDBB0782DEA1C6C2
2,703,923 UART: [art] SIG.S = 8C809486BD344A41F7C9B6C22DF57579CEED47FFE825ED53BDCD6DAA0941278241B2E8F79E9397806CDFBA91448F84C1
2,727,592 UART: mock_rt_interact::rt_entry...FMC Tester
2,847,421 UART: [rt] Runtime listening for mailbox commands...
2,850,811 >>> mbox cmd response data (2048 bytes)
2,850,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,852,044 >>> mbox cmd response data (336 bytes)
2,852,045 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,864,636 >>> mbox cmd response data (1536 bytes)
2,864,637 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,864,740 UART:
2,864,756 UART: Running Caliptra ROM ...
2,865,164 UART:
2,865,306 UART: [state] CFI Enabled
2,867,786 UART: [state] LifecycleState = Unprovisioned
2,868,441 UART: [state] DebugLocked = No
2,869,127 UART: [state] WD Timer not started. Device not locked for debugging
2,870,253 UART: [kat] SHA2-256
3,675,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,680,028 UART: [kat] ++
3,680,180 UART: [kat] sha1
3,684,482 UART: [kat] SHA2-256
3,686,422 UART: [kat] SHA2-384
3,689,397 UART: [kat] SHA2-512-ACC
3,691,297 UART: [kat] ECC-384
3,701,262 UART: [kat] HMAC-384Kdf
3,706,058 UART: [kat] LMS
3,954,386 UART: [kat] --
3,955,172 UART: [update-reset] ++
4,867,259 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
4,868,270 UART: [update-reset] Loading Runtime at addr 0x40005000 len 53568
4,964,907 >>> mbox cmd response: success
4,965,062 UART: [update-reset] Copying MAN_2 To MAN_1
4,973,076 UART: [update-reset Success] --
4,974,045 UART: [state] Locking Datavault
4,974,957 UART: [state] Locking PCR0, PCR1 and PCR31
4,975,561 UART: [state] Locking ICCM
4,976,103 UART: [exit] Launching FMC @ 0x40000130
4,981,433 UART:
4,981,449 UART: Running Caliptra FMC ...
4,981,857 UART:
4,982,000 UART: [state] CFI Enabled
5,070,755 UART: [art] Extend RT PCRs Done
5,071,183 UART: [art] Lock RT PCRs Done
5,072,518 UART: [art] Populate DV Done
5,080,691 UART: [fht] FMC Alias Private Key: 7
5,081,771 UART: [art] Derive CDI
5,082,051 UART: [art] Store in slot 0x4
5,167,658 UART: [art] Derive Key Pair
5,168,018 UART: [art] Store priv key in slot 0x5
5,181,340 UART: [art] Derive Key Pair - Done
5,196,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,211,383 UART: [art] Erasing AUTHORITY.KEYID = 7
5,212,148 UART: [art] PUB.X = 999BB5E6C44547A7BDBF8C7BD05A430001041F9FA3C3C3B183B8D31D15819267E2DBC5D87A4D6E3365465312D2ADD11F
5,218,898 UART: [art] PUB.Y = A66D467CC7C69D883F286C02D4A1FE5B64745BB3C69A975D263E3591EFBE3465CC415A3CAE7B98CCA47808234ABC3EDF
5,225,858 UART: [art] SIG.R = 4A719A9CE41CDD368B2F001246FF93AD57E59E81A027DF2F46359605721EC094888FAFDFCC691E79180FA6B9FC388232
5,232,606 UART: [art] SIG.S = 2942E3C80481BB049881D59D327D29A94E98512E34C52B7F41911EAE12972CB789D26040C2B1EAE6DB612AC78F366B61
5,254,771 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,255,606 UART: mock_rt_interact::rt_entry...FMC Tester
5,621,007 UART: [rt] Runtime listening for mailbox commands...
5,623,042 >>> mbox cmd response data (336 bytes)
5,623,043 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,635,634 >>> mbox cmd response data (1536 bytes)
5,635,635 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,635,652 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,212 ready_for_fw is high
1,061,212 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
2,175,316 >>> mbox cmd response: success
2,175,316 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,237,503 UART:
2,237,519 UART: Running Caliptra FMC ...
2,237,927 UART:
2,238,070 UART: [state] CFI Enabled
2,248,482 UART: [fht] FMC Alias Private Key: 7
2,367,416 UART: [art] Extend RT PCRs Done
2,367,844 UART: [art] Lock RT PCRs Done
2,369,350 UART: [art] Populate DV Done
2,377,589 UART: [fht] FMC Alias Private Key: 7
2,378,751 UART: [art] Derive CDI
2,379,031 UART: [art] Store in slot 0x4
2,464,818 UART: [art] Derive Key Pair
2,465,178 UART: [art] Store priv key in slot 0x5
2,478,826 UART: [art] Derive Key Pair - Done
2,493,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,509,321 UART: [art] Erasing AUTHORITY.KEYID = 7
2,510,086 UART: [art] PUB.X = D53B7CC3AC1B96229DAF091490F2FB9BBDDAA24A0C97E0949C21E86C8D6C7DC12F7C6DA41EB8CAAD268A392A827D6B0B
2,516,873 UART: [art] PUB.Y = B6294FDD3E853CC05BD1C5B63FCA346E0EC937CAB7FF10297A8DAB02314964538E0E83A870AAF5DB3338DBE13996DBD3
2,523,832 UART: [art] SIG.R = D46DBFB67F8A1E6107BECC11B09F984C2BF0CD61FF06A27EA7CC5D9D579D0BCC571F81717851E0BF286E31E1180E79DC
2,530,610 UART: [art] SIG.S = 2EE54D467E8A52B1E506D8C73E4DB7B6E1E16AF9D5EFD5F50699777F618F59D176AB9E50AD044CC3C801305EF3D4E43F
2,554,852 UART: mock_rt_interact::rt_entry...FMC Tester
2,674,804 UART: [rt] Runtime listening for mailbox commands...
2,678,194 >>> mbox cmd response data (2048 bytes)
2,678,195 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,679,427 >>> mbox cmd response data (336 bytes)
2,679,428 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
2,692,019 >>> mbox cmd response data (1536 bytes)
2,692,020 <<< Executing mbox cmd 0x46574c44 (79496 bytes) from SoC
4,675,023 >>> mbox cmd response: success
4,688,308 UART:
4,688,324 UART: Running Caliptra FMC ...
4,688,732 UART:
4,688,875 UART: [state] CFI Enabled
4,778,868 UART: [art] Extend RT PCRs Done
4,779,296 UART: [art] Lock RT PCRs Done
4,780,529 UART: [art] Populate DV Done
4,788,886 UART: [fht] FMC Alias Private Key: 7
4,790,018 UART: [art] Derive CDI
4,790,298 UART: [art] Store in slot 0x4
4,876,007 UART: [art] Derive Key Pair
4,876,367 UART: [art] Store priv key in slot 0x5
4,889,559 UART: [art] Derive Key Pair - Done
4,904,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,919,589 UART: [art] Erasing AUTHORITY.KEYID = 7
4,920,354 UART: [art] PUB.X = C8EB2721B849D6706351AC39FCC1EF456A45657BF3CC576286CF63DCB6090540578C37CAB311150D6A5061828CD211A6
4,927,115 UART: [art] PUB.Y = 9EED14C2D9F3552C82F1C1F96F07753C7D127DA01097FA88E6F5A13F61BF60F849DFD17A36036CFB3354403491F0BFB8
4,934,067 UART: [art] SIG.R = F260B44895023A9B5C0DAE4191F0D0998D73FB35D94E1A5CFEB71271F5EDB9BBBC58FD53EFCD7D63F346C83E22AA1904
4,940,846 UART: [art] SIG.S = 7BA0CF3FD49AAD13E69FE92256742F3DCBBA66C11F5E94F0B839E9CC9F0452988974673E49B0D2774800AEDCDD8DD927
4,963,120 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
4,964,331 UART: mock_rt_interact::rt_entry...FMC Tester
5,330,031 UART: [rt] Runtime listening for mailbox commands...
5,332,066 >>> mbox cmd response data (336 bytes)
5,332,067 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
5,344,658 >>> mbox cmd response data (1536 bytes)
5,344,659 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
5,344,676 >>> mbox cmd response: success
test test_rtalias::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 4 filtered out; finished in 1.82s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test mmio::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::test_pretty_u64 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_failed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_passed ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_peek ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_search ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_take ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test output::tests::test_unknown_generic_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
test rv32_builder::tests::test_rv32gen_mmio ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_apb ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
3,289 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,214 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
3,129 UART: hii* TESTCASE PASSED
Initializing fuses
867 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,813 writing to cptra_bootfsm_go
3,119 UART: hii* TESTCASE PASSED
Initializing fuses
885 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
3,185 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,756 writing to cptra_bootfsm_go
4,169 UART: hii* TESTCASE PASSED
Initializing fuses
874 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
3,108 UART: hii* TESTCASE PASSED
Initializing fuses
864 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,162 UART: hii* TESTCASE PASSED
Initializing fuses
868 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,213 UART: hii* TESTCASE PASSED
Initializing fuses
878 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,211 UART: hii* TESTCASE PASSED
Initializing fuses
865 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,151 UART: hii* TESTCASE PASSED
Initializing fuses
873 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,824 writing to cptra_bootfsm_go
3,235 UART: hii* TESTCASE PASSED
Initializing fuses
871 writing to cptra_bootfsm_go
test tests::test_cold_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,193 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,188 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,145 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
3,156 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,663 writing to cptra_bootfsm_go
4,056 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,199 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,153 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,812 writing to cptra_bootfsm_go
3,108 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
3,171 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,460 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,150 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
3,121 UART: hii* TESTCASE PASSED
test tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hiitest tests::test_execution ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
3,233 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,059 >>> mbox cmd response data (14 bytes)
35,590 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,246 >>> mbox cmd response data (12 bytes)
36,596 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,954 >>> mbox cmd response data (7 bytes)
37,241 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,539 >>> mbox cmd response data (7 bytes)
37,821 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,170 >>> mbox cmd response data (0 bytes)
38,419 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,691 >>> mbox cmd response: success
38,877 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,214 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
3,133 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
34,976 >>> mbox cmd response data (14 bytes)
35,522 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,241 >>> mbox cmd response data (12 bytes)
36,549 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,902 >>> mbox cmd response data (7 bytes)
37,182 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,482 >>> mbox cmd response data (7 bytes)
37,758 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,107 >>> mbox cmd response data (0 bytes)
38,337 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,660 >>> mbox cmd response: success
38,863 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,203 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,731 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,567 >>> mbox cmd response data (14 bytes)
36,241 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,920 >>> mbox cmd response data (12 bytes)
37,239 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,615 >>> mbox cmd response data (7 bytes)
37,919 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,298 >>> mbox cmd response data (7 bytes)
38,610 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,966 >>> mbox cmd response data (0 bytes)
39,221 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,494 >>> mbox cmd response: success
39,695 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
40,037 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,632 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,443 >>> mbox cmd response data (14 bytes)
36,090 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,781 >>> mbox cmd response data (12 bytes)
37,117 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,547 >>> mbox cmd response data (7 bytes)
37,852 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,219 >>> mbox cmd response data (7 bytes)
38,564 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,925 >>> mbox cmd response data (0 bytes)
39,201 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,481 >>> mbox cmd response: success
39,676 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,968 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,352 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,213 >>> mbox cmd response data (14 bytes)
35,723 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,375 >>> mbox cmd response data (12 bytes)
36,713 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,069 >>> mbox cmd response data (7 bytes)
37,364 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,666 >>> mbox cmd response data (7 bytes)
37,947 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,296 >>> mbox cmd response data (0 bytes)
38,535 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,807 >>> mbox cmd response: success
38,998 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,354 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,280 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,154 >>> mbox cmd response data (14 bytes)
35,658 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,314 >>> mbox cmd response data (12 bytes)
36,620 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,970 >>> mbox cmd response data (7 bytes)
37,253 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,606 >>> mbox cmd response data (7 bytes)
37,908 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,259 >>> mbox cmd response data (0 bytes)
38,498 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,772 >>> mbox cmd response: success
38,960 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,298 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,566 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,397 >>> mbox cmd response data (14 bytes)
35,989 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,646 >>> mbox cmd response data (12 bytes)
36,973 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,331 >>> mbox cmd response data (7 bytes)
37,626 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,933 >>> mbox cmd response data (7 bytes)
38,223 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,576 >>> mbox cmd response data (0 bytes)
38,821 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,093 >>> mbox cmd response: success
39,285 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,578 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
4,565 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,425 >>> mbox cmd response data (14 bytes)
37,619 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
39,807 >>> mbox cmd response data (12 bytes)
41,647 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
43,473 >>> mbox cmd response data (7 bytes)
44,022 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
44,429 >>> mbox cmd response data (7 bytes)
44,733 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
45,099 >>> mbox cmd response data (0 bytes)
45,349 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
45,624 >>> mbox cmd response: success
45,817 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
46,126 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,280 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,108 >>> mbox cmd response data (14 bytes)
35,653 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,310 >>> mbox cmd response data (12 bytes)
36,621 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,981 >>> mbox cmd response data (7 bytes)
37,322 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,654 >>> mbox cmd response data (7 bytes)
37,963 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,259 >>> mbox cmd response data (0 bytes)
38,495 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,800 >>> mbox cmd response: success
38,995 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,335 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,205 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,062 >>> mbox cmd response data (14 bytes)
35,581 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,237 >>> mbox cmd response data (12 bytes)
36,551 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
36,852 >>> mbox cmd response data (7 bytes)
37,141 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
37,442 >>> mbox cmd response data (7 bytes)
37,724 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,073 >>> mbox cmd response data (0 bytes)
38,313 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
38,589 >>> mbox cmd response: success
38,778 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,138 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,591 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,427 >>> mbox cmd response data (14 bytes)
36,121 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,805 >>> mbox cmd response data (12 bytes)
37,125 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,428 >>> mbox cmd response data (7 bytes)
37,766 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,126 >>> mbox cmd response data (7 bytes)
38,416 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,772 >>> mbox cmd response data (0 bytes)
39,013 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,292 >>> mbox cmd response: success
39,479 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,819 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,731 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
35,594 >>> mbox cmd response data (14 bytes)
36,194 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
36,907 >>> mbox cmd response data (12 bytes)
37,224 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
37,592 >>> mbox cmd response data (7 bytes)
37,890 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
38,251 >>> mbox cmd response data (7 bytes)
38,547 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
38,902 >>> mbox cmd response data (0 bytes)
39,148 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
39,423 >>> mbox cmd response: success
39,610 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
39,901 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x10000000 (10 bytes) from SoC
6,735 >>> mbox cmd response data (14 bytes)
6,736 <<< Executing mbox cmd 0x10000000 (8 bytes) from SoC
6,842 >>> mbox cmd response data (12 bytes)
6,843 <<< Executing mbox cmd 0x10001000 (0 bytes) from SoC
6,859 >>> mbox cmd response data (7 bytes)
6,860 <<< Executing mbox cmd 0x10001000 (1 bytes) from SoC
6,876 >>> mbox cmd response data (7 bytes)
6,877 <<< Executing mbox cmd 0x10002000 (0 bytes) from SoC
6,890 >>> mbox cmd response data (0 bytes)
6,891 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,900 >>> mbox cmd response: success
6,900 <<< Executing mbox cmd 0x40000000 (10 bytes) from SoC
6,913 >>> mbox cmd response: failed
test tests::test_mailbox_execute ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,257 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,765 >>> mbox cmd response: success
35,347 UART: |dcfeffff48692121| 37,227 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,752 >>> mbox cmd response: success
|dcfeffff48692121| 39,947 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,392 >>> mbox cmd response: success
|dcfeffff48692121| 42,635 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,130 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,170 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,687 >>> mbox cmd response: success
35,242 UART: |dcfeffff48692121| 37,170 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,704 >>> mbox cmd response: success
|dcfeffff48692121| 39,898 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,405 >>> mbox cmd response: success
|dcfeffff48692121| 42,588 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,036 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,662 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
38,024 >>> mbox cmd response: success
38,722 UART: |dcfeffff48692121| 40,699 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
41,285 >>> mbox cmd response: success
|dcfeffff48692121| 43,516 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,996 >>> mbox cmd response: success
|dcfeffff48692121| 46,271 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
46,832 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
3,582 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,098 >>> mbox cmd response: success
35,691 UART: |dcfeffff48692121| 37,692 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,929 >>> mbox cmd response: success
|dcfeffff48692121| 41,211 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,644 >>> mbox cmd response: success
|dcfeffff48692121| 43,848 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,340 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,317 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,856 >>> mbox cmd response: success
35,329 UART: |dcfeffff48692121| 37,289 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,816 >>> mbox cmd response: success
|dcfeffff48692121| 40,033 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,492 >>> mbox cmd response: success
|dcfeffff48692121| 42,728 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,176 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,334 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,865 >>> mbox cmd response: success
35,354 UART: |dcfeffff48692121| 37,302 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,826 >>> mbox cmd response: success
|dcfeffff48692121| 40,023 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,489 >>> mbox cmd response: success
|dcfeffff48692121| 42,668 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,178 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,542 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,056 >>> mbox cmd response: success
35,707 UART: |dcfeffff48692121| 37,617 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,216 >>> mbox cmd response: success
|dcfeffff48692121| 40,434 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,008 >>> mbox cmd response: success
|dcfeffff48692121| 43,256 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,814 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,567 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,080 >>> mbox cmd response: success
35,826 UART: |dcfeffff48692121| 37,764 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,351 >>> mbox cmd response: success
|dcfeffff48692121| 40,585 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,089 >>> mbox cmd response: success
|dcfeffff48692121| 43,358 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,869 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,197 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,733 >>> mbox cmd response: success
35,290 UART: |dcfeffff48692121| 37,229 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,767 >>> mbox cmd response: success
|dcfeffff48692121| 39,969 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,418 >>> mbox cmd response: success
|dcfeffff48692121| 42,659 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,105 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,326 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,853 >>> mbox cmd response: success
35,394 UART: |dcfeffff48692121| 37,278 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,847 >>> mbox cmd response: success
|dcfeffff48692121| 40,051 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,510 >>> mbox cmd response: success
|dcfeffff48692121| 42,743 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,207 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,569 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,108 >>> mbox cmd response: success
35,682 UART: |dcfeffff48692121| 37,610 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,631 >>> mbox cmd response: success
|dcfeffff48692121| 41,898 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,330 >>> mbox cmd response: success
|dcfeffff48692121| 44,568 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,134 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
658 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,834 writing to cptra_bootfsm_go
4,297 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,808 >>> mbox cmd response: success
36,335 UART: |dcfeffff48692121| 38,342 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,931 >>> mbox cmd response: success
|dcfeffff48692121| 41,174 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,693 >>> mbox cmd response: success
|dcfeffff48692121| 43,919 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,423 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_mailbox_execute_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "67ef0069a02b9d1904595a26767eb0d0b55180a3537c08f0ab9d103a7a7042f713078d5112feef49087560b100120838",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_mailbox_receive ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_mbox_negative ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
test tests::test_negative_soc_mgr_mbox_users ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,195 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,181 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,776 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
3,141 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,212 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
3,248 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,197 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,808 writing to cptra_bootfsm_go
3,105 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,235 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
3,159 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,835 writing to cptra_bootfsm_go
3,247 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,831 writing to cptra_bootfsm_go
3,131 UART: hii* TESTCASE PASSED
test tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
4 UART: hitest tests::test_output_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
4,180 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,553 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,447 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,801 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,564 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,903 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
3,749 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,132 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,450 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
36,707 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,260 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,656 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,691 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,056 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,699 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,009 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,442 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,795 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,292 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
34,655 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
3,660 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,018 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,876 writing to cptra_bootfsm_go
4,360 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
35,679 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
6,628 >>> mbox cmd response: success
test tests::test_sha512_acc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,180 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,726 >>> mbox cmd response: success
35,206 UART: |dcfeffff48692121| 37,130 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,671 >>> mbox cmd response: success
|dcfeffff48692121| 39,947 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,442 >>> mbox cmd response: success
|dcfeffff48692121| 42,680 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,137 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,861 writing to cptra_bootfsm_go
3,139 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,661 >>> mbox cmd response: success
35,264 UART: |dcfeffff48692121| 37,187 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,714 >>> mbox cmd response: success
|dcfeffff48692121| 39,951 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,465 >>> mbox cmd response: success
|dcfeffff48692121| 42,700 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,196 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
3,761 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,276 >>> mbox cmd response: success
35,816 UART: |dcfeffff48692121| 37,833 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,381 >>> mbox cmd response: success
|dcfeffff48692121| 40,637 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,213 >>> mbox cmd response: success
|dcfeffff48692121| 43,467 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,025 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,485 writing to cptra_bootfsm_go
5,030 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
36,583 >>> mbox cmd response: success
37,143 UART: |dcfeffff48692121| 39,154 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
39,759 >>> mbox cmd response: success
|dcfeffff48692121| 41,988 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
42,558 >>> mbox cmd response: success
|dcfeffff48692121| 44,809 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
45,378 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,176 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,706 >>> mbox cmd response: success
35,208 UART: |dcfeffff48692121| 37,141 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,661 >>> mbox cmd response: success
|dcfeffff48692121| 39,852 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,298 >>> mbox cmd response: success
|dcfeffff48692121| 42,921 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,468 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,227 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,749 >>> mbox cmd response: success
35,278 UART: |dcfeffff48692121| 37,192 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,711 >>> mbox cmd response: success
|dcfeffff48692121| 39,926 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,430 >>> mbox cmd response: success
|dcfeffff48692121| 42,661 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,112 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,572 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,093 >>> mbox cmd response: success
35,658 UART: |dcfeffff48692121| 37,652 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,242 >>> mbox cmd response: success
|dcfeffff48692121| 40,492 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,008 >>> mbox cmd response: success
|dcfeffff48692121| 43,313 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,838 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
3,560 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,099 >>> mbox cmd response: success
35,806 UART: |dcfeffff48692121| 37,757 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,351 >>> mbox cmd response: success
|dcfeffff48692121| 40,559 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,082 >>> mbox cmd response: success
|dcfeffff48692121| 43,316 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,838 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,277 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
34,830 >>> mbox cmd response: success
35,339 UART: |dcfeffff48692121| 37,271 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
37,791 >>> mbox cmd response: success
|dcfeffff48692121| 39,986 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,436 >>> mbox cmd response: success
|dcfeffff48692121| 42,665 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,116 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
3,511 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,033 >>> mbox cmd response: success
35,566 UART: |dcfeffff48692121| 37,498 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,017 >>> mbox cmd response: success
|dcfeffff48692121| 40,218 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
40,664 >>> mbox cmd response: success
|dcfeffff48692121| 42,906 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,350 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,841 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,373 >>> mbox cmd response: success
35,918 UART: |dcfeffff48692121| 37,930 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,532 >>> mbox cmd response: success
|dcfeffff48692121| 40,809 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,327 >>> mbox cmd response: success
|dcfeffff48692121| 43,575 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
44,084 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
35,101 >>> mbox cmd response: success
35,701 UART: |dcfeffff48692121| 37,736 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
38,336 >>> mbox cmd response: success
|dcfeffff48692121| 40,562 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
41,068 >>> mbox cmd response: success
|dcfeffff48692121| 43,360 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
43,878 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
6,651 >>> mbox cmd response: success
6,681 UART: |dcfeffff48692121| 7,348 <<< Executing mbox cmd 0x30000000 (11 bytes) from SoC
7,385 >>> mbox cmd response: success
|dcfeffff48692121| 8,082 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,119 >>> mbox cmd response: success
|dcfeffff48692121| 8,816 <<< Executing mbox cmd 0x30000000 (12 bytes) from SoC
8,853 >>> mbox cmd response: success
|dcfeffff48692121|test tests::test_soc_mgr_exec_req ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,574 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,272 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 21 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "557a15a28e73098451b51b3f982c68c73f6a3a64a67d2a70c365814eae933666743aa2fc4656121a8fb203cb6d2431a7",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test tests::test_soc_mgr_mbox_api ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 20 filtered out; finished in 0.01s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_bytes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_hex_slice ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7dbdbf51a1a8fc245c719fb91fe3eba4e80087a9d70ff51d391436df7136ddc7f377c49fa208775b1fc58dcf754c46db",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=5, mtval=50000000, next_pc=ac
* TESTCASE FAILED
test test_dccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,797 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "0e34ec266dd47dce296651066b58931a7b45219cc8a993dc2f850e9f036a0296c3b35c006b2a7fcac36dc7d4675efe7e",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_byte_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b7c5ef49f03dc5ac91b2f3070ec661f9adcddd758b19bf30615b21786add16fdaf6d960c142f64d2c21b510524a6c8dd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=1, mtval=40000000, next_pc=ac
* TESTCASE FAILED
test test_iccm_double_bit_ecc_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,825 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,844 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c94e59f5b852b5f7c0d0fc12d42f9406048840ecbb10258b80c9074165a5375e8f2a6ac6ac36dbd41123b0b6af5fe387",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_unaligned_write_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,784 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,779 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "a3cba8b7cd6a494dcdcc07efa89ccd21e74416d43033a9c54c9950e8b801758f5fff789080544480ac51758282a2bd3d",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=f0000000, mtval=0, next_pc=98
* TESTCASE FAILED
test test_iccm_write_locked_nmi_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,811 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,845 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,810 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "29b099527ba96893c0ec6f28d1132ec3d491818b3b3fe00eba97bbe365563f63f92ec98b13bd793499e90088b60de5d9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_invalid_instruction_exception_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
Setup signal handler...
Working...
Working...
Working...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "3585f808f4c89f31e6987d9766ea945e9508a03883426047d6f5860afe29778d2af0a83f088125b208a2c63d3dc91a29",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Received SIGBUS signal!
test test_mbox_pauser_sigbus ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,582 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,804 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ddf34d86ae2417d5b58f7c1bf7cab00f57b980d5d5419dc32ebb7990d1bc1110a977af6dad0e3d8b6935a3d0b9bb9b0b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
* TESTCASE PASSED
test test_pcr_extend ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,795 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,846 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,695 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "49fc29dc6c17c410656bd694896bbca89562ce8d5db1006a7719b96baf9b32c858bf84ea993332f83c9095018a8479b3",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=0, next_pc=ac
* TESTCASE FAILED
test test_write_to_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.13s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.12s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.14s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.11s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.07s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.06s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.04s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.05s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.02s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test tests::test_lms_sig_h15 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 3 filtered out; finished in 0.03s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test test::test_load_into_image_bad_address ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_image_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_fmc_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_pk_digest_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_owner_verify_preamble_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_owner_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_preamble_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_rt_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_size_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.01s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_fmc_rt_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_toc_incorrect_length ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_vendor_ecc_pk_idx_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_mismatch_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test verifier::tests::test_verify_fmc_update_rst ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 32 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_6 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test tests::test_bytes_to_words_8 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test helpers::tests::test_get_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.01s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test helpers::tests::test_get_data_not_found - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
stderr:
thread 'helpers::tests::test_get_data_not_found' panicked at 'unable to find substr "[idev] FOO = "', rom/dev/tests/rom_integration_tests/helpers.rs:76:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
1,302,195 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
1,302,186 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
7,242 writing to cptra_bootfsm_go
1,306,332 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "9ceaa1ec1851ec09a38e319a40035790957ea5cf58be9d1a9056f5039145d2de3e23634f20bbf9920975cee6a9b70cc4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
1,302,390 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4d68989131739cdc22c9485458c73439c9f6975f9381834c0b01d26a6801e7bdeeb7412794eec635c18e97457f13976f",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
472,316 UART: test_mem: [1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1122867, 1146447479, 2291772091, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1]
* TESTCASE PASSED
test rv32_unit_tests::test_asm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,751 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,095 UART:
192,469 UART: Running Caliptra ROM ...
193,638 UART:
193,816 UART: [state] CFI Enabled
263,952 UART: [state] LifecycleState = Unprovisioned
265,891 UART: [state] DebugLocked = No
268,515 UART: [state] WD Timer not started. Device not locked for debugging
272,706 UART: [kat] SHA2-256
452,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,182 UART: [kat] ++
463,721 UART: [kat] sha1
474,824 UART: [kat] SHA2-256
477,508 UART: [kat] SHA2-384
483,711 UART: [kat] SHA2-512-ACC
486,051 UART: [kat] ECC-384
2,947,806 UART: [kat] HMAC-384Kdf
2,972,585 UART: [kat] LMS
3,449,074 UART: [kat] --
3,452,723 UART: [cold-reset] ++
3,454,629 UART: [fht] FHT @ 0x50003400
3,465,177 UART: [idev] ++
3,465,746 UART: [idev] CDI.KEYID = 6
3,466,689 UART: [idev] SUBJECT.KEYID = 7
3,467,957 UART: [idev] UDS.KEYID = 0
3,501,359 UART: [idev] Erasing UDS.KEYID = 0
5,989,951 UART: [idev] Sha1 KeyId Algorithm
6,013,296 UART: [idev] --
6,018,108 UART: [ldev] ++
6,018,680 UART: [ldev] CDI.KEYID = 6
6,019,574 UART: [ldev] SUBJECT.KEYID = 5
6,020,738 UART: [ldev] AUTHORITY.KEYID = 7
6,022,034 UART: [ldev] FE.KEYID = 1
6,058,303 UART: [ldev] Erasing FE.KEYID = 1
8,569,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,665 UART: [ldev] --
10,374,377 UART: [fwproc] Wait for Commands...
10,377,194 UART: [fwproc] Recv command 0x43415053
10,379,950 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,462 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,289,388 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
4,399 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
192,359 UART:
192,950 UART: Running Caliptra ROM ...
194,072 UART:
603,678 UART: [state] CFI Enabled
616,437 UART: [state] LifecycleState = Unprovisioned
618,369 UART: [state] DebugLocked = No
619,878 UART: [state] WD Timer not started. Device not locked for debugging
623,765 UART: [kat] SHA2-256
803,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,192 UART: [kat] ++
814,688 UART: [kat] sha1
824,909 UART: [kat] SHA2-256
827,637 UART: [kat] SHA2-384
833,396 UART: [kat] SHA2-512-ACC
835,769 UART: [kat] ECC-384
3,280,604 UART: [kat] HMAC-384Kdf
3,291,581 UART: [kat] LMS
3,768,081 UART: [kat] --
3,770,411 UART: [cold-reset] ++
3,772,722 UART: [fht] FHT @ 0x50003400
3,783,969 UART: [idev] ++
3,784,540 UART: [idev] CDI.KEYID = 6
3,785,552 UART: [idev] SUBJECT.KEYID = 7
3,786,764 UART: [idev] UDS.KEYID = 0
3,804,347 UART: [idev] Erasing UDS.KEYID = 0
6,261,545 UART: [idev] Sha1 KeyId Algorithm
6,285,641 UART: [idev] --
6,290,586 UART: [ldev] ++
6,291,162 UART: [ldev] CDI.KEYID = 6
6,292,128 UART: [ldev] SUBJECT.KEYID = 5
6,293,288 UART: [ldev] AUTHORITY.KEYID = 7
6,294,579 UART: [ldev] FE.KEYID = 1
6,304,445 UART: [ldev] Erasing FE.KEYID = 1
8,780,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,130 UART: [ldev] --
10,574,153 UART: [fwproc] Wait for Commands...
10,575,945 UART: [fwproc] Recv command 0x43415053
10,578,706 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,199 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
10,495,485 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,965 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,103 UART: [kat] HMAC-384Kdf
920,827 UART: [kat] LMS
1,169,139 UART: [kat] --
1,169,950 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,207 UART: [idev] Erasing UDS.KEYID = 0
1,199,289 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,914 UART: [ldev] Erasing FE.KEYID = 1
1,241,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,727 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,132 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x43415053
1,283,161 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,138,897 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,368 UART: [kat] LMS
1,169,680 UART: [kat] --
1,170,523 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,503 UART: [ldev] ++
1,209,671 UART: [ldev] CDI.KEYID = 6
1,210,035 UART: [ldev] SUBJECT.KEYID = 5
1,210,462 UART: [ldev] AUTHORITY.KEYID = 7
1,210,925 UART: [ldev] FE.KEYID = 1
1,216,141 UART: [ldev] Erasing FE.KEYID = 1
1,242,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,913 UART: [ldev] --
1,281,176 UART: [fwproc] Wait for Commands...
1,281,951 UART: [fwproc] Recv command 0x43415053
1,282,944 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,139,178 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
891,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,770 UART: [kat] ++
895,922 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
905,069 UART: [kat] SHA2-512-ACC
906,970 UART: [kat] ECC-384
917,049 UART: [kat] HMAC-384Kdf
921,497 UART: [kat] LMS
1,169,809 UART: [kat] --
1,170,612 UART: [cold-reset] ++
1,171,124 UART: [fht] FHT @ 0x50003400
1,173,648 UART: [idev] ++
1,173,816 UART: [idev] CDI.KEYID = 6
1,174,177 UART: [idev] SUBJECT.KEYID = 7
1,174,602 UART: [idev] UDS.KEYID = 0
1,182,933 UART: [idev] Erasing UDS.KEYID = 0
1,200,141 UART: [idev] Sha1 KeyId Algorithm
1,209,227 UART: [idev] --
1,210,256 UART: [ldev] ++
1,210,424 UART: [ldev] CDI.KEYID = 6
1,210,788 UART: [ldev] SUBJECT.KEYID = 5
1,211,215 UART: [ldev] AUTHORITY.KEYID = 7
1,211,678 UART: [ldev] FE.KEYID = 1
1,217,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,872 UART: [ldev] --
1,282,171 UART: [fwproc] Wait for Commands...
1,282,830 UART: [fwproc] Recv command 0x43415053
1,283,823 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,017 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,068 UART: [kat] SHA2-512-ACC
906,969 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,138 UART: [kat] LMS
1,169,450 UART: [kat] --
1,170,125 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,173 UART: [idev] ++
1,173,341 UART: [idev] CDI.KEYID = 6
1,173,702 UART: [idev] SUBJECT.KEYID = 7
1,174,127 UART: [idev] UDS.KEYID = 0
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,198,968 UART: [idev] Sha1 KeyId Algorithm
1,207,652 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,389 UART: [ldev] Erasing FE.KEYID = 1
1,241,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,813 UART: [ldev] --
1,280,166 UART: [fwproc] Wait for Commands...
1,280,877 UART: [fwproc] Recv command 0x43415053
1,281,870 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,139,782 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,301 UART: [state] WD Timer not started. Device not locked for debugging
87,600 UART: [kat] SHA2-256
891,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,254 UART: [kat] ++
895,406 UART: [kat] sha1
899,546 UART: [kat] SHA2-256
901,486 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,343 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,430 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,199,247 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,092 UART: [ldev] ++
1,209,260 UART: [ldev] CDI.KEYID = 6
1,209,624 UART: [ldev] SUBJECT.KEYID = 5
1,210,051 UART: [ldev] AUTHORITY.KEYID = 7
1,210,514 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,304 UART: [ldev] --
1,281,545 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x43415053
1,283,189 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,139,915 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,259 UART: [kat] SHA2-256
902,199 UART: [kat] SHA2-384
905,016 UART: [kat] SHA2-512-ACC
906,917 UART: [kat] ECC-384
916,552 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,249 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,374 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,309 UART: [ldev] ++
1,209,477 UART: [ldev] CDI.KEYID = 6
1,209,841 UART: [ldev] SUBJECT.KEYID = 5
1,210,268 UART: [ldev] AUTHORITY.KEYID = 7
1,210,731 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,241,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,028 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x43415053
1,282,608 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
1,140,722 >>> mbox cmd response data (24 bytes)
test test_capabilities::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.11s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.12s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.14s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.18s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.15s
running 1 test
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: ["emu"] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
Runing with firmware FwId { crate_name: "caliptra-rom", bin_name: "caliptra-rom", features: [] }
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_cfi::test_memcpy_not_called_before_cfi_init ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.15s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,794 writing to cptra_bootfsm_go
192,071 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,234 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "060bfd8cc31b31c79565e0a5991fa848bedfced949354d7cb1ac89faee917bd1253a832c44b659fac5341bac1efc4dde",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,521 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
197,671 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7576
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "8b29576619d2f498a2f723b8db14744c7f64f76a76ea9540d13f03be9ab86fd00e5625e6b3f6a99f3d9e67cbc30e6f64",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.16s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
rom_entry_offset is 7752
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4cef7e4a536e0147fb5548690dfa9531f3bed77b964a76b1c98be5bf9691c09eb27d15d07e02b17959a423aae3288eec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
82,059 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
83,958 UART: ROM Fatal Error: 0x01050002
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001E48 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
rom_entry_offset is 7576
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "4874991386c4df305fd17cfc2e71f5aa4cfd88ee05c2178932623baa8d0a1f93d4f3bb3b2f82c6e7f16cd09e899d3424",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=2, mtval=ffffffff, next_pc=104
ROM Global Exception mcause=0x00000002 mscause=0x00000000 mepc=0x00001D98 ra=0x000000C6
test test_cpu_fault::test_cpu_fault ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
191,932 UART:
192,294 UART: Running Caliptra ROM ...
193,385 UART:
193,533 UART: [state] CFI Enabled
209,398 UART: [state] LifecycleState = Unprovisioned
211,337 UART: [state] DebugLocked = No
213,375 UART: [state] WD Timer not started. Device not locked for debugging
218,118 UART: [kat] SHA2-256
397,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
408,494 UART: [kat] ++
409,049 UART: [kat] sha1
419,936 UART: [kat] SHA2-256
422,670 UART: [kat] SHA2-384
429,301 UART: [kat] SHA2-512-ACC
431,671 UART: [kat] ECC-384
2,873,721 UART: [kat] HMAC-384Kdf
2,885,744 UART: [kat] LMS
3,362,210 UART: [kat] --
3,367,992 UART: [cold-reset] ++
3,369,567 UART: [fht] FHT @ 0x50003400
3,380,483 UART: [idev] ++
3,381,056 UART: [idev] CDI.KEYID = 6
3,381,978 UART: [idev] SUBJECT.KEYID = 7
3,383,231 UART: [idev] UDS.KEYID = 0
3,384,184 ready_for_fw is high
3,384,386 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,522,356 UART: [idev] Erasing UDS.KEYID = 0
5,862,673 UART: [idev] Sha1 KeyId Algorithm
5,886,342 UART: [idev] --
5,890,895 UART: [ldev] ++
5,891,508 UART: [ldev] CDI.KEYID = 6
5,892,402 UART: [ldev] SUBJECT.KEYID = 5
5,893,537 UART: [ldev] AUTHORITY.KEYID = 7
5,894,887 UART: [ldev] FE.KEYID = 1
5,907,833 UART: [ldev] Erasing FE.KEYID = 1
8,387,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,108,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,124,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,177,648 UART: [ldev] --
10,183,076 UART: [fwproc] Wait for Commands...
10,185,879 UART: [fwproc] Recv command 0x46574c44
10,187,869 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,648,786 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,019,816 >>> mbox cmd response: success
14,023,099 UART: [afmc] ++
14,023,698 UART: [afmc] CDI.KEYID = 6
14,024,614 UART: [afmc] SUBJECT.KEYID = 7
14,025,838 UART: [afmc] AUTHORITY.KEYID = 5
16,530,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,253,981 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,212 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,271,956 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,287,920 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,303,654 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,327,798 UART: [afmc] --
18,330,954 UART: [cold-reset] --
18,335,463 UART: [state] Locking Datavault
18,341,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,100 UART: [state] Locking ICCM
18,344,973 UART: [exit] Launching FMC @ 0x40000000
18,353,344 UART:
18,353,602 UART: Running Caliptra FMC ...
18,354,745 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,372,407 ready_for_fw is high
3,372,945 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,298 >>> mbox cmd response: success
18,159,130 UART:
18,159,545 UART: Running Caliptra FMC ...
18,160,828 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,499 UART:
192,862 UART: Running Caliptra ROM ...
193,979 UART:
194,123 UART: [state] CFI Enabled
209,900 UART: [state] LifecycleState = Unprovisioned
211,831 UART: [state] DebugLocked = No
213,945 UART: [state] WD Timer not started. Device not locked for debugging
218,604 UART: [kat] SHA2-256
398,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
409,059 UART: [kat] ++
409,510 UART: [kat] sha1
420,466 UART: [kat] SHA2-256
423,188 UART: [kat] SHA2-384
429,852 UART: [kat] SHA2-512-ACC
432,193 UART: [kat] ECC-384
2,874,201 UART: [kat] HMAC-384Kdf
2,886,223 UART: [kat] LMS
3,362,749 UART: [kat] --
3,368,511 UART: [cold-reset] ++
3,370,088 UART: [fht] FHT @ 0x50003400
3,380,992 UART: [idev] ++
3,381,556 UART: [idev] CDI.KEYID = 6
3,382,583 UART: [idev] SUBJECT.KEYID = 7
3,383,754 UART: [idev] UDS.KEYID = 0
3,384,960 ready_for_fw is high
3,385,166 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,522,956 UART: [idev] Erasing UDS.KEYID = 0
5,863,231 UART: [idev] Sha1 KeyId Algorithm
5,886,917 UART: [idev] --
5,891,428 UART: [ldev] ++
5,892,059 UART: [ldev] CDI.KEYID = 6
5,892,979 UART: [ldev] SUBJECT.KEYID = 5
5,894,142 UART: [ldev] AUTHORITY.KEYID = 7
5,895,428 UART: [ldev] FE.KEYID = 1
5,908,337 UART: [ldev] Erasing FE.KEYID = 1
8,387,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,109,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,125,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,140,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,156,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,178,180 UART: [ldev] --
10,183,605 UART: [fwproc] Wait for Commands...
10,186,396 UART: [fwproc] Recv command 0x46574c44
10,188,421 UART: [fwproc] Recv'd Img size: 109820 bytes
13,564,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,649,351 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,691,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,020,353 >>> mbox cmd response: success
14,023,632 UART: [afmc] ++
14,024,228 UART: [afmc] CDI.KEYID = 6
14,025,316 UART: [afmc] SUBJECT.KEYID = 7
14,026,344 UART: [afmc] AUTHORITY.KEYID = 5
16,530,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,254,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,256,752 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,272,499 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,288,441 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,304,152 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,328,371 UART: [afmc] --
18,331,530 UART: [cold-reset] --
18,336,029 UART: [state] Locking Datavault
18,341,883 UART: [state] Locking PCR0, PCR1 and PCR31
18,343,644 UART: [state] Locking ICCM
18,345,506 UART: [exit] Launching FMC @ 0x40000000
18,353,918 UART:
18,354,173 UART: Running Caliptra FMC ...
18,355,318 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,372,680 ready_for_fw is high
3,373,137 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
13,908,575 >>> mbox cmd response: success
18,159,383 UART:
18,159,767 UART: Running Caliptra FMC ...
18,161,041 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,506 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,421 UART: [kat] SHA2-256
891,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,075 UART: [kat] ++
896,227 UART: [kat] sha1
900,455 UART: [kat] SHA2-256
902,395 UART: [kat] SHA2-384
905,258 UART: [kat] SHA2-512-ACC
907,159 UART: [kat] ECC-384
916,978 UART: [kat] HMAC-384Kdf
921,581 UART: [kat] LMS
1,169,893 UART: [kat] --
1,170,958 UART: [cold-reset] ++
1,171,380 UART: [fht] FHT @ 0x50003400
1,173,974 UART: [idev] ++
1,174,142 UART: [idev] CDI.KEYID = 6
1,174,503 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,274 ready_for_fw is high
1,175,274 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,183,226 UART: [idev] Erasing UDS.KEYID = 0
1,200,397 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,796 UART: [ldev] SUBJECT.KEYID = 5
1,211,223 UART: [ldev] AUTHORITY.KEYID = 7
1,211,686 UART: [ldev] FE.KEYID = 1
1,217,234 UART: [ldev] Erasing FE.KEYID = 1
1,243,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,974 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,284,048 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,557,327 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,575,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,715,733 >>> mbox cmd response: success
2,716,753 UART: [afmc] ++
2,716,921 UART: [afmc] CDI.KEYID = 6
2,717,284 UART: [afmc] SUBJECT.KEYID = 7
2,717,710 UART: [afmc] AUTHORITY.KEYID = 5
2,753,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,770,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,770,893 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,776,613 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,782,506 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,788,199 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,938 UART: [afmc] --
2,796,783 UART: [cold-reset] --
2,797,721 UART: [state] Locking Datavault
2,798,962 UART: [state] Locking PCR0, PCR1 and PCR31
2,799,566 UART: [state] Locking ICCM
2,800,106 UART: [exit] Launching FMC @ 0x40000000
2,805,403 UART:
2,805,419 UART: Running Caliptra FMC ...
2,805,827 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,792 >>> mbox cmd response: success
2,631,132 UART:
2,631,148 UART: Running Caliptra FMC ...
2,631,556 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_no_rng ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,112 UART:
192,497 UART: Running Caliptra ROM ...
193,609 UART:
193,760 UART: [state] CFI Enabled
261,466 UART: [state] LifecycleState = Unprovisioned
263,461 UART: [state] DebugLocked = No
265,550 UART: [state] WD Timer not started. Device not locked for debugging
269,063 UART: [kat] SHA2-256
448,724 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,512 UART: [kat] ++
460,049 UART: [kat] sha1
470,079 UART: [kat] SHA2-256
472,763 UART: [kat] SHA2-384
479,553 UART: [kat] SHA2-512-ACC
481,955 UART: [kat] ECC-384
2,963,061 UART: [kat] HMAC-384Kdf
2,983,642 UART: [kat] LMS
3,460,151 UART: [kat] --
3,467,365 UART: [cold-reset] ++
3,468,638 UART: [fht] FHT @ 0x50003400
3,480,072 UART: [idev] ++
3,480,656 UART: [idev] CDI.KEYID = 6
3,481,632 UART: [idev] SUBJECT.KEYID = 7
3,482,849 UART: [idev] UDS.KEYID = 0
3,514,283 UART: [idev] Erasing UDS.KEYID = 0
6,000,726 UART: [idev] Sha1 KeyId Algorithm
6,023,291 UART: [idev] --
6,027,521 UART: [ldev] ++
6,028,109 UART: [ldev] CDI.KEYID = 6
6,029,002 UART: [ldev] SUBJECT.KEYID = 5
6,030,230 UART: [ldev] AUTHORITY.KEYID = 7
6,031,418 UART: [ldev] FE.KEYID = 1
6,071,124 UART: [ldev] Erasing FE.KEYID = 1
8,578,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,314,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,330,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,470 UART: [ldev] --
10,534,919 UART: [fwproc] Wait for Commands...
10,536,311 UART: [fwproc] Recv command 0x46574c44
10,537,729 UART: [fwproc] Recv'd Img size: 118548 bytes
14,017,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,168,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,501,083 UART: [afmc] ++
14,501,693 UART: [afmc] CDI.KEYID = 6
14,502,593 UART: [afmc] SUBJECT.KEYID = 7
14,503,817 UART: [afmc] AUTHORITY.KEYID = 5
17,036,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,866 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,713 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,608 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,698 UART:
193,067 UART: Running Caliptra ROM ...
194,248 UART:
603,735 UART: [state] CFI Enabled
616,901 UART: [state] LifecycleState = Unprovisioned
618,798 UART: [state] DebugLocked = No
620,182 UART: [state] WD Timer not started. Device not locked for debugging
623,284 UART: [kat] SHA2-256
802,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,704 UART: [kat] ++
814,147 UART: [kat] sha1
823,990 UART: [kat] SHA2-256
826,673 UART: [kat] SHA2-384
832,052 UART: [kat] SHA2-512-ACC
834,451 UART: [kat] ECC-384
3,274,865 UART: [kat] HMAC-384Kdf
3,285,996 UART: [kat] LMS
3,762,527 UART: [kat] --
3,766,983 UART: [cold-reset] ++
3,767,920 UART: [fht] FHT @ 0x50003400
3,778,680 UART: [idev] ++
3,779,249 UART: [idev] CDI.KEYID = 6
3,780,264 UART: [idev] SUBJECT.KEYID = 7
3,781,420 UART: [idev] UDS.KEYID = 0
3,795,402 UART: [idev] Erasing UDS.KEYID = 0
6,258,995 UART: [idev] Sha1 KeyId Algorithm
6,282,860 UART: [idev] --
6,286,728 UART: [ldev] ++
6,287,294 UART: [ldev] CDI.KEYID = 6
6,288,199 UART: [ldev] SUBJECT.KEYID = 5
6,289,412 UART: [ldev] AUTHORITY.KEYID = 7
6,290,716 UART: [ldev] FE.KEYID = 1
6,301,939 UART: [ldev] Erasing FE.KEYID = 1
8,780,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,568,702 UART: [ldev] --
10,720,327 UART: [fwproc] Wait for Commands...
10,721,704 UART: [fwproc] Recv command 0x46574c44
10,723,087 UART: [fwproc] Recv'd Img size: 118548 bytes
14,209,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,290,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,181 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,694,603 UART: [afmc] ++
14,695,239 UART: [afmc] CDI.KEYID = 6
14,696,149 UART: [afmc] SUBJECT.KEYID = 7
14,697,368 UART: [afmc] AUTHORITY.KEYID = 5
17,205,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,927,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,929,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,945,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,961,769 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,977,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,001,669 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,869 UART: [state] WD Timer not started. Device not locked for debugging
87,210 UART: [kat] SHA2-256
890,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,864 UART: [kat] ++
895,016 UART: [kat] sha1
899,168 UART: [kat] SHA2-256
901,108 UART: [kat] SHA2-384
903,667 UART: [kat] SHA2-512-ACC
905,568 UART: [kat] ECC-384
915,087 UART: [kat] HMAC-384Kdf
919,757 UART: [kat] LMS
1,168,069 UART: [kat] --
1,168,826 UART: [cold-reset] ++
1,169,274 UART: [fht] FHT @ 0x50003400
1,171,778 UART: [idev] ++
1,171,946 UART: [idev] CDI.KEYID = 6
1,172,307 UART: [idev] SUBJECT.KEYID = 7
1,172,732 UART: [idev] UDS.KEYID = 0
1,180,537 UART: [idev] Erasing UDS.KEYID = 0
1,197,441 UART: [idev] Sha1 KeyId Algorithm
1,206,341 UART: [idev] --
1,207,312 UART: [ldev] ++
1,207,480 UART: [ldev] CDI.KEYID = 6
1,207,844 UART: [ldev] SUBJECT.KEYID = 5
1,208,271 UART: [ldev] AUTHORITY.KEYID = 7
1,208,734 UART: [ldev] FE.KEYID = 1
1,213,936 UART: [ldev] Erasing FE.KEYID = 1
1,240,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,390 UART: [ldev] --
1,279,659 UART: [fwproc] Wait for Commands...
1,280,268 UART: [fwproc] Recv command 0x46574c44
1,281,001 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,465 UART: [afmc] ++
2,824,633 UART: [afmc] CDI.KEYID = 6
2,824,996 UART: [afmc] SUBJECT.KEYID = 7
2,825,422 UART: [afmc] AUTHORITY.KEYID = 5
2,860,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,733 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,324 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,025 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,818 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
900,045 UART: [kat] SHA2-256
901,985 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,746 UART: [kat] HMAC-384Kdf
921,360 UART: [kat] LMS
1,169,672 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,077 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,518 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,237 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,239 UART: [ldev] --
1,282,690 UART: [fwproc] Wait for Commands...
1,283,391 UART: [fwproc] Recv command 0x46574c44
1,284,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,984 UART: [afmc] ++
2,828,152 UART: [afmc] CDI.KEYID = 6
2,828,515 UART: [afmc] SUBJECT.KEYID = 7
2,828,941 UART: [afmc] AUTHORITY.KEYID = 5
2,864,216 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,244 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,835 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,536 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,459 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,545 UART: [kat] HMAC-384Kdf
921,121 UART: [kat] LMS
1,169,433 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,636 UART: [fht] FHT @ 0x50003400
1,173,264 UART: [idev] ++
1,173,432 UART: [idev] CDI.KEYID = 6
1,173,793 UART: [idev] SUBJECT.KEYID = 7
1,174,218 UART: [idev] UDS.KEYID = 0
1,182,315 UART: [idev] Erasing UDS.KEYID = 0
1,199,171 UART: [idev] Sha1 KeyId Algorithm
1,207,953 UART: [idev] --
1,208,910 UART: [ldev] ++
1,209,078 UART: [ldev] CDI.KEYID = 6
1,209,442 UART: [ldev] SUBJECT.KEYID = 5
1,209,869 UART: [ldev] AUTHORITY.KEYID = 7
1,210,332 UART: [ldev] FE.KEYID = 1
1,215,446 UART: [ldev] Erasing FE.KEYID = 1
1,241,591 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,107 UART: [fwproc] Wait for Commands...
1,281,700 UART: [fwproc] Recv command 0x46574c44
1,282,433 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,802 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,645 UART: [afmc] ++
2,826,813 UART: [afmc] CDI.KEYID = 6
2,827,176 UART: [afmc] SUBJECT.KEYID = 7
2,827,602 UART: [afmc] AUTHORITY.KEYID = 5
2,863,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,805 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,515 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,396 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,097 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,896 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,920 UART: [kat] LMS
1,169,232 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,241,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,437 UART: [ldev] --
1,280,792 UART: [fwproc] Wait for Commands...
1,281,567 UART: [fwproc] Recv command 0x46574c44
1,282,300 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,583 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,046 UART: [afmc] ++
2,827,214 UART: [afmc] CDI.KEYID = 6
2,827,577 UART: [afmc] SUBJECT.KEYID = 7
2,828,003 UART: [afmc] AUTHORITY.KEYID = 5
2,863,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,151 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,900 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,192 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,121 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
87,992 UART: [kat] SHA2-256
891,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,646 UART: [kat] ++
895,798 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,449 UART: [kat] SHA2-512-ACC
906,350 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,619 UART: [idev] Sha1 KeyId Algorithm
1,207,391 UART: [idev] --
1,208,312 UART: [ldev] ++
1,208,480 UART: [ldev] CDI.KEYID = 6
1,208,844 UART: [ldev] SUBJECT.KEYID = 5
1,209,271 UART: [ldev] AUTHORITY.KEYID = 7
1,209,734 UART: [ldev] FE.KEYID = 1
1,214,912 UART: [ldev] Erasing FE.KEYID = 1
1,241,477 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,428 UART: [ldev] --
1,280,769 UART: [fwproc] Wait for Commands...
1,281,552 UART: [fwproc] Recv command 0x46574c44
1,282,285 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,008 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,026 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,551 UART: [afmc] ++
2,827,719 UART: [afmc] CDI.KEYID = 6
2,828,082 UART: [afmc] SUBJECT.KEYID = 7
2,828,508 UART: [afmc] AUTHORITY.KEYID = 5
2,864,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,104 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,805 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,668 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,892 UART: [kat] LMS
1,169,204 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,815 UART: [fht] FHT @ 0x50003400
1,173,493 UART: [idev] ++
1,173,661 UART: [idev] CDI.KEYID = 6
1,174,022 UART: [idev] SUBJECT.KEYID = 7
1,174,447 UART: [idev] UDS.KEYID = 0
1,182,768 UART: [idev] Erasing UDS.KEYID = 0
1,199,806 UART: [idev] Sha1 KeyId Algorithm
1,208,840 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,821 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,227 UART: [ldev] --
1,282,642 UART: [fwproc] Wait for Commands...
1,283,457 UART: [fwproc] Recv command 0x46574c44
1,284,190 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,215 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,672 UART: [afmc] ++
2,829,840 UART: [afmc] CDI.KEYID = 6
2,830,203 UART: [afmc] SUBJECT.KEYID = 7
2,830,629 UART: [afmc] AUTHORITY.KEYID = 5
2,866,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,447 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,148 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,995 UART: [afmc] --
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_dice_derivations::test_cold_reset_status_reporting ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
192,018 UART:
192,377 UART: Running Caliptra ROM ...
193,515 UART:
193,669 UART: [state] CFI Enabled
263,981 UART: [state] LifecycleState = Unprovisioned
265,971 UART: [state] DebugLocked = No
267,586 UART: [state] WD Timer not started. Device not locked for debugging
270,976 UART: [kat] SHA2-256
450,604 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,411 UART: [kat] ++
461,950 UART: [kat] sha1
474,208 UART: [kat] SHA2-256
476,930 UART: [kat] SHA2-384
482,352 UART: [kat] SHA2-512-ACC
484,726 UART: [kat] ECC-384
2,945,108 UART: [kat] HMAC-384Kdf
2,969,848 UART: [kat] LMS
3,446,354 UART: [kat] --
3,450,362 UART: [cold-reset] ++
3,452,791 UART: [fht] FHT @ 0x50003400
3,463,721 UART: [idev] ++
3,464,332 UART: [idev] CDI.KEYID = 6
3,465,257 UART: [idev] SUBJECT.KEYID = 7
3,466,514 UART: [idev] UDS.KEYID = 0
3,467,448 ready_for_fw is high
3,467,673 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,605,824 UART: [idev] Erasing UDS.KEYID = 0
5,985,068 UART: [idev] Sha1 KeyId Algorithm
6,008,935 UART: [idev] --
6,014,293 UART: [ldev] ++
6,014,874 UART: [ldev] CDI.KEYID = 6
6,015,796 UART: [ldev] SUBJECT.KEYID = 5
6,017,113 UART: [ldev] AUTHORITY.KEYID = 7
6,018,309 UART: [ldev] FE.KEYID = 1
6,055,694 UART: [ldev] Erasing FE.KEYID = 1
8,563,075 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,920 UART: [ldev] --
10,373,729 UART: [fwproc] Wait for Commands...
10,375,665 UART: [fwproc] Recv command 0x46574c44
10,377,674 UART: [fwproc] Recv'd Img size: 109820 bytes
13,756,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,833,831 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,876,318 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,204,706 >>> mbox cmd response: success
14,209,688 UART: [afmc] ++
14,210,362 UART: [afmc] CDI.KEYID = 6
14,211,258 UART: [afmc] SUBJECT.KEYID = 7
14,212,423 UART: [afmc] AUTHORITY.KEYID = 5
16,749,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,471,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,473,525 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,489,370 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,505,341 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,520,979 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,545,052 UART: [afmc] --
18,549,222 UART: [cold-reset] --
18,553,042 UART: [state] Locking Datavault
18,558,863 UART: [state] Locking PCR0, PCR1 and PCR31
18,560,626 UART: [state] Locking ICCM
18,563,031 UART: [exit] Launching FMC @ 0x40000000
18,571,405 UART:
18,571,655 UART: Running Caliptra FMC ...
18,572,800 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,462,110 ready_for_fw is high
3,462,523 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,100,587 >>> mbox cmd response: success
18,388,977 UART:
18,389,470 UART: Running Caliptra FMC ...
18,390,692 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,533 UART:
192,889 UART: Running Caliptra ROM ...
194,076 UART:
603,892 UART: [state] CFI Enabled
615,788 UART: [state] LifecycleState = Unprovisioned
617,737 UART: [state] DebugLocked = No
619,765 UART: [state] WD Timer not started. Device not locked for debugging
622,858 UART: [kat] SHA2-256
802,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,266 UART: [kat] ++
813,717 UART: [kat] sha1
823,666 UART: [kat] SHA2-256
826,394 UART: [kat] SHA2-384
833,337 UART: [kat] SHA2-512-ACC
835,708 UART: [kat] ECC-384
3,279,687 UART: [kat] HMAC-384Kdf
3,291,971 UART: [kat] LMS
3,768,504 UART: [kat] --
3,774,486 UART: [cold-reset] ++
3,775,704 UART: [fht] FHT @ 0x50003400
3,787,526 UART: [idev] ++
3,788,082 UART: [idev] CDI.KEYID = 6
3,789,038 UART: [idev] SUBJECT.KEYID = 7
3,790,283 UART: [idev] UDS.KEYID = 0
3,791,180 ready_for_fw is high
3,791,406 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,929,417 UART: [idev] Erasing UDS.KEYID = 0
6,267,792 UART: [idev] Sha1 KeyId Algorithm
6,291,188 UART: [idev] --
6,297,715 UART: [ldev] ++
6,298,282 UART: [ldev] CDI.KEYID = 6
6,299,164 UART: [ldev] SUBJECT.KEYID = 5
6,300,436 UART: [ldev] AUTHORITY.KEYID = 7
6,301,738 UART: [ldev] FE.KEYID = 1
6,313,227 UART: [ldev] Erasing FE.KEYID = 1
8,786,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,806 UART: [ldev] --
10,580,717 UART: [fwproc] Wait for Commands...
10,583,516 UART: [fwproc] Recv command 0x46574c44
10,585,558 UART: [fwproc] Recv'd Img size: 109820 bytes
13,962,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,044,665 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,087,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,414,869 >>> mbox cmd response: success
14,418,617 UART: [afmc] ++
14,419,202 UART: [afmc] CDI.KEYID = 6
14,420,226 UART: [afmc] SUBJECT.KEYID = 7
14,421,387 UART: [afmc] AUTHORITY.KEYID = 5
16,922,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,647,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,649,934 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,665,757 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,681,720 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,697,386 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,721,739 UART: [afmc] --
18,726,349 UART: [cold-reset] --
18,730,915 UART: [state] Locking Datavault
18,736,284 UART: [state] Locking PCR0, PCR1 and PCR31
18,737,994 UART: [state] Locking ICCM
18,739,306 UART: [exit] Launching FMC @ 0x40000000
18,747,672 UART:
18,747,916 UART: Running Caliptra FMC ...
18,749,057 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,414 writing to cptra_bootfsm_go
3,778,884 ready_for_fw is high
3,779,275 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,299,064 >>> mbox cmd response: success
18,553,675 UART:
18,554,048 UART: Running Caliptra FMC ...
18,555,324 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,877 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
890,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,852 UART: [kat] ++
895,004 UART: [kat] sha1
899,336 UART: [kat] SHA2-256
901,276 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,679 UART: [kat] HMAC-384Kdf
920,237 UART: [kat] LMS
1,168,549 UART: [kat] --
1,169,424 UART: [cold-reset] ++
1,169,862 UART: [fht] FHT @ 0x50003400
1,172,634 UART: [idev] ++
1,172,802 UART: [idev] CDI.KEYID = 6
1,173,163 UART: [idev] SUBJECT.KEYID = 7
1,173,588 UART: [idev] UDS.KEYID = 0
1,173,934 ready_for_fw is high
1,173,934 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,451 UART: [idev] Sha1 KeyId Algorithm
1,207,147 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,214,884 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,370 UART: [ldev] --
1,279,791 UART: [fwproc] Wait for Commands...
1,280,544 UART: [fwproc] Recv command 0x46574c44
1,281,277 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,463 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,755 >>> mbox cmd response: success
2,712,995 UART: [afmc] ++
2,713,163 UART: [afmc] CDI.KEYID = 6
2,713,526 UART: [afmc] SUBJECT.KEYID = 7
2,713,952 UART: [afmc] AUTHORITY.KEYID = 5
2,749,258 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,023 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,772 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,492 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,385 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,078 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,837 UART: [afmc] --
2,792,834 UART: [cold-reset] --
2,793,646 UART: [state] Locking Datavault
2,794,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,387 UART: [state] Locking ICCM
2,795,847 UART: [exit] Launching FMC @ 0x40000000
2,801,144 UART:
2,801,160 UART: Running Caliptra FMC ...
2,801,568 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,996 ready_for_fw is high
1,058,996 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,944 >>> mbox cmd response: success
2,629,255 UART:
2,629,271 UART: Running Caliptra FMC ...
2,629,679 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,804 UART: [kat] LMS
1,169,116 UART: [kat] --
1,170,015 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 ready_for_fw is high
1,174,607 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,596 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,359 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,824 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,907 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,306 >>> mbox cmd response: success
2,714,464 UART: [afmc] ++
2,714,632 UART: [afmc] CDI.KEYID = 6
2,714,995 UART: [afmc] SUBJECT.KEYID = 7
2,715,421 UART: [afmc] AUTHORITY.KEYID = 5
2,751,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,371 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,091 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,984 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,677 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,458 UART: [afmc] --
2,794,373 UART: [cold-reset] --
2,795,091 UART: [state] Locking Datavault
2,796,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,846 UART: [state] Locking ICCM
2,797,516 UART: [exit] Launching FMC @ 0x40000000
2,802,813 UART:
2,802,829 UART: Running Caliptra FMC ...
2,803,237 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,891 >>> mbox cmd response: success
2,628,968 UART:
2,628,984 UART: Running Caliptra FMC ...
2,629,392 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
891,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,450 UART: [kat] ++
895,602 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,593 UART: [kat] SHA2-512-ACC
906,494 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,933 UART: [kat] LMS
1,169,245 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,598 UART: [fht] FHT @ 0x50003400
1,173,084 UART: [idev] ++
1,173,252 UART: [idev] CDI.KEYID = 6
1,173,613 UART: [idev] SUBJECT.KEYID = 7
1,174,038 UART: [idev] UDS.KEYID = 0
1,174,384 ready_for_fw is high
1,174,384 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,179 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,209,194 UART: [ldev] ++
1,209,362 UART: [ldev] CDI.KEYID = 6
1,209,726 UART: [ldev] SUBJECT.KEYID = 5
1,210,153 UART: [ldev] AUTHORITY.KEYID = 7
1,210,616 UART: [ldev] FE.KEYID = 1
1,215,942 UART: [ldev] Erasing FE.KEYID = 1
1,242,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,218 UART: [ldev] --
1,281,667 UART: [fwproc] Wait for Commands...
1,282,350 UART: [fwproc] Recv command 0x46574c44
1,283,083 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,803 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,197 >>> mbox cmd response: success
2,714,347 UART: [afmc] ++
2,714,515 UART: [afmc] CDI.KEYID = 6
2,714,878 UART: [afmc] SUBJECT.KEYID = 7
2,715,304 UART: [afmc] AUTHORITY.KEYID = 5
2,750,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,272 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,992 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,885 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,578 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,545 UART: [afmc] --
2,794,482 UART: [cold-reset] --
2,795,134 UART: [state] Locking Datavault
2,796,347 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,951 UART: [state] Locking ICCM
2,797,457 UART: [exit] Launching FMC @ 0x40000000
2,802,754 UART:
2,802,770 UART: Running Caliptra FMC ...
2,803,178 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,874 ready_for_fw is high
1,058,874 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,754 >>> mbox cmd response: success
2,627,857 UART:
2,627,873 UART: Running Caliptra FMC ...
2,628,281 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,918 UART: [kat] LMS
1,169,230 UART: [kat] --
1,170,317 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 ready_for_fw is high
1,174,613 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,012 UART: [idev] Sha1 KeyId Algorithm
1,209,026 UART: [idev] --
1,210,063 UART: [ldev] ++
1,210,231 UART: [ldev] CDI.KEYID = 6
1,210,595 UART: [ldev] SUBJECT.KEYID = 5
1,211,022 UART: [ldev] AUTHORITY.KEYID = 7
1,211,485 UART: [ldev] FE.KEYID = 1
1,216,801 UART: [ldev] Erasing FE.KEYID = 1
1,242,964 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,494 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,123 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,061 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,087 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,499 >>> mbox cmd response: success
2,715,679 UART: [afmc] ++
2,715,847 UART: [afmc] CDI.KEYID = 6
2,716,210 UART: [afmc] SUBJECT.KEYID = 7
2,716,636 UART: [afmc] AUTHORITY.KEYID = 5
2,752,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,122 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,842 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,735 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,428 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,223 UART: [afmc] --
2,795,260 UART: [cold-reset] --
2,796,116 UART: [state] Locking Datavault
2,797,261 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,865 UART: [state] Locking ICCM
2,798,357 UART: [exit] Launching FMC @ 0x40000000
2,803,654 UART:
2,803,670 UART: Running Caliptra FMC ...
2,804,078 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,487 ready_for_fw is high
1,059,487 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,167 >>> mbox cmd response: success
2,630,862 UART:
2,630,878 UART: Running Caliptra FMC ...
2,631,286 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,668 UART: [state] LifecycleState = Unprovisioned
85,323 UART: [state] DebugLocked = No
85,971 UART: [state] WD Timer not started. Device not locked for debugging
87,214 UART: [kat] SHA2-256
890,764 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,868 UART: [kat] ++
895,020 UART: [kat] sha1
899,262 UART: [kat] SHA2-256
901,202 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,431 UART: [kat] HMAC-384Kdf
920,013 UART: [kat] LMS
1,168,325 UART: [kat] --
1,169,094 UART: [cold-reset] ++
1,169,600 UART: [fht] FHT @ 0x50003400
1,172,422 UART: [idev] ++
1,172,590 UART: [idev] CDI.KEYID = 6
1,172,951 UART: [idev] SUBJECT.KEYID = 7
1,173,376 UART: [idev] UDS.KEYID = 0
1,173,722 ready_for_fw is high
1,173,722 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,289 UART: [idev] Erasing UDS.KEYID = 0
1,197,749 UART: [idev] Sha1 KeyId Algorithm
1,206,633 UART: [idev] --
1,207,716 UART: [ldev] ++
1,207,884 UART: [ldev] CDI.KEYID = 6
1,208,248 UART: [ldev] SUBJECT.KEYID = 5
1,208,675 UART: [ldev] AUTHORITY.KEYID = 7
1,209,138 UART: [ldev] FE.KEYID = 1
1,214,338 UART: [ldev] Erasing FE.KEYID = 1
1,240,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,778 UART: [ldev] --
1,280,041 UART: [fwproc] Wait for Commands...
1,280,650 UART: [fwproc] Recv command 0x46574c44
1,281,383 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,035 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,399 >>> mbox cmd response: success
2,711,417 UART: [afmc] ++
2,711,585 UART: [afmc] CDI.KEYID = 6
2,711,948 UART: [afmc] SUBJECT.KEYID = 7
2,712,374 UART: [afmc] AUTHORITY.KEYID = 5
2,747,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,764,804 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,770,524 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,417 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,110 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,789,961 UART: [afmc] --
2,790,954 UART: [cold-reset] --
2,791,904 UART: [state] Locking Datavault
2,793,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,667 UART: [state] Locking ICCM
2,794,235 UART: [exit] Launching FMC @ 0x40000000
2,799,532 UART:
2,799,548 UART: Running Caliptra FMC ...
2,799,956 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,954 ready_for_fw is high
1,058,954 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,262 >>> mbox cmd response: success
2,627,977 UART:
2,627,993 UART: Running Caliptra FMC ...
2,628,401 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,739 UART: [kat] SHA2-256
891,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,393 UART: [kat] ++
895,545 UART: [kat] sha1
899,633 UART: [kat] SHA2-256
901,573 UART: [kat] SHA2-384
904,372 UART: [kat] SHA2-512-ACC
906,273 UART: [kat] ECC-384
916,400 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,170,945 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 ready_for_fw is high
1,174,975 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,815 UART: [ldev] --
1,282,138 UART: [fwproc] Wait for Commands...
1,282,877 UART: [fwproc] Recv command 0x46574c44
1,283,610 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,718 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,106 >>> mbox cmd response: success
2,714,196 UART: [afmc] ++
2,714,364 UART: [afmc] CDI.KEYID = 6
2,714,727 UART: [afmc] SUBJECT.KEYID = 7
2,715,153 UART: [afmc] AUTHORITY.KEYID = 5
2,750,525 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,931 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,651 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,544 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,237 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,952 UART: [afmc] --
2,793,903 UART: [cold-reset] --
2,794,667 UART: [state] Locking Datavault
2,795,990 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,594 UART: [state] Locking ICCM
2,797,098 UART: [exit] Launching FMC @ 0x40000000
2,802,395 UART:
2,802,411 UART: Running Caliptra FMC ...
2,802,819 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,249 ready_for_fw is high
1,059,249 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,485 >>> mbox cmd response: success
2,627,876 UART:
2,627,892 UART: Running Caliptra FMC ...
2,628,300 UART:
* TESTCASE PASSED
test test_dice_derivations::test_cold_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
2,227,249 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,372,586 UART:
2,372,990 UART: Running Caliptra ROM ...
2,374,162 UART:
2,374,340 UART: [state] CFI Enabled
2,375,306 UART: [state] LifecycleState = Unprovisioned
2,376,975 UART: [state] DebugLocked = No
2,378,091 UART: [state] WD Timer not started. Device not locked for debugging
2,380,578 UART: [fake-rom-cold-reset] ++
2,381,651 UART: [fht] FHT @ 0x50003400
2,382,651 UART: [fwproc] Wait for Commands...
2,383,940 UART: [fwproc] Recv command 0x46574c44
2,385,479 UART: [fwproc] Recv'd Img size: 114888 bytes
3,896,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,963,035 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,064,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,623,800 >>> mbox cmd response: success
4,629,646 UART: [fake-rom-cold-reset] --
4,633,709 UART: [state] Locking Datavault
4,637,735 UART: [state] Locking PCR0, PCR1 and PCR31
4,639,337 UART: [state] Locking ICCM
4,641,087 UART: [exit] Launching FMC @ 0x40000000
4,649,431 UART:
4,649,688 UART: Running Caliptra FMC ...
4,650,751 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,238,548 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,383,696 UART:
2,384,183 UART: Running Caliptra ROM ...
2,385,278 UART:
2,385,440 UART: [state] CFI Enabled
2,386,360 UART: [state] LifecycleState = Unprovisioned
2,388,027 UART: [state] DebugLocked = No
2,389,064 UART: [state] WD Timer not started. Device not locked for debugging
2,391,544 UART: [fake-rom-cold-reset] ++
2,392,579 UART: [fht] FHT @ 0x50003400
2,393,555 UART: [fwproc] Wait for Commands...
2,394,848 UART: [fwproc] Recv command 0x46574c44
2,396,196 UART: [fwproc] Recv'd Img size: 114888 bytes
3,897,124 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,962,486 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,623,062 >>> mbox cmd response: success
4,628,898 UART: [fake-rom-cold-reset] --
4,632,627 UART: [state] Locking Datavault
4,637,909 UART: [state] Locking PCR0, PCR1 and PCR31
4,639,534 UART: [state] Locking ICCM
4,641,419 UART: [exit] Launching FMC @ 0x40000000
4,649,822 UART:
4,650,080 UART: Running Caliptra FMC ...
4,651,229 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
46 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
2,233,533 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,378,960 UART:
2,379,374 UART: Running Caliptra ROM ...
2,380,547 UART:
2,380,722 UART: [state] CFI Enabled
2,381,684 UART: [state] LifecycleState = Unprovisioned
2,383,348 UART: [state] DebugLocked = No
2,384,454 UART: [state] WD Timer not started. Device not locked for debugging
2,386,938 UART: [fake-rom-cold-reset] ++
2,388,046 UART: [fht] FHT @ 0x50003400
2,389,100 UART: [fwproc] Wait for Commands...
2,390,384 UART: [fwproc] Recv command 0x46574c44
2,391,817 UART: [fwproc] Recv'd Img size: 114888 bytes
3,888,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,958,287 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,059,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,619,189 >>> mbox cmd response: success
4,625,023 UART: [fake-rom-cold-reset] --
4,627,467 UART: [state] Locking Datavault
4,633,686 UART: [state] Locking PCR0, PCR1 and PCR31
4,635,299 UART: [state] Locking ICCM
4,636,465 UART: [exit] Launching FMC @ 0x40000000
4,644,816 UART:
4,645,072 UART: Running Caliptra FMC ...
4,646,219 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
2,238,579 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,383,872 UART:
2,384,281 UART: Running Caliptra ROM ...
2,385,453 UART:
2,385,623 UART: [state] CFI Enabled
2,386,494 UART: [state] LifecycleState = Unprovisioned
2,388,149 UART: [state] DebugLocked = No
2,389,173 UART: [state] WD Timer not started. Device not locked for debugging
2,391,641 UART: [fake-rom-cold-reset] ++
2,392,691 UART: [fht] FHT @ 0x50003400
2,393,638 UART: [fwproc] Wait for Commands...
2,394,926 UART: [fwproc] Recv command 0x46574c44
2,396,360 UART: [fwproc] Recv'd Img size: 114888 bytes
3,894,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,962,164 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,622,459 >>> mbox cmd response: success
4,628,285 UART: [fake-rom-cold-reset] --
4,632,498 UART: [state] Locking Datavault
4,637,817 UART: [state] Locking PCR0, PCR1 and PCR31
4,639,426 UART: [state] Locking ICCM
4,641,787 UART: [exit] Launching FMC @ 0x40000000
4,650,128 UART:
4,650,393 UART: Running Caliptra FMC ...
4,651,537 UART:
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [fake-rom-cold-reset] ++
88,824 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,896 UART: [fht] FHT @ 0x50003400
92,183 UART: [fwproc] Wait for Commands...
92,872 UART: [fwproc] Recv command 0x46574c44
93,600 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,090 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,018 >>> mbox cmd response: success
1,586,176 UART: [fake-rom-cold-reset] --
1,586,970 UART: [state] Locking Datavault
1,588,137 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,741 UART: [state] Locking ICCM
1,589,335 UART: [exit] Launching FMC @ 0x40000000
1,594,632 UART:
1,594,648 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,033 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [fake-rom-cold-reset] ++
88,962 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,084 UART: [fht] FHT @ 0x50003400
92,467 UART: [fwproc] Wait for Commands...
93,226 UART: [fwproc] Recv command 0x46574c44
93,954 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,792 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,474 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,648 >>> mbox cmd response: success
1,585,806 UART: [fake-rom-cold-reset] --
1,586,620 UART: [state] Locking Datavault
1,587,827 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,431 UART: [state] Locking ICCM
1,589,105 UART: [exit] Launching FMC @ 0x40000000
1,594,402 UART:
1,594,418 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [fake-rom-cold-reset] ++
89,175 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,395 UART: [fht] FHT @ 0x50003400
92,656 UART: [fwproc] Wait for Commands...
93,289 UART: [fwproc] Recv command 0x46574c44
94,017 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,025 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,707 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,053 >>> mbox cmd response: success
1,586,211 UART: [fake-rom-cold-reset] --
1,586,783 UART: [state] Locking Datavault
1,587,866 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,470 UART: [state] Locking ICCM
1,588,950 UART: [exit] Launching FMC @ 0x40000000
1,594,247 UART:
1,594,263 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,997 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [fake-rom-cold-reset] ++
89,343 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,667 UART: [fht] FHT @ 0x50003400
92,912 UART: [fwproc] Wait for Commands...
93,607 UART: [fwproc] Recv command 0x46574c44
94,335 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,706 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,103 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,935 >>> mbox cmd response: success
1,587,093 UART: [fake-rom-cold-reset] --
1,587,945 UART: [state] Locking Datavault
1,589,420 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,024 UART: [state] Locking ICCM
1,590,620 UART: [exit] Launching FMC @ 0x40000000
1,595,917 UART:
1,595,933 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,378 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
88,032 UART: [fake-rom-cold-reset] ++
88,960 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,040 UART: [fht] FHT @ 0x50003400
92,467 UART: [fwproc] Wait for Commands...
93,292 UART: [fwproc] Recv command 0x46574c44
94,020 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,667 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,342 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,024 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,202 >>> mbox cmd response: success
1,586,360 UART: [fake-rom-cold-reset] --
1,587,160 UART: [state] Locking Datavault
1,588,377 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,981 UART: [state] Locking ICCM
1,589,483 UART: [exit] Launching FMC @ 0x40000000
1,594,780 UART:
1,594,796 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
88,064 UART: [fake-rom-cold-reset] ++
88,992 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,148 UART: [fht] FHT @ 0x50003400
92,477 UART: [fwproc] Wait for Commands...
93,076 UART: [fwproc] Recv command 0x46574c44
93,804 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,844 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,700 >>> mbox cmd response: success
1,586,858 UART: [fake-rom-cold-reset] --
1,587,484 UART: [state] Locking Datavault
1,588,731 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,335 UART: [state] Locking ICCM
1,589,975 UART: [exit] Launching FMC @ 0x40000000
1,595,272 UART:
1,595,288 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,931 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [fake-rom-cold-reset] ++
89,249 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,499 UART: [fht] FHT @ 0x50003400
92,806 UART: [fwproc] Wait for Commands...
93,549 UART: [fwproc] Recv command 0x46574c44
94,277 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,531 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,559 >>> mbox cmd response: success
1,587,717 UART: [fake-rom-cold-reset] --
1,588,643 UART: [state] Locking Datavault
1,589,784 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,388 UART: [state] Locking ICCM
1,590,948 UART: [exit] Launching FMC @ 0x40000000
1,596,245 UART:
1,596,261 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [fake-rom-cold-reset] ++
89,037 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,237 UART: [fht] FHT @ 0x50003400
92,460 UART: [fwproc] Wait for Commands...
93,057 UART: [fwproc] Recv command 0x46574c44
93,785 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,359 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,445 >>> mbox cmd response: success
1,586,603 UART: [fake-rom-cold-reset] --
1,587,395 UART: [state] Locking Datavault
1,588,388 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,992 UART: [state] Locking ICCM
1,589,490 UART: [exit] Launching FMC @ 0x40000000
1,594,787 UART:
1,594,803 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,182 UART: [state] WD Timer not started. Device not locked for debugging
87,486 UART: [fake-rom-cold-reset] ++
88,414 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,662 UART: [fht] FHT @ 0x50003400
91,943 UART: [fwproc] Wait for Commands...
92,738 UART: [fwproc] Recv command 0x46574c44
93,466 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,656 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,494 >>> mbox cmd response: success
1,587,652 UART: [fake-rom-cold-reset] --
1,588,422 UART: [state] Locking Datavault
1,589,629 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,233 UART: [state] Locking ICCM
1,590,659 UART: [exit] Launching FMC @ 0x40000000
1,595,956 UART:
1,595,972 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,119 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [fake-rom-cold-reset] ++
89,036 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,242 UART: [fht] FHT @ 0x50003400
92,555 UART: [fwproc] Wait for Commands...
93,360 UART: [fwproc] Recv command 0x46574c44
94,088 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,432 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,114 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,408 >>> mbox cmd response: success
1,586,566 UART: [fake-rom-cold-reset] --
1,587,614 UART: [state] Locking Datavault
1,588,611 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,215 UART: [state] Locking ICCM
1,589,657 UART: [exit] Launching FMC @ 0x40000000
1,594,954 UART:
1,594,970 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [fake-rom-cold-reset] ++
88,937 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,143 UART: [fht] FHT @ 0x50003400
92,378 UART: [fwproc] Wait for Commands...
93,035 UART: [fwproc] Recv command 0x46574c44
93,763 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,421,111 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,793 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,587,037 >>> mbox cmd response: success
1,588,195 UART: [fake-rom-cold-reset] --
1,588,999 UART: [state] Locking Datavault
1,590,220 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,824 UART: [state] Locking ICCM
1,591,408 UART: [exit] Launching FMC @ 0x40000000
1,596,705 UART:
1,596,721 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [fake-rom-cold-reset] ++
89,041 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,243 UART: [fht] FHT @ 0x50003400
92,466 UART: [fwproc] Wait for Commands...
93,245 UART: [fwproc] Recv command 0x46574c44
93,973 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,477 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,405 >>> mbox cmd response: success
1,586,563 UART: [fake-rom-cold-reset] --
1,587,303 UART: [state] Locking Datavault
1,588,340 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,944 UART: [state] Locking ICCM
1,589,516 UART: [exit] Launching FMC @ 0x40000000
1,594,813 UART:
1,594,829 UART: Running Caliptra FMCtest test_fake_rom::test_fake_rom_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,110 UART:
192,485 UART: Running Caliptra ROM ...
193,674 UART:
193,835 UART: [state] CFI Enabled
263,924 UART: [state] LifecycleState = Production
265,569 UART: [state] DebugLocked = No
267,549 UART: [state] WD Timer not started. Device not locked for debugging
272,509 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
191,965 UART:
192,313 UART: Running Caliptra ROM ...
193,497 UART:
193,653 UART: [state] CFI Enabled
266,029 UART: [state] LifecycleState = Production
267,683 UART: [state] DebugLocked = No
268,957 UART: [state] WD Timer not started. Device not locked for debugging
273,568 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
192,474 UART:
192,855 UART: Running Caliptra ROM ...
194,057 UART:
603,307 UART: [state] CFI Enabled
616,657 UART: [state] LifecycleState = Production
618,268 UART: [state] DebugLocked = No
620,564 UART: [state] WD Timer not started. Device not locked for debugging
624,527 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,606 writing to cptra_bootfsm_go
192,719 UART:
193,090 UART: Running Caliptra ROM ...
194,297 UART:
603,868 UART: [state] CFI Enabled
618,344 UART: [state] LifecycleState = Production
619,931 UART: [state] DebugLocked = No
621,461 UART: [state] WD Timer not started. Device not locked for debugging
626,982 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Production
85,879 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Production
85,617 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Production
85,672 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Production
85,684 UART: [state] DebugLocked = No
86,239 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Production
85,699 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Production
86,005 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Production
85,984 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Production
85,702 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Production
85,611 UART: [state] DebugLocked = No
86,126 UART: [state] WD Timer not started. Device not locked for debugging
87,479 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Production
85,603 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Production
86,244 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
88,356 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Production
85,864 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,976 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_production_enabled ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,058 UART:
192,453 UART: Running Caliptra ROM ...
193,656 UART:
193,817 UART: [state] CFI Enabled
263,794 UART: [state] LifecycleState = Production
265,492 UART: Fake ROM in Prod lifecycle disabled
267,003 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,054 UART:
192,445 UART: Running Caliptra ROM ...
193,657 UART:
193,819 UART: [state] CFI Enabled
265,853 UART: [state] LifecycleState = Production
267,474 UART: Fake ROM in Prod lifecycle disabled
268,979 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,447 UART:
192,846 UART: Running Caliptra ROM ...
194,034 UART:
603,511 UART: [state] CFI Enabled
619,866 UART: [state] LifecycleState = Production
621,503 UART: Fake ROM in Prod lifecycle disabled
623,001 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,410 UART:
192,786 UART: Running Caliptra ROM ...
193,985 UART:
603,254 UART: [state] CFI Enabled
616,778 UART: [state] LifecycleState = Production
618,406 UART: Fake ROM in Prod lifecycle disabled
619,914 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,778 UART: [state] LifecycleState = Production
85,386 UART: Fake ROM in Prod lifecycle disabled
85,980 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Production
85,578 UART: Fake ROM in Prod lifecycle disabled
86,172 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Production
85,749 UART: Fake ROM in Prod lifecycle disabled
86,343 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Production
86,215 UART: Fake ROM in Prod lifecycle disabled
86,809 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,648 UART: [state] LifecycleState = Production
85,256 UART: Fake ROM in Prod lifecycle disabled
85,850 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Production
86,158 UART: Fake ROM in Prod lifecycle disabled
86,752 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Production
85,691 UART: Fake ROM in Prod lifecycle disabled
86,285 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Production
86,237 UART: Fake ROM in Prod lifecycle disabled
86,831 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Production
85,472 UART: Fake ROM in Prod lifecycle disabled
86,066 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Production
85,506 UART: Fake ROM in Prod lifecycle disabled
86,100 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,761 UART: [state] LifecycleState = Production
86,369 UART: Fake ROM in Prod lifecycle disabled
86,963 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Production
85,955 UART: Fake ROM in Prod lifecycle disabled
86,549 UART: ROM Fatal Error: 0x0105000B
test test_fake_rom::test_fake_rom_production_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
2,225,099 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,370,226 UART:
2,370,621 UART: Running Caliptra ROM ...
2,371,708 UART:
2,371,871 UART: [state] CFI Enabled
2,372,841 UART: [state] LifecycleState = Unprovisioned
2,374,507 UART: [state] DebugLocked = No
2,375,562 UART: [state] WD Timer not started. Device not locked for debugging
2,378,036 UART: [fake-rom-cold-reset] ++
2,379,073 UART: [fht] FHT @ 0x50003400
2,380,063 UART: [fwproc] Wait for Commands...
2,381,356 UART: [fwproc] Recv command 0x46574c44
2,382,715 UART: [fwproc] Recv'd Img size: 114888 bytes
3,879,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,948,779 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,049,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,608,893 >>> mbox cmd response: success
4,614,724 UART: [fake-rom-cold-reset] --
4,616,892 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,761,324 UART: [state] Locking Datavault
4,762,576 UART: [state] Locking PCR0, PCR1 and PCR31
4,764,052 UART: [state] Locking ICCM
4,764,936 UART: [exit] Launching FMC @ 0x40000000
4,766,398 UART:
4,766,570 UART: Running Caliptra FMC ...
4,767,687 UART:
4,767,858 UART: [fmc] Received command: 0x46574C44
4,769,324 UART:
4,769,488 UART: Running Caliptra ROM ...
4,770,509 UART:
4,770,659 UART: [state] CFI Enabled
4,830,159 UART: [state] LifecycleState = Unprovisioned
4,831,887 UART: [state] DebugLocked = No
4,833,320 UART: [state] WD Timer not started. Device not locked for debugging
4,837,656 UART: [update-reset] ++
6,367,479 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,369,832 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,986,618 UART: [update-reset] Copying MAN_2 To MAN_1
7,008,814 UART: [update-reset Success] --
7,010,163 >>> mbox cmd response: success
7,010,404 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,011,648 UART: [state] Locking Datavault
7,015,403 UART: [state] Locking PCR0, PCR1 and PCR31
7,016,951 UART: [state] Locking ICCM
7,019,027 UART: [exit] Launching FMC @ 0x40000000
7,027,377 UART:
7,027,619 UART: Running Caliptra FMC ...
7,028,651 UART:
7,028,810 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,030,458 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
2,226,372 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,372,284 UART:
2,372,702 UART: Running Caliptra ROM ...
2,373,879 UART:
2,374,059 UART: [state] CFI Enabled
2,375,029 UART: [state] LifecycleState = Unprovisioned
2,376,688 UART: [state] DebugLocked = No
2,377,797 UART: [state] WD Timer not started. Device not locked for debugging
2,380,287 UART: [fake-rom-cold-reset] ++
2,381,402 UART: [fht] FHT @ 0x50003400
2,382,439 UART: [fwproc] Wait for Commands...
2,383,730 UART: [fwproc] Recv command 0x46574c44
2,385,163 UART: [fwproc] Recv'd Img size: 114888 bytes
3,887,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,962,213 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,063,345 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,622,601 >>> mbox cmd response: success
4,628,461 UART: [fake-rom-cold-reset] --
4,630,911 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,775,472 UART: [state] Locking Datavault
4,776,729 UART: [state] Locking PCR0, PCR1 and PCR31
4,778,294 UART: [state] Locking ICCM
4,779,218 UART: [exit] Launching FMC @ 0x40000000
4,780,663 UART:
4,780,839 UART: Running Caliptra FMC ...
4,781,947 UART:
4,782,114 UART: [fmc] Received command: 0x46574C44
4,783,592 UART:
4,783,756 UART: Running Caliptra ROM ...
4,784,786 UART:
4,784,937 UART: [state] CFI Enabled
4,843,608 UART: [state] LifecycleState = Unprovisioned
4,845,378 UART: [state] DebugLocked = No
4,847,390 UART: [state] WD Timer not started. Device not locked for debugging
4,852,594 UART: [update-reset] ++
6,386,448 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,390,499 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,008,300 UART: [update-reset] Copying MAN_2 To MAN_1
7,030,556 UART: [update-reset Success] --
7,031,866 >>> mbox cmd response: success
7,032,096 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
7,035,186 UART: [state] Locking Datavault
7,037,800 UART: [state] Locking PCR0, PCR1 and PCR31
7,039,362 UART: [state] Locking ICCM
7,041,252 UART: [exit] Launching FMC @ 0x40000000
7,049,660 UART:
7,049,905 UART: Running Caliptra FMC ...
7,051,037 UART:
7,051,206 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,052,856 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,244,371 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,389,709 UART:
2,390,134 UART: Running Caliptra ROM ...
2,391,429 UART:
2,391,598 UART: [state] CFI Enabled
2,392,518 UART: [state] LifecycleState = Unprovisioned
2,394,175 UART: [state] DebugLocked = No
2,395,294 UART: [state] WD Timer not started. Device not locked for debugging
2,397,770 UART: [fake-rom-cold-reset] ++
2,398,879 UART: [fht] FHT @ 0x50003400
2,399,853 UART: [fwproc] Wait for Commands...
2,401,133 UART: [fwproc] Recv command 0x46574c44
2,402,556 UART: [fwproc] Recv'd Img size: 114888 bytes
3,895,853 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,965,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,066,471 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,625,802 >>> mbox cmd response: success
4,631,631 UART: [fake-rom-cold-reset] --
4,634,101 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,778,411 UART: [state] Locking Datavault
4,779,646 UART: [state] Locking PCR0, PCR1 and PCR31
4,781,139 UART: [state] Locking ICCM
4,782,016 UART: [exit] Launching FMC @ 0x40000000
4,783,448 UART:
4,783,608 UART: Running Caliptra FMC ...
4,784,618 UART:
4,784,759 UART: [fmc] Received command: 0x46574C44
4,786,227 UART:
4,786,379 UART: Running Caliptra ROM ...
4,787,393 UART:
4,787,541 UART: [state] CFI Enabled
4,793,293 UART: [state] LifecycleState = Unprovisioned
4,795,009 UART: [state] DebugLocked = No
4,796,902 UART: [state] WD Timer not started. Device not locked for debugging
4,803,495 UART: [update-reset] ++
6,334,973 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,337,863 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,955,673 UART: [update-reset] Copying MAN_2 To MAN_1
6,977,877 UART: [update-reset Success] --
6,979,161 >>> mbox cmd response: success
6,979,378 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,982,984 UART: [state] Locking Datavault
6,986,355 UART: [state] Locking PCR0, PCR1 and PCR31
6,987,927 UART: [state] Locking ICCM
6,988,842 UART: [exit] Launching FMC @ 0x40000000
6,997,075 UART:
6,997,315 UART: Running Caliptra FMC ...
6,998,413 UART:
6,998,574 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
7,000,209 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
2,231,454 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,376,746 UART:
2,377,163 UART: Running Caliptra ROM ...
2,378,241 UART:
2,378,393 UART: [state] CFI Enabled
2,379,355 UART: [state] LifecycleState = Unprovisioned
2,381,012 UART: [state] DebugLocked = No
2,382,045 UART: [state] WD Timer not started. Device not locked for debugging
2,384,508 UART: [fake-rom-cold-reset] ++
2,385,535 UART: [fht] FHT @ 0x50003400
2,386,514 UART: [fwproc] Wait for Commands...
2,387,797 UART: [fwproc] Recv command 0x46574c44
2,389,138 UART: [fwproc] Recv'd Img size: 114888 bytes
3,888,772 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,961,041 UART: [fwproc] Load FMC at address 0x40000000 len 16384
4,062,190 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
4,621,339 >>> mbox cmd response: success
4,627,209 UART: [fake-rom-cold-reset] --
4,629,338 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
4,773,716 UART: [state] Locking Datavault
4,774,947 UART: [state] Locking PCR0, PCR1 and PCR31
4,776,499 UART: [state] Locking ICCM
4,777,407 UART: [exit] Launching FMC @ 0x40000000
4,778,830 UART:
4,778,993 UART: Running Caliptra FMC ...
4,780,094 UART:
4,780,250 UART: [fmc] Received command: 0x46574C44
4,781,715 UART:
4,781,871 UART: Running Caliptra ROM ...
4,782,966 UART:
4,783,120 UART: [state] CFI Enabled
4,792,048 UART: [state] LifecycleState = Unprovisioned
4,793,717 UART: [state] DebugLocked = No
4,795,904 UART: [state] WD Timer not started. Device not locked for debugging
4,801,472 UART: [update-reset] ++
6,327,607 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,330,876 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,948,677 UART: [update-reset] Copying MAN_2 To MAN_1
6,970,904 UART: [update-reset Success] --
6,972,199 >>> mbox cmd response: success
6,972,420 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
6,975,376 UART: [state] Locking Datavault
6,979,063 UART: [state] Locking PCR0, PCR1 and PCR31
6,980,657 UART: [state] Locking ICCM
6,981,777 UART: [exit] Launching FMC @ 0x40000000
6,990,125 UART:
6,990,364 UART: Running Caliptra FMC ...
6,991,486 UART:
6,991,646 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
6,993,276 >>> mbox cmd response: success
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [fake-rom-cold-reset] ++
88,618 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,914 UART: [fht] FHT @ 0x50003400
92,131 UART: [fwproc] Wait for Commands...
92,912 UART: [fwproc] Recv command 0x46574c44
93,640 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,520 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,496 >>> mbox cmd response: success
1,585,654 UART: [fake-rom-cold-reset] --
1,586,049 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,604 UART: [state] Locking Datavault
1,587,721 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,325 UART: [state] Locking ICCM
1,588,941 UART: [exit] Launching FMC @ 0x40000000
1,594,238 UART:
1,594,254 UART: Running Caliptra FMC ...
1,594,662 UART:
1,594,803 UART: [fmc] Received command: 0x46574C44
1,595,627 UART:
1,595,643 UART: Running Caliptra ROM ...
1,596,051 UART:
1,596,106 UART: [state] CFI Enabled
1,598,782 UART: [state] LifecycleState = Unprovisioned
1,599,441 UART: [state] DebugLocked = No
1,599,926 UART: [state] WD Timer not started. Device not locked for debugging
1,601,664 UART: [update-reset] ++
2,914,423 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,557 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,162 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,176 UART: [update-reset Success] --
3,076,585 >>> mbox cmd response: success
3,076,585 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,086 UART: [state] Locking Datavault
3,077,682 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,286 UART: [state] Locking ICCM
3,078,770 UART: [exit] Launching FMC @ 0x40000000
3,084,067 UART:
3,084,083 UART: Running Caliptra FMC ...
3,084,491 UART:
3,084,632 UART: [fmc] Received command: 0x1000000C
3,085,367 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,204 UART: [fake-rom-cold-reset] ++
89,132 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,210 UART: [fht] FHT @ 0x50003400
92,475 UART: [fwproc] Wait for Commands...
93,318 UART: [fwproc] Recv command 0x46574c44
94,046 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,276 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,958 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,280 >>> mbox cmd response: success
1,586,438 UART: [fake-rom-cold-reset] --
1,586,833 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,162 UART: [state] Locking Datavault
1,588,229 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,833 UART: [state] Locking ICCM
1,589,387 UART: [exit] Launching FMC @ 0x40000000
1,594,684 UART:
1,594,700 UART: Running Caliptra FMC ...
1,595,108 UART:
1,595,249 UART: [fmc] Received command: 0x46574C44
1,596,073 UART:
1,596,089 UART: Running Caliptra ROM ...
1,596,497 UART:
1,596,552 UART: [state] CFI Enabled
1,599,238 UART: [state] LifecycleState = Unprovisioned
1,599,897 UART: [state] DebugLocked = No
1,600,528 UART: [state] WD Timer not started. Device not locked for debugging
1,602,016 UART: [update-reset] ++
2,914,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,799 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,580 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,594 UART: [update-reset Success] --
3,077,003 >>> mbox cmd response: success
3,077,003 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,588 UART: [state] Locking Datavault
3,078,178 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,782 UART: [state] Locking ICCM
3,079,240 UART: [exit] Launching FMC @ 0x40000000
3,084,537 UART:
3,084,553 UART: Running Caliptra FMC ...
3,084,961 UART:
3,085,102 UART: [fmc] Received command: 0x1000000C
3,085,837 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [fake-rom-cold-reset] ++
88,693 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,001 UART: [fht] FHT @ 0x50003400
92,232 UART: [fwproc] Wait for Commands...
92,849 UART: [fwproc] Recv command 0x46574c44
93,577 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,673 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,355 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,667 >>> mbox cmd response: success
1,586,825 UART: [fake-rom-cold-reset] --
1,587,220 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,837 UART: [state] Locking Datavault
1,588,892 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,496 UART: [state] Locking ICCM
1,590,142 UART: [exit] Launching FMC @ 0x40000000
1,595,439 UART:
1,595,455 UART: Running Caliptra FMC ...
1,595,863 UART:
1,596,004 UART: [fmc] Received command: 0x46574C44
1,596,828 UART:
1,596,844 UART: Running Caliptra ROM ...
1,597,252 UART:
1,597,394 UART: [state] CFI Enabled
1,600,086 UART: [state] LifecycleState = Unprovisioned
1,600,745 UART: [state] DebugLocked = No
1,601,314 UART: [state] WD Timer not started. Device not locked for debugging
1,602,724 UART: [update-reset] ++
2,914,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,801 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,598 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,612 UART: [update-reset Success] --
3,077,021 >>> mbox cmd response: success
3,077,021 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,592 UART: [state] Locking Datavault
3,078,276 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,880 UART: [state] Locking ICCM
3,079,528 UART: [exit] Launching FMC @ 0x40000000
3,084,825 UART:
3,084,841 UART: Running Caliptra FMC ...
3,085,249 UART:
3,085,390 UART: [fmc] Received command: 0x1000000C
3,086,125 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [fake-rom-cold-reset] ++
89,079 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,397 UART: [fht] FHT @ 0x50003400
92,768 UART: [fwproc] Wait for Commands...
93,377 UART: [fwproc] Recv command 0x46574c44
94,105 UART: [fwproc] Recv'd Img size: 114888 bytes
1,393,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,053 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,085 >>> mbox cmd response: success
1,587,243 UART: [fake-rom-cold-reset] --
1,587,638 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,153 UART: [state] Locking Datavault
1,589,336 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,940 UART: [state] Locking ICCM
1,590,500 UART: [exit] Launching FMC @ 0x40000000
1,595,797 UART:
1,595,813 UART: Running Caliptra FMC ...
1,596,221 UART:
1,596,362 UART: [fmc] Received command: 0x46574C44
1,597,186 UART:
1,597,202 UART: Running Caliptra ROM ...
1,597,610 UART:
1,597,752 UART: [state] CFI Enabled
1,600,264 UART: [state] LifecycleState = Unprovisioned
1,600,923 UART: [state] DebugLocked = No
1,601,634 UART: [state] WD Timer not started. Device not locked for debugging
1,603,180 UART: [update-reset] ++
2,916,025 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,756 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,770 UART: [update-reset Success] --
3,078,179 >>> mbox cmd response: success
3,078,179 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,900 UART: [state] Locking Datavault
3,079,716 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,320 UART: [state] Locking ICCM
3,080,826 UART: [exit] Launching FMC @ 0x40000000
3,086,123 UART:
3,086,139 UART: Running Caliptra FMC ...
3,086,547 UART:
3,086,688 UART: [fmc] Received command: 0x1000000C
3,087,423 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [fake-rom-cold-reset] ++
88,750 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,862 UART: [fht] FHT @ 0x50003400
92,237 UART: [fwproc] Wait for Commands...
92,994 UART: [fwproc] Recv command 0x46574c44
93,722 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,173 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,494 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,376 >>> mbox cmd response: success
1,586,534 UART: [fake-rom-cold-reset] --
1,586,929 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,408 UART: [state] Locking Datavault
1,588,423 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,027 UART: [state] Locking ICCM
1,589,663 UART: [exit] Launching FMC @ 0x40000000
1,594,960 UART:
1,594,976 UART: Running Caliptra FMC ...
1,595,384 UART:
1,595,525 UART: [fmc] Received command: 0x46574C44
1,596,349 UART:
1,596,365 UART: Running Caliptra ROM ...
1,596,773 UART:
1,596,828 UART: [state] CFI Enabled
1,599,410 UART: [state] LifecycleState = Unprovisioned
1,600,069 UART: [state] DebugLocked = No
1,600,622 UART: [state] WD Timer not started. Device not locked for debugging
1,602,140 UART: [update-reset] ++
2,915,327 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,459 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,218 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,232 UART: [update-reset Success] --
3,077,641 >>> mbox cmd response: success
3,077,641 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,470 UART: [state] Locking Datavault
3,079,322 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,926 UART: [state] Locking ICCM
3,080,528 UART: [exit] Launching FMC @ 0x40000000
3,085,825 UART:
3,085,841 UART: Running Caliptra FMC ...
3,086,249 UART:
3,086,390 UART: [fmc] Received command: 0x1000000C
3,087,125 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,367 UART: [state] DebugLocked = No
86,078 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [fake-rom-cold-reset] ++
88,364 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,526 UART: [fht] FHT @ 0x50003400
91,765 UART: [fwproc] Wait for Commands...
92,476 UART: [fwproc] Recv command 0x46574c44
93,204 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,899 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,294 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,443,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,336 >>> mbox cmd response: success
1,585,494 UART: [fake-rom-cold-reset] --
1,585,889 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,304 UART: [state] Locking Datavault
1,587,509 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,113 UART: [state] Locking ICCM
1,588,563 UART: [exit] Launching FMC @ 0x40000000
1,593,860 UART:
1,593,876 UART: Running Caliptra FMC ...
1,594,284 UART:
1,594,425 UART: [fmc] Received command: 0x46574C44
1,595,249 UART:
1,595,265 UART: Running Caliptra ROM ...
1,595,673 UART:
1,595,728 UART: [state] CFI Enabled
1,598,342 UART: [state] LifecycleState = Unprovisioned
1,599,001 UART: [state] DebugLocked = No
1,599,556 UART: [state] WD Timer not started. Device not locked for debugging
1,601,206 UART: [update-reset] ++
2,913,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,914,803 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,554 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,568 UART: [update-reset Success] --
3,075,977 >>> mbox cmd response: success
3,075,977 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,076,554 UART: [state] Locking Datavault
3,077,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,077,914 UART: [state] Locking ICCM
3,078,444 UART: [exit] Launching FMC @ 0x40000000
3,083,741 UART:
3,083,757 UART: Running Caliptra FMC ...
3,084,165 UART:
3,084,306 UART: [fmc] Received command: 0x1000000C
3,085,041 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,863 UART: [fake-rom-cold-reset] ++
88,791 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,889 UART: [fht] FHT @ 0x50003400
92,116 UART: [fwproc] Wait for Commands...
92,711 UART: [fwproc] Recv command 0x46574c44
93,439 UART: [fwproc] Recv'd Img size: 114888 bytes
1,391,676 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,418,327 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,584,225 >>> mbox cmd response: success
1,585,383 UART: [fake-rom-cold-reset] --
1,585,778 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,586,145 UART: [state] Locking Datavault
1,587,460 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,064 UART: [state] Locking ICCM
1,588,646 UART: [exit] Launching FMC @ 0x40000000
1,593,943 UART:
1,593,959 UART: Running Caliptra FMC ...
1,594,367 UART:
1,594,508 UART: [fmc] Received command: 0x46574C44
1,595,332 UART:
1,595,348 UART: Running Caliptra ROM ...
1,595,756 UART:
1,595,898 UART: [state] CFI Enabled
1,598,530 UART: [state] LifecycleState = Unprovisioned
1,599,189 UART: [state] DebugLocked = No
1,599,802 UART: [state] WD Timer not started. Device not locked for debugging
1,601,344 UART: [update-reset] ++
2,914,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,183 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,067,756 UART: [update-reset] Copying MAN_2 To MAN_1
3,075,770 UART: [update-reset Success] --
3,076,179 >>> mbox cmd response: success
3,076,179 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,076,810 UART: [state] Locking Datavault
3,077,792 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,396 UART: [state] Locking ICCM
3,078,884 UART: [exit] Launching FMC @ 0x40000000
3,084,181 UART:
3,084,197 UART: Running Caliptra FMC ...
3,084,605 UART:
3,084,746 UART: [fmc] Received command: 0x1000000C
3,085,481 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [fake-rom-cold-reset] ++
88,999 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,121 UART: [fht] FHT @ 0x50003400
92,578 UART: [fwproc] Wait for Commands...
93,293 UART: [fwproc] Recv command 0x46574c44
94,021 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,615 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,297 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,515 >>> mbox cmd response: success
1,586,673 UART: [fake-rom-cold-reset] --
1,587,068 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,633 UART: [state] Locking Datavault
1,588,596 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,200 UART: [state] Locking ICCM
1,589,640 UART: [exit] Launching FMC @ 0x40000000
1,594,937 UART:
1,594,953 UART: Running Caliptra FMC ...
1,595,361 UART:
1,595,502 UART: [fmc] Received command: 0x46574C44
1,596,326 UART:
1,596,342 UART: Running Caliptra ROM ...
1,596,750 UART:
1,596,892 UART: [state] CFI Enabled
1,599,492 UART: [state] LifecycleState = Unprovisioned
1,600,151 UART: [state] DebugLocked = No
1,600,760 UART: [state] WD Timer not started. Device not locked for debugging
1,602,168 UART: [update-reset] ++
2,914,367 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,915,563 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,068,384 UART: [update-reset] Copying MAN_2 To MAN_1
3,076,398 UART: [update-reset Success] --
3,076,807 >>> mbox cmd response: success
3,076,807 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,077,530 UART: [state] Locking Datavault
3,078,330 UART: [state] Locking PCR0, PCR1 and PCR31
3,078,934 UART: [state] Locking ICCM
3,079,444 UART: [exit] Launching FMC @ 0x40000000
3,084,741 UART:
3,084,757 UART: Running Caliptra FMC ...
3,085,165 UART:
3,085,306 UART: [fmc] Received command: 0x1000000C
3,086,041 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,213 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
88,184 UART: [fake-rom-cold-reset] ++
89,112 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,326 UART: [fht] FHT @ 0x50003400
92,633 UART: [fwproc] Wait for Commands...
93,470 UART: [fwproc] Recv command 0x46574c44
94,198 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,848 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,740 >>> mbox cmd response: success
1,586,898 UART: [fake-rom-cold-reset] --
1,587,293 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,604 UART: [state] Locking Datavault
1,588,961 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,565 UART: [state] Locking ICCM
1,590,059 UART: [exit] Launching FMC @ 0x40000000
1,595,356 UART:
1,595,372 UART: Running Caliptra FMC ...
1,595,780 UART:
1,595,921 UART: [fmc] Received command: 0x46574C44
1,596,745 UART:
1,596,761 UART: Running Caliptra ROM ...
1,597,169 UART:
1,597,224 UART: [state] CFI Enabled
1,599,828 UART: [state] LifecycleState = Unprovisioned
1,600,487 UART: [state] DebugLocked = No
1,601,100 UART: [state] WD Timer not started. Device not locked for debugging
1,602,904 UART: [update-reset] ++
2,915,193 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,000 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,014 UART: [update-reset Success] --
3,077,423 >>> mbox cmd response: success
3,077,423 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,050 UART: [state] Locking Datavault
3,078,820 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,424 UART: [state] Locking ICCM
3,079,944 UART: [exit] Launching FMC @ 0x40000000
3,085,241 UART:
3,085,257 UART: Running Caliptra FMC ...
3,085,665 UART:
3,085,806 UART: [fmc] Received command: 0x1000000C
3,086,541 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,138 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [fake-rom-cold-reset] ++
88,304 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,452 UART: [fht] FHT @ 0x50003400
91,815 UART: [fwproc] Wait for Commands...
92,636 UART: [fwproc] Recv command 0x46574c44
93,364 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,347 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,312 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,444,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,314 >>> mbox cmd response: success
1,586,472 UART: [fake-rom-cold-reset] --
1,586,867 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,378 UART: [state] Locking Datavault
1,588,727 UART: [state] Locking PCR0, PCR1 and PCR31
1,589,331 UART: [state] Locking ICCM
1,590,003 UART: [exit] Launching FMC @ 0x40000000
1,595,300 UART:
1,595,316 UART: Running Caliptra FMC ...
1,595,724 UART:
1,595,865 UART: [fmc] Received command: 0x46574C44
1,596,689 UART:
1,596,705 UART: Running Caliptra ROM ...
1,597,113 UART:
1,597,168 UART: [state] CFI Enabled
1,599,998 UART: [state] LifecycleState = Unprovisioned
1,600,657 UART: [state] DebugLocked = No
1,601,214 UART: [state] WD Timer not started. Device not locked for debugging
1,602,662 UART: [update-reset] ++
2,915,509 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,633 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,294 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,308 UART: [update-reset Success] --
3,077,717 >>> mbox cmd response: success
3,077,717 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,340 UART: [state] Locking Datavault
3,078,942 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,546 UART: [state] Locking ICCM
3,080,014 UART: [exit] Launching FMC @ 0x40000000
3,085,311 UART:
3,085,327 UART: Running Caliptra FMC ...
3,085,735 UART:
3,085,876 UART: [fmc] Received command: 0x1000000C
3,086,611 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [fake-rom-cold-reset] ++
88,577 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
88,725 UART: [fht] FHT @ 0x50003400
91,948 UART: [fwproc] Wait for Commands...
92,681 UART: [fwproc] Recv command 0x46574c44
93,409 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,419,631 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,445,313 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,585,477 >>> mbox cmd response: success
1,586,635 UART: [fake-rom-cold-reset] --
1,587,030 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,587,473 UART: [state] Locking Datavault
1,588,328 UART: [state] Locking PCR0, PCR1 and PCR31
1,588,932 UART: [state] Locking ICCM
1,589,434 UART: [exit] Launching FMC @ 0x40000000
1,594,731 UART:
1,594,747 UART: Running Caliptra FMC ...
1,595,155 UART:
1,595,296 UART: [fmc] Received command: 0x46574C44
1,596,120 UART:
1,596,136 UART: Running Caliptra ROM ...
1,596,544 UART:
1,596,686 UART: [state] CFI Enabled
1,599,614 UART: [state] LifecycleState = Unprovisioned
1,600,273 UART: [state] DebugLocked = No
1,600,916 UART: [state] WD Timer not started. Device not locked for debugging
1,602,502 UART: [update-reset] ++
2,915,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,916,873 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,069,472 UART: [update-reset] Copying MAN_2 To MAN_1
3,077,486 UART: [update-reset Success] --
3,077,895 >>> mbox cmd response: success
3,077,895 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,078,566 UART: [state] Locking Datavault
3,079,336 UART: [state] Locking PCR0, PCR1 and PCR31
3,079,940 UART: [state] Locking ICCM
3,080,592 UART: [exit] Launching FMC @ 0x40000000
3,085,889 UART:
3,085,905 UART: Running Caliptra FMC ...
3,086,313 UART:
3,086,454 UART: [fmc] Received command: 0x1000000C
3,087,189 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [fake-rom-cold-reset] ++
88,913 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
89,181 UART: [fht] FHT @ 0x50003400
92,544 UART: [fwproc] Wait for Commands...
93,211 UART: [fwproc] Recv command 0x46574c44
93,939 UART: [fwproc] Recv'd Img size: 114888 bytes
1,392,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,420,619 UART: [fwproc] Load FMC at address 0x40000000 len 16384
1,446,301 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,586,609 >>> mbox cmd response: success
1,587,767 UART: [fake-rom-cold-reset] --
1,588,162 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,588,597 UART: [state] Locking Datavault
1,589,692 UART: [state] Locking PCR0, PCR1 and PCR31
1,590,296 UART: [state] Locking ICCM
1,590,840 UART: [exit] Launching FMC @ 0x40000000
1,596,137 UART:
1,596,153 UART: Running Caliptra FMC ...
1,596,561 UART:
1,596,702 UART: [fmc] Received command: 0x46574C44
1,597,526 UART:
1,597,542 UART: Running Caliptra ROM ...
1,597,950 UART:
1,598,092 UART: [state] CFI Enabled
1,600,978 UART: [state] LifecycleState = Unprovisioned
1,601,637 UART: [state] DebugLocked = No
1,602,150 UART: [state] WD Timer not started. Device not locked for debugging
1,603,928 UART: [update-reset] ++
2,916,573 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,917,571 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
3,070,382 UART: [update-reset] Copying MAN_2 To MAN_1
3,078,396 UART: [update-reset Success] --
3,078,805 >>> mbox cmd response: success
3,078,805 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,079,364 UART: [state] Locking Datavault
3,080,324 UART: [state] Locking PCR0, PCR1 and PCR31
3,080,928 UART: [state] Locking ICCM
3,081,488 UART: [exit] Launching FMC @ 0x40000000
3,086,785 UART:
3,086,801 UART: Running Caliptra FMC ...
3,087,209 UART:
3,087,350 UART: [fmc] Received command: 0x1000000C
3,088,085 >>> mbox cmd response: success
* TESTCASE PASSED
test test_fake_rom::test_fake_rom_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,012 UART:
192,407 UART: Running Caliptra ROM ...
193,518 UART:
193,668 UART: [state] CFI Enabled
264,595 UART: [state] LifecycleState = Unprovisioned
266,375 UART: [state] DebugLocked = No
268,783 UART: [state] WD Timer not started. Device not locked for debugging
273,669 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,068 UART:
192,434 UART: Running Caliptra ROM ...
193,618 UART:
193,777 UART: [state] CFI Enabled
264,355 UART: [state] LifecycleState = Unprovisioned
266,069 UART: [state] DebugLocked = No
268,283 UART: [state] WD Timer not started. Device not locked for debugging
273,329 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,352 UART:
192,734 UART: Running Caliptra ROM ...
193,926 UART:
603,396 UART: [state] CFI Enabled
619,587 UART: [state] LifecycleState = Unprovisioned
621,279 UART: [state] DebugLocked = No
623,805 UART: [state] WD Timer not started. Device not locked for debugging
628,466 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,672 UART:
193,031 UART: Running Caliptra ROM ...
194,216 UART:
603,731 UART: [state] CFI Enabled
619,005 UART: [state] LifecycleState = Unprovisioned
620,954 UART: [state] DebugLocked = No
622,013 UART: [state] WD Timer not started. Device not locked for debugging
626,197 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,590 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,187 UART: [state] DebugLocked = No
86,898 UART: [state] WD Timer not started. Device not locked for debugging
88,324 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,250 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,348 UART: [state] DebugLocked = No
87,001 UART: [state] WD Timer not started. Device not locked for debugging
88,471 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,464 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,730 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
85,976 UART: [state] WD Timer not started. Device not locked for debugging
87,336 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,961 UART: [state] WD Timer not started. Device not locked for debugging
88,575 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_fake_rom_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
2,219,366 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,364,852 UART:
2,365,256 UART: Running Caliptra ROM ...
2,366,425 UART:
2,366,606 UART: [state] CFI Enabled
2,367,565 UART: [state] LifecycleState = Unprovisioned
2,369,227 UART: [state] DebugLocked = No
2,370,338 UART: [state] WD Timer not started. Device not locked for debugging
2,372,812 UART: [fake-rom-cold-reset] ++
2,373,920 UART: [fht] FHT @ 0x50003400
2,374,955 UART: [fwproc] Wait for Commands...
2,376,258 UART: [fwproc] Recv command 0x46574c44
2,377,683 UART: [fwproc] Recv'd Img size: 114888 bytes
3,439,293 UART: ROM Fatal Error: 0x000B000C
3,442,303 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
2,223,020 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,368,387 UART:
2,368,788 UART: Running Caliptra ROM ...
2,369,963 UART:
2,370,142 UART: [state] CFI Enabled
2,371,107 UART: [state] LifecycleState = Unprovisioned
2,372,769 UART: [state] DebugLocked = No
2,373,882 UART: [state] WD Timer not started. Device not locked for debugging
2,376,368 UART: [fake-rom-cold-reset] ++
2,377,482 UART: [fht] FHT @ 0x50003400
2,378,518 UART: [fwproc] Wait for Commands...
2,379,808 UART: [fwproc] Recv command 0x46574c44
2,381,248 UART: [fwproc] Recv'd Img size: 114888 bytes
3,446,286 UART: ROM Fatal Error: 0x000B000C
3,449,312 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
2,226,162 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,371,430 UART:
2,371,841 UART: Running Caliptra ROM ...
2,372,925 UART:
2,373,074 UART: [state] CFI Enabled
2,374,043 UART: [state] LifecycleState = Unprovisioned
2,375,702 UART: [state] DebugLocked = No
2,376,819 UART: [state] WD Timer not started. Device not locked for debugging
2,379,292 UART: [fake-rom-cold-reset] ++
2,380,401 UART: [fht] FHT @ 0x50003400
2,381,432 UART: [fwproc] Wait for Commands...
2,382,732 UART: [fwproc] Recv command 0x46574c44
2,384,161 UART: [fwproc] Recv'd Img size: 114888 bytes
3,448,283 UART: ROM Fatal Error: 0x000B000C
3,451,328 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
2,229,220 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,375,055 UART:
2,375,467 UART: Running Caliptra ROM ...
2,376,646 UART:
2,376,820 UART: [state] CFI Enabled
2,377,783 UART: [state] LifecycleState = Unprovisioned
2,379,435 UART: [state] DebugLocked = No
2,380,541 UART: [state] WD Timer not started. Device not locked for debugging
2,383,014 UART: [fake-rom-cold-reset] ++
2,384,124 UART: [fht] FHT @ 0x50003400
2,385,113 UART: [fwproc] Wait for Commands...
2,386,393 UART: [fwproc] Recv command 0x46574c44
2,387,819 UART: [fwproc] Recv'd Img size: 114888 bytes
3,453,557 UART: ROM Fatal Error: 0x000B000C
3,456,653 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [fake-rom-cold-reset] ++
89,122 UART: [fht] FHT @ 0x50003400
92,573 UART: [fwproc] Wait for Commands...
93,236 UART: [fwproc] Recv command 0x46574c44
93,964 UART: [fwproc] Recv'd Img size: 114888 bytes
130,341 UART: ROM Fatal Error: 0x000B000C
131,510 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,456 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [fake-rom-cold-reset] ++
89,196 UART: [fht] FHT @ 0x50003400
92,537 UART: [fwproc] Wait for Commands...
93,334 UART: [fwproc] Recv command 0x46574c44
94,062 UART: [fwproc] Recv'd Img size: 114888 bytes
130,997 UART: ROM Fatal Error: 0x000B000C
132,166 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,003 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [fake-rom-cold-reset] ++
88,733 UART: [fht] FHT @ 0x50003400
92,194 UART: [fwproc] Wait for Commands...
92,955 UART: [fwproc] Recv command 0x46574c44
93,683 UART: [fwproc] Recv'd Img size: 114888 bytes
131,130 UART: ROM Fatal Error: 0x000B000C
132,299 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,923 UART: [state] WD Timer not started. Device not locked for debugging
88,481 UART: [fake-rom-cold-reset] ++
89,553 UART: [fht] FHT @ 0x50003400
92,844 UART: [fwproc] Wait for Commands...
93,467 UART: [fwproc] Recv command 0x46574c44
94,195 UART: [fwproc] Recv'd Img size: 114888 bytes
131,240 UART: ROM Fatal Error: 0x000B000C
132,409 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
86,214 UART: [state] WD Timer not started. Device not locked for debugging
87,620 UART: [fake-rom-cold-reset] ++
88,842 UART: [fht] FHT @ 0x50003400
92,153 UART: [fwproc] Wait for Commands...
92,974 UART: [fwproc] Recv command 0x46574c44
93,702 UART: [fwproc] Recv'd Img size: 114888 bytes
131,333 UART: ROM Fatal Error: 0x000B000C
132,502 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [fake-rom-cold-reset] ++
88,618 UART: [fht] FHT @ 0x50003400
91,925 UART: [fwproc] Wait for Commands...
92,564 UART: [fwproc] Recv command 0x46574c44
93,292 UART: [fwproc] Recv'd Img size: 114888 bytes
129,961 UART: ROM Fatal Error: 0x000B000C
131,130 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [fake-rom-cold-reset] ++
89,163 UART: [fht] FHT @ 0x50003400
92,500 UART: [fwproc] Wait for Commands...
93,137 UART: [fwproc] Recv command 0x46574c44
93,865 UART: [fwproc] Recv'd Img size: 114888 bytes
129,882 UART: ROM Fatal Error: 0x000B000C
131,051 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,957 UART: [state] WD Timer not started. Device not locked for debugging
88,415 UART: [fake-rom-cold-reset] ++
89,595 UART: [fht] FHT @ 0x50003400
92,846 UART: [fwproc] Wait for Commands...
93,565 UART: [fwproc] Recv command 0x46574c44
94,293 UART: [fwproc] Recv'd Img size: 114888 bytes
130,832 UART: ROM Fatal Error: 0x000B000C
132,001 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,385 UART: [state] DebugLocked = No
85,970 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [fake-rom-cold-reset] ++
88,576 UART: [fht] FHT @ 0x50003400
92,015 UART: [fwproc] Wait for Commands...
92,806 UART: [fwproc] Recv command 0x46574c44
93,534 UART: [fwproc] Recv'd Img size: 114888 bytes
130,437 UART: ROM Fatal Error: 0x000B000C
131,606 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [fake-rom-cold-reset] ++
88,972 UART: [fht] FHT @ 0x50003400
92,319 UART: [fwproc] Wait for Commands...
93,130 UART: [fwproc] Recv command 0x46574c44
93,858 UART: [fwproc] Recv'd Img size: 114888 bytes
130,715 UART: ROM Fatal Error: 0x000B000C
131,884 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,378 UART: [state] DebugLocked = No
86,931 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [fake-rom-cold-reset] ++
89,465 UART: [fht] FHT @ 0x50003400
92,684 UART: [fwproc] Wait for Commands...
93,279 UART: [fwproc] Recv command 0x46574c44
94,007 UART: [fwproc] Recv'd Img size: 114888 bytes
131,150 UART: ROM Fatal Error: 0x000B000C
132,319 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,833 UART: [state] LifecycleState = Unprovisioned
86,492 UART: [state] DebugLocked = No
87,191 UART: [state] WD Timer not started. Device not locked for debugging
88,641 UART: [fake-rom-cold-reset] ++
89,773 UART: [fht] FHT @ 0x50003400
93,180 UART: [fwproc] Wait for Commands...
93,911 UART: [fwproc] Recv command 0x46574c44
94,639 UART: [fwproc] Recv'd Img size: 114888 bytes
132,410 UART: ROM Fatal Error: 0x000B000C
133,579 >>> mbox cmd response: failed
test test_fake_rom::test_image_verify ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,194 UART:
192,547 UART: Running Caliptra ROM ...
193,725 UART:
193,883 UART: [state] CFI Enabled
262,119 UART: [state] LifecycleState = Unprovisioned
263,841 UART: [state] DebugLocked = No
265,379 UART: [state] WD Timer not started. Device not locked for debugging
271,444 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,177 UART:
192,530 UART: Running Caliptra ROM ...
193,724 UART:
193,881 UART: [state] CFI Enabled
261,880 UART: [state] LifecycleState = Unprovisioned
263,628 UART: [state] DebugLocked = No
265,070 UART: [state] WD Timer not started. Device not locked for debugging
269,150 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,414 UART:
192,816 UART: Running Caliptra ROM ...
193,957 UART:
603,643 UART: [state] CFI Enabled
614,521 UART: [state] LifecycleState = Unprovisioned
616,239 UART: [state] DebugLocked = No
618,373 UART: [state] WD Timer not started. Device not locked for debugging
623,145 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,074 writing to cptra_bootfsm_go
193,130 UART:
193,521 UART: Running Caliptra ROM ...
194,724 UART:
604,330 UART: [state] CFI Enabled
616,723 UART: [state] LifecycleState = Unprovisioned
618,407 UART: [state] DebugLocked = No
619,937 UART: [state] WD Timer not started. Device not locked for debugging
624,267 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,458 UART: [state] LifecycleState = Unprovisioned
85,117 UART: [state] DebugLocked = No
85,624 UART: [state] WD Timer not started. Device not locked for debugging
86,988 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,120 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,705 UART: [state] WD Timer not started. Device not locked for debugging
88,105 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,116 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,211 UART: [state] LifecycleState = Unprovisioned
85,870 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,393 UART: [state] DebugLocked = No
85,972 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [fake-rom-cold-reset] ++
test test_fake_rom::test_skip_kats ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,446,295 ready_for_fw is high
3,446,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,177 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,443,185 ready_for_fw is high
3,443,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,277,516 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,782,337 ready_for_fw is high
3,782,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,498,024 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,782,357 ready_for_fw is high
3,782,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,505,257 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,597 ready_for_fw is high
1,080,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,306 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,439 ready_for_fw is high
1,081,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,772 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,434 ready_for_fw is high
1,081,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,683 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,244 ready_for_fw is high
1,081,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,473 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,361 ready_for_fw is high
1,081,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,744 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,167 ready_for_fw is high
1,081,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,038 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,308 ready_for_fw is high
1,081,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,177 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,514 ready_for_fw is high
1,081,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,535 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,139 ready_for_fw is high
1,081,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,770 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,377 ready_for_fw is high
1,081,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,466 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,220 ready_for_fw is high
1,081,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,059 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,798 ready_for_fw is high
1,081,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,117 >>> mbox cmd response: success
test test_fips_hooks::test_fips_hook_exit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,235,140 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,374,001 UART:
2,374,407 UART: Running Caliptra ROM ...
2,375,576 UART:
2,375,755 UART: [state] CFI Enabled
2,376,743 UART: [state] LifecycleState = Unprovisioned
2,378,411 UART: [state] DebugLocked = No
2,379,524 UART: [state] WD Timer not started. Device not locked for debugging
2,382,001 UART: [kat] SHA2-256
2,382,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,385,695 UART: [kat] ++
2,386,156 UART: [kat] sha1
2,386,676 UART: [kat] SHA2-256
2,387,339 UART: [kat] SHA2-384
2,388,001 UART: [kat] SHA2-512-ACC
2,388,849 UART: [kat] ECC-384
2,947,625 UART: [kat] HMAC-384Kdf
2,974,513 UART: [kat] LMS
3,451,014 UART: [kat] --
3,455,323 UART: [cold-reset] ++
3,457,907 UART: [fht] FHT @ 0x50003400
3,469,394 UART: [idev] ++
3,469,972 UART: [idev] CDI.KEYID = 6
3,470,942 UART: [idev] SUBJECT.KEYID = 7
3,472,159 UART: [idev] UDS.KEYID = 0
3,503,583 UART: [idev] Erasing UDS.KEYID = 0
5,989,440 UART: [idev] Sha1 KeyId Algorithm
6,013,278 UART: [idev] --
6,018,289 UART: [ldev] ++
6,018,874 UART: [ldev] CDI.KEYID = 6
6,019,792 UART: [ldev] SUBJECT.KEYID = 5
6,021,014 UART: [ldev] AUTHORITY.KEYID = 7
6,022,257 UART: [ldev] FE.KEYID = 1
6,060,401 UART: [ldev] Erasing FE.KEYID = 1
8,568,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,776 UART: [ldev] --
10,375,402 UART: [fwproc] Wait for Commands...
10,378,422 UART: [fwproc] Recv command 0x46574c44
10,380,468 UART: [fwproc] Recv'd Img size: 109820 bytes
13,746,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,823,349 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,865,849 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,193,931 >>> mbox cmd response: success
14,198,251 UART: [afmc] ++
14,198,855 UART: [afmc] CDI.KEYID = 6
14,199,772 UART: [afmc] SUBJECT.KEYID = 7
14,200,990 UART: [afmc] AUTHORITY.KEYID = 5
16,725,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,469,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,472,166 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,487,992 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,503,952 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,519,563 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,543,879 UART: [afmc] --
18,547,060 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,547,438 UART: [cold-reset] --
18,551,718 UART: [state] Locking Datavault
18,557,395 UART: [state] Locking PCR0, PCR1 and PCR31
18,559,157 UART: [state] Locking ICCM
18,560,205 UART: [exit] Launching FMC @ 0x40000000
18,568,552 UART:
18,568,830 UART: Running Caliptra FMC ...
18,569,865 UART:
18,570,020 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,571,699 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
2,216,777 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,073,112 >>> mbox cmd response: success
18,345,437 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,359,280 UART:
18,359,607 UART: Running Caliptra FMC ...
18,360,715 UART:
18,360,874 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,362,609 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
2,233,246 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,372,174 UART:
2,372,603 UART: Running Caliptra ROM ...
2,373,781 UART:
2,373,953 UART: [state] CFI Enabled
2,374,909 UART: [state] LifecycleState = Unprovisioned
2,376,570 UART: [state] DebugLocked = No
2,377,685 UART: [state] WD Timer not started. Device not locked for debugging
2,380,181 UART: [kat] SHA2-256
2,380,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,383,862 UART: [kat] ++
2,384,313 UART: [kat] sha1
2,384,823 UART: [kat] SHA2-256
2,385,565 UART: [kat] SHA2-384
2,386,229 UART: [kat] SHA2-512-ACC
2,387,063 UART: [kat] ECC-384
3,283,390 UART: [kat] HMAC-384Kdf
3,296,626 UART: [kat] LMS
3,773,105 UART: [kat] --
3,778,063 UART: [cold-reset] ++
3,780,645 UART: [fht] FHT @ 0x50003400
3,790,699 UART: [idev] ++
3,791,260 UART: [idev] CDI.KEYID = 6
3,792,272 UART: [idev] SUBJECT.KEYID = 7
3,793,504 UART: [idev] UDS.KEYID = 0
3,807,807 UART: [idev] Erasing UDS.KEYID = 0
6,271,366 UART: [idev] Sha1 KeyId Algorithm
6,294,176 UART: [idev] --
6,300,604 UART: [ldev] ++
6,301,177 UART: [ldev] CDI.KEYID = 6
6,302,088 UART: [ldev] SUBJECT.KEYID = 5
6,303,301 UART: [ldev] AUTHORITY.KEYID = 7
6,304,533 UART: [ldev] FE.KEYID = 1
6,316,314 UART: [ldev] Erasing FE.KEYID = 1
8,798,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,590,828 UART: [ldev] --
10,596,710 UART: [fwproc] Wait for Commands...
10,598,916 UART: [fwproc] Recv command 0x46574c44
10,600,960 UART: [fwproc] Recv'd Img size: 109820 bytes
13,978,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,057,412 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,099,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,428,927 >>> mbox cmd response: success
14,433,365 UART: [afmc] ++
14,433,953 UART: [afmc] CDI.KEYID = 6
14,434,975 UART: [afmc] SUBJECT.KEYID = 7
14,436,077 UART: [afmc] AUTHORITY.KEYID = 5
16,943,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,665,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,667,776 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,683,606 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,699,583 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,715,256 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,739,998 UART: [afmc] --
18,744,041 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,744,412 UART: [cold-reset] --
18,747,168 UART: [state] Locking Datavault
18,752,735 UART: [state] Locking PCR0, PCR1 and PCR31
18,754,437 UART: [state] Locking ICCM
18,756,963 UART: [exit] Launching FMC @ 0x40000000
18,765,357 UART:
18,765,592 UART: Running Caliptra FMC ...
18,766,692 UART:
18,766,843 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,768,405 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
2,226,267 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,314,566 >>> mbox cmd response: success
18,551,911 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,566,929 UART:
18,567,269 UART: Running Caliptra FMC ...
18,568,460 UART:
18,568,632 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,570,370 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,515 UART: [kat] SHA2-512-ACC
906,416 UART: [kat] ECC-384
915,733 UART: [kat] HMAC-384Kdf
920,321 UART: [kat] LMS
1,168,633 UART: [kat] --
1,169,454 UART: [cold-reset] ++
1,169,822 UART: [fht] FHT @ 0x50003400
1,172,416 UART: [idev] ++
1,172,584 UART: [idev] CDI.KEYID = 6
1,172,945 UART: [idev] SUBJECT.KEYID = 7
1,173,370 UART: [idev] UDS.KEYID = 0
1,181,763 UART: [idev] Erasing UDS.KEYID = 0
1,198,567 UART: [idev] Sha1 KeyId Algorithm
1,207,359 UART: [idev] --
1,208,372 UART: [ldev] ++
1,208,540 UART: [ldev] CDI.KEYID = 6
1,208,904 UART: [ldev] SUBJECT.KEYID = 5
1,209,331 UART: [ldev] AUTHORITY.KEYID = 7
1,209,794 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,920 UART: [ldev] --
1,281,347 UART: [fwproc] Wait for Commands...
1,282,088 UART: [fwproc] Recv command 0x46574c44
1,282,821 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,349 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,669 >>> mbox cmd response: success
2,714,693 UART: [afmc] ++
2,714,861 UART: [afmc] CDI.KEYID = 6
2,715,224 UART: [afmc] SUBJECT.KEYID = 7
2,715,650 UART: [afmc] AUTHORITY.KEYID = 5
2,750,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,788 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,508 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,401 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,094 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,783 UART: [afmc] --
2,793,738 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,760 UART: [cold-reset] --
2,794,770 UART: [state] Locking Datavault
2,796,269 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,873 UART: [state] Locking ICCM
2,797,477 UART: [exit] Launching FMC @ 0x40000000
2,802,774 UART:
2,802,790 UART: Running Caliptra FMC ...
2,803,198 UART:
2,803,336 UART: [fmc] Received command: 0x10000005
2,804,437 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,790 >>> mbox cmd response: success
2,621,548 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,051 UART:
2,628,067 UART: Running Caliptra FMC ...
2,628,475 UART:
2,628,613 UART: [fmc] Received command: 0x10000005
2,629,714 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,370 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,493 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,048 UART: [idev] --
1,209,215 UART: [ldev] ++
1,209,383 UART: [ldev] CDI.KEYID = 6
1,209,747 UART: [ldev] SUBJECT.KEYID = 5
1,210,174 UART: [ldev] AUTHORITY.KEYID = 7
1,210,637 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,241,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,281,042 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,022 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,476 >>> mbox cmd response: success
2,713,706 UART: [afmc] ++
2,713,874 UART: [afmc] CDI.KEYID = 6
2,714,237 UART: [afmc] SUBJECT.KEYID = 7
2,714,663 UART: [afmc] AUTHORITY.KEYID = 5
2,750,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,855 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,575 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,468 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,161 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,916 UART: [afmc] --
2,793,913 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,935 UART: [cold-reset] --
2,795,019 UART: [state] Locking Datavault
2,795,988 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,592 UART: [state] Locking ICCM
2,797,166 UART: [exit] Launching FMC @ 0x40000000
2,802,463 UART:
2,802,479 UART: Running Caliptra FMC ...
2,802,887 UART:
2,803,025 UART: [fmc] Received command: 0x10000005
2,804,126 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,611 >>> mbox cmd response: success
2,620,347 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,626,836 UART:
2,626,852 UART: Running Caliptra FMC ...
2,627,260 UART:
2,627,398 UART: [fmc] Received command: 0x10000005
2,628,499 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,347 UART: [kat] SHA2-512-ACC
906,248 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,186 UART: [fht] FHT @ 0x50003400
1,172,922 UART: [idev] ++
1,173,090 UART: [idev] CDI.KEYID = 6
1,173,451 UART: [idev] SUBJECT.KEYID = 7
1,173,876 UART: [idev] UDS.KEYID = 0
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,305 UART: [idev] Sha1 KeyId Algorithm
1,207,183 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,744 UART: [ldev] Erasing FE.KEYID = 1
1,241,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,204 UART: [ldev] --
1,280,637 UART: [fwproc] Wait for Commands...
1,281,364 UART: [fwproc] Recv command 0x46574c44
1,282,097 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,967 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,219 >>> mbox cmd response: success
2,714,311 UART: [afmc] ++
2,714,479 UART: [afmc] CDI.KEYID = 6
2,714,842 UART: [afmc] SUBJECT.KEYID = 7
2,715,268 UART: [afmc] AUTHORITY.KEYID = 5
2,750,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,136 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,856 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,749 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,442 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,093 UART: [afmc] --
2,793,896 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,918 UART: [cold-reset] --
2,794,744 UART: [state] Locking Datavault
2,795,693 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,297 UART: [state] Locking ICCM
2,796,763 UART: [exit] Launching FMC @ 0x40000000
2,802,060 UART:
2,802,076 UART: Running Caliptra FMC ...
2,802,484 UART:
2,802,622 UART: [fmc] Received command: 0x10000005
2,803,723 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,510 >>> mbox cmd response: success
2,621,458 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,469 UART:
2,627,485 UART: Running Caliptra FMC ...
2,627,893 UART:
2,628,031 UART: [fmc] Received command: 0x10000005
2,629,132 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,227 UART: [state] LifecycleState = Unprovisioned
85,882 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,078 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,897 UART: [cold-reset] ++
1,170,297 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,188 UART: [idev] Sha1 KeyId Algorithm
1,207,978 UART: [idev] --
1,208,999 UART: [ldev] ++
1,209,167 UART: [ldev] CDI.KEYID = 6
1,209,531 UART: [ldev] SUBJECT.KEYID = 5
1,209,958 UART: [ldev] AUTHORITY.KEYID = 7
1,210,421 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,241,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,278 UART: [fwproc] Wait for Commands...
1,282,097 UART: [fwproc] Recv command 0x46574c44
1,282,830 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,458 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,940 >>> mbox cmd response: success
2,715,118 UART: [afmc] ++
2,715,286 UART: [afmc] CDI.KEYID = 6
2,715,649 UART: [afmc] SUBJECT.KEYID = 7
2,716,075 UART: [afmc] AUTHORITY.KEYID = 5
2,752,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,465 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,185 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,078 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,771 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,392 UART: [afmc] --
2,795,323 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,345 UART: [cold-reset] --
2,796,001 UART: [state] Locking Datavault
2,797,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,674 UART: [state] Locking ICCM
2,798,332 UART: [exit] Launching FMC @ 0x40000000
2,803,629 UART:
2,803,645 UART: Running Caliptra FMC ...
2,804,053 UART:
2,804,191 UART: [fmc] Received command: 0x10000005
2,805,292 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,059 >>> mbox cmd response: success
2,621,595 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,502 UART:
2,627,518 UART: Running Caliptra FMC ...
2,627,926 UART:
2,628,064 UART: [fmc] Received command: 0x10000005
2,629,165 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,615 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
891,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,384 UART: [kat] ++
895,536 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,245 UART: [kat] LMS
1,169,557 UART: [kat] --
1,170,462 UART: [cold-reset] ++
1,170,798 UART: [fht] FHT @ 0x50003400
1,173,400 UART: [idev] ++
1,173,568 UART: [idev] CDI.KEYID = 6
1,173,929 UART: [idev] SUBJECT.KEYID = 7
1,174,354 UART: [idev] UDS.KEYID = 0
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,035 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,626 UART: [ldev] Erasing FE.KEYID = 1
1,242,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,392 UART: [ldev] --
1,281,763 UART: [fwproc] Wait for Commands...
1,282,534 UART: [fwproc] Recv command 0x46574c44
1,283,267 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,412 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,145 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,401 >>> mbox cmd response: success
2,713,569 UART: [afmc] ++
2,713,737 UART: [afmc] CDI.KEYID = 6
2,714,100 UART: [afmc] SUBJECT.KEYID = 7
2,714,526 UART: [afmc] AUTHORITY.KEYID = 5
2,750,116 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,970 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,690 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,583 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,276 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,099 UART: [afmc] --
2,793,074 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,096 UART: [cold-reset] --
2,793,772 UART: [state] Locking Datavault
2,794,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,541 UART: [state] Locking ICCM
2,796,141 UART: [exit] Launching FMC @ 0x40000000
2,801,438 UART:
2,801,454 UART: Running Caliptra FMC ...
2,801,862 UART:
2,802,000 UART: [fmc] Received command: 0x10000005
2,803,101 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,506 >>> mbox cmd response: success
2,621,140 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,297 UART:
2,627,313 UART: Running Caliptra FMC ...
2,627,721 UART:
2,627,859 UART: [fmc] Received command: 0x10000005
2,628,960 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
891,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,551 UART: [kat] ++
895,703 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,228 UART: [kat] LMS
1,169,540 UART: [kat] --
1,170,509 UART: [cold-reset] ++
1,170,851 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,140 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,209,141 UART: [ldev] ++
1,209,309 UART: [ldev] CDI.KEYID = 6
1,209,673 UART: [ldev] SUBJECT.KEYID = 5
1,210,100 UART: [ldev] AUTHORITY.KEYID = 7
1,210,563 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,128 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,595 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,318 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,716 >>> mbox cmd response: success
2,714,956 UART: [afmc] ++
2,715,124 UART: [afmc] CDI.KEYID = 6
2,715,487 UART: [afmc] SUBJECT.KEYID = 7
2,715,913 UART: [afmc] AUTHORITY.KEYID = 5
2,751,601 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,983 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,703 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,596 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,289 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,974 UART: [afmc] --
2,795,005 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,027 UART: [cold-reset] --
2,795,939 UART: [state] Locking Datavault
2,797,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,866 UART: [state] Locking ICCM
2,798,502 UART: [exit] Launching FMC @ 0x40000000
2,803,799 UART:
2,803,815 UART: Running Caliptra FMC ...
2,804,223 UART:
2,804,361 UART: [fmc] Received command: 0x10000005
2,805,462 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,507 >>> mbox cmd response: success
2,622,575 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,504 UART:
2,628,520 UART: Running Caliptra FMC ...
2,628,928 UART:
2,629,066 UART: [fmc] Received command: 0x10000005
2,630,167 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_no_lms_info_in_datavault_on_lms_unavailable ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
2,220,590 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,359,357 UART:
2,359,750 UART: Running Caliptra ROM ...
2,360,852 UART:
2,361,014 UART: [state] CFI Enabled
2,361,931 UART: [state] LifecycleState = Unprovisioned
2,363,603 UART: [state] DebugLocked = No
2,364,637 UART: [state] WD Timer not started. Device not locked for debugging
2,367,109 UART: [kat] SHA2-256
2,367,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,370,796 UART: [kat] ++
2,371,587 UART: [kat] sha1
2,372,123 UART: [kat] SHA2-256
2,372,820 UART: [kat] SHA2-384
2,373,487 UART: [kat] SHA2-512-ACC
2,374,294 UART: [kat] ECC-384
2,945,519 UART: [kat] HMAC-384Kdf
2,969,635 UART: [kat] LMS
3,446,127 UART: [kat] --
3,451,309 UART: [cold-reset] ++
3,452,599 UART: [fht] FHT @ 0x50003400
3,462,875 UART: [idev] ++
3,463,441 UART: [idev] CDI.KEYID = 6
3,464,460 UART: [idev] SUBJECT.KEYID = 7
3,465,623 UART: [idev] UDS.KEYID = 0
3,500,131 UART: [idev] Erasing UDS.KEYID = 0
5,985,435 UART: [idev] Sha1 KeyId Algorithm
6,008,330 UART: [idev] --
6,013,462 UART: [ldev] ++
6,014,093 UART: [ldev] CDI.KEYID = 6
6,014,991 UART: [ldev] SUBJECT.KEYID = 5
6,016,210 UART: [ldev] AUTHORITY.KEYID = 7
6,017,453 UART: [ldev] FE.KEYID = 1
6,055,586 UART: [ldev] Erasing FE.KEYID = 1
8,563,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,698 UART: [ldev] --
10,371,570 UART: [fwproc] Wait for Commands...
10,374,040 UART: [fwproc] Recv command 0x46574c44
10,376,044 UART: [fwproc] Recv'd Img size: 109820 bytes
13,753,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,835,054 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,877,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,206,574 >>> mbox cmd response: success
14,210,676 UART: [afmc] ++
14,211,301 UART: [afmc] CDI.KEYID = 6
14,212,244 UART: [afmc] SUBJECT.KEYID = 7
14,213,300 UART: [afmc] AUTHORITY.KEYID = 5
16,747,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,047 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,506,844 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,522,833 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,538,537 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,562,536 UART: [afmc] --
18,565,603 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,565,986 UART: [cold-reset] --
18,569,673 UART: [state] Locking Datavault
18,574,005 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,723 UART: [state] Locking ICCM
18,576,907 UART: [exit] Launching FMC @ 0x40000000
18,585,254 UART:
18,585,515 UART: Running Caliptra FMC ...
18,586,627 UART:
18,586,802 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,588,484 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
2,220,391 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,084,524 >>> mbox cmd response: success
18,350,220 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,366,487 UART:
18,366,827 UART: Running Caliptra FMC ...
18,367,927 UART:
18,368,083 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,369,841 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
2,234,945 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,374,030 UART:
2,374,427 UART: Running Caliptra ROM ...
2,375,598 UART:
2,375,765 UART: [state] CFI Enabled
2,376,744 UART: [state] LifecycleState = Unprovisioned
2,378,411 UART: [state] DebugLocked = No
2,379,520 UART: [state] WD Timer not started. Device not locked for debugging
2,381,990 UART: [kat] SHA2-256
2,382,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,385,672 UART: [kat] ++
2,386,124 UART: [kat] sha1
2,386,633 UART: [kat] SHA2-256
2,387,370 UART: [kat] SHA2-384
2,388,034 UART: [kat] SHA2-512-ACC
2,388,868 UART: [kat] ECC-384
3,281,900 UART: [kat] HMAC-384Kdf
3,293,774 UART: [kat] LMS
3,770,335 UART: [kat] --
3,774,214 UART: [cold-reset] ++
3,776,088 UART: [fht] FHT @ 0x50003400
3,787,837 UART: [idev] ++
3,788,463 UART: [idev] CDI.KEYID = 6
3,789,373 UART: [idev] SUBJECT.KEYID = 7
3,790,638 UART: [idev] UDS.KEYID = 0
3,809,741 UART: [idev] Erasing UDS.KEYID = 0
6,272,609 UART: [idev] Sha1 KeyId Algorithm
6,295,187 UART: [idev] --
6,300,306 UART: [ldev] ++
6,300,882 UART: [ldev] CDI.KEYID = 6
6,301,790 UART: [ldev] SUBJECT.KEYID = 5
6,303,000 UART: [ldev] AUTHORITY.KEYID = 7
6,304,292 UART: [ldev] FE.KEYID = 1
6,315,206 UART: [ldev] Erasing FE.KEYID = 1
8,788,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,664 UART: [ldev] --
10,581,992 UART: [fwproc] Wait for Commands...
10,583,500 UART: [fwproc] Recv command 0x46574c44
10,585,542 UART: [fwproc] Recv'd Img size: 109820 bytes
13,965,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,045,215 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,087,722 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,415,301 >>> mbox cmd response: success
14,420,099 UART: [afmc] ++
14,420,686 UART: [afmc] CDI.KEYID = 6
14,421,574 UART: [afmc] SUBJECT.KEYID = 7
14,422,839 UART: [afmc] AUTHORITY.KEYID = 5
16,932,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,657,355 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,659,539 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,675,366 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,691,390 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,707,032 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,730,186 UART: [afmc] --
18,733,356 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,733,719 UART: [cold-reset] --
18,736,639 UART: [state] Locking Datavault
18,741,845 UART: [state] Locking PCR0, PCR1 and PCR31
18,743,547 UART: [state] Locking ICCM
18,746,224 UART: [exit] Launching FMC @ 0x40000000
18,754,616 UART:
18,754,848 UART: Running Caliptra FMC ...
18,755,948 UART:
18,756,103 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,757,770 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
2,235,910 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,310,322 >>> mbox cmd response: success
18,544,467 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
18,558,599 UART:
18,558,941 UART: Running Caliptra FMC ...
18,560,036 UART:
18,560,189 UART: [fmc] Received command: 0x10000005
* TESTCASE PASSED
18,561,954 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,359 UART: [kat] SHA2-512-ACC
906,260 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,776 UART: [cold-reset] ++
1,170,122 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,839 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,494 UART: [ldev] --
1,280,859 UART: [fwproc] Wait for Commands...
1,281,584 UART: [fwproc] Recv command 0x46574c44
1,282,317 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,799 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,882 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,251 >>> mbox cmd response: success
2,712,465 UART: [afmc] ++
2,712,633 UART: [afmc] CDI.KEYID = 6
2,712,996 UART: [afmc] SUBJECT.KEYID = 7
2,713,422 UART: [afmc] AUTHORITY.KEYID = 5
2,748,932 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,080 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,800 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,693 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,386 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,205 UART: [afmc] --
2,792,030 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,052 UART: [cold-reset] --
2,792,872 UART: [state] Locking Datavault
2,794,069 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,673 UART: [state] Locking ICCM
2,795,153 UART: [exit] Launching FMC @ 0x40000000
2,800,450 UART:
2,800,466 UART: Running Caliptra FMC ...
2,800,874 UART:
2,801,012 UART: [fmc] Received command: 0x10000005
2,802,113 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,672 >>> mbox cmd response: success
2,621,836 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,157 UART:
2,628,173 UART: Running Caliptra FMC ...
2,628,581 UART:
2,628,719 UART: [fmc] Received command: 0x10000005
2,629,820 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,537 UART: [kat] SHA2-256
901,477 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,710 UART: [kat] HMAC-384Kdf
920,198 UART: [kat] LMS
1,168,510 UART: [kat] --
1,169,197 UART: [cold-reset] ++
1,169,667 UART: [fht] FHT @ 0x50003400
1,172,245 UART: [idev] ++
1,172,413 UART: [idev] CDI.KEYID = 6
1,172,774 UART: [idev] SUBJECT.KEYID = 7
1,173,199 UART: [idev] UDS.KEYID = 0
1,180,950 UART: [idev] Erasing UDS.KEYID = 0
1,198,786 UART: [idev] Sha1 KeyId Algorithm
1,207,538 UART: [idev] --
1,208,647 UART: [ldev] ++
1,208,815 UART: [ldev] CDI.KEYID = 6
1,209,179 UART: [ldev] SUBJECT.KEYID = 5
1,209,606 UART: [ldev] AUTHORITY.KEYID = 7
1,210,069 UART: [ldev] FE.KEYID = 1
1,215,483 UART: [ldev] Erasing FE.KEYID = 1
1,241,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,309 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,317 UART: [fwproc] Recv command 0x46574c44
1,282,050 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,076 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,414 >>> mbox cmd response: success
2,712,654 UART: [afmc] ++
2,712,822 UART: [afmc] CDI.KEYID = 6
2,713,185 UART: [afmc] SUBJECT.KEYID = 7
2,713,611 UART: [afmc] AUTHORITY.KEYID = 5
2,749,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,128 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,877 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,597 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,490 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,183 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,090 UART: [afmc] --
2,792,987 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,793,009 UART: [cold-reset] --
2,793,999 UART: [state] Locking Datavault
2,795,120 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,724 UART: [state] Locking ICCM
2,796,240 UART: [exit] Launching FMC @ 0x40000000
2,801,537 UART:
2,801,553 UART: Running Caliptra FMC ...
2,801,961 UART:
2,802,099 UART: [fmc] Received command: 0x10000005
2,803,200 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,729 >>> mbox cmd response: success
2,621,661 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,628,088 UART:
2,628,104 UART: Running Caliptra FMC ...
2,628,512 UART:
2,628,650 UART: [fmc] Received command: 0x10000005
2,629,751 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
903,865 UART: [kat] SHA2-512-ACC
905,766 UART: [kat] ECC-384
915,413 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,508 UART: [cold-reset] ++
1,169,914 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,459 UART: [idev] Erasing UDS.KEYID = 0
1,198,075 UART: [idev] Sha1 KeyId Algorithm
1,206,969 UART: [idev] --
1,207,840 UART: [ldev] ++
1,208,008 UART: [ldev] CDI.KEYID = 6
1,208,372 UART: [ldev] SUBJECT.KEYID = 5
1,208,799 UART: [ldev] AUTHORITY.KEYID = 7
1,209,262 UART: [ldev] FE.KEYID = 1
1,214,340 UART: [ldev] Erasing FE.KEYID = 1
1,240,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,329 UART: [fwproc] Wait for Commands...
1,281,044 UART: [fwproc] Recv command 0x46574c44
1,281,777 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,769 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,079 >>> mbox cmd response: success
2,712,285 UART: [afmc] ++
2,712,453 UART: [afmc] CDI.KEYID = 6
2,712,816 UART: [afmc] SUBJECT.KEYID = 7
2,713,242 UART: [afmc] AUTHORITY.KEYID = 5
2,748,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,116 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,836 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,729 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,422 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,249 UART: [afmc] --
2,792,120 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,142 UART: [cold-reset] --
2,792,902 UART: [state] Locking Datavault
2,794,143 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,747 UART: [state] Locking ICCM
2,795,183 UART: [exit] Launching FMC @ 0x40000000
2,800,480 UART:
2,800,496 UART: Running Caliptra FMC ...
2,800,904 UART:
2,801,042 UART: [fmc] Received command: 0x10000005
2,802,143 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,658 >>> mbox cmd response: success
2,623,200 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,629,457 UART:
2,629,473 UART: Running Caliptra FMC ...
2,629,881 UART:
2,630,019 UART: [fmc] Received command: 0x10000005
2,631,120 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,848 UART: [kat] HMAC-384Kdf
921,632 UART: [kat] LMS
1,169,944 UART: [kat] --
1,170,959 UART: [cold-reset] ++
1,171,357 UART: [fht] FHT @ 0x50003400
1,174,113 UART: [idev] ++
1,174,281 UART: [idev] CDI.KEYID = 6
1,174,642 UART: [idev] SUBJECT.KEYID = 7
1,175,067 UART: [idev] UDS.KEYID = 0
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,200,170 UART: [idev] Sha1 KeyId Algorithm
1,209,066 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,562 UART: [fwproc] Wait for Commands...
1,283,305 UART: [fwproc] Recv command 0x46574c44
1,284,038 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,142 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,225 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,380 >>> mbox cmd response: success
2,714,584 UART: [afmc] ++
2,714,752 UART: [afmc] CDI.KEYID = 6
2,715,115 UART: [afmc] SUBJECT.KEYID = 7
2,715,541 UART: [afmc] AUTHORITY.KEYID = 5
2,751,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,504 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,253 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,973 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,866 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,559 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,368 UART: [afmc] --
2,794,257 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,794,279 UART: [cold-reset] --
2,795,375 UART: [state] Locking Datavault
2,796,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,136 UART: [state] Locking ICCM
2,797,802 UART: [exit] Launching FMC @ 0x40000000
2,803,099 UART:
2,803,115 UART: Running Caliptra FMC ...
2,803,523 UART:
2,803,661 UART: [fmc] Received command: 0x10000005
2,804,762 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,355 >>> mbox cmd response: success
2,621,493 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,627,272 UART:
2,627,288 UART: Running Caliptra FMC ...
2,627,696 UART:
2,627,834 UART: [fmc] Received command: 0x10000005
2,628,935 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
85,949 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,806 UART: [kat] ++
894,958 UART: [kat] sha1
899,228 UART: [kat] SHA2-256
901,168 UART: [kat] SHA2-384
903,883 UART: [kat] SHA2-512-ACC
905,784 UART: [kat] ECC-384
915,361 UART: [kat] HMAC-384Kdf
919,969 UART: [kat] LMS
1,168,281 UART: [kat] --
1,169,246 UART: [cold-reset] ++
1,169,770 UART: [fht] FHT @ 0x50003400
1,172,358 UART: [idev] ++
1,172,526 UART: [idev] CDI.KEYID = 6
1,172,887 UART: [idev] SUBJECT.KEYID = 7
1,173,312 UART: [idev] UDS.KEYID = 0
1,181,747 UART: [idev] Erasing UDS.KEYID = 0
1,198,407 UART: [idev] Sha1 KeyId Algorithm
1,207,221 UART: [idev] --
1,208,432 UART: [ldev] ++
1,208,600 UART: [ldev] CDI.KEYID = 6
1,208,964 UART: [ldev] SUBJECT.KEYID = 5
1,209,391 UART: [ldev] AUTHORITY.KEYID = 7
1,209,854 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,498 UART: [ldev] --
1,279,855 UART: [fwproc] Wait for Commands...
1,280,438 UART: [fwproc] Recv command 0x46574c44
1,281,171 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,241 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,711,587 >>> mbox cmd response: success
2,712,677 UART: [afmc] ++
2,712,845 UART: [afmc] CDI.KEYID = 6
2,713,208 UART: [afmc] SUBJECT.KEYID = 7
2,713,634 UART: [afmc] AUTHORITY.KEYID = 5
2,749,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,492 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,212 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,105 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,798 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,563 UART: [afmc] --
2,792,576 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,792,598 UART: [cold-reset] --
2,793,410 UART: [state] Locking Datavault
2,794,609 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,213 UART: [state] Locking ICCM
2,795,713 UART: [exit] Launching FMC @ 0x40000000
2,801,010 UART:
2,801,026 UART: Running Caliptra FMC ...
2,801,434 UART:
2,801,572 UART: [fmc] Received command: 0x10000005
2,802,673 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,596 >>> mbox cmd response: success
2,619,520 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,625,739 UART:
2,625,755 UART: Running Caliptra FMC ...
2,626,163 UART:
2,626,301 UART: [fmc] Received command: 0x10000005
2,627,402 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,187 UART: [kat] SHA2-256
891,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,841 UART: [kat] ++
895,993 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,976 UART: [kat] SHA2-512-ACC
906,877 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,613 UART: [idev] ++
1,173,781 UART: [idev] CDI.KEYID = 6
1,174,142 UART: [idev] SUBJECT.KEYID = 7
1,174,567 UART: [idev] UDS.KEYID = 0
1,182,564 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,640 UART: [idev] --
1,209,871 UART: [ldev] ++
1,210,039 UART: [ldev] CDI.KEYID = 6
1,210,403 UART: [ldev] SUBJECT.KEYID = 5
1,210,830 UART: [ldev] AUTHORITY.KEYID = 7
1,211,293 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,947 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,061 UART: [fwproc] Recv command 0x46574c44
1,283,794 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,508 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,591 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,992 >>> mbox cmd response: success
2,715,232 UART: [afmc] ++
2,715,400 UART: [afmc] CDI.KEYID = 6
2,715,763 UART: [afmc] SUBJECT.KEYID = 7
2,716,189 UART: [afmc] AUTHORITY.KEYID = 5
2,752,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,395 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,115 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,008 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,701 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,368 UART: [afmc] --
2,795,245 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,795,267 UART: [cold-reset] --
2,796,171 UART: [state] Locking Datavault
2,797,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,228 UART: [state] Locking ICCM
2,798,830 UART: [exit] Launching FMC @ 0x40000000
2,804,127 UART:
2,804,143 UART: Running Caliptra FMC ...
2,804,551 UART:
2,804,689 UART: [fmc] Received command: 0x10000005
2,805,790 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,119 >>> mbox cmd response: success
2,624,187 <<< Executing mbox cmd 0x10000005 (0 bytes) from SoC
2,630,220 UART:
2,630,236 UART: Running Caliptra FMC ...
2,630,644 UART:
2,630,782 UART: [fmc] Received command: 0x10000005
2,631,883 >>> mbox cmd response data (40 bytes)
test test_fmcalias_derivation::test_check_rom_cold_boot_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
2,218,343 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,357,390 UART:
2,357,796 UART: Running Caliptra ROM ...
2,358,913 UART:
2,359,084 UART: [state] CFI Enabled
2,359,987 UART: [state] LifecycleState = Unprovisioned
2,361,651 UART: [state] DebugLocked = No
2,362,767 UART: [state] WD Timer not started. Device not locked for debugging
2,365,243 UART: [kat] SHA2-256
2,365,923 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,368,932 UART: [kat] ++
2,369,395 UART: [kat] sha1
2,369,915 UART: [kat] SHA2-256
2,370,658 UART: [kat] SHA2-384
2,371,335 UART: [kat] SHA2-512-ACC
2,372,167 UART: [kat] ECC-384
2,945,532 UART: [kat] HMAC-384Kdf
2,971,175 UART: [kat] LMS
3,447,651 UART: [kat] --
3,453,557 UART: [cold-reset] ++
3,454,685 UART: [fht] FHT @ 0x50003400
3,465,346 UART: [idev] ++
3,465,914 UART: [idev] CDI.KEYID = 6
3,466,931 UART: [idev] SUBJECT.KEYID = 7
3,468,092 UART: [idev] UDS.KEYID = 0
3,501,311 UART: [idev] Erasing UDS.KEYID = 0
5,987,454 UART: [idev] Sha1 KeyId Algorithm
6,011,814 UART: [idev] --
6,016,437 UART: [ldev] ++
6,017,024 UART: [ldev] CDI.KEYID = 6
6,017,972 UART: [ldev] SUBJECT.KEYID = 5
6,019,194 UART: [ldev] AUTHORITY.KEYID = 7
6,020,382 UART: [ldev] FE.KEYID = 1
6,057,937 UART: [ldev] Erasing FE.KEYID = 1
8,561,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,187 UART: [ldev] --
10,371,808 UART: [fwproc] Wait for Commands...
10,374,826 UART: [fwproc] Recv command 0x46574c44
10,376,818 UART: [fwproc] Recv'd Img size: 109820 bytes
13,754,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,828,111 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,870,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,199,338 >>> mbox cmd response: success
14,203,229 UART: [afmc] ++
14,203,844 UART: [afmc] CDI.KEYID = 6
14,204,761 UART: [afmc] SUBJECT.KEYID = 7
14,205,981 UART: [afmc] AUTHORITY.KEYID = 5
16,746,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,056 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,506,907 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,522,901 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,538,512 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,563,706 UART: [afmc] --
18,567,648 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,568,023 UART: [cold-reset] --
18,571,600 UART: [state] Locking Datavault
18,577,549 UART: [state] Locking PCR0, PCR1 and PCR31
18,579,310 UART: [state] Locking ICCM
18,580,333 UART: [exit] Launching FMC @ 0x40000000
18,588,695 UART:
18,588,936 UART: Running Caliptra FMC ...
18,590,038 UART:
18,590,211 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,600,060 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
2,218,701 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,099,905 >>> mbox cmd response: success
18,369,227 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,382,412 UART:
18,382,756 UART: Running Caliptra FMC ...
18,383,941 UART:
18,384,121 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,393,786 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
2,229,135 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,368,014 UART:
2,368,434 UART: Running Caliptra ROM ...
2,369,514 UART:
2,369,666 UART: [state] CFI Enabled
2,370,527 UART: [state] LifecycleState = Unprovisioned
2,372,186 UART: [state] DebugLocked = No
2,373,231 UART: [state] WD Timer not started. Device not locked for debugging
2,375,695 UART: [kat] SHA2-256
2,376,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,379,360 UART: [kat] ++
2,379,807 UART: [kat] sha1
2,380,311 UART: [kat] SHA2-256
2,380,964 UART: [kat] SHA2-384
2,381,615 UART: [kat] SHA2-512-ACC
2,382,409 UART: [kat] ECC-384
3,279,048 UART: [kat] HMAC-384Kdf
3,291,881 UART: [kat] LMS
3,768,387 UART: [kat] --
3,774,377 UART: [cold-reset] ++
3,776,522 UART: [fht] FHT @ 0x50003400
3,788,194 UART: [idev] ++
3,788,848 UART: [idev] CDI.KEYID = 6
3,789,752 UART: [idev] SUBJECT.KEYID = 7
3,790,972 UART: [idev] UDS.KEYID = 0
3,807,730 UART: [idev] Erasing UDS.KEYID = 0
6,272,024 UART: [idev] Sha1 KeyId Algorithm
6,295,192 UART: [idev] --
6,299,559 UART: [ldev] ++
6,300,125 UART: [ldev] CDI.KEYID = 6
6,301,059 UART: [ldev] SUBJECT.KEYID = 5
6,302,268 UART: [ldev] AUTHORITY.KEYID = 7
6,303,497 UART: [ldev] FE.KEYID = 1
6,315,118 UART: [ldev] Erasing FE.KEYID = 1
8,792,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,930 UART: [ldev] --
10,588,417 UART: [fwproc] Wait for Commands...
10,590,179 UART: [fwproc] Recv command 0x46574c44
10,592,182 UART: [fwproc] Recv'd Img size: 109820 bytes
13,975,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,049,508 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,091,970 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,420,431 >>> mbox cmd response: success
14,424,156 UART: [afmc] ++
14,424,797 UART: [afmc] CDI.KEYID = 6
14,425,705 UART: [afmc] SUBJECT.KEYID = 7
14,426,915 UART: [afmc] AUTHORITY.KEYID = 5
16,934,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,656,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,658,230 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,674,079 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,690,033 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,705,685 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,729,688 UART: [afmc] --
18,733,829 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,734,191 UART: [cold-reset] --
18,739,106 UART: [state] Locking Datavault
18,743,757 UART: [state] Locking PCR0, PCR1 and PCR31
18,745,507 UART: [state] Locking ICCM
18,746,767 UART: [exit] Launching FMC @ 0x40000000
18,755,102 UART:
18,755,345 UART: Running Caliptra FMC ...
18,756,368 UART:
18,756,510 UART: [fmc] Received command: 0x10000003
* TESTCASE PASSED
18,766,429 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,072 writing to cptra_bootfsm_go
2,240,172 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,317,997 >>> mbox cmd response: success
18,555,136 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,569,373 UART:
18,569,736 UART: Running Caliptra FMC ...
18,570,918 UART:
18,571,108 UART: [fmc] Received command: 0x10000003
18,580,466 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,757 UART: [kat] SHA2-512-ACC
906,658 UART: [kat] ECC-384
916,265 UART: [kat] HMAC-384Kdf
920,961 UART: [kat] LMS
1,169,273 UART: [kat] --
1,170,238 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,592 UART: [idev] ++
1,173,760 UART: [idev] CDI.KEYID = 6
1,174,121 UART: [idev] SUBJECT.KEYID = 7
1,174,546 UART: [idev] UDS.KEYID = 0
1,182,475 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,011 UART: [idev] --
1,208,938 UART: [ldev] ++
1,209,106 UART: [ldev] CDI.KEYID = 6
1,209,470 UART: [ldev] SUBJECT.KEYID = 5
1,209,897 UART: [ldev] AUTHORITY.KEYID = 7
1,210,360 UART: [ldev] FE.KEYID = 1
1,215,236 UART: [ldev] Erasing FE.KEYID = 1
1,241,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,926 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,889 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,972 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,351 >>> mbox cmd response: success
2,713,523 UART: [afmc] ++
2,713,691 UART: [afmc] CDI.KEYID = 6
2,714,054 UART: [afmc] SUBJECT.KEYID = 7
2,714,480 UART: [afmc] AUTHORITY.KEYID = 5
2,750,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,594 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,314 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,207 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,900 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,795 UART: [afmc] --
2,793,678 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,700 UART: [cold-reset] --
2,794,534 UART: [state] Locking Datavault
2,795,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,373 UART: [state] Locking ICCM
2,797,031 UART: [exit] Launching FMC @ 0x40000000
2,802,328 UART:
2,802,344 UART: Running Caliptra FMC ...
2,802,752 UART:
2,802,890 UART: [fmc] Received command: 0x10000003
2,812,366 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,702 >>> mbox cmd response: success
2,621,496 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,627,523 UART:
2,627,539 UART: Running Caliptra FMC ...
2,627,947 UART:
2,628,085 UART: [fmc] Received command: 0x10000003
2,637,561 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,639 UART: [state] LifecycleState = Unprovisioned
86,294 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,371 UART: [kat] SHA2-256
902,311 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
916,958 UART: [kat] HMAC-384Kdf
921,684 UART: [kat] LMS
1,169,996 UART: [kat] --
1,170,955 UART: [cold-reset] ++
1,171,445 UART: [fht] FHT @ 0x50003400
1,174,021 UART: [idev] ++
1,174,189 UART: [idev] CDI.KEYID = 6
1,174,550 UART: [idev] SUBJECT.KEYID = 7
1,174,975 UART: [idev] UDS.KEYID = 0
1,182,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,592 UART: [idev] --
1,209,429 UART: [ldev] ++
1,209,597 UART: [ldev] CDI.KEYID = 6
1,209,961 UART: [ldev] SUBJECT.KEYID = 5
1,210,388 UART: [ldev] AUTHORITY.KEYID = 7
1,210,851 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,241,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,396 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,891 UART: [ldev] --
1,281,252 UART: [fwproc] Wait for Commands...
1,282,041 UART: [fwproc] Recv command 0x46574c44
1,282,774 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,412 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,792 >>> mbox cmd response: success
2,713,902 UART: [afmc] ++
2,714,070 UART: [afmc] CDI.KEYID = 6
2,714,433 UART: [afmc] SUBJECT.KEYID = 7
2,714,859 UART: [afmc] AUTHORITY.KEYID = 5
2,750,713 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,051 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,771 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,664 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,357 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,986 UART: [afmc] --
2,793,877 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,899 UART: [cold-reset] --
2,794,531 UART: [state] Locking Datavault
2,795,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,476 UART: [state] Locking ICCM
2,797,134 UART: [exit] Launching FMC @ 0x40000000
2,802,431 UART:
2,802,447 UART: Running Caliptra FMC ...
2,802,855 UART:
2,802,993 UART: [fmc] Received command: 0x10000003
2,812,469 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,453 >>> mbox cmd response: success
2,622,191 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,628,388 UART:
2,628,404 UART: Running Caliptra FMC ...
2,628,812 UART:
2,628,950 UART: [fmc] Received command: 0x10000003
2,638,426 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,044 UART: [kat] SHA2-256
901,984 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,493 UART: [kat] HMAC-384Kdf
920,953 UART: [kat] LMS
1,169,265 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,746 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,182,665 UART: [idev] Erasing UDS.KEYID = 0
1,199,921 UART: [idev] Sha1 KeyId Algorithm
1,208,859 UART: [idev] --
1,209,952 UART: [ldev] ++
1,210,120 UART: [ldev] CDI.KEYID = 6
1,210,484 UART: [ldev] SUBJECT.KEYID = 5
1,210,911 UART: [ldev] AUTHORITY.KEYID = 7
1,211,374 UART: [ldev] FE.KEYID = 1
1,216,450 UART: [ldev] Erasing FE.KEYID = 1
1,242,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,834 UART: [ldev] --
1,282,131 UART: [fwproc] Wait for Commands...
1,282,700 UART: [fwproc] Recv command 0x46574c44
1,283,433 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,133 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,623 >>> mbox cmd response: success
2,715,673 UART: [afmc] ++
2,715,841 UART: [afmc] CDI.KEYID = 6
2,716,204 UART: [afmc] SUBJECT.KEYID = 7
2,716,630 UART: [afmc] AUTHORITY.KEYID = 5
2,752,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,182 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,902 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,795 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,488 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,121 UART: [afmc] --
2,794,938 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,794,960 UART: [cold-reset] --
2,795,714 UART: [state] Locking Datavault
2,797,055 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,659 UART: [state] Locking ICCM
2,798,207 UART: [exit] Launching FMC @ 0x40000000
2,803,504 UART:
2,803,520 UART: Running Caliptra FMC ...
2,803,928 UART:
2,804,066 UART: [fmc] Received command: 0x10000003
2,813,542 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,938 >>> mbox cmd response: success
2,623,470 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,629,911 UART:
2,629,927 UART: Running Caliptra FMC ...
2,630,335 UART:
2,630,473 UART: [fmc] Received command: 0x10000003
2,639,949 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,426 UART: [kat] SHA2-512-ACC
906,327 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,516 UART: [kat] LMS
1,168,828 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,171 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,182,032 UART: [idev] Erasing UDS.KEYID = 0
1,198,222 UART: [idev] Sha1 KeyId Algorithm
1,207,278 UART: [idev] --
1,208,351 UART: [ldev] ++
1,208,519 UART: [ldev] CDI.KEYID = 6
1,208,883 UART: [ldev] SUBJECT.KEYID = 5
1,209,310 UART: [ldev] AUTHORITY.KEYID = 7
1,209,773 UART: [ldev] FE.KEYID = 1
1,214,921 UART: [ldev] Erasing FE.KEYID = 1
1,241,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,885 UART: [ldev] --
1,281,260 UART: [fwproc] Wait for Commands...
1,281,933 UART: [fwproc] Recv command 0x46574c44
1,282,666 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,304 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,387 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,720 >>> mbox cmd response: success
2,713,880 UART: [afmc] ++
2,714,048 UART: [afmc] CDI.KEYID = 6
2,714,411 UART: [afmc] SUBJECT.KEYID = 7
2,714,837 UART: [afmc] AUTHORITY.KEYID = 5
2,749,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,129 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,849 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,742 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,435 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,418 UART: [afmc] --
2,793,323 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,345 UART: [cold-reset] --
2,794,063 UART: [state] Locking Datavault
2,795,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,872 UART: [state] Locking ICCM
2,796,444 UART: [exit] Launching FMC @ 0x40000000
2,801,741 UART:
2,801,757 UART: Running Caliptra FMC ...
2,802,165 UART:
2,802,303 UART: [fmc] Received command: 0x10000003
2,811,779 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,615 >>> mbox cmd response: success
2,623,905 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,630,402 UART:
2,630,418 UART: Running Caliptra FMC ...
2,630,826 UART:
2,630,964 UART: [fmc] Received command: 0x10000003
2,640,440 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,299 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,952 UART: [kat] SHA2-256
901,892 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,690 UART: [cold-reset] ++
1,171,126 UART: [fht] FHT @ 0x50003400
1,173,770 UART: [idev] ++
1,173,938 UART: [idev] CDI.KEYID = 6
1,174,299 UART: [idev] SUBJECT.KEYID = 7
1,174,724 UART: [idev] UDS.KEYID = 0
1,182,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,724 UART: [ldev] ++
1,208,892 UART: [ldev] CDI.KEYID = 6
1,209,256 UART: [ldev] SUBJECT.KEYID = 5
1,209,683 UART: [ldev] AUTHORITY.KEYID = 7
1,210,146 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,752 UART: [ldev] --
1,281,105 UART: [fwproc] Wait for Commands...
1,281,772 UART: [fwproc] Recv command 0x46574c44
1,282,505 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,625 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,051 >>> mbox cmd response: success
2,713,171 UART: [afmc] ++
2,713,339 UART: [afmc] CDI.KEYID = 6
2,713,702 UART: [afmc] SUBJECT.KEYID = 7
2,714,128 UART: [afmc] AUTHORITY.KEYID = 5
2,750,076 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,088 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,808 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,701 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,394 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,219 UART: [afmc] --
2,793,108 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,793,130 UART: [cold-reset] --
2,793,824 UART: [state] Locking Datavault
2,794,855 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,459 UART: [state] Locking ICCM
2,796,121 UART: [exit] Launching FMC @ 0x40000000
2,801,418 UART:
2,801,434 UART: Running Caliptra FMC ...
2,801,842 UART:
2,801,980 UART: [fmc] Received command: 0x10000003
2,811,456 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,554 >>> mbox cmd response: success
2,620,690 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,865 UART:
2,626,881 UART: Running Caliptra FMC ...
2,627,289 UART:
2,627,427 UART: [fmc] Received command: 0x10000003
2,636,903 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,862 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,181,752 UART: [idev] Erasing UDS.KEYID = 0
1,198,604 UART: [idev] Sha1 KeyId Algorithm
1,207,406 UART: [idev] --
1,208,545 UART: [ldev] ++
1,208,713 UART: [ldev] CDI.KEYID = 6
1,209,077 UART: [ldev] SUBJECT.KEYID = 5
1,209,504 UART: [ldev] AUTHORITY.KEYID = 7
1,209,967 UART: [ldev] FE.KEYID = 1
1,215,129 UART: [ldev] Erasing FE.KEYID = 1
1,241,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,089 UART: [ldev] --
1,280,516 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 109820 bytes
2,524,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,038 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,482 >>> mbox cmd response: success
2,711,506 UART: [afmc] ++
2,711,674 UART: [afmc] CDI.KEYID = 6
2,712,037 UART: [afmc] SUBJECT.KEYID = 7
2,712,463 UART: [afmc] AUTHORITY.KEYID = 5
2,747,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,399 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,119 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,012 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,705 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,614 UART: [afmc] --
2,791,493 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,791,515 UART: [cold-reset] --
2,792,217 UART: [state] Locking Datavault
2,793,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,942 UART: [state] Locking ICCM
2,794,508 UART: [exit] Launching FMC @ 0x40000000
2,799,805 UART:
2,799,821 UART: Running Caliptra FMC ...
2,800,229 UART:
2,800,367 UART: [fmc] Received command: 0x10000003
2,809,843 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,391 >>> mbox cmd response: success
2,620,421 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,626,136 UART:
2,626,152 UART: Running Caliptra FMC ...
2,626,560 UART:
2,626,698 UART: [fmc] Received command: 0x10000003
2,636,174 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_fht_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,969 UART:
192,342 UART: Running Caliptra ROM ...
193,539 UART:
193,700 UART: [state] CFI Enabled
263,659 UART: [state] LifecycleState = Unprovisioned
265,608 UART: [state] DebugLocked = No
266,889 UART: [state] WD Timer not started. Device not locked for debugging
270,087 UART: [kat] SHA2-256
449,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,556 UART: [kat] ++
461,046 UART: [kat] sha1
472,260 UART: [kat] SHA2-256
474,960 UART: [kat] SHA2-384
480,082 UART: [kat] SHA2-512-ACC
482,485 UART: [kat] ECC-384
2,925,850 UART: [kat] HMAC-384Kdf
2,950,760 UART: [kat] LMS
3,427,239 UART: [kat] --
3,431,952 UART: [cold-reset] ++
3,434,329 UART: [fht] FHT @ 0x50003400
3,444,449 UART: [idev] ++
3,445,025 UART: [idev] CDI.KEYID = 6
3,446,001 UART: [idev] SUBJECT.KEYID = 7
3,447,221 UART: [idev] UDS.KEYID = 0
3,481,517 UART: [idev] Erasing UDS.KEYID = 0
5,965,152 UART: [idev] Sha1 KeyId Algorithm
5,988,562 UART: [idev] --
5,994,179 UART: [ldev] ++
5,994,754 UART: [ldev] CDI.KEYID = 6
5,995,665 UART: [ldev] SUBJECT.KEYID = 5
5,996,886 UART: [ldev] AUTHORITY.KEYID = 7
5,998,119 UART: [ldev] FE.KEYID = 1
6,037,241 UART: [ldev] Erasing FE.KEYID = 1
8,542,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,867 UART: [ldev] --
10,352,769 UART: [fwproc] Wait for Commands...
10,355,522 UART: [fwproc] Recv command 0x46574c44
10,357,570 UART: Invalid Img size: 131073 bytes
10,360,141 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,407 UART:
192,790 UART: Running Caliptra ROM ...
193,908 UART:
603,439 UART: [state] CFI Enabled
619,244 UART: [state] LifecycleState = Unprovisioned
621,182 UART: [state] DebugLocked = No
622,748 UART: [state] WD Timer not started. Device not locked for debugging
626,537 UART: [kat] SHA2-256
806,170 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,958 UART: [kat] ++
817,430 UART: [kat] sha1
828,408 UART: [kat] SHA2-256
831,096 UART: [kat] SHA2-384
836,751 UART: [kat] SHA2-512-ACC
839,091 UART: [kat] ECC-384
3,278,608 UART: [kat] HMAC-384Kdf
3,289,947 UART: [kat] LMS
3,766,446 UART: [kat] --
3,771,516 UART: [cold-reset] ++
3,772,695 UART: [fht] FHT @ 0x50003400
3,784,378 UART: [idev] ++
3,784,939 UART: [idev] CDI.KEYID = 6
3,785,920 UART: [idev] SUBJECT.KEYID = 7
3,787,141 UART: [idev] UDS.KEYID = 0
3,802,740 UART: [idev] Erasing UDS.KEYID = 0
6,267,044 UART: [idev] Sha1 KeyId Algorithm
6,291,625 UART: [idev] --
6,296,081 UART: [ldev] ++
6,296,662 UART: [ldev] CDI.KEYID = 6
6,297,568 UART: [ldev] SUBJECT.KEYID = 5
6,298,777 UART: [ldev] AUTHORITY.KEYID = 7
6,300,055 UART: [ldev] FE.KEYID = 1
6,310,754 UART: [ldev] Erasing FE.KEYID = 1
8,784,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,258 UART: [ldev] --
10,576,692 UART: [fwproc] Wait for Commands...
10,578,687 UART: [fwproc] Recv command 0x46574c44
10,580,734 UART: Invalid Img size: 131073 bytes
10,584,057 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
916,135 UART: [kat] HMAC-384Kdf
920,771 UART: [kat] LMS
1,169,083 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,440 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,319 UART: [idev] Sha1 KeyId Algorithm
1,207,217 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,214,932 UART: [ldev] Erasing FE.KEYID = 1
1,241,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,749 UART: [fwproc] Wait for Commands...
1,281,526 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: Invalid Img size: 131073 bytes
1,283,226 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,667 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,182,380 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,492 UART: [idev] --
1,209,545 UART: [ldev] ++
1,209,713 UART: [ldev] CDI.KEYID = 6
1,210,077 UART: [ldev] SUBJECT.KEYID = 5
1,210,504 UART: [ldev] AUTHORITY.KEYID = 7
1,210,967 UART: [ldev] FE.KEYID = 1
1,215,933 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,837 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,923 UART: [fwproc] Recv command 0x46574c44
1,283,657 UART: Invalid Img size: 131073 bytes
1,284,611 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,488 UART: [state] LifecycleState = Unprovisioned
86,143 UART: [state] DebugLocked = No
86,647 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,764 UART: [kat] SHA2-256
901,704 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,879 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,170,074 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,337 UART: [idev] Sha1 KeyId Algorithm
1,208,219 UART: [idev] --
1,209,152 UART: [ldev] ++
1,209,320 UART: [ldev] CDI.KEYID = 6
1,209,684 UART: [ldev] SUBJECT.KEYID = 5
1,210,111 UART: [ldev] AUTHORITY.KEYID = 7
1,210,574 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,384 UART: [ldev] --
1,280,679 UART: [fwproc] Wait for Commands...
1,281,434 UART: [fwproc] Recv command 0x46574c44
1,282,168 UART: Invalid Img size: 131073 bytes
1,283,160 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,169,635 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,173,035 UART: [idev] ++
1,173,203 UART: [idev] CDI.KEYID = 6
1,173,564 UART: [idev] SUBJECT.KEYID = 7
1,173,989 UART: [idev] UDS.KEYID = 0
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,726 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,203 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,386 UART: [fwproc] Wait for Commands...
1,282,153 UART: [fwproc] Recv command 0x46574c44
1,282,887 UART: Invalid Img size: 131073 bytes
1,283,881 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,524 UART: [state] LifecycleState = Unprovisioned
86,179 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
891,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,789 UART: [kat] LMS
1,169,101 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,314 UART: [fht] FHT @ 0x50003400
1,173,052 UART: [idev] ++
1,173,220 UART: [idev] CDI.KEYID = 6
1,173,581 UART: [idev] SUBJECT.KEYID = 7
1,174,006 UART: [idev] UDS.KEYID = 0
1,181,605 UART: [idev] Erasing UDS.KEYID = 0
1,198,221 UART: [idev] Sha1 KeyId Algorithm
1,206,987 UART: [idev] --
1,207,810 UART: [ldev] ++
1,207,978 UART: [ldev] CDI.KEYID = 6
1,208,342 UART: [ldev] SUBJECT.KEYID = 5
1,208,769 UART: [ldev] AUTHORITY.KEYID = 7
1,209,232 UART: [ldev] FE.KEYID = 1
1,214,406 UART: [ldev] Erasing FE.KEYID = 1
1,240,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,864 UART: [ldev] --
1,280,191 UART: [fwproc] Wait for Commands...
1,280,938 UART: [fwproc] Recv command 0x46574c44
1,281,672 UART: Invalid Img size: 131073 bytes
1,282,906 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,530 UART: [kat] LMS
1,168,842 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,501 UART: [fht] FHT @ 0x50003400
1,173,141 UART: [idev] ++
1,173,309 UART: [idev] CDI.KEYID = 6
1,173,670 UART: [idev] SUBJECT.KEYID = 7
1,174,095 UART: [idev] UDS.KEYID = 0
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,198,920 UART: [idev] Sha1 KeyId Algorithm
1,207,754 UART: [idev] --
1,208,843 UART: [ldev] ++
1,209,011 UART: [ldev] CDI.KEYID = 6
1,209,375 UART: [ldev] SUBJECT.KEYID = 5
1,209,802 UART: [ldev] AUTHORITY.KEYID = 7
1,210,265 UART: [ldev] FE.KEYID = 1
1,215,609 UART: [ldev] Erasing FE.KEYID = 1
1,242,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,967 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,282,029 UART: [fwproc] Recv command 0x46574c44
1,282,763 UART: Invalid Img size: 131073 bytes
1,283,851 UART: ROM Fatal Error: 0x01020002
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_fmcalias_derivation::test_firmware_gt_max_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,232,481 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,372,039 UART:
2,372,470 UART: Running Caliptra ROM ...
2,373,635 UART:
2,373,812 UART: [state] CFI Enabled
2,374,794 UART: [state] LifecycleState = Unprovisioned
2,376,457 UART: [state] DebugLocked = No
2,377,566 UART: [state] WD Timer not started. Device not locked for debugging
2,380,040 UART: [kat] SHA2-256
2,380,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,383,725 UART: [kat] ++
2,384,185 UART: [kat] sha1
2,384,709 UART: [kat] SHA2-256
2,385,451 UART: [kat] SHA2-384
2,386,125 UART: [kat] SHA2-512-ACC
2,386,962 UART: [kat] ECC-384
2,948,284 UART: [kat] HMAC-384Kdf
2,971,201 UART: [kat] LMS
3,447,715 UART: [kat] --
3,450,310 UART: [cold-reset] ++
3,452,303 UART: [fht] FHT @ 0x50003400
3,465,299 UART: [idev] ++
3,465,876 UART: [idev] CDI.KEYID = 6
3,466,847 UART: [idev] SUBJECT.KEYID = 7
3,468,068 UART: [idev] UDS.KEYID = 0
3,500,312 UART: [idev] Erasing UDS.KEYID = 0
5,983,530 UART: [idev] Sha1 KeyId Algorithm
6,007,580 UART: [idev] --
6,014,027 UART: [ldev] ++
6,014,613 UART: [ldev] CDI.KEYID = 6
6,015,531 UART: [ldev] SUBJECT.KEYID = 5
6,016,699 UART: [ldev] AUTHORITY.KEYID = 7
6,018,000 UART: [ldev] FE.KEYID = 1
6,056,971 UART: [ldev] Erasing FE.KEYID = 1
8,563,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,477 UART: [ldev] --
10,373,378 UART: [fwproc] Wait for Commands...
10,375,700 UART: [fwproc] Recv command 0x46574c44
10,377,693 UART: [fwproc] Recv'd Img size: 109820 bytes
14,826,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,903,045 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,945,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,273,780 >>> mbox cmd response: success
15,278,440 UART: [afmc] ++
15,279,034 UART: [afmc] CDI.KEYID = 6
15,279,927 UART: [afmc] SUBJECT.KEYID = 7
15,281,200 UART: [afmc] AUTHORITY.KEYID = 5
17,812,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,532,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,534,587 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,550,273 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,566,350 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,581,973 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,605,694 UART: [afmc] --
19,609,837 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,610,228 UART: [cold-reset] --
19,614,076 UART: [state] Locking Datavault
19,618,789 UART: [state] Locking PCR0, PCR1 and PCR31
19,620,547 UART: [state] Locking ICCM
19,621,841 UART: [exit] Launching FMC @ 0x40000000
19,630,188 UART:
19,630,438 UART: Running Caliptra FMC ...
19,631,550 UART:
19,631,723 UART: [fmc] Received command: 0x10000002
19,633,627 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,218,103 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,286,589 >>> mbox cmd response: success
19,563,311 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,578,706 UART:
19,579,052 UART: Running Caliptra FMC ...
19,580,234 UART:
19,580,413 UART: [fmc] Received command: 0x10000002
19,582,076 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
2,229,742 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,368,761 UART:
2,369,169 UART: Running Caliptra ROM ...
2,370,338 UART:
2,370,509 UART: [state] CFI Enabled
2,371,379 UART: [state] LifecycleState = Unprovisioned
2,373,039 UART: [state] DebugLocked = No
2,374,154 UART: [state] WD Timer not started. Device not locked for debugging
2,376,623 UART: [kat] SHA2-256
2,377,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,380,303 UART: [kat] ++
2,380,753 UART: [kat] sha1
2,381,327 UART: [kat] SHA2-256
2,382,013 UART: [kat] SHA2-384
2,382,671 UART: [kat] SHA2-512-ACC
2,383,491 UART: [kat] ECC-384
3,273,056 UART: [kat] HMAC-384Kdf
3,284,925 UART: [kat] LMS
3,761,442 UART: [kat] --
3,766,349 UART: [cold-reset] ++
3,768,058 UART: [fht] FHT @ 0x50003400
3,778,601 UART: [idev] ++
3,779,224 UART: [idev] CDI.KEYID = 6
3,780,183 UART: [idev] SUBJECT.KEYID = 7
3,781,391 UART: [idev] UDS.KEYID = 0
3,799,903 UART: [idev] Erasing UDS.KEYID = 0
6,266,536 UART: [idev] Sha1 KeyId Algorithm
6,290,892 UART: [idev] --
6,295,926 UART: [ldev] ++
6,296,496 UART: [ldev] CDI.KEYID = 6
6,297,432 UART: [ldev] SUBJECT.KEYID = 5
6,298,639 UART: [ldev] AUTHORITY.KEYID = 7
6,299,864 UART: [ldev] FE.KEYID = 1
6,314,214 UART: [ldev] Erasing FE.KEYID = 1
8,792,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,988 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,593 UART: [ldev] --
10,590,339 UART: [fwproc] Wait for Commands...
10,592,484 UART: [fwproc] Recv command 0x46574c44
10,594,521 UART: [fwproc] Recv'd Img size: 109820 bytes
15,024,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,108,320 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,150,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,478,457 >>> mbox cmd response: success
15,482,854 UART: [afmc] ++
15,483,499 UART: [afmc] CDI.KEYID = 6
15,484,410 UART: [afmc] SUBJECT.KEYID = 7
15,485,624 UART: [afmc] AUTHORITY.KEYID = 5
17,990,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,712,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,714,483 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
19,730,203 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
19,746,240 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
19,761,937 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
19,786,875 UART: [afmc] --
19,790,532 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,790,897 UART: [cold-reset] --
19,794,377 UART: [state] Locking Datavault
19,798,759 UART: [state] Locking PCR0, PCR1 and PCR31
19,800,520 UART: [state] Locking ICCM
19,802,454 UART: [exit] Launching FMC @ 0x40000000
19,810,844 UART:
19,811,077 UART: Running Caliptra FMC ...
19,812,180 UART:
19,812,337 UART: [fmc] Received command: 0x10000002
19,814,222 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,227,831 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,472,432 >>> mbox cmd response: success
19,707,066 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
19,723,752 UART:
19,724,086 UART: Running Caliptra FMC ...
19,725,193 UART:
19,725,339 UART: [fmc] Received command: 0x10000002
19,727,133 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,816 UART: [kat] SHA2-256
891,366 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,470 UART: [kat] ++
895,622 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
920,765 UART: [kat] LMS
1,169,077 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,630 UART: [fht] FHT @ 0x50003400
1,173,246 UART: [idev] ++
1,173,414 UART: [idev] CDI.KEYID = 6
1,173,775 UART: [idev] SUBJECT.KEYID = 7
1,174,200 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,547 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,566 UART: [ldev] ++
1,209,734 UART: [ldev] CDI.KEYID = 6
1,210,098 UART: [ldev] SUBJECT.KEYID = 5
1,210,525 UART: [ldev] AUTHORITY.KEYID = 7
1,210,988 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,242,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,946 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,477 UART: [fwproc] Recv'd Img size: 109820 bytes
3,064,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,093,127 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,111,210 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,251,539 >>> mbox cmd response: success
3,252,759 UART: [afmc] ++
3,252,927 UART: [afmc] CDI.KEYID = 6
3,253,290 UART: [afmc] SUBJECT.KEYID = 7
3,253,716 UART: [afmc] AUTHORITY.KEYID = 5
3,288,696 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,304,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,305,728 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,311,405 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,317,298 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,323,008 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,330,940 UART: [afmc] --
3,331,767 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,331,789 UART: [cold-reset] --
3,332,675 UART: [state] Locking Datavault
3,333,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,334,360 UART: [state] Locking ICCM
3,334,830 UART: [exit] Launching FMC @ 0x40000000
3,340,127 UART:
3,340,143 UART: Running Caliptra FMC ...
3,340,551 UART:
3,340,689 UART: [fmc] Received command: 0x10000002
3,342,433 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,116,517 >>> mbox cmd response: success
3,171,969 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,178,232 UART:
3,178,248 UART: Running Caliptra FMC ...
3,178,656 UART:
3,178,794 UART: [fmc] Received command: 0x10000002
3,180,538 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
891,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,883 UART: [kat] ++
896,035 UART: [kat] sha1
900,407 UART: [kat] SHA2-256
902,347 UART: [kat] SHA2-384
905,074 UART: [kat] SHA2-512-ACC
906,975 UART: [kat] ECC-384
917,044 UART: [kat] HMAC-384Kdf
921,674 UART: [kat] LMS
1,169,986 UART: [kat] --
1,170,663 UART: [cold-reset] ++
1,171,091 UART: [fht] FHT @ 0x50003400
1,173,767 UART: [idev] ++
1,173,935 UART: [idev] CDI.KEYID = 6
1,174,296 UART: [idev] SUBJECT.KEYID = 7
1,174,721 UART: [idev] UDS.KEYID = 0
1,182,774 UART: [idev] Erasing UDS.KEYID = 0
1,199,248 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,512 UART: [fwproc] Wait for Commands...
1,282,281 UART: [fwproc] Recv command 0x46574c44
1,283,014 UART: [fwproc] Recv'd Img size: 109820 bytes
3,077,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,104,785 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,122,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,263,265 >>> mbox cmd response: success
3,264,475 UART: [afmc] ++
3,264,643 UART: [afmc] CDI.KEYID = 6
3,265,006 UART: [afmc] SUBJECT.KEYID = 7
3,265,432 UART: [afmc] AUTHORITY.KEYID = 5
3,301,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,317,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,318,550 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,324,227 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,330,120 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,335,830 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,343,628 UART: [afmc] --
3,344,505 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,344,527 UART: [cold-reset] --
3,345,409 UART: [state] Locking Datavault
3,346,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,347,250 UART: [state] Locking ICCM
3,347,880 UART: [exit] Launching FMC @ 0x40000000
3,353,177 UART:
3,353,193 UART: Running Caliptra FMC ...
3,353,601 UART:
3,353,739 UART: [fmc] Received command: 0x10000002
3,355,483 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,112,106 >>> mbox cmd response: success
3,167,712 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,173,989 UART:
3,174,005 UART: Running Caliptra FMC ...
3,174,413 UART:
3,174,551 UART: [fmc] Received command: 0x10000002
3,176,295 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,083 UART: [kat] SHA2-512-ACC
905,984 UART: [kat] ECC-384
915,507 UART: [kat] HMAC-384Kdf
920,243 UART: [kat] LMS
1,168,555 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,674 UART: [idev] ++
1,172,842 UART: [idev] CDI.KEYID = 6
1,173,203 UART: [idev] SUBJECT.KEYID = 7
1,173,628 UART: [idev] UDS.KEYID = 0
1,181,985 UART: [idev] Erasing UDS.KEYID = 0
1,197,513 UART: [idev] Sha1 KeyId Algorithm
1,206,557 UART: [idev] --
1,207,670 UART: [ldev] ++
1,207,838 UART: [ldev] CDI.KEYID = 6
1,208,202 UART: [ldev] SUBJECT.KEYID = 5
1,208,629 UART: [ldev] AUTHORITY.KEYID = 7
1,209,092 UART: [ldev] FE.KEYID = 1
1,214,254 UART: [ldev] Erasing FE.KEYID = 1
1,240,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,752 UART: [ldev] --
1,280,207 UART: [fwproc] Wait for Commands...
1,280,906 UART: [fwproc] Recv command 0x46574c44
1,281,639 UART: [fwproc] Recv'd Img size: 109820 bytes
3,067,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,095,623 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,113,706 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,253,985 >>> mbox cmd response: success
3,255,009 UART: [afmc] ++
3,255,177 UART: [afmc] CDI.KEYID = 6
3,255,540 UART: [afmc] SUBJECT.KEYID = 7
3,255,966 UART: [afmc] AUTHORITY.KEYID = 5
3,290,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,307,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,307,790 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,313,467 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,319,360 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,325,070 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,332,926 UART: [afmc] --
3,333,881 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,333,903 UART: [cold-reset] --
3,334,539 UART: [state] Locking Datavault
3,335,518 UART: [state] Locking PCR0, PCR1 and PCR31
3,336,122 UART: [state] Locking ICCM
3,336,716 UART: [exit] Launching FMC @ 0x40000000
3,342,013 UART:
3,342,029 UART: Running Caliptra FMC ...
3,342,437 UART:
3,342,575 UART: [fmc] Received command: 0x10000002
3,344,319 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,112,112 >>> mbox cmd response: success
3,167,940 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,174,527 UART:
3,174,543 UART: Running Caliptra FMC ...
3,174,951 UART:
3,175,089 UART: [fmc] Received command: 0x10000002
3,176,833 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,095 UART: [state] LifecycleState = Unprovisioned
85,750 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,649 UART: [kat] SHA2-256
891,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,303 UART: [kat] ++
895,455 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,410 UART: [kat] SHA2-512-ACC
906,311 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,717 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,181,616 UART: [idev] Erasing UDS.KEYID = 0
1,198,640 UART: [idev] Sha1 KeyId Algorithm
1,207,364 UART: [idev] --
1,208,413 UART: [ldev] ++
1,208,581 UART: [ldev] CDI.KEYID = 6
1,208,945 UART: [ldev] SUBJECT.KEYID = 5
1,209,372 UART: [ldev] AUTHORITY.KEYID = 7
1,209,835 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46574c44
1,282,528 UART: [fwproc] Recv'd Img size: 109820 bytes
3,065,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,094,787 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,112,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,253,025 >>> mbox cmd response: success
3,254,077 UART: [afmc] ++
3,254,245 UART: [afmc] CDI.KEYID = 6
3,254,608 UART: [afmc] SUBJECT.KEYID = 7
3,255,034 UART: [afmc] AUTHORITY.KEYID = 5
3,290,616 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,307,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,308,078 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,313,755 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,319,648 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,325,358 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,333,176 UART: [afmc] --
3,333,985 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,334,007 UART: [cold-reset] --
3,334,913 UART: [state] Locking Datavault
3,336,120 UART: [state] Locking PCR0, PCR1 and PCR31
3,336,724 UART: [state] Locking ICCM
3,337,154 UART: [exit] Launching FMC @ 0x40000000
3,342,451 UART:
3,342,467 UART: Running Caliptra FMC ...
3,342,875 UART:
3,343,013 UART: [fmc] Received command: 0x10000002
3,344,757 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,110,954 >>> mbox cmd response: success
3,167,088 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,173,401 UART:
3,173,417 UART: Running Caliptra FMC ...
3,173,825 UART:
3,173,963 UART: [fmc] Received command: 0x10000002
3,175,707 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,582 UART: [kat] SHA2-256
901,522 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,787 UART: [kat] LMS
1,169,099 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,182,307 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,373 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,978 UART: [ldev] SUBJECT.KEYID = 5
1,210,405 UART: [ldev] AUTHORITY.KEYID = 7
1,210,868 UART: [ldev] FE.KEYID = 1
1,215,818 UART: [ldev] Erasing FE.KEYID = 1
1,242,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,904 UART: [ldev] --
1,281,195 UART: [fwproc] Wait for Commands...
1,281,862 UART: [fwproc] Recv command 0x46574c44
1,282,595 UART: [fwproc] Recv'd Img size: 109820 bytes
3,071,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,098,908 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,116,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,257,356 >>> mbox cmd response: success
3,258,390 UART: [afmc] ++
3,258,558 UART: [afmc] CDI.KEYID = 6
3,258,921 UART: [afmc] SUBJECT.KEYID = 7
3,259,347 UART: [afmc] AUTHORITY.KEYID = 5
3,295,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,311,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,312,431 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,318,108 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,324,001 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,329,711 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,337,291 UART: [afmc] --
3,338,164 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,338,186 UART: [cold-reset] --
3,339,080 UART: [state] Locking Datavault
3,340,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,341,119 UART: [state] Locking ICCM
3,341,559 UART: [exit] Launching FMC @ 0x40000000
3,346,856 UART:
3,346,872 UART: Running Caliptra FMC ...
3,347,280 UART:
3,347,418 UART: [fmc] Received command: 0x10000002
3,349,162 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,114,102 >>> mbox cmd response: success
3,170,208 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,176,451 UART:
3,176,467 UART: Running Caliptra FMC ...
3,176,875 UART:
3,177,013 UART: [fmc] Received command: 0x10000002
3,178,757 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,170,307 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,281 UART: [idev] ++
1,173,449 UART: [idev] CDI.KEYID = 6
1,173,810 UART: [idev] SUBJECT.KEYID = 7
1,174,235 UART: [idev] UDS.KEYID = 0
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,674 UART: [idev] Sha1 KeyId Algorithm
1,208,520 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,049 UART: [ldev] SUBJECT.KEYID = 5
1,210,476 UART: [ldev] AUTHORITY.KEYID = 7
1,210,939 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,241,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,841 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,819 UART: [fwproc] Recv command 0x46574c44
1,282,552 UART: [fwproc] Recv'd Img size: 109820 bytes
3,066,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,094,667 UART: [fwproc] Load FMC at address 0x40000000 len 11316
3,112,750 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,253,037 >>> mbox cmd response: success
3,254,169 UART: [afmc] ++
3,254,337 UART: [afmc] CDI.KEYID = 6
3,254,700 UART: [afmc] SUBJECT.KEYID = 7
3,255,126 UART: [afmc] AUTHORITY.KEYID = 5
3,291,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,308,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,308,904 UART: [afmc] PUB.X = CC00BF1225EC10003D98AE5DB2D387DCBEA0829425EA34FD4344E50531ECB1BC550683FBDEC11C8532337633D558DA06
3,314,581 UART: [afmc] PUB.Y = 164D921CFDE2C2D2D5FFB945D94FD5C6E66EAB946EB32EA24692E15935FF09B01774188C8D96C5D4B112385B86F03C7C
3,320,474 UART: [afmc] SIG.R = B7C602BE831637BD3398FDF7ADD7324E20BF2431F8C774CDD2F517EFDACEC5451BC2F018D3BA0A220E0372A3A2C7AD10
3,326,184 UART: [afmc] SIG.S = 6671DBF2FB20A06B93D7519BFF733774EB277F6891C3AFBBDBB069C0D666A04168AF001ADF37ABE6B9463D19726221FC
3,333,888 UART: [afmc] --
3,334,777 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,334,799 UART: [cold-reset] --
3,335,839 UART: [state] Locking Datavault
3,336,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,337,502 UART: [state] Locking ICCM
3,338,166 UART: [exit] Launching FMC @ 0x40000000
3,343,463 UART:
3,343,479 UART: Running Caliptra FMC ...
3,343,887 UART:
3,344,025 UART: [fmc] Received command: 0x10000002
3,345,769 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,109,340 >>> mbox cmd response: success
3,166,126 <<< Executing mbox cmd 0x10000002 (0 bytes) from SoC
3,172,385 UART:
3,172,401 UART: Running Caliptra FMC ...
3,172,809 UART:
3,172,947 UART: [fmc] Received command: 0x10000002
3,174,691 >>> mbox cmd response data (160 bytes)
test test_fmcalias_derivation::test_fuse_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,077,570 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,223,239 UART:
2,223,655 UART: Running Caliptra ROM ...
2,224,846 UART:
2,225,027 UART: [state] CFI Enabled
2,225,997 UART: [state] LifecycleState = Unprovisioned
2,227,658 UART: [state] DebugLocked = No
2,228,777 UART: [state] WD Timer not started. Device not locked for debugging
2,231,258 UART: [kat] SHA2-256
2,231,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,235,197 UART: [kat] ++
2,235,669 UART: [kat] sha1
2,236,192 UART: [kat] SHA2-256
2,236,940 UART: [kat] SHA2-384
2,237,619 UART: [kat] SHA2-512-ACC
2,238,469 UART: [kat] ECC-384
2,947,272 UART: [kat] HMAC-384Kdf
2,971,610 UART: [kat] LMS
3,448,114 UART: [kat] --
3,453,668 UART: [cold-reset] ++
3,455,231 UART: [fht] FHT @ 0x50003400
3,464,978 UART: [idev] ++
3,465,542 UART: [idev] CDI.KEYID = 6
3,466,482 UART: [idev] SUBJECT.KEYID = 7
3,467,752 UART: [idev] UDS.KEYID = 0
3,501,228 UART: [idev] Erasing UDS.KEYID = 0
5,981,970 UART: [idev] Sha1 KeyId Algorithm
6,006,651 UART: [idev] --
6,012,520 UART: [ldev] ++
6,013,112 UART: [ldev] CDI.KEYID = 6
6,014,010 UART: [ldev] SUBJECT.KEYID = 5
6,015,232 UART: [ldev] AUTHORITY.KEYID = 7
6,016,527 UART: [ldev] FE.KEYID = 1
6,057,029 UART: [ldev] Erasing FE.KEYID = 1
8,564,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,632 UART: [ldev] --
10,373,441 UART: [fwproc] Wait for Commands...
10,376,320 UART: [fwproc] Recv command 0x46574c44
10,378,312 UART: [fwproc] Recv'd Img size: 114888 bytes
14,879,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,966,291 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,026,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,354,841 >>> mbox cmd response: success
15,359,290 UART: [afmc] ++
15,359,890 UART: [afmc] CDI.KEYID = 6
15,360,810 UART: [afmc] SUBJECT.KEYID = 7
15,362,031 UART: [afmc] AUTHORITY.KEYID = 5
17,897,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,620,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,622,499 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,638,286 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,654,234 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,669,847 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,694,807 UART: [afmc] --
19,698,533 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,698,921 UART: [cold-reset] --
19,702,333 UART: [state] Locking Datavault
19,708,604 UART: [state] Locking PCR0, PCR1 and PCR31
19,710,314 UART: [state] Locking ICCM
19,711,850 UART: [exit] Launching FMC @ 0x40000000
19,720,196 UART:
19,720,437 UART: Running Caliptra FMC ...
19,721,545 UART:
19,721,713 UART: [fmc] Received command: 0x10000000
19,724,160 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,075,558 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,296,435 >>> mbox cmd response: success
19,562,586 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,578,671 UART:
19,578,994 UART: Running Caliptra FMC ...
19,580,106 UART:
19,580,267 UART: [fmc] Received command: 0x10000000
19,582,651 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,359 writing to cptra_bootfsm_go
2,072,898 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,218,339 UART:
2,218,784 UART: Running Caliptra ROM ...
2,219,878 UART:
2,220,031 UART: [state] CFI Enabled
2,220,996 UART: [state] LifecycleState = Unprovisioned
2,222,660 UART: [state] DebugLocked = No
2,223,688 UART: [state] WD Timer not started. Device not locked for debugging
2,226,163 UART: [kat] SHA2-256
2,226,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,837 UART: [kat] ++
2,230,286 UART: [kat] sha1
2,230,793 UART: [kat] SHA2-256
2,231,535 UART: [kat] SHA2-384
2,232,200 UART: [kat] SHA2-512-ACC
2,233,035 UART: [kat] ECC-384
3,279,480 UART: [kat] HMAC-384Kdf
3,291,826 UART: [kat] LMS
3,768,337 UART: [kat] --
3,771,780 UART: [cold-reset] ++
3,772,637 UART: [fht] FHT @ 0x50003400
3,785,369 UART: [idev] ++
3,785,980 UART: [idev] CDI.KEYID = 6
3,786,911 UART: [idev] SUBJECT.KEYID = 7
3,788,172 UART: [idev] UDS.KEYID = 0
3,806,063 UART: [idev] Erasing UDS.KEYID = 0
6,270,465 UART: [idev] Sha1 KeyId Algorithm
6,293,151 UART: [idev] --
6,298,005 UART: [ldev] ++
6,298,582 UART: [ldev] CDI.KEYID = 6
6,299,540 UART: [ldev] SUBJECT.KEYID = 5
6,300,750 UART: [ldev] AUTHORITY.KEYID = 7
6,301,976 UART: [ldev] FE.KEYID = 1
6,313,704 UART: [ldev] Erasing FE.KEYID = 1
8,792,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,002 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,018 UART: [ldev] --
10,584,133 UART: [fwproc] Wait for Commands...
10,586,612 UART: [fwproc] Recv command 0x46574c44
10,588,604 UART: [fwproc] Recv'd Img size: 114888 bytes
15,103,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,184,469 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,244,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,572,837 >>> mbox cmd response: success
15,577,100 UART: [afmc] ++
15,577,694 UART: [afmc] CDI.KEYID = 6
15,578,653 UART: [afmc] SUBJECT.KEYID = 7
15,579,886 UART: [afmc] AUTHORITY.KEYID = 5
18,083,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,804,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,806,355 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
19,822,205 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
19,838,129 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
19,853,809 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
19,878,079 UART: [afmc] --
19,882,511 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,882,923 UART: [cold-reset] --
19,885,063 UART: [state] Locking Datavault
19,889,126 UART: [state] Locking PCR0, PCR1 and PCR31
19,890,824 UART: [state] Locking ICCM
19,893,360 UART: [exit] Launching FMC @ 0x40000000
19,901,750 UART:
19,901,991 UART: Running Caliptra FMC ...
19,903,112 UART:
19,903,274 UART: [fmc] Received command: 0x10000000
19,905,679 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,078,543 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,553,453 >>> mbox cmd response: success
19,788,601 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,801,577 UART:
19,801,947 UART: Running Caliptra FMC ...
19,803,163 UART:
19,803,358 UART: [fmc] Received command: 0x10000000
19,805,568 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,663 UART: [kat] SHA2-512-ACC
906,564 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,169,966 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,172,910 UART: [idev] ++
1,173,078 UART: [idev] CDI.KEYID = 6
1,173,439 UART: [idev] SUBJECT.KEYID = 7
1,173,864 UART: [idev] UDS.KEYID = 0
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,177 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,208,068 UART: [ldev] ++
1,208,236 UART: [ldev] CDI.KEYID = 6
1,208,600 UART: [ldev] SUBJECT.KEYID = 5
1,209,027 UART: [ldev] AUTHORITY.KEYID = 7
1,209,490 UART: [ldev] FE.KEYID = 1
1,214,560 UART: [ldev] Erasing FE.KEYID = 1
1,240,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,814 UART: [ldev] --
1,280,041 UART: [fwproc] Wait for Commands...
1,280,858 UART: [fwproc] Recv command 0x46574c44
1,281,591 UART: [fwproc] Recv'd Img size: 114888 bytes
3,132,066 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,160,305 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,185,990 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,175 >>> mbox cmd response: success
3,327,441 UART: [afmc] ++
3,327,609 UART: [afmc] CDI.KEYID = 6
3,327,972 UART: [afmc] SUBJECT.KEYID = 7
3,328,398 UART: [afmc] AUTHORITY.KEYID = 5
3,363,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,380,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,133 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,386,827 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,392,727 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,398,436 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,406,098 UART: [afmc] --
3,407,117 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,407,139 UART: [cold-reset] --
3,407,915 UART: [state] Locking Datavault
3,408,914 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,518 UART: [state] Locking ICCM
3,409,986 UART: [exit] Launching FMC @ 0x40000000
3,415,283 UART:
3,415,299 UART: Running Caliptra FMC ...
3,415,707 UART:
3,415,937 UART: [fmc] Received command: 0x10000000
3,418,106 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,164,317 >>> mbox cmd response: success
3,220,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,226,477 UART:
3,226,493 UART: Running Caliptra FMC ...
3,226,901 UART:
3,227,131 UART: [fmc] Received command: 0x10000000
3,229,300 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,549 UART: [kat] SHA2-256
901,489 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,564 UART: [kat] LMS
1,168,876 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,023 UART: [idev] ++
1,173,191 UART: [idev] CDI.KEYID = 6
1,173,552 UART: [idev] SUBJECT.KEYID = 7
1,173,977 UART: [idev] UDS.KEYID = 0
1,181,978 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,844 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,113 UART: [ldev] Erasing FE.KEYID = 1
1,240,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,957 UART: [ldev] --
1,280,248 UART: [fwproc] Wait for Commands...
1,280,883 UART: [fwproc] Recv command 0x46574c44
1,281,616 UART: [fwproc] Recv'd Img size: 114888 bytes
3,134,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,161,609 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,187,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,327,693 >>> mbox cmd response: success
3,328,903 UART: [afmc] ++
3,329,071 UART: [afmc] CDI.KEYID = 6
3,329,434 UART: [afmc] SUBJECT.KEYID = 7
3,329,860 UART: [afmc] AUTHORITY.KEYID = 5
3,365,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,973 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,388,667 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,394,567 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,400,276 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,407,878 UART: [afmc] --
3,408,897 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,408,919 UART: [cold-reset] --
3,409,813 UART: [state] Locking Datavault
3,411,014 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,618 UART: [state] Locking ICCM
3,412,198 UART: [exit] Launching FMC @ 0x40000000
3,417,495 UART:
3,417,511 UART: Running Caliptra FMC ...
3,417,919 UART:
3,418,149 UART: [fmc] Received command: 0x10000000
3,420,318 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,171,414 >>> mbox cmd response: success
3,227,405 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,234,010 UART:
3,234,026 UART: Running Caliptra FMC ...
3,234,434 UART:
3,234,664 UART: [fmc] Received command: 0x10000000
3,236,833 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,596 UART: [state] LifecycleState = Unprovisioned
85,251 UART: [state] DebugLocked = No
85,809 UART: [state] WD Timer not started. Device not locked for debugging
86,932 UART: [kat] SHA2-256
890,482 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,586 UART: [kat] ++
894,738 UART: [kat] sha1
899,030 UART: [kat] SHA2-256
900,970 UART: [kat] SHA2-384
903,851 UART: [kat] SHA2-512-ACC
905,752 UART: [kat] ECC-384
915,273 UART: [kat] HMAC-384Kdf
920,033 UART: [kat] LMS
1,168,345 UART: [kat] --
1,169,110 UART: [cold-reset] ++
1,169,582 UART: [fht] FHT @ 0x50003400
1,172,292 UART: [idev] ++
1,172,460 UART: [idev] CDI.KEYID = 6
1,172,821 UART: [idev] SUBJECT.KEYID = 7
1,173,246 UART: [idev] UDS.KEYID = 0
1,181,679 UART: [idev] Erasing UDS.KEYID = 0
1,198,145 UART: [idev] Sha1 KeyId Algorithm
1,207,015 UART: [idev] --
1,208,072 UART: [ldev] ++
1,208,240 UART: [ldev] CDI.KEYID = 6
1,208,604 UART: [ldev] SUBJECT.KEYID = 5
1,209,031 UART: [ldev] AUTHORITY.KEYID = 7
1,209,494 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,994 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,120 UART: [fwproc] Recv command 0x46574c44
1,281,853 UART: [fwproc] Recv'd Img size: 114888 bytes
3,128,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,156,882 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,182,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,322,778 >>> mbox cmd response: success
3,323,884 UART: [afmc] ++
3,324,052 UART: [afmc] CDI.KEYID = 6
3,324,415 UART: [afmc] SUBJECT.KEYID = 7
3,324,841 UART: [afmc] AUTHORITY.KEYID = 5
3,359,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,376,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,377,038 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,382,732 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,388,632 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,394,341 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,402,221 UART: [afmc] --
3,403,066 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,403,088 UART: [cold-reset] --
3,404,164 UART: [state] Locking Datavault
3,405,175 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,779 UART: [state] Locking ICCM
3,406,295 UART: [exit] Launching FMC @ 0x40000000
3,411,592 UART:
3,411,608 UART: Running Caliptra FMC ...
3,412,016 UART:
3,412,246 UART: [fmc] Received command: 0x10000000
3,414,415 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,179,470 >>> mbox cmd response: success
3,235,429 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,241,334 UART:
3,241,350 UART: Running Caliptra FMC ...
3,241,758 UART:
3,241,988 UART: [fmc] Received command: 0x10000000
3,244,157 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,660 UART: [kat] HMAC-384Kdf
921,464 UART: [kat] LMS
1,169,776 UART: [kat] --
1,170,543 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,182,500 UART: [idev] Erasing UDS.KEYID = 0
1,199,394 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,461 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,357 UART: [fwproc] Recv command 0x46574c44
1,283,090 UART: [fwproc] Recv'd Img size: 114888 bytes
3,120,458 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,149,405 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,175,090 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,315,243 >>> mbox cmd response: success
3,316,375 UART: [afmc] ++
3,316,543 UART: [afmc] CDI.KEYID = 6
3,316,906 UART: [afmc] SUBJECT.KEYID = 7
3,317,332 UART: [afmc] AUTHORITY.KEYID = 5
3,352,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,369,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,369,807 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,375,501 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,381,401 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,387,110 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,394,854 UART: [afmc] --
3,395,879 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,395,901 UART: [cold-reset] --
3,396,635 UART: [state] Locking Datavault
3,397,964 UART: [state] Locking PCR0, PCR1 and PCR31
3,398,568 UART: [state] Locking ICCM
3,399,126 UART: [exit] Launching FMC @ 0x40000000
3,404,423 UART:
3,404,439 UART: Running Caliptra FMC ...
3,404,847 UART:
3,405,077 UART: [fmc] Received command: 0x10000000
3,407,246 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,178,965 >>> mbox cmd response: success
3,235,362 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,241,751 UART:
3,241,767 UART: Running Caliptra FMC ...
3,242,175 UART:
3,242,405 UART: [fmc] Received command: 0x10000000
3,244,574 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,908 UART: [kat] SHA2-256
901,848 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,609 UART: [kat] LMS
1,168,921 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,303 UART: [idev] Sha1 KeyId Algorithm
1,207,113 UART: [idev] --
1,208,196 UART: [ldev] ++
1,208,364 UART: [ldev] CDI.KEYID = 6
1,208,728 UART: [ldev] SUBJECT.KEYID = 5
1,209,155 UART: [ldev] AUTHORITY.KEYID = 7
1,209,618 UART: [ldev] FE.KEYID = 1
1,214,710 UART: [ldev] Erasing FE.KEYID = 1
1,240,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,376 UART: [ldev] --
1,279,699 UART: [fwproc] Wait for Commands...
1,280,336 UART: [fwproc] Recv command 0x46574c44
1,281,069 UART: [fwproc] Recv'd Img size: 114888 bytes
3,123,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,150,016 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,175,701 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,316,086 >>> mbox cmd response: success
3,317,286 UART: [afmc] ++
3,317,454 UART: [afmc] CDI.KEYID = 6
3,317,817 UART: [afmc] SUBJECT.KEYID = 7
3,318,243 UART: [afmc] AUTHORITY.KEYID = 5
3,353,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,370,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,370,936 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,376,630 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,382,530 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,388,239 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,395,957 UART: [afmc] --
3,396,760 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,396,782 UART: [cold-reset] --
3,397,726 UART: [state] Locking Datavault
3,398,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,399,479 UART: [state] Locking ICCM
3,400,111 UART: [exit] Launching FMC @ 0x40000000
3,405,408 UART:
3,405,424 UART: Running Caliptra FMC ...
3,405,832 UART:
3,406,062 UART: [fmc] Received command: 0x10000000
3,408,231 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,171,894 >>> mbox cmd response: success
3,227,371 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,233,704 UART:
3,233,720 UART: Running Caliptra FMC ...
3,234,128 UART:
3,234,358 UART: [fmc] Received command: 0x10000000
3,236,527 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,439 UART: [kat] SHA2-256
902,379 UART: [kat] SHA2-384
905,332 UART: [kat] SHA2-512-ACC
907,233 UART: [kat] ECC-384
916,790 UART: [kat] HMAC-384Kdf
921,444 UART: [kat] LMS
1,169,756 UART: [kat] --
1,170,753 UART: [cold-reset] ++
1,171,089 UART: [fht] FHT @ 0x50003400
1,173,967 UART: [idev] ++
1,174,135 UART: [idev] CDI.KEYID = 6
1,174,496 UART: [idev] SUBJECT.KEYID = 7
1,174,921 UART: [idev] UDS.KEYID = 0
1,183,040 UART: [idev] Erasing UDS.KEYID = 0
1,200,138 UART: [idev] Sha1 KeyId Algorithm
1,208,984 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,425 UART: [ldev] SUBJECT.KEYID = 5
1,210,852 UART: [ldev] AUTHORITY.KEYID = 7
1,211,315 UART: [ldev] FE.KEYID = 1
1,216,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,896 UART: [fwproc] Wait for Commands...
1,282,699 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 114888 bytes
3,127,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,154,940 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,180,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,320,796 >>> mbox cmd response: success
3,321,894 UART: [afmc] ++
3,322,062 UART: [afmc] CDI.KEYID = 6
3,322,425 UART: [afmc] SUBJECT.KEYID = 7
3,322,851 UART: [afmc] AUTHORITY.KEYID = 5
3,358,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,394 UART: [afmc] PUB.X = 96EDDD8A053E44118806A51381D9B19BA592E4B40E399B0823F6A9613C2446F40268492816E2E5B75BE8E63E07C5915E
3,381,088 UART: [afmc] PUB.Y = 1773A2A5517DD8D1D561EED9B8D3FCD5AFEEBCD2C7B392FAEFD0CF9C8C6C04F5A4544A75E67B805D3C62C2A69294B597
3,386,988 UART: [afmc] SIG.R = 4EF062FFA5297E6D0D12DF4271A733CE3BFA3B79DF6F3559077D343D89225923ADF9BE2378FC2489A87B77B3791592DB
3,392,697 UART: [afmc] SIG.S = 54DFB7F4916A9394CBEF4B3A66614D36233CE7D6B61A933D9EFFB7893943F5936D7B81BF5B20FA4CDD9C3D1B035838D9
3,400,471 UART: [afmc] --
3,401,290 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,401,312 UART: [cold-reset] --
3,402,230 UART: [state] Locking Datavault
3,403,477 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,081 UART: [state] Locking ICCM
3,404,725 UART: [exit] Launching FMC @ 0x40000000
3,410,022 UART:
3,410,038 UART: Running Caliptra FMC ...
3,410,446 UART:
3,410,676 UART: [fmc] Received command: 0x10000000
3,412,845 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,184,219 >>> mbox cmd response: success
3,240,166 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,246,585 UART:
3,246,601 UART: Running Caliptra FMC ...
3,247,009 UART:
3,247,239 UART: [fmc] Received command: 0x10000000
3,249,408 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
2,065,935 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,211,760 UART:
2,212,175 UART: Running Caliptra ROM ...
2,213,331 UART:
2,213,507 UART: [state] CFI Enabled
2,214,588 UART: [state] LifecycleState = Unprovisioned
2,216,266 UART: [state] DebugLocked = No
2,217,332 UART: [state] WD Timer not started. Device not locked for debugging
2,219,810 UART: [kat] SHA2-256
2,220,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,223,498 UART: [kat] ++
2,223,979 UART: [kat] sha1
2,224,507 UART: [kat] SHA2-256
2,225,250 UART: [kat] SHA2-384
2,225,922 UART: [kat] SHA2-512-ACC
2,226,758 UART: [kat] ECC-384
2,949,357 UART: [kat] HMAC-384Kdf
2,964,340 UART: [kat] LMS
3,440,811 UART: [kat] --
3,445,398 UART: [cold-reset] ++
3,447,278 UART: [fht] FHT @ 0x50003400
3,458,599 UART: [idev] ++
3,459,207 UART: [idev] CDI.KEYID = 6
3,460,126 UART: [idev] SUBJECT.KEYID = 7
3,461,346 UART: [idev] UDS.KEYID = 0
3,494,174 UART: [idev] Erasing UDS.KEYID = 0
5,976,732 UART: [idev] Sha1 KeyId Algorithm
5,999,883 UART: [idev] --
6,005,290 UART: [ldev] ++
6,005,872 UART: [ldev] CDI.KEYID = 6
6,006,790 UART: [ldev] SUBJECT.KEYID = 5
6,007,956 UART: [ldev] AUTHORITY.KEYID = 7
6,009,417 UART: [ldev] FE.KEYID = 1
6,050,516 UART: [ldev] Erasing FE.KEYID = 1
8,555,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,566 UART: [ldev] --
10,369,646 UART: [fwproc] Wait for Commands...
10,371,645 UART: [fwproc] Recv command 0x46574c44
10,373,634 UART: [fwproc] Recv'd Img size: 114888 bytes
13,809,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,887,438 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,947,666 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,276,442 >>> mbox cmd response: success
14,280,106 UART: [afmc] ++
14,280,706 UART: [afmc] CDI.KEYID = 6
14,281,595 UART: [afmc] SUBJECT.KEYID = 7
14,282,868 UART: [afmc] AUTHORITY.KEYID = 5
16,823,658 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,548,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,550,302 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,566,034 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,582,068 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,597,696 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,622,096 UART: [afmc] --
18,625,704 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,626,096 UART: [cold-reset] --
18,628,866 UART: [state] Locking Datavault
18,633,305 UART: [state] Locking PCR0, PCR1 and PCR31
18,635,009 UART: [state] Locking ICCM
18,636,333 UART: [exit] Launching FMC @ 0x40000000
18,644,733 UART:
18,644,972 UART: Running Caliptra FMC ...
18,646,002 UART:
18,646,161 UART: [fmc] Received command: 0x10000000
18,648,689 >>> mbox cmd response data (224 bytes)
18,650,401 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,650,737 UART: [fmc] Received command: 0x10000006
18,672,006 >>> mbox cmd response data (1536 bytes)
18,682,781 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,827,326 UART: [fmc] Received command: 0x46574C44
18,828,881 UART:
18,829,077 UART: Running Caliptra ROM ...
18,830,194 UART:
18,830,361 UART: [state] CFI Enabled
18,899,622 UART: [state] LifecycleState = Unprovisioned
18,901,555 UART: [state] DebugLocked = No
18,904,242 UART: [state] WD Timer not started. Device not locked for debugging
18,908,520 UART: [kat] SHA2-256
19,088,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,098,972 UART: [kat] ++
19,099,520 UART: [kat] sha1
19,110,587 UART: [kat] SHA2-256
19,113,273 UART: [kat] SHA2-384
19,119,105 UART: [kat] SHA2-512-ACC
19,121,456 UART: [kat] ECC-384
21,584,488 UART: [kat] HMAC-384Kdf
21,607,946 UART: [kat] LMS
22,084,399 UART: [kat] --
22,089,085 UART: [update-reset] ++
25,530,527 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,534,281 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,919,086 >>> mbox cmd response: success
25,920,419 UART: [update-reset] Copying MAN_2 To MAN_1
25,957,563 UART: [update-reset Success] --
25,958,914 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,962,061 UART: [state] Locking Datavault
25,965,054 UART: [state] Locking PCR0, PCR1 and PCR31
25,966,815 UART: [state] Locking ICCM
25,967,838 UART: [exit] Launching FMC @ 0x40000000
25,976,182 UART:
25,976,427 UART: Running Caliptra FMC ...
25,977,531 UART:
25,977,694 UART: [fmc] Received command: 0x10000000
25,980,149 >>> mbox cmd response data (224 bytes)
25,981,567 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,981,976 UART: [fmc] Received command: 0x10000006
26,003,222 >>> mbox cmd response data (1536 bytes)
26,011,679 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,012,151 UART: [fmc] Received command: 0x10000007
26,013,712 >>> mbox cmd response data (4 bytes)
26,014,039 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,014,367 UART: [fmc] Received command: 0x10000006
26,035,567 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
2,071,250 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,185,042 >>> mbox cmd response: success
18,455,657 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,469,513 UART:
18,469,850 UART: Running Caliptra FMC ...
18,471,067 UART:
18,471,245 UART: [fmc] Received command: 0x10000000
18,473,467 >>> mbox cmd response data (224 bytes)
18,474,957 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,475,374 UART: [fmc] Received command: 0x10000006
18,496,619 >>> mbox cmd response data (1536 bytes)
18,507,086 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,651,589 UART: [fmc] Received command: 0x46574C44
25,748,276 >>> mbox cmd response: success
25,770,482 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,782,314 UART:
25,782,573 UART: Running Caliptra FMC ...
25,783,686 UART:
25,783,852 UART: [fmc] Received command: 0x10000000
25,786,243 >>> mbox cmd response data (224 bytes)
25,787,658 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,788,069 UART: [fmc] Received command: 0x10000006
25,809,315 >>> mbox cmd response data (1536 bytes)
25,817,598 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,818,074 UART: [fmc] Received command: 0x10000007
25,819,662 >>> mbox cmd response data (4 bytes)
25,819,981 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,820,297 UART: [fmc] Received command: 0x10000006
25,841,497 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
2,064,841 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,210,234 UART:
2,210,658 UART: Running Caliptra ROM ...
2,211,754 UART:
2,211,930 UART: [state] CFI Enabled
2,212,892 UART: [state] LifecycleState = Unprovisioned
2,214,550 UART: [state] DebugLocked = No
2,215,579 UART: [state] WD Timer not started. Device not locked for debugging
2,218,041 UART: [kat] SHA2-256
2,218,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,706 UART: [kat] ++
2,222,153 UART: [kat] sha1
2,222,661 UART: [kat] SHA2-256
2,223,314 UART: [kat] SHA2-384
2,223,965 UART: [kat] SHA2-512-ACC
2,224,792 UART: [kat] ECC-384
3,281,826 UART: [kat] HMAC-384Kdf
3,294,022 UART: [kat] LMS
3,770,484 UART: [kat] --
3,776,684 UART: [cold-reset] ++
3,778,445 UART: [fht] FHT @ 0x50003400
3,789,973 UART: [idev] ++
3,790,545 UART: [idev] CDI.KEYID = 6
3,791,477 UART: [idev] SUBJECT.KEYID = 7
3,792,747 UART: [idev] UDS.KEYID = 0
3,810,262 UART: [idev] Erasing UDS.KEYID = 0
6,271,693 UART: [idev] Sha1 KeyId Algorithm
6,293,937 UART: [idev] --
6,298,195 UART: [ldev] ++
6,298,756 UART: [ldev] CDI.KEYID = 6
6,299,721 UART: [ldev] SUBJECT.KEYID = 5
6,300,880 UART: [ldev] AUTHORITY.KEYID = 7
6,302,169 UART: [ldev] FE.KEYID = 1
6,314,327 UART: [ldev] Erasing FE.KEYID = 1
8,798,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,571 UART: [ldev] --
10,592,221 UART: [fwproc] Wait for Commands...
10,595,457 UART: [fwproc] Recv command 0x46574c44
10,597,445 UART: [fwproc] Recv'd Img size: 114888 bytes
14,037,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,116,044 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,176,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,504,861 >>> mbox cmd response: success
14,509,598 UART: [afmc] ++
14,510,182 UART: [afmc] CDI.KEYID = 6
14,511,146 UART: [afmc] SUBJECT.KEYID = 7
14,512,359 UART: [afmc] AUTHORITY.KEYID = 5
17,017,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,741,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,743,580 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
18,759,346 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
18,775,369 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
18,791,017 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
18,814,022 UART: [afmc] --
18,817,720 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,818,112 UART: [cold-reset] --
18,822,385 UART: [state] Locking Datavault
18,828,274 UART: [state] Locking PCR0, PCR1 and PCR31
18,829,970 UART: [state] Locking ICCM
18,832,116 UART: [exit] Launching FMC @ 0x40000000
18,840,513 UART:
18,840,748 UART: Running Caliptra FMC ...
18,841,850 UART:
18,842,007 UART: [fmc] Received command: 0x10000000
18,844,470 >>> mbox cmd response data (224 bytes)
18,845,952 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,846,375 UART: [fmc] Received command: 0x10000006
18,867,620 >>> mbox cmd response data (1536 bytes)
18,878,777 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,023,255 UART: [fmc] Received command: 0x46574C44
19,024,798 UART:
19,024,964 UART: Running Caliptra ROM ...
19,025,983 UART:
19,026,395 UART: [state] CFI Enabled
19,038,987 UART: [state] LifecycleState = Unprovisioned
19,040,883 UART: [state] DebugLocked = No
19,043,016 UART: [state] WD Timer not started. Device not locked for debugging
19,046,547 UART: [kat] SHA2-256
19,226,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,237,038 UART: [kat] ++
19,237,516 UART: [kat] sha1
19,248,074 UART: [kat] SHA2-256
19,250,766 UART: [kat] SHA2-384
19,258,152 UART: [kat] SHA2-512-ACC
19,260,497 UART: [kat] ECC-384
21,704,741 UART: [kat] HMAC-384Kdf
21,717,450 UART: [kat] LMS
22,193,906 UART: [kat] --
22,198,127 UART: [update-reset] ++
25,649,447 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
25,652,389 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
26,037,178 >>> mbox cmd response: success
26,037,593 UART: [update-reset] Copying MAN_2 To MAN_1
26,074,624 UART: [update-reset Success] --
26,075,993 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
26,079,719 UART: [state] Locking Datavault
26,081,583 UART: [state] Locking PCR0, PCR1 and PCR31
26,083,344 UART: [state] Locking ICCM
26,086,116 UART: [exit] Launching FMC @ 0x40000000
26,094,503 UART:
26,094,802 UART: Running Caliptra FMC ...
26,095,917 UART:
26,096,072 UART: [fmc] Received command: 0x10000000
26,098,456 >>> mbox cmd response data (224 bytes)
26,099,874 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,100,285 UART: [fmc] Received command: 0x10000006
26,121,525 >>> mbox cmd response data (1536 bytes)
26,129,796 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
26,130,252 UART: [fmc] Received command: 0x10000007
26,131,790 >>> mbox cmd response data (4 bytes)
26,132,106 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
26,132,413 UART: [fmc] Received command: 0x10000006
26,153,621 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
2,067,913 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,378,613 >>> mbox cmd response: success
18,618,661 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,633,661 UART:
18,634,005 UART: Running Caliptra FMC ...
18,635,213 UART:
18,635,409 UART: [fmc] Received command: 0x10000000
18,637,622 >>> mbox cmd response data (224 bytes)
18,639,110 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
18,639,522 UART: [fmc] Received command: 0x10000006
18,660,756 >>> mbox cmd response data (1536 bytes)
18,670,825 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,815,297 UART: [fmc] Received command: 0x46574C44
25,842,737 >>> mbox cmd response: success
25,864,557 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
25,876,556 UART:
25,876,806 UART: Running Caliptra FMC ...
25,877,839 UART:
25,877,984 UART: [fmc] Received command: 0x10000000
25,880,471 >>> mbox cmd response data (224 bytes)
25,881,785 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,882,190 UART: [fmc] Received command: 0x10000006
25,903,443 >>> mbox cmd response data (1536 bytes)
25,911,751 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
25,912,201 UART: [fmc] Received command: 0x10000007
25,913,690 >>> mbox cmd response data (4 bytes)
25,913,981 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
25,914,288 UART: [fmc] Received command: 0x10000006
25,935,483 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,824 UART: [kat] SHA2-256
901,764 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,592 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,510 UART: [idev] ++
1,172,678 UART: [idev] CDI.KEYID = 6
1,173,039 UART: [idev] SUBJECT.KEYID = 7
1,173,464 UART: [idev] UDS.KEYID = 0
1,181,133 UART: [idev] Erasing UDS.KEYID = 0
1,198,269 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,542 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,876 UART: [ldev] --
1,280,083 UART: [fwproc] Wait for Commands...
1,280,772 UART: [fwproc] Recv command 0x46574c44
1,281,505 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,611,769 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,815 >>> mbox cmd response: success
2,778,919 UART: [afmc] ++
2,779,087 UART: [afmc] CDI.KEYID = 6
2,779,450 UART: [afmc] SUBJECT.KEYID = 7
2,779,876 UART: [afmc] AUTHORITY.KEYID = 5
2,815,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,358 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,078 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,843,970 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,849,664 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,857,395 UART: [afmc] --
2,858,402 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,424 UART: [cold-reset] --
2,859,278 UART: [state] Locking Datavault
2,860,655 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,259 UART: [state] Locking ICCM
2,861,739 UART: [exit] Launching FMC @ 0x40000000
2,867,036 UART:
2,867,052 UART: Running Caliptra FMC ...
2,867,460 UART:
2,867,690 UART: [fmc] Received command: 0x10000000
2,869,859 >>> mbox cmd response data (224 bytes)
2,869,860 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,869,889 UART: [fmc] Received command: 0x10000006
2,887,906 >>> mbox cmd response data (1536 bytes)
2,887,907 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,887,935 UART: [fmc] Received command: 0x46574C44
2,888,761 UART:
2,888,777 UART: Running Caliptra ROM ...
2,889,185 UART:
2,889,240 UART: [state] CFI Enabled
2,891,534 UART: [state] LifecycleState = Unprovisioned
2,892,189 UART: [state] DebugLocked = No
2,892,743 UART: [state] WD Timer not started. Device not locked for debugging
2,893,885 UART: [kat] SHA2-256
3,697,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,701,539 UART: [kat] ++
3,701,691 UART: [kat] sha1
3,705,901 UART: [kat] SHA2-256
3,707,841 UART: [kat] SHA2-384
3,710,650 UART: [kat] SHA2-512-ACC
3,712,550 UART: [kat] ECC-384
3,722,207 UART: [kat] HMAC-384Kdf
3,726,829 UART: [kat] LMS
3,975,141 UART: [kat] --
3,976,021 UART: [update-reset] ++
5,293,104 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,294,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,446,669 >>> mbox cmd response: success
5,446,774 UART: [update-reset] Copying MAN_2 To MAN_1
5,454,788 UART: [update-reset Success] --
5,455,197 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,455,807 UART: [state] Locking Datavault
5,456,503 UART: [state] Locking PCR0, PCR1 and PCR31
5,457,107 UART: [state] Locking ICCM
5,457,637 UART: [exit] Launching FMC @ 0x40000000
5,462,934 UART:
5,462,950 UART: Running Caliptra FMC ...
5,463,358 UART:
5,463,580 UART: [fmc] Received command: 0x10000000
5,465,749 >>> mbox cmd response data (224 bytes)
5,465,750 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,465,779 UART: [fmc] Received command: 0x10000006
5,483,796 >>> mbox cmd response data (1536 bytes)
5,483,797 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,483,825 UART: [fmc] Received command: 0x10000007
5,484,617 >>> mbox cmd response data (4 bytes)
5,484,618 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,484,646 UART: [fmc] Received command: 0x10000006
5,502,663 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,788 >>> mbox cmd response: success
2,688,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,201 UART:
2,694,217 UART: Running Caliptra FMC ...
2,694,625 UART:
2,694,855 UART: [fmc] Received command: 0x10000000
2,697,024 >>> mbox cmd response data (224 bytes)
2,697,025 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,697,054 UART: [fmc] Received command: 0x10000006
2,715,071 >>> mbox cmd response data (1536 bytes)
2,715,072 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,100 UART: [fmc] Received command: 0x46574C44
5,159,716 >>> mbox cmd response: success
5,167,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,102 UART:
5,173,118 UART: Running Caliptra FMC ...
5,173,526 UART:
5,173,748 UART: [fmc] Received command: 0x10000000
5,175,917 >>> mbox cmd response data (224 bytes)
5,175,918 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,175,947 UART: [fmc] Received command: 0x10000006
5,193,964 >>> mbox cmd response data (1536 bytes)
5,193,965 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,193,993 UART: [fmc] Received command: 0x10000007
5,194,785 >>> mbox cmd response data (4 bytes)
5,194,786 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,194,814 UART: [fmc] Received command: 0x10000006
5,212,831 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,851 UART: [kat] SHA2-256
901,791 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,114 UART: [kat] HMAC-384Kdf
920,810 UART: [kat] LMS
1,169,122 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,389 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,198,660 UART: [idev] Sha1 KeyId Algorithm
1,207,408 UART: [idev] --
1,208,471 UART: [ldev] ++
1,208,639 UART: [ldev] CDI.KEYID = 6
1,209,003 UART: [ldev] SUBJECT.KEYID = 5
1,209,430 UART: [ldev] AUTHORITY.KEYID = 7
1,209,893 UART: [ldev] FE.KEYID = 1
1,215,441 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,627 UART: [ldev] --
1,280,882 UART: [fwproc] Wait for Commands...
1,281,617 UART: [fwproc] Recv command 0x46574c44
1,282,350 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,618 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,566 >>> mbox cmd response: success
2,779,672 UART: [afmc] ++
2,779,840 UART: [afmc] CDI.KEYID = 6
2,780,203 UART: [afmc] SUBJECT.KEYID = 7
2,780,629 UART: [afmc] AUTHORITY.KEYID = 5
2,816,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,103 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,823 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,715 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,409 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,412 UART: [afmc] --
2,859,353 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,375 UART: [cold-reset] --
2,860,327 UART: [state] Locking Datavault
2,861,566 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,170 UART: [state] Locking ICCM
2,862,734 UART: [exit] Launching FMC @ 0x40000000
2,868,031 UART:
2,868,047 UART: Running Caliptra FMC ...
2,868,455 UART:
2,868,685 UART: [fmc] Received command: 0x10000000
2,870,854 >>> mbox cmd response data (224 bytes)
2,870,855 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,884 UART: [fmc] Received command: 0x10000006
2,888,901 >>> mbox cmd response data (1536 bytes)
2,888,902 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,930 UART: [fmc] Received command: 0x46574C44
2,889,756 UART:
2,889,772 UART: Running Caliptra ROM ...
2,890,180 UART:
2,890,322 UART: [state] CFI Enabled
2,893,132 UART: [state] LifecycleState = Unprovisioned
2,893,787 UART: [state] DebugLocked = No
2,894,307 UART: [state] WD Timer not started. Device not locked for debugging
2,895,573 UART: [kat] SHA2-256
3,699,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,227 UART: [kat] ++
3,703,379 UART: [kat] sha1
3,707,597 UART: [kat] SHA2-256
3,709,537 UART: [kat] SHA2-384
3,712,100 UART: [kat] SHA2-512-ACC
3,714,000 UART: [kat] ECC-384
3,723,663 UART: [kat] HMAC-384Kdf
3,728,327 UART: [kat] LMS
3,976,639 UART: [kat] --
3,977,375 UART: [update-reset] ++
5,294,724 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,295,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,357 >>> mbox cmd response: success
5,448,608 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,622 UART: [update-reset Success] --
5,457,031 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,457,881 UART: [state] Locking Datavault
5,458,733 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,337 UART: [state] Locking ICCM
5,459,969 UART: [exit] Launching FMC @ 0x40000000
5,465,266 UART:
5,465,282 UART: Running Caliptra FMC ...
5,465,690 UART:
5,465,912 UART: [fmc] Received command: 0x10000000
5,468,081 >>> mbox cmd response data (224 bytes)
5,468,082 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,468,111 UART: [fmc] Received command: 0x10000006
5,486,128 >>> mbox cmd response data (1536 bytes)
5,486,129 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,486,157 UART: [fmc] Received command: 0x10000007
5,486,949 >>> mbox cmd response data (4 bytes)
5,486,950 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,486,978 UART: [fmc] Received command: 0x10000006
5,504,995 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,245 >>> mbox cmd response: success
2,686,785 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,736 UART:
2,692,752 UART: Running Caliptra FMC ...
2,693,160 UART:
2,693,390 UART: [fmc] Received command: 0x10000000
2,695,559 >>> mbox cmd response data (224 bytes)
2,695,560 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,695,589 UART: [fmc] Received command: 0x10000006
2,713,606 >>> mbox cmd response data (1536 bytes)
2,713,607 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,713,635 UART: [fmc] Received command: 0x46574C44
5,158,618 >>> mbox cmd response: success
5,166,222 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,171,934 UART:
5,171,950 UART: Running Caliptra FMC ...
5,172,358 UART:
5,172,580 UART: [fmc] Received command: 0x10000000
5,174,749 >>> mbox cmd response data (224 bytes)
5,174,750 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,174,779 UART: [fmc] Received command: 0x10000006
5,192,796 >>> mbox cmd response data (1536 bytes)
5,192,797 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,192,825 UART: [fmc] Received command: 0x10000007
5,193,617 >>> mbox cmd response data (4 bytes)
5,193,618 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,193,646 UART: [fmc] Received command: 0x10000006
5,211,663 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,340 UART: [state] LifecycleState = Unprovisioned
85,995 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,772 UART: [kat] SHA2-256
901,712 UART: [kat] SHA2-384
904,495 UART: [kat] SHA2-512-ACC
906,396 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,181,617 UART: [idev] Erasing UDS.KEYID = 0
1,198,011 UART: [idev] Sha1 KeyId Algorithm
1,207,087 UART: [idev] --
1,208,032 UART: [ldev] ++
1,208,200 UART: [ldev] CDI.KEYID = 6
1,208,564 UART: [ldev] SUBJECT.KEYID = 5
1,208,991 UART: [ldev] AUTHORITY.KEYID = 7
1,209,454 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,240,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,904 UART: [ldev] --
1,280,165 UART: [fwproc] Wait for Commands...
1,280,988 UART: [fwproc] Recv command 0x46574c44
1,281,721 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,244 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,493 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,411 >>> mbox cmd response: success
2,779,541 UART: [afmc] ++
2,779,709 UART: [afmc] CDI.KEYID = 6
2,780,072 UART: [afmc] SUBJECT.KEYID = 7
2,780,498 UART: [afmc] AUTHORITY.KEYID = 5
2,815,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,818 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,838,538 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,844,430 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,850,124 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,858,077 UART: [afmc] --
2,858,990 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,012 UART: [cold-reset] --
2,860,126 UART: [state] Locking Datavault
2,861,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,953 UART: [state] Locking ICCM
2,862,491 UART: [exit] Launching FMC @ 0x40000000
2,867,788 UART:
2,867,804 UART: Running Caliptra FMC ...
2,868,212 UART:
2,868,442 UART: [fmc] Received command: 0x10000000
2,870,611 >>> mbox cmd response data (224 bytes)
2,870,612 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,870,641 UART: [fmc] Received command: 0x10000006
2,888,658 >>> mbox cmd response data (1536 bytes)
2,888,659 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,888,687 UART: [fmc] Received command: 0x46574C44
2,889,513 UART:
2,889,529 UART: Running Caliptra ROM ...
2,889,937 UART:
2,889,992 UART: [state] CFI Enabled
2,892,432 UART: [state] LifecycleState = Unprovisioned
2,893,087 UART: [state] DebugLocked = No
2,893,569 UART: [state] WD Timer not started. Device not locked for debugging
2,894,881 UART: [kat] SHA2-256
3,698,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,535 UART: [kat] ++
3,702,687 UART: [kat] sha1
3,706,901 UART: [kat] SHA2-256
3,708,841 UART: [kat] SHA2-384
3,711,680 UART: [kat] SHA2-512-ACC
3,713,580 UART: [kat] ECC-384
3,723,381 UART: [kat] HMAC-384Kdf
3,727,911 UART: [kat] LMS
3,976,223 UART: [kat] --
3,977,129 UART: [update-reset] ++
5,294,666 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,295,859 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,329 >>> mbox cmd response: success
5,448,504 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,518 UART: [update-reset Success] --
5,456,927 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,457,495 UART: [state] Locking Datavault
5,458,135 UART: [state] Locking PCR0, PCR1 and PCR31
5,458,739 UART: [state] Locking ICCM
5,459,255 UART: [exit] Launching FMC @ 0x40000000
5,464,552 UART:
5,464,568 UART: Running Caliptra FMC ...
5,464,976 UART:
5,465,198 UART: [fmc] Received command: 0x10000000
5,467,367 >>> mbox cmd response data (224 bytes)
5,467,368 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,467,397 UART: [fmc] Received command: 0x10000006
5,485,414 >>> mbox cmd response data (1536 bytes)
5,485,415 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,485,443 UART: [fmc] Received command: 0x10000007
5,486,235 >>> mbox cmd response data (4 bytes)
5,486,236 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,486,264 UART: [fmc] Received command: 0x10000006
5,504,281 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,992 >>> mbox cmd response: success
2,688,132 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,155 UART:
2,694,171 UART: Running Caliptra FMC ...
2,694,579 UART:
2,694,809 UART: [fmc] Received command: 0x10000000
2,696,978 >>> mbox cmd response data (224 bytes)
2,696,979 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,697,008 UART: [fmc] Received command: 0x10000006
2,715,025 >>> mbox cmd response data (1536 bytes)
2,715,026 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,054 UART: [fmc] Received command: 0x46574C44
5,158,972 >>> mbox cmd response: success
5,166,602 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,172,474 UART:
5,172,490 UART: Running Caliptra FMC ...
5,172,898 UART:
5,173,120 UART: [fmc] Received command: 0x10000000
5,175,289 >>> mbox cmd response data (224 bytes)
5,175,290 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,175,319 UART: [fmc] Received command: 0x10000006
5,193,336 >>> mbox cmd response data (1536 bytes)
5,193,337 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,193,365 UART: [fmc] Received command: 0x10000007
5,194,157 >>> mbox cmd response data (4 bytes)
5,194,158 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,194,186 UART: [fmc] Received command: 0x10000006
5,212,203 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,540 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,440 UART: [kat] SHA2-512-ACC
906,341 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,002 UART: [kat] LMS
1,169,314 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,709 UART: [idev] ++
1,173,877 UART: [idev] CDI.KEYID = 6
1,174,238 UART: [idev] SUBJECT.KEYID = 7
1,174,663 UART: [idev] UDS.KEYID = 0
1,183,002 UART: [idev] Erasing UDS.KEYID = 0
1,200,508 UART: [idev] Sha1 KeyId Algorithm
1,209,408 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,933 UART: [ldev] SUBJECT.KEYID = 5
1,211,360 UART: [ldev] AUTHORITY.KEYID = 7
1,211,823 UART: [ldev] FE.KEYID = 1
1,217,197 UART: [ldev] Erasing FE.KEYID = 1
1,244,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,157 UART: [ldev] --
1,283,412 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,960 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,991 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,952 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,637 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,996 >>> mbox cmd response: success
2,782,230 UART: [afmc] ++
2,782,398 UART: [afmc] CDI.KEYID = 6
2,782,761 UART: [afmc] SUBJECT.KEYID = 7
2,783,187 UART: [afmc] AUTHORITY.KEYID = 5
2,819,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,727 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,842,447 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,848,339 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,854,033 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,861,846 UART: [afmc] --
2,862,743 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,862,765 UART: [cold-reset] --
2,863,715 UART: [state] Locking Datavault
2,864,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,384 UART: [state] Locking ICCM
2,866,012 UART: [exit] Launching FMC @ 0x40000000
2,871,309 UART:
2,871,325 UART: Running Caliptra FMC ...
2,871,733 UART:
2,871,963 UART: [fmc] Received command: 0x10000000
2,874,132 >>> mbox cmd response data (224 bytes)
2,874,133 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,874,162 UART: [fmc] Received command: 0x10000006
2,892,179 >>> mbox cmd response data (1536 bytes)
2,892,180 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,892,208 UART: [fmc] Received command: 0x46574C44
2,893,034 UART:
2,893,050 UART: Running Caliptra ROM ...
2,893,458 UART:
2,893,600 UART: [state] CFI Enabled
2,896,872 UART: [state] LifecycleState = Unprovisioned
2,897,527 UART: [state] DebugLocked = No
2,898,097 UART: [state] WD Timer not started. Device not locked for debugging
2,899,347 UART: [kat] SHA2-256
3,702,897 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,707,001 UART: [kat] ++
3,707,153 UART: [kat] sha1
3,711,455 UART: [kat] SHA2-256
3,713,395 UART: [kat] SHA2-384
3,716,228 UART: [kat] SHA2-512-ACC
3,718,128 UART: [kat] ECC-384
3,727,569 UART: [kat] HMAC-384Kdf
3,732,173 UART: [kat] LMS
3,980,485 UART: [kat] --
3,981,335 UART: [update-reset] ++
5,298,668 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,299,745 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,452,215 >>> mbox cmd response: success
5,452,382 UART: [update-reset] Copying MAN_2 To MAN_1
5,460,396 UART: [update-reset Success] --
5,460,805 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,461,427 UART: [state] Locking Datavault
5,462,247 UART: [state] Locking PCR0, PCR1 and PCR31
5,462,851 UART: [state] Locking ICCM
5,463,423 UART: [exit] Launching FMC @ 0x40000000
5,468,720 UART:
5,468,736 UART: Running Caliptra FMC ...
5,469,144 UART:
5,469,366 UART: [fmc] Received command: 0x10000000
5,471,535 >>> mbox cmd response data (224 bytes)
5,471,536 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,471,565 UART: [fmc] Received command: 0x10000006
5,489,582 >>> mbox cmd response data (1536 bytes)
5,489,583 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,489,611 UART: [fmc] Received command: 0x10000007
5,490,403 >>> mbox cmd response data (4 bytes)
5,490,404 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,490,432 UART: [fmc] Received command: 0x10000006
5,508,449 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,127 >>> mbox cmd response: success
2,687,893 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,112 UART:
2,694,128 UART: Running Caliptra FMC ...
2,694,536 UART:
2,694,766 UART: [fmc] Received command: 0x10000000
2,696,935 >>> mbox cmd response data (224 bytes)
2,696,936 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,696,965 UART: [fmc] Received command: 0x10000006
2,714,982 >>> mbox cmd response data (1536 bytes)
2,714,983 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,715,011 UART: [fmc] Received command: 0x46574C44
5,160,254 >>> mbox cmd response: success
5,167,942 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,636 UART:
5,173,652 UART: Running Caliptra FMC ...
5,174,060 UART:
5,174,282 UART: [fmc] Received command: 0x10000000
5,176,451 >>> mbox cmd response data (224 bytes)
5,176,452 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,481 UART: [fmc] Received command: 0x10000006
5,194,498 >>> mbox cmd response data (1536 bytes)
5,194,499 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,527 UART: [fmc] Received command: 0x10000007
5,195,319 >>> mbox cmd response data (4 bytes)
5,195,320 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,348 UART: [fmc] Received command: 0x10000006
5,213,365 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
890,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,068 UART: [kat] ++
895,220 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,325 UART: [kat] LMS
1,168,637 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,140 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,835 UART: [idev] Sha1 KeyId Algorithm
1,207,595 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,214,674 UART: [ldev] Erasing FE.KEYID = 1
1,240,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,238 UART: [ldev] --
1,279,509 UART: [fwproc] Wait for Commands...
1,280,104 UART: [fwproc] Recv command 0x46574c44
1,280,837 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,610,911 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,837 >>> mbox cmd response: success
2,777,935 UART: [afmc] ++
2,778,103 UART: [afmc] CDI.KEYID = 6
2,778,466 UART: [afmc] SUBJECT.KEYID = 7
2,778,892 UART: [afmc] AUTHORITY.KEYID = 5
2,813,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,314 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,837,034 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,842,926 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,848,620 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,856,365 UART: [afmc] --
2,857,174 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,857,196 UART: [cold-reset] --
2,858,214 UART: [state] Locking Datavault
2,859,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,187 UART: [state] Locking ICCM
2,860,709 UART: [exit] Launching FMC @ 0x40000000
2,866,006 UART:
2,866,022 UART: Running Caliptra FMC ...
2,866,430 UART:
2,866,660 UART: [fmc] Received command: 0x10000000
2,868,829 >>> mbox cmd response data (224 bytes)
2,868,830 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,868,859 UART: [fmc] Received command: 0x10000006
2,886,876 >>> mbox cmd response data (1536 bytes)
2,886,877 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,886,905 UART: [fmc] Received command: 0x46574C44
2,887,731 UART:
2,887,747 UART: Running Caliptra ROM ...
2,888,155 UART:
2,888,210 UART: [state] CFI Enabled
2,890,814 UART: [state] LifecycleState = Unprovisioned
2,891,469 UART: [state] DebugLocked = No
2,892,097 UART: [state] WD Timer not started. Device not locked for debugging
2,893,403 UART: [kat] SHA2-256
3,696,953 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,701,057 UART: [kat] ++
3,701,209 UART: [kat] sha1
3,705,427 UART: [kat] SHA2-256
3,707,367 UART: [kat] SHA2-384
3,710,246 UART: [kat] SHA2-512-ACC
3,712,146 UART: [kat] ECC-384
3,721,663 UART: [kat] HMAC-384Kdf
3,726,277 UART: [kat] LMS
3,974,589 UART: [kat] --
3,975,515 UART: [update-reset] ++
5,294,196 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,295,395 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,447,865 >>> mbox cmd response: success
5,448,050 UART: [update-reset] Copying MAN_2 To MAN_1
5,456,064 UART: [update-reset Success] --
5,456,473 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,456,973 UART: [state] Locking Datavault
5,457,757 UART: [state] Locking PCR0, PCR1 and PCR31
5,458,361 UART: [state] Locking ICCM
5,458,933 UART: [exit] Launching FMC @ 0x40000000
5,464,230 UART:
5,464,246 UART: Running Caliptra FMC ...
5,464,654 UART:
5,464,876 UART: [fmc] Received command: 0x10000000
5,467,045 >>> mbox cmd response data (224 bytes)
5,467,046 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,467,075 UART: [fmc] Received command: 0x10000006
5,485,092 >>> mbox cmd response data (1536 bytes)
5,485,093 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,485,121 UART: [fmc] Received command: 0x10000007
5,485,913 >>> mbox cmd response data (4 bytes)
5,485,914 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,485,942 UART: [fmc] Received command: 0x10000006
5,503,959 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,176 >>> mbox cmd response: success
2,685,392 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,691,253 UART:
2,691,269 UART: Running Caliptra FMC ...
2,691,677 UART:
2,691,907 UART: [fmc] Received command: 0x10000000
2,694,076 >>> mbox cmd response data (224 bytes)
2,694,077 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,694,106 UART: [fmc] Received command: 0x10000006
2,712,123 >>> mbox cmd response data (1536 bytes)
2,712,124 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,712,152 UART: [fmc] Received command: 0x46574C44
5,156,286 >>> mbox cmd response: success
5,163,860 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,169,646 UART:
5,169,662 UART: Running Caliptra FMC ...
5,170,070 UART:
5,170,292 UART: [fmc] Received command: 0x10000000
5,172,461 >>> mbox cmd response data (224 bytes)
5,172,462 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,172,491 UART: [fmc] Received command: 0x10000006
5,190,508 >>> mbox cmd response data (1536 bytes)
5,190,509 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,190,537 UART: [fmc] Received command: 0x10000007
5,191,329 >>> mbox cmd response data (4 bytes)
5,191,330 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,191,358 UART: [fmc] Received command: 0x10000006
5,209,375 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,354 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,643 UART: [ldev] ++
1,209,811 UART: [ldev] CDI.KEYID = 6
1,210,175 UART: [ldev] SUBJECT.KEYID = 5
1,210,602 UART: [ldev] AUTHORITY.KEYID = 7
1,211,065 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,609 UART: [ldev] --
1,281,970 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,613,452 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,402 >>> mbox cmd response: success
2,780,564 UART: [afmc] ++
2,780,732 UART: [afmc] CDI.KEYID = 6
2,781,095 UART: [afmc] SUBJECT.KEYID = 7
2,781,521 UART: [afmc] AUTHORITY.KEYID = 5
2,817,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,093 UART: [afmc] PUB.X = 663A54D09FED82B4FED4DEE061656F8A4C495BF96DF7D652F292F6E31C674875E33CD5E3B842D5AB84B689B140D4A866
2,839,813 UART: [afmc] PUB.Y = 25714F560686A529A68181E2DE32D66AFC9BFDB1D66CFDAAFFC793D8DA0EF43D990CC5BADCB48D095AB8338DDED3951B
2,845,705 UART: [afmc] SIG.R = E500AF2A21E3E5F47023C70AB785863F695AC179D4F6EF22D4B3E2173CFDBB70B26C57134E38F491E47889FD9851417D
2,851,399 UART: [afmc] SIG.S = C6304387BD3DCEDDA70332111387062E755955A28BAE16EA9A05B07210692E0CE9D17E506F182E7D6D56AAAC5BA0AE10
2,859,102 UART: [afmc] --
2,859,945 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,967 UART: [cold-reset] --
2,860,659 UART: [state] Locking Datavault
2,861,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,590 UART: [state] Locking ICCM
2,863,072 UART: [exit] Launching FMC @ 0x40000000
2,868,369 UART:
2,868,385 UART: Running Caliptra FMC ...
2,868,793 UART:
2,869,023 UART: [fmc] Received command: 0x10000000
2,871,192 >>> mbox cmd response data (224 bytes)
2,871,193 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,871,222 UART: [fmc] Received command: 0x10000006
2,889,239 >>> mbox cmd response data (1536 bytes)
2,889,240 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,889,268 UART: [fmc] Received command: 0x46574C44
2,890,094 UART:
2,890,110 UART: Running Caliptra ROM ...
2,890,518 UART:
2,890,660 UART: [state] CFI Enabled
2,893,462 UART: [state] LifecycleState = Unprovisioned
2,894,117 UART: [state] DebugLocked = No
2,894,811 UART: [state] WD Timer not started. Device not locked for debugging
2,895,981 UART: [kat] SHA2-256
3,699,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,703,635 UART: [kat] ++
3,703,787 UART: [kat] sha1
3,708,005 UART: [kat] SHA2-256
3,709,945 UART: [kat] SHA2-384
3,712,678 UART: [kat] SHA2-512-ACC
3,714,578 UART: [kat] ECC-384
3,724,239 UART: [kat] HMAC-384Kdf
3,728,697 UART: [kat] LMS
3,977,009 UART: [kat] --
3,978,049 UART: [update-reset] ++
5,295,474 UART: [update-reset] Img verified w/ Vendor ECC Key Index 1
5,296,473 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,448,943 >>> mbox cmd response: success
5,449,114 UART: [update-reset] Copying MAN_2 To MAN_1
5,457,128 UART: [update-reset Success] --
5,457,537 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,458,151 UART: [state] Locking Datavault
5,458,701 UART: [state] Locking PCR0, PCR1 and PCR31
5,459,305 UART: [state] Locking ICCM
5,459,729 UART: [exit] Launching FMC @ 0x40000000
5,465,026 UART:
5,465,042 UART: Running Caliptra FMC ...
5,465,450 UART:
5,465,672 UART: [fmc] Received command: 0x10000000
5,467,841 >>> mbox cmd response data (224 bytes)
5,467,842 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,467,871 UART: [fmc] Received command: 0x10000006
5,485,888 >>> mbox cmd response data (1536 bytes)
5,485,889 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,485,917 UART: [fmc] Received command: 0x10000007
5,486,709 >>> mbox cmd response data (4 bytes)
5,486,710 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,486,738 UART: [fmc] Received command: 0x10000006
5,504,755 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,143 >>> mbox cmd response: success
2,687,509 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,618 UART:
2,693,634 UART: Running Caliptra FMC ...
2,694,042 UART:
2,694,272 UART: [fmc] Received command: 0x10000000
2,696,441 >>> mbox cmd response data (224 bytes)
2,696,442 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
2,696,471 UART: [fmc] Received command: 0x10000006
2,714,488 >>> mbox cmd response data (1536 bytes)
2,714,489 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,714,517 UART: [fmc] Received command: 0x46574C44
5,160,432 >>> mbox cmd response: success
5,168,030 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,173,692 UART:
5,173,708 UART: Running Caliptra FMC ...
5,174,116 UART:
5,174,338 UART: [fmc] Received command: 0x10000000
5,176,507 >>> mbox cmd response data (224 bytes)
5,176,508 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,176,537 UART: [fmc] Received command: 0x10000006
5,194,554 >>> mbox cmd response data (1536 bytes)
5,194,555 <<< Executing mbox cmd 0x10000007 (0 bytes) from SoC
5,194,583 UART: [fmc] Received command: 0x10000007
5,195,375 >>> mbox cmd response data (4 bytes)
5,195,376 <<< Executing mbox cmd 0x10000006 (0 bytes) from SoC
5,195,404 UART: [fmc] Received command: 0x10000006
5,213,421 >>> mbox cmd response data (1536 bytes)
test test_fmcalias_derivation::test_pcr_log_across_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,074,402 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,220,081 UART:
2,220,498 UART: Running Caliptra ROM ...
2,221,612 UART:
2,221,777 UART: [state] CFI Enabled
2,222,770 UART: [state] LifecycleState = Unprovisioned
2,224,434 UART: [state] DebugLocked = No
2,225,470 UART: [state] WD Timer not started. Device not locked for debugging
2,227,948 UART: [kat] SHA2-256
2,228,624 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,642 UART: [kat] ++
2,232,099 UART: [kat] sha1
2,232,621 UART: [kat] SHA2-256
2,233,285 UART: [kat] SHA2-384
2,233,949 UART: [kat] SHA2-512-ACC
2,234,800 UART: [kat] ECC-384
2,948,302 UART: [kat] HMAC-384Kdf
2,972,077 UART: [kat] LMS
3,448,546 UART: [kat] --
3,453,154 UART: [cold-reset] ++
3,454,546 UART: [fht] FHT @ 0x50003400
3,465,334 UART: [idev] ++
3,465,901 UART: [idev] CDI.KEYID = 6
3,466,847 UART: [idev] SUBJECT.KEYID = 7
3,468,066 UART: [idev] UDS.KEYID = 0
3,502,882 UART: [idev] Erasing UDS.KEYID = 0
5,988,748 UART: [idev] Sha1 KeyId Algorithm
6,011,629 UART: [idev] --
6,015,264 UART: [ldev] ++
6,015,844 UART: [ldev] CDI.KEYID = 6
6,016,735 UART: [ldev] SUBJECT.KEYID = 5
6,017,958 UART: [ldev] AUTHORITY.KEYID = 7
6,019,201 UART: [ldev] FE.KEYID = 1
6,056,568 UART: [ldev] Erasing FE.KEYID = 1
8,563,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,150 UART: [ldev] --
10,373,863 UART: [fwproc] Wait for Commands...
10,375,755 UART: [fwproc] Recv command 0x46574c44
10,377,748 UART: [fwproc] Recv'd Img size: 114888 bytes
13,824,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
13,903,458 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,963,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,292,549 >>> mbox cmd response: success
14,295,898 UART: [afmc] ++
14,296,490 UART: [afmc] CDI.KEYID = 6
14,297,443 UART: [afmc] SUBJECT.KEYID = 7
14,298,660 UART: [afmc] AUTHORITY.KEYID = 5
16,830,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,328 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,572,136 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,588,086 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,603,661 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,628,784 UART: [afmc] --
18,632,237 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,632,624 UART: [cold-reset] --
18,637,549 UART: [state] Locking Datavault
18,644,857 UART: [state] Locking PCR0, PCR1 and PCR31
18,646,618 UART: [state] Locking ICCM
18,649,153 UART: [exit] Launching FMC @ 0x40000000
18,657,502 UART:
18,657,748 UART: Running Caliptra FMC ...
18,658,858 UART:
18,659,024 UART: [fmc] Received command: 0x10000000
18,661,471 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
2,080,172 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,183,150 >>> mbox cmd response: success
18,455,793 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,471,696 UART:
18,472,044 UART: Running Caliptra FMC ...
18,473,186 UART:
18,473,344 UART: [fmc] Received command: 0x10000000
18,475,681 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,074,110 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,219,449 UART:
2,219,874 UART: Running Caliptra ROM ...
2,220,955 UART:
2,221,112 UART: [state] CFI Enabled
2,221,975 UART: [state] LifecycleState = Unprovisioned
2,223,637 UART: [state] DebugLocked = No
2,224,749 UART: [state] WD Timer not started. Device not locked for debugging
2,227,225 UART: [kat] SHA2-256
2,227,895 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,903 UART: [kat] ++
2,231,352 UART: [kat] sha1
2,231,904 UART: [kat] SHA2-256
2,232,557 UART: [kat] SHA2-384
2,233,211 UART: [kat] SHA2-512-ACC
2,234,009 UART: [kat] ECC-384
3,287,179 UART: [kat] HMAC-384Kdf
3,298,968 UART: [kat] LMS
3,775,474 UART: [kat] --
3,779,247 UART: [cold-reset] ++
3,780,581 UART: [fht] FHT @ 0x50003400
3,793,658 UART: [idev] ++
3,794,232 UART: [idev] CDI.KEYID = 6
3,795,193 UART: [idev] SUBJECT.KEYID = 7
3,796,403 UART: [idev] UDS.KEYID = 0
3,812,811 UART: [idev] Erasing UDS.KEYID = 0
6,275,871 UART: [idev] Sha1 KeyId Algorithm
6,299,398 UART: [idev] --
6,304,068 UART: [ldev] ++
6,304,649 UART: [ldev] CDI.KEYID = 6
6,305,611 UART: [ldev] SUBJECT.KEYID = 5
6,306,767 UART: [ldev] AUTHORITY.KEYID = 7
6,308,070 UART: [ldev] FE.KEYID = 1
6,316,230 UART: [ldev] Erasing FE.KEYID = 1
8,791,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,895 UART: [ldev] --
10,583,882 UART: [fwproc] Wait for Commands...
10,585,818 UART: [fwproc] Recv command 0x46574c44
10,587,806 UART: [fwproc] Recv'd Img size: 114888 bytes
14,028,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,110,146 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,170,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,498,952 >>> mbox cmd response: success
14,503,349 UART: [afmc] ++
14,503,959 UART: [afmc] CDI.KEYID = 6
14,504,867 UART: [afmc] SUBJECT.KEYID = 7
14,506,079 UART: [afmc] AUTHORITY.KEYID = 5
17,012,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,736,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,738,704 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
18,754,476 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
18,770,502 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
18,786,017 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
18,809,501 UART: [afmc] --
18,813,592 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,813,957 UART: [cold-reset] --
18,817,791 UART: [state] Locking Datavault
18,824,109 UART: [state] Locking PCR0, PCR1 and PCR31
18,825,913 UART: [state] Locking ICCM
18,827,017 UART: [exit] Launching FMC @ 0x40000000
18,835,377 UART:
18,835,613 UART: Running Caliptra FMC ...
18,836,637 UART:
18,836,778 UART: [fmc] Received command: 0x10000000
18,839,367 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
2,069,216 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,388,935 >>> mbox cmd response: success
18,625,561 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,639,918 UART:
18,640,238 UART: Running Caliptra FMC ...
18,641,429 UART:
18,641,604 UART: [fmc] Received command: 0x10000000
18,643,924 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,032 UART: [kat] ++
895,184 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,907 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,354 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,182,125 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,957 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,496 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,580 UART: [fwproc] Recv command 0x46574c44
1,282,313 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,463 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,148 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,471 >>> mbox cmd response: success
2,779,649 UART: [afmc] ++
2,779,817 UART: [afmc] CDI.KEYID = 6
2,780,180 UART: [afmc] SUBJECT.KEYID = 7
2,780,606 UART: [afmc] AUTHORITY.KEYID = 5
2,815,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,909 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,838,615 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,844,502 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,850,221 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,059 UART: [afmc] --
2,858,898 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,920 UART: [cold-reset] --
2,859,674 UART: [state] Locking Datavault
2,860,817 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,421 UART: [state] Locking ICCM
2,862,067 UART: [exit] Launching FMC @ 0x40000000
2,867,364 UART:
2,867,380 UART: Running Caliptra FMC ...
2,867,788 UART:
2,868,018 UART: [fmc] Received command: 0x10000000
2,870,187 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,342 >>> mbox cmd response: success
2,687,203 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,074 UART:
2,693,090 UART: Running Caliptra FMC ...
2,693,498 UART:
2,693,728 UART: [fmc] Received command: 0x10000000
2,695,897 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,788 UART: [kat] SHA2-512-ACC
906,689 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,010 UART: [kat] LMS
1,169,322 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,579 UART: [fht] FHT @ 0x50003400
1,173,373 UART: [idev] ++
1,173,541 UART: [idev] CDI.KEYID = 6
1,173,902 UART: [idev] SUBJECT.KEYID = 7
1,174,327 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,318 UART: [idev] Sha1 KeyId Algorithm
1,208,306 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,791 UART: [ldev] Erasing FE.KEYID = 1
1,241,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,893 UART: [ldev] --
1,281,124 UART: [fwproc] Wait for Commands...
1,281,791 UART: [fwproc] Recv command 0x46574c44
1,282,524 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,613,660 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,345 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,692 >>> mbox cmd response: success
2,780,818 UART: [afmc] ++
2,780,986 UART: [afmc] CDI.KEYID = 6
2,781,349 UART: [afmc] SUBJECT.KEYID = 7
2,781,775 UART: [afmc] AUTHORITY.KEYID = 5
2,817,094 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,274 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,839,980 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,845,867 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,851,586 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,859,376 UART: [afmc] --
2,860,209 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,860,231 UART: [cold-reset] --
2,860,947 UART: [state] Locking Datavault
2,862,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,810 UART: [state] Locking ICCM
2,863,418 UART: [exit] Launching FMC @ 0x40000000
2,868,715 UART:
2,868,731 UART: Running Caliptra FMC ...
2,869,139 UART:
2,869,369 UART: [fmc] Received command: 0x10000000
2,871,538 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,097 >>> mbox cmd response: success
2,687,038 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,897 UART:
2,692,913 UART: Running Caliptra FMC ...
2,693,321 UART:
2,693,551 UART: [fmc] Received command: 0x10000000
2,695,720 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,158 UART: [kat] SHA2-256
902,098 UART: [kat] SHA2-384
904,883 UART: [kat] SHA2-512-ACC
906,784 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,901 UART: [kat] LMS
1,169,213 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,436 UART: [fht] FHT @ 0x50003400
1,173,162 UART: [idev] ++
1,173,330 UART: [idev] CDI.KEYID = 6
1,173,691 UART: [idev] SUBJECT.KEYID = 7
1,174,116 UART: [idev] UDS.KEYID = 0
1,181,929 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,208,235 UART: [idev] --
1,209,242 UART: [ldev] ++
1,209,410 UART: [ldev] CDI.KEYID = 6
1,209,774 UART: [ldev] SUBJECT.KEYID = 5
1,210,201 UART: [ldev] AUTHORITY.KEYID = 7
1,210,664 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,723 UART: [fwproc] Wait for Commands...
1,281,490 UART: [fwproc] Recv command 0x46574c44
1,282,223 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,612,775 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,803 >>> mbox cmd response: success
2,779,849 UART: [afmc] ++
2,780,017 UART: [afmc] CDI.KEYID = 6
2,780,380 UART: [afmc] SUBJECT.KEYID = 7
2,780,806 UART: [afmc] AUTHORITY.KEYID = 5
2,816,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,485 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,839,191 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,845,078 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,850,797 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,858,377 UART: [afmc] --
2,859,372 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,859,394 UART: [cold-reset] --
2,860,326 UART: [state] Locking Datavault
2,861,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,051 UART: [state] Locking ICCM
2,862,645 UART: [exit] Launching FMC @ 0x40000000
2,867,942 UART:
2,867,958 UART: Running Caliptra FMC ...
2,868,366 UART:
2,868,596 UART: [fmc] Received command: 0x10000000
2,870,765 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,044 >>> mbox cmd response: success
2,689,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,695,556 UART:
2,695,572 UART: Running Caliptra FMC ...
2,695,980 UART:
2,696,210 UART: [fmc] Received command: 0x10000000
2,698,379 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,737 UART: [kat] ++
895,889 UART: [kat] sha1
900,265 UART: [kat] SHA2-256
902,205 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,668 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,559 UART: [cold-reset] ++
1,170,897 UART: [fht] FHT @ 0x50003400
1,173,699 UART: [idev] ++
1,173,867 UART: [idev] CDI.KEYID = 6
1,174,228 UART: [idev] SUBJECT.KEYID = 7
1,174,653 UART: [idev] UDS.KEYID = 0
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,774 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,981 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,282,965 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,131 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,614,208 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,893 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,282 >>> mbox cmd response: success
2,781,364 UART: [afmc] ++
2,781,532 UART: [afmc] CDI.KEYID = 6
2,781,895 UART: [afmc] SUBJECT.KEYID = 7
2,782,321 UART: [afmc] AUTHORITY.KEYID = 5
2,817,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,802 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,840,508 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,846,395 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,852,114 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,859,994 UART: [afmc] --
2,860,973 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,860,995 UART: [cold-reset] --
2,861,829 UART: [state] Locking Datavault
2,863,112 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,716 UART: [state] Locking ICCM
2,864,212 UART: [exit] Launching FMC @ 0x40000000
2,869,509 UART:
2,869,525 UART: Running Caliptra FMC ...
2,869,933 UART:
2,870,163 UART: [fmc] Received command: 0x10000000
2,872,332 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,661 >>> mbox cmd response: success
2,688,076 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,694,031 UART:
2,694,047 UART: Running Caliptra FMC ...
2,694,455 UART:
2,694,685 UART: [fmc] Received command: 0x10000000
2,696,854 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
891,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,456 UART: [kat] ++
895,608 UART: [kat] sha1
899,864 UART: [kat] SHA2-256
901,804 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
915,873 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,814 UART: [idev] ++
1,172,982 UART: [idev] CDI.KEYID = 6
1,173,343 UART: [idev] SUBJECT.KEYID = 7
1,173,768 UART: [idev] UDS.KEYID = 0
1,181,389 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,214,970 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,125 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,611,589 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,671 >>> mbox cmd response: success
2,778,813 UART: [afmc] ++
2,778,981 UART: [afmc] CDI.KEYID = 6
2,779,344 UART: [afmc] SUBJECT.KEYID = 7
2,779,770 UART: [afmc] AUTHORITY.KEYID = 5
2,815,357 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,241 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,837,947 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,843,834 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,849,553 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,857,259 UART: [afmc] --
2,858,252 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,858,274 UART: [cold-reset] --
2,859,358 UART: [state] Locking Datavault
2,860,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,007 UART: [state] Locking ICCM
2,861,657 UART: [exit] Launching FMC @ 0x40000000
2,866,954 UART:
2,866,970 UART: Running Caliptra FMC ...
2,867,378 UART:
2,867,608 UART: [fmc] Received command: 0x10000000
2,869,777 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,668 >>> mbox cmd response: success
2,687,195 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,693,484 UART:
2,693,500 UART: Running Caliptra FMC ...
2,693,908 UART:
2,694,138 UART: [fmc] Received command: 0x10000000
2,696,307 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,354 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,891 UART: [kat] SHA2-256
901,831 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,270 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,053 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,131 UART: [idev] ++
1,173,299 UART: [idev] CDI.KEYID = 6
1,173,660 UART: [idev] SUBJECT.KEYID = 7
1,174,085 UART: [idev] UDS.KEYID = 0
1,181,788 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha1 KeyId Algorithm
1,207,908 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,751 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,580 UART: [fwproc] Wait for Commands...
1,282,207 UART: [fwproc] Recv command 0x46574c44
1,282,940 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
2,613,438 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,284 >>> mbox cmd response: success
2,780,550 UART: [afmc] ++
2,780,718 UART: [afmc] CDI.KEYID = 6
2,781,081 UART: [afmc] SUBJECT.KEYID = 7
2,781,507 UART: [afmc] AUTHORITY.KEYID = 5
2,817,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,922 UART: [afmc] PUB.X = AEDD53267798C53FE46304EF692A81A23EC0DC3AA98D68F74485155EB62BE1895BBEDA7B661D963560030ED58908B98C
2,840,628 UART: [afmc] PUB.Y = 2DD4EFCFE308024F5FCCB1AA77C0B06E016DE1081C25E0F1F20FF060C19DC956EC56B53B7B8CF6578DB35F10AB84A0A0
2,846,515 UART: [afmc] SIG.R = 8651AC06A54F750B9A94BEB25E2AD0FADDB6316C5FFE6D2AFB29FCFCF52B143CF3A351C1AE92BBD001B623CCBA7F64B3
2,852,234 UART: [afmc] SIG.S = 3431F9FC85A5D4853A200E5DE81758606B8687E47DEA9E8EF6B546D04BE6FA26F41885AE7BA7E0435955AC4DC17CB90A
2,859,812 UART: [afmc] --
2,860,627 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,860,649 UART: [cold-reset] --
2,861,451 UART: [state] Locking Datavault
2,862,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,050 UART: [state] Locking ICCM
2,863,518 UART: [exit] Launching FMC @ 0x40000000
2,868,815 UART:
2,868,831 UART: Running Caliptra FMC ...
2,869,239 UART:
2,869,469 UART: [fmc] Received command: 0x10000000
2,871,638 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,349 >>> mbox cmd response: success
2,686,020 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,692,311 UART:
2,692,327 UART: Running Caliptra FMC ...
2,692,735 UART:
2,692,965 UART: [fmc] Received command: 0x10000000
2,695,134 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_fmc_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,731 writing to cptra_bootfsm_go
2,078,847 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,224,628 UART:
2,225,036 UART: Running Caliptra ROM ...
2,226,144 UART:
2,226,308 UART: [state] CFI Enabled
2,227,276 UART: [state] LifecycleState = Unprovisioned
2,228,941 UART: [state] DebugLocked = No
2,229,978 UART: [state] WD Timer not started. Device not locked for debugging
2,232,457 UART: [kat] SHA2-256
2,233,126 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,236,131 UART: [kat] ++
2,236,583 UART: [kat] sha1
2,237,103 UART: [kat] SHA2-256
2,237,769 UART: [kat] SHA2-384
2,238,435 UART: [kat] SHA2-512-ACC
2,239,442 UART: [kat] ECC-384
2,948,113 UART: [kat] HMAC-384Kdf
2,973,935 UART: [kat] LMS
3,450,399 UART: [kat] --
3,455,140 UART: [cold-reset] ++
3,456,153 UART: [fht] FHT @ 0x50003400
3,466,707 UART: [idev] ++
3,467,284 UART: [idev] CDI.KEYID = 6
3,468,305 UART: [idev] SUBJECT.KEYID = 7
3,469,468 UART: [idev] UDS.KEYID = 0
3,502,783 UART: [idev] Erasing UDS.KEYID = 0
5,989,892 UART: [idev] Sha1 KeyId Algorithm
6,013,812 UART: [idev] --
6,018,113 UART: [ldev] ++
6,018,702 UART: [ldev] CDI.KEYID = 6
6,019,627 UART: [ldev] SUBJECT.KEYID = 5
6,020,794 UART: [ldev] AUTHORITY.KEYID = 7
6,022,092 UART: [ldev] FE.KEYID = 1
6,057,662 UART: [ldev] Erasing FE.KEYID = 1
8,564,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,469 UART: [ldev] --
10,376,250 UART: [fwproc] Wait for Commands...
10,377,869 UART: [fwproc] Recv command 0x46574c44
10,379,858 UART: [fwproc] Recv'd Img size: 114888 bytes
14,902,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
14,990,829 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,051,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,378,759 >>> mbox cmd response: success
15,382,994 UART: [afmc] ++
15,383,600 UART: [afmc] CDI.KEYID = 6
15,384,536 UART: [afmc] SUBJECT.KEYID = 7
15,385,757 UART: [afmc] AUTHORITY.KEYID = 5
17,919,988 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,664,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,666,857 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,682,832 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,698,787 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,714,302 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,737,727 UART: [afmc] --
19,741,611 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,741,991 UART: [cold-reset] --
19,744,650 UART: [state] Locking Datavault
19,750,225 UART: [state] Locking PCR0, PCR1 and PCR31
19,751,979 UART: [state] Locking ICCM
19,753,596 UART: [exit] Launching FMC @ 0x40000000
19,762,063 UART:
19,762,371 UART: Running Caliptra FMC ...
19,763,488 UART:
19,763,657 UART: [fmc] Received command: 0x10000000
19,765,937 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,069,823 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,341,255 >>> mbox cmd response: success
19,615,861 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,631,984 UART:
19,632,325 UART: Running Caliptra FMC ...
19,633,545 UART:
19,633,718 UART: [fmc] Received command: 0x10000000
19,635,989 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,073,987 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,219,373 UART:
2,219,785 UART: Running Caliptra ROM ...
2,220,959 UART:
2,221,131 UART: [state] CFI Enabled
2,222,083 UART: [state] LifecycleState = Unprovisioned
2,223,743 UART: [state] DebugLocked = No
2,224,854 UART: [state] WD Timer not started. Device not locked for debugging
2,227,327 UART: [kat] SHA2-256
2,227,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,996 UART: [kat] ++
2,231,446 UART: [kat] sha1
2,231,989 UART: [kat] SHA2-256
2,232,645 UART: [kat] SHA2-384
2,233,296 UART: [kat] SHA2-512-ACC
2,234,091 UART: [kat] ECC-384
3,280,904 UART: [kat] HMAC-384Kdf
3,293,681 UART: [kat] LMS
3,770,197 UART: [kat] --
3,773,028 UART: [cold-reset] ++
3,774,259 UART: [fht] FHT @ 0x50003400
3,785,974 UART: [idev] ++
3,786,583 UART: [idev] CDI.KEYID = 6
3,787,470 UART: [idev] SUBJECT.KEYID = 7
3,788,737 UART: [idev] UDS.KEYID = 0
3,805,963 UART: [idev] Erasing UDS.KEYID = 0
6,268,501 UART: [idev] Sha1 KeyId Algorithm
6,292,570 UART: [idev] --
6,297,377 UART: [ldev] ++
6,297,947 UART: [ldev] CDI.KEYID = 6
6,298,854 UART: [ldev] SUBJECT.KEYID = 5
6,300,061 UART: [ldev] AUTHORITY.KEYID = 7
6,301,363 UART: [ldev] FE.KEYID = 1
6,311,468 UART: [ldev] Erasing FE.KEYID = 1
8,790,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,791 UART: [ldev] --
10,584,639 UART: [fwproc] Wait for Commands...
10,586,423 UART: [fwproc] Recv command 0x46574c44
10,588,410 UART: [fwproc] Recv'd Img size: 114888 bytes
15,094,400 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
15,181,622 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,241,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,569,831 >>> mbox cmd response: success
15,573,367 UART: [afmc] ++
15,573,978 UART: [afmc] CDI.KEYID = 6
15,574,892 UART: [afmc] SUBJECT.KEYID = 7
15,576,108 UART: [afmc] AUTHORITY.KEYID = 5
18,077,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,803,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,805,293 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
19,821,246 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
19,837,225 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
19,852,764 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
19,877,052 UART: [afmc] --
19,880,255 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,880,664 UART: [cold-reset] --
19,884,934 UART: [state] Locking Datavault
19,891,256 UART: [state] Locking PCR0, PCR1 and PCR31
19,892,961 UART: [state] Locking ICCM
19,895,750 UART: [exit] Launching FMC @ 0x40000000
19,904,106 UART:
19,904,340 UART: Running Caliptra FMC ...
19,905,439 UART:
19,905,597 UART: [fmc] Received command: 0x10000000
19,908,086 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,071,991 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,536,322 >>> mbox cmd response: success
19,773,635 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
19,789,182 UART:
19,789,570 UART: Running Caliptra FMC ...
19,790,779 UART:
19,790,950 UART: [fmc] Received command: 0x10000000
19,793,162 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,878 UART: [kat] SHA2-256
891,428 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,532 UART: [kat] ++
895,684 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,793 UART: [kat] SHA2-512-ACC
906,694 UART: [kat] ECC-384
915,943 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,952 UART: [cold-reset] ++
1,170,510 UART: [fht] FHT @ 0x50003400
1,173,218 UART: [idev] ++
1,173,386 UART: [idev] CDI.KEYID = 6
1,173,747 UART: [idev] SUBJECT.KEYID = 7
1,174,172 UART: [idev] UDS.KEYID = 0
1,182,347 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,887 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,476 UART: [ldev] --
1,280,777 UART: [fwproc] Wait for Commands...
1,281,546 UART: [fwproc] Recv command 0x46574c44
1,282,279 UART: [fwproc] Recv'd Img size: 114888 bytes
3,129,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,157,861 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,183,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,323,839 >>> mbox cmd response: success
3,324,895 UART: [afmc] ++
3,325,063 UART: [afmc] CDI.KEYID = 6
3,325,426 UART: [afmc] SUBJECT.KEYID = 7
3,325,852 UART: [afmc] AUTHORITY.KEYID = 5
3,360,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,377,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,378,571 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,384,274 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,390,156 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,395,862 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,403,430 UART: [afmc] --
3,404,317 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,404,339 UART: [cold-reset] --
3,405,147 UART: [state] Locking Datavault
3,406,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,192 UART: [state] Locking ICCM
3,407,706 UART: [exit] Launching FMC @ 0x40000000
3,413,003 UART:
3,413,019 UART: Running Caliptra FMC ...
3,413,427 UART:
3,413,657 UART: [fmc] Received command: 0x10000000
3,415,826 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,177,386 >>> mbox cmd response: success
3,233,389 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,239,620 UART:
3,239,636 UART: Running Caliptra FMC ...
3,240,044 UART:
3,240,274 UART: [fmc] Received command: 0x10000000
3,242,443 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,173 UART: [kat] SHA2-256
902,113 UART: [kat] SHA2-384
905,026 UART: [kat] SHA2-512-ACC
906,927 UART: [kat] ECC-384
916,840 UART: [kat] HMAC-384Kdf
921,518 UART: [kat] LMS
1,169,830 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,075 UART: [fht] FHT @ 0x50003400
1,173,685 UART: [idev] ++
1,173,853 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,639 UART: [idev] UDS.KEYID = 0
1,182,760 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,616 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,049 UART: [ldev] --
1,282,336 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 114888 bytes
3,135,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,164,444 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,190,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,330,322 >>> mbox cmd response: success
3,331,532 UART: [afmc] ++
3,331,700 UART: [afmc] CDI.KEYID = 6
3,332,063 UART: [afmc] SUBJECT.KEYID = 7
3,332,489 UART: [afmc] AUTHORITY.KEYID = 5
3,367,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,658 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,390,361 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,396,243 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,949 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,793 UART: [afmc] --
3,410,622 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,644 UART: [cold-reset] --
3,411,540 UART: [state] Locking Datavault
3,412,667 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,271 UART: [state] Locking ICCM
3,413,775 UART: [exit] Launching FMC @ 0x40000000
3,419,072 UART:
3,419,088 UART: Running Caliptra FMC ...
3,419,496 UART:
3,419,726 UART: [fmc] Received command: 0x10000000
3,421,895 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,175,774 >>> mbox cmd response: success
3,232,321 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,238,374 UART:
3,238,390 UART: Running Caliptra FMC ...
3,238,798 UART:
3,239,028 UART: [fmc] Received command: 0x10000000
3,241,197 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,937 UART: [state] WD Timer not started. Device not locked for debugging
87,200 UART: [kat] SHA2-256
890,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,854 UART: [kat] ++
895,006 UART: [kat] sha1
899,330 UART: [kat] SHA2-256
901,270 UART: [kat] SHA2-384
903,977 UART: [kat] SHA2-512-ACC
905,878 UART: [kat] ECC-384
915,417 UART: [kat] HMAC-384Kdf
920,013 UART: [kat] LMS
1,168,325 UART: [kat] --
1,169,128 UART: [cold-reset] ++
1,169,672 UART: [fht] FHT @ 0x50003400
1,172,312 UART: [idev] ++
1,172,480 UART: [idev] CDI.KEYID = 6
1,172,841 UART: [idev] SUBJECT.KEYID = 7
1,173,266 UART: [idev] UDS.KEYID = 0
1,181,061 UART: [idev] Erasing UDS.KEYID = 0
1,197,725 UART: [idev] Sha1 KeyId Algorithm
1,206,727 UART: [idev] --
1,207,620 UART: [ldev] ++
1,207,788 UART: [ldev] CDI.KEYID = 6
1,208,152 UART: [ldev] SUBJECT.KEYID = 5
1,208,579 UART: [ldev] AUTHORITY.KEYID = 7
1,209,042 UART: [ldev] FE.KEYID = 1
1,214,116 UART: [ldev] Erasing FE.KEYID = 1
1,240,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,498 UART: [ldev] --
1,279,701 UART: [fwproc] Wait for Commands...
1,280,522 UART: [fwproc] Recv command 0x46574c44
1,281,255 UART: [fwproc] Recv'd Img size: 114888 bytes
3,134,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,089 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,188,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,129 >>> mbox cmd response: success
3,330,255 UART: [afmc] ++
3,330,423 UART: [afmc] CDI.KEYID = 6
3,330,786 UART: [afmc] SUBJECT.KEYID = 7
3,331,212 UART: [afmc] AUTHORITY.KEYID = 5
3,367,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,095 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,389,798 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,395,680 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,386 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,152 UART: [afmc] --
3,410,193 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,215 UART: [cold-reset] --
3,411,027 UART: [state] Locking Datavault
3,412,228 UART: [state] Locking PCR0, PCR1 and PCR31
3,412,832 UART: [state] Locking ICCM
3,413,252 UART: [exit] Launching FMC @ 0x40000000
3,418,549 UART:
3,418,565 UART: Running Caliptra FMC ...
3,418,973 UART:
3,419,203 UART: [fmc] Received command: 0x10000000
3,421,372 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,174,729 >>> mbox cmd response: success
3,230,442 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,236,827 UART:
3,236,843 UART: Running Caliptra FMC ...
3,237,251 UART:
3,237,481 UART: [fmc] Received command: 0x10000000
3,239,650 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,063 UART: [kat] SHA2-256
891,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,717 UART: [kat] ++
895,869 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,890 UART: [kat] LMS
1,169,202 UART: [kat] --
1,169,841 UART: [cold-reset] ++
1,170,287 UART: [fht] FHT @ 0x50003400
1,173,091 UART: [idev] ++
1,173,259 UART: [idev] CDI.KEYID = 6
1,173,620 UART: [idev] SUBJECT.KEYID = 7
1,174,045 UART: [idev] UDS.KEYID = 0
1,182,010 UART: [idev] Erasing UDS.KEYID = 0
1,199,642 UART: [idev] Sha1 KeyId Algorithm
1,208,342 UART: [idev] --
1,209,443 UART: [ldev] ++
1,209,611 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,243,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,071 UART: [ldev] --
1,282,388 UART: [fwproc] Wait for Commands...
1,283,181 UART: [fwproc] Recv command 0x46574c44
1,283,914 UART: [fwproc] Recv'd Img size: 114888 bytes
3,136,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,163,476 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,189,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,329,352 >>> mbox cmd response: success
3,330,520 UART: [afmc] ++
3,330,688 UART: [afmc] CDI.KEYID = 6
3,331,051 UART: [afmc] SUBJECT.KEYID = 7
3,331,477 UART: [afmc] AUTHORITY.KEYID = 5
3,367,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,383,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,384,352 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,390,055 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,395,937 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,401,643 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,409,389 UART: [afmc] --
3,410,386 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,410,408 UART: [cold-reset] --
3,411,540 UART: [state] Locking Datavault
3,412,447 UART: [state] Locking PCR0, PCR1 and PCR31
3,413,051 UART: [state] Locking ICCM
3,413,703 UART: [exit] Launching FMC @ 0x40000000
3,419,000 UART:
3,419,016 UART: Running Caliptra FMC ...
3,419,424 UART:
3,419,654 UART: [fmc] Received command: 0x10000000
3,421,823 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,185,900 >>> mbox cmd response: success
3,242,403 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,248,440 UART:
3,248,456 UART: Running Caliptra FMC ...
3,248,864 UART:
3,249,094 UART: [fmc] Received command: 0x10000000
3,251,263 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,245 UART: [kat] SHA2-512-ACC
906,146 UART: [kat] ECC-384
915,903 UART: [kat] HMAC-384Kdf
920,411 UART: [kat] LMS
1,168,723 UART: [kat] --
1,169,478 UART: [cold-reset] ++
1,170,040 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,181,761 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,218 UART: [ldev] ++
1,208,386 UART: [ldev] CDI.KEYID = 6
1,208,750 UART: [ldev] SUBJECT.KEYID = 5
1,209,177 UART: [ldev] AUTHORITY.KEYID = 7
1,209,640 UART: [ldev] FE.KEYID = 1
1,214,882 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,321 UART: [fwproc] Wait for Commands...
1,281,090 UART: [fwproc] Recv command 0x46574c44
1,281,823 UART: [fwproc] Recv'd Img size: 114888 bytes
3,126,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,154,758 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,180,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,320,768 >>> mbox cmd response: success
3,321,982 UART: [afmc] ++
3,322,150 UART: [afmc] CDI.KEYID = 6
3,322,513 UART: [afmc] SUBJECT.KEYID = 7
3,322,939 UART: [afmc] AUTHORITY.KEYID = 5
3,358,458 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,734 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,381,437 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,387,319 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,393,025 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,400,903 UART: [afmc] --
3,401,720 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,401,742 UART: [cold-reset] --
3,402,740 UART: [state] Locking Datavault
3,403,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,381 UART: [state] Locking ICCM
3,404,949 UART: [exit] Launching FMC @ 0x40000000
3,410,246 UART:
3,410,262 UART: Running Caliptra FMC ...
3,410,670 UART:
3,410,900 UART: [fmc] Received command: 0x10000000
3,413,069 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,181,304 >>> mbox cmd response: success
3,236,875 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,242,992 UART:
3,243,008 UART: Running Caliptra FMC ...
3,243,416 UART:
3,243,646 UART: [fmc] Received command: 0x10000000
3,245,815 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
899,789 UART: [kat] SHA2-256
901,729 UART: [kat] SHA2-384
904,298 UART: [kat] SHA2-512-ACC
906,199 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,784 UART: [kat] LMS
1,169,096 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,747 UART: [idev] ++
1,172,915 UART: [idev] CDI.KEYID = 6
1,173,276 UART: [idev] SUBJECT.KEYID = 7
1,173,701 UART: [idev] UDS.KEYID = 0
1,181,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,216,219 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,125 UART: [ldev] --
1,281,562 UART: [fwproc] Wait for Commands...
1,282,295 UART: [fwproc] Recv command 0x46574c44
1,283,028 UART: [fwproc] Recv'd Img size: 114888 bytes
3,131,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 1
3,159,786 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,185,471 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,325,722 >>> mbox cmd response: success
3,326,848 UART: [afmc] ++
3,327,016 UART: [afmc] CDI.KEYID = 6
3,327,379 UART: [afmc] SUBJECT.KEYID = 7
3,327,805 UART: [afmc] AUTHORITY.KEYID = 5
3,363,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,379,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,380,652 UART: [afmc] PUB.X = D16D79C33F252DEB516348AF23E878CCF3C23F0A18995446A2047D01C62242FC4290C662A40F50A1DDF87727B0E1F623
3,386,355 UART: [afmc] PUB.Y = E9B5CB1E0BDD8BD19484120C63CDB274E0FB2A16777FFEF8F68A9F07D885F2772568501306BFD0B01CD0AF8F9435073B
3,392,237 UART: [afmc] SIG.R = FFD915E77BC364CDF291C5CB463DB23537586132CD9FC61FD29AE00F996A6A840E5CAA63409206943E4B3BB3CB09B84F
3,397,943 UART: [afmc] SIG.S = F47B1D392D13EDAE5FF22D8AA36A68BCEA157422E5396FED1B9A1598600096343151C6523559742985D50B2242DB867E
3,405,713 UART: [afmc] --
3,406,754 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,406,776 UART: [cold-reset] --
3,407,740 UART: [state] Locking Datavault
3,408,589 UART: [state] Locking PCR0, PCR1 and PCR31
3,409,193 UART: [state] Locking ICCM
3,409,855 UART: [exit] Launching FMC @ 0x40000000
3,415,152 UART:
3,415,168 UART: Running Caliptra FMC ...
3,415,576 UART:
3,415,806 UART: [fmc] Received command: 0x10000000
3,417,975 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,176,221 >>> mbox cmd response: success
3,233,028 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
3,239,201 UART:
3,239,217 UART: Running Caliptra FMC ...
3,239,625 UART:
3,239,855 UART: [fmc] Received command: 0x10000000
3,242,024 >>> mbox cmd response data (224 bytes)
test test_fmcalias_derivation::test_pcr_log_no_owner_key_digest_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
2,221,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,222,780 UART:
2,223,047 UART: Running Caliptra ROM ...
2,224,154 UART:
2,224,310 UART: [state] CFI Enabled
2,225,196 UART: [state] LifecycleState = Unprovisioned
2,226,905 UART: [state] DebugLocked = No
2,228,023 UART: [state] WD Timer not started. Device not locked for debugging
2,230,509 UART: [kat] SHA2-256
2,231,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,234,200 UART: [kat] ++
2,234,658 UART: [kat] sha1
2,235,175 UART: [kat] SHA2-256
2,235,920 UART: [kat] SHA2-384
2,236,591 UART: [kat] SHA2-512-ACC
2,237,477 UART: [kat] ECC-384
2,947,469 UART: [kat] HMAC-384Kdf
2,972,597 UART: [kat] LMS
3,449,062 UART: [kat] --
3,454,679 UART: [cold-reset] ++
3,456,998 UART: [fht] FHT @ 0x50003400
3,468,686 UART: [idev] ++
3,469,261 UART: [idev] CDI.KEYID = 6
3,470,290 UART: [idev] SUBJECT.KEYID = 7
3,471,452 UART: [idev] UDS.KEYID = 0
3,502,672 UART: [idev] Erasing UDS.KEYID = 0
5,985,678 UART: [idev] Sha1 KeyId Algorithm
6,009,666 UART: [idev] --
6,013,618 UART: [ldev] ++
6,014,196 UART: [ldev] CDI.KEYID = 6
6,015,119 UART: [ldev] SUBJECT.KEYID = 5
6,016,286 UART: [ldev] AUTHORITY.KEYID = 7
6,017,580 UART: [ldev] FE.KEYID = 1
6,058,033 UART: [ldev] Erasing FE.KEYID = 1
8,564,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,075 UART: [ldev] --
10,372,882 UART: [fwproc] Wait for Commands...
10,375,633 UART: [fwproc] Recv command 0x4d454153
10,384,924 >>> mbox cmd response data (12 bytes)
10,385,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,386,467 UART: [fwproc] Recv command 0x4d454153
10,395,711 >>> mbox cmd response data (12 bytes)
10,396,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,398,118 UART: [fwproc] Recv command 0x4d454153
10,407,301 >>> mbox cmd response data (12 bytes)
10,407,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,714 UART: [fwproc] Recv command 0x4d454153
10,418,902 >>> mbox cmd response data (12 bytes)
10,419,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,420,591 UART: [fwproc] Recv command 0x4d454153
10,429,725 >>> mbox cmd response data (12 bytes)
10,430,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,431,690 UART: [fwproc] Recv command 0x4d454153
10,440,850 >>> mbox cmd response data (12 bytes)
10,441,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,442,159 UART: [fwproc] Recv command 0x4d454153
10,451,344 >>> mbox cmd response data (12 bytes)
10,451,767 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,453,955 UART: [fwproc] Recv command 0x4d454153
10,463,142 >>> mbox cmd response data (12 bytes)
10,464,860 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,610,194 UART: [fwproc] Recv command 0x46574c44
10,612,266 UART: [fwproc] Recv'd Img size: 114888 bytes
14,043,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,118,391 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,178,570 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,506,827 >>> mbox cmd response: success
14,510,915 UART: [afmc] ++
14,511,734 UART: [afmc] CDI.KEYID = 6
14,512,641 UART: [afmc] SUBJECT.KEYID = 7
14,513,697 UART: [afmc] AUTHORITY.KEYID = 5
17,043,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,770 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,990 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,804,783 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,820,874 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,836,368 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,861,788 UART: [afmc] --
18,865,669 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,866,020 UART: [cold-reset] --
18,871,436 UART: [state] Locking Datavault
18,876,571 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,325 UART: [state] Locking ICCM
18,879,479 UART: [exit] Launching FMC @ 0x40000000
18,887,873 UART:
18,888,111 UART: Running Caliptra FMC ...
18,889,215 UART:
18,889,382 UART: [fmc] Received command: 0x1000000A
18,895,874 >>> mbox cmd response data (928 bytes)
18,900,950 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,901,403 UART: [fmc] Received command: 0x10000009
18,903,215 >>> mbox cmd response data (48 bytes)
18,905,389 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,905,874 UART: [fmc] Received command: 0x10000003
18,915,828 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
2,218,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,291,137 >>> mbox cmd response data (12 bytes)
10,292,070 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,299,363 >>> mbox cmd response data (12 bytes)
10,299,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,307,080 >>> mbox cmd response data (12 bytes)
10,307,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,315,597 >>> mbox cmd response data (12 bytes)
10,316,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,323,834 >>> mbox cmd response data (12 bytes)
10,324,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,331,408 >>> mbox cmd response data (12 bytes)
10,331,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,339,050 >>> mbox cmd response data (12 bytes)
10,339,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,346,832 >>> mbox cmd response data (12 bytes)
10,348,623 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,389,959 >>> mbox cmd response: success
18,670,835 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,685,606 UART:
18,685,923 UART: Running Caliptra FMC ...
18,687,083 UART:
18,687,268 UART: [fmc] Received command: 0x1000000A
18,693,691 >>> mbox cmd response data (928 bytes)
18,698,960 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,699,399 UART: [fmc] Received command: 0x10000009
18,701,200 >>> mbox cmd response data (48 bytes)
18,703,353 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,703,815 UART: [fmc] Received command: 0x10000003
18,713,773 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
2,227,332 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,228,624 UART:
2,228,891 UART: Running Caliptra ROM ...
2,229,949 UART:
2,230,101 UART: [state] CFI Enabled
2,230,965 UART: [state] LifecycleState = Unprovisioned
2,232,878 UART: [state] DebugLocked = No
2,234,004 UART: [state] WD Timer not started. Device not locked for debugging
2,236,495 UART: [kat] SHA2-256
2,237,165 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,240,171 UART: [kat] ++
2,240,623 UART: [kat] sha1
2,241,134 UART: [kat] SHA2-256
2,241,874 UART: [kat] SHA2-384
2,242,560 UART: [kat] SHA2-512-ACC
2,243,393 UART: [kat] ECC-384
3,280,886 UART: [kat] HMAC-384Kdf
3,293,841 UART: [kat] LMS
3,770,326 UART: [kat] --
3,776,354 UART: [cold-reset] ++
3,777,810 UART: [fht] FHT @ 0x50003400
3,790,250 UART: [idev] ++
3,790,821 UART: [idev] CDI.KEYID = 6
3,791,795 UART: [idev] SUBJECT.KEYID = 7
3,793,006 UART: [idev] UDS.KEYID = 0
3,809,577 UART: [idev] Erasing UDS.KEYID = 0
6,272,712 UART: [idev] Sha1 KeyId Algorithm
6,295,744 UART: [idev] --
6,299,414 UART: [ldev] ++
6,299,992 UART: [ldev] CDI.KEYID = 6
6,300,921 UART: [ldev] SUBJECT.KEYID = 5
6,302,081 UART: [ldev] AUTHORITY.KEYID = 7
6,303,369 UART: [ldev] FE.KEYID = 1
6,315,024 UART: [ldev] Erasing FE.KEYID = 1
8,794,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,480 UART: [ldev] --
10,589,338 UART: [fwproc] Wait for Commands...
10,590,890 UART: [fwproc] Recv command 0x4d454153
10,600,128 >>> mbox cmd response data (12 bytes)
10,600,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,601,420 UART: [fwproc] Recv command 0x4d454153
10,610,664 >>> mbox cmd response data (12 bytes)
10,611,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,612,432 UART: [fwproc] Recv command 0x4d454153
10,621,668 >>> mbox cmd response data (12 bytes)
10,622,086 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,622,867 UART: [fwproc] Recv command 0x4d454153
10,632,049 >>> mbox cmd response data (12 bytes)
10,632,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,633,541 UART: [fwproc] Recv command 0x4d454153
10,642,729 >>> mbox cmd response data (12 bytes)
10,643,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,644,145 UART: [fwproc] Recv command 0x4d454153
10,653,325 >>> mbox cmd response data (12 bytes)
10,653,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,655,219 UART: [fwproc] Recv command 0x4d454153
10,664,400 >>> mbox cmd response data (12 bytes)
10,664,810 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,665,769 UART: [fwproc] Recv command 0x4d454153
10,674,898 >>> mbox cmd response data (12 bytes)
10,676,594 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,821,110 UART: [fwproc] Recv command 0x46574c44
10,823,168 UART: [fwproc] Recv'd Img size: 114888 bytes
14,266,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,343,350 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,403,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,731,653 >>> mbox cmd response: success
14,735,517 UART: [afmc] ++
14,736,116 UART: [afmc] CDI.KEYID = 6
14,737,094 UART: [afmc] SUBJECT.KEYID = 7
14,738,307 UART: [afmc] AUTHORITY.KEYID = 5
17,241,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,965,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,967,791 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,983,579 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,999,669 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,015,158 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,039,842 UART: [afmc] --
19,043,967 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
19,044,346 UART: [cold-reset] --
19,047,754 UART: [state] Locking Datavault
19,053,815 UART: [state] Locking PCR0, PCR1 and PCR31
19,055,572 UART: [state] Locking ICCM
19,057,394 UART: [exit] Launching FMC @ 0x40000000
19,065,789 UART:
19,066,025 UART: Running Caliptra FMC ...
19,067,129 UART:
19,067,295 UART: [fmc] Received command: 0x1000000A
19,073,831 >>> mbox cmd response data (928 bytes)
19,079,134 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
19,079,594 UART: [fmc] Received command: 0x10000009
19,081,405 >>> mbox cmd response data (48 bytes)
19,083,688 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
19,084,150 UART: [fmc] Received command: 0x10000003
19,094,093 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,224,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,500,204 >>> mbox cmd response data (12 bytes)
10,500,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,509,298 >>> mbox cmd response data (12 bytes)
10,509,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,516,895 >>> mbox cmd response data (12 bytes)
10,517,313 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,525,990 >>> mbox cmd response data (12 bytes)
10,526,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,534,162 >>> mbox cmd response data (12 bytes)
10,534,585 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,542,168 >>> mbox cmd response data (12 bytes)
10,542,613 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,551,013 >>> mbox cmd response data (12 bytes)
10,551,432 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,559,228 >>> mbox cmd response data (12 bytes)
10,560,996 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,598,567 >>> mbox cmd response: success
18,836,886 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,852,049 UART:
18,852,401 UART: Running Caliptra FMC ...
18,853,585 UART:
18,853,747 UART: [fmc] Received command: 0x1000000A
18,860,095 >>> mbox cmd response data (928 bytes)
18,865,213 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,865,649 UART: [fmc] Received command: 0x10000009
18,867,439 >>> mbox cmd response data (48 bytes)
18,869,611 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,870,094 UART: [fmc] Received command: 0x10000003
18,880,052 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,966 UART: [kat] SHA2-256
891,516 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,620 UART: [kat] ++
895,772 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,932 UART: [fht] FHT @ 0x50003400
1,172,382 UART: [idev] ++
1,172,550 UART: [idev] CDI.KEYID = 6
1,172,911 UART: [idev] SUBJECT.KEYID = 7
1,173,336 UART: [idev] UDS.KEYID = 0
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,197,961 UART: [idev] Sha1 KeyId Algorithm
1,206,869 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,672 UART: [ldev] Erasing FE.KEYID = 1
1,240,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,354 UART: [ldev] --
1,279,567 UART: [fwproc] Wait for Commands...
1,280,218 UART: [fwproc] Recv command 0x4d454153
1,284,241 >>> mbox cmd response data (12 bytes)
1,284,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,284,451 UART: [fwproc] Recv command 0x4d454153
1,288,474 >>> mbox cmd response data (12 bytes)
1,288,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,288,622 UART: [fwproc] Recv command 0x4d454153
1,292,645 >>> mbox cmd response data (12 bytes)
1,292,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,851 UART: [fwproc] Recv command 0x4d454153
1,296,874 >>> mbox cmd response data (12 bytes)
1,296,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,064 UART: [fwproc] Recv command 0x4d454153
1,301,087 >>> mbox cmd response data (12 bytes)
1,301,088 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,301,243 UART: [fwproc] Recv command 0x4d454153
1,305,266 >>> mbox cmd response data (12 bytes)
1,305,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,305,392 UART: [fwproc] Recv command 0x4d454153
1,309,415 >>> mbox cmd response data (12 bytes)
1,309,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,309,479 UART: [fwproc] Recv command 0x4d454153
1,313,502 >>> mbox cmd response data (12 bytes)
1,313,503 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,313,576 UART: [fwproc] Recv command 0x46574c44
1,314,309 UART: [fwproc] Recv'd Img size: 114888 bytes
2,618,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,622 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,671,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,811,480 >>> mbox cmd response: success
2,812,578 UART: [afmc] ++
2,812,746 UART: [afmc] CDI.KEYID = 6
2,813,109 UART: [afmc] SUBJECT.KEYID = 7
2,813,535 UART: [afmc] AUTHORITY.KEYID = 5
2,848,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,864,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,865,462 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,871,158 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,877,057 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,882,750 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,890,494 UART: [afmc] --
2,891,385 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,891,407 UART: [cold-reset] --
2,892,533 UART: [state] Locking Datavault
2,893,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,894,152 UART: [state] Locking ICCM
2,894,812 UART: [exit] Launching FMC @ 0x40000000
2,900,109 UART:
2,900,125 UART: Running Caliptra FMC ...
2,900,533 UART:
2,900,763 UART: [fmc] Received command: 0x1000000A
2,906,994 >>> mbox cmd response data (928 bytes)
2,906,995 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,907,024 UART: [fmc] Received command: 0x10000009
2,908,222 >>> mbox cmd response data (48 bytes)
2,908,223 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,908,252 UART: [fmc] Received command: 0x10000003
2,917,708 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,166 >>> mbox cmd response data (12 bytes)
1,141,167 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,689 >>> mbox cmd response data (12 bytes)
1,144,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,146 >>> mbox cmd response data (12 bytes)
1,148,147 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,713 >>> mbox cmd response data (12 bytes)
1,151,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,216 >>> mbox cmd response data (12 bytes)
1,155,217 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,823 >>> mbox cmd response data (12 bytes)
1,158,824 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,256 >>> mbox cmd response data (12 bytes)
1,162,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,663 >>> mbox cmd response data (12 bytes)
1,165,664 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,659,271 >>> mbox cmd response: success
2,714,424 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,720,193 UART:
2,720,209 UART: Running Caliptra FMC ...
2,720,617 UART:
2,720,847 UART: [fmc] Received command: 0x1000000A
2,727,078 >>> mbox cmd response data (928 bytes)
2,727,079 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,727,108 UART: [fmc] Received command: 0x10000009
2,728,306 >>> mbox cmd response data (48 bytes)
2,728,307 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,728,336 UART: [fmc] Received command: 0x10000003
2,737,792 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,657 UART: [kat] SHA2-256
891,207 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,311 UART: [kat] ++
895,463 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,416 UART: [kat] SHA2-512-ACC
906,317 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,751 UART: [cold-reset] ++
1,170,275 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,199,528 UART: [idev] Sha1 KeyId Algorithm
1,208,540 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,101 UART: [ldev] SUBJECT.KEYID = 5
1,210,528 UART: [ldev] AUTHORITY.KEYID = 7
1,210,991 UART: [ldev] FE.KEYID = 1
1,216,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,717 UART: [ldev] --
1,281,944 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x4d454153
1,286,710 >>> mbox cmd response data (12 bytes)
1,286,711 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,844 UART: [fwproc] Recv command 0x4d454153
1,290,867 >>> mbox cmd response data (12 bytes)
1,290,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,121 UART: [fwproc] Recv command 0x4d454153
1,295,144 >>> mbox cmd response data (12 bytes)
1,295,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,326 UART: [fwproc] Recv command 0x4d454153
1,299,349 >>> mbox cmd response data (12 bytes)
1,299,350 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,547 UART: [fwproc] Recv command 0x4d454153
1,303,570 >>> mbox cmd response data (12 bytes)
1,303,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,738 UART: [fwproc] Recv command 0x4d454153
1,307,761 >>> mbox cmd response data (12 bytes)
1,307,762 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,915 UART: [fwproc] Recv command 0x4d454153
1,311,938 >>> mbox cmd response data (12 bytes)
1,311,939 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,038 UART: [fwproc] Recv command 0x4d454153
1,316,061 >>> mbox cmd response data (12 bytes)
1,316,062 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,316,269 UART: [fwproc] Recv command 0x46574c44
1,317,002 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,529 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,673,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,813,375 >>> mbox cmd response: success
2,814,579 UART: [afmc] ++
2,814,747 UART: [afmc] CDI.KEYID = 6
2,815,110 UART: [afmc] SUBJECT.KEYID = 7
2,815,536 UART: [afmc] AUTHORITY.KEYID = 5
2,851,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,867,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,868,575 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,874,271 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,880,170 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,885,863 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,893,655 UART: [afmc] --
2,894,502 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,894,524 UART: [cold-reset] --
2,895,342 UART: [state] Locking Datavault
2,896,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,285 UART: [state] Locking ICCM
2,897,861 UART: [exit] Launching FMC @ 0x40000000
2,903,158 UART:
2,903,174 UART: Running Caliptra FMC ...
2,903,582 UART:
2,903,812 UART: [fmc] Received command: 0x1000000A
2,910,043 >>> mbox cmd response data (928 bytes)
2,910,044 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,073 UART: [fmc] Received command: 0x10000009
2,911,271 >>> mbox cmd response data (48 bytes)
2,911,272 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,911,301 UART: [fmc] Received command: 0x10000003
2,920,757 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,965 >>> mbox cmd response data (12 bytes)
1,142,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,426 >>> mbox cmd response data (12 bytes)
1,146,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,965 >>> mbox cmd response data (12 bytes)
1,149,966 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,360 >>> mbox cmd response data (12 bytes)
1,153,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,935 >>> mbox cmd response data (12 bytes)
1,156,936 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,320 >>> mbox cmd response data (12 bytes)
1,160,321 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,711 >>> mbox cmd response data (12 bytes)
1,163,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,148 >>> mbox cmd response data (12 bytes)
1,167,149 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,756 >>> mbox cmd response: success
2,716,361 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,722,680 UART:
2,722,696 UART: Running Caliptra FMC ...
2,723,104 UART:
2,723,334 UART: [fmc] Received command: 0x1000000A
2,729,565 >>> mbox cmd response data (928 bytes)
2,729,566 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,729,595 UART: [fmc] Received command: 0x10000009
2,730,793 >>> mbox cmd response data (48 bytes)
2,730,794 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,730,823 UART: [fmc] Received command: 0x10000003
2,740,279 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,635 UART: [kat] LMS
1,168,947 UART: [kat] --
1,170,036 UART: [cold-reset] ++
1,170,446 UART: [fht] FHT @ 0x50003400
1,172,988 UART: [idev] ++
1,173,156 UART: [idev] CDI.KEYID = 6
1,173,517 UART: [idev] SUBJECT.KEYID = 7
1,173,942 UART: [idev] UDS.KEYID = 0
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,619 UART: [idev] Sha1 KeyId Algorithm
1,208,609 UART: [idev] --
1,209,600 UART: [ldev] ++
1,209,768 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,559 UART: [ldev] AUTHORITY.KEYID = 7
1,211,022 UART: [ldev] FE.KEYID = 1
1,216,308 UART: [ldev] Erasing FE.KEYID = 1
1,242,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,491 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x4d454153
1,286,297 >>> mbox cmd response data (12 bytes)
1,286,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,385 UART: [fwproc] Recv command 0x4d454153
1,290,408 >>> mbox cmd response data (12 bytes)
1,290,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,674 UART: [fwproc] Recv command 0x4d454153
1,294,697 >>> mbox cmd response data (12 bytes)
1,294,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,975 UART: [fwproc] Recv command 0x4d454153
1,298,998 >>> mbox cmd response data (12 bytes)
1,298,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,120 UART: [fwproc] Recv command 0x4d454153
1,303,143 >>> mbox cmd response data (12 bytes)
1,303,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,273 UART: [fwproc] Recv command 0x4d454153
1,307,296 >>> mbox cmd response data (12 bytes)
1,307,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,376 UART: [fwproc] Recv command 0x4d454153
1,311,399 >>> mbox cmd response data (12 bytes)
1,311,400 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,501 UART: [fwproc] Recv command 0x4d454153
1,315,524 >>> mbox cmd response data (12 bytes)
1,315,525 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,832 UART: [fwproc] Recv command 0x46574c44
1,316,565 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,576 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,812,588 >>> mbox cmd response: success
2,813,632 UART: [afmc] ++
2,813,800 UART: [afmc] CDI.KEYID = 6
2,814,163 UART: [afmc] SUBJECT.KEYID = 7
2,814,589 UART: [afmc] AUTHORITY.KEYID = 5
2,850,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,866,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,867,012 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,872,708 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,878,607 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,884,300 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,892,244 UART: [afmc] --
2,893,227 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,893,249 UART: [cold-reset] --
2,894,111 UART: [state] Locking Datavault
2,895,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,895,996 UART: [state] Locking ICCM
2,896,626 UART: [exit] Launching FMC @ 0x40000000
2,901,923 UART:
2,901,939 UART: Running Caliptra FMC ...
2,902,347 UART:
2,902,577 UART: [fmc] Received command: 0x1000000A
2,908,808 >>> mbox cmd response data (928 bytes)
2,908,809 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,908,838 UART: [fmc] Received command: 0x10000009
2,910,036 >>> mbox cmd response data (48 bytes)
2,910,037 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,910,066 UART: [fmc] Received command: 0x10000003
2,919,522 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,626 >>> mbox cmd response data (12 bytes)
1,141,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,053 >>> mbox cmd response data (12 bytes)
1,145,054 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,522 >>> mbox cmd response data (12 bytes)
1,148,523 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,925 >>> mbox cmd response data (12 bytes)
1,151,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,296 >>> mbox cmd response data (12 bytes)
1,155,297 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,685 >>> mbox cmd response data (12 bytes)
1,158,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,258 >>> mbox cmd response data (12 bytes)
1,162,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,627 >>> mbox cmd response data (12 bytes)
1,165,628 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,658,033 >>> mbox cmd response: success
2,714,108 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,720,381 UART:
2,720,397 UART: Running Caliptra FMC ...
2,720,805 UART:
2,721,035 UART: [fmc] Received command: 0x1000000A
2,727,266 >>> mbox cmd response data (928 bytes)
2,727,267 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,727,296 UART: [fmc] Received command: 0x10000009
2,728,494 >>> mbox cmd response data (48 bytes)
2,728,495 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,728,524 UART: [fmc] Received command: 0x10000003
2,737,980 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,845 UART: [state] LifecycleState = Unprovisioned
85,500 UART: [state] DebugLocked = No
86,020 UART: [state] WD Timer not started. Device not locked for debugging
87,303 UART: [kat] SHA2-256
890,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,957 UART: [kat] ++
895,109 UART: [kat] sha1
899,391 UART: [kat] SHA2-256
901,331 UART: [kat] SHA2-384
903,898 UART: [kat] SHA2-512-ACC
905,799 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,324 UART: [kat] LMS
1,168,636 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,129 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,181,770 UART: [idev] Erasing UDS.KEYID = 0
1,198,482 UART: [idev] Sha1 KeyId Algorithm
1,207,276 UART: [idev] --
1,208,427 UART: [ldev] ++
1,208,595 UART: [ldev] CDI.KEYID = 6
1,208,959 UART: [ldev] SUBJECT.KEYID = 5
1,209,386 UART: [ldev] AUTHORITY.KEYID = 7
1,209,849 UART: [ldev] FE.KEYID = 1
1,214,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,508 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,949 UART: [ldev] --
1,281,346 UART: [fwproc] Wait for Commands...
1,282,011 UART: [fwproc] Recv command 0x4d454153
1,286,034 >>> mbox cmd response data (12 bytes)
1,286,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,258 UART: [fwproc] Recv command 0x4d454153
1,290,281 >>> mbox cmd response data (12 bytes)
1,290,282 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,407 UART: [fwproc] Recv command 0x4d454153
1,294,430 >>> mbox cmd response data (12 bytes)
1,294,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,644 UART: [fwproc] Recv command 0x4d454153
1,298,667 >>> mbox cmd response data (12 bytes)
1,298,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,819 UART: [fwproc] Recv command 0x4d454153
1,302,842 >>> mbox cmd response data (12 bytes)
1,302,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,148 UART: [fwproc] Recv command 0x4d454153
1,307,171 >>> mbox cmd response data (12 bytes)
1,307,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,305 UART: [fwproc] Recv command 0x4d454153
1,311,328 >>> mbox cmd response data (12 bytes)
1,311,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,554 UART: [fwproc] Recv command 0x4d454153
1,315,577 >>> mbox cmd response data (12 bytes)
1,315,578 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,315,875 UART: [fwproc] Recv command 0x46574c44
1,316,608 UART: [fwproc] Recv'd Img size: 114888 bytes
2,620,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,855 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,673,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,813,769 >>> mbox cmd response: success
2,814,971 UART: [afmc] ++
2,815,139 UART: [afmc] CDI.KEYID = 6
2,815,502 UART: [afmc] SUBJECT.KEYID = 7
2,815,928 UART: [afmc] AUTHORITY.KEYID = 5
2,851,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,868,785 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,874,481 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,880,380 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,886,073 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,893,893 UART: [afmc] --
2,894,802 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,894,824 UART: [cold-reset] --
2,895,796 UART: [state] Locking Datavault
2,897,257 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,861 UART: [state] Locking ICCM
2,898,523 UART: [exit] Launching FMC @ 0x40000000
2,903,820 UART:
2,903,836 UART: Running Caliptra FMC ...
2,904,244 UART:
2,904,474 UART: [fmc] Received command: 0x1000000A
2,910,705 >>> mbox cmd response data (928 bytes)
2,910,706 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,735 UART: [fmc] Received command: 0x10000009
2,911,933 >>> mbox cmd response data (48 bytes)
2,911,934 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,911,963 UART: [fmc] Received command: 0x10000003
2,921,419 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,225 >>> mbox cmd response data (12 bytes)
1,142,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,594 >>> mbox cmd response data (12 bytes)
1,145,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,117 >>> mbox cmd response data (12 bytes)
1,149,118 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,516 >>> mbox cmd response data (12 bytes)
1,152,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,031 >>> mbox cmd response data (12 bytes)
1,156,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,488 >>> mbox cmd response data (12 bytes)
1,159,489 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,015 >>> mbox cmd response data (12 bytes)
1,163,016 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,490 >>> mbox cmd response data (12 bytes)
1,166,491 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,660,526 >>> mbox cmd response: success
2,716,475 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,722,382 UART:
2,722,398 UART: Running Caliptra FMC ...
2,722,806 UART:
2,723,036 UART: [fmc] Received command: 0x1000000A
2,729,267 >>> mbox cmd response data (928 bytes)
2,729,268 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,729,297 UART: [fmc] Received command: 0x10000009
2,730,495 >>> mbox cmd response data (48 bytes)
2,730,496 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,730,525 UART: [fmc] Received command: 0x10000003
2,739,981 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,510 UART: [state] LifecycleState = Unprovisioned
86,165 UART: [state] DebugLocked = No
86,885 UART: [state] WD Timer not started. Device not locked for debugging
88,158 UART: [kat] SHA2-256
891,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,812 UART: [kat] ++
895,964 UART: [kat] sha1
900,184 UART: [kat] SHA2-256
902,124 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,823 UART: [kat] LMS
1,169,135 UART: [kat] --
1,169,736 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,431 UART: [idev] Sha1 KeyId Algorithm
1,208,301 UART: [idev] --
1,209,564 UART: [ldev] ++
1,209,732 UART: [ldev] CDI.KEYID = 6
1,210,096 UART: [ldev] SUBJECT.KEYID = 5
1,210,523 UART: [ldev] AUTHORITY.KEYID = 7
1,210,986 UART: [ldev] FE.KEYID = 1
1,216,266 UART: [ldev] Erasing FE.KEYID = 1
1,242,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,254 UART: [ldev] --
1,281,461 UART: [fwproc] Wait for Commands...
1,282,276 UART: [fwproc] Recv command 0x4d454153
1,286,299 >>> mbox cmd response data (12 bytes)
1,286,300 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,575 UART: [fwproc] Recv command 0x4d454153
1,290,598 >>> mbox cmd response data (12 bytes)
1,290,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,860 UART: [fwproc] Recv command 0x4d454153
1,294,883 >>> mbox cmd response data (12 bytes)
1,294,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,141 UART: [fwproc] Recv command 0x4d454153
1,299,164 >>> mbox cmd response data (12 bytes)
1,299,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,460 UART: [fwproc] Recv command 0x4d454153
1,303,483 >>> mbox cmd response data (12 bytes)
1,303,484 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,675 UART: [fwproc] Recv command 0x4d454153
1,307,698 >>> mbox cmd response data (12 bytes)
1,307,699 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,944 UART: [fwproc] Recv command 0x4d454153
1,311,967 >>> mbox cmd response data (12 bytes)
1,311,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,135 UART: [fwproc] Recv command 0x4d454153
1,316,158 >>> mbox cmd response data (12 bytes)
1,316,159 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,316,452 UART: [fwproc] Recv command 0x46574c44
1,317,185 UART: [fwproc] Recv'd Img size: 114888 bytes
2,619,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,647,260 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,672,945 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,813,098 >>> mbox cmd response: success
2,814,196 UART: [afmc] ++
2,814,364 UART: [afmc] CDI.KEYID = 6
2,814,727 UART: [afmc] SUBJECT.KEYID = 7
2,815,153 UART: [afmc] AUTHORITY.KEYID = 5
2,850,698 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,867,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,868,050 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,873,746 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,879,645 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,885,338 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,893,312 UART: [afmc] --
2,894,107 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,894,129 UART: [cold-reset] --
2,894,765 UART: [state] Locking Datavault
2,895,964 UART: [state] Locking PCR0, PCR1 and PCR31
2,896,568 UART: [state] Locking ICCM
2,897,098 UART: [exit] Launching FMC @ 0x40000000
2,902,395 UART:
2,902,411 UART: Running Caliptra FMC ...
2,902,819 UART:
2,903,049 UART: [fmc] Received command: 0x1000000A
2,909,280 >>> mbox cmd response data (928 bytes)
2,909,281 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,909,310 UART: [fmc] Received command: 0x10000009
2,910,508 >>> mbox cmd response data (48 bytes)
2,910,509 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,910,538 UART: [fmc] Received command: 0x10000003
2,919,994 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,974 >>> mbox cmd response data (12 bytes)
1,141,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,539 >>> mbox cmd response data (12 bytes)
1,145,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,006 >>> mbox cmd response data (12 bytes)
1,149,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,441 >>> mbox cmd response data (12 bytes)
1,152,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,980 >>> mbox cmd response data (12 bytes)
1,155,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,511 >>> mbox cmd response data (12 bytes)
1,159,512 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,952 >>> mbox cmd response data (12 bytes)
1,162,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,375 >>> mbox cmd response data (12 bytes)
1,166,376 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,657,837 >>> mbox cmd response: success
2,713,434 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,719,205 UART:
2,719,221 UART: Running Caliptra FMC ...
2,719,629 UART:
2,719,859 UART: [fmc] Received command: 0x1000000A
2,726,090 >>> mbox cmd response data (928 bytes)
2,726,091 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,726,120 UART: [fmc] Received command: 0x10000009
2,727,318 >>> mbox cmd response data (48 bytes)
2,727,319 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,727,348 UART: [fmc] Received command: 0x10000003
2,736,804 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,131 UART: [kat] SHA2-256
891,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,785 UART: [kat] ++
895,937 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,850 UART: [kat] SHA2-512-ACC
906,751 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,342 UART: [kat] LMS
1,169,654 UART: [kat] --
1,170,745 UART: [cold-reset] ++
1,171,273 UART: [fht] FHT @ 0x50003400
1,174,005 UART: [idev] ++
1,174,173 UART: [idev] CDI.KEYID = 6
1,174,534 UART: [idev] SUBJECT.KEYID = 7
1,174,959 UART: [idev] UDS.KEYID = 0
1,182,838 UART: [idev] Erasing UDS.KEYID = 0
1,200,358 UART: [idev] Sha1 KeyId Algorithm
1,209,176 UART: [idev] --
1,210,221 UART: [ldev] ++
1,210,389 UART: [ldev] CDI.KEYID = 6
1,210,753 UART: [ldev] SUBJECT.KEYID = 5
1,211,180 UART: [ldev] AUTHORITY.KEYID = 7
1,211,643 UART: [ldev] FE.KEYID = 1
1,217,071 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,449 UART: [ldev] --
1,282,898 UART: [fwproc] Wait for Commands...
1,283,605 UART: [fwproc] Recv command 0x4d454153
1,287,628 >>> mbox cmd response data (12 bytes)
1,287,629 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,892 UART: [fwproc] Recv command 0x4d454153
1,291,915 >>> mbox cmd response data (12 bytes)
1,291,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,292,201 UART: [fwproc] Recv command 0x4d454153
1,296,224 >>> mbox cmd response data (12 bytes)
1,296,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,296 UART: [fwproc] Recv command 0x4d454153
1,300,319 >>> mbox cmd response data (12 bytes)
1,300,320 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,565 UART: [fwproc] Recv command 0x4d454153
1,304,588 >>> mbox cmd response data (12 bytes)
1,304,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,726 UART: [fwproc] Recv command 0x4d454153
1,308,749 >>> mbox cmd response data (12 bytes)
1,308,750 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,879 UART: [fwproc] Recv command 0x4d454153
1,312,902 >>> mbox cmd response data (12 bytes)
1,312,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,313,116 UART: [fwproc] Recv command 0x4d454153
1,317,139 >>> mbox cmd response data (12 bytes)
1,317,140 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,317,427 UART: [fwproc] Recv command 0x46574c44
1,318,160 UART: [fwproc] Recv'd Img size: 114888 bytes
2,621,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,414 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,674,099 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,814,390 >>> mbox cmd response: success
2,815,578 UART: [afmc] ++
2,815,746 UART: [afmc] CDI.KEYID = 6
2,816,109 UART: [afmc] SUBJECT.KEYID = 7
2,816,535 UART: [afmc] AUTHORITY.KEYID = 5
2,852,270 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,799 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,869,548 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,875,244 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,881,143 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,886,836 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,894,596 UART: [afmc] --
2,895,597 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,895,619 UART: [cold-reset] --
2,896,485 UART: [state] Locking Datavault
2,897,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,898,128 UART: [state] Locking ICCM
2,898,680 UART: [exit] Launching FMC @ 0x40000000
2,903,977 UART:
2,903,993 UART: Running Caliptra FMC ...
2,904,401 UART:
2,904,631 UART: [fmc] Received command: 0x1000000A
2,910,862 >>> mbox cmd response data (928 bytes)
2,910,863 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,910,892 UART: [fmc] Received command: 0x10000009
2,912,090 >>> mbox cmd response data (48 bytes)
2,912,091 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,912,120 UART: [fmc] Received command: 0x10000003
2,921,576 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,465 >>> mbox cmd response data (12 bytes)
1,143,466 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,882 >>> mbox cmd response data (12 bytes)
1,146,883 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,321 >>> mbox cmd response data (12 bytes)
1,150,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,778 >>> mbox cmd response data (12 bytes)
1,153,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,155 >>> mbox cmd response data (12 bytes)
1,157,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,548 >>> mbox cmd response data (12 bytes)
1,160,549 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,143 >>> mbox cmd response data (12 bytes)
1,164,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,596 >>> mbox cmd response data (12 bytes)
1,167,597 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,659,485 >>> mbox cmd response: success
2,716,144 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,722,421 UART:
2,722,437 UART: Running Caliptra FMC ...
2,722,845 UART:
2,723,075 UART: [fmc] Received command: 0x1000000A
2,729,306 >>> mbox cmd response data (928 bytes)
2,729,307 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,729,336 UART: [fmc] Received command: 0x10000009
2,730,534 >>> mbox cmd response data (48 bytes)
2,730,535 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,730,564 UART: [fmc] Received command: 0x10000003
2,740,020 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_measurement_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
3,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,060 UART:
192,418 UART: Running Caliptra ROM ...
193,518 UART:
193,695 UART: [state] CFI Enabled
266,741 UART: [state] LifecycleState = Unprovisioned
268,664 UART: [state] DebugLocked = No
271,066 UART: [state] WD Timer not started. Device not locked for debugging
275,212 UART: [kat] SHA2-256
454,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,634 UART: [kat] ++
466,221 UART: [kat] sha1
475,975 UART: [kat] SHA2-256
478,659 UART: [kat] SHA2-384
485,823 UART: [kat] SHA2-512-ACC
488,215 UART: [kat] ECC-384
2,946,382 UART: [kat] HMAC-384Kdf
2,970,525 UART: [kat] LMS
3,447,003 UART: [kat] --
3,453,125 UART: [cold-reset] ++
3,455,248 UART: [fht] FHT @ 0x50003400
3,466,503 UART: [idev] ++
3,467,080 UART: [idev] CDI.KEYID = 6
3,468,056 UART: [idev] SUBJECT.KEYID = 7
3,469,276 UART: [idev] UDS.KEYID = 0
3,499,777 UART: [idev] Erasing UDS.KEYID = 0
5,983,946 UART: [idev] Sha1 KeyId Algorithm
6,007,988 UART: [idev] --
6,012,318 UART: [ldev] ++
6,012,896 UART: [ldev] CDI.KEYID = 6
6,013,812 UART: [ldev] SUBJECT.KEYID = 5
6,015,030 UART: [ldev] AUTHORITY.KEYID = 7
6,016,275 UART: [ldev] FE.KEYID = 1
6,055,984 UART: [ldev] Erasing FE.KEYID = 1
8,563,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,120 UART: [ldev] --
10,374,269 UART: [fwproc] Wait for Commands...
10,377,238 UART: [fwproc] Recv command 0x4d454153
10,386,474 >>> mbox cmd response data (12 bytes)
10,387,107 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,387,751 UART: [fwproc] Recv command 0x4d454153
10,396,993 >>> mbox cmd response data (12 bytes)
10,397,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,398,632 UART: [fwproc] Recv command 0x4d454153
10,407,873 >>> mbox cmd response data (12 bytes)
10,408,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,409,675 UART: [fwproc] Recv command 0x4d454153
10,418,860 >>> mbox cmd response data (12 bytes)
10,419,291 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,421,209 UART: [fwproc] Recv command 0x4d454153
10,430,390 >>> mbox cmd response data (12 bytes)
10,430,813 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,432,138 UART: [fwproc] Recv command 0x4d454153
10,441,338 >>> mbox cmd response data (12 bytes)
10,441,792 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,443,986 UART: [fwproc] Recv command 0x4d454153
10,453,121 >>> mbox cmd response data (12 bytes)
10,453,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,454,549 UART: [fwproc] Recv command 0x4d454153
10,463,681 >>> mbox cmd response data (12 bytes)
10,464,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,464,988 UART: [fwproc] Recv command 0x4d454153
10,467,043 UART: [fwproc] Max # of measurements received.
10,468,939 >>> mbox cmd response: failed
10,472,098 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,830 writing to cptra_bootfsm_go
4,190 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,270,783 >>> mbox cmd response data (12 bytes)
10,271,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,279,049 >>> mbox cmd response data (12 bytes)
10,279,495 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,286,824 >>> mbox cmd response data (12 bytes)
10,287,239 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,295,371 >>> mbox cmd response data (12 bytes)
10,295,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,303,499 >>> mbox cmd response data (12 bytes)
10,303,909 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,310,958 >>> mbox cmd response data (12 bytes)
10,311,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,318,681 >>> mbox cmd response data (12 bytes)
10,319,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,327,190 >>> mbox cmd response data (12 bytes)
10,327,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,328,212 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,212 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,604 UART:
192,976 UART: Running Caliptra ROM ...
194,163 UART:
603,875 UART: [state] CFI Enabled
618,366 UART: [state] LifecycleState = Unprovisioned
620,278 UART: [state] DebugLocked = No
622,082 UART: [state] WD Timer not started. Device not locked for debugging
625,077 UART: [kat] SHA2-256
804,740 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,523 UART: [kat] ++
816,055 UART: [kat] sha1
827,211 UART: [kat] SHA2-256
829,895 UART: [kat] SHA2-384
835,435 UART: [kat] SHA2-512-ACC
837,822 UART: [kat] ECC-384
3,279,833 UART: [kat] HMAC-384Kdf
3,291,144 UART: [kat] LMS
3,767,688 UART: [kat] --
3,772,208 UART: [cold-reset] ++
3,773,974 UART: [fht] FHT @ 0x50003400
3,784,140 UART: [idev] ++
3,784,708 UART: [idev] CDI.KEYID = 6
3,785,722 UART: [idev] SUBJECT.KEYID = 7
3,786,880 UART: [idev] UDS.KEYID = 0
3,801,933 UART: [idev] Erasing UDS.KEYID = 0
6,262,464 UART: [idev] Sha1 KeyId Algorithm
6,286,803 UART: [idev] --
6,291,666 UART: [ldev] ++
6,292,290 UART: [ldev] CDI.KEYID = 6
6,293,198 UART: [ldev] SUBJECT.KEYID = 5
6,294,408 UART: [ldev] AUTHORITY.KEYID = 7
6,295,638 UART: [ldev] FE.KEYID = 1
6,307,470 UART: [ldev] Erasing FE.KEYID = 1
8,787,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,080 UART: [ldev] --
10,580,812 UART: [fwproc] Wait for Commands...
10,583,342 UART: [fwproc] Recv command 0x4d454153
10,592,588 >>> mbox cmd response data (12 bytes)
10,593,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,593,783 UART: [fwproc] Recv command 0x4d454153
10,603,022 >>> mbox cmd response data (12 bytes)
10,603,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,604,877 UART: [fwproc] Recv command 0x4d454153
10,614,060 >>> mbox cmd response data (12 bytes)
10,614,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,615,519 UART: [fwproc] Recv command 0x4d454153
10,624,645 >>> mbox cmd response data (12 bytes)
10,625,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,627,189 UART: [fwproc] Recv command 0x4d454153
10,636,368 >>> mbox cmd response data (12 bytes)
10,636,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,637,843 UART: [fwproc] Recv command 0x4d454153
10,646,979 >>> mbox cmd response data (12 bytes)
10,647,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,648,186 UART: [fwproc] Recv command 0x4d454153
10,657,315 >>> mbox cmd response data (12 bytes)
10,657,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,659,916 UART: [fwproc] Recv command 0x4d454153
10,669,104 >>> mbox cmd response data (12 bytes)
10,669,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,670,023 UART: [fwproc] Recv command 0x4d454153
10,672,067 UART: [fwproc] Max # of measurements received.
10,673,950 >>> mbox cmd response: failed
10,676,112 UART: ROM Fatal Error: 0x01020008test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,866 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,487,455 >>> mbox cmd response data (12 bytes)
10,488,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,495,786 >>> mbox cmd response data (12 bytes)
10,496,226 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,503,331 >>> mbox cmd response data (12 bytes)
10,503,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,511,751 >>> mbox cmd response data (12 bytes)
10,512,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,519,922 >>> mbox cmd response data (12 bytes)
10,520,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,528,773 >>> mbox cmd response data (12 bytes)
10,529,198 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,537,162 >>> mbox cmd response data (12 bytes)
10,537,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,545,225 >>> mbox cmd response data (12 bytes)
10,545,634 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,546,662 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
915,481 UART: [kat] HMAC-384Kdf
919,997 UART: [kat] LMS
1,168,309 UART: [kat] --
1,169,480 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,562 UART: [idev] ++
1,172,730 UART: [idev] CDI.KEYID = 6
1,173,091 UART: [idev] SUBJECT.KEYID = 7
1,173,516 UART: [idev] UDS.KEYID = 0
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,667 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,808 UART: [ldev] --
1,281,147 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x4d454153
1,285,971 >>> mbox cmd response data (12 bytes)
1,285,972 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,075 UART: [fwproc] Recv command 0x4d454153
1,290,098 >>> mbox cmd response data (12 bytes)
1,290,099 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,402 UART: [fwproc] Recv command 0x4d454153
1,294,425 >>> mbox cmd response data (12 bytes)
1,294,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,294,569 UART: [fwproc] Recv command 0x4d454153
1,298,592 >>> mbox cmd response data (12 bytes)
1,298,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,298,850 UART: [fwproc] Recv command 0x4d454153
1,302,873 >>> mbox cmd response data (12 bytes)
1,302,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,031 UART: [fwproc] Recv command 0x4d454153
1,307,054 >>> mbox cmd response data (12 bytes)
1,307,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,307,260 UART: [fwproc] Recv command 0x4d454153
1,311,283 >>> mbox cmd response data (12 bytes)
1,311,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,311,419 UART: [fwproc] Recv command 0x4d454153
1,315,442 >>> mbox cmd response data (12 bytes)
1,315,443 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,315,740 UART: [fwproc] Recv command 0x4d454153
1,316,480 UART: [fwproc] Max # of measurements received.
1,317,125 >>> mbox cmd response: failed
1,317,569 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,308 >>> mbox cmd response data (12 bytes)
1,141,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,873 >>> mbox cmd response data (12 bytes)
1,144,874 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,412 >>> mbox cmd response data (12 bytes)
1,148,413 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,831 >>> mbox cmd response data (12 bytes)
1,151,832 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,374 >>> mbox cmd response data (12 bytes)
1,155,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,945 >>> mbox cmd response data (12 bytes)
1,158,946 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,426 >>> mbox cmd response data (12 bytes)
1,162,427 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,803 >>> mbox cmd response data (12 bytes)
1,165,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,946 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
891,571 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,675 UART: [kat] ++
895,827 UART: [kat] sha1
900,167 UART: [kat] SHA2-256
902,107 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,609 UART: [idev] ++
1,173,777 UART: [idev] CDI.KEYID = 6
1,174,138 UART: [idev] SUBJECT.KEYID = 7
1,174,563 UART: [idev] UDS.KEYID = 0
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,274 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,691 UART: [ldev] SUBJECT.KEYID = 5
1,211,118 UART: [ldev] AUTHORITY.KEYID = 7
1,211,581 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,941 UART: [ldev] --
1,282,168 UART: [fwproc] Wait for Commands...
1,282,759 UART: [fwproc] Recv command 0x4d454153
1,286,782 >>> mbox cmd response data (12 bytes)
1,286,783 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,286,858 UART: [fwproc] Recv command 0x4d454153
1,290,881 >>> mbox cmd response data (12 bytes)
1,290,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,290,947 UART: [fwproc] Recv command 0x4d454153
1,294,970 >>> mbox cmd response data (12 bytes)
1,294,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,138 UART: [fwproc] Recv command 0x4d454153
1,299,161 >>> mbox cmd response data (12 bytes)
1,299,162 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,299,453 UART: [fwproc] Recv command 0x4d454153
1,303,476 >>> mbox cmd response data (12 bytes)
1,303,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,303,722 UART: [fwproc] Recv command 0x4d454153
1,307,745 >>> mbox cmd response data (12 bytes)
1,307,746 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,061 UART: [fwproc] Recv command 0x4d454153
1,312,084 >>> mbox cmd response data (12 bytes)
1,312,085 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,382 UART: [fwproc] Recv command 0x4d454153
1,316,405 >>> mbox cmd response data (12 bytes)
1,316,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,671 UART: [fwproc] Recv command 0x4d454153
1,317,411 UART: [fwproc] Max # of measurements received.
1,318,056 >>> mbox cmd response: failed
1,318,514 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,723 >>> mbox cmd response data (12 bytes)
1,141,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,134 >>> mbox cmd response data (12 bytes)
1,145,135 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,739 >>> mbox cmd response data (12 bytes)
1,148,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,152,150 >>> mbox cmd response data (12 bytes)
1,152,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,657 >>> mbox cmd response data (12 bytes)
1,155,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,159,130 >>> mbox cmd response data (12 bytes)
1,159,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,627 >>> mbox cmd response data (12 bytes)
1,162,628 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,184 >>> mbox cmd response data (12 bytes)
1,166,185 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,166,471 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,743 UART: [kat] HMAC-384Kdf
921,373 UART: [kat] LMS
1,169,685 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,170,956 UART: [fht] FHT @ 0x50003400
1,173,680 UART: [idev] ++
1,173,848 UART: [idev] CDI.KEYID = 6
1,174,209 UART: [idev] SUBJECT.KEYID = 7
1,174,634 UART: [idev] UDS.KEYID = 0
1,182,863 UART: [idev] Erasing UDS.KEYID = 0
1,199,967 UART: [idev] Sha1 KeyId Algorithm
1,208,643 UART: [idev] --
1,209,732 UART: [ldev] ++
1,209,900 UART: [ldev] CDI.KEYID = 6
1,210,264 UART: [ldev] SUBJECT.KEYID = 5
1,210,691 UART: [ldev] AUTHORITY.KEYID = 7
1,211,154 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,243,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,984 UART: [ldev] --
1,282,355 UART: [fwproc] Wait for Commands...
1,283,018 UART: [fwproc] Recv command 0x4d454153
1,287,041 >>> mbox cmd response data (12 bytes)
1,287,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,301 UART: [fwproc] Recv command 0x4d454153
1,291,324 >>> mbox cmd response data (12 bytes)
1,291,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,530 UART: [fwproc] Recv command 0x4d454153
1,295,553 >>> mbox cmd response data (12 bytes)
1,295,554 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,843 UART: [fwproc] Recv command 0x4d454153
1,299,866 >>> mbox cmd response data (12 bytes)
1,299,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,074 UART: [fwproc] Recv command 0x4d454153
1,304,097 >>> mbox cmd response data (12 bytes)
1,304,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,185 UART: [fwproc] Recv command 0x4d454153
1,308,208 >>> mbox cmd response data (12 bytes)
1,308,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,410 UART: [fwproc] Recv command 0x4d454153
1,312,433 >>> mbox cmd response data (12 bytes)
1,312,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,533 UART: [fwproc] Recv command 0x4d454153
1,316,556 >>> mbox cmd response data (12 bytes)
1,316,557 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,718 UART: [fwproc] Recv command 0x4d454153
1,317,458 UART: [fwproc] Max # of measurements received.
1,318,103 >>> mbox cmd response: failed
1,318,675 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,316 >>> mbox cmd response data (12 bytes)
1,141,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,763 >>> mbox cmd response data (12 bytes)
1,144,764 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,148,206 >>> mbox cmd response data (12 bytes)
1,148,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,151,751 >>> mbox cmd response data (12 bytes)
1,151,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,155,202 >>> mbox cmd response data (12 bytes)
1,155,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,158,807 >>> mbox cmd response data (12 bytes)
1,158,808 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,162,236 >>> mbox cmd response data (12 bytes)
1,162,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,741 >>> mbox cmd response data (12 bytes)
1,165,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,165,930 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,775 UART: [kat] SHA2-256
891,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,429 UART: [kat] ++
895,581 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,518 UART: [kat] SHA2-512-ACC
906,419 UART: [kat] ECC-384
916,154 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,443 UART: [fht] FHT @ 0x50003400
1,173,215 UART: [idev] ++
1,173,383 UART: [idev] CDI.KEYID = 6
1,173,744 UART: [idev] SUBJECT.KEYID = 7
1,174,169 UART: [idev] UDS.KEYID = 0
1,182,180 UART: [idev] Erasing UDS.KEYID = 0
1,200,150 UART: [idev] Sha1 KeyId Algorithm
1,209,008 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,935 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,436 UART: [fwproc] Wait for Commands...
1,283,249 UART: [fwproc] Recv command 0x4d454153
1,287,272 >>> mbox cmd response data (12 bytes)
1,287,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,430 UART: [fwproc] Recv command 0x4d454153
1,291,453 >>> mbox cmd response data (12 bytes)
1,291,454 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,761 UART: [fwproc] Recv command 0x4d454153
1,295,784 >>> mbox cmd response data (12 bytes)
1,295,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,296,100 UART: [fwproc] Recv command 0x4d454153
1,300,123 >>> mbox cmd response data (12 bytes)
1,300,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,275 UART: [fwproc] Recv command 0x4d454153
1,304,298 >>> mbox cmd response data (12 bytes)
1,304,299 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,510 UART: [fwproc] Recv command 0x4d454153
1,308,533 >>> mbox cmd response data (12 bytes)
1,308,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,765 UART: [fwproc] Recv command 0x4d454153
1,312,788 >>> mbox cmd response data (12 bytes)
1,312,789 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,968 UART: [fwproc] Recv command 0x4d454153
1,316,991 >>> mbox cmd response data (12 bytes)
1,316,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,317,303 UART: [fwproc] Recv command 0x4d454153
1,318,043 UART: [fwproc] Max # of measurements received.
1,318,688 >>> mbox cmd response: failed
1,319,218 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,603 >>> mbox cmd response data (12 bytes)
1,143,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,046 >>> mbox cmd response data (12 bytes)
1,147,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,535 >>> mbox cmd response data (12 bytes)
1,150,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,976 >>> mbox cmd response data (12 bytes)
1,153,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,517 >>> mbox cmd response data (12 bytes)
1,157,518 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,980 >>> mbox cmd response data (12 bytes)
1,160,981 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,481 >>> mbox cmd response data (12 bytes)
1,164,482 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,016 >>> mbox cmd response data (12 bytes)
1,168,017 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,127 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,751 UART: [state] WD Timer not started. Device not locked for debugging
87,954 UART: [kat] SHA2-256
891,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,608 UART: [kat] ++
895,760 UART: [kat] sha1
900,022 UART: [kat] SHA2-256
901,962 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,487 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,198,135 UART: [idev] Sha1 KeyId Algorithm
1,206,937 UART: [idev] --
1,207,858 UART: [ldev] ++
1,208,026 UART: [ldev] CDI.KEYID = 6
1,208,390 UART: [ldev] SUBJECT.KEYID = 5
1,208,817 UART: [ldev] AUTHORITY.KEYID = 7
1,209,280 UART: [ldev] FE.KEYID = 1
1,214,532 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,111 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x4d454153
1,284,927 >>> mbox cmd response data (12 bytes)
1,284,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,285,153 UART: [fwproc] Recv command 0x4d454153
1,289,176 >>> mbox cmd response data (12 bytes)
1,289,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,289,386 UART: [fwproc] Recv command 0x4d454153
1,293,409 >>> mbox cmd response data (12 bytes)
1,293,410 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,293,653 UART: [fwproc] Recv command 0x4d454153
1,297,676 >>> mbox cmd response data (12 bytes)
1,297,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,297,972 UART: [fwproc] Recv command 0x4d454153
1,301,995 >>> mbox cmd response data (12 bytes)
1,301,996 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,302,243 UART: [fwproc] Recv command 0x4d454153
1,306,266 >>> mbox cmd response data (12 bytes)
1,306,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,306,516 UART: [fwproc] Recv command 0x4d454153
1,310,539 >>> mbox cmd response data (12 bytes)
1,310,540 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,310,715 UART: [fwproc] Recv command 0x4d454153
1,314,738 >>> mbox cmd response data (12 bytes)
1,314,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,314,920 UART: [fwproc] Recv command 0x4d454153
1,315,660 UART: [fwproc] Max # of measurements received.
1,316,305 >>> mbox cmd response: failed
1,316,759 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,808 >>> mbox cmd response data (12 bytes)
1,143,809 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,147,421 >>> mbox cmd response data (12 bytes)
1,147,422 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,150,802 >>> mbox cmd response data (12 bytes)
1,150,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,154,249 >>> mbox cmd response data (12 bytes)
1,154,250 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,157,858 >>> mbox cmd response data (12 bytes)
1,157,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,161,359 >>> mbox cmd response data (12 bytes)
1,161,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,164,936 >>> mbox cmd response data (12 bytes)
1,164,937 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,533 >>> mbox cmd response data (12 bytes)
1,168,534 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,168,706 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,475 UART: [kat] SHA2-256
892,025 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,129 UART: [kat] ++
896,281 UART: [kat] sha1
900,503 UART: [kat] SHA2-256
902,443 UART: [kat] SHA2-384
905,228 UART: [kat] SHA2-512-ACC
907,129 UART: [kat] ECC-384
916,696 UART: [kat] HMAC-384Kdf
921,338 UART: [kat] LMS
1,169,650 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,987 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,360 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,125 UART: [ldev] SUBJECT.KEYID = 5
1,210,552 UART: [ldev] AUTHORITY.KEYID = 7
1,211,015 UART: [ldev] FE.KEYID = 1
1,216,043 UART: [ldev] Erasing FE.KEYID = 1
1,242,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,799 UART: [ldev] --
1,282,104 UART: [fwproc] Wait for Commands...
1,282,847 UART: [fwproc] Recv command 0x4d454153
1,286,870 >>> mbox cmd response data (12 bytes)
1,286,871 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,287,148 UART: [fwproc] Recv command 0x4d454153
1,291,171 >>> mbox cmd response data (12 bytes)
1,291,172 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,291,485 UART: [fwproc] Recv command 0x4d454153
1,295,508 >>> mbox cmd response data (12 bytes)
1,295,509 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,295,810 UART: [fwproc] Recv command 0x4d454153
1,299,833 >>> mbox cmd response data (12 bytes)
1,299,834 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,300,081 UART: [fwproc] Recv command 0x4d454153
1,304,104 >>> mbox cmd response data (12 bytes)
1,304,105 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,304,172 UART: [fwproc] Recv command 0x4d454153
1,308,195 >>> mbox cmd response data (12 bytes)
1,308,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,308,331 UART: [fwproc] Recv command 0x4d454153
1,312,354 >>> mbox cmd response data (12 bytes)
1,312,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,312,420 UART: [fwproc] Recv command 0x4d454153
1,316,443 >>> mbox cmd response data (12 bytes)
1,316,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,316,679 UART: [fwproc] Recv command 0x4d454153
1,317,419 UART: [fwproc] Max # of measurements received.
1,318,064 >>> mbox cmd response: failed
1,318,310 UART: ROM Fatal Error: 0x01020008
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,771 >>> mbox cmd response data (12 bytes)
1,142,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,146,376 >>> mbox cmd response data (12 bytes)
1,146,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,149,765 >>> mbox cmd response data (12 bytes)
1,149,766 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,153,240 >>> mbox cmd response data (12 bytes)
1,153,241 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,156,667 >>> mbox cmd response data (12 bytes)
1,156,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,160,260 >>> mbox cmd response data (12 bytes)
1,160,261 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,163,857 >>> mbox cmd response data (12 bytes)
1,163,858 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,342 >>> mbox cmd response data (12 bytes)
1,167,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,167,545 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_upload_measurement_limit_plus_one ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,234,678 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,379,859 UART:
2,380,266 UART: Running Caliptra ROM ...
2,381,447 UART:
2,381,627 UART: [state] CFI Enabled
2,382,627 UART: [state] LifecycleState = Unprovisioned
2,384,301 UART: [state] DebugLocked = No
2,385,425 UART: [state] WD Timer not started. Device not locked for debugging
2,387,909 UART: [kat] SHA2-256
2,388,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,391,607 UART: [kat] ++
2,392,067 UART: [kat] sha1
2,392,597 UART: [kat] SHA2-256
2,393,307 UART: [kat] SHA2-384
2,393,977 UART: [kat] SHA2-512-ACC
2,394,785 UART: [kat] ECC-384
2,947,796 UART: [kat] HMAC-384Kdf
2,971,355 UART: [kat] LMS
3,447,831 UART: [kat] --
3,450,874 UART: [cold-reset] ++
3,453,361 UART: [fht] FHT @ 0x50003400
3,464,025 UART: [idev] ++
3,464,611 UART: [idev] CDI.KEYID = 6
3,465,636 UART: [idev] SUBJECT.KEYID = 7
3,466,804 UART: [idev] UDS.KEYID = 0
3,500,613 UART: [idev] Erasing UDS.KEYID = 0
5,984,710 UART: [idev] Sha1 KeyId Algorithm
6,008,853 UART: [idev] --
6,014,742 UART: [ldev] ++
6,015,351 UART: [ldev] CDI.KEYID = 6
6,016,432 UART: [ldev] SUBJECT.KEYID = 5
6,017,549 UART: [ldev] AUTHORITY.KEYID = 7
6,018,736 UART: [ldev] FE.KEYID = 1
6,055,698 UART: [ldev] Erasing FE.KEYID = 1
8,563,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,544 UART: [ldev] --
10,373,394 UART: [fwproc] Wait for Commands...
10,376,478 UART: [fwproc] Recv command 0x46574c44
10,378,473 UART: [fwproc] Recv'd Img size: 114888 bytes
13,817,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,467 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,959,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,287,500 >>> mbox cmd response: success
14,291,504 UART: [afmc] ++
14,292,096 UART: [afmc] CDI.KEYID = 6
14,293,014 UART: [afmc] SUBJECT.KEYID = 7
14,294,238 UART: [afmc] AUTHORITY.KEYID = 5
16,832,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,573,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,438 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,591,231 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,607,274 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,622,788 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,648,103 UART: [afmc] --
18,651,437 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,651,810 UART: [cold-reset] --
18,655,612 UART: [state] Locking Datavault
18,661,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,663,109 UART: [state] Locking ICCM
18,665,536 UART: [exit] Launching FMC @ 0x40000000
18,673,879 UART:
18,674,117 UART: Running Caliptra FMC ...
18,675,223 UART:
18,675,395 UART: [fmc] Received command: 0x10000009
18,676,925 >>> mbox cmd response data (48 bytes)
18,677,591 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,677,921 UART: [fmc] Received command: 0x1000000A
18,679,464 >>> mbox cmd response data (0 bytes)
18,679,738 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,680,049 UART: [fmc] Received command: 0x10000003
18,690,012 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,218,638 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,157,201 >>> mbox cmd response: success
18,434,480 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,449,980 UART:
18,450,321 UART: Running Caliptra FMC ...
18,451,509 UART:
18,451,684 UART: [fmc] Received command: 0x10000009
18,453,339 >>> mbox cmd response data (48 bytes)
18,453,934 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,454,295 UART: [fmc] Received command: 0x1000000A
18,455,876 >>> mbox cmd response data (0 bytes)
18,456,149 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,456,458 UART: [fmc] Received command: 0x10000003
18,466,426 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,236,171 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,381,435 UART:
2,381,853 UART: Running Caliptra ROM ...
2,382,924 UART:
2,383,075 UART: [state] CFI Enabled
2,384,046 UART: [state] LifecycleState = Unprovisioned
2,385,713 UART: [state] DebugLocked = No
2,386,761 UART: [state] WD Timer not started. Device not locked for debugging
2,389,231 UART: [kat] SHA2-256
2,389,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,392,903 UART: [kat] ++
2,393,349 UART: [kat] sha1
2,393,856 UART: [kat] SHA2-256
2,394,510 UART: [kat] SHA2-384
2,395,214 UART: [kat] SHA2-512-ACC
2,396,044 UART: [kat] ECC-384
3,276,564 UART: [kat] HMAC-384Kdf
3,289,533 UART: [kat] LMS
3,766,014 UART: [kat] --
3,771,403 UART: [cold-reset] ++
3,772,467 UART: [fht] FHT @ 0x50003400
3,784,140 UART: [idev] ++
3,784,747 UART: [idev] CDI.KEYID = 6
3,785,683 UART: [idev] SUBJECT.KEYID = 7
3,786,897 UART: [idev] UDS.KEYID = 0
3,803,680 UART: [idev] Erasing UDS.KEYID = 0
6,267,279 UART: [idev] Sha1 KeyId Algorithm
6,291,908 UART: [idev] --
6,297,629 UART: [ldev] ++
6,298,199 UART: [ldev] CDI.KEYID = 6
6,299,169 UART: [ldev] SUBJECT.KEYID = 5
6,300,327 UART: [ldev] AUTHORITY.KEYID = 7
6,301,611 UART: [ldev] FE.KEYID = 1
6,313,112 UART: [ldev] Erasing FE.KEYID = 1
8,789,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,854 UART: [ldev] --
10,586,140 UART: [fwproc] Wait for Commands...
10,588,516 UART: [fwproc] Recv command 0x46574c44
10,590,501 UART: [fwproc] Recv'd Img size: 114888 bytes
14,020,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,095,722 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,155,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,484,230 >>> mbox cmd response: success
14,488,673 UART: [afmc] ++
14,489,258 UART: [afmc] CDI.KEYID = 6
14,490,165 UART: [afmc] SUBJECT.KEYID = 7
14,491,381 UART: [afmc] AUTHORITY.KEYID = 5
16,995,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,718,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,720,899 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,736,692 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,752,751 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,768,274 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,793,422 UART: [afmc] --
18,796,377 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,796,744 UART: [cold-reset] --
18,800,473 UART: [state] Locking Datavault
18,807,073 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,831 UART: [state] Locking ICCM
18,811,032 UART: [exit] Launching FMC @ 0x40000000
18,819,391 UART:
18,819,667 UART: Running Caliptra FMC ...
18,820,780 UART:
18,820,941 UART: [fmc] Received command: 0x10000009
18,822,455 >>> mbox cmd response data (48 bytes)
18,823,047 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,823,553 UART: [fmc] Received command: 0x1000000A
18,825,097 >>> mbox cmd response data (0 bytes)
18,825,358 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,825,664 UART: [fmc] Received command: 0x10000003
18,835,616 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
2,226,470 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,401,516 >>> mbox cmd response: success
18,636,376 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,653,306 UART:
18,653,642 UART: Running Caliptra FMC ...
18,654,822 UART:
18,655,007 UART: [fmc] Received command: 0x10000009
18,656,637 >>> mbox cmd response data (48 bytes)
18,657,218 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,657,526 UART: [fmc] Received command: 0x1000000A
18,659,103 >>> mbox cmd response data (0 bytes)
18,659,371 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,659,718 UART: [fmc] Received command: 0x10000003
18,669,675 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
890,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,962 UART: [kat] ++
895,114 UART: [kat] sha1
899,378 UART: [kat] SHA2-256
901,318 UART: [kat] SHA2-384
904,013 UART: [kat] SHA2-512-ACC
905,914 UART: [kat] ECC-384
915,669 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
1,181,745 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,455 UART: [idev] --
1,208,412 UART: [ldev] ++
1,208,580 UART: [ldev] CDI.KEYID = 6
1,208,944 UART: [ldev] SUBJECT.KEYID = 5
1,209,371 UART: [ldev] AUTHORITY.KEYID = 7
1,209,834 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,345 UART: [fwproc] Wait for Commands...
1,281,054 UART: [fwproc] Recv command 0x46574c44
1,281,787 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,078 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,763 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,998 >>> mbox cmd response: success
2,780,246 UART: [afmc] ++
2,780,414 UART: [afmc] CDI.KEYID = 6
2,780,777 UART: [afmc] SUBJECT.KEYID = 7
2,781,203 UART: [afmc] AUTHORITY.KEYID = 5
2,816,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,790 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,486 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,385 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,078 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,978 UART: [afmc] --
2,859,827 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,859,849 UART: [cold-reset] --
2,860,667 UART: [state] Locking Datavault
2,861,900 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,504 UART: [state] Locking ICCM
2,863,068 UART: [exit] Launching FMC @ 0x40000000
2,868,365 UART:
2,868,381 UART: Running Caliptra FMC ...
2,868,789 UART:
2,869,019 UART: [fmc] Received command: 0x10000009
2,870,217 >>> mbox cmd response data (48 bytes)
2,870,218 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,870,247 UART: [fmc] Received command: 0x1000000A
2,870,987 >>> mbox cmd response data (0 bytes)
2,870,988 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,871,017 UART: [fmc] Received command: 0x10000003
2,880,473 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,197 >>> mbox cmd response: success
2,689,096 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,695,365 UART:
2,695,381 UART: Running Caliptra FMC ...
2,695,789 UART:
2,696,019 UART: [fmc] Received command: 0x10000009
2,697,217 >>> mbox cmd response data (48 bytes)
2,697,218 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,247 UART: [fmc] Received command: 0x1000000A
2,697,987 >>> mbox cmd response data (0 bytes)
2,697,988 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,698,017 UART: [fmc] Received command: 0x10000003
2,707,473 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,221 UART: [state] LifecycleState = Unprovisioned
85,876 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,573 UART: [kat] SHA2-256
901,513 UART: [kat] SHA2-384
904,332 UART: [kat] SHA2-512-ACC
906,233 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,432 UART: [kat] LMS
1,168,744 UART: [kat] --
1,169,609 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,597 UART: [idev] ++
1,172,765 UART: [idev] CDI.KEYID = 6
1,173,126 UART: [idev] SUBJECT.KEYID = 7
1,173,551 UART: [idev] UDS.KEYID = 0
1,181,670 UART: [idev] Erasing UDS.KEYID = 0
1,199,094 UART: [idev] Sha1 KeyId Algorithm
1,208,020 UART: [idev] --
1,209,069 UART: [ldev] ++
1,209,237 UART: [ldev] CDI.KEYID = 6
1,209,601 UART: [ldev] SUBJECT.KEYID = 5
1,210,028 UART: [ldev] AUTHORITY.KEYID = 7
1,210,491 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,957 UART: [fwproc] Recv command 0x46574c44
1,282,690 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,222 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,761 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,669 >>> mbox cmd response: success
2,779,723 UART: [afmc] ++
2,779,891 UART: [afmc] CDI.KEYID = 6
2,780,254 UART: [afmc] SUBJECT.KEYID = 7
2,780,680 UART: [afmc] AUTHORITY.KEYID = 5
2,816,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,857 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,553 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,452 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,145 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,741 UART: [afmc] --
2,859,716 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,859,738 UART: [cold-reset] --
2,860,386 UART: [state] Locking Datavault
2,861,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,217 UART: [state] Locking ICCM
2,862,757 UART: [exit] Launching FMC @ 0x40000000
2,868,054 UART:
2,868,070 UART: Running Caliptra FMC ...
2,868,478 UART:
2,868,708 UART: [fmc] Received command: 0x10000009
2,869,906 >>> mbox cmd response data (48 bytes)
2,869,907 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,869,936 UART: [fmc] Received command: 0x1000000A
2,870,676 >>> mbox cmd response data (0 bytes)
2,870,677 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,706 UART: [fmc] Received command: 0x10000003
2,880,162 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,722 >>> mbox cmd response: success
2,688,679 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,695,118 UART:
2,695,134 UART: Running Caliptra FMC ...
2,695,542 UART:
2,695,772 UART: [fmc] Received command: 0x10000009
2,696,970 >>> mbox cmd response data (48 bytes)
2,696,971 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,000 UART: [fmc] Received command: 0x1000000A
2,697,740 >>> mbox cmd response data (0 bytes)
2,697,741 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,697,770 UART: [fmc] Received command: 0x10000003
2,707,226 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,646 UART: [kat] SHA2-256
891,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,300 UART: [kat] ++
895,452 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,069 UART: [kat] LMS
1,168,381 UART: [kat] --
1,169,390 UART: [cold-reset] ++
1,169,792 UART: [fht] FHT @ 0x50003400
1,172,454 UART: [idev] ++
1,172,622 UART: [idev] CDI.KEYID = 6
1,172,983 UART: [idev] SUBJECT.KEYID = 7
1,173,408 UART: [idev] UDS.KEYID = 0
1,181,105 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,555 UART: [fwproc] Wait for Commands...
1,281,316 UART: [fwproc] Recv command 0x46574c44
1,282,049 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,518 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,516 >>> mbox cmd response: success
2,779,652 UART: [afmc] ++
2,779,820 UART: [afmc] CDI.KEYID = 6
2,780,183 UART: [afmc] SUBJECT.KEYID = 7
2,780,609 UART: [afmc] AUTHORITY.KEYID = 5
2,816,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,202 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,898 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,797 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,490 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,166 UART: [afmc] --
2,858,979 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,859,001 UART: [cold-reset] --
2,859,997 UART: [state] Locking Datavault
2,861,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,008 UART: [state] Locking ICCM
2,862,514 UART: [exit] Launching FMC @ 0x40000000
2,867,811 UART:
2,867,827 UART: Running Caliptra FMC ...
2,868,235 UART:
2,868,465 UART: [fmc] Received command: 0x10000009
2,869,663 >>> mbox cmd response data (48 bytes)
2,869,664 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,869,693 UART: [fmc] Received command: 0x1000000A
2,870,433 >>> mbox cmd response data (0 bytes)
2,870,434 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,870,463 UART: [fmc] Received command: 0x10000003
2,879,919 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,081 >>> mbox cmd response: success
2,686,428 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,692,551 UART:
2,692,567 UART: Running Caliptra FMC ...
2,692,975 UART:
2,693,205 UART: [fmc] Received command: 0x10000009
2,694,403 >>> mbox cmd response data (48 bytes)
2,694,404 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,694,433 UART: [fmc] Received command: 0x1000000A
2,695,173 >>> mbox cmd response data (0 bytes)
2,695,174 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,695,203 UART: [fmc] Received command: 0x10000003
2,704,659 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,676 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,950 UART: [kat] HMAC-384Kdf
921,462 UART: [kat] LMS
1,169,774 UART: [kat] --
1,170,687 UART: [cold-reset] ++
1,171,211 UART: [fht] FHT @ 0x50003400
1,173,861 UART: [idev] ++
1,174,029 UART: [idev] CDI.KEYID = 6
1,174,390 UART: [idev] SUBJECT.KEYID = 7
1,174,815 UART: [idev] UDS.KEYID = 0
1,183,326 UART: [idev] Erasing UDS.KEYID = 0
1,200,288 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,059 UART: [ldev] ++
1,210,227 UART: [ldev] CDI.KEYID = 6
1,210,591 UART: [ldev] SUBJECT.KEYID = 5
1,211,018 UART: [ldev] AUTHORITY.KEYID = 7
1,211,481 UART: [ldev] FE.KEYID = 1
1,216,611 UART: [ldev] Erasing FE.KEYID = 1
1,243,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,927 UART: [ldev] --
1,283,382 UART: [fwproc] Wait for Commands...
1,283,999 UART: [fwproc] Recv command 0x46574c44
1,284,732 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,257 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,942 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,315 >>> mbox cmd response: success
2,782,497 UART: [afmc] ++
2,782,665 UART: [afmc] CDI.KEYID = 6
2,783,028 UART: [afmc] SUBJECT.KEYID = 7
2,783,454 UART: [afmc] AUTHORITY.KEYID = 5
2,819,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,507 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,842,203 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,848,102 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,795 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,861,619 UART: [afmc] --
2,862,426 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,862,448 UART: [cold-reset] --
2,863,134 UART: [state] Locking Datavault
2,864,155 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,759 UART: [state] Locking ICCM
2,865,225 UART: [exit] Launching FMC @ 0x40000000
2,870,522 UART:
2,870,538 UART: Running Caliptra FMC ...
2,870,946 UART:
2,871,176 UART: [fmc] Received command: 0x10000009
2,872,374 >>> mbox cmd response data (48 bytes)
2,872,375 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,872,404 UART: [fmc] Received command: 0x1000000A
2,873,144 >>> mbox cmd response data (0 bytes)
2,873,145 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,873,174 UART: [fmc] Received command: 0x10000003
2,882,630 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,170 >>> mbox cmd response: success
2,689,615 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,695,894 UART:
2,695,910 UART: Running Caliptra FMC ...
2,696,318 UART:
2,696,548 UART: [fmc] Received command: 0x10000009
2,697,746 >>> mbox cmd response data (48 bytes)
2,697,747 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,776 UART: [fmc] Received command: 0x1000000A
2,698,516 >>> mbox cmd response data (0 bytes)
2,698,517 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,698,546 UART: [fmc] Received command: 0x10000003
2,708,002 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
87,922 UART: [kat] SHA2-256
891,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,576 UART: [kat] ++
895,728 UART: [kat] sha1
900,032 UART: [kat] SHA2-256
901,972 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,541 UART: [kat] HMAC-384Kdf
921,279 UART: [kat] LMS
1,169,591 UART: [kat] --
1,170,474 UART: [cold-reset] ++
1,170,852 UART: [fht] FHT @ 0x50003400
1,173,474 UART: [idev] ++
1,173,642 UART: [idev] CDI.KEYID = 6
1,174,003 UART: [idev] SUBJECT.KEYID = 7
1,174,428 UART: [idev] UDS.KEYID = 0
1,182,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,615 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,216,124 UART: [ldev] Erasing FE.KEYID = 1
1,243,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,752 UART: [ldev] --
1,282,035 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,328 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,282 >>> mbox cmd response: success
2,781,426 UART: [afmc] ++
2,781,594 UART: [afmc] CDI.KEYID = 6
2,781,957 UART: [afmc] SUBJECT.KEYID = 7
2,782,383 UART: [afmc] AUTHORITY.KEYID = 5
2,817,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,936 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,632 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,531 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,224 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,098 UART: [afmc] --
2,861,017 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,861,039 UART: [cold-reset] --
2,862,083 UART: [state] Locking Datavault
2,863,196 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,800 UART: [state] Locking ICCM
2,864,334 UART: [exit] Launching FMC @ 0x40000000
2,869,631 UART:
2,869,647 UART: Running Caliptra FMC ...
2,870,055 UART:
2,870,285 UART: [fmc] Received command: 0x10000009
2,871,483 >>> mbox cmd response data (48 bytes)
2,871,484 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,871,513 UART: [fmc] Received command: 0x1000000A
2,872,253 >>> mbox cmd response data (0 bytes)
2,872,254 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,283 UART: [fmc] Received command: 0x10000003
2,881,739 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,707 >>> mbox cmd response: success
2,686,680 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,692,875 UART:
2,692,891 UART: Running Caliptra FMC ...
2,693,299 UART:
2,693,529 UART: [fmc] Received command: 0x10000009
2,694,727 >>> mbox cmd response data (48 bytes)
2,694,728 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,694,757 UART: [fmc] Received command: 0x1000000A
2,695,497 >>> mbox cmd response data (0 bytes)
2,695,498 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,695,527 UART: [fmc] Received command: 0x10000003
2,704,983 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,981 UART: [kat] SHA2-256
901,921 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,022 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,173,255 UART: [idev] ++
1,173,423 UART: [idev] CDI.KEYID = 6
1,173,784 UART: [idev] SUBJECT.KEYID = 7
1,174,209 UART: [idev] UDS.KEYID = 0
1,182,386 UART: [idev] Erasing UDS.KEYID = 0
1,199,990 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,210,005 UART: [ldev] ++
1,210,173 UART: [ldev] CDI.KEYID = 6
1,210,537 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,495 UART: [ldev] Erasing FE.KEYID = 1
1,242,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,142 UART: [fwproc] Wait for Commands...
1,282,841 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,358 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,361 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,447 >>> mbox cmd response: success
2,781,477 UART: [afmc] ++
2,781,645 UART: [afmc] CDI.KEYID = 6
2,782,008 UART: [afmc] SUBJECT.KEYID = 7
2,782,434 UART: [afmc] AUTHORITY.KEYID = 5
2,818,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,395 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,091 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,990 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,683 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,575 UART: [afmc] --
2,861,470 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,861,492 UART: [cold-reset] --
2,862,462 UART: [state] Locking Datavault
2,863,601 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,205 UART: [state] Locking ICCM
2,864,869 UART: [exit] Launching FMC @ 0x40000000
2,870,166 UART:
2,870,182 UART: Running Caliptra FMC ...
2,870,590 UART:
2,870,820 UART: [fmc] Received command: 0x10000009
2,872,018 >>> mbox cmd response data (48 bytes)
2,872,019 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,872,048 UART: [fmc] Received command: 0x1000000A
2,872,788 >>> mbox cmd response data (0 bytes)
2,872,789 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,818 UART: [fmc] Received command: 0x10000003
2,882,274 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,148 >>> mbox cmd response: success
2,687,525 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,693,542 UART:
2,693,558 UART: Running Caliptra FMC ...
2,693,966 UART:
2,694,196 UART: [fmc] Received command: 0x10000009
2,695,394 >>> mbox cmd response data (48 bytes)
2,695,395 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,695,424 UART: [fmc] Received command: 0x1000000A
2,696,164 >>> mbox cmd response data (0 bytes)
2,696,165 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,696,194 UART: [fmc] Received command: 0x10000003
2,705,650 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_no_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,238,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,239,798 UART:
2,240,056 UART: Running Caliptra ROM ...
2,241,133 UART:
2,241,293 UART: [state] CFI Enabled
2,242,170 UART: [state] LifecycleState = Unprovisioned
2,243,849 UART: [state] DebugLocked = No
2,244,994 UART: [state] WD Timer not started. Device not locked for debugging
2,247,482 UART: [kat] SHA2-256
2,248,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,251,172 UART: [kat] ++
2,251,677 UART: [kat] sha1
2,252,202 UART: [kat] SHA2-256
2,253,110 UART: [kat] SHA2-384
2,253,786 UART: [kat] SHA2-512-ACC
2,254,629 UART: [kat] ECC-384
2,945,698 UART: [kat] HMAC-384Kdf
2,969,667 UART: [kat] LMS
3,446,172 UART: [kat] --
3,451,353 UART: [cold-reset] ++
3,452,258 UART: [fht] FHT @ 0x50003400
3,463,340 UART: [idev] ++
3,463,926 UART: [idev] CDI.KEYID = 6
3,464,971 UART: [idev] SUBJECT.KEYID = 7
3,466,145 UART: [idev] UDS.KEYID = 0
3,500,494 UART: [idev] Erasing UDS.KEYID = 0
5,985,373 UART: [idev] Sha1 KeyId Algorithm
6,009,629 UART: [idev] --
6,014,819 UART: [ldev] ++
6,015,436 UART: [ldev] CDI.KEYID = 6
6,016,355 UART: [ldev] SUBJECT.KEYID = 5
6,017,522 UART: [ldev] AUTHORITY.KEYID = 7
6,018,763 UART: [ldev] FE.KEYID = 1
6,056,965 UART: [ldev] Erasing FE.KEYID = 1
8,564,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,301 UART: [ldev] --
10,372,090 UART: [fwproc] Wait for Commands...
10,375,114 UART: [fwproc] Recv command 0x4d454153
10,384,358 >>> mbox cmd response data (12 bytes)
10,386,291 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,530,954 UART: [fwproc] Recv command 0x46574c44
10,533,073 UART: [fwproc] Recv'd Img size: 114888 bytes
13,982,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,060,436 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,120,617 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,449,541 >>> mbox cmd response: success
14,453,337 UART: [afmc] ++
14,453,939 UART: [afmc] CDI.KEYID = 6
14,454,859 UART: [afmc] SUBJECT.KEYID = 7
14,456,078 UART: [afmc] AUTHORITY.KEYID = 5
17,003,641 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,746,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,748,585 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,764,373 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,780,473 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,795,929 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,820,458 UART: [afmc] --
18,824,207 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,824,581 UART: [cold-reset] --
18,828,050 UART: [state] Locking Datavault
18,833,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,834,847 UART: [state] Locking ICCM
18,837,601 UART: [exit] Launching FMC @ 0x40000000
18,845,942 UART:
18,846,181 UART: Running Caliptra FMC ...
18,847,288 UART:
18,847,457 UART: [fmc] Received command: 0x1000000A
18,849,167 >>> mbox cmd response data (116 bytes)
18,850,671 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,851,113 UART: [fmc] Received command: 0x10000009
18,852,929 >>> mbox cmd response data (48 bytes)
18,854,460 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,854,918 UART: [fmc] Received command: 0x10000003
18,864,841 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
2,230,661 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,442 >>> mbox cmd response data (12 bytes)
10,250,950 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,289,488 >>> mbox cmd response: success
18,563,675 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,577,303 UART:
18,577,627 UART: Running Caliptra FMC ...
18,578,780 UART:
18,578,957 UART: [fmc] Received command: 0x1000000A
18,580,555 >>> mbox cmd response data (116 bytes)
18,582,063 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,582,511 UART: [fmc] Received command: 0x10000009
18,584,324 >>> mbox cmd response data (48 bytes)
18,585,851 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,586,319 UART: [fmc] Received command: 0x10000003
18,596,257 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,232,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,233,618 UART:
2,233,874 UART: Running Caliptra ROM ...
2,234,949 UART:
2,235,099 UART: [state] CFI Enabled
2,235,971 UART: [state] LifecycleState = Unprovisioned
2,237,659 UART: [state] DebugLocked = No
2,238,779 UART: [state] WD Timer not started. Device not locked for debugging
2,241,269 UART: [kat] SHA2-256
2,241,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,244,950 UART: [kat] ++
2,245,402 UART: [kat] sha1
2,245,911 UART: [kat] SHA2-256
2,246,646 UART: [kat] SHA2-384
2,247,310 UART: [kat] SHA2-512-ACC
2,248,189 UART: [kat] ECC-384
3,278,718 UART: [kat] HMAC-384Kdf
3,289,779 UART: [kat] LMS
3,766,235 UART: [kat] --
3,771,842 UART: [cold-reset] ++
3,773,192 UART: [fht] FHT @ 0x50003400
3,785,299 UART: [idev] ++
3,785,921 UART: [idev] CDI.KEYID = 6
3,786,832 UART: [idev] SUBJECT.KEYID = 7
3,788,099 UART: [idev] UDS.KEYID = 0
3,806,237 UART: [idev] Erasing UDS.KEYID = 0
6,265,949 UART: [idev] Sha1 KeyId Algorithm
6,290,352 UART: [idev] --
6,295,565 UART: [ldev] ++
6,296,138 UART: [ldev] CDI.KEYID = 6
6,297,100 UART: [ldev] SUBJECT.KEYID = 5
6,298,262 UART: [ldev] AUTHORITY.KEYID = 7
6,299,569 UART: [ldev] FE.KEYID = 1
6,310,000 UART: [ldev] Erasing FE.KEYID = 1
8,787,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,824 UART: [ldev] --
10,581,437 UART: [fwproc] Wait for Commands...
10,583,751 UART: [fwproc] Recv command 0x4d454153
10,593,147 >>> mbox cmd response data (12 bytes)
10,595,084 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
10,739,486 UART: [fwproc] Recv command 0x46574c44
10,741,601 UART: [fwproc] Recv'd Img size: 114888 bytes
14,180,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,261,900 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,322,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,651,232 >>> mbox cmd response: success
14,655,750 UART: [afmc] ++
14,656,388 UART: [afmc] CDI.KEYID = 6
14,657,276 UART: [afmc] SUBJECT.KEYID = 7
14,658,490 UART: [afmc] AUTHORITY.KEYID = 5
17,163,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,888,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,891,034 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,906,823 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,922,949 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,938,449 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,961,919 UART: [afmc] --
18,964,932 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,965,287 UART: [cold-reset] --
18,969,826 UART: [state] Locking Datavault
18,974,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,976,687 UART: [state] Locking ICCM
18,978,160 UART: [exit] Launching FMC @ 0x40000000
18,986,557 UART:
18,986,792 UART: Running Caliptra FMC ...
18,987,891 UART:
18,988,051 UART: [fmc] Received command: 0x1000000A
18,989,731 >>> mbox cmd response data (116 bytes)
18,991,217 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,991,651 UART: [fmc] Received command: 0x10000009
18,993,460 >>> mbox cmd response data (48 bytes)
18,994,999 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,995,454 UART: [fmc] Received command: 0x10000003
19,005,427 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
2,240,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,488,215 >>> mbox cmd response data (12 bytes)
10,490,335 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,525,467 >>> mbox cmd response: success
18,762,208 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
18,774,925 UART:
18,775,275 UART: Running Caliptra FMC ...
18,776,440 UART:
18,776,605 UART: [fmc] Received command: 0x1000000A
18,778,189 >>> mbox cmd response data (116 bytes)
18,779,513 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
18,779,941 UART: [fmc] Received command: 0x10000009
18,781,736 >>> mbox cmd response data (48 bytes)
18,783,103 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
18,783,555 UART: [fmc] Received command: 0x10000003
18,793,509 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,668 UART: [kat] SHA2-256
901,608 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
915,833 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,169,998 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,197,793 UART: [idev] Sha1 KeyId Algorithm
1,206,761 UART: [idev] --
1,207,872 UART: [ldev] ++
1,208,040 UART: [ldev] CDI.KEYID = 6
1,208,404 UART: [ldev] SUBJECT.KEYID = 5
1,208,831 UART: [ldev] AUTHORITY.KEYID = 7
1,209,294 UART: [ldev] FE.KEYID = 1
1,214,476 UART: [ldev] Erasing FE.KEYID = 1
1,240,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,742 UART: [ldev] --
1,279,183 UART: [fwproc] Wait for Commands...
1,279,928 UART: [fwproc] Recv command 0x4d454153
1,283,951 >>> mbox cmd response data (12 bytes)
1,283,952 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,284,127 UART: [fwproc] Recv command 0x46574c44
1,284,860 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,967 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,883 >>> mbox cmd response: success
2,781,049 UART: [afmc] ++
2,781,217 UART: [afmc] CDI.KEYID = 6
2,781,580 UART: [afmc] SUBJECT.KEYID = 7
2,782,006 UART: [afmc] AUTHORITY.KEYID = 5
2,817,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,481 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,177 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,076 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,769 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,551 UART: [afmc] --
2,860,500 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,860,522 UART: [cold-reset] --
2,861,482 UART: [state] Locking Datavault
2,862,707 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,311 UART: [state] Locking ICCM
2,863,767 UART: [exit] Launching FMC @ 0x40000000
2,869,064 UART:
2,869,080 UART: Running Caliptra FMC ...
2,869,488 UART:
2,869,718 UART: [fmc] Received command: 0x1000000A
2,871,147 >>> mbox cmd response data (116 bytes)
2,871,148 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,871,177 UART: [fmc] Received command: 0x10000009
2,872,375 >>> mbox cmd response data (48 bytes)
2,872,376 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,872,405 UART: [fmc] Received command: 0x10000003
2,881,861 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,320 >>> mbox cmd response data (12 bytes)
1,143,321 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,636,382 >>> mbox cmd response: success
2,691,687 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,697,710 UART:
2,697,726 UART: Running Caliptra FMC ...
2,698,134 UART:
2,698,364 UART: [fmc] Received command: 0x1000000A
2,699,793 >>> mbox cmd response data (116 bytes)
2,699,794 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,699,823 UART: [fmc] Received command: 0x10000009
2,701,021 >>> mbox cmd response data (48 bytes)
2,701,022 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,701,051 UART: [fmc] Received command: 0x10000003
2,710,507 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,338 UART: [state] WD Timer not started. Device not locked for debugging
87,581 UART: [kat] SHA2-256
891,131 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,235 UART: [kat] ++
895,387 UART: [kat] sha1
899,735 UART: [kat] SHA2-256
901,675 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,868 UART: [kat] HMAC-384Kdf
920,270 UART: [kat] LMS
1,168,582 UART: [kat] --
1,169,613 UART: [cold-reset] ++
1,169,939 UART: [fht] FHT @ 0x50003400
1,172,689 UART: [idev] ++
1,172,857 UART: [idev] CDI.KEYID = 6
1,173,218 UART: [idev] SUBJECT.KEYID = 7
1,173,643 UART: [idev] UDS.KEYID = 0
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,199,116 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,208,867 UART: [ldev] ++
1,209,035 UART: [ldev] CDI.KEYID = 6
1,209,399 UART: [ldev] SUBJECT.KEYID = 5
1,209,826 UART: [ldev] AUTHORITY.KEYID = 7
1,210,289 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,614 UART: [fwproc] Wait for Commands...
1,282,419 UART: [fwproc] Recv command 0x4d454153
1,286,442 >>> mbox cmd response data (12 bytes)
1,286,443 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,286,730 UART: [fwproc] Recv command 0x46574c44
1,287,463 UART: [fwproc] Recv'd Img size: 114888 bytes
2,591,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,618,014 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,643,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,978 >>> mbox cmd response: success
2,785,138 UART: [afmc] ++
2,785,306 UART: [afmc] CDI.KEYID = 6
2,785,669 UART: [afmc] SUBJECT.KEYID = 7
2,786,095 UART: [afmc] AUTHORITY.KEYID = 5
2,822,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,879 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,839,628 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,845,324 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,851,223 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,856,916 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,864,592 UART: [afmc] --
2,865,577 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,865,599 UART: [cold-reset] --
2,866,639 UART: [state] Locking Datavault
2,867,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,868,468 UART: [state] Locking ICCM
2,868,900 UART: [exit] Launching FMC @ 0x40000000
2,874,197 UART:
2,874,213 UART: Running Caliptra FMC ...
2,874,621 UART:
2,874,851 UART: [fmc] Received command: 0x1000000A
2,876,280 >>> mbox cmd response data (116 bytes)
2,876,281 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,876,310 UART: [fmc] Received command: 0x10000009
2,877,508 >>> mbox cmd response data (48 bytes)
2,877,509 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,877,538 UART: [fmc] Received command: 0x10000003
2,886,994 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,144,275 >>> mbox cmd response data (12 bytes)
1,144,276 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,637,511 >>> mbox cmd response: success
2,692,522 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,698,763 UART:
2,698,779 UART: Running Caliptra FMC ...
2,699,187 UART:
2,699,417 UART: [fmc] Received command: 0x1000000A
2,700,846 >>> mbox cmd response data (116 bytes)
2,700,847 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,700,876 UART: [fmc] Received command: 0x10000009
2,702,074 >>> mbox cmd response data (48 bytes)
2,702,075 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,702,104 UART: [fmc] Received command: 0x10000003
2,711,560 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,217 UART: [state] WD Timer not started. Device not locked for debugging
87,526 UART: [kat] SHA2-256
891,076 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,180 UART: [kat] ++
895,332 UART: [kat] sha1
899,632 UART: [kat] SHA2-256
901,572 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
915,505 UART: [kat] HMAC-384Kdf
920,255 UART: [kat] LMS
1,168,567 UART: [kat] --
1,169,420 UART: [cold-reset] ++
1,169,990 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,197,917 UART: [idev] Sha1 KeyId Algorithm
1,206,843 UART: [idev] --
1,207,770 UART: [ldev] ++
1,207,938 UART: [ldev] CDI.KEYID = 6
1,208,302 UART: [ldev] SUBJECT.KEYID = 5
1,208,729 UART: [ldev] AUTHORITY.KEYID = 7
1,209,192 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,383 UART: [fwproc] Wait for Commands...
1,281,046 UART: [fwproc] Recv command 0x4d454153
1,285,069 >>> mbox cmd response data (12 bytes)
1,285,070 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,295 UART: [fwproc] Recv command 0x46574c44
1,286,028 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,655 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,727 >>> mbox cmd response: success
2,782,915 UART: [afmc] ++
2,783,083 UART: [afmc] CDI.KEYID = 6
2,783,446 UART: [afmc] SUBJECT.KEYID = 7
2,783,872 UART: [afmc] AUTHORITY.KEYID = 5
2,818,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,279 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,975 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,874 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,567 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,861,481 UART: [afmc] --
2,862,346 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,862,368 UART: [cold-reset] --
2,863,308 UART: [state] Locking Datavault
2,864,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,053 UART: [state] Locking ICCM
2,865,489 UART: [exit] Launching FMC @ 0x40000000
2,870,786 UART:
2,870,802 UART: Running Caliptra FMC ...
2,871,210 UART:
2,871,440 UART: [fmc] Received command: 0x1000000A
2,872,869 >>> mbox cmd response data (116 bytes)
2,872,870 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,872,899 UART: [fmc] Received command: 0x10000009
2,874,097 >>> mbox cmd response data (48 bytes)
2,874,098 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,874,127 UART: [fmc] Received command: 0x10000003
2,883,583 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,748 >>> mbox cmd response data (12 bytes)
1,142,749 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,635,482 >>> mbox cmd response: success
2,690,835 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,750 UART:
2,696,766 UART: Running Caliptra FMC ...
2,697,174 UART:
2,697,404 UART: [fmc] Received command: 0x1000000A
2,698,833 >>> mbox cmd response data (116 bytes)
2,698,834 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,698,863 UART: [fmc] Received command: 0x10000009
2,700,061 >>> mbox cmd response data (48 bytes)
2,700,062 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,700,091 UART: [fmc] Received command: 0x10000003
2,709,547 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
891,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,611 UART: [kat] ++
895,763 UART: [kat] sha1
899,971 UART: [kat] SHA2-256
901,911 UART: [kat] SHA2-384
904,682 UART: [kat] SHA2-512-ACC
906,583 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
920,902 UART: [kat] LMS
1,169,214 UART: [kat] --
1,170,115 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,721 UART: [ldev] ++
1,209,889 UART: [ldev] CDI.KEYID = 6
1,210,253 UART: [ldev] SUBJECT.KEYID = 5
1,210,680 UART: [ldev] AUTHORITY.KEYID = 7
1,211,143 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,264 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,090 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x4d454153
1,285,832 >>> mbox cmd response data (12 bytes)
1,285,833 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,918 UART: [fwproc] Recv command 0x46574c44
1,286,651 UART: [fwproc] Recv'd Img size: 114888 bytes
2,590,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,670 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,643,355 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,783,744 >>> mbox cmd response: success
2,784,902 UART: [afmc] ++
2,785,070 UART: [afmc] CDI.KEYID = 6
2,785,433 UART: [afmc] SUBJECT.KEYID = 7
2,785,859 UART: [afmc] AUTHORITY.KEYID = 5
2,821,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,592 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,844,288 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,850,187 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,880 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,658 UART: [afmc] --
2,864,521 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,543 UART: [cold-reset] --
2,865,539 UART: [state] Locking Datavault
2,866,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,210 UART: [state] Locking ICCM
2,867,658 UART: [exit] Launching FMC @ 0x40000000
2,872,955 UART:
2,872,971 UART: Running Caliptra FMC ...
2,873,379 UART:
2,873,609 UART: [fmc] Received command: 0x1000000A
2,875,038 >>> mbox cmd response data (116 bytes)
2,875,039 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,068 UART: [fmc] Received command: 0x10000009
2,876,266 >>> mbox cmd response data (48 bytes)
2,876,267 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,296 UART: [fmc] Received command: 0x10000003
2,885,752 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,925 >>> mbox cmd response data (12 bytes)
1,143,926 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,638,219 >>> mbox cmd response: success
2,694,570 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,700,539 UART:
2,700,555 UART: Running Caliptra FMC ...
2,700,963 UART:
2,701,193 UART: [fmc] Received command: 0x1000000A
2,702,622 >>> mbox cmd response data (116 bytes)
2,702,623 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,702,652 UART: [fmc] Received command: 0x10000009
2,703,850 >>> mbox cmd response data (48 bytes)
2,703,851 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,703,880 UART: [fmc] Received command: 0x10000003
2,713,336 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,897 UART: [state] WD Timer not started. Device not locked for debugging
88,092 UART: [kat] SHA2-256
891,642 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,746 UART: [kat] ++
895,898 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,829 UART: [kat] SHA2-512-ACC
906,730 UART: [kat] ECC-384
916,205 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,658 UART: [cold-reset] ++
1,170,130 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,199,159 UART: [idev] Sha1 KeyId Algorithm
1,208,129 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,215,496 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,031 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,612 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x4d454153
1,285,617 >>> mbox cmd response data (12 bytes)
1,285,618 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,285,821 UART: [fwproc] Recv command 0x46574c44
1,286,554 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,617,001 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,686 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,959 >>> mbox cmd response: success
2,784,055 UART: [afmc] ++
2,784,223 UART: [afmc] CDI.KEYID = 6
2,784,586 UART: [afmc] SUBJECT.KEYID = 7
2,785,012 UART: [afmc] AUTHORITY.KEYID = 5
2,820,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,837,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,781 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,843,477 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,849,376 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,855,069 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,862,943 UART: [afmc] --
2,863,812 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,863,834 UART: [cold-reset] --
2,864,592 UART: [state] Locking Datavault
2,865,871 UART: [state] Locking PCR0, PCR1 and PCR31
2,866,475 UART: [state] Locking ICCM
2,866,927 UART: [exit] Launching FMC @ 0x40000000
2,872,224 UART:
2,872,240 UART: Running Caliptra FMC ...
2,872,648 UART:
2,872,878 UART: [fmc] Received command: 0x1000000A
2,874,307 >>> mbox cmd response data (116 bytes)
2,874,308 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,874,337 UART: [fmc] Received command: 0x10000009
2,875,535 >>> mbox cmd response data (48 bytes)
2,875,536 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,875,565 UART: [fmc] Received command: 0x10000003
2,885,021 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,008 >>> mbox cmd response data (12 bytes)
1,142,009 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,778 >>> mbox cmd response: success
2,690,513 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,696,556 UART:
2,696,572 UART: Running Caliptra FMC ...
2,696,980 UART:
2,697,210 UART: [fmc] Received command: 0x1000000A
2,698,639 >>> mbox cmd response data (116 bytes)
2,698,640 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,698,669 UART: [fmc] Received command: 0x10000009
2,699,867 >>> mbox cmd response data (48 bytes)
2,699,868 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,699,897 UART: [fmc] Received command: 0x10000003
2,709,353 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,603 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,350 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,511 UART: [cold-reset] ++
1,171,013 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,280 UART: [idev] Sha1 KeyId Algorithm
1,208,160 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,185 UART: [ldev] Erasing FE.KEYID = 1
1,243,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,315 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,895 UART: [ldev] --
1,282,240 UART: [fwproc] Wait for Commands...
1,283,013 UART: [fwproc] Recv command 0x4d454153
1,287,036 >>> mbox cmd response data (12 bytes)
1,287,037 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,287,192 UART: [fwproc] Recv command 0x46574c44
1,287,925 UART: [fwproc] Recv'd Img size: 114888 bytes
2,589,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,616,826 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,642,511 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,782,732 >>> mbox cmd response: success
2,783,994 UART: [afmc] ++
2,784,162 UART: [afmc] CDI.KEYID = 6
2,784,525 UART: [afmc] SUBJECT.KEYID = 7
2,784,951 UART: [afmc] AUTHORITY.KEYID = 5
2,821,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,838,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,838,938 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,844,634 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,850,533 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,856,226 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,863,962 UART: [afmc] --
2,864,765 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,864,787 UART: [cold-reset] --
2,865,699 UART: [state] Locking Datavault
2,866,982 UART: [state] Locking PCR0, PCR1 and PCR31
2,867,586 UART: [state] Locking ICCM
2,868,086 UART: [exit] Launching FMC @ 0x40000000
2,873,383 UART:
2,873,399 UART: Running Caliptra FMC ...
2,873,807 UART:
2,874,037 UART: [fmc] Received command: 0x1000000A
2,875,466 >>> mbox cmd response data (116 bytes)
2,875,467 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,875,496 UART: [fmc] Received command: 0x10000009
2,876,694 >>> mbox cmd response data (48 bytes)
2,876,695 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,876,724 UART: [fmc] Received command: 0x10000003
2,886,180 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,307 >>> mbox cmd response data (12 bytes)
1,143,308 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,636,505 >>> mbox cmd response: success
2,692,624 <<< Executing mbox cmd 0x1000000a (0 bytes) from SoC
2,698,809 UART:
2,698,825 UART: Running Caliptra FMC ...
2,699,233 UART:
2,699,463 UART: [fmc] Received command: 0x1000000A
2,700,892 >>> mbox cmd response data (116 bytes)
2,700,893 <<< Executing mbox cmd 0x10000009 (0 bytes) from SoC
2,700,922 UART: [fmc] Received command: 0x10000009
2,702,120 >>> mbox cmd response data (48 bytes)
2,702,121 <<< Executing mbox cmd 0x10000003 (0 bytes) from SoC
2,702,150 UART: [fmc] Received command: 0x10000003
2,711,606 >>> mbox cmd response data (2048 bytes)
test test_fmcalias_derivation::test_upload_single_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
3,648 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,227 UART:
192,602 UART: Running Caliptra ROM ...
193,779 UART:
193,958 UART: [state] CFI Enabled
262,772 UART: [state] LifecycleState = Unprovisioned
264,711 UART: [state] DebugLocked = No
266,961 UART: [state] WD Timer not started. Device not locked for debugging
271,561 UART: [kat] SHA2-256
451,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,031 UART: [kat] ++
462,483 UART: [kat] sha1
473,633 UART: [kat] SHA2-256
476,364 UART: [kat] SHA2-384
482,190 UART: [kat] SHA2-512-ACC
484,597 UART: [kat] ECC-384
2,946,457 UART: [kat] HMAC-384Kdf
2,970,592 UART: [kat] LMS
3,447,094 UART: [kat] --
3,450,768 UART: [cold-reset] ++
3,452,072 UART: [fht] FHT @ 0x50003400
3,464,586 UART: [idev] ++
3,465,167 UART: [idev] CDI.KEYID = 6
3,466,116 UART: [idev] SUBJECT.KEYID = 7
3,467,391 UART: [idev] UDS.KEYID = 0
3,500,091 UART: [idev] Erasing UDS.KEYID = 0
5,985,759 UART: [idev] Sha1 KeyId Algorithm
6,009,351 UART: [idev] --
6,014,973 UART: [ldev] ++
6,015,578 UART: [ldev] CDI.KEYID = 6
6,016,497 UART: [ldev] SUBJECT.KEYID = 5
6,017,665 UART: [ldev] AUTHORITY.KEYID = 7
6,018,905 UART: [ldev] FE.KEYID = 1
6,055,427 UART: [ldev] Erasing FE.KEYID = 1
8,563,636 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,133 UART: [ldev] --
10,371,696 UART: [fwproc] Wait for Commands...
10,373,255 UART: [fwproc] Recv command 0x46574c44
10,375,248 UART: Invalid Img size: 0 bytes
10,379,471 UART: ROM Fatal Error: 0x01020002
10,382,678 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,637 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,266,190 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
4,252 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,548 UART:
192,912 UART: Running Caliptra ROM ...
194,088 UART:
603,641 UART: [state] CFI Enabled
620,354 UART: [state] LifecycleState = Unprovisioned
622,305 UART: [state] DebugLocked = No
623,521 UART: [state] WD Timer not started. Device not locked for debugging
627,731 UART: [kat] SHA2-256
807,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,141 UART: [kat] ++
818,730 UART: [kat] sha1
830,259 UART: [kat] SHA2-256
832,937 UART: [kat] SHA2-384
838,475 UART: [kat] SHA2-512-ACC
840,858 UART: [kat] ECC-384
3,283,825 UART: [kat] HMAC-384Kdf
3,295,934 UART: [kat] LMS
3,772,464 UART: [kat] --
3,775,694 UART: [cold-reset] ++
3,777,613 UART: [fht] FHT @ 0x50003400
3,788,547 UART: [idev] ++
3,789,125 UART: [idev] CDI.KEYID = 6
3,790,265 UART: [idev] SUBJECT.KEYID = 7
3,791,369 UART: [idev] UDS.KEYID = 0
3,811,718 UART: [idev] Erasing UDS.KEYID = 0
6,274,114 UART: [idev] Sha1 KeyId Algorithm
6,296,641 UART: [idev] --
6,301,745 UART: [ldev] ++
6,302,320 UART: [ldev] CDI.KEYID = 6
6,303,334 UART: [ldev] SUBJECT.KEYID = 5
6,304,437 UART: [ldev] AUTHORITY.KEYID = 7
6,305,720 UART: [ldev] FE.KEYID = 1
6,318,251 UART: [ldev] Erasing FE.KEYID = 1
8,794,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,967 UART: [ldev] --
10,587,852 UART: [fwproc] Wait for Commands...
10,590,861 UART: [fwproc] Recv command 0x46574c44
10,592,905 UART: Invalid Img size: 0 bytes
10,596,579 UART: ROM Fatal Error: 0x01020002
10,599,776 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
4,227 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,490,326 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,134 UART: [kat] SHA2-256
890,684 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,788 UART: [kat] ++
894,940 UART: [kat] sha1
899,302 UART: [kat] SHA2-256
901,242 UART: [kat] SHA2-384
904,199 UART: [kat] SHA2-512-ACC
906,100 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,868 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,613 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,544 UART: [ldev] ++
1,208,712 UART: [ldev] CDI.KEYID = 6
1,209,076 UART: [ldev] SUBJECT.KEYID = 5
1,209,503 UART: [ldev] AUTHORITY.KEYID = 7
1,209,966 UART: [ldev] FE.KEYID = 1
1,215,026 UART: [ldev] Erasing FE.KEYID = 1
1,240,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,710 UART: [ldev] --
1,279,945 UART: [fwproc] Wait for Commands...
1,280,758 UART: [fwproc] Recv command 0x46574c44
1,281,487 UART: Invalid Img size: 0 bytes
1,282,439 UART: ROM Fatal Error: 0x01020002
1,283,598 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,423 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,245 UART: [kat] SHA2-256
891,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,899 UART: [kat] ++
896,051 UART: [kat] sha1
900,321 UART: [kat] SHA2-256
902,261 UART: [kat] SHA2-384
905,028 UART: [kat] SHA2-512-ACC
906,929 UART: [kat] ECC-384
917,074 UART: [kat] HMAC-384Kdf
921,670 UART: [kat] LMS
1,169,982 UART: [kat] --
1,170,639 UART: [cold-reset] ++
1,171,189 UART: [fht] FHT @ 0x50003400
1,173,989 UART: [idev] ++
1,174,157 UART: [idev] CDI.KEYID = 6
1,174,518 UART: [idev] SUBJECT.KEYID = 7
1,174,943 UART: [idev] UDS.KEYID = 0
1,183,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,859 UART: [ldev] ++
1,210,027 UART: [ldev] CDI.KEYID = 6
1,210,391 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,839 UART: [ldev] Erasing FE.KEYID = 1
1,242,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,802 UART: [fwproc] Wait for Commands...
1,282,551 UART: [fwproc] Recv command 0x46574c44
1,283,280 UART: Invalid Img size: 0 bytes
1,284,290 UART: ROM Fatal Error: 0x01020002
1,285,449 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,366 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,170,010 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,199,209 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,208,926 UART: [ldev] ++
1,209,094 UART: [ldev] CDI.KEYID = 6
1,209,458 UART: [ldev] SUBJECT.KEYID = 5
1,209,885 UART: [ldev] AUTHORITY.KEYID = 7
1,210,348 UART: [ldev] FE.KEYID = 1
1,215,610 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,481 UART: [fwproc] Wait for Commands...
1,281,052 UART: [fwproc] Recv command 0x46574c44
1,281,781 UART: Invalid Img size: 0 bytes
1,282,665 UART: ROM Fatal Error: 0x01020002
1,283,824 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,349 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,566 UART: [kat] LMS
1,168,878 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,025 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,181,720 UART: [idev] Erasing UDS.KEYID = 0
1,199,028 UART: [idev] Sha1 KeyId Algorithm
1,207,860 UART: [idev] --
1,208,889 UART: [ldev] ++
1,209,057 UART: [ldev] CDI.KEYID = 6
1,209,421 UART: [ldev] SUBJECT.KEYID = 5
1,209,848 UART: [ldev] AUTHORITY.KEYID = 7
1,210,311 UART: [ldev] FE.KEYID = 1
1,215,677 UART: [ldev] Erasing FE.KEYID = 1
1,241,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,725 UART: [ldev] --
1,281,168 UART: [fwproc] Wait for Commands...
1,281,885 UART: [fwproc] Recv command 0x46574c44
1,282,614 UART: Invalid Img size: 0 bytes
1,283,324 UART: ROM Fatal Error: 0x01020002
1,284,483 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,548 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,242 UART: [kat] SHA2-256
890,792 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,896 UART: [kat] ++
895,048 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,991 UART: [kat] SHA2-512-ACC
905,892 UART: [kat] ECC-384
915,311 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,208 UART: [cold-reset] ++
1,169,670 UART: [fht] FHT @ 0x50003400
1,172,116 UART: [idev] ++
1,172,284 UART: [idev] CDI.KEYID = 6
1,172,645 UART: [idev] SUBJECT.KEYID = 7
1,173,070 UART: [idev] UDS.KEYID = 0
1,181,037 UART: [idev] Erasing UDS.KEYID = 0
1,197,927 UART: [idev] Sha1 KeyId Algorithm
1,206,923 UART: [idev] --
1,207,924 UART: [ldev] ++
1,208,092 UART: [ldev] CDI.KEYID = 6
1,208,456 UART: [ldev] SUBJECT.KEYID = 5
1,208,883 UART: [ldev] AUTHORITY.KEYID = 7
1,209,346 UART: [ldev] FE.KEYID = 1
1,214,372 UART: [ldev] Erasing FE.KEYID = 1
1,241,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,279,925 UART: [fwproc] Wait for Commands...
1,280,622 UART: [fwproc] Recv command 0x46574c44
1,281,351 UART: Invalid Img size: 0 bytes
1,282,429 UART: ROM Fatal Error: 0x01020002
1,283,588 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,129 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,601 UART: [kat] SHA2-256
891,151 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,255 UART: [kat] ++
895,407 UART: [kat] sha1
899,577 UART: [kat] SHA2-256
901,517 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,736 UART: [kat] LMS
1,169,048 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,172,881 UART: [idev] ++
1,173,049 UART: [idev] CDI.KEYID = 6
1,173,410 UART: [idev] SUBJECT.KEYID = 7
1,173,835 UART: [idev] UDS.KEYID = 0
1,182,006 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,110 UART: [idev] --
1,209,205 UART: [ldev] ++
1,209,373 UART: [ldev] CDI.KEYID = 6
1,209,737 UART: [ldev] SUBJECT.KEYID = 5
1,210,164 UART: [ldev] AUTHORITY.KEYID = 7
1,210,627 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,241,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,909 UART: [ldev] --
1,281,154 UART: [fwproc] Wait for Commands...
1,281,723 UART: [fwproc] Recv command 0x46574c44
1,282,452 UART: Invalid Img size: 0 bytes
1,283,162 UART: ROM Fatal Error: 0x01020002
1,284,321 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,716 >>> mbox cmd response: failed
test test_fmcalias_derivation::test_zero_firmware_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,106 UART:
192,486 UART: Running Caliptra ROM ...
193,672 UART:
193,834 UART: [state] CFI Enabled
264,800 UART: [state] LifecycleState = Unprovisioned
266,756 UART: [state] DebugLocked = No
268,199 UART: [state] WD Timer not started. Device not locked for debugging
272,845 UART: [kat] SHA2-256
452,509 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,309 UART: [kat] ++
463,843 UART: [kat] sha1
474,506 UART: [kat] SHA2-256
477,198 UART: [kat] SHA2-384
482,161 UART: [kat] SHA2-512-ACC
484,558 UART: [kat] ECC-384
2,948,690 UART: [kat] HMAC-384Kdf
2,971,146 UART: [kat] LMS
3,447,635 UART: [kat] --
3,450,718 UART: [cold-reset] ++
3,452,605 UART: [fht] FHT @ 0x50003400
3,465,046 UART: [idev] ++
3,465,617 UART: [idev] CDI.KEYID = 6
3,466,643 UART: [idev] SUBJECT.KEYID = 7
3,467,804 UART: [idev] UDS.KEYID = 0
3,501,398 UART: [idev] Erasing UDS.KEYID = 0
5,988,250 UART: [idev] Sha1 KeyId Algorithm
6,013,061 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,795 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,756,661 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,772,683 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,788,245 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,814,318 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,970,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,120,292 UART: [idev] --
8,120,949 UART: [ldev] ++
8,121,454 UART: [ldev] CDI.KEYID = 6
8,122,343 UART: [ldev] SUBJECT.KEYID = 5
8,123,451 UART: [ldev] AUTHORITY.KEYID = 7
8,124,635 UART: [ldev] FE.KEYID = 1
8,125,552 UART: [ldev] Erasing FE.KEYID = 1
10,528,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,263,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,279,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,295,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,310,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,332,837 UART: [ldev] --
12,338,805 UART: [fwproc] Wait for Commands...
12,341,278 UART: [fwproc] Recv command 0x46574c44
12,343,270 UART: [fwproc] Recv'd Img size: 118548 bytes
15,826,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,906,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,979,284 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,307,680 >>> mbox cmd response: success
16,311,278 UART: [afmc] ++
16,311,888 UART: [afmc] CDI.KEYID = 6
16,312,805 UART: [afmc] SUBJECT.KEYID = 7
16,314,030 UART: [afmc] AUTHORITY.KEYID = 5
18,859,266 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,603,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,605,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,621,002 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,637,083 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,652,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,677,460 UART: [afmc] --
20,682,081 UART: [cold-reset] --
20,684,730 UART: [state] Locking Datavault
20,689,773 UART: [state] Locking PCR0, PCR1 and PCR31
20,691,481 UART: [state] Locking ICCM
20,693,181 UART: [exit] Launching FMC @ 0x40000130
20,701,574 UART:
20,701,811 UART: Running Caliptra FMC ...
20,702,841 UART:
20,702,993 UART: [state] CFI Enabled
20,760,975 UART: [fht] FMC Alias Private Key: 7
22,547,968 UART: [art] Extend RT PCRs Done
22,549,382 UART: [art] Lock RT PCRs Done
22,550,890 UART: [art] Populate DV Done
22,556,198 UART: [fht] FMC Alias Private Key: 7
22,557,748 UART: [art] Derive CDI
22,558,570 UART: [art] Store in slot 0x4
22,615,288 UART: [art] Derive Key Pair
22,616,307 UART: [art] Store priv key in slot 0x5
25,079,426 UART: [art] Derive Key Pair - Done
25,092,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,805,140 UART: [art] Erasing AUTHORITY.KEYID = 7
26,806,655 UART: [art] PUB.X = 873A1FEF867F45C9A6371288D664AFA5211E264ED85B794807CC3EE37C218143279A79D51B4A879B2B09D619E99CA660
26,813,929 UART: [art] PUB.Y = B0BC9BC8B9FDABE1741A29E450FCFD5EAEF27A70E6B8DFB5EF1CB265AA972C9A75224F83CF664377650DCD07D84FB05D
26,821,220 UART: [art] SIG.R = 5AC2DB7962971DA5C57D0EF81E4F14299765FA386DA46FA99B7B7E53E80B0B9142B1C3BB5B2343582997C5B7ACB8C608
26,828,621 UART: [art] SIG.S = A04D6FBE6C1D92FA90AE55135CDE57449C399999513D21529640BE18366FBF148B5A459D5A95708B5EC205DD14587861
27,807,340 UART: Caliptra RT
27,808,040 UART: [state] CFI Enabled
27,988,443 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
7,744,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,999,708 >>> mbox cmd response: success
20,284,415 UART:
20,284,804 UART: Running Caliptra FMC ...
20,286,012 UART:
20,286,192 UART: [state] CFI Enabled
20,353,844 UART: [fht] FMC Alias Private Key: 7
22,120,296 UART: [art] Extend RT PCRs Done
22,121,531 UART: [art] Lock RT PCRs Done
22,123,002 UART: [art] Populate DV Done
22,128,230 UART: [fht] FMC Alias Private Key: 7
22,129,888 UART: [art] Derive CDI
22,130,713 UART: [art] Store in slot 0x4
22,186,823 UART: [art] Derive Key Pair
22,187,869 UART: [art] Store priv key in slot 0x5
24,650,315 UART: [art] Derive Key Pair - Done
24,663,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,376,467 UART: [art] Erasing AUTHORITY.KEYID = 7
26,377,975 UART: [art] PUB.X = 68D8CE66C5A6AB31AE91215A307ACF1C379D9CFC9A1EA1AF895DB3702731E892D59342888F98647FECFFEDC72725B935
26,385,203 UART: [art] PUB.Y = 828629DEB64C908BAA310966BB46C5DA716C084D768AC7455C6C5A4210BAA00EC8243522D32B104C7A2F4AD599B3F094
26,392,497 UART: [art] SIG.R = B3D05F6D97A09C32944F0B3D2C0A618E447E088A04B0C21796DF6C0B6D0B8E702AE6C3502A18E770E25FAEF5DFD0872C
26,399,870 UART: [art] SIG.S = DDD323C3CDC770BB7A740D6450A677067181AF04EE43929EB01DD30BEC3822D3FA1A2F1B1AC44EB195888918FA3DADC8
27,378,831 UART: Caliptra RT
27,379,528 UART: [state] CFI Enabled
27,560,606 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,613 UART:
192,987 UART: Running Caliptra ROM ...
194,167 UART:
603,940 UART: [state] CFI Enabled
619,066 UART: [state] LifecycleState = Unprovisioned
620,979 UART: [state] DebugLocked = No
622,871 UART: [state] WD Timer not started. Device not locked for debugging
626,648 UART: [kat] SHA2-256
806,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,066 UART: [kat] ++
817,576 UART: [kat] sha1
829,148 UART: [kat] SHA2-256
831,879 UART: [kat] SHA2-384
837,956 UART: [kat] SHA2-512-ACC
840,367 UART: [kat] ECC-384
3,281,962 UART: [kat] HMAC-384Kdf
3,294,475 UART: [kat] LMS
3,770,950 UART: [kat] --
3,776,399 UART: [cold-reset] ++
3,778,379 UART: [fht] FHT @ 0x50003400
3,788,330 UART: [idev] ++
3,788,892 UART: [idev] CDI.KEYID = 6
3,789,828 UART: [idev] SUBJECT.KEYID = 7
3,791,095 UART: [idev] UDS.KEYID = 0
3,806,562 UART: [idev] Erasing UDS.KEYID = 0
6,268,141 UART: [idev] Sha1 KeyId Algorithm
6,293,288 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,009,318 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,025,170 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,041,170 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,056,793 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,082,825 UART: [idev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
8,239,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,393,076 UART: [idev] --
8,393,804 UART: [ldev] ++
8,394,515 UART: [ldev] CDI.KEYID = 6
8,395,533 UART: [ldev] SUBJECT.KEYID = 5
8,396,569 UART: [ldev] AUTHORITY.KEYID = 7
8,397,750 UART: [ldev] FE.KEYID = 1
8,398,643 UART: [ldev] Erasing FE.KEYID = 1
10,739,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,458,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,473,913 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,489,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,505,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,526,446 UART: [ldev] --
12,532,052 UART: [fwproc] Wait for Commands...
12,534,480 UART: [fwproc] Recv command 0x46574c44
12,536,522 UART: [fwproc] Recv'd Img size: 118548 bytes
16,028,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,108,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,181,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,509,948 >>> mbox cmd response: success
16,513,368 UART: [afmc] ++
16,513,963 UART: [afmc] CDI.KEYID = 6
16,514,931 UART: [afmc] SUBJECT.KEYID = 7
16,516,084 UART: [afmc] AUTHORITY.KEYID = 5
19,023,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,746,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,748,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,764,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,780,766 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,796,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,821,040 UART: [afmc] --
20,825,235 UART: [cold-reset] --
20,830,015 UART: [state] Locking Datavault
20,834,436 UART: [state] Locking PCR0, PCR1 and PCR31
20,836,194 UART: [state] Locking ICCM
20,838,779 UART: [exit] Launching FMC @ 0x40000130
20,847,177 UART:
20,847,412 UART: Running Caliptra FMC ...
20,848,515 UART:
20,848,669 UART: [state] CFI Enabled
20,856,601 UART: [fht] FMC Alias Private Key: 7
22,623,053 UART: [art] Extend RT PCRs Done
22,624,258 UART: [art] Lock RT PCRs Done
22,626,144 UART: [art] Populate DV Done
22,631,661 UART: [fht] FMC Alias Private Key: 7
22,633,162 UART: [art] Derive CDI
22,633,922 UART: [art] Store in slot 0x4
22,677,050 UART: [art] Derive Key Pair
22,678,074 UART: [art] Store priv key in slot 0x5
25,105,833 UART: [art] Derive Key Pair - Done
25,118,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,825,104 UART: [art] Erasing AUTHORITY.KEYID = 7
26,826,604 UART: [art] PUB.X = 92DFD3F8BF67E3FD92D972BBB0FECD51335FDB143922D1CA175CD5A4B6FAA772252D741A0AEE1CFF6252220A3AA54805
26,833,892 UART: [art] PUB.Y = FDD7E43F834D5C1771CAE526E7F5138FE0339CB383ABD947048AC5647D1F485CD97512E4BF86BBBA06A454BB7781E969
26,841,160 UART: [art] SIG.R = 94E413317F5BA182FB9C3F6EEA9074F9DEC6C99E2908CA3F63A839CC11DB91CE5E0A3F841EB10DA5064E8940D95DE821
26,848,548 UART: [art] SIG.S = 7AF232B2DFFFB6C6EFC41F837712BC6BFFA7B25ECD25E4B41CD99F6361AAF96B8B3ECBD7D8226C97DBB9DF752C77883B
27,827,433 UART: Caliptra RT
27,828,133 UART: [state] CFI Enabled
27,961,294 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
8,019,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,195,095 >>> mbox cmd response: success
20,446,238 UART:
20,446,651 UART: Running Caliptra FMC ...
20,447,793 UART:
20,447,951 UART: [state] CFI Enabled
20,455,785 UART: [fht] FMC Alias Private Key: 7
22,221,329 UART: [art] Extend RT PCRs Done
22,222,556 UART: [art] Lock RT PCRs Done
22,224,132 UART: [art] Populate DV Done
22,229,396 UART: [fht] FMC Alias Private Key: 7
22,230,878 UART: [art] Derive CDI
22,231,634 UART: [art] Store in slot 0x4
22,274,398 UART: [art] Derive Key Pair
22,275,439 UART: [art] Store priv key in slot 0x5
24,702,247 UART: [art] Derive Key Pair - Done
24,715,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,422,069 UART: [art] Erasing AUTHORITY.KEYID = 7
26,423,579 UART: [art] PUB.X = CE18B294479CEB00496E1153ED2C12CADE15EE09688AA719DC87D8936B845E1B770CA0F63B234AADD4E9A7AB8B8B5E7C
26,430,867 UART: [art] PUB.Y = 8CA8BA82FBAC3EBF0C4D2CAE84931BD6EFCEB0F6A655DBBE75B188532F424FEA2AEDD5BFB409339C35DD926E535718F0
26,438,166 UART: [art] SIG.R = B6FFE718D6911C24BD5619D50B8B35303E69D361D1AB7F6C7131FFA94208D6340A6B98D74E94F6B84357768DAED5CFDF
26,445,576 UART: [art] SIG.S = 5E94FE45EADF2C00D0B62138085DCB86D37DD20CEECF3FA9081A18833FB266285C19744C397A0F3763B8E5D79742B039
27,424,473 UART: Caliptra RT
27,425,171 UART: [state] CFI Enabled
27,558,076 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,768 UART: [kat] SHA2-256
901,708 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,339 UART: [kat] HMAC-384Kdf
920,945 UART: [kat] LMS
1,169,257 UART: [kat] --
1,170,000 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,173,036 UART: [idev] ++
1,173,204 UART: [idev] CDI.KEYID = 6
1,173,565 UART: [idev] SUBJECT.KEYID = 7
1,173,990 UART: [idev] UDS.KEYID = 0
1,182,063 UART: [idev] Erasing UDS.KEYID = 0
1,199,303 UART: [idev] Sha1 KeyId Algorithm
1,209,117 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,181 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,889 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,774 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,480 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,909 UART: [idev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
1,300,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,287 UART: [idev] --
1,301,382 UART: [ldev] ++
1,301,550 UART: [ldev] CDI.KEYID = 6
1,301,914 UART: [ldev] SUBJECT.KEYID = 5
1,302,341 UART: [ldev] AUTHORITY.KEYID = 7
1,302,804 UART: [ldev] FE.KEYID = 1
1,307,862 UART: [ldev] Erasing FE.KEYID = 1
1,333,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,000 UART: [ldev] --
1,373,289 UART: [fwproc] Wait for Commands...
1,373,954 UART: [fwproc] Recv command 0x46574c44
1,374,687 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,983 >>> mbox cmd response: success
2,919,097 UART: [afmc] ++
2,919,265 UART: [afmc] CDI.KEYID = 6
2,919,628 UART: [afmc] SUBJECT.KEYID = 7
2,920,054 UART: [afmc] AUTHORITY.KEYID = 5
2,955,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,415 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,125 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,006 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,707 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,520 UART: [afmc] --
2,998,351 UART: [cold-reset] --
2,999,275 UART: [state] Locking Datavault
3,000,462 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,066 UART: [state] Locking ICCM
3,001,510 UART: [exit] Launching FMC @ 0x40000130
3,006,840 UART:
3,006,856 UART: Running Caliptra FMC ...
3,007,264 UART:
3,007,318 UART: [state] CFI Enabled
3,017,868 UART: [fht] FMC Alias Private Key: 7
3,136,964 UART: [art] Extend RT PCRs Done
3,137,392 UART: [art] Lock RT PCRs Done
3,138,810 UART: [art] Populate DV Done
3,147,453 UART: [fht] FMC Alias Private Key: 7
3,148,547 UART: [art] Derive CDI
3,148,827 UART: [art] Store in slot 0x4
3,234,525 UART: [art] Derive Key Pair
3,234,885 UART: [art] Store priv key in slot 0x5
3,248,086 UART: [art] Derive Key Pair - Done
3,262,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,893 UART: [art] PUB.X = 2216335382EA526EBEF7DEAD7FDB246AE586FDFDB2012659FF807BCF5FF479B847C04D4AEEF5391CD5394F729F916A6F
3,285,678 UART: [art] PUB.Y = FF69D0E615E715CDA02CD90F1B2F173DA365B3B1B32A628EF6CED512CF3041F88A8A4D8C5DC73F4BCB13AEAB817C49FF
3,292,651 UART: [art] SIG.R = 89F313EFFA4C2F31A6D92E1824AA4DBD526DC497C16991FCE5322923421D9133CCB337364A374D739447F55FCC9D703F
3,299,425 UART: [art] SIG.S = B56B98A0E811EFD7192EB24E238E1FF48233D8B72177EDBF3D7E6AC0F9ADCCB7792E47409E5121179D62F53993711B8C
3,323,637 UART: Caliptra RT
3,323,888 UART: [state] CFI Enabled
3,443,448 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,440 >>> mbox cmd response: success
2,759,745 UART:
2,759,761 UART: Running Caliptra FMC ...
2,760,169 UART:
2,760,223 UART: [state] CFI Enabled
2,770,807 UART: [fht] FMC Alias Private Key: 7
2,889,993 UART: [art] Extend RT PCRs Done
2,890,421 UART: [art] Lock RT PCRs Done
2,891,679 UART: [art] Populate DV Done
2,899,864 UART: [fht] FMC Alias Private Key: 7
2,900,932 UART: [art] Derive CDI
2,901,212 UART: [art] Store in slot 0x4
2,987,214 UART: [art] Derive Key Pair
2,987,574 UART: [art] Store priv key in slot 0x5
3,000,717 UART: [art] Derive Key Pair - Done
3,015,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,660 UART: [art] PUB.X = EBBA700B04F449B5D4573357A236269423746CE62A38658A7BBC2DA2F66C16A12CC8A2B305191BB7266789330B1C8947
3,038,414 UART: [art] PUB.Y = 5B42DB4D8FF126AC44A17A0F2DC34F1A855D4FD3092E98BB2B19BECC9AA9D330055FFF57CCCC2B50C54B50E85368FEDB
3,045,381 UART: [art] SIG.R = F2E74383F4FB9E6E4C5F0B8F246A14BC720D7C420324E13B9CE7EE1752ECDA916A7630A106DD13A6A9F4A6042D01DEA8
3,052,147 UART: [art] SIG.S = 7944A6458993921939800338ABCB37A3865687663FE9DDA33FCEFE9869C8544E51033526CA5CD926CEBD4D210F5DE7A4
3,076,688 UART: Caliptra RT
3,076,939 UART: [state] CFI Enabled
3,196,584 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
891,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,341 UART: [kat] ++
895,493 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,181,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,782 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,080 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,788 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,673 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,379 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,808 UART: [idev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
1,299,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,186 UART: [idev] --
1,300,215 UART: [ldev] ++
1,300,383 UART: [ldev] CDI.KEYID = 6
1,300,747 UART: [ldev] SUBJECT.KEYID = 5
1,301,174 UART: [ldev] AUTHORITY.KEYID = 7
1,301,637 UART: [ldev] FE.KEYID = 1
1,306,893 UART: [ldev] Erasing FE.KEYID = 1
1,333,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,865 UART: [ldev] --
1,372,220 UART: [fwproc] Wait for Commands...
1,373,017 UART: [fwproc] Recv command 0x46574c44
1,373,750 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,490 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,665 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,042 >>> mbox cmd response: success
2,917,260 UART: [afmc] ++
2,917,428 UART: [afmc] CDI.KEYID = 6
2,917,791 UART: [afmc] SUBJECT.KEYID = 7
2,918,217 UART: [afmc] AUTHORITY.KEYID = 5
2,953,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,295 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,044 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,635 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,336 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,121 UART: [afmc] --
2,997,072 UART: [cold-reset] --
2,998,064 UART: [state] Locking Datavault
2,999,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,947 UART: [state] Locking ICCM
3,000,497 UART: [exit] Launching FMC @ 0x40000130
3,005,827 UART:
3,005,843 UART: Running Caliptra FMC ...
3,006,251 UART:
3,006,394 UART: [state] CFI Enabled
3,017,050 UART: [fht] FMC Alias Private Key: 7
3,136,348 UART: [art] Extend RT PCRs Done
3,136,776 UART: [art] Lock RT PCRs Done
3,138,050 UART: [art] Populate DV Done
3,146,407 UART: [fht] FMC Alias Private Key: 7
3,147,549 UART: [art] Derive CDI
3,147,829 UART: [art] Store in slot 0x4
3,233,747 UART: [art] Derive Key Pair
3,234,107 UART: [art] Store priv key in slot 0x5
3,247,322 UART: [art] Derive Key Pair - Done
3,262,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,241 UART: [art] PUB.X = B747637CD37061B2D08FB817A3D5222B5BB9F5E137C4A5B8D7EFD0859B11C13C74C832027DAE3B9CFA1E899B2B4F8EF6
3,285,022 UART: [art] PUB.Y = 8FF1CE0359FD58EF07A7995F812B6680EECDC1A856097BA8EAFB6DF93A42501F5A44AFCD4E8E408E36B4045E30A31FC5
3,291,978 UART: [art] SIG.R = 9DBA9D34F89AA2BA8A7DBA72BFA2281AC8DC5B7CB34435172E1D1FF8C9B5810708259E5D3BA7A6270604607B76C7730D
3,298,745 UART: [art] SIG.S = 07E2916E099C2753488950A78B2AEF07D6BFDD2FBD36F2F4DCCE99DE3A80A07E494014AD68E82E103E6282091046CD06
3,322,370 UART: Caliptra RT
3,322,713 UART: [state] CFI Enabled
3,442,934 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,500 >>> mbox cmd response: success
2,760,717 UART:
2,760,733 UART: Running Caliptra FMC ...
2,761,141 UART:
2,761,284 UART: [state] CFI Enabled
2,771,944 UART: [fht] FMC Alias Private Key: 7
2,891,426 UART: [art] Extend RT PCRs Done
2,891,854 UART: [art] Lock RT PCRs Done
2,893,366 UART: [art] Populate DV Done
2,901,519 UART: [fht] FMC Alias Private Key: 7
2,902,633 UART: [art] Derive CDI
2,902,913 UART: [art] Store in slot 0x4
2,988,253 UART: [art] Derive Key Pair
2,988,613 UART: [art] Store priv key in slot 0x5
3,002,484 UART: [art] Derive Key Pair - Done
3,016,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,393 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,158 UART: [art] PUB.X = 5F0DEA642E1676B65A80DEA080EA35CC6964E7FD2272752351A089DE2E5ADA22909331E7A198C1550B93D1C25E0419D9
3,039,921 UART: [art] PUB.Y = 3645393905EB85BA3D19B1C966D34F7CC0FEE7DA8FFC46A8C46D0CA5E6B4930BA976E80372994904E4872E0010EDE889
3,046,840 UART: [art] SIG.R = 714A763CDAED6B901FE1F245CA36745EF88DF08592C0941D994CEC0778DE96D5F1E0DC992295D6DCF393A7646DC9F2D9
3,053,619 UART: [art] SIG.S = EDCE7E73A0985D18EBE345C1B78773D1A0231C0BBAA26A0115D4804524AC4591147C8684342B5BFCACF221CA0C702A3E
3,077,026 UART: Caliptra RT
3,077,369 UART: [state] CFI Enabled
3,197,298 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,610 UART: [kat] SHA2-256
901,550 UART: [kat] SHA2-384
904,287 UART: [kat] SHA2-512-ACC
906,188 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,727 UART: [kat] LMS
1,169,039 UART: [kat] --
1,169,752 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,904 UART: [idev] ++
1,173,072 UART: [idev] CDI.KEYID = 6
1,173,433 UART: [idev] SUBJECT.KEYID = 7
1,173,858 UART: [idev] UDS.KEYID = 0
1,182,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,208,105 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,609 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,317 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,202 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,908 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,337 UART: [idev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
1,298,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,715 UART: [idev] --
1,299,926 UART: [ldev] ++
1,300,094 UART: [ldev] CDI.KEYID = 6
1,300,458 UART: [ldev] SUBJECT.KEYID = 5
1,300,885 UART: [ldev] AUTHORITY.KEYID = 7
1,301,348 UART: [ldev] FE.KEYID = 1
1,306,416 UART: [ldev] Erasing FE.KEYID = 1
1,333,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,298 UART: [ldev] --
1,372,677 UART: [fwproc] Wait for Commands...
1,373,490 UART: [fwproc] Recv command 0x46574c44
1,374,223 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,800 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,075 >>> mbox cmd response: success
2,918,249 UART: [afmc] ++
2,918,417 UART: [afmc] CDI.KEYID = 6
2,918,780 UART: [afmc] SUBJECT.KEYID = 7
2,919,206 UART: [afmc] AUTHORITY.KEYID = 5
2,954,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,877 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,758 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,459 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,146 UART: [afmc] --
2,998,117 UART: [cold-reset] --
2,999,023 UART: [state] Locking Datavault
3,000,538 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,142 UART: [state] Locking ICCM
3,001,750 UART: [exit] Launching FMC @ 0x40000130
3,007,080 UART:
3,007,096 UART: Running Caliptra FMC ...
3,007,504 UART:
3,007,558 UART: [state] CFI Enabled
3,018,328 UART: [fht] FMC Alias Private Key: 7
3,137,048 UART: [art] Extend RT PCRs Done
3,137,476 UART: [art] Lock RT PCRs Done
3,139,028 UART: [art] Populate DV Done
3,147,253 UART: [fht] FMC Alias Private Key: 7
3,148,263 UART: [art] Derive CDI
3,148,543 UART: [art] Store in slot 0x4
3,234,024 UART: [art] Derive Key Pair
3,234,384 UART: [art] Store priv key in slot 0x5
3,247,892 UART: [art] Derive Key Pair - Done
3,262,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,300 UART: [art] PUB.X = 38A17C1C357B2FFEC2B3BB7081D68AFA90D4106F0BA328409A9AE71D289E18509119B2F772FBBE598033EA6F834265B4
3,286,073 UART: [art] PUB.Y = E119F74BEC8C7D9804AAE510C823A1DE0132DB999FAE91525C3AABFD3E2BAAE8186D812404770097A77ED06BBDC36062
3,293,006 UART: [art] SIG.R = 99007D5EB4EB835DC03ACED26324CF30EB7D819DB03B270B879BB1A3E0AA6E07715AEAE68CD0EF0A1E305A356F1B0B34
3,299,762 UART: [art] SIG.S = 74BCAA79511AFED46562CC39C9681C7F3D0EA637E257F873B27DA0CEAE18A3DE309784B44D6280112C80C5D6C8EF5464
3,323,609 UART: Caliptra RT
3,323,860 UART: [state] CFI Enabled
3,444,225 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,318 >>> mbox cmd response: success
2,757,991 UART:
2,758,007 UART: Running Caliptra FMC ...
2,758,415 UART:
2,758,469 UART: [state] CFI Enabled
2,769,069 UART: [fht] FMC Alias Private Key: 7
2,887,605 UART: [art] Extend RT PCRs Done
2,888,033 UART: [art] Lock RT PCRs Done
2,889,563 UART: [art] Populate DV Done
2,897,938 UART: [fht] FMC Alias Private Key: 7
2,898,958 UART: [art] Derive CDI
2,899,238 UART: [art] Store in slot 0x4
2,984,669 UART: [art] Derive Key Pair
2,985,029 UART: [art] Store priv key in slot 0x5
2,998,351 UART: [art] Derive Key Pair - Done
3,012,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,473 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,238 UART: [art] PUB.X = D1298045FE1CDDF62767B20738EEB5FCDD8C810741F7A116552AB326828DF08EDB2802213281067E6668BA0B1F8F1B91
3,035,995 UART: [art] PUB.Y = 77BF4FF871D736B1CC6FE22FD40C3267CC819DC47080E5C4208D052F8A5B59E8A3C32EB152A0352013276A04A885F3EA
3,042,942 UART: [art] SIG.R = 9535513FB9776FAAE1E5B75142426CB23BF2BFEBB980FB7212758DA92328BA2B4960D5A7D7ACFAFC3AD781C691A0E7A5
3,049,728 UART: [art] SIG.S = B141314B95F6E3FF8D538808B81A642BDCBDDA55B0DF1AA709911982434DFD294B18E739F684794879ACF3503580F85F
3,073,376 UART: Caliptra RT
3,073,627 UART: [state] CFI Enabled
3,192,969 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,629 UART: [kat] SHA2-256
901,569 UART: [kat] SHA2-384
904,288 UART: [kat] SHA2-512-ACC
906,189 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,546 UART: [kat] LMS
1,168,858 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,937 UART: [idev] ++
1,173,105 UART: [idev] CDI.KEYID = 6
1,173,466 UART: [idev] SUBJECT.KEYID = 7
1,173,891 UART: [idev] UDS.KEYID = 0
1,181,630 UART: [idev] Erasing UDS.KEYID = 0
1,198,898 UART: [idev] Sha1 KeyId Algorithm
1,208,718 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,636 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,344 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,229 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,935 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,364 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,742 UART: [idev] --
1,300,739 UART: [ldev] ++
1,300,907 UART: [ldev] CDI.KEYID = 6
1,301,271 UART: [ldev] SUBJECT.KEYID = 5
1,301,698 UART: [ldev] AUTHORITY.KEYID = 7
1,302,161 UART: [ldev] FE.KEYID = 1
1,307,439 UART: [ldev] Erasing FE.KEYID = 1
1,333,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,349 UART: [ldev] --
1,372,564 UART: [fwproc] Wait for Commands...
1,373,191 UART: [fwproc] Recv command 0x46574c44
1,373,924 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,610 >>> mbox cmd response: success
2,918,738 UART: [afmc] ++
2,918,906 UART: [afmc] CDI.KEYID = 6
2,919,269 UART: [afmc] SUBJECT.KEYID = 7
2,919,695 UART: [afmc] AUTHORITY.KEYID = 5
2,955,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,160 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,870 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,075 UART: [afmc] --
2,999,008 UART: [cold-reset] --
2,999,924 UART: [state] Locking Datavault
3,001,373 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,977 UART: [state] Locking ICCM
3,002,533 UART: [exit] Launching FMC @ 0x40000130
3,007,863 UART:
3,007,879 UART: Running Caliptra FMC ...
3,008,287 UART:
3,008,430 UART: [state] CFI Enabled
3,018,902 UART: [fht] FMC Alias Private Key: 7
3,137,932 UART: [art] Extend RT PCRs Done
3,138,360 UART: [art] Lock RT PCRs Done
3,140,130 UART: [art] Populate DV Done
3,148,461 UART: [fht] FMC Alias Private Key: 7
3,149,629 UART: [art] Derive CDI
3,149,909 UART: [art] Store in slot 0x4
3,235,632 UART: [art] Derive Key Pair
3,235,992 UART: [art] Store priv key in slot 0x5
3,249,492 UART: [art] Derive Key Pair - Done
3,264,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,144 UART: [art] PUB.X = 3A55842AA96F3723D5E5023C697965D15D6F641F1825374303432F00F3601D4CC0FFBFC67E624A70C7151A35AB82B04A
3,286,882 UART: [art] PUB.Y = 6B53ACB4FE989491C8360E508F9D99B4F10F2BDDA075120D5F89A8F4B94A9FD222917F511ACD1FA6CAFAA6DAA87784C8
3,293,841 UART: [art] SIG.R = 588EF87841E72CD7B40DFDE9AFCAB3FB967C278E94F8D10591D76D31EA548CFDE61F67A70DA76A2757AA5F99AD3A14B3
3,300,622 UART: [art] SIG.S = 563C948CEFB930B2AEBCD13B0EFBCB27E5FA710267F21A48C7044674AA880E7B9E8E8E6AB58619308E74AEC716926945
3,324,646 UART: Caliptra RT
3,324,989 UART: [state] CFI Enabled
3,445,397 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,989 >>> mbox cmd response: success
2,761,480 UART:
2,761,496 UART: Running Caliptra FMC ...
2,761,904 UART:
2,762,047 UART: [state] CFI Enabled
2,772,741 UART: [fht] FMC Alias Private Key: 7
2,891,813 UART: [art] Extend RT PCRs Done
2,892,241 UART: [art] Lock RT PCRs Done
2,893,789 UART: [art] Populate DV Done
2,902,092 UART: [fht] FMC Alias Private Key: 7
2,903,062 UART: [art] Derive CDI
2,903,342 UART: [art] Store in slot 0x4
2,989,233 UART: [art] Derive Key Pair
2,989,593 UART: [art] Store priv key in slot 0x5
3,002,965 UART: [art] Derive Key Pair - Done
3,017,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,033,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,034,026 UART: [art] PUB.X = 9FB81FF6EDCDF727FFC133416CF29AB2517DAFC5D20FB1C1BA99A6152F21F6E0F006DC602A6FCDC95557023CD357512D
3,040,807 UART: [art] PUB.Y = 6917D3DD3AFDD467D3E0826AC8EDA0F8EBED9A3ED75C724630530C7B6C99A1E36B2112356C165D3D68AA32003CDEAAE6
3,047,750 UART: [art] SIG.R = 1C5A0AA7E129038252679B83762F785F4F385F211A7335E45091F3772CCB64099756645120E3600B6FFCAC9872B7A3C3
3,054,498 UART: [art] SIG.S = FB85F5CC35DAE5E32B65A6479A50C9783E39CD7EF64CCCA2175DBCF4A4706AEEA6F5A96D8E3400761C836099176913AA
3,078,264 UART: Caliptra RT
3,078,607 UART: [state] CFI Enabled
3,197,262 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,169,886 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,950 UART: [idev] ++
1,173,118 UART: [idev] CDI.KEYID = 6
1,173,479 UART: [idev] SUBJECT.KEYID = 7
1,173,904 UART: [idev] UDS.KEYID = 0
1,181,681 UART: [idev] Erasing UDS.KEYID = 0
1,198,833 UART: [idev] Sha1 KeyId Algorithm
1,208,525 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,877 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,585 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,470 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,176 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,605 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,983 UART: [idev] --
1,299,816 UART: [ldev] ++
1,299,984 UART: [ldev] CDI.KEYID = 6
1,300,348 UART: [ldev] SUBJECT.KEYID = 5
1,300,775 UART: [ldev] AUTHORITY.KEYID = 7
1,301,238 UART: [ldev] FE.KEYID = 1
1,306,258 UART: [ldev] Erasing FE.KEYID = 1
1,332,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,516 UART: [ldev] --
1,371,829 UART: [fwproc] Wait for Commands...
1,372,480 UART: [fwproc] Recv command 0x46574c44
1,373,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,743,977 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,152 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,915,421 >>> mbox cmd response: success
2,916,505 UART: [afmc] ++
2,916,673 UART: [afmc] CDI.KEYID = 6
2,917,036 UART: [afmc] SUBJECT.KEYID = 7
2,917,462 UART: [afmc] AUTHORITY.KEYID = 5
2,953,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,121 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,975,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,981,712 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,413 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,110 UART: [afmc] --
2,996,113 UART: [cold-reset] --
2,997,039 UART: [state] Locking Datavault
2,998,090 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,694 UART: [state] Locking ICCM
2,999,312 UART: [exit] Launching FMC @ 0x40000130
3,004,642 UART:
3,004,658 UART: Running Caliptra FMC ...
3,005,066 UART:
3,005,120 UART: [state] CFI Enabled
3,015,254 UART: [fht] FMC Alias Private Key: 7
3,134,812 UART: [art] Extend RT PCRs Done
3,135,240 UART: [art] Lock RT PCRs Done
3,136,802 UART: [art] Populate DV Done
3,145,005 UART: [fht] FMC Alias Private Key: 7
3,146,017 UART: [art] Derive CDI
3,146,297 UART: [art] Store in slot 0x4
3,232,194 UART: [art] Derive Key Pair
3,232,554 UART: [art] Store priv key in slot 0x5
3,245,406 UART: [art] Derive Key Pair - Done
3,260,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,275,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,665 UART: [art] PUB.X = 7E4C38DF3F094E25DA74D53ED5A32C1653183127A6C35DA154600CC162F4B86D2846CB50C0D83156E0685AA32195784D
3,283,427 UART: [art] PUB.Y = D256A99D2AF2ABACB3CB594DE76A97620385080376B937C1D6415C546686930D13F70D4EAFDD5093AD94BD32205C4ECD
3,290,370 UART: [art] SIG.R = 13913AA5A8142117AF1C3DF726FB335B9CF41BAEDAB23BC9B13A7F5A32C90D05C449B0A739140665E809A0D9EFA91D45
3,297,140 UART: [art] SIG.S = 756C56C39187D97155E11275C5930789B0A54C9F77E3C34221FBE229F6D7ACFAD143C0C722D547B2F788DF649624A356
3,321,197 UART: Caliptra RT
3,321,448 UART: [state] CFI Enabled
3,439,646 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,506 >>> mbox cmd response: success
2,758,457 UART:
2,758,473 UART: Running Caliptra FMC ...
2,758,881 UART:
2,758,935 UART: [state] CFI Enabled
2,769,345 UART: [fht] FMC Alias Private Key: 7
2,887,615 UART: [art] Extend RT PCRs Done
2,888,043 UART: [art] Lock RT PCRs Done
2,889,437 UART: [art] Populate DV Done
2,897,938 UART: [fht] FMC Alias Private Key: 7
2,898,932 UART: [art] Derive CDI
2,899,212 UART: [art] Store in slot 0x4
2,985,369 UART: [art] Derive Key Pair
2,985,729 UART: [art] Store priv key in slot 0x5
2,998,931 UART: [art] Derive Key Pair - Done
3,013,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,408 UART: [art] PUB.X = B41EBBC436DF6FABEF7DB43FEDE23E8A0683149F142A61D4971838710036314E9867E650EBD7C2A3A79AF1A6FD5A9112
3,037,165 UART: [art] PUB.Y = 46D57DB2FAB8AABA1CE44A376316351D09AEF4A4E29AE76C67CA3A1A6D09C806BE2EF87045BC76DBAA7933B13C84EB1A
3,044,130 UART: [art] SIG.R = 47D1225D0D19E4E2265F853C6C7B3350FB51BB493BD196E85F614EB7ABEAF0BFFF9FA67A270C2412BBA73E11AFA27152
3,050,910 UART: [art] SIG.S = 77CCD0F2D11FF5A2B64F977CCC70A087C65DB405FEADB9C311A700D06C49A7C10F734831A49BAC5E9EEE9DC98AE9A6A2
3,074,824 UART: Caliptra RT
3,075,075 UART: [state] CFI Enabled
3,195,351 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,890 UART: [kat] HMAC-384Kdf
921,692 UART: [kat] LMS
1,170,004 UART: [kat] --
1,170,907 UART: [cold-reset] ++
1,171,303 UART: [fht] FHT @ 0x50003400
1,173,965 UART: [idev] ++
1,174,133 UART: [idev] CDI.KEYID = 6
1,174,494 UART: [idev] SUBJECT.KEYID = 7
1,174,919 UART: [idev] UDS.KEYID = 0
1,183,084 UART: [idev] Erasing UDS.KEYID = 0
1,201,084 UART: [idev] Sha1 KeyId Algorithm
1,210,798 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,600 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,227,308 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,233,193 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,899 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,247,328 UART: [idev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
1,301,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,301,706 UART: [idev] --
1,302,723 UART: [ldev] ++
1,302,891 UART: [ldev] CDI.KEYID = 6
1,303,255 UART: [ldev] SUBJECT.KEYID = 5
1,303,682 UART: [ldev] AUTHORITY.KEYID = 7
1,304,145 UART: [ldev] FE.KEYID = 1
1,309,591 UART: [ldev] Erasing FE.KEYID = 1
1,336,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,350,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,356,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,362,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,367,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,374,939 UART: [ldev] --
1,376,234 UART: [fwproc] Wait for Commands...
1,377,015 UART: [fwproc] Recv command 0x46574c44
1,377,748 UART: [fwproc] Recv'd Img size: 118548 bytes
2,721,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,901 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,086 >>> mbox cmd response: success
2,920,102 UART: [afmc] ++
2,920,270 UART: [afmc] CDI.KEYID = 6
2,920,633 UART: [afmc] SUBJECT.KEYID = 7
2,921,059 UART: [afmc] AUTHORITY.KEYID = 5
2,956,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,665 UART: [afmc] --
2,999,482 UART: [cold-reset] --
3,000,220 UART: [state] Locking Datavault
3,001,533 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,137 UART: [state] Locking ICCM
3,002,807 UART: [exit] Launching FMC @ 0x40000130
3,008,137 UART:
3,008,153 UART: Running Caliptra FMC ...
3,008,561 UART:
3,008,704 UART: [state] CFI Enabled
3,019,298 UART: [fht] FMC Alias Private Key: 7
3,138,546 UART: [art] Extend RT PCRs Done
3,138,974 UART: [art] Lock RT PCRs Done
3,140,530 UART: [art] Populate DV Done
3,148,817 UART: [fht] FMC Alias Private Key: 7
3,149,873 UART: [art] Derive CDI
3,150,153 UART: [art] Store in slot 0x4
3,236,240 UART: [art] Derive Key Pair
3,236,600 UART: [art] Store priv key in slot 0x5
3,250,096 UART: [art] Derive Key Pair - Done
3,265,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,296 UART: [art] PUB.X = 41C4D91D2A3EA379E3267625011E6B5E01E9C0F43DDFFF24FFADFDEE19F82E0D5C39FBAA121A7DDC792E40CDA9F17929
3,288,081 UART: [art] PUB.Y = AD015250E838A34BB294E2DD6CA0F87C30A3E28A113FE8D3130E601097EB2DB04F4AAAF6B6D70DC8DDAF834DC1FE6E4B
3,295,046 UART: [art] SIG.R = C465A06756A36A50A464F6B0A3273AB384071173240F707261FDC275DAA1023009FB393AEEF2286E7FAC4A2F824ADAE9
3,301,808 UART: [art] SIG.S = D873954DADEACC30164446827D66A3DD583D3D7A56241E5DFA7C461843F69452DA99F6E1B0876C1896062AEDDEAFFA2A
3,325,715 UART: Caliptra RT
3,326,058 UART: [state] CFI Enabled
3,445,634 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,209 >>> mbox cmd response: success
2,760,520 UART:
2,760,536 UART: Running Caliptra FMC ...
2,760,944 UART:
2,761,087 UART: [state] CFI Enabled
2,771,999 UART: [fht] FMC Alias Private Key: 7
2,890,455 UART: [art] Extend RT PCRs Done
2,890,883 UART: [art] Lock RT PCRs Done
2,892,485 UART: [art] Populate DV Done
2,900,544 UART: [fht] FMC Alias Private Key: 7
2,901,538 UART: [art] Derive CDI
2,901,818 UART: [art] Store in slot 0x4
2,987,537 UART: [art] Derive Key Pair
2,987,897 UART: [art] Store priv key in slot 0x5
3,001,011 UART: [art] Derive Key Pair - Done
3,015,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,940 UART: [art] PUB.X = EC841DD009B536D494B1C24AC29CADB1B38F162D084AD883B42C4FA4093DF64894635E95724227C0815FCE59065E64E3
3,038,700 UART: [art] PUB.Y = A59D4EB63555D195E0712A6F7025F2E9F66C7E84C2FD1ABCDDB5AE99042689E7E4E5C7D72FC837A9E2EEF06329176692
3,045,657 UART: [art] SIG.R = E4CFBF1A8F2963885685E789EF11B19E19FDB56541FB5C6B2D5CD9B92D869CD8F8BD49A6D31F372FE0A4972AB8D81752
3,052,441 UART: [art] SIG.S = E6D0BE8E83884AEB88FBE9FC32CB50F6B89C4AC4BC5A20F6290C1E7DA42965A3D5D11A940DCA4B37DE42855597378225
3,076,447 UART: Caliptra RT
3,076,790 UART: [state] CFI Enabled
3,196,322 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_generate_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
Truncated 7229978 bytes from beginning
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
7,970,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,119,565 UART: [idev] --
8,120,204 UART: [ldev] ++
8,120,707 UART: [ldev] CDI.KEYID = 6
8,121,588 UART: [ldev] SUBJECT.KEYID = 5
8,122,616 UART: [ldev] AUTHORITY.KEYID = 7
8,123,804 UART: [ldev] FE.KEYID = 1
8,124,749 UART: [ldev] Erasing FE.KEYID = 1
10,523,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,255,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,271,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,287,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,302,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,325,872 UART: [ldev] --
12,330,826 UART: [fwproc] Wait for Commands...
12,333,216 UART: [fwproc] Recv command 0x46574c44
12,335,266 UART: [fwproc] Recv'd Img size: 118548 bytes
15,819,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,898,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,971,085 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,298,988 >>> mbox cmd response: success
16,302,404 UART: [afmc] ++
16,302,999 UART: [afmc] CDI.KEYID = 6
16,303,976 UART: [afmc] SUBJECT.KEYID = 7
16,305,196 UART: [afmc] AUTHORITY.KEYID = 5
18,849,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,593,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,595,897 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,611,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,627,782 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,643,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,666,876 UART: [afmc] --
20,670,796 UART: [cold-reset] --
20,675,198 UART: [state] Locking Datavault
20,681,525 UART: [state] Locking PCR0, PCR1 and PCR31
20,683,228 UART: [state] Locking ICCM
20,684,354 UART: [exit] Launching FMC @ 0x40000130
20,692,748 UART:
20,693,172 UART: Running Caliptra FMC ...
20,694,302 UART:
20,694,473 UART: [state] CFI Enabled
20,750,299 UART: [fht] FMC Alias Private Key: 7
22,538,369 UART: [art] Extend RT PCRs Done
22,539,633 UART: [art] Lock RT PCRs Done
22,541,451 UART: [art] Populate DV Done
22,546,980 UART: [fht] FMC Alias Private Key: 7
22,548,578 UART: [art] Derive CDI
22,549,420 UART: [art] Store in slot 0x4
22,604,031 UART: [art] Derive Key Pair
22,605,037 UART: [art] Store priv key in slot 0x5
25,067,981 UART: [art] Derive Key Pair - Done
25,081,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,793,116 UART: [art] Erasing AUTHORITY.KEYID = 7
26,794,625 UART: [art] PUB.X = 1DD0E87A8792D9BF1A9A16A1B78FDA1B76A69C494C05619613ADFA9194F8A08A8BFD1E527BE8229124826820CFA07228
26,801,880 UART: [art] PUB.Y = 868CC5B79BB23C03C2454C77117F76AA90447FAA5951E778DC94965F4948667EE17041541EF5ABF507EFECA84C3577BD
26,809,095 UART: [art] SIG.R = A916A490DF3D14B317D46B6276A4810CBB74C1BC0C1D904454C33CEE346D3C13A86A82CA35A7C9CFC0FB2FACFC206E0A
26,816,560 UART: [art] SIG.S = CD39BF36EB2D6EE0A405A6EF7148CC27E4AB9F84C6C823607520C4ED82DB01441ABDF51CA46AE0022017BE137235DC11
27,795,206 UART: Caliptra RT
27,795,921 UART: [state] CFI Enabled
27,975,887 UART: [rt] RT listening for mailbox commands...
28,126,785 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,157,020 UART: [rt]cmd =0x4c444556, len=4
28,168,183 >>> mbox cmd response data (687 bytes)
28,313,721 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,343,390 UART: [rt]cmd =0x43455246, len=4
28,356,114 >>> mbox cmd response data (888 bytes)
28,498,328 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,528,151 UART: [rt]cmd =0x43455252, len=4
28,539,438 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,210 UART:
192,566 UART: Running Caliptra ROM ...
193,736 UART:
193,897 UART: [state] CFI Enabled
262,980 UART: [state] LifecycleState = Unprovisioned
264,945 UART: [state] DebugLocked = No
267,138 UART: [state] WD Timer not started. Device not locked for debugging
271,781 UART: [kat] SHA2-256
451,450 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,216 UART: [kat] ++
462,808 UART: [kat] sha1
474,580 UART: [kat] SHA2-256
477,321 UART: [kat] SHA2-384
483,631 UART: [kat] SHA2-512-ACC
485,971 UART: [kat] ECC-384
2,949,537 UART: [kat] HMAC-384Kdf
2,971,332 UART: [kat] LMS
3,447,841 UART: [kat] --
3,452,616 UART: [cold-reset] ++
3,453,533 UART: [fht] FHT @ 0x50003400
3,464,385 UART: [idev] ++
3,464,951 UART: [idev] CDI.KEYID = 6
3,465,897 UART: [idev] SUBJECT.KEYID = 7
3,467,113 UART: [idev] UDS.KEYID = 0
3,500,432 UART: [idev] Erasing UDS.KEYID = 0
5,985,398 UART: [idev] Sha1 KeyId Algorithm
6,011,135 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,740,055 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,755,869 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,771,882 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,787,445 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,813,514 UART: [idev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
7,968,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,118,265 UART: [idev] --
8,118,905 UART: [ldev] ++
8,119,406 UART: [ldev] CDI.KEYID = 6
8,120,341 UART: [ldev] SUBJECT.KEYID = 5
8,121,371 UART: [ldev] AUTHORITY.KEYID = 7
8,122,469 UART: [ldev] FE.KEYID = 1
8,123,370 UART: [ldev] Erasing FE.KEYID = 1
10,523,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,278,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,294,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,309,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,330,336 UART: [ldev] --
12,335,026 UART: [fwproc] Wait for Commands...
12,338,267 UART: [fwproc] Recv command 0x46574c44
12,340,259 UART: [fwproc] Recv'd Img size: 118548 bytes
15,829,966 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,909,890 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,982,916 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,311,295 >>> mbox cmd response: success
16,315,670 UART: [afmc] ++
16,316,284 UART: [afmc] CDI.KEYID = 6
16,317,239 UART: [afmc] SUBJECT.KEYID = 7
16,318,398 UART: [afmc] AUTHORITY.KEYID = 5
18,853,920 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,580,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,582,500 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,598,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,614,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,629,899 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,654,185 UART: [afmc] --
20,657,793 UART: [cold-reset] --
20,661,168 UART: [state] Locking Datavault
20,666,100 UART: [state] Locking PCR0, PCR1 and PCR31
20,667,852 UART: [state] Locking ICCM
20,669,306 UART: [exit] Launching FMC @ 0x40000130
20,677,705 UART:
20,677,947 UART: Running Caliptra FMC ...
20,679,054 UART:
20,679,246 UART: [state] CFI Enabled
20,736,869 UART: [fht] FMC Alias Private Key: 7
22,523,837 UART: [art] Extend RT PCRs Done
22,525,092 UART: [art] Lock RT PCRs Done
22,526,713 UART: [art] Populate DV Done
22,532,346 UART: [fht] FMC Alias Private Key: 7
22,533,835 UART: [art] Derive CDI
22,534,578 UART: [art] Store in slot 0x4
22,590,434 UART: [art] Derive Key Pair
22,591,481 UART: [art] Store priv key in slot 0x5
25,054,292 UART: [art] Derive Key Pair - Done
25,066,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,780,117 UART: [art] Erasing AUTHORITY.KEYID = 7
26,781,624 UART: [art] PUB.X = 5AFA0B38CE4F93BFD64CC9DE4474FDA680CEDC36B980E10ECF94744B11524AE4BFD5838BED8CA16B37C4F74CF93DABC3
26,788,947 UART: [art] PUB.Y = 11478455B238265A0EC90C43659D7C2EB71796623C95C708AFDEC86BA7020054ECFDCE359E4EA468E9F6E3146527E774
26,796,182 UART: [art] SIG.R = A4889E21BECD376759D7889CBE7D5B7C2D32BEB80B76496F17A5B2757062BF739C1FD2FF34965FAA5225365160C467D8
26,803,554 UART: [art] SIG.S = 85D0B4968B58E67DC74649E4A48FF9DED01682E2AB98BA2CBBD719A9B2E61955D020A6B3CA898AB979F33AC63A939D20
27,782,388 UART: Caliptra RT
27,783,102 UART: [state] CFI Enabled
27,962,966 UART: [rt] RT listening for mailbox commands...
28,113,706 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,143,691 UART: [rt]cmd =0x4c444556, len=4
28,154,896 >>> mbox cmd response data (687 bytes)
28,299,885 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,329,572 UART: [rt]cmd =0x43455246, len=4
28,342,209 >>> mbox cmd response data (888 bytes)
28,484,443 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,514,487 UART: [rt]cmd =0x43455252, len=4
28,525,815 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.80s
Truncated 2433978 bytes from beginning
ng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
7,764,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,011,236 >>> mbox cmd response: success
20,309,519 UART:
20,309,906 UART: Running Caliptra FMC ...
20,311,085 UART:
20,311,262 UART: [state] CFI Enabled
20,374,638 UART: [fht] FMC Alias Private Key: 7
22,162,494 UART: [art] Extend RT PCRs Done
22,163,724 UART: [art] Lock RT PCRs Done
22,165,247 UART: [art] Populate DV Done
22,170,715 UART: [fht] FMC Alias Private Key: 7
22,172,314 UART: [art] Derive CDI
22,173,130 UART: [art] Store in slot 0x4
22,228,672 UART: [art] Derive Key Pair
22,229,716 UART: [art] Store priv key in slot 0x5
24,692,054 UART: [art] Derive Key Pair - Done
24,705,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,417,786 UART: [art] Erasing AUTHORITY.KEYID = 7
26,419,290 UART: [art] PUB.X = 35014BAE590540828A32F60AE8E1A644DC044CFA2999284132BDB08D474A66C6823D19EB47D43F8794AF37F3685B85AD
26,426,560 UART: [art] PUB.Y = 0FC2977F90F45A9BD4D37929D451D9F73E6D5B5BB152EB0A64F8A854895ED425540F349E4704E7F51AFBF1E1D61B369A
26,433,785 UART: [art] SIG.R = A56796032799EF1A7AC7B11B7D6C03A6EA4EC2252124ADE2D57D757376CBE8830DFE9AD56A311D0A6650F66CC1C41889
26,441,153 UART: [art] SIG.S = 4D759BF83FAA36BF57747BC910C054C3D6C6962862491A3D74A855DF48E214F45A7325A7BDFACF8DE2849E6FC3184A01
27,419,985 UART: Caliptra RT
27,420,713 UART: [state] CFI Enabled
27,602,540 UART: [rt] RT listening for mailbox commands...
27,752,374 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,782,512 UART: [rt]cmd =0x4c444556, len=4
27,793,604 >>> mbox cmd response data (687 bytes)
27,938,505 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,968,631 UART: [rt]cmd =0x43455246, len=4
27,981,432 >>> mbox cmd response data (888 bytes)
28,123,694 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,153,671 UART: [rt]cmd =0x43455252, len=4
28,165,055 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
7,745,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,999,751 >>> mbox cmd response: success
20,282,222 UART:
20,282,639 UART: Running Caliptra FMC ...
20,283,796 UART:
20,283,964 UART: [state] CFI Enabled
20,351,965 UART: [fht] FMC Alias Private Key: 7
22,118,432 UART: [art] Extend RT PCRs Done
22,119,670 UART: [art] Lock RT PCRs Done
22,121,680 UART: [art] Populate DV Done
22,127,193 UART: [fht] FMC Alias Private Key: 7
22,128,742 UART: [art] Derive CDI
22,129,560 UART: [art] Store in slot 0x4
22,185,215 UART: [art] Derive Key Pair
22,186,260 UART: [art] Store priv key in slot 0x5
24,649,631 UART: [art] Derive Key Pair - Done
24,662,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,174 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,681 UART: [art] PUB.X = 3AB5CFD6234A5AF51A97E1DEFBD967696373BEF62969C921750B6E3FC6A4F42B84B69D1D307A90A563AB7E56184F737B
26,383,905 UART: [art] PUB.Y = 1C436E45A3F01E28F3A47220294B68FC080E0C08411721B5CB2EF712A2E9C933A42C81CEDEE5A660F33A7F8FE703DC87
26,391,221 UART: [art] SIG.R = 2CFD6557CF07BC7B6042C76F1573B3BA491BF296B0F588FB2B259240B0AAF3520A58044D75A1710E7FA0823D71855DA1
26,398,599 UART: [art] SIG.S = B8535D409D25373FC3D65D08BB111E8CD404C81B1924C0270C0A660CF8879852BB8686BCAC69E06FD93554A02123BB8B
27,377,800 UART: Caliptra RT
27,378,526 UART: [state] CFI Enabled
27,558,349 UART: [rt] RT listening for mailbox commands...
27,708,278 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,738,221 UART: [rt]cmd =0x4c444556, len=4
27,749,225 >>> mbox cmd response data (687 bytes)
27,894,492 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,266 UART: [rt]cmd =0x43455246, len=4
27,937,009 >>> mbox cmd response data (888 bytes)
28,079,408 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,109,092 UART: [rt]cmd =0x43455252, len=4
28,120,504 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
7,744,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,971,820 >>> mbox cmd response: success
20,285,883 UART:
20,286,305 UART: Running Caliptra FMC ...
20,287,468 UART:
20,287,642 UART: [state] CFI Enabled
20,353,163 UART: [fht] FMC Alias Private Key: 7
22,119,031 UART: [art] Extend RT PCRs Done
22,120,264 UART: [art] Lock RT PCRs Done
22,122,006 UART: [art] Populate DV Done
22,127,362 UART: [fht] FMC Alias Private Key: 7
22,128,912 UART: [art] Derive CDI
22,129,850 UART: [art] Store in slot 0x4
22,185,757 UART: [art] Derive Key Pair
22,186,771 UART: [art] Store priv key in slot 0x5
24,649,448 UART: [art] Derive Key Pair - Done
24,662,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,374,918 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,440 UART: [art] PUB.X = BCE037C678F91FA63D740F004C7225FD816E25B2C94E94C112954D9834C885872828D73E0F66F1032F113182BB597350
26,383,672 UART: [art] PUB.Y = 64A1B0118FF5272F854B55D278818264E6C6F69A64350613C163E42A08607A9210B635F7EBED81C626D39F6A38786047
26,390,877 UART: [art] SIG.R = A21DF4B6EC28AF14E84C967048E72DE0B868D431458AF711B72B70C14C0290F5D83A868FC380A9769F80A979DDB731E0
26,398,253 UART: [art] SIG.S = F0185FD830EB20001548AF94BD17288A76A94A6A89C6091DAE02A58AE2B4B498F7129E043ABA57102A3E9EDCF980D0A9
27,376,947 UART: Caliptra RT
27,377,640 UART: [state] CFI Enabled
27,556,906 UART: [rt] RT listening for mailbox commands...
27,706,721 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,737,140 UART: [rt]cmd =0x4c444556, len=4
27,748,306 >>> mbox cmd response data (687 bytes)
27,894,239 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,924,223 UART: [rt]cmd =0x43455246, len=4
27,936,832 >>> mbox cmd response data (888 bytes)
28,078,965 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,108,844 UART: [rt]cmd =0x43455252, len=4
28,120,278 >>> mbox cmd response data (784 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
7,742,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,979,518 >>> mbox cmd response: success
20,265,833 UART:
20,266,228 UART: Running Caliptra FMC ...
20,267,359 UART:
20,267,519 UART: [state] CFI Enabled
20,332,562 UART: [fht] FMC Alias Private Key: 7
22,098,299 UART: [art] Extend RT PCRs Done
22,099,515 UART: [art] Lock RT PCRs Done
22,101,305 UART: [art] Populate DV Done
22,106,983 UART: [fht] FMC Alias Private Key: 7
22,108,578 UART: [art] Derive CDI
22,109,331 UART: [art] Store in slot 0x4
22,165,835 UART: [art] Derive Key Pair
22,166,841 UART: [art] Store priv key in slot 0x5
24,629,525 UART: [art] Derive Key Pair - Done
24,642,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,355,883 UART: [art] Erasing AUTHORITY.KEYID = 7
26,357,401 UART: [art] PUB.X = 204F14B90C8DFA0D7F7E83A1DF9C929A5AA6CD16C2CF9175390B07D3BFC295AC1B1D902BD0D777C6E27B4E7D79EF9049
26,364,682 UART: [art] PUB.Y = 085F5D2A074E399A44F86C63C08E241DB7EEB6A1D1E7635D0F8BE25F24E6E43BEE37150EFF7559F4F5CE2DFF463E3B42
26,371,949 UART: [art] SIG.R = 95E077633FB73FAE30875AB1AD356F4A8B54DA02EDED97D431D36BDBCA14726AB8CFA275FE87304FB380F53F8684ADAC
26,379,374 UART: [art] SIG.S = 5B3C7DD82268E681AAFD494022875C35CD3CB8C416F3E4D10748620B5128F09573575B0036D457B78D6A6898A4FD1691
27,358,043 UART: Caliptra RT
27,358,779 UART: [state] CFI Enabled
27,539,707 UART: [rt] RT listening for mailbox commands...
27,689,626 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,719,643 UART: [rt]cmd =0x4c444556, len=4
27,730,894 >>> mbox cmd response data (687 bytes)
27,876,317 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,906,352 UART: [rt]cmd =0x43455246, len=4
27,919,015 >>> mbox cmd response data (888 bytes)
28,061,801 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,091,866 UART: [rt]cmd =0x43455252, len=4
28,103,182 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
7,743,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,972,950 >>> mbox cmd response: success
20,261,252 UART:
20,261,645 UART: Running Caliptra FMC ...
20,262,844 UART:
20,263,040 UART: [state] CFI Enabled
20,330,617 UART: [fht] FMC Alias Private Key: 7
22,096,993 UART: [art] Extend RT PCRs Done
22,098,224 UART: [art] Lock RT PCRs Done
22,099,702 UART: [art] Populate DV Done
22,104,847 UART: [fht] FMC Alias Private Key: 7
22,106,446 UART: [art] Derive CDI
22,107,271 UART: [art] Store in slot 0x4
22,163,743 UART: [art] Derive Key Pair
22,164,785 UART: [art] Store priv key in slot 0x5
24,627,405 UART: [art] Derive Key Pair - Done
24,640,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,353,728 UART: [art] Erasing AUTHORITY.KEYID = 7
26,355,246 UART: [art] PUB.X = 33D60F85BC77F9482FD88C32173BA3B40E763D17DF5467C3D2B3D68C4F067A1886F329FF8F43E49BDF4FAFA931319829
26,362,516 UART: [art] PUB.Y = 28848712BE858E991A59CFA7D828D8368AF82D39287911F85615D9C1C0A3F129FBD67E39CCBA6FA68AF112D42A0604B3
26,369,722 UART: [art] SIG.R = 07F620F8D504693F403465B736DCCAEF8506A255C89DE2AC4B149B1B5D85397C9F5F3A7C657166C29B31EC88C4B09CC4
26,377,170 UART: [art] SIG.S = CEC7D66C304758848F8CB2B55CF5FF605ED3049F5916F7BDF5C3E7EC120F68CBAE61EEE318A099EAA34F140A5377F073
27,356,087 UART: Caliptra RT
27,356,804 UART: [state] CFI Enabled
27,537,303 UART: [rt] RT listening for mailbox commands...
27,687,258 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,717,126 UART: [rt]cmd =0x4c444556, len=4
27,728,147 >>> mbox cmd response data (687 bytes)
27,873,752 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,903,682 UART: [rt]cmd =0x43455246, len=4
27,916,484 >>> mbox cmd response data (888 bytes)
28,058,680 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,088,519 UART: [rt]cmd =0x43455252, len=4
28,099,877 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.84s
Truncated 7229978 bytes from beginning
0344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,235,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,383,968 UART: [idev] --
8,384,599 UART: [ldev] ++
8,385,137 UART: [ldev] CDI.KEYID = 6
8,386,039 UART: [ldev] SUBJECT.KEYID = 5
8,387,062 UART: [ldev] AUTHORITY.KEYID = 7
8,388,247 UART: [ldev] FE.KEYID = 1
8,389,169 UART: [ldev] Erasing FE.KEYID = 1
10,739,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,460,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,476,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,492,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,507,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,529,462 UART: [ldev] --
12,534,722 UART: [fwproc] Wait for Commands...
12,536,436 UART: [fwproc] Recv command 0x46574c44
12,538,425 UART: [fwproc] Recv'd Img size: 118548 bytes
16,022,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,099,996 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,173,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,501,272 >>> mbox cmd response: success
16,506,149 UART: [afmc] ++
16,506,735 UART: [afmc] CDI.KEYID = 6
16,507,672 UART: [afmc] SUBJECT.KEYID = 7
16,508,940 UART: [afmc] AUTHORITY.KEYID = 5
19,010,282 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,733,674 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,735,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,751,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,767,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,783,348 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,808,863 UART: [afmc] --
20,811,983 UART: [cold-reset] --
20,815,794 UART: [state] Locking Datavault
20,822,285 UART: [state] Locking PCR0, PCR1 and PCR31
20,824,036 UART: [state] Locking ICCM
20,826,351 UART: [exit] Launching FMC @ 0x40000130
20,834,750 UART:
20,834,994 UART: Running Caliptra FMC ...
20,836,099 UART:
20,836,260 UART: [state] CFI Enabled
20,844,358 UART: [fht] FMC Alias Private Key: 7
22,610,449 UART: [art] Extend RT PCRs Done
22,611,694 UART: [art] Lock RT PCRs Done
22,613,480 UART: [art] Populate DV Done
22,619,004 UART: [fht] FMC Alias Private Key: 7
22,620,603 UART: [art] Derive CDI
22,621,339 UART: [art] Store in slot 0x4
22,664,016 UART: [art] Derive Key Pair
22,665,066 UART: [art] Store priv key in slot 0x5
25,092,027 UART: [art] Derive Key Pair - Done
25,104,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,811,533 UART: [art] Erasing AUTHORITY.KEYID = 7
26,813,040 UART: [art] PUB.X = C52555A19DAD095C19E0D9E71EB3D7163D166E3C7A5A4A7AD01F8E74A8C77F2F2840E7AE3E9C68428DC00429BA4ACE8C
26,820,332 UART: [art] PUB.Y = FB6C003DF8312B6A06A1E0207EFE2C5051EEC069DCB03C1AE5A1551115CC9204AA82D8117163842B4289C8820F97FF60
26,827,604 UART: [art] SIG.R = 8A52F8EB10D7F95254AB5D49041579DCC38967ECD74563D9E333C7A6309575F8A95156EA4070A9279C1E8D380F11D3F8
26,834,939 UART: [art] SIG.S = 4064C9898956165C8AC6410B8AA1D68893D930315FC0DE896198DD68D540EC6F2DF1039A9E638AE7EEECC1915CDE779F
27,813,434 UART: Caliptra RT
27,814,132 UART: [state] CFI Enabled
27,947,900 UART: [rt] RT listening for mailbox commands...
28,098,271 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,128,249 UART: [rt]cmd =0x4c444556, len=4
28,139,201 >>> mbox cmd response data (687 bytes)
28,284,136 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,313,948 UART: [rt]cmd =0x43455246, len=4
28,326,525 >>> mbox cmd response data (888 bytes)
28,468,129 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,497,982 UART: [rt]cmd =0x43455252, len=4
28,509,279 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,436 UART:
192,814 UART: Running Caliptra ROM ...
193,914 UART:
603,618 UART: [state] CFI Enabled
615,227 UART: [state] LifecycleState = Unprovisioned
617,136 UART: [state] DebugLocked = No
619,268 UART: [state] WD Timer not started. Device not locked for debugging
622,827 UART: [kat] SHA2-256
802,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,289 UART: [kat] ++
813,737 UART: [kat] sha1
824,766 UART: [kat] SHA2-256
827,454 UART: [kat] SHA2-384
833,431 UART: [kat] SHA2-512-ACC
835,767 UART: [kat] ECC-384
3,278,684 UART: [kat] HMAC-384Kdf
3,291,613 UART: [kat] LMS
3,768,124 UART: [kat] --
3,771,681 UART: [cold-reset] ++
3,774,093 UART: [fht] FHT @ 0x50003400
3,784,122 UART: [idev] ++
3,784,745 UART: [idev] CDI.KEYID = 6
3,785,656 UART: [idev] SUBJECT.KEYID = 7
3,786,923 UART: [idev] UDS.KEYID = 0
3,805,920 UART: [idev] Erasing UDS.KEYID = 0
6,267,591 UART: [idev] Sha1 KeyId Algorithm
6,293,241 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,013,157 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,029,012 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,044,966 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,060,611 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,086,631 UART: [idev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
8,242,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,391,065 UART: [idev] --
8,391,701 UART: [ldev] ++
8,392,196 UART: [ldev] CDI.KEYID = 6
8,393,116 UART: [ldev] SUBJECT.KEYID = 5
8,394,134 UART: [ldev] AUTHORITY.KEYID = 7
8,395,218 UART: [ldev] FE.KEYID = 1
8,396,136 UART: [ldev] Erasing FE.KEYID = 1
10,737,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,457,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,473,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,489,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,504,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,526,079 UART: [ldev] --
12,531,755 UART: [fwproc] Wait for Commands...
12,533,538 UART: [fwproc] Recv command 0x46574c44
12,535,534 UART: [fwproc] Recv'd Img size: 118548 bytes
16,020,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,099,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,172,603 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,501,484 >>> mbox cmd response: success
16,505,068 UART: [afmc] ++
16,505,663 UART: [afmc] CDI.KEYID = 6
16,506,539 UART: [afmc] SUBJECT.KEYID = 7
16,507,809 UART: [afmc] AUTHORITY.KEYID = 5
19,015,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,735,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,737,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,753,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,769,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,784,829 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,809,605 UART: [afmc] --
20,813,406 UART: [cold-reset] --
20,819,640 UART: [state] Locking Datavault
20,824,780 UART: [state] Locking PCR0, PCR1 and PCR31
20,826,531 UART: [state] Locking ICCM
20,828,755 UART: [exit] Launching FMC @ 0x40000130
20,837,153 UART:
20,837,389 UART: Running Caliptra FMC ...
20,838,493 UART:
20,838,649 UART: [state] CFI Enabled
20,846,592 UART: [fht] FMC Alias Private Key: 7
22,612,655 UART: [art] Extend RT PCRs Done
22,613,876 UART: [art] Lock RT PCRs Done
22,615,506 UART: [art] Populate DV Done
22,620,916 UART: [fht] FMC Alias Private Key: 7
22,622,561 UART: [art] Derive CDI
22,623,377 UART: [art] Store in slot 0x4
22,665,980 UART: [art] Derive Key Pair
22,666,976 UART: [art] Store priv key in slot 0x5
25,094,013 UART: [art] Derive Key Pair - Done
25,106,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,813,101 UART: [art] Erasing AUTHORITY.KEYID = 7
26,814,614 UART: [art] PUB.X = 6806178E064527739EC2E60C9288DA1CBA9CD944F1649883498E3E595095E953381DE21A5871C092A9080234F3DC0571
26,821,852 UART: [art] PUB.Y = 33B30A82542F28BCFDE8F69E0A39B26DA4584848E44DC854227549790F530B59ABA138E59264349ECA336920BA58F972
26,829,062 UART: [art] SIG.R = A9CA8C45A49D3550CF2F03C12B8628C0E71A446C5B15ED1F1BC755AE39792B22FD6EAA6A1310EDB95828210E530846D3
26,836,462 UART: [art] SIG.S = AC6A0C4D4ACF170A3E8BAA4DAB4DD3FEB5EE381B1E00E7B42F02620B2FD474197CA1C4B661A1D311D86EEAC71C5F1DDC
27,815,243 UART: Caliptra RT
27,815,932 UART: [state] CFI Enabled
27,949,030 UART: [rt] RT listening for mailbox commands...
28,099,503 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
28,129,634 UART: [rt]cmd =0x4c444556, len=4
28,140,732 >>> mbox cmd response data (687 bytes)
28,287,027 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
28,316,967 UART: [rt]cmd =0x43455246, len=4
28,329,569 >>> mbox cmd response data (888 bytes)
28,472,362 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,502,355 UART: [rt]cmd =0x43455252, len=4
28,513,618 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1541.37s
Truncated 2433978 bytes from beginning
ng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
8,021,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,186,542 >>> mbox cmd response: success
20,432,730 UART:
20,433,105 UART: Running Caliptra FMC ...
20,434,238 UART:
20,434,395 UART: [state] CFI Enabled
20,442,382 UART: [fht] FMC Alias Private Key: 7
22,209,133 UART: [art] Extend RT PCRs Done
22,210,346 UART: [art] Lock RT PCRs Done
22,212,181 UART: [art] Populate DV Done
22,217,578 UART: [fht] FMC Alias Private Key: 7
22,219,124 UART: [art] Derive CDI
22,219,909 UART: [art] Store in slot 0x4
22,262,404 UART: [art] Derive Key Pair
22,263,443 UART: [art] Store priv key in slot 0x5
24,690,100 UART: [art] Derive Key Pair - Done
24,703,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,409,233 UART: [art] Erasing AUTHORITY.KEYID = 7
26,410,725 UART: [art] PUB.X = 6DDD0F80B9DC4257EF913C1DEAD539818241222B7C59B31087279FBE9FE760EA5E3D017166A2055F2AC4D6A926175785
26,418,034 UART: [art] PUB.Y = D89A47545BB744D5103AEA998BC2E9424D41CA51DD518829B65BCE69B77C6B4459800A16D4E101C62C4F17A7B3A571E9
26,425,273 UART: [art] SIG.R = F88485F3A27953A3E09CC7786E5566D4977C0B8D473D19CD3B86347650C915CD9EE5B5738424148025B18C24CE6D8BFC
26,432,617 UART: [art] SIG.S = 09118264EF8A70E9E90705BE56F9DF1F34FFC767570D77A5E53D32F761ED5AE91162B616F0C05E2A83D44A92DD79692E
27,411,590 UART: Caliptra RT
27,412,295 UART: [state] CFI Enabled
27,543,951 UART: [rt] RT listening for mailbox commands...
27,693,291 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,723,093 UART: [rt]cmd =0x4c444556, len=4
27,734,395 >>> mbox cmd response data (687 bytes)
27,879,566 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,909,470 UART: [rt]cmd =0x43455246, len=4
27,922,057 >>> mbox cmd response data (888 bytes)
28,064,467 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,094,281 UART: [rt]cmd =0x43455252, len=4
28,105,789 >>> mbox cmd response data (783 bytes)
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
8,022,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,199,783 >>> mbox cmd response: success
20,450,638 UART:
20,451,048 UART: Running Caliptra FMC ...
20,452,202 UART:
20,452,360 UART: [state] CFI Enabled
20,460,334 UART: [fht] FMC Alias Private Key: 7
22,226,368 UART: [art] Extend RT PCRs Done
22,227,611 UART: [art] Lock RT PCRs Done
22,229,078 UART: [art] Populate DV Done
22,234,711 UART: [fht] FMC Alias Private Key: 7
22,236,306 UART: [art] Derive CDI
22,237,122 UART: [art] Store in slot 0x4
22,279,771 UART: [art] Derive Key Pair
22,280,776 UART: [art] Store priv key in slot 0x5
24,707,884 UART: [art] Derive Key Pair - Done
24,720,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,426,857 UART: [art] Erasing AUTHORITY.KEYID = 7
26,428,364 UART: [art] PUB.X = 416ABED3DC16472E5C89B5BF8EAB89FAA7020304CFC2DFC57A3CC1605EB94765C28CD9DC5029981D447EF39CEC44CCCB
26,435,673 UART: [art] PUB.Y = 77810BE925955B766030947579613A92E3DE7689758EB9845203BEAFBD5C6A5050C1D524E862E2865E1BB0AEB66627AC
26,442,921 UART: [art] SIG.R = DFF88A1CDFFC3D243A0BC8677D05A7D41A0A9D3195BB0F5140CA31DB121170E69E4F0BECABA791B08387934E630D067E
26,450,334 UART: [art] SIG.S = 7B194EAD5F9E915CC797BCDA935D8D9E0F38FB50129E4B791BBFA8EFBFF62582BDEF3B0E72650318F969EB8796C382B3
27,429,402 UART: Caliptra RT
27,430,118 UART: [state] CFI Enabled
27,563,587 UART: [rt] RT listening for mailbox commands...
27,713,025 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,743,122 UART: [rt]cmd =0x4c444556, len=4
27,754,262 >>> mbox cmd response data (687 bytes)
27,899,729 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,929,442 UART: [rt]cmd =0x43455246, len=4
27,942,266 >>> mbox cmd response data (888 bytes)
28,084,674 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,114,439 UART: [rt]cmd =0x43455252, len=4
28,125,830 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
8,021,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,184,576 >>> mbox cmd response: success
20,437,039 UART:
20,437,426 UART: Running Caliptra FMC ...
20,438,640 UART:
20,438,808 UART: [state] CFI Enabled
20,446,747 UART: [fht] FMC Alias Private Key: 7
22,212,279 UART: [art] Extend RT PCRs Done
22,213,499 UART: [art] Lock RT PCRs Done
22,214,854 UART: [art] Populate DV Done
22,220,172 UART: [fht] FMC Alias Private Key: 7
22,221,823 UART: [art] Derive CDI
22,222,637 UART: [art] Store in slot 0x4
22,265,131 UART: [art] Derive Key Pair
22,266,174 UART: [art] Store priv key in slot 0x5
24,692,850 UART: [art] Derive Key Pair - Done
24,706,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,412,542 UART: [art] Erasing AUTHORITY.KEYID = 7
26,414,045 UART: [art] PUB.X = 1BDCBAA5415A1DE935E8AA6B1319327F12BDD9C786C417DEFAA5BCC5A8FCD3518A54B408D82075FE6CA06A3649F00F34
26,421,337 UART: [art] PUB.Y = 7C6FBE74F0DF54EA2C4D2B252294822025AB60C1005A6C90579D2F7007AE9C201539256F054B89154EC85920DEE1CC7A
26,428,544 UART: [art] SIG.R = A857D4AFE98F8CC99C600DE70D267E673B0F6FD4612D2A61C56349146158A8DFCBCDFF37CEBD522AB049544B6A9241F0
26,435,954 UART: [art] SIG.S = 21F1CD9B9AE18EDBE2CBE71E8EBD7C8B1E984217167BC02E6C7CCE839054D81AC8574A16C2FFC6EF7E487C2BBBC17D3E
27,414,412 UART: Caliptra RT
27,415,111 UART: [state] CFI Enabled
27,548,057 UART: [rt] RT listening for mailbox commands...
27,697,383 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,727,500 UART: [rt]cmd =0x4c444556, len=4
27,738,724 >>> mbox cmd response data (687 bytes)
27,884,063 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,914,274 UART: [rt]cmd =0x43455246, len=4
27,927,038 >>> mbox cmd response data (888 bytes)
28,070,008 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,099,880 UART: [rt]cmd =0x43455252, len=4
28,111,189 >>> mbox cmd response data (783 bytes)
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
8,019,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,202,053 >>> mbox cmd response: success
20,461,894 UART:
20,462,752 UART: Running Caliptra FMC ...
20,463,899 UART:
20,464,060 UART: [state] CFI Enabled
20,472,229 UART: [fht] FMC Alias Private Key: 7
22,238,319 UART: [art] Extend RT PCRs Done
22,239,542 UART: [art] Lock RT PCRs Done
22,240,895 UART: [art] Populate DV Done
22,246,470 UART: [fht] FMC Alias Private Key: 7
22,248,007 UART: [art] Derive CDI
22,248,748 UART: [art] Store in slot 0x4
22,291,547 UART: [art] Derive Key Pair
22,292,544 UART: [art] Store priv key in slot 0x5
24,719,170 UART: [art] Derive Key Pair - Done
24,732,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,438,846 UART: [art] Erasing AUTHORITY.KEYID = 7
26,440,361 UART: [art] PUB.X = F665F3C5EC571B238B33F3BF1012CF20AA9426DE01E1056B5ACFE7DAEDEE5186469C7656B1CF47F880D6C1BAAD15DFDC
26,447,621 UART: [art] PUB.Y = AF3E8D7BEDD5ED479475C808125E9BAF2327ED52AF79CDC67EA55B285618CEFE8B07ADA37E956CB3AC455308AAF86E62
26,454,926 UART: [art] SIG.R = C192A0BD89273F59C4B1EDA077320B5576EC055DAF065A735C0C29AC85640EA268304FE4994CEA6672AC0498E5256A75
26,462,532 UART: [art] SIG.S = 6EC02EED901A7966CD1951411BDAA9C024B962A58725E3BB025CD67701756FD3C149B0807764BC684340AFD86E669C0C
27,441,626 UART: Caliptra RT
27,442,334 UART: [state] CFI Enabled
27,575,378 UART: [rt] RT listening for mailbox commands...
27,725,120 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,755,368 UART: [rt]cmd =0x4c444556, len=4
27,766,672 >>> mbox cmd response data (687 bytes)
27,911,611 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,941,540 UART: [rt]cmd =0x43455246, len=4
27,954,114 >>> mbox cmd response data (888 bytes)
28,096,831 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,126,712 UART: [rt]cmd =0x43455252, len=4
28,137,957 >>> mbox cmd response data (783 bytes)
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
8,013,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,191,219 >>> mbox cmd response: success
20,443,059 UART:
20,443,446 UART: Running Caliptra FMC ...
20,444,549 UART:
20,444,697 UART: [state] CFI Enabled
20,452,862 UART: [fht] FMC Alias Private Key: 7
22,218,101 UART: [art] Extend RT PCRs Done
22,219,316 UART: [art] Lock RT PCRs Done
22,221,123 UART: [art] Populate DV Done
22,226,389 UART: [fht] FMC Alias Private Key: 7
22,227,954 UART: [art] Derive CDI
22,228,692 UART: [art] Store in slot 0x4
22,271,775 UART: [art] Derive Key Pair
22,272,819 UART: [art] Store priv key in slot 0x5
24,699,757 UART: [art] Derive Key Pair - Done
24,712,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,418,922 UART: [art] Erasing AUTHORITY.KEYID = 7
26,420,433 UART: [art] PUB.X = 58254C3747427E8F747F1DB04156CD32EBDB2F8DFCB47834DA48456102DA5F3DC363965E8B1C55F5B80E2A63B3C0A780
26,427,688 UART: [art] PUB.Y = 53B72AA15E4FBCBB7E7BA2DA96A7C5DAF3C34EC81B793ACFA5B3288C8A7A4A47B54F4C83EDD64FFC8A2E230D607BF912
26,434,988 UART: [art] SIG.R = 7B305E682D02001EF8B922430881A6E86BC72A0F72B3F4CEEDAD012DF5C4357498D13FB43A6F201123E24D69EC0317DD
26,442,351 UART: [art] SIG.S = C1F4CA2A603C1F1747CEFEDE3DDE0A26ADB2FE0B250E52EFEA48D20F511752CA91B7417F5FDDFE9C5AE0E3768F264767
27,421,178 UART: Caliptra RT
27,421,869 UART: [state] CFI Enabled
27,554,740 UART: [rt] RT listening for mailbox commands...
27,704,335 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
27,734,513 UART: [rt]cmd =0x4c444556, len=4
27,745,681 >>> mbox cmd response data (687 bytes)
27,891,516 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,921,562 UART: [rt]cmd =0x43455246, len=4
27,934,311 >>> mbox cmd response data (888 bytes)
28,076,644 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
28,106,822 UART: [rt]cmd =0x43455252, len=4
28,118,193 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1521.45s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,771 UART: [idev] --
1,300,794 UART: [ldev] ++
1,300,962 UART: [ldev] CDI.KEYID = 6
1,301,326 UART: [ldev] SUBJECT.KEYID = 5
1,301,753 UART: [ldev] AUTHORITY.KEYID = 7
1,302,216 UART: [ldev] FE.KEYID = 1
1,307,374 UART: [ldev] Erasing FE.KEYID = 1
1,333,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,754 UART: [ldev] --
1,372,967 UART: [fwproc] Wait for Commands...
1,373,548 UART: [fwproc] Recv command 0x46574c44
1,374,281 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,216 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,213 >>> mbox cmd response: success
2,918,261 UART: [afmc] ++
2,918,429 UART: [afmc] CDI.KEYID = 6
2,918,792 UART: [afmc] SUBJECT.KEYID = 7
2,919,218 UART: [afmc] AUTHORITY.KEYID = 5
2,955,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,891 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,772 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,244 UART: [afmc] --
2,998,173 UART: [cold-reset] --
2,999,031 UART: [state] Locking Datavault
3,000,368 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,972 UART: [state] Locking ICCM
3,001,512 UART: [exit] Launching FMC @ 0x40000130
3,006,842 UART:
3,006,858 UART: Running Caliptra FMC ...
3,007,266 UART:
3,007,320 UART: [state] CFI Enabled
3,018,020 UART: [fht] FMC Alias Private Key: 7
3,137,658 UART: [art] Extend RT PCRs Done
3,138,086 UART: [art] Lock RT PCRs Done
3,139,464 UART: [art] Populate DV Done
3,147,691 UART: [fht] FMC Alias Private Key: 7
3,148,851 UART: [art] Derive CDI
3,149,131 UART: [art] Store in slot 0x4
3,235,003 UART: [art] Derive Key Pair
3,235,363 UART: [art] Store priv key in slot 0x5
3,248,514 UART: [art] Derive Key Pair - Done
3,263,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,278,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,279,688 UART: [art] PUB.X = FE58FCE0923ABE5C1E4CDFA38E7AEB71876679464C81EDA2CCFCE4DA874DFE9C207472530261F18546EFB3317A688C16
3,286,471 UART: [art] PUB.Y = 738D20BF530AB358C4988ACA30B1992335BB4C86A3EBB47F00D66928C43E34816198A2A730E46744CA651DD961FE5E50
3,293,396 UART: [art] SIG.R = BCE41318A2AEA63F95E3D541E90FD354861008FC484AA2A1A8F8F5FE6B29934AC1C3E45D7F5C90D9800AF748120F130F
3,300,161 UART: [art] SIG.S = E38E1A2B40D533AA9BCE05B43C58B148E759298018A20EE9297B90F720599BD0669369C5CAD9A83B655F64E89CFB22B0
3,324,143 UART: Caliptra RT
3,324,394 UART: [state] CFI Enabled
3,443,390 UART: [rt] RT listening for mailbox commands...
3,444,060 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,776 UART: [rt]cmd =0x4c444556, len=4
3,484,272 >>> mbox cmd response data (687 bytes)
3,484,273 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,490 UART: [rt]cmd =0x43455246, len=4
3,525,681 >>> mbox cmd response data (888 bytes)
3,525,682 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,161 UART: [rt]cmd =0x43455252, len=4
3,565,877 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,478 UART: [kat] SHA2-256
901,418 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,657 UART: [kat] HMAC-384Kdf
920,383 UART: [kat] LMS
1,168,695 UART: [kat] --
1,169,430 UART: [cold-reset] ++
1,169,872 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,208,909 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,539 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,247 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,132 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,838 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,267 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,645 UART: [idev] --
1,300,558 UART: [ldev] ++
1,300,726 UART: [ldev] CDI.KEYID = 6
1,301,090 UART: [ldev] SUBJECT.KEYID = 5
1,301,517 UART: [ldev] AUTHORITY.KEYID = 7
1,301,980 UART: [ldev] FE.KEYID = 1
1,307,152 UART: [ldev] Erasing FE.KEYID = 1
1,333,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,184 UART: [ldev] --
1,372,429 UART: [fwproc] Wait for Commands...
1,373,014 UART: [fwproc] Recv command 0x46574c44
1,373,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,109 >>> mbox cmd response: success
2,918,293 UART: [afmc] ++
2,918,461 UART: [afmc] CDI.KEYID = 6
2,918,824 UART: [afmc] SUBJECT.KEYID = 7
2,919,250 UART: [afmc] AUTHORITY.KEYID = 5
2,955,033 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,284 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,033 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,624 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,325 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,044 UART: [afmc] --
2,998,089 UART: [cold-reset] --
2,999,029 UART: [state] Locking Datavault
3,000,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,652 UART: [state] Locking ICCM
3,001,128 UART: [exit] Launching FMC @ 0x40000130
3,006,458 UART:
3,006,474 UART: Running Caliptra FMC ...
3,006,882 UART:
3,006,936 UART: [state] CFI Enabled
3,017,328 UART: [fht] FMC Alias Private Key: 7
3,136,594 UART: [art] Extend RT PCRs Done
3,137,022 UART: [art] Lock RT PCRs Done
3,138,682 UART: [art] Populate DV Done
3,146,859 UART: [fht] FMC Alias Private Key: 7
3,147,941 UART: [art] Derive CDI
3,148,221 UART: [art] Store in slot 0x4
3,234,205 UART: [art] Derive Key Pair
3,234,565 UART: [art] Store priv key in slot 0x5
3,247,438 UART: [art] Derive Key Pair - Done
3,261,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,885 UART: [art] PUB.X = 585D778580ACA6500A6A702132CA948953BB7A4F90339132A391142F1CA69182DDFB587E50E5920072EAF3AB5CB28CF3
3,284,630 UART: [art] PUB.Y = 54BB6C7DCF83E965E25230E8238C31002F5D167CE265AF3FF6D706B0E7D97B3E90C3D74F03A447806AA6F5CD295382FF
3,291,560 UART: [art] SIG.R = B80B94FD3F8763354F42058001CAAAB3FE45E89F8B72593C38EB1414A137E50F1F7D07A28CC1CBC6FB05E9A156B8061D
3,298,319 UART: [art] SIG.S = E1B2C69B25C13B401A8161896BCF47EFB65B661E65B8EC0470D7A3B30BE7CFEA238CFD0EB877A721CCF2C9E3463161F5
3,321,802 UART: Caliptra RT
3,322,053 UART: [state] CFI Enabled
3,441,681 UART: [rt] RT listening for mailbox commands...
3,442,351 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,063 UART: [rt]cmd =0x4c444556, len=4
3,482,451 >>> mbox cmd response data (687 bytes)
3,482,452 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,707 UART: [rt]cmd =0x43455246, len=4
3,523,604 >>> mbox cmd response data (888 bytes)
3,523,605 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,918 UART: [rt]cmd =0x43455252, len=4
3,563,762 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1066.24s
Truncated 2533978 bytes from beginning
2,759,005 UART: Running Caliptra FMC ...
2,759,413 UART:
2,759,467 UART: [state] CFI Enabled
2,770,091 UART: [fht] FMC Alias Private Key: 7
2,888,657 UART: [art] Extend RT PCRs Done
2,889,085 UART: [art] Lock RT PCRs Done
2,890,599 UART: [art] Populate DV Done
2,898,638 UART: [fht] FMC Alias Private Key: 7
2,899,656 UART: [art] Derive CDI
2,899,936 UART: [art] Store in slot 0x4
2,985,760 UART: [art] Derive Key Pair
2,986,120 UART: [art] Store priv key in slot 0x5
2,999,291 UART: [art] Derive Key Pair - Done
3,013,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,369 UART: [art] PUB.X = AE0C31782B878759853727792A70AE7A2F04D5AD26D2E7ED2B26A987293AF3C3210E26D3AC89BB33346D06E86760E47F
3,037,127 UART: [art] PUB.Y = B4A6E2726D9912C1F9E50FDD7A559F64988E2BBA72F411297A0EBFB656EA50D4E05D8DD9AA7A05873B4471E95946E394
3,044,076 UART: [art] SIG.R = BEDBD21E8D7801164A677C1F669322561EB6E02C4A2709A5E2D7D82AAC28164F3F6EF269DCC6902CE27F24573DBA3780
3,050,848 UART: [art] SIG.S = C165D90D6D653A4FB019F7D66FB060A96C04BA3F3AD7DB41A8A9D578C065A36A06A806977CD5B5552D5B7C6E8DD8C3F7
3,074,472 UART: Caliptra RT
3,074,723 UART: [state] CFI Enabled
3,194,039 UART: [rt] RT listening for mailbox commands...
3,194,709 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,207 UART: [rt]cmd =0x4c444556, len=4
3,234,705 >>> mbox cmd response data (687 bytes)
3,234,706 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,165 UART: [rt]cmd =0x43455246, len=4
3,276,206 >>> mbox cmd response data (888 bytes)
3,276,207 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,538 UART: [rt]cmd =0x43455252, len=4
3,316,246 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,348 >>> mbox cmd response: success
2,758,259 UART:
2,758,275 UART: Running Caliptra FMC ...
2,758,683 UART:
2,758,737 UART: [state] CFI Enabled
2,769,187 UART: [fht] FMC Alias Private Key: 7
2,888,777 UART: [art] Extend RT PCRs Done
2,889,205 UART: [art] Lock RT PCRs Done
2,890,823 UART: [art] Populate DV Done
2,898,974 UART: [fht] FMC Alias Private Key: 7
2,900,008 UART: [art] Derive CDI
2,900,288 UART: [art] Store in slot 0x4
2,986,164 UART: [art] Derive Key Pair
2,986,524 UART: [art] Store priv key in slot 0x5
2,999,795 UART: [art] Derive Key Pair - Done
3,014,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,688 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,453 UART: [art] PUB.X = 24D19869E2A538E21E2B25130D70E83C3BC3F7A9889945725D254E07B5D65B85C4A55C467FD9C46D02E04BC76276AB56
3,038,212 UART: [art] PUB.Y = A2386BC3A332176D6ECB94F890F0320940E2048EF8F8999660C2678476EF4420804C3D581ADAE7910A827D01BE65F124
3,045,144 UART: [art] SIG.R = 51949CE44731AC86F8934F089B5C7AE5A95AFA80CEB3459368E6995E377B2D43900116DD4FAC252D24843C57B58E5F9A
3,051,910 UART: [art] SIG.S = 5DA69045F1702E103CF92522A3DE226F42F08288BDB3E56DE4182CA51607E93B3980C6FB38F554EEFAA8599136BD1B0C
3,075,984 UART: Caliptra RT
3,076,235 UART: [state] CFI Enabled
3,195,389 UART: [rt] RT listening for mailbox commands...
3,196,059 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,031 UART: [rt]cmd =0x4c444556, len=4
3,236,329 >>> mbox cmd response data (687 bytes)
3,236,330 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,665 UART: [rt]cmd =0x43455246, len=4
3,277,682 >>> mbox cmd response data (888 bytes)
3,277,683 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,808 UART: [rt]cmd =0x43455252, len=4
3,317,655 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,366 >>> mbox cmd response: success
2,759,107 UART:
2,759,123 UART: Running Caliptra FMC ...
2,759,531 UART:
2,759,585 UART: [state] CFI Enabled
2,770,199 UART: [fht] FMC Alias Private Key: 7
2,889,053 UART: [art] Extend RT PCRs Done
2,889,481 UART: [art] Lock RT PCRs Done
2,890,899 UART: [art] Populate DV Done
2,899,148 UART: [fht] FMC Alias Private Key: 7
2,900,310 UART: [art] Derive CDI
2,900,590 UART: [art] Store in slot 0x4
2,986,522 UART: [art] Derive Key Pair
2,986,882 UART: [art] Store priv key in slot 0x5
2,999,521 UART: [art] Derive Key Pair - Done
3,014,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,290 UART: [art] PUB.X = A7B39A419E71F36ADB888C33466D0A6EFF88EE0B439563C42F9070BED9D78F3668A78C67D9271184E93F0ADB3ECE85EC
3,037,063 UART: [art] PUB.Y = AEB55B759980718BCD47A6D8B330EA06B18F1D36BE75B1EF386FC3E2C8EFE7A0257FA41FAAC474C650A67D1EC1D96B7F
3,044,032 UART: [art] SIG.R = C2A2469A0E02AD4C232D52290627C72978B15204787210B1CEE98C46341308C5331F1C174507EDDC0411279F4D239626
3,050,767 UART: [art] SIG.S = 3C920BE38D651E90E09EAEDA7BE83280892623A74BCF2BF636BFC05FE465FFCDCD8A86A4730CF8947B9BDF4686FB2DD1
3,074,311 UART: Caliptra RT
3,074,562 UART: [state] CFI Enabled
3,194,859 UART: [rt] RT listening for mailbox commands...
3,195,529 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,271 UART: [rt]cmd =0x4c444556, len=4
3,235,817 >>> mbox cmd response data (687 bytes)
3,235,818 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,025 UART: [rt]cmd =0x43455246, len=4
3,277,028 >>> mbox cmd response data (888 bytes)
3,277,029 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,482 UART: [rt]cmd =0x43455252, len=4
3,317,077 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,694,990 >>> mbox cmd response: success
2,757,277 UART:
2,757,293 UART: Running Caliptra FMC ...
2,757,701 UART:
2,757,755 UART: [state] CFI Enabled
2,768,171 UART: [fht] FMC Alias Private Key: 7
2,887,095 UART: [art] Extend RT PCRs Done
2,887,523 UART: [art] Lock RT PCRs Done
2,889,059 UART: [art] Populate DV Done
2,897,166 UART: [fht] FMC Alias Private Key: 7
2,898,270 UART: [art] Derive CDI
2,898,550 UART: [art] Store in slot 0x4
2,983,972 UART: [art] Derive Key Pair
2,984,332 UART: [art] Store priv key in slot 0x5
2,997,893 UART: [art] Derive Key Pair - Done
3,012,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,501 UART: [art] PUB.X = 4FB6C6EAB794F8D0E1FAE6B1B3237CC5F67C140D2047F3447BA948007AE3B43563D1DEC7061DB47B44E91A5D6E4AE6D5
3,036,259 UART: [art] PUB.Y = 50B6BA399B0EA27B57CD9F2469DB880B336600CF8EF2AD16F22C6F7644B2C295FA3F21A8D6E1EDABAEC928F867E76BCC
3,043,203 UART: [art] SIG.R = C591A8928FC43E84FC480236051FD3636DBBF54763F8286F6B5FD0A7C40C96AE88D59F0C8034969FF458FA1C2A08F3E9
3,049,964 UART: [art] SIG.S = E4BE5D57E3E54AD2CCB06823D806E3D2A9519D1668DF0C452F40058E02217F51076DAE08C9220ED67C4CA4E2B1B25E8D
3,073,781 UART: Caliptra RT
3,074,032 UART: [state] CFI Enabled
3,193,074 UART: [rt] RT listening for mailbox commands...
3,193,744 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,686 UART: [rt]cmd =0x4c444556, len=4
3,234,192 >>> mbox cmd response data (687 bytes)
3,234,193 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,558 UART: [rt]cmd =0x43455246, len=4
3,275,715 >>> mbox cmd response data (888 bytes)
3,275,716 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,057 UART: [rt]cmd =0x43455252, len=4
3,315,839 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,268 >>> mbox cmd response: success
2,759,607 UART:
2,759,623 UART: Running Caliptra FMC ...
2,760,031 UART:
2,760,085 UART: [state] CFI Enabled
2,770,341 UART: [fht] FMC Alias Private Key: 7
2,888,849 UART: [art] Extend RT PCRs Done
2,889,277 UART: [art] Lock RT PCRs Done
2,890,939 UART: [art] Populate DV Done
2,899,042 UART: [fht] FMC Alias Private Key: 7
2,900,084 UART: [art] Derive CDI
2,900,364 UART: [art] Store in slot 0x4
2,985,854 UART: [art] Derive Key Pair
2,986,214 UART: [art] Store priv key in slot 0x5
2,999,395 UART: [art] Derive Key Pair - Done
3,014,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,450 UART: [art] PUB.X = FD1954A90921278D909A9AFB703C1DA27FE9C82439902CF41ACAA548C8A77E2D76C791A66AEC5808F15C2677BF5253D1
3,037,220 UART: [art] PUB.Y = 370F8A710F94B349F94AC7CD4292752ED6AEEF0FC84956ACE566A29CEFA1D308200E1EE8E259F740573741972C9DD1B7
3,044,163 UART: [art] SIG.R = 5F488437D9F752ADECB7FDB5217806E066658F2C69B535301044100973D00D1515B5AC4B6028EB2353A9BD2784443502
3,050,911 UART: [art] SIG.S = 3FCFA91F254355F206096EBC09673FB85545D37FFBA06BEB83B547994DE49242059E35419C07BA7993B652EC29834114
3,074,812 UART: Caliptra RT
3,075,063 UART: [state] CFI Enabled
3,194,747 UART: [rt] RT listening for mailbox commands...
3,195,417 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,489 UART: [rt]cmd =0x4c444556, len=4
3,235,935 >>> mbox cmd response data (687 bytes)
3,235,936 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,301 UART: [rt]cmd =0x43455246, len=4
3,277,254 >>> mbox cmd response data (888 bytes)
3,277,255 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,364 UART: [rt]cmd =0x43455252, len=4
3,317,415 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1002.42s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,300,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,546 UART: [idev] --
1,301,645 UART: [ldev] ++
1,301,813 UART: [ldev] CDI.KEYID = 6
1,302,177 UART: [ldev] SUBJECT.KEYID = 5
1,302,604 UART: [ldev] AUTHORITY.KEYID = 7
1,303,067 UART: [ldev] FE.KEYID = 1
1,308,411 UART: [ldev] Erasing FE.KEYID = 1
1,334,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,729 UART: [ldev] --
1,374,026 UART: [fwproc] Wait for Commands...
1,374,649 UART: [fwproc] Recv command 0x46574c44
1,375,382 UART: [fwproc] Recv'd Img size: 118548 bytes
2,721,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,748,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,779,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,920,256 >>> mbox cmd response: success
2,921,482 UART: [afmc] ++
2,921,650 UART: [afmc] CDI.KEYID = 6
2,922,013 UART: [afmc] SUBJECT.KEYID = 7
2,922,439 UART: [afmc] AUTHORITY.KEYID = 5
2,958,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,974,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,975,198 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,908 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,986,789 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,992,490 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
3,000,199 UART: [afmc] --
3,001,100 UART: [cold-reset] --
3,001,856 UART: [state] Locking Datavault
3,003,197 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,801 UART: [state] Locking ICCM
3,004,375 UART: [exit] Launching FMC @ 0x40000130
3,009,705 UART:
3,009,721 UART: Running Caliptra FMC ...
3,010,129 UART:
3,010,272 UART: [state] CFI Enabled
3,020,724 UART: [fht] FMC Alias Private Key: 7
3,139,870 UART: [art] Extend RT PCRs Done
3,140,298 UART: [art] Lock RT PCRs Done
3,141,884 UART: [art] Populate DV Done
3,149,949 UART: [fht] FMC Alias Private Key: 7
3,150,935 UART: [art] Derive CDI
3,151,215 UART: [art] Store in slot 0x4
3,236,663 UART: [art] Derive Key Pair
3,237,023 UART: [art] Store priv key in slot 0x5
3,250,430 UART: [art] Derive Key Pair - Done
3,265,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,281,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,783 UART: [art] PUB.X = 3E296BA4FD35E3030B51A360C56D0805B948B6C461CC2618F7A28E30184EA9C0443193A8CA1E0CDAF83F908D9B1B3799
3,288,542 UART: [art] PUB.Y = A404CA7296AC0028DB2F6E2A62D0B8065119C30808A6575194D96C93B65B81A1F4F23879D280406CC71D42914D0D94D5
3,295,449 UART: [art] SIG.R = AC87D6311E501E0850AAF5DA2E6BD04C6E6DD848A4197118F1163B42850359B4DE6B5FDFFF21AF4E607F7731450F776F
3,302,218 UART: [art] SIG.S = E849F60D313AB45C24712FE81E48B63B3A004414BB34F93130440EA9DA45DD8B43216B8B7A46A702E69243766F33E066
3,325,959 UART: Caliptra RT
3,326,302 UART: [state] CFI Enabled
3,446,136 UART: [rt] RT listening for mailbox commands...
3,446,806 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,814 UART: [rt]cmd =0x4c444556, len=4
3,487,302 >>> mbox cmd response data (687 bytes)
3,487,303 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,784 UART: [rt]cmd =0x43455246, len=4
3,528,755 >>> mbox cmd response data (888 bytes)
3,528,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,053 UART: [rt]cmd =0x43455252, len=4
3,568,711 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,358 UART: [kat] SHA2-512-ACC
906,259 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,853 UART: [idev] ++
1,173,021 UART: [idev] CDI.KEYID = 6
1,173,382 UART: [idev] SUBJECT.KEYID = 7
1,173,807 UART: [idev] UDS.KEYID = 0
1,182,190 UART: [idev] Erasing UDS.KEYID = 0
1,198,674 UART: [idev] Sha1 KeyId Algorithm
1,208,326 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,900 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,608 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,493 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,199 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,628 UART: [idev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
1,298,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,006 UART: [idev] --
1,300,067 UART: [ldev] ++
1,300,235 UART: [ldev] CDI.KEYID = 6
1,300,599 UART: [ldev] SUBJECT.KEYID = 5
1,301,026 UART: [ldev] AUTHORITY.KEYID = 7
1,301,489 UART: [ldev] FE.KEYID = 1
1,306,587 UART: [ldev] Erasing FE.KEYID = 1
1,332,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,717 UART: [ldev] --
1,372,152 UART: [fwproc] Wait for Commands...
1,372,785 UART: [fwproc] Recv command 0x46574c44
1,373,518 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,628 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,803 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,064 >>> mbox cmd response: success
2,917,094 UART: [afmc] ++
2,917,262 UART: [afmc] CDI.KEYID = 6
2,917,625 UART: [afmc] SUBJECT.KEYID = 7
2,918,051 UART: [afmc] AUTHORITY.KEYID = 5
2,953,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,617 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,318 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,111 UART: [afmc] --
2,996,988 UART: [cold-reset] --
2,997,556 UART: [state] Locking Datavault
2,998,837 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,441 UART: [state] Locking ICCM
3,000,031 UART: [exit] Launching FMC @ 0x40000130
3,005,361 UART:
3,005,377 UART: Running Caliptra FMC ...
3,005,785 UART:
3,005,928 UART: [state] CFI Enabled
3,016,268 UART: [fht] FMC Alias Private Key: 7
3,134,496 UART: [art] Extend RT PCRs Done
3,134,924 UART: [art] Lock RT PCRs Done
3,136,606 UART: [art] Populate DV Done
3,144,917 UART: [fht] FMC Alias Private Key: 7
3,146,079 UART: [art] Derive CDI
3,146,359 UART: [art] Store in slot 0x4
3,231,809 UART: [art] Derive Key Pair
3,232,169 UART: [art] Store priv key in slot 0x5
3,245,636 UART: [art] Derive Key Pair - Done
3,260,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,275,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,350 UART: [art] PUB.X = A44736D892FBC6DAC290059DAAEB2FFFF2BB8368228DDBEC5CC586A9117D0902C43774ED6C22502983A91B6B2218DA23
3,283,123 UART: [art] PUB.Y = 1239E3D2AB7C89A8EF1CC9044E0E7A04E5AF4A8315E7D6C1FA063637FA1A79A48F7492A453B4FB81CD7E3C9B2EF69A69
3,290,077 UART: [art] SIG.R = 5E735914F01C8ED4BFB54AF7D8E03F3BFA5DCDF7676A96D28152504F02014845893C195D8BF9FB2CF9E041F58CCEAE46
3,296,855 UART: [art] SIG.S = 157F46292176545A649AD4D01F7A3D0C600543AA30EF70A866D5082A9C11E9605A94B8F9F723CC530DCE94B74E40FD7F
3,320,587 UART: Caliptra RT
3,320,930 UART: [state] CFI Enabled
3,440,860 UART: [rt] RT listening for mailbox commands...
3,441,530 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,296 UART: [rt]cmd =0x4c444556, len=4
3,481,690 >>> mbox cmd response data (687 bytes)
3,481,691 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,250 UART: [rt]cmd =0x43455246, len=4
3,523,309 >>> mbox cmd response data (888 bytes)
3,523,310 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,539 UART: [rt]cmd =0x43455252, len=4
3,563,378 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1039.24s
Truncated 2533977 bytes from beginning
2,761,904 UART: Running Caliptra FMC ...
2,762,312 UART:
2,762,455 UART: [state] CFI Enabled
2,773,057 UART: [fht] FMC Alias Private Key: 7
2,892,413 UART: [art] Extend RT PCRs Done
2,892,841 UART: [art] Lock RT PCRs Done
2,894,511 UART: [art] Populate DV Done
2,902,876 UART: [fht] FMC Alias Private Key: 7
2,903,920 UART: [art] Derive CDI
2,904,200 UART: [art] Store in slot 0x4
2,990,174 UART: [art] Derive Key Pair
2,990,534 UART: [art] Store priv key in slot 0x5
3,004,129 UART: [art] Derive Key Pair - Done
3,019,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,569 UART: [art] PUB.X = B4B7CDCB2A4B99FDCB01D41899F611F7C0A8F124A5FE66ED8CE55CF589C44F9A158398FB13C5B2C8244C3FEB09CC85EB
3,042,357 UART: [art] PUB.Y = 4AB1E5BCE15CA5F2CDD13B81674B7F3BD2DB810615EBE958F6DE30FE5D42553FAD7B24E4885522BBF2E80089574ED495
3,049,298 UART: [art] SIG.R = 3BF6AE6809502595E2E81F94FFEEB04CA1118048AD53A45B3193B8D1B9137913142F40F4607AE2E52268021972C39B82
3,056,056 UART: [art] SIG.S = E83F9BC19FD27E9E9FE4ABFD02D2E8C1E955EC4232BD3E7333E34CE330FECE82217AFD8AB8A17744091BF23DFF9C8AD0
3,079,926 UART: Caliptra RT
3,080,269 UART: [state] CFI Enabled
3,199,630 UART: [rt] RT listening for mailbox commands...
3,200,300 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,230,022 UART: [rt]cmd =0x4c444556, len=4
3,240,440 >>> mbox cmd response data (687 bytes)
3,240,441 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,778 UART: [rt]cmd =0x43455246, len=4
3,281,885 >>> mbox cmd response data (888 bytes)
3,281,886 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,195 UART: [rt]cmd =0x43455252, len=4
3,321,988 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,901 >>> mbox cmd response: success
2,760,514 UART:
2,760,530 UART: Running Caliptra FMC ...
2,760,938 UART:
2,761,081 UART: [state] CFI Enabled
2,771,879 UART: [fht] FMC Alias Private Key: 7
2,891,013 UART: [art] Extend RT PCRs Done
2,891,441 UART: [art] Lock RT PCRs Done
2,892,995 UART: [art] Populate DV Done
2,901,372 UART: [fht] FMC Alias Private Key: 7
2,902,440 UART: [art] Derive CDI
2,902,720 UART: [art] Store in slot 0x4
2,988,326 UART: [art] Derive Key Pair
2,988,686 UART: [art] Store priv key in slot 0x5
3,002,043 UART: [art] Derive Key Pair - Done
3,016,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,167 UART: [art] PUB.X = CA303CDE11A7621CA8AC97244871A885B52DE33C26254A1DC3BFDCD49E02F3E2F525C053EFBEF008A098F6C6EC603A05
3,039,944 UART: [art] PUB.Y = 2222D4009ECEDB6E28EFC86449DB626C6656410A7D3D3B924B6963D135668A17939544E5181D1F46F0A74EC7AC2144D5
3,046,867 UART: [art] SIG.R = 4E7628D801220938EDD33978C132927231285D1AA303E389DF1148FD47257A18DF07A399059CD424EF14DD21D209FD18
3,053,611 UART: [art] SIG.S = 3F6B579987300BA67FE52C44ACDA9C402BC46E7B22B2B06B737D1A46115FF71D71C3292B19C0379555D3AEA42A692726
3,077,528 UART: Caliptra RT
3,077,871 UART: [state] CFI Enabled
3,197,363 UART: [rt] RT listening for mailbox commands...
3,198,033 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,081 UART: [rt]cmd =0x4c444556, len=4
3,238,489 >>> mbox cmd response data (687 bytes)
3,238,490 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,949 UART: [rt]cmd =0x43455246, len=4
3,279,986 >>> mbox cmd response data (888 bytes)
3,279,987 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,282 UART: [rt]cmd =0x43455252, len=4
3,320,011 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,151 >>> mbox cmd response: success
2,757,392 UART:
2,757,408 UART: Running Caliptra FMC ...
2,757,816 UART:
2,757,959 UART: [state] CFI Enabled
2,768,497 UART: [fht] FMC Alias Private Key: 7
2,887,985 UART: [art] Extend RT PCRs Done
2,888,413 UART: [art] Lock RT PCRs Done
2,889,777 UART: [art] Populate DV Done
2,898,048 UART: [fht] FMC Alias Private Key: 7
2,899,114 UART: [art] Derive CDI
2,899,394 UART: [art] Store in slot 0x4
2,985,264 UART: [art] Derive Key Pair
2,985,624 UART: [art] Store priv key in slot 0x5
2,999,393 UART: [art] Derive Key Pair - Done
3,014,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,362 UART: [art] PUB.X = 55A3EDE9817AAD07F3F84636679D6CCC7E5E3F966981D5F78B6ED4CDFB4A572734C0A56D33249CB1B9F8CC6650957A64
3,037,139 UART: [art] PUB.Y = 58D0BD71C33C41F986EAC3A57B814C1CD54EA2DE2A1F77D5965DF345CEA747F49358D44A1CF5DFC81B7917A534A4C86C
3,044,105 UART: [art] SIG.R = FDEFE55F29EADED57DF74713F55DA678898B300780F37B27AF29AE4FA8253D71D37753A90A68F8903F935ED5A5551257
3,050,875 UART: [art] SIG.S = 7E64D26ECF1A2E63670F3C7730CCB19331CEFFF69CF8A451ED18D33D81CCD0022B1CBE21F14BB923AB87B81DFAECC1CC
3,075,139 UART: Caliptra RT
3,075,482 UART: [state] CFI Enabled
3,195,231 UART: [rt] RT listening for mailbox commands...
3,195,901 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,513 UART: [rt]cmd =0x4c444556, len=4
3,236,043 >>> mbox cmd response data (687 bytes)
3,236,044 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,193 UART: [rt]cmd =0x43455246, len=4
3,277,182 >>> mbox cmd response data (888 bytes)
3,277,183 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,514 UART: [rt]cmd =0x43455252, len=4
3,317,371 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,337 >>> mbox cmd response: success
2,757,890 UART:
2,757,906 UART: Running Caliptra FMC ...
2,758,314 UART:
2,758,457 UART: [state] CFI Enabled
2,768,665 UART: [fht] FMC Alias Private Key: 7
2,887,395 UART: [art] Extend RT PCRs Done
2,887,823 UART: [art] Lock RT PCRs Done
2,889,557 UART: [art] Populate DV Done
2,897,508 UART: [fht] FMC Alias Private Key: 7
2,898,608 UART: [art] Derive CDI
2,898,888 UART: [art] Store in slot 0x4
2,984,888 UART: [art] Derive Key Pair
2,985,248 UART: [art] Store priv key in slot 0x5
2,998,727 UART: [art] Derive Key Pair - Done
3,013,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,904 UART: [art] PUB.X = BCC7997F8B01B07618BC3C34BB6CA2D902290986B355D2EBD9B9F29FD28C9464667162C45C401C63C772790CBF7071FE
3,036,666 UART: [art] PUB.Y = 9825F406ACE77A58829FAA1793B2A573754B7DD056BB2660521048121BB22437F676E161739A1343410A22031B148791
3,043,589 UART: [art] SIG.R = DE6930EF34A98554649D3E036DBB2ED6956B807CF007A79B0B8028EBEB996061DC883E23006DB79E31D066B82E88C223
3,050,330 UART: [art] SIG.S = C4E3475D1CDFD68E71243B2F8142F0FD5BFBC8BE22F95205AE74B7DA9A8F4A7A26912EC9693A2E196039FAE1C56956B7
3,074,179 UART: Caliptra RT
3,074,522 UART: [state] CFI Enabled
3,193,656 UART: [rt] RT listening for mailbox commands...
3,194,326 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,178 UART: [rt]cmd =0x4c444556, len=4
3,234,524 >>> mbox cmd response data (687 bytes)
3,234,525 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,152 UART: [rt]cmd =0x43455246, len=4
3,276,383 >>> mbox cmd response data (888 bytes)
3,276,384 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,629 UART: [rt]cmd =0x43455252, len=4
3,316,453 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,359 >>> mbox cmd response: success
2,759,716 UART:
2,759,732 UART: Running Caliptra FMC ...
2,760,140 UART:
2,760,283 UART: [state] CFI Enabled
2,771,027 UART: [fht] FMC Alias Private Key: 7
2,890,239 UART: [art] Extend RT PCRs Done
2,890,667 UART: [art] Lock RT PCRs Done
2,892,235 UART: [art] Populate DV Done
2,900,240 UART: [fht] FMC Alias Private Key: 7
2,901,332 UART: [art] Derive CDI
2,901,612 UART: [art] Store in slot 0x4
2,987,140 UART: [art] Derive Key Pair
2,987,500 UART: [art] Store priv key in slot 0x5
3,000,641 UART: [art] Derive Key Pair - Done
3,015,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,065 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,830 UART: [art] PUB.X = 10D6EB662D14E0388D7F74A60F2622C34F0E2FC26BCF2F2D9967E27EADACC46C55B36317619431F613A745FE0F1FA365
3,038,599 UART: [art] PUB.Y = 8138534141649F73C464973F0BB3E766BFFF581CB3823D55169C8A56A70346583E689853F06B3FF6DC4E489039BB9180
3,045,533 UART: [art] SIG.R = C602173ABD85300EE4D71CD03E5766503C345C22C4007ED254C3CA26B020FA3FEA6AC767D080D0132A49CCB8090D645B
3,052,275 UART: [art] SIG.S = C7E68A859A6E6B5793E1796E8F47E0733C9AC1CE3E83E8B9A53773E2681FDD4DA9830B58A298AB16E05443CCF837F4FC
3,075,646 UART: Caliptra RT
3,075,989 UART: [state] CFI Enabled
3,196,139 UART: [rt] RT listening for mailbox commands...
3,196,809 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,489 UART: [rt]cmd =0x4c444556, len=4
3,236,955 >>> mbox cmd response data (687 bytes)
3,236,956 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,455 UART: [rt]cmd =0x43455246, len=4
3,278,422 >>> mbox cmd response data (888 bytes)
3,278,423 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,852 UART: [rt]cmd =0x43455252, len=4
3,318,776 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 991.37s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,097 UART: [idev] --
1,300,188 UART: [ldev] ++
1,300,356 UART: [ldev] CDI.KEYID = 6
1,300,720 UART: [ldev] SUBJECT.KEYID = 5
1,301,147 UART: [ldev] AUTHORITY.KEYID = 7
1,301,610 UART: [ldev] FE.KEYID = 1
1,307,026 UART: [ldev] Erasing FE.KEYID = 1
1,333,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,966 UART: [ldev] --
1,372,269 UART: [fwproc] Wait for Commands...
1,372,958 UART: [fwproc] Recv command 0x46574c44
1,373,691 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,543 >>> mbox cmd response: success
2,917,641 UART: [afmc] ++
2,917,809 UART: [afmc] CDI.KEYID = 6
2,918,172 UART: [afmc] SUBJECT.KEYID = 7
2,918,598 UART: [afmc] AUTHORITY.KEYID = 5
2,953,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,861 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,571 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,452 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,153 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,908 UART: [afmc] --
2,996,923 UART: [cold-reset] --
2,997,461 UART: [state] Locking Datavault
2,998,766 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,370 UART: [state] Locking ICCM
2,999,886 UART: [exit] Launching FMC @ 0x40000130
3,005,216 UART:
3,005,232 UART: Running Caliptra FMC ...
3,005,640 UART:
3,005,694 UART: [state] CFI Enabled
3,016,024 UART: [fht] FMC Alias Private Key: 7
3,135,468 UART: [art] Extend RT PCRs Done
3,135,896 UART: [art] Lock RT PCRs Done
3,137,358 UART: [art] Populate DV Done
3,145,503 UART: [fht] FMC Alias Private Key: 7
3,146,675 UART: [art] Derive CDI
3,146,955 UART: [art] Store in slot 0x4
3,233,078 UART: [art] Derive Key Pair
3,233,438 UART: [art] Store priv key in slot 0x5
3,246,940 UART: [art] Derive Key Pair - Done
3,261,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,822 UART: [art] PUB.X = 82C32DD357890C29294C3815D4F4283C3065F80AED46C1D1A80C25170DF493318D48AC53E2A1F7FCEFEFDC0411ADFFF2
3,284,589 UART: [art] PUB.Y = E38475E676B37CDC46FFCFF86BBD20234D6CFA4B90BD95D4572661A56B251225CBFDB02D6903D5852C91900194407187
3,291,535 UART: [art] SIG.R = DE06E91796F870B5100AF779DB9FC4B88D43A5F4E3FCF209FCDDD2069D0A89EEC1024876F9D089153BA6356108C68302
3,298,287 UART: [art] SIG.S = BEA88E615D1E2C85A1F87FEB4EB562A66A50841CD3840B5730023EC54EB33979D0BD0F41CF035EA6965BB50BDA800F80
3,322,307 UART: Caliptra RT
3,322,558 UART: [state] CFI Enabled
3,442,276 UART: [rt] RT listening for mailbox commands...
3,442,946 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,970 UART: [rt]cmd =0x4c444556, len=4
3,483,302 >>> mbox cmd response data (687 bytes)
3,483,303 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,682 UART: [rt]cmd =0x43455246, len=4
3,524,911 >>> mbox cmd response data (888 bytes)
3,524,912 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,365 UART: [rt]cmd =0x43455252, len=4
3,565,003 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,620 UART: [kat] SHA2-256
901,560 UART: [kat] SHA2-384
904,217 UART: [kat] SHA2-512-ACC
906,118 UART: [kat] ECC-384
915,725 UART: [kat] HMAC-384Kdf
920,401 UART: [kat] LMS
1,168,713 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,834 UART: [idev] ++
1,173,002 UART: [idev] CDI.KEYID = 6
1,173,363 UART: [idev] SUBJECT.KEYID = 7
1,173,788 UART: [idev] UDS.KEYID = 0
1,181,917 UART: [idev] Erasing UDS.KEYID = 0
1,198,865 UART: [idev] Sha1 KeyId Algorithm
1,208,527 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,461 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,169 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,054 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,760 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,189 UART: [idev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
1,299,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,567 UART: [idev] --
1,300,794 UART: [ldev] ++
1,300,962 UART: [ldev] CDI.KEYID = 6
1,301,326 UART: [ldev] SUBJECT.KEYID = 5
1,301,753 UART: [ldev] AUTHORITY.KEYID = 7
1,302,216 UART: [ldev] FE.KEYID = 1
1,307,226 UART: [ldev] Erasing FE.KEYID = 1
1,333,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,794 UART: [ldev] --
1,373,237 UART: [fwproc] Wait for Commands...
1,373,926 UART: [fwproc] Recv command 0x46574c44
1,374,659 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,371 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,813 >>> mbox cmd response: success
2,918,847 UART: [afmc] ++
2,919,015 UART: [afmc] CDI.KEYID = 6
2,919,378 UART: [afmc] SUBJECT.KEYID = 7
2,919,804 UART: [afmc] AUTHORITY.KEYID = 5
2,955,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,918 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,667 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,959 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,676 UART: [afmc] --
2,998,505 UART: [cold-reset] --
2,999,623 UART: [state] Locking Datavault
3,000,882 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,486 UART: [state] Locking ICCM
3,002,046 UART: [exit] Launching FMC @ 0x40000130
3,007,376 UART:
3,007,392 UART: Running Caliptra FMC ...
3,007,800 UART:
3,007,854 UART: [state] CFI Enabled
3,018,474 UART: [fht] FMC Alias Private Key: 7
3,137,262 UART: [art] Extend RT PCRs Done
3,137,690 UART: [art] Lock RT PCRs Done
3,139,224 UART: [art] Populate DV Done
3,147,389 UART: [fht] FMC Alias Private Key: 7
3,148,343 UART: [art] Derive CDI
3,148,623 UART: [art] Store in slot 0x4
3,234,002 UART: [art] Derive Key Pair
3,234,362 UART: [art] Store priv key in slot 0x5
3,247,532 UART: [art] Derive Key Pair - Done
3,261,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,276,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,751 UART: [art] PUB.X = 3627C1CB28801902CB08B8C4934A123546A606D51FCA95D1B29F1D6204C982544B0887E0CF17EBDC782DF2C7D5011A38
3,284,503 UART: [art] PUB.Y = 621F1D97CA3F8EC7B02751A9AFC4D2DB9A8FF47E2E7E35244ADA2A0D1EAAC5B2ABFDBA386A3F4B0B4F881902A75F426B
3,291,472 UART: [art] SIG.R = DDA59E45549335E833E4CAC876550EC7666915E5F90ED98077C706452F4A29CD83728F71C77AD25E622694E67880101C
3,298,225 UART: [art] SIG.S = AE59533DA4C1D26C66256C400932AA477D03AF81063D2BE80CDD560A5D49807FF58F6129B25F95BFBEB8DB1768F6643E
3,322,038 UART: Caliptra RT
3,322,289 UART: [state] CFI Enabled
3,441,633 UART: [rt] RT listening for mailbox commands...
3,442,303 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,859 UART: [rt]cmd =0x4c444556, len=4
3,482,415 >>> mbox cmd response data (687 bytes)
3,482,416 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,707 UART: [rt]cmd =0x43455246, len=4
3,523,760 >>> mbox cmd response data (888 bytes)
3,523,761 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,082 UART: [rt]cmd =0x43455252, len=4
3,563,808 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1017.16s
Truncated 2533977 bytes from beginning
2,757,953 UART: Running Caliptra FMC ...
2,758,361 UART:
2,758,415 UART: [state] CFI Enabled
2,769,071 UART: [fht] FMC Alias Private Key: 7
2,888,165 UART: [art] Extend RT PCRs Done
2,888,593 UART: [art] Lock RT PCRs Done
2,890,207 UART: [art] Populate DV Done
2,898,324 UART: [fht] FMC Alias Private Key: 7
2,899,334 UART: [art] Derive CDI
2,899,614 UART: [art] Store in slot 0x4
2,985,271 UART: [art] Derive Key Pair
2,985,631 UART: [art] Store priv key in slot 0x5
2,998,857 UART: [art] Derive Key Pair - Done
3,013,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,867 UART: [art] PUB.X = CD6F799F5467294A20690BE01915A180440B0BCD5AF663E6DE901F0DA04D0FD705975F4B08B4C233FE99AD2FF08DC108
3,036,621 UART: [art] PUB.Y = C1F4E67A1119FBEAB2C5413DADF9C8B7258D8ABCE0758719B1F3BC6E7159DA019140CEBD5264D528BA5FF0F2EF95EAD8
3,043,592 UART: [art] SIG.R = 53B7A7A83A3D7D68A80AB70C1099834254649A9E1ED585D8612670688B12F719E8E827CD8835E3C6D0CB133D696F205C
3,050,352 UART: [art] SIG.S = D60B0649E00B461A3EDE22522C5FF171A335F9B34E7D7618BE5717F5840802845560961317C143FBBD9D2ECAACE0810A
3,073,952 UART: Caliptra RT
3,074,203 UART: [state] CFI Enabled
3,193,550 UART: [rt] RT listening for mailbox commands...
3,194,220 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,060 UART: [rt]cmd =0x4c444556, len=4
3,234,464 >>> mbox cmd response data (687 bytes)
3,234,465 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,786 UART: [rt]cmd =0x43455246, len=4
3,275,835 >>> mbox cmd response data (888 bytes)
3,275,836 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,071 UART: [rt]cmd =0x43455252, len=4
3,315,832 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,693,858 >>> mbox cmd response: success
2,755,271 UART:
2,755,287 UART: Running Caliptra FMC ...
2,755,695 UART:
2,755,749 UART: [state] CFI Enabled
2,766,317 UART: [fht] FMC Alias Private Key: 7
2,884,523 UART: [art] Extend RT PCRs Done
2,884,951 UART: [art] Lock RT PCRs Done
2,886,505 UART: [art] Populate DV Done
2,894,680 UART: [fht] FMC Alias Private Key: 7
2,895,778 UART: [art] Derive CDI
2,896,058 UART: [art] Store in slot 0x4
2,981,845 UART: [art] Derive Key Pair
2,982,205 UART: [art] Store priv key in slot 0x5
2,994,957 UART: [art] Derive Key Pair - Done
3,009,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,191 UART: [art] PUB.X = F2BBE9C0516F46DCE826DA846AF101DE7BF93E1CAAEF285CEE089C31C2B865B5CE590E55E63B6BE478D72A697482FD8C
3,032,974 UART: [art] PUB.Y = C254BF0CBDF2137F6E67F5DA8F3FE2C8D467414F3979F20E2779C26C8128D98FB6E41150C4B5AD4CEDE054385FD0C212
3,039,930 UART: [art] SIG.R = 022BC01D5F0D1D12C721442CE872050B0A1B4C8ABD18561584F97B8B10ED54D9C2EEFDC708CD88F1855E5AE7EE08FDAF
3,046,697 UART: [art] SIG.S = C37413703AA1C5B9EF4074445013AC805F718956BCFC19FDED7845549B20988C1E48D02FACDBAEAD2DCEEC8F12FC85E7
3,070,591 UART: Caliptra RT
3,070,842 UART: [state] CFI Enabled
3,190,451 UART: [rt] RT listening for mailbox commands...
3,191,121 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,939 UART: [rt]cmd =0x4c444556, len=4
3,231,303 >>> mbox cmd response data (687 bytes)
3,231,304 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,473 UART: [rt]cmd =0x43455246, len=4
3,272,470 >>> mbox cmd response data (888 bytes)
3,272,471 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,674 UART: [rt]cmd =0x43455252, len=4
3,312,483 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,060 >>> mbox cmd response: success
2,759,315 UART:
2,759,331 UART: Running Caliptra FMC ...
2,759,739 UART:
2,759,793 UART: [state] CFI Enabled
2,770,571 UART: [fht] FMC Alias Private Key: 7
2,889,973 UART: [art] Extend RT PCRs Done
2,890,401 UART: [art] Lock RT PCRs Done
2,891,787 UART: [art] Populate DV Done
2,900,090 UART: [fht] FMC Alias Private Key: 7
2,901,064 UART: [art] Derive CDI
2,901,344 UART: [art] Store in slot 0x4
2,987,069 UART: [art] Derive Key Pair
2,987,429 UART: [art] Store priv key in slot 0x5
3,001,169 UART: [art] Derive Key Pair - Done
3,015,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,181 UART: [art] PUB.X = 3DBD902E4787D57DEA938BB2DF42380570F564A87B48B42EC9E869CE6E4247A3CECD029D443FB5094B431C46DB783AC2
3,038,952 UART: [art] PUB.Y = 2BE1C78D1ED8A8A43077448EBEE317C0AC30407227851DCB4B817B851D14E22A7ECF81F1CEFCD867CB94729D138F3E22
3,045,914 UART: [art] SIG.R = 35CC94711E877A10A6882D745B60C54C104374765188890F155CE56F0462E4293BD0552D46A676CC7FB89D695737ED34
3,052,666 UART: [art] SIG.S = 6B97A30B669F9C320F651A9EF86309A703EB7C6FE83CD85F223AB8BDB418933DAE9B53523BF3CC8FEDA0BA5DC3A706C7
3,076,753 UART: Caliptra RT
3,077,004 UART: [state] CFI Enabled
3,197,302 UART: [rt] RT listening for mailbox commands...
3,197,972 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,682 UART: [rt]cmd =0x4c444556, len=4
3,238,100 >>> mbox cmd response data (687 bytes)
3,238,101 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,716 UART: [rt]cmd =0x43455246, len=4
3,279,873 >>> mbox cmd response data (888 bytes)
3,279,874 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,303 UART: [rt]cmd =0x43455252, len=4
3,320,144 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,768 >>> mbox cmd response: success
2,760,277 UART:
2,760,293 UART: Running Caliptra FMC ...
2,760,701 UART:
2,760,755 UART: [state] CFI Enabled
2,771,037 UART: [fht] FMC Alias Private Key: 7
2,889,263 UART: [art] Extend RT PCRs Done
2,889,691 UART: [art] Lock RT PCRs Done
2,891,353 UART: [art] Populate DV Done
2,899,598 UART: [fht] FMC Alias Private Key: 7
2,900,628 UART: [art] Derive CDI
2,900,908 UART: [art] Store in slot 0x4
2,986,737 UART: [art] Derive Key Pair
2,987,097 UART: [art] Store priv key in slot 0x5
3,000,591 UART: [art] Derive Key Pair - Done
3,015,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,437 UART: [art] PUB.X = B7D00076E53D5F6991FE7405B2E2B6857CF38E7E1CAED358BA7FA29C587F3528E34409D23267922DDC6B9D789A96B816
3,039,183 UART: [art] PUB.Y = 5F1FFA5405EB1643F85FB9B0171145C17135C08E3B43C179E2E0604E60736665E96023FDA4F2D6A0BB72F5BDBCAB2C90
3,046,138 UART: [art] SIG.R = 33A23CC1F88AACAC500CFC9BF8349EDE5FA52A17615FB813B94E40118CB3506CD7A8254D78DC277CB7C29F4E3D3D3AE1
3,052,925 UART: [art] SIG.S = 3C53370D15997F890404EF90B1505222AF21B859E2BB7AF1F39B88521AA714D36863B0314FED049D24E6C9168B942995
3,076,919 UART: Caliptra RT
3,077,170 UART: [state] CFI Enabled
3,196,122 UART: [rt] RT listening for mailbox commands...
3,196,792 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,606 UART: [rt]cmd =0x4c444556, len=4
3,237,068 >>> mbox cmd response data (687 bytes)
3,237,069 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,564 UART: [rt]cmd =0x43455246, len=4
3,278,669 >>> mbox cmd response data (888 bytes)
3,278,670 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,959 UART: [rt]cmd =0x43455252, len=4
3,318,858 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,684 >>> mbox cmd response: success
2,758,553 UART:
2,758,569 UART: Running Caliptra FMC ...
2,758,977 UART:
2,759,031 UART: [state] CFI Enabled
2,769,265 UART: [fht] FMC Alias Private Key: 7
2,888,401 UART: [art] Extend RT PCRs Done
2,888,829 UART: [art] Lock RT PCRs Done
2,890,327 UART: [art] Populate DV Done
2,898,360 UART: [fht] FMC Alias Private Key: 7
2,899,322 UART: [art] Derive CDI
2,899,602 UART: [art] Store in slot 0x4
2,985,707 UART: [art] Derive Key Pair
2,986,067 UART: [art] Store priv key in slot 0x5
2,999,641 UART: [art] Derive Key Pair - Done
3,014,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,960 UART: [art] PUB.X = 19894159E3DC5B69EBE828DBD4524D0B7B2F042C9FF221BBB885E7B087A893CD0734E461FCE11BA7BB4D513BC912C289
3,037,733 UART: [art] PUB.Y = 5EB5AEFE647A8E0EFE08E163B97B20423EE8C6BFF8C3BAA09FF140D25560E45DCE68C1A00E74289C70372FCB14CCE733
3,044,694 UART: [art] SIG.R = 72A275CCDE99CD100AD2531B5D07D1789C1F9441F0C33C96C9FCA5EC59FBEB95747353B7D34E8D5963946B19F6962AC3
3,051,466 UART: [art] SIG.S = 80DF2BB6E9A7B278EA82DFC54357166F51057CBAFA168555F0EDC0E81FD08860797034869A1FDEB8E9F6FAA4880482AA
3,075,060 UART: Caliptra RT
3,075,311 UART: [state] CFI Enabled
3,195,194 UART: [rt] RT listening for mailbox commands...
3,195,864 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,654 UART: [rt]cmd =0x4c444556, len=4
3,236,094 >>> mbox cmd response data (687 bytes)
3,236,095 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,258 UART: [rt]cmd =0x43455246, len=4
3,277,469 >>> mbox cmd response data (888 bytes)
3,277,470 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,875 UART: [rt]cmd =0x43455252, len=4
3,317,926 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 987.79s
Truncated 7329977 bytes from beginning
512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,300,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,274 UART: [idev] --
1,301,405 UART: [ldev] ++
1,301,573 UART: [ldev] CDI.KEYID = 6
1,301,937 UART: [ldev] SUBJECT.KEYID = 5
1,302,364 UART: [ldev] AUTHORITY.KEYID = 7
1,302,827 UART: [ldev] FE.KEYID = 1
1,307,867 UART: [ldev] Erasing FE.KEYID = 1
1,333,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,415 UART: [ldev] --
1,372,714 UART: [fwproc] Wait for Commands...
1,373,447 UART: [fwproc] Recv command 0x46574c44
1,374,180 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,777,009 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,917,274 >>> mbox cmd response: success
2,918,358 UART: [afmc] ++
2,918,526 UART: [afmc] CDI.KEYID = 6
2,918,889 UART: [afmc] SUBJECT.KEYID = 7
2,919,315 UART: [afmc] AUTHORITY.KEYID = 5
2,954,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,971,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,561 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,262 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,111 UART: [afmc] --
2,998,170 UART: [cold-reset] --
2,999,016 UART: [state] Locking Datavault
3,000,293 UART: [state] Locking PCR0, PCR1 and PCR31
3,000,897 UART: [state] Locking ICCM
3,001,457 UART: [exit] Launching FMC @ 0x40000130
3,006,787 UART:
3,006,803 UART: Running Caliptra FMC ...
3,007,211 UART:
3,007,354 UART: [state] CFI Enabled
3,017,742 UART: [fht] FMC Alias Private Key: 7
3,136,590 UART: [art] Extend RT PCRs Done
3,137,018 UART: [art] Lock RT PCRs Done
3,138,486 UART: [art] Populate DV Done
3,146,799 UART: [fht] FMC Alias Private Key: 7
3,147,747 UART: [art] Derive CDI
3,148,027 UART: [art] Store in slot 0x4
3,233,898 UART: [art] Derive Key Pair
3,234,258 UART: [art] Store priv key in slot 0x5
3,248,042 UART: [art] Derive Key Pair - Done
3,262,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,211 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,976 UART: [art] PUB.X = C529E26DCF266D1C32F9F3130B7252914D86377D4558DCB1D7CA9C7310C233F58DD537B3AA004CC1A35858A2ED765108
3,284,720 UART: [art] PUB.Y = E01BCFBEF0977AA0C6B7B0FAED9FAB7C40EC1434175A9AB5B912AE418460DE8CA9041F69CE11A5BD7D85744A6D0FA008
3,291,685 UART: [art] SIG.R = 4238CA222B138F8639576AA35F844374946B444DDB420969E8DE2CF193F051A32DB87CAB2032A46BF24503F077D2D58C
3,298,447 UART: [art] SIG.S = AE1935F1BC8FD695C55F5557EA6E4EB1D8F452CF9E5E8E948E3EA49CCC27E8D8577D22D2954F1EF65BCCBC4F9B0D1124
3,322,238 UART: Caliptra RT
3,322,581 UART: [state] CFI Enabled
3,442,620 UART: [rt] RT listening for mailbox commands...
3,443,290 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,012 UART: [rt]cmd =0x4c444556, len=4
3,483,516 >>> mbox cmd response data (687 bytes)
3,483,517 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,838 UART: [rt]cmd =0x43455246, len=4
3,524,787 >>> mbox cmd response data (888 bytes)
3,524,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,049 UART: [rt]cmd =0x43455252, len=4
3,564,890 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,684 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,374 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,169,859 UART: [cold-reset] ++
1,170,329 UART: [fht] FHT @ 0x50003400
1,173,021 UART: [idev] ++
1,173,189 UART: [idev] CDI.KEYID = 6
1,173,550 UART: [idev] SUBJECT.KEYID = 7
1,173,975 UART: [idev] UDS.KEYID = 0
1,182,034 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,460 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,168 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,053 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,759 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,188 UART: [idev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
1,299,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,566 UART: [idev] --
1,300,433 UART: [ldev] ++
1,300,601 UART: [ldev] CDI.KEYID = 6
1,300,965 UART: [ldev] SUBJECT.KEYID = 5
1,301,392 UART: [ldev] AUTHORITY.KEYID = 7
1,301,855 UART: [ldev] FE.KEYID = 1
1,307,061 UART: [ldev] Erasing FE.KEYID = 1
1,333,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,763 UART: [ldev] --
1,373,126 UART: [fwproc] Wait for Commands...
1,373,911 UART: [fwproc] Recv command 0x46574c44
1,374,644 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,008 >>> mbox cmd response: success
2,920,106 UART: [afmc] ++
2,920,274 UART: [afmc] CDI.KEYID = 6
2,920,637 UART: [afmc] SUBJECT.KEYID = 7
2,921,063 UART: [afmc] AUTHORITY.KEYID = 5
2,957,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,895 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,596 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,313 UART: [afmc] --
3,000,342 UART: [cold-reset] --
3,001,216 UART: [state] Locking Datavault
3,002,579 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,183 UART: [state] Locking ICCM
3,003,697 UART: [exit] Launching FMC @ 0x40000130
3,009,027 UART:
3,009,043 UART: Running Caliptra FMC ...
3,009,451 UART:
3,009,594 UART: [state] CFI Enabled
3,020,132 UART: [fht] FMC Alias Private Key: 7
3,139,476 UART: [art] Extend RT PCRs Done
3,139,904 UART: [art] Lock RT PCRs Done
3,141,240 UART: [art] Populate DV Done
3,149,519 UART: [fht] FMC Alias Private Key: 7
3,150,471 UART: [art] Derive CDI
3,150,751 UART: [art] Store in slot 0x4
3,236,602 UART: [art] Derive Key Pair
3,236,962 UART: [art] Store priv key in slot 0x5
3,250,460 UART: [art] Derive Key Pair - Done
3,265,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,694 UART: [art] PUB.X = 256CDA0BC745E0BC880BF77079C6BF0EA1EDEE98D6BC034BD66F303C95D10642DAFC5EB27773FCB16171529C73E87882
3,288,463 UART: [art] PUB.Y = 3FC3925DB2008EEFB91E698FA2116AD95A1C60166BF98BA4C8E9CAA28335F067C8613A37262808372819C4E221863B44
3,295,386 UART: [art] SIG.R = 5005DFB42035B021EB3F865FCED1BAB8360DAB08156910D4B766F6947D5252AA731B6BA2946F9E76437A73D676F0A4EB
3,302,153 UART: [art] SIG.S = 57C6368E4C162BFB5044560D740E7F1D4C91E92F4E68C8E66F87ED71D6EDF26E2B27FD2414E16CE1C2BF7CC580E71A96
3,325,141 UART: Caliptra RT
3,325,484 UART: [state] CFI Enabled
3,445,692 UART: [rt] RT listening for mailbox commands...
3,446,362 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,206 UART: [rt]cmd =0x4c444556, len=4
3,486,716 >>> mbox cmd response data (687 bytes)
3,486,717 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,136 UART: [rt]cmd =0x43455246, len=4
3,528,165 >>> mbox cmd response data (888 bytes)
3,528,166 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,585 UART: [rt]cmd =0x43455252, len=4
3,568,424 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 922.16s
Truncated 2533977 bytes from beginning
2,760,204 UART: Running Caliptra FMC ...
2,760,612 UART:
2,760,755 UART: [state] CFI Enabled
2,771,585 UART: [fht] FMC Alias Private Key: 7
2,890,563 UART: [art] Extend RT PCRs Done
2,890,991 UART: [art] Lock RT PCRs Done
2,892,447 UART: [art] Populate DV Done
2,900,790 UART: [fht] FMC Alias Private Key: 7
2,901,818 UART: [art] Derive CDI
2,902,098 UART: [art] Store in slot 0x4
2,988,413 UART: [art] Derive Key Pair
2,988,773 UART: [art] Store priv key in slot 0x5
3,002,013 UART: [art] Derive Key Pair - Done
3,016,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,676 UART: [art] PUB.X = 2CA729D0EE12B0B581B4C42BD153FA554C3CE068754F3A985CB0F8AF907843948B6C596505E21CB53179504079EDD84A
3,040,445 UART: [art] PUB.Y = BC1BDFA6F3D12E7960E3AFC71A64D6373CD8C776B3777B91C3171148820B34A4D9E0E5568B5EF08DF0BE666F4831E128
3,047,400 UART: [art] SIG.R = 018BF0AFAB216931BA1BB9B0DA9D53CF2315BE0FC4FC3185CBC88440BD5861F007550099A3A664E2CDBC0881DA10EC4D
3,054,154 UART: [art] SIG.S = CD778C3BCEB9DC8209F3CAD37F2BD16BC2404369334D016FB1ED2534C1E679C368FEFBB059628C36F269E5A4E648002D
3,077,908 UART: Caliptra RT
3,078,251 UART: [state] CFI Enabled
3,198,394 UART: [rt] RT listening for mailbox commands...
3,199,064 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,962 UART: [rt]cmd =0x4c444556, len=4
3,239,264 >>> mbox cmd response data (687 bytes)
3,239,265 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,708 UART: [rt]cmd =0x43455246, len=4
3,280,503 >>> mbox cmd response data (888 bytes)
3,280,504 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,615 UART: [rt]cmd =0x43455252, len=4
3,320,564 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,139 >>> mbox cmd response: success
2,759,382 UART:
2,759,398 UART: Running Caliptra FMC ...
2,759,806 UART:
2,759,949 UART: [state] CFI Enabled
2,770,465 UART: [fht] FMC Alias Private Key: 7
2,889,647 UART: [art] Extend RT PCRs Done
2,890,075 UART: [art] Lock RT PCRs Done
2,891,445 UART: [art] Populate DV Done
2,899,700 UART: [fht] FMC Alias Private Key: 7
2,900,770 UART: [art] Derive CDI
2,901,050 UART: [art] Store in slot 0x4
2,987,117 UART: [art] Derive Key Pair
2,987,477 UART: [art] Store priv key in slot 0x5
3,001,109 UART: [art] Derive Key Pair - Done
3,015,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,378 UART: [art] PUB.X = 2A9D8DD66ED080AD294BAA8AA25591FEC3E1AC173A14ECACF67320B42E7868DEDA7995E904EEAAAF29483BDC83E4CF5B
3,039,173 UART: [art] PUB.Y = 45371B7D5C9E0FECCF3E664325ED321E6804D64DB2074FC881CF593DBF2422115A0D44484F2127085C7F5FD06961FFB8
3,046,112 UART: [art] SIG.R = A7433E8ED3BD62F99CCC159D5B83BE98C94E8EE89B7684A864100CF02225A344B77BA5BA0951E2261C5D18015CFC0216
3,052,876 UART: [art] SIG.S = 5BE3608D7CB15C0B4B2779601F70F72B544D72DBAEEA86E363987ED4B0C77E2FF0B1D9552513E4E8EA389F23702E40C1
3,076,581 UART: Caliptra RT
3,076,924 UART: [state] CFI Enabled
3,196,809 UART: [rt] RT listening for mailbox commands...
3,197,479 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,313 UART: [rt]cmd =0x4c444556, len=4
3,237,813 >>> mbox cmd response data (687 bytes)
3,237,814 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,305 UART: [rt]cmd =0x43455246, len=4
3,279,198 >>> mbox cmd response data (888 bytes)
3,279,199 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,394 UART: [rt]cmd =0x43455252, len=4
3,319,201 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,547 >>> mbox cmd response: success
2,759,458 UART:
2,759,474 UART: Running Caliptra FMC ...
2,759,882 UART:
2,760,025 UART: [state] CFI Enabled
2,770,633 UART: [fht] FMC Alias Private Key: 7
2,889,381 UART: [art] Extend RT PCRs Done
2,889,809 UART: [art] Lock RT PCRs Done
2,891,285 UART: [art] Populate DV Done
2,899,556 UART: [fht] FMC Alias Private Key: 7
2,900,516 UART: [art] Derive CDI
2,900,796 UART: [art] Store in slot 0x4
2,986,319 UART: [art] Derive Key Pair
2,986,679 UART: [art] Store priv key in slot 0x5
3,000,101 UART: [art] Derive Key Pair - Done
3,014,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,160 UART: [art] PUB.X = C13CF9AA9C24F3BAEA9C405DE98F16C3192AD820B18A13D5516C6C4B038B2C27EA9E032FBE58881F57CB99E6278959A5
3,037,936 UART: [art] PUB.Y = 20896036E19DC6D0F821056BE73170D538794F301B9CD235FBCB75DCCE9DFB00966E88F99B6FEE3CF8A71BCE01CCF3D0
3,044,874 UART: [art] SIG.R = 1CFC43A2472D62B7BDF10C2EAB143DB5D3CF88E6F1D3DE0D7DFA684F78239444B69F17618F23E816EDDCF541E7E22C6A
3,051,658 UART: [art] SIG.S = D28B4B5C3C04E30CD7C5F75B6B9CE6DBA193FD9065C4ACD924892C69AC647C05E2336DC239CAD03695038F5BAECC91C1
3,075,578 UART: Caliptra RT
3,075,921 UART: [state] CFI Enabled
3,195,892 UART: [rt] RT listening for mailbox commands...
3,196,562 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,716 UART: [rt]cmd =0x4c444556, len=4
3,237,094 >>> mbox cmd response data (687 bytes)
3,237,095 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,454 UART: [rt]cmd =0x43455246, len=4
3,278,473 >>> mbox cmd response data (888 bytes)
3,278,474 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,951 UART: [rt]cmd =0x43455252, len=4
3,318,738 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,112,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,699,167 >>> mbox cmd response: success
2,760,944 UART:
2,760,960 UART: Running Caliptra FMC ...
2,761,368 UART:
2,761,511 UART: [state] CFI Enabled
2,772,127 UART: [fht] FMC Alias Private Key: 7
2,890,643 UART: [art] Extend RT PCRs Done
2,891,071 UART: [art] Lock RT PCRs Done
2,892,685 UART: [art] Populate DV Done
2,901,010 UART: [fht] FMC Alias Private Key: 7
2,901,996 UART: [art] Derive CDI
2,902,276 UART: [art] Store in slot 0x4
2,987,965 UART: [art] Derive Key Pair
2,988,325 UART: [art] Store priv key in slot 0x5
3,002,067 UART: [art] Derive Key Pair - Done
3,016,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,484 UART: [art] PUB.X = 59C0AE836A47D6256AED02266467F9F00C35EE796983EDE247F93C76CDAA857F65244772E74D50E4F293DED9A5A63C86
3,039,252 UART: [art] PUB.Y = F0A4F4D64F7772D0DAAFEBED1FA3BB35DC8ED4F4C03AC5E95792408488A0C053C30009BC150F7A828486ECE1A7997733
3,046,188 UART: [art] SIG.R = 27196CBB074ABC5D5812A85F3E8DAE664A1A5D337530AB1FEF98919D870D05D095F219514B9EB853ECD3812C8601902E
3,052,950 UART: [art] SIG.S = FF3CD9A6BCE0A1529979725E864798B5293405C4AC40703E16CF881F5F32C0BE95381DEF442371A13FACE9EB23BC13E2
3,077,515 UART: Caliptra RT
3,077,858 UART: [state] CFI Enabled
3,198,319 UART: [rt] RT listening for mailbox commands...
3,198,989 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,719 UART: [rt]cmd =0x4c444556, len=4
3,239,069 >>> mbox cmd response data (687 bytes)
3,239,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,421 UART: [rt]cmd =0x43455246, len=4
3,280,622 >>> mbox cmd response data (888 bytes)
3,280,623 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,078 UART: [rt]cmd =0x43455252, len=4
3,320,951 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,713 >>> mbox cmd response: success
2,759,870 UART:
2,759,886 UART: Running Caliptra FMC ...
2,760,294 UART:
2,760,437 UART: [state] CFI Enabled
2,770,847 UART: [fht] FMC Alias Private Key: 7
2,889,731 UART: [art] Extend RT PCRs Done
2,890,159 UART: [art] Lock RT PCRs Done
2,891,707 UART: [art] Populate DV Done
2,899,996 UART: [fht] FMC Alias Private Key: 7
2,901,170 UART: [art] Derive CDI
2,901,450 UART: [art] Store in slot 0x4
2,987,601 UART: [art] Derive Key Pair
2,987,961 UART: [art] Store priv key in slot 0x5
3,001,047 UART: [art] Derive Key Pair - Done
3,015,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,247 UART: [art] PUB.X = B1DF48F4605E4505C8A01D77ACE9F9954B7C7609CA03065A5CF5A7D616A9AB759163EA8730D98DFDC75EDF09E1C4EEED
3,039,020 UART: [art] PUB.Y = C6F6A6007064336B4F3C9FF29080A1B15CF29E729DEA2A191069225DCC1989FAFC8C088C03B7FC7CBE3CA9AB30684ECD
3,045,958 UART: [art] SIG.R = 5A6CEB0B4E35802DDDB9A3AA4ADCEB48945CA6A7AC2C202D5494DD8C5B831D47E392E69A9F345719ECD5D4982BA7FEF2
3,052,749 UART: [art] SIG.S = F0A2DC15BBFDBA438B22EA88CCA5C39E02251F1826DA5240DFBA2140175A8ECA20E7C9FCBDCB3E5713C6613DB4291492
3,076,508 UART: Caliptra RT
3,076,851 UART: [state] CFI Enabled
3,196,680 UART: [rt] RT listening for mailbox commands...
3,197,350 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,254 UART: [rt]cmd =0x4c444556, len=4
3,237,674 >>> mbox cmd response data (687 bytes)
3,237,675 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,836 UART: [rt]cmd =0x43455246, len=4
3,278,831 >>> mbox cmd response data (888 bytes)
3,278,832 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,399 UART: [rt]cmd =0x43455252, len=4
3,319,302 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 990.13s
Truncated 7329978 bytes from beginning
12CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,323 UART: [idev] --
1,299,396 UART: [ldev] ++
1,299,564 UART: [ldev] CDI.KEYID = 6
1,299,928 UART: [ldev] SUBJECT.KEYID = 5
1,300,355 UART: [ldev] AUTHORITY.KEYID = 7
1,300,818 UART: [ldev] FE.KEYID = 1
1,305,710 UART: [ldev] Erasing FE.KEYID = 1
1,332,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,369,892 UART: [ldev] --
1,371,253 UART: [fwproc] Wait for Commands...
1,371,876 UART: [fwproc] Recv command 0x46574c44
1,372,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,716,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,743,309 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,774,484 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,914,769 >>> mbox cmd response: success
2,915,997 UART: [afmc] ++
2,916,165 UART: [afmc] CDI.KEYID = 6
2,916,528 UART: [afmc] SUBJECT.KEYID = 7
2,916,954 UART: [afmc] AUTHORITY.KEYID = 5
2,952,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,969,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,981,926 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,987,627 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,995,218 UART: [afmc] --
2,996,237 UART: [cold-reset] --
2,997,191 UART: [state] Locking Datavault
2,998,168 UART: [state] Locking PCR0, PCR1 and PCR31
2,998,772 UART: [state] Locking ICCM
2,999,380 UART: [exit] Launching FMC @ 0x40000130
3,004,710 UART:
3,004,726 UART: Running Caliptra FMC ...
3,005,134 UART:
3,005,188 UART: [state] CFI Enabled
3,015,462 UART: [fht] FMC Alias Private Key: 7
3,134,316 UART: [art] Extend RT PCRs Done
3,134,744 UART: [art] Lock RT PCRs Done
3,136,556 UART: [art] Populate DV Done
3,144,727 UART: [fht] FMC Alias Private Key: 7
3,145,813 UART: [art] Derive CDI
3,146,093 UART: [art] Store in slot 0x4
3,232,114 UART: [art] Derive Key Pair
3,232,474 UART: [art] Store priv key in slot 0x5
3,245,514 UART: [art] Derive Key Pair - Done
3,260,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,275,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,276,493 UART: [art] PUB.X = B54F0AD19BB91AC9005E353840C3E2A3CCCAE14CE62BB7AAD7EB602D1EFAAD83514EAAFD42BC90A5391085AF8B344424
3,283,262 UART: [art] PUB.Y = 9FAB0B5C9D4B37422927074D7B3C6393D9E1C6C3E83B21178ADC1D43434FC283948DB63911D409AE8E39BF4B9AB1EB91
3,290,211 UART: [art] SIG.R = 319471628352BD5F69461162972AC4D6A7DBC03C1548322ED8B0879EF234B68153CD7799071285279E075BEC0C15AEFA
3,296,966 UART: [art] SIG.S = A3B422751B9BF02D96EAC79A40CEA597B159DBBCEAB70B9B2F44E305383F178B133BF1FDA9E298DC923713F4DA5005B5
3,320,841 UART: Caliptra RT
3,321,092 UART: [state] CFI Enabled
3,440,989 UART: [rt] RT listening for mailbox commands...
3,441,659 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,661 UART: [rt]cmd =0x4c444556, len=4
3,482,097 >>> mbox cmd response data (687 bytes)
3,482,098 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,289 UART: [rt]cmd =0x43455246, len=4
3,523,412 >>> mbox cmd response data (888 bytes)
3,523,413 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,884 UART: [rt]cmd =0x43455252, len=4
3,563,669 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,216 UART: [kat] SHA2-256
890,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,870 UART: [kat] ++
895,022 UART: [kat] sha1
899,180 UART: [kat] SHA2-256
901,120 UART: [kat] SHA2-384
903,939 UART: [kat] SHA2-512-ACC
905,840 UART: [kat] ECC-384
915,591 UART: [kat] HMAC-384Kdf
920,027 UART: [kat] LMS
1,168,339 UART: [kat] --
1,168,958 UART: [cold-reset] ++
1,169,358 UART: [fht] FHT @ 0x50003400
1,172,172 UART: [idev] ++
1,172,340 UART: [idev] CDI.KEYID = 6
1,172,701 UART: [idev] SUBJECT.KEYID = 7
1,173,126 UART: [idev] UDS.KEYID = 0
1,181,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,007 UART: [idev] Sha1 KeyId Algorithm
1,207,581 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,241 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,949 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,834 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,235,540 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,243,969 UART: [idev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
1,298,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,298,347 UART: [idev] --
1,299,570 UART: [ldev] ++
1,299,738 UART: [ldev] CDI.KEYID = 6
1,300,102 UART: [ldev] SUBJECT.KEYID = 5
1,300,529 UART: [ldev] AUTHORITY.KEYID = 7
1,300,992 UART: [ldev] FE.KEYID = 1
1,306,056 UART: [ldev] Erasing FE.KEYID = 1
1,331,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,362,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,369,912 UART: [ldev] --
1,371,237 UART: [fwproc] Wait for Commands...
1,371,984 UART: [fwproc] Recv command 0x46574c44
1,372,717 UART: [fwproc] Recv'd Img size: 118548 bytes
2,717,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,744,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,775,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,095 >>> mbox cmd response: success
2,917,275 UART: [afmc] ++
2,917,443 UART: [afmc] CDI.KEYID = 6
2,917,806 UART: [afmc] SUBJECT.KEYID = 7
2,918,232 UART: [afmc] AUTHORITY.KEYID = 5
2,953,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,970,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,970,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,976,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,982,590 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,988,291 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,996,178 UART: [afmc] --
2,997,181 UART: [cold-reset] --
2,998,011 UART: [state] Locking Datavault
2,999,202 UART: [state] Locking PCR0, PCR1 and PCR31
2,999,806 UART: [state] Locking ICCM
3,000,384 UART: [exit] Launching FMC @ 0x40000130
3,005,714 UART:
3,005,730 UART: Running Caliptra FMC ...
3,006,138 UART:
3,006,192 UART: [state] CFI Enabled
3,016,642 UART: [fht] FMC Alias Private Key: 7
3,135,654 UART: [art] Extend RT PCRs Done
3,136,082 UART: [art] Lock RT PCRs Done
3,137,854 UART: [art] Populate DV Done
3,146,291 UART: [fht] FMC Alias Private Key: 7
3,147,461 UART: [art] Derive CDI
3,147,741 UART: [art] Store in slot 0x4
3,233,940 UART: [art] Derive Key Pair
3,234,300 UART: [art] Store priv key in slot 0x5
3,247,378 UART: [art] Derive Key Pair - Done
3,262,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,278,047 UART: [art] PUB.X = 291E973A87B17F0058EE8AC38E1A592F9DBD3BD812087AFC882EADDAAEBDD4DA238D8346451094317099C6D47C2AF2EC
3,284,808 UART: [art] PUB.Y = 31C550DCA6D56609E506E68BAA7B879CB0CFE73089A31252E8097D7C017EBC0056E1DDCE88118B58D0550A9029568FDD
3,291,727 UART: [art] SIG.R = D5D76A92E23A6B05F55545B9503C2EFE9FE05D952FF844A0406438FBBF6D53304172FD17D3691ACDF37EBA95E98E4DCF
3,298,508 UART: [art] SIG.S = 140E60BF854624AA67B253A24B1414F62B8C3D92071B9D6932D13460B455247EB0FF5F23B6AD643D1B24E5C82E5AE470
3,322,696 UART: Caliptra RT
3,322,947 UART: [state] CFI Enabled
3,442,910 UART: [rt] RT listening for mailbox commands...
3,443,580 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,356 UART: [rt]cmd =0x4c444556, len=4
3,483,668 >>> mbox cmd response data (687 bytes)
3,483,669 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,998 UART: [rt]cmd =0x43455246, len=4
3,524,861 >>> mbox cmd response data (888 bytes)
3,524,862 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,283 UART: [rt]cmd =0x43455252, len=4
3,565,168 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1012.38s
Truncated 2533977 bytes from beginning
2,760,841 UART: Running Caliptra FMC ...
2,761,249 UART:
2,761,303 UART: [state] CFI Enabled
2,771,963 UART: [fht] FMC Alias Private Key: 7
2,891,399 UART: [art] Extend RT PCRs Done
2,891,827 UART: [art] Lock RT PCRs Done
2,893,413 UART: [art] Populate DV Done
2,901,602 UART: [fht] FMC Alias Private Key: 7
2,902,740 UART: [art] Derive CDI
2,903,020 UART: [art] Store in slot 0x4
2,989,155 UART: [art] Derive Key Pair
2,989,515 UART: [art] Store priv key in slot 0x5
3,003,141 UART: [art] Derive Key Pair - Done
3,018,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,753 UART: [art] PUB.X = 31297AB981484584182916CD8BDF9D5BAA76E9B267A4D34D4E9961E5B397012F5D615F05F4DD21615425D978CB96DDE4
3,040,517 UART: [art] PUB.Y = 777D6C5E84B54C31E15D02D7787791503D3C5304EBDB8A33041AA3182488B70D3BD5B7358FB744AB10CD692C8DDF25F1
3,047,459 UART: [art] SIG.R = BE93E9809900A19EEFDA128A06956126766FA283734195B461C152666550D53CB9C88B1BCB8F14676EA65AAFF0A5E15A
3,054,206 UART: [art] SIG.S = DAECE6D579CEB19D905F4BC1E0C43993128E132205DC64B8D0AB64AE8A58E9DD553E64B915B6A3C50F1DFB45B7BC9005
3,077,931 UART: Caliptra RT
3,078,182 UART: [state] CFI Enabled
3,198,106 UART: [rt] RT listening for mailbox commands...
3,198,776 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,644 UART: [rt]cmd =0x4c444556, len=4
3,239,160 >>> mbox cmd response data (687 bytes)
3,239,161 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,780 UART: [rt]cmd =0x43455246, len=4
3,280,737 >>> mbox cmd response data (888 bytes)
3,280,738 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,051 UART: [rt]cmd =0x43455252, len=4
3,320,627 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,696,310 >>> mbox cmd response: success
2,756,847 UART:
2,756,863 UART: Running Caliptra FMC ...
2,757,271 UART:
2,757,325 UART: [state] CFI Enabled
2,767,979 UART: [fht] FMC Alias Private Key: 7
2,886,977 UART: [art] Extend RT PCRs Done
2,887,405 UART: [art] Lock RT PCRs Done
2,889,109 UART: [art] Populate DV Done
2,897,420 UART: [fht] FMC Alias Private Key: 7
2,898,356 UART: [art] Derive CDI
2,898,636 UART: [art] Store in slot 0x4
2,984,921 UART: [art] Derive Key Pair
2,985,281 UART: [art] Store priv key in slot 0x5
2,998,269 UART: [art] Derive Key Pair - Done
3,013,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,871 UART: [art] PUB.X = 57EC53EFD1155657288A722C088226BA93A77C1CF216BC537C053C947E464CB88A438295BE3CF191CF4CA2BC86A69251
3,035,637 UART: [art] PUB.Y = 708AD3F52E98A97B13AF5BE32AF7C1B87ADACAF6754E096B262D23458BDC7085CF769098BAAFCC796940AC3409B61FDA
3,042,599 UART: [art] SIG.R = 3641A09927C772E8AD0DACA441D1B48741E13B724B2AFC3DBC37D75E3B8DD22981CFFECA14E718E22850704A1FCEB0F5
3,049,382 UART: [art] SIG.S = DAC51CD4EBD5FE7F8678CDDAC9CA438D907B1D95E206F06DE6EF064FB071BFD6BFA786DC603CE482BC623379DA1C66E4
3,073,320 UART: Caliptra RT
3,073,571 UART: [state] CFI Enabled
3,192,690 UART: [rt] RT listening for mailbox commands...
3,193,360 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,484 UART: [rt]cmd =0x4c444556, len=4
3,234,096 >>> mbox cmd response data (687 bytes)
3,234,097 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,484 UART: [rt]cmd =0x43455246, len=4
3,275,681 >>> mbox cmd response data (888 bytes)
3,275,682 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,049 UART: [rt]cmd =0x43455252, len=4
3,315,902 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,296 >>> mbox cmd response: success
2,760,859 UART:
2,760,875 UART: Running Caliptra FMC ...
2,761,283 UART:
2,761,337 UART: [state] CFI Enabled
2,771,981 UART: [fht] FMC Alias Private Key: 7
2,890,477 UART: [art] Extend RT PCRs Done
2,890,905 UART: [art] Lock RT PCRs Done
2,892,603 UART: [art] Populate DV Done
2,900,790 UART: [fht] FMC Alias Private Key: 7
2,901,748 UART: [art] Derive CDI
2,902,028 UART: [art] Store in slot 0x4
2,988,013 UART: [art] Derive Key Pair
2,988,373 UART: [art] Store priv key in slot 0x5
3,001,393 UART: [art] Derive Key Pair - Done
3,016,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,278 UART: [art] PUB.X = D4244A5ED5148DC5E6048D4313E939A581438CEB02D56D228DD0D9D3FB5A8357A7AA32B0BC7354C098EFF879058E9153
3,039,043 UART: [art] PUB.Y = 4552D743915F401B8BB3F4E3F4D7B2C48A62CDC39B8D8B919B88B7F114F340F84CBF66174D4E2E8391E1A177CF96FC4B
3,046,003 UART: [art] SIG.R = 9680B70C84E53A314F1D735D1B87292F44C4A8E45106C82224FCF1910D0F303390DB1ED39C94903506764357B0075ABE
3,052,747 UART: [art] SIG.S = E04E8563D11544A8864328E73F1954BF09FABE1B4D84730A83693933ED2266CD0B4C870FE5D1ACADCA196AD722642371
3,076,665 UART: Caliptra RT
3,076,916 UART: [state] CFI Enabled
3,197,164 UART: [rt] RT listening for mailbox commands...
3,197,834 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,530 UART: [rt]cmd =0x4c444556, len=4
3,237,882 >>> mbox cmd response data (687 bytes)
3,237,883 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,040 UART: [rt]cmd =0x43455246, len=4
3,278,997 >>> mbox cmd response data (888 bytes)
3,278,998 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,199 UART: [rt]cmd =0x43455252, len=4
3,319,011 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,516 >>> mbox cmd response: success
2,757,329 UART:
2,757,345 UART: Running Caliptra FMC ...
2,757,753 UART:
2,757,807 UART: [state] CFI Enabled
2,768,359 UART: [fht] FMC Alias Private Key: 7
2,887,209 UART: [art] Extend RT PCRs Done
2,887,637 UART: [art] Lock RT PCRs Done
2,888,919 UART: [art] Populate DV Done
2,897,000 UART: [fht] FMC Alias Private Key: 7
2,897,938 UART: [art] Derive CDI
2,898,218 UART: [art] Store in slot 0x4
2,984,049 UART: [art] Derive Key Pair
2,984,409 UART: [art] Store priv key in slot 0x5
2,997,211 UART: [art] Derive Key Pair - Done
3,012,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,386 UART: [art] PUB.X = DEC2E302F3ACC2FD0E361ED29BFF795ABF98C9EDB90DD66079B66CAC8CE51140B054B988A1D5FE15D4DD39FD50CBD404
3,035,172 UART: [art] PUB.Y = 1236443F6D3D99A9D775307EA2C3A44B1856A7F9B85BC7BB56BDF7837812FEB3C474C1B5E49DE35B957DA47715DD36AE
3,042,132 UART: [art] SIG.R = 84E6608272BC35CAFC9190B05281BDCB0B8536DB9A64F7F53740E9A545EB82025188F4186FEA54E7D2676BB5A2F5051B
3,048,897 UART: [art] SIG.S = FB5B80110B0010E086CEF8164DE583A9578AF8D56826AF50DE16F54675B57554FA356A6897671734DB1D787964DB8556
3,072,870 UART: Caliptra RT
3,073,121 UART: [state] CFI Enabled
3,191,881 UART: [rt] RT listening for mailbox commands...
3,192,551 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,569 UART: [rt]cmd =0x4c444556, len=4
3,232,945 >>> mbox cmd response data (687 bytes)
3,232,946 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,262,347 UART: [rt]cmd =0x43455246, len=4
3,274,444 >>> mbox cmd response data (888 bytes)
3,274,445 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,926 UART: [rt]cmd =0x43455252, len=4
3,314,654 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,404 >>> mbox cmd response: success
2,760,473 UART:
2,760,489 UART: Running Caliptra FMC ...
2,760,897 UART:
2,760,951 UART: [state] CFI Enabled
2,771,325 UART: [fht] FMC Alias Private Key: 7
2,890,075 UART: [art] Extend RT PCRs Done
2,890,503 UART: [art] Lock RT PCRs Done
2,892,179 UART: [art] Populate DV Done
2,900,438 UART: [fht] FMC Alias Private Key: 7
2,901,540 UART: [art] Derive CDI
2,901,820 UART: [art] Store in slot 0x4
2,987,783 UART: [art] Derive Key Pair
2,988,143 UART: [art] Store priv key in slot 0x5
3,001,655 UART: [art] Derive Key Pair - Done
3,016,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,282 UART: [art] PUB.X = 655344E6042E2B8A19F898C184BABEB97E1634B00418C99000993BB4ED3CA0EED30D141A19CCFB00D8B68BD12DEB0EC5
3,039,010 UART: [art] PUB.Y = D73149DCB34B5B755FDDEC4D35E36AD1A9FCD614AF15C7D1A11C62EAE7804671DA48F7FD99D236AD323808003CB5F3C8
3,045,953 UART: [art] SIG.R = CD015463D1C9EDC9A02245D08629EF7F8C213169D5F834DCDB9978529E56560767F504990AB90C584DC66650E34C734C
3,052,704 UART: [art] SIG.S = 3F6D9C97EFF6509A760AFC3D9C1CE2AC9A144F7286232F81B5C6047ED205E4B2FF9DE940459D9081758677F4F1469292
3,076,533 UART: Caliptra RT
3,076,784 UART: [state] CFI Enabled
3,196,035 UART: [rt] RT listening for mailbox commands...
3,196,705 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,647 UART: [rt]cmd =0x4c444556, len=4
3,237,243 >>> mbox cmd response data (687 bytes)
3,237,244 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,685 UART: [rt]cmd =0x43455246, len=4
3,278,772 >>> mbox cmd response data (888 bytes)
3,278,773 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,238 UART: [rt]cmd =0x43455252, len=4
3,319,025 >>> mbox cmd response data (783 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 979.21s
Truncated 7329977 bytes from beginning
512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,299,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,230 UART: [idev] --
1,300,271 UART: [ldev] ++
1,300,439 UART: [ldev] CDI.KEYID = 6
1,300,803 UART: [ldev] SUBJECT.KEYID = 5
1,301,230 UART: [ldev] AUTHORITY.KEYID = 7
1,301,693 UART: [ldev] FE.KEYID = 1
1,306,745 UART: [ldev] Erasing FE.KEYID = 1
1,333,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,545 UART: [ldev] --
1,372,936 UART: [fwproc] Wait for Commands...
1,373,713 UART: [fwproc] Recv command 0x46574c44
1,374,446 UART: [fwproc] Recv'd Img size: 118548 bytes
2,719,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,746,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,039 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,446 >>> mbox cmd response: success
2,919,686 UART: [afmc] ++
2,919,854 UART: [afmc] CDI.KEYID = 6
2,920,217 UART: [afmc] SUBJECT.KEYID = 7
2,920,643 UART: [afmc] AUTHORITY.KEYID = 5
2,956,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,078 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,959 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,660 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,617 UART: [afmc] --
2,999,552 UART: [cold-reset] --
3,000,436 UART: [state] Locking Datavault
3,001,679 UART: [state] Locking PCR0, PCR1 and PCR31
3,002,283 UART: [state] Locking ICCM
3,002,717 UART: [exit] Launching FMC @ 0x40000130
3,008,047 UART:
3,008,063 UART: Running Caliptra FMC ...
3,008,471 UART:
3,008,614 UART: [state] CFI Enabled
3,019,462 UART: [fht] FMC Alias Private Key: 7
3,138,708 UART: [art] Extend RT PCRs Done
3,139,136 UART: [art] Lock RT PCRs Done
3,140,492 UART: [art] Populate DV Done
3,148,751 UART: [fht] FMC Alias Private Key: 7
3,149,679 UART: [art] Derive CDI
3,149,959 UART: [art] Store in slot 0x4
3,235,590 UART: [art] Derive Key Pair
3,235,950 UART: [art] Store priv key in slot 0x5
3,249,416 UART: [art] Derive Key Pair - Done
3,264,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,662 UART: [art] PUB.X = BDCB8BF866E624761EB18002D1DA51D8EA658093D7E2FEA05641A0702744059166184F854ACD294C83A83E28DB40A228
3,287,426 UART: [art] PUB.Y = 8611BF2F44445F2E0D522CD872385EA888153E7C99E75B05802BCD2ECA6111553C3B99E2B5FCD8C436EA56E96CC4279D
3,294,376 UART: [art] SIG.R = EF8F527499B7C91CD468A43B049ADEBB3D99D2EEE5CA236308D024E2F54BFF8910CBF442D74E727DA693D5AF8FE1D84E
3,301,160 UART: [art] SIG.S = FD69C0A9A6A6C5C590BBF8D9D34DFAE2F01E653C5507343D63DACB111356735880F4A0520CAE32C5DEC606886A947F3D
3,324,981 UART: Caliptra RT
3,325,324 UART: [state] CFI Enabled
3,445,278 UART: [rt] RT listening for mailbox commands...
3,445,948 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,844 UART: [rt]cmd =0x4c444556, len=4
3,486,360 >>> mbox cmd response data (687 bytes)
3,486,361 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,762 UART: [rt]cmd =0x43455246, len=4
3,527,949 >>> mbox cmd response data (888 bytes)
3,527,950 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,185 UART: [rt]cmd =0x43455252, len=4
3,567,855 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,086 UART: [kat] HMAC-384Kdf
920,776 UART: [kat] LMS
1,169,088 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,625 UART: [idev] ++
1,172,793 UART: [idev] CDI.KEYID = 6
1,173,154 UART: [idev] SUBJECT.KEYID = 7
1,173,579 UART: [idev] UDS.KEYID = 0
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,199,026 UART: [idev] Sha1 KeyId Algorithm
1,208,880 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,778 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,486 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,371 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,237,077 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,506 UART: [idev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
1,299,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,884 UART: [idev] --
1,301,179 UART: [ldev] ++
1,301,347 UART: [ldev] CDI.KEYID = 6
1,301,711 UART: [ldev] SUBJECT.KEYID = 5
1,302,138 UART: [ldev] AUTHORITY.KEYID = 7
1,302,601 UART: [ldev] FE.KEYID = 1
1,307,851 UART: [ldev] Erasing FE.KEYID = 1
1,334,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,843 UART: [ldev] --
1,374,172 UART: [fwproc] Wait for Commands...
1,374,915 UART: [fwproc] Recv command 0x46574c44
1,375,648 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,779,173 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,354 >>> mbox cmd response: success
2,920,458 UART: [afmc] ++
2,920,626 UART: [afmc] CDI.KEYID = 6
2,920,989 UART: [afmc] SUBJECT.KEYID = 7
2,921,415 UART: [afmc] AUTHORITY.KEYID = 5
2,957,430 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,741 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,490 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,200 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,986,081 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,782 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,789 UART: [afmc] --
3,000,720 UART: [cold-reset] --
3,001,732 UART: [state] Locking Datavault
3,002,793 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,397 UART: [state] Locking ICCM
3,004,017 UART: [exit] Launching FMC @ 0x40000130
3,009,347 UART:
3,009,363 UART: Running Caliptra FMC ...
3,009,771 UART:
3,009,914 UART: [state] CFI Enabled
3,020,794 UART: [fht] FMC Alias Private Key: 7
3,140,154 UART: [art] Extend RT PCRs Done
3,140,582 UART: [art] Lock RT PCRs Done
3,142,124 UART: [art] Populate DV Done
3,150,427 UART: [fht] FMC Alias Private Key: 7
3,151,533 UART: [art] Derive CDI
3,151,813 UART: [art] Store in slot 0x4
3,237,322 UART: [art] Derive Key Pair
3,237,682 UART: [art] Store priv key in slot 0x5
3,250,536 UART: [art] Derive Key Pair - Done
3,265,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,539 UART: [art] PUB.X = EC181CA42984C24E6ACF0C05B3D6A264F9F6C8EB284B078131893A913E35AAF55D62C25A597CA9249DEBE6256C702E6B
3,288,310 UART: [art] PUB.Y = 01878CF6FAF30B32F2B682CA80F34B4806BBEE9FCC1DD7B9F1B0468FF33328B89CA96B8BB8EF360D912209A5E8EAB6CB
3,295,267 UART: [art] SIG.R = D8800E780DAFA99D3786DFE3673435D5AE1379D6BF4147A57A9536F8CCC5422698568B8AB38AA76029D05733CD87E4CD
3,302,035 UART: [art] SIG.S = 89DE0130E0DD3549D59E0510600081B99E363D0C85421B045B89A13590AA211CE5948E80375D8A7A3ED2A5084D0EFB43
3,326,007 UART: Caliptra RT
3,326,350 UART: [state] CFI Enabled
3,446,406 UART: [rt] RT listening for mailbox commands...
3,447,076 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,806 UART: [rt]cmd =0x4c444556, len=4
3,487,190 >>> mbox cmd response data (687 bytes)
3,487,191 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,588 UART: [rt]cmd =0x43455246, len=4
3,528,437 >>> mbox cmd response data (888 bytes)
3,528,438 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,883 UART: [rt]cmd =0x43455252, len=4
3,568,521 >>> mbox cmd response data (784 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 925.58s
Truncated 2533977 bytes from beginning
2,760,832 UART: Running Caliptra FMC ...
2,761,240 UART:
2,761,383 UART: [state] CFI Enabled
2,772,363 UART: [fht] FMC Alias Private Key: 7
2,891,307 UART: [art] Extend RT PCRs Done
2,891,735 UART: [art] Lock RT PCRs Done
2,893,399 UART: [art] Populate DV Done
2,901,932 UART: [fht] FMC Alias Private Key: 7
2,903,002 UART: [art] Derive CDI
2,903,282 UART: [art] Store in slot 0x4
2,988,905 UART: [art] Derive Key Pair
2,989,265 UART: [art] Store priv key in slot 0x5
3,002,105 UART: [art] Derive Key Pair - Done
3,017,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,951 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,716 UART: [art] PUB.X = 8520B02E7BA0A70BA9D63FDF50AC324486C1F4C148FE24858FBB1C74E139578558562265790C5E4301733DE4E4E6F25D
3,040,477 UART: [art] PUB.Y = DF925F2FF7DF657FC5A5E986BB5E160AD1DF289CD1EEB6EF42CAE84970277384ABE4D75D119F49655A7ECF22C6C5ADD2
3,047,448 UART: [art] SIG.R = F1D458A698B469340AE1478B4ED34743695FC2768005046030F0AA93FF375B6BB0ADB12E18E992B0A1802055B44CAF85
3,054,207 UART: [art] SIG.S = 5DAEAD05746240C8F323659B7CE45D0BF6E91D344659AEAAEEAEF57F10DF2D9598DB9C138795292CC0227EE6149239B3
3,077,869 UART: Caliptra RT
3,078,212 UART: [state] CFI Enabled
3,197,873 UART: [rt] RT listening for mailbox commands...
3,198,543 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,228,385 UART: [rt]cmd =0x4c444556, len=4
3,238,805 >>> mbox cmd response data (687 bytes)
3,238,806 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,031 UART: [rt]cmd =0x43455246, len=4
3,280,002 >>> mbox cmd response data (888 bytes)
3,280,003 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,314 UART: [rt]cmd =0x43455252, len=4
3,320,209 >>> mbox cmd response data (783 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,009 >>> mbox cmd response: success
2,758,324 UART:
2,758,340 UART: Running Caliptra FMC ...
2,758,748 UART:
2,758,891 UART: [state] CFI Enabled
2,769,775 UART: [fht] FMC Alias Private Key: 7
2,889,105 UART: [art] Extend RT PCRs Done
2,889,533 UART: [art] Lock RT PCRs Done
2,890,821 UART: [art] Populate DV Done
2,899,128 UART: [fht] FMC Alias Private Key: 7
2,900,174 UART: [art] Derive CDI
2,900,454 UART: [art] Store in slot 0x4
2,986,397 UART: [art] Derive Key Pair
2,986,757 UART: [art] Store priv key in slot 0x5
3,000,083 UART: [art] Derive Key Pair - Done
3,014,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,727 UART: [art] PUB.X = 6F9A95D26F5E0A9F4D8FAE53C7399E7C460D1A75422763A45CC779BE19B7784E12AB89802DCB8763E0F6FF90B1A39161
3,037,497 UART: [art] PUB.Y = 6A0A681831237E9131904C38CDAE88581D81947CB6B33FC41F25C0C26CFE474E3C47291BE3A6FB31E6EB725242A65690
3,044,444 UART: [art] SIG.R = 7EB2E6DF1487FEDC68132BB1DEC2EF518C258049C647EE438B980DA2BD45DA0E61E126B0B49AA58853BD353EB9973E81
3,051,222 UART: [art] SIG.S = 4388CA1432EDDCE21027DEF026CCA684669F723EB1009E018274CDF56F5F5F1E014DE3BB66EAF637A62CC781D29D3E7F
3,075,022 UART: Caliptra RT
3,075,365 UART: [state] CFI Enabled
3,196,543 UART: [rt] RT listening for mailbox commands...
3,197,213 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,133 UART: [rt]cmd =0x4c444556, len=4
3,237,623 >>> mbox cmd response data (687 bytes)
3,237,624 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,941 UART: [rt]cmd =0x43455246, len=4
3,278,992 >>> mbox cmd response data (888 bytes)
3,278,993 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,430 UART: [rt]cmd =0x43455252, len=4
3,319,211 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,551 >>> mbox cmd response: success
2,760,126 UART:
2,760,142 UART: Running Caliptra FMC ...
2,760,550 UART:
2,760,693 UART: [state] CFI Enabled
2,771,239 UART: [fht] FMC Alias Private Key: 7
2,890,747 UART: [art] Extend RT PCRs Done
2,891,175 UART: [art] Lock RT PCRs Done
2,892,761 UART: [art] Populate DV Done
2,901,020 UART: [fht] FMC Alias Private Key: 7
2,902,050 UART: [art] Derive CDI
2,902,330 UART: [art] Store in slot 0x4
2,988,185 UART: [art] Derive Key Pair
2,988,545 UART: [art] Store priv key in slot 0x5
3,001,747 UART: [art] Derive Key Pair - Done
3,016,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,220 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,985 UART: [art] PUB.X = B8DA335850AC3C31D46DFCB2C249C9A205932702988BD86309D68C0D9D41DC6DB77781AF4E5463258851E37DD4C48FCF
3,039,749 UART: [art] PUB.Y = 997266A87754D6CFC1AF17A1D7011F232F144AD7B326013C13234AF74ED30BB42281FF6467C6797267EF87721B0FE182
3,046,683 UART: [art] SIG.R = F6680A39402D50AAC67BA90F40C42FE9F74738ACAEE7D907BCE477C88235AACC5BA0C1FD735F1DDCE52083738FF5127E
3,053,462 UART: [art] SIG.S = EBD6315406E1EFC61DA1E270C527EAB587A1B10AC6E1DC36BBF472E3049CC0C40144F67AF3B0CDEF59CF52F4C61EA423
3,077,108 UART: Caliptra RT
3,077,451 UART: [state] CFI Enabled
3,197,289 UART: [rt] RT listening for mailbox commands...
3,197,959 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,651 UART: [rt]cmd =0x4c444556, len=4
3,238,049 >>> mbox cmd response data (687 bytes)
3,238,050 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,209 UART: [rt]cmd =0x43455246, len=4
3,279,316 >>> mbox cmd response data (888 bytes)
3,279,317 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,830 UART: [rt]cmd =0x43455252, len=4
3,319,602 >>> mbox cmd response data (784 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,067 >>> mbox cmd response: success
2,758,872 UART:
2,758,888 UART: Running Caliptra FMC ...
2,759,296 UART:
2,759,439 UART: [state] CFI Enabled
2,769,709 UART: [fht] FMC Alias Private Key: 7
2,888,981 UART: [art] Extend RT PCRs Done
2,889,409 UART: [art] Lock RT PCRs Done
2,890,941 UART: [art] Populate DV Done
2,899,030 UART: [fht] FMC Alias Private Key: 7
2,900,146 UART: [art] Derive CDI
2,900,426 UART: [art] Store in slot 0x4
2,986,227 UART: [art] Derive Key Pair
2,986,587 UART: [art] Store priv key in slot 0x5
3,000,273 UART: [art] Derive Key Pair - Done
3,015,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,494 UART: [art] PUB.X = 0AD771EEE48FBCE2CD303B982077D71ABEF93F58DB301FD3D458CCCF0BEE4DB2BA04F94900705BF0D720F9F37D46DAB5
3,038,259 UART: [art] PUB.Y = 0A25B1B10A02E75E9D161F41F2407B5B7871B7EDE645F4B527B706B2D21721D5F3AAA028467ABA607766D891B2C5EFA9
3,045,203 UART: [art] SIG.R = 7589BE8E0F0486ACC5C1999416173CEF3B937B52FD52D33F6BB68B1766F70DD1C5EA30DEB5B760214DB39F3D4CAFF99C
3,051,980 UART: [art] SIG.S = 6CA22A458635827C4863AFA2007B57964F81977944B23FC2CEC33CC6850604991ABF7EA4BB74C873DDCD3EA876B7CA42
3,075,824 UART: Caliptra RT
3,076,167 UART: [state] CFI Enabled
3,195,803 UART: [rt] RT listening for mailbox commands...
3,196,473 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,275 UART: [rt]cmd =0x4c444556, len=4
3,236,953 >>> mbox cmd response data (687 bytes)
3,236,954 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,333 UART: [rt]cmd =0x43455246, len=4
3,278,310 >>> mbox cmd response data (888 bytes)
3,278,311 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,580 UART: [rt]cmd =0x43455252, len=4
3,318,401 >>> mbox cmd response data (782 bytes)
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,339 >>> mbox cmd response: success
2,760,752 UART:
2,760,768 UART: Running Caliptra FMC ...
2,761,176 UART:
2,761,319 UART: [state] CFI Enabled
2,771,677 UART: [fht] FMC Alias Private Key: 7
2,891,013 UART: [art] Extend RT PCRs Done
2,891,441 UART: [art] Lock RT PCRs Done
2,892,895 UART: [art] Populate DV Done
2,901,104 UART: [fht] FMC Alias Private Key: 7
2,902,220 UART: [art] Derive CDI
2,902,500 UART: [art] Store in slot 0x4
2,988,075 UART: [art] Derive Key Pair
2,988,435 UART: [art] Store priv key in slot 0x5
3,001,363 UART: [art] Derive Key Pair - Done
3,016,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,311 UART: [art] PUB.X = 23C0C7DA1DB73D2977D5734F21E2150B382359AB82399FA94DE9BC1968F1B4A920900F30E72162B502DC222B5F6140B5
3,039,070 UART: [art] PUB.Y = 5AA42E842C158714BF28BB13A35A02751E731CA870743FC72F287897C03EAE00C6B41C0E4283A341DD2CD50C43142ABF
3,045,993 UART: [art] SIG.R = 1DBF58D70241F2FDFD88CE3E2BAAE6F2E7989C9AEE8B86D56A06BB7A3E07AA5C803E8A214738587805C865CFE4994827
3,052,765 UART: [art] SIG.S = 6C9F5127A4C0D935FE4F3FF4853511FDCAA1FD9084D2BC4E9C27FC490425E28E811D66EC2EA926325B25A826DC652277
3,077,124 UART: Caliptra RT
3,077,467 UART: [state] CFI Enabled
3,197,261 UART: [rt] RT listening for mailbox commands...
3,197,931 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,227,959 UART: [rt]cmd =0x4c444556, len=4
3,238,467 >>> mbox cmd response data (687 bytes)
3,238,468 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,829 UART: [rt]cmd =0x43455246, len=4
3,279,822 >>> mbox cmd response data (888 bytes)
3,279,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,309,268 UART: [rt]cmd =0x43455252, len=4
3,320,205 >>> mbox cmd response data (782 bytes)
test test_idevid_derivation::test_generate_csr_stress ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 887.44s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,677,737 UART: [afmc] --
18,681,893 UART: [cold-reset] --
18,686,458 UART: [state] Locking Datavault
18,692,897 UART: [state] Locking PCR0, PCR1 and PCR31
18,694,596 UART: [state] Locking ICCM
18,696,265 UART: [exit] Launching FMC @ 0x40000130
18,704,681 UART:
18,704,923 UART: Running Caliptra FMC ...
18,706,026 UART:
18,706,199 UART: [state] CFI Enabled
18,761,479 UART: [fht] FMC Alias Private Key: 7
20,528,140 UART: [art] Extend RT PCRs Done
20,529,361 UART: [art] Lock RT PCRs Done
20,531,338 UART: [art] Populate DV Done
20,537,021 UART: [fht] FMC Alias Private Key: 7
20,538,672 UART: [art] Derive CDI
20,539,415 UART: [art] Store in slot 0x4
20,594,343 UART: [art] Derive Key Pair
20,595,379 UART: [art] Store priv key in slot 0x5
23,058,299 UART: [art] Derive Key Pair - Done
23,071,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,783,595 UART: [art] Erasing AUTHORITY.KEYID = 7
24,785,143 UART: [art] PUB.X = 85831A6295DC522B99CC42817C7D34C8B2A3C66B7DA4A597FD96AA50E15AEADD1F4121F79052C6FAD3300E75EAD9A01E
24,792,357 UART: [art] PUB.Y = 1A63EA97818015662B77E9A98F24952C30C702FAB0C9A118C57DC82D6673808EA010F3D39BECBA94D14B78222C250A2B
24,799,606 UART: [art] SIG.R = B800824F2902C5999B0F96402443FFF776A218D5B0AD0A8D41684EDE0622F8CBB27C6E03562EF59F29084B8AEC30E535
24,806,953 UART: [art] SIG.S = 5B72716CE65B572464D057E81BD1D72E473E68E2FF2F6BB1DB74AFC3BC8C001D9C962469A93B1CDC73732AFED5FF99FB
25,785,892 UART: Caliptra RT
25,786,585 UART: [state] CFI Enabled
25,967,785 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,286 UART:
192,645 UART: Running Caliptra ROM ...
193,721 UART:
193,873 UART: [state] CFI Enabled
265,717 UART: [state] LifecycleState = Unprovisioned
267,702 UART: [state] DebugLocked = No
270,464 UART: [state] WD Timer not started. Device not locked for debugging
273,917 UART: [kat] SHA2-256
453,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,324 UART: [kat] ++
464,779 UART: [kat] sha1
475,877 UART: [kat] SHA2-256
478,571 UART: [kat] SHA2-384
483,421 UART: [kat] SHA2-512-ACC
485,816 UART: [kat] ECC-384
2,949,564 UART: [kat] HMAC-384Kdf
2,973,568 UART: [kat] LMS
3,450,042 UART: [kat] --
3,454,539 UART: [cold-reset] ++
3,455,720 UART: [fht] FHT @ 0x50003400
3,466,954 UART: [idev] ++
3,467,523 UART: [idev] CDI.KEYID = 6
3,468,469 UART: [idev] SUBJECT.KEYID = 7
3,469,736 UART: [idev] UDS.KEYID = 0
3,503,106 UART: [idev] Erasing UDS.KEYID = 0
5,988,939 UART: [idev] Sha384 KeyId Algorithm
5,998,958 UART: [idev] --
6,002,950 UART: [ldev] ++
6,003,538 UART: [ldev] CDI.KEYID = 6
6,004,431 UART: [ldev] SUBJECT.KEYID = 5
6,005,651 UART: [ldev] AUTHORITY.KEYID = 7
6,006,818 UART: [ldev] FE.KEYID = 1
6,036,299 UART: [ldev] Erasing FE.KEYID = 1
8,546,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,539 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,326,186 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,346,016 UART: [ldev] --
10,351,886 UART: [fwproc] Wait for Commands...
10,353,739 UART: [fwproc] Recv command 0x46574c44
10,355,736 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,321,226 >>> mbox cmd response: success
14,325,729 UART: [afmc] ++
14,326,315 UART: [afmc] CDI.KEYID = 6
14,327,205 UART: [afmc] SUBJECT.KEYID = 7
14,328,480 UART: [afmc] AUTHORITY.KEYID = 5
16,874,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,324 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,427 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,977 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,400 UART: [afmc] --
18,694,643 UART: [cold-reset] --
18,698,331 UART: [state] Locking Datavault
18,705,480 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,184 UART: [state] Locking ICCM
18,708,558 UART: [exit] Launching FMC @ 0x40000130
18,716,953 UART:
18,717,194 UART: Running Caliptra FMC ...
18,718,235 UART:
18,718,388 UART: [state] CFI Enabled
18,773,292 UART: [fht] FMC Alias Private Key: 7
20,540,020 UART: [art] Extend RT PCRs Done
20,541,239 UART: [art] Lock RT PCRs Done
20,543,110 UART: [art] Populate DV Done
20,548,418 UART: [fht] FMC Alias Private Key: 7
20,549,956 UART: [art] Derive CDI
20,550,714 UART: [art] Store in slot 0x4
20,605,762 UART: [art] Derive Key Pair
20,606,764 UART: [art] Store priv key in slot 0x5
23,069,680 UART: [art] Derive Key Pair - Done
23,082,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,684 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,191 UART: [art] PUB.X = 37447F685E3B0BF7AC5CDB0824B11BCDDB1BA7CC9F1954827868434CD359313335AD97231AE643E51BF840A546793A76
24,804,455 UART: [art] PUB.Y = 295156B3CD78267D35015D4E4788F89EF5050F247AC065E770923941F285F0B4A6326EFD1DD2DA5966526B0F51933618
24,811,696 UART: [art] SIG.R = 4B6EA2FDE9023546D8A998D8C16AB90BF79FC769130DA9D14FCA559CD06378F45F4CF712D8D44E8EA2D869A47D9F2E68
24,819,100 UART: [art] SIG.S = 10683C1D4453A374CF40CB70F37F1FB4D9D59D58D6723B289231E26C8FAB292B45C2A403778D4A985AA2B2D19B0FB6D6
25,798,088 UART: Caliptra RT
25,798,800 UART: [state] CFI Enabled
25,979,729 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
5,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,191 UART:
192,556 UART: Running Caliptra ROM ...
193,736 UART:
193,896 UART: [state] CFI Enabled
263,022 UART: [state] LifecycleState = Unprovisioned
265,002 UART: [state] DebugLocked = No
267,389 UART: [state] WD Timer not started. Device not locked for debugging
271,501 UART: [kat] SHA2-256
451,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,933 UART: [kat] ++
462,382 UART: [kat] sha1
473,758 UART: [kat] SHA2-256
476,424 UART: [kat] SHA2-384
483,436 UART: [kat] SHA2-512-ACC
485,787 UART: [kat] ECC-384
2,949,580 UART: [kat] HMAC-384Kdf
2,970,733 UART: [kat] LMS
3,447,223 UART: [kat] --
3,451,939 UART: [cold-reset] ++
3,453,186 UART: [fht] FHT @ 0x50003400
3,464,874 UART: [idev] ++
3,465,524 UART: [idev] CDI.KEYID = 6
3,466,439 UART: [idev] SUBJECT.KEYID = 7
3,467,658 UART: [idev] UDS.KEYID = 0
3,501,519 UART: [idev] Erasing UDS.KEYID = 0
5,988,667 UART: [idev] Fuse KeyId
5,993,242 UART: [idev] --
5,997,887 UART: [ldev] ++
5,998,461 UART: [ldev] CDI.KEYID = 6
5,999,431 UART: [ldev] SUBJECT.KEYID = 5
6,000,599 UART: [ldev] AUTHORITY.KEYID = 7
6,001,847 UART: [ldev] FE.KEYID = 1
6,035,902 UART: [ldev] Erasing FE.KEYID = 1
8,543,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,769 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,326,190 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,346,729 UART: [ldev] --
10,352,700 UART: [fwproc] Wait for Commands...
10,355,988 UART: [fwproc] Recv command 0x46574c44
10,357,984 UART: [fwproc] Recv'd Img size: 118548 bytes
13,840,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,555 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,443 >>> mbox cmd response: success
14,327,265 UART: [afmc] ++
14,327,859 UART: [afmc] CDI.KEYID = 6
14,328,774 UART: [afmc] SUBJECT.KEYID = 7
14,329,992 UART: [afmc] AUTHORITY.KEYID = 5
16,875,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,139 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,733 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,558 UART: [afmc] --
18,696,108 UART: [cold-reset] --
18,700,460 UART: [state] Locking Datavault
18,705,227 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,028 UART: [state] Locking ICCM
18,708,168 UART: [exit] Launching FMC @ 0x40000130
18,716,571 UART:
18,716,813 UART: Running Caliptra FMC ...
18,717,920 UART:
18,718,088 UART: [state] CFI Enabled
18,776,830 UART: [fht] FMC Alias Private Key: 7
20,543,590 UART: [art] Extend RT PCRs Done
20,544,822 UART: [art] Lock RT PCRs Done
20,546,490 UART: [art] Populate DV Done
20,551,927 UART: [fht] FMC Alias Private Key: 7
20,553,542 UART: [art] Derive CDI
20,554,364 UART: [art] Store in slot 0x4
20,609,521 UART: [art] Derive Key Pair
20,610,526 UART: [art] Store priv key in slot 0x5
23,073,053 UART: [art] Derive Key Pair - Done
23,086,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,263 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,784 UART: [art] PUB.X = 184A1E4AACF4D56F90758F4763367C0FFB168BDC6B57788E9765C34949FB71EF209497312FA3D03B45A1089F1995BFFA
24,808,042 UART: [art] PUB.Y = F96679EFB45134501D7D3002B6198D2C2FE34ED93FF47082F72EA50A2FC690B794DE7649565CBDAE569919035FE05189
24,815,296 UART: [art] SIG.R = 9AAC658A541AD14C521C753C87D253F4C6341100E07AECA1518867010128FED50FCE6FE82081469DF337EAA2C72CA532
24,822,641 UART: [art] SIG.S = DCCFF840BCC9346861A2C25F96EB066A0CF10B7956C49D92D62B820F44563FBDB93FB2AFF056F078DA2E799996823C04
25,801,480 UART: Caliptra RT
25,802,174 UART: [state] CFI Enabled
25,982,510 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
5,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,469 >>> mbox cmd response: success
18,541,177 UART:
18,541,579 UART: Running Caliptra FMC ...
18,542,802 UART:
18,542,986 UART: [state] CFI Enabled
18,605,989 UART: [fht] FMC Alias Private Key: 7
20,372,450 UART: [art] Extend RT PCRs Done
20,373,678 UART: [art] Lock RT PCRs Done
20,375,471 UART: [art] Populate DV Done
20,381,052 UART: [fht] FMC Alias Private Key: 7
20,382,653 UART: [art] Derive CDI
20,383,474 UART: [art] Store in slot 0x4
20,438,893 UART: [art] Derive Key Pair
20,439,896 UART: [art] Store priv key in slot 0x5
22,903,038 UART: [art] Derive Key Pair - Done
22,915,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,309 UART: [art] PUB.X = C984AF60D1DDF2FE9EC3784068AECAA650755BBF6E2B1267C4153E0FB3040A4F18406119231A39FDD8B43130CCD1351D
24,637,587 UART: [art] PUB.Y = 75FCE0A595C8EBFCE8683AB2284A44435DC5FB3113CCBA4B8F3EAAA96750D3E01FF08CBD605B2DDC94830BB094CC3AB3
24,644,890 UART: [art] SIG.R = 62A72AC6B448D731E907B2B85B7529304550BD8E59465E43A6101E26FED0B1A370A79F46DA7D49FD1E335C217853B8AC
24,652,259 UART: [art] SIG.S = 00961B7C59863DE5F0125C1379A04C16BDF05553062F63D905DDB0B852703BB99CE53FA77E2D89613E74F3A928EC6E3A
25,631,600 UART: Caliptra RT
25,632,315 UART: [state] CFI Enabled
25,811,468 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
5,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,211,672 >>> mbox cmd response: success
18,504,362 UART:
18,504,820 UART: Running Caliptra FMC ...
18,506,025 UART:
18,506,203 UART: [state] CFI Enabled
18,572,584 UART: [fht] FMC Alias Private Key: 7
20,338,487 UART: [art] Extend RT PCRs Done
20,339,699 UART: [art] Lock RT PCRs Done
20,341,278 UART: [art] Populate DV Done
20,346,642 UART: [fht] FMC Alias Private Key: 7
20,348,188 UART: [art] Derive CDI
20,349,013 UART: [art] Store in slot 0x4
20,405,044 UART: [art] Derive Key Pair
20,406,116 UART: [art] Store priv key in slot 0x5
22,868,577 UART: [art] Derive Key Pair - Done
22,881,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,593,710 UART: [art] Erasing AUTHORITY.KEYID = 7
24,595,205 UART: [art] PUB.X = D184ADEC4ECE5384D3C019F466745E664AAA0742C99C2A1AAB336A58C80568856C20A3B49F1EA6EBFB49CFFDA761D5F9
24,602,473 UART: [art] PUB.Y = CA1E586820D9C212019CF63BE81794537A089730EEAA2354A5D5782DDBEB939960A2CB7BD676E599734EC0E0733C0BDA
24,609,715 UART: [art] SIG.R = 5BCEB51C0CBEAF087BDF4E728A964FEEA412DC31B50599F3A224182EA1094A50EE9FF5B791B2F13F84C0CE7BED9E0BE9
24,617,130 UART: [art] SIG.S = 32CC4C1B3A7695F4948158A69429E16B12DA7E13961EC8CE7CC628817C9F5B175D39554CFF7A3E0865D279A9CD03DCF8
25,595,720 UART: Caliptra RT
25,596,433 UART: [state] CFI Enabled
25,776,403 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
5,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,615 >>> mbox cmd response: success
18,534,298 UART:
18,534,696 UART: Running Caliptra FMC ...
18,535,908 UART:
18,536,113 UART: [state] CFI Enabled
18,599,250 UART: [fht] FMC Alias Private Key: 7
20,366,089 UART: [art] Extend RT PCRs Done
20,367,325 UART: [art] Lock RT PCRs Done
20,369,079 UART: [art] Populate DV Done
20,374,665 UART: [fht] FMC Alias Private Key: 7
20,376,359 UART: [art] Derive CDI
20,377,119 UART: [art] Store in slot 0x4
20,432,349 UART: [art] Derive Key Pair
20,433,361 UART: [art] Store priv key in slot 0x5
22,896,018 UART: [art] Derive Key Pair - Done
22,908,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,176 UART: [art] PUB.X = 48B86B59B863DFBE9BCF374119C1AF37EBE76CBE26EE00DD2E78F24BC3F1DB726D8DB6DF6B320FF97F0FB9B9C60A48F0
24,631,464 UART: [art] PUB.Y = 7A9B7D67DBCD9598E071633A4391403DC5C977A7E6BB6E6FFEA625155F855C7E973B541A00361700C3971AECA5F15CEE
24,638,710 UART: [art] SIG.R = 3799B6A56F1F4551ADABF50AF836E4D03AAEE65BA1F92550DC86AA286DD2780502B87627D7A5CB5B365FC12BC2171E2E
24,646,157 UART: [art] SIG.S = 947CD95B2DB2713E7106172CADFB9933246749ACE3A7629C2F25C913E1EC20965603121701076ED4160CE147BFC47526
25,625,238 UART: Caliptra RT
25,625,932 UART: [state] CFI Enabled
25,807,577 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
4,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,605 >>> mbox cmd response: success
18,512,497 UART:
18,512,904 UART: Running Caliptra FMC ...
18,514,135 UART:
18,514,313 UART: [state] CFI Enabled
18,579,917 UART: [fht] FMC Alias Private Key: 7
20,346,723 UART: [art] Extend RT PCRs Done
20,347,947 UART: [art] Lock RT PCRs Done
20,349,633 UART: [art] Populate DV Done
20,355,006 UART: [fht] FMC Alias Private Key: 7
20,356,663 UART: [art] Derive CDI
20,357,481 UART: [art] Store in slot 0x4
20,412,044 UART: [art] Derive Key Pair
20,413,084 UART: [art] Store priv key in slot 0x5
22,875,779 UART: [art] Derive Key Pair - Done
22,888,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,030 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,531 UART: [art] PUB.X = D1DED805B6F4B1F2E9C68677D37885B43363811CDFFEC630B84B526EB942B14C820F68F9881904FE663484EA8703FF49
24,609,812 UART: [art] PUB.Y = 7D11C8D95C122E58A68893BDAD5931EAE2065565A5A013F965CCC87445D09090E8434913C68065CF2052315ED9133621
24,617,000 UART: [art] SIG.R = 5D10FB69D27B2C00980EF62524A061EFC839AEB90DDDC193C283B1D064966DD39B490036BC84F7A451976FD5F654FF88
24,624,367 UART: [art] SIG.S = B64D304879564504E1BC63F233DFA2ACB8CC00B70AD44C8424C1E01431482D32DBB9935ADB09DFB0714AB3A156AC8C01
25,603,731 UART: Caliptra RT
25,604,452 UART: [state] CFI Enabled
25,784,895 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8936 bytes from beginning
B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,544 UART: [afmc] --
18,865,550 UART: [cold-reset] --
18,868,604 UART: [state] Locking Datavault
18,874,609 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,378 UART: [state] Locking ICCM
18,877,459 UART: [exit] Launching FMC @ 0x40000130
18,885,860 UART:
18,886,127 UART: Running Caliptra FMC ...
18,887,234 UART:
18,887,398 UART: [state] CFI Enabled
18,895,385 UART: [fht] FMC Alias Private Key: 7
20,661,268 UART: [art] Extend RT PCRs Done
20,662,479 UART: [art] Lock RT PCRs Done
20,663,994 UART: [art] Populate DV Done
20,669,671 UART: [fht] FMC Alias Private Key: 7
20,671,373 UART: [art] Derive CDI
20,672,187 UART: [art] Store in slot 0x4
20,715,101 UART: [art] Derive Key Pair
20,716,138 UART: [art] Store priv key in slot 0x5
23,143,564 UART: [art] Derive Key Pair - Done
23,156,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,949 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,443 UART: [art] PUB.X = 4598FF750ACF0E7078CEE470B21FF7EE30803B219B9FD43CA9EF50D4F5DB87DB38081C142C6849E86263E24855D1EB32
24,871,803 UART: [art] PUB.Y = 9243F0B9A2964695321A1615A4C279FD222465C55F94589A7DAC0B9A91A0FA9F19FFAFB1DC3465715FF92449C1B46AE2
24,879,042 UART: [art] SIG.R = 425940855EB7140A3B3D5159D33F812BE8594D83FBDA889BC3014D84CB07E793E64308A596C43E7BFB3FF190B720AC69
24,886,387 UART: [art] SIG.S = 5B0500B92012EDB17026D9537E063FB8B5E792601F4813EAED9BBC7EAAF11BC2647A05FAA7E786B0EC99352E22C1E45F
25,865,005 UART: Caliptra RT
25,865,720 UART: [state] CFI Enabled
25,999,536 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,105 writing to cptra_bootfsm_go
6,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
193,239 UART:
193,606 UART: Running Caliptra ROM ...
194,717 UART:
604,468 UART: [state] CFI Enabled
618,099 UART: [state] LifecycleState = Unprovisioned
620,063 UART: [state] DebugLocked = No
621,441 UART: [state] WD Timer not started. Device not locked for debugging
624,562 UART: [kat] SHA2-256
804,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,017 UART: [kat] ++
815,558 UART: [kat] sha1
827,953 UART: [kat] SHA2-256
830,641 UART: [kat] SHA2-384
837,958 UART: [kat] SHA2-512-ACC
840,288 UART: [kat] ECC-384
3,283,059 UART: [kat] HMAC-384Kdf
3,293,630 UART: [kat] LMS
3,770,121 UART: [kat] --
3,773,515 UART: [cold-reset] ++
3,775,656 UART: [fht] FHT @ 0x50003400
3,787,169 UART: [idev] ++
3,787,739 UART: [idev] CDI.KEYID = 6
3,788,673 UART: [idev] SUBJECT.KEYID = 7
3,789,935 UART: [idev] UDS.KEYID = 0
3,805,180 UART: [idev] Erasing UDS.KEYID = 0
6,267,158 UART: [idev] Sha384 KeyId Algorithm
6,276,956 UART: [idev] --
6,281,812 UART: [ldev] ++
6,282,435 UART: [ldev] CDI.KEYID = 6
6,283,340 UART: [ldev] SUBJECT.KEYID = 5
6,284,550 UART: [ldev] AUTHORITY.KEYID = 7
6,285,701 UART: [ldev] FE.KEYID = 1
6,295,690 UART: [ldev] Erasing FE.KEYID = 1
8,773,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,493,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,509,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,525,197 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
10,540,836 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
10,562,170 UART: [ldev] --
10,568,033 UART: [fwproc] Wait for Commands...
10,570,120 UART: [fwproc] Recv command 0x46574c44
10,572,135 UART: [fwproc] Recv'd Img size: 118548 bytes
14,056,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,136,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,209,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,536,985 >>> mbox cmd response: success
14,541,726 UART: [afmc] ++
14,542,320 UART: [afmc] CDI.KEYID = 6
14,543,262 UART: [afmc] SUBJECT.KEYID = 7
14,544,474 UART: [afmc] AUTHORITY.KEYID = 5
17,050,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,771,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,774,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,789,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,805,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,821,542 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,845,842 UART: [afmc] --
18,848,865 UART: [cold-reset] --
18,853,644 UART: [state] Locking Datavault
18,858,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,860,433 UART: [state] Locking ICCM
18,862,639 UART: [exit] Launching FMC @ 0x40000130
18,871,087 UART:
18,871,325 UART: Running Caliptra FMC ...
18,872,425 UART:
18,872,578 UART: [state] CFI Enabled
18,880,407 UART: [fht] FMC Alias Private Key: 7
20,646,904 UART: [art] Extend RT PCRs Done
20,648,134 UART: [art] Lock RT PCRs Done
20,649,617 UART: [art] Populate DV Done
20,654,974 UART: [fht] FMC Alias Private Key: 7
20,656,616 UART: [art] Derive CDI
20,657,430 UART: [art] Store in slot 0x4
20,700,478 UART: [art] Derive Key Pair
20,701,482 UART: [art] Store priv key in slot 0x5
23,128,185 UART: [art] Derive Key Pair - Done
23,141,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,847,684 UART: [art] Erasing AUTHORITY.KEYID = 7
24,849,187 UART: [art] PUB.X = D79EE60AB6F2B6A37E51641480D4616D92128E906F3809CAE5C4EEF88327C11CD63CAA57242C5332A29E4AFFE14EB4DD
24,856,430 UART: [art] PUB.Y = 2631565C16AC79D2D06D6EFB268894E414A9B779C683FD1725D4FA1517B8D4C64961CE301601BB9599B5BB5B4664082D
24,863,719 UART: [art] SIG.R = D8874A8B02326D32DD58B6C5B9F0DAC6528291857CFB4D3FC70366709D64C24FCF1745EC51CEBE8B59B3EEF0C5B15B07
24,871,097 UART: [art] SIG.S = 55FB01E0B924C6E9F90551B791CD56CE7746AD7193A183B49A81DAE7B8285267472CD74A8B1840B4F16E3C1847A7CEB5
25,850,667 UART: Caliptra RT
25,851,358 UART: [state] CFI Enabled
25,983,643 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
5,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,764 UART:
193,168 UART: Running Caliptra ROM ...
194,344 UART:
603,597 UART: [state] CFI Enabled
618,061 UART: [state] LifecycleState = Unprovisioned
619,974 UART: [state] DebugLocked = No
621,486 UART: [state] WD Timer not started. Device not locked for debugging
625,968 UART: [kat] SHA2-256
805,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,365 UART: [kat] ++
816,868 UART: [kat] sha1
827,414 UART: [kat] SHA2-256
830,148 UART: [kat] SHA2-384
837,368 UART: [kat] SHA2-512-ACC
839,691 UART: [kat] ECC-384
3,281,367 UART: [kat] HMAC-384Kdf
3,294,360 UART: [kat] LMS
3,770,841 UART: [kat] --
3,774,776 UART: [cold-reset] ++
3,776,544 UART: [fht] FHT @ 0x50003400
3,786,602 UART: [idev] ++
3,787,159 UART: [idev] CDI.KEYID = 6
3,788,153 UART: [idev] SUBJECT.KEYID = 7
3,789,366 UART: [idev] UDS.KEYID = 0
3,806,692 UART: [idev] Erasing UDS.KEYID = 0
6,264,686 UART: [idev] Fuse KeyId
6,269,243 UART: [idev] --
6,273,001 UART: [ldev] ++
6,273,632 UART: [ldev] CDI.KEYID = 6
6,274,553 UART: [ldev] SUBJECT.KEYID = 5
6,275,653 UART: [ldev] AUTHORITY.KEYID = 7
6,276,990 UART: [ldev] FE.KEYID = 1
6,288,176 UART: [ldev] Erasing FE.KEYID = 1
8,763,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,479,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,495,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,511,356 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
10,526,818 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
10,548,657 UART: [ldev] --
10,553,497 UART: [fwproc] Wait for Commands...
10,555,161 UART: [fwproc] Recv command 0x46574c44
10,557,148 UART: [fwproc] Recv'd Img size: 118548 bytes
14,042,977 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,124,585 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,197,601 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,525,904 >>> mbox cmd response: success
14,529,485 UART: [afmc] ++
14,530,068 UART: [afmc] CDI.KEYID = 6
14,531,009 UART: [afmc] SUBJECT.KEYID = 7
14,532,167 UART: [afmc] AUTHORITY.KEYID = 5
17,039,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,760,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,763,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,778,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,794,982 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,810,532 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,836,424 UART: [afmc] --
18,840,549 UART: [cold-reset] --
18,845,871 UART: [state] Locking Datavault
18,852,521 UART: [state] Locking PCR0, PCR1 and PCR31
18,854,278 UART: [state] Locking ICCM
18,857,098 UART: [exit] Launching FMC @ 0x40000130
18,865,485 UART:
18,865,718 UART: Running Caliptra FMC ...
18,866,740 UART:
18,866,882 UART: [state] CFI Enabled
18,874,977 UART: [fht] FMC Alias Private Key: 7
20,641,015 UART: [art] Extend RT PCRs Done
20,642,221 UART: [art] Lock RT PCRs Done
20,643,816 UART: [art] Populate DV Done
20,649,241 UART: [fht] FMC Alias Private Key: 7
20,650,828 UART: [art] Derive CDI
20,651,561 UART: [art] Store in slot 0x4
20,694,417 UART: [art] Derive Key Pair
20,695,456 UART: [art] Store priv key in slot 0x5
23,122,601 UART: [art] Derive Key Pair - Done
23,135,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,842,217 UART: [art] Erasing AUTHORITY.KEYID = 7
24,843,703 UART: [art] PUB.X = A7516330CA5144DEB2551C0995CA764265B10DEF4E774512BAAB6DE9D0C53685B2C573A3F921E40DC07C23B8116981C5
24,851,008 UART: [art] PUB.Y = D458D2FFC77DCA8AD0134B190FD117B1786398D370123C8768FFFA2A97825A026391C349070D6255408C1205775F1E72
24,858,242 UART: [art] SIG.R = 81F6A60E8713DA23A2C76D0BC07503FB980F3B0884FBA18F405CD96EC2AC2D79FBF92D4A42263BE27601AF67126DB576
24,865,631 UART: [art] SIG.S = 940263BD1B5057F29509395ADE4C0AB5050947146D3DA0C706DFE3CFB043ED3B39ABF706E61EC7733EF9E35F0CED1836
25,845,174 UART: Caliptra RT
25,845,882 UART: [state] CFI Enabled
25,978,831 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
6,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,452 >>> mbox cmd response: success
18,698,047 UART:
18,698,454 UART: Running Caliptra FMC ...
18,699,663 UART:
18,699,856 UART: [state] CFI Enabled
18,707,790 UART: [fht] FMC Alias Private Key: 7
20,473,875 UART: [art] Extend RT PCRs Done
20,475,103 UART: [art] Lock RT PCRs Done
20,476,889 UART: [art] Populate DV Done
20,482,525 UART: [fht] FMC Alias Private Key: 7
20,484,065 UART: [art] Derive CDI
20,484,885 UART: [art] Store in slot 0x4
20,527,212 UART: [art] Derive Key Pair
20,528,227 UART: [art] Store priv key in slot 0x5
22,954,915 UART: [art] Derive Key Pair - Done
22,968,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,236 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,738 UART: [art] PUB.X = 83718D7024E1476C6847565B676D45164E86455FEE282F613508E97E279CB12F4E30FFB408CCE05E071DFB5F6E80A204
24,683,001 UART: [art] PUB.Y = 4B9E184AB24224E6CF0F04032184F095A4B3F8927D429B45DAFB6616B17E20BD45DE48062A275BEB23C147C600159A56
24,690,272 UART: [art] SIG.R = C83E89AFC8980D2F639ECB45149F960F52D2A9B8AB1B8CE6F687E7892D8A0063B1A492C4D0B3D08F374E840559B7C3C6
24,697,627 UART: [art] SIG.S = B12318C3620023A7EE549C2073E5B5ABC02B44A94734470A2F9D7376A5ACE8447BFDA544019D131D94F735892C28F5F7
25,676,583 UART: Caliptra RT
25,677,286 UART: [state] CFI Enabled
25,810,074 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
5,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,426,112 >>> mbox cmd response: success
18,678,738 UART:
18,679,143 UART: Running Caliptra FMC ...
18,680,289 UART:
18,680,440 UART: [state] CFI Enabled
18,688,454 UART: [fht] FMC Alias Private Key: 7
20,455,125 UART: [art] Extend RT PCRs Done
20,456,340 UART: [art] Lock RT PCRs Done
20,458,098 UART: [art] Populate DV Done
20,463,501 UART: [fht] FMC Alias Private Key: 7
20,464,984 UART: [art] Derive CDI
20,465,713 UART: [art] Store in slot 0x4
20,508,525 UART: [art] Derive Key Pair
20,509,567 UART: [art] Store priv key in slot 0x5
22,936,465 UART: [art] Derive Key Pair - Done
22,949,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,655,495 UART: [art] Erasing AUTHORITY.KEYID = 7
24,656,979 UART: [art] PUB.X = B69AB57B9AE55F873D8F233DFF9120E622BE8037F9EA55F7B72C53548C35F547CDC4E62C4CD8E133AAC2138BB34A154B
24,664,282 UART: [art] PUB.Y = 14B35610C75770FC3CC508B64DA918FA9BEE5018E166DE04044963551084B078FAF53728188E765E92719B499A3E7AD9
24,671,492 UART: [art] SIG.R = 059BCA949AEB613D132620F59FB9A6655E0A455FC062FF067727962A55C1EA06F322BFAA4ED6AD8945CC71E2591B45E0
24,678,892 UART: [art] SIG.S = D645E55FBC2B98B6CFE0885467F9D92DEF40746E643DA289D656AF0D7BBBBC032E812A740D8EB507644E5BB29BFFED9A
25,657,734 UART: Caliptra RT
25,658,450 UART: [state] CFI Enabled
25,790,872 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
5,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,570 >>> mbox cmd response: success
18,688,748 UART:
18,689,165 UART: Running Caliptra FMC ...
18,690,352 UART:
18,690,513 UART: [state] CFI Enabled
18,698,242 UART: [fht] FMC Alias Private Key: 7
20,464,184 UART: [art] Extend RT PCRs Done
20,465,751 UART: [art] Lock RT PCRs Done
20,466,757 UART: [art] Populate DV Done
20,472,061 UART: [fht] FMC Alias Private Key: 7
20,473,823 UART: [art] Derive CDI
20,474,644 UART: [art] Store in slot 0x4
20,517,160 UART: [art] Derive Key Pair
20,518,163 UART: [art] Store priv key in slot 0x5
22,945,004 UART: [art] Derive Key Pair - Done
22,957,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,829 UART: [art] PUB.X = E6C339AE28E1C6DC41F42410B70504812A1E347FCA3B88AE48B6F5AB66BCE8B9C5679709D38230DE1F1C43746B4B06FD
24,673,089 UART: [art] PUB.Y = 58C7A2B437B1E35543C6307097A8C18C2E9141AD90BFFA69B43C14A9A6EA77594241737B4875DDCDE9304504264F2424
24,680,316 UART: [art] SIG.R = 656593DF728760E1CA8D5739F134AA46813FE3D455F99901883FA2988A5AAEEC2FF790987B3A0B34DAD2918962C0FC43
24,687,752 UART: [art] SIG.S = 6D7DE275493A2E433E0E9762E61E7F46492420CF6872AD1E7601FF8D9FE704C590FA1A70CF7C25F241049C750486A868
25,667,059 UART: Caliptra RT
25,667,748 UART: [state] CFI Enabled
25,802,148 UART: [rt] RT listening for mailbox commands...
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
5,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,421,502 >>> mbox cmd response: success
18,672,392 UART:
18,672,794 UART: Running Caliptra FMC ...
18,674,056 UART:
18,674,232 UART: [state] CFI Enabled
18,682,373 UART: [fht] FMC Alias Private Key: 7
20,448,760 UART: [art] Extend RT PCRs Done
20,449,989 UART: [art] Lock RT PCRs Done
20,451,510 UART: [art] Populate DV Done
20,456,973 UART: [fht] FMC Alias Private Key: 7
20,458,620 UART: [art] Derive CDI
20,459,436 UART: [art] Store in slot 0x4
20,502,198 UART: [art] Derive Key Pair
20,503,231 UART: [art] Store priv key in slot 0x5
22,929,857 UART: [art] Derive Key Pair - Done
22,942,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,648,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,650,160 UART: [art] PUB.X = 56B46CBE99B7A622F61694122E2904F0E43D0153EEC7BC4FBDA8C2674605909B9A1013B1759ED3D68624CDE9AED28D42
24,657,467 UART: [art] PUB.Y = A177D4DC9DEDB86A2170C0E1725A489B4C066CA753A82E3AE19725111FB75CF3F7386AF036869C52AA6177E77557B758
24,664,708 UART: [art] SIG.R = 6A492F7D9DADDAA7CD3275DEB671A47BF804E01589A27290B8D9A901D49FEC07919C8B5532B23A2EB25BD116B1C4D0F9
24,672,120 UART: [art] SIG.S = 569B57169FC6CB17F3FCB2B0BFB6CE2E4AD43AC16F8492D862A353C83DB85C8697762C1A6C37DF3EFDC3DEDD6113254F
25,650,987 UART: Caliptra RT
25,651,724 UART: [state] CFI Enabled
25,784,582 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 5.60s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,892,495 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,110 UART: [afmc] --
2,900,945 UART: [cold-reset] --
2,901,935 UART: [state] Locking Datavault
2,903,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,852 UART: [state] Locking ICCM
2,904,390 UART: [exit] Launching FMC @ 0x40000130
2,909,720 UART:
2,909,736 UART: Running Caliptra FMC ...
2,910,144 UART:
2,910,198 UART: [state] CFI Enabled
2,920,882 UART: [fht] FMC Alias Private Key: 7
3,040,184 UART: [art] Extend RT PCRs Done
3,040,612 UART: [art] Lock RT PCRs Done
3,042,108 UART: [art] Populate DV Done
3,050,291 UART: [fht] FMC Alias Private Key: 7
3,051,351 UART: [art] Derive CDI
3,051,631 UART: [art] Store in slot 0x4
3,137,391 UART: [art] Derive Key Pair
3,137,751 UART: [art] Store priv key in slot 0x5
3,150,880 UART: [art] Derive Key Pair - Done
3,165,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,915 UART: [art] PUB.X = B1CB8585C870DCE16AC4988979CE44B06BB186AAB9562E94AB906100325C894C8CDAC76C02AD0AADF3CE71A71E967157
3,188,669 UART: [art] PUB.Y = B0FB20292343C91F0FA4AF450077A5F2D19C620EB2AE6EABF420F8BE2B134E6E2CA4328DDC1F28AF42C8359DB2603B46
3,195,607 UART: [art] SIG.R = 156C00E82C6739AE10E9BF3DB4115FE128D21F7F754D7513F97798CEA562E9DD63D4A02EF040F2590E5BB7848EB7BC2C
3,202,362 UART: [art] SIG.S = A80485A10E9BFE745730EB41900A1253A709F7D8C1E0A5D13E4913D6B1EC842C19F65AB342BB79DC475C81E32F3AE6B8
3,226,134 UART: Caliptra RT
3,226,385 UART: [state] CFI Enabled
3,346,309 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,633 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,707 UART: [kat] SHA2-512-ACC
906,608 UART: [kat] ECC-384
916,269 UART: [kat] HMAC-384Kdf
920,809 UART: [kat] LMS
1,169,121 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,199,226 UART: [idev] Sha384 KeyId Algorithm
1,203,011 UART: [idev] --
1,203,922 UART: [ldev] ++
1,204,090 UART: [ldev] CDI.KEYID = 6
1,204,454 UART: [ldev] SUBJECT.KEYID = 5
1,204,881 UART: [ldev] AUTHORITY.KEYID = 7
1,205,344 UART: [ldev] FE.KEYID = 1
1,210,446 UART: [ldev] Erasing FE.KEYID = 1
1,236,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,250,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,902 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,624 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,496 UART: [ldev] --
1,275,883 UART: [fwproc] Wait for Commands...
1,276,566 UART: [fwproc] Recv command 0x46574c44
1,277,299 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,599 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,977 >>> mbox cmd response: success
2,821,223 UART: [afmc] ++
2,821,391 UART: [afmc] CDI.KEYID = 6
2,821,754 UART: [afmc] SUBJECT.KEYID = 7
2,822,180 UART: [afmc] AUTHORITY.KEYID = 5
2,857,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,268 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,727 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,885,608 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,309 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,202 UART: [afmc] --
2,900,243 UART: [cold-reset] --
2,901,203 UART: [state] Locking Datavault
2,902,332 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,936 UART: [state] Locking ICCM
2,903,398 UART: [exit] Launching FMC @ 0x40000130
2,908,728 UART:
2,908,744 UART: Running Caliptra FMC ...
2,909,152 UART:
2,909,206 UART: [state] CFI Enabled
2,919,558 UART: [fht] FMC Alias Private Key: 7
3,038,410 UART: [art] Extend RT PCRs Done
3,038,838 UART: [art] Lock RT PCRs Done
3,040,690 UART: [art] Populate DV Done
3,048,845 UART: [fht] FMC Alias Private Key: 7
3,049,981 UART: [art] Derive CDI
3,050,261 UART: [art] Store in slot 0x4
3,135,899 UART: [art] Derive Key Pair
3,136,259 UART: [art] Store priv key in slot 0x5
3,149,142 UART: [art] Derive Key Pair - Done
3,164,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,789 UART: [art] PUB.X = 7FAE0869489AD0D8E2C712F213C60A831E0A2F71A16B1A0590732339A8319A367C8DCA2ECCC167D825939371D143D12E
3,187,547 UART: [art] PUB.Y = D7F3B771B24405EEA98121FD5139E7F89509DBD5F91AAC838A65870683DF0702C986ECB06837061C5539ECDA25CA23C4
3,194,483 UART: [art] SIG.R = 792C8B8946C74915443F8E23608F93E5ED5E9BFC2791CBFDFFE755EC6C73B0E40EA02C7A13B292039B2FDCF55FF145A5
3,201,261 UART: [art] SIG.S = BCB69B6F2E9C467BCCAFFE76A8B58B9746BBD5D0B15436BE965C0E868C12DF9B9EC79E9E36E210CBC6DD9E4D6FB9B989
3,224,240 UART: Caliptra RT
3,224,491 UART: [state] CFI Enabled
3,345,791 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,061 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,674 UART: [cold-reset] ++
1,170,082 UART: [fht] FHT @ 0x50003400
1,172,826 UART: [idev] ++
1,172,994 UART: [idev] CDI.KEYID = 6
1,173,355 UART: [idev] SUBJECT.KEYID = 7
1,173,780 UART: [idev] UDS.KEYID = 0
1,181,241 UART: [idev] Erasing UDS.KEYID = 0
1,197,780 UART: [idev] Fuse KeyId
1,199,002 UART: [idev] --
1,199,885 UART: [ldev] ++
1,200,053 UART: [ldev] CDI.KEYID = 6
1,200,417 UART: [ldev] SUBJECT.KEYID = 5
1,200,844 UART: [ldev] AUTHORITY.KEYID = 7
1,201,307 UART: [ldev] FE.KEYID = 1
1,206,323 UART: [ldev] Erasing FE.KEYID = 1
1,232,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,245,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,250,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,256,793 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,262,475 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,269,492 UART: [ldev] --
1,270,807 UART: [fwproc] Wait for Commands...
1,271,400 UART: [fwproc] Recv command 0x46574c44
1,272,133 UART: [fwproc] Recv'd Img size: 118548 bytes
2,616,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,643,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,674,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,814,481 >>> mbox cmd response: success
2,815,669 UART: [afmc] ++
2,815,837 UART: [afmc] CDI.KEYID = 6
2,816,200 UART: [afmc] SUBJECT.KEYID = 7
2,816,626 UART: [afmc] AUTHORITY.KEYID = 5
2,851,649 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,869,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,874,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,880,676 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,886,377 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,894,010 UART: [afmc] --
2,894,827 UART: [cold-reset] --
2,895,601 UART: [state] Locking Datavault
2,896,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,897,266 UART: [state] Locking ICCM
2,897,886 UART: [exit] Launching FMC @ 0x40000130
2,903,216 UART:
2,903,232 UART: Running Caliptra FMC ...
2,903,640 UART:
2,903,694 UART: [state] CFI Enabled
2,914,394 UART: [fht] FMC Alias Private Key: 7
3,034,036 UART: [art] Extend RT PCRs Done
3,034,464 UART: [art] Lock RT PCRs Done
3,035,996 UART: [art] Populate DV Done
3,044,269 UART: [fht] FMC Alias Private Key: 7
3,045,261 UART: [art] Derive CDI
3,045,541 UART: [art] Store in slot 0x4
3,130,953 UART: [art] Derive Key Pair
3,131,313 UART: [art] Store priv key in slot 0x5
3,144,734 UART: [art] Derive Key Pair - Done
3,159,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,174,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,175,646 UART: [art] PUB.X = 8B98A5B40C6E6FEC1E7C4E25B68D610E4FB4B11339FBB953750B9796011AABAA27888261B3A7DE30025979CEC5D74968
3,182,407 UART: [art] PUB.Y = B734E2092FDA97AA5022FC89172B942DD9D9524139EFE8F056337A53E69B9891C22157EDCB817596D9E19403332E0170
3,189,342 UART: [art] SIG.R = 1A14A48F26DABCDF442E589E7562F059C2191264C753DB72A88C15F9F1706ED1B184C0C50E569B40FC819A1C584C412F
3,196,113 UART: [art] SIG.S = 06A28D734F24CAC4B4617858741AE0770FE989BAC47C71DDEDB9FD6E5C659F0F232B3C24174CA7789CB8CF1B658C1196
3,219,624 UART: Caliptra RT
3,219,875 UART: [state] CFI Enabled
3,339,427 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,666 >>> mbox cmd response: success
2,740,039 UART:
2,740,055 UART: Running Caliptra FMC ...
2,740,463 UART:
2,740,517 UART: [state] CFI Enabled
2,750,877 UART: [fht] FMC Alias Private Key: 7
2,870,355 UART: [art] Extend RT PCRs Done
2,870,783 UART: [art] Lock RT PCRs Done
2,872,017 UART: [art] Populate DV Done
2,880,304 UART: [fht] FMC Alias Private Key: 7
2,881,242 UART: [art] Derive CDI
2,881,522 UART: [art] Store in slot 0x4
2,967,406 UART: [art] Derive Key Pair
2,967,766 UART: [art] Store priv key in slot 0x5
2,980,855 UART: [art] Derive Key Pair - Done
2,995,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,181 UART: [art] PUB.X = 09AA7C5DE16A77E107254CB947041A3DC59CF69C2858822F44FBCA3C04DDCF108D0A42A0DFEC82922B76FD30EB16D2A3
3,017,952 UART: [art] PUB.Y = 6A0D0E62D200FB81D5BC0F28E08C43D9A9D11E8817F4DAE2213A80574258B7E7EA25B8867EA27D15E667AB962CC02519
3,024,877 UART: [art] SIG.R = 4DC662B3F8B2DDA9F9BDFFED6FA7845F607CC4B3F46655ADD342832EB62AFAE399FACE85AF1DA24712253F19C6217C7B
3,031,671 UART: [art] SIG.S = 7D35CBC02E65E06684CB2297B55D34E1670B8E4D482A4EC2753FB64DA0E607E825297A25141C7B3967F0F8EDE650110F
3,055,476 UART: Caliptra RT
3,055,727 UART: [state] CFI Enabled
3,175,621 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,422 >>> mbox cmd response: success
2,733,975 UART:
2,733,991 UART: Running Caliptra FMC ...
2,734,399 UART:
2,734,453 UART: [state] CFI Enabled
2,745,073 UART: [fht] FMC Alias Private Key: 7
2,863,897 UART: [art] Extend RT PCRs Done
2,864,325 UART: [art] Lock RT PCRs Done
2,866,233 UART: [art] Populate DV Done
2,874,556 UART: [fht] FMC Alias Private Key: 7
2,875,690 UART: [art] Derive CDI
2,875,970 UART: [art] Store in slot 0x4
2,962,030 UART: [art] Derive Key Pair
2,962,390 UART: [art] Store priv key in slot 0x5
2,975,289 UART: [art] Derive Key Pair - Done
2,989,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,088 UART: [art] PUB.X = EEA51046206ABE053F9967B4BB5A40F9782E09D40265C8C2C68B8FBDA52DB12BC565D4D45642BDD60522B54D58056DF9
3,012,851 UART: [art] PUB.Y = 49FA4DA51CDD6708769603480EC966E43462823FE9D687AD38945DD5B982390032AD90CF3529C7E06B57FFDD9096F9F7
3,019,770 UART: [art] SIG.R = D08CA236F28BA90CEFD9C0E026B208B243DE3D7CCDD5E91C36155F879E0C6C12F34966E5784DEBBFDA332BA6BD337745
3,026,549 UART: [art] SIG.S = F24E48C9C9839FA8A32A5C85FDD0D88AAC8D51AF9B78B408F54005D384935DEF170B36BECA305887CE878B866130A1A1
3,049,856 UART: Caliptra RT
3,050,107 UART: [state] CFI Enabled
3,170,273 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,044 >>> mbox cmd response: success
2,735,571 UART:
2,735,587 UART: Running Caliptra FMC ...
2,735,995 UART:
2,736,049 UART: [state] CFI Enabled
2,746,679 UART: [fht] FMC Alias Private Key: 7
2,865,493 UART: [art] Extend RT PCRs Done
2,865,921 UART: [art] Lock RT PCRs Done
2,867,543 UART: [art] Populate DV Done
2,875,944 UART: [fht] FMC Alias Private Key: 7
2,877,012 UART: [art] Derive CDI
2,877,292 UART: [art] Store in slot 0x4
2,963,086 UART: [art] Derive Key Pair
2,963,446 UART: [art] Store priv key in slot 0x5
2,976,827 UART: [art] Derive Key Pair - Done
2,991,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,230 UART: [art] PUB.X = 771E63262105508BC1763D50F4E3A43355DFAB0D133D29B78D383B55AA14165413F4FAB9087FF115B92028CF3E1CCC94
3,014,991 UART: [art] PUB.Y = C31556362BB231DED5D43172A070B9636E6A9D8BFE98B53BC5D3E0DF55D3FC353804474CE47930BF63D8B24886CE029A
3,021,941 UART: [art] SIG.R = 4B5293B86A1496EAE8AEB8F239F2BDE1339D5B662A32320B2B6581BA1B878D2878B924476FE6D6F48EFE09F3EC35439E
3,028,713 UART: [art] SIG.S = 03AFE2CC7250129893F16BCF602E3DD9C616EB1215976E3D7C65D49158C7AF7B7AD3131A48714B92281145153E7C5B00
3,052,260 UART: Caliptra RT
3,052,511 UART: [state] CFI Enabled
3,171,822 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,263 >>> mbox cmd response: success
2,734,200 UART:
2,734,216 UART: Running Caliptra FMC ...
2,734,624 UART:
2,734,678 UART: [state] CFI Enabled
2,745,130 UART: [fht] FMC Alias Private Key: 7
2,864,194 UART: [art] Extend RT PCRs Done
2,864,622 UART: [art] Lock RT PCRs Done
2,866,082 UART: [art] Populate DV Done
2,874,127 UART: [fht] FMC Alias Private Key: 7
2,875,087 UART: [art] Derive CDI
2,875,367 UART: [art] Store in slot 0x4
2,960,807 UART: [art] Derive Key Pair
2,961,167 UART: [art] Store priv key in slot 0x5
2,974,362 UART: [art] Derive Key Pair - Done
2,989,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,318 UART: [art] PUB.X = 32EF4DA4D29A2992F234EAFCBDA98D8D2396B96568F8D8FBB09D4271979D3B5BE94FC8DCCAC11625BDF3F8E764E3C5C5
3,012,110 UART: [art] PUB.Y = F2BA800A3F767872D88F83790835070AABBB0C96A48780CE99A82A13BF5DE0DB9C2003D68BE6BB5E862BD7CB253ECB74
3,019,056 UART: [art] SIG.R = 809E1DA682FBA7425C54868777872CA3DE6621C7E5FC6CE803799D379B3964DD0DFBD1404F12B16B112832A3F4379C03
3,025,817 UART: [art] SIG.S = 5708B58BA2FB386C15237E61B94BB67F1E4D6814B15CE0A544210286F0F3B175398BD536C0A101B1D83035261ED788CE
3,049,654 UART: Caliptra RT
3,049,905 UART: [state] CFI Enabled
3,168,488 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.76s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,712 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,463 UART: [afmc] --
2,902,456 UART: [cold-reset] --
2,903,366 UART: [state] Locking Datavault
2,904,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,957 UART: [state] Locking ICCM
2,905,585 UART: [exit] Launching FMC @ 0x40000130
2,910,915 UART:
2,910,931 UART: Running Caliptra FMC ...
2,911,339 UART:
2,911,482 UART: [state] CFI Enabled
2,922,236 UART: [fht] FMC Alias Private Key: 7
3,040,880 UART: [art] Extend RT PCRs Done
3,041,308 UART: [art] Lock RT PCRs Done
3,042,786 UART: [art] Populate DV Done
3,050,965 UART: [fht] FMC Alias Private Key: 7
3,052,013 UART: [art] Derive CDI
3,052,293 UART: [art] Store in slot 0x4
3,138,305 UART: [art] Derive Key Pair
3,138,665 UART: [art] Store priv key in slot 0x5
3,152,564 UART: [art] Derive Key Pair - Done
3,167,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,103 UART: [art] PUB.X = 83E5CF178FA0DAAF49EDDB59A305B752D95427503627BEA5C6D3656653F1BD060181C033E1BCDC0F39EA23BECF4482B3
3,189,875 UART: [art] PUB.Y = 5D53DEE78841E1BFE9BBC81C8D2391B83E5A56E8D167C806359E4A8AA9C66838ED3B7125D0156C95F98ABFC10904BD77
3,196,826 UART: [art] SIG.R = 83D37D6FDAF43B4C06AA56219A6696CE16EE76453C24A2C5542553502B4D2433178EED030EF6365A0AD577357FCCC7B7
3,203,588 UART: [art] SIG.S = 7596917822F00084E74604FA394FEF1AC03294DE8EB66E9EAC64391AB07E85CE69471A6D3D77827F6E94C2C449B7D9F5
3,227,129 UART: Caliptra RT
3,227,472 UART: [state] CFI Enabled
3,347,496 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,521 UART: [kat] SHA2-256
901,461 UART: [kat] SHA2-384
904,336 UART: [kat] SHA2-512-ACC
906,237 UART: [kat] ECC-384
915,840 UART: [kat] HMAC-384Kdf
920,408 UART: [kat] LMS
1,168,720 UART: [kat] --
1,169,519 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,549 UART: [idev] ++
1,172,717 UART: [idev] CDI.KEYID = 6
1,173,078 UART: [idev] SUBJECT.KEYID = 7
1,173,503 UART: [idev] UDS.KEYID = 0
1,181,454 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha384 KeyId Algorithm
1,202,188 UART: [idev] --
1,203,151 UART: [ldev] ++
1,203,319 UART: [ldev] CDI.KEYID = 6
1,203,683 UART: [ldev] SUBJECT.KEYID = 5
1,204,110 UART: [ldev] AUTHORITY.KEYID = 7
1,204,573 UART: [ldev] FE.KEYID = 1
1,209,789 UART: [ldev] Erasing FE.KEYID = 1
1,235,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,247 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,969 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,273,811 UART: [ldev] --
1,275,114 UART: [fwproc] Wait for Commands...
1,275,735 UART: [fwproc] Recv command 0x46574c44
1,276,468 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,654 >>> mbox cmd response: success
2,820,894 UART: [afmc] ++
2,821,062 UART: [afmc] CDI.KEYID = 6
2,821,425 UART: [afmc] SUBJECT.KEYID = 7
2,821,851 UART: [afmc] AUTHORITY.KEYID = 5
2,857,742 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,880,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,111 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,891,812 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,513 UART: [afmc] --
2,900,540 UART: [cold-reset] --
2,901,608 UART: [state] Locking Datavault
2,902,509 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,113 UART: [state] Locking ICCM
2,903,785 UART: [exit] Launching FMC @ 0x40000130
2,909,115 UART:
2,909,131 UART: Running Caliptra FMC ...
2,909,539 UART:
2,909,682 UART: [state] CFI Enabled
2,920,370 UART: [fht] FMC Alias Private Key: 7
3,040,268 UART: [art] Extend RT PCRs Done
3,040,696 UART: [art] Lock RT PCRs Done
3,042,314 UART: [art] Populate DV Done
3,050,757 UART: [fht] FMC Alias Private Key: 7
3,051,921 UART: [art] Derive CDI
3,052,201 UART: [art] Store in slot 0x4
3,137,971 UART: [art] Derive Key Pair
3,138,331 UART: [art] Store priv key in slot 0x5
3,151,638 UART: [art] Derive Key Pair - Done
3,166,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,157 UART: [art] PUB.X = FA26F309A5E7754C564D6EB8DAFBBD7BB7819CBCD0D10C098065B8477773B336BA3835D2BFD036F01DE6B44ECC3EF2ED
3,188,940 UART: [art] PUB.Y = 744FAE12C8C08F595FF8FF4201EEB67E63011F90BC4BD1260A76416DB11457FE2C31636D831D5C53957B7BE1B3E4C946
3,195,887 UART: [art] SIG.R = 4D87112C1AA4DB3A4555410A9B4EB8FC9E11FAA3FC0CC8A45819B9B08F445D63DDE3CD7C7D2E61FBCBD4B3AAC7E3CD73
3,202,681 UART: [art] SIG.S = 44CC04D32B28C89E2F98B3E8ADC7C84E7770BB8D5E4040BA163C875D2D885BDDB2E89F23FDCBE77AE9CF8E997D22E019
3,226,850 UART: Caliptra RT
3,227,193 UART: [state] CFI Enabled
3,347,454 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,821 UART: [kat] SHA2-256
891,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: [kat] ++
895,627 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,566 UART: [kat] SHA2-512-ACC
906,467 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,199,907 UART: [idev] Fuse KeyId
1,201,129 UART: [idev] --
1,202,178 UART: [ldev] ++
1,202,346 UART: [ldev] CDI.KEYID = 6
1,202,710 UART: [ldev] SUBJECT.KEYID = 5
1,203,137 UART: [ldev] AUTHORITY.KEYID = 7
1,203,600 UART: [ldev] FE.KEYID = 1
1,208,960 UART: [ldev] Erasing FE.KEYID = 1
1,235,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,788 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,266,470 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,273,325 UART: [ldev] --
1,274,680 UART: [fwproc] Wait for Commands...
1,275,307 UART: [fwproc] Recv command 0x46574c44
1,276,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,619,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,818,166 >>> mbox cmd response: success
2,819,408 UART: [afmc] ++
2,819,576 UART: [afmc] CDI.KEYID = 6
2,819,939 UART: [afmc] SUBJECT.KEYID = 7
2,820,365 UART: [afmc] AUTHORITY.KEYID = 5
2,856,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,873,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,879,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,979 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,898,575 UART: [afmc] --
2,899,598 UART: [cold-reset] --
2,900,476 UART: [state] Locking Datavault
2,901,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,151 UART: [state] Locking ICCM
2,902,617 UART: [exit] Launching FMC @ 0x40000130
2,907,947 UART:
2,907,963 UART: Running Caliptra FMC ...
2,908,371 UART:
2,908,514 UART: [state] CFI Enabled
2,919,114 UART: [fht] FMC Alias Private Key: 7
3,038,166 UART: [art] Extend RT PCRs Done
3,038,594 UART: [art] Lock RT PCRs Done
3,039,906 UART: [art] Populate DV Done
3,048,193 UART: [fht] FMC Alias Private Key: 7
3,049,265 UART: [art] Derive CDI
3,049,545 UART: [art] Store in slot 0x4
3,135,073 UART: [art] Derive Key Pair
3,135,433 UART: [art] Store priv key in slot 0x5
3,148,340 UART: [art] Derive Key Pair - Done
3,163,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,179,909 UART: [art] PUB.X = 48913B40E9E6B156D390415B7201140F1B8D88A5AEBD58D02FCDAF642AC2195328D0933428A317D2DDEA217139AAD83C
3,186,677 UART: [art] PUB.Y = 202210FD4E08574753D95E516B7A85EED5E108591DE43504C760B0AC5E5FF68618A6336C6F1773D940F3289448600C56
3,193,605 UART: [art] SIG.R = 7FAF35C1FF15806370DC25CDBB27D1CB99BA8B39F8E84B9B77C07A796BF5BD411F67207138C36C1044BF8C1A7B245902
3,200,382 UART: [art] SIG.S = EACA72886C7F7A962A94C90E32B0AF5906D4C6774E5A0EB35E47DB2FF33E5D016F5BAF14BC4B255FC689ABBE354D7362
3,224,410 UART: Caliptra RT
3,224,753 UART: [state] CFI Enabled
3,344,526 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,681 >>> mbox cmd response: success
2,742,938 UART:
2,742,954 UART: Running Caliptra FMC ...
2,743,362 UART:
2,743,505 UART: [state] CFI Enabled
2,754,113 UART: [fht] FMC Alias Private Key: 7
2,873,113 UART: [art] Extend RT PCRs Done
2,873,541 UART: [art] Lock RT PCRs Done
2,875,013 UART: [art] Populate DV Done
2,883,228 UART: [fht] FMC Alias Private Key: 7
2,884,260 UART: [art] Derive CDI
2,884,540 UART: [art] Store in slot 0x4
2,970,114 UART: [art] Derive Key Pair
2,970,474 UART: [art] Store priv key in slot 0x5
2,983,591 UART: [art] Derive Key Pair - Done
2,997,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,071 UART: [art] PUB.X = 92DB020F188F0FF1E4036DBCBF6680ADB96B73BE218FBA63E5D17F27F3E933ECBC78FA8EA67E78747C882B4AD3F75353
3,020,847 UART: [art] PUB.Y = 13A8A6DA9D7E01DC491D3FFAC0D3F5D33A892981D430F5C1FACB97C228F32982735C24E2E139DBB14BDF17822DE63227
3,027,806 UART: [art] SIG.R = 336FDBE3D31851036FA8476983A54CFBD5B254F49A6D15316839F34565D1D2F22DCF63ED078DA763D8716BB7711227EA
3,034,572 UART: [art] SIG.S = A3EB469F162138F35F38977A6A3F441BD46D4A5BBFCBBBC1D040FA892A4C251447B12886E34FBE543E2AD2CCE674E6CB
3,058,876 UART: Caliptra RT
3,059,219 UART: [state] CFI Enabled
3,179,832 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,361 >>> mbox cmd response: success
2,737,968 UART:
2,737,984 UART: Running Caliptra FMC ...
2,738,392 UART:
2,738,535 UART: [state] CFI Enabled
2,749,077 UART: [fht] FMC Alias Private Key: 7
2,867,985 UART: [art] Extend RT PCRs Done
2,868,413 UART: [art] Lock RT PCRs Done
2,869,767 UART: [art] Populate DV Done
2,878,122 UART: [fht] FMC Alias Private Key: 7
2,879,264 UART: [art] Derive CDI
2,879,544 UART: [art] Store in slot 0x4
2,965,362 UART: [art] Derive Key Pair
2,965,722 UART: [art] Store priv key in slot 0x5
2,978,871 UART: [art] Derive Key Pair - Done
2,993,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,274 UART: [art] PUB.X = 06C8FCDFB533682364893807360C046E1E877BE1113D24CAB8730B48EBAE41F853DE2D435C57C41B77FE394491600194
3,017,022 UART: [art] PUB.Y = 39EAE2520E80F96A0DFC17503CA6414E9A8CBFF5B8A7F2AAB6242BBD595DAC64DD9F68F80A73E19A1E1907C160A68D68
3,023,978 UART: [art] SIG.R = 41505D3C8E2E921ED936D64822495C9AA7F19D046980AA3F61BE009D29A342B074EE286E8CB22A0DC8577A09EF6DE576
3,030,721 UART: [art] SIG.S = 5389645984350AE111C2CC2A84B3F456E6C85258725266A9DD3C03ACC8EA1072BB05CED13ACC71FBA3258FE2FAEF8B5F
3,053,926 UART: Caliptra RT
3,054,269 UART: [state] CFI Enabled
3,174,268 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,807 >>> mbox cmd response: success
2,734,864 UART:
2,734,880 UART: Running Caliptra FMC ...
2,735,288 UART:
2,735,431 UART: [state] CFI Enabled
2,746,179 UART: [fht] FMC Alias Private Key: 7
2,865,319 UART: [art] Extend RT PCRs Done
2,865,747 UART: [art] Lock RT PCRs Done
2,867,125 UART: [art] Populate DV Done
2,875,178 UART: [fht] FMC Alias Private Key: 7
2,876,134 UART: [art] Derive CDI
2,876,414 UART: [art] Store in slot 0x4
2,961,786 UART: [art] Derive Key Pair
2,962,146 UART: [art] Store priv key in slot 0x5
2,975,247 UART: [art] Derive Key Pair - Done
2,990,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,438 UART: [art] PUB.X = A88DCC4C3F3704CC2ACDA7D162FD0579E502CE539F47E8688E15374281B5F24ACD3EF2B152D6119ECE0E95E8A067C9C5
3,013,210 UART: [art] PUB.Y = BC5CF9F5B9974983A5FB1D0669FFFAD79A5FBCAD044E24AAF29A7BCC122A3E627400F24F3332444441E3F8C5567809E1
3,020,141 UART: [art] SIG.R = FF169BE27989BA85A218645DEF301BC496D59D0B7F6CC98F424D1E8F1A70C6976F5731C04290B1B95E03F6F94F38702E
3,026,909 UART: [art] SIG.S = E8E409A6DFB20159E09090900E234FFAC5A353AC97372BE7167BEAC234511F7AF19F7952111328C92B305169B28BC281
3,050,246 UART: Caliptra RT
3,050,589 UART: [state] CFI Enabled
3,170,917 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,254 >>> mbox cmd response: success
2,733,087 UART:
2,733,103 UART: Running Caliptra FMC ...
2,733,511 UART:
2,733,654 UART: [state] CFI Enabled
2,744,190 UART: [fht] FMC Alias Private Key: 7
2,862,856 UART: [art] Extend RT PCRs Done
2,863,284 UART: [art] Lock RT PCRs Done
2,864,800 UART: [art] Populate DV Done
2,873,061 UART: [fht] FMC Alias Private Key: 7
2,874,169 UART: [art] Derive CDI
2,874,449 UART: [art] Store in slot 0x4
2,960,069 UART: [art] Derive Key Pair
2,960,429 UART: [art] Store priv key in slot 0x5
2,973,356 UART: [art] Derive Key Pair - Done
2,988,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,003,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,004,530 UART: [art] PUB.X = AFFDD9C19AF35B3C697CD771BE628F79C6AC9C001BC45E9FE3EEAB34803F89338E0B917CA8321C02D959542105A8F677
3,011,281 UART: [art] PUB.Y = D672972CB5486F563A30F6ECCA2098FECEC4A246367919A004A46DE652D60B52DAEAE40829DD219AA6DBC433DF50BB06
3,018,233 UART: [art] SIG.R = 373897916CBCD7517901C214944106335AB9B130A8A5F6414B837A306061CA897BB3A8BE78A60DA5055D25B56C29A625
3,024,983 UART: [art] SIG.S = D83C36212E8B624476772AC688335D561F61F1AED61C8850D921E749278FF7F57A219EE25190D1488F2A30B797130B77
3,048,860 UART: Caliptra RT
3,049,203 UART: [state] CFI Enabled
3,168,962 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.92s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,894,565 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,364 UART: [afmc] --
2,903,369 UART: [cold-reset] --
2,904,347 UART: [state] Locking Datavault
2,905,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,122 UART: [state] Locking ICCM
2,906,656 UART: [exit] Launching FMC @ 0x40000130
2,911,986 UART:
2,912,002 UART: Running Caliptra FMC ...
2,912,410 UART:
2,912,464 UART: [state] CFI Enabled
2,922,802 UART: [fht] FMC Alias Private Key: 7
3,041,076 UART: [art] Extend RT PCRs Done
3,041,504 UART: [art] Lock RT PCRs Done
3,042,694 UART: [art] Populate DV Done
3,051,159 UART: [fht] FMC Alias Private Key: 7
3,052,223 UART: [art] Derive CDI
3,052,503 UART: [art] Store in slot 0x4
3,137,954 UART: [art] Derive Key Pair
3,138,314 UART: [art] Store priv key in slot 0x5
3,151,002 UART: [art] Derive Key Pair - Done
3,165,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,921 UART: [art] PUB.X = BC745DC5E4439ECB2CBB6F1E0BD2130847D96DE85906805D574E4136289F2FBD4D75BEAA8120436B8F272C2C1407D96D
3,188,687 UART: [art] PUB.Y = AE3728B5C73D92FBF07711F0418B11CA1A38DE12EB7BD65A931EBB852534947DD10F791BA6BD481706D1B1294A6C3B22
3,195,639 UART: [art] SIG.R = 0908E3C67C85161CBEA646317C044975861FD6B6965F2860286DAE17178B4096F2C937AF61D2ECA520668C546B9119A0
3,202,392 UART: [art] SIG.S = BA2740985D4683306EA77119FACDCFEEB5DC514CAB83234E1AE2366BF2480A1B76BADBCB0E5FB6FF2B33F95A52D6A3A2
3,225,974 UART: Caliptra RT
3,226,225 UART: [state] CFI Enabled
3,346,621 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
891,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,124 UART: [kat] ++
895,276 UART: [kat] sha1
899,646 UART: [kat] SHA2-256
901,586 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
915,589 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,660 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,198,922 UART: [idev] Sha384 KeyId Algorithm
1,202,597 UART: [idev] --
1,203,516 UART: [ldev] ++
1,203,684 UART: [ldev] CDI.KEYID = 6
1,204,048 UART: [ldev] SUBJECT.KEYID = 5
1,204,475 UART: [ldev] AUTHORITY.KEYID = 7
1,204,938 UART: [ldev] FE.KEYID = 1
1,210,158 UART: [ldev] Erasing FE.KEYID = 1
1,236,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,134 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,266,856 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,098 UART: [ldev] --
1,275,439 UART: [fwproc] Wait for Commands...
1,276,024 UART: [fwproc] Recv command 0x46574c44
1,276,757 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,649,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,833 >>> mbox cmd response: success
2,821,909 UART: [afmc] ++
2,822,077 UART: [afmc] CDI.KEYID = 6
2,822,440 UART: [afmc] SUBJECT.KEYID = 7
2,822,866 UART: [afmc] AUTHORITY.KEYID = 5
2,858,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,880,623 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,504 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,205 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,134 UART: [afmc] --
2,901,197 UART: [cold-reset] --
2,902,185 UART: [state] Locking Datavault
2,903,556 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,160 UART: [state] Locking ICCM
2,904,758 UART: [exit] Launching FMC @ 0x40000130
2,910,088 UART:
2,910,104 UART: Running Caliptra FMC ...
2,910,512 UART:
2,910,566 UART: [state] CFI Enabled
2,920,874 UART: [fht] FMC Alias Private Key: 7
3,039,404 UART: [art] Extend RT PCRs Done
3,039,832 UART: [art] Lock RT PCRs Done
3,041,504 UART: [art] Populate DV Done
3,049,547 UART: [fht] FMC Alias Private Key: 7
3,050,711 UART: [art] Derive CDI
3,050,991 UART: [art] Store in slot 0x4
3,137,316 UART: [art] Derive Key Pair
3,137,676 UART: [art] Store priv key in slot 0x5
3,150,740 UART: [art] Derive Key Pair - Done
3,165,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,180,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,365 UART: [art] PUB.X = E3E136F2F3B8F29B2A9389D48A85CCB4DB0555A6D3A72496665EBB8B165B33FC6C3088C3A1BA787EDA2A0419548FB007
3,188,136 UART: [art] PUB.Y = C10656D5E0BDD841E6425D71EF9B005703D3A0C31B56ABBC8B79A0775788DDDDC5E5A1DB3D4A11186242DA8631E55F8B
3,195,070 UART: [art] SIG.R = 4EB80573FA59DC06A4F8756F347AE124D717DC3152F8D54A4767026FD39B779B2D9BE7B9867B08E5564DD61D839E4C5C
3,201,832 UART: [art] SIG.S = F961875B1FB5F6934183C078F81E85BCA3DF9D5347CA5624136198BF7AB48479B84614571C0E28A7806F34B3E32ABDC7
3,226,077 UART: Caliptra RT
3,226,328 UART: [state] CFI Enabled
3,346,890 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,988 UART: [kat] ++
895,140 UART: [kat] sha1
899,146 UART: [kat] SHA2-256
901,086 UART: [kat] SHA2-384
904,055 UART: [kat] SHA2-512-ACC
905,956 UART: [kat] ECC-384
915,165 UART: [kat] HMAC-384Kdf
919,823 UART: [kat] LMS
1,168,135 UART: [kat] --
1,169,022 UART: [cold-reset] ++
1,169,352 UART: [fht] FHT @ 0x50003400
1,171,994 UART: [idev] ++
1,172,162 UART: [idev] CDI.KEYID = 6
1,172,523 UART: [idev] SUBJECT.KEYID = 7
1,172,948 UART: [idev] UDS.KEYID = 0
1,181,351 UART: [idev] Erasing UDS.KEYID = 0
1,198,624 UART: [idev] Fuse KeyId
1,199,846 UART: [idev] --
1,201,051 UART: [ldev] ++
1,201,219 UART: [ldev] CDI.KEYID = 6
1,201,583 UART: [ldev] SUBJECT.KEYID = 5
1,202,010 UART: [ldev] AUTHORITY.KEYID = 7
1,202,473 UART: [ldev] FE.KEYID = 1
1,207,467 UART: [ldev] Erasing FE.KEYID = 1
1,233,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,252,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,258,337 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,264,019 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,990 UART: [ldev] --
1,272,211 UART: [fwproc] Wait for Commands...
1,272,988 UART: [fwproc] Recv command 0x46574c44
1,273,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,617,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,644,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,675,182 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,815,385 >>> mbox cmd response: success
2,816,425 UART: [afmc] ++
2,816,593 UART: [afmc] CDI.KEYID = 6
2,816,956 UART: [afmc] SUBJECT.KEYID = 7
2,817,382 UART: [afmc] AUTHORITY.KEYID = 5
2,852,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,868,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,869,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,875,373 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,881,254 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,886,955 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,894,952 UART: [afmc] --
2,895,857 UART: [cold-reset] --
2,896,783 UART: [state] Locking Datavault
2,898,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,898,650 UART: [state] Locking ICCM
2,899,132 UART: [exit] Launching FMC @ 0x40000130
2,904,462 UART:
2,904,478 UART: Running Caliptra FMC ...
2,904,886 UART:
2,904,940 UART: [state] CFI Enabled
2,915,606 UART: [fht] FMC Alias Private Key: 7
3,035,332 UART: [art] Extend RT PCRs Done
3,035,760 UART: [art] Lock RT PCRs Done
3,037,270 UART: [art] Populate DV Done
3,045,571 UART: [fht] FMC Alias Private Key: 7
3,046,515 UART: [art] Derive CDI
3,046,795 UART: [art] Store in slot 0x4
3,132,732 UART: [art] Derive Key Pair
3,133,092 UART: [art] Store priv key in slot 0x5
3,146,504 UART: [art] Derive Key Pair - Done
3,161,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,176,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,177,530 UART: [art] PUB.X = 3187BA4639637B3B2EA1D469386F14BC8D3FAC80D0F27B264A37BD042F6BF0B118AA2B8060C4A96458A0FB29A2A08C5A
3,184,307 UART: [art] PUB.Y = 49F69CEFE0E5C67C5428475B4860E6D6D3A5BEF63FEF5361B92B01EAE66A26176515DDA465DFF8A45956B839021F7434
3,191,257 UART: [art] SIG.R = 6FB2FD6BFC96430BDBB513DB47FE4032A22E97815AB70D50CED5A8051A9B4A3D47B4B3C6530636D08FFE47C69FC5BA36
3,198,033 UART: [art] SIG.S = 53A701831670085B552AB2233970FCA48DDB4DC4242F0D37A5647B54EF3662BC46AB467BDCE503A9884F02848C67D062
3,221,348 UART: Caliptra RT
3,221,599 UART: [state] CFI Enabled
3,341,525 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 6.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,456 >>> mbox cmd response: success
2,741,971 UART:
2,741,987 UART: Running Caliptra FMC ...
2,742,395 UART:
2,742,449 UART: [state] CFI Enabled
2,752,847 UART: [fht] FMC Alias Private Key: 7
2,871,913 UART: [art] Extend RT PCRs Done
2,872,341 UART: [art] Lock RT PCRs Done
2,874,177 UART: [art] Populate DV Done
2,882,416 UART: [fht] FMC Alias Private Key: 7
2,883,588 UART: [art] Derive CDI
2,883,868 UART: [art] Store in slot 0x4
2,969,381 UART: [art] Derive Key Pair
2,969,741 UART: [art] Store priv key in slot 0x5
2,983,373 UART: [art] Derive Key Pair - Done
2,998,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,396 UART: [art] PUB.X = CCC32B3CCFA4BE1CF607205A8AEBC192ADD0E8BE847D5E43334E4A68F8B7A9F1A864700687FDC1E72C7F28BD1ABEC962
3,021,186 UART: [art] PUB.Y = 4CF933F0BD708B1FD415D0179B443CC71B99D1B654745C02221DD858FEC2E42AA7302991B94240011AEE1DA5E3CC58F1
3,028,136 UART: [art] SIG.R = D748E26C5682D0F2A21A9EFFB2B4164CADD1556E367FB9EA657721046196FDD1984D6ECED3F3D37AF781AEF55A2C6C28
3,034,919 UART: [art] SIG.S = 78BE1E36E99B41602D9DA490543EA83F036033074A8163700EAC83FDEED359D88220493466E15F16754BC57F2C754D61
3,059,154 UART: Caliptra RT
3,059,405 UART: [state] CFI Enabled
3,179,944 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,140 >>> mbox cmd response: success
2,736,121 UART:
2,736,137 UART: Running Caliptra FMC ...
2,736,545 UART:
2,736,599 UART: [state] CFI Enabled
2,747,123 UART: [fht] FMC Alias Private Key: 7
2,865,663 UART: [art] Extend RT PCRs Done
2,866,091 UART: [art] Lock RT PCRs Done
2,867,391 UART: [art] Populate DV Done
2,875,684 UART: [fht] FMC Alias Private Key: 7
2,876,762 UART: [art] Derive CDI
2,877,042 UART: [art] Store in slot 0x4
2,962,739 UART: [art] Derive Key Pair
2,963,099 UART: [art] Store priv key in slot 0x5
2,976,775 UART: [art] Derive Key Pair - Done
2,991,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,063 UART: [art] PUB.X = 5CFCB29122E19F71211BCCE9459C18C9E0A2F458B104BB95F234A845E669C973CC86CDBB16FA5940EAFF1F22ED9848EF
3,013,846 UART: [art] PUB.Y = 5CEFAED012FE484BBB60C6C54F197C5530F84545AFA85F7C3CBF5B82693DD89C0D62819EECF5FAE234FC1A8F78C884A8
3,020,815 UART: [art] SIG.R = A05BAE2FFC0723E324ED2808AF288A5DAC90E05FA258B873F2F3CED8AE4C893F7813DE1763B05891BF49E6B6C5424179
3,027,591 UART: [art] SIG.S = E562FADD2BD14723E53CDADE9372D09F429A08BD9FBC5F3E70C185784219F71CA7295628D4960B527280F4F445866101
3,051,242 UART: Caliptra RT
3,051,493 UART: [state] CFI Enabled
3,170,713 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,672,648 >>> mbox cmd response: success
2,733,791 UART:
2,733,807 UART: Running Caliptra FMC ...
2,734,215 UART:
2,734,269 UART: [state] CFI Enabled
2,745,075 UART: [fht] FMC Alias Private Key: 7
2,864,521 UART: [art] Extend RT PCRs Done
2,864,949 UART: [art] Lock RT PCRs Done
2,866,415 UART: [art] Populate DV Done
2,874,740 UART: [fht] FMC Alias Private Key: 7
2,875,890 UART: [art] Derive CDI
2,876,170 UART: [art] Store in slot 0x4
2,962,273 UART: [art] Derive Key Pair
2,962,633 UART: [art] Store priv key in slot 0x5
2,975,933 UART: [art] Derive Key Pair - Done
2,990,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,157 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,922 UART: [art] PUB.X = 7B9BE822C0CC90E6A6B0104A936D98BEC015BAE08F1AE4069D4816397B141B0696C36DA1C09E1A2A4599B6FFEB440B4C
3,013,695 UART: [art] PUB.Y = 941B7EE68A2ACF48DFD65B8FA4DF3D3356291EFE7F1B20F53ED7DACA3E64CBB2EC36B58A7E08A297A2C3CFAD497D152E
3,020,672 UART: [art] SIG.R = 8BB531C48DA3FFA6FF9F0A4710EAA4F63CBA30149DFF9B2ED7941307A8A43774295FA7558DFE85FE1BA99ACE0B44B86D
3,027,455 UART: [art] SIG.S = 6F76D03E6E01DAB9502E5F588BE5DD52CE533EA98DCA69B573C3AD003848A4E1E0208AFA7AA43CBF32F410997DDFA409
3,050,289 UART: Caliptra RT
3,050,540 UART: [state] CFI Enabled
3,170,948 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,670,571 >>> mbox cmd response: success
2,732,412 UART:
2,732,428 UART: Running Caliptra FMC ...
2,732,836 UART:
2,732,890 UART: [state] CFI Enabled
2,743,088 UART: [fht] FMC Alias Private Key: 7
2,862,468 UART: [art] Extend RT PCRs Done
2,862,896 UART: [art] Lock RT PCRs Done
2,864,372 UART: [art] Populate DV Done
2,872,787 UART: [fht] FMC Alias Private Key: 7
2,873,839 UART: [art] Derive CDI
2,874,119 UART: [art] Store in slot 0x4
2,960,198 UART: [art] Derive Key Pair
2,960,558 UART: [art] Store priv key in slot 0x5
2,974,244 UART: [art] Derive Key Pair - Done
2,988,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,135 UART: [art] PUB.X = A580E2B10CB21F90788FB34114526C0F36D0DD6D1D1F64772BB21D8559EFDA92C5A05931EA07DD046AA2545954E7F521
3,011,897 UART: [art] PUB.Y = 3DFAC62CBC3BAAAC7190981E9F9B237481400AAFF66C6AE4371AEB4E3E9023005184254026AEF4D537238DA2B998F5C3
3,018,832 UART: [art] SIG.R = BA4125BF55688FD06BDA9CCA9FFA9F6BF6AD1422AD1508137AEB67A0E85247FE374289789AC142DE6EE4F66BA36FD42E
3,025,619 UART: [art] SIG.S = 19690156B621FB3872E6508C7E60743F3D20F4480D97304886CC72FE837322EB52B8869F16F290791F43A9C2B57EEE46
3,048,961 UART: Caliptra RT
3,049,212 UART: [state] CFI Enabled
3,168,305 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 4.99s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,895,616 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,333 UART: [afmc] --
2,904,274 UART: [cold-reset] --
2,905,086 UART: [state] Locking Datavault
2,906,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,887 UART: [state] Locking ICCM
2,907,441 UART: [exit] Launching FMC @ 0x40000130
2,912,771 UART:
2,912,787 UART: Running Caliptra FMC ...
2,913,195 UART:
2,913,338 UART: [state] CFI Enabled
2,924,104 UART: [fht] FMC Alias Private Key: 7
3,042,606 UART: [art] Extend RT PCRs Done
3,043,034 UART: [art] Lock RT PCRs Done
3,044,702 UART: [art] Populate DV Done
3,052,757 UART: [fht] FMC Alias Private Key: 7
3,053,807 UART: [art] Derive CDI
3,054,087 UART: [art] Store in slot 0x4
3,139,886 UART: [art] Derive Key Pair
3,140,246 UART: [art] Store priv key in slot 0x5
3,153,168 UART: [art] Derive Key Pair - Done
3,167,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,309 UART: [art] PUB.X = B98F15736273709A6F0B63438CE33785D126A1CDABFF782FDFF4D56A5075CAD8B3AE667B9AAD16E226CDE29CAC06F43A
3,191,091 UART: [art] PUB.Y = 84A19D3701D1C2779D2BFD0686FEF94400A94290A9A7906329508499AF8478A4882B9E086D6D911A9610BE3AB8D061C4
3,198,004 UART: [art] SIG.R = 5DC886BEAE4186F2BEBBEDBE08E33A185EBD3C15B4CA5F357016AF8117B352CFB86115A2F4EBD9A634BEC72147A14BB8
3,204,795 UART: [art] SIG.S = B44307B594533BEF74612A002D1AFE6CEFC21CC19CEBCE7ADB1091F878CFE38F1CC19F160D93A1C71F46DA861359F296
3,228,831 UART: Caliptra RT
3,229,174 UART: [state] CFI Enabled
3,350,776 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,801 UART: [state] LifecycleState = Unprovisioned
86,456 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
891,905 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,009 UART: [kat] ++
896,161 UART: [kat] sha1
900,411 UART: [kat] SHA2-256
902,351 UART: [kat] SHA2-384
905,140 UART: [kat] SHA2-512-ACC
907,041 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,867 UART: [fht] FHT @ 0x50003400
1,173,667 UART: [idev] ++
1,173,835 UART: [idev] CDI.KEYID = 6
1,174,196 UART: [idev] SUBJECT.KEYID = 7
1,174,621 UART: [idev] UDS.KEYID = 0
1,182,518 UART: [idev] Erasing UDS.KEYID = 0
1,199,581 UART: [idev] Sha384 KeyId Algorithm
1,203,156 UART: [idev] --
1,204,115 UART: [ldev] ++
1,204,283 UART: [ldev] CDI.KEYID = 6
1,204,647 UART: [ldev] SUBJECT.KEYID = 5
1,205,074 UART: [ldev] AUTHORITY.KEYID = 7
1,205,537 UART: [ldev] FE.KEYID = 1
1,211,071 UART: [ldev] Erasing FE.KEYID = 1
1,237,484 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,256,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,262,675 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,397 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,381 UART: [ldev] --
1,276,736 UART: [fwproc] Wait for Commands...
1,277,383 UART: [fwproc] Recv command 0x46574c44
1,278,116 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,681,611 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,821,798 >>> mbox cmd response: success
2,822,864 UART: [afmc] ++
2,823,032 UART: [afmc] CDI.KEYID = 6
2,823,395 UART: [afmc] SUBJECT.KEYID = 7
2,823,821 UART: [afmc] AUTHORITY.KEYID = 5
2,858,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,876,380 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,971 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,893,672 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,499 UART: [afmc] --
2,902,560 UART: [cold-reset] --
2,903,526 UART: [state] Locking Datavault
2,904,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,303 UART: [state] Locking ICCM
2,905,823 UART: [exit] Launching FMC @ 0x40000130
2,911,153 UART:
2,911,169 UART: Running Caliptra FMC ...
2,911,577 UART:
2,911,720 UART: [state] CFI Enabled
2,922,466 UART: [fht] FMC Alias Private Key: 7
3,041,870 UART: [art] Extend RT PCRs Done
3,042,298 UART: [art] Lock RT PCRs Done
3,043,624 UART: [art] Populate DV Done
3,052,061 UART: [fht] FMC Alias Private Key: 7
3,053,109 UART: [art] Derive CDI
3,053,389 UART: [art] Store in slot 0x4
3,139,318 UART: [art] Derive Key Pair
3,139,678 UART: [art] Store priv key in slot 0x5
3,152,886 UART: [art] Derive Key Pair - Done
3,168,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,820 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,585 UART: [art] PUB.X = 43D13B12E231EDF67F030AB9665DC67B2AE962C1C486FC98520C593161E98362F2E6EA9EECBD7730072853D48C155198
3,191,343 UART: [art] PUB.Y = 1F8863711BF7E7574B41682ED74B333E5F8DBEA54A3326CAA1EA820CD20CCCF3BFB36976C9C2D0CE96DC554F518DD213
3,198,303 UART: [art] SIG.R = 2973A86D0EC9E767E52D2752CF1E260ED0D7970F6608C0C87BB93EBD777B0CAA56D6BD8999F687AA9FA45BA8587102CC
3,205,067 UART: [art] SIG.S = C714FCF72CB09A158E4A7E66A6C357B97EE91BCB256EF8C4E8EFE88C02EC60034C04C46542AFF912E632123B7C198F84
3,229,194 UART: Caliptra RT
3,229,537 UART: [state] CFI Enabled
3,349,469 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,015 UART: [kat] SHA2-256
901,955 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,182,220 UART: [idev] Erasing UDS.KEYID = 0
1,199,667 UART: [idev] Fuse KeyId
1,200,889 UART: [idev] --
1,202,062 UART: [ldev] ++
1,202,230 UART: [ldev] CDI.KEYID = 6
1,202,594 UART: [ldev] SUBJECT.KEYID = 5
1,203,021 UART: [ldev] AUTHORITY.KEYID = 7
1,203,484 UART: [ldev] FE.KEYID = 1
1,208,616 UART: [ldev] Erasing FE.KEYID = 1
1,235,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,248,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,254,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,260,026 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,708 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,671 UART: [ldev] --
1,274,068 UART: [fwproc] Wait for Commands...
1,274,801 UART: [fwproc] Recv command 0x46574c44
1,275,534 UART: [fwproc] Recv'd Img size: 118548 bytes
2,620,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,146 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,679,321 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,819,552 >>> mbox cmd response: success
2,820,720 UART: [afmc] ++
2,820,888 UART: [afmc] CDI.KEYID = 6
2,821,251 UART: [afmc] SUBJECT.KEYID = 7
2,821,677 UART: [afmc] AUTHORITY.KEYID = 5
2,857,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,873,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,874,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,880,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,886,337 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,038 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,899,899 UART: [afmc] --
2,900,730 UART: [cold-reset] --
2,901,430 UART: [state] Locking Datavault
2,902,355 UART: [state] Locking PCR0, PCR1 and PCR31
2,902,959 UART: [state] Locking ICCM
2,903,419 UART: [exit] Launching FMC @ 0x40000130
2,908,749 UART:
2,908,765 UART: Running Caliptra FMC ...
2,909,173 UART:
2,909,316 UART: [state] CFI Enabled
2,919,912 UART: [fht] FMC Alias Private Key: 7
3,039,156 UART: [art] Extend RT PCRs Done
3,039,584 UART: [art] Lock RT PCRs Done
3,041,042 UART: [art] Populate DV Done
3,049,175 UART: [fht] FMC Alias Private Key: 7
3,050,129 UART: [art] Derive CDI
3,050,409 UART: [art] Store in slot 0x4
3,136,290 UART: [art] Derive Key Pair
3,136,650 UART: [art] Store priv key in slot 0x5
3,150,520 UART: [art] Derive Key Pair - Done
3,165,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,181,955 UART: [art] PUB.X = D81E83F5EDCE9ACA0CB96C963AB946A2A2F3B28E5D7840F8C86A2A96562AF10154BD047CCA69272A24D4BAD47CEE66F7
3,188,736 UART: [art] PUB.Y = 25F1D9CBCD0BBF038E5E71C53E01A6703D7585B94E9F1CF7CECAE0755AAC6147AC4D0031C2D0381D200FD2760C76BA25
3,195,665 UART: [art] SIG.R = B90B785D17F4BB3D2AD3AAD9B7A966CED24E7786B369D0D8582ECA0A14FD2684F7536426AB56746CA4E4A552AA5EEC3A
3,202,447 UART: [art] SIG.S = 3CC4FE2B62C1E7DACB97472A4FD90D43B447C629E7AC81011FB859C0858C21FCDD451277577E7F93E3D8F63E54E1600F
3,226,174 UART: Caliptra RT
3,226,517 UART: [state] CFI Enabled
3,346,314 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,535 >>> mbox cmd response: success
2,742,272 UART:
2,742,288 UART: Running Caliptra FMC ...
2,742,696 UART:
2,742,839 UART: [state] CFI Enabled
2,753,577 UART: [fht] FMC Alias Private Key: 7
2,872,561 UART: [art] Extend RT PCRs Done
2,872,989 UART: [art] Lock RT PCRs Done
2,874,585 UART: [art] Populate DV Done
2,882,842 UART: [fht] FMC Alias Private Key: 7
2,883,820 UART: [art] Derive CDI
2,884,100 UART: [art] Store in slot 0x4
2,969,973 UART: [art] Derive Key Pair
2,970,333 UART: [art] Store priv key in slot 0x5
2,983,905 UART: [art] Derive Key Pair - Done
2,998,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,262 UART: [art] PUB.X = 5E6ABB499CBB71E201C2B316A757A97DAF43A561AC768F91A389A638D623685E9E0BE3F17BBF1AB9BB1D9907D43B3E6F
3,022,039 UART: [art] PUB.Y = C61566B7645020E5F5B3F9A621835C9AE43E158FD772174105707FD49A7A71CC6EB29BCAD163F39827F45167DCD151B5
3,028,986 UART: [art] SIG.R = F7CF4C71EAC6A9CBC70B2B931E0DE1E9B26D99C99214D15D99C7FA54B7BE58AB974E2CE68D7069D057EF61C9C8DF68F0
3,035,772 UART: [art] SIG.S = 58EE09A2E674828C80E447A63F5ADDABD3DD509AEEE93FAF26B875FB2E968B8B825308FC73758247B52CEA58DB961370
3,059,852 UART: Caliptra RT
3,060,195 UART: [state] CFI Enabled
3,179,170 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,971 >>> mbox cmd response: success
2,737,100 UART:
2,737,116 UART: Running Caliptra FMC ...
2,737,524 UART:
2,737,667 UART: [state] CFI Enabled
2,748,291 UART: [fht] FMC Alias Private Key: 7
2,867,551 UART: [art] Extend RT PCRs Done
2,867,979 UART: [art] Lock RT PCRs Done
2,869,571 UART: [art] Populate DV Done
2,877,778 UART: [fht] FMC Alias Private Key: 7
2,878,768 UART: [art] Derive CDI
2,879,048 UART: [art] Store in slot 0x4
2,964,597 UART: [art] Derive Key Pair
2,964,957 UART: [art] Store priv key in slot 0x5
2,978,629 UART: [art] Derive Key Pair - Done
2,993,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,646 UART: [art] PUB.X = 3E2F767DE209FDD36265165E4402757BE22F6D762C6EB8736013D3669A2B2FF7E6610DB87DC83195AC961C6B087DCB1D
3,017,408 UART: [art] PUB.Y = 34D783739B0977313F743B5E025DAAD94443F2320B4AF97D3BE6D2DFE33EB6B1FA6A74D3B1F7D445449F856CFC0EFBC6
3,024,360 UART: [art] SIG.R = 1A2573E3B9AB3FE0EA03D80E36257E9BAED04FA977FFE2057D3694218A6E7FAEE2FC9759AF6551EB1FAE9D8C02F3BEA5
3,031,142 UART: [art] SIG.S = B56F3FF1A98949BE92EFD066BADFEB59D2E3B86AF2834F21D809E5E9FAF7C9BD738CAEB264BE5EF885859B1F7162DA89
3,054,679 UART: Caliptra RT
3,055,022 UART: [state] CFI Enabled
3,175,664 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,319 >>> mbox cmd response: success
2,735,002 UART:
2,735,018 UART: Running Caliptra FMC ...
2,735,426 UART:
2,735,569 UART: [state] CFI Enabled
2,746,239 UART: [fht] FMC Alias Private Key: 7
2,865,129 UART: [art] Extend RT PCRs Done
2,865,557 UART: [art] Lock RT PCRs Done
2,867,023 UART: [art] Populate DV Done
2,875,252 UART: [fht] FMC Alias Private Key: 7
2,876,270 UART: [art] Derive CDI
2,876,550 UART: [art] Store in slot 0x4
2,962,309 UART: [art] Derive Key Pair
2,962,669 UART: [art] Store priv key in slot 0x5
2,976,029 UART: [art] Derive Key Pair - Done
2,990,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,309 UART: [art] PUB.X = 672112D246A58A07BCCA6AEB0EFB999112E636764876FAD441E223EC1CD1C22969CB5BABC0C142968F9248B67E754974
3,014,077 UART: [art] PUB.Y = 68592E433E1007D88486FAF8E1FE1FD45CB7B9B0E09D91DC9EA3D00E8A0FD41FB4A7EA13187D9C42E4592962CF015535
3,021,025 UART: [art] SIG.R = C1E8CFD02E1BEAA10329F333D3DC34FB2469C0D9E91B4148DCF0B36C1DABA89CF33A318177B440ED52B83B05F54FF155
3,027,807 UART: [art] SIG.S = 99BC1693CCC908871B00E8BC260B1F2FA1AAB042CC8BD421ECC77C82C56609B938C3BAC29AC8FE0EA5DA9C6256DD2562
3,052,221 UART: Caliptra RT
3,052,564 UART: [state] CFI Enabled
3,173,016 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,094 >>> mbox cmd response: success
2,733,115 UART:
2,733,131 UART: Running Caliptra FMC ...
2,733,539 UART:
2,733,682 UART: [state] CFI Enabled
2,744,616 UART: [fht] FMC Alias Private Key: 7
2,863,892 UART: [art] Extend RT PCRs Done
2,864,320 UART: [art] Lock RT PCRs Done
2,865,744 UART: [art] Populate DV Done
2,873,967 UART: [fht] FMC Alias Private Key: 7
2,875,041 UART: [art] Derive CDI
2,875,321 UART: [art] Store in slot 0x4
2,961,066 UART: [art] Derive Key Pair
2,961,426 UART: [art] Store priv key in slot 0x5
2,974,554 UART: [art] Derive Key Pair - Done
2,989,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,004,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,005,697 UART: [art] PUB.X = 1DAAD674077866E7C761F3D1A7CD4ECE2EC96BC62BB05A2A720BEC1A5060D58A552F4E2947E31DB0AEDED51E2D5B30A0
3,012,483 UART: [art] PUB.Y = F5987830E6A2CC933C4596D2C20C916CB391E99C4ABD6A0E61060F7C1B0D49B98154C9D9C8A82C97C768D209493AC938
3,019,417 UART: [art] SIG.R = E74F719E214EDC6D09D487830712C2E581C51190F57FD9ECCEB6577F97B25F9141E86F65F9949F5A4F8D86D318DA498C
3,026,185 UART: [art] SIG.S = E5083D5C71937F35CE42190BE5F635AF3281BE064CB5DA3E18234035DF034C531960E20DE6F4C4A5D1F50B542EEEA7D3
3,050,067 UART: Caliptra RT
3,050,410 UART: [state] CFI Enabled
3,169,808 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.48s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,892,919 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,634 UART: [afmc] --
2,901,483 UART: [cold-reset] --
2,902,393 UART: [state] Locking Datavault
2,903,372 UART: [state] Locking PCR0, PCR1 and PCR31
2,903,976 UART: [state] Locking ICCM
2,904,484 UART: [exit] Launching FMC @ 0x40000130
2,909,814 UART:
2,909,830 UART: Running Caliptra FMC ...
2,910,238 UART:
2,910,292 UART: [state] CFI Enabled
2,920,592 UART: [fht] FMC Alias Private Key: 7
3,039,796 UART: [art] Extend RT PCRs Done
3,040,224 UART: [art] Lock RT PCRs Done
3,041,588 UART: [art] Populate DV Done
3,049,727 UART: [fht] FMC Alias Private Key: 7
3,050,899 UART: [art] Derive CDI
3,051,179 UART: [art] Store in slot 0x4
3,137,142 UART: [art] Derive Key Pair
3,137,502 UART: [art] Store priv key in slot 0x5
3,150,984 UART: [art] Derive Key Pair - Done
3,165,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,112 UART: [art] PUB.X = 703895D2022F11B82FCF19FAAF232E2C2F2A2AF940AA069810CBBEEAE05BEE0972C43BCA0E2E6281B1D89518E5B08515
3,188,884 UART: [art] PUB.Y = C4E6C026803060FAEBA61A0678289A9903F597908E77397433F73CBD370A3B35FA0EB5FEF48A07CF77518F50D8875FE4
3,195,821 UART: [art] SIG.R = FF4B6D1894A06404B9F090E343543434E91421ED77D26973D06D1705ED4D7684E7ED86E8076CD694BBF0AD6E3C09C996
3,202,579 UART: [art] SIG.S = 28BCFAADAB4117C6118F35F2533FAC00BC49C1A47CF79E7CBCFE7DC520AC3F9ACEB292C8E877A9C66460DE0DEF19CEA3
3,226,422 UART: Caliptra RT
3,226,673 UART: [state] CFI Enabled
3,345,725 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,740 UART: [kat] SHA2-256
891,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,394 UART: [kat] ++
895,546 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,685 UART: [kat] SHA2-512-ACC
906,586 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,217 UART: [kat] LMS
1,168,529 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,170,132 UART: [fht] FHT @ 0x50003400
1,172,912 UART: [idev] ++
1,173,080 UART: [idev] CDI.KEYID = 6
1,173,441 UART: [idev] SUBJECT.KEYID = 7
1,173,866 UART: [idev] UDS.KEYID = 0
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha384 KeyId Algorithm
1,202,701 UART: [idev] --
1,203,658 UART: [ldev] ++
1,203,826 UART: [ldev] CDI.KEYID = 6
1,204,190 UART: [ldev] SUBJECT.KEYID = 5
1,204,617 UART: [ldev] AUTHORITY.KEYID = 7
1,205,080 UART: [ldev] FE.KEYID = 1
1,209,890 UART: [ldev] Erasing FE.KEYID = 1
1,236,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,249,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,255,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,261,528 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,267,250 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,274,404 UART: [ldev] --
1,275,775 UART: [fwproc] Wait for Commands...
1,276,492 UART: [fwproc] Recv command 0x46574c44
1,277,225 UART: [fwproc] Recv'd Img size: 118548 bytes
2,622,768 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,649,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,969 >>> mbox cmd response: success
2,822,017 UART: [afmc] ++
2,822,185 UART: [afmc] CDI.KEYID = 6
2,822,548 UART: [afmc] SUBJECT.KEYID = 7
2,822,974 UART: [afmc] AUTHORITY.KEYID = 5
2,859,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,876,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,882,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,938 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,893,639 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,546 UART: [afmc] --
2,902,431 UART: [cold-reset] --
2,903,355 UART: [state] Locking Datavault
2,904,318 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,922 UART: [state] Locking ICCM
2,905,558 UART: [exit] Launching FMC @ 0x40000130
2,910,888 UART:
2,910,904 UART: Running Caliptra FMC ...
2,911,312 UART:
2,911,366 UART: [state] CFI Enabled
2,921,622 UART: [fht] FMC Alias Private Key: 7
3,040,796 UART: [art] Extend RT PCRs Done
3,041,224 UART: [art] Lock RT PCRs Done
3,042,516 UART: [art] Populate DV Done
3,050,537 UART: [fht] FMC Alias Private Key: 7
3,051,493 UART: [art] Derive CDI
3,051,773 UART: [art] Store in slot 0x4
3,137,172 UART: [art] Derive Key Pair
3,137,532 UART: [art] Store priv key in slot 0x5
3,150,940 UART: [art] Derive Key Pair - Done
3,165,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,181,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,092 UART: [art] PUB.X = 70E04D692D365FC04DE2CDC534609F92FD61B3CEB0B78818899EED1792DE436B5965AB7C32D45158B50B2243C2583C44
3,188,861 UART: [art] PUB.Y = A3B6BDE1543F894314709B170273620B98C23715B83B65DC2AAB0BC9FBC660D1E67978F1322423F82795B3097600A461
3,195,769 UART: [art] SIG.R = 54A83B5AB81F40FCE03FC795FEA480C9C0ACD9D2FB7936C4D54793969D7FE38AA61BE452F9549F4AA04F6ACC840C8155
3,202,552 UART: [art] SIG.S = 9C0A3B247BC06C1AA9EDBA5912662B0841C257D8CC1C4A467DC3CEAE8C273CB2C17A95548D9C573E91ED3F5E3B40CED5
3,226,664 UART: Caliptra RT
3,226,915 UART: [state] CFI Enabled
3,346,963 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,672 UART: [state] LifecycleState = Unprovisioned
85,327 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,846 UART: [kat] ++
894,998 UART: [kat] sha1
899,132 UART: [kat] SHA2-256
901,072 UART: [kat] SHA2-384
903,729 UART: [kat] SHA2-512-ACC
905,630 UART: [kat] ECC-384
915,271 UART: [kat] HMAC-384Kdf
919,973 UART: [kat] LMS
1,168,285 UART: [kat] --
1,169,128 UART: [cold-reset] ++
1,169,474 UART: [fht] FHT @ 0x50003400
1,171,992 UART: [idev] ++
1,172,160 UART: [idev] CDI.KEYID = 6
1,172,521 UART: [idev] SUBJECT.KEYID = 7
1,172,946 UART: [idev] UDS.KEYID = 0
1,180,497 UART: [idev] Erasing UDS.KEYID = 0
1,196,944 UART: [idev] Fuse KeyId
1,198,166 UART: [idev] --
1,199,343 UART: [ldev] ++
1,199,511 UART: [ldev] CDI.KEYID = 6
1,199,875 UART: [ldev] SUBJECT.KEYID = 5
1,200,302 UART: [ldev] AUTHORITY.KEYID = 7
1,200,765 UART: [ldev] FE.KEYID = 1
1,205,961 UART: [ldev] Erasing FE.KEYID = 1
1,232,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,246,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,251,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,257,641 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,263,323 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,270,356 UART: [ldev] --
1,271,723 UART: [fwproc] Wait for Commands...
1,272,478 UART: [fwproc] Recv command 0x46574c44
1,273,211 UART: [fwproc] Recv'd Img size: 118548 bytes
2,617,653 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,644,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,676,059 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,816,246 >>> mbox cmd response: success
2,817,310 UART: [afmc] ++
2,817,478 UART: [afmc] CDI.KEYID = 6
2,817,841 UART: [afmc] SUBJECT.KEYID = 7
2,818,267 UART: [afmc] AUTHORITY.KEYID = 5
2,853,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,870,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,870,842 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,876,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,882,433 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,888,134 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,895,947 UART: [afmc] --
2,896,806 UART: [cold-reset] --
2,897,572 UART: [state] Locking Datavault
2,898,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,899,249 UART: [state] Locking ICCM
2,899,829 UART: [exit] Launching FMC @ 0x40000130
2,905,159 UART:
2,905,175 UART: Running Caliptra FMC ...
2,905,583 UART:
2,905,637 UART: [state] CFI Enabled
2,916,251 UART: [fht] FMC Alias Private Key: 7
3,034,691 UART: [art] Extend RT PCRs Done
3,035,119 UART: [art] Lock RT PCRs Done
3,036,403 UART: [art] Populate DV Done
3,044,762 UART: [fht] FMC Alias Private Key: 7
3,045,880 UART: [art] Derive CDI
3,046,160 UART: [art] Store in slot 0x4
3,131,821 UART: [art] Derive Key Pair
3,132,181 UART: [art] Store priv key in slot 0x5
3,145,393 UART: [art] Derive Key Pair - Done
3,160,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,175,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,176,338 UART: [art] PUB.X = A53CA34AD7F5AA2127794BBB2746D7178CE722CE64C0C02A5F257E7B3098390501D757AEBCB1ECD15963C22A7FEDFAEB
3,183,120 UART: [art] PUB.Y = 0B27762BF9DB715E85E3116C00611C9FB2552CDEB48983C730A39843E2B75E8575847FC4E13F8553203CE9EF49E6E834
3,190,043 UART: [art] SIG.R = 441F06EE306989BDDD1609C4DCCB89A43A57613B0FB3A9845339FD4249EC830F0DB51D9F96198CA0105836E6FA9E7B40
3,196,804 UART: [art] SIG.S = 135B060ECD478BD00DE3BAD84E2F2990E108C167A7BD7901B66DD592A4346666701F3C2805A69695AD72AADE885B15CB
3,220,398 UART: Caliptra RT
3,220,649 UART: [state] CFI Enabled
3,339,841 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,700 >>> mbox cmd response: success
2,741,537 UART:
2,741,553 UART: Running Caliptra FMC ...
2,741,961 UART:
2,742,015 UART: [state] CFI Enabled
2,752,067 UART: [fht] FMC Alias Private Key: 7
2,871,809 UART: [art] Extend RT PCRs Done
2,872,237 UART: [art] Lock RT PCRs Done
2,873,707 UART: [art] Populate DV Done
2,881,922 UART: [fht] FMC Alias Private Key: 7
2,882,928 UART: [art] Derive CDI
2,883,208 UART: [art] Store in slot 0x4
2,968,967 UART: [art] Derive Key Pair
2,969,327 UART: [art] Store priv key in slot 0x5
2,982,477 UART: [art] Derive Key Pair - Done
2,997,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,643 UART: [art] PUB.X = 4A29A04C4AC92D43803D543ABFF5014125D4679ABD5307972E8B8CC6C7102EF30257F7C4CE41251CA292B88390E6F7FB
3,020,408 UART: [art] PUB.Y = 94FD8A016B56F299F8741D79174B94757E8E11B871C8BCF15E2089F92CFE16C5235A03DA0C096D8927BD8080C45CAC5D
3,027,350 UART: [art] SIG.R = A308305ACD7706360A4A4534E85B4B130226A53B4B758310992BBF60586E72638030AE73D79990C2962927F987FDA360
3,034,094 UART: [art] SIG.S = A4E5E262B5BAC866D258EA69E345BB36B29A96086C382E15A8EB43202D96806177A9E9518C696132584B304544A92079
3,057,955 UART: Caliptra RT
3,058,206 UART: [state] CFI Enabled
3,177,648 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,994 >>> mbox cmd response: success
2,737,275 UART:
2,737,291 UART: Running Caliptra FMC ...
2,737,699 UART:
2,737,753 UART: [state] CFI Enabled
2,748,733 UART: [fht] FMC Alias Private Key: 7
2,867,181 UART: [art] Extend RT PCRs Done
2,867,609 UART: [art] Lock RT PCRs Done
2,868,915 UART: [art] Populate DV Done
2,877,348 UART: [fht] FMC Alias Private Key: 7
2,878,300 UART: [art] Derive CDI
2,878,580 UART: [art] Store in slot 0x4
2,964,461 UART: [art] Derive Key Pair
2,964,821 UART: [art] Store priv key in slot 0x5
2,978,129 UART: [art] Derive Key Pair - Done
2,992,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,133 UART: [art] PUB.X = 10853210AA227A8EC09582F81561F1B8D3F5B3FD450E7279E345CB316DE4DC0959F70B669E479B8FDF2E1754E1F19F51
3,015,896 UART: [art] PUB.Y = AB422A40E307E5D796E09C68DC6C1E79F391EF470615972687EFD18456ADB9C7DBFBF9FFBB4136BD4EA94178A1AFE4BC
3,022,860 UART: [art] SIG.R = 7A8D737AFDCCB0EFE796B173421486D602731D216B8C26257F47A052A14A4ED264A41A6177DFE023108BE305604D92CB
3,029,626 UART: [art] SIG.S = 1E0A1555A255FB3633F1853262DB5A1F93C9C4E15E075450E348A94807B89858DF488E9560F4381B76056A004209D630
3,053,431 UART: Caliptra RT
3,053,682 UART: [state] CFI Enabled
3,174,667 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,648 >>> mbox cmd response: success
2,737,511 UART:
2,737,527 UART: Running Caliptra FMC ...
2,737,935 UART:
2,737,989 UART: [state] CFI Enabled
2,748,165 UART: [fht] FMC Alias Private Key: 7
2,867,005 UART: [art] Extend RT PCRs Done
2,867,433 UART: [art] Lock RT PCRs Done
2,869,183 UART: [art] Populate DV Done
2,877,378 UART: [fht] FMC Alias Private Key: 7
2,878,516 UART: [art] Derive CDI
2,878,796 UART: [art] Store in slot 0x4
2,964,367 UART: [art] Derive Key Pair
2,964,727 UART: [art] Store priv key in slot 0x5
2,978,105 UART: [art] Derive Key Pair - Done
2,992,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,437 UART: [art] PUB.X = 6DC4E75C2C4151E2AB9331A284A37358CC9B29D091C149C368B00A64918227FA115E9E122BF6CC8A5D0A3719DD48FCE8
3,016,207 UART: [art] PUB.Y = 222F6E7DA771EBB058BCECA8D4D32A830D018E5FD2711A80508109227CC307191CB21844AD4B63D44652E9322AF08303
3,023,142 UART: [art] SIG.R = 48DB97BD8C5854F30F6A00A8F3AB8F10EF612E910B61C3E00F41402B5C0DBC405F4D003CB7D27BB0F9446843DAD5E84B
3,029,870 UART: [art] SIG.S = DCA4C13065D5A01E67742565931E054D44CE672F5D0DBA63A288CF9543BFEA8D5B6733CEFE0BDC8F22720E2A521F922D
3,053,762 UART: Caliptra RT
3,054,013 UART: [state] CFI Enabled
3,173,855 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,671,059 >>> mbox cmd response: success
2,733,360 UART:
2,733,376 UART: Running Caliptra FMC ...
2,733,784 UART:
2,733,838 UART: [state] CFI Enabled
2,744,640 UART: [fht] FMC Alias Private Key: 7
2,863,020 UART: [art] Extend RT PCRs Done
2,863,448 UART: [art] Lock RT PCRs Done
2,864,862 UART: [art] Populate DV Done
2,873,169 UART: [fht] FMC Alias Private Key: 7
2,874,257 UART: [art] Derive CDI
2,874,537 UART: [art] Store in slot 0x4
2,960,984 UART: [art] Derive Key Pair
2,961,344 UART: [art] Store priv key in slot 0x5
2,975,124 UART: [art] Derive Key Pair - Done
2,990,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,005,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,006,165 UART: [art] PUB.X = C00513E7AC61F2CD0D3B8E65D98871F0344C5CDBF972BBAB0A4471601DDFE50D19FE50E77DC0C1455BB52C0DD5049E1B
3,012,935 UART: [art] PUB.Y = B956906A29E260ECB5EBFB07875728B049D6654E36869FA4942A3340171A3C9ECB2F5F82E7C647C667E1C91232FF2402
3,019,877 UART: [art] SIG.R = CCB571AEB14B4CDA2DAB43B37BA43210E106C98F311BE6193A71CFBA8D5019FF20B45B8377D81C716F7420802E4A0D4E
3,026,655 UART: [art] SIG.S = 66BDE6FC9AAA7A07B6BAFDF99B9828C4B8EFB9A7F7BC6DECE259E68C56E2A9D9D5208DD42E1702A4F8A62675F44FF06F
3,050,349 UART: Caliptra RT
3,050,600 UART: [state] CFI Enabled
3,170,235 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.88s
Truncated 8676 bytes from beginning
496BBC57652E17DE254731722A293751A54846D
2,893,912 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,901,641 UART: [afmc] --
2,902,562 UART: [cold-reset] --
2,903,704 UART: [state] Locking Datavault
2,904,585 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,189 UART: [state] Locking ICCM
2,905,793 UART: [exit] Launching FMC @ 0x40000130
2,911,123 UART:
2,911,139 UART: Running Caliptra FMC ...
2,911,547 UART:
2,911,690 UART: [state] CFI Enabled
2,922,400 UART: [fht] FMC Alias Private Key: 7
3,041,420 UART: [art] Extend RT PCRs Done
3,041,848 UART: [art] Lock RT PCRs Done
3,043,442 UART: [art] Populate DV Done
3,051,753 UART: [fht] FMC Alias Private Key: 7
3,052,743 UART: [art] Derive CDI
3,053,023 UART: [art] Store in slot 0x4
3,138,858 UART: [art] Derive Key Pair
3,139,218 UART: [art] Store priv key in slot 0x5
3,152,460 UART: [art] Derive Key Pair - Done
3,167,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,552 UART: [art] PUB.X = DCCA0FB82A43455613081772676008C4D4BAAE1D748FE925942466CBDDE73966D70A6AA3153982BBDC1CDF940D46B4DA
3,190,317 UART: [art] PUB.Y = 31FAC6B0F101B12E04CB37CF48113E058EB23FA1B594E48935FA60984B4B56FF56DCA467B0C8B211880BFC93C3CB59DF
3,197,269 UART: [art] SIG.R = 190AF127799EEC9AFE66E410716A4393C803D59B30B8A54B17FF90254AEF8512DEAAD69DC1D6B8A7E4DFD07E9685CEFF
3,204,051 UART: [art] SIG.S = FBB99D51C2910F764F6B1E4032E70F3A4F7197411E5AA074042975D0CCCD5DFAD990B480D9C20952E6601FA070D503E7
3,227,868 UART: Caliptra RT
3,228,211 UART: [state] CFI Enabled
3,348,155 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,122 UART: [kat] LMS
1,169,434 UART: [kat] --
1,170,357 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,182,936 UART: [idev] Erasing UDS.KEYID = 0
1,200,469 UART: [idev] Sha384 KeyId Algorithm
1,204,248 UART: [idev] --
1,205,381 UART: [ldev] ++
1,205,549 UART: [ldev] CDI.KEYID = 6
1,205,913 UART: [ldev] SUBJECT.KEYID = 5
1,206,340 UART: [ldev] AUTHORITY.KEYID = 7
1,206,803 UART: [ldev] FE.KEYID = 1
1,211,957 UART: [ldev] Erasing FE.KEYID = 1
1,238,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,251,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,257,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,263,101 UART: [ldev] SIG.R = 2A4BB9643292BA199F858766BA7DAAB66BE26302AE966A7CB18D36FFDFBFE4C66E6CE097B3FEBDADE5781CD07875EDD2
1,268,823 UART: [ldev] SIG.S = 2B805D2E3A3E1A091D494DBE480D9FB9F805E60919DF43E59911ED8012E40A80C66225BB904C60BB01AC4A4F01A129FB
1,275,881 UART: [ldev] --
1,277,254 UART: [fwproc] Wait for Commands...
1,277,823 UART: [fwproc] Recv command 0x46574c44
1,278,556 UART: [fwproc] Recv'd Img size: 118548 bytes
2,621,533 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,680,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,820,444 >>> mbox cmd response: success
2,821,514 UART: [afmc] ++
2,821,682 UART: [afmc] CDI.KEYID = 6
2,822,045 UART: [afmc] SUBJECT.KEYID = 7
2,822,471 UART: [afmc] AUTHORITY.KEYID = 5
2,858,214 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,874,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,486 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,196 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,077 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,892,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,599 UART: [afmc] --
2,901,632 UART: [cold-reset] --
2,902,556 UART: [state] Locking Datavault
2,903,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,904,007 UART: [state] Locking ICCM
2,904,589 UART: [exit] Launching FMC @ 0x40000130
2,909,919 UART:
2,909,935 UART: Running Caliptra FMC ...
2,910,343 UART:
2,910,486 UART: [state] CFI Enabled
2,921,408 UART: [fht] FMC Alias Private Key: 7
3,040,158 UART: [art] Extend RT PCRs Done
3,040,586 UART: [art] Lock RT PCRs Done
3,042,476 UART: [art] Populate DV Done
3,050,747 UART: [fht] FMC Alias Private Key: 7
3,051,799 UART: [art] Derive CDI
3,052,079 UART: [art] Store in slot 0x4
3,137,530 UART: [art] Derive Key Pair
3,137,890 UART: [art] Store priv key in slot 0x5
3,151,152 UART: [art] Derive Key Pair - Done
3,166,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,250 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,015 UART: [art] PUB.X = DB33AE2414331FAF9050F41DAE3EF1812D041646FB92FA95A9A5A4246587E91F05D1AC3A5972DEAE6CBFF739D7C995A7
3,189,793 UART: [art] PUB.Y = 0254FB567B6B2B2195C38FC520CE2CA17C5805C1B506323D5A14E0486E5145BA656C15BAAB2C0CE07E177C116FE3F161
3,196,737 UART: [art] SIG.R = 3F43D8A7381FA557E08FBAFDBB70F2ADB95276E0C90264BC1B49AC4F42E84DD2D51F6482075745ECCE8B909A74176FA0
3,203,515 UART: [art] SIG.S = B80E03FAA7CAC57058F71BC0A3D948B3D99D3B46E4BFA19D7B53E6832671BF2E0E0C73DB747E07FC747F69EE61C5A529
3,227,566 UART: Caliptra RT
3,227,909 UART: [state] CFI Enabled
3,347,537 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,433 UART: [kat] SHA2-256
890,983 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,087 UART: [kat] ++
895,239 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,456 UART: [kat] SHA2-512-ACC
906,357 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,913 UART: [cold-reset] ++
1,170,245 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,181,590 UART: [idev] Erasing UDS.KEYID = 0
1,199,277 UART: [idev] Fuse KeyId
1,200,499 UART: [idev] --
1,201,350 UART: [ldev] ++
1,201,518 UART: [ldev] CDI.KEYID = 6
1,201,882 UART: [ldev] SUBJECT.KEYID = 5
1,202,309 UART: [ldev] AUTHORITY.KEYID = 7
1,202,772 UART: [ldev] FE.KEYID = 1
1,208,308 UART: [ldev] Erasing FE.KEYID = 1
1,234,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,247,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,253,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,259,490 UART: [ldev] SIG.R = F10BCF7C46DD42C21A782AC64BD76FDC9FBC612452D1C3A98D79A0A905B32AA1A3EBA52CD3C8C50070B1FFA71D0AAF00
1,265,172 UART: [ldev] SIG.S = D882A6C3D45B808D35895A2089E391F544673539D73ABD424363D0E60AE34074825EB1289C763C57EDB887C50DA46DE6
1,272,037 UART: [ldev] --
1,273,314 UART: [fwproc] Wait for Commands...
1,273,981 UART: [fwproc] Recv command 0x46574c44
1,274,714 UART: [fwproc] Recv'd Img size: 118548 bytes
2,618,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,677,055 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,817,324 >>> mbox cmd response: success
2,818,480 UART: [afmc] ++
2,818,648 UART: [afmc] CDI.KEYID = 6
2,819,011 UART: [afmc] SUBJECT.KEYID = 7
2,819,437 UART: [afmc] AUTHORITY.KEYID = 5
2,855,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,872,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,872,876 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,878,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,884,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,890,168 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,897,703 UART: [afmc] --
2,898,514 UART: [cold-reset] --
2,899,258 UART: [state] Locking Datavault
2,900,445 UART: [state] Locking PCR0, PCR1 and PCR31
2,901,049 UART: [state] Locking ICCM
2,901,681 UART: [exit] Launching FMC @ 0x40000130
2,907,011 UART:
2,907,027 UART: Running Caliptra FMC ...
2,907,435 UART:
2,907,578 UART: [state] CFI Enabled
2,918,190 UART: [fht] FMC Alias Private Key: 7
3,036,742 UART: [art] Extend RT PCRs Done
3,037,170 UART: [art] Lock RT PCRs Done
3,038,866 UART: [art] Populate DV Done
3,047,079 UART: [fht] FMC Alias Private Key: 7
3,048,239 UART: [art] Derive CDI
3,048,519 UART: [art] Store in slot 0x4
3,134,606 UART: [art] Derive Key Pair
3,134,966 UART: [art] Store priv key in slot 0x5
3,148,524 UART: [art] Derive Key Pair - Done
3,163,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,179,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,180,656 UART: [art] PUB.X = B34F36480934564A8D83C83F03EB0815A47E5CCA1309D28EB93876A05B211EA0F7C7ED44C7DB7A8C918A0A13447A43AF
3,187,417 UART: [art] PUB.Y = 0891999AE1630F630A6547A80BB65EBFB9416FCD1A33FC1A3E51C263A06861771CB3C7D2770F4D0B65BAB3A25D413456
3,194,353 UART: [art] SIG.R = 022E4F1C3B3E142F9BDA5098536FDCABF3E4964B684FF287D7B8D30FC2BB8465A9CD81FC13EA404B11DF0F0ED03CB1E3
3,201,133 UART: [art] SIG.S = 21CFB126F56363B51EFAED6776FB29422D30DF16F228093F2E35DE580EAADF93F4FC1452A4E686915CCB0FAB12183F05
3,225,195 UART: Caliptra RT
3,225,538 UART: [state] CFI Enabled
3,344,918 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,787 >>> mbox cmd response: success
2,739,334 UART:
2,739,350 UART: Running Caliptra FMC ...
2,739,758 UART:
2,739,901 UART: [state] CFI Enabled
2,750,033 UART: [fht] FMC Alias Private Key: 7
2,869,345 UART: [art] Extend RT PCRs Done
2,869,773 UART: [art] Lock RT PCRs Done
2,871,425 UART: [art] Populate DV Done
2,879,672 UART: [fht] FMC Alias Private Key: 7
2,880,738 UART: [art] Derive CDI
2,881,018 UART: [art] Store in slot 0x4
2,966,927 UART: [art] Derive Key Pair
2,967,287 UART: [art] Store priv key in slot 0x5
2,980,347 UART: [art] Derive Key Pair - Done
2,994,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,262 UART: [art] PUB.X = F6C25EFD2ED21238A37105B6B5B242E38D93B66C380BCA71B4C529290061235D1CDE4FC8BC602D40258EBED0A5C4BFFE
3,018,020 UART: [art] PUB.Y = 6EF0A52926C824156AE4A105E14D7F2B14F2845D4331631E828990E79D1EF6BDACF86850D78941B2129A1C122D27ED00
3,024,943 UART: [art] SIG.R = 09A21F9CA5E199745AD7E848588823D7D66A9237AD3EE655D5322852B71933551C3253C64EFC1F36F913B8711407E4C0
3,031,699 UART: [art] SIG.S = DBC6EDD7AE9F5FE677D6B281386F83C6FFB95B59B942554170203F6BE82A48AE604CAF28FF0679FEC31C90CE91320A29
3,055,451 UART: Caliptra RT
3,055,794 UART: [state] CFI Enabled
3,175,789 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,957 >>> mbox cmd response: success
2,735,874 UART:
2,735,890 UART: Running Caliptra FMC ...
2,736,298 UART:
2,736,441 UART: [state] CFI Enabled
2,746,807 UART: [fht] FMC Alias Private Key: 7
2,866,123 UART: [art] Extend RT PCRs Done
2,866,551 UART: [art] Lock RT PCRs Done
2,868,399 UART: [art] Populate DV Done
2,876,826 UART: [fht] FMC Alias Private Key: 7
2,877,832 UART: [art] Derive CDI
2,878,112 UART: [art] Store in slot 0x4
2,964,067 UART: [art] Derive Key Pair
2,964,427 UART: [art] Store priv key in slot 0x5
2,978,041 UART: [art] Derive Key Pair - Done
2,992,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,951 UART: [art] PUB.X = F489957C10179D6F087FDFFCD5CDE95F3DC3BC3D6E2C4480AFEE46EC5845923D440BE3E25BF72E5D95FC569DCA5382BD
3,015,737 UART: [art] PUB.Y = AA4F50E1FE2BC229543470A2E7808408F5D05AB9EC753F8F367DE01F55CB476B62F6D30E0F0D71802FB828656B1A731B
3,022,681 UART: [art] SIG.R = E9743A4D548F1E64357D2C985E27286933777F1D0973F40A9FCD076DDD71D83CBC8F806862416D66F4820F4946B5511A
3,029,433 UART: [art] SIG.S = 6285862E336ED7ABB673DBE796EF726F392ADE83E17D67A20FA6ABED0B52788A85AC9FEF9CBE6A345366F09B90BCCB2F
3,053,479 UART: Caliptra RT
3,053,822 UART: [state] CFI Enabled
3,174,300 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,673,493 >>> mbox cmd response: success
2,735,612 UART:
2,735,628 UART: Running Caliptra FMC ...
2,736,036 UART:
2,736,179 UART: [state] CFI Enabled
2,746,671 UART: [fht] FMC Alias Private Key: 7
2,865,329 UART: [art] Extend RT PCRs Done
2,865,757 UART: [art] Lock RT PCRs Done
2,866,921 UART: [art] Populate DV Done
2,875,164 UART: [fht] FMC Alias Private Key: 7
2,876,108 UART: [art] Derive CDI
2,876,388 UART: [art] Store in slot 0x4
2,961,971 UART: [art] Derive Key Pair
2,962,331 UART: [art] Store priv key in slot 0x5
2,976,113 UART: [art] Derive Key Pair - Done
2,990,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,006,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,007,173 UART: [art] PUB.X = 54AA0B20D7787E93E40EE9534D99E2CBB3544BB7251DB37D0D90A1C3EAA672BEAD57985C54A32E5831DE1C67A4270450
3,013,939 UART: [art] PUB.Y = 9B608DA5210E1BF0D77317E846A36CFA4FC2AAED66B2CCF5AE7D34C9534F899857118A665D3918A4FE8C549AA135AD7E
3,020,900 UART: [art] SIG.R = 3B5D81DAAEB72551E9D1A610E956B2A91866B16A1D9B418132DC593873576A064FB0343CE9BF91978402498B7AA16B31
3,027,662 UART: [art] SIG.S = 0D481A31488A39A8DAB13978BAAE7FB653790F7235A6202AF2CE7938ACBF522116D678A9BE224752AD6B36FA657C1E01
3,051,205 UART: Caliptra RT
3,051,548 UART: [state] CFI Enabled
3,171,247 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,674,506 >>> mbox cmd response: success
2,736,477 UART:
2,736,493 UART: Running Caliptra FMC ...
2,736,901 UART:
2,737,044 UART: [state] CFI Enabled
2,747,664 UART: [fht] FMC Alias Private Key: 7
2,866,346 UART: [art] Extend RT PCRs Done
2,866,774 UART: [art] Lock RT PCRs Done
2,868,232 UART: [art] Populate DV Done
2,876,699 UART: [fht] FMC Alias Private Key: 7
2,877,869 UART: [art] Derive CDI
2,878,149 UART: [art] Store in slot 0x4
2,963,812 UART: [art] Derive Key Pair
2,964,172 UART: [art] Store priv key in slot 0x5
2,977,550 UART: [art] Derive Key Pair - Done
2,992,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,437 UART: [art] PUB.X = B1417DC3021640CF7A16BA76E65AB72E3C2941B48176C505E15CDEC04310AA50E0162AB27AA0E6739151EBE25CB0DE32
3,015,209 UART: [art] PUB.Y = 8C14D7DE2A9C33E9460374ABABD60798AFE9777EDD785DBF6B1CB80E9365DCCDC058F512593EC4EA1D708A6B4FE428EB
3,022,172 UART: [art] SIG.R = F702466814E015458ABC1EC2C5CDF962FDFC1DA8737E5E08CBD619B97333B7803AFF7B77E06812C08CFDB5900B5F5915
3,028,943 UART: [art] SIG.S = 45F00F5D0E429DCEBD1F3330A81988D1E29F8A64725622A1424B54FA49166937738115B514ED0217AC285591AEAAA58E
3,052,862 UART: Caliptra RT
3,053,205 UART: [state] CFI Enabled
3,173,530 UART: [rt] RT listening for mailbox commands...
test test_idevid_derivation::test_idev_subj_key_id_algo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 5.16s
Truncated 7920 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,810,258 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:42:22 2025 GMT
Not After : Dec 27 11:42:22 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f5:b4:30:7f:d7:b6:f4:bf:61:9f:b7:87:ca:92:
e1:74:3f:92:72:4a:5b:45:0a:cd:50:bc:d7:68:12:
77:78:03:d3:01:78:a2:54:f6:76:b7:e0:d8:f3:9c:
cd:1d:88:fb:6f:80:25:52:ba:c3:76:44:2b:2c:56:
60:ee:96:2b:24:f3:35:f9:33:32:8e:7d:17:98:5d:
b0:00:97:c7:29:4f:a0:d9:33:ef:14:c1:24:d9:f1:
11:51:a8:3c:91:14:6f:c9:81:15:da:71:c3:0e:fa:
d7:8f:bd:d0:58:1e:96:1e:1c:8c:cf:e0:a3:69:f2:
fd:b6:86:f4:9f:d9:00:ce:06:e5:66:04:b2:a2:b4:
bd:f1:29:4a:59:f0:f0:c6:eb:4d:c3:71:8f:67:62:
a4:4c:90:68:e3:05:9a:f1:13:41:d2:9a:f5:bb:38:
88:ce:37:0f:28:4f:03:1c:a8:69:69:53:fd:87:68:
80:55:d9:37:9f:ca:65:eb:2e:85:3f:7d:3a:26:dd:
af:1a:36:c4:2c:b2:d4:61:20:d3:15:00:80:66:3c:
ca:fa:12:6d:6e:95:bd:af:a2:22:4c:33:55:d5:6b:
f3:ee:5d:68:63:ab:e6:74:a4:01:03:29:95:76:1c:
3f:71:e2:9e:c2:c4:44:51:a1:42:a0:aa:cd:82:dc:
4c:8d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
74:c9:6e:3d:19:3c:4c:1a:c1:44:f6:c0:84:51:9f:1e:d4:62:
fb:f2:ba:eb:95:3a:0f:d3:8b:c0:b8:be:65:ea:cb:ec:24:9f:
bb:e2:38:b0:e9:51:d8:85:3e:6f:b1:e0:61:a8:1e:e6:d5:35:
50:4f:93:b9:c0:6d:0e:1c:81:03:3a:5e:22:81:24:f5:4b:ca:
4f:97:b2:45:65:e6:eb:0c:74:a5:1b:6e:e9:7a:98:15:9d:04:
d1:e1:09:79:9e:75:6c:31:fa:05:eb:be:9b:d2:a0:0f:39:62:
3f:97:cd:3f:67:07:9a:77:1a:07:d6:f4:62:a6:f8:e9:9a:7b:
1b:3c:0f:e6:13:9c:bf:6d:8a:eb:e8:de:b1:ef:a1:f6:d8:29:
d1:51:51:ca:cd:49:41:db:5b:dc:b3:fc:1b:c0:38:19:85:89:
f5:10:9d:52:c3:2e:35:74:a0:a2:bf:47:22:b6:52:c4:20:63:
5d:4e:d0:77:e7:48:b0:30:48:97:e4:9e:bd:e6:20:da:00:21:
ec:8a:b3:c0:24:e9:eb:79:69:92:6d:45:89:e9:26:25:be:c7:
6c:56:43:82:51:a3:33:70:26:43:c0:bd:fa:d0:89:8c:a8:94:
3b:47:bc:29:5e:80:24:be:15:04:05:7f:a8:d3:1e:d7:6a:96:
d0:dc:72:3a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:42:22 2025 GMT
Not After : Nov 28 11:42:22 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
70:91:8e:eb:9c:9a:ea:22:ed:01:6c:fa:aa:00:02:e9:d8:c5:
19:9d:d3:38:a2:b3:ae:1d:e5:57:d5:76:14:5d:f1:94:13:3b:
a8:25:ac:88:68:a5:36:97:39:a0:82:1f:f7:d0:bb:a5:f0:e7:
ec:58:cb:6a:1e:c5:8f:cc:2c:50:67:80:73:ae:f1:d7:90:c0:
75:7a:c0:a2:05:3c:a4:99:02:e2:a4:99:31:df:1c:b6:8d:23:
9f:fa:c0:70:30:9d:90:81:dc:ca:96:7c:d2:c8:34:6b:62:5a:
3a:7d:c9:22:9a:51:8a:75:08:c3:71:ae:46:b2:fc:27:d7:46:
c4:ac:9a:ad:d3:0c:ff:78:7c:60:7f:0e:ec:3f:67:60:86:72:
44:ad:ff:51:63:8a:44:53:ae:9d:55:b2:0d:d6:dc:8d:0f:c4:
18:b0:7e:7d:b1:ae:96:58:bf:39:b9:c8:10:f0:a7:1e:39:6b:
01:ff:9e:95:b6:84:bf:f1:63:69:2a:4d:0a:b4:ee:e8:17:9f:
4f:b7:6d:ca:80:42:8b:69:03:b7:7d:30:4d:cf:d3:c5:93:32:
09:8c:c9:95:46:9d:85:13:87:7b:d3:41:e6:d9:60:d2:53:ef:
f3:7b:79:79:4a:bc:22:24:fa:8f:01:cf:b9:d1:ea:3a:fd:aa:
fa:f2:65:0b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.66s
Truncated 3124 bytes from beginning
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
* TESTCASE PASSED
20,405,306 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:54:45 2025 GMT
Not After : Dec 27 10:54:45 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ba:fd:e1:2e:cb:ca:88:e3:b5:ce:c8:3e:12:0a:
a9:a0:70:50:bd:33:27:c5:d5:90:f1:0a:23:56:ee:
db:a6:fa:3c:d5:ed:11:75:f4:5a:a7:33:d0:94:c9:
a0:79:0f:23:ac:29:51:38:de:05:d9:de:2a:69:26:
24:88:e4:26:7a:2b:9b:d9:16:a9:ad:c9:24:26:f2:
33:35:9d:73:dd:8c:13:f6:8d:d1:b8:38:2b:8c:b9:
54:b4:9e:fc:bd:3b:66:f1:17:e0:1d:e1:98:cd:5f:
fa:8d:42:21:d6:87:fd:3b:36:89:80:88:79:01:5d:
3f:af:3d:d9:8d:c8:33:d3:07:ec:db:a3:4c:d1:ac:
4a:ea:16:1b:ec:15:99:c4:6c:ed:6d:23:83:00:c8:
8f:96:f5:9c:08:f3:40:43:20:97:00:23:57:98:81:
d3:8b:87:0c:47:ac:79:7e:3e:f3:d5:21:ad:96:5f:
58:28:6c:7e:a8:df:80:26:ef:7a:23:22:80:5e:79:
bf:8a:5c:38:40:f8:6e:e1:2c:78:29:3e:38:78:90:
c7:b6:84:c8:f9:fa:dc:5c:87:ed:fa:e3:d8:c9:41:
ff:04:bd:64:a8:d0:4c:24:9f:74:57:bd:e8:a3:51:
e8:3f:13:de:93:6f:52:50:83:1b:05:47:06:23:b6:
5a:ef
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
89:0d:87:3a:cc:31:d8:05:db:65:24:62:dc:eb:e9:dc:9e:04:
d2:e8:1a:da:ab:59:46:28:d5:fd:f5:57:f6:29:dc:8c:c0:2b:
a2:03:7a:9c:b2:e6:5f:90:2e:bd:2d:a6:a7:19:8a:f6:0d:53:
71:bb:ff:96:53:ca:d1:b7:93:9d:2c:c1:98:22:e1:28:27:89:
43:d7:c9:5d:f1:25:2c:56:63:30:20:fb:3f:90:d7:7f:61:d6:
f8:78:ed:50:c4:2f:1e:8c:3e:3d:ea:9b:68:f7:25:66:2f:5d:
ca:5b:d6:65:6e:07:2a:92:75:a8:eb:9f:52:74:1d:c2:28:99:
d5:92:2a:bd:b7:ee:4a:48:79:e6:7b:48:86:22:9a:de:da:80:
2c:50:ca:14:8e:97:ba:38:77:a5:05:2c:02:45:df:93:50:9b:
42:79:f2:5b:12:41:39:50:de:e6:6a:0d:4d:8b:b3:0e:94:89:
50:17:b7:01:d3:60:9a:f8:9e:e3:89:5b:cf:69:b5:36:63:4a:
a6:79:3d:13:e4:af:18:02:68:77:8b:2d:42:b1:40:bb:44:5a:
cd:3a:cf:d0:5a:b6:37:aa:0b:6a:85:9e:34:2c:bf:d3:8e:e2:
ab:d1:3f:7f:9b:63:ee:fc:50:be:40:64:49:9b:fa:fe:1c:4d:
6c:ed:3e:08
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:54:46 2025 GMT
Not After : Nov 28 10:54:46 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
b3:23:a4:22:b2:73:5f:85:a4:3b:ad:bd:ba:17:47:49:d6:4f:
fa:3e:ca:cb:c9:a3:99:03:37:48:41:39:3e:3c:ef:ef:26:55:
38:05:84:0a:85:a9:6b:c0:24:02:c8:aa:f1:84:52:57:fc:91:
12:e1:91:d9:4e:ae:30:c7:b9:0a:b2:b1:3f:42:e6:2a:85:bf:
2e:33:4f:63:52:bf:25:83:7b:c5:21:85:d4:f7:9e:73:74:d3:
3a:4e:e6:ad:70:8f:9d:56:35:dc:df:95:6e:21:6e:c3:bf:35:
ff:8f:2e:94:0a:22:82:fd:05:c1:41:5e:2e:da:66:5a:e6:eb:
d9:47:5b:fc:df:49:3c:88:d9:af:ca:32:a2:9f:20:04:03:3c:
49:b4:c2:0a:e1:7b:2c:7b:40:60:74:bb:c2:5d:9e:b9:4a:01:
75:2f:81:4e:82:dc:89:84:29:10:4a:d4:d9:87:17:63:81:2a:
09:3d:86:c4:55:18:2b:6c:e4:22:b5:59:f2:8c:d0:bc:21:d9:
16:7b:d3:43:a7:61:0d:fa:a1:b3:f2:74:d3:e4:ef:98:67:a3:
da:cf:d9:4a:38:43:b2:c8:9d:b3:4a:a5:2d:1e:ab:c3:ca:62:
1d:02:16:0d:5a:81:86:30:dc:19:71:69:86:8f:78:87:95:f4:
60:6e:69:84
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.07s
Truncated 7920 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,948,396 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:55:57 2025 GMT
Not After : Dec 27 10:55:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:98:eb:5e:eb:d3:f2:9f:62:80:37:6a:58:71:2b:
0d:15:16:f5:ae:e8:17:74:99:1d:9f:a1:de:48:4a:
5f:e1:70:c7:e3:ff:15:83:58:12:8b:a5:aa:da:cb:
4c:3d:dd:1f:b9:b0:f8:75:4f:10:bf:47:9f:23:99:
31:fe:57:da:ce:7c:de:79:80:a4:a9:b7:17:9a:b4:
5c:5a:31:0a:94:c4:52:d1:2f:bd:6c:46:dd:db:9b:
cc:4a:10:d0:12:92:14:96:70:28:08:d3:d7:12:4e:
3e:e9:69:85:e5:06:aa:76:2a:bf:e6:82:9b:f6:c5:
fa:0e:b2:00:c3:cd:bf:4d:a7:0e:ba:73:ad:a4:46:
09:5f:e6:66:ac:e0:e5:c5:51:ec:38:45:3d:66:14:
ba:e1:0f:c5:ea:09:40:8d:70:da:ab:b7:89:64:09:
cc:8f:b2:c4:90:70:36:b3:fc:bc:e8:72:61:b3:bf:
ca:6f:eb:c2:f8:7e:de:a6:4e:c9:c7:d8:b9:3a:f1:
56:e6:92:bb:cb:8b:d9:9c:3e:a5:32:8e:f1:3e:8b:
e7:60:c9:ed:f9:aa:45:e0:3e:7d:41:18:64:2f:73:
21:5e:c8:b2:05:86:cf:1a:a2:f6:20:7d:90:f6:93:
f3:aa:0d:aa:ce:8c:04:e3:17:d8:3e:91:94:f6:7d:
e4:cf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8f:e5:d2:20:15:68:86:6c:5a:c6:49:ad:7a:3e:9e:77:21:f1:
35:70:08:b2:9a:4d:80:4e:73:4b:95:a8:f6:4e:5d:6c:95:d1:
1d:0b:0e:99:6b:b4:68:ed:f0:0a:59:21:18:76:4a:a5:98:93:
d6:dc:8a:f0:85:31:d4:3c:84:57:38:76:6f:f3:95:ec:fd:1b:
b7:c0:6e:48:2a:7d:a6:46:60:1f:2a:4e:8d:b0:44:9f:e2:6a:
15:f9:60:d2:97:c0:f5:5e:82:9e:64:2b:d1:12:de:5c:1f:e4:
58:2f:91:28:00:88:a6:0c:d4:8d:5c:e5:f8:9d:57:e9:0b:6b:
10:b9:75:e0:39:f9:00:d1:d3:55:79:27:d0:fe:46:55:ff:f2:
21:5d:3c:01:09:52:9d:b5:7b:58:13:38:a0:e0:85:9d:5b:ff:
b4:10:1c:75:2c:48:dc:63:db:6a:cb:4a:7b:9f:2b:8f:e6:3c:
b6:01:d0:49:e5:13:58:b1:e6:1e:07:94:48:43:c9:ec:fc:a3:
6f:0b:96:7c:84:c8:46:e6:27:f0:a1:b0:10:fd:ff:82:cf:3e:
a4:94:2e:57:d6:29:37:16:f4:8b:d6:98:d7:cc:57:8b:b2:a0:
09:f8:04:7f:96:d3:1b:9b:85:8a:b8:af:e1:28:a7:6b:60:5b:
09:ff:f4:fb
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:55:58 2025 GMT
Not After : Nov 28 10:55:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:13:00:05:c0:bb:ca:11:fe:b0:f2:cb:e7:57:1e:6e:e2:ff:
40:d2:15:78:4b:f2:3f:8b:72:13:27:d2:95:ff:23:26:2c:23:
59:cf:42:ec:8d:66:c3:f9:a2:19:02:7c:37:23:56:96:5f:2d:
fa:f3:5a:f7:d9:a3:c5:2b:39:e9:6e:bd:63:06:74:60:cc:10:
b0:51:3b:c1:e1:07:2b:0f:6a:58:bd:42:5a:5e:a1:a4:d3:39:
0f:03:50:0c:62:6e:30:04:4f:20:d9:7d:8d:f1:7f:08:47:4e:
38:43:d2:56:80:68:fa:1b:ea:68:fc:f7:d8:0a:a9:db:18:e7:
9f:b7:73:21:fa:39:4a:fc:e6:17:83:a2:dd:82:21:6f:63:dc:
b6:15:31:99:59:22:2d:7d:0c:13:6e:f4:57:67:1b:9b:fb:0d:
95:bf:51:6e:a9:aa:df:5f:55:fd:c1:a5:b1:2d:85:08:33:2c:
44:22:41:fa:f3:eb:9b:00:06:4e:2d:7f:17:18:a3:c9:d1:25:
59:94:60:20:43:00:7c:60:c5:26:ec:57:cc:f5:39:96:ca:43:
8c:1a:44:c4:94:33:47:9d:fa:90:82:8a:5d:ac:46:96:14:f4:
91:fb:94:02:45:67:3e:02:f1:9e:8e:6c:9c:56:02:ef:fc:ab:
24:24:2c:9c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.91s
Truncated 3124 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
* TESTCASE PASSED
20,557,873 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:55:49 2025 GMT
Not After : Dec 27 11:55:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c1:30:c2:55:c9:b3:38:4d:62:ee:25:08:19:4c:
f5:ff:7a:d9:52:54:b8:c6:4a:7d:a3:f1:aa:d1:35:
e6:16:a7:b9:1c:68:40:8a:0d:d6:24:71:7c:d0:75:
49:5d:f5:db:1c:7f:89:be:e2:f4:a1:ed:89:96:7c:
db:38:f0:5a:1a:a3:92:eb:cd:6e:9a:64:8a:ce:cf:
76:a6:bc:c7:b4:43:7e:98:81:11:02:cf:80:66:e6:
97:03:e4:1a:11:64:03:44:34:1f:8b:fa:0c:27:c2:
c1:67:e7:0b:5e:3c:a7:07:ba:af:71:b6:47:58:c4:
c9:84:52:32:ae:e9:b7:3a:8f:6f:0a:3f:29:b1:dd:
4e:ad:eb:df:67:6c:2c:04:e0:ba:a1:d5:59:f5:7a:
e2:e9:2d:44:47:98:d4:b9:99:07:36:01:2c:3f:5c:
19:a6:d3:04:2a:ef:04:a6:8f:8a:e8:1d:64:a9:f5:
13:c6:fd:4b:82:11:28:47:1a:71:4a:9e:59:4a:64:
9c:b3:6d:d0:2d:3b:0a:61:3a:97:20:de:b9:09:20:
9f:ec:02:ce:0b:ce:db:0a:de:3b:44:7c:1a:ff:b8:
06:da:40:96:fd:66:90:48:05:44:42:3d:5a:5b:16:
86:cf:45:b8:0d:4f:13:b5:5d:54:ce:30:13:0c:81:
3b:c7
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
14:fd:67:44:b9:06:63:50:71:de:1d:c1:fc:8f:e8:5c:19:d8:
c3:47:80:51:16:54:d2:d8:0c:6c:67:3f:8a:bf:de:ff:14:9a:
c8:27:5f:3a:09:51:c8:09:e4:96:a6:bc:b1:a2:62:1f:fe:fa:
6e:61:af:af:ea:5c:bf:07:17:7b:60:89:5c:ba:99:2c:f7:46:
e2:a8:1c:89:88:98:2a:f8:a3:1e:16:bb:0c:71:ca:9e:dd:83:
83:a3:c1:bf:3c:77:e2:18:e6:ce:79:53:97:e2:4e:72:d6:f6:
99:a6:86:2c:a1:a0:11:1b:93:bf:f6:e2:d8:30:72:37:8e:7c:
a9:1e:be:39:05:40:90:cd:1c:c7:f5:15:90:85:1c:27:68:f2:
5c:9b:63:4a:1a:32:78:d3:de:66:3d:56:04:29:34:e3:b9:fe:
c9:99:f7:e3:d1:87:dd:18:10:32:ed:ce:bb:ad:4b:68:8b:bb:
ae:21:ff:a4:2e:60:fd:95:e7:bd:c3:c8:00:a1:7e:8f:4e:c3:
2e:e4:61:13:28:bc:5a:c3:50:6b:f9:8c:69:29:2c:bb:57:f2:
48:a1:ce:40:49:44:8d:ae:06:59:92:5c:50:f7:b3:1b:e9:b8:
25:93:d6:19:bd:a8:74:20:31:84:dd:91:46:92:f5:7b:f3:cb:
fa:0a:97:46
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:55:50 2025 GMT
Not After : Nov 28 11:55:50 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1c:4e:e2:e0:a0:3b:7f:2e:74:b0:e7:1f:9c:30:dd:5c:32:45:
55:f9:ce:2a:db:45:ab:4a:00:5a:65:04:a3:65:59:4b:72:7b:
af:37:ae:fe:28:7f:6a:59:d4:90:60:c5:4d:8e:8c:dc:66:2f:
9f:bf:1d:a3:e1:51:3b:bf:e5:c9:f8:bb:35:68:a8:a4:8e:24:
fc:15:97:05:da:70:85:90:4f:82:71:5e:3c:36:52:3d:fd:3b:
dd:2d:69:63:eb:b9:d6:68:27:0a:3e:b4:61:dd:d8:c1:d8:50:
4a:6d:69:87:33:c7:e4:39:da:ac:75:91:85:d9:53:2e:83:3b:
a6:62:e4:08:c7:77:a7:be:6d:cc:c7:22:76:33:d9:a3:ca:dd:
4c:67:84:14:c0:bf:3d:8e:ee:54:9d:49:27:6f:12:ef:8b:7c:
e5:8c:21:85:de:80:b7:9b:54:57:05:dc:9d:8f:50:f1:8a:34:
83:f5:aa:ba:c3:6f:3d:a3:2b:c9:fa:d6:99:71:a9:03:56:bc:
8e:de:23:85:3b:7b:5f:ad:7b:af:79:e6:e6:37:0f:59:23:0f:
bb:40:a4:76:6f:62:f7:ab:85:39:e2:ff:e9:d3:15:3c:8a:cd:
3a:17:ac:de:ee:c3:12:a6:be:47:29:c9:cc:47:f2:28:fb:0e:
7c:bb:bf:1b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.95s
Truncated 7855 bytes from beginning
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
3,141,268 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:26:06 2025 GMT
Not After : Dec 27 10:26:06 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ea:5c:f4:bc:24:41:47:50:df:0b:43:5d:c6:f4:
e8:69:10:bd:ec:c6:5c:a3:3a:22:82:dc:c8:63:77:
3b:51:9b:65:c9:58:03:d6:32:c6:54:03:64:9f:ba:
8a:80:a3:54:7f:3a:70:ad:32:1a:7a:ee:5e:a2:72:
ff:4b:3d:6f:ef:ae:c9:48:3e:59:53:70:cc:27:c2:
1b:ed:2e:32:29:c6:43:62:97:0e:75:37:75:92:9f:
2f:5c:75:fe:bb:83:78:dc:7e:02:ab:0e:a1:ab:ea:
db:2a:14:17:dc:35:8d:ad:6a:a8:bc:8f:0b:f6:6a:
e3:6d:89:11:b1:5b:10:ee:51:82:4b:29:ba:e5:45:
e3:89:4b:85:6c:99:60:a4:f4:89:c2:47:7c:36:74:
13:90:09:8d:0f:7a:2e:b0:2d:2b:07:f4:33:6d:b6:
f9:a6:17:f1:ce:2a:a5:62:60:6e:00:3c:00:b5:29:
84:0e:87:3b:ff:1b:43:39:27:1d:7f:4f:0f:fb:4f:
f5:59:21:95:d7:ea:ed:28:ea:cd:11:72:83:a4:e0:
f1:c0:31:42:56:70:51:b5:6c:53:57:ca:9e:f1:0e:
aa:77:e8:79:38:9a:01:57:13:75:a3:39:cd:b5:dc:
c7:42:03:2f:c8:09:49:df:5c:4f:a7:08:73:79:20:
60:73
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
0e:eb:4d:54:66:61:5f:e0:d0:2b:6c:94:c1:07:82:58:00:c8:
18:e6:18:71:16:38:2f:dc:62:a9:dc:7f:2a:be:8b:4d:e6:ee:
d3:83:06:b1:f3:57:52:70:29:09:ed:f1:81:f5:b9:53:fd:3c:
3c:1a:50:cb:f9:7a:a1:0f:79:58:ca:5f:29:c4:89:a0:23:70:
bc:71:4c:86:83:6e:02:3b:6c:d9:23:d6:94:fb:7f:47:e3:86:
26:26:1d:74:d5:6d:00:a0:56:58:b2:ff:aa:0c:07:99:5c:7f:
53:5c:27:cc:47:cc:3e:94:ee:40:93:6e:57:c7:a6:9d:bf:e7:
87:17:df:0b:61:7d:76:cf:dc:1e:fc:06:98:24:23:d5:49:09:
4b:c7:f3:5d:8c:ff:10:d0:1d:e4:57:da:f1:54:9f:db:d0:48:
af:53:4c:db:cd:3b:16:21:77:bf:15:50:6a:3f:c7:c6:cc:0b:
18:bd:db:f9:be:7e:ad:bb:be:be:f3:89:27:da:94:82:85:95:
3e:0f:99:f2:58:80:d2:70:f1:de:83:31:a5:f9:d0:91:78:cb:
06:03:b9:d8:1a:2b:3e:6a:5c:ea:76:a5:5a:7b:3f:c5:2b:81:
f5:57:2b:9e:e1:4b:47:d3:cb:7f:69:3f:4d:b5:38:30:0c:02:
1d:c1:08:f8
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:26:06 2025 GMT
Not After : Nov 28 10:26:06 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
49:d4:7b:70:03:cc:8c:24:f9:f3:d0:1d:de:b4:95:71:a5:46:
e1:cc:16:a3:08:ca:a9:a4:72:95:20:e7:bd:fa:cf:bd:32:17:
ca:66:a4:c6:07:c6:19:9f:df:9e:fd:a6:ef:25:f3:0c:06:3e:
23:82:38:6a:87:a4:da:0f:7a:59:3a:06:fd:30:19:50:6a:ef:
90:f4:48:b6:99:48:16:fc:38:7d:1d:83:32:fe:e0:d4:ca:77:
eb:06:e8:5f:31:5c:e5:0a:ca:12:6d:34:34:2e:86:5e:4b:14:
70:d1:d2:37:c5:ef:b8:f3:56:a6:f1:48:73:49:8d:fc:bb:f7:
62:23:4b:3d:a9:56:93:ad:bb:d0:e5:f1:75:ff:11:b9:64:32:
ac:0f:c2:7e:3e:33:67:04:41:09:5f:14:32:b2:87:34:7b:3e:
3b:88:c4:dc:d5:aa:d1:62:3f:21:76:b8:ba:aa:c3:52:82:cf:
ce:87:e9:af:a4:46:24:1c:f3:24:a3:56:ba:68:25:1f:e3:99:
da:d1:df:c8:1a:46:fa:68:43:b0:05:39:86:d8:9d:69:8b:dc:
7b:22:cc:73:5e:4c:61:9f:87:00:57:c5:5f:08:66:eb:99:fa:
90:1e:a0:19:b3:13:64:d6:b5:8b:72:46:b9:07:b8:96:94:85:
2c:cb:68:fc
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
Truncated 3059 bytes from beginning
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
2,894,281 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:56 2025 GMT
Not After : Dec 27 10:25:56 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a5:5f:d3:22:e8:b5:3d:b8:d4:49:66:20:db:bc:
ee:86:9c:5c:99:2b:88:fb:a4:ea:61:6e:68:69:8f:
4d:e5:e1:cc:b2:73:43:9e:59:24:7c:3e:8b:04:94:
68:20:39:c5:0f:83:32:98:48:62:77:cd:02:a3:d4:
aa:e0:38:5c:6f:34:3d:b0:14:bc:ea:15:7a:20:c9:
a2:2a:81:95:ba:a6:a5:44:ce:bc:98:90:54:70:28:
fc:f7:2d:20:da:d4:b3:4c:b5:32:3d:a7:9c:fb:21:
37:3d:24:3e:22:f2:38:2c:05:04:e9:74:30:f5:ec:
de:75:fc:fb:75:8a:73:5f:7d:ac:d3:81:00:c0:09:
c7:ac:fb:29:0a:a1:e8:d1:2d:07:10:bd:fd:28:86:
f3:47:dd:c6:bf:54:cd:a2:30:1f:68:51:3e:b8:7e:
d4:94:c7:c6:1a:ab:64:8b:4d:47:dd:94:80:71:b0:
58:cd:55:a5:b8:a5:8c:5a:76:b8:13:70:d6:d1:a7:
c3:2d:ac:37:89:92:dd:86:63:a9:02:19:11:f4:9a:
ed:3e:14:2b:a4:90:95:3b:bf:e0:43:e3:53:d0:ef:
de:f2:a2:a5:80:3c:93:3c:ed:cd:4e:11:d6:0b:67:
3e:62:11:bb:50:46:74:c5:3f:6b:b1:5a:cb:1c:85:
08:cd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:4b:0c:75:7e:78:1e:ed:cf:4a:ec:fe:77:cb:20:e0:ad:aa:
20:69:8e:70:77:9f:44:8e:f6:8c:4c:fa:a4:32:42:b9:d1:ed:
cf:50:64:80:fd:c4:4d:5b:ef:12:f4:26:e5:f7:46:b4:64:be:
a3:49:fe:03:84:e4:af:a0:ea:45:12:8e:49:a2:ad:58:6e:aa:
a9:02:26:02:f0:54:94:78:a7:de:05:db:1a:b2:60:0d:3e:f5:
e2:ea:a7:eb:d2:51:24:c7:77:cb:a2:11:39:73:24:29:c3:b5:
ff:5f:d5:21:4c:9f:dd:3a:50:11:17:26:dd:f0:5d:6c:42:fc:
c9:a2:76:50:32:2b:74:6f:36:72:83:35:5a:b9:02:17:70:cb:
ca:d3:b4:22:18:2b:3b:5c:d4:89:a0:a4:ca:5e:73:07:d4:d2:
45:23:96:56:8f:b6:92:19:55:dd:9e:79:ce:9b:85:ba:56:a7:
d7:64:cc:ec:86:2c:f7:d3:97:12:79:3a:73:7c:ed:26:1e:3e:
20:42:c5:88:02:a0:0a:47:6f:78:f4:0d:fc:ba:bd:56:36:f2:
c5:f0:67:4a:7c:3d:a0:da:d7:67:b2:50:b5:f4:27:9d:de:d8:
d2:f8:dd:ed:14:45:8d:89:a8:23:59:80:0e:bf:08:0c:ae:bb:
ee:ec:53:a1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:56 2025 GMT
Not After : Nov 28 10:25:56 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
28:67:1d:7c:74:c2:f8:e1:ee:41:7c:ca:cb:78:ee:e1:97:60:
96:b7:4d:ea:2e:92:d9:4f:39:02:ca:ad:7c:45:30:0d:0f:2e:
b0:95:83:c2:88:ab:23:3d:2e:89:54:12:fc:4e:39:d5:0a:17:
6c:89:b1:60:b9:d1:45:d4:ba:8c:4c:ef:ce:c6:90:fb:c6:b0:
15:e3:a5:95:3f:01:ed:83:b4:89:67:e0:16:0f:c0:f4:45:75:
37:06:1b:cd:c3:b2:78:68:2d:99:84:3d:68:5c:a2:e3:0e:1f:
d4:e0:6c:e5:16:15:7d:a1:4e:56:24:4f:8c:cb:0f:c1:e3:2b:
d8:08:70:60:0c:c1:8e:18:c3:1f:47:f1:2d:c8:3c:a3:3b:72:
cc:28:0d:e4:d2:2d:5f:d1:82:79:83:40:81:ca:33:d5:52:b6:
99:b3:aa:2a:dc:21:46:9a:96:7f:88:4d:11:3e:48:96:17:2d:
a7:bd:e7:ab:ac:bd:b3:91:7d:23:43:93:ec:9b:3f:b6:f5:17:
52:dc:5b:fc:35:74:0d:6d:61:ed:ec:a5:f5:52:83:e4:81:0f:
af:b8:90:7a:13:c0:fa:96:2d:f0:47:25:82:1a:e8:d8:0e:2a:
7d:93:23:03:5f:d8:c4:2a:32:20:65:6f:4d:c2:ae:5b:c5:e4:
72:40:bf:61
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
Truncated 7855 bytes from beginning
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
3,145,077 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:57 2025 GMT
Not After : Dec 27 10:25:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9d:13:75:8b:ec:c9:a3:ed:04:fe:4b:04:54:0d:
d8:d0:ac:1e:c9:3d:13:45:74:5e:b4:d9:88:30:e9:
db:c5:f7:14:32:c8:9a:dd:ff:de:6c:11:e7:86:56:
b3:e7:49:52:fd:66:ad:cb:ed:d4:db:71:f4:22:a4:
77:98:ae:ea:03:24:07:9c:1d:34:f8:c1:6d:48:00:
66:fc:50:8d:dc:5c:8b:77:33:e9:37:c5:90:7c:62:
3e:dd:63:72:c3:6f:a8:1d:42:34:61:6d:03:0b:5a:
bc:38:2a:e4:30:d8:0c:9f:4e:d4:6b:ce:47:d1:58:
a4:2f:93:75:1a:b1:7e:e8:0a:c3:1f:3a:47:c4:bd:
db:e2:69:31:2c:34:26:df:18:47:dd:b4:9e:79:59:
06:22:3c:10:56:28:bd:6c:04:e1:99:b1:7c:67:95:
d1:2a:af:24:d6:9d:0a:6c:c6:55:4f:e1:31:91:39:
fb:9a:67:a7:a7:b2:e1:17:fd:7b:6b:35:5d:2b:2d:
a2:9e:fd:4e:c7:64:f7:2b:d3:e8:f7:c6:27:94:bf:
4f:32:a6:f4:b9:7d:52:2f:d9:c0:e3:77:7e:78:b3:
dd:fa:61:ee:ae:5f:54:09:e0:3b:02:61:ef:e7:b1:
0a:52:55:19:d6:f1:60:9b:63:e6:19:53:56:08:3f:
66:85
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
48:59:7e:e1:6f:c2:a0:5d:6f:07:4c:85:69:3d:e7:73:ce:c4:
1c:65:b1:23:64:92:c5:6c:db:90:0f:c3:a3:03:80:06:88:24:
99:95:93:9d:12:25:18:25:de:34:a6:8d:18:2f:1f:90:89:a7:
f8:8b:5e:82:42:13:cd:b1:e9:73:1c:41:a9:d9:67:9d:1e:6a:
f2:8a:22:16:57:77:9d:1d:c8:f4:5a:f5:29:49:34:a8:5a:1e:
14:23:0b:17:6b:4b:2d:65:d6:3b:91:0c:bc:c0:fd:8f:9c:75:
9b:a4:de:cb:75:b7:b0:18:bc:14:60:3d:60:c0:8b:70:1f:04:
23:5d:06:7d:ff:00:d0:86:96:d4:1b:5b:b8:7f:53:96:ea:79:
8e:36:d0:8a:93:52:fb:96:3b:1b:89:ee:7e:54:55:29:02:38:
7d:a2:6a:40:53:1c:96:76:4d:3e:10:a0:eb:38:45:be:ed:dc:
60:13:ec:00:62:69:1d:52:51:20:84:68:be:94:99:3a:b5:50:
76:ae:7c:48:d0:aa:68:64:5b:54:cd:6f:66:bb:22:c0:4e:c6:
b9:08:46:51:f1:2a:f4:89:89:0e:42:a9:41:87:c2:c3:0f:c0:
08:56:3e:7e:a4:36:a7:07:99:95:48:09:24:6d:aa:ea:8d:81:
4a:1f:8a:1c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:58 2025 GMT
Not After : Nov 28 10:25:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
30:50:d4:1f:03:5f:40:d2:23:50:1e:54:28:10:3d:5b:64:fc:
9a:ba:74:59:6a:96:90:5a:b3:4c:04:41:94:3e:76:ec:6f:d7:
ad:5c:1a:76:ff:98:58:ff:bb:f8:55:87:c3:13:17:e9:19:8d:
15:8a:36:e0:1b:17:9e:4a:26:bb:54:67:2c:1d:e3:cb:3a:4c:
6d:c6:7c:64:c5:99:76:d6:c6:69:b7:ad:c7:a0:6a:b0:66:7c:
6f:a9:ec:12:55:93:3c:ac:74:b0:28:b8:40:a7:aa:59:f0:b5:
84:fa:04:83:4e:8a:64:b2:e8:1a:38:c6:8e:db:41:8f:3a:c4:
9b:98:46:bd:55:f1:18:0d:57:05:8c:85:b0:0f:3a:ba:e0:33:
61:32:c7:65:47:17:4a:01:ab:ab:7b:c8:c6:a7:e5:a1:24:17:
41:85:76:1e:93:bb:7b:52:4a:7b:91:42:16:f7:35:ad:f3:d8:
18:ef:ce:e9:5e:96:55:ee:c4:82:d7:0f:21:37:af:5b:9e:18:
21:6a:48:5d:07:75:38:10:42:c6:9c:0e:48:ce:e0:47:40:ea:
54:17:75:ac:84:6e:c3:24:31:18:4d:1e:ce:ca:c2:b0:93:42:
e0:56:4f:2f:8f:a9:f4:41:1b:ac:64:20:e4:d9:f8:96:36:f8:
84:7c:94:ac
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,898,022 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:57 2025 GMT
Not After : Dec 27 10:25:57 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:af:fa:f0:51:26:9c:de:68:df:f8:0a:b7:09:a0:
01:e5:83:6a:4d:23:86:c7:77:ce:01:2b:a8:1e:8a:
75:16:7c:c1:16:da:79:e1:be:7d:16:4b:d9:55:2f:
23:92:bd:18:c7:49:48:af:02:76:37:08:0f:3b:a9:
2b:88:ba:af:dd:d8:52:3b:77:40:2f:e8:d9:10:fb:
76:bf:da:1a:76:e0:d2:3d:dc:f0:7f:9d:9b:82:34:
0e:72:1a:3b:14:04:aa:30:77:03:ab:49:0d:dc:2e:
3e:fb:53:2f:ea:d6:42:d0:d6:48:a2:e8:65:0a:a7:
e5:c6:97:e4:bf:33:da:f2:ef:72:a1:98:0b:0a:ad:
53:51:c8:5e:44:81:37:9f:1d:44:e7:2e:8c:1d:95:
00:02:13:4a:66:4a:61:04:a4:31:4e:5a:ea:8b:b4:
6f:9a:e0:1f:ba:4c:cb:60:00:5f:9b:36:34:40:8c:
60:c0:d8:c5:ce:f3:08:9c:0b:58:54:0e:92:ba:47:
62:ae:c4:78:bc:d7:03:b4:98:63:d2:d9:2d:ca:8d:
f7:05:dc:dd:3f:fc:07:d8:15:88:04:12:f5:1e:f9:
e5:e9:43:a7:d2:c1:dc:82:bd:5e:b8:7a:72:32:47:
f5:e4:e2:a3:1a:93:83:fe:ac:a4:71:11:01:ec:9a:
78:51
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6e:4d:4f:5e:c5:97:fc:a6:5c:a5:d4:a8:0e:c9:96:af:35:b8:
56:dc:34:7a:8f:02:c0:11:47:29:3b:cb:5d:fd:53:49:0c:ba:
1f:8d:b4:5f:30:54:91:4f:4c:7e:5e:3e:ef:79:47:7d:31:a3:
d8:e4:04:d4:13:55:f9:12:58:ea:c4:41:ad:a8:63:b3:9a:da:
68:a9:26:32:4b:49:03:69:9d:14:47:ff:6a:de:71:ca:60:5b:
15:9f:51:d9:3f:46:0b:fc:54:52:82:b1:63:ab:10:50:f1:dd:
a1:1c:b8:9b:98:51:d6:9d:5c:5e:3a:50:0f:3a:28:cb:b1:32:
b0:db:29:53:b3:ee:f4:fe:cd:e6:bc:67:c6:f6:c5:83:46:94:
9c:7e:e8:09:64:2f:8e:56:b0:52:ee:cd:94:12:d4:69:9e:a7:
9a:d7:36:d3:17:9c:74:6f:ff:5f:ce:86:1a:79:f1:40:ed:43:
51:e1:54:82:bc:3e:fe:f0:c7:e8:eb:06:cc:de:4c:c2:08:d0:
56:e5:fa:10:db:d9:91:a8:35:d4:46:91:a1:17:b2:97:45:72:
15:1f:1e:ac:43:a8:4c:43:b5:08:33:fd:bb:23:34:e0:b6:bb:
33:99:4b:94:55:44:92:db:12:e9:e0:b6:9e:f6:3a:3d:c5:d5:
aa:e2:44:c3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:57 2025 GMT
Not After : Nov 28 10:25:57 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1c:08:07:c4:45:8d:06:fb:8d:74:29:f0:b6:78:16:03:5a:81:
97:1d:6d:a3:2b:12:e4:fd:35:ed:4e:c7:2d:63:43:10:a5:ca:
a8:fc:f5:9d:4d:07:0c:f0:0b:4e:5e:3b:01:46:f6:de:a7:7c:
55:6b:3b:40:63:92:28:79:3b:e5:84:5c:37:58:3c:62:92:11:
ad:60:1d:bc:8c:e3:df:4f:bd:d8:4c:82:4d:2b:22:48:70:a2:
39:51:26:91:d9:a6:02:5f:33:bf:16:3e:d8:5c:9a:1d:bf:6b:
7b:f7:0b:ff:98:ae:6d:4c:da:09:e4:c1:c2:51:65:1e:10:98:
e3:55:c8:0f:b1:23:b7:de:1d:9b:0f:ec:80:5e:ff:40:76:bb:
56:ff:3c:cb:c0:e0:e8:96:01:92:70:58:a5:aa:18:c9:e3:ee:
62:18:d0:20:56:2a:d6:d5:72:5a:ea:38:0d:4e:a3:9e:91:14:
ff:f8:50:b4:7f:f2:97:3d:ca:69:d7:aa:4a:8f:49:ad:c2:b5:
2e:d7:d9:5b:98:e8:6b:14:54:ac:de:3c:02:dd:84:23:c6:c2:
c7:fb:96:4a:ff:ee:9a:a3:d3:1d:12:26:61:39:2c:86:30:b6:
db:50:c6:bc:f5:14:0d:74:f0:52:f8:33:9e:df:e9:1b:6e:7f:
73:da:a4:c3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
Truncated 7855 bytes from beginning
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
3,139,946 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:46 2025 GMT
Not After : Dec 27 10:25:46 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bc:1f:9d:e4:a5:85:7e:22:34:d8:f2:48:53:a5:
76:89:95:45:5f:70:27:a8:2d:7d:37:f3:5d:17:34:
47:40:a9:c6:45:e9:f1:dc:aa:25:ed:4c:12:47:70:
6b:58:fa:f0:f1:87:89:78:36:2d:d2:5c:88:c9:a9:
b1:87:de:72:b8:bd:b9:00:8a:b6:25:ac:32:cf:7a:
96:64:7a:80:ea:da:0a:07:e5:9f:10:51:f0:1a:c8:
f6:eb:66:90:71:6f:12:65:49:21:2d:bb:96:e5:31:
1a:3f:0d:3d:4e:32:bf:90:3f:45:cc:bc:00:78:4a:
74:3a:f2:c1:ec:5f:b3:cf:09:73:41:25:e5:05:b1:
24:2e:78:f2:15:7e:a5:92:94:3d:9d:89:8a:1a:bf:
3a:ec:bb:ec:78:52:92:77:4f:e5:49:53:ce:36:10:
2c:30:ab:45:88:1d:ce:41:a4:64:c4:36:7f:91:ee:
3d:6d:65:cc:61:bb:83:18:c6:be:23:eb:d1:6f:65:
af:d2:c6:2c:9b:0a:f6:2b:60:18:8e:aa:e8:ce:b3:
d2:b9:2b:2e:d6:6c:30:da:5f:02:42:b8:f1:29:76:
ad:f7:3f:d0:11:0e:3a:77:1e:bb:35:d0:87:fb:7b:
8b:78:b0:b4:d7:61:3f:0c:0f:63:16:c0:ab:0d:a8:
3d:e9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
89:4d:e9:e0:79:8b:69:bc:c6:af:ec:cc:28:82:ef:76:08:a0:
98:9d:e6:bd:45:fd:7d:65:72:bc:8a:04:18:15:40:2d:61:6f:
b2:8d:29:7a:00:c6:8f:26:09:2b:68:60:66:ae:09:2d:f3:61:
7d:16:64:63:7f:1a:74:a7:b4:b9:b0:94:4f:95:9f:bc:95:f8:
f8:4c:82:b6:38:5c:18:a5:4c:31:1e:a4:58:bf:10:a4:0d:97:
c3:b5:08:6c:90:0b:1a:cd:fa:60:ec:8c:28:3e:e4:41:7b:e5:
1c:86:9b:a4:77:5d:e6:35:b0:41:5e:73:a2:d5:7f:82:d6:68:
7c:37:fb:4d:a3:a3:13:d9:6a:d8:55:7a:c0:0b:14:c7:45:2e:
03:85:b5:f8:e6:d6:d2:fb:86:d4:35:d1:f8:af:4e:0e:50:9a:
47:56:f3:cd:14:48:51:a1:dc:ea:27:54:c0:b7:70:e6:e2:ba:
26:a4:29:6e:9e:8f:ac:e7:c5:7e:dc:27:5b:34:cc:b3:05:03:
19:08:bc:16:3d:2b:91:97:04:8f:c0:25:cc:68:d8:4d:22:fd:
1c:94:8a:14:b4:ca:d8:9d:1c:4c:d1:64:f2:9f:99:be:90:75:
99:db:3b:3b:ad:34:a0:37:1b:bf:1b:b6:2d:f1:1e:55:e8:a5:
68:d9:b3:75
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:46 2025 GMT
Not After : Nov 28 10:25:46 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
aa:98:d0:7c:4e:18:8a:44:19:ca:ac:9f:8d:a2:6a:2f:c3:66:
dd:ff:c8:21:5f:0b:3b:42:7e:78:c4:97:72:10:4b:74:fc:e5:
10:7f:aa:90:1a:65:b2:0d:ce:8a:43:dc:cd:51:f9:2e:75:f2:
10:65:5e:6f:9c:8d:41:c4:ba:d4:9b:7c:a2:11:aa:5d:8f:17:
b7:f6:f7:85:f8:cd:dd:6c:f4:72:12:a3:10:1d:7d:96:4b:1e:
c4:31:b6:0c:02:ab:70:fe:94:6e:d9:ad:aa:d6:e6:d9:f3:6e:
70:40:6b:1e:05:d5:55:a9:8a:a3:92:9c:9b:9d:81:eb:23:31:
c3:13:65:bd:b8:56:9b:33:79:29:8e:d4:f8:02:df:7b:68:26:
a3:d6:cd:01:cb:b0:a8:6a:8c:ed:94:96:2a:cb:93:2e:b4:58:
c8:1d:7b:ba:8a:ce:5c:4f:9f:9f:8a:04:6a:f1:af:f4:91:cb:
4f:42:1d:a1:b4:12:29:09:3e:fc:54:f0:f2:5f:ef:e4:df:8f:
9f:69:c2:02:b5:b1:59:d7:0d:d0:22:17:92:4f:f3:0c:11:a3:
39:0d:70:21:25:b3:ae:ee:2d:ab:39:6c:2c:3e:18:ad:50:e7:
1f:08:c4:f2:c9:66:fb:da:ae:5f:20:cd:3a:48:32:a2:cf:f7:
62:56:58:8e
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
Truncated 3059 bytes from beginning
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
2,895,597 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Dec 27 10:25:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:bf:4e:5f:24:77:37:a8:a6:58:28:3c:af:aa:99:
5f:3c:da:06:6d:82:4d:0e:fb:dd:6b:19:a4:2c:2c:
1f:e6:b4:e8:78:de:36:89:25:08:b3:f1:9f:39:9c:
7b:3b:8c:81:2a:41:7f:fe:92:49:4d:e4:90:b5:3d:
db:ed:d3:9b:06:b3:48:94:2b:b9:b5:dc:c0:87:06:
2a:bf:a4:27:d6:56:f1:e6:db:d8:b4:af:9c:e7:91:
94:63:1a:bd:49:48:f1:6a:35:b1:1e:5e:e0:72:9a:
9c:29:bd:8a:91:2c:f4:6b:8f:f7:64:2a:1a:3d:52:
2a:6e:80:8c:49:f5:63:af:42:d7:9b:40:1d:de:87:
f1:b6:4e:e0:50:06:84:3e:70:e5:12:9b:35:fa:e2:
ff:3c:24:73:47:2b:9c:8c:28:0a:7d:2f:fc:d8:63:
50:e3:4e:9c:0c:48:90:f8:82:5d:91:4d:bf:7d:94:
cc:ee:d9:a9:23:02:0f:36:32:fc:09:73:44:8e:c4:
f5:6d:74:1b:f8:f7:f6:fe:46:0b:e0:24:69:9b:b0:
d0:70:1c:b4:d0:07:85:df:b5:80:fc:59:76:5b:99:
9b:04:3e:bd:18:66:6c:3f:04:47:f2:09:00:fd:eb:
06:71:b6:b3:a2:6d:8f:0a:e4:ac:e5:dc:d0:8e:de:
7a:35
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
29:d0:27:65:53:5e:14:87:b0:e2:29:bd:65:5a:08:4c:10:82:
a3:38:dd:8a:9a:e6:36:f3:b2:73:6e:7b:5b:86:57:79:14:01:
ca:3e:d0:2f:55:57:4e:fd:5a:f6:19:19:30:2d:e2:d2:ab:99:
a5:06:9a:72:e2:80:55:18:0f:9d:bf:f6:6a:a4:b0:c6:da:96:
35:c9:e5:d1:a8:92:21:01:e5:41:21:97:64:64:02:dd:25:f1:
f5:5c:07:e2:f1:87:b5:50:08:51:09:e0:6c:bc:7d:31:d3:92:
6c:ea:45:cd:6c:78:fd:1e:15:bb:af:39:98:cb:1a:0a:93:80:
ac:2c:17:72:79:51:47:7b:ac:60:90:38:56:69:43:e3:20:c2:
d2:e8:59:f6:cf:00:b4:08:2c:cb:bf:a6:f5:0c:05:4d:57:86:
1b:fd:07:73:6d:1f:db:c0:7f:e5:e8:d8:44:c8:9a:71:31:1e:
11:74:99:27:24:01:0b:f7:af:18:11:6f:60:48:ff:ef:b9:90:
ab:20:43:9b:de:20:99:22:c8:00:6c:ee:06:5b:24:fc:71:af:
b6:c5:41:fb:a4:84:b8:c1:a6:47:ec:a5:e0:93:23:a6:83:eb:
63:1b:92:10:0f:2c:f3:4c:2c:5a:33:b2:d9:b1:ef:4a:dc:fe:
26:e8:1f:6a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Nov 28 10:25:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:5e:2e:f6:22:9f:1b:7e:74:b3:21:77:45:8c:de:2b:73:f8:
ae:bb:b0:36:31:75:a8:37:06:1e:1a:d6:fd:7c:f8:08:61:e1:
4f:fb:12:50:31:20:c7:0d:9b:59:08:e1:5e:9c:ae:23:7c:1e:
7e:92:2c:66:cb:cf:19:cd:d8:68:80:bf:03:b0:97:b1:3e:9e:
09:6f:00:40:da:47:93:74:30:f0:c8:66:c9:a0:bc:5c:76:e0:
fd:bc:5d:7f:42:da:0f:fc:8c:f0:09:39:fa:ea:27:e8:e9:14:
48:b8:22:32:92:b9:2a:8c:f1:af:15:36:96:1c:38:e8:ce:0c:
89:e2:b0:39:ec:20:5a:01:67:47:28:70:46:d8:ee:27:b8:26:
50:ee:55:97:95:1a:02:11:ea:3b:78:d2:75:d1:a5:00:de:12:
b5:4e:64:b2:a1:89:dc:a3:23:8d:7a:1e:96:41:b6:87:68:f3:
73:e9:fd:59:d0:99:1f:78:5e:34:d6:12:16:a3:95:0c:c5:3d:
d0:44:52:02:5e:59:05:79:c1:12:2d:5d:d0:d5:d9:e3:97:b3:
eb:a0:aa:21:1f:7f:b5:b9:5b:d9:ae:9d:8b:cc:60:68:00:b6:
bd:0d:09:5b:d8:d4:67:64:ab:b5:0b:ca:27:78:0c:f2:ca:bb:
6b:6d:25:cc
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
Truncated 7855 bytes from beginning
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
3,143,061 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:26 2025 GMT
Not After : Dec 27 10:25:26 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c5:49:cf:97:42:4d:71:66:9c:c3:41:00:00:2f:
45:bb:2b:f3:1c:f5:a5:f0:e0:bd:cf:f5:c8:b4:88:
f8:04:70:b8:07:2c:1e:af:08:54:6c:0c:27:6b:f2:
ce:d5:32:ff:ad:63:55:8d:aa:ad:9e:52:e9:cf:ac:
ec:3d:8b:2f:16:8f:18:39:46:99:ec:83:1a:17:e1:
ba:93:67:ba:d9:45:a6:8c:99:41:a5:59:7c:89:c1:
b1:72:bf:33:8a:84:a0:6a:d9:5f:16:a9:e3:b7:29:
ee:a8:c6:39:d7:48:a6:d7:14:55:d0:55:12:da:c7:
d7:bd:6f:e2:9c:23:43:b1:23:48:86:e2:a2:fe:bf:
72:d3:39:ab:3e:0e:ee:43:89:28:bf:39:84:0b:a7:
92:92:7b:de:fa:0d:2a:c3:82:ed:c6:10:1a:18:40:
4a:8c:2e:d6:64:c1:c4:65:dc:ec:a3:34:14:8a:7d:
fb:71:e9:88:c1:92:36:f7:d5:aa:80:a4:e0:14:f3:
68:07:bf:3e:a1:3b:19:47:2b:36:88:de:1b:bb:05:
1a:fb:85:10:b7:af:cc:1b:2e:39:1d:3e:18:ee:fc:
75:0f:e4:04:f4:ef:c1:8e:0e:9b:34:a5:07:8f:08:
a9:ce:15:5c:86:55:a6:6b:f7:ea:b8:bc:69:aa:e6:
bc:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:1c:2e:51:0a:46:1e:80:cd:0b:12:37:2e:c8:93:61:f3:b3:
2d:76:a4:d7:3f:d1:88:12:5d:46:43:61:71:7b:1f:bb:b8:e9:
62:8f:ed:7b:48:46:a6:8c:77:ac:ef:c2:1c:b9:2e:6b:2e:4b:
71:8f:b9:34:e1:af:d7:eb:1e:8b:a6:57:11:f4:d7:f1:df:23:
86:eb:f8:35:f0:54:18:72:fe:50:e8:fb:51:8f:dc:1d:67:8f:
d9:fd:ff:ae:fd:84:d1:77:67:c6:53:70:aa:0f:be:ae:38:91:
d3:7d:ec:8f:4e:1c:71:dd:22:09:93:39:ae:59:fd:1f:1d:21:
5c:56:00:fc:4d:95:7c:9f:74:21:06:c5:3c:53:05:8c:ce:7e:
33:85:a1:7a:3a:7e:a9:1f:23:e5:76:54:ec:1f:a2:a6:a0:69:
51:48:38:de:07:f0:8c:dd:2f:7c:01:e4:d6:a1:42:e4:66:8e:
1a:e2:1c:ff:46:10:6a:0c:9b:09:1f:82:e6:63:5c:1a:0f:70:
90:c2:e6:2d:f5:ef:cb:78:10:27:81:63:15:22:29:ec:60:94:
da:e4:1b:2c:57:b6:c4:79:f2:a6:64:6c:e6:20:04:6a:cf:8a:
22:84:d0:dc:4c:40:0f:b3:9e:bb:5d:fc:e6:ee:f2:48:13:80:
3e:04:fd:26
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:26 2025 GMT
Not After : Nov 28 10:25:26 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a2:af:4b:56:c8:8b:85:b3:a0:63:76:ca:b9:e5:bf:6c:79:b6:
25:9f:17:dd:fc:af:bc:ba:1f:d5:3c:b3:62:96:25:ac:9d:b3:
01:77:60:71:b4:14:cd:33:0f:4b:8b:57:ed:e7:b8:0d:b1:8e:
13:61:29:b5:03:3b:d4:f6:b7:b4:52:ce:2d:0c:ff:fb:58:07:
fa:09:78:8a:8d:00:8a:84:26:ec:c6:3c:f6:26:30:de:06:67:
2a:e6:81:29:27:ff:9b:79:40:28:80:c5:d9:cb:b5:db:27:bc:
60:a0:ed:a7:ca:02:d0:e3:91:f8:37:d8:82:62:d8:93:6b:ad:
59:e9:e0:67:88:fa:64:be:a7:f3:48:74:c3:16:16:11:dc:15:
b2:17:22:82:c4:03:f1:85:da:34:58:5b:26:3f:8e:22:da:13:
d5:cb:d8:8f:02:57:1f:c6:07:d6:6f:c9:9b:1e:24:55:4b:58:
ea:21:63:9c:42:1d:4c:b5:8c:9f:ad:ed:0f:00:c4:01:7a:92:
f2:83:9a:64:16:6c:4c:1a:22:2a:fa:a8:42:48:ec:d5:fb:23:
c4:f4:36:fb:3f:25:ad:d3:f8:85:ef:8e:68:9c:7c:fb:27:d2:
bb:8c:b8:eb:c3:ae:e8:90:be:08:b8:45:8a:c6:26:b4:a6:bd:
16:00:58:07
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
Truncated 3059 bytes from beginning
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
2,897,772 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:38 2025 GMT
Not After : Dec 27 10:25:38 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:f7:03:96:71:01:17:92:ba:e0:94:36:6f:35:60:
dc:b0:57:c2:74:78:36:e2:ca:85:ac:b9:6b:b2:20:
3b:cd:fe:56:7c:0b:cb:12:cb:80:b9:65:e0:5b:ab:
67:a8:b6:4d:d7:e6:ee:52:f2:ad:1d:6b:c3:73:1e:
a2:d5:ec:f3:bb:bd:5f:60:6f:01:fd:20:c5:28:d2:
8f:c9:91:20:ad:bf:f0:fe:7e:da:dd:54:36:75:d9:
5e:42:46:06:cb:11:7a:93:b0:17:e4:5d:1a:b9:d5:
52:6a:22:30:6a:2b:09:da:0e:4f:7a:1e:84:0d:7d:
9e:59:24:04:de:38:fc:6c:77:ce:be:f3:d1:77:7c:
4f:2f:1b:c8:51:18:48:0e:ba:b0:6b:e0:2f:8e:d3:
55:ba:22:a8:09:e2:fa:69:aa:1f:56:b9:30:13:d4:
7d:5a:b0:c5:63:c5:ba:a2:78:55:c8:88:23:18:ef:
e1:8e:1e:d0:6c:96:7e:af:8f:28:f2:a4:a0:03:16:
b0:8d:03:75:03:67:6c:e0:98:e8:bd:4b:33:05:3c:
4e:95:b3:d1:0f:a0:84:a7:8e:02:75:cb:33:52:78:
fd:33:70:7c:e0:e4:3c:f6:38:aa:95:54:e2:22:d0:
16:6a:ac:d4:ad:1d:2d:7d:1a:b6:48:ff:b9:40:ff:
ed:6f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
06:72:c5:10:4a:98:aa:92:1d:63:07:28:b8:79:14:89:1c:c3:
08:03:70:0e:7c:4d:4a:95:eb:b0:86:ec:2c:4c:d2:d3:16:e6:
08:ce:ae:b1:da:e0:e7:60:6e:b8:9e:b3:24:a9:63:d6:e4:0e:
e8:a0:94:e6:44:88:30:65:de:a1:fe:f8:75:d5:d4:40:db:ce:
45:2a:90:df:d0:8b:68:a5:3d:65:dd:31:ad:7f:a5:48:45:3b:
d4:f7:21:17:5f:ea:74:b2:9e:da:29:91:b5:7f:05:f9:d6:bb:
bc:0e:e2:7a:4d:94:0f:97:2c:56:34:fb:3a:10:1b:70:81:55:
34:fd:ac:bd:49:68:95:f4:97:b1:0b:93:63:55:5b:b5:62:27:
57:65:9d:ea:90:4f:2f:be:69:8a:80:79:58:bd:1c:c2:ff:bd:
e2:40:19:ef:e4:e2:b0:50:b8:14:4d:3b:42:cc:0c:35:2c:58:
92:07:2c:e1:4c:b0:dd:44:af:a1:65:82:2a:f4:67:f9:bb:08:
1d:fe:15:c3:8a:88:49:bc:26:17:af:b8:26:a0:cd:bf:dd:c1:
dd:be:e5:8a:28:ef:81:d0:bb:15:eb:08:34:26:a4:90:23:05:
fe:70:8a:37:24:7f:d3:6e:89:4d:db:01:9a:63:51:c3:b6:48:
f5:77:cd:10
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:38 2025 GMT
Not After : Nov 28 10:25:38 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
72:e3:bb:d6:a7:7c:75:11:48:c0:52:ea:65:b9:c1:8e:6b:ff:
23:3c:5c:57:79:c1:68:49:00:82:3d:05:3b:88:56:51:5d:ba:
e5:aa:e7:05:20:f2:63:df:18:5b:ed:5b:d4:ad:8e:4f:73:3f:
1b:69:b7:55:6e:b5:f7:eb:f8:22:87:f9:27:57:91:4a:ee:49:
7d:a7:97:78:33:1e:9c:12:71:89:d0:c0:a0:71:a3:35:17:50:
fa:85:15:36:1f:56:e7:1e:24:57:c6:fb:7e:63:52:e7:dd:9c:
4f:47:b3:f4:cc:a8:04:be:7f:fd:96:2b:27:e2:2a:83:62:d7:
4b:08:c5:2a:e5:4c:75:aa:9a:7c:a9:75:77:7a:13:1f:ff:9e:
fa:29:8c:e1:e7:0c:5e:6d:4b:a1:b3:7b:ab:64:7f:e8:26:56:
f2:9b:be:7c:51:5e:2f:d8:4a:34:1b:35:cb:db:23:fc:cc:96:
ca:e1:a5:59:03:5e:bd:d5:16:39:39:e6:1f:de:53:72:d7:71:
8a:65:05:55:f8:95:77:c1:9c:96:bd:25:f7:60:51:ab:e2:b0:
94:8d:f3:ac:1c:aa:e8:6b:17:f6:6b:ac:e5:47:91:51:b5:ff:
e0:8b:f6:4f:98:d6:b6:7c:a6:f0:c7:c4:1a:9e:f5:be:1b:06:
4a:cf:e9:3d
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
Truncated 7855 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
3,141,522 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:47 2025 GMT
Not After : Dec 27 10:25:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ad:62:4e:cb:d0:8a:aa:47:03:c5:5e:cd:f2:4c:
b6:1d:4f:26:b4:07:68:e6:34:91:e4:d9:45:eb:9a:
74:66:5d:3f:f4:75:75:b7:04:05:61:a7:e0:94:57:
14:f2:85:2f:d7:5c:ab:76:5b:52:57:60:03:bc:d2:
21:31:67:79:a4:f6:f6:42:f3:9b:5d:55:65:1d:16:
be:39:7e:d6:33:71:6e:9d:67:20:83:ad:7b:16:bf:
c2:34:3c:8d:c6:ea:13:bf:19:10:27:a1:6e:dd:0a:
a9:4b:3c:e2:0c:fd:3c:91:1b:1c:6a:d1:24:19:91:
d9:f7:f8:38:14:16:c2:9b:81:f2:3c:f5:c6:e9:1b:
29:b9:b4:23:4d:9e:c3:e4:00:fd:94:51:6a:77:e5:
54:96:4f:95:af:e8:25:6c:bc:51:22:74:80:aa:60:
08:03:45:5f:d3:38:c9:d9:1e:4f:16:30:b9:db:11:
07:d9:66:26:4a:8f:52:9c:23:4f:22:e4:a3:f1:d7:
0a:07:0f:ac:da:20:ea:fb:5f:ed:73:bd:87:0f:bb:
5d:6f:d7:de:7c:40:16:5a:7e:f7:91:16:99:1e:c5:
f7:b8:37:99:fa:88:65:92:c6:d5:c2:19:76:e7:a7:
e7:c0:2d:91:52:0f:03:22:46:90:82:59:a6:bb:d6:
23:25
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a7:95:2a:3d:e1:13:cd:d1:99:47:6a:21:6a:98:60:21:4c:34:
ec:a2:72:96:f6:b9:94:e3:f4:a7:7f:94:2b:c6:89:a7:2c:b4:
4c:e6:da:f1:00:f8:1f:9f:49:84:86:e6:12:af:f1:07:8c:fe:
18:1a:db:bb:1e:61:0a:dd:4f:87:71:38:0c:b4:7d:a6:85:92:
1f:51:8b:58:a1:2f:a9:9d:64:d4:01:d2:64:7b:5a:90:79:3e:
46:08:9c:a1:a9:4c:78:e9:23:db:57:ba:0a:45:8e:8e:c1:2f:
26:a2:30:42:42:29:26:46:b7:bf:a4:da:c5:38:b7:9a:42:4e:
87:fe:a8:ce:20:7b:9c:d8:d2:cd:b3:e3:6e:4c:b3:f7:9e:62:
9b:37:01:7a:ca:cb:d5:70:95:c5:9d:4f:59:a2:0d:da:88:6f:
4d:6d:e1:e0:8b:7c:2b:98:0b:f1:9f:e6:f1:0f:4f:72:26:f3:
bd:c6:9c:d0:89:31:15:31:0f:8a:1d:a8:c7:ae:35:78:69:18:
c8:9b:9a:f0:a1:f4:96:f3:21:e9:b8:36:32:39:e9:2d:74:05:
ea:0b:2e:2f:b8:de:8f:f2:39:8a:77:70:fd:a5:71:8a:04:ab:
90:df:7d:89:94:3d:1a:4d:e6:85:22:90:34:a9:72:e7:e4:5a:
1e:19:5a:c3
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:47 2025 GMT
Not After : Nov 28 10:25:47 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:b5:fb:fe:06:c8:9c:09:1b:42:0b:7b:3e:f3:ec:d1:72:31:
4b:71:15:29:19:fd:8e:f3:59:b3:18:89:1d:fd:c1:90:b0:ee:
53:9f:d7:29:30:d3:3a:6b:47:10:b2:0d:2f:32:7a:cc:68:33:
dd:fd:3d:dd:f9:59:f7:e2:a5:e7:8e:3b:ab:1d:0c:28:4e:25:
48:55:ee:62:0c:4e:25:1c:20:26:c4:1e:12:a2:96:ee:63:cc:
25:8e:84:a8:a8:92:4d:34:6e:a1:75:f6:dc:df:7b:b6:1c:a1:
cf:8f:61:53:8a:ad:88:1c:87:ec:79:97:3f:6d:ac:9c:d6:35:
b5:07:2d:73:0d:49:98:6c:19:9e:12:70:5f:b3:77:f9:55:62:
88:ef:ed:69:eb:09:86:5a:1b:2b:0f:be:a3:2c:ad:e5:8e:63:
80:31:ee:11:a3:4a:a2:50:1f:c3:a3:17:ce:4b:40:7f:d1:b9:
dd:19:5b:87:5f:62:d6:bb:70:ab:46:b2:e4:7d:a2:ef:62:50:
dd:7e:7a:53:fc:bf:13:5a:e8:54:7b:0a:26:52:2c:5a:22:6b:
ae:b1:eb:df:b4:86:f9:36:be:52:85:05:9d:bb:89:43:53:ac:
20:14:ad:60:5c:1e:c8:a7:b8:25:54:cb:4e:4c:00:05:05:d0:
c9:ed:a1:ac
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
Truncated 3059 bytes from beginning
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
2,893,331 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:41 2025 GMT
Not After : Dec 27 10:25:41 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:cd:2f:ed:e4:da:bf:d5:0b:92:f3:0d:df:58:3a:
54:c3:e4:d7:30:a0:cb:a9:ee:42:0d:5f:be:fd:27:
a4:88:93:56:66:c1:ca:5b:a0:ba:7b:dc:56:8e:e2:
1d:31:e9:4b:3d:be:1e:17:1b:f7:02:3b:da:24:d5:
c0:65:dd:8e:76:6c:a7:9b:ca:05:39:7f:78:ca:30:
00:05:b3:db:dc:0e:d9:0e:bf:74:38:4b:e6:44:b8:
51:d5:48:81:4f:6f:52:60:09:c9:dc:d0:d0:c0:29:
ac:be:f6:0d:a6:68:ff:16:d3:78:e7:c3:1d:9d:b3:
7f:be:04:74:a5:8b:bf:72:94:b5:7f:50:cf:2b:63:
78:c6:c5:06:9c:81:90:36:4e:28:0e:d4:b3:11:77:
7b:b5:1b:cf:fb:1b:5d:89:f2:e8:a5:9f:d7:ba:06:
2d:4f:ca:fd:25:b9:99:e9:0a:27:b5:93:f5:cf:76:
e8:a9:b9:74:98:65:f9:46:30:e0:2c:a5:a5:59:7f:
09:24:0c:79:a4:b1:3b:ad:5c:ee:05:14:e3:9d:5b:
fc:20:f4:98:1c:d8:11:cf:61:60:15:33:19:78:c3:
35:fd:a7:e9:9b:b0:0e:98:99:69:fb:49:81:3b:c3:
84:d3:58:7e:10:9c:10:34:cc:63:5e:d2:e8:bb:ee:
9a:bd
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a6:49:cc:df:40:a9:6d:b2:d1:77:85:d3:59:c1:a9:4e:e7:40:
7f:16:cc:5d:e1:b3:3d:1f:84:9e:b5:a9:f2:24:52:5e:7f:25:
a5:c3:9b:4f:83:40:e4:fb:9e:24:d3:fa:77:b3:c6:e1:ad:23:
cf:66:2c:93:f8:b2:3e:9f:b7:f1:cd:48:1b:fc:6d:11:97:5c:
ba:86:c5:28:92:38:0d:38:2d:9a:85:2d:79:b7:b2:3c:f7:f7:
3f:21:80:41:66:c9:6c:97:0f:11:56:49:99:88:1f:3a:8f:26:
cf:3c:41:56:27:8c:50:b4:b3:70:ca:55:c9:f7:80:0e:2f:81:
1b:a3:27:c6:af:e0:a3:7e:79:91:a2:ba:10:ad:0d:46:01:2e:
a4:c6:65:47:50:d4:00:a4:51:00:44:f7:4e:ad:3c:89:dd:05:
1c:58:21:4d:3d:36:f2:41:29:41:f7:00:0d:2a:22:91:7a:08:
99:a2:ad:89:65:53:70:b1:d0:2d:ad:52:e0:a4:aa:1a:a9:a0:
63:d6:9b:48:d4:7c:94:f5:9f:46:e7:31:79:bd:85:82:37:11:
74:a0:21:82:0a:8d:e3:38:a1:f2:83:09:66:89:2e:47:e5:c8:
b6:57:a8:ee:b6:91:f4:14:e3:c5:c6:2f:98:63:1e:b9:5c:33:
68:89:59:d7
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:41 2025 GMT
Not After : Nov 28 10:25:41 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
72:50:73:8d:7a:25:1c:f4:a4:15:96:11:b2:39:fd:91:16:0e:
aa:6e:35:5f:15:bd:5c:c1:da:0b:6b:a2:bd:62:7c:00:a4:61:
21:a3:d2:a8:28:61:3a:af:04:b4:0e:fc:87:98:d5:ca:0e:f8:
11:3a:35:90:3f:3a:70:a5:71:72:a8:5a:49:3a:d2:9f:ab:ce:
41:73:4a:27:48:05:d5:3b:42:f6:f1:fa:c1:e4:84:54:12:f8:
11:4c:8f:08:12:4d:f5:91:44:e0:a0:66:ef:04:ab:0b:c3:85:
1d:db:02:01:05:a8:16:95:2f:6d:e3:dd:ac:87:76:ac:fb:69:
4d:9a:69:d9:78:89:6b:cf:d0:d6:17:6e:98:7a:3a:96:32:6d:
16:16:76:5c:43:8a:bb:94:7e:04:74:9a:5a:2e:aa:74:7c:cd:
4c:bd:ca:16:b5:0a:e8:10:b3:e1:8e:e4:83:a6:fc:4c:9b:34:
bc:9f:76:fa:ef:8e:42:5d:b8:e0:67:13:8d:00:5d:c5:23:5e:
c4:5b:02:63:0d:d2:b4:1e:5b:12:80:68:8f:20:f1:39:b5:c7:
48:82:02:68:db:d1:90:2c:75:5e:fa:57:ee:51:3d:aa:b1:1c:
76:ed:11:aa:0a:2a:f7:ac:e8:6c:41:a9:8d:31:ab:a4:1b:b2:
42:6b:56:bb
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.33s
Truncated 7855 bytes from beginning
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
3,143,561 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:47 2025 GMT
Not After : Dec 27 10:25:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:d0:b5:55:08:48:86:69:b3:ee:e7:a8:21:aa:1e:
3b:66:64:0b:ed:4b:e2:0e:c3:73:ad:21:ed:0a:05:
ff:d2:28:02:00:e6:d3:2a:8d:9a:b7:6e:6f:9f:2d:
c7:a3:2e:5a:14:d3:80:8a:3d:a1:ce:8d:de:e0:63:
fa:b0:bd:50:05:93:82:04:51:7e:63:2e:fb:bc:be:
8b:8e:46:9a:79:28:90:ec:f9:cd:c1:b9:c8:07:94:
ab:3c:80:cd:3e:99:00:7b:df:9c:4c:2a:06:53:73:
37:ae:59:63:ce:37:46:99:98:02:81:9a:f3:b8:5b:
e0:7b:23:11:cb:dd:9b:66:c3:95:46:aa:1d:ba:d6:
3a:5c:48:f2:c8:46:4c:54:c6:76:c5:be:50:3f:4b:
49:99:53:78:f1:1d:50:7a:cf:8d:eb:32:5f:f6:1b:
0b:d8:65:b5:8b:93:78:40:ab:20:bb:12:25:ce:02:
3b:2f:ef:59:08:08:23:1d:bf:41:a3:b6:2a:22:2b:
f0:a2:2b:f3:db:1c:d2:c8:5e:e4:39:ad:62:6a:d7:
27:2f:a7:5e:24:0d:4f:77:c3:17:54:73:cb:2c:38:
03:a8:ab:43:3b:1b:f9:c4:2c:58:a1:5b:82:70:d1:
9d:34:ca:dd:f6:74:ee:73:84:04:e0:70:e8:bb:b6:
52:5f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
67:b7:22:e0:4e:5d:c2:45:3a:36:89:af:90:9b:71:03:d4:cd:
0c:74:15:1d:60:74:fc:82:96:4b:33:a3:f5:be:df:50:91:65:
1c:18:ab:d2:e5:2a:50:ca:1f:6d:9f:5b:f0:77:a3:36:cf:b3:
5c:79:2f:89:24:44:23:82:53:d2:24:2c:75:64:2a:0c:ea:54:
c9:3d:ad:c7:ed:5c:7f:a1:9a:52:46:83:3f:8a:f0:a4:8a:75:
ef:32:fb:35:8c:f7:ec:21:df:66:4d:a3:f0:7b:61:be:66:29:
33:a7:2e:ab:af:13:dd:13:59:e3:1e:32:84:c7:f6:e3:f3:63:
04:69:19:e9:31:c7:b5:98:45:18:1d:8a:e0:b4:3d:4a:bb:5f:
66:59:aa:50:1f:d6:0a:c8:0f:df:3b:ab:08:1a:44:d0:21:dc:
71:90:dc:1e:e7:a6:d3:db:2c:94:13:f2:62:b3:63:83:c7:62:
37:af:fd:e8:e3:5c:0f:2b:7e:f2:61:02:df:f8:5e:70:45:59:
c0:72:83:a3:99:af:a4:a8:58:42:81:3f:f5:8b:44:c9:91:63:
27:87:2b:21:ca:9d:0e:e7:d5:40:09:9e:ce:de:24:b3:3a:63:
3f:58:4f:b4:c6:25:67:c2:c0:b6:e2:30:0b:22:b3:b9:1d:db:
14:92:64:66
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:47 2025 GMT
Not After : Nov 28 10:25:47 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8b:09:b9:15:c6:60:1b:90:cd:c0:9e:aa:fe:21:71:72:f5:f9:
d6:82:21:e1:2a:38:a4:a1:45:91:5c:fa:42:d7:89:bd:0d:1d:
98:05:fc:ae:f1:41:05:8d:aa:43:68:7b:88:d1:73:dc:77:d5:
9a:d8:90:22:e5:af:8c:31:2f:68:62:93:ee:89:ab:3b:d4:53:
d2:16:5a:7b:07:28:df:94:36:de:2d:d1:55:ae:05:4e:43:fd:
05:09:c1:53:d1:d7:0f:5c:3e:db:ea:5a:f3:55:0b:f8:90:7c:
d4:39:03:93:98:0a:0d:55:cf:7d:82:4b:35:af:ae:a4:d6:e8:
8b:b2:cd:4f:bd:d6:d5:af:27:52:d7:c1:57:02:4f:88:2f:e8:
c4:1b:25:07:59:22:58:39:cb:80:bc:a0:81:de:d2:23:59:e2:
ae:b6:39:f7:30:7b:be:ff:06:e3:1e:e1:f2:46:df:9c:78:94:
0c:8d:aa:2b:39:d7:2d:0e:9f:23:4c:b6:66:1a:90:f8:ab:10:
24:80:46:fc:34:7c:f5:ca:b8:08:98:80:d7:db:d2:1f:2a:21:
37:d6:4e:89:9d:2e:72:7b:61:00:87:0f:82:54:82:9b:40:63:
ee:49:d1:9d:d8:20:ca:5d:19:70:b5:cc:e5:b0:dd:e1:3f:64:
93:dc:9c:c8
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
Truncated 3059 bytes from beginning
80F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030368003065023000A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7023100E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,896,316 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:30 2025 GMT
Not After : Dec 27 10:25:30 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:a6:90:30:a4:b5:99:ae:1f:ed:83:a7:3e:f2:53:
50:65:4a:d8:a0:c3:9a:8e:2c:72:c8:27:f5:c1:d0:
07:b1:e2:48:44:b3:25:d5:1b:6c:da:b5:0b:91:c6:
90:fb:ab:75:c9:0b:c9:2c:09:45:b5:dd:e6:bd:f6:
3c:8c:47:e7:56:36:26:19:6e:21:d9:03:33:9b:89:
71:e8:56:5e:68:e3:e0:f8:c8:4c:f9:4b:24:3d:4f:
76:cb:bc:6c:45:41:8e:4c:77:c6:5a:11:52:9d:47:
df:37:cf:fb:ec:41:ea:e6:d8:0f:b3:dc:59:75:81:
bd:5f:9b:c3:bd:24:bd:50:79:5e:e4:70:e0:ff:be:
71:65:5d:e8:29:5f:6b:23:1e:3f:6d:e9:5a:d6:c8:
8d:09:3b:0e:01:34:29:b7:26:24:a8:d0:2f:a5:3d:
62:d0:80:6f:ea:3e:d0:f4:5a:8b:db:a3:4b:0f:fc:
e1:41:28:1b:e1:c0:bb:28:9e:83:ab:f4:f2:2d:8e:
12:45:3a:fa:45:de:27:da:25:45:71:fd:28:35:d1:
a4:1f:d4:28:c5:bb:7e:38:68:ff:4f:35:aa:1a:6a:
ab:c3:21:af:f1:6d:27:e5:99:ab:6e:b2:ec:2c:24:
96:0f:6f:ee:00:8f:5d:7b:f8:fc:62:2a:d4:f9:b4:
99:85
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8c:44:d3:42:cb:dc:78:5b:67:e1:dc:f0:12:42:ec:d5:52:83:
ab:58:c8:d9:94:98:b0:c6:cb:0e:31:37:99:aa:22:0e:6a:f2:
f7:7c:a8:c5:57:c6:09:cb:13:be:13:e4:0b:3c:2a:e8:f8:c3:
24:aa:f9:c7:74:9a:15:d5:99:45:cd:95:91:2e:70:b0:1b:49:
1a:da:45:1d:1a:bd:57:9e:30:de:8e:1a:12:6e:4b:49:a1:e9:
3e:dd:98:7e:f3:92:00:a9:35:ba:18:9c:c1:41:19:ac:46:5d:
ec:87:56:e9:0c:e6:2a:e7:bb:c7:60:be:dc:63:5c:1a:26:24:
0c:ae:c7:71:69:d3:aa:58:3f:d1:7e:ba:36:e0:b4:4a:c4:11:
05:15:12:2e:9c:a1:5b:ce:3b:6d:67:ec:6c:ba:ff:d2:0b:29:
05:11:34:c6:89:74:0d:50:f8:80:66:12:eb:19:7a:44:0d:44:
b5:23:dd:92:46:b9:12:e3:60:f7:e2:20:2e:26:e7:8e:6f:3a:
ad:92:46:ee:68:7d:44:82:b1:de:40:0b:bc:84:26:b2:32:62:
90:5c:42:ae:60:82:ca:09:54:e8:5c:ab:79:d6:19:9c:f5:00:
4c:c2:74:13:88:35:08:60:fa:35:81:a0:09:7b:82:e7:ea:9c:
3e:9a:fa:ca
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:30 2025 GMT
Not After : Nov 28 10:25:30 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
9e:3c:3b:79:1f:cd:bc:ae:ff:51:83:11:76:d7:76:ae:d1:60:
9d:b9:49:56:0b:24:3b:f9:5a:a7:b5:b3:b9:fb:c5:4f:d9:e4:
02:c6:cd:84:d9:39:dd:65:9d:58:ce:60:2a:c9:45:f7:ba:b9:
c5:55:be:d5:9d:ff:fd:9f:b8:08:a1:eb:07:8f:24:22:77:5b:
0e:18:c9:b3:2d:11:86:c1:da:0e:99:ed:20:3b:69:b2:41:61:
50:d9:13:e4:66:d4:d8:2f:f7:56:e1:34:6a:11:40:40:75:c4:
4e:af:59:34:98:82:15:2d:56:a6:c0:30:9c:4e:5b:2d:82:59:
7c:1f:8d:c8:30:0e:0b:f5:3b:2a:a1:cb:91:77:0b:0c:27:b5:
82:0b:b9:0f:12:da:58:9e:73:77:1b:53:68:81:be:eb:36:f5:
49:5a:79:4f:bb:2d:d9:36:19:9d:aa:5d:98:52:56:66:93:b3:
cc:9f:fc:0e:e9:3c:2d:68:dd:73:28:2f:e1:ef:ad:e1:17:76:
a6:1e:82:be:fe:b5:41:0d:01:a0:49:f0:cd:6f:f6:dd:a3:5c:
58:58:bc:9f:44:67:fc:a2:fc:20:70:cc:38:82:c8:53:0d:99:
6a:e5:95:71:63:c5:61:3f:5d:03:5a:7c:f2:4d:80:f1:07:33:
b7:a3:8a:5b
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:00:a4:db:64:7f:e3:e1:40:30:5d:71:a0:2b:24:
28:c1:63:8e:44:27:d9:8f:0a:85:f1:d8:d3:f0:3d:e6:06:cf:
ea:b2:79:0d:34:de:9b:b4:7a:86:e9:be:c3:bf:72:f7:02:31:
00:e8:6e:6f:d4:69:82:73:ee:8b:bb:81:3f:f2:29:b2:99:a6:
13:4a:15:7d:08:1a:a1:78:94:5b:94:6f:7f:ee:c1:1b:54:f0:
6a:ab:a1:63:2d:84:a1:4b:eb:9a:fa:c2:fb
test test_image_validation::cert_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
Truncated 7943 bytes from beginning
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
* TESTCASE PASSED
20,809,677 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:42:24 2025 GMT
Not After : Dec 27 11:42:24 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ce:bc:45:5f:21:7a:45:0f:a9:2a:12:4c:7b:6e:
eb:18:60:52:91:83:b8:2a:00:51:ef:f9:16:b0:57:
22:05:35:2d:4f:c4:f1:81:bb:3a:74:3a:d6:f1:56:
4c:ad:34:99:b7:70:db:93:24:94:a2:53:22:2d:55:
8e:db:fb:24:86:4e:44:1d:92:aa:58:b8:95:86:3e:
4b:08:e9:de:6a:f0:81:ed:af:7b:7b:ec:c8:4b:95:
7e:27:7e:2c:9e:57:88:18:db:a3:f8:f6:dd:6f:ca:
89:89:65:c5:3e:f1:c2:d1:da:46:6a:7a:92:4f:22:
03:9f:bc:75:ce:4b:ee:ee:14:15:e0:c2:5b:80:be:
3a:87:76:85:19:a4:8d:ce:8a:74:e4:a3:e9:f6:ee:
bd:31:ef:da:c5:a0:b6:f4:d6:60:f7:f4:76:00:6f:
28:a3:41:bc:7a:45:f6:0f:1e:ab:0a:26:0c:fd:7d:
a3:c8:e0:21:7d:95:6e:67:59:9a:65:d2:17:38:a0:
32:ee:47:50:01:0f:8b:85:d7:79:64:c2:9e:cb:6b:
6a:1d:69:e4:d3:c9:b4:a5:d0:61:bb:68:2f:6f:7c:
dc:c6:31:19:ef:00:e5:7b:36:bb:49:cb:bf:38:5a:
9b:f2:0b:8e:5e:98:18:fa:27:ec:3e:8e:be:01:4e:
d6:13
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
90:11:38:1f:38:4b:7e:32:d2:0d:16:6a:5c:76:e9:0d:80:6f:
33:33:d1:30:96:40:4e:4d:e6:34:5c:1f:53:a8:da:36:c0:da:
29:be:b5:67:ba:48:6c:99:b1:9f:37:40:68:e4:f5:1a:07:d4:
e1:10:49:d9:0d:1b:e7:28:17:2b:94:37:16:c8:ea:57:41:02:
16:86:67:7e:02:75:2f:0d:9f:e2:1a:88:d0:6e:70:28:c2:0c:
6d:12:3e:a9:f7:7f:91:51:d3:03:a0:f3:5c:98:cf:16:0b:e2:
37:db:0c:f2:9b:a5:01:0f:e6:66:dd:d5:1a:59:a9:79:e5:be:
16:32:4d:89:82:97:bc:a3:f2:67:12:77:d9:15:ac:30:85:33:
b3:11:7c:96:96:73:60:55:f4:a7:b8:9a:be:b0:b2:fa:3e:57:
0f:b8:b6:30:9b:7a:71:c6:83:f1:6f:e8:fc:92:84:7d:c0:4f:
e8:9f:46:94:02:82:d7:4d:c3:40:61:d2:21:04:a6:82:6b:b3:
7f:25:f3:b6:44:ad:97:a1:87:38:8d:70:ee:70:29:b6:d9:40:
6d:9a:6f:dc:36:95:a0:e6:37:65:83:0e:eb:7e:1b:fb:b1:7e:
51:11:d2:8c:e6:6e:18:49:83:f7:7a:0c:e4:fa:9b:11:2b:99:
26:37:bb:69
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:42:24 2025 GMT
Not After : Nov 28 11:42:24 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
32:20:71:18:ad:21:2c:f5:9b:e4:63:d2:a4:6c:2c:c4:4f:fb:
f1:25:69:58:67:46:74:a8:0e:a9:1b:81:07:ac:7c:60:c7:37:
52:ca:59:f2:a8:71:d6:b7:c2:ed:5b:9f:96:e5:58:db:c8:25:
e3:cc:e7:2f:7b:dd:f9:55:86:78:79:78:2a:73:ac:06:6e:28:
55:11:0a:01:03:b9:be:8e:bc:0b:55:ba:88:ef:a8:d9:87:c7:
46:29:70:79:b4:9b:07:f8:7b:43:45:9e:32:1c:2c:25:d1:2b:
a0:d3:6d:ad:7e:09:93:b9:aa:cf:07:d3:b9:95:81:de:4e:43:
35:94:b2:cc:78:0c:8f:08:da:67:17:02:58:ce:91:05:f6:d0:
2f:33:d7:81:25:02:65:b9:c5:e6:62:ce:b4:53:ab:a8:8b:85:
c2:ec:ac:a2:a3:a0:bc:c4:12:ed:38:ba:c7:10:69:f9:63:05:
12:30:b0:ad:b0:09:2c:50:39:70:41:46:d3:da:ff:83:a7:c9:
a0:17:22:e2:54:5b:97:ce:65:6c:65:b1:7c:6d:ba:ba:4b:3c:
f1:e5:89:40:73:92:c8:cb:18:fc:6a:ad:63:b5:b0:7f:36:a7:
a9:70:b8:9b:10:c7:46:7b:26:1f:3c:f4:3d:5f:d1:26:4a:ce:
bb:50:cb:47
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.39s
Truncated 3147 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,370,331 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:54:47 2025 GMT
Not After : Dec 27 10:54:47 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9a:c7:b3:3a:55:ed:06:2a:53:95:bc:cf:4b:e2:
36:42:99:df:b2:a4:90:f4:ce:bf:14:6d:ba:db:55:
7d:c7:69:9d:84:48:80:6d:13:66:1e:16:2e:09:ef:
95:b7:6d:2e:51:f3:3c:3d:e6:f7:d7:d3:63:ce:8d:
e8:a3:a5:0e:0f:43:45:b2:dc:3f:2c:5f:1d:12:b7:
e2:aa:79:12:f5:f0:49:3e:95:cf:d2:1c:b5:c4:f3:
34:8c:5f:bb:e9:01:fb:65:1f:0d:8a:94:60:dc:f0:
3d:ec:83:85:02:62:3d:d8:b0:50:a3:0c:7e:26:37:
e1:6d:fd:7f:e0:c7:2c:1c:e5:f7:d8:3f:43:9c:15:
20:84:07:25:34:28:00:53:5f:e2:08:1c:41:7c:11:
57:cf:46:94:4b:ef:98:2a:26:2c:fe:32:8a:50:13:
c2:b3:61:cc:29:12:34:64:e9:99:8b:af:12:96:7b:
fc:5b:16:c7:be:21:23:b1:93:89:5a:e7:7d:4c:18:
5b:05:44:69:a8:2e:93:0f:01:11:12:1b:9e:16:ce:
9c:4d:a2:5e:49:ab:3d:8c:40:af:2d:aa:fb:61:f1:
78:80:7b:70:09:f0:cf:e8:28:23:55:33:63:96:39:
9c:44:d8:54:56:39:fb:37:d5:a4:55:ad:a7:7f:1b:
d1:95
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:2b:cc:6f:65:80:56:34:16:49:e2:92:2d:9c:ae:71:96:13:
95:b1:02:50:19:78:b4:f1:c2:af:68:81:41:46:cd:75:08:7d:
3d:9e:cb:d6:90:46:b4:a8:72:c7:34:e0:0d:e7:40:29:94:c3:
fd:3a:1f:a9:b6:51:f4:c5:97:80:ae:31:5f:c0:67:40:b4:b3:
7d:45:0d:fa:67:40:f5:43:b7:9a:9b:cd:aa:31:a4:fd:00:cf:
f0:0b:9d:60:64:58:8b:26:b2:c6:02:69:c3:72:f6:11:8c:ce:
e4:7b:d6:7c:05:1a:bb:38:8d:0a:54:e4:3b:92:29:c2:8a:e1:
3f:f0:9d:02:85:3f:89:83:dc:ad:10:ce:41:cd:ae:9d:ab:c7:
49:68:0c:94:5b:93:de:d3:ad:67:8a:75:2d:b3:2d:5a:ad:dc:
06:5e:11:08:10:9d:cb:0e:04:c7:23:fa:ee:12:d2:87:59:4b:
75:b0:dd:f9:ce:83:9e:09:cf:e3:22:70:dc:b2:ed:6e:75:4e:
21:f1:ca:2e:af:b7:33:bd:04:fc:0e:78:c5:57:b1:3f:ba:19:
72:83:cd:f6:97:3c:86:a2:01:36:bc:51:b5:ab:38:77:8c:16:
b9:ac:8c:dc:2a:13:1a:62:84:8f:53:ea:fe:62:6a:88:82:ee:
0d:58:28:e5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:54:48 2025 GMT
Not After : Nov 28 10:54:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
36:69:12:02:df:55:da:c7:37:95:97:42:8d:c8:d2:a2:f1:76:
ad:22:64:e9:77:a6:d2:ab:a1:3f:94:dc:09:0d:1e:2d:a9:6c:
25:94:3f:ac:e3:56:0a:89:d5:29:cf:3e:10:1e:52:16:7b:e2:
be:85:1b:7e:f9:24:c8:b8:4c:50:e3:ca:a3:77:98:dd:8b:c1:
45:1c:aa:bb:b4:93:cc:60:a4:59:74:3f:df:11:d7:21:00:6c:
b4:e5:55:35:dc:37:9d:5e:4c:f4:4a:6e:b6:36:9b:de:4d:00:
3c:5a:e1:09:52:4e:50:b3:8c:da:db:d1:80:a5:94:6d:f8:66:
63:f7:9c:8f:fe:0a:28:eb:68:10:b9:c3:f1:b4:a8:aa:59:aa:
22:7b:c9:5b:78:57:81:dd:6b:4a:80:d4:8f:13:74:d5:e8:ee:
e4:e7:77:e5:7f:73:f4:0a:e5:9b:91:ad:14:3f:25:7d:ba:fb:
a1:2d:d0:0f:ba:e9:33:a7:d5:25:7e:1f:f2:0e:3e:9b:b8:13:
8d:bb:7f:43:5b:40:b1:05:5e:78:1a:c7:ef:0d:84:38:ac:75:
c6:ad:dc:a4:67:41:d0:a5:da:8b:66:db:92:8d:f0:07:bf:93:
a0:e8:e4:75:ed:c2:c3:66:26:15:58:16:78:de:70:9c:41:a8:
23:17:2b:d5
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.59s
Truncated 7943 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
* TESTCASE PASSED
20,952,443 >>> mbox cmd response: success
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:55:59 2025 GMT
Not After : Dec 27 10:55:59 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b2:c0:fc:31:01:a0:fc:ac:7f:b8:03:97:19:3e:
bf:70:c7:15:e8:14:22:72:05:11:4c:d3:15:3e:d4:
ff:e3:a4:6c:91:9e:2e:71:7b:9c:32:6c:0e:69:60:
18:0f:4e:21:4e:bf:60:ad:28:ca:fc:bf:23:94:31:
03:e2:6d:65:4c:8d:3a:06:1c:e0:88:32:10:35:eb:
ba:13:b9:98:c9:c4:ec:6d:f0:81:c8:b3:6d:aa:ba:
16:10:ad:bf:82:76:ef:66:0a:c0:24:b9:14:a4:b1:
37:94:01:01:12:80:72:13:85:db:2a:b2:05:47:ee:
ca:1e:7a:7f:89:93:b9:d0:a0:6f:10:6c:7a:69:a5:
71:22:27:d8:dc:70:d1:0d:73:70:a7:96:a7:cd:64:
72:0b:7b:b5:12:b2:18:8f:d7:dd:ca:c0:77:4b:9c:
81:9b:f5:f9:3e:51:62:f9:70:b1:dc:2a:03:70:5f:
0c:79:04:02:2e:7e:36:38:59:4f:a8:06:09:5b:87:
d7:11:3e:4f:10:3d:40:07:7f:ff:42:42:51:eb:96:
86:2f:3a:57:32:9b:07:a4:e8:34:eb:19:01:85:6e:
f0:5e:83:5f:5c:66:76:2b:e2:0c:31:ac:c3:7e:32:
59:e2:e4:b0:c1:3b:31:41:18:58:75:03:16:71:12:
16:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
3e:b0:ed:03:9f:bb:53:a9:d3:bb:07:3f:d3:03:11:a5:8f:0d:
02:ef:63:42:21:95:9c:10:7c:be:fe:30:59:9e:ec:40:3e:47:
7c:92:30:ef:ff:ed:ce:6e:e0:ae:51:d0:99:60:cd:a0:e3:55:
07:dc:4a:33:c8:3b:a4:03:d4:9b:d6:df:d0:6c:8a:a5:0a:0e:
39:8a:84:5a:dc:e2:1f:a4:ec:c8:ce:99:ef:0a:7b:0d:a4:67:
80:25:7f:3c:c2:c3:a7:f0:f7:5d:ef:81:c9:c9:c8:42:63:c2:
71:d1:6a:68:2f:46:46:8f:f4:b7:ae:fb:3d:f2:bd:38:ab:f0:
b4:5c:6d:6e:7c:80:62:b7:9c:fc:28:1d:dc:07:41:e8:88:bd:
9d:0d:30:12:de:bb:4f:ea:8e:53:85:75:e3:66:c8:aa:af:4f:
72:7b:64:2e:ff:f4:f3:0c:4f:e4:5c:ee:08:48:05:5f:27:24:
aa:10:77:7f:29:88:3a:38:15:6e:eb:e3:b4:50:33:6a:97:72:
41:72:8f:b3:02:1f:9d:49:9a:39:78:02:ba:73:22:e1:13:2f:
93:11:cb:34:e6:15:f2:b5:91:51:93:ad:8b:47:4c:3b:6b:e8:
5e:f9:ff:cd:1d:60:48:e4:d3:07:d1:ea:45:9f:04:1b:2d:da:
f6:21:70:5a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:55:59 2025 GMT
Not After : Nov 28 10:55:59 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
99:fb:2c:f3:1a:98:9e:d0:83:18:fc:91:e4:a1:de:4d:60:f9:
90:b9:8a:4a:97:00:3b:01:6a:5d:3d:1c:97:15:99:d8:15:a5:
d3:f6:fe:02:86:7d:7f:6f:11:a6:80:16:78:37:cb:b0:17:5b:
38:5d:ec:9d:11:99:06:99:08:eb:48:1c:71:d5:1a:c1:50:a4:
2d:7f:be:b1:9a:1b:3b:92:b3:4a:6e:87:86:1b:21:e8:b5:c3:
ba:ed:a6:3c:cf:b6:3d:d3:04:37:df:18:bd:f7:f5:a3:bf:86:
d3:7e:b3:6e:87:59:74:a3:3b:b4:29:a5:37:f3:9b:c6:7d:33:
81:16:74:50:7a:2d:44:ea:5f:27:87:53:34:c5:35:04:82:a7:
69:cc:b6:a6:f9:89:82:e7:8f:3d:8d:a2:74:71:59:0c:4b:4e:
92:d9:04:cd:1b:6c:d2:39:90:80:de:66:e3:91:6c:dc:ea:62:
fb:48:40:1e:13:41:93:a9:58:de:a9:81:ef:51:49:d3:90:cb:
31:b6:20:5f:89:90:71:6e:b2:ed:28:c1:ed:ee:90:82:d8:57:
78:af:b0:c8:37:31:b1:22:1d:7d:8d:c3:fb:80:2f:c7:af:e9:
8d:36:9d:1c:dc:b2:45:80:63:92:49:33:6d:bd:d4:53:d6:51:
c7:5d:8c:51
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
Truncated 3147 bytes from beginning
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mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:55:51 2025 GMT
Not After : Dec 27 11:55:51 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e2:4b:6b:bd:b8:db:17:4f:36:6f:fe:9a:37:06:
7d:5e:67:a4:0e:97:c9:ef:5f:f3:72:75:b4:0d:79:
c8:98:8b:b2:39:e8:92:23:c2:e0:8e:6e:03:36:47:
00:b4:aa:a9:14:2a:96:24:58:9d:8c:8a:2b:12:0b:
5b:ef:bd:e8:ff:ba:d7:0c:53:f5:c1:ee:a4:ac:3b:
4c:ae:a3:52:ab:e3:f3:5b:4c:0e:f7:dd:b6:b8:0b:
fb:e3:8e:e0:30:9d:ab:30:49:5e:36:b9:b0:c3:4d:
21:2b:31:c3:f8:2a:83:de:e7:71:19:5f:00:bf:fd:
5d:a6:d6:54:da:2c:84:4e:de:64:9c:17:48:56:64:
a6:e5:68:7e:25:b7:73:19:39:80:87:1a:4a:94:a9:
98:be:63:aa:bb:ff:59:10:e4:5c:3c:c9:b1:8d:7a:
94:dc:0c:6e:2d:e6:08:5b:98:04:2f:6c:cd:e4:dc:
50:94:f2:2d:e1:4e:91:37:31:b3:6f:9c:4e:3d:45:
54:8f:d4:d2:20:4d:a1:e3:b6:75:82:7c:8d:d2:e4:
19:03:be:99:3a:eb:66:8a:c0:e2:e8:f6:c6:33:8f:
1b:89:39:76:9c:18:71:5a:1b:dc:2b:69:2e:f6:f3:
a6:1f:a1:6f:61:04:df:1e:52:ac:a7:29:e6:60:46:
fb:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
46:4a:fc:1a:55:39:a5:e9:93:46:94:c9:c4:3d:b7:e3:e1:83:
29:ed:79:05:9e:12:96:8a:6c:8f:60:cc:04:99:cd:84:6f:94:
86:73:fc:bd:06:0a:5f:86:75:83:18:f6:eb:7f:69:2b:e2:dd:
2d:dc:66:0a:70:6b:a4:5d:3e:76:88:c1:78:77:ad:4a:30:bd:
74:f6:a0:b2:ac:47:5b:f3:a8:0b:f1:c0:28:78:2f:f4:df:a0:
e2:dd:e4:8f:d2:a0:f7:7d:da:e8:cd:68:1a:5f:99:92:ca:dc:
9a:7c:b1:0c:dc:3a:5d:2c:0a:26:d3:1d:83:68:5c:fa:47:f3:
91:d3:f6:a0:74:37:34:9f:65:5b:6c:53:f6:19:b4:0a:a8:0c:
c6:52:23:45:38:e8:cb:53:43:66:a5:65:f8:63:32:a4:13:32:
19:e3:13:ad:80:bf:e2:61:ef:77:20:64:79:06:74:47:a2:0f:
f3:17:5e:db:de:e3:b4:f0:f4:75:e0:48:0d:da:5e:ba:09:4a:
f9:45:ec:b3:bf:00:b6:b6:40:06:43:5c:64:b7:33:72:4d:9e:
00:f8:30:7f:7a:17:83:18:7a:00:0d:2d:5f:c2:28:31:cd:4c:
2f:14:9f:9b:d2:13:16:06:79:80:f6:62:85:f2:7c:32:78:35:
fc:9c:4f:92
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 11:55:52 2025 GMT
Not After : Nov 28 11:55:52 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
ba:42:34:3e:cc:55:39:6d:31:34:f6:ad:fb:2c:1e:93:e8:dc:
c1:c5:ec:41:d7:00:26:55:2b:3e:2b:18:96:2e:09:60:0b:67:
e5:08:be:84:70:b7:40:4d:51:ed:7b:84:bb:5e:27:12:6e:4a:
79:31:6b:47:93:d8:20:91:46:cb:d0:ad:6a:ac:ff:84:9d:c1:
72:9e:a8:6a:b5:74:4b:db:c3:ac:2c:ac:b3:6a:53:1b:bf:e6:
81:da:e2:89:ec:32:b6:a2:f0:05:2a:ef:21:d8:ef:cc:a9:f9:
44:22:d8:75:87:63:ec:a9:9a:4e:17:a9:65:6c:b3:b0:49:90:
d9:76:84:aa:14:35:cd:a5:38:90:a9:6b:7a:70:6e:38:53:45:
1b:a9:df:03:01:36:de:1d:92:ee:33:a0:77:74:e8:99:69:8f:
dc:50:bd:0e:f4:9c:05:53:51:88:f7:ff:ed:d4:0b:99:e8:25:
2c:dd:6b:b7:e8:9a:98:3e:9e:5b:44:80:63:0a:64:b8:8c:81:
db:dd:05:f6:ba:58:27:37:7c:a9:2d:d9:f0:f4:e9:7a:7d:b3:
5f:3c:91:2d:a1:8a:85:ec:75:f5:61:3b:21:db:c8:c1:85:b9:
72:1a:5b:09:98:6e:bb:9f:54:b2:b1:4a:95:5f:62:3c:1b:ba:
82:66:c0:fa
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.90s
Truncated 7878 bytes from beginning
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
3,143,946 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:26:07 2025 GMT
Not After : Dec 27 10:26:07 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:cc:3e:eb:8d:01:e5:9c:cc:d3:fa:6a:2f:57:
77:b8:aa:73:ef:dd:55:8c:c2:4d:5a:6d:85:f7:1e:
37:3c:60:89:85:f1:8b:5f:3b:7c:ef:8b:82:32:a9:
c9:4c:35:0e:e2:8f:02:66:22:be:f0:85:e1:a8:40:
5b:36:64:1b:72:1f:ca:78:38:a4:a6:11:fc:50:3a:
5b:e6:bf:c5:eb:14:99:ea:40:0f:5c:02:2e:21:c4:
cf:88:6d:31:89:1a:aa:9f:73:c2:5b:ae:25:a4:a8:
c1:c8:a6:c5:96:fd:f5:ff:49:df:f4:00:e7:c7:9e:
bb:75:e7:80:9a:88:4f:0f:90:05:bf:71:b5:3c:71:
c1:dd:88:4f:5d:42:ad:02:87:c7:73:e9:85:9d:9e:
94:db:9d:52:12:51:0e:98:88:70:22:0a:1d:c9:f6:
88:00:2a:80:7c:4d:53:bc:e7:04:93:42:38:4b:b6:
da:cd:e3:8c:00:5b:5f:32:ae:4b:c2:57:c9:cf:cf:
e6:96:42:46:1e:cf:26:98:85:c9:1c:72:0a:90:82:
ac:e2:69:98:75:c5:92:0c:6b:c2:22:be:fb:d0:6d:
5b:a3:39:cb:ff:85:0e:99:46:2e:52:4d:fd:8c:a2:
4f:18:c5:1c:11:d8:5e:1e:9d:d3:52:33:f8:49:02:
9b:cb
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
4a:ac:b5:09:2e:15:e9:37:24:de:97:e1:ca:c6:69:08:f0:d7:
5e:2e:ae:9b:c7:70:18:0d:d0:cd:09:bc:52:3c:2d:b0:c7:76:
9a:dd:0c:5d:1a:e3:d8:c5:ce:25:c6:87:cd:60:82:db:93:a2:
05:f2:5b:6b:70:bb:41:76:6a:8e:07:19:25:a3:f2:de:7d:d5:
1d:42:29:09:b2:6c:70:27:7b:d7:6a:ef:58:06:4c:26:07:35:
62:ea:cd:bf:62:15:1e:5e:16:a0:a0:60:aa:fb:ca:1c:95:47:
cb:01:b1:2f:93:13:1d:95:1b:5f:af:d0:e9:c9:db:3f:e9:e8:
ec:6f:b8:9b:f5:86:94:0f:6e:d4:a7:fe:77:90:db:29:f1:93:
1d:11:5a:af:ba:82:a9:59:ee:b1:e9:54:e6:8c:cd:72:85:c0:
f2:99:77:f3:cd:34:9f:e6:47:99:1d:45:83:f1:8e:1d:f4:19:
02:90:7a:44:a0:83:ac:56:6a:3c:7f:ef:b3:48:c3:48:c3:e9:
25:f8:63:7f:6a:8d:0b:cb:90:76:d7:30:1e:f7:c9:a9:2c:21:
c1:02:6c:77:d7:c9:7e:bb:41:5f:03:b9:c4:bc:36:d3:db:48:
d3:f3:fd:ce:19:f2:5b:df:b1:6d:93:63:22:99:ed:28:69:a1:
6f:bd:87:b5
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:26:07 2025 GMT
Not After : Nov 28 10:26:07 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
77:c2:7d:c6:e5:9d:01:ce:76:b9:e4:49:fa:43:cc:28:41:5c:
b0:8c:dc:16:13:1c:23:bd:05:b4:e7:5f:f1:79:42:80:af:63:
f6:75:85:f2:29:ed:31:11:48:2b:8f:8f:7a:89:15:72:a5:5d:
36:39:e3:90:22:f4:39:d6:e9:5a:44:ee:96:11:cf:ed:c5:ad:
d3:7d:54:2c:a6:50:a4:0f:13:a1:9c:8e:fa:3b:c4:b7:cf:97:
4e:6a:88:40:62:d4:e6:39:4f:6b:4a:5f:29:0e:ee:06:84:10:
2d:0e:2b:47:16:a7:6e:c2:f4:79:17:88:af:e9:a4:9a:d0:0f:
20:84:12:23:e6:3b:39:bf:79:3a:51:db:26:85:47:a5:d0:c0:
46:6f:d6:a5:e8:bc:55:50:9b:fc:ac:c5:66:84:63:c7:8d:bc:
57:b8:54:9f:23:9e:b7:3b:e5:66:1d:2b:ce:4b:2f:4c:63:57:
a1:b1:bb:99:79:52:63:5a:ad:a9:32:28:0c:2d:13:99:79:fb:
37:fd:ea:fa:36:bc:c9:0a:bd:fe:44:d3:e2:8f:47:17:72:37:
8b:cf:4f:f5:68:8d:0e:92:7d:89:e5:21:e4:3b:f2:95:6d:58:
fd:d1:f1:2c:2a:9e:1d:6f:15:59:3d:f0:a6:93:fb:2c:db:d9:
45:ac:e2:d7
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
Truncated 3082 bytes from beginning
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
2,894,580 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:58 2025 GMT
Not After : Dec 27 10:25:58 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b9:c1:ef:66:5d:6e:05:95:f1:0a:50:85:8d:6a:
73:c8:bc:97:98:b4:c1:e4:d1:a0:15:22:43:41:18:
22:f4:b4:e5:53:1a:a8:7a:28:94:72:bd:b2:81:b9:
bd:33:d1:80:c8:6a:90:a3:85:44:1e:79:be:ac:41:
87:c5:9e:5b:d4:cb:5d:d5:55:13:46:67:34:eb:84:
3b:bf:8c:eb:1a:7d:af:0c:ad:f6:c7:19:21:22:57:
8f:7e:ba:15:9f:24:6d:a0:46:8c:22:80:c2:4e:9a:
fb:7a:69:cc:f0:5e:f7:92:94:4a:27:a7:9e:f9:95:
dd:b1:6c:1a:56:11:f2:6f:36:e1:f4:fd:87:35:e2:
1d:1d:72:68:5c:be:27:99:8b:ff:83:4c:44:ab:0d:
f5:2b:cf:46:9d:bc:33:1d:fc:c0:ae:4d:d6:8a:44:
7b:be:62:9c:5f:9d:84:58:32:ed:36:74:bf:ae:93:
f0:80:85:02:08:c3:82:24:06:c8:25:1b:37:c2:02:
92:a7:af:83:e1:3f:d6:38:ec:e5:7f:b5:ad:0d:ce:
db:75:d5:0d:03:c1:a6:a5:ad:22:c8:f7:1b:06:f9:
43:e0:9f:95:45:cd:80:11:9d:4b:5f:7c:d9:dc:45:
8d:1e:4c:ab:33:77:0b:9d:07:e3:b8:0e:7c:f3:69:
6d:4d
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
a1:e1:c8:89:70:d9:bc:f3:ed:86:a4:c9:07:d3:c7:ed:09:8f:
3a:3b:83:e1:c1:a4:ca:18:4e:2d:fe:ac:b4:18:4d:f7:e7:8c:
9d:0a:41:8a:15:e3:7c:21:c8:bc:39:46:f7:47:a7:36:3a:d7:
40:60:5f:9d:d7:ff:9a:23:92:88:7e:1b:fc:9a:20:37:81:db:
b1:e0:05:a9:33:7d:31:5f:27:0f:9b:d2:5e:1c:a9:10:88:05:
b1:2b:94:de:a9:21:96:4a:47:bf:c3:c4:4a:b8:79:8d:6b:86:
ab:a7:e5:27:68:59:ac:f0:61:aa:58:15:21:2d:4f:15:c9:02:
3c:2b:4f:f4:e0:f9:b0:53:aa:da:22:68:51:85:2a:34:7d:92:
61:a4:12:98:08:02:ba:c9:11:84:90:a8:e6:7a:70:ca:d2:15:
f5:83:03:f0:ca:b1:e7:3c:4c:9f:c3:d5:91:d5:aa:ff:f4:e8:
c1:73:69:f1:82:b5:f6:d2:5d:09:45:70:a3:69:ef:b3:6d:01:
0b:ca:eb:3c:de:b5:af:b0:5e:46:58:79:5e:ba:f9:2c:e2:6d:
d6:27:8a:b8:14:04:fc:46:1d:50:bf:5e:5c:43:ef:57:4d:14:
66:4c:b1:a7:a3:58:7b:21:45:2b:c4:fe:80:d7:d3:f8:56:e8:
36:d8:fe:7d
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:58 2025 GMT
Not After : Nov 28 10:25:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
38:a7:89:3d:7e:ca:5a:f1:a9:93:8e:14:1f:cb:ee:38:cd:ed:
bf:3e:e3:fe:7e:cb:79:83:df:75:bd:1e:94:c8:99:28:58:8e:
50:b7:af:fc:4a:2e:10:de:2d:cd:e7:98:8f:e4:60:e7:42:d7:
13:05:73:68:77:04:c4:e4:c9:86:aa:a7:6c:ca:af:06:82:f5:
a3:9b:5f:6f:27:06:33:86:a8:4a:eb:14:92:02:4b:1f:84:0f:
f7:48:31:b0:b3:7d:9c:8e:39:db:b3:ff:a4:f4:e5:1d:06:e7:
46:c8:ca:b1:d5:38:d5:61:bd:37:fc:75:94:60:3e:29:a9:ec:
e6:87:a6:2c:45:d9:b7:7b:dd:7d:b4:fe:c6:ce:01:2c:68:bb:
1b:17:d6:0b:07:24:36:f8:a3:74:df:c6:07:b7:66:ab:d9:49:
b9:a3:fd:02:d8:49:50:1a:2e:84:a9:71:23:4c:47:d6:15:d6:
1a:8b:9e:8a:fc:3a:3c:43:df:bf:9f:7e:f4:31:a3:09:49:25:
c6:23:41:b7:0b:55:d7:e2:41:2c:14:02:51:2d:b2:33:c6:94:
c2:85:93:8d:4d:09:0a:3b:bd:f7:47:5a:a7:63:8a:42:39:a4:
b4:fd:47:51:00:f8:64:f5:30:d9:6a:63:d2:4c:54:77:db:5f:
bb:e5:63:38
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
Truncated 7878 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
3,142,107 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:59 2025 GMT
Not After : Dec 27 10:25:59 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:16:2e:28:2f:c8:44:61:e4:a9:8f:ca:13:d2:
e7:71:2d:79:e2:79:5f:c0:93:fb:7c:01:8b:23:f8:
66:42:f8:9c:63:c9:5f:70:c6:38:15:9d:84:6b:6a:
3c:12:9a:75:db:b5:60:a7:17:32:e5:a3:ff:a8:40:
e3:be:f9:f3:fd:44:28:bc:f7:b4:22:dd:3b:e2:33:
45:7c:87:dd:31:13:26:17:b7:bd:e6:3b:4c:f0:a9:
b7:7b:a5:a3:80:93:66:1d:70:97:e3:4e:07:ad:5f:
0b:08:44:a5:3e:9e:12:9c:e8:19:cc:c8:94:29:90:
93:3e:80:2b:62:12:67:b3:0f:c0:0f:0a:b1:bc:3f:
8e:05:62:87:d2:a6:66:c5:7a:6e:5d:5d:1f:80:00:
d6:53:83:96:29:84:a5:14:5f:aa:bc:71:4f:68:97:
a8:39:60:d1:1d:53:1f:1d:30:ec:50:e7:09:ed:65:
10:68:f2:26:3b:69:18:13:c4:a2:08:0b:f8:d1:e7:
15:fa:ed:38:78:d9:94:cd:6b:77:ea:65:99:0e:4a:
b3:8b:6a:75:f5:16:17:e1:9c:a6:9c:a2:8e:79:4e:
3b:fc:39:67:6d:6b:a7:1b:8d:7a:ec:7e:71:31:84:
1f:71:5c:05:63:0e:cb:15:37:5a:51:8d:07:22:1a:
71:f3
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
2e:0d:78:06:5c:74:b2:51:ae:60:f6:ef:a2:4d:86:cc:12:4f:
ff:5e:09:07:d3:27:1a:91:fd:7b:8f:78:41:48:7e:af:8d:ac:
3a:ef:35:62:56:5d:2e:2e:06:3b:27:97:2c:f2:d0:a0:29:20:
07:bf:44:e1:7b:2b:e5:28:47:18:ed:37:9f:5e:c1:17:60:a3:
a0:3c:e9:00:28:92:31:47:dc:06:73:2e:34:c5:c6:70:1c:eb:
fb:ce:44:1d:52:d2:1a:d1:63:d0:bc:17:d0:ec:58:0d:a1:5d:
52:b3:07:ea:c4:59:6f:16:90:3f:6f:a7:1c:24:f9:4a:c4:8c:
b2:1a:2d:d2:25:0c:25:c4:99:0d:13:5c:cd:90:fd:85:09:8d:
8e:b7:48:5d:1f:0d:b1:7c:28:da:09:fc:77:d1:1b:3a:36:5e:
35:a6:8d:69:d0:99:0d:78:c4:04:03:7e:f9:a0:2b:ad:0c:42:
69:3d:83:10:5b:9b:b2:7e:69:82:b0:1e:50:1c:e3:a8:ce:6f:
1f:08:36:09:f4:b3:2a:ba:89:c7:2f:6d:d4:f1:70:87:3e:44:
85:8c:9d:d3:58:0f:5c:ed:66:44:b2:58:87:d2:81:f3:b0:3a:
64:72:98:f9:5f:85:a6:7b:8b:70:ce:67:55:3d:05:68:ea:17:
b6:dc:d4:ab
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:59 2025 GMT
Not After : Nov 28 10:25:59 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
43:b2:35:6c:65:3e:d6:38:28:04:28:9a:bb:19:62:aa:35:63:
a2:f8:4d:f3:ae:db:8d:dd:d2:96:03:71:51:f8:14:b0:c8:96:
d3:ac:2c:c6:5a:a9:fe:31:8c:68:3c:5d:1e:5d:ea:59:d2:3b:
e6:69:49:82:e7:5d:47:0a:f6:80:bc:f3:70:a2:dd:c1:f9:bc:
f0:34:6b:38:04:b0:b6:2a:03:69:f6:1a:7f:27:c3:f6:7e:39:
48:7e:1e:28:71:27:8a:09:17:60:52:cb:81:3c:43:76:7e:61:
43:5b:26:95:2f:d0:0d:92:46:62:c5:75:09:7b:31:6b:85:91:
63:b5:aa:cd:b2:4d:64:a7:38:2c:00:4c:fd:54:29:ef:3a:4b:
c0:f0:f9:3c:c2:9a:1d:1b:2a:f1:c0:97:1f:8a:1e:06:32:9a:
1c:0e:30:97:60:e4:eb:f1:27:1b:53:9d:e1:cd:60:19:35:1f:
43:8e:5f:ea:3d:c8:42:ce:87:19:6a:7e:24:5e:bf:81:ab:70:
ed:f1:c8:8e:f8:0f:c7:16:2b:92:24:95:9d:a7:57:4d:ce:2b:
48:0b:f9:cc:a6:28:d4:f8:f7:3e:73:8d:f3:c5:07:4f:62:78:
8d:0d:e8:3f:d7:10:a7:ca:78:8c:c1:31:aa:41:db:91:43:34:
29:48:2e:74
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.74s
Truncated 3082 bytes from beginning
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
2,896,369 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:58 2025 GMT
Not After : Dec 27 10:25:58 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:80:a4:eb:07:50:f0:38:c6:2c:ad:eb:b5:68:22:
c5:c6:fa:1d:30:1b:8b:66:d4:a0:68:b3:ce:b5:01:
fb:d7:79:67:ee:e3:97:e6:6e:d8:15:6d:18:17:9a:
9e:30:6f:fd:12:59:2d:02:cb:93:f6:45:ea:bf:ab:
67:83:79:80:f5:f6:1c:11:bb:69:ec:d8:c5:8d:32:
53:2f:a8:e0:3d:be:f2:d4:fd:c5:54:60:27:82:cd:
3e:3a:ae:86:52:77:e5:19:dd:df:de:a5:40:37:40:
9b:55:dd:d1:58:35:46:4f:55:d8:ac:64:71:8b:a6:
51:c8:9a:65:3d:b4:58:e2:32:98:fe:90:7a:92:e4:
f0:1d:66:36:af:ad:66:7f:97:50:5a:36:99:9a:c7:
c0:45:89:8a:bb:96:fe:a9:73:b4:f9:ac:0a:0b:89:
d7:0b:bb:a4:9c:d9:30:2f:c6:7e:23:14:49:09:b0:
d8:df:87:77:db:f5:29:34:dc:a5:c1:de:4d:a6:e7:
2a:d0:1c:63:88:29:c4:4c:c6:78:fc:d4:d8:70:df:
0d:be:3a:02:ba:97:29:f2:43:0d:37:cf:7b:08:b9:
be:24:91:d1:34:3a:d4:5f:06:2c:51:5a:0d:e4:fd:
04:3e:86:f8:5d:b7:3a:66:e7:d1:12:a9:61:50:4d:
59:97
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
40:09:45:28:f1:7c:17:77:a6:f7:23:c5:bc:6a:20:5e:1c:75:
a8:56:7a:14:dd:5b:66:00:a3:00:13:63:3d:3f:4a:6b:88:09:
20:21:8a:e9:2d:a6:38:24:fd:c2:21:07:5e:5d:99:62:bd:44:
14:8d:1c:36:83:21:b2:91:b5:dd:30:29:c9:d7:09:c1:95:0e:
f4:e1:b5:92:7e:13:d1:0c:24:79:99:c2:80:c3:1c:5c:e0:83:
ea:e2:9c:1a:ca:82:02:e1:65:d2:8b:d9:b8:8d:ec:cd:8f:aa:
55:5f:e8:eb:f4:1b:ae:3c:45:de:38:5a:14:11:d2:e4:8f:88:
93:d7:a3:cc:2c:b0:3a:87:06:db:bb:a6:a1:67:81:a6:81:ad:
43:83:f4:2c:b8:6e:c5:8b:50:21:21:47:99:00:52:b9:4b:ec:
5a:b9:81:3b:23:35:b7:1b:2e:63:2e:80:3d:86:dd:50:ab:28:
09:15:d3:3f:67:ca:81:fd:e7:1d:c4:6c:42:f6:be:7e:f4:15:
c4:39:37:8c:ff:26:11:ec:11:a9:ff:37:0e:89:19:d5:81:ee:
bb:26:5d:8c:e4:cc:c2:35:81:a6:73:0d:ae:5b:9f:cf:0b:34:
e4:a2:35:87:9e:de:38:de:ba:f0:47:51:d6:b1:5f:92:7d:c7:
b5:e7:68:69
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:58 2025 GMT
Not After : Nov 28 10:25:58 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
11:65:ec:d0:fb:d7:c3:ce:98:e7:65:62:65:e2:d2:0f:15:96:
35:87:66:db:c5:70:c4:10:d0:d8:71:e2:3a:02:f9:bd:02:bc:
31:d8:1d:07:b3:fe:71:68:cf:8c:1c:4b:2e:3a:8a:97:f2:61:
32:db:86:0b:b0:d3:a4:e6:f8:e5:80:f9:e9:f3:58:2b:be:f9:
d2:19:1a:fd:b5:90:24:cf:37:ee:c5:43:b1:c1:39:18:21:cd:
c1:ae:19:4a:5c:9b:a1:85:48:35:34:38:75:7a:bc:b6:76:ce:
c7:96:17:68:7f:d7:4d:fc:20:3b:51:b2:97:bc:e0:c9:6d:04:
91:da:76:8d:44:40:20:36:cd:bf:4b:37:d1:89:4e:8c:36:01:
96:60:8e:46:60:9a:29:8d:8b:9c:00:0f:03:ad:11:d3:6f:22:
93:08:89:3b:02:45:fe:bc:ce:84:2a:70:9e:e9:98:0a:2d:be:
05:a6:ed:0a:cf:99:c7:44:b5:3f:02:d9:64:fc:15:b1:2b:2d:
29:d9:19:8e:29:d0:56:c6:31:0d:fb:4a:3c:b5:b0:2c:45:3c:
15:df:6b:41:f4:f8:f6:18:6a:22:1d:1a:b9:15:f7:4f:f8:ec:
a2:95:d7:9a:71:98:5a:c4:9f:5c:d7:0e:c4:cc:68:a7:3f:3d:
9d:8f:71:f3
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
Truncated 7878 bytes from beginning
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
3,144,754 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Dec 27 10:25:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ab:e7:8b:8f:e0:e0:42:f1:4f:34:f5:e2:61:45:
e5:fc:d8:7c:99:c5:57:b2:d7:1b:26:b0:80:b2:0f:
49:0c:65:d6:fd:dc:ac:48:b9:48:aa:84:d1:57:86:
d8:0d:b4:25:34:1f:75:19:81:e0:06:77:1f:1b:21:
21:0f:7e:02:44:d1:10:04:94:59:93:58:14:1d:6c:
2c:b6:8f:7b:08:78:b4:8c:d1:3e:e3:81:b1:29:96:
f6:e6:c0:a5:7a:88:1c:0e:cd:72:ed:45:b8:f7:4c:
23:f9:7e:ac:6d:4c:b9:13:cc:72:1c:9b:e8:35:5a:
72:6c:06:28:ab:ec:93:32:b0:6d:f0:0c:16:b1:c4:
29:16:ce:5b:bd:95:fc:c0:05:5b:3c:fb:bc:20:5a:
20:d0:9c:4b:a3:32:c6:01:2c:86:78:d5:ef:51:3f:
05:f1:ee:d1:82:96:c1:50:5c:82:d2:f1:a9:e4:55:
88:18:75:15:5e:32:f2:36:b6:04:6c:89:e3:65:4e:
d9:d7:f2:de:25:48:76:61:e4:16:e6:ee:a8:5a:5a:
29:e8:fc:a0:fd:a8:21:89:47:19:5b:59:5a:09:6e:
01:87:73:20:ea:9c:ef:59:f7:6f:b1:89:bb:18:66:
54:65:b0:7a:b4:ef:f9:4b:5c:78:e7:12:eb:84:e5:
e6:2f
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
00:44:8a:9d:81:54:9d:60:a4:e1:13:89:c2:a5:7d:4f:a7:4e:
92:1f:35:8a:03:d2:81:1f:52:0b:1b:82:20:79:d1:dd:a3:79:
be:3b:a4:5f:58:15:39:79:de:dd:0f:b4:db:13:3c:b8:88:56:
ee:9f:99:c0:a2:fe:91:58:ef:1e:f2:63:0a:6a:81:9f:b1:3f:
78:3f:d2:ab:13:14:5c:8a:dd:b7:1d:98:90:a6:93:6e:a6:4d:
4c:b6:28:7b:9d:ad:2a:48:45:6e:bb:1d:b9:96:e8:99:81:65:
6a:b3:03:e4:17:2d:b7:26:b0:08:02:5f:86:74:d8:15:fd:b9:
cc:91:7d:95:a8:53:16:bd:fd:1c:0a:87:aa:46:bf:ca:f8:d8:
3a:9c:07:2a:4e:36:59:dc:9d:b7:10:04:b1:43:62:3b:e6:c1:
e9:4b:fc:40:9b:e8:61:56:c7:e8:e4:25:a9:49:b9:47:63:e8:
e8:fa:12:fa:4c:60:48:15:97:82:ef:c5:c8:d7:1e:ef:86:e7:
af:e8:25:1d:35:7f:0f:8d:62:d5:1e:43:52:a6:5b:37:7b:a3:
7a:66:e1:ac:e5:49:94:59:f2:04:97:8c:27:cd:16:ff:f8:10:
b7:d2:2d:a6:c2:14:eb:ed:f6:5b:bc:fa:51:68:46:d4:dd:e4:
2f:89:76:28
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Nov 28 10:25:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
79:3f:e3:47:4f:ed:b6:cd:a0:39:94:21:4c:7d:3d:bf:5a:5b:
bf:a1:a7:7f:58:f7:2b:b3:0e:02:ec:02:65:b4:fe:5f:89:3b:
fc:7a:f6:33:a0:12:b1:52:78:e5:d0:72:3a:6e:1e:54:43:d7:
a2:0f:89:de:c1:76:f5:79:3b:02:9e:82:eb:1c:9a:c9:e4:b7:
be:2f:62:70:a0:94:20:c7:68:cb:05:f9:37:fa:59:bb:5d:8c:
76:bb:b3:26:2c:ae:ab:6f:46:4f:0a:f1:ce:1c:55:f8:48:53:
5d:f7:14:00:6e:c3:8c:dd:88:70:1a:02:29:82:a5:47:71:53:
22:6e:de:98:49:e4:6b:d8:2b:52:81:55:15:3d:d7:69:4c:ef:
08:d2:54:4c:3a:8e:cf:22:d2:77:5e:2d:f8:da:e4:b2:d2:73:
96:ad:fa:90:19:e7:34:87:59:cb:53:65:f3:51:d9:3b:cf:0d:
da:30:4f:de:ba:61:e9:31:07:1e:52:b4:86:db:7c:67:97:57:
ea:77:fd:32:4b:7b:02:79:61:02:06:a1:91:7b:33:61:c7:d4:
33:bc:7e:ab:03:8e:d8:90:a2:4f:1a:4a:43:bb:ba:fc:b1:12:
4b:95:b6:bc:bf:08:44:e5:68:99:0e:46:40:48:43:99:12:ba:
5e:30:34:76
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,896,854 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:49 2025 GMT
Not After : Dec 27 10:25:49 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:ac:8d:ed:0c:ee:a4:52:98:71:1b:a4:21:6a:c7:
9c:e3:54:b2:a7:f3:e4:26:6b:4a:c7:59:a8:d4:c8:
4a:17:2d:54:58:9c:d1:8c:a1:e8:c7:e5:9b:d9:31:
3b:72:d2:3b:f5:a9:21:da:e5:29:94:8b:85:a5:1d:
6d:8c:8f:1d:e9:b6:55:4c:5a:e4:35:60:e8:36:48:
01:6d:59:74:a0:91:71:a3:66:4a:d4:45:35:cd:86:
84:4f:e0:0c:2b:6b:96:49:e2:b1:6c:d8:53:27:c0:
8a:fb:fa:31:7e:eb:51:71:12:53:e2:68:06:52:4b:
08:d4:26:16:80:45:e1:1a:6d:22:3c:c0:e1:3e:46:
d5:6f:a4:83:f8:1b:6b:b8:ab:af:e7:2a:2d:fa:3f:
d4:ca:8a:8a:e6:8c:5c:96:0c:f6:d4:36:01:ab:15:
3f:71:83:bc:4c:b2:5f:65:02:48:01:ae:00:ce:0f:
85:7c:89:f9:01:ea:68:8d:ba:1d:a7:d5:0a:46:80:
71:df:fd:fd:ba:34:1e:db:9e:a9:26:12:77:d8:88:
a1:9e:55:cd:78:85:c9:72:1a:d9:db:f1:72:d3:1d:
97:d2:9b:2e:59:b4:14:4b:30:a6:36:5e:79:92:d9:
5a:0b:66:95:6e:0a:99:2e:ad:2c:b0:ae:a2:da:f6:
1d:87
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
06:28:9b:b1:62:bb:22:85:d7:b8:fb:db:e0:23:11:79:cc:d0:
8f:26:ac:e5:6f:19:4b:20:dd:51:30:79:a6:0d:7d:e1:31:a0:
d4:82:05:b4:cc:00:2d:53:c0:22:ee:06:39:8a:97:9a:2b:d7:
36:f5:4e:41:c3:fb:7b:19:b1:ef:32:76:e3:a9:79:18:95:0a:
12:34:a5:4d:4a:d4:cb:db:f1:49:85:bc:b1:fa:63:12:af:31:
2d:c6:69:d3:c4:3b:c3:25:84:b1:c1:5e:cc:6b:14:34:3d:d4:
77:85:06:f6:be:78:1b:e1:5f:d0:ea:55:cb:07:f6:8d:e8:ad:
57:08:0b:74:1b:a4:70:76:c3:aa:42:21:36:e3:43:5d:a3:8f:
bd:49:5c:d1:7b:2f:0d:3d:e2:d4:fb:d6:78:e4:db:a0:1f:47:
50:83:e4:c0:1d:dc:2d:e4:c2:63:df:5f:c4:7c:59:d9:39:78:
c6:3a:1c:b5:b7:e9:b2:59:a8:7a:19:f6:59:1f:09:24:0c:44:
a8:52:08:00:20:de:ce:f3:08:f6:1a:7a:5f:06:86:14:a9:6a:
e7:44:56:29:3b:1d:4f:1c:da:fe:c5:63:95:be:9d:15:e3:b0:
06:90:a6:e3:a5:54:23:9b:ac:be:3e:f1:2c:06:f2:f6:df:be:
f4:e4:92:49
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:49 2025 GMT
Not After : Nov 28 10:25:49 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
99:56:8d:2d:0d:80:48:32:86:55:cf:a8:75:fc:2d:2c:87:42:
c7:55:08:30:c6:e9:a9:f2:8c:93:42:72:fb:45:11:b1:92:e3:
8e:ee:6a:b0:bd:4a:67:29:42:87:52:b8:b0:55:33:5f:63:7f:
a3:52:69:da:f6:f4:ed:dc:32:92:01:c9:df:62:3b:b5:aa:a3:
c3:81:8c:2a:0b:ad:dd:e5:f4:c4:57:d8:04:6f:5d:42:35:f5:
43:93:46:01:0d:15:db:de:2b:c4:1c:c4:7d:df:70:b3:bd:eb:
cb:4d:c2:95:6e:38:84:07:58:43:81:6f:cd:8f:c8:49:95:b0:
a4:2d:74:aa:b1:31:1a:08:47:a7:4b:b6:09:d2:c6:e2:52:74:
2a:79:90:c1:76:29:95:bd:9e:01:a1:ce:5d:76:f0:3c:cc:d8:
80:9b:2b:88:5c:74:da:af:c1:5f:74:36:2b:bd:7b:f3:ad:50:
9e:3c:ea:4f:58:40:f2:3a:41:8c:65:c9:65:52:0b:5f:e5:e9:
58:a5:94:32:c2:3b:ff:ef:3b:e7:43:2d:28:ef:8a:7c:8d:04:
05:62:64:b1:18:3d:44:8b:ce:f0:b5:e5:39:28:b4:cc:15:52:
bc:f4:9b:ef:5a:49:80:9b:63:e3:58:f6:df:08:39:58:3e:0f:
c6:c2:9c:fd
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
Truncated 7878 bytes from beginning
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
3,142,497 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:27 2025 GMT
Not After : Dec 27 10:25:27 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:84:12:f4:1a:94:de:ff:66:05:f2:c9:56:fb:be:
8c:aa:42:10:f7:48:cd:ce:30:07:4e:5f:0e:b8:e1:
d7:77:91:e0:23:fc:a3:6c:47:81:c9:6e:a3:a1:48:
6f:86:70:5c:e3:da:72:1f:7d:25:d8:f8:26:0e:4a:
3d:a9:68:96:24:d3:ce:11:2b:67:46:88:ac:a5:07:
f1:8f:a4:10:a7:2c:aa:67:3d:08:3d:19:57:b3:ff:
d3:ee:50:46:46:4a:26:c5:75:73:bf:f1:0a:12:13:
c9:21:de:42:39:ea:e0:1d:b1:83:c7:a5:50:f1:ad:
0b:2f:56:0e:39:a8:12:5a:98:ec:d6:5f:d1:53:6f:
77:1f:79:ab:1d:79:e3:04:19:18:80:8d:d5:84:ec:
8d:65:13:27:b8:9d:38:56:b5:fe:1f:07:39:88:ce:
ee:d1:df:e2:57:f1:f3:85:ec:74:8f:94:59:d7:ec:
c7:5c:4b:ab:f5:1d:21:57:87:21:bb:4e:ab:8e:51:
07:ab:94:c1:05:34:27:33:d4:cb:9d:70:62:9a:8f:
2f:fc:b0:ad:09:dc:47:6e:90:fe:d9:95:e0:6e:e9:
a3:df:3b:e2:f3:47:c4:47:8e:99:17:13:65:e3:4b:
9e:f1:c4:e8:64:7d:a8:5a:84:43:fe:76:ac:c0:f9:
94:5b
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
42:07:37:3f:dd:b8:a8:25:a6:cf:6f:39:90:3d:08:8a:90:49:
12:7b:bb:3c:8f:f6:21:93:69:a8:42:8f:50:8f:dc:21:f3:d1:
71:f6:09:98:e5:a8:48:bf:60:37:43:11:17:d6:09:8d:04:12:
d8:da:b9:4e:45:4d:ba:1a:6a:4e:f8:68:4d:ab:8c:d7:01:17:
34:22:d0:22:9e:57:b3:7b:af:38:ea:9e:f0:ce:5e:ba:9e:d2:
13:35:4e:56:72:7e:24:62:54:72:a7:9d:65:eb:fa:4b:37:6a:
35:8e:7a:c3:eb:39:8f:71:39:c3:13:0f:46:32:14:13:36:94:
d6:c8:74:2c:a0:42:89:56:69:17:83:c5:b4:48:4d:e3:2c:ab:
ad:d0:3e:19:3f:99:81:f2:90:7f:73:bd:f4:67:46:48:16:a3:
9c:59:3e:b0:af:4b:0b:26:0e:83:c0:f1:77:80:88:22:c9:b8:
e5:6d:7a:18:9f:07:84:49:3f:24:63:91:3e:cd:36:08:9b:3c:
be:94:68:79:eb:ef:e7:b9:51:ed:17:28:de:8e:65:3c:d6:f2:
1e:ac:21:76:c3:f3:e1:90:23:36:cd:0e:19:a6:9d:13:4d:66:
1c:1d:75:32:87:98:a6:d4:84:9b:71:84:69:97:b5:87:57:1e:
fd:a7:b0:99
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:28 2025 GMT
Not After : Nov 28 10:25:28 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
7c:3e:2e:73:6a:66:c0:24:40:06:98:cd:9a:73:67:68:c2:5e:
01:92:b8:8e:8c:d4:1d:95:7f:b2:44:47:28:0f:43:9c:f1:78:
8c:78:7d:55:fe:d8:31:b7:af:6a:55:20:cb:1c:c9:5c:92:c9:
c2:26:41:57:25:cd:d2:dd:5b:9b:ae:04:41:3a:bd:aa:4a:f8:
26:23:ac:df:2b:6d:2b:5f:f4:42:69:45:10:e3:59:e1:02:5c:
69:4d:e0:7a:11:23:50:98:b0:df:8f:ba:32:4a:4f:a3:be:3d:
72:42:70:be:72:3f:0a:11:16:be:90:1e:f0:15:42:6b:fd:38:
6d:8d:ab:3e:91:d3:b2:de:46:d9:f4:3c:77:56:14:bc:78:f5:
62:83:34:f2:27:fa:90:d9:c0:ac:08:ab:bd:6f:17:ef:00:bd:
81:9e:36:d2:c9:18:bb:fb:3d:4f:11:be:db:b2:29:88:74:45:
d2:2d:39:a2:6e:5b:29:cb:79:3c:1c:83:1f:a0:73:4b:76:95:
85:6b:65:ca:ef:62:05:99:b6:05:2b:93:b0:ef:89:b8:47:ec:
df:2c:1c:c8:98:24:bb:83:71:de:f1:59:50:b1:1c:df:88:d7:
d7:54:7d:60:0a:3f:a9:68:93:41:34:b3:26:9b:5f:f3:21:32:
76:34:e0:63
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
Truncated 3082 bytes from beginning
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
2,898,049 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:39 2025 GMT
Not After : Dec 27 10:25:39 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:9c:d5:bf:62:87:f0:0e:70:6e:48:ab:06:5d:e1:
e9:a7:94:9b:ad:21:bd:81:d4:5d:ec:aa:15:63:88:
f1:6c:8b:c1:36:5d:a8:df:6a:50:b4:c1:c4:4f:22:
50:42:c7:85:92:17:bd:ad:de:c6:bc:52:2a:f4:61:
03:c8:1c:b1:27:6d:8e:dc:13:2b:b9:14:04:fc:d3:
bb:b1:1f:36:6d:18:2d:f9:e0:fa:7c:4b:b3:c7:cd:
41:66:e0:fa:0e:ce:d9:08:fc:85:bc:ad:79:b1:73:
37:a9:df:8a:1a:77:a8:7d:5a:ab:dc:f2:53:8b:27:
cd:a3:10:7a:d1:30:86:db:4b:f2:ed:df:70:dc:89:
c4:58:b4:3c:b6:45:2b:d5:80:62:03:54:e8:52:47:
cb:c9:d8:2b:33:23:06:aa:06:57:87:4a:c9:59:7a:
ff:2e:6c:78:f8:c6:fd:24:49:33:db:64:e0:96:9f:
6b:9e:5e:fd:6b:f9:60:e3:9d:bd:57:65:99:1f:78:
71:2a:ec:0b:21:11:fc:82:5b:51:39:3b:21:76:3d:
41:19:07:a7:98:4b:bb:d9:68:0e:ab:ec:02:93:3d:
cc:25:9f:cb:00:32:ab:90:e8:0a:08:06:99:6c:1e:
0a:8c:e4:18:e2:10:e6:b7:97:0c:41:2d:cd:4c:ba:
5b:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1e:ed:2b:7b:ab:2d:04:1e:32:78:7d:ee:b9:d7:01:3b:5c:91:
ca:a2:a5:28:a3:d3:c2:0e:f4:76:bc:f1:c0:9f:e6:f5:d1:94:
b1:c3:0d:2e:a7:98:ef:64:4c:6f:2c:5e:b4:e0:c8:24:5d:25:
b1:a8:6c:9d:06:1a:b7:74:fe:52:38:83:f3:5c:61:28:59:9f:
ba:71:f1:c9:a9:ed:39:33:b2:03:e0:82:e9:4f:73:4c:85:43:
83:08:63:f7:f8:8c:d2:ec:e0:9b:06:a5:6e:81:ed:b5:41:fb:
ad:7d:77:36:ec:cb:0c:26:27:03:a8:70:e6:27:17:d7:7a:3f:
c6:b1:8b:f7:bb:89:75:c7:4f:75:88:c6:85:9e:2b:5a:3c:15:
aa:36:ff:a9:f9:c4:ee:0b:c8:36:68:a1:d3:4f:e1:19:8c:c8:
04:ce:40:31:d0:21:a2:31:2f:b2:94:3f:c4:61:cd:16:e7:e2:
79:3d:73:06:de:43:c5:3d:63:61:44:c0:a6:5c:e0:ad:30:59:
3d:19:56:fa:0e:57:59:9d:ed:55:00:ea:a5:8b:2f:ad:44:29:
bc:1f:3b:11:0c:35:b3:43:0b:39:36:76:79:c6:3d:87:97:cd:
47:7d:fc:9d:3f:21:66:d4:46:e6:ad:c2:92:d9:32:c3:06:9a:
68:f9:ec:7a
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:39 2025 GMT
Not After : Nov 28 10:25:39 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
03:5a:c2:45:4a:37:1c:b4:f0:2d:d2:f7:64:80:fe:49:92:44:
8f:8b:bb:e6:39:f4:1a:27:bf:a6:a7:ba:3d:42:20:4e:ae:ef:
b4:b3:19:40:f6:81:a9:d5:a4:ce:a2:01:44:03:8d:39:95:16:
93:cb:a5:f8:e3:08:e4:d7:1d:b8:4b:00:af:ac:c4:6b:e9:0c:
e4:c5:70:5a:7e:b7:e5:d9:66:40:e3:60:78:02:b6:87:23:88:
ac:61:bb:2c:ae:41:db:3e:75:78:1f:09:e7:ba:f8:01:df:0b:
72:5b:29:ba:8b:58:6e:b8:67:2f:07:8b:04:c9:fb:89:f3:12:
d9:07:26:e1:48:24:99:5d:e8:90:cc:10:cc:87:43:02:03:c6:
e8:3e:f8:5b:35:35:cf:cd:35:34:f8:02:6a:ff:5c:4b:e8:1d:
d1:04:41:39:58:71:7b:a1:d1:ad:33:b4:5f:95:7f:ea:02:85:
09:22:f9:ba:16:59:06:2b:bb:8e:7a:8a:d2:3e:a3:47:ee:6f:
2b:32:95:78:14:4e:eb:65:bd:fb:ad:f0:0f:9b:2b:14:64:45:
69:39:64:fb:0f:aa:d8:e3:1c:31:ba:86:98:51:6f:fd:84:63:
9a:be:06:97:d4:95:9c:46:e2:a2:93:b7:a1:cd:8b:1a:c5:23:
59:4f:e6:9c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
Truncated 7878 bytes from beginning
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
3,140,680 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Dec 27 10:25:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:e4:2b:d0:81:30:cc:73:ea:e0:98:ac:be:71:67:
d0:23:ee:7b:b5:97:aa:5f:7e:a3:64:27:fc:02:3a:
f3:79:41:16:09:19:c8:2a:27:b2:39:56:73:02:93:
42:ee:17:95:48:4b:fd:a1:51:96:57:6e:e1:99:c9:
b3:0b:6a:b0:87:5d:f1:52:ed:ed:86:9c:25:43:ed:
c5:69:b1:0e:10:ba:e3:7b:df:e0:82:85:a0:95:0c:
5b:17:c9:ab:1d:d2:4e:2c:a7:d0:9c:bd:e9:b7:2b:
9d:f1:76:1c:be:4b:df:cd:28:1a:8c:b9:4d:1c:e1:
6a:14:0a:9d:cc:96:de:ed:91:9f:5d:ed:e0:39:dc:
a0:1a:31:b7:77:69:01:4d:15:5f:c2:85:91:e3:f9:
95:43:5f:7b:55:ab:3f:e2:bb:9b:24:84:e2:89:db:
db:fd:ae:fc:d8:b2:53:35:9c:57:a8:85:96:17:26:
2b:4d:e3:f7:53:e5:df:ec:33:bc:4a:c3:f6:3d:d3:
79:f3:e2:23:e3:c2:08:0c:25:e6:59:48:47:04:f7:
df:12:44:b9:98:2b:09:46:b5:7c:5f:de:6d:3e:a1:
dd:70:74:18:b7:b2:e8:d4:f3:1a:95:ef:28:df:3c:
f1:31:28:02:8c:b0:11:86:25:e5:2a:25:b5:80:ad:
f3:bf
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
24:af:34:2f:f7:fe:93:f0:79:3a:21:43:03:61:5b:40:40:d7:
d2:99:9a:ab:7e:24:ef:e7:53:a8:0a:08:83:4b:93:af:c6:a5:
83:57:5f:dd:7d:3d:79:d0:62:a1:b7:d3:9f:a7:0c:07:29:1a:
84:dd:c7:3a:ba:72:c9:4f:75:bf:19:fc:b8:14:63:20:69:7e:
66:ac:d7:71:5b:fb:49:c1:c5:89:04:4d:d3:b3:14:b4:e6:8c:
cf:be:11:ab:95:d1:fe:37:10:85:08:46:09:4a:f5:18:7e:a6:
1f:ee:3a:11:8b:a9:09:ca:44:55:5e:5a:6a:1e:44:3f:82:98:
fd:41:1d:59:da:e7:ed:9d:b8:86:91:e4:cc:e8:a4:b6:36:b3:
91:29:fd:a2:83:fe:39:86:fe:3d:2c:17:d6:95:ff:c6:4a:b5:
e0:71:d5:81:37:15:22:25:b9:d6:e4:a7:be:03:2b:52:d8:ea:
0b:c2:e4:f1:2c:5e:01:84:62:88:18:bd:a2:4d:6a:da:11:12:
46:a6:42:95:a1:a3:f6:d8:74:ca:c8:54:83:e9:6b:49:a8:51:
ad:79:46:e8:94:94:63:6c:bd:65:85:86:16:dd:e9:b2:15:b5:
37:c2:27:cf:b1:cc:e5:7e:a4:3f:58:e0:1c:20:ad:46:92:7d:
da:94:48:11
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Nov 28 10:25:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
bb:e0:e6:12:d4:7f:b0:03:70:4c:b6:d0:61:64:76:fc:68:3d:
73:6c:34:40:23:6e:fb:d1:a9:2d:39:77:0a:60:fb:8a:1c:bd:
a6:e0:6a:01:6f:b1:4e:81:cc:85:04:7b:23:de:00:0d:64:4e:
34:1a:b1:f4:42:d3:2f:26:55:48:31:2f:28:a6:12:19:8b:7e:
5b:29:02:95:bf:6e:4b:56:75:4d:84:77:8c:d9:f9:f1:f0:2b:
03:45:19:61:e6:c0:06:d5:b1:49:0a:16:15:c8:46:be:09:03:
4b:ea:5e:54:b8:06:9b:31:38:15:9a:08:af:b9:e1:d9:05:e5:
e4:0f:2c:ed:b1:1b:5b:4c:0a:76:b0:1d:a0:19:82:32:7e:2b:
ea:ab:56:d3:da:10:0e:1e:90:4e:9d:ee:7a:4e:22:e7:8d:1e:
48:df:fb:33:e9:b2:c9:83:85:55:08:e8:66:c7:b5:e1:1b:59:
00:05:09:cf:ed:91:fb:df:1c:b7:e7:43:4f:24:0f:9b:78:15:
80:01:32:c8:9b:89:4b:5d:44:f5:8b:7d:0c:41:76:a9:da:37:
94:e1:16:27:68:dc:08:90:b6:a5:74:1c:43:ab:09:e7:e2:5f:
6d:24:f6:d2:fc:66:bb:74:68:88:96:27:d8:87:7a:d2:7c:33:
69:30:e7:af
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
Truncated 3082 bytes from beginning
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
2,895,050 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:42 2025 GMT
Not After : Dec 27 10:25:42 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:da:5a:37:ca:ca:69:2f:0b:99:38:40:be:07:60:
20:96:1e:e1:a8:3f:81:01:66:02:64:72:56:ae:30:
6a:81:e3:18:0b:af:f7:e1:4d:12:67:32:3f:ff:6c:
c6:28:e2:3a:23:34:50:c6:7d:9c:43:7e:b3:05:22:
44:56:92:e2:a1:a1:e0:53:78:19:d5:f4:e6:7d:08:
9a:06:49:be:1a:19:4d:9d:69:3e:02:60:83:48:0f:
02:f0:8c:69:7a:06:49:55:b1:d1:a7:5f:39:82:a2:
01:6d:8c:d0:82:e1:4a:65:e5:8d:4e:21:0e:58:7b:
27:2b:5d:a9:ef:8c:31:da:7f:8c:fc:86:e7:0a:88:
d1:f3:c6:67:2f:37:de:7c:31:fd:5e:fa:aa:0d:30:
74:b4:55:4b:54:02:51:b7:3b:e5:bc:61:fc:c8:a4:
88:05:ab:e8:78:3e:20:9e:d4:50:c9:2e:e2:a9:59:
86:a8:97:b7:6f:db:c3:11:7c:4c:dd:1c:ad:df:37:
fc:69:68:a9:5b:f5:ca:56:15:90:c5:e8:e1:f2:bf:
1f:41:de:a4:d1:a0:75:a8:41:84:d8:58:32:af:ae:
86:88:3c:e2:db:0c:dc:f2:e9:c1:ca:4b:4a:0a:95:
67:06:de:0e:58:05:ab:f9:65:4b:40:29:2f:a7:5b:
bf:75
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
6b:76:e7:90:e0:fc:04:90:1e:87:fd:c2:0d:e7:7c:98:98:e2:
07:34:e9:bd:1a:36:db:10:15:fb:4c:35:dc:fb:bd:15:9c:5c:
3d:4e:b0:c4:1a:f0:ad:d8:7c:39:49:f1:53:72:c7:09:a4:d4:
51:eb:66:72:a9:82:e4:ff:c6:d1:fe:51:75:83:98:2e:49:c7:
51:78:c0:14:eb:47:4d:32:73:ab:0d:11:09:74:4b:11:a1:16:
3a:c8:6f:81:d7:ed:a1:e9:82:0d:c8:f8:82:56:18:9d:b0:3d:
cf:74:46:2e:6e:05:66:bf:8c:0f:59:35:36:8a:b1:61:61:89:
ec:1d:a2:f0:2c:ec:01:d0:b5:eb:7a:fb:04:9c:de:b9:46:f9:
45:18:d6:27:7b:ea:b4:1b:4b:d6:25:b8:8b:a4:4c:80:4d:10:
0c:04:09:46:48:9b:2a:4e:e3:89:74:58:30:c1:b2:b0:f8:76:
27:0c:91:bb:ea:ec:12:93:0c:99:17:27:16:00:2a:dc:e4:49:
1d:8f:4e:34:2f:66:14:36:03:cc:9b:3e:06:c6:59:8b:1e:e9:
72:8f:20:bf:ed:67:2a:9e:25:8d:31:b8:da:eb:73:b8:19:fc:
90:40:30:a8:49:88:59:83:23:50:d7:07:f3:19:8b:a8:00:fc:
76:65:0c:8c
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:43 2025 GMT
Not After : Nov 28 10:25:43 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
d0:77:0a:29:7a:96:42:19:24:51:26:e9:fa:43:92:53:6b:05:
23:4c:54:ea:1a:f2:5b:59:33:39:8a:cf:b0:33:16:53:b9:c4:
24:80:59:e4:5c:91:01:8b:c5:7c:f4:14:1a:7f:05:81:60:c2:
b5:66:bb:a1:7d:7e:b1:0c:c4:a3:b5:1e:14:49:b3:c4:d2:63:
36:71:42:71:f5:de:35:85:b8:dc:b8:8b:e0:f3:fd:bd:6b:ef:
80:16:32:27:d2:77:c7:ad:83:f2:50:71:36:e3:c6:1d:05:8c:
c1:42:88:f4:7d:cd:56:95:8e:29:d8:11:43:0e:96:59:2e:6d:
de:99:b1:ae:6e:22:45:b5:73:00:42:f6:54:a0:1f:3a:5a:14:
d7:a3:15:25:af:e3:a0:90:a9:db:8e:9f:21:0d:51:28:17:11:
44:8b:d3:26:61:79:33:15:1d:2b:69:a1:50:0b:df:f8:0d:31:
c2:14:61:b8:8b:57:f1:3f:6d:db:e3:01:35:88:10:08:ee:80:
9c:f8:ff:9e:e3:0f:62:50:4c:a8:a4:e3:da:2f:08:79:f2:d2:
15:47:c9:d5:a6:7b:5f:a6:23:63:06:bb:24:36:e0:bf:eb:84:
58:d5:4c:90:bd:a7:b7:7e:39:1f:95:56:54:a7:a0:43:21:9b:
88:eb:b1:e1
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
Truncated 7878 bytes from beginning
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
3,144,795 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Dec 27 10:25:48 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:b5:2a:4f:56:fd:e9:dd:63:eb:2e:9f:03:cb:90:
49:12:9d:25:14:f7:39:98:af:3b:e1:b2:d7:6f:af:
e3:67:b5:f0:4a:0f:41:33:dc:2e:c1:e5:e6:a9:dd:
37:77:4d:32:7c:45:a9:8c:ca:b2:b7:57:b1:c8:22:
ad:49:df:52:c2:fa:f2:bc:7a:4b:d1:84:ad:e3:22:
24:b5:38:ed:d9:13:3e:3d:bb:41:a0:05:d4:24:2f:
20:f6:51:08:cc:ff:55:d8:b3:14:be:2f:e9:ca:d5:
ad:a5:ba:47:81:a4:0f:04:33:fb:ae:ca:c3:57:ac:
d0:6e:59:73:c7:42:34:e3:19:cb:21:72:cb:2c:3d:
7c:36:d8:d5:ed:e4:e8:3c:03:c6:c3:d6:59:96:1e:
22:72:14:31:d5:b4:d6:50:2f:8c:d8:7e:4b:69:5a:
2b:86:4f:14:a8:04:63:cc:aa:cf:e9:87:df:ea:3e:
5f:16:7a:d4:af:4e:e5:7b:58:8d:be:e4:ce:b6:71:
57:21:d7:3e:60:28:26:0e:69:bd:a9:1c:64:3c:65:
64:1f:00:ef:18:5a:5a:a2:39:e0:44:78:24:0d:fe:
ed:56:c1:15:6d:9b:aa:e0:10:4f:7b:a8:6e:16:72:
ca:14:6e:10:e7:0a:81:0e:f0:95:63:4f:cc:78:da:
87:c9
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
83:14:99:bc:8f:0b:53:9a:f9:a5:cd:66:78:97:47:a5:af:41:
02:61:64:d0:79:50:28:50:64:8e:64:85:df:a8:f3:7a:a3:b1:
fc:d0:b9:f7:90:da:21:ee:ab:25:74:9c:2d:20:b0:30:a5:9f:
35:6b:50:e1:7c:b7:d4:3a:de:15:50:64:39:14:91:b7:e1:cc:
c2:e9:59:00:46:4b:be:e6:0f:a6:31:36:55:53:11:db:20:bd:
b9:65:58:2a:e0:a7:d5:cf:13:bc:f9:9d:e1:29:65:bc:07:9f:
04:fb:16:b9:ae:da:68:c1:0f:49:4d:6d:ae:61:f5:11:14:ee:
2a:0a:93:a1:b2:f3:e1:af:3d:26:97:73:b5:d1:ae:64:4a:93:
a7:67:bf:54:6a:f8:35:35:62:ea:3c:bc:e1:ab:f4:1f:d5:ef:
7e:72:7e:dd:31:2a:a7:b9:4b:6a:1b:27:c1:ac:86:a6:37:7e:
56:8e:27:00:91:0b:c0:18:87:44:ad:7c:cb:da:ed:94:da:0c:
00:c5:6b:e1:3b:77:84:41:99:c7:d3:b2:92:b1:a3:3a:aa:ad:
6c:a7:af:33:74:22:fe:03:d1:7f:74:c4:5e:d6:92:7d:cf:1c:
dc:5d:dd:6b:3a:b6:92:3b:e9:23:98:df:da:4f:35:02:87:8e:
3a:38:f2:05
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:48 2025 GMT
Not After : Nov 28 10:25:48 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
1d:9c:20:60:93:f8:60:b3:c3:45:7e:f5:85:3f:ab:8a:74:89:
f3:46:33:bc:07:b4:2b:95:69:e2:d5:2c:25:3d:71:24:bd:90:
62:08:9c:63:fc:97:5e:0b:32:4d:7b:d6:02:44:2b:0f:e6:35:
aa:4e:03:60:13:28:ca:38:5c:a8:6c:f4:cd:2d:8a:d7:7e:b8:
cd:0d:97:b0:2e:f4:29:e4:39:b6:0c:ee:db:a1:cb:2e:77:1a:
e5:7f:93:24:18:81:75:1b:9f:fb:94:ea:40:09:48:1c:b8:93:
6e:be:22:71:a7:77:6b:be:2f:9b:14:e0:62:70:e3:f9:c7:72:
ab:fb:c5:46:d9:31:b7:aa:c4:e5:d2:18:51:bc:ba:3f:5b:12:
38:79:9a:d9:6a:ba:77:76:17:d1:1d:11:5f:f5:8b:31:62:8f:
39:fe:2e:5a:c1:21:fe:5c:ba:f4:42:7f:9e:76:de:13:96:6b:
38:bf:f0:f7:2c:db:5b:12:da:77:21:90:14:e0:b0:83:0e:e3:
5d:02:f1:44:b6:39:4d:f5:27:b5:e1:24:40:de:23:46:2b:43:
ed:11:1f:9e:f6:4a:30:d4:8f:e4:a0:d8:70:17:f4:05:73:22:
d5:03:04:ea:52:03:50:88:83:5e:25:ba:49:14:16:ef:20:37:
ad:37:5d:66
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
Truncated 3082 bytes from beginning
303030305A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F060667810505040404153013041100000000000000000000000000000000003081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D04030303690030660231009A20CE1E23B40157E250D0C9E52710D74677C78FBB92034076272703AF9992D1C5EA40DF365C080B92F5B8760A913D30023100D9EEBD74CB901F7EC3E7E47FD541EFB54234DF913C64CAEA56FE1F0A5C3B6A6DA4F2F114766240DF56A6054F0194E95A
2,894,115 >>> mbox cmd response: success
* TESTCASE PASSED
CSR:
Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:de:cd:b5:fe:db:e9:9a:8d:3c:fd:35:bd:04:
26:a9:66:46:0c:d3:c4:65:a0:c5:78:d0:23:9f:81:05:81:82:
60:5a:e6:ce:da:73:77:69:7a:73:09:25:9b:50:d2:e3:1d:02:
30:16:70:e8:6d:c5:00:2f:6b:7f:d3:c1:7b:b1:00:74:0f:e0:
75:70:43:6d:7a:d4:02:60:98:7a:82:9a:8a:fa:87:54:b9:10:
ba:a4:6d:c6:74:ed:d5:14:a2:2a:26:2a:8f
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:31 2025 GMT
Not After : Dec 27 10:25:31 2025 GMT
Subject: CN=Caliptra Test
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public-Key: (2048 bit)
Modulus:
00:c4:9d:f3:89:35:3a:06:77:79:5d:24:79:bd:0e:
16:e5:ea:62:19:fb:cb:80:69:aa:63:ab:46:50:55:
fe:a9:33:d1:ef:7a:67:43:fe:92:14:df:ca:f2:24:
98:2f:77:88:65:26:a2:8a:53:91:1a:61:ac:15:27:
70:b9:a2:ec:d5:84:99:0b:21:b0:36:99:a0:ed:44:
d8:70:25:b7:af:e3:ea:49:e2:6b:a5:71:d6:42:06:
71:eb:76:44:53:ac:38:a2:96:61:38:28:05:83:13:
bb:4a:93:e1:ca:3f:03:d3:dc:15:97:da:45:0c:00:
3e:a3:7f:c4:47:cb:e5:96:6d:98:cb:ef:7f:d4:33:
e6:a6:48:77:42:19:49:bd:e1:1b:50:34:c9:5b:44:
14:89:79:91:c4:f2:e1:43:6e:d6:ac:e1:28:ed:0e:
27:0e:41:f7:94:6e:32:cf:89:a2:f0:2f:1f:f0:32:
9a:2b:58:ef:f2:b5:16:4d:29:36:7d:62:0d:6b:66:
ce:ed:94:5b:ed:f1:6d:99:73:26:ea:6d:58:ba:1e:
b9:e6:2d:4b:66:84:39:58:ac:ab:ab:c1:ec:32:43:
67:76:67:63:d8:33:43:0d:04:46:bf:51:05:b9:19:
dd:55:1f:97:1b:bf:aa:62:2e:77:5c:ff:14:6d:e7:
34:59
Exponent: 65537 (0x10001)
Signature Algorithm: md5WithRSAEncryption
Signature Value:
aa:e0:5e:09:d3:eb:17:ff:07:4a:c3:da:c4:a2:7a:4e:07:21:
be:eb:ef:27:3b:69:46:7e:a7:87:36:f0:fb:f8:a1:f2:0a:e8:
9a:6b:26:5e:64:a7:9c:35:1a:9d:c9:99:b6:38:8e:7c:84:45:
31:75:7b:78:78:23:bb:96:87:31:1c:42:5a:cb:59:ff:c1:72:
93:2e:35:0d:56:6c:c5:67:6c:ad:7a:46:bb:78:49:be:da:15:
b8:b4:80:a0:89:c6:3b:35:b0:15:a5:7c:6d:80:48:44:5c:5d:
a2:00:12:e2:44:db:8a:be:84:80:d7:b3:4e:00:0a:08:fb:e0:
c7:63:c7:51:73:75:d6:0a:a1:aa:9e:e0:37:eb:42:8f:2c:9d:
54:16:a7:db:76:cf:76:12:eb:a0:8e:21:12:5b:a8:ec:be:01:
96:db:47:64:ee:ee:55:b7:cc:fa:a4:8a:0b:e9:e6:f3:0b:41:
38:27:f7:eb:51:ba:56:34:de:a4:30:60:35:4c:cf:af:b0:53:
74:b2:ef:31:95:1d:aa:83:23:8f:9f:a7:b2:0b:b0:1a:01:14:
aa:9c:3d:53:43:bc:d8:f6:0c:37:ab:f0:ed:f6:16:ed:16:d5:
71:cc:51:01:c8:d7:03:e2:51:43:8b:30:50:bd:5a:66:5b:40:
47:19:2d:d1
IDEVID Cert from CSR:
Certificate:
Data:
Version: 1 (0x0)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: CN=Caliptra Test
Validity
Not Before: Nov 27 10:25:31 2025 GMT
Not After : Nov 28 10:25:31 2025 GMT
Subject: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:91:ab:08:47:64:90:59:1e:78:8e:54:f9:d9:93:
79:a5:14:b6:4e:98:ce:11:87:3c:0c:e0:89:8f:af:
3c:a2:a2:4d:50:db:39:7b:4d:9b:86:83:ae:09:44:
fb:f2:b4:c9:4b:d5:a6:d0:6c:46:e6:c4:0c:cb:a3:
67:92:d3:0e:97:18:e5:bf:a3:09:f8:1a:93:4b:a2:
2a:60:d2:6c:11:4f:51:b7:52:df:39:65:12:ca:b5:
14:b7:b4:a5:98:36:07
ASN1 OID: secp384r1
NIST CURVE: P-384
Signature Algorithm: md5WithRSAEncryption
Signature Value:
8e:7a:ae:d4:43:66:e4:3c:b7:28:c2:48:09:25:f1:c2:f2:e0:
24:87:95:a7:08:7a:0e:a1:94:1b:07:01:d6:79:23:9e:71:81:
99:e0:de:fd:a6:4a:4d:dd:81:43:47:37:1d:30:04:a5:e0:a8:
c1:b9:e7:d3:36:32:fa:26:61:46:b5:95:f4:31:6e:68:28:fa:
49:63:49:12:9f:7d:18:36:ef:03:8b:88:bc:00:a3:d0:96:1f:
77:e8:7b:17:de:ab:b9:89:98:ce:00:27:87:c0:3d:93:6d:e1:
bf:7f:fb:0f:c6:76:15:dd:3a:b0:b5:38:3c:ce:28:0e:d2:f9:
2d:e1:0a:be:3e:b2:f3:15:8d:87:3a:96:27:a4:8b:75:33:23:
88:15:0a:e8:61:75:a1:f4:f8:90:19:20:2c:0e:fb:6f:37:70:
9c:3b:28:07:07:98:ca:61:0f:cb:a7:81:ad:35:9c:c6:ac:04:
5e:dd:84:82:3d:08:1c:f4:3c:99:a5:98:5f:be:b7:13:52:53:
ee:cc:05:e6:9a:32:b0:d6:de:e4:f0:6c:d7:df:a9:9b:4a:cf:
97:48:99:63:c4:e4:5c:86:9d:1b:b9:f2:4e:ea:a1:c6:28:02:
36:38:6c:ac:b4:e2:aa:42:7e:04:27:3b:3b:b0:9d:9b:3d:b4:
65:23:6d:3c
LDEVID Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
04:5f:3d:e7:13:c9:08:ca:40:f6:e8:e3:f7:52:30:05:e3:66:0f:12
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=27B88AACF4274BA4A65090F2C9143820DFC06044104BF0B6C91543D2B58B40F7
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:50:4d:38:ca:45:d9:97:90:1f:48:ba:33:3a:14:
9a:2f:b2:66:8b:97:3a:ac:64:d3:b7:9e:cc:09:a6:
63:f0:2e:d2:fa:ba:13:3f:5f:a4:99:67:7a:eb:76:
87:c9:9b:25:a5:cd:31:12:56:98:b3:32:2c:08:6e:
43:98:a5:91:94:6b:f2:0a:3e:ce:a8:eb:7d:7c:23:
41:0d:49:fa:87:7e:7e:cf:be:47:bd:88:3b:d5:3d:
7d:a8:65:ac:21:7f:1d
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
X509v3 Authority Key Identifier:
C1:8E:CB:86:0A:CA:F6:5D:26:14:B4:15:98:EF:30:DE:FB:E1:D4:78
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9e:51:fc:1f:af:9f:98:3a:37:ad:9a:33:fd:
b3:d9:6c:c4:11:26:ed:fb:2e:e0:bd:65:6c:06:a2:06:30:f7:
ab:6c:54:76:9d:2f:72:2b:4b:80:88:ee:01:d6:cd:57:10:02:
31:00:fc:43:4a:98:11:66:13:bd:7a:84:f7:34:13:09:80:c2:
d5:52:ac:2f:50:54:46:68:b5:ac:e6:d7:13:54:56:d4:8f:a3:
be:d2:38:7a:2a:26:f6:44:9c:41:b5:d8:6a:d0
FMCALIAS Cert:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4e:c7:49:42:c4:62:23:3b:db:7b:cd:6d:ef:b0:19:df:a8:7a:b8:41
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=805F3DE713C908CA40F6E8E3F7523005E3660F1289522B331242E90FF46057D9
Validity
Not Before: Jan 1 00:00:00 2027 GMT
Not After : Jan 1 00:00:00 2028 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=4AC74942C462233BDB7BCD6DEFB019DFA87AB8416F85B728E2F5D7435F2DBB8A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:2e:be:ac:96:f2:2b:cb:40:f3:b5:6c:87:bc:a5:
79:53:b3:47:a2:d9:ea:18:cc:6c:66:9f:58:4b:de:
ed:f2:fd:2f:57:6d:08:07:f5:3a:4e:6d:12:6e:60:
22:bf:28:a7:f0:9b:26:78:7e:d2:8a:ca:74:3d:9a:
f2:d6:d6:f4:18:0f:ee:b6:a4:69:a5:f3:db:da:e2:
76:47:73:3a:5d:03:4c:4d:cd:3f:dd:28:a2:7b:b2:
50:de:03:9c:45:8b:2e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0.......(.W....o'....
...<=YCg .....,F..s.f.!I.d-.........DEVICE_INFO.......0O.....?0=..`.H.e.....0r.....E..{Ze...E..#.........wQ.%...&"..a*.+..r.1..FMC_INFO
X509v3 Subject Key Identifier:
4A:C7:49:42:C4:62:23:3B:DB:7B:CD:6D:EF:B0:19:DF:A8:7A:B8:41
X509v3 Authority Key Identifier:
80:5F:3D:E7:13:C9:08:CA:40:F6:E8:E3:F7:52:30:05:E3:66:0F:12
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9a:20:ce:1e:23:b4:01:57:e2:50:d0:c9:e5:
27:10:d7:46:77:c7:8f:bb:92:03:40:76:27:27:03:af:99:92:
d1:c5:ea:40:df:36:5c:08:0b:92:f5:b8:76:0a:91:3d:30:02:
31:00:d9:ee:bd:74:cb:90:1f:7e:c3:e7:e4:7f:d5:41:ef:b5:
42:34:df:91:3c:64:ca:ea:56:fe:1f:0a:5c:3b:6a:6d:a4:f2:
f1:14:76:62:40:df:56:a6:05:4f:01:94:e9:5a
test test_image_validation::cert_test_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
2,222,717 UART:
2,223,707 UART: Running Caliptra ROM ...
2,224,816 UART:
2,224,987 UART: [state] CFI Enabled
2,225,858 UART: [state] LifecycleState = Unprovisioned
2,227,534 UART: [state] DebugLocked = No
2,228,658 UART: [state] WD Timer not started. Device not locked for debugging
2,231,141 UART: [kat] SHA2-256
2,231,816 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,235,215 UART: [kat] ++
2,235,689 UART: [kat] sha1
2,236,237 UART: [kat] SHA2-256
2,236,906 UART: [kat] SHA2-384
2,237,571 UART: [kat] SHA2-512-ACC
2,238,379 UART: [kat] ECC-384
2,947,793 UART: [kat] HMAC-384Kdf
2,971,058 UART: [kat] LMS
3,447,576 UART: [kat] --
3,452,163 UART: [cold-reset] ++
3,453,719 UART: [fht] FHT @ 0x50003400
3,464,431 UART: [idev] ++
3,465,006 UART: [idev] CDI.KEYID = 6
3,465,983 UART: [idev] SUBJECT.KEYID = 7
3,467,199 UART: [idev] UDS.KEYID = 0
3,500,303 UART: [idev] Erasing UDS.KEYID = 0
5,984,302 UART: [idev] Sha1 KeyId Algorithm
6,008,443 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,739,299 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,755,177 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,771,145 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
7,786,811 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,812,791 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
7,969,815 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,108,230 UART: [idev] --
8,108,880 UART: [ldev] ++
8,109,388 UART: [ldev] CDI.KEYID = 6
8,110,277 UART: [ldev] SUBJECT.KEYID = 5
8,111,302 UART: [ldev] AUTHORITY.KEYID = 7
8,112,496 UART: [ldev] FE.KEYID = 1
8,113,375 UART: [ldev] Erasing FE.KEYID = 1
10,528,274 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,262,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,277,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,293,792 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,309,301 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,330,285 UART: [ldev] --
12,335,568 UART: [fwproc] Wait for Commands...
12,338,706 UART: [fwproc] Recv command 0x46574c44
12,340,704 UART: [fwproc] Recv'd Img size: 109820 bytes
15,718,866 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,797,758 UART: [fwproc] Load FMC at address 0x40000000 len 11316
15,840,222 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,169,151 >>> mbox cmd response: success
16,169,563 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,172,895 UART: [afmc] ++
16,173,484 UART: [afmc] CDI.KEYID = 6
16,174,473 UART: [afmc] SUBJECT.KEYID = 7
16,175,640 UART: [afmc] AUTHORITY.KEYID = 5
18,709,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,451,217 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,453,406 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,469,195 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,485,184 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,500,806 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,525,322 UART: [afmc] --
20,528,430 UART: [cold-reset] --
20,531,426 UART: [state] Locking Datavault
20,535,977 UART: [state] Locking PCR0, PCR1 and PCR31
20,537,681 UART: [state] Locking ICCM
20,538,810 UART: [exit] Launching FMC @ 0x40000000
20,547,159 UART:
20,547,401 UART: Running Caliptra FMC ...
20,548,508 UART:
20,548,677 UART: [fmc] Received command: 0x10000001
20,550,137 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,569,815 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,662,614 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,683,293 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
* TESTCASE PASSED
20,804,356 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
7,745,905 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
15,827,728 >>> mbox cmd response: success
15,828,272 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,114,952 UART:
20,115,342 UART: Running Caliptra FMC ...
20,116,656 UART:
20,116,833 UART: [fmc] Received command: 0x10000001
20,118,385 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,137,652 UART: [fmc] LDEVID cert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
20,230,466 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,251,169 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,372,451 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,234,978 UART:
2,235,971 UART: Running Caliptra ROM ...
2,237,155 UART:
2,237,314 UART: [state] CFI Enabled
2,238,174 UART: [state] LifecycleState = Unprovisioned
2,239,846 UART: [state] DebugLocked = No
2,240,966 UART: [state] WD Timer not started. Device not locked for debugging
2,243,445 UART: [kat] SHA2-256
2,244,115 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,247,123 UART: [kat] ++
2,247,572 UART: [kat] sha1
2,248,079 UART: [kat] SHA2-256
2,248,821 UART: [kat] SHA2-384
2,249,487 UART: [kat] SHA2-512-ACC
2,250,319 UART: [kat] ECC-384
3,280,915 UART: [kat] HMAC-384Kdf
3,292,558 UART: [kat] LMS
3,769,056 UART: [kat] --
3,774,830 UART: [cold-reset] ++
3,776,271 UART: [fht] FHT @ 0x50003400
3,788,433 UART: [idev] ++
3,789,055 UART: [idev] CDI.KEYID = 6
3,790,200 UART: [idev] SUBJECT.KEYID = 7
3,791,314 UART: [idev] UDS.KEYID = 0
3,809,285 UART: [idev] Erasing UDS.KEYID = 0
6,272,308 UART: [idev] Sha1 KeyId Algorithm
6,297,402 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,015,665 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,031,574 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,047,502 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
8,063,122 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
8,089,159 UART: [idev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
8,246,560 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
8,384,722 UART: [idev] --
8,385,372 UART: [ldev] ++
8,385,872 UART: [ldev] CDI.KEYID = 6
8,386,802 UART: [ldev] SUBJECT.KEYID = 5
8,387,846 UART: [ldev] AUTHORITY.KEYID = 7
8,388,933 UART: [ldev] FE.KEYID = 1
8,389,908 UART: [ldev] Erasing FE.KEYID = 1
10,744,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,463,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,479,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,495,044 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
12,510,534 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
12,531,510 UART: [ldev] --
12,537,110 UART: [fwproc] Wait for Commands...
12,539,748 UART: [fwproc] Recv command 0x46574c44
12,541,734 UART: [fwproc] Recv'd Img size: 109820 bytes
15,912,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,223 UART: [fwproc] Load FMC at address 0x40000000 len 11316
16,022,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,351,082 >>> mbox cmd response: success
16,351,452 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
16,354,970 UART: [afmc] ++
16,355,542 UART: [afmc] CDI.KEYID = 6
16,356,504 UART: [afmc] SUBJECT.KEYID = 7
16,357,712 UART: [afmc] AUTHORITY.KEYID = 5
18,860,081 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,582,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,584,826 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
20,600,686 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,616,618 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
20,632,213 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
20,657,753 UART: [afmc] --
20,661,841 UART: [cold-reset] --
20,664,670 UART: [state] Locking Datavault
20,668,949 UART: [state] Locking PCR0, PCR1 and PCR31
20,670,696 UART: [state] Locking ICCM
20,672,085 UART: [exit] Launching FMC @ 0x40000000
20,680,435 UART:
20,680,708 UART: Running Caliptra FMC ...
20,681,816 UART:
20,681,978 UART: [fmc] Received command: 0x10000001
20,683,432 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,703,099 UART: [fmc] LDEVID cert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
20,795,907 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,816,570 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,937,648 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
8,021,306 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
16,045,822 >>> mbox cmd response: success
16,046,340 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
20,289,640 UART:
20,290,040 UART: Running Caliptra FMC ...
20,291,179 UART:
20,291,335 UART: [fmc] Received command: 0x10000001
20,292,888 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,312,293 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
20,405,154 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
20,425,865 UART: [fmc] FMCALIAS cert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
* TESTCASE PASSED
20,547,075 >>> mbox cmd response: success
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,307 UART: [kat] SHA2-512-ACC
906,208 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,185 UART: [kat] LMS
1,168,497 UART: [kat] --
1,169,490 UART: [cold-reset] ++
1,169,874 UART: [fht] FHT @ 0x50003400
1,172,480 UART: [idev] ++
1,172,648 UART: [idev] CDI.KEYID = 6
1,173,009 UART: [idev] SUBJECT.KEYID = 7
1,173,434 UART: [idev] UDS.KEYID = 0
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,495 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,191 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,899 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,784 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,500 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,965 UART: [idev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
1,299,467 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,636 UART: [idev] --
1,300,533 UART: [ldev] ++
1,300,701 UART: [ldev] CDI.KEYID = 6
1,301,065 UART: [ldev] SUBJECT.KEYID = 5
1,301,492 UART: [ldev] AUTHORITY.KEYID = 7
1,301,955 UART: [ldev] FE.KEYID = 1
1,307,197 UART: [ldev] Erasing FE.KEYID = 1
1,332,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,151 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,363,875 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,371,014 UART: [ldev] --
1,372,309 UART: [fwproc] Wait for Commands...
1,372,998 UART: [fwproc] Recv command 0x46574c44
1,373,731 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,123 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,206 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,804,405 >>> mbox cmd response: success
2,804,405 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,805,627 UART: [afmc] ++
2,805,795 UART: [afmc] CDI.KEYID = 6
2,806,158 UART: [afmc] SUBJECT.KEYID = 7
2,806,584 UART: [afmc] AUTHORITY.KEYID = 5
2,842,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,792 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,512 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,405 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,110 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,673 UART: [afmc] --
2,885,642 UART: [cold-reset] --
2,886,296 UART: [state] Locking Datavault
2,887,571 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,175 UART: [state] Locking ICCM
2,888,631 UART: [exit] Launching FMC @ 0x40000000
2,893,928 UART:
2,893,944 UART: Running Caliptra FMC ...
2,894,352 UART:
2,894,490 UART: [fmc] Received command: 0x10000001
2,895,583 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,443 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,005,420 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,011 UART: [fmc] FMCALIAS cert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
3,143,546 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,569 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,152 >>> mbox cmd response: success
2,586,152 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,647,793 UART:
2,647,809 UART: Running Caliptra FMC ...
2,648,217 UART:
2,648,355 UART: [fmc] Received command: 0x10000001
2,649,448 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,668,308 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,759,285 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,876 UART: [fmc] FMCALIAS cert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
2,897,411 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,600 UART: [kat] SHA2-512-ACC
906,501 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
920,984 UART: [kat] LMS
1,169,296 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,908 UART: [idev] Sha1 KeyId Algorithm
1,209,556 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,922 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,630 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,515 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,231 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,696 UART: [idev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
1,300,198 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,367 UART: [idev] --
1,301,480 UART: [ldev] ++
1,301,648 UART: [ldev] CDI.KEYID = 6
1,302,012 UART: [ldev] SUBJECT.KEYID = 5
1,302,439 UART: [ldev] AUTHORITY.KEYID = 7
1,302,902 UART: [ldev] FE.KEYID = 1
1,307,996 UART: [ldev] Erasing FE.KEYID = 1
1,334,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,518 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,242 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,381 UART: [ldev] --
1,373,634 UART: [fwproc] Wait for Commands...
1,374,371 UART: [fwproc] Recv command 0x46574c44
1,375,104 UART: [fwproc] Recv'd Img size: 109820 bytes
2,620,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,648,998 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,667,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,807,436 >>> mbox cmd response: success
2,807,436 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,808,518 UART: [afmc] ++
2,808,686 UART: [afmc] CDI.KEYID = 6
2,809,049 UART: [afmc] SUBJECT.KEYID = 7
2,809,475 UART: [afmc] AUTHORITY.KEYID = 5
2,845,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,862,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,863,167 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,868,887 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,874,780 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,880,485 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,888,234 UART: [afmc] --
2,889,137 UART: [cold-reset] --
2,889,841 UART: [state] Locking Datavault
2,890,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,891,518 UART: [state] Locking ICCM
2,892,056 UART: [exit] Launching FMC @ 0x40000000
2,897,353 UART:
2,897,369 UART: Running Caliptra FMC ...
2,897,777 UART:
2,897,915 UART: [fmc] Received command: 0x10000001
2,899,008 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,917,868 UART: [fmc] LDEVID cert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
3,008,845 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,028,436 UART: [fmc] FMCALIAS cert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
3,146,971 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,858 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,584,789 >>> mbox cmd response: success
2,584,789 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,647,748 UART:
2,647,764 UART: Running Caliptra FMC ...
2,648,172 UART:
2,648,310 UART: [fmc] Received command: 0x10000001
2,649,403 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,668,263 UART: [fmc] LDEVID cert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
2,759,240 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,831 UART: [fmc] FMCALIAS cert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
2,897,366 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,435 UART: [kat] SHA2-512-ACC
906,336 UART: [kat] ECC-384
915,619 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,656 UART: [idev] ++
1,172,824 UART: [idev] CDI.KEYID = 6
1,173,185 UART: [idev] SUBJECT.KEYID = 7
1,173,610 UART: [idev] UDS.KEYID = 0
1,181,941 UART: [idev] Erasing UDS.KEYID = 0
1,199,183 UART: [idev] Sha1 KeyId Algorithm
1,208,927 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,777 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,485 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,370 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,237,086 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,551 UART: [idev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
1,300,053 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,222 UART: [idev] --
1,301,211 UART: [ldev] ++
1,301,379 UART: [ldev] CDI.KEYID = 6
1,301,743 UART: [ldev] SUBJECT.KEYID = 5
1,302,170 UART: [ldev] AUTHORITY.KEYID = 7
1,302,633 UART: [ldev] FE.KEYID = 1
1,307,789 UART: [ldev] Erasing FE.KEYID = 1
1,334,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,107 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,364,831 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,106 UART: [ldev] --
1,373,531 UART: [fwproc] Wait for Commands...
1,374,298 UART: [fwproc] Recv command 0x46574c44
1,375,031 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,217 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,663,300 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,689 >>> mbox cmd response: success
2,803,689 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,721 UART: [afmc] ++
2,804,889 UART: [afmc] CDI.KEYID = 6
2,805,252 UART: [afmc] SUBJECT.KEYID = 7
2,805,678 UART: [afmc] AUTHORITY.KEYID = 5
2,841,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,695 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,444 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,864,164 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,870,057 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,875,762 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,883,381 UART: [afmc] --
2,884,352 UART: [cold-reset] --
2,885,210 UART: [state] Locking Datavault
2,886,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,887,063 UART: [state] Locking ICCM
2,887,559 UART: [exit] Launching FMC @ 0x40000000
2,892,856 UART:
2,892,872 UART: Running Caliptra FMC ...
2,893,280 UART:
2,893,418 UART: [fmc] Received command: 0x10000001
2,894,511 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,913,371 UART: [fmc] LDEVID cert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
3,004,348 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,023,939 UART: [fmc] FMCALIAS cert = 30820368308202EDA00302010202144EC74942C462233BDB7BCD6DEFB019DFA87AB841300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393022180F32303233303130313030303030305A180F39393939313233313233353935395A306C311F301D06035504030C1643616C697074726120312E3020464D4320416C6961733149304706035504051340344143373439343243343632323333424442374243443644454642303139444641383741423834313646383542373238453246354437343335463244424238413076301006072A8648CE3D020106052B81040022036200042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2EA382014D3082014930120603551D130101FF040830060101FF020103300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F103081C106066781050504050481B63081B3306083020100A63F303D060960864801650304020204300CE1EA1FFE94A8288A57E18F8DB86F27E3E2BC830AC21F9A3C3D59436720B89CC3A0C92C4689F5731266842149D2642D87050090000001890B4445564943455F494E464F8A0500D0000001304F83020100A63F303D0609608648016503040202043072DC13EDBAAD450C007B5A65CDECEF45E6E22392A48EFC06A7E510057751E2251BDF8F2622A3FE612A952BB58272B9318908464D435F494E464F301D0603551D0E041604144AC74942C462233BDB7BCD6DEFB019DFA87AB841301F0603551D23041830168014805F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403030369003066023100EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C49560231008AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
3,142,474 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,673 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,583,278 >>> mbox cmd response: success
2,583,278 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,645,917 UART:
2,645,933 UART: Running Caliptra FMC ...
2,646,341 UART:
2,646,479 UART: [fmc] Received command: 0x10000001
2,647,572 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,666,432 UART: [fmc] LDEVID cert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
2,757,409 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,000 UART: [fmc] FMCALIAS cert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
2,895,535 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,077 UART: [state] LifecycleState = Unprovisioned
85,732 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
890,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,093 UART: [kat] ++
895,245 UART: [kat] sha1
899,361 UART: [kat] SHA2-256
901,301 UART: [kat] SHA2-384
903,994 UART: [kat] SHA2-512-ACC
905,895 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,228 UART: [kat] LMS
1,168,540 UART: [kat] --
1,169,497 UART: [cold-reset] ++
1,169,877 UART: [fht] FHT @ 0x50003400
1,172,519 UART: [idev] ++
1,172,687 UART: [idev] CDI.KEYID = 6
1,173,048 UART: [idev] SUBJECT.KEYID = 7
1,173,473 UART: [idev] UDS.KEYID = 0
1,181,494 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,208,826 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,228 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,936 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,821 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,537 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,002 UART: [idev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
1,299,504 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,299,673 UART: [idev] --
1,300,580 UART: [ldev] ++
1,300,748 UART: [ldev] CDI.KEYID = 6
1,301,112 UART: [ldev] SUBJECT.KEYID = 5
1,301,539 UART: [ldev] AUTHORITY.KEYID = 7
1,302,002 UART: [ldev] FE.KEYID = 1
1,307,262 UART: [ldev] Erasing FE.KEYID = 1
1,333,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,190 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,363,914 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,370,947 UART: [ldev] --
1,372,196 UART: [fwproc] Wait for Commands...
1,372,997 UART: [fwproc] Recv command 0x46574c44
1,373,730 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,491 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,646,080 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,664,163 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,804,326 >>> mbox cmd response: success
2,804,326 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,805,404 UART: [afmc] ++
2,805,572 UART: [afmc] CDI.KEYID = 6
2,805,935 UART: [afmc] SUBJECT.KEYID = 7
2,806,361 UART: [afmc] AUTHORITY.KEYID = 5
2,842,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,859,062 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,859,811 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,865,531 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,871,424 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,877,129 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,884,920 UART: [afmc] --
2,885,975 UART: [cold-reset] --
2,886,887 UART: [state] Locking Datavault
2,888,088 UART: [state] Locking PCR0, PCR1 and PCR31
2,888,692 UART: [state] Locking ICCM
2,889,134 UART: [exit] Launching FMC @ 0x40000000
2,894,431 UART:
2,894,447 UART: Running Caliptra FMC ...
2,894,855 UART:
2,894,993 UART: [fmc] Received command: 0x10000001
2,896,086 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,914,946 UART: [fmc] LDEVID cert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
3,005,923 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,025,514 UART: [fmc] FMCALIAS cert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
3,144,049 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,356 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,453 >>> mbox cmd response: success
2,586,453 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,648,546 UART:
2,648,562 UART: Running Caliptra FMC ...
2,648,970 UART:
2,649,108 UART: [fmc] Received command: 0x10000001
2,650,201 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,669,061 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
2,760,038 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,629 UART: [fmc] FMCALIAS cert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
2,898,164 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,321 UART: [kat] SHA2-512-ACC
906,222 UART: [kat] ECC-384
915,535 UART: [kat] HMAC-384Kdf
920,269 UART: [kat] LMS
1,168,581 UART: [kat] --
1,169,684 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,197,991 UART: [idev] Sha1 KeyId Algorithm
1,207,547 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,263 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,223,971 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,229,856 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,235,572 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,244,037 UART: [idev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
1,298,539 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,298,708 UART: [idev] --
1,299,697 UART: [ldev] ++
1,299,865 UART: [ldev] CDI.KEYID = 6
1,300,229 UART: [ldev] SUBJECT.KEYID = 5
1,300,656 UART: [ldev] AUTHORITY.KEYID = 7
1,301,119 UART: [ldev] FE.KEYID = 1
1,306,349 UART: [ldev] Erasing FE.KEYID = 1
1,332,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,777 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,363,501 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,370,446 UART: [ldev] --
1,371,663 UART: [fwproc] Wait for Commands...
1,372,396 UART: [fwproc] Recv command 0x46574c44
1,373,129 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,421 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,663,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,793 >>> mbox cmd response: success
2,803,793 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,913 UART: [afmc] ++
2,805,081 UART: [afmc] CDI.KEYID = 6
2,805,444 UART: [afmc] SUBJECT.KEYID = 7
2,805,870 UART: [afmc] AUTHORITY.KEYID = 5
2,841,416 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,418 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,864,138 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,870,031 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,875,736 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,883,351 UART: [afmc] --
2,884,294 UART: [cold-reset] --
2,884,960 UART: [state] Locking Datavault
2,885,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,886,411 UART: [state] Locking ICCM
2,886,919 UART: [exit] Launching FMC @ 0x40000000
2,892,216 UART:
2,892,232 UART: Running Caliptra FMC ...
2,892,640 UART:
2,892,778 UART: [fmc] Received command: 0x10000001
2,893,871 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,912,731 UART: [fmc] LDEVID cert = 3082029D30820224A0030201020214045F3DE713C908CA40F6E8E3F7523005E3660F12300A06082A8648CE3D0403033069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373022180F32303233303130313030303030305A180F39393939313233313233353935395A3069311C301A06035504030C1343616C697074726120312E30204C44657649443149304706035504051340383035463344453731334339303843413430463645384533463735323330303545333636304631323839353232423333313234324539304646343630353744393076301006072A8648CE3D020106052B8104002203620004504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1DA3818830818530120603551D130101FF040830060101FF020104300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10301D0603551D0E04160414805F3DE713C908CA40F6E8E3F7523005E3660F12301F0603551D23041830168014C18ECB860ACAF65D2614B41598EF30DEFBE1D478300A06082A8648CE3D040303036700306402307F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C002305C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
3,003,708 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,023,299 UART: [fmc] FMCALIAS cert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
3,141,834 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,587 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,586,854 >>> mbox cmd response: success
2,586,854 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,649,059 UART:
2,649,075 UART: Running Caliptra FMC ...
2,649,483 UART:
2,649,621 UART: [fmc] Received command: 0x10000001
2,650,714 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,669,574 UART: [fmc] LDEVID cert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
2,760,551 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,142 UART: [fmc] FMCALIAS cert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
2,898,677 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,786 UART: [kat] LMS
1,169,098 UART: [kat] --
1,170,139 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,182,352 UART: [idev] Erasing UDS.KEYID = 0
1,199,314 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,576 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,284 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,169 UART: [idev] SIG.R = A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC
1,236,885 UART: [idev] SIG.S = 1DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,245,350 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F0606678105050404041530130411010102030405060708090A0B0C0D0E0F10300A06082A8648CE3D0403030368003065023100A7BD913720927BF09ABD98440ED0E6D5E15B27B08860DF397B0FC7925858EF31A262BFE23C3AE1D3E2DEB8FA3595BFFC02301DA675D7D9CE7B46D36207F2A70B95BC5B5A0DA4F4BBDC41A16D9BE39AAB79A0EA60AFCEC10FF45198DB50880759AC1D
1,299,852 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,300,021 UART: [idev] --
1,301,284 UART: [ldev] ++
1,301,452 UART: [ldev] CDI.KEYID = 6
1,301,816 UART: [ldev] SUBJECT.KEYID = 5
1,302,243 UART: [ldev] AUTHORITY.KEYID = 7
1,302,706 UART: [ldev] FE.KEYID = 1
1,307,726 UART: [ldev] Erasing FE.KEYID = 1
1,333,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,729 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,445 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,334 UART: [ldev] SIG.R = 7F5B29D9E0BABACEFCE8B5C4FC9A97B019BABCF2E4B5AF9481A993900E16687A81BAD7451DEFDFCF2748CBFC0DD6D6C0
1,365,058 UART: [ldev] SIG.S = 5C13AFBD1CD7C6C682FE37A4BF2788DB58D8AFB6E86A80D8E4A6D66516B06C39C8F28D2A81FCCF6EC66ED2B9E9350287
1,372,109 UART: [ldev] --
1,373,380 UART: [fwproc] Wait for Commands...
1,374,003 UART: [fwproc] Recv command 0x46574c44
1,374,736 UART: [fwproc] Recv'd Img size: 109820 bytes
2,618,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,645,118 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,663,201 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,803,596 >>> mbox cmd response: success
2,803,596 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,804,690 UART: [afmc] ++
2,804,858 UART: [afmc] CDI.KEYID = 6
2,805,221 UART: [afmc] SUBJECT.KEYID = 7
2,805,647 UART: [afmc] AUTHORITY.KEYID = 5
2,841,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,857,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,858,651 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,864,371 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,870,264 UART: [afmc] SIG.R = EF66A2345E2C49DA6C729D2F02E4E4D2CDE7BAF21B817BC859032BCD63F33673049142534545D351D66AAA674A5C4956
2,875,969 UART: [afmc] SIG.S = 8AE1F4CD1232E7062886FA9CAEB428413ACE7653300E4500506055CD72CAAADCFF11F3B985BEB1CDD8C223DE85B09819
2,883,680 UART: [afmc] --
2,884,551 UART: [cold-reset] --
2,885,449 UART: [state] Locking Datavault
2,886,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,887,396 UART: [state] Locking ICCM
2,888,046 UART: [exit] Launching FMC @ 0x40000000
2,893,343 UART:
2,893,359 UART: Running Caliptra FMC ...
2,893,767 UART:
2,893,905 UART: [fmc] Received command: 0x10000001
2,894,998 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,913,858 UART: [fmc] LDEVID cert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
3,004,835 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
3,024,426 UART: [fmc] FMCALIAS cert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
3,142,961 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,382 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,584,163 >>> mbox cmd response: success
2,584,163 <<< Executing mbox cmd 0x10000001 (0 bytes) from SoC
2,646,342 UART:
2,646,358 UART: Running Caliptra FMC ...
2,646,766 UART:
2,646,904 UART: [fmc] Received command: 0x10000001
2,647,997 UART: [fmc] LDEVID PUBLIC KEY DER = 04504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
2,666,857 UART: [fmc] LDEVID cert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
2,757,834 UART: [fmc] FMCALIAS PUBLIC KEY DER = 042EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,425 UART: [fmc] FMCALIAS cert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
2,895,960 >>> mbox cmd response: success
* TESTCASE PASSED
test test_image_validation::cert_test_with_ueid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
5,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,206 UART:
192,571 UART: Running Caliptra ROM ...
193,751 UART:
193,919 UART: [state] CFI Enabled
261,178 UART: [state] LifecycleState = Unprovisioned
263,131 UART: [state] DebugLocked = No
265,705 UART: [state] WD Timer not started. Device not locked for debugging
269,710 UART: [kat] SHA2-256
449,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,130 UART: [kat] ++
460,681 UART: [kat] sha1
472,510 UART: [kat] SHA2-256
475,183 UART: [kat] SHA2-384
479,818 UART: [kat] SHA2-512-ACC
482,164 UART: [kat] ECC-384
2,926,849 UART: [kat] HMAC-384Kdf
2,948,759 UART: [kat] LMS
3,425,236 UART: [kat] --
3,429,570 UART: [cold-reset] ++
3,432,049 UART: [fht] FHT @ 0x50003400
3,444,655 UART: [idev] ++
3,445,247 UART: [idev] CDI.KEYID = 6
3,446,136 UART: [idev] SUBJECT.KEYID = 7
3,447,408 UART: [idev] UDS.KEYID = 0
3,479,573 UART: [idev] Erasing UDS.KEYID = 0
5,963,527 UART: [idev] Sha1 KeyId Algorithm
5,988,410 UART: [idev] --
5,993,518 UART: [ldev] ++
5,994,098 UART: [ldev] CDI.KEYID = 6
5,995,051 UART: [ldev] SUBJECT.KEYID = 5
5,996,269 UART: [ldev] AUTHORITY.KEYID = 7
5,997,506 UART: [ldev] FE.KEYID = 1
6,036,009 UART: [ldev] Erasing FE.KEYID = 1
8,546,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,715 UART: [ldev] --
10,351,386 UART: [fwproc] Wait for Commands...
10,353,214 UART: [fwproc] Recv command 0x46574c44
10,355,204 UART: [fwproc] Recv'd Img size: 118548 bytes
12,683,640 UART: ROM Fatal Error: 0x000B0014
12,686,873 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
5,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,582,201 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
6,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,342 UART:
192,709 UART: Running Caliptra ROM ...
193,813 UART:
603,593 UART: [state] CFI Enabled
620,404 UART: [state] LifecycleState = Unprovisioned
622,381 UART: [state] DebugLocked = No
624,584 UART: [state] WD Timer not started. Device not locked for debugging
629,281 UART: [kat] SHA2-256
808,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,732 UART: [kat] ++
820,205 UART: [kat] sha1
830,544 UART: [kat] SHA2-256
833,217 UART: [kat] SHA2-384
840,276 UART: [kat] SHA2-512-ACC
842,619 UART: [kat] ECC-384
3,282,468 UART: [kat] HMAC-384Kdf
3,295,247 UART: [kat] LMS
3,771,763 UART: [kat] --
3,776,395 UART: [cold-reset] ++
3,778,625 UART: [fht] FHT @ 0x50003400
3,788,853 UART: [idev] ++
3,789,413 UART: [idev] CDI.KEYID = 6
3,790,374 UART: [idev] SUBJECT.KEYID = 7
3,791,639 UART: [idev] UDS.KEYID = 0
3,809,499 UART: [idev] Erasing UDS.KEYID = 0
6,265,760 UART: [idev] Sha1 KeyId Algorithm
6,287,738 UART: [idev] --
6,292,813 UART: [ldev] ++
6,293,391 UART: [ldev] CDI.KEYID = 6
6,294,354 UART: [ldev] SUBJECT.KEYID = 5
6,295,513 UART: [ldev] AUTHORITY.KEYID = 7
6,296,801 UART: [ldev] FE.KEYID = 1
6,309,463 UART: [ldev] Erasing FE.KEYID = 1
8,787,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,671 UART: [ldev] --
10,582,795 UART: [fwproc] Wait for Commands...
10,585,269 UART: [fwproc] Recv command 0x46574c44
10,587,249 UART: [fwproc] Recv'd Img size: 118548 bytes
12,920,597 UART: ROM Fatal Error: 0x000B0014
12,923,821 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
6,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,790,577 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,992 UART: [kat] SHA2-256
901,932 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,003 UART: [kat] HMAC-384Kdf
920,519 UART: [kat] LMS
1,168,831 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,847 UART: [idev] --
1,208,956 UART: [ldev] ++
1,209,124 UART: [ldev] CDI.KEYID = 6
1,209,488 UART: [ldev] SUBJECT.KEYID = 5
1,209,915 UART: [ldev] AUTHORITY.KEYID = 7
1,210,378 UART: [ldev] FE.KEYID = 1
1,215,450 UART: [ldev] Erasing FE.KEYID = 1
1,241,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,104 UART: [ldev] --
1,281,363 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,082 UART: ROM Fatal Error: 0x000B0014
1,562,239 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,778 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
891,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,615 UART: [kat] ++
895,767 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
920,914 UART: [kat] LMS
1,169,226 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,159 UART: [idev] ++
1,173,327 UART: [idev] CDI.KEYID = 6
1,173,688 UART: [idev] SUBJECT.KEYID = 7
1,174,113 UART: [idev] UDS.KEYID = 0
1,182,348 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,181 UART: [ldev] --
1,282,608 UART: [fwproc] Wait for Commands...
1,283,425 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,969 UART: ROM Fatal Error: 0x000B0014
1,565,126 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,039 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,947 UART: [kat] HMAC-384Kdf
920,599 UART: [kat] LMS
1,168,911 UART: [kat] --
1,169,854 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,928 UART: [idev] ++
1,173,096 UART: [idev] CDI.KEYID = 6
1,173,457 UART: [idev] SUBJECT.KEYID = 7
1,173,882 UART: [idev] UDS.KEYID = 0
1,181,971 UART: [idev] Erasing UDS.KEYID = 0
1,199,273 UART: [idev] Sha1 KeyId Algorithm
1,208,151 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,241,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,018 UART: [ldev] --
1,281,467 UART: [fwproc] Wait for Commands...
1,282,078 UART: [fwproc] Recv command 0x46574c44
1,282,811 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,834 UART: ROM Fatal Error: 0x000B0014
1,562,991 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,415,572 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,525 UART: [state] LifecycleState = Unprovisioned
86,180 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,263 UART: [kat] SHA2-256
891,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,917 UART: [kat] ++
896,069 UART: [kat] sha1
900,267 UART: [kat] SHA2-256
902,207 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,860 UART: [kat] HMAC-384Kdf
921,330 UART: [kat] LMS
1,169,642 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,277 UART: [idev] ++
1,173,445 UART: [idev] CDI.KEYID = 6
1,173,806 UART: [idev] SUBJECT.KEYID = 7
1,174,231 UART: [idev] UDS.KEYID = 0
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,198,810 UART: [idev] Sha1 KeyId Algorithm
1,207,692 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,355 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,285 UART: [ldev] --
1,280,642 UART: [fwproc] Wait for Commands...
1,281,251 UART: [fwproc] Recv command 0x46574c44
1,281,984 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,089 UART: ROM Fatal Error: 0x000B0014
1,562,246 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,855 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,170,146 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,181,375 UART: [idev] Erasing UDS.KEYID = 0
1,198,101 UART: [idev] Sha1 KeyId Algorithm
1,207,073 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,930 UART: [ldev] Erasing FE.KEYID = 1
1,241,027 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,070 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,280,870 UART: [fwproc] Recv command 0x46574c44
1,281,603 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,454 UART: ROM Fatal Error: 0x000B0014
1,561,611 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,648 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,197 UART: [state] LifecycleState = Unprovisioned
85,852 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,255 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,181,778 UART: [idev] Erasing UDS.KEYID = 0
1,198,718 UART: [idev] Sha1 KeyId Algorithm
1,207,672 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,241,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,397 UART: [ldev] --
1,280,760 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,371 UART: ROM Fatal Error: 0x000B0014
1,561,528 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,627 >>> mbox cmd response: failed
test test_image_validation::test_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,316 UART:
192,693 UART: Running Caliptra ROM ...
193,915 UART:
194,077 UART: [state] CFI Enabled
262,448 UART: [state] LifecycleState = Unprovisioned
264,399 UART: [state] DebugLocked = No
266,868 UART: [state] WD Timer not started. Device not locked for debugging
270,820 UART: [kat] SHA2-256
450,468 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,251 UART: [kat] ++
461,804 UART: [kat] sha1
472,167 UART: [kat] SHA2-256
474,858 UART: [kat] SHA2-384
480,580 UART: [kat] SHA2-512-ACC
482,977 UART: [kat] ECC-384
2,947,673 UART: [kat] HMAC-384Kdf
2,970,064 UART: [kat] LMS
3,446,574 UART: [kat] --
3,450,682 UART: [cold-reset] ++
3,452,026 UART: [fht] FHT @ 0x50003400
3,463,767 UART: [idev] ++
3,464,335 UART: [idev] CDI.KEYID = 6
3,465,356 UART: [idev] SUBJECT.KEYID = 7
3,466,574 UART: [idev] UDS.KEYID = 0
3,499,625 UART: [idev] Erasing UDS.KEYID = 0
5,985,610 UART: [idev] Sha1 KeyId Algorithm
6,010,148 UART: [idev] --
6,015,946 UART: [ldev] ++
6,016,524 UART: [ldev] CDI.KEYID = 6
6,017,444 UART: [ldev] SUBJECT.KEYID = 5
6,018,667 UART: [ldev] AUTHORITY.KEYID = 7
6,019,924 UART: [ldev] FE.KEYID = 1
6,056,076 UART: [ldev] Erasing FE.KEYID = 1
8,563,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,984 UART: [ldev] --
10,371,771 UART: [fwproc] Wait for Commands...
10,374,085 UART: [fwproc] Recv command 0x46574c44
10,376,076 UART: [fwproc] Recv'd Img size: 118548 bytes
12,693,112 UART: ROM Fatal Error: 0x000B0024
12,696,342 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,600,105 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
3,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,567 UART:
192,936 UART: Running Caliptra ROM ...
194,153 UART:
603,599 UART: [state] CFI Enabled
616,567 UART: [state] LifecycleState = Unprovisioned
618,508 UART: [state] DebugLocked = No
619,881 UART: [state] WD Timer not started. Device not locked for debugging
623,372 UART: [kat] SHA2-256
803,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,834 UART: [kat] ++
814,280 UART: [kat] sha1
824,555 UART: [kat] SHA2-256
827,282 UART: [kat] SHA2-384
833,901 UART: [kat] SHA2-512-ACC
836,258 UART: [kat] ECC-384
3,279,331 UART: [kat] HMAC-384Kdf
3,291,241 UART: [kat] LMS
3,767,749 UART: [kat] --
3,773,571 UART: [cold-reset] ++
3,775,941 UART: [fht] FHT @ 0x50003400
3,788,700 UART: [idev] ++
3,789,260 UART: [idev] CDI.KEYID = 6
3,790,193 UART: [idev] SUBJECT.KEYID = 7
3,791,458 UART: [idev] UDS.KEYID = 0
3,807,139 UART: [idev] Erasing UDS.KEYID = 0
6,267,324 UART: [idev] Sha1 KeyId Algorithm
6,290,334 UART: [idev] --
6,294,162 UART: [ldev] ++
6,294,732 UART: [ldev] CDI.KEYID = 6
6,295,639 UART: [ldev] SUBJECT.KEYID = 5
6,296,866 UART: [ldev] AUTHORITY.KEYID = 7
6,298,101 UART: [ldev] FE.KEYID = 1
6,310,589 UART: [ldev] Erasing FE.KEYID = 1
8,788,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,301 UART: [ldev] --
10,582,159 UART: [fwproc] Wait for Commands...
10,585,389 UART: [fwproc] Recv command 0x46574c44
10,587,433 UART: [fwproc] Recv'd Img size: 118548 bytes
12,911,784 UART: ROM Fatal Error: 0x000B0024
12,915,011 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
3,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,814,013 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,644 UART: [state] LifecycleState = Unprovisioned
86,299 UART: [state] DebugLocked = No
87,021 UART: [state] WD Timer not started. Device not locked for debugging
88,160 UART: [kat] SHA2-256
891,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,814 UART: [kat] ++
895,966 UART: [kat] sha1
900,170 UART: [kat] SHA2-256
902,110 UART: [kat] SHA2-384
904,913 UART: [kat] SHA2-512-ACC
906,814 UART: [kat] ECC-384
916,055 UART: [kat] HMAC-384Kdf
920,645 UART: [kat] LMS
1,168,957 UART: [kat] --
1,169,764 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,896 UART: [idev] ++
1,173,064 UART: [idev] CDI.KEYID = 6
1,173,425 UART: [idev] SUBJECT.KEYID = 7
1,173,850 UART: [idev] UDS.KEYID = 0
1,181,793 UART: [idev] Erasing UDS.KEYID = 0
1,198,129 UART: [idev] Sha1 KeyId Algorithm
1,206,901 UART: [idev] --
1,207,968 UART: [ldev] ++
1,208,136 UART: [ldev] CDI.KEYID = 6
1,208,500 UART: [ldev] SUBJECT.KEYID = 5
1,208,927 UART: [ldev] AUTHORITY.KEYID = 7
1,209,390 UART: [ldev] FE.KEYID = 1
1,214,566 UART: [ldev] Erasing FE.KEYID = 1
1,240,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,638 UART: [ldev] --
1,279,895 UART: [fwproc] Wait for Commands...
1,280,560 UART: [fwproc] Recv command 0x46574c44
1,281,293 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,144 UART: ROM Fatal Error: 0x000B0024
1,561,301 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,700 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
891,627 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,731 UART: [kat] ++
895,883 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
904,984 UART: [kat] SHA2-512-ACC
906,885 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,392 UART: [kat] LMS
1,169,704 UART: [kat] --
1,170,653 UART: [cold-reset] ++
1,171,027 UART: [fht] FHT @ 0x50003400
1,173,817 UART: [idev] ++
1,173,985 UART: [idev] CDI.KEYID = 6
1,174,346 UART: [idev] SUBJECT.KEYID = 7
1,174,771 UART: [idev] UDS.KEYID = 0
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,776 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,143 UART: [ldev] Erasing FE.KEYID = 1
1,242,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,643 UART: [ldev] --
1,281,998 UART: [fwproc] Wait for Commands...
1,282,707 UART: [fwproc] Recv command 0x46574c44
1,283,440 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,055 UART: ROM Fatal Error: 0x000B0024
1,563,212 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,917 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,631 UART: [kat] SHA2-512-ACC
906,532 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,941 UART: [kat] LMS
1,169,253 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,716 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,199,541 UART: [idev] Sha1 KeyId Algorithm
1,208,297 UART: [idev] --
1,209,250 UART: [ldev] ++
1,209,418 UART: [ldev] CDI.KEYID = 6
1,209,782 UART: [ldev] SUBJECT.KEYID = 5
1,210,209 UART: [ldev] AUTHORITY.KEYID = 7
1,210,672 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,550 UART: [ldev] --
1,280,999 UART: [fwproc] Wait for Commands...
1,281,772 UART: [fwproc] Recv command 0x46574c44
1,282,505 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,692 UART: ROM Fatal Error: 0x000B0024
1,562,849 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,688 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,648 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,662 UART: [kat] HMAC-384Kdf
921,346 UART: [kat] LMS
1,169,658 UART: [kat] --
1,170,639 UART: [cold-reset] ++
1,171,113 UART: [fht] FHT @ 0x50003400
1,173,753 UART: [idev] ++
1,173,921 UART: [idev] CDI.KEYID = 6
1,174,282 UART: [idev] SUBJECT.KEYID = 7
1,174,707 UART: [idev] UDS.KEYID = 0
1,182,696 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,304 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,216,073 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,534 UART: [fwproc] Wait for Commands...
1,282,155 UART: [fwproc] Recv command 0x46574c44
1,282,888 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,520 UART: ROM Fatal Error: 0x000B0024
1,562,677 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,471 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,412 UART: [kat] SHA2-256
890,962 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,066 UART: [kat] ++
895,218 UART: [kat] sha1
899,342 UART: [kat] SHA2-256
901,282 UART: [kat] SHA2-384
903,901 UART: [kat] SHA2-512-ACC
905,802 UART: [kat] ECC-384
915,627 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,526 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,588 UART: [idev] ++
1,172,756 UART: [idev] CDI.KEYID = 6
1,173,117 UART: [idev] SUBJECT.KEYID = 7
1,173,542 UART: [idev] UDS.KEYID = 0
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,308 UART: [ldev] ++
1,208,476 UART: [ldev] CDI.KEYID = 6
1,208,840 UART: [ldev] SUBJECT.KEYID = 5
1,209,267 UART: [ldev] AUTHORITY.KEYID = 7
1,209,730 UART: [ldev] FE.KEYID = 1
1,214,542 UART: [ldev] Erasing FE.KEYID = 1
1,240,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,868 UART: [ldev] --
1,279,249 UART: [fwproc] Wait for Commands...
1,279,860 UART: [fwproc] Recv command 0x46574c44
1,280,593 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,784 UART: ROM Fatal Error: 0x000B0024
1,560,941 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,322 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
916,048 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,170,035 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,172,957 UART: [idev] ++
1,173,125 UART: [idev] CDI.KEYID = 6
1,173,486 UART: [idev] SUBJECT.KEYID = 7
1,173,911 UART: [idev] UDS.KEYID = 0
1,181,672 UART: [idev] Erasing UDS.KEYID = 0
1,198,644 UART: [idev] Sha1 KeyId Algorithm
1,207,686 UART: [idev] --
1,208,857 UART: [ldev] ++
1,209,025 UART: [ldev] CDI.KEYID = 6
1,209,389 UART: [ldev] SUBJECT.KEYID = 5
1,209,816 UART: [ldev] AUTHORITY.KEYID = 7
1,210,279 UART: [ldev] FE.KEYID = 1
1,215,791 UART: [ldev] Erasing FE.KEYID = 1
1,241,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,785 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,615 UART: [fwproc] Recv command 0x46574c44
1,282,348 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,031 UART: ROM Fatal Error: 0x000B0024
1,563,188 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,027 >>> mbox cmd response: failed
test test_image_validation::test_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,086 UART:
192,466 UART: Running Caliptra ROM ...
193,693 UART:
193,859 UART: [state] CFI Enabled
264,756 UART: [state] LifecycleState = Unprovisioned
266,696 UART: [state] DebugLocked = No
269,172 UART: [state] WD Timer not started. Device not locked for debugging
273,704 UART: [kat] SHA2-256
453,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,180 UART: [kat] ++
464,632 UART: [kat] sha1
476,271 UART: [kat] SHA2-256
478,957 UART: [kat] SHA2-384
485,374 UART: [kat] SHA2-512-ACC
487,717 UART: [kat] ECC-384
2,950,350 UART: [kat] HMAC-384Kdf
2,970,590 UART: [kat] LMS
3,447,089 UART: [kat] --
3,451,762 UART: [cold-reset] ++
3,453,163 UART: [fht] FHT @ 0x50003400
3,463,828 UART: [idev] ++
3,464,396 UART: [idev] CDI.KEYID = 6
3,465,366 UART: [idev] SUBJECT.KEYID = 7
3,466,588 UART: [idev] UDS.KEYID = 0
3,501,594 UART: [idev] Erasing UDS.KEYID = 0
5,986,341 UART: [idev] Sha1 KeyId Algorithm
6,010,170 UART: [idev] --
6,014,006 UART: [ldev] ++
6,014,593 UART: [ldev] CDI.KEYID = 6
6,015,663 UART: [ldev] SUBJECT.KEYID = 5
6,016,774 UART: [ldev] AUTHORITY.KEYID = 7
6,017,958 UART: [ldev] FE.KEYID = 1
6,056,868 UART: [ldev] Erasing FE.KEYID = 1
8,560,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,111 UART: [ldev] --
10,374,275 UART: [fwproc] Wait for Commands...
10,376,438 UART: [fwproc] Recv command 0x46574c44
10,378,432 UART: [fwproc] Recv'd Img size: 118548 bytes
12,700,247 UART: ROM Fatal Error: 0x000B0023
12,703,472 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
3,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,594,226 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,432 UART:
192,833 UART: Running Caliptra ROM ...
194,060 UART:
603,505 UART: [state] CFI Enabled
617,666 UART: [state] LifecycleState = Unprovisioned
619,610 UART: [state] DebugLocked = No
620,874 UART: [state] WD Timer not started. Device not locked for debugging
625,516 UART: [kat] SHA2-256
805,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,984 UART: [kat] ++
816,427 UART: [kat] sha1
826,624 UART: [kat] SHA2-256
829,356 UART: [kat] SHA2-384
833,493 UART: [kat] SHA2-512-ACC
835,824 UART: [kat] ECC-384
3,280,705 UART: [kat] HMAC-384Kdf
3,294,717 UART: [kat] LMS
3,771,216 UART: [kat] --
3,776,183 UART: [cold-reset] ++
3,778,440 UART: [fht] FHT @ 0x50003400
3,790,878 UART: [idev] ++
3,791,439 UART: [idev] CDI.KEYID = 6
3,792,378 UART: [idev] SUBJECT.KEYID = 7
3,793,641 UART: [idev] UDS.KEYID = 0
3,809,610 UART: [idev] Erasing UDS.KEYID = 0
6,268,722 UART: [idev] Sha1 KeyId Algorithm
6,292,214 UART: [idev] --
6,296,797 UART: [ldev] ++
6,297,362 UART: [ldev] CDI.KEYID = 6
6,298,375 UART: [ldev] SUBJECT.KEYID = 5
6,299,474 UART: [ldev] AUTHORITY.KEYID = 7
6,300,761 UART: [ldev] FE.KEYID = 1
6,313,408 UART: [ldev] Erasing FE.KEYID = 1
8,790,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,056 UART: [ldev] --
10,585,811 UART: [fwproc] Wait for Commands...
10,587,418 UART: [fwproc] Recv command 0x46574c44
10,589,400 UART: [fwproc] Recv'd Img size: 118548 bytes
12,910,848 UART: ROM Fatal Error: 0x000B0023
12,914,067 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,804,477 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
915,967 UART: [kat] HMAC-384Kdf
920,531 UART: [kat] LMS
1,168,843 UART: [kat] --
1,169,728 UART: [cold-reset] ++
1,170,058 UART: [fht] FHT @ 0x50003400
1,172,556 UART: [idev] ++
1,172,724 UART: [idev] CDI.KEYID = 6
1,173,085 UART: [idev] SUBJECT.KEYID = 7
1,173,510 UART: [idev] UDS.KEYID = 0
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,197,863 UART: [idev] Sha1 KeyId Algorithm
1,206,703 UART: [idev] --
1,207,658 UART: [ldev] ++
1,207,826 UART: [ldev] CDI.KEYID = 6
1,208,190 UART: [ldev] SUBJECT.KEYID = 5
1,208,617 UART: [ldev] AUTHORITY.KEYID = 7
1,209,080 UART: [ldev] FE.KEYID = 1
1,214,008 UART: [ldev] Erasing FE.KEYID = 1
1,240,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,022 UART: [ldev] --
1,279,307 UART: [fwproc] Wait for Commands...
1,279,882 UART: [fwproc] Recv command 0x46574c44
1,280,615 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,811 UART: ROM Fatal Error: 0x000B0023
1,560,968 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,143 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,283 UART: [kat] SHA2-256
902,223 UART: [kat] SHA2-384
905,128 UART: [kat] SHA2-512-ACC
907,029 UART: [kat] ECC-384
916,776 UART: [kat] HMAC-384Kdf
921,520 UART: [kat] LMS
1,169,832 UART: [kat] --
1,170,747 UART: [cold-reset] ++
1,171,293 UART: [fht] FHT @ 0x50003400
1,173,925 UART: [idev] ++
1,174,093 UART: [idev] CDI.KEYID = 6
1,174,454 UART: [idev] SUBJECT.KEYID = 7
1,174,879 UART: [idev] UDS.KEYID = 0
1,182,946 UART: [idev] Erasing UDS.KEYID = 0
1,200,306 UART: [idev] Sha1 KeyId Algorithm
1,209,074 UART: [idev] --
1,210,163 UART: [ldev] ++
1,210,331 UART: [ldev] CDI.KEYID = 6
1,210,695 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,513 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,523 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,400 UART: ROM Fatal Error: 0x000B0023
1,563,557 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,864 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
915,567 UART: [kat] HMAC-384Kdf
920,159 UART: [kat] LMS
1,168,471 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,844 UART: [fht] FHT @ 0x50003400
1,172,560 UART: [idev] ++
1,172,728 UART: [idev] CDI.KEYID = 6
1,173,089 UART: [idev] SUBJECT.KEYID = 7
1,173,514 UART: [idev] UDS.KEYID = 0
1,181,321 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,029 UART: [idev] --
1,208,020 UART: [ldev] ++
1,208,188 UART: [ldev] CDI.KEYID = 6
1,208,552 UART: [ldev] SUBJECT.KEYID = 5
1,208,979 UART: [ldev] AUTHORITY.KEYID = 7
1,209,442 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,240,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,610 UART: [ldev] --
1,279,993 UART: [fwproc] Wait for Commands...
1,280,712 UART: [fwproc] Recv command 0x46574c44
1,281,445 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,995 UART: ROM Fatal Error: 0x000B0023
1,561,152 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,204 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,800 UART: [kat] SHA2-512-ACC
906,701 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,170,057 UART: [cold-reset] ++
1,170,477 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,890 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,855 UART: [ldev] ++
1,210,023 UART: [ldev] CDI.KEYID = 6
1,210,387 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,381 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,545 UART: [fwproc] Recv command 0x46574c44
1,283,278 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,916 UART: ROM Fatal Error: 0x000B0023
1,564,073 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,684 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,532 UART: [state] LifecycleState = Unprovisioned
85,187 UART: [state] DebugLocked = No
85,825 UART: [state] WD Timer not started. Device not locked for debugging
86,934 UART: [kat] SHA2-256
890,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,588 UART: [kat] ++
894,740 UART: [kat] sha1
898,822 UART: [kat] SHA2-256
900,762 UART: [kat] SHA2-384
903,479 UART: [kat] SHA2-512-ACC
905,380 UART: [kat] ECC-384
914,929 UART: [kat] HMAC-384Kdf
919,301 UART: [kat] LMS
1,167,613 UART: [kat] --
1,168,458 UART: [cold-reset] ++
1,169,012 UART: [fht] FHT @ 0x50003400
1,171,628 UART: [idev] ++
1,171,796 UART: [idev] CDI.KEYID = 6
1,172,157 UART: [idev] SUBJECT.KEYID = 7
1,172,582 UART: [idev] UDS.KEYID = 0
1,180,547 UART: [idev] Erasing UDS.KEYID = 0
1,197,311 UART: [idev] Sha1 KeyId Algorithm
1,206,041 UART: [idev] --
1,206,954 UART: [ldev] ++
1,207,122 UART: [ldev] CDI.KEYID = 6
1,207,486 UART: [ldev] SUBJECT.KEYID = 5
1,207,913 UART: [ldev] AUTHORITY.KEYID = 7
1,208,376 UART: [ldev] FE.KEYID = 1
1,213,752 UART: [ldev] Erasing FE.KEYID = 1
1,240,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,092 UART: [ldev] --
1,279,323 UART: [fwproc] Wait for Commands...
1,280,056 UART: [fwproc] Recv command 0x46574c44
1,280,789 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,519 UART: ROM Fatal Error: 0x000B0023
1,560,676 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,551 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,492 UART: [kat] HMAC-384Kdf
921,198 UART: [kat] LMS
1,169,510 UART: [kat] --
1,170,647 UART: [cold-reset] ++
1,170,995 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,182,730 UART: [idev] Erasing UDS.KEYID = 0
1,200,030 UART: [idev] Sha1 KeyId Algorithm
1,209,004 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,673 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,977 UART: [ldev] --
1,282,362 UART: [fwproc] Wait for Commands...
1,283,053 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,740 UART: ROM Fatal Error: 0x000B0023
1,564,897 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,776 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
2,027,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,861 UART:
2,178,274 UART: Running Caliptra ROM ...
2,179,408 UART:
2,179,585 UART: [state] CFI Enabled
2,180,580 UART: [state] LifecycleState = Unprovisioned
2,182,241 UART: [state] DebugLocked = No
2,183,356 UART: [state] WD Timer not started. Device not locked for debugging
2,185,836 UART: [kat] SHA2-256
2,186,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,546 UART: [kat] ++
2,190,007 UART: [kat] sha1
2,190,537 UART: [kat] SHA2-256
2,191,201 UART: [kat] SHA2-384
2,191,866 UART: [kat] SHA2-512-ACC
2,192,699 UART: [kat] ECC-384
2,948,203 UART: [kat] HMAC-384Kdf
2,970,767 UART: [kat] LMS
3,447,281 UART: [kat] --
3,451,621 UART: [cold-reset] ++
3,452,964 UART: [fht] FHT @ 0x50003400
3,465,025 UART: [idev] ++
3,465,595 UART: [idev] CDI.KEYID = 6
3,466,513 UART: [idev] SUBJECT.KEYID = 7
3,467,793 UART: [idev] UDS.KEYID = 0
3,501,815 UART: [idev] Erasing UDS.KEYID = 0
5,987,904 UART: [idev] Sha1 KeyId Algorithm
6,010,262 UART: [idev] --
6,016,150 UART: [ldev] ++
6,016,722 UART: [ldev] CDI.KEYID = 6
6,017,643 UART: [ldev] SUBJECT.KEYID = 5
6,018,866 UART: [ldev] AUTHORITY.KEYID = 7
6,020,102 UART: [ldev] FE.KEYID = 1
6,057,122 UART: [ldev] Erasing FE.KEYID = 1
8,564,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,187 UART: [ldev] --
10,373,098 UART: [fwproc] Wait for Commands...
10,374,662 UART: [fwproc] Recv command 0x46574c44
10,376,691 UART: [fwproc] Recv'd Img size: 118548 bytes
12,702,505 UART: ROM Fatal Error: 0x000B0023
12,705,736 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,028,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,591,719 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
2,025,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,175,585 UART:
2,175,976 UART: Running Caliptra ROM ...
2,177,150 UART:
2,177,318 UART: [state] CFI Enabled
2,178,273 UART: [state] LifecycleState = Unprovisioned
2,179,932 UART: [state] DebugLocked = No
2,181,046 UART: [state] WD Timer not started. Device not locked for debugging
2,183,643 UART: [kat] SHA2-256
2,184,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,187,394 UART: [kat] ++
2,187,840 UART: [kat] sha1
2,188,349 UART: [kat] SHA2-256
2,189,028 UART: [kat] SHA2-384
2,189,687 UART: [kat] SHA2-512-ACC
2,190,485 UART: [kat] ECC-384
3,277,283 UART: [kat] HMAC-384Kdf
3,289,519 UART: [kat] LMS
3,766,057 UART: [kat] --
3,767,815 UART: [cold-reset] ++
3,768,836 UART: [fht] FHT @ 0x50003400
3,780,139 UART: [idev] ++
3,780,698 UART: [idev] CDI.KEYID = 6
3,781,630 UART: [idev] SUBJECT.KEYID = 7
3,782,892 UART: [idev] UDS.KEYID = 0
3,798,782 UART: [idev] Erasing UDS.KEYID = 0
6,260,380 UART: [idev] Sha1 KeyId Algorithm
6,283,832 UART: [idev] --
6,288,398 UART: [ldev] ++
6,288,995 UART: [ldev] CDI.KEYID = 6
6,289,904 UART: [ldev] SUBJECT.KEYID = 5
6,291,064 UART: [ldev] AUTHORITY.KEYID = 7
6,292,355 UART: [ldev] FE.KEYID = 1
6,305,266 UART: [ldev] Erasing FE.KEYID = 1
8,783,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,272 UART: [ldev] --
10,578,024 UART: [fwproc] Wait for Commands...
10,580,068 UART: [fwproc] Recv command 0x46574c44
10,582,116 UART: [fwproc] Recv'd Img size: 118548 bytes
12,902,678 UART: ROM Fatal Error: 0x000B0023
12,905,886 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
2,030,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,800,270 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,722 UART: [kat] SHA2-256
901,662 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,687 UART: [kat] LMS
1,168,999 UART: [kat] --
1,169,758 UART: [cold-reset] ++
1,170,148 UART: [fht] FHT @ 0x50003400
1,172,760 UART: [idev] ++
1,172,928 UART: [idev] CDI.KEYID = 6
1,173,289 UART: [idev] SUBJECT.KEYID = 7
1,173,714 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,989 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,888 UART: [ldev] Erasing FE.KEYID = 1
1,242,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,262 UART: [ldev] --
1,281,571 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,045 UART: ROM Fatal Error: 0x000B0023
1,563,202 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,875 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,588 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,723 UART: [idev] ++
1,173,891 UART: [idev] CDI.KEYID = 6
1,174,252 UART: [idev] SUBJECT.KEYID = 7
1,174,677 UART: [idev] UDS.KEYID = 0
1,183,050 UART: [idev] Erasing UDS.KEYID = 0
1,200,740 UART: [idev] Sha1 KeyId Algorithm
1,209,632 UART: [idev] --
1,210,677 UART: [ldev] ++
1,210,845 UART: [ldev] CDI.KEYID = 6
1,211,209 UART: [ldev] SUBJECT.KEYID = 5
1,211,636 UART: [ldev] AUTHORITY.KEYID = 7
1,212,099 UART: [ldev] FE.KEYID = 1
1,217,573 UART: [ldev] Erasing FE.KEYID = 1
1,243,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,569 UART: [ldev] --
1,282,834 UART: [fwproc] Wait for Commands...
1,283,597 UART: [fwproc] Recv command 0x46574c44
1,284,330 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,258 UART: ROM Fatal Error: 0x000B0023
1,563,415 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,982 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
915,627 UART: [kat] HMAC-384Kdf
920,231 UART: [kat] LMS
1,168,543 UART: [kat] --
1,169,344 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,476 UART: [idev] ++
1,172,644 UART: [idev] CDI.KEYID = 6
1,173,005 UART: [idev] SUBJECT.KEYID = 7
1,173,430 UART: [idev] UDS.KEYID = 0
1,181,471 UART: [idev] Erasing UDS.KEYID = 0
1,198,095 UART: [idev] Sha1 KeyId Algorithm
1,207,075 UART: [idev] --
1,207,996 UART: [ldev] ++
1,208,164 UART: [ldev] CDI.KEYID = 6
1,208,528 UART: [ldev] SUBJECT.KEYID = 5
1,208,955 UART: [ldev] AUTHORITY.KEYID = 7
1,209,418 UART: [ldev] FE.KEYID = 1
1,214,554 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,146 UART: [ldev] --
1,280,461 UART: [fwproc] Wait for Commands...
1,281,262 UART: [fwproc] Recv command 0x46574c44
1,281,995 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,867 UART: ROM Fatal Error: 0x000B0023
1,562,024 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,561 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,552 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,136 UART: [kat] LMS
1,169,448 UART: [kat] --
1,170,325 UART: [cold-reset] ++
1,170,845 UART: [fht] FHT @ 0x50003400
1,173,625 UART: [idev] ++
1,173,793 UART: [idev] CDI.KEYID = 6
1,174,154 UART: [idev] SUBJECT.KEYID = 7
1,174,579 UART: [idev] UDS.KEYID = 0
1,182,140 UART: [idev] Erasing UDS.KEYID = 0
1,198,906 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,945 UART: [ldev] ++
1,209,113 UART: [ldev] CDI.KEYID = 6
1,209,477 UART: [ldev] SUBJECT.KEYID = 5
1,209,904 UART: [ldev] AUTHORITY.KEYID = 7
1,210,367 UART: [ldev] FE.KEYID = 1
1,215,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,125 UART: [ldev] --
1,281,540 UART: [fwproc] Wait for Commands...
1,282,205 UART: [fwproc] Recv command 0x46574c44
1,282,938 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,176 UART: ROM Fatal Error: 0x000B0023
1,563,333 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,034 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,729 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,422 UART: [cold-reset] ++
1,170,772 UART: [fht] FHT @ 0x50003400
1,173,528 UART: [idev] ++
1,173,696 UART: [idev] CDI.KEYID = 6
1,174,057 UART: [idev] SUBJECT.KEYID = 7
1,174,482 UART: [idev] UDS.KEYID = 0
1,182,363 UART: [idev] Erasing UDS.KEYID = 0
1,199,533 UART: [idev] Sha1 KeyId Algorithm
1,208,459 UART: [idev] --
1,209,532 UART: [ldev] ++
1,209,700 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,491 UART: [ldev] AUTHORITY.KEYID = 7
1,210,954 UART: [ldev] FE.KEYID = 1
1,216,232 UART: [ldev] Erasing FE.KEYID = 1
1,242,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,016 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,827 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,535 UART: ROM Fatal Error: 0x000B0023
1,563,692 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,755 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,709 UART: [kat] SHA2-256
901,649 UART: [kat] SHA2-384
904,314 UART: [kat] SHA2-512-ACC
906,215 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,474 UART: [kat] LMS
1,168,786 UART: [kat] --
1,169,763 UART: [cold-reset] ++
1,170,309 UART: [fht] FHT @ 0x50003400
1,172,823 UART: [idev] ++
1,172,991 UART: [idev] CDI.KEYID = 6
1,173,352 UART: [idev] SUBJECT.KEYID = 7
1,173,777 UART: [idev] UDS.KEYID = 0
1,181,508 UART: [idev] Erasing UDS.KEYID = 0
1,198,884 UART: [idev] Sha1 KeyId Algorithm
1,207,690 UART: [idev] --
1,208,849 UART: [ldev] ++
1,209,017 UART: [ldev] CDI.KEYID = 6
1,209,381 UART: [ldev] SUBJECT.KEYID = 5
1,209,808 UART: [ldev] AUTHORITY.KEYID = 7
1,210,271 UART: [ldev] FE.KEYID = 1
1,215,271 UART: [ldev] Erasing FE.KEYID = 1
1,241,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,321 UART: [ldev] --
1,280,542 UART: [fwproc] Wait for Commands...
1,281,155 UART: [fwproc] Recv command 0x46574c44
1,281,888 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,600 UART: ROM Fatal Error: 0x000B0023
1,561,757 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,128 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,030,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,106 UART:
2,180,500 UART: Running Caliptra ROM ...
2,181,595 UART:
2,181,756 UART: [state] CFI Enabled
2,182,729 UART: [state] LifecycleState = Unprovisioned
2,184,393 UART: [state] DebugLocked = No
2,185,509 UART: [state] WD Timer not started. Device not locked for debugging
2,187,984 UART: [kat] SHA2-256
2,188,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,673 UART: [kat] ++
2,192,178 UART: [kat] sha1
2,192,704 UART: [kat] SHA2-256
2,193,369 UART: [kat] SHA2-384
2,194,035 UART: [kat] SHA2-512-ACC
2,194,899 UART: [kat] ECC-384
2,946,739 UART: [kat] HMAC-384Kdf
2,971,453 UART: [kat] LMS
3,447,953 UART: [kat] --
3,452,675 UART: [cold-reset] ++
3,454,836 UART: [fht] FHT @ 0x50003400
3,465,817 UART: [idev] ++
3,466,386 UART: [idev] CDI.KEYID = 6
3,467,328 UART: [idev] SUBJECT.KEYID = 7
3,468,612 UART: [idev] UDS.KEYID = 0
3,501,541 UART: [idev] Erasing UDS.KEYID = 0
5,986,808 UART: [idev] Sha1 KeyId Algorithm
6,011,224 UART: [idev] --
6,016,257 UART: [ldev] ++
6,016,840 UART: [ldev] CDI.KEYID = 6
6,017,760 UART: [ldev] SUBJECT.KEYID = 5
6,018,980 UART: [ldev] AUTHORITY.KEYID = 7
6,020,221 UART: [ldev] FE.KEYID = 1
6,057,682 UART: [ldev] Erasing FE.KEYID = 1
8,565,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,802 UART: [ldev] --
10,373,783 UART: [fwproc] Wait for Commands...
10,376,535 UART: [fwproc] Recv command 0x46574c44
10,378,532 UART: [fwproc] Recv'd Img size: 118548 bytes
12,701,116 UART: ROM Fatal Error: 0x000B0021
12,704,366 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
2,028,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,575,030 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
2,039,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,189,640 UART:
2,190,057 UART: Running Caliptra ROM ...
2,191,228 UART:
2,191,400 UART: [state] CFI Enabled
2,192,361 UART: [state] LifecycleState = Unprovisioned
2,194,031 UART: [state] DebugLocked = No
2,195,141 UART: [state] WD Timer not started. Device not locked for debugging
2,197,618 UART: [kat] SHA2-256
2,198,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,201,304 UART: [kat] ++
2,201,751 UART: [kat] sha1
2,202,290 UART: [kat] SHA2-256
2,202,947 UART: [kat] SHA2-384
2,203,600 UART: [kat] SHA2-512-ACC
2,204,395 UART: [kat] ECC-384
3,283,576 UART: [kat] HMAC-384Kdf
3,295,927 UART: [kat] LMS
3,772,422 UART: [kat] --
3,779,439 UART: [cold-reset] ++
3,780,773 UART: [fht] FHT @ 0x50003400
3,792,614 UART: [idev] ++
3,793,229 UART: [idev] CDI.KEYID = 6
3,794,240 UART: [idev] SUBJECT.KEYID = 7
3,795,395 UART: [idev] UDS.KEYID = 0
3,810,392 UART: [idev] Erasing UDS.KEYID = 0
6,272,047 UART: [idev] Sha1 KeyId Algorithm
6,296,308 UART: [idev] --
6,301,918 UART: [ldev] ++
6,302,542 UART: [ldev] CDI.KEYID = 6
6,303,449 UART: [ldev] SUBJECT.KEYID = 5
6,304,656 UART: [ldev] AUTHORITY.KEYID = 7
6,305,903 UART: [ldev] FE.KEYID = 1
6,316,415 UART: [ldev] Erasing FE.KEYID = 1
8,794,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,920 UART: [ldev] --
10,589,699 UART: [fwproc] Wait for Commands...
10,592,927 UART: [fwproc] Recv command 0x46574c44
10,594,915 UART: [fwproc] Recv'd Img size: 118548 bytes
12,916,218 UART: ROM Fatal Error: 0x000B0021
12,919,456 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
2,037,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,799,634 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
904,191 UART: [kat] SHA2-512-ACC
906,092 UART: [kat] ECC-384
915,629 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,182 UART: [fht] FHT @ 0x50003400
1,172,818 UART: [idev] ++
1,172,986 UART: [idev] CDI.KEYID = 6
1,173,347 UART: [idev] SUBJECT.KEYID = 7
1,173,772 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,197,817 UART: [idev] Sha1 KeyId Algorithm
1,206,761 UART: [idev] --
1,207,838 UART: [ldev] ++
1,208,006 UART: [ldev] CDI.KEYID = 6
1,208,370 UART: [ldev] SUBJECT.KEYID = 5
1,208,797 UART: [ldev] AUTHORITY.KEYID = 7
1,209,260 UART: [ldev] FE.KEYID = 1
1,214,332 UART: [ldev] Erasing FE.KEYID = 1
1,240,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,370 UART: [ldev] --
1,279,667 UART: [fwproc] Wait for Commands...
1,280,408 UART: [fwproc] Recv command 0x46574c44
1,281,141 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,472 UART: ROM Fatal Error: 0x000B0021
1,560,629 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,573 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,830 UART: [kat] SHA2-512-ACC
906,731 UART: [kat] ECC-384
916,356 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,435 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,118 UART: [idev] Sha1 KeyId Algorithm
1,207,998 UART: [idev] --
1,209,119 UART: [ldev] ++
1,209,287 UART: [ldev] CDI.KEYID = 6
1,209,651 UART: [ldev] SUBJECT.KEYID = 5
1,210,078 UART: [ldev] AUTHORITY.KEYID = 7
1,210,541 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,297 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,165 UART: [fwproc] Recv command 0x46574c44
1,282,898 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,357 UART: ROM Fatal Error: 0x000B0021
1,563,514 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,515 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,580 UART: [kat] SHA2-256
901,520 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,873 UART: [kat] LMS
1,169,185 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,010 UART: [idev] ++
1,173,178 UART: [idev] CDI.KEYID = 6
1,173,539 UART: [idev] SUBJECT.KEYID = 7
1,173,964 UART: [idev] UDS.KEYID = 0
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,895 UART: [idev] --
1,209,002 UART: [ldev] ++
1,209,170 UART: [ldev] CDI.KEYID = 6
1,209,534 UART: [ldev] SUBJECT.KEYID = 5
1,209,961 UART: [ldev] AUTHORITY.KEYID = 7
1,210,424 UART: [ldev] FE.KEYID = 1
1,215,354 UART: [ldev] Erasing FE.KEYID = 1
1,242,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,866 UART: [ldev] --
1,281,123 UART: [fwproc] Wait for Commands...
1,281,858 UART: [fwproc] Recv command 0x46574c44
1,282,591 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,434 UART: ROM Fatal Error: 0x000B0021
1,562,591 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,236 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
891,675 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,779 UART: [kat] ++
895,931 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,200 UART: [kat] LMS
1,169,512 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,171,075 UART: [fht] FHT @ 0x50003400
1,173,751 UART: [idev] ++
1,173,919 UART: [idev] CDI.KEYID = 6
1,174,280 UART: [idev] SUBJECT.KEYID = 7
1,174,705 UART: [idev] UDS.KEYID = 0
1,182,926 UART: [idev] Erasing UDS.KEYID = 0
1,199,604 UART: [idev] Sha1 KeyId Algorithm
1,208,412 UART: [idev] --
1,209,227 UART: [ldev] ++
1,209,395 UART: [ldev] CDI.KEYID = 6
1,209,759 UART: [ldev] SUBJECT.KEYID = 5
1,210,186 UART: [ldev] AUTHORITY.KEYID = 7
1,210,649 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,193 UART: [ldev] --
1,281,644 UART: [fwproc] Wait for Commands...
1,282,399 UART: [fwproc] Recv command 0x46574c44
1,283,132 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,159 UART: ROM Fatal Error: 0x000B0021
1,563,316 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,157 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
899,928 UART: [kat] SHA2-256
901,868 UART: [kat] SHA2-384
904,647 UART: [kat] SHA2-512-ACC
906,548 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,170,008 UART: [fht] FHT @ 0x50003400
1,172,682 UART: [idev] ++
1,172,850 UART: [idev] CDI.KEYID = 6
1,173,211 UART: [idev] SUBJECT.KEYID = 7
1,173,636 UART: [idev] UDS.KEYID = 0
1,181,879 UART: [idev] Erasing UDS.KEYID = 0
1,199,189 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,450 UART: [ldev] ++
1,209,618 UART: [ldev] CDI.KEYID = 6
1,209,982 UART: [ldev] SUBJECT.KEYID = 5
1,210,409 UART: [ldev] AUTHORITY.KEYID = 7
1,210,872 UART: [ldev] FE.KEYID = 1
1,216,210 UART: [ldev] Erasing FE.KEYID = 1
1,242,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,534 UART: [ldev] --
1,281,969 UART: [fwproc] Wait for Commands...
1,282,780 UART: [fwproc] Recv command 0x46574c44
1,283,513 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,550 UART: ROM Fatal Error: 0x000B0021
1,563,707 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,854 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
899,831 UART: [kat] SHA2-256
901,771 UART: [kat] SHA2-384
904,524 UART: [kat] SHA2-512-ACC
906,425 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,399 UART: [idev] ++
1,173,567 UART: [idev] CDI.KEYID = 6
1,173,928 UART: [idev] SUBJECT.KEYID = 7
1,174,353 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,478 UART: [idev] --
1,209,541 UART: [ldev] ++
1,209,709 UART: [ldev] CDI.KEYID = 6
1,210,073 UART: [ldev] SUBJECT.KEYID = 5
1,210,500 UART: [ldev] AUTHORITY.KEYID = 7
1,210,963 UART: [ldev] FE.KEYID = 1
1,215,985 UART: [ldev] Erasing FE.KEYID = 1
1,243,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,394 UART: [fwproc] Wait for Commands...
1,282,975 UART: [fwproc] Recv command 0x46574c44
1,283,708 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,849 UART: ROM Fatal Error: 0x000B0021
1,564,006 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,057 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
2,038,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,822 UART:
2,189,219 UART: Running Caliptra ROM ...
2,190,392 UART:
2,190,574 UART: [state] CFI Enabled
2,191,561 UART: [state] LifecycleState = Unprovisioned
2,193,229 UART: [state] DebugLocked = No
2,194,344 UART: [state] WD Timer not started. Device not locked for debugging
2,196,826 UART: [kat] SHA2-256
2,197,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,509 UART: [kat] ++
2,200,968 UART: [kat] sha1
2,201,488 UART: [kat] SHA2-256
2,202,151 UART: [kat] SHA2-384
2,202,813 UART: [kat] SHA2-512-ACC
2,203,652 UART: [kat] ECC-384
2,950,010 UART: [kat] HMAC-384Kdf
2,973,945 UART: [kat] LMS
3,450,425 UART: [kat] --
3,455,603 UART: [cold-reset] ++
3,457,862 UART: [fht] FHT @ 0x50003400
3,468,479 UART: [idev] ++
3,469,049 UART: [idev] CDI.KEYID = 6
3,470,071 UART: [idev] SUBJECT.KEYID = 7
3,471,238 UART: [idev] UDS.KEYID = 0
3,502,989 UART: [idev] Erasing UDS.KEYID = 0
5,990,987 UART: [idev] Sha1 KeyId Algorithm
6,015,968 UART: [idev] --
6,020,947 UART: [ldev] ++
6,021,527 UART: [ldev] CDI.KEYID = 6
6,022,553 UART: [ldev] SUBJECT.KEYID = 5
6,023,665 UART: [ldev] AUTHORITY.KEYID = 7
6,024,906 UART: [ldev] FE.KEYID = 1
6,060,282 UART: [ldev] Erasing FE.KEYID = 1
8,564,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,204 UART: [ldev] --
10,374,092 UART: [fwproc] Wait for Commands...
10,377,010 UART: [fwproc] Recv command 0x46574c44
10,379,007 UART: [fwproc] Recv'd Img size: 118548 bytes
12,705,077 UART: ROM Fatal Error: 0x000B0021
12,708,322 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
2,038,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,590,981 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
2,027,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,382 UART:
2,177,778 UART: Running Caliptra ROM ...
2,178,946 UART:
2,179,133 UART: [state] CFI Enabled
2,180,094 UART: [state] LifecycleState = Unprovisioned
2,181,753 UART: [state] DebugLocked = No
2,182,781 UART: [state] WD Timer not started. Device not locked for debugging
2,185,252 UART: [kat] SHA2-256
2,185,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,941 UART: [kat] ++
2,189,388 UART: [kat] sha1
2,189,958 UART: [kat] SHA2-256
2,190,617 UART: [kat] SHA2-384
2,191,275 UART: [kat] SHA2-512-ACC
2,192,157 UART: [kat] ECC-384
3,279,856 UART: [kat] HMAC-384Kdf
3,291,171 UART: [kat] LMS
3,767,692 UART: [kat] --
3,771,684 UART: [cold-reset] ++
3,773,937 UART: [fht] FHT @ 0x50003400
3,784,961 UART: [idev] ++
3,785,532 UART: [idev] CDI.KEYID = 6
3,786,548 UART: [idev] SUBJECT.KEYID = 7
3,787,703 UART: [idev] UDS.KEYID = 0
3,803,453 UART: [idev] Erasing UDS.KEYID = 0
6,262,986 UART: [idev] Sha1 KeyId Algorithm
6,285,528 UART: [idev] --
6,291,412 UART: [ldev] ++
6,291,992 UART: [ldev] CDI.KEYID = 6
6,292,898 UART: [ldev] SUBJECT.KEYID = 5
6,294,115 UART: [ldev] AUTHORITY.KEYID = 7
6,295,343 UART: [ldev] FE.KEYID = 1
6,304,694 UART: [ldev] Erasing FE.KEYID = 1
8,780,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,383 UART: [ldev] --
10,572,431 UART: [fwproc] Wait for Commands...
10,575,719 UART: [fwproc] Recv command 0x46574c44
10,577,773 UART: [fwproc] Recv'd Img size: 118548 bytes
12,897,639 UART: ROM Fatal Error: 0x000B0021
12,900,860 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,033,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,796,280 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
891,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,670 UART: [kat] ++
895,822 UART: [kat] sha1
900,036 UART: [kat] SHA2-256
901,976 UART: [kat] SHA2-384
904,827 UART: [kat] SHA2-512-ACC
906,728 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,755 UART: [kat] LMS
1,169,067 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,272 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,181,831 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,427 UART: [idev] --
1,208,540 UART: [ldev] ++
1,208,708 UART: [ldev] CDI.KEYID = 6
1,209,072 UART: [ldev] SUBJECT.KEYID = 5
1,209,499 UART: [ldev] AUTHORITY.KEYID = 7
1,209,962 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,241,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,062 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,981 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,196 UART: ROM Fatal Error: 0x000B0021
1,563,353 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,415,676 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,965 UART: [kat] SHA2-256
901,905 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,444 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,371 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,771 UART: [idev] ++
1,173,939 UART: [idev] CDI.KEYID = 6
1,174,300 UART: [idev] SUBJECT.KEYID = 7
1,174,725 UART: [idev] UDS.KEYID = 0
1,182,444 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,034 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,215,771 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,654 UART: [fwproc] Wait for Commands...
1,282,387 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,955 UART: ROM Fatal Error: 0x000B0021
1,564,112 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,987 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,225 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,000 UART: [kat] ++
895,152 UART: [kat] sha1
899,400 UART: [kat] SHA2-256
901,340 UART: [kat] SHA2-384
904,155 UART: [kat] SHA2-512-ACC
906,056 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,660 UART: [fht] FHT @ 0x50003400
1,173,498 UART: [idev] ++
1,173,666 UART: [idev] CDI.KEYID = 6
1,174,027 UART: [idev] SUBJECT.KEYID = 7
1,174,452 UART: [idev] UDS.KEYID = 0
1,182,387 UART: [idev] Erasing UDS.KEYID = 0
1,199,423 UART: [idev] Sha1 KeyId Algorithm
1,208,189 UART: [idev] --
1,209,122 UART: [ldev] ++
1,209,290 UART: [ldev] CDI.KEYID = 6
1,209,654 UART: [ldev] SUBJECT.KEYID = 5
1,210,081 UART: [ldev] AUTHORITY.KEYID = 7
1,210,544 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,698 UART: [ldev] --
1,280,935 UART: [fwproc] Wait for Commands...
1,281,518 UART: [fwproc] Recv command 0x46574c44
1,282,251 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,130 UART: ROM Fatal Error: 0x000B0021
1,562,287 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,140 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
891,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,461 UART: [kat] ++
895,613 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,088 UART: [kat] LMS
1,169,400 UART: [kat] --
1,170,271 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,327 UART: [idev] ++
1,173,495 UART: [idev] CDI.KEYID = 6
1,173,856 UART: [idev] SUBJECT.KEYID = 7
1,174,281 UART: [idev] UDS.KEYID = 0
1,182,274 UART: [idev] Erasing UDS.KEYID = 0
1,199,898 UART: [idev] Sha1 KeyId Algorithm
1,208,612 UART: [idev] --
1,209,611 UART: [ldev] ++
1,209,779 UART: [ldev] CDI.KEYID = 6
1,210,143 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,087 UART: [ldev] --
1,282,364 UART: [fwproc] Wait for Commands...
1,283,107 UART: [fwproc] Recv command 0x46574c44
1,283,840 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,237 UART: ROM Fatal Error: 0x000B0021
1,564,394 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,889 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,572 UART: [kat] SHA2-256
901,512 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,333 UART: [kat] HMAC-384Kdf
920,095 UART: [kat] LMS
1,168,407 UART: [kat] --
1,169,526 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,429 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,140 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,848 UART: [ldev] --
1,280,275 UART: [fwproc] Wait for Commands...
1,280,984 UART: [fwproc] Recv command 0x46574c44
1,281,717 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,662 UART: ROM Fatal Error: 0x000B0021
1,562,819 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,596 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,469 UART: [cold-reset] ++
1,170,977 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,182,394 UART: [idev] Erasing UDS.KEYID = 0
1,199,620 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,223 UART: [ldev] Erasing FE.KEYID = 1
1,241,790 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,531 UART: [ldev] --
1,280,916 UART: [fwproc] Wait for Commands...
1,281,649 UART: [fwproc] Recv command 0x46574c44
1,282,382 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,425 UART: ROM Fatal Error: 0x000B0021
1,562,582 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,629 >>> mbox cmd response: failed
test test_image_validation::test_fmc_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,029,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,179,753 UART:
2,180,138 UART: Running Caliptra ROM ...
2,181,313 UART:
2,181,496 UART: [state] CFI Enabled
2,182,459 UART: [state] LifecycleState = Unprovisioned
2,184,127 UART: [state] DebugLocked = No
2,185,242 UART: [state] WD Timer not started. Device not locked for debugging
2,187,720 UART: [kat] SHA2-256
2,188,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,434 UART: [kat] ++
2,191,897 UART: [kat] sha1
2,192,418 UART: [kat] SHA2-256
2,193,167 UART: [kat] SHA2-384
2,193,841 UART: [kat] SHA2-512-ACC
2,194,727 UART: [kat] ECC-384
2,949,548 UART: [kat] HMAC-384Kdf
2,972,156 UART: [kat] LMS
3,448,658 UART: [kat] --
3,451,794 UART: [cold-reset] ++
3,453,837 UART: [fht] FHT @ 0x50003400
3,465,138 UART: [idev] ++
3,465,767 UART: [idev] CDI.KEYID = 6
3,466,684 UART: [idev] SUBJECT.KEYID = 7
3,467,956 UART: [idev] UDS.KEYID = 0
3,501,919 UART: [idev] Erasing UDS.KEYID = 0
5,986,847 UART: [idev] Sha1 KeyId Algorithm
6,010,286 UART: [idev] --
6,015,989 UART: [ldev] ++
6,016,570 UART: [ldev] CDI.KEYID = 6
6,017,486 UART: [ldev] SUBJECT.KEYID = 5
6,018,704 UART: [ldev] AUTHORITY.KEYID = 7
6,019,941 UART: [ldev] FE.KEYID = 1
6,058,245 UART: [ldev] Erasing FE.KEYID = 1
8,565,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,298 UART: [ldev] --
10,375,133 UART: [fwproc] Wait for Commands...
10,378,424 UART: [fwproc] Recv command 0x46574c44
10,380,437 UART: [fwproc] Recv'd Img size: 118548 bytes
12,701,984 UART: ROM Fatal Error: 0x000B0022
12,705,218 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
2,030,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,557,507 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
2,027,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,129 UART:
2,177,521 UART: Running Caliptra ROM ...
2,178,686 UART:
2,178,868 UART: [state] CFI Enabled
2,179,825 UART: [state] LifecycleState = Unprovisioned
2,181,498 UART: [state] DebugLocked = No
2,182,611 UART: [state] WD Timer not started. Device not locked for debugging
2,185,089 UART: [kat] SHA2-256
2,185,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,777 UART: [kat] ++
2,189,224 UART: [kat] sha1
2,189,821 UART: [kat] SHA2-256
2,190,485 UART: [kat] SHA2-384
2,191,140 UART: [kat] SHA2-512-ACC
2,192,018 UART: [kat] ECC-384
3,279,721 UART: [kat] HMAC-384Kdf
3,292,879 UART: [kat] LMS
3,769,420 UART: [kat] --
3,773,571 UART: [cold-reset] ++
3,775,498 UART: [fht] FHT @ 0x50003400
3,786,743 UART: [idev] ++
3,787,329 UART: [idev] CDI.KEYID = 6
3,788,252 UART: [idev] SUBJECT.KEYID = 7
3,789,467 UART: [idev] UDS.KEYID = 0
3,805,333 UART: [idev] Erasing UDS.KEYID = 0
6,269,601 UART: [idev] Sha1 KeyId Algorithm
6,292,914 UART: [idev] --
6,297,762 UART: [ldev] ++
6,298,331 UART: [ldev] CDI.KEYID = 6
6,299,295 UART: [ldev] SUBJECT.KEYID = 5
6,300,506 UART: [ldev] AUTHORITY.KEYID = 7
6,301,737 UART: [ldev] FE.KEYID = 1
6,313,684 UART: [ldev] Erasing FE.KEYID = 1
8,791,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,920 UART: [ldev] --
10,588,166 UART: [fwproc] Wait for Commands...
10,591,186 UART: [fwproc] Recv command 0x46574c44
10,593,234 UART: [fwproc] Recv'd Img size: 118548 bytes
12,914,130 UART: ROM Fatal Error: 0x000B0022
12,917,369 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,034,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,791,824 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,082 UART: [kat] ++
895,234 UART: [kat] sha1
899,450 UART: [kat] SHA2-256
901,390 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
915,661 UART: [kat] HMAC-384Kdf
920,205 UART: [kat] LMS
1,168,517 UART: [kat] --
1,169,476 UART: [cold-reset] ++
1,169,844 UART: [fht] FHT @ 0x50003400
1,172,592 UART: [idev] ++
1,172,760 UART: [idev] CDI.KEYID = 6
1,173,121 UART: [idev] SUBJECT.KEYID = 7
1,173,546 UART: [idev] UDS.KEYID = 0
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,143 UART: [idev] Sha1 KeyId Algorithm
1,207,161 UART: [idev] --
1,208,094 UART: [ldev] ++
1,208,262 UART: [ldev] CDI.KEYID = 6
1,208,626 UART: [ldev] SUBJECT.KEYID = 5
1,209,053 UART: [ldev] AUTHORITY.KEYID = 7
1,209,516 UART: [ldev] FE.KEYID = 1
1,214,958 UART: [ldev] Erasing FE.KEYID = 1
1,241,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,314 UART: [ldev] --
1,280,541 UART: [fwproc] Wait for Commands...
1,281,174 UART: [fwproc] Recv command 0x46574c44
1,281,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,686 UART: ROM Fatal Error: 0x000B0022
1,562,843 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,172 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,593 UART: [state] LifecycleState = Unprovisioned
86,248 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
891,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,693 UART: [kat] ++
895,845 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,766 UART: [kat] HMAC-384Kdf
921,486 UART: [kat] LMS
1,169,798 UART: [kat] --
1,170,637 UART: [cold-reset] ++
1,171,005 UART: [fht] FHT @ 0x50003400
1,173,425 UART: [idev] ++
1,173,593 UART: [idev] CDI.KEYID = 6
1,173,954 UART: [idev] SUBJECT.KEYID = 7
1,174,379 UART: [idev] UDS.KEYID = 0
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,528 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,245 UART: [fwproc] Recv command 0x46574c44
1,282,978 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,337 UART: ROM Fatal Error: 0x000B0022
1,563,494 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,951 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,572 UART: [state] LifecycleState = Unprovisioned
85,227 UART: [state] DebugLocked = No
85,775 UART: [state] WD Timer not started. Device not locked for debugging
86,954 UART: [kat] SHA2-256
890,504 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,608 UART: [kat] ++
894,760 UART: [kat] sha1
899,040 UART: [kat] SHA2-256
900,980 UART: [kat] SHA2-384
903,831 UART: [kat] SHA2-512-ACC
905,732 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,536 UART: [idev] ++
1,172,704 UART: [idev] CDI.KEYID = 6
1,173,065 UART: [idev] SUBJECT.KEYID = 7
1,173,490 UART: [idev] UDS.KEYID = 0
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,985 UART: [idev] Sha1 KeyId Algorithm
1,207,893 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,241,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,638 UART: [ldev] --
1,279,847 UART: [fwproc] Wait for Commands...
1,280,526 UART: [fwproc] Recv command 0x46574c44
1,281,259 UART: [fwproc] Recv'd Img size: 118548 bytes
1,559,724 UART: ROM Fatal Error: 0x000B0022
1,560,881 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,416,880 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
891,713 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,817 UART: [kat] ++
895,969 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,858 UART: [kat] HMAC-384Kdf
921,492 UART: [kat] LMS
1,169,804 UART: [kat] --
1,170,825 UART: [cold-reset] ++
1,171,325 UART: [fht] FHT @ 0x50003400
1,173,947 UART: [idev] ++
1,174,115 UART: [idev] CDI.KEYID = 6
1,174,476 UART: [idev] SUBJECT.KEYID = 7
1,174,901 UART: [idev] UDS.KEYID = 0
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,200,002 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,293 UART: [ldev] SUBJECT.KEYID = 5
1,210,720 UART: [ldev] AUTHORITY.KEYID = 7
1,211,183 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,004 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,701 UART: ROM Fatal Error: 0x000B0022
1,562,858 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,281 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,136 UART: [kat] SHA2-256
890,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,790 UART: [kat] ++
894,942 UART: [kat] sha1
899,140 UART: [kat] SHA2-256
901,080 UART: [kat] SHA2-384
903,787 UART: [kat] SHA2-512-ACC
905,688 UART: [kat] ECC-384
915,437 UART: [kat] HMAC-384Kdf
919,961 UART: [kat] LMS
1,168,273 UART: [kat] --
1,169,236 UART: [cold-reset] ++
1,169,684 UART: [fht] FHT @ 0x50003400
1,172,184 UART: [idev] ++
1,172,352 UART: [idev] CDI.KEYID = 6
1,172,713 UART: [idev] SUBJECT.KEYID = 7
1,173,138 UART: [idev] UDS.KEYID = 0
1,181,397 UART: [idev] Erasing UDS.KEYID = 0
1,197,949 UART: [idev] Sha1 KeyId Algorithm
1,206,871 UART: [idev] --
1,207,852 UART: [ldev] ++
1,208,020 UART: [ldev] CDI.KEYID = 6
1,208,384 UART: [ldev] SUBJECT.KEYID = 5
1,208,811 UART: [ldev] AUTHORITY.KEYID = 7
1,209,274 UART: [ldev] FE.KEYID = 1
1,214,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,398 UART: [fwproc] Recv command 0x46574c44
1,282,131 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,678 UART: ROM Fatal Error: 0x000B0022
1,562,835 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,658 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
891,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,583 UART: [kat] ++
895,735 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,774 UART: [kat] HMAC-384Kdf
921,380 UART: [kat] LMS
1,169,692 UART: [kat] --
1,170,925 UART: [cold-reset] ++
1,171,303 UART: [fht] FHT @ 0x50003400
1,173,997 UART: [idev] ++
1,174,165 UART: [idev] CDI.KEYID = 6
1,174,526 UART: [idev] SUBJECT.KEYID = 7
1,174,951 UART: [idev] UDS.KEYID = 0
1,182,802 UART: [idev] Erasing UDS.KEYID = 0
1,199,718 UART: [idev] Sha1 KeyId Algorithm
1,208,626 UART: [idev] --
1,209,753 UART: [ldev] ++
1,209,921 UART: [ldev] CDI.KEYID = 6
1,210,285 UART: [ldev] SUBJECT.KEYID = 5
1,210,712 UART: [ldev] AUTHORITY.KEYID = 7
1,211,175 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,947 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,999 UART: [fwproc] Recv command 0x46574c44
1,283,732 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,073 UART: ROM Fatal Error: 0x000B0022
1,564,230 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,563 >>> mbox cmd response: failed
test test_image_validation::test_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,663 writing to cptra_bootfsm_go
2,037,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,223 UART:
2,188,660 UART: Running Caliptra ROM ...
2,189,801 UART:
2,189,973 UART: [state] CFI Enabled
2,190,945 UART: [state] LifecycleState = Unprovisioned
2,192,604 UART: [state] DebugLocked = No
2,193,717 UART: [state] WD Timer not started. Device not locked for debugging
2,196,198 UART: [kat] SHA2-256
2,196,876 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,199,922 UART: [kat] ++
2,200,385 UART: [kat] sha1
2,200,912 UART: [kat] SHA2-256
2,201,602 UART: [kat] SHA2-384
2,202,267 UART: [kat] SHA2-512-ACC
2,203,077 UART: [kat] ECC-384
2,929,411 UART: [kat] HMAC-384Kdf
2,951,573 UART: [kat] LMS
3,428,074 UART: [kat] --
3,432,638 UART: [cold-reset] ++
3,433,989 UART: [fht] FHT @ 0x50003400
3,446,167 UART: [idev] ++
3,446,786 UART: [idev] CDI.KEYID = 6
3,447,709 UART: [idev] SUBJECT.KEYID = 7
3,448,933 UART: [idev] UDS.KEYID = 0
3,481,879 UART: [idev] Erasing UDS.KEYID = 0
5,964,530 UART: [idev] Sha1 KeyId Algorithm
5,987,459 UART: [idev] --
5,992,918 UART: [ldev] ++
5,993,495 UART: [ldev] CDI.KEYID = 6
5,994,410 UART: [ldev] SUBJECT.KEYID = 5
5,995,628 UART: [ldev] AUTHORITY.KEYID = 7
5,996,862 UART: [ldev] FE.KEYID = 1
6,037,713 UART: [ldev] Erasing FE.KEYID = 1
8,544,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,315 UART: [ldev] --
10,353,481 UART: [fwproc] Wait for Commands...
10,356,126 UART: [fwproc] Recv command 0x46574c44
10,358,140 UART: [fwproc] Recv'd Img size: 118548 bytes
12,684,956 UART: ROM Fatal Error: 0x000B0021
12,688,196 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,037,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,602,390 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
2,039,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,189,494 UART:
2,189,906 UART: Running Caliptra ROM ...
2,191,081 UART:
2,191,259 UART: [state] CFI Enabled
2,192,216 UART: [state] LifecycleState = Unprovisioned
2,193,870 UART: [state] DebugLocked = No
2,194,979 UART: [state] WD Timer not started. Device not locked for debugging
2,197,450 UART: [kat] SHA2-256
2,198,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,201,366 UART: [kat] ++
2,201,826 UART: [kat] sha1
2,202,336 UART: [kat] SHA2-256
2,203,075 UART: [kat] SHA2-384
2,203,744 UART: [kat] SHA2-512-ACC
2,204,624 UART: [kat] ECC-384
3,278,844 UART: [kat] HMAC-384Kdf
3,291,657 UART: [kat] LMS
3,768,195 UART: [kat] --
3,770,799 UART: [cold-reset] ++
3,773,280 UART: [fht] FHT @ 0x50003400
3,785,283 UART: [idev] ++
3,785,898 UART: [idev] CDI.KEYID = 6
3,786,774 UART: [idev] SUBJECT.KEYID = 7
3,788,090 UART: [idev] UDS.KEYID = 0
3,806,000 UART: [idev] Erasing UDS.KEYID = 0
6,266,988 UART: [idev] Sha1 KeyId Algorithm
6,290,535 UART: [idev] --
6,295,048 UART: [ldev] ++
6,295,624 UART: [ldev] CDI.KEYID = 6
6,296,506 UART: [ldev] SUBJECT.KEYID = 5
6,297,773 UART: [ldev] AUTHORITY.KEYID = 7
6,298,927 UART: [ldev] FE.KEYID = 1
6,309,946 UART: [ldev] Erasing FE.KEYID = 1
8,789,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,955 UART: [ldev] --
10,583,700 UART: [fwproc] Wait for Commands...
10,585,594 UART: [fwproc] Recv command 0x46574c44
10,587,582 UART: [fwproc] Recv'd Img size: 118548 bytes
12,920,738 UART: ROM Fatal Error: 0x000B0021
12,923,975 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,529 writing to cptra_bootfsm_go
2,053,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,790,392 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,926 UART: [kat] ++
895,078 UART: [kat] sha1
899,148 UART: [kat] SHA2-256
901,088 UART: [kat] SHA2-384
903,751 UART: [kat] SHA2-512-ACC
905,652 UART: [kat] ECC-384
915,711 UART: [kat] HMAC-384Kdf
920,255 UART: [kat] LMS
1,168,567 UART: [kat] --
1,169,470 UART: [cold-reset] ++
1,169,980 UART: [fht] FHT @ 0x50003400
1,172,696 UART: [idev] ++
1,172,864 UART: [idev] CDI.KEYID = 6
1,173,225 UART: [idev] SUBJECT.KEYID = 7
1,173,650 UART: [idev] UDS.KEYID = 0
1,181,347 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,099 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,850 UART: [ldev] Erasing FE.KEYID = 1
1,241,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,092 UART: [ldev] --
1,280,435 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,312 UART: ROM Fatal Error: 0x000B0021
1,562,469 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,244 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,850 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,317 UART: [cold-reset] ++
1,169,865 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,182,054 UART: [idev] Erasing UDS.KEYID = 0
1,198,966 UART: [idev] Sha1 KeyId Algorithm
1,208,032 UART: [idev] --
1,209,269 UART: [ldev] ++
1,209,437 UART: [ldev] CDI.KEYID = 6
1,209,801 UART: [ldev] SUBJECT.KEYID = 5
1,210,228 UART: [ldev] AUTHORITY.KEYID = 7
1,210,691 UART: [ldev] FE.KEYID = 1
1,215,885 UART: [ldev] Erasing FE.KEYID = 1
1,242,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,839 UART: [ldev] --
1,281,244 UART: [fwproc] Wait for Commands...
1,281,921 UART: [fwproc] Recv command 0x46574c44
1,282,654 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,857 UART: ROM Fatal Error: 0x000B0021
1,563,014 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,148 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
915,901 UART: [kat] HMAC-384Kdf
920,417 UART: [kat] LMS
1,168,729 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,216 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,038 UART: [ldev] ++
1,208,206 UART: [ldev] CDI.KEYID = 6
1,208,570 UART: [ldev] SUBJECT.KEYID = 5
1,208,997 UART: [ldev] AUTHORITY.KEYID = 7
1,209,460 UART: [ldev] FE.KEYID = 1
1,214,506 UART: [ldev] Erasing FE.KEYID = 1
1,240,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,428 UART: [ldev] --
1,279,775 UART: [fwproc] Wait for Commands...
1,280,482 UART: [fwproc] Recv command 0x46574c44
1,281,215 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,296 UART: ROM Fatal Error: 0x000B0021
1,561,453 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,250 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,905 UART: [state] LifecycleState = Unprovisioned
86,560 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,531 UART: [kat] SHA2-256
892,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,185 UART: [kat] ++
896,337 UART: [kat] sha1
900,719 UART: [kat] SHA2-256
902,659 UART: [kat] SHA2-384
905,364 UART: [kat] SHA2-512-ACC
907,265 UART: [kat] ECC-384
917,094 UART: [kat] HMAC-384Kdf
921,858 UART: [kat] LMS
1,170,170 UART: [kat] --
1,171,095 UART: [cold-reset] ++
1,171,627 UART: [fht] FHT @ 0x50003400
1,174,315 UART: [idev] ++
1,174,483 UART: [idev] CDI.KEYID = 6
1,174,844 UART: [idev] SUBJECT.KEYID = 7
1,175,269 UART: [idev] UDS.KEYID = 0
1,183,102 UART: [idev] Erasing UDS.KEYID = 0
1,200,018 UART: [idev] Sha1 KeyId Algorithm
1,208,856 UART: [idev] --
1,209,875 UART: [ldev] ++
1,210,043 UART: [ldev] CDI.KEYID = 6
1,210,407 UART: [ldev] SUBJECT.KEYID = 5
1,210,834 UART: [ldev] AUTHORITY.KEYID = 7
1,211,297 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,242,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,467 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,371 UART: [fwproc] Recv command 0x46574c44
1,283,104 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,133 UART: ROM Fatal Error: 0x000B0021
1,563,290 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,653 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
904,205 UART: [kat] SHA2-512-ACC
906,106 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,401 UART: [kat] LMS
1,168,713 UART: [kat] --
1,169,760 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,181,513 UART: [idev] Erasing UDS.KEYID = 0
1,198,323 UART: [idev] Sha1 KeyId Algorithm
1,207,255 UART: [idev] --
1,208,380 UART: [ldev] ++
1,208,548 UART: [ldev] CDI.KEYID = 6
1,208,912 UART: [ldev] SUBJECT.KEYID = 5
1,209,339 UART: [ldev] AUTHORITY.KEYID = 7
1,209,802 UART: [ldev] FE.KEYID = 1
1,214,982 UART: [ldev] Erasing FE.KEYID = 1
1,241,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,522 UART: [ldev] --
1,280,771 UART: [fwproc] Wait for Commands...
1,281,360 UART: [fwproc] Recv command 0x46574c44
1,282,093 UART: [fwproc] Recv'd Img size: 118548 bytes
1,560,276 UART: ROM Fatal Error: 0x000B0021
1,561,433 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,134 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,724 UART: [kat] HMAC-384Kdf
921,382 UART: [kat] LMS
1,169,694 UART: [kat] --
1,170,745 UART: [cold-reset] ++
1,171,129 UART: [fht] FHT @ 0x50003400
1,173,765 UART: [idev] ++
1,173,933 UART: [idev] CDI.KEYID = 6
1,174,294 UART: [idev] SUBJECT.KEYID = 7
1,174,719 UART: [idev] UDS.KEYID = 0
1,182,916 UART: [idev] Erasing UDS.KEYID = 0
1,200,216 UART: [idev] Sha1 KeyId Algorithm
1,208,936 UART: [idev] --
1,209,955 UART: [ldev] ++
1,210,123 UART: [ldev] CDI.KEYID = 6
1,210,487 UART: [ldev] SUBJECT.KEYID = 5
1,210,914 UART: [ldev] AUTHORITY.KEYID = 7
1,211,377 UART: [ldev] FE.KEYID = 1
1,216,807 UART: [ldev] Erasing FE.KEYID = 1
1,243,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,282,850 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,831 UART: ROM Fatal Error: 0x000B0021
1,564,988 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,455 >>> mbox cmd response: failed
test test_image_validation::test_fmc_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,028,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,292 UART:
2,178,681 UART: Running Caliptra ROM ...
2,179,851 UART:
2,180,027 UART: [state] CFI Enabled
2,180,995 UART: [state] LifecycleState = Unprovisioned
2,182,649 UART: [state] DebugLocked = No
2,183,759 UART: [state] WD Timer not started. Device not locked for debugging
2,186,244 UART: [kat] SHA2-256
2,186,922 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,942 UART: [kat] ++
2,190,404 UART: [kat] sha1
2,191,143 UART: [kat] SHA2-256
2,191,856 UART: [kat] SHA2-384
2,192,521 UART: [kat] SHA2-512-ACC
2,193,350 UART: [kat] ECC-384
2,950,298 UART: [kat] HMAC-384Kdf
2,972,689 UART: [kat] LMS
3,449,185 UART: [kat] --
3,453,986 UART: [cold-reset] ++
3,456,353 UART: [fht] FHT @ 0x50003400
3,466,902 UART: [idev] ++
3,467,477 UART: [idev] CDI.KEYID = 6
3,468,500 UART: [idev] SUBJECT.KEYID = 7
3,469,664 UART: [idev] UDS.KEYID = 0
3,503,122 UART: [idev] Erasing UDS.KEYID = 0
5,987,433 UART: [idev] Sha1 KeyId Algorithm
6,011,434 UART: [idev] --
6,015,759 UART: [ldev] ++
6,016,331 UART: [ldev] CDI.KEYID = 6
6,017,222 UART: [ldev] SUBJECT.KEYID = 5
6,018,516 UART: [ldev] AUTHORITY.KEYID = 7
6,019,758 UART: [ldev] FE.KEYID = 1
6,058,301 UART: [ldev] Erasing FE.KEYID = 1
8,570,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,776 UART: [ldev] --
10,374,797 UART: [fwproc] Wait for Commands...
10,376,474 UART: [fwproc] Recv command 0x46574c44
10,378,469 UART: [fwproc] Recv'd Img size: 118548 bytes
12,454,135 UART: ROM Fatal Error: 0x000B0034
12,457,368 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,038,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,303 UART:
2,188,690 UART: Running Caliptra ROM ...
2,189,863 UART:
2,190,041 UART: [state] CFI Enabled
2,191,039 UART: [state] LifecycleState = Unprovisioned
2,192,692 UART: [state] DebugLocked = No
2,193,934 UART: [state] WD Timer not started. Device not locked for debugging
2,196,433 UART: [kat] SHA2-256
2,197,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,151 UART: [kat] ++
2,200,615 UART: [kat] sha1
2,201,321 UART: [kat] SHA2-256
2,202,046 UART: [kat] SHA2-384
2,202,745 UART: [kat] SHA2-512-ACC
2,203,640 UART: [kat] ECC-384
2,961,775 UART: [kat] HMAC-384Kdf
2,983,324 UART: [kat] LMS
3,459,799 UART: [kat] --
3,463,260 UART: [cold-reset] ++
3,465,253 UART: [fht] FHT @ 0x50003400
3,475,586 UART: [idev] ++
3,476,191 UART: [idev] CDI.KEYID = 6
3,477,085 UART: [idev] SUBJECT.KEYID = 7
3,478,379 UART: [idev] UDS.KEYID = 0
3,514,674 UART: [idev] Erasing UDS.KEYID = 0
5,999,380 UART: [idev] Sha1 KeyId Algorithm
6,022,681 UART: [idev] --
6,026,636 UART: [ldev] ++
6,027,209 UART: [ldev] CDI.KEYID = 6
6,028,099 UART: [ldev] SUBJECT.KEYID = 5
6,029,322 UART: [ldev] AUTHORITY.KEYID = 7
6,030,619 UART: [ldev] FE.KEYID = 1
6,070,744 UART: [ldev] Erasing FE.KEYID = 1
8,575,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,311,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,327,256 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,343,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,358,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,381,013 UART: [ldev] --
10,386,019 UART: [fwproc] Wait for Commands...
10,387,535 UART: [fwproc] Recv command 0x46574c44
10,389,550 UART: [fwproc] Recv'd Img size: 118548 bytes
12,459,021 UART: ROM Fatal Error: 0x000B0034
12,462,263 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
2,034,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,340,626 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
2,033,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,301,988 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
2,035,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,985 UART:
2,185,406 UART: Running Caliptra ROM ...
2,186,579 UART:
2,186,750 UART: [state] CFI Enabled
2,187,702 UART: [state] LifecycleState = Unprovisioned
2,189,357 UART: [state] DebugLocked = No
2,190,467 UART: [state] WD Timer not started. Device not locked for debugging
2,192,941 UART: [kat] SHA2-256
2,193,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,196,616 UART: [kat] ++
2,197,068 UART: [kat] sha1
2,197,579 UART: [kat] SHA2-256
2,198,318 UART: [kat] SHA2-384
2,198,983 UART: [kat] SHA2-512-ACC
2,199,825 UART: [kat] ECC-384
3,281,242 UART: [kat] HMAC-384Kdf
3,293,909 UART: [kat] LMS
3,770,403 UART: [kat] --
3,775,969 UART: [cold-reset] ++
3,777,686 UART: [fht] FHT @ 0x50003400
3,789,480 UART: [idev] ++
3,790,049 UART: [idev] CDI.KEYID = 6
3,791,071 UART: [idev] SUBJECT.KEYID = 7
3,792,234 UART: [idev] UDS.KEYID = 0
3,809,608 UART: [idev] Erasing UDS.KEYID = 0
6,270,616 UART: [idev] Sha1 KeyId Algorithm
6,294,363 UART: [idev] --
6,298,520 UART: [ldev] ++
6,299,093 UART: [ldev] CDI.KEYID = 6
6,300,006 UART: [ldev] SUBJECT.KEYID = 5
6,301,226 UART: [ldev] AUTHORITY.KEYID = 7
6,302,457 UART: [ldev] FE.KEYID = 1
6,314,247 UART: [ldev] Erasing FE.KEYID = 1
8,790,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,471 UART: [ldev] --
10,585,255 UART: [fwproc] Wait for Commands...
10,587,245 UART: [fwproc] Recv command 0x46574c44
10,589,285 UART: [fwproc] Recv'd Img size: 118548 bytes
12,656,734 UART: ROM Fatal Error: 0x000B0034
12,660,022 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
2,039,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,189,103 UART:
2,189,498 UART: Running Caliptra ROM ...
2,190,581 UART:
2,190,733 UART: [state] CFI Enabled
2,191,639 UART: [state] LifecycleState = Unprovisioned
2,193,285 UART: [state] DebugLocked = No
2,194,312 UART: [state] WD Timer not started. Device not locked for debugging
2,196,773 UART: [kat] SHA2-256
2,197,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,440 UART: [kat] ++
2,200,891 UART: [kat] sha1
2,201,424 UART: [kat] SHA2-256
2,202,104 UART: [kat] SHA2-384
2,202,760 UART: [kat] SHA2-512-ACC
2,203,648 UART: [kat] ECC-384
3,283,543 UART: [kat] HMAC-384Kdf
3,296,209 UART: [kat] LMS
3,772,747 UART: [kat] --
3,777,658 UART: [cold-reset] ++
3,779,748 UART: [fht] FHT @ 0x50003400
3,792,122 UART: [idev] ++
3,792,748 UART: [idev] CDI.KEYID = 6
3,793,653 UART: [idev] SUBJECT.KEYID = 7
3,794,922 UART: [idev] UDS.KEYID = 0
3,812,192 UART: [idev] Erasing UDS.KEYID = 0
6,272,047 UART: [idev] Sha1 KeyId Algorithm
6,294,461 UART: [idev] --
6,300,263 UART: [ldev] ++
6,300,909 UART: [ldev] CDI.KEYID = 6
6,301,820 UART: [ldev] SUBJECT.KEYID = 5
6,302,988 UART: [ldev] AUTHORITY.KEYID = 7
6,304,277 UART: [ldev] FE.KEYID = 1
6,315,949 UART: [ldev] Erasing FE.KEYID = 1
8,794,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,878 UART: [ldev] --
10,588,957 UART: [fwproc] Wait for Commands...
10,591,807 UART: [fwproc] Recv command 0x46574c44
10,593,792 UART: [fwproc] Recv'd Img size: 118548 bytes
12,664,265 UART: ROM Fatal Error: 0x000B0034
12,667,548 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,025,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,547,330 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
2,030,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,539,974 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,714 UART: [state] LifecycleState = Unprovisioned
86,369 UART: [state] DebugLocked = No
86,977 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
891,660 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,764 UART: [kat] ++
895,916 UART: [kat] sha1
900,252 UART: [kat] SHA2-256
902,192 UART: [kat] SHA2-384
904,953 UART: [kat] SHA2-512-ACC
906,854 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,816 UART: [idev] ++
1,172,984 UART: [idev] CDI.KEYID = 6
1,173,345 UART: [idev] SUBJECT.KEYID = 7
1,173,770 UART: [idev] UDS.KEYID = 0
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,208,043 UART: [idev] --
1,209,144 UART: [ldev] ++
1,209,312 UART: [ldev] CDI.KEYID = 6
1,209,676 UART: [ldev] SUBJECT.KEYID = 5
1,210,103 UART: [ldev] AUTHORITY.KEYID = 7
1,210,566 UART: [ldev] FE.KEYID = 1
1,215,602 UART: [ldev] Erasing FE.KEYID = 1
1,242,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,658 UART: [ldev] --
1,280,983 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,357 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,582 UART: ROM Fatal Error: 0x000B0034
1,330,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
891,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,688 UART: [kat] ++
895,840 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,759 UART: [kat] SHA2-512-ACC
906,660 UART: [kat] ECC-384
916,675 UART: [kat] HMAC-384Kdf
921,331 UART: [kat] LMS
1,169,643 UART: [kat] --
1,170,736 UART: [cold-reset] ++
1,171,180 UART: [fht] FHT @ 0x50003400
1,173,794 UART: [idev] ++
1,173,962 UART: [idev] CDI.KEYID = 6
1,174,323 UART: [idev] SUBJECT.KEYID = 7
1,174,748 UART: [idev] UDS.KEYID = 0
1,182,285 UART: [idev] Erasing UDS.KEYID = 0
1,198,321 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,598 UART: [ldev] ++
1,208,766 UART: [ldev] CDI.KEYID = 6
1,209,130 UART: [ldev] SUBJECT.KEYID = 5
1,209,557 UART: [ldev] AUTHORITY.KEYID = 7
1,210,020 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,240,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,442 UART: [ldev] --
1,279,783 UART: [fwproc] Wait for Commands...
1,280,454 UART: [fwproc] Recv command 0x46574c44
1,281,187 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,558 UART: ROM Fatal Error: 0x000B0034
1,329,715 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,416 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,282 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,641 UART: [kat] SHA2-256
891,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,295 UART: [kat] ++
895,447 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,246 UART: [kat] HMAC-384Kdf
920,836 UART: [kat] LMS
1,169,148 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,261 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,182,046 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,528 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,253 UART: [ldev] Erasing FE.KEYID = 1
1,241,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,509 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,543 UART: [fwproc] Recv command 0x46574c44
1,282,276 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,143 UART: ROM Fatal Error: 0x000B0034
1,330,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,587 UART: [state] LifecycleState = Unprovisioned
86,242 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,640 UART: [kat] HMAC-384Kdf
921,284 UART: [kat] LMS
1,169,596 UART: [kat] --
1,170,661 UART: [cold-reset] ++
1,171,089 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,614 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,207 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,153 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,113 UART: ROM Fatal Error: 0x000B0034
1,331,270 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,551 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,235 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,114 UART: [kat] SHA2-256
902,054 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,143 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,322 UART: [cold-reset] ++
1,170,654 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,182,277 UART: [idev] Erasing UDS.KEYID = 0
1,199,001 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,208,950 UART: [ldev] ++
1,209,118 UART: [ldev] CDI.KEYID = 6
1,209,482 UART: [ldev] SUBJECT.KEYID = 5
1,209,909 UART: [ldev] AUTHORITY.KEYID = 7
1,210,372 UART: [ldev] FE.KEYID = 1
1,215,606 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,337 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,444 UART: ROM Fatal Error: 0x000B0034
1,330,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,732 UART: [kat] SHA2-256
891,282 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,386 UART: [kat] ++
895,538 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,169,926 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,166 UART: [idev] ++
1,173,334 UART: [idev] CDI.KEYID = 6
1,173,695 UART: [idev] SUBJECT.KEYID = 7
1,174,120 UART: [idev] UDS.KEYID = 0
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,869 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,619 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,437 UART: [fwproc] Wait for Commands...
1,281,178 UART: [fwproc] Recv command 0x46574c44
1,281,911 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,876 UART: ROM Fatal Error: 0x000B0034
1,330,033 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,036 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,193 UART: [kat] SHA2-256
902,133 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,966 UART: [kat] LMS
1,169,278 UART: [kat] --
1,170,131 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,182,062 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,804 UART: [idev] --
1,208,701 UART: [ldev] ++
1,208,869 UART: [ldev] CDI.KEYID = 6
1,209,233 UART: [ldev] SUBJECT.KEYID = 5
1,209,660 UART: [ldev] AUTHORITY.KEYID = 7
1,210,123 UART: [ldev] FE.KEYID = 1
1,215,431 UART: [ldev] Erasing FE.KEYID = 1
1,241,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,393 UART: [ldev] --
1,280,760 UART: [fwproc] Wait for Commands...
1,281,541 UART: [fwproc] Recv command 0x46574c44
1,282,274 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,311 UART: ROM Fatal Error: 0x000B0034
1,330,468 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,081 UART: [kat] SHA2-256
902,021 UART: [kat] SHA2-384
904,706 UART: [kat] SHA2-512-ACC
906,607 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,177 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,182,496 UART: [idev] Erasing UDS.KEYID = 0
1,199,936 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,210,031 UART: [ldev] ++
1,210,199 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,990 UART: [ldev] AUTHORITY.KEYID = 7
1,211,453 UART: [ldev] FE.KEYID = 1
1,216,703 UART: [ldev] Erasing FE.KEYID = 1
1,242,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,903 UART: [ldev] --
1,282,350 UART: [fwproc] Wait for Commands...
1,283,159 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,177 UART: ROM Fatal Error: 0x000B0034
1,332,334 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,535 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,005 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,196 UART: [kat] ++
895,348 UART: [kat] sha1
899,782 UART: [kat] SHA2-256
901,722 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,249 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,181,865 UART: [idev] Erasing UDS.KEYID = 0
1,198,969 UART: [idev] Sha1 KeyId Algorithm
1,208,083 UART: [idev] --
1,208,888 UART: [ldev] ++
1,209,056 UART: [ldev] CDI.KEYID = 6
1,209,420 UART: [ldev] SUBJECT.KEYID = 5
1,209,847 UART: [ldev] AUTHORITY.KEYID = 7
1,210,310 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,242,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,574 UART: [fwproc] Recv command 0x46574c44
1,282,307 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,174 UART: ROM Fatal Error: 0x000B0034
1,330,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,636 UART: [kat] SHA2-256
901,576 UART: [kat] SHA2-384
904,263 UART: [kat] SHA2-512-ACC
906,164 UART: [kat] ECC-384
915,857 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,426 UART: [fht] FHT @ 0x50003400
1,173,164 UART: [idev] ++
1,173,332 UART: [idev] CDI.KEYID = 6
1,173,693 UART: [idev] SUBJECT.KEYID = 7
1,174,118 UART: [idev] UDS.KEYID = 0
1,182,167 UART: [idev] Erasing UDS.KEYID = 0
1,198,993 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,778 UART: [ldev] ++
1,208,946 UART: [ldev] CDI.KEYID = 6
1,209,310 UART: [ldev] SUBJECT.KEYID = 5
1,209,737 UART: [ldev] AUTHORITY.KEYID = 7
1,210,200 UART: [ldev] FE.KEYID = 1
1,215,042 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,854 UART: [ldev] --
1,281,177 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,683 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,292 UART: ROM Fatal Error: 0x000B0034
1,331,449 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,950 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,670 UART: [kat] SHA2-512-ACC
906,571 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,198,548 UART: [idev] Sha1 KeyId Algorithm
1,207,516 UART: [idev] --
1,208,599 UART: [ldev] ++
1,208,767 UART: [ldev] CDI.KEYID = 6
1,209,131 UART: [ldev] SUBJECT.KEYID = 5
1,209,558 UART: [ldev] AUTHORITY.KEYID = 7
1,210,021 UART: [ldev] FE.KEYID = 1
1,215,589 UART: [ldev] Erasing FE.KEYID = 1
1,242,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,672 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,219 UART: [ldev] --
1,281,612 UART: [fwproc] Wait for Commands...
1,282,309 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,083 UART: ROM Fatal Error: 0x000B0034
1,331,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,172 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
916,140 UART: [kat] HMAC-384Kdf
920,592 UART: [kat] LMS
1,168,904 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,182,224 UART: [idev] Erasing UDS.KEYID = 0
1,199,110 UART: [idev] Sha1 KeyId Algorithm
1,207,972 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,413 UART: [fwproc] Recv command 0x46574c44
1,283,146 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,653 UART: ROM Fatal Error: 0x000B0034
1,331,810 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,813 >>> mbox cmd response: failed
test test_image_validation::test_fmc_rt_load_address_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
5,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,046 UART:
192,452 UART: Running Caliptra ROM ...
193,530 UART:
193,686 UART: [state] CFI Enabled
264,283 UART: [state] LifecycleState = Manufacturing
266,212 UART: [state] DebugLocked = No
268,792 UART: [state] WD Timer not started. Device not locked for debugging
272,839 UART: [kat] SHA2-256
452,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,283 UART: [kat] ++
463,823 UART: [kat] sha1
474,602 UART: [kat] SHA2-256
477,284 UART: [kat] SHA2-384
482,341 UART: [kat] SHA2-512-ACC
484,681 UART: [kat] ECC-384
2,948,850 UART: [kat] HMAC-384Kdf
2,971,190 UART: [kat] LMS
3,447,650 UART: [kat] --
3,452,561 UART: [cold-reset] ++
3,453,685 UART: [fht] FHT @ 0x50003400
3,465,097 UART: [idev] ++
3,465,669 UART: [idev] CDI.KEYID = 6
3,466,686 UART: [idev] SUBJECT.KEYID = 7
3,467,899 UART: [idev] UDS.KEYID = 0
3,501,631 UART: [idev] Erasing UDS.KEYID = 0
5,989,016 UART: [idev] Sha1 KeyId Algorithm
6,013,169 UART: [idev] --
6,017,119 UART: [ldev] ++
6,017,695 UART: [ldev] CDI.KEYID = 6
6,018,616 UART: [ldev] SUBJECT.KEYID = 5
6,019,839 UART: [ldev] AUTHORITY.KEYID = 7
6,021,094 UART: [ldev] FE.KEYID = 1
6,059,530 UART: [ldev] Erasing FE.KEYID = 1
8,567,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,014 UART: [ldev] --
10,374,161 UART: [fwproc] Wait for Commands...
10,376,119 UART: [fwproc] Recv command 0x46574c44
10,378,112 UART: [fwproc] Recv'd Img size: 118548 bytes
12,739,452 UART: ROM Fatal Error: 0x000B0025
12,742,723 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
5,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,604,743 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
6,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,484 UART:
192,882 UART: Running Caliptra ROM ...
194,000 UART:
603,669 UART: [state] CFI Enabled
617,315 UART: [state] LifecycleState = Manufacturing
619,249 UART: [state] DebugLocked = No
621,015 UART: [state] WD Timer not started. Device not locked for debugging
624,103 UART: [kat] SHA2-256
803,758 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,543 UART: [kat] ++
815,019 UART: [kat] sha1
825,573 UART: [kat] SHA2-256
828,258 UART: [kat] SHA2-384
835,369 UART: [kat] SHA2-512-ACC
837,715 UART: [kat] ECC-384
3,277,919 UART: [kat] HMAC-384Kdf
3,290,796 UART: [kat] LMS
3,767,285 UART: [kat] --
3,771,644 UART: [cold-reset] ++
3,772,597 UART: [fht] FHT @ 0x50003400
3,782,974 UART: [idev] ++
3,783,537 UART: [idev] CDI.KEYID = 6
3,784,505 UART: [idev] SUBJECT.KEYID = 7
3,785,770 UART: [idev] UDS.KEYID = 0
3,803,056 UART: [idev] Erasing UDS.KEYID = 0
6,265,096 UART: [idev] Sha1 KeyId Algorithm
6,288,294 UART: [idev] --
6,291,888 UART: [ldev] ++
6,292,520 UART: [ldev] CDI.KEYID = 6
6,293,430 UART: [ldev] SUBJECT.KEYID = 5
6,294,594 UART: [ldev] AUTHORITY.KEYID = 7
6,295,884 UART: [ldev] FE.KEYID = 1
6,308,529 UART: [ldev] Erasing FE.KEYID = 1
8,783,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,717 UART: [ldev] --
10,577,950 UART: [fwproc] Wait for Commands...
10,580,713 UART: [fwproc] Recv command 0x46574c44
10,582,702 UART: [fwproc] Recv'd Img size: 118548 bytes
12,938,119 UART: ROM Fatal Error: 0x000B0025
12,941,364 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
6,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,829,113 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Manufacturing
85,563 UART: [state] DebugLocked = No
86,077 UART: [state] WD Timer not started. Device not locked for debugging
87,282 UART: [kat] SHA2-256
890,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,936 UART: [kat] ++
895,088 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,759 UART: [kat] HMAC-384Kdf
920,257 UART: [kat] LMS
1,168,569 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,888 UART: [fht] FHT @ 0x50003400
1,172,474 UART: [idev] ++
1,172,642 UART: [idev] CDI.KEYID = 6
1,173,003 UART: [idev] SUBJECT.KEYID = 7
1,173,428 UART: [idev] UDS.KEYID = 0
1,180,989 UART: [idev] Erasing UDS.KEYID = 0
1,197,421 UART: [idev] Sha1 KeyId Algorithm
1,206,209 UART: [idev] --
1,207,280 UART: [ldev] ++
1,207,448 UART: [ldev] CDI.KEYID = 6
1,207,812 UART: [ldev] SUBJECT.KEYID = 5
1,208,239 UART: [ldev] AUTHORITY.KEYID = 7
1,208,702 UART: [ldev] FE.KEYID = 1
1,213,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,260 UART: [ldev] --
1,279,617 UART: [fwproc] Wait for Commands...
1,280,276 UART: [fwproc] Recv command 0x46574c44
1,281,009 UART: [fwproc] Recv'd Img size: 118548 bytes
1,584,608 UART: ROM Fatal Error: 0x000B0025
1,585,765 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,730 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,069 UART: [state] LifecycleState = Manufacturing
85,724 UART: [state] DebugLocked = No
86,272 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
915,958 UART: [kat] HMAC-384Kdf
920,536 UART: [kat] LMS
1,168,848 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,173,185 UART: [idev] ++
1,173,353 UART: [idev] CDI.KEYID = 6
1,173,714 UART: [idev] SUBJECT.KEYID = 7
1,174,139 UART: [idev] UDS.KEYID = 0
1,182,138 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,373 UART: [ldev] ++
1,209,541 UART: [ldev] CDI.KEYID = 6
1,209,905 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,839 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,975 UART: [fwproc] Recv command 0x46574c44
1,282,708 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,589 UART: ROM Fatal Error: 0x000B0025
1,586,746 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,329 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Manufacturing
85,809 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,365 UART: [kat] HMAC-384Kdf
921,141 UART: [kat] LMS
1,169,453 UART: [kat] --
1,170,332 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,350 UART: [idev] ++
1,173,518 UART: [idev] CDI.KEYID = 6
1,173,879 UART: [idev] SUBJECT.KEYID = 7
1,174,304 UART: [idev] UDS.KEYID = 0
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,471 UART: [idev] --
1,209,540 UART: [ldev] ++
1,209,708 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,499 UART: [ldev] AUTHORITY.KEYID = 7
1,210,962 UART: [ldev] FE.KEYID = 1
1,216,164 UART: [ldev] Erasing FE.KEYID = 1
1,241,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,754 UART: [ldev] --
1,281,045 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x46574c44
1,282,503 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,646 UART: ROM Fatal Error: 0x000B0025
1,587,803 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,808 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Manufacturing
85,958 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,673 UART: [kat] SHA2-256
891,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,327 UART: [kat] ++
895,479 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
915,982 UART: [kat] HMAC-384Kdf
920,428 UART: [kat] LMS
1,168,740 UART: [kat] --
1,169,683 UART: [cold-reset] ++
1,170,073 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,181,796 UART: [idev] Erasing UDS.KEYID = 0
1,199,528 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,459 UART: [ldev] Erasing FE.KEYID = 1
1,243,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,593 UART: [ldev] --
1,282,814 UART: [fwproc] Wait for Commands...
1,283,565 UART: [fwproc] Recv command 0x46574c44
1,284,298 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,565 UART: ROM Fatal Error: 0x000B0025
1,590,722 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,227 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Manufacturing
85,783 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,362 UART: [kat] SHA2-256
901,302 UART: [kat] SHA2-384
904,169 UART: [kat] SHA2-512-ACC
906,070 UART: [kat] ECC-384
915,687 UART: [kat] HMAC-384Kdf
920,303 UART: [kat] LMS
1,168,615 UART: [kat] --
1,169,446 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,572 UART: [idev] ++
1,172,740 UART: [idev] CDI.KEYID = 6
1,173,101 UART: [idev] SUBJECT.KEYID = 7
1,173,526 UART: [idev] UDS.KEYID = 0
1,181,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,177 UART: [idev] --
1,208,310 UART: [ldev] ++
1,208,478 UART: [ldev] CDI.KEYID = 6
1,208,842 UART: [ldev] SUBJECT.KEYID = 5
1,209,269 UART: [ldev] AUTHORITY.KEYID = 7
1,209,732 UART: [ldev] FE.KEYID = 1
1,214,788 UART: [ldev] Erasing FE.KEYID = 1
1,241,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,670 UART: [ldev] --
1,281,075 UART: [fwproc] Wait for Commands...
1,281,692 UART: [fwproc] Recv command 0x46574c44
1,282,425 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,010 UART: ROM Fatal Error: 0x000B0025
1,589,167 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,032 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Manufacturing
85,932 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,681 UART: [kat] SHA2-256
901,621 UART: [kat] SHA2-384
904,238 UART: [kat] SHA2-512-ACC
906,139 UART: [kat] ECC-384
916,008 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,169,881 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,965 UART: [idev] ++
1,173,133 UART: [idev] CDI.KEYID = 6
1,173,494 UART: [idev] SUBJECT.KEYID = 7
1,173,919 UART: [idev] UDS.KEYID = 0
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,198,774 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,919 UART: [ldev] ++
1,209,087 UART: [ldev] CDI.KEYID = 6
1,209,451 UART: [ldev] SUBJECT.KEYID = 5
1,209,878 UART: [ldev] AUTHORITY.KEYID = 7
1,210,341 UART: [ldev] FE.KEYID = 1
1,215,299 UART: [ldev] Erasing FE.KEYID = 1
1,241,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,066 UART: [fwproc] Wait for Commands...
1,281,677 UART: [fwproc] Recv command 0x46574c44
1,282,410 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,927 UART: ROM Fatal Error: 0x000B0025
1,588,084 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,541 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_greater_than_32 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
5,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,073 UART:
192,470 UART: Running Caliptra ROM ...
193,648 UART:
193,806 UART: [state] CFI Enabled
268,369 UART: [state] LifecycleState = Manufacturing
270,272 UART: [state] DebugLocked = No
272,029 UART: [state] WD Timer not started. Device not locked for debugging
275,134 UART: [kat] SHA2-256
454,759 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,580 UART: [kat] ++
466,117 UART: [kat] sha1
477,512 UART: [kat] SHA2-256
480,202 UART: [kat] SHA2-384
485,656 UART: [kat] SHA2-512-ACC
488,053 UART: [kat] ECC-384
2,953,433 UART: [kat] HMAC-384Kdf
2,975,207 UART: [kat] LMS
3,451,652 UART: [kat] --
3,455,812 UART: [cold-reset] ++
3,456,720 UART: [fht] FHT @ 0x50003400
3,467,407 UART: [idev] ++
3,468,023 UART: [idev] CDI.KEYID = 6
3,468,911 UART: [idev] SUBJECT.KEYID = 7
3,470,179 UART: [idev] UDS.KEYID = 0
3,505,104 UART: [idev] Erasing UDS.KEYID = 0
5,991,062 UART: [idev] Sha1 KeyId Algorithm
6,014,794 UART: [idev] --
6,019,774 UART: [ldev] ++
6,020,348 UART: [ldev] CDI.KEYID = 6
6,021,257 UART: [ldev] SUBJECT.KEYID = 5
6,022,440 UART: [ldev] AUTHORITY.KEYID = 7
6,023,741 UART: [ldev] FE.KEYID = 1
6,061,153 UART: [ldev] Erasing FE.KEYID = 1
8,567,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,072 UART: [ldev] --
10,376,301 UART: [fwproc] Wait for Commands...
10,378,728 UART: [fwproc] Recv command 0x46574c44
10,380,720 UART: [fwproc] Recv'd Img size: 118548 bytes
12,737,822 UART: ROM Fatal Error: 0x000B0027
12,741,054 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
5,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,612,615 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
7,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,554 UART:
192,945 UART: Running Caliptra ROM ...
194,026 UART:
603,769 UART: [state] CFI Enabled
617,231 UART: [state] LifecycleState = Manufacturing
619,190 UART: [state] DebugLocked = No
621,773 UART: [state] WD Timer not started. Device not locked for debugging
625,435 UART: [kat] SHA2-256
805,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,844 UART: [kat] ++
816,436 UART: [kat] sha1
827,101 UART: [kat] SHA2-256
829,786 UART: [kat] SHA2-384
836,626 UART: [kat] SHA2-512-ACC
839,017 UART: [kat] ECC-384
3,279,973 UART: [kat] HMAC-384Kdf
3,293,131 UART: [kat] LMS
3,769,640 UART: [kat] --
3,776,216 UART: [cold-reset] ++
3,777,501 UART: [fht] FHT @ 0x50003400
3,789,395 UART: [idev] ++
3,789,965 UART: [idev] CDI.KEYID = 6
3,790,951 UART: [idev] SUBJECT.KEYID = 7
3,792,169 UART: [idev] UDS.KEYID = 0
3,808,250 UART: [idev] Erasing UDS.KEYID = 0
6,264,617 UART: [idev] Sha1 KeyId Algorithm
6,288,086 UART: [idev] --
6,292,522 UART: [ldev] ++
6,293,094 UART: [ldev] CDI.KEYID = 6
6,294,059 UART: [ldev] SUBJECT.KEYID = 5
6,295,220 UART: [ldev] AUTHORITY.KEYID = 7
6,296,507 UART: [ldev] FE.KEYID = 1
6,306,451 UART: [ldev] Erasing FE.KEYID = 1
8,784,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,562 UART: [ldev] --
10,581,701 UART: [fwproc] Wait for Commands...
10,583,915 UART: [fwproc] Recv command 0x46574c44
10,585,906 UART: [fwproc] Recv'd Img size: 118548 bytes
12,940,599 UART: ROM Fatal Error: 0x000B0027
12,943,830 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
6,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,840,788 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Manufacturing
85,897 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
900,014 UART: [kat] SHA2-256
901,954 UART: [kat] SHA2-384
904,803 UART: [kat] SHA2-512-ACC
906,704 UART: [kat] ECC-384
916,161 UART: [kat] HMAC-384Kdf
920,637 UART: [kat] LMS
1,168,949 UART: [kat] --
1,169,924 UART: [cold-reset] ++
1,170,490 UART: [fht] FHT @ 0x50003400
1,172,938 UART: [idev] ++
1,173,106 UART: [idev] CDI.KEYID = 6
1,173,467 UART: [idev] SUBJECT.KEYID = 7
1,173,892 UART: [idev] UDS.KEYID = 0
1,181,873 UART: [idev] Erasing UDS.KEYID = 0
1,198,229 UART: [idev] Sha1 KeyId Algorithm
1,206,955 UART: [idev] --
1,207,924 UART: [ldev] ++
1,208,092 UART: [ldev] CDI.KEYID = 6
1,208,456 UART: [ldev] SUBJECT.KEYID = 5
1,208,883 UART: [ldev] AUTHORITY.KEYID = 7
1,209,346 UART: [ldev] FE.KEYID = 1
1,214,766 UART: [ldev] Erasing FE.KEYID = 1
1,241,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,693 UART: [fwproc] Wait for Commands...
1,281,288 UART: [fwproc] Recv command 0x46574c44
1,282,021 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,396 UART: ROM Fatal Error: 0x000B0027
1,587,553 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,556 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Manufacturing
86,470 UART: [state] DebugLocked = No
87,170 UART: [state] WD Timer not started. Device not locked for debugging
88,401 UART: [kat] SHA2-256
891,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,055 UART: [kat] ++
896,207 UART: [kat] sha1
900,559 UART: [kat] SHA2-256
902,499 UART: [kat] SHA2-384
905,296 UART: [kat] SHA2-512-ACC
907,197 UART: [kat] ECC-384
917,162 UART: [kat] HMAC-384Kdf
921,616 UART: [kat] LMS
1,169,928 UART: [kat] --
1,171,009 UART: [cold-reset] ++
1,171,537 UART: [fht] FHT @ 0x50003400
1,174,233 UART: [idev] ++
1,174,401 UART: [idev] CDI.KEYID = 6
1,174,762 UART: [idev] SUBJECT.KEYID = 7
1,175,187 UART: [idev] UDS.KEYID = 0
1,182,746 UART: [idev] Erasing UDS.KEYID = 0
1,199,724 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,825 UART: [ldev] ++
1,209,993 UART: [ldev] CDI.KEYID = 6
1,210,357 UART: [ldev] SUBJECT.KEYID = 5
1,210,784 UART: [ldev] AUTHORITY.KEYID = 7
1,211,247 UART: [ldev] FE.KEYID = 1
1,216,461 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,365 UART: [fwproc] Recv command 0x46574c44
1,284,098 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,333 UART: ROM Fatal Error: 0x000B0027
1,590,490 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,109 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Manufacturing
86,153 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
900,150 UART: [kat] SHA2-256
902,090 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,807 UART: [kat] HMAC-384Kdf
921,283 UART: [kat] LMS
1,169,595 UART: [kat] --
1,170,652 UART: [cold-reset] ++
1,171,072 UART: [fht] FHT @ 0x50003400
1,173,824 UART: [idev] ++
1,173,992 UART: [idev] CDI.KEYID = 6
1,174,353 UART: [idev] SUBJECT.KEYID = 7
1,174,778 UART: [idev] UDS.KEYID = 0
1,182,753 UART: [idev] Erasing UDS.KEYID = 0
1,200,075 UART: [idev] Sha1 KeyId Algorithm
1,208,783 UART: [idev] --
1,209,794 UART: [ldev] ++
1,209,962 UART: [ldev] CDI.KEYID = 6
1,210,326 UART: [ldev] SUBJECT.KEYID = 5
1,210,753 UART: [ldev] AUTHORITY.KEYID = 7
1,211,216 UART: [ldev] FE.KEYID = 1
1,216,070 UART: [ldev] Erasing FE.KEYID = 1
1,242,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,556 UART: [ldev] --
1,281,823 UART: [fwproc] Wait for Commands...
1,282,416 UART: [fwproc] Recv command 0x46574c44
1,283,149 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,222 UART: ROM Fatal Error: 0x000B0027
1,588,379 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,902 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Manufacturing
85,612 UART: [state] DebugLocked = No
86,224 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,619 UART: [kat] SHA2-256
901,559 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
915,682 UART: [kat] HMAC-384Kdf
920,216 UART: [kat] LMS
1,168,528 UART: [kat] --
1,169,335 UART: [cold-reset] ++
1,169,843 UART: [fht] FHT @ 0x50003400
1,172,471 UART: [idev] ++
1,172,639 UART: [idev] CDI.KEYID = 6
1,173,000 UART: [idev] SUBJECT.KEYID = 7
1,173,425 UART: [idev] UDS.KEYID = 0
1,181,450 UART: [idev] Erasing UDS.KEYID = 0
1,198,646 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,009 UART: [ldev] Erasing FE.KEYID = 1
1,240,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,493 UART: [ldev] --
1,279,772 UART: [fwproc] Wait for Commands...
1,280,391 UART: [fwproc] Recv command 0x46574c44
1,281,124 UART: [fwproc] Recv'd Img size: 118548 bytes
1,584,411 UART: ROM Fatal Error: 0x000B0027
1,585,568 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,905 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Manufacturing
85,741 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
915,679 UART: [kat] HMAC-384Kdf
920,291 UART: [kat] LMS
1,168,603 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,960 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,199,309 UART: [idev] Sha1 KeyId Algorithm
1,208,137 UART: [idev] --
1,209,300 UART: [ldev] ++
1,209,468 UART: [ldev] CDI.KEYID = 6
1,209,832 UART: [ldev] SUBJECT.KEYID = 5
1,210,259 UART: [ldev] AUTHORITY.KEYID = 7
1,210,722 UART: [ldev] FE.KEYID = 1
1,215,778 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,442 UART: [ldev] --
1,281,777 UART: [fwproc] Wait for Commands...
1,282,366 UART: [fwproc] Recv command 0x46574c44
1,283,099 UART: [fwproc] Recv'd Img size: 118548 bytes
1,587,306 UART: ROM Fatal Error: 0x000B0027
1,588,463 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,670 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Manufacturing
86,226 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
917,076 UART: [kat] HMAC-384Kdf
921,766 UART: [kat] LMS
1,170,078 UART: [kat] --
1,171,075 UART: [cold-reset] ++
1,171,511 UART: [fht] FHT @ 0x50003400
1,174,059 UART: [idev] ++
1,174,227 UART: [idev] CDI.KEYID = 6
1,174,588 UART: [idev] SUBJECT.KEYID = 7
1,175,013 UART: [idev] UDS.KEYID = 0
1,182,704 UART: [idev] Erasing UDS.KEYID = 0
1,199,886 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,787 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,929 UART: [ldev] --
1,282,212 UART: [fwproc] Wait for Commands...
1,283,005 UART: [fwproc] Recv command 0x46574c44
1,283,738 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,185 UART: ROM Fatal Error: 0x000B0027
1,589,342 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,939 >>> mbox cmd response: failed
test test_image_validation::test_fmc_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
2,033,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,650 UART:
2,183,041 UART: Running Caliptra ROM ...
2,184,212 UART:
2,184,396 UART: [state] CFI Enabled
2,185,376 UART: [state] LifecycleState = Unprovisioned
2,187,038 UART: [state] DebugLocked = No
2,188,375 UART: [state] WD Timer not started. Device not locked for debugging
2,190,857 UART: [kat] SHA2-256
2,191,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,533 UART: [kat] ++
2,194,993 UART: [kat] sha1
2,195,564 UART: [kat] SHA2-256
2,196,323 UART: [kat] SHA2-384
2,196,998 UART: [kat] SHA2-512-ACC
2,197,890 UART: [kat] ECC-384
2,947,296 UART: [kat] HMAC-384Kdf
2,972,260 UART: [kat] LMS
3,448,720 UART: [kat] --
3,453,245 UART: [cold-reset] ++
3,454,479 UART: [fht] FHT @ 0x50003400
3,466,273 UART: [idev] ++
3,466,866 UART: [idev] CDI.KEYID = 6
3,467,953 UART: [idev] SUBJECT.KEYID = 7
3,469,078 UART: [idev] UDS.KEYID = 0
3,500,892 UART: [idev] Erasing UDS.KEYID = 0
5,988,190 UART: [idev] Sha1 KeyId Algorithm
6,011,922 UART: [idev] --
6,018,252 UART: [ldev] ++
6,018,834 UART: [ldev] CDI.KEYID = 6
6,019,756 UART: [ldev] SUBJECT.KEYID = 5
6,020,919 UART: [ldev] AUTHORITY.KEYID = 7
6,022,217 UART: [ldev] FE.KEYID = 1
6,057,676 UART: [ldev] Erasing FE.KEYID = 1
8,565,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,249 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,407 UART: [ldev] --
10,375,738 UART: [fwproc] Wait for Commands...
10,379,031 UART: [fwproc] Recv command 0x46574c44
10,381,032 UART: [fwproc] Recv'd Img size: 118548 bytes
11,465,048 UART: ROM Fatal Error: 0x000B000D
11,468,297 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
2,023,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,359,456 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
2,035,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,436 UART:
2,185,829 UART: Running Caliptra ROM ...
2,186,915 UART:
2,187,064 UART: [state] CFI Enabled
2,187,972 UART: [state] LifecycleState = Unprovisioned
2,189,622 UART: [state] DebugLocked = No
2,190,652 UART: [state] WD Timer not started. Device not locked for debugging
2,193,104 UART: [kat] SHA2-256
2,193,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,196,785 UART: [kat] ++
2,197,237 UART: [kat] sha1
2,197,745 UART: [kat] SHA2-256
2,198,713 UART: [kat] SHA2-384
2,199,388 UART: [kat] SHA2-512-ACC
2,200,270 UART: [kat] ECC-384
3,276,996 UART: [kat] HMAC-384Kdf
3,288,151 UART: [kat] LMS
3,764,666 UART: [kat] --
3,770,086 UART: [cold-reset] ++
3,771,048 UART: [fht] FHT @ 0x50003400
3,783,487 UART: [idev] ++
3,784,046 UART: [idev] CDI.KEYID = 6
3,785,007 UART: [idev] SUBJECT.KEYID = 7
3,786,282 UART: [idev] UDS.KEYID = 0
3,799,988 UART: [idev] Erasing UDS.KEYID = 0
6,264,409 UART: [idev] Sha1 KeyId Algorithm
6,288,979 UART: [idev] --
6,293,271 UART: [ldev] ++
6,293,902 UART: [ldev] CDI.KEYID = 6
6,294,808 UART: [ldev] SUBJECT.KEYID = 5
6,296,021 UART: [ldev] AUTHORITY.KEYID = 7
6,297,253 UART: [ldev] FE.KEYID = 1
6,308,114 UART: [ldev] Erasing FE.KEYID = 1
8,786,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,870 UART: [ldev] --
10,580,402 UART: [fwproc] Wait for Commands...
10,583,258 UART: [fwproc] Recv command 0x46574c44
10,585,269 UART: [fwproc] Recv'd Img size: 118548 bytes
11,667,426 UART: ROM Fatal Error: 0x000B000D
11,670,664 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
2,031,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,564,447 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,620 UART: [cold-reset] ++
1,169,960 UART: [fht] FHT @ 0x50003400
1,172,588 UART: [idev] ++
1,172,756 UART: [idev] CDI.KEYID = 6
1,173,117 UART: [idev] SUBJECT.KEYID = 7
1,173,542 UART: [idev] UDS.KEYID = 0
1,181,297 UART: [idev] Erasing UDS.KEYID = 0
1,198,219 UART: [idev] Sha1 KeyId Algorithm
1,206,959 UART: [idev] --
1,207,842 UART: [ldev] ++
1,208,010 UART: [ldev] CDI.KEYID = 6
1,208,374 UART: [ldev] SUBJECT.KEYID = 5
1,208,801 UART: [ldev] AUTHORITY.KEYID = 7
1,209,264 UART: [ldev] FE.KEYID = 1
1,214,202 UART: [ldev] Erasing FE.KEYID = 1
1,239,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,672 UART: [ldev] --
1,279,081 UART: [fwproc] Wait for Commands...
1,279,770 UART: [fwproc] Recv command 0x46574c44
1,280,503 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,461 UART: ROM Fatal Error: 0x000B000D
1,318,620 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,277 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,275 UART: [kat] SHA2-256
902,215 UART: [kat] SHA2-384
904,974 UART: [kat] SHA2-512-ACC
906,875 UART: [kat] ECC-384
917,158 UART: [kat] HMAC-384Kdf
921,848 UART: [kat] LMS
1,170,160 UART: [kat] --
1,171,237 UART: [cold-reset] ++
1,171,599 UART: [fht] FHT @ 0x50003400
1,174,245 UART: [idev] ++
1,174,413 UART: [idev] CDI.KEYID = 6
1,174,774 UART: [idev] SUBJECT.KEYID = 7
1,175,199 UART: [idev] UDS.KEYID = 0
1,183,496 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,087 UART: [ldev] SUBJECT.KEYID = 5
1,211,514 UART: [ldev] AUTHORITY.KEYID = 7
1,211,977 UART: [ldev] FE.KEYID = 1
1,217,257 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,298 UART: [fwproc] Wait for Commands...
1,283,059 UART: [fwproc] Recv command 0x46574c44
1,283,792 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,920 UART: ROM Fatal Error: 0x000B000D
1,323,079 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,602 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,117 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,940 UART: [kat] ++
895,092 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
903,991 UART: [kat] SHA2-512-ACC
905,892 UART: [kat] ECC-384
915,929 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,456 UART: [cold-reset] ++
1,169,892 UART: [fht] FHT @ 0x50003400
1,172,574 UART: [idev] ++
1,172,742 UART: [idev] CDI.KEYID = 6
1,173,103 UART: [idev] SUBJECT.KEYID = 7
1,173,528 UART: [idev] UDS.KEYID = 0
1,181,025 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,319 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,214,764 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,723 UART: [fwproc] Wait for Commands...
1,281,362 UART: [fwproc] Recv command 0x46574c44
1,282,095 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,517 UART: ROM Fatal Error: 0x000B000D
1,321,676 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,271 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,712 UART: [kat] SHA2-512-ACC
906,613 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,334 UART: [kat] LMS
1,169,646 UART: [kat] --
1,170,717 UART: [cold-reset] ++
1,171,285 UART: [fht] FHT @ 0x50003400
1,174,043 UART: [idev] ++
1,174,211 UART: [idev] CDI.KEYID = 6
1,174,572 UART: [idev] SUBJECT.KEYID = 7
1,174,997 UART: [idev] UDS.KEYID = 0
1,183,014 UART: [idev] Erasing UDS.KEYID = 0
1,199,822 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,210,003 UART: [ldev] ++
1,210,171 UART: [ldev] CDI.KEYID = 6
1,210,535 UART: [ldev] SUBJECT.KEYID = 5
1,210,962 UART: [ldev] AUTHORITY.KEYID = 7
1,211,425 UART: [ldev] FE.KEYID = 1
1,216,695 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,259 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,253 UART: [fwproc] Recv command 0x46574c44
1,282,986 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,976 UART: ROM Fatal Error: 0x000B000D
1,322,135 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,998 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
891,448 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,552 UART: [kat] ++
895,704 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,625 UART: [kat] SHA2-512-ACC
906,526 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,407 UART: [idev] Sha1 KeyId Algorithm
1,208,259 UART: [idev] --
1,209,246 UART: [ldev] ++
1,209,414 UART: [ldev] CDI.KEYID = 6
1,209,778 UART: [ldev] SUBJECT.KEYID = 5
1,210,205 UART: [ldev] AUTHORITY.KEYID = 7
1,210,668 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,158 UART: [ldev] --
1,281,479 UART: [fwproc] Wait for Commands...
1,282,214 UART: [fwproc] Recv command 0x46574c44
1,282,947 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,157 UART: ROM Fatal Error: 0x000B000D
1,322,316 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,721 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,241 UART: [state] LifecycleState = Unprovisioned
85,896 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,282 UART: [kat] SHA2-512-ACC
906,183 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,201 UART: [idev] ++
1,173,369 UART: [idev] CDI.KEYID = 6
1,173,730 UART: [idev] SUBJECT.KEYID = 7
1,174,155 UART: [idev] UDS.KEYID = 0
1,182,068 UART: [idev] Erasing UDS.KEYID = 0
1,199,540 UART: [idev] Sha1 KeyId Algorithm
1,208,292 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,377 UART: [fwproc] Recv command 0x46574c44
1,283,110 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,148 UART: ROM Fatal Error: 0x000B000D
1,322,307 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,620 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_ecc_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,027,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,075 UART:
2,178,497 UART: Running Caliptra ROM ...
2,179,588 UART:
2,179,751 UART: [state] CFI Enabled
2,180,724 UART: [state] LifecycleState = Unprovisioned
2,182,371 UART: [state] DebugLocked = No
2,183,402 UART: [state] WD Timer not started. Device not locked for debugging
2,185,862 UART: [kat] SHA2-256
2,186,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,531 UART: [kat] ++
2,189,984 UART: [kat] sha1
2,190,505 UART: [kat] SHA2-256
2,191,171 UART: [kat] SHA2-384
2,191,837 UART: [kat] SHA2-512-ACC
2,192,648 UART: [kat] ECC-384
2,945,697 UART: [kat] HMAC-384Kdf
2,971,413 UART: [kat] LMS
3,447,937 UART: [kat] --
3,451,527 UART: [cold-reset] ++
3,452,498 UART: [fht] FHT @ 0x50003400
3,463,916 UART: [idev] ++
3,464,493 UART: [idev] CDI.KEYID = 6
3,465,463 UART: [idev] SUBJECT.KEYID = 7
3,466,684 UART: [idev] UDS.KEYID = 0
3,502,812 UART: [idev] Erasing UDS.KEYID = 0
5,985,623 UART: [idev] Sha1 KeyId Algorithm
6,009,567 UART: [idev] --
6,013,336 UART: [ldev] ++
6,013,926 UART: [ldev] CDI.KEYID = 6
6,014,849 UART: [ldev] SUBJECT.KEYID = 5
6,016,072 UART: [ldev] AUTHORITY.KEYID = 7
6,017,333 UART: [ldev] FE.KEYID = 1
6,057,748 UART: [ldev] Erasing FE.KEYID = 1
8,566,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,351 UART: [ldev] --
10,374,215 UART: [fwproc] Wait for Commands...
10,376,050 UART: [fwproc] Recv command 0x46574c44
10,378,048 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,029 >>> mbox cmd response: success
14,347,335 UART: [afmc] ++
14,347,952 UART: [afmc] CDI.KEYID = 6
14,348,981 UART: [afmc] SUBJECT.KEYID = 7
14,350,091 UART: [afmc] AUTHORITY.KEYID = 5
16,897,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,494 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,435 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,397 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
2,029,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,879 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
2,027,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,030 UART:
2,177,415 UART: Running Caliptra ROM ...
2,178,585 UART:
2,178,760 UART: [state] CFI Enabled
2,179,660 UART: [state] LifecycleState = Unprovisioned
2,181,301 UART: [state] DebugLocked = No
2,182,408 UART: [state] WD Timer not started. Device not locked for debugging
2,184,877 UART: [kat] SHA2-256
2,185,542 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,532 UART: [kat] ++
2,188,980 UART: [kat] sha1
2,189,530 UART: [kat] SHA2-256
2,190,184 UART: [kat] SHA2-384
2,190,838 UART: [kat] SHA2-512-ACC
2,191,657 UART: [kat] ECC-384
3,281,424 UART: [kat] HMAC-384Kdf
3,294,652 UART: [kat] LMS
3,771,148 UART: [kat] --
3,775,880 UART: [cold-reset] ++
3,778,323 UART: [fht] FHT @ 0x50003400
3,790,386 UART: [idev] ++
3,790,949 UART: [idev] CDI.KEYID = 6
3,791,966 UART: [idev] SUBJECT.KEYID = 7
3,793,126 UART: [idev] UDS.KEYID = 0
3,809,212 UART: [idev] Erasing UDS.KEYID = 0
6,270,426 UART: [idev] Sha1 KeyId Algorithm
6,293,870 UART: [idev] --
6,299,152 UART: [ldev] ++
6,299,770 UART: [ldev] CDI.KEYID = 6
6,300,646 UART: [ldev] SUBJECT.KEYID = 5
6,301,850 UART: [ldev] AUTHORITY.KEYID = 7
6,303,137 UART: [ldev] FE.KEYID = 1
6,311,507 UART: [ldev] Erasing FE.KEYID = 1
8,788,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,171 UART: [ldev] --
10,583,850 UART: [fwproc] Wait for Commands...
10,585,573 UART: [fwproc] Recv command 0x46574c44
10,587,560 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,369 >>> mbox cmd response: success
14,556,265 UART: [afmc] ++
14,556,848 UART: [afmc] CDI.KEYID = 6
14,557,835 UART: [afmc] SUBJECT.KEYID = 7
14,558,995 UART: [afmc] AUTHORITY.KEYID = 5
17,063,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,327 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,300 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,032,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,892 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,399 UART: [kat] SHA2-512-ACC
906,300 UART: [kat] ECC-384
916,231 UART: [kat] HMAC-384Kdf
920,957 UART: [kat] LMS
1,169,269 UART: [kat] --
1,170,172 UART: [cold-reset] ++
1,170,548 UART: [fht] FHT @ 0x50003400
1,173,292 UART: [idev] ++
1,173,460 UART: [idev] CDI.KEYID = 6
1,173,821 UART: [idev] SUBJECT.KEYID = 7
1,174,246 UART: [idev] UDS.KEYID = 0
1,182,441 UART: [idev] Erasing UDS.KEYID = 0
1,199,235 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,168 UART: [ldev] ++
1,209,336 UART: [ldev] CDI.KEYID = 6
1,209,700 UART: [ldev] SUBJECT.KEYID = 5
1,210,127 UART: [ldev] AUTHORITY.KEYID = 7
1,210,590 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,241,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,585 UART: [fwproc] Wait for Commands...
1,281,276 UART: [fwproc] Recv command 0x46574c44
1,282,009 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,275 >>> mbox cmd response: success
2,826,383 UART: [afmc] ++
2,826,551 UART: [afmc] CDI.KEYID = 6
2,826,914 UART: [afmc] SUBJECT.KEYID = 7
2,827,340 UART: [afmc] AUTHORITY.KEYID = 5
2,863,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,184 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,404 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,844 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
891,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,605 UART: [kat] ++
895,757 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,776 UART: [kat] SHA2-512-ACC
906,677 UART: [kat] ECC-384
916,738 UART: [kat] HMAC-384Kdf
921,502 UART: [kat] LMS
1,169,814 UART: [kat] --
1,171,023 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,229 UART: [idev] ++
1,174,397 UART: [idev] CDI.KEYID = 6
1,174,758 UART: [idev] SUBJECT.KEYID = 7
1,175,183 UART: [idev] UDS.KEYID = 0
1,183,096 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,709 UART: [ldev] ++
1,209,877 UART: [ldev] CDI.KEYID = 6
1,210,241 UART: [ldev] SUBJECT.KEYID = 5
1,210,668 UART: [ldev] AUTHORITY.KEYID = 7
1,211,131 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,281 UART: [ldev] --
1,281,576 UART: [fwproc] Wait for Commands...
1,282,365 UART: [fwproc] Recv command 0x46574c44
1,283,098 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,654 >>> mbox cmd response: success
2,827,854 UART: [afmc] ++
2,828,022 UART: [afmc] CDI.KEYID = 6
2,828,385 UART: [afmc] SUBJECT.KEYID = 7
2,828,811 UART: [afmc] AUTHORITY.KEYID = 5
2,864,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,137 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,838 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,481 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,177 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,139 UART: [state] WD Timer not started. Device not locked for debugging
87,256 UART: [kat] SHA2-256
890,806 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,910 UART: [kat] ++
895,062 UART: [kat] sha1
899,096 UART: [kat] SHA2-256
901,036 UART: [kat] SHA2-384
903,735 UART: [kat] SHA2-512-ACC
905,636 UART: [kat] ECC-384
915,203 UART: [kat] HMAC-384Kdf
919,979 UART: [kat] LMS
1,168,291 UART: [kat] --
1,168,954 UART: [cold-reset] ++
1,169,476 UART: [fht] FHT @ 0x50003400
1,172,060 UART: [idev] ++
1,172,228 UART: [idev] CDI.KEYID = 6
1,172,589 UART: [idev] SUBJECT.KEYID = 7
1,173,014 UART: [idev] UDS.KEYID = 0
1,180,803 UART: [idev] Erasing UDS.KEYID = 0
1,197,349 UART: [idev] Sha1 KeyId Algorithm
1,206,241 UART: [idev] --
1,207,486 UART: [ldev] ++
1,207,654 UART: [ldev] CDI.KEYID = 6
1,208,018 UART: [ldev] SUBJECT.KEYID = 5
1,208,445 UART: [ldev] AUTHORITY.KEYID = 7
1,208,908 UART: [ldev] FE.KEYID = 1
1,214,000 UART: [ldev] Erasing FE.KEYID = 1
1,240,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,088 UART: [ldev] --
1,279,419 UART: [fwproc] Wait for Commands...
1,280,154 UART: [fwproc] Recv command 0x46574c44
1,280,887 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,583 >>> mbox cmd response: success
2,823,773 UART: [afmc] ++
2,823,941 UART: [afmc] CDI.KEYID = 6
2,824,304 UART: [afmc] SUBJECT.KEYID = 7
2,824,730 UART: [afmc] AUTHORITY.KEYID = 5
2,860,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,028 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,487 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,069 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,778 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,154 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,534 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,728 UART: [kat] HMAC-384Kdf
921,392 UART: [kat] LMS
1,169,704 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,170,927 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,274 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,242,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,747 UART: [ldev] --
1,281,110 UART: [fwproc] Wait for Commands...
1,281,917 UART: [fwproc] Recv command 0x46574c44
1,282,650 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,364 >>> mbox cmd response: success
2,826,494 UART: [afmc] ++
2,826,662 UART: [afmc] CDI.KEYID = 6
2,827,025 UART: [afmc] SUBJECT.KEYID = 7
2,827,451 UART: [afmc] AUTHORITY.KEYID = 5
2,863,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,167 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,543 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,774 UART: [state] LifecycleState = Unprovisioned
86,429 UART: [state] DebugLocked = No
86,941 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,050 UART: [kat] SHA2-256
901,990 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
915,709 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,622 UART: [idev] ++
1,172,790 UART: [idev] CDI.KEYID = 6
1,173,151 UART: [idev] SUBJECT.KEYID = 7
1,173,576 UART: [idev] UDS.KEYID = 0
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,209,050 UART: [ldev] ++
1,209,218 UART: [ldev] CDI.KEYID = 6
1,209,582 UART: [ldev] SUBJECT.KEYID = 5
1,210,009 UART: [ldev] AUTHORITY.KEYID = 7
1,210,472 UART: [ldev] FE.KEYID = 1
1,215,868 UART: [ldev] Erasing FE.KEYID = 1
1,242,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,532 UART: [ldev] --
1,281,819 UART: [fwproc] Wait for Commands...
1,282,480 UART: [fwproc] Recv command 0x46574c44
1,283,213 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,032 >>> mbox cmd response: success
2,828,096 UART: [afmc] ++
2,828,264 UART: [afmc] CDI.KEYID = 6
2,828,627 UART: [afmc] SUBJECT.KEYID = 7
2,829,053 UART: [afmc] AUTHORITY.KEYID = 5
2,864,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,349 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,050 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,997 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,472 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,091 UART: [kat] SHA2-256
902,031 UART: [kat] SHA2-384
904,868 UART: [kat] SHA2-512-ACC
906,769 UART: [kat] ECC-384
916,830 UART: [kat] HMAC-384Kdf
921,378 UART: [kat] LMS
1,169,690 UART: [kat] --
1,170,545 UART: [cold-reset] ++
1,170,945 UART: [fht] FHT @ 0x50003400
1,173,545 UART: [idev] ++
1,173,713 UART: [idev] CDI.KEYID = 6
1,174,074 UART: [idev] SUBJECT.KEYID = 7
1,174,499 UART: [idev] UDS.KEYID = 0
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,199,378 UART: [idev] Sha1 KeyId Algorithm
1,208,186 UART: [idev] --
1,209,211 UART: [ldev] ++
1,209,379 UART: [ldev] CDI.KEYID = 6
1,209,743 UART: [ldev] SUBJECT.KEYID = 5
1,210,170 UART: [ldev] AUTHORITY.KEYID = 7
1,210,633 UART: [ldev] FE.KEYID = 1
1,215,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,609 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,411 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,417 UART: [fwproc] Recv command 0x46574c44
1,283,150 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,578 >>> mbox cmd response: success
2,826,732 UART: [afmc] ++
2,826,900 UART: [afmc] CDI.KEYID = 6
2,827,263 UART: [afmc] SUBJECT.KEYID = 7
2,827,689 UART: [afmc] AUTHORITY.KEYID = 5
2,863,746 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,727 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,287 UART: [afmc] --
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,203 >>> mbox cmd response: success
test test_image_validation::test_header_verify_vendor_lms_optional_no_pub_key_in_preamble_and_header_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,026,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,469 UART:
2,176,861 UART: Running Caliptra ROM ...
2,178,029 UART:
2,178,238 UART: [state] CFI Enabled
2,179,240 UART: [state] LifecycleState = Unprovisioned
2,181,092 UART: [state] DebugLocked = No
2,182,223 UART: [state] WD Timer not started. Device not locked for debugging
2,184,693 UART: [kat] SHA2-256
2,185,366 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,373 UART: [kat] ++
2,188,832 UART: [kat] sha1
2,189,352 UART: [kat] SHA2-256
2,190,182 UART: [kat] SHA2-384
2,190,861 UART: [kat] SHA2-512-ACC
2,191,671 UART: [kat] ECC-384
2,944,304 UART: [kat] HMAC-384Kdf
2,968,322 UART: [kat] LMS
3,444,794 UART: [kat] --
3,447,221 UART: [cold-reset] ++
3,449,285 UART: [fht] FHT @ 0x50003400
3,462,112 UART: [idev] ++
3,462,717 UART: [idev] CDI.KEYID = 6
3,463,695 UART: [idev] SUBJECT.KEYID = 7
3,464,913 UART: [idev] UDS.KEYID = 0
3,497,319 UART: [idev] Erasing UDS.KEYID = 0
5,982,217 UART: [idev] Sha1 KeyId Algorithm
6,007,288 UART: [idev] --
6,012,959 UART: [ldev] ++
6,013,535 UART: [ldev] CDI.KEYID = 6
6,014,424 UART: [ldev] SUBJECT.KEYID = 5
6,015,641 UART: [ldev] AUTHORITY.KEYID = 7
6,016,881 UART: [ldev] FE.KEYID = 1
6,053,611 UART: [ldev] Erasing FE.KEYID = 1
8,562,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,164 UART: [ldev] --
10,371,082 UART: [fwproc] Wait for Commands...
10,372,967 UART: [fwproc] Recv command 0x46574c44
10,374,965 UART: [fwproc] Recv'd Img size: 118548 bytes
11,995,906 UART: ROM Fatal Error: 0x000B0030
11,999,215 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
2,026,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,905,356 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
2,040,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,190,112 UART:
2,190,512 UART: Running Caliptra ROM ...
2,191,686 UART:
2,191,860 UART: [state] CFI Enabled
2,192,836 UART: [state] LifecycleState = Unprovisioned
2,194,495 UART: [state] DebugLocked = No
2,195,604 UART: [state] WD Timer not started. Device not locked for debugging
2,198,064 UART: [kat] SHA2-256
2,198,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,201,720 UART: [kat] ++
2,202,168 UART: [kat] sha1
2,202,677 UART: [kat] SHA2-256
2,203,421 UART: [kat] SHA2-384
2,204,088 UART: [kat] SHA2-512-ACC
2,204,929 UART: [kat] ECC-384
3,280,512 UART: [kat] HMAC-384Kdf
3,293,940 UART: [kat] LMS
3,770,453 UART: [kat] --
3,775,275 UART: [cold-reset] ++
3,776,286 UART: [fht] FHT @ 0x50003400
3,787,828 UART: [idev] ++
3,788,455 UART: [idev] CDI.KEYID = 6
3,789,345 UART: [idev] SUBJECT.KEYID = 7
3,790,617 UART: [idev] UDS.KEYID = 0
3,807,324 UART: [idev] Erasing UDS.KEYID = 0
6,267,778 UART: [idev] Sha1 KeyId Algorithm
6,290,906 UART: [idev] --
6,295,443 UART: [ldev] ++
6,296,003 UART: [ldev] CDI.KEYID = 6
6,296,889 UART: [ldev] SUBJECT.KEYID = 5
6,298,150 UART: [ldev] AUTHORITY.KEYID = 7
6,299,375 UART: [ldev] FE.KEYID = 1
6,311,099 UART: [ldev] Erasing FE.KEYID = 1
8,789,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,269 UART: [ldev] --
10,584,693 UART: [fwproc] Wait for Commands...
10,587,700 UART: [fwproc] Recv command 0x46574c44
10,589,757 UART: [fwproc] Recv'd Img size: 118548 bytes
12,199,330 UART: ROM Fatal Error: 0x000B0030
12,202,608 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,037,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,129,971 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,290 UART: [state] LifecycleState = Unprovisioned
85,945 UART: [state] DebugLocked = No
86,607 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,717 UART: [kat] SHA2-512-ACC
906,618 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,669 UART: [kat] LMS
1,168,981 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,169,896 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,181,575 UART: [idev] Erasing UDS.KEYID = 0
1,198,671 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,876 UART: [ldev] ++
1,209,044 UART: [ldev] CDI.KEYID = 6
1,209,408 UART: [ldev] SUBJECT.KEYID = 5
1,209,835 UART: [ldev] AUTHORITY.KEYID = 7
1,210,298 UART: [ldev] FE.KEYID = 1
1,215,306 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,045 UART: [fwproc] Wait for Commands...
1,281,810 UART: [fwproc] Recv command 0x46574c44
1,282,543 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,359 UART: ROM Fatal Error: 0x000B0030
1,593,516 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,449,003 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,977 UART: [state] LifecycleState = Unprovisioned
85,632 UART: [state] DebugLocked = No
86,266 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
890,969 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,073 UART: [kat] ++
895,225 UART: [kat] sha1
899,449 UART: [kat] SHA2-256
901,389 UART: [kat] SHA2-384
904,022 UART: [kat] SHA2-512-ACC
905,923 UART: [kat] ECC-384
916,118 UART: [kat] HMAC-384Kdf
920,854 UART: [kat] LMS
1,169,166 UART: [kat] --
1,170,085 UART: [cold-reset] ++
1,170,529 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,182,162 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,519 UART: [ldev] --
1,281,822 UART: [fwproc] Wait for Commands...
1,282,391 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 118548 bytes
1,601,015 UART: ROM Fatal Error: 0x000B0030
1,602,172 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,452,349 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,632 UART: [state] LifecycleState = Unprovisioned
85,287 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
890,824 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,928 UART: [kat] ++
895,080 UART: [kat] sha1
899,412 UART: [kat] SHA2-256
901,352 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,511 UART: [kat] HMAC-384Kdf
920,209 UART: [kat] LMS
1,168,521 UART: [kat] --
1,169,380 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,181,357 UART: [idev] Erasing UDS.KEYID = 0
1,197,919 UART: [idev] Sha1 KeyId Algorithm
1,206,853 UART: [idev] --
1,207,736 UART: [ldev] ++
1,207,904 UART: [ldev] CDI.KEYID = 6
1,208,268 UART: [ldev] SUBJECT.KEYID = 5
1,208,695 UART: [ldev] AUTHORITY.KEYID = 7
1,209,158 UART: [ldev] FE.KEYID = 1
1,214,348 UART: [ldev] Erasing FE.KEYID = 1
1,240,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,348 UART: [ldev] --
1,279,675 UART: [fwproc] Wait for Commands...
1,280,296 UART: [fwproc] Recv command 0x46574c44
1,281,029 UART: [fwproc] Recv'd Img size: 118548 bytes
1,581,725 UART: ROM Fatal Error: 0x000B0030
1,582,882 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,456,265 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,776 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,663 UART: [fht] FHT @ 0x50003400
1,173,389 UART: [idev] ++
1,173,557 UART: [idev] CDI.KEYID = 6
1,173,918 UART: [idev] SUBJECT.KEYID = 7
1,174,343 UART: [idev] UDS.KEYID = 0
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,588 UART: [idev] Sha1 KeyId Algorithm
1,208,498 UART: [idev] --
1,209,531 UART: [ldev] ++
1,209,699 UART: [ldev] CDI.KEYID = 6
1,210,063 UART: [ldev] SUBJECT.KEYID = 5
1,210,490 UART: [ldev] AUTHORITY.KEYID = 7
1,210,953 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,851 UART: [ldev] --
1,282,066 UART: [fwproc] Wait for Commands...
1,282,789 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
1,596,291 UART: ROM Fatal Error: 0x000B0030
1,597,448 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,455,368 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,744 UART: [kat] SHA2-256
901,684 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
916,085 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,738 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,173,094 UART: [idev] ++
1,173,262 UART: [idev] CDI.KEYID = 6
1,173,623 UART: [idev] SUBJECT.KEYID = 7
1,174,048 UART: [idev] UDS.KEYID = 0
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,664 UART: [ldev] Erasing FE.KEYID = 1
1,241,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,771 UART: [fwproc] Wait for Commands...
1,281,508 UART: [fwproc] Recv command 0x46574c44
1,282,241 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,125 UART: ROM Fatal Error: 0x000B0030
1,593,282 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,448,649 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
891,153 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,257 UART: [kat] ++
895,409 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,062 UART: [kat] SHA2-512-ACC
905,963 UART: [kat] ECC-384
916,044 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,723 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,701 UART: [idev] ++
1,172,869 UART: [idev] CDI.KEYID = 6
1,173,230 UART: [idev] SUBJECT.KEYID = 7
1,173,655 UART: [idev] UDS.KEYID = 0
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,048 UART: [idev] Sha1 KeyId Algorithm
1,207,878 UART: [idev] --
1,208,787 UART: [ldev] ++
1,208,955 UART: [ldev] CDI.KEYID = 6
1,209,319 UART: [ldev] SUBJECT.KEYID = 5
1,209,746 UART: [ldev] AUTHORITY.KEYID = 7
1,210,209 UART: [ldev] FE.KEYID = 1
1,215,575 UART: [ldev] Erasing FE.KEYID = 1
1,241,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,929 UART: [ldev] --
1,281,206 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,594 UART: ROM Fatal Error: 0x000B0030
1,589,751 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,439,373 >>> mbox cmd response: failed
test test_image_validation::test_header_verify_vendor_lms_pub_key_in_preamble_and_header ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
5,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,234 UART:
192,598 UART: Running Caliptra ROM ...
193,790 UART:
193,955 UART: [state] CFI Enabled
264,268 UART: [state] LifecycleState = Unprovisioned
266,218 UART: [state] DebugLocked = No
267,601 UART: [state] WD Timer not started. Device not locked for debugging
270,859 UART: [kat] SHA2-256
450,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,281 UART: [kat] ++
461,759 UART: [kat] sha1
472,482 UART: [kat] SHA2-256
475,209 UART: [kat] SHA2-384
481,357 UART: [kat] SHA2-512-ACC
483,712 UART: [kat] ECC-384
2,949,069 UART: [kat] HMAC-384Kdf
2,971,904 UART: [kat] LMS
3,448,398 UART: [kat] --
3,451,922 UART: [cold-reset] ++
3,453,046 UART: [fht] FHT @ 0x50003400
3,464,823 UART: [idev] ++
3,465,391 UART: [idev] CDI.KEYID = 6
3,466,341 UART: [idev] SUBJECT.KEYID = 7
3,467,559 UART: [idev] UDS.KEYID = 0
3,501,016 UART: [idev] Erasing UDS.KEYID = 0
5,987,479 UART: [idev] Sha1 KeyId Algorithm
6,010,706 UART: [idev] --
6,015,744 UART: [ldev] ++
6,016,327 UART: [ldev] CDI.KEYID = 6
6,017,244 UART: [ldev] SUBJECT.KEYID = 5
6,018,469 UART: [ldev] AUTHORITY.KEYID = 7
6,019,704 UART: [ldev] FE.KEYID = 1
6,057,425 UART: [ldev] Erasing FE.KEYID = 1
8,564,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,256 UART: [ldev] --
10,372,876 UART: [fwproc] Wait for Commands...
10,375,462 UART: [fwproc] Recv command 0x46574c44
10,377,461 UART: [fwproc] Recv'd Img size: 118548 bytes
10,451,766 UART: ROM Fatal Error: 0x000B0001
10,455,015 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
5,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,323,736 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
6,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,390 UART:
192,753 UART: Running Caliptra ROM ...
193,924 UART:
603,434 UART: [state] CFI Enabled
616,035 UART: [state] LifecycleState = Unprovisioned
617,972 UART: [state] DebugLocked = No
619,750 UART: [state] WD Timer not started. Device not locked for debugging
624,023 UART: [kat] SHA2-256
803,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,483 UART: [kat] ++
814,924 UART: [kat] sha1
827,000 UART: [kat] SHA2-256
829,688 UART: [kat] SHA2-384
835,603 UART: [kat] SHA2-512-ACC
837,990 UART: [kat] ECC-384
3,278,586 UART: [kat] HMAC-384Kdf
3,292,379 UART: [kat] LMS
3,768,851 UART: [kat] --
3,773,327 UART: [cold-reset] ++
3,775,744 UART: [fht] FHT @ 0x50003400
3,788,618 UART: [idev] ++
3,789,184 UART: [idev] CDI.KEYID = 6
3,790,201 UART: [idev] SUBJECT.KEYID = 7
3,791,357 UART: [idev] UDS.KEYID = 0
3,809,327 UART: [idev] Erasing UDS.KEYID = 0
6,268,361 UART: [idev] Sha1 KeyId Algorithm
6,293,379 UART: [idev] --
6,296,753 UART: [ldev] ++
6,297,357 UART: [ldev] CDI.KEYID = 6
6,298,430 UART: [ldev] SUBJECT.KEYID = 5
6,299,533 UART: [ldev] AUTHORITY.KEYID = 7
6,300,702 UART: [ldev] FE.KEYID = 1
6,311,726 UART: [ldev] Erasing FE.KEYID = 1
8,793,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,889 UART: [ldev] --
10,588,311 UART: [fwproc] Wait for Commands...
10,590,081 UART: [fwproc] Recv command 0x46574c44
10,592,070 UART: [fwproc] Recv'd Img size: 118548 bytes
10,662,645 UART: ROM Fatal Error: 0x000B0001
10,665,857 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
6,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,543,437 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,883 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
891,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,376 UART: [kat] SHA2-256
902,316 UART: [kat] SHA2-384
905,045 UART: [kat] SHA2-512-ACC
906,946 UART: [kat] ECC-384
916,921 UART: [kat] HMAC-384Kdf
921,453 UART: [kat] LMS
1,169,765 UART: [kat] --
1,170,820 UART: [cold-reset] ++
1,171,206 UART: [fht] FHT @ 0x50003400
1,173,780 UART: [idev] ++
1,173,948 UART: [idev] CDI.KEYID = 6
1,174,309 UART: [idev] SUBJECT.KEYID = 7
1,174,734 UART: [idev] UDS.KEYID = 0
1,182,855 UART: [idev] Erasing UDS.KEYID = 0
1,199,583 UART: [idev] Sha1 KeyId Algorithm
1,208,369 UART: [idev] --
1,209,400 UART: [ldev] ++
1,209,568 UART: [ldev] CDI.KEYID = 6
1,209,932 UART: [ldev] SUBJECT.KEYID = 5
1,210,359 UART: [ldev] AUTHORITY.KEYID = 7
1,210,822 UART: [ldev] FE.KEYID = 1
1,215,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,591 UART: [fwproc] Wait for Commands...
1,281,374 UART: [fwproc] Recv command 0x46574c44
1,282,107 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,271 UART: ROM Fatal Error: 0x000B0001
1,302,428 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,665 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,596 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,809 UART: [kat] SHA2-256
901,749 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,638 UART: [kat] LMS
1,168,950 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,045 UART: [fht] FHT @ 0x50003400
1,172,827 UART: [idev] ++
1,172,995 UART: [idev] CDI.KEYID = 6
1,173,356 UART: [idev] SUBJECT.KEYID = 7
1,173,781 UART: [idev] UDS.KEYID = 0
1,181,676 UART: [idev] Erasing UDS.KEYID = 0
1,199,080 UART: [idev] Sha1 KeyId Algorithm
1,207,996 UART: [idev] --
1,209,015 UART: [ldev] ++
1,209,183 UART: [ldev] CDI.KEYID = 6
1,209,547 UART: [ldev] SUBJECT.KEYID = 5
1,209,974 UART: [ldev] AUTHORITY.KEYID = 7
1,210,437 UART: [ldev] FE.KEYID = 1
1,215,707 UART: [ldev] Erasing FE.KEYID = 1
1,241,802 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,927 UART: [ldev] --
1,281,212 UART: [fwproc] Wait for Commands...
1,282,019 UART: [fwproc] Recv command 0x46574c44
1,282,752 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,116 UART: ROM Fatal Error: 0x000B0001
1,303,273 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,088 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,157 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,517 UART: [kat] HMAC-384Kdf
919,959 UART: [kat] LMS
1,168,271 UART: [kat] --
1,169,182 UART: [cold-reset] ++
1,169,610 UART: [fht] FHT @ 0x50003400
1,172,342 UART: [idev] ++
1,172,510 UART: [idev] CDI.KEYID = 6
1,172,871 UART: [idev] SUBJECT.KEYID = 7
1,173,296 UART: [idev] UDS.KEYID = 0
1,181,135 UART: [idev] Erasing UDS.KEYID = 0
1,198,459 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,214,808 UART: [ldev] Erasing FE.KEYID = 1
1,240,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,484 UART: [ldev] --
1,279,887 UART: [fwproc] Wait for Commands...
1,280,500 UART: [fwproc] Recv command 0x46574c44
1,281,233 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,601 UART: ROM Fatal Error: 0x000B0001
1,301,758 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,487 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,151 UART: [state] LifecycleState = Unprovisioned
85,806 UART: [state] DebugLocked = No
86,422 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,084 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,169,783 UART: [cold-reset] ++
1,170,215 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,182,078 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,096 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,574 UART: ROM Fatal Error: 0x000B0001
1,302,731 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,156,940 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
900,100 UART: [kat] SHA2-256
902,040 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
915,689 UART: [kat] HMAC-384Kdf
920,189 UART: [kat] LMS
1,168,501 UART: [kat] --
1,169,132 UART: [cold-reset] ++
1,169,600 UART: [fht] FHT @ 0x50003400
1,172,312 UART: [idev] ++
1,172,480 UART: [idev] CDI.KEYID = 6
1,172,841 UART: [idev] SUBJECT.KEYID = 7
1,173,266 UART: [idev] UDS.KEYID = 0
1,181,493 UART: [idev] Erasing UDS.KEYID = 0
1,198,633 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,490 UART: [ldev] ++
1,208,658 UART: [ldev] CDI.KEYID = 6
1,209,022 UART: [ldev] SUBJECT.KEYID = 5
1,209,449 UART: [ldev] AUTHORITY.KEYID = 7
1,209,912 UART: [ldev] FE.KEYID = 1
1,215,266 UART: [ldev] Erasing FE.KEYID = 1
1,241,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,868 UART: [ldev] --
1,280,259 UART: [fwproc] Wait for Commands...
1,280,892 UART: [fwproc] Recv command 0x46574c44
1,281,625 UART: [fwproc] Recv'd Img size: 118548 bytes
1,300,803 UART: ROM Fatal Error: 0x000B0001
1,301,960 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,735 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,175 UART: [kat] SHA2-256
891,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,829 UART: [kat] ++
895,981 UART: [kat] sha1
900,231 UART: [kat] SHA2-256
902,171 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,299 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,317 UART: [idev] ++
1,173,485 UART: [idev] CDI.KEYID = 6
1,173,846 UART: [idev] SUBJECT.KEYID = 7
1,174,271 UART: [idev] UDS.KEYID = 0
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,282 UART: [idev] Sha1 KeyId Algorithm
1,208,196 UART: [idev] --
1,209,143 UART: [ldev] ++
1,209,311 UART: [ldev] CDI.KEYID = 6
1,209,675 UART: [ldev] SUBJECT.KEYID = 5
1,210,102 UART: [ldev] AUTHORITY.KEYID = 7
1,210,565 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,241,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,589 UART: [ldev] --
1,280,806 UART: [fwproc] Wait for Commands...
1,281,525 UART: [fwproc] Recv command 0x46574c44
1,282,258 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,218 UART: ROM Fatal Error: 0x000B0001
1,302,375 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,996 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,816 writing to cptra_bootfsm_go
6,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,923 UART:
193,298 UART: Running Caliptra ROM ...
194,471 UART:
194,636 UART: [state] CFI Enabled
265,621 UART: [state] LifecycleState = Unprovisioned
267,624 UART: [state] DebugLocked = No
269,444 UART: [state] WD Timer not started. Device not locked for debugging
273,344 UART: [kat] SHA2-256
452,984 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,775 UART: [kat] ++
464,309 UART: [kat] sha1
475,523 UART: [kat] SHA2-256
478,208 UART: [kat] SHA2-384
483,664 UART: [kat] SHA2-512-ACC
485,993 UART: [kat] ECC-384
2,951,013 UART: [kat] HMAC-384Kdf
2,972,634 UART: [kat] LMS
3,449,136 UART: [kat] --
3,454,165 UART: [cold-reset] ++
3,455,182 UART: [fht] FHT @ 0x50003400
3,465,928 UART: [idev] ++
3,466,549 UART: [idev] CDI.KEYID = 6
3,467,441 UART: [idev] SUBJECT.KEYID = 7
3,468,712 UART: [idev] UDS.KEYID = 0
3,502,925 UART: [idev] Erasing UDS.KEYID = 0
5,988,067 UART: [idev] Sha1 KeyId Algorithm
6,011,941 UART: [idev] --
6,016,670 UART: [ldev] ++
6,017,262 UART: [ldev] CDI.KEYID = 6
6,018,152 UART: [ldev] SUBJECT.KEYID = 5
6,019,429 UART: [ldev] AUTHORITY.KEYID = 7
6,020,685 UART: [ldev] FE.KEYID = 1
6,058,975 UART: [ldev] Erasing FE.KEYID = 1
8,565,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,095 UART: [ldev] --
10,374,116 UART: [fwproc] Wait for Commands...
10,377,022 UART: [fwproc] Recv command 0x46574c44
10,379,011 UART: [fwproc] Recv'd Img size: 118548 bytes
10,449,503 UART: ROM Fatal Error: 0x000B0002
10,452,754 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
5,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,325,394 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
6,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,419 UART:
192,822 UART: Running Caliptra ROM ...
193,998 UART:
603,696 UART: [state] CFI Enabled
615,855 UART: [state] LifecycleState = Unprovisioned
617,799 UART: [state] DebugLocked = No
620,632 UART: [state] WD Timer not started. Device not locked for debugging
624,629 UART: [kat] SHA2-256
804,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,053 UART: [kat] ++
815,528 UART: [kat] sha1
825,535 UART: [kat] SHA2-256
828,266 UART: [kat] SHA2-384
833,757 UART: [kat] SHA2-512-ACC
836,143 UART: [kat] ECC-384
3,279,707 UART: [kat] HMAC-384Kdf
3,291,404 UART: [kat] LMS
3,767,941 UART: [kat] --
3,773,157 UART: [cold-reset] ++
3,775,471 UART: [fht] FHT @ 0x50003400
3,787,686 UART: [idev] ++
3,788,300 UART: [idev] CDI.KEYID = 6
3,789,206 UART: [idev] SUBJECT.KEYID = 7
3,790,478 UART: [idev] UDS.KEYID = 0
3,808,202 UART: [idev] Erasing UDS.KEYID = 0
6,267,198 UART: [idev] Sha1 KeyId Algorithm
6,291,322 UART: [idev] --
6,295,133 UART: [ldev] ++
6,295,711 UART: [ldev] CDI.KEYID = 6
6,296,728 UART: [ldev] SUBJECT.KEYID = 5
6,297,830 UART: [ldev] AUTHORITY.KEYID = 7
6,299,135 UART: [ldev] FE.KEYID = 1
6,309,944 UART: [ldev] Erasing FE.KEYID = 1
8,791,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,051 UART: [ldev] --
10,585,693 UART: [fwproc] Wait for Commands...
10,588,823 UART: [fwproc] Recv command 0x46574c44
10,590,812 UART: [fwproc] Recv'd Img size: 118548 bytes
10,665,102 UART: ROM Fatal Error: 0x000B0002
10,668,320 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
6,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,537,785 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,845 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
891,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,202 UART: [kat] SHA2-256
902,142 UART: [kat] SHA2-384
904,807 UART: [kat] SHA2-512-ACC
906,708 UART: [kat] ECC-384
916,333 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,199,143 UART: [idev] Sha1 KeyId Algorithm
1,208,229 UART: [idev] --
1,209,260 UART: [ldev] ++
1,209,428 UART: [ldev] CDI.KEYID = 6
1,209,792 UART: [ldev] SUBJECT.KEYID = 5
1,210,219 UART: [ldev] AUTHORITY.KEYID = 7
1,210,682 UART: [ldev] FE.KEYID = 1
1,215,834 UART: [ldev] Erasing FE.KEYID = 1
1,241,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,660 UART: [ldev] --
1,281,021 UART: [fwproc] Wait for Commands...
1,281,604 UART: [fwproc] Recv command 0x46574c44
1,282,337 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,864 UART: ROM Fatal Error: 0x000B0002
1,303,021 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,692 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
891,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,375 UART: [kat] ++
895,527 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,548 UART: [kat] SHA2-512-ACC
906,449 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,926 UART: [kat] LMS
1,169,238 UART: [kat] --
1,170,205 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,182,268 UART: [idev] Erasing UDS.KEYID = 0
1,199,090 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,243,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,767 UART: [ldev] --
1,282,064 UART: [fwproc] Wait for Commands...
1,282,885 UART: [fwproc] Recv command 0x46574c44
1,283,618 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,837 UART: ROM Fatal Error: 0x000B0002
1,303,994 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,909 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,638 UART: [state] LifecycleState = Unprovisioned
85,293 UART: [state] DebugLocked = No
85,835 UART: [state] WD Timer not started. Device not locked for debugging
87,032 UART: [kat] SHA2-256
890,582 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,686 UART: [kat] ++
894,838 UART: [kat] sha1
899,096 UART: [kat] SHA2-256
901,036 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,411 UART: [kat] HMAC-384Kdf
919,903 UART: [kat] LMS
1,168,215 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,780 UART: [fht] FHT @ 0x50003400
1,172,298 UART: [idev] ++
1,172,466 UART: [idev] CDI.KEYID = 6
1,172,827 UART: [idev] SUBJECT.KEYID = 7
1,173,252 UART: [idev] UDS.KEYID = 0
1,181,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,151 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,644 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,136 UART: [fwproc] Recv command 0x46574c44
1,281,869 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,222 UART: ROM Fatal Error: 0x000B0002
1,302,379 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,948 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,938 UART: [kat] SHA2-512-ACC
906,839 UART: [kat] ECC-384
916,674 UART: [kat] HMAC-384Kdf
921,452 UART: [kat] LMS
1,169,764 UART: [kat] --
1,170,565 UART: [cold-reset] ++
1,171,063 UART: [fht] FHT @ 0x50003400
1,173,635 UART: [idev] ++
1,173,803 UART: [idev] CDI.KEYID = 6
1,174,164 UART: [idev] SUBJECT.KEYID = 7
1,174,589 UART: [idev] UDS.KEYID = 0
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,200,438 UART: [idev] Sha1 KeyId Algorithm
1,209,140 UART: [idev] --
1,210,011 UART: [ldev] ++
1,210,179 UART: [ldev] CDI.KEYID = 6
1,210,543 UART: [ldev] SUBJECT.KEYID = 5
1,210,970 UART: [ldev] AUTHORITY.KEYID = 7
1,211,433 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,027 UART: [ldev] --
1,283,314 UART: [fwproc] Wait for Commands...
1,283,949 UART: [fwproc] Recv command 0x46574c44
1,284,682 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,767 UART: ROM Fatal Error: 0x000B0002
1,304,924 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,633 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,309 UART: [state] WD Timer not started. Device not locked for debugging
87,654 UART: [kat] SHA2-256
891,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,308 UART: [kat] ++
895,460 UART: [kat] sha1
899,508 UART: [kat] SHA2-256
901,448 UART: [kat] SHA2-384
904,009 UART: [kat] SHA2-512-ACC
905,910 UART: [kat] ECC-384
915,779 UART: [kat] HMAC-384Kdf
920,347 UART: [kat] LMS
1,168,659 UART: [kat] --
1,169,436 UART: [cold-reset] ++
1,170,000 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,181,587 UART: [idev] Erasing UDS.KEYID = 0
1,198,601 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,762 UART: [ldev] ++
1,208,930 UART: [ldev] CDI.KEYID = 6
1,209,294 UART: [ldev] SUBJECT.KEYID = 5
1,209,721 UART: [ldev] AUTHORITY.KEYID = 7
1,210,184 UART: [ldev] FE.KEYID = 1
1,215,574 UART: [ldev] Erasing FE.KEYID = 1
1,242,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,908 UART: [ldev] --
1,281,207 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,715 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,966 UART: ROM Fatal Error: 0x000B0002
1,303,123 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,712 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,217 UART: [kat] SHA2-256
902,157 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,900 UART: [kat] HMAC-384Kdf
921,540 UART: [kat] LMS
1,169,852 UART: [kat] --
1,170,517 UART: [cold-reset] ++
1,170,997 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,727 UART: [ldev] ++
1,209,895 UART: [ldev] CDI.KEYID = 6
1,210,259 UART: [ldev] SUBJECT.KEYID = 5
1,210,686 UART: [ldev] AUTHORITY.KEYID = 7
1,211,149 UART: [ldev] FE.KEYID = 1
1,216,369 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,641 UART: [ldev] --
1,281,882 UART: [fwproc] Wait for Commands...
1,282,515 UART: [fwproc] Recv command 0x46574c44
1,283,248 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,405 UART: ROM Fatal Error: 0x000B0002
1,303,562 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,415 >>> mbox cmd response: failed
test test_image_validation::test_invalid_manifest_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,095 writing to cptra_bootfsm_go
2,223,426 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,389,395 UART:
2,390,029 UART: Running Caliptra ROM ...
2,391,377 UART:
2,391,569 UART: [state] CFI Enabled
2,392,468 UART: [state] LifecycleState = Unprovisioned
2,394,188 UART: [state] DebugLocked = No
2,395,261 UART: [state] WD Timer not started. Device not locked for debugging
2,397,750 UART: [kat] SHA2-256
2,398,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,401,441 UART: [kat] ++
2,401,926 UART: [kat] sha1
2,402,451 UART: [kat] SHA2-256
2,403,196 UART: [kat] SHA2-384
2,403,871 UART: [kat] SHA2-512-ACC
2,404,706 UART: [kat] ECC-384
2,949,340 UART: [kat] HMAC-384Kdf
2,970,013 UART: [kat] LMS
3,446,467 UART: [kat] --
3,453,164 UART: [cold-reset] ++
3,455,046 UART: [fht] FHT @ 0x50003400
3,465,068 UART: [idev] ++
3,465,637 UART: [idev] CDI.KEYID = 6
3,466,581 UART: [idev] SUBJECT.KEYID = 7
3,467,852 UART: [idev] UDS.KEYID = 0
3,499,448 UART: [idev] Erasing UDS.KEYID = 0
5,984,438 UART: [idev] Sha1 KeyId Algorithm
6,006,658 UART: [idev] --
6,011,458 UART: [ldev] ++
6,012,046 UART: [ldev] CDI.KEYID = 6
6,012,969 UART: [ldev] SUBJECT.KEYID = 5
6,014,137 UART: [ldev] AUTHORITY.KEYID = 7
6,015,436 UART: [ldev] FE.KEYID = 1
6,054,672 UART: [ldev] Erasing FE.KEYID = 1
8,563,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,112 UART: [ldev] --
10,369,733 UART: [fwproc] Wait for Commands...
10,372,968 UART: [fwproc] Recv command 0x46574c44
10,374,963 UART: [fwproc] Recv'd Img size: 131072 bytes
14,019,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,097,716 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,157,939 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,542,934 >>> mbox cmd response: success
14,546,901 UART: [afmc] ++
14,547,501 UART: [afmc] CDI.KEYID = 6
14,548,416 UART: [afmc] SUBJECT.KEYID = 7
14,549,639 UART: [afmc] AUTHORITY.KEYID = 5
17,077,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,804,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,807,021 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,822,806 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,838,849 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,854,357 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,878,771 UART: [afmc] --
18,884,453 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,041,786 UART: [cold-reset] --
19,042,647 UART: [state] Locking Datavault
19,043,733 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,277 UART: [state] Locking ICCM
19,046,168 UART: [exit] Launching FMC @ 0x40000000
19,047,519 UART:
19,047,676 UART: Running Caliptra FMC ...
19,048,783 UART:
19,048,946 UART: [fmc] Received command: 0x1000000E
19,826,198 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,223,222 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,444,325 >>> mbox cmd response: success
18,713,644 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
18,871,060 UART:
18,871,446 UART: Running Caliptra FMC ...
18,872,659 UART:
18,872,842 UART: [fmc] Received command: 0x1000000E
19,655,484 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
2,233,777 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,400,198 UART:
2,400,843 UART: Running Caliptra ROM ...
2,401,969 UART:
2,402,130 UART: [state] CFI Enabled
2,403,033 UART: [state] LifecycleState = Unprovisioned
2,404,729 UART: [state] DebugLocked = No
2,405,853 UART: [state] WD Timer not started. Device not locked for debugging
2,408,336 UART: [kat] SHA2-256
2,409,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,412,017 UART: [kat] ++
2,412,469 UART: [kat] sha1
2,412,982 UART: [kat] SHA2-256
2,413,723 UART: [kat] SHA2-384
2,414,384 UART: [kat] SHA2-512-ACC
2,415,221 UART: [kat] ECC-384
3,282,259 UART: [kat] HMAC-384Kdf
3,294,417 UART: [kat] LMS
3,770,940 UART: [kat] --
3,778,168 UART: [cold-reset] ++
3,779,827 UART: [fht] FHT @ 0x50003400
3,790,927 UART: [idev] ++
3,791,547 UART: [idev] CDI.KEYID = 6
3,792,559 UART: [idev] SUBJECT.KEYID = 7
3,793,720 UART: [idev] UDS.KEYID = 0
3,808,988 UART: [idev] Erasing UDS.KEYID = 0
6,270,050 UART: [idev] Sha1 KeyId Algorithm
6,292,906 UART: [idev] --
6,298,224 UART: [ldev] ++
6,298,804 UART: [ldev] CDI.KEYID = 6
6,299,681 UART: [ldev] SUBJECT.KEYID = 5
6,300,946 UART: [ldev] AUTHORITY.KEYID = 7
6,302,122 UART: [ldev] FE.KEYID = 1
6,315,515 UART: [ldev] Erasing FE.KEYID = 1
8,797,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,766 UART: [ldev] --
10,590,190 UART: [fwproc] Wait for Commands...
10,591,692 UART: [fwproc] Recv command 0x46574c44
10,593,735 UART: [fwproc] Recv'd Img size: 131072 bytes
14,227,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,306,483 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,366,708 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
14,752,031 >>> mbox cmd response: success
14,755,770 UART: [afmc] ++
14,756,361 UART: [afmc] CDI.KEYID = 6
14,757,274 UART: [afmc] SUBJECT.KEYID = 7
14,758,484 UART: [afmc] AUTHORITY.KEYID = 5
17,261,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,358 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,984,601 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
19,000,379 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
19,016,463 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
19,031,924 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
19,054,979 UART: [afmc] --
19,061,827 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,219,083 UART: [cold-reset] --
19,219,949 UART: [state] Locking Datavault
19,221,109 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,651 UART: [state] Locking ICCM
19,223,554 UART: [exit] Launching FMC @ 0x40000000
19,224,977 UART:
19,225,137 UART: Running Caliptra FMC ...
19,226,236 UART:
19,226,392 UART: [fmc] Received command: 0x1000000E
20,003,520 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
2,226,042 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
14,639,451 >>> mbox cmd response: success
18,875,643 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
19,033,155 UART:
19,033,544 UART: Running Caliptra FMC ...
19,034,763 UART:
19,034,944 UART: [fmc] Received command: 0x1000000E
19,817,588 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,297 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,311 UART: [kat] SHA2-512-ACC
906,212 UART: [kat] ECC-384
915,765 UART: [kat] HMAC-384Kdf
920,249 UART: [kat] LMS
1,168,561 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,560 UART: [idev] ++
1,172,728 UART: [idev] CDI.KEYID = 6
1,173,089 UART: [idev] SUBJECT.KEYID = 7
1,173,514 UART: [idev] UDS.KEYID = 0
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,838 UART: [ldev] Erasing FE.KEYID = 1
1,241,967 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,738 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,804 UART: [ldev] --
1,281,151 UART: [fwproc] Wait for Commands...
1,281,970 UART: [fwproc] Recv command 0x46574c44
1,282,703 UART: [fwproc] Recv'd Img size: 131072 bytes
2,771,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,203 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,888 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,491 >>> mbox cmd response: success
2,989,759 UART: [afmc] ++
2,989,927 UART: [afmc] CDI.KEYID = 6
2,990,290 UART: [afmc] SUBJECT.KEYID = 7
2,990,716 UART: [afmc] AUTHORITY.KEYID = 5
3,025,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,042,879 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,575 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,474 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,167 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,069 UART: [afmc] --
3,068,988 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,010 UART: [cold-reset] --
3,069,942 UART: [state] Locking Datavault
3,071,061 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,665 UART: [state] Locking ICCM
3,072,265 UART: [exit] Launching FMC @ 0x40000000
3,077,562 UART:
3,077,578 UART: Running Caliptra FMC ...
3,077,986 UART:
3,078,216 UART: [fmc] Received command: 0x1000000E
3,423,270 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,841,404 >>> mbox cmd response: success
2,897,501 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,588 UART:
2,903,604 UART: Running Caliptra FMC ...
2,904,012 UART:
2,904,242 UART: [fmc] Received command: 0x1000000E
3,249,296 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,769 UART: [kat] SHA2-256
901,709 UART: [kat] SHA2-384
904,368 UART: [kat] SHA2-512-ACC
906,269 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,400 UART: [kat] LMS
1,168,712 UART: [kat] --
1,169,625 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,809 UART: [idev] ++
1,172,977 UART: [idev] CDI.KEYID = 6
1,173,338 UART: [idev] SUBJECT.KEYID = 7
1,173,763 UART: [idev] UDS.KEYID = 0
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,053 UART: [ldev] ++
1,209,221 UART: [ldev] CDI.KEYID = 6
1,209,585 UART: [ldev] SUBJECT.KEYID = 5
1,210,012 UART: [ldev] AUTHORITY.KEYID = 7
1,210,475 UART: [ldev] FE.KEYID = 1
1,215,709 UART: [ldev] Erasing FE.KEYID = 1
1,242,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,786 UART: [fwproc] Wait for Commands...
1,282,415 UART: [fwproc] Recv command 0x46574c44
1,283,148 UART: [fwproc] Recv'd Img size: 131072 bytes
2,773,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,800,472 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,826,157 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,990,776 >>> mbox cmd response: success
2,991,890 UART: [afmc] ++
2,992,058 UART: [afmc] CDI.KEYID = 6
2,992,421 UART: [afmc] SUBJECT.KEYID = 7
2,992,847 UART: [afmc] AUTHORITY.KEYID = 5
3,028,608 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,044,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,045,740 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,051,436 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,057,335 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,063,028 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,070,898 UART: [afmc] --
3,071,707 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,071,729 UART: [cold-reset] --
3,072,483 UART: [state] Locking Datavault
3,073,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,074,250 UART: [state] Locking ICCM
3,074,830 UART: [exit] Launching FMC @ 0x40000000
3,080,127 UART:
3,080,143 UART: Running Caliptra FMC ...
3,080,551 UART:
3,080,781 UART: [fmc] Received command: 0x1000000E
3,425,835 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,063 >>> mbox cmd response: success
2,899,186 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,905,103 UART:
2,905,119 UART: Running Caliptra FMC ...
2,905,527 UART:
2,905,757 UART: [fmc] Received command: 0x1000000E
3,250,811 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
891,152 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,256 UART: [kat] ++
895,408 UART: [kat] sha1
899,670 UART: [kat] SHA2-256
901,610 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,460 UART: [cold-reset] ++
1,169,992 UART: [fht] FHT @ 0x50003400
1,172,568 UART: [idev] ++
1,172,736 UART: [idev] CDI.KEYID = 6
1,173,097 UART: [idev] SUBJECT.KEYID = 7
1,173,522 UART: [idev] UDS.KEYID = 0
1,181,185 UART: [idev] Erasing UDS.KEYID = 0
1,197,623 UART: [idev] Sha1 KeyId Algorithm
1,206,323 UART: [idev] --
1,207,346 UART: [ldev] ++
1,207,514 UART: [ldev] CDI.KEYID = 6
1,207,878 UART: [ldev] SUBJECT.KEYID = 5
1,208,305 UART: [ldev] AUTHORITY.KEYID = 7
1,208,768 UART: [ldev] FE.KEYID = 1
1,213,966 UART: [ldev] Erasing FE.KEYID = 1
1,240,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,419 UART: [fwproc] Wait for Commands...
1,280,196 UART: [fwproc] Recv command 0x46574c44
1,280,929 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,281 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,966 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,649 >>> mbox cmd response: success
2,989,809 UART: [afmc] ++
2,989,977 UART: [afmc] CDI.KEYID = 6
2,990,340 UART: [afmc] SUBJECT.KEYID = 7
2,990,766 UART: [afmc] AUTHORITY.KEYID = 5
3,026,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,267 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,048,963 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,862 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,555 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,393 UART: [afmc] --
3,069,190 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,212 UART: [cold-reset] --
3,069,934 UART: [state] Locking Datavault
3,071,039 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,643 UART: [state] Locking ICCM
3,072,271 UART: [exit] Launching FMC @ 0x40000000
3,077,568 UART:
3,077,584 UART: Running Caliptra FMC ...
3,077,992 UART:
3,078,222 UART: [fmc] Received command: 0x1000000E
3,423,276 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,840,980 >>> mbox cmd response: success
2,897,619 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,658 UART:
2,903,674 UART: Running Caliptra FMC ...
2,904,082 UART:
2,904,312 UART: [fmc] Received command: 0x1000000E
3,249,366 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
900,075 UART: [kat] SHA2-256
902,015 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,150 UART: [kat] HMAC-384Kdf
920,878 UART: [kat] LMS
1,169,190 UART: [kat] --
1,170,243 UART: [cold-reset] ++
1,170,607 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,182,726 UART: [idev] Erasing UDS.KEYID = 0
1,199,876 UART: [idev] Sha1 KeyId Algorithm
1,208,668 UART: [idev] --
1,209,549 UART: [ldev] ++
1,209,717 UART: [ldev] CDI.KEYID = 6
1,210,081 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,519 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,142 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,812 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,798,926 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,824,611 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,170 >>> mbox cmd response: success
2,990,316 UART: [afmc] ++
2,990,484 UART: [afmc] CDI.KEYID = 6
2,990,847 UART: [afmc] SUBJECT.KEYID = 7
2,991,273 UART: [afmc] AUTHORITY.KEYID = 5
3,026,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,712 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,408 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,307 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,000 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,680 UART: [afmc] --
3,069,631 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,653 UART: [cold-reset] --
3,070,493 UART: [state] Locking Datavault
3,071,880 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,484 UART: [state] Locking ICCM
3,072,924 UART: [exit] Launching FMC @ 0x40000000
3,078,221 UART:
3,078,237 UART: Running Caliptra FMC ...
3,078,645 UART:
3,078,875 UART: [fmc] Received command: 0x1000000E
3,423,929 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,842,745 >>> mbox cmd response: success
2,899,518 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,906,011 UART:
2,906,027 UART: Running Caliptra FMC ...
2,906,435 UART:
2,906,665 UART: [fmc] Received command: 0x1000000E
3,251,719 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,766 UART: [kat] SHA2-256
891,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,420 UART: [kat] ++
895,572 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
915,739 UART: [kat] HMAC-384Kdf
920,433 UART: [kat] LMS
1,168,745 UART: [kat] --
1,169,688 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,582 UART: [idev] ++
1,172,750 UART: [idev] CDI.KEYID = 6
1,173,111 UART: [idev] SUBJECT.KEYID = 7
1,173,536 UART: [idev] UDS.KEYID = 0
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,101 UART: [idev] Sha1 KeyId Algorithm
1,207,047 UART: [idev] --
1,207,988 UART: [ldev] ++
1,208,156 UART: [ldev] CDI.KEYID = 6
1,208,520 UART: [ldev] SUBJECT.KEYID = 5
1,208,947 UART: [ldev] AUTHORITY.KEYID = 7
1,209,410 UART: [ldev] FE.KEYID = 1
1,214,376 UART: [ldev] Erasing FE.KEYID = 1
1,240,827 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,480 UART: [ldev] --
1,279,853 UART: [fwproc] Wait for Commands...
1,280,612 UART: [fwproc] Recv command 0x46574c44
1,281,345 UART: [fwproc] Recv'd Img size: 131072 bytes
2,770,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,797,895 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,823,580 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,988,117 >>> mbox cmd response: success
2,989,291 UART: [afmc] ++
2,989,459 UART: [afmc] CDI.KEYID = 6
2,989,822 UART: [afmc] SUBJECT.KEYID = 7
2,990,248 UART: [afmc] AUTHORITY.KEYID = 5
3,025,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,042,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,043,389 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,085 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,054,984 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,060,677 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,068,333 UART: [afmc] --
3,069,348 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,069,370 UART: [cold-reset] --
3,070,076 UART: [state] Locking Datavault
3,071,125 UART: [state] Locking PCR0, PCR1 and PCR31
3,071,729 UART: [state] Locking ICCM
3,072,169 UART: [exit] Launching FMC @ 0x40000000
3,077,466 UART:
3,077,482 UART: Running Caliptra FMC ...
3,077,890 UART:
3,078,120 UART: [fmc] Received command: 0x1000000E
3,423,174 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,843,032 >>> mbox cmd response: success
2,897,807 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,903,900 UART:
2,903,916 UART: Running Caliptra FMC ...
2,904,324 UART:
2,904,554 UART: [fmc] Received command: 0x1000000E
3,249,608 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,005 UART: [kat] SHA2-256
891,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,659 UART: [kat] ++
895,811 UART: [kat] sha1
900,085 UART: [kat] SHA2-256
902,025 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,616 UART: [kat] HMAC-384Kdf
921,334 UART: [kat] LMS
1,169,646 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,651 UART: [fht] FHT @ 0x50003400
1,173,303 UART: [idev] ++
1,173,471 UART: [idev] CDI.KEYID = 6
1,173,832 UART: [idev] SUBJECT.KEYID = 7
1,174,257 UART: [idev] UDS.KEYID = 0
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,104 UART: [idev] Sha1 KeyId Algorithm
1,208,004 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,441 UART: [ldev] SUBJECT.KEYID = 5
1,209,868 UART: [ldev] AUTHORITY.KEYID = 7
1,210,331 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 131072 bytes
2,772,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,799,610 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,825,295 UART: [fwproc] Load Runtime at address 0x40004000 len 108804
2,989,854 >>> mbox cmd response: success
2,991,048 UART: [afmc] ++
2,991,216 UART: [afmc] CDI.KEYID = 6
2,991,579 UART: [afmc] SUBJECT.KEYID = 7
2,992,005 UART: [afmc] AUTHORITY.KEYID = 5
3,027,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,043,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,044,278 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
3,049,974 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
3,055,873 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
3,061,566 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
3,069,338 UART: [afmc] --
3,070,303 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
3,070,325 UART: [cold-reset] --
3,071,099 UART: [state] Locking Datavault
3,072,074 UART: [state] Locking PCR0, PCR1 and PCR31
3,072,678 UART: [state] Locking ICCM
3,073,340 UART: [exit] Launching FMC @ 0x40000000
3,078,637 UART:
3,078,653 UART: Running Caliptra FMC ...
3,079,061 UART:
3,079,291 UART: [fmc] Received command: 0x1000000E
3,424,345 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,844,249 >>> mbox cmd response: success
2,900,262 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
2,906,525 UART:
2,906,541 UART: Running Caliptra FMC ...
2,906,949 UART:
2,907,179 UART: [fmc] Received command: 0x1000000E
3,252,233 >>> mbox cmd response data (1 bytes)
test test_image_validation::test_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
5,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,273 UART:
192,638 UART: Running Caliptra ROM ...
193,809 UART:
193,969 UART: [state] CFI Enabled
265,152 UART: [state] LifecycleState = Unprovisioned
267,092 UART: [state] DebugLocked = No
269,024 UART: [state] WD Timer not started. Device not locked for debugging
272,872 UART: [kat] SHA2-256
452,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,319 UART: [kat] ++
463,770 UART: [kat] sha1
473,628 UART: [kat] SHA2-256
476,332 UART: [kat] SHA2-384
481,486 UART: [kat] SHA2-512-ACC
483,841 UART: [kat] ECC-384
2,948,804 UART: [kat] HMAC-384Kdf
2,973,137 UART: [kat] LMS
3,449,601 UART: [kat] --
3,454,456 UART: [cold-reset] ++
3,456,340 UART: [fht] FHT @ 0x50003400
3,467,170 UART: [idev] ++
3,467,763 UART: [idev] CDI.KEYID = 6
3,468,696 UART: [idev] SUBJECT.KEYID = 7
3,469,916 UART: [idev] UDS.KEYID = 0
3,502,405 UART: [idev] Erasing UDS.KEYID = 0
5,988,817 UART: [idev] Sha1 KeyId Algorithm
6,012,417 UART: [idev] --
6,016,902 UART: [ldev] ++
6,017,505 UART: [ldev] CDI.KEYID = 6
6,018,428 UART: [ldev] SUBJECT.KEYID = 5
6,019,595 UART: [ldev] AUTHORITY.KEYID = 7
6,020,888 UART: [ldev] FE.KEYID = 1
6,059,033 UART: [ldev] Erasing FE.KEYID = 1
8,565,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,764 UART: [ldev] --
10,375,568 UART: [fwproc] Wait for Commands...
10,378,048 UART: [fwproc] Recv command 0x46574c44
10,380,042 UART: [fwproc] Recv'd Img size: 118548 bytes
10,465,389 UART: ROM Fatal Error: 0x000B0007
10,468,590 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
5,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,375,806 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
6,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,488 UART:
192,885 UART: Running Caliptra ROM ...
193,991 UART:
603,492 UART: [state] CFI Enabled
615,439 UART: [state] LifecycleState = Unprovisioned
617,387 UART: [state] DebugLocked = No
618,709 UART: [state] WD Timer not started. Device not locked for debugging
622,272 UART: [kat] SHA2-256
801,911 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,725 UART: [kat] ++
813,257 UART: [kat] sha1
823,222 UART: [kat] SHA2-256
825,961 UART: [kat] SHA2-384
831,879 UART: [kat] SHA2-512-ACC
834,213 UART: [kat] ECC-384
3,275,549 UART: [kat] HMAC-384Kdf
3,287,862 UART: [kat] LMS
3,764,408 UART: [kat] --
3,770,400 UART: [cold-reset] ++
3,772,810 UART: [fht] FHT @ 0x50003400
3,783,084 UART: [idev] ++
3,783,659 UART: [idev] CDI.KEYID = 6
3,784,591 UART: [idev] SUBJECT.KEYID = 7
3,785,855 UART: [idev] UDS.KEYID = 0
3,803,044 UART: [idev] Erasing UDS.KEYID = 0
6,263,001 UART: [idev] Sha1 KeyId Algorithm
6,285,695 UART: [idev] --
6,290,575 UART: [ldev] ++
6,291,149 UART: [ldev] CDI.KEYID = 6
6,292,060 UART: [ldev] SUBJECT.KEYID = 5
6,293,275 UART: [ldev] AUTHORITY.KEYID = 7
6,294,506 UART: [ldev] FE.KEYID = 1
6,306,469 UART: [ldev] Erasing FE.KEYID = 1
8,784,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,931 UART: [ldev] --
10,578,712 UART: [fwproc] Wait for Commands...
10,581,672 UART: [fwproc] Recv command 0x46574c44
10,583,654 UART: [fwproc] Recv'd Img size: 118548 bytes
10,663,798 UART: ROM Fatal Error: 0x000B0007
10,666,996 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
6,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,557,967 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,189 UART: [kat] LMS
1,169,501 UART: [kat] --
1,170,306 UART: [cold-reset] ++
1,170,774 UART: [fht] FHT @ 0x50003400
1,173,300 UART: [idev] ++
1,173,468 UART: [idev] CDI.KEYID = 6
1,173,829 UART: [idev] SUBJECT.KEYID = 7
1,174,254 UART: [idev] UDS.KEYID = 0
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,199,639 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,474 UART: [ldev] ++
1,209,642 UART: [ldev] CDI.KEYID = 6
1,210,006 UART: [ldev] SUBJECT.KEYID = 5
1,210,433 UART: [ldev] AUTHORITY.KEYID = 7
1,210,896 UART: [ldev] FE.KEYID = 1
1,216,146 UART: [ldev] Erasing FE.KEYID = 1
1,242,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,034 UART: [ldev] --
1,281,337 UART: [fwproc] Wait for Commands...
1,281,992 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,089 UART: ROM Fatal Error: 0x000B0007
1,307,246 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,749 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,569 UART: [kat] SHA2-256
901,509 UART: [kat] SHA2-384
904,118 UART: [kat] SHA2-512-ACC
906,019 UART: [kat] ECC-384
915,688 UART: [kat] HMAC-384Kdf
920,226 UART: [kat] LMS
1,168,538 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,233 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,199,216 UART: [idev] Sha1 KeyId Algorithm
1,207,870 UART: [idev] --
1,208,757 UART: [ldev] ++
1,208,925 UART: [ldev] CDI.KEYID = 6
1,209,289 UART: [ldev] SUBJECT.KEYID = 5
1,209,716 UART: [ldev] AUTHORITY.KEYID = 7
1,210,179 UART: [ldev] FE.KEYID = 1
1,215,537 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,299 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,509 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,806 UART: ROM Fatal Error: 0x000B0007
1,307,963 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,342 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
916,059 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,170,034 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,182,295 UART: [idev] Erasing UDS.KEYID = 0
1,199,113 UART: [idev] Sha1 KeyId Algorithm
1,208,017 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,240 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,675 UART: [fwproc] Wait for Commands...
1,281,476 UART: [fwproc] Recv command 0x46574c44
1,282,209 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,569 UART: ROM Fatal Error: 0x000B0007
1,306,726 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,275 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,037 UART: [state] LifecycleState = Unprovisioned
85,692 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,564 UART: [kat] SHA2-512-ACC
906,465 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,083 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,199,252 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,881 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,855 UART: [ldev] --
1,281,088 UART: [fwproc] Wait for Commands...
1,281,741 UART: [fwproc] Recv command 0x46574c44
1,282,474 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,270 UART: ROM Fatal Error: 0x000B0007
1,307,427 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,902 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Unprovisioned
86,223 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
88,154 UART: [kat] SHA2-256
891,704 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,808 UART: [kat] ++
895,960 UART: [kat] sha1
900,290 UART: [kat] SHA2-256
902,230 UART: [kat] SHA2-384
905,083 UART: [kat] SHA2-512-ACC
906,984 UART: [kat] ECC-384
917,237 UART: [kat] HMAC-384Kdf
921,765 UART: [kat] LMS
1,170,077 UART: [kat] --
1,170,898 UART: [cold-reset] ++
1,171,238 UART: [fht] FHT @ 0x50003400
1,173,834 UART: [idev] ++
1,174,002 UART: [idev] CDI.KEYID = 6
1,174,363 UART: [idev] SUBJECT.KEYID = 7
1,174,788 UART: [idev] UDS.KEYID = 0
1,182,793 UART: [idev] Erasing UDS.KEYID = 0
1,199,837 UART: [idev] Sha1 KeyId Algorithm
1,208,591 UART: [idev] --
1,209,688 UART: [ldev] ++
1,209,856 UART: [ldev] CDI.KEYID = 6
1,210,220 UART: [ldev] SUBJECT.KEYID = 5
1,210,647 UART: [ldev] AUTHORITY.KEYID = 7
1,211,110 UART: [ldev] FE.KEYID = 1
1,216,434 UART: [ldev] Erasing FE.KEYID = 1
1,242,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,444 UART: [ldev] --
1,281,845 UART: [fwproc] Wait for Commands...
1,282,468 UART: [fwproc] Recv command 0x46574c44
1,283,201 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,339 UART: ROM Fatal Error: 0x000B0007
1,307,496 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,161,903 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,061 UART: [cold-reset] ++
1,170,419 UART: [fht] FHT @ 0x50003400
1,173,145 UART: [idev] ++
1,173,313 UART: [idev] CDI.KEYID = 6
1,173,674 UART: [idev] SUBJECT.KEYID = 7
1,174,099 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,386 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,024 UART: [fwproc] Wait for Commands...
1,282,639 UART: [fwproc] Recv command 0x46574c44
1,283,372 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,864 UART: ROM Fatal Error: 0x000B0007
1,308,021 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,304 >>> mbox cmd response: failed
test test_image_validation::test_preamble_owner_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
6,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,691 UART:
193,071 UART: Running Caliptra ROM ...
194,243 UART:
194,410 UART: [state] CFI Enabled
261,830 UART: [state] LifecycleState = Unprovisioned
263,789 UART: [state] DebugLocked = No
266,046 UART: [state] WD Timer not started. Device not locked for debugging
269,086 UART: [kat] SHA2-256
448,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,555 UART: [kat] ++
460,004 UART: [kat] sha1
470,406 UART: [kat] SHA2-256
473,143 UART: [kat] SHA2-384
479,146 UART: [kat] SHA2-512-ACC
481,495 UART: [kat] ECC-384
2,925,566 UART: [kat] HMAC-384Kdf
2,949,310 UART: [kat] LMS
3,425,762 UART: [kat] --
3,429,325 UART: [cold-reset] ++
3,430,238 UART: [fht] FHT @ 0x50003400
3,440,524 UART: [idev] ++
3,441,095 UART: [idev] CDI.KEYID = 6
3,442,124 UART: [idev] SUBJECT.KEYID = 7
3,443,315 UART: [idev] UDS.KEYID = 0
3,479,099 UART: [idev] Erasing UDS.KEYID = 0
5,966,426 UART: [idev] Sha1 KeyId Algorithm
5,990,640 UART: [idev] --
5,996,102 UART: [ldev] ++
5,996,678 UART: [ldev] CDI.KEYID = 6
5,997,617 UART: [ldev] SUBJECT.KEYID = 5
5,998,843 UART: [ldev] AUTHORITY.KEYID = 7
6,000,082 UART: [ldev] FE.KEYID = 1
6,035,501 UART: [ldev] Erasing FE.KEYID = 1
8,539,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,875 UART: [ldev] --
10,349,771 UART: [fwproc] Wait for Commands...
10,353,067 UART: [fwproc] Recv command 0x46574c44
10,355,063 UART: [fwproc] Recv'd Img size: 118548 bytes
10,440,229 UART: ROM Fatal Error: 0x000B0008
10,443,480 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
5,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,317,896 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
6,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,514 UART:
192,897 UART: Running Caliptra ROM ...
194,057 UART:
603,753 UART: [state] CFI Enabled
618,582 UART: [state] LifecycleState = Unprovisioned
620,473 UART: [state] DebugLocked = No
622,013 UART: [state] WD Timer not started. Device not locked for debugging
625,749 UART: [kat] SHA2-256
805,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,234 UART: [kat] ++
816,674 UART: [kat] sha1
826,627 UART: [kat] SHA2-256
829,302 UART: [kat] SHA2-384
835,218 UART: [kat] SHA2-512-ACC
837,627 UART: [kat] ECC-384
3,278,017 UART: [kat] HMAC-384Kdf
3,291,239 UART: [kat] LMS
3,767,775 UART: [kat] --
3,772,896 UART: [cold-reset] ++
3,773,745 UART: [fht] FHT @ 0x50003400
3,785,584 UART: [idev] ++
3,786,198 UART: [idev] CDI.KEYID = 6
3,787,107 UART: [idev] SUBJECT.KEYID = 7
3,788,372 UART: [idev] UDS.KEYID = 0
3,804,830 UART: [idev] Erasing UDS.KEYID = 0
6,268,364 UART: [idev] Sha1 KeyId Algorithm
6,292,776 UART: [idev] --
6,297,200 UART: [ldev] ++
6,297,767 UART: [ldev] CDI.KEYID = 6
6,298,729 UART: [ldev] SUBJECT.KEYID = 5
6,299,906 UART: [ldev] AUTHORITY.KEYID = 7
6,301,138 UART: [ldev] FE.KEYID = 1
6,312,547 UART: [ldev] Erasing FE.KEYID = 1
8,792,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,195 UART: [ldev] --
10,586,732 UART: [fwproc] Wait for Commands...
10,589,526 UART: [fwproc] Recv command 0x46574c44
10,591,512 UART: [fwproc] Recv'd Img size: 118548 bytes
10,677,270 UART: ROM Fatal Error: 0x000B0008
10,680,488 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
6,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,564,450 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,060 UART: [kat] ++
895,212 UART: [kat] sha1
899,488 UART: [kat] SHA2-256
901,428 UART: [kat] SHA2-384
904,167 UART: [kat] SHA2-512-ACC
906,068 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,170,142 UART: [cold-reset] ++
1,170,592 UART: [fht] FHT @ 0x50003400
1,173,486 UART: [idev] ++
1,173,654 UART: [idev] CDI.KEYID = 6
1,174,015 UART: [idev] SUBJECT.KEYID = 7
1,174,440 UART: [idev] UDS.KEYID = 0
1,182,489 UART: [idev] Erasing UDS.KEYID = 0
1,199,469 UART: [idev] Sha1 KeyId Algorithm
1,208,473 UART: [idev] --
1,209,436 UART: [ldev] ++
1,209,604 UART: [ldev] CDI.KEYID = 6
1,209,968 UART: [ldev] SUBJECT.KEYID = 5
1,210,395 UART: [ldev] AUTHORITY.KEYID = 7
1,210,858 UART: [ldev] FE.KEYID = 1
1,215,632 UART: [ldev] Erasing FE.KEYID = 1
1,241,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,655 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,182 UART: ROM Fatal Error: 0x000B0008
1,308,339 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,888 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
891,727 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,831 UART: [kat] ++
895,983 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,422 UART: [kat] HMAC-384Kdf
921,030 UART: [kat] LMS
1,169,342 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,967 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,182,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,800 UART: [idev] Sha1 KeyId Algorithm
1,208,562 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,300 UART: [fwproc] Wait for Commands...
1,282,943 UART: [fwproc] Recv command 0x46574c44
1,283,676 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,029 UART: ROM Fatal Error: 0x000B0008
1,309,186 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,375 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,629 UART: [kat] SHA2-512-ACC
906,530 UART: [kat] ECC-384
916,447 UART: [kat] HMAC-384Kdf
921,075 UART: [kat] LMS
1,169,387 UART: [kat] --
1,170,484 UART: [cold-reset] ++
1,170,938 UART: [fht] FHT @ 0x50003400
1,173,660 UART: [idev] ++
1,173,828 UART: [idev] CDI.KEYID = 6
1,174,189 UART: [idev] SUBJECT.KEYID = 7
1,174,614 UART: [idev] UDS.KEYID = 0
1,182,867 UART: [idev] Erasing UDS.KEYID = 0
1,200,635 UART: [idev] Sha1 KeyId Algorithm
1,209,355 UART: [idev] --
1,210,254 UART: [ldev] ++
1,210,422 UART: [ldev] CDI.KEYID = 6
1,210,786 UART: [ldev] SUBJECT.KEYID = 5
1,211,213 UART: [ldev] AUTHORITY.KEYID = 7
1,211,676 UART: [ldev] FE.KEYID = 1
1,217,094 UART: [ldev] Erasing FE.KEYID = 1
1,243,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,322 UART: [ldev] --
1,282,777 UART: [fwproc] Wait for Commands...
1,283,522 UART: [fwproc] Recv command 0x46574c44
1,284,255 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,974 UART: ROM Fatal Error: 0x000B0008
1,311,131 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,840 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,745 UART: [state] LifecycleState = Unprovisioned
86,400 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,211 UART: [kat] SHA2-256
891,761 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,865 UART: [kat] ++
896,017 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,261 UART: [cold-reset] ++
1,170,795 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,058 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,911 UART: [ldev] --
1,282,202 UART: [fwproc] Wait for Commands...
1,282,963 UART: [fwproc] Recv command 0x46574c44
1,283,696 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,411 UART: ROM Fatal Error: 0x000B0008
1,310,568 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,777 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,442 UART: [kat] SHA2-256
890,992 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,096 UART: [kat] ++
895,248 UART: [kat] sha1
899,358 UART: [kat] SHA2-256
901,298 UART: [kat] SHA2-384
904,095 UART: [kat] SHA2-512-ACC
905,996 UART: [kat] ECC-384
915,977 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,892 UART: [cold-reset] ++
1,170,362 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,948 UART: [ldev] ++
1,209,116 UART: [ldev] CDI.KEYID = 6
1,209,480 UART: [ldev] SUBJECT.KEYID = 5
1,209,907 UART: [ldev] AUTHORITY.KEYID = 7
1,210,370 UART: [ldev] FE.KEYID = 1
1,215,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,216 UART: [ldev] --
1,280,479 UART: [fwproc] Wait for Commands...
1,281,266 UART: [fwproc] Recv command 0x46574c44
1,281,999 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,156 UART: ROM Fatal Error: 0x000B0008
1,308,313 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,334 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,714 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,653 UART: [cold-reset] ++
1,171,125 UART: [fht] FHT @ 0x50003400
1,173,869 UART: [idev] ++
1,174,037 UART: [idev] CDI.KEYID = 6
1,174,398 UART: [idev] SUBJECT.KEYID = 7
1,174,823 UART: [idev] UDS.KEYID = 0
1,183,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,796 UART: [idev] Sha1 KeyId Algorithm
1,208,692 UART: [idev] --
1,209,633 UART: [ldev] ++
1,209,801 UART: [ldev] CDI.KEYID = 6
1,210,165 UART: [ldev] SUBJECT.KEYID = 5
1,210,592 UART: [ldev] AUTHORITY.KEYID = 7
1,211,055 UART: [ldev] FE.KEYID = 1
1,216,051 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,639 UART: [ldev] --
1,281,062 UART: [fwproc] Wait for Commands...
1,281,799 UART: [fwproc] Recv command 0x46574c44
1,282,532 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,689 UART: ROM Fatal Error: 0x000B0008
1,307,846 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,839 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_ecc_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,230,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,380,914 UART:
2,381,342 UART: Running Caliptra ROM ...
2,382,515 UART:
2,382,691 UART: [state] CFI Enabled
2,383,662 UART: [state] LifecycleState = Unprovisioned
2,385,322 UART: [state] DebugLocked = No
2,386,445 UART: [state] WD Timer not started. Device not locked for debugging
2,388,928 UART: [kat] SHA2-256
2,389,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,392,611 UART: [kat] ++
2,393,124 UART: [kat] sha1
2,393,645 UART: [kat] SHA2-256
2,394,393 UART: [kat] SHA2-384
2,395,067 UART: [kat] SHA2-512-ACC
2,395,879 UART: [kat] ECC-384
2,925,661 UART: [kat] HMAC-384Kdf
2,951,035 UART: [kat] LMS
3,427,503 UART: [kat] --
3,433,651 UART: [cold-reset] ++
3,434,562 UART: [fht] FHT @ 0x50003400
3,445,003 UART: [idev] ++
3,445,573 UART: [idev] CDI.KEYID = 6
3,446,596 UART: [idev] SUBJECT.KEYID = 7
3,447,818 UART: [idev] UDS.KEYID = 0
3,481,259 UART: [idev] Erasing UDS.KEYID = 0
5,967,722 UART: [idev] Sha1 KeyId Algorithm
5,990,411 UART: [idev] --
5,995,494 UART: [ldev] ++
5,996,068 UART: [ldev] CDI.KEYID = 6
5,997,094 UART: [ldev] SUBJECT.KEYID = 5
5,998,205 UART: [ldev] AUTHORITY.KEYID = 7
5,999,496 UART: [ldev] FE.KEYID = 1
6,039,374 UART: [ldev] Erasing FE.KEYID = 1
8,544,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,807 UART: [ldev] --
10,354,853 UART: [fwproc] Wait for Commands...
10,357,226 UART: [fwproc] Recv command 0x46574c44
10,359,220 UART: [fwproc] Recv'd Img size: 118548 bytes
10,448,808 UART: ROM Fatal Error: 0x000B0009
10,452,057 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,843 writing to cptra_bootfsm_go
2,068,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,218,296 UART:
2,218,707 UART: Running Caliptra ROM ...
2,219,875 UART:
2,220,056 UART: [state] CFI Enabled
2,221,030 UART: [state] LifecycleState = Unprovisioned
2,222,692 UART: [state] DebugLocked = No
2,223,803 UART: [state] WD Timer not started. Device not locked for debugging
2,226,274 UART: [kat] SHA2-256
2,226,949 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,950 UART: [kat] ++
2,230,480 UART: [kat] sha1
2,231,006 UART: [kat] SHA2-256
2,231,678 UART: [kat] SHA2-384
2,232,336 UART: [kat] SHA2-512-ACC
2,233,229 UART: [kat] ECC-384
2,946,745 UART: [kat] HMAC-384Kdf
2,970,535 UART: [kat] LMS
3,447,025 UART: [kat] --
3,452,566 UART: [cold-reset] ++
3,454,619 UART: [fht] FHT @ 0x50003400
3,466,355 UART: [idev] ++
3,466,923 UART: [idev] CDI.KEYID = 6
3,467,941 UART: [idev] SUBJECT.KEYID = 7
3,469,105 UART: [idev] UDS.KEYID = 0
3,501,634 UART: [idev] Erasing UDS.KEYID = 0
5,985,876 UART: [idev] Sha1 KeyId Algorithm
6,009,674 UART: [idev] --
6,013,675 UART: [ldev] ++
6,014,254 UART: [ldev] CDI.KEYID = 6
6,015,174 UART: [ldev] SUBJECT.KEYID = 5
6,016,397 UART: [ldev] AUTHORITY.KEYID = 7
6,017,641 UART: [ldev] FE.KEYID = 1
6,056,871 UART: [ldev] Erasing FE.KEYID = 1
8,562,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,106 UART: [ldev] --
10,373,964 UART: [fwproc] Wait for Commands...
10,375,905 UART: [fwproc] Recv command 0x46574c44
10,377,912 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,826 UART: ROM Fatal Error: 0x000B0009
10,470,074 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
2,067,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,491 UART:
2,217,919 UART: Running Caliptra ROM ...
2,219,102 UART:
2,219,291 UART: [state] CFI Enabled
2,220,273 UART: [state] LifecycleState = Unprovisioned
2,221,920 UART: [state] DebugLocked = No
2,223,053 UART: [state] WD Timer not started. Device not locked for debugging
2,225,539 UART: [kat] SHA2-256
2,226,212 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,227 UART: [kat] ++
2,229,686 UART: [kat] sha1
2,230,207 UART: [kat] SHA2-256
2,231,078 UART: [kat] SHA2-384
2,231,759 UART: [kat] SHA2-512-ACC
2,232,674 UART: [kat] ECC-384
2,948,700 UART: [kat] HMAC-384Kdf
2,971,375 UART: [kat] LMS
3,447,844 UART: [kat] --
3,452,609 UART: [cold-reset] ++
3,455,140 UART: [fht] FHT @ 0x50003400
3,466,555 UART: [idev] ++
3,467,129 UART: [idev] CDI.KEYID = 6
3,468,125 UART: [idev] SUBJECT.KEYID = 7
3,469,350 UART: [idev] UDS.KEYID = 0
3,500,558 UART: [idev] Erasing UDS.KEYID = 0
5,985,250 UART: [idev] Sha1 KeyId Algorithm
6,008,287 UART: [idev] --
6,012,436 UART: [ldev] ++
6,013,025 UART: [ldev] CDI.KEYID = 6
6,013,953 UART: [ldev] SUBJECT.KEYID = 5
6,015,128 UART: [ldev] AUTHORITY.KEYID = 7
6,016,425 UART: [ldev] FE.KEYID = 1
6,056,302 UART: [ldev] Erasing FE.KEYID = 1
8,564,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,438 UART: [ldev] --
10,371,415 UART: [fwproc] Wait for Commands...
10,373,193 UART: [fwproc] Recv command 0x46574c44
10,375,181 UART: [fwproc] Recv'd Img size: 118548 bytes
10,460,249 UART: ROM Fatal Error: 0x000B0009
10,463,499 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
2,073,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,223,306 UART:
2,223,738 UART: Running Caliptra ROM ...
2,224,914 UART:
2,225,092 UART: [state] CFI Enabled
2,226,058 UART: [state] LifecycleState = Unprovisioned
2,227,725 UART: [state] DebugLocked = No
2,228,835 UART: [state] WD Timer not started. Device not locked for debugging
2,231,312 UART: [kat] SHA2-256
2,231,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,234,982 UART: [kat] ++
2,235,439 UART: [kat] sha1
2,235,963 UART: [kat] SHA2-256
2,236,708 UART: [kat] SHA2-384
2,237,377 UART: [kat] SHA2-512-ACC
2,238,179 UART: [kat] ECC-384
2,926,118 UART: [kat] HMAC-384Kdf
2,950,940 UART: [kat] LMS
3,427,399 UART: [kat] --
3,431,394 UART: [cold-reset] ++
3,433,706 UART: [fht] FHT @ 0x50003400
3,445,124 UART: [idev] ++
3,445,696 UART: [idev] CDI.KEYID = 6
3,446,673 UART: [idev] SUBJECT.KEYID = 7
3,447,889 UART: [idev] UDS.KEYID = 0
3,480,351 UART: [idev] Erasing UDS.KEYID = 0
5,965,518 UART: [idev] Sha1 KeyId Algorithm
5,989,506 UART: [idev] --
5,994,849 UART: [ldev] ++
5,995,424 UART: [ldev] CDI.KEYID = 6
5,996,338 UART: [ldev] SUBJECT.KEYID = 5
5,997,559 UART: [ldev] AUTHORITY.KEYID = 7
5,998,797 UART: [ldev] FE.KEYID = 1
6,035,815 UART: [ldev] Erasing FE.KEYID = 1
8,543,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,797 UART: [ldev] --
10,353,636 UART: [fwproc] Wait for Commands...
10,356,019 UART: [fwproc] Recv command 0x46574c44
10,358,035 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,920,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,322,385 >>> mbox cmd response: success
14,327,205 UART: [afmc] ++
14,327,798 UART: [afmc] CDI.KEYID = 6
14,328,775 UART: [afmc] SUBJECT.KEYID = 7
14,329,903 UART: [afmc] AUTHORITY.KEYID = 5
16,872,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,671 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,614,583 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,630,588 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,646,199 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,671,622 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
2,226,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,354,316 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
2,073,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,339,967 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,064,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,353,721 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
2,071,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,745 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
2,249,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,399,505 UART:
2,399,916 UART: Running Caliptra ROM ...
2,401,088 UART:
2,401,281 UART: [state] CFI Enabled
2,402,245 UART: [state] LifecycleState = Unprovisioned
2,403,902 UART: [state] DebugLocked = No
2,405,019 UART: [state] WD Timer not started. Device not locked for debugging
2,407,511 UART: [kat] SHA2-256
2,408,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,411,216 UART: [kat] ++
2,411,670 UART: [kat] sha1
2,412,179 UART: [kat] SHA2-256
2,412,915 UART: [kat] SHA2-384
2,413,581 UART: [kat] SHA2-512-ACC
2,414,404 UART: [kat] ECC-384
3,280,974 UART: [kat] HMAC-384Kdf
3,294,328 UART: [kat] LMS
3,770,844 UART: [kat] --
3,773,674 UART: [cold-reset] ++
3,775,337 UART: [fht] FHT @ 0x50003400
3,786,527 UART: [idev] ++
3,787,087 UART: [idev] CDI.KEYID = 6
3,788,025 UART: [idev] SUBJECT.KEYID = 7
3,789,292 UART: [idev] UDS.KEYID = 0
3,804,689 UART: [idev] Erasing UDS.KEYID = 0
6,262,183 UART: [idev] Sha1 KeyId Algorithm
6,284,612 UART: [idev] --
6,290,120 UART: [ldev] ++
6,290,689 UART: [ldev] CDI.KEYID = 6
6,291,573 UART: [ldev] SUBJECT.KEYID = 5
6,292,834 UART: [ldev] AUTHORITY.KEYID = 7
6,294,018 UART: [ldev] FE.KEYID = 1
6,306,691 UART: [ldev] Erasing FE.KEYID = 1
8,789,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,624 UART: [ldev] --
10,584,783 UART: [fwproc] Wait for Commands...
10,587,500 UART: [fwproc] Recv command 0x46574c44
10,589,543 UART: [fwproc] Recv'd Img size: 118548 bytes
10,672,325 UART: ROM Fatal Error: 0x000B0009
10,675,573 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
2,070,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,220,001 UART:
2,220,435 UART: Running Caliptra ROM ...
2,221,612 UART:
2,221,798 UART: [state] CFI Enabled
2,222,756 UART: [state] LifecycleState = Unprovisioned
2,224,413 UART: [state] DebugLocked = No
2,225,524 UART: [state] WD Timer not started. Device not locked for debugging
2,227,992 UART: [kat] SHA2-256
2,228,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,231,657 UART: [kat] ++
2,232,109 UART: [kat] sha1
2,232,617 UART: [kat] SHA2-256
2,233,354 UART: [kat] SHA2-384
2,234,016 UART: [kat] SHA2-512-ACC
2,234,856 UART: [kat] ECC-384
3,283,140 UART: [kat] HMAC-384Kdf
3,296,187 UART: [kat] LMS
3,772,680 UART: [kat] --
3,778,936 UART: [cold-reset] ++
3,781,025 UART: [fht] FHT @ 0x50003400
3,791,678 UART: [idev] ++
3,792,249 UART: [idev] CDI.KEYID = 6
3,793,209 UART: [idev] SUBJECT.KEYID = 7
3,794,417 UART: [idev] UDS.KEYID = 0
3,813,525 UART: [idev] Erasing UDS.KEYID = 0
6,273,349 UART: [idev] Sha1 KeyId Algorithm
6,296,956 UART: [idev] --
6,303,022 UART: [ldev] ++
6,303,601 UART: [ldev] CDI.KEYID = 6
6,304,565 UART: [ldev] SUBJECT.KEYID = 5
6,305,720 UART: [ldev] AUTHORITY.KEYID = 7
6,307,003 UART: [ldev] FE.KEYID = 1
6,319,692 UART: [ldev] Erasing FE.KEYID = 1
8,797,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,112 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,686 UART: [ldev] --
10,590,410 UART: [fwproc] Wait for Commands...
10,592,177 UART: [fwproc] Recv command 0x46574c44
10,594,216 UART: [fwproc] Recv'd Img size: 118548 bytes
10,679,540 UART: ROM Fatal Error: 0x000B0009
10,682,736 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
2,062,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,212,187 UART:
2,212,598 UART: Running Caliptra ROM ...
2,213,772 UART:
2,213,955 UART: [state] CFI Enabled
2,214,920 UART: [state] LifecycleState = Unprovisioned
2,216,565 UART: [state] DebugLocked = No
2,217,673 UART: [state] WD Timer not started. Device not locked for debugging
2,220,152 UART: [kat] SHA2-256
2,220,821 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,223,825 UART: [kat] ++
2,224,277 UART: [kat] sha1
2,224,786 UART: [kat] SHA2-256
2,225,521 UART: [kat] SHA2-384
2,226,206 UART: [kat] SHA2-512-ACC
2,227,038 UART: [kat] ECC-384
3,281,301 UART: [kat] HMAC-384Kdf
3,294,195 UART: [kat] LMS
3,770,679 UART: [kat] --
3,775,651 UART: [cold-reset] ++
3,778,173 UART: [fht] FHT @ 0x50003400
3,789,903 UART: [idev] ++
3,790,505 UART: [idev] CDI.KEYID = 6
3,791,415 UART: [idev] SUBJECT.KEYID = 7
3,792,691 UART: [idev] UDS.KEYID = 0
3,809,801 UART: [idev] Erasing UDS.KEYID = 0
6,270,453 UART: [idev] Sha1 KeyId Algorithm
6,294,499 UART: [idev] --
6,300,918 UART: [ldev] ++
6,301,486 UART: [ldev] CDI.KEYID = 6
6,302,465 UART: [ldev] SUBJECT.KEYID = 5
6,303,625 UART: [ldev] AUTHORITY.KEYID = 7
6,304,908 UART: [ldev] FE.KEYID = 1
6,317,337 UART: [ldev] Erasing FE.KEYID = 1
8,795,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,910 UART: [ldev] --
10,591,859 UART: [fwproc] Wait for Commands...
10,594,288 UART: [fwproc] Recv command 0x46574c44
10,596,277 UART: [fwproc] Recv'd Img size: 118548 bytes
10,682,455 UART: ROM Fatal Error: 0x000B0009
10,685,703 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,666 writing to cptra_bootfsm_go
2,067,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,649 UART:
2,217,054 UART: Running Caliptra ROM ...
2,218,219 UART:
2,218,390 UART: [state] CFI Enabled
2,219,341 UART: [state] LifecycleState = Unprovisioned
2,220,995 UART: [state] DebugLocked = No
2,222,105 UART: [state] WD Timer not started. Device not locked for debugging
2,224,577 UART: [kat] SHA2-256
2,225,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,262 UART: [kat] ++
2,228,715 UART: [kat] sha1
2,229,225 UART: [kat] SHA2-256
2,229,961 UART: [kat] SHA2-384
2,230,624 UART: [kat] SHA2-512-ACC
2,231,450 UART: [kat] ECC-384
3,284,148 UART: [kat] HMAC-384Kdf
3,296,383 UART: [kat] LMS
3,772,902 UART: [kat] --
3,776,670 UART: [cold-reset] ++
3,777,571 UART: [fht] FHT @ 0x50003400
3,788,216 UART: [idev] ++
3,788,778 UART: [idev] CDI.KEYID = 6
3,789,789 UART: [idev] SUBJECT.KEYID = 7
3,791,010 UART: [idev] UDS.KEYID = 0
3,805,690 UART: [idev] Erasing UDS.KEYID = 0
6,264,184 UART: [idev] Sha1 KeyId Algorithm
6,288,604 UART: [idev] --
6,293,671 UART: [ldev] ++
6,294,238 UART: [ldev] CDI.KEYID = 6
6,295,148 UART: [ldev] SUBJECT.KEYID = 5
6,296,357 UART: [ldev] AUTHORITY.KEYID = 7
6,297,640 UART: [ldev] FE.KEYID = 1
6,307,578 UART: [ldev] Erasing FE.KEYID = 1
8,785,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,460 UART: [ldev] --
10,582,281 UART: [fwproc] Wait for Commands...
10,584,292 UART: [fwproc] Recv command 0x46574c44
10,586,346 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,879 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,140,346 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,542,241 >>> mbox cmd response: success
14,546,233 UART: [afmc] ++
14,546,816 UART: [afmc] CDI.KEYID = 6
14,547,777 UART: [afmc] SUBJECT.KEYID = 7
14,548,990 UART: [afmc] AUTHORITY.KEYID = 5
17,052,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,078 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,296 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,792,177 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,808,180 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,823,785 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,847,373 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.56s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,455 writing to cptra_bootfsm_go
2,233,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,560,407 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
2,074,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,860 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
2,072,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,611 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,083,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,467 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,084 UART: [kat] SHA2-256
891,634 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,738 UART: [kat] ++
895,890 UART: [kat] sha1
900,030 UART: [kat] SHA2-256
901,970 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
915,801 UART: [kat] HMAC-384Kdf
920,391 UART: [kat] LMS
1,168,703 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,884 UART: [fht] FHT @ 0x50003400
1,172,506 UART: [idev] ++
1,172,674 UART: [idev] CDI.KEYID = 6
1,173,035 UART: [idev] SUBJECT.KEYID = 7
1,173,460 UART: [idev] UDS.KEYID = 0
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,855 UART: [idev] --
1,207,948 UART: [ldev] ++
1,208,116 UART: [ldev] CDI.KEYID = 6
1,208,480 UART: [ldev] SUBJECT.KEYID = 5
1,208,907 UART: [ldev] AUTHORITY.KEYID = 7
1,209,370 UART: [ldev] FE.KEYID = 1
1,214,618 UART: [ldev] Erasing FE.KEYID = 1
1,240,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,278 UART: [ldev] --
1,279,589 UART: [fwproc] Wait for Commands...
1,280,360 UART: [fwproc] Recv command 0x46574c44
1,281,093 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,264 UART: ROM Fatal Error: 0x000B0009
1,307,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,147 UART: [kat] SHA2-512-ACC
906,048 UART: [kat] ECC-384
915,411 UART: [kat] HMAC-384Kdf
920,081 UART: [kat] LMS
1,168,393 UART: [kat] --
1,169,132 UART: [cold-reset] ++
1,169,500 UART: [fht] FHT @ 0x50003400
1,172,220 UART: [idev] ++
1,172,388 UART: [idev] CDI.KEYID = 6
1,172,749 UART: [idev] SUBJECT.KEYID = 7
1,173,174 UART: [idev] UDS.KEYID = 0
1,181,067 UART: [idev] Erasing UDS.KEYID = 0
1,198,327 UART: [idev] Sha1 KeyId Algorithm
1,207,101 UART: [idev] --
1,208,194 UART: [ldev] ++
1,208,362 UART: [ldev] CDI.KEYID = 6
1,208,726 UART: [ldev] SUBJECT.KEYID = 5
1,209,153 UART: [ldev] AUTHORITY.KEYID = 7
1,209,616 UART: [ldev] FE.KEYID = 1
1,214,588 UART: [ldev] Erasing FE.KEYID = 1
1,240,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,648 UART: ROM Fatal Error: 0x000B0009
1,307,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,658 UART: [kat] SHA2-256
901,598 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,633 UART: [kat] HMAC-384Kdf
920,243 UART: [kat] LMS
1,168,555 UART: [kat] --
1,169,336 UART: [cold-reset] ++
1,169,782 UART: [fht] FHT @ 0x50003400
1,172,358 UART: [idev] ++
1,172,526 UART: [idev] CDI.KEYID = 6
1,172,887 UART: [idev] SUBJECT.KEYID = 7
1,173,312 UART: [idev] UDS.KEYID = 0
1,181,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,333 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,733 UART: [fwproc] Wait for Commands...
1,281,414 UART: [fwproc] Recv command 0x46574c44
1,282,147 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,126 UART: ROM Fatal Error: 0x000B0009
1,308,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,742 UART: [state] LifecycleState = Unprovisioned
85,397 UART: [state] DebugLocked = No
85,943 UART: [state] WD Timer not started. Device not locked for debugging
87,070 UART: [kat] SHA2-256
890,620 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,724 UART: [kat] ++
894,876 UART: [kat] sha1
899,024 UART: [kat] SHA2-256
900,964 UART: [kat] SHA2-384
903,593 UART: [kat] SHA2-512-ACC
905,494 UART: [kat] ECC-384
914,977 UART: [kat] HMAC-384Kdf
919,357 UART: [kat] LMS
1,167,669 UART: [kat] --
1,168,456 UART: [cold-reset] ++
1,168,876 UART: [fht] FHT @ 0x50003400
1,171,644 UART: [idev] ++
1,171,812 UART: [idev] CDI.KEYID = 6
1,172,173 UART: [idev] SUBJECT.KEYID = 7
1,172,598 UART: [idev] UDS.KEYID = 0
1,180,441 UART: [idev] Erasing UDS.KEYID = 0
1,197,141 UART: [idev] Sha1 KeyId Algorithm
1,206,143 UART: [idev] --
1,207,040 UART: [ldev] ++
1,207,208 UART: [ldev] CDI.KEYID = 6
1,207,572 UART: [ldev] SUBJECT.KEYID = 5
1,207,999 UART: [ldev] AUTHORITY.KEYID = 7
1,208,462 UART: [ldev] FE.KEYID = 1
1,213,612 UART: [ldev] Erasing FE.KEYID = 1
1,239,803 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,638 UART: [ldev] --
1,278,873 UART: [fwproc] Wait for Commands...
1,279,564 UART: [fwproc] Recv command 0x46574c44
1,280,297 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,305 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,651,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,732 >>> mbox cmd response: success
2,823,912 UART: [afmc] ++
2,824,080 UART: [afmc] CDI.KEYID = 6
2,824,443 UART: [afmc] SUBJECT.KEYID = 7
2,824,869 UART: [afmc] AUTHORITY.KEYID = 5
2,860,467 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,587 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,883,299 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,182 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,894,895 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,902,623 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,970 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,643 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,585 UART: [kat] SHA2-256
891,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,239 UART: [kat] ++
895,391 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,696 UART: [kat] HMAC-384Kdf
920,368 UART: [kat] LMS
1,168,680 UART: [kat] --
1,169,653 UART: [cold-reset] ++
1,170,207 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,181,918 UART: [idev] Erasing UDS.KEYID = 0
1,198,246 UART: [idev] Sha1 KeyId Algorithm
1,207,164 UART: [idev] --
1,208,193 UART: [ldev] ++
1,208,361 UART: [ldev] CDI.KEYID = 6
1,208,725 UART: [ldev] SUBJECT.KEYID = 5
1,209,152 UART: [ldev] AUTHORITY.KEYID = 7
1,209,615 UART: [ldev] FE.KEYID = 1
1,214,953 UART: [ldev] Erasing FE.KEYID = 1
1,241,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,021 UART: [ldev] --
1,280,242 UART: [fwproc] Wait for Commands...
1,280,851 UART: [fwproc] Recv command 0x46574c44
1,281,584 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,457 UART: ROM Fatal Error: 0x000B0009
1,307,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,760 UART: [kat] SHA2-512-ACC
906,661 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,212 UART: [kat] LMS
1,169,524 UART: [kat] --
1,170,623 UART: [cold-reset] ++
1,171,035 UART: [fht] FHT @ 0x50003400
1,173,639 UART: [idev] ++
1,173,807 UART: [idev] CDI.KEYID = 6
1,174,168 UART: [idev] SUBJECT.KEYID = 7
1,174,593 UART: [idev] UDS.KEYID = 0
1,182,780 UART: [idev] Erasing UDS.KEYID = 0
1,199,594 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,271 UART: [ldev] ++
1,209,439 UART: [ldev] CDI.KEYID = 6
1,209,803 UART: [ldev] SUBJECT.KEYID = 5
1,210,230 UART: [ldev] AUTHORITY.KEYID = 7
1,210,693 UART: [ldev] FE.KEYID = 1
1,216,017 UART: [ldev] Erasing FE.KEYID = 1
1,242,154 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,743 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,929 UART: [fwproc] Recv command 0x46574c44
1,282,662 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,641 UART: ROM Fatal Error: 0x000B0009
1,308,798 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
899,883 UART: [kat] SHA2-256
901,823 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,618 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,182,708 UART: [idev] Erasing UDS.KEYID = 0
1,199,694 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,087 UART: [ldev] SUBJECT.KEYID = 5
1,210,514 UART: [ldev] AUTHORITY.KEYID = 7
1,210,977 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,195 UART: [fwproc] Recv command 0x46574c44
1,282,928 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,393 UART: ROM Fatal Error: 0x000B0009
1,309,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,389 UART: [kat] SHA2-256
890,939 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,043 UART: [kat] ++
895,195 UART: [kat] sha1
899,259 UART: [kat] SHA2-256
901,199 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
915,822 UART: [kat] HMAC-384Kdf
920,666 UART: [kat] LMS
1,168,978 UART: [kat] --
1,169,771 UART: [cold-reset] ++
1,170,241 UART: [fht] FHT @ 0x50003400
1,172,887 UART: [idev] ++
1,173,055 UART: [idev] CDI.KEYID = 6
1,173,416 UART: [idev] SUBJECT.KEYID = 7
1,173,841 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,209,287 UART: [ldev] ++
1,209,455 UART: [ldev] CDI.KEYID = 6
1,209,819 UART: [ldev] SUBJECT.KEYID = 5
1,210,246 UART: [ldev] AUTHORITY.KEYID = 7
1,210,709 UART: [ldev] FE.KEYID = 1
1,215,665 UART: [ldev] Erasing FE.KEYID = 1
1,242,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,739 UART: [ldev] --
1,282,112 UART: [fwproc] Wait for Commands...
1,282,773 UART: [fwproc] Recv command 0x46574c44
1,283,506 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,114 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,793 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,129 >>> mbox cmd response: success
2,826,241 UART: [afmc] ++
2,826,409 UART: [afmc] CDI.KEYID = 6
2,826,772 UART: [afmc] SUBJECT.KEYID = 7
2,827,198 UART: [afmc] AUTHORITY.KEYID = 5
2,863,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,164 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,876 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,759 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,472 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,226 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,482 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,471 UART: [kat] SHA2-512-ACC
906,372 UART: [kat] ECC-384
916,029 UART: [kat] HMAC-384Kdf
920,509 UART: [kat] LMS
1,168,821 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,166 UART: [fht] FHT @ 0x50003400
1,172,952 UART: [idev] ++
1,173,120 UART: [idev] CDI.KEYID = 6
1,173,481 UART: [idev] SUBJECT.KEYID = 7
1,173,906 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,199,291 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,208,868 UART: [ldev] ++
1,209,036 UART: [ldev] CDI.KEYID = 6
1,209,400 UART: [ldev] SUBJECT.KEYID = 5
1,209,827 UART: [ldev] AUTHORITY.KEYID = 7
1,210,290 UART: [ldev] FE.KEYID = 1
1,215,448 UART: [ldev] Erasing FE.KEYID = 1
1,240,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,924 UART: [ldev] --
1,280,179 UART: [fwproc] Wait for Commands...
1,280,810 UART: [fwproc] Recv command 0x46574c44
1,281,543 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,494 UART: ROM Fatal Error: 0x000B0009
1,307,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,084 UART: [kat] ++
895,236 UART: [kat] sha1
899,268 UART: [kat] SHA2-256
901,208 UART: [kat] SHA2-384
904,103 UART: [kat] SHA2-512-ACC
906,004 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,663 UART: [kat] LMS
1,168,975 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,594 UART: [fht] FHT @ 0x50003400
1,173,382 UART: [idev] ++
1,173,550 UART: [idev] CDI.KEYID = 6
1,173,911 UART: [idev] SUBJECT.KEYID = 7
1,174,336 UART: [idev] UDS.KEYID = 0
1,182,577 UART: [idev] Erasing UDS.KEYID = 0
1,199,045 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,578 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,402 UART: [ldev] --
1,280,793 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x46574c44
1,282,327 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,486 UART: ROM Fatal Error: 0x000B0009
1,308,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,946 UART: [kat] SHA2-256
901,886 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,543 UART: [kat] LMS
1,168,855 UART: [kat] --
1,169,890 UART: [cold-reset] ++
1,170,300 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,182,191 UART: [idev] Erasing UDS.KEYID = 0
1,199,211 UART: [idev] Sha1 KeyId Algorithm
1,208,211 UART: [idev] --
1,209,452 UART: [ldev] ++
1,209,620 UART: [ldev] CDI.KEYID = 6
1,209,984 UART: [ldev] SUBJECT.KEYID = 5
1,210,411 UART: [ldev] AUTHORITY.KEYID = 7
1,210,874 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,241,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,280,877 UART: [fwproc] Wait for Commands...
1,281,458 UART: [fwproc] Recv command 0x46574c44
1,282,191 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,088 UART: ROM Fatal Error: 0x000B0009
1,308,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,681 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
891,512 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,616 UART: [kat] ++
895,768 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,463 UART: [kat] HMAC-384Kdf
921,111 UART: [kat] LMS
1,169,423 UART: [kat] --
1,170,318 UART: [cold-reset] ++
1,170,884 UART: [fht] FHT @ 0x50003400
1,173,526 UART: [idev] ++
1,173,694 UART: [idev] CDI.KEYID = 6
1,174,055 UART: [idev] SUBJECT.KEYID = 7
1,174,480 UART: [idev] UDS.KEYID = 0
1,182,305 UART: [idev] Erasing UDS.KEYID = 0
1,198,623 UART: [idev] Sha1 KeyId Algorithm
1,207,645 UART: [idev] --
1,208,714 UART: [ldev] ++
1,208,882 UART: [ldev] CDI.KEYID = 6
1,209,246 UART: [ldev] SUBJECT.KEYID = 5
1,209,673 UART: [ldev] AUTHORITY.KEYID = 7
1,210,136 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,436 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,476 UART: [fwproc] Recv command 0x46574c44
1,282,209 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,114 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,654 >>> mbox cmd response: success
2,826,798 UART: [afmc] ++
2,826,966 UART: [afmc] CDI.KEYID = 6
2,827,329 UART: [afmc] SUBJECT.KEYID = 7
2,827,755 UART: [afmc] AUTHORITY.KEYID = 5
2,863,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,718 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,467 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,179 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,062 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,775 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,537 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,476 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,293 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,628 UART: [kat] HMAC-384Kdf
921,192 UART: [kat] LMS
1,169,504 UART: [kat] --
1,170,533 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,878 UART: [idev] Sha1 KeyId Algorithm
1,208,822 UART: [idev] --
1,210,115 UART: [ldev] ++
1,210,283 UART: [ldev] CDI.KEYID = 6
1,210,647 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,587 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,402 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,851 UART: ROM Fatal Error: 0x000B0009
1,310,008 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,219 UART: [kat] SHA2-256
902,159 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,880 UART: [kat] HMAC-384Kdf
921,636 UART: [kat] LMS
1,169,948 UART: [kat] --
1,171,101 UART: [cold-reset] ++
1,171,511 UART: [fht] FHT @ 0x50003400
1,174,347 UART: [idev] ++
1,174,515 UART: [idev] CDI.KEYID = 6
1,174,876 UART: [idev] SUBJECT.KEYID = 7
1,175,301 UART: [idev] UDS.KEYID = 0
1,182,968 UART: [idev] Erasing UDS.KEYID = 0
1,200,420 UART: [idev] Sha1 KeyId Algorithm
1,209,266 UART: [idev] --
1,210,233 UART: [ldev] ++
1,210,401 UART: [ldev] CDI.KEYID = 6
1,210,765 UART: [ldev] SUBJECT.KEYID = 5
1,211,192 UART: [ldev] AUTHORITY.KEYID = 7
1,211,655 UART: [ldev] FE.KEYID = 1
1,217,295 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,498 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46574c44
1,283,874 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,339 UART: ROM Fatal Error: 0x000B0009
1,310,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,510 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,574 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,019 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,759 UART: [ldev] Erasing FE.KEYID = 1
1,241,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,437 UART: [ldev] --
1,280,780 UART: [fwproc] Wait for Commands...
1,281,411 UART: [fwproc] Recv command 0x46574c44
1,282,144 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,077 UART: ROM Fatal Error: 0x000B0009
1,308,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,575 UART: [state] LifecycleState = Unprovisioned
86,230 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,746 UART: [kat] HMAC-384Kdf
920,350 UART: [kat] LMS
1,168,662 UART: [kat] --
1,169,347 UART: [cold-reset] ++
1,169,701 UART: [fht] FHT @ 0x50003400
1,172,263 UART: [idev] ++
1,172,431 UART: [idev] CDI.KEYID = 6
1,172,792 UART: [idev] SUBJECT.KEYID = 7
1,173,217 UART: [idev] UDS.KEYID = 0
1,181,368 UART: [idev] Erasing UDS.KEYID = 0
1,197,990 UART: [idev] Sha1 KeyId Algorithm
1,206,762 UART: [idev] --
1,207,945 UART: [ldev] ++
1,208,113 UART: [ldev] CDI.KEYID = 6
1,208,477 UART: [ldev] SUBJECT.KEYID = 5
1,208,904 UART: [ldev] AUTHORITY.KEYID = 7
1,209,367 UART: [ldev] FE.KEYID = 1
1,214,577 UART: [ldev] Erasing FE.KEYID = 1
1,241,114 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,617 UART: [ldev] --
1,280,856 UART: [fwproc] Wait for Commands...
1,281,443 UART: [fwproc] Recv command 0x46574c44
1,282,176 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,980 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,981 >>> mbox cmd response: success
2,826,217 UART: [afmc] ++
2,826,385 UART: [afmc] CDI.KEYID = 6
2,826,748 UART: [afmc] SUBJECT.KEYID = 7
2,827,174 UART: [afmc] AUTHORITY.KEYID = 5
2,862,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,722 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,434 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,317 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,030 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,966 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,913 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,393 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,170 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
891,156 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,260 UART: [kat] ++
895,412 UART: [kat] sha1
899,720 UART: [kat] SHA2-256
901,660 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
920,929 UART: [kat] LMS
1,169,241 UART: [kat] --
1,170,012 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,200 UART: [idev] ++
1,173,368 UART: [idev] CDI.KEYID = 6
1,173,729 UART: [idev] SUBJECT.KEYID = 7
1,174,154 UART: [idev] UDS.KEYID = 0
1,181,855 UART: [idev] Erasing UDS.KEYID = 0
1,198,715 UART: [idev] Sha1 KeyId Algorithm
1,207,603 UART: [idev] --
1,208,696 UART: [ldev] ++
1,208,864 UART: [ldev] CDI.KEYID = 6
1,209,228 UART: [ldev] SUBJECT.KEYID = 5
1,209,655 UART: [ldev] AUTHORITY.KEYID = 7
1,210,118 UART: [ldev] FE.KEYID = 1
1,215,166 UART: [ldev] Erasing FE.KEYID = 1
1,241,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,328 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,246 UART: [fwproc] Recv command 0x46574c44
1,281,979 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,592 UART: ROM Fatal Error: 0x000B0009
1,307,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,315 UART: [kat] SHA2-512-ACC
906,216 UART: [kat] ECC-384
915,739 UART: [kat] HMAC-384Kdf
920,237 UART: [kat] LMS
1,168,549 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,440 UART: [idev] ++
1,172,608 UART: [idev] CDI.KEYID = 6
1,172,969 UART: [idev] SUBJECT.KEYID = 7
1,173,394 UART: [idev] UDS.KEYID = 0
1,181,509 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,575 UART: [idev] --
1,208,666 UART: [ldev] ++
1,208,834 UART: [ldev] CDI.KEYID = 6
1,209,198 UART: [ldev] SUBJECT.KEYID = 5
1,209,625 UART: [ldev] AUTHORITY.KEYID = 7
1,210,088 UART: [ldev] FE.KEYID = 1
1,215,362 UART: [ldev] Erasing FE.KEYID = 1
1,241,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,140 UART: [ldev] --
1,280,545 UART: [fwproc] Wait for Commands...
1,281,240 UART: [fwproc] Recv command 0x46574c44
1,281,973 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,898 UART: ROM Fatal Error: 0x000B0009
1,308,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
916,375 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,334 UART: [cold-reset] ++
1,170,876 UART: [fht] FHT @ 0x50003400
1,173,714 UART: [idev] ++
1,173,882 UART: [idev] CDI.KEYID = 6
1,174,243 UART: [idev] SUBJECT.KEYID = 7
1,174,668 UART: [idev] UDS.KEYID = 0
1,182,489 UART: [idev] Erasing UDS.KEYID = 0
1,199,049 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,209,042 UART: [ldev] ++
1,209,210 UART: [ldev] CDI.KEYID = 6
1,209,574 UART: [ldev] SUBJECT.KEYID = 5
1,210,001 UART: [ldev] AUTHORITY.KEYID = 7
1,210,464 UART: [ldev] FE.KEYID = 1
1,215,754 UART: [ldev] Erasing FE.KEYID = 1
1,241,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,724 UART: [ldev] --
1,281,009 UART: [fwproc] Wait for Commands...
1,281,728 UART: [fwproc] Recv command 0x46574c44
1,282,461 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,770 UART: ROM Fatal Error: 0x000B0009
1,308,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,668 UART: [kat] SHA2-256
891,218 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,322 UART: [kat] ++
895,474 UART: [kat] sha1
899,678 UART: [kat] SHA2-256
901,618 UART: [kat] SHA2-384
904,285 UART: [kat] SHA2-512-ACC
906,186 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,732 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,918 UART: [idev] ++
1,173,086 UART: [idev] CDI.KEYID = 6
1,173,447 UART: [idev] SUBJECT.KEYID = 7
1,173,872 UART: [idev] UDS.KEYID = 0
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,267 UART: [idev] Sha1 KeyId Algorithm
1,208,309 UART: [idev] --
1,209,504 UART: [ldev] ++
1,209,672 UART: [ldev] CDI.KEYID = 6
1,210,036 UART: [ldev] SUBJECT.KEYID = 5
1,210,463 UART: [ldev] AUTHORITY.KEYID = 7
1,210,926 UART: [ldev] FE.KEYID = 1
1,216,336 UART: [ldev] Erasing FE.KEYID = 1
1,243,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,942 UART: [ldev] --
1,282,335 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,727 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,070 >>> mbox cmd response: success
2,827,136 UART: [afmc] ++
2,827,304 UART: [afmc] CDI.KEYID = 6
2,827,667 UART: [afmc] SUBJECT.KEYID = 7
2,828,093 UART: [afmc] AUTHORITY.KEYID = 5
2,863,793 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,954 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,703 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,415 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,298 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,011 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,809 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 3.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,277 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,689 UART: [kat] SHA2-256
901,629 UART: [kat] SHA2-384
904,350 UART: [kat] SHA2-512-ACC
906,251 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
921,142 UART: [kat] LMS
1,169,454 UART: [kat] --
1,170,227 UART: [cold-reset] ++
1,170,689 UART: [fht] FHT @ 0x50003400
1,173,347 UART: [idev] ++
1,173,515 UART: [idev] CDI.KEYID = 6
1,173,876 UART: [idev] SUBJECT.KEYID = 7
1,174,301 UART: [idev] UDS.KEYID = 0
1,181,926 UART: [idev] Erasing UDS.KEYID = 0
1,198,698 UART: [idev] Sha1 KeyId Algorithm
1,207,452 UART: [idev] --
1,208,387 UART: [ldev] ++
1,208,555 UART: [ldev] CDI.KEYID = 6
1,208,919 UART: [ldev] SUBJECT.KEYID = 5
1,209,346 UART: [ldev] AUTHORITY.KEYID = 7
1,209,809 UART: [ldev] FE.KEYID = 1
1,215,149 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,843 UART: [ldev] --
1,281,118 UART: [fwproc] Wait for Commands...
1,281,777 UART: [fwproc] Recv command 0x46574c44
1,282,510 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,919 UART: ROM Fatal Error: 0x000B0009
1,309,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,631 UART: [kat] SHA2-256
901,571 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,294 UART: [kat] HMAC-384Kdf
920,880 UART: [kat] LMS
1,169,192 UART: [kat] --
1,169,999 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,125 UART: [idev] ++
1,173,293 UART: [idev] CDI.KEYID = 6
1,173,654 UART: [idev] SUBJECT.KEYID = 7
1,174,079 UART: [idev] UDS.KEYID = 0
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,302 UART: [idev] Sha1 KeyId Algorithm
1,208,078 UART: [idev] --
1,209,327 UART: [ldev] ++
1,209,495 UART: [ldev] CDI.KEYID = 6
1,209,859 UART: [ldev] SUBJECT.KEYID = 5
1,210,286 UART: [ldev] AUTHORITY.KEYID = 7
1,210,749 UART: [ldev] FE.KEYID = 1
1,215,811 UART: [ldev] Erasing FE.KEYID = 1
1,241,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,227 UART: [ldev] --
1,280,438 UART: [fwproc] Wait for Commands...
1,281,125 UART: [fwproc] Recv command 0x46574c44
1,281,858 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,513 UART: ROM Fatal Error: 0x000B0009
1,308,670 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,990 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,154 UART: [kat] LMS
1,169,466 UART: [kat] --
1,170,353 UART: [cold-reset] ++
1,170,845 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,722 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,385 UART: [ldev] ++
1,209,553 UART: [ldev] CDI.KEYID = 6
1,209,917 UART: [ldev] SUBJECT.KEYID = 5
1,210,344 UART: [ldev] AUTHORITY.KEYID = 7
1,210,807 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,437 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,927 UART: ROM Fatal Error: 0x000B0009
1,309,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
891,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,543 UART: [kat] ++
895,695 UART: [kat] sha1
900,079 UART: [kat] SHA2-256
902,019 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,341 UART: [idev] ++
1,173,509 UART: [idev] CDI.KEYID = 6
1,173,870 UART: [idev] SUBJECT.KEYID = 7
1,174,295 UART: [idev] UDS.KEYID = 0
1,182,116 UART: [idev] Erasing UDS.KEYID = 0
1,199,130 UART: [idev] Sha1 KeyId Algorithm
1,208,156 UART: [idev] --
1,209,233 UART: [ldev] ++
1,209,401 UART: [ldev] CDI.KEYID = 6
1,209,765 UART: [ldev] SUBJECT.KEYID = 5
1,210,192 UART: [ldev] AUTHORITY.KEYID = 7
1,210,655 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,915 UART: [ldev] --
1,281,252 UART: [fwproc] Wait for Commands...
1,282,049 UART: [fwproc] Recv command 0x46574c44
1,282,782 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,297 >>> mbox cmd response: success
2,826,401 UART: [afmc] ++
2,826,569 UART: [afmc] CDI.KEYID = 6
2,826,932 UART: [afmc] SUBJECT.KEYID = 7
2,827,358 UART: [afmc] AUTHORITY.KEYID = 5
2,863,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,492 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,204 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,087 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,800 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,588 UART: [afmc] --
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,461 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,989 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,638 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_ecc_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
5,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,246 UART:
192,623 UART: Running Caliptra ROM ...
193,706 UART:
193,854 UART: [state] CFI Enabled
265,093 UART: [state] LifecycleState = Unprovisioned
267,072 UART: [state] DebugLocked = No
268,486 UART: [state] WD Timer not started. Device not locked for debugging
271,784 UART: [kat] SHA2-256
451,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,209 UART: [kat] ++
462,666 UART: [kat] sha1
474,846 UART: [kat] SHA2-256
477,550 UART: [kat] SHA2-384
483,266 UART: [kat] SHA2-512-ACC
485,615 UART: [kat] ECC-384
2,944,071 UART: [kat] HMAC-384Kdf
2,969,005 UART: [kat] LMS
3,445,523 UART: [kat] --
3,451,893 UART: [cold-reset] ++
3,454,481 UART: [fht] FHT @ 0x50003400
3,465,196 UART: [idev] ++
3,465,825 UART: [idev] CDI.KEYID = 6
3,466,758 UART: [idev] SUBJECT.KEYID = 7
3,467,978 UART: [idev] UDS.KEYID = 0
3,498,541 UART: [idev] Erasing UDS.KEYID = 0
5,984,572 UART: [idev] Sha1 KeyId Algorithm
6,007,560 UART: [idev] --
6,011,567 UART: [ldev] ++
6,012,171 UART: [ldev] CDI.KEYID = 6
6,013,069 UART: [ldev] SUBJECT.KEYID = 5
6,014,236 UART: [ldev] AUTHORITY.KEYID = 7
6,015,533 UART: [ldev] FE.KEYID = 1
6,053,550 UART: [ldev] Erasing FE.KEYID = 1
8,563,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,290 UART: [ldev] --
10,371,375 UART: [fwproc] Wait for Commands...
10,373,366 UART: [fwproc] Recv command 0x46574c44
10,375,408 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,990 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,282 >>> mbox cmd response: success
14,341,250 UART: [afmc] ++
14,341,851 UART: [afmc] CDI.KEYID = 6
14,342,746 UART: [afmc] SUBJECT.KEYID = 7
14,343,966 UART: [afmc] AUTHORITY.KEYID = 5
16,870,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,933 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,038 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,597 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,613 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,381 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
6,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,439 UART:
192,836 UART: Running Caliptra ROM ...
193,918 UART:
603,558 UART: [state] CFI Enabled
619,119 UART: [state] LifecycleState = Unprovisioned
621,068 UART: [state] DebugLocked = No
623,302 UART: [state] WD Timer not started. Device not locked for debugging
627,782 UART: [kat] SHA2-256
807,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,215 UART: [kat] ++
818,712 UART: [kat] sha1
828,835 UART: [kat] SHA2-256
831,563 UART: [kat] SHA2-384
838,087 UART: [kat] SHA2-512-ACC
840,478 UART: [kat] ECC-384
3,283,532 UART: [kat] HMAC-384Kdf
3,295,954 UART: [kat] LMS
3,772,454 UART: [kat] --
3,778,140 UART: [cold-reset] ++
3,779,857 UART: [fht] FHT @ 0x50003400
3,791,516 UART: [idev] ++
3,792,153 UART: [idev] CDI.KEYID = 6
3,793,088 UART: [idev] SUBJECT.KEYID = 7
3,794,303 UART: [idev] UDS.KEYID = 0
3,812,169 UART: [idev] Erasing UDS.KEYID = 0
6,276,755 UART: [idev] Sha1 KeyId Algorithm
6,301,548 UART: [idev] --
6,305,918 UART: [ldev] ++
6,306,540 UART: [ldev] CDI.KEYID = 6
6,307,425 UART: [ldev] SUBJECT.KEYID = 5
6,308,631 UART: [ldev] AUTHORITY.KEYID = 7
6,309,916 UART: [ldev] FE.KEYID = 1
6,319,611 UART: [ldev] Erasing FE.KEYID = 1
8,798,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,660 UART: [ldev] --
10,597,529 UART: [fwproc] Wait for Commands...
10,599,839 UART: [fwproc] Recv command 0x46574c44
10,601,833 UART: [fwproc] Recv'd Img size: 118548 bytes
14,084,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,502 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,243,573 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,572,048 >>> mbox cmd response: success
14,575,919 UART: [afmc] ++
14,576,502 UART: [afmc] CDI.KEYID = 6
14,577,438 UART: [afmc] SUBJECT.KEYID = 7
14,578,643 UART: [afmc] AUTHORITY.KEYID = 5
17,082,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,807,527 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,378 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,839,426 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,854,971 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,878,970 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
6,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,529 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,451 UART: [kat] SHA2-512-ACC
906,352 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,570 UART: [fht] FHT @ 0x50003400
1,172,270 UART: [idev] ++
1,172,438 UART: [idev] CDI.KEYID = 6
1,172,799 UART: [idev] SUBJECT.KEYID = 7
1,173,224 UART: [idev] UDS.KEYID = 0
1,181,133 UART: [idev] Erasing UDS.KEYID = 0
1,198,077 UART: [idev] Sha1 KeyId Algorithm
1,206,843 UART: [idev] --
1,208,002 UART: [ldev] ++
1,208,170 UART: [ldev] CDI.KEYID = 6
1,208,534 UART: [ldev] SUBJECT.KEYID = 5
1,208,961 UART: [ldev] AUTHORITY.KEYID = 7
1,209,424 UART: [ldev] FE.KEYID = 1
1,214,528 UART: [ldev] Erasing FE.KEYID = 1
1,240,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,072 UART: [ldev] --
1,279,437 UART: [fwproc] Wait for Commands...
1,280,056 UART: [fwproc] Recv command 0x46574c44
1,280,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,650,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,249 >>> mbox cmd response: success
2,823,279 UART: [afmc] ++
2,823,447 UART: [afmc] CDI.KEYID = 6
2,823,810 UART: [afmc] SUBJECT.KEYID = 7
2,824,236 UART: [afmc] AUTHORITY.KEYID = 5
2,858,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,875,048 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,875,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,881,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,887,388 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,893,089 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,900,926 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,050 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,705 UART: [cold-reset] ++
1,171,077 UART: [fht] FHT @ 0x50003400
1,173,691 UART: [idev] ++
1,173,859 UART: [idev] CDI.KEYID = 6
1,174,220 UART: [idev] SUBJECT.KEYID = 7
1,174,645 UART: [idev] UDS.KEYID = 0
1,182,540 UART: [idev] Erasing UDS.KEYID = 0
1,199,298 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,216,303 UART: [ldev] Erasing FE.KEYID = 1
1,242,478 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,261 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,500 >>> mbox cmd response: success
2,827,702 UART: [afmc] ++
2,827,870 UART: [afmc] CDI.KEYID = 6
2,828,233 UART: [afmc] SUBJECT.KEYID = 7
2,828,659 UART: [afmc] AUTHORITY.KEYID = 5
2,864,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,939 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,279 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,980 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,773 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,383 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,544 UART: [kat] ++
895,696 UART: [kat] sha1
899,708 UART: [kat] SHA2-256
901,648 UART: [kat] SHA2-384
904,177 UART: [kat] SHA2-512-ACC
906,078 UART: [kat] ECC-384
916,181 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,116 UART: [idev] ++
1,173,284 UART: [idev] CDI.KEYID = 6
1,173,645 UART: [idev] SUBJECT.KEYID = 7
1,174,070 UART: [idev] UDS.KEYID = 0
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,914 UART: [ldev] ++
1,209,082 UART: [ldev] CDI.KEYID = 6
1,209,446 UART: [ldev] SUBJECT.KEYID = 5
1,209,873 UART: [ldev] AUTHORITY.KEYID = 7
1,210,336 UART: [ldev] FE.KEYID = 1
1,215,792 UART: [ldev] Erasing FE.KEYID = 1
1,242,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,820 UART: [fwproc] Recv command 0x46574c44
1,282,553 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,093 >>> mbox cmd response: success
2,827,159 UART: [afmc] ++
2,827,327 UART: [afmc] CDI.KEYID = 6
2,827,690 UART: [afmc] SUBJECT.KEYID = 7
2,828,116 UART: [afmc] AUTHORITY.KEYID = 5
2,862,947 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,210 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,669 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,550 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,251 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,946 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,151 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,230 UART: [state] WD Timer not started. Device not locked for debugging
87,587 UART: [kat] SHA2-256
891,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,241 UART: [kat] ++
895,393 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
915,450 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,233 UART: [cold-reset] ++
1,169,657 UART: [fht] FHT @ 0x50003400
1,172,331 UART: [idev] ++
1,172,499 UART: [idev] CDI.KEYID = 6
1,172,860 UART: [idev] SUBJECT.KEYID = 7
1,173,285 UART: [idev] UDS.KEYID = 0
1,181,314 UART: [idev] Erasing UDS.KEYID = 0
1,198,254 UART: [idev] Sha1 KeyId Algorithm
1,206,980 UART: [idev] --
1,207,987 UART: [ldev] ++
1,208,155 UART: [ldev] CDI.KEYID = 6
1,208,519 UART: [ldev] SUBJECT.KEYID = 5
1,208,946 UART: [ldev] AUTHORITY.KEYID = 7
1,209,409 UART: [ldev] FE.KEYID = 1
1,214,701 UART: [ldev] Erasing FE.KEYID = 1
1,240,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,921 UART: [ldev] --
1,280,376 UART: [fwproc] Wait for Commands...
1,281,185 UART: [fwproc] Recv command 0x46574c44
1,281,918 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,796 >>> mbox cmd response: success
2,825,994 UART: [afmc] ++
2,826,162 UART: [afmc] CDI.KEYID = 6
2,826,525 UART: [afmc] SUBJECT.KEYID = 7
2,826,951 UART: [afmc] AUTHORITY.KEYID = 5
2,862,472 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,917 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,376 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,257 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,958 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,573 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,313 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,195 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
904,005 UART: [kat] SHA2-512-ACC
905,906 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,378 UART: [cold-reset] ++
1,169,870 UART: [fht] FHT @ 0x50003400
1,172,326 UART: [idev] ++
1,172,494 UART: [idev] CDI.KEYID = 6
1,172,855 UART: [idev] SUBJECT.KEYID = 7
1,173,280 UART: [idev] UDS.KEYID = 0
1,181,185 UART: [idev] Erasing UDS.KEYID = 0
1,197,961 UART: [idev] Sha1 KeyId Algorithm
1,206,973 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,214,878 UART: [ldev] Erasing FE.KEYID = 1
1,241,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,970 UART: [ldev] --
1,280,387 UART: [fwproc] Wait for Commands...
1,281,128 UART: [fwproc] Recv command 0x46574c44
1,281,861 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,435 >>> mbox cmd response: success
2,825,543 UART: [afmc] ++
2,825,711 UART: [afmc] CDI.KEYID = 6
2,826,074 UART: [afmc] SUBJECT.KEYID = 7
2,826,500 UART: [afmc] AUTHORITY.KEYID = 5
2,861,801 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,562 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,263 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,056 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,052 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,485 UART: [kat] SHA2-256
901,425 UART: [kat] SHA2-384
904,174 UART: [kat] SHA2-512-ACC
906,075 UART: [kat] ECC-384
915,816 UART: [kat] HMAC-384Kdf
920,452 UART: [kat] LMS
1,168,764 UART: [kat] --
1,169,931 UART: [cold-reset] ++
1,170,321 UART: [fht] FHT @ 0x50003400
1,173,003 UART: [idev] ++
1,173,171 UART: [idev] CDI.KEYID = 6
1,173,532 UART: [idev] SUBJECT.KEYID = 7
1,173,957 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,198,744 UART: [idev] Sha1 KeyId Algorithm
1,207,486 UART: [idev] --
1,208,445 UART: [ldev] ++
1,208,613 UART: [ldev] CDI.KEYID = 6
1,208,977 UART: [ldev] SUBJECT.KEYID = 5
1,209,404 UART: [ldev] AUTHORITY.KEYID = 7
1,209,867 UART: [ldev] FE.KEYID = 1
1,214,999 UART: [ldev] Erasing FE.KEYID = 1
1,241,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,535 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,447 UART: [fwproc] Recv command 0x46574c44
1,282,180 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,584 >>> mbox cmd response: success
2,826,790 UART: [afmc] ++
2,826,958 UART: [afmc] CDI.KEYID = 6
2,827,321 UART: [afmc] SUBJECT.KEYID = 7
2,827,747 UART: [afmc] AUTHORITY.KEYID = 5
2,863,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,186 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,817 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,903 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_out_of_bounds_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
Truncated 107056 bytes from beginning
011,191 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,531 >>> mbox cmd response: success
14,344,225 UART: [afmc] ++
14,344,819 UART: [afmc] CDI.KEYID = 6
14,345,808 UART: [afmc] SUBJECT.KEYID = 7
14,346,982 UART: [afmc] AUTHORITY.KEYID = 5
16,893,330 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,632,015 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,634,232 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,650,087 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,666,091 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,681,737 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,706,817 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,067,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,216,783 UART:
2,217,181 UART: Running Caliptra ROM ...
2,218,356 UART:
2,218,535 UART: [state] CFI Enabled
2,219,505 UART: [state] LifecycleState = Unprovisioned
2,221,152 UART: [state] DebugLocked = No
2,222,264 UART: [state] WD Timer not started. Device not locked for debugging
2,224,747 UART: [kat] SHA2-256
2,225,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,228,654 UART: [kat] ++
2,229,123 UART: [kat] sha1
2,229,646 UART: [kat] SHA2-256
2,230,393 UART: [kat] SHA2-384
2,231,064 UART: [kat] SHA2-512-ACC
2,231,945 UART: [kat] ECC-384
2,943,633 UART: [kat] HMAC-384Kdf
2,966,610 UART: [kat] LMS
3,443,135 UART: [kat] --
3,447,940 UART: [cold-reset] ++
3,450,253 UART: [fht] FHT @ 0x50003400
3,462,475 UART: [idev] ++
3,463,052 UART: [idev] CDI.KEYID = 6
3,464,002 UART: [idev] SUBJECT.KEYID = 7
3,465,279 UART: [idev] UDS.KEYID = 0
3,496,195 UART: [idev] Erasing UDS.KEYID = 0
5,985,343 UART: [idev] Sha1 KeyId Algorithm
6,009,864 UART: [idev] --
6,015,783 UART: [ldev] ++
6,016,375 UART: [ldev] CDI.KEYID = 6
6,017,267 UART: [ldev] SUBJECT.KEYID = 5
6,018,508 UART: [ldev] AUTHORITY.KEYID = 7
6,019,750 UART: [ldev] FE.KEYID = 1
6,051,411 UART: [ldev] Erasing FE.KEYID = 1
8,561,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,629 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,037 UART: [ldev] --
10,368,281 UART: [fwproc] Wait for Commands...
10,371,410 UART: [fwproc] Recv command 0x46574c44
10,373,403 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,939,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,355 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,905 >>> mbox cmd response: success
14,344,777 UART: [afmc] ++
14,345,368 UART: [afmc] CDI.KEYID = 6
14,346,261 UART: [afmc] SUBJECT.KEYID = 7
14,347,533 UART: [afmc] AUTHORITY.KEYID = 5
16,885,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,649 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,628,573 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,644,527 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,660,190 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,684,851 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
2,056,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,206,555 UART:
2,206,942 UART: Running Caliptra ROM ...
2,208,042 UART:
2,208,207 UART: [state] CFI Enabled
2,209,173 UART: [state] LifecycleState = Unprovisioned
2,210,839 UART: [state] DebugLocked = No
2,211,954 UART: [state] WD Timer not started. Device not locked for debugging
2,214,425 UART: [kat] SHA2-256
2,215,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,218,122 UART: [kat] ++
2,218,580 UART: [kat] sha1
2,219,101 UART: [kat] SHA2-256
2,219,845 UART: [kat] SHA2-384
2,220,540 UART: [kat] SHA2-512-ACC
2,221,356 UART: [kat] ECC-384
2,942,530 UART: [kat] HMAC-384Kdf
2,967,680 UART: [kat] LMS
3,444,180 UART: [kat] --
3,450,875 UART: [cold-reset] ++
3,453,250 UART: [fht] FHT @ 0x50003400
3,464,345 UART: [idev] ++
3,464,917 UART: [idev] CDI.KEYID = 6
3,465,885 UART: [idev] SUBJECT.KEYID = 7
3,467,159 UART: [idev] UDS.KEYID = 0
3,497,182 UART: [idev] Erasing UDS.KEYID = 0
5,984,039 UART: [idev] Sha1 KeyId Algorithm
6,006,846 UART: [idev] --
6,010,521 UART: [ldev] ++
6,011,096 UART: [ldev] CDI.KEYID = 6
6,012,042 UART: [ldev] SUBJECT.KEYID = 5
6,013,218 UART: [ldev] AUTHORITY.KEYID = 7
6,014,454 UART: [ldev] FE.KEYID = 1
6,052,180 UART: [ldev] Erasing FE.KEYID = 1
8,559,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,666 UART: [ldev] --
10,367,103 UART: [fwproc] Wait for Commands...
10,369,854 UART: [fwproc] Recv command 0x46574c44
10,371,847 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,496 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,933,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,133 >>> mbox cmd response: success
14,338,568 UART: [afmc] ++
14,339,166 UART: [afmc] CDI.KEYID = 6
14,340,137 UART: [afmc] SUBJECT.KEYID = 7
14,341,355 UART: [afmc] AUTHORITY.KEYID = 5
16,884,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,610,584 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,612,775 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,628,624 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,644,625 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,660,235 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,684,490 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
2,058,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,208,553 UART:
2,208,975 UART: Running Caliptra ROM ...
2,210,073 UART:
2,210,241 UART: [state] CFI Enabled
2,211,217 UART: [state] LifecycleState = Unprovisioned
2,212,885 UART: [state] DebugLocked = No
2,213,926 UART: [state] WD Timer not started. Device not locked for debugging
2,216,393 UART: [kat] SHA2-256
2,217,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,220,090 UART: [kat] ++
2,220,552 UART: [kat] sha1
2,221,073 UART: [kat] SHA2-256
2,221,761 UART: [kat] SHA2-384
2,222,428 UART: [kat] SHA2-512-ACC
2,223,238 UART: [kat] ECC-384
2,943,362 UART: [kat] HMAC-384Kdf
2,970,788 UART: [kat] LMS
3,447,296 UART: [kat] --
3,450,316 UART: [cold-reset] ++
3,452,798 UART: [fht] FHT @ 0x50003400
3,464,159 UART: [idev] ++
3,464,728 UART: [idev] CDI.KEYID = 6
3,465,714 UART: [idev] SUBJECT.KEYID = 7
3,466,939 UART: [idev] UDS.KEYID = 0
3,499,557 UART: [idev] Erasing UDS.KEYID = 0
5,986,644 UART: [idev] Sha1 KeyId Algorithm
6,010,242 UART: [idev] --
6,014,698 UART: [ldev] ++
6,015,300 UART: [ldev] CDI.KEYID = 6
6,016,223 UART: [ldev] SUBJECT.KEYID = 5
6,017,441 UART: [ldev] AUTHORITY.KEYID = 7
6,018,682 UART: [ldev] FE.KEYID = 1
6,056,607 UART: [ldev] Erasing FE.KEYID = 1
8,562,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,191 UART: [ldev] --
10,371,922 UART: [fwproc] Wait for Commands...
10,373,654 UART: [fwproc] Recv command 0x46574c44
10,375,712 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,950,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,998 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,097 >>> mbox cmd response: success
14,355,564 UART: [afmc] ++
14,356,157 UART: [afmc] CDI.KEYID = 6
14,357,071 UART: [afmc] SUBJECT.KEYID = 7
14,358,297 UART: [afmc] AUTHORITY.KEYID = 5
16,890,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,428 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,633,270 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,649,303 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,664,928 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,690,083 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.00s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
2,054,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,221,730 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
2,059,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,229,908 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,060,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,980 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
2,061,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,178 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,836 writing to cptra_bootfsm_go
2,056,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,202,339 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,066,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,596 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
2,065,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,262 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,872 writing to cptra_bootfsm_go
2,067,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,309 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,062,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,174 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,066,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,522 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,848 writing to cptra_bootfsm_go
2,064,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,088 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,840 writing to cptra_bootfsm_go
2,068,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,207,786 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,866 writing to cptra_bootfsm_go
2,061,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,590 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,061,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,558 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
2,060,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,209,735 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,057,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,274 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
2,062,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,387 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
2,061,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,201,286 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
2,061,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,823 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.70s
Truncated 107056 bytes from beginning
226,020 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,727 >>> mbox cmd response: success
14,557,947 UART: [afmc] ++
14,558,557 UART: [afmc] CDI.KEYID = 6
14,559,468 UART: [afmc] SUBJECT.KEYID = 7
14,560,685 UART: [afmc] AUTHORITY.KEYID = 5
17,061,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,269 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,804,149 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,820,174 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,835,766 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,861,083 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
2,059,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,209,539 UART:
2,209,935 UART: Running Caliptra ROM ...
2,211,103 UART:
2,211,278 UART: [state] CFI Enabled
2,212,235 UART: [state] LifecycleState = Unprovisioned
2,213,889 UART: [state] DebugLocked = No
2,214,998 UART: [state] WD Timer not started. Device not locked for debugging
2,217,471 UART: [kat] SHA2-256
2,218,139 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,146 UART: [kat] ++
2,221,598 UART: [kat] sha1
2,222,106 UART: [kat] SHA2-256
2,222,844 UART: [kat] SHA2-384
2,223,509 UART: [kat] SHA2-512-ACC
2,224,409 UART: [kat] ECC-384
3,280,834 UART: [kat] HMAC-384Kdf
3,293,238 UART: [kat] LMS
3,769,724 UART: [kat] --
3,773,305 UART: [cold-reset] ++
3,775,290 UART: [fht] FHT @ 0x50003400
3,786,692 UART: [idev] ++
3,787,253 UART: [idev] CDI.KEYID = 6
3,788,185 UART: [idev] SUBJECT.KEYID = 7
3,789,450 UART: [idev] UDS.KEYID = 0
3,809,335 UART: [idev] Erasing UDS.KEYID = 0
6,271,715 UART: [idev] Sha1 KeyId Algorithm
6,295,066 UART: [idev] --
6,299,335 UART: [ldev] ++
6,299,899 UART: [ldev] CDI.KEYID = 6
6,300,810 UART: [ldev] SUBJECT.KEYID = 5
6,302,040 UART: [ldev] AUTHORITY.KEYID = 7
6,303,274 UART: [ldev] FE.KEYID = 1
6,316,794 UART: [ldev] Erasing FE.KEYID = 1
8,798,301 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,177 UART: [ldev] --
10,590,175 UART: [fwproc] Wait for Commands...
10,593,024 UART: [fwproc] Recv command 0x46574c44
10,595,016 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,996 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,149,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,793 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,678 >>> mbox cmd response: success
14,554,575 UART: [afmc] ++
14,555,223 UART: [afmc] CDI.KEYID = 6
14,556,131 UART: [afmc] SUBJECT.KEYID = 7
14,557,456 UART: [afmc] AUTHORITY.KEYID = 5
17,061,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,416 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,605 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,803,502 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,819,485 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,835,139 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,859,513 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,060,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,209,972 UART:
2,210,359 UART: Running Caliptra ROM ...
2,211,536 UART:
2,211,709 UART: [state] CFI Enabled
2,212,658 UART: [state] LifecycleState = Unprovisioned
2,214,308 UART: [state] DebugLocked = No
2,215,420 UART: [state] WD Timer not started. Device not locked for debugging
2,217,943 UART: [kat] SHA2-256
2,218,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,221,617 UART: [kat] ++
2,222,068 UART: [kat] sha1
2,222,581 UART: [kat] SHA2-256
2,223,274 UART: [kat] SHA2-384
2,223,947 UART: [kat] SHA2-512-ACC
2,224,747 UART: [kat] ECC-384
3,281,170 UART: [kat] HMAC-384Kdf
3,293,175 UART: [kat] LMS
3,769,698 UART: [kat] --
3,773,659 UART: [cold-reset] ++
3,775,380 UART: [fht] FHT @ 0x50003400
3,787,106 UART: [idev] ++
3,787,672 UART: [idev] CDI.KEYID = 6
3,788,633 UART: [idev] SUBJECT.KEYID = 7
3,789,896 UART: [idev] UDS.KEYID = 0
3,805,903 UART: [idev] Erasing UDS.KEYID = 0
6,265,071 UART: [idev] Sha1 KeyId Algorithm
6,288,357 UART: [idev] --
6,292,976 UART: [ldev] ++
6,293,552 UART: [ldev] CDI.KEYID = 6
6,294,483 UART: [ldev] SUBJECT.KEYID = 5
6,295,698 UART: [ldev] AUTHORITY.KEYID = 7
6,296,926 UART: [ldev] FE.KEYID = 1
6,307,678 UART: [ldev] Erasing FE.KEYID = 1
8,784,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,459 UART: [ldev] --
10,576,177 UART: [fwproc] Wait for Commands...
10,579,454 UART: [fwproc] Recv command 0x46574c44
10,581,441 UART: [fwproc] Recv'd Img size: 118548 bytes
14,057,890 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,139,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,902 >>> mbox cmd response: success
14,545,420 UART: [afmc] ++
14,546,010 UART: [afmc] CDI.KEYID = 6
14,546,952 UART: [afmc] SUBJECT.KEYID = 7
14,548,162 UART: [afmc] AUTHORITY.KEYID = 5
17,050,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,459 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,792,340 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,808,313 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,823,959 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,848,534 UART: [afmc] --
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
2,064,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,213,851 UART:
2,214,267 UART: Running Caliptra ROM ...
2,215,393 UART:
2,215,557 UART: [state] CFI Enabled
2,216,516 UART: [state] LifecycleState = Unprovisioned
2,218,176 UART: [state] DebugLocked = No
2,219,206 UART: [state] WD Timer not started. Device not locked for debugging
2,221,665 UART: [kat] SHA2-256
2,222,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,225,337 UART: [kat] ++
2,225,789 UART: [kat] sha1
2,226,299 UART: [kat] SHA2-256
2,227,056 UART: [kat] SHA2-384
2,227,729 UART: [kat] SHA2-512-ACC
2,228,610 UART: [kat] ECC-384
3,282,029 UART: [kat] HMAC-384Kdf
3,293,941 UART: [kat] LMS
3,770,474 UART: [kat] --
3,775,868 UART: [cold-reset] ++
3,777,257 UART: [fht] FHT @ 0x50003400
3,788,665 UART: [idev] ++
3,789,218 UART: [idev] CDI.KEYID = 6
3,790,152 UART: [idev] SUBJECT.KEYID = 7
3,791,412 UART: [idev] UDS.KEYID = 0
3,808,929 UART: [idev] Erasing UDS.KEYID = 0
6,270,181 UART: [idev] Sha1 KeyId Algorithm
6,294,716 UART: [idev] --
6,298,332 UART: [ldev] ++
6,298,916 UART: [ldev] CDI.KEYID = 6
6,299,797 UART: [ldev] SUBJECT.KEYID = 5
6,301,005 UART: [ldev] AUTHORITY.KEYID = 7
6,302,245 UART: [ldev] FE.KEYID = 1
6,314,373 UART: [ldev] Erasing FE.KEYID = 1
8,792,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,161 UART: [ldev] --
10,587,075 UART: [fwproc] Wait for Commands...
10,589,282 UART: [fwproc] Recv command 0x46574c44
10,591,268 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,142,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,655 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,572 >>> mbox cmd response: success
14,548,535 UART: [afmc] ++
14,549,118 UART: [afmc] CDI.KEYID = 6
14,550,050 UART: [afmc] SUBJECT.KEYID = 7
14,551,313 UART: [afmc] AUTHORITY.KEYID = 5
17,050,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,877 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,793,747 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,809,751 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,825,412 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,849,665 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 30.29s
Truncated 8592 bytes from beginning
amsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,752 writing to cptra_bootfsm_go
2,064,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,932 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
2,061,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,459,525 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,067,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,471 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
2,070,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,009 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,075,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,338 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,609 writing to cptra_bootfsm_go
2,074,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,456 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
2,069,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,954 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,061,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,213 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
2,067,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,274 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,063,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,082 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
2,071,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,665 >>> mbox cmd response: success
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
2,059,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,017 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
2,057,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,799 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,059,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,889 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
2,069,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,954 >>> mbox cmd response: success
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
2,065,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,635 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
2,063,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,482 >>> mbox cmd response: success
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
2,062,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,921 >>> mbox cmd response: success
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,657 writing to cptra_bootfsm_go
2,062,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,694 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 29.99s
Truncated 104976 bytes from beginning
4
1,281,671 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,105 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,982 >>> mbox cmd response: success
2,825,082 UART: [afmc] ++
2,825,250 UART: [afmc] CDI.KEYID = 6
2,825,613 UART: [afmc] SUBJECT.KEYID = 7
2,826,039 UART: [afmc] AUTHORITY.KEYID = 5
2,861,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,549 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,261 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,144 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,857 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,423 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,040 UART: [kat] ++
895,192 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,651 UART: [kat] LMS
1,168,963 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,198,811 UART: [idev] Sha1 KeyId Algorithm
1,207,753 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,805 UART: [fwproc] Wait for Commands...
1,281,512 UART: [fwproc] Recv command 0x46574c44
1,282,245 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,607 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,880 >>> mbox cmd response: success
2,827,062 UART: [afmc] ++
2,827,230 UART: [afmc] CDI.KEYID = 6
2,827,593 UART: [afmc] SUBJECT.KEYID = 7
2,828,019 UART: [afmc] AUTHORITY.KEYID = 5
2,863,293 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,855 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,567 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,450 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,163 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,059 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,814 UART: [kat] SHA2-256
901,754 UART: [kat] SHA2-384
904,423 UART: [kat] SHA2-512-ACC
906,324 UART: [kat] ECC-384
915,849 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,758 UART: [idev] ++
1,172,926 UART: [idev] CDI.KEYID = 6
1,173,287 UART: [idev] SUBJECT.KEYID = 7
1,173,712 UART: [idev] UDS.KEYID = 0
1,182,121 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,977 UART: [idev] --
1,208,890 UART: [ldev] ++
1,209,058 UART: [ldev] CDI.KEYID = 6
1,209,422 UART: [ldev] SUBJECT.KEYID = 5
1,209,849 UART: [ldev] AUTHORITY.KEYID = 7
1,210,312 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,232 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,260 UART: [fwproc] Recv command 0x46574c44
1,282,993 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,838 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,416 >>> mbox cmd response: success
2,828,464 UART: [afmc] ++
2,828,632 UART: [afmc] CDI.KEYID = 6
2,828,995 UART: [afmc] SUBJECT.KEYID = 7
2,829,421 UART: [afmc] AUTHORITY.KEYID = 5
2,864,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,482 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,231 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,943 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,826 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,539 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,259 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,743 UART: [kat] HMAC-384Kdf
920,177 UART: [kat] LMS
1,168,489 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,718 UART: [fht] FHT @ 0x50003400
1,172,502 UART: [idev] ++
1,172,670 UART: [idev] CDI.KEYID = 6
1,173,031 UART: [idev] SUBJECT.KEYID = 7
1,173,456 UART: [idev] UDS.KEYID = 0
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,198,541 UART: [idev] Sha1 KeyId Algorithm
1,207,457 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,586 UART: [fwproc] Recv command 0x46574c44
1,282,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,300 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,882 >>> mbox cmd response: success
2,825,112 UART: [afmc] ++
2,825,280 UART: [afmc] CDI.KEYID = 6
2,825,643 UART: [afmc] SUBJECT.KEYID = 7
2,826,069 UART: [afmc] AUTHORITY.KEYID = 5
2,861,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,289 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,001 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,884 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,597 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,411 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 36.44s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,415 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,833 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,523 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,689 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,565 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,619 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,171 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,393 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,211 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,127 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,835 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,901 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,355 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,217 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,277 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,911 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,061 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,683 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,939 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,069 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,495 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.94s
Truncated 104976 bytes from beginning
4
1,283,652 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,225 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,643 >>> mbox cmd response: success
2,827,793 UART: [afmc] ++
2,827,961 UART: [afmc] CDI.KEYID = 6
2,828,324 UART: [afmc] SUBJECT.KEYID = 7
2,828,750 UART: [afmc] AUTHORITY.KEYID = 5
2,864,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,700 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,412 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,295 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,008 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,772 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
891,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,349 UART: [kat] ++
895,501 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,466 UART: [kat] SHA2-512-ACC
906,367 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,892 UART: [idev] Erasing UDS.KEYID = 0
1,198,948 UART: [idev] Sha1 KeyId Algorithm
1,207,888 UART: [idev] --
1,208,839 UART: [ldev] ++
1,209,007 UART: [ldev] CDI.KEYID = 6
1,209,371 UART: [ldev] SUBJECT.KEYID = 5
1,209,798 UART: [ldev] AUTHORITY.KEYID = 7
1,210,261 UART: [ldev] FE.KEYID = 1
1,215,479 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,427 UART: [ldev] --
1,281,752 UART: [fwproc] Wait for Commands...
1,282,503 UART: [fwproc] Recv command 0x46574c44
1,283,236 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,503 >>> mbox cmd response: success
2,826,733 UART: [afmc] ++
2,826,901 UART: [afmc] CDI.KEYID = 6
2,827,264 UART: [afmc] SUBJECT.KEYID = 7
2,827,690 UART: [afmc] AUTHORITY.KEYID = 5
2,863,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,577 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,326 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,038 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,921 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,634 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,224 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,489 UART: [kat] SHA2-256
902,429 UART: [kat] SHA2-384
905,260 UART: [kat] SHA2-512-ACC
907,161 UART: [kat] ECC-384
917,184 UART: [kat] HMAC-384Kdf
921,908 UART: [kat] LMS
1,170,220 UART: [kat] --
1,171,089 UART: [cold-reset] ++
1,171,505 UART: [fht] FHT @ 0x50003400
1,174,161 UART: [idev] ++
1,174,329 UART: [idev] CDI.KEYID = 6
1,174,690 UART: [idev] SUBJECT.KEYID = 7
1,175,115 UART: [idev] UDS.KEYID = 0
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,742 UART: [idev] Sha1 KeyId Algorithm
1,209,674 UART: [idev] --
1,210,771 UART: [ldev] ++
1,210,939 UART: [ldev] CDI.KEYID = 6
1,211,303 UART: [ldev] SUBJECT.KEYID = 5
1,211,730 UART: [ldev] AUTHORITY.KEYID = 7
1,212,193 UART: [ldev] FE.KEYID = 1
1,217,481 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,273 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,855 >>> mbox cmd response: success
2,826,899 UART: [afmc] ++
2,827,067 UART: [afmc] CDI.KEYID = 6
2,827,430 UART: [afmc] SUBJECT.KEYID = 7
2,827,856 UART: [afmc] AUTHORITY.KEYID = 5
2,863,808 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,931 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,680 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,392 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,275 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,988 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,758 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,721 UART: [kat] SHA2-256
901,661 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,260 UART: [kat] HMAC-384Kdf
920,724 UART: [kat] LMS
1,169,036 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,949 UART: [idev] ++
1,173,117 UART: [idev] CDI.KEYID = 6
1,173,478 UART: [idev] SUBJECT.KEYID = 7
1,173,903 UART: [idev] UDS.KEYID = 0
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,784 UART: [idev] Sha1 KeyId Algorithm
1,207,758 UART: [idev] --
1,208,919 UART: [ldev] ++
1,209,087 UART: [ldev] CDI.KEYID = 6
1,209,451 UART: [ldev] SUBJECT.KEYID = 5
1,209,878 UART: [ldev] AUTHORITY.KEYID = 7
1,210,341 UART: [ldev] FE.KEYID = 1
1,215,865 UART: [ldev] Erasing FE.KEYID = 1
1,242,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,351 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,357 UART: [fwproc] Recv command 0x46574c44
1,283,090 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,543 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,991 >>> mbox cmd response: success
2,827,057 UART: [afmc] ++
2,827,225 UART: [afmc] CDI.KEYID = 6
2,827,588 UART: [afmc] SUBJECT.KEYID = 7
2,828,014 UART: [afmc] AUTHORITY.KEYID = 5
2,864,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,655 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,404 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,116 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,999 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,712 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,690 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 36.66s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,510 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,346 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,606 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,112 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,670 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,470 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,218 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,888 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,200 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,168 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,050 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,496 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,218 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,302 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,522 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,800 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,232 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,858 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,884 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,382 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.95s
Truncated 104976 bytes from beginning
4
1,280,933 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,651,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,955 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,178 >>> mbox cmd response: success
2,824,226 UART: [afmc] ++
2,824,394 UART: [afmc] CDI.KEYID = 6
2,824,757 UART: [afmc] SUBJECT.KEYID = 7
2,825,183 UART: [afmc] AUTHORITY.KEYID = 5
2,860,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,849 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,883,561 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,889,444 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,895,157 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,903,025 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,759 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,901 UART: [kat] SHA2-512-ACC
906,802 UART: [kat] ECC-384
916,917 UART: [kat] HMAC-384Kdf
921,661 UART: [kat] LMS
1,169,973 UART: [kat] --
1,170,774 UART: [cold-reset] ++
1,171,300 UART: [fht] FHT @ 0x50003400
1,173,946 UART: [idev] ++
1,174,114 UART: [idev] CDI.KEYID = 6
1,174,475 UART: [idev] SUBJECT.KEYID = 7
1,174,900 UART: [idev] UDS.KEYID = 0
1,182,515 UART: [idev] Erasing UDS.KEYID = 0
1,199,637 UART: [idev] Sha1 KeyId Algorithm
1,208,629 UART: [idev] --
1,209,762 UART: [ldev] ++
1,209,930 UART: [ldev] CDI.KEYID = 6
1,210,294 UART: [ldev] SUBJECT.KEYID = 5
1,210,721 UART: [ldev] AUTHORITY.KEYID = 7
1,211,184 UART: [ldev] FE.KEYID = 1
1,216,298 UART: [ldev] Erasing FE.KEYID = 1
1,242,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,010 UART: [ldev] --
1,282,367 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,258 >>> mbox cmd response: success
2,827,402 UART: [afmc] ++
2,827,570 UART: [afmc] CDI.KEYID = 6
2,827,933 UART: [afmc] SUBJECT.KEYID = 7
2,828,359 UART: [afmc] AUTHORITY.KEYID = 5
2,863,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,089 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,801 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,684 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,397 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,223 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,350 UART: [kat] SHA2-256
901,290 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,469 UART: [kat] LMS
1,168,781 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,172,752 UART: [idev] ++
1,172,920 UART: [idev] CDI.KEYID = 6
1,173,281 UART: [idev] SUBJECT.KEYID = 7
1,173,706 UART: [idev] UDS.KEYID = 0
1,181,697 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,472 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,281,131 UART: [fwproc] Wait for Commands...
1,281,860 UART: [fwproc] Recv command 0x46574c44
1,282,593 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,491 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,828 >>> mbox cmd response: success
2,825,862 UART: [afmc] ++
2,826,030 UART: [afmc] CDI.KEYID = 6
2,826,393 UART: [afmc] SUBJECT.KEYID = 7
2,826,819 UART: [afmc] AUTHORITY.KEYID = 5
2,862,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,904 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,653 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,365 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,248 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,961 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,733 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,497 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,862 UART: [kat] SHA2-256
901,802 UART: [kat] SHA2-384
904,421 UART: [kat] SHA2-512-ACC
906,322 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,474 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,524 UART: [idev] ++
1,172,692 UART: [idev] CDI.KEYID = 6
1,173,053 UART: [idev] SUBJECT.KEYID = 7
1,173,478 UART: [idev] UDS.KEYID = 0
1,181,643 UART: [idev] Erasing UDS.KEYID = 0
1,198,331 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,310 UART: [ldev] ++
1,208,478 UART: [ldev] CDI.KEYID = 6
1,208,842 UART: [ldev] SUBJECT.KEYID = 5
1,209,269 UART: [ldev] AUTHORITY.KEYID = 7
1,209,732 UART: [ldev] FE.KEYID = 1
1,214,574 UART: [ldev] Erasing FE.KEYID = 1
1,240,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,534 UART: [ldev] --
1,279,805 UART: [fwproc] Wait for Commands...
1,280,594 UART: [fwproc] Recv command 0x46574c44
1,281,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,431 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,752 >>> mbox cmd response: success
2,824,860 UART: [afmc] ++
2,825,028 UART: [afmc] CDI.KEYID = 6
2,825,391 UART: [afmc] SUBJECT.KEYID = 7
2,825,817 UART: [afmc] AUTHORITY.KEYID = 5
2,861,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,117 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,829 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,712 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,425 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,201 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.54s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,137 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,639 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,881 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,421 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,693 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,911 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,411 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,987 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,379 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,595 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,295 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,511 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,937 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,121 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,029 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,705 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,979 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,491 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,415 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,859 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 31.14s
Truncated 104976 bytes from beginning
4
1,283,238 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,000 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,281 >>> mbox cmd response: success
2,827,421 UART: [afmc] ++
2,827,589 UART: [afmc] CDI.KEYID = 6
2,827,952 UART: [afmc] SUBJECT.KEYID = 7
2,828,378 UART: [afmc] AUTHORITY.KEYID = 5
2,864,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,876 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,588 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,471 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,184 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,956 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,722 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
900,063 UART: [kat] SHA2-256
902,003 UART: [kat] SHA2-384
904,962 UART: [kat] SHA2-512-ACC
906,863 UART: [kat] ECC-384
916,878 UART: [kat] HMAC-384Kdf
921,536 UART: [kat] LMS
1,169,848 UART: [kat] --
1,170,779 UART: [cold-reset] ++
1,171,185 UART: [fht] FHT @ 0x50003400
1,173,791 UART: [idev] ++
1,173,959 UART: [idev] CDI.KEYID = 6
1,174,320 UART: [idev] SUBJECT.KEYID = 7
1,174,745 UART: [idev] UDS.KEYID = 0
1,182,536 UART: [idev] Erasing UDS.KEYID = 0
1,199,482 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,133 UART: [ldev] ++
1,209,301 UART: [ldev] CDI.KEYID = 6
1,209,665 UART: [ldev] SUBJECT.KEYID = 5
1,210,092 UART: [ldev] AUTHORITY.KEYID = 7
1,210,555 UART: [ldev] FE.KEYID = 1
1,215,689 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,114 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,081 >>> mbox cmd response: success
2,827,167 UART: [afmc] ++
2,827,335 UART: [afmc] CDI.KEYID = 6
2,827,698 UART: [afmc] SUBJECT.KEYID = 7
2,828,124 UART: [afmc] AUTHORITY.KEYID = 5
2,863,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,053 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,802 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,514 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,397 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,110 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,710 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,983 UART: [state] LifecycleState = Unprovisioned
85,638 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
891,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,279 UART: [kat] ++
895,431 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,360 UART: [kat] SHA2-512-ACC
906,261 UART: [kat] ECC-384
916,064 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,573 UART: [fht] FHT @ 0x50003400
1,173,221 UART: [idev] ++
1,173,389 UART: [idev] CDI.KEYID = 6
1,173,750 UART: [idev] SUBJECT.KEYID = 7
1,174,175 UART: [idev] UDS.KEYID = 0
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,198,268 UART: [idev] Sha1 KeyId Algorithm
1,207,174 UART: [idev] --
1,208,157 UART: [ldev] ++
1,208,325 UART: [ldev] CDI.KEYID = 6
1,208,689 UART: [ldev] SUBJECT.KEYID = 5
1,209,116 UART: [ldev] AUTHORITY.KEYID = 7
1,209,579 UART: [ldev] FE.KEYID = 1
1,214,865 UART: [ldev] Erasing FE.KEYID = 1
1,241,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,779 UART: [ldev] --
1,280,992 UART: [fwproc] Wait for Commands...
1,281,739 UART: [fwproc] Recv command 0x46574c44
1,282,472 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,046 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,173 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,707 >>> mbox cmd response: success
2,825,787 UART: [afmc] ++
2,825,955 UART: [afmc] CDI.KEYID = 6
2,826,318 UART: [afmc] SUBJECT.KEYID = 7
2,826,744 UART: [afmc] AUTHORITY.KEYID = 5
2,862,420 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,578 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,290 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,173 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,886 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,618 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,429 UART: [kat] SHA2-256
890,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,083 UART: [kat] ++
895,235 UART: [kat] sha1
899,691 UART: [kat] SHA2-256
901,631 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
915,626 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,169,897 UART: [fht] FHT @ 0x50003400
1,172,397 UART: [idev] ++
1,172,565 UART: [idev] CDI.KEYID = 6
1,172,926 UART: [idev] SUBJECT.KEYID = 7
1,173,351 UART: [idev] UDS.KEYID = 0
1,181,042 UART: [idev] Erasing UDS.KEYID = 0
1,198,174 UART: [idev] Sha1 KeyId Algorithm
1,206,884 UART: [idev] --
1,208,143 UART: [ldev] ++
1,208,311 UART: [ldev] CDI.KEYID = 6
1,208,675 UART: [ldev] SUBJECT.KEYID = 5
1,209,102 UART: [ldev] AUTHORITY.KEYID = 7
1,209,565 UART: [ldev] FE.KEYID = 1
1,214,623 UART: [ldev] Erasing FE.KEYID = 1
1,240,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,897 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,609 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,577 UART: [ldev] --
1,279,904 UART: [fwproc] Wait for Commands...
1,280,531 UART: [fwproc] Recv command 0x46574c44
1,281,264 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,757 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,229 >>> mbox cmd response: success
2,825,385 UART: [afmc] ++
2,825,553 UART: [afmc] CDI.KEYID = 6
2,825,916 UART: [afmc] SUBJECT.KEYID = 7
2,826,342 UART: [afmc] AUTHORITY.KEYID = 5
2,861,850 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,968 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,680 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,563 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,276 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,012 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.86s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,234 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,094 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,424 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,714 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,386 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,358 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,080 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,742 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,736 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,448 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,794 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,694 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,918 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,430 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,748 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,292 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,580 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,624 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,006 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,348 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,646 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.61s
Truncated 104976 bytes from beginning
4
1,282,805 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,799 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,740 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,176 >>> mbox cmd response: success
2,826,386 UART: [afmc] ++
2,826,554 UART: [afmc] CDI.KEYID = 6
2,826,917 UART: [afmc] SUBJECT.KEYID = 7
2,827,343 UART: [afmc] AUTHORITY.KEYID = 5
2,862,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,127 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,839 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,722 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,435 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,053 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Unprovisioned
86,263 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
891,586 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,690 UART: [kat] ++
895,842 UART: [kat] sha1
900,058 UART: [kat] SHA2-256
901,998 UART: [kat] SHA2-384
904,821 UART: [kat] SHA2-512-ACC
906,722 UART: [kat] ECC-384
916,813 UART: [kat] HMAC-384Kdf
921,401 UART: [kat] LMS
1,169,713 UART: [kat] --
1,170,386 UART: [cold-reset] ++
1,170,906 UART: [fht] FHT @ 0x50003400
1,173,392 UART: [idev] ++
1,173,560 UART: [idev] CDI.KEYID = 6
1,173,921 UART: [idev] SUBJECT.KEYID = 7
1,174,346 UART: [idev] UDS.KEYID = 0
1,182,245 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,208,303 UART: [idev] --
1,209,356 UART: [ldev] ++
1,209,524 UART: [ldev] CDI.KEYID = 6
1,209,888 UART: [ldev] SUBJECT.KEYID = 5
1,210,315 UART: [ldev] AUTHORITY.KEYID = 7
1,210,778 UART: [ldev] FE.KEYID = 1
1,215,954 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,728 UART: [ldev] --
1,281,115 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46574c44
1,282,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,620 >>> mbox cmd response: success
2,826,694 UART: [afmc] ++
2,826,862 UART: [afmc] CDI.KEYID = 6
2,827,225 UART: [afmc] SUBJECT.KEYID = 7
2,827,651 UART: [afmc] AUTHORITY.KEYID = 5
2,863,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,411 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,123 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,006 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,719 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,529 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,246 UART: [kat] SHA2-256
890,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,900 UART: [kat] ++
895,052 UART: [kat] sha1
899,292 UART: [kat] SHA2-256
901,232 UART: [kat] SHA2-384
903,991 UART: [kat] SHA2-512-ACC
905,892 UART: [kat] ECC-384
915,559 UART: [kat] HMAC-384Kdf
920,285 UART: [kat] LMS
1,168,597 UART: [kat] --
1,169,384 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,632 UART: [idev] ++
1,172,800 UART: [idev] CDI.KEYID = 6
1,173,161 UART: [idev] SUBJECT.KEYID = 7
1,173,586 UART: [idev] UDS.KEYID = 0
1,181,573 UART: [idev] Erasing UDS.KEYID = 0
1,198,573 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,902 UART: [ldev] Erasing FE.KEYID = 1
1,240,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,360 UART: [ldev] --
1,279,795 UART: [fwproc] Wait for Commands...
1,280,590 UART: [fwproc] Recv command 0x46574c44
1,281,323 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,042 >>> mbox cmd response: success
2,825,238 UART: [afmc] ++
2,825,406 UART: [afmc] CDI.KEYID = 6
2,825,769 UART: [afmc] SUBJECT.KEYID = 7
2,826,195 UART: [afmc] AUTHORITY.KEYID = 5
2,861,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,237 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,949 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,832 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,545 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,471 UART: [afmc] --
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,581 UART: [state] WD Timer not started. Device not locked for debugging
87,846 UART: [kat] SHA2-256
891,396 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,500 UART: [kat] ++
895,652 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,169,904 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,181,727 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,837 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,934 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,524 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,678 UART: [fwproc] Recv command 0x46574c44
1,282,411 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,175 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,478 >>> mbox cmd response: success
2,826,740 UART: [afmc] ++
2,826,908 UART: [afmc] CDI.KEYID = 6
2,827,271 UART: [afmc] SUBJECT.KEYID = 7
2,827,697 UART: [afmc] AUTHORITY.KEYID = 5
2,863,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,446 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,195 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,907 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,790 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,503 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,217 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 34.84s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,243 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,227 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,571 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,459 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,777 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,479 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,375 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,539 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,659 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,341 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,435 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,295 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,997 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,733 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,415 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,649 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,251 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,233 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,779 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,313 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,803 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.31s
Truncated 104976 bytes from beginning
4
1,283,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,800 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,955 >>> mbox cmd response: success
2,827,995 UART: [afmc] ++
2,828,163 UART: [afmc] CDI.KEYID = 6
2,828,526 UART: [afmc] SUBJECT.KEYID = 7
2,828,952 UART: [afmc] AUTHORITY.KEYID = 5
2,864,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,299 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,048 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,760 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,643 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,356 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,246 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,170,287 UART: [cold-reset] ++
1,170,711 UART: [fht] FHT @ 0x50003400
1,173,359 UART: [idev] ++
1,173,527 UART: [idev] CDI.KEYID = 6
1,173,888 UART: [idev] SUBJECT.KEYID = 7
1,174,313 UART: [idev] UDS.KEYID = 0
1,182,096 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,122 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,801 UART: [ldev] Erasing FE.KEYID = 1
1,241,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,626 UART: [fwproc] Wait for Commands...
1,281,227 UART: [fwproc] Recv command 0x46574c44
1,281,960 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,415 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,590 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,747 >>> mbox cmd response: success
2,825,911 UART: [afmc] ++
2,826,079 UART: [afmc] CDI.KEYID = 6
2,826,442 UART: [afmc] SUBJECT.KEYID = 7
2,826,868 UART: [afmc] AUTHORITY.KEYID = 5
2,862,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,817 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,566 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,278 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,161 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,874 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,526 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,521 UART: [ldev] ++
1,209,689 UART: [ldev] CDI.KEYID = 6
1,210,053 UART: [ldev] SUBJECT.KEYID = 5
1,210,480 UART: [ldev] AUTHORITY.KEYID = 7
1,210,943 UART: [ldev] FE.KEYID = 1
1,216,289 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,937 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,205 UART: [ldev] --
1,281,606 UART: [fwproc] Wait for Commands...
1,282,247 UART: [fwproc] Recv command 0x46574c44
1,282,980 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,655,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,583 >>> mbox cmd response: success
2,827,747 UART: [afmc] ++
2,827,915 UART: [afmc] CDI.KEYID = 6
2,828,278 UART: [afmc] SUBJECT.KEYID = 7
2,828,704 UART: [afmc] AUTHORITY.KEYID = 5
2,864,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,838 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,887,550 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,893,433 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,146 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,906,822 UART: [afmc] --
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,531 UART: [kat] SHA2-256
891,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,185 UART: [kat] ++
895,337 UART: [kat] sha1
899,565 UART: [kat] SHA2-256
901,505 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,638 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,199 UART: [cold-reset] ++
1,169,555 UART: [fht] FHT @ 0x50003400
1,172,191 UART: [idev] ++
1,172,359 UART: [idev] CDI.KEYID = 6
1,172,720 UART: [idev] SUBJECT.KEYID = 7
1,173,145 UART: [idev] UDS.KEYID = 0
1,181,070 UART: [idev] Erasing UDS.KEYID = 0
1,198,298 UART: [idev] Sha1 KeyId Algorithm
1,207,122 UART: [idev] --
1,208,055 UART: [ldev] ++
1,208,223 UART: [ldev] CDI.KEYID = 6
1,208,587 UART: [ldev] SUBJECT.KEYID = 5
1,209,014 UART: [ldev] AUTHORITY.KEYID = 7
1,209,477 UART: [ldev] FE.KEYID = 1
1,214,695 UART: [ldev] Erasing FE.KEYID = 1
1,240,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,303 UART: [ldev] --
1,279,700 UART: [fwproc] Wait for Commands...
1,280,441 UART: [fwproc] Recv command 0x46574c44
1,281,174 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,652,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,915 >>> mbox cmd response: success
2,825,149 UART: [afmc] ++
2,825,317 UART: [afmc] CDI.KEYID = 6
2,825,680 UART: [afmc] SUBJECT.KEYID = 7
2,826,106 UART: [afmc] AUTHORITY.KEYID = 5
2,861,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,423 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,172 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,884,884 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,890,767 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,480 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,062 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 33.94s
Truncated 6512 bytes from beginning
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,518 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,310 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,942 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,088 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,838 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,442 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,376 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,760 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,728 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,518 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,452 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,814 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,859 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,726 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,906 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,456 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,518 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,570 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,510 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,164 >>> mbox cmd response: success
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,744 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_optional_no_pubkey_revocation_check ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 32.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
5,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,026 UART:
192,430 UART: Running Caliptra ROM ...
193,542 UART:
193,694 UART: [state] CFI Enabled
258,952 UART: [state] LifecycleState = Unprovisioned
260,836 UART: [state] DebugLocked = No
262,486 UART: [state] WD Timer not started. Device not locked for debugging
265,667 UART: [kat] SHA2-256
445,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,108 UART: [kat] ++
456,586 UART: [kat] sha1
467,842 UART: [kat] SHA2-256
470,576 UART: [kat] SHA2-384
476,067 UART: [kat] SHA2-512-ACC
478,410 UART: [kat] ECC-384
2,923,289 UART: [kat] HMAC-384Kdf
2,946,826 UART: [kat] LMS
3,423,320 UART: [kat] --
3,427,855 UART: [cold-reset] ++
3,428,871 UART: [fht] FHT @ 0x50003400
3,441,418 UART: [idev] ++
3,441,992 UART: [idev] CDI.KEYID = 6
3,442,967 UART: [idev] SUBJECT.KEYID = 7
3,444,187 UART: [idev] UDS.KEYID = 0
3,477,401 UART: [idev] Erasing UDS.KEYID = 0
5,960,033 UART: [idev] Sha1 KeyId Algorithm
5,983,543 UART: [idev] --
5,987,864 UART: [ldev] ++
5,988,439 UART: [ldev] CDI.KEYID = 6
5,989,410 UART: [ldev] SUBJECT.KEYID = 5
5,990,576 UART: [ldev] AUTHORITY.KEYID = 7
5,991,833 UART: [ldev] FE.KEYID = 1
6,033,009 UART: [ldev] Erasing FE.KEYID = 1
8,538,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,562 UART: [ldev] --
10,348,759 UART: [fwproc] Wait for Commands...
10,351,245 UART: [fwproc] Recv command 0x46574c44
10,353,242 UART: [fwproc] Recv'd Img size: 118548 bytes
10,446,442 UART: ROM Fatal Error: 0x000B0032
10,449,695 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
5,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,361,322 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
8,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,465 UART:
192,833 UART: Running Caliptra ROM ...
194,008 UART:
603,550 UART: [state] CFI Enabled
615,296 UART: [state] LifecycleState = Unprovisioned
617,189 UART: [state] DebugLocked = No
619,320 UART: [state] WD Timer not started. Device not locked for debugging
622,933 UART: [kat] SHA2-256
802,618 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,400 UART: [kat] ++
813,885 UART: [kat] sha1
824,167 UART: [kat] SHA2-256
826,846 UART: [kat] SHA2-384
831,816 UART: [kat] SHA2-512-ACC
834,214 UART: [kat] ECC-384
3,274,580 UART: [kat] HMAC-384Kdf
3,286,203 UART: [kat] LMS
3,762,753 UART: [kat] --
3,766,220 UART: [cold-reset] ++
3,768,508 UART: [fht] FHT @ 0x50003400
3,779,485 UART: [idev] ++
3,780,046 UART: [idev] CDI.KEYID = 6
3,781,062 UART: [idev] SUBJECT.KEYID = 7
3,782,277 UART: [idev] UDS.KEYID = 0
3,798,575 UART: [idev] Erasing UDS.KEYID = 0
6,259,913 UART: [idev] Sha1 KeyId Algorithm
6,283,632 UART: [idev] --
6,287,949 UART: [ldev] ++
6,288,516 UART: [ldev] CDI.KEYID = 6
6,289,444 UART: [ldev] SUBJECT.KEYID = 5
6,290,659 UART: [ldev] AUTHORITY.KEYID = 7
6,291,894 UART: [ldev] FE.KEYID = 1
6,304,267 UART: [ldev] Erasing FE.KEYID = 1
8,788,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,013 UART: [ldev] --
10,582,020 UART: [fwproc] Wait for Commands...
10,584,289 UART: [fwproc] Recv command 0x46574c44
10,586,276 UART: [fwproc] Recv'd Img size: 118548 bytes
10,681,313 UART: ROM Fatal Error: 0x000B0032
10,684,563 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
6,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,408 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,683 UART: [kat] LMS
1,168,995 UART: [kat] --
1,169,882 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,181,781 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,209,056 UART: [ldev] ++
1,209,224 UART: [ldev] CDI.KEYID = 6
1,209,588 UART: [ldev] SUBJECT.KEYID = 5
1,210,015 UART: [ldev] AUTHORITY.KEYID = 7
1,210,478 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,004 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,932 UART: [fwproc] Recv command 0x46574c44
1,282,665 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,298 UART: ROM Fatal Error: 0x000B0032
1,309,455 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,696 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,349 UART: [kat] SHA2-256
891,899 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,003 UART: [kat] ++
896,155 UART: [kat] sha1
900,179 UART: [kat] SHA2-256
902,119 UART: [kat] SHA2-384
904,934 UART: [kat] SHA2-512-ACC
906,835 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,866 UART: [kat] LMS
1,169,178 UART: [kat] --
1,170,209 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,182,178 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,556 UART: [idev] --
1,209,627 UART: [ldev] ++
1,209,795 UART: [ldev] CDI.KEYID = 6
1,210,159 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,483 UART: [ldev] Erasing FE.KEYID = 1
1,243,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,863 UART: [ldev] --
1,283,148 UART: [fwproc] Wait for Commands...
1,283,717 UART: [fwproc] Recv command 0x46574c44
1,284,450 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,825 UART: ROM Fatal Error: 0x000B0032
1,310,982 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,427 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,440 UART: [kat] SHA2-256
890,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,094 UART: [kat] ++
895,246 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,315 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,172,936 UART: [idev] ++
1,173,104 UART: [idev] CDI.KEYID = 6
1,173,465 UART: [idev] SUBJECT.KEYID = 7
1,173,890 UART: [idev] UDS.KEYID = 0
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,079 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,242,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,328 UART: [ldev] --
1,281,561 UART: [fwproc] Wait for Commands...
1,282,252 UART: [fwproc] Recv command 0x46574c44
1,282,985 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,910 UART: ROM Fatal Error: 0x000B0032
1,310,067 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,182 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,668 UART: [state] WD Timer not started. Device not locked for debugging
87,857 UART: [kat] SHA2-256
891,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,511 UART: [kat] ++
895,663 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,948 UART: [kat] LMS
1,169,260 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,181,602 UART: [idev] Erasing UDS.KEYID = 0
1,198,680 UART: [idev] Sha1 KeyId Algorithm
1,207,624 UART: [idev] --
1,208,467 UART: [ldev] ++
1,208,635 UART: [ldev] CDI.KEYID = 6
1,208,999 UART: [ldev] SUBJECT.KEYID = 5
1,209,426 UART: [ldev] AUTHORITY.KEYID = 7
1,209,889 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,121 UART: [ldev] --
1,280,418 UART: [fwproc] Wait for Commands...
1,281,065 UART: [fwproc] Recv command 0x46574c44
1,281,798 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,991 UART: ROM Fatal Error: 0x000B0032
1,309,148 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,171 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
891,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,704 UART: [kat] ++
895,856 UART: [kat] sha1
900,240 UART: [kat] SHA2-256
902,180 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,179 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,542 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,182,075 UART: [idev] Erasing UDS.KEYID = 0
1,199,189 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,012 UART: [ldev] ++
1,209,180 UART: [ldev] CDI.KEYID = 6
1,209,544 UART: [ldev] SUBJECT.KEYID = 5
1,209,971 UART: [ldev] AUTHORITY.KEYID = 7
1,210,434 UART: [ldev] FE.KEYID = 1
1,215,876 UART: [ldev] Erasing FE.KEYID = 1
1,242,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,689 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,140 UART: [ldev] --
1,281,431 UART: [fwproc] Wait for Commands...
1,282,196 UART: [fwproc] Recv command 0x46574c44
1,282,929 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,808 UART: ROM Fatal Error: 0x000B0032
1,309,965 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,114 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,213 UART: [kat] SHA2-256
902,153 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,171,059 UART: [fht] FHT @ 0x50003400
1,173,749 UART: [idev] ++
1,173,917 UART: [idev] CDI.KEYID = 6
1,174,278 UART: [idev] SUBJECT.KEYID = 7
1,174,703 UART: [idev] UDS.KEYID = 0
1,182,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,932 UART: [idev] Sha1 KeyId Algorithm
1,208,746 UART: [idev] --
1,209,951 UART: [ldev] ++
1,210,119 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,910 UART: [ldev] AUTHORITY.KEYID = 7
1,211,373 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,581 UART: [ldev] --
1,281,964 UART: [fwproc] Wait for Commands...
1,282,601 UART: [fwproc] Recv command 0x46574c44
1,283,334 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,405 UART: ROM Fatal Error: 0x000B0032
1,309,562 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,389 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_lms_pubkey_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
Truncated 76844 bytes from beginning
0,375,593 UART: [fwproc] Recv'd Img size: 118548 bytes
10,464,281 UART: ROM Fatal Error: 0x00B0003A
10,467,501 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
2,069,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,219,262 UART:
2,219,667 UART: Running Caliptra ROM ...
2,220,815 UART:
2,220,993 UART: [state] CFI Enabled
2,221,966 UART: [state] LifecycleState = Unprovisioned
2,223,655 UART: [state] DebugLocked = No
2,224,773 UART: [state] WD Timer not started. Device not locked for debugging
2,227,254 UART: [kat] SHA2-256
2,227,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,947 UART: [kat] ++
2,231,407 UART: [kat] sha1
2,231,933 UART: [kat] SHA2-256
2,232,696 UART: [kat] SHA2-384
2,233,373 UART: [kat] SHA2-512-ACC
2,234,313 UART: [kat] ECC-384
2,925,341 UART: [kat] HMAC-384Kdf
2,949,713 UART: [kat] LMS
3,426,199 UART: [kat] --
3,430,408 UART: [cold-reset] ++
3,431,908 UART: [fht] FHT @ 0x50003400
3,442,674 UART: [idev] ++
3,443,268 UART: [idev] CDI.KEYID = 6
3,444,160 UART: [idev] SUBJECT.KEYID = 7
3,445,430 UART: [idev] UDS.KEYID = 0
3,479,211 UART: [idev] Erasing UDS.KEYID = 0
5,962,456 UART: [idev] Sha1 KeyId Algorithm
5,986,817 UART: [idev] --
5,992,064 UART: [ldev] ++
5,992,638 UART: [ldev] CDI.KEYID = 6
5,993,554 UART: [ldev] SUBJECT.KEYID = 5
5,994,769 UART: [ldev] AUTHORITY.KEYID = 7
5,996,003 UART: [ldev] FE.KEYID = 1
6,035,938 UART: [ldev] Erasing FE.KEYID = 1
8,544,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,464 UART: [ldev] --
10,353,987 UART: [fwproc] Wait for Commands...
10,355,607 UART: [fwproc] Recv command 0x46574c44
10,357,653 UART: [fwproc] Recv'd Img size: 118548 bytes
10,451,393 UART: ROM Fatal Error: 0x00B0003A
10,454,647 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,074,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,224,470 UART:
2,224,898 UART: Running Caliptra ROM ...
2,226,071 UART:
2,226,252 UART: [state] CFI Enabled
2,227,447 UART: [state] LifecycleState = Unprovisioned
2,229,111 UART: [state] DebugLocked = No
2,230,229 UART: [state] WD Timer not started. Device not locked for debugging
2,232,710 UART: [kat] SHA2-256
2,233,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,236,400 UART: [kat] ++
2,236,860 UART: [kat] sha1
2,237,429 UART: [kat] SHA2-256
2,238,092 UART: [kat] SHA2-384
2,238,762 UART: [kat] SHA2-512-ACC
2,239,569 UART: [kat] ECC-384
2,950,002 UART: [kat] HMAC-384Kdf
2,972,175 UART: [kat] LMS
3,448,653 UART: [kat] --
3,450,697 UART: [cold-reset] ++
3,452,047 UART: [fht] FHT @ 0x50003400
3,462,973 UART: [idev] ++
3,463,544 UART: [idev] CDI.KEYID = 6
3,464,560 UART: [idev] SUBJECT.KEYID = 7
3,465,726 UART: [idev] UDS.KEYID = 0
3,502,442 UART: [idev] Erasing UDS.KEYID = 0
5,986,892 UART: [idev] Sha1 KeyId Algorithm
6,010,967 UART: [idev] --
6,016,169 UART: [ldev] ++
6,016,746 UART: [ldev] CDI.KEYID = 6
6,017,723 UART: [ldev] SUBJECT.KEYID = 5
6,018,889 UART: [ldev] AUTHORITY.KEYID = 7
6,020,127 UART: [ldev] FE.KEYID = 1
6,057,594 UART: [ldev] Erasing FE.KEYID = 1
8,563,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,140 UART: [ldev] --
10,373,266 UART: [fwproc] Wait for Commands...
10,375,905 UART: [fwproc] Recv command 0x46574c44
10,377,889 UART: [fwproc] Recv'd Img size: 118548 bytes
10,466,738 UART: ROM Fatal Error: 0x00B0003A
10,469,911 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,822 writing to cptra_bootfsm_go
2,064,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,213,927 UART:
2,214,344 UART: Running Caliptra ROM ...
2,215,449 UART:
2,215,619 UART: [state] CFI Enabled
2,216,590 UART: [state] LifecycleState = Unprovisioned
2,218,253 UART: [state] DebugLocked = No
2,219,367 UART: [state] WD Timer not started. Device not locked for debugging
2,221,841 UART: [kat] SHA2-256
2,222,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,225,522 UART: [kat] ++
2,225,980 UART: [kat] sha1
2,226,676 UART: [kat] SHA2-256
2,227,375 UART: [kat] SHA2-384
2,228,042 UART: [kat] SHA2-512-ACC
2,228,886 UART: [kat] ECC-384
2,949,324 UART: [kat] HMAC-384Kdf
2,971,681 UART: [kat] LMS
3,448,180 UART: [kat] --
3,451,034 UART: [cold-reset] ++
3,452,865 UART: [fht] FHT @ 0x50003400
3,465,362 UART: [idev] ++
3,465,931 UART: [idev] CDI.KEYID = 6
3,466,897 UART: [idev] SUBJECT.KEYID = 7
3,468,113 UART: [idev] UDS.KEYID = 0
3,501,077 UART: [idev] Erasing UDS.KEYID = 0
5,986,987 UART: [idev] Sha1 KeyId Algorithm
6,010,437 UART: [idev] --
6,016,577 UART: [ldev] ++
6,017,181 UART: [ldev] CDI.KEYID = 6
6,018,100 UART: [ldev] SUBJECT.KEYID = 5
6,019,271 UART: [ldev] AUTHORITY.KEYID = 7
6,020,567 UART: [ldev] FE.KEYID = 1
6,057,201 UART: [ldev] Erasing FE.KEYID = 1
8,564,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,985 UART: [ldev] --
10,373,111 UART: [fwproc] Wait for Commands...
10,376,069 UART: [fwproc] Recv command 0x46574c44
10,378,059 UART: [fwproc] Recv'd Img size: 118548 bytes
10,472,138 UART: ROM Fatal Error: 0x00B0003A
10,475,331 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
2,069,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,219,084 UART:
2,219,483 UART: Running Caliptra ROM ...
2,220,660 UART:
2,220,840 UART: [state] CFI Enabled
2,221,800 UART: [state] LifecycleState = Unprovisioned
2,223,457 UART: [state] DebugLocked = No
2,224,567 UART: [state] WD Timer not started. Device not locked for debugging
2,227,039 UART: [kat] SHA2-256
2,227,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,230,764 UART: [kat] ++
2,231,226 UART: [kat] sha1
2,231,793 UART: [kat] SHA2-256
2,232,555 UART: [kat] SHA2-384
2,233,228 UART: [kat] SHA2-512-ACC
2,234,066 UART: [kat] ECC-384
2,946,685 UART: [kat] HMAC-384Kdf
2,971,637 UART: [kat] LMS
3,448,121 UART: [kat] --
3,454,986 UART: [cold-reset] ++
3,456,012 UART: [fht] FHT @ 0x50003400
3,466,364 UART: [idev] ++
3,466,964 UART: [idev] CDI.KEYID = 6
3,467,857 UART: [idev] SUBJECT.KEYID = 7
3,469,128 UART: [idev] UDS.KEYID = 0
3,500,659 UART: [idev] Erasing UDS.KEYID = 0
5,990,186 UART: [idev] Sha1 KeyId Algorithm
6,014,715 UART: [idev] --
6,019,470 UART: [ldev] ++
6,020,047 UART: [ldev] CDI.KEYID = 6
6,020,967 UART: [ldev] SUBJECT.KEYID = 5
6,022,331 UART: [ldev] AUTHORITY.KEYID = 7
6,023,531 UART: [ldev] FE.KEYID = 1
6,056,651 UART: [ldev] Erasing FE.KEYID = 1
8,564,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,497 UART: [ldev] --
10,372,664 UART: [fwproc] Wait for Commands...
10,375,646 UART: [fwproc] Recv command 0x46574c44
10,377,640 UART: [fwproc] Recv'd Img size: 118548 bytes
14,903,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,985,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,058,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,385,747 >>> mbox cmd response: success
15,389,491 UART: [afmc] ++
15,390,082 UART: [afmc] CDI.KEYID = 6
15,391,111 UART: [afmc] SUBJECT.KEYID = 7
15,392,270 UART: [afmc] AUTHORITY.KEYID = 5
17,920,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,664,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,666,394 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,682,077 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,698,079 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,713,677 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,739,395 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.32s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
2,068,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,358,671 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
2,066,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,334,335 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
2,063,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,367,364 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
2,072,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,322,054 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
2,081,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,368,687 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
2,070,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,359,751 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
2,061,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,355,646 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,851 writing to cptra_bootfsm_go
2,074,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,338,552 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,063,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,352,530 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
2,060,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,342,801 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
2,073,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,346,267 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,847 writing to cptra_bootfsm_go
2,068,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,348,168 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
2,065,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,343,285 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
2,067,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,344,267 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
2,071,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,339,191 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
2,070,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,362,344 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,066,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,339,848 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
2,074,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,340,129 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
2,071,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,344,183 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.12s
Truncated 76844 bytes from beginning
0,590,894 UART: [fwproc] Recv'd Img size: 118548 bytes
10,681,095 UART: ROM Fatal Error: 0x00B0003A
10,684,291 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
2,068,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,217,640 UART:
2,218,052 UART: Running Caliptra ROM ...
2,219,141 UART:
2,219,312 UART: [state] CFI Enabled
2,220,276 UART: [state] LifecycleState = Unprovisioned
2,221,952 UART: [state] DebugLocked = No
2,222,981 UART: [state] WD Timer not started. Device not locked for debugging
2,225,453 UART: [kat] SHA2-256
2,226,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,229,126 UART: [kat] ++
2,229,575 UART: [kat] sha1
2,230,080 UART: [kat] SHA2-256
2,230,737 UART: [kat] SHA2-384
2,231,392 UART: [kat] SHA2-512-ACC
2,232,275 UART: [kat] ECC-384
3,277,290 UART: [kat] HMAC-384Kdf
3,290,230 UART: [kat] LMS
3,766,778 UART: [kat] --
3,771,469 UART: [cold-reset] ++
3,773,309 UART: [fht] FHT @ 0x50003400
3,785,368 UART: [idev] ++
3,785,986 UART: [idev] CDI.KEYID = 6
3,786,918 UART: [idev] SUBJECT.KEYID = 7
3,788,183 UART: [idev] UDS.KEYID = 0
3,804,353 UART: [idev] Erasing UDS.KEYID = 0
6,263,183 UART: [idev] Sha1 KeyId Algorithm
6,287,555 UART: [idev] --
6,292,120 UART: [ldev] ++
6,292,689 UART: [ldev] CDI.KEYID = 6
6,293,600 UART: [ldev] SUBJECT.KEYID = 5
6,294,814 UART: [ldev] AUTHORITY.KEYID = 7
6,296,101 UART: [ldev] FE.KEYID = 1
6,306,366 UART: [ldev] Erasing FE.KEYID = 1
8,785,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,227 UART: [ldev] --
10,578,917 UART: [fwproc] Wait for Commands...
10,581,549 UART: [fwproc] Recv command 0x46574c44
10,583,587 UART: [fwproc] Recv'd Img size: 118548 bytes
10,675,740 UART: ROM Fatal Error: 0x00B0003A
10,678,960 >>> mbox cmd response: failed
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,070,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,214 UART:
2,221,641 UART: Running Caliptra ROM ...
2,222,743 UART:
2,222,893 UART: [state] CFI Enabled
2,223,864 UART: [state] LifecycleState = Unprovisioned
2,225,527 UART: [state] DebugLocked = No
2,226,637 UART: [state] WD Timer not started. Device not locked for debugging
2,229,112 UART: [kat] SHA2-256
2,229,780 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,232,792 UART: [kat] ++
2,233,245 UART: [kat] sha1
2,233,792 UART: [kat] SHA2-256
2,234,449 UART: [kat] SHA2-384
2,235,102 UART: [kat] SHA2-512-ACC
2,235,921 UART: [kat] ECC-384
3,277,315 UART: [kat] HMAC-384Kdf
3,290,043 UART: [kat] LMS
3,766,587 UART: [kat] --
3,770,847 UART: [cold-reset] ++
3,773,095 UART: [fht] FHT @ 0x50003400
3,783,207 UART: [idev] ++
3,783,777 UART: [idev] CDI.KEYID = 6
3,784,711 UART: [idev] SUBJECT.KEYID = 7
3,785,955 UART: [idev] UDS.KEYID = 0
3,801,854 UART: [idev] Erasing UDS.KEYID = 0
6,263,514 UART: [idev] Sha1 KeyId Algorithm
6,287,884 UART: [idev] --
6,292,339 UART: [ldev] ++
6,292,916 UART: [ldev] CDI.KEYID = 6
6,293,822 UART: [ldev] SUBJECT.KEYID = 5
6,295,034 UART: [ldev] AUTHORITY.KEYID = 7
6,296,342 UART: [ldev] FE.KEYID = 1
6,308,800 UART: [ldev] Erasing FE.KEYID = 1
8,786,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,879 UART: [ldev] --
10,584,956 UART: [fwproc] Wait for Commands...
10,587,094 UART: [fwproc] Recv command 0x46574c44
10,589,099 UART: [fwproc] Recv'd Img size: 118548 bytes
10,678,146 UART: ROM Fatal Error: 0x00B0003A
10,681,334 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,479 writing to cptra_bootfsm_go
2,064,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,214,571 UART:
2,214,972 UART: Running Caliptra ROM ...
2,216,146 UART:
2,216,315 UART: [state] CFI Enabled
2,217,268 UART: [state] LifecycleState = Unprovisioned
2,218,928 UART: [state] DebugLocked = No
2,220,042 UART: [state] WD Timer not started. Device not locked for debugging
2,222,516 UART: [kat] SHA2-256
2,223,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,226,195 UART: [kat] ++
2,226,669 UART: [kat] sha1
2,227,187 UART: [kat] SHA2-256
2,227,873 UART: [kat] SHA2-384
2,228,525 UART: [kat] SHA2-512-ACC
2,229,322 UART: [kat] ECC-384
3,280,200 UART: [kat] HMAC-384Kdf
3,293,677 UART: [kat] LMS
3,770,213 UART: [kat] --
3,774,960 UART: [cold-reset] ++
3,776,997 UART: [fht] FHT @ 0x50003400
3,787,812 UART: [idev] ++
3,788,382 UART: [idev] CDI.KEYID = 6
3,789,344 UART: [idev] SUBJECT.KEYID = 7
3,790,558 UART: [idev] UDS.KEYID = 0
3,808,206 UART: [idev] Erasing UDS.KEYID = 0
6,269,830 UART: [idev] Sha1 KeyId Algorithm
6,294,767 UART: [idev] --
6,300,002 UART: [ldev] ++
6,300,584 UART: [ldev] CDI.KEYID = 6
6,301,493 UART: [ldev] SUBJECT.KEYID = 5
6,302,705 UART: [ldev] AUTHORITY.KEYID = 7
6,303,939 UART: [ldev] FE.KEYID = 1
6,316,213 UART: [ldev] Erasing FE.KEYID = 1
8,792,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,552 UART: [ldev] --
10,589,035 UART: [fwproc] Wait for Commands...
10,592,272 UART: [fwproc] Recv command 0x46574c44
10,594,256 UART: [fwproc] Recv'd Img size: 118548 bytes
10,688,775 UART: ROM Fatal Error: 0x00B0003A
10,692,001 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
2,066,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,215,921 UART:
2,216,321 UART: Running Caliptra ROM ...
2,217,408 UART:
2,217,557 UART: [state] CFI Enabled
2,218,519 UART: [state] LifecycleState = Unprovisioned
2,220,169 UART: [state] DebugLocked = No
2,221,215 UART: [state] WD Timer not started. Device not locked for debugging
2,223,680 UART: [kat] SHA2-256
2,224,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,227,369 UART: [kat] ++
2,227,819 UART: [kat] sha1
2,228,325 UART: [kat] SHA2-256
2,228,978 UART: [kat] SHA2-384
2,229,630 UART: [kat] SHA2-512-ACC
2,230,425 UART: [kat] ECC-384
3,274,612 UART: [kat] HMAC-384Kdf
3,287,270 UART: [kat] LMS
3,763,764 UART: [kat] --
3,768,672 UART: [cold-reset] ++
3,771,251 UART: [fht] FHT @ 0x50003400
3,782,877 UART: [idev] ++
3,783,496 UART: [idev] CDI.KEYID = 6
3,784,492 UART: [idev] SUBJECT.KEYID = 7
3,785,648 UART: [idev] UDS.KEYID = 0
3,802,759 UART: [idev] Erasing UDS.KEYID = 0
6,262,787 UART: [idev] Sha1 KeyId Algorithm
6,285,747 UART: [idev] --
6,291,715 UART: [ldev] ++
6,292,288 UART: [ldev] CDI.KEYID = 6
6,293,193 UART: [ldev] SUBJECT.KEYID = 5
6,294,403 UART: [ldev] AUTHORITY.KEYID = 7
6,295,633 UART: [ldev] FE.KEYID = 1
6,306,977 UART: [ldev] Erasing FE.KEYID = 1
8,782,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,960 UART: [ldev] --
10,576,821 UART: [fwproc] Wait for Commands...
10,579,185 UART: [fwproc] Recv command 0x46574c44
10,581,168 UART: [fwproc] Recv'd Img size: 118548 bytes
15,127,580 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
15,210,377 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,283,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,611,172 >>> mbox cmd response: success
15,615,643 UART: [afmc] ++
15,616,235 UART: [afmc] CDI.KEYID = 6
15,617,147 UART: [afmc] SUBJECT.KEYID = 7
15,618,364 UART: [afmc] AUTHORITY.KEYID = 5
18,120,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,844,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,846,838 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
19,862,560 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
19,878,582 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
19,894,136 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
19,918,781 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.66s
Truncated 8543 bytes from beginning
x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,065,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,571,120 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
2,068,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,565,248 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
2,080,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,559,823 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
2,073,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,561,820 >>> mbox cmd response: failed
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
2,068,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,239 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
2,063,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,584 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
2,073,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,877 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
2,069,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,223 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,072,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,437 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
2,066,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,569,563 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
2,064,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,568,176 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
2,067,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,571,280 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
2,066,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,563,636 >>> mbox cmd response: failed
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
2,064,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,570,905 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,086,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,562,844 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
2,063,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,557,259 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
2,070,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,553,895 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,073,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,572,381 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
2,073,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,549,803 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 17.47s
Truncated 74764 bytes from beginning
1,271,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,506 UART: [ldev] --
1,279,927 UART: [fwproc] Wait for Commands...
1,280,714 UART: [fwproc] Recv command 0x46574c44
1,281,447 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,648 UART: ROM Fatal Error: 0x00B0003A
1,308,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,168 UART: [kat] SHA2-256
891,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,822 UART: [kat] ++
895,974 UART: [kat] sha1
900,406 UART: [kat] SHA2-256
902,346 UART: [kat] SHA2-384
904,973 UART: [kat] SHA2-512-ACC
906,874 UART: [kat] ECC-384
916,169 UART: [kat] HMAC-384Kdf
920,667 UART: [kat] LMS
1,168,979 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,973 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,208,852 UART: [ldev] ++
1,209,020 UART: [ldev] CDI.KEYID = 6
1,209,384 UART: [ldev] SUBJECT.KEYID = 5
1,209,811 UART: [ldev] AUTHORITY.KEYID = 7
1,210,274 UART: [ldev] FE.KEYID = 1
1,215,868 UART: [ldev] Erasing FE.KEYID = 1
1,242,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,750 UART: [ldev] --
1,282,057 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,614 UART: ROM Fatal Error: 0x00B0003A
1,309,775 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
891,070 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,174 UART: [kat] ++
895,326 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,345 UART: [kat] SHA2-512-ACC
906,246 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,464 UART: [fht] FHT @ 0x50003400
1,173,044 UART: [idev] ++
1,173,212 UART: [idev] CDI.KEYID = 6
1,173,573 UART: [idev] SUBJECT.KEYID = 7
1,173,998 UART: [idev] UDS.KEYID = 0
1,181,847 UART: [idev] Erasing UDS.KEYID = 0
1,198,767 UART: [idev] Sha1 KeyId Algorithm
1,207,439 UART: [idev] --
1,208,534 UART: [ldev] ++
1,208,702 UART: [ldev] CDI.KEYID = 6
1,209,066 UART: [ldev] SUBJECT.KEYID = 5
1,209,493 UART: [ldev] AUTHORITY.KEYID = 7
1,209,956 UART: [ldev] FE.KEYID = 1
1,215,188 UART: [ldev] Erasing FE.KEYID = 1
1,240,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,786 UART: [ldev] --
1,280,053 UART: [fwproc] Wait for Commands...
1,280,730 UART: [fwproc] Recv command 0x46574c44
1,281,463 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,392 UART: ROM Fatal Error: 0x00B0003A
1,308,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,170 UART: [kat] ++
895,322 UART: [kat] sha1
899,500 UART: [kat] SHA2-256
901,440 UART: [kat] SHA2-384
904,297 UART: [kat] SHA2-512-ACC
906,198 UART: [kat] ECC-384
915,727 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,586 UART: [cold-reset] ++
1,169,956 UART: [fht] FHT @ 0x50003400
1,172,538 UART: [idev] ++
1,172,706 UART: [idev] CDI.KEYID = 6
1,173,067 UART: [idev] SUBJECT.KEYID = 7
1,173,492 UART: [idev] UDS.KEYID = 0
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,355 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,214,828 UART: [ldev] Erasing FE.KEYID = 1
1,241,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,798 UART: [ldev] --
1,280,161 UART: [fwproc] Wait for Commands...
1,280,774 UART: [fwproc] Recv command 0x46574c44
1,281,507 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,104 UART: ROM Fatal Error: 0x00B0003A
1,308,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,234 UART: [kat] SHA2-256
902,174 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,145 UART: [kat] LMS
1,169,457 UART: [kat] --
1,170,344 UART: [cold-reset] ++
1,170,758 UART: [fht] FHT @ 0x50003400
1,173,564 UART: [idev] ++
1,173,732 UART: [idev] CDI.KEYID = 6
1,174,093 UART: [idev] SUBJECT.KEYID = 7
1,174,518 UART: [idev] UDS.KEYID = 0
1,182,531 UART: [idev] Erasing UDS.KEYID = 0
1,199,413 UART: [idev] Sha1 KeyId Algorithm
1,208,279 UART: [idev] --
1,209,298 UART: [ldev] ++
1,209,466 UART: [ldev] CDI.KEYID = 6
1,209,830 UART: [ldev] SUBJECT.KEYID = 5
1,210,257 UART: [ldev] AUTHORITY.KEYID = 7
1,210,720 UART: [ldev] FE.KEYID = 1
1,215,930 UART: [ldev] Erasing FE.KEYID = 1
1,242,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,852 UART: [ldev] --
1,281,087 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,596 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,197,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,289 >>> mbox cmd response: success
3,370,323 UART: [afmc] ++
3,370,491 UART: [afmc] CDI.KEYID = 6
3,370,854 UART: [afmc] SUBJECT.KEYID = 7
3,371,280 UART: [afmc] AUTHORITY.KEYID = 5
3,406,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,967 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,429,685 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,435,575 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,441,257 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,449,029 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 21.89s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,072 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,860 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,396 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,690 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,508 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,699 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.70s
Truncated 74764 bytes from beginning
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,971 UART: [ldev] --
1,281,236 UART: [fwproc] Wait for Commands...
1,282,039 UART: [fwproc] Recv command 0x46574c44
1,282,772 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,159 UART: ROM Fatal Error: 0x00B0003A
1,309,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
900,057 UART: [kat] SHA2-256
901,997 UART: [kat] SHA2-384
904,742 UART: [kat] SHA2-512-ACC
906,643 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,445 UART: [fht] FHT @ 0x50003400
1,172,987 UART: [idev] ++
1,173,155 UART: [idev] CDI.KEYID = 6
1,173,516 UART: [idev] SUBJECT.KEYID = 7
1,173,941 UART: [idev] UDS.KEYID = 0
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,198,372 UART: [idev] Sha1 KeyId Algorithm
1,207,148 UART: [idev] --
1,208,107 UART: [ldev] ++
1,208,275 UART: [ldev] CDI.KEYID = 6
1,208,639 UART: [ldev] SUBJECT.KEYID = 5
1,209,066 UART: [ldev] AUTHORITY.KEYID = 7
1,209,529 UART: [ldev] FE.KEYID = 1
1,214,887 UART: [ldev] Erasing FE.KEYID = 1
1,241,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,285 UART: [ldev] --
1,280,686 UART: [fwproc] Wait for Commands...
1,281,359 UART: [fwproc] Recv command 0x46574c44
1,282,092 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,965 UART: ROM Fatal Error: 0x00B0003A
1,309,126 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,237 UART: [cold-reset] ++
1,170,577 UART: [fht] FHT @ 0x50003400
1,173,037 UART: [idev] ++
1,173,205 UART: [idev] CDI.KEYID = 6
1,173,566 UART: [idev] SUBJECT.KEYID = 7
1,173,991 UART: [idev] UDS.KEYID = 0
1,181,848 UART: [idev] Erasing UDS.KEYID = 0
1,198,866 UART: [idev] Sha1 KeyId Algorithm
1,207,970 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,805 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,810 UART: [fwproc] Wait for Commands...
1,282,611 UART: [fwproc] Recv command 0x46574c44
1,283,344 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,863 UART: ROM Fatal Error: 0x00B0003A
1,310,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,677 UART: [kat] SHA2-256
891,227 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,331 UART: [kat] ++
895,483 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,488 UART: [kat] SHA2-512-ACC
906,389 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,883 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,182,048 UART: [idev] Erasing UDS.KEYID = 0
1,199,392 UART: [idev] Sha1 KeyId Algorithm
1,208,192 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,613 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,241,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,401 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,439 UART: [fwproc] Recv command 0x46574c44
1,282,172 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,901 UART: ROM Fatal Error: 0x00B0003A
1,309,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,594 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,991 UART: [kat] SHA2-256
901,931 UART: [kat] SHA2-384
904,604 UART: [kat] SHA2-512-ACC
906,505 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,170,121 UART: [cold-reset] ++
1,170,621 UART: [fht] FHT @ 0x50003400
1,173,371 UART: [idev] ++
1,173,539 UART: [idev] CDI.KEYID = 6
1,173,900 UART: [idev] SUBJECT.KEYID = 7
1,174,325 UART: [idev] UDS.KEYID = 0
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,358 UART: [idev] Sha1 KeyId Algorithm
1,209,230 UART: [idev] --
1,210,241 UART: [ldev] ++
1,210,409 UART: [ldev] CDI.KEYID = 6
1,210,773 UART: [ldev] SUBJECT.KEYID = 5
1,211,200 UART: [ldev] AUTHORITY.KEYID = 7
1,211,663 UART: [ldev] FE.KEYID = 1
1,217,105 UART: [ldev] Erasing FE.KEYID = 1
1,244,228 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,879 UART: [ldev] --
1,283,276 UART: [fwproc] Wait for Commands...
1,284,047 UART: [fwproc] Recv command 0x46574c44
1,284,780 UART: [fwproc] Recv'd Img size: 118548 bytes
3,184,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,212,073 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,243,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,383,599 >>> mbox cmd response: success
3,384,815 UART: [afmc] ++
3,384,983 UART: [afmc] CDI.KEYID = 6
3,385,346 UART: [afmc] SUBJECT.KEYID = 7
3,385,772 UART: [afmc] AUTHORITY.KEYID = 5
3,421,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,438,150 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,438,899 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,444,617 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,450,507 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,456,189 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,464,051 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 21.84s
Truncated 6463 bytes from beginning
neration=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,831 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,651 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,537 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,161 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,103 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,249 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,691 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.85s
Truncated 74764 bytes from beginning
1,272,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,668 UART: [ldev] --
1,280,911 UART: [fwproc] Wait for Commands...
1,281,612 UART: [fwproc] Recv command 0x46574c44
1,282,345 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,190 UART: ROM Fatal Error: 0x00B0003A
1,309,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,008 UART: [kat] ++
895,160 UART: [kat] sha1
899,188 UART: [kat] SHA2-256
901,128 UART: [kat] SHA2-384
903,873 UART: [kat] SHA2-512-ACC
905,774 UART: [kat] ECC-384
915,283 UART: [kat] HMAC-384Kdf
920,001 UART: [kat] LMS
1,168,313 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,954 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,207,901 UART: [idev] --
1,208,980 UART: [ldev] ++
1,209,148 UART: [ldev] CDI.KEYID = 6
1,209,512 UART: [ldev] SUBJECT.KEYID = 5
1,209,939 UART: [ldev] AUTHORITY.KEYID = 7
1,210,402 UART: [ldev] FE.KEYID = 1
1,215,592 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,138 UART: [ldev] --
1,280,399 UART: [fwproc] Wait for Commands...
1,281,006 UART: [fwproc] Recv command 0x46574c44
1,281,739 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,954 UART: ROM Fatal Error: 0x00B0003A
1,309,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,253 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,522 UART: [kat] SHA2-256
901,462 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,647 UART: [kat] HMAC-384Kdf
920,197 UART: [kat] LMS
1,168,509 UART: [kat] --
1,169,448 UART: [cold-reset] ++
1,169,790 UART: [fht] FHT @ 0x50003400
1,172,348 UART: [idev] ++
1,172,516 UART: [idev] CDI.KEYID = 6
1,172,877 UART: [idev] SUBJECT.KEYID = 7
1,173,302 UART: [idev] UDS.KEYID = 0
1,180,987 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,179 UART: [idev] --
1,208,144 UART: [ldev] ++
1,208,312 UART: [ldev] CDI.KEYID = 6
1,208,676 UART: [ldev] SUBJECT.KEYID = 5
1,209,103 UART: [ldev] AUTHORITY.KEYID = 7
1,209,566 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,240,939 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,676 UART: [ldev] --
1,279,883 UART: [fwproc] Wait for Commands...
1,280,584 UART: [fwproc] Recv command 0x46574c44
1,281,317 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,896 UART: ROM Fatal Error: 0x00B0003A
1,308,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Unprovisioned
86,131 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
900,040 UART: [kat] SHA2-256
901,980 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,216 UART: [idev] ++
1,173,384 UART: [idev] CDI.KEYID = 6
1,173,745 UART: [idev] SUBJECT.KEYID = 7
1,174,170 UART: [idev] UDS.KEYID = 0
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,318 UART: [ldev] Erasing FE.KEYID = 1
1,242,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,275 UART: [fwproc] Wait for Commands...
1,281,960 UART: [fwproc] Recv command 0x46574c44
1,282,693 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,472 UART: ROM Fatal Error: 0x00B0003A
1,309,633 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,510 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,181,407 UART: [idev] Erasing UDS.KEYID = 0
1,197,935 UART: [idev] Sha1 KeyId Algorithm
1,206,727 UART: [idev] --
1,207,914 UART: [ldev] ++
1,208,082 UART: [ldev] CDI.KEYID = 6
1,208,446 UART: [ldev] SUBJECT.KEYID = 5
1,208,873 UART: [ldev] AUTHORITY.KEYID = 7
1,209,336 UART: [ldev] FE.KEYID = 1
1,214,458 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,084 UART: [ldev] --
1,280,433 UART: [fwproc] Wait for Commands...
1,281,140 UART: [fwproc] Recv command 0x46574c44
1,281,873 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,202,690 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,138 >>> mbox cmd response: success
3,375,232 UART: [afmc] ++
3,375,400 UART: [afmc] CDI.KEYID = 6
3,375,763 UART: [afmc] SUBJECT.KEYID = 7
3,376,189 UART: [afmc] AUTHORITY.KEYID = 5
3,410,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,069 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,818 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,433,536 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,439,426 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,445,108 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,452,842 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.69s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,406 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,460 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,876 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,052 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,494 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,100 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,883 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 18.82s
Truncated 74764 bytes from beginning
1,272,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,783 UART: [ldev] --
1,281,052 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,643 UART: ROM Fatal Error: 0x00B0003A
1,308,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,512 UART: [kat] LMS
1,168,824 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,035 UART: [fht] FHT @ 0x50003400
1,172,533 UART: [idev] ++
1,172,701 UART: [idev] CDI.KEYID = 6
1,173,062 UART: [idev] SUBJECT.KEYID = 7
1,173,487 UART: [idev] UDS.KEYID = 0
1,181,552 UART: [idev] Erasing UDS.KEYID = 0
1,198,852 UART: [idev] Sha1 KeyId Algorithm
1,207,886 UART: [idev] --
1,208,935 UART: [ldev] ++
1,209,103 UART: [ldev] CDI.KEYID = 6
1,209,467 UART: [ldev] SUBJECT.KEYID = 5
1,209,894 UART: [ldev] AUTHORITY.KEYID = 7
1,210,357 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,445 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,869 UART: ROM Fatal Error: 0x00B0003A
1,310,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,947 UART: [kat] SHA2-256
901,887 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,274 UART: [kat] HMAC-384Kdf
920,976 UART: [kat] LMS
1,169,288 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,199 UART: [idev] ++
1,173,367 UART: [idev] CDI.KEYID = 6
1,173,728 UART: [idev] SUBJECT.KEYID = 7
1,174,153 UART: [idev] UDS.KEYID = 0
1,182,508 UART: [idev] Erasing UDS.KEYID = 0
1,200,184 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,627 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,243 UART: [ldev] --
1,282,554 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,571 UART: ROM Fatal Error: 0x00B0003A
1,310,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,452 UART: [kat] SHA2-512-ACC
906,353 UART: [kat] ECC-384
915,732 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,389 UART: [cold-reset] ++
1,169,717 UART: [fht] FHT @ 0x50003400
1,172,451 UART: [idev] ++
1,172,619 UART: [idev] CDI.KEYID = 6
1,172,980 UART: [idev] SUBJECT.KEYID = 7
1,173,405 UART: [idev] UDS.KEYID = 0
1,181,614 UART: [idev] Erasing UDS.KEYID = 0
1,198,508 UART: [idev] Sha1 KeyId Algorithm
1,207,580 UART: [idev] --
1,208,593 UART: [ldev] ++
1,208,761 UART: [ldev] CDI.KEYID = 6
1,209,125 UART: [ldev] SUBJECT.KEYID = 5
1,209,552 UART: [ldev] AUTHORITY.KEYID = 7
1,210,015 UART: [ldev] FE.KEYID = 1
1,215,237 UART: [ldev] Erasing FE.KEYID = 1
1,241,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,354 UART: [fwproc] Wait for Commands...
1,282,033 UART: [fwproc] Recv command 0x46574c44
1,282,766 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,717 UART: ROM Fatal Error: 0x00B0003A
1,309,878 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,757 UART: [state] LifecycleState = Unprovisioned
86,412 UART: [state] DebugLocked = No
87,070 UART: [state] WD Timer not started. Device not locked for debugging
88,231 UART: [kat] SHA2-256
891,781 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,885 UART: [kat] ++
896,037 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,480 UART: [kat] HMAC-384Kdf
920,960 UART: [kat] LMS
1,169,272 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,625 UART: [fht] FHT @ 0x50003400
1,173,457 UART: [idev] ++
1,173,625 UART: [idev] CDI.KEYID = 6
1,173,986 UART: [idev] SUBJECT.KEYID = 7
1,174,411 UART: [idev] UDS.KEYID = 0
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,688 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,597 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,837 UART: [ldev] --
1,283,144 UART: [fwproc] Wait for Commands...
1,283,885 UART: [fwproc] Recv command 0x46574c44
1,284,618 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,205,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,692 >>> mbox cmd response: success
3,377,732 UART: [afmc] ++
3,377,900 UART: [afmc] CDI.KEYID = 6
3,378,263 UART: [afmc] SUBJECT.KEYID = 7
3,378,689 UART: [afmc] AUTHORITY.KEYID = 5
3,414,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,754 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,437,472 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,443,362 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,449,044 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,456,728 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.86s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,643 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,789 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,289 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,015 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,007 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,361 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,653 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,069 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,692 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.65s
Truncated 74764 bytes from beginning
1,271,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,180 UART: [ldev] --
1,280,471 UART: [fwproc] Wait for Commands...
1,281,244 UART: [fwproc] Recv command 0x46574c44
1,281,977 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,764 UART: ROM Fatal Error: 0x00B0003A
1,308,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
86,005 UART: [state] WD Timer not started. Device not locked for debugging
87,112 UART: [kat] SHA2-256
890,662 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,766 UART: [kat] ++
894,918 UART: [kat] sha1
899,172 UART: [kat] SHA2-256
901,112 UART: [kat] SHA2-384
903,953 UART: [kat] SHA2-512-ACC
905,854 UART: [kat] ECC-384
915,357 UART: [kat] HMAC-384Kdf
920,081 UART: [kat] LMS
1,168,393 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,454 UART: [idev] ++
1,172,622 UART: [idev] CDI.KEYID = 6
1,172,983 UART: [idev] SUBJECT.KEYID = 7
1,173,408 UART: [idev] UDS.KEYID = 0
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,867 UART: [idev] Sha1 KeyId Algorithm
1,207,657 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,228 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,780 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,868 UART: [fwproc] Recv command 0x46574c44
1,282,601 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,722 UART: ROM Fatal Error: 0x00B0003A
1,309,883 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,574 UART: [state] LifecycleState = Unprovisioned
86,229 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
899,916 UART: [kat] SHA2-256
901,856 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
915,847 UART: [kat] HMAC-384Kdf
920,475 UART: [kat] LMS
1,168,787 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,462 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,182,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,891 UART: [idev] Sha1 KeyId Algorithm
1,207,855 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,446 UART: [ldev] --
1,280,697 UART: [fwproc] Wait for Commands...
1,281,304 UART: [fwproc] Recv command 0x46574c44
1,282,037 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,596 UART: ROM Fatal Error: 0x00B0003A
1,308,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,854 UART: [kat] SHA2-256
891,404 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,508 UART: [kat] ++
895,660 UART: [kat] sha1
899,840 UART: [kat] SHA2-256
901,780 UART: [kat] SHA2-384
904,425 UART: [kat] SHA2-512-ACC
906,326 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,181,779 UART: [idev] Erasing UDS.KEYID = 0
1,198,881 UART: [idev] Sha1 KeyId Algorithm
1,207,725 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,622 UART: [ldev] Erasing FE.KEYID = 1
1,242,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,815 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,305 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,432 UART: ROM Fatal Error: 0x00B0003A
1,310,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,828 UART: [kat] SHA2-256
901,768 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,265 UART: [kat] LMS
1,168,577 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,169,962 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,181,483 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,055 UART: [idev] --
1,209,146 UART: [ldev] ++
1,209,314 UART: [ldev] CDI.KEYID = 6
1,209,678 UART: [ldev] SUBJECT.KEYID = 5
1,210,105 UART: [ldev] AUTHORITY.KEYID = 7
1,210,568 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,177 UART: [fwproc] Wait for Commands...
1,281,964 UART: [fwproc] Recv command 0x46574c44
1,282,697 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,199,867 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,042 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,273 >>> mbox cmd response: success
3,372,523 UART: [afmc] ++
3,372,691 UART: [afmc] CDI.KEYID = 6
3,373,054 UART: [afmc] SUBJECT.KEYID = 7
3,373,480 UART: [afmc] AUTHORITY.KEYID = 5
3,409,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,270 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,019 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,431,737 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,437,627 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,443,309 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,451,179 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.70s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,216 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,332 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,264 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 19.66s
Truncated 74764 bytes from beginning
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,458 UART: [fwproc] Wait for Commands...
1,282,099 UART: [fwproc] Recv command 0x46574c44
1,282,832 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,109 UART: ROM Fatal Error: 0x00B0003A
1,310,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,761 UART: [kat] SHA2-256
891,311 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,415 UART: [kat] ++
895,567 UART: [kat] sha1
899,645 UART: [kat] SHA2-256
901,585 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,944 UART: [idev] --
1,208,891 UART: [ldev] ++
1,209,059 UART: [ldev] CDI.KEYID = 6
1,209,423 UART: [ldev] SUBJECT.KEYID = 5
1,209,850 UART: [ldev] AUTHORITY.KEYID = 7
1,210,313 UART: [ldev] FE.KEYID = 1
1,215,155 UART: [ldev] Erasing FE.KEYID = 1
1,241,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,583 UART: [ldev] --
1,280,870 UART: [fwproc] Wait for Commands...
1,281,693 UART: [fwproc] Recv command 0x46574c44
1,282,426 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,273 UART: ROM Fatal Error: 0x00B0003A
1,309,434 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
86,956 UART: [state] WD Timer not started. Device not locked for debugging
88,249 UART: [kat] SHA2-256
891,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,903 UART: [kat] ++
896,055 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,822 UART: [kat] SHA2-512-ACC
906,723 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
921,256 UART: [kat] LMS
1,169,568 UART: [kat] --
1,170,321 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,358 UART: [idev] --
1,209,319 UART: [ldev] ++
1,209,487 UART: [ldev] CDI.KEYID = 6
1,209,851 UART: [ldev] SUBJECT.KEYID = 5
1,210,278 UART: [ldev] AUTHORITY.KEYID = 7
1,210,741 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,757 UART: [ldev] --
1,282,178 UART: [fwproc] Wait for Commands...
1,282,857 UART: [fwproc] Recv command 0x46574c44
1,283,590 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,899 UART: ROM Fatal Error: 0x00B0003A
1,310,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,314 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,939 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,182,120 UART: [idev] Erasing UDS.KEYID = 0
1,198,822 UART: [idev] Sha1 KeyId Algorithm
1,207,706 UART: [idev] --
1,208,811 UART: [ldev] ++
1,208,979 UART: [ldev] CDI.KEYID = 6
1,209,343 UART: [ldev] SUBJECT.KEYID = 5
1,209,770 UART: [ldev] AUTHORITY.KEYID = 7
1,210,233 UART: [ldev] FE.KEYID = 1
1,215,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,106 UART: [fwproc] Wait for Commands...
1,282,831 UART: [fwproc] Recv command 0x46574c44
1,283,564 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,685 UART: ROM Fatal Error: 0x00B0003A
1,310,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,307 UART: [state] LifecycleState = Unprovisioned
85,962 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,795 UART: [kat] SHA2-256
901,735 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,656 UART: [kat] LMS
1,168,968 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,181,934 UART: [idev] Erasing UDS.KEYID = 0
1,198,802 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,733 UART: [ldev] ++
1,208,901 UART: [ldev] CDI.KEYID = 6
1,209,265 UART: [ldev] SUBJECT.KEYID = 5
1,209,692 UART: [ldev] AUTHORITY.KEYID = 7
1,210,155 UART: [ldev] FE.KEYID = 1
1,215,399 UART: [ldev] Erasing FE.KEYID = 1
1,241,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,267 UART: [ldev] --
1,280,626 UART: [fwproc] Wait for Commands...
1,281,231 UART: [fwproc] Recv command 0x46574c44
1,281,964 UART: [fwproc] Recv'd Img size: 118548 bytes
3,177,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
3,205,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,283 >>> mbox cmd response: success
3,378,497 UART: [afmc] ++
3,378,665 UART: [afmc] CDI.KEYID = 6
3,379,028 UART: [afmc] SUBJECT.KEYID = 7
3,379,454 UART: [afmc] AUTHORITY.KEYID = 5
3,414,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,317 UART: [afmc] PUB.X = F40D9B8EE9AC6AD23FF4C544EBFEBCABE5F043025A630DDA345888DDBCAA7E051BD38ED1E4C163C6B55FEFEFC2FC0336
3,438,035 UART: [afmc] PUB.Y = 3C1F916D7DDAF45C45F3B5A4D824EF1D61E66A1076A410BBBF87264B02DB0A141DC0C14356E8968EF155DE5A65824F67
3,443,925 UART: [afmc] SIG.R = 756500BB2E2348E46499528F8C3AF50BFDDBFE119484B1BE69C1049B2401443F66439EE9429260F3E3618632CAA308EB
3,449,607 UART: [afmc] SIG.S = 74AA10119956D1DEB3B077CD66FDD70B98633D4E7611A80B9B17956589F34BFEA46F3032A2DAB5B98D1FE01C7FD36305
3,457,541 UART: [afmc] --
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 20.13s
Truncated 6463 bytes from beginning
neration=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,199 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,539 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,995 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,167,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,951 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,799 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,167 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,309 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,337 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,159 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,125 >>> mbox cmd response: success
test test_image_validation::test_preamble_vendor_lms_pubkey_revocation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 18.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
5,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,044 UART:
192,474 UART: Running Caliptra ROM ...
193,600 UART:
193,756 UART: [state] CFI Enabled
261,526 UART: [state] LifecycleState = Manufacturing
263,489 UART: [state] DebugLocked = No
264,995 UART: [state] WD Timer not started. Device not locked for debugging
268,150 UART: [kat] SHA2-256
447,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,554 UART: [kat] ++
459,066 UART: [kat] sha1
471,085 UART: [kat] SHA2-256
473,772 UART: [kat] SHA2-384
479,746 UART: [kat] SHA2-512-ACC
482,148 UART: [kat] ECC-384
2,945,924 UART: [kat] HMAC-384Kdf
2,969,412 UART: [kat] LMS
3,445,910 UART: [kat] --
3,451,613 UART: [cold-reset] ++
3,452,644 UART: [fht] FHT @ 0x50003400
3,464,609 UART: [idev] ++
3,465,236 UART: [idev] CDI.KEYID = 6
3,466,163 UART: [idev] SUBJECT.KEYID = 7
3,467,387 UART: [idev] UDS.KEYID = 0
3,498,921 UART: [idev] Erasing UDS.KEYID = 0
5,984,637 UART: [idev] Sha1 KeyId Algorithm
6,008,296 UART: [idev] --
6,012,463 UART: [ldev] ++
6,013,047 UART: [ldev] CDI.KEYID = 6
6,013,968 UART: [ldev] SUBJECT.KEYID = 5
6,015,190 UART: [ldev] AUTHORITY.KEYID = 7
6,016,428 UART: [ldev] FE.KEYID = 1
6,054,295 UART: [ldev] Erasing FE.KEYID = 1
8,560,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,608 UART: [ldev] --
10,371,205 UART: [fwproc] Wait for Commands...
10,374,061 UART: [fwproc] Recv command 0x46574c44
10,376,059 UART: [fwproc] Recv'd Img size: 118548 bytes
10,480,509 UART: ROM Fatal Error: 0x000B0005
10,483,764 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
5,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,374,955 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
6,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,267 UART:
192,673 UART: Running Caliptra ROM ...
193,859 UART:
603,532 UART: [state] CFI Enabled
620,115 UART: [state] LifecycleState = Manufacturing
622,064 UART: [state] DebugLocked = No
624,202 UART: [state] WD Timer not started. Device not locked for debugging
628,953 UART: [kat] SHA2-256
808,581 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,407 UART: [kat] ++
819,942 UART: [kat] sha1
831,502 UART: [kat] SHA2-256
834,230 UART: [kat] SHA2-384
838,805 UART: [kat] SHA2-512-ACC
841,194 UART: [kat] ECC-384
3,280,756 UART: [kat] HMAC-384Kdf
3,292,941 UART: [kat] LMS
3,769,442 UART: [kat] --
3,774,894 UART: [cold-reset] ++
3,777,147 UART: [fht] FHT @ 0x50003400
3,788,222 UART: [idev] ++
3,788,876 UART: [idev] CDI.KEYID = 6
3,789,796 UART: [idev] SUBJECT.KEYID = 7
3,791,011 UART: [idev] UDS.KEYID = 0
3,805,961 UART: [idev] Erasing UDS.KEYID = 0
6,268,957 UART: [idev] Sha1 KeyId Algorithm
6,293,208 UART: [idev] --
6,298,995 UART: [ldev] ++
6,299,574 UART: [ldev] CDI.KEYID = 6
6,300,536 UART: [ldev] SUBJECT.KEYID = 5
6,301,693 UART: [ldev] AUTHORITY.KEYID = 7
6,302,978 UART: [ldev] FE.KEYID = 1
6,313,811 UART: [ldev] Erasing FE.KEYID = 1
8,792,024 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,028 UART: [ldev] --
10,584,857 UART: [fwproc] Wait for Commands...
10,587,421 UART: [fwproc] Recv command 0x46574c44
10,589,470 UART: [fwproc] Recv'd Img size: 118548 bytes
10,697,690 UART: ROM Fatal Error: 0x000B0005
10,700,957 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
6,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,585,710 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Manufacturing
85,641 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,380 UART: [kat] SHA2-256
901,320 UART: [kat] SHA2-384
904,261 UART: [kat] SHA2-512-ACC
906,162 UART: [kat] ECC-384
915,605 UART: [kat] HMAC-384Kdf
920,271 UART: [kat] LMS
1,168,583 UART: [kat] --
1,169,464 UART: [cold-reset] ++
1,169,942 UART: [fht] FHT @ 0x50003400
1,172,708 UART: [idev] ++
1,172,876 UART: [idev] CDI.KEYID = 6
1,173,237 UART: [idev] SUBJECT.KEYID = 7
1,173,662 UART: [idev] UDS.KEYID = 0
1,181,737 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,503 UART: [idev] --
1,208,740 UART: [ldev] ++
1,208,908 UART: [ldev] CDI.KEYID = 6
1,209,272 UART: [ldev] SUBJECT.KEYID = 5
1,209,699 UART: [ldev] AUTHORITY.KEYID = 7
1,210,162 UART: [ldev] FE.KEYID = 1
1,215,330 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,823 UART: [fwproc] Wait for Commands...
1,281,520 UART: [fwproc] Recv command 0x46574c44
1,282,253 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,405 UART: ROM Fatal Error: 0x000B0005
1,328,562 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,289 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Manufacturing
86,006 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,866 UART: [kat] HMAC-384Kdf
921,610 UART: [kat] LMS
1,169,922 UART: [kat] --
1,170,679 UART: [cold-reset] ++
1,171,069 UART: [fht] FHT @ 0x50003400
1,173,883 UART: [idev] ++
1,174,051 UART: [idev] CDI.KEYID = 6
1,174,412 UART: [idev] SUBJECT.KEYID = 7
1,174,837 UART: [idev] UDS.KEYID = 0
1,182,986 UART: [idev] Erasing UDS.KEYID = 0
1,199,582 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,207 UART: [ldev] SUBJECT.KEYID = 5
1,210,634 UART: [ldev] AUTHORITY.KEYID = 7
1,211,097 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,701 UART: [ldev] --
1,282,036 UART: [fwproc] Wait for Commands...
1,282,623 UART: [fwproc] Recv command 0x46574c44
1,283,356 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,440 UART: ROM Fatal Error: 0x000B0005
1,329,597 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,736 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Manufacturing
86,199 UART: [state] DebugLocked = No
86,777 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,108 UART: [kat] SHA2-256
902,048 UART: [kat] SHA2-384
904,779 UART: [kat] SHA2-512-ACC
906,680 UART: [kat] ECC-384
916,335 UART: [kat] HMAC-384Kdf
920,919 UART: [kat] LMS
1,169,231 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,738 UART: [fht] FHT @ 0x50003400
1,173,358 UART: [idev] ++
1,173,526 UART: [idev] CDI.KEYID = 6
1,173,887 UART: [idev] SUBJECT.KEYID = 7
1,174,312 UART: [idev] UDS.KEYID = 0
1,182,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,655 UART: [idev] --
1,208,738 UART: [ldev] ++
1,208,906 UART: [ldev] CDI.KEYID = 6
1,209,270 UART: [ldev] SUBJECT.KEYID = 5
1,209,697 UART: [ldev] AUTHORITY.KEYID = 7
1,210,160 UART: [ldev] FE.KEYID = 1
1,215,314 UART: [ldev] Erasing FE.KEYID = 1
1,241,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,250 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,671 UART: [fwproc] Wait for Commands...
1,281,324 UART: [fwproc] Recv command 0x46574c44
1,282,057 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,385 UART: ROM Fatal Error: 0x000B0005
1,327,542 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,375 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Manufacturing
85,850 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,917 UART: [kat] SHA2-256
891,467 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,571 UART: [kat] ++
895,723 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
915,980 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,149 UART: [fht] FHT @ 0x50003400
1,172,795 UART: [idev] ++
1,172,963 UART: [idev] CDI.KEYID = 6
1,173,324 UART: [idev] SUBJECT.KEYID = 7
1,173,749 UART: [idev] UDS.KEYID = 0
1,182,072 UART: [idev] Erasing UDS.KEYID = 0
1,199,494 UART: [idev] Sha1 KeyId Algorithm
1,208,398 UART: [idev] --
1,209,423 UART: [ldev] ++
1,209,591 UART: [ldev] CDI.KEYID = 6
1,209,955 UART: [ldev] SUBJECT.KEYID = 5
1,210,382 UART: [ldev] AUTHORITY.KEYID = 7
1,210,845 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,965 UART: [ldev] --
1,282,406 UART: [fwproc] Wait for Commands...
1,283,103 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,502 UART: ROM Fatal Error: 0x000B0005
1,329,659 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,436 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,552 UART: [state] LifecycleState = Manufacturing
86,207 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,154 UART: [kat] SHA2-256
902,094 UART: [kat] SHA2-384
904,899 UART: [kat] SHA2-512-ACC
906,800 UART: [kat] ECC-384
916,411 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,676 UART: [fht] FHT @ 0x50003400
1,173,234 UART: [idev] ++
1,173,402 UART: [idev] CDI.KEYID = 6
1,173,763 UART: [idev] SUBJECT.KEYID = 7
1,174,188 UART: [idev] UDS.KEYID = 0
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,075 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,208,986 UART: [ldev] ++
1,209,154 UART: [ldev] CDI.KEYID = 6
1,209,518 UART: [ldev] SUBJECT.KEYID = 5
1,209,945 UART: [ldev] AUTHORITY.KEYID = 7
1,210,408 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,560 UART: [ldev] --
1,280,765 UART: [fwproc] Wait for Commands...
1,281,476 UART: [fwproc] Recv command 0x46574c44
1,282,209 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,105 UART: ROM Fatal Error: 0x000B0005
1,327,262 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,323 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Manufacturing
85,990 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,430 UART: [kat] SHA2-512-ACC
906,331 UART: [kat] ECC-384
916,216 UART: [kat] HMAC-384Kdf
920,952 UART: [kat] LMS
1,169,264 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,641 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,182,574 UART: [idev] Erasing UDS.KEYID = 0
1,200,036 UART: [idev] Sha1 KeyId Algorithm
1,209,004 UART: [idev] --
1,210,069 UART: [ldev] ++
1,210,237 UART: [ldev] CDI.KEYID = 6
1,210,601 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,895 UART: [ldev] --
1,283,294 UART: [fwproc] Wait for Commands...
1,283,983 UART: [fwproc] Recv command 0x46574c44
1,284,716 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,064 UART: ROM Fatal Error: 0x000B0005
1,330,221 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,352 >>> mbox cmd response: failed
test test_image_validation::test_preamble_vendor_pubkey_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
5,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,167 UART:
192,566 UART: Running Caliptra ROM ...
193,691 UART:
193,847 UART: [state] CFI Enabled
263,878 UART: [state] LifecycleState = Manufacturing
265,865 UART: [state] DebugLocked = No
267,976 UART: [state] WD Timer not started. Device not locked for debugging
271,658 UART: [kat] SHA2-256
451,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,106 UART: [kat] ++
462,560 UART: [kat] sha1
473,825 UART: [kat] SHA2-256
476,527 UART: [kat] SHA2-384
483,642 UART: [kat] SHA2-512-ACC
485,990 UART: [kat] ECC-384
2,947,145 UART: [kat] HMAC-384Kdf
2,971,161 UART: [kat] LMS
3,447,661 UART: [kat] --
3,454,402 UART: [cold-reset] ++
3,456,926 UART: [fht] FHT @ 0x50003400
3,468,748 UART: [idev] ++
3,469,386 UART: [idev] CDI.KEYID = 6
3,470,312 UART: [idev] SUBJECT.KEYID = 7
3,471,542 UART: [idev] UDS.KEYID = 0
3,500,277 UART: [idev] Erasing UDS.KEYID = 0
5,987,168 UART: [idev] Sha1 KeyId Algorithm
6,011,532 UART: [idev] --
6,015,696 UART: [ldev] ++
6,016,300 UART: [ldev] CDI.KEYID = 6
6,017,219 UART: [ldev] SUBJECT.KEYID = 5
6,018,393 UART: [ldev] AUTHORITY.KEYID = 7
6,019,703 UART: [ldev] FE.KEYID = 1
6,056,002 UART: [ldev] Erasing FE.KEYID = 1
8,563,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,716 UART: [ldev] --
10,373,529 UART: [fwproc] Wait for Commands...
10,375,091 UART: [fwproc] Recv command 0x46574c44
10,377,087 UART: [fwproc] Recv'd Img size: 118548 bytes
10,451,291 UART: ROM Fatal Error: 0x000B0003
10,454,490 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
5,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,327,037 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
6,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,351 UART:
192,730 UART: Running Caliptra ROM ...
193,796 UART:
603,654 UART: [state] CFI Enabled
616,789 UART: [state] LifecycleState = Manufacturing
618,740 UART: [state] DebugLocked = No
621,031 UART: [state] WD Timer not started. Device not locked for debugging
625,263 UART: [kat] SHA2-256
804,949 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,710 UART: [kat] ++
816,292 UART: [kat] sha1
827,173 UART: [kat] SHA2-256
829,911 UART: [kat] SHA2-384
835,921 UART: [kat] SHA2-512-ACC
838,317 UART: [kat] ECC-384
3,278,122 UART: [kat] HMAC-384Kdf
3,290,943 UART: [kat] LMS
3,767,440 UART: [kat] --
3,770,993 UART: [cold-reset] ++
3,772,820 UART: [fht] FHT @ 0x50003400
3,783,685 UART: [idev] ++
3,784,255 UART: [idev] CDI.KEYID = 6
3,785,229 UART: [idev] SUBJECT.KEYID = 7
3,786,457 UART: [idev] UDS.KEYID = 0
3,803,747 UART: [idev] Erasing UDS.KEYID = 0
6,265,737 UART: [idev] Sha1 KeyId Algorithm
6,289,772 UART: [idev] --
6,295,039 UART: [ldev] ++
6,295,621 UART: [ldev] CDI.KEYID = 6
6,296,693 UART: [ldev] SUBJECT.KEYID = 5
6,297,793 UART: [ldev] AUTHORITY.KEYID = 7
6,298,968 UART: [ldev] FE.KEYID = 1
6,311,232 UART: [ldev] Erasing FE.KEYID = 1
8,787,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,100 UART: [ldev] --
10,582,814 UART: [fwproc] Wait for Commands...
10,584,804 UART: [fwproc] Recv command 0x46574c44
10,586,790 UART: [fwproc] Recv'd Img size: 118548 bytes
10,663,265 UART: ROM Fatal Error: 0x000B0003
10,666,518 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
6,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,557,765 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Manufacturing
86,109 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
88,056 UART: [kat] SHA2-256
891,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,710 UART: [kat] ++
895,862 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,565 UART: [kat] SHA2-512-ACC
906,466 UART: [kat] ECC-384
915,925 UART: [kat] HMAC-384Kdf
920,565 UART: [kat] LMS
1,168,877 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,260 UART: [fht] FHT @ 0x50003400
1,172,806 UART: [idev] ++
1,172,974 UART: [idev] CDI.KEYID = 6
1,173,335 UART: [idev] SUBJECT.KEYID = 7
1,173,760 UART: [idev] UDS.KEYID = 0
1,181,341 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,206,915 UART: [idev] --
1,208,058 UART: [ldev] ++
1,208,226 UART: [ldev] CDI.KEYID = 6
1,208,590 UART: [ldev] SUBJECT.KEYID = 5
1,209,017 UART: [ldev] AUTHORITY.KEYID = 7
1,209,480 UART: [ldev] FE.KEYID = 1
1,214,464 UART: [ldev] Erasing FE.KEYID = 1
1,240,955 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,156 UART: [ldev] --
1,280,553 UART: [fwproc] Wait for Commands...
1,281,156 UART: [fwproc] Recv command 0x46574c44
1,281,889 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,913 UART: ROM Fatal Error: 0x000B0003
1,303,070 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,379 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Manufacturing
86,344 UART: [state] DebugLocked = No
87,054 UART: [state] WD Timer not started. Device not locked for debugging
88,191 UART: [kat] SHA2-256
891,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,845 UART: [kat] ++
895,997 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
916,800 UART: [kat] HMAC-384Kdf
921,464 UART: [kat] LMS
1,169,776 UART: [kat] --
1,170,645 UART: [cold-reset] ++
1,171,051 UART: [fht] FHT @ 0x50003400
1,173,849 UART: [idev] ++
1,174,017 UART: [idev] CDI.KEYID = 6
1,174,378 UART: [idev] SUBJECT.KEYID = 7
1,174,803 UART: [idev] UDS.KEYID = 0
1,182,896 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,968 UART: [idev] --
1,209,839 UART: [ldev] ++
1,210,007 UART: [ldev] CDI.KEYID = 6
1,210,371 UART: [ldev] SUBJECT.KEYID = 5
1,210,798 UART: [ldev] AUTHORITY.KEYID = 7
1,211,261 UART: [ldev] FE.KEYID = 1
1,216,293 UART: [ldev] Erasing FE.KEYID = 1
1,242,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,449 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,645 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,286 UART: ROM Fatal Error: 0x000B0003
1,305,443 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,376 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Manufacturing
85,325 UART: [state] DebugLocked = No
85,947 UART: [state] WD Timer not started. Device not locked for debugging
87,128 UART: [kat] SHA2-256
890,678 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,782 UART: [kat] ++
894,934 UART: [kat] sha1
899,046 UART: [kat] SHA2-256
900,986 UART: [kat] SHA2-384
903,825 UART: [kat] SHA2-512-ACC
905,726 UART: [kat] ECC-384
915,743 UART: [kat] HMAC-384Kdf
920,245 UART: [kat] LMS
1,168,557 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,820 UART: [fht] FHT @ 0x50003400
1,172,368 UART: [idev] ++
1,172,536 UART: [idev] CDI.KEYID = 6
1,172,897 UART: [idev] SUBJECT.KEYID = 7
1,173,322 UART: [idev] UDS.KEYID = 0
1,181,309 UART: [idev] Erasing UDS.KEYID = 0
1,198,013 UART: [idev] Sha1 KeyId Algorithm
1,206,893 UART: [idev] --
1,208,146 UART: [ldev] ++
1,208,314 UART: [ldev] CDI.KEYID = 6
1,208,678 UART: [ldev] SUBJECT.KEYID = 5
1,209,105 UART: [ldev] AUTHORITY.KEYID = 7
1,209,568 UART: [ldev] FE.KEYID = 1
1,214,598 UART: [ldev] Erasing FE.KEYID = 1
1,241,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,826 UART: [ldev] --
1,280,205 UART: [fwproc] Wait for Commands...
1,280,914 UART: [fwproc] Recv command 0x46574c44
1,281,647 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,885 UART: ROM Fatal Error: 0x000B0003
1,303,042 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,053 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,961 UART: [state] LifecycleState = Manufacturing
86,616 UART: [state] DebugLocked = No
87,292 UART: [state] WD Timer not started. Device not locked for debugging
88,449 UART: [kat] SHA2-256
891,999 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,103 UART: [kat] ++
896,255 UART: [kat] sha1
900,373 UART: [kat] SHA2-256
902,313 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
917,140 UART: [kat] HMAC-384Kdf
921,780 UART: [kat] LMS
1,170,092 UART: [kat] --
1,170,973 UART: [cold-reset] ++
1,171,373 UART: [fht] FHT @ 0x50003400
1,173,931 UART: [idev] ++
1,174,099 UART: [idev] CDI.KEYID = 6
1,174,460 UART: [idev] SUBJECT.KEYID = 7
1,174,885 UART: [idev] UDS.KEYID = 0
1,183,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,906 UART: [idev] Sha1 KeyId Algorithm
1,208,794 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 118548 bytes
1,303,522 UART: ROM Fatal Error: 0x000B0003
1,304,679 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,584 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Manufacturing
85,737 UART: [state] DebugLocked = No
86,427 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,341 UART: [kat] LMS
1,168,653 UART: [kat] --
1,169,580 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,498 UART: [idev] ++
1,172,666 UART: [idev] CDI.KEYID = 6
1,173,027 UART: [idev] SUBJECT.KEYID = 7
1,173,452 UART: [idev] UDS.KEYID = 0
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,208,113 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,516 UART: [ldev] Erasing FE.KEYID = 1
1,241,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,276 UART: [ldev] --
1,280,583 UART: [fwproc] Wait for Commands...
1,281,364 UART: [fwproc] Recv command 0x46574c44
1,282,097 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,293 UART: ROM Fatal Error: 0x000B0003
1,303,450 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,451 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,681 UART: [state] LifecycleState = Manufacturing
86,336 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,787 UART: [kat] ++
895,939 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,210 UART: [kat] HMAC-384Kdf
920,974 UART: [kat] LMS
1,169,286 UART: [kat] --
1,170,023 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,182,578 UART: [idev] Erasing UDS.KEYID = 0
1,199,902 UART: [idev] Sha1 KeyId Algorithm
1,208,862 UART: [idev] --
1,209,949 UART: [ldev] ++
1,210,117 UART: [ldev] CDI.KEYID = 6
1,210,481 UART: [ldev] SUBJECT.KEYID = 5
1,210,908 UART: [ldev] AUTHORITY.KEYID = 7
1,211,371 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,993 UART: [ldev] --
1,282,278 UART: [fwproc] Wait for Commands...
1,282,931 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,242 UART: ROM Fatal Error: 0x000B0003
1,305,399 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,652 >>> mbox cmd response: failed
test test_image_validation::test_preamble_zero_vendor_pubkey_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
5,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,981 UART:
192,385 UART: Running Caliptra ROM ...
193,517 UART:
193,671 UART: [state] CFI Enabled
258,786 UART: [state] LifecycleState = Unprovisioned
260,746 UART: [state] DebugLocked = No
262,736 UART: [state] WD Timer not started. Device not locked for debugging
265,741 UART: [kat] SHA2-256
445,422 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,176 UART: [kat] ++
456,768 UART: [kat] sha1
468,740 UART: [kat] SHA2-256
471,476 UART: [kat] SHA2-384
476,159 UART: [kat] SHA2-512-ACC
478,550 UART: [kat] ECC-384
2,926,341 UART: [kat] HMAC-384Kdf
2,949,825 UART: [kat] LMS
3,426,326 UART: [kat] --
3,432,476 UART: [cold-reset] ++
3,434,625 UART: [fht] FHT @ 0x50003400
3,446,150 UART: [idev] ++
3,446,716 UART: [idev] CDI.KEYID = 6
3,447,688 UART: [idev] SUBJECT.KEYID = 7
3,448,906 UART: [idev] UDS.KEYID = 0
3,478,988 UART: [idev] Erasing UDS.KEYID = 0
5,965,578 UART: [idev] Sha1 KeyId Algorithm
5,988,733 UART: [idev] --
5,992,897 UART: [ldev] ++
5,993,472 UART: [ldev] CDI.KEYID = 6
5,994,390 UART: [ldev] SUBJECT.KEYID = 5
5,995,611 UART: [ldev] AUTHORITY.KEYID = 7
5,996,848 UART: [ldev] FE.KEYID = 1
6,036,432 UART: [ldev] Erasing FE.KEYID = 1
8,545,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,178 UART: [ldev] --
10,353,677 UART: [fwproc] Wait for Commands...
10,355,780 UART: [fwproc] Recv command 0x46574c44
10,357,845 UART: [fwproc] Recv'd Img size: 118548 bytes
13,832,345 UART: ROM Fatal Error: 0x000B0016
13,835,575 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
5,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,769,686 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
6,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,570 UART:
192,943 UART: Running Caliptra ROM ...
194,080 UART:
603,628 UART: [state] CFI Enabled
617,467 UART: [state] LifecycleState = Unprovisioned
619,384 UART: [state] DebugLocked = No
621,136 UART: [state] WD Timer not started. Device not locked for debugging
625,635 UART: [kat] SHA2-256
805,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,081 UART: [kat] ++
816,616 UART: [kat] sha1
827,768 UART: [kat] SHA2-256
830,496 UART: [kat] SHA2-384
836,356 UART: [kat] SHA2-512-ACC
838,758 UART: [kat] ECC-384
3,278,539 UART: [kat] HMAC-384Kdf
3,290,165 UART: [kat] LMS
3,766,717 UART: [kat] --
3,772,621 UART: [cold-reset] ++
3,774,183 UART: [fht] FHT @ 0x50003400
3,785,702 UART: [idev] ++
3,786,265 UART: [idev] CDI.KEYID = 6
3,787,231 UART: [idev] SUBJECT.KEYID = 7
3,788,495 UART: [idev] UDS.KEYID = 0
3,804,196 UART: [idev] Erasing UDS.KEYID = 0
6,266,492 UART: [idev] Sha1 KeyId Algorithm
6,289,071 UART: [idev] --
6,294,419 UART: [ldev] ++
6,294,988 UART: [ldev] CDI.KEYID = 6
6,295,899 UART: [ldev] SUBJECT.KEYID = 5
6,297,114 UART: [ldev] AUTHORITY.KEYID = 7
6,298,346 UART: [ldev] FE.KEYID = 1
6,310,380 UART: [ldev] Erasing FE.KEYID = 1
8,793,561 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,572 UART: [ldev] --
10,589,430 UART: [fwproc] Wait for Commands...
10,591,258 UART: [fwproc] Recv command 0x46574c44
10,593,245 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,703 UART: ROM Fatal Error: 0x000B0016
14,074,948 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
6,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,979,504 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
891,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,340 UART: [kat] ++
895,492 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,313 UART: [kat] SHA2-512-ACC
906,214 UART: [kat] ECC-384
915,533 UART: [kat] HMAC-384Kdf
920,209 UART: [kat] LMS
1,168,521 UART: [kat] --
1,169,664 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,666 UART: [idev] ++
1,172,834 UART: [idev] CDI.KEYID = 6
1,173,195 UART: [idev] SUBJECT.KEYID = 7
1,173,620 UART: [idev] UDS.KEYID = 0
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,315 UART: [idev] --
1,208,400 UART: [ldev] ++
1,208,568 UART: [ldev] CDI.KEYID = 6
1,208,932 UART: [ldev] SUBJECT.KEYID = 5
1,209,359 UART: [ldev] AUTHORITY.KEYID = 7
1,209,822 UART: [ldev] FE.KEYID = 1
1,215,062 UART: [ldev] Erasing FE.KEYID = 1
1,241,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,974 UART: [ldev] --
1,281,205 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,056 UART: ROM Fatal Error: 0x000B0016
2,627,213 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,436 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,825 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,855 UART: [kat] ++
896,007 UART: [kat] sha1
900,187 UART: [kat] SHA2-256
902,127 UART: [kat] SHA2-384
904,966 UART: [kat] SHA2-512-ACC
906,867 UART: [kat] ECC-384
916,802 UART: [kat] HMAC-384Kdf
921,402 UART: [kat] LMS
1,169,714 UART: [kat] --
1,170,577 UART: [cold-reset] ++
1,171,101 UART: [fht] FHT @ 0x50003400
1,173,829 UART: [idev] ++
1,173,997 UART: [idev] CDI.KEYID = 6
1,174,358 UART: [idev] SUBJECT.KEYID = 7
1,174,783 UART: [idev] UDS.KEYID = 0
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,200,368 UART: [idev] Sha1 KeyId Algorithm
1,209,194 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,244,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,229 UART: [ldev] --
1,283,622 UART: [fwproc] Wait for Commands...
1,284,253 UART: [fwproc] Recv command 0x46574c44
1,284,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,665 UART: ROM Fatal Error: 0x000B0016
2,629,822 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,885 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,995 UART: [kat] HMAC-384Kdf
920,471 UART: [kat] LMS
1,168,783 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,560 UART: [idev] ++
1,172,728 UART: [idev] CDI.KEYID = 6
1,173,089 UART: [idev] SUBJECT.KEYID = 7
1,173,514 UART: [idev] UDS.KEYID = 0
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,206,907 UART: [idev] --
1,207,806 UART: [ldev] ++
1,207,974 UART: [ldev] CDI.KEYID = 6
1,208,338 UART: [ldev] SUBJECT.KEYID = 5
1,208,765 UART: [ldev] AUTHORITY.KEYID = 7
1,209,228 UART: [ldev] FE.KEYID = 1
1,214,530 UART: [ldev] Erasing FE.KEYID = 1
1,240,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,062 UART: [ldev] --
1,280,269 UART: [fwproc] Wait for Commands...
1,280,976 UART: [fwproc] Recv command 0x46574c44
1,281,709 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,578 UART: ROM Fatal Error: 0x000B0016
2,625,735 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,491 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,555 UART: [kat] SHA2-256
891,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,209 UART: [kat] ++
895,361 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,446 UART: [kat] SHA2-512-ACC
906,347 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
921,064 UART: [kat] LMS
1,169,376 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,043 UART: [idev] ++
1,173,211 UART: [idev] CDI.KEYID = 6
1,173,572 UART: [idev] SUBJECT.KEYID = 7
1,173,997 UART: [idev] UDS.KEYID = 0
1,182,082 UART: [idev] Erasing UDS.KEYID = 0
1,199,850 UART: [idev] Sha1 KeyId Algorithm
1,208,772 UART: [idev] --
1,209,837 UART: [ldev] ++
1,210,005 UART: [ldev] CDI.KEYID = 6
1,210,369 UART: [ldev] SUBJECT.KEYID = 5
1,210,796 UART: [ldev] AUTHORITY.KEYID = 7
1,211,259 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,261 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,291 UART: [fwproc] Recv command 0x46574c44
1,284,024 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,111 UART: ROM Fatal Error: 0x000B0016
2,628,268 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,485,413 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,058 UART: [kat] ++
895,210 UART: [kat] sha1
899,252 UART: [kat] SHA2-256
901,192 UART: [kat] SHA2-384
903,967 UART: [kat] SHA2-512-ACC
905,868 UART: [kat] ECC-384
915,465 UART: [kat] HMAC-384Kdf
919,861 UART: [kat] LMS
1,168,173 UART: [kat] --
1,169,162 UART: [cold-reset] ++
1,169,504 UART: [fht] FHT @ 0x50003400
1,172,206 UART: [idev] ++
1,172,374 UART: [idev] CDI.KEYID = 6
1,172,735 UART: [idev] SUBJECT.KEYID = 7
1,173,160 UART: [idev] UDS.KEYID = 0
1,180,869 UART: [idev] Erasing UDS.KEYID = 0
1,197,983 UART: [idev] Sha1 KeyId Algorithm
1,206,957 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,824 UART: [ldev] Erasing FE.KEYID = 1
1,240,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,984 UART: [ldev] --
1,280,269 UART: [fwproc] Wait for Commands...
1,280,906 UART: [fwproc] Recv command 0x46574c44
1,281,639 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,690 UART: ROM Fatal Error: 0x000B0016
2,625,847 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,140 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,630 UART: [kat] LMS
1,168,942 UART: [kat] --
1,169,615 UART: [cold-reset] ++
1,170,099 UART: [fht] FHT @ 0x50003400
1,172,813 UART: [idev] ++
1,172,981 UART: [idev] CDI.KEYID = 6
1,173,342 UART: [idev] SUBJECT.KEYID = 7
1,173,767 UART: [idev] UDS.KEYID = 0
1,181,208 UART: [idev] Erasing UDS.KEYID = 0
1,198,146 UART: [idev] Sha1 KeyId Algorithm
1,207,058 UART: [idev] --
1,208,067 UART: [ldev] ++
1,208,235 UART: [ldev] CDI.KEYID = 6
1,208,599 UART: [ldev] SUBJECT.KEYID = 5
1,209,026 UART: [ldev] AUTHORITY.KEYID = 7
1,209,489 UART: [ldev] FE.KEYID = 1
1,215,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,907 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,917 UART: ROM Fatal Error: 0x000B0016
2,627,074 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,289 >>> mbox cmd response: failed
test test_image_validation::test_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
2,027,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,347 UART:
2,177,733 UART: Running Caliptra ROM ...
2,178,823 UART:
2,178,984 UART: [state] CFI Enabled
2,179,963 UART: [state] LifecycleState = Unprovisioned
2,181,629 UART: [state] DebugLocked = No
2,182,686 UART: [state] WD Timer not started. Device not locked for debugging
2,185,166 UART: [kat] SHA2-256
2,185,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,859 UART: [kat] ++
2,189,316 UART: [kat] sha1
2,190,056 UART: [kat] SHA2-256
2,190,743 UART: [kat] SHA2-384
2,191,446 UART: [kat] SHA2-512-ACC
2,192,259 UART: [kat] ECC-384
2,928,035 UART: [kat] HMAC-384Kdf
2,950,254 UART: [kat] LMS
3,426,750 UART: [kat] --
3,432,337 UART: [cold-reset] ++
3,434,068 UART: [fht] FHT @ 0x50003400
3,445,004 UART: [idev] ++
3,445,588 UART: [idev] CDI.KEYID = 6
3,446,521 UART: [idev] SUBJECT.KEYID = 7
3,447,744 UART: [idev] UDS.KEYID = 0
3,481,224 UART: [idev] Erasing UDS.KEYID = 0
5,966,230 UART: [idev] Sha1 KeyId Algorithm
5,990,653 UART: [idev] --
5,996,381 UART: [ldev] ++
5,996,956 UART: [ldev] CDI.KEYID = 6
5,997,870 UART: [ldev] SUBJECT.KEYID = 5
5,999,093 UART: [ldev] AUTHORITY.KEYID = 7
6,000,329 UART: [ldev] FE.KEYID = 1
6,035,993 UART: [ldev] Erasing FE.KEYID = 1
8,547,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,042 UART: [ldev] --
10,354,027 UART: [fwproc] Wait for Commands...
10,356,488 UART: [fwproc] Recv command 0x46574c44
10,358,490 UART: [fwproc] Recv'd Img size: 118548 bytes
13,831,983 UART: ROM Fatal Error: 0x000B002B
13,835,218 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
2,031,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,752,149 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,027,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,376 UART:
2,177,779 UART: Running Caliptra ROM ...
2,178,946 UART:
2,179,118 UART: [state] CFI Enabled
2,180,068 UART: [state] LifecycleState = Unprovisioned
2,181,716 UART: [state] DebugLocked = No
2,182,824 UART: [state] WD Timer not started. Device not locked for debugging
2,185,294 UART: [kat] SHA2-256
2,185,961 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,967 UART: [kat] ++
2,189,419 UART: [kat] sha1
2,189,929 UART: [kat] SHA2-256
2,190,667 UART: [kat] SHA2-384
2,191,349 UART: [kat] SHA2-512-ACC
2,192,181 UART: [kat] ECC-384
3,285,630 UART: [kat] HMAC-384Kdf
3,298,355 UART: [kat] LMS
3,774,869 UART: [kat] --
3,778,651 UART: [cold-reset] ++
3,781,281 UART: [fht] FHT @ 0x50003400
3,792,308 UART: [idev] ++
3,792,879 UART: [idev] CDI.KEYID = 6
3,793,813 UART: [idev] SUBJECT.KEYID = 7
3,795,075 UART: [idev] UDS.KEYID = 0
3,811,026 UART: [idev] Erasing UDS.KEYID = 0
6,272,095 UART: [idev] Sha1 KeyId Algorithm
6,295,937 UART: [idev] --
6,301,232 UART: [ldev] ++
6,301,804 UART: [ldev] CDI.KEYID = 6
6,302,792 UART: [ldev] SUBJECT.KEYID = 5
6,303,949 UART: [ldev] AUTHORITY.KEYID = 7
6,305,234 UART: [ldev] FE.KEYID = 1
6,318,417 UART: [ldev] Erasing FE.KEYID = 1
8,795,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,406 UART: [ldev] --
10,588,793 UART: [fwproc] Wait for Commands...
10,591,595 UART: [fwproc] Recv command 0x46574c44
10,593,641 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,150 UART: ROM Fatal Error: 0x000B002B
14,077,385 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
2,028,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,990,625 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,777 UART: [kat] HMAC-384Kdf
920,527 UART: [kat] LMS
1,168,839 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,774 UART: [idev] ++
1,172,942 UART: [idev] CDI.KEYID = 6
1,173,303 UART: [idev] SUBJECT.KEYID = 7
1,173,728 UART: [idev] UDS.KEYID = 0
1,181,581 UART: [idev] Erasing UDS.KEYID = 0
1,198,455 UART: [idev] Sha1 KeyId Algorithm
1,207,379 UART: [idev] --
1,208,438 UART: [ldev] ++
1,208,606 UART: [ldev] CDI.KEYID = 6
1,208,970 UART: [ldev] SUBJECT.KEYID = 5
1,209,397 UART: [ldev] AUTHORITY.KEYID = 7
1,209,860 UART: [ldev] FE.KEYID = 1
1,215,016 UART: [ldev] Erasing FE.KEYID = 1
1,241,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,463 UART: [fwproc] Wait for Commands...
1,281,204 UART: [fwproc] Recv command 0x46574c44
1,281,937 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,531 UART: ROM Fatal Error: 0x000B002B
2,626,690 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,523 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,777 UART: [kat] SHA2-256
901,717 UART: [kat] SHA2-384
904,494 UART: [kat] SHA2-512-ACC
906,395 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,626 UART: [kat] LMS
1,168,938 UART: [kat] --
1,169,943 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,181,780 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,108 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,713 UART: [ldev] Erasing FE.KEYID = 1
1,241,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,153 UART: [ldev] --
1,281,438 UART: [fwproc] Wait for Commands...
1,282,091 UART: [fwproc] Recv command 0x46574c44
1,282,824 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,090 UART: ROM Fatal Error: 0x000B002B
2,627,249 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,048 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,361 UART: [kat] LMS
1,168,673 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,169,976 UART: [fht] FHT @ 0x50003400
1,172,638 UART: [idev] ++
1,172,806 UART: [idev] CDI.KEYID = 6
1,173,167 UART: [idev] SUBJECT.KEYID = 7
1,173,592 UART: [idev] UDS.KEYID = 0
1,181,451 UART: [idev] Erasing UDS.KEYID = 0
1,198,933 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,209,062 UART: [ldev] ++
1,209,230 UART: [ldev] CDI.KEYID = 6
1,209,594 UART: [ldev] SUBJECT.KEYID = 5
1,210,021 UART: [ldev] AUTHORITY.KEYID = 7
1,210,484 UART: [ldev] FE.KEYID = 1
1,215,680 UART: [ldev] Erasing FE.KEYID = 1
1,242,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,168 UART: [ldev] --
1,281,467 UART: [fwproc] Wait for Commands...
1,282,098 UART: [fwproc] Recv command 0x46574c44
1,282,831 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,899 UART: ROM Fatal Error: 0x000B002B
2,627,058 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,873 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,424 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,454 UART: [kat] HMAC-384Kdf
920,964 UART: [kat] LMS
1,169,276 UART: [kat] --
1,169,965 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,182,480 UART: [idev] Erasing UDS.KEYID = 0
1,199,152 UART: [idev] Sha1 KeyId Algorithm
1,208,116 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,215,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,501 UART: [ldev] --
1,281,874 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,202 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,314 UART: ROM Fatal Error: 0x000B002B
2,628,473 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,690 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,443 UART: [state] WD Timer not started. Device not locked for debugging
87,792 UART: [kat] SHA2-256
891,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,446 UART: [kat] ++
895,598 UART: [kat] sha1
899,758 UART: [kat] SHA2-256
901,698 UART: [kat] SHA2-384
904,617 UART: [kat] SHA2-512-ACC
906,518 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
921,179 UART: [kat] LMS
1,169,491 UART: [kat] --
1,170,536 UART: [cold-reset] ++
1,171,112 UART: [fht] FHT @ 0x50003400
1,173,746 UART: [idev] ++
1,173,914 UART: [idev] CDI.KEYID = 6
1,174,275 UART: [idev] SUBJECT.KEYID = 7
1,174,700 UART: [idev] UDS.KEYID = 0
1,182,761 UART: [idev] Erasing UDS.KEYID = 0
1,199,427 UART: [idev] Sha1 KeyId Algorithm
1,208,247 UART: [idev] --
1,209,126 UART: [ldev] ++
1,209,294 UART: [ldev] CDI.KEYID = 6
1,209,658 UART: [ldev] SUBJECT.KEYID = 5
1,210,085 UART: [ldev] AUTHORITY.KEYID = 7
1,210,548 UART: [ldev] FE.KEYID = 1
1,215,488 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,430 UART: [ldev] --
1,280,759 UART: [fwproc] Wait for Commands...
1,281,384 UART: [fwproc] Recv command 0x46574c44
1,282,117 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,273 UART: ROM Fatal Error: 0x000B002B
2,625,432 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,003 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,166 UART: [kat] HMAC-384Kdf
921,008 UART: [kat] LMS
1,169,320 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,587 UART: [fht] FHT @ 0x50003400
1,173,223 UART: [idev] ++
1,173,391 UART: [idev] CDI.KEYID = 6
1,173,752 UART: [idev] SUBJECT.KEYID = 7
1,174,177 UART: [idev] UDS.KEYID = 0
1,182,286 UART: [idev] Erasing UDS.KEYID = 0
1,199,204 UART: [idev] Sha1 KeyId Algorithm
1,208,080 UART: [idev] --
1,209,213 UART: [ldev] ++
1,209,381 UART: [ldev] CDI.KEYID = 6
1,209,745 UART: [ldev] SUBJECT.KEYID = 5
1,210,172 UART: [ldev] AUTHORITY.KEYID = 7
1,210,635 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,885 UART: [ldev] --
1,282,100 UART: [fwproc] Wait for Commands...
1,282,747 UART: [fwproc] Recv command 0x46574c44
1,283,480 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,664 UART: ROM Fatal Error: 0x000B002B
2,626,823 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
2,039,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,189,307 UART:
2,189,863 UART: Running Caliptra ROM ...
2,191,024 UART:
2,191,208 UART: [state] CFI Enabled
2,192,098 UART: [state] LifecycleState = Unprovisioned
2,193,800 UART: [state] DebugLocked = No
2,194,921 UART: [state] WD Timer not started. Device not locked for debugging
2,198,150 UART: [kat] SHA2-256
2,198,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,202,019 UART: [kat] ++
2,202,488 UART: [kat] sha1
2,203,013 UART: [kat] SHA2-256
2,203,764 UART: [kat] SHA2-384
2,204,440 UART: [kat] SHA2-512-ACC
2,205,301 UART: [kat] ECC-384
2,935,658 UART: [kat] HMAC-384Kdf
2,959,225 UART: [kat] LMS
3,435,676 UART: [kat] --
3,439,078 UART: [cold-reset] ++
3,441,123 UART: [fht] FHT @ 0x50003400
3,452,640 UART: [idev] ++
3,453,270 UART: [idev] CDI.KEYID = 6
3,454,160 UART: [idev] SUBJECT.KEYID = 7
3,455,437 UART: [idev] UDS.KEYID = 0
3,489,008 UART: [idev] Erasing UDS.KEYID = 0
5,973,956 UART: [idev] Sha1 KeyId Algorithm
5,996,379 UART: [idev] --
6,002,219 UART: [ldev] ++
6,002,799 UART: [ldev] CDI.KEYID = 6
6,003,689 UART: [ldev] SUBJECT.KEYID = 5
6,004,913 UART: [ldev] AUTHORITY.KEYID = 7
6,006,152 UART: [ldev] FE.KEYID = 1
6,044,443 UART: [ldev] Erasing FE.KEYID = 1
8,551,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,316,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,353,953 UART: [ldev] --
10,358,950 UART: [fwproc] Wait for Commands...
10,360,821 UART: [fwproc] Recv command 0x46574c44
10,362,830 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,698 UART: ROM Fatal Error: 0x000B002A
13,841,885 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
2,030,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,719,136 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
2,028,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,755 UART:
2,178,149 UART: Running Caliptra ROM ...
2,179,225 UART:
2,179,375 UART: [state] CFI Enabled
2,180,338 UART: [state] LifecycleState = Unprovisioned
2,181,994 UART: [state] DebugLocked = No
2,183,103 UART: [state] WD Timer not started. Device not locked for debugging
2,185,579 UART: [kat] SHA2-256
2,186,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,255 UART: [kat] ++
2,189,705 UART: [kat] sha1
2,190,298 UART: [kat] SHA2-256
2,190,961 UART: [kat] SHA2-384
2,191,640 UART: [kat] SHA2-512-ACC
2,192,525 UART: [kat] ECC-384
3,281,047 UART: [kat] HMAC-384Kdf
3,293,932 UART: [kat] LMS
3,770,443 UART: [kat] --
3,775,299 UART: [cold-reset] ++
3,777,450 UART: [fht] FHT @ 0x50003400
3,788,220 UART: [idev] ++
3,788,783 UART: [idev] CDI.KEYID = 6
3,789,751 UART: [idev] SUBJECT.KEYID = 7
3,790,960 UART: [idev] UDS.KEYID = 0
3,811,626 UART: [idev] Erasing UDS.KEYID = 0
6,271,830 UART: [idev] Sha1 KeyId Algorithm
6,296,199 UART: [idev] --
6,301,698 UART: [ldev] ++
6,302,267 UART: [ldev] CDI.KEYID = 6
6,303,191 UART: [ldev] SUBJECT.KEYID = 5
6,304,404 UART: [ldev] AUTHORITY.KEYID = 7
6,305,630 UART: [ldev] FE.KEYID = 1
6,317,090 UART: [ldev] Erasing FE.KEYID = 1
8,795,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,336 UART: [ldev] --
10,590,573 UART: [fwproc] Wait for Commands...
10,593,699 UART: [fwproc] Recv command 0x46574c44
10,595,685 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,238 UART: ROM Fatal Error: 0x000B002A
14,080,493 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
2,031,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,969,400 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,261 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
891,162 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,266 UART: [kat] ++
895,418 UART: [kat] sha1
899,682 UART: [kat] SHA2-256
901,622 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
915,845 UART: [kat] HMAC-384Kdf
920,649 UART: [kat] LMS
1,168,961 UART: [kat] --
1,169,898 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,174 UART: [idev] ++
1,173,342 UART: [idev] CDI.KEYID = 6
1,173,703 UART: [idev] SUBJECT.KEYID = 7
1,174,128 UART: [idev] UDS.KEYID = 0
1,182,393 UART: [idev] Erasing UDS.KEYID = 0
1,199,279 UART: [idev] Sha1 KeyId Algorithm
1,208,085 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,720 UART: [ldev] Erasing FE.KEYID = 1
1,242,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,068 UART: [ldev] --
1,281,325 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,921 UART: ROM Fatal Error: 0x000B002A
2,628,080 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,305 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,156 UART: [state] WD Timer not started. Device not locked for debugging
88,439 UART: [kat] SHA2-256
891,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,093 UART: [kat] ++
896,245 UART: [kat] sha1
900,491 UART: [kat] SHA2-256
902,431 UART: [kat] SHA2-384
905,110 UART: [kat] SHA2-512-ACC
907,011 UART: [kat] ECC-384
916,906 UART: [kat] HMAC-384Kdf
921,632 UART: [kat] LMS
1,169,944 UART: [kat] --
1,170,929 UART: [cold-reset] ++
1,171,267 UART: [fht] FHT @ 0x50003400
1,173,941 UART: [idev] ++
1,174,109 UART: [idev] CDI.KEYID = 6
1,174,470 UART: [idev] SUBJECT.KEYID = 7
1,174,895 UART: [idev] UDS.KEYID = 0
1,183,016 UART: [idev] Erasing UDS.KEYID = 0
1,200,110 UART: [idev] Sha1 KeyId Algorithm
1,208,912 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,863 UART: [ldev] --
1,282,182 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,856 UART: ROM Fatal Error: 0x000B002A
2,628,015 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,724 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,803 UART: [state] WD Timer not started. Device not locked for debugging
87,984 UART: [kat] SHA2-256
891,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,638 UART: [kat] ++
895,790 UART: [kat] sha1
899,966 UART: [kat] SHA2-256
901,906 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,013 UART: [kat] HMAC-384Kdf
920,411 UART: [kat] LMS
1,168,723 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,963 UART: [idev] Sha1 KeyId Algorithm
1,207,835 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,256 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,602 UART: [ldev] --
1,279,961 UART: [fwproc] Wait for Commands...
1,280,684 UART: [fwproc] Recv command 0x46574c44
1,281,417 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,781 UART: ROM Fatal Error: 0x000B002A
2,625,940 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,899 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
891,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,737 UART: [kat] ++
895,889 UART: [kat] sha1
900,243 UART: [kat] SHA2-256
902,183 UART: [kat] SHA2-384
905,002 UART: [kat] SHA2-512-ACC
906,903 UART: [kat] ECC-384
916,732 UART: [kat] HMAC-384Kdf
921,188 UART: [kat] LMS
1,169,500 UART: [kat] --
1,170,387 UART: [cold-reset] ++
1,170,775 UART: [fht] FHT @ 0x50003400
1,173,383 UART: [idev] ++
1,173,551 UART: [idev] CDI.KEYID = 6
1,173,912 UART: [idev] SUBJECT.KEYID = 7
1,174,337 UART: [idev] UDS.KEYID = 0
1,182,594 UART: [idev] Erasing UDS.KEYID = 0
1,200,608 UART: [idev] Sha1 KeyId Algorithm
1,209,418 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,111 UART: [ldev] Erasing FE.KEYID = 1
1,243,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,456 UART: [fwproc] Wait for Commands...
1,283,131 UART: [fwproc] Recv command 0x46574c44
1,283,864 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,270 UART: ROM Fatal Error: 0x000B002A
2,628,429 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,978 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,792 UART: [kat] SHA2-256
901,732 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,515 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,174 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,320 UART: [idev] ++
1,173,488 UART: [idev] CDI.KEYID = 6
1,173,849 UART: [idev] SUBJECT.KEYID = 7
1,174,274 UART: [idev] UDS.KEYID = 0
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,601 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,724 UART: [ldev] ++
1,209,892 UART: [ldev] CDI.KEYID = 6
1,210,256 UART: [ldev] SUBJECT.KEYID = 5
1,210,683 UART: [ldev] AUTHORITY.KEYID = 7
1,211,146 UART: [ldev] FE.KEYID = 1
1,216,458 UART: [ldev] Erasing FE.KEYID = 1
1,243,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,624 UART: [ldev] --
1,282,927 UART: [fwproc] Wait for Commands...
1,283,606 UART: [fwproc] Recv command 0x46574c44
1,284,339 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,605 UART: ROM Fatal Error: 0x000B002A
2,628,764 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,229 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,627 UART: [state] LifecycleState = Unprovisioned
86,282 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,423 UART: [kat] SHA2-256
902,363 UART: [kat] SHA2-384
905,130 UART: [kat] SHA2-512-ACC
907,031 UART: [kat] ECC-384
917,112 UART: [kat] HMAC-384Kdf
921,810 UART: [kat] LMS
1,170,122 UART: [kat] --
1,171,197 UART: [cold-reset] ++
1,171,651 UART: [fht] FHT @ 0x50003400
1,174,145 UART: [idev] ++
1,174,313 UART: [idev] CDI.KEYID = 6
1,174,674 UART: [idev] SUBJECT.KEYID = 7
1,175,099 UART: [idev] UDS.KEYID = 0
1,183,146 UART: [idev] Erasing UDS.KEYID = 0
1,200,270 UART: [idev] Sha1 KeyId Algorithm
1,209,206 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,833 UART: [ldev] SUBJECT.KEYID = 5
1,211,260 UART: [ldev] AUTHORITY.KEYID = 7
1,211,723 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,206 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,221 UART: [ldev] --
1,282,544 UART: [fwproc] Wait for Commands...
1,283,141 UART: [fwproc] Recv command 0x46574c44
1,283,874 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,752 UART: ROM Fatal Error: 0x000B002A
2,628,911 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,612 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
2,031,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,492 UART:
2,181,889 UART: Running Caliptra ROM ...
2,183,009 UART:
2,183,189 UART: [state] CFI Enabled
2,184,170 UART: [state] LifecycleState = Unprovisioned
2,185,841 UART: [state] DebugLocked = No
2,186,963 UART: [state] WD Timer not started. Device not locked for debugging
2,189,447 UART: [kat] SHA2-256
2,190,125 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,182 UART: [kat] ++
2,193,854 UART: [kat] sha1
2,194,391 UART: [kat] SHA2-256
2,195,091 UART: [kat] SHA2-384
2,195,761 UART: [kat] SHA2-512-ACC
2,196,594 UART: [kat] ECC-384
2,946,222 UART: [kat] HMAC-384Kdf
2,973,199 UART: [kat] LMS
3,449,689 UART: [kat] --
3,455,141 UART: [cold-reset] ++
3,456,483 UART: [fht] FHT @ 0x50003400
3,468,060 UART: [idev] ++
3,468,633 UART: [idev] CDI.KEYID = 6
3,469,576 UART: [idev] SUBJECT.KEYID = 7
3,470,854 UART: [idev] UDS.KEYID = 0
3,502,848 UART: [idev] Erasing UDS.KEYID = 0
5,989,971 UART: [idev] Sha1 KeyId Algorithm
6,012,485 UART: [idev] --
6,017,571 UART: [ldev] ++
6,018,201 UART: [ldev] CDI.KEYID = 6
6,019,095 UART: [ldev] SUBJECT.KEYID = 5
6,020,322 UART: [ldev] AUTHORITY.KEYID = 7
6,021,565 UART: [ldev] FE.KEYID = 1
6,059,260 UART: [ldev] Erasing FE.KEYID = 1
8,568,350 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,078 UART: [ldev] --
10,378,125 UART: [fwproc] Wait for Commands...
10,379,746 UART: [fwproc] Recv command 0x46574c44
10,381,764 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,992 UART: ROM Fatal Error: 0x000B002A
13,864,252 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
2,029,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,776,843 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
2,027,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,190 UART:
2,178,615 UART: Running Caliptra ROM ...
2,179,784 UART:
2,179,959 UART: [state] CFI Enabled
2,180,910 UART: [state] LifecycleState = Unprovisioned
2,182,557 UART: [state] DebugLocked = No
2,183,666 UART: [state] WD Timer not started. Device not locked for debugging
2,186,142 UART: [kat] SHA2-256
2,186,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,816 UART: [kat] ++
2,190,269 UART: [kat] sha1
2,190,777 UART: [kat] SHA2-256
2,191,476 UART: [kat] SHA2-384
2,192,132 UART: [kat] SHA2-512-ACC
2,192,948 UART: [kat] ECC-384
3,278,742 UART: [kat] HMAC-384Kdf
3,290,641 UART: [kat] LMS
3,767,172 UART: [kat] --
3,770,029 UART: [cold-reset] ++
3,771,259 UART: [fht] FHT @ 0x50003400
3,783,557 UART: [idev] ++
3,784,121 UART: [idev] CDI.KEYID = 6
3,785,057 UART: [idev] SUBJECT.KEYID = 7
3,786,328 UART: [idev] UDS.KEYID = 0
3,803,031 UART: [idev] Erasing UDS.KEYID = 0
6,263,553 UART: [idev] Sha1 KeyId Algorithm
6,287,218 UART: [idev] --
6,292,564 UART: [ldev] ++
6,293,135 UART: [ldev] CDI.KEYID = 6
6,294,041 UART: [ldev] SUBJECT.KEYID = 5
6,295,274 UART: [ldev] AUTHORITY.KEYID = 7
6,296,505 UART: [ldev] FE.KEYID = 1
6,306,465 UART: [ldev] Erasing FE.KEYID = 1
8,783,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,126 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,023 UART: [ldev] --
10,581,622 UART: [fwproc] Wait for Commands...
10,584,154 UART: [fwproc] Recv command 0x46574c44
10,586,198 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,789 UART: ROM Fatal Error: 0x000B002A
14,072,028 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
2,031,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,979,275 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,314 UART: [kat] SHA2-256
890,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,968 UART: [kat] ++
895,120 UART: [kat] sha1
899,470 UART: [kat] SHA2-256
901,410 UART: [kat] SHA2-384
904,041 UART: [kat] SHA2-512-ACC
905,942 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,308 UART: [cold-reset] ++
1,169,780 UART: [fht] FHT @ 0x50003400
1,172,626 UART: [idev] ++
1,172,794 UART: [idev] CDI.KEYID = 6
1,173,155 UART: [idev] SUBJECT.KEYID = 7
1,173,580 UART: [idev] UDS.KEYID = 0
1,181,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,343 UART: [idev] --
1,208,408 UART: [ldev] ++
1,208,576 UART: [ldev] CDI.KEYID = 6
1,208,940 UART: [ldev] SUBJECT.KEYID = 5
1,209,367 UART: [ldev] AUTHORITY.KEYID = 7
1,209,830 UART: [ldev] FE.KEYID = 1
1,214,984 UART: [ldev] Erasing FE.KEYID = 1
1,241,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,161 UART: [fwproc] Wait for Commands...
1,280,772 UART: [fwproc] Recv command 0x46574c44
1,281,505 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,197 UART: ROM Fatal Error: 0x000B002A
2,626,356 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,151 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,817 UART: [state] LifecycleState = Unprovisioned
86,472 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,025 UART: [kat] ++
896,177 UART: [kat] sha1
900,551 UART: [kat] SHA2-256
902,491 UART: [kat] SHA2-384
905,422 UART: [kat] SHA2-512-ACC
907,323 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,532 UART: [kat] LMS
1,169,844 UART: [kat] --
1,170,769 UART: [cold-reset] ++
1,171,347 UART: [fht] FHT @ 0x50003400
1,173,793 UART: [idev] ++
1,173,961 UART: [idev] CDI.KEYID = 6
1,174,322 UART: [idev] SUBJECT.KEYID = 7
1,174,747 UART: [idev] UDS.KEYID = 0
1,182,868 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,410 UART: [idev] --
1,209,489 UART: [ldev] ++
1,209,657 UART: [ldev] CDI.KEYID = 6
1,210,021 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,420 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,443 UART: [ldev] --
1,281,790 UART: [fwproc] Wait for Commands...
1,282,445 UART: [fwproc] Recv command 0x46574c44
1,283,178 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,492 UART: ROM Fatal Error: 0x000B002A
2,627,651 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,658 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,673 UART: [kat] LMS
1,168,985 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,478 UART: [idev] ++
1,172,646 UART: [idev] CDI.KEYID = 6
1,173,007 UART: [idev] SUBJECT.KEYID = 7
1,173,432 UART: [idev] UDS.KEYID = 0
1,181,195 UART: [idev] Erasing UDS.KEYID = 0
1,198,167 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,420 UART: [ldev] Erasing FE.KEYID = 1
1,240,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,506 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,218 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,268 UART: [ldev] --
1,279,563 UART: [fwproc] Wait for Commands...
1,280,218 UART: [fwproc] Recv command 0x46574c44
1,280,951 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,025 UART: ROM Fatal Error: 0x000B002A
2,626,184 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,101 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,811 UART: [state] LifecycleState = Unprovisioned
85,466 UART: [state] DebugLocked = No
86,098 UART: [state] WD Timer not started. Device not locked for debugging
87,441 UART: [kat] SHA2-256
890,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,095 UART: [kat] ++
895,247 UART: [kat] sha1
899,489 UART: [kat] SHA2-256
901,429 UART: [kat] SHA2-384
904,172 UART: [kat] SHA2-512-ACC
906,073 UART: [kat] ECC-384
916,144 UART: [kat] HMAC-384Kdf
920,778 UART: [kat] LMS
1,169,090 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,207 UART: [idev] ++
1,173,375 UART: [idev] CDI.KEYID = 6
1,173,736 UART: [idev] SUBJECT.KEYID = 7
1,174,161 UART: [idev] UDS.KEYID = 0
1,182,040 UART: [idev] Erasing UDS.KEYID = 0
1,199,296 UART: [idev] Sha1 KeyId Algorithm
1,207,986 UART: [idev] --
1,209,033 UART: [ldev] ++
1,209,201 UART: [ldev] CDI.KEYID = 6
1,209,565 UART: [ldev] SUBJECT.KEYID = 5
1,209,992 UART: [ldev] AUTHORITY.KEYID = 7
1,210,455 UART: [ldev] FE.KEYID = 1
1,215,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,543 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,513 UART: [fwproc] Recv command 0x46574c44
1,283,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,676 UART: ROM Fatal Error: 0x000B002A
2,626,835 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,670 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,183 UART: [kat] LMS
1,168,495 UART: [kat] --
1,169,256 UART: [cold-reset] ++
1,169,812 UART: [fht] FHT @ 0x50003400
1,172,392 UART: [idev] ++
1,172,560 UART: [idev] CDI.KEYID = 6
1,172,921 UART: [idev] SUBJECT.KEYID = 7
1,173,346 UART: [idev] UDS.KEYID = 0
1,181,377 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,381 UART: [idev] --
1,208,316 UART: [ldev] ++
1,208,484 UART: [ldev] CDI.KEYID = 6
1,208,848 UART: [ldev] SUBJECT.KEYID = 5
1,209,275 UART: [ldev] AUTHORITY.KEYID = 7
1,209,738 UART: [ldev] FE.KEYID = 1
1,214,868 UART: [ldev] Erasing FE.KEYID = 1
1,241,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,506 UART: [ldev] --
1,280,847 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,341 UART: ROM Fatal Error: 0x000B002A
2,626,500 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,821 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,073 UART: [state] LifecycleState = Unprovisioned
85,728 UART: [state] DebugLocked = No
86,352 UART: [state] WD Timer not started. Device not locked for debugging
87,481 UART: [kat] SHA2-256
891,031 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,135 UART: [kat] ++
895,287 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,230 UART: [kat] SHA2-512-ACC
906,131 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,777 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,182,942 UART: [idev] Erasing UDS.KEYID = 0
1,199,502 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,301 UART: [ldev] ++
1,209,469 UART: [ldev] CDI.KEYID = 6
1,209,833 UART: [ldev] SUBJECT.KEYID = 5
1,210,260 UART: [ldev] AUTHORITY.KEYID = 7
1,210,723 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,464 UART: [fwproc] Wait for Commands...
1,282,179 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,624 UART: ROM Fatal Error: 0x000B002A
2,625,783 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,834 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_entry_point_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
2,030,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,683 UART:
2,181,066 UART: Running Caliptra ROM ...
2,182,155 UART:
2,182,315 UART: [state] CFI Enabled
2,183,289 UART: [state] LifecycleState = Unprovisioned
2,184,953 UART: [state] DebugLocked = No
2,186,003 UART: [state] WD Timer not started. Device not locked for debugging
2,188,482 UART: [kat] SHA2-256
2,189,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,170 UART: [kat] ++
2,192,631 UART: [kat] sha1
2,193,201 UART: [kat] SHA2-256
2,193,869 UART: [kat] SHA2-384
2,194,533 UART: [kat] SHA2-512-ACC
2,195,340 UART: [kat] ECC-384
2,948,220 UART: [kat] HMAC-384Kdf
2,970,418 UART: [kat] LMS
3,446,898 UART: [kat] --
3,452,133 UART: [cold-reset] ++
3,453,264 UART: [fht] FHT @ 0x50003400
3,464,547 UART: [idev] ++
3,465,114 UART: [idev] CDI.KEYID = 6
3,466,079 UART: [idev] SUBJECT.KEYID = 7
3,467,365 UART: [idev] UDS.KEYID = 0
3,500,500 UART: [idev] Erasing UDS.KEYID = 0
5,987,983 UART: [idev] Sha1 KeyId Algorithm
6,011,050 UART: [idev] --
6,015,664 UART: [ldev] ++
6,016,244 UART: [ldev] CDI.KEYID = 6
6,017,322 UART: [ldev] SUBJECT.KEYID = 5
6,018,432 UART: [ldev] AUTHORITY.KEYID = 7
6,019,612 UART: [ldev] FE.KEYID = 1
6,056,251 UART: [ldev] Erasing FE.KEYID = 1
8,564,681 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,315 UART: [ldev] --
10,372,236 UART: [fwproc] Wait for Commands...
10,374,398 UART: [fwproc] Recv command 0x46574c44
10,376,395 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,604 UART: ROM Fatal Error: 0x000B0028
13,858,808 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
2,028,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,771,548 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
2,028,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,142 UART:
2,178,538 UART: Running Caliptra ROM ...
2,179,704 UART:
2,179,876 UART: [state] CFI Enabled
2,180,852 UART: [state] LifecycleState = Unprovisioned
2,182,506 UART: [state] DebugLocked = No
2,183,616 UART: [state] WD Timer not started. Device not locked for debugging
2,186,086 UART: [kat] SHA2-256
2,186,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,761 UART: [kat] ++
2,190,212 UART: [kat] sha1
2,190,719 UART: [kat] SHA2-256
2,191,372 UART: [kat] SHA2-384
2,192,024 UART: [kat] SHA2-512-ACC
2,192,851 UART: [kat] ECC-384
3,282,153 UART: [kat] HMAC-384Kdf
3,293,589 UART: [kat] LMS
3,770,098 UART: [kat] --
3,776,660 UART: [cold-reset] ++
3,779,242 UART: [fht] FHT @ 0x50003400
3,789,645 UART: [idev] ++
3,790,217 UART: [idev] CDI.KEYID = 6
3,791,159 UART: [idev] SUBJECT.KEYID = 7
3,792,421 UART: [idev] UDS.KEYID = 0
3,809,318 UART: [idev] Erasing UDS.KEYID = 0
6,270,104 UART: [idev] Sha1 KeyId Algorithm
6,294,868 UART: [idev] --
6,299,635 UART: [ldev] ++
6,300,243 UART: [ldev] CDI.KEYID = 6
6,301,161 UART: [ldev] SUBJECT.KEYID = 5
6,302,380 UART: [ldev] AUTHORITY.KEYID = 7
6,303,614 UART: [ldev] FE.KEYID = 1
6,314,310 UART: [ldev] Erasing FE.KEYID = 1
8,794,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,564 UART: [ldev] --
10,585,096 UART: [fwproc] Wait for Commands...
10,587,793 UART: [fwproc] Recv command 0x46574c44
10,589,784 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,754 UART: ROM Fatal Error: 0x000B0028
14,074,001 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
2,038,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,986,438 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,334 UART: [state] LifecycleState = Unprovisioned
85,989 UART: [state] DebugLocked = No
86,635 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
916,167 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,482 UART: [cold-reset] ++
1,171,052 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,182,965 UART: [idev] Erasing UDS.KEYID = 0
1,199,973 UART: [idev] Sha1 KeyId Algorithm
1,208,887 UART: [idev] --
1,209,804 UART: [ldev] ++
1,209,972 UART: [ldev] CDI.KEYID = 6
1,210,336 UART: [ldev] SUBJECT.KEYID = 5
1,210,763 UART: [ldev] AUTHORITY.KEYID = 7
1,211,226 UART: [ldev] FE.KEYID = 1
1,216,584 UART: [ldev] Erasing FE.KEYID = 1
1,242,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,112 UART: [ldev] --
1,281,529 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,486 UART: ROM Fatal Error: 0x000B0028
2,627,643 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,766 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,763 UART: [state] LifecycleState = Unprovisioned
86,418 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,259 UART: [kat] SHA2-256
891,809 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,913 UART: [kat] ++
896,065 UART: [kat] sha1
900,309 UART: [kat] SHA2-256
902,249 UART: [kat] SHA2-384
905,148 UART: [kat] SHA2-512-ACC
907,049 UART: [kat] ECC-384
916,282 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,425 UART: [cold-reset] ++
1,171,003 UART: [fht] FHT @ 0x50003400
1,173,603 UART: [idev] ++
1,173,771 UART: [idev] CDI.KEYID = 6
1,174,132 UART: [idev] SUBJECT.KEYID = 7
1,174,557 UART: [idev] UDS.KEYID = 0
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,199,766 UART: [idev] Sha1 KeyId Algorithm
1,208,574 UART: [idev] --
1,209,757 UART: [ldev] ++
1,209,925 UART: [ldev] CDI.KEYID = 6
1,210,289 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,273 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,007 UART: ROM Fatal Error: 0x000B0028
2,629,164 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,909 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,735 UART: [state] WD Timer not started. Device not locked for debugging
87,844 UART: [kat] SHA2-256
891,394 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,498 UART: [kat] ++
895,650 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,607 UART: [kat] SHA2-512-ACC
906,508 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,803 UART: [kat] LMS
1,169,115 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,673 UART: [idev] Sha1 KeyId Algorithm
1,208,545 UART: [idev] --
1,209,748 UART: [ldev] ++
1,209,916 UART: [ldev] CDI.KEYID = 6
1,210,280 UART: [ldev] SUBJECT.KEYID = 5
1,210,707 UART: [ldev] AUTHORITY.KEYID = 7
1,211,170 UART: [ldev] FE.KEYID = 1
1,216,564 UART: [ldev] Erasing FE.KEYID = 1
1,242,959 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,543 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,200 UART: [ldev] --
1,282,555 UART: [fwproc] Wait for Commands...
1,283,324 UART: [fwproc] Recv command 0x46574c44
1,284,057 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,786 UART: ROM Fatal Error: 0x000B0028
2,628,943 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,194 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,496 UART: [kat] SHA2-512-ACC
906,397 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,422 UART: [kat] LMS
1,168,734 UART: [kat] --
1,169,869 UART: [cold-reset] ++
1,170,285 UART: [fht] FHT @ 0x50003400
1,173,017 UART: [idev] ++
1,173,185 UART: [idev] CDI.KEYID = 6
1,173,546 UART: [idev] SUBJECT.KEYID = 7
1,173,971 UART: [idev] UDS.KEYID = 0
1,182,242 UART: [idev] Erasing UDS.KEYID = 0
1,199,410 UART: [idev] Sha1 KeyId Algorithm
1,208,224 UART: [idev] --
1,209,501 UART: [ldev] ++
1,209,669 UART: [ldev] CDI.KEYID = 6
1,210,033 UART: [ldev] SUBJECT.KEYID = 5
1,210,460 UART: [ldev] AUTHORITY.KEYID = 7
1,210,923 UART: [ldev] FE.KEYID = 1
1,216,195 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,057 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,623 UART: ROM Fatal Error: 0x000B0028
2,626,780 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,685 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,511 UART: [kat] HMAC-384Kdf
920,021 UART: [kat] LMS
1,168,333 UART: [kat] --
1,169,330 UART: [cold-reset] ++
1,169,840 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,181,321 UART: [idev] Erasing UDS.KEYID = 0
1,198,347 UART: [idev] Sha1 KeyId Algorithm
1,207,407 UART: [idev] --
1,208,482 UART: [ldev] ++
1,208,650 UART: [ldev] CDI.KEYID = 6
1,209,014 UART: [ldev] SUBJECT.KEYID = 5
1,209,441 UART: [ldev] AUTHORITY.KEYID = 7
1,209,904 UART: [ldev] FE.KEYID = 1
1,215,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,434 UART: [ldev] --
1,280,863 UART: [fwproc] Wait for Commands...
1,281,444 UART: [fwproc] Recv command 0x46574c44
1,282,177 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,686 UART: ROM Fatal Error: 0x000B0028
2,626,843 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,732 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,919 UART: [state] LifecycleState = Unprovisioned
85,574 UART: [state] DebugLocked = No
86,236 UART: [state] WD Timer not started. Device not locked for debugging
87,473 UART: [kat] SHA2-256
891,023 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,127 UART: [kat] ++
895,279 UART: [kat] sha1
899,525 UART: [kat] SHA2-256
901,465 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,300 UART: [kat] LMS
1,168,612 UART: [kat] --
1,169,611 UART: [cold-reset] ++
1,169,997 UART: [fht] FHT @ 0x50003400
1,172,585 UART: [idev] ++
1,172,753 UART: [idev] CDI.KEYID = 6
1,173,114 UART: [idev] SUBJECT.KEYID = 7
1,173,539 UART: [idev] UDS.KEYID = 0
1,181,320 UART: [idev] Erasing UDS.KEYID = 0
1,198,576 UART: [idev] Sha1 KeyId Algorithm
1,207,478 UART: [idev] --
1,208,373 UART: [ldev] ++
1,208,541 UART: [ldev] CDI.KEYID = 6
1,208,905 UART: [ldev] SUBJECT.KEYID = 5
1,209,332 UART: [ldev] AUTHORITY.KEYID = 7
1,209,795 UART: [ldev] FE.KEYID = 1
1,215,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,564 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,861 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46574c44
1,282,528 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,923 UART: ROM Fatal Error: 0x000B0028
2,627,080 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,485,321 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_after_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,032,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,342 UART:
2,182,726 UART: Running Caliptra ROM ...
2,183,810 UART:
2,183,972 UART: [state] CFI Enabled
2,184,942 UART: [state] LifecycleState = Unprovisioned
2,186,603 UART: [state] DebugLocked = No
2,187,637 UART: [state] WD Timer not started. Device not locked for debugging
2,190,105 UART: [kat] SHA2-256
2,190,796 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,814 UART: [kat] ++
2,194,276 UART: [kat] sha1
2,194,797 UART: [kat] SHA2-256
2,195,462 UART: [kat] SHA2-384
2,196,127 UART: [kat] SHA2-512-ACC
2,196,936 UART: [kat] ECC-384
2,947,643 UART: [kat] HMAC-384Kdf
2,971,630 UART: [kat] LMS
3,448,124 UART: [kat] --
3,453,634 UART: [cold-reset] ++
3,454,764 UART: [fht] FHT @ 0x50003400
3,467,150 UART: [idev] ++
3,467,722 UART: [idev] CDI.KEYID = 6
3,468,649 UART: [idev] SUBJECT.KEYID = 7
3,469,922 UART: [idev] UDS.KEYID = 0
3,501,964 UART: [idev] Erasing UDS.KEYID = 0
5,986,726 UART: [idev] Sha1 KeyId Algorithm
6,009,031 UART: [idev] --
6,013,138 UART: [ldev] ++
6,013,713 UART: [ldev] CDI.KEYID = 6
6,014,609 UART: [ldev] SUBJECT.KEYID = 5
6,015,880 UART: [ldev] AUTHORITY.KEYID = 7
6,017,121 UART: [ldev] FE.KEYID = 1
6,058,599 UART: [ldev] Erasing FE.KEYID = 1
8,567,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,916 UART: [ldev] --
10,376,799 UART: [fwproc] Wait for Commands...
10,379,160 UART: [fwproc] Recv command 0x46574c44
10,381,166 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,955 UART: ROM Fatal Error: 0x000B0028
13,871,198 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
2,032,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,733,839 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
2,028,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,177,949 UART:
2,178,331 UART: Running Caliptra ROM ...
2,179,503 UART:
2,179,688 UART: [state] CFI Enabled
2,180,644 UART: [state] LifecycleState = Unprovisioned
2,182,291 UART: [state] DebugLocked = No
2,183,403 UART: [state] WD Timer not started. Device not locked for debugging
2,185,885 UART: [kat] SHA2-256
2,186,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,563 UART: [kat] ++
2,190,013 UART: [kat] sha1
2,190,615 UART: [kat] SHA2-256
2,191,283 UART: [kat] SHA2-384
2,191,936 UART: [kat] SHA2-512-ACC
2,192,762 UART: [kat] ECC-384
3,282,436 UART: [kat] HMAC-384Kdf
3,295,007 UART: [kat] LMS
3,771,490 UART: [kat] --
3,777,806 UART: [cold-reset] ++
3,779,352 UART: [fht] FHT @ 0x50003400
3,791,470 UART: [idev] ++
3,792,033 UART: [idev] CDI.KEYID = 6
3,792,971 UART: [idev] SUBJECT.KEYID = 7
3,794,233 UART: [idev] UDS.KEYID = 0
3,809,773 UART: [idev] Erasing UDS.KEYID = 0
6,268,669 UART: [idev] Sha1 KeyId Algorithm
6,293,576 UART: [idev] --
6,297,688 UART: [ldev] ++
6,298,300 UART: [ldev] CDI.KEYID = 6
6,299,213 UART: [ldev] SUBJECT.KEYID = 5
6,300,373 UART: [ldev] AUTHORITY.KEYID = 7
6,301,681 UART: [ldev] FE.KEYID = 1
6,311,569 UART: [ldev] Erasing FE.KEYID = 1
8,789,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,867 UART: [ldev] --
10,585,182 UART: [fwproc] Wait for Commands...
10,587,499 UART: [fwproc] Recv command 0x46574c44
10,589,491 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,955 UART: ROM Fatal Error: 0x000B0028
14,077,145 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,439 writing to cptra_bootfsm_go
2,029,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,969,897 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,078 UART: [state] LifecycleState = Unprovisioned
85,733 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
891,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,282 UART: [kat] ++
895,434 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,977 UART: [kat] LMS
1,169,289 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,964 UART: [fht] FHT @ 0x50003400
1,173,460 UART: [idev] ++
1,173,628 UART: [idev] CDI.KEYID = 6
1,173,989 UART: [idev] SUBJECT.KEYID = 7
1,174,414 UART: [idev] UDS.KEYID = 0
1,182,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,863 UART: [idev] Sha1 KeyId Algorithm
1,208,763 UART: [idev] --
1,209,772 UART: [ldev] ++
1,209,940 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,731 UART: [ldev] AUTHORITY.KEYID = 7
1,211,194 UART: [ldev] FE.KEYID = 1
1,216,466 UART: [ldev] Erasing FE.KEYID = 1
1,242,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,808 UART: [ldev] --
1,282,067 UART: [fwproc] Wait for Commands...
1,282,878 UART: [fwproc] Recv command 0x46574c44
1,283,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,956 UART: ROM Fatal Error: 0x000B0028
2,628,113 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,854 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,338 UART: [kat] HMAC-384Kdf
920,862 UART: [kat] LMS
1,169,174 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,557 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,182,552 UART: [idev] Erasing UDS.KEYID = 0
1,199,686 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,571 UART: [ldev] ++
1,209,739 UART: [ldev] CDI.KEYID = 6
1,210,103 UART: [ldev] SUBJECT.KEYID = 5
1,210,530 UART: [ldev] AUTHORITY.KEYID = 7
1,210,993 UART: [ldev] FE.KEYID = 1
1,216,075 UART: [ldev] Erasing FE.KEYID = 1
1,241,906 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,799 UART: [ldev] --
1,281,176 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x46574c44
1,282,568 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,641 UART: ROM Fatal Error: 0x000B0028
2,627,798 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,387 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,966 UART: [kat] ++
895,118 UART: [kat] sha1
899,518 UART: [kat] SHA2-256
901,458 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,617 UART: [kat] HMAC-384Kdf
920,323 UART: [kat] LMS
1,168,635 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,298 UART: [fht] FHT @ 0x50003400
1,172,864 UART: [idev] ++
1,173,032 UART: [idev] CDI.KEYID = 6
1,173,393 UART: [idev] SUBJECT.KEYID = 7
1,173,818 UART: [idev] UDS.KEYID = 0
1,181,897 UART: [idev] Erasing UDS.KEYID = 0
1,198,977 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,492 UART: [ldev] ++
1,208,660 UART: [ldev] CDI.KEYID = 6
1,209,024 UART: [ldev] SUBJECT.KEYID = 5
1,209,451 UART: [ldev] AUTHORITY.KEYID = 7
1,209,914 UART: [ldev] FE.KEYID = 1
1,215,160 UART: [ldev] Erasing FE.KEYID = 1
1,240,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,952 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,772 UART: [ldev] --
1,280,085 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x46574c44
1,281,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,206 UART: ROM Fatal Error: 0x000B0028
2,626,363 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,778 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,692 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
891,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,453 UART: [kat] ++
895,605 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,460 UART: [kat] LMS
1,169,772 UART: [kat] --
1,170,885 UART: [cold-reset] ++
1,171,443 UART: [fht] FHT @ 0x50003400
1,174,155 UART: [idev] ++
1,174,323 UART: [idev] CDI.KEYID = 6
1,174,684 UART: [idev] SUBJECT.KEYID = 7
1,175,109 UART: [idev] UDS.KEYID = 0
1,182,930 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,682 UART: [idev] --
1,209,901 UART: [ldev] ++
1,210,069 UART: [ldev] CDI.KEYID = 6
1,210,433 UART: [ldev] SUBJECT.KEYID = 5
1,210,860 UART: [ldev] AUTHORITY.KEYID = 7
1,211,323 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,400 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,257 UART: ROM Fatal Error: 0x000B0028
2,627,414 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,481 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,524 UART: [kat] SHA2-256
891,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,178 UART: [kat] ++
895,330 UART: [kat] sha1
899,654 UART: [kat] SHA2-256
901,594 UART: [kat] SHA2-384
904,299 UART: [kat] SHA2-512-ACC
906,200 UART: [kat] ECC-384
916,037 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,780 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,181,593 UART: [idev] Erasing UDS.KEYID = 0
1,198,855 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,216 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,830 UART: [ldev] --
1,281,153 UART: [fwproc] Wait for Commands...
1,281,872 UART: [fwproc] Recv command 0x46574c44
1,282,605 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,806 UART: ROM Fatal Error: 0x000B0028
2,626,963 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,282 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,946 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,365 UART: [kat] SHA2-256
902,305 UART: [kat] SHA2-384
905,138 UART: [kat] SHA2-512-ACC
907,039 UART: [kat] ECC-384
916,862 UART: [kat] HMAC-384Kdf
921,254 UART: [kat] LMS
1,169,566 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,171,039 UART: [fht] FHT @ 0x50003400
1,173,635 UART: [idev] ++
1,173,803 UART: [idev] CDI.KEYID = 6
1,174,164 UART: [idev] SUBJECT.KEYID = 7
1,174,589 UART: [idev] UDS.KEYID = 0
1,182,608 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,264 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,216,021 UART: [ldev] Erasing FE.KEYID = 1
1,242,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,779 UART: [ldev] --
1,282,058 UART: [fwproc] Wait for Commands...
1,282,711 UART: [fwproc] Recv command 0x46574c44
1,283,444 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,051 UART: ROM Fatal Error: 0x000B0028
2,628,208 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,657 >>> mbox cmd response: failed
test test_image_validation::test_runtime_invalid_load_addr_before_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
2,025,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,174,956 UART:
2,175,351 UART: Running Caliptra ROM ...
2,176,530 UART:
2,176,710 UART: [state] CFI Enabled
2,177,698 UART: [state] LifecycleState = Unprovisioned
2,179,364 UART: [state] DebugLocked = No
2,180,481 UART: [state] WD Timer not started. Device not locked for debugging
2,182,970 UART: [kat] SHA2-256
2,183,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,186,666 UART: [kat] ++
2,187,127 UART: [kat] sha1
2,187,649 UART: [kat] SHA2-256
2,188,396 UART: [kat] SHA2-384
2,189,069 UART: [kat] SHA2-512-ACC
2,189,930 UART: [kat] ECC-384
2,947,810 UART: [kat] HMAC-384Kdf
2,970,639 UART: [kat] LMS
3,447,139 UART: [kat] --
3,453,616 UART: [cold-reset] ++
3,455,637 UART: [fht] FHT @ 0x50003400
3,468,322 UART: [idev] ++
3,468,899 UART: [idev] CDI.KEYID = 6
3,469,841 UART: [idev] SUBJECT.KEYID = 7
3,471,112 UART: [idev] UDS.KEYID = 0
3,500,077 UART: [idev] Erasing UDS.KEYID = 0
5,985,814 UART: [idev] Sha1 KeyId Algorithm
6,009,905 UART: [idev] --
6,014,319 UART: [ldev] ++
6,014,906 UART: [ldev] CDI.KEYID = 6
6,015,822 UART: [ldev] SUBJECT.KEYID = 5
6,016,988 UART: [ldev] AUTHORITY.KEYID = 7
6,018,278 UART: [ldev] FE.KEYID = 1
6,056,256 UART: [ldev] Erasing FE.KEYID = 1
8,575,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,331,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,347,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,363,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,384,751 UART: [ldev] --
10,390,671 UART: [fwproc] Wait for Commands...
10,393,476 UART: [fwproc] Recv command 0x46574c44
10,395,471 UART: [fwproc] Recv'd Img size: 118548 bytes
13,876,867 UART: ROM Fatal Error: 0x000B0029
13,880,108 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,030,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,764,769 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
2,028,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,622 UART:
2,179,015 UART: Running Caliptra ROM ...
2,180,100 UART:
2,180,251 UART: [state] CFI Enabled
2,181,213 UART: [state] LifecycleState = Unprovisioned
2,182,864 UART: [state] DebugLocked = No
2,183,892 UART: [state] WD Timer not started. Device not locked for debugging
2,186,355 UART: [kat] SHA2-256
2,187,017 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,190,033 UART: [kat] ++
2,190,485 UART: [kat] sha1
2,190,994 UART: [kat] SHA2-256
2,191,668 UART: [kat] SHA2-384
2,192,323 UART: [kat] SHA2-512-ACC
2,193,155 UART: [kat] ECC-384
3,277,536 UART: [kat] HMAC-384Kdf
3,291,393 UART: [kat] LMS
3,767,885 UART: [kat] --
3,772,844 UART: [cold-reset] ++
3,774,659 UART: [fht] FHT @ 0x50003400
3,785,738 UART: [idev] ++
3,786,305 UART: [idev] CDI.KEYID = 6
3,787,268 UART: [idev] SUBJECT.KEYID = 7
3,788,479 UART: [idev] UDS.KEYID = 0
3,807,098 UART: [idev] Erasing UDS.KEYID = 0
6,266,043 UART: [idev] Sha1 KeyId Algorithm
6,289,864 UART: [idev] --
6,295,229 UART: [ldev] ++
6,295,873 UART: [ldev] CDI.KEYID = 6
6,296,785 UART: [ldev] SUBJECT.KEYID = 5
6,297,945 UART: [ldev] AUTHORITY.KEYID = 7
6,299,226 UART: [ldev] FE.KEYID = 1
6,310,304 UART: [ldev] Erasing FE.KEYID = 1
8,783,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,021 UART: [ldev] --
10,576,911 UART: [fwproc] Wait for Commands...
10,579,275 UART: [fwproc] Recv command 0x46574c44
10,581,318 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,966 UART: ROM Fatal Error: 0x000B0029
14,065,210 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
2,028,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,976,181 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,842 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,172,984 UART: [idev] ++
1,173,152 UART: [idev] CDI.KEYID = 6
1,173,513 UART: [idev] SUBJECT.KEYID = 7
1,173,938 UART: [idev] UDS.KEYID = 0
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,199,017 UART: [idev] Sha1 KeyId Algorithm
1,207,951 UART: [idev] --
1,208,792 UART: [ldev] ++
1,208,960 UART: [ldev] CDI.KEYID = 6
1,209,324 UART: [ldev] SUBJECT.KEYID = 5
1,209,751 UART: [ldev] AUTHORITY.KEYID = 7
1,210,214 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,242,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,312 UART: [ldev] --
1,281,737 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,197 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,252 UART: ROM Fatal Error: 0x000B0029
2,628,409 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,072 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,148 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
890,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,397 UART: [kat] SHA2-256
901,337 UART: [kat] SHA2-384
904,080 UART: [kat] SHA2-512-ACC
905,981 UART: [kat] ECC-384
916,318 UART: [kat] HMAC-384Kdf
921,028 UART: [kat] LMS
1,169,340 UART: [kat] --
1,170,483 UART: [cold-reset] ++
1,170,965 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,579 UART: [ldev] ++
1,209,747 UART: [ldev] CDI.KEYID = 6
1,210,111 UART: [ldev] SUBJECT.KEYID = 5
1,210,538 UART: [ldev] AUTHORITY.KEYID = 7
1,211,001 UART: [ldev] FE.KEYID = 1
1,216,429 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,549 UART: [fwproc] Recv command 0x46574c44
1,283,282 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,607 UART: ROM Fatal Error: 0x000B0029
2,627,764 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,607 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,717 UART: [state] WD Timer not started. Device not locked for debugging
87,940 UART: [kat] SHA2-256
891,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,594 UART: [kat] ++
895,746 UART: [kat] sha1
900,008 UART: [kat] SHA2-256
901,948 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,287 UART: [kat] HMAC-384Kdf
921,001 UART: [kat] LMS
1,169,313 UART: [kat] --
1,170,190 UART: [cold-reset] ++
1,170,530 UART: [fht] FHT @ 0x50003400
1,173,124 UART: [idev] ++
1,173,292 UART: [idev] CDI.KEYID = 6
1,173,653 UART: [idev] SUBJECT.KEYID = 7
1,174,078 UART: [idev] UDS.KEYID = 0
1,182,179 UART: [idev] Erasing UDS.KEYID = 0
1,199,293 UART: [idev] Sha1 KeyId Algorithm
1,207,953 UART: [idev] --
1,209,156 UART: [ldev] ++
1,209,324 UART: [ldev] CDI.KEYID = 6
1,209,688 UART: [ldev] SUBJECT.KEYID = 5
1,210,115 UART: [ldev] AUTHORITY.KEYID = 7
1,210,578 UART: [ldev] FE.KEYID = 1
1,216,000 UART: [ldev] Erasing FE.KEYID = 1
1,242,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,542 UART: [ldev] --
1,281,773 UART: [fwproc] Wait for Commands...
1,282,386 UART: [fwproc] Recv command 0x46574c44
1,283,119 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,954 UART: ROM Fatal Error: 0x000B0029
2,628,111 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,480,010 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,889 UART: [state] LifecycleState = Unprovisioned
85,544 UART: [state] DebugLocked = No
86,138 UART: [state] WD Timer not started. Device not locked for debugging
87,257 UART: [kat] SHA2-256
890,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,911 UART: [kat] ++
895,063 UART: [kat] sha1
899,341 UART: [kat] SHA2-256
901,281 UART: [kat] SHA2-384
904,088 UART: [kat] SHA2-512-ACC
905,989 UART: [kat] ECC-384
915,866 UART: [kat] HMAC-384Kdf
920,396 UART: [kat] LMS
1,168,708 UART: [kat] --
1,169,597 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,181,598 UART: [idev] Erasing UDS.KEYID = 0
1,198,792 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,203 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,797 UART: [ldev] --
1,281,082 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,611 UART: ROM Fatal Error: 0x000B0029
2,627,768 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,456 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,380 UART: [state] LifecycleState = Unprovisioned
86,035 UART: [state] DebugLocked = No
86,643 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,614 UART: [kat] SHA2-256
901,554 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,887 UART: [kat] LMS
1,169,199 UART: [kat] --
1,169,670 UART: [cold-reset] ++
1,170,054 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,673 UART: [idev] Sha1 KeyId Algorithm
1,207,659 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,215,004 UART: [ldev] Erasing FE.KEYID = 1
1,241,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,438 UART: [ldev] --
1,280,821 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,900 UART: ROM Fatal Error: 0x000B0029
2,626,057 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,006 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Unprovisioned
86,288 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
915,798 UART: [kat] HMAC-384Kdf
920,290 UART: [kat] LMS
1,168,602 UART: [kat] --
1,169,599 UART: [cold-reset] ++
1,170,121 UART: [fht] FHT @ 0x50003400
1,172,643 UART: [idev] ++
1,172,811 UART: [idev] CDI.KEYID = 6
1,173,172 UART: [idev] SUBJECT.KEYID = 7
1,173,597 UART: [idev] UDS.KEYID = 0
1,181,744 UART: [idev] Erasing UDS.KEYID = 0
1,199,338 UART: [idev] Sha1 KeyId Algorithm
1,208,118 UART: [idev] --
1,209,217 UART: [ldev] ++
1,209,385 UART: [ldev] CDI.KEYID = 6
1,209,749 UART: [ldev] SUBJECT.KEYID = 5
1,210,176 UART: [ldev] AUTHORITY.KEYID = 7
1,210,639 UART: [ldev] FE.KEYID = 1
1,215,981 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,483 UART: [ldev] --
1,281,856 UART: [fwproc] Wait for Commands...
1,282,477 UART: [fwproc] Recv command 0x46574c44
1,283,210 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,611 UART: ROM Fatal Error: 0x000B0029
2,627,768 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,129 >>> mbox cmd response: failed
test test_image_validation::test_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
2,032,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,249 UART:
2,182,653 UART: Running Caliptra ROM ...
2,183,823 UART:
2,184,000 UART: [state] CFI Enabled
2,184,966 UART: [state] LifecycleState = Unprovisioned
2,186,641 UART: [state] DebugLocked = No
2,187,761 UART: [state] WD Timer not started. Device not locked for debugging
2,190,241 UART: [kat] SHA2-256
2,191,135 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,177 UART: [kat] ++
2,194,640 UART: [kat] sha1
2,195,162 UART: [kat] SHA2-256
2,195,830 UART: [kat] SHA2-384
2,196,496 UART: [kat] SHA2-512-ACC
2,197,334 UART: [kat] ECC-384
2,927,429 UART: [kat] HMAC-384Kdf
2,952,687 UART: [kat] LMS
3,429,220 UART: [kat] --
3,434,518 UART: [cold-reset] ++
3,436,727 UART: [fht] FHT @ 0x50003400
3,448,570 UART: [idev] ++
3,449,158 UART: [idev] CDI.KEYID = 6
3,450,103 UART: [idev] SUBJECT.KEYID = 7
3,451,324 UART: [idev] UDS.KEYID = 0
3,483,656 UART: [idev] Erasing UDS.KEYID = 0
5,966,680 UART: [idev] Sha1 KeyId Algorithm
5,989,295 UART: [idev] --
5,995,182 UART: [ldev] ++
5,995,758 UART: [ldev] CDI.KEYID = 6
5,996,674 UART: [ldev] SUBJECT.KEYID = 5
5,997,890 UART: [ldev] AUTHORITY.KEYID = 7
5,999,122 UART: [ldev] FE.KEYID = 1
6,038,678 UART: [ldev] Erasing FE.KEYID = 1
8,545,212 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,497 UART: [ldev] --
10,353,987 UART: [fwproc] Wait for Commands...
10,356,243 UART: [fwproc] Recv command 0x46574c44
10,358,250 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,598 UART: ROM Fatal Error: 0x000B0028
13,846,839 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
2,032,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,796,792 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
2,040,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,190,761 UART:
2,191,159 UART: Running Caliptra ROM ...
2,192,326 UART:
2,192,497 UART: [state] CFI Enabled
2,193,452 UART: [state] LifecycleState = Unprovisioned
2,195,104 UART: [state] DebugLocked = No
2,196,233 UART: [state] WD Timer not started. Device not locked for debugging
2,198,710 UART: [kat] SHA2-256
2,199,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,202,395 UART: [kat] ++
2,202,846 UART: [kat] sha1
2,203,353 UART: [kat] SHA2-256
2,204,007 UART: [kat] SHA2-384
2,204,667 UART: [kat] SHA2-512-ACC
2,205,491 UART: [kat] ECC-384
3,275,988 UART: [kat] HMAC-384Kdf
3,287,824 UART: [kat] LMS
3,764,315 UART: [kat] --
3,768,343 UART: [cold-reset] ++
3,769,461 UART: [fht] FHT @ 0x50003400
3,780,487 UART: [idev] ++
3,781,056 UART: [idev] CDI.KEYID = 6
3,782,047 UART: [idev] SUBJECT.KEYID = 7
3,783,269 UART: [idev] UDS.KEYID = 0
3,801,944 UART: [idev] Erasing UDS.KEYID = 0
6,261,336 UART: [idev] Sha1 KeyId Algorithm
6,285,484 UART: [idev] --
6,288,824 UART: [ldev] ++
6,289,391 UART: [ldev] CDI.KEYID = 6
6,290,350 UART: [ldev] SUBJECT.KEYID = 5
6,291,562 UART: [ldev] AUTHORITY.KEYID = 7
6,292,791 UART: [ldev] FE.KEYID = 1
6,303,824 UART: [ldev] Erasing FE.KEYID = 1
8,785,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,046 UART: [ldev] --
10,579,125 UART: [fwproc] Wait for Commands...
10,581,983 UART: [fwproc] Recv command 0x46574c44
10,583,972 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,895 UART: ROM Fatal Error: 0x000B0028
14,067,158 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
2,037,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,976,617 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,636 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,636 UART: [idev] ++
1,172,804 UART: [idev] CDI.KEYID = 6
1,173,165 UART: [idev] SUBJECT.KEYID = 7
1,173,590 UART: [idev] UDS.KEYID = 0
1,181,269 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,752 UART: [ldev] ++
1,208,920 UART: [ldev] CDI.KEYID = 6
1,209,284 UART: [ldev] SUBJECT.KEYID = 5
1,209,711 UART: [ldev] AUTHORITY.KEYID = 7
1,210,174 UART: [ldev] FE.KEYID = 1
1,215,206 UART: [ldev] Erasing FE.KEYID = 1
1,241,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,707 UART: [fwproc] Wait for Commands...
1,281,326 UART: [fwproc] Recv command 0x46574c44
1,282,059 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,830 UART: ROM Fatal Error: 0x000B0028
2,626,987 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,450 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,212 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,867 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,182,372 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,737 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,126 UART: [fwproc] Wait for Commands...
1,282,849 UART: [fwproc] Recv command 0x46574c44
1,283,582 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,079 UART: ROM Fatal Error: 0x000B0028
2,629,236 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,617 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,451 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,371 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,404 UART: [cold-reset] ++
1,170,848 UART: [fht] FHT @ 0x50003400
1,173,488 UART: [idev] ++
1,173,656 UART: [idev] CDI.KEYID = 6
1,174,017 UART: [idev] SUBJECT.KEYID = 7
1,174,442 UART: [idev] UDS.KEYID = 0
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,198,737 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,368 UART: [ldev] Erasing FE.KEYID = 1
1,241,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,000 UART: [ldev] --
1,280,379 UART: [fwproc] Wait for Commands...
1,281,040 UART: [fwproc] Recv command 0x46574c44
1,281,773 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,560 UART: ROM Fatal Error: 0x000B0028
2,626,717 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,422 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,161 UART: [kat] SHA2-256
902,101 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,642 UART: [kat] HMAC-384Kdf
921,238 UART: [kat] LMS
1,169,550 UART: [kat] --
1,170,495 UART: [cold-reset] ++
1,170,837 UART: [fht] FHT @ 0x50003400
1,173,611 UART: [idev] ++
1,173,779 UART: [idev] CDI.KEYID = 6
1,174,140 UART: [idev] SUBJECT.KEYID = 7
1,174,565 UART: [idev] UDS.KEYID = 0
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,200,126 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,821 UART: [ldev] SUBJECT.KEYID = 5
1,211,248 UART: [ldev] AUTHORITY.KEYID = 7
1,211,711 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,243,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,721 UART: [ldev] --
1,281,936 UART: [fwproc] Wait for Commands...
1,282,687 UART: [fwproc] Recv command 0x46574c44
1,283,420 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,289 UART: ROM Fatal Error: 0x000B0028
2,627,446 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,729 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,470 UART: [state] LifecycleState = Unprovisioned
86,125 UART: [state] DebugLocked = No
86,727 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,568 UART: [cold-reset] ++
1,171,066 UART: [fht] FHT @ 0x50003400
1,173,900 UART: [idev] ++
1,174,068 UART: [idev] CDI.KEYID = 6
1,174,429 UART: [idev] SUBJECT.KEYID = 7
1,174,854 UART: [idev] UDS.KEYID = 0
1,182,615 UART: [idev] Erasing UDS.KEYID = 0
1,199,199 UART: [idev] Sha1 KeyId Algorithm
1,208,251 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,215,672 UART: [ldev] Erasing FE.KEYID = 1
1,241,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,280,989 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,357 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,922 UART: ROM Fatal Error: 0x000B0028
2,627,079 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,836 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,995 UART: [state] LifecycleState = Unprovisioned
86,650 UART: [state] DebugLocked = No
87,196 UART: [state] WD Timer not started. Device not locked for debugging
88,511 UART: [kat] SHA2-256
892,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,165 UART: [kat] ++
896,317 UART: [kat] sha1
900,351 UART: [kat] SHA2-256
902,291 UART: [kat] SHA2-384
905,010 UART: [kat] SHA2-512-ACC
906,911 UART: [kat] ECC-384
916,310 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,143 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,784 UART: [idev] --
1,208,739 UART: [ldev] ++
1,208,907 UART: [ldev] CDI.KEYID = 6
1,209,271 UART: [ldev] SUBJECT.KEYID = 5
1,209,698 UART: [ldev] AUTHORITY.KEYID = 7
1,210,161 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,241,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,597 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,623 UART: [ldev] --
1,280,876 UART: [fwproc] Wait for Commands...
1,281,691 UART: [fwproc] Recv command 0x46574c44
1,282,424 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,519 UART: ROM Fatal Error: 0x000B0028
2,627,676 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,219 >>> mbox cmd response: failed
test test_image_validation::test_runtime_not_contained_in_iccm ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
5,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,112 UART:
192,494 UART: Running Caliptra ROM ...
193,678 UART:
193,861 UART: [state] CFI Enabled
265,923 UART: [state] LifecycleState = Manufacturing
267,901 UART: [state] DebugLocked = No
270,150 UART: [state] WD Timer not started. Device not locked for debugging
274,521 UART: [kat] SHA2-256
454,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,972 UART: [kat] ++
465,463 UART: [kat] sha1
476,402 UART: [kat] SHA2-256
479,112 UART: [kat] SHA2-384
485,529 UART: [kat] SHA2-512-ACC
487,872 UART: [kat] ECC-384
2,948,823 UART: [kat] HMAC-384Kdf
2,972,424 UART: [kat] LMS
3,448,942 UART: [kat] --
3,452,745 UART: [cold-reset] ++
3,454,632 UART: [fht] FHT @ 0x50003400
3,467,256 UART: [idev] ++
3,467,834 UART: [idev] CDI.KEYID = 6
3,468,854 UART: [idev] SUBJECT.KEYID = 7
3,470,015 UART: [idev] UDS.KEYID = 0
3,503,723 UART: [idev] Erasing UDS.KEYID = 0
5,990,044 UART: [idev] Sha1 KeyId Algorithm
6,013,329 UART: [idev] --
6,019,841 UART: [ldev] ++
6,020,466 UART: [ldev] CDI.KEYID = 6
6,021,390 UART: [ldev] SUBJECT.KEYID = 5
6,022,564 UART: [ldev] AUTHORITY.KEYID = 7
6,023,809 UART: [ldev] FE.KEYID = 1
6,057,962 UART: [ldev] Erasing FE.KEYID = 1
8,566,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,981 UART: [ldev] --
10,378,169 UART: [fwproc] Wait for Commands...
10,381,250 UART: [fwproc] Recv command 0x46574c44
10,383,241 UART: [fwproc] Recv'd Img size: 118548 bytes
13,901,423 UART: ROM Fatal Error: 0x000B002C
13,904,659 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
7,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,812,492 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
7,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,375 UART:
192,748 UART: Running Caliptra ROM ...
193,924 UART:
603,614 UART: [state] CFI Enabled
615,355 UART: [state] LifecycleState = Manufacturing
617,305 UART: [state] DebugLocked = No
618,571 UART: [state] WD Timer not started. Device not locked for debugging
622,554 UART: [kat] SHA2-256
802,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,014 UART: [kat] ++
813,499 UART: [kat] sha1
824,103 UART: [kat] SHA2-256
826,784 UART: [kat] SHA2-384
832,056 UART: [kat] SHA2-512-ACC
834,401 UART: [kat] ECC-384
3,274,690 UART: [kat] HMAC-384Kdf
3,286,870 UART: [kat] LMS
3,763,371 UART: [kat] --
3,767,837 UART: [cold-reset] ++
3,769,698 UART: [fht] FHT @ 0x50003400
3,781,330 UART: [idev] ++
3,781,949 UART: [idev] CDI.KEYID = 6
3,782,965 UART: [idev] SUBJECT.KEYID = 7
3,784,118 UART: [idev] UDS.KEYID = 0
3,802,375 UART: [idev] Erasing UDS.KEYID = 0
6,263,281 UART: [idev] Sha1 KeyId Algorithm
6,287,047 UART: [idev] --
6,292,994 UART: [ldev] ++
6,293,565 UART: [ldev] CDI.KEYID = 6
6,294,470 UART: [ldev] SUBJECT.KEYID = 5
6,295,681 UART: [ldev] AUTHORITY.KEYID = 7
6,296,973 UART: [ldev] FE.KEYID = 1
6,309,562 UART: [ldev] Erasing FE.KEYID = 1
8,797,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,548 UART: [ldev] --
10,588,666 UART: [fwproc] Wait for Commands...
10,591,106 UART: [fwproc] Recv command 0x46574c44
10,593,097 UART: [fwproc] Recv'd Img size: 118548 bytes
14,112,068 UART: ROM Fatal Error: 0x000B002C
14,115,306 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
6,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,007,990 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,850 UART: [state] LifecycleState = Manufacturing
85,505 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,485 UART: [kat] SHA2-512-ACC
906,386 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,169,840 UART: [cold-reset] ++
1,170,374 UART: [fht] FHT @ 0x50003400
1,173,012 UART: [idev] ++
1,173,180 UART: [idev] CDI.KEYID = 6
1,173,541 UART: [idev] SUBJECT.KEYID = 7
1,173,966 UART: [idev] UDS.KEYID = 0
1,182,113 UART: [idev] Erasing UDS.KEYID = 0
1,198,597 UART: [idev] Sha1 KeyId Algorithm
1,207,485 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,126 UART: [ldev] Erasing FE.KEYID = 1
1,241,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,211 UART: [fwproc] Wait for Commands...
1,281,998 UART: [fwproc] Recv command 0x46574c44
1,282,731 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,425 UART: ROM Fatal Error: 0x000B002C
2,652,584 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,869 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,873 UART: [state] LifecycleState = Manufacturing
86,528 UART: [state] DebugLocked = No
87,136 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,041 UART: [kat] ++
896,193 UART: [kat] sha1
900,525 UART: [kat] SHA2-256
902,465 UART: [kat] SHA2-384
905,158 UART: [kat] SHA2-512-ACC
907,059 UART: [kat] ECC-384
917,176 UART: [kat] HMAC-384Kdf
921,848 UART: [kat] LMS
1,170,160 UART: [kat] --
1,171,121 UART: [cold-reset] ++
1,171,573 UART: [fht] FHT @ 0x50003400
1,174,251 UART: [idev] ++
1,174,419 UART: [idev] CDI.KEYID = 6
1,174,780 UART: [idev] SUBJECT.KEYID = 7
1,175,205 UART: [idev] UDS.KEYID = 0
1,183,492 UART: [idev] Erasing UDS.KEYID = 0
1,200,622 UART: [idev] Sha1 KeyId Algorithm
1,209,554 UART: [idev] --
1,210,725 UART: [ldev] ++
1,210,893 UART: [ldev] CDI.KEYID = 6
1,211,257 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,215 UART: [ldev] Erasing FE.KEYID = 1
1,243,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,979 UART: [ldev] --
1,282,264 UART: [fwproc] Wait for Commands...
1,282,995 UART: [fwproc] Recv command 0x46574c44
1,283,728 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,808 UART: ROM Fatal Error: 0x000B002C
2,653,967 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,730 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,620 UART: [state] LifecycleState = Manufacturing
86,275 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,132 UART: [kat] SHA2-256
891,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,017 UART: [kat] LMS
1,169,329 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,583 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,450 UART: [ldev] ++
1,208,618 UART: [ldev] CDI.KEYID = 6
1,208,982 UART: [ldev] SUBJECT.KEYID = 5
1,209,409 UART: [ldev] AUTHORITY.KEYID = 7
1,209,872 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,019 UART: [fwproc] Wait for Commands...
1,281,704 UART: [fwproc] Recv command 0x46574c44
1,282,437 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,711 UART: ROM Fatal Error: 0x000B002C
2,652,870 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,459 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,633 UART: [state] LifecycleState = Manufacturing
86,288 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,877 UART: [kat] ++
896,029 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,570 UART: [kat] HMAC-384Kdf
921,284 UART: [kat] LMS
1,169,596 UART: [kat] --
1,170,631 UART: [cold-reset] ++
1,171,185 UART: [fht] FHT @ 0x50003400
1,173,953 UART: [idev] ++
1,174,121 UART: [idev] CDI.KEYID = 6
1,174,482 UART: [idev] SUBJECT.KEYID = 7
1,174,907 UART: [idev] UDS.KEYID = 0
1,183,230 UART: [idev] Erasing UDS.KEYID = 0
1,200,882 UART: [idev] Sha1 KeyId Algorithm
1,209,726 UART: [idev] --
1,210,861 UART: [ldev] ++
1,211,029 UART: [ldev] CDI.KEYID = 6
1,211,393 UART: [ldev] SUBJECT.KEYID = 5
1,211,820 UART: [ldev] AUTHORITY.KEYID = 7
1,212,283 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,029 UART: [ldev] --
1,283,336 UART: [fwproc] Wait for Commands...
1,283,999 UART: [fwproc] Recv command 0x46574c44
1,284,732 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,318 UART: ROM Fatal Error: 0x000B002C
2,653,477 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,188 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Manufacturing
85,927 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,862 UART: [kat] SHA2-256
891,412 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,516 UART: [kat] ++
895,668 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,347 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,492 UART: [cold-reset] ++
1,170,866 UART: [fht] FHT @ 0x50003400
1,173,530 UART: [idev] ++
1,173,698 UART: [idev] CDI.KEYID = 6
1,174,059 UART: [idev] SUBJECT.KEYID = 7
1,174,484 UART: [idev] UDS.KEYID = 0
1,182,181 UART: [idev] Erasing UDS.KEYID = 0
1,199,883 UART: [idev] Sha1 KeyId Algorithm
1,208,775 UART: [idev] --
1,209,948 UART: [ldev] ++
1,210,116 UART: [ldev] CDI.KEYID = 6
1,210,480 UART: [ldev] SUBJECT.KEYID = 5
1,210,907 UART: [ldev] AUTHORITY.KEYID = 7
1,211,370 UART: [ldev] FE.KEYID = 1
1,216,688 UART: [ldev] Erasing FE.KEYID = 1
1,243,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,906 UART: [ldev] --
1,282,225 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,653 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,633 UART: ROM Fatal Error: 0x000B002C
2,652,792 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,119 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Manufacturing
86,146 UART: [state] DebugLocked = No
86,806 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,193 UART: [kat] SHA2-256
902,133 UART: [kat] SHA2-384
904,738 UART: [kat] SHA2-512-ACC
906,639 UART: [kat] ECC-384
916,182 UART: [kat] HMAC-384Kdf
920,830 UART: [kat] LMS
1,169,142 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,571 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,344 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,216,133 UART: [ldev] Erasing FE.KEYID = 1
1,242,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,715 UART: [fwproc] Recv command 0x46574c44
1,283,448 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,594 UART: ROM Fatal Error: 0x000B002C
2,653,753 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,030 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
5,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,957 UART:
192,357 UART: Running Caliptra ROM ...
193,534 UART:
193,701 UART: [state] CFI Enabled
262,188 UART: [state] LifecycleState = Manufacturing
264,178 UART: [state] DebugLocked = No
266,380 UART: [state] WD Timer not started. Device not locked for debugging
269,997 UART: [kat] SHA2-256
449,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,466 UART: [kat] ++
461,008 UART: [kat] sha1
472,439 UART: [kat] SHA2-256
475,123 UART: [kat] SHA2-384
480,347 UART: [kat] SHA2-512-ACC
482,685 UART: [kat] ECC-384
2,949,510 UART: [kat] HMAC-384Kdf
2,971,063 UART: [kat] LMS
3,447,526 UART: [kat] --
3,452,190 UART: [cold-reset] ++
3,454,020 UART: [fht] FHT @ 0x50003400
3,464,577 UART: [idev] ++
3,465,191 UART: [idev] CDI.KEYID = 6
3,466,088 UART: [idev] SUBJECT.KEYID = 7
3,467,369 UART: [idev] UDS.KEYID = 0
3,501,043 UART: [idev] Erasing UDS.KEYID = 0
5,988,706 UART: [idev] Sha1 KeyId Algorithm
6,012,893 UART: [idev] --
6,018,410 UART: [ldev] ++
6,018,990 UART: [ldev] CDI.KEYID = 6
6,019,936 UART: [ldev] SUBJECT.KEYID = 5
6,021,144 UART: [ldev] AUTHORITY.KEYID = 7
6,022,426 UART: [ldev] FE.KEYID = 1
6,057,259 UART: [ldev] Erasing FE.KEYID = 1
8,564,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,461 UART: [ldev] --
10,373,090 UART: [fwproc] Wait for Commands...
10,375,140 UART: [fwproc] Recv command 0x46574c44
10,377,136 UART: [fwproc] Recv'd Img size: 118548 bytes
13,887,680 UART: ROM Fatal Error: 0x000B002E
13,890,983 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
5,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,800,414 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
6,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,459 UART:
192,865 UART: Running Caliptra ROM ...
194,174 UART:
603,500 UART: [state] CFI Enabled
617,839 UART: [state] LifecycleState = Manufacturing
619,775 UART: [state] DebugLocked = No
621,643 UART: [state] WD Timer not started. Device not locked for debugging
625,420 UART: [kat] SHA2-256
805,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,836 UART: [kat] ++
816,421 UART: [kat] sha1
828,007 UART: [kat] SHA2-256
830,699 UART: [kat] SHA2-384
836,563 UART: [kat] SHA2-512-ACC
838,952 UART: [kat] ECC-384
3,282,910 UART: [kat] HMAC-384Kdf
3,295,364 UART: [kat] LMS
3,771,882 UART: [kat] --
3,775,748 UART: [cold-reset] ++
3,777,253 UART: [fht] FHT @ 0x50003400
3,787,576 UART: [idev] ++
3,788,143 UART: [idev] CDI.KEYID = 6
3,789,152 UART: [idev] SUBJECT.KEYID = 7
3,790,304 UART: [idev] UDS.KEYID = 0
3,807,153 UART: [idev] Erasing UDS.KEYID = 0
6,265,783 UART: [idev] Sha1 KeyId Algorithm
6,288,352 UART: [idev] --
6,293,612 UART: [ldev] ++
6,294,184 UART: [ldev] CDI.KEYID = 6
6,295,123 UART: [ldev] SUBJECT.KEYID = 5
6,296,337 UART: [ldev] AUTHORITY.KEYID = 7
6,297,571 UART: [ldev] FE.KEYID = 1
6,308,706 UART: [ldev] Erasing FE.KEYID = 1
8,788,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,563 UART: [ldev] --
10,582,344 UART: [fwproc] Wait for Commands...
10,584,819 UART: [fwproc] Recv command 0x46574c44
10,586,805 UART: [fwproc] Recv'd Img size: 118548 bytes
14,101,254 UART: ROM Fatal Error: 0x000B002E
14,104,534 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.93s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
6,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,019,364 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Manufacturing
86,109 UART: [state] DebugLocked = No
86,829 UART: [state] WD Timer not started. Device not locked for debugging
88,030 UART: [kat] SHA2-256
891,580 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,684 UART: [kat] ++
895,836 UART: [kat] sha1
900,214 UART: [kat] SHA2-256
902,154 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,867 UART: [kat] LMS
1,169,179 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,812 UART: [fht] FHT @ 0x50003400
1,173,532 UART: [idev] ++
1,173,700 UART: [idev] CDI.KEYID = 6
1,174,061 UART: [idev] SUBJECT.KEYID = 7
1,174,486 UART: [idev] UDS.KEYID = 0
1,182,489 UART: [idev] Erasing UDS.KEYID = 0
1,199,571 UART: [idev] Sha1 KeyId Algorithm
1,208,415 UART: [idev] --
1,209,624 UART: [ldev] ++
1,209,792 UART: [ldev] CDI.KEYID = 6
1,210,156 UART: [ldev] SUBJECT.KEYID = 5
1,210,583 UART: [ldev] AUTHORITY.KEYID = 7
1,211,046 UART: [ldev] FE.KEYID = 1
1,216,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,458 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,324 UART: [fwproc] Recv command 0x46574c44
1,283,057 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,073 UART: ROM Fatal Error: 0x000B002E
2,653,232 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,363 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,223 UART: [state] LifecycleState = Manufacturing
85,878 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,729 UART: [kat] SHA2-256
891,279 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,383 UART: [kat] ++
895,535 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,296 UART: [kat] SHA2-512-ACC
906,197 UART: [kat] ECC-384
916,068 UART: [kat] HMAC-384Kdf
920,676 UART: [kat] LMS
1,168,988 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,337 UART: [fht] FHT @ 0x50003400
1,172,901 UART: [idev] ++
1,173,069 UART: [idev] CDI.KEYID = 6
1,173,430 UART: [idev] SUBJECT.KEYID = 7
1,173,855 UART: [idev] UDS.KEYID = 0
1,181,668 UART: [idev] Erasing UDS.KEYID = 0
1,198,958 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,941 UART: [ldev] ++
1,209,109 UART: [ldev] CDI.KEYID = 6
1,209,473 UART: [ldev] SUBJECT.KEYID = 5
1,209,900 UART: [ldev] AUTHORITY.KEYID = 7
1,210,363 UART: [ldev] FE.KEYID = 1
1,215,863 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,164 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,749 UART: [ldev] --
1,281,084 UART: [fwproc] Wait for Commands...
1,281,697 UART: [fwproc] Recv command 0x46574c44
1,282,430 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,090 UART: ROM Fatal Error: 0x000B002E
2,652,249 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,510,260 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Manufacturing
85,647 UART: [state] DebugLocked = No
86,315 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
891,176 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,280 UART: [kat] ++
895,432 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,381 UART: [kat] LMS
1,168,693 UART: [kat] --
1,169,782 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,986 UART: [idev] ++
1,173,154 UART: [idev] CDI.KEYID = 6
1,173,515 UART: [idev] SUBJECT.KEYID = 7
1,173,940 UART: [idev] UDS.KEYID = 0
1,182,019 UART: [idev] Erasing UDS.KEYID = 0
1,198,397 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,908 UART: [ldev] Erasing FE.KEYID = 1
1,241,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,454 UART: [ldev] --
1,280,895 UART: [fwproc] Wait for Commands...
1,281,570 UART: [fwproc] Recv command 0x46574c44
1,282,303 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,411 UART: ROM Fatal Error: 0x000B002E
2,651,570 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,483 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Manufacturing
86,250 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,880 UART: [kat] SHA2-512-ACC
906,781 UART: [kat] ECC-384
916,558 UART: [kat] HMAC-384Kdf
921,026 UART: [kat] LMS
1,169,338 UART: [kat] --
1,170,395 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,619 UART: [idev] ++
1,173,787 UART: [idev] CDI.KEYID = 6
1,174,148 UART: [idev] SUBJECT.KEYID = 7
1,174,573 UART: [idev] UDS.KEYID = 0
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,940 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,210,927 UART: [ldev] ++
1,211,095 UART: [ldev] CDI.KEYID = 6
1,211,459 UART: [ldev] SUBJECT.KEYID = 5
1,211,886 UART: [ldev] AUTHORITY.KEYID = 7
1,212,349 UART: [ldev] FE.KEYID = 1
1,217,531 UART: [ldev] Erasing FE.KEYID = 1
1,244,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,058 UART: [fwproc] Wait for Commands...
1,283,859 UART: [fwproc] Recv command 0x46574c44
1,284,592 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,252 UART: ROM Fatal Error: 0x000B002E
2,655,411 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,696 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Manufacturing
85,749 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,492 UART: [kat] SHA2-256
891,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,146 UART: [kat] ++
895,298 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,548 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,181,717 UART: [idev] Erasing UDS.KEYID = 0
1,199,003 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,658 UART: [ldev] ++
1,208,826 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,617 UART: [ldev] AUTHORITY.KEYID = 7
1,210,080 UART: [ldev] FE.KEYID = 1
1,215,240 UART: [ldev] Erasing FE.KEYID = 1
1,241,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,370 UART: [ldev] --
1,280,767 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x46574c44
1,282,235 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,325 UART: ROM Fatal Error: 0x000B002E
2,651,484 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,225 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Manufacturing
85,604 UART: [state] DebugLocked = No
86,268 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
891,097 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,201 UART: [kat] ++
895,353 UART: [kat] sha1
899,499 UART: [kat] SHA2-256
901,439 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,096 UART: [kat] HMAC-384Kdf
920,674 UART: [kat] LMS
1,168,986 UART: [kat] --
1,169,789 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,172,751 UART: [idev] ++
1,172,919 UART: [idev] CDI.KEYID = 6
1,173,280 UART: [idev] SUBJECT.KEYID = 7
1,173,705 UART: [idev] UDS.KEYID = 0
1,181,658 UART: [idev] Erasing UDS.KEYID = 0
1,198,702 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,313 UART: [ldev] Erasing FE.KEYID = 1
1,241,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,457 UART: [ldev] --
1,280,708 UART: [fwproc] Wait for Commands...
1,281,465 UART: [fwproc] Recv command 0x46574c44
1,282,198 UART: [fwproc] Recv'd Img size: 118548 bytes
2,649,988 UART: ROM Fatal Error: 0x000B002E
2,651,147 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,110 >>> mbox cmd response: failed
test test_image_validation::test_runtime_svn_less_than_fuse_svn ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
2,033,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,183,618 UART:
2,184,011 UART: Running Caliptra ROM ...
2,185,103 UART:
2,185,269 UART: [state] CFI Enabled
2,186,244 UART: [state] LifecycleState = Unprovisioned
2,187,905 UART: [state] DebugLocked = No
2,188,942 UART: [state] WD Timer not started. Device not locked for debugging
2,191,413 UART: [kat] SHA2-256
2,192,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,195,120 UART: [kat] ++
2,195,584 UART: [kat] sha1
2,196,310 UART: [kat] SHA2-256
2,197,085 UART: [kat] SHA2-384
2,197,763 UART: [kat] SHA2-512-ACC
2,198,573 UART: [kat] ECC-384
2,947,072 UART: [kat] HMAC-384Kdf
2,971,445 UART: [kat] LMS
3,447,960 UART: [kat] --
3,453,217 UART: [cold-reset] ++
3,454,403 UART: [fht] FHT @ 0x50003400
3,464,901 UART: [idev] ++
3,465,470 UART: [idev] CDI.KEYID = 6
3,466,490 UART: [idev] SUBJECT.KEYID = 7
3,467,660 UART: [idev] UDS.KEYID = 0
3,501,535 UART: [idev] Erasing UDS.KEYID = 0
5,985,256 UART: [idev] Sha1 KeyId Algorithm
6,009,790 UART: [idev] --
6,015,525 UART: [ldev] ++
6,016,113 UART: [ldev] CDI.KEYID = 6
6,017,006 UART: [ldev] SUBJECT.KEYID = 5
6,018,228 UART: [ldev] AUTHORITY.KEYID = 7
6,019,466 UART: [ldev] FE.KEYID = 1
6,058,490 UART: [ldev] Erasing FE.KEYID = 1
8,566,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,932 UART: [ldev] --
10,372,515 UART: [fwproc] Wait for Commands...
10,374,407 UART: [fwproc] Recv command 0x46574c44
10,376,429 UART: [fwproc] Recv'd Img size: 118548 bytes
12,448,008 UART: ROM Fatal Error: 0x000B0018
12,451,258 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,951 writing to cptra_bootfsm_go
2,031,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,291,507 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
2,032,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,181,827 UART:
2,182,220 UART: Running Caliptra ROM ...
2,183,389 UART:
2,183,563 UART: [state] CFI Enabled
2,184,516 UART: [state] LifecycleState = Unprovisioned
2,186,163 UART: [state] DebugLocked = No
2,187,271 UART: [state] WD Timer not started. Device not locked for debugging
2,189,766 UART: [kat] SHA2-256
2,190,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,193,454 UART: [kat] ++
2,193,909 UART: [kat] sha1
2,194,458 UART: [kat] SHA2-256
2,195,116 UART: [kat] SHA2-384
2,195,768 UART: [kat] SHA2-512-ACC
2,196,588 UART: [kat] ECC-384
3,278,224 UART: [kat] HMAC-384Kdf
3,290,411 UART: [kat] LMS
3,766,899 UART: [kat] --
3,774,008 UART: [cold-reset] ++
3,775,160 UART: [fht] FHT @ 0x50003400
3,785,466 UART: [idev] ++
3,786,033 UART: [idev] CDI.KEYID = 6
3,786,971 UART: [idev] SUBJECT.KEYID = 7
3,788,260 UART: [idev] UDS.KEYID = 0
3,801,674 UART: [idev] Erasing UDS.KEYID = 0
6,263,606 UART: [idev] Sha1 KeyId Algorithm
6,287,374 UART: [idev] --
6,291,419 UART: [ldev] ++
6,292,040 UART: [ldev] CDI.KEYID = 6
6,292,926 UART: [ldev] SUBJECT.KEYID = 5
6,294,136 UART: [ldev] AUTHORITY.KEYID = 7
6,295,423 UART: [ldev] FE.KEYID = 1
6,307,096 UART: [ldev] Erasing FE.KEYID = 1
8,784,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,762 UART: [ldev] --
10,580,676 UART: [fwproc] Wait for Commands...
10,582,203 UART: [fwproc] Recv command 0x46574c44
10,584,203 UART: [fwproc] Recv'd Img size: 118548 bytes
12,647,937 UART: ROM Fatal Error: 0x000B0018
12,651,162 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
2,039,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,547,071 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,501 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,403 UART: [kat] SHA2-512-ACC
906,304 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,799 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,240,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,384 UART: [ldev] --
1,279,761 UART: [fwproc] Wait for Commands...
1,280,332 UART: [fwproc] Recv command 0x46574c44
1,281,065 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,800 UART: ROM Fatal Error: 0x000B0018
1,328,957 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,168 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
891,493 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,597 UART: [kat] ++
895,749 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,516 UART: [kat] SHA2-512-ACC
906,417 UART: [kat] ECC-384
916,194 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,249 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,182,148 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,220 UART: [idev] --
1,209,075 UART: [ldev] ++
1,209,243 UART: [ldev] CDI.KEYID = 6
1,209,607 UART: [ldev] SUBJECT.KEYID = 5
1,210,034 UART: [ldev] AUTHORITY.KEYID = 7
1,210,497 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,065 UART: [ldev] --
1,281,292 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,497 UART: ROM Fatal Error: 0x000B0018
1,330,654 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,213 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,979 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,159 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,880 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,172,780 UART: [idev] ++
1,172,948 UART: [idev] CDI.KEYID = 6
1,173,309 UART: [idev] SUBJECT.KEYID = 7
1,173,734 UART: [idev] UDS.KEYID = 0
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,781 UART: [idev] --
1,208,962 UART: [ldev] ++
1,209,130 UART: [ldev] CDI.KEYID = 6
1,209,494 UART: [ldev] SUBJECT.KEYID = 5
1,209,921 UART: [ldev] AUTHORITY.KEYID = 7
1,210,384 UART: [ldev] FE.KEYID = 1
1,215,600 UART: [ldev] Erasing FE.KEYID = 1
1,242,205 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,106 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,092 UART: [fwproc] Recv command 0x46574c44
1,282,825 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,002 UART: ROM Fatal Error: 0x000B0018
1,332,159 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,576 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
891,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,621 UART: [kat] ++
895,773 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
921,126 UART: [kat] LMS
1,169,438 UART: [kat] --
1,170,177 UART: [cold-reset] ++
1,170,659 UART: [fht] FHT @ 0x50003400
1,173,321 UART: [idev] ++
1,173,489 UART: [idev] CDI.KEYID = 6
1,173,850 UART: [idev] SUBJECT.KEYID = 7
1,174,275 UART: [idev] UDS.KEYID = 0
1,182,406 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,088 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,402 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,781 UART: ROM Fatal Error: 0x000B0018
1,331,938 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,359 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
891,340 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,444 UART: [kat] ++
895,596 UART: [kat] sha1
899,750 UART: [kat] SHA2-256
901,690 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
920,869 UART: [kat] LMS
1,169,181 UART: [kat] --
1,170,406 UART: [cold-reset] ++
1,170,760 UART: [fht] FHT @ 0x50003400
1,173,502 UART: [idev] ++
1,173,670 UART: [idev] CDI.KEYID = 6
1,174,031 UART: [idev] SUBJECT.KEYID = 7
1,174,456 UART: [idev] UDS.KEYID = 0
1,182,355 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,207,977 UART: [idev] --
1,209,140 UART: [ldev] ++
1,209,308 UART: [ldev] CDI.KEYID = 6
1,209,672 UART: [ldev] SUBJECT.KEYID = 5
1,210,099 UART: [ldev] AUTHORITY.KEYID = 7
1,210,562 UART: [ldev] FE.KEYID = 1
1,215,882 UART: [ldev] Erasing FE.KEYID = 1
1,242,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,260 UART: [ldev] --
1,281,699 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x46574c44
1,283,153 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,838 UART: ROM Fatal Error: 0x000B0018
1,331,995 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,726 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,861 UART: [kat] SHA2-256
891,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: [kat] ++
895,667 UART: [kat] sha1
899,907 UART: [kat] SHA2-256
901,847 UART: [kat] SHA2-384
904,620 UART: [kat] SHA2-512-ACC
906,521 UART: [kat] ECC-384
915,864 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,473 UART: [cold-reset] ++
1,169,851 UART: [fht] FHT @ 0x50003400
1,172,393 UART: [idev] ++
1,172,561 UART: [idev] CDI.KEYID = 6
1,172,922 UART: [idev] SUBJECT.KEYID = 7
1,173,347 UART: [idev] UDS.KEYID = 0
1,181,358 UART: [idev] Erasing UDS.KEYID = 0
1,198,770 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,979 UART: [ldev] ++
1,209,147 UART: [ldev] CDI.KEYID = 6
1,209,511 UART: [ldev] SUBJECT.KEYID = 5
1,209,938 UART: [ldev] AUTHORITY.KEYID = 7
1,210,401 UART: [ldev] FE.KEYID = 1
1,215,445 UART: [ldev] Erasing FE.KEYID = 1
1,242,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,827 UART: [ldev] --
1,282,130 UART: [fwproc] Wait for Commands...
1,282,937 UART: [fwproc] Recv command 0x46574c44
1,283,670 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,107 UART: ROM Fatal Error: 0x000B0018
1,332,264 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,922 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,030,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,909 UART:
2,181,322 UART: Running Caliptra ROM ...
2,182,502 UART:
2,182,705 UART: [state] CFI Enabled
2,183,682 UART: [state] LifecycleState = Unprovisioned
2,185,348 UART: [state] DebugLocked = No
2,186,461 UART: [state] WD Timer not started. Device not locked for debugging
2,188,940 UART: [kat] SHA2-256
2,189,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,631 UART: [kat] ++
2,193,089 UART: [kat] sha1
2,193,657 UART: [kat] SHA2-256
2,194,327 UART: [kat] SHA2-384
2,194,990 UART: [kat] SHA2-512-ACC
2,195,881 UART: [kat] ECC-384
2,927,625 UART: [kat] HMAC-384Kdf
2,950,695 UART: [kat] LMS
3,427,218 UART: [kat] --
3,430,509 UART: [cold-reset] ++
3,432,251 UART: [fht] FHT @ 0x50003400
3,444,969 UART: [idev] ++
3,445,548 UART: [idev] CDI.KEYID = 6
3,446,569 UART: [idev] SUBJECT.KEYID = 7
3,447,734 UART: [idev] UDS.KEYID = 0
3,479,809 UART: [idev] Erasing UDS.KEYID = 0
5,975,771 UART: [idev] Sha1 KeyId Algorithm
5,998,726 UART: [idev] --
6,003,559 UART: [ldev] ++
6,004,150 UART: [ldev] CDI.KEYID = 6
6,005,069 UART: [ldev] SUBJECT.KEYID = 5
6,006,241 UART: [ldev] AUTHORITY.KEYID = 7
6,007,540 UART: [ldev] FE.KEYID = 1
6,048,556 UART: [ldev] Erasing FE.KEYID = 1
8,558,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,408 UART: [ldev] --
10,356,383 UART: [fwproc] Wait for Commands...
10,358,114 UART: [fwproc] Recv command 0x46574c44
10,360,108 UART: [fwproc] Recv'd Img size: 118548 bytes
12,430,770 UART: ROM Fatal Error: 0x000B0017
12,434,010 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
2,028,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,140 UART:
2,178,524 UART: Running Caliptra ROM ...
2,179,696 UART:
2,179,875 UART: [state] CFI Enabled
2,180,849 UART: [state] LifecycleState = Unprovisioned
2,182,493 UART: [state] DebugLocked = No
2,183,609 UART: [state] WD Timer not started. Device not locked for debugging
2,186,086 UART: [kat] SHA2-256
2,186,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,189,802 UART: [kat] ++
2,190,261 UART: [kat] sha1
2,190,781 UART: [kat] SHA2-256
2,191,448 UART: [kat] SHA2-384
2,192,110 UART: [kat] SHA2-512-ACC
2,192,937 UART: [kat] ECC-384
2,948,651 UART: [kat] HMAC-384Kdf
2,970,699 UART: [kat] LMS
3,447,189 UART: [kat] --
3,452,912 UART: [cold-reset] ++
3,454,630 UART: [fht] FHT @ 0x50003400
3,467,020 UART: [idev] ++
3,467,590 UART: [idev] CDI.KEYID = 6
3,468,564 UART: [idev] SUBJECT.KEYID = 7
3,469,779 UART: [idev] UDS.KEYID = 0
3,501,312 UART: [idev] Erasing UDS.KEYID = 0
5,985,675 UART: [idev] Sha1 KeyId Algorithm
6,009,188 UART: [idev] --
6,014,114 UART: [ldev] ++
6,014,692 UART: [ldev] CDI.KEYID = 6
6,015,607 UART: [ldev] SUBJECT.KEYID = 5
6,016,846 UART: [ldev] AUTHORITY.KEYID = 7
6,018,084 UART: [ldev] FE.KEYID = 1
6,056,415 UART: [ldev] Erasing FE.KEYID = 1
8,569,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,059 UART: [ldev] --
10,372,705 UART: [fwproc] Wait for Commands...
10,375,627 UART: [fwproc] Recv command 0x46574c44
10,377,619 UART: [fwproc] Recv'd Img size: 118548 bytes
12,442,332 UART: ROM Fatal Error: 0x000B0017
12,445,561 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
2,027,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,752 UART:
2,177,112 UART: Running Caliptra ROM ...
2,178,196 UART:
2,178,359 UART: [state] CFI Enabled
2,179,345 UART: [state] LifecycleState = Unprovisioned
2,180,997 UART: [state] DebugLocked = No
2,182,033 UART: [state] WD Timer not started. Device not locked for debugging
2,184,499 UART: [kat] SHA2-256
2,185,173 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,177 UART: [kat] ++
2,188,654 UART: [kat] sha1
2,189,179 UART: [kat] SHA2-256
2,189,840 UART: [kat] SHA2-384
2,190,503 UART: [kat] SHA2-512-ACC
2,191,349 UART: [kat] ECC-384
2,948,770 UART: [kat] HMAC-384Kdf
2,971,458 UART: [kat] LMS
3,447,920 UART: [kat] --
3,452,914 UART: [cold-reset] ++
3,454,908 UART: [fht] FHT @ 0x50003400
3,466,482 UART: [idev] ++
3,467,049 UART: [idev] CDI.KEYID = 6
3,467,994 UART: [idev] SUBJECT.KEYID = 7
3,469,262 UART: [idev] UDS.KEYID = 0
3,501,742 UART: [idev] Erasing UDS.KEYID = 0
5,984,787 UART: [idev] Sha1 KeyId Algorithm
6,007,646 UART: [idev] --
6,011,866 UART: [ldev] ++
6,012,452 UART: [ldev] CDI.KEYID = 6
6,013,401 UART: [ldev] SUBJECT.KEYID = 5
6,014,621 UART: [ldev] AUTHORITY.KEYID = 7
6,015,866 UART: [ldev] FE.KEYID = 1
6,056,981 UART: [ldev] Erasing FE.KEYID = 1
8,564,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,535 UART: [ldev] --
10,376,071 UART: [fwproc] Wait for Commands...
10,378,232 UART: [fwproc] Recv command 0x46574c44
10,380,221 UART: [fwproc] Recv'd Img size: 118548 bytes
12,456,201 UART: ROM Fatal Error: 0x000B0017
12,459,489 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
2,029,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,295,431 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
2,033,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,297,275 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
2,032,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,363,495 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
2,030,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,305 UART:
2,180,701 UART: Running Caliptra ROM ...
2,181,779 UART:
2,181,928 UART: [state] CFI Enabled
2,182,893 UART: [state] LifecycleState = Unprovisioned
2,184,547 UART: [state] DebugLocked = No
2,185,572 UART: [state] WD Timer not started. Device not locked for debugging
2,188,035 UART: [kat] SHA2-256
2,188,701 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,704 UART: [kat] ++
2,192,150 UART: [kat] sha1
2,192,656 UART: [kat] SHA2-256
2,193,331 UART: [kat] SHA2-384
2,193,989 UART: [kat] SHA2-512-ACC
2,194,788 UART: [kat] ECC-384
3,282,490 UART: [kat] HMAC-384Kdf
3,293,964 UART: [kat] LMS
3,770,482 UART: [kat] --
3,776,163 UART: [cold-reset] ++
3,778,159 UART: [fht] FHT @ 0x50003400
3,790,817 UART: [idev] ++
3,791,382 UART: [idev] CDI.KEYID = 6
3,792,398 UART: [idev] SUBJECT.KEYID = 7
3,793,614 UART: [idev] UDS.KEYID = 0
3,812,796 UART: [idev] Erasing UDS.KEYID = 0
6,272,229 UART: [idev] Sha1 KeyId Algorithm
6,295,563 UART: [idev] --
6,300,253 UART: [ldev] ++
6,300,913 UART: [ldev] CDI.KEYID = 6
6,301,811 UART: [ldev] SUBJECT.KEYID = 5
6,302,909 UART: [ldev] AUTHORITY.KEYID = 7
6,304,256 UART: [ldev] FE.KEYID = 1
6,313,880 UART: [ldev] Erasing FE.KEYID = 1
8,790,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,451 UART: [ldev] --
10,586,095 UART: [fwproc] Wait for Commands...
10,588,731 UART: [fwproc] Recv command 0x46574c44
10,590,723 UART: [fwproc] Recv'd Img size: 118548 bytes
12,661,579 UART: ROM Fatal Error: 0x000B0017
12,664,815 >>> mbox cmd response: failed
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
2,027,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,176,990 UART:
2,177,391 UART: Running Caliptra ROM ...
2,178,516 UART:
2,178,680 UART: [state] CFI Enabled
2,179,662 UART: [state] LifecycleState = Unprovisioned
2,181,312 UART: [state] DebugLocked = No
2,182,343 UART: [state] WD Timer not started. Device not locked for debugging
2,184,836 UART: [kat] SHA2-256
2,185,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,188,510 UART: [kat] ++
2,188,964 UART: [kat] sha1
2,189,474 UART: [kat] SHA2-256
2,190,213 UART: [kat] SHA2-384
2,190,880 UART: [kat] SHA2-512-ACC
2,191,703 UART: [kat] ECC-384
3,284,077 UART: [kat] HMAC-384Kdf
3,297,961 UART: [kat] LMS
3,774,478 UART: [kat] --
3,777,036 UART: [cold-reset] ++
3,779,349 UART: [fht] FHT @ 0x50003400
3,790,537 UART: [idev] ++
3,791,096 UART: [idev] CDI.KEYID = 6
3,792,031 UART: [idev] SUBJECT.KEYID = 7
3,793,314 UART: [idev] UDS.KEYID = 0
3,810,787 UART: [idev] Erasing UDS.KEYID = 0
6,274,199 UART: [idev] Sha1 KeyId Algorithm
6,297,962 UART: [idev] --
6,302,797 UART: [ldev] ++
6,303,376 UART: [ldev] CDI.KEYID = 6
6,304,315 UART: [ldev] SUBJECT.KEYID = 5
6,305,524 UART: [ldev] AUTHORITY.KEYID = 7
6,306,750 UART: [ldev] FE.KEYID = 1
6,317,230 UART: [ldev] Erasing FE.KEYID = 1
8,796,832 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,917 UART: [ldev] --
10,588,251 UART: [fwproc] Wait for Commands...
10,589,806 UART: [fwproc] Recv command 0x46574c44
10,591,847 UART: [fwproc] Recv'd Img size: 118548 bytes
12,661,751 UART: ROM Fatal Error: 0x000B0017
12,664,976 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
2,047,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,197,443 UART:
2,197,828 UART: Running Caliptra ROM ...
2,198,994 UART:
2,199,186 UART: [state] CFI Enabled
2,200,150 UART: [state] LifecycleState = Unprovisioned
2,201,791 UART: [state] DebugLocked = No
2,202,895 UART: [state] WD Timer not started. Device not locked for debugging
2,205,382 UART: [kat] SHA2-256
2,206,049 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,209,060 UART: [kat] ++
2,209,511 UART: [kat] sha1
2,210,019 UART: [kat] SHA2-256
2,210,674 UART: [kat] SHA2-384
2,211,501 UART: [kat] SHA2-512-ACC
2,212,333 UART: [kat] ECC-384
3,280,741 UART: [kat] HMAC-384Kdf
3,293,460 UART: [kat] LMS
3,769,935 UART: [kat] --
3,773,815 UART: [cold-reset] ++
3,775,675 UART: [fht] FHT @ 0x50003400
3,787,681 UART: [idev] ++
3,788,256 UART: [idev] CDI.KEYID = 6
3,789,225 UART: [idev] SUBJECT.KEYID = 7
3,790,436 UART: [idev] UDS.KEYID = 0
3,806,846 UART: [idev] Erasing UDS.KEYID = 0
6,268,208 UART: [idev] Sha1 KeyId Algorithm
6,291,858 UART: [idev] --
6,296,116 UART: [ldev] ++
6,296,682 UART: [ldev] CDI.KEYID = 6
6,297,642 UART: [ldev] SUBJECT.KEYID = 5
6,298,850 UART: [ldev] AUTHORITY.KEYID = 7
6,300,078 UART: [ldev] FE.KEYID = 1
6,308,461 UART: [ldev] Erasing FE.KEYID = 1
8,792,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,319 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,001 UART: [ldev] --
10,587,175 UART: [fwproc] Wait for Commands...
10,588,789 UART: [fwproc] Recv command 0x46574c44
10,590,774 UART: [fwproc] Recv'd Img size: 118548 bytes
12,657,948 UART: ROM Fatal Error: 0x000B0017
12,661,179 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
2,030,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,549,262 >>> mbox cmd response: failed
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
2,028,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,541,147 >>> mbox cmd response: failed
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
2,028,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,546,839 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,910 UART: [kat] SHA2-256
891,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,564 UART: [kat] ++
895,716 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,737 UART: [kat] LMS
1,169,049 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,318 UART: [idev] ++
1,173,486 UART: [idev] CDI.KEYID = 6
1,173,847 UART: [idev] SUBJECT.KEYID = 7
1,174,272 UART: [idev] UDS.KEYID = 0
1,182,221 UART: [idev] Erasing UDS.KEYID = 0
1,199,141 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,209,018 UART: [ldev] ++
1,209,186 UART: [ldev] CDI.KEYID = 6
1,209,550 UART: [ldev] SUBJECT.KEYID = 5
1,209,977 UART: [ldev] AUTHORITY.KEYID = 7
1,210,440 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,241,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,596 UART: [ldev] --
1,281,015 UART: [fwproc] Wait for Commands...
1,281,590 UART: [fwproc] Recv command 0x46574c44
1,282,323 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,590 UART: ROM Fatal Error: 0x000B0017
1,330,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,812 UART: [state] LifecycleState = Unprovisioned
85,467 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,126 UART: [kat] SHA2-256
890,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,780 UART: [kat] ++
894,932 UART: [kat] sha1
899,120 UART: [kat] SHA2-256
901,060 UART: [kat] SHA2-384
903,825 UART: [kat] SHA2-512-ACC
905,726 UART: [kat] ECC-384
915,427 UART: [kat] HMAC-384Kdf
920,017 UART: [kat] LMS
1,168,329 UART: [kat] --
1,169,312 UART: [cold-reset] ++
1,169,882 UART: [fht] FHT @ 0x50003400
1,172,372 UART: [idev] ++
1,172,540 UART: [idev] CDI.KEYID = 6
1,172,901 UART: [idev] SUBJECT.KEYID = 7
1,173,326 UART: [idev] UDS.KEYID = 0
1,181,365 UART: [idev] Erasing UDS.KEYID = 0
1,198,175 UART: [idev] Sha1 KeyId Algorithm
1,207,235 UART: [idev] --
1,208,282 UART: [ldev] ++
1,208,450 UART: [ldev] CDI.KEYID = 6
1,208,814 UART: [ldev] SUBJECT.KEYID = 5
1,209,241 UART: [ldev] AUTHORITY.KEYID = 7
1,209,704 UART: [ldev] FE.KEYID = 1
1,214,804 UART: [ldev] Erasing FE.KEYID = 1
1,240,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,558 UART: [ldev] --
1,279,821 UART: [fwproc] Wait for Commands...
1,280,486 UART: [fwproc] Recv command 0x46574c44
1,281,219 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,808 UART: ROM Fatal Error: 0x000B0017
1,330,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
85,997 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,296 UART: [kat] SHA2-256
901,236 UART: [kat] SHA2-384
903,893 UART: [kat] SHA2-512-ACC
905,794 UART: [kat] ECC-384
915,475 UART: [kat] HMAC-384Kdf
920,197 UART: [kat] LMS
1,168,509 UART: [kat] --
1,169,308 UART: [cold-reset] ++
1,169,852 UART: [fht] FHT @ 0x50003400
1,172,520 UART: [idev] ++
1,172,688 UART: [idev] CDI.KEYID = 6
1,173,049 UART: [idev] SUBJECT.KEYID = 7
1,173,474 UART: [idev] UDS.KEYID = 0
1,181,207 UART: [idev] Erasing UDS.KEYID = 0
1,198,283 UART: [idev] Sha1 KeyId Algorithm
1,207,105 UART: [idev] --
1,208,186 UART: [ldev] ++
1,208,354 UART: [ldev] CDI.KEYID = 6
1,208,718 UART: [ldev] SUBJECT.KEYID = 5
1,209,145 UART: [ldev] AUTHORITY.KEYID = 7
1,209,608 UART: [ldev] FE.KEYID = 1
1,214,656 UART: [ldev] Erasing FE.KEYID = 1
1,240,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,095 UART: [fwproc] Wait for Commands...
1,280,692 UART: [fwproc] Recv command 0x46574c44
1,281,425 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,040 UART: ROM Fatal Error: 0x000B0017
1,330,197 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,978 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,592 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,899 UART: [kat] SHA2-256
901,839 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,304 UART: [kat] HMAC-384Kdf
920,880 UART: [kat] LMS
1,169,192 UART: [kat] --
1,169,933 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,360 UART: [idev] Sha1 KeyId Algorithm
1,208,276 UART: [idev] --
1,209,187 UART: [ldev] ++
1,209,355 UART: [ldev] CDI.KEYID = 6
1,209,719 UART: [ldev] SUBJECT.KEYID = 5
1,210,146 UART: [ldev] AUTHORITY.KEYID = 7
1,210,609 UART: [ldev] FE.KEYID = 1
1,216,183 UART: [ldev] Erasing FE.KEYID = 1
1,242,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,593 UART: [fwproc] Recv command 0x46574c44
1,283,326 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,497 UART: ROM Fatal Error: 0x000B0017
1,331,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,346 UART: [kat] SHA2-512-ACC
906,247 UART: [kat] ECC-384
916,122 UART: [kat] HMAC-384Kdf
920,740 UART: [kat] LMS
1,169,052 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,200,048 UART: [idev] Sha1 KeyId Algorithm
1,208,952 UART: [idev] --
1,210,153 UART: [ldev] ++
1,210,321 UART: [ldev] CDI.KEYID = 6
1,210,685 UART: [ldev] SUBJECT.KEYID = 5
1,211,112 UART: [ldev] AUTHORITY.KEYID = 7
1,211,575 UART: [ldev] FE.KEYID = 1
1,216,887 UART: [ldev] Erasing FE.KEYID = 1
1,242,966 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,028 UART: [fwproc] Wait for Commands...
1,282,707 UART: [fwproc] Recv command 0x46574c44
1,283,440 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,345 UART: ROM Fatal Error: 0x000B0017
1,332,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,557 UART: [kat] SHA2-256
891,107 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,211 UART: [kat] ++
895,363 UART: [kat] sha1
899,713 UART: [kat] SHA2-256
901,653 UART: [kat] SHA2-384
904,284 UART: [kat] SHA2-512-ACC
906,185 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,937 UART: [cold-reset] ++
1,170,429 UART: [fht] FHT @ 0x50003400
1,173,073 UART: [idev] ++
1,173,241 UART: [idev] CDI.KEYID = 6
1,173,602 UART: [idev] SUBJECT.KEYID = 7
1,174,027 UART: [idev] UDS.KEYID = 0
1,182,422 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,658 UART: [idev] --
1,209,717 UART: [ldev] ++
1,209,885 UART: [ldev] CDI.KEYID = 6
1,210,249 UART: [ldev] SUBJECT.KEYID = 5
1,210,676 UART: [ldev] AUTHORITY.KEYID = 7
1,211,139 UART: [ldev] FE.KEYID = 1
1,216,681 UART: [ldev] Erasing FE.KEYID = 1
1,242,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,645 UART: [ldev] --
1,282,076 UART: [fwproc] Wait for Commands...
1,282,737 UART: [fwproc] Recv command 0x46574c44
1,283,470 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,905 UART: ROM Fatal Error: 0x000B0017
1,331,062 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,209 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,493 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,984 UART: [kat] ++
895,136 UART: [kat] sha1
899,494 UART: [kat] SHA2-256
901,434 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
916,033 UART: [kat] HMAC-384Kdf
920,721 UART: [kat] LMS
1,169,033 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,560 UART: [fht] FHT @ 0x50003400
1,173,230 UART: [idev] ++
1,173,398 UART: [idev] CDI.KEYID = 6
1,173,759 UART: [idev] SUBJECT.KEYID = 7
1,174,184 UART: [idev] UDS.KEYID = 0
1,182,501 UART: [idev] Erasing UDS.KEYID = 0
1,199,719 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,510 UART: [ldev] ++
1,209,678 UART: [ldev] CDI.KEYID = 6
1,210,042 UART: [ldev] SUBJECT.KEYID = 5
1,210,469 UART: [ldev] AUTHORITY.KEYID = 7
1,210,932 UART: [ldev] FE.KEYID = 1
1,215,914 UART: [ldev] Erasing FE.KEYID = 1
1,242,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,442 UART: [ldev] --
1,281,749 UART: [fwproc] Wait for Commands...
1,282,328 UART: [fwproc] Recv command 0x46574c44
1,283,061 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,580 UART: ROM Fatal Error: 0x000B0017
1,330,737 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
891,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,116 UART: [kat] ++
895,268 UART: [kat] sha1
899,462 UART: [kat] SHA2-256
901,402 UART: [kat] SHA2-384
904,047 UART: [kat] SHA2-512-ACC
905,948 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,607 UART: [kat] LMS
1,168,919 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,232 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,182,383 UART: [idev] Erasing UDS.KEYID = 0
1,199,771 UART: [idev] Sha1 KeyId Algorithm
1,208,791 UART: [idev] --
1,209,788 UART: [ldev] ++
1,209,956 UART: [ldev] CDI.KEYID = 6
1,210,320 UART: [ldev] SUBJECT.KEYID = 5
1,210,747 UART: [ldev] AUTHORITY.KEYID = 7
1,211,210 UART: [ldev] FE.KEYID = 1
1,216,206 UART: [ldev] Erasing FE.KEYID = 1
1,242,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,133 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,410 UART: [ldev] --
1,281,723 UART: [fwproc] Wait for Commands...
1,282,332 UART: [fwproc] Recv command 0x46574c44
1,283,065 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,558 UART: ROM Fatal Error: 0x000B0017
1,330,715 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,375 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
915,721 UART: [kat] HMAC-384Kdf
920,365 UART: [kat] LMS
1,168,677 UART: [kat] --
1,169,956 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,181,765 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,215,792 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,862 UART: [ldev] --
1,281,149 UART: [fwproc] Wait for Commands...
1,281,750 UART: [fwproc] Recv command 0x46574c44
1,282,483 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,452 UART: ROM Fatal Error: 0x000B0017
1,330,609 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,062 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,689 UART: [state] LifecycleState = Unprovisioned
86,344 UART: [state] DebugLocked = No
87,068 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
891,865 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,969 UART: [kat] ++
896,121 UART: [kat] sha1
900,293 UART: [kat] SHA2-256
902,233 UART: [kat] SHA2-384
905,182 UART: [kat] SHA2-512-ACC
907,083 UART: [kat] ECC-384
916,860 UART: [kat] HMAC-384Kdf
921,714 UART: [kat] LMS
1,170,026 UART: [kat] --
1,171,007 UART: [cold-reset] ++
1,171,491 UART: [fht] FHT @ 0x50003400
1,174,187 UART: [idev] ++
1,174,355 UART: [idev] CDI.KEYID = 6
1,174,716 UART: [idev] SUBJECT.KEYID = 7
1,175,141 UART: [idev] UDS.KEYID = 0
1,183,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,642 UART: [idev] Sha1 KeyId Algorithm
1,209,686 UART: [idev] --
1,210,701 UART: [ldev] ++
1,210,869 UART: [ldev] CDI.KEYID = 6
1,211,233 UART: [ldev] SUBJECT.KEYID = 5
1,211,660 UART: [ldev] AUTHORITY.KEYID = 7
1,212,123 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,244,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,690 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,011 UART: [ldev] --
1,283,344 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,778 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,683 UART: ROM Fatal Error: 0x000B0017
1,332,840 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,406 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
891,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,205 UART: [kat] ++
895,357 UART: [kat] sha1
899,479 UART: [kat] SHA2-256
901,419 UART: [kat] SHA2-384
904,376 UART: [kat] SHA2-512-ACC
906,277 UART: [kat] ECC-384
915,810 UART: [kat] HMAC-384Kdf
920,466 UART: [kat] LMS
1,168,778 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,015 UART: [fht] FHT @ 0x50003400
1,172,691 UART: [idev] ++
1,172,859 UART: [idev] CDI.KEYID = 6
1,173,220 UART: [idev] SUBJECT.KEYID = 7
1,173,645 UART: [idev] UDS.KEYID = 0
1,181,614 UART: [idev] Erasing UDS.KEYID = 0
1,198,368 UART: [idev] Sha1 KeyId Algorithm
1,207,268 UART: [idev] --
1,208,333 UART: [ldev] ++
1,208,501 UART: [ldev] CDI.KEYID = 6
1,208,865 UART: [ldev] SUBJECT.KEYID = 5
1,209,292 UART: [ldev] AUTHORITY.KEYID = 7
1,209,755 UART: [ldev] FE.KEYID = 1
1,214,923 UART: [ldev] Erasing FE.KEYID = 1
1,240,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,877 UART: [ldev] --
1,280,314 UART: [fwproc] Wait for Commands...
1,280,945 UART: [fwproc] Recv command 0x46574c44
1,281,678 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,603 UART: ROM Fatal Error: 0x000B0017
1,329,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
891,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,787 UART: [kat] ++
895,939 UART: [kat] sha1
900,359 UART: [kat] SHA2-256
902,299 UART: [kat] SHA2-384
905,218 UART: [kat] SHA2-512-ACC
907,119 UART: [kat] ECC-384
916,996 UART: [kat] HMAC-384Kdf
921,586 UART: [kat] LMS
1,169,898 UART: [kat] --
1,170,471 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,619 UART: [idev] ++
1,173,787 UART: [idev] CDI.KEYID = 6
1,174,148 UART: [idev] SUBJECT.KEYID = 7
1,174,573 UART: [idev] UDS.KEYID = 0
1,182,402 UART: [idev] Erasing UDS.KEYID = 0
1,199,408 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,237 UART: [ldev] ++
1,209,405 UART: [ldev] CDI.KEYID = 6
1,209,769 UART: [ldev] SUBJECT.KEYID = 5
1,210,196 UART: [ldev] AUTHORITY.KEYID = 7
1,210,659 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,283,165 UART: [fwproc] Recv command 0x46574c44
1,283,898 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,403 UART: ROM Fatal Error: 0x000B0017
1,332,560 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,709 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,059 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,591 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,409 UART: [kat] SHA2-512-ACC
906,310 UART: [kat] ECC-384
915,905 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,528 UART: [cold-reset] ++
1,170,060 UART: [fht] FHT @ 0x50003400
1,172,518 UART: [idev] ++
1,172,686 UART: [idev] CDI.KEYID = 6
1,173,047 UART: [idev] SUBJECT.KEYID = 7
1,173,472 UART: [idev] UDS.KEYID = 0
1,181,219 UART: [idev] Erasing UDS.KEYID = 0
1,198,245 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,276 UART: [ldev] ++
1,208,444 UART: [ldev] CDI.KEYID = 6
1,208,808 UART: [ldev] SUBJECT.KEYID = 5
1,209,235 UART: [ldev] AUTHORITY.KEYID = 7
1,209,698 UART: [ldev] FE.KEYID = 1
1,214,882 UART: [ldev] Erasing FE.KEYID = 1
1,241,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,732 UART: [ldev] --
1,280,095 UART: [fwproc] Wait for Commands...
1,280,840 UART: [fwproc] Recv command 0x46574c44
1,281,573 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,650 UART: ROM Fatal Error: 0x000B0017
1,329,807 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,774 UART: [state] LifecycleState = Unprovisioned
85,429 UART: [state] DebugLocked = No
85,967 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,762 UART: [kat] ++
894,914 UART: [kat] sha1
899,270 UART: [kat] SHA2-256
901,210 UART: [kat] SHA2-384
903,929 UART: [kat] SHA2-512-ACC
905,830 UART: [kat] ECC-384
915,441 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,176 UART: [cold-reset] ++
1,169,754 UART: [fht] FHT @ 0x50003400
1,172,342 UART: [idev] ++
1,172,510 UART: [idev] CDI.KEYID = 6
1,172,871 UART: [idev] SUBJECT.KEYID = 7
1,173,296 UART: [idev] UDS.KEYID = 0
1,181,139 UART: [idev] Erasing UDS.KEYID = 0
1,197,513 UART: [idev] Sha1 KeyId Algorithm
1,206,357 UART: [idev] --
1,207,652 UART: [ldev] ++
1,207,820 UART: [ldev] CDI.KEYID = 6
1,208,184 UART: [ldev] SUBJECT.KEYID = 5
1,208,611 UART: [ldev] AUTHORITY.KEYID = 7
1,209,074 UART: [ldev] FE.KEYID = 1
1,214,416 UART: [ldev] Erasing FE.KEYID = 1
1,240,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,346 UART: [ldev] --
1,279,697 UART: [fwproc] Wait for Commands...
1,280,420 UART: [fwproc] Recv command 0x46574c44
1,281,153 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,654 UART: ROM Fatal Error: 0x000B0017
1,329,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,136 UART: [kat] SHA2-256
891,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,790 UART: [kat] ++
895,942 UART: [kat] sha1
900,254 UART: [kat] SHA2-256
902,194 UART: [kat] SHA2-384
904,893 UART: [kat] SHA2-512-ACC
906,794 UART: [kat] ECC-384
916,251 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,256 UART: [fht] FHT @ 0x50003400
1,172,830 UART: [idev] ++
1,172,998 UART: [idev] CDI.KEYID = 6
1,173,359 UART: [idev] SUBJECT.KEYID = 7
1,173,784 UART: [idev] UDS.KEYID = 0
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,829 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,298 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,884 UART: [ldev] --
1,280,327 UART: [fwproc] Wait for Commands...
1,280,956 UART: [fwproc] Recv command 0x46574c44
1,281,689 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,734 UART: ROM Fatal Error: 0x000B0017
1,329,891 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,838 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,673 UART: [kat] ++
895,825 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
905,024 UART: [kat] SHA2-512-ACC
906,925 UART: [kat] ECC-384
916,812 UART: [kat] HMAC-384Kdf
921,358 UART: [kat] LMS
1,169,670 UART: [kat] --
1,170,951 UART: [cold-reset] ++
1,171,493 UART: [fht] FHT @ 0x50003400
1,174,063 UART: [idev] ++
1,174,231 UART: [idev] CDI.KEYID = 6
1,174,592 UART: [idev] SUBJECT.KEYID = 7
1,175,017 UART: [idev] UDS.KEYID = 0
1,183,538 UART: [idev] Erasing UDS.KEYID = 0
1,200,604 UART: [idev] Sha1 KeyId Algorithm
1,209,586 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,155 UART: [ldev] SUBJECT.KEYID = 5
1,211,582 UART: [ldev] AUTHORITY.KEYID = 7
1,212,045 UART: [ldev] FE.KEYID = 1
1,217,529 UART: [ldev] Erasing FE.KEYID = 1
1,244,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,865 UART: [ldev] --
1,283,114 UART: [fwproc] Wait for Commands...
1,283,769 UART: [fwproc] Recv command 0x46574c44
1,284,502 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,677 UART: ROM Fatal Error: 0x000B0017
1,332,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,576 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,288 UART: [kat] HMAC-384Kdf
920,766 UART: [kat] LMS
1,169,078 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,033 UART: [idev] ++
1,173,201 UART: [idev] CDI.KEYID = 6
1,173,562 UART: [idev] SUBJECT.KEYID = 7
1,173,987 UART: [idev] UDS.KEYID = 0
1,182,134 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,531 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,555 UART: ROM Fatal Error: 0x000B0017
1,331,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,265 UART: [cold-reset] ++
1,170,695 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,182,554 UART: [idev] Erasing UDS.KEYID = 0
1,199,670 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,459 UART: [ldev] ++
1,209,627 UART: [ldev] CDI.KEYID = 6
1,209,991 UART: [ldev] SUBJECT.KEYID = 5
1,210,418 UART: [ldev] AUTHORITY.KEYID = 7
1,210,881 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,243,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,113 UART: [ldev] --
1,282,380 UART: [fwproc] Wait for Commands...
1,282,953 UART: [fwproc] Recv command 0x46574c44
1,283,686 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,731 UART: ROM Fatal Error: 0x000B0017
1,330,888 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,895 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,487 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_range_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
2,031,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,180,974 UART:
2,181,373 UART: Running Caliptra ROM ...
2,182,553 UART:
2,182,732 UART: [state] CFI Enabled
2,183,697 UART: [state] LifecycleState = Unprovisioned
2,185,355 UART: [state] DebugLocked = No
2,186,466 UART: [state] WD Timer not started. Device not locked for debugging
2,188,945 UART: [kat] SHA2-256
2,189,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,192,630 UART: [kat] ++
2,193,120 UART: [kat] sha1
2,193,641 UART: [kat] SHA2-256
2,194,323 UART: [kat] SHA2-384
2,194,989 UART: [kat] SHA2-512-ACC
2,195,846 UART: [kat] ECC-384
2,946,352 UART: [kat] HMAC-384Kdf
2,971,746 UART: [kat] LMS
3,448,196 UART: [kat] --
3,451,942 UART: [cold-reset] ++
3,453,823 UART: [fht] FHT @ 0x50003400
3,465,667 UART: [idev] ++
3,466,241 UART: [idev] CDI.KEYID = 6
3,467,261 UART: [idev] SUBJECT.KEYID = 7
3,468,483 UART: [idev] UDS.KEYID = 0
3,500,674 UART: [idev] Erasing UDS.KEYID = 0
5,984,517 UART: [idev] Sha1 KeyId Algorithm
6,008,341 UART: [idev] --
6,012,583 UART: [ldev] ++
6,013,195 UART: [ldev] CDI.KEYID = 6
6,014,175 UART: [ldev] SUBJECT.KEYID = 5
6,015,285 UART: [ldev] AUTHORITY.KEYID = 7
6,016,521 UART: [ldev] FE.KEYID = 1
6,056,342 UART: [ldev] Erasing FE.KEYID = 1
8,561,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,342 UART: [ldev] --
10,372,472 UART: [fwproc] Wait for Commands...
10,374,793 UART: [fwproc] Recv command 0x46574c44
10,376,790 UART: [fwproc] Recv'd Img size: 118548 bytes
12,443,341 UART: ROM Fatal Error: 0x000B003B
12,446,571 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
2,029,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,316,843 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
2,039,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,188,799 UART:
2,189,198 UART: Running Caliptra ROM ...
2,190,375 UART:
2,190,540 UART: [state] CFI Enabled
2,191,491 UART: [state] LifecycleState = Unprovisioned
2,193,139 UART: [state] DebugLocked = No
2,194,247 UART: [state] WD Timer not started. Device not locked for debugging
2,196,718 UART: [kat] SHA2-256
2,197,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,200,418 UART: [kat] ++
2,200,875 UART: [kat] sha1
2,201,388 UART: [kat] SHA2-256
2,202,129 UART: [kat] SHA2-384
2,202,794 UART: [kat] SHA2-512-ACC
2,203,634 UART: [kat] ECC-384
3,272,994 UART: [kat] HMAC-384Kdf
3,284,294 UART: [kat] LMS
3,760,832 UART: [kat] --
3,763,701 UART: [cold-reset] ++
3,765,855 UART: [fht] FHT @ 0x50003400
3,777,160 UART: [idev] ++
3,777,723 UART: [idev] CDI.KEYID = 6
3,778,682 UART: [idev] SUBJECT.KEYID = 7
3,779,893 UART: [idev] UDS.KEYID = 0
3,795,058 UART: [idev] Erasing UDS.KEYID = 0
6,256,256 UART: [idev] Sha1 KeyId Algorithm
6,279,432 UART: [idev] --
6,283,307 UART: [ldev] ++
6,283,930 UART: [ldev] CDI.KEYID = 6
6,284,837 UART: [ldev] SUBJECT.KEYID = 5
6,286,044 UART: [ldev] AUTHORITY.KEYID = 7
6,287,276 UART: [ldev] FE.KEYID = 1
6,299,217 UART: [ldev] Erasing FE.KEYID = 1
8,775,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,495,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,511,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,526,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,542,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,564,647 UART: [ldev] --
10,569,694 UART: [fwproc] Wait for Commands...
10,572,175 UART: [fwproc] Recv command 0x46574c44
10,574,238 UART: [fwproc] Recv'd Img size: 118548 bytes
12,643,625 UART: ROM Fatal Error: 0x000B003B
12,646,849 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
2,034,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,544,308 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,535 UART: [state] WD Timer not started. Device not locked for debugging
87,754 UART: [kat] SHA2-256
891,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,408 UART: [kat] ++
895,560 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,799 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,794 UART: [cold-reset] ++
1,170,246 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,505 UART: [idev] Sha1 KeyId Algorithm
1,207,269 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,214,786 UART: [ldev] Erasing FE.KEYID = 1
1,241,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,116 UART: [ldev] --
1,280,541 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,904 UART: ROM Fatal Error: 0x000B003B
1,330,063 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,266 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,598 UART: [state] WD Timer not started. Device not locked for debugging
87,737 UART: [kat] SHA2-256
891,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,391 UART: [kat] ++
895,543 UART: [kat] sha1
899,873 UART: [kat] SHA2-256
901,813 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,352 UART: [kat] HMAC-384Kdf
920,924 UART: [kat] LMS
1,169,236 UART: [kat] --
1,170,359 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,329 UART: [idev] ++
1,173,497 UART: [idev] CDI.KEYID = 6
1,173,858 UART: [idev] SUBJECT.KEYID = 7
1,174,283 UART: [idev] UDS.KEYID = 0
1,182,720 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,174 UART: [idev] --
1,210,119 UART: [ldev] ++
1,210,287 UART: [ldev] CDI.KEYID = 6
1,210,651 UART: [ldev] SUBJECT.KEYID = 5
1,211,078 UART: [ldev] AUTHORITY.KEYID = 7
1,211,541 UART: [ldev] FE.KEYID = 1
1,217,107 UART: [ldev] Erasing FE.KEYID = 1
1,244,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,317 UART: [ldev] --
1,283,638 UART: [fwproc] Wait for Commands...
1,284,425 UART: [fwproc] Recv command 0x46574c44
1,285,158 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,945 UART: ROM Fatal Error: 0x000B003B
1,334,104 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,731 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,584 UART: [kat] SHA2-256
901,524 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,999 UART: [kat] HMAC-384Kdf
920,557 UART: [kat] LMS
1,168,869 UART: [kat] --
1,169,662 UART: [cold-reset] ++
1,170,004 UART: [fht] FHT @ 0x50003400
1,172,746 UART: [idev] ++
1,172,914 UART: [idev] CDI.KEYID = 6
1,173,275 UART: [idev] SUBJECT.KEYID = 7
1,173,700 UART: [idev] UDS.KEYID = 0
1,181,767 UART: [idev] Erasing UDS.KEYID = 0
1,198,773 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,366 UART: [ldev] Erasing FE.KEYID = 1
1,241,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,245 UART: [fwproc] Wait for Commands...
1,280,914 UART: [fwproc] Recv command 0x46574c44
1,281,647 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,040 UART: ROM Fatal Error: 0x000B003B
1,330,199 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,890 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,521 UART: [kat] SHA2-256
891,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,387 UART: [kat] SHA2-256
901,327 UART: [kat] SHA2-384
904,036 UART: [kat] SHA2-512-ACC
905,937 UART: [kat] ECC-384
915,920 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,170,103 UART: [fht] FHT @ 0x50003400
1,172,743 UART: [idev] ++
1,172,911 UART: [idev] CDI.KEYID = 6
1,173,272 UART: [idev] SUBJECT.KEYID = 7
1,173,697 UART: [idev] UDS.KEYID = 0
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,246 UART: [idev] Sha1 KeyId Algorithm
1,208,104 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,039 UART: [ldev] --
1,281,332 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,489 UART: ROM Fatal Error: 0x000B003B
1,331,648 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,563 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,980 UART: [kat] SHA2-256
891,530 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,634 UART: [kat] ++
895,786 UART: [kat] sha1
900,006 UART: [kat] SHA2-256
901,946 UART: [kat] SHA2-384
904,719 UART: [kat] SHA2-512-ACC
906,620 UART: [kat] ECC-384
916,303 UART: [kat] HMAC-384Kdf
920,935 UART: [kat] LMS
1,169,247 UART: [kat] --
1,170,316 UART: [cold-reset] ++
1,170,862 UART: [fht] FHT @ 0x50003400
1,173,596 UART: [idev] ++
1,173,764 UART: [idev] CDI.KEYID = 6
1,174,125 UART: [idev] SUBJECT.KEYID = 7
1,174,550 UART: [idev] UDS.KEYID = 0
1,182,587 UART: [idev] Erasing UDS.KEYID = 0
1,199,357 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,222 UART: [ldev] ++
1,209,390 UART: [ldev] CDI.KEYID = 6
1,209,754 UART: [ldev] SUBJECT.KEYID = 5
1,210,181 UART: [ldev] AUTHORITY.KEYID = 7
1,210,644 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,242,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,193 UART: [fwproc] Wait for Commands...
1,281,834 UART: [fwproc] Recv command 0x46574c44
1,282,567 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,504 UART: ROM Fatal Error: 0x000B003B
1,330,663 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,550 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,206 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,182,016 UART: [idev] Erasing UDS.KEYID = 0
1,198,960 UART: [idev] Sha1 KeyId Algorithm
1,207,940 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,215,579 UART: [ldev] Erasing FE.KEYID = 1
1,241,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,225 UART: [ldev] --
1,280,520 UART: [fwproc] Wait for Commands...
1,281,101 UART: [fwproc] Recv command 0x46574c44
1,281,834 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,331 UART: ROM Fatal Error: 0x000B003B
1,330,490 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,057 >>> mbox cmd response: failed
test test_image_validation::test_toc_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
2,028,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,178,204 UART:
2,178,610 UART: Running Caliptra ROM ...
2,179,784 UART:
2,179,961 UART: [state] CFI Enabled
2,180,940 UART: [state] LifecycleState = Unprovisioned
2,182,786 UART: [state] DebugLocked = No
2,183,916 UART: [state] WD Timer not started. Device not locked for debugging
2,186,399 UART: [kat] SHA2-256
2,187,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,190,079 UART: [kat] ++
2,190,541 UART: [kat] sha1
2,191,065 UART: [kat] SHA2-256
2,191,835 UART: [kat] SHA2-384
2,192,513 UART: [kat] SHA2-512-ACC
2,193,403 UART: [kat] ECC-384
2,948,375 UART: [kat] HMAC-384Kdf
2,971,832 UART: [kat] LMS
3,448,315 UART: [kat] --
3,453,317 UART: [cold-reset] ++
3,455,906 UART: [fht] FHT @ 0x50003400
3,466,518 UART: [idev] ++
3,467,138 UART: [idev] CDI.KEYID = 6
3,468,070 UART: [idev] SUBJECT.KEYID = 7
3,469,298 UART: [idev] UDS.KEYID = 0
3,501,704 UART: [idev] Erasing UDS.KEYID = 0
5,987,221 UART: [idev] Sha1 KeyId Algorithm
6,010,314 UART: [idev] --
6,016,264 UART: [ldev] ++
6,016,861 UART: [ldev] CDI.KEYID = 6
6,017,778 UART: [ldev] SUBJECT.KEYID = 5
6,019,001 UART: [ldev] AUTHORITY.KEYID = 7
6,020,243 UART: [ldev] FE.KEYID = 1
6,059,914 UART: [ldev] Erasing FE.KEYID = 1
8,566,361 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,938 UART: [ldev] --
10,374,152 UART: [fwproc] Wait for Commands...
10,375,985 UART: [fwproc] Recv command 0x46574c44
10,377,980 UART: [fwproc] Recv'd Img size: 118548 bytes
12,439,275 UART: ROM Fatal Error: 0x000B0010
12,442,537 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
2,026,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,306,866 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
2,033,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,184,396 UART:
2,185,454 UART: Running Caliptra ROM ...
2,186,680 UART:
2,186,842 UART: [state] CFI Enabled
2,187,834 UART: [state] LifecycleState = Unprovisioned
2,189,499 UART: [state] DebugLocked = No
2,190,619 UART: [state] WD Timer not started. Device not locked for debugging
2,193,088 UART: [kat] SHA2-256
2,193,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,555 UART: [kat] ++
2,198,022 UART: [kat] sha1
2,198,590 UART: [kat] SHA2-256
2,199,247 UART: [kat] SHA2-384
2,199,992 UART: [kat] SHA2-512-ACC
2,200,797 UART: [kat] ECC-384
3,278,326 UART: [kat] HMAC-384Kdf
3,290,099 UART: [kat] LMS
3,766,585 UART: [kat] --
3,770,463 UART: [cold-reset] ++
3,772,420 UART: [fht] FHT @ 0x50003400
3,783,053 UART: [idev] ++
3,783,627 UART: [idev] CDI.KEYID = 6
3,784,594 UART: [idev] SUBJECT.KEYID = 7
3,785,858 UART: [idev] UDS.KEYID = 0
3,805,223 UART: [idev] Erasing UDS.KEYID = 0
6,266,418 UART: [idev] Sha1 KeyId Algorithm
6,291,164 UART: [idev] --
6,296,585 UART: [ldev] ++
6,297,166 UART: [ldev] CDI.KEYID = 6
6,298,078 UART: [ldev] SUBJECT.KEYID = 5
6,299,296 UART: [ldev] AUTHORITY.KEYID = 7
6,300,526 UART: [ldev] FE.KEYID = 1
6,311,383 UART: [ldev] Erasing FE.KEYID = 1
8,787,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,331 UART: [ldev] --
10,581,671 UART: [fwproc] Wait for Commands...
10,584,908 UART: [fwproc] Recv command 0x46574c44
10,586,898 UART: [fwproc] Recv'd Img size: 118548 bytes
12,639,779 UART: ROM Fatal Error: 0x000B0010
12,643,068 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
2,041,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,535,480 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,272 UART: [state] LifecycleState = Unprovisioned
85,927 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
915,959 UART: [kat] HMAC-384Kdf
920,461 UART: [kat] LMS
1,168,773 UART: [kat] --
1,169,546 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,181,303 UART: [idev] Erasing UDS.KEYID = 0
1,198,055 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,826 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,874 UART: [ldev] --
1,280,269 UART: [fwproc] Wait for Commands...
1,280,918 UART: [fwproc] Recv command 0x46574c44
1,281,651 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,001 UART: ROM Fatal Error: 0x000B0010
1,325,158 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,813 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,408 UART: [state] WD Timer not started. Device not locked for debugging
87,633 UART: [kat] SHA2-256
891,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,287 UART: [kat] ++
895,439 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,250 UART: [kat] SHA2-512-ACC
906,151 UART: [kat] ECC-384
915,974 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,037 UART: [fht] FHT @ 0x50003400
1,172,683 UART: [idev] ++
1,172,851 UART: [idev] CDI.KEYID = 6
1,173,212 UART: [idev] SUBJECT.KEYID = 7
1,173,637 UART: [idev] UDS.KEYID = 0
1,181,414 UART: [idev] Erasing UDS.KEYID = 0
1,198,440 UART: [idev] Sha1 KeyId Algorithm
1,207,304 UART: [idev] --
1,208,315 UART: [ldev] ++
1,208,483 UART: [ldev] CDI.KEYID = 6
1,208,847 UART: [ldev] SUBJECT.KEYID = 5
1,209,274 UART: [ldev] AUTHORITY.KEYID = 7
1,209,737 UART: [ldev] FE.KEYID = 1
1,215,145 UART: [ldev] Erasing FE.KEYID = 1
1,241,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,577 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,407 UART: [fwproc] Recv command 0x46574c44
1,282,140 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,400 UART: ROM Fatal Error: 0x000B0010
1,325,557 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,536 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,506 UART: [kat] SHA2-256
891,056 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,160 UART: [kat] ++
895,312 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,401 UART: [kat] SHA2-512-ACC
906,302 UART: [kat] ECC-384
916,267 UART: [kat] HMAC-384Kdf
920,847 UART: [kat] LMS
1,169,159 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,105 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,880 UART: [ldev] ++
1,209,048 UART: [ldev] CDI.KEYID = 6
1,209,412 UART: [ldev] SUBJECT.KEYID = 5
1,209,839 UART: [ldev] AUTHORITY.KEYID = 7
1,210,302 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,050 UART: [ldev] --
1,280,299 UART: [fwproc] Wait for Commands...
1,281,026 UART: [fwproc] Recv command 0x46574c44
1,281,759 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,499 UART: ROM Fatal Error: 0x000B0010
1,324,656 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,441 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,671 UART: [kat] SHA2-256
891,221 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,325 UART: [kat] ++
895,477 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
920,286 UART: [kat] LMS
1,168,598 UART: [kat] --
1,169,733 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,173,005 UART: [idev] ++
1,173,173 UART: [idev] CDI.KEYID = 6
1,173,534 UART: [idev] SUBJECT.KEYID = 7
1,173,959 UART: [idev] UDS.KEYID = 0
1,182,598 UART: [idev] Erasing UDS.KEYID = 0
1,199,132 UART: [idev] Sha1 KeyId Algorithm
1,207,900 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,561 UART: [ldev] Erasing FE.KEYID = 1
1,242,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,098 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,094 UART: ROM Fatal Error: 0x000B0010
1,326,251 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,124 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,728 UART: [state] LifecycleState = Unprovisioned
86,383 UART: [state] DebugLocked = No
86,899 UART: [state] WD Timer not started. Device not locked for debugging
88,144 UART: [kat] SHA2-256
891,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,798 UART: [kat] ++
895,950 UART: [kat] sha1
900,210 UART: [kat] SHA2-256
902,150 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,749 UART: [kat] LMS
1,169,061 UART: [kat] --
1,169,940 UART: [cold-reset] ++
1,170,342 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,068 UART: [ldev] ++
1,209,236 UART: [ldev] CDI.KEYID = 6
1,209,600 UART: [ldev] SUBJECT.KEYID = 5
1,210,027 UART: [ldev] AUTHORITY.KEYID = 7
1,210,490 UART: [ldev] FE.KEYID = 1
1,215,588 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,280,965 UART: [fwproc] Wait for Commands...
1,281,596 UART: [fwproc] Recv command 0x46574c44
1,282,329 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,133 UART: ROM Fatal Error: 0x000B0010
1,325,290 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,361 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,048 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
891,825 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,929 UART: [kat] ++
896,081 UART: [kat] sha1
900,297 UART: [kat] SHA2-256
902,237 UART: [kat] SHA2-384
904,926 UART: [kat] SHA2-512-ACC
906,827 UART: [kat] ECC-384
916,528 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,599 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,200,376 UART: [idev] Sha1 KeyId Algorithm
1,209,154 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,289 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,289 UART: [ldev] --
1,282,490 UART: [fwproc] Wait for Commands...
1,283,109 UART: [fwproc] Recv command 0x46574c44
1,283,842 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,278 UART: ROM Fatal Error: 0x000B0010
1,327,435 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,050 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_entry_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
2,035,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,185,575 UART:
2,185,978 UART: Running Caliptra ROM ...
2,187,156 UART:
2,187,341 UART: [state] CFI Enabled
2,188,317 UART: [state] LifecycleState = Unprovisioned
2,189,955 UART: [state] DebugLocked = No
2,191,065 UART: [state] WD Timer not started. Device not locked for debugging
2,193,533 UART: [kat] SHA2-256
2,194,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,197,234 UART: [kat] ++
2,197,694 UART: [kat] sha1
2,198,217 UART: [kat] SHA2-256
2,198,960 UART: [kat] SHA2-384
2,199,635 UART: [kat] SHA2-512-ACC
2,200,523 UART: [kat] ECC-384
2,950,363 UART: [kat] HMAC-384Kdf
2,973,280 UART: [kat] LMS
3,449,755 UART: [kat] --
3,456,578 UART: [cold-reset] ++
3,457,870 UART: [fht] FHT @ 0x50003400
3,469,510 UART: [idev] ++
3,470,084 UART: [idev] CDI.KEYID = 6
3,471,030 UART: [idev] SUBJECT.KEYID = 7
3,472,310 UART: [idev] UDS.KEYID = 0
3,502,550 UART: [idev] Erasing UDS.KEYID = 0
5,988,854 UART: [idev] Sha1 KeyId Algorithm
6,012,351 UART: [idev] --
6,017,971 UART: [ldev] ++
6,018,545 UART: [ldev] CDI.KEYID = 6
6,019,431 UART: [ldev] SUBJECT.KEYID = 5
6,020,650 UART: [ldev] AUTHORITY.KEYID = 7
6,021,945 UART: [ldev] FE.KEYID = 1
6,059,485 UART: [ldev] Erasing FE.KEYID = 1
8,568,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,075 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,566 UART: [ldev] --
10,374,500 UART: [fwproc] Wait for Commands...
10,377,604 UART: [fwproc] Recv command 0x46574c44
10,379,658 UART: [fwproc] Recv'd Img size: 118548 bytes
12,447,335 UART: ROM Fatal Error: 0x000B0012
12,450,621 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
2,032,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,314,363 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
2,029,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,179,570 UART:
2,179,961 UART: Running Caliptra ROM ...
2,181,131 UART:
2,181,296 UART: [state] CFI Enabled
2,182,167 UART: [state] LifecycleState = Unprovisioned
2,183,814 UART: [state] DebugLocked = No
2,184,901 UART: [state] WD Timer not started. Device not locked for debugging
2,187,370 UART: [kat] SHA2-256
2,188,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,191,034 UART: [kat] ++
2,191,489 UART: [kat] sha1
2,191,997 UART: [kat] SHA2-256
2,192,734 UART: [kat] SHA2-384
2,193,396 UART: [kat] SHA2-512-ACC
2,194,275 UART: [kat] ECC-384
3,283,288 UART: [kat] HMAC-384Kdf
3,296,414 UART: [kat] LMS
3,772,924 UART: [kat] --
3,778,465 UART: [cold-reset] ++
3,780,318 UART: [fht] FHT @ 0x50003400
3,793,249 UART: [idev] ++
3,793,817 UART: [idev] CDI.KEYID = 6
3,794,851 UART: [idev] SUBJECT.KEYID = 7
3,796,011 UART: [idev] UDS.KEYID = 0
3,814,257 UART: [idev] Erasing UDS.KEYID = 0
6,275,283 UART: [idev] Sha1 KeyId Algorithm
6,299,760 UART: [idev] --
6,304,615 UART: [ldev] ++
6,305,172 UART: [ldev] CDI.KEYID = 6
6,306,112 UART: [ldev] SUBJECT.KEYID = 5
6,307,318 UART: [ldev] AUTHORITY.KEYID = 7
6,308,603 UART: [ldev] FE.KEYID = 1
6,320,194 UART: [ldev] Erasing FE.KEYID = 1
8,804,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,524,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,540,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,556,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,571,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,594,014 UART: [ldev] --
10,599,417 UART: [fwproc] Wait for Commands...
10,602,064 UART: [fwproc] Recv command 0x46574c44
10,604,056 UART: [fwproc] Recv'd Img size: 118548 bytes
12,672,202 UART: ROM Fatal Error: 0x000B0012
12,675,488 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
2,037,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,221 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,602 UART: [state] LifecycleState = Unprovisioned
85,257 UART: [state] DebugLocked = No
85,777 UART: [state] WD Timer not started. Device not locked for debugging
87,024 UART: [kat] SHA2-256
890,574 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,678 UART: [kat] ++
894,830 UART: [kat] sha1
899,124 UART: [kat] SHA2-256
901,064 UART: [kat] SHA2-384
903,769 UART: [kat] SHA2-512-ACC
905,670 UART: [kat] ECC-384
915,539 UART: [kat] HMAC-384Kdf
919,999 UART: [kat] LMS
1,168,311 UART: [kat] --
1,168,856 UART: [cold-reset] ++
1,169,358 UART: [fht] FHT @ 0x50003400
1,172,218 UART: [idev] ++
1,172,386 UART: [idev] CDI.KEYID = 6
1,172,747 UART: [idev] SUBJECT.KEYID = 7
1,173,172 UART: [idev] UDS.KEYID = 0
1,180,805 UART: [idev] Erasing UDS.KEYID = 0
1,197,463 UART: [idev] Sha1 KeyId Algorithm
1,206,553 UART: [idev] --
1,207,452 UART: [ldev] ++
1,207,620 UART: [ldev] CDI.KEYID = 6
1,207,984 UART: [ldev] SUBJECT.KEYID = 5
1,208,411 UART: [ldev] AUTHORITY.KEYID = 7
1,208,874 UART: [ldev] FE.KEYID = 1
1,214,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,638 UART: [ldev] --
1,280,021 UART: [fwproc] Wait for Commands...
1,280,608 UART: [fwproc] Recv command 0x46574c44
1,281,341 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,001 UART: ROM Fatal Error: 0x000B0012
1,329,158 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,455 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,766 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,133 UART: [kat] SHA2-256
902,073 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,956 UART: [kat] HMAC-384Kdf
921,714 UART: [kat] LMS
1,170,026 UART: [kat] --
1,170,647 UART: [cold-reset] ++
1,171,087 UART: [fht] FHT @ 0x50003400
1,173,825 UART: [idev] ++
1,173,993 UART: [idev] CDI.KEYID = 6
1,174,354 UART: [idev] SUBJECT.KEYID = 7
1,174,779 UART: [idev] UDS.KEYID = 0
1,182,906 UART: [idev] Erasing UDS.KEYID = 0
1,200,484 UART: [idev] Sha1 KeyId Algorithm
1,209,582 UART: [idev] --
1,210,525 UART: [ldev] ++
1,210,693 UART: [ldev] CDI.KEYID = 6
1,211,057 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,217,281 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,511 UART: [ldev] --
1,282,884 UART: [fwproc] Wait for Commands...
1,283,561 UART: [fwproc] Recv command 0x46574c44
1,284,294 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,808 UART: ROM Fatal Error: 0x000B0012
1,332,965 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,726 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,240 UART: [state] LifecycleState = Unprovisioned
85,895 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,511 UART: [kat] SHA2-512-ACC
906,412 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,191 UART: [kat] LMS
1,169,503 UART: [kat] --
1,170,266 UART: [cold-reset] ++
1,170,650 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,182,671 UART: [idev] Erasing UDS.KEYID = 0
1,199,709 UART: [idev] Sha1 KeyId Algorithm
1,208,477 UART: [idev] --
1,209,332 UART: [ldev] ++
1,209,500 UART: [ldev] CDI.KEYID = 6
1,209,864 UART: [ldev] SUBJECT.KEYID = 5
1,210,291 UART: [ldev] AUTHORITY.KEYID = 7
1,210,754 UART: [ldev] FE.KEYID = 1
1,215,894 UART: [ldev] Erasing FE.KEYID = 1
1,242,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,876 UART: [ldev] --
1,281,287 UART: [fwproc] Wait for Commands...
1,281,974 UART: [fwproc] Recv command 0x46574c44
1,282,707 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,366 UART: ROM Fatal Error: 0x000B0012
1,330,523 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,019 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,301 UART: [kat] SHA2-256
891,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,955 UART: [kat] ++
896,107 UART: [kat] sha1
900,355 UART: [kat] SHA2-256
902,295 UART: [kat] SHA2-384
905,142 UART: [kat] SHA2-512-ACC
907,043 UART: [kat] ECC-384
917,042 UART: [kat] HMAC-384Kdf
921,544 UART: [kat] LMS
1,169,856 UART: [kat] --
1,170,709 UART: [cold-reset] ++
1,171,047 UART: [fht] FHT @ 0x50003400
1,173,599 UART: [idev] ++
1,173,767 UART: [idev] CDI.KEYID = 6
1,174,128 UART: [idev] SUBJECT.KEYID = 7
1,174,553 UART: [idev] UDS.KEYID = 0
1,182,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,138 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,709 UART: [ldev] SUBJECT.KEYID = 5
1,211,136 UART: [ldev] AUTHORITY.KEYID = 7
1,211,599 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,489 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,810 UART: ROM Fatal Error: 0x000B0012
1,332,967 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,824 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
891,232 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,336 UART: [kat] ++
895,488 UART: [kat] sha1
899,880 UART: [kat] SHA2-256
901,820 UART: [kat] SHA2-384
904,583 UART: [kat] SHA2-512-ACC
906,484 UART: [kat] ECC-384
916,331 UART: [kat] HMAC-384Kdf
920,899 UART: [kat] LMS
1,169,211 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,670 UART: [fht] FHT @ 0x50003400
1,173,206 UART: [idev] ++
1,173,374 UART: [idev] CDI.KEYID = 6
1,173,735 UART: [idev] SUBJECT.KEYID = 7
1,174,160 UART: [idev] UDS.KEYID = 0
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,117 UART: [idev] --
1,209,234 UART: [ldev] ++
1,209,402 UART: [ldev] CDI.KEYID = 6
1,209,766 UART: [ldev] SUBJECT.KEYID = 5
1,210,193 UART: [ldev] AUTHORITY.KEYID = 7
1,210,656 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,242,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,100 UART: [ldev] --
1,281,499 UART: [fwproc] Wait for Commands...
1,282,102 UART: [fwproc] Recv command 0x46574c44
1,282,835 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,737 UART: ROM Fatal Error: 0x000B0012
1,329,894 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,349 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,552 UART: [kat] SHA2-512-ACC
906,453 UART: [kat] ECC-384
916,160 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,191 UART: [fht] FHT @ 0x50003400
1,172,983 UART: [idev] ++
1,173,151 UART: [idev] CDI.KEYID = 6
1,173,512 UART: [idev] SUBJECT.KEYID = 7
1,173,937 UART: [idev] UDS.KEYID = 0
1,182,004 UART: [idev] Erasing UDS.KEYID = 0
1,199,384 UART: [idev] Sha1 KeyId Algorithm
1,208,370 UART: [idev] --
1,209,305 UART: [ldev] ++
1,209,473 UART: [ldev] CDI.KEYID = 6
1,209,837 UART: [ldev] SUBJECT.KEYID = 5
1,210,264 UART: [ldev] AUTHORITY.KEYID = 7
1,210,727 UART: [ldev] FE.KEYID = 1
1,215,869 UART: [ldev] Erasing FE.KEYID = 1
1,242,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,305 UART: [ldev] --
1,281,658 UART: [fwproc] Wait for Commands...
1,282,321 UART: [fwproc] Recv command 0x46574c44
1,283,054 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,280 UART: ROM Fatal Error: 0x000B0012
1,331,437 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,826 >>> mbox cmd response: failed
test test_image_validation::test_toc_invalid_toc_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
2,032,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,182,369 UART:
2,182,788 UART: Running Caliptra ROM ...
2,183,970 UART:
2,184,151 UART: [state] CFI Enabled
2,185,120 UART: [state] LifecycleState = Unprovisioned
2,186,780 UART: [state] DebugLocked = No
2,187,893 UART: [state] WD Timer not started. Device not locked for debugging
2,190,369 UART: [kat] SHA2-256
2,191,044 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,194,062 UART: [kat] ++
2,194,528 UART: [kat] sha1
2,195,052 UART: [kat] SHA2-256
2,195,796 UART: [kat] SHA2-384
2,196,465 UART: [kat] SHA2-512-ACC
2,197,315 UART: [kat] ECC-384
2,948,842 UART: [kat] HMAC-384Kdf
2,972,435 UART: [kat] LMS
3,448,969 UART: [kat] --
3,453,398 UART: [cold-reset] ++
3,454,423 UART: [fht] FHT @ 0x50003400
3,466,600 UART: [idev] ++
3,467,168 UART: [idev] CDI.KEYID = 6
3,468,188 UART: [idev] SUBJECT.KEYID = 7
3,469,355 UART: [idev] UDS.KEYID = 0
3,500,779 UART: [idev] Erasing UDS.KEYID = 0
5,988,882 UART: [idev] Sha1 KeyId Algorithm
6,013,948 UART: [idev] --
6,018,899 UART: [ldev] ++
6,019,482 UART: [ldev] CDI.KEYID = 6
6,020,404 UART: [ldev] SUBJECT.KEYID = 5
6,021,573 UART: [ldev] AUTHORITY.KEYID = 7
6,022,869 UART: [ldev] FE.KEYID = 1
6,059,232 UART: [ldev] Erasing FE.KEYID = 1
8,564,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,177 UART: [ldev] --
10,376,200 UART: [fwproc] Wait for Commands...
10,378,204 UART: [fwproc] Recv command 0x46574c44
10,380,204 UART: [fwproc] Recv'd Img size: 118548 bytes
12,447,087 UART: ROM Fatal Error: 0x000B003C
12,450,329 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
2,038,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,925 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
2,043,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,193,374 UART:
2,193,786 UART: Running Caliptra ROM ...
2,194,895 UART:
2,195,046 UART: [state] CFI Enabled
2,196,014 UART: [state] LifecycleState = Unprovisioned
2,197,686 UART: [state] DebugLocked = No
2,198,746 UART: [state] WD Timer not started. Device not locked for debugging
2,201,220 UART: [kat] SHA2-256
2,201,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,204,907 UART: [kat] ++
2,205,362 UART: [kat] sha1
2,206,121 UART: [kat] SHA2-256
2,206,880 UART: [kat] SHA2-384
2,207,550 UART: [kat] SHA2-512-ACC
2,208,434 UART: [kat] ECC-384
3,283,078 UART: [kat] HMAC-384Kdf
3,296,865 UART: [kat] LMS
3,773,328 UART: [kat] --
3,778,040 UART: [cold-reset] ++
3,780,466 UART: [fht] FHT @ 0x50003400
3,792,190 UART: [idev] ++
3,792,804 UART: [idev] CDI.KEYID = 6
3,793,687 UART: [idev] SUBJECT.KEYID = 7
3,794,950 UART: [idev] UDS.KEYID = 0
3,809,121 UART: [idev] Erasing UDS.KEYID = 0
6,269,461 UART: [idev] Sha1 KeyId Algorithm
6,292,974 UART: [idev] --
6,296,797 UART: [ldev] ++
6,297,373 UART: [ldev] CDI.KEYID = 6
6,298,256 UART: [ldev] SUBJECT.KEYID = 5
6,299,462 UART: [ldev] AUTHORITY.KEYID = 7
6,300,749 UART: [ldev] FE.KEYID = 1
6,313,145 UART: [ldev] Erasing FE.KEYID = 1
8,791,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,621 UART: [ldev] --
10,587,853 UART: [fwproc] Wait for Commands...
10,590,924 UART: [fwproc] Recv command 0x46574c44
10,592,917 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,343 UART: ROM Fatal Error: 0x000B003C
12,666,584 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
2,032,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,170 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,379 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
891,208 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,312 UART: [kat] ++
895,464 UART: [kat] sha1
899,756 UART: [kat] SHA2-256
901,696 UART: [kat] SHA2-384
904,585 UART: [kat] SHA2-512-ACC
906,486 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,487 UART: [kat] LMS
1,168,799 UART: [kat] --
1,169,720 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,804 UART: [idev] ++
1,172,972 UART: [idev] CDI.KEYID = 6
1,173,333 UART: [idev] SUBJECT.KEYID = 7
1,173,758 UART: [idev] UDS.KEYID = 0
1,181,819 UART: [idev] Erasing UDS.KEYID = 0
1,198,983 UART: [idev] Sha1 KeyId Algorithm
1,207,827 UART: [idev] --
1,208,908 UART: [ldev] ++
1,209,076 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,867 UART: [ldev] AUTHORITY.KEYID = 7
1,210,330 UART: [ldev] FE.KEYID = 1
1,215,698 UART: [ldev] Erasing FE.KEYID = 1
1,242,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,184 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,852 UART: [ldev] --
1,281,171 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,855 UART: ROM Fatal Error: 0x000B003C
1,331,014 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,151 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
891,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,481 UART: [kat] ++
895,633 UART: [kat] sha1
899,723 UART: [kat] SHA2-256
901,663 UART: [kat] SHA2-384
904,234 UART: [kat] SHA2-512-ACC
906,135 UART: [kat] ECC-384
916,170 UART: [kat] HMAC-384Kdf
920,940 UART: [kat] LMS
1,169,252 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,565 UART: [fht] FHT @ 0x50003400
1,173,083 UART: [idev] ++
1,173,251 UART: [idev] CDI.KEYID = 6
1,173,612 UART: [idev] SUBJECT.KEYID = 7
1,174,037 UART: [idev] UDS.KEYID = 0
1,181,766 UART: [idev] Erasing UDS.KEYID = 0
1,198,704 UART: [idev] Sha1 KeyId Algorithm
1,207,416 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,209 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,243 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,750 UART: ROM Fatal Error: 0x000B003C
1,329,909 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,608 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
85,981 UART: [state] WD Timer not started. Device not locked for debugging
87,150 UART: [kat] SHA2-256
890,700 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,804 UART: [kat] ++
894,956 UART: [kat] sha1
899,158 UART: [kat] SHA2-256
901,098 UART: [kat] SHA2-384
903,699 UART: [kat] SHA2-512-ACC
905,600 UART: [kat] ECC-384
915,515 UART: [kat] HMAC-384Kdf
920,263 UART: [kat] LMS
1,168,575 UART: [kat] --
1,169,482 UART: [cold-reset] ++
1,169,816 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,181,585 UART: [idev] Erasing UDS.KEYID = 0
1,197,977 UART: [idev] Sha1 KeyId Algorithm
1,206,949 UART: [idev] --
1,207,912 UART: [ldev] ++
1,208,080 UART: [ldev] CDI.KEYID = 6
1,208,444 UART: [ldev] SUBJECT.KEYID = 5
1,208,871 UART: [ldev] AUTHORITY.KEYID = 7
1,209,334 UART: [ldev] FE.KEYID = 1
1,214,548 UART: [ldev] Erasing FE.KEYID = 1
1,240,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,022 UART: [ldev] --
1,279,359 UART: [fwproc] Wait for Commands...
1,280,174 UART: [fwproc] Recv command 0x46574c44
1,280,907 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,637 UART: ROM Fatal Error: 0x000B003C
1,328,796 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,875 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,567 UART: [kat] SHA2-256
892,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,221 UART: [kat] ++
896,373 UART: [kat] sha1
900,607 UART: [kat] SHA2-256
902,547 UART: [kat] SHA2-384
905,342 UART: [kat] SHA2-512-ACC
907,243 UART: [kat] ECC-384
916,546 UART: [kat] HMAC-384Kdf
921,064 UART: [kat] LMS
1,169,376 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,182,328 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,864 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,567 UART: [ldev] Erasing FE.KEYID = 1
1,241,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,597 UART: [ldev] --
1,280,940 UART: [fwproc] Wait for Commands...
1,281,727 UART: [fwproc] Recv command 0x46574c44
1,282,460 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,936 UART: ROM Fatal Error: 0x000B003C
1,331,095 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,572 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,561 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
916,117 UART: [kat] HMAC-384Kdf
920,907 UART: [kat] LMS
1,169,219 UART: [kat] --
1,170,072 UART: [cold-reset] ++
1,170,502 UART: [fht] FHT @ 0x50003400
1,173,184 UART: [idev] ++
1,173,352 UART: [idev] CDI.KEYID = 6
1,173,713 UART: [idev] SUBJECT.KEYID = 7
1,174,138 UART: [idev] UDS.KEYID = 0
1,182,361 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,503 UART: [idev] --
1,209,394 UART: [ldev] ++
1,209,562 UART: [ldev] CDI.KEYID = 6
1,209,926 UART: [ldev] SUBJECT.KEYID = 5
1,210,353 UART: [ldev] AUTHORITY.KEYID = 7
1,210,816 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,242,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,278 UART: [ldev] --
1,281,583 UART: [fwproc] Wait for Commands...
1,282,326 UART: [fwproc] Recv command 0x46574c44
1,283,059 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,785 UART: ROM Fatal Error: 0x000B003C
1,330,944 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,941 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,413 UART: [kat] SHA2-256
901,353 UART: [kat] SHA2-384
904,018 UART: [kat] SHA2-512-ACC
905,919 UART: [kat] ECC-384
915,894 UART: [kat] HMAC-384Kdf
920,374 UART: [kat] LMS
1,168,686 UART: [kat] --
1,169,449 UART: [cold-reset] ++
1,169,853 UART: [fht] FHT @ 0x50003400
1,172,469 UART: [idev] ++
1,172,637 UART: [idev] CDI.KEYID = 6
1,172,998 UART: [idev] SUBJECT.KEYID = 7
1,173,423 UART: [idev] UDS.KEYID = 0
1,181,268 UART: [idev] Erasing UDS.KEYID = 0
1,198,700 UART: [idev] Sha1 KeyId Algorithm
1,207,636 UART: [idev] --
1,208,593 UART: [ldev] ++
1,208,761 UART: [ldev] CDI.KEYID = 6
1,209,125 UART: [ldev] SUBJECT.KEYID = 5
1,209,552 UART: [ldev] AUTHORITY.KEYID = 7
1,210,015 UART: [ldev] FE.KEYID = 1
1,215,109 UART: [ldev] Erasing FE.KEYID = 1
1,241,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,605 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,593 UART: [fwproc] Recv command 0x46574c44
1,282,326 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,112 UART: ROM Fatal Error: 0x000B003C
1,330,271 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,008 >>> mbox cmd response: failed
test test_image_validation::test_toc_rt_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,079 writing to cptra_bootfsm_go
3,527 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,187 UART:
192,568 UART: Running Caliptra ROM ...
193,691 UART:
193,866 UART: [state] CFI Enabled
264,386 UART: [state] LifecycleState = Unprovisioned
266,318 UART: [state] DebugLocked = No
268,578 UART: [state] WD Timer not started. Device not locked for debugging
271,715 UART: [kat] SHA2-256
451,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,119 UART: [kat] ++
462,657 UART: [kat] sha1
474,021 UART: [kat] SHA2-256
476,757 UART: [kat] SHA2-384
482,091 UART: [kat] SHA2-512-ACC
484,493 UART: [kat] ECC-384
2,947,383 UART: [kat] HMAC-384Kdf
2,964,696 UART: [kat] LMS
3,441,214 UART: [kat] --
3,444,536 UART: [cold-reset] ++
3,446,229 UART: [fht] FHT @ 0x50003400
3,458,030 UART: [idev] ++
3,458,652 UART: [idev] CDI.KEYID = 6
3,459,548 UART: [idev] SUBJECT.KEYID = 7
3,460,771 UART: [idev] UDS.KEYID = 0
3,494,040 UART: [idev] Erasing UDS.KEYID = 0
5,979,850 UART: [idev] Sha1 KeyId Algorithm
6,004,821 UART: [idev] --
6,009,642 UART: [ldev] ++
6,010,223 UART: [ldev] CDI.KEYID = 6
6,011,145 UART: [ldev] SUBJECT.KEYID = 5
6,012,370 UART: [ldev] AUTHORITY.KEYID = 7
6,013,615 UART: [ldev] FE.KEYID = 1
6,049,787 UART: [ldev] Erasing FE.KEYID = 1
8,559,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,291,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,307,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,360,678 UART: [ldev] --
10,366,104 UART: [fwproc] Wait for Commands...
10,368,693 UART: [fwproc] Recv command 0x46574c44
10,370,740 UART: Invalid Img size: 0 bytes
10,373,558 UART: ROM Fatal Error: 0x01020002
10,376,759 >>> mbox cmd response: failed
10,379,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,528,779 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,549 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,287,883 >>> mbox cmd response: failed
10,290,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,439,999 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
4,170 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
192,395 UART:
192,805 UART: Running Caliptra ROM ...
193,887 UART:
603,612 UART: [state] CFI Enabled
617,548 UART: [state] LifecycleState = Unprovisioned
619,440 UART: [state] DebugLocked = No
621,468 UART: [state] WD Timer not started. Device not locked for debugging
624,548 UART: [kat] SHA2-256
804,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,961 UART: [kat] ++
815,462 UART: [kat] sha1
826,731 UART: [kat] SHA2-256
829,417 UART: [kat] SHA2-384
836,418 UART: [kat] SHA2-512-ACC
838,812 UART: [kat] ECC-384
3,281,412 UART: [kat] HMAC-384Kdf
3,292,513 UART: [kat] LMS
3,769,037 UART: [kat] --
3,773,430 UART: [cold-reset] ++
3,775,852 UART: [fht] FHT @ 0x50003400
3,786,342 UART: [idev] ++
3,786,904 UART: [idev] CDI.KEYID = 6
3,787,920 UART: [idev] SUBJECT.KEYID = 7
3,789,077 UART: [idev] UDS.KEYID = 0
3,805,596 UART: [idev] Erasing UDS.KEYID = 0
6,266,855 UART: [idev] Sha1 KeyId Algorithm
6,291,870 UART: [idev] --
6,296,205 UART: [ldev] ++
6,296,773 UART: [ldev] CDI.KEYID = 6
6,297,705 UART: [ldev] SUBJECT.KEYID = 5
6,298,914 UART: [ldev] AUTHORITY.KEYID = 7
6,300,203 UART: [ldev] FE.KEYID = 1
6,311,470 UART: [ldev] Erasing FE.KEYID = 1
8,790,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,941 UART: [ldev] --
10,585,972 UART: [fwproc] Wait for Commands...
10,587,750 UART: [fwproc] Recv command 0x46574c44
10,589,743 UART: Invalid Img size: 0 bytes
10,592,855 UART: ROM Fatal Error: 0x01020002
10,596,066 >>> mbox cmd response: failed
10,598,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,747,640 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
4,077 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
10,485,424 >>> mbox cmd response: failed
10,488,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,637,952 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
891,276 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,380 UART: [kat] ++
895,532 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,118 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,276 UART: [idev] ++
1,173,444 UART: [idev] CDI.KEYID = 6
1,173,805 UART: [idev] SUBJECT.KEYID = 7
1,174,230 UART: [idev] UDS.KEYID = 0
1,182,015 UART: [idev] Erasing UDS.KEYID = 0
1,199,351 UART: [idev] Sha1 KeyId Algorithm
1,208,197 UART: [idev] --
1,209,456 UART: [ldev] ++
1,209,624 UART: [ldev] CDI.KEYID = 6
1,209,988 UART: [ldev] SUBJECT.KEYID = 5
1,210,415 UART: [ldev] AUTHORITY.KEYID = 7
1,210,878 UART: [ldev] FE.KEYID = 1
1,216,120 UART: [ldev] Erasing FE.KEYID = 1
1,242,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,014 UART: [ldev] --
1,281,369 UART: [fwproc] Wait for Commands...
1,282,066 UART: [fwproc] Recv command 0x46574c44
1,282,795 UART: Invalid Img size: 0 bytes
1,283,491 UART: ROM Fatal Error: 0x01020002
1,284,650 >>> mbox cmd response: failed
1,284,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,656 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,059 >>> mbox cmd response: failed
1,139,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,065 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,159 UART: [state] LifecycleState = Unprovisioned
86,814 UART: [state] DebugLocked = No
87,430 UART: [state] WD Timer not started. Device not locked for debugging
88,655 UART: [kat] SHA2-256
892,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,309 UART: [kat] ++
896,461 UART: [kat] sha1
900,655 UART: [kat] SHA2-256
902,595 UART: [kat] SHA2-384
905,224 UART: [kat] SHA2-512-ACC
907,125 UART: [kat] ECC-384
916,990 UART: [kat] HMAC-384Kdf
921,444 UART: [kat] LMS
1,169,756 UART: [kat] --
1,170,511 UART: [cold-reset] ++
1,170,907 UART: [fht] FHT @ 0x50003400
1,173,615 UART: [idev] ++
1,173,783 UART: [idev] CDI.KEYID = 6
1,174,144 UART: [idev] SUBJECT.KEYID = 7
1,174,569 UART: [idev] UDS.KEYID = 0
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,646 UART: [idev] Sha1 KeyId Algorithm
1,208,470 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,965 UART: [ldev] SUBJECT.KEYID = 5
1,210,392 UART: [ldev] AUTHORITY.KEYID = 7
1,210,855 UART: [ldev] FE.KEYID = 1
1,216,085 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,667 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,875 UART: [fwproc] Recv command 0x46574c44
1,283,604 UART: Invalid Img size: 0 bytes
1,284,392 UART: ROM Fatal Error: 0x01020002
1,285,551 >>> mbox cmd response: failed
1,285,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,557 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,434 >>> mbox cmd response: failed
1,141,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,141,440 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,076 UART: [kat] SHA2-256
902,016 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,587 UART: [kat] HMAC-384Kdf
921,323 UART: [kat] LMS
1,169,635 UART: [kat] --
1,170,424 UART: [cold-reset] ++
1,170,940 UART: [fht] FHT @ 0x50003400
1,173,554 UART: [idev] ++
1,173,722 UART: [idev] CDI.KEYID = 6
1,174,083 UART: [idev] SUBJECT.KEYID = 7
1,174,508 UART: [idev] UDS.KEYID = 0
1,182,581 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,077 UART: [idev] --
1,209,190 UART: [ldev] ++
1,209,358 UART: [ldev] CDI.KEYID = 6
1,209,722 UART: [ldev] SUBJECT.KEYID = 5
1,210,149 UART: [ldev] AUTHORITY.KEYID = 7
1,210,612 UART: [ldev] FE.KEYID = 1
1,215,960 UART: [ldev] Erasing FE.KEYID = 1
1,242,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,936 UART: [ldev] --
1,282,387 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x46574c44
1,283,731 UART: Invalid Img size: 0 bytes
1,284,593 UART: ROM Fatal Error: 0x01020002
1,285,752 >>> mbox cmd response: failed
1,285,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,758 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,125 >>> mbox cmd response: failed
1,141,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,141,131 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,894 UART: [state] WD Timer not started. Device not locked for debugging
88,205 UART: [kat] SHA2-256
891,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,859 UART: [kat] ++
896,011 UART: [kat] sha1
900,347 UART: [kat] SHA2-256
902,287 UART: [kat] SHA2-384
905,050 UART: [kat] SHA2-512-ACC
906,951 UART: [kat] ECC-384
916,828 UART: [kat] HMAC-384Kdf
921,592 UART: [kat] LMS
1,169,904 UART: [kat] --
1,170,929 UART: [cold-reset] ++
1,171,411 UART: [fht] FHT @ 0x50003400
1,174,069 UART: [idev] ++
1,174,237 UART: [idev] CDI.KEYID = 6
1,174,598 UART: [idev] SUBJECT.KEYID = 7
1,175,023 UART: [idev] UDS.KEYID = 0
1,182,748 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,738 UART: [idev] --
1,209,705 UART: [ldev] ++
1,209,873 UART: [ldev] CDI.KEYID = 6
1,210,237 UART: [ldev] SUBJECT.KEYID = 5
1,210,664 UART: [ldev] AUTHORITY.KEYID = 7
1,211,127 UART: [ldev] FE.KEYID = 1
1,216,349 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,282,016 UART: [fwproc] Wait for Commands...
1,282,669 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: Invalid Img size: 0 bytes
1,284,288 UART: ROM Fatal Error: 0x01020002
1,285,447 >>> mbox cmd response: failed
1,285,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,453 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,140,370 >>> mbox cmd response: failed
1,140,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,140,376 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
890,868 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,972 UART: [kat] ++
895,124 UART: [kat] sha1
899,240 UART: [kat] SHA2-256
901,180 UART: [kat] SHA2-384
903,899 UART: [kat] SHA2-512-ACC
905,800 UART: [kat] ECC-384
915,673 UART: [kat] HMAC-384Kdf
920,173 UART: [kat] LMS
1,168,485 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,678 UART: [fht] FHT @ 0x50003400
1,172,320 UART: [idev] ++
1,172,488 UART: [idev] CDI.KEYID = 6
1,172,849 UART: [idev] SUBJECT.KEYID = 7
1,173,274 UART: [idev] UDS.KEYID = 0
1,181,425 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,460 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,638 UART: [ldev] --
1,280,981 UART: [fwproc] Wait for Commands...
1,281,680 UART: [fwproc] Recv command 0x46574c44
1,282,409 UART: Invalid Img size: 0 bytes
1,283,061 UART: ROM Fatal Error: 0x01020002
1,284,220 >>> mbox cmd response: failed
1,284,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,226 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,139,847 >>> mbox cmd response: failed
1,139,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,139,853 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
891,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,381 UART: [kat] ++
895,533 UART: [kat] sha1
899,741 UART: [kat] SHA2-256
901,681 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,502 UART: [kat] LMS
1,168,814 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,299 UART: [fht] FHT @ 0x50003400
1,172,897 UART: [idev] ++
1,173,065 UART: [idev] CDI.KEYID = 6
1,173,426 UART: [idev] SUBJECT.KEYID = 7
1,173,851 UART: [idev] UDS.KEYID = 0
1,182,146 UART: [idev] Erasing UDS.KEYID = 0
1,199,162 UART: [idev] Sha1 KeyId Algorithm
1,207,924 UART: [idev] --
1,208,875 UART: [ldev] ++
1,209,043 UART: [ldev] CDI.KEYID = 6
1,209,407 UART: [ldev] SUBJECT.KEYID = 5
1,209,834 UART: [ldev] AUTHORITY.KEYID = 7
1,210,297 UART: [ldev] FE.KEYID = 1
1,215,753 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,281,987 UART: [fwproc] Recv command 0x46574c44
1,282,716 UART: Invalid Img size: 0 bytes
1,283,728 UART: ROM Fatal Error: 0x01020002
1,284,887 >>> mbox cmd response: failed
1,284,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,893 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (0 bytes) from SoC
1,141,612 >>> mbox cmd response: failed
1,141,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,141,618 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_command_aborted_after_handle_fatal_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
191,998 UART:
192,375 UART: Running Caliptra ROM ...
193,466 UART:
193,613 UART: [state] CFI Enabled
265,269 UART: [state] LifecycleState = Unprovisioned
267,333 UART: [state] DebugLocked = No
270,149 UART: [state] WD Timer not started. Device not locked for debugging
274,211 UART: [kat] SHA2-256
453,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,633 UART: [kat] ++
465,086 UART: [kat] sha1
476,779 UART: [kat] SHA2-256
479,485 UART: [kat] SHA2-384
485,195 UART: [kat] SHA2-512-ACC
487,538 UART: [kat] ECC-384
2,951,092 UART: [kat] HMAC-384Kdf
2,972,941 UART: [kat] LMS
3,449,385 UART: [kat] --
3,455,913 UART: [cold-reset] ++
3,458,440 UART: [fht] FHT @ 0x50003400
3,470,335 UART: [idev] ++
3,470,942 UART: [idev] CDI.KEYID = 6
3,471,876 UART: [idev] SUBJECT.KEYID = 7
3,473,094 UART: [idev] UDS.KEYID = 0
3,501,335 UART: [idev] Erasing UDS.KEYID = 0
5,988,687 UART: [idev] Sha1 KeyId Algorithm
6,011,645 UART: [idev] --
6,017,539 UART: [ldev] ++
6,018,139 UART: [ldev] CDI.KEYID = 6
6,019,116 UART: [ldev] SUBJECT.KEYID = 5
6,020,229 UART: [ldev] AUTHORITY.KEYID = 7
6,021,527 UART: [ldev] FE.KEYID = 1
6,056,981 UART: [ldev] Erasing FE.KEYID = 1
8,565,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,418 UART: [ldev] --
10,371,161 UART: [fwproc] Wait for Commands...
10,373,966 UART: [fwproc] Recv command 0x4d454153
10,381,033 UART: ROM Fatal Error: 0x01020005
10,384,249 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,291,273 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
192,577 UART:
192,951 UART: Running Caliptra ROM ...
194,136 UART:
603,833 UART: [state] CFI Enabled
620,469 UART: [state] LifecycleState = Unprovisioned
622,377 UART: [state] DebugLocked = No
623,745 UART: [state] WD Timer not started. Device not locked for debugging
628,453 UART: [kat] SHA2-256
808,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,891 UART: [kat] ++
819,438 UART: [kat] sha1
829,298 UART: [kat] SHA2-256
832,033 UART: [kat] SHA2-384
837,521 UART: [kat] SHA2-512-ACC
839,912 UART: [kat] ECC-384
3,281,405 UART: [kat] HMAC-384Kdf
3,294,227 UART: [kat] LMS
3,770,737 UART: [kat] --
3,774,803 UART: [cold-reset] ++
3,776,954 UART: [fht] FHT @ 0x50003400
3,788,523 UART: [idev] ++
3,789,092 UART: [idev] CDI.KEYID = 6
3,790,113 UART: [idev] SUBJECT.KEYID = 7
3,791,270 UART: [idev] UDS.KEYID = 0
3,807,896 UART: [idev] Erasing UDS.KEYID = 0
6,265,428 UART: [idev] Sha1 KeyId Algorithm
6,289,917 UART: [idev] --
6,295,207 UART: [ldev] ++
6,295,776 UART: [ldev] CDI.KEYID = 6
6,296,660 UART: [ldev] SUBJECT.KEYID = 5
6,297,871 UART: [ldev] AUTHORITY.KEYID = 7
6,299,157 UART: [ldev] FE.KEYID = 1
6,312,556 UART: [ldev] Erasing FE.KEYID = 1
8,787,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,369 UART: [ldev] --
10,583,604 UART: [fwproc] Wait for Commands...
10,586,567 UART: [fwproc] Recv command 0x4d454153
10,593,251 UART: ROM Fatal Error: 0x01020005
10,596,469 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,554 writing to cptra_bootfsm_go
4,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,496,748 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
915,893 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,170,138 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,181,733 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,687 UART: [idev] --
1,208,602 UART: [ldev] ++
1,208,770 UART: [ldev] CDI.KEYID = 6
1,209,134 UART: [ldev] SUBJECT.KEYID = 5
1,209,561 UART: [ldev] AUTHORITY.KEYID = 7
1,210,024 UART: [ldev] FE.KEYID = 1
1,215,334 UART: [ldev] Erasing FE.KEYID = 1
1,240,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,702 UART: [ldev] --
1,280,035 UART: [fwproc] Wait for Commands...
1,280,722 UART: [fwproc] Recv command 0x4d454153
1,282,778 UART: ROM Fatal Error: 0x01020005
1,283,937 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,203 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,846 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,145 UART: [kat] SHA2-256
902,085 UART: [kat] SHA2-384
904,982 UART: [kat] SHA2-512-ACC
906,883 UART: [kat] ECC-384
916,602 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,253 UART: [cold-reset] ++
1,170,739 UART: [fht] FHT @ 0x50003400
1,173,463 UART: [idev] ++
1,173,631 UART: [idev] CDI.KEYID = 6
1,173,992 UART: [idev] SUBJECT.KEYID = 7
1,174,417 UART: [idev] UDS.KEYID = 0
1,182,514 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,025 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,183 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x4d454153
1,284,243 UART: ROM Fatal Error: 0x01020005
1,285,402 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,340 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
85,979 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
890,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,822 UART: [kat] ++
894,974 UART: [kat] sha1
899,238 UART: [kat] SHA2-256
901,178 UART: [kat] SHA2-384
903,851 UART: [kat] SHA2-512-ACC
905,752 UART: [kat] ECC-384
915,141 UART: [kat] HMAC-384Kdf
919,815 UART: [kat] LMS
1,168,127 UART: [kat] --
1,169,016 UART: [cold-reset] ++
1,169,360 UART: [fht] FHT @ 0x50003400
1,171,832 UART: [idev] ++
1,172,000 UART: [idev] CDI.KEYID = 6
1,172,361 UART: [idev] SUBJECT.KEYID = 7
1,172,786 UART: [idev] UDS.KEYID = 0
1,180,845 UART: [idev] Erasing UDS.KEYID = 0
1,197,613 UART: [idev] Sha1 KeyId Algorithm
1,206,451 UART: [idev] --
1,207,526 UART: [ldev] ++
1,207,694 UART: [ldev] CDI.KEYID = 6
1,208,058 UART: [ldev] SUBJECT.KEYID = 5
1,208,485 UART: [ldev] AUTHORITY.KEYID = 7
1,208,948 UART: [ldev] FE.KEYID = 1
1,214,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,236 UART: [ldev] --
1,279,525 UART: [fwproc] Wait for Commands...
1,280,292 UART: [fwproc] Recv command 0x4d454153
1,282,360 UART: ROM Fatal Error: 0x01020005
1,283,519 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,975 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
915,948 UART: [kat] HMAC-384Kdf
920,522 UART: [kat] LMS
1,168,834 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,087 UART: [fht] FHT @ 0x50003400
1,172,737 UART: [idev] ++
1,172,905 UART: [idev] CDI.KEYID = 6
1,173,266 UART: [idev] SUBJECT.KEYID = 7
1,173,691 UART: [idev] UDS.KEYID = 0
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,198,348 UART: [idev] Sha1 KeyId Algorithm
1,207,224 UART: [idev] --
1,208,205 UART: [ldev] ++
1,208,373 UART: [ldev] CDI.KEYID = 6
1,208,737 UART: [ldev] SUBJECT.KEYID = 5
1,209,164 UART: [ldev] AUTHORITY.KEYID = 7
1,209,627 UART: [ldev] FE.KEYID = 1
1,214,837 UART: [ldev] Erasing FE.KEYID = 1
1,241,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,713 UART: [ldev] --
1,281,054 UART: [fwproc] Wait for Commands...
1,281,733 UART: [fwproc] Recv command 0x4d454153
1,283,939 UART: ROM Fatal Error: 0x01020005
1,285,098 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,410 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,840 UART: [kat] SHA2-256
891,390 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,494 UART: [kat] ++
895,646 UART: [kat] sha1
899,954 UART: [kat] SHA2-256
901,894 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,774 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,182,161 UART: [idev] Erasing UDS.KEYID = 0
1,199,439 UART: [idev] Sha1 KeyId Algorithm
1,208,441 UART: [idev] --
1,209,542 UART: [ldev] ++
1,209,710 UART: [ldev] CDI.KEYID = 6
1,210,074 UART: [ldev] SUBJECT.KEYID = 5
1,210,501 UART: [ldev] AUTHORITY.KEYID = 7
1,210,964 UART: [ldev] FE.KEYID = 1
1,215,956 UART: [ldev] Erasing FE.KEYID = 1
1,242,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,336 UART: [ldev] --
1,281,745 UART: [fwproc] Wait for Commands...
1,282,524 UART: [fwproc] Recv command 0x4d454153
1,284,518 UART: ROM Fatal Error: 0x01020005
1,285,677 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,239 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,683 UART: [state] LifecycleState = Unprovisioned
86,338 UART: [state] DebugLocked = No
86,982 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
891,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,989 UART: [kat] ++
896,141 UART: [kat] sha1
900,431 UART: [kat] SHA2-256
902,371 UART: [kat] SHA2-384
905,220 UART: [kat] SHA2-512-ACC
907,121 UART: [kat] ECC-384
916,942 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,549 UART: [cold-reset] ++
1,170,889 UART: [fht] FHT @ 0x50003400
1,173,697 UART: [idev] ++
1,173,865 UART: [idev] CDI.KEYID = 6
1,174,226 UART: [idev] SUBJECT.KEYID = 7
1,174,651 UART: [idev] UDS.KEYID = 0
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,584 UART: [idev] Sha1 KeyId Algorithm
1,208,510 UART: [idev] --
1,209,567 UART: [ldev] ++
1,209,735 UART: [ldev] CDI.KEYID = 6
1,210,099 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,201 UART: [ldev] Erasing FE.KEYID = 1
1,242,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,313 UART: [ldev] --
1,281,620 UART: [fwproc] Wait for Commands...
1,282,389 UART: [fwproc] Recv command 0x4d454153
1,284,493 UART: ROM Fatal Error: 0x01020005
1,285,652 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,136 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_checksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,555 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,149 UART:
192,589 UART: Running Caliptra ROM ...
193,689 UART:
193,837 UART: [state] CFI Enabled
267,843 UART: [state] LifecycleState = Unprovisioned
269,790 UART: [state] DebugLocked = No
271,933 UART: [state] WD Timer not started. Device not locked for debugging
275,458 UART: [kat] SHA2-256
455,147 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,910 UART: [kat] ++
466,378 UART: [kat] sha1
476,614 UART: [kat] SHA2-256
479,299 UART: [kat] SHA2-384
484,686 UART: [kat] SHA2-512-ACC
487,084 UART: [kat] ECC-384
2,947,981 UART: [kat] HMAC-384Kdf
2,971,182 UART: [kat] LMS
3,447,707 UART: [kat] --
3,451,863 UART: [cold-reset] ++
3,453,532 UART: [fht] FHT @ 0x50003400
3,465,224 UART: [idev] ++
3,465,987 UART: [idev] CDI.KEYID = 6
3,466,923 UART: [idev] SUBJECT.KEYID = 7
3,468,040 UART: [idev] UDS.KEYID = 0
3,501,034 UART: [idev] Erasing UDS.KEYID = 0
5,985,105 UART: [idev] Sha1 KeyId Algorithm
6,008,716 UART: [idev] --
6,014,097 UART: [ldev] ++
6,014,688 UART: [ldev] CDI.KEYID = 6
6,015,835 UART: [ldev] SUBJECT.KEYID = 5
6,016,981 UART: [ldev] AUTHORITY.KEYID = 7
6,018,188 UART: [ldev] FE.KEYID = 1
6,056,699 UART: [ldev] Erasing FE.KEYID = 1
8,563,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,504 UART: [ldev] --
10,372,189 UART: [fwproc] Wait for Commands...
10,375,425 UART: [fwproc] Recv command 0x43415053
10,379,367 UART: ROM Fatal Error: 0x01020006
10,382,586 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,644 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,268,098 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,240 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
192,496 UART:
192,872 UART: Running Caliptra ROM ...
194,056 UART:
603,579 UART: [state] CFI Enabled
616,371 UART: [state] LifecycleState = Unprovisioned
618,284 UART: [state] DebugLocked = No
620,548 UART: [state] WD Timer not started. Device not locked for debugging
623,893 UART: [kat] SHA2-256
803,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,345 UART: [kat] ++
814,788 UART: [kat] sha1
826,200 UART: [kat] SHA2-256
828,877 UART: [kat] SHA2-384
834,253 UART: [kat] SHA2-512-ACC
836,650 UART: [kat] ECC-384
3,278,869 UART: [kat] HMAC-384Kdf
3,292,058 UART: [kat] LMS
3,768,596 UART: [kat] --
3,773,417 UART: [cold-reset] ++
3,774,766 UART: [fht] FHT @ 0x50003400
3,785,977 UART: [idev] ++
3,786,542 UART: [idev] CDI.KEYID = 6
3,787,476 UART: [idev] SUBJECT.KEYID = 7
3,788,748 UART: [idev] UDS.KEYID = 0
3,805,727 UART: [idev] Erasing UDS.KEYID = 0
6,268,329 UART: [idev] Sha1 KeyId Algorithm
6,291,780 UART: [idev] --
6,297,929 UART: [ldev] ++
6,298,495 UART: [ldev] CDI.KEYID = 6
6,299,509 UART: [ldev] SUBJECT.KEYID = 5
6,300,611 UART: [ldev] AUTHORITY.KEYID = 7
6,301,890 UART: [ldev] FE.KEYID = 1
6,313,183 UART: [ldev] Erasing FE.KEYID = 1
8,788,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,312 UART: [ldev] --
10,584,201 UART: [fwproc] Wait for Commands...
10,586,859 UART: [fwproc] Recv command 0x43415053
10,591,014 UART: ROM Fatal Error: 0x01020006
10,594,216 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
4,116 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
10,501,987 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,706 UART: [kat] SHA2-256
891,256 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,360 UART: [kat] ++
895,512 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,579 UART: [kat] SHA2-512-ACC
906,480 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,034 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,029 UART: [idev] Sha1 KeyId Algorithm
1,206,833 UART: [idev] --
1,207,906 UART: [ldev] ++
1,208,074 UART: [ldev] CDI.KEYID = 6
1,208,438 UART: [ldev] SUBJECT.KEYID = 5
1,208,865 UART: [ldev] AUTHORITY.KEYID = 7
1,209,328 UART: [ldev] FE.KEYID = 1
1,214,444 UART: [ldev] Erasing FE.KEYID = 1
1,240,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,708 UART: [ldev] --
1,280,129 UART: [fwproc] Wait for Commands...
1,280,942 UART: [fwproc] Recv command 0x43415053
1,282,112 UART: ROM Fatal Error: 0x01020006
1,283,271 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,007 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,176 UART: [state] WD Timer not started. Device not locked for debugging
88,387 UART: [kat] SHA2-256
891,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,041 UART: [kat] ++
896,193 UART: [kat] sha1
900,237 UART: [kat] SHA2-256
902,177 UART: [kat] SHA2-384
904,988 UART: [kat] SHA2-512-ACC
906,889 UART: [kat] ECC-384
916,298 UART: [kat] HMAC-384Kdf
921,110 UART: [kat] LMS
1,169,422 UART: [kat] --
1,170,281 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,182,296 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,208,032 UART: [idev] --
1,209,065 UART: [ldev] ++
1,209,233 UART: [ldev] CDI.KEYID = 6
1,209,597 UART: [ldev] SUBJECT.KEYID = 5
1,210,024 UART: [ldev] AUTHORITY.KEYID = 7
1,210,487 UART: [ldev] FE.KEYID = 1
1,215,749 UART: [ldev] Erasing FE.KEYID = 1
1,242,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,422 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,833 UART: [ldev] --
1,281,274 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x43415053
1,283,381 UART: ROM Fatal Error: 0x01020006
1,284,540 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,218 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,544 UART: [state] LifecycleState = Unprovisioned
86,199 UART: [state] DebugLocked = No
86,923 UART: [state] WD Timer not started. Device not locked for debugging
88,282 UART: [kat] SHA2-256
891,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,936 UART: [kat] ++
896,088 UART: [kat] sha1
900,366 UART: [kat] SHA2-256
902,306 UART: [kat] SHA2-384
905,137 UART: [kat] SHA2-512-ACC
907,038 UART: [kat] ECC-384
916,649 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,578 UART: [cold-reset] ++
1,171,056 UART: [fht] FHT @ 0x50003400
1,173,552 UART: [idev] ++
1,173,720 UART: [idev] CDI.KEYID = 6
1,174,081 UART: [idev] SUBJECT.KEYID = 7
1,174,506 UART: [idev] UDS.KEYID = 0
1,182,117 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,706 UART: [ldev] ++
1,208,874 UART: [ldev] CDI.KEYID = 6
1,209,238 UART: [ldev] SUBJECT.KEYID = 5
1,209,665 UART: [ldev] AUTHORITY.KEYID = 7
1,210,128 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,462 UART: [ldev] --
1,280,823 UART: [fwproc] Wait for Commands...
1,281,474 UART: [fwproc] Recv command 0x43415053
1,282,696 UART: ROM Fatal Error: 0x01020006
1,283,855 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,139,455 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,798 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
916,066 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,865 UART: [cold-reset] ++
1,170,251 UART: [fht] FHT @ 0x50003400
1,172,911 UART: [idev] ++
1,173,079 UART: [idev] CDI.KEYID = 6
1,173,440 UART: [idev] SUBJECT.KEYID = 7
1,173,865 UART: [idev] UDS.KEYID = 0
1,181,870 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,992 UART: [idev] --
1,209,001 UART: [ldev] ++
1,209,169 UART: [ldev] CDI.KEYID = 6
1,209,533 UART: [ldev] SUBJECT.KEYID = 5
1,209,960 UART: [ldev] AUTHORITY.KEYID = 7
1,210,423 UART: [ldev] FE.KEYID = 1
1,215,937 UART: [ldev] Erasing FE.KEYID = 1
1,242,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,345 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,419 UART: [fwproc] Recv command 0x43415053
1,283,521 UART: ROM Fatal Error: 0x01020006
1,284,680 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,138,920 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,534 UART: [kat] SHA2-256
901,474 UART: [kat] SHA2-384
904,091 UART: [kat] SHA2-512-ACC
905,992 UART: [kat] ECC-384
915,563 UART: [kat] HMAC-384Kdf
919,955 UART: [kat] LMS
1,168,267 UART: [kat] --
1,168,938 UART: [cold-reset] ++
1,169,342 UART: [fht] FHT @ 0x50003400
1,172,078 UART: [idev] ++
1,172,246 UART: [idev] CDI.KEYID = 6
1,172,607 UART: [idev] SUBJECT.KEYID = 7
1,173,032 UART: [idev] UDS.KEYID = 0
1,180,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,381 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,478 UART: [ldev] ++
1,208,646 UART: [ldev] CDI.KEYID = 6
1,209,010 UART: [ldev] SUBJECT.KEYID = 5
1,209,437 UART: [ldev] AUTHORITY.KEYID = 7
1,209,900 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,694 UART: [ldev] --
1,280,959 UART: [fwproc] Wait for Commands...
1,281,770 UART: [fwproc] Recv command 0x43415053
1,282,902 UART: ROM Fatal Error: 0x01020006
1,284,061 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,140,199 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,507 UART: [kat] SHA2-256
891,057 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,161 UART: [kat] ++
895,313 UART: [kat] sha1
899,417 UART: [kat] SHA2-256
901,357 UART: [kat] SHA2-384
904,074 UART: [kat] SHA2-512-ACC
905,975 UART: [kat] ECC-384
915,660 UART: [kat] HMAC-384Kdf
920,322 UART: [kat] LMS
1,168,634 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,169,999 UART: [fht] FHT @ 0x50003400
1,172,497 UART: [idev] ++
1,172,665 UART: [idev] CDI.KEYID = 6
1,173,026 UART: [idev] SUBJECT.KEYID = 7
1,173,451 UART: [idev] UDS.KEYID = 0
1,181,356 UART: [idev] Erasing UDS.KEYID = 0
1,198,612 UART: [idev] Sha1 KeyId Algorithm
1,207,476 UART: [idev] --
1,208,523 UART: [ldev] ++
1,208,691 UART: [ldev] CDI.KEYID = 6
1,209,055 UART: [ldev] SUBJECT.KEYID = 5
1,209,482 UART: [ldev] AUTHORITY.KEYID = 7
1,209,945 UART: [ldev] FE.KEYID = 1
1,215,539 UART: [ldev] Erasing FE.KEYID = 1
1,242,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,953 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,282,129 UART: [fwproc] Recv command 0x43415053
1,283,157 UART: ROM Fatal Error: 0x01020006
1,284,316 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (108 bytes) from SoC
1,141,316 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_large ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,420 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,071 UART:
192,456 UART: Running Caliptra ROM ...
193,645 UART:
193,819 UART: [state] CFI Enabled
260,414 UART: [state] LifecycleState = Unprovisioned
262,417 UART: [state] DebugLocked = No
264,510 UART: [state] WD Timer not started. Device not locked for debugging
267,818 UART: [kat] SHA2-256
447,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,226 UART: [kat] ++
458,679 UART: [kat] sha1
468,643 UART: [kat] SHA2-256
471,331 UART: [kat] SHA2-384
477,414 UART: [kat] SHA2-512-ACC
479,810 UART: [kat] ECC-384
2,926,284 UART: [kat] HMAC-384Kdf
2,949,118 UART: [kat] LMS
3,425,616 UART: [kat] --
3,430,472 UART: [cold-reset] ++
3,432,478 UART: [fht] FHT @ 0x50003400
3,443,628 UART: [idev] ++
3,444,206 UART: [idev] CDI.KEYID = 6
3,445,137 UART: [idev] SUBJECT.KEYID = 7
3,446,357 UART: [idev] UDS.KEYID = 0
3,479,080 UART: [idev] Erasing UDS.KEYID = 0
5,964,968 UART: [idev] Sha1 KeyId Algorithm
5,989,182 UART: [idev] --
5,995,129 UART: [ldev] ++
5,995,703 UART: [ldev] CDI.KEYID = 6
5,996,619 UART: [ldev] SUBJECT.KEYID = 5
5,997,840 UART: [ldev] AUTHORITY.KEYID = 7
5,999,079 UART: [ldev] FE.KEYID = 1
6,036,365 UART: [ldev] Erasing FE.KEYID = 1
8,538,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,575 UART: [ldev] --
10,353,251 UART: [fwproc] Wait for Commands...
10,355,783 UART: [fwproc] Recv command 0x4d454153
10,361,569 UART: ROM Fatal Error: 0x01020006
10,364,816 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,487 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,270,973 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
4,223 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
192,451 UART:
192,822 UART: Running Caliptra ROM ...
193,943 UART:
603,469 UART: [state] CFI Enabled
615,701 UART: [state] LifecycleState = Unprovisioned
617,646 UART: [state] DebugLocked = No
619,159 UART: [state] WD Timer not started. Device not locked for debugging
622,460 UART: [kat] SHA2-256
802,107 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,927 UART: [kat] ++
813,461 UART: [kat] sha1
824,559 UART: [kat] SHA2-256
827,297 UART: [kat] SHA2-384
832,840 UART: [kat] SHA2-512-ACC
835,232 UART: [kat] ECC-384
3,275,788 UART: [kat] HMAC-384Kdf
3,287,562 UART: [kat] LMS
3,764,058 UART: [kat] --
3,767,622 UART: [cold-reset] ++
3,768,854 UART: [fht] FHT @ 0x50003400
3,779,192 UART: [idev] ++
3,779,812 UART: [idev] CDI.KEYID = 6
3,780,771 UART: [idev] SUBJECT.KEYID = 7
3,781,986 UART: [idev] UDS.KEYID = 0
3,797,882 UART: [idev] Erasing UDS.KEYID = 0
6,259,375 UART: [idev] Sha1 KeyId Algorithm
6,282,880 UART: [idev] --
6,287,905 UART: [ldev] ++
6,288,475 UART: [ldev] CDI.KEYID = 6
6,289,440 UART: [ldev] SUBJECT.KEYID = 5
6,290,596 UART: [ldev] AUTHORITY.KEYID = 7
6,291,880 UART: [ldev] FE.KEYID = 1
6,302,161 UART: [ldev] Erasing FE.KEYID = 1
8,778,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,497,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,513,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,529,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,545,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,566,970 UART: [ldev] --
10,573,047 UART: [fwproc] Wait for Commands...
10,576,121 UART: [fwproc] Recv command 0x4d454153
10,581,622 UART: ROM Fatal Error: 0x01020006
10,584,818 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,336 writing to cptra_bootfsm_go
4,379 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
10,489,582 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,798 UART: [kat] SHA2-256
891,348 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,452 UART: [kat] ++
895,604 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
915,877 UART: [kat] HMAC-384Kdf
920,621 UART: [kat] LMS
1,168,933 UART: [kat] --
1,169,468 UART: [cold-reset] ++
1,169,894 UART: [fht] FHT @ 0x50003400
1,172,580 UART: [idev] ++
1,172,748 UART: [idev] CDI.KEYID = 6
1,173,109 UART: [idev] SUBJECT.KEYID = 7
1,173,534 UART: [idev] UDS.KEYID = 0
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,895 UART: [idev] Sha1 KeyId Algorithm
1,207,711 UART: [idev] --
1,208,626 UART: [ldev] ++
1,208,794 UART: [ldev] CDI.KEYID = 6
1,209,158 UART: [ldev] SUBJECT.KEYID = 5
1,209,585 UART: [ldev] AUTHORITY.KEYID = 7
1,210,048 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,747 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,750 UART: [ldev] --
1,281,175 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x4d454153
1,283,343 UART: ROM Fatal Error: 0x01020006
1,284,502 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,139,554 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,877 UART: [state] LifecycleState = Unprovisioned
86,532 UART: [state] DebugLocked = No
87,074 UART: [state] WD Timer not started. Device not locked for debugging
88,261 UART: [kat] SHA2-256
891,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,915 UART: [kat] ++
896,067 UART: [kat] sha1
900,125 UART: [kat] SHA2-256
902,065 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,592 UART: [kat] HMAC-384Kdf
921,262 UART: [kat] LMS
1,169,574 UART: [kat] --
1,170,403 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,182,530 UART: [idev] Erasing UDS.KEYID = 0
1,199,356 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,937 UART: [ldev] SUBJECT.KEYID = 5
1,210,364 UART: [ldev] AUTHORITY.KEYID = 7
1,210,827 UART: [ldev] FE.KEYID = 1
1,216,125 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,147 UART: [ldev] --
1,281,506 UART: [fwproc] Wait for Commands...
1,282,111 UART: [fwproc] Recv command 0x4d454153
1,283,350 UART: ROM Fatal Error: 0x01020006
1,284,509 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,823 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,440 UART: [kat] SHA2-256
901,380 UART: [kat] SHA2-384
904,135 UART: [kat] SHA2-512-ACC
906,036 UART: [kat] ECC-384
915,543 UART: [kat] HMAC-384Kdf
920,327 UART: [kat] LMS
1,168,639 UART: [kat] --
1,169,458 UART: [cold-reset] ++
1,169,932 UART: [fht] FHT @ 0x50003400
1,172,576 UART: [idev] ++
1,172,744 UART: [idev] CDI.KEYID = 6
1,173,105 UART: [idev] SUBJECT.KEYID = 7
1,173,530 UART: [idev] UDS.KEYID = 0
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,198,661 UART: [idev] Sha1 KeyId Algorithm
1,207,627 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,114 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,188 UART: [ldev] --
1,280,497 UART: [fwproc] Wait for Commands...
1,281,166 UART: [fwproc] Recv command 0x4d454153
1,282,519 UART: ROM Fatal Error: 0x01020006
1,283,678 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,654 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,697 UART: [kat] SHA2-256
891,247 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,351 UART: [kat] ++
895,503 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
915,962 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,801 UART: [cold-reset] ++
1,170,135 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,181,978 UART: [idev] Erasing UDS.KEYID = 0
1,199,382 UART: [idev] Sha1 KeyId Algorithm
1,208,198 UART: [idev] --
1,209,139 UART: [ldev] ++
1,209,307 UART: [ldev] CDI.KEYID = 6
1,209,671 UART: [ldev] SUBJECT.KEYID = 5
1,210,098 UART: [ldev] AUTHORITY.KEYID = 7
1,210,561 UART: [ldev] FE.KEYID = 1
1,216,107 UART: [ldev] Erasing FE.KEYID = 1
1,242,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,993 UART: [ldev] --
1,282,196 UART: [fwproc] Wait for Commands...
1,282,779 UART: [fwproc] Recv command 0x4d454153
1,283,864 UART: ROM Fatal Error: 0x01020006
1,285,023 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,141,609 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
891,676 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,780 UART: [kat] ++
895,932 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,751 UART: [kat] SHA2-512-ACC
906,652 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
921,049 UART: [kat] LMS
1,169,361 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,478 UART: [idev] ++
1,173,646 UART: [idev] CDI.KEYID = 6
1,174,007 UART: [idev] SUBJECT.KEYID = 7
1,174,432 UART: [idev] UDS.KEYID = 0
1,182,691 UART: [idev] Erasing UDS.KEYID = 0
1,199,787 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,696 UART: [ldev] ++
1,209,864 UART: [ldev] CDI.KEYID = 6
1,210,228 UART: [ldev] SUBJECT.KEYID = 5
1,210,655 UART: [ldev] AUTHORITY.KEYID = 7
1,211,118 UART: [ldev] FE.KEYID = 1
1,216,514 UART: [ldev] Erasing FE.KEYID = 1
1,242,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,234 UART: [ldev] --
1,281,599 UART: [fwproc] Wait for Commands...
1,282,420 UART: [fwproc] Recv command 0x4d454153
1,283,875 UART: ROM Fatal Error: 0x01020006
1,285,034 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,828 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,346 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,697 UART: [kat] SHA2-256
901,637 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,610 UART: [kat] HMAC-384Kdf
921,288 UART: [kat] LMS
1,169,600 UART: [kat] --
1,170,727 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,769 UART: [idev] ++
1,173,937 UART: [idev] CDI.KEYID = 6
1,174,298 UART: [idev] SUBJECT.KEYID = 7
1,174,723 UART: [idev] UDS.KEYID = 0
1,183,034 UART: [idev] Erasing UDS.KEYID = 0
1,200,512 UART: [idev] Sha1 KeyId Algorithm
1,209,396 UART: [idev] --
1,210,557 UART: [ldev] ++
1,210,725 UART: [ldev] CDI.KEYID = 6
1,211,089 UART: [ldev] SUBJECT.KEYID = 5
1,211,516 UART: [ldev] AUTHORITY.KEYID = 7
1,211,979 UART: [ldev] FE.KEYID = 1
1,217,183 UART: [ldev] Erasing FE.KEYID = 1
1,243,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,621 UART: [ldev] --
1,283,060 UART: [fwproc] Wait for Commands...
1,283,753 UART: [fwproc] Recv command 0x4d454153
1,284,952 UART: ROM Fatal Error: 0x01020006
1,286,111 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (104 bytes) from SoC
1,140,587 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_small ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,464 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,094 UART:
192,479 UART: Running Caliptra ROM ...
193,663 UART:
193,819 UART: [state] CFI Enabled
262,414 UART: [state] LifecycleState = Unprovisioned
264,359 UART: [state] DebugLocked = No
265,796 UART: [state] WD Timer not started. Device not locked for debugging
270,027 UART: [kat] SHA2-256
449,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,487 UART: [kat] ++
460,963 UART: [kat] sha1
471,415 UART: [kat] SHA2-256
474,103 UART: [kat] SHA2-384
479,700 UART: [kat] SHA2-512-ACC
482,094 UART: [kat] ECC-384
2,948,180 UART: [kat] HMAC-384Kdf
2,972,952 UART: [kat] LMS
3,449,441 UART: [kat] --
3,453,756 UART: [cold-reset] ++
3,456,015 UART: [fht] FHT @ 0x50003400
3,467,324 UART: [idev] ++
3,467,892 UART: [idev] CDI.KEYID = 6
3,468,913 UART: [idev] SUBJECT.KEYID = 7
3,470,074 UART: [idev] UDS.KEYID = 0
3,502,634 UART: [idev] Erasing UDS.KEYID = 0
5,988,886 UART: [idev] Sha1 KeyId Algorithm
6,012,232 UART: [idev] --
6,015,913 UART: [ldev] ++
6,016,489 UART: [ldev] CDI.KEYID = 6
6,017,412 UART: [ldev] SUBJECT.KEYID = 5
6,018,639 UART: [ldev] AUTHORITY.KEYID = 7
6,019,880 UART: [ldev] FE.KEYID = 1
6,058,642 UART: [ldev] Erasing FE.KEYID = 1
8,565,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,150 UART: [ldev] --
10,375,892 UART: [fwproc] Wait for Commands...
10,377,415 UART: [fwproc] Recv command 0x43415053
10,381,266 UART: ROM Fatal Error: 0x01020006
10,384,471 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
4,312 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,271,972 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
4,069 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
192,310 UART:
192,684 UART: Running Caliptra ROM ...
193,871 UART:
603,372 UART: [state] CFI Enabled
617,587 UART: [state] LifecycleState = Unprovisioned
619,502 UART: [state] DebugLocked = No
620,688 UART: [state] WD Timer not started. Device not locked for debugging
623,971 UART: [kat] SHA2-256
803,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,408 UART: [kat] ++
814,870 UART: [kat] sha1
825,254 UART: [kat] SHA2-256
827,933 UART: [kat] SHA2-384
833,531 UART: [kat] SHA2-512-ACC
835,918 UART: [kat] ECC-384
3,278,917 UART: [kat] HMAC-384Kdf
3,290,280 UART: [kat] LMS
3,766,829 UART: [kat] --
3,771,404 UART: [cold-reset] ++
3,773,854 UART: [fht] FHT @ 0x50003400
3,785,972 UART: [idev] ++
3,786,559 UART: [idev] CDI.KEYID = 6
3,787,471 UART: [idev] SUBJECT.KEYID = 7
3,788,741 UART: [idev] UDS.KEYID = 0
3,806,820 UART: [idev] Erasing UDS.KEYID = 0
6,269,397 UART: [idev] Sha1 KeyId Algorithm
6,293,110 UART: [idev] --
6,298,618 UART: [ldev] ++
6,299,243 UART: [ldev] CDI.KEYID = 6
6,300,157 UART: [ldev] SUBJECT.KEYID = 5
6,301,370 UART: [ldev] AUTHORITY.KEYID = 7
6,302,601 UART: [ldev] FE.KEYID = 1
6,313,953 UART: [ldev] Erasing FE.KEYID = 1
8,790,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,769 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,083 UART: [ldev] --
10,584,931 UART: [fwproc] Wait for Commands...
10,587,193 UART: [fwproc] Recv command 0x43415053
10,591,663 UART: ROM Fatal Error: 0x01020006
10,594,863 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
4,387 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
10,496,973 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,326 UART: [state] LifecycleState = Unprovisioned
85,981 UART: [state] DebugLocked = No
86,675 UART: [state] WD Timer not started. Device not locked for debugging
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,263 UART: [kat] LMS
1,168,575 UART: [kat] --
1,169,326 UART: [cold-reset] ++
1,169,726 UART: [fht] FHT @ 0x50003400
1,172,436 UART: [idev] ++
1,172,604 UART: [idev] CDI.KEYID = 6
1,172,965 UART: [idev] SUBJECT.KEYID = 7
1,173,390 UART: [idev] UDS.KEYID = 0
1,181,537 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,810 UART: [ldev] --
1,280,071 UART: [fwproc] Wait for Commands...
1,280,798 UART: [fwproc] Recv command 0x43415053
1,281,996 UART: ROM Fatal Error: 0x01020006
1,283,155 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,139,473 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,223 UART: [kat] SHA2-256
902,163 UART: [kat] SHA2-384
905,032 UART: [kat] SHA2-512-ACC
906,933 UART: [kat] ECC-384
917,080 UART: [kat] HMAC-384Kdf
921,690 UART: [kat] LMS
1,170,002 UART: [kat] --
1,171,017 UART: [cold-reset] ++
1,171,425 UART: [fht] FHT @ 0x50003400
1,174,083 UART: [idev] ++
1,174,251 UART: [idev] CDI.KEYID = 6
1,174,612 UART: [idev] SUBJECT.KEYID = 7
1,175,037 UART: [idev] UDS.KEYID = 0
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,744 UART: [idev] Sha1 KeyId Algorithm
1,208,554 UART: [idev] --
1,209,547 UART: [ldev] ++
1,209,715 UART: [ldev] CDI.KEYID = 6
1,210,079 UART: [ldev] SUBJECT.KEYID = 5
1,210,506 UART: [ldev] AUTHORITY.KEYID = 7
1,210,969 UART: [ldev] FE.KEYID = 1
1,216,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,565 UART: [fwproc] Recv command 0x43415053
1,283,839 UART: ROM Fatal Error: 0x01020006
1,284,998 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,141,862 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,798 UART: [kat] ++
894,950 UART: [kat] sha1
899,150 UART: [kat] SHA2-256
901,090 UART: [kat] SHA2-384
904,045 UART: [kat] SHA2-512-ACC
905,946 UART: [kat] ECC-384
915,377 UART: [kat] HMAC-384Kdf
919,753 UART: [kat] LMS
1,168,065 UART: [kat] --
1,169,174 UART: [cold-reset] ++
1,169,510 UART: [fht] FHT @ 0x50003400
1,172,154 UART: [idev] ++
1,172,322 UART: [idev] CDI.KEYID = 6
1,172,683 UART: [idev] SUBJECT.KEYID = 7
1,173,108 UART: [idev] UDS.KEYID = 0
1,180,977 UART: [idev] Erasing UDS.KEYID = 0
1,198,147 UART: [idev] Sha1 KeyId Algorithm
1,207,111 UART: [idev] --
1,208,102 UART: [ldev] ++
1,208,270 UART: [ldev] CDI.KEYID = 6
1,208,634 UART: [ldev] SUBJECT.KEYID = 5
1,209,061 UART: [ldev] AUTHORITY.KEYID = 7
1,209,524 UART: [ldev] FE.KEYID = 1
1,214,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,884 UART: [ldev] --
1,280,145 UART: [fwproc] Wait for Commands...
1,280,800 UART: [fwproc] Recv command 0x43415053
1,281,982 UART: ROM Fatal Error: 0x01020006
1,283,141 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,139,683 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
900,101 UART: [kat] SHA2-256
902,041 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,456 UART: [kat] LMS
1,169,768 UART: [kat] --
1,170,705 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,923 UART: [idev] ++
1,174,091 UART: [idev] CDI.KEYID = 6
1,174,452 UART: [idev] SUBJECT.KEYID = 7
1,174,877 UART: [idev] UDS.KEYID = 0
1,183,132 UART: [idev] Erasing UDS.KEYID = 0
1,200,998 UART: [idev] Sha1 KeyId Algorithm
1,209,822 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,291 UART: [ldev] SUBJECT.KEYID = 5
1,211,718 UART: [ldev] AUTHORITY.KEYID = 7
1,212,181 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,591 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,773 UART: [ldev] --
1,282,122 UART: [fwproc] Wait for Commands...
1,282,803 UART: [fwproc] Recv command 0x43415053
1,283,865 UART: ROM Fatal Error: 0x01020006
1,285,024 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,141,566 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
890,998 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,102 UART: [kat] ++
895,254 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
903,987 UART: [kat] SHA2-512-ACC
905,888 UART: [kat] ECC-384
915,683 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,169,638 UART: [cold-reset] ++
1,170,072 UART: [fht] FHT @ 0x50003400
1,172,718 UART: [idev] ++
1,172,886 UART: [idev] CDI.KEYID = 6
1,173,247 UART: [idev] SUBJECT.KEYID = 7
1,173,672 UART: [idev] UDS.KEYID = 0
1,181,361 UART: [idev] Erasing UDS.KEYID = 0
1,198,525 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,356 UART: [ldev] ++
1,208,524 UART: [ldev] CDI.KEYID = 6
1,208,888 UART: [ldev] SUBJECT.KEYID = 5
1,209,315 UART: [ldev] AUTHORITY.KEYID = 7
1,209,778 UART: [ldev] FE.KEYID = 1
1,215,098 UART: [ldev] Erasing FE.KEYID = 1
1,241,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,592 UART: [ldev] --
1,280,797 UART: [fwproc] Wait for Commands...
1,281,474 UART: [fwproc] Recv command 0x43415053
1,282,806 UART: ROM Fatal Error: 0x01020006
1,283,965 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,413 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
891,689 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,793 UART: [kat] ++
895,945 UART: [kat] sha1
900,321 UART: [kat] SHA2-256
902,261 UART: [kat] SHA2-384
905,178 UART: [kat] SHA2-512-ACC
907,079 UART: [kat] ECC-384
916,928 UART: [kat] HMAC-384Kdf
921,574 UART: [kat] LMS
1,169,886 UART: [kat] --
1,171,015 UART: [cold-reset] ++
1,171,403 UART: [fht] FHT @ 0x50003400
1,174,035 UART: [idev] ++
1,174,203 UART: [idev] CDI.KEYID = 6
1,174,564 UART: [idev] SUBJECT.KEYID = 7
1,174,989 UART: [idev] UDS.KEYID = 0
1,183,142 UART: [idev] Erasing UDS.KEYID = 0
1,200,584 UART: [idev] Sha1 KeyId Algorithm
1,209,324 UART: [idev] --
1,210,387 UART: [ldev] ++
1,210,555 UART: [ldev] CDI.KEYID = 6
1,210,919 UART: [ldev] SUBJECT.KEYID = 5
1,211,346 UART: [ldev] AUTHORITY.KEYID = 7
1,211,809 UART: [ldev] FE.KEYID = 1
1,217,065 UART: [ldev] Erasing FE.KEYID = 1
1,243,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,602 UART: [fwproc] Wait for Commands...
1,283,415 UART: [fwproc] Recv command 0x43415053
1,284,675 UART: ROM Fatal Error: 0x01020006
1,285,834 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x43415053 (0 bytes) from SoC
1,140,382 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_invalid_req_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,598 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,206 UART:
192,578 UART: Running Caliptra ROM ...
193,755 UART:
193,917 UART: [state] CFI Enabled
264,084 UART: [state] LifecycleState = Unprovisioned
266,073 UART: [state] DebugLocked = No
268,331 UART: [state] WD Timer not started. Device not locked for debugging
271,850 UART: [kat] SHA2-256
451,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,299 UART: [kat] ++
462,955 UART: [kat] sha1
474,648 UART: [kat] SHA2-256
477,335 UART: [kat] SHA2-384
483,325 UART: [kat] SHA2-512-ACC
485,666 UART: [kat] ECC-384
2,947,157 UART: [kat] HMAC-384Kdf
2,969,756 UART: [kat] LMS
3,446,220 UART: [kat] --
3,450,967 UART: [cold-reset] ++
3,451,939 UART: [fht] FHT @ 0x50003400
3,462,491 UART: [idev] ++
3,463,057 UART: [idev] CDI.KEYID = 6
3,464,080 UART: [idev] SUBJECT.KEYID = 7
3,465,303 UART: [idev] UDS.KEYID = 0
3,499,973 UART: [idev] Erasing UDS.KEYID = 0
5,984,214 UART: [idev] Sha1 KeyId Algorithm
6,007,559 UART: [idev] --
6,013,508 UART: [ldev] ++
6,014,088 UART: [ldev] CDI.KEYID = 6
6,015,046 UART: [ldev] SUBJECT.KEYID = 5
6,016,214 UART: [ldev] AUTHORITY.KEYID = 7
6,017,510 UART: [ldev] FE.KEYID = 1
6,056,891 UART: [ldev] Erasing FE.KEYID = 1
8,566,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,005 UART: [ldev] --
10,375,302 UART: [fwproc] Wait for Commands...
10,381,405 UART: ROM Fatal Error: 0x01020009
10,384,646 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,361 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,269,062 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
4,414 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
192,576 UART:
192,962 UART: Running Caliptra ROM ...
194,133 UART:
603,953 UART: [state] CFI Enabled
616,753 UART: [state] LifecycleState = Unprovisioned
618,676 UART: [state] DebugLocked = No
620,280 UART: [state] WD Timer not started. Device not locked for debugging
624,313 UART: [kat] SHA2-256
803,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,767 UART: [kat] ++
815,242 UART: [kat] sha1
827,681 UART: [kat] SHA2-256
830,357 UART: [kat] SHA2-384
836,007 UART: [kat] SHA2-512-ACC
838,407 UART: [kat] ECC-384
3,279,056 UART: [kat] HMAC-384Kdf
3,291,735 UART: [kat] LMS
3,768,244 UART: [kat] --
3,772,395 UART: [cold-reset] ++
3,774,809 UART: [fht] FHT @ 0x50003400
3,786,066 UART: [idev] ++
3,786,688 UART: [idev] CDI.KEYID = 6
3,787,700 UART: [idev] SUBJECT.KEYID = 7
3,788,884 UART: [idev] UDS.KEYID = 0
3,804,217 UART: [idev] Erasing UDS.KEYID = 0
6,265,286 UART: [idev] Sha1 KeyId Algorithm
6,290,027 UART: [idev] --
6,294,039 UART: [ldev] ++
6,294,649 UART: [ldev] CDI.KEYID = 6
6,295,560 UART: [ldev] SUBJECT.KEYID = 5
6,296,719 UART: [ldev] AUTHORITY.KEYID = 7
6,298,006 UART: [ldev] FE.KEYID = 1
6,309,845 UART: [ldev] Erasing FE.KEYID = 1
8,785,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,153 UART: [ldev] --
10,581,392 UART: [fwproc] Wait for Commands...
10,585,540 UART: ROM Fatal Error: 0x01020009
10,588,736 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,281 <<< Executing mbox cmd 0x00000000 (0 bytes) from SoC
10,494,710 >>> mbox cmd response: failed
test test_mailbox_errors::test_mailbox_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,563 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,237 UART:
192,607 UART: Running Caliptra ROM ...
193,791 UART:
193,950 UART: [state] CFI Enabled
263,463 UART: [state] LifecycleState = Unprovisioned
265,414 UART: [state] DebugLocked = No
267,397 UART: [state] WD Timer not started. Device not locked for debugging
271,522 UART: [kat] SHA2-256
451,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,940 UART: [kat] ++
462,530 UART: [kat] sha1
472,821 UART: [kat] SHA2-256
475,563 UART: [kat] SHA2-384
482,137 UART: [kat] SHA2-512-ACC
484,486 UART: [kat] ECC-384
2,950,940 UART: [kat] HMAC-384Kdf
2,972,161 UART: [kat] LMS
3,448,662 UART: [kat] --
3,451,595 UART: [cold-reset] ++
3,453,319 UART: [fht] FHT @ 0x50003400
3,464,026 UART: [idev] ++
3,464,605 UART: [idev] CDI.KEYID = 6
3,465,580 UART: [idev] SUBJECT.KEYID = 7
3,466,796 UART: [idev] UDS.KEYID = 0
3,503,846 UART: [idev] Erasing UDS.KEYID = 0
5,987,959 UART: [idev] Sha1 KeyId Algorithm
6,011,254 UART: [idev] --
6,016,672 UART: [ldev] ++
6,017,247 UART: [ldev] CDI.KEYID = 6
6,018,220 UART: [ldev] SUBJECT.KEYID = 5
6,019,387 UART: [ldev] AUTHORITY.KEYID = 7
6,020,629 UART: [ldev] FE.KEYID = 1
6,058,104 UART: [ldev] Erasing FE.KEYID = 1
8,566,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,192 UART: [ldev] --
10,377,557 UART: [fwproc] Wait for Commands...
10,380,688 UART: [fwproc] Recv command 0xabcd1234
10,382,739 UART: [fwproc] Invalid command received
10,386,173 UART: ROM Fatal Error: 0x01020004
10,389,375 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,099 writing to cptra_bootfsm_go
3,543 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,247,488 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,165 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
192,457 UART:
192,836 UART: Running Caliptra ROM ...
193,929 UART:
603,508 UART: [state] CFI Enabled
616,725 UART: [state] LifecycleState = Unprovisioned
618,637 UART: [state] DebugLocked = No
621,474 UART: [state] WD Timer not started. Device not locked for debugging
624,667 UART: [kat] SHA2-256
804,357 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,107 UART: [kat] ++
815,587 UART: [kat] sha1
826,511 UART: [kat] SHA2-256
829,196 UART: [kat] SHA2-384
835,333 UART: [kat] SHA2-512-ACC
837,671 UART: [kat] ECC-384
3,281,196 UART: [kat] HMAC-384Kdf
3,293,119 UART: [kat] LMS
3,769,645 UART: [kat] --
3,773,525 UART: [cold-reset] ++
3,774,513 UART: [fht] FHT @ 0x50003400
3,784,762 UART: [idev] ++
3,785,393 UART: [idev] CDI.KEYID = 6
3,786,301 UART: [idev] SUBJECT.KEYID = 7
3,787,566 UART: [idev] UDS.KEYID = 0
3,801,538 UART: [idev] Erasing UDS.KEYID = 0
6,261,619 UART: [idev] Sha1 KeyId Algorithm
6,284,997 UART: [idev] --
6,289,899 UART: [ldev] ++
6,290,469 UART: [ldev] CDI.KEYID = 6
6,291,430 UART: [ldev] SUBJECT.KEYID = 5
6,292,586 UART: [ldev] AUTHORITY.KEYID = 7
6,293,873 UART: [ldev] FE.KEYID = 1
6,305,112 UART: [ldev] Erasing FE.KEYID = 1
8,786,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,149 UART: [ldev] --
10,581,705 UART: [fwproc] Wait for Commands...
10,584,291 UART: [fwproc] Recv command 0xabcd1234
10,586,339 UART: [fwproc] Invalid command received
10,589,607 UART: ROM Fatal Error: 0x01020004
10,592,806 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,968 writing to cptra_bootfsm_go
6,059 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
10,492,350 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,608 UART: [kat] SHA2-256
901,548 UART: [kat] SHA2-384
904,427 UART: [kat] SHA2-512-ACC
906,328 UART: [kat] ECC-384
916,139 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,169,572 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,182,059 UART: [idev] Erasing UDS.KEYID = 0
1,199,161 UART: [idev] Sha1 KeyId Algorithm
1,208,037 UART: [idev] --
1,209,200 UART: [ldev] ++
1,209,368 UART: [ldev] CDI.KEYID = 6
1,209,732 UART: [ldev] SUBJECT.KEYID = 5
1,210,159 UART: [ldev] AUTHORITY.KEYID = 7
1,210,622 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,380 UART: [ldev] --
1,281,703 UART: [fwproc] Wait for Commands...
1,282,330 UART: [fwproc] Recv command 0xabcd1234
1,283,072 UART: [fwproc] Invalid command received
1,284,231 UART: ROM Fatal Error: 0x01020004
1,285,390 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,754 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
891,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,369 UART: [kat] ++
895,521 UART: [kat] sha1
899,779 UART: [kat] SHA2-256
901,719 UART: [kat] SHA2-384
904,498 UART: [kat] SHA2-512-ACC
906,399 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
921,042 UART: [kat] LMS
1,169,354 UART: [kat] --
1,170,259 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,182,784 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,208,982 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,243,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,829 UART: [ldev] --
1,283,268 UART: [fwproc] Wait for Commands...
1,283,961 UART: [fwproc] Recv command 0xabcd1234
1,284,703 UART: [fwproc] Invalid command received
1,285,826 UART: ROM Fatal Error: 0x01020004
1,286,985 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,141,829 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,860 UART: [kat] SHA2-256
891,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,514 UART: [kat] ++
895,666 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
915,943 UART: [kat] HMAC-384Kdf
920,525 UART: [kat] LMS
1,168,837 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,028 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,099 UART: [idev] --
1,208,150 UART: [ldev] ++
1,208,318 UART: [ldev] CDI.KEYID = 6
1,208,682 UART: [ldev] SUBJECT.KEYID = 5
1,209,109 UART: [ldev] AUTHORITY.KEYID = 7
1,209,572 UART: [ldev] FE.KEYID = 1
1,214,738 UART: [ldev] Erasing FE.KEYID = 1
1,240,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,026 UART: [ldev] --
1,280,227 UART: [fwproc] Wait for Commands...
1,280,928 UART: [fwproc] Recv command 0xabcd1234
1,281,670 UART: [fwproc] Invalid command received
1,282,711 UART: ROM Fatal Error: 0x01020004
1,283,870 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,138,836 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,656 UART: [kat] SHA2-512-ACC
906,557 UART: [kat] ECC-384
916,456 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,581 UART: [cold-reset] ++
1,171,085 UART: [fht] FHT @ 0x50003400
1,173,763 UART: [idev] ++
1,173,931 UART: [idev] CDI.KEYID = 6
1,174,292 UART: [idev] SUBJECT.KEYID = 7
1,174,717 UART: [idev] UDS.KEYID = 0
1,182,944 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,209,993 UART: [ldev] ++
1,210,161 UART: [ldev] CDI.KEYID = 6
1,210,525 UART: [ldev] SUBJECT.KEYID = 5
1,210,952 UART: [ldev] AUTHORITY.KEYID = 7
1,211,415 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,472 UART: [fwproc] Wait for Commands...
1,283,047 UART: [fwproc] Recv command 0xabcd1234
1,283,789 UART: [fwproc] Invalid command received
1,284,722 UART: ROM Fatal Error: 0x01020004
1,285,881 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,577 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,335 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
891,030 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,134 UART: [kat] ++
895,286 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
915,645 UART: [kat] HMAC-384Kdf
920,219 UART: [kat] LMS
1,168,531 UART: [kat] --
1,169,432 UART: [cold-reset] ++
1,169,834 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,198,387 UART: [idev] Sha1 KeyId Algorithm
1,207,297 UART: [idev] --
1,208,328 UART: [ldev] ++
1,208,496 UART: [ldev] CDI.KEYID = 6
1,208,860 UART: [ldev] SUBJECT.KEYID = 5
1,209,287 UART: [ldev] AUTHORITY.KEYID = 7
1,209,750 UART: [ldev] FE.KEYID = 1
1,215,054 UART: [ldev] Erasing FE.KEYID = 1
1,241,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,158 UART: [ldev] --
1,280,567 UART: [fwproc] Wait for Commands...
1,281,254 UART: [fwproc] Recv command 0xabcd1234
1,281,996 UART: [fwproc] Invalid command received
1,283,027 UART: ROM Fatal Error: 0x01020004
1,284,186 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,139,794 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,806 UART: [kat] SHA2-512-ACC
906,707 UART: [kat] ECC-384
916,320 UART: [kat] HMAC-384Kdf
920,828 UART: [kat] LMS
1,169,140 UART: [kat] --
1,170,037 UART: [cold-reset] ++
1,170,397 UART: [fht] FHT @ 0x50003400
1,173,099 UART: [idev] ++
1,173,267 UART: [idev] CDI.KEYID = 6
1,173,628 UART: [idev] SUBJECT.KEYID = 7
1,174,053 UART: [idev] UDS.KEYID = 0
1,181,882 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,241,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,365 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,465 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,595 UART: [fwproc] Recv command 0xabcd1234
1,282,337 UART: [fwproc] Invalid command received
1,283,218 UART: ROM Fatal Error: 0x01020004
1,284,377 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0xabcd1234 (0 bytes) from SoC
1,140,149 >>> mbox cmd response: failed
test test_mailbox_errors::test_unknown_command_is_fatal ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,175 UART:
192,532 UART: Running Caliptra ROM ...
193,733 UART:
193,895 UART: [state] CFI Enabled
264,284 UART: [state] LifecycleState = Unprovisioned
266,187 UART: [state] DebugLocked = No
267,652 UART: [state] WD Timer not started. Device not locked for debugging
272,030 UART: [kat] SHA2-256
451,712 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,512 UART: [kat] ++
463,002 UART: [kat] sha1
474,328 UART: [kat] SHA2-256
476,970 UART: [kat] SHA2-384
482,614 UART: [kat] SHA2-512-ACC
484,985 UART: [kat] ECC-384
2,946,561 UART: [kat] HMAC-384Kdf
2,970,110 UART: [kat] LMS
3,446,605 UART: [kat] --
3,451,612 UART: [cold-reset] ++
3,453,049 UART: [fht] FHT @ 0x50003400
3,464,335 UART: [idev] ++
3,464,899 UART: [idev] CDI.KEYID = 6
3,465,858 UART: [idev] SUBJECT.KEYID = 7
3,467,104 UART: [idev] UDS.KEYID = 0
3,468,007 ready_for_fw is high
3,468,215 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,606,375 UART: [idev] Erasing UDS.KEYID = 0
5,984,133 UART: [idev] Sha1 KeyId Algorithm
6,006,802 UART: [idev] --
6,012,623 UART: [ldev] ++
6,013,206 UART: [ldev] CDI.KEYID = 6
6,014,131 UART: [ldev] SUBJECT.KEYID = 5
6,015,296 UART: [ldev] AUTHORITY.KEYID = 7
6,016,589 UART: [ldev] FE.KEYID = 1
6,055,780 UART: [ldev] Erasing FE.KEYID = 1
8,560,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,388 UART: [ldev] --
10,370,029 UART: [fwproc] Wait for Commands...
10,373,215 UART: [fwproc] Recv command 0x46574c44
10,375,203 UART: [fwproc] Recv'd Img size: 109820 bytes
13,758,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,835,465 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,877,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,205,572 >>> mbox cmd response: success
14,205,985 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,210,504 UART: [afmc] ++
14,211,125 UART: [afmc] CDI.KEYID = 6
14,212,047 UART: [afmc] SUBJECT.KEYID = 7
14,213,219 UART: [afmc] AUTHORITY.KEYID = 5
16,740,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,467,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,469,514 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,485,338 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,501,293 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,516,958 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,541,901 UART: [afmc] --
18,545,222 UART: [cold-reset] --
18,548,441 UART: [state] Locking Datavault
18,551,856 UART: [state] Locking PCR0, PCR1 and PCR31
18,553,815 UART: [state] Locking ICCM
18,556,412 UART: [exit] Launching FMC @ 0x40000000
18,564,811 UART:
18,565,074 UART: Running Caliptra FMC ...
18,566,187 UART:
18,566,361 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,568,025 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,462,474 ready_for_fw is high
3,463,062 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,089,168 >>> mbox cmd response: success
14,089,701 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,367,731 UART:
18,368,128 UART: Running Caliptra FMC ...
18,369,299 UART:
18,369,460 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,371,384 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,353 UART:
192,731 UART: Running Caliptra ROM ...
193,909 UART:
603,572 UART: [state] CFI Enabled
616,160 UART: [state] LifecycleState = Unprovisioned
618,117 UART: [state] DebugLocked = No
620,567 UART: [state] WD Timer not started. Device not locked for debugging
623,663 UART: [kat] SHA2-256
803,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,135 UART: [kat] ++
814,671 UART: [kat] sha1
824,856 UART: [kat] SHA2-256
827,546 UART: [kat] SHA2-384
834,249 UART: [kat] SHA2-512-ACC
836,562 UART: [kat] ECC-384
3,282,096 UART: [kat] HMAC-384Kdf
3,294,682 UART: [kat] LMS
3,771,202 UART: [kat] --
3,775,761 UART: [cold-reset] ++
3,777,409 UART: [fht] FHT @ 0x50003400
3,789,464 UART: [idev] ++
3,790,068 UART: [idev] CDI.KEYID = 6
3,790,985 UART: [idev] SUBJECT.KEYID = 7
3,792,233 UART: [idev] UDS.KEYID = 0
3,793,155 ready_for_fw is high
3,793,339 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,931,138 UART: [idev] Erasing UDS.KEYID = 0
6,275,145 UART: [idev] Sha1 KeyId Algorithm
6,299,605 UART: [idev] --
6,303,979 UART: [ldev] ++
6,304,570 UART: [ldev] CDI.KEYID = 6
6,305,483 UART: [ldev] SUBJECT.KEYID = 5
6,306,699 UART: [ldev] AUTHORITY.KEYID = 7
6,307,930 UART: [ldev] FE.KEYID = 1
6,318,253 UART: [ldev] Erasing FE.KEYID = 1
8,795,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,253 UART: [ldev] --
10,586,111 UART: [fwproc] Wait for Commands...
10,587,724 UART: [fwproc] Recv command 0x46574c44
10,589,780 UART: [fwproc] Recv'd Img size: 109820 bytes
13,973,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,058,105 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,100,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,429,472 >>> mbox cmd response: success
14,430,432 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
14,434,165 UART: [afmc] ++
14,434,825 UART: [afmc] CDI.KEYID = 6
14,435,711 UART: [afmc] SUBJECT.KEYID = 7
14,436,925 UART: [afmc] AUTHORITY.KEYID = 5
16,942,518 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,668,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,670,693 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,686,562 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,702,531 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,718,171 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,741,946 UART: [afmc] --
18,745,647 UART: [cold-reset] --
18,747,545 UART: [state] Locking Datavault
18,751,737 UART: [state] Locking PCR0, PCR1 and PCR31
18,753,494 UART: [state] Locking ICCM
18,755,914 UART: [exit] Launching FMC @ 0x40000000
18,764,253 UART:
18,764,487 UART: Running Caliptra FMC ...
18,765,585 UART:
18,765,743 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,767,308 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
3,774,885 ready_for_fw is high
3,775,530 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,290,862 >>> mbox cmd response: success
14,291,956 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
18,541,058 UART:
18,541,450 UART: Running Caliptra FMC ...
18,542,707 UART:
18,542,879 UART: [fmc] Received command: 0x10000008
* TESTCASE PASSED
18,544,568 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,650 UART: [kat] SHA2-256
901,590 UART: [kat] SHA2-384
904,477 UART: [kat] SHA2-512-ACC
906,378 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,751 UART: [kat] LMS
1,169,063 UART: [kat] --
1,170,106 UART: [cold-reset] ++
1,170,526 UART: [fht] FHT @ 0x50003400
1,173,110 UART: [idev] ++
1,173,278 UART: [idev] CDI.KEYID = 6
1,173,639 UART: [idev] SUBJECT.KEYID = 7
1,174,064 UART: [idev] UDS.KEYID = 0
1,174,410 ready_for_fw is high
1,174,410 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,925 UART: [idev] Erasing UDS.KEYID = 0
1,198,863 UART: [idev] Sha1 KeyId Algorithm
1,207,791 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,242,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,580 UART: [ldev] --
1,281,873 UART: [fwproc] Wait for Commands...
1,282,500 UART: [fwproc] Recv command 0x46574c44
1,283,233 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,695 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,778 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,997 >>> mbox cmd response: success
2,713,997 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,715,021 UART: [afmc] ++
2,715,189 UART: [afmc] CDI.KEYID = 6
2,715,552 UART: [afmc] SUBJECT.KEYID = 7
2,715,978 UART: [afmc] AUTHORITY.KEYID = 5
2,751,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,502 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,222 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,115 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,808 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,615 UART: [afmc] --
2,794,654 UART: [cold-reset] --
2,795,534 UART: [state] Locking Datavault
2,796,577 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,181 UART: [state] Locking ICCM
2,797,639 UART: [exit] Launching FMC @ 0x40000000
2,802,936 UART:
2,802,952 UART: Running Caliptra FMC ...
2,803,360 UART:
2,803,498 UART: [fmc] Received command: 0x10000008
2,804,530 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,158 ready_for_fw is high
1,059,158 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,550 >>> mbox cmd response: success
2,564,550 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,626,469 UART:
2,626,485 UART: Running Caliptra FMC ...
2,626,893 UART:
2,627,031 UART: [fmc] Received command: 0x10000008
2,628,063 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,017 UART: [kat] SHA2-256
891,567 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,671 UART: [kat] ++
895,823 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
915,700 UART: [kat] HMAC-384Kdf
920,266 UART: [kat] LMS
1,168,578 UART: [kat] --
1,169,553 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,659 UART: [idev] ++
1,172,827 UART: [idev] CDI.KEYID = 6
1,173,188 UART: [idev] SUBJECT.KEYID = 7
1,173,613 UART: [idev] UDS.KEYID = 0
1,173,959 ready_for_fw is high
1,173,959 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,498 UART: [idev] Erasing UDS.KEYID = 0
1,198,278 UART: [idev] Sha1 KeyId Algorithm
1,207,306 UART: [idev] --
1,208,361 UART: [ldev] ++
1,208,529 UART: [ldev] CDI.KEYID = 6
1,208,893 UART: [ldev] SUBJECT.KEYID = 5
1,209,320 UART: [ldev] AUTHORITY.KEYID = 7
1,209,783 UART: [ldev] FE.KEYID = 1
1,215,167 UART: [ldev] Erasing FE.KEYID = 1
1,241,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,417 UART: [ldev] --
1,280,648 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,423 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,000 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,083 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,250 >>> mbox cmd response: success
2,712,250 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,713,464 UART: [afmc] ++
2,713,632 UART: [afmc] CDI.KEYID = 6
2,713,995 UART: [afmc] SUBJECT.KEYID = 7
2,714,421 UART: [afmc] AUTHORITY.KEYID = 5
2,749,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,645 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,365 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,258 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,951 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,666 UART: [afmc] --
2,792,699 UART: [cold-reset] --
2,793,501 UART: [state] Locking Datavault
2,794,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,248 UART: [state] Locking ICCM
2,795,918 UART: [exit] Launching FMC @ 0x40000000
2,801,215 UART:
2,801,231 UART: Running Caliptra FMC ...
2,801,639 UART:
2,801,777 UART: [fmc] Received command: 0x10000008
2,802,809 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,115 ready_for_fw is high
1,059,115 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,059 >>> mbox cmd response: success
2,565,059 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,626,722 UART:
2,626,738 UART: Running Caliptra FMC ...
2,627,146 UART:
2,627,284 UART: [fmc] Received command: 0x10000008
2,628,316 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,032 UART: [kat] ++
895,184 UART: [kat] sha1
899,334 UART: [kat] SHA2-256
901,274 UART: [kat] SHA2-384
903,847 UART: [kat] SHA2-512-ACC
905,748 UART: [kat] ECC-384
915,631 UART: [kat] HMAC-384Kdf
920,265 UART: [kat] LMS
1,168,577 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,938 UART: [idev] ++
1,173,106 UART: [idev] CDI.KEYID = 6
1,173,467 UART: [idev] SUBJECT.KEYID = 7
1,173,892 UART: [idev] UDS.KEYID = 0
1,174,238 ready_for_fw is high
1,174,238 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,447 UART: [idev] Erasing UDS.KEYID = 0
1,198,731 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,368 UART: [ldev] Erasing FE.KEYID = 1
1,241,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,772 UART: [ldev] --
1,279,973 UART: [fwproc] Wait for Commands...
1,280,720 UART: [fwproc] Recv command 0x46574c44
1,281,453 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,273 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,356 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,631 >>> mbox cmd response: success
2,712,631 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,713,675 UART: [afmc] ++
2,713,843 UART: [afmc] CDI.KEYID = 6
2,714,206 UART: [afmc] SUBJECT.KEYID = 7
2,714,632 UART: [afmc] AUTHORITY.KEYID = 5
2,750,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,180 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,900 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,793 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,486 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,351 UART: [afmc] --
2,793,394 UART: [cold-reset] --
2,794,218 UART: [state] Locking Datavault
2,795,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,773 UART: [state] Locking ICCM
2,796,413 UART: [exit] Launching FMC @ 0x40000000
2,801,710 UART:
2,801,726 UART: Running Caliptra FMC ...
2,802,134 UART:
2,802,272 UART: [fmc] Received command: 0x10000008
2,803,304 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,074 ready_for_fw is high
1,059,074 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,066 >>> mbox cmd response: success
2,566,066 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,277 UART:
2,628,293 UART: Running Caliptra FMC ...
2,628,701 UART:
2,628,839 UART: [fmc] Received command: 0x10000008
2,629,871 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
891,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,665 UART: [kat] ++
895,817 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,748 UART: [kat] HMAC-384Kdf
921,236 UART: [kat] LMS
1,169,548 UART: [kat] --
1,170,383 UART: [cold-reset] ++
1,170,753 UART: [fht] FHT @ 0x50003400
1,173,265 UART: [idev] ++
1,173,433 UART: [idev] CDI.KEYID = 6
1,173,794 UART: [idev] SUBJECT.KEYID = 7
1,174,219 UART: [idev] UDS.KEYID = 0
1,174,565 ready_for_fw is high
1,174,565 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,054 UART: [idev] --
1,209,073 UART: [ldev] ++
1,209,241 UART: [ldev] CDI.KEYID = 6
1,209,605 UART: [ldev] SUBJECT.KEYID = 5
1,210,032 UART: [ldev] AUTHORITY.KEYID = 7
1,210,495 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,507 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,180 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,263 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,442 >>> mbox cmd response: success
2,713,442 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,714,580 UART: [afmc] ++
2,714,748 UART: [afmc] CDI.KEYID = 6
2,715,111 UART: [afmc] SUBJECT.KEYID = 7
2,715,537 UART: [afmc] AUTHORITY.KEYID = 5
2,751,163 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,081 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,801 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,694 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,387 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,332 UART: [afmc] --
2,794,147 UART: [cold-reset] --
2,794,941 UART: [state] Locking Datavault
2,796,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,870 UART: [state] Locking ICCM
2,797,360 UART: [exit] Launching FMC @ 0x40000000
2,802,657 UART:
2,802,673 UART: Running Caliptra FMC ...
2,803,081 UART:
2,803,219 UART: [fmc] Received command: 0x10000008
2,804,251 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 ready_for_fw is high
1,059,885 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,275 >>> mbox cmd response: success
2,566,275 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,126 UART:
2,628,142 UART: Running Caliptra FMC ...
2,628,550 UART:
2,628,688 UART: [fmc] Received command: 0x10000008
2,629,720 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,614 UART: [state] LifecycleState = Unprovisioned
85,269 UART: [state] DebugLocked = No
85,785 UART: [state] WD Timer not started. Device not locked for debugging
87,124 UART: [kat] SHA2-256
890,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,778 UART: [kat] ++
894,930 UART: [kat] sha1
899,126 UART: [kat] SHA2-256
901,066 UART: [kat] SHA2-384
903,847 UART: [kat] SHA2-512-ACC
905,748 UART: [kat] ECC-384
915,657 UART: [kat] HMAC-384Kdf
920,093 UART: [kat] LMS
1,168,405 UART: [kat] --
1,169,368 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,282 UART: [idev] ++
1,172,450 UART: [idev] CDI.KEYID = 6
1,172,811 UART: [idev] SUBJECT.KEYID = 7
1,173,236 UART: [idev] UDS.KEYID = 0
1,173,582 ready_for_fw is high
1,173,582 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,299 UART: [idev] Erasing UDS.KEYID = 0
1,198,367 UART: [idev] Sha1 KeyId Algorithm
1,207,067 UART: [idev] --
1,208,156 UART: [ldev] ++
1,208,324 UART: [ldev] CDI.KEYID = 6
1,208,688 UART: [ldev] SUBJECT.KEYID = 5
1,209,115 UART: [ldev] AUTHORITY.KEYID = 7
1,209,578 UART: [ldev] FE.KEYID = 1
1,214,518 UART: [ldev] Erasing FE.KEYID = 1
1,240,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,974 UART: [ldev] --
1,280,247 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x46574c44
1,281,637 UART: [fwproc] Recv'd Img size: 109820 bytes
2,525,432 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,591 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,861 >>> mbox cmd response: success
2,710,861 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,711,983 UART: [afmc] ++
2,712,151 UART: [afmc] CDI.KEYID = 6
2,712,514 UART: [afmc] SUBJECT.KEYID = 7
2,712,940 UART: [afmc] AUTHORITY.KEYID = 5
2,749,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,765,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,278 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,771,998 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,777,891 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,783,584 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,791,341 UART: [afmc] --
2,792,280 UART: [cold-reset] --
2,793,102 UART: [state] Locking Datavault
2,794,313 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,917 UART: [state] Locking ICCM
2,795,379 UART: [exit] Launching FMC @ 0x40000000
2,800,676 UART:
2,800,692 UART: Running Caliptra FMC ...
2,801,100 UART:
2,801,238 UART: [fmc] Received command: 0x10000008
2,802,270 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,824 ready_for_fw is high
1,059,824 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,228 >>> mbox cmd response: success
2,566,228 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,627,833 UART:
2,627,849 UART: Running Caliptra FMC ...
2,628,257 UART:
2,628,395 UART: [fmc] Received command: 0x10000008
2,629,427 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,410 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,533 UART: [kat] SHA2-256
901,473 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,328 UART: [kat] LMS
1,168,640 UART: [kat] --
1,169,679 UART: [cold-reset] ++
1,170,011 UART: [fht] FHT @ 0x50003400
1,172,619 UART: [idev] ++
1,172,787 UART: [idev] CDI.KEYID = 6
1,173,148 UART: [idev] SUBJECT.KEYID = 7
1,173,573 UART: [idev] UDS.KEYID = 0
1,173,919 ready_for_fw is high
1,173,919 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,480 UART: [idev] Erasing UDS.KEYID = 0
1,198,458 UART: [idev] Sha1 KeyId Algorithm
1,207,414 UART: [idev] --
1,208,473 UART: [ldev] ++
1,208,641 UART: [ldev] CDI.KEYID = 6
1,209,005 UART: [ldev] SUBJECT.KEYID = 5
1,209,432 UART: [ldev] AUTHORITY.KEYID = 7
1,209,895 UART: [ldev] FE.KEYID = 1
1,215,371 UART: [ldev] Erasing FE.KEYID = 1
1,242,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,005 UART: [ldev] --
1,281,424 UART: [fwproc] Wait for Commands...
1,282,179 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,362 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,680 >>> mbox cmd response: success
2,712,680 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,713,718 UART: [afmc] ++
2,713,886 UART: [afmc] CDI.KEYID = 6
2,714,249 UART: [afmc] SUBJECT.KEYID = 7
2,714,675 UART: [afmc] AUTHORITY.KEYID = 5
2,750,191 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,772 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,521 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,241 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,134 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,827 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,718 UART: [afmc] --
2,793,745 UART: [cold-reset] --
2,794,791 UART: [state] Locking Datavault
2,795,872 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,476 UART: [state] Locking ICCM
2,797,124 UART: [exit] Launching FMC @ 0x40000000
2,802,421 UART:
2,802,437 UART: Running Caliptra FMC ...
2,802,845 UART:
2,802,983 UART: [fmc] Received command: 0x10000008
2,804,015 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,807 ready_for_fw is high
1,059,807 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,865 >>> mbox cmd response: success
2,566,865 <<< Executing mbox cmd 0x10000008 (0 bytes) from SoC
2,628,798 UART:
2,628,814 UART: Running Caliptra FMC ...
2,629,222 UART:
2,629,360 UART: [fmc] Received command: 0x10000008
2,630,392 >>> mbox cmd response data (60 bytes)
test test_rom_integrity::test_read_rom_info_from_fmc ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.83s
running 1 test
rom_info_offset is 48768
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,000 UART:
192,371 UART: Running Caliptra ROM ...
193,548 UART:
193,707 UART: [state] CFI Enabled
262,346 UART: [state] LifecycleState = Unprovisioned
264,315 UART: [state] DebugLocked = No
265,569 UART: [state] WD Timer not started. Device not locked for debugging
269,088 UART: [kat] SHA2-256
448,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,162 UART: ROM integrity test failed
460,384 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 42432
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.03s
running 1 test
rom_info_offset is 48768
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,101 writing to cptra_bootfsm_go
192,334 UART:
192,708 UART: Running Caliptra ROM ...
193,802 UART:
603,578 UART: [state] CFI Enabled
618,715 UART: [state] LifecycleState = Unprovisioned
620,635 UART: [state] DebugLocked = No
623,659 UART: [state] WD Timer not started. Device not locked for debugging
626,696 UART: [kat] SHA2-256
806,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,784 UART: ROM integrity test failed
817,986 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.05s
running 1 test
rom_info_offset is 42432
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "6d0e53e94a8701dc749ad5199cef945d895de7af15e8717a4c273aee640ce2b94ede4ecaadcb390a4ef6a92ae1cd149c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,322 UART: [kat] SHA2-256
890,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,818 UART: ROM integrity test failed
895,265 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.25s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,387 UART: ROM integrity test failed
895,834 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,990 UART: [kat] SHA2-256
891,540 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,486 UART: ROM integrity test failed
895,933 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.27s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,412 UART: [state] WD Timer not started. Device not locked for debugging
87,685 UART: [kat] SHA2-256
891,235 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: ROM integrity test failed
895,628 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
87,890 UART: [kat] SHA2-256
891,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,386 UART: ROM integrity test failed
895,833 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.24s
running 1 test
rom_info_offset is 48768
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,155 UART: ROM integrity test failed
895,602 UART: ROM Fatal Error: 0x90080001
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.26s
running 1 test
rom_info_offset is 42432
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "dbcda27060e71398ca50c455ce4d5ba101527a3bb79b45ddc122c7b24335dd573f464133f3c2408091a0c65ffae9aa30",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_rom_integrity::test_rom_integrity_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.23s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.01s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
test test_symbols::test_linker_symbols_match_memory_layout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,996 UART:
192,367 UART: Running Caliptra ROM ...
193,510 UART:
193,660 UART: [state] CFI Enabled
263,819 UART: [state] LifecycleState = Unprovisioned
265,686 UART: [state] DebugLocked = No
267,721 UART: [state] WD Timer not started. Device not locked for debugging
271,504 UART: [kat] SHA2-256
451,147 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,905 UART: [kat] ++
462,384 UART: [kat] sha1
473,691 UART: [kat] SHA2-256
476,344 UART: [kat] SHA2-384
481,269 UART: [kat] SHA2-512-ACC
483,637 UART: [kat] ECC-384
2,948,385 UART: [kat] HMAC-384Kdf
2,970,418 UART: [kat] LMS
3,446,964 UART: [kat] --
3,451,671 UART: [cold-reset] ++
3,452,754 UART: [fht] FHT @ 0x50003400
3,463,964 UART: [idev] ++
3,464,542 UART: [idev] CDI.KEYID = 6
3,465,528 UART: [idev] SUBJECT.KEYID = 7
3,466,776 UART: [idev] UDS.KEYID = 0
3,467,872 ready_for_fw is high
3,468,136 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,612,605 UART: [idev] Erasing UDS.KEYID = 0
5,983,434 UART: [idev] Sha1 KeyId Algorithm
6,005,708 UART: [idev] --
6,011,382 UART: [ldev] ++
6,011,960 UART: [ldev] CDI.KEYID = 6
6,012,852 UART: [ldev] SUBJECT.KEYID = 5
6,014,071 UART: [ldev] AUTHORITY.KEYID = 7
6,015,366 UART: [ldev] FE.KEYID = 1
6,056,916 UART: [ldev] Erasing FE.KEYID = 1
8,565,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,326 UART: [ldev] --
10,371,932 UART: [fwproc] Wait for Commands...
10,374,626 UART: [fwproc] Recv command 0x46574c44
10,376,616 UART: [fwproc] Recv'd Img size: 114888 bytes
13,815,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,899,401 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,959,613 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,288,196 >>> mbox cmd response: success
14,291,588 UART: [afmc] ++
14,292,183 UART: [afmc] CDI.KEYID = 6
14,293,077 UART: [afmc] SUBJECT.KEYID = 7
14,294,301 UART: [afmc] AUTHORITY.KEYID = 5
16,833,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,578 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,760 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,593,575 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,609,637 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,625,096 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,650,608 UART: [afmc] --
18,655,052 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,800,090 UART: [cold-reset] --
18,800,964 UART: [state] Locking Datavault
18,802,128 UART: [state] Locking PCR0, PCR1 and PCR31
18,803,671 UART: [state] Locking ICCM
18,804,588 UART: [exit] Launching FMC @ 0x40000000
18,806,015 UART:
18,806,183 UART: Running Caliptra FMC ...
18,807,286 UART:
18,807,472 UART: [fmc] Received command: 0x46574C44
18,808,947 UART:
18,809,111 UART: Running Caliptra ROM ...
18,810,212 UART:
18,810,375 UART: [state] CFI Enabled
18,863,381 UART: [state] LifecycleState = Unprovisioned
18,865,319 UART: [state] DebugLocked = No
18,867,247 UART: [state] WD Timer not started. Device not locked for debugging
18,870,505 UART: [kat] SHA2-256
19,050,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,060,952 UART: [kat] ++
19,061,498 UART: [kat] sha1
19,073,369 UART: [kat] SHA2-256
19,076,110 UART: [kat] SHA2-384
19,082,056 UART: [kat] SHA2-512-ACC
19,084,417 UART: [kat] ECC-384
21,548,385 UART: [kat] HMAC-384Kdf
21,570,884 UART: [kat] LMS
22,047,333 UART: [kat] --
22,053,161 UART: [update-reset] ++
25,504,692 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,508,668 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,893,466 >>> mbox cmd response: success
25,895,106 UART: [update-reset] Copying MAN_2 To MAN_1
25,932,235 UART: [update-reset Success] --
25,933,611 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,937,409 UART: [state] Locking Datavault
25,940,342 UART: [state] Locking PCR0, PCR1 and PCR31
25,942,102 UART: [state] Locking ICCM
25,943,881 UART: [exit] Launching FMC @ 0x40000000
25,952,253 UART:
25,952,532 UART: Running Caliptra FMC ...
25,953,664 UART:
25,953,839 UART: [fmc] Received command: 0x1000000D
25,955,370 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,454,534 ready_for_fw is high
3,454,956 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,158,459 >>> mbox cmd response: success
18,429,190 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,574,288 UART:
18,574,663 UART: Running Caliptra FMC ...
18,575,871 UART:
18,576,070 UART: [fmc] Received command: 0x46574C44
25,680,138 >>> mbox cmd response: success
25,701,635 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,715,008 UART:
25,715,305 UART: Running Caliptra FMC ...
25,716,487 UART:
25,716,669 UART: [fmc] Received command: 0x1000000D
25,718,203 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,419 UART:
192,765 UART: Running Caliptra ROM ...
193,941 UART:
603,810 UART: [state] CFI Enabled
616,557 UART: [state] LifecycleState = Unprovisioned
618,469 UART: [state] DebugLocked = No
619,704 UART: [state] WD Timer not started. Device not locked for debugging
624,221 UART: [kat] SHA2-256
803,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,642 UART: [kat] ++
815,086 UART: [kat] sha1
826,528 UART: [kat] SHA2-256
829,246 UART: [kat] SHA2-384
835,301 UART: [kat] SHA2-512-ACC
837,662 UART: [kat] ECC-384
3,276,156 UART: [kat] HMAC-384Kdf
3,288,393 UART: [kat] LMS
3,764,927 UART: [kat] --
3,768,498 UART: [cold-reset] ++
3,770,996 UART: [fht] FHT @ 0x50003400
3,782,539 UART: [idev] ++
3,783,109 UART: [idev] CDI.KEYID = 6
3,784,141 UART: [idev] SUBJECT.KEYID = 7
3,785,315 UART: [idev] UDS.KEYID = 0
3,786,266 ready_for_fw is high
3,786,473 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,931,236 UART: [idev] Erasing UDS.KEYID = 0
6,260,582 UART: [idev] Sha1 KeyId Algorithm
6,282,787 UART: [idev] --
6,288,293 UART: [ldev] ++
6,288,861 UART: [ldev] CDI.KEYID = 6
6,289,767 UART: [ldev] SUBJECT.KEYID = 5
6,290,978 UART: [ldev] AUTHORITY.KEYID = 7
6,292,379 UART: [ldev] FE.KEYID = 1
6,303,880 UART: [ldev] Erasing FE.KEYID = 1
8,782,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,572 UART: [ldev] --
10,574,939 UART: [fwproc] Wait for Commands...
10,578,216 UART: [fwproc] Recv command 0x46574c44
10,580,250 UART: [fwproc] Recv'd Img size: 114888 bytes
14,024,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,104,338 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,164,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,492,886 >>> mbox cmd response: success
14,497,416 UART: [afmc] ++
14,498,033 UART: [afmc] CDI.KEYID = 6
14,498,948 UART: [afmc] SUBJECT.KEYID = 7
14,500,100 UART: [afmc] AUTHORITY.KEYID = 5
17,004,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,727,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,729,883 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,745,658 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,761,760 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,777,291 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,800,392 UART: [afmc] --
18,805,130 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,949,879 UART: [cold-reset] --
18,950,740 UART: [state] Locking Datavault
18,951,896 UART: [state] Locking PCR0, PCR1 and PCR31
18,953,431 UART: [state] Locking ICCM
18,954,333 UART: [exit] Launching FMC @ 0x40000000
18,955,762 UART:
18,955,918 UART: Running Caliptra FMC ...
18,957,016 UART:
18,957,173 UART: [fmc] Received command: 0x46574C44
18,958,636 UART:
18,958,784 UART: Running Caliptra ROM ...
18,959,792 UART:
18,959,955 UART: [state] CFI Enabled
18,968,300 UART: [state] LifecycleState = Unprovisioned
18,970,174 UART: [state] DebugLocked = No
18,972,304 UART: [state] WD Timer not started. Device not locked for debugging
18,975,773 UART: [kat] SHA2-256
19,155,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,166,267 UART: [kat] ++
19,166,729 UART: [kat] sha1
19,176,471 UART: [kat] SHA2-256
19,179,154 UART: [kat] SHA2-384
19,185,199 UART: [kat] SHA2-512-ACC
19,187,602 UART: [kat] ECC-384
21,629,106 UART: [kat] HMAC-384Kdf
21,642,317 UART: [kat] LMS
22,118,780 UART: [kat] --
22,122,926 UART: [update-reset] ++
25,574,786 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,577,465 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,962,265 >>> mbox cmd response: success
25,963,927 UART: [update-reset] Copying MAN_2 To MAN_1
26,001,040 UART: [update-reset Success] --
26,002,395 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
26,005,135 UART: [state] Locking Datavault
26,008,566 UART: [state] Locking PCR0, PCR1 and PCR31
26,010,333 UART: [state] Locking ICCM
26,011,461 UART: [exit] Launching FMC @ 0x40000000
26,019,802 UART:
26,020,037 UART: Running Caliptra FMC ...
26,021,142 UART:
26,021,301 UART: [fmc] Received command: 0x1000000D
26,022,816 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,784,725 ready_for_fw is high
3,785,142 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,403,184 >>> mbox cmd response: success
18,643,623 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,788,396 UART:
18,788,775 UART: Running Caliptra FMC ...
18,789,893 UART:
18,790,045 UART: [fmc] Received command: 0x46574C44
25,805,088 >>> mbox cmd response: success
25,827,014 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
25,840,654 UART:
25,840,917 UART: Running Caliptra FMC ...
25,842,095 UART:
25,842,281 UART: [fmc] Received command: 0x1000000D
25,843,800 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,237 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,012 UART: [kat] ++
895,164 UART: [kat] sha1
899,402 UART: [kat] SHA2-256
901,342 UART: [kat] SHA2-384
903,869 UART: [kat] SHA2-512-ACC
905,770 UART: [kat] ECC-384
915,175 UART: [kat] HMAC-384Kdf
919,863 UART: [kat] LMS
1,168,175 UART: [kat] --
1,169,132 UART: [cold-reset] ++
1,169,588 UART: [fht] FHT @ 0x50003400
1,172,174 UART: [idev] ++
1,172,342 UART: [idev] CDI.KEYID = 6
1,172,703 UART: [idev] SUBJECT.KEYID = 7
1,173,128 UART: [idev] UDS.KEYID = 0
1,173,474 ready_for_fw is high
1,173,474 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,361 UART: [idev] --
1,208,348 UART: [ldev] ++
1,208,516 UART: [ldev] CDI.KEYID = 6
1,208,880 UART: [ldev] SUBJECT.KEYID = 5
1,209,307 UART: [ldev] AUTHORITY.KEYID = 7
1,209,770 UART: [ldev] FE.KEYID = 1
1,215,210 UART: [ldev] Erasing FE.KEYID = 1
1,241,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,374 UART: [ldev] --
1,280,627 UART: [fwproc] Wait for Commands...
1,281,308 UART: [fwproc] Recv command 0x46574c44
1,282,041 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,326 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,258 >>> mbox cmd response: success
2,778,372 UART: [afmc] ++
2,778,540 UART: [afmc] CDI.KEYID = 6
2,778,903 UART: [afmc] SUBJECT.KEYID = 7
2,779,329 UART: [afmc] AUTHORITY.KEYID = 5
2,815,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,800 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,496 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,395 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,088 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,832 UART: [afmc] --
2,858,773 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,795 UART: [cold-reset] --
2,859,481 UART: [state] Locking Datavault
2,860,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,384 UART: [state] Locking ICCM
2,861,968 UART: [exit] Launching FMC @ 0x40000000
2,867,265 UART:
2,867,281 UART: Running Caliptra FMC ...
2,867,689 UART:
2,867,919 UART: [fmc] Received command: 0x46574C44
2,868,745 UART:
2,868,761 UART: Running Caliptra ROM ...
2,869,169 UART:
2,869,224 UART: [state] CFI Enabled
2,872,030 UART: [state] LifecycleState = Unprovisioned
2,872,685 UART: [state] DebugLocked = No
2,873,317 UART: [state] WD Timer not started. Device not locked for debugging
2,874,521 UART: [kat] SHA2-256
3,678,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,175 UART: [kat] ++
3,682,327 UART: [kat] sha1
3,686,509 UART: [kat] SHA2-256
3,688,449 UART: [kat] SHA2-384
3,691,040 UART: [kat] SHA2-512-ACC
3,692,940 UART: [kat] ECC-384
3,702,567 UART: [kat] HMAC-384Kdf
3,707,037 UART: [kat] LMS
3,955,349 UART: [kat] --
3,956,299 UART: [update-reset] ++
5,273,559 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,544 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,014 >>> mbox cmd response: success
5,427,191 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,205 UART: [update-reset Success] --
5,435,614 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,436,166 UART: [state] Locking Datavault
5,436,950 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,554 UART: [state] Locking ICCM
5,438,066 UART: [exit] Launching FMC @ 0x40000000
5,443,363 UART:
5,443,379 UART: Running Caliptra FMC ...
5,443,787 UART:
5,444,009 UART: [fmc] Received command: 0x1000000D
5,445,101 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,940 ready_for_fw is high
1,058,940 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,505 >>> mbox cmd response: success
2,686,078 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,691,967 UART:
2,691,983 UART: Running Caliptra FMC ...
2,692,391 UART:
2,692,621 UART: [fmc] Received command: 0x46574C44
5,137,410 >>> mbox cmd response: success
5,144,958 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,150,986 UART:
5,151,002 UART: Running Caliptra FMC ...
5,151,410 UART:
5,151,632 UART: [fmc] Received command: 0x1000000D
5,152,724 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,232 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,027 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 ready_for_fw is high
1,174,193 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,720 UART: [idev] Erasing UDS.KEYID = 0
1,199,292 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,215,181 UART: [ldev] Erasing FE.KEYID = 1
1,241,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,321 UART: [ldev] --
1,280,672 UART: [fwproc] Wait for Commands...
1,281,269 UART: [fwproc] Recv command 0x46574c44
1,282,002 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,067 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,045 >>> mbox cmd response: success
2,779,301 UART: [afmc] ++
2,779,469 UART: [afmc] CDI.KEYID = 6
2,779,832 UART: [afmc] SUBJECT.KEYID = 7
2,780,258 UART: [afmc] AUTHORITY.KEYID = 5
2,816,527 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,226 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,975 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,671 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,570 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,263 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,207 UART: [afmc] --
2,860,206 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,228 UART: [cold-reset] --
2,861,162 UART: [state] Locking Datavault
2,862,253 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,857 UART: [state] Locking ICCM
2,863,363 UART: [exit] Launching FMC @ 0x40000000
2,868,660 UART:
2,868,676 UART: Running Caliptra FMC ...
2,869,084 UART:
2,869,314 UART: [fmc] Received command: 0x46574C44
2,870,140 UART:
2,870,156 UART: Running Caliptra ROM ...
2,870,564 UART:
2,870,706 UART: [state] CFI Enabled
2,873,552 UART: [state] LifecycleState = Unprovisioned
2,874,207 UART: [state] DebugLocked = No
2,874,935 UART: [state] WD Timer not started. Device not locked for debugging
2,876,283 UART: [kat] SHA2-256
3,679,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,937 UART: [kat] ++
3,684,089 UART: [kat] sha1
3,688,419 UART: [kat] SHA2-256
3,690,359 UART: [kat] SHA2-384
3,693,176 UART: [kat] SHA2-512-ACC
3,695,076 UART: [kat] ECC-384
3,704,437 UART: [kat] HMAC-384Kdf
3,709,265 UART: [kat] LMS
3,957,577 UART: [kat] --
3,958,371 UART: [update-reset] ++
5,275,623 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,094 >>> mbox cmd response: success
5,429,379 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,393 UART: [update-reset Success] --
5,437,802 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,438,230 UART: [state] Locking Datavault
5,438,860 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,464 UART: [state] Locking ICCM
5,440,100 UART: [exit] Launching FMC @ 0x40000000
5,445,397 UART:
5,445,413 UART: Running Caliptra FMC ...
5,445,821 UART:
5,446,043 UART: [fmc] Received command: 0x1000000D
5,447,135 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,163 ready_for_fw is high
1,060,163 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,230 >>> mbox cmd response: success
2,689,487 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,540 UART:
2,695,556 UART: Running Caliptra FMC ...
2,695,964 UART:
2,696,194 UART: [fmc] Received command: 0x46574C44
5,140,842 >>> mbox cmd response: success
5,148,408 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,153,990 UART:
5,154,006 UART: Running Caliptra FMC ...
5,154,414 UART:
5,154,636 UART: [fmc] Received command: 0x1000000D
5,155,728 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,753 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
891,420 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,524 UART: [kat] ++
895,676 UART: [kat] sha1
899,770 UART: [kat] SHA2-256
901,710 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
915,969 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,372 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 ready_for_fw is high
1,174,290 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,105 UART: [idev] Erasing UDS.KEYID = 0
1,199,629 UART: [idev] Sha1 KeyId Algorithm
1,208,445 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,467 UART: [ldev] AUTHORITY.KEYID = 7
1,210,930 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,242,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,562 UART: [ldev] --
1,281,839 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,189 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,109 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,836 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,716 >>> mbox cmd response: success
2,780,768 UART: [afmc] ++
2,780,936 UART: [afmc] CDI.KEYID = 6
2,781,299 UART: [afmc] SUBJECT.KEYID = 7
2,781,725 UART: [afmc] AUTHORITY.KEYID = 5
2,817,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,882 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,578 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,477 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,170 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,890 UART: [afmc] --
2,860,685 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,707 UART: [cold-reset] --
2,861,547 UART: [state] Locking Datavault
2,862,674 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,278 UART: [state] Locking ICCM
2,863,944 UART: [exit] Launching FMC @ 0x40000000
2,869,241 UART:
2,869,257 UART: Running Caliptra FMC ...
2,869,665 UART:
2,869,895 UART: [fmc] Received command: 0x46574C44
2,870,721 UART:
2,870,737 UART: Running Caliptra ROM ...
2,871,145 UART:
2,871,200 UART: [state] CFI Enabled
2,873,248 UART: [state] LifecycleState = Unprovisioned
2,873,903 UART: [state] DebugLocked = No
2,874,575 UART: [state] WD Timer not started. Device not locked for debugging
2,875,727 UART: [kat] SHA2-256
3,679,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,381 UART: [kat] ++
3,683,533 UART: [kat] sha1
3,687,585 UART: [kat] SHA2-256
3,689,525 UART: [kat] SHA2-384
3,692,240 UART: [kat] SHA2-512-ACC
3,694,140 UART: [kat] ECC-384
3,703,989 UART: [kat] HMAC-384Kdf
3,708,607 UART: [kat] LMS
3,956,919 UART: [kat] --
3,957,737 UART: [update-reset] ++
5,275,847 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,046 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,516 >>> mbox cmd response: success
5,429,727 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,741 UART: [update-reset Success] --
5,438,150 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,438,830 UART: [state] Locking Datavault
5,439,590 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,194 UART: [state] Locking ICCM
5,440,704 UART: [exit] Launching FMC @ 0x40000000
5,446,001 UART:
5,446,017 UART: Running Caliptra FMC ...
5,446,425 UART:
5,446,647 UART: [fmc] Received command: 0x1000000D
5,447,739 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,342 ready_for_fw is high
1,059,342 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,317 >>> mbox cmd response: success
2,686,688 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,901 UART:
2,692,917 UART: Running Caliptra FMC ...
2,693,325 UART:
2,693,555 UART: [fmc] Received command: 0x46574C44
5,138,998 >>> mbox cmd response: success
5,146,656 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,152,294 UART:
5,152,310 UART: Running Caliptra FMC ...
5,152,718 UART:
5,152,940 UART: [fmc] Received command: 0x1000000D
5,154,032 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,647 UART: [kat] SHA2-256
891,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,301 UART: [kat] ++
895,453 UART: [kat] sha1
899,641 UART: [kat] SHA2-256
901,581 UART: [kat] SHA2-384
904,290 UART: [kat] SHA2-512-ACC
906,191 UART: [kat] ECC-384
915,994 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,647 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,172 UART: [idev] Sha1 KeyId Algorithm
1,208,112 UART: [idev] --
1,208,983 UART: [ldev] ++
1,209,151 UART: [ldev] CDI.KEYID = 6
1,209,515 UART: [ldev] SUBJECT.KEYID = 5
1,209,942 UART: [ldev] AUTHORITY.KEYID = 7
1,210,405 UART: [ldev] FE.KEYID = 1
1,215,813 UART: [ldev] Erasing FE.KEYID = 1
1,242,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,003 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,047 >>> mbox cmd response: success
2,782,251 UART: [afmc] ++
2,782,419 UART: [afmc] CDI.KEYID = 6
2,782,782 UART: [afmc] SUBJECT.KEYID = 7
2,783,208 UART: [afmc] AUTHORITY.KEYID = 5
2,818,917 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,180 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,929 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,625 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,524 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,217 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,953 UART: [afmc] --
2,861,902 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,924 UART: [cold-reset] --
2,862,900 UART: [state] Locking Datavault
2,863,841 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,445 UART: [state] Locking ICCM
2,865,011 UART: [exit] Launching FMC @ 0x40000000
2,870,308 UART:
2,870,324 UART: Running Caliptra FMC ...
2,870,732 UART:
2,870,962 UART: [fmc] Received command: 0x46574C44
2,871,788 UART:
2,871,804 UART: Running Caliptra ROM ...
2,872,212 UART:
2,872,354 UART: [state] CFI Enabled
2,875,080 UART: [state] LifecycleState = Unprovisioned
2,875,735 UART: [state] DebugLocked = No
2,876,279 UART: [state] WD Timer not started. Device not locked for debugging
2,877,465 UART: [kat] SHA2-256
3,681,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,119 UART: [kat] ++
3,685,271 UART: [kat] sha1
3,689,499 UART: [kat] SHA2-256
3,691,439 UART: [kat] SHA2-384
3,694,082 UART: [kat] SHA2-512-ACC
3,695,982 UART: [kat] ECC-384
3,706,005 UART: [kat] HMAC-384Kdf
3,710,703 UART: [kat] LMS
3,959,015 UART: [kat] --
3,959,945 UART: [update-reset] ++
5,276,651 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,854 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,324 >>> mbox cmd response: success
5,430,579 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,593 UART: [update-reset Success] --
5,439,002 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,439,644 UART: [state] Locking Datavault
5,440,546 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,150 UART: [state] Locking ICCM
5,441,788 UART: [exit] Launching FMC @ 0x40000000
5,447,085 UART:
5,447,101 UART: Running Caliptra FMC ...
5,447,509 UART:
5,447,731 UART: [fmc] Received command: 0x1000000D
5,448,823 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,833 ready_for_fw is high
1,059,833 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,180 >>> mbox cmd response: success
2,688,795 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,170 UART:
2,695,186 UART: Running Caliptra FMC ...
2,695,594 UART:
2,695,824 UART: [fmc] Received command: 0x46574C44
5,140,316 >>> mbox cmd response: success
5,147,860 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,153,358 UART:
5,153,374 UART: Running Caliptra FMC ...
5,153,782 UART:
5,154,004 UART: [fmc] Received command: 0x1000000D
5,155,096 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,466 UART: [kat] SHA2-256
901,406 UART: [kat] SHA2-384
904,033 UART: [kat] SHA2-512-ACC
905,934 UART: [kat] ECC-384
915,675 UART: [kat] HMAC-384Kdf
920,455 UART: [kat] LMS
1,168,767 UART: [kat] --
1,169,588 UART: [cold-reset] ++
1,170,058 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,174,198 ready_for_fw is high
1,174,198 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,061 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,237 UART: [idev] --
1,209,368 UART: [ldev] ++
1,209,536 UART: [ldev] CDI.KEYID = 6
1,209,900 UART: [ldev] SUBJECT.KEYID = 5
1,210,327 UART: [ldev] AUTHORITY.KEYID = 7
1,210,790 UART: [ldev] FE.KEYID = 1
1,216,068 UART: [ldev] Erasing FE.KEYID = 1
1,242,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,996 UART: [ldev] --
1,281,315 UART: [fwproc] Wait for Commands...
1,281,890 UART: [fwproc] Recv command 0x46574c44
1,282,623 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,468 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,482 >>> mbox cmd response: success
2,780,582 UART: [afmc] ++
2,780,750 UART: [afmc] CDI.KEYID = 6
2,781,113 UART: [afmc] SUBJECT.KEYID = 7
2,781,539 UART: [afmc] AUTHORITY.KEYID = 5
2,816,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,330 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,026 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,925 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,618 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,308 UART: [afmc] --
2,859,187 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,209 UART: [cold-reset] --
2,860,129 UART: [state] Locking Datavault
2,861,132 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,736 UART: [state] Locking ICCM
2,862,236 UART: [exit] Launching FMC @ 0x40000000
2,867,533 UART:
2,867,549 UART: Running Caliptra FMC ...
2,867,957 UART:
2,868,187 UART: [fmc] Received command: 0x46574C44
2,869,013 UART:
2,869,029 UART: Running Caliptra ROM ...
2,869,437 UART:
2,869,492 UART: [state] CFI Enabled
2,871,420 UART: [state] LifecycleState = Unprovisioned
2,872,075 UART: [state] DebugLocked = No
2,872,595 UART: [state] WD Timer not started. Device not locked for debugging
2,873,867 UART: [kat] SHA2-256
3,677,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,521 UART: [kat] ++
3,681,673 UART: [kat] sha1
3,685,985 UART: [kat] SHA2-256
3,687,925 UART: [kat] SHA2-384
3,690,504 UART: [kat] SHA2-512-ACC
3,692,404 UART: [kat] ECC-384
3,701,891 UART: [kat] HMAC-384Kdf
3,706,583 UART: [kat] LMS
3,954,895 UART: [kat] --
3,955,955 UART: [update-reset] ++
5,273,681 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,128 >>> mbox cmd response: success
5,427,311 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,325 UART: [update-reset Success] --
5,435,734 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,436,366 UART: [state] Locking Datavault
5,437,136 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,740 UART: [state] Locking ICCM
5,438,392 UART: [exit] Launching FMC @ 0x40000000
5,443,689 UART:
5,443,705 UART: Running Caliptra FMC ...
5,444,113 UART:
5,444,335 UART: [fmc] Received command: 0x1000000D
5,445,427 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,050 ready_for_fw is high
1,059,050 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,619 >>> mbox cmd response: success
2,686,328 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,497 UART:
2,692,513 UART: Running Caliptra FMC ...
2,692,921 UART:
2,693,151 UART: [fmc] Received command: 0x46574C44
5,137,554 >>> mbox cmd response: success
5,145,186 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,150,884 UART:
5,150,900 UART: Running Caliptra FMC ...
5,151,308 UART:
5,151,530 UART: [fmc] Received command: 0x1000000D
5,152,622 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
891,291 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,395 UART: [kat] ++
895,547 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,496 UART: [kat] HMAC-384Kdf
920,938 UART: [kat] LMS
1,169,250 UART: [kat] --
1,170,097 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,172,955 UART: [idev] ++
1,173,123 UART: [idev] CDI.KEYID = 6
1,173,484 UART: [idev] SUBJECT.KEYID = 7
1,173,909 UART: [idev] UDS.KEYID = 0
1,174,255 ready_for_fw is high
1,174,255 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,326 UART: [idev] Erasing UDS.KEYID = 0
1,198,020 UART: [idev] Sha1 KeyId Algorithm
1,206,952 UART: [idev] --
1,208,209 UART: [ldev] ++
1,208,377 UART: [ldev] CDI.KEYID = 6
1,208,741 UART: [ldev] SUBJECT.KEYID = 5
1,209,168 UART: [ldev] AUTHORITY.KEYID = 7
1,209,631 UART: [ldev] FE.KEYID = 1
1,214,775 UART: [ldev] Erasing FE.KEYID = 1
1,241,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,597 UART: [ldev] --
1,280,848 UART: [fwproc] Wait for Commands...
1,281,661 UART: [fwproc] Recv command 0x46574c44
1,282,394 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,763 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,811 >>> mbox cmd response: success
2,780,017 UART: [afmc] ++
2,780,185 UART: [afmc] CDI.KEYID = 6
2,780,548 UART: [afmc] SUBJECT.KEYID = 7
2,780,974 UART: [afmc] AUTHORITY.KEYID = 5
2,816,971 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,973 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,669 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,568 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,261 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,893 UART: [afmc] --
2,859,892 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,914 UART: [cold-reset] --
2,860,716 UART: [state] Locking Datavault
2,861,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,363 UART: [state] Locking ICCM
2,862,829 UART: [exit] Launching FMC @ 0x40000000
2,868,126 UART:
2,868,142 UART: Running Caliptra FMC ...
2,868,550 UART:
2,868,780 UART: [fmc] Received command: 0x46574C44
2,869,606 UART:
2,869,622 UART: Running Caliptra ROM ...
2,870,030 UART:
2,870,172 UART: [state] CFI Enabled
2,872,728 UART: [state] LifecycleState = Unprovisioned
2,873,383 UART: [state] DebugLocked = No
2,873,889 UART: [state] WD Timer not started. Device not locked for debugging
2,875,113 UART: [kat] SHA2-256
3,678,663 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,767 UART: [kat] ++
3,682,919 UART: [kat] sha1
3,687,021 UART: [kat] SHA2-256
3,688,961 UART: [kat] SHA2-384
3,691,688 UART: [kat] SHA2-512-ACC
3,693,588 UART: [kat] ECC-384
3,703,395 UART: [kat] HMAC-384Kdf
3,708,139 UART: [kat] LMS
3,956,451 UART: [kat] --
3,957,287 UART: [update-reset] ++
5,275,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,426 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,896 >>> mbox cmd response: success
5,429,147 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,161 UART: [update-reset Success] --
5,437,570 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,438,094 UART: [state] Locking Datavault
5,438,804 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,408 UART: [state] Locking ICCM
5,439,982 UART: [exit] Launching FMC @ 0x40000000
5,445,279 UART:
5,445,295 UART: Running Caliptra FMC ...
5,445,703 UART:
5,445,925 UART: [fmc] Received command: 0x1000000D
5,447,017 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,601 ready_for_fw is high
1,059,601 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,834 >>> mbox cmd response: success
2,689,949 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,696,058 UART:
2,696,074 UART: Running Caliptra FMC ...
2,696,482 UART:
2,696,712 UART: [fmc] Received command: 0x46574C44
5,141,678 >>> mbox cmd response: success
5,149,280 <<< Executing mbox cmd 0x1000000d (0 bytes) from SoC
5,155,156 UART:
5,155,172 UART: Running Caliptra FMC ...
5,155,580 UART:
5,155,802 UART: [fmc] Received command: 0x1000000D
5,156,894 >>> mbox cmd response data (40 bytes)
test test_update_reset::test_check_rom_update_reset_status_reg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.32s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.55s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.53s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.45s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.54s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.52s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.46s
running 1 test
test test_update_reset::test_fmc_is_16k ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
191,993 UART:
192,342 UART: Running Caliptra ROM ...
193,672 UART:
193,836 UART: [state] CFI Enabled
267,605 UART: [state] LifecycleState = Unprovisioned
269,550 UART: [state] DebugLocked = No
270,799 UART: [state] WD Timer not started. Device not locked for debugging
273,894 UART: [kat] SHA2-256
453,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,320 UART: [kat] ++
464,857 UART: [kat] sha1
476,450 UART: [kat] SHA2-256
479,171 UART: [kat] SHA2-384
485,657 UART: [kat] SHA2-512-ACC
488,028 UART: [kat] ECC-384
2,949,446 UART: [kat] HMAC-384Kdf
2,973,202 UART: [kat] LMS
3,449,739 UART: [kat] --
3,454,383 UART: [cold-reset] ++
3,456,675 UART: [fht] FHT @ 0x50003400
3,467,750 UART: [idev] ++
3,468,326 UART: [idev] CDI.KEYID = 6
3,469,242 UART: [idev] SUBJECT.KEYID = 7
3,470,496 UART: [idev] UDS.KEYID = 0
3,471,431 ready_for_fw is high
3,471,636 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,616,158 UART: [idev] Erasing UDS.KEYID = 0
5,988,346 UART: [idev] Sha1 KeyId Algorithm
6,011,795 UART: [idev] --
6,016,770 UART: [ldev] ++
6,017,346 UART: [ldev] CDI.KEYID = 6
6,018,264 UART: [ldev] SUBJECT.KEYID = 5
6,019,487 UART: [ldev] AUTHORITY.KEYID = 7
6,020,729 UART: [ldev] FE.KEYID = 1
6,059,427 UART: [ldev] Erasing FE.KEYID = 1
8,564,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,670 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,064 UART: [ldev] --
10,372,450 UART: [fwproc] Wait for Commands...
10,374,548 UART: [fwproc] Recv command 0x46574c44
10,376,536 UART: [fwproc] Recv'd Img size: 114888 bytes
13,817,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,897,396 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,957,613 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,286,372 >>> mbox cmd response: success
14,290,725 UART: [afmc] ++
14,291,319 UART: [afmc] CDI.KEYID = 6
14,292,298 UART: [afmc] SUBJECT.KEYID = 7
14,293,459 UART: [afmc] AUTHORITY.KEYID = 5
16,833,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,578,114 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,593,946 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,609,959 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,625,468 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,650,630 UART: [afmc] --
18,656,537 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,801,731 UART: [cold-reset] --
18,802,609 UART: [state] Locking Datavault
18,803,771 UART: [state] Locking PCR0, PCR1 and PCR31
18,805,322 UART: [state] Locking ICCM
18,806,238 UART: [exit] Launching FMC @ 0x40000000
18,807,663 UART:
18,807,832 UART: Running Caliptra FMC ...
18,808,935 UART:
18,809,118 UART: [fmc] Received command: 0x46574C44
18,810,584 UART:
18,810,761 UART: Running Caliptra ROM ...
18,811,868 UART:
18,812,031 UART: [state] CFI Enabled
18,865,902 UART: [state] LifecycleState = Unprovisioned
18,867,837 UART: [state] DebugLocked = No
18,869,874 UART: [state] WD Timer not started. Device not locked for debugging
18,873,453 UART: [kat] SHA2-256
19,053,131 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,063,913 UART: [kat] ++
19,064,463 UART: [kat] sha1
19,076,228 UART: [kat] SHA2-256
19,078,904 UART: [kat] SHA2-384
19,084,683 UART: [kat] SHA2-512-ACC
19,087,046 UART: [kat] ECC-384
21,549,538 UART: [kat] HMAC-384Kdf
21,571,588 UART: [kat] LMS
22,048,047 UART: [kat] --
22,052,202 UART: [update-reset] ++
25,509,134 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,512,449 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,899,112 UART: [update-reset] Copying MAN_2 To MAN_1
25,936,232 UART: [update-reset Success] --
25,937,562 >>> mbox cmd response: success
25,937,800 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,940,448 UART: [state] Locking Datavault
25,943,760 UART: [state] Locking PCR0, PCR1 and PCR31
25,945,528 UART: [state] Locking ICCM
25,947,630 UART: [exit] Launching FMC @ 0x40000000
25,956,039 UART:
25,956,323 UART: Running Caliptra FMC ...
25,957,459 UART:
25,957,626 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,959,265 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,459,207 ready_for_fw is high
3,459,628 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,163,016 >>> mbox cmd response: success
18,435,179 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,580,223 UART:
18,580,596 UART: Running Caliptra FMC ...
18,581,726 UART:
18,581,893 UART: [fmc] Received command: 0x46574C44
25,699,097 >>> mbox cmd response: success
25,699,896 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,712,471 UART:
25,712,784 UART: Running Caliptra FMC ...
25,714,044 UART:
25,714,215 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,715,887 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,372 UART:
192,738 UART: Running Caliptra ROM ...
193,837 UART:
603,604 UART: [state] CFI Enabled
617,038 UART: [state] LifecycleState = Unprovisioned
618,946 UART: [state] DebugLocked = No
620,976 UART: [state] WD Timer not started. Device not locked for debugging
623,931 UART: [kat] SHA2-256
803,550 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,353 UART: [kat] ++
814,827 UART: [kat] sha1
825,497 UART: [kat] SHA2-256
828,238 UART: [kat] SHA2-384
833,586 UART: [kat] SHA2-512-ACC
835,952 UART: [kat] ECC-384
3,280,906 UART: [kat] HMAC-384Kdf
3,293,423 UART: [kat] LMS
3,769,966 UART: [kat] --
3,774,811 UART: [cold-reset] ++
3,777,344 UART: [fht] FHT @ 0x50003400
3,788,901 UART: [idev] ++
3,789,486 UART: [idev] CDI.KEYID = 6
3,790,440 UART: [idev] SUBJECT.KEYID = 7
3,791,683 UART: [idev] UDS.KEYID = 0
3,792,607 ready_for_fw is high
3,792,791 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,937,415 UART: [idev] Erasing UDS.KEYID = 0
6,275,027 UART: [idev] Sha1 KeyId Algorithm
6,298,257 UART: [idev] --
6,304,520 UART: [ldev] ++
6,305,140 UART: [ldev] CDI.KEYID = 6
6,306,022 UART: [ldev] SUBJECT.KEYID = 5
6,307,237 UART: [ldev] AUTHORITY.KEYID = 7
6,308,523 UART: [ldev] FE.KEYID = 1
6,319,787 UART: [ldev] Erasing FE.KEYID = 1
8,799,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,919 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,141 UART: [ldev] --
10,592,301 UART: [fwproc] Wait for Commands...
10,594,184 UART: [fwproc] Recv command 0x46574c44
10,596,224 UART: [fwproc] Recv'd Img size: 114888 bytes
14,038,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,119,723 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,179,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,507,952 >>> mbox cmd response: success
14,512,651 UART: [afmc] ++
14,513,281 UART: [afmc] CDI.KEYID = 6
14,514,194 UART: [afmc] SUBJECT.KEYID = 7
14,515,351 UART: [afmc] AUTHORITY.KEYID = 5
17,016,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,739,702 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,741,884 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,757,659 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,773,745 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,789,220 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,812,634 UART: [afmc] --
18,817,690 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,962,308 UART: [cold-reset] --
18,963,168 UART: [state] Locking Datavault
18,964,323 UART: [state] Locking PCR0, PCR1 and PCR31
18,965,856 UART: [state] Locking ICCM
18,966,758 UART: [exit] Launching FMC @ 0x40000000
18,968,185 UART:
18,968,339 UART: Running Caliptra FMC ...
18,969,436 UART:
18,969,586 UART: [fmc] Received command: 0x46574C44
18,971,068 UART:
18,971,231 UART: Running Caliptra ROM ...
18,972,243 UART:
18,972,381 UART: [state] CFI Enabled
18,979,875 UART: [state] LifecycleState = Unprovisioned
18,981,808 UART: [state] DebugLocked = No
18,984,444 UART: [state] WD Timer not started. Device not locked for debugging
18,987,914 UART: [kat] SHA2-256
19,167,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,178,396 UART: [kat] ++
19,178,849 UART: [kat] sha1
19,190,482 UART: [kat] SHA2-256
19,193,172 UART: [kat] SHA2-384
19,199,861 UART: [kat] SHA2-512-ACC
19,202,203 UART: [kat] ECC-384
21,640,351 UART: [kat] HMAC-384Kdf
21,651,730 UART: [kat] LMS
22,128,155 UART: [kat] --
22,133,647 UART: [update-reset] ++
25,577,662 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,581,911 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,967,450 UART: [update-reset] Copying MAN_2 To MAN_1
26,004,557 UART: [update-reset Success] --
26,005,905 >>> mbox cmd response: success
26,006,130 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
26,008,931 UART: [state] Locking Datavault
26,011,268 UART: [state] Locking PCR0, PCR1 and PCR31
26,013,025 UART: [state] Locking ICCM
26,015,255 UART: [exit] Launching FMC @ 0x40000000
26,023,650 UART:
26,023,889 UART: Running Caliptra FMC ...
26,024,926 UART:
26,025,088 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,026,726 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,781,263 ready_for_fw is high
3,781,870 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,394,887 >>> mbox cmd response: success
18,630,841 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,775,638 UART:
18,776,040 UART: Running Caliptra FMC ...
18,777,252 UART:
18,777,429 UART: [fmc] Received command: 0x46574C44
25,819,441 >>> mbox cmd response: success
25,819,848 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,832,488 UART:
25,832,746 UART: Running Caliptra FMC ...
25,833,833 UART:
25,833,979 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,835,616 >>> mbox cmd response: success
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,376 UART: [state] LifecycleState = Unprovisioned
86,031 UART: [state] DebugLocked = No
86,657 UART: [state] WD Timer not started. Device not locked for debugging
87,936 UART: [kat] SHA2-256
891,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,590 UART: [kat] ++
895,742 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,507 UART: [kat] SHA2-512-ACC
906,408 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,043 UART: [kat] LMS
1,169,355 UART: [kat] --
1,170,320 UART: [cold-reset] ++
1,170,674 UART: [fht] FHT @ 0x50003400
1,173,424 UART: [idev] ++
1,173,592 UART: [idev] CDI.KEYID = 6
1,173,953 UART: [idev] SUBJECT.KEYID = 7
1,174,378 UART: [idev] UDS.KEYID = 0
1,174,724 ready_for_fw is high
1,174,724 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,425 UART: [idev] Erasing UDS.KEYID = 0
1,199,441 UART: [idev] Sha1 KeyId Algorithm
1,208,425 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,216,096 UART: [ldev] Erasing FE.KEYID = 1
1,242,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,136 UART: [ldev] --
1,281,399 UART: [fwproc] Wait for Commands...
1,282,054 UART: [fwproc] Recv command 0x46574c44
1,282,787 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,458 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,382 >>> mbox cmd response: success
2,780,406 UART: [afmc] ++
2,780,574 UART: [afmc] CDI.KEYID = 6
2,780,937 UART: [afmc] SUBJECT.KEYID = 7
2,781,363 UART: [afmc] AUTHORITY.KEYID = 5
2,816,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,480 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,176 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,075 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,768 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,392 UART: [afmc] --
2,859,203 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,859,225 UART: [cold-reset] --
2,860,007 UART: [state] Locking Datavault
2,861,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,876 UART: [state] Locking ICCM
2,862,300 UART: [exit] Launching FMC @ 0x40000000
2,867,597 UART:
2,867,613 UART: Running Caliptra FMC ...
2,868,021 UART:
2,868,251 UART: [fmc] Received command: 0x46574C44
2,869,077 UART:
2,869,093 UART: Running Caliptra ROM ...
2,869,501 UART:
2,869,556 UART: [state] CFI Enabled
2,872,182 UART: [state] LifecycleState = Unprovisioned
2,872,837 UART: [state] DebugLocked = No
2,873,445 UART: [state] WD Timer not started. Device not locked for debugging
2,874,583 UART: [kat] SHA2-256
3,678,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,237 UART: [kat] ++
3,682,389 UART: [kat] sha1
3,686,479 UART: [kat] SHA2-256
3,688,419 UART: [kat] SHA2-384
3,691,222 UART: [kat] SHA2-512-ACC
3,693,122 UART: [kat] ECC-384
3,702,979 UART: [kat] HMAC-384Kdf
3,707,539 UART: [kat] LMS
3,955,851 UART: [kat] --
3,956,795 UART: [update-reset] ++
5,275,715 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,276,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,429,471 UART: [update-reset] Copying MAN_2 To MAN_1
5,437,485 UART: [update-reset Success] --
5,437,894 >>> mbox cmd response: success
5,437,894 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,438,602 UART: [state] Locking Datavault
5,439,288 UART: [state] Locking PCR0, PCR1 and PCR31
5,439,892 UART: [state] Locking ICCM
5,440,432 UART: [exit] Launching FMC @ 0x40000000
5,445,729 UART:
5,445,745 UART: Running Caliptra FMC ...
5,446,153 UART:
5,446,375 UART: [fmc] Received command: 0x1000000C
5,447,110 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,128 ready_for_fw is high
1,059,128 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,747 >>> mbox cmd response: success
2,686,250 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,173 UART:
2,692,189 UART: Running Caliptra FMC ...
2,692,597 UART:
2,692,827 UART: [fmc] Received command: 0x46574C44
5,145,602 >>> mbox cmd response: success
5,145,602 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,518 UART:
5,151,534 UART: Running Caliptra FMC ...
5,151,942 UART:
5,152,164 UART: [fmc] Received command: 0x1000000C
5,152,899 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,083 UART: [state] LifecycleState = Unprovisioned
85,738 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,523 UART: [kat] SHA2-256
891,073 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,177 UART: [kat] ++
895,329 UART: [kat] sha1
899,447 UART: [kat] SHA2-256
901,387 UART: [kat] SHA2-384
904,246 UART: [kat] SHA2-512-ACC
906,147 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,705 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,173,111 UART: [idev] ++
1,173,279 UART: [idev] CDI.KEYID = 6
1,173,640 UART: [idev] SUBJECT.KEYID = 7
1,174,065 UART: [idev] UDS.KEYID = 0
1,174,411 ready_for_fw is high
1,174,411 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,902 UART: [idev] --
1,210,001 UART: [ldev] ++
1,210,169 UART: [ldev] CDI.KEYID = 6
1,210,533 UART: [ldev] SUBJECT.KEYID = 5
1,210,960 UART: [ldev] AUTHORITY.KEYID = 7
1,211,423 UART: [ldev] FE.KEYID = 1
1,216,533 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,433 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,522 UART: [fwproc] Wait for Commands...
1,283,175 UART: [fwproc] Recv command 0x46574c44
1,283,908 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,423 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,108 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,357 >>> mbox cmd response: success
2,781,417 UART: [afmc] ++
2,781,585 UART: [afmc] CDI.KEYID = 6
2,781,948 UART: [afmc] SUBJECT.KEYID = 7
2,782,374 UART: [afmc] AUTHORITY.KEYID = 5
2,817,531 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,785 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,481 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,380 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,073 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,829 UART: [afmc] --
2,860,724 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,746 UART: [cold-reset] --
2,861,606 UART: [state] Locking Datavault
2,862,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,117 UART: [state] Locking ICCM
2,863,703 UART: [exit] Launching FMC @ 0x40000000
2,869,000 UART:
2,869,016 UART: Running Caliptra FMC ...
2,869,424 UART:
2,869,654 UART: [fmc] Received command: 0x46574C44
2,870,480 UART:
2,870,496 UART: Running Caliptra ROM ...
2,870,904 UART:
2,871,046 UART: [state] CFI Enabled
2,873,934 UART: [state] LifecycleState = Unprovisioned
2,874,589 UART: [state] DebugLocked = No
2,875,167 UART: [state] WD Timer not started. Device not locked for debugging
2,876,355 UART: [kat] SHA2-256
3,679,905 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,009 UART: [kat] ++
3,684,161 UART: [kat] sha1
3,688,467 UART: [kat] SHA2-256
3,690,407 UART: [kat] SHA2-384
3,692,992 UART: [kat] SHA2-512-ACC
3,694,892 UART: [kat] ECC-384
3,704,995 UART: [kat] HMAC-384Kdf
3,709,555 UART: [kat] LMS
3,957,867 UART: [kat] --
3,958,821 UART: [update-reset] ++
5,277,605 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,624 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,431,443 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,457 UART: [update-reset Success] --
5,439,866 >>> mbox cmd response: success
5,439,866 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,394 UART: [state] Locking Datavault
5,441,272 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,876 UART: [state] Locking ICCM
5,442,450 UART: [exit] Launching FMC @ 0x40000000
5,447,747 UART:
5,447,763 UART: Running Caliptra FMC ...
5,448,171 UART:
5,448,393 UART: [fmc] Received command: 0x1000000C
5,449,128 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,533 ready_for_fw is high
1,059,533 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,008 >>> mbox cmd response: success
2,689,221 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,126 UART:
2,695,142 UART: Running Caliptra FMC ...
2,695,550 UART:
2,695,780 UART: [fmc] Received command: 0x46574C44
5,147,862 >>> mbox cmd response: success
5,147,862 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,153,700 UART:
5,153,716 UART: Running Caliptra FMC ...
5,154,124 UART:
5,154,346 UART: [fmc] Received command: 0x1000000C
5,155,081 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,776 UART: [state] LifecycleState = Unprovisioned
86,431 UART: [state] DebugLocked = No
87,131 UART: [state] WD Timer not started. Device not locked for debugging
88,458 UART: [kat] SHA2-256
892,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,112 UART: [kat] ++
896,264 UART: [kat] sha1
900,708 UART: [kat] SHA2-256
902,648 UART: [kat] SHA2-384
905,199 UART: [kat] SHA2-512-ACC
907,100 UART: [kat] ECC-384
916,759 UART: [kat] HMAC-384Kdf
921,471 UART: [kat] LMS
1,169,783 UART: [kat] --
1,171,030 UART: [cold-reset] ++
1,171,480 UART: [fht] FHT @ 0x50003400
1,174,028 UART: [idev] ++
1,174,196 UART: [idev] CDI.KEYID = 6
1,174,557 UART: [idev] SUBJECT.KEYID = 7
1,174,982 UART: [idev] UDS.KEYID = 0
1,175,328 ready_for_fw is high
1,175,328 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,395 UART: [idev] Erasing UDS.KEYID = 0
1,200,073 UART: [idev] Sha1 KeyId Algorithm
1,208,943 UART: [idev] --
1,209,916 UART: [ldev] ++
1,210,084 UART: [ldev] CDI.KEYID = 6
1,210,448 UART: [ldev] SUBJECT.KEYID = 5
1,210,875 UART: [ldev] AUTHORITY.KEYID = 7
1,211,338 UART: [ldev] FE.KEYID = 1
1,216,570 UART: [ldev] Erasing FE.KEYID = 1
1,242,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,514 UART: [ldev] --
1,281,913 UART: [fwproc] Wait for Commands...
1,282,620 UART: [fwproc] Recv command 0x46574c44
1,283,353 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,168 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,853 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,228 >>> mbox cmd response: success
2,782,330 UART: [afmc] ++
2,782,498 UART: [afmc] CDI.KEYID = 6
2,782,861 UART: [afmc] SUBJECT.KEYID = 7
2,783,287 UART: [afmc] AUTHORITY.KEYID = 5
2,818,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,778 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,474 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,373 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,066 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,861,038 UART: [afmc] --
2,862,069 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,862,091 UART: [cold-reset] --
2,863,107 UART: [state] Locking Datavault
2,864,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,894 UART: [state] Locking ICCM
2,865,378 UART: [exit] Launching FMC @ 0x40000000
2,870,675 UART:
2,870,691 UART: Running Caliptra FMC ...
2,871,099 UART:
2,871,329 UART: [fmc] Received command: 0x46574C44
2,872,155 UART:
2,872,171 UART: Running Caliptra ROM ...
2,872,579 UART:
2,872,634 UART: [state] CFI Enabled
2,874,974 UART: [state] LifecycleState = Unprovisioned
2,875,629 UART: [state] DebugLocked = No
2,876,189 UART: [state] WD Timer not started. Device not locked for debugging
2,877,441 UART: [kat] SHA2-256
3,680,991 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,095 UART: [kat] ++
3,685,247 UART: [kat] sha1
3,689,461 UART: [kat] SHA2-256
3,691,401 UART: [kat] SHA2-384
3,694,070 UART: [kat] SHA2-512-ACC
3,695,970 UART: [kat] ECC-384
3,705,669 UART: [kat] HMAC-384Kdf
3,710,325 UART: [kat] LMS
3,958,637 UART: [kat] --
3,959,663 UART: [update-reset] ++
5,277,131 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,278,108 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,855 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,869 UART: [update-reset Success] --
5,439,278 >>> mbox cmd response: success
5,439,278 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,852 UART: [state] Locking Datavault
5,440,572 UART: [state] Locking PCR0, PCR1 and PCR31
5,441,176 UART: [state] Locking ICCM
5,441,802 UART: [exit] Launching FMC @ 0x40000000
5,447,099 UART:
5,447,115 UART: Running Caliptra FMC ...
5,447,523 UART:
5,447,745 UART: [fmc] Received command: 0x1000000C
5,448,480 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,492 ready_for_fw is high
1,059,492 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,591 >>> mbox cmd response: success
2,688,052 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,443 UART:
2,694,459 UART: Running Caliptra FMC ...
2,694,867 UART:
2,695,097 UART: [fmc] Received command: 0x46574C44
5,147,490 >>> mbox cmd response: success
5,147,490 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,153,178 UART:
5,153,194 UART: Running Caliptra FMC ...
5,153,602 UART:
5,153,824 UART: [fmc] Received command: 0x1000000C
5,154,559 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,356 UART: [kat] SHA2-512-ACC
906,257 UART: [kat] ECC-384
916,168 UART: [kat] HMAC-384Kdf
920,954 UART: [kat] LMS
1,169,266 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,793 UART: [fht] FHT @ 0x50003400
1,173,471 UART: [idev] ++
1,173,639 UART: [idev] CDI.KEYID = 6
1,174,000 UART: [idev] SUBJECT.KEYID = 7
1,174,425 UART: [idev] UDS.KEYID = 0
1,174,771 ready_for_fw is high
1,174,771 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,620 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,684 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,095 UART: [ldev] Erasing FE.KEYID = 1
1,242,284 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,555 UART: [ldev] --
1,281,774 UART: [fwproc] Wait for Commands...
1,282,461 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,673 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,515 >>> mbox cmd response: success
2,781,631 UART: [afmc] ++
2,781,799 UART: [afmc] CDI.KEYID = 6
2,782,162 UART: [afmc] SUBJECT.KEYID = 7
2,782,588 UART: [afmc] AUTHORITY.KEYID = 5
2,818,669 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,861 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,557 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,456 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,853,149 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,801 UART: [afmc] --
2,861,650 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,672 UART: [cold-reset] --
2,862,736 UART: [state] Locking Datavault
2,863,807 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,411 UART: [state] Locking ICCM
2,864,993 UART: [exit] Launching FMC @ 0x40000000
2,870,290 UART:
2,870,306 UART: Running Caliptra FMC ...
2,870,714 UART:
2,870,944 UART: [fmc] Received command: 0x46574C44
2,871,770 UART:
2,871,786 UART: Running Caliptra ROM ...
2,872,194 UART:
2,872,336 UART: [state] CFI Enabled
2,874,972 UART: [state] LifecycleState = Unprovisioned
2,875,627 UART: [state] DebugLocked = No
2,876,353 UART: [state] WD Timer not started. Device not locked for debugging
2,877,567 UART: [kat] SHA2-256
3,681,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,221 UART: [kat] ++
3,685,373 UART: [kat] sha1
3,689,717 UART: [kat] SHA2-256
3,691,657 UART: [kat] SHA2-384
3,694,506 UART: [kat] SHA2-512-ACC
3,696,406 UART: [kat] ECC-384
3,706,283 UART: [kat] HMAC-384Kdf
3,710,937 UART: [kat] LMS
3,959,249 UART: [kat] --
3,960,259 UART: [update-reset] ++
5,278,099 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,279,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,431,897 UART: [update-reset] Copying MAN_2 To MAN_1
5,439,911 UART: [update-reset Success] --
5,440,320 >>> mbox cmd response: success
5,440,320 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,440,738 UART: [state] Locking Datavault
5,441,432 UART: [state] Locking PCR0, PCR1 and PCR31
5,442,036 UART: [state] Locking ICCM
5,442,630 UART: [exit] Launching FMC @ 0x40000000
5,447,927 UART:
5,447,943 UART: Running Caliptra FMC ...
5,448,351 UART:
5,448,573 UART: [fmc] Received command: 0x1000000C
5,449,308 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,165 ready_for_fw is high
1,059,165 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,780 >>> mbox cmd response: success
2,688,869 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,022 UART:
2,695,038 UART: Running Caliptra FMC ...
2,695,446 UART:
2,695,676 UART: [fmc] Received command: 0x46574C44
5,149,634 >>> mbox cmd response: success
5,149,634 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,155,658 UART:
5,155,674 UART: Running Caliptra FMC ...
5,156,082 UART:
5,156,304 UART: [fmc] Received command: 0x1000000C
5,157,039 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,424 UART: [kat] SHA2-256
890,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,078 UART: [kat] ++
895,230 UART: [kat] sha1
899,320 UART: [kat] SHA2-256
901,260 UART: [kat] SHA2-384
904,123 UART: [kat] SHA2-512-ACC
906,024 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,512 UART: [cold-reset] ++
1,170,068 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,174,016 ready_for_fw is high
1,174,016 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,065 UART: [idev] Erasing UDS.KEYID = 0
1,198,091 UART: [idev] Sha1 KeyId Algorithm
1,206,827 UART: [idev] --
1,208,044 UART: [ldev] ++
1,208,212 UART: [ldev] CDI.KEYID = 6
1,208,576 UART: [ldev] SUBJECT.KEYID = 5
1,209,003 UART: [ldev] AUTHORITY.KEYID = 7
1,209,466 UART: [ldev] FE.KEYID = 1
1,214,848 UART: [ldev] Erasing FE.KEYID = 1
1,241,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,170 UART: [ldev] --
1,280,465 UART: [fwproc] Wait for Commands...
1,281,112 UART: [fwproc] Recv command 0x46574c44
1,281,845 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,376 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,328 >>> mbox cmd response: success
2,778,534 UART: [afmc] ++
2,778,702 UART: [afmc] CDI.KEYID = 6
2,779,065 UART: [afmc] SUBJECT.KEYID = 7
2,779,491 UART: [afmc] AUTHORITY.KEYID = 5
2,814,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,394 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,090 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,989 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,682 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,452 UART: [afmc] --
2,858,265 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,287 UART: [cold-reset] --
2,858,925 UART: [state] Locking Datavault
2,860,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,920 UART: [state] Locking ICCM
2,861,396 UART: [exit] Launching FMC @ 0x40000000
2,866,693 UART:
2,866,709 UART: Running Caliptra FMC ...
2,867,117 UART:
2,867,347 UART: [fmc] Received command: 0x46574C44
2,868,173 UART:
2,868,189 UART: Running Caliptra ROM ...
2,868,597 UART:
2,868,652 UART: [state] CFI Enabled
2,871,348 UART: [state] LifecycleState = Unprovisioned
2,872,003 UART: [state] DebugLocked = No
2,872,493 UART: [state] WD Timer not started. Device not locked for debugging
2,873,675 UART: [kat] SHA2-256
3,677,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,329 UART: [kat] ++
3,681,481 UART: [kat] sha1
3,685,727 UART: [kat] SHA2-256
3,687,667 UART: [kat] SHA2-384
3,690,554 UART: [kat] SHA2-512-ACC
3,692,454 UART: [kat] ECC-384
3,702,345 UART: [kat] HMAC-384Kdf
3,706,873 UART: [kat] LMS
3,955,185 UART: [kat] --
3,956,341 UART: [update-reset] ++
5,274,401 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,484 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,428,185 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,199 UART: [update-reset Success] --
5,436,608 >>> mbox cmd response: success
5,436,608 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,248 UART: [state] Locking Datavault
5,437,956 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,560 UART: [state] Locking ICCM
5,438,998 UART: [exit] Launching FMC @ 0x40000000
5,444,295 UART:
5,444,311 UART: Running Caliptra FMC ...
5,444,719 UART:
5,444,941 UART: [fmc] Received command: 0x1000000C
5,445,676 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,868 ready_for_fw is high
1,058,868 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,249 >>> mbox cmd response: success
2,685,644 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,691,849 UART:
2,691,865 UART: Running Caliptra FMC ...
2,692,273 UART:
2,692,503 UART: [fmc] Received command: 0x46574C44
5,144,692 >>> mbox cmd response: success
5,144,692 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,150,416 UART:
5,150,432 UART: Running Caliptra FMC ...
5,150,840 UART:
5,151,062 UART: [fmc] Received command: 0x1000000C
5,151,797 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
891,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,317 UART: [kat] ++
895,469 UART: [kat] sha1
899,655 UART: [kat] SHA2-256
901,595 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,769 UART: [fht] FHT @ 0x50003400
1,173,535 UART: [idev] ++
1,173,703 UART: [idev] CDI.KEYID = 6
1,174,064 UART: [idev] SUBJECT.KEYID = 7
1,174,489 UART: [idev] UDS.KEYID = 0
1,174,835 ready_for_fw is high
1,174,835 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,930 UART: [idev] Erasing UDS.KEYID = 0
1,200,084 UART: [idev] Sha1 KeyId Algorithm
1,208,902 UART: [idev] --
1,210,023 UART: [ldev] ++
1,210,191 UART: [ldev] CDI.KEYID = 6
1,210,555 UART: [ldev] SUBJECT.KEYID = 5
1,210,982 UART: [ldev] AUTHORITY.KEYID = 7
1,211,445 UART: [ldev] FE.KEYID = 1
1,216,387 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,817 UART: [ldev] --
1,281,248 UART: [fwproc] Wait for Commands...
1,281,901 UART: [fwproc] Recv command 0x46574c44
1,282,634 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,767 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,843 >>> mbox cmd response: success
2,780,999 UART: [afmc] ++
2,781,167 UART: [afmc] CDI.KEYID = 6
2,781,530 UART: [afmc] SUBJECT.KEYID = 7
2,781,956 UART: [afmc] AUTHORITY.KEYID = 5
2,817,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,397 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,093 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,992 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,685 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,425 UART: [afmc] --
2,860,448 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,470 UART: [cold-reset] --
2,861,216 UART: [state] Locking Datavault
2,862,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,161 UART: [state] Locking ICCM
2,863,631 UART: [exit] Launching FMC @ 0x40000000
2,868,928 UART:
2,868,944 UART: Running Caliptra FMC ...
2,869,352 UART:
2,869,582 UART: [fmc] Received command: 0x46574C44
2,870,408 UART:
2,870,424 UART: Running Caliptra ROM ...
2,870,832 UART:
2,870,974 UART: [state] CFI Enabled
2,873,938 UART: [state] LifecycleState = Unprovisioned
2,874,593 UART: [state] DebugLocked = No
2,875,147 UART: [state] WD Timer not started. Device not locked for debugging
2,876,283 UART: [kat] SHA2-256
3,679,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,937 UART: [kat] ++
3,684,089 UART: [kat] sha1
3,688,429 UART: [kat] SHA2-256
3,690,369 UART: [kat] SHA2-384
3,693,166 UART: [kat] SHA2-512-ACC
3,695,066 UART: [kat] ECC-384
3,704,963 UART: [kat] HMAC-384Kdf
3,709,639 UART: [kat] LMS
3,957,951 UART: [kat] --
3,958,841 UART: [update-reset] ++
5,276,625 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,748 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,403 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,417 UART: [update-reset Success] --
5,438,826 >>> mbox cmd response: success
5,438,826 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,254 UART: [state] Locking Datavault
5,440,002 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,606 UART: [state] Locking ICCM
5,441,112 UART: [exit] Launching FMC @ 0x40000000
5,446,409 UART:
5,446,425 UART: Running Caliptra FMC ...
5,446,833 UART:
5,447,055 UART: [fmc] Received command: 0x1000000C
5,447,790 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,489 ready_for_fw is high
1,059,489 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,662 >>> mbox cmd response: success
2,687,481 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,700 UART:
2,693,716 UART: Running Caliptra FMC ...
2,694,124 UART:
2,694,354 UART: [fmc] Received command: 0x46574C44
5,146,604 >>> mbox cmd response: success
5,146,604 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,294 UART:
5,152,310 UART: Running Caliptra FMC ...
5,152,718 UART:
5,152,940 UART: [fmc] Received command: 0x1000000C
5,153,675 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_boot_status ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,110 UART:
192,465 UART: Running Caliptra ROM ...
193,573 UART:
193,720 UART: [state] CFI Enabled
263,292 UART: [state] LifecycleState = Unprovisioned
265,263 UART: [state] DebugLocked = No
268,146 UART: [state] WD Timer not started. Device not locked for debugging
271,965 UART: [kat] SHA2-256
451,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,409 UART: [kat] ++
462,864 UART: [kat] sha1
474,591 UART: [kat] SHA2-256
477,249 UART: [kat] SHA2-384
483,242 UART: [kat] SHA2-512-ACC
485,618 UART: [kat] ECC-384
2,948,936 UART: [kat] HMAC-384Kdf
2,973,181 UART: [kat] LMS
3,449,734 UART: [kat] --
3,454,509 UART: [cold-reset] ++
3,455,659 UART: [fht] FHT @ 0x50003400
3,467,346 UART: [idev] ++
3,467,940 UART: [idev] CDI.KEYID = 6
3,468,866 UART: [idev] SUBJECT.KEYID = 7
3,470,116 UART: [idev] UDS.KEYID = 0
3,471,048 ready_for_fw is high
3,471,261 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,615,767 UART: [idev] Erasing UDS.KEYID = 0
5,987,898 UART: [idev] Sha1 KeyId Algorithm
6,012,535 UART: [idev] --
6,016,963 UART: [ldev] ++
6,017,541 UART: [ldev] CDI.KEYID = 6
6,018,484 UART: [ldev] SUBJECT.KEYID = 5
6,019,700 UART: [ldev] AUTHORITY.KEYID = 7
6,020,936 UART: [ldev] FE.KEYID = 1
6,059,598 UART: [ldev] Erasing FE.KEYID = 1
8,564,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,097 UART: [ldev] --
10,375,795 UART: [fwproc] Wait for Commands...
10,378,801 UART: [fwproc] Recv command 0x46574c44
10,380,797 UART: [fwproc] Recv'd Img size: 114888 bytes
13,824,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,900,695 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,960,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,288,346 >>> mbox cmd response: success
14,291,613 UART: [afmc] ++
14,292,386 UART: [afmc] CDI.KEYID = 6
14,293,306 UART: [afmc] SUBJECT.KEYID = 7
14,294,415 UART: [afmc] AUTHORITY.KEYID = 5
16,834,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,553,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,555,762 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,571,553 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,587,604 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,603,104 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,627,379 UART: [afmc] --
20,698,749 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,864,543 UART: [cold-reset] --
20,865,537 UART: [state] Locking Datavault
20,866,709 UART: [state] Locking PCR0, PCR1 and PCR31
20,868,278 UART: [state] Locking ICCM
20,869,215 UART: [exit] Launching FMC @ 0x40000000
20,870,655 UART:
20,870,828 UART: Running Caliptra FMC ...
20,871,939 UART:
20,872,105 UART: [fmc] Received command: 0x46574C44
20,873,578 UART:
20,873,742 UART: Running Caliptra ROM ...
20,874,763 UART:
20,874,919 UART: [state] CFI Enabled
20,937,756 UART: [state] LifecycleState = Unprovisioned
20,939,702 UART: [state] DebugLocked = No
20,941,065 UART: [state] WD Timer not started. Device not locked for debugging
20,944,594 UART: [kat] SHA2-256
21,124,230 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,135,026 UART: [kat] ++
21,135,516 UART: [kat] sha1
21,145,707 UART: [kat] SHA2-256
21,148,409 UART: [kat] SHA2-384
21,154,235 UART: [kat] SHA2-512-ACC
21,156,584 UART: [kat] ECC-384
23,619,687 UART: [kat] HMAC-384Kdf
23,642,231 UART: [kat] LMS
24,118,707 UART: [kat] --
24,123,612 UART: [update-reset] ++
27,776,344 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,779,025 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,220,554 >>> mbox cmd response: success
28,221,674 UART: [update-reset] Copying MAN_2 To MAN_1
28,258,804 UART: [update-reset Success] --
28,266,033 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,423,413 UART: [state] Locking Datavault
28,424,643 UART: [state] Locking PCR0, PCR1 and PCR31
28,426,200 UART: [state] Locking ICCM
28,427,124 UART: [exit] Launching FMC @ 0x40000000
28,428,555 UART:
28,428,726 UART: Running Caliptra FMC ...
28,429,829 UART:
28,429,991 UART: [fmc] Received command: 0x1000000E
29,207,808 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,462,398 ready_for_fw is high
3,462,792 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,186,962 >>> mbox cmd response: success
20,528,370 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,694,248 UART:
20,694,668 UART: Running Caliptra FMC ...
20,695,840 UART:
20,696,042 UART: [fmc] Received command: 0x46574C44
28,050,716 >>> mbox cmd response: success
28,079,226 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,236,633 UART:
28,236,957 UART: Running Caliptra FMC ...
28,238,161 UART:
28,238,338 UART: [fmc] Received command: 0x1000000E
29,021,041 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,363 UART:
192,729 UART: Running Caliptra ROM ...
193,811 UART:
603,463 UART: [state] CFI Enabled
616,996 UART: [state] LifecycleState = Unprovisioned
618,948 UART: [state] DebugLocked = No
620,689 UART: [state] WD Timer not started. Device not locked for debugging
624,608 UART: [kat] SHA2-256
804,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,092 UART: [kat] ++
815,646 UART: [kat] sha1
826,239 UART: [kat] SHA2-256
828,954 UART: [kat] SHA2-384
835,011 UART: [kat] SHA2-512-ACC
837,387 UART: [kat] ECC-384
3,284,273 UART: [kat] HMAC-384Kdf
3,295,725 UART: [kat] LMS
3,772,263 UART: [kat] --
3,777,962 UART: [cold-reset] ++
3,778,966 UART: [fht] FHT @ 0x50003400
3,789,934 UART: [idev] ++
3,790,490 UART: [idev] CDI.KEYID = 6
3,791,436 UART: [idev] SUBJECT.KEYID = 7
3,792,675 UART: [idev] UDS.KEYID = 0
3,793,645 ready_for_fw is high
3,793,832 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,938,124 UART: [idev] Erasing UDS.KEYID = 0
6,274,933 UART: [idev] Sha1 KeyId Algorithm
6,298,654 UART: [idev] --
6,303,515 UART: [ldev] ++
6,304,181 UART: [ldev] CDI.KEYID = 6
6,305,097 UART: [ldev] SUBJECT.KEYID = 5
6,306,258 UART: [ldev] AUTHORITY.KEYID = 7
6,307,488 UART: [ldev] FE.KEYID = 1
6,318,832 UART: [ldev] Erasing FE.KEYID = 1
8,793,569 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,194 UART: [ldev] --
10,587,133 UART: [fwproc] Wait for Commands...
10,589,625 UART: [fwproc] Recv command 0x46574c44
10,591,669 UART: [fwproc] Recv'd Img size: 114888 bytes
14,022,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,105,465 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,165,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,494,160 >>> mbox cmd response: success
14,498,681 UART: [afmc] ++
14,499,288 UART: [afmc] CDI.KEYID = 6
14,500,170 UART: [afmc] SUBJECT.KEYID = 7
14,501,437 UART: [afmc] AUTHORITY.KEYID = 5
17,004,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,725,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,727,933 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,743,693 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,759,824 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,775,311 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,799,274 UART: [afmc] --
20,870,967 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
21,037,097 UART: [cold-reset] --
21,038,065 UART: [state] Locking Datavault
21,039,183 UART: [state] Locking PCR0, PCR1 and PCR31
21,040,731 UART: [state] Locking ICCM
21,041,636 UART: [exit] Launching FMC @ 0x40000000
21,043,065 UART:
21,043,230 UART: Running Caliptra FMC ...
21,044,332 UART:
21,044,514 UART: [fmc] Received command: 0x46574C44
21,045,893 UART:
21,046,040 UART: Running Caliptra ROM ...
21,047,139 UART:
21,047,296 UART: [state] CFI Enabled
21,057,613 UART: [state] LifecycleState = Unprovisioned
21,059,505 UART: [state] DebugLocked = No
21,060,940 UART: [state] WD Timer not started. Device not locked for debugging
21,065,708 UART: [kat] SHA2-256
21,245,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,256,161 UART: [kat] ++
21,256,639 UART: [kat] sha1
21,268,672 UART: [kat] SHA2-256
21,271,350 UART: [kat] SHA2-384
21,278,583 UART: [kat] SHA2-512-ACC
21,280,928 UART: [kat] ECC-384
23,725,741 UART: [kat] HMAC-384Kdf
23,737,648 UART: [kat] LMS
24,214,129 UART: [kat] --
24,219,414 UART: [update-reset] ++
27,868,767 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
27,871,388 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
28,312,881 >>> mbox cmd response: success
28,313,653 UART: [update-reset] Copying MAN_2 To MAN_1
28,350,727 UART: [update-reset Success] --
28,357,560 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,514,927 UART: [state] Locking Datavault
28,516,146 UART: [state] Locking PCR0, PCR1 and PCR31
28,517,694 UART: [state] Locking ICCM
28,518,609 UART: [exit] Launching FMC @ 0x40000000
28,520,030 UART:
28,520,212 UART: Running Caliptra FMC ...
28,521,309 UART:
28,521,467 UART: [fmc] Received command: 0x1000000E
29,299,336 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,781,217 ready_for_fw is high
3,781,629 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,399,331 >>> mbox cmd response: success
20,695,369 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
20,861,036 UART:
20,861,453 UART: Running Caliptra FMC ...
20,862,535 UART:
20,862,685 UART: [fmc] Received command: 0x46574C44
28,143,606 >>> mbox cmd response: success
28,172,342 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
28,329,699 UART:
28,330,041 UART: Running Caliptra FMC ...
28,331,244 UART:
28,331,429 UART: [fmc] Received command: 0x1000000E
29,114,111 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,839 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
891,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,820 UART: [kat] ++
895,972 UART: [kat] sha1
900,292 UART: [kat] SHA2-256
902,232 UART: [kat] SHA2-384
904,943 UART: [kat] SHA2-512-ACC
906,844 UART: [kat] ECC-384
917,021 UART: [kat] HMAC-384Kdf
921,667 UART: [kat] LMS
1,169,979 UART: [kat] --
1,170,968 UART: [cold-reset] ++
1,171,330 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,487 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,510 UART: [ldev] --
1,280,869 UART: [fwproc] Wait for Commands...
1,281,616 UART: [fwproc] Recv command 0x46574c44
1,282,349 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,202 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,168 >>> mbox cmd response: success
2,780,344 UART: [afmc] ++
2,780,512 UART: [afmc] CDI.KEYID = 6
2,780,875 UART: [afmc] SUBJECT.KEYID = 7
2,781,301 UART: [afmc] AUTHORITY.KEYID = 5
2,816,488 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,016 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,712 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,611 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,304 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,018 UART: [afmc] --
2,860,053 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,860,075 UART: [cold-reset] --
2,860,835 UART: [state] Locking Datavault
2,862,082 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,686 UART: [state] Locking ICCM
2,863,188 UART: [exit] Launching FMC @ 0x40000000
2,868,485 UART:
2,868,501 UART: Running Caliptra FMC ...
2,868,909 UART:
2,869,139 UART: [fmc] Received command: 0x46574C44
2,869,965 UART:
2,869,981 UART: Running Caliptra ROM ...
2,870,389 UART:
2,870,444 UART: [state] CFI Enabled
2,872,946 UART: [state] LifecycleState = Unprovisioned
2,873,601 UART: [state] DebugLocked = No
2,874,311 UART: [state] WD Timer not started. Device not locked for debugging
2,875,459 UART: [kat] SHA2-256
3,679,009 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,113 UART: [kat] ++
3,683,265 UART: [kat] sha1
3,687,653 UART: [kat] SHA2-256
3,689,593 UART: [kat] SHA2-384
3,692,268 UART: [kat] SHA2-512-ACC
3,694,168 UART: [kat] ECC-384
3,703,513 UART: [kat] HMAC-384Kdf
3,707,995 UART: [kat] LMS
3,956,307 UART: [kat] --
3,957,251 UART: [update-reset] ++
5,460,516 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,461,645 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,638,419 >>> mbox cmd response: success
5,638,580 UART: [update-reset] Copying MAN_2 To MAN_1
5,646,594 UART: [update-reset Success] --
5,647,003 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,647,595 UART: [state] Locking Datavault
5,648,401 UART: [state] Locking PCR0, PCR1 and PCR31
5,649,005 UART: [state] Locking ICCM
5,649,437 UART: [exit] Launching FMC @ 0x40000000
5,654,734 UART:
5,654,750 UART: Running Caliptra FMC ...
5,655,158 UART:
5,655,380 UART: [fmc] Received command: 0x1000000E
6,000,434 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,530 ready_for_fw is high
1,059,530 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,865 >>> mbox cmd response: success
2,687,300 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,461 UART:
2,693,477 UART: Running Caliptra FMC ...
2,693,885 UART:
2,694,115 UART: [fmc] Received command: 0x46574C44
5,348,435 >>> mbox cmd response: success
5,356,061 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,361,665 UART:
5,361,681 UART: Running Caliptra FMC ...
5,362,089 UART:
5,362,311 UART: [fmc] Received command: 0x1000000E
5,707,365 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,692 UART: [kat] SHA2-512-ACC
906,593 UART: [kat] ECC-384
916,906 UART: [kat] HMAC-384Kdf
921,450 UART: [kat] LMS
1,169,762 UART: [kat] --
1,170,743 UART: [cold-reset] ++
1,171,279 UART: [fht] FHT @ 0x50003400
1,173,869 UART: [idev] ++
1,174,037 UART: [idev] CDI.KEYID = 6
1,174,398 UART: [idev] SUBJECT.KEYID = 7
1,174,823 UART: [idev] UDS.KEYID = 0
1,175,169 ready_for_fw is high
1,175,169 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,888 UART: [idev] Erasing UDS.KEYID = 0
1,200,018 UART: [idev] Sha1 KeyId Algorithm
1,209,014 UART: [idev] --
1,210,191 UART: [ldev] ++
1,210,359 UART: [ldev] CDI.KEYID = 6
1,210,723 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,879 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,414 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,615,689 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,641,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,781,631 >>> mbox cmd response: success
2,782,839 UART: [afmc] ++
2,783,007 UART: [afmc] CDI.KEYID = 6
2,783,370 UART: [afmc] SUBJECT.KEYID = 7
2,783,796 UART: [afmc] AUTHORITY.KEYID = 5
2,819,985 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,836,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,837,127 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,842,823 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,848,722 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,854,415 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,862,015 UART: [afmc] --
2,862,910 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,862,932 UART: [cold-reset] --
2,863,694 UART: [state] Locking Datavault
2,865,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,681 UART: [state] Locking ICCM
2,866,145 UART: [exit] Launching FMC @ 0x40000000
2,871,442 UART:
2,871,458 UART: Running Caliptra FMC ...
2,871,866 UART:
2,872,096 UART: [fmc] Received command: 0x46574C44
2,872,922 UART:
2,872,938 UART: Running Caliptra ROM ...
2,873,346 UART:
2,873,488 UART: [state] CFI Enabled
2,876,136 UART: [state] LifecycleState = Unprovisioned
2,876,791 UART: [state] DebugLocked = No
2,877,381 UART: [state] WD Timer not started. Device not locked for debugging
2,878,561 UART: [kat] SHA2-256
3,682,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,686,215 UART: [kat] ++
3,686,367 UART: [kat] sha1
3,690,773 UART: [kat] SHA2-256
3,692,713 UART: [kat] SHA2-384
3,695,432 UART: [kat] SHA2-512-ACC
3,697,332 UART: [kat] ECC-384
3,707,249 UART: [kat] HMAC-384Kdf
3,711,825 UART: [kat] LMS
3,960,137 UART: [kat] --
3,961,073 UART: [update-reset] ++
5,464,852 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,465,911 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,642,685 >>> mbox cmd response: success
5,642,992 UART: [update-reset] Copying MAN_2 To MAN_1
5,651,006 UART: [update-reset Success] --
5,651,415 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,651,931 UART: [state] Locking Datavault
5,652,859 UART: [state] Locking PCR0, PCR1 and PCR31
5,653,463 UART: [state] Locking ICCM
5,654,031 UART: [exit] Launching FMC @ 0x40000000
5,659,328 UART:
5,659,344 UART: Running Caliptra FMC ...
5,659,752 UART:
5,659,974 UART: [fmc] Received command: 0x1000000E
6,005,028 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 ready_for_fw is high
1,059,831 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,230 >>> mbox cmd response: success
2,688,833 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,716 UART:
2,694,732 UART: Running Caliptra FMC ...
2,695,140 UART:
2,695,370 UART: [fmc] Received command: 0x46574C44
5,351,595 >>> mbox cmd response: success
5,359,309 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,364,893 UART:
5,364,909 UART: Running Caliptra FMC ...
5,365,317 UART:
5,365,539 UART: [fmc] Received command: 0x1000000E
5,710,593 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,837 UART: [state] WD Timer not started. Device not locked for debugging
87,122 UART: [kat] SHA2-256
890,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,776 UART: [kat] ++
894,928 UART: [kat] sha1
899,110 UART: [kat] SHA2-256
901,050 UART: [kat] SHA2-384
903,839 UART: [kat] SHA2-512-ACC
905,740 UART: [kat] ECC-384
915,633 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,604 UART: [cold-reset] ++
1,169,930 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 ready_for_fw is high
1,173,976 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,439 UART: [idev] Erasing UDS.KEYID = 0
1,198,385 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,146 UART: [ldev] ++
1,208,314 UART: [ldev] CDI.KEYID = 6
1,208,678 UART: [ldev] SUBJECT.KEYID = 5
1,209,105 UART: [ldev] AUTHORITY.KEYID = 7
1,209,568 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,240,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,628 UART: [ldev] --
1,280,049 UART: [fwproc] Wait for Commands...
1,280,794 UART: [fwproc] Recv command 0x46574c44
1,281,527 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,611,888 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,573 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,816 >>> mbox cmd response: success
2,779,010 UART: [afmc] ++
2,779,178 UART: [afmc] CDI.KEYID = 6
2,779,541 UART: [afmc] SUBJECT.KEYID = 7
2,779,967 UART: [afmc] AUTHORITY.KEYID = 5
2,815,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,681 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,430 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,126 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,025 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,718 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,416 UART: [afmc] --
2,858,233 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,858,255 UART: [cold-reset] --
2,859,027 UART: [state] Locking Datavault
2,860,164 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,768 UART: [state] Locking ICCM
2,861,410 UART: [exit] Launching FMC @ 0x40000000
2,866,707 UART:
2,866,723 UART: Running Caliptra FMC ...
2,867,131 UART:
2,867,361 UART: [fmc] Received command: 0x46574C44
2,868,187 UART:
2,868,203 UART: Running Caliptra ROM ...
2,868,611 UART:
2,868,666 UART: [state] CFI Enabled
2,871,642 UART: [state] LifecycleState = Unprovisioned
2,872,297 UART: [state] DebugLocked = No
2,872,877 UART: [state] WD Timer not started. Device not locked for debugging
2,874,173 UART: [kat] SHA2-256
3,677,723 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,827 UART: [kat] ++
3,681,979 UART: [kat] sha1
3,686,295 UART: [kat] SHA2-256
3,688,235 UART: [kat] SHA2-384
3,691,062 UART: [kat] SHA2-512-ACC
3,692,962 UART: [kat] ECC-384
3,702,341 UART: [kat] HMAC-384Kdf
3,707,129 UART: [kat] LMS
3,955,441 UART: [kat] --
3,956,419 UART: [update-reset] ++
5,460,100 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,461,225 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,637,999 >>> mbox cmd response: success
5,638,142 UART: [update-reset] Copying MAN_2 To MAN_1
5,646,156 UART: [update-reset Success] --
5,646,565 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,647,159 UART: [state] Locking Datavault
5,647,803 UART: [state] Locking PCR0, PCR1 and PCR31
5,648,407 UART: [state] Locking ICCM
5,648,943 UART: [exit] Launching FMC @ 0x40000000
5,654,240 UART:
5,654,256 UART: Running Caliptra FMC ...
5,654,664 UART:
5,654,886 UART: [fmc] Received command: 0x1000000E
5,999,940 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,008 ready_for_fw is high
1,059,008 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,163 >>> mbox cmd response: success
2,685,958 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,691,739 UART:
2,691,755 UART: Running Caliptra FMC ...
2,692,163 UART:
2,692,393 UART: [fmc] Received command: 0x46574C44
5,348,437 >>> mbox cmd response: success
5,356,149 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,361,851 UART:
5,361,867 UART: Running Caliptra FMC ...
5,362,275 UART:
5,362,497 UART: [fmc] Received command: 0x1000000E
5,707,551 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
900,011 UART: [kat] SHA2-256
901,951 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,194 UART: [kat] LMS
1,169,506 UART: [kat] --
1,170,489 UART: [cold-reset] ++
1,170,843 UART: [fht] FHT @ 0x50003400
1,173,633 UART: [idev] ++
1,173,801 UART: [idev] CDI.KEYID = 6
1,174,162 UART: [idev] SUBJECT.KEYID = 7
1,174,587 UART: [idev] UDS.KEYID = 0
1,174,933 ready_for_fw is high
1,174,933 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,060 UART: [idev] Erasing UDS.KEYID = 0
1,199,888 UART: [idev] Sha1 KeyId Algorithm
1,208,836 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,451 UART: [ldev] --
1,282,882 UART: [fwproc] Wait for Commands...
1,283,673 UART: [fwproc] Recv command 0x46574c44
1,284,406 UART: [fwproc] Recv'd Img size: 114888 bytes
2,588,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,707 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,392 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,793 >>> mbox cmd response: success
2,781,917 UART: [afmc] ++
2,782,085 UART: [afmc] CDI.KEYID = 6
2,782,448 UART: [afmc] SUBJECT.KEYID = 7
2,782,874 UART: [afmc] AUTHORITY.KEYID = 5
2,818,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,215 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,911 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,810 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,503 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,109 UART: [afmc] --
2,860,960 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,860,982 UART: [cold-reset] --
2,861,670 UART: [state] Locking Datavault
2,862,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,267 UART: [state] Locking ICCM
2,863,699 UART: [exit] Launching FMC @ 0x40000000
2,868,996 UART:
2,869,012 UART: Running Caliptra FMC ...
2,869,420 UART:
2,869,650 UART: [fmc] Received command: 0x46574C44
2,870,476 UART:
2,870,492 UART: Running Caliptra ROM ...
2,870,900 UART:
2,871,042 UART: [state] CFI Enabled
2,873,802 UART: [state] LifecycleState = Unprovisioned
2,874,457 UART: [state] DebugLocked = No
2,875,103 UART: [state] WD Timer not started. Device not locked for debugging
2,876,255 UART: [kat] SHA2-256
3,679,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,909 UART: [kat] ++
3,684,061 UART: [kat] sha1
3,688,503 UART: [kat] SHA2-256
3,690,443 UART: [kat] SHA2-384
3,693,232 UART: [kat] SHA2-512-ACC
3,695,132 UART: [kat] ECC-384
3,705,007 UART: [kat] HMAC-384Kdf
3,709,579 UART: [kat] LMS
3,957,891 UART: [kat] --
3,958,743 UART: [update-reset] ++
5,463,258 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,464,333 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,641,107 >>> mbox cmd response: success
5,641,332 UART: [update-reset] Copying MAN_2 To MAN_1
5,649,346 UART: [update-reset Success] --
5,649,755 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,650,211 UART: [state] Locking Datavault
5,651,197 UART: [state] Locking PCR0, PCR1 and PCR31
5,651,801 UART: [state] Locking ICCM
5,652,447 UART: [exit] Launching FMC @ 0x40000000
5,657,744 UART:
5,657,760 UART: Running Caliptra FMC ...
5,658,168 UART:
5,658,390 UART: [fmc] Received command: 0x1000000E
6,003,444 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,047 ready_for_fw is high
1,059,047 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,252 >>> mbox cmd response: success
2,688,163 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,694,212 UART:
2,694,228 UART: Running Caliptra FMC ...
2,694,636 UART:
2,694,866 UART: [fmc] Received command: 0x46574C44
5,350,463 >>> mbox cmd response: success
5,358,091 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,363,847 UART:
5,363,863 UART: Running Caliptra FMC ...
5,364,271 UART:
5,364,493 UART: [fmc] Received command: 0x1000000E
5,709,547 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,087 UART: [state] WD Timer not started. Device not locked for debugging
87,226 UART: [kat] SHA2-256
890,776 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,880 UART: [kat] ++
895,032 UART: [kat] sha1
899,390 UART: [kat] SHA2-256
901,330 UART: [kat] SHA2-384
904,017 UART: [kat] SHA2-512-ACC
905,918 UART: [kat] ECC-384
915,295 UART: [kat] HMAC-384Kdf
919,845 UART: [kat] LMS
1,168,157 UART: [kat] --
1,168,910 UART: [cold-reset] ++
1,169,246 UART: [fht] FHT @ 0x50003400
1,171,926 UART: [idev] ++
1,172,094 UART: [idev] CDI.KEYID = 6
1,172,455 UART: [idev] SUBJECT.KEYID = 7
1,172,880 UART: [idev] UDS.KEYID = 0
1,173,226 ready_for_fw is high
1,173,226 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,051 UART: [idev] Erasing UDS.KEYID = 0
1,197,711 UART: [idev] Sha1 KeyId Algorithm
1,206,417 UART: [idev] --
1,207,442 UART: [ldev] ++
1,207,610 UART: [ldev] CDI.KEYID = 6
1,207,974 UART: [ldev] SUBJECT.KEYID = 5
1,208,401 UART: [ldev] AUTHORITY.KEYID = 7
1,208,864 UART: [ldev] FE.KEYID = 1
1,214,048 UART: [ldev] Erasing FE.KEYID = 1
1,239,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,956 UART: [ldev] --
1,279,255 UART: [fwproc] Wait for Commands...
1,279,990 UART: [fwproc] Recv command 0x46574c44
1,280,723 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,898 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,583 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,942 >>> mbox cmd response: success
2,778,012 UART: [afmc] ++
2,778,180 UART: [afmc] CDI.KEYID = 6
2,778,543 UART: [afmc] SUBJECT.KEYID = 7
2,778,969 UART: [afmc] AUTHORITY.KEYID = 5
2,814,626 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,488 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,184 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,083 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,776 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,622 UART: [afmc] --
2,857,415 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,857,437 UART: [cold-reset] --
2,858,395 UART: [state] Locking Datavault
2,859,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,082 UART: [state] Locking ICCM
2,860,710 UART: [exit] Launching FMC @ 0x40000000
2,866,007 UART:
2,866,023 UART: Running Caliptra FMC ...
2,866,431 UART:
2,866,661 UART: [fmc] Received command: 0x46574C44
2,867,487 UART:
2,867,503 UART: Running Caliptra ROM ...
2,867,911 UART:
2,867,966 UART: [state] CFI Enabled
2,870,814 UART: [state] LifecycleState = Unprovisioned
2,871,469 UART: [state] DebugLocked = No
2,872,009 UART: [state] WD Timer not started. Device not locked for debugging
2,873,335 UART: [kat] SHA2-256
3,676,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,989 UART: [kat] ++
3,681,141 UART: [kat] sha1
3,685,409 UART: [kat] SHA2-256
3,687,349 UART: [kat] SHA2-384
3,689,934 UART: [kat] SHA2-512-ACC
3,691,834 UART: [kat] ECC-384
3,701,423 UART: [kat] HMAC-384Kdf
3,705,941 UART: [kat] LMS
3,954,253 UART: [kat] --
3,955,081 UART: [update-reset] ++
5,458,340 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,459,361 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,636,135 >>> mbox cmd response: success
5,636,380 UART: [update-reset] Copying MAN_2 To MAN_1
5,644,394 UART: [update-reset Success] --
5,644,803 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,645,661 UART: [state] Locking Datavault
5,646,275 UART: [state] Locking PCR0, PCR1 and PCR31
5,646,879 UART: [state] Locking ICCM
5,647,315 UART: [exit] Launching FMC @ 0x40000000
5,652,612 UART:
5,652,628 UART: Running Caliptra FMC ...
5,653,036 UART:
5,653,258 UART: [fmc] Received command: 0x1000000E
5,998,312 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,608 ready_for_fw is high
1,058,608 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,907 >>> mbox cmd response: success
2,687,720 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,745 UART:
2,693,761 UART: Running Caliptra FMC ...
2,694,169 UART:
2,694,399 UART: [fmc] Received command: 0x46574C44
5,348,575 >>> mbox cmd response: success
5,356,105 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,362,155 UART:
5,362,171 UART: Running Caliptra FMC ...
5,362,579 UART:
5,362,801 UART: [fmc] Received command: 0x1000000E
5,707,855 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,895 UART: [kat] SHA2-256
901,835 UART: [kat] SHA2-384
904,540 UART: [kat] SHA2-512-ACC
906,441 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,230 UART: [kat] LMS
1,169,542 UART: [kat] --
1,170,629 UART: [cold-reset] ++
1,170,957 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 ready_for_fw is high
1,174,989 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,024 UART: [idev] Sha1 KeyId Algorithm
1,208,928 UART: [idev] --
1,209,979 UART: [ldev] ++
1,210,147 UART: [ldev] CDI.KEYID = 6
1,210,511 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,639 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,319 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,449 UART: [fwproc] Recv command 0x46574c44
1,284,182 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,743 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,599 >>> mbox cmd response: success
2,781,757 UART: [afmc] ++
2,781,925 UART: [afmc] CDI.KEYID = 6
2,782,288 UART: [afmc] SUBJECT.KEYID = 7
2,782,714 UART: [afmc] AUTHORITY.KEYID = 5
2,818,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,435 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,841,131 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,847,030 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,723 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,521 UART: [afmc] --
2,861,512 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,861,534 UART: [cold-reset] --
2,862,372 UART: [state] Locking Datavault
2,863,535 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,139 UART: [state] Locking ICCM
2,864,761 UART: [exit] Launching FMC @ 0x40000000
2,870,058 UART:
2,870,074 UART: Running Caliptra FMC ...
2,870,482 UART:
2,870,712 UART: [fmc] Received command: 0x46574C44
2,871,538 UART:
2,871,554 UART: Running Caliptra ROM ...
2,871,962 UART:
2,872,104 UART: [state] CFI Enabled
2,874,744 UART: [state] LifecycleState = Unprovisioned
2,875,399 UART: [state] DebugLocked = No
2,876,111 UART: [state] WD Timer not started. Device not locked for debugging
2,877,429 UART: [kat] SHA2-256
3,680,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,083 UART: [kat] ++
3,685,235 UART: [kat] sha1
3,689,341 UART: [kat] SHA2-256
3,691,281 UART: [kat] SHA2-384
3,694,132 UART: [kat] SHA2-512-ACC
3,696,032 UART: [kat] ECC-384
3,705,591 UART: [kat] HMAC-384Kdf
3,710,359 UART: [kat] LMS
3,958,671 UART: [kat] --
3,959,597 UART: [update-reset] ++
5,463,262 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,464,401 UART: [update-reset] Loading Runtime at addr 0x40004000 len 108804
5,641,175 >>> mbox cmd response: success
5,641,316 UART: [update-reset] Copying MAN_2 To MAN_1
5,649,330 UART: [update-reset Success] --
5,649,739 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,650,149 UART: [state] Locking Datavault
5,651,029 UART: [state] Locking PCR0, PCR1 and PCR31
5,651,633 UART: [state] Locking ICCM
5,652,189 UART: [exit] Launching FMC @ 0x40000000
5,657,486 UART:
5,657,502 UART: Running Caliptra FMC ...
5,657,910 UART:
5,658,132 UART: [fmc] Received command: 0x1000000E
6,003,186 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,689 ready_for_fw is high
1,059,689 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,034 >>> mbox cmd response: success
2,687,773 <<< Executing mbox cmd 0x46574c44 (131072 bytes) from SoC
2,693,944 UART:
2,693,960 UART: Running Caliptra FMC ...
2,694,368 UART:
2,694,598 UART: [fmc] Received command: 0x46574C44
5,350,189 >>> mbox cmd response: success
5,357,701 <<< Executing mbox cmd 0x1000000e (125196 bytes) from SoC
5,363,535 UART:
5,363,551 UART: Running Caliptra FMC ...
5,363,959 UART:
5,364,181 UART: [fmc] Received command: 0x1000000E
5,709,235 >>> mbox cmd response data (1 bytes)
test test_update_reset::test_update_reset_max_fw_image ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,092 UART:
192,460 UART: Running Caliptra ROM ...
193,654 UART:
193,817 UART: [state] CFI Enabled
265,655 UART: [state] LifecycleState = Unprovisioned
267,511 UART: [state] DebugLocked = No
268,911 UART: [state] WD Timer not started. Device not locked for debugging
273,085 UART: [kat] SHA2-256
452,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,493 UART: [kat] ++
464,102 UART: [kat] sha1
474,135 UART: [kat] SHA2-256
476,857 UART: [kat] SHA2-384
481,995 UART: [kat] SHA2-512-ACC
484,374 UART: [kat] ECC-384
2,948,405 UART: [kat] HMAC-384Kdf
2,972,432 UART: [kat] LMS
3,448,874 UART: [kat] --
3,455,290 UART: [cold-reset] ++
3,457,936 UART: [fht] FHT @ 0x50003400
3,469,436 UART: [idev] ++
3,470,045 UART: [idev] CDI.KEYID = 6
3,470,984 UART: [idev] SUBJECT.KEYID = 7
3,472,167 UART: [idev] UDS.KEYID = 0
3,473,100 ready_for_fw is high
3,473,295 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,611,314 UART: [idev] Erasing UDS.KEYID = 0
5,987,382 UART: [idev] Sha1 KeyId Algorithm
6,010,505 UART: [idev] --
6,016,072 UART: [ldev] ++
6,016,657 UART: [ldev] CDI.KEYID = 6
6,017,551 UART: [ldev] SUBJECT.KEYID = 5
6,018,791 UART: [ldev] AUTHORITY.KEYID = 7
6,020,030 UART: [ldev] FE.KEYID = 1
6,057,869 UART: [ldev] Erasing FE.KEYID = 1
8,566,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,797 UART: [ldev] --
10,373,610 UART: [fwproc] Wait for Commands...
10,376,089 UART: [fwproc] Recv command 0x46574c44
10,378,087 UART: [fwproc] Recv'd Img size: 109820 bytes
13,764,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,838,841 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,881,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,208,698 >>> mbox cmd response: success
14,213,015 UART: [afmc] ++
14,213,614 UART: [afmc] CDI.KEYID = 6
14,214,598 UART: [afmc] SUBJECT.KEYID = 7
14,215,702 UART: [afmc] AUTHORITY.KEYID = 5
16,746,839 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,875 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,508,690 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,524,648 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,540,318 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,565,913 UART: [afmc] --
18,569,517 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,570,545 UART: [cold-reset] --
18,573,602 UART: [state] Locking Datavault
18,578,384 UART: [state] Locking PCR0, PCR1 and PCR31
18,580,154 UART: [state] Locking ICCM
18,582,410 UART: [exit] Launching FMC @ 0x40000000
18,590,732 UART:
18,591,022 UART: Running Caliptra FMC ...
18,592,144 UART:
18,592,310 UART: [fmc] Received command: 0x10000004
18,593,774 UART:
18,593,935 UART: Running Caliptra ROM ...
18,595,039 UART:
18,595,203 UART: [state] CFI Enabled
18,596,168 >>> mbox cmd response: success
18,651,407 UART: [state] LifecycleState = Unprovisioned
18,653,302 UART: [state] DebugLocked = No
18,656,305 UART: [state] WD Timer not started. Device not locked for debugging
18,660,894 UART: [kat] SHA2-256
18,840,603 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,851,337 UART: [kat] ++
18,851,817 UART: [kat] sha1
18,862,065 UART: [kat] SHA2-256
18,864,760 UART: [kat] SHA2-384
18,871,395 UART: [kat] SHA2-512-ACC
18,873,755 UART: [kat] ECC-384
21,333,139 UART: [kat] HMAC-384Kdf
21,358,172 UART: [kat] LMS
21,834,598 UART: [kat] --
21,839,466 UART: [update-reset] ++
21,840,396 UART: Failed To Get Mailbox Txn
21,844,926 UART: ROM Non-Fatal Error: 0x01040004
21,846,967 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,848,638 UART: [state] Locking Datavault
21,853,310 UART: [state] Locking PCR0, PCR1 and PCR31
21,855,069 UART: [state] Locking ICCM
21,857,745 UART: [exit] Launching FMC @ 0x40000000
21,866,115 UART:
21,866,396 UART: Running Caliptra FMC ...
21,867,433 UART:
21,867,590 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,869,232 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,459,018 ready_for_fw is high
3,459,411 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,082,728 >>> mbox cmd response: success
18,348,597 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,363,662 UART:
18,364,023 UART: Running Caliptra FMC ...
18,365,291 UART:
18,365,469 UART: [fmc] Received command: 0x10000004
18,367,029 >>> mbox cmd response: success
21,627,532 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,636,895 UART:
21,637,165 UART: Running Caliptra FMC ...
21,638,264 UART:
21,638,421 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,640,077 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,322 UART:
192,688 UART: Running Caliptra ROM ...
193,878 UART:
603,579 UART: [state] CFI Enabled
614,891 UART: [state] LifecycleState = Unprovisioned
616,760 UART: [state] DebugLocked = No
618,289 UART: [state] WD Timer not started. Device not locked for debugging
622,465 UART: [kat] SHA2-256
802,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,876 UART: [kat] ++
813,320 UART: [kat] sha1
825,467 UART: [kat] SHA2-256
828,193 UART: [kat] SHA2-384
833,442 UART: [kat] SHA2-512-ACC
835,852 UART: [kat] ECC-384
3,277,022 UART: [kat] HMAC-384Kdf
3,288,919 UART: [kat] LMS
3,765,439 UART: [kat] --
3,770,781 UART: [cold-reset] ++
3,773,206 UART: [fht] FHT @ 0x50003400
3,784,612 UART: [idev] ++
3,785,177 UART: [idev] CDI.KEYID = 6
3,786,208 UART: [idev] SUBJECT.KEYID = 7
3,787,382 UART: [idev] UDS.KEYID = 0
3,788,300 ready_for_fw is high
3,788,488 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,926,416 UART: [idev] Erasing UDS.KEYID = 0
6,263,028 UART: [idev] Sha1 KeyId Algorithm
6,286,526 UART: [idev] --
6,291,418 UART: [ldev] ++
6,292,048 UART: [ldev] CDI.KEYID = 6
6,292,960 UART: [ldev] SUBJECT.KEYID = 5
6,294,192 UART: [ldev] AUTHORITY.KEYID = 7
6,295,423 UART: [ldev] FE.KEYID = 1
6,305,580 UART: [ldev] Erasing FE.KEYID = 1
8,786,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,159 UART: [ldev] --
10,579,939 UART: [fwproc] Wait for Commands...
10,582,300 UART: [fwproc] Recv command 0x46574c44
10,584,334 UART: [fwproc] Recv'd Img size: 109820 bytes
13,962,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,044,578 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,087,028 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,415,315 >>> mbox cmd response: success
14,419,972 UART: [afmc] ++
14,420,591 UART: [afmc] CDI.KEYID = 6
14,421,502 UART: [afmc] SUBJECT.KEYID = 7
14,422,715 UART: [afmc] AUTHORITY.KEYID = 5
16,927,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,653,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,655,271 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,671,091 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,687,048 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,702,710 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,726,119 UART: [afmc] --
18,729,237 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,729,973 UART: [cold-reset] --
18,732,676 UART: [state] Locking Datavault
18,738,155 UART: [state] Locking PCR0, PCR1 and PCR31
18,739,908 UART: [state] Locking ICCM
18,741,666 UART: [exit] Launching FMC @ 0x40000000
18,750,003 UART:
18,750,237 UART: Running Caliptra FMC ...
18,751,256 UART:
18,751,402 UART: [fmc] Received command: 0x10000004
18,753,057 UART:
18,753,215 UART: Running Caliptra ROM ...
18,754,224 UART:
18,754,364 UART: [state] CFI Enabled
18,755,239 >>> mbox cmd response: success
18,769,351 UART: [state] LifecycleState = Unprovisioned
18,771,287 UART: [state] DebugLocked = No
18,773,447 UART: [state] WD Timer not started. Device not locked for debugging
18,777,447 UART: [kat] SHA2-256
18,957,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,967,929 UART: [kat] ++
18,968,399 UART: [kat] sha1
18,978,635 UART: [kat] SHA2-256
18,981,320 UART: [kat] SHA2-384
18,987,463 UART: [kat] SHA2-512-ACC
18,989,817 UART: [kat] ECC-384
21,431,364 UART: [kat] HMAC-384Kdf
21,442,725 UART: [kat] LMS
21,919,175 UART: [kat] --
21,922,787 UART: [update-reset] ++
21,923,765 UART: Failed To Get Mailbox Txn
21,928,281 UART: ROM Non-Fatal Error: 0x01040004
21,930,318 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,931,071 UART: [state] Locking Datavault
21,933,675 UART: [state] Locking PCR0, PCR1 and PCR31
21,935,432 UART: [state] Locking ICCM
21,937,201 UART: [exit] Launching FMC @ 0x40000000
21,945,558 UART:
21,945,801 UART: Running Caliptra FMC ...
21,946,849 UART:
21,946,994 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,948,619 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,774,686 ready_for_fw is high
3,775,304 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,292,677 >>> mbox cmd response: success
18,532,486 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
18,545,173 UART:
18,545,514 UART: Running Caliptra FMC ...
18,546,783 UART:
18,546,954 UART: [fmc] Received command: 0x10000004
18,548,496 >>> mbox cmd response: success
21,716,838 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
21,727,008 UART:
21,727,307 UART: Running Caliptra FMC ...
21,728,474 UART:
21,728,633 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
21,730,266 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,485 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,712 UART: [kat] SHA2-256
901,652 UART: [kat] SHA2-384
904,397 UART: [kat] SHA2-512-ACC
906,298 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,173,088 UART: [idev] ++
1,173,256 UART: [idev] CDI.KEYID = 6
1,173,617 UART: [idev] SUBJECT.KEYID = 7
1,174,042 UART: [idev] UDS.KEYID = 0
1,174,388 ready_for_fw is high
1,174,388 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,981 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,498 UART: [ldev] --
1,280,913 UART: [fwproc] Wait for Commands...
1,281,564 UART: [fwproc] Recv command 0x46574c44
1,282,297 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,437 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,520 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,835 >>> mbox cmd response: success
2,714,069 UART: [afmc] ++
2,714,237 UART: [afmc] CDI.KEYID = 6
2,714,600 UART: [afmc] SUBJECT.KEYID = 7
2,715,026 UART: [afmc] AUTHORITY.KEYID = 5
2,750,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,988 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,708 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,601 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,294 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,045 UART: [afmc] --
2,792,990 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,012 UART: [cold-reset] --
2,793,838 UART: [state] Locking Datavault
2,795,169 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,773 UART: [state] Locking ICCM
2,796,259 UART: [exit] Launching FMC @ 0x40000000
2,801,556 UART:
2,801,572 UART: Running Caliptra FMC ...
2,801,980 UART:
2,802,118 UART: [fmc] Received command: 0x10000004
2,802,855 >>> mbox cmd response: success
2,802,951 UART:
2,802,967 UART: Running Caliptra ROM ...
2,803,375 UART:
2,803,430 UART: [state] CFI Enabled
2,806,506 UART: [state] LifecycleState = Unprovisioned
2,807,161 UART: [state] DebugLocked = No
2,807,833 UART: [state] WD Timer not started. Device not locked for debugging
2,809,143 UART: [kat] SHA2-256
3,612,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,797 UART: [kat] ++
3,616,949 UART: [kat] sha1
3,621,063 UART: [kat] SHA2-256
3,623,003 UART: [kat] SHA2-384
3,625,846 UART: [kat] SHA2-512-ACC
3,627,746 UART: [kat] ECC-384
3,638,047 UART: [kat] HMAC-384Kdf
3,642,693 UART: [kat] LMS
3,891,005 UART: [kat] --
3,891,793 UART: [update-reset] ++
3,892,104 UART: Failed To Get Mailbox Txn
3,892,835 UART: ROM Non-Fatal Error: 0x01040004
3,893,510 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,893,839 UART: [state] Locking Datavault
3,894,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,177 UART: [state] Locking ICCM
3,895,779 UART: [exit] Launching FMC @ 0x40000000
3,901,076 UART:
3,901,092 UART: Running Caliptra FMC ...
3,901,500 UART:
3,901,630 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,902,406 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,974 ready_for_fw is high
1,058,974 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,396 >>> mbox cmd response: success
2,619,616 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,626,007 UART:
2,626,023 UART: Running Caliptra FMC ...
2,626,431 UART:
2,626,569 UART: [fmc] Received command: 0x10000004
2,627,306 >>> mbox cmd response: success
3,603,370 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,007 UART:
3,609,023 UART: Running Caliptra FMC ...
3,609,431 UART:
3,609,561 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,610,337 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,332 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,505 UART: [kat] SHA2-256
901,445 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,162 UART: [kat] HMAC-384Kdf
920,852 UART: [kat] LMS
1,169,164 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,457 UART: [fht] FHT @ 0x50003400
1,173,095 UART: [idev] ++
1,173,263 UART: [idev] CDI.KEYID = 6
1,173,624 UART: [idev] SUBJECT.KEYID = 7
1,174,049 UART: [idev] UDS.KEYID = 0
1,174,395 ready_for_fw is high
1,174,395 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,396 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,622 UART: [idev] --
1,209,763 UART: [ldev] ++
1,209,931 UART: [ldev] CDI.KEYID = 6
1,210,295 UART: [ldev] SUBJECT.KEYID = 5
1,210,722 UART: [ldev] AUTHORITY.KEYID = 7
1,211,185 UART: [ldev] FE.KEYID = 1
1,216,379 UART: [ldev] Erasing FE.KEYID = 1
1,243,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,648 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,867 UART: [ldev] --
1,282,114 UART: [fwproc] Wait for Commands...
1,282,769 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,374 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,660 >>> mbox cmd response: success
2,714,860 UART: [afmc] ++
2,715,028 UART: [afmc] CDI.KEYID = 6
2,715,391 UART: [afmc] SUBJECT.KEYID = 7
2,715,817 UART: [afmc] AUTHORITY.KEYID = 5
2,751,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,277 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,997 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,890 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,583 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,360 UART: [afmc] --
2,795,291 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,313 UART: [cold-reset] --
2,796,031 UART: [state] Locking Datavault
2,797,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,616 UART: [state] Locking ICCM
2,798,112 UART: [exit] Launching FMC @ 0x40000000
2,803,409 UART:
2,803,425 UART: Running Caliptra FMC ...
2,803,833 UART:
2,803,971 UART: [fmc] Received command: 0x10000004
2,804,708 >>> mbox cmd response: success
2,804,804 UART:
2,804,820 UART: Running Caliptra ROM ...
2,805,228 UART:
2,805,370 UART: [state] CFI Enabled
2,808,614 UART: [state] LifecycleState = Unprovisioned
2,809,269 UART: [state] DebugLocked = No
2,809,819 UART: [state] WD Timer not started. Device not locked for debugging
2,811,049 UART: [kat] SHA2-256
3,614,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,703 UART: [kat] ++
3,618,855 UART: [kat] sha1
3,623,277 UART: [kat] SHA2-256
3,625,217 UART: [kat] SHA2-384
3,627,910 UART: [kat] SHA2-512-ACC
3,629,810 UART: [kat] ECC-384
3,639,847 UART: [kat] HMAC-384Kdf
3,644,553 UART: [kat] LMS
3,892,865 UART: [kat] --
3,893,733 UART: [update-reset] ++
3,894,044 UART: Failed To Get Mailbox Txn
3,894,733 UART: ROM Non-Fatal Error: 0x01040004
3,895,408 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,895,609 UART: [state] Locking Datavault
3,896,419 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,023 UART: [state] Locking ICCM
3,897,645 UART: [exit] Launching FMC @ 0x40000000
3,902,942 UART:
3,902,958 UART: Running Caliptra FMC ...
3,903,366 UART:
3,903,496 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,904,272 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 ready_for_fw is high
1,060,011 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,247 >>> mbox cmd response: success
2,621,967 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,106 UART:
2,628,122 UART: Running Caliptra FMC ...
2,628,530 UART:
2,628,668 UART: [fmc] Received command: 0x10000004
2,629,405 >>> mbox cmd response: success
3,604,700 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,991 UART:
3,610,007 UART: Running Caliptra FMC ...
3,610,415 UART:
3,610,545 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,321 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,986 UART: [kat] ++
895,138 UART: [kat] sha1
899,278 UART: [kat] SHA2-256
901,218 UART: [kat] SHA2-384
903,975 UART: [kat] SHA2-512-ACC
905,876 UART: [kat] ECC-384
915,603 UART: [kat] HMAC-384Kdf
920,109 UART: [kat] LMS
1,168,421 UART: [kat] --
1,169,032 UART: [cold-reset] ++
1,169,380 UART: [fht] FHT @ 0x50003400
1,171,982 UART: [idev] ++
1,172,150 UART: [idev] CDI.KEYID = 6
1,172,511 UART: [idev] SUBJECT.KEYID = 7
1,172,936 UART: [idev] UDS.KEYID = 0
1,173,282 ready_for_fw is high
1,173,282 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,175 UART: [idev] Erasing UDS.KEYID = 0
1,198,035 UART: [idev] Sha1 KeyId Algorithm
1,206,721 UART: [idev] --
1,207,638 UART: [ldev] ++
1,207,806 UART: [ldev] CDI.KEYID = 6
1,208,170 UART: [ldev] SUBJECT.KEYID = 5
1,208,597 UART: [ldev] AUTHORITY.KEYID = 7
1,209,060 UART: [ldev] FE.KEYID = 1
1,214,522 UART: [ldev] Erasing FE.KEYID = 1
1,240,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,896 UART: [ldev] --
1,280,299 UART: [fwproc] Wait for Commands...
1,281,022 UART: [fwproc] Recv command 0x46574c44
1,281,755 UART: [fwproc] Recv'd Img size: 109820 bytes
2,524,776 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,117 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,599 >>> mbox cmd response: success
2,711,847 UART: [afmc] ++
2,712,015 UART: [afmc] CDI.KEYID = 6
2,712,378 UART: [afmc] SUBJECT.KEYID = 7
2,712,804 UART: [afmc] AUTHORITY.KEYID = 5
2,747,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,010 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,770,730 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,623 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,316 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,011 UART: [afmc] --
2,790,988 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,791,010 UART: [cold-reset] --
2,791,702 UART: [state] Locking Datavault
2,792,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,457 UART: [state] Locking ICCM
2,793,981 UART: [exit] Launching FMC @ 0x40000000
2,799,278 UART:
2,799,294 UART: Running Caliptra FMC ...
2,799,702 UART:
2,799,840 UART: [fmc] Received command: 0x10000004
2,800,577 >>> mbox cmd response: success
2,800,673 UART:
2,800,689 UART: Running Caliptra ROM ...
2,801,097 UART:
2,801,152 UART: [state] CFI Enabled
2,803,492 UART: [state] LifecycleState = Unprovisioned
2,804,147 UART: [state] DebugLocked = No
2,804,711 UART: [state] WD Timer not started. Device not locked for debugging
2,806,039 UART: [kat] SHA2-256
3,609,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,613,693 UART: [kat] ++
3,613,845 UART: [kat] sha1
3,618,031 UART: [kat] SHA2-256
3,619,971 UART: [kat] SHA2-384
3,622,758 UART: [kat] SHA2-512-ACC
3,624,658 UART: [kat] ECC-384
3,633,911 UART: [kat] HMAC-384Kdf
3,638,581 UART: [kat] LMS
3,886,893 UART: [kat] --
3,887,459 UART: [update-reset] ++
3,887,770 UART: Failed To Get Mailbox Txn
3,888,563 UART: ROM Non-Fatal Error: 0x01040004
3,889,238 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,889,547 UART: [state] Locking Datavault
3,890,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,891,119 UART: [state] Locking ICCM
3,891,589 UART: [exit] Launching FMC @ 0x40000000
3,896,886 UART:
3,896,902 UART: Running Caliptra FMC ...
3,897,310 UART:
3,897,440 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,898,216 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,198 ready_for_fw is high
1,059,198 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,736 >>> mbox cmd response: success
2,622,110 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,569 UART:
2,628,585 UART: Running Caliptra FMC ...
2,628,993 UART:
2,629,131 UART: [fmc] Received command: 0x10000004
2,629,868 >>> mbox cmd response: success
3,605,282 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,610,625 UART:
3,610,641 UART: Running Caliptra FMC ...
3,611,049 UART:
3,611,179 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,611,955 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,893 UART: [state] LifecycleState = Unprovisioned
85,548 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
891,047 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,151 UART: [kat] ++
895,303 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,138 UART: [kat] SHA2-512-ACC
906,039 UART: [kat] ECC-384
915,624 UART: [kat] HMAC-384Kdf
920,138 UART: [kat] LMS
1,168,450 UART: [kat] --
1,169,055 UART: [cold-reset] ++
1,169,575 UART: [fht] FHT @ 0x50003400
1,172,137 UART: [idev] ++
1,172,305 UART: [idev] CDI.KEYID = 6
1,172,666 UART: [idev] SUBJECT.KEYID = 7
1,173,091 UART: [idev] UDS.KEYID = 0
1,173,437 ready_for_fw is high
1,173,437 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,442 UART: [idev] Erasing UDS.KEYID = 0
1,198,134 UART: [idev] Sha1 KeyId Algorithm
1,207,052 UART: [idev] --
1,208,121 UART: [ldev] ++
1,208,289 UART: [ldev] CDI.KEYID = 6
1,208,653 UART: [ldev] SUBJECT.KEYID = 5
1,209,080 UART: [ldev] AUTHORITY.KEYID = 7
1,209,543 UART: [ldev] FE.KEYID = 1
1,214,453 UART: [ldev] Erasing FE.KEYID = 1
1,240,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,895 UART: [ldev] --
1,280,170 UART: [fwproc] Wait for Commands...
1,280,795 UART: [fwproc] Recv command 0x46574c44
1,281,528 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,485 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,730 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,571,813 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,092 >>> mbox cmd response: success
2,713,198 UART: [afmc] ++
2,713,366 UART: [afmc] CDI.KEYID = 6
2,713,729 UART: [afmc] SUBJECT.KEYID = 7
2,714,155 UART: [afmc] AUTHORITY.KEYID = 5
2,749,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,092 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,766,841 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,561 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,454 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,147 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,028 UART: [afmc] --
2,792,829 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,792,851 UART: [cold-reset] --
2,793,673 UART: [state] Locking Datavault
2,794,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,512 UART: [state] Locking ICCM
2,796,072 UART: [exit] Launching FMC @ 0x40000000
2,801,369 UART:
2,801,385 UART: Running Caliptra FMC ...
2,801,793 UART:
2,801,931 UART: [fmc] Received command: 0x10000004
2,802,668 >>> mbox cmd response: success
2,802,764 UART:
2,802,780 UART: Running Caliptra ROM ...
2,803,188 UART:
2,803,330 UART: [state] CFI Enabled
2,806,604 UART: [state] LifecycleState = Unprovisioned
2,807,259 UART: [state] DebugLocked = No
2,807,851 UART: [state] WD Timer not started. Device not locked for debugging
2,809,069 UART: [kat] SHA2-256
3,612,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,723 UART: [kat] ++
3,616,875 UART: [kat] sha1
3,620,955 UART: [kat] SHA2-256
3,622,895 UART: [kat] SHA2-384
3,625,618 UART: [kat] SHA2-512-ACC
3,627,518 UART: [kat] ECC-384
3,637,065 UART: [kat] HMAC-384Kdf
3,641,681 UART: [kat] LMS
3,889,993 UART: [kat] --
3,890,899 UART: [update-reset] ++
3,891,210 UART: Failed To Get Mailbox Txn
3,892,063 UART: ROM Non-Fatal Error: 0x01040004
3,892,738 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,892,987 UART: [state] Locking Datavault
3,893,693 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,297 UART: [state] Locking ICCM
3,894,787 UART: [exit] Launching FMC @ 0x40000000
3,900,084 UART:
3,900,100 UART: Running Caliptra FMC ...
3,900,508 UART:
3,900,638 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,901,414 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,821 ready_for_fw is high
1,059,821 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,723 >>> mbox cmd response: success
2,624,061 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,630,252 UART:
2,630,268 UART: Running Caliptra FMC ...
2,630,676 UART:
2,630,814 UART: [fmc] Received command: 0x10000004
2,631,551 >>> mbox cmd response: success
3,607,344 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,613,009 UART:
3,613,025 UART: Running Caliptra FMC ...
3,613,433 UART:
3,613,563 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,614,339 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,381 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
891,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,306 UART: [kat] ++
895,458 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,841 UART: [kat] LMS
1,169,153 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,302 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,801 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,241,565 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,842 UART: [ldev] --
1,281,091 UART: [fwproc] Wait for Commands...
1,281,672 UART: [fwproc] Recv command 0x46574c44
1,282,405 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,303 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,386 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,699 >>> mbox cmd response: success
2,713,921 UART: [afmc] ++
2,714,089 UART: [afmc] CDI.KEYID = 6
2,714,452 UART: [afmc] SUBJECT.KEYID = 7
2,714,878 UART: [afmc] AUTHORITY.KEYID = 5
2,750,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,638 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,358 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,251 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,944 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,509 UART: [afmc] --
2,793,468 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,793,490 UART: [cold-reset] --
2,794,264 UART: [state] Locking Datavault
2,795,189 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,793 UART: [state] Locking ICCM
2,796,367 UART: [exit] Launching FMC @ 0x40000000
2,801,664 UART:
2,801,680 UART: Running Caliptra FMC ...
2,802,088 UART:
2,802,226 UART: [fmc] Received command: 0x10000004
2,802,963 >>> mbox cmd response: success
2,803,059 UART:
2,803,075 UART: Running Caliptra ROM ...
2,803,483 UART:
2,803,538 UART: [state] CFI Enabled
2,806,002 UART: [state] LifecycleState = Unprovisioned
2,806,657 UART: [state] DebugLocked = No
2,807,269 UART: [state] WD Timer not started. Device not locked for debugging
2,808,625 UART: [kat] SHA2-256
3,612,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,279 UART: [kat] ++
3,616,431 UART: [kat] sha1
3,620,583 UART: [kat] SHA2-256
3,622,523 UART: [kat] SHA2-384
3,625,392 UART: [kat] SHA2-512-ACC
3,627,292 UART: [kat] ECC-384
3,636,865 UART: [kat] HMAC-384Kdf
3,641,357 UART: [kat] LMS
3,889,669 UART: [kat] --
3,890,399 UART: [update-reset] ++
3,890,710 UART: Failed To Get Mailbox Txn
3,891,411 UART: ROM Non-Fatal Error: 0x01040004
3,892,086 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,892,249 UART: [state] Locking Datavault
3,892,889 UART: [state] Locking PCR0, PCR1 and PCR31
3,893,493 UART: [state] Locking ICCM
3,894,127 UART: [exit] Launching FMC @ 0x40000000
3,899,424 UART:
3,899,440 UART: Running Caliptra FMC ...
3,899,848 UART:
3,899,978 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,900,754 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,978 ready_for_fw is high
1,058,978 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,268 >>> mbox cmd response: success
2,621,798 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,627,879 UART:
2,627,895 UART: Running Caliptra FMC ...
2,628,303 UART:
2,628,441 UART: [fmc] Received command: 0x10000004
2,629,178 >>> mbox cmd response: success
3,604,446 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,609,515 UART:
3,609,531 UART: Running Caliptra FMC ...
3,609,939 UART:
3,610,069 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,610,845 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,913 UART: [kat] SHA2-256
891,463 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,567 UART: [kat] ++
895,719 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,014 UART: [kat] HMAC-384Kdf
920,780 UART: [kat] LMS
1,169,092 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,403 UART: [fht] FHT @ 0x50003400
1,173,167 UART: [idev] ++
1,173,335 UART: [idev] CDI.KEYID = 6
1,173,696 UART: [idev] SUBJECT.KEYID = 7
1,174,121 UART: [idev] UDS.KEYID = 0
1,174,467 ready_for_fw is high
1,174,467 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,550 UART: [idev] Sha1 KeyId Algorithm
1,208,436 UART: [idev] --
1,209,687 UART: [ldev] ++
1,209,855 UART: [ldev] CDI.KEYID = 6
1,210,219 UART: [ldev] SUBJECT.KEYID = 5
1,210,646 UART: [ldev] AUTHORITY.KEYID = 7
1,211,109 UART: [ldev] FE.KEYID = 1
1,216,421 UART: [ldev] Erasing FE.KEYID = 1
1,242,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,503 UART: [ldev] --
1,281,870 UART: [fwproc] Wait for Commands...
1,282,583 UART: [fwproc] Recv command 0x46574c44
1,283,316 UART: [fwproc] Recv'd Img size: 109820 bytes
2,529,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,558 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,936 >>> mbox cmd response: success
2,716,028 UART: [afmc] ++
2,716,196 UART: [afmc] CDI.KEYID = 6
2,716,559 UART: [afmc] SUBJECT.KEYID = 7
2,716,985 UART: [afmc] AUTHORITY.KEYID = 5
2,752,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,769 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,489 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,382 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,075 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,924 UART: [afmc] --
2,795,903 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,795,925 UART: [cold-reset] --
2,796,741 UART: [state] Locking Datavault
2,797,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,380 UART: [state] Locking ICCM
2,799,044 UART: [exit] Launching FMC @ 0x40000000
2,804,341 UART:
2,804,357 UART: Running Caliptra FMC ...
2,804,765 UART:
2,804,903 UART: [fmc] Received command: 0x10000004
2,805,640 >>> mbox cmd response: success
2,805,736 UART:
2,805,752 UART: Running Caliptra ROM ...
2,806,160 UART:
2,806,302 UART: [state] CFI Enabled
2,809,442 UART: [state] LifecycleState = Unprovisioned
2,810,097 UART: [state] DebugLocked = No
2,810,605 UART: [state] WD Timer not started. Device not locked for debugging
2,811,803 UART: [kat] SHA2-256
3,615,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,457 UART: [kat] ++
3,619,609 UART: [kat] sha1
3,623,915 UART: [kat] SHA2-256
3,625,855 UART: [kat] SHA2-384
3,628,422 UART: [kat] SHA2-512-ACC
3,630,322 UART: [kat] ECC-384
3,640,325 UART: [kat] HMAC-384Kdf
3,644,873 UART: [kat] LMS
3,893,185 UART: [kat] --
3,894,051 UART: [update-reset] ++
3,894,362 UART: Failed To Get Mailbox Txn
3,895,073 UART: ROM Non-Fatal Error: 0x01040004
3,895,748 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,896,015 UART: [state] Locking Datavault
3,896,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,547 UART: [state] Locking ICCM
3,898,033 UART: [exit] Launching FMC @ 0x40000000
3,903,330 UART:
3,903,346 UART: Running Caliptra FMC ...
3,903,754 UART:
3,903,884 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,904,660 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 ready_for_fw is high
1,059,741 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,079 >>> mbox cmd response: success
2,622,539 <<< Executing mbox cmd 0x10000004 (0 bytes) from SoC
2,628,720 UART:
2,628,736 UART: Running Caliptra FMC ...
2,629,144 UART:
2,629,282 UART: [fmc] Received command: 0x10000004
2,630,019 >>> mbox cmd response: success
3,605,650 <<< Executing mbox cmd 0xdeadbeef (0 bytes) from SoC
3,610,887 UART:
3,610,903 UART: Running Caliptra FMC ...
3,611,311 UART:
3,611,441 UART: [fmc] Received command: 0xDEADBEEF
* TESTCASE PASSED
3,612,217 >>> mbox cmd response: failed
test test_update_reset::test_update_reset_no_mailbox_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
192,084 UART:
192,442 UART: Running Caliptra ROM ...
193,561 UART:
193,711 UART: [state] CFI Enabled
264,785 UART: [state] LifecycleState = Unprovisioned
266,701 UART: [state] DebugLocked = No
269,588 UART: [state] WD Timer not started. Device not locked for debugging
272,839 UART: [kat] SHA2-256
452,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,280 UART: [kat] ++
463,813 UART: [kat] sha1
474,860 UART: [kat] SHA2-256
477,590 UART: [kat] SHA2-384
483,014 UART: [kat] SHA2-512-ACC
485,392 UART: [kat] ECC-384
2,947,405 UART: [kat] HMAC-384Kdf
2,970,011 UART: [kat] LMS
3,446,557 UART: [kat] --
3,449,662 UART: [cold-reset] ++
3,451,175 UART: [fht] FHT @ 0x50003400
3,460,977 UART: [idev] ++
3,461,542 UART: [idev] CDI.KEYID = 6
3,462,504 UART: [idev] SUBJECT.KEYID = 7
3,463,750 UART: [idev] UDS.KEYID = 0
3,464,654 ready_for_fw is high
3,464,859 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,603,957 UART: [idev] Erasing UDS.KEYID = 0
5,965,521 UART: [idev] Sha1 KeyId Algorithm
5,988,479 UART: [idev] --
5,994,722 UART: [ldev] ++
5,995,359 UART: [ldev] CDI.KEYID = 6
5,996,244 UART: [ldev] SUBJECT.KEYID = 5
5,997,461 UART: [ldev] AUTHORITY.KEYID = 7
5,998,694 UART: [ldev] FE.KEYID = 1
6,034,965 UART: [ldev] Erasing FE.KEYID = 1
8,542,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,540 UART: [ldev] --
10,352,673 UART: [fwproc] Wait for Commands...
10,354,282 UART: [fwproc] Recv command 0x46574c44
10,356,291 UART: [fwproc] Recv'd Img size: 109820 bytes
13,731,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,808,190 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,850,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,178,358 >>> mbox cmd response: success
14,182,064 UART: [afmc] ++
14,182,664 UART: [afmc] CDI.KEYID = 6
14,183,639 UART: [afmc] SUBJECT.KEYID = 7
14,184,858 UART: [afmc] AUTHORITY.KEYID = 5
16,718,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,443,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,445,936 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,461,751 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,477,756 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,493,447 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,517,272 UART: [afmc] --
18,521,545 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,522,558 UART: [cold-reset] --
18,525,590 UART: [state] Locking Datavault
18,531,983 UART: [state] Locking PCR0, PCR1 and PCR31
18,533,736 UART: [state] Locking ICCM
18,534,812 UART: [exit] Launching FMC @ 0x40000000
18,543,184 UART:
18,543,471 UART: Running Caliptra FMC ...
18,544,585 UART:
18,544,750 UART: [fmc] Received command: 0x1000000B
18,546,213 UART:
18,546,374 UART: Running Caliptra ROM ...
18,547,471 UART:
18,547,631 UART: [state] CFI Enabled
18,605,103 UART: [state] LifecycleState = Unprovisioned
18,606,993 UART: [state] DebugLocked = No
18,609,478 UART: [state] WD Timer not started. Device not locked for debugging
18,613,487 UART: [kat] SHA2-256
18,793,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,803,964 UART: [kat] ++
18,804,505 UART: [kat] sha1
18,814,647 UART: [kat] SHA2-256
18,817,340 UART: [kat] SHA2-384
18,823,013 UART: [kat] SHA2-512-ACC
18,825,360 UART: [kat] ECC-384
21,289,104 UART: [kat] HMAC-384Kdf
21,310,346 UART: [kat] LMS
21,786,787 UART: [kat] --
21,791,191 UART: [update-reset] ++
21,792,113 UART: Invalid command 0x1000000b recv
21,796,230 UART: ROM Non-Fatal Error: 0x01040003
21,798,973 UART: [state] Locking Datavault
21,802,916 UART: [state] Locking PCR0, PCR1 and PCR31
21,804,631 UART: [state] Locking ICCM
21,806,782 UART: [exit] Launching FMC @ 0x40000000
21,815,154 UART:
21,815,402 UART: Running Caliptra FMC ...
21,816,545 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,460,920 ready_for_fw is high
3,461,395 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,085,858 >>> mbox cmd response: success
18,349,611 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,364,536 UART:
18,364,882 UART: Running Caliptra FMC ...
18,366,139 UART:
18,366,318 UART: [fmc] Received command: 0x1000000B
21,638,914 UART:
21,639,257 UART: Running Caliptra FMC ...
21,640,368 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,420 UART:
192,784 UART: Running Caliptra ROM ...
193,966 UART:
603,658 UART: [state] CFI Enabled
617,852 UART: [state] LifecycleState = Unprovisioned
619,839 UART: [state] DebugLocked = No
622,436 UART: [state] WD Timer not started. Device not locked for debugging
626,189 UART: [kat] SHA2-256
805,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,625 UART: [kat] ++
817,079 UART: [kat] sha1
828,597 UART: [kat] SHA2-256
831,323 UART: [kat] SHA2-384
838,236 UART: [kat] SHA2-512-ACC
840,601 UART: [kat] ECC-384
3,283,075 UART: [kat] HMAC-384Kdf
3,296,381 UART: [kat] LMS
3,772,906 UART: [kat] --
3,776,325 UART: [cold-reset] ++
3,777,852 UART: [fht] FHT @ 0x50003400
3,789,115 UART: [idev] ++
3,789,689 UART: [idev] CDI.KEYID = 6
3,790,720 UART: [idev] SUBJECT.KEYID = 7
3,791,890 UART: [idev] UDS.KEYID = 0
3,792,937 ready_for_fw is high
3,793,149 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,931,173 UART: [idev] Erasing UDS.KEYID = 0
6,266,424 UART: [idev] Sha1 KeyId Algorithm
6,290,133 UART: [idev] --
6,294,341 UART: [ldev] ++
6,294,919 UART: [ldev] CDI.KEYID = 6
6,296,023 UART: [ldev] SUBJECT.KEYID = 5
6,297,148 UART: [ldev] AUTHORITY.KEYID = 7
6,298,327 UART: [ldev] FE.KEYID = 1
6,309,027 UART: [ldev] Erasing FE.KEYID = 1
8,782,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,616 UART: [ldev] --
10,577,206 UART: [fwproc] Wait for Commands...
10,579,572 UART: [fwproc] Recv command 0x46574c44
10,581,555 UART: [fwproc] Recv'd Img size: 109820 bytes
13,962,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,042,987 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,085,484 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,414,603 >>> mbox cmd response: success
14,419,415 UART: [afmc] ++
14,420,027 UART: [afmc] CDI.KEYID = 6
14,420,943 UART: [afmc] SUBJECT.KEYID = 7
14,422,177 UART: [afmc] AUTHORITY.KEYID = 5
16,922,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,644,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,646,839 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,662,667 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,678,644 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,694,287 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,718,807 UART: [afmc] --
18,722,910 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,723,750 UART: [cold-reset] --
18,727,053 UART: [state] Locking Datavault
18,734,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,736,501 UART: [state] Locking ICCM
18,738,783 UART: [exit] Launching FMC @ 0x40000000
18,747,118 UART:
18,747,351 UART: Running Caliptra FMC ...
18,748,391 UART:
18,748,536 UART: [fmc] Received command: 0x1000000B
18,749,988 UART:
18,750,136 UART: Running Caliptra ROM ...
18,751,147 UART:
18,751,447 UART: [state] CFI Enabled
18,764,620 UART: [state] LifecycleState = Unprovisioned
18,766,506 UART: [state] DebugLocked = No
18,768,992 UART: [state] WD Timer not started. Device not locked for debugging
18,772,604 UART: [kat] SHA2-256
18,952,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,963,072 UART: [kat] ++
18,963,531 UART: [kat] sha1
18,974,949 UART: [kat] SHA2-256
18,977,695 UART: [kat] SHA2-384
18,983,302 UART: [kat] SHA2-512-ACC
18,985,663 UART: [kat] ECC-384
21,426,593 UART: [kat] HMAC-384Kdf
21,438,708 UART: [kat] LMS
21,915,178 UART: [kat] --
21,920,883 UART: [update-reset] ++
21,921,803 UART: Invalid command 0x1000000b recv
21,926,164 UART: ROM Non-Fatal Error: 0x01040003
21,928,511 UART: [state] Locking Datavault
21,931,318 UART: [state] Locking PCR0, PCR1 and PCR31
21,933,072 UART: [state] Locking ICCM
21,935,798 UART: [exit] Launching FMC @ 0x40000000
21,944,158 UART:
21,944,401 UART: Running Caliptra FMC ...
21,945,457 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
3,777,133 ready_for_fw is high
3,777,508 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,310,708 >>> mbox cmd response: success
18,553,094 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
18,568,264 UART:
18,568,621 UART: Running Caliptra FMC ...
18,569,879 UART:
18,570,047 UART: [fmc] Received command: 0x1000000B
21,752,865 UART:
21,753,215 UART: Running Caliptra FMC ...
21,754,330 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,479 UART: [state] WD Timer not started. Device not locked for debugging
87,604 UART: [kat] SHA2-256
891,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,258 UART: [kat] ++
895,410 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,266 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,885 UART: [idev] Erasing UDS.KEYID = 0
1,198,609 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,348 UART: [ldev] Erasing FE.KEYID = 1
1,240,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,094 UART: [ldev] --
1,280,331 UART: [fwproc] Wait for Commands...
1,280,968 UART: [fwproc] Recv command 0x46574c44
1,281,701 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,552,453 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,570,536 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,710,699 >>> mbox cmd response: success
2,711,863 UART: [afmc] ++
2,712,031 UART: [afmc] CDI.KEYID = 6
2,712,394 UART: [afmc] SUBJECT.KEYID = 7
2,712,820 UART: [afmc] AUTHORITY.KEYID = 5
2,748,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,764,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,765,142 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,770,862 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,776,755 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,782,448 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,790,227 UART: [afmc] --
2,791,040 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,791,062 UART: [cold-reset] --
2,791,818 UART: [state] Locking Datavault
2,793,193 UART: [state] Locking PCR0, PCR1 and PCR31
2,793,797 UART: [state] Locking ICCM
2,794,231 UART: [exit] Launching FMC @ 0x40000000
2,799,528 UART:
2,799,544 UART: Running Caliptra FMC ...
2,799,952 UART:
2,800,090 UART: [fmc] Received command: 0x1000000B
2,800,922 UART:
2,800,938 UART: Running Caliptra ROM ...
2,801,346 UART:
2,801,401 UART: [state] CFI Enabled
2,804,471 UART: [state] LifecycleState = Unprovisioned
2,805,126 UART: [state] DebugLocked = No
2,805,714 UART: [state] WD Timer not started. Device not locked for debugging
2,807,012 UART: [kat] SHA2-256
3,610,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,614,666 UART: [kat] ++
3,614,818 UART: [kat] sha1
3,619,122 UART: [kat] SHA2-256
3,621,062 UART: [kat] SHA2-384
3,623,903 UART: [kat] SHA2-512-ACC
3,625,803 UART: [kat] ECC-384
3,635,044 UART: [kat] HMAC-384Kdf
3,639,494 UART: [kat] LMS
3,887,806 UART: [kat] --
3,888,604 UART: [update-reset] ++
3,888,921 UART: Invalid command 0x1000000b recv
3,890,119 UART: ROM Non-Fatal Error: 0x01040003
3,890,925 UART: [state] Locking Datavault
3,891,675 UART: [state] Locking PCR0, PCR1 and PCR31
3,892,279 UART: [state] Locking ICCM
3,892,787 UART: [exit] Launching FMC @ 0x40000000
3,898,084 UART:
3,898,100 UART: Running Caliptra FMC ...
3,898,508 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,336 ready_for_fw is high
1,059,336 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,482 >>> mbox cmd response: success
2,621,402 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,267 UART:
2,627,283 UART: Running Caliptra FMC ...
2,627,691 UART:
2,627,829 UART: [fmc] Received command: 0x1000000B
3,609,114 UART:
3,609,130 UART: Running Caliptra FMC ...
3,609,538 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,816 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,303 UART: [kat] SHA2-256
902,243 UART: [kat] SHA2-384
904,976 UART: [kat] SHA2-512-ACC
906,877 UART: [kat] ECC-384
916,426 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,169,849 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,173,011 UART: [idev] ++
1,173,179 UART: [idev] CDI.KEYID = 6
1,173,540 UART: [idev] SUBJECT.KEYID = 7
1,173,965 UART: [idev] UDS.KEYID = 0
1,174,311 ready_for_fw is high
1,174,311 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,890 UART: [idev] Erasing UDS.KEYID = 0
1,198,802 UART: [idev] Sha1 KeyId Algorithm
1,207,560 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,269 UART: [ldev] Erasing FE.KEYID = 1
1,241,558 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,345 UART: [ldev] --
1,280,752 UART: [fwproc] Wait for Commands...
1,281,337 UART: [fwproc] Recv command 0x46574c44
1,282,070 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,108 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,191 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,496 >>> mbox cmd response: success
2,713,570 UART: [afmc] ++
2,713,738 UART: [afmc] CDI.KEYID = 6
2,714,101 UART: [afmc] SUBJECT.KEYID = 7
2,714,527 UART: [afmc] AUTHORITY.KEYID = 5
2,749,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,364 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,113 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,833 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,726 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,419 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,288 UART: [afmc] --
2,793,329 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,351 UART: [cold-reset] --
2,794,183 UART: [state] Locking Datavault
2,795,376 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,980 UART: [state] Locking ICCM
2,796,624 UART: [exit] Launching FMC @ 0x40000000
2,801,921 UART:
2,801,937 UART: Running Caliptra FMC ...
2,802,345 UART:
2,802,483 UART: [fmc] Received command: 0x1000000B
2,803,315 UART:
2,803,331 UART: Running Caliptra ROM ...
2,803,739 UART:
2,803,881 UART: [state] CFI Enabled
2,806,667 UART: [state] LifecycleState = Unprovisioned
2,807,322 UART: [state] DebugLocked = No
2,807,902 UART: [state] WD Timer not started. Device not locked for debugging
2,809,200 UART: [kat] SHA2-256
3,612,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,854 UART: [kat] ++
3,617,006 UART: [kat] sha1
3,621,126 UART: [kat] SHA2-256
3,623,066 UART: [kat] SHA2-384
3,625,967 UART: [kat] SHA2-512-ACC
3,627,867 UART: [kat] ECC-384
3,637,536 UART: [kat] HMAC-384Kdf
3,642,236 UART: [kat] LMS
3,890,548 UART: [kat] --
3,891,544 UART: [update-reset] ++
3,891,861 UART: Invalid command 0x1000000b recv
3,893,081 UART: ROM Non-Fatal Error: 0x01040003
3,894,025 UART: [state] Locking Datavault
3,894,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,423 UART: [state] Locking ICCM
3,896,017 UART: [exit] Launching FMC @ 0x40000000
3,901,314 UART:
3,901,330 UART: Running Caliptra FMC ...
3,901,738 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 ready_for_fw is high
1,059,991 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,568,591 >>> mbox cmd response: success
2,624,321 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,630,278 UART:
2,630,294 UART: Running Caliptra FMC ...
2,630,702 UART:
2,630,840 UART: [fmc] Received command: 0x1000000B
3,612,588 UART:
3,612,604 UART: Running Caliptra FMC ...
3,613,012 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,377 UART: [kat] SHA2-512-ACC
906,278 UART: [kat] ECC-384
915,825 UART: [kat] HMAC-384Kdf
920,367 UART: [kat] LMS
1,168,679 UART: [kat] --
1,169,462 UART: [cold-reset] ++
1,169,818 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,173,900 ready_for_fw is high
1,173,900 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,837 UART: [idev] Sha1 KeyId Algorithm
1,207,633 UART: [idev] --
1,208,618 UART: [ldev] ++
1,208,786 UART: [ldev] CDI.KEYID = 6
1,209,150 UART: [ldev] SUBJECT.KEYID = 5
1,209,577 UART: [ldev] AUTHORITY.KEYID = 7
1,210,040 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,210 UART: [ldev] --
1,280,485 UART: [fwproc] Wait for Commands...
1,281,278 UART: [fwproc] Recv command 0x46574c44
1,282,011 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,814 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,101 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,184 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,511 >>> mbox cmd response: success
2,713,653 UART: [afmc] ++
2,713,821 UART: [afmc] CDI.KEYID = 6
2,714,184 UART: [afmc] SUBJECT.KEYID = 7
2,714,610 UART: [afmc] AUTHORITY.KEYID = 5
2,750,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,958 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,678 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,571 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,264 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,021 UART: [afmc] --
2,793,932 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,954 UART: [cold-reset] --
2,794,998 UART: [state] Locking Datavault
2,796,135 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,739 UART: [state] Locking ICCM
2,797,365 UART: [exit] Launching FMC @ 0x40000000
2,802,662 UART:
2,802,678 UART: Running Caliptra FMC ...
2,803,086 UART:
2,803,224 UART: [fmc] Received command: 0x1000000B
2,804,056 UART:
2,804,072 UART: Running Caliptra ROM ...
2,804,480 UART:
2,804,535 UART: [state] CFI Enabled
2,806,809 UART: [state] LifecycleState = Unprovisioned
2,807,464 UART: [state] DebugLocked = No
2,808,012 UART: [state] WD Timer not started. Device not locked for debugging
2,809,258 UART: [kat] SHA2-256
3,612,808 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,912 UART: [kat] ++
3,617,064 UART: [kat] sha1
3,621,276 UART: [kat] SHA2-256
3,623,216 UART: [kat] SHA2-384
3,626,027 UART: [kat] SHA2-512-ACC
3,627,927 UART: [kat] ECC-384
3,638,118 UART: [kat] HMAC-384Kdf
3,642,916 UART: [kat] LMS
3,891,228 UART: [kat] --
3,891,968 UART: [update-reset] ++
3,892,285 UART: Invalid command 0x1000000b recv
3,893,319 UART: ROM Non-Fatal Error: 0x01040003
3,894,101 UART: [state] Locking Datavault
3,894,789 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,393 UART: [state] Locking ICCM
3,896,065 UART: [exit] Launching FMC @ 0x40000000
3,901,362 UART:
3,901,378 UART: Running Caliptra FMC ...
3,901,786 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,748 ready_for_fw is high
1,058,748 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,188 >>> mbox cmd response: success
2,620,886 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,627,209 UART:
2,627,225 UART: Running Caliptra FMC ...
2,627,633 UART:
2,627,771 UART: [fmc] Received command: 0x1000000B
3,609,494 UART:
3,609,510 UART: Running Caliptra FMC ...
3,609,918 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,444 UART: [kat] SHA2-512-ACC
906,345 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,556 UART: [kat] LMS
1,168,868 UART: [kat] --
1,169,773 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,981 UART: [idev] ++
1,173,149 UART: [idev] CDI.KEYID = 6
1,173,510 UART: [idev] SUBJECT.KEYID = 7
1,173,935 UART: [idev] UDS.KEYID = 0
1,174,281 ready_for_fw is high
1,174,281 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,442 UART: [idev] --
1,209,441 UART: [ldev] ++
1,209,609 UART: [ldev] CDI.KEYID = 6
1,209,973 UART: [ldev] SUBJECT.KEYID = 5
1,210,400 UART: [ldev] AUTHORITY.KEYID = 7
1,210,863 UART: [ldev] FE.KEYID = 1
1,216,059 UART: [ldev] Erasing FE.KEYID = 1
1,242,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,862 UART: [fwproc] Wait for Commands...
1,282,509 UART: [fwproc] Recv command 0x46574c44
1,283,242 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,948 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,226 >>> mbox cmd response: success
2,714,328 UART: [afmc] ++
2,714,496 UART: [afmc] CDI.KEYID = 6
2,714,859 UART: [afmc] SUBJECT.KEYID = 7
2,715,285 UART: [afmc] AUTHORITY.KEYID = 5
2,751,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,155 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,875 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,768 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,461 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,236 UART: [afmc] --
2,794,073 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,794,095 UART: [cold-reset] --
2,794,843 UART: [state] Locking Datavault
2,795,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,494 UART: [state] Locking ICCM
2,797,036 UART: [exit] Launching FMC @ 0x40000000
2,802,333 UART:
2,802,349 UART: Running Caliptra FMC ...
2,802,757 UART:
2,802,895 UART: [fmc] Received command: 0x1000000B
2,803,727 UART:
2,803,743 UART: Running Caliptra ROM ...
2,804,151 UART:
2,804,293 UART: [state] CFI Enabled
2,806,655 UART: [state] LifecycleState = Unprovisioned
2,807,310 UART: [state] DebugLocked = No
2,807,972 UART: [state] WD Timer not started. Device not locked for debugging
2,809,086 UART: [kat] SHA2-256
3,612,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,740 UART: [kat] ++
3,616,892 UART: [kat] sha1
3,621,152 UART: [kat] SHA2-256
3,623,092 UART: [kat] SHA2-384
3,625,833 UART: [kat] SHA2-512-ACC
3,627,733 UART: [kat] ECC-384
3,637,582 UART: [kat] HMAC-384Kdf
3,642,098 UART: [kat] LMS
3,890,410 UART: [kat] --
3,891,018 UART: [update-reset] ++
3,891,335 UART: Invalid command 0x1000000b recv
3,892,513 UART: ROM Non-Fatal Error: 0x01040003
3,893,289 UART: [state] Locking Datavault
3,893,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,547 UART: [state] Locking ICCM
3,895,101 UART: [exit] Launching FMC @ 0x40000000
3,900,398 UART:
3,900,414 UART: Running Caliptra FMC ...
3,900,822 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,083 ready_for_fw is high
1,060,083 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,909 >>> mbox cmd response: success
2,622,497 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,629,018 UART:
2,629,034 UART: Running Caliptra FMC ...
2,629,442 UART:
2,629,580 UART: [fmc] Received command: 0x1000000B
3,611,368 UART:
3,611,384 UART: Running Caliptra FMC ...
3,611,792 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,671 UART: [kat] SHA2-512-ACC
906,572 UART: [kat] ECC-384
916,555 UART: [kat] HMAC-384Kdf
921,265 UART: [kat] LMS
1,169,577 UART: [kat] --
1,170,604 UART: [cold-reset] ++
1,171,022 UART: [fht] FHT @ 0x50003400
1,173,752 UART: [idev] ++
1,173,920 UART: [idev] CDI.KEYID = 6
1,174,281 UART: [idev] SUBJECT.KEYID = 7
1,174,706 UART: [idev] UDS.KEYID = 0
1,175,052 ready_for_fw is high
1,175,052 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,577 UART: [idev] Erasing UDS.KEYID = 0
1,199,667 UART: [idev] Sha1 KeyId Algorithm
1,208,563 UART: [idev] --
1,209,656 UART: [ldev] ++
1,209,824 UART: [ldev] CDI.KEYID = 6
1,210,188 UART: [ldev] SUBJECT.KEYID = 5
1,210,615 UART: [ldev] AUTHORITY.KEYID = 7
1,211,078 UART: [ldev] FE.KEYID = 1
1,216,334 UART: [ldev] Erasing FE.KEYID = 1
1,243,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,296 UART: [ldev] --
1,282,669 UART: [fwproc] Wait for Commands...
1,283,258 UART: [fwproc] Recv command 0x46574c44
1,283,991 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,805 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,888 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,111 >>> mbox cmd response: success
2,715,179 UART: [afmc] ++
2,715,347 UART: [afmc] CDI.KEYID = 6
2,715,710 UART: [afmc] SUBJECT.KEYID = 7
2,716,136 UART: [afmc] AUTHORITY.KEYID = 5
2,751,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,267 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,016 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,736 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,629 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,322 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,113 UART: [afmc] --
2,794,960 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,794,982 UART: [cold-reset] --
2,795,776 UART: [state] Locking Datavault
2,796,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,413 UART: [state] Locking ICCM
2,797,999 UART: [exit] Launching FMC @ 0x40000000
2,803,296 UART:
2,803,312 UART: Running Caliptra FMC ...
2,803,720 UART:
2,803,858 UART: [fmc] Received command: 0x1000000B
2,804,690 UART:
2,804,706 UART: Running Caliptra ROM ...
2,805,114 UART:
2,805,169 UART: [state] CFI Enabled
2,808,091 UART: [state] LifecycleState = Unprovisioned
2,808,746 UART: [state] DebugLocked = No
2,809,478 UART: [state] WD Timer not started. Device not locked for debugging
2,810,774 UART: [kat] SHA2-256
3,614,324 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,618,428 UART: [kat] ++
3,618,580 UART: [kat] sha1
3,622,898 UART: [kat] SHA2-256
3,624,838 UART: [kat] SHA2-384
3,627,615 UART: [kat] SHA2-512-ACC
3,629,515 UART: [kat] ECC-384
3,638,860 UART: [kat] HMAC-384Kdf
3,643,374 UART: [kat] LMS
3,891,686 UART: [kat] --
3,892,362 UART: [update-reset] ++
3,892,679 UART: Invalid command 0x1000000b recv
3,893,841 UART: ROM Non-Fatal Error: 0x01040003
3,894,629 UART: [state] Locking Datavault
3,895,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,895,925 UART: [state] Locking ICCM
3,896,473 UART: [exit] Launching FMC @ 0x40000000
3,901,770 UART:
3,901,786 UART: Running Caliptra FMC ...
3,902,194 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,708 ready_for_fw is high
1,058,708 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,392 >>> mbox cmd response: success
2,622,248 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,628,343 UART:
2,628,359 UART: Running Caliptra FMC ...
2,628,767 UART:
2,628,905 UART: [fmc] Received command: 0x1000000B
3,610,244 UART:
3,610,260 UART: Running Caliptra FMC ...
3,610,668 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,617 UART: [kat] SHA2-256
901,557 UART: [kat] SHA2-384
904,352 UART: [kat] SHA2-512-ACC
906,253 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,772 UART: [kat] LMS
1,169,084 UART: [kat] --
1,169,901 UART: [cold-reset] ++
1,170,411 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 ready_for_fw is high
1,174,251 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,754 UART: [idev] Erasing UDS.KEYID = 0
1,199,514 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,581 UART: [ldev] ++
1,209,749 UART: [ldev] CDI.KEYID = 6
1,210,113 UART: [ldev] SUBJECT.KEYID = 5
1,210,540 UART: [ldev] AUTHORITY.KEYID = 7
1,211,003 UART: [ldev] FE.KEYID = 1
1,216,157 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,095 UART: [ldev] --
1,281,448 UART: [fwproc] Wait for Commands...
1,282,223 UART: [fwproc] Recv command 0x46574c44
1,282,956 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,206 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,686 >>> mbox cmd response: success
2,713,872 UART: [afmc] ++
2,714,040 UART: [afmc] CDI.KEYID = 6
2,714,403 UART: [afmc] SUBJECT.KEYID = 7
2,714,829 UART: [afmc] AUTHORITY.KEYID = 5
2,750,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,143 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,772,863 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,756 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,449 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,238 UART: [afmc] --
2,793,177 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,793,199 UART: [cold-reset] --
2,793,963 UART: [state] Locking Datavault
2,795,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,795,666 UART: [state] Locking ICCM
2,796,096 UART: [exit] Launching FMC @ 0x40000000
2,801,393 UART:
2,801,409 UART: Running Caliptra FMC ...
2,801,817 UART:
2,801,955 UART: [fmc] Received command: 0x1000000B
2,802,787 UART:
2,802,803 UART: Running Caliptra ROM ...
2,803,211 UART:
2,803,353 UART: [state] CFI Enabled
2,806,139 UART: [state] LifecycleState = Unprovisioned
2,806,794 UART: [state] DebugLocked = No
2,807,278 UART: [state] WD Timer not started. Device not locked for debugging
2,808,516 UART: [kat] SHA2-256
3,612,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,170 UART: [kat] ++
3,616,322 UART: [kat] sha1
3,620,454 UART: [kat] SHA2-256
3,622,394 UART: [kat] SHA2-384
3,625,221 UART: [kat] SHA2-512-ACC
3,627,121 UART: [kat] ECC-384
3,637,018 UART: [kat] HMAC-384Kdf
3,641,432 UART: [kat] LMS
3,889,744 UART: [kat] --
3,890,606 UART: [update-reset] ++
3,890,923 UART: Invalid command 0x1000000b recv
3,892,085 UART: ROM Non-Fatal Error: 0x01040003
3,892,875 UART: [state] Locking Datavault
3,893,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,177 UART: [state] Locking ICCM
3,894,649 UART: [exit] Launching FMC @ 0x40000000
3,899,946 UART:
3,899,962 UART: Running Caliptra FMC ...
3,900,370 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,569 >>> mbox cmd response: success
2,622,925 <<< Executing mbox cmd 0x1000000b (0 bytes) from SoC
2,629,080 UART:
2,629,096 UART: Running Caliptra FMC ...
2,629,504 UART:
2,629,642 UART: [fmc] Received command: 0x1000000B
3,610,766 UART:
3,610,782 UART: Running Caliptra FMC ...
3,611,190 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_non_fw_load_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,435 UART:
192,796 UART: Running Caliptra ROM ...
193,996 UART:
194,157 UART: [state] CFI Enabled
265,261 UART: [state] LifecycleState = Unprovisioned
267,249 UART: [state] DebugLocked = No
268,998 UART: [state] WD Timer not started. Device not locked for debugging
272,316 UART: [kat] SHA2-256
451,994 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,788 UART: [kat] ++
463,244 UART: [kat] sha1
474,910 UART: [kat] SHA2-256
477,618 UART: [kat] SHA2-384
481,844 UART: [kat] SHA2-512-ACC
484,225 UART: [kat] ECC-384
2,947,696 UART: [kat] HMAC-384Kdf
2,971,802 UART: [kat] LMS
3,448,304 UART: [kat] --
3,452,095 UART: [cold-reset] ++
3,453,823 UART: [fht] FHT @ 0x50003400
3,464,302 UART: [idev] ++
3,464,874 UART: [idev] CDI.KEYID = 6
3,465,788 UART: [idev] SUBJECT.KEYID = 7
3,467,035 UART: [idev] UDS.KEYID = 0
3,468,110 ready_for_fw is high
3,468,320 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,612,828 UART: [idev] Erasing UDS.KEYID = 0
5,991,416 UART: [idev] Sha1 KeyId Algorithm
6,014,591 UART: [idev] --
6,018,540 UART: [ldev] ++
6,019,122 UART: [ldev] CDI.KEYID = 6
6,020,093 UART: [ldev] SUBJECT.KEYID = 5
6,021,264 UART: [ldev] AUTHORITY.KEYID = 7
6,022,504 UART: [ldev] FE.KEYID = 1
6,058,328 UART: [ldev] Erasing FE.KEYID = 1
8,568,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,712 UART: [ldev] --
10,374,736 UART: [fwproc] Wait for Commands...
10,377,551 UART: [fwproc] Recv command 0x46574c44
10,379,576 UART: [fwproc] Recv'd Img size: 114888 bytes
13,819,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,895,838 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,956,095 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,284,566 >>> mbox cmd response: success
14,289,420 UART: [afmc] ++
14,290,011 UART: [afmc] CDI.KEYID = 6
14,290,995 UART: [afmc] SUBJECT.KEYID = 7
14,292,160 UART: [afmc] AUTHORITY.KEYID = 5
16,832,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,886 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,572,634 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,588,756 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,604,204 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,627,487 UART: [afmc] --
18,632,037 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,776,962 UART: [cold-reset] --
18,778,018 UART: [state] Locking Datavault
18,779,140 UART: [state] Locking PCR0, PCR1 and PCR31
18,780,680 UART: [state] Locking ICCM
18,781,591 UART: [exit] Launching FMC @ 0x40000000
18,783,019 UART:
18,783,193 UART: Running Caliptra FMC ...
18,784,297 UART:
18,784,461 UART: [fmc] Received command: 0x46574C44
18,785,921 UART:
18,786,083 UART: Running Caliptra ROM ...
18,787,191 UART:
18,787,376 UART: [state] CFI Enabled
18,847,654 UART: [state] LifecycleState = Unprovisioned
18,849,543 UART: [state] DebugLocked = No
18,851,138 UART: [state] WD Timer not started. Device not locked for debugging
18,854,671 UART: [kat] SHA2-256
19,034,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,045,139 UART: [kat] ++
19,045,605 UART: [kat] sha1
19,056,774 UART: [kat] SHA2-256
19,059,521 UART: [kat] SHA2-384
19,065,295 UART: [kat] SHA2-512-ACC
19,067,656 UART: [kat] ECC-384
21,531,177 UART: [kat] HMAC-384Kdf
21,553,834 UART: [kat] LMS
22,030,272 UART: [kat] --
22,034,586 UART: [update-reset] ++
25,473,452 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,477,214 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,862,026 >>> mbox cmd response: success
25,863,851 UART: [update-reset] Copying MAN_2 To MAN_1
25,900,983 UART: [update-reset Success] --
25,902,344 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,905,344 UART: [state] Locking Datavault
25,907,955 UART: [state] Locking PCR0, PCR1 and PCR31
25,909,658 UART: [state] Locking ICCM
25,910,921 UART: [exit] Launching FMC @ 0x40000000
25,919,313 UART:
25,919,550 UART: Running Caliptra FMC ...
25,920,654 UART:
25,920,821 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,922,457 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,857 writing to cptra_bootfsm_go
3,459,268 ready_for_fw is high
3,459,705 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,185,689 >>> mbox cmd response: success
18,457,548 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,603,153 UART:
18,603,558 UART: Running Caliptra FMC ...
18,604,687 UART:
18,604,843 UART: [fmc] Received command: 0x46574C44
25,724,815 >>> mbox cmd response: success
25,746,449 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,759,798 UART:
25,760,102 UART: Running Caliptra FMC ...
25,761,288 UART:
25,761,457 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,763,113 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,497 UART:
192,879 UART: Running Caliptra ROM ...
194,023 UART:
603,605 UART: [state] CFI Enabled
619,817 UART: [state] LifecycleState = Unprovisioned
621,769 UART: [state] DebugLocked = No
623,226 UART: [state] WD Timer not started. Device not locked for debugging
626,754 UART: [kat] SHA2-256
806,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,211 UART: [kat] ++
817,670 UART: [kat] sha1
827,828 UART: [kat] SHA2-256
830,567 UART: [kat] SHA2-384
835,425 UART: [kat] SHA2-512-ACC
837,790 UART: [kat] ECC-384
3,278,312 UART: [kat] HMAC-384Kdf
3,291,963 UART: [kat] LMS
3,768,419 UART: [kat] --
3,772,906 UART: [cold-reset] ++
3,774,503 UART: [fht] FHT @ 0x50003400
3,785,221 UART: [idev] ++
3,785,830 UART: [idev] CDI.KEYID = 6
3,786,740 UART: [idev] SUBJECT.KEYID = 7
3,787,983 UART: [idev] UDS.KEYID = 0
3,788,904 ready_for_fw is high
3,789,085 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,933,208 UART: [idev] Erasing UDS.KEYID = 0
6,267,484 UART: [idev] Sha1 KeyId Algorithm
6,291,173 UART: [idev] --
6,296,080 UART: [ldev] ++
6,296,649 UART: [ldev] CDI.KEYID = 6
6,297,533 UART: [ldev] SUBJECT.KEYID = 5
6,298,794 UART: [ldev] AUTHORITY.KEYID = 7
6,300,026 UART: [ldev] FE.KEYID = 1
6,309,705 UART: [ldev] Erasing FE.KEYID = 1
8,784,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,251 UART: [ldev] --
10,578,788 UART: [fwproc] Wait for Commands...
10,581,088 UART: [fwproc] Recv command 0x46574c44
10,583,088 UART: [fwproc] Recv'd Img size: 114888 bytes
14,026,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,107,494 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,167,713 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,496,781 >>> mbox cmd response: success
14,500,046 UART: [afmc] ++
14,500,661 UART: [afmc] CDI.KEYID = 6
14,501,580 UART: [afmc] SUBJECT.KEYID = 7
14,502,816 UART: [afmc] AUTHORITY.KEYID = 5
17,005,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,728,131 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,730,378 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
18,746,184 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
18,762,222 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
18,777,705 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
18,801,062 UART: [afmc] --
18,805,196 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,949,967 UART: [cold-reset] --
18,950,835 UART: [state] Locking Datavault
18,951,991 UART: [state] Locking PCR0, PCR1 and PCR31
18,953,528 UART: [state] Locking ICCM
18,954,405 UART: [exit] Launching FMC @ 0x40000000
18,955,823 UART:
18,955,976 UART: Running Caliptra FMC ...
18,957,091 UART:
18,957,248 UART: [fmc] Received command: 0x46574C44
18,958,702 UART:
18,958,852 UART: Running Caliptra ROM ...
18,959,943 UART:
18,960,091 UART: [state] CFI Enabled
18,968,405 UART: [state] LifecycleState = Unprovisioned
18,970,346 UART: [state] DebugLocked = No
18,973,288 UART: [state] WD Timer not started. Device not locked for debugging
18,978,068 UART: [kat] SHA2-256
19,157,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
19,168,544 UART: [kat] ++
19,169,077 UART: [kat] sha1
19,180,400 UART: [kat] SHA2-256
19,183,088 UART: [kat] SHA2-384
19,189,934 UART: [kat] SHA2-512-ACC
19,192,294 UART: [kat] ECC-384
21,631,462 UART: [kat] HMAC-384Kdf
21,643,362 UART: [kat] LMS
22,119,840 UART: [kat] --
22,123,339 UART: [update-reset] ++
25,572,725 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
25,576,528 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
25,961,310 >>> mbox cmd response: success
25,961,720 UART: [update-reset] Copying MAN_2 To MAN_1
25,998,691 UART: [update-reset Success] --
26,000,002 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
26,003,039 UART: [state] Locking Datavault
26,007,050 UART: [state] Locking PCR0, PCR1 and PCR31
26,008,809 UART: [state] Locking ICCM
26,010,960 UART: [exit] Launching FMC @ 0x40000000
26,019,367 UART:
26,019,664 UART: Running Caliptra FMC ...
26,020,779 UART:
26,020,939 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
26,022,572 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,151 writing to cptra_bootfsm_go
3,779,119 ready_for_fw is high
3,779,507 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,377,598 >>> mbox cmd response: success
18,614,699 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
18,759,598 UART:
18,759,985 UART: Running Caliptra FMC ...
18,761,199 UART:
18,761,374 UART: [fmc] Received command: 0x46574C44
25,776,741 >>> mbox cmd response: success
25,798,191 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
25,812,251 UART:
25,812,502 UART: Running Caliptra FMC ...
25,813,668 UART:
25,813,840 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
25,815,476 >>> mbox cmd response: success
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,636 UART: [state] LifecycleState = Unprovisioned
85,291 UART: [state] DebugLocked = No
85,785 UART: [state] WD Timer not started. Device not locked for debugging
87,020 UART: [kat] SHA2-256
890,570 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,674 UART: [kat] ++
894,826 UART: [kat] sha1
899,050 UART: [kat] SHA2-256
900,990 UART: [kat] SHA2-384
903,693 UART: [kat] SHA2-512-ACC
905,594 UART: [kat] ECC-384
915,061 UART: [kat] HMAC-384Kdf
919,609 UART: [kat] LMS
1,167,921 UART: [kat] --
1,168,732 UART: [cold-reset] ++
1,169,082 UART: [fht] FHT @ 0x50003400
1,171,640 UART: [idev] ++
1,171,808 UART: [idev] CDI.KEYID = 6
1,172,169 UART: [idev] SUBJECT.KEYID = 7
1,172,594 UART: [idev] UDS.KEYID = 0
1,172,940 ready_for_fw is high
1,172,940 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,531 UART: [idev] Erasing UDS.KEYID = 0
1,197,239 UART: [idev] Sha1 KeyId Algorithm
1,206,171 UART: [idev] --
1,207,404 UART: [ldev] ++
1,207,572 UART: [ldev] CDI.KEYID = 6
1,207,936 UART: [ldev] SUBJECT.KEYID = 5
1,208,363 UART: [ldev] AUTHORITY.KEYID = 7
1,208,826 UART: [ldev] FE.KEYID = 1
1,214,208 UART: [ldev] Erasing FE.KEYID = 1
1,240,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,658 UART: [ldev] --
1,278,963 UART: [fwproc] Wait for Commands...
1,279,684 UART: [fwproc] Recv command 0x46574c44
1,280,417 UART: [fwproc] Recv'd Img size: 114888 bytes
2,583,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,376 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,316 >>> mbox cmd response: success
2,777,418 UART: [afmc] ++
2,777,586 UART: [afmc] CDI.KEYID = 6
2,777,949 UART: [afmc] SUBJECT.KEYID = 7
2,778,375 UART: [afmc] AUTHORITY.KEYID = 5
2,813,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,312 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,008 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,842,907 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,600 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,326 UART: [afmc] --
2,857,149 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,857,171 UART: [cold-reset] --
2,858,055 UART: [state] Locking Datavault
2,859,298 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,902 UART: [state] Locking ICCM
2,860,344 UART: [exit] Launching FMC @ 0x40000000
2,865,641 UART:
2,865,657 UART: Running Caliptra FMC ...
2,866,065 UART:
2,866,295 UART: [fmc] Received command: 0x46574C44
2,867,121 UART:
2,867,137 UART: Running Caliptra ROM ...
2,867,545 UART:
2,867,600 UART: [state] CFI Enabled
2,870,498 UART: [state] LifecycleState = Unprovisioned
2,871,153 UART: [state] DebugLocked = No
2,871,643 UART: [state] WD Timer not started. Device not locked for debugging
2,872,961 UART: [kat] SHA2-256
3,676,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,615 UART: [kat] ++
3,680,767 UART: [kat] sha1
3,685,153 UART: [kat] SHA2-256
3,687,093 UART: [kat] SHA2-384
3,689,918 UART: [kat] SHA2-512-ACC
3,691,818 UART: [kat] ECC-384
3,701,209 UART: [kat] HMAC-384Kdf
3,705,933 UART: [kat] LMS
3,954,245 UART: [kat] --
3,954,967 UART: [update-reset] ++
5,273,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,216 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,686 >>> mbox cmd response: success
5,426,875 UART: [update-reset] Copying MAN_2 To MAN_1
5,434,889 UART: [update-reset Success] --
5,435,298 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,014 UART: [state] Locking Datavault
5,436,842 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,446 UART: [state] Locking ICCM
5,438,048 UART: [exit] Launching FMC @ 0x40000000
5,443,345 UART:
5,443,361 UART: Running Caliptra FMC ...
5,443,769 UART:
5,443,991 UART: [fmc] Received command: 0x1000000C
5,444,726 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,016 ready_for_fw is high
1,059,016 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,885 >>> mbox cmd response: success
2,687,880 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,694,275 UART:
2,694,291 UART: Running Caliptra FMC ...
2,694,699 UART:
2,694,929 UART: [fmc] Received command: 0x46574C44
5,139,192 >>> mbox cmd response: success
5,146,748 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,152,724 UART:
5,152,740 UART: Running Caliptra FMC ...
5,153,148 UART:
5,153,370 UART: [fmc] Received command: 0x1000000C
5,154,105 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
900,171 UART: [kat] SHA2-256
902,111 UART: [kat] SHA2-384
904,864 UART: [kat] SHA2-512-ACC
906,765 UART: [kat] ECC-384
916,220 UART: [kat] HMAC-384Kdf
920,660 UART: [kat] LMS
1,168,972 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,263 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 ready_for_fw is high
1,174,021 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,198,632 UART: [idev] Sha1 KeyId Algorithm
1,207,480 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,214,983 UART: [ldev] Erasing FE.KEYID = 1
1,241,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,275 UART: [ldev] --
1,280,674 UART: [fwproc] Wait for Commands...
1,281,275 UART: [fwproc] Recv command 0x46574c44
1,282,008 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,111 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,796 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,001 >>> mbox cmd response: success
2,779,161 UART: [afmc] ++
2,779,329 UART: [afmc] CDI.KEYID = 6
2,779,692 UART: [afmc] SUBJECT.KEYID = 7
2,780,118 UART: [afmc] AUTHORITY.KEYID = 5
2,816,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,091 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,787 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,686 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,850,379 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,858,047 UART: [afmc] --
2,858,910 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,932 UART: [cold-reset] --
2,859,606 UART: [state] Locking Datavault
2,860,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,247 UART: [state] Locking ICCM
2,861,711 UART: [exit] Launching FMC @ 0x40000000
2,867,008 UART:
2,867,024 UART: Running Caliptra FMC ...
2,867,432 UART:
2,867,662 UART: [fmc] Received command: 0x46574C44
2,868,488 UART:
2,868,504 UART: Running Caliptra ROM ...
2,868,912 UART:
2,869,054 UART: [state] CFI Enabled
2,871,794 UART: [state] LifecycleState = Unprovisioned
2,872,449 UART: [state] DebugLocked = No
2,872,931 UART: [state] WD Timer not started. Device not locked for debugging
2,874,079 UART: [kat] SHA2-256
3,677,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,733 UART: [kat] ++
3,681,885 UART: [kat] sha1
3,686,239 UART: [kat] SHA2-256
3,688,179 UART: [kat] SHA2-384
3,690,938 UART: [kat] SHA2-512-ACC
3,692,838 UART: [kat] ECC-384
3,702,627 UART: [kat] HMAC-384Kdf
3,707,235 UART: [kat] LMS
3,955,547 UART: [kat] --
3,956,795 UART: [update-reset] ++
5,274,279 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,430 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,900 >>> mbox cmd response: success
5,428,125 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,139 UART: [update-reset Success] --
5,436,548 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,952 UART: [state] Locking Datavault
5,437,590 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,194 UART: [state] Locking ICCM
5,438,694 UART: [exit] Launching FMC @ 0x40000000
5,443,991 UART:
5,444,007 UART: Running Caliptra FMC ...
5,444,415 UART:
5,444,637 UART: [fmc] Received command: 0x1000000C
5,445,372 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,385 ready_for_fw is high
1,059,385 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,404 >>> mbox cmd response: success
2,689,463 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,442 UART:
2,695,458 UART: Running Caliptra FMC ...
2,695,866 UART:
2,696,096 UART: [fmc] Received command: 0x46574C44
5,142,048 >>> mbox cmd response: success
5,149,704 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,155,630 UART:
5,155,646 UART: Running Caliptra FMC ...
5,156,054 UART:
5,156,276 UART: [fmc] Received command: 0x1000000C
5,157,011 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
891,058 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,162 UART: [kat] ++
895,314 UART: [kat] sha1
899,516 UART: [kat] SHA2-256
901,456 UART: [kat] SHA2-384
904,289 UART: [kat] SHA2-512-ACC
906,190 UART: [kat] ECC-384
915,825 UART: [kat] HMAC-384Kdf
920,235 UART: [kat] LMS
1,168,547 UART: [kat] --
1,169,544 UART: [cold-reset] ++
1,170,102 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 ready_for_fw is high
1,174,072 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,667 UART: [idev] Sha1 KeyId Algorithm
1,207,675 UART: [idev] --
1,208,846 UART: [ldev] ++
1,209,014 UART: [ldev] CDI.KEYID = 6
1,209,378 UART: [ldev] SUBJECT.KEYID = 5
1,209,805 UART: [ldev] AUTHORITY.KEYID = 7
1,210,268 UART: [ldev] FE.KEYID = 1
1,215,344 UART: [ldev] Erasing FE.KEYID = 1
1,241,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,894 UART: [ldev] --
1,281,301 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,615 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,888 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,573 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,974 >>> mbox cmd response: success
2,780,210 UART: [afmc] ++
2,780,378 UART: [afmc] CDI.KEYID = 6
2,780,741 UART: [afmc] SUBJECT.KEYID = 7
2,781,167 UART: [afmc] AUTHORITY.KEYID = 5
2,817,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,447 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,196 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,839,892 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,845,791 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,851,484 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,859,186 UART: [afmc] --
2,860,183 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,860,205 UART: [cold-reset] --
2,860,789 UART: [state] Locking Datavault
2,861,752 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,356 UART: [state] Locking ICCM
2,862,792 UART: [exit] Launching FMC @ 0x40000000
2,868,089 UART:
2,868,105 UART: Running Caliptra FMC ...
2,868,513 UART:
2,868,743 UART: [fmc] Received command: 0x46574C44
2,869,569 UART:
2,869,585 UART: Running Caliptra ROM ...
2,869,993 UART:
2,870,048 UART: [state] CFI Enabled
2,872,392 UART: [state] LifecycleState = Unprovisioned
2,873,047 UART: [state] DebugLocked = No
2,873,681 UART: [state] WD Timer not started. Device not locked for debugging
2,874,883 UART: [kat] SHA2-256
3,678,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,537 UART: [kat] ++
3,682,689 UART: [kat] sha1
3,686,791 UART: [kat] SHA2-256
3,688,731 UART: [kat] SHA2-384
3,691,718 UART: [kat] SHA2-512-ACC
3,693,618 UART: [kat] ECC-384
3,703,355 UART: [kat] HMAC-384Kdf
3,707,985 UART: [kat] LMS
3,956,297 UART: [kat] --
3,957,131 UART: [update-reset] ++
5,274,199 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,275,348 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,427,818 >>> mbox cmd response: success
5,428,015 UART: [update-reset] Copying MAN_2 To MAN_1
5,436,029 UART: [update-reset Success] --
5,436,438 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,437,128 UART: [state] Locking Datavault
5,437,870 UART: [state] Locking PCR0, PCR1 and PCR31
5,438,474 UART: [state] Locking ICCM
5,438,904 UART: [exit] Launching FMC @ 0x40000000
5,444,201 UART:
5,444,217 UART: Running Caliptra FMC ...
5,444,625 UART:
5,444,847 UART: [fmc] Received command: 0x1000000C
5,445,582 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,116 ready_for_fw is high
1,059,116 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,163 >>> mbox cmd response: success
2,686,978 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,475 UART:
2,693,491 UART: Running Caliptra FMC ...
2,693,899 UART:
2,694,129 UART: [fmc] Received command: 0x46574C44
5,136,526 >>> mbox cmd response: success
5,144,226 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,150,428 UART:
5,150,444 UART: Running Caliptra FMC ...
5,150,852 UART:
5,151,074 UART: [fmc] Received command: 0x1000000C
5,151,809 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,002 UART: [kat] HMAC-384Kdf
920,652 UART: [kat] LMS
1,168,964 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,185 UART: [fht] FHT @ 0x50003400
1,172,733 UART: [idev] ++
1,172,901 UART: [idev] CDI.KEYID = 6
1,173,262 UART: [idev] SUBJECT.KEYID = 7
1,173,687 UART: [idev] UDS.KEYID = 0
1,174,033 ready_for_fw is high
1,174,033 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,744 UART: [idev] Erasing UDS.KEYID = 0
1,198,722 UART: [idev] Sha1 KeyId Algorithm
1,207,492 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,360 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,076 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,280,994 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,609 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,687 >>> mbox cmd response: success
2,780,937 UART: [afmc] ++
2,781,105 UART: [afmc] CDI.KEYID = 6
2,781,468 UART: [afmc] SUBJECT.KEYID = 7
2,781,894 UART: [afmc] AUTHORITY.KEYID = 5
2,817,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,203 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,840,899 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,846,798 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,852,491 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,860,299 UART: [afmc] --
2,861,106 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,861,128 UART: [cold-reset] --
2,861,672 UART: [state] Locking Datavault
2,862,777 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,381 UART: [state] Locking ICCM
2,863,969 UART: [exit] Launching FMC @ 0x40000000
2,869,266 UART:
2,869,282 UART: Running Caliptra FMC ...
2,869,690 UART:
2,869,920 UART: [fmc] Received command: 0x46574C44
2,870,746 UART:
2,870,762 UART: Running Caliptra ROM ...
2,871,170 UART:
2,871,312 UART: [state] CFI Enabled
2,874,144 UART: [state] LifecycleState = Unprovisioned
2,874,799 UART: [state] DebugLocked = No
2,875,425 UART: [state] WD Timer not started. Device not locked for debugging
2,876,759 UART: [kat] SHA2-256
3,680,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,684,413 UART: [kat] ++
3,684,565 UART: [kat] sha1
3,688,761 UART: [kat] SHA2-256
3,690,701 UART: [kat] SHA2-384
3,693,484 UART: [kat] SHA2-512-ACC
3,695,384 UART: [kat] ECC-384
3,705,177 UART: [kat] HMAC-384Kdf
3,709,755 UART: [kat] LMS
3,958,067 UART: [kat] --
3,959,041 UART: [update-reset] ++
5,276,523 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,277,662 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,430,132 >>> mbox cmd response: success
5,430,317 UART: [update-reset] Copying MAN_2 To MAN_1
5,438,331 UART: [update-reset Success] --
5,438,740 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,439,120 UART: [state] Locking Datavault
5,439,862 UART: [state] Locking PCR0, PCR1 and PCR31
5,440,466 UART: [state] Locking ICCM
5,441,096 UART: [exit] Launching FMC @ 0x40000000
5,446,393 UART:
5,446,409 UART: Running Caliptra FMC ...
5,446,817 UART:
5,447,039 UART: [fmc] Received command: 0x1000000C
5,447,774 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,549 ready_for_fw is high
1,059,549 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,492 >>> mbox cmd response: success
2,689,689 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,695,760 UART:
2,695,776 UART: Running Caliptra FMC ...
2,696,184 UART:
2,696,414 UART: [fmc] Received command: 0x46574C44
5,143,074 >>> mbox cmd response: success
5,150,584 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,156,706 UART:
5,156,722 UART: Running Caliptra FMC ...
5,157,130 UART:
5,157,352 UART: [fmc] Received command: 0x1000000C
5,158,087 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Unprovisioned
85,799 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
891,102 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,206 UART: [kat] ++
895,358 UART: [kat] sha1
899,622 UART: [kat] SHA2-256
901,562 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
915,679 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,786 UART: [fht] FHT @ 0x50003400
1,172,330 UART: [idev] ++
1,172,498 UART: [idev] CDI.KEYID = 6
1,172,859 UART: [idev] SUBJECT.KEYID = 7
1,173,284 UART: [idev] UDS.KEYID = 0
1,173,630 ready_for_fw is high
1,173,630 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,037 UART: [idev] Erasing UDS.KEYID = 0
1,198,063 UART: [idev] Sha1 KeyId Algorithm
1,207,127 UART: [idev] --
1,208,200 UART: [ldev] ++
1,208,368 UART: [ldev] CDI.KEYID = 6
1,208,732 UART: [ldev] SUBJECT.KEYID = 5
1,209,159 UART: [ldev] AUTHORITY.KEYID = 7
1,209,622 UART: [ldev] FE.KEYID = 1
1,214,676 UART: [ldev] Erasing FE.KEYID = 1
1,241,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,056 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,106 UART: [fwproc] Recv command 0x46574c44
1,281,839 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,140 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,096 >>> mbox cmd response: success
2,779,314 UART: [afmc] ++
2,779,482 UART: [afmc] CDI.KEYID = 6
2,779,845 UART: [afmc] SUBJECT.KEYID = 7
2,780,271 UART: [afmc] AUTHORITY.KEYID = 5
2,815,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,795 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,544 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,838,240 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,844,139 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,849,832 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,857,404 UART: [afmc] --
2,858,211 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,858,233 UART: [cold-reset] --
2,859,175 UART: [state] Locking Datavault
2,860,468 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,072 UART: [state] Locking ICCM
2,861,580 UART: [exit] Launching FMC @ 0x40000000
2,866,877 UART:
2,866,893 UART: Running Caliptra FMC ...
2,867,301 UART:
2,867,531 UART: [fmc] Received command: 0x46574C44
2,868,357 UART:
2,868,373 UART: Running Caliptra ROM ...
2,868,781 UART:
2,868,836 UART: [state] CFI Enabled
2,871,056 UART: [state] LifecycleState = Unprovisioned
2,871,711 UART: [state] DebugLocked = No
2,872,407 UART: [state] WD Timer not started. Device not locked for debugging
2,873,739 UART: [kat] SHA2-256
3,677,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,393 UART: [kat] ++
3,681,545 UART: [kat] sha1
3,685,765 UART: [kat] SHA2-256
3,687,705 UART: [kat] SHA2-384
3,690,324 UART: [kat] SHA2-512-ACC
3,692,224 UART: [kat] ECC-384
3,701,989 UART: [kat] HMAC-384Kdf
3,706,567 UART: [kat] LMS
3,954,879 UART: [kat] --
3,955,929 UART: [update-reset] ++
5,273,485 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,274,448 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,918 >>> mbox cmd response: success
5,427,183 UART: [update-reset] Copying MAN_2 To MAN_1
5,435,197 UART: [update-reset Success] --
5,435,606 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,436,096 UART: [state] Locking Datavault
5,436,802 UART: [state] Locking PCR0, PCR1 and PCR31
5,437,406 UART: [state] Locking ICCM
5,437,852 UART: [exit] Launching FMC @ 0x40000000
5,443,149 UART:
5,443,165 UART: Running Caliptra FMC ...
5,443,573 UART:
5,443,795 UART: [fmc] Received command: 0x1000000C
5,444,530 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,922 ready_for_fw is high
1,058,922 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,275 >>> mbox cmd response: success
2,686,640 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,692,763 UART:
2,692,779 UART: Running Caliptra FMC ...
2,693,187 UART:
2,693,417 UART: [fmc] Received command: 0x46574C44
5,138,426 >>> mbox cmd response: success
5,146,080 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,638 UART:
5,151,654 UART: Running Caliptra FMC ...
5,152,062 UART:
5,152,284 UART: [fmc] Received command: 0x1000000C
5,153,019 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,795 UART: [state] LifecycleState = Unprovisioned
85,450 UART: [state] DebugLocked = No
85,946 UART: [state] WD Timer not started. Device not locked for debugging
87,111 UART: [kat] SHA2-256
890,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,765 UART: [kat] ++
894,917 UART: [kat] sha1
899,177 UART: [kat] SHA2-256
901,117 UART: [kat] SHA2-384
903,948 UART: [kat] SHA2-512-ACC
905,849 UART: [kat] ECC-384
915,590 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,299 UART: [cold-reset] ++
1,169,841 UART: [fht] FHT @ 0x50003400
1,172,487 UART: [idev] ++
1,172,655 UART: [idev] CDI.KEYID = 6
1,173,016 UART: [idev] SUBJECT.KEYID = 7
1,173,441 UART: [idev] UDS.KEYID = 0
1,173,787 ready_for_fw is high
1,173,787 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,948 UART: [idev] Erasing UDS.KEYID = 0
1,198,180 UART: [idev] Sha1 KeyId Algorithm
1,206,998 UART: [idev] --
1,207,925 UART: [ldev] ++
1,208,093 UART: [ldev] CDI.KEYID = 6
1,208,457 UART: [ldev] SUBJECT.KEYID = 5
1,208,884 UART: [ldev] AUTHORITY.KEYID = 7
1,209,347 UART: [ldev] FE.KEYID = 1
1,214,535 UART: [ldev] Erasing FE.KEYID = 1
1,240,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,887 UART: [ldev] --
1,280,308 UART: [fwproc] Wait for Commands...
1,281,057 UART: [fwproc] Recv command 0x46574c44
1,281,790 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,210 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,610,669 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,636,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,579 >>> mbox cmd response: success
2,777,767 UART: [afmc] ++
2,777,935 UART: [afmc] CDI.KEYID = 6
2,778,298 UART: [afmc] SUBJECT.KEYID = 7
2,778,724 UART: [afmc] AUTHORITY.KEYID = 5
2,814,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,831,679 UART: [afmc] PUB.X = DD05BEDAEC7522A28D4C10652ED1ABB1978240EDA5F0915357CA00DB516ABD1C69030AD9FDEC8FC36141372652D45F10
2,837,375 UART: [afmc] PUB.Y = 6DCB312CED0DA650CDFFF34B7E15D03410BCC7E04DB28B3022271DEFE3B064E4A59EE3FE1AC952299239BAC1847ED7C6
2,843,274 UART: [afmc] SIG.R = 377BF208A42E22F2EE5EA55C44CE1E7A116F2989382E0E6E3B4E47BC00AF2EA085BFB493BC5DD315D9EE01D38589B623
2,848,967 UART: [afmc] SIG.S = D0F9DD18ED9A1D6C55FDD14F78FB6D75429146A50773CB4B4DB48812114D4C55D1B4D1D4E8BC62CD464CFFE62368DF39
2,856,769 UART: [afmc] --
2,857,670 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,857,692 UART: [cold-reset] --
2,858,654 UART: [state] Locking Datavault
2,859,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,339 UART: [state] Locking ICCM
2,860,831 UART: [exit] Launching FMC @ 0x40000000
2,866,128 UART:
2,866,144 UART: Running Caliptra FMC ...
2,866,552 UART:
2,866,782 UART: [fmc] Received command: 0x46574C44
2,867,608 UART:
2,867,624 UART: Running Caliptra ROM ...
2,868,032 UART:
2,868,174 UART: [state] CFI Enabled
2,871,038 UART: [state] LifecycleState = Unprovisioned
2,871,693 UART: [state] DebugLocked = No
2,872,329 UART: [state] WD Timer not started. Device not locked for debugging
2,873,649 UART: [kat] SHA2-256
3,677,199 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,303 UART: [kat] ++
3,681,455 UART: [kat] sha1
3,685,611 UART: [kat] SHA2-256
3,687,551 UART: [kat] SHA2-384
3,690,132 UART: [kat] SHA2-512-ACC
3,692,032 UART: [kat] ECC-384
3,701,529 UART: [kat] HMAC-384Kdf
3,706,097 UART: [kat] LMS
3,954,409 UART: [kat] --
3,955,521 UART: [update-reset] ++
5,272,815 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,273,788 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,426,258 >>> mbox cmd response: success
5,426,381 UART: [update-reset] Copying MAN_2 To MAN_1
5,434,395 UART: [update-reset Success] --
5,434,804 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,435,204 UART: [state] Locking Datavault
5,435,820 UART: [state] Locking PCR0, PCR1 and PCR31
5,436,424 UART: [state] Locking ICCM
5,436,848 UART: [exit] Launching FMC @ 0x40000000
5,442,145 UART:
5,442,161 UART: Running Caliptra FMC ...
5,442,569 UART:
5,442,791 UART: [fmc] Received command: 0x1000000C
5,443,526 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 ready_for_fw is high
1,059,889 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,610 >>> mbox cmd response: success
2,687,395 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,693,256 UART:
2,693,272 UART: Running Caliptra FMC ...
2,693,680 UART:
2,693,910 UART: [fmc] Received command: 0x46574C44
5,137,882 >>> mbox cmd response: success
5,145,486 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
5,151,474 UART:
5,151,490 UART: Running Caliptra FMC ...
5,151,898 UART:
5,152,120 UART: [fmc] Received command: 0x1000000C
5,152,855 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
191,990 UART:
192,342 UART: Running Caliptra ROM ...
193,499 UART:
193,653 UART: [state] CFI Enabled
265,649 UART: [state] LifecycleState = Unprovisioned
267,681 UART: [state] DebugLocked = No
270,061 UART: [state] WD Timer not started. Device not locked for debugging
274,092 UART: [kat] SHA2-256
453,739 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,542 UART: [kat] ++
464,994 UART: [kat] sha1
474,590 UART: [kat] SHA2-256
477,312 UART: [kat] SHA2-384
483,945 UART: [kat] SHA2-512-ACC
486,329 UART: [kat] ECC-384
2,949,053 UART: [kat] HMAC-384Kdf
2,971,961 UART: [kat] LMS
3,448,500 UART: [kat] --
3,454,057 UART: [cold-reset] ++
3,455,285 UART: [fht] FHT @ 0x50003400
3,467,771 UART: [idev] ++
3,468,375 UART: [idev] CDI.KEYID = 6
3,469,270 UART: [idev] SUBJECT.KEYID = 7
3,470,522 UART: [idev] UDS.KEYID = 0
3,471,457 ready_for_fw is high
3,471,653 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,615,996 UART: [idev] Erasing UDS.KEYID = 0
5,988,374 UART: [idev] Sha1 KeyId Algorithm
6,011,873 UART: [idev] --
6,017,494 UART: [ldev] ++
6,018,095 UART: [ldev] CDI.KEYID = 6
6,018,992 UART: [ldev] SUBJECT.KEYID = 5
6,020,207 UART: [ldev] AUTHORITY.KEYID = 7
6,021,447 UART: [ldev] FE.KEYID = 1
6,059,296 UART: [ldev] Erasing FE.KEYID = 1
8,566,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,454 UART: [ldev] --
10,375,157 UART: [fwproc] Wait for Commands...
10,378,396 UART: [fwproc] Recv command 0x46574c44
10,380,388 UART: [fwproc] Recv'd Img size: 114888 bytes
13,820,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,898,274 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,958,510 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,286,676 >>> mbox cmd response: success
14,291,174 UART: [afmc] ++
14,291,765 UART: [afmc] CDI.KEYID = 6
14,292,656 UART: [afmc] SUBJECT.KEYID = 7
14,293,930 UART: [afmc] AUTHORITY.KEYID = 5
16,831,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,554,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,556,958 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,572,801 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,588,845 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,604,474 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,628,503 UART: [afmc] --
20,705,474 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,845,005 UART: [cold-reset] --
20,845,950 UART: [state] Locking Datavault
20,847,070 UART: [state] Locking PCR0, PCR1 and PCR31
20,848,625 UART: [state] Locking ICCM
20,849,541 UART: [exit] Launching FMC @ 0x40000000
20,850,973 UART:
20,851,143 UART: Running Caliptra FMC ...
20,852,245 UART:
20,852,408 UART: [fmc] Received command: 0x46574C44
20,853,891 UART:
20,854,053 UART: Running Caliptra ROM ...
20,855,159 UART:
20,855,319 UART: [state] CFI Enabled
20,919,699 UART: [state] LifecycleState = Unprovisioned
20,921,631 UART: [state] DebugLocked = No
20,924,475 UART: [state] WD Timer not started. Device not locked for debugging
20,928,803 UART: [kat] SHA2-256
21,108,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,119,255 UART: [kat] ++
21,119,806 UART: [kat] sha1
21,129,516 UART: [kat] SHA2-256
21,132,206 UART: [kat] SHA2-384
21,139,066 UART: [kat] SHA2-512-ACC
21,141,421 UART: [kat] ECC-384
23,597,611 UART: [kat] HMAC-384Kdf
23,620,554 UART: [kat] LMS
24,096,990 UART: [kat] --
24,100,496 UART: [update-reset] ++
24,147,547 >>> mbox cmd response: failed
24,147,953 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,149,100 UART: ROM Non-Fatal Error: 0x000B001E
24,152,103 UART: [state] Locking Datavault
24,154,663 UART: [state] Locking PCR0, PCR1 and PCR31
24,156,373 UART: [state] Locking ICCM
24,158,125 UART: [exit] Launching FMC @ 0x40000000
24,166,467 UART:
24,166,703 UART: Running Caliptra FMC ...
24,167,733 UART:
24,167,886 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,169,524 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,461,695 ready_for_fw is high
3,462,126 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,186,949 >>> mbox cmd response: success
20,520,146 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,659,249 UART:
20,659,659 UART: Running Caliptra FMC ...
20,660,823 UART:
20,661,005 UART: [fmc] Received command: 0x46574C44
23,953,267 >>> mbox cmd response: failed
23,953,721 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,964,162 UART:
23,964,424 UART: Running Caliptra FMC ...
23,965,579 UART:
23,965,749 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,967,399 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,508 UART:
192,863 UART: Running Caliptra ROM ...
194,040 UART:
603,535 UART: [state] CFI Enabled
617,685 UART: [state] LifecycleState = Unprovisioned
619,634 UART: [state] DebugLocked = No
621,159 UART: [state] WD Timer not started. Device not locked for debugging
624,778 UART: [kat] SHA2-256
804,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,170 UART: [kat] ++
815,767 UART: [kat] sha1
826,214 UART: [kat] SHA2-256
828,861 UART: [kat] SHA2-384
834,636 UART: [kat] SHA2-512-ACC
837,000 UART: [kat] ECC-384
3,277,662 UART: [kat] HMAC-384Kdf
3,289,751 UART: [kat] LMS
3,766,215 UART: [kat] --
3,769,572 UART: [cold-reset] ++
3,772,074 UART: [fht] FHT @ 0x50003400
3,783,763 UART: [idev] ++
3,784,333 UART: [idev] CDI.KEYID = 6
3,785,316 UART: [idev] SUBJECT.KEYID = 7
3,786,577 UART: [idev] UDS.KEYID = 0
3,787,502 ready_for_fw is high
3,787,684 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,931,948 UART: [idev] Erasing UDS.KEYID = 0
6,263,713 UART: [idev] Sha1 KeyId Algorithm
6,287,640 UART: [idev] --
6,292,989 UART: [ldev] ++
6,293,555 UART: [ldev] CDI.KEYID = 6
6,294,491 UART: [ldev] SUBJECT.KEYID = 5
6,295,695 UART: [ldev] AUTHORITY.KEYID = 7
6,296,980 UART: [ldev] FE.KEYID = 1
6,306,410 UART: [ldev] Erasing FE.KEYID = 1
8,782,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,418 UART: [ldev] --
10,575,953 UART: [fwproc] Wait for Commands...
10,578,694 UART: [fwproc] Recv command 0x46574c44
10,580,674 UART: [fwproc] Recv'd Img size: 114888 bytes
14,018,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,097,365 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,157,594 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,486,152 >>> mbox cmd response: success
14,490,272 UART: [afmc] ++
14,490,891 UART: [afmc] CDI.KEYID = 6
14,491,810 UART: [afmc] SUBJECT.KEYID = 7
14,493,027 UART: [afmc] AUTHORITY.KEYID = 5
16,995,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,716,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,718,842 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
18,734,742 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
18,750,820 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
18,766,471 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
18,791,432 UART: [afmc] --
20,865,164 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
21,004,326 UART: [cold-reset] --
21,005,255 UART: [state] Locking Datavault
21,006,460 UART: [state] Locking PCR0, PCR1 and PCR31
21,008,007 UART: [state] Locking ICCM
21,008,944 UART: [exit] Launching FMC @ 0x40000000
21,010,375 UART:
21,010,542 UART: Running Caliptra FMC ...
21,011,658 UART:
21,011,814 UART: [fmc] Received command: 0x46574C44
21,013,273 UART:
21,013,447 UART: Running Caliptra ROM ...
21,014,510 UART:
21,014,663 UART: [state] CFI Enabled
21,022,992 UART: [state] LifecycleState = Unprovisioned
21,024,925 UART: [state] DebugLocked = No
21,027,669 UART: [state] WD Timer not started. Device not locked for debugging
21,030,771 UART: [kat] SHA2-256
21,210,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
21,221,316 UART: [kat] ++
21,221,856 UART: [kat] sha1
21,232,475 UART: [kat] SHA2-256
21,235,165 UART: [kat] SHA2-384
21,242,392 UART: [kat] SHA2-512-ACC
21,244,743 UART: [kat] ECC-384
23,685,179 UART: [kat] HMAC-384Kdf
23,698,017 UART: [kat] LMS
24,174,499 UART: [kat] --
24,179,053 UART: [update-reset] ++
24,226,985 >>> mbox cmd response: failed
24,227,393 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,228,047 UART: ROM Non-Fatal Error: 0x000B001E
24,231,419 UART: [state] Locking Datavault
24,234,670 UART: [state] Locking PCR0, PCR1 and PCR31
24,236,422 UART: [state] Locking ICCM
24,238,417 UART: [exit] Launching FMC @ 0x40000000
24,246,766 UART:
24,247,007 UART: Running Caliptra FMC ...
24,248,117 UART:
24,248,273 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,249,914 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,780,197 ready_for_fw is high
3,780,606 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,388,102 >>> mbox cmd response: success
20,681,843 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
20,820,956 UART:
20,821,404 UART: Running Caliptra FMC ...
20,822,578 UART:
20,822,755 UART: [fmc] Received command: 0x46574C44
24,036,672 >>> mbox cmd response: failed
24,037,139 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
24,048,600 UART:
24,048,866 UART: Running Caliptra FMC ...
24,050,031 UART:
24,050,199 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
24,051,849 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,172 UART: [kat] SHA2-256
890,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,826 UART: [kat] ++
894,978 UART: [kat] sha1
899,044 UART: [kat] SHA2-256
900,984 UART: [kat] SHA2-384
903,697 UART: [kat] SHA2-512-ACC
905,598 UART: [kat] ECC-384
914,967 UART: [kat] HMAC-384Kdf
919,407 UART: [kat] LMS
1,167,719 UART: [kat] --
1,168,408 UART: [cold-reset] ++
1,168,832 UART: [fht] FHT @ 0x50003400
1,171,520 UART: [idev] ++
1,171,688 UART: [idev] CDI.KEYID = 6
1,172,049 UART: [idev] SUBJECT.KEYID = 7
1,172,474 UART: [idev] UDS.KEYID = 0
1,172,820 ready_for_fw is high
1,172,820 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,180,547 UART: [idev] Erasing UDS.KEYID = 0
1,197,769 UART: [idev] Sha1 KeyId Algorithm
1,206,489 UART: [idev] --
1,207,428 UART: [ldev] ++
1,207,596 UART: [ldev] CDI.KEYID = 6
1,207,960 UART: [ldev] SUBJECT.KEYID = 5
1,208,387 UART: [ldev] AUTHORITY.KEYID = 7
1,208,850 UART: [ldev] FE.KEYID = 1
1,214,288 UART: [ldev] Erasing FE.KEYID = 1
1,240,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,492 UART: [ldev] --
1,279,895 UART: [fwproc] Wait for Commands...
1,280,678 UART: [fwproc] Recv command 0x46574c44
1,281,411 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,711 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,396 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,731 >>> mbox cmd response: success
2,778,895 UART: [afmc] ++
2,779,063 UART: [afmc] CDI.KEYID = 6
2,779,426 UART: [afmc] SUBJECT.KEYID = 7
2,779,852 UART: [afmc] AUTHORITY.KEYID = 5
2,814,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,831,316 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,832,065 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,837,780 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,843,672 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,849,384 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,857,165 UART: [afmc] --
2,858,090 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,858,112 UART: [cold-reset] --
2,858,858 UART: [state] Locking Datavault
2,860,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,860,789 UART: [state] Locking ICCM
2,861,251 UART: [exit] Launching FMC @ 0x40000000
2,866,548 UART:
2,866,564 UART: Running Caliptra FMC ...
2,866,972 UART:
2,867,202 UART: [fmc] Received command: 0x46574C44
2,868,028 UART:
2,868,044 UART: Running Caliptra ROM ...
2,868,452 UART:
2,868,507 UART: [state] CFI Enabled
2,871,001 UART: [state] LifecycleState = Unprovisioned
2,871,656 UART: [state] DebugLocked = No
2,872,328 UART: [state] WD Timer not started. Device not locked for debugging
2,873,652 UART: [kat] SHA2-256
3,677,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,681,306 UART: [kat] ++
3,681,458 UART: [kat] sha1
3,685,700 UART: [kat] SHA2-256
3,687,640 UART: [kat] SHA2-384
3,690,373 UART: [kat] SHA2-512-ACC
3,692,273 UART: [kat] ECC-384
3,701,814 UART: [kat] HMAC-384Kdf
3,706,448 UART: [kat] LMS
3,954,760 UART: [kat] --
3,955,628 UART: [update-reset] ++
3,971,942 >>> mbox cmd response: failed
3,971,942 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,972,438 UART: ROM Non-Fatal Error: 0x000B001E
3,973,408 UART: [state] Locking Datavault
3,974,090 UART: [state] Locking PCR0, PCR1 and PCR31
3,974,694 UART: [state] Locking ICCM
3,975,218 UART: [exit] Launching FMC @ 0x40000000
3,980,515 UART:
3,980,531 UART: Running Caliptra FMC ...
3,980,939 UART:
3,981,161 UART: [fmc] Received command: 0x1000000C
3,981,896 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,300 ready_for_fw is high
1,059,300 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,312 >>> mbox cmd response: success
2,688,827 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,658 UART:
2,694,674 UART: Running Caliptra FMC ...
2,695,082 UART:
2,695,312 UART: [fmc] Received command: 0x46574C44
3,687,573 >>> mbox cmd response: failed
3,687,573 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,693,586 UART:
3,693,602 UART: Running Caliptra FMC ...
3,694,010 UART:
3,694,232 UART: [fmc] Received command: 0x1000000C
3,694,967 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,395 UART: [kat] SHA2-256
902,335 UART: [kat] SHA2-384
904,860 UART: [kat] SHA2-512-ACC
906,761 UART: [kat] ECC-384
916,464 UART: [kat] HMAC-384Kdf
921,194 UART: [kat] LMS
1,169,506 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,505 UART: [idev] ++
1,173,673 UART: [idev] CDI.KEYID = 6
1,174,034 UART: [idev] SUBJECT.KEYID = 7
1,174,459 UART: [idev] UDS.KEYID = 0
1,174,805 ready_for_fw is high
1,174,805 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,566 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,806 UART: [idev] --
1,209,913 UART: [ldev] ++
1,210,081 UART: [ldev] CDI.KEYID = 6
1,210,445 UART: [ldev] SUBJECT.KEYID = 5
1,210,872 UART: [ldev] AUTHORITY.KEYID = 7
1,211,335 UART: [ldev] FE.KEYID = 1
1,216,587 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,589 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,571 UART: [ldev] --
1,281,956 UART: [fwproc] Wait for Commands...
1,282,575 UART: [fwproc] Recv command 0x46574c44
1,283,308 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,614,408 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,254 >>> mbox cmd response: success
2,781,420 UART: [afmc] ++
2,781,588 UART: [afmc] CDI.KEYID = 6
2,781,951 UART: [afmc] SUBJECT.KEYID = 7
2,782,377 UART: [afmc] AUTHORITY.KEYID = 5
2,818,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,257 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,006 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,841,721 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,847,613 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,853,325 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,861,130 UART: [afmc] --
2,862,003 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,862,025 UART: [cold-reset] --
2,862,983 UART: [state] Locking Datavault
2,864,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,865,022 UART: [state] Locking ICCM
2,865,468 UART: [exit] Launching FMC @ 0x40000000
2,870,765 UART:
2,870,781 UART: Running Caliptra FMC ...
2,871,189 UART:
2,871,419 UART: [fmc] Received command: 0x46574C44
2,872,245 UART:
2,872,261 UART: Running Caliptra ROM ...
2,872,669 UART:
2,872,811 UART: [state] CFI Enabled
2,875,265 UART: [state] LifecycleState = Unprovisioned
2,875,920 UART: [state] DebugLocked = No
2,876,438 UART: [state] WD Timer not started. Device not locked for debugging
2,877,690 UART: [kat] SHA2-256
3,681,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,685,344 UART: [kat] ++
3,685,496 UART: [kat] sha1
3,689,866 UART: [kat] SHA2-256
3,691,806 UART: [kat] SHA2-384
3,694,575 UART: [kat] SHA2-512-ACC
3,696,475 UART: [kat] ECC-384
3,706,300 UART: [kat] HMAC-384Kdf
3,710,982 UART: [kat] LMS
3,959,294 UART: [kat] --
3,959,982 UART: [update-reset] ++
3,976,686 >>> mbox cmd response: failed
3,976,686 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,977,024 UART: ROM Non-Fatal Error: 0x000B001E
3,978,004 UART: [state] Locking Datavault
3,978,814 UART: [state] Locking PCR0, PCR1 and PCR31
3,979,418 UART: [state] Locking ICCM
3,979,844 UART: [exit] Launching FMC @ 0x40000000
3,985,141 UART:
3,985,157 UART: Running Caliptra FMC ...
3,985,565 UART:
3,985,787 UART: [fmc] Received command: 0x1000000C
3,986,522 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,167 ready_for_fw is high
1,060,167 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,371 >>> mbox cmd response: success
2,690,008 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,696,085 UART:
2,696,101 UART: Running Caliptra FMC ...
2,696,509 UART:
2,696,739 UART: [fmc] Received command: 0x46574C44
3,689,135 >>> mbox cmd response: failed
3,689,135 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,695,166 UART:
3,695,182 UART: Running Caliptra FMC ...
3,695,590 UART:
3,695,812 UART: [fmc] Received command: 0x1000000C
3,696,547 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,574 UART: [kat] SHA2-256
891,124 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,228 UART: [kat] ++
895,380 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
921,081 UART: [kat] LMS
1,169,393 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,210 UART: [idev] ++
1,173,378 UART: [idev] CDI.KEYID = 6
1,173,739 UART: [idev] SUBJECT.KEYID = 7
1,174,164 UART: [idev] UDS.KEYID = 0
1,174,510 ready_for_fw is high
1,174,510 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,173 UART: [idev] Erasing UDS.KEYID = 0
1,199,085 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,650 UART: [ldev] --
1,281,105 UART: [fwproc] Wait for Commands...
1,281,922 UART: [fwproc] Recv command 0x46574c44
1,282,655 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,260 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,837 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,737 >>> mbox cmd response: success
2,780,911 UART: [afmc] ++
2,781,079 UART: [afmc] CDI.KEYID = 6
2,781,442 UART: [afmc] SUBJECT.KEYID = 7
2,781,868 UART: [afmc] AUTHORITY.KEYID = 5
2,817,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,663 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,840,378 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,846,270 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,851,982 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,859,841 UART: [afmc] --
2,860,876 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,860,898 UART: [cold-reset] --
2,861,482 UART: [state] Locking Datavault
2,862,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,339 UART: [state] Locking ICCM
2,863,865 UART: [exit] Launching FMC @ 0x40000000
2,869,162 UART:
2,869,178 UART: Running Caliptra FMC ...
2,869,586 UART:
2,869,816 UART: [fmc] Received command: 0x46574C44
2,870,642 UART:
2,870,658 UART: Running Caliptra ROM ...
2,871,066 UART:
2,871,121 UART: [state] CFI Enabled
2,873,637 UART: [state] LifecycleState = Unprovisioned
2,874,292 UART: [state] DebugLocked = No
2,874,960 UART: [state] WD Timer not started. Device not locked for debugging
2,876,216 UART: [kat] SHA2-256
3,679,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,683,870 UART: [kat] ++
3,684,022 UART: [kat] sha1
3,688,368 UART: [kat] SHA2-256
3,690,308 UART: [kat] SHA2-384
3,692,851 UART: [kat] SHA2-512-ACC
3,694,751 UART: [kat] ECC-384
3,704,124 UART: [kat] HMAC-384Kdf
3,708,648 UART: [kat] LMS
3,956,960 UART: [kat] --
3,957,654 UART: [update-reset] ++
3,974,060 >>> mbox cmd response: failed
3,974,060 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,974,482 UART: ROM Non-Fatal Error: 0x000B001E
3,975,362 UART: [state] Locking Datavault
3,976,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,976,712 UART: [state] Locking ICCM
3,977,318 UART: [exit] Launching FMC @ 0x40000000
3,982,615 UART:
3,982,631 UART: Running Caliptra FMC ...
3,983,039 UART:
3,983,261 UART: [fmc] Received command: 0x1000000C
3,983,996 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,172 ready_for_fw is high
1,059,172 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,536 >>> mbox cmd response: success
2,688,307 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,286 UART:
2,694,302 UART: Running Caliptra FMC ...
2,694,710 UART:
2,694,940 UART: [fmc] Received command: 0x46574C44
3,687,103 >>> mbox cmd response: failed
3,687,103 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,692,918 UART:
3,692,934 UART: Running Caliptra FMC ...
3,693,342 UART:
3,693,564 UART: [fmc] Received command: 0x1000000C
3,694,299 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,769 UART: [kat] SHA2-256
891,319 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,423 UART: [kat] ++
895,575 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,730 UART: [kat] SHA2-512-ACC
906,631 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,170,283 UART: [cold-reset] ++
1,170,669 UART: [fht] FHT @ 0x50003400
1,173,205 UART: [idev] ++
1,173,373 UART: [idev] CDI.KEYID = 6
1,173,734 UART: [idev] SUBJECT.KEYID = 7
1,174,159 UART: [idev] UDS.KEYID = 0
1,174,505 ready_for_fw is high
1,174,505 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,184 UART: [idev] Erasing UDS.KEYID = 0
1,199,374 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,307 UART: [ldev] ++
1,209,475 UART: [ldev] CDI.KEYID = 6
1,209,839 UART: [ldev] SUBJECT.KEYID = 5
1,210,266 UART: [ldev] AUTHORITY.KEYID = 7
1,210,729 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,241,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,071 UART: [ldev] --
1,281,426 UART: [fwproc] Wait for Commands...
1,282,233 UART: [fwproc] Recv command 0x46574c44
1,282,966 UART: [fwproc] Recv'd Img size: 114888 bytes
2,584,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,610,178 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,635,863 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,776,242 >>> mbox cmd response: success
2,777,324 UART: [afmc] ++
2,777,492 UART: [afmc] CDI.KEYID = 6
2,777,855 UART: [afmc] SUBJECT.KEYID = 7
2,778,281 UART: [afmc] AUTHORITY.KEYID = 5
2,813,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,830,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,830,776 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,836,491 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,842,383 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,848,095 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,855,722 UART: [afmc] --
2,856,745 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,856,767 UART: [cold-reset] --
2,857,767 UART: [state] Locking Datavault
2,858,746 UART: [state] Locking PCR0, PCR1 and PCR31
2,859,350 UART: [state] Locking ICCM
2,859,888 UART: [exit] Launching FMC @ 0x40000000
2,865,185 UART:
2,865,201 UART: Running Caliptra FMC ...
2,865,609 UART:
2,865,839 UART: [fmc] Received command: 0x46574C44
2,866,665 UART:
2,866,681 UART: Running Caliptra ROM ...
2,867,089 UART:
2,867,231 UART: [state] CFI Enabled
2,869,951 UART: [state] LifecycleState = Unprovisioned
2,870,606 UART: [state] DebugLocked = No
2,871,276 UART: [state] WD Timer not started. Device not locked for debugging
2,872,554 UART: [kat] SHA2-256
3,676,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,680,208 UART: [kat] ++
3,680,360 UART: [kat] sha1
3,684,586 UART: [kat] SHA2-256
3,686,526 UART: [kat] SHA2-384
3,689,379 UART: [kat] SHA2-512-ACC
3,691,279 UART: [kat] ECC-384
3,701,264 UART: [kat] HMAC-384Kdf
3,705,862 UART: [kat] LMS
3,954,174 UART: [kat] --
3,954,694 UART: [update-reset] ++
3,971,284 >>> mbox cmd response: failed
3,971,284 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,971,788 UART: ROM Non-Fatal Error: 0x000B001E
3,972,628 UART: [state] Locking Datavault
3,973,488 UART: [state] Locking PCR0, PCR1 and PCR31
3,974,092 UART: [state] Locking ICCM
3,974,604 UART: [exit] Launching FMC @ 0x40000000
3,979,901 UART:
3,979,917 UART: Running Caliptra FMC ...
3,980,325 UART:
3,980,547 UART: [fmc] Received command: 0x1000000C
3,981,282 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,617 ready_for_fw is high
1,059,617 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,493 >>> mbox cmd response: success
2,689,410 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,695,337 UART:
2,695,353 UART: Running Caliptra FMC ...
2,695,761 UART:
2,695,991 UART: [fmc] Received command: 0x46574C44
3,689,565 >>> mbox cmd response: failed
3,689,565 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,695,526 UART:
3,695,542 UART: Running Caliptra FMC ...
3,695,950 UART:
3,696,172 UART: [fmc] Received command: 0x1000000C
3,696,907 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,626 UART: [kat] SHA2-256
901,566 UART: [kat] SHA2-384
904,203 UART: [kat] SHA2-512-ACC
906,104 UART: [kat] ECC-384
915,909 UART: [kat] HMAC-384Kdf
920,493 UART: [kat] LMS
1,168,805 UART: [kat] --
1,169,358 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,676 UART: [idev] ++
1,172,844 UART: [idev] CDI.KEYID = 6
1,173,205 UART: [idev] SUBJECT.KEYID = 7
1,173,630 UART: [idev] UDS.KEYID = 0
1,173,976 ready_for_fw is high
1,173,976 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,559 UART: [idev] Erasing UDS.KEYID = 0
1,198,209 UART: [idev] Sha1 KeyId Algorithm
1,207,245 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,460 UART: [ldev] --
1,280,789 UART: [fwproc] Wait for Commands...
1,281,380 UART: [fwproc] Recv command 0x46574c44
1,282,113 UART: [fwproc] Recv'd Img size: 114888 bytes
2,585,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,611,975 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,637,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,993 >>> mbox cmd response: success
2,779,069 UART: [afmc] ++
2,779,237 UART: [afmc] CDI.KEYID = 6
2,779,600 UART: [afmc] SUBJECT.KEYID = 7
2,780,026 UART: [afmc] AUTHORITY.KEYID = 5
2,815,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,832,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,029 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,838,744 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,844,636 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,850,348 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,279 UART: [afmc] --
2,859,190 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,212 UART: [cold-reset] --
2,860,264 UART: [state] Locking Datavault
2,861,283 UART: [state] Locking PCR0, PCR1 and PCR31
2,861,887 UART: [state] Locking ICCM
2,862,389 UART: [exit] Launching FMC @ 0x40000000
2,867,686 UART:
2,867,702 UART: Running Caliptra FMC ...
2,868,110 UART:
2,868,340 UART: [fmc] Received command: 0x46574C44
2,869,166 UART:
2,869,182 UART: Running Caliptra ROM ...
2,869,590 UART:
2,869,645 UART: [state] CFI Enabled
2,872,335 UART: [state] LifecycleState = Unprovisioned
2,872,990 UART: [state] DebugLocked = No
2,873,482 UART: [state] WD Timer not started. Device not locked for debugging
2,874,630 UART: [kat] SHA2-256
3,678,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,284 UART: [kat] ++
3,682,436 UART: [kat] sha1
3,686,692 UART: [kat] SHA2-256
3,688,632 UART: [kat] SHA2-384
3,691,353 UART: [kat] SHA2-512-ACC
3,693,253 UART: [kat] ECC-384
3,702,650 UART: [kat] HMAC-384Kdf
3,707,260 UART: [kat] LMS
3,955,572 UART: [kat] --
3,956,530 UART: [update-reset] ++
3,973,028 >>> mbox cmd response: failed
3,973,028 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,973,482 UART: ROM Non-Fatal Error: 0x000B001E
3,974,436 UART: [state] Locking Datavault
3,975,046 UART: [state] Locking PCR0, PCR1 and PCR31
3,975,650 UART: [state] Locking ICCM
3,976,234 UART: [exit] Launching FMC @ 0x40000000
3,981,531 UART:
3,981,547 UART: Running Caliptra FMC ...
3,981,955 UART:
3,982,177 UART: [fmc] Received command: 0x1000000C
3,982,912 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,320 ready_for_fw is high
1,060,320 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,488 >>> mbox cmd response: success
2,687,305 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,693,524 UART:
2,693,540 UART: Running Caliptra FMC ...
2,693,948 UART:
2,694,178 UART: [fmc] Received command: 0x46574C44
3,686,125 >>> mbox cmd response: failed
3,686,125 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,691,830 UART:
3,691,846 UART: Running Caliptra FMC ...
3,692,254 UART:
3,692,476 UART: [fmc] Received command: 0x1000000C
3,693,211 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,644 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,069 UART: [kat] SHA2-256
902,009 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,406 UART: [kat] HMAC-384Kdf
921,158 UART: [kat] LMS
1,169,470 UART: [kat] --
1,170,457 UART: [cold-reset] ++
1,170,809 UART: [fht] FHT @ 0x50003400
1,173,567 UART: [idev] ++
1,173,735 UART: [idev] CDI.KEYID = 6
1,174,096 UART: [idev] SUBJECT.KEYID = 7
1,174,521 UART: [idev] UDS.KEYID = 0
1,174,867 ready_for_fw is high
1,174,867 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,316 UART: [idev] Erasing UDS.KEYID = 0
1,199,944 UART: [idev] Sha1 KeyId Algorithm
1,208,880 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,945 UART: [ldev] --
1,282,230 UART: [fwproc] Wait for Commands...
1,282,903 UART: [fwproc] Recv command 0x46574c44
1,283,636 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,489 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,613,680 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,558 >>> mbox cmd response: success
2,780,688 UART: [afmc] ++
2,780,856 UART: [afmc] CDI.KEYID = 6
2,781,219 UART: [afmc] SUBJECT.KEYID = 7
2,781,645 UART: [afmc] AUTHORITY.KEYID = 5
2,816,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,840 UART: [afmc] PUB.X = 49558745D3DAE37CA74FEF14256BBDF8E0A7CFD0A980A3B67F4E1B3A49C6C3A22294EA3F64D74D030AAF245057F88067
2,839,555 UART: [afmc] PUB.Y = 6546BAD9A0B2B3DECAF04B82667B01A398D029DA9E36725DD9A4207E167D6FD74225E2E6C35CD03E96FD72F61792212C
2,845,447 UART: [afmc] SIG.R = C16C592EEDAA5EB4333CCD94EE038642182943B117CBE7FD692ED0DCE622E7A8FF25087DF6452F06ACD25DB18F3026DD
2,851,159 UART: [afmc] SIG.S = 29FE8314678A60D5A93F39FDA68B21CB9630E9E3858E6F6538EF99DF33D73A1373A62A9ACA33D64037E4D729BF3C20CF
2,858,986 UART: [afmc] --
2,859,775 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,859,797 UART: [cold-reset] --
2,860,613 UART: [state] Locking Datavault
2,861,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,318 UART: [state] Locking ICCM
2,862,844 UART: [exit] Launching FMC @ 0x40000000
2,868,141 UART:
2,868,157 UART: Running Caliptra FMC ...
2,868,565 UART:
2,868,795 UART: [fmc] Received command: 0x46574C44
2,869,621 UART:
2,869,637 UART: Running Caliptra ROM ...
2,870,045 UART:
2,870,187 UART: [state] CFI Enabled
2,872,801 UART: [state] LifecycleState = Unprovisioned
2,873,456 UART: [state] DebugLocked = No
2,874,060 UART: [state] WD Timer not started. Device not locked for debugging
2,875,204 UART: [kat] SHA2-256
3,678,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,682,858 UART: [kat] ++
3,683,010 UART: [kat] sha1
3,687,234 UART: [kat] SHA2-256
3,689,174 UART: [kat] SHA2-384
3,691,883 UART: [kat] SHA2-512-ACC
3,693,783 UART: [kat] ECC-384
3,703,570 UART: [kat] HMAC-384Kdf
3,708,086 UART: [kat] LMS
3,956,398 UART: [kat] --
3,957,246 UART: [update-reset] ++
3,974,368 >>> mbox cmd response: failed
3,974,368 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,974,892 UART: ROM Non-Fatal Error: 0x000B001E
3,975,736 UART: [state] Locking Datavault
3,976,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,977,016 UART: [state] Locking ICCM
3,977,630 UART: [exit] Launching FMC @ 0x40000000
3,982,927 UART:
3,982,943 UART: Running Caliptra FMC ...
3,983,351 UART:
3,983,573 UART: [fmc] Received command: 0x1000000C
3,984,308 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,503 ready_for_fw is high
1,059,503 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,632,589 >>> mbox cmd response: success
2,688,554 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,694,683 UART:
2,694,699 UART: Running Caliptra FMC ...
2,695,107 UART:
2,695,337 UART: [fmc] Received command: 0x46574C44
3,686,949 >>> mbox cmd response: failed
3,686,949 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
3,692,960 UART:
3,692,976 UART: Running Caliptra FMC ...
3,693,384 UART:
3,693,606 UART: [fmc] Received command: 0x1000000C
3,694,341 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_ecc_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
191,999 UART:
192,364 UART: Running Caliptra ROM ...
193,504 UART:
193,655 UART: [state] CFI Enabled
262,661 UART: [state] LifecycleState = Unprovisioned
264,658 UART: [state] DebugLocked = No
266,485 UART: [state] WD Timer not started. Device not locked for debugging
271,085 UART: [kat] SHA2-256
450,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,545 UART: [kat] ++
462,088 UART: [kat] sha1
473,192 UART: [kat] SHA2-256
475,917 UART: [kat] SHA2-384
480,840 UART: [kat] SHA2-512-ACC
483,159 UART: [kat] ECC-384
2,926,396 UART: [kat] HMAC-384Kdf
2,950,925 UART: [kat] LMS
3,427,413 UART: [kat] --
3,433,682 UART: [cold-reset] ++
3,435,755 UART: [fht] FHT @ 0x50003400
3,447,870 UART: [idev] ++
3,448,511 UART: [idev] CDI.KEYID = 6
3,449,429 UART: [idev] SUBJECT.KEYID = 7
3,450,679 UART: [idev] UDS.KEYID = 0
3,451,609 ready_for_fw is high
3,451,806 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,596,315 UART: [idev] Erasing UDS.KEYID = 0
5,965,562 UART: [idev] Sha1 KeyId Algorithm
5,989,554 UART: [idev] --
5,994,738 UART: [ldev] ++
5,995,331 UART: [ldev] CDI.KEYID = 6
5,996,222 UART: [ldev] SUBJECT.KEYID = 5
5,997,440 UART: [ldev] AUTHORITY.KEYID = 7
5,998,676 UART: [ldev] FE.KEYID = 1
6,036,228 UART: [ldev] Erasing FE.KEYID = 1
8,540,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,307 UART: [ldev] --
10,353,612 UART: [fwproc] Wait for Commands...
10,355,659 UART: [fwproc] Recv command 0x46574c44
10,357,699 UART: [fwproc] Recv'd Img size: 114888 bytes
14,840,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,922,274 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,982,490 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,309,914 >>> mbox cmd response: success
15,313,857 UART: [afmc] ++
15,314,457 UART: [afmc] CDI.KEYID = 6
15,315,432 UART: [afmc] SUBJECT.KEYID = 7
15,316,652 UART: [afmc] AUTHORITY.KEYID = 5
17,854,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,598,919 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,601,151 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,617,076 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,633,087 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,648,595 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,672,825 UART: [afmc] --
19,678,165 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,823,180 UART: [cold-reset] --
19,824,044 UART: [state] Locking Datavault
19,825,224 UART: [state] Locking PCR0, PCR1 and PCR31
19,826,766 UART: [state] Locking ICCM
19,827,674 UART: [exit] Launching FMC @ 0x40000000
19,829,102 UART:
19,829,274 UART: Running Caliptra FMC ...
19,830,377 UART:
19,830,540 UART: [fmc] Received command: 0x46574C44
19,832,002 UART:
19,832,171 UART: Running Caliptra ROM ...
19,833,272 UART:
19,833,435 UART: [state] CFI Enabled
19,891,344 UART: [state] LifecycleState = Unprovisioned
19,893,273 UART: [state] DebugLocked = No
19,895,363 UART: [state] WD Timer not started. Device not locked for debugging
19,899,277 UART: [kat] SHA2-256
20,078,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,089,761 UART: [kat] ++
20,090,309 UART: [kat] sha1
20,102,292 UART: [kat] SHA2-256
20,105,022 UART: [kat] SHA2-384
20,109,728 UART: [kat] SHA2-512-ACC
20,112,081 UART: [kat] ECC-384
22,571,370 UART: [kat] HMAC-384Kdf
22,595,372 UART: [kat] LMS
23,071,821 UART: [kat] --
23,078,143 UART: [update-reset] ++
23,129,385 >>> mbox cmd response: failed
23,129,796 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,132,082 UART: ROM Non-Fatal Error: 0x000B003D
23,135,466 UART: [state] Locking Datavault
23,139,140 UART: [state] Locking PCR0, PCR1 and PCR31
23,140,850 UART: [state] Locking ICCM
23,142,163 UART: [exit] Launching FMC @ 0x40000000
23,150,519 UART:
23,150,764 UART: Running Caliptra FMC ...
23,151,875 UART:
23,152,041 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,153,687 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,460,327 ready_for_fw is high
3,460,709 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,322,210 >>> mbox cmd response: success
19,585,434 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,730,484 UART:
19,730,867 UART: Running Caliptra FMC ...
19,732,071 UART:
19,732,254 UART: [fmc] Received command: 0x46574C44
23,033,391 >>> mbox cmd response: failed
23,033,869 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,046,633 UART:
23,046,903 UART: Running Caliptra FMC ...
23,048,004 UART:
23,048,171 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,049,826 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.37s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,335 UART:
192,699 UART: Running Caliptra ROM ...
193,792 UART:
603,542 UART: [state] CFI Enabled
615,478 UART: [state] LifecycleState = Unprovisioned
617,382 UART: [state] DebugLocked = No
620,196 UART: [state] WD Timer not started. Device not locked for debugging
624,802 UART: [kat] SHA2-256
804,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,305 UART: [kat] ++
815,839 UART: [kat] sha1
826,786 UART: [kat] SHA2-256
829,507 UART: [kat] SHA2-384
835,704 UART: [kat] SHA2-512-ACC
838,077 UART: [kat] ECC-384
3,278,030 UART: [kat] HMAC-384Kdf
3,290,512 UART: [kat] LMS
3,767,017 UART: [kat] --
3,770,605 UART: [cold-reset] ++
3,772,123 UART: [fht] FHT @ 0x50003400
3,784,668 UART: [idev] ++
3,785,229 UART: [idev] CDI.KEYID = 6
3,786,257 UART: [idev] SUBJECT.KEYID = 7
3,787,452 UART: [idev] UDS.KEYID = 0
3,788,381 ready_for_fw is high
3,788,579 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,932,859 UART: [idev] Erasing UDS.KEYID = 0
6,258,885 UART: [idev] Sha1 KeyId Algorithm
6,282,812 UART: [idev] --
6,287,392 UART: [ldev] ++
6,288,022 UART: [ldev] CDI.KEYID = 6
6,288,931 UART: [ldev] SUBJECT.KEYID = 5
6,290,146 UART: [ldev] AUTHORITY.KEYID = 7
6,291,374 UART: [ldev] FE.KEYID = 1
6,301,314 UART: [ldev] Erasing FE.KEYID = 1
8,782,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,126 UART: [ldev] --
10,579,391 UART: [fwproc] Wait for Commands...
10,581,162 UART: [fwproc] Recv command 0x46574c44
10,583,203 UART: [fwproc] Recv'd Img size: 114888 bytes
15,064,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,151,449 UART: [fwproc] Load FMC at address 0x40000000 len 16384
15,211,645 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,539,704 >>> mbox cmd response: success
15,543,265 UART: [afmc] ++
15,543,878 UART: [afmc] CDI.KEYID = 6
15,544,790 UART: [afmc] SUBJECT.KEYID = 7
15,546,002 UART: [afmc] AUTHORITY.KEYID = 5
18,052,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,772,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,774,601 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
19,790,554 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
19,806,590 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
19,822,119 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
19,845,007 UART: [afmc] --
19,850,548 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,995,245 UART: [cold-reset] --
19,996,100 UART: [state] Locking Datavault
19,997,167 UART: [state] Locking PCR0, PCR1 and PCR31
19,998,701 UART: [state] Locking ICCM
19,999,584 UART: [exit] Launching FMC @ 0x40000000
20,000,923 UART:
20,001,070 UART: Running Caliptra FMC ...
20,002,174 UART:
20,002,329 UART: [fmc] Received command: 0x46574C44
20,003,708 UART:
20,003,851 UART: Running Caliptra ROM ...
20,004,975 UART:
20,005,136 UART: [state] CFI Enabled
20,013,965 UART: [state] LifecycleState = Unprovisioned
20,015,895 UART: [state] DebugLocked = No
20,018,332 UART: [state] WD Timer not started. Device not locked for debugging
20,022,443 UART: [kat] SHA2-256
20,202,147 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
20,212,949 UART: [kat] ++
20,213,407 UART: [kat] sha1
20,224,233 UART: [kat] SHA2-256
20,226,977 UART: [kat] SHA2-384
20,233,984 UART: [kat] SHA2-512-ACC
20,236,337 UART: [kat] ECC-384
22,681,685 UART: [kat] HMAC-384Kdf
22,694,543 UART: [kat] LMS
23,171,015 UART: [kat] --
23,176,299 UART: [update-reset] ++
23,230,261 >>> mbox cmd response: failed
23,230,647 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,231,837 UART: ROM Non-Fatal Error: 0x000B003D
23,235,523 UART: [state] Locking Datavault
23,237,800 UART: [state] Locking PCR0, PCR1 and PCR31
23,239,552 UART: [state] Locking ICCM
23,241,104 UART: [exit] Launching FMC @ 0x40000000
23,249,503 UART:
23,249,734 UART: Running Caliptra FMC ...
23,250,832 UART:
23,250,986 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,252,845 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,779,555 ready_for_fw is high
3,779,944 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
15,553,130 >>> mbox cmd response: success
19,786,815 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
19,931,605 UART:
19,931,982 UART: Running Caliptra FMC ...
19,933,082 UART:
19,933,232 UART: [fmc] Received command: 0x46574C44
23,153,584 >>> mbox cmd response: failed
23,154,076 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
23,164,991 UART:
23,165,252 UART: Running Caliptra FMC ...
23,166,346 UART:
23,166,494 UART: [fmc] Received command: 0x1000000C
* TESTCASE PASSED
23,168,136 >>> mbox cmd response: success
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,132 UART: [kat] ++
895,284 UART: [kat] sha1
899,574 UART: [kat] SHA2-256
901,514 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,009 UART: [kat] LMS
1,169,321 UART: [kat] --
1,170,456 UART: [cold-reset] ++
1,171,026 UART: [fht] FHT @ 0x50003400
1,173,558 UART: [idev] ++
1,173,726 UART: [idev] CDI.KEYID = 6
1,174,087 UART: [idev] SUBJECT.KEYID = 7
1,174,512 UART: [idev] UDS.KEYID = 0
1,174,858 ready_for_fw is high
1,174,858 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,409 UART: [idev] Erasing UDS.KEYID = 0
1,199,397 UART: [idev] Sha1 KeyId Algorithm
1,208,407 UART: [idev] --
1,209,448 UART: [ldev] ++
1,209,616 UART: [ldev] CDI.KEYID = 6
1,209,980 UART: [ldev] SUBJECT.KEYID = 5
1,210,407 UART: [ldev] AUTHORITY.KEYID = 7
1,210,870 UART: [ldev] FE.KEYID = 1
1,215,894 UART: [ldev] Erasing FE.KEYID = 1
1,242,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,609 UART: [fwproc] Wait for Commands...
1,282,278 UART: [fwproc] Recv command 0x46574c44
1,283,011 UART: [fwproc] Recv'd Img size: 114888 bytes
3,130,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,158,989 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,184,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,325,021 >>> mbox cmd response: success
3,326,059 UART: [afmc] ++
3,326,227 UART: [afmc] CDI.KEYID = 6
3,326,590 UART: [afmc] SUBJECT.KEYID = 7
3,327,016 UART: [afmc] AUTHORITY.KEYID = 5
3,362,197 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,378,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,379,643 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,385,354 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,391,241 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,396,939 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,404,536 UART: [afmc] --
3,405,395 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,405,417 UART: [cold-reset] --
3,406,187 UART: [state] Locking Datavault
3,407,312 UART: [state] Locking PCR0, PCR1 and PCR31
3,407,916 UART: [state] Locking ICCM
3,408,540 UART: [exit] Launching FMC @ 0x40000000
3,413,837 UART:
3,413,853 UART: Running Caliptra FMC ...
3,414,261 UART:
3,414,491 UART: [fmc] Received command: 0x46574C44
3,415,317 UART:
3,415,333 UART: Running Caliptra ROM ...
3,415,741 UART:
3,415,796 UART: [state] CFI Enabled
3,418,606 UART: [state] LifecycleState = Unprovisioned
3,419,261 UART: [state] DebugLocked = No
3,419,915 UART: [state] WD Timer not started. Device not locked for debugging
3,421,203 UART: [kat] SHA2-256
4,224,753 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,228,857 UART: [kat] ++
4,229,009 UART: [kat] sha1
4,233,417 UART: [kat] SHA2-256
4,235,357 UART: [kat] SHA2-384
4,238,148 UART: [kat] SHA2-512-ACC
4,240,048 UART: [kat] ECC-384
4,249,919 UART: [kat] HMAC-384Kdf
4,254,319 UART: [kat] LMS
4,502,631 UART: [kat] --
4,503,599 UART: [update-reset] ++
4,522,059 >>> mbox cmd response: failed
4,522,059 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,522,571 UART: ROM Non-Fatal Error: 0x000B003D
4,523,461 UART: [state] Locking Datavault
4,524,291 UART: [state] Locking PCR0, PCR1 and PCR31
4,524,895 UART: [state] Locking ICCM
4,525,539 UART: [exit] Launching FMC @ 0x40000000
4,530,836 UART:
4,530,852 UART: Running Caliptra FMC ...
4,531,260 UART:
4,531,482 UART: [fmc] Received command: 0x1000000C
4,532,217 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,306 ready_for_fw is high
1,059,306 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,175,898 >>> mbox cmd response: success
3,231,811 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,237,976 UART:
3,237,992 UART: Running Caliptra FMC ...
3,238,400 UART:
3,238,630 UART: [fmc] Received command: 0x46574C44
4,231,529 >>> mbox cmd response: failed
4,231,529 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,237,180 UART:
4,237,196 UART: Running Caliptra FMC ...
4,237,604 UART:
4,237,826 UART: [fmc] Received command: 0x1000000C
4,238,561 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,189 UART: [state] LifecycleState = Unprovisioned
85,844 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,532 UART: [kat] HMAC-384Kdf
921,248 UART: [kat] LMS
1,169,560 UART: [kat] --
1,170,221 UART: [cold-reset] ++
1,170,745 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 ready_for_fw is high
1,174,711 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,182 UART: [idev] Sha1 KeyId Algorithm
1,208,170 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,775 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,455 UART: [ldev] --
1,281,808 UART: [fwproc] Wait for Commands...
1,282,481 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 114888 bytes
3,123,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,151,865 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,177,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,317,781 >>> mbox cmd response: success
3,318,941 UART: [afmc] ++
3,319,109 UART: [afmc] CDI.KEYID = 6
3,319,472 UART: [afmc] SUBJECT.KEYID = 7
3,319,898 UART: [afmc] AUTHORITY.KEYID = 5
3,355,059 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,371,540 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,372,289 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,378,000 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,383,887 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,389,585 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,397,232 UART: [afmc] --
3,398,043 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,398,065 UART: [cold-reset] --
3,398,845 UART: [state] Locking Datavault
3,400,094 UART: [state] Locking PCR0, PCR1 and PCR31
3,400,698 UART: [state] Locking ICCM
3,401,200 UART: [exit] Launching FMC @ 0x40000000
3,406,497 UART:
3,406,513 UART: Running Caliptra FMC ...
3,406,921 UART:
3,407,151 UART: [fmc] Received command: 0x46574C44
3,407,977 UART:
3,407,993 UART: Running Caliptra ROM ...
3,408,401 UART:
3,408,543 UART: [state] CFI Enabled
3,411,325 UART: [state] LifecycleState = Unprovisioned
3,411,980 UART: [state] DebugLocked = No
3,412,464 UART: [state] WD Timer not started. Device not locked for debugging
3,413,760 UART: [kat] SHA2-256
4,217,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,414 UART: [kat] ++
4,221,566 UART: [kat] sha1
4,225,844 UART: [kat] SHA2-256
4,227,784 UART: [kat] SHA2-384
4,230,453 UART: [kat] SHA2-512-ACC
4,232,353 UART: [kat] ECC-384
4,242,508 UART: [kat] HMAC-384Kdf
4,247,122 UART: [kat] LMS
4,495,434 UART: [kat] --
4,496,400 UART: [update-reset] ++
4,514,080 >>> mbox cmd response: failed
4,514,080 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,514,420 UART: ROM Non-Fatal Error: 0x000B003D
4,515,308 UART: [state] Locking Datavault
4,515,966 UART: [state] Locking PCR0, PCR1 and PCR31
4,516,570 UART: [state] Locking ICCM
4,517,042 UART: [exit] Launching FMC @ 0x40000000
4,522,339 UART:
4,522,355 UART: Running Caliptra FMC ...
4,522,763 UART:
4,522,985 UART: [fmc] Received command: 0x1000000C
4,523,720 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,703 ready_for_fw is high
1,059,703 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,178,913 >>> mbox cmd response: success
3,235,036 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,241,351 UART:
3,241,367 UART: Running Caliptra FMC ...
3,241,775 UART:
3,242,005 UART: [fmc] Received command: 0x46574C44
4,234,873 >>> mbox cmd response: failed
4,234,873 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,240,926 UART:
4,240,942 UART: Running Caliptra FMC ...
4,241,350 UART:
4,241,572 UART: [fmc] Received command: 0x1000000C
4,242,307 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,616 UART: [state] LifecycleState = Unprovisioned
85,271 UART: [state] DebugLocked = No
85,849 UART: [state] WD Timer not started. Device not locked for debugging
87,144 UART: [kat] SHA2-256
890,694 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,798 UART: [kat] ++
894,950 UART: [kat] sha1
899,216 UART: [kat] SHA2-256
901,156 UART: [kat] SHA2-384
903,813 UART: [kat] SHA2-512-ACC
905,714 UART: [kat] ECC-384
915,659 UART: [kat] HMAC-384Kdf
920,205 UART: [kat] LMS
1,168,517 UART: [kat] --
1,169,464 UART: [cold-reset] ++
1,169,968 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 ready_for_fw is high
1,173,916 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,265 UART: [idev] --
1,208,158 UART: [ldev] ++
1,208,326 UART: [ldev] CDI.KEYID = 6
1,208,690 UART: [ldev] SUBJECT.KEYID = 5
1,209,117 UART: [ldev] AUTHORITY.KEYID = 7
1,209,580 UART: [ldev] FE.KEYID = 1
1,214,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,848 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,912 UART: [fwproc] Recv command 0x46574c44
1,282,645 UART: [fwproc] Recv'd Img size: 114888 bytes
3,125,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,153,215 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,178,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,319,143 >>> mbox cmd response: success
3,320,161 UART: [afmc] ++
3,320,329 UART: [afmc] CDI.KEYID = 6
3,320,692 UART: [afmc] SUBJECT.KEYID = 7
3,321,118 UART: [afmc] AUTHORITY.KEYID = 5
3,357,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,374,542 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,375,291 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,381,002 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,386,889 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,392,587 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,400,430 UART: [afmc] --
3,401,299 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,401,321 UART: [cold-reset] --
3,402,131 UART: [state] Locking Datavault
3,403,500 UART: [state] Locking PCR0, PCR1 and PCR31
3,404,104 UART: [state] Locking ICCM
3,404,714 UART: [exit] Launching FMC @ 0x40000000
3,410,011 UART:
3,410,027 UART: Running Caliptra FMC ...
3,410,435 UART:
3,410,665 UART: [fmc] Received command: 0x46574C44
3,411,491 UART:
3,411,507 UART: Running Caliptra ROM ...
3,411,915 UART:
3,411,970 UART: [state] CFI Enabled
3,414,268 UART: [state] LifecycleState = Unprovisioned
3,414,923 UART: [state] DebugLocked = No
3,415,459 UART: [state] WD Timer not started. Device not locked for debugging
3,416,815 UART: [kat] SHA2-256
4,220,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,469 UART: [kat] ++
4,224,621 UART: [kat] sha1
4,228,921 UART: [kat] SHA2-256
4,230,861 UART: [kat] SHA2-384
4,233,680 UART: [kat] SHA2-512-ACC
4,235,580 UART: [kat] ECC-384
4,245,387 UART: [kat] HMAC-384Kdf
4,250,183 UART: [kat] LMS
4,498,495 UART: [kat] --
4,499,671 UART: [update-reset] ++
4,517,567 >>> mbox cmd response: failed
4,517,567 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,518,095 UART: ROM Non-Fatal Error: 0x000B003D
4,518,865 UART: [state] Locking Datavault
4,519,643 UART: [state] Locking PCR0, PCR1 and PCR31
4,520,247 UART: [state] Locking ICCM
4,520,725 UART: [exit] Launching FMC @ 0x40000000
4,526,022 UART:
4,526,038 UART: Running Caliptra FMC ...
4,526,446 UART:
4,526,668 UART: [fmc] Received command: 0x1000000C
4,527,403 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,722 ready_for_fw is high
1,058,722 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,171,936 >>> mbox cmd response: success
3,227,301 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,233,568 UART:
3,233,584 UART: Running Caliptra FMC ...
3,233,992 UART:
3,234,222 UART: [fmc] Received command: 0x46574C44
4,226,889 >>> mbox cmd response: failed
4,226,889 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,232,678 UART:
4,232,694 UART: Running Caliptra FMC ...
4,233,102 UART:
4,233,324 UART: [fmc] Received command: 0x1000000C
4,234,059 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
86,824 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
899,955 UART: [kat] SHA2-256
901,895 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
920,990 UART: [kat] LMS
1,169,302 UART: [kat] --
1,170,231 UART: [cold-reset] ++
1,170,611 UART: [fht] FHT @ 0x50003400
1,173,455 UART: [idev] ++
1,173,623 UART: [idev] CDI.KEYID = 6
1,173,984 UART: [idev] SUBJECT.KEYID = 7
1,174,409 UART: [idev] UDS.KEYID = 0
1,174,755 ready_for_fw is high
1,174,755 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,199,628 UART: [idev] Sha1 KeyId Algorithm
1,208,388 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,018 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,823 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 114888 bytes
3,132,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,160,753 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,438 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,601 >>> mbox cmd response: success
3,327,619 UART: [afmc] ++
3,327,787 UART: [afmc] CDI.KEYID = 6
3,328,150 UART: [afmc] SUBJECT.KEYID = 7
3,328,576 UART: [afmc] AUTHORITY.KEYID = 5
3,364,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,381,008 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,381,757 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,387,468 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,393,355 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,399,053 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,406,956 UART: [afmc] --
3,407,813 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,407,835 UART: [cold-reset] --
3,408,589 UART: [state] Locking Datavault
3,409,450 UART: [state] Locking PCR0, PCR1 and PCR31
3,410,054 UART: [state] Locking ICCM
3,410,694 UART: [exit] Launching FMC @ 0x40000000
3,415,991 UART:
3,416,007 UART: Running Caliptra FMC ...
3,416,415 UART:
3,416,645 UART: [fmc] Received command: 0x46574C44
3,417,471 UART:
3,417,487 UART: Running Caliptra ROM ...
3,417,895 UART:
3,418,037 UART: [state] CFI Enabled
3,420,793 UART: [state] LifecycleState = Unprovisioned
3,421,448 UART: [state] DebugLocked = No
3,422,138 UART: [state] WD Timer not started. Device not locked for debugging
3,423,326 UART: [kat] SHA2-256
4,226,876 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,230,980 UART: [kat] ++
4,231,132 UART: [kat] sha1
4,235,436 UART: [kat] SHA2-256
4,237,376 UART: [kat] SHA2-384
4,240,059 UART: [kat] SHA2-512-ACC
4,241,959 UART: [kat] ECC-384
4,251,768 UART: [kat] HMAC-384Kdf
4,256,322 UART: [kat] LMS
4,504,634 UART: [kat] --
4,505,190 UART: [update-reset] ++
4,522,914 >>> mbox cmd response: failed
4,522,914 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,523,388 UART: ROM Non-Fatal Error: 0x000B003D
4,524,200 UART: [state] Locking Datavault
4,524,992 UART: [state] Locking PCR0, PCR1 and PCR31
4,525,596 UART: [state] Locking ICCM
4,526,164 UART: [exit] Launching FMC @ 0x40000000
4,531,461 UART:
4,531,477 UART: Running Caliptra FMC ...
4,531,885 UART:
4,532,107 UART: [fmc] Received command: 0x1000000C
4,532,842 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,503 ready_for_fw is high
1,059,503 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,171,193 >>> mbox cmd response: success
3,226,542 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,232,999 UART:
3,233,015 UART: Running Caliptra FMC ...
3,233,423 UART:
3,233,653 UART: [fmc] Received command: 0x46574C44
4,226,905 >>> mbox cmd response: failed
4,226,905 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,232,764 UART:
4,232,780 UART: Running Caliptra FMC ...
4,233,188 UART:
4,233,410 UART: [fmc] Received command: 0x1000000C
4,234,145 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,782 UART: [state] LifecycleState = Unprovisioned
85,437 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,414 UART: [kat] SHA2-256
901,354 UART: [kat] SHA2-384
904,147 UART: [kat] SHA2-512-ACC
906,048 UART: [kat] ECC-384
915,855 UART: [kat] HMAC-384Kdf
920,333 UART: [kat] LMS
1,168,645 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,670 UART: [idev] ++
1,172,838 UART: [idev] CDI.KEYID = 6
1,173,199 UART: [idev] SUBJECT.KEYID = 7
1,173,624 UART: [idev] UDS.KEYID = 0
1,173,970 ready_for_fw is high
1,173,970 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,409 UART: [idev] Erasing UDS.KEYID = 0
1,198,297 UART: [idev] Sha1 KeyId Algorithm
1,207,101 UART: [idev] --
1,208,264 UART: [ldev] ++
1,208,432 UART: [ldev] CDI.KEYID = 6
1,208,796 UART: [ldev] SUBJECT.KEYID = 5
1,209,223 UART: [ldev] AUTHORITY.KEYID = 7
1,209,686 UART: [ldev] FE.KEYID = 1
1,214,900 UART: [ldev] Erasing FE.KEYID = 1
1,241,131 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,137 UART: [fwproc] Wait for Commands...
1,280,858 UART: [fwproc] Recv command 0x46574c44
1,281,591 UART: [fwproc] Recv'd Img size: 114888 bytes
3,126,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,154,816 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,180,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,320,772 >>> mbox cmd response: success
3,321,884 UART: [afmc] ++
3,322,052 UART: [afmc] CDI.KEYID = 6
3,322,415 UART: [afmc] SUBJECT.KEYID = 7
3,322,841 UART: [afmc] AUTHORITY.KEYID = 5
3,358,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,375,351 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,376,100 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,381,811 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,387,698 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,393,396 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,401,241 UART: [afmc] --
3,402,270 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,402,292 UART: [cold-reset] --
3,403,328 UART: [state] Locking Datavault
3,404,473 UART: [state] Locking PCR0, PCR1 and PCR31
3,405,077 UART: [state] Locking ICCM
3,405,677 UART: [exit] Launching FMC @ 0x40000000
3,410,974 UART:
3,410,990 UART: Running Caliptra FMC ...
3,411,398 UART:
3,411,628 UART: [fmc] Received command: 0x46574C44
3,412,454 UART:
3,412,470 UART: Running Caliptra ROM ...
3,412,878 UART:
3,412,933 UART: [state] CFI Enabled
3,415,697 UART: [state] LifecycleState = Unprovisioned
3,416,352 UART: [state] DebugLocked = No
3,416,936 UART: [state] WD Timer not started. Device not locked for debugging
3,418,248 UART: [kat] SHA2-256
4,221,798 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,225,902 UART: [kat] ++
4,226,054 UART: [kat] sha1
4,230,168 UART: [kat] SHA2-256
4,232,108 UART: [kat] SHA2-384
4,235,017 UART: [kat] SHA2-512-ACC
4,236,917 UART: [kat] ECC-384
4,246,984 UART: [kat] HMAC-384Kdf
4,251,532 UART: [kat] LMS
4,499,844 UART: [kat] --
4,500,670 UART: [update-reset] ++
4,518,352 >>> mbox cmd response: failed
4,518,352 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,518,740 UART: ROM Non-Fatal Error: 0x000B003D
4,519,736 UART: [state] Locking Datavault
4,520,438 UART: [state] Locking PCR0, PCR1 and PCR31
4,521,042 UART: [state] Locking ICCM
4,521,524 UART: [exit] Launching FMC @ 0x40000000
4,526,821 UART:
4,526,837 UART: Running Caliptra FMC ...
4,527,245 UART:
4,527,467 UART: [fmc] Received command: 0x1000000C
4,528,202 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,656 ready_for_fw is high
1,059,656 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,186,236 >>> mbox cmd response: success
3,242,275 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,248,166 UART:
3,248,182 UART: Running Caliptra FMC ...
3,248,590 UART:
3,248,820 UART: [fmc] Received command: 0x46574C44
4,242,167 >>> mbox cmd response: failed
4,242,167 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,248,134 UART:
4,248,150 UART: Running Caliptra FMC ...
4,248,558 UART:
4,248,780 UART: [fmc] Received command: 0x1000000C
4,249,515 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,942 UART: [kat] SHA2-512-ACC
906,843 UART: [kat] ECC-384
916,766 UART: [kat] HMAC-384Kdf
921,398 UART: [kat] LMS
1,169,710 UART: [kat] --
1,170,607 UART: [cold-reset] ++
1,170,937 UART: [fht] FHT @ 0x50003400
1,173,733 UART: [idev] ++
1,173,901 UART: [idev] CDI.KEYID = 6
1,174,262 UART: [idev] SUBJECT.KEYID = 7
1,174,687 UART: [idev] UDS.KEYID = 0
1,175,033 ready_for_fw is high
1,175,033 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,962 UART: [idev] Erasing UDS.KEYID = 0
1,199,810 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,282,720 UART: [fwproc] Wait for Commands...
1,283,301 UART: [fwproc] Recv command 0x46574c44
1,284,034 UART: [fwproc] Recv'd Img size: 114888 bytes
3,133,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,161,110 UART: [fwproc] Load FMC at address 0x40000000 len 16384
3,186,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,326,958 >>> mbox cmd response: success
3,328,180 UART: [afmc] ++
3,328,348 UART: [afmc] CDI.KEYID = 6
3,328,711 UART: [afmc] SUBJECT.KEYID = 7
3,329,137 UART: [afmc] AUTHORITY.KEYID = 5
3,365,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,382,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,382,934 UART: [afmc] PUB.X = F68D99C565D61C5371CB333364A0D420EC459A28FFBE1A0B32B65BF7A30ED27CCB08124685ACADC1AEDE57354EA3C502
3,388,645 UART: [afmc] PUB.Y = 705377936C710868C3D8D84651E13E6C80E3C354A43DF7E8612F562AC0221489554A68DAF35155E3A5CED48AFBC7151C
3,394,532 UART: [afmc] SIG.R = A8F66B722C6468FD41DF8963AC01CB0A6AC3CBB4F70C051134B36FAD035F119BEE2A9E7849307D628046709C90645552
3,400,230 UART: [afmc] SIG.S = 844B68EA530A7C65DCA5462E8A88E027DE85FB6DC0D2B7FED472773F5447A03318123975A4E989250CF84F82949C6801
3,408,069 UART: [afmc] --
3,409,076 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,409,098 UART: [cold-reset] --
3,409,860 UART: [state] Locking Datavault
3,411,221 UART: [state] Locking PCR0, PCR1 and PCR31
3,411,825 UART: [state] Locking ICCM
3,412,405 UART: [exit] Launching FMC @ 0x40000000
3,417,702 UART:
3,417,718 UART: Running Caliptra FMC ...
3,418,126 UART:
3,418,356 UART: [fmc] Received command: 0x46574C44
3,419,182 UART:
3,419,198 UART: Running Caliptra ROM ...
3,419,606 UART:
3,419,748 UART: [state] CFI Enabled
3,422,592 UART: [state] LifecycleState = Unprovisioned
3,423,247 UART: [state] DebugLocked = No
3,423,751 UART: [state] WD Timer not started. Device not locked for debugging
3,424,919 UART: [kat] SHA2-256
4,228,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,232,573 UART: [kat] ++
4,232,725 UART: [kat] sha1
4,237,025 UART: [kat] SHA2-256
4,238,965 UART: [kat] SHA2-384
4,241,686 UART: [kat] SHA2-512-ACC
4,243,586 UART: [kat] ECC-384
4,253,469 UART: [kat] HMAC-384Kdf
4,258,031 UART: [kat] LMS
4,506,343 UART: [kat] --
4,507,251 UART: [update-reset] ++
4,525,233 >>> mbox cmd response: failed
4,525,233 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,525,675 UART: ROM Non-Fatal Error: 0x000B003D
4,526,619 UART: [state] Locking Datavault
4,527,205 UART: [state] Locking PCR0, PCR1 and PCR31
4,527,809 UART: [state] Locking ICCM
4,528,415 UART: [exit] Launching FMC @ 0x40000000
4,533,712 UART:
4,533,728 UART: Running Caliptra FMC ...
4,534,136 UART:
4,534,358 UART: [fmc] Received command: 0x1000000C
4,535,093 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,285 ready_for_fw is high
1,059,285 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,188,716 >>> mbox cmd response: success
3,244,421 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,250,518 UART:
3,250,534 UART: Running Caliptra FMC ...
3,250,942 UART:
3,251,172 UART: [fmc] Received command: 0x46574C44
4,244,544 >>> mbox cmd response: failed
4,244,544 <<< Executing mbox cmd 0x1000000c (0 bytes) from SoC
4,250,091 UART:
4,250,107 UART: Running Caliptra FMC ...
4,250,515 UART:
4,250,737 UART: [fmc] Received command: 0x1000000C
4,251,472 >>> mbox cmd response: success
* TESTCASE PASSED
test test_update_reset::test_update_reset_vendor_lms_pub_key_idx_dv_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,117 UART:
192,472 UART: Running Caliptra ROM ...
193,661 UART:
193,817 UART: [state] CFI Enabled
265,128 UART: [state] LifecycleState = Unprovisioned
267,065 UART: [state] DebugLocked = No
268,256 UART: [state] WD Timer not started. Device not locked for debugging
272,432 UART: [kat] SHA2-256
452,079 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,854 UART: [kat] ++
463,306 UART: [kat] sha1
475,607 UART: [kat] SHA2-256
478,329 UART: [kat] SHA2-384
484,036 UART: [kat] SHA2-512-ACC
486,412 UART: [kat] ECC-384
2,947,758 UART: [kat] HMAC-384Kdf
2,970,652 UART: [kat] LMS
3,447,164 UART: [kat] --
3,451,324 UART: [cold-reset] ++
3,452,482 UART: [fht] FHT @ 0x50003400
3,464,028 UART: [idev] ++
3,464,630 UART: [idev] CDI.KEYID = 6
3,465,602 UART: [idev] SUBJECT.KEYID = 7
3,466,783 UART: [idev] UDS.KEYID = 0
3,467,715 ready_for_fw is high
3,467,915 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,606,060 UART: [idev] Erasing UDS.KEYID = 0
5,990,156 UART: [idev] Sha1 KeyId Algorithm
6,014,638 UART: [idev] --
6,019,940 UART: [ldev] ++
6,020,514 UART: [ldev] CDI.KEYID = 6
6,021,467 UART: [ldev] SUBJECT.KEYID = 5
6,022,687 UART: [ldev] AUTHORITY.KEYID = 7
6,023,925 UART: [ldev] FE.KEYID = 1
6,056,871 UART: [ldev] Erasing FE.KEYID = 1
8,565,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,360 UART: [ldev] --
10,374,280 UART: [fwproc] Wait for Commands...
10,377,387 UART: [fwproc] Recv command 0x46574c44
10,379,432 UART: [fwproc] Recv'd Img size: 109820 bytes
13,743,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,822,235 UART: [fwproc] Load FMC at address 0x40000000 len 11316
13,864,687 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,193,371 >>> mbox cmd response: success
14,198,122 UART: [afmc] ++
14,198,713 UART: [afmc] CDI.KEYID = 6
14,199,652 UART: [afmc] SUBJECT.KEYID = 7
14,200,873 UART: [afmc] AUTHORITY.KEYID = 5
16,745,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,490,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,492,680 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,508,524 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,524,520 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,540,172 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,564,265 UART: [afmc] --
18,568,740 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,569,795 UART: [cold-reset] --
18,573,966 UART: [state] Locking Datavault
18,577,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,579,583 UART: [state] Locking ICCM
18,581,956 UART: [exit] Launching FMC @ 0x40000000
18,590,353 UART:
18,590,593 UART: Running Caliptra FMC ...
18,591,701 UART:
18,591,866 UART: [fmc] Received command: 0x46574C44
18,593,344 UART:
18,593,507 UART: Running Caliptra ROM ...
18,594,607 UART:
18,594,769 UART: [state] CFI Enabled
18,668,297 UART: [state] LifecycleState = Unprovisioned
18,670,226 UART: [state] DebugLocked = No
18,672,749 UART: [state] WD Timer not started. Device not locked for debugging
18,675,989 UART: [kat] SHA2-256
18,855,632 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,866,407 UART: [kat] ++
18,867,053 UART: [kat] sha1
18,878,227 UART: [kat] SHA2-256
18,880,919 UART: [kat] SHA2-384
18,887,392 UART: [kat] SHA2-512-ACC
18,889,797 UART: [kat] ECC-384
21,354,761 UART: [kat] HMAC-384Kdf
21,377,704 UART: [kat] LMS
21,854,151 UART: [kat] --
21,858,399 UART: [update-reset] ++
21,864,470 >>> mbox cmd response: failed
21,867,268 UART: ROM Non-Fatal Error: 0x000B0001
21,870,518 UART: [state] Locking Datavault
21,873,335 UART: [state] Locking PCR0, PCR1 and PCR31
21,875,092 UART: [state] Locking ICCM
21,876,330 UART: [exit] Launching FMC @ 0x40000000
21,884,703 UART:
21,884,950 UART: Running Caliptra FMC ...
21,886,097 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,459,508 ready_for_fw is high
3,460,091 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,045,767 >>> mbox cmd response: success
18,307,976 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,323,340 UART:
18,323,714 UART: Running Caliptra FMC ...
18,324,991 UART:
18,325,170 UART: [fmc] Received command: 0x46574C44
21,588,266 >>> mbox cmd response: failed
21,601,761 UART:
21,602,063 UART: Running Caliptra FMC ...
21,603,236 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,397 UART:
192,775 UART: Running Caliptra ROM ...
193,902 UART:
603,594 UART: [state] CFI Enabled
616,540 UART: [state] LifecycleState = Unprovisioned
618,416 UART: [state] DebugLocked = No
621,438 UART: [state] WD Timer not started. Device not locked for debugging
625,307 UART: [kat] SHA2-256
804,964 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,754 UART: [kat] ++
816,199 UART: [kat] sha1
827,777 UART: [kat] SHA2-256
830,430 UART: [kat] SHA2-384
836,063 UART: [kat] SHA2-512-ACC
838,452 UART: [kat] ECC-384
3,279,123 UART: [kat] HMAC-384Kdf
3,290,751 UART: [kat] LMS
3,767,286 UART: [kat] --
3,770,568 UART: [cold-reset] ++
3,772,424 UART: [fht] FHT @ 0x50003400
3,783,613 UART: [idev] ++
3,784,179 UART: [idev] CDI.KEYID = 6
3,785,213 UART: [idev] SUBJECT.KEYID = 7
3,786,384 UART: [idev] UDS.KEYID = 0
3,787,431 ready_for_fw is high
3,787,642 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
3,925,611 UART: [idev] Erasing UDS.KEYID = 0
6,260,375 UART: [idev] Sha1 KeyId Algorithm
6,283,665 UART: [idev] --
6,288,416 UART: [ldev] ++
6,289,058 UART: [ldev] CDI.KEYID = 6
6,289,974 UART: [ldev] SUBJECT.KEYID = 5
6,291,129 UART: [ldev] AUTHORITY.KEYID = 7
6,292,421 UART: [ldev] FE.KEYID = 1
6,303,809 UART: [ldev] Erasing FE.KEYID = 1
8,780,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,273 UART: [ldev] --
10,575,133 UART: [fwproc] Wait for Commands...
10,578,044 UART: [fwproc] Recv command 0x46574c44
10,580,030 UART: [fwproc] Recv'd Img size: 109820 bytes
13,951,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,033,602 UART: [fwproc] Load FMC at address 0x40000000 len 11316
14,076,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,404,814 >>> mbox cmd response: success
14,409,462 UART: [afmc] ++
14,410,113 UART: [afmc] CDI.KEYID = 6
14,410,998 UART: [afmc] SUBJECT.KEYID = 7
14,412,220 UART: [afmc] AUTHORITY.KEYID = 5
16,917,936 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,659 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
18,661,483 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
18,677,458 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
18,693,100 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
18,717,952 UART: [afmc] --
18,722,277 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,723,033 UART: [cold-reset] --
18,726,333 UART: [state] Locking Datavault
18,731,553 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,309 UART: [state] Locking ICCM
18,735,891 UART: [exit] Launching FMC @ 0x40000000
18,744,284 UART:
18,744,513 UART: Running Caliptra FMC ...
18,745,612 UART:
18,745,767 UART: [fmc] Received command: 0x46574C44
18,747,220 UART:
18,747,372 UART: Running Caliptra ROM ...
18,748,464 UART:
18,748,614 UART: [state] CFI Enabled
18,761,138 UART: [state] LifecycleState = Unprovisioned
18,763,023 UART: [state] DebugLocked = No
18,766,028 UART: [state] WD Timer not started. Device not locked for debugging
18,770,189 UART: [kat] SHA2-256
18,949,842 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
18,960,665 UART: [kat] ++
18,961,152 UART: [kat] sha1
18,972,520 UART: [kat] SHA2-256
18,975,211 UART: [kat] SHA2-384
18,981,143 UART: [kat] SHA2-512-ACC
18,983,487 UART: [kat] ECC-384
21,424,432 UART: [kat] HMAC-384Kdf
21,436,279 UART: [kat] LMS
21,912,747 UART: [kat] --
21,915,638 UART: [update-reset] ++
21,921,653 >>> mbox cmd response: failed
21,924,723 UART: ROM Non-Fatal Error: 0x000B0001
21,928,223 UART: [state] Locking Datavault
21,931,725 UART: [state] Locking PCR0, PCR1 and PCR31
21,933,472 UART: [state] Locking ICCM
21,934,985 UART: [exit] Launching FMC @ 0x40000000
21,943,367 UART:
21,943,623 UART: Running Caliptra FMC ...
21,944,761 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,781,404 ready_for_fw is high
3,782,058 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
14,308,572 >>> mbox cmd response: success
18,541,847 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
18,556,036 UART:
18,556,386 UART: Running Caliptra FMC ...
18,557,646 UART:
18,557,829 UART: [fmc] Received command: 0x46574C44
21,736,928 >>> mbox cmd response: failed
21,749,234 UART:
21,749,508 UART: Running Caliptra FMC ...
21,750,576 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,836 UART: [state] LifecycleState = Unprovisioned
85,491 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,330 UART: [kat] SHA2-256
901,270 UART: [kat] SHA2-384
904,071 UART: [kat] SHA2-512-ACC
905,972 UART: [kat] ECC-384
915,975 UART: [kat] HMAC-384Kdf
920,457 UART: [kat] LMS
1,168,769 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,174,044 ready_for_fw is high
1,174,044 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,689 UART: [idev] Erasing UDS.KEYID = 0
1,198,795 UART: [idev] Sha1 KeyId Algorithm
1,207,673 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,215,168 UART: [ldev] Erasing FE.KEYID = 1
1,241,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,470 UART: [ldev] --
1,280,797 UART: [fwproc] Wait for Commands...
1,281,470 UART: [fwproc] Recv command 0x46574c44
1,282,203 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,553,993 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,481 >>> mbox cmd response: success
2,713,745 UART: [afmc] ++
2,713,913 UART: [afmc] CDI.KEYID = 6
2,714,276 UART: [afmc] SUBJECT.KEYID = 7
2,714,702 UART: [afmc] AUTHORITY.KEYID = 5
2,750,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,766,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,362 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,082 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,778,975 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,784,668 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,565 UART: [afmc] --
2,793,496 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,793,518 UART: [cold-reset] --
2,794,542 UART: [state] Locking Datavault
2,795,747 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,351 UART: [state] Locking ICCM
2,796,855 UART: [exit] Launching FMC @ 0x40000000
2,802,152 UART:
2,802,168 UART: Running Caliptra FMC ...
2,802,576 UART:
2,802,714 UART: [fmc] Received command: 0x46574C44
2,803,543 UART:
2,803,559 UART: Running Caliptra ROM ...
2,803,967 UART:
2,804,022 UART: [state] CFI Enabled
2,806,506 UART: [state] LifecycleState = Unprovisioned
2,807,161 UART: [state] DebugLocked = No
2,807,877 UART: [state] WD Timer not started. Device not locked for debugging
2,809,121 UART: [kat] SHA2-256
3,612,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,775 UART: [kat] ++
3,616,927 UART: [kat] sha1
3,621,187 UART: [kat] SHA2-256
3,623,127 UART: [kat] SHA2-384
3,625,858 UART: [kat] SHA2-512-ACC
3,627,758 UART: [kat] ECC-384
3,637,187 UART: [kat] HMAC-384Kdf
3,641,683 UART: [kat] LMS
3,889,995 UART: [kat] --
3,890,793 UART: [update-reset] ++
3,892,366 >>> mbox cmd response: failed
3,892,680 UART: ROM Non-Fatal Error: 0x000B0001
3,893,588 UART: [state] Locking Datavault
3,894,290 UART: [state] Locking PCR0, PCR1 and PCR31
3,894,894 UART: [state] Locking ICCM
3,895,450 UART: [exit] Launching FMC @ 0x40000000
3,900,747 UART:
3,900,763 UART: Running Caliptra FMC ...
3,901,171 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,996 ready_for_fw is high
1,058,996 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,564,986 >>> mbox cmd response: success
2,620,584 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,626,653 UART:
2,626,669 UART: Running Caliptra FMC ...
2,627,077 UART:
2,627,215 UART: [fmc] Received command: 0x46574C44
3,604,354 >>> mbox cmd response: failed
3,610,351 UART:
3,610,367 UART: Running Caliptra FMC ...
3,610,775 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
891,685 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,789 UART: [kat] ++
895,941 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,465 UART: [cold-reset] ++
1,170,967 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 ready_for_fw is high
1,174,961 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,199,720 UART: [idev] Sha1 KeyId Algorithm
1,208,742 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,449 UART: [ldev] Erasing FE.KEYID = 1
1,242,316 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,377 UART: [ldev] --
1,281,768 UART: [fwproc] Wait for Commands...
1,282,453 UART: [fwproc] Recv command 0x46574c44
1,283,186 UART: [fwproc] Recv'd Img size: 109820 bytes
2,527,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,170 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,253 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,444 >>> mbox cmd response: success
2,714,638 UART: [afmc] ++
2,714,806 UART: [afmc] CDI.KEYID = 6
2,715,169 UART: [afmc] SUBJECT.KEYID = 7
2,715,595 UART: [afmc] AUTHORITY.KEYID = 5
2,751,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,185 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,905 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,798 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,491 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,370 UART: [afmc] --
2,794,381 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,403 UART: [cold-reset] --
2,795,465 UART: [state] Locking Datavault
2,796,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,274 UART: [state] Locking ICCM
2,797,818 UART: [exit] Launching FMC @ 0x40000000
2,803,115 UART:
2,803,131 UART: Running Caliptra FMC ...
2,803,539 UART:
2,803,677 UART: [fmc] Received command: 0x46574C44
2,804,506 UART:
2,804,522 UART: Running Caliptra ROM ...
2,804,930 UART:
2,805,072 UART: [state] CFI Enabled
2,807,870 UART: [state] LifecycleState = Unprovisioned
2,808,525 UART: [state] DebugLocked = No
2,809,055 UART: [state] WD Timer not started. Device not locked for debugging
2,810,213 UART: [kat] SHA2-256
3,613,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,867 UART: [kat] ++
3,618,019 UART: [kat] sha1
3,622,055 UART: [kat] SHA2-256
3,623,995 UART: [kat] SHA2-384
3,626,866 UART: [kat] SHA2-512-ACC
3,628,766 UART: [kat] ECC-384
3,638,835 UART: [kat] HMAC-384Kdf
3,643,603 UART: [kat] LMS
3,891,915 UART: [kat] --
3,892,667 UART: [update-reset] ++
3,894,018 >>> mbox cmd response: failed
3,894,228 UART: ROM Non-Fatal Error: 0x000B0001
3,894,998 UART: [state] Locking Datavault
3,895,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,360 UART: [state] Locking ICCM
3,896,888 UART: [exit] Launching FMC @ 0x40000000
3,902,185 UART:
3,902,201 UART: Running Caliptra FMC ...
3,902,609 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,065 ready_for_fw is high
1,059,065 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,265 >>> mbox cmd response: success
2,621,051 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,627,420 UART:
2,627,436 UART: Running Caliptra FMC ...
2,627,844 UART:
2,627,982 UART: [fmc] Received command: 0x46574C44
3,605,220 >>> mbox cmd response: failed
3,610,985 UART:
3,611,001 UART: Running Caliptra FMC ...
3,611,409 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,880 UART: [state] LifecycleState = Unprovisioned
85,535 UART: [state] DebugLocked = No
86,023 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,434 UART: [kat] SHA2-256
901,374 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,671 UART: [kat] HMAC-384Kdf
920,233 UART: [kat] LMS
1,168,545 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,170,192 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 ready_for_fw is high
1,174,240 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,719 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,622 UART: [ldev] ++
1,208,790 UART: [ldev] CDI.KEYID = 6
1,209,154 UART: [ldev] SUBJECT.KEYID = 5
1,209,581 UART: [ldev] AUTHORITY.KEYID = 7
1,210,044 UART: [ldev] FE.KEYID = 1
1,215,302 UART: [ldev] Erasing FE.KEYID = 1
1,241,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,412 UART: [ldev] --
1,280,763 UART: [fwproc] Wait for Commands...
1,281,402 UART: [fwproc] Recv command 0x46574c44
1,282,135 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,568 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,507 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,590 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,985 >>> mbox cmd response: success
2,714,133 UART: [afmc] ++
2,714,301 UART: [afmc] CDI.KEYID = 6
2,714,664 UART: [afmc] SUBJECT.KEYID = 7
2,715,090 UART: [afmc] AUTHORITY.KEYID = 5
2,751,352 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,603 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,768,352 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,072 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,965 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,658 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,793,407 UART: [afmc] --
2,794,438 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,794,460 UART: [cold-reset] --
2,795,270 UART: [state] Locking Datavault
2,796,413 UART: [state] Locking PCR0, PCR1 and PCR31
2,797,017 UART: [state] Locking ICCM
2,797,673 UART: [exit] Launching FMC @ 0x40000000
2,802,970 UART:
2,802,986 UART: Running Caliptra FMC ...
2,803,394 UART:
2,803,532 UART: [fmc] Received command: 0x46574C44
2,804,361 UART:
2,804,377 UART: Running Caliptra ROM ...
2,804,785 UART:
2,804,840 UART: [state] CFI Enabled
2,807,510 UART: [state] LifecycleState = Unprovisioned
2,808,165 UART: [state] DebugLocked = No
2,808,669 UART: [state] WD Timer not started. Device not locked for debugging
2,809,879 UART: [kat] SHA2-256
3,613,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,617,533 UART: [kat] ++
3,617,685 UART: [kat] sha1
3,621,867 UART: [kat] SHA2-256
3,623,807 UART: [kat] SHA2-384
3,626,436 UART: [kat] SHA2-512-ACC
3,628,336 UART: [kat] ECC-384
3,638,125 UART: [kat] HMAC-384Kdf
3,642,909 UART: [kat] LMS
3,891,221 UART: [kat] --
3,891,921 UART: [update-reset] ++
3,893,634 >>> mbox cmd response: failed
3,894,060 UART: ROM Non-Fatal Error: 0x000B0001
3,894,954 UART: [state] Locking Datavault
3,895,772 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,376 UART: [state] Locking ICCM
3,896,978 UART: [exit] Launching FMC @ 0x40000000
3,902,275 UART:
3,902,291 UART: Running Caliptra FMC ...
3,902,699 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,142 ready_for_fw is high
1,059,142 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,565,064 >>> mbox cmd response: success
2,620,386 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,626,587 UART:
2,626,603 UART: Running Caliptra FMC ...
2,627,011 UART:
2,627,149 UART: [fmc] Received command: 0x46574C44
3,603,540 >>> mbox cmd response: failed
3,609,555 UART:
3,609,571 UART: Running Caliptra FMC ...
3,609,979 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,284 UART: [state] WD Timer not started. Device not locked for debugging
87,567 UART: [kat] SHA2-256
891,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,221 UART: [kat] ++
895,373 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,232 UART: [kat] SHA2-512-ACC
906,133 UART: [kat] ECC-384
915,596 UART: [kat] HMAC-384Kdf
920,094 UART: [kat] LMS
1,168,406 UART: [kat] --
1,169,187 UART: [cold-reset] ++
1,169,633 UART: [fht] FHT @ 0x50003400
1,172,217 UART: [idev] ++
1,172,385 UART: [idev] CDI.KEYID = 6
1,172,746 UART: [idev] SUBJECT.KEYID = 7
1,173,171 UART: [idev] UDS.KEYID = 0
1,173,517 ready_for_fw is high
1,173,517 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,692 UART: [idev] Sha1 KeyId Algorithm
1,207,396 UART: [idev] --
1,208,531 UART: [ldev] ++
1,208,699 UART: [ldev] CDI.KEYID = 6
1,209,063 UART: [ldev] SUBJECT.KEYID = 5
1,209,490 UART: [ldev] AUTHORITY.KEYID = 7
1,209,953 UART: [ldev] FE.KEYID = 1
1,215,159 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,403 UART: [ldev] --
1,280,774 UART: [fwproc] Wait for Commands...
1,281,357 UART: [fwproc] Recv command 0x46574c44
1,282,090 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,555,174 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,573,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,713,544 >>> mbox cmd response: success
2,714,768 UART: [afmc] ++
2,714,936 UART: [afmc] CDI.KEYID = 6
2,715,299 UART: [afmc] SUBJECT.KEYID = 7
2,715,725 UART: [afmc] AUTHORITY.KEYID = 5
2,751,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,768,398 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,147 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,774,867 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,780,760 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,786,453 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,794,146 UART: [afmc] --
2,795,103 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,795,125 UART: [cold-reset] --
2,796,043 UART: [state] Locking Datavault
2,797,408 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,012 UART: [state] Locking ICCM
2,798,600 UART: [exit] Launching FMC @ 0x40000000
2,803,897 UART:
2,803,913 UART: Running Caliptra FMC ...
2,804,321 UART:
2,804,459 UART: [fmc] Received command: 0x46574C44
2,805,288 UART:
2,805,304 UART: Running Caliptra ROM ...
2,805,712 UART:
2,805,854 UART: [state] CFI Enabled
2,809,152 UART: [state] LifecycleState = Unprovisioned
2,809,807 UART: [state] DebugLocked = No
2,810,475 UART: [state] WD Timer not started. Device not locked for debugging
2,811,743 UART: [kat] SHA2-256
3,615,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,397 UART: [kat] ++
3,619,549 UART: [kat] sha1
3,623,817 UART: [kat] SHA2-256
3,625,757 UART: [kat] SHA2-384
3,628,658 UART: [kat] SHA2-512-ACC
3,630,558 UART: [kat] ECC-384
3,640,019 UART: [kat] HMAC-384Kdf
3,644,771 UART: [kat] LMS
3,893,083 UART: [kat] --
3,893,815 UART: [update-reset] ++
3,895,100 >>> mbox cmd response: failed
3,895,596 UART: ROM Non-Fatal Error: 0x000B0001
3,896,372 UART: [state] Locking Datavault
3,897,360 UART: [state] Locking PCR0, PCR1 and PCR31
3,897,964 UART: [state] Locking ICCM
3,898,422 UART: [exit] Launching FMC @ 0x40000000
3,903,719 UART:
3,903,735 UART: Running Caliptra FMC ...
3,904,143 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,445 ready_for_fw is high
1,059,445 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,566,637 >>> mbox cmd response: success
2,622,825 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,628,786 UART:
2,628,802 UART: Running Caliptra FMC ...
2,629,210 UART:
2,629,348 UART: [fmc] Received command: 0x46574C44
3,605,956 >>> mbox cmd response: failed
3,611,437 UART:
3,611,453 UART: Running Caliptra FMC ...
3,611,861 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
890,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,014 UART: [kat] ++
895,166 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,237 UART: [kat] LMS
1,168,549 UART: [kat] --
1,169,682 UART: [cold-reset] ++
1,170,136 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,174,028 ready_for_fw is high
1,174,028 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,181,957 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,678 UART: [ldev] Erasing FE.KEYID = 1
1,241,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,590 UART: [ldev] --
1,280,999 UART: [fwproc] Wait for Commands...
1,281,758 UART: [fwproc] Recv command 0x46574c44
1,282,491 UART: [fwproc] Recv'd Img size: 109820 bytes
2,526,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,554,473 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,572,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,712,805 >>> mbox cmd response: success
2,713,845 UART: [afmc] ++
2,714,013 UART: [afmc] CDI.KEYID = 6
2,714,376 UART: [afmc] SUBJECT.KEYID = 7
2,714,802 UART: [afmc] AUTHORITY.KEYID = 5
2,750,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,767,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,767,932 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,773,652 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,779,545 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,785,238 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,792,873 UART: [afmc] --
2,793,874 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,793,896 UART: [cold-reset] --
2,794,762 UART: [state] Locking Datavault
2,795,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,796,491 UART: [state] Locking ICCM
2,797,045 UART: [exit] Launching FMC @ 0x40000000
2,802,342 UART:
2,802,358 UART: Running Caliptra FMC ...
2,802,766 UART:
2,802,904 UART: [fmc] Received command: 0x46574C44
2,803,733 UART:
2,803,749 UART: Running Caliptra ROM ...
2,804,157 UART:
2,804,212 UART: [state] CFI Enabled
2,806,816 UART: [state] LifecycleState = Unprovisioned
2,807,471 UART: [state] DebugLocked = No
2,807,999 UART: [state] WD Timer not started. Device not locked for debugging
2,809,305 UART: [kat] SHA2-256
3,612,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,616,959 UART: [kat] ++
3,617,111 UART: [kat] sha1
3,621,463 UART: [kat] SHA2-256
3,623,403 UART: [kat] SHA2-384
3,626,058 UART: [kat] SHA2-512-ACC
3,627,958 UART: [kat] ECC-384
3,637,515 UART: [kat] HMAC-384Kdf
3,642,261 UART: [kat] LMS
3,890,573 UART: [kat] --
3,891,531 UART: [update-reset] ++
3,893,314 >>> mbox cmd response: failed
3,893,768 UART: ROM Non-Fatal Error: 0x000B0001
3,894,686 UART: [state] Locking Datavault
3,895,572 UART: [state] Locking PCR0, PCR1 and PCR31
3,896,176 UART: [state] Locking ICCM
3,896,706 UART: [exit] Launching FMC @ 0x40000000
3,902,003 UART:
3,902,019 UART: Running Caliptra FMC ...
3,902,427 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,222 ready_for_fw is high
1,059,222 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,563,498 >>> mbox cmd response: success
2,619,312 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,625,099 UART:
2,625,115 UART: Running Caliptra FMC ...
2,625,523 UART:
2,625,661 UART: [fmc] Received command: 0x46574C44
3,601,970 >>> mbox cmd response: failed
3,608,059 UART:
3,608,075 UART: Running Caliptra FMC ...
3,608,483 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,767 UART: [kat] SHA2-256
901,707 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
916,268 UART: [kat] HMAC-384Kdf
920,972 UART: [kat] LMS
1,169,284 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,609 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 ready_for_fw is high
1,174,667 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,208,114 UART: [idev] --
1,209,033 UART: [ldev] ++
1,209,201 UART: [ldev] CDI.KEYID = 6
1,209,565 UART: [ldev] SUBJECT.KEYID = 5
1,209,992 UART: [ldev] AUTHORITY.KEYID = 7
1,210,455 UART: [ldev] FE.KEYID = 1
1,215,695 UART: [ldev] Erasing FE.KEYID = 1
1,242,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 109820 bytes
2,528,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,556,362 UART: [fwproc] Load FMC at address 0x40000000 len 11316
2,574,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,714,776 >>> mbox cmd response: success
2,715,910 UART: [afmc] ++
2,716,078 UART: [afmc] CDI.KEYID = 6
2,716,441 UART: [afmc] SUBJECT.KEYID = 7
2,716,867 UART: [afmc] AUTHORITY.KEYID = 5
2,752,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,769,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,769,997 UART: [afmc] PUB.X = 2EBEAC96F22BCB40F3B56C87BCA57953B347A2D9EA18CC6C669F584BDEEDF2FD2F576D0807F53A4E6D126E6022BF28A7
2,775,717 UART: [afmc] PUB.Y = F09B26787ED28ACA743D9AF2D6D6F4180FEEB6A469A5F3DBDAE27647733A5D034C4DCD3FDD28A27BB250DE039C458B2E
2,781,610 UART: [afmc] SIG.R = 00A4DB647FE3E140305D71A02B2428C1638E4427D98F0A85F1D8D3F03DE606CFEAB2790D34DE9BB47A86E9BEC3BF72F7
2,787,303 UART: [afmc] SIG.S = E86E6FD4698273EE8BBB813FF229B299A6134A157D081AA178945B946F7FEEC11B54F06AABA1632D84A14BEB9AFAC2FB
2,795,290 UART: [afmc] --
2,796,165 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,796,187 UART: [cold-reset] --
2,796,979 UART: [state] Locking Datavault
2,798,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,798,796 UART: [state] Locking ICCM
2,799,454 UART: [exit] Launching FMC @ 0x40000000
2,804,751 UART:
2,804,767 UART: Running Caliptra FMC ...
2,805,175 UART:
2,805,313 UART: [fmc] Received command: 0x46574C44
2,806,142 UART:
2,806,158 UART: Running Caliptra ROM ...
2,806,566 UART:
2,806,708 UART: [state] CFI Enabled
2,809,276 UART: [state] LifecycleState = Unprovisioned
2,809,931 UART: [state] DebugLocked = No
2,810,465 UART: [state] WD Timer not started. Device not locked for debugging
2,811,775 UART: [kat] SHA2-256
3,615,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,619,429 UART: [kat] ++
3,619,581 UART: [kat] sha1
3,623,979 UART: [kat] SHA2-256
3,625,919 UART: [kat] SHA2-384
3,628,772 UART: [kat] SHA2-512-ACC
3,630,672 UART: [kat] ECC-384
3,640,375 UART: [kat] HMAC-384Kdf
3,645,147 UART: [kat] LMS
3,893,459 UART: [kat] --
3,894,187 UART: [update-reset] ++
3,896,012 >>> mbox cmd response: failed
3,896,514 UART: ROM Non-Fatal Error: 0x000B0001
3,897,466 UART: [state] Locking Datavault
3,898,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,898,930 UART: [state] Locking ICCM
3,899,428 UART: [exit] Launching FMC @ 0x40000000
3,904,725 UART:
3,904,741 UART: Running Caliptra FMC ...
3,905,149 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,731 ready_for_fw is high
1,059,731 <<< Executing mbox cmd 0x46574c44 (109820 bytes) from SoC
2,567,827 >>> mbox cmd response: success
2,624,049 <<< Executing mbox cmd 0x46574c44 (4 bytes) from SoC
2,630,256 UART:
2,630,272 UART: Running Caliptra FMC ...
2,630,680 UART:
2,630,818 UART: [fmc] Received command: 0x46574C44
3,607,796 >>> mbox cmd response: failed
3,613,405 UART:
3,613,421 UART: Running Caliptra FMC ...
3,613,829 UART:
* TESTCASE PASSED
test test_update_reset::test_update_reset_verify_image_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,578 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,200 UART:
192,554 UART: Running Caliptra ROM ...
193,733 UART:
193,895 UART: [state] CFI Enabled
266,378 UART: [state] LifecycleState = Unprovisioned
268,331 UART: [state] DebugLocked = No
270,850 UART: [state] WD Timer not started. Device not locked for debugging
274,852 UART: [kat] SHA2-256
454,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,328 UART: [kat] ++
465,854 UART: [kat] sha1
475,313 UART: [kat] SHA2-256
478,003 UART: [kat] SHA2-384
483,618 UART: [kat] SHA2-512-ACC
486,013 UART: [kat] ECC-384
2,948,607 UART: [kat] HMAC-384Kdf
2,972,075 UART: [kat] LMS
3,448,577 UART: [kat] --
3,453,599 UART: [cold-reset] ++
3,455,104 UART: [fht] FHT @ 0x50003400
3,466,084 UART: [idev] ++
3,466,677 UART: [idev] CDI.KEYID = 6
3,467,700 UART: [idev] SUBJECT.KEYID = 7
3,468,862 UART: [idev] UDS.KEYID = 0
3,502,876 UART: [idev] Erasing UDS.KEYID = 0
5,989,166 UART: [idev] Sha1 KeyId Algorithm
6,013,692 UART: [idev] --
6,018,940 UART: [ldev] ++
6,019,516 UART: [ldev] CDI.KEYID = 6
6,020,414 UART: [ldev] SUBJECT.KEYID = 5
6,021,591 UART: [ldev] AUTHORITY.KEYID = 7
6,022,860 UART: [ldev] FE.KEYID = 1
6,058,681 UART: [ldev] Erasing FE.KEYID = 1
8,566,472 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,891 UART: [ldev] --
10,371,509 UART: [fwproc] Wait for Commands...
10,373,173 UART: [fwproc] Recv command 0x46505652
10,375,387 UART: [rt] FIPS Version
10,376,929 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,473 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,266,231 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,179 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
192,414 UART:
192,816 UART: Running Caliptra ROM ...
193,987 UART:
603,702 UART: [state] CFI Enabled
614,931 UART: [state] LifecycleState = Unprovisioned
616,885 UART: [state] DebugLocked = No
618,579 UART: [state] WD Timer not started. Device not locked for debugging
623,220 UART: [kat] SHA2-256
802,888 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,675 UART: [kat] ++
814,155 UART: [kat] sha1
826,108 UART: [kat] SHA2-256
828,813 UART: [kat] SHA2-384
834,895 UART: [kat] SHA2-512-ACC
837,293 UART: [kat] ECC-384
3,279,744 UART: [kat] HMAC-384Kdf
3,292,400 UART: [kat] LMS
3,768,918 UART: [kat] --
3,772,202 UART: [cold-reset] ++
3,774,884 UART: [fht] FHT @ 0x50003400
3,786,504 UART: [idev] ++
3,787,073 UART: [idev] CDI.KEYID = 6
3,788,181 UART: [idev] SUBJECT.KEYID = 7
3,789,302 UART: [idev] UDS.KEYID = 0
3,809,657 UART: [idev] Erasing UDS.KEYID = 0
6,268,479 UART: [idev] Sha1 KeyId Algorithm
6,292,998 UART: [idev] --
6,298,016 UART: [ldev] ++
6,298,587 UART: [ldev] CDI.KEYID = 6
6,299,468 UART: [ldev] SUBJECT.KEYID = 5
6,300,732 UART: [ldev] AUTHORITY.KEYID = 7
6,301,962 UART: [ldev] FE.KEYID = 1
6,314,959 UART: [ldev] Erasing FE.KEYID = 1
8,792,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,759 UART: [ldev] --
10,587,081 UART: [fwproc] Wait for Commands...
10,590,138 UART: [fwproc] Recv command 0x46505652
10,592,357 UART: [rt] FIPS Version
10,593,917 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,257 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,481,858 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,205 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,158 UART: [kat] ++
895,310 UART: [kat] sha1
899,568 UART: [kat] SHA2-256
901,508 UART: [kat] SHA2-384
904,093 UART: [kat] SHA2-512-ACC
905,994 UART: [kat] ECC-384
915,379 UART: [kat] HMAC-384Kdf
920,161 UART: [kat] LMS
1,168,473 UART: [kat] --
1,169,328 UART: [cold-reset] ++
1,169,714 UART: [fht] FHT @ 0x50003400
1,172,380 UART: [idev] ++
1,172,548 UART: [idev] CDI.KEYID = 6
1,172,909 UART: [idev] SUBJECT.KEYID = 7
1,173,334 UART: [idev] UDS.KEYID = 0
1,181,711 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,208,025 UART: [idev] --
1,209,188 UART: [ldev] ++
1,209,356 UART: [ldev] CDI.KEYID = 6
1,209,720 UART: [ldev] SUBJECT.KEYID = 5
1,210,147 UART: [ldev] AUTHORITY.KEYID = 7
1,210,610 UART: [ldev] FE.KEYID = 1
1,215,874 UART: [ldev] Erasing FE.KEYID = 1
1,242,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,460 UART: [ldev] --
1,281,705 UART: [fwproc] Wait for Commands...
1,282,344 UART: [fwproc] Recv command 0x46505652
1,283,168 UART: [rt] FIPS Version
1,283,728 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,027 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,958 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
891,815 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,919 UART: [kat] ++
896,071 UART: [kat] sha1
900,093 UART: [kat] SHA2-256
902,033 UART: [kat] SHA2-384
904,908 UART: [kat] SHA2-512-ACC
906,809 UART: [kat] ECC-384
917,062 UART: [kat] HMAC-384Kdf
921,684 UART: [kat] LMS
1,169,996 UART: [kat] --
1,171,223 UART: [cold-reset] ++
1,171,673 UART: [fht] FHT @ 0x50003400
1,174,261 UART: [idev] ++
1,174,429 UART: [idev] CDI.KEYID = 6
1,174,790 UART: [idev] SUBJECT.KEYID = 7
1,175,215 UART: [idev] UDS.KEYID = 0
1,183,434 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,699 UART: [ldev] ++
1,210,867 UART: [ldev] CDI.KEYID = 6
1,211,231 UART: [ldev] SUBJECT.KEYID = 5
1,211,658 UART: [ldev] AUTHORITY.KEYID = 7
1,212,121 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,244,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,077 UART: [ldev] --
1,283,512 UART: [fwproc] Wait for Commands...
1,284,245 UART: [fwproc] Recv command 0x46505652
1,285,069 UART: [rt] FIPS Version
1,285,629 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,090 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
891,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,190 UART: [kat] ++
895,342 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,707 UART: [kat] LMS
1,169,019 UART: [kat] --
1,169,748 UART: [cold-reset] ++
1,170,172 UART: [fht] FHT @ 0x50003400
1,172,796 UART: [idev] ++
1,172,964 UART: [idev] CDI.KEYID = 6
1,173,325 UART: [idev] SUBJECT.KEYID = 7
1,173,750 UART: [idev] UDS.KEYID = 0
1,181,669 UART: [idev] Erasing UDS.KEYID = 0
1,199,063 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,208,946 UART: [ldev] ++
1,209,114 UART: [ldev] CDI.KEYID = 6
1,209,478 UART: [ldev] SUBJECT.KEYID = 5
1,209,905 UART: [ldev] AUTHORITY.KEYID = 7
1,210,368 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,515 UART: [fwproc] Wait for Commands...
1,281,268 UART: [fwproc] Recv command 0x46505652
1,282,092 UART: [rt] FIPS Version
1,282,652 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,138,333 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,500 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
891,215 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,319 UART: [kat] ++
895,471 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
916,046 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,181,954 UART: [idev] Erasing UDS.KEYID = 0
1,199,192 UART: [idev] Sha1 KeyId Algorithm
1,207,942 UART: [idev] --
1,209,099 UART: [ldev] ++
1,209,267 UART: [ldev] CDI.KEYID = 6
1,209,631 UART: [ldev] SUBJECT.KEYID = 5
1,210,058 UART: [ldev] AUTHORITY.KEYID = 7
1,210,521 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,241,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,986 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,655 UART: [ldev] --
1,281,022 UART: [fwproc] Wait for Commands...
1,281,617 UART: [fwproc] Recv command 0x46505652
1,282,441 UART: [rt] FIPS Version
1,283,001 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,630 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,187 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,420 UART: [kat] SHA2-256
901,360 UART: [kat] SHA2-384
904,051 UART: [kat] SHA2-512-ACC
905,952 UART: [kat] ECC-384
915,615 UART: [kat] HMAC-384Kdf
920,187 UART: [kat] LMS
1,168,499 UART: [kat] --
1,169,214 UART: [cold-reset] ++
1,169,736 UART: [fht] FHT @ 0x50003400
1,172,612 UART: [idev] ++
1,172,780 UART: [idev] CDI.KEYID = 6
1,173,141 UART: [idev] SUBJECT.KEYID = 7
1,173,566 UART: [idev] UDS.KEYID = 0
1,181,651 UART: [idev] Erasing UDS.KEYID = 0
1,198,561 UART: [idev] Sha1 KeyId Algorithm
1,207,441 UART: [idev] --
1,208,636 UART: [ldev] ++
1,208,804 UART: [ldev] CDI.KEYID = 6
1,209,168 UART: [ldev] SUBJECT.KEYID = 5
1,209,595 UART: [ldev] AUTHORITY.KEYID = 7
1,210,058 UART: [ldev] FE.KEYID = 1
1,215,038 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,768 UART: [ldev] --
1,281,209 UART: [fwproc] Wait for Commands...
1,281,876 UART: [fwproc] Recv command 0x46505652
1,282,700 UART: [rt] FIPS Version
1,283,260 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,085 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,877 UART: [kat] SHA2-256
891,427 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,531 UART: [kat] ++
895,683 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,588 UART: [kat] SHA2-512-ACC
906,489 UART: [kat] ECC-384
915,918 UART: [kat] HMAC-384Kdf
920,548 UART: [kat] LMS
1,168,860 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,173,009 UART: [idev] ++
1,173,177 UART: [idev] CDI.KEYID = 6
1,173,538 UART: [idev] SUBJECT.KEYID = 7
1,173,963 UART: [idev] UDS.KEYID = 0
1,181,600 UART: [idev] Erasing UDS.KEYID = 0
1,199,532 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,627 UART: [ldev] ++
1,209,795 UART: [ldev] CDI.KEYID = 6
1,210,159 UART: [ldev] SUBJECT.KEYID = 5
1,210,586 UART: [ldev] AUTHORITY.KEYID = 7
1,211,049 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,243,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,474 UART: [fwproc] Wait for Commands...
1,283,163 UART: [fwproc] Recv command 0x46505652
1,283,987 UART: [rt] FIPS Version
1,284,547 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,182 >>> mbox cmd response data (36 bytes)
test test_version::test_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
5,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,015 UART:
192,404 UART: Running Caliptra ROM ...
193,490 UART:
193,635 UART: [state] CFI Enabled
266,876 UART: [state] LifecycleState = Unprovisioned
268,822 UART: [state] DebugLocked = No
270,501 UART: [state] WD Timer not started. Device not locked for debugging
273,533 UART: [kat] SHA2-256
453,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,975 UART: [kat] ++
464,484 UART: [kat] sha1
476,822 UART: [kat] SHA2-256
479,520 UART: [kat] SHA2-384
485,249 UART: [kat] SHA2-512-ACC
487,589 UART: [kat] ECC-384
2,948,853 UART: [kat] HMAC-384Kdf
2,971,674 UART: [kat] LMS
3,448,192 UART: [kat] --
3,453,731 UART: [cold-reset] ++
3,456,270 UART: [fht] FHT @ 0x50003400
3,468,111 UART: [idev] ++
3,468,678 UART: [idev] CDI.KEYID = 6
3,469,703 UART: [idev] SUBJECT.KEYID = 7
3,470,864 UART: [idev] UDS.KEYID = 0
3,501,391 UART: [idev] Erasing UDS.KEYID = 0
5,986,420 UART: [idev] Sha1 KeyId Algorithm
6,010,453 UART: [idev] --
6,015,668 UART: [ldev] ++
6,016,256 UART: [ldev] CDI.KEYID = 6
6,017,198 UART: [ldev] SUBJECT.KEYID = 5
6,018,426 UART: [ldev] AUTHORITY.KEYID = 7
6,019,663 UART: [ldev] FE.KEYID = 1
6,056,565 UART: [ldev] Erasing FE.KEYID = 1
8,567,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,008 UART: [ldev] --
10,374,038 UART: [fwproc] Wait for Commands...
10,375,710 UART: [fwproc] Recv command 0x46574c44
10,377,703 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,468 >>> mbox cmd response: success
14,339,144 UART: [afmc] ++
14,339,738 UART: [afmc] CDI.KEYID = 6
14,340,759 UART: [afmc] SUBJECT.KEYID = 7
14,341,869 UART: [afmc] AUTHORITY.KEYID = 5
16,873,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,384 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,984 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
294 writing to cptra_bootfsm_go
602 UART: [afmc] -
1,043 UART: Running Caliptra ROM ...
2,218 UART:
2,386 UART: [state] CFI Enabled
59,618 UART: [state] LifecycleState = Unprovisioned
61,543 UART: [state] DebugLocked = No
63,899 UART: [state] WD Timer not started. Device not locked for debugging
67,851 UART: [kat] SHA2-256
247,499 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
258,262 UART: [kat] ++
258,763 UART: [kat] sha1
271,424 UART: [kat] SHA2-256
274,101 UART: [kat] SHA2-384
279,832 UART: [kat] SHA2-512-ACC
282,185 UART: [kat] ECC-384
2,748,343 UART: [kat] HMAC-384Kdf
2,770,775 UART: [kat] LMS
3,247,265 UART: [kat] --
3,254,244 UART: [warm-reset] ++
3,255,107 UART: [warm-reset] Prev Cold-Reset failed
3,258,128 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
5,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,027 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
6,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,463 UART:
192,841 UART: Running Caliptra ROM ...
194,008 UART:
603,751 UART: [state] CFI Enabled
616,453 UART: [state] LifecycleState = Unprovisioned
618,396 UART: [state] DebugLocked = No
619,714 UART: [state] WD Timer not started. Device not locked for debugging
622,801 UART: [kat] SHA2-256
802,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,240 UART: [kat] ++
813,722 UART: [kat] sha1
824,454 UART: [kat] SHA2-256
827,186 UART: [kat] SHA2-384
833,803 UART: [kat] SHA2-512-ACC
836,196 UART: [kat] ECC-384
3,279,499 UART: [kat] HMAC-384Kdf
3,292,003 UART: [kat] LMS
3,768,489 UART: [kat] --
3,774,210 UART: [cold-reset] ++
3,775,272 UART: [fht] FHT @ 0x50003400
3,786,816 UART: [idev] ++
3,787,428 UART: [idev] CDI.KEYID = 6
3,788,361 UART: [idev] SUBJECT.KEYID = 7
3,789,620 UART: [idev] UDS.KEYID = 0
3,805,540 UART: [idev] Erasing UDS.KEYID = 0
6,265,643 UART: [idev] Sha1 KeyId Algorithm
6,288,073 UART: [idev] --
6,292,898 UART: [ldev] ++
6,293,526 UART: [ldev] CDI.KEYID = 6
6,294,435 UART: [ldev] SUBJECT.KEYID = 5
6,295,647 UART: [ldev] AUTHORITY.KEYID = 7
6,296,877 UART: [ldev] FE.KEYID = 1
6,309,631 UART: [ldev] Erasing FE.KEYID = 1
8,790,078 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,008 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,361 UART: [ldev] --
10,579,745 UART: [fwproc] Wait for Commands...
10,582,060 UART: [fwproc] Recv command 0x46574c44
10,584,061 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,032 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,403 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,076 >>> mbox cmd response: success
14,548,830 UART: [afmc] ++
14,549,430 UART: [afmc] CDI.KEYID = 6
14,550,391 UART: [afmc] SUBJECT.KEYID = 7
14,551,609 UART: [afmc] AUTHORITY.KEYID = 5
17,057,003 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,811 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
297 writing to cptra_bootfsm_go
600 UART: [afmc] -
1,038 UART: Running Caliptra ROM ...
2,229 UART:
1,661,448 UART: [state] CFI Enabled
1,675,734 UART: [state] LifecycleState = Unprovisioned
1,677,693 UART: [state] DebugLocked = No
1,679,724 UART: [state] WD Timer not started. Device not locked for debugging
1,683,038 UART: [kat] SHA2-256
1,862,665 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,873,469 UART: [kat] ++
1,873,925 UART: [kat] sha1
1,883,455 UART: [kat] SHA2-256
1,886,146 UART: [kat] SHA2-384
1,891,647 UART: [kat] SHA2-512-ACC
1,893,996 UART: [kat] ECC-384
4,332,377 UART: [kat] HMAC-384Kdf
4,344,763 UART: [kat] LMS
4,821,242 UART: [kat] --
4,825,186 UART: [warm-reset] ++
4,826,063 UART: [warm-reset] Prev Cold-Reset failed
4,830,251 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
6,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,656 >>> mbox cmd response: success
292 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,330 UART: [kat] SHA2-256
890,880 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,984 UART: [kat] ++
895,136 UART: [kat] sha1
899,364 UART: [kat] SHA2-256
901,304 UART: [kat] SHA2-384
903,975 UART: [kat] SHA2-512-ACC
905,876 UART: [kat] ECC-384
915,495 UART: [kat] HMAC-384Kdf
920,143 UART: [kat] LMS
1,168,455 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,964 UART: [fht] FHT @ 0x50003400
1,172,764 UART: [idev] ++
1,172,932 UART: [idev] CDI.KEYID = 6
1,173,293 UART: [idev] SUBJECT.KEYID = 7
1,173,718 UART: [idev] UDS.KEYID = 0
1,181,415 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,233 UART: [idev] --
1,208,364 UART: [ldev] ++
1,208,532 UART: [ldev] CDI.KEYID = 6
1,208,896 UART: [ldev] SUBJECT.KEYID = 5
1,209,323 UART: [ldev] AUTHORITY.KEYID = 7
1,209,786 UART: [ldev] FE.KEYID = 1
1,215,112 UART: [ldev] Erasing FE.KEYID = 1
1,241,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,270 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,149 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,267 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,703 >>> mbox cmd response: success
2,824,759 UART: [afmc] ++
2,824,927 UART: [afmc] CDI.KEYID = 6
2,825,290 UART: [afmc] SUBJECT.KEYID = 7
2,825,716 UART: [afmc] AUTHORITY.KEYID = 5
2,861,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,575 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,285 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,166 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,867 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,387 writing to cptra_bootfsm_go
2,903,479 UART:
2,903,495 UART: Running Caliptra ROM ...
2,903,903 UART:
2,903,958 UART: [state] CFI Enabled
2,906,514 UART: [state] LifecycleState = Unprovisioned
2,907,169 UART: [state] DebugLocked = No
2,907,667 UART: [state] WD Timer not started. Device not locked for debugging
2,908,964 UART: [kat] SHA2-256
3,712,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,716,618 UART: [kat] ++
3,716,770 UART: [kat] sha1
3,720,940 UART: [kat] SHA2-256
3,722,880 UART: [kat] SHA2-384
3,725,691 UART: [kat] SHA2-512-ACC
3,727,592 UART: [kat] ECC-384
3,737,383 UART: [kat] HMAC-384Kdf
3,742,033 UART: [kat] LMS
3,990,345 UART: [kat] --
3,991,331 UART: [warm-reset] ++
3,991,599 UART: [warm-reset] Prev Cold-Reset failed
3,992,748 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,800 >>> mbox cmd response: success
2,732,057 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,792 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,664 UART: [kat] SHA2-512-ACC
906,565 UART: [kat] ECC-384
916,810 UART: [kat] HMAC-384Kdf
921,528 UART: [kat] LMS
1,169,840 UART: [kat] --
1,170,699 UART: [cold-reset] ++
1,171,255 UART: [fht] FHT @ 0x50003400
1,173,985 UART: [idev] ++
1,174,153 UART: [idev] CDI.KEYID = 6
1,174,514 UART: [idev] SUBJECT.KEYID = 7
1,174,939 UART: [idev] UDS.KEYID = 0
1,182,864 UART: [idev] Erasing UDS.KEYID = 0
1,200,102 UART: [idev] Sha1 KeyId Algorithm
1,208,866 UART: [idev] --
1,209,865 UART: [ldev] ++
1,210,033 UART: [ldev] CDI.KEYID = 6
1,210,397 UART: [ldev] SUBJECT.KEYID = 5
1,210,824 UART: [ldev] AUTHORITY.KEYID = 7
1,211,287 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,243,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,471 UART: [ldev] --
1,282,838 UART: [fwproc] Wait for Commands...
1,283,615 UART: [fwproc] Recv command 0x46574c44
1,284,348 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,427 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,688 >>> mbox cmd response: success
2,829,790 UART: [afmc] ++
2,829,958 UART: [afmc] CDI.KEYID = 6
2,830,321 UART: [afmc] SUBJECT.KEYID = 7
2,830,747 UART: [afmc] AUTHORITY.KEYID = 5
2,866,734 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,606 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,450 writing to cptra_bootfsm_go
2,908,542 UART:
2,908,558 UART: Running Caliptra ROM ...
2,908,966 UART:
2,909,108 UART: [state] CFI Enabled
2,911,408 UART: [state] LifecycleState = Unprovisioned
2,912,063 UART: [state] DebugLocked = No
2,912,787 UART: [state] WD Timer not started. Device not locked for debugging
2,914,080 UART: [kat] SHA2-256
3,717,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,721,734 UART: [kat] ++
3,721,886 UART: [kat] sha1
3,726,178 UART: [kat] SHA2-256
3,728,118 UART: [kat] SHA2-384
3,730,767 UART: [kat] SHA2-512-ACC
3,732,668 UART: [kat] ECC-384
3,742,331 UART: [kat] HMAC-384Kdf
3,746,895 UART: [kat] LMS
3,995,207 UART: [kat] --
3,995,985 UART: [warm-reset] ++
3,996,253 UART: [warm-reset] Prev Cold-Reset failed
3,997,202 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,947 >>> mbox cmd response: success
2,734,406 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,219 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,018 UART: [kat] ++
895,170 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,721 UART: [kat] HMAC-384Kdf
920,331 UART: [kat] LMS
1,168,643 UART: [kat] --
1,169,584 UART: [cold-reset] ++
1,169,974 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,181,251 UART: [idev] Erasing UDS.KEYID = 0
1,198,343 UART: [idev] Sha1 KeyId Algorithm
1,207,317 UART: [idev] --
1,208,236 UART: [ldev] ++
1,208,404 UART: [ldev] CDI.KEYID = 6
1,208,768 UART: [ldev] SUBJECT.KEYID = 5
1,209,195 UART: [ldev] AUTHORITY.KEYID = 7
1,209,658 UART: [ldev] FE.KEYID = 1
1,215,122 UART: [ldev] Erasing FE.KEYID = 1
1,241,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,419 UART: [fwproc] Wait for Commands...
1,281,056 UART: [fwproc] Recv command 0x46574c44
1,281,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,355 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,530 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,731 >>> mbox cmd response: success
2,824,935 UART: [afmc] ++
2,825,103 UART: [afmc] CDI.KEYID = 6
2,825,466 UART: [afmc] SUBJECT.KEYID = 7
2,825,892 UART: [afmc] AUTHORITY.KEYID = 5
2,861,289 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,459 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,169 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,050 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,751 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,715 writing to cptra_bootfsm_go
2,903,807 UART:
2,903,823 UART: Running Caliptra ROM ...
2,904,231 UART:
2,904,286 UART: [state] CFI Enabled
2,906,888 UART: [state] LifecycleState = Unprovisioned
2,907,543 UART: [state] DebugLocked = No
2,908,123 UART: [state] WD Timer not started. Device not locked for debugging
2,909,266 UART: [kat] SHA2-256
3,712,816 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,716,920 UART: [kat] ++
3,717,072 UART: [kat] sha1
3,721,348 UART: [kat] SHA2-256
3,723,288 UART: [kat] SHA2-384
3,726,097 UART: [kat] SHA2-512-ACC
3,727,998 UART: [kat] ECC-384
3,737,709 UART: [kat] HMAC-384Kdf
3,742,233 UART: [kat] LMS
3,990,545 UART: [kat] --
3,991,593 UART: [warm-reset] ++
3,991,861 UART: [warm-reset] Prev Cold-Reset failed
3,992,788 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,678 >>> mbox cmd response: success
2,733,969 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,368 UART: [state] WD Timer not started. Device not locked for debugging
87,563 UART: [kat] SHA2-256
891,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,217 UART: [kat] ++
895,369 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,226 UART: [kat] SHA2-512-ACC
906,127 UART: [kat] ECC-384
915,790 UART: [kat] HMAC-384Kdf
920,406 UART: [kat] LMS
1,168,718 UART: [kat] --
1,169,765 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,173,047 UART: [idev] ++
1,173,215 UART: [idev] CDI.KEYID = 6
1,173,576 UART: [idev] SUBJECT.KEYID = 7
1,174,001 UART: [idev] UDS.KEYID = 0
1,182,546 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,457 UART: [ldev] ++
1,209,625 UART: [ldev] CDI.KEYID = 6
1,209,989 UART: [ldev] SUBJECT.KEYID = 5
1,210,416 UART: [ldev] AUTHORITY.KEYID = 7
1,210,879 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,446 UART: [fwproc] Wait for Commands...
1,283,253 UART: [fwproc] Recv command 0x46574c44
1,283,986 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,728 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,903 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,250 >>> mbox cmd response: success
2,829,458 UART: [afmc] ++
2,829,626 UART: [afmc] CDI.KEYID = 6
2,829,989 UART: [afmc] SUBJECT.KEYID = 7
2,830,415 UART: [afmc] AUTHORITY.KEYID = 5
2,866,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,403 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,743 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,444 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,208 writing to cptra_bootfsm_go
2,908,300 UART:
2,908,316 UART: Running Caliptra ROM ...
2,908,724 UART:
2,908,866 UART: [state] CFI Enabled
2,911,852 UART: [state] LifecycleState = Unprovisioned
2,912,507 UART: [state] DebugLocked = No
2,913,133 UART: [state] WD Timer not started. Device not locked for debugging
2,914,482 UART: [kat] SHA2-256
3,718,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,722,136 UART: [kat] ++
3,722,288 UART: [kat] sha1
3,726,754 UART: [kat] SHA2-256
3,728,694 UART: [kat] SHA2-384
3,731,513 UART: [kat] SHA2-512-ACC
3,733,414 UART: [kat] ECC-384
3,743,161 UART: [kat] HMAC-384Kdf
3,747,819 UART: [kat] LMS
3,996,131 UART: [kat] --
3,996,665 UART: [warm-reset] ++
3,996,933 UART: [warm-reset] Prev Cold-Reset failed
3,998,018 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,405 >>> mbox cmd response: success
2,735,848 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,938 UART: [kat] SHA2-256
901,878 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
916,263 UART: [kat] HMAC-384Kdf
920,699 UART: [kat] LMS
1,169,011 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,181,863 UART: [idev] Erasing UDS.KEYID = 0
1,198,453 UART: [idev] Sha1 KeyId Algorithm
1,207,347 UART: [idev] --
1,208,462 UART: [ldev] ++
1,208,630 UART: [ldev] CDI.KEYID = 6
1,208,994 UART: [ldev] SUBJECT.KEYID = 5
1,209,421 UART: [ldev] AUTHORITY.KEYID = 7
1,209,884 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,132 UART: [ldev] --
1,280,509 UART: [fwproc] Wait for Commands...
1,281,120 UART: [fwproc] Recv command 0x46574c44
1,281,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,467 >>> mbox cmd response: success
2,826,653 UART: [afmc] ++
2,826,821 UART: [afmc] CDI.KEYID = 6
2,827,184 UART: [afmc] SUBJECT.KEYID = 7
2,827,610 UART: [afmc] AUTHORITY.KEYID = 5
2,863,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,543 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,253 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,134 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,629 writing to cptra_bootfsm_go
2,905,721 UART:
2,905,737 UART: Running Caliptra ROM ...
2,906,145 UART:
2,906,200 UART: [state] CFI Enabled
2,909,154 UART: [state] LifecycleState = Unprovisioned
2,909,809 UART: [state] DebugLocked = No
2,910,495 UART: [state] WD Timer not started. Device not locked for debugging
2,911,688 UART: [kat] SHA2-256
3,715,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,719,342 UART: [kat] ++
3,719,494 UART: [kat] sha1
3,723,538 UART: [kat] SHA2-256
3,725,478 UART: [kat] SHA2-384
3,728,197 UART: [kat] SHA2-512-ACC
3,730,098 UART: [kat] ECC-384
3,739,503 UART: [kat] HMAC-384Kdf
3,743,991 UART: [kat] LMS
3,992,303 UART: [kat] --
3,993,165 UART: [warm-reset] ++
3,993,433 UART: [warm-reset] Prev Cold-Reset failed
3,994,504 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,294 >>> mbox cmd response: success
2,733,061 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,799 UART: [state] LifecycleState = Unprovisioned
85,454 UART: [state] DebugLocked = No
85,966 UART: [state] WD Timer not started. Device not locked for debugging
87,081 UART: [kat] SHA2-256
890,631 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,735 UART: [kat] ++
894,887 UART: [kat] sha1
899,161 UART: [kat] SHA2-256
901,101 UART: [kat] SHA2-384
903,984 UART: [kat] SHA2-512-ACC
905,885 UART: [kat] ECC-384
916,128 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,333 UART: [idev] ++
1,173,501 UART: [idev] CDI.KEYID = 6
1,173,862 UART: [idev] SUBJECT.KEYID = 7
1,174,287 UART: [idev] UDS.KEYID = 0
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,200,008 UART: [idev] Sha1 KeyId Algorithm
1,209,090 UART: [idev] --
1,210,215 UART: [ldev] ++
1,210,383 UART: [ldev] CDI.KEYID = 6
1,210,747 UART: [ldev] SUBJECT.KEYID = 5
1,211,174 UART: [ldev] AUTHORITY.KEYID = 7
1,211,637 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,243,436 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,405 UART: [ldev] --
1,282,740 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,097 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,414 >>> mbox cmd response: success
2,827,528 UART: [afmc] ++
2,827,696 UART: [afmc] CDI.KEYID = 6
2,828,059 UART: [afmc] SUBJECT.KEYID = 7
2,828,485 UART: [afmc] AUTHORITY.KEYID = 5
2,864,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,332 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,042 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,923 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,624 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,586 writing to cptra_bootfsm_go
2,906,678 UART:
2,906,694 UART: Running Caliptra ROM ...
2,907,102 UART:
2,907,244 UART: [state] CFI Enabled
2,910,140 UART: [state] LifecycleState = Unprovisioned
2,910,795 UART: [state] DebugLocked = No
2,911,479 UART: [state] WD Timer not started. Device not locked for debugging
2,912,708 UART: [kat] SHA2-256
3,716,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,720,362 UART: [kat] ++
3,720,514 UART: [kat] sha1
3,724,824 UART: [kat] SHA2-256
3,726,764 UART: [kat] SHA2-384
3,729,467 UART: [kat] SHA2-512-ACC
3,731,368 UART: [kat] ECC-384
3,741,385 UART: [kat] HMAC-384Kdf
3,745,985 UART: [kat] LMS
3,994,297 UART: [kat] --
3,994,949 UART: [warm-reset] ++
3,995,217 UART: [warm-reset] Prev Cold-Reset failed
3,996,382 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,111 >>> mbox cmd response: success
2,734,388 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_after_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,094 UART:
192,474 UART: Running Caliptra ROM ...
193,664 UART:
193,824 UART: [state] CFI Enabled
267,290 UART: [state] LifecycleState = Production
269,077 UART: [state] DebugLocked = No
271,496 UART: [state] WD Timer not started. Device not locked for debugging
275,876 UART: [kat] SHA2-256
455,530 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,333 UART: [kat] ++
466,782 UART: [kat] sha1
476,692 UART: [kat] SHA2-256
479,372 UART: [kat] SHA2-384
484,862 UART: [kat] SHA2-512-ACC
487,252 UART: [kat] ECC-384
2,947,804 UART: [kat] HMAC-384Kdf
2,972,743 UART: [kat] LMS
3,449,279 UART: [kat] --
3,454,645 UART: [cold-reset] ++
3,456,477 UART: [fht] FHT @ 0x50003400
3,467,351 UART: [idev] ++
3,467,925 UART: [idev] CDI.KEYID = 6
3,468,840 UART: [idev] SUBJECT.KEYID = 7
3,470,109 UART: [idev] UDS.KEYID = 0
295 writing to cptra_bootfsm_go
973 UART:
1,132 UART: Running Caliptra ROM ...
2,238 UART:
2,402 UART: [state] CFI Enabled
79,071 UART: [state] LifecycleState = Production
80,891 UART: [state] DebugLocked = No
83,733 UART: [state] WD Timer not started. Device not locked for debugging
87,499 UART: [kat] SHA2-256
267,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
277,809 UART: [kat] ++
278,283 UART: [kat] sha1
288,672 UART: [kat] SHA2-256
291,360 UART: [kat] SHA2-384
296,581 UART: [kat] SHA2-512-ACC
298,918 UART: [kat] ECC-384
2,763,087 UART: [kat] HMAC-384Kdf
2,784,071 UART: [kat] LMS
3,260,553 UART: [kat] --
3,266,327 UART: [warm-reset] ++
3,267,186 UART: [warm-reset] Prev Cold-Reset failed
3,269,946 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
300 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,539 UART:
192,918 UART: Running Caliptra ROM ...
194,091 UART:
603,633 UART: [state] CFI Enabled
617,301 UART: [state] LifecycleState = Production
619,097 UART: [state] DebugLocked = No
621,748 UART: [state] WD Timer not started. Device not locked for debugging
625,416 UART: [kat] SHA2-256
805,022 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,843 UART: [kat] ++
816,285 UART: [kat] sha1
827,859 UART: [kat] SHA2-256
830,567 UART: [kat] SHA2-384
837,407 UART: [kat] SHA2-512-ACC
839,801 UART: [kat] ECC-384
3,280,968 UART: [kat] HMAC-384Kdf
3,293,108 UART: [kat] LMS
3,769,595 UART: [kat] --
3,775,311 UART: [cold-reset] ++
3,777,835 UART: [fht] FHT @ 0x50003400
3,788,864 UART: [idev] ++
3,789,427 UART: [idev] CDI.KEYID = 6
3,790,404 UART: [idev] SUBJECT.KEYID = 7
3,791,616 UART: [idev] UDS.KEYID = 0
294 writing to cptra_bootfsm_go
961 UART:
1,108 UART: Running Caliptra ROM ...
2,203 UART:
16,673,949 UART: [state] CFI Enabled
16,689,115 UART: [state] LifecycleState = Production
16,690,927 UART: [state] DebugLocked = No
16,692,146 UART: [state] WD Timer not started. Device not locked for debugging
16,695,780 UART: [kat] SHA2-256
16,875,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,886,254 UART: [kat] ++
16,886,791 UART: [kat] sha1
16,898,167 UART: [kat] SHA2-256
16,900,845 UART: [kat] SHA2-384
16,906,557 UART: [kat] SHA2-512-ACC
16,908,948 UART: [kat] ECC-384
19,350,628 UART: [kat] HMAC-384Kdf
19,364,199 UART: [kat] LMS
19,840,617 UART: [kat] --
19,844,710 UART: [warm-reset] ++
19,845,577 UART: [warm-reset] Prev Cold-Reset failed
19,849,382 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
299 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Production
85,851 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,756 UART: [kat] SHA2-256
891,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,410 UART: [kat] ++
895,562 UART: [kat] sha1
899,830 UART: [kat] SHA2-256
901,770 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
915,817 UART: [kat] HMAC-384Kdf
920,287 UART: [kat] LMS
1,168,599 UART: [kat] --
1,169,504 UART: [cold-reset] ++
1,170,018 UART: [fht] FHT @ 0x50003400
1,172,530 UART: [idev] ++
1,172,698 UART: [idev] CDI.KEYID = 6
1,173,059 UART: [idev] SUBJECT.KEYID = 7
1,173,484 UART: [idev] UDS.KEYID = 0
1,175,098 writing to cptra_bootfsm_go
1,175,190 UART:
1,175,206 UART: Running Caliptra ROM ...
1,175,614 UART:
1,175,669 UART: [state] CFI Enabled
1,177,971 UART: [state] LifecycleState = Production
1,178,578 UART: [state] DebugLocked = No
1,179,310 UART: [state] WD Timer not started. Device not locked for debugging
1,180,503 UART: [kat] SHA2-256
1,984,053 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,157 UART: [kat] ++
1,988,309 UART: [kat] sha1
1,992,563 UART: [kat] SHA2-256
1,994,503 UART: [kat] SHA2-384
1,997,104 UART: [kat] SHA2-512-ACC
1,999,005 UART: [kat] ECC-384
2,009,062 UART: [kat] HMAC-384Kdf
2,013,518 UART: [kat] LMS
2,261,830 UART: [kat] --
2,262,704 UART: [warm-reset] ++
2,262,972 UART: [warm-reset] Prev Cold-Reset failed
2,264,003 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,600 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Production
86,022 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
891,403 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,507 UART: [kat] ++
895,659 UART: [kat] sha1
900,001 UART: [kat] SHA2-256
901,941 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
916,032 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,170,129 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,427 UART: [idev] ++
1,173,595 UART: [idev] CDI.KEYID = 6
1,173,956 UART: [idev] SUBJECT.KEYID = 7
1,174,381 UART: [idev] UDS.KEYID = 0
1,175,983 writing to cptra_bootfsm_go
1,176,075 UART:
1,176,091 UART: Running Caliptra ROM ...
1,176,499 UART:
1,176,641 UART: [state] CFI Enabled
1,179,751 UART: [state] LifecycleState = Production
1,180,358 UART: [state] DebugLocked = No
1,181,094 UART: [state] WD Timer not started. Device not locked for debugging
1,182,429 UART: [kat] SHA2-256
1,985,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,990,083 UART: [kat] ++
1,990,235 UART: [kat] sha1
1,994,359 UART: [kat] SHA2-256
1,996,299 UART: [kat] SHA2-384
1,999,222 UART: [kat] SHA2-512-ACC
2,001,123 UART: [kat] ECC-384
2,011,146 UART: [kat] HMAC-384Kdf
2,015,788 UART: [kat] LMS
2,264,100 UART: [kat] --
2,264,806 UART: [warm-reset] ++
2,265,074 UART: [warm-reset] Prev Cold-Reset failed
2,265,977 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,133 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Production
85,633 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,488 UART: [kat] SHA2-256
901,428 UART: [kat] SHA2-384
904,041 UART: [kat] SHA2-512-ACC
905,942 UART: [kat] ECC-384
915,277 UART: [kat] HMAC-384Kdf
919,847 UART: [kat] LMS
1,168,159 UART: [kat] --
1,168,960 UART: [cold-reset] ++
1,169,302 UART: [fht] FHT @ 0x50003400
1,172,026 UART: [idev] ++
1,172,194 UART: [idev] CDI.KEYID = 6
1,172,555 UART: [idev] SUBJECT.KEYID = 7
1,172,980 UART: [idev] UDS.KEYID = 0
1,174,624 writing to cptra_bootfsm_go
1,174,716 UART:
1,174,732 UART: Running Caliptra ROM ...
1,175,140 UART:
1,175,195 UART: [state] CFI Enabled
1,177,873 UART: [state] LifecycleState = Production
1,178,480 UART: [state] DebugLocked = No
1,179,016 UART: [state] WD Timer not started. Device not locked for debugging
1,180,247 UART: [kat] SHA2-256
1,983,797 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,987,901 UART: [kat] ++
1,988,053 UART: [kat] sha1
1,992,455 UART: [kat] SHA2-256
1,994,395 UART: [kat] SHA2-384
1,997,250 UART: [kat] SHA2-512-ACC
1,999,151 UART: [kat] ECC-384
2,008,876 UART: [kat] HMAC-384Kdf
2,013,544 UART: [kat] LMS
2,261,856 UART: [kat] --
2,262,516 UART: [warm-reset] ++
2,262,784 UART: [warm-reset] Prev Cold-Reset failed
2,263,655 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,976 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Production
85,812 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,771 UART: [kat] SHA2-256
891,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,425 UART: [kat] ++
895,577 UART: [kat] sha1
899,751 UART: [kat] SHA2-256
901,691 UART: [kat] SHA2-384
904,474 UART: [kat] SHA2-512-ACC
906,375 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,509 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,175,733 writing to cptra_bootfsm_go
1,175,825 UART:
1,175,841 UART: Running Caliptra ROM ...
1,176,249 UART:
1,176,391 UART: [state] CFI Enabled
1,178,787 UART: [state] LifecycleState = Production
1,179,394 UART: [state] DebugLocked = No
1,180,018 UART: [state] WD Timer not started. Device not locked for debugging
1,181,307 UART: [kat] SHA2-256
1,984,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,961 UART: [kat] ++
1,989,113 UART: [kat] sha1
1,993,235 UART: [kat] SHA2-256
1,995,175 UART: [kat] SHA2-384
1,997,934 UART: [kat] SHA2-512-ACC
1,999,835 UART: [kat] ECC-384
2,009,640 UART: [kat] HMAC-384Kdf
2,014,374 UART: [kat] LMS
2,262,686 UART: [kat] --
2,263,676 UART: [warm-reset] ++
2,263,944 UART: [warm-reset] Prev Cold-Reset failed
2,264,963 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Production
85,633 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
891,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,164 UART: [kat] ++
895,316 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,253 UART: [kat] HMAC-384Kdf
919,955 UART: [kat] LMS
1,168,267 UART: [kat] --
1,169,226 UART: [cold-reset] ++
1,169,714 UART: [fht] FHT @ 0x50003400
1,172,436 UART: [idev] ++
1,172,604 UART: [idev] CDI.KEYID = 6
1,172,965 UART: [idev] SUBJECT.KEYID = 7
1,173,390 UART: [idev] UDS.KEYID = 0
1,175,074 writing to cptra_bootfsm_go
1,175,166 UART:
1,175,182 UART: Running Caliptra ROM ...
1,175,590 UART:
1,175,645 UART: [state] CFI Enabled
1,177,979 UART: [state] LifecycleState = Production
1,178,586 UART: [state] DebugLocked = No
1,179,114 UART: [state] WD Timer not started. Device not locked for debugging
1,180,329 UART: [kat] SHA2-256
1,983,879 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,987,983 UART: [kat] ++
1,988,135 UART: [kat] sha1
1,992,547 UART: [kat] SHA2-256
1,994,487 UART: [kat] SHA2-384
1,997,260 UART: [kat] SHA2-512-ACC
1,999,161 UART: [kat] ECC-384
2,008,912 UART: [kat] HMAC-384Kdf
2,013,444 UART: [kat] LMS
2,261,756 UART: [kat] --
2,262,878 UART: [warm-reset] ++
2,263,146 UART: [warm-reset] Prev Cold-Reset failed
2,263,969 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,850 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Production
85,912 UART: [state] DebugLocked = No
86,602 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,863 UART: [kat] SHA2-256
901,803 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,656 UART: [kat] HMAC-384Kdf
921,324 UART: [kat] LMS
1,169,636 UART: [kat] --
1,170,609 UART: [cold-reset] ++
1,171,129 UART: [fht] FHT @ 0x50003400
1,173,625 UART: [idev] ++
1,173,793 UART: [idev] CDI.KEYID = 6
1,174,154 UART: [idev] SUBJECT.KEYID = 7
1,174,579 UART: [idev] UDS.KEYID = 0
1,176,101 writing to cptra_bootfsm_go
1,176,193 UART:
1,176,209 UART: Running Caliptra ROM ...
1,176,617 UART:
1,176,759 UART: [state] CFI Enabled
1,179,807 UART: [state] LifecycleState = Production
1,180,414 UART: [state] DebugLocked = No
1,181,040 UART: [state] WD Timer not started. Device not locked for debugging
1,182,241 UART: [kat] SHA2-256
1,985,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,989,895 UART: [kat] ++
1,990,047 UART: [kat] sha1
1,994,461 UART: [kat] SHA2-256
1,996,401 UART: [kat] SHA2-384
1,999,076 UART: [kat] SHA2-512-ACC
2,000,977 UART: [kat] ECC-384
2,010,214 UART: [kat] HMAC-384Kdf
2,014,752 UART: [kat] LMS
2,263,064 UART: [kat] --
2,263,970 UART: [warm-reset] ++
2,264,238 UART: [warm-reset] Prev Cold-Reset failed
2,265,191 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_before_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,656 writing to cptra_bootfsm_go
6,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,901 UART:
193,264 UART: Running Caliptra ROM ...
194,433 UART:
194,596 UART: [state] CFI Enabled
266,865 UART: [state] LifecycleState = Unprovisioned
268,789 UART: [state] DebugLocked = No
271,054 UART: [state] WD Timer not started. Device not locked for debugging
274,904 UART: [kat] SHA2-256
454,586 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,332 UART: [kat] ++
465,816 UART: [kat] sha1
476,696 UART: [kat] SHA2-256
479,433 UART: [kat] SHA2-384
485,228 UART: [kat] SHA2-512-ACC
487,620 UART: [kat] ECC-384
2,949,650 UART: [kat] HMAC-384Kdf
2,973,217 UART: [kat] LMS
3,449,748 UART: [kat] --
3,454,138 UART: [cold-reset] ++
3,455,536 UART: [fht] FHT @ 0x50003400
3,467,607 UART: [idev] ++
3,468,186 UART: [idev] CDI.KEYID = 6
3,469,153 UART: [idev] SUBJECT.KEYID = 7
3,470,370 UART: [idev] UDS.KEYID = 0
3,503,020 UART: [idev] Erasing UDS.KEYID = 0
5,987,079 UART: [idev] Sha1 KeyId Algorithm
6,011,166 UART: [idev] --
6,015,525 UART: [ldev] ++
6,016,113 UART: [ldev] CDI.KEYID = 6
6,017,033 UART: [ldev] SUBJECT.KEYID = 5
6,018,206 UART: [ldev] AUTHORITY.KEYID = 7
6,019,446 UART: [ldev] FE.KEYID = 1
6,059,326 UART: [ldev] Erasing FE.KEYID = 1
8,568,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,320 UART: [ldev] --
10,375,588 UART: [fwproc] Wait for Commands...
10,378,230 UART: [fwproc] Recv command 0x46574c44
10,380,218 UART: [fwproc] Recv'd Img size: 118548 bytes
297 writing to cptra_bootfsm_go
1,002 UART:
1,187 UART: Running Caliptra ROM ...
2,295 UART:
2,458 UART: [state] CFI Enabled
70,461 UART: [state] LifecycleState = Unprovisioned
72,386 UART: [state] DebugLocked = No
74,208 UART: [state] WD Timer not started. Device not locked for debugging
78,648 UART: [kat] SHA2-256
258,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
269,123 UART: [kat] ++
269,619 UART: [kat] sha1
281,747 UART: [kat] SHA2-256
284,482 UART: [kat] SHA2-384
290,933 UART: [kat] SHA2-512-ACC
293,278 UART: [kat] ECC-384
2,750,775 UART: [kat] HMAC-384Kdf
2,775,357 UART: [kat] LMS
3,251,783 UART: [kat] --
3,257,516 UART: [warm-reset] ++
3,258,379 UART: [warm-reset] Prev Cold-Reset failed
3,262,429 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
5,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
296 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
6,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,283 UART:
192,646 UART: Running Caliptra ROM ...
193,811 UART:
603,359 UART: [state] CFI Enabled
619,057 UART: [state] LifecycleState = Unprovisioned
621,023 UART: [state] DebugLocked = No
623,315 UART: [state] WD Timer not started. Device not locked for debugging
627,091 UART: [kat] SHA2-256
806,899 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,554 UART: [kat] ++
818,084 UART: [kat] sha1
829,286 UART: [kat] SHA2-256
832,012 UART: [kat] SHA2-384
838,391 UART: [kat] SHA2-512-ACC
840,785 UART: [kat] ECC-384
3,279,684 UART: [kat] HMAC-384Kdf
3,291,132 UART: [kat] LMS
3,767,658 UART: [kat] --
3,771,616 UART: [cold-reset] ++
3,773,826 UART: [fht] FHT @ 0x50003400
3,784,911 UART: [idev] ++
3,785,475 UART: [idev] CDI.KEYID = 6
3,786,487 UART: [idev] SUBJECT.KEYID = 7
3,787,643 UART: [idev] UDS.KEYID = 0
3,801,995 UART: [idev] Erasing UDS.KEYID = 0
6,263,102 UART: [idev] Sha1 KeyId Algorithm
6,286,301 UART: [idev] --
6,291,324 UART: [ldev] ++
6,291,897 UART: [ldev] CDI.KEYID = 6
6,292,878 UART: [ldev] SUBJECT.KEYID = 5
6,294,037 UART: [ldev] AUTHORITY.KEYID = 7
6,295,277 UART: [ldev] FE.KEYID = 1
6,305,877 UART: [ldev] Erasing FE.KEYID = 1
8,782,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,209 UART: [ldev] --
10,579,431 UART: [fwproc] Wait for Commands...
10,581,321 UART: [fwproc] Recv command 0x46574c44
10,583,315 UART: [fwproc] Recv'd Img size: 118548 bytes
292 writing to cptra_bootfsm_go
966 UART:
1,116 UART: Running Caliptra ROM ...
2,206 UART:
9,881,071 UART: [state] CFI Enabled
9,894,159 UART: [state] LifecycleState = Unprovisioned
9,896,078 UART: [state] DebugLocked = No
9,898,226 UART: [state] WD Timer not started. Device not locked for debugging
9,902,078 UART: [kat] SHA2-256
10,081,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,092,535 UART: [kat] ++
10,092,991 UART: [kat] sha1
10,103,875 UART: [kat] SHA2-256
10,106,565 UART: [kat] SHA2-384
10,113,463 UART: [kat] SHA2-512-ACC
10,115,863 UART: [kat] ECC-384
12,559,582 UART: [kat] HMAC-384Kdf
12,571,217 UART: [kat] LMS
13,047,704 UART: [kat] --
13,051,057 UART: [warm-reset] ++
13,051,910 UART: [warm-reset] Prev Cold-Reset failed
13,055,200 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
6,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
300 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,089 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,225 UART: [kat] SHA2-512-ACC
906,126 UART: [kat] ECC-384
915,837 UART: [kat] HMAC-384Kdf
920,459 UART: [kat] LMS
1,168,771 UART: [kat] --
1,169,382 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,208 UART: [idev] ++
1,172,376 UART: [idev] CDI.KEYID = 6
1,172,737 UART: [idev] SUBJECT.KEYID = 7
1,173,162 UART: [idev] UDS.KEYID = 0
1,181,401 UART: [idev] Erasing UDS.KEYID = 0
1,198,151 UART: [idev] Sha1 KeyId Algorithm
1,207,169 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,215,116 UART: [ldev] Erasing FE.KEYID = 1
1,241,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,661 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,104 UART: [ldev] --
1,281,383 UART: [fwproc] Wait for Commands...
1,282,014 UART: [fwproc] Recv command 0x46574c44
1,282,747 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,557 writing to cptra_bootfsm_go
1,293,649 UART:
1,293,665 UART: Running Caliptra ROM ...
1,294,073 UART:
1,294,128 UART: [state] CFI Enabled
1,296,562 UART: [state] LifecycleState = Unprovisioned
1,297,217 UART: [state] DebugLocked = No
1,297,931 UART: [state] WD Timer not started. Device not locked for debugging
1,299,280 UART: [kat] SHA2-256
2,102,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,934 UART: [kat] ++
2,107,086 UART: [kat] sha1
2,111,392 UART: [kat] SHA2-256
2,113,332 UART: [kat] SHA2-384
2,115,869 UART: [kat] SHA2-512-ACC
2,117,770 UART: [kat] ECC-384
2,127,381 UART: [kat] HMAC-384Kdf
2,132,007 UART: [kat] LMS
2,380,319 UART: [kat] --
2,381,101 UART: [warm-reset] ++
2,381,369 UART: [warm-reset] Prev Cold-Reset failed
2,382,324 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,054 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,522 UART: [kat] SHA2-512-ACC
906,423 UART: [kat] ECC-384
915,916 UART: [kat] HMAC-384Kdf
920,444 UART: [kat] LMS
1,168,756 UART: [kat] --
1,169,587 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,181,808 UART: [idev] Erasing UDS.KEYID = 0
1,199,306 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,171 UART: [ldev] ++
1,209,339 UART: [ldev] CDI.KEYID = 6
1,209,703 UART: [ldev] SUBJECT.KEYID = 5
1,210,130 UART: [ldev] AUTHORITY.KEYID = 7
1,210,593 UART: [ldev] FE.KEYID = 1
1,215,911 UART: [ldev] Erasing FE.KEYID = 1
1,242,592 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,355 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,263 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,459 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 118548 bytes
1,294,066 writing to cptra_bootfsm_go
1,294,158 UART:
1,294,174 UART: Running Caliptra ROM ...
1,294,582 UART:
1,294,724 UART: [state] CFI Enabled
1,297,370 UART: [state] LifecycleState = Unprovisioned
1,298,025 UART: [state] DebugLocked = No
1,298,657 UART: [state] WD Timer not started. Device not locked for debugging
1,300,014 UART: [kat] SHA2-256
2,103,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,668 UART: [kat] ++
2,107,820 UART: [kat] sha1
2,112,134 UART: [kat] SHA2-256
2,114,074 UART: [kat] SHA2-384
2,116,851 UART: [kat] SHA2-512-ACC
2,118,752 UART: [kat] ECC-384
2,128,323 UART: [kat] HMAC-384Kdf
2,132,925 UART: [kat] LMS
2,381,237 UART: [kat] --
2,382,067 UART: [warm-reset] ++
2,382,335 UART: [warm-reset] Prev Cold-Reset failed
2,383,328 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,017 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,778 UART: [kat] SHA2-256
891,328 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,432 UART: [kat] ++
895,584 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,563 UART: [kat] SHA2-512-ACC
906,464 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,169,918 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,964 UART: [idev] ++
1,173,132 UART: [idev] CDI.KEYID = 6
1,173,493 UART: [idev] SUBJECT.KEYID = 7
1,173,918 UART: [idev] UDS.KEYID = 0
1,181,687 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,214,892 UART: [ldev] Erasing FE.KEYID = 1
1,241,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,420 UART: [ldev] --
1,280,745 UART: [fwproc] Wait for Commands...
1,281,406 UART: [fwproc] Recv command 0x46574c44
1,282,139 UART: [fwproc] Recv'd Img size: 118548 bytes
1,292,861 writing to cptra_bootfsm_go
1,292,953 UART:
1,292,969 UART: Running Caliptra ROM ...
1,293,377 UART:
1,293,432 UART: [state] CFI Enabled
1,296,424 UART: [state] LifecycleState = Unprovisioned
1,297,079 UART: [state] DebugLocked = No
1,297,603 UART: [state] WD Timer not started. Device not locked for debugging
1,298,796 UART: [kat] SHA2-256
2,102,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,106,450 UART: [kat] ++
2,106,602 UART: [kat] sha1
2,110,840 UART: [kat] SHA2-256
2,112,780 UART: [kat] SHA2-384
2,115,649 UART: [kat] SHA2-512-ACC
2,117,550 UART: [kat] ECC-384
2,127,119 UART: [kat] HMAC-384Kdf
2,131,769 UART: [kat] LMS
2,380,081 UART: [kat] --
2,380,697 UART: [warm-reset] ++
2,380,965 UART: [warm-reset] Prev Cold-Reset failed
2,381,764 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,842 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Unprovisioned
85,812 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
891,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,225 UART: [kat] ++
895,377 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,169,713 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,172,959 UART: [idev] ++
1,173,127 UART: [idev] CDI.KEYID = 6
1,173,488 UART: [idev] SUBJECT.KEYID = 7
1,173,913 UART: [idev] UDS.KEYID = 0
1,181,840 UART: [idev] Erasing UDS.KEYID = 0
1,198,836 UART: [idev] Sha1 KeyId Algorithm
1,207,676 UART: [idev] --
1,208,775 UART: [ldev] ++
1,208,943 UART: [ldev] CDI.KEYID = 6
1,209,307 UART: [ldev] SUBJECT.KEYID = 5
1,209,734 UART: [ldev] AUTHORITY.KEYID = 7
1,210,197 UART: [ldev] FE.KEYID = 1
1,215,565 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,214 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,930 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,681 UART: [ldev] --
1,281,974 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
1,294,150 writing to cptra_bootfsm_go
1,294,242 UART:
1,294,258 UART: Running Caliptra ROM ...
1,294,666 UART:
1,294,808 UART: [state] CFI Enabled
1,297,724 UART: [state] LifecycleState = Unprovisioned
1,298,379 UART: [state] DebugLocked = No
1,298,975 UART: [state] WD Timer not started. Device not locked for debugging
1,300,104 UART: [kat] SHA2-256
2,103,654 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,758 UART: [kat] ++
2,107,910 UART: [kat] sha1
2,112,166 UART: [kat] SHA2-256
2,114,106 UART: [kat] SHA2-384
2,116,857 UART: [kat] SHA2-512-ACC
2,118,758 UART: [kat] ECC-384
2,128,215 UART: [kat] HMAC-384Kdf
2,132,791 UART: [kat] LMS
2,381,103 UART: [kat] --
2,381,887 UART: [warm-reset] ++
2,382,155 UART: [warm-reset] Prev Cold-Reset failed
2,383,112 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,149,219 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,272 UART: [kat] SHA2-256
890,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,926 UART: [kat] ++
895,078 UART: [kat] sha1
899,392 UART: [kat] SHA2-256
901,332 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,383 UART: [kat] HMAC-384Kdf
920,173 UART: [kat] LMS
1,168,485 UART: [kat] --
1,169,342 UART: [cold-reset] ++
1,169,808 UART: [fht] FHT @ 0x50003400
1,172,380 UART: [idev] ++
1,172,548 UART: [idev] CDI.KEYID = 6
1,172,909 UART: [idev] SUBJECT.KEYID = 7
1,173,334 UART: [idev] UDS.KEYID = 0
1,181,009 UART: [idev] Erasing UDS.KEYID = 0
1,197,729 UART: [idev] Sha1 KeyId Algorithm
1,206,429 UART: [idev] --
1,207,514 UART: [ldev] ++
1,207,682 UART: [ldev] CDI.KEYID = 6
1,208,046 UART: [ldev] SUBJECT.KEYID = 5
1,208,473 UART: [ldev] AUTHORITY.KEYID = 7
1,208,936 UART: [ldev] FE.KEYID = 1
1,213,908 UART: [ldev] Erasing FE.KEYID = 1
1,240,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,506 UART: [ldev] --
1,279,801 UART: [fwproc] Wait for Commands...
1,280,546 UART: [fwproc] Recv command 0x46574c44
1,281,279 UART: [fwproc] Recv'd Img size: 118548 bytes
1,292,101 writing to cptra_bootfsm_go
1,292,193 UART:
1,292,209 UART: Running Caliptra ROM ...
1,292,617 UART:
1,292,672 UART: [state] CFI Enabled
1,295,288 UART: [state] LifecycleState = Unprovisioned
1,295,943 UART: [state] DebugLocked = No
1,296,439 UART: [state] WD Timer not started. Device not locked for debugging
1,297,794 UART: [kat] SHA2-256
2,101,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,105,448 UART: [kat] ++
2,105,600 UART: [kat] sha1
2,109,964 UART: [kat] SHA2-256
2,111,904 UART: [kat] SHA2-384
2,114,593 UART: [kat] SHA2-512-ACC
2,116,494 UART: [kat] ECC-384
2,126,031 UART: [kat] HMAC-384Kdf
2,130,781 UART: [kat] LMS
2,379,093 UART: [kat] --
2,380,125 UART: [warm-reset] ++
2,380,393 UART: [warm-reset] Prev Cold-Reset failed
2,381,354 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,148,152 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,737 UART: [kat] SHA2-256
901,677 UART: [kat] SHA2-384
904,316 UART: [kat] SHA2-512-ACC
906,217 UART: [kat] ECC-384
916,372 UART: [kat] HMAC-384Kdf
921,032 UART: [kat] LMS
1,169,344 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,613 UART: [fht] FHT @ 0x50003400
1,173,243 UART: [idev] ++
1,173,411 UART: [idev] CDI.KEYID = 6
1,173,772 UART: [idev] SUBJECT.KEYID = 7
1,174,197 UART: [idev] UDS.KEYID = 0
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,262 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,337 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 118548 bytes
1,293,874 writing to cptra_bootfsm_go
1,293,966 UART:
1,293,982 UART: Running Caliptra ROM ...
1,294,390 UART:
1,294,532 UART: [state] CFI Enabled
1,297,008 UART: [state] LifecycleState = Unprovisioned
1,297,663 UART: [state] DebugLocked = No
1,298,201 UART: [state] WD Timer not started. Device not locked for debugging
1,299,460 UART: [kat] SHA2-256
2,103,010 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,107,114 UART: [kat] ++
2,107,266 UART: [kat] sha1
2,111,418 UART: [kat] SHA2-256
2,113,358 UART: [kat] SHA2-384
2,116,139 UART: [kat] SHA2-512-ACC
2,118,040 UART: [kat] ECC-384
2,128,175 UART: [kat] HMAC-384Kdf
2,132,739 UART: [kat] LMS
2,381,051 UART: [kat] --
2,381,979 UART: [warm-reset] ++
2,382,247 UART: [warm-reset] Prev Cold-Reset failed
2,383,196 UART: ROM Fatal Error: 0x01040010
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,150,065 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_cold_boot_during_image_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
5,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
191,991 UART:
192,377 UART: Running Caliptra ROM ...
193,501 UART:
193,651 UART: [state] CFI Enabled
261,055 UART: [state] LifecycleState = Unprovisioned
262,994 UART: [state] DebugLocked = No
265,683 UART: [state] WD Timer not started. Device not locked for debugging
269,199 UART: [kat] SHA2-256
448,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,650 UART: [kat] ++
460,133 UART: [kat] sha1
471,121 UART: [kat] SHA2-256
473,799 UART: [kat] SHA2-384
480,315 UART: [kat] SHA2-512-ACC
482,675 UART: [kat] ECC-384
2,927,657 UART: [kat] HMAC-384Kdf
2,949,676 UART: [kat] LMS
3,426,156 UART: [kat] --
3,431,903 UART: [cold-reset] ++
3,434,115 UART: [fht] FHT @ 0x50003400
3,444,068 UART: [idev] ++
3,444,643 UART: [idev] CDI.KEYID = 6
3,445,617 UART: [idev] SUBJECT.KEYID = 7
3,446,838 UART: [idev] UDS.KEYID = 0
3,479,885 UART: [idev] Erasing UDS.KEYID = 0
5,964,538 UART: [idev] Sha1 KeyId Algorithm
5,987,313 UART: [idev] --
5,992,229 UART: [ldev] ++
5,992,803 UART: [ldev] CDI.KEYID = 6
5,993,771 UART: [ldev] SUBJECT.KEYID = 5
5,994,956 UART: [ldev] AUTHORITY.KEYID = 7
5,996,193 UART: [ldev] FE.KEYID = 1
6,036,770 UART: [ldev] Erasing FE.KEYID = 1
8,543,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,784 UART: [ldev] --
10,353,645 UART: [fwproc] Wait for Commands...
10,355,310 UART: [fwproc] Recv command 0x46574c44
10,357,300 UART: [fwproc] Recv'd Img size: 118548 bytes
13,839,870 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,584 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,997,591 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,286 >>> mbox cmd response: success
14,330,228 UART: [afmc] ++
14,330,828 UART: [afmc] CDI.KEYID = 6
14,331,748 UART: [afmc] SUBJECT.KEYID = 7
14,332,970 UART: [afmc] AUTHORITY.KEYID = 5
16,871,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,740 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,365 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,390 UART: [afmc] --
18,677,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,827,118 UART: [cold-reset] --
18,827,971 UART: [state] Locking Datavault
18,829,129 UART: [state] Locking PCR0, PCR1 and PCR31
18,830,669 UART: [state] Locking ICCM
18,831,579 UART: [exit] Launching FMC @ 0x40000130
18,833,010 UART:
18,833,186 UART: Running Caliptra FMC ...
18,834,286 UART:
18,834,447 UART: [state] CFI Enabled
18,835,318 UART: [fht] FMC Alias Private Key: 7
20,520,944 UART: [art] Extend RT PCRs Done
20,522,164 UART: [art] Lock RT PCRs Done
20,523,948 UART: [art] Populate DV Done
20,529,405 UART: [fht] FMC Alias Private Key: 7
20,531,006 UART: [art] Derive CDI
20,531,838 UART: [art] Store in slot 0x4
20,586,967 UART: [art] Derive Key Pair
20,587,961 UART: [art] Store priv key in slot 0x5
23,051,124 UART: [art] Derive Key Pair - Done
23,064,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,571 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,076 UART: [art] PUB.X = F97EF8C0DEE3C8F85F15ECB674BE0F70056FF086D784469A7196B385B666A1D7F830795057BE3069C82E3AD5D9E1CA77
24,785,347 UART: [art] PUB.Y = A533822B04AB0EE31C8D088B93FDB34DE1B9F77C7A3523B52289EC5CD2ECA473B69DB50EE8E72DBB5C4DCD7003EA0D38
24,792,651 UART: [art] SIG.R = 3EA247DA1EAB3D360B24EF8C2F78BA7DAE85D54409C22C093507779A8A9CFE0E5C0B9A5809C2269C742E8AB1397A3D6F
24,799,994 UART: [art] SIG.S = 4E5A811009A02BF51C178A6893A94CEE01D3B4BE75AA7A35B1471C09BC8D7379BA04EB6FD5216AE5662BB7C64AC9EAFF
25,778,637 UART: Caliptra RT
25,779,341 UART: [state] CFI Enabled
25,959,869 UART: [rt] RT listening for mailbox commands...
25,962,875 UART:
25,963,126 UART: Running Caliptra ROM ...
25,964,376 UART:
25,964,548 UART: [state] CFI Enabled
26,032,468 UART: [state] LifecycleState = Unprovisioned
26,034,366 UART: [state] DebugLocked = No
26,036,238 UART: [state] WD Timer not started. Device not locked for debugging
26,039,385 UART: [kat] SHA2-256
26,219,055 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,229,854 UART: [kat] ++
26,230,404 UART: [kat] sha1
26,240,819 UART: [kat] SHA2-256
26,243,521 UART: [kat] SHA2-384
26,250,156 UART: [kat] SHA2-512-ACC
26,252,508 UART: [kat] ECC-384
28,717,114 UART: [kat] HMAC-384Kdf
28,740,093 UART: [kat] LMS
29,216,549 UART: [kat] --
29,219,787 UART: [update-reset] ++
32,721,955 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,726,260 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,123,863 >>> mbox cmd response: success
295 writing to cptra_bootfsm_go
553 UART: [update-re
1,086 UART: Running Caliptra ROM ...
2,203 UART:
2,370 UART: [state] CFI Enabled
75,602 UART: [state] LifecycleState = Unprovisioned
77,537 UART: [state] DebugLocked = No
79,406 UART: [state] WD Timer not started. Device not locked for debugging
82,815 UART: [kat] SHA2-256
262,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
273,275 UART: [kat] ++
273,801 UART: [kat] sha1
286,041 UART: [kat] SHA2-256
288,720 UART: [kat] SHA2-384
293,950 UART: [kat] SHA2-512-ACC
296,294 UART: [kat] ECC-384
2,754,179 UART: [kat] HMAC-384Kdf
2,780,291 UART: [kat] LMS
3,256,744 UART: [kat] --
3,261,920 UART: [warm-reset] ++
3,264,459 UART: [warm-reset] Prev Update Reset failed
3,268,694 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
5,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,779 >>> mbox cmd response: success
18,532,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,681,533 UART:
18,681,921 UART: Running Caliptra FMC ...
18,683,024 UART:
18,683,192 UART: [state] CFI Enabled
18,684,164 UART: [fht] FMC Alias Private Key: 7
20,382,017 UART: [art] Extend RT PCRs Done
20,383,248 UART: [art] Lock RT PCRs Done
20,385,100 UART: [art] Populate DV Done
20,390,708 UART: [fht] FMC Alias Private Key: 7
20,392,371 UART: [art] Derive CDI
20,393,192 UART: [art] Store in slot 0x4
20,448,003 UART: [art] Derive Key Pair
20,449,034 UART: [art] Store priv key in slot 0x5
22,911,909 UART: [art] Derive Key Pair - Done
22,925,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,638,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,640,473 UART: [art] PUB.X = 19330179C6D5E395FEA11A3F4C444A9343586B219F1862833A51E6AC9E23F17BEB0C63AD22D4F50889D82F5E99F39A86
24,647,768 UART: [art] PUB.Y = 2B3B6512D274E962470A1E33D7ED80F50BA20B1AAC0FFA53AAE5C7B5A7EA8BE08B0A9B674FAE4EDFEB382237AD12D57C
24,655,025 UART: [art] SIG.R = 695E6B34C674BA88A6F72AAB99914AA3C4CFC73A46979C8D18FB30B8048D3508511D17229E84B841BB56205FF0FED9B1
24,662,424 UART: [art] SIG.S = 0EC34B379EBFF4BAFDBFE7AB45C702CC7530469DF8A1C40CDAB9D7ECD4BD646E0FA33C39D4394B6BEE8ECC8353976965
25,641,915 UART: Caliptra RT
25,642,639 UART: [state] CFI Enabled
25,821,201 UART: [rt] RT listening for mailbox commands...
32,985,860 >>> mbox cmd response: success
297 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
7,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
192,640 UART:
193,023 UART: Running Caliptra ROM ...
194,109 UART:
603,628 UART: [state] CFI Enabled
614,878 UART: [state] LifecycleState = Unprovisioned
616,829 UART: [state] DebugLocked = No
618,822 UART: [state] WD Timer not started. Device not locked for debugging
623,343 UART: [kat] SHA2-256
802,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,545 UART: [kat] ++
814,045 UART: [kat] sha1
825,463 UART: [kat] SHA2-256
828,143 UART: [kat] SHA2-384
834,281 UART: [kat] SHA2-512-ACC
836,670 UART: [kat] ECC-384
3,278,877 UART: [kat] HMAC-384Kdf
3,290,671 UART: [kat] LMS
3,767,151 UART: [kat] --
3,771,086 UART: [cold-reset] ++
3,773,713 UART: [fht] FHT @ 0x50003400
3,784,635 UART: [idev] ++
3,785,254 UART: [idev] CDI.KEYID = 6
3,786,268 UART: [idev] SUBJECT.KEYID = 7
3,787,422 UART: [idev] UDS.KEYID = 0
3,804,547 UART: [idev] Erasing UDS.KEYID = 0
6,260,785 UART: [idev] Sha1 KeyId Algorithm
6,283,465 UART: [idev] --
6,287,136 UART: [ldev] ++
6,287,707 UART: [ldev] CDI.KEYID = 6
6,288,620 UART: [ldev] SUBJECT.KEYID = 5
6,289,829 UART: [ldev] AUTHORITY.KEYID = 7
6,291,110 UART: [ldev] FE.KEYID = 1
6,301,264 UART: [ldev] Erasing FE.KEYID = 1
8,782,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,747 UART: [ldev] --
10,576,989 UART: [fwproc] Wait for Commands...
10,578,997 UART: [fwproc] Recv command 0x46574c44
10,580,988 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,003 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,633 >>> mbox cmd response: success
14,550,519 UART: [afmc] ++
14,551,101 UART: [afmc] CDI.KEYID = 6
14,552,035 UART: [afmc] SUBJECT.KEYID = 7
14,553,245 UART: [afmc] AUTHORITY.KEYID = 5
17,058,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,248 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,367 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,283 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,821 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,731 UART: [afmc] --
18,862,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,011,547 UART: [cold-reset] --
19,012,403 UART: [state] Locking Datavault
19,013,477 UART: [state] Locking PCR0, PCR1 and PCR31
19,015,007 UART: [state] Locking ICCM
19,015,893 UART: [exit] Launching FMC @ 0x40000130
19,017,232 UART:
19,017,378 UART: Running Caliptra FMC ...
19,018,479 UART:
19,018,630 UART: [state] CFI Enabled
19,019,459 UART: [fht] FMC Alias Private Key: 7
20,657,104 UART: [art] Extend RT PCRs Done
20,658,329 UART: [art] Lock RT PCRs Done
20,659,924 UART: [art] Populate DV Done
20,665,391 UART: [fht] FMC Alias Private Key: 7
20,667,053 UART: [art] Derive CDI
20,667,792 UART: [art] Store in slot 0x4
20,710,380 UART: [art] Derive Key Pair
20,711,415 UART: [art] Store priv key in slot 0x5
23,138,127 UART: [art] Derive Key Pair - Done
23,151,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,150 UART: [art] PUB.X = 42F57FF279653899B66739493B82418E4F674C016673B5DCFC78681B013884F200BECD13411D2970A68AA80ADDB26CD5
24,866,395 UART: [art] PUB.Y = 4711680FA5BC4CDFDCF30917A6AF3A556B42AA122DAADEF2E54DF3B3FB0D75D5E8237E7C4A182A4CC2E62F74782174E3
24,873,693 UART: [art] SIG.R = 313DD3E1590E27809C3D6931D2A5949D1AC4076BA37ACED1BB6A5FB7AABC28B44B3932E55DD5885FCED765345CD3DAA9
24,881,081 UART: [art] SIG.S = 545F0269BB50D697552C16C75DFF04CABFF3CA7757D529450DE25D0DC5C498BA528B143FF41854FB2935019D07FBB59C
25,860,222 UART: Caliptra RT
25,860,931 UART: [state] CFI Enabled
25,994,191 UART: [rt] RT listening for mailbox commands...
25,997,465 UART:
25,997,629 UART: Running Caliptra ROM ...
25,998,743 UART:
25,999,115 UART: [state] CFI Enabled
26,012,997 UART: [state] LifecycleState = Unprovisioned
26,014,876 UART: [state] DebugLocked = No
26,017,063 UART: [state] WD Timer not started. Device not locked for debugging
26,021,290 UART: [kat] SHA2-256
26,200,963 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,211,758 UART: [kat] ++
26,212,240 UART: [kat] sha1
26,222,578 UART: [kat] SHA2-256
26,225,242 UART: [kat] SHA2-384
26,232,430 UART: [kat] SHA2-512-ACC
26,234,836 UART: [kat] ECC-384
28,678,210 UART: [kat] HMAC-384Kdf
28,689,676 UART: [kat] LMS
29,166,146 UART: [kat] --
29,170,523 UART: [update-reset] ++
32,671,350 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,674,299 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,071,880 >>> mbox cmd response: success
294 writing to cptra_bootfsm_go
606 UART: [update-
1,096 UART: Running Caliptra ROM ...
2,199 UART:
7,504,731 UART: [state] CFI Enabled
7,516,232 UART: [state] LifecycleState = Unprovisioned
7,518,132 UART: [state] DebugLocked = No
7,520,109 UART: [state] WD Timer not started. Device not locked for debugging
7,523,256 UART: [kat] SHA2-256
7,702,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,713,701 UART: [kat] ++
7,714,157 UART: [kat] sha1
7,725,222 UART: [kat] SHA2-256
7,727,965 UART: [kat] SHA2-384
7,733,516 UART: [kat] SHA2-512-ACC
7,735,922 UART: [kat] ECC-384
10,176,461 UART: [kat] HMAC-384Kdf
10,188,687 UART: [kat] LMS
10,665,149 UART: [kat] --
10,670,104 UART: [warm-reset] ++
10,671,579 UART: [warm-reset] Prev Update Reset failed
10,674,785 UART: ROM Fatal Error: 0x01040011test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
6,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,165 >>> mbox cmd response: success
18,688,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,837,598 UART:
18,837,981 UART: Running Caliptra FMC ...
18,839,175 UART:
18,839,344 UART: [state] CFI Enabled
18,840,303 UART: [fht] FMC Alias Private Key: 7
20,476,479 UART: [art] Extend RT PCRs Done
20,477,710 UART: [art] Lock RT PCRs Done
20,479,391 UART: [art] Populate DV Done
20,484,532 UART: [fht] FMC Alias Private Key: 7
20,486,130 UART: [art] Derive CDI
20,486,943 UART: [art] Store in slot 0x4
20,529,486 UART: [art] Derive Key Pair
20,530,525 UART: [art] Store priv key in slot 0x5
22,957,137 UART: [art] Derive Key Pair - Done
22,970,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,868 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,368 UART: [art] PUB.X = A4DDBC8C2D436FE7D73F76A8AC3829FF6812EC9F63A53714FA7EA6605DBA6745315DE86514AEA13A803A990DE169AEDD
24,685,617 UART: [art] PUB.Y = BCEF41419125A955F35ED93F2B9A5068B61CBFD21CA111E271C412CF53F62242DF1B76252E7AFADEB8B7E28C16E76940
24,692,914 UART: [art] SIG.R = BC5CE02148A5E8E63D9FEB5A09216812270C6DD2C8FD0EC64F362BE94825BA76469549F8307FFD674F5D60B609B61196
24,700,314 UART: [art] SIG.S = B70B40C1E87BEA24C8EBBC9DF1D108CB156E155E3D0BD2952457843C1D2F971204B0930F14BAB2F339E006BA0CF00817
25,678,934 UART: Caliptra RT
25,679,653 UART: [state] CFI Enabled
25,812,673 UART: [rt] RT listening for mailbox commands...
32,883,108 >>> mbox cmd response: success
298 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,361 UART: [kat] SHA2-512-ACC
906,262 UART: [kat] ECC-384
915,719 UART: [kat] HMAC-384Kdf
920,317 UART: [kat] LMS
1,168,629 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,169,952 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,198,265 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,214,876 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,582 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46574c44
1,282,119 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,732 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,967 >>> mbox cmd response: success
2,826,079 UART: [afmc] ++
2,826,247 UART: [afmc] CDI.KEYID = 6
2,826,610 UART: [afmc] SUBJECT.KEYID = 7
2,827,036 UART: [afmc] AUTHORITY.KEYID = 5
2,862,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,566 UART: [afmc] --
2,905,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,549 UART: [cold-reset] --
2,906,513 UART: [state] Locking Datavault
2,907,664 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,268 UART: [state] Locking ICCM
2,908,724 UART: [exit] Launching FMC @ 0x40000130
2,914,054 UART:
2,914,070 UART: Running Caliptra FMC ...
2,914,478 UART:
2,914,532 UART: [state] CFI Enabled
2,925,452 UART: [fht] FMC Alias Private Key: 7
3,044,740 UART: [art] Extend RT PCRs Done
3,045,168 UART: [art] Lock RT PCRs Done
3,046,786 UART: [art] Populate DV Done
3,055,215 UART: [fht] FMC Alias Private Key: 7
3,056,181 UART: [art] Derive CDI
3,056,461 UART: [art] Store in slot 0x4
3,142,301 UART: [art] Derive Key Pair
3,142,661 UART: [art] Store priv key in slot 0x5
3,155,572 UART: [art] Derive Key Pair - Done
3,170,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,462 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,227 UART: [art] PUB.X = B953843FFCD2E41D19828CD2007CE44DA325FC7CF5B8FDF95031A6E339CF04DA3F06B389C17448AA1F6014BE57FAF642
3,192,983 UART: [art] PUB.Y = 7BED974C1A83A80184F7FFC4959BDCE5CF89CA5C885FFA4E8FDABEAB6923786DC4176BDF22641B73FCA906BFC77E833B
3,199,953 UART: [art] SIG.R = F21F8DFBA5B17575A00B4063DC7A1F5127B1F804D45EED1A7DEC6BE65C858745A487C75041684ABF01002BC1141C90AD
3,206,702 UART: [art] SIG.S = 263CDBBCC6A99AAF1447AFF84EE26BC22B9AD1DB5A4A7D39D071623476E64CAC4FDDB0D52B93878C7BB286CFCEB624B1
3,230,606 UART: Caliptra RT
3,230,857 UART: [state] CFI Enabled
3,351,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,538 UART:
3,353,554 UART: Running Caliptra ROM ...
3,353,962 UART:
3,354,017 UART: [state] CFI Enabled
3,356,905 UART: [state] LifecycleState = Unprovisioned
3,357,560 UART: [state] DebugLocked = No
3,358,084 UART: [state] WD Timer not started. Device not locked for debugging
3,359,406 UART: [kat] SHA2-256
4,162,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,060 UART: [kat] ++
4,167,212 UART: [kat] sha1
4,171,476 UART: [kat] SHA2-256
4,173,416 UART: [kat] SHA2-384
4,176,019 UART: [kat] SHA2-512-ACC
4,177,919 UART: [kat] ECC-384
4,187,936 UART: [kat] HMAC-384Kdf
4,192,528 UART: [kat] LMS
4,440,840 UART: [kat] --
4,441,446 UART: [update-reset] ++
5,800,595 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,702 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,917 >>> mbox cmd response: success
5,957,115 writing to cptra_bootfsm_go
5,957,207 UART:
5,957,223 UART: Running Caliptra ROM ...
5,957,631 UART:
5,957,686 UART: [state] CFI Enabled
5,960,236 UART: [state] LifecycleState = Unprovisioned
5,960,891 UART: [state] DebugLocked = No
5,961,493 UART: [state] WD Timer not started. Device not locked for debugging
5,962,684 UART: [kat] SHA2-256
6,766,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,338 UART: [kat] ++
6,770,490 UART: [kat] sha1
6,774,832 UART: [kat] SHA2-256
6,776,772 UART: [kat] SHA2-384
6,779,435 UART: [kat] SHA2-512-ACC
6,781,336 UART: [kat] ECC-384
6,790,973 UART: [kat] HMAC-384Kdf
6,795,601 UART: [kat] LMS
7,043,913 UART: [kat] --
7,045,027 UART: [warm-reset] ++
7,045,570 UART: [warm-reset] Prev Update Reset failed
7,046,419 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,178 >>> mbox cmd response: success
2,734,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,933 UART:
2,740,949 UART: Running Caliptra FMC ...
2,741,357 UART:
2,741,411 UART: [state] CFI Enabled
2,752,011 UART: [fht] FMC Alias Private Key: 7
2,871,613 UART: [art] Extend RT PCRs Done
2,872,041 UART: [art] Lock RT PCRs Done
2,873,601 UART: [art] Populate DV Done
2,881,720 UART: [fht] FMC Alias Private Key: 7
2,882,902 UART: [art] Derive CDI
2,883,182 UART: [art] Store in slot 0x4
2,969,030 UART: [art] Derive Key Pair
2,969,390 UART: [art] Store priv key in slot 0x5
2,982,491 UART: [art] Derive Key Pair - Done
2,997,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,191 UART: [art] PUB.X = B2C324FBFDB76C356B5DC3C55C1A1258BFA0219E109437FD4B796DE796F9B85DAD92A6BA3300ED8B6EF76F7F22A8C9F0
3,019,959 UART: [art] PUB.Y = D1F48256AEC759B2CC2DA4BA2B3CDE1333E31742835F74863685708BE98EADDE27BB20AF1144F185E4BC65E7340428F9
3,026,914 UART: [art] SIG.R = A3543617D3AF288452C311FD4C9FDF576DF56BE665A28652C618A3DF592F8C0AF7FC34EA55B46911AD65076CBE397FC5
3,033,688 UART: [art] SIG.S = 9328515A16B498A4B561ECDC40FE8A9057A58E2B7158ACFA5CC30EE79BAB92E886685D57A6FBFE767C4410476178449B
3,057,555 UART: Caliptra RT
3,057,806 UART: [state] CFI Enabled
3,177,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,265 >>> mbox cmd response: success
5,666,537 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,852 UART: [state] WD Timer not started. Device not locked for debugging
88,091 UART: [kat] SHA2-256
891,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,745 UART: [kat] ++
895,897 UART: [kat] sha1
900,141 UART: [kat] SHA2-256
902,081 UART: [kat] SHA2-384
904,854 UART: [kat] SHA2-512-ACC
906,755 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,170,951 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,198,832 UART: [idev] Sha1 KeyId Algorithm
1,207,768 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,619 UART: [ldev] Erasing FE.KEYID = 1
1,241,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,497 UART: [ldev] --
1,280,800 UART: [fwproc] Wait for Commands...
1,281,509 UART: [fwproc] Recv command 0x46574c44
1,282,242 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,767 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,952 >>> mbox cmd response: success
2,827,220 UART: [afmc] ++
2,827,388 UART: [afmc] CDI.KEYID = 6
2,827,751 UART: [afmc] SUBJECT.KEYID = 7
2,828,177 UART: [afmc] AUTHORITY.KEYID = 5
2,862,978 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,523 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,951 UART: [afmc] --
2,905,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,962 UART: [cold-reset] --
2,906,654 UART: [state] Locking Datavault
2,907,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,287 UART: [state] Locking ICCM
2,908,805 UART: [exit] Launching FMC @ 0x40000130
2,914,135 UART:
2,914,151 UART: Running Caliptra FMC ...
2,914,559 UART:
2,914,702 UART: [state] CFI Enabled
2,924,944 UART: [fht] FMC Alias Private Key: 7
3,043,710 UART: [art] Extend RT PCRs Done
3,044,138 UART: [art] Lock RT PCRs Done
3,045,632 UART: [art] Populate DV Done
3,053,561 UART: [fht] FMC Alias Private Key: 7
3,054,647 UART: [art] Derive CDI
3,054,927 UART: [art] Store in slot 0x4
3,140,817 UART: [art] Derive Key Pair
3,141,177 UART: [art] Store priv key in slot 0x5
3,154,344 UART: [art] Derive Key Pair - Done
3,169,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,663 UART: [art] PUB.X = 4BF6D2660983F2E88CAE3F72CA8964CB6BBAD4CB63E897CAB338DEA05F5FF658E812CCDF7E6801EF662420CE408C61C6
3,192,447 UART: [art] PUB.Y = 362EFE07A48BCDF33D4FD991552A478857FDD21A6A4EB8F45FE221B099550E06873423692FBDED5368F2092A3FBF3C37
3,199,393 UART: [art] SIG.R = A598DF40004BF9E589065365724824CF5EDF10D02CA5D9D0AF4289357873042271008FAAAADD5F7BBEE30256A645BFF2
3,206,116 UART: [art] SIG.S = DC5F02608082ED7B8689BEBBA800869D22DC0B37820CB2E56977F1C8CDDC303B4F5E868C0489C4D35965D1E2B7288C77
3,230,006 UART: Caliptra RT
3,230,349 UART: [state] CFI Enabled
3,349,385 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,339 UART:
3,351,355 UART: Running Caliptra ROM ...
3,351,763 UART:
3,351,905 UART: [state] CFI Enabled
3,354,969 UART: [state] LifecycleState = Unprovisioned
3,355,624 UART: [state] DebugLocked = No
3,356,256 UART: [state] WD Timer not started. Device not locked for debugging
3,357,538 UART: [kat] SHA2-256
4,161,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,192 UART: [kat] ++
4,165,344 UART: [kat] sha1
4,169,678 UART: [kat] SHA2-256
4,171,618 UART: [kat] SHA2-384
4,174,411 UART: [kat] SHA2-512-ACC
4,176,311 UART: [kat] ECC-384
4,186,056 UART: [kat] HMAC-384Kdf
4,190,820 UART: [kat] LMS
4,439,132 UART: [kat] --
4,439,810 UART: [update-reset] ++
5,799,359 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,348 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,955,563 >>> mbox cmd response: success
5,955,691 writing to cptra_bootfsm_go
5,955,783 UART:
5,955,799 UART: Running Caliptra ROM ...
5,956,207 UART:
5,956,349 UART: [state] CFI Enabled
5,958,823 UART: [state] LifecycleState = Unprovisioned
5,959,478 UART: [state] DebugLocked = No
5,960,146 UART: [state] WD Timer not started. Device not locked for debugging
5,961,351 UART: [kat] SHA2-256
6,764,901 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,769,005 UART: [kat] ++
6,769,157 UART: [kat] sha1
6,773,403 UART: [kat] SHA2-256
6,775,343 UART: [kat] SHA2-384
6,778,036 UART: [kat] SHA2-512-ACC
6,779,937 UART: [kat] ECC-384
6,789,640 UART: [kat] HMAC-384Kdf
6,794,226 UART: [kat] LMS
7,042,538 UART: [kat] --
7,043,300 UART: [warm-reset] ++
7,043,857 UART: [warm-reset] Prev Update Reset failed
7,045,000 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,417 >>> mbox cmd response: success
2,734,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,590 UART:
2,740,606 UART: Running Caliptra FMC ...
2,741,014 UART:
2,741,157 UART: [state] CFI Enabled
2,751,851 UART: [fht] FMC Alias Private Key: 7
2,870,567 UART: [art] Extend RT PCRs Done
2,870,995 UART: [art] Lock RT PCRs Done
2,872,203 UART: [art] Populate DV Done
2,880,326 UART: [fht] FMC Alias Private Key: 7
2,881,448 UART: [art] Derive CDI
2,881,728 UART: [art] Store in slot 0x4
2,966,928 UART: [art] Derive Key Pair
2,967,288 UART: [art] Store priv key in slot 0x5
2,980,435 UART: [art] Derive Key Pair - Done
2,995,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,267 UART: [art] PUB.X = 0FDF76F324BE9ADB40880FB9421FEF29476CC136B071C9EC2AE9B34F0E1815817BE03BAA5BE31261758AA83BA5A76B44
3,018,042 UART: [art] PUB.Y = 0209B5576B00A09C0625ACBFDFD902F1B26621EC4782BD977DD2FA7512CEFA4FF24438577E16CC6B4F0144D8AC4185E0
3,024,965 UART: [art] SIG.R = 10F9AAD75C1E90C82F6D86C7ABA4AE6AE2A5AF3E289EDA475B4B9DF121E6615D43B5828533912CE040D4CB05A89BF79A
3,031,750 UART: [art] SIG.S = 687F4758B2A42CC42D18EF7E3931F4881D7CF51C9ED90E7360CC9E536703318295C9101065E4D20CA5890842ED0D1388
3,055,953 UART: Caliptra RT
3,056,296 UART: [state] CFI Enabled
3,175,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,844 >>> mbox cmd response: success
5,667,090 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,701 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,742 UART: [kat] SHA2-256
901,682 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,699 UART: [kat] HMAC-384Kdf
920,119 UART: [kat] LMS
1,168,431 UART: [kat] --
1,169,266 UART: [cold-reset] ++
1,169,686 UART: [fht] FHT @ 0x50003400
1,172,292 UART: [idev] ++
1,172,460 UART: [idev] CDI.KEYID = 6
1,172,821 UART: [idev] SUBJECT.KEYID = 7
1,173,246 UART: [idev] UDS.KEYID = 0
1,181,329 UART: [idev] Erasing UDS.KEYID = 0
1,197,985 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,032 UART: [ldev] ++
1,208,200 UART: [ldev] CDI.KEYID = 6
1,208,564 UART: [ldev] SUBJECT.KEYID = 5
1,208,991 UART: [ldev] AUTHORITY.KEYID = 7
1,209,454 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,572 UART: [ldev] --
1,280,781 UART: [fwproc] Wait for Commands...
1,281,596 UART: [fwproc] Recv command 0x46574c44
1,282,329 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,882 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,127 >>> mbox cmd response: success
2,826,213 UART: [afmc] ++
2,826,381 UART: [afmc] CDI.KEYID = 6
2,826,744 UART: [afmc] SUBJECT.KEYID = 7
2,827,170 UART: [afmc] AUTHORITY.KEYID = 5
2,862,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,737 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,618 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,319 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,068 UART: [afmc] --
2,905,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,993 UART: [cold-reset] --
2,906,847 UART: [state] Locking Datavault
2,907,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,432 UART: [state] Locking ICCM
2,908,948 UART: [exit] Launching FMC @ 0x40000130
2,914,278 UART:
2,914,294 UART: Running Caliptra FMC ...
2,914,702 UART:
2,914,756 UART: [state] CFI Enabled
2,925,120 UART: [fht] FMC Alias Private Key: 7
3,044,492 UART: [art] Extend RT PCRs Done
3,044,920 UART: [art] Lock RT PCRs Done
3,046,296 UART: [art] Populate DV Done
3,054,423 UART: [fht] FMC Alias Private Key: 7
3,055,351 UART: [art] Derive CDI
3,055,631 UART: [art] Store in slot 0x4
3,141,576 UART: [art] Derive Key Pair
3,141,936 UART: [art] Store priv key in slot 0x5
3,155,160 UART: [art] Derive Key Pair - Done
3,169,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,501 UART: [art] PUB.X = 1F3D9BF66ECD4F929642FE70BE1E7D0C725123D5C161C8F7742C9A6041747F97523A5AA2393D2956460C1B025CAE3EE2
3,192,266 UART: [art] PUB.Y = 4616048F1ABAAC76E4D02A111EEB782409FFE752B0058FE657BB343F09EA005A85D7872A4F849A02012D37BECF8AC613
3,199,184 UART: [art] SIG.R = 785608A78EAABFECA6094E458D9E1FA57BCA2F7CAF16CB478E227CB7F8D668422A128EAEEA54135FC773C1D9C700870F
3,205,941 UART: [art] SIG.S = 05878D4B9F4702F9B3BCA38B3F0FE09A6F095F2A1F7CFD95740CC629641766CD7C9CF23B7B977C2D126D6354F7B68985
3,230,158 UART: Caliptra RT
3,230,409 UART: [state] CFI Enabled
3,349,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,639 UART:
3,351,655 UART: Running Caliptra ROM ...
3,352,063 UART:
3,352,118 UART: [state] CFI Enabled
3,354,844 UART: [state] LifecycleState = Unprovisioned
3,355,499 UART: [state] DebugLocked = No
3,356,077 UART: [state] WD Timer not started. Device not locked for debugging
3,357,361 UART: [kat] SHA2-256
4,160,911 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,015 UART: [kat] ++
4,165,167 UART: [kat] sha1
4,169,245 UART: [kat] SHA2-256
4,171,185 UART: [kat] SHA2-384
4,173,832 UART: [kat] SHA2-512-ACC
4,175,732 UART: [kat] ECC-384
4,185,525 UART: [kat] HMAC-384Kdf
4,189,979 UART: [kat] LMS
4,438,291 UART: [kat] --
4,439,265 UART: [update-reset] ++
5,797,982 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,799,007 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,954,222 >>> mbox cmd response: success
5,954,350 writing to cptra_bootfsm_go
5,954,442 UART:
5,954,458 UART: Running Caliptra ROM ...
5,954,866 UART:
5,954,921 UART: [state] CFI Enabled
5,957,265 UART: [state] LifecycleState = Unprovisioned
5,957,920 UART: [state] DebugLocked = No
5,958,552 UART: [state] WD Timer not started. Device not locked for debugging
5,959,789 UART: [kat] SHA2-256
6,763,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,767,443 UART: [kat] ++
6,767,595 UART: [kat] sha1
6,771,809 UART: [kat] SHA2-256
6,773,749 UART: [kat] SHA2-384
6,776,718 UART: [kat] SHA2-512-ACC
6,778,619 UART: [kat] ECC-384
6,788,256 UART: [kat] HMAC-384Kdf
6,792,910 UART: [kat] LMS
7,041,222 UART: [kat] --
7,042,072 UART: [warm-reset] ++
7,042,751 UART: [warm-reset] Prev Update Reset failed
7,043,732 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,234 >>> mbox cmd response: success
2,732,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,738,627 UART:
2,738,643 UART: Running Caliptra FMC ...
2,739,051 UART:
2,739,105 UART: [state] CFI Enabled
2,749,361 UART: [fht] FMC Alias Private Key: 7
2,868,157 UART: [art] Extend RT PCRs Done
2,868,585 UART: [art] Lock RT PCRs Done
2,869,945 UART: [art] Populate DV Done
2,878,316 UART: [fht] FMC Alias Private Key: 7
2,879,392 UART: [art] Derive CDI
2,879,672 UART: [art] Store in slot 0x4
2,965,391 UART: [art] Derive Key Pair
2,965,751 UART: [art] Store priv key in slot 0x5
2,979,003 UART: [art] Derive Key Pair - Done
2,994,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,565 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,330 UART: [art] PUB.X = 1D638DAD8173EBE5F59FB5F410A36848C21BC29BA6CB39ABF2C47F214D4FAB7E1211AEFCBF7C1648CA593BE4446A0BE4
3,017,121 UART: [art] PUB.Y = CE5A524A05C9DFBF5FA5B7E2802CF0FCE6389C66030B13711369003C77064FAB04309268ACE01CEEB92DB73FA137C4AE
3,024,048 UART: [art] SIG.R = 8B32F547F0D98AD6624DD8969520B83B7174C6C506344CC28B02DACDA04FC383682E18E610E240308434F6DF7AB4DB5A
3,030,816 UART: [art] SIG.S = 64A50AA4BFD39F50978CFE95592F720D23DB77817CB5CDE324FD67A6D13F73A31605A019051241DD52ED7BD030A05C94
3,054,672 UART: Caliptra RT
3,054,923 UART: [state] CFI Enabled
3,174,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,664,103 >>> mbox cmd response: success
5,664,265 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
891,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,577 UART: [kat] ++
895,729 UART: [kat] sha1
899,755 UART: [kat] SHA2-256
901,695 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,642 UART: [kat] HMAC-384Kdf
920,356 UART: [kat] LMS
1,168,668 UART: [kat] --
1,169,315 UART: [cold-reset] ++
1,169,691 UART: [fht] FHT @ 0x50003400
1,172,227 UART: [idev] ++
1,172,395 UART: [idev] CDI.KEYID = 6
1,172,756 UART: [idev] SUBJECT.KEYID = 7
1,173,181 UART: [idev] UDS.KEYID = 0
1,181,144 UART: [idev] Erasing UDS.KEYID = 0
1,198,566 UART: [idev] Sha1 KeyId Algorithm
1,207,334 UART: [idev] --
1,208,333 UART: [ldev] ++
1,208,501 UART: [ldev] CDI.KEYID = 6
1,208,865 UART: [ldev] SUBJECT.KEYID = 5
1,209,292 UART: [ldev] AUTHORITY.KEYID = 7
1,209,755 UART: [ldev] FE.KEYID = 1
1,214,973 UART: [ldev] Erasing FE.KEYID = 1
1,242,126 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,447 UART: [ldev] --
1,280,686 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,347 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,598 >>> mbox cmd response: success
2,826,850 UART: [afmc] ++
2,827,018 UART: [afmc] CDI.KEYID = 6
2,827,381 UART: [afmc] SUBJECT.KEYID = 7
2,827,807 UART: [afmc] AUTHORITY.KEYID = 5
2,863,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,272 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,564 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,379 UART: [afmc] --
2,907,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,907,424 UART: [cold-reset] --
2,908,222 UART: [state] Locking Datavault
2,909,373 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,977 UART: [state] Locking ICCM
2,910,439 UART: [exit] Launching FMC @ 0x40000130
2,915,769 UART:
2,915,785 UART: Running Caliptra FMC ...
2,916,193 UART:
2,916,336 UART: [state] CFI Enabled
2,926,978 UART: [fht] FMC Alias Private Key: 7
3,045,656 UART: [art] Extend RT PCRs Done
3,046,084 UART: [art] Lock RT PCRs Done
3,047,758 UART: [art] Populate DV Done
3,055,679 UART: [fht] FMC Alias Private Key: 7
3,056,851 UART: [art] Derive CDI
3,057,131 UART: [art] Store in slot 0x4
3,142,830 UART: [art] Derive Key Pair
3,143,190 UART: [art] Store priv key in slot 0x5
3,156,984 UART: [art] Derive Key Pair - Done
3,171,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,137 UART: [art] PUB.X = FE013895359B3CF883CFC660A67BFD052DE5D9C67E5C549988B54B7F6DA3E5BCC2F863AB4957D237DA744BD15C1F012D
3,194,912 UART: [art] PUB.Y = 5AF8E8744378543231A506A9C182E5C1920297E012B82A96E6939618BCA1182F6C1BA4ED4E7CF23020EE8A752C1C0154
3,201,849 UART: [art] SIG.R = A20BC12C1B40AB43936C149C104613E82C1F06E3ED7CFF5D5C57E1B2AC9625538D726D1319FF244A400C5E536E6A475E
3,208,616 UART: [art] SIG.S = 679D0F928DD47FE6BE2C5777C5A44368057EBDEA48584833053AE9677675EF5FD050F3B81A59FEC82E6980EF2665F7DB
3,232,899 UART: Caliptra RT
3,233,242 UART: [state] CFI Enabled
3,352,949 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,837 UART:
3,354,853 UART: Running Caliptra ROM ...
3,355,261 UART:
3,355,403 UART: [state] CFI Enabled
3,358,417 UART: [state] LifecycleState = Unprovisioned
3,359,072 UART: [state] DebugLocked = No
3,359,562 UART: [state] WD Timer not started. Device not locked for debugging
3,360,700 UART: [kat] SHA2-256
4,164,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,354 UART: [kat] ++
4,168,506 UART: [kat] sha1
4,172,746 UART: [kat] SHA2-256
4,174,686 UART: [kat] SHA2-384
4,177,261 UART: [kat] SHA2-512-ACC
4,179,161 UART: [kat] ECC-384
4,188,998 UART: [kat] HMAC-384Kdf
4,193,762 UART: [kat] LMS
4,442,074 UART: [kat] --
4,443,000 UART: [update-reset] ++
5,801,645 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,802,654 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,957,869 >>> mbox cmd response: success
5,958,121 writing to cptra_bootfsm_go
5,958,213 UART:
5,958,229 UART: Running Caliptra ROM ...
5,958,637 UART:
5,958,779 UART: [state] CFI Enabled
5,961,313 UART: [state] LifecycleState = Unprovisioned
5,961,968 UART: [state] DebugLocked = No
5,962,500 UART: [state] WD Timer not started. Device not locked for debugging
5,963,641 UART: [kat] SHA2-256
6,767,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,771,295 UART: [kat] ++
6,771,447 UART: [kat] sha1
6,775,777 UART: [kat] SHA2-256
6,777,717 UART: [kat] SHA2-384
6,780,512 UART: [kat] SHA2-512-ACC
6,782,413 UART: [kat] ECC-384
6,792,372 UART: [kat] HMAC-384Kdf
6,797,078 UART: [kat] LMS
7,045,390 UART: [kat] --
7,046,420 UART: [warm-reset] ++
7,046,883 UART: [warm-reset] Prev Update Reset failed
7,047,940 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,859 >>> mbox cmd response: success
2,736,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,742,658 UART:
2,742,674 UART: Running Caliptra FMC ...
2,743,082 UART:
2,743,225 UART: [state] CFI Enabled
2,753,677 UART: [fht] FMC Alias Private Key: 7
2,872,321 UART: [art] Extend RT PCRs Done
2,872,749 UART: [art] Lock RT PCRs Done
2,874,277 UART: [art] Populate DV Done
2,882,372 UART: [fht] FMC Alias Private Key: 7
2,883,372 UART: [art] Derive CDI
2,883,652 UART: [art] Store in slot 0x4
2,969,431 UART: [art] Derive Key Pair
2,969,791 UART: [art] Store priv key in slot 0x5
2,983,489 UART: [art] Derive Key Pair - Done
2,998,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,820 UART: [art] PUB.X = F5127A045D388576FEE2D33B4C326B018212610021821930108AC5729161B38A4BBD0199550E5D2FC2567D2F940C8D89
3,021,541 UART: [art] PUB.Y = AE9AA4E74302A476E87D19D71EC41546794CEEB771ADA605C1B57573A8B36B494EEBCA54998366BB08A8B89104BAA9AD
3,028,491 UART: [art] SIG.R = 4645982F940F395C676FA28F4523BDDD182B4AC7CE6F14324F19782F555303E74B7ADD54DE90ED151CBF48FC6B34AC98
3,035,263 UART: [art] SIG.S = 7B4C7B7F1A35135FE2F5BA7CC0F378D52FF067DD57118B6A3B449224A3C4860697A60E16344646556B172622387BAD5D
3,058,799 UART: Caliptra RT
3,059,142 UART: [state] CFI Enabled
3,178,278 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,667,052 >>> mbox cmd response: success
5,667,152 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,690 UART: [state] LifecycleState = Unprovisioned
85,345 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,304 UART: [kat] SHA2-256
890,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,958 UART: [kat] ++
895,110 UART: [kat] sha1
899,262 UART: [kat] SHA2-256
901,202 UART: [kat] SHA2-384
903,919 UART: [kat] SHA2-512-ACC
905,820 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
919,991 UART: [kat] LMS
1,168,303 UART: [kat] --
1,169,390 UART: [cold-reset] ++
1,169,720 UART: [fht] FHT @ 0x50003400
1,172,404 UART: [idev] ++
1,172,572 UART: [idev] CDI.KEYID = 6
1,172,933 UART: [idev] SUBJECT.KEYID = 7
1,173,358 UART: [idev] UDS.KEYID = 0
1,181,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,069 UART: [idev] Sha1 KeyId Algorithm
1,207,133 UART: [idev] --
1,208,084 UART: [ldev] ++
1,208,252 UART: [ldev] CDI.KEYID = 6
1,208,616 UART: [ldev] SUBJECT.KEYID = 5
1,209,043 UART: [ldev] AUTHORITY.KEYID = 7
1,209,506 UART: [ldev] FE.KEYID = 1
1,214,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,948 UART: [ldev] --
1,280,207 UART: [fwproc] Wait for Commands...
1,280,778 UART: [fwproc] Recv command 0x46574c44
1,281,511 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,389 >>> mbox cmd response: success
2,825,507 UART: [afmc] ++
2,825,675 UART: [afmc] CDI.KEYID = 6
2,826,038 UART: [afmc] SUBJECT.KEYID = 7
2,826,464 UART: [afmc] AUTHORITY.KEYID = 5
2,861,597 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,809 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,400 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,101 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,122 UART: [afmc] --
2,905,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,905,125 UART: [cold-reset] --
2,906,007 UART: [state] Locking Datavault
2,907,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,860 UART: [state] Locking ICCM
2,908,392 UART: [exit] Launching FMC @ 0x40000130
2,913,722 UART:
2,913,738 UART: Running Caliptra FMC ...
2,914,146 UART:
2,914,200 UART: [state] CFI Enabled
2,924,578 UART: [fht] FMC Alias Private Key: 7
3,043,250 UART: [art] Extend RT PCRs Done
3,043,678 UART: [art] Lock RT PCRs Done
3,045,434 UART: [art] Populate DV Done
3,053,593 UART: [fht] FMC Alias Private Key: 7
3,054,643 UART: [art] Derive CDI
3,054,923 UART: [art] Store in slot 0x4
3,140,658 UART: [art] Derive Key Pair
3,141,018 UART: [art] Store priv key in slot 0x5
3,154,730 UART: [art] Derive Key Pair - Done
3,169,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,413 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,178 UART: [art] PUB.X = D306A3D7FC8EE58047228A503F2C684B115AAAC210FB9D8ADDE0B5DFC6B6BA4A99EBFCA05062F821EC2E51F7E4DA9631
3,192,969 UART: [art] PUB.Y = 2EA5361103ADA0E556C15E46BD19A7890C25B8A09F9F52BED106566E15073AC725734F31E639C767715B95EC21EF54EE
3,199,909 UART: [art] SIG.R = F716B08AE3EDFBD02CB5BA9F845CC29EEA1EA121E8218A2F062B56C29EF54D3533A4B2FD1CF9E6DF9F47462B535A2A2D
3,206,700 UART: [art] SIG.S = E0A485ABA6AB62E71A8CD3A4D35F55E7C85AF604BB3345F565B8A16038EB7281F7287646D6C8456867902B91FB9B543C
3,231,037 UART: Caliptra RT
3,231,288 UART: [state] CFI Enabled
3,351,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,456 UART:
3,353,472 UART: Running Caliptra ROM ...
3,353,880 UART:
3,353,935 UART: [state] CFI Enabled
3,356,433 UART: [state] LifecycleState = Unprovisioned
3,357,088 UART: [state] DebugLocked = No
3,357,700 UART: [state] WD Timer not started. Device not locked for debugging
3,358,910 UART: [kat] SHA2-256
4,162,460 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,564 UART: [kat] ++
4,166,716 UART: [kat] sha1
4,170,862 UART: [kat] SHA2-256
4,172,802 UART: [kat] SHA2-384
4,175,469 UART: [kat] SHA2-512-ACC
4,177,369 UART: [kat] ECC-384
4,187,116 UART: [kat] HMAC-384Kdf
4,191,666 UART: [kat] LMS
4,439,978 UART: [kat] --
4,440,714 UART: [update-reset] ++
5,800,585 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,744 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,959 >>> mbox cmd response: success
5,957,247 writing to cptra_bootfsm_go
5,957,339 UART:
5,957,355 UART: Running Caliptra ROM ...
5,957,763 UART:
5,957,818 UART: [state] CFI Enabled
5,960,936 UART: [state] LifecycleState = Unprovisioned
5,961,591 UART: [state] DebugLocked = No
5,962,103 UART: [state] WD Timer not started. Device not locked for debugging
5,963,336 UART: [kat] SHA2-256
6,766,886 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,770,990 UART: [kat] ++
6,771,142 UART: [kat] sha1
6,775,444 UART: [kat] SHA2-256
6,777,384 UART: [kat] SHA2-384
6,780,049 UART: [kat] SHA2-512-ACC
6,781,950 UART: [kat] ECC-384
6,791,831 UART: [kat] HMAC-384Kdf
6,796,437 UART: [kat] LMS
7,044,749 UART: [kat] --
7,045,443 UART: [warm-reset] ++
7,046,144 UART: [warm-reset] Prev Update Reset failed
7,046,963 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,338 >>> mbox cmd response: success
2,733,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,739,581 UART:
2,739,597 UART: Running Caliptra FMC ...
2,740,005 UART:
2,740,059 UART: [state] CFI Enabled
2,750,463 UART: [fht] FMC Alias Private Key: 7
2,869,111 UART: [art] Extend RT PCRs Done
2,869,539 UART: [art] Lock RT PCRs Done
2,871,157 UART: [art] Populate DV Done
2,879,578 UART: [fht] FMC Alias Private Key: 7
2,880,638 UART: [art] Derive CDI
2,880,918 UART: [art] Store in slot 0x4
2,966,519 UART: [art] Derive Key Pair
2,966,879 UART: [art] Store priv key in slot 0x5
2,980,191 UART: [art] Derive Key Pair - Done
2,994,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,180 UART: [art] PUB.X = F3B6B56170A2A34345E4462983E90E8B0FFECB8F79846691BB5B84CEF8EBFCCB76BDF362875ACEC6BFB90ADCFB247005
3,017,960 UART: [art] PUB.Y = EA3D2CBBEC8B76F5157577FEBF067FEB9BAF7BC6CBF62DF98041C8699E35CD7A152402AA1ACC0B987014CE66306AF3B8
3,024,925 UART: [art] SIG.R = F54900C21B2A594926A4D394FAC4BFBFB673A3C68370DB4280CA646DA33B5DA5470660D367FA259CDA16D3234A3DBB78
3,031,680 UART: [art] SIG.S = B96273FF399408B52F26E2AB34931AC341CCE093F078630BC28A6F54F7BD83DD10B20E5788C4FD75B96178F8EEF8D1EE
3,055,671 UART: Caliptra RT
3,055,922 UART: [state] CFI Enabled
3,173,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,663,119 >>> mbox cmd response: success
5,663,333 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
891,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,549 UART: [kat] ++
895,701 UART: [kat] sha1
899,901 UART: [kat] SHA2-256
901,841 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,542 UART: [kat] HMAC-384Kdf
921,022 UART: [kat] LMS
1,169,334 UART: [kat] --
1,170,211 UART: [cold-reset] ++
1,170,789 UART: [fht] FHT @ 0x50003400
1,173,559 UART: [idev] ++
1,173,727 UART: [idev] CDI.KEYID = 6
1,174,088 UART: [idev] SUBJECT.KEYID = 7
1,174,513 UART: [idev] UDS.KEYID = 0
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,198,470 UART: [idev] Sha1 KeyId Algorithm
1,207,332 UART: [idev] --
1,208,161 UART: [ldev] ++
1,208,329 UART: [ldev] CDI.KEYID = 6
1,208,693 UART: [ldev] SUBJECT.KEYID = 5
1,209,120 UART: [ldev] AUTHORITY.KEYID = 7
1,209,583 UART: [ldev] FE.KEYID = 1
1,214,819 UART: [ldev] Erasing FE.KEYID = 1
1,241,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,669 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,629 UART: [fwproc] Recv command 0x46574c44
1,282,362 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,238 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,722 >>> mbox cmd response: success
2,826,796 UART: [afmc] ++
2,826,964 UART: [afmc] CDI.KEYID = 6
2,827,327 UART: [afmc] SUBJECT.KEYID = 7
2,827,753 UART: [afmc] AUTHORITY.KEYID = 5
2,863,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,367 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,068 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,885 UART: [afmc] --
2,906,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,906,826 UART: [cold-reset] --
2,907,576 UART: [state] Locking Datavault
2,908,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,359 UART: [state] Locking ICCM
2,909,901 UART: [exit] Launching FMC @ 0x40000130
2,915,231 UART:
2,915,247 UART: Running Caliptra FMC ...
2,915,655 UART:
2,915,798 UART: [state] CFI Enabled
2,926,656 UART: [fht] FMC Alias Private Key: 7
3,045,586 UART: [art] Extend RT PCRs Done
3,046,014 UART: [art] Lock RT PCRs Done
3,047,438 UART: [art] Populate DV Done
3,055,783 UART: [fht] FMC Alias Private Key: 7
3,056,939 UART: [art] Derive CDI
3,057,219 UART: [art] Store in slot 0x4
3,142,446 UART: [art] Derive Key Pair
3,142,806 UART: [art] Store priv key in slot 0x5
3,157,018 UART: [art] Derive Key Pair - Done
3,171,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,953 UART: [art] PUB.X = 9372F90973F59A22A8543DB42678D9FA72E6A4B031C63E3C1C38C8288CDE0339F76B998F2C9DE0B11C3428FA23FDD5C1
3,194,723 UART: [art] PUB.Y = 95467D2844C06B95025A818F9DF6B240BE0AAFF38CDDDBFFDF2B1FABF0A60F736FCCAEED1B4F415F436E8A3DCE36C4B9
3,201,696 UART: [art] SIG.R = 0B728BA88294A8E2B4D356484009D1B483113DD918879249954C4A2BE002699E7D4A45B359460019834C76CD062C3F08
3,208,415 UART: [art] SIG.S = 72C090E59478661613CBD30A237B53889FCFD455D3E18B153344A8AFA1EF95C368FECC108CF1D442EBC9276157BADF14
3,232,344 UART: Caliptra RT
3,232,687 UART: [state] CFI Enabled
3,352,703 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,673 UART:
3,354,689 UART: Running Caliptra ROM ...
3,355,097 UART:
3,355,239 UART: [state] CFI Enabled
3,358,239 UART: [state] LifecycleState = Unprovisioned
3,358,894 UART: [state] DebugLocked = No
3,359,584 UART: [state] WD Timer not started. Device not locked for debugging
3,360,834 UART: [kat] SHA2-256
4,164,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,488 UART: [kat] ++
4,168,640 UART: [kat] sha1
4,172,878 UART: [kat] SHA2-256
4,174,818 UART: [kat] SHA2-384
4,177,525 UART: [kat] SHA2-512-ACC
4,179,425 UART: [kat] ECC-384
4,189,146 UART: [kat] HMAC-384Kdf
4,193,862 UART: [kat] LMS
4,442,174 UART: [kat] --
4,443,206 UART: [update-reset] ++
5,803,211 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,804,208 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,959,423 >>> mbox cmd response: success
5,959,711 writing to cptra_bootfsm_go
5,959,803 UART:
5,959,819 UART: Running Caliptra ROM ...
5,960,227 UART:
5,960,369 UART: [state] CFI Enabled
5,963,403 UART: [state] LifecycleState = Unprovisioned
5,964,058 UART: [state] DebugLocked = No
5,964,684 UART: [state] WD Timer not started. Device not locked for debugging
5,965,955 UART: [kat] SHA2-256
6,769,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,773,609 UART: [kat] ++
6,773,761 UART: [kat] sha1
6,777,921 UART: [kat] SHA2-256
6,779,861 UART: [kat] SHA2-384
6,782,598 UART: [kat] SHA2-512-ACC
6,784,499 UART: [kat] ECC-384
6,794,016 UART: [kat] HMAC-384Kdf
6,798,452 UART: [kat] LMS
7,046,764 UART: [kat] --
7,047,658 UART: [warm-reset] ++
7,048,427 UART: [warm-reset] Prev Update Reset failed
7,049,412 UART: ROM Fatal Error: 0x01040011
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,537 >>> mbox cmd response: success
2,734,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,306 UART:
2,740,322 UART: Running Caliptra FMC ...
2,740,730 UART:
2,740,873 UART: [state] CFI Enabled
2,751,639 UART: [fht] FMC Alias Private Key: 7
2,870,057 UART: [art] Extend RT PCRs Done
2,870,485 UART: [art] Lock RT PCRs Done
2,872,055 UART: [art] Populate DV Done
2,880,338 UART: [fht] FMC Alias Private Key: 7
2,881,486 UART: [art] Derive CDI
2,881,766 UART: [art] Store in slot 0x4
2,967,649 UART: [art] Derive Key Pair
2,968,009 UART: [art] Store priv key in slot 0x5
2,981,345 UART: [art] Derive Key Pair - Done
2,996,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,292 UART: [art] PUB.X = D5DE7AEE4A1634CF4C96FD36D414C66C6F7C4A0D5A0196EEE14ADC9D20F005D4AD5BB725AA23833F08522294F7EED6F2
3,019,070 UART: [art] PUB.Y = B5582316D7F7B442786B8D3570F914A6C841236F3FE1BF56D5FC16B6C7F75E4FEE2C8F5C832C4ABE764FE96405D46D31
3,026,025 UART: [art] SIG.R = AC858BADA8A7874D8373CBC754CE15D95C48568AAA635CD41C26267133AD6668761F27A7DF8A492637F7BE404D274A53
3,032,799 UART: [art] SIG.S = F465D446FD68C2053F94F1CB3F2FF3CB30CC193E0E2D7441ECD453B99ED5425CCBE4D0B3C6D8169AABF34AB70C895B39
3,056,390 UART: Caliptra RT
3,056,733 UART: [state] CFI Enabled
3,176,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,666,043 >>> mbox cmd response: success
5,666,127 writing to cptra_bootfsm_go
test test_warm_reset::test_warm_reset_during_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,519 UART:
191,882 UART: Running Caliptra ROM ...
192,975 UART:
193,125 UART: [state] CFI Enabled
263,882 UART: [state] LifecycleState = Production
265,705 UART: [state] DebugLocked = Yes
268,690 UART: [state] Starting the WD Timer 40000000 cycles
273,724 UART: [kat] SHA2-256
453,332 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,171 UART: [kat] ++
464,637 UART: [kat] sha1
474,124 UART: [kat] SHA2-256
476,783 UART: [kat] SHA2-384
481,354 UART: [kat] SHA2-512-ACC
483,722 UART: [kat] ECC-384
2,950,285 UART: [kat] HMAC-384Kdf
2,971,491 UART: [kat] LMS
3,447,939 UART: [kat] --
3,452,953 UART: [cold-reset] ++
3,455,461 UART: [fht] FHT @ 0x50003400
3,466,321 UART: [idev] ++
3,466,934 UART: [idev] CDI.KEYID = 6
3,467,869 UART: [idev] SUBJECT.KEYID = 7
3,469,124 UART: [idev] UDS.KEYID = 0
3,470,054 ready_for_fw is high
3,470,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,218 UART: [idev] Erasing UDS.KEYID = 0
5,985,590 UART: [idev] Sha1 KeyId Algorithm
6,007,615 UART: [idev] --
6,013,070 UART: [ldev] ++
6,013,648 UART: [ldev] CDI.KEYID = 6
6,014,566 UART: [ldev] SUBJECT.KEYID = 5
6,015,785 UART: [ldev] AUTHORITY.KEYID = 7
6,017,080 UART: [ldev] FE.KEYID = 1
6,057,454 UART: [ldev] Erasing FE.KEYID = 1
8,566,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,128 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,314,910 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,330,781 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,346,609 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,368,471 UART: [ldev] --
10,373,425 UART: [fwproc] Wait for Commands...
10,375,492 UART: [fwproc] Recv command 0x46574c44
10,377,480 UART: [fwproc] Recv'd Img size: 118548 bytes
13,891,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,970,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,043,396 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,370,832 >>> mbox cmd response: success
14,375,752 UART: [afmc] ++
14,376,346 UART: [afmc] CDI.KEYID = 6
14,377,370 UART: [afmc] SUBJECT.KEYID = 7
14,378,530 UART: [afmc] AUTHORITY.KEYID = 5
16,916,510 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,447 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,657,363 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,673,403 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,688,971 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,712,059 UART: [afmc] --
18,716,046 UART: [cold-reset] --
18,720,083 UART: [state] Locking Datavault
18,726,202 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,961 UART: [state] Locking ICCM
18,729,143 UART: [exit] Launching FMC @ 0x40000130
18,737,544 UART:
18,737,790 UART: Running Caliptra FMC ...
18,738,896 UART:
18,739,063 UART: [state] CFI Enabled
18,797,707 UART: [fht] FMC Alias Private Key: 7
20,563,850 UART: [art] Extend RT PCRs Done
20,565,072 UART: [art] Lock RT PCRs Done
20,567,194 UART: [art] Populate DV Done
20,572,816 UART: [fht] FMC Alias Private Key: 7
20,574,299 UART: [art] Derive CDI
20,575,081 UART: [art] Store in slot 0x4
20,630,294 UART: [art] Derive Key Pair
20,631,332 UART: [art] Store priv key in slot 0x5
23,094,286 UART: [art] Derive Key Pair - Done
23,107,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,406 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,038 UART: [art] PUB.X = F7F370430547B8093F68A6265117BDC4AB1439B647B2A4AECADCBF4E04DD8A67AF328077FA7989F40ADB1B54593F9A21
24,829,196 UART: [art] PUB.Y = 97DDAB1BBBBEA70B697603A8FCD615DAA8A7D57FAE657151F8A8F3C33E3FBDBB8714D3D3E2DCFB3CFA493361E268496A
24,836,498 UART: [art] SIG.R = 7FB1378BF6C22F64708A05C57D4758C3355959159801963BF2140F46D3ADA420409A916C8515865F49450B04F665556B
24,843,806 UART: [art] SIG.S = 077FCBD8674142E0810187B9A9B547BBD34D5444D464F635275E47F02305942CB6207CD989F9ACB6B53D7A2B866C76D4
25,823,569 UART: Caliptra RT
25,824,270 UART: [state] CFI Enabled
26,004,677 UART: [rt] RT listening for mailbox commands...
304 writing to cptra_bootfsm_go
572 UART:
720 UART: Running Caliptra ROM ...
1,844 UART:
2,006 UART: [state] CFI Enabled
68,856 UART: [state] LifecycleState = Production
70,621 UART: [state] DebugLocked = Yes
73,174 UART: [state] Starting the WD Timer 40000000 cycles
77,850 UART: [kat] SHA2-256
257,506 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
268,292 UART: [kat] ++
268,880 UART: [kat] sha1
280,364 UART: [kat] SHA2-256
283,051 UART: [kat] SHA2-384
289,082 UART: [kat] SHA2-512-ACC
291,424 UART: [kat] ECC-384
2,753,193 UART: [kat] HMAC-384Kdf
2,776,818 UART: [kat] LMS
3,253,247 UART: [kat] --
3,257,363 UART: [warm-reset] ++
3,264,431 UART: [warm-reset] --
3,268,026 UART: [state] Locking Datavault
3,271,016 UART: [state] Locking PCR0, PCR1 and PCR31
3,272,778 UART: [state] Locking ICCM
3,273,964 UART: [exit] Launching FMC @ 0x40000130
3,282,363 UART:
3,282,611 UART: Running Caliptra FMC ...
3,283,721 UART:
3,283,892 UART: [state] CFI Enabled
3,343,022 UART: [art] Skip pcr extension
3,344,174 UART: [art] Extend RT PCRs Done
3,345,329 UART: [art] Lock RT PCRs Done
3,346,781 UART: [art] Populate DV Done
3,352,084 UART: [fht] FMC Alias Private Key: 7
3,353,678 UART: [art] Derive CDI
3,354,517 UART: [art] Store in slot 0x4
3,411,454 UART: [art] Derive Key Pair
3,412,496 UART: [art] Store priv key in slot 0x5
5,875,293 UART: [art] Derive Key Pair - Done
5,888,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,601,204 UART: [art] Erasing AUTHORITY.KEYID = 7
7,602,715 UART: [art] PUB.X = F7F370430547B8093F68A6265117BDC4AB1439B647B2A4AECADCBF4E04DD8A67AF328077FA7989F40ADB1B54593F9A21
7,609,975 UART: [art] PUB.Y = 97DDAB1BBBBEA70B697603A8FCD615DAA8A7D57FAE657151F8A8F3C33E3FBDBB8714D3D3E2DCFB3CFA493361E268496A
7,617,244 UART: [art] SIG.R = 7FB1378BF6C22F64708A05C57D4758C3355959159801963BF2140F46D3ADA420409A916C8515865F49450B04F665556B
7,624,612 UART: [art] SIG.S = 077FCBD8674142E0810187B9A9B547BBD34D5444D464F635275E47F02305942CB6207CD989F9ACB6B53D7A2B866C76D4
8,603,842 UART: Caliptra RT
8,604,563 UART: [state] CFI Enabled
9,026,570 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
191,553 UART:
191,928 UART: Running Caliptra ROM ...
193,123 UART:
193,282 UART: [state] CFI Enabled
261,076 UART: [state] LifecycleState = Production
262,908 UART: [state] DebugLocked = Yes
264,521 UART: [state] Starting the WD Timer 40000000 cycles
270,129 UART: [kat] SHA2-256
449,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,609 UART: [kat] ++
461,059 UART: [kat] sha1
471,829 UART: [kat] SHA2-256
474,489 UART: [kat] SHA2-384
479,488 UART: [kat] SHA2-512-ACC
481,862 UART: [kat] ECC-384
2,929,652 UART: [kat] HMAC-384Kdf
2,950,906 UART: [kat] LMS
3,427,420 UART: [kat] --
3,432,650 UART: [cold-reset] ++
3,433,812 UART: [fht] FHT @ 0x50003400
3,445,432 UART: [idev] ++
3,446,001 UART: [idev] CDI.KEYID = 6
3,447,042 UART: [idev] SUBJECT.KEYID = 7
3,448,229 UART: [idev] UDS.KEYID = 0
3,449,161 ready_for_fw is high
3,449,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,437 UART: [idev] Erasing UDS.KEYID = 0
5,969,880 UART: [idev] Sha1 KeyId Algorithm
5,994,771 UART: [idev] --
5,998,549 UART: [ldev] ++
5,999,178 UART: [ldev] CDI.KEYID = 6
6,000,093 UART: [ldev] SUBJECT.KEYID = 5
6,001,267 UART: [ldev] AUTHORITY.KEYID = 7
6,002,584 UART: [ldev] FE.KEYID = 1
6,037,929 UART: [ldev] Erasing FE.KEYID = 1
8,543,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,235 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,296,097 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,311,927 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,327,700 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,348,821 UART: [ldev] --
10,353,643 UART: [fwproc] Wait for Commands...
10,356,075 UART: [fwproc] Recv command 0x46574c44
10,358,076 UART: [fwproc] Recv'd Img size: 118548 bytes
13,875,406 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,358,261 >>> mbox cmd response: success
14,362,746 UART: [afmc] ++
14,363,365 UART: [afmc] CDI.KEYID = 6
14,364,286 UART: [afmc] SUBJECT.KEYID = 7
14,365,511 UART: [afmc] AUTHORITY.KEYID = 5
16,900,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,159 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,661,048 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,677,116 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,692,664 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,716,986 UART: [afmc] --
18,719,924 UART: [cold-reset] --
18,724,273 UART: [state] Locking Datavault
18,730,990 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,695 UART: [state] Locking ICCM
18,734,310 UART: [exit] Launching FMC @ 0x40000130
18,742,714 UART:
18,742,977 UART: Running Caliptra FMC ...
18,744,293 UART:
18,744,475 UART: [state] CFI Enabled
18,800,570 UART: [fht] FMC Alias Private Key: 7
20,566,713 UART: [art] Extend RT PCRs Done
20,567,938 UART: [art] Lock RT PCRs Done
20,569,599 UART: [art] Populate DV Done
20,575,069 UART: [fht] FMC Alias Private Key: 7
20,576,668 UART: [art] Derive CDI
20,577,410 UART: [art] Store in slot 0x4
20,632,669 UART: [art] Derive Key Pair
20,633,717 UART: [art] Store priv key in slot 0x5
23,096,735 UART: [art] Derive Key Pair - Done
23,109,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,131 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,636 UART: [art] PUB.X = 41FF8084CF935B037C22EC90B5539B66EB14590823035689E3332F45596B1019C6B33BC397E6187230D190847F1C9B00
24,830,866 UART: [art] PUB.Y = BFAA3C3AC5FF2298FA13CBD01BBD71B20875937CB11A97429E9F1DD31D482DAC771E309994C21350ABDF6E54AABE0E6E
24,838,111 UART: [art] SIG.R = 492756A12182DFFBF9E57D5D5710FAA118E2ACBC5BE0E279C767737DBEB792EB927FA1FC97B1D5E0242C60E3EC189C9C
24,845,566 UART: [art] SIG.S = FCF67EAD5539A1DC6B102FB645CCFDC606E1C91D593A590CCA22DDA3099C3004255126BC41CA400F310535B3C576B99D
25,824,869 UART: Caliptra RT
25,825,562 UART: [state] CFI Enabled
26,006,178 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
549 UART:
698 UART: Running Caliptra ROM ...
1,795 UART:
1,958 UART: [state] CFI Enabled
73,564 UART: [state] LifecycleState = Production
75,391 UART: [state] DebugLocked = Yes
77,196 UART: [state] Starting the WD Timer 40000000 cycles
82,733 UART: [kat] SHA2-256
262,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
273,229 UART: [kat] ++
273,684 UART: [kat] sha1
286,135 UART: [kat] SHA2-256
288,826 UART: [kat] SHA2-384
294,641 UART: [kat] SHA2-512-ACC
297,032 UART: [kat] ECC-384
2,752,864 UART: [kat] HMAC-384Kdf
2,776,457 UART: [kat] LMS
3,252,933 UART: [kat] --
3,257,662 UART: [warm-reset] ++
3,261,765 UART: [warm-reset] --
3,265,688 UART: [state] Locking Datavault
3,269,170 UART: [state] Locking PCR0, PCR1 and PCR31
3,270,882 UART: [state] Locking ICCM
3,272,665 UART: [exit] Launching FMC @ 0x40000130
3,281,019 UART:
3,281,284 UART: Running Caliptra FMC ...
3,282,392 UART:
3,282,561 UART: [state] CFI Enabled
3,343,394 UART: [art] Skip pcr extension
3,344,553 UART: [art] Extend RT PCRs Done
3,345,711 UART: [art] Lock RT PCRs Done
3,346,902 UART: [art] Populate DV Done
3,352,378 UART: [fht] FMC Alias Private Key: 7
3,353,871 UART: [art] Derive CDI
3,354,643 UART: [art] Store in slot 0x4
3,412,229 UART: [art] Derive Key Pair
3,413,272 UART: [art] Store priv key in slot 0x5
5,875,649 UART: [art] Derive Key Pair - Done
5,888,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,601,061 UART: [art] Erasing AUTHORITY.KEYID = 7
7,602,579 UART: [art] PUB.X = 41FF8084CF935B037C22EC90B5539B66EB14590823035689E3332F45596B1019C6B33BC397E6187230D190847F1C9B00
7,609,809 UART: [art] PUB.Y = BFAA3C3AC5FF2298FA13CBD01BBD71B20875937CB11A97429E9F1DD31D482DAC771E309994C21350ABDF6E54AABE0E6E
7,617,071 UART: [art] SIG.R = 492756A12182DFFBF9E57D5D5710FAA118E2ACBC5BE0E279C767737DBEB792EB927FA1FC97B1D5E0242C60E3EC189C9C
7,624,492 UART: [art] SIG.S = FCF67EAD5539A1DC6B102FB645CCFDC606E1C91D593A590CCA22DDA3099C3004255126BC41CA400F310535B3C576B99D
8,603,060 UART: Caliptra RT
8,603,778 UART: [state] CFI Enabled
9,025,443 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
191,825 UART:
192,183 UART: Running Caliptra ROM ...
193,373 UART:
602,987 UART: [state] CFI Enabled
616,429 UART: [state] LifecycleState = Production
618,284 UART: [state] DebugLocked = Yes
619,925 UART: [state] Starting the WD Timer 40000000 cycles
625,439 UART: [kat] SHA2-256
805,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,891 UART: [kat] ++
816,352 UART: [kat] sha1
828,601 UART: [kat] SHA2-256
831,326 UART: [kat] SHA2-384
836,533 UART: [kat] SHA2-512-ACC
838,896 UART: [kat] ECC-384
3,281,115 UART: [kat] HMAC-384Kdf
3,292,736 UART: [kat] LMS
3,769,245 UART: [kat] --
3,775,102 UART: [cold-reset] ++
3,777,181 UART: [fht] FHT @ 0x50003400
3,789,932 UART: [idev] ++
3,790,503 UART: [idev] CDI.KEYID = 6
3,791,494 UART: [idev] SUBJECT.KEYID = 7
3,792,734 UART: [idev] UDS.KEYID = 0
3,793,657 ready_for_fw is high
3,793,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,073 UART: [idev] Erasing UDS.KEYID = 0
6,268,133 UART: [idev] Sha1 KeyId Algorithm
6,290,805 UART: [idev] --
6,295,605 UART: [ldev] ++
6,296,169 UART: [ldev] CDI.KEYID = 6
6,297,102 UART: [ldev] SUBJECT.KEYID = 5
6,298,306 UART: [ldev] AUTHORITY.KEYID = 7
6,299,589 UART: [ldev] FE.KEYID = 1
6,311,861 UART: [ldev] Erasing FE.KEYID = 1
8,792,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,518 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,529,358 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,545,207 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,560,929 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,583,322 UART: [ldev] --
10,589,018 UART: [fwproc] Wait for Commands...
10,591,079 UART: [fwproc] Recv command 0x46574c44
10,593,119 UART: [fwproc] Recv'd Img size: 118548 bytes
14,109,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,193,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,266,473 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,593,914 >>> mbox cmd response: success
14,597,250 UART: [afmc] ++
14,597,893 UART: [afmc] CDI.KEYID = 6
14,598,798 UART: [afmc] SUBJECT.KEYID = 7
14,600,010 UART: [afmc] AUTHORITY.KEYID = 5
17,104,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,827,787 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,830,022 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,845,902 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,861,945 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,877,524 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,903,248 UART: [afmc] --
18,906,235 UART: [cold-reset] --
18,909,773 UART: [state] Locking Datavault
18,914,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,915,901 UART: [state] Locking ICCM
18,918,639 UART: [exit] Launching FMC @ 0x40000130
18,927,034 UART:
18,927,276 UART: Running Caliptra FMC ...
18,928,378 UART:
18,928,541 UART: [state] CFI Enabled
18,936,799 UART: [fht] FMC Alias Private Key: 7
20,702,312 UART: [art] Extend RT PCRs Done
20,703,666 UART: [art] Lock RT PCRs Done
20,705,178 UART: [art] Populate DV Done
20,710,701 UART: [fht] FMC Alias Private Key: 7
20,712,292 UART: [art] Derive CDI
20,713,121 UART: [art] Store in slot 0x4
20,755,825 UART: [art] Derive Key Pair
20,756,823 UART: [art] Store priv key in slot 0x5
23,183,308 UART: [art] Derive Key Pair - Done
23,196,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,902,594 UART: [art] Erasing AUTHORITY.KEYID = 7
24,904,105 UART: [art] PUB.X = D6EC3AB144AA04AE72563EEC6CF9652094C33686ED079D9205DBDBCB24B1823D306BB739DFB85C15CD075CC44747F85E
24,911,399 UART: [art] PUB.Y = E1B2C07C08B0C8656378D224428E8E70CE8EABF5B815013A9CB71A6D7789F8A90B3B229F93767E740B6ADCB8205D8801
24,918,619 UART: [art] SIG.R = 194F88EA2A36CE139C724065AD321477453CD57C25CD808A68B53C16EB4E33444196FEC3B6D463C3E4C6CACD693BBA83
24,926,016 UART: [art] SIG.S = 0447F4D546C0FF8F7F94D8BCD7134E5F3659663BC5F63EE40A11203ADF4D58376305F641CEE945F3B487DFAC408DB7DF
25,905,314 UART: Caliptra RT
25,906,001 UART: [state] CFI Enabled
26,039,572 UART: [rt] RT listening for mailbox commands...
296 writing to cptra_bootfsm_go
661 UART:
813 UART: Running Caliptra ROM ...
1,922 UART:
14,488,354 UART: [state] CFI Enabled
14,500,879 UART: [state] LifecycleState = Production
14,502,659 UART: [state] DebugLocked = Yes
14,505,005 UART: [state] Starting the WD Timer 40000000 cycles
14,509,312 UART: [kat] SHA2-256
14,689,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,699,812 UART: [kat] ++
14,700,268 UART: [kat] sha1
14,713,091 UART: [kat] SHA2-256
14,715,777 UART: [kat] SHA2-384
14,720,465 UART: [kat] SHA2-512-ACC
14,722,861 UART: [kat] ECC-384
17,167,396 UART: [kat] HMAC-384Kdf
17,180,106 UART: [kat] LMS
17,656,577 UART: [kat] --
17,660,496 UART: [warm-reset] ++
17,666,051 UART: [warm-reset] --
17,668,995 UART: [state] Locking Datavault
17,672,686 UART: [state] Locking PCR0, PCR1 and PCR31
17,674,442 UART: [state] Locking ICCM
17,675,617 UART: [exit] Launching FMC @ 0x40000130
17,684,011 UART:
17,684,250 UART: Running Caliptra FMC ...
17,685,344 UART:
17,685,498 UART: [state] CFI Enabled
17,687,389 UART: [art] Skip pcr extension
17,688,485 UART: [art] Extend RT PCRs Done
17,689,620 UART: [art] Lock RT PCRs Done
17,690,843 UART: [art] Populate DV Done
17,696,242 UART: [fht] FMC Alias Private Key: 7
17,697,933 UART: [art] Derive CDI
17,698,760 UART: [art] Store in slot 0x4
17,741,312 UART: [art] Derive Key Pair
17,742,355 UART: [art] Store priv key in slot 0x5
20,168,772 UART: [art] Derive Key Pair - Done
20,181,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,888,484 UART: [art] Erasing AUTHORITY.KEYID = 7
21,889,994 UART: [art] PUB.X = D6EC3AB144AA04AE72563EEC6CF9652094C33686ED079D9205DBDBCB24B1823D306BB739DFB85C15CD075CC44747F85E
21,897,294 UART: [art] PUB.Y = E1B2C07C08B0C8656378D224428E8E70CE8EABF5B815013A9CB71A6D7789F8A90B3B229F93767E740B6ADCB8205D8801
21,904,562 UART: [art] SIG.R = 194F88EA2A36CE139C724065AD321477453CD57C25CD808A68B53C16EB4E33444196FEC3B6D463C3E4C6CACD693BBA83
21,911,945 UART: [art] SIG.S = 0447F4D546C0FF8F7F94D8BCD7134E5F3659663BC5F63EE40A11203ADF4D58376305F641CEE945F3B487DFAC408DB7DF
22,891,131 UART: Caliptra RT
22,892,493 UART: [state] CFI Enabled
23,266,711 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
191,801 UART:
192,159 UART: Running Caliptra ROM ...
193,357 UART:
603,067 UART: [state] CFI Enabled
617,782 UART: [state] LifecycleState = Production
619,561 UART: [state] DebugLocked = Yes
622,297 UART: [state] Starting the WD Timer 40000000 cycles
626,334 UART: [kat] SHA2-256
806,000 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,769 UART: [kat] ++
817,284 UART: [kat] sha1
826,987 UART: [kat] SHA2-256
829,747 UART: [kat] SHA2-384
836,103 UART: [kat] SHA2-512-ACC
838,471 UART: [kat] ECC-384
3,279,200 UART: [kat] HMAC-384Kdf
3,291,006 UART: [kat] LMS
3,767,502 UART: [kat] --
3,772,866 UART: [cold-reset] ++
3,774,090 UART: [fht] FHT @ 0x50003400
3,785,585 UART: [idev] ++
3,786,187 UART: [idev] CDI.KEYID = 6
3,787,128 UART: [idev] SUBJECT.KEYID = 7
3,788,308 UART: [idev] UDS.KEYID = 0
3,789,361 ready_for_fw is high
3,789,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,270 UART: [idev] Erasing UDS.KEYID = 0
6,262,438 UART: [idev] Sha1 KeyId Algorithm
6,286,013 UART: [idev] --
6,291,745 UART: [ldev] ++
6,292,371 UART: [ldev] CDI.KEYID = 6
6,293,250 UART: [ldev] SUBJECT.KEYID = 5
6,294,513 UART: [ldev] AUTHORITY.KEYID = 7
6,295,744 UART: [ldev] FE.KEYID = 1
6,305,846 UART: [ldev] Erasing FE.KEYID = 1
8,785,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,897 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,522,673 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,538,560 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,554,282 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,577,111 UART: [ldev] --
10,583,409 UART: [fwproc] Wait for Commands...
10,585,983 UART: [fwproc] Recv command 0x46574c44
10,587,977 UART: [fwproc] Recv'd Img size: 118548 bytes
14,104,576 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,256,477 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,584,904 >>> mbox cmd response: success
14,588,922 UART: [afmc] ++
14,589,515 UART: [afmc] CDI.KEYID = 6
14,590,481 UART: [afmc] SUBJECT.KEYID = 7
14,591,689 UART: [afmc] AUTHORITY.KEYID = 5
17,097,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,820,561 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,822,917 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,838,626 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,854,677 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,870,239 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,894,858 UART: [afmc] --
18,898,281 UART: [cold-reset] --
18,902,576 UART: [state] Locking Datavault
18,908,716 UART: [state] Locking PCR0, PCR1 and PCR31
18,910,433 UART: [state] Locking ICCM
18,912,908 UART: [exit] Launching FMC @ 0x40000130
18,921,351 UART:
18,921,586 UART: Running Caliptra FMC ...
18,922,688 UART:
18,922,846 UART: [state] CFI Enabled
18,931,349 UART: [fht] FMC Alias Private Key: 7
20,697,416 UART: [art] Extend RT PCRs Done
20,698,652 UART: [art] Lock RT PCRs Done
20,700,331 UART: [art] Populate DV Done
20,705,630 UART: [fht] FMC Alias Private Key: 7
20,707,279 UART: [art] Derive CDI
20,708,095 UART: [art] Store in slot 0x4
20,750,806 UART: [art] Derive Key Pair
20,751,843 UART: [art] Store priv key in slot 0x5
23,178,643 UART: [art] Derive Key Pair - Done
23,191,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,897,837 UART: [art] Erasing AUTHORITY.KEYID = 7
24,899,341 UART: [art] PUB.X = 2F16EE1F79171FC822CB6C230B400BB56B447D4121C8C2F732D4BE58AEEFC4C63B6232B0E9F93B042FD461BB738BAA63
24,906,673 UART: [art] PUB.Y = 6A34C90A66A34C00365098E5CF962A50B3A26DBF4CE0FD87F3DDB908D7F7F7A8B43BD086018BEC361FE8CD5A9B8CEBB8
24,913,875 UART: [art] SIG.R = 1FF92BB172AC079BC42ED8C97B557847A2BBE97C1397398EC8829E92F357FC914FD9918128AD2C5F4BB627702E61DBAF
24,921,272 UART: [art] SIG.S = 9CD03EF4D824BA3A4065A2976F16C5F36D72C88FED77C18DAB69FE1EE2A48F3F6CA3B6EBDD333FAB1483ADBC78C9497E
25,900,115 UART: Caliptra RT
25,900,827 UART: [state] CFI Enabled
26,033,476 UART: [rt] RT listening for mailbox commands...
295 writing to cptra_bootfsm_go
554 UART:
698 UART: Running Caliptra ROM ...
1,917 UART:
14,494,146 UART: [state] CFI Enabled
14,511,504 UART: [state] LifecycleState = Production
14,513,313 UART: [state] DebugLocked = Yes
14,516,168 UART: [state] Starting the WD Timer 40000000 cycles
14,521,432 UART: [kat] SHA2-256
14,701,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,711,913 UART: [kat] ++
14,712,373 UART: [kat] sha1
14,722,872 UART: [kat] SHA2-256
14,725,607 UART: [kat] SHA2-384
14,731,425 UART: [kat] SHA2-512-ACC
14,733,785 UART: [kat] ECC-384
17,176,357 UART: [kat] HMAC-384Kdf
17,189,439 UART: [kat] LMS
17,665,915 UART: [kat] --
17,669,942 UART: [warm-reset] ++
17,674,766 UART: [warm-reset] --
17,680,574 UART: [state] Locking Datavault
17,682,318 UART: [state] Locking PCR0, PCR1 and PCR31
17,684,067 UART: [state] Locking ICCM
17,685,138 UART: [exit] Launching FMC @ 0x40000130
17,693,530 UART:
17,693,762 UART: Running Caliptra FMC ...
17,694,857 UART:
17,695,011 UART: [state] CFI Enabled
17,696,952 UART: [art] Skip pcr extension
17,698,049 UART: [art] Extend RT PCRs Done
17,699,206 UART: [art] Lock RT PCRs Done
17,700,271 UART: [art] Populate DV Done
17,706,052 UART: [fht] FMC Alias Private Key: 7
17,707,695 UART: [art] Derive CDI
17,708,507 UART: [art] Store in slot 0x4
17,751,265 UART: [art] Derive Key Pair
17,752,297 UART: [art] Store priv key in slot 0x5
20,178,724 UART: [art] Derive Key Pair - Done
20,191,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,898,112 UART: [art] Erasing AUTHORITY.KEYID = 7
21,899,619 UART: [art] PUB.X = 2F16EE1F79171FC822CB6C230B400BB56B447D4121C8C2F732D4BE58AEEFC4C63B6232B0E9F93B042FD461BB738BAA63
21,907,114 UART: [art] PUB.Y = 6A34C90A66A34C00365098E5CF962A50B3A26DBF4CE0FD87F3DDB908D7F7F7A8B43BD086018BEC361FE8CD5A9B8CEBB8
21,914,188 UART: [art] SIG.R = 1FF92BB172AC079BC42ED8C97B557847A2BBE97C1397398EC8829E92F357FC914FD9918128AD2C5F4BB627702E61DBAF
21,921,596 UART: [art] SIG.S = 9CD03EF4D824BA3A4065A2976F16C5F36D72C88FED77C18DAB69FE1EE2A48F3F6CA3B6EBDD333FAB1483ADBC78C9497E
22,900,517 UART: Caliptra RT
22,901,203 UART: [state] CFI Enabled
23,277,234 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,763 UART: [state] LifecycleState = Production
85,371 UART: [state] DebugLocked = Yes
86,079 UART: [state] Starting the WD Timer 40000000 cycles
87,714 UART: [kat] SHA2-256
891,264 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,368 UART: [kat] ++
895,520 UART: [kat] sha1
899,918 UART: [kat] SHA2-256
901,858 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,245 UART: [kat] LMS
1,168,557 UART: [kat] --
1,169,218 UART: [cold-reset] ++
1,169,757 UART: [fht] FHT @ 0x50003400
1,172,463 UART: [idev] ++
1,172,631 UART: [idev] CDI.KEYID = 6
1,172,992 UART: [idev] SUBJECT.KEYID = 7
1,173,417 UART: [idev] UDS.KEYID = 0
1,173,763 ready_for_fw is high
1,173,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,441 UART: [idev] Erasing UDS.KEYID = 0
1,198,322 UART: [idev] Sha1 KeyId Algorithm
1,207,157 UART: [idev] --
1,208,290 UART: [ldev] ++
1,208,458 UART: [ldev] CDI.KEYID = 6
1,208,822 UART: [ldev] SUBJECT.KEYID = 5
1,209,249 UART: [ldev] AUTHORITY.KEYID = 7
1,209,712 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,997 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,691 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,561 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,267 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,281 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,363 UART: [fwproc] Recv command 0x46574c44
1,282,096 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,714 >>> mbox cmd response: success
2,851,777 UART: [afmc] ++
2,851,945 UART: [afmc] CDI.KEYID = 6
2,852,308 UART: [afmc] SUBJECT.KEYID = 7
2,852,734 UART: [afmc] AUTHORITY.KEYID = 5
2,887,859 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,751 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,467 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,350 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,055 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,619 UART: [afmc] --
2,930,577 UART: [cold-reset] --
2,931,325 UART: [state] Locking Datavault
2,932,300 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,904 UART: [state] Locking ICCM
2,933,372 UART: [exit] Launching FMC @ 0x40000130
2,938,702 UART:
2,938,718 UART: Running Caliptra FMC ...
2,939,126 UART:
2,939,180 UART: [state] CFI Enabled
2,949,276 UART: [fht] FMC Alias Private Key: 7
3,067,949 UART: [art] Extend RT PCRs Done
3,068,377 UART: [art] Lock RT PCRs Done
3,070,093 UART: [art] Populate DV Done
3,078,121 UART: [fht] FMC Alias Private Key: 7
3,079,229 UART: [art] Derive CDI
3,079,509 UART: [art] Store in slot 0x4
3,165,249 UART: [art] Derive Key Pair
3,165,609 UART: [art] Store priv key in slot 0x5
3,178,876 UART: [art] Derive Key Pair - Done
3,193,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,393 UART: [art] PUB.X = 1638472F951F97A50EF5CF34FBA321F17094DC0F899728CECADF77DDC50B2CD336E18783BBC190277207F9EFBB0289F8
3,217,158 UART: [art] PUB.Y = F69DF55EBD672DDC87B096C92DD712A2460842B425E6D3CB8C2751FF826A352AA6F9C1FE9845365232F1044677C4C1A4
3,224,106 UART: [art] SIG.R = 900FF1466AF653D99788EF025898095E05DEE692C1390701FED306A0E424CBF6B62632821F552D227E3A7C5E28F773A7
3,230,851 UART: [art] SIG.S = 85A1ECBFE938BB610CBC748E6DA980E015ED47D0803B10AD5FE3A28CD7D3781177BAE629A1703F6E527B219DA74D4773
3,254,344 UART: Caliptra RT
3,254,595 UART: [state] CFI Enabled
3,374,683 UART: [rt] RT listening for mailbox commands...
3,375,347 writing to cptra_bootfsm_go
3,375,439 UART:
3,375,455 UART: Running Caliptra ROM ...
3,375,863 UART:
3,375,918 UART: [state] CFI Enabled
3,378,453 UART: [state] LifecycleState = Production
3,379,061 UART: [state] DebugLocked = Yes
3,379,723 UART: [state] Starting the WD Timer 40000000 cycles
3,381,436 UART: [kat] SHA2-256
4,184,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,090 UART: [kat] ++
4,189,242 UART: [kat] sha1
4,193,356 UART: [kat] SHA2-256
4,195,296 UART: [kat] SHA2-384
4,198,047 UART: [kat] SHA2-512-ACC
4,199,948 UART: [kat] ECC-384
4,209,719 UART: [kat] HMAC-384Kdf
4,214,267 UART: [kat] LMS
4,462,579 UART: [kat] --
4,463,269 UART: [warm-reset] ++
4,464,222 UART: [warm-reset] --
4,465,023 UART: [state] Locking Datavault
4,465,725 UART: [state] Locking PCR0, PCR1 and PCR31
4,466,329 UART: [state] Locking ICCM
4,466,891 UART: [exit] Launching FMC @ 0x40000130
4,472,221 UART:
4,472,237 UART: Running Caliptra FMC ...
4,472,645 UART:
4,472,699 UART: [state] CFI Enabled
4,474,092 UART: [art] Skip pcr extension
4,474,501 UART: [art] Extend RT PCRs Done
4,474,929 UART: [art] Lock RT PCRs Done
4,476,244 UART: [art] Populate DV Done
4,484,552 UART: [fht] FMC Alias Private Key: 7
4,485,672 UART: [art] Derive CDI
4,485,952 UART: [art] Store in slot 0x4
4,571,626 UART: [art] Derive Key Pair
4,571,986 UART: [art] Store priv key in slot 0x5
4,584,947 UART: [art] Derive Key Pair - Done
4,599,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,615,283 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,048 UART: [art] PUB.X = 1638472F951F97A50EF5CF34FBA321F17094DC0F899728CECADF77DDC50B2CD336E18783BBC190277207F9EFBB0289F8
4,622,813 UART: [art] PUB.Y = F69DF55EBD672DDC87B096C92DD712A2460842B425E6D3CB8C2751FF826A352AA6F9C1FE9845365232F1044677C4C1A4
4,629,761 UART: [art] SIG.R = 900FF1466AF653D99788EF025898095E05DEE692C1390701FED306A0E424CBF6B62632821F552D227E3A7C5E28F773A7
4,636,506 UART: [art] SIG.S = 85A1ECBFE938BB610CBC748E6DA980E015ED47D0803B10AD5FE3A28CD7D3781177BAE629A1703F6E527B219DA74D4773
4,659,871 UART: Caliptra RT
4,660,122 UART: [state] CFI Enabled
5,026,951 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Production
85,787 UART: [state] DebugLocked = Yes
86,353 UART: [state] Starting the WD Timer 40000000 cycles
87,852 UART: [kat] SHA2-256
891,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,506 UART: [kat] ++
895,658 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,791 UART: [kat] SHA2-512-ACC
906,692 UART: [kat] ECC-384
916,495 UART: [kat] HMAC-384Kdf
921,089 UART: [kat] LMS
1,169,401 UART: [kat] --
1,170,448 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,481 UART: [idev] ++
1,173,649 UART: [idev] CDI.KEYID = 6
1,174,010 UART: [idev] SUBJECT.KEYID = 7
1,174,435 UART: [idev] UDS.KEYID = 0
1,174,781 ready_for_fw is high
1,174,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,807 UART: [idev] Erasing UDS.KEYID = 0
1,199,900 UART: [idev] Sha1 KeyId Algorithm
1,208,799 UART: [idev] --
1,209,854 UART: [ldev] ++
1,210,022 UART: [ldev] CDI.KEYID = 6
1,210,386 UART: [ldev] SUBJECT.KEYID = 5
1,210,813 UART: [ldev] AUTHORITY.KEYID = 7
1,211,276 UART: [ldev] FE.KEYID = 1
1,216,172 UART: [ldev] Erasing FE.KEYID = 1
1,242,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,835 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,529 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,399 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,105 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,101 UART: [ldev] --
1,281,384 UART: [fwproc] Wait for Commands...
1,281,963 UART: [fwproc] Recv command 0x46574c44
1,282,696 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,917 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,662 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,996 >>> mbox cmd response: success
2,853,219 UART: [afmc] ++
2,853,387 UART: [afmc] CDI.KEYID = 6
2,853,750 UART: [afmc] SUBJECT.KEYID = 7
2,854,176 UART: [afmc] AUTHORITY.KEYID = 5
2,889,477 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,238 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,987 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,703 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,918,586 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,924,291 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,977 UART: [afmc] --
2,932,951 UART: [cold-reset] --
2,933,805 UART: [state] Locking Datavault
2,934,894 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,498 UART: [state] Locking ICCM
2,935,954 UART: [exit] Launching FMC @ 0x40000130
2,941,284 UART:
2,941,300 UART: Running Caliptra FMC ...
2,941,708 UART:
2,941,762 UART: [state] CFI Enabled
2,952,538 UART: [fht] FMC Alias Private Key: 7
3,071,947 UART: [art] Extend RT PCRs Done
3,072,375 UART: [art] Lock RT PCRs Done
3,073,997 UART: [art] Populate DV Done
3,082,295 UART: [fht] FMC Alias Private Key: 7
3,083,289 UART: [art] Derive CDI
3,083,569 UART: [art] Store in slot 0x4
3,169,213 UART: [art] Derive Key Pair
3,169,573 UART: [art] Store priv key in slot 0x5
3,183,084 UART: [art] Derive Key Pair - Done
3,197,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,213,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,908 UART: [art] PUB.X = C0925287012D8F4A5170693673B6D171175C96B9C28CFA3AA4F3FC30D46DA0BED005C4885187BABD9EA18262CE58E271
3,220,676 UART: [art] PUB.Y = 5290B35877ECDDFE1427504D20F6A4650BF03AFFE959AA54406F485AA1E81EDD494E4A9BBD4494D5373FB671007E37AF
3,227,611 UART: [art] SIG.R = C5F60B6BB56A7AFB7CC0ADE5AD73A09076F6208A2946932FB9FCC527F170758061AF1224F0FD8C6119DC1C4AEB35EC95
3,234,394 UART: [art] SIG.S = 03BEC6D406A09C2BED7C6EEDC94D76FB5B6B75C44E251A91029F3DCDC0C34A0A96EE1C0B6426F4BDE01507B83F6B530E
3,258,429 UART: Caliptra RT
3,258,680 UART: [state] CFI Enabled
3,378,556 UART: [rt] RT listening for mailbox commands...
3,379,220 writing to cptra_bootfsm_go
3,379,312 UART:
3,379,328 UART: Running Caliptra ROM ...
3,379,736 UART:
3,379,791 UART: [state] CFI Enabled
3,382,476 UART: [state] LifecycleState = Production
3,383,084 UART: [state] DebugLocked = Yes
3,383,830 UART: [state] Starting the WD Timer 40000000 cycles
3,385,341 UART: [kat] SHA2-256
4,188,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,995 UART: [kat] ++
4,193,147 UART: [kat] sha1
4,197,273 UART: [kat] SHA2-256
4,199,213 UART: [kat] SHA2-384
4,201,876 UART: [kat] SHA2-512-ACC
4,203,777 UART: [kat] ECC-384
4,213,500 UART: [kat] HMAC-384Kdf
4,218,110 UART: [kat] LMS
4,466,422 UART: [kat] --
4,467,484 UART: [warm-reset] ++
4,468,495 UART: [warm-reset] --
4,469,466 UART: [state] Locking Datavault
4,470,312 UART: [state] Locking PCR0, PCR1 and PCR31
4,470,916 UART: [state] Locking ICCM
4,471,454 UART: [exit] Launching FMC @ 0x40000130
4,476,784 UART:
4,476,800 UART: Running Caliptra FMC ...
4,477,208 UART:
4,477,262 UART: [state] CFI Enabled
4,478,651 UART: [art] Skip pcr extension
4,479,060 UART: [art] Extend RT PCRs Done
4,479,488 UART: [art] Lock RT PCRs Done
4,481,115 UART: [art] Populate DV Done
4,489,173 UART: [fht] FMC Alias Private Key: 7
4,490,133 UART: [art] Derive CDI
4,490,413 UART: [art] Store in slot 0x4
4,576,017 UART: [art] Derive Key Pair
4,576,377 UART: [art] Store priv key in slot 0x5
4,590,216 UART: [art] Derive Key Pair - Done
4,604,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,620,553 UART: [art] Erasing AUTHORITY.KEYID = 7
4,621,318 UART: [art] PUB.X = C0925287012D8F4A5170693673B6D171175C96B9C28CFA3AA4F3FC30D46DA0BED005C4885187BABD9EA18262CE58E271
4,628,086 UART: [art] PUB.Y = 5290B35877ECDDFE1427504D20F6A4650BF03AFFE959AA54406F485AA1E81EDD494E4A9BBD4494D5373FB671007E37AF
4,635,021 UART: [art] SIG.R = C5F60B6BB56A7AFB7CC0ADE5AD73A09076F6208A2946932FB9FCC527F170758061AF1224F0FD8C6119DC1C4AEB35EC95
4,641,804 UART: [art] SIG.S = 03BEC6D406A09C2BED7C6EEDC94D76FB5B6B75C44E251A91029F3DCDC0C34A0A96EE1C0B6426F4BDE01507B83F6B530E
4,665,841 UART: Caliptra RT
4,666,092 UART: [state] CFI Enabled
5,034,175 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Production
86,040 UART: [state] DebugLocked = Yes
86,622 UART: [state] Starting the WD Timer 40000000 cycles
88,213 UART: [kat] SHA2-256
891,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,867 UART: [kat] ++
896,019 UART: [kat] sha1
900,277 UART: [kat] SHA2-256
902,217 UART: [kat] SHA2-384
905,034 UART: [kat] SHA2-512-ACC
906,935 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,762 UART: [kat] LMS
1,169,074 UART: [kat] --
1,169,815 UART: [cold-reset] ++
1,170,154 UART: [fht] FHT @ 0x50003400
1,172,894 UART: [idev] ++
1,173,062 UART: [idev] CDI.KEYID = 6
1,173,423 UART: [idev] SUBJECT.KEYID = 7
1,173,848 UART: [idev] UDS.KEYID = 0
1,174,194 ready_for_fw is high
1,174,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,029 UART: [idev] Sha1 KeyId Algorithm
1,207,862 UART: [idev] --
1,208,899 UART: [ldev] ++
1,209,067 UART: [ldev] CDI.KEYID = 6
1,209,431 UART: [ldev] SUBJECT.KEYID = 5
1,209,858 UART: [ldev] AUTHORITY.KEYID = 7
1,210,321 UART: [ldev] FE.KEYID = 1
1,215,827 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,204 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,898 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,768 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,474 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,354 UART: [ldev] --
1,280,773 UART: [fwproc] Wait for Commands...
1,281,382 UART: [fwproc] Recv command 0x46574c44
1,282,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,870 >>> mbox cmd response: success
2,851,917 UART: [afmc] ++
2,852,085 UART: [afmc] CDI.KEYID = 6
2,852,448 UART: [afmc] SUBJECT.KEYID = 7
2,852,874 UART: [afmc] AUTHORITY.KEYID = 5
2,888,697 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,173 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,889 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,772 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,477 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,325 UART: [afmc] --
2,932,165 UART: [cold-reset] --
2,932,971 UART: [state] Locking Datavault
2,934,174 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,778 UART: [state] Locking ICCM
2,935,246 UART: [exit] Launching FMC @ 0x40000130
2,940,576 UART:
2,940,592 UART: Running Caliptra FMC ...
2,941,000 UART:
2,941,143 UART: [state] CFI Enabled
2,951,305 UART: [fht] FMC Alias Private Key: 7
3,069,698 UART: [art] Extend RT PCRs Done
3,070,126 UART: [art] Lock RT PCRs Done
3,072,078 UART: [art] Populate DV Done
3,080,314 UART: [fht] FMC Alias Private Key: 7
3,081,368 UART: [art] Derive CDI
3,081,648 UART: [art] Store in slot 0x4
3,167,376 UART: [art] Derive Key Pair
3,167,736 UART: [art] Store priv key in slot 0x5
3,181,463 UART: [art] Derive Key Pair - Done
3,196,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,818 UART: [art] PUB.X = 4BE7DBFEFBE3D210099BA30612DFE9DEAA057269B463D4BA43B5AA048DC47D2D9DF6B40AA7E1D28A8A31A5686C392BA7
3,219,597 UART: [art] PUB.Y = 77B3274CBC2CCDC37C54BE39E02381B479362EDD251D0296F69D76046159C9415C6B3D7A3B9B6BE3B6CC090A6CE699F4
3,226,543 UART: [art] SIG.R = 0E6101C8903DEFD42C11169026E646F82DA26E93F9C789E505D33015D1905D776EDB15A02DBFAB24E3B4D9A4F888ADA5
3,233,312 UART: [art] SIG.S = D47F6C2267819318501E40A20BA7B6F964034E90A03796F2E258923915CD15E36670739CC0F726C66E40AF21567386F5
3,257,354 UART: Caliptra RT
3,257,697 UART: [state] CFI Enabled
3,377,157 UART: [rt] RT listening for mailbox commands...
3,377,821 writing to cptra_bootfsm_go
3,377,913 UART:
3,377,929 UART: Running Caliptra ROM ...
3,378,337 UART:
3,378,479 UART: [state] CFI Enabled
3,381,334 UART: [state] LifecycleState = Production
3,381,942 UART: [state] DebugLocked = Yes
3,382,686 UART: [state] Starting the WD Timer 40000000 cycles
3,384,387 UART: [kat] SHA2-256
4,187,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,192,041 UART: [kat] ++
4,192,193 UART: [kat] sha1
4,196,499 UART: [kat] SHA2-256
4,198,439 UART: [kat] SHA2-384
4,201,098 UART: [kat] SHA2-512-ACC
4,202,999 UART: [kat] ECC-384
4,212,828 UART: [kat] HMAC-384Kdf
4,217,468 UART: [kat] LMS
4,465,780 UART: [kat] --
4,466,708 UART: [warm-reset] ++
4,467,445 UART: [warm-reset] --
4,468,328 UART: [state] Locking Datavault
4,469,086 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,690 UART: [state] Locking ICCM
4,470,318 UART: [exit] Launching FMC @ 0x40000130
4,475,648 UART:
4,475,664 UART: Running Caliptra FMC ...
4,476,072 UART:
4,476,215 UART: [state] CFI Enabled
4,477,680 UART: [art] Skip pcr extension
4,478,089 UART: [art] Extend RT PCRs Done
4,478,517 UART: [art] Lock RT PCRs Done
4,479,750 UART: [art] Populate DV Done
4,487,886 UART: [fht] FMC Alias Private Key: 7
4,488,814 UART: [art] Derive CDI
4,489,094 UART: [art] Store in slot 0x4
4,574,858 UART: [art] Derive Key Pair
4,575,218 UART: [art] Store priv key in slot 0x5
4,588,411 UART: [art] Derive Key Pair - Done
4,603,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,189 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,954 UART: [art] PUB.X = 4BE7DBFEFBE3D210099BA30612DFE9DEAA057269B463D4BA43B5AA048DC47D2D9DF6B40AA7E1D28A8A31A5686C392BA7
4,625,733 UART: [art] PUB.Y = 77B3274CBC2CCDC37C54BE39E02381B479362EDD251D0296F69D76046159C9415C6B3D7A3B9B6BE3B6CC090A6CE699F4
4,632,679 UART: [art] SIG.R = 0E6101C8903DEFD42C11169026E646F82DA26E93F9C789E505D33015D1905D776EDB15A02DBFAB24E3B4D9A4F888ADA5
4,639,448 UART: [art] SIG.S = D47F6C2267819318501E40A20BA7B6F964034E90A03796F2E258923915CD15E36670739CC0F726C66E40AF21567386F5
4,663,308 UART: Caliptra RT
4,663,651 UART: [state] CFI Enabled
5,024,378 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Production
86,046 UART: [state] DebugLocked = Yes
86,680 UART: [state] Starting the WD Timer 40000000 cycles
88,299 UART: [kat] SHA2-256
891,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,953 UART: [kat] ++
896,105 UART: [kat] sha1
900,303 UART: [kat] SHA2-256
902,243 UART: [kat] SHA2-384
905,086 UART: [kat] SHA2-512-ACC
906,987 UART: [kat] ECC-384
916,832 UART: [kat] HMAC-384Kdf
921,392 UART: [kat] LMS
1,169,704 UART: [kat] --
1,170,675 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,690 UART: [idev] ++
1,173,858 UART: [idev] CDI.KEYID = 6
1,174,219 UART: [idev] SUBJECT.KEYID = 7
1,174,644 UART: [idev] UDS.KEYID = 0
1,174,990 ready_for_fw is high
1,174,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,625 UART: [idev] Sha1 KeyId Algorithm
1,208,430 UART: [idev] --
1,209,353 UART: [ldev] ++
1,209,521 UART: [ldev] CDI.KEYID = 6
1,209,885 UART: [ldev] SUBJECT.KEYID = 5
1,210,312 UART: [ldev] AUTHORITY.KEYID = 7
1,210,775 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,190 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,060 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,766 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,774 UART: [ldev] --
1,282,071 UART: [fwproc] Wait for Commands...
1,282,862 UART: [fwproc] Recv command 0x46574c44
1,283,595 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,012 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,459 >>> mbox cmd response: success
2,852,680 UART: [afmc] ++
2,852,848 UART: [afmc] CDI.KEYID = 6
2,853,211 UART: [afmc] SUBJECT.KEYID = 7
2,853,637 UART: [afmc] AUTHORITY.KEYID = 5
2,889,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,348 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,912,064 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,947 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,652 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,452 UART: [afmc] --
2,932,438 UART: [cold-reset] --
2,933,354 UART: [state] Locking Datavault
2,934,295 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,899 UART: [state] Locking ICCM
2,935,459 UART: [exit] Launching FMC @ 0x40000130
2,940,789 UART:
2,940,805 UART: Running Caliptra FMC ...
2,941,213 UART:
2,941,356 UART: [state] CFI Enabled
2,951,852 UART: [fht] FMC Alias Private Key: 7
3,070,785 UART: [art] Extend RT PCRs Done
3,071,213 UART: [art] Lock RT PCRs Done
3,072,937 UART: [art] Populate DV Done
3,081,083 UART: [fht] FMC Alias Private Key: 7
3,082,065 UART: [art] Derive CDI
3,082,345 UART: [art] Store in slot 0x4
3,168,245 UART: [art] Derive Key Pair
3,168,605 UART: [art] Store priv key in slot 0x5
3,181,890 UART: [art] Derive Key Pair - Done
3,196,469 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,491 UART: [art] PUB.X = E033A72EC64B4CA4B8E346080089BC4DD180B64855C033BC1AD2D7C745163575C54C61E41A8618026D93A89D34518478
3,219,227 UART: [art] PUB.Y = 2E5A33DDFF8B65E4E02A1D3BBE51DADD6DE76DC587330186D072EE73EF7102F2BFFD23C4832D56E1324CF9BA2489183F
3,226,189 UART: [art] SIG.R = F6B4C0E1E82E828258C4071887EA77719536C43E59039CAEC36DACF85E34F6AEA0800115DC33B5F4D113DE55C987C7C7
3,232,956 UART: [art] SIG.S = 40F993D46865E936EBE26D882672B016DCCD06E41E2BA236B86BDD62DC8E14C61F2D5F7D60B914FC893031CA8E2D27E9
3,256,795 UART: Caliptra RT
3,257,138 UART: [state] CFI Enabled
3,376,464 UART: [rt] RT listening for mailbox commands...
3,377,128 writing to cptra_bootfsm_go
3,377,220 UART:
3,377,236 UART: Running Caliptra ROM ...
3,377,644 UART:
3,377,786 UART: [state] CFI Enabled
3,380,811 UART: [state] LifecycleState = Production
3,381,419 UART: [state] DebugLocked = Yes
3,382,089 UART: [state] Starting the WD Timer 40000000 cycles
3,383,740 UART: [kat] SHA2-256
4,187,290 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,394 UART: [kat] ++
4,191,546 UART: [kat] sha1
4,195,728 UART: [kat] SHA2-256
4,197,668 UART: [kat] SHA2-384
4,200,231 UART: [kat] SHA2-512-ACC
4,202,132 UART: [kat] ECC-384
4,211,865 UART: [kat] HMAC-384Kdf
4,216,499 UART: [kat] LMS
4,464,811 UART: [kat] --
4,465,571 UART: [warm-reset] ++
4,466,314 UART: [warm-reset] --
4,466,999 UART: [state] Locking Datavault
4,467,769 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,373 UART: [state] Locking ICCM
4,468,867 UART: [exit] Launching FMC @ 0x40000130
4,474,197 UART:
4,474,213 UART: Running Caliptra FMC ...
4,474,621 UART:
4,474,764 UART: [state] CFI Enabled
4,476,163 UART: [art] Skip pcr extension
4,476,572 UART: [art] Extend RT PCRs Done
4,477,000 UART: [art] Lock RT PCRs Done
4,478,109 UART: [art] Populate DV Done
4,486,413 UART: [fht] FMC Alias Private Key: 7
4,487,367 UART: [art] Derive CDI
4,487,647 UART: [art] Store in slot 0x4
4,573,769 UART: [art] Derive Key Pair
4,574,129 UART: [art] Store priv key in slot 0x5
4,588,326 UART: [art] Derive Key Pair - Done
4,603,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,692 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,457 UART: [art] PUB.X = E033A72EC64B4CA4B8E346080089BC4DD180B64855C033BC1AD2D7C745163575C54C61E41A8618026D93A89D34518478
4,626,193 UART: [art] PUB.Y = 2E5A33DDFF8B65E4E02A1D3BBE51DADD6DE76DC587330186D072EE73EF7102F2BFFD23C4832D56E1324CF9BA2489183F
4,633,155 UART: [art] SIG.R = F6B4C0E1E82E828258C4071887EA77719536C43E59039CAEC36DACF85E34F6AEA0800115DC33B5F4D113DE55C987C7C7
4,639,922 UART: [art] SIG.S = 40F993D46865E936EBE26D882672B016DCCD06E41E2BA236B86BDD62DC8E14C61F2D5F7D60B914FC893031CA8E2D27E9
4,664,053 UART: Caliptra RT
4,664,396 UART: [state] CFI Enabled
5,030,999 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Production
86,001 UART: [state] DebugLocked = Yes
86,533 UART: [state] Starting the WD Timer 40000000 cycles
88,148 UART: [kat] SHA2-256
891,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,802 UART: [kat] ++
895,954 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,897 UART: [kat] SHA2-512-ACC
906,798 UART: [kat] ECC-384
916,319 UART: [kat] HMAC-384Kdf
920,909 UART: [kat] LMS
1,169,221 UART: [kat] --
1,170,240 UART: [cold-reset] ++
1,170,627 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 ready_for_fw is high
1,174,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,963 UART: [idev] Erasing UDS.KEYID = 0
1,198,990 UART: [idev] Sha1 KeyId Algorithm
1,207,851 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,630 UART: [ldev] Erasing FE.KEYID = 1
1,242,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,199 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,069 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,775 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,895 UART: [ldev] --
1,281,104 UART: [fwproc] Wait for Commands...
1,281,923 UART: [fwproc] Recv command 0x46574c44
1,282,656 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,584 >>> mbox cmd response: success
2,851,815 UART: [afmc] ++
2,851,983 UART: [afmc] CDI.KEYID = 6
2,852,346 UART: [afmc] SUBJECT.KEYID = 7
2,852,772 UART: [afmc] AUTHORITY.KEYID = 5
2,888,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,585 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,301 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,184 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,889 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,739 UART: [afmc] --
2,931,635 UART: [cold-reset] --
2,932,459 UART: [state] Locking Datavault
2,933,830 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,434 UART: [state] Locking ICCM
2,934,856 UART: [exit] Launching FMC @ 0x40000130
2,940,186 UART:
2,940,202 UART: Running Caliptra FMC ...
2,940,610 UART:
2,940,664 UART: [state] CFI Enabled
2,951,224 UART: [fht] FMC Alias Private Key: 7
3,069,581 UART: [art] Extend RT PCRs Done
3,070,009 UART: [art] Lock RT PCRs Done
3,071,615 UART: [art] Populate DV Done
3,079,633 UART: [fht] FMC Alias Private Key: 7
3,080,595 UART: [art] Derive CDI
3,080,875 UART: [art] Store in slot 0x4
3,166,686 UART: [art] Derive Key Pair
3,167,046 UART: [art] Store priv key in slot 0x5
3,180,244 UART: [art] Derive Key Pair - Done
3,195,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,039 UART: [art] PUB.X = 32C577B1960E88FB7E5CA7EF57948C9CA17BF0B603770085B64A1328FD8AE055F50FC285E4F4A02B85DB1BDF11BCE386
3,217,790 UART: [art] PUB.Y = F1E2A73B1065E5E4D17886AB18DC7CA3FFAD94F898DF4D2B75C0FF20B2FC7203171B93501875C5B40BCAC3F1797B195E
3,224,748 UART: [art] SIG.R = 5E2C5AA5091A9F9DF64B9C62D31588FB03D8CF6C71F840A3F326CB17FD1C8628C7EF1C6144411BF07BF50B260E095135
3,231,511 UART: [art] SIG.S = E721BD223CD4065CA551E9244EA09A8879586712E543EF1973189D53588377E0ED603FE603FF383313DB10257BF65A71
3,255,145 UART: Caliptra RT
3,255,396 UART: [state] CFI Enabled
3,374,696 UART: [rt] RT listening for mailbox commands...
3,375,360 writing to cptra_bootfsm_go
3,375,452 UART:
3,375,468 UART: Running Caliptra ROM ...
3,375,876 UART:
3,375,931 UART: [state] CFI Enabled
3,378,014 UART: [state] LifecycleState = Production
3,378,622 UART: [state] DebugLocked = Yes
3,379,218 UART: [state] Starting the WD Timer 40000000 cycles
3,380,689 UART: [kat] SHA2-256
4,184,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,188,343 UART: [kat] ++
4,188,495 UART: [kat] sha1
4,192,847 UART: [kat] SHA2-256
4,194,787 UART: [kat] SHA2-384
4,197,530 UART: [kat] SHA2-512-ACC
4,199,431 UART: [kat] ECC-384
4,208,764 UART: [kat] HMAC-384Kdf
4,213,360 UART: [kat] LMS
4,461,672 UART: [kat] --
4,462,676 UART: [warm-reset] ++
4,463,745 UART: [warm-reset] --
4,464,674 UART: [state] Locking Datavault
4,465,636 UART: [state] Locking PCR0, PCR1 and PCR31
4,466,240 UART: [state] Locking ICCM
4,466,744 UART: [exit] Launching FMC @ 0x40000130
4,472,074 UART:
4,472,090 UART: Running Caliptra FMC ...
4,472,498 UART:
4,472,552 UART: [state] CFI Enabled
4,473,821 UART: [art] Skip pcr extension
4,474,230 UART: [art] Extend RT PCRs Done
4,474,658 UART: [art] Lock RT PCRs Done
4,476,127 UART: [art] Populate DV Done
4,484,483 UART: [fht] FMC Alias Private Key: 7
4,485,419 UART: [art] Derive CDI
4,485,699 UART: [art] Store in slot 0x4
4,571,184 UART: [art] Derive Key Pair
4,571,544 UART: [art] Store priv key in slot 0x5
4,584,386 UART: [art] Derive Key Pair - Done
4,599,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,614,622 UART: [art] Erasing AUTHORITY.KEYID = 7
4,615,387 UART: [art] PUB.X = 32C577B1960E88FB7E5CA7EF57948C9CA17BF0B603770085B64A1328FD8AE055F50FC285E4F4A02B85DB1BDF11BCE386
4,622,138 UART: [art] PUB.Y = F1E2A73B1065E5E4D17886AB18DC7CA3FFAD94F898DF4D2B75C0FF20B2FC7203171B93501875C5B40BCAC3F1797B195E
4,629,096 UART: [art] SIG.R = 5E2C5AA5091A9F9DF64B9C62D31588FB03D8CF6C71F840A3F326CB17FD1C8628C7EF1C6144411BF07BF50B260E095135
4,635,859 UART: [art] SIG.S = E721BD223CD4065CA551E9244EA09A8879586712E543EF1973189D53588377E0ED603FE603FF383313DB10257BF65A71
4,659,843 UART: Caliptra RT
4,660,094 UART: [state] CFI Enabled
5,022,757 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Production
85,891 UART: [state] DebugLocked = Yes
86,597 UART: [state] Starting the WD Timer 40000000 cycles
88,188 UART: [kat] SHA2-256
891,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,842 UART: [kat] ++
895,994 UART: [kat] sha1
900,204 UART: [kat] SHA2-256
902,144 UART: [kat] SHA2-384
904,739 UART: [kat] SHA2-512-ACC
906,640 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,723 UART: [kat] LMS
1,169,035 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,301 UART: [fht] FHT @ 0x50003400
1,172,941 UART: [idev] ++
1,173,109 UART: [idev] CDI.KEYID = 6
1,173,470 UART: [idev] SUBJECT.KEYID = 7
1,173,895 UART: [idev] UDS.KEYID = 0
1,174,241 ready_for_fw is high
1,174,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,709 UART: [idev] Erasing UDS.KEYID = 0
1,198,708 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,784 UART: [ldev] ++
1,208,952 UART: [ldev] CDI.KEYID = 6
1,209,316 UART: [ldev] SUBJECT.KEYID = 5
1,209,743 UART: [ldev] AUTHORITY.KEYID = 7
1,210,206 UART: [ldev] FE.KEYID = 1
1,215,214 UART: [ldev] Erasing FE.KEYID = 1
1,241,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,667 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,537 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,243 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,447 UART: [ldev] --
1,280,738 UART: [fwproc] Wait for Commands...
1,281,323 UART: [fwproc] Recv command 0x46574c44
1,282,056 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,561 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,064 >>> mbox cmd response: success
2,850,327 UART: [afmc] ++
2,850,495 UART: [afmc] CDI.KEYID = 6
2,850,858 UART: [afmc] SUBJECT.KEYID = 7
2,851,284 UART: [afmc] AUTHORITY.KEYID = 5
2,886,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,902,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,903,685 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,909,401 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,915,284 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,920,989 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,928,839 UART: [afmc] --
2,929,721 UART: [cold-reset] --
2,930,517 UART: [state] Locking Datavault
2,931,518 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,122 UART: [state] Locking ICCM
2,932,736 UART: [exit] Launching FMC @ 0x40000130
2,938,066 UART:
2,938,082 UART: Running Caliptra FMC ...
2,938,490 UART:
2,938,544 UART: [state] CFI Enabled
2,949,422 UART: [fht] FMC Alias Private Key: 7
3,068,551 UART: [art] Extend RT PCRs Done
3,068,979 UART: [art] Lock RT PCRs Done
3,070,417 UART: [art] Populate DV Done
3,078,625 UART: [fht] FMC Alias Private Key: 7
3,079,775 UART: [art] Derive CDI
3,080,055 UART: [art] Store in slot 0x4
3,165,526 UART: [art] Derive Key Pair
3,165,886 UART: [art] Store priv key in slot 0x5
3,178,746 UART: [art] Derive Key Pair - Done
3,193,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,208,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,208,957 UART: [art] PUB.X = 52E8F326C4AB8507109DFACC9B64A9A2DED6F75C7B80AAD59169F9784511D60FAFDC8A360E703AE29EC6214B805A4B96
3,215,732 UART: [art] PUB.Y = 9FDE8300E4FD4B5F341EDDE62EFD24C8B0AB31A29097BABA5FA9BBDC4B59B3BA2826C7928752613A626EACB813B74D25
3,222,682 UART: [art] SIG.R = 2F04B1D2F04EEAA9CFAAE69FB731C4D430EC351CC916629287A1D7B7466859EB624530926BE053ED8E9C3A2B46BA52A8
3,229,461 UART: [art] SIG.S = 5109162246505F7ABBEA91F40B7CA4A68B1A05DCDFBBA210C05BED709CDC3B7B1712560BA67BBFFB6C1AE1D14476449C
3,253,373 UART: Caliptra RT
3,253,624 UART: [state] CFI Enabled
3,373,011 UART: [rt] RT listening for mailbox commands...
3,373,675 writing to cptra_bootfsm_go
3,373,767 UART:
3,373,783 UART: Running Caliptra ROM ...
3,374,191 UART:
3,374,246 UART: [state] CFI Enabled
3,376,557 UART: [state] LifecycleState = Production
3,377,165 UART: [state] DebugLocked = Yes
3,377,691 UART: [state] Starting the WD Timer 40000000 cycles
3,379,362 UART: [kat] SHA2-256
4,182,912 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,187,016 UART: [kat] ++
4,187,168 UART: [kat] sha1
4,191,454 UART: [kat] SHA2-256
4,193,394 UART: [kat] SHA2-384
4,196,239 UART: [kat] SHA2-512-ACC
4,198,140 UART: [kat] ECC-384
4,207,763 UART: [kat] HMAC-384Kdf
4,212,289 UART: [kat] LMS
4,460,601 UART: [kat] --
4,461,509 UART: [warm-reset] ++
4,462,388 UART: [warm-reset] --
4,463,107 UART: [state] Locking Datavault
4,463,777 UART: [state] Locking PCR0, PCR1 and PCR31
4,464,381 UART: [state] Locking ICCM
4,464,853 UART: [exit] Launching FMC @ 0x40000130
4,470,183 UART:
4,470,199 UART: Running Caliptra FMC ...
4,470,607 UART:
4,470,661 UART: [state] CFI Enabled
4,471,982 UART: [art] Skip pcr extension
4,472,391 UART: [art] Extend RT PCRs Done
4,472,819 UART: [art] Lock RT PCRs Done
4,474,324 UART: [art] Populate DV Done
4,482,820 UART: [fht] FMC Alias Private Key: 7
4,483,944 UART: [art] Derive CDI
4,484,224 UART: [art] Store in slot 0x4
4,569,973 UART: [art] Derive Key Pair
4,570,333 UART: [art] Store priv key in slot 0x5
4,583,997 UART: [art] Derive Key Pair - Done
4,598,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,614,253 UART: [art] Erasing AUTHORITY.KEYID = 7
4,615,018 UART: [art] PUB.X = 52E8F326C4AB8507109DFACC9B64A9A2DED6F75C7B80AAD59169F9784511D60FAFDC8A360E703AE29EC6214B805A4B96
4,621,793 UART: [art] PUB.Y = 9FDE8300E4FD4B5F341EDDE62EFD24C8B0AB31A29097BABA5FA9BBDC4B59B3BA2826C7928752613A626EACB813B74D25
4,628,743 UART: [art] SIG.R = 2F04B1D2F04EEAA9CFAAE69FB731C4D430EC351CC916629287A1D7B7466859EB624530926BE053ED8E9C3A2B46BA52A8
4,635,522 UART: [art] SIG.S = 5109162246505F7ABBEA91F40B7CA4A68B1A05DCDFBBA210C05BED709CDC3B7B1712560BA67BBFFB6C1AE1D14476449C
4,659,526 UART: Caliptra RT
4,659,777 UART: [state] CFI Enabled
5,025,929 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,144 UART: [state] LifecycleState = Production
85,752 UART: [state] DebugLocked = Yes
86,262 UART: [state] Starting the WD Timer 40000000 cycles
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,701 UART: [kat] SHA2-256
901,641 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,513 UART: [cold-reset] ++
1,169,912 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,173,900 ready_for_fw is high
1,173,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,858 UART: [idev] Erasing UDS.KEYID = 0
1,198,911 UART: [idev] Sha1 KeyId Algorithm
1,207,794 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,276 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,146 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,852 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,116 UART: [ldev] --
1,281,357 UART: [fwproc] Wait for Commands...
1,282,048 UART: [fwproc] Recv command 0x46574c44
1,282,781 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,871 >>> mbox cmd response: success
2,851,918 UART: [afmc] ++
2,852,086 UART: [afmc] CDI.KEYID = 6
2,852,449 UART: [afmc] SUBJECT.KEYID = 7
2,852,875 UART: [afmc] AUTHORITY.KEYID = 5
2,888,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,555 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,304 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,020 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,903 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,608 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,388 UART: [afmc] --
2,931,426 UART: [cold-reset] --
2,932,508 UART: [state] Locking Datavault
2,933,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,383 UART: [state] Locking ICCM
2,934,955 UART: [exit] Launching FMC @ 0x40000130
2,940,285 UART:
2,940,301 UART: Running Caliptra FMC ...
2,940,709 UART:
2,940,852 UART: [state] CFI Enabled
2,951,490 UART: [fht] FMC Alias Private Key: 7
3,069,869 UART: [art] Extend RT PCRs Done
3,070,297 UART: [art] Lock RT PCRs Done
3,071,425 UART: [art] Populate DV Done
3,079,755 UART: [fht] FMC Alias Private Key: 7
3,080,739 UART: [art] Derive CDI
3,081,019 UART: [art] Store in slot 0x4
3,167,488 UART: [art] Derive Key Pair
3,167,848 UART: [art] Store priv key in slot 0x5
3,181,332 UART: [art] Derive Key Pair - Done
3,195,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,975 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,740 UART: [art] PUB.X = 0917B4122D77D0F32B6B44086C3E4DA667DD6A8E91AFDE393DD7578BD2C80377922D5D7D7872DA2CB7F5DDD5DCB28F79
3,219,515 UART: [art] PUB.Y = CBF4A5D9D19BD0CE941D49309B84B16FB39125D385423F5260CC3148351F6E0FF4E9EAD644800DEBDC7F24C491357FAD
3,226,471 UART: [art] SIG.R = CC7A3F5BC0E2416689D4238EBF4F5B28C915077315B7E89D91060339BC8C94BEDD481EDB2B10F72F58119F9EA1923141
3,233,236 UART: [art] SIG.S = 5018E0AB56517CFF061B422C22A45926BA86B237F7EE6732C867E8E22014269F3C50B9951824F5B3F1EB9481DC39386B
3,257,045 UART: Caliptra RT
3,257,388 UART: [state] CFI Enabled
3,376,720 UART: [rt] RT listening for mailbox commands...
3,377,384 writing to cptra_bootfsm_go
3,377,476 UART:
3,377,492 UART: Running Caliptra ROM ...
3,377,900 UART:
3,378,042 UART: [state] CFI Enabled
3,380,929 UART: [state] LifecycleState = Production
3,381,537 UART: [state] DebugLocked = Yes
3,382,279 UART: [state] Starting the WD Timer 40000000 cycles
3,383,754 UART: [kat] SHA2-256
4,187,304 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,408 UART: [kat] ++
4,191,560 UART: [kat] sha1
4,195,772 UART: [kat] SHA2-256
4,197,712 UART: [kat] SHA2-384
4,200,577 UART: [kat] SHA2-512-ACC
4,202,478 UART: [kat] ECC-384
4,212,263 UART: [kat] HMAC-384Kdf
4,216,769 UART: [kat] LMS
4,465,081 UART: [kat] --
4,465,959 UART: [warm-reset] ++
4,467,096 UART: [warm-reset] --
4,467,747 UART: [state] Locking Datavault
4,468,441 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,045 UART: [state] Locking ICCM
4,469,553 UART: [exit] Launching FMC @ 0x40000130
4,474,883 UART:
4,474,899 UART: Running Caliptra FMC ...
4,475,307 UART:
4,475,450 UART: [state] CFI Enabled
4,476,955 UART: [art] Skip pcr extension
4,477,364 UART: [art] Extend RT PCRs Done
4,477,792 UART: [art] Lock RT PCRs Done
4,479,085 UART: [art] Populate DV Done
4,487,149 UART: [fht] FMC Alias Private Key: 7
4,488,171 UART: [art] Derive CDI
4,488,451 UART: [art] Store in slot 0x4
4,574,104 UART: [art] Derive Key Pair
4,574,464 UART: [art] Store priv key in slot 0x5
4,588,014 UART: [art] Derive Key Pair - Done
4,602,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,881 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,646 UART: [art] PUB.X = 0917B4122D77D0F32B6B44086C3E4DA667DD6A8E91AFDE393DD7578BD2C80377922D5D7D7872DA2CB7F5DDD5DCB28F79
4,625,421 UART: [art] PUB.Y = CBF4A5D9D19BD0CE941D49309B84B16FB39125D385423F5260CC3148351F6E0FF4E9EAD644800DEBDC7F24C491357FAD
4,632,377 UART: [art] SIG.R = CC7A3F5BC0E2416689D4238EBF4F5B28C915077315B7E89D91060339BC8C94BEDD481EDB2B10F72F58119F9EA1923141
4,639,142 UART: [art] SIG.S = 5018E0AB56517CFF061B422C22A45926BA86B237F7EE6732C867E8E22014269F3C50B9951824F5B3F1EB9481DC39386B
4,662,715 UART: Caliptra RT
4,663,058 UART: [state] CFI Enabled
5,025,971 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,654 UART: [state] LifecycleState = Production
86,262 UART: [state] DebugLocked = Yes
86,990 UART: [state] Starting the WD Timer 40000000 cycles
88,517 UART: [kat] SHA2-256
892,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,171 UART: [kat] ++
896,323 UART: [kat] sha1
900,749 UART: [kat] SHA2-256
902,689 UART: [kat] SHA2-384
905,620 UART: [kat] SHA2-512-ACC
907,521 UART: [kat] ECC-384
917,020 UART: [kat] HMAC-384Kdf
921,658 UART: [kat] LMS
1,169,970 UART: [kat] --
1,170,853 UART: [cold-reset] ++
1,171,320 UART: [fht] FHT @ 0x50003400
1,174,016 UART: [idev] ++
1,174,184 UART: [idev] CDI.KEYID = 6
1,174,545 UART: [idev] SUBJECT.KEYID = 7
1,174,970 UART: [idev] UDS.KEYID = 0
1,175,316 ready_for_fw is high
1,175,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,988 UART: [idev] Erasing UDS.KEYID = 0
1,199,791 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,351 UART: [ldev] SUBJECT.KEYID = 5
1,210,778 UART: [ldev] AUTHORITY.KEYID = 7
1,211,241 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,696 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,390 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,260 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,966 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,958 UART: [ldev] --
1,282,395 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,887 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,894 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,469 >>> mbox cmd response: success
2,851,716 UART: [afmc] ++
2,851,884 UART: [afmc] CDI.KEYID = 6
2,852,247 UART: [afmc] SUBJECT.KEYID = 7
2,852,673 UART: [afmc] AUTHORITY.KEYID = 5
2,888,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,269 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,018 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,734 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,617 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,322 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,302 UART: [afmc] --
2,932,358 UART: [cold-reset] --
2,933,144 UART: [state] Locking Datavault
2,934,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,905 UART: [state] Locking ICCM
2,935,485 UART: [exit] Launching FMC @ 0x40000130
2,940,815 UART:
2,940,831 UART: Running Caliptra FMC ...
2,941,239 UART:
2,941,382 UART: [state] CFI Enabled
2,951,624 UART: [fht] FMC Alias Private Key: 7
3,070,641 UART: [art] Extend RT PCRs Done
3,071,069 UART: [art] Lock RT PCRs Done
3,072,453 UART: [art] Populate DV Done
3,080,975 UART: [fht] FMC Alias Private Key: 7
3,081,931 UART: [art] Derive CDI
3,082,211 UART: [art] Store in slot 0x4
3,167,888 UART: [art] Derive Key Pair
3,168,248 UART: [art] Store priv key in slot 0x5
3,181,370 UART: [art] Derive Key Pair - Done
3,195,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,384 UART: [art] PUB.X = 6875447FDB3E66FA2E3149CD93A77F0CA2443ECC4FEA3E32B11E468D4E71AD3ACADB4F97F4DEF8F77FB31A90CC8C4A1E
3,219,179 UART: [art] PUB.Y = 51F3B798820E5E21002238CFAC5893157BC06D099D987569FA0C078C80DB969D9E026BA9EEC0BEEADC711197DB15D088
3,226,098 UART: [art] SIG.R = 6D33A64177AAA2AFAE041B8C7CBB3DEB288399DB23B21B14BE127A45B3819B00685EC20F2DA2D79BA8CC01A9FA90AFA8
3,232,859 UART: [art] SIG.S = C527A37DEE115F8B847780294F42847C4AD77F9B8B81B35D1840D944EAF7BDE58A584C4FDA529B8ABF3DCC5EADEBAEA8
3,256,181 UART: Caliptra RT
3,256,524 UART: [state] CFI Enabled
3,376,520 UART: [rt] RT listening for mailbox commands...
3,377,184 writing to cptra_bootfsm_go
3,377,276 UART:
3,377,292 UART: Running Caliptra ROM ...
3,377,700 UART:
3,377,842 UART: [state] CFI Enabled
3,380,733 UART: [state] LifecycleState = Production
3,381,341 UART: [state] DebugLocked = Yes
3,381,991 UART: [state] Starting the WD Timer 40000000 cycles
3,383,670 UART: [kat] SHA2-256
4,187,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,324 UART: [kat] ++
4,191,476 UART: [kat] sha1
4,195,792 UART: [kat] SHA2-256
4,197,732 UART: [kat] SHA2-384
4,200,291 UART: [kat] SHA2-512-ACC
4,202,192 UART: [kat] ECC-384
4,212,167 UART: [kat] HMAC-384Kdf
4,216,851 UART: [kat] LMS
4,465,163 UART: [kat] --
4,465,927 UART: [warm-reset] ++
4,466,846 UART: [warm-reset] --
4,467,545 UART: [state] Locking Datavault
4,468,307 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,911 UART: [state] Locking ICCM
4,469,435 UART: [exit] Launching FMC @ 0x40000130
4,474,765 UART:
4,474,781 UART: Running Caliptra FMC ...
4,475,189 UART:
4,475,332 UART: [state] CFI Enabled
4,476,749 UART: [art] Skip pcr extension
4,477,158 UART: [art] Extend RT PCRs Done
4,477,586 UART: [art] Lock RT PCRs Done
4,479,059 UART: [art] Populate DV Done
4,487,421 UART: [fht] FMC Alias Private Key: 7
4,488,537 UART: [art] Derive CDI
4,488,817 UART: [art] Store in slot 0x4
4,574,420 UART: [art] Derive Key Pair
4,574,780 UART: [art] Store priv key in slot 0x5
4,588,500 UART: [art] Derive Key Pair - Done
4,603,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,465 UART: [art] Erasing AUTHORITY.KEYID = 7
4,619,230 UART: [art] PUB.X = 6875447FDB3E66FA2E3149CD93A77F0CA2443ECC4FEA3E32B11E468D4E71AD3ACADB4F97F4DEF8F77FB31A90CC8C4A1E
4,626,025 UART: [art] PUB.Y = 51F3B798820E5E21002238CFAC5893157BC06D099D987569FA0C078C80DB969D9E026BA9EEC0BEEADC711197DB15D088
4,632,944 UART: [art] SIG.R = 6D33A64177AAA2AFAE041B8C7CBB3DEB288399DB23B21B14BE127A45B3819B00685EC20F2DA2D79BA8CC01A9FA90AFA8
4,639,705 UART: [art] SIG.S = C527A37DEE115F8B847780294F42847C4AD77F9B8B81B35D1840D944EAF7BDE58A584C4FDA529B8ABF3DCC5EADEBAEA8
4,663,587 UART: Caliptra RT
4,663,930 UART: [state] CFI Enabled
5,028,729 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,949 UART: [state] LifecycleState = Production
85,557 UART: [state] DebugLocked = Yes
86,297 UART: [state] Starting the WD Timer 40000000 cycles
87,762 UART: [kat] SHA2-256
891,312 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,416 UART: [kat] ++
895,568 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,493 UART: [kat] SHA2-512-ACC
906,394 UART: [kat] ECC-384
916,295 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,150 UART: [cold-reset] ++
1,170,639 UART: [fht] FHT @ 0x50003400
1,173,353 UART: [idev] ++
1,173,521 UART: [idev] CDI.KEYID = 6
1,173,882 UART: [idev] SUBJECT.KEYID = 7
1,174,307 UART: [idev] UDS.KEYID = 0
1,174,653 ready_for_fw is high
1,174,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,205 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,371 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,978 UART: [ldev] SUBJECT.KEYID = 5
1,210,405 UART: [ldev] AUTHORITY.KEYID = 7
1,210,868 UART: [ldev] FE.KEYID = 1
1,216,124 UART: [ldev] Erasing FE.KEYID = 1
1,242,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,311 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,005 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,875 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,581 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,653 UART: [ldev] --
1,281,072 UART: [fwproc] Wait for Commands...
1,281,835 UART: [fwproc] Recv command 0x46574c44
1,282,568 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,597 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,870 >>> mbox cmd response: success
2,851,983 UART: [afmc] ++
2,852,151 UART: [afmc] CDI.KEYID = 6
2,852,514 UART: [afmc] SUBJECT.KEYID = 7
2,852,940 UART: [afmc] AUTHORITY.KEYID = 5
2,888,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,523 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,239 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,122 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,827 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,739 UART: [afmc] --
2,931,691 UART: [cold-reset] --
2,932,463 UART: [state] Locking Datavault
2,933,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,918 UART: [state] Locking ICCM
2,934,526 UART: [exit] Launching FMC @ 0x40000130
2,939,856 UART:
2,939,872 UART: Running Caliptra FMC ...
2,940,280 UART:
2,940,334 UART: [state] CFI Enabled
2,950,896 UART: [fht] FMC Alias Private Key: 7
3,068,893 UART: [art] Extend RT PCRs Done
3,069,321 UART: [art] Lock RT PCRs Done
3,070,725 UART: [art] Populate DV Done
3,079,017 UART: [fht] FMC Alias Private Key: 7
3,079,985 UART: [art] Derive CDI
3,080,265 UART: [art] Store in slot 0x4
3,166,194 UART: [art] Derive Key Pair
3,166,554 UART: [art] Store priv key in slot 0x5
3,179,644 UART: [art] Derive Key Pair - Done
3,194,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,245 UART: [art] PUB.X = BEC1776A077BE960CF26B679507C4B967B6C794BAE9A6F49CE904B254E6E19AF6F96B180DA42F66AAF0451F7C010939B
3,217,019 UART: [art] PUB.Y = 2085A076A108588A9E47C2C0979930D0248E850F695D141D1A50A57618B9B536E6624B412469001145E2BBA3C69AAAA0
3,223,931 UART: [art] SIG.R = D9FD77458E2B664CE9D6AA3090615BB201395D799E02E3EC754A77A74315FC2DA4DE4B2D08C0AA42D9898FCD522A215C
3,230,702 UART: [art] SIG.S = 85850718CD8DC79A613A4C3E7114690C52CB4ED3F4A306ED51AFB34388891093A5A09449F941C0DFF15DF407EAA43F5D
3,254,480 UART: Caliptra RT
3,254,731 UART: [state] CFI Enabled
3,374,405 UART: [rt] RT listening for mailbox commands...
3,375,069 writing to cptra_bootfsm_go
3,375,161 UART:
3,375,177 UART: Running Caliptra ROM ...
3,375,585 UART:
3,375,640 UART: [state] CFI Enabled
3,378,039 UART: [state] LifecycleState = Production
3,378,647 UART: [state] DebugLocked = Yes
3,379,179 UART: [state] Starting the WD Timer 40000000 cycles
3,380,674 UART: [kat] SHA2-256
4,184,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,188,328 UART: [kat] ++
4,188,480 UART: [kat] sha1
4,192,774 UART: [kat] SHA2-256
4,194,714 UART: [kat] SHA2-384
4,197,283 UART: [kat] SHA2-512-ACC
4,199,184 UART: [kat] ECC-384
4,208,901 UART: [kat] HMAC-384Kdf
4,213,455 UART: [kat] LMS
4,461,767 UART: [kat] --
4,462,435 UART: [warm-reset] ++
4,463,070 UART: [warm-reset] --
4,463,751 UART: [state] Locking Datavault
4,464,629 UART: [state] Locking PCR0, PCR1 and PCR31
4,465,233 UART: [state] Locking ICCM
4,465,765 UART: [exit] Launching FMC @ 0x40000130
4,471,095 UART:
4,471,111 UART: Running Caliptra FMC ...
4,471,519 UART:
4,471,573 UART: [state] CFI Enabled
4,472,758 UART: [art] Skip pcr extension
4,473,167 UART: [art] Extend RT PCRs Done
4,473,595 UART: [art] Lock RT PCRs Done
4,474,736 UART: [art] Populate DV Done
4,482,912 UART: [fht] FMC Alias Private Key: 7
4,484,052 UART: [art] Derive CDI
4,484,332 UART: [art] Store in slot 0x4
4,569,777 UART: [art] Derive Key Pair
4,570,137 UART: [art] Store priv key in slot 0x5
4,583,733 UART: [art] Derive Key Pair - Done
4,598,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,613,519 UART: [art] Erasing AUTHORITY.KEYID = 7
4,614,284 UART: [art] PUB.X = BEC1776A077BE960CF26B679507C4B967B6C794BAE9A6F49CE904B254E6E19AF6F96B180DA42F66AAF0451F7C010939B
4,621,058 UART: [art] PUB.Y = 2085A076A108588A9E47C2C0979930D0248E850F695D141D1A50A57618B9B536E6624B412469001145E2BBA3C69AAAA0
4,627,970 UART: [art] SIG.R = D9FD77458E2B664CE9D6AA3090615BB201395D799E02E3EC754A77A74315FC2DA4DE4B2D08C0AA42D9898FCD522A215C
4,634,741 UART: [art] SIG.S = 85850718CD8DC79A613A4C3E7114690C52CB4ED3F4A306ED51AFB34388891093A5A09449F941C0DFF15DF407EAA43F5D
4,658,565 UART: Caliptra RT
4,658,816 UART: [state] CFI Enabled
5,022,997 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,967 UART: [state] LifecycleState = Production
85,575 UART: [state] DebugLocked = Yes
86,313 UART: [state] Starting the WD Timer 40000000 cycles
88,022 UART: [kat] SHA2-256
891,572 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,676 UART: [kat] ++
895,828 UART: [kat] sha1
900,054 UART: [kat] SHA2-256
901,994 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,005 UART: [kat] HMAC-384Kdf
920,549 UART: [kat] LMS
1,168,861 UART: [kat] --
1,169,796 UART: [cold-reset] ++
1,170,341 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 ready_for_fw is high
1,174,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,903 UART: [idev] Erasing UDS.KEYID = 0
1,198,894 UART: [idev] Sha1 KeyId Algorithm
1,207,693 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,336 UART: [ldev] Erasing FE.KEYID = 1
1,242,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,819 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,513 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,383 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,089 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,059 UART: [ldev] --
1,281,350 UART: [fwproc] Wait for Commands...
1,282,005 UART: [fwproc] Recv command 0x46574c44
1,282,738 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,238 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,414 >>> mbox cmd response: success
2,852,627 UART: [afmc] ++
2,852,795 UART: [afmc] CDI.KEYID = 6
2,853,158 UART: [afmc] SUBJECT.KEYID = 7
2,853,584 UART: [afmc] AUTHORITY.KEYID = 5
2,888,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,645 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,361 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,244 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,949 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,849 UART: [afmc] --
2,931,911 UART: [cold-reset] --
2,932,805 UART: [state] Locking Datavault
2,933,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,532 UART: [state] Locking ICCM
2,935,112 UART: [exit] Launching FMC @ 0x40000130
2,940,442 UART:
2,940,458 UART: Running Caliptra FMC ...
2,940,866 UART:
2,940,920 UART: [state] CFI Enabled
2,951,332 UART: [fht] FMC Alias Private Key: 7
3,069,737 UART: [art] Extend RT PCRs Done
3,070,165 UART: [art] Lock RT PCRs Done
3,071,727 UART: [art] Populate DV Done
3,079,919 UART: [fht] FMC Alias Private Key: 7
3,081,085 UART: [art] Derive CDI
3,081,365 UART: [art] Store in slot 0x4
3,167,016 UART: [art] Derive Key Pair
3,167,376 UART: [art] Store priv key in slot 0x5
3,180,796 UART: [art] Derive Key Pair - Done
3,195,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,663 UART: [art] PUB.X = 647170B7EC84FB664FF7180B5BBCCFF90402ADC4BD4AFF4DE165324896B2A0F2F45FA58E1BA508E467F615437F60E3A7
3,218,435 UART: [art] PUB.Y = 956E494EC36563BC249B247DE6E3D345ADA0BE72A7303327332FB93C6A9730A8A2A48295CCAC5ECC4E0F8156FA3CAB5A
3,225,396 UART: [art] SIG.R = ECCF1253549B65A2AEDD6E737B0C1A766BFABED73EDF3835BEAC8DB2D1E34D58864235A45EC4E693AE3E12E5CC72292B
3,232,187 UART: [art] SIG.S = 40DB9FA477BFB835040145217368BD0B4A4527986B1851D78313488CC652BA04D28D6A8C588CEF566C7B7A6E7B5352A8
3,256,021 UART: Caliptra RT
3,256,272 UART: [state] CFI Enabled
3,375,956 UART: [rt] RT listening for mailbox commands...
3,376,620 writing to cptra_bootfsm_go
3,376,712 UART:
3,376,728 UART: Running Caliptra ROM ...
3,377,136 UART:
3,377,191 UART: [state] CFI Enabled
3,380,242 UART: [state] LifecycleState = Production
3,380,850 UART: [state] DebugLocked = Yes
3,381,424 UART: [state] Starting the WD Timer 40000000 cycles
3,382,911 UART: [kat] SHA2-256
4,186,461 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,190,565 UART: [kat] ++
4,190,717 UART: [kat] sha1
4,195,009 UART: [kat] SHA2-256
4,196,949 UART: [kat] SHA2-384
4,199,706 UART: [kat] SHA2-512-ACC
4,201,607 UART: [kat] ECC-384
4,211,580 UART: [kat] HMAC-384Kdf
4,216,112 UART: [kat] LMS
4,464,424 UART: [kat] --
4,465,362 UART: [warm-reset] ++
4,466,391 UART: [warm-reset] --
4,467,322 UART: [state] Locking Datavault
4,468,242 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,846 UART: [state] Locking ICCM
4,469,474 UART: [exit] Launching FMC @ 0x40000130
4,474,804 UART:
4,474,820 UART: Running Caliptra FMC ...
4,475,228 UART:
4,475,282 UART: [state] CFI Enabled
4,476,555 UART: [art] Skip pcr extension
4,476,964 UART: [art] Extend RT PCRs Done
4,477,392 UART: [art] Lock RT PCRs Done
4,478,503 UART: [art] Populate DV Done
4,486,683 UART: [fht] FMC Alias Private Key: 7
4,487,851 UART: [art] Derive CDI
4,488,131 UART: [art] Store in slot 0x4
4,573,938 UART: [art] Derive Key Pair
4,574,298 UART: [art] Store priv key in slot 0x5
4,587,600 UART: [art] Derive Key Pair - Done
4,601,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,617,428 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,193 UART: [art] PUB.X = 647170B7EC84FB664FF7180B5BBCCFF90402ADC4BD4AFF4DE165324896B2A0F2F45FA58E1BA508E467F615437F60E3A7
4,624,965 UART: [art] PUB.Y = 956E494EC36563BC249B247DE6E3D345ADA0BE72A7303327332FB93C6A9730A8A2A48295CCAC5ECC4E0F8156FA3CAB5A
4,631,926 UART: [art] SIG.R = ECCF1253549B65A2AEDD6E737B0C1A766BFABED73EDF3835BEAC8DB2D1E34D58864235A45EC4E693AE3E12E5CC72292B
4,638,717 UART: [art] SIG.S = 40DB9FA477BFB835040145217368BD0B4A4527986B1851D78313488CC652BA04D28D6A8C588CEF566C7B7A6E7B5352A8
4,662,323 UART: Caliptra RT
4,662,574 UART: [state] CFI Enabled
5,028,865 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Production
85,608 UART: [state] DebugLocked = Yes
86,294 UART: [state] Starting the WD Timer 40000000 cycles
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,692 UART: [kat] HMAC-384Kdf
920,278 UART: [kat] LMS
1,168,590 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,218 UART: [fht] FHT @ 0x50003400
1,172,962 UART: [idev] ++
1,173,130 UART: [idev] CDI.KEYID = 6
1,173,491 UART: [idev] SUBJECT.KEYID = 7
1,173,916 UART: [idev] UDS.KEYID = 0
1,174,262 ready_for_fw is high
1,174,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,382 UART: [idev] Erasing UDS.KEYID = 0
1,199,315 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,335 UART: [ldev] ++
1,209,503 UART: [ldev] CDI.KEYID = 6
1,209,867 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,845 UART: [ldev] Erasing FE.KEYID = 1
1,242,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,734 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,428 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,298 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,004 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,164 UART: [ldev] --
1,282,595 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,953 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,919 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,119 >>> mbox cmd response: success
2,852,246 UART: [afmc] ++
2,852,414 UART: [afmc] CDI.KEYID = 6
2,852,777 UART: [afmc] SUBJECT.KEYID = 7
2,853,203 UART: [afmc] AUTHORITY.KEYID = 5
2,888,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,245 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,994 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,710 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,593 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,298 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,028 UART: [afmc] --
2,932,000 UART: [cold-reset] --
2,932,764 UART: [state] Locking Datavault
2,933,767 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,371 UART: [state] Locking ICCM
2,934,973 UART: [exit] Launching FMC @ 0x40000130
2,940,303 UART:
2,940,319 UART: Running Caliptra FMC ...
2,940,727 UART:
2,940,870 UART: [state] CFI Enabled
2,951,750 UART: [fht] FMC Alias Private Key: 7
3,070,355 UART: [art] Extend RT PCRs Done
3,070,783 UART: [art] Lock RT PCRs Done
3,072,327 UART: [art] Populate DV Done
3,080,205 UART: [fht] FMC Alias Private Key: 7
3,081,325 UART: [art] Derive CDI
3,081,605 UART: [art] Store in slot 0x4
3,167,382 UART: [art] Derive Key Pair
3,167,742 UART: [art] Store priv key in slot 0x5
3,180,920 UART: [art] Derive Key Pair - Done
3,195,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,819 UART: [art] PUB.X = B965A9DFEA5C1EA8038C40245E931FA8F81156884E1C9B9417159683E3429151A6D3A2D5F79E68BBE86B0ADAD9AD60A6
3,218,591 UART: [art] PUB.Y = 266A4640BB43F8A66E307F633359EBB034ACB7B85FDAE61C81622D65A59B4B391D52480DC3526E5327545761977CA4F8
3,225,536 UART: [art] SIG.R = 56573D45FA88CF03E94C965C56D10B7042DAB89D7760C1263FF89876C1C80D8D76A9D598AEA827DBEE6A1BBDE6464ED6
3,232,309 UART: [art] SIG.S = EC9EABF92F4E59398A27D7CB28BAF6A514707A37AAD50880E80846E667F71424EAF123FF47F2445F27B03C7B3861DBDC
3,256,371 UART: Caliptra RT
3,256,714 UART: [state] CFI Enabled
3,376,910 UART: [rt] RT listening for mailbox commands...
3,377,574 writing to cptra_bootfsm_go
3,377,666 UART:
3,377,682 UART: Running Caliptra ROM ...
3,378,090 UART:
3,378,232 UART: [state] CFI Enabled
3,381,217 UART: [state] LifecycleState = Production
3,381,825 UART: [state] DebugLocked = Yes
3,382,481 UART: [state] Starting the WD Timer 40000000 cycles
3,384,142 UART: [kat] SHA2-256
4,187,692 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,796 UART: [kat] ++
4,191,948 UART: [kat] sha1
4,196,220 UART: [kat] SHA2-256
4,198,160 UART: [kat] SHA2-384
4,200,817 UART: [kat] SHA2-512-ACC
4,202,718 UART: [kat] ECC-384
4,212,517 UART: [kat] HMAC-384Kdf
4,217,165 UART: [kat] LMS
4,465,477 UART: [kat] --
4,466,233 UART: [warm-reset] ++
4,467,174 UART: [warm-reset] --
4,468,119 UART: [state] Locking Datavault
4,468,925 UART: [state] Locking PCR0, PCR1 and PCR31
4,469,529 UART: [state] Locking ICCM
4,469,961 UART: [exit] Launching FMC @ 0x40000130
4,475,291 UART:
4,475,307 UART: Running Caliptra FMC ...
4,475,715 UART:
4,475,858 UART: [state] CFI Enabled
4,477,087 UART: [art] Skip pcr extension
4,477,496 UART: [art] Extend RT PCRs Done
4,477,924 UART: [art] Lock RT PCRs Done
4,479,137 UART: [art] Populate DV Done
4,487,441 UART: [fht] FMC Alias Private Key: 7
4,488,557 UART: [art] Derive CDI
4,488,837 UART: [art] Store in slot 0x4
4,574,546 UART: [art] Derive Key Pair
4,574,906 UART: [art] Store priv key in slot 0x5
4,588,294 UART: [art] Derive Key Pair - Done
4,602,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,114 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,879 UART: [art] PUB.X = B965A9DFEA5C1EA8038C40245E931FA8F81156884E1C9B9417159683E3429151A6D3A2D5F79E68BBE86B0ADAD9AD60A6
4,625,651 UART: [art] PUB.Y = 266A4640BB43F8A66E307F633359EBB034ACB7B85FDAE61C81622D65A59B4B391D52480DC3526E5327545761977CA4F8
4,632,596 UART: [art] SIG.R = 56573D45FA88CF03E94C965C56D10B7042DAB89D7760C1263FF89876C1C80D8D76A9D598AEA827DBEE6A1BBDE6464ED6
4,639,369 UART: [art] SIG.S = EC9EABF92F4E59398A27D7CB28BAF6A514707A37AAD50880E80846E667F71424EAF123FF47F2445F27B03C7B3861DBDC
4,663,083 UART: Caliptra RT
4,663,426 UART: [state] CFI Enabled
5,029,367 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Production
85,622 UART: [state] DebugLocked = Yes
86,144 UART: [state] Starting the WD Timer 40000000 cycles
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,678 UART: [kat] LMS
1,168,990 UART: [kat] --
1,169,925 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,078 UART: [idev] ++
1,173,246 UART: [idev] CDI.KEYID = 6
1,173,607 UART: [idev] SUBJECT.KEYID = 7
1,174,032 UART: [idev] UDS.KEYID = 0
1,174,378 ready_for_fw is high
1,174,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,199,397 UART: [idev] Sha1 KeyId Algorithm
1,208,288 UART: [idev] --
1,209,197 UART: [ldev] ++
1,209,365 UART: [ldev] CDI.KEYID = 6
1,209,729 UART: [ldev] SUBJECT.KEYID = 5
1,210,156 UART: [ldev] AUTHORITY.KEYID = 7
1,210,619 UART: [ldev] FE.KEYID = 1
1,215,951 UART: [ldev] Erasing FE.KEYID = 1
1,241,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,276 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,146 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,852 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,854 UART: [ldev] --
1,281,179 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,274 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,791 >>> mbox cmd response: success
2,851,020 UART: [afmc] ++
2,851,188 UART: [afmc] CDI.KEYID = 6
2,851,551 UART: [afmc] SUBJECT.KEYID = 7
2,851,977 UART: [afmc] AUTHORITY.KEYID = 5
2,888,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,184 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,900 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,783 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,488 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,128 UART: [afmc] --
2,931,018 UART: [cold-reset] --
2,931,870 UART: [state] Locking Datavault
2,932,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,595 UART: [state] Locking ICCM
2,934,159 UART: [exit] Launching FMC @ 0x40000130
2,939,489 UART:
2,939,505 UART: Running Caliptra FMC ...
2,939,913 UART:
2,940,056 UART: [state] CFI Enabled
2,950,390 UART: [fht] FMC Alias Private Key: 7
3,069,873 UART: [art] Extend RT PCRs Done
3,070,301 UART: [art] Lock RT PCRs Done
3,071,757 UART: [art] Populate DV Done
3,079,679 UART: [fht] FMC Alias Private Key: 7
3,080,685 UART: [art] Derive CDI
3,080,965 UART: [art] Store in slot 0x4
3,166,202 UART: [art] Derive Key Pair
3,166,562 UART: [art] Store priv key in slot 0x5
3,179,972 UART: [art] Derive Key Pair - Done
3,195,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,804 UART: [art] PUB.X = 32479CD1A1F95E0A885A2214B0DA5D1B334DAC6F2D0F3E862CEB45287C91873FF58BE2DE82D7DBE302879FD8A69D4783
3,217,577 UART: [art] PUB.Y = 6785F325BDB597DAC5F1E34DDDFBD6C4B0BD97E69CD71CA4D1B6E964C41EE35BEB52CFBB774F4B30D41368198C07E3F1
3,224,548 UART: [art] SIG.R = A2E883D9BB5DB73F6B3B1CE4F5072E437D4B875CF5AEA9CFEBA5C10B52885B41128E6F394A1C9B3D51C48D8706A6ACC0
3,231,329 UART: [art] SIG.S = 4F2852A43D409B5E58FBE2B3E39D46EA2BC6ABB08221BD13E4097BE2A934FE64E7B928261CD53E198050F4C771E6ACB3
3,255,240 UART: Caliptra RT
3,255,583 UART: [state] CFI Enabled
3,376,873 UART: [rt] RT listening for mailbox commands...
3,377,537 writing to cptra_bootfsm_go
3,377,629 UART:
3,377,645 UART: Running Caliptra ROM ...
3,378,053 UART:
3,378,195 UART: [state] CFI Enabled
3,380,644 UART: [state] LifecycleState = Production
3,381,252 UART: [state] DebugLocked = Yes
3,381,878 UART: [state] Starting the WD Timer 40000000 cycles
3,383,387 UART: [kat] SHA2-256
4,186,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,041 UART: [kat] ++
4,191,193 UART: [kat] sha1
4,195,583 UART: [kat] SHA2-256
4,197,523 UART: [kat] SHA2-384
4,200,330 UART: [kat] SHA2-512-ACC
4,202,231 UART: [kat] ECC-384
4,211,962 UART: [kat] HMAC-384Kdf
4,216,710 UART: [kat] LMS
4,465,022 UART: [kat] --
4,465,782 UART: [warm-reset] ++
4,466,529 UART: [warm-reset] --
4,467,274 UART: [state] Locking Datavault
4,468,074 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,678 UART: [state] Locking ICCM
4,469,158 UART: [exit] Launching FMC @ 0x40000130
4,474,488 UART:
4,474,504 UART: Running Caliptra FMC ...
4,474,912 UART:
4,475,055 UART: [state] CFI Enabled
4,476,252 UART: [art] Skip pcr extension
4,476,661 UART: [art] Extend RT PCRs Done
4,477,089 UART: [art] Lock RT PCRs Done
4,477,942 UART: [art] Populate DV Done
4,485,974 UART: [fht] FMC Alias Private Key: 7
4,486,974 UART: [art] Derive CDI
4,487,254 UART: [art] Store in slot 0x4
4,572,871 UART: [art] Derive Key Pair
4,573,231 UART: [art] Store priv key in slot 0x5
4,586,633 UART: [art] Derive Key Pair - Done
4,601,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,830 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,595 UART: [art] PUB.X = 32479CD1A1F95E0A885A2214B0DA5D1B334DAC6F2D0F3E862CEB45287C91873FF58BE2DE82D7DBE302879FD8A69D4783
4,624,368 UART: [art] PUB.Y = 6785F325BDB597DAC5F1E34DDDFBD6C4B0BD97E69CD71CA4D1B6E964C41EE35BEB52CFBB774F4B30D41368198C07E3F1
4,631,339 UART: [art] SIG.R = A2E883D9BB5DB73F6B3B1CE4F5072E437D4B875CF5AEA9CFEBA5C10B52885B41128E6F394A1C9B3D51C48D8706A6ACC0
4,638,120 UART: [art] SIG.S = 4F2852A43D409B5E58FBE2B3E39D46EA2BC6ABB08221BD13E4097BE2A934FE64E7B928261CD53E198050F4C771E6ACB3
4,662,525 UART: Caliptra RT
4,662,868 UART: [state] CFI Enabled
5,029,693 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_warm_reset_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,536 UART:
191,896 UART: Running Caliptra ROM ...
193,058 UART:
193,218 UART: [state] CFI Enabled
262,652 UART: [state] LifecycleState = Production
264,471 UART: [state] DebugLocked = Yes
266,692 UART: [state] Starting the WD Timer 40000000 cycles
270,800 UART: [kat] SHA2-256
450,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,249 UART: [kat] ++
461,782 UART: [kat] sha1
473,259 UART: [kat] SHA2-256
475,917 UART: [kat] SHA2-384
481,128 UART: [kat] SHA2-512-ACC
483,502 UART: [kat] ECC-384
2,947,672 UART: [kat] HMAC-384Kdf
2,969,312 UART: [kat] LMS
3,445,779 UART: [kat] --
3,450,992 UART: [cold-reset] ++
3,453,665 UART: [fht] FHT @ 0x50003400
3,464,373 UART: [idev] ++
3,465,024 UART: [idev] CDI.KEYID = 6
3,465,943 UART: [idev] SUBJECT.KEYID = 7
3,467,198 UART: [idev] UDS.KEYID = 0
3,468,136 ready_for_fw is high
3,468,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,441 UART: [idev] Erasing UDS.KEYID = 0
5,985,232 UART: [idev] Sha1 KeyId Algorithm
6,009,281 UART: [idev] --
6,012,876 UART: [ldev] ++
6,013,474 UART: [ldev] CDI.KEYID = 6
6,014,385 UART: [ldev] SUBJECT.KEYID = 5
6,015,611 UART: [ldev] AUTHORITY.KEYID = 7
6,016,910 UART: [ldev] FE.KEYID = 1
6,055,525 UART: [ldev] Erasing FE.KEYID = 1
8,561,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,484 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,312,256 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,328,130 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,343,952 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,364,574 UART: [ldev] --
10,370,282 UART: [fwproc] Wait for Commands...
10,372,434 UART: [fwproc] Recv command 0x46574c44
10,374,475 UART: [fwproc] Recv'd Img size: 118548 bytes
13,885,307 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,036,483 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,365,634 >>> mbox cmd response: success
14,369,034 UART: [afmc] ++
14,369,643 UART: [afmc] CDI.KEYID = 6
14,370,533 UART: [afmc] SUBJECT.KEYID = 7
14,371,754 UART: [afmc] AUTHORITY.KEYID = 5
16,915,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,657,401 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,659,589 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,675,497 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,691,492 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,707,154 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,732,114 UART: [afmc] --
18,735,311 UART: [cold-reset] --
18,738,697 UART: [state] Locking Datavault
18,742,812 UART: [state] Locking PCR0, PCR1 and PCR31
18,744,568 UART: [state] Locking ICCM
18,745,995 UART: [exit] Launching FMC @ 0x40000130
18,754,449 UART:
18,754,701 UART: Running Caliptra FMC ...
18,755,811 UART:
18,755,974 UART: [state] CFI Enabled
18,816,292 UART: [fht] FMC Alias Private Key: 7
20,582,297 UART: [art] Extend RT PCRs Done
20,583,516 UART: [art] Lock RT PCRs Done
20,585,386 UART: [art] Populate DV Done
20,591,014 UART: [fht] FMC Alias Private Key: 7
20,592,663 UART: [art] Derive CDI
20,593,407 UART: [art] Store in slot 0x4
20,648,554 UART: [art] Derive Key Pair
20,649,734 UART: [art] Store priv key in slot 0x5
23,112,214 UART: [art] Derive Key Pair - Done
23,125,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,838,266 UART: [art] Erasing AUTHORITY.KEYID = 7
24,839,769 UART: [art] PUB.X = 11EE14A2E523D84A9A484FFE97AD9A7B6D105BBF65AC3A5C9E16A4FF89E87643336DE77173101107079385FE712D209C
24,847,030 UART: [art] PUB.Y = B86E693C41EE3ED33786AF25ECF2113B22087515EE391977527874AB0BD6C9FB826F789B761CE919AC89F1C7F9561F57
24,854,274 UART: [art] SIG.R = DC70FDAC4426C87BD75D92F4E05FA50E2789768B8F27AE42602BDBE661A918DBAECB71AC370771611F8FC8C7A5ECAE5F
24,861,673 UART: [art] SIG.S = 5186F34901D455043F12D786F90A50D6962F3B5A6EE0C324092C84C26BCD2F2AC51F3F40E8FA10973C2C83C7995720DF
25,840,696 UART: Caliptra RT
25,841,393 UART: [state] CFI Enabled
26,019,790 UART: [rt] RT listening for mailbox commands...
26,021,644 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,051,421 UART: [rt]cmd =0x46505652, len=4
26,052,672 UART: [rt] FIPS Version
26,053,785 >>> mbox cmd response data (36 bytes)
298 writing to cptra_bootfsm_go
608 UART:
758 UART: Running Caliptra ROM ...
1,761 UART:
1,927 UART: [state] CFI Enabled
65,228 UART: [state] LifecycleState = Production
67,051 UART: [state] DebugLocked = Yes
69,314 UART: [state] Starting the WD Timer 40000000 cycles
74,742 UART: [kat] SHA2-256
254,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
265,232 UART: [kat] ++
265,679 UART: [kat] sha1
276,666 UART: [kat] SHA2-256
279,338 UART: [kat] SHA2-384
285,969 UART: [kat] SHA2-512-ACC
288,367 UART: [kat] ECC-384
2,745,507 UART: [kat] HMAC-384Kdf
2,765,941 UART: [kat] LMS
3,242,443 UART: [kat] --
3,246,027 UART: [warm-reset] ++
3,249,613 UART: [warm-reset] --
3,253,917 UART: [state] Locking Datavault
3,255,664 UART: [state] Locking PCR0, PCR1 and PCR31
3,257,428 UART: [state] Locking ICCM
3,260,018 UART: [exit] Launching FMC @ 0x40000130
3,268,427 UART:
3,268,678 UART: Running Caliptra FMC ...
3,269,785 UART:
3,269,956 UART: [state] CFI Enabled
3,333,585 UART: [art] Skip pcr extension
3,334,738 UART: [art] Extend RT PCRs Done
3,335,895 UART: [art] Lock RT PCRs Done
3,337,353 UART: [art] Populate DV Done
3,342,988 UART: [fht] FMC Alias Private Key: 7
3,344,530 UART: [art] Derive CDI
3,345,270 UART: [art] Store in slot 0x4
3,402,714 UART: [art] Derive Key Pair
3,403,759 UART: [art] Store priv key in slot 0x5
5,866,267 UART: [art] Derive Key Pair - Done
5,879,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,591,685 UART: [art] Erasing AUTHORITY.KEYID = 7
7,593,207 UART: [art] PUB.X = 11EE14A2E523D84A9A484FFE97AD9A7B6D105BBF65AC3A5C9E16A4FF89E87643336DE77173101107079385FE712D209C
7,600,468 UART: [art] PUB.Y = B86E693C41EE3ED33786AF25ECF2113B22087515EE391977527874AB0BD6C9FB826F789B761CE919AC89F1C7F9561F57
7,607,726 UART: [art] SIG.R = DC70FDAC4426C87BD75D92F4E05FA50E2789768B8F27AE42602BDBE661A918DBAECB71AC370771611F8FC8C7A5ECAE5F
7,615,138 UART: [art] SIG.S = 5186F34901D455043F12D786F90A50D6962F3B5A6EE0C324092C84C26BCD2F2AC51F3F40E8FA10973C2C83C7995720DF
8,594,202 UART: Caliptra RT
8,595,064 UART: [state] CFI Enabled
9,019,086 UART: [rt] RT listening for mailbox commands...
9,020,940 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,050,842 UART: [rt]cmd =0x46505652, len=4
9,052,102 UART: [rt] FIPS Version
9,053,110 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
191,499 UART:
191,866 UART: Running Caliptra ROM ...
192,983 UART:
193,127 UART: [state] CFI Enabled
265,515 UART: [state] LifecycleState = Production
267,341 UART: [state] DebugLocked = Yes
270,180 UART: [state] Starting the WD Timer 40000000 cycles
275,851 UART: [kat] SHA2-256
455,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,312 UART: [kat] ++
466,779 UART: [kat] sha1
478,824 UART: [kat] SHA2-256
481,489 UART: [kat] SHA2-384
486,276 UART: [kat] SHA2-512-ACC
488,650 UART: [kat] ECC-384
2,948,121 UART: [kat] HMAC-384Kdf
2,970,023 UART: [kat] LMS
3,446,529 UART: [kat] --
3,450,902 UART: [cold-reset] ++
3,452,554 UART: [fht] FHT @ 0x50003400
3,464,708 UART: [idev] ++
3,465,314 UART: [idev] CDI.KEYID = 6
3,466,236 UART: [idev] SUBJECT.KEYID = 7
3,467,492 UART: [idev] UDS.KEYID = 0
3,468,404 ready_for_fw is high
3,468,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,706 UART: [idev] Erasing UDS.KEYID = 0
5,985,301 UART: [idev] Sha1 KeyId Algorithm
6,009,905 UART: [idev] --
6,015,690 UART: [ldev] ++
6,016,522 UART: [ldev] CDI.KEYID = 6
6,017,450 UART: [ldev] SUBJECT.KEYID = 5
6,018,565 UART: [ldev] AUTHORITY.KEYID = 7
6,019,750 UART: [ldev] FE.KEYID = 1
6,048,335 UART: [ldev] Erasing FE.KEYID = 1
8,555,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,289,615 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,305,391 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,321,268 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,337,080 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,359,162 UART: [ldev] --
10,365,350 UART: [fwproc] Wait for Commands...
10,368,171 UART: [fwproc] Recv command 0x46574c44
10,370,160 UART: [fwproc] Recv'd Img size: 118548 bytes
13,882,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,963,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,036,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,363,829 >>> mbox cmd response: success
14,368,384 UART: [afmc] ++
14,368,969 UART: [afmc] CDI.KEYID = 6
14,369,993 UART: [afmc] SUBJECT.KEYID = 7
14,371,156 UART: [afmc] AUTHORITY.KEYID = 5
16,901,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,361 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,593 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,663,483 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,679,462 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,695,155 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,720,377 UART: [afmc] --
18,724,014 UART: [cold-reset] --
18,727,286 UART: [state] Locking Datavault
18,733,396 UART: [state] Locking PCR0, PCR1 and PCR31
18,735,095 UART: [state] Locking ICCM
18,737,187 UART: [exit] Launching FMC @ 0x40000130
18,745,630 UART:
18,745,887 UART: Running Caliptra FMC ...
18,746,919 UART:
18,747,076 UART: [state] CFI Enabled
18,800,418 UART: [fht] FMC Alias Private Key: 7
20,566,704 UART: [art] Extend RT PCRs Done
20,567,926 UART: [art] Lock RT PCRs Done
20,569,591 UART: [art] Populate DV Done
20,575,116 UART: [fht] FMC Alias Private Key: 7
20,576,692 UART: [art] Derive CDI
20,577,462 UART: [art] Store in slot 0x4
20,633,130 UART: [art] Derive Key Pair
20,634,134 UART: [art] Store priv key in slot 0x5
23,097,073 UART: [art] Derive Key Pair - Done
23,109,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,872 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,374 UART: [art] PUB.X = FB8360384DE0E234CD0D1BEC34F8B4830049DE11103787FF9DA151B8128A63FDF09999549796DDC200C12514CF804117
24,831,592 UART: [art] PUB.Y = 5CC340C1DA1B5B5BA69ED8C90AAFF3D3240B49C73777E7AF299A25DC9D0767BA25043C152C57791967AFBE3A9217F06F
24,838,856 UART: [art] SIG.R = DD3BEB2F65DE6CC56304487D81FCFC7D0D93AC39B011B4B240323D208D1CCA811F6AD75DAC2801151617E02B323F8362
24,846,277 UART: [art] SIG.S = 69DA72173D64D112E7437D2B60D701C0D12840A891CE082BC5AD52F429E0373CCE3C19544FF43547DE34A6489DF82CB5
25,824,607 UART: Caliptra RT
25,825,309 UART: [state] CFI Enabled
26,004,693 UART: [rt] RT listening for mailbox commands...
26,006,564 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,036,240 UART: [rt]cmd =0x46505652, len=4
26,037,528 UART: [rt] FIPS Version
26,038,673 >>> mbox cmd response data (36 bytes)
301 writing to cptra_bootfsm_go
520 UART:
666 UART: Running Caliptra ROM ...
1,784 UART:
1,949 UART: [state] CFI Enabled
57,834 UART: [state] LifecycleState = Production
59,659 UART: [state] DebugLocked = Yes
62,540 UART: [state] Starting the WD Timer 40000000 cycles
66,626 UART: [kat] SHA2-256
246,273 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
257,091 UART: [kat] ++
257,635 UART: [kat] sha1
268,796 UART: [kat] SHA2-256
271,482 UART: [kat] SHA2-384
276,870 UART: [kat] SHA2-512-ACC
279,293 UART: [kat] ECC-384
2,743,800 UART: [kat] HMAC-384Kdf
2,765,915 UART: [kat] LMS
3,242,394 UART: [kat] --
3,248,303 UART: [warm-reset] ++
3,252,944 UART: [warm-reset] --
3,257,138 UART: [state] Locking Datavault
3,259,406 UART: [state] Locking PCR0, PCR1 and PCR31
3,261,121 UART: [state] Locking ICCM
3,262,632 UART: [exit] Launching FMC @ 0x40000130
3,271,035 UART:
3,271,278 UART: Running Caliptra FMC ...
3,272,386 UART:
3,272,553 UART: [state] CFI Enabled
3,333,744 UART: [art] Skip pcr extension
3,334,861 UART: [art] Extend RT PCRs Done
3,336,032 UART: [art] Lock RT PCRs Done
3,337,400 UART: [art] Populate DV Done
3,342,906 UART: [fht] FMC Alias Private Key: 7
3,344,628 UART: [art] Derive CDI
3,345,450 UART: [art] Store in slot 0x4
3,402,545 UART: [art] Derive Key Pair
3,403,549 UART: [art] Store priv key in slot 0x5
5,865,761 UART: [art] Derive Key Pair - Done
5,878,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,591,844 UART: [art] Erasing AUTHORITY.KEYID = 7
7,593,369 UART: [art] PUB.X = FB8360384DE0E234CD0D1BEC34F8B4830049DE11103787FF9DA151B8128A63FDF09999549796DDC200C12514CF804117
7,600,552 UART: [art] PUB.Y = 5CC340C1DA1B5B5BA69ED8C90AAFF3D3240B49C73777E7AF299A25DC9D0767BA25043C152C57791967AFBE3A9217F06F
7,607,848 UART: [art] SIG.R = DD3BEB2F65DE6CC56304487D81FCFC7D0D93AC39B011B4B240323D208D1CCA811F6AD75DAC2801151617E02B323F8362
7,615,253 UART: [art] SIG.S = 69DA72173D64D112E7437D2B60D701C0D12840A891CE082BC5AD52F429E0373CCE3C19544FF43547DE34A6489DF82CB5
8,594,659 UART: Caliptra RT
8,595,369 UART: [state] CFI Enabled
9,021,104 UART: [rt] RT listening for mailbox commands...
9,022,959 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
9,052,575 UART: [rt]cmd =0x46505652, len=4
9,053,838 UART: [rt] FIPS Version
9,054,957 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
191,831 UART:
192,196 UART: Running Caliptra ROM ...
193,277 UART:
602,978 UART: [state] CFI Enabled
620,839 UART: [state] LifecycleState = Production
622,610 UART: [state] DebugLocked = Yes
624,803 UART: [state] Starting the WD Timer 40000000 cycles
629,961 UART: [kat] SHA2-256
809,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,405 UART: [kat] ++
820,851 UART: [kat] sha1
832,073 UART: [kat] SHA2-256
834,753 UART: [kat] SHA2-384
841,602 UART: [kat] SHA2-512-ACC
843,972 UART: [kat] ECC-384
3,286,385 UART: [kat] HMAC-384Kdf
3,297,703 UART: [kat] LMS
3,774,215 UART: [kat] --
3,777,366 UART: [cold-reset] ++
3,779,253 UART: [fht] FHT @ 0x50003400
3,792,008 UART: [idev] ++
3,792,586 UART: [idev] CDI.KEYID = 6
3,793,506 UART: [idev] SUBJECT.KEYID = 7
3,794,752 UART: [idev] UDS.KEYID = 0
3,795,672 ready_for_fw is high
3,795,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,680 UART: [idev] Erasing UDS.KEYID = 0
6,273,871 UART: [idev] Sha1 KeyId Algorithm
6,297,682 UART: [idev] --
6,304,217 UART: [ldev] ++
6,304,800 UART: [ldev] CDI.KEYID = 6
6,305,708 UART: [ldev] SUBJECT.KEYID = 5
6,306,923 UART: [ldev] AUTHORITY.KEYID = 7
6,308,206 UART: [ldev] FE.KEYID = 1
6,319,689 UART: [ldev] Erasing FE.KEYID = 1
8,798,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,424 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,535,186 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,551,051 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,566,806 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,589,158 UART: [ldev] --
10,593,837 UART: [fwproc] Wait for Commands...
10,596,468 UART: [fwproc] Recv command 0x46574c44
10,598,503 UART: [fwproc] Recv'd Img size: 118548 bytes
14,110,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,183,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,256,850 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,585,001 >>> mbox cmd response: success
14,588,355 UART: [afmc] ++
14,588,964 UART: [afmc] CDI.KEYID = 6
14,589,846 UART: [afmc] SUBJECT.KEYID = 7
14,591,114 UART: [afmc] AUTHORITY.KEYID = 5
17,094,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,815,104 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,817,290 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,833,207 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,849,198 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,864,854 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,889,359 UART: [afmc] --
18,893,642 UART: [cold-reset] --
18,897,258 UART: [state] Locking Datavault
18,902,545 UART: [state] Locking PCR0, PCR1 and PCR31
18,904,258 UART: [state] Locking ICCM
18,906,327 UART: [exit] Launching FMC @ 0x40000130
18,914,776 UART:
18,915,010 UART: Running Caliptra FMC ...
18,916,037 UART:
18,916,183 UART: [state] CFI Enabled
18,924,227 UART: [fht] FMC Alias Private Key: 7
20,690,743 UART: [art] Extend RT PCRs Done
20,691,971 UART: [art] Lock RT PCRs Done
20,693,514 UART: [art] Populate DV Done
20,699,033 UART: [fht] FMC Alias Private Key: 7
20,700,628 UART: [art] Derive CDI
20,701,364 UART: [art] Store in slot 0x4
20,744,061 UART: [art] Derive Key Pair
20,745,120 UART: [art] Store priv key in slot 0x5
23,171,821 UART: [art] Derive Key Pair - Done
23,184,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,890,476 UART: [art] Erasing AUTHORITY.KEYID = 7
24,891,983 UART: [art] PUB.X = 0A65CD2C097C8D102CA86FF15BFB8DBE769187507AFC8678562893C72167A06F68F9539A945935C2C5EE0480E17E39E0
24,899,248 UART: [art] PUB.Y = B3D2AE940F7E2EFC4361F9899919BC9C1908C0EC58D14A65362CC4C57984E3D0FB3ACDC24529B5410E9DCBC4D142AE94
24,906,496 UART: [art] SIG.R = E870238F87DC31377A40B858822AA99117DA9230B0EC7B06B98344E305687F37806CFBD9C812D096C3255C3835FE449A
24,913,889 UART: [art] SIG.S = BF7DCFBCE7263E2B19461B661B2C21F158A8742E7D5AE59404DF3ED6AEC5184BBA96F9C622F38ED10F37AEC3CB656B2A
25,892,252 UART: Caliptra RT
25,892,962 UART: [state] CFI Enabled
26,025,318 UART: [rt] RT listening for mailbox commands...
26,027,168 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,056,876 UART: [rt]cmd =0x46505652, len=4
26,058,120 UART: [rt] FIPS Version
26,059,387 >>> mbox cmd response data (36 bytes)
297 writing to cptra_bootfsm_go
631 UART:
784 UART: Running Caliptra ROM ...
1,876 UART:
14,457,928 UART: [state] CFI Enabled
14,470,623 UART: [state] LifecycleState = Production
14,472,431 UART: [state] DebugLocked = Yes
14,474,554 UART: [state] Starting the WD Timer 40000000 cycles
14,479,712 UART: [kat] SHA2-256
14,659,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,670,185 UART: [kat] ++
14,670,670 UART: [kat] sha1
14,682,097 UART: [kat] SHA2-256
14,684,775 UART: [kat] SHA2-384
14,691,253 UART: [kat] SHA2-512-ACC
14,693,654 UART: [kat] ECC-384
17,137,702 UART: [kat] HMAC-384Kdf
17,149,525 UART: [kat] LMS
17,625,998 UART: [kat] --
17,631,275 UART: [warm-reset] ++
17,636,396 UART: [warm-reset] --
17,640,925 UART: [state] Locking Datavault
17,643,434 UART: [state] Locking PCR0, PCR1 and PCR31
17,645,134 UART: [state] Locking ICCM
17,647,282 UART: [exit] Launching FMC @ 0x40000130
17,655,679 UART:
17,655,919 UART: Running Caliptra FMC ...
17,657,134 UART:
17,657,292 UART: [state] CFI Enabled
17,659,182 UART: [art] Skip pcr extension
17,660,283 UART: [art] Extend RT PCRs Done
17,661,424 UART: [art] Lock RT PCRs Done
17,662,596 UART: [art] Populate DV Done
17,668,124 UART: [fht] FMC Alias Private Key: 7
17,669,765 UART: [art] Derive CDI
17,670,574 UART: [art] Store in slot 0x4
17,713,220 UART: [art] Derive Key Pair
17,714,219 UART: [art] Store priv key in slot 0x5
20,141,764 UART: [art] Derive Key Pair - Done
20,154,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,860,918 UART: [art] Erasing AUTHORITY.KEYID = 7
21,862,413 UART: [art] PUB.X = 0A65CD2C097C8D102CA86FF15BFB8DBE769187507AFC8678562893C72167A06F68F9539A945935C2C5EE0480E17E39E0
21,869,659 UART: [art] PUB.Y = B3D2AE940F7E2EFC4361F9899919BC9C1908C0EC58D14A65362CC4C57984E3D0FB3ACDC24529B5410E9DCBC4D142AE94
21,877,047 UART: [art] SIG.R = E870238F87DC31377A40B858822AA99117DA9230B0EC7B06B98344E305687F37806CFBD9C812D096C3255C3835FE449A
21,884,357 UART: [art] SIG.S = BF7DCFBCE7263E2B19461B661B2C21F158A8742E7D5AE59404DF3ED6AEC5184BBA96F9C622F38ED10F37AEC3CB656B2A
22,863,160 UART: Caliptra RT
22,863,868 UART: [state] CFI Enabled
23,238,243 UART: [rt] RT listening for mailbox commands...
23,240,075 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,269,810 UART: [rt]cmd =0x46505652, len=4
23,271,058 UART: [rt] FIPS Version
23,272,379 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
191,822 UART:
192,199 UART: Running Caliptra ROM ...
193,378 UART:
603,160 UART: [state] CFI Enabled
616,903 UART: [state] LifecycleState = Production
618,716 UART: [state] DebugLocked = Yes
621,586 UART: [state] Starting the WD Timer 40000000 cycles
627,252 UART: [kat] SHA2-256
806,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,685 UART: [kat] ++
818,123 UART: [kat] sha1
829,939 UART: [kat] SHA2-256
832,663 UART: [kat] SHA2-384
837,868 UART: [kat] SHA2-512-ACC
840,233 UART: [kat] ECC-384
3,280,880 UART: [kat] HMAC-384Kdf
3,293,821 UART: [kat] LMS
3,770,309 UART: [kat] --
3,775,159 UART: [cold-reset] ++
3,776,518 UART: [fht] FHT @ 0x50003400
3,787,709 UART: [idev] ++
3,788,339 UART: [idev] CDI.KEYID = 6
3,789,276 UART: [idev] SUBJECT.KEYID = 7
3,790,523 UART: [idev] UDS.KEYID = 0
3,791,446 ready_for_fw is high
3,791,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,486 UART: [idev] Erasing UDS.KEYID = 0
6,270,201 UART: [idev] Sha1 KeyId Algorithm
6,294,861 UART: [idev] --
6,299,961 UART: [ldev] ++
6,300,586 UART: [ldev] CDI.KEYID = 6
6,301,461 UART: [ldev] SUBJECT.KEYID = 5
6,302,724 UART: [ldev] AUTHORITY.KEYID = 7
6,303,956 UART: [ldev] FE.KEYID = 1
6,317,298 UART: [ldev] Erasing FE.KEYID = 1
8,801,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,319 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,533,115 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,548,952 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,564,711 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,588,019 UART: [ldev] --
10,593,336 UART: [fwproc] Wait for Commands...
10,595,049 UART: [fwproc] Recv command 0x46574c44
10,597,035 UART: [fwproc] Recv'd Img size: 118548 bytes
14,120,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,200,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,273,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,600,993 >>> mbox cmd response: success
14,604,525 UART: [afmc] ++
14,605,137 UART: [afmc] CDI.KEYID = 6
14,606,049 UART: [afmc] SUBJECT.KEYID = 7
14,607,384 UART: [afmc] AUTHORITY.KEYID = 5
17,107,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,829,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,831,317 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
18,847,550 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
18,863,245 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
18,878,917 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
18,904,308 UART: [afmc] --
18,907,464 UART: [cold-reset] --
18,910,187 UART: [state] Locking Datavault
18,914,946 UART: [state] Locking PCR0, PCR1 and PCR31
18,916,692 UART: [state] Locking ICCM
18,918,888 UART: [exit] Launching FMC @ 0x40000130
18,927,246 UART:
18,927,525 UART: Running Caliptra FMC ...
18,928,631 UART:
18,928,791 UART: [state] CFI Enabled
18,937,383 UART: [fht] FMC Alias Private Key: 7
20,703,443 UART: [art] Extend RT PCRs Done
20,704,665 UART: [art] Lock RT PCRs Done
20,706,288 UART: [art] Populate DV Done
20,711,747 UART: [fht] FMC Alias Private Key: 7
20,713,442 UART: [art] Derive CDI
20,714,257 UART: [art] Store in slot 0x4
20,757,063 UART: [art] Derive Key Pair
20,758,062 UART: [art] Store priv key in slot 0x5
23,184,916 UART: [art] Derive Key Pair - Done
23,197,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,904,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,905,675 UART: [art] PUB.X = D677F503012CAA491D1CF6B179526A01E2DF2B6651CA2BD5122B0DBD75A88D2F99F27F540181504CE6C18B7F93633653
24,912,931 UART: [art] PUB.Y = FB0ABA5A1D08793C818E034FE54379EA146DE39DCD50825CEE042379402E56EF260EBA538955488F9D9942331C29BEB2
24,920,177 UART: [art] SIG.R = 3A5499323F28F0B222D017CC60B7944777279C61846241B8FB5445EA82F5B9B31D1652F705D3F7185A31491B2584AD49
24,927,561 UART: [art] SIG.S = EA0E5E03EC45D3D289C66CE777398F7634910890ADDE1C651BCFBD1564695930C0CA0CA883E4D72F5640EE15F508DE1A
25,906,343 UART: Caliptra RT
25,907,053 UART: [state] CFI Enabled
26,040,823 UART: [rt] RT listening for mailbox commands...
26,042,673 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,072,332 UART: [rt]cmd =0x46505652, len=4
26,073,620 UART: [rt] FIPS Version
26,074,999 >>> mbox cmd response data (36 bytes)
298 writing to cptra_bootfsm_go
602 UART:
748 UART: Running Caliptra ROM ...
1,834 UART:
14,457,953 UART: [state] CFI Enabled
14,476,646 UART: [state] LifecycleState = Production
14,478,445 UART: [state] DebugLocked = Yes
14,480,775 UART: [state] Starting the WD Timer 40000000 cycles
14,486,043 UART: [kat] SHA2-256
14,665,726 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,676,501 UART: [kat] ++
14,677,057 UART: [kat] sha1
14,687,518 UART: [kat] SHA2-256
14,690,199 UART: [kat] SHA2-384
14,696,047 UART: [kat] SHA2-512-ACC
14,698,414 UART: [kat] ECC-384
17,139,176 UART: [kat] HMAC-384Kdf
17,152,582 UART: [kat] LMS
17,629,051 UART: [kat] --
17,634,173 UART: [warm-reset] ++
17,639,398 UART: [warm-reset] --
17,641,692 UART: [state] Locking Datavault
17,645,043 UART: [state] Locking PCR0, PCR1 and PCR31
17,646,742 UART: [state] Locking ICCM
17,648,273 UART: [exit] Launching FMC @ 0x40000130
17,656,657 UART:
17,656,938 UART: Running Caliptra FMC ...
17,657,987 UART:
17,658,131 UART: [state] CFI Enabled
17,660,186 UART: [art] Skip pcr extension
17,661,287 UART: [art] Extend RT PCRs Done
17,662,421 UART: [art] Lock RT PCRs Done
17,663,481 UART: [art] Populate DV Done
17,669,205 UART: [fht] FMC Alias Private Key: 7
17,670,789 UART: [art] Derive CDI
17,671,598 UART: [art] Store in slot 0x4
17,713,913 UART: [art] Derive Key Pair
17,714,908 UART: [art] Store priv key in slot 0x5
20,141,995 UART: [art] Derive Key Pair - Done
20,155,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,861,771 UART: [art] Erasing AUTHORITY.KEYID = 7
21,863,262 UART: [art] PUB.X = D677F503012CAA491D1CF6B179526A01E2DF2B6651CA2BD5122B0DBD75A88D2F99F27F540181504CE6C18B7F93633653
21,870,560 UART: [art] PUB.Y = FB0ABA5A1D08793C818E034FE54379EA146DE39DCD50825CEE042379402E56EF260EBA538955488F9D9942331C29BEB2
21,877,762 UART: [art] SIG.R = 3A5499323F28F0B222D017CC60B7944777279C61846241B8FB5445EA82F5B9B31D1652F705D3F7185A31491B2584AD49
21,885,157 UART: [art] SIG.S = EA0E5E03EC45D3D289C66CE777398F7634910890ADDE1C651BCFBD1564695930C0CA0CA883E4D72F5640EE15F508DE1A
22,864,118 UART: Caliptra RT
22,864,815 UART: [state] CFI Enabled
23,238,604 UART: [rt] RT listening for mailbox commands...
23,240,482 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,270,382 UART: [rt]cmd =0x46505652, len=4
23,271,666 UART: [rt] FIPS Version
23,272,669 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Production
85,949 UART: [state] DebugLocked = Yes
86,557 UART: [state] Starting the WD Timer 40000000 cycles
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
900,132 UART: [kat] SHA2-256
902,072 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,454 UART: [cold-reset] ++
1,170,835 UART: [fht] FHT @ 0x50003400
1,173,653 UART: [idev] ++
1,173,821 UART: [idev] CDI.KEYID = 6
1,174,182 UART: [idev] SUBJECT.KEYID = 7
1,174,607 UART: [idev] UDS.KEYID = 0
1,174,953 ready_for_fw is high
1,174,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,711 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,209,135 UART: [idev] --
1,210,060 UART: [ldev] ++
1,210,228 UART: [ldev] CDI.KEYID = 6
1,210,592 UART: [ldev] SUBJECT.KEYID = 5
1,211,019 UART: [ldev] AUTHORITY.KEYID = 7
1,211,482 UART: [ldev] FE.KEYID = 1
1,216,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,611 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,305 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,175 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,881 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,031 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,107 UART: [fwproc] Recv command 0x46574c44
1,282,840 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,368 >>> mbox cmd response: success
2,852,625 UART: [afmc] ++
2,852,793 UART: [afmc] CDI.KEYID = 6
2,853,156 UART: [afmc] SUBJECT.KEYID = 7
2,853,582 UART: [afmc] AUTHORITY.KEYID = 5
2,888,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,173 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,885 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,774 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,481 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,149 UART: [afmc] --
2,932,201 UART: [cold-reset] --
2,933,181 UART: [state] Locking Datavault
2,934,268 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,872 UART: [state] Locking ICCM
2,935,424 UART: [exit] Launching FMC @ 0x40000130
2,940,754 UART:
2,940,770 UART: Running Caliptra FMC ...
2,941,178 UART:
2,941,232 UART: [state] CFI Enabled
2,951,558 UART: [fht] FMC Alias Private Key: 7
3,070,214 UART: [art] Extend RT PCRs Done
3,070,642 UART: [art] Lock RT PCRs Done
3,072,110 UART: [art] Populate DV Done
3,080,256 UART: [fht] FMC Alias Private Key: 7
3,081,412 UART: [art] Derive CDI
3,081,692 UART: [art] Store in slot 0x4
3,167,474 UART: [art] Derive Key Pair
3,167,834 UART: [art] Store priv key in slot 0x5
3,181,601 UART: [art] Derive Key Pair - Done
3,196,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,685 UART: [art] PUB.X = 643C69823C1EE1054705C631EFBD912732D28B8EEB86CB8F8B780AD2FEE9CB942C0B0EB0371790F1178D953FDE176F11
3,219,448 UART: [art] PUB.Y = D3F9EED762BA808BBBBE79882EAFC4734FA01499F01CEB2A74A4BCDF3C2CD6A045A6C8B57C04B8298E97624EA2477C46
3,226,415 UART: [art] SIG.R = 990703EFF691C6B58522C6F375A11879CB52D92327606BB1651A98D1F4FE6F82BF34189982E5EA6ACDC9CC08B72C42A6
3,233,180 UART: [art] SIG.S = E15B6B87EC3751B3B38D586A73A217E04FC378398BECB65ED9F49306B9919BD697B33F9985481D778A8E7442C4160DBE
3,256,766 UART: Caliptra RT
3,257,017 UART: [state] CFI Enabled
3,376,904 UART: [rt] RT listening for mailbox commands...
3,377,567 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,605 UART: [rt]cmd =0x46505652, len=4
3,408,265 UART: [rt] FIPS Version
3,409,154 >>> mbox cmd response data (36 bytes)
3,409,156 writing to cptra_bootfsm_go
3,409,248 UART:
3,409,264 UART: Running Caliptra ROM ...
3,409,672 UART:
3,409,727 UART: [state] CFI Enabled
3,412,134 UART: [state] LifecycleState = Production
3,412,742 UART: [state] DebugLocked = Yes
3,413,344 UART: [state] Starting the WD Timer 40000000 cycles
3,415,013 UART: [kat] SHA2-256
4,218,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,667 UART: [kat] ++
4,222,819 UART: [kat] sha1
4,226,937 UART: [kat] SHA2-256
4,228,877 UART: [kat] SHA2-384
4,231,722 UART: [kat] SHA2-512-ACC
4,233,623 UART: [kat] ECC-384
4,243,560 UART: [kat] HMAC-384Kdf
4,248,030 UART: [kat] LMS
4,496,342 UART: [kat] --
4,496,984 UART: [warm-reset] ++
4,497,859 UART: [warm-reset] --
4,498,910 UART: [state] Locking Datavault
4,499,738 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,342 UART: [state] Locking ICCM
4,500,838 UART: [exit] Launching FMC @ 0x40000130
4,506,168 UART:
4,506,184 UART: Running Caliptra FMC ...
4,506,592 UART:
4,506,646 UART: [state] CFI Enabled
4,507,837 UART: [art] Skip pcr extension
4,508,246 UART: [art] Extend RT PCRs Done
4,508,674 UART: [art] Lock RT PCRs Done
4,510,007 UART: [art] Populate DV Done
4,518,379 UART: [fht] FMC Alias Private Key: 7
4,519,559 UART: [art] Derive CDI
4,519,839 UART: [art] Store in slot 0x4
4,605,261 UART: [art] Derive Key Pair
4,605,621 UART: [art] Store priv key in slot 0x5
4,618,896 UART: [art] Derive Key Pair - Done
4,633,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,815 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,580 UART: [art] PUB.X = 643C69823C1EE1054705C631EFBD912732D28B8EEB86CB8F8B780AD2FEE9CB942C0B0EB0371790F1178D953FDE176F11
4,656,343 UART: [art] PUB.Y = D3F9EED762BA808BBBBE79882EAFC4734FA01499F01CEB2A74A4BCDF3C2CD6A045A6C8B57C04B8298E97624EA2477C46
4,663,310 UART: [art] SIG.R = 990703EFF691C6B58522C6F375A11879CB52D92327606BB1651A98D1F4FE6F82BF34189982E5EA6ACDC9CC08B72C42A6
4,670,075 UART: [art] SIG.S = E15B6B87EC3751B3B38D586A73A217E04FC378398BECB65ED9F49306B9919BD697B33F9985481D778A8E7442C4160DBE
4,694,281 UART: Caliptra RT
4,694,532 UART: [state] CFI Enabled
5,059,364 UART: [rt] RT listening for mailbox commands...
5,060,027 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,201 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,468 UART: [rt]cmd =0x46505652, len=4
5,108,128 UART: [rt] FIPS Version
5,109,295 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Production
86,049 UART: [state] DebugLocked = Yes
86,771 UART: [state] Starting the WD Timer 40000000 cycles
88,438 UART: [kat] SHA2-256
891,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,092 UART: [kat] ++
896,244 UART: [kat] sha1
900,726 UART: [kat] SHA2-256
902,666 UART: [kat] SHA2-384
905,403 UART: [kat] SHA2-512-ACC
907,304 UART: [kat] ECC-384
916,985 UART: [kat] HMAC-384Kdf
921,653 UART: [kat] LMS
1,169,965 UART: [kat] --
1,171,058 UART: [cold-reset] ++
1,171,469 UART: [fht] FHT @ 0x50003400
1,174,065 UART: [idev] ++
1,174,233 UART: [idev] CDI.KEYID = 6
1,174,594 UART: [idev] SUBJECT.KEYID = 7
1,175,019 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,033 UART: [idev] Erasing UDS.KEYID = 0
1,200,210 UART: [idev] Sha1 KeyId Algorithm
1,208,963 UART: [idev] --
1,209,942 UART: [ldev] ++
1,210,110 UART: [ldev] CDI.KEYID = 6
1,210,474 UART: [ldev] SUBJECT.KEYID = 5
1,210,901 UART: [ldev] AUTHORITY.KEYID = 7
1,211,364 UART: [ldev] FE.KEYID = 1
1,216,532 UART: [ldev] Erasing FE.KEYID = 1
1,242,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,185 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,879 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,749 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,455 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,629 UART: [ldev] --
1,281,902 UART: [fwproc] Wait for Commands...
1,282,565 UART: [fwproc] Recv command 0x46574c44
1,283,298 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,993 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,168 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,494 >>> mbox cmd response: success
2,852,549 UART: [afmc] ++
2,852,717 UART: [afmc] CDI.KEYID = 6
2,853,080 UART: [afmc] SUBJECT.KEYID = 7
2,853,506 UART: [afmc] AUTHORITY.KEYID = 5
2,888,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,009 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,721 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,610 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,317 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,125 UART: [afmc] --
2,931,941 UART: [cold-reset] --
2,932,731 UART: [state] Locking Datavault
2,933,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,432 UART: [state] Locking ICCM
2,935,040 UART: [exit] Launching FMC @ 0x40000130
2,940,370 UART:
2,940,386 UART: Running Caliptra FMC ...
2,940,794 UART:
2,940,848 UART: [state] CFI Enabled
2,951,154 UART: [fht] FMC Alias Private Key: 7
3,070,074 UART: [art] Extend RT PCRs Done
3,070,502 UART: [art] Lock RT PCRs Done
3,071,796 UART: [art] Populate DV Done
3,079,920 UART: [fht] FMC Alias Private Key: 7
3,080,986 UART: [art] Derive CDI
3,081,266 UART: [art] Store in slot 0x4
3,166,956 UART: [art] Derive Key Pair
3,167,316 UART: [art] Store priv key in slot 0x5
3,180,463 UART: [art] Derive Key Pair - Done
3,195,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,285 UART: [art] PUB.X = 62BCB9C74BD18D233799988AC29E9DB6F058115A75E8C70FB5A562F085B550490C03647698CAF08370DD3402A3858FDA
3,218,043 UART: [art] PUB.Y = C1131BB7BA3EC9CEC51A4B13FE95795EFFCB8E3BA9F01448386FDAD2BBE8965881A2E7F20B8B363A06DA0CFA5400F494
3,224,984 UART: [art] SIG.R = 19B24D9CF766D8103C6478FF22CA9B3735229270313C63B96201616C9EC5224DDC1A944D031A4E1A6D95120B427229B7
3,231,737 UART: [art] SIG.S = D5A9D11FBEF4A8F2A1B8BA43984971DF886BFE2E7171570C3EDC0D2925961A07015C922B3BDE8283912B040D6897A44B
3,255,465 UART: Caliptra RT
3,255,716 UART: [state] CFI Enabled
3,374,446 UART: [rt] RT listening for mailbox commands...
3,375,109 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,171 UART: [rt]cmd =0x46505652, len=4
3,405,831 UART: [rt] FIPS Version
3,406,750 >>> mbox cmd response data (36 bytes)
3,406,752 writing to cptra_bootfsm_go
3,406,844 UART:
3,406,860 UART: Running Caliptra ROM ...
3,407,268 UART:
3,407,323 UART: [state] CFI Enabled
3,409,918 UART: [state] LifecycleState = Production
3,410,526 UART: [state] DebugLocked = Yes
3,411,104 UART: [state] Starting the WD Timer 40000000 cycles
3,412,753 UART: [kat] SHA2-256
4,216,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,220,407 UART: [kat] ++
4,220,559 UART: [kat] sha1
4,224,997 UART: [kat] SHA2-256
4,226,937 UART: [kat] SHA2-384
4,229,548 UART: [kat] SHA2-512-ACC
4,231,449 UART: [kat] ECC-384
4,241,020 UART: [kat] HMAC-384Kdf
4,245,766 UART: [kat] LMS
4,494,078 UART: [kat] --
4,495,056 UART: [warm-reset] ++
4,496,265 UART: [warm-reset] --
4,497,186 UART: [state] Locking Datavault
4,497,784 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,388 UART: [state] Locking ICCM
4,498,872 UART: [exit] Launching FMC @ 0x40000130
4,504,202 UART:
4,504,218 UART: Running Caliptra FMC ...
4,504,626 UART:
4,504,680 UART: [state] CFI Enabled
4,505,803 UART: [art] Skip pcr extension
4,506,212 UART: [art] Extend RT PCRs Done
4,506,640 UART: [art] Lock RT PCRs Done
4,507,973 UART: [art] Populate DV Done
4,516,075 UART: [fht] FMC Alias Private Key: 7
4,517,149 UART: [art] Derive CDI
4,517,429 UART: [art] Store in slot 0x4
4,603,005 UART: [art] Derive Key Pair
4,603,365 UART: [art] Store priv key in slot 0x5
4,616,492 UART: [art] Derive Key Pair - Done
4,630,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,646,317 UART: [art] Erasing AUTHORITY.KEYID = 7
4,647,082 UART: [art] PUB.X = 62BCB9C74BD18D233799988AC29E9DB6F058115A75E8C70FB5A562F085B550490C03647698CAF08370DD3402A3858FDA
4,653,840 UART: [art] PUB.Y = C1131BB7BA3EC9CEC51A4B13FE95795EFFCB8E3BA9F01448386FDAD2BBE8965881A2E7F20B8B363A06DA0CFA5400F494
4,660,781 UART: [art] SIG.R = 19B24D9CF766D8103C6478FF22CA9B3735229270313C63B96201616C9EC5224DDC1A944D031A4E1A6D95120B427229B7
4,667,534 UART: [art] SIG.S = D5A9D11FBEF4A8F2A1B8BA43984971DF886BFE2E7171570C3EDC0D2925961A07015C922B3BDE8283912B040D6897A44B
4,692,352 UART: Caliptra RT
4,692,603 UART: [state] CFI Enabled
5,059,586 UART: [rt] RT listening for mailbox commands...
5,060,249 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,031 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,986 UART: [rt]cmd =0x46505652, len=4
5,107,646 UART: [rt] FIPS Version
5,108,685 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Production
86,272 UART: [state] DebugLocked = Yes
87,014 UART: [state] Starting the WD Timer 40000000 cycles
88,709 UART: [kat] SHA2-256
892,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,363 UART: [kat] ++
896,515 UART: [kat] sha1
900,723 UART: [kat] SHA2-256
902,663 UART: [kat] SHA2-384
905,516 UART: [kat] SHA2-512-ACC
907,417 UART: [kat] ECC-384
917,104 UART: [kat] HMAC-384Kdf
921,688 UART: [kat] LMS
1,170,000 UART: [kat] --
1,170,929 UART: [cold-reset] ++
1,171,288 UART: [fht] FHT @ 0x50003400
1,173,850 UART: [idev] ++
1,174,018 UART: [idev] CDI.KEYID = 6
1,174,379 UART: [idev] SUBJECT.KEYID = 7
1,174,804 UART: [idev] UDS.KEYID = 0
1,175,150 ready_for_fw is high
1,175,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,032 UART: [idev] Erasing UDS.KEYID = 0
1,200,055 UART: [idev] Sha1 KeyId Algorithm
1,209,072 UART: [idev] --
1,210,243 UART: [ldev] ++
1,210,411 UART: [ldev] CDI.KEYID = 6
1,210,775 UART: [ldev] SUBJECT.KEYID = 5
1,211,202 UART: [ldev] AUTHORITY.KEYID = 7
1,211,665 UART: [ldev] FE.KEYID = 1
1,216,937 UART: [ldev] Erasing FE.KEYID = 1
1,243,562 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,000 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,870 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,576 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,634 UART: [ldev] --
1,282,893 UART: [fwproc] Wait for Commands...
1,283,698 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,787 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,987 >>> mbox cmd response: success
2,854,092 UART: [afmc] ++
2,854,260 UART: [afmc] CDI.KEYID = 6
2,854,623 UART: [afmc] SUBJECT.KEYID = 7
2,855,049 UART: [afmc] AUTHORITY.KEYID = 5
2,890,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,906 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,913,618 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,919,507 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,925,214 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,933,070 UART: [afmc] --
2,934,108 UART: [cold-reset] --
2,935,022 UART: [state] Locking Datavault
2,936,319 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,923 UART: [state] Locking ICCM
2,937,345 UART: [exit] Launching FMC @ 0x40000130
2,942,675 UART:
2,942,691 UART: Running Caliptra FMC ...
2,943,099 UART:
2,943,242 UART: [state] CFI Enabled
2,953,830 UART: [fht] FMC Alias Private Key: 7
3,071,938 UART: [art] Extend RT PCRs Done
3,072,366 UART: [art] Lock RT PCRs Done
3,073,568 UART: [art] Populate DV Done
3,081,842 UART: [fht] FMC Alias Private Key: 7
3,082,902 UART: [art] Derive CDI
3,083,182 UART: [art] Store in slot 0x4
3,168,946 UART: [art] Derive Key Pair
3,169,306 UART: [art] Store priv key in slot 0x5
3,182,697 UART: [art] Derive Key Pair - Done
3,197,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,736 UART: [art] PUB.X = 4D1B2878A18644DBBCDA5703DD677F57CA36819EC5E29779ECCC890C09488049730C0FA064CC7BCFA66B7DFC8A3652E8
3,219,503 UART: [art] PUB.Y = C4787B8A1FAB55CB3B9126A2FBFB9D4D9079F310F6F3682E1F0BB89256C61C977116F7C4336A017486AB7D4F305B600B
3,226,450 UART: [art] SIG.R = A1AFDF81C1E72D739AF95C4B98F87C9A4C686D3941F2B065D4EDB24BD9C7525CF58550B04F78E8C0AE44BD3EF9C9A3F6
3,233,240 UART: [art] SIG.S = 5576933F0F2876BE0CFC443A4F992605C04CDF7C89EB532AA227F3F6754C1EE3025B1F5E42219484763FE6703269E05A
3,256,324 UART: Caliptra RT
3,256,667 UART: [state] CFI Enabled
3,377,105 UART: [rt] RT listening for mailbox commands...
3,377,768 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,536 UART: [rt]cmd =0x46505652, len=4
3,408,196 UART: [rt] FIPS Version
3,409,259 >>> mbox cmd response data (36 bytes)
3,409,261 writing to cptra_bootfsm_go
3,409,353 UART:
3,409,369 UART: Running Caliptra ROM ...
3,409,777 UART:
3,409,919 UART: [state] CFI Enabled
3,412,866 UART: [state] LifecycleState = Production
3,413,474 UART: [state] DebugLocked = Yes
3,414,018 UART: [state] Starting the WD Timer 40000000 cycles
3,415,627 UART: [kat] SHA2-256
4,219,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,281 UART: [kat] ++
4,223,433 UART: [kat] sha1
4,227,703 UART: [kat] SHA2-256
4,229,643 UART: [kat] SHA2-384
4,232,488 UART: [kat] SHA2-512-ACC
4,234,389 UART: [kat] ECC-384
4,244,394 UART: [kat] HMAC-384Kdf
4,249,246 UART: [kat] LMS
4,497,558 UART: [kat] --
4,498,444 UART: [warm-reset] ++
4,499,419 UART: [warm-reset] --
4,500,438 UART: [state] Locking Datavault
4,501,146 UART: [state] Locking PCR0, PCR1 and PCR31
4,501,750 UART: [state] Locking ICCM
4,502,288 UART: [exit] Launching FMC @ 0x40000130
4,507,618 UART:
4,507,634 UART: Running Caliptra FMC ...
4,508,042 UART:
4,508,185 UART: [state] CFI Enabled
4,509,490 UART: [art] Skip pcr extension
4,509,899 UART: [art] Extend RT PCRs Done
4,510,327 UART: [art] Lock RT PCRs Done
4,511,288 UART: [art] Populate DV Done
4,519,414 UART: [fht] FMC Alias Private Key: 7
4,520,582 UART: [art] Derive CDI
4,520,862 UART: [art] Store in slot 0x4
4,606,468 UART: [art] Derive Key Pair
4,606,828 UART: [art] Store priv key in slot 0x5
4,619,411 UART: [art] Derive Key Pair - Done
4,634,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,649,519 UART: [art] Erasing AUTHORITY.KEYID = 7
4,650,284 UART: [art] PUB.X = 4D1B2878A18644DBBCDA5703DD677F57CA36819EC5E29779ECCC890C09488049730C0FA064CC7BCFA66B7DFC8A3652E8
4,657,051 UART: [art] PUB.Y = C4787B8A1FAB55CB3B9126A2FBFB9D4D9079F310F6F3682E1F0BB89256C61C977116F7C4336A017486AB7D4F305B600B
4,663,998 UART: [art] SIG.R = A1AFDF81C1E72D739AF95C4B98F87C9A4C686D3941F2B065D4EDB24BD9C7525CF58550B04F78E8C0AE44BD3EF9C9A3F6
4,670,788 UART: [art] SIG.S = 5576933F0F2876BE0CFC443A4F992605C04CDF7C89EB532AA227F3F6754C1EE3025B1F5E42219484763FE6703269E05A
4,694,254 UART: Caliptra RT
4,694,597 UART: [state] CFI Enabled
5,056,678 UART: [rt] RT listening for mailbox commands...
5,057,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,073,949 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,092 UART: [rt]cmd =0x46505652, len=4
5,104,752 UART: [rt] FIPS Version
5,105,653 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Production
85,952 UART: [state] DebugLocked = Yes
86,478 UART: [state] Starting the WD Timer 40000000 cycles
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,197 UART: [kat] SHA2-256
902,137 UART: [kat] SHA2-384
904,836 UART: [kat] SHA2-512-ACC
906,737 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,362 UART: [kat] LMS
1,169,674 UART: [kat] --
1,170,439 UART: [cold-reset] ++
1,170,822 UART: [fht] FHT @ 0x50003400
1,173,548 UART: [idev] ++
1,173,716 UART: [idev] CDI.KEYID = 6
1,174,077 UART: [idev] SUBJECT.KEYID = 7
1,174,502 UART: [idev] UDS.KEYID = 0
1,174,848 ready_for_fw is high
1,174,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,596 UART: [idev] Erasing UDS.KEYID = 0
1,199,627 UART: [idev] Sha1 KeyId Algorithm
1,208,682 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,413 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,729 UART: [ldev] Erasing FE.KEYID = 1
1,243,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,998 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,692 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,562 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,268 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,372 UART: [ldev] --
1,282,713 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,196 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,671 >>> mbox cmd response: success
2,852,814 UART: [afmc] ++
2,852,982 UART: [afmc] CDI.KEYID = 6
2,853,345 UART: [afmc] SUBJECT.KEYID = 7
2,853,771 UART: [afmc] AUTHORITY.KEYID = 5
2,889,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,906,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,907,484 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,913,196 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,919,085 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,924,792 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,932,584 UART: [afmc] --
2,933,506 UART: [cold-reset] --
2,934,284 UART: [state] Locking Datavault
2,935,541 UART: [state] Locking PCR0, PCR1 and PCR31
2,936,145 UART: [state] Locking ICCM
2,936,597 UART: [exit] Launching FMC @ 0x40000130
2,941,927 UART:
2,941,943 UART: Running Caliptra FMC ...
2,942,351 UART:
2,942,494 UART: [state] CFI Enabled
2,952,714 UART: [fht] FMC Alias Private Key: 7
3,071,098 UART: [art] Extend RT PCRs Done
3,071,526 UART: [art] Lock RT PCRs Done
3,073,230 UART: [art] Populate DV Done
3,081,268 UART: [fht] FMC Alias Private Key: 7
3,082,242 UART: [art] Derive CDI
3,082,522 UART: [art] Store in slot 0x4
3,168,780 UART: [art] Derive Key Pair
3,169,140 UART: [art] Store priv key in slot 0x5
3,182,347 UART: [art] Derive Key Pair - Done
3,197,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,419 UART: [art] PUB.X = 463C8222C0EF82CDAD11D470457D5EA2203C80FB6C52432C25BF2F69A1E75BF640A8DBBA4BFD7E06DEC2FE8E1F3E3CFC
3,220,212 UART: [art] PUB.Y = 038D8C38D96DBA1149870CB9E9F418EBA1862EA9A13232F2B59E0A483E1A5C77521C9454227CD975EF8F4E0A8B407D58
3,227,154 UART: [art] SIG.R = 7A3902C88BEA85C6459D32E046FDBF596302266CD755FB52112125A8287EDE025EB2A129D9CB5C645878FEE524E5B2D9
3,233,919 UART: [art] SIG.S = F0A0BEAA2AB5F93C90388124763D013FDB1F62094EE80D49E8217C09A376A903D4EC0A46D49B9AF75B36A97D8B9BEED7
3,258,041 UART: Caliptra RT
3,258,384 UART: [state] CFI Enabled
3,378,268 UART: [rt] RT listening for mailbox commands...
3,378,931 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,629 UART: [rt]cmd =0x46505652, len=4
3,409,289 UART: [rt] FIPS Version
3,410,346 >>> mbox cmd response data (36 bytes)
3,410,348 writing to cptra_bootfsm_go
3,410,440 UART:
3,410,456 UART: Running Caliptra ROM ...
3,410,864 UART:
3,411,006 UART: [state] CFI Enabled
3,413,899 UART: [state] LifecycleState = Production
3,414,507 UART: [state] DebugLocked = Yes
3,415,161 UART: [state] Starting the WD Timer 40000000 cycles
3,416,860 UART: [kat] SHA2-256
4,220,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,224,514 UART: [kat] ++
4,224,666 UART: [kat] sha1
4,228,702 UART: [kat] SHA2-256
4,230,642 UART: [kat] SHA2-384
4,233,337 UART: [kat] SHA2-512-ACC
4,235,238 UART: [kat] ECC-384
4,245,093 UART: [kat] HMAC-384Kdf
4,249,839 UART: [kat] LMS
4,498,151 UART: [kat] --
4,499,059 UART: [warm-reset] ++
4,500,158 UART: [warm-reset] --
4,501,011 UART: [state] Locking Datavault
4,501,777 UART: [state] Locking PCR0, PCR1 and PCR31
4,502,381 UART: [state] Locking ICCM
4,502,913 UART: [exit] Launching FMC @ 0x40000130
4,508,243 UART:
4,508,259 UART: Running Caliptra FMC ...
4,508,667 UART:
4,508,810 UART: [state] CFI Enabled
4,510,319 UART: [art] Skip pcr extension
4,510,728 UART: [art] Extend RT PCRs Done
4,511,156 UART: [art] Lock RT PCRs Done
4,512,503 UART: [art] Populate DV Done
4,520,789 UART: [fht] FMC Alias Private Key: 7
4,521,747 UART: [art] Derive CDI
4,522,027 UART: [art] Store in slot 0x4
4,607,595 UART: [art] Derive Key Pair
4,607,955 UART: [art] Store priv key in slot 0x5
4,620,802 UART: [art] Derive Key Pair - Done
4,635,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,899 UART: [art] Erasing AUTHORITY.KEYID = 7
4,651,664 UART: [art] PUB.X = 463C8222C0EF82CDAD11D470457D5EA2203C80FB6C52432C25BF2F69A1E75BF640A8DBBA4BFD7E06DEC2FE8E1F3E3CFC
4,658,457 UART: [art] PUB.Y = 038D8C38D96DBA1149870CB9E9F418EBA1862EA9A13232F2B59E0A483E1A5C77521C9454227CD975EF8F4E0A8B407D58
4,665,399 UART: [art] SIG.R = 7A3902C88BEA85C6459D32E046FDBF596302266CD755FB52112125A8287EDE025EB2A129D9CB5C645878FEE524E5B2D9
4,672,164 UART: [art] SIG.S = F0A0BEAA2AB5F93C90388124763D013FDB1F62094EE80D49E8217C09A376A903D4EC0A46D49B9AF75B36A97D8B9BEED7
4,696,108 UART: Caliptra RT
4,696,451 UART: [state] CFI Enabled
5,064,642 UART: [rt] RT listening for mailbox commands...
5,065,305 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,081,761 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,111,904 UART: [rt]cmd =0x46505652, len=4
5,112,564 UART: [rt] FIPS Version
5,113,557 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = Yes
86,187 UART: [state] Starting the WD Timer 40000000 cycles
87,868 UART: [kat] SHA2-256
891,418 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,522 UART: [kat] ++
895,674 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,957 UART: [kat] SHA2-512-ACC
906,858 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,077 UART: [idev] ++
1,173,245 UART: [idev] CDI.KEYID = 6
1,173,606 UART: [idev] SUBJECT.KEYID = 7
1,174,031 UART: [idev] UDS.KEYID = 0
1,174,377 ready_for_fw is high
1,174,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,905 UART: [idev] Erasing UDS.KEYID = 0
1,198,982 UART: [idev] Sha1 KeyId Algorithm
1,207,717 UART: [idev] --
1,208,576 UART: [ldev] ++
1,208,744 UART: [ldev] CDI.KEYID = 6
1,209,108 UART: [ldev] SUBJECT.KEYID = 5
1,209,535 UART: [ldev] AUTHORITY.KEYID = 7
1,209,998 UART: [ldev] FE.KEYID = 1
1,215,238 UART: [ldev] Erasing FE.KEYID = 1
1,241,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,865 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,559 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,429 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,135 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,325 UART: [ldev] --
1,280,596 UART: [fwproc] Wait for Commands...
1,281,389 UART: [fwproc] Recv command 0x46574c44
1,282,122 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,065 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,498 >>> mbox cmd response: success
2,853,521 UART: [afmc] ++
2,853,689 UART: [afmc] CDI.KEYID = 6
2,854,052 UART: [afmc] SUBJECT.KEYID = 7
2,854,478 UART: [afmc] AUTHORITY.KEYID = 5
2,889,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,681 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,912,393 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,918,282 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,989 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,945 UART: [afmc] --
2,932,959 UART: [cold-reset] --
2,933,837 UART: [state] Locking Datavault
2,934,902 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,506 UART: [state] Locking ICCM
2,936,166 UART: [exit] Launching FMC @ 0x40000130
2,941,496 UART:
2,941,512 UART: Running Caliptra FMC ...
2,941,920 UART:
2,941,974 UART: [state] CFI Enabled
2,952,494 UART: [fht] FMC Alias Private Key: 7
3,071,058 UART: [art] Extend RT PCRs Done
3,071,486 UART: [art] Lock RT PCRs Done
3,072,776 UART: [art] Populate DV Done
3,081,286 UART: [fht] FMC Alias Private Key: 7
3,082,278 UART: [art] Derive CDI
3,082,558 UART: [art] Store in slot 0x4
3,168,313 UART: [art] Derive Key Pair
3,168,673 UART: [art] Store priv key in slot 0x5
3,181,645 UART: [art] Derive Key Pair - Done
3,196,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,743 UART: [art] PUB.X = C1451896D71260438B14A0FEC37FD4922FA955D9CF57765177643D5CAE153DEE6DB16532FDB830CE3F410362045C07D2
3,219,504 UART: [art] PUB.Y = FDFA8C396B93711BCE6E9AEE3F3E97AC6CF9F7CFC1F56F7A3D0CBEDC5AD6DF82F0BD1D318FB3E378028266F35D850354
3,226,473 UART: [art] SIG.R = D5CFF25F7746C2CA233AE82F83E74A3EF4595266D28B2D41275A990D3A3E8F8C8ED9D93CD7B4D938A7CE6D143BAD1913
3,233,254 UART: [art] SIG.S = 613B1B90BA0F665D9908921EE597E32189AC281B7D6AE141712ABFCA20BED4D46B6EC9CBF903EE0ED46A91BFFD42DF5A
3,257,162 UART: Caliptra RT
3,257,413 UART: [state] CFI Enabled
3,376,771 UART: [rt] RT listening for mailbox commands...
3,377,434 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,454 UART: [rt]cmd =0x46505652, len=4
3,408,114 UART: [rt] FIPS Version
3,409,121 >>> mbox cmd response data (36 bytes)
3,409,123 writing to cptra_bootfsm_go
3,409,215 UART:
3,409,231 UART: Running Caliptra ROM ...
3,409,639 UART:
3,409,694 UART: [state] CFI Enabled
3,411,975 UART: [state] LifecycleState = Production
3,412,583 UART: [state] DebugLocked = Yes
3,413,203 UART: [state] Starting the WD Timer 40000000 cycles
3,414,912 UART: [kat] SHA2-256
4,218,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,566 UART: [kat] ++
4,222,718 UART: [kat] sha1
4,227,064 UART: [kat] SHA2-256
4,229,004 UART: [kat] SHA2-384
4,231,725 UART: [kat] SHA2-512-ACC
4,233,626 UART: [kat] ECC-384
4,243,041 UART: [kat] HMAC-384Kdf
4,247,777 UART: [kat] LMS
4,496,089 UART: [kat] --
4,496,765 UART: [warm-reset] ++
4,497,780 UART: [warm-reset] --
4,498,555 UART: [state] Locking Datavault
4,499,355 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,959 UART: [state] Locking ICCM
4,500,525 UART: [exit] Launching FMC @ 0x40000130
4,505,855 UART:
4,505,871 UART: Running Caliptra FMC ...
4,506,279 UART:
4,506,333 UART: [state] CFI Enabled
4,507,576 UART: [art] Skip pcr extension
4,507,985 UART: [art] Extend RT PCRs Done
4,508,413 UART: [art] Lock RT PCRs Done
4,509,358 UART: [art] Populate DV Done
4,517,446 UART: [fht] FMC Alias Private Key: 7
4,518,546 UART: [art] Derive CDI
4,518,826 UART: [art] Store in slot 0x4
4,604,955 UART: [art] Derive Key Pair
4,605,315 UART: [art] Store priv key in slot 0x5
4,618,639 UART: [art] Derive Key Pair - Done
4,633,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,942 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,707 UART: [art] PUB.X = C1451896D71260438B14A0FEC37FD4922FA955D9CF57765177643D5CAE153DEE6DB16532FDB830CE3F410362045C07D2
4,656,468 UART: [art] PUB.Y = FDFA8C396B93711BCE6E9AEE3F3E97AC6CF9F7CFC1F56F7A3D0CBEDC5AD6DF82F0BD1D318FB3E378028266F35D850354
4,663,437 UART: [art] SIG.R = D5CFF25F7746C2CA233AE82F83E74A3EF4595266D28B2D41275A990D3A3E8F8C8ED9D93CD7B4D938A7CE6D143BAD1913
4,670,218 UART: [art] SIG.S = 613B1B90BA0F665D9908921EE597E32189AC281B7D6AE141712ABFCA20BED4D46B6EC9CBF903EE0ED46A91BFFD42DF5A
4,693,424 UART: Caliptra RT
4,693,675 UART: [state] CFI Enabled
5,055,172 UART: [rt] RT listening for mailbox commands...
5,055,835 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,072,345 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,102,482 UART: [rt]cmd =0x46505652, len=4
5,103,142 UART: [rt] FIPS Version
5,104,039 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Production
85,851 UART: [state] DebugLocked = Yes
86,607 UART: [state] Starting the WD Timer 40000000 cycles
88,294 UART: [kat] SHA2-256
891,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,948 UART: [kat] ++
896,100 UART: [kat] sha1
900,380 UART: [kat] SHA2-256
902,320 UART: [kat] SHA2-384
905,185 UART: [kat] SHA2-512-ACC
907,086 UART: [kat] ECC-384
917,313 UART: [kat] HMAC-384Kdf
921,731 UART: [kat] LMS
1,170,043 UART: [kat] --
1,171,056 UART: [cold-reset] ++
1,171,535 UART: [fht] FHT @ 0x50003400
1,174,195 UART: [idev] ++
1,174,363 UART: [idev] CDI.KEYID = 6
1,174,724 UART: [idev] SUBJECT.KEYID = 7
1,175,149 UART: [idev] UDS.KEYID = 0
1,175,495 ready_for_fw is high
1,175,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,953 UART: [idev] Erasing UDS.KEYID = 0
1,199,984 UART: [idev] Sha1 KeyId Algorithm
1,209,035 UART: [idev] --
1,209,928 UART: [ldev] ++
1,210,096 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,887 UART: [ldev] AUTHORITY.KEYID = 7
1,211,350 UART: [ldev] FE.KEYID = 1
1,216,674 UART: [ldev] Erasing FE.KEYID = 1
1,242,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,879 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,573 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,443 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,149 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,421 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,293 UART: [fwproc] Recv command 0x46574c44
1,283,026 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,427 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,172 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,486 >>> mbox cmd response: success
2,852,679 UART: [afmc] ++
2,852,847 UART: [afmc] CDI.KEYID = 6
2,853,210 UART: [afmc] SUBJECT.KEYID = 7
2,853,636 UART: [afmc] AUTHORITY.KEYID = 5
2,889,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,313 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,912,025 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,914 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,923,621 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,931,407 UART: [afmc] --
2,932,225 UART: [cold-reset] --
2,933,361 UART: [state] Locking Datavault
2,934,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,935,116 UART: [state] Locking ICCM
2,935,618 UART: [exit] Launching FMC @ 0x40000130
2,940,948 UART:
2,940,964 UART: Running Caliptra FMC ...
2,941,372 UART:
2,941,426 UART: [state] CFI Enabled
2,952,030 UART: [fht] FMC Alias Private Key: 7
3,070,946 UART: [art] Extend RT PCRs Done
3,071,374 UART: [art] Lock RT PCRs Done
3,072,992 UART: [art] Populate DV Done
3,081,272 UART: [fht] FMC Alias Private Key: 7
3,082,410 UART: [art] Derive CDI
3,082,690 UART: [art] Store in slot 0x4
3,168,337 UART: [art] Derive Key Pair
3,168,697 UART: [art] Store priv key in slot 0x5
3,181,437 UART: [art] Derive Key Pair - Done
3,196,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,212,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,213,028 UART: [art] PUB.X = 0F1221A65FBD53656F1317D360329DABE689E9217929084BC727D4FCFFFD32AC83ECEEEF1727C05B47248B593806C3EA
3,219,797 UART: [art] PUB.Y = B74F081D1300079370611F46D98E9FE9C28681BCEBFE520A604E2D7C2001B5C112DF0C5305FFF89E632CE7473E41C152
3,226,709 UART: [art] SIG.R = 2DE38CDF3D5299F7C1B94E770CB85A7F4F1A4D9B009962ACDDB6CF925ADEED6C33A63DF243ECF75ABD99F8E5A4F1F169
3,233,482 UART: [art] SIG.S = 9BDB55F33E92C5B9AC4D0BEBD5026E1806428B5A16CD26E497F13BC5199388461011A0D3BC1E688D0013ED41D24A4C7A
3,257,509 UART: Caliptra RT
3,257,760 UART: [state] CFI Enabled
3,377,360 UART: [rt] RT listening for mailbox commands...
3,378,023 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,481 UART: [rt]cmd =0x46505652, len=4
3,408,141 UART: [rt] FIPS Version
3,409,192 >>> mbox cmd response data (36 bytes)
3,409,194 writing to cptra_bootfsm_go
3,409,286 UART:
3,409,302 UART: Running Caliptra ROM ...
3,409,710 UART:
3,409,765 UART: [state] CFI Enabled
3,412,282 UART: [state] LifecycleState = Production
3,412,890 UART: [state] DebugLocked = Yes
3,413,584 UART: [state] Starting the WD Timer 40000000 cycles
3,415,217 UART: [kat] SHA2-256
4,218,767 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,871 UART: [kat] ++
4,223,023 UART: [kat] sha1
4,227,167 UART: [kat] SHA2-256
4,229,107 UART: [kat] SHA2-384
4,231,794 UART: [kat] SHA2-512-ACC
4,233,695 UART: [kat] ECC-384
4,243,024 UART: [kat] HMAC-384Kdf
4,247,566 UART: [kat] LMS
4,495,878 UART: [kat] --
4,496,720 UART: [warm-reset] ++
4,497,685 UART: [warm-reset] --
4,498,534 UART: [state] Locking Datavault
4,499,150 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,754 UART: [state] Locking ICCM
4,500,264 UART: [exit] Launching FMC @ 0x40000130
4,505,594 UART:
4,505,610 UART: Running Caliptra FMC ...
4,506,018 UART:
4,506,072 UART: [state] CFI Enabled
4,507,339 UART: [art] Skip pcr extension
4,507,748 UART: [art] Extend RT PCRs Done
4,508,176 UART: [art] Lock RT PCRs Done
4,509,385 UART: [art] Populate DV Done
4,517,819 UART: [fht] FMC Alias Private Key: 7
4,518,965 UART: [art] Derive CDI
4,519,245 UART: [art] Store in slot 0x4
4,605,198 UART: [art] Derive Key Pair
4,605,558 UART: [art] Store priv key in slot 0x5
4,619,202 UART: [art] Derive Key Pair - Done
4,633,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,836 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,601 UART: [art] PUB.X = 0F1221A65FBD53656F1317D360329DABE689E9217929084BC727D4FCFFFD32AC83ECEEEF1727C05B47248B593806C3EA
4,656,370 UART: [art] PUB.Y = B74F081D1300079370611F46D98E9FE9C28681BCEBFE520A604E2D7C2001B5C112DF0C5305FFF89E632CE7473E41C152
4,663,282 UART: [art] SIG.R = 2DE38CDF3D5299F7C1B94E770CB85A7F4F1A4D9B009962ACDDB6CF925ADEED6C33A63DF243ECF75ABD99F8E5A4F1F169
4,670,055 UART: [art] SIG.S = 9BDB55F33E92C5B9AC4D0BEBD5026E1806428B5A16CD26E497F13BC5199388461011A0D3BC1E688D0013ED41D24A4C7A
4,693,618 UART: Caliptra RT
4,693,869 UART: [state] CFI Enabled
5,061,682 UART: [rt] RT listening for mailbox commands...
5,062,345 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,447 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,524 UART: [rt]cmd =0x46505652, len=4
5,110,184 UART: [rt] FIPS Version
5,111,289 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Production
85,766 UART: [state] DebugLocked = Yes
86,372 UART: [state] Starting the WD Timer 40000000 cycles
88,089 UART: [kat] SHA2-256
891,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,743 UART: [kat] ++
895,895 UART: [kat] sha1
899,961 UART: [kat] SHA2-256
901,901 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,580 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,800 UART: [fht] FHT @ 0x50003400
1,173,360 UART: [idev] ++
1,173,528 UART: [idev] CDI.KEYID = 6
1,173,889 UART: [idev] SUBJECT.KEYID = 7
1,174,314 UART: [idev] UDS.KEYID = 0
1,174,660 ready_for_fw is high
1,174,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,232 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,207,834 UART: [idev] --
1,208,881 UART: [ldev] ++
1,209,049 UART: [ldev] CDI.KEYID = 6
1,209,413 UART: [ldev] SUBJECT.KEYID = 5
1,209,840 UART: [ldev] AUTHORITY.KEYID = 7
1,210,303 UART: [ldev] FE.KEYID = 1
1,216,009 UART: [ldev] Erasing FE.KEYID = 1
1,242,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,662 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,356 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,226 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,932 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,832 UART: [ldev] --
1,281,133 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,615 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,961 >>> mbox cmd response: success
2,851,016 UART: [afmc] ++
2,851,184 UART: [afmc] CDI.KEYID = 6
2,851,547 UART: [afmc] SUBJECT.KEYID = 7
2,851,973 UART: [afmc] AUTHORITY.KEYID = 5
2,887,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,180 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,909,892 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,915,781 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,488 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,188 UART: [afmc] --
2,930,154 UART: [cold-reset] --
2,931,076 UART: [state] Locking Datavault
2,932,165 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,769 UART: [state] Locking ICCM
2,933,229 UART: [exit] Launching FMC @ 0x40000130
2,938,559 UART:
2,938,575 UART: Running Caliptra FMC ...
2,938,983 UART:
2,939,126 UART: [state] CFI Enabled
2,949,660 UART: [fht] FMC Alias Private Key: 7
3,069,204 UART: [art] Extend RT PCRs Done
3,069,632 UART: [art] Lock RT PCRs Done
3,071,172 UART: [art] Populate DV Done
3,079,512 UART: [fht] FMC Alias Private Key: 7
3,080,496 UART: [art] Derive CDI
3,080,776 UART: [art] Store in slot 0x4
3,166,771 UART: [art] Derive Key Pair
3,167,131 UART: [art] Store priv key in slot 0x5
3,180,427 UART: [art] Derive Key Pair - Done
3,195,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,313 UART: [art] PUB.X = 7005E9705EB3CBA6797FF367C02081CCCB62FE04225D1936796440D71DF7ACABFC2346D07CDF243334F7D79863F680FA
3,218,083 UART: [art] PUB.Y = 8AE6A21B55F557FA1A991D9BBBC32F1255FFF21CE0B3DFE9EAFA3D19D9CCB870F5955277790A704653A011AA7772F9AB
3,225,048 UART: [art] SIG.R = 48015D89BDC2396ABFA3F9682ACEEBA1A55C8B8D2E8AA87A7E1DDAD9EC298753D4F22E779C9B839780745EAFFE38F586
3,231,835 UART: [art] SIG.S = 912224BECF0FF5A03F34617B2357537514EA7C645C2B70F482E7FE987A074D6F400DDDB9D58F3CF779E6E1BF0B2E2C97
3,255,929 UART: Caliptra RT
3,256,272 UART: [state] CFI Enabled
3,377,066 UART: [rt] RT listening for mailbox commands...
3,377,729 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,825 UART: [rt]cmd =0x46505652, len=4
3,408,485 UART: [rt] FIPS Version
3,409,574 >>> mbox cmd response data (36 bytes)
3,409,576 writing to cptra_bootfsm_go
3,409,668 UART:
3,409,684 UART: Running Caliptra ROM ...
3,410,092 UART:
3,410,234 UART: [state] CFI Enabled
3,413,107 UART: [state] LifecycleState = Production
3,413,715 UART: [state] DebugLocked = Yes
3,414,341 UART: [state] Starting the WD Timer 40000000 cycles
3,415,812 UART: [kat] SHA2-256
4,219,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,466 UART: [kat] ++
4,223,618 UART: [kat] sha1
4,227,838 UART: [kat] SHA2-256
4,229,778 UART: [kat] SHA2-384
4,232,685 UART: [kat] SHA2-512-ACC
4,234,586 UART: [kat] ECC-384
4,244,085 UART: [kat] HMAC-384Kdf
4,248,715 UART: [kat] LMS
4,497,027 UART: [kat] --
4,497,665 UART: [warm-reset] ++
4,498,448 UART: [warm-reset] --
4,499,315 UART: [state] Locking Datavault
4,500,015 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,619 UART: [state] Locking ICCM
4,501,087 UART: [exit] Launching FMC @ 0x40000130
4,506,417 UART:
4,506,433 UART: Running Caliptra FMC ...
4,506,841 UART:
4,506,984 UART: [state] CFI Enabled
4,508,329 UART: [art] Skip pcr extension
4,508,738 UART: [art] Extend RT PCRs Done
4,509,166 UART: [art] Lock RT PCRs Done
4,510,293 UART: [art] Populate DV Done
4,518,501 UART: [fht] FMC Alias Private Key: 7
4,519,519 UART: [art] Derive CDI
4,519,799 UART: [art] Store in slot 0x4
4,605,380 UART: [art] Derive Key Pair
4,605,740 UART: [art] Store priv key in slot 0x5
4,618,706 UART: [art] Derive Key Pair - Done
4,633,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,649,013 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,778 UART: [art] PUB.X = 7005E9705EB3CBA6797FF367C02081CCCB62FE04225D1936796440D71DF7ACABFC2346D07CDF243334F7D79863F680FA
4,656,548 UART: [art] PUB.Y = 8AE6A21B55F557FA1A991D9BBBC32F1255FFF21CE0B3DFE9EAFA3D19D9CCB870F5955277790A704653A011AA7772F9AB
4,663,513 UART: [art] SIG.R = 48015D89BDC2396ABFA3F9682ACEEBA1A55C8B8D2E8AA87A7E1DDAD9EC298753D4F22E779C9B839780745EAFFE38F586
4,670,300 UART: [art] SIG.S = 912224BECF0FF5A03F34617B2357537514EA7C645C2B70F482E7FE987A074D6F400DDDB9D58F3CF779E6E1BF0B2E2C97
4,693,934 UART: Caliptra RT
4,694,277 UART: [state] CFI Enabled
5,058,940 UART: [rt] RT listening for mailbox commands...
5,059,603 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,076,841 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,234 UART: [rt]cmd =0x46505652, len=4
5,107,894 UART: [rt] FIPS Version
5,108,877 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,772 UART: [state] LifecycleState = Production
86,380 UART: [state] DebugLocked = Yes
86,904 UART: [state] Starting the WD Timer 40000000 cycles
88,477 UART: [kat] SHA2-256
892,027 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,131 UART: [kat] ++
896,283 UART: [kat] sha1
900,501 UART: [kat] SHA2-256
902,441 UART: [kat] SHA2-384
905,290 UART: [kat] SHA2-512-ACC
907,191 UART: [kat] ECC-384
916,626 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,571 UART: [cold-reset] ++
1,170,910 UART: [fht] FHT @ 0x50003400
1,173,452 UART: [idev] ++
1,173,620 UART: [idev] CDI.KEYID = 6
1,173,981 UART: [idev] SUBJECT.KEYID = 7
1,174,406 UART: [idev] UDS.KEYID = 0
1,174,752 ready_for_fw is high
1,174,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,458 UART: [idev] Erasing UDS.KEYID = 0
1,199,345 UART: [idev] Sha1 KeyId Algorithm
1,208,028 UART: [idev] --
1,209,203 UART: [ldev] ++
1,209,371 UART: [ldev] CDI.KEYID = 6
1,209,735 UART: [ldev] SUBJECT.KEYID = 5
1,210,162 UART: [ldev] AUTHORITY.KEYID = 7
1,210,625 UART: [ldev] FE.KEYID = 1
1,215,783 UART: [ldev] Erasing FE.KEYID = 1
1,242,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,306 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,000 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,870 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,576 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,564 UART: [ldev] --
1,281,821 UART: [fwproc] Wait for Commands...
1,282,632 UART: [fwproc] Recv command 0x46574c44
1,283,365 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,360 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,535 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,925 >>> mbox cmd response: success
2,851,026 UART: [afmc] ++
2,851,194 UART: [afmc] CDI.KEYID = 6
2,851,557 UART: [afmc] SUBJECT.KEYID = 7
2,851,983 UART: [afmc] AUTHORITY.KEYID = 5
2,887,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,478 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,910,190 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,079 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,786 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,929,414 UART: [afmc] --
2,930,266 UART: [cold-reset] --
2,930,918 UART: [state] Locking Datavault
2,931,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,451 UART: [state] Locking ICCM
2,932,967 UART: [exit] Launching FMC @ 0x40000130
2,938,297 UART:
2,938,313 UART: Running Caliptra FMC ...
2,938,721 UART:
2,938,864 UART: [state] CFI Enabled
2,949,364 UART: [fht] FMC Alias Private Key: 7
3,067,782 UART: [art] Extend RT PCRs Done
3,068,210 UART: [art] Lock RT PCRs Done
3,069,546 UART: [art] Populate DV Done
3,077,948 UART: [fht] FMC Alias Private Key: 7
3,078,996 UART: [art] Derive CDI
3,079,276 UART: [art] Store in slot 0x4
3,164,867 UART: [art] Derive Key Pair
3,165,227 UART: [art] Store priv key in slot 0x5
3,178,407 UART: [art] Derive Key Pair - Done
3,193,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,208,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,209,126 UART: [art] PUB.X = 5D945D6B1BCF92D1383C5DD4C3DC9B00E4EEC1DDD49AC48A839D59EE2ED65EE152E1774285638C73469965DA43F5F6B5
3,215,888 UART: [art] PUB.Y = 065960C1E420E844345A1E81ED9A1B7CD8B771FCE07EA7EDF3445B06C3456A58BCC8EA6039D91B7335D92FC3047BC339
3,222,837 UART: [art] SIG.R = 53BBF63488926110B66EBC0A6E50EB680DED94C91B6DBE8B4B5568EA7CDC9BF2D9DF21E5BB36515984CBF2C5AE7183B8
3,229,621 UART: [art] SIG.S = 698945ACAC3646F0E076A34136556C2D1776326B50516907498C7C993B906316AC42547FFAE701DE2F96AB842CB35327
3,253,251 UART: Caliptra RT
3,253,594 UART: [state] CFI Enabled
3,373,258 UART: [rt] RT listening for mailbox commands...
3,373,921 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,403,695 UART: [rt]cmd =0x46505652, len=4
3,404,355 UART: [rt] FIPS Version
3,405,558 >>> mbox cmd response data (36 bytes)
3,405,560 writing to cptra_bootfsm_go
3,405,652 UART:
3,405,668 UART: Running Caliptra ROM ...
3,406,076 UART:
3,406,218 UART: [state] CFI Enabled
3,408,907 UART: [state] LifecycleState = Production
3,409,515 UART: [state] DebugLocked = Yes
3,410,157 UART: [state] Starting the WD Timer 40000000 cycles
3,411,802 UART: [kat] SHA2-256
4,215,352 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,219,456 UART: [kat] ++
4,219,608 UART: [kat] sha1
4,223,788 UART: [kat] SHA2-256
4,225,728 UART: [kat] SHA2-384
4,228,573 UART: [kat] SHA2-512-ACC
4,230,474 UART: [kat] ECC-384
4,239,893 UART: [kat] HMAC-384Kdf
4,244,391 UART: [kat] LMS
4,492,703 UART: [kat] --
4,493,759 UART: [warm-reset] ++
4,494,716 UART: [warm-reset] --
4,495,663 UART: [state] Locking Datavault
4,496,475 UART: [state] Locking PCR0, PCR1 and PCR31
4,497,079 UART: [state] Locking ICCM
4,497,511 UART: [exit] Launching FMC @ 0x40000130
4,502,841 UART:
4,502,857 UART: Running Caliptra FMC ...
4,503,265 UART:
4,503,408 UART: [state] CFI Enabled
4,504,725 UART: [art] Skip pcr extension
4,505,134 UART: [art] Extend RT PCRs Done
4,505,562 UART: [art] Lock RT PCRs Done
4,506,689 UART: [art] Populate DV Done
4,514,963 UART: [fht] FMC Alias Private Key: 7
4,515,981 UART: [art] Derive CDI
4,516,261 UART: [art] Store in slot 0x4
4,602,136 UART: [art] Derive Key Pair
4,602,496 UART: [art] Store priv key in slot 0x5
4,615,980 UART: [art] Derive Key Pair - Done
4,630,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,645,890 UART: [art] Erasing AUTHORITY.KEYID = 7
4,646,655 UART: [art] PUB.X = 5D945D6B1BCF92D1383C5DD4C3DC9B00E4EEC1DDD49AC48A839D59EE2ED65EE152E1774285638C73469965DA43F5F6B5
4,653,417 UART: [art] PUB.Y = 065960C1E420E844345A1E81ED9A1B7CD8B771FCE07EA7EDF3445B06C3456A58BCC8EA6039D91B7335D92FC3047BC339
4,660,366 UART: [art] SIG.R = 53BBF63488926110B66EBC0A6E50EB680DED94C91B6DBE8B4B5568EA7CDC9BF2D9DF21E5BB36515984CBF2C5AE7183B8
4,667,150 UART: [art] SIG.S = 698945ACAC3646F0E076A34136556C2D1776326B50516907498C7C993B906316AC42547FFAE701DE2F96AB842CB35327
4,690,316 UART: Caliptra RT
4,690,659 UART: [state] CFI Enabled
5,056,804 UART: [rt] RT listening for mailbox commands...
5,057,467 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,074,107 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,552 UART: [rt]cmd =0x46505652, len=4
5,105,212 UART: [rt] FIPS Version
5,106,225 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Production
85,657 UART: [state] DebugLocked = Yes
86,353 UART: [state] Starting the WD Timer 40000000 cycles
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,856 UART: [kat] SHA2-256
901,796 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,065 UART: [kat] HMAC-384Kdf
920,703 UART: [kat] LMS
1,169,015 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,153 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,477 UART: [idev] Erasing UDS.KEYID = 0
1,197,914 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,650 UART: [ldev] ++
1,207,818 UART: [ldev] CDI.KEYID = 6
1,208,182 UART: [ldev] SUBJECT.KEYID = 5
1,208,609 UART: [ldev] AUTHORITY.KEYID = 7
1,209,072 UART: [ldev] FE.KEYID = 1
1,214,542 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,727 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,421 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,291 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,997 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,109 UART: [ldev] --
1,280,454 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,513 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,994 >>> mbox cmd response: success
2,850,117 UART: [afmc] ++
2,850,285 UART: [afmc] CDI.KEYID = 6
2,850,648 UART: [afmc] SUBJECT.KEYID = 7
2,851,074 UART: [afmc] AUTHORITY.KEYID = 5
2,886,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,044 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,903,793 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,909,505 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,915,394 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,101 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,928,787 UART: [afmc] --
2,929,733 UART: [cold-reset] --
2,930,667 UART: [state] Locking Datavault
2,931,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,274 UART: [state] Locking ICCM
2,932,912 UART: [exit] Launching FMC @ 0x40000130
2,938,242 UART:
2,938,258 UART: Running Caliptra FMC ...
2,938,666 UART:
2,938,720 UART: [state] CFI Enabled
2,949,204 UART: [fht] FMC Alias Private Key: 7
3,068,084 UART: [art] Extend RT PCRs Done
3,068,512 UART: [art] Lock RT PCRs Done
3,069,886 UART: [art] Populate DV Done
3,078,092 UART: [fht] FMC Alias Private Key: 7
3,079,032 UART: [art] Derive CDI
3,079,312 UART: [art] Store in slot 0x4
3,165,713 UART: [art] Derive Key Pair
3,166,073 UART: [art] Store priv key in slot 0x5
3,179,099 UART: [art] Derive Key Pair - Done
3,194,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,767 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,532 UART: [art] PUB.X = 6A0334035788D40BCC1059615A6AA02129A7C9D3B4E3E406DB7270174CAA598DE5F5ED38C4A928B96CC06AAA09478D4E
3,217,293 UART: [art] PUB.Y = AFD99027B10C41D2B59D147D4DB108EAE0DD53CD52293DE04601074BCF2C7CF436DDE373C9E5617B00E81500E1B8825B
3,224,197 UART: [art] SIG.R = C46AAAC58CE4429D344DBCD428114DD1B4E24BC41BAAE885848391FB4123E1AE9C4A186B308CAD0A1A1C3D1364B72020
3,230,978 UART: [art] SIG.S = 94E7E27625C9F84799935F5BAC87EF1D68D37004E4ACED8E363614F246DFDCAB8C282FC9A928BA319CD785F49FD1A125
3,254,901 UART: Caliptra RT
3,255,152 UART: [state] CFI Enabled
3,375,965 UART: [rt] RT listening for mailbox commands...
3,376,628 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,564 UART: [rt]cmd =0x46505652, len=4
3,407,224 UART: [rt] FIPS Version
3,408,105 >>> mbox cmd response data (36 bytes)
3,408,107 writing to cptra_bootfsm_go
3,408,199 UART:
3,408,215 UART: Running Caliptra ROM ...
3,408,623 UART:
3,408,678 UART: [state] CFI Enabled
3,411,471 UART: [state] LifecycleState = Production
3,412,079 UART: [state] DebugLocked = Yes
3,412,741 UART: [state] Starting the WD Timer 40000000 cycles
3,414,294 UART: [kat] SHA2-256
4,217,844 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,948 UART: [kat] ++
4,222,100 UART: [kat] sha1
4,226,480 UART: [kat] SHA2-256
4,228,420 UART: [kat] SHA2-384
4,231,179 UART: [kat] SHA2-512-ACC
4,233,080 UART: [kat] ECC-384
4,242,503 UART: [kat] HMAC-384Kdf
4,247,153 UART: [kat] LMS
4,495,465 UART: [kat] --
4,496,287 UART: [warm-reset] ++
4,497,356 UART: [warm-reset] --
4,498,025 UART: [state] Locking Datavault
4,498,789 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,393 UART: [state] Locking ICCM
4,499,849 UART: [exit] Launching FMC @ 0x40000130
4,505,179 UART:
4,505,195 UART: Running Caliptra FMC ...
4,505,603 UART:
4,505,657 UART: [state] CFI Enabled
4,506,856 UART: [art] Skip pcr extension
4,507,265 UART: [art] Extend RT PCRs Done
4,507,693 UART: [art] Lock RT PCRs Done
4,509,200 UART: [art] Populate DV Done
4,517,304 UART: [fht] FMC Alias Private Key: 7
4,518,330 UART: [art] Derive CDI
4,518,610 UART: [art] Store in slot 0x4
4,604,187 UART: [art] Derive Key Pair
4,604,547 UART: [art] Store priv key in slot 0x5
4,617,899 UART: [art] Derive Key Pair - Done
4,632,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,085 UART: [art] Erasing AUTHORITY.KEYID = 7
4,648,850 UART: [art] PUB.X = 6A0334035788D40BCC1059615A6AA02129A7C9D3B4E3E406DB7270174CAA598DE5F5ED38C4A928B96CC06AAA09478D4E
4,655,611 UART: [art] PUB.Y = AFD99027B10C41D2B59D147D4DB108EAE0DD53CD52293DE04601074BCF2C7CF436DDE373C9E5617B00E81500E1B8825B
4,662,515 UART: [art] SIG.R = C46AAAC58CE4429D344DBCD428114DD1B4E24BC41BAAE885848391FB4123E1AE9C4A186B308CAD0A1A1C3D1364B72020
4,669,296 UART: [art] SIG.S = 94E7E27625C9F84799935F5BAC87EF1D68D37004E4ACED8E363614F246DFDCAB8C282FC9A928BA319CD785F49FD1A125
4,693,945 UART: Caliptra RT
4,694,196 UART: [state] CFI Enabled
5,058,130 UART: [rt] RT listening for mailbox commands...
5,058,793 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,075,815 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,008 UART: [rt]cmd =0x46505652, len=4
5,106,668 UART: [rt] FIPS Version
5,107,557 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Production
85,521 UART: [state] DebugLocked = Yes
86,235 UART: [state] Starting the WD Timer 40000000 cycles
87,704 UART: [kat] SHA2-256
891,254 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,358 UART: [kat] ++
895,510 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,363 UART: [kat] SHA2-512-ACC
906,264 UART: [kat] ECC-384
915,655 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,169,869 UART: [fht] FHT @ 0x50003400
1,172,697 UART: [idev] ++
1,172,865 UART: [idev] CDI.KEYID = 6
1,173,226 UART: [idev] SUBJECT.KEYID = 7
1,173,651 UART: [idev] UDS.KEYID = 0
1,173,997 ready_for_fw is high
1,173,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,840 UART: [idev] Sha1 KeyId Algorithm
1,207,809 UART: [idev] --
1,208,978 UART: [ldev] ++
1,209,146 UART: [ldev] CDI.KEYID = 6
1,209,510 UART: [ldev] SUBJECT.KEYID = 5
1,209,937 UART: [ldev] AUTHORITY.KEYID = 7
1,210,400 UART: [ldev] FE.KEYID = 1
1,215,952 UART: [ldev] Erasing FE.KEYID = 1
1,242,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,655 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,349 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,219 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,925 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,851 UART: [ldev] --
1,281,056 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,081 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,708,256 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,848,526 >>> mbox cmd response: success
2,849,625 UART: [afmc] ++
2,849,793 UART: [afmc] CDI.KEYID = 6
2,850,156 UART: [afmc] SUBJECT.KEYID = 7
2,850,582 UART: [afmc] AUTHORITY.KEYID = 5
2,886,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,903,771 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,909,483 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,915,372 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,921,079 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,928,869 UART: [afmc] --
2,929,745 UART: [cold-reset] --
2,930,743 UART: [state] Locking Datavault
2,931,958 UART: [state] Locking PCR0, PCR1 and PCR31
2,932,562 UART: [state] Locking ICCM
2,933,222 UART: [exit] Launching FMC @ 0x40000130
2,938,552 UART:
2,938,568 UART: Running Caliptra FMC ...
2,938,976 UART:
2,939,030 UART: [state] CFI Enabled
2,949,572 UART: [fht] FMC Alias Private Key: 7
3,068,024 UART: [art] Extend RT PCRs Done
3,068,452 UART: [art] Lock RT PCRs Done
3,070,158 UART: [art] Populate DV Done
3,078,502 UART: [fht] FMC Alias Private Key: 7
3,079,610 UART: [art] Derive CDI
3,079,890 UART: [art] Store in slot 0x4
3,165,637 UART: [art] Derive Key Pair
3,165,997 UART: [art] Store priv key in slot 0x5
3,179,627 UART: [art] Derive Key Pair - Done
3,194,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,209,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,210,011 UART: [art] PUB.X = 1FB2F2A30A84B1B01AA246734DB9731CA042E474E3B21B027E824478EEDDBED866C7EF543FEA8C90C14815C4221F3F72
3,216,785 UART: [art] PUB.Y = A04C7AE531CDEAB54DB2D8972894510EA7C7F0C87C8CF90B047193DEC5F86A51E30FDA3135F52E9A08063C3553F0E8BE
3,223,731 UART: [art] SIG.R = 34C0D6FF7CF64A48ABBB935CC1653C15988EB94EECA6AA6454B3E675AD64A504C47C38B026A8734BD9BCC7C665F3BE02
3,230,513 UART: [art] SIG.S = 17CA11D9B2A2F78ACD940C8CA50DA22B63C7FD39EC0E97A08856920B26E21D05089F35B18FAB66E3111505CB3E2518F0
3,255,166 UART: Caliptra RT
3,255,417 UART: [state] CFI Enabled
3,375,189 UART: [rt] RT listening for mailbox commands...
3,375,852 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,405,806 UART: [rt]cmd =0x46505652, len=4
3,406,466 UART: [rt] FIPS Version
3,407,629 >>> mbox cmd response data (36 bytes)
3,407,631 writing to cptra_bootfsm_go
3,407,723 UART:
3,407,739 UART: Running Caliptra ROM ...
3,408,147 UART:
3,408,202 UART: [state] CFI Enabled
3,410,879 UART: [state] LifecycleState = Production
3,411,487 UART: [state] DebugLocked = Yes
3,412,021 UART: [state] Starting the WD Timer 40000000 cycles
3,413,530 UART: [kat] SHA2-256
4,217,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,221,184 UART: [kat] ++
4,221,336 UART: [kat] sha1
4,225,332 UART: [kat] SHA2-256
4,227,272 UART: [kat] SHA2-384
4,230,071 UART: [kat] SHA2-512-ACC
4,231,972 UART: [kat] ECC-384
4,241,989 UART: [kat] HMAC-384Kdf
4,246,517 UART: [kat] LMS
4,494,829 UART: [kat] --
4,495,741 UART: [warm-reset] ++
4,496,708 UART: [warm-reset] --
4,497,571 UART: [state] Locking Datavault
4,498,267 UART: [state] Locking PCR0, PCR1 and PCR31
4,498,871 UART: [state] Locking ICCM
4,499,351 UART: [exit] Launching FMC @ 0x40000130
4,504,681 UART:
4,504,697 UART: Running Caliptra FMC ...
4,505,105 UART:
4,505,159 UART: [state] CFI Enabled
4,506,490 UART: [art] Skip pcr extension
4,506,899 UART: [art] Extend RT PCRs Done
4,507,327 UART: [art] Lock RT PCRs Done
4,508,550 UART: [art] Populate DV Done
4,516,708 UART: [fht] FMC Alias Private Key: 7
4,517,750 UART: [art] Derive CDI
4,518,030 UART: [art] Store in slot 0x4
4,603,487 UART: [art] Derive Key Pair
4,603,847 UART: [art] Store priv key in slot 0x5
4,617,003 UART: [art] Derive Key Pair - Done
4,631,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,647,534 UART: [art] Erasing AUTHORITY.KEYID = 7
4,648,299 UART: [art] PUB.X = 1FB2F2A30A84B1B01AA246734DB9731CA042E474E3B21B027E824478EEDDBED866C7EF543FEA8C90C14815C4221F3F72
4,655,073 UART: [art] PUB.Y = A04C7AE531CDEAB54DB2D8972894510EA7C7F0C87C8CF90B047193DEC5F86A51E30FDA3135F52E9A08063C3553F0E8BE
4,662,019 UART: [art] SIG.R = 34C0D6FF7CF64A48ABBB935CC1653C15988EB94EECA6AA6454B3E675AD64A504C47C38B026A8734BD9BCC7C665F3BE02
4,668,801 UART: [art] SIG.S = 17CA11D9B2A2F78ACD940C8CA50DA22B63C7FD39EC0E97A08856920B26E21D05089F35B18FAB66E3111505CB3E2518F0
4,691,948 UART: Caliptra RT
4,692,199 UART: [state] CFI Enabled
5,060,474 UART: [rt] RT listening for mailbox commands...
5,061,137 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,077,535 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,107,562 UART: [rt]cmd =0x46505652, len=4
5,108,222 UART: [rt] FIPS Version
5,109,335 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,476 UART: [state] LifecycleState = Production
86,084 UART: [state] DebugLocked = Yes
86,758 UART: [state] Starting the WD Timer 40000000 cycles
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,975 UART: [kat] ++
896,127 UART: [kat] sha1
900,529 UART: [kat] SHA2-256
902,469 UART: [kat] SHA2-384
905,132 UART: [kat] SHA2-512-ACC
907,033 UART: [kat] ECC-384
917,024 UART: [kat] HMAC-384Kdf
921,690 UART: [kat] LMS
1,170,002 UART: [kat] --
1,170,875 UART: [cold-reset] ++
1,171,352 UART: [fht] FHT @ 0x50003400
1,173,990 UART: [idev] ++
1,174,158 UART: [idev] CDI.KEYID = 6
1,174,519 UART: [idev] SUBJECT.KEYID = 7
1,174,944 UART: [idev] UDS.KEYID = 0
1,175,290 ready_for_fw is high
1,175,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,714 UART: [idev] Erasing UDS.KEYID = 0
1,199,825 UART: [idev] Sha1 KeyId Algorithm
1,208,606 UART: [idev] --
1,209,685 UART: [ldev] ++
1,209,853 UART: [ldev] CDI.KEYID = 6
1,210,217 UART: [ldev] SUBJECT.KEYID = 5
1,210,644 UART: [ldev] AUTHORITY.KEYID = 7
1,211,107 UART: [ldev] FE.KEYID = 1
1,216,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,664 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,534 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,240 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,380 UART: [ldev] --
1,281,613 UART: [fwproc] Wait for Commands...
1,282,194 UART: [fwproc] Recv command 0x46574c44
1,282,927 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,180 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,485 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,735 >>> mbox cmd response: success
2,851,770 UART: [afmc] ++
2,851,938 UART: [afmc] CDI.KEYID = 6
2,852,301 UART: [afmc] SUBJECT.KEYID = 7
2,852,727 UART: [afmc] AUTHORITY.KEYID = 5
2,888,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,312 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,024 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,916,913 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,620 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,572 UART: [afmc] --
2,931,404 UART: [cold-reset] --
2,932,072 UART: [state] Locking Datavault
2,933,343 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,947 UART: [state] Locking ICCM
2,934,505 UART: [exit] Launching FMC @ 0x40000130
2,939,835 UART:
2,939,851 UART: Running Caliptra FMC ...
2,940,259 UART:
2,940,402 UART: [state] CFI Enabled
2,951,242 UART: [fht] FMC Alias Private Key: 7
3,069,616 UART: [art] Extend RT PCRs Done
3,070,044 UART: [art] Lock RT PCRs Done
3,071,700 UART: [art] Populate DV Done
3,080,154 UART: [fht] FMC Alias Private Key: 7
3,081,300 UART: [art] Derive CDI
3,081,580 UART: [art] Store in slot 0x4
3,166,893 UART: [art] Derive Key Pair
3,167,253 UART: [art] Store priv key in slot 0x5
3,181,117 UART: [art] Derive Key Pair - Done
3,196,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,685 UART: [art] PUB.X = A3064A376F0F54BF87E93E4A52F889521D376889BF803FEDDC27F080551A8DB0AB6257747608F52B559B3A511C6B1AAB
3,219,450 UART: [art] PUB.Y = BC8441EB60DB279A7CAEB1679F12D7B57B4D2311154F670A9AB5648A131C8DD52610BA2231163A334E5DC043E91D1F67
3,226,401 UART: [art] SIG.R = 80D67074A0B1A390BB8383875A263C1F394CB773674E3E9E4223971FD9221BB1F3E95A58CB323134B885882EB7B534E6
3,233,165 UART: [art] SIG.S = 62C763AF8410EA7E9F6EBF334CFBFA50F86D27C3076856806965A15C5C8F158B484B7BF9E5AC4FB043014E5D21F8DC7E
3,257,095 UART: Caliptra RT
3,257,438 UART: [state] CFI Enabled
3,376,912 UART: [rt] RT listening for mailbox commands...
3,377,575 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,183 UART: [rt]cmd =0x46505652, len=4
3,407,843 UART: [rt] FIPS Version
3,408,878 >>> mbox cmd response data (36 bytes)
3,408,880 writing to cptra_bootfsm_go
3,408,972 UART:
3,408,988 UART: Running Caliptra ROM ...
3,409,396 UART:
3,409,538 UART: [state] CFI Enabled
3,411,799 UART: [state] LifecycleState = Production
3,412,407 UART: [state] DebugLocked = Yes
3,412,923 UART: [state] Starting the WD Timer 40000000 cycles
3,414,578 UART: [kat] SHA2-256
4,218,128 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,222,232 UART: [kat] ++
4,222,384 UART: [kat] sha1
4,226,442 UART: [kat] SHA2-256
4,228,382 UART: [kat] SHA2-384
4,230,975 UART: [kat] SHA2-512-ACC
4,232,876 UART: [kat] ECC-384
4,243,019 UART: [kat] HMAC-384Kdf
4,247,731 UART: [kat] LMS
4,496,043 UART: [kat] --
4,496,683 UART: [warm-reset] ++
4,497,566 UART: [warm-reset] --
4,498,185 UART: [state] Locking Datavault
4,498,807 UART: [state] Locking PCR0, PCR1 and PCR31
4,499,411 UART: [state] Locking ICCM
4,500,071 UART: [exit] Launching FMC @ 0x40000130
4,505,401 UART:
4,505,417 UART: Running Caliptra FMC ...
4,505,825 UART:
4,505,968 UART: [state] CFI Enabled
4,507,281 UART: [art] Skip pcr extension
4,507,690 UART: [art] Extend RT PCRs Done
4,508,118 UART: [art] Lock RT PCRs Done
4,509,573 UART: [art] Populate DV Done
4,517,527 UART: [fht] FMC Alias Private Key: 7
4,518,693 UART: [art] Derive CDI
4,518,973 UART: [art] Store in slot 0x4
4,605,060 UART: [art] Derive Key Pair
4,605,420 UART: [art] Store priv key in slot 0x5
4,619,356 UART: [art] Derive Key Pair - Done
4,633,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,648,743 UART: [art] Erasing AUTHORITY.KEYID = 7
4,649,508 UART: [art] PUB.X = A3064A376F0F54BF87E93E4A52F889521D376889BF803FEDDC27F080551A8DB0AB6257747608F52B559B3A511C6B1AAB
4,656,273 UART: [art] PUB.Y = BC8441EB60DB279A7CAEB1679F12D7B57B4D2311154F670A9AB5648A131C8DD52610BA2231163A334E5DC043E91D1F67
4,663,224 UART: [art] SIG.R = 80D67074A0B1A390BB8383875A263C1F394CB773674E3E9E4223971FD9221BB1F3E95A58CB323134B885882EB7B534E6
4,669,988 UART: [art] SIG.S = 62C763AF8410EA7E9F6EBF334CFBFA50F86D27C3076856806965A15C5C8F158B484B7BF9E5AC4FB043014E5D21F8DC7E
4,694,062 UART: Caliptra RT
4,694,405 UART: [state] CFI Enabled
5,057,616 UART: [rt] RT listening for mailbox commands...
5,058,279 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,075,219 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,414 UART: [rt]cmd =0x46505652, len=4
5,106,074 UART: [rt] FIPS Version
5,106,995 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Production
85,788 UART: [state] DebugLocked = Yes
86,458 UART: [state] Starting the WD Timer 40000000 cycles
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,239 UART: [kat] SHA2-256
902,179 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,604 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,628 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 ready_for_fw is high
1,174,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,558 UART: [idev] Erasing UDS.KEYID = 0
1,200,219 UART: [idev] Sha1 KeyId Algorithm
1,209,114 UART: [idev] --
1,210,075 UART: [ldev] ++
1,210,243 UART: [ldev] CDI.KEYID = 6
1,210,607 UART: [ldev] SUBJECT.KEYID = 5
1,211,034 UART: [ldev] AUTHORITY.KEYID = 7
1,211,497 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,242,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,214 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,084 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,790 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,934 UART: [ldev] --
1,282,267 UART: [fwproc] Wait for Commands...
1,282,876 UART: [fwproc] Recv command 0x46574c44
1,283,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,447 >>> mbox cmd response: success
2,851,652 UART: [afmc] ++
2,851,820 UART: [afmc] CDI.KEYID = 6
2,852,183 UART: [afmc] SUBJECT.KEYID = 7
2,852,609 UART: [afmc] AUTHORITY.KEYID = 5
2,888,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,775 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,524 UART: [afmc] PUB.X = B71F46C4DFEB76103AF256429B954CC325EE069239FC400A5741F3A1793CDD57BB9716108531AA462F50C07EFAD8BB47
2,911,236 UART: [afmc] PUB.Y = 0E59D6304980C83E11FD8C7322CD7057BFF90EC0F4DDCCA808ADA37C91648D91184C9CC5E4C229115B7313EBC938ACCA
2,917,125 UART: [afmc] SIG.R = 30C3BDFBCE85C640DE74E626F98E08A4942BC629481C587504AECABF0779F432ACF73C6A4316A8B25F7967D27E15D078
2,922,832 UART: [afmc] SIG.S = DF0C4B20815E07AD4E801029E948DF6FF67413F8776C9E5027F4CD5F4325135B32A0C77D87875597BE636753EF6E6B57
2,930,472 UART: [afmc] --
2,931,504 UART: [cold-reset] --
2,932,306 UART: [state] Locking Datavault
2,933,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,939 UART: [state] Locking ICCM
2,934,377 UART: [exit] Launching FMC @ 0x40000130
2,939,707 UART:
2,939,723 UART: Running Caliptra FMC ...
2,940,131 UART:
2,940,274 UART: [state] CFI Enabled
2,951,272 UART: [fht] FMC Alias Private Key: 7
3,070,606 UART: [art] Extend RT PCRs Done
3,071,034 UART: [art] Lock RT PCRs Done
3,072,498 UART: [art] Populate DV Done
3,080,822 UART: [fht] FMC Alias Private Key: 7
3,081,862 UART: [art] Derive CDI
3,082,142 UART: [art] Store in slot 0x4
3,167,615 UART: [art] Derive Key Pair
3,167,975 UART: [art] Store priv key in slot 0x5
3,181,149 UART: [art] Derive Key Pair - Done
3,195,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,568 UART: [art] PUB.X = B783754B1B486E715935BC3B9068C253738358B566467D71C2B675D34778CF30821CCD77374FE52F5EAFD05A8EA029DE
3,219,336 UART: [art] PUB.Y = 0B621367DDDD90B1244B6745E724E0AF7774AE9B34683C3A22D2D923D5E48DAF0BE90918355510AD14336918690B2B3C
3,226,272 UART: [art] SIG.R = B2FA2CE043249815B25B7A7442425A8D369E63D2D34EEB95C19FAA0E0F4FED974E7D282B8511D251C944B7041E5EE308
3,233,036 UART: [art] SIG.S = 932FF66E834892EBEAFE57DE5277EA83E1804B113B0DFE6937AEB397EDE59B8E1F317CCCDF87ED8EC5F65CC2BAB09E71
3,256,975 UART: Caliptra RT
3,257,318 UART: [state] CFI Enabled
3,377,139 UART: [rt] RT listening for mailbox commands...
3,377,802 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,554 UART: [rt]cmd =0x46505652, len=4
3,408,214 UART: [rt] FIPS Version
3,409,255 >>> mbox cmd response data (36 bytes)
3,409,257 writing to cptra_bootfsm_go
3,409,349 UART:
3,409,365 UART: Running Caliptra ROM ...
3,409,773 UART:
3,409,915 UART: [state] CFI Enabled
3,412,936 UART: [state] LifecycleState = Production
3,413,544 UART: [state] DebugLocked = Yes
3,414,208 UART: [state] Starting the WD Timer 40000000 cycles
3,415,905 UART: [kat] SHA2-256
4,219,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,223,559 UART: [kat] ++
4,223,711 UART: [kat] sha1
4,227,911 UART: [kat] SHA2-256
4,229,851 UART: [kat] SHA2-384
4,232,578 UART: [kat] SHA2-512-ACC
4,234,479 UART: [kat] ECC-384
4,244,100 UART: [kat] HMAC-384Kdf
4,248,750 UART: [kat] LMS
4,497,062 UART: [kat] --
4,497,820 UART: [warm-reset] ++
4,498,567 UART: [warm-reset] --
4,499,248 UART: [state] Locking Datavault
4,500,116 UART: [state] Locking PCR0, PCR1 and PCR31
4,500,720 UART: [state] Locking ICCM
4,501,206 UART: [exit] Launching FMC @ 0x40000130
4,506,536 UART:
4,506,552 UART: Running Caliptra FMC ...
4,506,960 UART:
4,507,103 UART: [state] CFI Enabled
4,508,384 UART: [art] Skip pcr extension
4,508,793 UART: [art] Extend RT PCRs Done
4,509,221 UART: [art] Lock RT PCRs Done
4,510,522 UART: [art] Populate DV Done
4,518,670 UART: [fht] FMC Alias Private Key: 7
4,519,814 UART: [art] Derive CDI
4,520,094 UART: [art] Store in slot 0x4
4,605,879 UART: [art] Derive Key Pair
4,606,239 UART: [art] Store priv key in slot 0x5
4,619,711 UART: [art] Derive Key Pair - Done
4,634,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,650,203 UART: [art] Erasing AUTHORITY.KEYID = 7
4,650,968 UART: [art] PUB.X = B783754B1B486E715935BC3B9068C253738358B566467D71C2B675D34778CF30821CCD77374FE52F5EAFD05A8EA029DE
4,657,736 UART: [art] PUB.Y = 0B621367DDDD90B1244B6745E724E0AF7774AE9B34683C3A22D2D923D5E48DAF0BE90918355510AD14336918690B2B3C
4,664,672 UART: [art] SIG.R = B2FA2CE043249815B25B7A7442425A8D369E63D2D34EEB95C19FAA0E0F4FED974E7D282B8511D251C944B7041E5EE308
4,671,436 UART: [art] SIG.S = 932FF66E834892EBEAFE57DE5277EA83E1804B113B0DFE6937AEB397EDE59B8E1F317CCCDF87ED8EC5F65CC2BAB09E71
4,695,111 UART: Caliptra RT
4,695,454 UART: [state] CFI Enabled
5,062,038 UART: [rt] RT listening for mailbox commands...
5,062,701 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,079,301 UART: Disabled attest - cmd busy + warm rst
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,442 UART: [rt]cmd =0x46505652, len=4
5,110,102 UART: [rt] FIPS Version
5,110,985 >>> mbox cmd response data (36 bytes)
test test_warm_reset::test_warm_reset_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
191,622 UART:
191,975 UART: Running Caliptra ROM ...
193,196 UART:
193,353 UART: [state] CFI Enabled
265,502 UART: [state] LifecycleState = Unprovisioned
267,445 UART: [state] DebugLocked = Yes
269,562 UART: [state] Starting the WD Timer 1000000 cycles
274,261 UART: [kat] SHA2-256
453,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,749 UART: [kat] ++
465,260 UART: [kat] sha1
476,254 UART: [kat] SHA2-256
478,939 UART: [kat] SHA2-384
484,108 UART: [kat] SHA2-512-ACC
486,503 UART: [kat] ECC-384
1,273,128 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
1,279,756 UART: WDT Expired
1,280,334 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008126 ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
191,833 UART:
192,211 UART: Running Caliptra ROM ...
193,399 UART:
602,897 UART: [state] CFI Enabled
619,412 UART: [state] LifecycleState = Unprovisioned
621,327 UART: [state] DebugLocked = Yes
622,903 UART: [state] Starting the WD Timer 1000000 cycles
627,335 UART: [kat] SHA2-256
807,033 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,814 UART: [kat] ++
818,364 UART: [kat] sha1
829,571 UART: [kat] SHA2-256
832,273 UART: [kat] SHA2-384
839,593 UART: [kat] SHA2-512-ACC
841,979 UART: [kat] ECC-384
1,626,496 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
1,633,117 UART: WDT Expired
1,633,683 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009130 ra=0x0000911E error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008128 ra=0x00008114 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = Yes
86,581 UART: [state] Starting the WD Timer 1000000 cycles
88,156 UART: [kat] SHA2-256
891,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,324 UART: [kat] SHA2-256
902,264 UART: [kat] SHA2-384
905,031 UART: [kat] SHA2-512-ACC
906,932 UART: [kat] ECC-384
916,743 UART: [kat] HMAC-384Kdf
921,391 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,894 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079E6 ra=0x00008160 error_internal_intr_r=00000040
1,090,335 UART: WDT Expired
1,090,544 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079E6 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D8 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,324 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = Yes
86,616 UART: [state] Starting the WD Timer 1000000 cycles
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,626 UART: [kat] SHA2-512-ACC
906,527 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,896 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,929 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
1,090,368 UART: WDT Expired
1,090,577 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00007998 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00009184 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,743 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = Yes
86,041 UART: [state] Starting the WD Timer 1000000 cycles
87,430 UART: [kat] SHA2-256
890,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,084 UART: [kat] ++
895,236 UART: [kat] sha1
899,546 UART: [kat] SHA2-256
901,486 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,445 UART: [kat] HMAC-384Kdf
920,191 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,354 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079D2 ra=0x00008160 error_internal_intr_r=00000040
1,089,795 UART: WDT Expired
1,090,004 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079D2 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079A4 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,824 UART: [state] LifecycleState = Unprovisioned
86,480 UART: [state] DebugLocked = Yes
87,118 UART: [state] Starting the WD Timer 1000000 cycles
88,713 UART: [kat] SHA2-256
892,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,367 UART: [kat] ++
896,519 UART: [kat] sha1
900,627 UART: [kat] SHA2-256
902,567 UART: [kat] SHA2-384
905,270 UART: [kat] SHA2-512-ACC
907,171 UART: [kat] ECC-384
916,648 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,088,431 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079D2 ra=0x00008160 error_internal_intr_r=00000040
1,090,872 UART: WDT Expired
1,091,081 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079D2 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x0000793C ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = Yes
86,487 UART: [state] Starting the WD Timer 1000000 cycles
88,064 UART: [kat] SHA2-256
891,614 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,718 UART: [kat] ++
895,870 UART: [kat] sha1
900,080 UART: [kat] SHA2-256
902,020 UART: [kat] SHA2-384
904,571 UART: [kat] SHA2-512-ACC
906,472 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,701 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,800 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x00008164 ra=0x00008160 error_internal_intr_r=00000040
1,090,239 UART: WDT Expired
1,090,448 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x00008164 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078D8 ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = Yes
86,678 UART: [state] Starting the WD Timer 1000000 cycles
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
899,957 UART: [kat] SHA2-256
901,897 UART: [kat] SHA2-384
904,736 UART: [kat] SHA2-512-ACC
906,637 UART: [kat] ECC-384
916,498 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
handle_trap: cause=0, mtval=0, next_pc=184
1,087,991 UART: NMI mcause=0x00000000 mscause=0x00000000 mepc=0x000079A0 ra=0x00008160 error_internal_intr_r=00000040
1,090,432 UART: WDT Expired
1,090,641 UART: ROM Fatal Error: 0x0105000C
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000079A0 ra=0x00008160 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
handle_trap: cause=0, mtval=0, next_pc=184
WDT Expiry mcause=0x00000000 mscause=0x00000000 mepc=0x000078CA ra=0x000078A4 error_internal_intr_r=00000040
test test_wdt_activation_and_stoppage::test_rom_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
191,619 UART:
191,981 UART: Running Caliptra ROM ...
193,086 UART:
193,235 UART: [state] CFI Enabled
261,701 UART: [state] LifecycleState = Unprovisioned
263,668 UART: [state] DebugLocked = Yes
265,448 UART: [state] Starting the WD Timer 40000000 cycles
270,464 UART: [kat] SHA2-256
450,150 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,906 UART: [kat] ++
461,407 UART: [kat] sha1
473,040 UART: [kat] SHA2-256
475,730 UART: [kat] SHA2-384
481,881 UART: [kat] SHA2-512-ACC
484,249 UART: [kat] ECC-384
2,946,100 UART: [kat] HMAC-384Kdf
2,970,872 UART: [kat] LMS
3,447,387 UART: [kat] --
3,450,856 UART: [cold-reset] ++
3,452,993 UART: [fht] FHT @ 0x50003400
3,464,905 UART: [idev] ++
3,465,506 UART: [idev] CDI.KEYID = 6
3,466,424 UART: [idev] SUBJECT.KEYID = 7
3,467,638 UART: [idev] UDS.KEYID = 0
3,470,265 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,614,951 UART: [idev] Erasing UDS.KEYID = 0
5,983,643 UART: [idev] Sha1 KeyId Algorithm
6,007,640 UART: [idev] --
6,013,648 UART: [ldev] ++
6,014,227 UART: [ldev] CDI.KEYID = 6
6,015,150 UART: [ldev] SUBJECT.KEYID = 5
6,016,372 UART: [ldev] AUTHORITY.KEYID = 7
6,017,612 UART: [ldev] FE.KEYID = 1
6,056,587 UART: [ldev] Erasing FE.KEYID = 1
8,563,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,098 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,312,951 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,328,823 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,344,543 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,365,292 UART: [ldev] --
10,370,180 UART: [fwproc] Wait for Commands...
10,371,851 UART: [fwproc] Recv command 0x46574c44
10,373,847 UART: [fwproc] Recv'd Img size: 114888 bytes
13,812,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,889,992 UART: [fwproc] Load FMC at address 0x40000000 len 16384
13,950,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,279,371 >>> mbox cmd response: success
14,283,713 UART: [afmc] ++
14,284,339 UART: [afmc] CDI.KEYID = 6
14,285,313 UART: [afmc] SUBJECT.KEYID = 7
14,286,459 UART: [afmc] AUTHORITY.KEYID = 5
16,831,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,574,571 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,590,497 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,606,404 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,622,152 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,645,941 UART: [afmc] --
18,649,031 UART: [cold-reset] --
18,654,544 UART: [state] Locking Datavault
18,659,712 UART: [state] Locking PCR0, PCR1 and PCR31
18,661,432 UART: [state] Locking ICCM
18,663,861 UART: [exit] Launching FMC @ 0x40000000
18,672,226 UART:
18,672,482 UART: Running Caliptra FMC ...
18,673,625 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
3,466,542 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,181,406 >>> mbox cmd response: success
18,470,407 UART:
18,470,823 UART: Running Caliptra FMC ...
18,471,991 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,022 UART:
192,390 UART: Running Caliptra ROM ...
193,517 UART:
603,146 UART: [state] CFI Enabled
616,738 UART: [state] LifecycleState = Unprovisioned
618,660 UART: [state] DebugLocked = Yes
621,560 UART: [state] Starting the WD Timer 40000000 cycles
627,237 UART: [kat] SHA2-256
806,935 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,706 UART: [kat] ++
818,185 UART: [kat] sha1
829,402 UART: [kat] SHA2-256
832,070 UART: [kat] SHA2-384
837,146 UART: [kat] SHA2-512-ACC
839,508 UART: [kat] ECC-384
3,283,726 UART: [kat] HMAC-384Kdf
3,294,612 UART: [kat] LMS
3,771,131 UART: [kat] --
3,775,500 UART: [cold-reset] ++
3,777,274 UART: [fht] FHT @ 0x50003400
3,787,850 UART: [idev] ++
3,788,413 UART: [idev] CDI.KEYID = 6
3,789,419 UART: [idev] SUBJECT.KEYID = 7
3,790,624 UART: [idev] UDS.KEYID = 0
3,793,826 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
3,938,358 UART: [idev] Erasing UDS.KEYID = 0
6,268,935 UART: [idev] Sha1 KeyId Algorithm
6,292,346 UART: [idev] --
6,296,400 UART: [ldev] ++
6,296,967 UART: [ldev] CDI.KEYID = 6
6,297,928 UART: [ldev] SUBJECT.KEYID = 5
6,299,143 UART: [ldev] AUTHORITY.KEYID = 7
6,300,372 UART: [ldev] FE.KEYID = 1
6,312,323 UART: [ldev] Erasing FE.KEYID = 1
8,787,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,664 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,523,442 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,539,321 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,555,095 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,576,479 UART: [ldev] --
10,582,115 UART: [fwproc] Wait for Commands...
10,584,588 UART: [fwproc] Recv command 0x46574c44
10,586,575 UART: [fwproc] Recv'd Img size: 114888 bytes
14,026,389 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,102,536 UART: [fwproc] Load FMC at address 0x40000000 len 16384
14,162,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,491,776 >>> mbox cmd response: success
14,496,295 UART: [afmc] ++
14,496,901 UART: [afmc] CDI.KEYID = 6
14,497,842 UART: [afmc] SUBJECT.KEYID = 7
14,499,138 UART: [afmc] AUTHORITY.KEYID = 5
16,998,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,719,383 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,721,574 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
18,737,553 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
18,753,451 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
18,769,156 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
18,792,423 UART: [afmc] --
18,796,629 UART: [cold-reset] --
18,801,117 UART: [state] Locking Datavault
18,806,555 UART: [state] Locking PCR0, PCR1 and PCR31
18,808,266 UART: [state] Locking ICCM
18,809,714 UART: [exit] Launching FMC @ 0x40000000
18,818,074 UART:
18,818,321 UART: Running Caliptra FMC ...
18,819,378 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
3,780,977 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
14,389,790 >>> mbox cmd response: success
18,644,107 UART:
18,644,486 UART: Running Caliptra FMC ...
18,645,734 UART:
test test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,775 UART: [state] DebugLocked = Yes
86,391 UART: [state] Starting the WD Timer 40000000 cycles
87,934 UART: [kat] SHA2-256
891,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,588 UART: [kat] ++
895,740 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,649 UART: [kat] SHA2-512-ACC
906,550 UART: [kat] ECC-384
916,499 UART: [kat] HMAC-384Kdf
921,135 UART: [kat] LMS
1,169,447 UART: [kat] --
1,170,278 UART: [cold-reset] ++
1,170,743 UART: [fht] FHT @ 0x50003400
1,173,259 UART: [idev] ++
1,173,427 UART: [idev] CDI.KEYID = 6
1,173,788 UART: [idev] SUBJECT.KEYID = 7
1,174,213 UART: [idev] UDS.KEYID = 0
1,174,559 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,155 UART: [idev] Erasing UDS.KEYID = 0
1,199,826 UART: [idev] Sha1 KeyId Algorithm
1,208,915 UART: [idev] --
1,210,008 UART: [ldev] ++
1,210,176 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,967 UART: [ldev] AUTHORITY.KEYID = 7
1,211,430 UART: [ldev] FE.KEYID = 1
1,216,642 UART: [ldev] Erasing FE.KEYID = 1
1,243,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,761 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,455 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,325 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,031 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,039 UART: [ldev] --
1,282,366 UART: [fwproc] Wait for Commands...
1,283,115 UART: [fwproc] Recv command 0x46574c44
1,283,848 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,408 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,261 >>> mbox cmd response: success
2,781,406 UART: [afmc] ++
2,781,574 UART: [afmc] CDI.KEYID = 6
2,781,937 UART: [afmc] SUBJECT.KEYID = 7
2,782,363 UART: [afmc] AUTHORITY.KEYID = 5
2,817,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,843 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,556 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,427 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,137 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,980 UART: [afmc] --
2,860,826 UART: [cold-reset] --
2,861,890 UART: [state] Locking Datavault
2,862,921 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,525 UART: [state] Locking ICCM
2,864,145 UART: [exit] Launching FMC @ 0x40000000
2,869,442 UART:
2,869,458 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,634,042 >>> mbox cmd response: success
2,696,223 UART:
2,696,239 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = Yes
86,460 UART: [state] Starting the WD Timer 40000000 cycles
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,886 UART: [kat] SHA2-512-ACC
906,787 UART: [kat] ECC-384
916,088 UART: [kat] HMAC-384Kdf
920,588 UART: [kat] LMS
1,168,900 UART: [kat] --
1,169,905 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,415 UART: [idev] Sha1 KeyId Algorithm
1,208,380 UART: [idev] --
1,209,365 UART: [ldev] ++
1,209,533 UART: [ldev] CDI.KEYID = 6
1,209,897 UART: [ldev] SUBJECT.KEYID = 5
1,210,324 UART: [ldev] AUTHORITY.KEYID = 7
1,210,787 UART: [ldev] FE.KEYID = 1
1,216,135 UART: [ldev] Erasing FE.KEYID = 1
1,242,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,570 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,264 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,134 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,840 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,072 UART: [ldev] --
1,281,449 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,917 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,451 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,640,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,478 >>> mbox cmd response: success
2,781,723 UART: [afmc] ++
2,781,891 UART: [afmc] CDI.KEYID = 6
2,782,254 UART: [afmc] SUBJECT.KEYID = 7
2,782,680 UART: [afmc] AUTHORITY.KEYID = 5
2,818,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,835,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,836,024 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,841,737 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,847,608 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,853,318 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,861,091 UART: [afmc] --
2,861,911 UART: [cold-reset] --
2,862,711 UART: [state] Locking Datavault
2,864,052 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,656 UART: [state] Locking ICCM
2,865,328 UART: [exit] Launching FMC @ 0x40000000
2,870,625 UART:
2,870,641 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,788 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,949 >>> mbox cmd response: success
2,693,366 UART:
2,693,382 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = Yes
86,599 UART: [state] Starting the WD Timer 40000000 cycles
88,106 UART: [kat] SHA2-256
891,656 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,760 UART: [kat] ++
895,912 UART: [kat] sha1
899,988 UART: [kat] SHA2-256
901,928 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
915,889 UART: [kat] HMAC-384Kdf
920,413 UART: [kat] LMS
1,168,725 UART: [kat] --
1,169,678 UART: [cold-reset] ++
1,170,173 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,181,777 UART: [idev] Erasing UDS.KEYID = 0
1,198,546 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,442 UART: [ldev] ++
1,208,610 UART: [ldev] CDI.KEYID = 6
1,208,974 UART: [ldev] SUBJECT.KEYID = 5
1,209,401 UART: [ldev] AUTHORITY.KEYID = 7
1,209,864 UART: [ldev] FE.KEYID = 1
1,214,902 UART: [ldev] Erasing FE.KEYID = 1
1,240,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,039 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,745 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,913 UART: [ldev] --
1,280,158 UART: [fwproc] Wait for Commands...
1,280,833 UART: [fwproc] Recv command 0x46574c44
1,281,566 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,588 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,497 >>> mbox cmd response: success
2,780,646 UART: [afmc] ++
2,780,814 UART: [afmc] CDI.KEYID = 6
2,781,177 UART: [afmc] SUBJECT.KEYID = 7
2,781,603 UART: [afmc] AUTHORITY.KEYID = 5
2,817,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,675 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,840,388 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,846,259 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,969 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,670 UART: [afmc] --
2,860,496 UART: [cold-reset] --
2,861,408 UART: [state] Locking Datavault
2,862,641 UART: [state] Locking PCR0, PCR1 and PCR31
2,863,245 UART: [state] Locking ICCM
2,863,677 UART: [exit] Launching FMC @ 0x40000000
2,868,974 UART:
2,868,990 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,599 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,776 >>> mbox cmd response: success
2,693,647 UART:
2,693,663 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = Yes
86,902 UART: [state] Starting the WD Timer 40000000 cycles
88,591 UART: [kat] SHA2-256
892,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,245 UART: [kat] ++
896,397 UART: [kat] sha1
900,717 UART: [kat] SHA2-256
902,657 UART: [kat] SHA2-384
905,318 UART: [kat] SHA2-512-ACC
907,219 UART: [kat] ECC-384
917,170 UART: [kat] HMAC-384Kdf
922,004 UART: [kat] LMS
1,170,316 UART: [kat] --
1,171,457 UART: [cold-reset] ++
1,171,856 UART: [fht] FHT @ 0x50003400
1,174,580 UART: [idev] ++
1,174,748 UART: [idev] CDI.KEYID = 6
1,175,109 UART: [idev] SUBJECT.KEYID = 7
1,175,534 UART: [idev] UDS.KEYID = 0
1,175,880 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,358 UART: [idev] Erasing UDS.KEYID = 0
1,200,377 UART: [idev] Sha1 KeyId Algorithm
1,209,184 UART: [idev] --
1,210,093 UART: [ldev] ++
1,210,261 UART: [ldev] CDI.KEYID = 6
1,210,625 UART: [ldev] SUBJECT.KEYID = 5
1,211,052 UART: [ldev] AUTHORITY.KEYID = 7
1,211,515 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,242,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,970 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,664 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,534 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,240 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,202 UART: [ldev] --
1,281,491 UART: [fwproc] Wait for Commands...
1,282,298 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,612,769 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,638,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,778,806 >>> mbox cmd response: success
2,779,977 UART: [afmc] ++
2,780,145 UART: [afmc] CDI.KEYID = 6
2,780,508 UART: [afmc] SUBJECT.KEYID = 7
2,780,934 UART: [afmc] AUTHORITY.KEYID = 5
2,816,632 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,833,906 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,839,619 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,845,490 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,200 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,103 UART: [afmc] --
2,860,087 UART: [cold-reset] --
2,860,893 UART: [state] Locking Datavault
2,862,152 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,756 UART: [state] Locking ICCM
2,863,214 UART: [exit] Launching FMC @ 0x40000000
2,868,511 UART:
2,868,527 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,020 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,633,407 >>> mbox cmd response: success
2,695,864 UART:
2,695,880 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = Yes
86,531 UART: [state] Starting the WD Timer 40000000 cycles
88,222 UART: [kat] SHA2-256
891,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,876 UART: [kat] ++
896,028 UART: [kat] sha1
900,120 UART: [kat] SHA2-256
902,060 UART: [kat] SHA2-384
904,769 UART: [kat] SHA2-512-ACC
906,670 UART: [kat] ECC-384
916,131 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,226 UART: [cold-reset] ++
1,170,765 UART: [fht] FHT @ 0x50003400
1,173,603 UART: [idev] ++
1,173,771 UART: [idev] CDI.KEYID = 6
1,174,132 UART: [idev] SUBJECT.KEYID = 7
1,174,557 UART: [idev] UDS.KEYID = 0
1,174,903 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,182,871 UART: [idev] Erasing UDS.KEYID = 0
1,199,884 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,776 UART: [ldev] ++
1,209,944 UART: [ldev] CDI.KEYID = 6
1,210,308 UART: [ldev] SUBJECT.KEYID = 5
1,210,735 UART: [ldev] AUTHORITY.KEYID = 7
1,211,198 UART: [ldev] FE.KEYID = 1
1,216,346 UART: [ldev] Erasing FE.KEYID = 1
1,243,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,293 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,163 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,869 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,815 UART: [ldev] --
1,282,254 UART: [fwproc] Wait for Commands...
1,282,891 UART: [fwproc] Recv command 0x46574c44
1,283,624 UART: [fwproc] Recv'd Img size: 114888 bytes
2,586,682 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,613,598 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,779,499 >>> mbox cmd response: success
2,780,554 UART: [afmc] ++
2,780,722 UART: [afmc] CDI.KEYID = 6
2,781,085 UART: [afmc] SUBJECT.KEYID = 7
2,781,511 UART: [afmc] AUTHORITY.KEYID = 5
2,817,427 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,833,474 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,834,223 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,839,936 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,845,807 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,851,517 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,859,210 UART: [afmc] --
2,860,088 UART: [cold-reset] --
2,861,170 UART: [state] Locking Datavault
2,862,267 UART: [state] Locking PCR0, PCR1 and PCR31
2,862,871 UART: [state] Locking ICCM
2,863,399 UART: [exit] Launching FMC @ 0x40000000
2,868,696 UART:
2,868,712 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,501 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,630,744 >>> mbox cmd response: success
2,693,007 UART:
2,693,023 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,790 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = Yes
86,974 UART: [state] Starting the WD Timer 40000000 cycles
88,483 UART: [kat] SHA2-256
892,033 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,137 UART: [kat] ++
896,289 UART: [kat] sha1
900,743 UART: [kat] SHA2-256
902,683 UART: [kat] SHA2-384
905,432 UART: [kat] SHA2-512-ACC
907,333 UART: [kat] ECC-384
917,088 UART: [kat] HMAC-384Kdf
921,924 UART: [kat] LMS
1,170,236 UART: [kat] --
1,171,123 UART: [cold-reset] ++
1,171,488 UART: [fht] FHT @ 0x50003400
1,174,236 UART: [idev] ++
1,174,404 UART: [idev] CDI.KEYID = 6
1,174,765 UART: [idev] SUBJECT.KEYID = 7
1,175,190 UART: [idev] UDS.KEYID = 0
1,175,536 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,741 UART: [idev] Sha1 KeyId Algorithm
1,209,520 UART: [idev] --
1,210,613 UART: [ldev] ++
1,210,781 UART: [ldev] CDI.KEYID = 6
1,211,145 UART: [ldev] SUBJECT.KEYID = 5
1,211,572 UART: [ldev] AUTHORITY.KEYID = 7
1,212,035 UART: [ldev] FE.KEYID = 1
1,217,463 UART: [ldev] Erasing FE.KEYID = 1
1,243,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,608 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,302 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,172 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,878 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,832 UART: [ldev] --
1,283,239 UART: [fwproc] Wait for Commands...
1,283,860 UART: [fwproc] Recv command 0x46574c44
1,284,593 UART: [fwproc] Recv'd Img size: 114888 bytes
2,587,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,614,191 UART: [fwproc] Load FMC at address 0x40000000 len 16384
2,639,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,780,104 >>> mbox cmd response: success
2,781,177 UART: [afmc] ++
2,781,345 UART: [afmc] CDI.KEYID = 6
2,781,708 UART: [afmc] SUBJECT.KEYID = 7
2,782,134 UART: [afmc] AUTHORITY.KEYID = 5
2,818,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,834,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,835,630 UART: [afmc] PUB.X = 9F4D53ECE27DF9405BF045F143287602D553A5DC72B677AF0C54985DEC588424E987DCF8DBFE5A86B52997D2C39B58C1
2,841,343 UART: [afmc] PUB.Y = 0E09E8ED4C9D2EAAB57873E78A6A0EEF5521E9BD90024782074B089AEB9099434D7201CB28CF4140214EE422791A63A1
2,847,214 UART: [afmc] SIG.R = 75D669C59F72526A2236AF35A79F37ED19DFF4B1D38E7C061504ECFA70ACFCB33E42D098ACDC8458C22E2C3209AC64D9
2,852,924 UART: [afmc] SIG.S = 41C8FAFDC120A655D40801B2A2EEADD73561A99A37B19ABD6B9B2431D375ABA207F6E934C3CF22EAE7AC3AA61088B516
2,860,711 UART: [afmc] --
2,861,599 UART: [cold-reset] --
2,862,397 UART: [state] Locking Datavault
2,863,488 UART: [state] Locking PCR0, PCR1 and PCR31
2,864,092 UART: [state] Locking ICCM
2,864,704 UART: [exit] Launching FMC @ 0x40000000
2,870,001 UART:
2,870,017 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,556 <<< Executing mbox cmd 0x46574c44 (114888 bytes) from SoC
2,631,893 >>> mbox cmd response: success
2,692,992 UART:
2,693,008 UART: Running Caliptra FMCtest test_wdt_activation_and_stoppage::test_wdt_activation_and_stoppage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,220 UART:
192,579 UART: Running Caliptra ROM ...
193,768 UART:
193,925 UART: [state] CFI Enabled
262,669 UART: [state] LifecycleState = Unprovisioned
264,608 UART: [state] DebugLocked = No
266,038 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,621 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,490 UART:
192,878 UART: Running Caliptra ROM ...
194,015 UART:
603,787 UART: [state] CFI Enabled
614,892 UART: [state] LifecycleState = Unprovisioned
616,838 UART: [state] DebugLocked = No
618,486 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,958 UART: [state] LifecycleState = Unprovisioned
85,613 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Unprovisioned
85,515 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,033 UART: [state] LifecycleState = Unprovisioned
85,688 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test test_wdt_activation_and_stoppage::test_wdt_not_enabled_on_debug_part ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,070 UART:
192,439 UART: Running Caliptra ROM ...
193,605 UART:
193,758 UART: [state] CFI Enabled
261,050 UART: [state] LifecycleState = Unprovisioned
263,002 UART: [state] DebugLocked = No
265,209 UART: [state] WD Timer not started. Device not locked for debugging
268,986 UART: [kat] SHA2-256
448,619 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,420 UART: [kat] ++
460,066 UART: [kat] sha1
471,085 UART: [kat] SHA2-256
473,829 UART: [kat] SHA2-384
481,002 UART: [kat] SHA2-512-ACC
483,345 UART: [kat] ECC-384
2,945,624 UART: [kat] HMAC-384Kdf
2,967,798 UART: [kat] LMS
3,444,281 UART: [kat] --
3,449,025 UART: [cold-reset] ++
3,450,584 UART: [fht] FHT @ 0x50003400
3,461,943 UART: [idev] ++
3,462,562 UART: [idev] CDI.KEYID = 6
3,463,451 UART: [idev] SUBJECT.KEYID = 7
3,464,720 UART: [idev] UDS.KEYID = 0
3,499,363 UART: [idev] Erasing UDS.KEYID = 0
5,985,231 UART: [idev] Sha1 KeyId Algorithm
6,009,433 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,738,648 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,754,579 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,770,528 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,786,074 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,812,132 UART: [idev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
7,966,962 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
7,967,658 UART: [idev] --
7,972,573 UART: [ldev] ++
7,973,186 UART: [ldev] CDI.KEYID = 6
7,974,080 UART: [ldev] SUBJECT.KEYID = 5
7,975,297 UART: [ldev] AUTHORITY.KEYID = 7
7,976,533 UART: [ldev] FE.KEYID = 1
8,016,618 UART: [ldev] Erasing FE.KEYID = 1
10,524,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,258,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,274,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,290,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,305,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,328,541 UART: [ldev] --
12,333,536 UART: [fwproc] Wait for Commands...
12,335,904 UART: [fwproc] Recv command 0x49444352
12,352,105 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
7,741,511 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,049,188 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,420 UART:
192,786 UART: Running Caliptra ROM ...
193,958 UART:
603,407 UART: [state] CFI Enabled
618,039 UART: [state] LifecycleState = Unprovisioned
619,792 UART: [state] DebugLocked = No
621,722 UART: [state] WD Timer not started. Device not locked for debugging
626,263 UART: [kat] SHA2-256
805,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,700 UART: [kat] ++
817,338 UART: [kat] sha1
828,110 UART: [kat] SHA2-256
830,841 UART: [kat] SHA2-384
836,082 UART: [kat] SHA2-512-ACC
838,430 UART: [kat] ECC-384
3,280,528 UART: [kat] HMAC-384Kdf
3,293,451 UART: [kat] LMS
3,769,992 UART: [kat] --
3,774,161 UART: [cold-reset] ++
3,776,525 UART: [fht] FHT @ 0x50003400
3,789,063 UART: [idev] ++
3,789,689 UART: [idev] CDI.KEYID = 6
3,790,598 UART: [idev] SUBJECT.KEYID = 7
3,791,866 UART: [idev] UDS.KEYID = 0
3,807,946 UART: [idev] Erasing UDS.KEYID = 0
6,270,273 UART: [idev] Sha1 KeyId Algorithm
6,296,096 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,013,621 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,029,456 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,045,463 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,061,095 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,087,162 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,241,956 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
8,242,647 UART: [idev] --
8,247,334 UART: [ldev] ++
8,247,901 UART: [ldev] CDI.KEYID = 6
8,248,918 UART: [ldev] SUBJECT.KEYID = 5
8,250,074 UART: [ldev] AUTHORITY.KEYID = 7
8,251,304 UART: [ldev] FE.KEYID = 1
8,263,176 UART: [ldev] Erasing FE.KEYID = 1
10,741,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,463,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,479,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,495,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,510,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,531,570 UART: [ldev] --
12,537,739 UART: [fwproc] Wait for Commands...
12,540,911 UART: [fwproc] Recv command 0x49444352
12,557,114 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
8,026,073 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
12,258,335 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,271 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
891,054 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,158 UART: [kat] ++
895,310 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,201 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,208,429 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,737 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,445 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,330 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,036 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,465 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,674 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,298,843 UART: [idev] --
1,299,936 UART: [ldev] ++
1,300,104 UART: [ldev] CDI.KEYID = 6
1,300,468 UART: [ldev] SUBJECT.KEYID = 5
1,300,895 UART: [ldev] AUTHORITY.KEYID = 7
1,301,358 UART: [ldev] FE.KEYID = 1
1,306,450 UART: [ldev] Erasing FE.KEYID = 1
1,332,299 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,345,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,351,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,357,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,370,310 UART: [ldev] --
1,371,761 UART: [fwproc] Wait for Commands...
1,372,428 UART: [fwproc] Recv command 0x49444352
1,377,551 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,111,451 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,828 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,556 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,844 UART: [kat] SHA2-512-ACC
906,745 UART: [kat] ECC-384
916,972 UART: [kat] HMAC-384Kdf
921,588 UART: [kat] LMS
1,169,900 UART: [kat] --
1,170,889 UART: [cold-reset] ++
1,171,457 UART: [fht] FHT @ 0x50003400
1,174,135 UART: [idev] ++
1,174,303 UART: [idev] CDI.KEYID = 6
1,174,664 UART: [idev] SUBJECT.KEYID = 7
1,175,089 UART: [idev] UDS.KEYID = 0
1,183,032 UART: [idev] Erasing UDS.KEYID = 0
1,200,460 UART: [idev] Sha1 KeyId Algorithm
1,210,080 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,221,046 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,754 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,639 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,345 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,774 UART: [idev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
1,300,983 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,152 UART: [idev] --
1,302,173 UART: [ldev] ++
1,302,341 UART: [ldev] CDI.KEYID = 6
1,302,705 UART: [ldev] SUBJECT.KEYID = 5
1,303,132 UART: [ldev] AUTHORITY.KEYID = 7
1,303,595 UART: [ldev] FE.KEYID = 1
1,309,007 UART: [ldev] Erasing FE.KEYID = 1
1,335,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,301 UART: [ldev] --
1,374,582 UART: [fwproc] Wait for Commands...
1,375,343 UART: [fwproc] Recv command 0x49444352
1,380,466 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,570 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,413 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,493 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,391 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,648 UART: [fht] FHT @ 0x50003400
1,173,412 UART: [idev] ++
1,173,580 UART: [idev] CDI.KEYID = 6
1,173,941 UART: [idev] SUBJECT.KEYID = 7
1,174,366 UART: [idev] UDS.KEYID = 0
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,927 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,671 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,379 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,264 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,970 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,399 UART: [idev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
1,299,608 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,777 UART: [idev] --
1,300,790 UART: [ldev] ++
1,300,958 UART: [ldev] CDI.KEYID = 6
1,301,322 UART: [ldev] SUBJECT.KEYID = 5
1,301,749 UART: [ldev] AUTHORITY.KEYID = 7
1,302,212 UART: [ldev] FE.KEYID = 1
1,307,366 UART: [ldev] Erasing FE.KEYID = 1
1,333,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,364,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,052 UART: [ldev] --
1,373,297 UART: [fwproc] Wait for Commands...
1,374,068 UART: [fwproc] Recv command 0x49444352
1,379,191 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,469 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,798 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,612 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
891,361 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,465 UART: [kat] ++
895,617 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,062 UART: [kat] HMAC-384Kdf
920,716 UART: [kat] LMS
1,169,028 UART: [kat] --
1,169,947 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,081 UART: [idev] ++
1,173,249 UART: [idev] CDI.KEYID = 6
1,173,610 UART: [idev] SUBJECT.KEYID = 7
1,174,035 UART: [idev] UDS.KEYID = 0
1,181,764 UART: [idev] Erasing UDS.KEYID = 0
1,199,488 UART: [idev] Sha1 KeyId Algorithm
1,208,968 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,692 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,400 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,285 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,991 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,420 UART: [idev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
1,299,629 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,299,798 UART: [idev] --
1,300,873 UART: [ldev] ++
1,301,041 UART: [ldev] CDI.KEYID = 6
1,301,405 UART: [ldev] SUBJECT.KEYID = 5
1,301,832 UART: [ldev] AUTHORITY.KEYID = 7
1,302,295 UART: [ldev] FE.KEYID = 1
1,307,623 UART: [ldev] Erasing FE.KEYID = 1
1,334,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,297 UART: [ldev] --
1,373,600 UART: [fwproc] Wait for Commands...
1,374,267 UART: [fwproc] Recv command 0x49444352
1,379,390 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,634 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,315 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,252 UART: [kat] SHA2-256
891,802 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,906 UART: [kat] ++
896,058 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,995 UART: [kat] SHA2-512-ACC
906,896 UART: [kat] ECC-384
916,701 UART: [kat] HMAC-384Kdf
921,461 UART: [kat] LMS
1,169,773 UART: [kat] --
1,170,642 UART: [cold-reset] ++
1,171,092 UART: [fht] FHT @ 0x50003400
1,173,662 UART: [idev] ++
1,173,830 UART: [idev] CDI.KEYID = 6
1,174,191 UART: [idev] SUBJECT.KEYID = 7
1,174,616 UART: [idev] UDS.KEYID = 0
1,182,945 UART: [idev] Erasing UDS.KEYID = 0
1,200,561 UART: [idev] Sha1 KeyId Algorithm
1,210,211 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,713 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,421 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,306 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,012 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,441 UART: [idev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
1,300,650 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,300,819 UART: [idev] --
1,301,904 UART: [ldev] ++
1,302,072 UART: [ldev] CDI.KEYID = 6
1,302,436 UART: [ldev] SUBJECT.KEYID = 5
1,302,863 UART: [ldev] AUTHORITY.KEYID = 7
1,303,326 UART: [ldev] FE.KEYID = 1
1,308,620 UART: [ldev] Erasing FE.KEYID = 1
1,334,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,347,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,353,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,380 UART: [ldev] --
1,373,805 UART: [fwproc] Wait for Commands...
1,374,388 UART: [fwproc] Recv command 0x49444352
1,379,511 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,643 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,738 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,746 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,683 UART: [kat] ++
895,835 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,530 UART: [kat] HMAC-384Kdf
921,192 UART: [kat] LMS
1,169,504 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,907 UART: [fht] FHT @ 0x50003400
1,173,469 UART: [idev] ++
1,173,637 UART: [idev] CDI.KEYID = 6
1,173,998 UART: [idev] SUBJECT.KEYID = 7
1,174,423 UART: [idev] UDS.KEYID = 0
1,183,050 UART: [idev] Erasing UDS.KEYID = 0
1,200,564 UART: [idev] Sha1 KeyId Algorithm
1,210,218 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,220,966 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,226,674 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,232,559 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,238,265 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,246,694 UART: [idev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
1,300,903 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,301,072 UART: [idev] --
1,302,025 UART: [ldev] ++
1,302,193 UART: [ldev] CDI.KEYID = 6
1,302,557 UART: [ldev] SUBJECT.KEYID = 5
1,302,984 UART: [ldev] AUTHORITY.KEYID = 7
1,303,447 UART: [ldev] FE.KEYID = 1
1,308,767 UART: [ldev] Erasing FE.KEYID = 1
1,335,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,349,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,667 UART: [ldev] --
1,374,924 UART: [fwproc] Wait for Commands...
1,375,631 UART: [fwproc] Recv command 0x49444352
1,380,754 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,470 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,162,833 >>> mbox cmd response data (524 bytes)
test tests_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,927 writing to cptra_bootfsm_go
193,092 UART:
193,459 UART: Running Caliptra ROM ...
194,544 UART:
194,694 UART: [state] CFI Enabled
267,019 UART: [state] LifecycleState = Unprovisioned
268,992 UART: [state] DebugLocked = No
270,752 UART: [state] WD Timer not started. Device not locked for debugging
274,492 UART: [kat] SHA2-256
454,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,922 UART: [kat] ++
465,372 UART: [kat] sha1
475,762 UART: [kat] SHA2-256
478,507 UART: [kat] SHA2-384
483,523 UART: [kat] SHA2-512-ACC
485,855 UART: [kat] ECC-384
2,949,764 UART: [kat] HMAC-384Kdf
2,972,064 UART: [kat] LMS
3,448,599 UART: [kat] --
3,453,508 UART: [cold-reset] ++
3,454,529 UART: [fht] FHT @ 0x50003400
3,464,593 UART: [idev] ++
3,465,167 UART: [idev] CDI.KEYID = 6
3,466,211 UART: [idev] SUBJECT.KEYID = 7
3,467,373 UART: [idev] UDS.KEYID = 0
3,468,377 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,503,068 UART: [idev] Erasing UDS.KEYID = 0
5,985,244 UART: [idev] Sha1 KeyId Algorithm
6,009,233 UART: [idev] --
6,013,807 UART: [ldev] ++
6,014,393 UART: [ldev] CDI.KEYID = 6
6,015,317 UART: [ldev] SUBJECT.KEYID = 5
6,016,536 UART: [ldev] AUTHORITY.KEYID = 7
6,017,785 UART: [ldev] FE.KEYID = 1
6,058,037 UART: [ldev] Erasing FE.KEYID = 1
8,566,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,319 UART: [ldev] --
10,373,104 UART: [fwproc] Wait for Commands...
10,376,178 UART: [fwproc] Recv command 0x49444352
10,381,414 UART: ROM Fatal Error: 0x0102000A
10,384,620 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,461,721 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,271,144 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,409 UART:
192,798 UART: Running Caliptra ROM ...
193,973 UART:
603,458 UART: [state] CFI Enabled
618,093 UART: [state] LifecycleState = Unprovisioned
620,036 UART: [state] DebugLocked = No
621,444 UART: [state] WD Timer not started. Device not locked for debugging
625,967 UART: [kat] SHA2-256
805,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,367 UART: [kat] ++
816,863 UART: [kat] sha1
828,328 UART: [kat] SHA2-256
831,064 UART: [kat] SHA2-384
837,093 UART: [kat] SHA2-512-ACC
839,505 UART: [kat] ECC-384
3,281,075 UART: [kat] HMAC-384Kdf
3,293,741 UART: [kat] LMS
3,770,264 UART: [kat] --
3,774,242 UART: [cold-reset] ++
3,776,869 UART: [fht] FHT @ 0x50003400
3,786,549 UART: [idev] ++
3,787,171 UART: [idev] CDI.KEYID = 6
3,788,083 UART: [idev] SUBJECT.KEYID = 7
3,789,351 UART: [idev] UDS.KEYID = 0
3,790,347 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,806,682 UART: [idev] Erasing UDS.KEYID = 0
6,267,696 UART: [idev] Sha1 KeyId Algorithm
6,291,518 UART: [idev] --
6,296,736 UART: [ldev] ++
6,297,368 UART: [ldev] CDI.KEYID = 6
6,298,298 UART: [ldev] SUBJECT.KEYID = 5
6,299,461 UART: [ldev] AUTHORITY.KEYID = 7
6,300,758 UART: [ldev] FE.KEYID = 1
6,310,895 UART: [ldev] Erasing FE.KEYID = 1
8,786,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,713 UART: [ldev] --
10,580,549 UART: [fwproc] Wait for Commands...
10,583,834 UART: [fwproc] Recv command 0x49444352
10,590,953 UART: ROM Fatal Error: 0x0102000A
10,594,149 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,777,822 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
10,490,035 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 125 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,069 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,348 UART: [kat] SHA2-256
901,288 UART: [kat] SHA2-384
904,141 UART: [kat] SHA2-512-ACC
906,042 UART: [kat] ECC-384
915,993 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,207,965 UART: [idev] --
1,209,104 UART: [ldev] ++
1,209,272 UART: [ldev] CDI.KEYID = 6
1,209,636 UART: [ldev] SUBJECT.KEYID = 5
1,210,063 UART: [ldev] AUTHORITY.KEYID = 7
1,210,526 UART: [ldev] FE.KEYID = 1
1,215,694 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,580 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,792 UART: [ldev] --
1,281,173 UART: [fwproc] Wait for Commands...
1,281,756 UART: [fwproc] Recv command 0x49444352
1,283,375 UART: ROM Fatal Error: 0x0102000A
1,284,536 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,322 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,654 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,541 UART: [kat] SHA2-256
891,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,195 UART: [kat] ++
895,347 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
915,838 UART: [kat] HMAC-384Kdf
920,358 UART: [kat] LMS
1,168,670 UART: [kat] --
1,169,415 UART: [cold-reset] ++
1,169,945 UART: [fht] FHT @ 0x50003400
1,172,611 UART: [idev] ++
1,172,779 UART: [idev] CDI.KEYID = 6
1,173,140 UART: [idev] SUBJECT.KEYID = 7
1,173,565 UART: [idev] UDS.KEYID = 0
1,173,911 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,272 UART: [idev] Erasing UDS.KEYID = 0
1,198,534 UART: [idev] Sha1 KeyId Algorithm
1,207,396 UART: [idev] --
1,208,389 UART: [ldev] ++
1,208,557 UART: [ldev] CDI.KEYID = 6
1,208,921 UART: [ldev] SUBJECT.KEYID = 5
1,209,348 UART: [ldev] AUTHORITY.KEYID = 7
1,209,811 UART: [ldev] FE.KEYID = 1
1,215,323 UART: [ldev] Erasing FE.KEYID = 1
1,241,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,755 UART: [ldev] --
1,281,140 UART: [fwproc] Wait for Commands...
1,281,747 UART: [fwproc] Recv command 0x49444352
1,283,258 UART: ROM Fatal Error: 0x0102000A
1,284,419 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,127 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
88,040 UART: [kat] SHA2-256
891,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,694 UART: [kat] ++
895,846 UART: [kat] sha1
900,024 UART: [kat] SHA2-256
901,964 UART: [kat] SHA2-384
904,729 UART: [kat] SHA2-512-ACC
906,630 UART: [kat] ECC-384
916,645 UART: [kat] HMAC-384Kdf
921,357 UART: [kat] LMS
1,169,669 UART: [kat] --
1,170,654 UART: [cold-reset] ++
1,170,980 UART: [fht] FHT @ 0x50003400
1,173,754 UART: [idev] ++
1,173,922 UART: [idev] CDI.KEYID = 6
1,174,283 UART: [idev] SUBJECT.KEYID = 7
1,174,708 UART: [idev] UDS.KEYID = 0
1,175,054 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,727 UART: [idev] Erasing UDS.KEYID = 0
1,199,487 UART: [idev] Sha1 KeyId Algorithm
1,208,363 UART: [idev] --
1,209,592 UART: [ldev] ++
1,209,760 UART: [ldev] CDI.KEYID = 6
1,210,124 UART: [ldev] SUBJECT.KEYID = 5
1,210,551 UART: [ldev] AUTHORITY.KEYID = 7
1,211,014 UART: [ldev] FE.KEYID = 1
1,216,070 UART: [ldev] Erasing FE.KEYID = 1
1,241,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,616 UART: [ldev] --
1,280,965 UART: [fwproc] Wait for Commands...
1,281,786 UART: [fwproc] Recv command 0x49444352
1,283,377 UART: ROM Fatal Error: 0x0102000A
1,284,538 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,294 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,036 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,193 UART: [state] LifecycleState = Unprovisioned
85,848 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,701 UART: [kat] SHA2-256
891,251 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,355 UART: [kat] ++
895,507 UART: [kat] sha1
899,657 UART: [kat] SHA2-256
901,597 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,056 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,961 UART: [cold-reset] ++
1,170,357 UART: [fht] FHT @ 0x50003400
1,172,857 UART: [idev] ++
1,173,025 UART: [idev] CDI.KEYID = 6
1,173,386 UART: [idev] SUBJECT.KEYID = 7
1,173,811 UART: [idev] UDS.KEYID = 0
1,174,157 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,199,200 UART: [idev] Sha1 KeyId Algorithm
1,208,088 UART: [idev] --
1,209,041 UART: [ldev] ++
1,209,209 UART: [ldev] CDI.KEYID = 6
1,209,573 UART: [ldev] SUBJECT.KEYID = 5
1,210,000 UART: [ldev] AUTHORITY.KEYID = 7
1,210,463 UART: [ldev] FE.KEYID = 1
1,215,903 UART: [ldev] Erasing FE.KEYID = 1
1,242,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,035 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,059 UART: [fwproc] Recv command 0x49444352
1,283,704 UART: ROM Fatal Error: 0x0102000A
1,284,865 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,185 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,142,105 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,360 UART: [kat] SHA2-256
901,300 UART: [kat] SHA2-384
904,005 UART: [kat] SHA2-512-ACC
905,906 UART: [kat] ECC-384
915,539 UART: [kat] HMAC-384Kdf
920,249 UART: [kat] LMS
1,168,561 UART: [kat] --
1,169,302 UART: [cold-reset] ++
1,169,830 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,173,674 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,207,107 UART: [idev] --
1,208,064 UART: [ldev] ++
1,208,232 UART: [ldev] CDI.KEYID = 6
1,208,596 UART: [ldev] SUBJECT.KEYID = 5
1,209,023 UART: [ldev] AUTHORITY.KEYID = 7
1,209,486 UART: [ldev] FE.KEYID = 1
1,214,886 UART: [ldev] Erasing FE.KEYID = 1
1,241,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,414 UART: [ldev] --
1,280,817 UART: [fwproc] Wait for Commands...
1,281,548 UART: [fwproc] Recv command 0x49444352
1,283,249 UART: ROM Fatal Error: 0x0102000A
1,284,410 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,998 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,140,416 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
891,789 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,893 UART: [kat] ++
896,045 UART: [kat] sha1
900,129 UART: [kat] SHA2-256
902,069 UART: [kat] SHA2-384
904,832 UART: [kat] SHA2-512-ACC
906,733 UART: [kat] ECC-384
916,438 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,385 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,689 UART: [idev] ++
1,173,857 UART: [idev] CDI.KEYID = 6
1,174,218 UART: [idev] SUBJECT.KEYID = 7
1,174,643 UART: [idev] UDS.KEYID = 0
1,174,989 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,694 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,133 UART: [ldev] SUBJECT.KEYID = 5
1,210,560 UART: [ldev] AUTHORITY.KEYID = 7
1,211,023 UART: [ldev] FE.KEYID = 1
1,216,537 UART: [ldev] Erasing FE.KEYID = 1
1,243,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,282,972 UART: [fwproc] Wait for Commands...
1,283,717 UART: [fwproc] Recv command 0x49444352
1,285,304 UART: ROM Fatal Error: 0x0102000A
1,286,465 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,833 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
1,141,403 >>> mbox cmd response: failed
test tests_get_idev_csr::test_get_csr_generate_csr_flag_not_set ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 124 filtered out; finished in 0.61s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_dupe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_empty ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test set_auth_manifest::tests::test_sort_and_duplicate_sort ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,121 UART:
192,469 UART: Running Caliptra ROM ...
193,675 UART:
193,833 UART: [state] CFI Enabled
264,446 UART: [state] LifecycleState = Unprovisioned
266,363 UART: [state] DebugLocked = No
268,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,494 UART: [kat] SHA2-256
442,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,662 UART: [kat] ++
453,182 UART: [kat] sha1
463,560 UART: [kat] SHA2-256
466,220 UART: [kat] SHA2-384
472,146 UART: [kat] SHA2-512-ACC
474,605 UART: [kat] ECC-384
2,767,991 UART: [kat] HMAC-384Kdf
2,781,128 UART: [kat] LMS
3,971,461 UART: [kat] --
3,977,044 UART: [cold-reset] ++
3,979,753 UART: [fht] Storing FHT @ 0x50003400
3,992,577 UART: [idev] ++
3,993,137 UART: [idev] CDI.KEYID = 6
3,994,167 UART: [idev] SUBJECT.KEYID = 7
3,995,414 UART: [idev] UDS.KEYID = 0
3,996,400 ready_for_fw is high
3,996,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,145,696 UART: [idev] Erasing UDS.KEYID = 0
7,328,246 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,038 UART: [idev] --
7,354,980 UART: [ldev] ++
7,355,644 UART: [ldev] CDI.KEYID = 6
7,356,531 UART: [ldev] SUBJECT.KEYID = 5
7,357,747 UART: [ldev] AUTHORITY.KEYID = 7
7,359,036 UART: [ldev] FE.KEYID = 1
7,404,657 UART: [ldev] Erasing FE.KEYID = 1
10,737,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,412 UART: [ldev] --
13,097,993 UART: [fwproc] Waiting for Commands...
13,100,306 UART: [fwproc] Received command 0x46574c44
13,102,539 UART: [fwproc] Received Image of size 118548 bytes
17,210,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,284,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,536 >>> mbox cmd response: success
17,691,158 UART: [afmc] ++
17,691,792 UART: [afmc] CDI.KEYID = 6
17,692,674 UART: [afmc] SUBJECT.KEYID = 7
17,693,889 UART: [afmc] AUTHORITY.KEYID = 5
21,053,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,354,538 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,356,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,371,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,385,982 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,400,389 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,422,117 UART: [afmc] --
23,425,605 UART: [cold-reset] --
23,430,490 UART: [state] Locking Datavault
23,435,524 UART: [state] Locking PCR0, PCR1 and PCR31
23,437,320 UART: [state] Locking ICCM
23,439,072 UART: [exit] Launching FMC @ 0x40000130
23,447,419 UART:
23,447,659 UART: Running Caliptra FMC ...
23,448,687 UART:
23,448,838 UART: [state] CFI Enabled
23,514,328 UART: [fht] FMC Alias Private Key: 7
25,875,174 UART: [art] Extend RT PCRs Done
25,876,392 UART: [art] Lock RT PCRs Done
25,877,828 UART: [art] Populate DV Done
25,883,509 UART: [fht] FMC Alias Private Key: 7
25,885,002 UART: [art] Derive CDI
25,885,743 UART: [art] Store in slot 0x4
25,943,804 UART: [art] Derive Key Pair
25,944,849 UART: [art] Store priv key in slot 0x5
29,237,916 UART: [art] Derive Key Pair - Done
29,251,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,887 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,392 UART: [art] PUB.X = 557B81170FF36A17F6B44E680D3FEB65A0DAFE8143AF9823E345ED44157D5CF6CB2A7E16E140B22C5ACFA768C5EB8624
31,547,693 UART: [art] PUB.Y = CCC018A7C7F12460441C15ABD3C508709E6B5D6479D0E6B2DE683B5A6910FCC8162E091A13BCA28238CF3774F03EA172
31,554,912 UART: [art] SIG.R = F093B0E30BDF51D2EEC1FDDF222DF102CA16D817FB61E5A6A6AF0FCAD43BC0EDC3E4102FCD663EDCBC1857BE77D08C06
31,562,359 UART: [art] SIG.S = D0A4E7BF38AF0C44D539F5A15AFD8C90258A7BD463DC440EFE2440E64A311D435011E6ECF889669CD92228A04B052E5E
32,867,351 UART: Caliptra RT
32,868,075 UART: [state] CFI Enabled
33,044,274 UART: [rt] RT listening for mailbox commands...
33,046,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,201,986 UART: [rt]cmd =0x41544d4e, len=14344
38,502,489 >>> mbox cmd response data (8 bytes)
38,503,096 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,533,937 UART: [rt]cmd =0x41545348, len=116
38,554,369 >>> mbox cmd response data (12 bytes)
40,630,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,781,437 UART:
40,781,812 UART: Running Caliptra ROM ...
40,782,887 UART:
40,783,049 UART: [state] CFI Enabled
40,858,318 UART: [state] LifecycleState = Unprovisioned
40,860,270 UART: [state] DebugLocked = No
40,862,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,868,013 UART: [kat] SHA2-256
41,037,699 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,048,154 UART: [kat] ++
41,048,647 UART: [kat] sha1
41,060,080 UART: [kat] SHA2-256
41,062,731 UART: [kat] SHA2-384
41,068,559 UART: [kat] SHA2-512-ACC
41,070,961 UART: [kat] ECC-384
43,362,708 UART: [kat] HMAC-384Kdf
43,374,737 UART: [kat] LMS
44,565,101 UART: [kat] --
44,570,909 UART: [update-reset] ++
48,762,630 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,766,035 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,163,820 >>> mbox cmd response: success
49,168,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,169,220 UART: [update-reset] Copying MAN_2 To MAN_1
49,188,181 UART: [update-reset Success] --
49,191,178 UART: [state] Locking Datavault
49,195,269 UART: [state] Locking PCR0, PCR1 and PCR31
49,197,024 UART: [state] Locking ICCM
49,198,402 UART: [exit] Launching FMC @ 0x40000130
49,206,799 UART:
49,207,034 UART: Running Caliptra FMC ...
49,208,134 UART:
49,208,292 UART: [state] CFI Enabled
49,295,919 UART: [art] Extend RT PCRs Done
49,297,126 UART: [art] Lock RT PCRs Done
49,298,609 UART: [art] Populate DV Done
49,304,449 UART: [fht] FMC Alias Private Key: 7
49,306,009 UART: [art] Derive CDI
49,306,778 UART: [art] Store in slot 0x4
49,365,034 UART: [art] Derive Key Pair
49,366,077 UART: [art] Store priv key in slot 0x5
52,658,648 UART: [art] Derive Key Pair - Done
52,671,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,960,767 UART: [art] Erasing AUTHORITY.KEYID = 7
54,962,276 UART: [art] PUB.X = 40E8B67C3B9D1884939FF978A61104E5BDA527AEC27C975C66727FFFF78AD9453BD1899C0CC69784C376F8FCC38456CF
54,969,569 UART: [art] PUB.Y = DC7AD7F9C552F0305CFF3BC3FBD36BC3D4B7B898B3ADA1E9E5913F534A0B55E5259476040C1C80F48D258285DC94755B
54,976,843 UART: [art] SIG.R = 4DA869BBDA07C9A1CF7D99CF76373C1EE1A2B6A7EEE1E3448858C29497AA08EB46DEE54D66F51137A248F0479AC22058
54,984,222 UART: [art] SIG.S = 1EA6AA021204F8ACD5244776D1006C794074E4C8208AB693A7164488F338D53DCDA13F6C1EB67463D7A3AE2D67C09060
56,289,286 UART: Caliptra RT
56,289,992 UART: [state] CFI Enabled
56,707,703 UART: [rt] RT listening for mailbox commands...
56,739,350 UART: [rt]cmd =0x41545348, len=116
56,758,752 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,809,939 ready_for_fw is high
3,810,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,979,852 >>> mbox cmd response: success
23,674,984 UART:
23,675,377 UART: Running Caliptra FMC ...
23,676,490 UART:
23,676,643 UART: [state] CFI Enabled
23,743,558 UART: [fht] FMC Alias Private Key: 7
26,083,435 UART: [art] Extend RT PCRs Done
26,084,666 UART: [art] Lock RT PCRs Done
26,086,054 UART: [art] Populate DV Done
26,091,413 UART: [fht] FMC Alias Private Key: 7
26,093,114 UART: [art] Derive CDI
26,093,930 UART: [art] Store in slot 0x4
26,152,490 UART: [art] Derive Key Pair
26,153,535 UART: [art] Store priv key in slot 0x5
29,446,310 UART: [art] Derive Key Pair - Done
29,459,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,471 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,984 UART: [art] PUB.X = 6C5314F316EF9F9A97928BB812AE4CB0C6713506057132DD09640F396CEBEE4AF456EC246552DB3280BEF8F238703AD3
31,756,233 UART: [art] PUB.Y = B69A59E9D43D19A31CE85B75B544E1E8D6397433AD4504521F21C83E20E74A288DB771ABAFBFE52603D6E1FC1236AD77
31,763,499 UART: [art] SIG.R = 7266ACD86C0FD0A205364E4593220C21FF6C2C1D56DEF3CA6CD0567EA69512E98FF6B94C2D59CA51E61BAD2D555D3D81
31,770,884 UART: [art] SIG.S = 0154F16F9ACB022E3B6866C08AD1BAFB950BFE79754008CA8C6332499BCA2226C44AE48DAD0FDBB5EF259056D16FEF07
33,076,321 UART: Caliptra RT
33,077,048 UART: [state] CFI Enabled
33,252,484 UART: [rt] RT listening for mailbox commands...
33,254,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,410,417 UART: [rt]cmd =0x41544d4e, len=14344
38,710,894 >>> mbox cmd response data (8 bytes)
38,711,459 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,742,293 UART: [rt]cmd =0x41545348, len=116
38,762,539 >>> mbox cmd response data (12 bytes)
40,836,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,666,105 >>> mbox cmd response: success
49,666,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,700,649 UART:
49,700,934 UART: Running Caliptra FMC ...
49,702,012 UART:
49,702,172 UART: [state] CFI Enabled
49,798,889 UART: [art] Extend RT PCRs Done
49,800,179 UART: [art] Lock RT PCRs Done
49,801,696 UART: [art] Populate DV Done
49,807,319 UART: [fht] FMC Alias Private Key: 7
49,808,909 UART: [art] Derive CDI
49,809,722 UART: [art] Store in slot 0x4
49,868,094 UART: [art] Derive Key Pair
49,869,093 UART: [art] Store priv key in slot 0x5
53,162,496 UART: [art] Derive Key Pair - Done
53,175,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,464,082 UART: [art] Erasing AUTHORITY.KEYID = 7
55,465,599 UART: [art] PUB.X = 8760AA02C6D1C9A7D83864D7F26AD38FD60D5BE66AE803BE0E9CD580DB1D797807132501CA84A5B7EA708D0F12D8A87B
55,472,861 UART: [art] PUB.Y = 35A6F78425E8AC22172E51F33A7819015A4114648A8D8974EF8B4AEE3AE0B30C4A72C5A7553FFA3A04F6600186095F19
55,480,076 UART: [art] SIG.R = 9285D123723D76E32667D7B8CA79639B986B951B87156139C0498DD2E6B48A1F2562C92148817CA7400944D7F60EA705
55,487,430 UART: [art] SIG.S = 9E95B393A12E623550410DA1814A0542550A3F1943C5788D7A5520263F63FF3BAA5E2538768254B70736E045474FBCC2
56,791,934 UART: Caliptra RT
56,792,644 UART: [state] CFI Enabled
57,210,410 UART: [rt] RT listening for mailbox commands...
57,242,294 UART: [rt]cmd =0x41545348, len=116
57,262,838 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,492 UART:
192,845 UART: Running Caliptra ROM ...
193,989 UART:
603,788 UART: [state] CFI Enabled
618,335 UART: [state] LifecycleState = Unprovisioned
620,236 UART: [state] DebugLocked = No
623,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,105 UART: [kat] SHA2-256
797,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,358 UART: [kat] ++
808,924 UART: [kat] sha1
820,077 UART: [kat] SHA2-256
822,807 UART: [kat] SHA2-384
827,939 UART: [kat] SHA2-512-ACC
830,299 UART: [kat] ECC-384
3,114,386 UART: [kat] HMAC-384Kdf
3,126,262 UART: [kat] LMS
4,316,344 UART: [kat] --
4,318,863 UART: [cold-reset] ++
4,320,507 UART: [fht] Storing FHT @ 0x50003400
4,333,191 UART: [idev] ++
4,333,746 UART: [idev] CDI.KEYID = 6
4,334,694 UART: [idev] SUBJECT.KEYID = 7
4,335,930 UART: [idev] UDS.KEYID = 0
4,336,850 ready_for_fw is high
4,337,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,908 UART: [idev] Erasing UDS.KEYID = 0
7,620,943 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,371 UART: [idev] --
7,646,256 UART: [ldev] ++
7,647,023 UART: [ldev] CDI.KEYID = 6
7,647,912 UART: [ldev] SUBJECT.KEYID = 5
7,648,954 UART: [ldev] AUTHORITY.KEYID = 7
7,650,290 UART: [ldev] FE.KEYID = 1
7,660,847 UART: [ldev] Erasing FE.KEYID = 1
10,948,204 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,614 UART: [ldev] --
13,307,955 UART: [fwproc] Waiting for Commands...
13,309,844 UART: [fwproc] Received command 0x46574c44
13,312,075 UART: [fwproc] Received Image of size 118548 bytes
17,415,713 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,922 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,529 >>> mbox cmd response: success
17,899,338 UART: [afmc] ++
17,899,976 UART: [afmc] CDI.KEYID = 6
17,900,858 UART: [afmc] SUBJECT.KEYID = 7
17,902,121 UART: [afmc] AUTHORITY.KEYID = 5
21,216,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,228 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,937 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,661 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,059 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,057 UART: [afmc] --
23,582,504 UART: [cold-reset] --
23,586,902 UART: [state] Locking Datavault
23,591,548 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,294 UART: [state] Locking ICCM
23,595,739 UART: [exit] Launching FMC @ 0x40000130
23,604,124 UART:
23,604,350 UART: Running Caliptra FMC ...
23,605,442 UART:
23,605,595 UART: [state] CFI Enabled
23,613,961 UART: [fht] FMC Alias Private Key: 7
25,954,494 UART: [art] Extend RT PCRs Done
25,955,710 UART: [art] Lock RT PCRs Done
25,957,384 UART: [art] Populate DV Done
25,962,518 UART: [fht] FMC Alias Private Key: 7
25,964,270 UART: [art] Derive CDI
25,965,108 UART: [art] Store in slot 0x4
26,007,885 UART: [art] Derive Key Pair
26,008,926 UART: [art] Store priv key in slot 0x5
29,250,876 UART: [art] Derive Key Pair - Done
29,263,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,748 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,252 UART: [art] PUB.X = A84F23D7EEB8DDEA5D2E7F401D738BE5E75A137DC107411B236E1CA5134F178077A8CE5A6D0563F84E433547CE1A57FF
31,552,495 UART: [art] PUB.Y = 51D52BE7CBC54FAE7932EB0AF96926A73E219F8EC345808B4D469092094EA8530945890E44E5C4C5BE173C420ED16B3E
31,559,766 UART: [art] SIG.R = F516546B52302DF6F15654C0DCFBCEA71A24C771AD62323B35DE76B4F2D781B5D0F41C4C2517B356EC2E0A96EE385137
31,567,234 UART: [art] SIG.S = 7FD28AA3236434465E92374A010B77AB9787E36AF093613E862BD3CDF6404BB5D4EDD4D37F96C862F4E60723A02984DA
32,871,939 UART: Caliptra RT
32,872,651 UART: [state] CFI Enabled
33,006,116 UART: [rt] RT listening for mailbox commands...
33,008,663 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,164,171 UART: [rt]cmd =0x41544d4e, len=14344
38,464,621 >>> mbox cmd response data (8 bytes)
38,465,245 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,495,807 UART: [rt]cmd =0x41545348, len=116
38,515,289 >>> mbox cmd response data (12 bytes)
40,589,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,739,680 UART:
40,740,052 UART: Running Caliptra ROM ...
40,741,102 UART:
40,741,322 UART: [state] CFI Enabled
40,756,079 UART: [state] LifecycleState = Unprovisioned
40,757,984 UART: [state] DebugLocked = No
40,760,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,765,743 UART: [kat] SHA2-256
40,935,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,945,990 UART: [kat] ++
40,946,529 UART: [kat] sha1
40,956,933 UART: [kat] SHA2-256
40,959,670 UART: [kat] SHA2-384
40,965,874 UART: [kat] SHA2-512-ACC
40,968,220 UART: [kat] ECC-384
43,253,266 UART: [kat] HMAC-384Kdf
43,264,957 UART: [kat] LMS
44,455,015 UART: [kat] --
44,459,063 UART: [update-reset] ++
48,654,814 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,658,394 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,056,161 >>> mbox cmd response: success
49,061,006 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,061,601 UART: [update-reset] Copying MAN_2 To MAN_1
49,080,326 UART: [update-reset Success] --
49,084,832 UART: [state] Locking Datavault
49,087,280 UART: [state] Locking PCR0, PCR1 and PCR31
49,089,036 UART: [state] Locking ICCM
49,091,791 UART: [exit] Launching FMC @ 0x40000130
49,100,188 UART:
49,100,430 UART: Running Caliptra FMC ...
49,101,525 UART:
49,101,678 UART: [state] CFI Enabled
49,146,387 UART: [art] Extend RT PCRs Done
49,147,526 UART: [art] Lock RT PCRs Done
49,149,040 UART: [art] Populate DV Done
49,154,823 UART: [fht] FMC Alias Private Key: 7
49,156,466 UART: [art] Derive CDI
49,157,277 UART: [art] Store in slot 0x4
49,200,065 UART: [art] Derive Key Pair
49,201,114 UART: [art] Store priv key in slot 0x5
52,443,727 UART: [art] Derive Key Pair - Done
52,456,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,736,631 UART: [art] Erasing AUTHORITY.KEYID = 7
54,738,145 UART: [art] PUB.X = 6AA5F3BFE949D31A1E808A0905EFCE9950134C20B4BB6297C110C5106C68FF03B5937F8187ED23C76B3B3953F135CC29
54,745,440 UART: [art] PUB.Y = 4E97DF74FF2156E0B3E665763BEAB92613664E3D9FF5CEAEED40FF012F50597CD4E8B61E51CCBCB8E86F67BE74F78D4D
54,752,715 UART: [art] SIG.R = 3905EFF0E146AFA0C09E088A514A604F6BD346112FA10C9A55D5F4009418F414DDBDA4CDD3A69D7972B197E878A6C8EE
54,760,103 UART: [art] SIG.S = 579110BBE9F7C77D8F11CA09818FCA5B4A10F9D31EB40EF0BE5F45D5257BAB3CC800DF5611062EC6A43764D11B506F1E
56,065,107 UART: Caliptra RT
56,065,825 UART: [state] CFI Enabled
56,435,149 UART: [rt] RT listening for mailbox commands...
56,467,011 UART: [rt]cmd =0x41545348, len=116
56,487,972 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,164 writing to cptra_bootfsm_go
4,133,465 ready_for_fw is high
4,133,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,117 >>> mbox cmd response: success
23,814,824 UART:
23,815,222 UART: Running Caliptra FMC ...
23,816,330 UART:
23,816,481 UART: [state] CFI Enabled
23,824,565 UART: [fht] FMC Alias Private Key: 7
26,165,186 UART: [art] Extend RT PCRs Done
26,166,410 UART: [art] Lock RT PCRs Done
26,167,954 UART: [art] Populate DV Done
26,173,150 UART: [fht] FMC Alias Private Key: 7
26,174,851 UART: [art] Derive CDI
26,175,587 UART: [art] Store in slot 0x4
26,218,336 UART: [art] Derive Key Pair
26,219,328 UART: [art] Store priv key in slot 0x5
29,461,848 UART: [art] Derive Key Pair - Done
29,474,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,755,503 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,026 UART: [art] PUB.X = 6F5F4137F9D28B62853CA83B7CD8998A56FFFA22C16999231899E3C8ED48E704A30E2AD7AE1195FF30E7ACDA34CFE182
31,764,311 UART: [art] PUB.Y = 7127F6995E53292B0049CB61A2080FB810D25C9BA7F091E6AEC387D0AF4E8C34C81A99F26D937DA6C3BDC788AF713D68
31,771,539 UART: [art] SIG.R = 257E588E695C78DB6A1779F8987DF3A69BC9FE9C4A164414474A68CA04E3CB262BBEF6DEBC8828FDE83737E055E2FFED
31,778,932 UART: [art] SIG.S = 5C42C9D8BDB101C15C44FB1C3B0428A3731960BFF88F30E2DEBAADBF37D89A8AB7142871BF70B655AAB1EF7FC3F7831E
33,083,367 UART: Caliptra RT
33,084,086 UART: [state] CFI Enabled
33,217,324 UART: [rt] RT listening for mailbox commands...
33,219,707 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,375,020 UART: [rt]cmd =0x41544d4e, len=14344
38,676,095 >>> mbox cmd response data (8 bytes)
38,676,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,707,303 UART: [rt]cmd =0x41545348, len=116
38,727,451 >>> mbox cmd response data (12 bytes)
40,800,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,553,616 >>> mbox cmd response: success
49,554,252 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,589,533 UART:
49,589,804 UART: Running Caliptra FMC ...
49,590,916 UART:
49,591,076 UART: [state] CFI Enabled
49,635,402 UART: [art] Extend RT PCRs Done
49,636,694 UART: [art] Lock RT PCRs Done
49,637,892 UART: [art] Populate DV Done
49,643,409 UART: [fht] FMC Alias Private Key: 7
49,645,153 UART: [art] Derive CDI
49,645,959 UART: [art] Store in slot 0x4
49,688,529 UART: [art] Derive Key Pair
49,689,564 UART: [art] Store priv key in slot 0x5
52,931,478 UART: [art] Derive Key Pair - Done
52,944,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,224,492 UART: [art] Erasing AUTHORITY.KEYID = 7
55,226,001 UART: [art] PUB.X = 0D8A7506F7BCA27ECFDEED6B91BDEF73D8652EFDDB2A9EC7BFCCF4C27A13A9E03B778E8E9866796DFC497088E1DB2992
55,233,310 UART: [art] PUB.Y = 56D93908E4C925394C739232625FC570575B3BAE0ADCD57B014E4EF421D8AD585418167068AF29FF3E5E380F7F70757F
55,240,530 UART: [art] SIG.R = F9BAB700CF02AF7635334050D2B7FA8A14EB6CFDF094385DFA670D6FEB0F8911C47328A00E0570B49592E030F57C2301
55,247,913 UART: [art] SIG.S = 76160D499C0E7918F6712C4B93713633A5CCFFE196CCC5540C5FC18A66A5B5E1825BF47C874FFACB0670FC0CCD3329DB
56,552,819 UART: Caliptra RT
56,553,523 UART: [state] CFI Enabled
56,930,110 UART: [rt] RT listening for mailbox commands...
56,962,113 UART: [rt]cmd =0x41545348, len=116
56,981,842 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
192,042 UART:
192,417 UART: Running Caliptra ROM ...
193,625 UART:
193,784 UART: [state] CFI Enabled
267,582 UART: [state] LifecycleState = Unprovisioned
269,558 UART: [state] DebugLocked = No
271,368 UART: [state] WD Timer not started. Device not locked for debugging
275,321 UART: [kat] SHA2-256
454,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,740 UART: [kat] ++
466,189 UART: [kat] sha1
476,702 UART: [kat] SHA2-256
479,355 UART: [kat] SHA2-384
485,627 UART: [kat] SHA2-512-ACC
487,985 UART: [kat] ECC-384
2,949,203 UART: [kat] HMAC-384Kdf
2,970,899 UART: [kat] LMS
3,447,397 UART: [kat] --
3,452,133 UART: [cold-reset] ++
3,453,994 UART: [fht] FHT @ 0x50003400
3,465,110 UART: [idev] ++
3,465,738 UART: [idev] CDI.KEYID = 6
3,466,615 UART: [idev] SUBJECT.KEYID = 7
3,467,924 UART: [idev] UDS.KEYID = 0
3,468,819 ready_for_fw is high
3,469,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,109 UART: [idev] Erasing UDS.KEYID = 0
5,985,975 UART: [idev] Sha1 KeyId Algorithm
6,009,905 UART: [idev] --
6,014,115 UART: [ldev] ++
6,014,745 UART: [ldev] CDI.KEYID = 6
6,015,676 UART: [ldev] SUBJECT.KEYID = 5
6,016,835 UART: [ldev] AUTHORITY.KEYID = 7
6,018,122 UART: [ldev] FE.KEYID = 1
6,056,452 UART: [ldev] Erasing FE.KEYID = 1
8,565,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,034 UART: [ldev] --
10,374,061 UART: [fwproc] Wait for Commands...
10,376,701 UART: [fwproc] Recv command 0x46574c44
10,378,677 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,990 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,953,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,026,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,354,333 >>> mbox cmd response: success
14,358,118 UART: [afmc] ++
14,358,704 UART: [afmc] CDI.KEYID = 6
14,359,690 UART: [afmc] SUBJECT.KEYID = 7
14,360,851 UART: [afmc] AUTHORITY.KEYID = 5
16,895,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,699 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,746 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,352 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,411 UART: [afmc] --
18,714,701 UART: [cold-reset] --
18,720,124 UART: [state] Locking Datavault
18,725,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,552 UART: [state] Locking ICCM
18,728,864 UART: [exit] Launching FMC @ 0x40000130
18,737,252 UART:
18,737,482 UART: Running Caliptra FMC ...
18,738,599 UART:
18,738,766 UART: [state] CFI Enabled
18,795,397 UART: [fht] FMC Alias Private Key: 7
20,561,851 UART: [art] Extend RT PCRs Done
20,563,114 UART: [art] Lock RT PCRs Done
20,564,690 UART: [art] Populate DV Done
20,570,104 UART: [fht] FMC Alias Private Key: 7
20,571,805 UART: [art] Derive CDI
20,572,617 UART: [art] Store in slot 0x4
20,628,426 UART: [art] Derive Key Pair
20,629,472 UART: [art] Store priv key in slot 0x5
23,092,259 UART: [art] Derive Key Pair - Done
23,104,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,474 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,985 UART: [art] PUB.X = 7A61282447CC6881FE103C492B3E1A4731713588B71DF83900B50A135451B957E87307176BCE990E2BA482344CCD733E
24,826,185 UART: [art] PUB.Y = BD6F7679A9C5661FDEA6A27926AD586A87F78CCE876FFAE83309CFE661CD762D9432F711AABD091629CF22E2D2F738EE
24,833,495 UART: [art] SIG.R = C35D5208D0ECD966AF89E152303031A168087ED1BE62993813CAE0C406E1BEBF28DF3ED84B0D00277EB7CF6CC1AB8028
24,840,979 UART: [art] SIG.S = E996E5BFFD5CE26A6B98447E1985F97EEB54241C4603D82631DD93E360ADF480E6FA342D7178F95BE81DD8D18CB7DCCE
25,819,685 UART: Caliptra RT
25,820,409 UART: [state] CFI Enabled
25,999,513 UART: [rt] RT listening for mailbox commands...
26,001,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,157,156 UART: [rt]cmd =0x41544d4e, len=14344
30,152,758 >>> mbox cmd response data (8 bytes)
30,153,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,184,298 UART: [rt]cmd =0x41545348, len=116
30,204,402 >>> mbox cmd response data (12 bytes)
32,263,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,414,473 UART:
32,414,858 UART: Running Caliptra ROM ...
32,415,990 UART:
32,416,162 UART: [state] CFI Enabled
32,490,817 UART: [state] LifecycleState = Unprovisioned
32,492,752 UART: [state] DebugLocked = No
32,495,169 UART: [state] WD Timer not started. Device not locked for debugging
32,499,457 UART: [kat] SHA2-256
32,679,083 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,689,892 UART: [kat] ++
32,690,437 UART: [kat] sha1
32,700,898 UART: [kat] SHA2-256
32,703,633 UART: [kat] SHA2-384
32,709,343 UART: [kat] SHA2-512-ACC
32,711,696 UART: [kat] ECC-384
35,175,602 UART: [kat] HMAC-384Kdf
35,197,471 UART: [kat] LMS
35,673,943 UART: [kat] --
35,677,298 UART: [update-reset] ++
39,168,951 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,171,851 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,569,449 >>> mbox cmd response: success
39,569,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,571,275 UART: [update-reset] Copying MAN_2 To MAN_1
39,608,355 UART: [update-reset Success] --
39,613,286 UART: [state] Locking Datavault
39,616,316 UART: [state] Locking PCR0, PCR1 and PCR31
39,618,068 UART: [state] Locking ICCM
39,619,414 UART: [exit] Launching FMC @ 0x40000130
39,627,805 UART:
39,628,042 UART: Running Caliptra FMC ...
39,629,144 UART:
39,629,317 UART: [state] CFI Enabled
39,731,786 UART: [art] Extend RT PCRs Done
39,732,972 UART: [art] Lock RT PCRs Done
39,734,478 UART: [art] Populate DV Done
39,740,152 UART: [fht] FMC Alias Private Key: 7
39,741,791 UART: [art] Derive CDI
39,742,604 UART: [art] Store in slot 0x4
39,800,803 UART: [art] Derive Key Pair
39,801,834 UART: [art] Store priv key in slot 0x5
42,265,035 UART: [art] Derive Key Pair - Done
42,277,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,991,096 UART: [art] Erasing AUTHORITY.KEYID = 7
43,992,621 UART: [art] PUB.X = B56834AD2DBB6A96D8B3E4B6EE07106DC575D17B2551B0E06670000B57E0E356B69CD87C3B5AD0414A2FB9E7783CC248
43,999,878 UART: [art] PUB.Y = 7F70418B197A714A2B56EC6ED3F2C0226A14304EB8FBC52098807E9E808B804EE7AA00B40399C4365FBAC05B7E324ACE
44,007,158 UART: [art] SIG.R = CD0B30D0DD1B213E6A533C04A51E6EB0B01769A9FD72B16AFB6866DF8D4ACB002DE0F083F0C93D4C7C416FD722548EB0
44,014,556 UART: [art] SIG.S = 31BC03AD0BFF130F848F134369A4F69F11FD6BFC346C3229139674A113CCF24184F7C6BEEF0FF11AD05FC26DA70ECD5B
44,993,733 UART: Caliptra RT
44,994,444 UART: [state] CFI Enabled
45,414,299 UART: [rt] RT listening for mailbox commands...
45,446,255 UART: [rt]cmd =0x41545348, len=116
45,467,022 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,459,073 ready_for_fw is high
3,459,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,198,961 >>> mbox cmd response: success
18,491,712 UART:
18,492,097 UART: Running Caliptra FMC ...
18,493,298 UART:
18,493,460 UART: [state] CFI Enabled
18,560,390 UART: [fht] FMC Alias Private Key: 7
20,326,212 UART: [art] Extend RT PCRs Done
20,327,434 UART: [art] Lock RT PCRs Done
20,329,007 UART: [art] Populate DV Done
20,334,044 UART: [fht] FMC Alias Private Key: 7
20,335,642 UART: [art] Derive CDI
20,336,454 UART: [art] Store in slot 0x4
20,393,267 UART: [art] Derive Key Pair
20,394,293 UART: [art] Store priv key in slot 0x5
22,856,853 UART: [art] Derive Key Pair - Done
22,869,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,534 UART: [art] PUB.X = 73726B7BE9D6A67CAA1E8B593DFC0BA02D29B8F57A38E024B0EDD5AE4D332744713BAEEB2AB9AB4A02FA68187EE1612F
24,591,844 UART: [art] PUB.Y = C2FEBF97E20DD3CD6FB4D2D48B5C2F4E4BB372EAA411E04B1DDB19DDA4B4A027860315715E274F05743FAB7EE64B830B
24,599,101 UART: [art] SIG.R = 98BBA960585EC78DA37EB84C22D410BBFCFA81CB9E8F117343EFFB798897AA281171846A8190F08D9DB364A16F085EE2
24,606,494 UART: [art] SIG.S = 82D32321ED639F05178E5858F20FEB4576AA4B0075659E644421BEF73942C5D7EF470B893A14E6330886020DB4113533
25,585,960 UART: Caliptra RT
25,586,668 UART: [state] CFI Enabled
25,765,796 UART: [rt] RT listening for mailbox commands...
25,768,210 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,923,532 UART: [rt]cmd =0x41544d4e, len=14344
29,919,106 >>> mbox cmd response data (8 bytes)
29,919,724 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,950,558 UART: [rt]cmd =0x41545348, len=116
29,970,250 >>> mbox cmd response data (12 bytes)
32,024,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,329,267 >>> mbox cmd response: success
39,329,941 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,362,108 UART:
39,362,441 UART: Running Caliptra FMC ...
39,363,568 UART:
39,363,727 UART: [state] CFI Enabled
39,454,472 UART: [art] Extend RT PCRs Done
39,455,714 UART: [art] Lock RT PCRs Done
39,457,125 UART: [art] Populate DV Done
39,462,425 UART: [fht] FMC Alias Private Key: 7
39,464,151 UART: [art] Derive CDI
39,464,966 UART: [art] Store in slot 0x4
39,523,333 UART: [art] Derive Key Pair
39,524,370 UART: [art] Store priv key in slot 0x5
41,987,070 UART: [art] Derive Key Pair - Done
42,000,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,713,863 UART: [art] Erasing AUTHORITY.KEYID = 7
43,715,373 UART: [art] PUB.X = 6E23C0F4F0A2B5C3B74CD82894D66BD7AADD9E12492F4417882799D62C6EBC7C1C1B1AB1869AB5804782F131B0E85378
43,722,645 UART: [art] PUB.Y = C738A5E6DCB55BA4F3DD740BD04D12302CA565608083617E8AA44425F779AC9E0A8F4C845F3D07DE1EB08957E9C054D4
43,729,878 UART: [art] SIG.R = 64A45A2771B81CE888A1A6272AE24743FEBB5DD5BECA54AF184E28C4D058DF8C8E89AD7AECD130C5B573F90FAC4E2C2B
43,737,321 UART: [art] SIG.S = 87BD5688F9C4EFD83C0ED82E3407EB3635B53F48B67FC3FF09C985CE64F2993CD914E9CC2256DF44F1E77EA49ACCEA1D
44,715,774 UART: Caliptra RT
44,716,479 UART: [state] CFI Enabled
45,137,935 UART: [rt] RT listening for mailbox commands...
45,170,059 UART: [rt]cmd =0x41545348, len=116
45,189,854 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,421 UART:
192,773 UART: Running Caliptra ROM ...
193,906 UART:
603,496 UART: [state] CFI Enabled
620,426 UART: [state] LifecycleState = Unprovisioned
622,305 UART: [state] DebugLocked = No
623,629 UART: [state] WD Timer not started. Device not locked for debugging
628,095 UART: [kat] SHA2-256
807,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,585 UART: [kat] ++
819,061 UART: [kat] sha1
829,450 UART: [kat] SHA2-256
832,184 UART: [kat] SHA2-384
837,115 UART: [kat] SHA2-512-ACC
839,483 UART: [kat] ECC-384
3,279,554 UART: [kat] HMAC-384Kdf
3,291,152 UART: [kat] LMS
3,767,677 UART: [kat] --
3,771,816 UART: [cold-reset] ++
3,773,558 UART: [fht] FHT @ 0x50003400
3,784,837 UART: [idev] ++
3,785,520 UART: [idev] CDI.KEYID = 6
3,786,413 UART: [idev] SUBJECT.KEYID = 7
3,787,666 UART: [idev] UDS.KEYID = 0
3,788,594 ready_for_fw is high
3,788,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,480 UART: [idev] Erasing UDS.KEYID = 0
6,263,033 UART: [idev] Sha1 KeyId Algorithm
6,285,894 UART: [idev] --
6,291,895 UART: [ldev] ++
6,292,466 UART: [ldev] CDI.KEYID = 6
6,293,436 UART: [ldev] SUBJECT.KEYID = 5
6,294,599 UART: [ldev] AUTHORITY.KEYID = 7
6,295,886 UART: [ldev] FE.KEYID = 1
6,306,052 UART: [ldev] Erasing FE.KEYID = 1
8,781,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,349 UART: [ldev] --
10,577,509 UART: [fwproc] Wait for Commands...
10,580,682 UART: [fwproc] Recv command 0x46574c44
10,582,750 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,598 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,001 >>> mbox cmd response: success
14,553,656 UART: [afmc] ++
14,554,294 UART: [afmc] CDI.KEYID = 6
14,555,212 UART: [afmc] SUBJECT.KEYID = 7
14,556,404 UART: [afmc] AUTHORITY.KEYID = 5
17,060,196 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,085 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,172 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,747 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,303 UART: [afmc] --
18,860,260 UART: [cold-reset] --
18,864,452 UART: [state] Locking Datavault
18,870,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,436 UART: [state] Locking ICCM
18,873,675 UART: [exit] Launching FMC @ 0x40000130
18,882,074 UART:
18,882,332 UART: Running Caliptra FMC ...
18,883,387 UART:
18,883,563 UART: [state] CFI Enabled
18,891,571 UART: [fht] FMC Alias Private Key: 7
20,657,454 UART: [art] Extend RT PCRs Done
20,659,134 UART: [art] Lock RT PCRs Done
20,660,172 UART: [art] Populate DV Done
20,665,482 UART: [fht] FMC Alias Private Key: 7
20,666,969 UART: [art] Derive CDI
20,667,734 UART: [art] Store in slot 0x4
20,710,868 UART: [art] Derive Key Pair
20,711,869 UART: [art] Store priv key in slot 0x5
23,138,622 UART: [art] Derive Key Pair - Done
23,151,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,640 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,138 UART: [art] PUB.X = 7FE0F8AFF7C4B06DEB846BD46AC43CCF7D033144120DE229498EDBA1E5C0B9C07C4FE10FFBAE426B9ECA0593EBC2F4F4
24,866,435 UART: [art] PUB.Y = 9C9C9305E77DD7B6E5FE0FE805E2B44F6B14343E504BA9C3CBFAD10F18B006E732F2695E69C8602620F5B75C9493F18A
24,873,666 UART: [art] SIG.R = FF051DDF928A38125DC11B13AA27B36B8058FB69A272BF3DAB7132670159247B986E19F2A8D8E48A003952B9F404CFCF
24,881,080 UART: [art] SIG.S = 66C7C4CAF44FD1BF7773EC02156AF1C5B332363388C2BA5E0AC94C685481E9E6E2DD41306E2137A77969B6F57A9C0323
25,859,702 UART: Caliptra RT
25,860,408 UART: [state] CFI Enabled
25,993,233 UART: [rt] RT listening for mailbox commands...
25,995,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,151,097 UART: [rt]cmd =0x41544d4e, len=14344
30,146,174 >>> mbox cmd response data (8 bytes)
30,146,798 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,177,640 UART: [rt]cmd =0x41545348, len=116
30,197,426 >>> mbox cmd response data (12 bytes)
32,255,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,405,795 UART:
32,406,205 UART: Running Caliptra ROM ...
32,407,262 UART:
32,407,415 UART: [state] CFI Enabled
32,422,459 UART: [state] LifecycleState = Unprovisioned
32,424,400 UART: [state] DebugLocked = No
32,427,223 UART: [state] WD Timer not started. Device not locked for debugging
32,431,414 UART: [kat] SHA2-256
32,611,086 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,621,892 UART: [kat] ++
32,622,350 UART: [kat] sha1
32,631,941 UART: [kat] SHA2-256
32,634,633 UART: [kat] SHA2-384
32,640,305 UART: [kat] SHA2-512-ACC
32,642,653 UART: [kat] ECC-384
35,083,519 UART: [kat] HMAC-384Kdf
35,097,228 UART: [kat] LMS
35,573,717 UART: [kat] --
35,577,948 UART: [update-reset] ++
39,075,842 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,079,444 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,477,043 >>> mbox cmd response: success
39,477,507 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,477,941 UART: [update-reset] Copying MAN_2 To MAN_1
39,514,526 UART: [update-reset Success] --
39,519,683 UART: [state] Locking Datavault
39,522,828 UART: [state] Locking PCR0, PCR1 and PCR31
39,524,583 UART: [state] Locking ICCM
39,526,304 UART: [exit] Launching FMC @ 0x40000130
39,534,710 UART:
39,534,956 UART: Running Caliptra FMC ...
39,536,062 UART:
39,536,224 UART: [state] CFI Enabled
39,580,595 UART: [art] Extend RT PCRs Done
39,581,788 UART: [art] Lock RT PCRs Done
39,583,243 UART: [art] Populate DV Done
39,588,650 UART: [fht] FMC Alias Private Key: 7
39,590,345 UART: [art] Derive CDI
39,591,160 UART: [art] Store in slot 0x4
39,633,863 UART: [art] Derive Key Pair
39,634,905 UART: [art] Store priv key in slot 0x5
42,061,674 UART: [art] Derive Key Pair - Done
42,074,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,780,440 UART: [art] Erasing AUTHORITY.KEYID = 7
43,781,947 UART: [art] PUB.X = 89A58949E25BB6C4B9BAD4DDEF8E085BA577ACF1C9F06274E2FAB9ACA757BDAF3BE4209BEB8A54BAC3351943A5F8F9A4
43,789,305 UART: [art] PUB.Y = 57330998FDF91E17D6114F44BF08988E10244F3130E61AB904A6A0A3A098A1B954CF8FC67AEAD94ADF281260DB747241
43,796,541 UART: [art] SIG.R = B6A13DF8B406FB7EA837D84E33D6FD134A97080DB2073FF86C8D6C8FB678BD7705FA884587934AC96C98BA1968553B73
43,803,931 UART: [art] SIG.S = DE9E658C83DEC5731A5B61A471EF872FC33670C39111E668C31AC4B909771361AA279D778CDAC2501016496B6DB91141
44,782,869 UART: Caliptra RT
44,783,575 UART: [state] CFI Enabled
45,154,800 UART: [rt] RT listening for mailbox commands...
45,186,563 UART: [rt]cmd =0x41545348, len=116
45,206,687 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,777,764 ready_for_fw is high
3,778,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,377 >>> mbox cmd response: success
18,696,225 UART:
18,696,622 UART: Running Caliptra FMC ...
18,697,741 UART:
18,697,895 UART: [state] CFI Enabled
18,705,985 UART: [fht] FMC Alias Private Key: 7
20,471,523 UART: [art] Extend RT PCRs Done
20,472,750 UART: [art] Lock RT PCRs Done
20,474,354 UART: [art] Populate DV Done
20,480,041 UART: [fht] FMC Alias Private Key: 7
20,481,755 UART: [art] Derive CDI
20,482,573 UART: [art] Store in slot 0x4
20,525,499 UART: [art] Derive Key Pair
20,526,548 UART: [art] Store priv key in slot 0x5
22,953,269 UART: [art] Derive Key Pair - Done
22,966,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,059 UART: [art] PUB.X = 1368D8A16244F1CC3962F29420FDFE201E9B89BEBE1BB63E8C0A144CCC1BA4437E024C4FE7A7B689EF74049EE1E74068
24,681,330 UART: [art] PUB.Y = 0701101C5ED6B1DFB47942F321F2769B42FD4BCFDFC34A3625CAD47903861FDB3B2BB116AAB098C95E6DF1F6418B216D
24,688,584 UART: [art] SIG.R = B6441E7283B5F41FAF2F4F9A6B4B37B79C73F516D0B8FC1EAC21A5A2E4230F5A36B9419F7F4BDC70DF52A1A700BA6A90
24,695,988 UART: [art] SIG.S = 06C0E5B85591EFA95DF55C4D2BDAF4FB6403658A3442484AE9DF2C587BD7987A42EFCA78D22E19BCB9342C80C72A95A8
25,674,537 UART: Caliptra RT
25,675,240 UART: [state] CFI Enabled
25,808,678 UART: [rt] RT listening for mailbox commands...
25,811,081 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,966,543 UART: [rt]cmd =0x41544d4e, len=14344
29,962,125 >>> mbox cmd response data (8 bytes)
29,962,687 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,993,591 UART: [rt]cmd =0x41545348, len=116
30,013,773 >>> mbox cmd response data (12 bytes)
32,069,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,297,204 >>> mbox cmd response: success
39,297,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,331,224 UART:
39,331,516 UART: Running Caliptra FMC ...
39,332,638 UART:
39,332,801 UART: [state] CFI Enabled
39,377,104 UART: [art] Extend RT PCRs Done
39,378,352 UART: [art] Lock RT PCRs Done
39,379,871 UART: [art] Populate DV Done
39,385,453 UART: [fht] FMC Alias Private Key: 7
39,387,149 UART: [art] Derive CDI
39,387,968 UART: [art] Store in slot 0x4
39,430,576 UART: [art] Derive Key Pair
39,431,580 UART: [art] Store priv key in slot 0x5
41,858,356 UART: [art] Derive Key Pair - Done
41,871,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,577,904 UART: [art] Erasing AUTHORITY.KEYID = 7
43,579,417 UART: [art] PUB.X = C9781404459F3E90FEEBC8D950B69551EC59CF6AF5A11811BD45D7C3843B5A0CC9747D45C0E1D440D53D2DC1E0683D74
43,586,675 UART: [art] PUB.Y = BC33A795ED9D5C587CAD9951E95D123FD79A31D1BE4EFED4BD38FD24862367E89E31E218B6A6EC267A7FE9AF8790C2AB
43,593,962 UART: [art] SIG.R = 9DAD0F8B1CF161CB9CEB96B1CD639E98B41437C850F3EB4DF9C23C4AC1678F2CBF1AC0DAB4026BB10320385AA4D7423C
43,601,352 UART: [art] SIG.S = 2E287FAAA15B1E35D1DB3B58543D83034E018B651718D1DEE4EA41000C583F543203705B003FC98AE871638D5BF330CA
44,579,746 UART: Caliptra RT
44,580,466 UART: [state] CFI Enabled
44,949,738 UART: [rt] RT listening for mailbox commands...
44,981,324 UART: [rt]cmd =0x41545348, len=116
45,002,013 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,046 UART:
192,406 UART: Running Caliptra ROM ...
193,568 UART:
193,715 UART: [state] CFI Enabled
265,551 UART: [state] LifecycleState = Unprovisioned
267,965 UART: [state] DebugLocked = No
270,644 UART: [state] WD Timer not started. Device not locked for debugging
274,808 UART: [kat] SHA2-256
464,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,431 UART: [kat] ++
475,875 UART: [kat] sha1
487,191 UART: [kat] SHA2-256
490,301 UART: [kat] SHA2-384
496,752 UART: [kat] SHA2-512-ACC
499,333 UART: [kat] ECC-384
2,948,644 UART: [kat] HMAC-384Kdf
2,972,918 UART: [kat] LMS
3,504,699 UART: [kat] --
3,510,702 UART: [cold-reset] ++
3,513,208 UART: [fht] FHT @ 0x50003400
3,523,687 UART: [idev] ++
3,524,389 UART: [idev] CDI.KEYID = 6
3,525,296 UART: [idev] SUBJECT.KEYID = 7
3,526,534 UART: [idev] UDS.KEYID = 0
3,527,452 ready_for_fw is high
3,527,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,725 UART: [idev] Erasing UDS.KEYID = 0
6,026,426 UART: [idev] Sha1 KeyId Algorithm
6,048,340 UART: [idev] --
6,053,642 UART: [ldev] ++
6,054,315 UART: [ldev] CDI.KEYID = 6
6,055,253 UART: [ldev] SUBJECT.KEYID = 5
6,056,405 UART: [ldev] AUTHORITY.KEYID = 7
6,057,637 UART: [ldev] FE.KEYID = 1
6,100,022 UART: [ldev] Erasing FE.KEYID = 1
8,606,229 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,018 UART: [ldev] --
10,414,138 UART: [fwproc] Wait for Commands...
10,416,054 UART: [fwproc] Recv command 0x46574c44
10,418,385 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,341 >>> mbox cmd response: success
14,685,245 UART: [afmc] ++
14,685,942 UART: [afmc] CDI.KEYID = 6
14,687,182 UART: [afmc] SUBJECT.KEYID = 7
14,688,615 UART: [afmc] AUTHORITY.KEYID = 5
17,215,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,598 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,746 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,628 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,063 UART: [afmc] --
19,015,057 UART: [cold-reset] --
19,019,355 UART: [state] Locking Datavault
19,023,633 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,780 UART: [state] Locking ICCM
19,028,779 UART: [exit] Launching FMC @ 0x40000130
19,037,450 UART:
19,037,681 UART: Running Caliptra FMC ...
19,038,720 UART:
19,038,872 UART: [state] CFI Enabled
19,095,886 UART: [fht] FMC Alias Private Key: 7
20,862,563 UART: [art] Extend RT PCRs Done
20,863,780 UART: [art] Lock RT PCRs Done
20,865,267 UART: [art] Populate DV Done
20,870,515 UART: [fht] FMC Alias Private Key: 7
20,872,162 UART: [art] Derive CDI
20,872,979 UART: [art] Store in slot 0x4
20,928,524 UART: [art] Derive Key Pair
20,929,565 UART: [art] Store priv key in slot 0x5
23,392,673 UART: [art] Derive Key Pair - Done
23,405,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,673 UART: [art] PUB.X = B4B9AAC6112D8E0A517D48510CB9A843A13433E9C276B1E619A20D0E651C52492FFAB66793C05F23829F296CA5D02082
25,126,935 UART: [art] PUB.Y = 237F8BD85A163843B6C7FE33BC1938BCDC16C5B5907A53CE921A61D8959E9DB9E12285F3E7E8AF4603028A8D3599B365
25,134,205 UART: [art] SIG.R = 9C72FCFE1B518F9AEEB30D4B92B0C315DD7031A24C7053C341A4514AEA03E321F50F190A6440EC6F2AC88C3C07D9E3F2
25,141,577 UART: [art] SIG.S = DFAF4C00A394F5A056216B10D3EE707035754F6D5CD30927CFDB2A8D55AAB50DCC4742C9CED64819A66A7282840B83CE
26,120,786 UART: Caliptra RT
26,121,493 UART: [state] CFI Enabled
26,303,591 UART: [rt] RT listening for mailbox commands...
26,305,975 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,461,140 UART: [rt]cmd =0x41544d4e, len=14344
30,456,301 >>> mbox cmd response data (8 bytes)
30,456,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,487,848 UART: [rt]cmd =0x41545348, len=116
30,508,220 >>> mbox cmd response data (12 bytes)
32,573,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,724,449 UART:
32,724,820 UART: Running Caliptra ROM ...
32,725,952 UART:
32,726,121 UART: [state] CFI Enabled
32,794,358 UART: [state] LifecycleState = Unprovisioned
32,796,464 UART: [state] DebugLocked = No
32,798,446 UART: [state] WD Timer not started. Device not locked for debugging
32,803,667 UART: [kat] SHA2-256
32,993,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,004,259 UART: [kat] ++
33,004,915 UART: [kat] sha1
33,016,406 UART: [kat] SHA2-256
33,019,431 UART: [kat] SHA2-384
33,026,067 UART: [kat] SHA2-512-ACC
33,028,636 UART: [kat] ECC-384
35,481,849 UART: [kat] HMAC-384Kdf
35,504,465 UART: [kat] LMS
36,036,046 UART: [kat] --
36,040,205 UART: [update-reset] ++
39,549,382 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,553,353 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,183,085 >>> mbox cmd response: success
40,187,836 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,188,437 UART: [update-reset] Copying MAN_2 To MAN_1
40,220,880 UART: [update-reset Success] --
40,225,647 UART: [state] Locking Datavault
40,229,708 UART: [state] Locking PCR0, PCR1 and PCR31
40,231,844 UART: [state] Locking ICCM
40,234,909 UART: [exit] Launching FMC @ 0x40000130
40,243,569 UART:
40,243,801 UART: Running Caliptra FMC ...
40,244,851 UART:
40,245,000 UART: [state] CFI Enabled
40,336,922 UART: [art] Extend RT PCRs Done
40,338,119 UART: [art] Lock RT PCRs Done
40,339,575 UART: [art] Populate DV Done
40,344,838 UART: [fht] FMC Alias Private Key: 7
40,346,483 UART: [art] Derive CDI
40,347,292 UART: [art] Store in slot 0x4
40,406,678 UART: [art] Derive Key Pair
40,407,669 UART: [art] Store priv key in slot 0x5
42,870,374 UART: [art] Derive Key Pair - Done
42,883,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,595,844 UART: [art] Erasing AUTHORITY.KEYID = 7
44,597,331 UART: [art] PUB.X = EC32206B6CDED2278BEEA82EF2D23A161FEA1E74E1987EB4CD9C3CA846F0E881E086DE358CE8D74A3B3AEBD1D376EC2C
44,604,630 UART: [art] PUB.Y = FEF82534E2B5C7C85F1B0E7D6C251D314A8C05D07548AB88C8878F63A7D8F2D8E6C98288FDAB0A68E5CFE7CC2E7E0B9C
44,611,963 UART: [art] SIG.R = 1C5D0D0BE43A25DE22B38F8287FB0F8CF883E9FFAD78C5C7A6FF139384AC5CE2DCB7871C3DF571F7A92D1A8E7FBB1A80
44,619,350 UART: [art] SIG.S = CFEF2381AC49A937948E68F878522B2883D80066A8903A4C3D260C4233DD8471DEFFEFBE803946AF163660FE9D61F5EC
45,598,505 UART: Caliptra RT
45,599,220 UART: [state] CFI Enabled
46,027,171 UART: [rt] RT listening for mailbox commands...
46,059,032 UART: [rt]cmd =0x41545348, len=116
46,079,555 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,439,640 ready_for_fw is high
3,440,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,611 >>> mbox cmd response: success
19,132,671 UART:
19,133,041 UART: Running Caliptra FMC ...
19,134,252 UART:
19,134,415 UART: [state] CFI Enabled
19,203,917 UART: [fht] FMC Alias Private Key: 7
20,970,425 UART: [art] Extend RT PCRs Done
20,971,650 UART: [art] Lock RT PCRs Done
20,973,278 UART: [art] Populate DV Done
20,978,924 UART: [fht] FMC Alias Private Key: 7
20,980,626 UART: [art] Derive CDI
20,981,444 UART: [art] Store in slot 0x4
21,036,766 UART: [art] Derive Key Pair
21,037,812 UART: [art] Store priv key in slot 0x5
23,501,189 UART: [art] Derive Key Pair - Done
23,514,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,234 UART: [art] PUB.X = BC9B6612850B3C5455BDA0A546BBA1C7FA46ED9C22E24AA9781808FB252D09CE60FE16F062EB08E1B62D9B2D4ECC92B2
25,235,492 UART: [art] PUB.Y = 3E5DD4AF8806C43963E53974BCD5F0587757106A76910AE9969376517544DEF0951FB10D69F9B66A5AF7D0798C0B8AD5
25,242,745 UART: [art] SIG.R = E985D0350F3ACE1703B0BEE467352D3E744FC356D53457B149862E13A1C4D4DBFF0E251CF8DA5A925A28EFA32F35149E
25,250,158 UART: [art] SIG.S = 728420F92A6EABE3F662ADD3B588502A0F238B0EE0EFA0F9377B2E4D7CB5C2FA6F1255972D2265B7B10E10688F3240A4
26,229,286 UART: Caliptra RT
26,229,998 UART: [state] CFI Enabled
26,409,603 UART: [rt] RT listening for mailbox commands...
26,411,991 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,567,653 UART: [rt]cmd =0x41544d4e, len=14344
30,563,323 >>> mbox cmd response data (8 bytes)
30,563,907 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,594,935 UART: [rt]cmd =0x41545348, len=116
30,614,988 >>> mbox cmd response data (12 bytes)
32,689,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,599,501 >>> mbox cmd response: success
40,600,086 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,635,138 UART:
40,635,432 UART: Running Caliptra FMC ...
40,636,558 UART:
40,636,718 UART: [state] CFI Enabled
40,723,664 UART: [art] Extend RT PCRs Done
40,724,950 UART: [art] Lock RT PCRs Done
40,726,200 UART: [art] Populate DV Done
40,731,561 UART: [fht] FMC Alias Private Key: 7
40,733,095 UART: [art] Derive CDI
40,733,908 UART: [art] Store in slot 0x4
40,792,335 UART: [art] Derive Key Pair
40,793,374 UART: [art] Store priv key in slot 0x5
43,255,524 UART: [art] Derive Key Pair - Done
43,268,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,982,162 UART: [art] Erasing AUTHORITY.KEYID = 7
44,983,797 UART: [art] PUB.X = AA94C8C74C3C486B07EDB4A98C5A878200585339A7E1B22EFFC5C3F106AB1321D9963F08C6E619FC84EA56A77219F647
44,990,950 UART: [art] PUB.Y = C5970716FBE16F9FF6F1EF1B33D6571636F9235B254769A45AACBC3A9CD686424B190EA194C702C36D82CF3615CB0237
44,998,189 UART: [art] SIG.R = 6133E780AC87224CA5CC4658BF3B2A0B69FE4343F6176765221D94E776CF9B17E2C59CC348765E3FF6BC06B86BAFF2C3
45,005,576 UART: [art] SIG.S = 9CC1051A0F40F5BA9D170AE18DACB2C5812BD233955EDC1080BE6CB107820DBE0D09617A9CE8DE62EAFC7E6437DC3F67
45,984,366 UART: Caliptra RT
45,985,088 UART: [state] CFI Enabled
46,404,491 UART: [rt] RT listening for mailbox commands...
46,436,274 UART: [rt]cmd =0x41545348, len=116
46,456,262 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,193 writing to cptra_bootfsm_go
194,459 UART:
194,836 UART: Running Caliptra ROM ...
195,958 UART:
605,531 UART: [state] CFI Enabled
616,217 UART: [state] LifecycleState = Unprovisioned
618,594 UART: [state] DebugLocked = No
620,187 UART: [state] WD Timer not started. Device not locked for debugging
625,150 UART: [kat] SHA2-256
814,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,789 UART: [kat] ++
826,317 UART: [kat] sha1
838,826 UART: [kat] SHA2-256
841,843 UART: [kat] SHA2-384
847,343 UART: [kat] SHA2-512-ACC
849,931 UART: [kat] ECC-384
3,291,574 UART: [kat] HMAC-384Kdf
3,304,234 UART: [kat] LMS
3,836,001 UART: [kat] --
3,840,502 UART: [cold-reset] ++
3,841,795 UART: [fht] FHT @ 0x50003400
3,853,536 UART: [idev] ++
3,854,183 UART: [idev] CDI.KEYID = 6
3,855,141 UART: [idev] SUBJECT.KEYID = 7
3,856,391 UART: [idev] UDS.KEYID = 0
3,857,314 ready_for_fw is high
3,857,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,402 UART: [idev] Erasing UDS.KEYID = 0
6,331,212 UART: [idev] Sha1 KeyId Algorithm
6,354,230 UART: [idev] --
6,359,089 UART: [ldev] ++
6,359,774 UART: [ldev] CDI.KEYID = 6
6,360,664 UART: [ldev] SUBJECT.KEYID = 5
6,361,878 UART: [ldev] AUTHORITY.KEYID = 7
6,363,057 UART: [ldev] FE.KEYID = 1
6,373,468 UART: [ldev] Erasing FE.KEYID = 1
8,844,537 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,562,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,383 UART: [ldev] --
10,635,108 UART: [fwproc] Wait for Commands...
10,636,877 UART: [fwproc] Recv command 0x46574c44
10,639,187 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,212,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,362 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,579 >>> mbox cmd response: success
14,900,587 UART: [afmc] ++
14,901,294 UART: [afmc] CDI.KEYID = 6
14,902,406 UART: [afmc] SUBJECT.KEYID = 7
14,903,963 UART: [afmc] AUTHORITY.KEYID = 5
17,405,986 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,128,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,129,997 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,145,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,160,210 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,175,141 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,198,266 UART: [afmc] --
19,201,812 UART: [cold-reset] --
19,206,267 UART: [state] Locking Datavault
19,211,007 UART: [state] Locking PCR0, PCR1 and PCR31
19,213,180 UART: [state] Locking ICCM
19,214,566 UART: [exit] Launching FMC @ 0x40000130
19,223,207 UART:
19,223,445 UART: Running Caliptra FMC ...
19,224,552 UART:
19,224,713 UART: [state] CFI Enabled
19,232,549 UART: [fht] FMC Alias Private Key: 7
20,998,136 UART: [art] Extend RT PCRs Done
20,999,355 UART: [art] Lock RT PCRs Done
21,000,825 UART: [art] Populate DV Done
21,006,261 UART: [fht] FMC Alias Private Key: 7
21,007,863 UART: [art] Derive CDI
21,008,689 UART: [art] Store in slot 0x4
21,051,515 UART: [art] Derive Key Pair
21,052,555 UART: [art] Store priv key in slot 0x5
23,479,388 UART: [art] Derive Key Pair - Done
23,492,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,142 UART: [art] PUB.X = 8D781A41FEE75112F4CE3A095A0D8B95EC7F28762A705E68929D5F4CBE66F7F981AE8BFA261B3C5DAE5996FFC3B4B1E2
25,207,471 UART: [art] PUB.Y = 1A147F830021C75A8F5F119512058487F0B4B43DE4E2053A988B232892E9E67AF79953E31CD539863463FF706DE458E8
25,214,631 UART: [art] SIG.R = 580149B59388222270ADF82B0F3CD192F4FE9BEF328C8087057FD1F29E70D0998D6D97C6D2BEA8DCC2BCCD5274617556
25,222,006 UART: [art] SIG.S = 09796AF20FCAE599366762FA434954F08BA4E9815475D5B7CCAD5A13BE80B92B3E58F518DCB824F80394E63782B106E7
26,200,880 UART: Caliptra RT
26,201,595 UART: [state] CFI Enabled
26,335,687 UART: [rt] RT listening for mailbox commands...
26,338,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,493,303 UART: [rt]cmd =0x41544d4e, len=14344
30,489,639 >>> mbox cmd response data (8 bytes)
30,490,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,520,802 UART: [rt]cmd =0x41545348, len=116
30,541,258 >>> mbox cmd response data (12 bytes)
32,612,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,764,614 UART:
32,764,999 UART: Running Caliptra ROM ...
32,766,057 UART:
32,766,215 UART: [state] CFI Enabled
32,779,257 UART: [state] LifecycleState = Unprovisioned
32,781,129 UART: [state] DebugLocked = No
32,782,436 UART: [state] WD Timer not started. Device not locked for debugging
32,787,257 UART: [kat] SHA2-256
32,977,121 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,987,879 UART: [kat] ++
32,988,398 UART: [kat] sha1
32,999,885 UART: [kat] SHA2-256
33,002,911 UART: [kat] SHA2-384
33,008,967 UART: [kat] SHA2-512-ACC
33,011,559 UART: [kat] ECC-384
35,451,261 UART: [kat] HMAC-384Kdf
35,465,235 UART: [kat] LMS
35,996,842 UART: [kat] --
36,001,670 UART: [update-reset] ++
39,517,392 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,521,203 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,150,984 >>> mbox cmd response: success
40,156,337 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,157,072 UART: [update-reset] Copying MAN_2 To MAN_1
40,189,354 UART: [update-reset Success] --
40,192,361 UART: [state] Locking Datavault
40,196,771 UART: [state] Locking PCR0, PCR1 and PCR31
40,198,978 UART: [state] Locking ICCM
40,200,922 UART: [exit] Launching FMC @ 0x40000130
40,209,566 UART:
40,209,808 UART: Running Caliptra FMC ...
40,210,914 UART:
40,211,074 UART: [state] CFI Enabled
40,255,433 UART: [art] Extend RT PCRs Done
40,256,629 UART: [art] Lock RT PCRs Done
40,257,984 UART: [art] Populate DV Done
40,263,506 UART: [fht] FMC Alias Private Key: 7
40,265,056 UART: [art] Derive CDI
40,265,877 UART: [art] Store in slot 0x4
40,308,582 UART: [art] Derive Key Pair
40,309,585 UART: [art] Store priv key in slot 0x5
42,736,353 UART: [art] Derive Key Pair - Done
42,749,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,455,309 UART: [art] Erasing AUTHORITY.KEYID = 7
44,456,828 UART: [art] PUB.X = 8C2F1DE63620B7408A7C828D17207DEA55F250D3D0756D44A56B6F3B4A7ADAAAAB245362910254D1D46F10FDB602D373
44,464,107 UART: [art] PUB.Y = D1CB26CC05624EF9084512085BC30FF44D3A0332B7DC6DFF46E186AD22B9401A1296A9A36E73FDBF426FC93D280159D3
44,471,355 UART: [art] SIG.R = 21764992C022E8AC6C255DFD96884F9987B5D9574EB576502857A27E690EBE574137046BCD6B4A9AF394FB6EFD916622
44,478,712 UART: [art] SIG.S = 98E7C27C8C05F1EA07F4B8894660F041112675FBE36C8049979FDA15EA7055E0A8E8C8C2E2DF5DCFDBA058A7E2CD48A0
45,457,835 UART: Caliptra RT
45,458,551 UART: [state] CFI Enabled
45,833,872 UART: [rt] RT listening for mailbox commands...
45,865,765 UART: [rt]cmd =0x41545348, len=116
45,886,460 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
3,752,691 ready_for_fw is high
3,753,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,872 >>> mbox cmd response: success
19,301,108 UART:
19,301,493 UART: Running Caliptra FMC ...
19,302,638 UART:
19,302,798 UART: [state] CFI Enabled
19,310,784 UART: [fht] FMC Alias Private Key: 7
21,076,894 UART: [art] Extend RT PCRs Done
21,078,140 UART: [art] Lock RT PCRs Done
21,079,452 UART: [art] Populate DV Done
21,084,832 UART: [fht] FMC Alias Private Key: 7
21,086,383 UART: [art] Derive CDI
21,087,151 UART: [art] Store in slot 0x4
21,129,811 UART: [art] Derive Key Pair
21,130,861 UART: [art] Store priv key in slot 0x5
23,557,447 UART: [art] Derive Key Pair - Done
23,570,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,319 UART: [art] PUB.X = 6211EE827C7B474CA086F37C52AD419DAEB04EA1E011BD2A9A5EA5B59ED9525EB7C743639F1E6C4C19F0A1A05DD95BA6
25,285,648 UART: [art] PUB.Y = 8828C8053AE958AAE63322E0B17D1C4A9A7B0DB9C99C8A25ED2C1CF8F82AAE473C59B2A5B83517E036134E54452C10CA
25,292,894 UART: [art] SIG.R = 2AB7E4BCFA67435B1A0259D9B7D1A8AF56DBB77EE50C9B2437E5D58676A7E171D1F922BDECE93A62A93784053E1BB9A1
25,300,272 UART: [art] SIG.S = C0C51958805CAF493FE9F0631A8AB5D744A989E8FDA0D4DDDB8E0307E3C7CF6E0DABB95C8D3E8643F99A3796D44D4EF7
26,279,465 UART: Caliptra RT
26,280,182 UART: [state] CFI Enabled
26,413,280 UART: [rt] RT listening for mailbox commands...
26,415,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,571,112 UART: [rt]cmd =0x41544d4e, len=14344
30,566,612 >>> mbox cmd response data (8 bytes)
30,567,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,597,913 UART: [rt]cmd =0x41545348, len=116
30,617,668 >>> mbox cmd response data (12 bytes)
32,682,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,508,762 >>> mbox cmd response: success
40,509,413 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,544,967 UART:
40,545,263 UART: Running Caliptra FMC ...
40,546,303 UART:
40,546,457 UART: [state] CFI Enabled
40,590,499 UART: [art] Extend RT PCRs Done
40,591,784 UART: [art] Lock RT PCRs Done
40,592,954 UART: [art] Populate DV Done
40,598,367 UART: [fht] FMC Alias Private Key: 7
40,600,071 UART: [art] Derive CDI
40,600,916 UART: [art] Store in slot 0x4
40,643,730 UART: [art] Derive Key Pair
40,644,734 UART: [art] Store priv key in slot 0x5
43,071,792 UART: [art] Derive Key Pair - Done
43,084,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,791,206 UART: [art] Erasing AUTHORITY.KEYID = 7
44,792,722 UART: [art] PUB.X = 3A44C42E51418C64D97300343C67537A69C14042BD4209726D49A432CBB49DA47D6122F3B2A00B267F41967F32216270
44,799,892 UART: [art] PUB.Y = 74D84A8D964E4396AE3A1250FC6B6DE05659B560B7D548193DA36638A9EC939FD51E01F17B53B77F40EDF87DB10CB301
44,807,133 UART: [art] SIG.R = E6A7CDF242B8D99A59C5508AD543472092762A3011929252D36D671578C741B4C4402B111C2747469863B29A10B78A24
44,814,510 UART: [art] SIG.S = BEA8C1877588F28A5CFF2473AF2A24BF959CC5C4F059DB5F137FDAE2B7A65B7CD1CBCDF4DB3627CA121D1F4C6E76E516
45,793,225 UART: Caliptra RT
45,793,931 UART: [state] CFI Enabled
46,165,850 UART: [rt] RT listening for mailbox commands...
46,197,921 UART: [rt]cmd =0x41545348, len=116
46,218,641 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,261 UART: [state] DebugLocked = No
85,951 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,539 UART: [kat] SHA2-256
881,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,585 UART: [kat] ++
885,737 UART: [kat] sha1
889,989 UART: [kat] SHA2-256
891,927 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,494 UART: [kat] LMS
1,475,690 UART: [kat] --
1,476,647 UART: [cold-reset] ++
1,477,183 UART: [fht] Storing FHT @ 0x50003400
1,479,830 UART: [idev] ++
1,479,998 UART: [idev] CDI.KEYID = 6
1,480,358 UART: [idev] SUBJECT.KEYID = 7
1,480,782 UART: [idev] UDS.KEYID = 0
1,481,127 ready_for_fw is high
1,481,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,996 UART: [idev] Erasing UDS.KEYID = 0
1,505,076 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,702 UART: [idev] --
1,514,775 UART: [ldev] ++
1,514,943 UART: [ldev] CDI.KEYID = 6
1,515,306 UART: [ldev] SUBJECT.KEYID = 5
1,515,732 UART: [ldev] AUTHORITY.KEYID = 7
1,516,195 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,482 UART: [ldev] --
1,585,795 UART: [fwproc] Waiting for Commands...
1,586,514 UART: [fwproc] Received command 0x46574c44
1,587,305 UART: [fwproc] Received Image of size 118548 bytes
2,931,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,803 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,021 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,232 >>> mbox cmd response: success
3,132,296 UART: [afmc] ++
3,132,464 UART: [afmc] CDI.KEYID = 6
3,132,826 UART: [afmc] SUBJECT.KEYID = 7
3,133,251 UART: [afmc] AUTHORITY.KEYID = 5
3,168,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,150 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,833 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,709 UART: [afmc] --
3,211,775 UART: [cold-reset] --
3,212,709 UART: [state] Locking Datavault
3,213,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,584 UART: [state] Locking ICCM
3,215,242 UART: [exit] Launching FMC @ 0x40000130
3,220,572 UART:
3,220,588 UART: Running Caliptra FMC ...
3,220,996 UART:
3,221,050 UART: [state] CFI Enabled
3,231,444 UART: [fht] FMC Alias Private Key: 7
3,350,654 UART: [art] Extend RT PCRs Done
3,351,082 UART: [art] Lock RT PCRs Done
3,352,764 UART: [art] Populate DV Done
3,360,685 UART: [fht] FMC Alias Private Key: 7
3,361,667 UART: [art] Derive CDI
3,361,947 UART: [art] Store in slot 0x4
3,447,415 UART: [art] Derive Key Pair
3,447,775 UART: [art] Store priv key in slot 0x5
3,461,130 UART: [art] Derive Key Pair - Done
3,475,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,190 UART: [art] PUB.X = 733C51C3898CC8735929B791A3BA5594CD4BC449C1D3347FB758E834150A2C0025B6273C71F64A01EC377E718A1F942C
3,498,928 UART: [art] PUB.Y = 599CFAA1EDC7AEA89A91ABD771A3CDED75D9417CA5A283FF6D93C829855ECEA0720007248EF049703B7E1D94719479EC
3,505,867 UART: [art] SIG.R = 974B96CFBDADBFE75EE459215E9FC1BF5898153EA7DC05B8E5D7DE7F8F494753E101927459C594301B38AB657C9FDAB4
3,512,645 UART: [art] SIG.S = 6F7EB10926B2BC7BBFCE912B5032DDF92A82ABC7DAC9F9E3D6CBFB15075825503B2CF25955546E6229FCAD4458831604
3,536,200 UART: Caliptra RT
3,536,451 UART: [state] CFI Enabled
3,656,325 UART: [rt] RT listening for mailbox commands...
3,656,995 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,173 UART: [rt]cmd =0x41544d4e, len=14344
4,089,997 >>> mbox cmd response data (8 bytes)
4,089,998 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,069 UART: [rt]cmd =0x41545348, len=116
4,142,414 >>> mbox cmd response data (12 bytes)
4,142,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,239 UART:
4,143,255 UART: Running Caliptra ROM ...
4,143,663 UART:
4,143,717 UART: [state] CFI Enabled
4,146,261 UART: [state] LifecycleState = Unprovisioned
4,146,916 UART: [state] DebugLocked = No
4,147,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,149,071 UART: [kat] SHA2-256
4,943,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,947,117 UART: [kat] ++
4,947,269 UART: [kat] sha1
4,951,645 UART: [kat] SHA2-256
4,953,583 UART: [kat] SHA2-384
4,956,336 UART: [kat] SHA2-512-ACC
4,958,236 UART: [kat] ECC-384
4,963,651 UART: [kat] HMAC-384Kdf
4,968,243 UART: [kat] LMS
5,536,439 UART: [kat] --
5,537,248 UART: [update-reset] ++
6,918,028 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,919,180 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,074,447 >>> mbox cmd response: success
7,074,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,074,730 UART: [update-reset] Copying MAN_2 To MAN_1
7,082,744 UART: [update-reset Success] --
7,083,615 UART: [state] Locking Datavault
7,084,317 UART: [state] Locking PCR0, PCR1 and PCR31
7,084,921 UART: [state] Locking ICCM
7,085,497 UART: [exit] Launching FMC @ 0x40000130
7,090,827 UART:
7,090,843 UART: Running Caliptra FMC ...
7,091,251 UART:
7,091,305 UART: [state] CFI Enabled
7,180,140 UART: [art] Extend RT PCRs Done
7,180,568 UART: [art] Lock RT PCRs Done
7,181,899 UART: [art] Populate DV Done
7,190,018 UART: [fht] FMC Alias Private Key: 7
7,191,018 UART: [art] Derive CDI
7,191,298 UART: [art] Store in slot 0x4
7,277,230 UART: [art] Derive Key Pair
7,277,590 UART: [art] Store priv key in slot 0x5
7,290,759 UART: [art] Derive Key Pair - Done
7,305,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,320,629 UART: [art] Erasing AUTHORITY.KEYID = 7
7,321,394 UART: [art] PUB.X = BF7C5DB68BBE7256C6575316473FDC4A25BE1A3B0FB082D09F8C8CA19E9E28AD55E982FE5797220F56680A03D2504122
7,328,158 UART: [art] PUB.Y = BCD4676EA7CA997D6D56A72A099003C94A383A96BA362C4119C50047F79F53FD945270EFAA4BDC3AEFE689CC5D5C63C1
7,335,094 UART: [art] SIG.R = 45FAE88919015D0C016CF0FB5F946F76CE1F75EFC390435247651BCBA698FB13D4338EFF32B407A6E2CB6A71C8A0E10E
7,341,861 UART: [art] SIG.S = DD53F26483CC9B4F23BFB367CA6D842CCC2405D88051AFE7A569F3AD46A86219ED72C08A9FC1D03884C8273A938B934B
7,366,726 UART: Caliptra RT
7,366,977 UART: [state] CFI Enabled
7,733,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,764,329 UART: [rt]cmd =0x41545348, len=116
7,785,463 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 ready_for_fw is high
1,362,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,504 >>> mbox cmd response: success
3,042,771 UART:
3,042,787 UART: Running Caliptra FMC ...
3,043,195 UART:
3,043,249 UART: [state] CFI Enabled
3,054,021 UART: [fht] FMC Alias Private Key: 7
3,173,013 UART: [art] Extend RT PCRs Done
3,173,441 UART: [art] Lock RT PCRs Done
3,174,901 UART: [art] Populate DV Done
3,183,250 UART: [fht] FMC Alias Private Key: 7
3,184,308 UART: [art] Derive CDI
3,184,588 UART: [art] Store in slot 0x4
3,270,150 UART: [art] Derive Key Pair
3,270,510 UART: [art] Store priv key in slot 0x5
3,283,391 UART: [art] Derive Key Pair - Done
3,298,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,377 UART: [art] PUB.X = 3D5B5ABE87ED6CADB892D56EB7E47F5176145F146F41A82A8BD8B5ED91E43C0C7690E8DD690E8346D5825C9197BD67C8
3,321,153 UART: [art] PUB.Y = 8897C09EB6E6400665B373A1337372B79C2B6AE76E84CF6281EE68BA70AF178C2A3DDB0FEA781EA9FAEB78AD5E0A3CAA
3,328,114 UART: [art] SIG.R = E1836FBFDEF8E7D416F095103F271AE573A9749333895D0EDCD271874A8783319DD6EA522D2543546C10EDBEAFE8CCCA
3,334,893 UART: [art] SIG.S = 7BEB91AEF7C02648C9E3FBC1EFA9A64F15D5559F7481E4C359A6A71C47D834B50FCF3473D9455FF578F81EB5E826FC18
3,358,982 UART: Caliptra RT
3,359,233 UART: [state] CFI Enabled
3,479,155 UART: [rt] RT listening for mailbox commands...
3,479,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,883 UART: [rt]cmd =0x41544d4e, len=14344
3,912,677 >>> mbox cmd response data (8 bytes)
3,912,678 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,775 UART: [rt]cmd =0x41545348, len=116
3,965,242 >>> mbox cmd response data (12 bytes)
3,965,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,779,323 >>> mbox cmd response: success
6,779,323 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,792,567 UART:
6,792,583 UART: Running Caliptra FMC ...
6,792,991 UART:
6,793,045 UART: [state] CFI Enabled
6,882,502 UART: [art] Extend RT PCRs Done
6,882,930 UART: [art] Lock RT PCRs Done
6,884,227 UART: [art] Populate DV Done
6,892,564 UART: [fht] FMC Alias Private Key: 7
6,893,710 UART: [art] Derive CDI
6,893,990 UART: [art] Store in slot 0x4
6,979,672 UART: [art] Derive Key Pair
6,980,032 UART: [art] Store priv key in slot 0x5
6,993,277 UART: [art] Derive Key Pair - Done
7,008,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,023,912 UART: [art] Erasing AUTHORITY.KEYID = 7
7,024,677 UART: [art] PUB.X = F577DBFFD48D04A0BFD3AF8B64945233622AA7FC75BCADCEC39332A960CBF7B7F59506BC16388C5B4406CB32A4FE2135
7,031,456 UART: [art] PUB.Y = C280545F7BAA59CB9EE603DC64D3DC20845176EAA2CBD2608AF926C690205B2E15FEBC9C761F7967AB6F802AEBD08CBC
7,038,423 UART: [art] SIG.R = E6342DC4E49A56E1AA1CBD30474BA1C6B9377FA610419CFA282A0AF6209D88FCFAFF065A5CC58A763A66D9FC138CA7A8
7,045,207 UART: [art] SIG.S = DAA63F694871576BD7F2373D612095F7F43057F1D68A932D9127B486E359277BD052F81CF3CBDFA848BDF0C58118256B
7,068,679 UART: Caliptra RT
7,068,930 UART: [state] CFI Enabled
7,433,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,464,229 UART: [rt]cmd =0x41545348, len=116
7,486,763 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,710 UART: [kat] SHA2-256
892,648 UART: [kat] SHA2-384
895,349 UART: [kat] SHA2-512-ACC
897,250 UART: [kat] ECC-384
902,667 UART: [kat] HMAC-384Kdf
907,153 UART: [kat] LMS
1,475,349 UART: [kat] --
1,476,200 UART: [cold-reset] ++
1,476,626 UART: [fht] Storing FHT @ 0x50003400
1,479,571 UART: [idev] ++
1,479,739 UART: [idev] CDI.KEYID = 6
1,480,099 UART: [idev] SUBJECT.KEYID = 7
1,480,523 UART: [idev] UDS.KEYID = 0
1,480,868 ready_for_fw is high
1,480,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,471 UART: [idev] Erasing UDS.KEYID = 0
1,505,275 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,683 UART: [idev] --
1,514,610 UART: [ldev] ++
1,514,778 UART: [ldev] CDI.KEYID = 6
1,515,141 UART: [ldev] SUBJECT.KEYID = 5
1,515,567 UART: [ldev] AUTHORITY.KEYID = 7
1,516,030 UART: [ldev] FE.KEYID = 1
1,521,396 UART: [ldev] Erasing FE.KEYID = 1
1,546,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,795 UART: [ldev] --
1,586,176 UART: [fwproc] Waiting for Commands...
1,586,811 UART: [fwproc] Received command 0x46574c44
1,587,602 UART: [fwproc] Received Image of size 118548 bytes
2,931,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,020 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,459 >>> mbox cmd response: success
3,131,491 UART: [afmc] ++
3,131,659 UART: [afmc] CDI.KEYID = 6
3,132,021 UART: [afmc] SUBJECT.KEYID = 7
3,132,446 UART: [afmc] AUTHORITY.KEYID = 5
3,167,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,824 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,752 UART: [afmc] --
3,210,878 UART: [cold-reset] --
3,211,792 UART: [state] Locking Datavault
3,213,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,655 UART: [state] Locking ICCM
3,214,275 UART: [exit] Launching FMC @ 0x40000130
3,219,605 UART:
3,219,621 UART: Running Caliptra FMC ...
3,220,029 UART:
3,220,172 UART: [state] CFI Enabled
3,231,028 UART: [fht] FMC Alias Private Key: 7
3,350,830 UART: [art] Extend RT PCRs Done
3,351,258 UART: [art] Lock RT PCRs Done
3,353,274 UART: [art] Populate DV Done
3,361,439 UART: [fht] FMC Alias Private Key: 7
3,362,569 UART: [art] Derive CDI
3,362,849 UART: [art] Store in slot 0x4
3,448,607 UART: [art] Derive Key Pair
3,448,967 UART: [art] Store priv key in slot 0x5
3,461,712 UART: [art] Derive Key Pair - Done
3,476,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,381 UART: [art] PUB.X = A846C307CECFFEA0BF6ED054BACABB44CF4825DAE93528F0E4C83C993E368D69C0408AFCA96DE0A7AC38557DDCB23111
3,499,174 UART: [art] PUB.Y = 2110D6E773D9B4ADA81DE9464565D6BE68090499DB0289BE3AC68E72F6D7FADEC37D9BA43B1299B7079E5027A32E3693
3,506,118 UART: [art] SIG.R = E5B6AEDDACCE22B4E1D3EC5AB10EE632CFCCC99408A803C16D90E3D73E1786D77097F3D0F1E09C4F2490A15EC4350283
3,512,894 UART: [art] SIG.S = 26CF618DA70781C3655D0C1B03E120C9E2EFB733016F2E88EF39D723E51426924652F4A5579EEB58AFFFDECA99AD164E
3,536,568 UART: Caliptra RT
3,536,911 UART: [state] CFI Enabled
3,657,381 UART: [rt] RT listening for mailbox commands...
3,658,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,751 UART: [rt]cmd =0x41544d4e, len=14344
4,090,501 >>> mbox cmd response data (8 bytes)
4,090,502 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,455 UART: [rt]cmd =0x41545348, len=116
4,142,272 >>> mbox cmd response data (12 bytes)
4,142,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,981 UART:
4,142,997 UART: Running Caliptra ROM ...
4,143,405 UART:
4,143,546 UART: [state] CFI Enabled
4,146,412 UART: [state] LifecycleState = Unprovisioned
4,147,067 UART: [state] DebugLocked = No
4,147,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,149,288 UART: [kat] SHA2-256
4,943,219 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,947,334 UART: [kat] ++
4,947,486 UART: [kat] sha1
4,951,896 UART: [kat] SHA2-256
4,953,834 UART: [kat] SHA2-384
4,956,575 UART: [kat] SHA2-512-ACC
4,958,475 UART: [kat] ECC-384
4,963,882 UART: [kat] HMAC-384Kdf
4,968,640 UART: [kat] LMS
5,536,836 UART: [kat] --
5,537,965 UART: [update-reset] ++
6,920,703 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,921,995 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,077,262 >>> mbox cmd response: success
7,077,262 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,077,383 UART: [update-reset] Copying MAN_2 To MAN_1
7,085,397 UART: [update-reset Success] --
7,086,608 UART: [state] Locking Datavault
7,087,260 UART: [state] Locking PCR0, PCR1 and PCR31
7,087,864 UART: [state] Locking ICCM
7,088,348 UART: [exit] Launching FMC @ 0x40000130
7,093,678 UART:
7,093,694 UART: Running Caliptra FMC ...
7,094,102 UART:
7,094,245 UART: [state] CFI Enabled
7,183,290 UART: [art] Extend RT PCRs Done
7,183,718 UART: [art] Lock RT PCRs Done
7,184,845 UART: [art] Populate DV Done
7,192,922 UART: [fht] FMC Alias Private Key: 7
7,193,972 UART: [art] Derive CDI
7,194,252 UART: [art] Store in slot 0x4
7,280,168 UART: [art] Derive Key Pair
7,280,528 UART: [art] Store priv key in slot 0x5
7,294,111 UART: [art] Derive Key Pair - Done
7,309,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,324,686 UART: [art] Erasing AUTHORITY.KEYID = 7
7,325,451 UART: [art] PUB.X = 8E6F44BF6DDDA942C5441E813DE4BFA40FADB5602E925F07513BA59B928811E40B781024B5F8D4CBD3D36B1C370CFAA9
7,332,225 UART: [art] PUB.Y = C180B53BBA7475B6B23D71CD66482F72C6A7D2E5735A4C99495235AB4C2C2B95A7BDA23CA10A657719BD70398DFDFE94
7,339,182 UART: [art] SIG.R = 0DD26E735267943ED512F186DC3CC7F689D354BD4EF8AF696DB05CF9765DD6CA061B65DBD258C97B9A2622E2A7FB94C7
7,345,960 UART: [art] SIG.S = 10F70A8C578B91BD373317EA13FB8AE1FC189136166EB2A6FED7116B3295A1AE1816F4A85A27A0346054E3824E5E52BE
7,370,079 UART: Caliptra RT
7,370,422 UART: [state] CFI Enabled
7,736,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,767,033 UART: [rt]cmd =0x41545348, len=116
7,789,191 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,638 ready_for_fw is high
1,362,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,387 >>> mbox cmd response: success
3,040,432 UART:
3,040,448 UART: Running Caliptra FMC ...
3,040,856 UART:
3,040,999 UART: [state] CFI Enabled
3,052,037 UART: [fht] FMC Alias Private Key: 7
3,171,639 UART: [art] Extend RT PCRs Done
3,172,067 UART: [art] Lock RT PCRs Done
3,173,795 UART: [art] Populate DV Done
3,181,916 UART: [fht] FMC Alias Private Key: 7
3,182,896 UART: [art] Derive CDI
3,183,176 UART: [art] Store in slot 0x4
3,268,970 UART: [art] Derive Key Pair
3,269,330 UART: [art] Store priv key in slot 0x5
3,282,935 UART: [art] Derive Key Pair - Done
3,297,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,582 UART: [art] PUB.X = B846A3689B46EA0706081A09B34EC941B4D47538D39B1C6E53DAEBE5CF9F8ED1E13A3662E5559CD3C46A499E61CE106B
3,320,350 UART: [art] PUB.Y = 8314711F29E6B4FF872E08A77B77EC956CA05FE5AC8ADFDF3C783661F8E08977901625DCD6DD7C108989180C1D784273
3,327,296 UART: [art] SIG.R = 031B8D5069F2AA9161C302A025C61D0AEAFFC99D569E6FCF6F899DDB9D60F48EA4BC63AFAB8A833E42A01E971ABE7745
3,334,077 UART: [art] SIG.S = B8957634D09BA750A848F21ED71B503EEB660D94ED5BA4A78BCA343A5AF251AB0430324BBA1C35AD34BB1D07154F8A28
3,358,368 UART: Caliptra RT
3,358,711 UART: [state] CFI Enabled
3,479,881 UART: [rt] RT listening for mailbox commands...
3,480,551 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,525 UART: [rt]cmd =0x41544d4e, len=14344
3,913,315 >>> mbox cmd response data (8 bytes)
3,913,316 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,223 UART: [rt]cmd =0x41545348, len=116
3,965,408 >>> mbox cmd response data (12 bytes)
3,965,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,780,770 >>> mbox cmd response: success
6,780,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,794,046 UART:
6,794,062 UART: Running Caliptra FMC ...
6,794,470 UART:
6,794,613 UART: [state] CFI Enabled
6,883,746 UART: [art] Extend RT PCRs Done
6,884,174 UART: [art] Lock RT PCRs Done
6,885,423 UART: [art] Populate DV Done
6,893,834 UART: [fht] FMC Alias Private Key: 7
6,894,764 UART: [art] Derive CDI
6,895,044 UART: [art] Store in slot 0x4
6,980,952 UART: [art] Derive Key Pair
6,981,312 UART: [art] Store priv key in slot 0x5
6,994,259 UART: [art] Derive Key Pair - Done
7,009,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,024,829 UART: [art] Erasing AUTHORITY.KEYID = 7
7,025,594 UART: [art] PUB.X = F9DAD91832E1285E8AD2429A015FFC36FAFC959F01F4D57009E663B367D2208CE7420D5194933FEF2346492842EC578C
7,032,352 UART: [art] PUB.Y = 1C0164D16EE536F85CD8942C5B2521CCC3920E6FDE5527443AF4F9A473609F8833CE2AF35F2FB9D3E4C91A23D219B278
7,039,302 UART: [art] SIG.R = 58C2A9BFE8AAA53EB398D971AD8285A9A34BC3FF0557101636F0A5743796155324DC2780449A59EEAA655101D4C7ECAB
7,046,072 UART: [art] SIG.S = 47139C5D07B5293E3D27A9108BE205ABDE3854506C9E15B96876C1B27EF0E7678881C6A2F5DEAC12FF1DF5926276DCF3
7,069,838 UART: Caliptra RT
7,070,181 UART: [state] CFI Enabled
7,433,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,464,360 UART: [rt]cmd =0x41545348, len=116
7,485,648 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,346 UART: [kat] SHA2-256
901,286 UART: [kat] SHA2-384
903,933 UART: [kat] SHA2-512-ACC
905,834 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,247 UART: [kat] LMS
1,168,559 UART: [kat] --
1,169,424 UART: [cold-reset] ++
1,169,966 UART: [fht] FHT @ 0x50003400
1,172,608 UART: [idev] ++
1,172,776 UART: [idev] CDI.KEYID = 6
1,173,137 UART: [idev] SUBJECT.KEYID = 7
1,173,562 UART: [idev] UDS.KEYID = 0
1,173,908 ready_for_fw is high
1,173,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,423 UART: [idev] Erasing UDS.KEYID = 0
1,198,761 UART: [idev] Sha1 KeyId Algorithm
1,207,801 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,108 UART: [ldev] --
1,280,431 UART: [fwproc] Wait for Commands...
1,281,064 UART: [fwproc] Recv command 0x46574c44
1,281,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,169 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,336 >>> mbox cmd response: success
2,825,386 UART: [afmc] ++
2,825,554 UART: [afmc] CDI.KEYID = 6
2,825,917 UART: [afmc] SUBJECT.KEYID = 7
2,826,343 UART: [afmc] AUTHORITY.KEYID = 5
2,861,908 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,664 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,374 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,715 UART: [afmc] --
2,904,730 UART: [cold-reset] --
2,905,474 UART: [state] Locking Datavault
2,906,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,217 UART: [state] Locking ICCM
2,907,673 UART: [exit] Launching FMC @ 0x40000130
2,913,003 UART:
2,913,019 UART: Running Caliptra FMC ...
2,913,427 UART:
2,913,481 UART: [state] CFI Enabled
2,924,149 UART: [fht] FMC Alias Private Key: 7
3,043,413 UART: [art] Extend RT PCRs Done
3,043,841 UART: [art] Lock RT PCRs Done
3,045,655 UART: [art] Populate DV Done
3,053,964 UART: [fht] FMC Alias Private Key: 7
3,054,940 UART: [art] Derive CDI
3,055,220 UART: [art] Store in slot 0x4
3,141,005 UART: [art] Derive Key Pair
3,141,365 UART: [art] Store priv key in slot 0x5
3,154,683 UART: [art] Derive Key Pair - Done
3,169,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,198 UART: [art] PUB.X = 9450281B7CCD2A7D1158194683216D3B9661D3A0B133B28E28EF76ABF52ED7254F32C41BB66F7E09AE7498D16F164D39
3,191,965 UART: [art] PUB.Y = 772D3B7F29B6843DF8197D27593905DB8F37891A38590DCA8635213512BDB1B5C658B013A4081406B9B89359BB802C3B
3,198,895 UART: [art] SIG.R = CA99BB12B13DCF6E909A55646D7D262EEAE7E64C2EAD9264EA42B655F0A875CDB5DFE674580E6AA736140B862C53AD07
3,205,672 UART: [art] SIG.S = AAB5919BABF7C77E06CD63A5E30E9A13910B97D9D2335F918FC0E041FDE922FEEA94D07EDD05C53A4AFBE753517E1F64
3,229,136 UART: Caliptra RT
3,229,387 UART: [state] CFI Enabled
3,349,127 UART: [rt] RT listening for mailbox commands...
3,349,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,005 UART: [rt]cmd =0x41544d4e, len=14344
3,782,735 >>> mbox cmd response data (8 bytes)
3,782,736 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,819 UART: [rt]cmd =0x41545348, len=116
3,834,938 >>> mbox cmd response data (12 bytes)
3,834,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,618 UART:
3,835,634 UART: Running Caliptra ROM ...
3,836,042 UART:
3,836,097 UART: [state] CFI Enabled
3,838,737 UART: [state] LifecycleState = Unprovisioned
3,839,392 UART: [state] DebugLocked = No
3,839,960 UART: [state] WD Timer not started. Device not locked for debugging
3,841,168 UART: [kat] SHA2-256
4,644,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,648,822 UART: [kat] ++
4,648,974 UART: [kat] sha1
4,653,134 UART: [kat] SHA2-256
4,655,074 UART: [kat] SHA2-384
4,657,813 UART: [kat] SHA2-512-ACC
4,659,713 UART: [kat] ECC-384
4,669,298 UART: [kat] HMAC-384Kdf
4,674,048 UART: [kat] LMS
4,922,360 UART: [kat] --
4,923,154 UART: [update-reset] ++
6,280,949 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,282,140 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,437,355 >>> mbox cmd response: success
6,437,355 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,437,458 UART: [update-reset] Copying MAN_2 To MAN_1
6,445,472 UART: [update-reset Success] --
6,446,709 UART: [state] Locking Datavault
6,447,631 UART: [state] Locking PCR0, PCR1 and PCR31
6,448,235 UART: [state] Locking ICCM
6,448,695 UART: [exit] Launching FMC @ 0x40000130
6,454,025 UART:
6,454,041 UART: Running Caliptra FMC ...
6,454,449 UART:
6,454,503 UART: [state] CFI Enabled
6,543,816 UART: [art] Extend RT PCRs Done
6,544,244 UART: [art] Lock RT PCRs Done
6,545,719 UART: [art] Populate DV Done
6,553,944 UART: [fht] FMC Alias Private Key: 7
6,554,886 UART: [art] Derive CDI
6,555,166 UART: [art] Store in slot 0x4
6,641,069 UART: [art] Derive Key Pair
6,641,429 UART: [art] Store priv key in slot 0x5
6,654,525 UART: [art] Derive Key Pair - Done
6,669,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,684,919 UART: [art] Erasing AUTHORITY.KEYID = 7
6,685,684 UART: [art] PUB.X = 2890EB1345591ADF634041826684BFFF570941660BCAE29CA166FD6FBFF6267F5F083C46F737F52A80474B1BCAD4C574
6,692,449 UART: [art] PUB.Y = CAC75B5A55AEA803AE1923799D7F2D27CDA42010613BDD05178A14D3AB3779AF8362A3E2964E949CC43ED95E4CEA1CEC
6,699,409 UART: [art] SIG.R = 2743B25F3E1D30E275E36117729559138F7141B2FCC6C2CF01DB81BC2D64662FB821DB36EE513E076B913754A555CA31
6,706,171 UART: [art] SIG.S = 64D4137540F2FEAC0E69EB170F488961B16996BB8D5B8E559508CA128347EBB2206F5CAA2DC8C933482352F71C658434
6,729,904 UART: Caliptra RT
6,730,155 UART: [state] CFI Enabled
7,094,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,879 UART: [rt]cmd =0x41545348, len=116
7,148,747 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,976 ready_for_fw is high
1,058,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,610 >>> mbox cmd response: success
2,739,527 UART:
2,739,543 UART: Running Caliptra FMC ...
2,739,951 UART:
2,740,005 UART: [state] CFI Enabled
2,750,271 UART: [fht] FMC Alias Private Key: 7
2,869,709 UART: [art] Extend RT PCRs Done
2,870,137 UART: [art] Lock RT PCRs Done
2,871,665 UART: [art] Populate DV Done
2,880,014 UART: [fht] FMC Alias Private Key: 7
2,881,048 UART: [art] Derive CDI
2,881,328 UART: [art] Store in slot 0x4
2,967,117 UART: [art] Derive Key Pair
2,967,477 UART: [art] Store priv key in slot 0x5
2,981,311 UART: [art] Derive Key Pair - Done
2,995,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,302 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,067 UART: [art] PUB.X = E7440F0F92D60D1D9678A511D0AAEB37D2B132CFC99A1832EB31E244667BF095AF55D3D7878B3EA78DFA9680D3F75FDA
3,018,842 UART: [art] PUB.Y = 28068F6AC016987DA655A1BACD5A901D8BCADFC50D59490C05B0D7E8ACB55AAC8ED0C2F49AE49713D6A3DC3186750CCC
3,025,799 UART: [art] SIG.R = 071CA6AB378274F4FE739EEB6AA893C27C2CEFC05DF6C049F861EE8C09B30AD077AD379EB0A07B48A4D9FFE87A87CFA8
3,032,584 UART: [art] SIG.S = 54E541701287A6DF35573101C229B788C60F33A3FFB47ED26291417B14CA307D99F664F434AC0B121E59178731EC42BF
3,056,787 UART: Caliptra RT
3,057,038 UART: [state] CFI Enabled
3,176,824 UART: [rt] RT listening for mailbox commands...
3,177,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,256 UART: [rt]cmd =0x41544d4e, len=14344
3,610,186 >>> mbox cmd response data (8 bytes)
3,610,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,350 UART: [rt]cmd =0x41545348, len=116
3,662,997 >>> mbox cmd response data (12 bytes)
3,662,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,152,310 >>> mbox cmd response: success
6,152,310 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,165,641 UART:
6,165,657 UART: Running Caliptra FMC ...
6,166,065 UART:
6,166,119 UART: [state] CFI Enabled
6,254,888 UART: [art] Extend RT PCRs Done
6,255,316 UART: [art] Lock RT PCRs Done
6,256,721 UART: [art] Populate DV Done
6,264,790 UART: [fht] FMC Alias Private Key: 7
6,265,888 UART: [art] Derive CDI
6,266,168 UART: [art] Store in slot 0x4
6,351,539 UART: [art] Derive Key Pair
6,351,899 UART: [art] Store priv key in slot 0x5
6,365,195 UART: [art] Derive Key Pair - Done
6,379,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,731 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,496 UART: [art] PUB.X = BD2F69EA8197F20CC0C8D5E050D70BA06C63136560961E023A70F89B2554B17DA30E4CA5978C6EEEA4BBC40EF6B9C2A1
6,402,265 UART: [art] PUB.Y = 37F6F4E0AFC49E455CDC39C7DBB9F5EEB83A325A19FD28548AD0DDB9D77E7C0FB01372B65AB665A027239D743A5FA08B
6,409,232 UART: [art] SIG.R = 7B12B3EA4E1F1FBA7792CA210D1B76F4ADB487EE2F386BFCDAFF608AB2C088A3FE62AADFEE2F66A91BB18FC956CA0085
6,416,009 UART: [art] SIG.S = D0A7DE093FB2E44764278AA86676194E9169D8B14F76658A2BCB6252BCB5F53C7625D2C7A556711DD2CAAE3549FE7EA6
6,440,040 UART: Caliptra RT
6,440,291 UART: [state] CFI Enabled
6,803,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,834,498 UART: [rt]cmd =0x41545348, len=116
6,856,204 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,855 UART: [kat] SHA2-256
901,795 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,082 UART: [kat] HMAC-384Kdf
920,728 UART: [kat] LMS
1,169,040 UART: [kat] --
1,169,997 UART: [cold-reset] ++
1,170,425 UART: [fht] FHT @ 0x50003400
1,173,143 UART: [idev] ++
1,173,311 UART: [idev] CDI.KEYID = 6
1,173,672 UART: [idev] SUBJECT.KEYID = 7
1,174,097 UART: [idev] UDS.KEYID = 0
1,174,443 ready_for_fw is high
1,174,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,654 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,381 UART: [ldev] ++
1,209,549 UART: [ldev] CDI.KEYID = 6
1,209,913 UART: [ldev] SUBJECT.KEYID = 5
1,210,340 UART: [ldev] AUTHORITY.KEYID = 7
1,210,803 UART: [ldev] FE.KEYID = 1
1,216,197 UART: [ldev] Erasing FE.KEYID = 1
1,242,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,195 UART: [ldev] --
1,281,402 UART: [fwproc] Wait for Commands...
1,282,101 UART: [fwproc] Recv command 0x46574c44
1,282,834 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,144 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,319 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,530 >>> mbox cmd response: success
2,827,596 UART: [afmc] ++
2,827,764 UART: [afmc] CDI.KEYID = 6
2,828,127 UART: [afmc] SUBJECT.KEYID = 7
2,828,553 UART: [afmc] AUTHORITY.KEYID = 5
2,864,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,730 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,611 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,312 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,005 UART: [afmc] --
2,908,048 UART: [cold-reset] --
2,908,892 UART: [state] Locking Datavault
2,910,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,715 UART: [state] Locking ICCM
2,911,169 UART: [exit] Launching FMC @ 0x40000130
2,916,499 UART:
2,916,515 UART: Running Caliptra FMC ...
2,916,923 UART:
2,917,066 UART: [state] CFI Enabled
2,927,654 UART: [fht] FMC Alias Private Key: 7
3,046,540 UART: [art] Extend RT PCRs Done
3,046,968 UART: [art] Lock RT PCRs Done
3,048,746 UART: [art] Populate DV Done
3,056,989 UART: [fht] FMC Alias Private Key: 7
3,058,153 UART: [art] Derive CDI
3,058,433 UART: [art] Store in slot 0x4
3,144,068 UART: [art] Derive Key Pair
3,144,428 UART: [art] Store priv key in slot 0x5
3,157,634 UART: [art] Derive Key Pair - Done
3,172,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,947 UART: [art] PUB.X = BCC9AEAE00402497822A7AFDBFE071E749591259773D74A42D40AAF50C58856AC61898A78733C7858EB431A43F574742
3,195,690 UART: [art] PUB.Y = 230947B8EF862790EBE8BD454BEC9C9C12A2FA31CD039AD67E277B5ECEFD57156AF60DD4913CD907F950F5EAC43C7C77
3,202,646 UART: [art] SIG.R = 907DFBAA1D1DDAF359898849DD47EE40F53BD860C2C25B59D8F7122FD05FAD024435A11CDF0039B91988EED979ECEA54
3,209,407 UART: [art] SIG.S = B1DCC3974789C1084CE067BB8F7A53696720A5C32FBD119219F6E707B90C736B52956FA389501B64848AE48E1B5D63A4
3,233,536 UART: Caliptra RT
3,233,879 UART: [state] CFI Enabled
3,352,603 UART: [rt] RT listening for mailbox commands...
3,353,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,481 UART: [rt]cmd =0x41544d4e, len=14344
3,786,043 >>> mbox cmd response data (8 bytes)
3,786,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,013 UART: [rt]cmd =0x41545348, len=116
3,837,492 >>> mbox cmd response data (12 bytes)
3,837,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,230 UART:
3,838,246 UART: Running Caliptra ROM ...
3,838,654 UART:
3,838,796 UART: [state] CFI Enabled
3,841,846 UART: [state] LifecycleState = Unprovisioned
3,842,501 UART: [state] DebugLocked = No
3,843,183 UART: [state] WD Timer not started. Device not locked for debugging
3,844,395 UART: [kat] SHA2-256
4,647,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,652,049 UART: [kat] ++
4,652,201 UART: [kat] sha1
4,656,433 UART: [kat] SHA2-256
4,658,373 UART: [kat] SHA2-384
4,661,180 UART: [kat] SHA2-512-ACC
4,663,080 UART: [kat] ECC-384
4,673,369 UART: [kat] HMAC-384Kdf
4,678,017 UART: [kat] LMS
4,926,329 UART: [kat] --
4,927,249 UART: [update-reset] ++
6,286,042 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,287,183 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,442,398 >>> mbox cmd response: success
6,442,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,442,523 UART: [update-reset] Copying MAN_2 To MAN_1
6,450,537 UART: [update-reset Success] --
6,451,530 UART: [state] Locking Datavault
6,452,420 UART: [state] Locking PCR0, PCR1 and PCR31
6,453,024 UART: [state] Locking ICCM
6,453,506 UART: [exit] Launching FMC @ 0x40000130
6,458,836 UART:
6,458,852 UART: Running Caliptra FMC ...
6,459,260 UART:
6,459,403 UART: [state] CFI Enabled
6,548,772 UART: [art] Extend RT PCRs Done
6,549,200 UART: [art] Lock RT PCRs Done
6,550,171 UART: [art] Populate DV Done
6,558,262 UART: [fht] FMC Alias Private Key: 7
6,559,342 UART: [art] Derive CDI
6,559,622 UART: [art] Store in slot 0x4
6,645,377 UART: [art] Derive Key Pair
6,645,737 UART: [art] Store priv key in slot 0x5
6,658,839 UART: [art] Derive Key Pair - Done
6,673,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,688,833 UART: [art] Erasing AUTHORITY.KEYID = 7
6,689,598 UART: [art] PUB.X = 24AFD810939C44BE9253AFFCD4380ED4B5AA9694142ECA71C8339348702CE67DA298260C7BD0E680EE5CD08191E2E562
6,696,368 UART: [art] PUB.Y = 33D1805B198F501A37223AAB7466B7C19243DDA486F5E728A7D4B6A1277C2856799928A16D4FCB5EA423D3C41CEDC2AC
6,703,324 UART: [art] SIG.R = 6EF96AF3E3ECC673874FAB5C34F72C714CB8414CA327FA682BC245C57213DE29135AF12762E4B31CA7DE925D8106D983
6,710,099 UART: [art] SIG.S = 4C1629B3558B103F5ADD22C7EAC8AB7B4DC2993F3310E6119973893351CC9EB9E582A27F0A4BECCAACBF4C3280CD440E
6,733,989 UART: Caliptra RT
6,734,332 UART: [state] CFI Enabled
7,094,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,674 UART: [rt]cmd =0x41545348, len=116
7,147,720 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,609 ready_for_fw is high
1,059,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,325 >>> mbox cmd response: success
2,740,392 UART:
2,740,408 UART: Running Caliptra FMC ...
2,740,816 UART:
2,740,959 UART: [state] CFI Enabled
2,751,311 UART: [fht] FMC Alias Private Key: 7
2,870,153 UART: [art] Extend RT PCRs Done
2,870,581 UART: [art] Lock RT PCRs Done
2,872,153 UART: [art] Populate DV Done
2,880,542 UART: [fht] FMC Alias Private Key: 7
2,881,612 UART: [art] Derive CDI
2,881,892 UART: [art] Store in slot 0x4
2,967,449 UART: [art] Derive Key Pair
2,967,809 UART: [art] Store priv key in slot 0x5
2,981,407 UART: [art] Derive Key Pair - Done
2,995,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,008 UART: [art] PUB.X = 3B4EB898B1F2C5598E8DF0816FBEE1F5602C70FAE779AC8CEB4413AB6CB5205227E268F4215F5374BF5FA6A8603D59B3
3,018,790 UART: [art] PUB.Y = 4E8726B4D969E316A90973D3EC6A86172F60819C21EC2F195C2ECECCCCAAFAE3525C53E74CC8D94419B82EC4BA314A00
3,025,729 UART: [art] SIG.R = B333D778E6FE30D567062B9CBFD0751353B6A2A6ED55C93A6E06E6CEF1081E765FCD2C54FF325177923C3CEEA087FADF
3,032,506 UART: [art] SIG.S = 8FC6C79E8F18B0BBC348564C0F0A88E43A1DF99F9480B8403A4FC6974C7FCAE1008FAFB041577828673DE4F5BD2CE724
3,056,038 UART: Caliptra RT
3,056,381 UART: [state] CFI Enabled
3,175,499 UART: [rt] RT listening for mailbox commands...
3,176,169 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,113 UART: [rt]cmd =0x41544d4e, len=14344
3,609,061 >>> mbox cmd response data (8 bytes)
3,609,062 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,151 UART: [rt]cmd =0x41545348, len=116
3,660,364 >>> mbox cmd response data (12 bytes)
3,660,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,448 >>> mbox cmd response: success
6,149,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,163,047 UART:
6,163,063 UART: Running Caliptra FMC ...
6,163,471 UART:
6,163,614 UART: [state] CFI Enabled
6,253,049 UART: [art] Extend RT PCRs Done
6,253,477 UART: [art] Lock RT PCRs Done
6,254,694 UART: [art] Populate DV Done
6,263,013 UART: [fht] FMC Alias Private Key: 7
6,264,163 UART: [art] Derive CDI
6,264,443 UART: [art] Store in slot 0x4
6,350,488 UART: [art] Derive Key Pair
6,350,848 UART: [art] Store priv key in slot 0x5
6,364,230 UART: [art] Derive Key Pair - Done
6,378,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,491 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,256 UART: [art] PUB.X = F3885E2B0A71B18C39098CCE0BCCC412221404221565B158BA03181C308374A39659FC083C1E61378F7486336292182B
6,401,994 UART: [art] PUB.Y = 77450EBC105DFFDA90493E232F5C7A022ECF125B1081C3C654D53C99E18AAA36D988B73B7F2FD99A3F66447DE2F4ACB0
6,408,952 UART: [art] SIG.R = D5C889E80337E5BB100F5181A0CE34E2720C32012016425B0DDDE08801774E06BE8A76ED46CA61C9C1F755BB9DC782AF
6,415,707 UART: [art] SIG.S = E48A9B273B50BE6BB2B619E5C8779BC842B9F9193D59BF5B71AD5ADB7AC6354B8E7B129C460A159CA85D56E906C74A17
6,439,567 UART: Caliptra RT
6,439,910 UART: [state] CFI Enabled
6,802,169 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,833,050 UART: [rt]cmd =0x41545348, len=116
6,855,134 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,267 UART: [state] WD Timer not started. Device not locked for debugging
87,462 UART: [kat] SHA2-256
893,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,237 UART: [kat] ++
897,389 UART: [kat] sha1
901,577 UART: [kat] SHA2-256
903,517 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
918,588 UART: [kat] HMAC-384Kdf
923,232 UART: [kat] LMS
1,171,560 UART: [kat] --
1,172,773 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,732 UART: [idev] ++
1,175,900 UART: [idev] CDI.KEYID = 6
1,176,260 UART: [idev] SUBJECT.KEYID = 7
1,176,684 UART: [idev] UDS.KEYID = 0
1,177,029 ready_for_fw is high
1,177,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,530 UART: [idev] Erasing UDS.KEYID = 0
1,201,491 UART: [idev] Sha1 KeyId Algorithm
1,210,039 UART: [idev] --
1,211,131 UART: [ldev] ++
1,211,299 UART: [ldev] CDI.KEYID = 6
1,211,662 UART: [ldev] SUBJECT.KEYID = 5
1,212,088 UART: [ldev] AUTHORITY.KEYID = 7
1,212,551 UART: [ldev] FE.KEYID = 1
1,217,989 UART: [ldev] Erasing FE.KEYID = 1
1,244,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,693 UART: [ldev] --
1,284,194 UART: [fwproc] Wait for Commands...
1,284,904 UART: [fwproc] Recv command 0x46574c44
1,285,632 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,825 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,365 >>> mbox cmd response: success
2,829,607 UART: [afmc] ++
2,829,775 UART: [afmc] CDI.KEYID = 6
2,830,137 UART: [afmc] SUBJECT.KEYID = 7
2,830,562 UART: [afmc] AUTHORITY.KEYID = 5
2,865,815 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,438 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,186 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,895 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,778 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,479 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,427 UART: [afmc] --
2,909,403 UART: [cold-reset] --
2,910,443 UART: [state] Locking Datavault
2,911,452 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,056 UART: [state] Locking ICCM
2,912,546 UART: [exit] Launching FMC @ 0x40000130
2,917,876 UART:
2,917,892 UART: Running Caliptra FMC ...
2,918,300 UART:
2,918,354 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,047,608 UART: [art] Extend RT PCRs Done
3,048,036 UART: [art] Lock RT PCRs Done
3,049,446 UART: [art] Populate DV Done
3,057,509 UART: [fht] FMC Alias Private Key: 7
3,058,515 UART: [art] Derive CDI
3,058,795 UART: [art] Store in slot 0x4
3,144,948 UART: [art] Derive Key Pair
3,145,308 UART: [art] Store priv key in slot 0x5
3,157,636 UART: [art] Derive Key Pair - Done
3,172,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,027 UART: [art] PUB.X = 521AE559D01D7088A3457E334F262EEBBE6BA8B7B6D47F9E1099AA7BBED076B170550AAA45779E714CE42BDE28A4A2B2
3,195,808 UART: [art] PUB.Y = 512BACB29EAA7598F55F9250138027AF57326E5F68108D874A0A80939980616F2B412CBB5DA3F605782C4FEB95BB77E3
3,202,752 UART: [art] SIG.R = 903C7696ADB82518AF6E5258370963D59336D1BAA352CD0E4C893F2E94E1F51DB8F048B0A87C7F9A5E611733C8B86205
3,209,513 UART: [art] SIG.S = 4C3E615363187A02AC2E952ECFCFF6E28FBD7F2872F7E6BB355D38A3A0383A909F36E9CDB7990AAF2F85D963FB148A92
3,233,297 UART: Caliptra RT
3,233,548 UART: [state] CFI Enabled
3,353,475 UART: [rt] RT listening for mailbox commands...
3,354,145 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,359 UART: [rt]cmd =0x41544d4e, len=14344
3,787,235 >>> mbox cmd response data (8 bytes)
3,787,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,357 UART: [rt]cmd =0x41545348, len=116
3,839,610 >>> mbox cmd response data (12 bytes)
3,839,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,584 UART:
3,840,600 UART: Running Caliptra ROM ...
3,841,008 UART:
3,841,063 UART: [state] CFI Enabled
3,843,323 UART: [state] LifecycleState = Unprovisioned
3,843,978 UART: [state] DebugLocked = No
3,844,580 UART: [state] WD Timer not started. Device not locked for debugging
3,845,828 UART: [kat] SHA2-256
4,651,478 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,655,603 UART: [kat] ++
4,655,755 UART: [kat] sha1
4,659,867 UART: [kat] SHA2-256
4,661,807 UART: [kat] SHA2-384
4,664,692 UART: [kat] SHA2-512-ACC
4,666,592 UART: [kat] ECC-384
4,676,883 UART: [kat] HMAC-384Kdf
4,681,653 UART: [kat] LMS
4,929,981 UART: [kat] --
4,930,617 UART: [update-reset] ++
6,289,436 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,290,523 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,445,738 >>> mbox cmd response: success
6,445,738 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,445,913 UART: [update-reset] Copying MAN_2 To MAN_1
6,453,927 UART: [update-reset Success] --
6,454,672 UART: [state] Locking Datavault
6,455,440 UART: [state] Locking PCR0, PCR1 and PCR31
6,456,044 UART: [state] Locking ICCM
6,456,498 UART: [exit] Launching FMC @ 0x40000130
6,461,828 UART:
6,461,844 UART: Running Caliptra FMC ...
6,462,252 UART:
6,462,306 UART: [state] CFI Enabled
6,551,345 UART: [art] Extend RT PCRs Done
6,551,773 UART: [art] Lock RT PCRs Done
6,553,034 UART: [art] Populate DV Done
6,561,059 UART: [fht] FMC Alias Private Key: 7
6,562,145 UART: [art] Derive CDI
6,562,425 UART: [art] Store in slot 0x4
6,648,380 UART: [art] Derive Key Pair
6,648,740 UART: [art] Store priv key in slot 0x5
6,661,836 UART: [art] Derive Key Pair - Done
6,676,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,691,413 UART: [art] Erasing AUTHORITY.KEYID = 7
6,692,178 UART: [art] PUB.X = CA3BD99471F63F411B7451838BB684E967E6A34EB375E2999D73452A13DC1286BBBF22F507CDBAE6344902F0AC153884
6,698,944 UART: [art] PUB.Y = 90A017FC9652044C1BC7E86EA2D356A427E01A63B8A1293EC5F608B833A69EEB5217680951BF10D74E52EC807339F05D
6,705,885 UART: [art] SIG.R = 2A0F55BB98D145453AA604D08158D60D5806717164E6EC5EA8ABB56943A56C0BCFB7EC9182E0A934F5BC87EFAC502018
6,712,648 UART: [art] SIG.S = 2F8E9F643BC612B6F8DE0A293307F6EF31A85D4D470C0DEC2195E650C2D324F60F43D6392A165633DAFBFC9354E81C5C
6,736,557 UART: Caliptra RT
6,736,808 UART: [state] CFI Enabled
7,099,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,129,980 UART: [rt]cmd =0x41545348, len=116
7,151,908 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,121 ready_for_fw is high
1,060,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,730 >>> mbox cmd response: success
2,740,793 UART:
2,740,809 UART: Running Caliptra FMC ...
2,741,217 UART:
2,741,271 UART: [state] CFI Enabled
2,751,693 UART: [fht] FMC Alias Private Key: 7
2,870,801 UART: [art] Extend RT PCRs Done
2,871,229 UART: [art] Lock RT PCRs Done
2,873,039 UART: [art] Populate DV Done
2,881,264 UART: [fht] FMC Alias Private Key: 7
2,882,200 UART: [art] Derive CDI
2,882,480 UART: [art] Store in slot 0x4
2,967,719 UART: [art] Derive Key Pair
2,968,079 UART: [art] Store priv key in slot 0x5
2,981,303 UART: [art] Derive Key Pair - Done
2,996,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,016 UART: [art] PUB.X = EE093F01B9B123562629210C1E6FA181F692A2C25F65584BF27E0289628C614C55BAB3A8B06B5FFBFE4EF8AF521A64FB
3,018,784 UART: [art] PUB.Y = F24EFC1689896F9DC1B2189B2BF136DA5F30840747648C7D7AC57EFC1379430BCBF43D554F1E21C1DD43A45DFCC2440D
3,025,737 UART: [art] SIG.R = 17F5731C9713551391C699665940120551D79B5C9E207285B885BACEEE51999918E03BFD19612C9DA3CD34CFCA5AE1AA
3,032,504 UART: [art] SIG.S = 29922A3F1F306C192157A052D90CC062DBCDFF915690CD92D3CFBA9D9764A310757EC388D97C27F69E4149E02854AB87
3,055,769 UART: Caliptra RT
3,056,020 UART: [state] CFI Enabled
3,176,084 UART: [rt] RT listening for mailbox commands...
3,176,754 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,804 UART: [rt]cmd =0x41544d4e, len=14344
3,609,556 >>> mbox cmd response data (8 bytes)
3,609,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,670 UART: [rt]cmd =0x41545348, len=116
3,661,967 >>> mbox cmd response data (12 bytes)
3,661,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,150,975 >>> mbox cmd response: success
6,150,975 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,164,240 UART:
6,164,256 UART: Running Caliptra FMC ...
6,164,664 UART:
6,164,718 UART: [state] CFI Enabled
6,253,653 UART: [art] Extend RT PCRs Done
6,254,081 UART: [art] Lock RT PCRs Done
6,255,528 UART: [art] Populate DV Done
6,263,849 UART: [fht] FMC Alias Private Key: 7
6,264,915 UART: [art] Derive CDI
6,265,195 UART: [art] Store in slot 0x4
6,351,204 UART: [art] Derive Key Pair
6,351,564 UART: [art] Store priv key in slot 0x5
6,364,398 UART: [art] Derive Key Pair - Done
6,379,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,394,595 UART: [art] Erasing AUTHORITY.KEYID = 7
6,395,360 UART: [art] PUB.X = 941500FDA5B3A2A95838B838561592FEA08CEEF056CE44BD3BE52C3370A83235606E99955E62BA5CECDAFE0D5B56D013
6,402,115 UART: [art] PUB.Y = 45F0067C9ABF57A4F6AD7FDC597DFDF939C0EACC250761085F86A0037963D09D05448E524AC0BF435800A752506980F0
6,409,030 UART: [art] SIG.R = 2AD7749B5A4F24547AE4E3E7BF7476971237BB41C9D33140C7AC2F9EA5F164AB75B68A652558BC032552E373F0F11C4C
6,415,801 UART: [art] SIG.S = 41DB9A8DA0FB5EAD6EE21CC41DB34D6BBEF59EB5AD6C87C4F7A3F4BEEEE9DB9BD70415DAD246E2E8EFB7AC7BDA02F838
6,440,333 UART: Caliptra RT
6,440,584 UART: [state] CFI Enabled
6,804,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,574 UART: [rt]cmd =0x41545348, len=116
6,857,784 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,162 UART: [kat] SHA2-256
904,102 UART: [kat] SHA2-384
906,735 UART: [kat] SHA2-512-ACC
908,636 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,453 UART: [kat] LMS
1,171,781 UART: [kat] --
1,172,714 UART: [cold-reset] ++
1,173,258 UART: [fht] FHT @ 0x50003400
1,175,877 UART: [idev] ++
1,176,045 UART: [idev] CDI.KEYID = 6
1,176,405 UART: [idev] SUBJECT.KEYID = 7
1,176,829 UART: [idev] UDS.KEYID = 0
1,177,174 ready_for_fw is high
1,177,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,819 UART: [idev] Erasing UDS.KEYID = 0
1,202,436 UART: [idev] Sha1 KeyId Algorithm
1,210,968 UART: [idev] --
1,211,950 UART: [ldev] ++
1,212,118 UART: [ldev] CDI.KEYID = 6
1,212,481 UART: [ldev] SUBJECT.KEYID = 5
1,212,907 UART: [ldev] AUTHORITY.KEYID = 7
1,213,370 UART: [ldev] FE.KEYID = 1
1,218,552 UART: [ldev] Erasing FE.KEYID = 1
1,244,807 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,283,879 UART: [fwproc] Wait for Commands...
1,284,455 UART: [fwproc] Recv command 0x46574c44
1,285,183 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,535 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,720 >>> mbox cmd response: success
2,828,894 UART: [afmc] ++
2,829,062 UART: [afmc] CDI.KEYID = 6
2,829,424 UART: [afmc] SUBJECT.KEYID = 7
2,829,849 UART: [afmc] AUTHORITY.KEYID = 5
2,865,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,555 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,256 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,040 UART: [afmc] --
2,908,938 UART: [cold-reset] --
2,909,802 UART: [state] Locking Datavault
2,910,961 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,565 UART: [state] Locking ICCM
2,912,119 UART: [exit] Launching FMC @ 0x40000130
2,917,449 UART:
2,917,465 UART: Running Caliptra FMC ...
2,917,873 UART:
2,918,016 UART: [state] CFI Enabled
2,928,696 UART: [fht] FMC Alias Private Key: 7
3,047,354 UART: [art] Extend RT PCRs Done
3,047,782 UART: [art] Lock RT PCRs Done
3,049,438 UART: [art] Populate DV Done
3,057,741 UART: [fht] FMC Alias Private Key: 7
3,058,819 UART: [art] Derive CDI
3,059,099 UART: [art] Store in slot 0x4
3,145,196 UART: [art] Derive Key Pair
3,145,556 UART: [art] Store priv key in slot 0x5
3,159,204 UART: [art] Derive Key Pair - Done
3,174,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,920 UART: [art] PUB.X = 6DD9BCC1C604BC0C6B0AFF0AF8F54D9D8F42EE7201B550C6A50C3F52F03563EEBF6D1434E55DBC1DC4091778FACFAB1B
3,196,697 UART: [art] PUB.Y = 8CDD01BD1DD18AB6E10D169708EB9B6BA6BD5072C606F17CB740641F2A33E43EFA354D5231CE607EC18150A832A182F2
3,203,645 UART: [art] SIG.R = 983FF69E76ECB23FE6F76D5B1182F056AE966BBF0768A5932D7D638221051250C2CF66A5376EDC019A1EC2B2090254F0
3,210,402 UART: [art] SIG.S = 0A8021BAF213A698F520DBF037340D9B85595B7BE339AA3E9102E28ECA5B19823D3F6A80CBA4F661C4FD3BFD5784BA94
3,234,475 UART: Caliptra RT
3,234,818 UART: [state] CFI Enabled
3,354,539 UART: [rt] RT listening for mailbox commands...
3,355,209 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,317 UART: [rt]cmd =0x41544d4e, len=14344
3,788,597 >>> mbox cmd response data (8 bytes)
3,788,598 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,551 UART: [rt]cmd =0x41545348, len=116
3,840,624 >>> mbox cmd response data (12 bytes)
3,840,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,422 UART:
3,841,438 UART: Running Caliptra ROM ...
3,841,846 UART:
3,841,988 UART: [state] CFI Enabled
3,844,926 UART: [state] LifecycleState = Unprovisioned
3,845,581 UART: [state] DebugLocked = No
3,846,293 UART: [state] WD Timer not started. Device not locked for debugging
3,847,541 UART: [kat] SHA2-256
4,653,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,657,316 UART: [kat] ++
4,657,468 UART: [kat] sha1
4,661,906 UART: [kat] SHA2-256
4,663,846 UART: [kat] SHA2-384
4,666,761 UART: [kat] SHA2-512-ACC
4,668,661 UART: [kat] ECC-384
4,678,024 UART: [kat] HMAC-384Kdf
4,682,478 UART: [kat] LMS
4,930,806 UART: [kat] --
4,931,736 UART: [update-reset] ++
6,291,574 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,292,603 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,447,818 >>> mbox cmd response: success
6,447,818 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,447,987 UART: [update-reset] Copying MAN_2 To MAN_1
6,456,001 UART: [update-reset Success] --
6,456,754 UART: [state] Locking Datavault
6,457,534 UART: [state] Locking PCR0, PCR1 and PCR31
6,458,138 UART: [state] Locking ICCM
6,458,704 UART: [exit] Launching FMC @ 0x40000130
6,464,034 UART:
6,464,050 UART: Running Caliptra FMC ...
6,464,458 UART:
6,464,601 UART: [state] CFI Enabled
6,553,552 UART: [art] Extend RT PCRs Done
6,553,980 UART: [art] Lock RT PCRs Done
6,555,249 UART: [art] Populate DV Done
6,563,446 UART: [fht] FMC Alias Private Key: 7
6,564,524 UART: [art] Derive CDI
6,564,804 UART: [art] Store in slot 0x4
6,650,581 UART: [art] Derive Key Pair
6,650,941 UART: [art] Store priv key in slot 0x5
6,664,401 UART: [art] Derive Key Pair - Done
6,678,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,694,439 UART: [art] Erasing AUTHORITY.KEYID = 7
6,695,204 UART: [art] PUB.X = 7E85B758DF91D915403C420504DE13D3A6AAAA709E9F42CEC77587BE7E6C411B94779D9B3D365B739F59C5E22BD06F8C
6,701,976 UART: [art] PUB.Y = 74FF75BD836F5967E1A9AB900F9C4E4610096C43151199B41EFD0F4C99A57EF4369DA8493B855915A7DEED55AD907FA9
6,708,923 UART: [art] SIG.R = F86081B6734E75BBC9F62AECA327B0735770A0EC0875D3F6860C9ADBC3DFCA0DD4C85503FC07EB6C6D7D7491C756017E
6,715,689 UART: [art] SIG.S = 978BA7E7E42AA4B985A39453FC9958C9B9DEF325D022BC3BF5A8D16D18933AE86AB6C6A826097E604FE0C50D15B073A0
6,739,829 UART: Caliptra RT
6,740,172 UART: [state] CFI Enabled
7,103,627 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,384 UART: [rt]cmd =0x41545348, len=116
7,156,870 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,108 ready_for_fw is high
1,060,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,385 >>> mbox cmd response: success
2,741,448 UART:
2,741,464 UART: Running Caliptra FMC ...
2,741,872 UART:
2,742,015 UART: [state] CFI Enabled
2,752,693 UART: [fht] FMC Alias Private Key: 7
2,871,375 UART: [art] Extend RT PCRs Done
2,871,803 UART: [art] Lock RT PCRs Done
2,873,141 UART: [art] Populate DV Done
2,881,522 UART: [fht] FMC Alias Private Key: 7
2,882,470 UART: [art] Derive CDI
2,882,750 UART: [art] Store in slot 0x4
2,968,103 UART: [art] Derive Key Pair
2,968,463 UART: [art] Store priv key in slot 0x5
2,981,943 UART: [art] Derive Key Pair - Done
2,996,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,803 UART: [art] PUB.X = 2CD29DD82AF901EFF0EED279963B24272D075BD4505720C61F87A4658EECF054F6F09914F7D9603F492AFF98C9772CEC
3,019,575 UART: [art] PUB.Y = 95668EC013A2887D51433AECF695F7FFC0BA0B620AD3B8D04257864C5432FB9D997E20CF15312192DBFCE5C2673B08CA
3,026,524 UART: [art] SIG.R = 8BF5E9522C1E4739C3AC65D26D8AE28A4D50F3C1D7082E688D9076CE937EC1AFE1CC410206337847455F29A1A5998449
3,033,285 UART: [art] SIG.S = BC6C5ABB9804275F53D0EC7F218FB3EBBEA3545B1D774382AE09A0D4D5383AB66ECBDFC7ACFE9FCB1DEBA47A23F1A772
3,057,349 UART: Caliptra RT
3,057,692 UART: [state] CFI Enabled
3,177,524 UART: [rt] RT listening for mailbox commands...
3,178,194 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,264 UART: [rt]cmd =0x41544d4e, len=14344
3,610,884 >>> mbox cmd response data (8 bytes)
3,610,885 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,860 UART: [rt]cmd =0x41545348, len=116
3,662,733 >>> mbox cmd response data (12 bytes)
3,662,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,152,950 >>> mbox cmd response: success
6,152,950 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,166,487 UART:
6,166,503 UART: Running Caliptra FMC ...
6,166,911 UART:
6,167,054 UART: [state] CFI Enabled
6,256,631 UART: [art] Extend RT PCRs Done
6,257,059 UART: [art] Lock RT PCRs Done
6,258,174 UART: [art] Populate DV Done
6,266,271 UART: [fht] FMC Alias Private Key: 7
6,267,269 UART: [art] Derive CDI
6,267,549 UART: [art] Store in slot 0x4
6,352,818 UART: [art] Derive Key Pair
6,353,178 UART: [art] Store priv key in slot 0x5
6,366,638 UART: [art] Derive Key Pair - Done
6,381,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,396,572 UART: [art] Erasing AUTHORITY.KEYID = 7
6,397,337 UART: [art] PUB.X = 2223E603800864EFA7B6F9F7EC555B48B8860A253AD42BFDD59572902C039FB243D36D0902D4A5CAB844508F3774B317
6,404,087 UART: [art] PUB.Y = 4182B782A0FF63373BFF5DE4CF39EB950AF0ED35BCF91DDA001DC732BE2DA182A002F04BD392592046A621A99720E0EE
6,411,023 UART: [art] SIG.R = 0B6FFF2A39CFF645DBC1CE2E92ED564B14CD9D6AB6A56CE92984A3E929E47E59553D737B67BD89F9B4D40D90F5879046
6,417,801 UART: [art] SIG.S = 4B2B34139F5911284AF36F388DC2809BAEE6EBC157FE3FB23E92A598CF42804BA3B8F46392F1C3AC984420DA16FC4362
6,442,209 UART: Caliptra RT
6,442,552 UART: [state] CFI Enabled
6,807,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,838,292 UART: [rt]cmd =0x41545348, len=116
6,860,622 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,172 UART:
192,507 UART: Running Caliptra ROM ...
193,707 UART:
193,862 UART: [state] CFI Enabled
267,022 UART: [state] LifecycleState = Unprovisioned
268,940 UART: [state] DebugLocked = No
271,042 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,769 UART: [kat] SHA2-256
445,526 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,979 UART: [kat] ++
456,583 UART: [kat] sha1
466,825 UART: [kat] SHA2-256
469,496 UART: [kat] SHA2-384
476,466 UART: [kat] SHA2-512-ACC
478,856 UART: [kat] ECC-384
2,769,753 UART: [kat] HMAC-384Kdf
2,800,960 UART: [kat] LMS
3,991,282 UART: [kat] --
3,995,291 UART: [cold-reset] ++
3,996,873 UART: [fht] Storing FHT @ 0x50003400
4,008,278 UART: [idev] ++
4,008,843 UART: [idev] CDI.KEYID = 6
4,009,877 UART: [idev] SUBJECT.KEYID = 7
4,011,057 UART: [idev] UDS.KEYID = 0
4,012,023 ready_for_fw is high
4,012,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,283 UART: [idev] Erasing UDS.KEYID = 0
7,350,017 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,694 UART: [idev] --
7,376,875 UART: [ldev] ++
7,377,449 UART: [ldev] CDI.KEYID = 6
7,378,390 UART: [ldev] SUBJECT.KEYID = 5
7,379,608 UART: [ldev] AUTHORITY.KEYID = 7
7,380,893 UART: [ldev] FE.KEYID = 1
7,423,679 UART: [ldev] Erasing FE.KEYID = 1
10,761,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,554 UART: [ldev] --
13,138,012 UART: [fwproc] Waiting for Commands...
13,139,683 UART: [fwproc] Received command 0x46574c44
13,141,870 UART: [fwproc] Received Image of size 118548 bytes
17,248,840 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,173 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,722,179 >>> mbox cmd response: success
17,727,196 UART: [afmc] ++
17,727,814 UART: [afmc] CDI.KEYID = 6
17,728,731 UART: [afmc] SUBJECT.KEYID = 7
17,729,946 UART: [afmc] AUTHORITY.KEYID = 5
21,088,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,168 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,563 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,023 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,473 UART: [afmc] --
23,463,967 UART: [cold-reset] --
23,469,557 UART: [state] Locking Datavault
23,476,120 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,876 UART: [state] Locking ICCM
23,480,326 UART: [exit] Launching FMC @ 0x40000130
23,488,717 UART:
23,488,952 UART: Running Caliptra FMC ...
23,490,050 UART:
23,490,215 UART: [state] CFI Enabled
23,552,166 UART: [fht] FMC Alias Private Key: 7
25,893,037 UART: [art] Extend RT PCRs Done
25,894,255 UART: [art] Lock RT PCRs Done
25,896,230 UART: [art] Populate DV Done
25,901,419 UART: [fht] FMC Alias Private Key: 7
25,903,118 UART: [art] Derive CDI
25,903,930 UART: [art] Store in slot 0x4
25,961,728 UART: [art] Derive Key Pair
25,962,773 UART: [art] Store priv key in slot 0x5
29,255,499 UART: [art] Derive Key Pair - Done
29,268,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,009 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,522 UART: [art] PUB.X = 4A5C6624A2EE0BFE9937F080E5AE9FDDCDB02D103D77AADE7FE2BEE882894DC7F8480FFF482D509FF92B1D8CF729ADED
31,566,825 UART: [art] PUB.Y = A20FD0669ADBBB4684260E8FB2C7B94D9F0007479EC1FF9433044021BF62C5D68869533E58B7A38196860E2B9CC9A75C
31,574,059 UART: [art] SIG.R = FD15D0492EFF670BC9A76AE6D25F91413CA4A7407013D6106E896EF0C098729B42A15C45C0C9F0F3ABADEE3F2D98D1C6
31,581,448 UART: [art] SIG.S = 3986AB4B98419B1E944F6F865DD54B42BBA65B00236B6E00C59A074FA99A1B1B32422D78602C3011AAEB704CDCC35088
32,886,282 UART: Caliptra RT
32,886,994 UART: [state] CFI Enabled
33,063,180 UART: [rt] RT listening for mailbox commands...
33,065,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,221,133 UART: [rt]cmd =0x41544d4e, len=14344
38,521,653 >>> mbox cmd response data (8 bytes)
38,522,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,553,036 UART: [rt]cmd =0x41545348, len=116
38,555,486 >>> mbox cmd response data (12 bytes)
40,629,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,780,175 UART:
40,780,544 UART: Running Caliptra ROM ...
40,781,679 UART:
40,781,852 UART: [state] CFI Enabled
40,837,457 UART: [state] LifecycleState = Unprovisioned
40,839,399 UART: [state] DebugLocked = No
40,840,759 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,845,839 UART: [kat] SHA2-256
41,015,504 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,025,986 UART: [kat] ++
41,026,470 UART: [kat] sha1
41,037,904 UART: [kat] SHA2-256
41,040,596 UART: [kat] SHA2-384
41,045,786 UART: [kat] SHA2-512-ACC
41,048,137 UART: [kat] ECC-384
43,342,145 UART: [kat] HMAC-384Kdf
43,373,006 UART: [kat] LMS
44,563,344 UART: [kat] --
44,569,236 UART: [update-reset] ++
48,768,894 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,773,399 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,171,141 >>> mbox cmd response: success
49,175,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,176,508 UART: [update-reset] Copying MAN_2 To MAN_1
49,194,168 UART: [update-reset Success] --
49,197,488 UART: [state] Locking Datavault
49,200,092 UART: [state] Locking PCR0, PCR1 and PCR31
49,201,863 UART: [state] Locking ICCM
49,203,697 UART: [exit] Launching FMC @ 0x40000130
49,212,149 UART:
49,212,396 UART: Running Caliptra FMC ...
49,213,502 UART:
49,213,669 UART: [state] CFI Enabled
49,313,133 UART: [art] Extend RT PCRs Done
49,314,318 UART: [art] Lock RT PCRs Done
49,315,781 UART: [art] Populate DV Done
49,321,246 UART: [fht] FMC Alias Private Key: 7
49,322,899 UART: [art] Derive CDI
49,323,735 UART: [art] Store in slot 0x4
49,382,008 UART: [art] Derive Key Pair
49,383,055 UART: [art] Store priv key in slot 0x5
52,675,705 UART: [art] Derive Key Pair - Done
52,688,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,977,257 UART: [art] Erasing AUTHORITY.KEYID = 7
54,978,768 UART: [art] PUB.X = 0F8FE951CD5239D394F18D394B3F18C2C2EB660D9E5776A0244B6AE2B806F4328C0BEA7CDBABC930B292CF91E7F60C70
54,986,071 UART: [art] PUB.Y = C5DF2E83FEBD51C487B4C70CD162B7E0F4854991FE6B6343306EAA6FE992193197914E872D95EA5C948571C1FC5F241B
54,993,298 UART: [art] SIG.R = 1AB7268A3DE3DF5D676422438630CBA74619B562ABACF13C822D92CD864F7798556890CEA258FC7469C5DA3D75B82C2A
55,000,743 UART: [art] SIG.S = 0C6CBCA535ED585E2B6A03672F3D9803B73C1A502B21B298518DAA6408558015DAB53AD88549D3598CF08D1AEE0A091D
56,305,933 UART: Caliptra RT
56,306,641 UART: [state] CFI Enabled
56,721,556 UART: [rt] RT listening for mailbox commands...
56,753,421 UART: [rt]cmd =0x41545348, len=116
56,756,048 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,783,369 ready_for_fw is high
3,783,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,003 >>> mbox cmd response: success
23,635,493 UART:
23,635,877 UART: Running Caliptra FMC ...
23,636,994 UART:
23,637,147 UART: [state] CFI Enabled
23,704,502 UART: [fht] FMC Alias Private Key: 7
26,044,357 UART: [art] Extend RT PCRs Done
26,045,835 UART: [art] Lock RT PCRs Done
26,047,394 UART: [art] Populate DV Done
26,052,975 UART: [fht] FMC Alias Private Key: 7
26,054,464 UART: [art] Derive CDI
26,055,254 UART: [art] Store in slot 0x4
26,114,814 UART: [art] Derive Key Pair
26,115,861 UART: [art] Store priv key in slot 0x5
29,409,080 UART: [art] Derive Key Pair - Done
29,421,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,710,587 UART: [art] Erasing AUTHORITY.KEYID = 7
31,712,106 UART: [art] PUB.X = D6DBF456401B3582B06308B22AB1236BBAC781C8EA9FDD99E753BBD588AEB8C7FCC2469B7D972A57866AD141CC5EA495
31,719,421 UART: [art] PUB.Y = DFE906010C765184CEA23F0BD7F105ACBC28D021AF19EF50109071686B3C95957592189ABE06677CF063670EC16EDE0F
31,726,631 UART: [art] SIG.R = CFC537EAB104304547A254D8BA3F8F55589AC6150BFAA9343679FAAFF5237829044F572970B109CE68A37B3F70F9B01C
31,734,016 UART: [art] SIG.S = E70DC7832FF1A3511366D52981F23D20E4E10DBEC7D49D5AEF1C4E02D309EB3E162A4A1135588C085938651563243F3E
33,038,865 UART: Caliptra RT
33,039,573 UART: [state] CFI Enabled
33,214,816 UART: [rt] RT listening for mailbox commands...
33,217,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,372,840 UART: [rt]cmd =0x41544d4e, len=14344
38,673,593 >>> mbox cmd response data (8 bytes)
38,674,179 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,704,851 UART: [rt]cmd =0x41545348, len=116
38,707,108 >>> mbox cmd response data (12 bytes)
40,781,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,624,580 >>> mbox cmd response: success
49,625,263 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,658,448 UART:
49,658,740 UART: Running Caliptra FMC ...
49,659,864 UART:
49,660,023 UART: [state] CFI Enabled
49,759,918 UART: [art] Extend RT PCRs Done
49,761,200 UART: [art] Lock RT PCRs Done
49,762,397 UART: [art] Populate DV Done
49,767,702 UART: [fht] FMC Alias Private Key: 7
49,769,289 UART: [art] Derive CDI
49,770,102 UART: [art] Store in slot 0x4
49,828,474 UART: [art] Derive Key Pair
49,829,506 UART: [art] Store priv key in slot 0x5
53,122,204 UART: [art] Derive Key Pair - Done
53,135,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,423,602 UART: [art] Erasing AUTHORITY.KEYID = 7
55,425,124 UART: [art] PUB.X = B1B73CF46CA7B4C245A47907FB4CBF1CF64FE9206A8681CF6FE4F5AA5DBCDE5D4ABD0F4C48A9EE56987E4FD9E0285F02
55,432,446 UART: [art] PUB.Y = 015AB479A406D81C4CBC4C0AB77A471863EDE12818C6929BED2017E4E26A1AF6A7F91BD252B377C06541149739FF1D5F
55,439,637 UART: [art] SIG.R = EC04086E03EFA91F835211BECD8FCAB369361E3DC017D611AC9381D64D69E07267B21439F9F1A175EDB7C20BE5B7DD8F
55,447,080 UART: [art] SIG.S = F761D2CC05C84F185B0A911E05610353BF4FED5D62FDFE184935BCD4E8C5F7A6BAE81CDD0C4B39AB14C9C9D04C0D2C32
56,751,971 UART: Caliptra RT
56,752,682 UART: [state] CFI Enabled
57,173,814 UART: [rt] RT listening for mailbox commands...
57,205,655 UART: [rt]cmd =0x41545348, len=116
57,208,252 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,544 UART:
192,902 UART: Running Caliptra ROM ...
194,046 UART:
603,569 UART: [state] CFI Enabled
617,459 UART: [state] LifecycleState = Unprovisioned
619,399 UART: [state] DebugLocked = No
621,139 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,163 UART: [kat] SHA2-256
794,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,415 UART: [kat] ++
805,855 UART: [kat] sha1
816,865 UART: [kat] SHA2-256
819,592 UART: [kat] SHA2-384
824,443 UART: [kat] SHA2-512-ACC
826,852 UART: [kat] ECC-384
3,108,183 UART: [kat] HMAC-384Kdf
3,120,518 UART: [kat] LMS
4,310,614 UART: [kat] --
4,316,184 UART: [cold-reset] ++
4,317,711 UART: [fht] Storing FHT @ 0x50003400
4,329,977 UART: [idev] ++
4,330,588 UART: [idev] CDI.KEYID = 6
4,331,493 UART: [idev] SUBJECT.KEYID = 7
4,332,756 UART: [idev] UDS.KEYID = 0
4,333,734 ready_for_fw is high
4,333,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,843 UART: [idev] Erasing UDS.KEYID = 0
7,622,403 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,366 UART: [idev] --
7,648,244 UART: [ldev] ++
7,648,816 UART: [ldev] CDI.KEYID = 6
7,649,777 UART: [ldev] SUBJECT.KEYID = 5
7,650,981 UART: [ldev] AUTHORITY.KEYID = 7
7,652,259 UART: [ldev] FE.KEYID = 1
7,662,092 UART: [ldev] Erasing FE.KEYID = 1
10,949,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,292 UART: [ldev] --
13,309,740 UART: [fwproc] Waiting for Commands...
13,312,266 UART: [fwproc] Received command 0x46574c44
13,314,496 UART: [fwproc] Received Image of size 118548 bytes
17,424,117 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,182 >>> mbox cmd response: success
17,911,075 UART: [afmc] ++
17,911,703 UART: [afmc] CDI.KEYID = 6
17,912,621 UART: [afmc] SUBJECT.KEYID = 7
17,913,721 UART: [afmc] AUTHORITY.KEYID = 5
21,231,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,412 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,093 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,825 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,221 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,507 UART: [afmc] --
23,594,463 UART: [cold-reset] --
23,598,928 UART: [state] Locking Datavault
23,605,250 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,997 UART: [state] Locking ICCM
23,609,658 UART: [exit] Launching FMC @ 0x40000130
23,618,095 UART:
23,618,324 UART: Running Caliptra FMC ...
23,619,343 UART:
23,619,486 UART: [state] CFI Enabled
23,627,741 UART: [fht] FMC Alias Private Key: 7
25,967,914 UART: [art] Extend RT PCRs Done
25,969,130 UART: [art] Lock RT PCRs Done
25,971,012 UART: [art] Populate DV Done
25,976,698 UART: [fht] FMC Alias Private Key: 7
25,978,348 UART: [art] Derive CDI
25,979,159 UART: [art] Store in slot 0x4
26,021,601 UART: [art] Derive Key Pair
26,022,643 UART: [art] Store priv key in slot 0x5
29,265,341 UART: [art] Derive Key Pair - Done
29,278,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,852 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,372 UART: [art] PUB.X = FE217120FDEE9805710400A55FFFA26FABF34393648332EABE4534718866DD9EE0DA573E5D1B5E9F999FBDFCA8300AD5
31,567,609 UART: [art] PUB.Y = F0B8AB9A3CC73226097AC050F8159A8596D60765737C64F03646D0062B1EE27593DDE6AD1FB3F100251C05686DDD4DFA
31,574,829 UART: [art] SIG.R = B580F79A34451CD8E37DECD85BA332BAE6492722F96A0C4F4EB68634115B9AAD1F3D43990C5E2BA61E96000F23659C60
31,582,217 UART: [art] SIG.S = F9D1570CE8DA4A264BF6FDB07EC35D48C0BCADAB87E5FA9B07A0E5AF0021F86CC0DB5A28539ABD00CBE50E4D7D5F9D12
32,886,780 UART: Caliptra RT
32,887,492 UART: [state] CFI Enabled
33,020,376 UART: [rt] RT listening for mailbox commands...
33,022,786 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,178,379 UART: [rt]cmd =0x41544d4e, len=14344
38,479,350 >>> mbox cmd response data (8 bytes)
38,479,960 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,510,735 UART: [rt]cmd =0x41545348, len=116
38,513,043 >>> mbox cmd response data (12 bytes)
40,593,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,745,009 UART:
40,745,397 UART: Running Caliptra ROM ...
40,746,473 UART:
40,746,631 UART: [state] CFI Enabled
40,757,203 UART: [state] LifecycleState = Unprovisioned
40,759,098 UART: [state] DebugLocked = No
40,761,504 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,765,778 UART: [kat] SHA2-256
40,935,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,945,997 UART: [kat] ++
40,946,530 UART: [kat] sha1
40,957,638 UART: [kat] SHA2-256
40,960,324 UART: [kat] SHA2-384
40,965,937 UART: [kat] SHA2-512-ACC
40,968,279 UART: [kat] ECC-384
43,253,215 UART: [kat] HMAC-384Kdf
43,263,606 UART: [kat] LMS
44,453,685 UART: [kat] --
44,456,382 UART: [update-reset] ++
48,643,953 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,647,434 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,045,195 >>> mbox cmd response: success
49,050,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,050,636 UART: [update-reset] Copying MAN_2 To MAN_1
49,069,059 UART: [update-reset Success] --
49,072,323 UART: [state] Locking Datavault
49,076,440 UART: [state] Locking PCR0, PCR1 and PCR31
49,078,149 UART: [state] Locking ICCM
49,079,625 UART: [exit] Launching FMC @ 0x40000130
49,088,070 UART:
49,088,311 UART: Running Caliptra FMC ...
49,089,412 UART:
49,089,586 UART: [state] CFI Enabled
49,133,467 UART: [art] Extend RT PCRs Done
49,134,658 UART: [art] Lock RT PCRs Done
49,136,058 UART: [art] Populate DV Done
49,141,681 UART: [fht] FMC Alias Private Key: 7
49,143,272 UART: [art] Derive CDI
49,144,080 UART: [art] Store in slot 0x4
49,187,102 UART: [art] Derive Key Pair
49,188,094 UART: [art] Store priv key in slot 0x5
52,430,569 UART: [art] Derive Key Pair - Done
52,443,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,723,998 UART: [art] Erasing AUTHORITY.KEYID = 7
54,725,507 UART: [art] PUB.X = 92DEDE1E3DD3D740DE97FB9A295A064A53FDEE7D74767B63C727BD28EE1B28AB738251495143E1FD482028344219002D
54,732,752 UART: [art] PUB.Y = F65C81D477262CB8FF1BE61CF958045F3B8516396D12D36A3CB3158A5E1AB2C723FB262ADF46E6091CD0B27B7F265050
54,740,026 UART: [art] SIG.R = 619BCAA82C5A66654EAB267F09D2A4107C8B20AB0621CBDF1B6069751D2A5A55039640CC7A0D340EA2E0A57F7F773192
54,747,464 UART: [art] SIG.S = 970EC51C1A526D0A6DF578108BBADD88AEC6ABB47C84A2ACF9923E8BFAEE7459F6B3583F8D9A591180CE87A69CA18B82
56,052,296 UART: Caliptra RT
56,053,307 UART: [state] CFI Enabled
56,427,249 UART: [rt] RT listening for mailbox commands...
56,459,158 UART: [rt]cmd =0x41545348, len=116
56,461,351 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,128,866 ready_for_fw is high
4,129,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,115 >>> mbox cmd response: success
23,809,778 UART:
23,810,174 UART: Running Caliptra FMC ...
23,811,308 UART:
23,811,468 UART: [state] CFI Enabled
23,819,457 UART: [fht] FMC Alias Private Key: 7
26,160,126 UART: [art] Extend RT PCRs Done
26,161,349 UART: [art] Lock RT PCRs Done
26,163,008 UART: [art] Populate DV Done
26,168,161 UART: [fht] FMC Alias Private Key: 7
26,169,700 UART: [art] Derive CDI
26,170,510 UART: [art] Store in slot 0x4
26,213,034 UART: [art] Derive Key Pair
26,214,067 UART: [art] Store priv key in slot 0x5
29,456,134 UART: [art] Derive Key Pair - Done
29,468,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,491 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,001 UART: [art] PUB.X = 8C8D86B4C25FB1AEC275AF8EF973727E4C306FAF89EAEC67956CA21E0F527FD471954A40EE19447847EA10E6EC1DEFD6
31,758,272 UART: [art] PUB.Y = D7F15E5451F8419FE92C70A5FA7345069C0A75817F7F36D313AFACDE087A5C22D700C092101AAE1798706F1183CBAA17
31,765,533 UART: [art] SIG.R = E644F5C182A8B2A82CE8E5E63982C231D828B9E15FD2A468908769D18D6A053ED56680F2DAD53076769208B8E06B3CE4
31,772,923 UART: [art] SIG.S = B310B9EE62BF1F973729C4482B646C0C9EED1FDEE69A9AC7BEA6CF1BF33900DCC8BB9DFC052E89FA9726BB7A8BF4E981
33,077,528 UART: Caliptra RT
33,078,218 UART: [state] CFI Enabled
33,211,155 UART: [rt] RT listening for mailbox commands...
33,213,557 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,369,121 UART: [rt]cmd =0x41544d4e, len=14344
38,669,488 >>> mbox cmd response data (8 bytes)
38,670,052 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,700,724 UART: [rt]cmd =0x41545348, len=116
38,703,037 >>> mbox cmd response data (12 bytes)
40,775,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,525,509 >>> mbox cmd response: success
49,526,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,560,894 UART:
49,561,210 UART: Running Caliptra FMC ...
49,562,246 UART:
49,562,392 UART: [state] CFI Enabled
49,606,088 UART: [art] Extend RT PCRs Done
49,607,338 UART: [art] Lock RT PCRs Done
49,608,600 UART: [art] Populate DV Done
49,614,003 UART: [fht] FMC Alias Private Key: 7
49,615,557 UART: [art] Derive CDI
49,616,291 UART: [art] Store in slot 0x4
49,659,162 UART: [art] Derive Key Pair
49,660,202 UART: [art] Store priv key in slot 0x5
52,902,455 UART: [art] Derive Key Pair - Done
52,915,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,196,126 UART: [art] Erasing AUTHORITY.KEYID = 7
55,197,636 UART: [art] PUB.X = 439B076914E2D5C1D49A927750D1E294C4ECC4819057FB2D0270FB78F96FE72CD8E6A6D5D244B3659D7C73EB4D23ECED
55,204,892 UART: [art] PUB.Y = 67CBBAC5462659A7AE72B5189D9F759A7FA7F245F2D87F19B3A913E72071F55120D54638043F0FC1E8BF471F0F9677BA
55,212,174 UART: [art] SIG.R = 467ED0D311D2E8CE2997FC38D0114BFB4A39DEF4ADEAEB0169A774B87CD4FBAF094D7676470D623D2FEABCA5B863B8EB
55,219,591 UART: [art] SIG.S = FD265F7BB6AD9A25AA3CD91F57EA9F4FB3B5682D84E02D6D503807DB1BBB47B54CD83C6EC749701B1DCEB667D0174B98
56,525,290 UART: Caliptra RT
56,526,009 UART: [state] CFI Enabled
56,898,631 UART: [rt] RT listening for mailbox commands...
56,930,553 UART: [rt]cmd =0x41545348, len=116
56,932,744 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,124 UART:
192,479 UART: Running Caliptra ROM ...
193,686 UART:
193,837 UART: [state] CFI Enabled
268,718 UART: [state] LifecycleState = Unprovisioned
270,704 UART: [state] DebugLocked = No
273,232 UART: [state] WD Timer not started. Device not locked for debugging
276,968 UART: [kat] SHA2-256
456,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,385 UART: [kat] ++
467,879 UART: [kat] sha1
479,175 UART: [kat] SHA2-256
481,895 UART: [kat] SHA2-384
486,600 UART: [kat] SHA2-512-ACC
488,958 UART: [kat] ECC-384
2,948,959 UART: [kat] HMAC-384Kdf
2,971,752 UART: [kat] LMS
3,448,268 UART: [kat] --
3,452,906 UART: [cold-reset] ++
3,454,974 UART: [fht] FHT @ 0x50003400
3,466,653 UART: [idev] ++
3,467,218 UART: [idev] CDI.KEYID = 6
3,468,176 UART: [idev] SUBJECT.KEYID = 7
3,469,413 UART: [idev] UDS.KEYID = 0
3,470,308 ready_for_fw is high
3,470,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,069 UART: [idev] Erasing UDS.KEYID = 0
5,988,521 UART: [idev] Sha1 KeyId Algorithm
6,013,003 UART: [idev] --
6,018,515 UART: [ldev] ++
6,019,086 UART: [ldev] CDI.KEYID = 6
6,020,106 UART: [ldev] SUBJECT.KEYID = 5
6,021,263 UART: [ldev] AUTHORITY.KEYID = 7
6,022,488 UART: [ldev] FE.KEYID = 1
6,055,741 UART: [ldev] Erasing FE.KEYID = 1
8,559,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,759 UART: [ldev] --
10,371,684 UART: [fwproc] Wait for Commands...
10,374,823 UART: [fwproc] Recv command 0x46574c44
10,376,802 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,592 >>> mbox cmd response: success
14,350,006 UART: [afmc] ++
14,350,599 UART: [afmc] CDI.KEYID = 6
14,351,544 UART: [afmc] SUBJECT.KEYID = 7
14,352,757 UART: [afmc] AUTHORITY.KEYID = 5
16,891,589 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,633,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,635,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,651,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,667,630 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,683,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,708,295 UART: [afmc] --
18,711,458 UART: [cold-reset] --
18,716,070 UART: [state] Locking Datavault
18,722,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,092 UART: [state] Locking ICCM
18,726,131 UART: [exit] Launching FMC @ 0x40000130
18,734,577 UART:
18,734,814 UART: Running Caliptra FMC ...
18,735,911 UART:
18,736,062 UART: [state] CFI Enabled
18,793,562 UART: [fht] FMC Alias Private Key: 7
20,560,187 UART: [art] Extend RT PCRs Done
20,561,402 UART: [art] Lock RT PCRs Done
20,562,887 UART: [art] Populate DV Done
20,568,240 UART: [fht] FMC Alias Private Key: 7
20,569,716 UART: [art] Derive CDI
20,570,466 UART: [art] Store in slot 0x4
20,626,315 UART: [art] Derive Key Pair
20,627,354 UART: [art] Store priv key in slot 0x5
23,090,499 UART: [art] Derive Key Pair - Done
23,103,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,117 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,624 UART: [art] PUB.X = 241AC90E636553644AF2A1883A946B9376C29E772D4821A9AA567EFC4FB98138F2528371A3EE1FCC2B9384C8513FC400
24,824,871 UART: [art] PUB.Y = 7D8AD83784E2E927BDA9B284435F68721A7542771E651B624349B21C5D1F7CB20B698A8132EF01CAF6401F10943095B2
24,832,104 UART: [art] SIG.R = 63D040DB319065BC6EFB362440A80F859598E155C49D1AABB4421E89BEF27C3700B9CEC42C84AE69C96481A45AEB1DA8
24,839,544 UART: [art] SIG.S = 088E50DBEEDBB0D9A8A74D3DA6AEA2F50D5C34629A44432CEF1129062E814375EBBA9B30CC027681536BE86B37D0C36F
25,818,743 UART: Caliptra RT
25,819,437 UART: [state] CFI Enabled
25,999,459 UART: [rt] RT listening for mailbox commands...
26,001,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,157,227 UART: [rt]cmd =0x41544d4e, len=14344
30,152,414 >>> mbox cmd response data (8 bytes)
30,153,063 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,183,577 UART: [rt]cmd =0x41545348, len=116
30,185,832 >>> mbox cmd response data (12 bytes)
32,247,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,398,336 UART:
32,398,717 UART: Running Caliptra ROM ...
32,399,839 UART:
32,400,006 UART: [state] CFI Enabled
32,470,933 UART: [state] LifecycleState = Unprovisioned
32,472,866 UART: [state] DebugLocked = No
32,474,413 UART: [state] WD Timer not started. Device not locked for debugging
32,477,779 UART: [kat] SHA2-256
32,657,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,668,201 UART: [kat] ++
32,668,709 UART: [kat] sha1
32,679,007 UART: [kat] SHA2-256
32,681,711 UART: [kat] SHA2-384
32,686,575 UART: [kat] SHA2-512-ACC
32,688,978 UART: [kat] ECC-384
35,130,376 UART: [kat] HMAC-384Kdf
35,156,102 UART: [kat] LMS
35,632,408 UART: [kat] --
35,634,179 UART: [update-reset] ++
39,137,061 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,140,073 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,537,696 >>> mbox cmd response: success
39,538,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,538,571 UART: [update-reset] Copying MAN_2 To MAN_1
39,575,609 UART: [update-reset Success] --
39,579,829 UART: [state] Locking Datavault
39,584,497 UART: [state] Locking PCR0, PCR1 and PCR31
39,586,195 UART: [state] Locking ICCM
39,588,725 UART: [exit] Launching FMC @ 0x40000130
39,597,063 UART:
39,597,296 UART: Running Caliptra FMC ...
39,598,393 UART:
39,598,547 UART: [state] CFI Enabled
39,691,533 UART: [art] Extend RT PCRs Done
39,692,717 UART: [art] Lock RT PCRs Done
39,694,166 UART: [art] Populate DV Done
39,699,785 UART: [fht] FMC Alias Private Key: 7
39,701,315 UART: [art] Derive CDI
39,702,121 UART: [art] Store in slot 0x4
39,760,533 UART: [art] Derive Key Pair
39,761,590 UART: [art] Store priv key in slot 0x5
42,223,791 UART: [art] Derive Key Pair - Done
42,236,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,949,634 UART: [art] Erasing AUTHORITY.KEYID = 7
43,951,138 UART: [art] PUB.X = 8DEF4CA3543786DEFFCDE4CED0D34A5345D62E848947C2C4AD8F2FF17E74911619CDFBA51BACB31E6EEB85E343A48DD0
43,958,468 UART: [art] PUB.Y = D284888854081DE8FDB8EE8A6A74E489F2D243F7B877A8F8224908F5D44AC5B8A7A10966B1AB710B301131FA517D84E3
43,965,723 UART: [art] SIG.R = D0E76381DA05324C3B42E0FD947ECAC1CAA290CBC8C709B87ADE7BF1B98B1F2BAF463C8CF11498C2961853FA9BA1C35A
43,973,166 UART: [art] SIG.S = DF0428F29C73FB256F2DE0EDDB55ED1A54F0F9BDCD50EF6E251605E73AF436587E99BB1FEF09A73538C81DDF8E871052
44,951,810 UART: Caliptra RT
44,952,501 UART: [state] CFI Enabled
45,371,705 UART: [rt] RT listening for mailbox commands...
45,403,687 UART: [rt]cmd =0x41545348, len=116
45,405,906 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,458,959 ready_for_fw is high
3,459,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,028 >>> mbox cmd response: success
18,533,767 UART:
18,534,180 UART: Running Caliptra FMC ...
18,535,291 UART:
18,535,441 UART: [state] CFI Enabled
18,601,771 UART: [fht] FMC Alias Private Key: 7
20,367,507 UART: [art] Extend RT PCRs Done
20,368,751 UART: [art] Lock RT PCRs Done
20,370,299 UART: [art] Populate DV Done
20,375,678 UART: [fht] FMC Alias Private Key: 7
20,377,223 UART: [art] Derive CDI
20,377,992 UART: [art] Store in slot 0x4
20,433,659 UART: [art] Derive Key Pair
20,434,708 UART: [art] Store priv key in slot 0x5
22,897,504 UART: [art] Derive Key Pair - Done
22,910,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,432 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,947 UART: [art] PUB.X = F31EE04E7AB97B9FC62163D42B5EB23A0FDCE38097482AFFAA05786C1B81906259B47DA80C2A07E31B1895525BD34AF2
24,631,256 UART: [art] PUB.Y = 620B9196EA026537B3C14AA65DEC59D0BB57DC4A37C98BF99D0D202909FD4979F7B3403C92EFA9208A58BFEE56A4CA35
24,638,497 UART: [art] SIG.R = AC4F4C784C034A4A2E4719AB6F7628FDF2F1A46C58E83E20E8B84AE1F3CE1F938889F7F2A9AAECBC647996C1728B4A6F
24,645,899 UART: [art] SIG.S = 14EB87287FB7C2AFE2E7DEB4AB0EF3D54C8AB12F1F32B683E211134AE164445AB3DF7040620F103A1024E83734EF6A9D
25,625,321 UART: Caliptra RT
25,626,040 UART: [state] CFI Enabled
25,806,502 UART: [rt] RT listening for mailbox commands...
25,808,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,964,234 UART: [rt]cmd =0x41544d4e, len=14344
29,959,776 >>> mbox cmd response data (8 bytes)
29,960,379 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,991,165 UART: [rt]cmd =0x41545348, len=116
29,993,584 >>> mbox cmd response data (12 bytes)
32,050,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,375,535 >>> mbox cmd response: success
39,376,314 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,411,086 UART:
39,411,409 UART: Running Caliptra FMC ...
39,412,464 UART:
39,412,618 UART: [state] CFI Enabled
39,516,060 UART: [art] Extend RT PCRs Done
39,517,312 UART: [art] Lock RT PCRs Done
39,518,684 UART: [art] Populate DV Done
39,524,418 UART: [fht] FMC Alias Private Key: 7
39,526,059 UART: [art] Derive CDI
39,526,797 UART: [art] Store in slot 0x4
39,585,347 UART: [art] Derive Key Pair
39,586,421 UART: [art] Store priv key in slot 0x5
42,049,024 UART: [art] Derive Key Pair - Done
42,062,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,775,033 UART: [art] Erasing AUTHORITY.KEYID = 7
43,776,558 UART: [art] PUB.X = AA2BC67859540A2C23B803B16AC0DB559856B3C4E132860FE0B9E2C3C1E7D07792DE8D18D83AFE47F82881B919E9A3F3
43,783,816 UART: [art] PUB.Y = 2B50EAB981751AB65FC2F077171FF228DAEBAAD424F80A25DFDD09C0E201F081F585285F0DC06EF93C5D63DABE7848B0
43,791,107 UART: [art] SIG.R = C605AB2D91BA99A85EA61DCEF59F5F1E32614940476173529EBBACFA1B17C5F28DCAB022B6325471354005A55D583F1D
43,798,513 UART: [art] SIG.S = C17E12EF2593AA132C342407F68F3D39E2D35A39EFEB53E3DDE741D4A1F8E2CB3ACFE0FD65DEAB4355BA270E6F3EFB73
44,777,419 UART: Caliptra RT
44,778,129 UART: [state] CFI Enabled
45,195,924 UART: [rt] RT listening for mailbox commands...
45,228,128 UART: [rt]cmd =0x41545348, len=116
45,230,751 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
192,479 UART:
192,835 UART: Running Caliptra ROM ...
193,949 UART:
603,706 UART: [state] CFI Enabled
620,667 UART: [state] LifecycleState = Unprovisioned
622,626 UART: [state] DebugLocked = No
624,995 UART: [state] WD Timer not started. Device not locked for debugging
628,233 UART: [kat] SHA2-256
807,901 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,706 UART: [kat] ++
819,157 UART: [kat] sha1
830,480 UART: [kat] SHA2-256
833,192 UART: [kat] SHA2-384
840,201 UART: [kat] SHA2-512-ACC
842,580 UART: [kat] ECC-384
3,285,567 UART: [kat] HMAC-384Kdf
3,298,297 UART: [kat] LMS
3,774,786 UART: [kat] --
3,780,496 UART: [cold-reset] ++
3,782,585 UART: [fht] FHT @ 0x50003400
3,794,598 UART: [idev] ++
3,795,182 UART: [idev] CDI.KEYID = 6
3,796,101 UART: [idev] SUBJECT.KEYID = 7
3,797,351 UART: [idev] UDS.KEYID = 0
3,798,282 ready_for_fw is high
3,798,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,368 UART: [idev] Erasing UDS.KEYID = 0
6,272,952 UART: [idev] Sha1 KeyId Algorithm
6,296,203 UART: [idev] --
6,301,117 UART: [ldev] ++
6,301,741 UART: [ldev] CDI.KEYID = 6
6,302,653 UART: [ldev] SUBJECT.KEYID = 5
6,303,873 UART: [ldev] AUTHORITY.KEYID = 7
6,305,108 UART: [ldev] FE.KEYID = 1
6,317,865 UART: [ldev] Erasing FE.KEYID = 1
8,792,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,443 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,432 UART: [ldev] --
10,584,403 UART: [fwproc] Wait for Commands...
10,586,065 UART: [fwproc] Recv command 0x46574c44
10,588,127 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,101 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,631 >>> mbox cmd response: success
14,558,132 UART: [afmc] ++
14,558,727 UART: [afmc] CDI.KEYID = 6
14,559,641 UART: [afmc] SUBJECT.KEYID = 7
14,560,859 UART: [afmc] AUTHORITY.KEYID = 5
17,065,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,005 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,471 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,353 UART: [afmc] --
18,863,515 UART: [cold-reset] --
18,866,907 UART: [state] Locking Datavault
18,873,511 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,266 UART: [state] Locking ICCM
18,877,660 UART: [exit] Launching FMC @ 0x40000130
18,886,060 UART:
18,886,309 UART: Running Caliptra FMC ...
18,887,415 UART:
18,887,585 UART: [state] CFI Enabled
18,895,917 UART: [fht] FMC Alias Private Key: 7
20,661,593 UART: [art] Extend RT PCRs Done
20,662,810 UART: [art] Lock RT PCRs Done
20,664,196 UART: [art] Populate DV Done
20,669,618 UART: [fht] FMC Alias Private Key: 7
20,671,226 UART: [art] Derive CDI
20,671,991 UART: [art] Store in slot 0x4
20,714,807 UART: [art] Derive Key Pair
20,715,829 UART: [art] Store priv key in slot 0x5
23,142,872 UART: [art] Derive Key Pair - Done
23,155,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,375 UART: [art] PUB.X = B149256AE6EF9008A77F6C41D29E361431D66C0EA37FA01B1DE4FC33DB425BC4BCECC9C55729C5684E7F1532B6D13B22
24,870,680 UART: [art] PUB.Y = 2FE064C27CF351617DA499A15FC473C87B19F36A3DFD46D6DC9F743456CEBAA12EA33E65BB97C3177BB784175B3C40F9
24,877,966 UART: [art] SIG.R = 539B2CC3CB6BF39658283401BE9B882A4AFF0A6ACF2F721AE2E841D2863E398C4CA0E8306F620153306896F5D3A0D45D
24,885,369 UART: [art] SIG.S = C7C91E0C01A3699DC94A650FF545246B96D9B043A987E363B142C90525B27B665DB65A3BCE3988399781719C38D0A35B
25,864,343 UART: Caliptra RT
25,865,049 UART: [state] CFI Enabled
25,998,854 UART: [rt] RT listening for mailbox commands...
26,001,257 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,524 UART: [rt]cmd =0x41544d4e, len=14344
30,152,487 >>> mbox cmd response data (8 bytes)
30,153,071 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,183,702 UART: [rt]cmd =0x41545348, len=116
30,185,851 >>> mbox cmd response data (12 bytes)
32,245,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,396,077 UART:
32,396,465 UART: Running Caliptra ROM ...
32,397,608 UART:
32,397,781 UART: [state] CFI Enabled
32,408,381 UART: [state] LifecycleState = Unprovisioned
32,410,331 UART: [state] DebugLocked = No
32,412,476 UART: [state] WD Timer not started. Device not locked for debugging
32,417,054 UART: [kat] SHA2-256
32,596,739 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,607,555 UART: [kat] ++
32,608,080 UART: [kat] sha1
32,618,653 UART: [kat] SHA2-256
32,621,357 UART: [kat] SHA2-384
32,627,566 UART: [kat] SHA2-512-ACC
32,629,921 UART: [kat] ECC-384
35,072,728 UART: [kat] HMAC-384Kdf
35,086,213 UART: [kat] LMS
35,562,698 UART: [kat] --
35,567,275 UART: [update-reset] ++
39,063,199 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,067,249 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,464,853 >>> mbox cmd response: success
39,465,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,466,662 UART: [update-reset] Copying MAN_2 To MAN_1
39,503,786 UART: [update-reset Success] --
39,508,231 UART: [state] Locking Datavault
39,511,932 UART: [state] Locking PCR0, PCR1 and PCR31
39,513,689 UART: [state] Locking ICCM
39,514,764 UART: [exit] Launching FMC @ 0x40000130
39,523,112 UART:
39,523,361 UART: Running Caliptra FMC ...
39,524,467 UART:
39,524,627 UART: [state] CFI Enabled
39,568,866 UART: [art] Extend RT PCRs Done
39,570,056 UART: [art] Lock RT PCRs Done
39,571,488 UART: [art] Populate DV Done
39,577,111 UART: [fht] FMC Alias Private Key: 7
39,578,753 UART: [art] Derive CDI
39,579,493 UART: [art] Store in slot 0x4
39,622,130 UART: [art] Derive Key Pair
39,623,170 UART: [art] Store priv key in slot 0x5
42,050,132 UART: [art] Derive Key Pair - Done
42,063,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,769,656 UART: [art] Erasing AUTHORITY.KEYID = 7
43,771,164 UART: [art] PUB.X = 1E9B998D570E325D652763E2DE2EFEF444C451DC42D5EE16433305ADD7343FBCA2028C145F58326C86912E575E42B22E
43,778,468 UART: [art] PUB.Y = 3C03231E70863225E375CAA4C14F0E3C5AE82E58592FD062C79A1438B8F4A75BC484BAA2EFA4DA75027539F3A9C597C1
43,785,734 UART: [art] SIG.R = 235A41C5E819F7FD7EA6D27E7F058F6335CAD7F8BE07FF7FC4A45812ED07B5432DBAEBA3A9C31E3D731F89F968A44D5A
43,793,142 UART: [art] SIG.S = E2A0A561DCEAB3CD51574238F12A570A95FFD68F3DC7B26481EA578AFB1263BFF1C1995D7AB009089405E367F6F186AB
44,771,985 UART: Caliptra RT
44,772,697 UART: [state] CFI Enabled
45,149,382 UART: [rt] RT listening for mailbox commands...
45,181,286 UART: [rt]cmd =0x41545348, len=116
45,183,421 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,780,624 ready_for_fw is high
3,781,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,675 >>> mbox cmd response: success
18,701,031 UART:
18,701,411 UART: Running Caliptra FMC ...
18,702,557 UART:
18,702,717 UART: [state] CFI Enabled
18,710,776 UART: [fht] FMC Alias Private Key: 7
20,477,347 UART: [art] Extend RT PCRs Done
20,478,567 UART: [art] Lock RT PCRs Done
20,480,152 UART: [art] Populate DV Done
20,485,772 UART: [fht] FMC Alias Private Key: 7
20,487,379 UART: [art] Derive CDI
20,488,150 UART: [art] Store in slot 0x4
20,530,918 UART: [art] Derive Key Pair
20,531,928 UART: [art] Store priv key in slot 0x5
22,958,635 UART: [art] Derive Key Pair - Done
22,971,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,605 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,110 UART: [art] PUB.X = 7509F4080089DFA5A985201EFEA3F710DACA1A50A1593EE8537F848AFF3B15C97C8E6DC07DA5F62F12FE1BDB1C6F5BA0
24,686,425 UART: [art] PUB.Y = FB30D1A02B3468D7788848F775707FE9E6FB5069231E88832FEBB8DBDDFF10AB63A5F08B9D296E9EDA9C4F6C698D0596
24,693,665 UART: [art] SIG.R = F773FF08A82908DA2148C52B6BAD86954C3E2E25116C92DBDD0C7D1042C45C2113F18B2437AD6BA5518435D53E2E2C2B
24,701,073 UART: [art] SIG.S = 82CAD4FBC54AA9A28DFE067D5E977D2EEEDC08AEF2C48B138255230F799CEB66C78138E8C28A3526CFE3CE346B84327D
25,680,476 UART: Caliptra RT
25,681,166 UART: [state] CFI Enabled
25,813,909 UART: [rt] RT listening for mailbox commands...
25,816,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,971,924 UART: [rt]cmd =0x41544d4e, len=14344
29,967,760 >>> mbox cmd response data (8 bytes)
29,968,442 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,998,873 UART: [rt]cmd =0x41545348, len=116
30,001,293 >>> mbox cmd response data (12 bytes)
32,058,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,287,646 >>> mbox cmd response: success
39,288,302 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,319,226 UART:
39,319,528 UART: Running Caliptra FMC ...
39,320,648 UART:
39,320,808 UART: [state] CFI Enabled
39,365,207 UART: [art] Extend RT PCRs Done
39,366,416 UART: [art] Lock RT PCRs Done
39,367,769 UART: [art] Populate DV Done
39,373,489 UART: [fht] FMC Alias Private Key: 7
39,375,051 UART: [art] Derive CDI
39,375,795 UART: [art] Store in slot 0x4
39,418,283 UART: [art] Derive Key Pair
39,419,287 UART: [art] Store priv key in slot 0x5
41,846,160 UART: [art] Derive Key Pair - Done
41,859,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,565,268 UART: [art] Erasing AUTHORITY.KEYID = 7
43,566,774 UART: [art] PUB.X = 20C269A54413AB254507C3DB2C836219BD417E71733A59B2190D5A16E32EF2EC003749B3495CEA7EC4675A78B103D48A
43,574,036 UART: [art] PUB.Y = 6A1F886DD4AD0297536954E1C5574FA6B22DEFBDAABE0A32B53E4596F2D7FF11E623AECB41C914D6A2BED688B5ABAC52
43,581,339 UART: [art] SIG.R = A263B8F96D3815B5C57A2519DC2124237F57824E7048E47FFEDE4A91E2927CD36ACA74C9F62F93A9B887AF10D0D0B4F0
43,588,690 UART: [art] SIG.S = 3B732E9BB900C6C8F1C8EAA3935AC9045B24E6D37ADEA31B46A4BA062F71144BB8A18DB6CB781A8398156667A292E973
44,567,249 UART: Caliptra RT
44,568,065 UART: [state] CFI Enabled
44,935,817 UART: [rt] RT listening for mailbox commands...
44,967,762 UART: [rt]cmd =0x41545348, len=116
44,970,406 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,275 UART:
192,634 UART: Running Caliptra ROM ...
193,834 UART:
193,989 UART: [state] CFI Enabled
263,665 UART: [state] LifecycleState = Unprovisioned
266,073 UART: [state] DebugLocked = No
267,820 UART: [state] WD Timer not started. Device not locked for debugging
272,566 UART: [kat] SHA2-256
462,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,199 UART: [kat] ++
473,678 UART: [kat] sha1
485,689 UART: [kat] SHA2-256
488,717 UART: [kat] SHA2-384
494,210 UART: [kat] SHA2-512-ACC
496,782 UART: [kat] ECC-384
2,947,194 UART: [kat] HMAC-384Kdf
2,972,060 UART: [kat] LMS
3,503,816 UART: [kat] --
3,509,230 UART: [cold-reset] ++
3,510,445 UART: [fht] FHT @ 0x50003400
3,521,873 UART: [idev] ++
3,522,580 UART: [idev] CDI.KEYID = 6
3,523,462 UART: [idev] SUBJECT.KEYID = 7
3,524,699 UART: [idev] UDS.KEYID = 0
3,525,622 ready_for_fw is high
3,525,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,061 UART: [idev] Erasing UDS.KEYID = 0
6,029,059 UART: [idev] Sha1 KeyId Algorithm
6,051,297 UART: [idev] --
6,056,645 UART: [ldev] ++
6,057,323 UART: [ldev] CDI.KEYID = 6
6,058,234 UART: [ldev] SUBJECT.KEYID = 5
6,059,388 UART: [ldev] AUTHORITY.KEYID = 7
6,060,881 UART: [ldev] FE.KEYID = 1
6,099,446 UART: [ldev] Erasing FE.KEYID = 1
8,606,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,209 UART: [ldev] --
10,411,932 UART: [fwproc] Wait for Commands...
10,413,861 UART: [fwproc] Recv command 0x46574c44
10,416,165 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,731 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,976 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,183 >>> mbox cmd response: success
14,677,474 UART: [afmc] ++
14,678,195 UART: [afmc] CDI.KEYID = 6
14,679,380 UART: [afmc] SUBJECT.KEYID = 7
14,680,815 UART: [afmc] AUTHORITY.KEYID = 5
17,219,356 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,099 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,708 UART: [afmc] --
19,034,450 UART: [cold-reset] --
19,039,203 UART: [state] Locking Datavault
19,045,821 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,970 UART: [state] Locking ICCM
19,049,585 UART: [exit] Launching FMC @ 0x40000130
19,058,264 UART:
19,058,498 UART: Running Caliptra FMC ...
19,059,600 UART:
19,059,756 UART: [state] CFI Enabled
19,118,479 UART: [fht] FMC Alias Private Key: 7
20,884,534 UART: [art] Extend RT PCRs Done
20,885,748 UART: [art] Lock RT PCRs Done
20,887,232 UART: [art] Populate DV Done
20,892,688 UART: [fht] FMC Alias Private Key: 7
20,894,328 UART: [art] Derive CDI
20,895,135 UART: [art] Store in slot 0x4
20,951,578 UART: [art] Derive Key Pair
20,952,648 UART: [art] Store priv key in slot 0x5
23,415,356 UART: [art] Derive Key Pair - Done
23,427,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,071 UART: [art] PUB.X = 52CB6428D20D150F96199D656ADE98B548320BD2F74766C50580CFFE2DA5769F55D9E07901F93C79FBA8C9EB5083936B
25,150,332 UART: [art] PUB.Y = 3F683ECC04DEAC6E9B1D22365088E68A76000762D205033832C654A851BEFA2D8F36F340534691F5F7866A735B453DE9
25,157,575 UART: [art] SIG.R = 80CADF5A99FE379A3F310F1EDA18186EB38136E158E5304A7F84D4ECA1BEC4671AD0A882652A7B284613619F640698A5
25,164,938 UART: [art] SIG.S = 1E0FA0B49D56B797831F80724C434B82A595BE8A70D8D0F098E27E85F8BC19C6A8581DDA4D9C4BA611D5776F5943584C
26,143,992 UART: Caliptra RT
26,144,704 UART: [state] CFI Enabled
26,324,670 UART: [rt] RT listening for mailbox commands...
26,327,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,482,333 UART: [rt]cmd =0x41544d4e, len=14344
30,478,522 >>> mbox cmd response data (8 bytes)
30,479,120 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,510,059 UART: [rt]cmd =0x41545348, len=116
30,512,391 >>> mbox cmd response data (12 bytes)
32,578,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,729,303 UART:
32,729,675 UART: Running Caliptra ROM ...
32,730,733 UART:
32,730,888 UART: [state] CFI Enabled
32,796,583 UART: [state] LifecycleState = Unprovisioned
32,798,694 UART: [state] DebugLocked = No
32,800,864 UART: [state] WD Timer not started. Device not locked for debugging
32,805,441 UART: [kat] SHA2-256
32,995,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,006,069 UART: [kat] ++
33,006,536 UART: [kat] sha1
33,017,802 UART: [kat] SHA2-256
33,020,775 UART: [kat] SHA2-384
33,026,050 UART: [kat] SHA2-512-ACC
33,028,631 UART: [kat] ECC-384
35,480,685 UART: [kat] HMAC-384Kdf
35,504,993 UART: [kat] LMS
36,036,531 UART: [kat] --
36,042,420 UART: [update-reset] ++
39,556,918 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,559,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,189,357 >>> mbox cmd response: success
40,193,972 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,194,561 UART: [update-reset] Copying MAN_2 To MAN_1
40,227,327 UART: [update-reset Success] --
40,231,249 UART: [state] Locking Datavault
40,235,004 UART: [state] Locking PCR0, PCR1 and PCR31
40,237,197 UART: [state] Locking ICCM
40,239,991 UART: [exit] Launching FMC @ 0x40000130
40,248,650 UART:
40,248,880 UART: Running Caliptra FMC ...
40,249,980 UART:
40,250,136 UART: [state] CFI Enabled
40,338,471 UART: [art] Extend RT PCRs Done
40,339,665 UART: [art] Lock RT PCRs Done
40,340,957 UART: [art] Populate DV Done
40,346,473 UART: [fht] FMC Alias Private Key: 7
40,348,197 UART: [art] Derive CDI
40,349,018 UART: [art] Store in slot 0x4
40,407,115 UART: [art] Derive Key Pair
40,408,158 UART: [art] Store priv key in slot 0x5
42,870,513 UART: [art] Derive Key Pair - Done
42,883,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,596,452 UART: [art] Erasing AUTHORITY.KEYID = 7
44,597,962 UART: [art] PUB.X = 0D37AF82E5E4A015A8B0C8F0CFEBA5848D1A7722A3C123A69952425C6D5F5862532B7E2CDCB510F61FCCD339770C1760
44,605,276 UART: [art] PUB.Y = 1F73E77A3AD2A1E040221C876DCFE4EE677D3291C7CCC53F0834B868BF4625FD2A99BE99A3DABF54BC47484B96AEA08B
44,612,507 UART: [art] SIG.R = 7C620EF9982A4DAAB5D1D32D0511EF41ED3182B1CFF1F07B07A55A2D9793AD4CF921C57BE5601A4FC618804E57AB4ACB
44,619,951 UART: [art] SIG.S = 72BBD74108614ECC24FCCB2DF1B6E00419A5EC27E6FB76996734E84150153BBA9B509D7D1D55D51B4D153DF6B6D4C2D2
45,598,866 UART: Caliptra RT
45,599,557 UART: [state] CFI Enabled
46,014,789 UART: [rt] RT listening for mailbox commands...
46,047,024 UART: [rt]cmd =0x41545348, len=116
46,049,321 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,438,854 ready_for_fw is high
3,439,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,322 >>> mbox cmd response: success
19,107,259 UART:
19,107,647 UART: Running Caliptra FMC ...
19,108,751 UART:
19,108,899 UART: [state] CFI Enabled
19,178,076 UART: [fht] FMC Alias Private Key: 7
20,944,197 UART: [art] Extend RT PCRs Done
20,945,427 UART: [art] Lock RT PCRs Done
20,947,126 UART: [art] Populate DV Done
20,952,541 UART: [fht] FMC Alias Private Key: 7
20,954,027 UART: [art] Derive CDI
20,954,846 UART: [art] Store in slot 0x4
21,010,386 UART: [art] Derive Key Pair
21,011,440 UART: [art] Store priv key in slot 0x5
23,475,422 UART: [art] Derive Key Pair - Done
23,488,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,070 UART: [art] PUB.X = EDDE3AB3820950C04252BC93AD7BFFA4143D18F62D2EDC8E6BAA485D3B89A87B781ABA3EFEB3897ABCDDE16954C316F1
25,210,410 UART: [art] PUB.Y = CC28AF614C942285690FDDAE9520F7F769602184D0877C215D31085AA847B3176D6BC53403C0494EA930F71F16C8CB90
25,217,649 UART: [art] SIG.R = 65DADE8C4596E5A71E654059FD71CA8F43F00C6CA66CF5D02F1DA295074E21D54BEF4DA78FD2C9E7E4EABC28DF6E115C
25,225,075 UART: [art] SIG.S = DEB05216B60B3FA4E7E4C0C75DB5D3DDE0EA3A5DE3E67AA8FFFD8923EF51BFCFD8C15995B729883458A5CC64D6439E23
26,204,330 UART: Caliptra RT
26,205,040 UART: [state] CFI Enabled
26,384,846 UART: [rt] RT listening for mailbox commands...
26,387,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,542,652 UART: [rt]cmd =0x41544d4e, len=14344
30,537,608 >>> mbox cmd response data (8 bytes)
30,538,188 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,568,865 UART: [rt]cmd =0x41545348, len=116
30,570,849 >>> mbox cmd response data (12 bytes)
32,635,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,546,424 >>> mbox cmd response: success
40,546,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,579,088 UART:
40,579,408 UART: Running Caliptra FMC ...
40,580,455 UART:
40,580,599 UART: [state] CFI Enabled
40,670,082 UART: [art] Extend RT PCRs Done
40,671,364 UART: [art] Lock RT PCRs Done
40,672,423 UART: [art] Populate DV Done
40,677,833 UART: [fht] FMC Alias Private Key: 7
40,679,369 UART: [art] Derive CDI
40,680,201 UART: [art] Store in slot 0x4
40,739,928 UART: [art] Derive Key Pair
40,741,101 UART: [art] Store priv key in slot 0x5
43,203,947 UART: [art] Derive Key Pair - Done
43,217,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,929,846 UART: [art] Erasing AUTHORITY.KEYID = 7
44,931,995 UART: [art] PUB.X = 11A885C389CCCE11968BE860A2A264E1BB46050E09A66EEB77161F65AF81B1E6AFFD7F36401DB813A77CA4EA6BF2B8AB
44,938,673 UART: [art] PUB.Y = 8625720252235CC5917CC0FA0D355F90E85718750BAF7BD85BE8F7EC0D8C66ED1117CFE0A5362C02295FBF7840D7BBB8
44,945,887 UART: [art] SIG.R = 4B27B895DE8A456E0A3E8C56D62FF7603EF9F3D2AA235F671260DD815DC7AB0FB9DA216DBD59B261A9DDA76B476B0F7D
44,953,334 UART: [art] SIG.S = 3ED0F7730EEC0BC27826527F0E6C873C997ED94D8B7A511884E8DDA058006ADC5422D9313B2D1DD3A717CC8F06BE26A9
45,932,456 UART: Caliptra RT
45,933,672 UART: [state] CFI Enabled
46,358,846 UART: [rt] RT listening for mailbox commands...
46,391,001 UART: [rt]cmd =0x41545348, len=116
46,393,424 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,364 UART:
192,744 UART: Running Caliptra ROM ...
193,896 UART:
603,347 UART: [state] CFI Enabled
615,477 UART: [state] LifecycleState = Unprovisioned
617,859 UART: [state] DebugLocked = No
620,173 UART: [state] WD Timer not started. Device not locked for debugging
623,944 UART: [kat] SHA2-256
813,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,624 UART: [kat] ++
825,148 UART: [kat] sha1
836,873 UART: [kat] SHA2-256
839,888 UART: [kat] SHA2-384
845,817 UART: [kat] SHA2-512-ACC
848,403 UART: [kat] ECC-384
3,291,047 UART: [kat] HMAC-384Kdf
3,304,640 UART: [kat] LMS
3,836,453 UART: [kat] --
3,840,537 UART: [cold-reset] ++
3,842,969 UART: [fht] FHT @ 0x50003400
3,855,202 UART: [idev] ++
3,855,952 UART: [idev] CDI.KEYID = 6
3,856,871 UART: [idev] SUBJECT.KEYID = 7
3,858,054 UART: [idev] UDS.KEYID = 0
3,859,045 ready_for_fw is high
3,859,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,965 UART: [idev] Erasing UDS.KEYID = 0
6,339,059 UART: [idev] Sha1 KeyId Algorithm
6,361,909 UART: [idev] --
6,367,098 UART: [ldev] ++
6,367,782 UART: [ldev] CDI.KEYID = 6
6,368,697 UART: [ldev] SUBJECT.KEYID = 5
6,369,913 UART: [ldev] AUTHORITY.KEYID = 7
6,371,095 UART: [ldev] FE.KEYID = 1
6,382,607 UART: [ldev] Erasing FE.KEYID = 1
8,856,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,872 UART: [ldev] --
10,648,956 UART: [fwproc] Wait for Commands...
10,651,952 UART: [fwproc] Recv command 0x46574c44
10,654,224 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,583 >>> mbox cmd response: success
14,921,383 UART: [afmc] ++
14,922,093 UART: [afmc] CDI.KEYID = 6
14,923,342 UART: [afmc] SUBJECT.KEYID = 7
14,924,788 UART: [afmc] AUTHORITY.KEYID = 5
17,427,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,811 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,007 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,937 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,231 UART: [afmc] --
19,223,162 UART: [cold-reset] --
19,226,012 UART: [state] Locking Datavault
19,231,228 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,397 UART: [state] Locking ICCM
19,235,773 UART: [exit] Launching FMC @ 0x40000130
19,244,409 UART:
19,244,646 UART: Running Caliptra FMC ...
19,245,746 UART:
19,245,907 UART: [state] CFI Enabled
19,253,758 UART: [fht] FMC Alias Private Key: 7
21,020,038 UART: [art] Extend RT PCRs Done
21,021,270 UART: [art] Lock RT PCRs Done
21,023,172 UART: [art] Populate DV Done
21,028,544 UART: [fht] FMC Alias Private Key: 7
21,030,201 UART: [art] Derive CDI
21,031,025 UART: [art] Store in slot 0x4
21,073,682 UART: [art] Derive Key Pair
21,074,728 UART: [art] Store priv key in slot 0x5
23,501,462 UART: [art] Derive Key Pair - Done
23,514,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,123 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,643 UART: [art] PUB.X = E83617619B8AF4513348F741893FCAA77809CAA6FEEC67EF1FDF9B3537929214EB6172972B85D955E53622174BDF40C1
25,229,928 UART: [art] PUB.Y = 8AA34D21E125741FC469630DF75C6F6AD748C51C1BC37F452ABE089AED34BB371DE04761963252AC5E46761913C25949
25,237,132 UART: [art] SIG.R = CC9EB37821C306A23227385B4DB2181421794D042E173BFE604BBBEA5366E18D660A967F66FB85EFADBB50DB2BE63B76
25,244,549 UART: [art] SIG.S = 1967493DC15D426AD8B4C5BE48C388CAF46181F64D6F234B9EA63B1D62CF9E12495F3E8222F75477863BBF408B0AD025
26,223,334 UART: Caliptra RT
26,224,045 UART: [state] CFI Enabled
26,357,650 UART: [rt] RT listening for mailbox commands...
26,360,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,544 UART: [rt]cmd =0x41544d4e, len=14344
30,511,174 >>> mbox cmd response data (8 bytes)
30,511,809 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,542,489 UART: [rt]cmd =0x41545348, len=116
30,544,747 >>> mbox cmd response data (12 bytes)
32,615,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,765,713 UART:
32,766,110 UART: Running Caliptra ROM ...
32,767,162 UART:
32,767,374 UART: [state] CFI Enabled
32,782,953 UART: [state] LifecycleState = Unprovisioned
32,784,857 UART: [state] DebugLocked = No
32,786,861 UART: [state] WD Timer not started. Device not locked for debugging
32,791,784 UART: [kat] SHA2-256
32,981,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,992,376 UART: [kat] ++
32,992,907 UART: [kat] sha1
33,005,144 UART: [kat] SHA2-256
33,008,174 UART: [kat] SHA2-384
33,014,013 UART: [kat] SHA2-512-ACC
33,016,598 UART: [kat] ECC-384
35,459,153 UART: [kat] HMAC-384Kdf
35,471,886 UART: [kat] LMS
36,003,508 UART: [kat] --
36,007,577 UART: [update-reset] ++
39,514,891 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,518,168 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,147,942 >>> mbox cmd response: success
40,153,301 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,154,031 UART: [update-reset] Copying MAN_2 To MAN_1
40,186,296 UART: [update-reset Success] --
40,190,426 UART: [state] Locking Datavault
40,193,861 UART: [state] Locking PCR0, PCR1 and PCR31
40,196,016 UART: [state] Locking ICCM
40,198,175 UART: [exit] Launching FMC @ 0x40000130
40,206,818 UART:
40,207,060 UART: Running Caliptra FMC ...
40,208,169 UART:
40,208,330 UART: [state] CFI Enabled
40,252,635 UART: [art] Extend RT PCRs Done
40,253,829 UART: [art] Lock RT PCRs Done
40,255,235 UART: [art] Populate DV Done
40,260,593 UART: [fht] FMC Alias Private Key: 7
40,262,075 UART: [art] Derive CDI
40,262,896 UART: [art] Store in slot 0x4
40,305,825 UART: [art] Derive Key Pair
40,306,829 UART: [art] Store priv key in slot 0x5
42,733,806 UART: [art] Derive Key Pair - Done
42,746,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,453,210 UART: [art] Erasing AUTHORITY.KEYID = 7
44,454,722 UART: [art] PUB.X = C39F9C517596409775AF03DB20D2F54279895ED76087AB95259E4281A17B5D9151274CFD1B6E0B05DA1C7CF471FF1AC4
44,462,026 UART: [art] PUB.Y = DE5EFEC7B1F62190F4D7B6D85613A3E8713B70FCB2500CAEA6C78A114C278FE55840204D6A17AFEEA4AFCD203F6E449E
44,469,287 UART: [art] SIG.R = 7794FD2B8EC8EAE825E7B0F833E80BACA845EA1533C29E125C959DF348FF33E2D3EDB3DC1AA41021CAC5B6943CA210EC
44,476,700 UART: [art] SIG.S = B6BCDCACEA893546A4A8CA1377D68005C2F0EB38D3D6A8A1A4A78ADB36F97E9D3B249026342568E6BA511414CB4F4BA6
45,455,856 UART: Caliptra RT
45,456,548 UART: [state] CFI Enabled
45,828,741 UART: [rt] RT listening for mailbox commands...
45,860,765 UART: [rt]cmd =0x41545348, len=116
45,863,171 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,754,867 ready_for_fw is high
3,755,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,531 >>> mbox cmd response: success
19,299,192 UART:
19,299,587 UART: Running Caliptra FMC ...
19,300,736 UART:
19,300,899 UART: [state] CFI Enabled
19,308,557 UART: [fht] FMC Alias Private Key: 7
21,074,197 UART: [art] Extend RT PCRs Done
21,075,427 UART: [art] Lock RT PCRs Done
21,077,358 UART: [art] Populate DV Done
21,082,507 UART: [fht] FMC Alias Private Key: 7
21,084,029 UART: [art] Derive CDI
21,084,782 UART: [art] Store in slot 0x4
21,127,605 UART: [art] Derive Key Pair
21,128,645 UART: [art] Store priv key in slot 0x5
23,555,260 UART: [art] Derive Key Pair - Done
23,568,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,483 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,965 UART: [art] PUB.X = 2CD46E11EC2B7615BFFE85FDC833B326F04BEAF7FBC09344AE57261760EF9E8A2939115DE3C031EAB22068850531AAEA
25,283,284 UART: [art] PUB.Y = F79CC89A3350CEF89C2495A897379435A67FAAEF3744847604BC903CA8091D4A36AF8894FA215FFA8F83B06DFB575F86
25,290,518 UART: [art] SIG.R = 213C648E9983BF486DAC180298CBD23A6ECB1A4C6DAC9E20C2E7F6D096F41CD653FE10342B1D14D0A2A819853D929A73
25,297,947 UART: [art] SIG.S = 98B6F693D19AC4942D9A7E558944DA1E3F7151F4AD602420A2D94EC95152EDC9F183978A264952C790FEA2FA0AEB9940
26,277,337 UART: Caliptra RT
26,278,062 UART: [state] CFI Enabled
26,411,756 UART: [rt] RT listening for mailbox commands...
26,414,147 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,569,610 UART: [rt]cmd =0x41544d4e, len=14344
30,565,202 >>> mbox cmd response data (8 bytes)
30,565,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,596,475 UART: [rt]cmd =0x41545348, len=116
30,598,681 >>> mbox cmd response data (12 bytes)
32,668,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,496,310 >>> mbox cmd response: success
40,496,884 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,531,897 UART:
40,532,180 UART: Running Caliptra FMC ...
40,533,307 UART:
40,533,488 UART: [state] CFI Enabled
40,577,224 UART: [art] Extend RT PCRs Done
40,578,501 UART: [art] Lock RT PCRs Done
40,579,881 UART: [art] Populate DV Done
40,585,198 UART: [fht] FMC Alias Private Key: 7
40,586,845 UART: [art] Derive CDI
40,587,586 UART: [art] Store in slot 0x4
40,630,297 UART: [art] Derive Key Pair
40,631,349 UART: [art] Store priv key in slot 0x5
43,057,995 UART: [art] Derive Key Pair - Done
43,070,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,777,802 UART: [art] Erasing AUTHORITY.KEYID = 7
44,779,317 UART: [art] PUB.X = 2905E0F50023245EAEE600AC11B83D2E4E520697B47356A30F02B28F69201D22510E419FDE2FA57DDD94EEBECEC84721
44,786,531 UART: [art] PUB.Y = 8E9351939FAB06B1FE625F8BED695D7C94B2E3B8B9861B72776317FB1EA3D0F50767E26648245177C3B53FFF65CB3676
44,793,824 UART: [art] SIG.R = D34AA61E578608A3F7C82D2B6BD26653991712427D6658B92F0BFE72661955A2D91E7F6D294A88024F1E24E9125922CA
44,801,200 UART: [art] SIG.S = 6F0F43C49FA2EF9628720F9836459E4BE4A0D8AB9A18C6EBBFC66BF5BCB754CD31982664336E5EDF2403C0AF2EA7EEE0
45,779,907 UART: Caliptra RT
45,780,630 UART: [state] CFI Enabled
46,151,031 UART: [rt] RT listening for mailbox commands...
46,182,833 UART: [rt]cmd =0x41545348, len=116
46,185,187 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,529 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,585 UART: [kat] SHA2-256
892,523 UART: [kat] SHA2-384
895,260 UART: [kat] SHA2-512-ACC
897,161 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,632 UART: [kat] LMS
1,475,828 UART: [kat] --
1,476,749 UART: [cold-reset] ++
1,477,127 UART: [fht] Storing FHT @ 0x50003400
1,479,914 UART: [idev] ++
1,480,082 UART: [idev] CDI.KEYID = 6
1,480,442 UART: [idev] SUBJECT.KEYID = 7
1,480,866 UART: [idev] UDS.KEYID = 0
1,481,211 ready_for_fw is high
1,481,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,050 UART: [idev] Erasing UDS.KEYID = 0
1,505,558 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,250 UART: [idev] --
1,515,325 UART: [ldev] ++
1,515,493 UART: [ldev] CDI.KEYID = 6
1,515,856 UART: [ldev] SUBJECT.KEYID = 5
1,516,282 UART: [ldev] AUTHORITY.KEYID = 7
1,516,745 UART: [ldev] FE.KEYID = 1
1,521,643 UART: [ldev] Erasing FE.KEYID = 1
1,547,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,788 UART: [ldev] --
1,586,183 UART: [fwproc] Waiting for Commands...
1,586,874 UART: [fwproc] Received command 0x46574c44
1,587,665 UART: [fwproc] Received Image of size 118548 bytes
2,932,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,057 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,275 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,676 >>> mbox cmd response: success
3,132,932 UART: [afmc] ++
3,133,100 UART: [afmc] CDI.KEYID = 6
3,133,462 UART: [afmc] SUBJECT.KEYID = 7
3,133,887 UART: [afmc] AUTHORITY.KEYID = 5
3,168,434 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,612 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,204 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,887 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,785 UART: [afmc] --
3,211,763 UART: [cold-reset] --
3,212,533 UART: [state] Locking Datavault
3,213,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,458 UART: [state] Locking ICCM
3,214,976 UART: [exit] Launching FMC @ 0x40000130
3,220,306 UART:
3,220,322 UART: Running Caliptra FMC ...
3,220,730 UART:
3,220,784 UART: [state] CFI Enabled
3,231,436 UART: [fht] FMC Alias Private Key: 7
3,350,406 UART: [art] Extend RT PCRs Done
3,350,834 UART: [art] Lock RT PCRs Done
3,352,042 UART: [art] Populate DV Done
3,360,343 UART: [fht] FMC Alias Private Key: 7
3,361,487 UART: [art] Derive CDI
3,361,767 UART: [art] Store in slot 0x4
3,447,547 UART: [art] Derive Key Pair
3,447,907 UART: [art] Store priv key in slot 0x5
3,461,992 UART: [art] Derive Key Pair - Done
3,476,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,546 UART: [art] PUB.X = 0425F5CFD79824CF0D076D43669A928E2DE880D9A0D53360A95D20400C1FA967DD8EA0F796F2E8C5C27C2BF2D548091D
3,499,307 UART: [art] PUB.Y = 815C17A8941DFB5F57911D49F1E3378F026011F1493A4665C44419A8E1AF5368F2B14C8DDD50F0F506706B479A45172D
3,506,245 UART: [art] SIG.R = BAF200AA898EAD7A4337E1C6174E420693B98052667A83AA5C26C8201CED642C017F783B7722899A46DCF82A24F3E3F4
3,512,989 UART: [art] SIG.S = 75F4012147B3C2A05CFE9A167EE2D5459D5D11705323D1226EFB041D82396D4357EBFF28A4A9DC4A95CCAE99DEBB905F
3,537,227 UART: Caliptra RT
3,537,478 UART: [state] CFI Enabled
3,656,986 UART: [rt] RT listening for mailbox commands...
3,657,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,946 UART: [rt]cmd =0x41544d4e, len=14344
4,090,788 >>> mbox cmd response data (8 bytes)
4,090,789 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,726 UART: [rt]cmd =0x41545348, len=116
4,122,441 >>> mbox cmd response data (12 bytes)
4,122,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,128 UART:
4,123,144 UART: Running Caliptra ROM ...
4,123,552 UART:
4,123,606 UART: [state] CFI Enabled
4,126,054 UART: [state] LifecycleState = Unprovisioned
4,126,709 UART: [state] DebugLocked = No
4,127,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,129,068 UART: [kat] SHA2-256
4,922,999 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,927,114 UART: [kat] ++
4,927,266 UART: [kat] sha1
4,931,372 UART: [kat] SHA2-256
4,933,310 UART: [kat] SHA2-384
4,936,227 UART: [kat] SHA2-512-ACC
4,938,127 UART: [kat] ECC-384
4,943,788 UART: [kat] HMAC-384Kdf
4,948,366 UART: [kat] LMS
5,516,562 UART: [kat] --
5,517,497 UART: [update-reset] ++
6,898,105 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,899,327 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,054,594 >>> mbox cmd response: success
7,054,594 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,054,777 UART: [update-reset] Copying MAN_2 To MAN_1
7,062,791 UART: [update-reset Success] --
7,063,880 UART: [state] Locking Datavault
7,064,620 UART: [state] Locking PCR0, PCR1 and PCR31
7,065,224 UART: [state] Locking ICCM
7,065,684 UART: [exit] Launching FMC @ 0x40000130
7,071,014 UART:
7,071,030 UART: Running Caliptra FMC ...
7,071,438 UART:
7,071,492 UART: [state] CFI Enabled
7,160,553 UART: [art] Extend RT PCRs Done
7,160,981 UART: [art] Lock RT PCRs Done
7,162,314 UART: [art] Populate DV Done
7,170,475 UART: [fht] FMC Alias Private Key: 7
7,171,605 UART: [art] Derive CDI
7,171,885 UART: [art] Store in slot 0x4
7,258,071 UART: [art] Derive Key Pair
7,258,431 UART: [art] Store priv key in slot 0x5
7,270,674 UART: [art] Derive Key Pair - Done
7,285,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,300,582 UART: [art] Erasing AUTHORITY.KEYID = 7
7,301,347 UART: [art] PUB.X = CD4E11F414B9C377CFBAD1D8F1DD2076DAD5E1154064F5CE23F455D29F2D3379F91E2277751AD5B1E7FFA01C59004692
7,308,105 UART: [art] PUB.Y = 544C98FE7DFAB31E489431D95BA05244B5D31E7C4ED261761D86C97518621DADF4666F5CD047AB581F3BE7E9BF79049D
7,315,060 UART: [art] SIG.R = 67982441C1371B98F3C171253A640F739E85785BF47EC6D59C98A30233246952CB57E43575E17E918844CD5C1BD761F6
7,321,812 UART: [art] SIG.S = 57E71AFCF926A6FA047156D0750390DF1ED91FF9745F1202A234AEB8AD5FF342A640C272CEDECF893A2E95E22E2FCD5C
7,345,455 UART: Caliptra RT
7,345,706 UART: [state] CFI Enabled
7,707,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,738,319 UART: [rt]cmd =0x41545348, len=116
7,740,260 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,897 ready_for_fw is high
1,362,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,662 >>> mbox cmd response: success
3,043,029 UART:
3,043,045 UART: Running Caliptra FMC ...
3,043,453 UART:
3,043,507 UART: [state] CFI Enabled
3,053,941 UART: [fht] FMC Alias Private Key: 7
3,173,071 UART: [art] Extend RT PCRs Done
3,173,499 UART: [art] Lock RT PCRs Done
3,174,949 UART: [art] Populate DV Done
3,183,354 UART: [fht] FMC Alias Private Key: 7
3,184,412 UART: [art] Derive CDI
3,184,692 UART: [art] Store in slot 0x4
3,270,062 UART: [art] Derive Key Pair
3,270,422 UART: [art] Store priv key in slot 0x5
3,282,929 UART: [art] Derive Key Pair - Done
3,297,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,844 UART: [art] PUB.X = 61D1A2E3FD3F2201F89A09C56F35BD9C215AE4E689D406E1D91CEBE0B9FEBB638783C569B4177AE37571A09BDA65F387
3,320,617 UART: [art] PUB.Y = 1DDC20062072B77B1EED7AA42716845C1358D4BC6A9BC97D8C7007BC54C084F2162C42E7AF6B0C21129DB7845A3D0D45
3,327,561 UART: [art] SIG.R = 391F148C1AC37785462FE538ED7198BF60B7BBAFC371FF48DECB1242707D323ECD8E40D496AE3A491BED4F8FF6A7D215
3,334,347 UART: [art] SIG.S = AF3B6558B187123AC380C5EFC7EFEEE821645B5EB983F7E5031D71F1B5BCB3F079ABBEEEA93CAB357500A70FFF7E0F6A
3,357,934 UART: Caliptra RT
3,358,185 UART: [state] CFI Enabled
3,478,171 UART: [rt] RT listening for mailbox commands...
3,478,841 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,857 UART: [rt]cmd =0x41544d4e, len=14344
3,911,973 >>> mbox cmd response data (8 bytes)
3,911,974 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,813 UART: [rt]cmd =0x41545348, len=116
3,943,572 >>> mbox cmd response data (12 bytes)
3,943,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,757,653 >>> mbox cmd response: success
6,757,653 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,770,705 UART:
6,770,721 UART: Running Caliptra FMC ...
6,771,129 UART:
6,771,183 UART: [state] CFI Enabled
6,859,912 UART: [art] Extend RT PCRs Done
6,860,340 UART: [art] Lock RT PCRs Done
6,861,547 UART: [art] Populate DV Done
6,870,104 UART: [fht] FMC Alias Private Key: 7
6,871,104 UART: [art] Derive CDI
6,871,384 UART: [art] Store in slot 0x4
6,957,300 UART: [art] Derive Key Pair
6,957,660 UART: [art] Store priv key in slot 0x5
6,970,607 UART: [art] Derive Key Pair - Done
6,985,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,001,512 UART: [art] Erasing AUTHORITY.KEYID = 7
7,002,277 UART: [art] PUB.X = 76852C9500FFA7AC817976F5D46006D5BE3C90EBDD5FAC714B6822C901C2D682268736FF20F999852F2C3CC597BD9689
7,009,021 UART: [art] PUB.Y = 0F385AED3DC6E4C292202CD62827C952B102D2D398F5AC0ED71B2ABE74649506DBC8B2990B674C77B5CE5C3C4CC96D9F
7,015,970 UART: [art] SIG.R = D3E9CA97B644670CCF40E5551B74F0272883D3258391B95514CEC3796094B75914976F4A646C11217082D97072653F6B
7,022,721 UART: [art] SIG.S = C571C5E326A494F24025A42952DAD95E79A91170F8A0C7E7F7DB4EEC6C50AA17F5C886FE2AA8C03799F4542C95297AED
7,046,389 UART: Caliptra RT
7,046,640 UART: [state] CFI Enabled
7,412,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,443,095 UART: [rt]cmd =0x41545348, len=116
7,445,020 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
895,069 UART: [kat] SHA2-512-ACC
896,970 UART: [kat] ECC-384
902,235 UART: [kat] HMAC-384Kdf
906,781 UART: [kat] LMS
1,474,977 UART: [kat] --
1,475,760 UART: [cold-reset] ++
1,476,102 UART: [fht] Storing FHT @ 0x50003400
1,479,027 UART: [idev] ++
1,479,195 UART: [idev] CDI.KEYID = 6
1,479,555 UART: [idev] SUBJECT.KEYID = 7
1,479,979 UART: [idev] UDS.KEYID = 0
1,480,324 ready_for_fw is high
1,480,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,099 UART: [idev] Erasing UDS.KEYID = 0
1,504,513 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,121 UART: [idev] --
1,514,118 UART: [ldev] ++
1,514,286 UART: [ldev] CDI.KEYID = 6
1,514,649 UART: [ldev] SUBJECT.KEYID = 5
1,515,075 UART: [ldev] AUTHORITY.KEYID = 7
1,515,538 UART: [ldev] FE.KEYID = 1
1,520,864 UART: [ldev] Erasing FE.KEYID = 1
1,546,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,153 UART: [ldev] --
1,585,480 UART: [fwproc] Waiting for Commands...
1,586,101 UART: [fwproc] Received command 0x46574c44
1,586,892 UART: [fwproc] Received Image of size 118548 bytes
2,932,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,512 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,937 >>> mbox cmd response: success
3,131,973 UART: [afmc] ++
3,132,141 UART: [afmc] CDI.KEYID = 6
3,132,503 UART: [afmc] SUBJECT.KEYID = 7
3,132,928 UART: [afmc] AUTHORITY.KEYID = 5
3,168,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,787 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,159 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,842 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,818 UART: [afmc] --
3,211,874 UART: [cold-reset] --
3,212,890 UART: [state] Locking Datavault
3,213,943 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,547 UART: [state] Locking ICCM
3,215,159 UART: [exit] Launching FMC @ 0x40000130
3,220,489 UART:
3,220,505 UART: Running Caliptra FMC ...
3,220,913 UART:
3,221,056 UART: [state] CFI Enabled
3,231,606 UART: [fht] FMC Alias Private Key: 7
3,350,814 UART: [art] Extend RT PCRs Done
3,351,242 UART: [art] Lock RT PCRs Done
3,352,572 UART: [art] Populate DV Done
3,360,935 UART: [fht] FMC Alias Private Key: 7
3,361,979 UART: [art] Derive CDI
3,362,259 UART: [art] Store in slot 0x4
3,448,133 UART: [art] Derive Key Pair
3,448,493 UART: [art] Store priv key in slot 0x5
3,462,170 UART: [art] Derive Key Pair - Done
3,476,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,491 UART: [art] PUB.X = 9A2ABAE3EA9B5B490BF48397B859962AC02742426F37C606FA3368973E8B5807D95965E8D0C4A8C0D16D7735DB8908A9
3,500,249 UART: [art] PUB.Y = 55AAF5B05BE13B64B8FBD4A413164CF0B59B92026C22487AEFEFD39F91FD5118EAD9D77590EB530D4816F5AA551176E1
3,507,205 UART: [art] SIG.R = 04D357C367215BF1D6559F9A6CD4484B6B50EDAE006E344ADFEC1E44ECB6CA29BAAC67984A1B5B817AFE8DC51E036034
3,513,965 UART: [art] SIG.S = 5D29CBDE327F7049589DAB30E3553893F522F0F7CB6BBD30612C84017D802EE962E9A1561BE74CA7A4BA68B78B4C2D2D
3,537,316 UART: Caliptra RT
3,537,659 UART: [state] CFI Enabled
3,658,010 UART: [rt] RT listening for mailbox commands...
3,658,680 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,622 UART: [rt]cmd =0x41544d4e, len=14344
4,091,268 >>> mbox cmd response data (8 bytes)
4,091,269 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,522 UART: [rt]cmd =0x41545348, len=116
4,123,433 >>> mbox cmd response data (12 bytes)
4,123,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,246 UART:
4,124,262 UART: Running Caliptra ROM ...
4,124,670 UART:
4,124,811 UART: [state] CFI Enabled
4,127,645 UART: [state] LifecycleState = Unprovisioned
4,128,300 UART: [state] DebugLocked = No
4,128,956 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,130,429 UART: [kat] SHA2-256
4,924,360 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,928,475 UART: [kat] ++
4,928,627 UART: [kat] sha1
4,933,039 UART: [kat] SHA2-256
4,934,977 UART: [kat] SHA2-384
4,937,662 UART: [kat] SHA2-512-ACC
4,939,562 UART: [kat] ECC-384
4,944,983 UART: [kat] HMAC-384Kdf
4,949,719 UART: [kat] LMS
5,517,915 UART: [kat] --
5,518,958 UART: [update-reset] ++
6,899,948 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,901,238 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,056,505 >>> mbox cmd response: success
7,056,505 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,056,840 UART: [update-reset] Copying MAN_2 To MAN_1
7,064,854 UART: [update-reset Success] --
7,065,917 UART: [state] Locking Datavault
7,066,711 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,315 UART: [state] Locking ICCM
7,067,813 UART: [exit] Launching FMC @ 0x40000130
7,073,143 UART:
7,073,159 UART: Running Caliptra FMC ...
7,073,567 UART:
7,073,710 UART: [state] CFI Enabled
7,162,719 UART: [art] Extend RT PCRs Done
7,163,147 UART: [art] Lock RT PCRs Done
7,164,278 UART: [art] Populate DV Done
7,172,409 UART: [fht] FMC Alias Private Key: 7
7,173,469 UART: [art] Derive CDI
7,173,749 UART: [art] Store in slot 0x4
7,259,361 UART: [art] Derive Key Pair
7,259,721 UART: [art] Store priv key in slot 0x5
7,273,464 UART: [art] Derive Key Pair - Done
7,287,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,303,573 UART: [art] Erasing AUTHORITY.KEYID = 7
7,304,338 UART: [art] PUB.X = 374BAC2A6564F868C228A11ED717E2CB89B39FCFBC1F0786597104E056A24C09718A786DA32D8C080F8B6FE549E5B8F9
7,311,099 UART: [art] PUB.Y = DA4E32997FA8BA9D972EE536A4E2A3E6A5D6EF7335939A26E31CED840BCDD903EFCF5FB25CB6BEA8902EF3068EB12F4B
7,318,066 UART: [art] SIG.R = 91E6F0B5FB64DE8D4B4428F6D18A66BB6D20CFFFD5780F837B20AA4FD61C64ACCA796B5E27540EA92AC66A3A017D2AD3
7,324,849 UART: [art] SIG.S = E23484860E825C9BD8922D281F3C8EE5BBB654CDE4781CE00F8DB8B84CABC4A13CB866DE66D9E4C99EFE87F1087C4F4B
7,348,632 UART: Caliptra RT
7,348,975 UART: [state] CFI Enabled
7,712,319 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,743,320 UART: [rt]cmd =0x41545348, len=116
7,744,981 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,546 ready_for_fw is high
1,363,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,951 >>> mbox cmd response: success
3,045,570 UART:
3,045,586 UART: Running Caliptra FMC ...
3,045,994 UART:
3,046,137 UART: [state] CFI Enabled
3,056,885 UART: [fht] FMC Alias Private Key: 7
3,175,609 UART: [art] Extend RT PCRs Done
3,176,037 UART: [art] Lock RT PCRs Done
3,177,541 UART: [art] Populate DV Done
3,185,612 UART: [fht] FMC Alias Private Key: 7
3,186,636 UART: [art] Derive CDI
3,186,916 UART: [art] Store in slot 0x4
3,272,548 UART: [art] Derive Key Pair
3,272,908 UART: [art] Store priv key in slot 0x5
3,286,739 UART: [art] Derive Key Pair - Done
3,301,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,995 UART: [art] PUB.X = 8AB4FA8C92FAA7912D3E9050B9D4F000003DD81D9FD29E99284F38918E363BBE0A52FE0A9BFA2ECAAB83C1CF2B7740E3
3,324,735 UART: [art] PUB.Y = 0CC31AF9FA3AA6C8EF279CCC7970B8D3459BDC825D3F2E442D5AE8BDF3DEC756B5062BB40D2CB2D177B1C21BABBBF87D
3,331,708 UART: [art] SIG.R = FB2C149E7F50F0D7AA97385EDA2BBC4B4D6343DE971ED1B5E1668A7265E6B8042C0190559D596FFEE1895CAA2EB3D062
3,338,486 UART: [art] SIG.S = 6A1411B40AF25695F88760B14CD9C18F349BD9DA56FF4FF54457C3331E27937D05D695F28053812862782F27BA95E974
3,361,718 UART: Caliptra RT
3,362,061 UART: [state] CFI Enabled
3,482,581 UART: [rt] RT listening for mailbox commands...
3,483,251 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,377 UART: [rt]cmd =0x41544d4e, len=14344
3,915,541 >>> mbox cmd response data (8 bytes)
3,915,542 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,685 UART: [rt]cmd =0x41545348, len=116
3,947,310 >>> mbox cmd response data (12 bytes)
3,947,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,761,996 >>> mbox cmd response: success
6,761,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,775,614 UART:
6,775,630 UART: Running Caliptra FMC ...
6,776,038 UART:
6,776,181 UART: [state] CFI Enabled
6,865,342 UART: [art] Extend RT PCRs Done
6,865,770 UART: [art] Lock RT PCRs Done
6,866,847 UART: [art] Populate DV Done
6,875,264 UART: [fht] FMC Alias Private Key: 7
6,876,382 UART: [art] Derive CDI
6,876,662 UART: [art] Store in slot 0x4
6,962,660 UART: [art] Derive Key Pair
6,963,020 UART: [art] Store priv key in slot 0x5
6,976,315 UART: [art] Derive Key Pair - Done
6,990,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,005,844 UART: [art] Erasing AUTHORITY.KEYID = 7
7,006,609 UART: [art] PUB.X = CFA81C58A248EB35DFC58E2D099E51F6E159C0396295A47ECC20896AD1D8B475BA37F5994D0B24B6A6B06B1222D951B9
7,013,381 UART: [art] PUB.Y = FF62D4E1314AE2CB2746B8A9557A0E00D896B34CDAAFE1C232E28CCAA006137581DA61768036E20E3F7D316EB8331D35
7,020,308 UART: [art] SIG.R = 387C3FC70A134AA46CC41450E6B98AFCA9F7C9EB35C7A2D67B4B19648C3DAEC440351D715023420F550D67CF7C1279B1
7,027,077 UART: [art] SIG.S = CAE4810719FA54F246E5256F4A0162DD5C3A2AFDF85141B254C65DF45764CF6ED97A1C619D6B7A62AEAF019F177E2A2B
7,051,400 UART: Caliptra RT
7,051,743 UART: [state] CFI Enabled
7,419,584 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,450,627 UART: [rt]cmd =0x41545348, len=116
7,452,666 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,509 UART: [state] WD Timer not started. Device not locked for debugging
87,836 UART: [kat] SHA2-256
891,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,490 UART: [kat] ++
895,642 UART: [kat] sha1
899,776 UART: [kat] SHA2-256
901,716 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,779 UART: [kat] HMAC-384Kdf
920,225 UART: [kat] LMS
1,168,537 UART: [kat] --
1,169,348 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,546 UART: [idev] ++
1,172,714 UART: [idev] CDI.KEYID = 6
1,173,075 UART: [idev] SUBJECT.KEYID = 7
1,173,500 UART: [idev] UDS.KEYID = 0
1,173,846 ready_for_fw is high
1,173,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,181 UART: [idev] Erasing UDS.KEYID = 0
1,198,413 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,214,740 UART: [ldev] Erasing FE.KEYID = 1
1,240,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,452 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,574 UART: [ldev] --
1,279,847 UART: [fwproc] Wait for Commands...
1,280,584 UART: [fwproc] Recv command 0x46574c44
1,281,317 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,923 >>> mbox cmd response: success
2,824,163 UART: [afmc] ++
2,824,331 UART: [afmc] CDI.KEYID = 6
2,824,694 UART: [afmc] SUBJECT.KEYID = 7
2,825,120 UART: [afmc] AUTHORITY.KEYID = 5
2,860,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,493 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,084 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,894,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,662 UART: [afmc] --
2,903,557 UART: [cold-reset] --
2,904,211 UART: [state] Locking Datavault
2,905,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,905,908 UART: [state] Locking ICCM
2,906,352 UART: [exit] Launching FMC @ 0x40000130
2,911,682 UART:
2,911,698 UART: Running Caliptra FMC ...
2,912,106 UART:
2,912,160 UART: [state] CFI Enabled
2,922,554 UART: [fht] FMC Alias Private Key: 7
3,041,766 UART: [art] Extend RT PCRs Done
3,042,194 UART: [art] Lock RT PCRs Done
3,043,658 UART: [art] Populate DV Done
3,051,939 UART: [fht] FMC Alias Private Key: 7
3,052,895 UART: [art] Derive CDI
3,053,175 UART: [art] Store in slot 0x4
3,139,010 UART: [art] Derive Key Pair
3,139,370 UART: [art] Store priv key in slot 0x5
3,152,328 UART: [art] Derive Key Pair - Done
3,167,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,360 UART: [art] PUB.X = DDBD5E9DE4991653D9E453641EC3947DB3AE9D3818EF2EB3C523EE864CA9C0B431D86F48E48A239C6E6E32932617E486
3,190,138 UART: [art] PUB.Y = 699C2708354CDAF55A4715448DD3D92070C68E4082E908D1BD15535D36A3435ACC4AC80243C4D45EC4C71F4FD00F83FE
3,197,080 UART: [art] SIG.R = BDEEE9B733AE7B6AF1C7A2B1EB928B52B0F04394C80240145D19BDC8E41C96C485E1CE7ABD7721326E238B77EC44464F
3,203,861 UART: [art] SIG.S = A9A8B7982E9044179CDCED0E3151D3F4B98C3AAA83CC6B3FC971DC5503051648BEC123CBD4F43CC36F5B9167443446CC
3,227,892 UART: Caliptra RT
3,228,143 UART: [state] CFI Enabled
3,348,627 UART: [rt] RT listening for mailbox commands...
3,349,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,389 UART: [rt]cmd =0x41544d4e, len=14344
3,782,767 >>> mbox cmd response data (8 bytes)
3,782,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,031 UART: [rt]cmd =0x41545348, len=116
3,814,760 >>> mbox cmd response data (12 bytes)
3,814,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,522 UART:
3,815,538 UART: Running Caliptra ROM ...
3,815,946 UART:
3,816,001 UART: [state] CFI Enabled
3,819,117 UART: [state] LifecycleState = Unprovisioned
3,819,772 UART: [state] DebugLocked = No
3,820,466 UART: [state] WD Timer not started. Device not locked for debugging
3,821,784 UART: [kat] SHA2-256
4,625,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,629,438 UART: [kat] ++
4,629,590 UART: [kat] sha1
4,633,784 UART: [kat] SHA2-256
4,635,724 UART: [kat] SHA2-384
4,638,645 UART: [kat] SHA2-512-ACC
4,640,545 UART: [kat] ECC-384
4,650,014 UART: [kat] HMAC-384Kdf
4,654,624 UART: [kat] LMS
4,902,936 UART: [kat] --
4,903,904 UART: [update-reset] ++
6,263,541 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,264,720 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,419,935 >>> mbox cmd response: success
6,419,935 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,420,232 UART: [update-reset] Copying MAN_2 To MAN_1
6,428,246 UART: [update-reset Success] --
6,429,247 UART: [state] Locking Datavault
6,430,231 UART: [state] Locking PCR0, PCR1 and PCR31
6,430,835 UART: [state] Locking ICCM
6,431,315 UART: [exit] Launching FMC @ 0x40000130
6,436,645 UART:
6,436,661 UART: Running Caliptra FMC ...
6,437,069 UART:
6,437,123 UART: [state] CFI Enabled
6,526,060 UART: [art] Extend RT PCRs Done
6,526,488 UART: [art] Lock RT PCRs Done
6,527,733 UART: [art] Populate DV Done
6,536,058 UART: [fht] FMC Alias Private Key: 7
6,537,028 UART: [art] Derive CDI
6,537,308 UART: [art] Store in slot 0x4
6,623,145 UART: [art] Derive Key Pair
6,623,505 UART: [art] Store priv key in slot 0x5
6,636,619 UART: [art] Derive Key Pair - Done
6,651,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,667,087 UART: [art] Erasing AUTHORITY.KEYID = 7
6,667,852 UART: [art] PUB.X = AFE3995A16E4B69ADBC5C61DFE92E7B3E7440EF2BB9623CFEE23EE5F43DF28F7C8AB07647FB3E45378666FB32CDD572C
6,674,640 UART: [art] PUB.Y = 2754A14D9DDB661B34BD8DD5CBF69F76D722312A8ED9ABD0C35BB618710976E3C1BD842760B8E89700A89A78A19D1D6D
6,681,575 UART: [art] SIG.R = D17BB7222F573159BC7C0D35E2204E5E46E7767C8CA37CC70A94E4D865C824BA69F5108CB52E8F88D5459A5247FA1767
6,688,341 UART: [art] SIG.S = BA861035EE424EF74B783D4F724B7135B2E3CB6653674DAF7AD6A1EB0936D29D0FB68715D7903BCE0CCA1E9A47141821
6,711,584 UART: Caliptra RT
6,711,835 UART: [state] CFI Enabled
7,081,160 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,112,199 UART: [rt]cmd =0x41545348, len=116
7,113,992 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,754 ready_for_fw is high
1,058,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,396 >>> mbox cmd response: success
2,738,091 UART:
2,738,107 UART: Running Caliptra FMC ...
2,738,515 UART:
2,738,569 UART: [state] CFI Enabled
2,749,085 UART: [fht] FMC Alias Private Key: 7
2,868,119 UART: [art] Extend RT PCRs Done
2,868,547 UART: [art] Lock RT PCRs Done
2,870,021 UART: [art] Populate DV Done
2,878,070 UART: [fht] FMC Alias Private Key: 7
2,879,050 UART: [art] Derive CDI
2,879,330 UART: [art] Store in slot 0x4
2,964,865 UART: [art] Derive Key Pair
2,965,225 UART: [art] Store priv key in slot 0x5
2,978,359 UART: [art] Derive Key Pair - Done
2,993,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,612 UART: [art] PUB.X = 04622C28E80EC82BB5031F87447486F937FAF690EBA23B5C97418AAEAC2834CD8034A5E4802D2351817C4769C3B417EE
3,016,373 UART: [art] PUB.Y = 2A5ADC086D8EDF01790499035DAAD3CD78C558C0A521C4F30A4BC4621C05404940787D003C31CF2630C353501438B299
3,023,279 UART: [art] SIG.R = 51F93270A1BA978661445C4BD17BE26B77B62CEDAD74729FBDD6A9E8873B57314B6D00A74C08EAE2248728A1F9A31605
3,030,025 UART: [art] SIG.S = 8E64573D33D55A1503D2BB95955B61332E2D2A8F1EECC7651881EC816E037276B70BD08486C55739B4D2D6087364E9FA
3,054,031 UART: Caliptra RT
3,054,282 UART: [state] CFI Enabled
3,173,179 UART: [rt] RT listening for mailbox commands...
3,173,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,296,855 UART: [rt]cmd =0x41544d4e, len=14344
3,606,827 >>> mbox cmd response data (8 bytes)
3,606,828 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,973 UART: [rt]cmd =0x41545348, len=116
3,639,022 >>> mbox cmd response data (12 bytes)
3,639,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,127,487 >>> mbox cmd response: success
6,127,487 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,140,892 UART:
6,140,908 UART: Running Caliptra FMC ...
6,141,316 UART:
6,141,370 UART: [state] CFI Enabled
6,230,369 UART: [art] Extend RT PCRs Done
6,230,797 UART: [art] Lock RT PCRs Done
6,232,084 UART: [art] Populate DV Done
6,239,991 UART: [fht] FMC Alias Private Key: 7
6,241,173 UART: [art] Derive CDI
6,241,453 UART: [art] Store in slot 0x4
6,327,348 UART: [art] Derive Key Pair
6,327,708 UART: [art] Store priv key in slot 0x5
6,340,810 UART: [art] Derive Key Pair - Done
6,355,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,371,047 UART: [art] Erasing AUTHORITY.KEYID = 7
6,371,812 UART: [art] PUB.X = EF8B33E7F1DEFD3922B84E1EB6D8A7580A9710300CED7B741843024C3738ED7819240AC3E4F7F488FF95911E7393D662
6,378,572 UART: [art] PUB.Y = 5932771D7E41765383B51B4E8F0E0E2D121FB59018C5BAC6E45B0FAB15CAE6AB767033A27E89E1DC7CFFBBEA28873C44
6,385,527 UART: [art] SIG.R = 9221B0254F3C54C0D44C48FF1FED122C20919FFA263B9C40FBBEA37EB0650C3463CC817D730DC2E11DD9797F63720033
6,392,275 UART: [art] SIG.S = D661C7D62AF2C87A670BFBF35401B34D14E2E7136BBA81C38BE13C663A1D62743316DB939FE1F07EA80E4337481C207C
6,416,388 UART: Caliptra RT
6,416,639 UART: [state] CFI Enabled
6,779,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,810,311 UART: [rt]cmd =0x41545348, len=116
6,812,332 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,767 UART: [kat] SHA2-256
891,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,421 UART: [kat] ++
895,573 UART: [kat] sha1
899,673 UART: [kat] SHA2-256
901,613 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,908 UART: [kat] LMS
1,169,220 UART: [kat] --
1,170,121 UART: [cold-reset] ++
1,170,567 UART: [fht] FHT @ 0x50003400
1,173,225 UART: [idev] ++
1,173,393 UART: [idev] CDI.KEYID = 6
1,173,754 UART: [idev] SUBJECT.KEYID = 7
1,174,179 UART: [idev] UDS.KEYID = 0
1,174,525 ready_for_fw is high
1,174,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,240 UART: [idev] Erasing UDS.KEYID = 0
1,199,170 UART: [idev] Sha1 KeyId Algorithm
1,207,954 UART: [idev] --
1,209,189 UART: [ldev] ++
1,209,357 UART: [ldev] CDI.KEYID = 6
1,209,721 UART: [ldev] SUBJECT.KEYID = 5
1,210,148 UART: [ldev] AUTHORITY.KEYID = 7
1,210,611 UART: [ldev] FE.KEYID = 1
1,215,927 UART: [ldev] Erasing FE.KEYID = 1
1,242,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,821 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,515 UART: [ldev] --
1,281,868 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,904 >>> mbox cmd response: success
2,828,112 UART: [afmc] ++
2,828,280 UART: [afmc] CDI.KEYID = 6
2,828,643 UART: [afmc] SUBJECT.KEYID = 7
2,829,069 UART: [afmc] AUTHORITY.KEYID = 5
2,865,232 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,713 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,754 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,561 UART: [afmc] --
2,908,618 UART: [cold-reset] --
2,909,386 UART: [state] Locking Datavault
2,910,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,969 UART: [state] Locking ICCM
2,911,549 UART: [exit] Launching FMC @ 0x40000130
2,916,879 UART:
2,916,895 UART: Running Caliptra FMC ...
2,917,303 UART:
2,917,446 UART: [state] CFI Enabled
2,927,786 UART: [fht] FMC Alias Private Key: 7
3,047,072 UART: [art] Extend RT PCRs Done
3,047,500 UART: [art] Lock RT PCRs Done
3,049,382 UART: [art] Populate DV Done
3,057,305 UART: [fht] FMC Alias Private Key: 7
3,058,471 UART: [art] Derive CDI
3,058,751 UART: [art] Store in slot 0x4
3,144,420 UART: [art] Derive Key Pair
3,144,780 UART: [art] Store priv key in slot 0x5
3,157,646 UART: [art] Derive Key Pair - Done
3,172,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,559 UART: [art] PUB.X = BE892A5576DE4B015FBE50DE21A09979A3B9EFA9E1AE4A31853E0125AD6DD5021ECD25FD642C42AF2ADE7FF97279A714
3,195,338 UART: [art] PUB.Y = F2554186BD119363BB01CEEB31A9323209A0789FDC207EC83F92AB73887DC3E5C208B12617646419E1CBFE3DFDB0C257
3,202,285 UART: [art] SIG.R = B3BF7CF3AB95521E69D1EB527872C339421EAB143ECAA2ECF143C205A1F31F07F008DD28EF005AB6420A8866D8282AC9
3,209,033 UART: [art] SIG.S = 105D75362FCC6E0AFFDCEAB95A91FA7AC268BB1F4865863CD424320063EEA9BA399A868E55D051AAAE1F9CD56A4FE47A
3,232,206 UART: Caliptra RT
3,232,549 UART: [state] CFI Enabled
3,352,644 UART: [rt] RT listening for mailbox commands...
3,353,314 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,548 UART: [rt]cmd =0x41544d4e, len=14344
3,785,982 >>> mbox cmd response data (8 bytes)
3,785,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,126 UART: [rt]cmd =0x41545348, len=116
3,817,863 >>> mbox cmd response data (12 bytes)
3,817,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,557 UART:
3,818,573 UART: Running Caliptra ROM ...
3,818,981 UART:
3,819,123 UART: [state] CFI Enabled
3,822,215 UART: [state] LifecycleState = Unprovisioned
3,822,870 UART: [state] DebugLocked = No
3,823,512 UART: [state] WD Timer not started. Device not locked for debugging
3,824,710 UART: [kat] SHA2-256
4,628,260 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,632,364 UART: [kat] ++
4,632,516 UART: [kat] sha1
4,636,900 UART: [kat] SHA2-256
4,638,840 UART: [kat] SHA2-384
4,641,499 UART: [kat] SHA2-512-ACC
4,643,399 UART: [kat] ECC-384
4,653,052 UART: [kat] HMAC-384Kdf
4,657,802 UART: [kat] LMS
4,906,114 UART: [kat] --
4,907,082 UART: [update-reset] ++
6,265,937 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,266,916 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,422,131 >>> mbox cmd response: success
6,422,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,422,436 UART: [update-reset] Copying MAN_2 To MAN_1
6,430,450 UART: [update-reset Success] --
6,431,465 UART: [state] Locking Datavault
6,432,279 UART: [state] Locking PCR0, PCR1 and PCR31
6,432,883 UART: [state] Locking ICCM
6,433,527 UART: [exit] Launching FMC @ 0x40000130
6,438,857 UART:
6,438,873 UART: Running Caliptra FMC ...
6,439,281 UART:
6,439,424 UART: [state] CFI Enabled
6,528,771 UART: [art] Extend RT PCRs Done
6,529,199 UART: [art] Lock RT PCRs Done
6,530,260 UART: [art] Populate DV Done
6,538,591 UART: [fht] FMC Alias Private Key: 7
6,539,763 UART: [art] Derive CDI
6,540,043 UART: [art] Store in slot 0x4
6,625,804 UART: [art] Derive Key Pair
6,626,164 UART: [art] Store priv key in slot 0x5
6,639,410 UART: [art] Derive Key Pair - Done
6,654,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,669,760 UART: [art] Erasing AUTHORITY.KEYID = 7
6,670,525 UART: [art] PUB.X = 44B8762CFDA9F31D0F6AFB8CEF6EF28E8A5001311D95E940A3B9C818C87F52EE01E8B27C00C34C1F67B11A5EF51E833D
6,677,280 UART: [art] PUB.Y = 108E6C6A4251945CAB51BBD147A64F3A524C91A1DA78A62F31C70105BFC4E1AF402E3645EBC51D0D7D80990CB13D9D00
6,684,206 UART: [art] SIG.R = 11B9F6A7C434A52563E2C8C7DEA1EB5F3CA84D5FBCB30B1877F5660FF723829720DC77380AC42924A90F6BB0F1AA03E0
6,690,973 UART: [art] SIG.S = 942C405BF21737216D2D90CA9A51B6FD4174508657A99C53A4B7FC8955D51A6398C7E2EC311FB7EE9EBF19B9B263B392
6,714,347 UART: Caliptra RT
6,714,690 UART: [state] CFI Enabled
7,081,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,112,367 UART: [rt]cmd =0x41545348, len=116
7,114,180 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,603 ready_for_fw is high
1,059,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,541 >>> mbox cmd response: success
2,740,604 UART:
2,740,620 UART: Running Caliptra FMC ...
2,741,028 UART:
2,741,171 UART: [state] CFI Enabled
2,751,707 UART: [fht] FMC Alias Private Key: 7
2,870,557 UART: [art] Extend RT PCRs Done
2,870,985 UART: [art] Lock RT PCRs Done
2,872,571 UART: [art] Populate DV Done
2,880,836 UART: [fht] FMC Alias Private Key: 7
2,881,764 UART: [art] Derive CDI
2,882,044 UART: [art] Store in slot 0x4
2,967,833 UART: [art] Derive Key Pair
2,968,193 UART: [art] Store priv key in slot 0x5
2,981,595 UART: [art] Derive Key Pair - Done
2,996,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,536 UART: [art] PUB.X = E55326DEA3C03ED7F6842B45A2A6C60FDAD64AD83FEFEF8B5BC05728E46AADE66DD9DBDA20B73C82B0023CF720DA00BE
3,019,308 UART: [art] PUB.Y = 5E919B3048807665956E07E51EBB33A74F591A894CFF2AD858AEEF2EB88859CD5F1E1847A05A18169EA45559E34419BB
3,026,257 UART: [art] SIG.R = 414EE9BB3CF05D3B61DA88A25CC47D94E3B55BF7A9F33E2FAEFF62520C9545E8B89872CBD4715950F399F8B8984DAABF
3,033,042 UART: [art] SIG.S = 74E6A8391FEA3B7079C18D1C1FD0C3A6F7D4C8CE525C4B942B72EAF637AE92BB4506D0094B772411CB960909082551E3
3,056,919 UART: Caliptra RT
3,057,262 UART: [state] CFI Enabled
3,176,508 UART: [rt] RT listening for mailbox commands...
3,177,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,252 UART: [rt]cmd =0x41544d4e, len=14344
3,610,144 >>> mbox cmd response data (8 bytes)
3,610,145 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,458 UART: [rt]cmd =0x41545348, len=116
3,642,773 >>> mbox cmd response data (12 bytes)
3,642,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,132,129 >>> mbox cmd response: success
6,132,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,145,538 UART:
6,145,554 UART: Running Caliptra FMC ...
6,145,962 UART:
6,146,105 UART: [state] CFI Enabled
6,235,430 UART: [art] Extend RT PCRs Done
6,235,858 UART: [art] Lock RT PCRs Done
6,237,269 UART: [art] Populate DV Done
6,245,408 UART: [fht] FMC Alias Private Key: 7
6,246,544 UART: [art] Derive CDI
6,246,824 UART: [art] Store in slot 0x4
6,332,695 UART: [art] Derive Key Pair
6,333,055 UART: [art] Store priv key in slot 0x5
6,346,525 UART: [art] Derive Key Pair - Done
6,361,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,376,457 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,222 UART: [art] PUB.X = C77A140ADA4F409F8122D4B61FD6F7FB2D0BE7964B47B48E941B86EF854A09BD05788D1E024A2F63A2C9FCC87CC66882
6,383,989 UART: [art] PUB.Y = B62904C77540454A56B7DD23E875B311778005A2C60B49A90D4557EA24C2BDCAF809277EAB7821A6FDD918341836A19E
6,390,922 UART: [art] SIG.R = 25130F3542BAB07BA087C9F7106C20CAB70FFD258F2C00EAB113EAD80844D71C2FF0C61AB1CE65D2BF98018027BA8BC7
6,397,674 UART: [art] SIG.S = C9C84D10B1AB3AA7A44FE4FAF620538EDB48721F27E4020FED4CED7F8E2531998488B2F460BC3124AB1D2281E135D4B5
6,421,896 UART: Caliptra RT
6,422,239 UART: [state] CFI Enabled
6,788,849 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,819,994 UART: [rt]cmd =0x41545348, len=116
6,821,777 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,783 UART: [kat] SHA2-256
903,723 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
917,948 UART: [kat] HMAC-384Kdf
922,438 UART: [kat] LMS
1,170,766 UART: [kat] --
1,171,729 UART: [cold-reset] ++
1,172,223 UART: [fht] FHT @ 0x50003400
1,175,084 UART: [idev] ++
1,175,252 UART: [idev] CDI.KEYID = 6
1,175,612 UART: [idev] SUBJECT.KEYID = 7
1,176,036 UART: [idev] UDS.KEYID = 0
1,176,381 ready_for_fw is high
1,176,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,151 UART: [idev] Sha1 KeyId Algorithm
1,208,519 UART: [idev] --
1,209,621 UART: [ldev] ++
1,209,789 UART: [ldev] CDI.KEYID = 6
1,210,152 UART: [ldev] SUBJECT.KEYID = 5
1,210,578 UART: [ldev] AUTHORITY.KEYID = 7
1,211,041 UART: [ldev] FE.KEYID = 1
1,215,943 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,783 UART: [ldev] --
1,282,276 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,262 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,625 >>> mbox cmd response: success
2,829,721 UART: [afmc] ++
2,829,889 UART: [afmc] CDI.KEYID = 6
2,830,251 UART: [afmc] SUBJECT.KEYID = 7
2,830,676 UART: [afmc] AUTHORITY.KEYID = 5
2,866,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,995 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,878 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,627 UART: [afmc] --
2,909,623 UART: [cold-reset] --
2,910,719 UART: [state] Locking Datavault
2,911,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,384 UART: [state] Locking ICCM
2,912,994 UART: [exit] Launching FMC @ 0x40000130
2,918,324 UART:
2,918,340 UART: Running Caliptra FMC ...
2,918,748 UART:
2,918,802 UART: [state] CFI Enabled
2,929,198 UART: [fht] FMC Alias Private Key: 7
3,048,264 UART: [art] Extend RT PCRs Done
3,048,692 UART: [art] Lock RT PCRs Done
3,050,246 UART: [art] Populate DV Done
3,058,499 UART: [fht] FMC Alias Private Key: 7
3,059,565 UART: [art] Derive CDI
3,059,845 UART: [art] Store in slot 0x4
3,145,482 UART: [art] Derive Key Pair
3,145,842 UART: [art] Store priv key in slot 0x5
3,159,514 UART: [art] Derive Key Pair - Done
3,174,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,687 UART: [art] PUB.X = 485290B4FAA4AA7252FA45E2AD0B94E50763BF7FA800696797190D1BF9CCDE3D6C163622B65450D33C1C16D956ABD8A9
3,197,434 UART: [art] PUB.Y = 5AC2A7D444A8D35800CABB79A9FC69A32E9E9F34DFE9935F227155940C4798C7E5EF61644186FE95CB5CDADCA47BDFA2
3,204,377 UART: [art] SIG.R = 47C1692467D720687EC6D329290EF1A89818EC1E7DAF1FC26F5BFC9BA14C905F61B5A11B75955F7500165EDD8960843C
3,211,124 UART: [art] SIG.S = 09C6D19970A49D7C851890AA1DC31CD2E742F2C60EC8262D9B5625F66FFE87903088A4C546A30E262AA212B724C0F978
3,234,729 UART: Caliptra RT
3,234,980 UART: [state] CFI Enabled
3,354,244 UART: [rt] RT listening for mailbox commands...
3,354,914 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,040 UART: [rt]cmd =0x41544d4e, len=14344
3,787,854 >>> mbox cmd response data (8 bytes)
3,787,855 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,916 UART: [rt]cmd =0x41545348, len=116
3,819,781 >>> mbox cmd response data (12 bytes)
3,819,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,723 UART:
3,820,739 UART: Running Caliptra ROM ...
3,821,147 UART:
3,821,202 UART: [state] CFI Enabled
3,823,388 UART: [state] LifecycleState = Unprovisioned
3,824,043 UART: [state] DebugLocked = No
3,824,751 UART: [state] WD Timer not started. Device not locked for debugging
3,826,017 UART: [kat] SHA2-256
4,631,667 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,635,792 UART: [kat] ++
4,635,944 UART: [kat] sha1
4,640,150 UART: [kat] SHA2-256
4,642,090 UART: [kat] SHA2-384
4,644,855 UART: [kat] SHA2-512-ACC
4,646,755 UART: [kat] ECC-384
4,656,544 UART: [kat] HMAC-384Kdf
4,661,344 UART: [kat] LMS
4,909,672 UART: [kat] --
4,910,472 UART: [update-reset] ++
6,270,820 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,271,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,427,044 >>> mbox cmd response: success
6,427,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,427,281 UART: [update-reset] Copying MAN_2 To MAN_1
6,435,295 UART: [update-reset Success] --
6,436,378 UART: [state] Locking Datavault
6,437,196 UART: [state] Locking PCR0, PCR1 and PCR31
6,437,800 UART: [state] Locking ICCM
6,438,222 UART: [exit] Launching FMC @ 0x40000130
6,443,552 UART:
6,443,568 UART: Running Caliptra FMC ...
6,443,976 UART:
6,444,030 UART: [state] CFI Enabled
6,533,289 UART: [art] Extend RT PCRs Done
6,533,717 UART: [art] Lock RT PCRs Done
6,534,874 UART: [art] Populate DV Done
6,543,001 UART: [fht] FMC Alias Private Key: 7
6,544,053 UART: [art] Derive CDI
6,544,333 UART: [art] Store in slot 0x4
6,630,224 UART: [art] Derive Key Pair
6,630,584 UART: [art] Store priv key in slot 0x5
6,643,788 UART: [art] Derive Key Pair - Done
6,658,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,673,932 UART: [art] Erasing AUTHORITY.KEYID = 7
6,674,697 UART: [art] PUB.X = E16B1FF37585E5B63B52EDD6E7D3BED5793CEDFDF01746BE98DFBCB0C443A1DD707080E1EC0D7C3C9629ADFBCC2C0782
6,681,489 UART: [art] PUB.Y = 0172D89F8BA6D0BCDC928BF270540F303FC192A1C7E15C9FE7E01DD4FC14C46D2BCA02E1738985A298A7F981D65E8160
6,688,440 UART: [art] SIG.R = AEE0CD0E2C07282C64697708FF42465BC6F62A5F26D2188F950371DA418D4A5E8AE2FA1D6AD8F080E9B917686DE9F1B8
6,695,208 UART: [art] SIG.S = 28B2B44A28E23435EBA6EE023579DE6DCA45E807CE28DCE85FB7ADD44B3C3C574BE9EE51E93EC4B1BF8F8D016E5AC30D
6,719,296 UART: Caliptra RT
6,719,547 UART: [state] CFI Enabled
7,088,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,119,802 UART: [rt]cmd =0x41545348, len=116
7,121,593 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,513 ready_for_fw is high
1,060,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,110 >>> mbox cmd response: success
2,741,809 UART:
2,741,825 UART: Running Caliptra FMC ...
2,742,233 UART:
2,742,287 UART: [state] CFI Enabled
2,753,043 UART: [fht] FMC Alias Private Key: 7
2,871,653 UART: [art] Extend RT PCRs Done
2,872,081 UART: [art] Lock RT PCRs Done
2,873,613 UART: [art] Populate DV Done
2,881,904 UART: [fht] FMC Alias Private Key: 7
2,883,014 UART: [art] Derive CDI
2,883,294 UART: [art] Store in slot 0x4
2,969,095 UART: [art] Derive Key Pair
2,969,455 UART: [art] Store priv key in slot 0x5
2,982,599 UART: [art] Derive Key Pair - Done
2,997,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,652 UART: [art] PUB.X = 630586AA436A121B5B1EC24FB48F9CB5E20C7A400D757192F6E38948597BCCEFBC853B4B6D8DE9279E05FF6306BF440F
3,020,414 UART: [art] PUB.Y = 621EFB975FC014F7C42C8C31FA0A4AFE11F48340C1F2F133D6595CBAEB59B8F5CF8C0BFD0AFD61E94BC8B00FFE80409E
3,027,378 UART: [art] SIG.R = FCF06170D703143144A6515195AE77ACA7605CCF10D59381F4EDFAA7A538131573F5AC04508E0785E7E74D32B2A88E8B
3,034,141 UART: [art] SIG.S = D99D79784B2ECA41DB9F5206A9E1A3AEBC7459630DBCF8651A8A4771446F1500DBD94A18CDDB642AA7BF804D542FAF3D
3,057,889 UART: Caliptra RT
3,058,140 UART: [state] CFI Enabled
3,177,884 UART: [rt] RT listening for mailbox commands...
3,178,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,622 UART: [rt]cmd =0x41544d4e, len=14344
3,610,942 >>> mbox cmd response data (8 bytes)
3,610,943 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,056 UART: [rt]cmd =0x41545348, len=116
3,643,125 >>> mbox cmd response data (12 bytes)
3,643,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,134,117 >>> mbox cmd response: success
6,134,117 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,582 UART:
6,147,598 UART: Running Caliptra FMC ...
6,148,006 UART:
6,148,060 UART: [state] CFI Enabled
6,237,499 UART: [art] Extend RT PCRs Done
6,237,927 UART: [art] Lock RT PCRs Done
6,239,322 UART: [art] Populate DV Done
6,247,337 UART: [fht] FMC Alias Private Key: 7
6,248,363 UART: [art] Derive CDI
6,248,643 UART: [art] Store in slot 0x4
6,334,340 UART: [art] Derive Key Pair
6,334,700 UART: [art] Store priv key in slot 0x5
6,348,104 UART: [art] Derive Key Pair - Done
6,363,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,403 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,168 UART: [art] PUB.X = C5D05816F34647F521CBECA7A258F8B6DDACBD59887B979D01A355E60DF1F8C14A6FA3F57162700015F42A71EE4AE3D1
6,385,922 UART: [art] PUB.Y = FC5136A137E0AB412E90C291F406E6201B5A398A9BF8F5D48A7B5D8BEC205F1720C4D2F16E37089A2515206F70581F86
6,392,866 UART: [art] SIG.R = A12B57844ED141BB533C86FE562B8C735F0E34F69497B1786DE21B37027067CDBF2B2573ABC0FD81E0D9157D9A67855B
6,399,634 UART: [art] SIG.S = 8471B31909C13ACA42D43C9A712E914C9C99E7B399AE394D41A25165175EB7C36A1A5A490AEF1C76D5FDA686102E8D5A
6,423,320 UART: Caliptra RT
6,423,571 UART: [state] CFI Enabled
6,787,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,818,533 UART: [rt]cmd =0x41545348, len=116
6,820,346 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,341 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,932 UART: [fht] FHT @ 0x50003400
1,175,739 UART: [idev] ++
1,175,907 UART: [idev] CDI.KEYID = 6
1,176,267 UART: [idev] SUBJECT.KEYID = 7
1,176,691 UART: [idev] UDS.KEYID = 0
1,177,036 ready_for_fw is high
1,177,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,589 UART: [idev] Erasing UDS.KEYID = 0
1,201,894 UART: [idev] Sha1 KeyId Algorithm
1,210,384 UART: [idev] --
1,211,572 UART: [ldev] ++
1,211,740 UART: [ldev] CDI.KEYID = 6
1,212,103 UART: [ldev] SUBJECT.KEYID = 5
1,212,529 UART: [ldev] AUTHORITY.KEYID = 7
1,212,992 UART: [ldev] FE.KEYID = 1
1,218,584 UART: [ldev] Erasing FE.KEYID = 1
1,245,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,610 UART: [ldev] --
1,285,005 UART: [fwproc] Wait for Commands...
1,285,779 UART: [fwproc] Recv command 0x46574c44
1,286,507 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,442 >>> mbox cmd response: success
2,830,570 UART: [afmc] ++
2,830,738 UART: [afmc] CDI.KEYID = 6
2,831,100 UART: [afmc] SUBJECT.KEYID = 7
2,831,525 UART: [afmc] AUTHORITY.KEYID = 5
2,867,842 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,814 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,418 UART: [afmc] --
2,911,336 UART: [cold-reset] --
2,912,306 UART: [state] Locking Datavault
2,913,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,187 UART: [state] Locking ICCM
2,914,813 UART: [exit] Launching FMC @ 0x40000130
2,920,143 UART:
2,920,159 UART: Running Caliptra FMC ...
2,920,567 UART:
2,920,710 UART: [state] CFI Enabled
2,931,360 UART: [fht] FMC Alias Private Key: 7
3,050,810 UART: [art] Extend RT PCRs Done
3,051,238 UART: [art] Lock RT PCRs Done
3,052,716 UART: [art] Populate DV Done
3,061,065 UART: [fht] FMC Alias Private Key: 7
3,062,241 UART: [art] Derive CDI
3,062,521 UART: [art] Store in slot 0x4
3,148,624 UART: [art] Derive Key Pair
3,148,984 UART: [art] Store priv key in slot 0x5
3,162,044 UART: [art] Derive Key Pair - Done
3,176,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,076 UART: [art] PUB.X = C8D606D09225F8B83DDD0ED2BB604D79B599545775B99DAB6A41751275439418414C3C02DD4D6536E162260668FA7CE7
3,199,830 UART: [art] PUB.Y = 15379BD65420CB62914863381B76B8FBE9564F913BCFD43AD3007AF07BC11AF8519B2A58ED66B727841BD71EC667E9E1
3,206,762 UART: [art] SIG.R = BB0E0E1B7E0E8846319104D2FC539997F0F3BAD06C230D36BC9BAEA7A561FCB0CB31E35FC45A31420D0BCE3851C78C3C
3,213,529 UART: [art] SIG.S = CA72A8A6BF6054ED4945CAC45275C57E29451271AC0BBC401068EE6BD43B6339211CBB1405A1C844A68FE4B5F0253F01
3,237,752 UART: Caliptra RT
3,238,095 UART: [state] CFI Enabled
3,358,345 UART: [rt] RT listening for mailbox commands...
3,359,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,481,971 UART: [rt]cmd =0x41544d4e, len=14344
3,791,529 >>> mbox cmd response data (8 bytes)
3,791,530 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,771 UART: [rt]cmd =0x41545348, len=116
3,823,538 >>> mbox cmd response data (12 bytes)
3,823,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,600 UART:
3,824,616 UART: Running Caliptra ROM ...
3,825,024 UART:
3,825,166 UART: [state] CFI Enabled
3,828,080 UART: [state] LifecycleState = Unprovisioned
3,828,735 UART: [state] DebugLocked = No
3,829,263 UART: [state] WD Timer not started. Device not locked for debugging
3,830,461 UART: [kat] SHA2-256
4,636,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,640,236 UART: [kat] ++
4,640,388 UART: [kat] sha1
4,644,600 UART: [kat] SHA2-256
4,646,540 UART: [kat] SHA2-384
4,649,231 UART: [kat] SHA2-512-ACC
4,651,131 UART: [kat] ECC-384
4,660,580 UART: [kat] HMAC-384Kdf
4,665,132 UART: [kat] LMS
4,913,460 UART: [kat] --
4,914,494 UART: [update-reset] ++
6,273,149 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,274,142 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,429,357 >>> mbox cmd response: success
6,429,357 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,429,680 UART: [update-reset] Copying MAN_2 To MAN_1
6,437,694 UART: [update-reset Success] --
6,438,897 UART: [state] Locking Datavault
6,439,775 UART: [state] Locking PCR0, PCR1 and PCR31
6,440,379 UART: [state] Locking ICCM
6,440,907 UART: [exit] Launching FMC @ 0x40000130
6,446,237 UART:
6,446,253 UART: Running Caliptra FMC ...
6,446,661 UART:
6,446,804 UART: [state] CFI Enabled
6,536,181 UART: [art] Extend RT PCRs Done
6,536,609 UART: [art] Lock RT PCRs Done
6,537,892 UART: [art] Populate DV Done
6,545,845 UART: [fht] FMC Alias Private Key: 7
6,546,849 UART: [art] Derive CDI
6,547,129 UART: [art] Store in slot 0x4
6,632,960 UART: [art] Derive Key Pair
6,633,320 UART: [art] Store priv key in slot 0x5
6,646,816 UART: [art] Derive Key Pair - Done
6,661,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,676,963 UART: [art] Erasing AUTHORITY.KEYID = 7
6,677,728 UART: [art] PUB.X = 8AA5F15BA73EAE7890DF8A99159BDA3AA630C973DED8E478584D9B42A1717F157C967ABF18CE1C137F359EDC8137EA92
6,684,512 UART: [art] PUB.Y = 9BB90BC03341187320737AD1B08C0B880D783FC221DE1F17DE92161061B23FA6EEAB9F51C4769AB64AA65CE883D9F019
6,691,459 UART: [art] SIG.R = 5B42B947F339539C3D139B2491B12A722F0842341C041EB6623B254375D53FF8B185132A5B2A6D932364293BA04EE1F4
6,698,213 UART: [art] SIG.S = E9B6AE96F25A23E5D375C31D4B80785140D9DEF27F43957317113C131AE012641CC0D8CE6E15A05488BCA62F9351437B
6,721,855 UART: Caliptra RT
6,722,198 UART: [state] CFI Enabled
7,085,596 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,116,585 UART: [rt]cmd =0x41545348, len=116
7,118,436 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,960 ready_for_fw is high
1,060,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,705 >>> mbox cmd response: success
2,744,886 UART:
2,744,902 UART: Running Caliptra FMC ...
2,745,310 UART:
2,745,453 UART: [state] CFI Enabled
2,756,207 UART: [fht] FMC Alias Private Key: 7
2,876,157 UART: [art] Extend RT PCRs Done
2,876,585 UART: [art] Lock RT PCRs Done
2,878,357 UART: [art] Populate DV Done
2,886,376 UART: [fht] FMC Alias Private Key: 7
2,887,526 UART: [art] Derive CDI
2,887,806 UART: [art] Store in slot 0x4
2,973,723 UART: [art] Derive Key Pair
2,974,083 UART: [art] Store priv key in slot 0x5
2,987,461 UART: [art] Derive Key Pair - Done
3,002,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,018,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,881 UART: [art] PUB.X = 037F0390999415A5AFE805503543EB14EFD328C9D221922B0BBF4E9A6945CFE4DE0E994E84C707629AFE31C0F477C7D8
3,025,637 UART: [art] PUB.Y = A3C03DB73D42B3DBE91F1B1F15171A03089679E3E2DCF7DF616BDB150DB4C6FABD6DD8F2B17D3F6E90ED430DF11DCD5E
3,032,603 UART: [art] SIG.R = CE3621D7632C68994BD7E41F53968028E0BD3EAF3B534D8463CD5EAB915B2FC3C94EDB7E13BA3A190F3561E90577E42D
3,039,377 UART: [art] SIG.S = 2A7C31C0213515560555EF80418F9CC2C73643FFD56559908B1EC23320EB8BEBEE1E95AE7774F1CD2F9E82FE7A967F26
3,063,172 UART: Caliptra RT
3,063,515 UART: [state] CFI Enabled
3,182,868 UART: [rt] RT listening for mailbox commands...
3,183,538 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,632 UART: [rt]cmd =0x41544d4e, len=14344
3,617,086 >>> mbox cmd response data (8 bytes)
3,617,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,647,142 UART: [rt]cmd =0x41545348, len=116
3,648,939 >>> mbox cmd response data (12 bytes)
3,648,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,138,456 >>> mbox cmd response: success
6,138,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,152,035 UART:
6,152,051 UART: Running Caliptra FMC ...
6,152,459 UART:
6,152,602 UART: [state] CFI Enabled
6,241,361 UART: [art] Extend RT PCRs Done
6,241,789 UART: [art] Lock RT PCRs Done
6,243,006 UART: [art] Populate DV Done
6,251,017 UART: [fht] FMC Alias Private Key: 7
6,252,063 UART: [art] Derive CDI
6,252,343 UART: [art] Store in slot 0x4
6,337,842 UART: [art] Derive Key Pair
6,338,202 UART: [art] Store priv key in slot 0x5
6,351,834 UART: [art] Derive Key Pair - Done
6,366,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,381,941 UART: [art] Erasing AUTHORITY.KEYID = 7
6,382,706 UART: [art] PUB.X = F414FDCA082BE748DF1ADA18F6874F5BFA5A4AB5C36108AFD42220D9C4613FE5B2B73003568C3C6D86755E60131124D6
6,389,475 UART: [art] PUB.Y = 08B6D196C8E50395A7B528167E4E54D554219350E56E919291DEAA0169D1C2762C227D23535B5E4BC2E08F80AEFD9C18
6,396,414 UART: [art] SIG.R = 1AA8EDABE34B76E412524F169D045520E9AE3562D5759E4D480F6234C27A9EFFCA2393617FDCB93C94C9AC18C77F7A3A
6,403,190 UART: [art] SIG.S = 14C47303390664D082B2171C069B4B28A71C253B90DBC5D9B5C8E1FC2094475F9C0408B3C8399BB76439B08D07D26063
6,427,330 UART: Caliptra RT
6,427,673 UART: [state] CFI Enabled
6,789,604 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,820,519 UART: [rt]cmd =0x41545348, len=116
6,822,188 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
191,981 UART:
192,339 UART: Running Caliptra ROM ...
193,512 UART:
193,662 UART: [state] CFI Enabled
263,126 UART: [state] LifecycleState = Unprovisioned
265,118 UART: [state] DebugLocked = No
267,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,724 UART: [kat] SHA2-256
442,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,933 UART: [kat] ++
453,411 UART: [kat] sha1
464,570 UART: [kat] SHA2-256
467,232 UART: [kat] SHA2-384
472,941 UART: [kat] SHA2-512-ACC
475,305 UART: [kat] ECC-384
2,767,253 UART: [kat] HMAC-384Kdf
2,799,944 UART: [kat] LMS
3,990,195 UART: [kat] --
3,995,583 UART: [cold-reset] ++
3,997,804 UART: [fht] Storing FHT @ 0x50003400
4,008,993 UART: [idev] ++
4,009,576 UART: [idev] CDI.KEYID = 6
4,010,616 UART: [idev] SUBJECT.KEYID = 7
4,011,795 UART: [idev] UDS.KEYID = 0
4,012,749 ready_for_fw is high
4,012,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,036 UART: [idev] Erasing UDS.KEYID = 0
7,348,859 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,464 UART: [idev] --
7,374,563 UART: [ldev] ++
7,375,130 UART: [ldev] CDI.KEYID = 6
7,376,067 UART: [ldev] SUBJECT.KEYID = 5
7,377,281 UART: [ldev] AUTHORITY.KEYID = 7
7,378,567 UART: [ldev] FE.KEYID = 1
7,422,424 UART: [ldev] Erasing FE.KEYID = 1
10,752,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,492 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,940 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,262 UART: [ldev] --
13,113,130 UART: [fwproc] Waiting for Commands...
13,116,251 UART: [fwproc] Received command 0x46574c44
13,118,433 UART: [fwproc] Received Image of size 118548 bytes
17,225,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,524 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,583 >>> mbox cmd response: success
17,710,118 UART: [afmc] ++
17,710,738 UART: [afmc] CDI.KEYID = 6
17,711,669 UART: [afmc] SUBJECT.KEYID = 7
17,712,888 UART: [afmc] AUTHORITY.KEYID = 5
21,070,715 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,069 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,541 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,236 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,661 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,336 UART: [afmc] --
23,443,736 UART: [cold-reset] --
23,448,243 UART: [state] Locking Datavault
23,453,763 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,513 UART: [state] Locking ICCM
23,456,557 UART: [exit] Launching FMC @ 0x40000130
23,464,957 UART:
23,465,188 UART: Running Caliptra FMC ...
23,466,229 UART:
23,466,380 UART: [state] CFI Enabled
23,529,894 UART: [fht] FMC Alias Private Key: 7
25,870,062 UART: [art] Extend RT PCRs Done
25,871,300 UART: [art] Lock RT PCRs Done
25,873,276 UART: [art] Populate DV Done
25,878,408 UART: [fht] FMC Alias Private Key: 7
25,879,949 UART: [art] Derive CDI
25,880,693 UART: [art] Store in slot 0x4
25,939,838 UART: [art] Derive Key Pair
25,940,839 UART: [art] Store priv key in slot 0x5
29,233,644 UART: [art] Derive Key Pair - Done
29,246,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,437 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,949 UART: [art] PUB.X = 4824055BA30CEA54A1E542FDE4588136153815441016DF970336C6B056686B5113E93BF4EA8B640F0427B05330DA41C7
31,543,207 UART: [art] PUB.Y = ED00F63D5AE57CDE519013D35C5453ED2C6B4584313E39CAFE9BFD24F69031C1609B43227B070CBE445BB83081A1DA77
31,550,453 UART: [art] SIG.R = 4D4F1394880D2B92E0DC729A89D5D627A75E718C9DED8670965F31D13A88C0A2039DA10647FAD6EF94C7D882CABAD29A
31,557,849 UART: [art] SIG.S = 6B4E98CFA10AD7E61E008091352928FCD7DE537058C850398B1DE853D526946A8A66DBD99F778AF3410FFE4B2C8C4423
32,863,013 UART: Caliptra RT
32,863,729 UART: [state] CFI Enabled
33,040,333 UART: [rt] RT listening for mailbox commands...
33,042,746 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,198,050 UART: [rt]cmd =0x41544d4e, len=14344
38,499,403 >>> mbox cmd response data (8 bytes)
38,499,996 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,530,628 UART: [rt]cmd =0x41545348, len=116
38,551,006 >>> mbox cmd response data (12 bytes)
38,551,843 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,582,458 UART: [rt]cmd =0x41545348, len=116
38,584,666 >>> mbox cmd response data (12 bytes)
40,659,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,810,296 UART:
40,810,640 UART: Running Caliptra ROM ...
40,811,693 UART:
40,811,844 UART: [state] CFI Enabled
40,874,036 UART: [state] LifecycleState = Unprovisioned
40,876,029 UART: [state] DebugLocked = No
40,878,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,884,389 UART: [kat] SHA2-256
41,054,071 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,064,598 UART: [kat] ++
41,065,059 UART: [kat] sha1
41,076,631 UART: [kat] SHA2-256
41,078,866 UART: [kat] SHA2-384
41,084,979 UART: [kat] SHA2-512-ACC
41,087,341 UART: [kat] ECC-384
43,380,438 UART: [kat] HMAC-384Kdf
43,409,943 UART: [kat] LMS
44,600,245 UART: [kat] --
44,602,225 UART: [update-reset] ++
48,794,502 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,798,776 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,196,524 >>> mbox cmd response: success
49,201,168 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,201,777 UART: [update-reset] Copying MAN_2 To MAN_1
49,220,592 UART: [update-reset Success] --
49,225,150 UART: [state] Locking Datavault
49,229,268 UART: [state] Locking PCR0, PCR1 and PCR31
49,231,020 UART: [state] Locking ICCM
49,232,878 UART: [exit] Launching FMC @ 0x40000130
49,241,311 UART:
49,241,596 UART: Running Caliptra FMC ...
49,242,633 UART:
49,242,780 UART: [state] CFI Enabled
49,350,021 UART: [art] Extend RT PCRs Done
49,351,220 UART: [art] Lock RT PCRs Done
49,352,406 UART: [art] Populate DV Done
49,357,983 UART: [fht] FMC Alias Private Key: 7
49,359,733 UART: [art] Derive CDI
49,360,541 UART: [art] Store in slot 0x4
49,418,584 UART: [art] Derive Key Pair
49,419,672 UART: [art] Store priv key in slot 0x5
52,712,786 UART: [art] Derive Key Pair - Done
52,725,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,015,254 UART: [art] Erasing AUTHORITY.KEYID = 7
55,016,776 UART: [art] PUB.X = 67AC3F731C9727DE25FC5C188366942224D9937FE4B54C18E2CCF0DD652A888E898B4EE8C3AB4EA1AD4484A2FF35638F
55,024,028 UART: [art] PUB.Y = A4098C429A69F1D3861EA157BF81F503394841056FF66FF5D5D44B4E5BF51DE09E69B0073FF7EC599668ED1C131590F3
55,031,264 UART: [art] SIG.R = 6998A8BDF1480D81691A44F43510A33500B524ABD2EEAA5469CC17FE37A394A9715377845E2FC2AF65CA937C38117E05
55,038,648 UART: [art] SIG.S = D19EF15BDA46AE9808E47602A9393051744B63161989103DE5FB7E32A38B2129DD619A693CA96102F9514F22FFF5DE42
56,343,538 UART: Caliptra RT
56,344,252 UART: [state] CFI Enabled
56,760,790 UART: [rt] RT listening for mailbox commands...
56,792,697 UART: [rt]cmd =0x41545348, len=116
56,813,524 >>> mbox cmd response data (12 bytes)
56,814,596 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,845,514 UART: [rt]cmd =0x41545348, len=116
56,847,893 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,913,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,069,032 UART: [rt]cmd =0x41544d4e, len=14344
66,369,695 >>> mbox cmd response data (8 bytes)
66,370,249 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,400,875 UART: [rt]cmd =0x41545348, len=116
66,420,847 >>> mbox cmd response data (12 bytes)
66,421,274 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,452,073 UART: [rt]cmd =0x41545348, len=116
66,454,142 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,804,899 ready_for_fw is high
3,805,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,353 >>> mbox cmd response: success
23,673,162 UART:
23,673,573 UART: Running Caliptra FMC ...
23,674,717 UART:
23,674,875 UART: [state] CFI Enabled
23,745,300 UART: [fht] FMC Alias Private Key: 7
26,085,044 UART: [art] Extend RT PCRs Done
26,086,281 UART: [art] Lock RT PCRs Done
26,087,777 UART: [art] Populate DV Done
26,093,196 UART: [fht] FMC Alias Private Key: 7
26,094,683 UART: [art] Derive CDI
26,095,421 UART: [art] Store in slot 0x4
26,153,443 UART: [art] Derive Key Pair
26,154,497 UART: [art] Store priv key in slot 0x5
29,446,758 UART: [art] Derive Key Pair - Done
29,459,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,021 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,535 UART: [art] PUB.X = 272CED8B10D1E781F88DEC9466AE7B0D6538F66135B40B4BF1AB9BA40D04FCD22518F8513D092EE60B16CF8FFF7A372B
31,757,900 UART: [art] PUB.Y = FBF319AF544D57ED2360EE38FFE55156850182986767FE4B2A4A888C5D1106BD8B4A5ED869D640F2704E3E22513833B8
31,765,051 UART: [art] SIG.R = A17A9BF00B678C1BAEB0A95ED364572F79D10D2FC6914F9F0B0D0C6D0CF555793450985B2EF567B18A8710BFD5D3929C
31,772,455 UART: [art] SIG.S = 81015FC48364132409BAB97503638DD245EF0CDF4F8B631FAB0B8BCD15566BDBB6A98635AD34F28958077E0BF28B21B5
33,077,935 UART: Caliptra RT
33,078,645 UART: [state] CFI Enabled
33,253,907 UART: [rt] RT listening for mailbox commands...
33,256,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,411,868 UART: [rt]cmd =0x41544d4e, len=14344
38,712,298 >>> mbox cmd response data (8 bytes)
38,712,880 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,743,386 UART: [rt]cmd =0x41545348, len=116
38,763,995 >>> mbox cmd response data (12 bytes)
38,765,005 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,795,706 UART: [rt]cmd =0x41545348, len=116
38,797,999 >>> mbox cmd response data (12 bytes)
40,872,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,705,616 >>> mbox cmd response: success
49,706,755 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,737,704 UART:
49,738,001 UART: Running Caliptra FMC ...
49,739,042 UART:
49,739,199 UART: [state] CFI Enabled
49,825,649 UART: [art] Extend RT PCRs Done
49,827,009 UART: [art] Lock RT PCRs Done
49,828,103 UART: [art] Populate DV Done
49,833,354 UART: [fht] FMC Alias Private Key: 7
49,835,051 UART: [art] Derive CDI
49,835,873 UART: [art] Store in slot 0x4
49,895,181 UART: [art] Derive Key Pair
49,896,190 UART: [art] Store priv key in slot 0x5
53,169,163 UART: [art] Derive Key Pair - Done
53,182,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,465,466 UART: [art] Erasing AUTHORITY.KEYID = 7
55,466,983 UART: [art] PUB.X = 9C2BFBE2CC6DCAD54B6A4941F9A9366EC1AC7FACC316E0F61B531E655B2B8BA3F43AE1F291EFD8490414C26969393E76
55,474,285 UART: [art] PUB.Y = 1D87832C02E49323EB99CA97DC4EBF93403C77D31C3AEAF928257A1ED41BAB3CA4FEEFACF5C3575CABDC980324FB4EE0
55,481,573 UART: [art] SIG.R = AC32487807730C8864EB06E29DB7D94D31B449F8E64ABC8819599016C28000BCE4F32664DBEE156308C6F2BF018AB9FF
55,488,906 UART: [art] SIG.S = 046BE6C22AA481A1A181629C9A6941950887F950FBAA31ABB6DF31735FD8B61722BDABB617DAA08F1F18060FCEB2BF8E
56,793,538 UART: Caliptra RT
56,794,301 UART: [state] CFI Enabled
57,211,150 UART: [rt] RT listening for mailbox commands...
57,243,118 UART: [rt]cmd =0x41545348, len=116
57,263,892 >>> mbox cmd response data (12 bytes)
57,264,673 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,295,773 UART: [rt]cmd =0x41545348, len=116
57,297,859 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,362,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,518,494 UART: [rt]cmd =0x41544d4e, len=14344
66,818,967 >>> mbox cmd response data (8 bytes)
66,819,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,850,126 UART: [rt]cmd =0x41545348, len=116
66,870,383 >>> mbox cmd response data (12 bytes)
66,870,855 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,901,786 UART: [rt]cmd =0x41545348, len=116
66,904,088 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,435 UART:
192,821 UART: Running Caliptra ROM ...
194,033 UART:
603,570 UART: [state] CFI Enabled
616,903 UART: [state] LifecycleState = Unprovisioned
618,776 UART: [state] DebugLocked = No
620,440 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,152 UART: [kat] SHA2-256
794,871 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,457 UART: [kat] ++
805,902 UART: [kat] sha1
816,410 UART: [kat] SHA2-256
819,122 UART: [kat] SHA2-384
825,101 UART: [kat] SHA2-512-ACC
827,473 UART: [kat] ECC-384
3,112,064 UART: [kat] HMAC-384Kdf
3,122,746 UART: [kat] LMS
4,312,806 UART: [kat] --
4,316,951 UART: [cold-reset] ++
4,318,024 UART: [fht] Storing FHT @ 0x50003400
4,330,344 UART: [idev] ++
4,330,907 UART: [idev] CDI.KEYID = 6
4,331,889 UART: [idev] SUBJECT.KEYID = 7
4,333,126 UART: [idev] UDS.KEYID = 0
4,334,071 ready_for_fw is high
4,334,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,119 UART: [idev] Erasing UDS.KEYID = 0
7,622,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,900 UART: [idev] --
7,647,760 UART: [ldev] ++
7,648,334 UART: [ldev] CDI.KEYID = 6
7,649,345 UART: [ldev] SUBJECT.KEYID = 5
7,650,492 UART: [ldev] AUTHORITY.KEYID = 7
7,651,791 UART: [ldev] FE.KEYID = 1
7,663,600 UART: [ldev] Erasing FE.KEYID = 1
10,955,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,725 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,986 UART: [ldev] --
13,315,922 UART: [fwproc] Waiting for Commands...
13,318,219 UART: [fwproc] Received command 0x46574c44
13,320,468 UART: [fwproc] Received Image of size 118548 bytes
17,426,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,495 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,568 >>> mbox cmd response: success
17,907,174 UART: [afmc] ++
17,907,842 UART: [afmc] CDI.KEYID = 6
17,908,731 UART: [afmc] SUBJECT.KEYID = 7
17,909,857 UART: [afmc] AUTHORITY.KEYID = 5
21,227,397 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,922 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,602 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,327 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,810 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,429 UART: [afmc] --
23,594,394 UART: [cold-reset] --
23,598,139 UART: [state] Locking Datavault
23,604,951 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,700 UART: [state] Locking ICCM
23,609,097 UART: [exit] Launching FMC @ 0x40000130
23,617,488 UART:
23,617,732 UART: Running Caliptra FMC ...
23,618,781 UART:
23,618,927 UART: [state] CFI Enabled
23,626,965 UART: [fht] FMC Alias Private Key: 7
25,967,365 UART: [art] Extend RT PCRs Done
25,968,586 UART: [art] Lock RT PCRs Done
25,969,832 UART: [art] Populate DV Done
25,975,344 UART: [fht] FMC Alias Private Key: 7
25,976,873 UART: [art] Derive CDI
25,977,681 UART: [art] Store in slot 0x4
26,020,055 UART: [art] Derive Key Pair
26,021,053 UART: [art] Store priv key in slot 0x5
29,263,071 UART: [art] Derive Key Pair - Done
29,275,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,186 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,695 UART: [art] PUB.X = DDEBBBBE2B88F91A87F9D03099AE138DE447F9C7CD78929E65093B0954523A2C014D32C4A7F42258C8FEA86DA42C2F3D
31,564,956 UART: [art] PUB.Y = E2FDE415718B408555B9585454741F00CA2E0FAB341A71E3237653FAEE744166B52D237E0F3A5580CFDDFF445FEBF07D
31,572,179 UART: [art] SIG.R = F41E40BD33006785123A1A3FDC9F37FC76D5104E28E29439573D22ACCCBD737D7B6F7A3512C9F115C3C259B0A8A65D0F
31,579,563 UART: [art] SIG.S = 11D2E4D761EDB4190C61A156DA054EE2BCFF2C5D1D8B1BBE905089E8331975A647C3B7BFA43289FFBF7F24494B78723C
32,884,667 UART: Caliptra RT
32,885,359 UART: [state] CFI Enabled
33,018,157 UART: [rt] RT listening for mailbox commands...
33,020,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,175,855 UART: [rt]cmd =0x41544d4e, len=14344
38,477,227 >>> mbox cmd response data (8 bytes)
38,477,841 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,508,776 UART: [rt]cmd =0x41545348, len=116
38,529,127 >>> mbox cmd response data (12 bytes)
38,529,979 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,560,546 UART: [rt]cmd =0x41545348, len=116
38,562,637 >>> mbox cmd response data (12 bytes)
40,637,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,788,098 UART:
40,788,469 UART: Running Caliptra ROM ...
40,789,597 UART:
40,789,765 UART: [state] CFI Enabled
40,805,754 UART: [state] LifecycleState = Unprovisioned
40,807,631 UART: [state] DebugLocked = No
40,810,302 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,814,760 UART: [kat] SHA2-256
40,984,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,995,014 UART: [kat] ++
40,995,500 UART: [kat] sha1
41,007,308 UART: [kat] SHA2-256
41,010,020 UART: [kat] SHA2-384
41,017,142 UART: [kat] SHA2-512-ACC
41,019,534 UART: [kat] ECC-384
43,303,219 UART: [kat] HMAC-384Kdf
43,315,620 UART: [kat] LMS
44,505,667 UART: [kat] --
44,511,356 UART: [update-reset] ++
48,699,919 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,704,510 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,102,276 >>> mbox cmd response: success
49,106,990 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,107,598 UART: [update-reset] Copying MAN_2 To MAN_1
49,125,290 UART: [update-reset Success] --
49,129,203 UART: [state] Locking Datavault
49,131,967 UART: [state] Locking PCR0, PCR1 and PCR31
49,133,661 UART: [state] Locking ICCM
49,136,179 UART: [exit] Launching FMC @ 0x40000130
49,144,622 UART:
49,144,860 UART: Running Caliptra FMC ...
49,145,954 UART:
49,146,106 UART: [state] CFI Enabled
49,190,153 UART: [art] Extend RT PCRs Done
49,191,341 UART: [art] Lock RT PCRs Done
49,192,953 UART: [art] Populate DV Done
49,198,301 UART: [fht] FMC Alias Private Key: 7
49,199,887 UART: [art] Derive CDI
49,200,640 UART: [art] Store in slot 0x4
49,243,014 UART: [art] Derive Key Pair
49,244,073 UART: [art] Store priv key in slot 0x5
52,485,546 UART: [art] Derive Key Pair - Done
52,498,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,778,996 UART: [art] Erasing AUTHORITY.KEYID = 7
54,780,500 UART: [art] PUB.X = 6C95D5A4EE1387CE0F7BCF89E4DE4811A10697095B43A9CE0703984A4CBE6E1FE2F9C5D9A8F60DB547106548CB0B61E9
54,787,800 UART: [art] PUB.Y = 65FE5404D48FE99EA3A9071E242123E065D76356AD4F17804D7C6423E4A4FEC6746DC5079638A65E006358E15C53D9AF
54,795,017 UART: [art] SIG.R = 71065F52315E30C31FBE8A63B739733DCB68B4ACAFF0117D404A30349D1D00D17070632DC6A1A8DFB7F47CA85A8683A4
54,802,403 UART: [art] SIG.S = 59C773EBDBDFAE654CEB6B9877F3BF1651B4B47CF4DE71DDE3D03976E96D6C13EC4F99B99AA5B9BAC89C98469110269F
56,107,499 UART: Caliptra RT
56,108,202 UART: [state] CFI Enabled
56,480,527 UART: [rt] RT listening for mailbox commands...
56,512,428 UART: [rt]cmd =0x41545348, len=116
56,532,850 >>> mbox cmd response data (12 bytes)
56,533,779 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
56,564,724 UART: [rt]cmd =0x41545348, len=116
56,566,782 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
60,626,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
60,781,942 UART: [rt]cmd =0x41544d4e, len=14344
66,081,879 >>> mbox cmd response data (8 bytes)
66,082,419 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,113,147 UART: [rt]cmd =0x41545348, len=116
66,133,327 >>> mbox cmd response data (12 bytes)
66,133,782 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,164,383 UART: [rt]cmd =0x41545348, len=116
66,166,566 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
4,128,935 ready_for_fw is high
4,129,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,099 >>> mbox cmd response: success
23,797,604 UART:
23,798,053 UART: Running Caliptra FMC ...
23,799,167 UART:
23,799,320 UART: [state] CFI Enabled
23,807,375 UART: [fht] FMC Alias Private Key: 7
26,147,249 UART: [art] Extend RT PCRs Done
26,148,473 UART: [art] Lock RT PCRs Done
26,150,124 UART: [art] Populate DV Done
26,155,800 UART: [fht] FMC Alias Private Key: 7
26,157,442 UART: [art] Derive CDI
26,158,174 UART: [art] Store in slot 0x4
26,200,490 UART: [art] Derive Key Pair
26,201,480 UART: [art] Store priv key in slot 0x5
29,443,298 UART: [art] Derive Key Pair - Done
29,455,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,674 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,186 UART: [art] PUB.X = D7DB1CFC631E7F014D341DCC7516FABBAD6890C274730D820F6B78D12B64ABD845CC697B38AA627A3C22044DCBF84F8A
31,744,433 UART: [art] PUB.Y = D0CB6B8ECE61D691650D4C434EBC3EBB0FE982B365747C2EAA01B546D2A4BAF2203516A7438C0B8B647C9E51B3FFCF77
31,751,725 UART: [art] SIG.R = 2EB6F5ED5184A7EFB6389AD559DD8139A697FBD1C578FB617CE6FF3072033592695D48B4C4D3D64E9D3F0D468636892B
31,759,070 UART: [art] SIG.S = A63A2F6A5FACBAD8F15810AAAA0F989762E8FCFD09BD3A1EEDE8C6696C9C4D3F8D1E669A01DB128941CF5E8C9F20207F
33,064,280 UART: Caliptra RT
33,064,997 UART: [state] CFI Enabled
33,197,956 UART: [rt] RT listening for mailbox commands...
33,200,371 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,355,620 UART: [rt]cmd =0x41544d4e, len=14344
38,656,398 >>> mbox cmd response data (8 bytes)
38,656,980 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,687,703 UART: [rt]cmd =0x41545348, len=116
38,707,901 >>> mbox cmd response data (12 bytes)
38,708,927 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,739,763 UART: [rt]cmd =0x41545348, len=116
38,741,918 >>> mbox cmd response data (12 bytes)
40,817,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,567,305 >>> mbox cmd response: success
49,567,917 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,602,392 UART:
49,602,718 UART: Running Caliptra FMC ...
49,603,838 UART:
49,603,998 UART: [state] CFI Enabled
49,648,429 UART: [art] Extend RT PCRs Done
49,649,578 UART: [art] Lock RT PCRs Done
49,650,881 UART: [art] Populate DV Done
49,656,394 UART: [fht] FMC Alias Private Key: 7
49,658,031 UART: [art] Derive CDI
49,658,852 UART: [art] Store in slot 0x4
49,701,022 UART: [art] Derive Key Pair
49,702,068 UART: [art] Store priv key in slot 0x5
52,944,431 UART: [art] Derive Key Pair - Done
52,956,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,237,152 UART: [art] Erasing AUTHORITY.KEYID = 7
55,238,656 UART: [art] PUB.X = 2EC4D8AA1F1E44018F90C6FD9393A3249F366A18756BFC8F1CA046E8816927343D0B9B6303062657A3CD19B047C34E9E
55,245,895 UART: [art] PUB.Y = EB22A05709BE9BA6F2EC91A4D4B447D1CD6186BCB2623425161327E11A1B208D6132957A614ACCD8D39260BE6A7665F7
55,253,120 UART: [art] SIG.R = D20CCE37AC2C47C93EEFB5CEB1600E9FA68B0174A85B602EAC8F8162D12C506DE58890093780C73C88DE50EDDB167DA4
55,260,567 UART: [art] SIG.S = 774DCE68616C66ACD35510F0A23389C76C79218A0DCE3B954B3CC3301BCFB50435C3B8991F7AB7E7CE0879731BE3468B
56,566,325 UART: Caliptra RT
56,567,023 UART: [state] CFI Enabled
56,939,194 UART: [rt] RT listening for mailbox commands...
56,971,076 UART: [rt]cmd =0x41545348, len=116
56,991,124 >>> mbox cmd response data (12 bytes)
56,991,829 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
57,022,776 UART: [rt]cmd =0x41545348, len=116
57,024,765 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
61,079,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
61,234,667 UART: [rt]cmd =0x41544d4e, len=14344
66,534,737 >>> mbox cmd response data (8 bytes)
66,535,297 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,565,876 UART: [rt]cmd =0x41545348, len=116
66,586,041 >>> mbox cmd response data (12 bytes)
66,586,473 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
66,617,229 UART: [rt]cmd =0x41545348, len=116
66,619,199 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,071 UART:
192,445 UART: Running Caliptra ROM ...
193,660 UART:
193,811 UART: [state] CFI Enabled
263,717 UART: [state] LifecycleState = Unprovisioned
265,635 UART: [state] DebugLocked = No
268,659 UART: [state] WD Timer not started. Device not locked for debugging
272,542 UART: [kat] SHA2-256
452,221 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,026 UART: [kat] ++
463,556 UART: [kat] sha1
473,940 UART: [kat] SHA2-256
476,660 UART: [kat] SHA2-384
483,422 UART: [kat] SHA2-512-ACC
485,781 UART: [kat] ECC-384
2,949,175 UART: [kat] HMAC-384Kdf
2,971,146 UART: [kat] LMS
3,447,584 UART: [kat] --
3,452,583 UART: [cold-reset] ++
3,453,592 UART: [fht] FHT @ 0x50003400
3,464,936 UART: [idev] ++
3,465,563 UART: [idev] CDI.KEYID = 6
3,466,440 UART: [idev] SUBJECT.KEYID = 7
3,467,747 UART: [idev] UDS.KEYID = 0
3,468,643 ready_for_fw is high
3,468,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,258 UART: [idev] Erasing UDS.KEYID = 0
5,988,095 UART: [idev] Sha1 KeyId Algorithm
6,011,325 UART: [idev] --
6,017,030 UART: [ldev] ++
6,017,611 UART: [ldev] CDI.KEYID = 6
6,018,548 UART: [ldev] SUBJECT.KEYID = 5
6,019,755 UART: [ldev] AUTHORITY.KEYID = 7
6,021,034 UART: [ldev] FE.KEYID = 1
6,057,774 UART: [ldev] Erasing FE.KEYID = 1
8,563,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,402 UART: [ldev] --
10,377,693 UART: [fwproc] Wait for Commands...
10,379,298 UART: [fwproc] Recv command 0x46574c44
10,381,329 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,990 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,996 >>> mbox cmd response: success
14,348,584 UART: [afmc] ++
14,349,178 UART: [afmc] CDI.KEYID = 6
14,350,146 UART: [afmc] SUBJECT.KEYID = 7
14,351,309 UART: [afmc] AUTHORITY.KEYID = 5
16,897,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,418 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,202 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,273 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,828 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,529 UART: [afmc] --
18,694,794 UART: [cold-reset] --
18,699,354 UART: [state] Locking Datavault
18,704,054 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,805 UART: [state] Locking ICCM
18,707,659 UART: [exit] Launching FMC @ 0x40000130
18,716,042 UART:
18,716,273 UART: Running Caliptra FMC ...
18,717,293 UART:
18,717,441 UART: [state] CFI Enabled
18,776,556 UART: [fht] FMC Alias Private Key: 7
20,542,743 UART: [art] Extend RT PCRs Done
20,543,957 UART: [art] Lock RT PCRs Done
20,545,387 UART: [art] Populate DV Done
20,550,742 UART: [fht] FMC Alias Private Key: 7
20,552,442 UART: [art] Derive CDI
20,553,177 UART: [art] Store in slot 0x4
20,609,185 UART: [art] Derive Key Pair
20,610,221 UART: [art] Store priv key in slot 0x5
23,073,311 UART: [art] Derive Key Pair - Done
23,086,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,171 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,675 UART: [art] PUB.X = 07FEA413274D7A58ACBAFA574C1AFCD76718187EFC80C15691AA3E22C9F9176ED3CC10FDCCE84A3BE56E64A366F3CA6E
24,808,004 UART: [art] PUB.Y = B7B488A74C741D15CE1C96F24C31DFE697BB961825258FB688F0EA4BE65016CF5C199D4A6F8E21F6E017DA52EB1785BD
24,815,255 UART: [art] SIG.R = 20ACAB614777C6234567EDAD3B30793A5DC2675781751BEEB45B684A894D3BE42F686B4F8623440F6D97EA6C6D9A05C7
24,822,654 UART: [art] SIG.S = 0FD10269121F9725D2AD2A5D4B2A04E45A05DB506A5A5C4B7C6D8D397E8F4EA3859BC6CAE397D28C67A807BE575542D4
25,801,838 UART: Caliptra RT
25,802,535 UART: [state] CFI Enabled
25,983,840 UART: [rt] RT listening for mailbox commands...
25,986,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,141,641 UART: [rt]cmd =0x41544d4e, len=14344
30,137,249 >>> mbox cmd response data (8 bytes)
30,138,596 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,169,509 UART: [rt]cmd =0x41545348, len=116
30,188,887 >>> mbox cmd response data (12 bytes)
30,190,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,221,174 UART: [rt]cmd =0x41545348, len=116
30,223,617 >>> mbox cmd response data (12 bytes)
32,299,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,451,172 UART:
32,452,122 UART: Running Caliptra ROM ...
32,453,199 UART:
32,453,356 UART: [state] CFI Enabled
32,512,610 UART: [state] LifecycleState = Unprovisioned
32,514,791 UART: [state] DebugLocked = No
32,516,876 UART: [state] WD Timer not started. Device not locked for debugging
32,520,519 UART: [kat] SHA2-256
32,700,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,710,977 UART: [kat] ++
32,711,463 UART: [kat] sha1
32,721,858 UART: [kat] SHA2-256
32,724,560 UART: [kat] SHA2-384
32,730,150 UART: [kat] SHA2-512-ACC
32,732,504 UART: [kat] ECC-384
35,197,986 UART: [kat] HMAC-384Kdf
35,222,983 UART: [kat] LMS
35,699,430 UART: [kat] --
35,703,485 UART: [update-reset] ++
39,204,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,208,376 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,606,034 >>> mbox cmd response: success
39,606,570 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,607,077 UART: [update-reset] Copying MAN_2 To MAN_1
39,643,934 UART: [update-reset Success] --
39,648,117 UART: [state] Locking Datavault
39,651,206 UART: [state] Locking PCR0, PCR1 and PCR31
39,652,955 UART: [state] Locking ICCM
39,655,790 UART: [exit] Launching FMC @ 0x40000130
39,664,132 UART:
39,664,365 UART: Running Caliptra FMC ...
39,665,483 UART:
39,665,646 UART: [state] CFI Enabled
39,756,055 UART: [art] Extend RT PCRs Done
39,757,245 UART: [art] Lock RT PCRs Done
39,758,700 UART: [art] Populate DV Done
39,764,318 UART: [fht] FMC Alias Private Key: 7
39,766,021 UART: [art] Derive CDI
39,766,794 UART: [art] Store in slot 0x4
39,825,214 UART: [art] Derive Key Pair
39,826,302 UART: [art] Store priv key in slot 0x5
42,291,112 UART: [art] Derive Key Pair - Done
42,303,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,017,246 UART: [art] Erasing AUTHORITY.KEYID = 7
44,018,771 UART: [art] PUB.X = 84351731A0C834A262A844C8C69EFE865EA27646472BE4F153E3E38E7A57F2F239B3590207115A7BFC9518D72A7BF4A2
44,026,020 UART: [art] PUB.Y = BCE26444802CFD2D72AF9DA6E397310C22E4CA1C1BD9C3F36DA1C339DBECE3FFAE931BCB7B5234C3AC7D8F1738A95006
44,033,365 UART: [art] SIG.R = 30CD5D59B6921CCBC33C859ED1AA1339B2082F217C192675EDA01EAEDECB5FAD002B77E93C5C25F098FD162174A3FF01
44,040,723 UART: [art] SIG.S = BB5DEE3D6F9D1D5BD619C7C3CAA176C83D066674E34B39D051CB142AA7E60A333E090614BEFCBAB6C197D5DCB0ED6F2A
45,020,221 UART: Caliptra RT
45,020,910 UART: [state] CFI Enabled
45,440,209 UART: [rt] RT listening for mailbox commands...
45,472,181 UART: [rt]cmd =0x41545348, len=116
45,492,551 >>> mbox cmd response data (12 bytes)
45,493,737 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,524,753 UART: [rt]cmd =0x41545348, len=116
45,526,675 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,556,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,712,558 UART: [rt]cmd =0x41544d4e, len=14344
53,707,873 >>> mbox cmd response data (8 bytes)
53,708,405 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,739,087 UART: [rt]cmd =0x41545348, len=116
53,759,241 >>> mbox cmd response data (12 bytes)
53,759,657 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,790,376 UART: [rt]cmd =0x41545348, len=116
53,792,331 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.01s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,461,644 ready_for_fw is high
3,462,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,554 >>> mbox cmd response: success
18,497,902 UART:
18,498,311 UART: Running Caliptra FMC ...
18,499,453 UART:
18,499,610 UART: [state] CFI Enabled
18,565,266 UART: [fht] FMC Alias Private Key: 7
20,331,401 UART: [art] Extend RT PCRs Done
20,332,624 UART: [art] Lock RT PCRs Done
20,334,359 UART: [art] Populate DV Done
20,339,813 UART: [fht] FMC Alias Private Key: 7
20,341,290 UART: [art] Derive CDI
20,342,045 UART: [art] Store in slot 0x4
20,397,691 UART: [art] Derive Key Pair
20,398,733 UART: [art] Store priv key in slot 0x5
22,861,701 UART: [art] Derive Key Pair - Done
22,874,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,588,132 UART: [art] Erasing AUTHORITY.KEYID = 7
24,589,638 UART: [art] PUB.X = E7AC0124AF991183DD964CDB38EAA306A5A69D1D89B3B51BFBC14E7449092105F7F4C9CA3EAF138F758BEC792CB60FA1
24,596,912 UART: [art] PUB.Y = 024D4D56D50BE09305564BEC13F33F7EC9A465F42A8CAC6102A945653E8102462CEB66F8FF299C5DF5E4D5EF91A9DDF0
24,604,169 UART: [art] SIG.R = F28DD9DB6CC420B7FF72C55BE3004A9A16DFC666B0941A7694BDBEC4ED2350C0B7875E5FE426F15C072C0238A9563CB3
24,611,604 UART: [art] SIG.S = AEFC586282144B0957ABD89DC835249CADA8EECF6E13E49AEBC5CE011881908E6AB2D7F28BEB7C5364B893057DD78E8E
25,590,385 UART: Caliptra RT
25,591,103 UART: [state] CFI Enabled
25,771,897 UART: [rt] RT listening for mailbox commands...
25,774,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,929,809 UART: [rt]cmd =0x41544d4e, len=14344
29,925,234 >>> mbox cmd response data (8 bytes)
29,925,832 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,956,578 UART: [rt]cmd =0x41545348, len=116
29,976,308 >>> mbox cmd response data (12 bytes)
29,977,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,008,237 UART: [rt]cmd =0x41545348, len=116
30,010,329 >>> mbox cmd response data (12 bytes)
32,066,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,369,840 >>> mbox cmd response: success
39,370,490 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,408,971 UART:
39,409,289 UART: Running Caliptra FMC ...
39,410,409 UART:
39,410,569 UART: [state] CFI Enabled
39,506,475 UART: [art] Extend RT PCRs Done
39,507,662 UART: [art] Lock RT PCRs Done
39,508,950 UART: [art] Populate DV Done
39,514,306 UART: [fht] FMC Alias Private Key: 7
39,516,000 UART: [art] Derive CDI
39,516,821 UART: [art] Store in slot 0x4
39,575,826 UART: [art] Derive Key Pair
39,576,864 UART: [art] Store priv key in slot 0x5
42,039,977 UART: [art] Derive Key Pair - Done
42,052,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,766,729 UART: [art] Erasing AUTHORITY.KEYID = 7
43,768,245 UART: [art] PUB.X = FD0140A056293533A9DF6CDFC79806D44890255C216097D078D82E1C376BFCCE979F578A05CA6E772305E8820BF66987
43,775,497 UART: [art] PUB.Y = 9A2110F33A364D06C15FC9E0DAD23C8A32B30A5249188CC3308B709B52FF903C06A06AEAB1A821E1DB61702885941916
43,782,685 UART: [art] SIG.R = B4D5852A64E5046B37FB8F5FE481AEB2D2C2336B7EA1406424AA4A3D59BB0E0BFA0EDC13A561EC5AFC777D32163E0219
43,790,129 UART: [art] SIG.S = 5127C072EE24BFE31BDCFC6DF056EC81F4B03C78FD84E7206C7157C21AA02D5C22E5CC63E5E05D85F92FA76D22447CF8
44,769,517 UART: Caliptra RT
44,770,258 UART: [state] CFI Enabled
45,188,089 UART: [rt] RT listening for mailbox commands...
45,219,863 UART: [rt]cmd =0x41545348, len=116
45,240,042 >>> mbox cmd response data (12 bytes)
45,240,992 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,271,890 UART: [rt]cmd =0x41545348, len=116
45,273,761 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,320,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,476,138 UART: [rt]cmd =0x41544d4e, len=14344
53,471,719 >>> mbox cmd response data (8 bytes)
53,472,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,502,961 UART: [rt]cmd =0x41545348, len=116
53,522,858 >>> mbox cmd response data (12 bytes)
53,523,306 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,554,067 UART: [rt]cmd =0x41545348, len=116
53,556,084 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,575 UART:
192,939 UART: Running Caliptra ROM ...
194,161 UART:
603,703 UART: [state] CFI Enabled
617,236 UART: [state] LifecycleState = Unprovisioned
619,220 UART: [state] DebugLocked = No
621,754 UART: [state] WD Timer not started. Device not locked for debugging
624,788 UART: [kat] SHA2-256
804,416 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,216 UART: [kat] ++
815,693 UART: [kat] sha1
826,003 UART: [kat] SHA2-256
828,747 UART: [kat] SHA2-384
835,235 UART: [kat] SHA2-512-ACC
837,605 UART: [kat] ECC-384
3,281,360 UART: [kat] HMAC-384Kdf
3,293,397 UART: [kat] LMS
3,769,923 UART: [kat] --
3,775,139 UART: [cold-reset] ++
3,777,787 UART: [fht] FHT @ 0x50003400
3,788,993 UART: [idev] ++
3,789,564 UART: [idev] CDI.KEYID = 6
3,790,474 UART: [idev] SUBJECT.KEYID = 7
3,791,727 UART: [idev] UDS.KEYID = 0
3,792,778 ready_for_fw is high
3,793,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,957 UART: [idev] Erasing UDS.KEYID = 0
6,265,142 UART: [idev] Sha1 KeyId Algorithm
6,289,486 UART: [idev] --
6,295,692 UART: [ldev] ++
6,296,280 UART: [ldev] CDI.KEYID = 6
6,297,215 UART: [ldev] SUBJECT.KEYID = 5
6,298,437 UART: [ldev] AUTHORITY.KEYID = 7
6,299,671 UART: [ldev] FE.KEYID = 1
6,311,000 UART: [ldev] Erasing FE.KEYID = 1
8,788,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,424 UART: [ldev] --
10,581,368 UART: [fwproc] Wait for Commands...
10,582,873 UART: [fwproc] Recv command 0x46574c44
10,584,915 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,438 >>> mbox cmd response: success
14,548,401 UART: [afmc] ++
14,549,014 UART: [afmc] CDI.KEYID = 6
14,549,904 UART: [afmc] SUBJECT.KEYID = 7
14,551,181 UART: [afmc] AUTHORITY.KEYID = 5
17,058,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,915 UART: [afmc] --
18,860,369 UART: [cold-reset] --
18,862,841 UART: [state] Locking Datavault
18,867,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,986 UART: [state] Locking ICCM
18,870,835 UART: [exit] Launching FMC @ 0x40000130
18,879,238 UART:
18,879,483 UART: Running Caliptra FMC ...
18,880,585 UART:
18,880,746 UART: [state] CFI Enabled
18,888,635 UART: [fht] FMC Alias Private Key: 7
20,655,060 UART: [art] Extend RT PCRs Done
20,656,258 UART: [art] Lock RT PCRs Done
20,657,745 UART: [art] Populate DV Done
20,663,264 UART: [fht] FMC Alias Private Key: 7
20,664,912 UART: [art] Derive CDI
20,665,652 UART: [art] Store in slot 0x4
20,708,354 UART: [art] Derive Key Pair
20,709,391 UART: [art] Store priv key in slot 0x5
23,135,936 UART: [art] Derive Key Pair - Done
23,148,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,345 UART: [art] PUB.X = 068CC8300B022D93C819CC56806B723F812B68A5EEA627603A33D82392BCBB507BCAE14B05DC63C2F3628AAE641B6339
24,863,591 UART: [art] PUB.Y = E3707BF82F6DFCB27AD7FC0D999919DBFEE2567635A2C7996CF0F41A8B65218CC9794D577D767EE9C07042F1B49BADD2
24,870,879 UART: [art] SIG.R = E8D1F94EB2A070B8A387D980D0B897BC8F87E865C59FD72C2243B9CA37601096F3831BF2C66D8C59C9E414C24DC6805A
24,878,279 UART: [art] SIG.S = AF09EAF87205B27A315698B9D03F3862B4284B6A709363085355A883E67BEB92E0CC8A9E591911180F2294AC08F03DA5
25,857,145 UART: Caliptra RT
25,857,851 UART: [state] CFI Enabled
25,990,476 UART: [rt] RT listening for mailbox commands...
25,992,871 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,148,473 UART: [rt]cmd =0x41544d4e, len=14344
30,144,360 >>> mbox cmd response data (8 bytes)
30,144,954 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,175,623 UART: [rt]cmd =0x41545348, len=116
30,195,437 >>> mbox cmd response data (12 bytes)
30,196,202 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,227,067 UART: [rt]cmd =0x41545348, len=116
30,228,945 >>> mbox cmd response data (12 bytes)
32,286,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,437,044 UART:
32,437,437 UART: Running Caliptra ROM ...
32,438,579 UART:
32,438,751 UART: [state] CFI Enabled
32,452,651 UART: [state] LifecycleState = Unprovisioned
32,454,586 UART: [state] DebugLocked = No
32,456,517 UART: [state] WD Timer not started. Device not locked for debugging
32,460,913 UART: [kat] SHA2-256
32,640,639 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,651,385 UART: [kat] ++
32,652,003 UART: [kat] sha1
32,662,852 UART: [kat] SHA2-256
32,665,552 UART: [kat] SHA2-384
32,670,515 UART: [kat] SHA2-512-ACC
32,672,860 UART: [kat] ECC-384
35,112,705 UART: [kat] HMAC-384Kdf
35,124,887 UART: [kat] LMS
35,601,303 UART: [kat] --
35,607,041 UART: [update-reset] ++
39,106,188 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,109,292 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,506,904 >>> mbox cmd response: success
39,507,334 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,508,210 UART: [update-reset] Copying MAN_2 To MAN_1
39,545,340 UART: [update-reset Success] --
39,548,177 UART: [state] Locking Datavault
39,550,859 UART: [state] Locking PCR0, PCR1 and PCR31
39,552,622 UART: [state] Locking ICCM
39,553,998 UART: [exit] Launching FMC @ 0x40000130
39,562,400 UART:
39,562,636 UART: Running Caliptra FMC ...
39,563,736 UART:
39,563,894 UART: [state] CFI Enabled
39,608,244 UART: [art] Extend RT PCRs Done
39,609,453 UART: [art] Lock RT PCRs Done
39,610,593 UART: [art] Populate DV Done
39,615,901 UART: [fht] FMC Alias Private Key: 7
39,617,547 UART: [art] Derive CDI
39,618,365 UART: [art] Store in slot 0x4
39,661,240 UART: [art] Derive Key Pair
39,662,333 UART: [art] Store priv key in slot 0x5
42,089,524 UART: [art] Derive Key Pair - Done
42,102,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,808,259 UART: [art] Erasing AUTHORITY.KEYID = 7
43,809,932 UART: [art] PUB.X = 2E4F45916BE1B75ED7150C6A5399D1D1A82152667CDD673F1383D7B2C5D0D052EBC746CDBBC511B5FC36FA52C62D0BA9
43,817,035 UART: [art] PUB.Y = C0B1CEA463040B88D193ED8F7E1D5EB30CE352BE65BAB30423B4BED0AA492FCC179885F31D333DD1E56B382EACC9E2F7
43,824,328 UART: [art] SIG.R = 6541496028380B68305389A641920C640D5D4455A1179A0F8AF8E04086E70B47DFF17D8D216E7EC31A8132F9459FC01F
43,831,667 UART: [art] SIG.S = 325A9B836577D8B61C13609E23F0281E751F88439630A7F8A3158CBA914927B1EA7609C4E389A89FA1593BB6CDD17370
44,811,259 UART: Caliptra RT
44,811,949 UART: [state] CFI Enabled
45,181,583 UART: [rt] RT listening for mailbox commands...
45,213,538 UART: [rt]cmd =0x41545348, len=116
45,233,225 >>> mbox cmd response data (12 bytes)
45,234,197 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,264,872 UART: [rt]cmd =0x41545348, len=116
45,267,264 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,314,918 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,470,536 UART: [rt]cmd =0x41544d4e, len=14344
53,465,682 >>> mbox cmd response data (8 bytes)
53,466,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,496,966 UART: [rt]cmd =0x41545348, len=116
53,517,344 >>> mbox cmd response data (12 bytes)
53,517,782 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,548,438 UART: [rt]cmd =0x41545348, len=116
53,550,520 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
3,779,551 ready_for_fw is high
3,779,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,425 >>> mbox cmd response: success
18,701,406 UART:
18,701,786 UART: Running Caliptra FMC ...
18,702,891 UART:
18,703,045 UART: [state] CFI Enabled
18,710,840 UART: [fht] FMC Alias Private Key: 7
20,476,255 UART: [art] Extend RT PCRs Done
20,477,482 UART: [art] Lock RT PCRs Done
20,479,245 UART: [art] Populate DV Done
20,484,490 UART: [fht] FMC Alias Private Key: 7
20,486,085 UART: [art] Derive CDI
20,486,825 UART: [art] Store in slot 0x4
20,529,874 UART: [art] Derive Key Pair
20,530,917 UART: [art] Store priv key in slot 0x5
22,958,260 UART: [art] Derive Key Pair - Done
22,971,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,077 UART: [art] PUB.X = 9AF59A6787FC28A412CE12DDA373345D33FD6370028ABCC316AACB1040C79F12402CC868A487771846146D5B00CD5659
24,686,284 UART: [art] PUB.Y = 8720C2A034A7DB9A357D33C73AFA3B77C91D98B5B1A945B9F76EB8A001C05AEEDEE81B7201000B41FD24C296F175278B
24,693,538 UART: [art] SIG.R = 1CDDE3777F039399D9CD88054F9022B779D87C651671E6D2B45A0FE59622877C4AF30100EAAE188EB0862D5DE708F481
24,700,895 UART: [art] SIG.S = 0709243822E98C47099F3549F8D5065F202E7D35813C1BF7B22C373DAD53B3C36A33E9D9CF3E6C1CB6DC7B3E503E0C22
25,680,025 UART: Caliptra RT
25,680,736 UART: [state] CFI Enabled
25,813,837 UART: [rt] RT listening for mailbox commands...
25,816,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,971,420 UART: [rt]cmd =0x41544d4e, len=14344
29,966,392 >>> mbox cmd response data (8 bytes)
29,966,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,997,664 UART: [rt]cmd =0x41545348, len=116
30,017,905 >>> mbox cmd response data (12 bytes)
30,019,290 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,050,211 UART: [rt]cmd =0x41545348, len=116
30,052,575 >>> mbox cmd response data (12 bytes)
32,107,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,336,684 >>> mbox cmd response: success
39,337,281 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,371,822 UART:
39,372,129 UART: Running Caliptra FMC ...
39,373,251 UART:
39,373,411 UART: [state] CFI Enabled
39,417,493 UART: [art] Extend RT PCRs Done
39,418,685 UART: [art] Lock RT PCRs Done
39,420,205 UART: [art] Populate DV Done
39,425,508 UART: [fht] FMC Alias Private Key: 7
39,427,152 UART: [art] Derive CDI
39,427,893 UART: [art] Store in slot 0x4
39,470,501 UART: [art] Derive Key Pair
39,471,542 UART: [art] Store priv key in slot 0x5
41,898,371 UART: [art] Derive Key Pair - Done
41,911,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,617,772 UART: [art] Erasing AUTHORITY.KEYID = 7
43,619,418 UART: [art] PUB.X = 3C2605E4CA8F83BFB310008F5EF12058EEC61C8CEB57C26B7B9C9A0166AB9DDC52D1B298B4B716F48F01FC72BB0715CC
43,626,572 UART: [art] PUB.Y = 87C1614DB983276D7FE901AA4CE1EEB186FD481072CBA0499C93CA8EFADBCF481164B55783EFF0EB340CCFEE05BAE46A
43,633,845 UART: [art] SIG.R = B53CF50E1891B9B933A64D22ABCBF17E8D0ACF989CDF940004F157D969F7A5CEA0D7384BD08AA0133D65B4A2FB6EBC0E
43,641,251 UART: [art] SIG.S = C48B75C68B740169C6428A9F59C4A8D2C9E54D3C4F73E0D8ED82679431A760483A8C86570C8F8E587D7B7A7552DCCC20
44,620,384 UART: Caliptra RT
44,621,079 UART: [state] CFI Enabled
44,991,433 UART: [rt] RT listening for mailbox commands...
45,023,414 UART: [rt]cmd =0x41545348, len=116
45,043,381 >>> mbox cmd response data (12 bytes)
45,044,203 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,074,854 UART: [rt]cmd =0x41545348, len=116
45,077,195 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
49,105,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
49,261,333 UART: [rt]cmd =0x41544d4e, len=14344
53,256,691 >>> mbox cmd response data (8 bytes)
53,257,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,287,933 UART: [rt]cmd =0x41545348, len=116
53,307,708 >>> mbox cmd response data (12 bytes)
53,308,176 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,339,003 UART: [rt]cmd =0x41545348, len=116
53,341,093 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,092 UART:
192,460 UART: Running Caliptra ROM ...
193,652 UART:
193,800 UART: [state] CFI Enabled
263,824 UART: [state] LifecycleState = Unprovisioned
266,243 UART: [state] DebugLocked = No
268,061 UART: [state] WD Timer not started. Device not locked for debugging
272,865 UART: [kat] SHA2-256
462,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,483 UART: [kat] ++
473,938 UART: [kat] sha1
485,139 UART: [kat] SHA2-256
488,156 UART: [kat] SHA2-384
494,002 UART: [kat] SHA2-512-ACC
496,585 UART: [kat] ECC-384
2,951,776 UART: [kat] HMAC-384Kdf
2,973,170 UART: [kat] LMS
3,504,916 UART: [kat] --
3,508,062 UART: [cold-reset] ++
3,510,627 UART: [fht] FHT @ 0x50003400
3,521,260 UART: [idev] ++
3,521,960 UART: [idev] CDI.KEYID = 6
3,522,908 UART: [idev] SUBJECT.KEYID = 7
3,524,025 UART: [idev] UDS.KEYID = 0
3,525,008 ready_for_fw is high
3,525,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,352 UART: [idev] Erasing UDS.KEYID = 0
6,031,073 UART: [idev] Sha1 KeyId Algorithm
6,054,142 UART: [idev] --
6,059,328 UART: [ldev] ++
6,060,320 UART: [ldev] CDI.KEYID = 6
6,061,250 UART: [ldev] SUBJECT.KEYID = 5
6,062,359 UART: [ldev] AUTHORITY.KEYID = 7
6,063,533 UART: [ldev] FE.KEYID = 1
6,101,169 UART: [ldev] Erasing FE.KEYID = 1
8,609,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,027 UART: [ldev] --
10,414,829 UART: [fwproc] Wait for Commands...
10,417,081 UART: [fwproc] Recv command 0x46574c44
10,419,331 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,836 >>> mbox cmd response: success
14,686,719 UART: [afmc] ++
14,687,425 UART: [afmc] CDI.KEYID = 6
14,688,532 UART: [afmc] SUBJECT.KEYID = 7
14,690,073 UART: [afmc] AUTHORITY.KEYID = 5
17,218,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,221 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,411 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,283 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,139 UART: [afmc] --
19,034,336 UART: [cold-reset] --
19,036,852 UART: [state] Locking Datavault
19,042,163 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,369 UART: [state] Locking ICCM
19,046,396 UART: [exit] Launching FMC @ 0x40000130
19,055,067 UART:
19,055,300 UART: Running Caliptra FMC ...
19,056,324 UART:
19,056,469 UART: [state] CFI Enabled
19,117,122 UART: [fht] FMC Alias Private Key: 7
20,903,946 UART: [art] Extend RT PCRs Done
20,905,161 UART: [art] Lock RT PCRs Done
20,906,545 UART: [art] Populate DV Done
20,911,793 UART: [fht] FMC Alias Private Key: 7
20,913,440 UART: [art] Derive CDI
20,914,177 UART: [art] Store in slot 0x4
20,970,657 UART: [art] Derive Key Pair
20,971,707 UART: [art] Store priv key in slot 0x5
23,434,590 UART: [art] Derive Key Pair - Done
23,447,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,997 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,494 UART: [art] PUB.X = E33657EA866FD2EB770F5A507B11E03D7756D1C12821D0680282DE3B8666060598817298C286F8E80C4F7C67FAAFDA21
25,168,709 UART: [art] PUB.Y = 39BC97472078C9696FFB09CE9634A1135F7C626A7676020364DCDC1B48BD1FCC8BC054A1AB139E28309956B52B5EF287
25,176,010 UART: [art] SIG.R = 8678E3A3F82387F4248B63C690CDCC1BAEFF27955268178559B2964EFCAB2417B013D214D2C089FFEBF6A03B27BB9868
25,183,424 UART: [art] SIG.S = C2B50B17DA49B57B3C0549C582A1CDED1D1E81C1C41871A44A2607E5DDFBD290A91DB983462ABD61DA3B206A7FCE139C
26,161,866 UART: Caliptra RT
26,162,563 UART: [state] CFI Enabled
26,343,069 UART: [rt] RT listening for mailbox commands...
26,345,483 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,500,733 UART: [rt]cmd =0x41544d4e, len=14344
30,496,284 >>> mbox cmd response data (8 bytes)
30,496,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,527,434 UART: [rt]cmd =0x41545348, len=116
30,547,624 >>> mbox cmd response data (12 bytes)
30,548,405 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,579,134 UART: [rt]cmd =0x41545348, len=116
30,581,179 >>> mbox cmd response data (12 bytes)
32,646,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,796,845 UART:
32,797,232 UART: Running Caliptra ROM ...
32,798,282 UART:
32,798,432 UART: [state] CFI Enabled
32,856,897 UART: [state] LifecycleState = Unprovisioned
32,858,956 UART: [state] DebugLocked = No
32,861,322 UART: [state] WD Timer not started. Device not locked for debugging
32,865,005 UART: [kat] SHA2-256
33,054,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,065,641 UART: [kat] ++
33,066,102 UART: [kat] sha1
33,077,533 UART: [kat] SHA2-256
33,080,552 UART: [kat] SHA2-384
33,087,782 UART: [kat] SHA2-512-ACC
33,090,364 UART: [kat] ECC-384
35,539,649 UART: [kat] HMAC-384Kdf
35,564,565 UART: [kat] LMS
36,096,147 UART: [kat] --
36,103,009 UART: [update-reset] ++
39,615,887 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,619,475 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,249,171 >>> mbox cmd response: success
40,253,835 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,254,422 UART: [update-reset] Copying MAN_2 To MAN_1
40,288,588 UART: [update-reset Success] --
40,292,545 UART: [state] Locking Datavault
40,296,462 UART: [state] Locking PCR0, PCR1 and PCR31
40,298,645 UART: [state] Locking ICCM
40,300,744 UART: [exit] Launching FMC @ 0x40000130
40,309,353 UART:
40,309,651 UART: Running Caliptra FMC ...
40,310,879 UART:
40,311,035 UART: [state] CFI Enabled
40,416,926 UART: [art] Extend RT PCRs Done
40,418,116 UART: [art] Lock RT PCRs Done
40,419,518 UART: [art] Populate DV Done
40,425,351 UART: [fht] FMC Alias Private Key: 7
40,426,988 UART: [art] Derive CDI
40,427,794 UART: [art] Store in slot 0x4
40,486,184 UART: [art] Derive Key Pair
40,487,287 UART: [art] Store priv key in slot 0x5
42,949,403 UART: [art] Derive Key Pair - Done
42,962,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,675,218 UART: [art] Erasing AUTHORITY.KEYID = 7
44,676,718 UART: [art] PUB.X = 15AE74829686CE17CEA0C13E1A8A5EC42B4D4B2E4E06705170A45F31C2D71B73CD42C6F7EB074AFA981E8100AD205E4D
44,683,964 UART: [art] PUB.Y = 782884B79F688B998760E0B4AECF1B8AC1C349F6B82C2A57AC0020433F05884C725EE2D437A21A44FC52654A9FAA41AA
44,691,252 UART: [art] SIG.R = 27440AF0C971DA3A3EC5159F0D50CDB0BA9BBAC90A05168D83458306D11D38F6F3E744AB080770CD402C5EF13C82E496
44,698,634 UART: [art] SIG.S = E23387E4F51DDECDC6D50625F128BE4F623A2D5BB08C16CEA570C787A0B54831687E912FF6D460B5FA3ED153DB684BD0
45,677,589 UART: Caliptra RT
45,678,300 UART: [state] CFI Enabled
46,095,984 UART: [rt] RT listening for mailbox commands...
46,127,847 UART: [rt]cmd =0x41545348, len=116
46,147,634 >>> mbox cmd response data (12 bytes)
46,148,550 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,179,340 UART: [rt]cmd =0x41545348, len=116
46,181,378 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,222,751 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,378,235 UART: [rt]cmd =0x41544d4e, len=14344
54,373,855 >>> mbox cmd response data (8 bytes)
54,374,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,405,161 UART: [rt]cmd =0x41545348, len=116
54,424,573 >>> mbox cmd response data (12 bytes)
54,425,003 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,455,608 UART: [rt]cmd =0x41545348, len=116
54,457,792 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.04s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,435,818 ready_for_fw is high
3,436,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,848,072 >>> mbox cmd response: success
19,129,643 UART:
19,130,057 UART: Running Caliptra FMC ...
19,131,189 UART:
19,131,349 UART: [state] CFI Enabled
19,201,003 UART: [fht] FMC Alias Private Key: 7
20,967,588 UART: [art] Extend RT PCRs Done
20,968,812 UART: [art] Lock RT PCRs Done
20,970,170 UART: [art] Populate DV Done
20,975,745 UART: [fht] FMC Alias Private Key: 7
20,977,222 UART: [art] Derive CDI
20,977,959 UART: [art] Store in slot 0x4
21,033,939 UART: [art] Derive Key Pair
21,034,986 UART: [art] Store priv key in slot 0x5
23,497,891 UART: [art] Derive Key Pair - Done
23,510,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,073 UART: [art] PUB.X = B800DDE682C99944E1796AF8EAEB3464601A61D9C87B31A614397A1393D27044E3D43584FA7146C8BB5B0B80BC399421
25,232,308 UART: [art] PUB.Y = 656AB2E0CFEABC39BA1875C1803B2F564EFE70460DF80A97051BDB4928A50A2B0A4FEEC26B02122F596A3FB91B06E605
25,239,553 UART: [art] SIG.R = 1CBE8A8BE10F45E93D27708059E2C3431BC3E7E97D30BCBDA26D3411FD743226D7FAA41EB713CBC005F832C3EFE41F98
25,246,990 UART: [art] SIG.S = 66C2F8F71A13CDFF0D893E943661C553E978F9ABB1A279C1098BA4B9A442ED11C34D3A99FA332B2C42BA9D658126FF73
26,225,969 UART: Caliptra RT
26,226,683 UART: [state] CFI Enabled
26,406,354 UART: [rt] RT listening for mailbox commands...
26,408,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,563,939 UART: [rt]cmd =0x41544d4e, len=14344
30,559,582 >>> mbox cmd response data (8 bytes)
30,560,159 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,591,177 UART: [rt]cmd =0x41545348, len=116
30,610,441 >>> mbox cmd response data (12 bytes)
30,611,350 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,642,044 UART: [rt]cmd =0x41545348, len=116
30,644,396 >>> mbox cmd response data (12 bytes)
32,708,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,615,994 >>> mbox cmd response: success
40,616,620 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,651,633 UART:
40,651,959 UART: Running Caliptra FMC ...
40,653,044 UART:
40,653,221 UART: [state] CFI Enabled
40,757,667 UART: [art] Extend RT PCRs Done
40,758,857 UART: [art] Lock RT PCRs Done
40,760,260 UART: [art] Populate DV Done
40,765,996 UART: [fht] FMC Alias Private Key: 7
40,767,748 UART: [art] Derive CDI
40,768,559 UART: [art] Store in slot 0x4
40,827,137 UART: [art] Derive Key Pair
40,828,217 UART: [art] Store priv key in slot 0x5
43,291,609 UART: [art] Derive Key Pair - Done
43,304,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,016,744 UART: [art] Erasing AUTHORITY.KEYID = 7
45,018,254 UART: [art] PUB.X = 86D76739EB43623C4F86BF544BE9FB18427D3C2FCA21C33C1E6A48994C0F8D2771DA2CAC94CABE0828495B480A178A62
45,025,522 UART: [art] PUB.Y = 4124FE1DB05FB80FE72EEB82D02412F539B8F25EFD17FE3C137F613573CC26CAC35CBA8CF6248540360364F4424BBF65
45,032,817 UART: [art] SIG.R = 9246828D3F9121CE27E3FD3E57745F0E8848B978B94425256B4C1D202B4250C0A3F6F067E050CC3EB5612AA4C267814D
45,040,218 UART: [art] SIG.S = FD2BF919E5A5FFA79F367077A331E2B553AC6E1E17A17FF1EBEC8B09FCE2DF0B5F2C2B407361107A944442BCE4DCD07C
46,018,891 UART: Caliptra RT
46,019,595 UART: [state] CFI Enabled
46,438,827 UART: [rt] RT listening for mailbox commands...
46,470,932 UART: [rt]cmd =0x41545348, len=116
46,490,187 >>> mbox cmd response data (12 bytes)
46,491,082 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,521,922 UART: [rt]cmd =0x41545348, len=116
46,524,180 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,564,301 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,719,978 UART: [rt]cmd =0x41544d4e, len=14344
54,715,764 >>> mbox cmd response data (8 bytes)
54,716,273 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,746,893 UART: [rt]cmd =0x41545348, len=116
54,767,246 >>> mbox cmd response data (12 bytes)
54,767,684 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,798,365 UART: [rt]cmd =0x41545348, len=116
54,800,508 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.06s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,502 UART:
192,881 UART: Running Caliptra ROM ...
194,100 UART:
603,637 UART: [state] CFI Enabled
617,468 UART: [state] LifecycleState = Unprovisioned
619,778 UART: [state] DebugLocked = No
622,306 UART: [state] WD Timer not started. Device not locked for debugging
627,061 UART: [kat] SHA2-256
816,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,683 UART: [kat] ++
828,293 UART: [kat] sha1
839,462 UART: [kat] SHA2-256
842,474 UART: [kat] SHA2-384
847,761 UART: [kat] SHA2-512-ACC
850,348 UART: [kat] ECC-384
3,291,625 UART: [kat] HMAC-384Kdf
3,304,837 UART: [kat] LMS
3,836,647 UART: [kat] --
3,841,456 UART: [cold-reset] ++
3,843,957 UART: [fht] FHT @ 0x50003400
3,855,450 UART: [idev] ++
3,856,195 UART: [idev] CDI.KEYID = 6
3,857,089 UART: [idev] SUBJECT.KEYID = 7
3,858,340 UART: [idev] UDS.KEYID = 0
3,859,246 ready_for_fw is high
3,859,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,338 UART: [idev] Erasing UDS.KEYID = 0
6,332,648 UART: [idev] Sha1 KeyId Algorithm
6,354,173 UART: [idev] --
6,360,009 UART: [ldev] ++
6,360,696 UART: [ldev] CDI.KEYID = 6
6,361,758 UART: [ldev] SUBJECT.KEYID = 5
6,362,866 UART: [ldev] AUTHORITY.KEYID = 7
6,364,064 UART: [ldev] FE.KEYID = 1
6,376,987 UART: [ldev] Erasing FE.KEYID = 1
8,855,000 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,929 UART: [ldev] --
10,646,900 UART: [fwproc] Wait for Commands...
10,648,778 UART: [fwproc] Recv command 0x46574c44
10,651,091 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,636 >>> mbox cmd response: success
14,920,809 UART: [afmc] ++
14,921,537 UART: [afmc] CDI.KEYID = 6
14,922,737 UART: [afmc] SUBJECT.KEYID = 7
14,924,190 UART: [afmc] AUTHORITY.KEYID = 5
17,423,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,978 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,022 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,172 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,112 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,202 UART: [afmc] --
19,223,355 UART: [cold-reset] --
19,228,158 UART: [state] Locking Datavault
19,233,760 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,921 UART: [state] Locking ICCM
19,238,061 UART: [exit] Launching FMC @ 0x40000130
19,246,756 UART:
19,247,011 UART: Running Caliptra FMC ...
19,248,121 UART:
19,248,279 UART: [state] CFI Enabled
19,256,439 UART: [fht] FMC Alias Private Key: 7
21,022,636 UART: [art] Extend RT PCRs Done
21,023,861 UART: [art] Lock RT PCRs Done
21,025,250 UART: [art] Populate DV Done
21,030,669 UART: [fht] FMC Alias Private Key: 7
21,032,321 UART: [art] Derive CDI
21,033,066 UART: [art] Store in slot 0x4
21,075,775 UART: [art] Derive Key Pair
21,076,824 UART: [art] Store priv key in slot 0x5
23,503,863 UART: [art] Derive Key Pair - Done
23,516,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,195 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,704 UART: [art] PUB.X = 653F200D72EAFADFA7ED7DAC3FB7F700BC99F5D31E6575F85761553C8BCC4B631E8DCB2E0B689351EDEB350E850EC1E7
25,232,045 UART: [art] PUB.Y = E8DFC32A063CE1F5F26CBD554438ED5082687938794A65FDF960F171D283A54C619008890C61FC95D2A1C6F33CEFCADB
25,239,253 UART: [art] SIG.R = CE201986CDD4522D5B567487A9A56A415EF3952A419E46BF1155E45926D077FC7A8A954ECE1FD3F1D45F03E16A51057B
25,246,618 UART: [art] SIG.S = B957D5D7DCC4FE302C0F86AB273FFBE8FA2EB8A328E81B577FA3D22AE663396189BCDA80B1F0C2D629FE4729219E6B36
26,225,370 UART: Caliptra RT
26,226,084 UART: [state] CFI Enabled
26,358,226 UART: [rt] RT listening for mailbox commands...
26,360,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,515,756 UART: [rt]cmd =0x41544d4e, len=14344
30,511,626 >>> mbox cmd response data (8 bytes)
30,512,228 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,542,745 UART: [rt]cmd =0x41545348, len=116
30,562,451 >>> mbox cmd response data (12 bytes)
30,563,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,594,049 UART: [rt]cmd =0x41545348, len=116
30,596,296 >>> mbox cmd response data (12 bytes)
32,665,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,815,751 UART:
32,816,115 UART: Running Caliptra ROM ...
32,817,174 UART:
32,817,385 UART: [state] CFI Enabled
32,832,909 UART: [state] LifecycleState = Unprovisioned
32,834,745 UART: [state] DebugLocked = No
32,836,216 UART: [state] WD Timer not started. Device not locked for debugging
32,840,149 UART: [kat] SHA2-256
33,030,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,040,840 UART: [kat] ++
33,041,298 UART: [kat] sha1
33,052,642 UART: [kat] SHA2-256
33,055,621 UART: [kat] SHA2-384
33,062,415 UART: [kat] SHA2-512-ACC
33,064,996 UART: [kat] ECC-384
35,506,233 UART: [kat] HMAC-384Kdf
35,517,658 UART: [kat] LMS
36,049,276 UART: [kat] --
36,054,905 UART: [update-reset] ++
39,572,432 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,575,549 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,205,286 >>> mbox cmd response: success
40,210,142 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,210,754 UART: [update-reset] Copying MAN_2 To MAN_1
40,243,324 UART: [update-reset Success] --
40,248,556 UART: [state] Locking Datavault
40,252,252 UART: [state] Locking PCR0, PCR1 and PCR31
40,254,678 UART: [state] Locking ICCM
40,257,193 UART: [exit] Launching FMC @ 0x40000130
40,265,875 UART:
40,266,123 UART: Running Caliptra FMC ...
40,267,230 UART:
40,267,389 UART: [state] CFI Enabled
40,311,568 UART: [art] Extend RT PCRs Done
40,312,715 UART: [art] Lock RT PCRs Done
40,314,487 UART: [art] Populate DV Done
40,320,109 UART: [fht] FMC Alias Private Key: 7
40,321,645 UART: [art] Derive CDI
40,322,462 UART: [art] Store in slot 0x4
40,365,215 UART: [art] Derive Key Pair
40,366,325 UART: [art] Store priv key in slot 0x5
42,793,227 UART: [art] Derive Key Pair - Done
42,806,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,512,626 UART: [art] Erasing AUTHORITY.KEYID = 7
44,514,227 UART: [art] PUB.X = 70C45A75C77B521AEB3D1AA9B70CD12CB3D148A2CE42C27221AADE759E0F7B391EE3AE45177FF3855A92A5C4A4BDCD02
44,521,454 UART: [art] PUB.Y = A062EEE277234267FCD8EADB61050B60953B8AAABB9FE5D4A9FE2F181E43A7FC24301B56BE19330359B8BDA875D0BFF4
44,528,705 UART: [art] SIG.R = 9D41B706B98A9088AC547F28A641C886A3534A21DBF32540026CF0B58E80EF2CF810623615C984291D4E4936123D9461
44,536,116 UART: [art] SIG.S = 18071DE92CAF2C77D5CF15DFAB84926E3EB8C12E6073D72DD2A469E167500804DFEDA67402857C35618F5D0D6A9372C3
45,515,514 UART: Caliptra RT
45,516,223 UART: [state] CFI Enabled
45,885,015 UART: [rt] RT listening for mailbox commands...
45,916,947 UART: [rt]cmd =0x41545348, len=116
45,937,452 >>> mbox cmd response data (12 bytes)
45,938,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
45,969,188 UART: [rt]cmd =0x41545348, len=116
45,971,689 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,020,969 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,176,577 UART: [rt]cmd =0x41544d4e, len=14344
54,171,591 >>> mbox cmd response data (8 bytes)
54,172,134 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,202,716 UART: [rt]cmd =0x41545348, len=116
54,223,104 >>> mbox cmd response data (12 bytes)
54,223,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,254,290 UART: [rt]cmd =0x41545348, len=116
54,256,518 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
3,753,723 ready_for_fw is high
3,754,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,527 >>> mbox cmd response: success
19,307,107 UART:
19,307,498 UART: Running Caliptra FMC ...
19,308,626 UART:
19,308,782 UART: [state] CFI Enabled
19,316,356 UART: [fht] FMC Alias Private Key: 7
21,081,892 UART: [art] Extend RT PCRs Done
21,083,125 UART: [art] Lock RT PCRs Done
21,084,656 UART: [art] Populate DV Done
21,090,027 UART: [fht] FMC Alias Private Key: 7
21,091,596 UART: [art] Derive CDI
21,092,374 UART: [art] Store in slot 0x4
21,134,645 UART: [art] Derive Key Pair
21,135,688 UART: [art] Store priv key in slot 0x5
23,563,455 UART: [art] Derive Key Pair - Done
23,576,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,624 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,135 UART: [art] PUB.X = 6211F73670F37104EF0B6EF95F96EACC92CB7D0D2C4081CCDC5089C1A10DD3C1940D23F56B39E26B5ED3DFB50CC67109
25,291,406 UART: [art] PUB.Y = 64509E408532EEA032B689176B9535BE4A61F6DA6E84253E908464F378618981A47C9F399484C524517A719AA708BA60
25,298,640 UART: [art] SIG.R = 3C9AEDCB51B3F6010A18F8A92536B5A35485DF39100CCB1520787C4EAA832A2ED41797696D4B31A0EAAF8120DDCF4A9D
25,306,064 UART: [art] SIG.S = F569BF3CDB3A2EAE63574DE28FFA89AE175DCB7FC7C47D51D2DD119CAE85122B87928F6BF8E07246D215ADA189EC2158
26,284,519 UART: Caliptra RT
26,285,230 UART: [state] CFI Enabled
26,417,863 UART: [rt] RT listening for mailbox commands...
26,420,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,575,642 UART: [rt]cmd =0x41544d4e, len=14344
30,571,219 >>> mbox cmd response data (8 bytes)
30,571,841 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,602,738 UART: [rt]cmd =0x41545348, len=116
30,623,039 >>> mbox cmd response data (12 bytes)
30,624,023 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,654,985 UART: [rt]cmd =0x41545348, len=116
30,657,121 >>> mbox cmd response data (12 bytes)
32,720,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,540,696 >>> mbox cmd response: success
40,541,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,574,783 UART:
40,575,135 UART: Running Caliptra FMC ...
40,576,272 UART:
40,576,438 UART: [state] CFI Enabled
40,620,631 UART: [art] Extend RT PCRs Done
40,621,787 UART: [art] Lock RT PCRs Done
40,623,404 UART: [art] Populate DV Done
40,628,828 UART: [fht] FMC Alias Private Key: 7
40,630,355 UART: [art] Derive CDI
40,631,137 UART: [art] Store in slot 0x4
40,673,840 UART: [art] Derive Key Pair
40,674,843 UART: [art] Store priv key in slot 0x5
43,101,744 UART: [art] Derive Key Pair - Done
43,114,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,820,667 UART: [art] Erasing AUTHORITY.KEYID = 7
44,822,174 UART: [art] PUB.X = 46AF05967732B4046DF214B12E72476B8989FE2C3429DB71AE372B702AA045D82AA2C495B0A071A6B687F77CB0FF1792
44,829,446 UART: [art] PUB.Y = 488D5804850D0CF424CE8BC0AC0402393A85C983FF939EA06DA17148BF9BB41FADD9D5EE5EC61D9BCE3D8224A9F0B6E9
44,836,713 UART: [art] SIG.R = 7BDDE7A76B884AD8E0628F7F0E8C969762DF391E97B1AE334631709061C08D922C61B8B5B9C93A93706D5FF323931375
44,844,080 UART: [art] SIG.S = FCC4C28B3C71A43F60AB5CB83A38E812E860294302465AE0D4B5D9CC546FB42F552AF3E205A0D1D91066CC64CBFCD359
45,822,445 UART: Caliptra RT
45,823,161 UART: [state] CFI Enabled
46,195,475 UART: [rt] RT listening for mailbox commands...
46,227,326 UART: [rt]cmd =0x41545348, len=116
46,247,263 >>> mbox cmd response data (12 bytes)
46,248,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
46,279,038 UART: [rt]cmd =0x41545348, len=116
46,281,300 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
50,331,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
50,487,191 UART: [rt]cmd =0x41544d4e, len=14344
54,482,528 >>> mbox cmd response data (8 bytes)
54,483,084 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,513,793 UART: [rt]cmd =0x41545348, len=116
54,534,147 >>> mbox cmd response data (12 bytes)
54,534,579 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
54,565,090 UART: [rt]cmd =0x41545348, len=116
54,567,217 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,463 UART: [kat] SHA2-256
892,401 UART: [kat] SHA2-384
895,044 UART: [kat] SHA2-512-ACC
896,945 UART: [kat] ECC-384
902,540 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,193 UART: [cold-reset] ++
1,476,521 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 ready_for_fw is high
1,480,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,300 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,858 UART: [idev] --
1,514,889 UART: [ldev] ++
1,515,057 UART: [ldev] CDI.KEYID = 6
1,515,420 UART: [ldev] SUBJECT.KEYID = 5
1,515,846 UART: [ldev] AUTHORITY.KEYID = 7
1,516,309 UART: [ldev] FE.KEYID = 1
1,521,759 UART: [ldev] Erasing FE.KEYID = 1
1,546,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,764 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,756 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,828 UART: [fwproc] Received command 0x46574c44
1,587,619 UART: [fwproc] Received Image of size 118548 bytes
2,932,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,825 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,310 >>> mbox cmd response: success
3,133,370 UART: [afmc] ++
3,133,538 UART: [afmc] CDI.KEYID = 6
3,133,900 UART: [afmc] SUBJECT.KEYID = 7
3,134,325 UART: [afmc] AUTHORITY.KEYID = 5
3,169,106 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,220 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,000 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,592 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,275 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,071 UART: [afmc] --
3,212,197 UART: [cold-reset] --
3,212,979 UART: [state] Locking Datavault
3,214,188 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,792 UART: [state] Locking ICCM
3,215,454 UART: [exit] Launching FMC @ 0x40000130
3,220,784 UART:
3,220,800 UART: Running Caliptra FMC ...
3,221,208 UART:
3,221,262 UART: [state] CFI Enabled
3,231,362 UART: [fht] FMC Alias Private Key: 7
3,350,436 UART: [art] Extend RT PCRs Done
3,350,864 UART: [art] Lock RT PCRs Done
3,352,286 UART: [art] Populate DV Done
3,360,773 UART: [fht] FMC Alias Private Key: 7
3,361,871 UART: [art] Derive CDI
3,362,151 UART: [art] Store in slot 0x4
3,447,759 UART: [art] Derive Key Pair
3,448,119 UART: [art] Store priv key in slot 0x5
3,461,564 UART: [art] Derive Key Pair - Done
3,476,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,624 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,389 UART: [art] PUB.X = C893E7B698337A882ADFFB563F82588050FCF1A6F8B3F8D557169A933E12075C4C576D0E2E01AB758B76030AAE3EF217
3,499,148 UART: [art] PUB.Y = 322957B1AC581C77CFFD73131F533F53AC3B001A8485485FF6D377634E6C1825588739EB7060D4C38D81DCD4FD0109A7
3,506,068 UART: [art] SIG.R = 53A8B0C728D67DADFE014E15FB47BBDBFA46CF540AAC5BDF26BB7F00C25E04A5DBB11BBD886317DC61437F5762EE185D
3,512,833 UART: [art] SIG.S = 1BAD27C015A3330B5F82B7AE74F65DF470A0B4A9F14E95391D08F734E8C7424E4C53798CDD9E2DC5C4D3B922DA3DA0AE
3,535,817 UART: Caliptra RT
3,536,068 UART: [state] CFI Enabled
3,655,205 UART: [rt] RT listening for mailbox commands...
3,655,875 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,067 UART: [rt]cmd =0x41544d4e, len=14344
4,089,011 >>> mbox cmd response data (8 bytes)
4,089,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,081 UART: [rt]cmd =0x41545348, len=116
4,141,546 >>> mbox cmd response data (12 bytes)
4,141,547 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,596 UART: [rt]cmd =0x41545348, len=116
4,173,177 >>> mbox cmd response data (12 bytes)
4,173,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,232 UART:
4,174,248 UART: Running Caliptra ROM ...
4,174,656 UART:
4,174,710 UART: [state] CFI Enabled
4,177,150 UART: [state] LifecycleState = Unprovisioned
4,177,805 UART: [state] DebugLocked = No
4,178,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,179,922 UART: [kat] SHA2-256
4,973,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,977,968 UART: [kat] ++
4,978,120 UART: [kat] sha1
4,982,450 UART: [kat] SHA2-256
4,984,388 UART: [kat] SHA2-384
4,987,225 UART: [kat] SHA2-512-ACC
4,989,125 UART: [kat] ECC-384
4,994,392 UART: [kat] HMAC-384Kdf
4,999,082 UART: [kat] LMS
5,567,278 UART: [kat] --
5,568,411 UART: [update-reset] ++
6,949,077 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,950,333 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,105,600 >>> mbox cmd response: success
7,105,600 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,105,761 UART: [update-reset] Copying MAN_2 To MAN_1
7,113,775 UART: [update-reset Success] --
7,114,840 UART: [state] Locking Datavault
7,115,758 UART: [state] Locking PCR0, PCR1 and PCR31
7,116,362 UART: [state] Locking ICCM
7,116,834 UART: [exit] Launching FMC @ 0x40000130
7,122,164 UART:
7,122,180 UART: Running Caliptra FMC ...
7,122,588 UART:
7,122,642 UART: [state] CFI Enabled
7,212,603 UART: [art] Extend RT PCRs Done
7,213,031 UART: [art] Lock RT PCRs Done
7,214,350 UART: [art] Populate DV Done
7,222,819 UART: [fht] FMC Alias Private Key: 7
7,223,807 UART: [art] Derive CDI
7,224,087 UART: [art] Store in slot 0x4
7,309,923 UART: [art] Derive Key Pair
7,310,283 UART: [art] Store priv key in slot 0x5
7,323,178 UART: [art] Derive Key Pair - Done
7,337,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,353,394 UART: [art] Erasing AUTHORITY.KEYID = 7
7,354,159 UART: [art] PUB.X = 6BF756E18ED32AA9180F0ABFDC155D6A597014F4CC8E67742218C9F91C768FD2D7EBE24DDC27CED1456DE4E3FE41D278
7,360,941 UART: [art] PUB.Y = 44F4886118E0C5983C74B51908F1223C2DFB225531A8CBF19520EA89501F907E3ED31F92479A5F498D5CB22515E02A1A
7,367,884 UART: [art] SIG.R = F7CC353EB7EE2E7F7DC80633423D4C623CD28EF03D9966EFA999F5F55968505DDEB5F407052C760498EC7CF2DFC36AF2
7,374,656 UART: [art] SIG.S = 7D3ADD27FF526D4AE4507FAEADF25C54FA526828D3FFAF5483D62E4B4A3DBC1EB8598220EA21C629A594E1464DA1D01C
7,398,490 UART: Caliptra RT
7,398,741 UART: [state] CFI Enabled
7,765,610 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,687 UART: [rt]cmd =0x41545348, len=116
7,818,089 >>> mbox cmd response data (12 bytes)
7,818,090 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,848,101 UART: [rt]cmd =0x41545348, len=116
7,850,126 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,850,127 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,972,618 UART: [rt]cmd =0x41544d4e, len=14344
8,282,670 >>> mbox cmd response data (8 bytes)
8,282,671 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,312,852 UART: [rt]cmd =0x41545348, len=116
8,335,665 >>> mbox cmd response data (12 bytes)
8,335,666 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,365,861 UART: [rt]cmd =0x41545348, len=116
8,367,797 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 ready_for_fw is high
1,362,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,928 >>> mbox cmd response: success
3,041,311 UART:
3,041,327 UART: Running Caliptra FMC ...
3,041,735 UART:
3,041,789 UART: [state] CFI Enabled
3,052,403 UART: [fht] FMC Alias Private Key: 7
3,171,305 UART: [art] Extend RT PCRs Done
3,171,733 UART: [art] Lock RT PCRs Done
3,173,161 UART: [art] Populate DV Done
3,181,468 UART: [fht] FMC Alias Private Key: 7
3,182,492 UART: [art] Derive CDI
3,182,772 UART: [art] Store in slot 0x4
3,268,470 UART: [art] Derive Key Pair
3,268,830 UART: [art] Store priv key in slot 0x5
3,282,249 UART: [art] Derive Key Pair - Done
3,296,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,099 UART: [art] PUB.X = F74D013D208C838A152EF3533B33DAC9B5E8CE0B1AD5F45E4D9D4BE4BF60E6660508AA4601044E985077B54F2C87657C
3,319,857 UART: [art] PUB.Y = A4C885E14E35FB29EB4CB8932DCF72E4E02E4D8945DF010DBA7B3923ABD4AA88349CB541B0D1EDB86F7F6C876FB2DF10
3,326,823 UART: [art] SIG.R = 8C516A655C22A8F20A434AF69A5DFAACEF17B4D1447B4E21461CEF298BFCF28590993B22F2586FC8F0840207108AF57F
3,333,592 UART: [art] SIG.S = 7F42D7938FB68339A93F6E022FBE7509491E2AF6A340B834CF818F889C8E698AD7BCE9B6395C07359441964156400F30
3,357,300 UART: Caliptra RT
3,357,551 UART: [state] CFI Enabled
3,477,429 UART: [rt] RT listening for mailbox commands...
3,478,099 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,149 UART: [rt]cmd =0x41544d4e, len=14344
3,911,215 >>> mbox cmd response data (8 bytes)
3,911,216 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,357 UART: [rt]cmd =0x41545348, len=116
3,963,088 >>> mbox cmd response data (12 bytes)
3,963,089 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,234 UART: [rt]cmd =0x41545348, len=116
3,994,895 >>> mbox cmd response data (12 bytes)
3,994,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,809,054 >>> mbox cmd response: success
6,809,054 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,822,474 UART:
6,822,490 UART: Running Caliptra FMC ...
6,822,898 UART:
6,822,952 UART: [state] CFI Enabled
6,911,493 UART: [art] Extend RT PCRs Done
6,911,921 UART: [art] Lock RT PCRs Done
6,913,182 UART: [art] Populate DV Done
6,921,139 UART: [fht] FMC Alias Private Key: 7
6,922,173 UART: [art] Derive CDI
6,922,453 UART: [art] Store in slot 0x4
7,008,497 UART: [art] Derive Key Pair
7,008,857 UART: [art] Store priv key in slot 0x5
7,022,446 UART: [art] Derive Key Pair - Done
7,037,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,052,511 UART: [art] Erasing AUTHORITY.KEYID = 7
7,053,276 UART: [art] PUB.X = F60EBC7F90B1EDED87B51DE7204A907B3B679642392D7960BC34D9C4804C9315E52FA1D817C798A51D37851B6E852456
7,060,043 UART: [art] PUB.Y = 0904B67B8C3D132A4D3AFD2A6C91195320F9B0ADF6A1072A44E82E60938E44D1157987A2159F057E0F66B49BAF7A9693
7,066,978 UART: [art] SIG.R = DCA9E8B7202E8CDE23C98EF63272FE7D6FA04C1F8181D3E13C734D70D1BAE59D3E007E87FBCDDD5055E398073977ED0C
7,073,738 UART: [art] SIG.S = 4BE3F5B71E067E81DC996047D575D9787FB8543D17322EAC2B342EE515CBDF1EF4DA9B7031E8435A91895606288845D3
7,097,922 UART: Caliptra RT
7,098,173 UART: [state] CFI Enabled
7,462,264 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,493,285 UART: [rt]cmd =0x41545348, len=116
7,515,249 >>> mbox cmd response data (12 bytes)
7,515,250 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,545,431 UART: [rt]cmd =0x41545348, len=116
7,547,288 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,547,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,669,874 UART: [rt]cmd =0x41544d4e, len=14344
7,979,936 >>> mbox cmd response data (8 bytes)
7,979,937 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,009,716 UART: [rt]cmd =0x41545348, len=116
8,031,555 >>> mbox cmd response data (12 bytes)
8,031,556 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,061,613 UART: [rt]cmd =0x41545348, len=116
8,063,171 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.69s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,526 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,238 UART: [kat] SHA2-256
882,169 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,284 UART: [kat] ++
886,436 UART: [kat] sha1
890,788 UART: [kat] SHA2-256
892,726 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
903,019 UART: [kat] HMAC-384Kdf
907,747 UART: [kat] LMS
1,475,943 UART: [kat] --
1,476,956 UART: [cold-reset] ++
1,477,448 UART: [fht] Storing FHT @ 0x50003400
1,480,293 UART: [idev] ++
1,480,461 UART: [idev] CDI.KEYID = 6
1,480,821 UART: [idev] SUBJECT.KEYID = 7
1,481,245 UART: [idev] UDS.KEYID = 0
1,481,590 ready_for_fw is high
1,481,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,338 UART: [ldev] ++
1,515,506 UART: [ldev] CDI.KEYID = 6
1,515,869 UART: [ldev] SUBJECT.KEYID = 5
1,516,295 UART: [ldev] AUTHORITY.KEYID = 7
1,516,758 UART: [ldev] FE.KEYID = 1
1,522,016 UART: [ldev] Erasing FE.KEYID = 1
1,547,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,981 UART: [fwproc] Received command 0x46574c44
1,588,772 UART: [fwproc] Received Image of size 118548 bytes
2,933,424 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,218 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,436 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,631 >>> mbox cmd response: success
3,133,851 UART: [afmc] ++
3,134,019 UART: [afmc] CDI.KEYID = 6
3,134,381 UART: [afmc] SUBJECT.KEYID = 7
3,134,806 UART: [afmc] AUTHORITY.KEYID = 5
3,170,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,870 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,753 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,436 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,244 UART: [afmc] --
3,213,308 UART: [cold-reset] --
3,214,028 UART: [state] Locking Datavault
3,215,049 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,653 UART: [state] Locking ICCM
3,216,073 UART: [exit] Launching FMC @ 0x40000130
3,221,403 UART:
3,221,419 UART: Running Caliptra FMC ...
3,221,827 UART:
3,221,970 UART: [state] CFI Enabled
3,232,590 UART: [fht] FMC Alias Private Key: 7
3,351,930 UART: [art] Extend RT PCRs Done
3,352,358 UART: [art] Lock RT PCRs Done
3,353,964 UART: [art] Populate DV Done
3,361,977 UART: [fht] FMC Alias Private Key: 7
3,362,983 UART: [art] Derive CDI
3,363,263 UART: [art] Store in slot 0x4
3,448,917 UART: [art] Derive Key Pair
3,449,277 UART: [art] Store priv key in slot 0x5
3,463,184 UART: [art] Derive Key Pair - Done
3,478,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,248 UART: [art] PUB.X = 8E8C4E818681998BD530F572DE03B5F6AAFD484DDACCF4E9665F1D81A2305EC315F6087DEBD67342EA62D798CED0281E
3,501,026 UART: [art] PUB.Y = E987500DDD247CDAFFF089DF2D6218640A44FD39DDCF65D8935C71A55169A2AE9B093B0CC03F34774B574E23A233BDD0
3,507,976 UART: [art] SIG.R = 8EF6983590899709A9AB984BA29FD6112EFDDCF39FC1B9C54709215D9F9C8EB1DB6B0DC00A6062B61FD7A1BB9AEE0031
3,514,728 UART: [art] SIG.S = 85796110A0880A42E01B49ECEB7635D7E8AB05371895CD83A7B996A6E9F299BC419A168322BA688E825C6009CFB805C2
3,538,578 UART: Caliptra RT
3,538,921 UART: [state] CFI Enabled
3,659,238 UART: [rt] RT listening for mailbox commands...
3,659,908 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,974 UART: [rt]cmd =0x41544d4e, len=14344
4,093,232 >>> mbox cmd response data (8 bytes)
4,093,233 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,510 UART: [rt]cmd =0x41545348, len=116
4,145,011 >>> mbox cmd response data (12 bytes)
4,145,012 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,175,031 UART: [rt]cmd =0x41545348, len=116
4,176,780 >>> mbox cmd response data (12 bytes)
4,176,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,177,463 UART:
4,177,479 UART: Running Caliptra ROM ...
4,177,887 UART:
4,178,028 UART: [state] CFI Enabled
4,180,946 UART: [state] LifecycleState = Unprovisioned
4,181,601 UART: [state] DebugLocked = No
4,182,175 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,183,838 UART: [kat] SHA2-256
4,977,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,981,884 UART: [kat] ++
4,982,036 UART: [kat] sha1
4,986,146 UART: [kat] SHA2-256
4,988,084 UART: [kat] SHA2-384
4,990,741 UART: [kat] SHA2-512-ACC
4,992,641 UART: [kat] ECC-384
4,998,260 UART: [kat] HMAC-384Kdf
5,003,042 UART: [kat] LMS
5,571,238 UART: [kat] --
5,572,195 UART: [update-reset] ++
6,952,871 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,954,063 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,109,330 >>> mbox cmd response: success
7,109,330 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,109,619 UART: [update-reset] Copying MAN_2 To MAN_1
7,117,633 UART: [update-reset Success] --
7,118,500 UART: [state] Locking Datavault
7,119,396 UART: [state] Locking PCR0, PCR1 and PCR31
7,120,000 UART: [state] Locking ICCM
7,120,566 UART: [exit] Launching FMC @ 0x40000130
7,125,896 UART:
7,125,912 UART: Running Caliptra FMC ...
7,126,320 UART:
7,126,463 UART: [state] CFI Enabled
7,215,212 UART: [art] Extend RT PCRs Done
7,215,640 UART: [art] Lock RT PCRs Done
7,216,805 UART: [art] Populate DV Done
7,225,004 UART: [fht] FMC Alias Private Key: 7
7,226,128 UART: [art] Derive CDI
7,226,408 UART: [art] Store in slot 0x4
7,312,356 UART: [art] Derive Key Pair
7,312,716 UART: [art] Store priv key in slot 0x5
7,325,651 UART: [art] Derive Key Pair - Done
7,340,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,355,859 UART: [art] Erasing AUTHORITY.KEYID = 7
7,356,624 UART: [art] PUB.X = 3B964BDDC95FC6AC3C32D914724A0B5DB2EAFAE7405EE05C7222FF5920E2A7AB8C6C3F0F02C6F70DDC5E90998130B4DA
7,363,404 UART: [art] PUB.Y = 482971CD5713A2A90BDB799687A2027F80CDB70DFAE21994F4A032E125E54C3637F0905BD67FE46DF70E8C9DE8FDD1E5
7,370,352 UART: [art] SIG.R = DAF37587CA7D1ED0946DB0A18AF37A730A0EEC0C60788BE093F694FBE973AE4A8508AD54A131A8B9FC768D2A08CE22CD
7,377,127 UART: [art] SIG.S = 2E7F3FE1BB382F0F4E63B4D0310997EA8B7AC9B25B3002CA1891F9A37086150ED378028CD169DC0360BE2462F0434066
7,400,455 UART: Caliptra RT
7,400,798 UART: [state] CFI Enabled
7,765,555 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,614 UART: [rt]cmd =0x41545348, len=116
7,818,596 >>> mbox cmd response data (12 bytes)
7,818,597 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,848,584 UART: [rt]cmd =0x41545348, len=116
7,850,267 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,850,268 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,972,801 UART: [rt]cmd =0x41544d4e, len=14344
8,282,099 >>> mbox cmd response data (8 bytes)
8,282,100 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,312,225 UART: [rt]cmd =0x41545348, len=116
8,334,562 >>> mbox cmd response data (12 bytes)
8,334,563 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,364,564 UART: [rt]cmd =0x41545348, len=116
8,366,256 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,158 ready_for_fw is high
1,363,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,327 >>> mbox cmd response: success
3,044,168 UART:
3,044,184 UART: Running Caliptra FMC ...
3,044,592 UART:
3,044,735 UART: [state] CFI Enabled
3,055,047 UART: [fht] FMC Alias Private Key: 7
3,174,151 UART: [art] Extend RT PCRs Done
3,174,579 UART: [art] Lock RT PCRs Done
3,176,321 UART: [art] Populate DV Done
3,184,632 UART: [fht] FMC Alias Private Key: 7
3,185,712 UART: [art] Derive CDI
3,185,992 UART: [art] Store in slot 0x4
3,271,958 UART: [art] Derive Key Pair
3,272,318 UART: [art] Store priv key in slot 0x5
3,285,301 UART: [art] Derive Key Pair - Done
3,300,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,221 UART: [art] PUB.X = CB4BDA08974F7A66D19DBCD24E178CCDB3330417F49FFEE616293E43ACC7F2E44A7FA10857D63F2E01E6AA3EF74E9AF9
3,323,001 UART: [art] PUB.Y = 8E64B8395532A5BC48A14C09D078F83888BA297BA0345EC60845A633C569417363D744A3E6394441A0FC540FEE99B929
3,329,934 UART: [art] SIG.R = E3C47486B0D446C4491AB6B19972619DCA52FBDDDF90474434C18D502DF254F8F7FE904F89309818A2F2DE2D2F6DB5D6
3,336,712 UART: [art] SIG.S = 5A729D1DF499FBED3DB9497A4F15A11A1D8865E7C759D8583D03BB10BB0C0A1881EB902AFE4D699DB7411657FCC83A62
3,360,991 UART: Caliptra RT
3,361,334 UART: [state] CFI Enabled
3,481,678 UART: [rt] RT listening for mailbox commands...
3,482,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,372 UART: [rt]cmd =0x41544d4e, len=14344
3,914,954 >>> mbox cmd response data (8 bytes)
3,914,955 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,140 UART: [rt]cmd =0x41545348, len=116
3,967,257 >>> mbox cmd response data (12 bytes)
3,967,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,383 UART: [rt]cmd =0x41545348, len=116
3,998,956 >>> mbox cmd response data (12 bytes)
3,998,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,813,332 >>> mbox cmd response: success
6,813,332 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,826,754 UART:
6,826,770 UART: Running Caliptra FMC ...
6,827,178 UART:
6,827,321 UART: [state] CFI Enabled
6,916,958 UART: [art] Extend RT PCRs Done
6,917,386 UART: [art] Lock RT PCRs Done
6,918,563 UART: [art] Populate DV Done
6,926,860 UART: [fht] FMC Alias Private Key: 7
6,927,942 UART: [art] Derive CDI
6,928,222 UART: [art] Store in slot 0x4
7,013,722 UART: [art] Derive Key Pair
7,014,082 UART: [art] Store priv key in slot 0x5
7,028,299 UART: [art] Derive Key Pair - Done
7,042,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,058,413 UART: [art] Erasing AUTHORITY.KEYID = 7
7,059,178 UART: [art] PUB.X = 65AA43999F5D3DD0F13FA277CC9FEEA933DC9076A686E91108E19150DF721F0AE31287DD0BB0286D2F3B9134C6CB41E9
7,065,949 UART: [art] PUB.Y = 6BE87669A0C0E446BBCB5324B1BEB62BD7952525464CF1ABD3C414EEB9B760A6BC03E8B9DFA530E3A10CB9AE158A3F5E
7,072,915 UART: [art] SIG.R = EF3B33AE0C4A75E05429119C7C99056337B19F60991A0BD5B0045442BF2B1EBF2C441801276511493FE5DD22DE16009B
7,079,646 UART: [art] SIG.S = 355C43B3E9A4203E8E3514124B6E8307A266C0C9CF97DE991D7CB12A974CED78AF20AB975AF664B8D38851109084F603
7,103,372 UART: Caliptra RT
7,103,715 UART: [state] CFI Enabled
7,466,542 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,497,309 UART: [rt]cmd =0x41545348, len=116
7,519,397 >>> mbox cmd response data (12 bytes)
7,519,398 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,487 UART: [rt]cmd =0x41545348, len=116
7,551,308 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,551,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,673,760 UART: [rt]cmd =0x41544d4e, len=14344
7,983,700 >>> mbox cmd response data (8 bytes)
7,983,701 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,013,704 UART: [rt]cmd =0x41545348, len=116
8,035,485 >>> mbox cmd response data (12 bytes)
8,035,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,065,769 UART: [rt]cmd =0x41545348, len=116
8,067,179 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,137 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
891,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,144 UART: [kat] ++
895,296 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
916,079 UART: [kat] HMAC-384Kdf
920,631 UART: [kat] LMS
1,168,943 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,420 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 ready_for_fw is high
1,174,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,201 UART: [idev] Erasing UDS.KEYID = 0
1,199,449 UART: [idev] Sha1 KeyId Algorithm
1,208,245 UART: [idev] --
1,209,250 UART: [ldev] ++
1,209,418 UART: [ldev] CDI.KEYID = 6
1,209,782 UART: [ldev] SUBJECT.KEYID = 5
1,210,209 UART: [ldev] AUTHORITY.KEYID = 7
1,210,672 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,241,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,820 UART: [ldev] --
1,281,095 UART: [fwproc] Wait for Commands...
1,281,710 UART: [fwproc] Recv command 0x46574c44
1,282,443 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,087 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,262 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,579 >>> mbox cmd response: success
2,826,761 UART: [afmc] ++
2,826,929 UART: [afmc] CDI.KEYID = 6
2,827,292 UART: [afmc] SUBJECT.KEYID = 7
2,827,718 UART: [afmc] AUTHORITY.KEYID = 5
2,863,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,555 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,265 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,847 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,590 UART: [afmc] --
2,906,441 UART: [cold-reset] --
2,907,201 UART: [state] Locking Datavault
2,908,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,996 UART: [state] Locking ICCM
2,909,524 UART: [exit] Launching FMC @ 0x40000130
2,914,854 UART:
2,914,870 UART: Running Caliptra FMC ...
2,915,278 UART:
2,915,332 UART: [state] CFI Enabled
2,925,430 UART: [fht] FMC Alias Private Key: 7
3,044,334 UART: [art] Extend RT PCRs Done
3,044,762 UART: [art] Lock RT PCRs Done
3,046,326 UART: [art] Populate DV Done
3,054,311 UART: [fht] FMC Alias Private Key: 7
3,055,271 UART: [art] Derive CDI
3,055,551 UART: [art] Store in slot 0x4
3,142,030 UART: [art] Derive Key Pair
3,142,390 UART: [art] Store priv key in slot 0x5
3,155,308 UART: [art] Derive Key Pair - Done
3,170,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,782 UART: [art] PUB.X = B1C1E55CA6AE90248A93E86337EBFBF86DE94B25A57E78A31041B52582478890E222847CCF136083127E7F628218B925
3,193,546 UART: [art] PUB.Y = 1884A8C01243E1CA3023287C00FBB9F47C803828EE07289D022D4FC4B4834BC360FD68997C82100B3C912DDF2E736E3B
3,200,465 UART: [art] SIG.R = F53358A29C6AFE7779DD9FA5E2F14BFC79EDA7C0377A2D381BCE7AD6B0434B650E38662F8033233B08B91F9B5C752EA1
3,207,241 UART: [art] SIG.S = 8351E8F07878B09F984439D9F856E1A12208DA59DE1FD54D2E71DC824ECE65A49F95AD8FD267C8A3E22CCA9DDC87172E
3,231,330 UART: Caliptra RT
3,231,581 UART: [state] CFI Enabled
3,350,251 UART: [rt] RT listening for mailbox commands...
3,350,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,997 UART: [rt]cmd =0x41544d4e, len=14344
3,783,873 >>> mbox cmd response data (8 bytes)
3,783,874 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,895 UART: [rt]cmd =0x41545348, len=116
3,835,718 >>> mbox cmd response data (12 bytes)
3,835,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,812 UART: [rt]cmd =0x41545348, len=116
3,867,437 >>> mbox cmd response data (12 bytes)
3,867,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,059 UART:
3,868,075 UART: Running Caliptra ROM ...
3,868,483 UART:
3,868,538 UART: [state] CFI Enabled
3,870,704 UART: [state] LifecycleState = Unprovisioned
3,871,359 UART: [state] DebugLocked = No
3,872,031 UART: [state] WD Timer not started. Device not locked for debugging
3,873,303 UART: [kat] SHA2-256
4,676,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,680,957 UART: [kat] ++
4,681,109 UART: [kat] sha1
4,685,427 UART: [kat] SHA2-256
4,687,367 UART: [kat] SHA2-384
4,689,936 UART: [kat] SHA2-512-ACC
4,691,836 UART: [kat] ECC-384
4,701,423 UART: [kat] HMAC-384Kdf
4,706,035 UART: [kat] LMS
4,954,347 UART: [kat] --
4,955,061 UART: [update-reset] ++
6,313,640 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,314,601 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,469,816 >>> mbox cmd response: success
6,469,816 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,470,137 UART: [update-reset] Copying MAN_2 To MAN_1
6,478,151 UART: [update-reset Success] --
6,479,038 UART: [state] Locking Datavault
6,479,890 UART: [state] Locking PCR0, PCR1 and PCR31
6,480,494 UART: [state] Locking ICCM
6,481,032 UART: [exit] Launching FMC @ 0x40000130
6,486,362 UART:
6,486,378 UART: Running Caliptra FMC ...
6,486,786 UART:
6,486,840 UART: [state] CFI Enabled
6,576,679 UART: [art] Extend RT PCRs Done
6,577,107 UART: [art] Lock RT PCRs Done
6,578,304 UART: [art] Populate DV Done
6,586,593 UART: [fht] FMC Alias Private Key: 7
6,587,625 UART: [art] Derive CDI
6,587,905 UART: [art] Store in slot 0x4
6,673,206 UART: [art] Derive Key Pair
6,673,566 UART: [art] Store priv key in slot 0x5
6,685,448 UART: [art] Derive Key Pair - Done
6,700,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,715,689 UART: [art] Erasing AUTHORITY.KEYID = 7
6,716,454 UART: [art] PUB.X = 855BAF26414567711E80F4672DBCE8B95CE1984D28BEC952B4B81C98B665D00C5470C8D7B819A8BFC2AA6B0871DDE2AA
6,723,230 UART: [art] PUB.Y = 4FD1DA99A4A4EB54091CDD082F079B08D49C0940B427B48BB2DB676275D108505D70B2683C2B6722E05BAEDDB68BB0CF
6,730,174 UART: [art] SIG.R = 20C3A82D6C79D7B16A04C22220731EEB17DC74B6EC7804106CD3F51C4059DF31DB88238BE6B4C2C80BD838F0216636D2
6,736,939 UART: [art] SIG.S = 1FDF553EBBF106275628C052529C6EF8D233C6B23CBF6D851D567738850E79C9844D873DBC350ED4EEA319B0A9C8A382
6,761,042 UART: Caliptra RT
6,761,293 UART: [state] CFI Enabled
7,124,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,154,725 UART: [rt]cmd =0x41545348, len=116
7,176,871 >>> mbox cmd response data (12 bytes)
7,176,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,207,093 UART: [rt]cmd =0x41545348, len=116
7,208,998 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,208,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,331,640 UART: [rt]cmd =0x41544d4e, len=14344
7,641,890 >>> mbox cmd response data (8 bytes)
7,641,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,672,020 UART: [rt]cmd =0x41545348, len=116
7,693,941 >>> mbox cmd response data (12 bytes)
7,693,942 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,723,915 UART: [rt]cmd =0x41545348, len=116
7,725,811 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,056 ready_for_fw is high
1,059,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,802 >>> mbox cmd response: success
2,741,325 UART:
2,741,341 UART: Running Caliptra FMC ...
2,741,749 UART:
2,741,803 UART: [state] CFI Enabled
2,752,333 UART: [fht] FMC Alias Private Key: 7
2,871,511 UART: [art] Extend RT PCRs Done
2,871,939 UART: [art] Lock RT PCRs Done
2,873,417 UART: [art] Populate DV Done
2,881,378 UART: [fht] FMC Alias Private Key: 7
2,882,402 UART: [art] Derive CDI
2,882,682 UART: [art] Store in slot 0x4
2,968,341 UART: [art] Derive Key Pair
2,968,701 UART: [art] Store priv key in slot 0x5
2,982,241 UART: [art] Derive Key Pair - Done
2,997,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,914 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,679 UART: [art] PUB.X = 98F8C16F5645FAD15D554E8ECB00D50135911D354AAF44FA48345FB1217496BD1F59FEC0DB75BB2DE2D1574220C6898E
3,020,432 UART: [art] PUB.Y = C4003B1412DA081213A252C0E5853D858A1E89690F1B24A0A488B3930428484942899AB0DE3B509059A59EB62FE04D76
3,027,341 UART: [art] SIG.R = 342E532C7FC2200EE9680B2FFA6CF9D6F5BA22479612341F4DC93F870EF86DBC675FFE3407D288F565D5ADB257E9EDB5
3,034,113 UART: [art] SIG.S = AC447641BD6EDB6EBC857106587A6B485C016ED48EA8E4956C57A6C5DDB25A240B5AD37ED20604C786B238277C58E28F
3,057,772 UART: Caliptra RT
3,058,023 UART: [state] CFI Enabled
3,177,310 UART: [rt] RT listening for mailbox commands...
3,177,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,336 UART: [rt]cmd =0x41544d4e, len=14344
3,611,190 >>> mbox cmd response data (8 bytes)
3,611,191 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,356 UART: [rt]cmd =0x41545348, len=116
3,663,571 >>> mbox cmd response data (12 bytes)
3,663,572 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,719 UART: [rt]cmd =0x41545348, len=116
3,695,708 >>> mbox cmd response data (12 bytes)
3,695,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,184,399 >>> mbox cmd response: success
6,184,399 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,197,622 UART:
6,197,638 UART: Running Caliptra FMC ...
6,198,046 UART:
6,198,100 UART: [state] CFI Enabled
6,287,141 UART: [art] Extend RT PCRs Done
6,287,569 UART: [art] Lock RT PCRs Done
6,288,976 UART: [art] Populate DV Done
6,297,059 UART: [fht] FMC Alias Private Key: 7
6,298,231 UART: [art] Derive CDI
6,298,511 UART: [art] Store in slot 0x4
6,384,116 UART: [art] Derive Key Pair
6,384,476 UART: [art] Store priv key in slot 0x5
6,397,006 UART: [art] Derive Key Pair - Done
6,411,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,427,496 UART: [art] Erasing AUTHORITY.KEYID = 7
6,428,261 UART: [art] PUB.X = B35B8BAE4731A3CC6F17DB0B8152E70AE1DACAE6B84B3FA5A77850252F2637522C5BC22F86F9053750A36B475A3247B0
6,435,030 UART: [art] PUB.Y = B42D0ABE9C18C1963B9569129DE45C43DC6DB418AB1B318828B7408C136F6A6E626CD7F5FCF32B8F7B03A06DA7616DE7
6,441,986 UART: [art] SIG.R = E096CAA2977FDD33ED00A95AB5507EA2D33BCF232EAB4B2DD5CC1D067C18E683EDF79C2E4739CBB6919C80093D122313
6,448,744 UART: [art] SIG.S = 100E979E9A39B8A332EC1060045B84E6EBB69177B79F1AE3AC53167AFFAFA4EB3A2513FD679C5EB89ACE2FF9DB35D210
6,472,268 UART: Caliptra RT
6,472,519 UART: [state] CFI Enabled
6,836,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,867,522 UART: [rt]cmd =0x41545348, len=116
6,890,230 >>> mbox cmd response data (12 bytes)
6,890,231 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,092 UART: [rt]cmd =0x41545348, len=116
6,922,027 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,922,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,044,649 UART: [rt]cmd =0x41544d4e, len=14344
7,354,899 >>> mbox cmd response data (8 bytes)
7,354,900 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,384,969 UART: [rt]cmd =0x41545348, len=116
7,407,006 >>> mbox cmd response data (12 bytes)
7,407,007 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,437,178 UART: [rt]cmd =0x41545348, len=116
7,439,340 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,674 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,490 UART: [kat] SHA2-512-ACC
906,391 UART: [kat] ECC-384
916,176 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,941 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,123 UART: [idev] ++
1,173,291 UART: [idev] CDI.KEYID = 6
1,173,652 UART: [idev] SUBJECT.KEYID = 7
1,174,077 UART: [idev] UDS.KEYID = 0
1,174,423 ready_for_fw is high
1,174,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,106 UART: [idev] Erasing UDS.KEYID = 0
1,198,394 UART: [idev] Sha1 KeyId Algorithm
1,207,194 UART: [idev] --
1,208,031 UART: [ldev] ++
1,208,199 UART: [ldev] CDI.KEYID = 6
1,208,563 UART: [ldev] SUBJECT.KEYID = 5
1,208,990 UART: [ldev] AUTHORITY.KEYID = 7
1,209,453 UART: [ldev] FE.KEYID = 1
1,214,705 UART: [ldev] Erasing FE.KEYID = 1
1,241,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,243 UART: [ldev] --
1,280,480 UART: [fwproc] Wait for Commands...
1,281,281 UART: [fwproc] Recv command 0x46574c44
1,282,014 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,493 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,674 >>> mbox cmd response: success
2,824,798 UART: [afmc] ++
2,824,966 UART: [afmc] CDI.KEYID = 6
2,825,329 UART: [afmc] SUBJECT.KEYID = 7
2,825,755 UART: [afmc] AUTHORITY.KEYID = 5
2,861,360 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,951 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,291 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,992 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,775 UART: [afmc] --
2,904,734 UART: [cold-reset] --
2,905,492 UART: [state] Locking Datavault
2,906,867 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,471 UART: [state] Locking ICCM
2,908,131 UART: [exit] Launching FMC @ 0x40000130
2,913,461 UART:
2,913,477 UART: Running Caliptra FMC ...
2,913,885 UART:
2,914,028 UART: [state] CFI Enabled
2,925,402 UART: [fht] FMC Alias Private Key: 7
3,043,864 UART: [art] Extend RT PCRs Done
3,044,292 UART: [art] Lock RT PCRs Done
3,045,732 UART: [art] Populate DV Done
3,053,725 UART: [fht] FMC Alias Private Key: 7
3,054,781 UART: [art] Derive CDI
3,055,061 UART: [art] Store in slot 0x4
3,140,824 UART: [art] Derive Key Pair
3,141,184 UART: [art] Store priv key in slot 0x5
3,154,332 UART: [art] Derive Key Pair - Done
3,168,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,647 UART: [art] PUB.X = 0D50E067ED5900335F1019DBF8FC61612E04EFB8FD790641C5E837C259627B986F2DB819A4C9AA95D15017B5C0F17A80
3,192,388 UART: [art] PUB.Y = D66633B6040A633DF4C5EAA1539BDFDD5BE0B67ACFCBB6167D1831AACCB74C1AD469D0019FD4AA1E97F7C43DAB5F41E9
3,199,357 UART: [art] SIG.R = F62B3A521FAE88E9C7A22695D8038919989C842D9CBAF9D6337A4FCF833BD77F0FBB2D087705AC3F78A42E9E412EEF38
3,206,127 UART: [art] SIG.S = E974D22AFC68988A52AF2B6410B8B5951B7E5D15DEA0928B032D85287EE12FC447B2D72236BA535E695F03635B060CAC
3,229,883 UART: Caliptra RT
3,230,226 UART: [state] CFI Enabled
3,349,480 UART: [rt] RT listening for mailbox commands...
3,350,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,220 UART: [rt]cmd =0x41544d4e, len=14344
3,783,238 >>> mbox cmd response data (8 bytes)
3,783,239 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,086 UART: [rt]cmd =0x41545348, len=116
3,835,487 >>> mbox cmd response data (12 bytes)
3,835,488 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,685 UART: [rt]cmd =0x41545348, len=116
3,867,462 >>> mbox cmd response data (12 bytes)
3,867,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,294 UART:
3,868,310 UART: Running Caliptra ROM ...
3,868,718 UART:
3,868,860 UART: [state] CFI Enabled
3,871,642 UART: [state] LifecycleState = Unprovisioned
3,872,297 UART: [state] DebugLocked = No
3,872,907 UART: [state] WD Timer not started. Device not locked for debugging
3,874,117 UART: [kat] SHA2-256
4,677,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,681,771 UART: [kat] ++
4,681,923 UART: [kat] sha1
4,686,237 UART: [kat] SHA2-256
4,688,177 UART: [kat] SHA2-384
4,690,910 UART: [kat] SHA2-512-ACC
4,692,810 UART: [kat] ECC-384
4,702,815 UART: [kat] HMAC-384Kdf
4,707,459 UART: [kat] LMS
4,955,771 UART: [kat] --
4,956,583 UART: [update-reset] ++
6,315,456 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,316,547 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,471,762 >>> mbox cmd response: success
6,471,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,472,113 UART: [update-reset] Copying MAN_2 To MAN_1
6,480,127 UART: [update-reset Success] --
6,481,018 UART: [state] Locking Datavault
6,481,826 UART: [state] Locking PCR0, PCR1 and PCR31
6,482,430 UART: [state] Locking ICCM
6,483,058 UART: [exit] Launching FMC @ 0x40000130
6,488,388 UART:
6,488,404 UART: Running Caliptra FMC ...
6,488,812 UART:
6,488,955 UART: [state] CFI Enabled
6,578,154 UART: [art] Extend RT PCRs Done
6,578,582 UART: [art] Lock RT PCRs Done
6,579,803 UART: [art] Populate DV Done
6,587,910 UART: [fht] FMC Alias Private Key: 7
6,589,064 UART: [art] Derive CDI
6,589,344 UART: [art] Store in slot 0x4
6,675,361 UART: [art] Derive Key Pair
6,675,721 UART: [art] Store priv key in slot 0x5
6,689,557 UART: [art] Derive Key Pair - Done
6,704,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,719,988 UART: [art] Erasing AUTHORITY.KEYID = 7
6,720,753 UART: [art] PUB.X = 2DF4D318C5109BE765EBC5714E57634683E9CBEAC0EE53BE4E3C190FA6D46F360B72182E88DBD9152857271D3F95AC6C
6,727,527 UART: [art] PUB.Y = 2273BC527F62966F3144B25C1CC6CEE388897C827C9B171FA0F723BCB7AD2993E97A2AE923376E6320A331E3D4916480
6,734,475 UART: [art] SIG.R = 5CAD887BE3778239555DFA45E264AA255C2E5D45E840B4EA907CF02C5231E6D29E7F904344FA68DFEB2552858558D6D9
6,741,249 UART: [art] SIG.S = EE3AF9FC653007DBA426B9FBCCF91EC2274DE40CA8DBDA8F48BC0594A65A22D357C32A8198DD555432D4E6E45A78A644
6,764,554 UART: Caliptra RT
6,764,897 UART: [state] CFI Enabled
7,128,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,159,502 UART: [rt]cmd =0x41545348, len=116
7,181,978 >>> mbox cmd response data (12 bytes)
7,181,979 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,212,064 UART: [rt]cmd =0x41545348, len=116
7,214,037 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,214,038 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,336,549 UART: [rt]cmd =0x41544d4e, len=14344
7,646,259 >>> mbox cmd response data (8 bytes)
7,646,260 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,676,259 UART: [rt]cmd =0x41545348, len=116
7,699,128 >>> mbox cmd response data (12 bytes)
7,699,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,729,094 UART: [rt]cmd =0x41545348, len=116
7,730,880 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 ready_for_fw is high
1,060,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,151 >>> mbox cmd response: success
2,741,782 UART:
2,741,798 UART: Running Caliptra FMC ...
2,742,206 UART:
2,742,349 UART: [state] CFI Enabled
2,752,757 UART: [fht] FMC Alias Private Key: 7
2,872,403 UART: [art] Extend RT PCRs Done
2,872,831 UART: [art] Lock RT PCRs Done
2,874,261 UART: [art] Populate DV Done
2,882,670 UART: [fht] FMC Alias Private Key: 7
2,883,652 UART: [art] Derive CDI
2,883,932 UART: [art] Store in slot 0x4
2,970,063 UART: [art] Derive Key Pair
2,970,423 UART: [art] Store priv key in slot 0x5
2,984,015 UART: [art] Derive Key Pair - Done
2,998,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,370 UART: [art] PUB.X = 2AB9D364B52803BEC958A7DACD1FA1C7E004F769D493102D0820009AC422A1A0FFBE304B527612DF4FCB049DEC5F1092
3,022,118 UART: [art] PUB.Y = A87B300554C4838CEFDD49D9790317A76F05880660DE25A18539D07FE1E6AAC2358CF275A5DB194A13E5EC98E8B73045
3,029,058 UART: [art] SIG.R = 255473EFA695E5FE82BA07452016C5E267F9353177486713E5D66A903BFB8B1256B677CB5A0B64CF5973C370D47C4E81
3,035,818 UART: [art] SIG.S = 6F9826E466CD5F2FC76B5B75E38A00B7582E903893EE4FAF7075FF842A20EB2BDFC74D71961C10EDF693D7CEEF7BC26E
3,059,740 UART: Caliptra RT
3,060,083 UART: [state] CFI Enabled
3,180,819 UART: [rt] RT listening for mailbox commands...
3,181,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,273 UART: [rt]cmd =0x41544d4e, len=14344
3,614,319 >>> mbox cmd response data (8 bytes)
3,614,320 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,417 UART: [rt]cmd =0x41545348, len=116
3,666,720 >>> mbox cmd response data (12 bytes)
3,666,721 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,786 UART: [rt]cmd =0x41545348, len=116
3,698,355 >>> mbox cmd response data (12 bytes)
3,698,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,186,791 >>> mbox cmd response: success
6,186,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,200,410 UART:
6,200,426 UART: Running Caliptra FMC ...
6,200,834 UART:
6,200,977 UART: [state] CFI Enabled
6,290,306 UART: [art] Extend RT PCRs Done
6,290,734 UART: [art] Lock RT PCRs Done
6,291,985 UART: [art] Populate DV Done
6,300,490 UART: [fht] FMC Alias Private Key: 7
6,301,562 UART: [art] Derive CDI
6,301,842 UART: [art] Store in slot 0x4
6,387,547 UART: [art] Derive Key Pair
6,387,907 UART: [art] Store priv key in slot 0x5
6,401,209 UART: [art] Derive Key Pair - Done
6,415,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,431,398 UART: [art] Erasing AUTHORITY.KEYID = 7
6,432,163 UART: [art] PUB.X = 7E583FED90E16E9519090AAE8A18EDC397D0CDB19A31CCE0D72F5D2CD30E2C9EEA4918ECD4492E9C9E480FE61E254F31
6,438,941 UART: [art] PUB.Y = 55FA5986B3165D4FC9789E94CE52457979FB1EBD74FEE33FC3C73F46C557EDB0579AF0F4EDD1F69520C944511B0728E2
6,445,896 UART: [art] SIG.R = 15C46731CB5B6F28BDA26926DE32F20C6EE6D63328DCD00E8FF88C96861405D40BDB68DE212B807F3E43758255C70BCB
6,452,659 UART: [art] SIG.S = 9D50E87E77DD1776AEC8AB9E7FFC2041FBFB8B84E69B1F4F7F61F94E0AA729E82E3D7BE2EC10E34D7021D70FDE6E1462
6,477,285 UART: Caliptra RT
6,477,628 UART: [state] CFI Enabled
6,842,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,873,525 UART: [rt]cmd =0x41545348, len=116
6,895,671 >>> mbox cmd response data (12 bytes)
6,895,672 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,925,751 UART: [rt]cmd =0x41545348, len=116
6,927,562 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,927,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,050,166 UART: [rt]cmd =0x41544d4e, len=14344
7,359,786 >>> mbox cmd response data (8 bytes)
7,359,787 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,389,816 UART: [rt]cmd =0x41545348, len=116
7,411,375 >>> mbox cmd response data (12 bytes)
7,411,376 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,441,247 UART: [rt]cmd =0x41545348, len=116
7,442,891 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,295 UART: [state] WD Timer not started. Device not locked for debugging
87,510 UART: [kat] SHA2-256
893,160 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,285 UART: [kat] ++
897,437 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,607 UART: [cold-reset] ++
1,172,023 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 ready_for_fw is high
1,176,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,664 UART: [idev] Erasing UDS.KEYID = 0
1,200,203 UART: [idev] Sha1 KeyId Algorithm
1,208,677 UART: [idev] --
1,209,881 UART: [ldev] ++
1,210,049 UART: [ldev] CDI.KEYID = 6
1,210,412 UART: [ldev] SUBJECT.KEYID = 5
1,210,838 UART: [ldev] AUTHORITY.KEYID = 7
1,211,301 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,583 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,688 UART: [fwproc] Recv command 0x46574c44
1,284,416 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,420 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,711 >>> mbox cmd response: success
2,827,931 UART: [afmc] ++
2,828,099 UART: [afmc] CDI.KEYID = 6
2,828,461 UART: [afmc] SUBJECT.KEYID = 7
2,828,886 UART: [afmc] AUTHORITY.KEYID = 5
2,864,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,259 UART: [afmc] --
2,907,321 UART: [cold-reset] --
2,908,109 UART: [state] Locking Datavault
2,909,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,890 UART: [state] Locking ICCM
2,910,368 UART: [exit] Launching FMC @ 0x40000130
2,915,698 UART:
2,915,714 UART: Running Caliptra FMC ...
2,916,122 UART:
2,916,176 UART: [state] CFI Enabled
2,926,774 UART: [fht] FMC Alias Private Key: 7
3,045,880 UART: [art] Extend RT PCRs Done
3,046,308 UART: [art] Lock RT PCRs Done
3,047,824 UART: [art] Populate DV Done
3,055,861 UART: [fht] FMC Alias Private Key: 7
3,057,021 UART: [art] Derive CDI
3,057,301 UART: [art] Store in slot 0x4
3,142,758 UART: [art] Derive Key Pair
3,143,118 UART: [art] Store priv key in slot 0x5
3,156,216 UART: [art] Derive Key Pair - Done
3,170,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,068 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,833 UART: [art] PUB.X = 19374FA21BF27DC15E6C3EB78B402FAEE1CF2EB369673C96F89237BF2DB49A064885F2582068F0D49916F57993787538
3,193,598 UART: [art] PUB.Y = 06BEF04B9FDAAF84D3B55DC136CF15F15AA83A555A77767912E1E671185E0EB61735ED658F73068B54B6BE97C49E7758
3,200,545 UART: [art] SIG.R = A62E7B2888EB85305EB2522F472A7D2D93BAACFE8F9B3C4596E184D6716CD45DBD75A803210E7E7DC8669DAF6B26EF84
3,207,323 UART: [art] SIG.S = C9F223E90785AB4BB5071BDA3CF4FD1BBF3AF01FE7982C17DEB6BB2BD370392B6B95F063A17FE50A9491FDE9E4275091
3,231,054 UART: Caliptra RT
3,231,305 UART: [state] CFI Enabled
3,350,561 UART: [rt] RT listening for mailbox commands...
3,351,231 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,263 UART: [rt]cmd =0x41544d4e, len=14344
3,784,385 >>> mbox cmd response data (8 bytes)
3,784,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,569 UART: [rt]cmd =0x41545348, len=116
3,836,694 >>> mbox cmd response data (12 bytes)
3,836,695 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,866,502 UART: [rt]cmd =0x41545348, len=116
3,868,307 >>> mbox cmd response data (12 bytes)
3,868,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,869,141 UART:
3,869,157 UART: Running Caliptra ROM ...
3,869,565 UART:
3,869,620 UART: [state] CFI Enabled
3,872,114 UART: [state] LifecycleState = Unprovisioned
3,872,769 UART: [state] DebugLocked = No
3,873,287 UART: [state] WD Timer not started. Device not locked for debugging
3,874,549 UART: [kat] SHA2-256
4,680,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,684,324 UART: [kat] ++
4,684,476 UART: [kat] sha1
4,688,744 UART: [kat] SHA2-256
4,690,684 UART: [kat] SHA2-384
4,693,395 UART: [kat] SHA2-512-ACC
4,695,295 UART: [kat] ECC-384
4,705,204 UART: [kat] HMAC-384Kdf
4,709,786 UART: [kat] LMS
4,958,114 UART: [kat] --
4,959,136 UART: [update-reset] ++
6,318,298 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,319,481 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,474,696 >>> mbox cmd response: success
6,474,696 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,474,981 UART: [update-reset] Copying MAN_2 To MAN_1
6,482,995 UART: [update-reset Success] --
6,484,172 UART: [state] Locking Datavault
6,485,084 UART: [state] Locking PCR0, PCR1 and PCR31
6,485,688 UART: [state] Locking ICCM
6,486,354 UART: [exit] Launching FMC @ 0x40000130
6,491,684 UART:
6,491,700 UART: Running Caliptra FMC ...
6,492,108 UART:
6,492,162 UART: [state] CFI Enabled
6,581,309 UART: [art] Extend RT PCRs Done
6,581,737 UART: [art] Lock RT PCRs Done
6,583,030 UART: [art] Populate DV Done
6,591,173 UART: [fht] FMC Alias Private Key: 7
6,592,103 UART: [art] Derive CDI
6,592,383 UART: [art] Store in slot 0x4
6,678,078 UART: [art] Derive Key Pair
6,678,438 UART: [art] Store priv key in slot 0x5
6,691,734 UART: [art] Derive Key Pair - Done
6,706,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,721,787 UART: [art] Erasing AUTHORITY.KEYID = 7
6,722,552 UART: [art] PUB.X = 6F1B3E0983B94A7233B6665EF89708E8FD1A43CB857077328D4E6C3CF44F1D3BF7DE293B997DA1376383C7B6AD2EB3FA
6,729,326 UART: [art] PUB.Y = 8887CA8D59DD1E61F34E2E8C431953CEE5A455A2D96A9143ECB1359E0056B754E70D36C3D145C1DC46A233C8E43182FA
6,736,257 UART: [art] SIG.R = 9871493D17E56AD6B1E768FFFB714734013EDF7766AD68F1751F932858A82936F07FEABC1D2B976A9513A5BFB5A02EC1
6,743,030 UART: [art] SIG.S = 5CE3AEA52BD3D8A8ABA5269B46F18711B8CDFCCEF31276738742143E8AE27F468B05D1395369610942DC30D8BF143AEC
6,767,192 UART: Caliptra RT
6,767,443 UART: [state] CFI Enabled
7,132,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,163,158 UART: [rt]cmd =0x41545348, len=116
7,185,566 >>> mbox cmd response data (12 bytes)
7,185,567 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,215,536 UART: [rt]cmd =0x41545348, len=116
7,217,317 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,217,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,339,975 UART: [rt]cmd =0x41544d4e, len=14344
7,649,393 >>> mbox cmd response data (8 bytes)
7,649,394 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,679,477 UART: [rt]cmd =0x41545348, len=116
7,701,368 >>> mbox cmd response data (12 bytes)
7,701,369 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,731,636 UART: [rt]cmd =0x41545348, len=116
7,733,228 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,695 ready_for_fw is high
1,059,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,287 >>> mbox cmd response: success
2,739,180 UART:
2,739,196 UART: Running Caliptra FMC ...
2,739,604 UART:
2,739,658 UART: [state] CFI Enabled
2,750,210 UART: [fht] FMC Alias Private Key: 7
2,868,984 UART: [art] Extend RT PCRs Done
2,869,412 UART: [art] Lock RT PCRs Done
2,870,976 UART: [art] Populate DV Done
2,879,179 UART: [fht] FMC Alias Private Key: 7
2,880,265 UART: [art] Derive CDI
2,880,545 UART: [art] Store in slot 0x4
2,966,530 UART: [art] Derive Key Pair
2,966,890 UART: [art] Store priv key in slot 0x5
2,980,814 UART: [art] Derive Key Pair - Done
2,995,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,873 UART: [art] PUB.X = 419E3C76F7FCC461F1265E07220C097A0E97B445E7AFB43928D8DFED9394F14D4AD946DD8BB3B3AB491464831DB26E36
3,018,639 UART: [art] PUB.Y = E7CF7341FC853E72EEBBD1422781B766FEBA23C80E24206E79FB1A09EB99E234665D3CB9A1AB2020D0BFBD17B595DB84
3,025,599 UART: [art] SIG.R = 0329326C0F07296D681930FB51303F16B23D805E00CFAC5394F58A96924FF996EBA46E92F8656C3BF159ADDBB0A8DA4D
3,032,344 UART: [art] SIG.S = 4B04A23D57DC7778FA5BC25A2B3A87389AFC655E5E50926AFA0F1F4029A3D7F9794B7C91F3F3578E414E54F82C930285
3,056,039 UART: Caliptra RT
3,056,290 UART: [state] CFI Enabled
3,176,224 UART: [rt] RT listening for mailbox commands...
3,176,894 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,942 UART: [rt]cmd =0x41544d4e, len=14344
3,609,772 >>> mbox cmd response data (8 bytes)
3,609,773 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,850 UART: [rt]cmd =0x41545348, len=116
3,661,867 >>> mbox cmd response data (12 bytes)
3,661,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,895 UART: [rt]cmd =0x41545348, len=116
3,693,574 >>> mbox cmd response data (12 bytes)
3,693,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,880 >>> mbox cmd response: success
6,182,880 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,196,289 UART:
6,196,305 UART: Running Caliptra FMC ...
6,196,713 UART:
6,196,767 UART: [state] CFI Enabled
6,285,454 UART: [art] Extend RT PCRs Done
6,285,882 UART: [art] Lock RT PCRs Done
6,287,163 UART: [art] Populate DV Done
6,295,450 UART: [fht] FMC Alias Private Key: 7
6,296,584 UART: [art] Derive CDI
6,296,864 UART: [art] Store in slot 0x4
6,382,473 UART: [art] Derive Key Pair
6,382,833 UART: [art] Store priv key in slot 0x5
6,395,649 UART: [art] Derive Key Pair - Done
6,410,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,426,192 UART: [art] Erasing AUTHORITY.KEYID = 7
6,426,957 UART: [art] PUB.X = C4335FCAA21EEDD81EB0487E47C71196EE7EF557DF5407864B11F31B0765F0F601A5723C3957E09E658B3FBF43093611
6,433,717 UART: [art] PUB.Y = 753FA27BA3BE2D09AED6F846C8BE401D2227332AAA141A45EE617C9C97D4DE489D06BFD5546BF47D32242B84E29D580C
6,440,670 UART: [art] SIG.R = 742854F64539EA2A4878DD9E9CBDBC59FB890DBB2D0148E1D959741ED9A9EAF070DC8F225EDF95610620092A633723D8
6,447,434 UART: [art] SIG.S = CD64CA3A7E30C4059A2793948832E8054A8D85785F159C8D867C347895E437A2D346BC859995653A21222D1B46A13D8B
6,471,518 UART: Caliptra RT
6,471,769 UART: [state] CFI Enabled
6,836,417 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,867,412 UART: [rt]cmd =0x41545348, len=116
6,889,258 >>> mbox cmd response data (12 bytes)
6,889,259 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,919,250 UART: [rt]cmd =0x41545348, len=116
6,920,991 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,920,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,043,595 UART: [rt]cmd =0x41544d4e, len=14344
7,353,257 >>> mbox cmd response data (8 bytes)
7,353,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,383,395 UART: [rt]cmd =0x41545348, len=116
7,405,204 >>> mbox cmd response data (12 bytes)
7,405,205 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,435,262 UART: [rt]cmd =0x41545348, len=116
7,436,826 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,171 UART: [state] LifecycleState = Unprovisioned
85,826 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,718 UART: [kat] SHA2-256
903,658 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
917,959 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,171,730 UART: [cold-reset] ++
1,172,066 UART: [fht] FHT @ 0x50003400
1,174,815 UART: [idev] ++
1,174,983 UART: [idev] CDI.KEYID = 6
1,175,343 UART: [idev] SUBJECT.KEYID = 7
1,175,767 UART: [idev] UDS.KEYID = 0
1,176,112 ready_for_fw is high
1,176,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,855 UART: [idev] Erasing UDS.KEYID = 0
1,201,038 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,562 UART: [ldev] ++
1,210,730 UART: [ldev] CDI.KEYID = 6
1,211,093 UART: [ldev] SUBJECT.KEYID = 5
1,211,519 UART: [ldev] AUTHORITY.KEYID = 7
1,211,982 UART: [ldev] FE.KEYID = 1
1,217,246 UART: [ldev] Erasing FE.KEYID = 1
1,243,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,007 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,968 UART: [ldev] --
1,282,383 UART: [fwproc] Wait for Commands...
1,283,201 UART: [fwproc] Recv command 0x46574c44
1,283,929 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,990 >>> mbox cmd response: success
2,828,068 UART: [afmc] ++
2,828,236 UART: [afmc] CDI.KEYID = 6
2,828,598 UART: [afmc] SUBJECT.KEYID = 7
2,829,023 UART: [afmc] AUTHORITY.KEYID = 5
2,864,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,101 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,810 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,693 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,394 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,318 UART: [afmc] --
2,907,236 UART: [cold-reset] --
2,908,288 UART: [state] Locking Datavault
2,909,435 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,039 UART: [state] Locking ICCM
2,910,517 UART: [exit] Launching FMC @ 0x40000130
2,915,847 UART:
2,915,863 UART: Running Caliptra FMC ...
2,916,271 UART:
2,916,414 UART: [state] CFI Enabled
2,926,956 UART: [fht] FMC Alias Private Key: 7
3,045,666 UART: [art] Extend RT PCRs Done
3,046,094 UART: [art] Lock RT PCRs Done
3,047,454 UART: [art] Populate DV Done
3,055,865 UART: [fht] FMC Alias Private Key: 7
3,057,037 UART: [art] Derive CDI
3,057,317 UART: [art] Store in slot 0x4
3,142,962 UART: [art] Derive Key Pair
3,143,322 UART: [art] Store priv key in slot 0x5
3,157,230 UART: [art] Derive Key Pair - Done
3,172,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,835 UART: [art] PUB.X = 486D91A8A3FCD44B2BA6A6FD693A7019F101A7313B2EC0452AE5334276B0A167A69C75978953A45D625FCE5F0D0ED304
3,195,597 UART: [art] PUB.Y = C77C28A60E7EA6D69570500A92ABFCCD42450B439DE43FF5A5F4A840CFCE53BECC0070AF38ECFD7FB8970C3E6E7510EE
3,202,537 UART: [art] SIG.R = 111B1A509BC88586DE52A5EE70AB858AE4A5EC5031952E5405469E5D62D2355E588413E427DACD7B26601C784B324FC7
3,209,304 UART: [art] SIG.S = A1D99A21FE869FF6B8D0FFE7A877536EFDB0888593A73971B1488C022C01D0FF5B10D0104141B8663D39F3FCCC26EDBF
3,233,246 UART: Caliptra RT
3,233,589 UART: [state] CFI Enabled
3,353,146 UART: [rt] RT listening for mailbox commands...
3,353,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,554 UART: [rt]cmd =0x41544d4e, len=14344
3,786,274 >>> mbox cmd response data (8 bytes)
3,786,275 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,254 UART: [rt]cmd =0x41545348, len=116
3,838,561 >>> mbox cmd response data (12 bytes)
3,838,562 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,721 UART: [rt]cmd =0x41545348, len=116
3,870,524 >>> mbox cmd response data (12 bytes)
3,870,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,168 UART:
3,871,184 UART: Running Caliptra ROM ...
3,871,592 UART:
3,871,734 UART: [state] CFI Enabled
3,874,646 UART: [state] LifecycleState = Unprovisioned
3,875,301 UART: [state] DebugLocked = No
3,875,923 UART: [state] WD Timer not started. Device not locked for debugging
3,877,219 UART: [kat] SHA2-256
4,682,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,686,994 UART: [kat] ++
4,687,146 UART: [kat] sha1
4,691,416 UART: [kat] SHA2-256
4,693,356 UART: [kat] SHA2-384
4,696,197 UART: [kat] SHA2-512-ACC
4,698,097 UART: [kat] ECC-384
4,708,366 UART: [kat] HMAC-384Kdf
4,712,980 UART: [kat] LMS
4,961,308 UART: [kat] --
4,962,354 UART: [update-reset] ++
6,321,502 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,322,693 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,477,908 >>> mbox cmd response: success
6,477,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,478,211 UART: [update-reset] Copying MAN_2 To MAN_1
6,486,225 UART: [update-reset Success] --
6,487,078 UART: [state] Locking Datavault
6,487,872 UART: [state] Locking PCR0, PCR1 and PCR31
6,488,476 UART: [state] Locking ICCM
6,488,962 UART: [exit] Launching FMC @ 0x40000130
6,494,292 UART:
6,494,308 UART: Running Caliptra FMC ...
6,494,716 UART:
6,494,859 UART: [state] CFI Enabled
6,584,450 UART: [art] Extend RT PCRs Done
6,584,878 UART: [art] Lock RT PCRs Done
6,586,013 UART: [art] Populate DV Done
6,594,376 UART: [fht] FMC Alias Private Key: 7
6,595,552 UART: [art] Derive CDI
6,595,832 UART: [art] Store in slot 0x4
6,681,901 UART: [art] Derive Key Pair
6,682,261 UART: [art] Store priv key in slot 0x5
6,695,795 UART: [art] Derive Key Pair - Done
6,710,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,726,080 UART: [art] Erasing AUTHORITY.KEYID = 7
6,726,845 UART: [art] PUB.X = 9437E595A194F09A355D086BD0DC21AE205E3356357CD495542E0D639C6DED4210FDCA3B57D2B6AAAA259CB8905E2ED6
6,733,619 UART: [art] PUB.Y = 7B98B100E3434FBB6A3EC3300A83429BF18D52F1BB37691BE484E34E35B5C50407B2F1EB68BF5CCD0C604BF5F598083A
6,740,542 UART: [art] SIG.R = D86BC283A5DA98A2487FFA5C78F5BAC4A9F1DF6870006BD11B9B011EC46BF6ED538F0B72D406D34220131B3BAB6376B6
6,747,295 UART: [art] SIG.S = 5E842A6AF1EE00782057242D2D42B1F3B7BDB3A3805623C22C44158007EF4A50C149F509F59DD132A6EA92880CAA18E6
6,771,460 UART: Caliptra RT
6,771,803 UART: [state] CFI Enabled
7,133,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,164,458 UART: [rt]cmd =0x41545348, len=116
7,186,520 >>> mbox cmd response data (12 bytes)
7,186,521 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,216,546 UART: [rt]cmd =0x41545348, len=116
7,218,553 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
7,218,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,341,337 UART: [rt]cmd =0x41544d4e, len=14344
7,651,295 >>> mbox cmd response data (8 bytes)
7,651,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,681,413 UART: [rt]cmd =0x41545348, len=116
7,702,982 >>> mbox cmd response data (12 bytes)
7,702,983 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,733,102 UART: [rt]cmd =0x41545348, len=116
7,734,718 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 ready_for_fw is high
1,060,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,235 >>> mbox cmd response: success
2,742,596 UART:
2,742,612 UART: Running Caliptra FMC ...
2,743,020 UART:
2,743,163 UART: [state] CFI Enabled
2,753,855 UART: [fht] FMC Alias Private Key: 7
2,872,669 UART: [art] Extend RT PCRs Done
2,873,097 UART: [art] Lock RT PCRs Done
2,874,503 UART: [art] Populate DV Done
2,882,338 UART: [fht] FMC Alias Private Key: 7
2,883,308 UART: [art] Derive CDI
2,883,588 UART: [art] Store in slot 0x4
2,969,323 UART: [art] Derive Key Pair
2,969,683 UART: [art] Store priv key in slot 0x5
2,983,083 UART: [art] Derive Key Pair - Done
2,997,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,856 UART: [art] PUB.X = 28E2F0F2731B20EC6917100C99F08B9D32421EBAB511672F38083CA1695AF753D2ACE14037107661E058C157765A11E4
3,020,612 UART: [art] PUB.Y = 7C928E99CB92043C10DB712FABE34E5DBEC8A9CCCBA846A19B6E5BDCE87A068DEACAFEA4ABC5998D6BE038DDC99F9B67
3,027,592 UART: [art] SIG.R = 9D10395F92F0424E3DA69A8599CC634745B74F3720DADF8232077F695E159FE7E69B3819BF1285B3E668B214D0D55B53
3,034,355 UART: [art] SIG.S = AA30AAA9FAE55B2890CB7446C845FD730A887D440A10EBE768F5D2A7874FCFE4D01D2CA99227652900C85526DFD5DAF9
3,057,807 UART: Caliptra RT
3,058,150 UART: [state] CFI Enabled
3,178,176 UART: [rt] RT listening for mailbox commands...
3,178,846 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,220 UART: [rt]cmd =0x41544d4e, len=14344
3,611,790 >>> mbox cmd response data (8 bytes)
3,611,791 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,802 UART: [rt]cmd =0x41545348, len=116
3,663,495 >>> mbox cmd response data (12 bytes)
3,663,496 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,727 UART: [rt]cmd =0x41545348, len=116
3,695,552 >>> mbox cmd response data (12 bytes)
3,695,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,184,931 >>> mbox cmd response: success
6,184,931 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,198,472 UART:
6,198,488 UART: Running Caliptra FMC ...
6,198,896 UART:
6,199,039 UART: [state] CFI Enabled
6,288,444 UART: [art] Extend RT PCRs Done
6,288,872 UART: [art] Lock RT PCRs Done
6,290,069 UART: [art] Populate DV Done
6,298,066 UART: [fht] FMC Alias Private Key: 7
6,299,072 UART: [art] Derive CDI
6,299,352 UART: [art] Store in slot 0x4
6,384,973 UART: [art] Derive Key Pair
6,385,333 UART: [art] Store priv key in slot 0x5
6,399,101 UART: [art] Derive Key Pair - Done
6,413,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,428,942 UART: [art] Erasing AUTHORITY.KEYID = 7
6,429,707 UART: [art] PUB.X = ACD483515106DC39A96C2EEE99F929BD1292E3B19BF96790DCCA911A921F9C478EFEEC080E17930613C6CDBC90C0DC9E
6,436,481 UART: [art] PUB.Y = 859DB81091D1535EBBADC749553FAA9645B565D082A9D2BDAB1EDD088BAFEBE8D490B96702A885C7657CE358A33239CB
6,443,439 UART: [art] SIG.R = D33CBD83A438C34212C07BE7A4E1A3469AE54B3A00700F4CD1E0C0D79D8189D576CA372BD6654D93F2A0733EE3F87D34
6,450,192 UART: [art] SIG.S = 46BE49A2E4CB170C5A565F14DEC4C13D46CBF342E9BA3624E7BC42BE3CD878C0EA4E23C04B7700B9F04B69B9E4A49055
6,473,815 UART: Caliptra RT
6,474,158 UART: [state] CFI Enabled
6,836,986 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,867,643 UART: [rt]cmd =0x41545348, len=116
6,890,317 >>> mbox cmd response data (12 bytes)
6,890,318 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,379 UART: [rt]cmd =0x41545348, len=116
6,922,498 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,922,499 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,045,248 UART: [rt]cmd =0x41544d4e, len=14344
7,354,848 >>> mbox cmd response data (8 bytes)
7,354,849 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,384,792 UART: [rt]cmd =0x41545348, len=116
7,407,459 >>> mbox cmd response data (12 bytes)
7,407,460 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,437,471 UART: [rt]cmd =0x41545348, len=116
7,438,973 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_multiple_set_manifest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
192,159 UART:
192,528 UART: Running Caliptra ROM ...
193,732 UART:
193,901 UART: [state] CFI Enabled
266,357 UART: [state] LifecycleState = Unprovisioned
268,260 UART: [state] DebugLocked = No
270,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,434 UART: [kat] SHA2-256
446,086 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,618 UART: [kat] ++
457,097 UART: [kat] sha1
467,908 UART: [kat] SHA2-256
470,620 UART: [kat] SHA2-384
476,423 UART: [kat] SHA2-512-ACC
478,832 UART: [kat] ECC-384
2,768,266 UART: [kat] HMAC-384Kdf
2,800,973 UART: [kat] LMS
3,991,322 UART: [kat] --
3,997,413 UART: [cold-reset] ++
3,998,339 UART: [fht] Storing FHT @ 0x50003400
4,010,112 UART: [idev] ++
4,010,693 UART: [idev] CDI.KEYID = 6
4,011,607 UART: [idev] SUBJECT.KEYID = 7
4,012,856 UART: [idev] UDS.KEYID = 0
4,013,907 ready_for_fw is high
4,014,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,185 UART: [idev] Erasing UDS.KEYID = 0
7,346,696 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,924 UART: [idev] --
7,371,777 UART: [ldev] ++
7,372,360 UART: [ldev] CDI.KEYID = 6
7,373,301 UART: [ldev] SUBJECT.KEYID = 5
7,374,487 UART: [ldev] AUTHORITY.KEYID = 7
7,375,818 UART: [ldev] FE.KEYID = 1
7,423,215 UART: [ldev] Erasing FE.KEYID = 1
10,755,526 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,093 UART: [ldev] --
13,116,262 UART: [fwproc] Waiting for Commands...
13,118,992 UART: [fwproc] Received command 0x46574c44
13,121,179 UART: [fwproc] Received Image of size 118548 bytes
17,223,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,704 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,830 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,701,964 >>> mbox cmd response: success
17,705,975 UART: [afmc] ++
17,706,605 UART: [afmc] CDI.KEYID = 6
17,707,495 UART: [afmc] SUBJECT.KEYID = 7
17,708,789 UART: [afmc] AUTHORITY.KEYID = 5
21,073,900 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,378 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,105 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,818 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,215 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,684 UART: [afmc] --
23,443,965 UART: [cold-reset] --
23,447,509 UART: [state] Locking Datavault
23,453,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,216 UART: [state] Locking ICCM
23,456,798 UART: [exit] Launching FMC @ 0x40000130
23,465,192 UART:
23,465,422 UART: Running Caliptra FMC ...
23,466,521 UART:
23,466,698 UART: [state] CFI Enabled
23,534,151 UART: [fht] FMC Alias Private Key: 7
25,874,488 UART: [art] Extend RT PCRs Done
25,875,705 UART: [art] Lock RT PCRs Done
25,877,295 UART: [art] Populate DV Done
25,882,810 UART: [fht] FMC Alias Private Key: 7
25,884,349 UART: [art] Derive CDI
25,885,086 UART: [art] Store in slot 0x4
25,942,719 UART: [art] Derive Key Pair
25,943,757 UART: [art] Store priv key in slot 0x5
29,236,681 UART: [art] Derive Key Pair - Done
29,249,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,666 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,168 UART: [art] PUB.X = 9C89319F69605F6EB0880FEB714C8C61A913D2D05EC2A3ABF8453C275C49D5B1E24C3E756D33470DC88437BC52395D15
31,547,418 UART: [art] PUB.Y = 70BAB63E2DF8B00DA33D38ECEE806B5EEA0E6290273032EE97695B3D3BE26AA742EC2CD969165302E0F69490DC4E4C10
31,554,696 UART: [art] SIG.R = 8F0A63FF761786FF2E65EB500CECB4E4062D4B00B6AA768D4ADEDB418D7C0C3A082B665537C4525C678E0166EC7E84AB
31,562,102 UART: [art] SIG.S = BDCB3D7182BA3641507831F7F148942B8922C6205E3A3B60C72FC2BDD141DEF9C60E50153B24A42A0B81DB2406DB0FEE
32,867,078 UART: Caliptra RT
32,867,792 UART: [state] CFI Enabled
33,045,008 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,111,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,267,682 UART: [rt]cmd =0x41544d4e, len=14344
42,567,732 >>> mbox cmd response data (8 bytes)
42,568,352 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,599,151 UART: [rt]cmd =0x41545348, len=116
42,618,427 >>> mbox cmd response data (12 bytes)
44,694,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,845,989 UART:
44,846,384 UART: Running Caliptra ROM ...
44,847,525 UART:
44,847,695 UART: [state] CFI Enabled
44,910,275 UART: [state] LifecycleState = Unprovisioned
44,912,221 UART: [state] DebugLocked = No
44,914,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,920,308 UART: [kat] SHA2-256
45,090,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,100,535 UART: [kat] ++
45,101,043 UART: [kat] sha1
45,111,989 UART: [kat] SHA2-256
45,114,686 UART: [kat] SHA2-384
45,119,376 UART: [kat] SHA2-512-ACC
45,121,781 UART: [kat] ECC-384
47,413,582 UART: [kat] HMAC-384Kdf
47,446,002 UART: [kat] LMS
48,636,329 UART: [kat] --
48,640,747 UART: [update-reset] ++
52,824,399 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,828,776 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,226,515 >>> mbox cmd response: success
53,231,183 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,231,775 UART: [update-reset] Copying MAN_2 To MAN_1
53,249,311 UART: [update-reset Success] --
53,254,359 UART: [state] Locking Datavault
53,257,410 UART: [state] Locking PCR0, PCR1 and PCR31
53,259,165 UART: [state] Locking ICCM
53,260,665 UART: [exit] Launching FMC @ 0x40000130
53,269,062 UART:
53,269,308 UART: Running Caliptra FMC ...
53,270,409 UART:
53,270,570 UART: [state] CFI Enabled
53,367,044 UART: [art] Extend RT PCRs Done
53,368,250 UART: [art] Lock RT PCRs Done
53,369,548 UART: [art] Populate DV Done
53,375,006 UART: [fht] FMC Alias Private Key: 7
53,376,545 UART: [art] Derive CDI
53,377,310 UART: [art] Store in slot 0x4
53,435,986 UART: [art] Derive Key Pair
53,437,034 UART: [art] Store priv key in slot 0x5
56,729,168 UART: [art] Derive Key Pair - Done
56,742,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,031,958 UART: [art] Erasing AUTHORITY.KEYID = 7
59,033,472 UART: [art] PUB.X = 65D795245E5AEFF12F698A03C26072D11B0D300852C7981E22135B3CA518E9B45DEB90757CA30AB8F28F7F7ADD9DE8F4
59,040,801 UART: [art] PUB.Y = 48B23011017A5F84CC7F0B16863A55DCE9C0ECEE712DD73519E90C84AE12082C239AF1EADCAA0DD68113F6284BB565C0
59,047,991 UART: [art] SIG.R = 41E92CECBD63C13C4781D493CC52F76F5F827928EFB7B038529A556C87B6C376318587DAC2CE37FF525DEEF1EFBB30AC
59,055,430 UART: [art] SIG.S = 93E3E2A103C0EAFE682197D7B1716A77C6598FA0A1EC47B90A56E03600B49D12E6D751F72F18D4CF3487B4EBC19C74D8
60,360,338 UART: Caliptra RT
60,361,060 UART: [state] CFI Enabled
60,774,885 UART: [rt] RT listening for mailbox commands...
60,806,729 UART: [rt]cmd =0x41545348, len=116
60,826,503 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,784,816 ready_for_fw is high
3,785,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,436 >>> mbox cmd response: success
23,651,501 UART:
23,651,890 UART: Running Caliptra FMC ...
23,652,994 UART:
23,653,149 UART: [state] CFI Enabled
23,721,256 UART: [fht] FMC Alias Private Key: 7
26,061,543 UART: [art] Extend RT PCRs Done
26,062,771 UART: [art] Lock RT PCRs Done
26,064,431 UART: [art] Populate DV Done
26,070,121 UART: [fht] FMC Alias Private Key: 7
26,071,673 UART: [art] Derive CDI
26,072,415 UART: [art] Store in slot 0x4
26,128,697 UART: [art] Derive Key Pair
26,129,696 UART: [art] Store priv key in slot 0x5
29,422,768 UART: [art] Derive Key Pair - Done
29,435,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,230 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,754 UART: [art] PUB.X = 2F96E6C197241A6DC928B6BEBC8E34CC570CBD4A0A0A916C37CEA462E2CB0015F6E597804E1D28DEC88327B81E8CE2AA
31,733,066 UART: [art] PUB.Y = DDB2E25F1CD7680EF20E61514065246140070E72F0CCEC7E9FF62305F2CBB854A67BC529A275C1D46BD4B1F54EC1A643
31,740,292 UART: [art] SIG.R = 92EBB11E357F692C153BD6CB2C66930A4825C46AE14C98284C5827AC1BB27702E273E38C5058B4C7459F5A2CF958544B
31,747,646 UART: [art] SIG.S = 234BC1B08AB76F0254A0997F5396A1793ECE22410B5B69D30DE1EDFBE02783E12B123CE3E5F4BC9A7A452EECF363E129
33,052,779 UART: Caliptra RT
33,053,491 UART: [state] CFI Enabled
33,249,091 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,311,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,467,300 UART: [rt]cmd =0x41544d4e, len=14344
42,768,490 >>> mbox cmd response data (8 bytes)
42,769,104 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,799,754 UART: [rt]cmd =0x41545348, len=116
42,819,490 >>> mbox cmd response data (12 bytes)
44,894,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,722,206 >>> mbox cmd response: success
53,726,822 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,756,526 UART:
53,756,851 UART: Running Caliptra FMC ...
53,757,898 UART:
53,758,051 UART: [state] CFI Enabled
53,845,626 UART: [art] Extend RT PCRs Done
53,847,083 UART: [art] Lock RT PCRs Done
53,848,107 UART: [art] Populate DV Done
53,853,404 UART: [fht] FMC Alias Private Key: 7
53,855,167 UART: [art] Derive CDI
53,856,125 UART: [art] Store in slot 0x4
53,915,251 UART: [art] Derive Key Pair
53,916,541 UART: [art] Store priv key in slot 0x5
57,209,621 UART: [art] Derive Key Pair - Done
57,222,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,511,201 UART: [art] Erasing AUTHORITY.KEYID = 7
59,513,212 UART: [art] PUB.X = B35B65D03D643B532FA449127BDC1DAE989355EC5EB31E9B2CA4BF7B178B125DE2EE256E0015B48F1929541328A98E0C
59,519,987 UART: [art] PUB.Y = 72ED18EC8DE01BF2B07B18F75F49B08F10B0AFC1A0D4220168D973B809E3E7F224ADC413D5BECB34D765F2EF588841D1
59,527,218 UART: [art] SIG.R = E73C1058BCD620A3B9F8F9078C52DF045274B055489034945AC170F2BD446D5398D095DB1333BDA8D4DF24245922521F
59,534,608 UART: [art] SIG.S = A435BC43EF9E085B63741635074AB2833D5142A9B90149EE5514BBD65830687722EEC59370882E0022A27E5D5AF001C9
60,839,308 UART: Caliptra RT
60,840,039 UART: [state] CFI Enabled
61,255,969 UART: [rt] RT listening for mailbox commands...
61,287,982 UART: [rt]cmd =0x41545348, len=116
61,307,513 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,385 UART:
192,776 UART: Running Caliptra ROM ...
193,875 UART:
603,751 UART: [state] CFI Enabled
615,222 UART: [state] LifecycleState = Unprovisioned
617,094 UART: [state] DebugLocked = No
618,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,333 UART: [kat] SHA2-256
794,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,636 UART: [kat] ++
805,089 UART: [kat] sha1
816,601 UART: [kat] SHA2-256
819,314 UART: [kat] SHA2-384
825,223 UART: [kat] SHA2-512-ACC
827,608 UART: [kat] ECC-384
3,112,946 UART: [kat] HMAC-384Kdf
3,125,400 UART: [kat] LMS
4,315,494 UART: [kat] --
4,319,797 UART: [cold-reset] ++
4,321,732 UART: [fht] Storing FHT @ 0x50003400
4,333,489 UART: [idev] ++
4,334,047 UART: [idev] CDI.KEYID = 6
4,334,957 UART: [idev] SUBJECT.KEYID = 7
4,336,195 UART: [idev] UDS.KEYID = 0
4,337,254 ready_for_fw is high
4,337,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,370 UART: [idev] Erasing UDS.KEYID = 0
7,623,132 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,775 UART: [idev] --
7,649,660 UART: [ldev] ++
7,650,234 UART: [ldev] CDI.KEYID = 6
7,651,167 UART: [ldev] SUBJECT.KEYID = 5
7,652,374 UART: [ldev] AUTHORITY.KEYID = 7
7,653,670 UART: [ldev] FE.KEYID = 1
7,664,503 UART: [ldev] Erasing FE.KEYID = 1
10,954,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,819 UART: [ldev] --
13,313,252 UART: [fwproc] Waiting for Commands...
13,315,620 UART: [fwproc] Received command 0x46574c44
13,317,797 UART: [fwproc] Received Image of size 118548 bytes
17,425,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,555 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,509 >>> mbox cmd response: success
17,909,887 UART: [afmc] ++
17,910,519 UART: [afmc] CDI.KEYID = 6
17,911,400 UART: [afmc] SUBJECT.KEYID = 7
17,912,666 UART: [afmc] AUTHORITY.KEYID = 5
21,226,874 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,223 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,661 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,070 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,270 UART: [afmc] --
23,592,165 UART: [cold-reset] --
23,595,705 UART: [state] Locking Datavault
23,600,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,784 UART: [state] Locking ICCM
23,603,774 UART: [exit] Launching FMC @ 0x40000130
23,612,162 UART:
23,612,410 UART: Running Caliptra FMC ...
23,613,508 UART:
23,613,663 UART: [state] CFI Enabled
23,621,595 UART: [fht] FMC Alias Private Key: 7
25,962,224 UART: [art] Extend RT PCRs Done
25,963,915 UART: [art] Lock RT PCRs Done
25,965,261 UART: [art] Populate DV Done
25,970,853 UART: [fht] FMC Alias Private Key: 7
25,972,384 UART: [art] Derive CDI
25,973,145 UART: [art] Store in slot 0x4
26,015,791 UART: [art] Derive Key Pair
26,016,798 UART: [art] Store priv key in slot 0x5
29,259,144 UART: [art] Derive Key Pair - Done
29,272,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,324 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,826 UART: [art] PUB.X = 5A1F51C65133EA71AAD406438E7A9E30CF3BEB2CD95E274528C23B230432C7F23E0D8D6DC87DD1456B8097AA03BD3FDF
31,561,149 UART: [art] PUB.Y = 6FACEC20AE503F41C3B77AB188FE282BBADD0F8A5C3561725DC31B60F57BB37D7137E9A4CFF6E2980ABA8E2813CB20E3
31,568,436 UART: [art] SIG.R = 3E99921121A34D94599E9A129F935C6802E337073E864AA6BA0DE427373BCE7AB729112F28C1139C67EB9E0B3A866049
31,575,764 UART: [art] SIG.S = 603AB0D51766B8ABCABCB773093C884E7E9B27B85E5DE3184971ECB5C564E29CE7DAAEDA96FC6B73AD5FC30E51729AB6
32,881,033 UART: Caliptra RT
32,881,741 UART: [state] CFI Enabled
33,014,840 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,073,993 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,229,348 UART: [rt]cmd =0x41544d4e, len=14344
42,529,802 >>> mbox cmd response data (8 bytes)
42,530,387 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,561,118 UART: [rt]cmd =0x41545348, len=116
42,580,490 >>> mbox cmd response data (12 bytes)
44,654,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,805,568 UART:
44,805,943 UART: Running Caliptra ROM ...
44,806,992 UART:
44,807,197 UART: [state] CFI Enabled
44,820,931 UART: [state] LifecycleState = Unprovisioned
44,822,831 UART: [state] DebugLocked = No
44,824,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,829,251 UART: [kat] SHA2-256
44,998,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,009,517 UART: [kat] ++
45,009,978 UART: [kat] sha1
45,021,477 UART: [kat] SHA2-256
45,024,189 UART: [kat] SHA2-384
45,028,399 UART: [kat] SHA2-512-ACC
45,030,746 UART: [kat] ECC-384
47,314,073 UART: [kat] HMAC-384Kdf
47,327,017 UART: [kat] LMS
48,517,070 UART: [kat] --
48,522,251 UART: [update-reset] ++
52,716,642 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,720,697 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
53,118,464 >>> mbox cmd response: success
53,123,109 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,123,723 UART: [update-reset] Copying MAN_2 To MAN_1
53,141,983 UART: [update-reset Success] --
53,146,638 UART: [state] Locking Datavault
53,149,255 UART: [state] Locking PCR0, PCR1 and PCR31
53,150,961 UART: [state] Locking ICCM
53,153,168 UART: [exit] Launching FMC @ 0x40000130
53,161,561 UART:
53,161,792 UART: Running Caliptra FMC ...
53,162,887 UART:
53,163,037 UART: [state] CFI Enabled
53,207,150 UART: [art] Extend RT PCRs Done
53,208,292 UART: [art] Lock RT PCRs Done
53,209,681 UART: [art] Populate DV Done
53,215,348 UART: [fht] FMC Alias Private Key: 7
53,216,873 UART: [art] Derive CDI
53,217,613 UART: [art] Store in slot 0x4
53,260,191 UART: [art] Derive Key Pair
53,261,261 UART: [art] Store priv key in slot 0x5
56,503,097 UART: [art] Derive Key Pair - Done
56,516,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,796,149 UART: [art] Erasing AUTHORITY.KEYID = 7
58,797,651 UART: [art] PUB.X = 74A39BE569AFFAF5BD363764AABD785584EAD71197ABD68E521A36B3064F3430A6C5E4D842752933D398356617DDCCB1
58,804,890 UART: [art] PUB.Y = 704E82E29BAB1C61BA9B6D530E9EA49D3409A687C01EB11BEE46BDFB767B7821536049D35D9203772F756C398CA1A692
58,812,174 UART: [art] SIG.R = 681BC1440279E72653BB80AB2C4CD1C74E047B445966F0A431EE5A370BB5BE23D60E3A5759ED3B844D22A1F812F70EBC
58,819,556 UART: [art] SIG.S = 774C3D0813EF84DA51E3A48B39BB7898D354099B8FDCDC2027D9CD0C3A84CC501886807B6D30FF2E0611351A141C1FAD
60,125,292 UART: Caliptra RT
60,126,016 UART: [state] CFI Enabled
60,495,564 UART: [rt] RT listening for mailbox commands...
60,527,410 UART: [rt]cmd =0x41545348, len=116
60,547,071 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,128,336 ready_for_fw is high
4,128,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,281 >>> mbox cmd response: success
23,811,057 UART:
23,811,458 UART: Running Caliptra FMC ...
23,812,611 UART:
23,812,771 UART: [state] CFI Enabled
23,820,885 UART: [fht] FMC Alias Private Key: 7
26,160,112 UART: [art] Extend RT PCRs Done
26,161,335 UART: [art] Lock RT PCRs Done
26,162,882 UART: [art] Populate DV Done
26,168,148 UART: [fht] FMC Alias Private Key: 7
26,169,741 UART: [art] Derive CDI
26,170,551 UART: [art] Store in slot 0x4
26,212,947 UART: [art] Derive Key Pair
26,213,943 UART: [art] Store priv key in slot 0x5
29,455,976 UART: [art] Derive Key Pair - Done
29,469,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,156 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,790 UART: [art] PUB.X = BCE34821710C218B1AEEA0F9EDF30436FBE52BA80E438A1C4C71B9C6151ED5FE5E4AAF6AC8E903CAB3A37FD83D192A7B
31,757,923 UART: [art] PUB.Y = 401CFEF6CAFA406926E185448B69FCB01C31B4E9361BBC59E5A69E0F9A94C91CB2C88B213C4DCDD1F9DD18D5D51BE506
31,765,221 UART: [art] SIG.R = BD724E110CFE5BD2628DA8EAE6A91D8B9B2CF519F51D6A106D8B436806340BF5F2F4925D44C370B83F6B87AAFEC56E25
31,772,612 UART: [art] SIG.S = F3844F623CD604083149492CDD8921CD00201DE35E6EBA0B3537491900596776D54B6447E11AC546D9CF1765E6D4F51A
33,077,641 UART: Caliptra RT
33,078,347 UART: [state] CFI Enabled
33,211,638 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,274,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,429,733 UART: [rt]cmd =0x41544d4e, len=14344
42,730,320 >>> mbox cmd response data (8 bytes)
42,730,893 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,761,674 UART: [rt]cmd =0x41545348, len=116
42,781,537 >>> mbox cmd response data (12 bytes)
44,858,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,597,908 >>> mbox cmd response: success
53,603,017 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
53,632,756 UART:
53,633,053 UART: Running Caliptra FMC ...
53,634,174 UART:
53,634,339 UART: [state] CFI Enabled
53,678,395 UART: [art] Extend RT PCRs Done
53,679,711 UART: [art] Lock RT PCRs Done
53,681,116 UART: [art] Populate DV Done
53,686,251 UART: [fht] FMC Alias Private Key: 7
53,687,834 UART: [art] Derive CDI
53,688,638 UART: [art] Store in slot 0x4
53,731,060 UART: [art] Derive Key Pair
53,732,058 UART: [art] Store priv key in slot 0x5
56,973,334 UART: [art] Derive Key Pair - Done
56,986,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,266,647 UART: [art] Erasing AUTHORITY.KEYID = 7
59,268,152 UART: [art] PUB.X = E666E0803951709B38F8E7A585DAF45ED7437D727D6726B8737E2CDFD497C162282A707887D9F7BABD042469D79EA69E
59,275,443 UART: [art] PUB.Y = AD4754A8DC3A74CCE00625091ABD78DE0DFBFFCF2A422E49422F92B33B057694C098A6FAE837399DFBFC7F5BC685E5BB
59,282,675 UART: [art] SIG.R = 7D8C557D7441CB9DE7D95C5C147F4688CC9AF89C16994DC7A3BFA1D0B96C3AFC606998E732E3C12E4DEABB956CF2F0C0
59,290,071 UART: [art] SIG.S = 468F18D392C8A5E8C805C2A2441FAA833CE1998A1E1ADFE19B6BF5FF436F6D6F735862F4D895ABDB0FEFF7AF8B61DCCE
60,594,683 UART: Caliptra RT
60,595,377 UART: [state] CFI Enabled
60,966,321 UART: [rt] RT listening for mailbox commands...
60,998,463 UART: [rt]cmd =0x41545348, len=116
61,018,419 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,160 UART:
192,528 UART: Running Caliptra ROM ...
193,660 UART:
193,808 UART: [state] CFI Enabled
263,790 UART: [state] LifecycleState = Unprovisioned
265,698 UART: [state] DebugLocked = No
267,393 UART: [state] WD Timer not started. Device not locked for debugging
271,849 UART: [kat] SHA2-256
451,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,328 UART: [kat] ++
462,770 UART: [kat] sha1
474,416 UART: [kat] SHA2-256
477,128 UART: [kat] SHA2-384
482,752 UART: [kat] SHA2-512-ACC
485,118 UART: [kat] ECC-384
2,948,645 UART: [kat] HMAC-384Kdf
2,970,769 UART: [kat] LMS
3,447,293 UART: [kat] --
3,452,912 UART: [cold-reset] ++
3,455,335 UART: [fht] FHT @ 0x50003400
3,467,359 UART: [idev] ++
3,467,967 UART: [idev] CDI.KEYID = 6
3,468,902 UART: [idev] SUBJECT.KEYID = 7
3,470,075 UART: [idev] UDS.KEYID = 0
3,471,122 ready_for_fw is high
3,471,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,469 UART: [idev] Erasing UDS.KEYID = 0
5,988,510 UART: [idev] Sha1 KeyId Algorithm
6,011,955 UART: [idev] --
6,018,597 UART: [ldev] ++
6,019,165 UART: [ldev] CDI.KEYID = 6
6,020,246 UART: [ldev] SUBJECT.KEYID = 5
6,021,363 UART: [ldev] AUTHORITY.KEYID = 7
6,022,546 UART: [ldev] FE.KEYID = 1
6,058,849 UART: [ldev] Erasing FE.KEYID = 1
8,564,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,862 UART: [ldev] --
10,375,963 UART: [fwproc] Wait for Commands...
10,377,676 UART: [fwproc] Recv command 0x46574c44
10,379,708 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,429 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,088 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,086 >>> mbox cmd response: success
14,344,201 UART: [afmc] ++
14,344,833 UART: [afmc] CDI.KEYID = 6
14,345,750 UART: [afmc] SUBJECT.KEYID = 7
14,346,965 UART: [afmc] AUTHORITY.KEYID = 5
16,874,611 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,194 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,031 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,794 UART: [afmc] --
18,674,697 UART: [cold-reset] --
18,677,152 UART: [state] Locking Datavault
18,681,367 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,115 UART: [state] Locking ICCM
18,684,393 UART: [exit] Launching FMC @ 0x40000130
18,692,789 UART:
18,693,019 UART: Running Caliptra FMC ...
18,694,120 UART:
18,694,280 UART: [state] CFI Enabled
18,753,724 UART: [fht] FMC Alias Private Key: 7
20,519,789 UART: [art] Extend RT PCRs Done
20,521,023 UART: [art] Lock RT PCRs Done
20,522,321 UART: [art] Populate DV Done
20,527,893 UART: [fht] FMC Alias Private Key: 7
20,529,534 UART: [art] Derive CDI
20,530,347 UART: [art] Store in slot 0x4
20,586,846 UART: [art] Derive Key Pair
20,587,880 UART: [art] Store priv key in slot 0x5
23,050,621 UART: [art] Derive Key Pair - Done
23,063,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,185 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,665 UART: [art] PUB.X = 955F1A24F8260A8E42CEE92BE2D1ABA108438BFF6B2F63F2F07DD8DF22E980CCDB2BF2EEE7307E10930D6124016F23E3
24,784,963 UART: [art] PUB.Y = 82F90196BCC7B16DF85D828E0CBB998960B1B202EF3C421F198A7C841F410CFDE56468AB36F248F1867CC461164DCDD5
24,792,252 UART: [art] SIG.R = 03FFF3EF7963F851F97E89460E6431794A19B3A694441D63A4B7F494C576134A103C0E65105E90ABC7A40C65EDAFA70E
24,799,634 UART: [art] SIG.S = 5AB76565E006AC06E3489B19495B0E701E8BCDCD38D823481106F5520BC5CE5D2778F8621A74662788863C1C27654FAE
25,778,897 UART: Caliptra RT
25,779,767 UART: [state] CFI Enabled
25,958,360 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,988,528 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,144,112 UART: [rt]cmd =0x41544d4e, len=14344
34,139,847 >>> mbox cmd response data (8 bytes)
34,140,448 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,171,456 UART: [rt]cmd =0x41545348, len=116
34,191,437 >>> mbox cmd response data (12 bytes)
36,254,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,405,611 UART:
36,405,993 UART: Running Caliptra ROM ...
36,407,103 UART:
36,407,265 UART: [state] CFI Enabled
36,481,486 UART: [state] LifecycleState = Unprovisioned
36,483,430 UART: [state] DebugLocked = No
36,485,850 UART: [state] WD Timer not started. Device not locked for debugging
36,489,382 UART: [kat] SHA2-256
36,669,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,679,810 UART: [kat] ++
36,680,350 UART: [kat] sha1
36,691,405 UART: [kat] SHA2-256
36,694,092 UART: [kat] SHA2-384
36,699,799 UART: [kat] SHA2-512-ACC
36,702,195 UART: [kat] ECC-384
39,147,244 UART: [kat] HMAC-384Kdf
39,167,847 UART: [kat] LMS
39,644,272 UART: [kat] --
39,649,222 UART: [update-reset] ++
43,144,782 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,149,046 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,546,678 >>> mbox cmd response: success
43,547,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,547,896 UART: [update-reset] Copying MAN_2 To MAN_1
43,585,018 UART: [update-reset Success] --
43,588,492 UART: [state] Locking Datavault
43,591,412 UART: [state] Locking PCR0, PCR1 and PCR31
43,593,161 UART: [state] Locking ICCM
43,595,092 UART: [exit] Launching FMC @ 0x40000130
43,603,490 UART:
43,603,727 UART: Running Caliptra FMC ...
43,604,826 UART:
43,604,981 UART: [state] CFI Enabled
43,702,770 UART: [art] Extend RT PCRs Done
43,703,985 UART: [art] Lock RT PCRs Done
43,705,442 UART: [art] Populate DV Done
43,710,957 UART: [fht] FMC Alias Private Key: 7
43,712,594 UART: [art] Derive CDI
43,713,400 UART: [art] Store in slot 0x4
43,772,132 UART: [art] Derive Key Pair
43,773,130 UART: [art] Store priv key in slot 0x5
46,235,730 UART: [art] Derive Key Pair - Done
46,248,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,961,439 UART: [art] Erasing AUTHORITY.KEYID = 7
47,962,948 UART: [art] PUB.X = 33A4E5883CFD751F75C0DA2A94121F9DCD48607C1FE0BB878FF1591296B9B9C400E5077BA144DEC70D4ADDD17995BAC2
47,970,199 UART: [art] PUB.Y = F0F54DF2C6668F52D4AD3B8A68B45CAC24157D925B78949D1515847D3AB31C1E63AD8598AF17C1B639E6B7DA2BBF974C
47,977,478 UART: [art] SIG.R = EC85982B272E123BEF867A02E643431014D1DAE20029FF3E0A79EC28216D29AE2D7E3DEE01F74F1FF7B93CC694EA4090
47,984,870 UART: [art] SIG.S = 294CCED60A6E65974038B108551728FCBABB628EA89D2BB2A6E317D310D18028572C6B3ADAFD2E78FE4C46F20F5B67E1
48,963,745 UART: Caliptra RT
48,964,439 UART: [state] CFI Enabled
49,383,051 UART: [rt] RT listening for mailbox commands...
49,414,790 UART: [rt]cmd =0x41545348, len=116
49,433,772 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,463,311 ready_for_fw is high
3,463,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,905 >>> mbox cmd response: success
18,514,187 UART:
18,514,604 UART: Running Caliptra FMC ...
18,515,746 UART:
18,515,904 UART: [state] CFI Enabled
18,584,308 UART: [fht] FMC Alias Private Key: 7
20,350,629 UART: [art] Extend RT PCRs Done
20,351,859 UART: [art] Lock RT PCRs Done
20,353,275 UART: [art] Populate DV Done
20,358,634 UART: [fht] FMC Alias Private Key: 7
20,360,218 UART: [art] Derive CDI
20,361,026 UART: [art] Store in slot 0x4
20,417,371 UART: [art] Derive Key Pair
20,418,409 UART: [art] Store priv key in slot 0x5
22,880,879 UART: [art] Derive Key Pair - Done
22,893,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,737 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,236 UART: [art] PUB.X = C42970FED766171487096B3D90639CCFC24EEB09BE71605DD7CBDBD5DB276C90B0CCEAA89A95071A6D09DEDC57EFF181
24,615,540 UART: [art] PUB.Y = 5BA49D1233DE21CAECE19184D396E0AAA52FB109F462941D453069EFCA15106C00327B53609675285D52333B6D276683
24,622,790 UART: [art] SIG.R = 44057BB4DC31C47808D17297A2A11973869E782119D5535030EE8E81FDADF43298CEB78AEA4A2002D651D22EA31D1F0A
24,630,291 UART: [art] SIG.S = 6EA4019830D35AA0CFDC35B6E412C7E305FD23BA94C38AB990DEDF2C06861B91EF070EAF5072FB82D8A3962A472269B0
25,608,927 UART: Caliptra RT
25,609,644 UART: [state] CFI Enabled
25,790,271 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,829,004 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,985,123 UART: [rt]cmd =0x41544d4e, len=14344
33,980,443 >>> mbox cmd response data (8 bytes)
33,981,035 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,011,897 UART: [rt]cmd =0x41545348, len=116
34,031,850 >>> mbox cmd response data (12 bytes)
36,093,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,410,877 >>> mbox cmd response: success
43,411,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,447,014 UART:
43,447,331 UART: Running Caliptra FMC ...
43,448,372 UART:
43,448,518 UART: [state] CFI Enabled
43,537,155 UART: [art] Extend RT PCRs Done
43,538,456 UART: [art] Lock RT PCRs Done
43,539,674 UART: [art] Populate DV Done
43,545,144 UART: [fht] FMC Alias Private Key: 7
43,546,851 UART: [art] Derive CDI
43,547,584 UART: [art] Store in slot 0x4
43,606,324 UART: [art] Derive Key Pair
43,607,366 UART: [art] Store priv key in slot 0x5
46,069,794 UART: [art] Derive Key Pair - Done
46,082,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,795,115 UART: [art] Erasing AUTHORITY.KEYID = 7
47,796,645 UART: [art] PUB.X = 469FEEC71125F71ACF50DAB2B9951B2C9C4A1BD8E4712A56EF862E9B9F3230015B4253EF53885B97A8FCF13E805333D7
47,803,913 UART: [art] PUB.Y = 7C86490CF6731234B2051AB34E3B8BABE3785AE55E4169A82A74C231D46842D737968870DB2B77E1ABF7BF63CEB20413
47,811,148 UART: [art] SIG.R = DFE94427C1AD684F14454F0BDF4805B03133563699947BC86228405326BB33687775DFA52113F5B6470E609764132C55
47,818,488 UART: [art] SIG.S = 471C15CC17C55F7BB1D13773EACEDE52D04520ADE982C41CAF52081B041C29C03936FDC53AA9555BEC4A5A7FE7269EF5
48,797,567 UART: Caliptra RT
48,798,258 UART: [state] CFI Enabled
49,216,910 UART: [rt] RT listening for mailbox commands...
49,248,833 UART: [rt]cmd =0x41545348, len=116
49,268,845 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,588 UART:
192,959 UART: Running Caliptra ROM ...
194,100 UART:
603,805 UART: [state] CFI Enabled
617,917 UART: [state] LifecycleState = Unprovisioned
619,798 UART: [state] DebugLocked = No
622,325 UART: [state] WD Timer not started. Device not locked for debugging
626,729 UART: [kat] SHA2-256
806,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,210 UART: [kat] ++
817,659 UART: [kat] sha1
828,532 UART: [kat] SHA2-256
831,194 UART: [kat] SHA2-384
837,617 UART: [kat] SHA2-512-ACC
839,987 UART: [kat] ECC-384
3,282,478 UART: [kat] HMAC-384Kdf
3,295,660 UART: [kat] LMS
3,772,129 UART: [kat] --
3,777,119 UART: [cold-reset] ++
3,778,699 UART: [fht] FHT @ 0x50003400
3,790,612 UART: [idev] ++
3,791,175 UART: [idev] CDI.KEYID = 6
3,792,159 UART: [idev] SUBJECT.KEYID = 7
3,793,408 UART: [idev] UDS.KEYID = 0
3,794,337 ready_for_fw is high
3,794,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,366 UART: [idev] Erasing UDS.KEYID = 0
6,274,871 UART: [idev] Sha1 KeyId Algorithm
6,298,365 UART: [idev] --
6,303,551 UART: [ldev] ++
6,304,124 UART: [ldev] CDI.KEYID = 6
6,305,036 UART: [ldev] SUBJECT.KEYID = 5
6,306,275 UART: [ldev] AUTHORITY.KEYID = 7
6,307,512 UART: [ldev] FE.KEYID = 1
6,316,620 UART: [ldev] Erasing FE.KEYID = 1
8,791,305 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,598 UART: [ldev] --
10,583,556 UART: [fwproc] Wait for Commands...
10,586,195 UART: [fwproc] Recv command 0x46574c44
10,588,182 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,635 >>> mbox cmd response: success
14,563,451 UART: [afmc] ++
14,564,077 UART: [afmc] CDI.KEYID = 6
14,564,974 UART: [afmc] SUBJECT.KEYID = 7
14,566,422 UART: [afmc] AUTHORITY.KEYID = 5
17,070,236 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,575 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,372 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,469 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,009 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,614 UART: [afmc] --
18,868,104 UART: [cold-reset] --
18,872,991 UART: [state] Locking Datavault
18,878,676 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,436 UART: [state] Locking ICCM
18,882,265 UART: [exit] Launching FMC @ 0x40000130
18,890,689 UART:
18,890,968 UART: Running Caliptra FMC ...
18,892,081 UART:
18,892,249 UART: [state] CFI Enabled
18,900,572 UART: [fht] FMC Alias Private Key: 7
20,667,264 UART: [art] Extend RT PCRs Done
20,668,482 UART: [art] Lock RT PCRs Done
20,670,215 UART: [art] Populate DV Done
20,675,742 UART: [fht] FMC Alias Private Key: 7
20,677,391 UART: [art] Derive CDI
20,678,209 UART: [art] Store in slot 0x4
20,720,803 UART: [art] Derive Key Pair
20,721,799 UART: [art] Store priv key in slot 0x5
23,148,732 UART: [art] Derive Key Pair - Done
23,161,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,878 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,398 UART: [art] PUB.X = D87DC4D1DFEB5EAF495EFF1ED698C328DCFD01CF616F398CA90B25457DA714A3A4B182DC70399785942C632723FD09C4
24,876,717 UART: [art] PUB.Y = 5BC2C13B893BCD36FF5A73A1003B46BD2939B01C40A3D204482CDDCD5948CE20722B607F80780B41E3E8AEEF841A4382
24,883,951 UART: [art] SIG.R = AB85CFC38B11FFD1CD929FC62B2420C738422ECC6EFA9D2E8932673210C88331CF9633FB2DEE23A1B4F94B731EB13548
24,891,385 UART: [art] SIG.S = 50B13D824860AFAB3431DF463FFCF37AB32334E8D7DFA308FADE665BF990F7584CFB1073DAC13EB5A24A861885DEF282
25,869,972 UART: Caliptra RT
25,870,672 UART: [state] CFI Enabled
26,003,231 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,045,966 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,201,365 UART: [rt]cmd =0x41544d4e, len=14344
34,196,006 >>> mbox cmd response data (8 bytes)
34,196,590 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,227,167 UART: [rt]cmd =0x41545348, len=116
34,245,626 >>> mbox cmd response data (12 bytes)
36,304,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,455,713 UART:
36,456,078 UART: Running Caliptra ROM ...
36,457,218 UART:
36,457,401 UART: [state] CFI Enabled
36,472,643 UART: [state] LifecycleState = Unprovisioned
36,474,545 UART: [state] DebugLocked = No
36,477,369 UART: [state] WD Timer not started. Device not locked for debugging
36,481,392 UART: [kat] SHA2-256
36,661,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,671,931 UART: [kat] ++
36,672,479 UART: [kat] sha1
36,682,942 UART: [kat] SHA2-256
36,685,668 UART: [kat] SHA2-384
36,691,766 UART: [kat] SHA2-512-ACC
36,694,119 UART: [kat] ECC-384
39,135,196 UART: [kat] HMAC-384Kdf
39,146,404 UART: [kat] LMS
39,622,860 UART: [kat] --
39,628,363 UART: [update-reset] ++
43,131,893 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,135,449 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
43,533,111 >>> mbox cmd response: success
43,533,543 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,534,196 UART: [update-reset] Copying MAN_2 To MAN_1
43,571,271 UART: [update-reset Success] --
43,574,966 UART: [state] Locking Datavault
43,579,622 UART: [state] Locking PCR0, PCR1 and PCR31
43,581,326 UART: [state] Locking ICCM
43,583,662 UART: [exit] Launching FMC @ 0x40000130
43,592,066 UART:
43,592,307 UART: Running Caliptra FMC ...
43,593,410 UART:
43,593,570 UART: [state] CFI Enabled
43,637,429 UART: [art] Extend RT PCRs Done
43,638,619 UART: [art] Lock RT PCRs Done
43,639,915 UART: [art] Populate DV Done
43,645,107 UART: [fht] FMC Alias Private Key: 7
43,646,757 UART: [art] Derive CDI
43,647,575 UART: [art] Store in slot 0x4
43,690,227 UART: [art] Derive Key Pair
43,691,270 UART: [art] Store priv key in slot 0x5
46,118,497 UART: [art] Derive Key Pair - Done
46,131,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,837,928 UART: [art] Erasing AUTHORITY.KEYID = 7
47,839,458 UART: [art] PUB.X = 90DF581891E1DC7659F927972E547C6EF67243C6491AFFB205A0731F45ED3D86160570FB3E5520A908CC7D0468BAAF34
47,846,733 UART: [art] PUB.Y = 7DA31E9E7604C1854085A12134F590C26CE915F6CE09A100091543B69ADF65F23BD2CF8A7452B8A0836F21A7A7F5C3BC
47,853,917 UART: [art] SIG.R = ECFFD643970CBEC9BF03868AEE980E1019CBA0DA478AA5FC8C4F1E5CF1A075A4F082691657D78DA5319872D27F1688C2
47,861,375 UART: [art] SIG.S = 58B10354D3AFDB506DE920295F7695A615F9830F3A856AEA7E7A354C8474F2E4A3202234B9EC460C9DAA4A3B6482876E
48,840,273 UART: Caliptra RT
48,840,984 UART: [state] CFI Enabled
49,212,205 UART: [rt] RT listening for mailbox commands...
49,244,275 UART: [rt]cmd =0x41545348, len=116
49,264,019 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,777,509 ready_for_fw is high
3,777,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,761 >>> mbox cmd response: success
18,699,393 UART:
18,699,784 UART: Running Caliptra FMC ...
18,700,978 UART:
18,701,149 UART: [state] CFI Enabled
18,709,256 UART: [fht] FMC Alias Private Key: 7
20,475,849 UART: [art] Extend RT PCRs Done
20,477,066 UART: [art] Lock RT PCRs Done
20,478,649 UART: [art] Populate DV Done
20,483,748 UART: [fht] FMC Alias Private Key: 7
20,485,348 UART: [art] Derive CDI
20,486,167 UART: [art] Store in slot 0x4
20,528,825 UART: [art] Derive Key Pair
20,529,867 UART: [art] Store priv key in slot 0x5
22,956,835 UART: [art] Derive Key Pair - Done
22,970,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,836 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,345 UART: [art] PUB.X = 164F008A3F0B292C34BC6CD110ED689F64E7FADBE748D64C68ED11DAFA7F0EA1341999BAA639AFED1B3E017EA08152D1
24,685,616 UART: [art] PUB.Y = 86DD9A21B223A8704E7450FF3940F526CBE578E6B0080063A971FAE04C7DB572554D95A6F9C762DD72BDC1FDF07937A2
24,692,829 UART: [art] SIG.R = 3A74B4F0C0D2D569DB814A77ECD95ECD9A8C00F1A2A01CDF51795CEDACF21C5B0EAFB733122F206212824219A1E49CC5
24,700,240 UART: [art] SIG.S = 89A6F96B88D04C808D3FE289153E8F656598D46B00DDF8A1212D1B28255DC3FE7282D9C38B9C8D39E617EF8F9EC8FFB3
25,679,726 UART: Caliptra RT
25,680,433 UART: [state] CFI Enabled
25,813,000 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,869,426 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,025,943 UART: [rt]cmd =0x41544d4e, len=14344
34,021,877 >>> mbox cmd response data (8 bytes)
34,023,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,054,014 UART: [rt]cmd =0x41545348, len=116
34,074,400 >>> mbox cmd response data (12 bytes)
36,132,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,369,462 >>> mbox cmd response: success
43,370,219 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
43,404,073 UART:
43,404,410 UART: Running Caliptra FMC ...
43,405,540 UART:
43,405,707 UART: [state] CFI Enabled
43,449,726 UART: [art] Extend RT PCRs Done
43,451,035 UART: [art] Lock RT PCRs Done
43,452,284 UART: [art] Populate DV Done
43,457,915 UART: [fht] FMC Alias Private Key: 7
43,459,459 UART: [art] Derive CDI
43,460,259 UART: [art] Store in slot 0x4
43,503,022 UART: [art] Derive Key Pair
43,504,038 UART: [art] Store priv key in slot 0x5
45,930,588 UART: [art] Derive Key Pair - Done
45,943,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,649,615 UART: [art] Erasing AUTHORITY.KEYID = 7
47,651,123 UART: [art] PUB.X = 69A8EC7F8BD13A72BACAA31D9D75AAFC0BA8D234E1D1C7174850FB865E57769A462BF79D763D5B28AEBA7597E53E8B87
47,658,437 UART: [art] PUB.Y = 94533E7EAA0A82205BC14C27DB96D098DF750F5D3C87415C1AC7F421F07BD5A425A8DA0330A09CAB8DE9937FF7F53884
47,665,684 UART: [art] SIG.R = BC20AE6C067DFF024642654BAF9AFA423FB82E299FD92BC78E883DDCB44332A32F42FC7B613D2DF02A13560688B8663A
47,673,084 UART: [art] SIG.S = 96DC72697B964B4916FE855C72BE140339C7B87866239D7EEE93DB227A04B7FB44EB8C4F3AA5232839B7600E880B71FD
48,652,160 UART: Caliptra RT
48,652,877 UART: [state] CFI Enabled
49,028,905 UART: [rt] RT listening for mailbox commands...
49,061,076 UART: [rt]cmd =0x41545348, len=116
49,081,014 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,030 UART:
192,430 UART: Running Caliptra ROM ...
193,539 UART:
193,684 UART: [state] CFI Enabled
266,603 UART: [state] LifecycleState = Unprovisioned
268,953 UART: [state] DebugLocked = No
270,827 UART: [state] WD Timer not started. Device not locked for debugging
275,352 UART: [kat] SHA2-256
465,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,008 UART: [kat] ++
476,462 UART: [kat] sha1
488,325 UART: [kat] SHA2-256
491,332 UART: [kat] SHA2-384
496,821 UART: [kat] SHA2-512-ACC
499,424 UART: [kat] ECC-384
2,945,974 UART: [kat] HMAC-384Kdf
2,971,651 UART: [kat] LMS
3,503,393 UART: [kat] --
3,510,297 UART: [cold-reset] ++
3,511,515 UART: [fht] FHT @ 0x50003400
3,522,870 UART: [idev] ++
3,523,576 UART: [idev] CDI.KEYID = 6
3,524,549 UART: [idev] SUBJECT.KEYID = 7
3,525,727 UART: [idev] UDS.KEYID = 0
3,526,648 ready_for_fw is high
3,526,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,006 UART: [idev] Erasing UDS.KEYID = 0
6,027,016 UART: [idev] Sha1 KeyId Algorithm
6,051,065 UART: [idev] --
6,057,546 UART: [ldev] ++
6,058,226 UART: [ldev] CDI.KEYID = 6
6,059,190 UART: [ldev] SUBJECT.KEYID = 5
6,060,345 UART: [ldev] AUTHORITY.KEYID = 7
6,061,577 UART: [ldev] FE.KEYID = 1
6,098,471 UART: [ldev] Erasing FE.KEYID = 1
8,602,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,898 UART: [ldev] --
10,415,426 UART: [fwproc] Wait for Commands...
10,418,058 UART: [fwproc] Recv command 0x46574c44
10,420,360 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,935 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,502 >>> mbox cmd response: success
14,683,721 UART: [afmc] ++
14,684,468 UART: [afmc] CDI.KEYID = 6
14,685,664 UART: [afmc] SUBJECT.KEYID = 7
14,687,100 UART: [afmc] AUTHORITY.KEYID = 5
17,235,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,454 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,492 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,614 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,569 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,983 UART: [afmc] --
19,031,149 UART: [cold-reset] --
19,035,556 UART: [state] Locking Datavault
19,043,833 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,985 UART: [state] Locking ICCM
19,047,651 UART: [exit] Launching FMC @ 0x40000130
19,056,326 UART:
19,056,559 UART: Running Caliptra FMC ...
19,057,661 UART:
19,057,825 UART: [state] CFI Enabled
19,114,214 UART: [fht] FMC Alias Private Key: 7
20,881,156 UART: [art] Extend RT PCRs Done
20,882,572 UART: [art] Lock RT PCRs Done
20,883,903 UART: [art] Populate DV Done
20,888,946 UART: [fht] FMC Alias Private Key: 7
20,890,595 UART: [art] Derive CDI
20,891,411 UART: [art] Store in slot 0x4
20,948,679 UART: [art] Derive Key Pair
20,949,711 UART: [art] Store priv key in slot 0x5
23,412,808 UART: [art] Derive Key Pair - Done
23,425,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,248 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,249 UART: [art] PUB.X = 40C83DFD17CA019566D8CE70C3F2C5604EF2966C4A6F96D442D9D103BB2605774115B5607A825CBED657FE137888F4B3
25,147,020 UART: [art] PUB.Y = 39BA93158643D9C95D48346FFC2397A6C6C3282505280523D67FE67669816CB8706C7BAFA6785E0785156D00158B495F
25,154,258 UART: [art] SIG.R = 751B2E3869E55A279A792FBDE6FF5817DDC17593739B147C299E5D23B08A53B0D9C6DD4CD3FBC326B7A10001161EA35A
25,161,606 UART: [art] SIG.S = 678B4C0EAA022C24D78F8EB7F44D6AF938F7B5FE4C02161994BB5FC2815A1A588221A91C2046E6B40A877F4B2AEB4BBE
26,140,415 UART: Caliptra RT
26,141,102 UART: [state] CFI Enabled
26,321,333 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,363,915 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,519,357 UART: [rt]cmd =0x41544d4e, len=14344
34,514,914 >>> mbox cmd response data (8 bytes)
34,515,486 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,546,159 UART: [rt]cmd =0x41545348, len=116
34,565,703 >>> mbox cmd response data (12 bytes)
36,631,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,782,454 UART:
36,782,826 UART: Running Caliptra ROM ...
36,783,879 UART:
36,784,033 UART: [state] CFI Enabled
36,842,353 UART: [state] LifecycleState = Unprovisioned
36,844,460 UART: [state] DebugLocked = No
36,847,276 UART: [state] WD Timer not started. Device not locked for debugging
36,851,855 UART: [kat] SHA2-256
37,041,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,052,467 UART: [kat] ++
37,052,923 UART: [kat] sha1
37,064,290 UART: [kat] SHA2-256
37,067,300 UART: [kat] SHA2-384
37,072,435 UART: [kat] SHA2-512-ACC
37,075,008 UART: [kat] ECC-384
39,527,861 UART: [kat] HMAC-384Kdf
39,550,674 UART: [kat] LMS
40,082,251 UART: [kat] --
40,088,643 UART: [update-reset] ++
43,603,558 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,607,382 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,237,104 >>> mbox cmd response: success
44,241,925 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,242,530 UART: [update-reset] Copying MAN_2 To MAN_1
44,275,109 UART: [update-reset Success] --
44,279,223 UART: [state] Locking Datavault
44,283,451 UART: [state] Locking PCR0, PCR1 and PCR31
44,285,656 UART: [state] Locking ICCM
44,287,210 UART: [exit] Launching FMC @ 0x40000130
44,295,872 UART:
44,296,116 UART: Running Caliptra FMC ...
44,297,171 UART:
44,297,324 UART: [state] CFI Enabled
44,384,716 UART: [art] Extend RT PCRs Done
44,385,905 UART: [art] Lock RT PCRs Done
44,387,089 UART: [art] Populate DV Done
44,392,710 UART: [fht] FMC Alias Private Key: 7
44,394,347 UART: [art] Derive CDI
44,395,157 UART: [art] Store in slot 0x4
44,453,224 UART: [art] Derive Key Pair
44,454,269 UART: [art] Store priv key in slot 0x5
46,917,370 UART: [art] Derive Key Pair - Done
46,929,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,642,809 UART: [art] Erasing AUTHORITY.KEYID = 7
48,644,470 UART: [art] PUB.X = D9698181ADCBB2A600483EDF6B5637DCFF073A6BC1DBE1E47FB911A54CC2B5AAA8981969067CF10179E64848CAD0B7AF
48,651,574 UART: [art] PUB.Y = B8F1210E46F394FD1B49451EC9DEA6175B416CD24133758AF9ECB2E47CC721E619F5E7B6ECE5F9EC47A134BC4789430F
48,658,816 UART: [art] SIG.R = 4F3B72AAE877883F971E9037899E1380EC951DDE8D3D27F862A4CCC55470381FA2537E26FF653FEFF7282B6D2F0083DE
48,666,260 UART: [art] SIG.S = 26F2FBE25EAAD4E461BE77A9F4E6F744568898876C7DA70D9BFCD7D131E23FEFCE536A1F53F3A5A78BC1484530F53E54
49,644,642 UART: Caliptra RT
49,645,327 UART: [state] CFI Enabled
50,067,043 UART: [rt] RT listening for mailbox commands...
50,099,075 UART: [rt]cmd =0x41545348, len=116
50,119,047 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,441,520 ready_for_fw is high
3,441,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,842,437 >>> mbox cmd response: success
19,133,915 UART:
19,134,329 UART: Running Caliptra FMC ...
19,135,435 UART:
19,135,586 UART: [state] CFI Enabled
19,200,325 UART: [fht] FMC Alias Private Key: 7
20,966,937 UART: [art] Extend RT PCRs Done
20,968,165 UART: [art] Lock RT PCRs Done
20,970,037 UART: [art] Populate DV Done
20,975,517 UART: [fht] FMC Alias Private Key: 7
20,977,164 UART: [art] Derive CDI
20,977,899 UART: [art] Store in slot 0x4
21,034,466 UART: [art] Derive Key Pair
21,035,512 UART: [art] Store priv key in slot 0x5
23,498,304 UART: [art] Derive Key Pair - Done
23,511,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,025 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,539 UART: [art] PUB.X = 00243506BD922814470B82EF8FA2102015C971AE1FC1F91DE8CA8FC12AFA464E661F60F6339902B6ADDF7FD18D478807
25,232,795 UART: [art] PUB.Y = AB42D9D94D61EA4963BC51F216C92259C1AAA4EAF178B6DD225EC83E06362C9DFFCC30A52D8F83307421E1A0B6B78EC6
25,240,045 UART: [art] SIG.R = 5C9F76D634D41A418A6108A3A12E3A80B71C0C3DC37C01A3A04C0EC15D75752F0F7A97D9FE08514E0A05C88F9D5604D9
25,247,402 UART: [art] SIG.S = 9BE5770B68D16988F76F23EBB7B85952AB1D36189515ECD1D4CA381633C743E18EF1FDC8E0DCFBB41C940CA125AFB1AD
26,226,435 UART: Caliptra RT
26,227,132 UART: [state] CFI Enabled
26,408,345 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,449,931 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,605,372 UART: [rt]cmd =0x41544d4e, len=14344
34,600,522 >>> mbox cmd response data (8 bytes)
34,601,141 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,631,888 UART: [rt]cmd =0x41545348, len=116
34,651,444 >>> mbox cmd response data (12 bytes)
36,717,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,623,162 >>> mbox cmd response: success
44,627,970 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,657,026 UART:
44,657,369 UART: Running Caliptra FMC ...
44,658,445 UART:
44,658,609 UART: [state] CFI Enabled
44,746,547 UART: [art] Extend RT PCRs Done
44,747,866 UART: [art] Lock RT PCRs Done
44,749,300 UART: [art] Populate DV Done
44,754,880 UART: [fht] FMC Alias Private Key: 7
44,756,530 UART: [art] Derive CDI
44,757,345 UART: [art] Store in slot 0x4
44,815,718 UART: [art] Derive Key Pair
44,816,769 UART: [art] Store priv key in slot 0x5
47,280,108 UART: [art] Derive Key Pair - Done
47,292,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,005,305 UART: [art] Erasing AUTHORITY.KEYID = 7
49,006,822 UART: [art] PUB.X = A195F2FA642F725247907CB07BFC13B58C34B76AE1EB0BA635F82D53C059D5FEDA83B4DD8102EAB804071DB86DBBE1CE
49,014,131 UART: [art] PUB.Y = F9148FB95DAF7C5207FC18D65DAFAFCF32C579CE633D42CA07BFE30AD98DA3E50DAEC93B01A61B825F344F90243CD2CC
49,021,410 UART: [art] SIG.R = 7FE1CCE9E3A1204F47E5FB236771F4E5E32E92C42B535FFF45BA41A148A78AE4614BDBE21C009E92A4A87A8FC43DCDD8
49,028,796 UART: [art] SIG.S = 938471A7AFBB83A07E94B92B1E633D7916AC8BDD34F5D6BEDE12D1A1B25579E7E3903F4893D83F566E1CAD6E83023C9E
50,007,868 UART: Caliptra RT
50,008,566 UART: [state] CFI Enabled
50,430,548 UART: [rt] RT listening for mailbox commands...
50,462,392 UART: [rt]cmd =0x41545348, len=116
50,481,336 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,267 UART:
192,642 UART: Running Caliptra ROM ...
193,759 UART:
603,451 UART: [state] CFI Enabled
614,232 UART: [state] LifecycleState = Unprovisioned
616,621 UART: [state] DebugLocked = No
618,358 UART: [state] WD Timer not started. Device not locked for debugging
622,197 UART: [kat] SHA2-256
812,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,901 UART: [kat] ++
823,389 UART: [kat] sha1
835,972 UART: [kat] SHA2-256
838,980 UART: [kat] SHA2-384
844,695 UART: [kat] SHA2-512-ACC
847,285 UART: [kat] ECC-384
3,288,942 UART: [kat] HMAC-384Kdf
3,301,961 UART: [kat] LMS
3,833,799 UART: [kat] --
3,839,734 UART: [cold-reset] ++
3,840,884 UART: [fht] FHT @ 0x50003400
3,852,311 UART: [idev] ++
3,853,055 UART: [idev] CDI.KEYID = 6
3,853,977 UART: [idev] SUBJECT.KEYID = 7
3,855,154 UART: [idev] UDS.KEYID = 0
3,856,079 ready_for_fw is high
3,856,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,990 UART: [idev] Erasing UDS.KEYID = 0
6,334,326 UART: [idev] Sha1 KeyId Algorithm
6,356,861 UART: [idev] --
6,361,727 UART: [ldev] ++
6,362,413 UART: [ldev] CDI.KEYID = 6
6,363,390 UART: [ldev] SUBJECT.KEYID = 5
6,364,553 UART: [ldev] AUTHORITY.KEYID = 7
6,365,734 UART: [ldev] FE.KEYID = 1
6,375,428 UART: [ldev] Erasing FE.KEYID = 1
8,852,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,783 UART: [ldev] --
10,644,376 UART: [fwproc] Wait for Commands...
10,646,188 UART: [fwproc] Recv command 0x46574c44
10,648,512 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,061 >>> mbox cmd response: success
14,908,195 UART: [afmc] ++
14,908,930 UART: [afmc] CDI.KEYID = 6
14,910,150 UART: [afmc] SUBJECT.KEYID = 7
14,911,603 UART: [afmc] AUTHORITY.KEYID = 5
17,413,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,136,757 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,138,720 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,153,820 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,168,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,183,833 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,040 UART: [afmc] --
19,212,860 UART: [cold-reset] --
19,218,315 UART: [state] Locking Datavault
19,224,772 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,932 UART: [state] Locking ICCM
19,228,553 UART: [exit] Launching FMC @ 0x40000130
19,237,242 UART:
19,237,486 UART: Running Caliptra FMC ...
19,238,611 UART:
19,238,774 UART: [state] CFI Enabled
19,246,935 UART: [fht] FMC Alias Private Key: 7
21,013,242 UART: [art] Extend RT PCRs Done
21,014,456 UART: [art] Lock RT PCRs Done
21,015,756 UART: [art] Populate DV Done
21,021,070 UART: [fht] FMC Alias Private Key: 7
21,022,515 UART: [art] Derive CDI
21,023,437 UART: [art] Store in slot 0x4
21,066,148 UART: [art] Derive Key Pair
21,067,189 UART: [art] Store priv key in slot 0x5
23,494,313 UART: [art] Derive Key Pair - Done
23,507,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,187 UART: [art] PUB.X = 8C0A1A2AA7186C734685633858ADFBABA82D4068E2B8F8411AF438D79F4E2B454C359909BFC62B82769C5658103F4C6B
25,222,462 UART: [art] PUB.Y = C5E722F151860B677CEE4FF567EE394036856EC8533F37D9111848D906FB75072C5077F5EE65D85952A1B7B429061B59
25,229,683 UART: [art] SIG.R = F20A2362F90861C0C499507FE153D4E91108B61531FF6B2EE9446C55C6B020D5A13BC495DCB40794B75799AA71E00033
25,237,052 UART: [art] SIG.S = D05370DCAF671D26DEB920E8A6D9908FE4A5FC826D0977B6A26F573C36DC755BFBA969B0A9D5726B403DC3D906D2FAED
26,215,856 UART: Caliptra RT
26,216,719 UART: [state] CFI Enabled
26,350,175 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,402,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,558,539 UART: [rt]cmd =0x41544d4e, len=14344
34,554,147 >>> mbox cmd response data (8 bytes)
34,555,253 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,586,078 UART: [rt]cmd =0x41545348, len=116
34,605,890 >>> mbox cmd response data (12 bytes)
36,676,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,827,002 UART:
36,827,366 UART: Running Caliptra ROM ...
36,828,511 UART:
36,828,687 UART: [state] CFI Enabled
36,841,772 UART: [state] LifecycleState = Unprovisioned
36,843,817 UART: [state] DebugLocked = No
36,846,638 UART: [state] WD Timer not started. Device not locked for debugging
36,852,002 UART: [kat] SHA2-256
37,041,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,052,657 UART: [kat] ++
37,053,176 UART: [kat] sha1
37,065,803 UART: [kat] SHA2-256
37,068,839 UART: [kat] SHA2-384
37,073,669 UART: [kat] SHA2-512-ACC
37,076,252 UART: [kat] ECC-384
39,520,424 UART: [kat] HMAC-384Kdf
39,532,711 UART: [kat] LMS
40,064,343 UART: [kat] --
40,068,672 UART: [update-reset] ++
43,586,965 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,590,946 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,220,686 >>> mbox cmd response: success
44,225,323 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,225,913 UART: [update-reset] Copying MAN_2 To MAN_1
44,259,484 UART: [update-reset Success] --
44,264,118 UART: [state] Locking Datavault
44,267,663 UART: [state] Locking PCR0, PCR1 and PCR31
44,269,868 UART: [state] Locking ICCM
44,272,349 UART: [exit] Launching FMC @ 0x40000130
44,281,031 UART:
44,281,273 UART: Running Caliptra FMC ...
44,282,376 UART:
44,282,535 UART: [state] CFI Enabled
44,326,096 UART: [art] Extend RT PCRs Done
44,327,299 UART: [art] Lock RT PCRs Done
44,328,650 UART: [art] Populate DV Done
44,334,170 UART: [fht] FMC Alias Private Key: 7
44,335,706 UART: [art] Derive CDI
44,336,522 UART: [art] Store in slot 0x4
44,379,116 UART: [art] Derive Key Pair
44,380,118 UART: [art] Store priv key in slot 0x5
46,807,114 UART: [art] Derive Key Pair - Done
46,820,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,526,250 UART: [art] Erasing AUTHORITY.KEYID = 7
48,527,758 UART: [art] PUB.X = A5BE8870255AE0AF8108318BE94E5F39237DC1B817B056605FE4D102C9BF9206FD8A640209D7D8E3C35C7C3DB9358262
48,535,035 UART: [art] PUB.Y = 839801B5D58EEB60F1AE8827AA7F005F727697A3A3B2137FD39CD2B16833D61B1F21AA3203532E258E2AD974714FC912
48,542,288 UART: [art] SIG.R = 3FDB9CA79873AC9104EE76AAEC330C497351F148C3C6DF8BB174085992813716A071EF8E6AF7E088BD809D1F04EBBF6B
48,549,649 UART: [art] SIG.S = E152FB35862785EAD777E6C06356D429FDE4CE12EB4F01E8C834ACCA45489E790E5271D2511271827B35803387B96CE9
49,528,467 UART: Caliptra RT
49,529,155 UART: [state] CFI Enabled
49,901,773 UART: [rt] RT listening for mailbox commands...
49,933,793 UART: [rt]cmd =0x41545348, len=116
49,953,729 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
3,753,796 ready_for_fw is high
3,754,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,924 >>> mbox cmd response: success
19,298,596 UART:
19,299,019 UART: Running Caliptra FMC ...
19,300,150 UART:
19,300,313 UART: [state] CFI Enabled
19,308,481 UART: [fht] FMC Alias Private Key: 7
21,074,325 UART: [art] Extend RT PCRs Done
21,075,590 UART: [art] Lock RT PCRs Done
21,077,257 UART: [art] Populate DV Done
21,082,690 UART: [fht] FMC Alias Private Key: 7
21,084,403 UART: [art] Derive CDI
21,085,150 UART: [art] Store in slot 0x4
21,128,180 UART: [art] Derive Key Pair
21,129,224 UART: [art] Store priv key in slot 0x5
23,555,835 UART: [art] Derive Key Pair - Done
23,568,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,175 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,687 UART: [art] PUB.X = A47806465186C57EE123F0817FAD3AF4966CE216D6D7BA5C695623B9D8EBB549962F84B16786768C4E6B92D64108E4F1
25,283,903 UART: [art] PUB.Y = CC0EF4BAEE613DAFB443A96BE6527C983E074E8814AC74DA59EE6EC0EB5FB63285CB16F86F2A491778AFA6D6A7B807D1
25,291,174 UART: [art] SIG.R = 54055967730BB488FF72E295A6D359D4F029731EB9A5AA9DF5E8F9C8C4E5DE267997E8457F60996A6AF32BAE2691C10B
25,298,590 UART: [art] SIG.S = 9A528854692621EA33F8D9023FD3EF8605C16E839D31CE09A65A8C8F30218C7C91E13F305FB82315375C6ECD76E3B0AC
26,277,697 UART: Caliptra RT
26,278,409 UART: [state] CFI Enabled
26,411,276 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,463,455 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,618,986 UART: [rt]cmd =0x41544d4e, len=14344
34,614,615 >>> mbox cmd response data (8 bytes)
34,615,214 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,646,020 UART: [rt]cmd =0x41545348, len=116
34,665,659 >>> mbox cmd response data (12 bytes)
36,735,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,551,269 >>> mbox cmd response: success
44,556,499 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
44,587,273 UART:
44,587,580 UART: Running Caliptra FMC ...
44,588,702 UART:
44,588,875 UART: [state] CFI Enabled
44,633,130 UART: [art] Extend RT PCRs Done
44,634,449 UART: [art] Lock RT PCRs Done
44,635,677 UART: [art] Populate DV Done
44,641,156 UART: [fht] FMC Alias Private Key: 7
44,642,815 UART: [art] Derive CDI
44,643,554 UART: [art] Store in slot 0x4
44,686,041 UART: [art] Derive Key Pair
44,687,069 UART: [art] Store priv key in slot 0x5
47,113,735 UART: [art] Derive Key Pair - Done
47,126,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,833,150 UART: [art] Erasing AUTHORITY.KEYID = 7
48,834,658 UART: [art] PUB.X = C33D1E41021F37BBA1A276122AFBF73AD30F964608BDD69CB2B4E515511C37C93B9E845B3EE8E366BA7230923D40E8B0
48,841,980 UART: [art] PUB.Y = B46E43E44CD1C874E9AD680BEBEF224F3EA3AD02DFD3060FE7FCD523340EEA42B8FF8BFBFA39BDDF17EED3468230BD0D
48,849,222 UART: [art] SIG.R = 28A92304CE9FC830A156C15EA7369960A758DC47C2DFEE161F20B53C9FEFCF77F8FDD2BC4AD6B696789EDA93658A3513
48,856,629 UART: [art] SIG.S = 3FE8D0BD915628B930394EA182967D2CDF96A6E144985516091017CEC238E1310CAAA457E5A8644B0DAFF417847E79BC
49,835,400 UART: Caliptra RT
49,836,095 UART: [state] CFI Enabled
50,209,406 UART: [rt] RT listening for mailbox commands...
50,241,032 UART: [rt]cmd =0x41545348, len=116
50,260,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,270 UART: [state] LifecycleState = Unprovisioned
85,925 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,167 UART: [kat] SHA2-256
882,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,213 UART: [kat] ++
886,365 UART: [kat] sha1
890,653 UART: [kat] SHA2-256
892,591 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,846 UART: [kat] HMAC-384Kdf
907,410 UART: [kat] LMS
1,475,606 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,981 UART: [fht] Storing FHT @ 0x50003400
1,479,798 UART: [idev] ++
1,479,966 UART: [idev] CDI.KEYID = 6
1,480,326 UART: [idev] SUBJECT.KEYID = 7
1,480,750 UART: [idev] UDS.KEYID = 0
1,481,095 ready_for_fw is high
1,481,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,640 UART: [idev] Erasing UDS.KEYID = 0
1,505,118 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,662 UART: [idev] --
1,514,759 UART: [ldev] ++
1,514,927 UART: [ldev] CDI.KEYID = 6
1,515,290 UART: [ldev] SUBJECT.KEYID = 5
1,515,716 UART: [ldev] AUTHORITY.KEYID = 7
1,516,179 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,547,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,584 UART: [ldev] --
1,585,977 UART: [fwproc] Waiting for Commands...
1,586,752 UART: [fwproc] Received command 0x46574c44
1,587,543 UART: [fwproc] Received Image of size 118548 bytes
2,931,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,367 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,585 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,952 >>> mbox cmd response: success
3,132,162 UART: [afmc] ++
3,132,330 UART: [afmc] CDI.KEYID = 6
3,132,692 UART: [afmc] SUBJECT.KEYID = 7
3,133,117 UART: [afmc] AUTHORITY.KEYID = 5
3,167,616 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,860 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,640 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,349 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,232 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,915 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,827 UART: [afmc] --
3,210,867 UART: [cold-reset] --
3,211,649 UART: [state] Locking Datavault
3,212,922 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,526 UART: [state] Locking ICCM
3,214,020 UART: [exit] Launching FMC @ 0x40000130
3,219,350 UART:
3,219,366 UART: Running Caliptra FMC ...
3,219,774 UART:
3,219,828 UART: [state] CFI Enabled
3,229,972 UART: [fht] FMC Alias Private Key: 7
3,349,336 UART: [art] Extend RT PCRs Done
3,349,764 UART: [art] Lock RT PCRs Done
3,351,326 UART: [art] Populate DV Done
3,359,477 UART: [fht] FMC Alias Private Key: 7
3,360,469 UART: [art] Derive CDI
3,360,749 UART: [art] Store in slot 0x4
3,446,399 UART: [art] Derive Key Pair
3,446,759 UART: [art] Store priv key in slot 0x5
3,459,814 UART: [art] Derive Key Pair - Done
3,474,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,933 UART: [art] PUB.X = A5A6C7D00902A8801F198FAB0C4FE887D8F39506C02F8490CCF345EBBBCD94CFB00FF7A21B5FCED8A14B56D5796EB5F7
3,497,710 UART: [art] PUB.Y = 529A94486BB1581D7EA037FAA1F01C0223F6FAECE5A86C1958DBF97A4F59A903A1900DD61EDA2CF7EC3FEB4D7DD60790
3,504,668 UART: [art] SIG.R = BD4A40A7309FCC2BDFD068EE48D9A4DD4B1773BDB876093241095026C1BD9BE9EA5047569A00555F9FD674AA9172BFEC
3,511,424 UART: [art] SIG.S = 3C11CE1C69BF4326FE9BF0493001BED35DB29FD2B8C893EB6CC9FD19855FA5528FA28174437FF1AF5242BA8AD2C16E3F
3,535,215 UART: Caliptra RT
3,535,466 UART: [state] CFI Enabled
3,655,836 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,506 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,888 UART: [rt]cmd =0x41544d4e, len=14344
4,089,557 >>> mbox cmd response data (8 bytes)
4,089,558 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,891 UART: [rt]cmd =0x41545348, len=116
4,140,364 >>> mbox cmd response data (12 bytes)
4,140,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,013 UART:
4,141,029 UART: Running Caliptra ROM ...
4,141,437 UART:
4,141,491 UART: [state] CFI Enabled
4,144,025 UART: [state] LifecycleState = Unprovisioned
4,144,680 UART: [state] DebugLocked = No
4,145,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,146,849 UART: [kat] SHA2-256
4,940,780 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,944,895 UART: [kat] ++
4,945,047 UART: [kat] sha1
4,949,123 UART: [kat] SHA2-256
4,951,061 UART: [kat] SHA2-384
4,953,964 UART: [kat] SHA2-512-ACC
4,955,864 UART: [kat] ECC-384
4,961,395 UART: [kat] HMAC-384Kdf
4,965,971 UART: [kat] LMS
5,534,167 UART: [kat] --
5,535,008 UART: [update-reset] ++
6,916,336 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,917,388 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,072,655 >>> mbox cmd response: success
7,072,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,072,954 UART: [update-reset] Copying MAN_2 To MAN_1
7,080,968 UART: [update-reset Success] --
7,081,785 UART: [state] Locking Datavault
7,082,739 UART: [state] Locking PCR0, PCR1 and PCR31
7,083,343 UART: [state] Locking ICCM
7,083,767 UART: [exit] Launching FMC @ 0x40000130
7,089,097 UART:
7,089,113 UART: Running Caliptra FMC ...
7,089,521 UART:
7,089,575 UART: [state] CFI Enabled
7,178,924 UART: [art] Extend RT PCRs Done
7,179,352 UART: [art] Lock RT PCRs Done
7,180,737 UART: [art] Populate DV Done
7,189,160 UART: [fht] FMC Alias Private Key: 7
7,190,196 UART: [art] Derive CDI
7,190,476 UART: [art] Store in slot 0x4
7,276,268 UART: [art] Derive Key Pair
7,276,628 UART: [art] Store priv key in slot 0x5
7,290,739 UART: [art] Derive Key Pair - Done
7,305,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,320,987 UART: [art] Erasing AUTHORITY.KEYID = 7
7,321,752 UART: [art] PUB.X = B2A8E986C158817CF9F00EC8378FFEF58AF5122058AFBD952FD1D4462EDFD64A8E566DFD8CFED46C312C9E22067B4FC1
7,328,536 UART: [art] PUB.Y = CBC65979EA71FAFA760ADBCBAEDF6D3BA0A9EA00E0B213BF2380447DACA3DDC8DE020C778A8AC18A9C34DA5C20B01A32
7,335,489 UART: [art] SIG.R = 204F67335898C7BE832BEAF59C4BE9BE5F110A35F5B82BC81C62B9F05F53A0BA603814CE76C3A669D8A621FD8D84D163
7,342,266 UART: [art] SIG.S = 43FDA2494A66DD8B9735F8C78536EFAE8D08142FD942A0D62D49556384B8AC37949F1809C69FDC01B1D9CFF3B4262B85
7,365,795 UART: Caliptra RT
7,366,046 UART: [state] CFI Enabled
7,728,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,759,657 UART: [rt]cmd =0x41545348, len=116
7,780,499 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,153 ready_for_fw is high
1,363,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,324 >>> mbox cmd response: success
3,042,725 UART:
3,042,741 UART: Running Caliptra FMC ...
3,043,149 UART:
3,043,203 UART: [state] CFI Enabled
3,053,885 UART: [fht] FMC Alias Private Key: 7
3,173,167 UART: [art] Extend RT PCRs Done
3,173,595 UART: [art] Lock RT PCRs Done
3,175,239 UART: [art] Populate DV Done
3,183,460 UART: [fht] FMC Alias Private Key: 7
3,184,574 UART: [art] Derive CDI
3,184,854 UART: [art] Store in slot 0x4
3,270,036 UART: [art] Derive Key Pair
3,270,396 UART: [art] Store priv key in slot 0x5
3,283,455 UART: [art] Derive Key Pair - Done
3,297,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,726 UART: [art] PUB.X = 79BAFA323A6508E28B3119B99B913A219925FA77EB8A739E6786309A7C36700A828DBE87BBA2363CD9AF614171DD416A
3,320,492 UART: [art] PUB.Y = 23A64B38030470C658094CF5BDC7EF3836DA3A2FC8D66F40528A6460A4B374A61C439BD4B9154FD9085C8F12D74FBF29
3,327,434 UART: [art] SIG.R = 4D7350B051A87D07B4DB5362AE659F47930978BDCFF0BB97AE61935637F26D8E49439A63679521B54608317F34BDA043
3,334,189 UART: [art] SIG.S = 219E26D0F2D0B90CC265635981D023CB4F997467CA77F361E126F66620E70D6A3502F1E8D8C1817E3A86D6353C144E18
3,358,166 UART: Caliptra RT
3,358,417 UART: [state] CFI Enabled
3,478,624 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,298 UART: [rt]cmd =0x41544d4e, len=14344
3,912,209 >>> mbox cmd response data (8 bytes)
3,912,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,135 UART: [rt]cmd =0x41545348, len=116
3,964,140 >>> mbox cmd response data (12 bytes)
3,964,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,780,557 >>> mbox cmd response: success
6,780,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,794,151 UART:
6,794,167 UART: Running Caliptra FMC ...
6,794,575 UART:
6,794,629 UART: [state] CFI Enabled
6,883,440 UART: [art] Extend RT PCRs Done
6,883,868 UART: [art] Lock RT PCRs Done
6,885,015 UART: [art] Populate DV Done
6,893,120 UART: [fht] FMC Alias Private Key: 7
6,894,128 UART: [art] Derive CDI
6,894,408 UART: [art] Store in slot 0x4
6,980,352 UART: [art] Derive Key Pair
6,980,712 UART: [art] Store priv key in slot 0x5
6,993,629 UART: [art] Derive Key Pair - Done
7,008,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,023,634 UART: [art] Erasing AUTHORITY.KEYID = 7
7,024,399 UART: [art] PUB.X = 672AEEDBB0239D10346D99A2B1A9BB394E27994D3BDD45EC4D69F229BE137B850B05E2116B77CD663B184F7297CDC54C
7,031,173 UART: [art] PUB.Y = 55204F81B5C11FC6DC2B462F401E4E1C2B322A7A1259939CE6C117D7F948BB32A4CEC75ACA00290CB5179C9F0708171E
7,038,098 UART: [art] SIG.R = A3FD8814E123BAF7C43E902BC74B60F56E2E293C00674C62B631747DD7788FEAF5FE916A667149A39555126B961ADCE0
7,044,850 UART: [art] SIG.S = 381265F7F381A7E94D37A36F917CDD995DE735DFA42FE21A0FD97912C4D74FCC1EB6515C088205CF68FD11ED27F70D7F
7,068,230 UART: Caliptra RT
7,068,481 UART: [state] CFI Enabled
7,433,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,464,209 UART: [rt]cmd =0x41545348, len=116
7,485,753 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,206 UART: [kat] SHA2-256
882,137 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,252 UART: [kat] ++
886,404 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,515 UART: [kat] SHA2-512-ACC
897,416 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,717 UART: [kat] LMS
1,475,913 UART: [kat] --
1,476,822 UART: [cold-reset] ++
1,477,374 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 ready_for_fw is high
1,481,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,329 UART: [idev] Erasing UDS.KEYID = 0
1,506,095 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,761 UART: [idev] --
1,515,600 UART: [ldev] ++
1,515,768 UART: [ldev] CDI.KEYID = 6
1,516,131 UART: [ldev] SUBJECT.KEYID = 5
1,516,557 UART: [ldev] AUTHORITY.KEYID = 7
1,517,020 UART: [ldev] FE.KEYID = 1
1,522,516 UART: [ldev] Erasing FE.KEYID = 1
1,547,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,587,072 UART: [fwproc] Waiting for Commands...
1,587,829 UART: [fwproc] Received command 0x46574c44
1,588,620 UART: [fwproc] Received Image of size 118548 bytes
2,933,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,824 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,042 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,313 >>> mbox cmd response: success
3,133,349 UART: [afmc] ++
3,133,517 UART: [afmc] CDI.KEYID = 6
3,133,879 UART: [afmc] SUBJECT.KEYID = 7
3,134,304 UART: [afmc] AUTHORITY.KEYID = 5
3,169,615 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,165 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,945 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,537 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,220 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,270 UART: [afmc] --
3,213,260 UART: [cold-reset] --
3,213,932 UART: [state] Locking Datavault
3,215,379 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,983 UART: [state] Locking ICCM
3,216,409 UART: [exit] Launching FMC @ 0x40000130
3,221,739 UART:
3,221,755 UART: Running Caliptra FMC ...
3,222,163 UART:
3,222,306 UART: [state] CFI Enabled
3,232,752 UART: [fht] FMC Alias Private Key: 7
3,352,022 UART: [art] Extend RT PCRs Done
3,352,450 UART: [art] Lock RT PCRs Done
3,353,948 UART: [art] Populate DV Done
3,362,293 UART: [fht] FMC Alias Private Key: 7
3,363,281 UART: [art] Derive CDI
3,363,561 UART: [art] Store in slot 0x4
3,449,293 UART: [art] Derive Key Pair
3,449,653 UART: [art] Store priv key in slot 0x5
3,462,916 UART: [art] Derive Key Pair - Done
3,477,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,605 UART: [art] PUB.X = 4934F622A6922BD4A45A110203CD47497FDB2765FA9420D6C2AE20340AE83042BA7514F6B7DA8132715B7FF10529A6A1
3,501,361 UART: [art] PUB.Y = CF25EED3B0BB636EF6C7D5FF942DDCE84C573C6AA1DA9F099575DE1BD0E78F4168038C0E4B4DD334AF672F62E78A17DA
3,508,326 UART: [art] SIG.R = 4B317CBE4B4D6A8158B4DFE544FA18D75463C364E7D04D059362F4EB2F237F35AE7664A1459C7448FE2F0876EEF2C65F
3,515,098 UART: [art] SIG.S = 27764BFB0B1B5F9139789FC301BDC52A452AEBE20D7BC253906C7463E278C6088939BA503DC497DC10AFC98E0724094F
3,538,862 UART: Caliptra RT
3,539,205 UART: [state] CFI Enabled
3,660,128 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,988 UART: [rt]cmd =0x41544d4e, len=14344
4,094,327 >>> mbox cmd response data (8 bytes)
4,094,328 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,537 UART: [rt]cmd =0x41545348, len=116
4,146,906 >>> mbox cmd response data (12 bytes)
4,146,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,519 UART:
4,147,535 UART: Running Caliptra ROM ...
4,147,943 UART:
4,148,084 UART: [state] CFI Enabled
4,150,514 UART: [state] LifecycleState = Unprovisioned
4,151,169 UART: [state] DebugLocked = No
4,151,673 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,153,356 UART: [kat] SHA2-256
4,947,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,951,402 UART: [kat] ++
4,951,554 UART: [kat] sha1
4,955,844 UART: [kat] SHA2-256
4,957,782 UART: [kat] SHA2-384
4,960,667 UART: [kat] SHA2-512-ACC
4,962,567 UART: [kat] ECC-384
4,968,072 UART: [kat] HMAC-384Kdf
4,972,660 UART: [kat] LMS
5,540,856 UART: [kat] --
5,541,673 UART: [update-reset] ++
6,923,371 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,924,495 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,079,762 >>> mbox cmd response: success
7,079,762 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,080,073 UART: [update-reset] Copying MAN_2 To MAN_1
7,088,087 UART: [update-reset Success] --
7,089,156 UART: [state] Locking Datavault
7,090,148 UART: [state] Locking PCR0, PCR1 and PCR31
7,090,752 UART: [state] Locking ICCM
7,091,312 UART: [exit] Launching FMC @ 0x40000130
7,096,642 UART:
7,096,658 UART: Running Caliptra FMC ...
7,097,066 UART:
7,097,209 UART: [state] CFI Enabled
7,186,576 UART: [art] Extend RT PCRs Done
7,187,004 UART: [art] Lock RT PCRs Done
7,188,101 UART: [art] Populate DV Done
7,196,546 UART: [fht] FMC Alias Private Key: 7
7,197,540 UART: [art] Derive CDI
7,197,820 UART: [art] Store in slot 0x4
7,283,680 UART: [art] Derive Key Pair
7,284,040 UART: [art] Store priv key in slot 0x5
7,297,793 UART: [art] Derive Key Pair - Done
7,312,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,328,077 UART: [art] Erasing AUTHORITY.KEYID = 7
7,328,842 UART: [art] PUB.X = 9C4DF64201A947B7217B4A7576D33F9F9033ED843EAEF3D0F576F3F92A2AE4ED65EA1B2D8CF1AC60173CBE9616826A14
7,335,621 UART: [art] PUB.Y = B34CA55C9A7A7687739E14F6442CDA225C1C8C7B0F7C8B59EA8E49821328196C30326153A452605EEF8592DBCE74D149
7,342,568 UART: [art] SIG.R = C455753C3DBE979E4A7902508A639421C089B53278317D43ED8B868C19C9E3B0A3EC218D4C214F3753833C1A0809B6D1
7,349,323 UART: [art] SIG.S = AC72552204C94077BA7B15CD5C9012FC73100E237D55316F4F7B4D2B12B86137EBA964CB3EC2A17D353EC3F40450D95D
7,373,676 UART: Caliptra RT
7,374,019 UART: [state] CFI Enabled
7,738,023 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,768,836 UART: [rt]cmd =0x41545348, len=116
7,790,076 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 ready_for_fw is high
1,363,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,963 >>> mbox cmd response: success
3,043,586 UART:
3,043,602 UART: Running Caliptra FMC ...
3,044,010 UART:
3,044,153 UART: [state] CFI Enabled
3,054,715 UART: [fht] FMC Alias Private Key: 7
3,173,785 UART: [art] Extend RT PCRs Done
3,174,213 UART: [art] Lock RT PCRs Done
3,175,877 UART: [art] Populate DV Done
3,184,132 UART: [fht] FMC Alias Private Key: 7
3,185,172 UART: [art] Derive CDI
3,185,452 UART: [art] Store in slot 0x4
3,271,046 UART: [art] Derive Key Pair
3,271,406 UART: [art] Store priv key in slot 0x5
3,284,355 UART: [art] Derive Key Pair - Done
3,299,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,410 UART: [art] PUB.X = D4A5CC51B37D18CCD1A40712E4FFB00F3000DC841A66ADADDC5D3E2FBABA8F458DA684379BEA461FB1678CAAAACF60C1
3,322,184 UART: [art] PUB.Y = 92758B362A694A586E4F8E5AA577246E0F52AB69BB8BB1D07BED109EBC77D775F329563100BDC4D6A28A1436CEC8A63D
3,329,119 UART: [art] SIG.R = F2816B7652A6F808F32D0137CC2FFF640861849E106F31305315816FB4B507E2350B337F578E85BB7B0CA23A19BA52BC
3,335,869 UART: [art] SIG.S = C3DC343634D16BD041A01A2B6A90EB484DE72E5D2531006AE8C02808DF859C6246C9D908A32DFFAB922A3FA006B00B77
3,359,711 UART: Caliptra RT
3,360,054 UART: [state] CFI Enabled
3,480,567 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,237 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,543 UART: [rt]cmd =0x41544d4e, len=14344
3,914,676 >>> mbox cmd response data (8 bytes)
3,914,677 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,812 UART: [rt]cmd =0x41545348, len=116
3,966,129 >>> mbox cmd response data (12 bytes)
3,966,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,780,201 >>> mbox cmd response: success
6,780,201 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,793,419 UART:
6,793,435 UART: Running Caliptra FMC ...
6,793,843 UART:
6,793,986 UART: [state] CFI Enabled
6,883,265 UART: [art] Extend RT PCRs Done
6,883,693 UART: [art] Lock RT PCRs Done
6,885,110 UART: [art] Populate DV Done
6,893,573 UART: [fht] FMC Alias Private Key: 7
6,894,553 UART: [art] Derive CDI
6,894,833 UART: [art] Store in slot 0x4
6,980,799 UART: [art] Derive Key Pair
6,981,159 UART: [art] Store priv key in slot 0x5
6,994,580 UART: [art] Derive Key Pair - Done
7,009,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,024,397 UART: [art] Erasing AUTHORITY.KEYID = 7
7,025,162 UART: [art] PUB.X = 5E3DDFA4DDA44FF6B8E0C12355F6AA78449C367E7694741B6C9D7F1E6CBA6374042C1E2E4C1881C197ACAC97CFD03527
7,031,943 UART: [art] PUB.Y = ABAA37F5C8A0D6F05C9F1284DE61CA2E5300D7D53596BC010B18812120ACC68634DC821CF4932485C21F115226F70DF8
7,038,866 UART: [art] SIG.R = 19F41FE68219D36D1398F428BDC4576101ABA76013804A9832C862DC058892D02E0CA306FE0C5EF15660151D791A5143
7,045,613 UART: [art] SIG.S = 04F8A3FDD535B212D94A6BEB18EDB3032BD2560CCB076906CC40765DC97A2575401A45102EFB342C5EA76519BDFDC397
7,069,246 UART: Caliptra RT
7,069,589 UART: [state] CFI Enabled
7,437,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,468,200 UART: [rt]cmd =0x41545348, len=116
7,490,128 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,659 UART: [kat] SHA2-512-ACC
906,560 UART: [kat] ECC-384
916,821 UART: [kat] HMAC-384Kdf
921,507 UART: [kat] LMS
1,169,819 UART: [kat] --
1,170,726 UART: [cold-reset] ++
1,171,284 UART: [fht] FHT @ 0x50003400
1,173,920 UART: [idev] ++
1,174,088 UART: [idev] CDI.KEYID = 6
1,174,449 UART: [idev] SUBJECT.KEYID = 7
1,174,874 UART: [idev] UDS.KEYID = 0
1,175,220 ready_for_fw is high
1,175,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,831 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,726 UART: [ldev] ++
1,209,894 UART: [ldev] CDI.KEYID = 6
1,210,258 UART: [ldev] SUBJECT.KEYID = 5
1,210,685 UART: [ldev] AUTHORITY.KEYID = 7
1,211,148 UART: [ldev] FE.KEYID = 1
1,216,320 UART: [ldev] Erasing FE.KEYID = 1
1,242,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,536 UART: [ldev] --
1,281,963 UART: [fwproc] Wait for Commands...
1,282,610 UART: [fwproc] Recv command 0x46574c44
1,283,343 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,542 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,327 >>> mbox cmd response: success
2,828,559 UART: [afmc] ++
2,828,727 UART: [afmc] CDI.KEYID = 6
2,829,090 UART: [afmc] SUBJECT.KEYID = 7
2,829,516 UART: [afmc] AUTHORITY.KEYID = 5
2,865,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,336 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,826 UART: [afmc] --
2,908,829 UART: [cold-reset] --
2,909,637 UART: [state] Locking Datavault
2,910,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,424 UART: [state] Locking ICCM
2,912,068 UART: [exit] Launching FMC @ 0x40000130
2,917,398 UART:
2,917,414 UART: Running Caliptra FMC ...
2,917,822 UART:
2,917,876 UART: [state] CFI Enabled
2,928,350 UART: [fht] FMC Alias Private Key: 7
3,047,886 UART: [art] Extend RT PCRs Done
3,048,314 UART: [art] Lock RT PCRs Done
3,049,890 UART: [art] Populate DV Done
3,057,937 UART: [fht] FMC Alias Private Key: 7
3,059,115 UART: [art] Derive CDI
3,059,395 UART: [art] Store in slot 0x4
3,145,148 UART: [art] Derive Key Pair
3,145,508 UART: [art] Store priv key in slot 0x5
3,158,806 UART: [art] Derive Key Pair - Done
3,173,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,947 UART: [art] PUB.X = 12419CBBA34EA0ACC87B85D6EF6352140E3BA7E29FB286FC468563EC0725CC13009792D4200496F6885E39FD4E018B4E
3,196,687 UART: [art] PUB.Y = 95C15BAA8D765F954E7B418E4D5112ACCA620B87CBB9AD00574F2F8A5BE46C75CBD493E9EE195A0D2F08893BB296B718
3,203,620 UART: [art] SIG.R = 214D9583084F03EB766D673F43BD4DA810C310CE0D8DD5D917F103E2773A637A7F5A7B5DC0785353CD6D1E988F5D8183
3,210,380 UART: [art] SIG.S = 6BA00325CC2DF3A50F82C5E49EEEAD4920E12A72BEBBF37BC7E4ED02DF76E6224FF86BDC455327A8EBC9199FD1D31D1E
3,234,463 UART: Caliptra RT
3,234,714 UART: [state] CFI Enabled
3,354,792 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,462 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,684 UART: [rt]cmd =0x41544d4e, len=14344
3,788,757 >>> mbox cmd response data (8 bytes)
3,788,758 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,737 UART: [rt]cmd =0x41545348, len=116
3,840,398 >>> mbox cmd response data (12 bytes)
3,840,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,372 UART:
3,841,388 UART: Running Caliptra ROM ...
3,841,796 UART:
3,841,851 UART: [state] CFI Enabled
3,844,371 UART: [state] LifecycleState = Unprovisioned
3,845,026 UART: [state] DebugLocked = No
3,845,550 UART: [state] WD Timer not started. Device not locked for debugging
3,846,670 UART: [kat] SHA2-256
4,650,220 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,654,324 UART: [kat] ++
4,654,476 UART: [kat] sha1
4,658,872 UART: [kat] SHA2-256
4,660,812 UART: [kat] SHA2-384
4,663,599 UART: [kat] SHA2-512-ACC
4,665,499 UART: [kat] ECC-384
4,674,900 UART: [kat] HMAC-384Kdf
4,679,300 UART: [kat] LMS
4,927,612 UART: [kat] --
4,928,554 UART: [update-reset] ++
6,286,325 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,287,532 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,442,747 >>> mbox cmd response: success
6,442,747 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,442,966 UART: [update-reset] Copying MAN_2 To MAN_1
6,450,980 UART: [update-reset Success] --
6,451,937 UART: [state] Locking Datavault
6,452,653 UART: [state] Locking PCR0, PCR1 and PCR31
6,453,257 UART: [state] Locking ICCM
6,453,813 UART: [exit] Launching FMC @ 0x40000130
6,459,143 UART:
6,459,159 UART: Running Caliptra FMC ...
6,459,567 UART:
6,459,621 UART: [state] CFI Enabled
6,548,278 UART: [art] Extend RT PCRs Done
6,548,706 UART: [art] Lock RT PCRs Done
6,550,033 UART: [art] Populate DV Done
6,558,272 UART: [fht] FMC Alias Private Key: 7
6,559,446 UART: [art] Derive CDI
6,559,726 UART: [art] Store in slot 0x4
6,645,643 UART: [art] Derive Key Pair
6,646,003 UART: [art] Store priv key in slot 0x5
6,659,207 UART: [art] Derive Key Pair - Done
6,674,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,689,272 UART: [art] Erasing AUTHORITY.KEYID = 7
6,690,037 UART: [art] PUB.X = 8E0CD28F946E169262485044D95442FDA3553F92619F875DAEDABA5947E61A75C6DE133E6FF42FC53404EBBE533BFF41
6,696,809 UART: [art] PUB.Y = 66215DC0BCD73584545A8FB85FE1D7CA7B484F73E3A193A93507E79D9803FCE0A13E96F2DF26954E52060A3F948A688E
6,703,751 UART: [art] SIG.R = 3221F67B5D869A03B8880A62FCB699DA68937777EBBEBA3C3E58081727CA24124B6E92FA9452553365BAE010601BCB2E
6,710,514 UART: [art] SIG.S = 295687C0D8445423C7CD4AD857541DC9856DE7A4305047A31E8375C14D6EED55A0CD027F4CB2CD2E0830E3A999E4FF71
6,734,204 UART: Caliptra RT
6,734,455 UART: [state] CFI Enabled
7,099,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,130,053 UART: [rt]cmd =0x41545348, len=116
7,151,597 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,898 ready_for_fw is high
1,058,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,086 >>> mbox cmd response: success
2,738,613 UART:
2,738,629 UART: Running Caliptra FMC ...
2,739,037 UART:
2,739,091 UART: [state] CFI Enabled
2,749,459 UART: [fht] FMC Alias Private Key: 7
2,868,851 UART: [art] Extend RT PCRs Done
2,869,279 UART: [art] Lock RT PCRs Done
2,871,209 UART: [art] Populate DV Done
2,879,536 UART: [fht] FMC Alias Private Key: 7
2,880,624 UART: [art] Derive CDI
2,880,904 UART: [art] Store in slot 0x4
2,966,785 UART: [art] Derive Key Pair
2,967,145 UART: [art] Store priv key in slot 0x5
2,980,423 UART: [art] Derive Key Pair - Done
2,995,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,198 UART: [art] PUB.X = 16C776AF31D4692C69D8850D5173D02C4DFA4C4E29AF70D15C177B9D024F8C2E601815F62693FC0D67F3D2FE5D9CF845
3,017,965 UART: [art] PUB.Y = 911F217D77A5ECC0F8C4F529A3337A74C2B66561CD85378852F5880FC126E26F254C05E98F85D420ED47A042784DB748
3,024,905 UART: [art] SIG.R = 115DD6594C07FA22729A046D553ABFD981315534DA76D2D87F58BA51E842CE84209B6AD49E14C79F56CE391AABF3CAB8
3,031,679 UART: [art] SIG.S = 52A334512E8E7B1496A2E1595907817B68E401D8BD01A134E2C69097C420B0EF932F37F7C2FB6486ACD1788E55F511A9
3,055,904 UART: Caliptra RT
3,056,155 UART: [state] CFI Enabled
3,176,117 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,787 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,839 UART: [rt]cmd =0x41544d4e, len=14344
3,609,306 >>> mbox cmd response data (8 bytes)
3,609,307 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,268 UART: [rt]cmd =0x41545348, len=116
3,660,507 >>> mbox cmd response data (12 bytes)
3,660,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,780 >>> mbox cmd response: success
6,149,780 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,162,697 UART:
6,162,713 UART: Running Caliptra FMC ...
6,163,121 UART:
6,163,175 UART: [state] CFI Enabled
6,251,876 UART: [art] Extend RT PCRs Done
6,252,304 UART: [art] Lock RT PCRs Done
6,253,235 UART: [art] Populate DV Done
6,261,314 UART: [fht] FMC Alias Private Key: 7
6,262,382 UART: [art] Derive CDI
6,262,662 UART: [art] Store in slot 0x4
6,348,331 UART: [art] Derive Key Pair
6,348,691 UART: [art] Store priv key in slot 0x5
6,361,605 UART: [art] Derive Key Pair - Done
6,376,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,391,325 UART: [art] Erasing AUTHORITY.KEYID = 7
6,392,090 UART: [art] PUB.X = 7C4844BDC53B644AB41F4B1BFE9C7963E4C6D7FF78E200EF12ECC3B424BAA66FE58E05B2A57DFBC294004FFB0E1BDF56
6,398,836 UART: [art] PUB.Y = 5900DC43D866894141955691117BB77FE1D12ED209A21D5797C3E047A4D89BB71223AE566BB4927E331229E883A88144
6,405,749 UART: [art] SIG.R = 1AF2AE0159307193B7A9B07D18C569A9F68052A62AA1F3F6ED275DAF0EFD0A62EE235074F539EDB49F6CF477F59E1A7F
6,412,524 UART: [art] SIG.S = ADF4AFBD0D4AD8D3A678377C21A408C36AAAB83BAB7D6C94EFE212B9A1BDDE3444386C1C690591333E417B861BD10AB4
6,436,918 UART: Caliptra RT
6,437,169 UART: [state] CFI Enabled
6,802,537 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,833,456 UART: [rt]cmd =0x41545348, len=116
6,855,566 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
891,355 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,459 UART: [kat] ++
895,611 UART: [kat] sha1
899,923 UART: [kat] SHA2-256
901,863 UART: [kat] SHA2-384
904,608 UART: [kat] SHA2-512-ACC
906,509 UART: [kat] ECC-384
916,358 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,165 UART: [cold-reset] ++
1,170,631 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 ready_for_fw is high
1,174,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,658 UART: [idev] Sha1 KeyId Algorithm
1,208,506 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,477 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,320 UART: [fwproc] Wait for Commands...
1,282,913 UART: [fwproc] Recv command 0x46574c44
1,283,646 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,308 >>> mbox cmd response: success
2,828,440 UART: [afmc] ++
2,828,608 UART: [afmc] CDI.KEYID = 6
2,828,971 UART: [afmc] SUBJECT.KEYID = 7
2,829,397 UART: [afmc] AUTHORITY.KEYID = 5
2,865,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,209 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,910 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,827 UART: [afmc] --
2,908,658 UART: [cold-reset] --
2,909,666 UART: [state] Locking Datavault
2,910,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,491 UART: [state] Locking ICCM
2,912,137 UART: [exit] Launching FMC @ 0x40000130
2,917,467 UART:
2,917,483 UART: Running Caliptra FMC ...
2,917,891 UART:
2,918,034 UART: [state] CFI Enabled
2,928,938 UART: [fht] FMC Alias Private Key: 7
3,047,886 UART: [art] Extend RT PCRs Done
3,048,314 UART: [art] Lock RT PCRs Done
3,049,430 UART: [art] Populate DV Done
3,057,427 UART: [fht] FMC Alias Private Key: 7
3,058,425 UART: [art] Derive CDI
3,058,705 UART: [art] Store in slot 0x4
3,144,666 UART: [art] Derive Key Pair
3,145,026 UART: [art] Store priv key in slot 0x5
3,158,248 UART: [art] Derive Key Pair - Done
3,173,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,456 UART: [art] PUB.X = DF1591D149E387A4E4C626482207A3513F29331ADD98FF89FDA9B6A2A57EE4F5545327700E3276019EA22A787ECDBE53
3,196,219 UART: [art] PUB.Y = 5DF11E5F1719B12F9914E688D3414EF9457FBAAB71A23D88767B057A10B85A64B1065EA18ACF33628373D90B926E5519
3,203,158 UART: [art] SIG.R = FCA6E6655BE83B3815CCEAAADC9B84D0C2D64D8035FC8838DA619969C0BC7C4677BD535C7906D7AAF8DE0B822A6692C8
3,209,940 UART: [art] SIG.S = F32B313A86C187D43CC5CDA57F01FE576E684D6BA8DF687A0A54BDDA764956710E0649F6F07226DEFC491571757AA6D6
3,233,730 UART: Caliptra RT
3,234,073 UART: [state] CFI Enabled
3,353,895 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,221 UART: [rt]cmd =0x41544d4e, len=14344
3,787,128 >>> mbox cmd response data (8 bytes)
3,787,129 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,310 UART: [rt]cmd =0x41545348, len=116
3,838,489 >>> mbox cmd response data (12 bytes)
3,838,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,311 UART:
3,839,327 UART: Running Caliptra ROM ...
3,839,735 UART:
3,839,877 UART: [state] CFI Enabled
3,842,503 UART: [state] LifecycleState = Unprovisioned
3,843,158 UART: [state] DebugLocked = No
3,843,802 UART: [state] WD Timer not started. Device not locked for debugging
3,844,924 UART: [kat] SHA2-256
4,648,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,652,578 UART: [kat] ++
4,652,730 UART: [kat] sha1
4,657,176 UART: [kat] SHA2-256
4,659,116 UART: [kat] SHA2-384
4,661,869 UART: [kat] SHA2-512-ACC
4,663,769 UART: [kat] ECC-384
4,673,848 UART: [kat] HMAC-384Kdf
4,678,456 UART: [kat] LMS
4,926,768 UART: [kat] --
4,927,708 UART: [update-reset] ++
6,287,371 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,288,382 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,443,597 >>> mbox cmd response: success
6,443,597 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,443,860 UART: [update-reset] Copying MAN_2 To MAN_1
6,451,874 UART: [update-reset Success] --
6,452,695 UART: [state] Locking Datavault
6,453,469 UART: [state] Locking PCR0, PCR1 and PCR31
6,454,073 UART: [state] Locking ICCM
6,454,637 UART: [exit] Launching FMC @ 0x40000130
6,459,967 UART:
6,459,983 UART: Running Caliptra FMC ...
6,460,391 UART:
6,460,534 UART: [state] CFI Enabled
6,549,761 UART: [art] Extend RT PCRs Done
6,550,189 UART: [art] Lock RT PCRs Done
6,551,528 UART: [art] Populate DV Done
6,559,859 UART: [fht] FMC Alias Private Key: 7
6,561,039 UART: [art] Derive CDI
6,561,319 UART: [art] Store in slot 0x4
6,647,508 UART: [art] Derive Key Pair
6,647,868 UART: [art] Store priv key in slot 0x5
6,661,268 UART: [art] Derive Key Pair - Done
6,676,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,691,716 UART: [art] Erasing AUTHORITY.KEYID = 7
6,692,481 UART: [art] PUB.X = E23CDB0A2AB5730A590F61DB8BB37CAC107D8A71E5935E686C08C577E956425EA5E9B2B7DB06929934D75BE91C7FB540
6,699,246 UART: [art] PUB.Y = 4BABD173FACFFD775CEE98F550F83413B3B8059453D231062AB702DAED1D1F7B316B0798C7521D1D74C32C9D77C137C8
6,706,194 UART: [art] SIG.R = D224EEC72EE98EA1BFB45E98CA295EAE23A968C6CCEF230F64394957E441B17E920D981AB27E94EAF5F0EE537B8B4B80
6,712,976 UART: [art] SIG.S = F9FCD6CB7DB31EF8D227187F07FA84572658513867EE87CDF16AE8D512FEF653CF51D658ABA2E22CF06FAE28290233C3
6,736,900 UART: Caliptra RT
6,737,243 UART: [state] CFI Enabled
7,100,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,131,799 UART: [rt]cmd =0x41545348, len=116
7,153,769 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,725 ready_for_fw is high
1,059,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,941 >>> mbox cmd response: success
2,743,732 UART:
2,743,748 UART: Running Caliptra FMC ...
2,744,156 UART:
2,744,299 UART: [state] CFI Enabled
2,754,927 UART: [fht] FMC Alias Private Key: 7
2,873,575 UART: [art] Extend RT PCRs Done
2,874,003 UART: [art] Lock RT PCRs Done
2,875,667 UART: [art] Populate DV Done
2,884,022 UART: [fht] FMC Alias Private Key: 7
2,885,042 UART: [art] Derive CDI
2,885,322 UART: [art] Store in slot 0x4
2,971,483 UART: [art] Derive Key Pair
2,971,843 UART: [art] Store priv key in slot 0x5
2,984,781 UART: [art] Derive Key Pair - Done
2,999,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,433 UART: [art] PUB.X = 9F2DFC9FA8B05E9F7CF6E093554DC28F4D19F31545F5D47008B57BDF5340519B58F16AAE1B496BCE0D2446C1203177FD
3,022,207 UART: [art] PUB.Y = CC8FA4B5CECB91E2DDDBD67568F003D413F481E32DD62274EA7A2658B601B9876F01D85992A9CB2B1FB8C92D59F9818F
3,029,162 UART: [art] SIG.R = 7F72A1882A2F63C39DCB191E9E0C756D3B4011EE3A9F167F55D7C48B1BF99B1B7ACD057F34FC7D916DDCE585B8C9BBC7
3,035,946 UART: [art] SIG.S = AE8BEB03AC9FC0331DBC3A2E83560E569E6BFFC77221CB8BFBC6FC24CD37BBAD3A0361FECFD8A4ADDA340A06664FA6B1
3,060,249 UART: Caliptra RT
3,060,592 UART: [state] CFI Enabled
3,179,933 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,603 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,539 UART: [rt]cmd =0x41544d4e, len=14344
3,614,474 >>> mbox cmd response data (8 bytes)
3,614,475 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,722 UART: [rt]cmd =0x41545348, len=116
3,666,639 >>> mbox cmd response data (12 bytes)
3,666,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,155,689 >>> mbox cmd response: success
6,155,689 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,169,020 UART:
6,169,036 UART: Running Caliptra FMC ...
6,169,444 UART:
6,169,587 UART: [state] CFI Enabled
6,258,426 UART: [art] Extend RT PCRs Done
6,258,854 UART: [art] Lock RT PCRs Done
6,260,185 UART: [art] Populate DV Done
6,268,212 UART: [fht] FMC Alias Private Key: 7
6,269,358 UART: [art] Derive CDI
6,269,638 UART: [art] Store in slot 0x4
6,355,505 UART: [art] Derive Key Pair
6,355,865 UART: [art] Store priv key in slot 0x5
6,369,021 UART: [art] Derive Key Pair - Done
6,384,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,400,066 UART: [art] Erasing AUTHORITY.KEYID = 7
6,400,831 UART: [art] PUB.X = AAF249C6B2859364FCB2B7C736C9E8BAC64E963A73B014993F5049E0763735DBEE3872046CFDBBD8A5CE53FC3A7561E5
6,407,610 UART: [art] PUB.Y = 387E847DF2BE2538971F13212720B49B8B2FD0911C923AFC72C5944C42107F0BBCE2C1D92F3F9ADEFE2A02C166524807
6,414,555 UART: [art] SIG.R = E5BD0AB4FF4D436CB35316260061C5D96967D2581627E1767B06B4D93A47A71116EABA2B3D23EFB232E7DFB267A120D2
6,421,303 UART: [art] SIG.S = EFD7EB8734AFAA7CB32924C2D779FB9BD3277778953A12C4E97577B0A2B81CEC11DC991582690A2E0D224DD3AAAD3E8A
6,444,593 UART: Caliptra RT
6,444,936 UART: [state] CFI Enabled
6,805,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,836,190 UART: [rt]cmd =0x41545348, len=116
6,857,300 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,350 UART: [state] LifecycleState = Unprovisioned
86,005 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
902,053 UART: [kat] SHA2-256
903,993 UART: [kat] SHA2-384
906,874 UART: [kat] SHA2-512-ACC
908,775 UART: [kat] ECC-384
918,864 UART: [kat] HMAC-384Kdf
923,464 UART: [kat] LMS
1,171,792 UART: [kat] --
1,172,455 UART: [cold-reset] ++
1,172,795 UART: [fht] FHT @ 0x50003400
1,175,628 UART: [idev] ++
1,175,796 UART: [idev] CDI.KEYID = 6
1,176,156 UART: [idev] SUBJECT.KEYID = 7
1,176,580 UART: [idev] UDS.KEYID = 0
1,176,925 ready_for_fw is high
1,176,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,672 UART: [idev] Erasing UDS.KEYID = 0
1,201,669 UART: [idev] Sha1 KeyId Algorithm
1,210,221 UART: [idev] --
1,211,167 UART: [ldev] ++
1,211,335 UART: [ldev] CDI.KEYID = 6
1,211,698 UART: [ldev] SUBJECT.KEYID = 5
1,212,124 UART: [ldev] AUTHORITY.KEYID = 7
1,212,587 UART: [ldev] FE.KEYID = 1
1,217,927 UART: [ldev] Erasing FE.KEYID = 1
1,244,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,666 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,743 UART: [ldev] --
1,284,178 UART: [fwproc] Wait for Commands...
1,284,792 UART: [fwproc] Recv command 0x46574c44
1,285,520 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,477 >>> mbox cmd response: success
2,829,561 UART: [afmc] ++
2,829,729 UART: [afmc] CDI.KEYID = 6
2,830,091 UART: [afmc] SUBJECT.KEYID = 7
2,830,516 UART: [afmc] AUTHORITY.KEYID = 5
2,866,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,024 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,364 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,065 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,041 UART: [afmc] --
2,910,037 UART: [cold-reset] --
2,910,781 UART: [state] Locking Datavault
2,912,058 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,662 UART: [state] Locking ICCM
2,913,236 UART: [exit] Launching FMC @ 0x40000130
2,918,566 UART:
2,918,582 UART: Running Caliptra FMC ...
2,918,990 UART:
2,919,044 UART: [state] CFI Enabled
2,929,936 UART: [fht] FMC Alias Private Key: 7
3,048,594 UART: [art] Extend RT PCRs Done
3,049,022 UART: [art] Lock RT PCRs Done
3,050,752 UART: [art] Populate DV Done
3,059,007 UART: [fht] FMC Alias Private Key: 7
3,060,177 UART: [art] Derive CDI
3,060,457 UART: [art] Store in slot 0x4
3,146,594 UART: [art] Derive Key Pair
3,146,954 UART: [art] Store priv key in slot 0x5
3,160,400 UART: [art] Derive Key Pair - Done
3,175,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,012 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,777 UART: [art] PUB.X = AA7682B8A96D8779A1CAE6803C79D1007C4B2F1133DB86A0BD6606B53092D2199BD5274749CF9E6B07CE4C2A0ED42E8E
3,198,524 UART: [art] PUB.Y = 1E01E1382049012B5145BB8AEF281A134EA41FA6866C4E1927D13C0BCA28BDBA1B8BB19BF2FAF69498210E0A9D79751D
3,205,469 UART: [art] SIG.R = 56BE9DBCB3AB5E635E39FF8DCD590B8A7D5366FAE6DF37BCA0994D6F7AC855038367BF7A1549DDABBD4D810C97E04D98
3,212,254 UART: [art] SIG.S = 6F39A25B2FCBA93DEA1524998249008E648360F670307ABF22710DF10DC0F6FC710C0DE667BA9E11CAC65ABF3A4468D7
3,235,404 UART: Caliptra RT
3,235,655 UART: [state] CFI Enabled
3,355,573 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,356,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,621 UART: [rt]cmd =0x41544d4e, len=14344
3,789,684 >>> mbox cmd response data (8 bytes)
3,789,685 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,866 UART: [rt]cmd =0x41545348, len=116
3,841,931 >>> mbox cmd response data (12 bytes)
3,841,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,667 UART:
3,842,683 UART: Running Caliptra ROM ...
3,843,091 UART:
3,843,146 UART: [state] CFI Enabled
3,845,722 UART: [state] LifecycleState = Unprovisioned
3,846,377 UART: [state] DebugLocked = No
3,847,065 UART: [state] WD Timer not started. Device not locked for debugging
3,848,231 UART: [kat] SHA2-256
4,653,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,658,006 UART: [kat] ++
4,658,158 UART: [kat] sha1
4,662,640 UART: [kat] SHA2-256
4,664,580 UART: [kat] SHA2-384
4,667,261 UART: [kat] SHA2-512-ACC
4,669,161 UART: [kat] ECC-384
4,679,090 UART: [kat] HMAC-384Kdf
4,683,778 UART: [kat] LMS
4,932,106 UART: [kat] --
4,933,282 UART: [update-reset] ++
6,291,842 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,292,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,448,044 >>> mbox cmd response: success
6,448,044 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,448,177 UART: [update-reset] Copying MAN_2 To MAN_1
6,456,191 UART: [update-reset Success] --
6,457,296 UART: [state] Locking Datavault
6,458,046 UART: [state] Locking PCR0, PCR1 and PCR31
6,458,650 UART: [state] Locking ICCM
6,459,208 UART: [exit] Launching FMC @ 0x40000130
6,464,538 UART:
6,464,554 UART: Running Caliptra FMC ...
6,464,962 UART:
6,465,016 UART: [state] CFI Enabled
6,554,159 UART: [art] Extend RT PCRs Done
6,554,587 UART: [art] Lock RT PCRs Done
6,555,814 UART: [art] Populate DV Done
6,564,089 UART: [fht] FMC Alias Private Key: 7
6,565,035 UART: [art] Derive CDI
6,565,315 UART: [art] Store in slot 0x4
6,651,454 UART: [art] Derive Key Pair
6,651,814 UART: [art] Store priv key in slot 0x5
6,665,038 UART: [art] Derive Key Pair - Done
6,679,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,695,662 UART: [art] Erasing AUTHORITY.KEYID = 7
6,696,427 UART: [art] PUB.X = CB9A9CB8948B48E70FF117995830F288E4495FCC081B32F71830753A68B0DE9D8C2D4B9C6A9621B38E7B0A66ABAEB7F6
6,703,198 UART: [art] PUB.Y = 47F939E9F460BF213B76F20D267FDDDD2F2C25EB0AB9BAB1576B45DEB5565BB33BF359A127E194DBA354DD8F8E96A4A4
6,710,162 UART: [art] SIG.R = 34B87251E6377AFC3A1C88AE048727EC446C3A6C7DBBE4EB3F7C8ECC9E85689D8B85386B1BEDC84308E17B381DFBBC2B
6,716,946 UART: [art] SIG.S = 86347BFD3CBF74C77B1C9CD7C8257B4AB68380A4082AC720B7D6918747FEA7C53D34BE9E3796A1F05D629FAAFFB1D439
6,740,587 UART: Caliptra RT
6,740,838 UART: [state] CFI Enabled
7,103,990 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,971 UART: [rt]cmd =0x41545348, len=116
7,156,559 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,097 ready_for_fw is high
1,060,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,860 >>> mbox cmd response: success
2,740,477 UART:
2,740,493 UART: Running Caliptra FMC ...
2,740,901 UART:
2,740,955 UART: [state] CFI Enabled
2,751,061 UART: [fht] FMC Alias Private Key: 7
2,870,107 UART: [art] Extend RT PCRs Done
2,870,535 UART: [art] Lock RT PCRs Done
2,872,165 UART: [art] Populate DV Done
2,880,460 UART: [fht] FMC Alias Private Key: 7
2,881,610 UART: [art] Derive CDI
2,881,890 UART: [art] Store in slot 0x4
2,967,549 UART: [art] Derive Key Pair
2,967,909 UART: [art] Store priv key in slot 0x5
2,981,343 UART: [art] Derive Key Pair - Done
2,996,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,870 UART: [art] PUB.X = 20BA2F6ED746513131356975938F34B74CBCB2691D8D1D14770627B72E89B8BFB13752D6782A73A22A7FD8C6452AC799
3,019,633 UART: [art] PUB.Y = 175B7260AA890C0E8C8555A4428F1C28D7B66E1BAE335C81EF17EB6B7396921AD876064D72C16CFA971776A71E95059D
3,026,571 UART: [art] SIG.R = FAF7A38283A79B529B7A70DBAC6B6F7BC57367A7DD542663F928BE4F783DC29A9D26ABF0B48374A72B23728EDB7954F3
3,033,353 UART: [art] SIG.S = 80849BB332D86AACF325D44767FBDD55C4A60F6B529DD85E0A1F4677CC8AB4EABA972A1067D79413E657BD19B87EBCE1
3,057,113 UART: Caliptra RT
3,057,364 UART: [state] CFI Enabled
3,178,102 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,846 UART: [rt]cmd =0x41544d4e, len=14344
3,611,663 >>> mbox cmd response data (8 bytes)
3,611,664 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,553 UART: [rt]cmd =0x41545348, len=116
3,663,408 >>> mbox cmd response data (12 bytes)
3,663,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,153,256 >>> mbox cmd response: success
6,153,256 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,166,801 UART:
6,166,817 UART: Running Caliptra FMC ...
6,167,225 UART:
6,167,279 UART: [state] CFI Enabled
6,256,408 UART: [art] Extend RT PCRs Done
6,256,836 UART: [art] Lock RT PCRs Done
6,258,113 UART: [art] Populate DV Done
6,266,210 UART: [fht] FMC Alias Private Key: 7
6,267,284 UART: [art] Derive CDI
6,267,564 UART: [art] Store in slot 0x4
6,353,583 UART: [art] Derive Key Pair
6,353,943 UART: [art] Store priv key in slot 0x5
6,366,977 UART: [art] Derive Key Pair - Done
6,381,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,397,237 UART: [art] Erasing AUTHORITY.KEYID = 7
6,398,002 UART: [art] PUB.X = 349924CC0B21928412CDB760B5577AF8A7FA35C0FFA54EFEF18654117BF6F7F1B4A16144E9573C10A9639F628951A440
6,404,769 UART: [art] PUB.Y = 96235F9BF2CB33487F2204D89E6A28322218C560AE0EC38922E20839782BFB9129106E6AE34FAD9438387B5FEDC97C38
6,411,708 UART: [art] SIG.R = DD95E06C2C35C122C395A904047C65F0EBFE9CAE6B2375901307D37A02AF763E7F0629DE125FDEF057230C38ED72628A
6,418,466 UART: [art] SIG.S = 52277BD3A301DD64812D4F317D1E7FDA51CCE9940F4364E8EFD85F295F4042C837E298E1F153906C47874C7B1FE66A5D
6,441,742 UART: Caliptra RT
6,441,993 UART: [state] CFI Enabled
6,804,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,496 UART: [rt]cmd =0x41545348, len=116
6,856,588 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
893,415 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,540 UART: [kat] ++
897,692 UART: [kat] sha1
901,942 UART: [kat] SHA2-256
903,882 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
918,621 UART: [kat] HMAC-384Kdf
923,353 UART: [kat] LMS
1,171,681 UART: [kat] --
1,172,654 UART: [cold-reset] ++
1,173,040 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 ready_for_fw is high
1,177,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,202,006 UART: [idev] Sha1 KeyId Algorithm
1,210,474 UART: [idev] --
1,211,526 UART: [ldev] ++
1,211,694 UART: [ldev] CDI.KEYID = 6
1,212,057 UART: [ldev] SUBJECT.KEYID = 5
1,212,483 UART: [ldev] AUTHORITY.KEYID = 7
1,212,946 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,556 UART: [ldev] --
1,282,953 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,716 >>> mbox cmd response: success
2,828,952 UART: [afmc] ++
2,829,120 UART: [afmc] CDI.KEYID = 6
2,829,482 UART: [afmc] SUBJECT.KEYID = 7
2,829,907 UART: [afmc] AUTHORITY.KEYID = 5
2,865,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,019 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,476 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,359 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,060 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,934 UART: [afmc] --
2,908,866 UART: [cold-reset] --
2,909,878 UART: [state] Locking Datavault
2,910,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,513 UART: [state] Locking ICCM
2,911,975 UART: [exit] Launching FMC @ 0x40000130
2,917,305 UART:
2,917,321 UART: Running Caliptra FMC ...
2,917,729 UART:
2,917,872 UART: [state] CFI Enabled
2,928,430 UART: [fht] FMC Alias Private Key: 7
3,048,026 UART: [art] Extend RT PCRs Done
3,048,454 UART: [art] Lock RT PCRs Done
3,050,150 UART: [art] Populate DV Done
3,058,499 UART: [fht] FMC Alias Private Key: 7
3,059,437 UART: [art] Derive CDI
3,059,717 UART: [art] Store in slot 0x4
3,145,360 UART: [art] Derive Key Pair
3,145,720 UART: [art] Store priv key in slot 0x5
3,159,258 UART: [art] Derive Key Pair - Done
3,173,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,030 UART: [art] PUB.X = FC044385BC26376F14C5E6059764B198DA565C80D7EF08889AE03A7619B490559BAC98D0BC54DC214004FBAEE58DBF03
3,196,791 UART: [art] PUB.Y = B71DF25DF2AFCCAE158CD2DC7993699DC120568ABE6C70E4F2E2FD0D50E7B1EE426AEF22CC883694DF36EBCE0394F607
3,203,756 UART: [art] SIG.R = 77F4EE17B0AC7F581D0C36950FF0011ABF70C38E2FDC62451A90B2DEB5969D4F13D70398E0501030BBF71AB70C2C5FD5
3,210,523 UART: [art] SIG.S = BF93E091D2D15B7979B5261FAEA66CAB23A0E85DA6C2B206FABDB6FEB1B7576874C0E7E9A7B8F6C3144E652A5E805353
3,234,234 UART: Caliptra RT
3,234,577 UART: [state] CFI Enabled
3,354,304 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,974 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,612 UART: [rt]cmd =0x41544d4e, len=14344
3,788,449 >>> mbox cmd response data (8 bytes)
3,788,450 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,673 UART: [rt]cmd =0x41545348, len=116
3,840,122 >>> mbox cmd response data (12 bytes)
3,840,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,802 UART:
3,840,818 UART: Running Caliptra ROM ...
3,841,226 UART:
3,841,368 UART: [state] CFI Enabled
3,843,558 UART: [state] LifecycleState = Unprovisioned
3,844,213 UART: [state] DebugLocked = No
3,844,845 UART: [state] WD Timer not started. Device not locked for debugging
3,846,001 UART: [kat] SHA2-256
4,651,651 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,655,776 UART: [kat] ++
4,655,928 UART: [kat] sha1
4,660,080 UART: [kat] SHA2-256
4,662,020 UART: [kat] SHA2-384
4,664,787 UART: [kat] SHA2-512-ACC
4,666,687 UART: [kat] ECC-384
4,676,418 UART: [kat] HMAC-384Kdf
4,681,172 UART: [kat] LMS
4,929,500 UART: [kat] --
4,930,150 UART: [update-reset] ++
6,289,144 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,290,253 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,445,468 >>> mbox cmd response: success
6,445,468 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,445,763 UART: [update-reset] Copying MAN_2 To MAN_1
6,453,777 UART: [update-reset Success] --
6,454,646 UART: [state] Locking Datavault
6,455,314 UART: [state] Locking PCR0, PCR1 and PCR31
6,455,918 UART: [state] Locking ICCM
6,456,390 UART: [exit] Launching FMC @ 0x40000130
6,461,720 UART:
6,461,736 UART: Running Caliptra FMC ...
6,462,144 UART:
6,462,287 UART: [state] CFI Enabled
6,551,492 UART: [art] Extend RT PCRs Done
6,551,920 UART: [art] Lock RT PCRs Done
6,553,299 UART: [art] Populate DV Done
6,561,862 UART: [fht] FMC Alias Private Key: 7
6,562,866 UART: [art] Derive CDI
6,563,146 UART: [art] Store in slot 0x4
6,648,741 UART: [art] Derive Key Pair
6,649,101 UART: [art] Store priv key in slot 0x5
6,662,121 UART: [art] Derive Key Pair - Done
6,677,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,692,580 UART: [art] Erasing AUTHORITY.KEYID = 7
6,693,345 UART: [art] PUB.X = 675A9D7A01581173971F5359978652ACD7C279D45FC6AC7E322CCDED1CF73121FB873AE60FDE030F25DD39E573902E18
6,700,107 UART: [art] PUB.Y = 0C7CF243CA16B94BE7CFFD56DF7753BB45A1471664E0306E01B9291D7D46508DF11C3A40638FC60C5C3975FB42F22A18
6,707,054 UART: [art] SIG.R = 56337CAD5545A0F52F0AD5A5E87201CE68CA6679107C212CCAC5B8C0E59E30E225DD7C2C2647B80021F526EBD7EA59A5
6,713,806 UART: [art] SIG.S = 9BBFDC1156FBEAD68335EB39F9E49269F956099FBF52C390290FE6F55694BE7E50F019769B3528B95A1C4A0DC12367E6
6,737,497 UART: Caliptra RT
6,737,840 UART: [state] CFI Enabled
7,102,536 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,601 UART: [rt]cmd =0x41545348, len=116
7,155,179 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,274 ready_for_fw is high
1,061,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,029 >>> mbox cmd response: success
2,742,126 UART:
2,742,142 UART: Running Caliptra FMC ...
2,742,550 UART:
2,742,693 UART: [state] CFI Enabled
2,753,313 UART: [fht] FMC Alias Private Key: 7
2,872,603 UART: [art] Extend RT PCRs Done
2,873,031 UART: [art] Lock RT PCRs Done
2,874,659 UART: [art] Populate DV Done
2,882,960 UART: [fht] FMC Alias Private Key: 7
2,884,106 UART: [art] Derive CDI
2,884,386 UART: [art] Store in slot 0x4
2,970,239 UART: [art] Derive Key Pair
2,970,599 UART: [art] Store priv key in slot 0x5
2,983,933 UART: [art] Derive Key Pair - Done
2,998,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,091 UART: [art] PUB.X = 66E3249B06E5844882807399E82A325950E2589F7D1B862FE97C3697E4513A78DCCA07B74CC1479D84B5FF1577AE8D41
3,021,849 UART: [art] PUB.Y = 85FEA9C72456AE3673C5BBCDF6E79663DBACD785B549CCEABF316EC8B46721FE772CFD37E2C630AA36D12EFB6C446D45
3,028,823 UART: [art] SIG.R = F75B99E8C552411ED402DFEBCB54D8A50C78D92CA766E302BFA378BD690B42ED31CD2968D2D3691BCA3C2DF94B4A777A
3,035,599 UART: [art] SIG.S = 1B35DCA5518DFE20FD41E8AA595BA82AE47FC5E4F40E6B01ADC5D9C2F8EC3613A658D0756118A12C3AE9FB0D8B94A99C
3,059,776 UART: Caliptra RT
3,060,119 UART: [state] CFI Enabled
3,180,502 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,181,172 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,202 UART: [rt]cmd =0x41544d4e, len=14344
3,614,119 >>> mbox cmd response data (8 bytes)
3,614,120 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,241 UART: [rt]cmd =0x41545348, len=116
3,665,576 >>> mbox cmd response data (12 bytes)
3,665,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,155,993 >>> mbox cmd response: success
6,155,993 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,169,526 UART:
6,169,542 UART: Running Caliptra FMC ...
6,169,950 UART:
6,170,093 UART: [state] CFI Enabled
6,259,440 UART: [art] Extend RT PCRs Done
6,259,868 UART: [art] Lock RT PCRs Done
6,261,077 UART: [art] Populate DV Done
6,269,206 UART: [fht] FMC Alias Private Key: 7
6,270,288 UART: [art] Derive CDI
6,270,568 UART: [art] Store in slot 0x4
6,356,723 UART: [art] Derive Key Pair
6,357,083 UART: [art] Store priv key in slot 0x5
6,370,773 UART: [art] Derive Key Pair - Done
6,385,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,401,297 UART: [art] Erasing AUTHORITY.KEYID = 7
6,402,062 UART: [art] PUB.X = 1040A530668E373F3F991C0201E52AD78D49F26B1BB0144D9C1BB102DBD6BE8AB9D33026017BC1D4A489725E96F71C19
6,408,822 UART: [art] PUB.Y = AF1D49E4BC1F7A92B682F1A36D8BFBD8221F358BEDE23ECA8876782D69CBFF813DE1A0CAF295164030E2DA8B91BE1959
6,415,792 UART: [art] SIG.R = 0777E781102E432800AAC02EC9A536CEE4D547B274B82CF6979FB67C7DD05D6E1BF57410D824C6580911ADC3AD801B6F
6,422,540 UART: [art] SIG.S = 0C1EB50C2F731081C6C6EBF0D4CDB1D7ECA3827D981810896AB5DD16DFC8044A2BE06D2EE19EE5A01480AE58571C2E3A
6,446,831 UART: Caliptra RT
6,447,174 UART: [state] CFI Enabled
6,817,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,847,850 UART: [rt]cmd =0x41545348, len=116
6,868,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,163 UART:
192,515 UART: Running Caliptra ROM ...
193,710 UART:
193,864 UART: [state] CFI Enabled
260,700 UART: [state] LifecycleState = Unprovisioned
262,693 UART: [state] DebugLocked = No
264,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,093 UART: [kat] SHA2-256
438,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,262 UART: [kat] ++
449,709 UART: [kat] sha1
461,171 UART: [kat] SHA2-256
463,894 UART: [kat] SHA2-384
469,671 UART: [kat] SHA2-512-ACC
472,033 UART: [kat] ECC-384
2,765,786 UART: [kat] HMAC-384Kdf
2,799,068 UART: [kat] LMS
3,989,342 UART: [kat] --
3,994,296 UART: [cold-reset] ++
3,995,388 UART: [fht] Storing FHT @ 0x50003400
4,006,430 UART: [idev] ++
4,007,017 UART: [idev] CDI.KEYID = 6
4,007,938 UART: [idev] SUBJECT.KEYID = 7
4,009,196 UART: [idev] UDS.KEYID = 0
4,010,156 ready_for_fw is high
4,010,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,429 UART: [idev] Erasing UDS.KEYID = 0
7,344,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,572 UART: [idev] --
7,369,951 UART: [ldev] ++
7,370,531 UART: [ldev] CDI.KEYID = 6
7,371,503 UART: [ldev] SUBJECT.KEYID = 5
7,372,665 UART: [ldev] AUTHORITY.KEYID = 7
7,373,950 UART: [ldev] FE.KEYID = 1
7,420,511 UART: [ldev] Erasing FE.KEYID = 1
10,751,293 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,067 UART: [ldev] --
13,112,445 UART: [fwproc] Waiting for Commands...
13,115,617 UART: [fwproc] Received command 0x46574c44
13,117,886 UART: [fwproc] Received Image of size 118548 bytes
17,226,454 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,926 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,113 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,271 >>> mbox cmd response: success
17,707,579 UART: [afmc] ++
17,708,194 UART: [afmc] CDI.KEYID = 6
17,709,110 UART: [afmc] SUBJECT.KEYID = 7
17,710,384 UART: [afmc] AUTHORITY.KEYID = 5
21,078,521 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,383,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,397,600 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,412,329 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,426,726 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,449,472 UART: [afmc] --
23,453,093 UART: [cold-reset] --
23,455,608 UART: [state] Locking Datavault
23,459,297 UART: [state] Locking PCR0, PCR1 and PCR31
23,461,049 UART: [state] Locking ICCM
23,462,475 UART: [exit] Launching FMC @ 0x40000130
23,470,879 UART:
23,471,108 UART: Running Caliptra FMC ...
23,472,133 UART:
23,472,283 UART: [state] CFI Enabled
23,539,734 UART: [fht] FMC Alias Private Key: 7
25,880,137 UART: [art] Extend RT PCRs Done
25,881,361 UART: [art] Lock RT PCRs Done
25,882,901 UART: [art] Populate DV Done
25,888,364 UART: [fht] FMC Alias Private Key: 7
25,890,014 UART: [art] Derive CDI
25,890,757 UART: [art] Store in slot 0x4
25,948,309 UART: [art] Derive Key Pair
25,949,355 UART: [art] Store priv key in slot 0x5
29,241,931 UART: [art] Derive Key Pair - Done
29,254,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,098 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,610 UART: [art] PUB.X = 9C0B4D016FC4F2C28DE340CDB1C28EACA680DB701C99829AD968F92DF92920806A2336AD0531683A74D8187E579001F4
31,552,863 UART: [art] PUB.Y = F3B19B196DC2A8C67CDCB26B022DE328D42100781113A3B70BA77A51617C03DCD401093221EEC039DD2F757ED439AAA2
31,560,093 UART: [art] SIG.R = 6D3C8D239C95506350763A59A01DC7D38E243F56BCB2AE4310FC57EE35F6C2D6ECF7D6573F0D36AEB100C482BB8BB085
31,567,479 UART: [art] SIG.S = 6906E0EE7B6352773D5B61B4FF1C97BC3FC5C4DEC28A68B761CCF803A2F0E4A2F30F7FD98421BBD72FEE4990E6BBA17E
32,872,622 UART: Caliptra RT
32,873,328 UART: [state] CFI Enabled
33,051,592 UART: [rt] RT listening for mailbox commands...
33,053,989 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,209,584 UART: [rt]cmd =0x41544d4e, len=14344
38,509,965 >>> mbox cmd response data (8 bytes)
38,510,557 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,541,471 UART: [rt]cmd =0x41545348, len=116
38,543,516 >>> mbox cmd response data (12 bytes)
40,615,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,766,121 UART:
40,766,495 UART: Running Caliptra ROM ...
40,767,644 UART:
40,767,814 UART: [state] CFI Enabled
40,837,937 UART: [state] LifecycleState = Unprovisioned
40,839,873 UART: [state] DebugLocked = No
40,842,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,847,656 UART: [kat] SHA2-256
41,017,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,027,854 UART: [kat] ++
41,028,351 UART: [kat] sha1
41,039,355 UART: [kat] SHA2-256
41,042,052 UART: [kat] SHA2-384
41,049,079 UART: [kat] SHA2-512-ACC
41,051,437 UART: [kat] ECC-384
43,341,338 UART: [kat] HMAC-384Kdf
43,353,147 UART: [kat] LMS
44,543,528 UART: [kat] --
44,550,707 UART: [update-reset] ++
48,745,345 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,749,787 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,147,516 >>> mbox cmd response: success
49,152,266 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,152,858 UART: [update-reset] Copying MAN_2 To MAN_1
49,170,242 UART: [update-reset Success] --
49,175,293 UART: [state] Locking Datavault
49,178,713 UART: [state] Locking PCR0, PCR1 and PCR31
49,180,470 UART: [state] Locking ICCM
49,182,376 UART: [exit] Launching FMC @ 0x40000130
49,190,820 UART:
49,191,061 UART: Running Caliptra FMC ...
49,192,106 UART:
49,192,255 UART: [state] CFI Enabled
49,293,598 UART: [art] Extend RT PCRs Done
49,294,805 UART: [art] Lock RT PCRs Done
49,295,967 UART: [art] Populate DV Done
49,301,449 UART: [fht] FMC Alias Private Key: 7
49,303,041 UART: [art] Derive CDI
49,303,781 UART: [art] Store in slot 0x4
49,362,349 UART: [art] Derive Key Pair
49,363,398 UART: [art] Store priv key in slot 0x5
52,656,152 UART: [art] Derive Key Pair - Done
52,668,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,957,443 UART: [art] Erasing AUTHORITY.KEYID = 7
54,959,237 UART: [art] PUB.X = DFAF8FE796D2C3B0C03573914A9B3BAF664B4F4DC39660F3DC048B22DCF37704B0FF8FA5A042EFB4DFCA77023DB15344
54,966,269 UART: [art] PUB.Y = A025E53699214359D39220D91271498B7511A461A718F9DAC724397BD6A82EA5698266D8B514024FA75D1388E24CC19A
54,973,492 UART: [art] SIG.R = 3D4505CCE678BC5783ABFC8C53D3F1BD073CB702F359A14D7363D504559C4FF38854A1B69DB63D48BF41D3CEAF126663
54,980,887 UART: [art] SIG.S = 88C9EEC55C940DDD5B92AE089F5B2EBE40214D91280AFB5CDDCF425631D0FCF81FEFF414A545E07DB177AB2F795ECEF8
56,286,591 UART: Caliptra RT
56,287,328 UART: [state] CFI Enabled
56,704,619 UART: [rt] RT listening for mailbox commands...
56,736,708 UART: [rt]cmd =0x41545348, len=116
56,738,955 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,785,527 ready_for_fw is high
3,785,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,283 >>> mbox cmd response: success
23,624,344 UART:
23,624,732 UART: Running Caliptra FMC ...
23,625,840 UART:
23,625,993 UART: [state] CFI Enabled
23,696,645 UART: [fht] FMC Alias Private Key: 7
26,036,470 UART: [art] Extend RT PCRs Done
26,037,719 UART: [art] Lock RT PCRs Done
26,039,215 UART: [art] Populate DV Done
26,044,569 UART: [fht] FMC Alias Private Key: 7
26,046,215 UART: [art] Derive CDI
26,046,955 UART: [art] Store in slot 0x4
26,104,536 UART: [art] Derive Key Pair
26,105,581 UART: [art] Store priv key in slot 0x5
29,398,345 UART: [art] Derive Key Pair - Done
29,410,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,699,431 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,941 UART: [art] PUB.X = A331BDC38EE780627A58BE5A51D18C810B7DCBEE45954F4CD6CECCCEA2FA68690E0BEF9060D88AA31F2ACDB594C3C048
31,708,246 UART: [art] PUB.Y = D1F5B30C7B8AB2DBD040B4EBE94A170909D8360F551206B853D351D6DC9D2D5696E6B4BA01E9D3EAD60D8B33DA1B6AF8
31,715,506 UART: [art] SIG.R = C7487B962F84C700C1AC29E46CF23C675422C324C929778992407947E7DC1E6C52BE758018460D9ED8D0DD4871CDC3F3
31,722,848 UART: [art] SIG.S = B2B9648B8B8BAFC03157D6DA868FF2420C623BF51CA5A7C4CE8F257191392DBC7527E6C99FDA5FF7002B9296EAC8DD96
33,028,214 UART: Caliptra RT
33,028,923 UART: [state] CFI Enabled
33,205,613 UART: [rt] RT listening for mailbox commands...
33,208,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,363,434 UART: [rt]cmd =0x41544d4e, len=14344
38,664,408 >>> mbox cmd response data (8 bytes)
38,664,977 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,695,658 UART: [rt]cmd =0x41545348, len=116
38,697,729 >>> mbox cmd response data (12 bytes)
40,773,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,620,075 >>> mbox cmd response: success
49,620,783 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,654,738 UART:
49,655,085 UART: Running Caliptra FMC ...
49,656,215 UART:
49,656,377 UART: [state] CFI Enabled
49,753,002 UART: [art] Extend RT PCRs Done
49,754,284 UART: [art] Lock RT PCRs Done
49,755,589 UART: [art] Populate DV Done
49,760,788 UART: [fht] FMC Alias Private Key: 7
49,762,484 UART: [art] Derive CDI
49,763,296 UART: [art] Store in slot 0x4
49,821,665 UART: [art] Derive Key Pair
49,822,708 UART: [art] Store priv key in slot 0x5
53,115,461 UART: [art] Derive Key Pair - Done
53,128,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,416,237 UART: [art] Erasing AUTHORITY.KEYID = 7
55,417,744 UART: [art] PUB.X = 61B7DD31E7C4C826428B82230EA70E4A7C9269485F849B65C27A901E2DE5F08C9E23FAD5C19FD4CEFE3D33412188AE9E
55,424,989 UART: [art] PUB.Y = 91D388C67BE84B8B9373077024B614A725C5E4BB348974F4506F01DE42C89A544672E3BF521A8C049AEBDB3FD636E536
55,432,231 UART: [art] SIG.R = B7833D9B029BF8B4FF89576F7D8446CEB0DC995C463D52BACE939CF2112FAC263E32044B26BC70E3804B883BBDCEC07B
55,439,679 UART: [art] SIG.S = E88247AE5F41CAE417F7FC1A66056C569D84F31F495D1DFBA1B9058B76907C4FDD75AA5CA65444F2F891C28396462852
56,745,299 UART: Caliptra RT
56,746,000 UART: [state] CFI Enabled
57,190,733 UART: [rt] RT listening for mailbox commands...
57,222,605 UART: [rt]cmd =0x41545348, len=116
57,225,015 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.18s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,647 UART:
193,004 UART: Running Caliptra ROM ...
194,201 UART:
603,661 UART: [state] CFI Enabled
620,954 UART: [state] LifecycleState = Unprovisioned
622,891 UART: [state] DebugLocked = No
624,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,970 UART: [kat] SHA2-256
799,753 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,261 UART: [kat] ++
810,724 UART: [kat] sha1
821,100 UART: [kat] SHA2-256
823,820 UART: [kat] SHA2-384
829,734 UART: [kat] SHA2-512-ACC
832,094 UART: [kat] ECC-384
3,116,887 UART: [kat] HMAC-384Kdf
3,129,366 UART: [kat] LMS
4,319,492 UART: [kat] --
4,325,499 UART: [cold-reset] ++
4,327,570 UART: [fht] Storing FHT @ 0x50003400
4,338,334 UART: [idev] ++
4,338,888 UART: [idev] CDI.KEYID = 6
4,339,861 UART: [idev] SUBJECT.KEYID = 7
4,341,096 UART: [idev] UDS.KEYID = 0
4,342,122 ready_for_fw is high
4,342,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,250 UART: [idev] Erasing UDS.KEYID = 0
7,628,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,126 UART: [idev] --
7,653,981 UART: [ldev] ++
7,654,551 UART: [ldev] CDI.KEYID = 6
7,655,509 UART: [ldev] SUBJECT.KEYID = 5
7,656,715 UART: [ldev] AUTHORITY.KEYID = 7
7,657,995 UART: [ldev] FE.KEYID = 1
7,666,263 UART: [ldev] Erasing FE.KEYID = 1
10,950,102 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,766 UART: [ldev] --
13,311,211 UART: [fwproc] Waiting for Commands...
13,313,366 UART: [fwproc] Received command 0x46574c44
13,315,552 UART: [fwproc] Received Image of size 118548 bytes
17,410,409 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,413 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,037 >>> mbox cmd response: success
17,891,876 UART: [afmc] ++
17,892,490 UART: [afmc] CDI.KEYID = 6
17,893,376 UART: [afmc] SUBJECT.KEYID = 7
17,894,641 UART: [afmc] AUTHORITY.KEYID = 5
21,206,174 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,129 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,532,812 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,204 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,567,928 UART: [afmc] --
23,571,033 UART: [cold-reset] --
23,575,171 UART: [state] Locking Datavault
23,580,525 UART: [state] Locking PCR0, PCR1 and PCR31
23,582,271 UART: [state] Locking ICCM
23,583,632 UART: [exit] Launching FMC @ 0x40000130
23,592,038 UART:
23,592,306 UART: Running Caliptra FMC ...
23,593,408 UART:
23,593,562 UART: [state] CFI Enabled
23,601,441 UART: [fht] FMC Alias Private Key: 7
25,941,001 UART: [art] Extend RT PCRs Done
25,942,223 UART: [art] Lock RT PCRs Done
25,943,786 UART: [art] Populate DV Done
25,949,250 UART: [fht] FMC Alias Private Key: 7
25,950,722 UART: [art] Derive CDI
25,951,496 UART: [art] Store in slot 0x4
25,993,868 UART: [art] Derive Key Pair
25,994,907 UART: [art] Store priv key in slot 0x5
29,236,669 UART: [art] Derive Key Pair - Done
29,249,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,529,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,127 UART: [art] PUB.X = 12D940D002F8B8E0A392CE394DF70DDA47EC4ACBB1773A809258CA5BA8123BDC30E51A1B1CAF90AE41F83BEB59592096
31,538,364 UART: [art] PUB.Y = CD46981C7B34847745C45AD667D9A897DD55C5F3522CD8287DBA0245464120C34C2E3E50B78E037848C68913806FE107
31,545,640 UART: [art] SIG.R = 964DA121A98CF6A75BA06B21A1AB9AB7813201EE20B15FA18B96534E61DF78DAE775D36BDDD5984633FBB3ADC3DB7756
31,553,020 UART: [art] SIG.S = 5EECDBD2A42B2B0AB566D5F3671F570A81B05902D1529CB3310F3604B6AC2EEF665E06508165020657B07A3D433B4523
32,857,920 UART: Caliptra RT
32,858,638 UART: [state] CFI Enabled
32,991,482 UART: [rt] RT listening for mailbox commands...
32,993,855 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,149,097 UART: [rt]cmd =0x41544d4e, len=14344
38,449,345 >>> mbox cmd response data (8 bytes)
38,450,008 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,480,798 UART: [rt]cmd =0x41545348, len=116
38,482,759 >>> mbox cmd response data (12 bytes)
40,555,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,706,477 UART:
40,706,872 UART: Running Caliptra ROM ...
40,707,925 UART:
40,708,080 UART: [state] CFI Enabled
40,721,931 UART: [state] LifecycleState = Unprovisioned
40,723,823 UART: [state] DebugLocked = No
40,726,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,731,283 UART: [kat] SHA2-256
40,900,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
40,911,537 UART: [kat] ++
40,912,003 UART: [kat] sha1
40,924,565 UART: [kat] SHA2-256
40,927,250 UART: [kat] SHA2-384
40,933,230 UART: [kat] SHA2-512-ACC
40,935,567 UART: [kat] ECC-384
43,218,691 UART: [kat] HMAC-384Kdf
43,229,676 UART: [kat] LMS
44,419,749 UART: [kat] --
44,423,055 UART: [update-reset] ++
48,618,392 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,621,415 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,019,166 >>> mbox cmd response: success
49,023,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,024,468 UART: [update-reset] Copying MAN_2 To MAN_1
49,041,989 UART: [update-reset Success] --
49,046,455 UART: [state] Locking Datavault
49,050,408 UART: [state] Locking PCR0, PCR1 and PCR31
49,052,164 UART: [state] Locking ICCM
49,054,553 UART: [exit] Launching FMC @ 0x40000130
49,062,941 UART:
49,063,171 UART: Running Caliptra FMC ...
49,064,200 UART:
49,064,347 UART: [state] CFI Enabled
49,109,146 UART: [art] Extend RT PCRs Done
49,110,335 UART: [art] Lock RT PCRs Done
49,111,560 UART: [art] Populate DV Done
49,116,860 UART: [fht] FMC Alias Private Key: 7
49,118,387 UART: [art] Derive CDI
49,119,115 UART: [art] Store in slot 0x4
49,161,810 UART: [art] Derive Key Pair
49,162,801 UART: [art] Store priv key in slot 0x5
52,405,496 UART: [art] Derive Key Pair - Done
52,418,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,698,588 UART: [art] Erasing AUTHORITY.KEYID = 7
54,700,103 UART: [art] PUB.X = 0F955F97B4823E3DAD01FDEEB204B58F6A0CA23C6D37727630518C551BA78E3636A0BC5350FD56D9B146AA2D933DC998
54,707,419 UART: [art] PUB.Y = 4D8E95DF3A976ED8820B1C3EB4D9E1F5468C57EBAD3269C0D46F9CBF4027E58D988E270E3F6C185A998A7E37814914BB
54,714,659 UART: [art] SIG.R = 6C9FA4081ADA37A67EFBF047CDE1588BB79CE256E9FA3CDBD3C33CE515457EED52B17E6C5EC6AC8D81E8F8599936172B
54,722,094 UART: [art] SIG.S = 059B7A6C563865219FF2124AA4C1ACABA519BB4A9FB78ABCF8E783F1C9599AA7EBB1BFB53F207A32E6D9190EF269B665
56,027,449 UART: Caliptra RT
56,028,152 UART: [state] CFI Enabled
56,403,018 UART: [rt] RT listening for mailbox commands...
56,435,025 UART: [rt]cmd =0x41545348, len=116
56,437,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,127,752 ready_for_fw is high
4,128,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,440 >>> mbox cmd response: success
23,804,811 UART:
23,805,219 UART: Running Caliptra FMC ...
23,806,358 UART:
23,806,515 UART: [state] CFI Enabled
23,814,445 UART: [fht] FMC Alias Private Key: 7
26,154,209 UART: [art] Extend RT PCRs Done
26,155,442 UART: [art] Lock RT PCRs Done
26,157,337 UART: [art] Populate DV Done
26,162,688 UART: [fht] FMC Alias Private Key: 7
26,164,232 UART: [art] Derive CDI
26,165,044 UART: [art] Store in slot 0x4
26,207,939 UART: [art] Derive Key Pair
26,208,976 UART: [art] Store priv key in slot 0x5
29,450,905 UART: [art] Derive Key Pair - Done
29,463,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,427 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,936 UART: [art] PUB.X = 59BB39134CCB42BDA69926801C72DB311F59EAA2C63A6579260E2478E4DBCA8DBC17FEB6E7C4FB1B7F801884E21C87B1
31,753,236 UART: [art] PUB.Y = 0F2F070736961669649739690F6E286C8C79A5D3FD28FD1D834320BB126102FD45BF69D53D580A22E295A0DA75841990
31,760,440 UART: [art] SIG.R = 60F9B746D0AC549FAA606676CF393A343DB14A32381D85E2AFFEF694FDA804BCFFE561CC3890BE29C14ED9FECBFEC866
31,767,834 UART: [art] SIG.S = B9C16188E7A41515847C68A6FEBC989F42BD9C8EDA600753F2EB557871AF82202050F3EAA9A847BDF166FE4BC85603F9
33,073,601 UART: Caliptra RT
33,074,316 UART: [state] CFI Enabled
33,208,014 UART: [rt] RT listening for mailbox commands...
33,210,404 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,366,216 UART: [rt]cmd =0x41544d4e, len=14344
38,666,531 >>> mbox cmd response data (8 bytes)
38,667,227 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,697,926 UART: [rt]cmd =0x41545348, len=116
38,700,127 >>> mbox cmd response data (12 bytes)
40,770,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,519,247 >>> mbox cmd response: success
49,519,934 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
49,554,465 UART:
49,554,786 UART: Running Caliptra FMC ...
49,555,909 UART:
49,556,068 UART: [state] CFI Enabled
49,600,195 UART: [art] Extend RT PCRs Done
49,601,434 UART: [art] Lock RT PCRs Done
49,602,804 UART: [art] Populate DV Done
49,608,097 UART: [fht] FMC Alias Private Key: 7
49,609,639 UART: [art] Derive CDI
49,610,396 UART: [art] Store in slot 0x4
49,653,159 UART: [art] Derive Key Pair
49,654,202 UART: [art] Store priv key in slot 0x5
52,896,588 UART: [art] Derive Key Pair - Done
52,909,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,189,817 UART: [art] Erasing AUTHORITY.KEYID = 7
55,191,332 UART: [art] PUB.X = 33123B1D23DC3E18FCAE5BB232CCEE1B46236B700D5119FC8AAFC1926B073CE84B944D340F30AEAEB2B053D1DC9B4351
55,198,637 UART: [art] PUB.Y = 137DE13344E5F1128F63F5D3FD3589B5BE6027C817D8D0340303EF6C3F38EB0FE621328C77E8A30430AF9520B18AD4FE
55,205,921 UART: [art] SIG.R = C0E2AEC6D5850EB5EB0D06C61F7D5EE22A4F40F7F3B99E5BAFF6D4F58020FB262F8604650978685A8CCAB9F0778AC229
55,213,304 UART: [art] SIG.S = D0334D0F9CC5C4707E53E4798E69667E42BC9BC80DB7502321BA7CF02F3B958A9DEF70FA27E4777ED1CF73F58F5BAE0F
56,518,083 UART: Caliptra RT
56,518,789 UART: [state] CFI Enabled
56,890,756 UART: [rt] RT listening for mailbox commands...
56,922,787 UART: [rt]cmd =0x41545348, len=116
56,925,123 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,195 UART:
192,558 UART: Running Caliptra ROM ...
193,679 UART:
193,825 UART: [state] CFI Enabled
265,759 UART: [state] LifecycleState = Unprovisioned
267,756 UART: [state] DebugLocked = No
270,568 UART: [state] WD Timer not started. Device not locked for debugging
274,163 UART: [kat] SHA2-256
453,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,595 UART: [kat] ++
465,064 UART: [kat] sha1
475,971 UART: [kat] SHA2-256
478,632 UART: [kat] SHA2-384
485,113 UART: [kat] SHA2-512-ACC
487,473 UART: [kat] ECC-384
2,947,552 UART: [kat] HMAC-384Kdf
2,970,801 UART: [kat] LMS
3,447,309 UART: [kat] --
3,451,023 UART: [cold-reset] ++
3,452,326 UART: [fht] FHT @ 0x50003400
3,464,936 UART: [idev] ++
3,465,564 UART: [idev] CDI.KEYID = 6
3,466,471 UART: [idev] SUBJECT.KEYID = 7
3,467,711 UART: [idev] UDS.KEYID = 0
3,468,756 ready_for_fw is high
3,468,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,061 UART: [idev] Erasing UDS.KEYID = 0
5,989,778 UART: [idev] Sha1 KeyId Algorithm
6,013,488 UART: [idev] --
6,017,405 UART: [ldev] ++
6,017,978 UART: [ldev] CDI.KEYID = 6
6,018,919 UART: [ldev] SUBJECT.KEYID = 5
6,020,128 UART: [ldev] AUTHORITY.KEYID = 7
6,021,356 UART: [ldev] FE.KEYID = 1
6,058,599 UART: [ldev] Erasing FE.KEYID = 1
8,567,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,707 UART: [ldev] --
10,378,819 UART: [fwproc] Wait for Commands...
10,380,339 UART: [fwproc] Recv command 0x46574c44
10,382,377 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,913 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,428 >>> mbox cmd response: success
14,353,847 UART: [afmc] ++
14,354,439 UART: [afmc] CDI.KEYID = 6
14,355,327 UART: [afmc] SUBJECT.KEYID = 7
14,356,596 UART: [afmc] AUTHORITY.KEYID = 5
16,900,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,923 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,786 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,777 UART: [afmc] --
18,721,905 UART: [cold-reset] --
18,726,893 UART: [state] Locking Datavault
18,731,917 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,664 UART: [state] Locking ICCM
18,736,379 UART: [exit] Launching FMC @ 0x40000130
18,744,765 UART:
18,745,006 UART: Running Caliptra FMC ...
18,746,111 UART:
18,746,265 UART: [state] CFI Enabled
18,799,385 UART: [fht] FMC Alias Private Key: 7
20,565,857 UART: [art] Extend RT PCRs Done
20,567,074 UART: [art] Lock RT PCRs Done
20,568,621 UART: [art] Populate DV Done
20,573,975 UART: [fht] FMC Alias Private Key: 7
20,575,560 UART: [art] Derive CDI
20,576,311 UART: [art] Store in slot 0x4
20,631,888 UART: [art] Derive Key Pair
20,632,932 UART: [art] Store priv key in slot 0x5
23,096,277 UART: [art] Derive Key Pair - Done
23,109,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,656 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,171 UART: [art] PUB.X = 26C04B640AEF5B43F880AFF4949223BF410843CA01A4DC4B2AE9D150E6F2937C962F64E7A5B8E9667FC1B05C99467C24
24,830,424 UART: [art] PUB.Y = DA4084031D2F8B09946D4F17C9F5AC150313D79EC5828379A89C6C1E82FD2CF0673E639BFF56F586E86D94E0F944EFD1
24,837,651 UART: [art] SIG.R = 84AF38066F78189564A490A383D785F37AB50BE1FDE6FE234F623956B8634CF1735D44F04794E88F192725700CE64C1E
24,845,050 UART: [art] SIG.S = 82929E6F3EFDFA6A6FE3F54EBB50AB4E5C6201EA1CC585BE148914703B070346F37BB0F218AFC80C27AABC045520F0DF
25,823,554 UART: Caliptra RT
25,824,252 UART: [state] CFI Enabled
26,005,025 UART: [rt] RT listening for mailbox commands...
26,007,441 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,162,728 UART: [rt]cmd =0x41544d4e, len=14344
30,158,683 >>> mbox cmd response data (8 bytes)
30,159,317 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,190,259 UART: [rt]cmd =0x41545348, len=116
30,192,567 >>> mbox cmd response data (12 bytes)
32,250,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,401,213 UART:
32,401,580 UART: Running Caliptra ROM ...
32,402,718 UART:
32,402,883 UART: [state] CFI Enabled
32,473,413 UART: [state] LifecycleState = Unprovisioned
32,475,345 UART: [state] DebugLocked = No
32,476,538 UART: [state] WD Timer not started. Device not locked for debugging
32,480,608 UART: [kat] SHA2-256
32,660,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,671,088 UART: [kat] ++
32,671,555 UART: [kat] sha1
32,683,302 UART: [kat] SHA2-256
32,685,987 UART: [kat] SHA2-384
32,691,808 UART: [kat] SHA2-512-ACC
32,694,140 UART: [kat] ECC-384
35,160,130 UART: [kat] HMAC-384Kdf
35,181,643 UART: [kat] LMS
35,658,094 UART: [kat] --
35,664,634 UART: [update-reset] ++
39,163,656 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,167,857 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,565,475 >>> mbox cmd response: success
39,565,921 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,567,057 UART: [update-reset] Copying MAN_2 To MAN_1
39,604,179 UART: [update-reset Success] --
39,609,318 UART: [state] Locking Datavault
39,611,990 UART: [state] Locking PCR0, PCR1 and PCR31
39,613,740 UART: [state] Locking ICCM
39,616,129 UART: [exit] Launching FMC @ 0x40000130
39,624,517 UART:
39,624,743 UART: Running Caliptra FMC ...
39,625,767 UART:
39,625,913 UART: [state] CFI Enabled
39,715,237 UART: [art] Extend RT PCRs Done
39,716,417 UART: [art] Lock RT PCRs Done
39,717,574 UART: [art] Populate DV Done
39,722,976 UART: [fht] FMC Alias Private Key: 7
39,724,669 UART: [art] Derive CDI
39,725,478 UART: [art] Store in slot 0x4
39,784,216 UART: [art] Derive Key Pair
39,785,273 UART: [art] Store priv key in slot 0x5
42,247,663 UART: [art] Derive Key Pair - Done
42,260,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,973,737 UART: [art] Erasing AUTHORITY.KEYID = 7
43,975,245 UART: [art] PUB.X = 630CF72D4F45D2BEB1351975BDEF3F8F1B73698793D565360D2186B291001FAAA60AC23604E41764D7EF649F3B642BCB
43,982,496 UART: [art] PUB.Y = 6A249CCC6253E6C17395437DE1071B615628E906CCA1CE974373AD81FF2750DD68D870BF8E88D5E6E95ACCC702392404
43,989,724 UART: [art] SIG.R = D11932EBDE70AE002D3171D5F871C258354FC86FB66F03BA97AAE7F591E2FDB34201193DFFDD2297C360C50F2BB88B5B
43,997,107 UART: [art] SIG.S = C4BFF11F0F1C9EBE6D764F884758CECBA641B23A873013F4917E0324F978F2CE190FC0995115A51ED8AEF496DFE93421
44,975,463 UART: Caliptra RT
44,976,163 UART: [state] CFI Enabled
45,400,662 UART: [rt] RT listening for mailbox commands...
45,432,629 UART: [rt]cmd =0x41545348, len=116
45,434,855 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,462,811 ready_for_fw is high
3,463,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,217,352 >>> mbox cmd response: success
18,495,917 UART:
18,496,303 UART: Running Caliptra FMC ...
18,497,414 UART:
18,497,566 UART: [state] CFI Enabled
18,561,462 UART: [fht] FMC Alias Private Key: 7
20,327,909 UART: [art] Extend RT PCRs Done
20,329,131 UART: [art] Lock RT PCRs Done
20,330,455 UART: [art] Populate DV Done
20,335,804 UART: [fht] FMC Alias Private Key: 7
20,337,469 UART: [art] Derive CDI
20,338,207 UART: [art] Store in slot 0x4
20,394,493 UART: [art] Derive Key Pair
20,395,539 UART: [art] Store priv key in slot 0x5
22,858,601 UART: [art] Derive Key Pair - Done
22,871,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,434 UART: [art] PUB.X = 5A2013C8F840B7D8B39A8F46665D5CBE54CDEE1CA75F1D8AD97000ED1AB973A23E86B51241E945063039E9C36838DD99
24,592,646 UART: [art] PUB.Y = 56EEB5446D1B7F8E362B2F094D53D014F64AF0A78CB7B0FB472848E1D633E6EE104BD7BED4E6C14A69AE2F3FEC49F159
24,599,922 UART: [art] SIG.R = A6944A77538DA571DE3466E0491987E0E24B451B211C3B44E820D349B53B91DCFEC35334790241E396C901AAB8784A30
24,607,274 UART: [art] SIG.S = EBBB93749FE03D56AC661D7741481CAC40F65478D3B55FB147E0678A4E07444F98B7C02C986C10E9532153F9499FDCA6
25,586,175 UART: Caliptra RT
25,586,863 UART: [state] CFI Enabled
25,766,778 UART: [rt] RT listening for mailbox commands...
25,769,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,924,477 UART: [rt]cmd =0x41544d4e, len=14344
29,920,657 >>> mbox cmd response data (8 bytes)
29,921,229 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,952,014 UART: [rt]cmd =0x41545348, len=116
29,954,324 >>> mbox cmd response data (12 bytes)
32,016,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,329,765 >>> mbox cmd response: success
39,330,370 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,363,081 UART:
39,363,377 UART: Running Caliptra FMC ...
39,364,494 UART:
39,364,673 UART: [state] CFI Enabled
39,456,510 UART: [art] Extend RT PCRs Done
39,457,759 UART: [art] Lock RT PCRs Done
39,459,385 UART: [art] Populate DV Done
39,464,897 UART: [fht] FMC Alias Private Key: 7
39,466,483 UART: [art] Derive CDI
39,467,293 UART: [art] Store in slot 0x4
39,525,283 UART: [art] Derive Key Pair
39,526,328 UART: [art] Store priv key in slot 0x5
41,989,243 UART: [art] Derive Key Pair - Done
42,002,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,715,210 UART: [art] Erasing AUTHORITY.KEYID = 7
43,716,867 UART: [art] PUB.X = 718C9CACFB98F8A4F02A8CFD59891699F558A53CF26991078C04FF80FFBB00F9A16971B34BBBC871B6081C6F5047053B
43,723,979 UART: [art] PUB.Y = 63CCD6629D63CCA6E6DD35D4C1C4EBBCD82CB14E43D6E3570CF450B2CB9BF0132EC7701237A912966DCF4CD20B15B7E5
43,731,266 UART: [art] SIG.R = 1EF8C89D679F25D517761F18283399E6BF49A1FC1082B6987BA0D54D53F3B11342F97849DCB4B3D1AF8E2206CF0C26E0
43,738,661 UART: [art] SIG.S = C2CBF0C49F40DC0758FDA78E7CC7850BDCFC27E5136B85C0423115535BE41E18525B39D0A326E2F08F38574B441ABF51
44,717,651 UART: Caliptra RT
44,718,352 UART: [state] CFI Enabled
45,142,450 UART: [rt] RT listening for mailbox commands...
45,174,323 UART: [rt]cmd =0x41545348, len=116
45,176,332 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,516 UART:
192,873 UART: Running Caliptra ROM ...
194,037 UART:
603,868 UART: [state] CFI Enabled
622,119 UART: [state] LifecycleState = Unprovisioned
624,123 UART: [state] DebugLocked = No
627,010 UART: [state] WD Timer not started. Device not locked for debugging
631,539 UART: [kat] SHA2-256
811,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
821,945 UART: [kat] ++
822,425 UART: [kat] sha1
834,654 UART: [kat] SHA2-256
837,391 UART: [kat] SHA2-384
843,386 UART: [kat] SHA2-512-ACC
845,756 UART: [kat] ECC-384
3,288,182 UART: [kat] HMAC-384Kdf
3,300,318 UART: [kat] LMS
3,776,793 UART: [kat] --
3,780,231 UART: [cold-reset] ++
3,781,881 UART: [fht] FHT @ 0x50003400
3,793,999 UART: [idev] ++
3,794,591 UART: [idev] CDI.KEYID = 6
3,795,549 UART: [idev] SUBJECT.KEYID = 7
3,796,797 UART: [idev] UDS.KEYID = 0
3,797,697 ready_for_fw is high
3,797,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,833 UART: [idev] Erasing UDS.KEYID = 0
6,272,228 UART: [idev] Sha1 KeyId Algorithm
6,296,314 UART: [idev] --
6,300,830 UART: [ldev] ++
6,301,415 UART: [ldev] CDI.KEYID = 6
6,302,337 UART: [ldev] SUBJECT.KEYID = 5
6,303,498 UART: [ldev] AUTHORITY.KEYID = 7
6,304,786 UART: [ldev] FE.KEYID = 1
6,313,654 UART: [ldev] Erasing FE.KEYID = 1
8,789,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,642 UART: [ldev] --
10,581,965 UART: [fwproc] Wait for Commands...
10,584,547 UART: [fwproc] Recv command 0x46574c44
10,586,596 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,635 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,462 >>> mbox cmd response: success
14,556,928 UART: [afmc] ++
14,557,540 UART: [afmc] CDI.KEYID = 6
14,558,458 UART: [afmc] SUBJECT.KEYID = 7
14,559,672 UART: [afmc] AUTHORITY.KEYID = 5
17,063,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,356 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,178 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,210 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,801 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,500 UART: [afmc] --
18,863,507 UART: [cold-reset] --
18,868,239 UART: [state] Locking Datavault
18,873,218 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,974 UART: [state] Locking ICCM
18,877,073 UART: [exit] Launching FMC @ 0x40000130
18,885,481 UART:
18,885,720 UART: Running Caliptra FMC ...
18,886,820 UART:
18,886,984 UART: [state] CFI Enabled
18,894,926 UART: [fht] FMC Alias Private Key: 7
20,660,917 UART: [art] Extend RT PCRs Done
20,662,139 UART: [art] Lock RT PCRs Done
20,664,088 UART: [art] Populate DV Done
20,669,566 UART: [fht] FMC Alias Private Key: 7
20,671,054 UART: [art] Derive CDI
20,671,818 UART: [art] Store in slot 0x4
20,714,631 UART: [art] Derive Key Pair
20,715,671 UART: [art] Store priv key in slot 0x5
23,142,673 UART: [art] Derive Key Pair - Done
23,155,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,818 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,320 UART: [art] PUB.X = B65870127F4848A1E2717D31BDED02338760BBFA6FC5870AAFFA53FE5D80182EC197456E59FBF1BC6E61B08BE3195DFA
24,870,628 UART: [art] PUB.Y = A7B72BBF09E449B66EAAA5CBB44F7E88B60EAD7E8BF79F148B48062D8B3963B18264B7CDAD7708BB1923B0F401815842
24,877,861 UART: [art] SIG.R = F613AA521F61D58304A019FB8244ED904566B8C96174141FD79A6E34671B31C27FEE4818A18AD7425E2175DBD310E80F
24,885,250 UART: [art] SIG.S = 5C9656A1CE834A0E7C0A490EC91850E970619B7F53B86FB2AE2ABB5D068FAB587DFC95F930B077F4D02E85121808AB7A
25,864,688 UART: Caliptra RT
25,865,416 UART: [state] CFI Enabled
25,998,684 UART: [rt] RT listening for mailbox commands...
26,001,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,427 UART: [rt]cmd =0x41544d4e, len=14344
30,151,836 >>> mbox cmd response data (8 bytes)
30,152,416 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,183,255 UART: [rt]cmd =0x41545348, len=116
30,185,507 >>> mbox cmd response data (12 bytes)
32,248,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,398,877 UART:
32,399,265 UART: Running Caliptra ROM ...
32,400,362 UART:
32,400,545 UART: [state] CFI Enabled
32,410,993 UART: [state] LifecycleState = Unprovisioned
32,412,892 UART: [state] DebugLocked = No
32,414,550 UART: [state] WD Timer not started. Device not locked for debugging
32,419,066 UART: [kat] SHA2-256
32,598,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,609,578 UART: [kat] ++
32,610,038 UART: [kat] sha1
32,621,092 UART: [kat] SHA2-256
32,623,785 UART: [kat] SHA2-384
32,630,257 UART: [kat] SHA2-512-ACC
32,632,618 UART: [kat] ECC-384
35,074,559 UART: [kat] HMAC-384Kdf
35,086,691 UART: [kat] LMS
35,563,190 UART: [kat] --
35,566,743 UART: [update-reset] ++
39,059,886 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,062,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,460,461 >>> mbox cmd response: success
39,460,887 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,461,319 UART: [update-reset] Copying MAN_2 To MAN_1
39,498,412 UART: [update-reset Success] --
39,503,654 UART: [state] Locking Datavault
39,507,887 UART: [state] Locking PCR0, PCR1 and PCR31
39,509,592 UART: [state] Locking ICCM
39,512,072 UART: [exit] Launching FMC @ 0x40000130
39,520,481 UART:
39,520,723 UART: Running Caliptra FMC ...
39,521,831 UART:
39,521,989 UART: [state] CFI Enabled
39,566,494 UART: [art] Extend RT PCRs Done
39,567,676 UART: [art] Lock RT PCRs Done
39,569,047 UART: [art] Populate DV Done
39,574,624 UART: [fht] FMC Alias Private Key: 7
39,576,165 UART: [art] Derive CDI
39,576,981 UART: [art] Store in slot 0x4
39,619,685 UART: [art] Derive Key Pair
39,620,690 UART: [art] Store priv key in slot 0x5
42,048,101 UART: [art] Derive Key Pair - Done
42,061,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,767,150 UART: [art] Erasing AUTHORITY.KEYID = 7
43,768,657 UART: [art] PUB.X = 97CB7B74D23BF26BBE017EEE75B2CF70C8AE727A6B3C0D37D83466C68F35CB0FD2256D25181F7BE841323CC0B7B506B8
43,775,961 UART: [art] PUB.Y = E723B13AF208C5125991E36A8390475621E8493918E37CF381BB64687CA0AF32F05875B8FC08197B2424AAEFDF525419
43,783,191 UART: [art] SIG.R = 26CFB7F587BC4032A200A3D2E9786AD82464C5BD0925B3227C24191A01BE8E521407E2B24A53C7DB769151D277634D43
43,790,531 UART: [art] SIG.S = C99DEF3D91DC1083B50251E932798014AD023CF3788D95748789EF740E2EBB8BB083EA46FBF16019879F91151DC63C24
44,769,321 UART: Caliptra RT
44,770,031 UART: [state] CFI Enabled
45,145,676 UART: [rt] RT listening for mailbox commands...
45,177,644 UART: [rt]cmd =0x41545348, len=116
45,179,813 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
3,783,328 ready_for_fw is high
3,783,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,126 >>> mbox cmd response: success
18,694,663 UART:
18,695,049 UART: Running Caliptra FMC ...
18,696,203 UART:
18,696,363 UART: [state] CFI Enabled
18,704,433 UART: [fht] FMC Alias Private Key: 7
20,470,517 UART: [art] Extend RT PCRs Done
20,471,739 UART: [art] Lock RT PCRs Done
20,473,314 UART: [art] Populate DV Done
20,478,822 UART: [fht] FMC Alias Private Key: 7
20,480,363 UART: [art] Derive CDI
20,481,180 UART: [art] Store in slot 0x4
20,524,209 UART: [art] Derive Key Pair
20,525,249 UART: [art] Store priv key in slot 0x5
22,952,543 UART: [art] Derive Key Pair - Done
22,965,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,732 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,236 UART: [art] PUB.X = 5060D0EEF4BF737F7C6C06940333ABCC8EC046FD5041FC8B9DE5254F59AE997B6666F08FF7973DEC93B45D86BA68A2C5
24,680,561 UART: [art] PUB.Y = 7553433B2F2BE1B17A6D661AF01C09FD6442DCAD541B560C967CFCB469298B2D77D913599F7D00FA25F82C3A0FA321B2
24,687,799 UART: [art] SIG.R = F82D75AD8A7B30AFC44A7A843B070C7962B7567002CD82EBB1AC80970AB9668E71A544B48AF01D2F324805435E16C0E0
24,695,201 UART: [art] SIG.S = 2B7ED97DD581016FC09FF3BF9DE07DA2EF29FE9E5D7C48A8AE712F47FDC91E7807F81277F76C0F962145FB9F8CFD97E0
25,674,330 UART: Caliptra RT
25,675,016 UART: [state] CFI Enabled
25,807,989 UART: [rt] RT listening for mailbox commands...
25,810,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,965,885 UART: [rt]cmd =0x41544d4e, len=14344
29,961,859 >>> mbox cmd response data (8 bytes)
29,962,435 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,993,113 UART: [rt]cmd =0x41545348, len=116
29,995,367 >>> mbox cmd response data (12 bytes)
32,051,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,282,087 >>> mbox cmd response: success
39,282,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
39,317,261 UART:
39,317,584 UART: Running Caliptra FMC ...
39,318,623 UART:
39,318,773 UART: [state] CFI Enabled
39,362,635 UART: [art] Extend RT PCRs Done
39,363,838 UART: [art] Lock RT PCRs Done
39,365,319 UART: [art] Populate DV Done
39,370,624 UART: [fht] FMC Alias Private Key: 7
39,372,114 UART: [art] Derive CDI
39,372,856 UART: [art] Store in slot 0x4
39,415,470 UART: [art] Derive Key Pair
39,416,477 UART: [art] Store priv key in slot 0x5
41,843,252 UART: [art] Derive Key Pair - Done
41,856,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,562,010 UART: [art] Erasing AUTHORITY.KEYID = 7
43,563,523 UART: [art] PUB.X = 6895577AB79EE1BE475D4288A92B4D8CC960FE1243206933C9E576123F417F91BC4F05635D292DAE9F829FE1039D4EAC
43,570,778 UART: [art] PUB.Y = FF12380465718FB523544BBC1000B2E5C56E647EB63AECC8CE6D6A9B49739CD740ED32EDEA193982B30D52CE04A5DFB6
43,578,016 UART: [art] SIG.R = 93DC4745AEBCD19B8138E405256E35EFB1231453C2F7B98545005C04C1319F7C3AED6668A53A21818B3C634AE3DECB44
43,585,418 UART: [art] SIG.S = 1927C4929B2498479502C74FFF5091C7574AEBF24EF1DA3F44DE77ACC349D8645251707FA1C48EB687E34D0B5E2804FA
44,564,777 UART: Caliptra RT
44,565,463 UART: [state] CFI Enabled
44,938,994 UART: [rt] RT listening for mailbox commands...
44,970,878 UART: [rt]cmd =0x41545348, len=116
44,972,988 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,055 UART:
192,421 UART: Running Caliptra ROM ...
193,620 UART:
193,776 UART: [state] CFI Enabled
263,176 UART: [state] LifecycleState = Unprovisioned
265,586 UART: [state] DebugLocked = No
267,544 UART: [state] WD Timer not started. Device not locked for debugging
271,502 UART: [kat] SHA2-256
461,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,105 UART: [kat] ++
472,579 UART: [kat] sha1
484,442 UART: [kat] SHA2-256
487,404 UART: [kat] SHA2-384
493,393 UART: [kat] SHA2-512-ACC
495,971 UART: [kat] ECC-384
2,946,963 UART: [kat] HMAC-384Kdf
2,973,127 UART: [kat] LMS
3,504,875 UART: [kat] --
3,508,159 UART: [cold-reset] ++
3,509,445 UART: [fht] FHT @ 0x50003400
3,520,633 UART: [idev] ++
3,521,340 UART: [idev] CDI.KEYID = 6
3,522,220 UART: [idev] SUBJECT.KEYID = 7
3,523,457 UART: [idev] UDS.KEYID = 0
3,524,354 ready_for_fw is high
3,524,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,690 UART: [idev] Erasing UDS.KEYID = 0
6,027,265 UART: [idev] Sha1 KeyId Algorithm
6,049,901 UART: [idev] --
6,054,427 UART: [ldev] ++
6,055,116 UART: [ldev] CDI.KEYID = 6
6,056,001 UART: [ldev] SUBJECT.KEYID = 5
6,057,105 UART: [ldev] AUTHORITY.KEYID = 7
6,058,389 UART: [ldev] FE.KEYID = 1
6,100,679 UART: [ldev] Erasing FE.KEYID = 1
8,605,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,275 UART: [ldev] --
10,413,077 UART: [fwproc] Wait for Commands...
10,415,656 UART: [fwproc] Recv command 0x46574c44
10,417,906 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,129 >>> mbox cmd response: success
14,681,001 UART: [afmc] ++
14,681,682 UART: [afmc] CDI.KEYID = 6
14,682,930 UART: [afmc] SUBJECT.KEYID = 7
14,684,477 UART: [afmc] AUTHORITY.KEYID = 5
17,217,010 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,102 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,070 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,120 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,315 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,179 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,261 UART: [afmc] --
19,014,999 UART: [cold-reset] --
19,020,459 UART: [state] Locking Datavault
19,025,290 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,495 UART: [state] Locking ICCM
19,030,512 UART: [exit] Launching FMC @ 0x40000130
19,039,185 UART:
19,039,427 UART: Running Caliptra FMC ...
19,040,529 UART:
19,040,689 UART: [state] CFI Enabled
19,097,373 UART: [fht] FMC Alias Private Key: 7
20,863,052 UART: [art] Extend RT PCRs Done
20,864,273 UART: [art] Lock RT PCRs Done
20,865,819 UART: [art] Populate DV Done
20,871,391 UART: [fht] FMC Alias Private Key: 7
20,872,925 UART: [art] Derive CDI
20,873,736 UART: [art] Store in slot 0x4
20,929,659 UART: [art] Derive Key Pair
20,930,725 UART: [art] Store priv key in slot 0x5
23,393,669 UART: [art] Derive Key Pair - Done
23,406,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,710 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,230 UART: [art] PUB.X = 0C3EFCC5D1CA282A47FC023C367521AFA07CC0815B1FA9E9A7FF8C74308D8247BD9141D4185B0041DD95E1DC2B8FA6EB
25,128,498 UART: [art] PUB.Y = 54A1D9F798B8B406DACA96E5AB99C3D5B082F2F400286557177954345BDB7EF87CFCB122D12D6D5BCF421908C7D2639F
25,135,781 UART: [art] SIG.R = D70220ACB5CDC7A8DC9D01497BF932BAC61B07F9F3B7ABD070B2F5EFD4BF8F2583C42E652CB57BFABDDB9E4E50B20945
25,143,189 UART: [art] SIG.S = 34AD78EE61DA0510ECAF1232ED495B647CF18E570584257E92B377A43F1BD8C7455D2C4C6CEF3565FA848CDF25C3068C
26,121,620 UART: Caliptra RT
26,122,328 UART: [state] CFI Enabled
26,301,709 UART: [rt] RT listening for mailbox commands...
26,304,332 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,459,752 UART: [rt]cmd =0x41544d4e, len=14344
30,455,801 >>> mbox cmd response data (8 bytes)
30,456,401 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,487,174 UART: [rt]cmd =0x41545348, len=116
30,489,125 >>> mbox cmd response data (12 bytes)
32,553,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,704,155 UART:
32,704,521 UART: Running Caliptra ROM ...
32,705,662 UART:
32,705,841 UART: [state] CFI Enabled
32,771,763 UART: [state] LifecycleState = Unprovisioned
32,773,811 UART: [state] DebugLocked = No
32,776,233 UART: [state] WD Timer not started. Device not locked for debugging
32,780,162 UART: [kat] SHA2-256
32,970,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,980,780 UART: [kat] ++
32,981,241 UART: [kat] sha1
32,992,454 UART: [kat] SHA2-256
32,995,481 UART: [kat] SHA2-384
33,002,661 UART: [kat] SHA2-512-ACC
33,005,260 UART: [kat] ECC-384
35,457,838 UART: [kat] HMAC-384Kdf
35,479,308 UART: [kat] LMS
36,010,874 UART: [kat] --
36,015,848 UART: [update-reset] ++
39,525,393 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,529,082 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,158,866 >>> mbox cmd response: success
40,163,561 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,164,152 UART: [update-reset] Copying MAN_2 To MAN_1
40,198,426 UART: [update-reset Success] --
40,201,363 UART: [state] Locking Datavault
40,206,526 UART: [state] Locking PCR0, PCR1 and PCR31
40,208,706 UART: [state] Locking ICCM
40,211,192 UART: [exit] Launching FMC @ 0x40000130
40,219,807 UART:
40,220,047 UART: Running Caliptra FMC ...
40,221,079 UART:
40,221,225 UART: [state] CFI Enabled
40,311,988 UART: [art] Extend RT PCRs Done
40,313,183 UART: [art] Lock RT PCRs Done
40,314,666 UART: [art] Populate DV Done
40,319,907 UART: [fht] FMC Alias Private Key: 7
40,321,620 UART: [art] Derive CDI
40,322,361 UART: [art] Store in slot 0x4
40,381,026 UART: [art] Derive Key Pair
40,382,075 UART: [art] Store priv key in slot 0x5
42,844,656 UART: [art] Derive Key Pair - Done
42,857,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,570,303 UART: [art] Erasing AUTHORITY.KEYID = 7
44,571,820 UART: [art] PUB.X = 98E48990564483DB6C9304B7FE3EC6808FD5F5CC8B7C1DC91C7649167FBDEE09B0D74B3B99BD826136427E04CFBC2686
44,579,082 UART: [art] PUB.Y = 27F5BF6C917B518B7334523B6683386E49CD84EA477B627C53575AE00B94C858AF6CCFA85E6C9B82A2B4F713BA993E24
44,586,378 UART: [art] SIG.R = BCEDFF8BFD814B83494F5E401B02F76223B20DB90C46E8E7C3B3AC91E0726A3064CDD2BD259D58A7106B495785936C00
44,593,715 UART: [art] SIG.S = A12E178ED4574134A457F845F7B51B51D174424D15B3B3EF973543CD97FF02A2B07D117ACE29B0FC33341B371386130B
45,572,511 UART: Caliptra RT
45,573,223 UART: [state] CFI Enabled
45,994,100 UART: [rt] RT listening for mailbox commands...
46,026,008 UART: [rt]cmd =0x41545348, len=116
46,028,103 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,417,457 ready_for_fw is high
3,417,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,900 >>> mbox cmd response: success
19,112,276 UART:
19,112,656 UART: Running Caliptra FMC ...
19,113,767 UART:
19,113,918 UART: [state] CFI Enabled
19,179,955 UART: [fht] FMC Alias Private Key: 7
20,946,910 UART: [art] Extend RT PCRs Done
20,948,140 UART: [art] Lock RT PCRs Done
20,949,681 UART: [art] Populate DV Done
20,955,302 UART: [fht] FMC Alias Private Key: 7
20,956,948 UART: [art] Derive CDI
20,957,684 UART: [art] Store in slot 0x4
21,013,257 UART: [art] Derive Key Pair
21,014,258 UART: [art] Store priv key in slot 0x5
23,477,119 UART: [art] Derive Key Pair - Done
23,490,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,412 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,922 UART: [art] PUB.X = CAB82DA1D7E1A10D57F164D53A15B645092D5528FD224BFF4A84FDD48C41587DEDFEFAE3A79695F8819311CF32B437F5
25,212,205 UART: [art] PUB.Y = B9E10DA8DB3094AD993FADBE677CEA315E0D824B5A20226FCFE1F835C0CF8B838D5D0C8F5AD5044198EFE664E09E249C
25,219,451 UART: [art] SIG.R = 9E9309C2C72528B02DA0458E159C0D489DB37A2AD6BB21AB9C52F243AE8B8C655B3EDC2E0F8C5D2319E857C4B172D33F
25,226,888 UART: [art] SIG.S = B769214546E65A06C5A4603F6B7DCDF2937E4BDBA7EC349E813AC3782A0358556C881CB507BFBCF75274032A5484D402
26,205,847 UART: Caliptra RT
26,206,559 UART: [state] CFI Enabled
26,388,055 UART: [rt] RT listening for mailbox commands...
26,390,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,545,807 UART: [rt]cmd =0x41544d4e, len=14344
30,541,785 >>> mbox cmd response data (8 bytes)
30,542,345 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,573,236 UART: [rt]cmd =0x41545348, len=116
30,575,493 >>> mbox cmd response data (12 bytes)
32,638,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,546,818 >>> mbox cmd response: success
40,547,526 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,581,742 UART:
40,582,036 UART: Running Caliptra FMC ...
40,583,122 UART:
40,583,275 UART: [state] CFI Enabled
40,677,319 UART: [art] Extend RT PCRs Done
40,678,620 UART: [art] Lock RT PCRs Done
40,680,031 UART: [art] Populate DV Done
40,685,822 UART: [fht] FMC Alias Private Key: 7
40,687,374 UART: [art] Derive CDI
40,688,192 UART: [art] Store in slot 0x4
40,746,967 UART: [art] Derive Key Pair
40,748,043 UART: [art] Store priv key in slot 0x5
43,210,805 UART: [art] Derive Key Pair - Done
43,223,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,937,006 UART: [art] Erasing AUTHORITY.KEYID = 7
44,938,683 UART: [art] PUB.X = 2E6B6F4A29AFAE55F7BCE406714A38AFE7CFA23271823044701B6B7232A906CF38391F365CB95B8B28CC2F5311F0FA57
44,945,769 UART: [art] PUB.Y = 4A009368F391B7BF2E15993D00CB638D0D05E836490519900E29366E599F86263424FF347B009F6B2275B29CD00FFEDF
44,952,951 UART: [art] SIG.R = C63E1A6F8DF66DE514909F5A7B0F80B7427DB69D015D39B62EF377A630578AFD245623FF32BCFCE0F87F3FCD10822D43
44,960,335 UART: [art] SIG.S = C714CBD96A154F961F8ACED2387B04763C43E7DAC445A9061B542A4E6AE1DD1A607A48E7F3B9B60800C4D7486C230868
45,939,683 UART: Caliptra RT
45,940,387 UART: [state] CFI Enabled
46,360,668 UART: [rt] RT listening for mailbox commands...
46,392,403 UART: [rt]cmd =0x41545348, len=116
46,394,405 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,491 UART:
192,857 UART: Running Caliptra ROM ...
194,024 UART:
603,563 UART: [state] CFI Enabled
613,983 UART: [state] LifecycleState = Unprovisioned
616,365 UART: [state] DebugLocked = No
618,391 UART: [state] WD Timer not started. Device not locked for debugging
622,440 UART: [kat] SHA2-256
812,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,109 UART: [kat] ++
823,635 UART: [kat] sha1
835,504 UART: [kat] SHA2-256
838,516 UART: [kat] SHA2-384
843,734 UART: [kat] SHA2-512-ACC
846,330 UART: [kat] ECC-384
3,289,296 UART: [kat] HMAC-384Kdf
3,301,461 UART: [kat] LMS
3,833,259 UART: [kat] --
3,839,317 UART: [cold-reset] ++
3,841,393 UART: [fht] FHT @ 0x50003400
3,853,721 UART: [idev] ++
3,854,363 UART: [idev] CDI.KEYID = 6
3,855,398 UART: [idev] SUBJECT.KEYID = 7
3,856,502 UART: [idev] UDS.KEYID = 0
3,857,453 ready_for_fw is high
3,857,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,527 UART: [idev] Erasing UDS.KEYID = 0
6,333,219 UART: [idev] Sha1 KeyId Algorithm
6,355,846 UART: [idev] --
6,360,525 UART: [ldev] ++
6,361,218 UART: [ldev] CDI.KEYID = 6
6,362,131 UART: [ldev] SUBJECT.KEYID = 5
6,363,295 UART: [ldev] AUTHORITY.KEYID = 7
6,364,529 UART: [ldev] FE.KEYID = 1
6,376,744 UART: [ldev] Erasing FE.KEYID = 1
8,856,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,075 UART: [ldev] --
10,646,752 UART: [fwproc] Wait for Commands...
10,648,524 UART: [fwproc] Recv command 0x46574c44
10,650,832 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,139 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,770 >>> mbox cmd response: success
14,918,440 UART: [afmc] ++
14,919,150 UART: [afmc] CDI.KEYID = 6
14,920,408 UART: [afmc] SUBJECT.KEYID = 7
14,921,860 UART: [afmc] AUTHORITY.KEYID = 5
17,427,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,671 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,600 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,879 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,751 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,401 UART: [afmc] --
19,223,582 UART: [cold-reset] --
19,227,124 UART: [state] Locking Datavault
19,232,242 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,414 UART: [state] Locking ICCM
19,235,823 UART: [exit] Launching FMC @ 0x40000130
19,244,466 UART:
19,244,706 UART: Running Caliptra FMC ...
19,245,811 UART:
19,245,976 UART: [state] CFI Enabled
19,254,188 UART: [fht] FMC Alias Private Key: 7
21,020,581 UART: [art] Extend RT PCRs Done
21,021,815 UART: [art] Lock RT PCRs Done
21,023,393 UART: [art] Populate DV Done
21,028,725 UART: [fht] FMC Alias Private Key: 7
21,030,218 UART: [art] Derive CDI
21,031,039 UART: [art] Store in slot 0x4
21,073,860 UART: [art] Derive Key Pair
21,074,910 UART: [art] Store priv key in slot 0x5
23,501,849 UART: [art] Derive Key Pair - Done
23,514,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,127 UART: [art] PUB.X = 7B813FAD6972DE446C52569A02C9EFA95B6877B733D9AFF7459BD8C7D79FD8F891704C3AA854E22E61351A3043F7FD63
25,229,800 UART: [art] PUB.Y = 2081351A0BE32A9C56F79290FC184BB5F57C5BB61FDA580BAB25C6DF46CBF5B494D6D7D69E9F3B4D09559846383DE265
25,237,071 UART: [art] SIG.R = F4E3D36CA9615ACC3A498F9706CCFFA79ACB2BBA0BBD66083EFDCC9595CC16E126C71277924A68160D0B74F1F1C75670
25,244,492 UART: [art] SIG.S = F8D44C1868D6D82A742BE75C43B7FA75FD51B8D401526467E6E82C481A4B1F7117D27A86335A19E6D2464ACEE22C9A86
26,223,028 UART: Caliptra RT
26,223,755 UART: [state] CFI Enabled
26,355,749 UART: [rt] RT listening for mailbox commands...
26,358,167 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,513,644 UART: [rt]cmd =0x41544d4e, len=14344
30,509,280 >>> mbox cmd response data (8 bytes)
30,509,912 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,540,813 UART: [rt]cmd =0x41545348, len=116
30,542,697 >>> mbox cmd response data (12 bytes)
32,608,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,759,760 UART:
32,760,133 UART: Running Caliptra ROM ...
32,761,232 UART:
32,761,402 UART: [state] CFI Enabled
32,777,310 UART: [state] LifecycleState = Unprovisioned
32,779,228 UART: [state] DebugLocked = No
32,781,423 UART: [state] WD Timer not started. Device not locked for debugging
32,785,608 UART: [kat] SHA2-256
32,975,489 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
32,986,263 UART: [kat] ++
32,986,751 UART: [kat] sha1
32,997,861 UART: [kat] SHA2-256
33,000,849 UART: [kat] SHA2-384
33,008,262 UART: [kat] SHA2-512-ACC
33,010,848 UART: [kat] ECC-384
35,454,076 UART: [kat] HMAC-384Kdf
35,468,167 UART: [kat] LMS
35,999,809 UART: [kat] --
36,004,623 UART: [update-reset] ++
39,507,535 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,510,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,140,418 >>> mbox cmd response: success
40,145,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,146,277 UART: [update-reset] Copying MAN_2 To MAN_1
40,178,540 UART: [update-reset Success] --
40,182,426 UART: [state] Locking Datavault
40,185,139 UART: [state] Locking PCR0, PCR1 and PCR31
40,187,296 UART: [state] Locking ICCM
40,190,028 UART: [exit] Launching FMC @ 0x40000130
40,198,715 UART:
40,198,951 UART: Running Caliptra FMC ...
40,199,977 UART:
40,200,128 UART: [state] CFI Enabled
40,244,325 UART: [art] Extend RT PCRs Done
40,245,476 UART: [art] Lock RT PCRs Done
40,246,848 UART: [art] Populate DV Done
40,252,158 UART: [fht] FMC Alias Private Key: 7
40,253,912 UART: [art] Derive CDI
40,254,649 UART: [art] Store in slot 0x4
40,297,224 UART: [art] Derive Key Pair
40,298,273 UART: [art] Store priv key in slot 0x5
42,724,937 UART: [art] Derive Key Pair - Done
42,737,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,444,394 UART: [art] Erasing AUTHORITY.KEYID = 7
44,446,599 UART: [art] PUB.X = D6CF7920AFB9D8AACB7CE0BC248B61617A0FE79F2FAE17F9BEC14D7CC509355691E9A9765606A2A4224DF8A95E190561
44,453,241 UART: [art] PUB.Y = 712A8EEC434810DE5A1EA31DD70028BE0F4AF8233F4BE3D02BFF68B1EA6D51D884D5D80628C5CDEDDE2CBE383F594CC2
44,460,506 UART: [art] SIG.R = 06A6A571A6977753E8C83CAACDBB785C9BA54167A3E9103CED7876A4B2FE492460BFE7CDCD1B440BAE2631C01924E274
44,467,881 UART: [art] SIG.S = 184352B91817ADB100412A9329DC752646AD2855E1F10A1AC56EA849E43035949C255DEFA148159C06DD6B59C48AD1EF
45,446,650 UART: Caliptra RT
45,447,802 UART: [state] CFI Enabled
45,821,663 UART: [rt] RT listening for mailbox commands...
45,853,646 UART: [rt]cmd =0x41545348, len=116
45,855,742 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
3,752,789 ready_for_fw is high
3,753,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,028,643 >>> mbox cmd response: success
19,283,493 UART:
19,284,305 UART: Running Caliptra FMC ...
19,285,429 UART:
19,285,590 UART: [state] CFI Enabled
19,293,165 UART: [fht] FMC Alias Private Key: 7
21,059,269 UART: [art] Extend RT PCRs Done
21,060,507 UART: [art] Lock RT PCRs Done
21,062,040 UART: [art] Populate DV Done
21,067,564 UART: [fht] FMC Alias Private Key: 7
21,069,056 UART: [art] Derive CDI
21,069,831 UART: [art] Store in slot 0x4
21,113,073 UART: [art] Derive Key Pair
21,114,080 UART: [art] Store priv key in slot 0x5
23,540,815 UART: [art] Derive Key Pair - Done
23,553,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,259,923 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,428 UART: [art] PUB.X = 2AF5A915608C0CB03FAE8F6E654BEF7DF9B7D0B2FA12F64BD6F2E1077DCB93EE822CDF31A2BE8E5A61384B1846A48CC3
25,268,749 UART: [art] PUB.Y = 7FBFDB9A9017AC8B60F65C93AA4D46F5A974D356A75BF1C7BD89C30575F3FC946EF2C61DFFD92D71BB450568F2080081
25,276,027 UART: [art] SIG.R = AAC446ECD2B50A79D992A178D3F82734A72A8C83A7082466DDCE14C5D3BFEB376551C151BD099385A43D264C0F126BA8
25,283,402 UART: [art] SIG.S = E277669C11965F6E271ED0842DCDF4242E0E6B2E85DB5344E02E8F7C8D228A468D55FA32F4A62D439BDA47D94D70934E
26,262,598 UART: Caliptra RT
26,263,320 UART: [state] CFI Enabled
26,396,153 UART: [rt] RT listening for mailbox commands...
26,398,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,554,100 UART: [rt]cmd =0x41544d4e, len=14344
30,549,117 >>> mbox cmd response data (8 bytes)
30,549,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,580,565 UART: [rt]cmd =0x41545348, len=116
30,582,419 >>> mbox cmd response data (12 bytes)
32,650,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,471,243 >>> mbox cmd response: success
40,471,867 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
40,504,301 UART:
40,504,626 UART: Running Caliptra FMC ...
40,505,755 UART:
40,505,924 UART: [state] CFI Enabled
40,549,998 UART: [art] Extend RT PCRs Done
40,551,245 UART: [art] Lock RT PCRs Done
40,552,593 UART: [art] Populate DV Done
40,557,951 UART: [fht] FMC Alias Private Key: 7
40,559,662 UART: [art] Derive CDI
40,560,483 UART: [art] Store in slot 0x4
40,603,319 UART: [art] Derive Key Pair
40,604,367 UART: [art] Store priv key in slot 0x5
43,031,069 UART: [art] Derive Key Pair - Done
43,043,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,749,941 UART: [art] Erasing AUTHORITY.KEYID = 7
44,751,474 UART: [art] PUB.X = 0DC358D094E4F65C011C91D646528D5CED0C78091A0D5CE41078FEFE520C16FE4AFB8874868FD4766E2177A46F17A88F
44,758,695 UART: [art] PUB.Y = 6B7C6EF66C403A63EA2167114CFE10B3278A2C806151BD65116B71DA4E8D50008CD5B5E5FBD690BBA69A93E9174F294B
44,765,949 UART: [art] SIG.R = 1F3ACA16AE1E5EF2F8C3D03B29246E5433F2D96B337C6AB56AC687F5559073237281C69C269C4852E629D5CF86CFC454
44,773,317 UART: [art] SIG.S = EE991C48545A2760D6E711AFCA0AB900BC6BFD290A444CB49FBBA7999ECAC28F525CBCCA655FD60DB5AF9FBBF52A2F3E
45,752,164 UART: Caliptra RT
45,752,868 UART: [state] CFI Enabled
46,123,428 UART: [rt] RT listening for mailbox commands...
46,155,461 UART: [rt]cmd =0x41545348, len=116
46,157,550 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,986 UART: [state] LifecycleState = Unprovisioned
85,641 UART: [state] DebugLocked = No
86,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,731 UART: [kat] SHA2-256
881,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,777 UART: [kat] ++
885,929 UART: [kat] sha1
890,169 UART: [kat] SHA2-256
892,107 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,234 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,841 UART: [cold-reset] ++
1,476,401 UART: [fht] Storing FHT @ 0x50003400
1,479,182 UART: [idev] ++
1,479,350 UART: [idev] CDI.KEYID = 6
1,479,710 UART: [idev] SUBJECT.KEYID = 7
1,480,134 UART: [idev] UDS.KEYID = 0
1,480,479 ready_for_fw is high
1,480,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,505,340 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,092 UART: [idev] --
1,515,127 UART: [ldev] ++
1,515,295 UART: [ldev] CDI.KEYID = 6
1,515,658 UART: [ldev] SUBJECT.KEYID = 5
1,516,084 UART: [ldev] AUTHORITY.KEYID = 7
1,516,547 UART: [ldev] FE.KEYID = 1
1,521,783 UART: [ldev] Erasing FE.KEYID = 1
1,546,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,524 UART: [ldev] --
1,585,789 UART: [fwproc] Waiting for Commands...
1,586,422 UART: [fwproc] Received command 0x46574c44
1,587,213 UART: [fwproc] Received Image of size 118548 bytes
2,932,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,917 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,135 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,392 >>> mbox cmd response: success
3,132,534 UART: [afmc] ++
3,132,702 UART: [afmc] CDI.KEYID = 6
3,133,064 UART: [afmc] SUBJECT.KEYID = 7
3,133,489 UART: [afmc] AUTHORITY.KEYID = 5
3,168,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,344 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,027 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,047 UART: [afmc] --
3,212,053 UART: [cold-reset] --
3,212,879 UART: [state] Locking Datavault
3,214,042 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,646 UART: [state] Locking ICCM
3,215,134 UART: [exit] Launching FMC @ 0x40000130
3,220,464 UART:
3,220,480 UART: Running Caliptra FMC ...
3,220,888 UART:
3,220,942 UART: [state] CFI Enabled
3,231,590 UART: [fht] FMC Alias Private Key: 7
3,350,742 UART: [art] Extend RT PCRs Done
3,351,170 UART: [art] Lock RT PCRs Done
3,352,452 UART: [art] Populate DV Done
3,360,757 UART: [fht] FMC Alias Private Key: 7
3,361,689 UART: [art] Derive CDI
3,361,969 UART: [art] Store in slot 0x4
3,447,737 UART: [art] Derive Key Pair
3,448,097 UART: [art] Store priv key in slot 0x5
3,461,030 UART: [art] Derive Key Pair - Done
3,475,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,064 UART: [art] PUB.X = 6F4414355DFB69014503B8088976DF70902E878922D493FCC6FF793773E788029578A3B61C4C86FE0746BFC936FFA908
3,498,808 UART: [art] PUB.Y = 66B62ED51857EAC1902EDDD56CBA37513618088FF9E9EE5A1A83FCF5B9E5016AD91FF9677F55848154853BCAD3AF0A69
3,505,761 UART: [art] SIG.R = 88534F948746CB2280C83D45989CFC20A307C2511D9A49C62E2FC81664132956AECAD49E7F1CB9C6395C14FDB754C382
3,512,528 UART: [art] SIG.S = DB6AAF4819EAE21FD9B6C964ACD2F5FB37E07F7D8AADA8060C5C9335BC7A6219B736C40071501191641FFEACA7EBE78D
3,535,772 UART: Caliptra RT
3,536,023 UART: [state] CFI Enabled
3,656,774 UART: [rt] RT listening for mailbox commands...
3,657,444 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,846 UART: [rt]cmd =0x41544d4e, len=14344
4,090,628 >>> mbox cmd response data (8 bytes)
4,090,629 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,660 UART: [rt]cmd =0x41545348, len=116
4,122,347 >>> mbox cmd response data (12 bytes)
4,122,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,954 UART:
4,122,970 UART: Running Caliptra ROM ...
4,123,378 UART:
4,123,432 UART: [state] CFI Enabled
4,126,018 UART: [state] LifecycleState = Unprovisioned
4,126,673 UART: [state] DebugLocked = No
4,127,161 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,128,750 UART: [kat] SHA2-256
4,922,681 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,926,796 UART: [kat] ++
4,926,948 UART: [kat] sha1
4,931,242 UART: [kat] SHA2-256
4,933,180 UART: [kat] SHA2-384
4,936,011 UART: [kat] SHA2-512-ACC
4,937,911 UART: [kat] ECC-384
4,943,294 UART: [kat] HMAC-384Kdf
4,947,742 UART: [kat] LMS
5,515,938 UART: [kat] --
5,516,765 UART: [update-reset] ++
6,898,377 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,899,535 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,054,802 >>> mbox cmd response: success
7,054,802 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,055,061 UART: [update-reset] Copying MAN_2 To MAN_1
7,063,075 UART: [update-reset Success] --
7,064,022 UART: [state] Locking Datavault
7,064,792 UART: [state] Locking PCR0, PCR1 and PCR31
7,065,396 UART: [state] Locking ICCM
7,065,870 UART: [exit] Launching FMC @ 0x40000130
7,071,200 UART:
7,071,216 UART: Running Caliptra FMC ...
7,071,624 UART:
7,071,678 UART: [state] CFI Enabled
7,160,813 UART: [art] Extend RT PCRs Done
7,161,241 UART: [art] Lock RT PCRs Done
7,162,454 UART: [art] Populate DV Done
7,170,607 UART: [fht] FMC Alias Private Key: 7
7,171,655 UART: [art] Derive CDI
7,171,935 UART: [art] Store in slot 0x4
7,257,321 UART: [art] Derive Key Pair
7,257,681 UART: [art] Store priv key in slot 0x5
7,270,904 UART: [art] Derive Key Pair - Done
7,285,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,301,124 UART: [art] Erasing AUTHORITY.KEYID = 7
7,301,889 UART: [art] PUB.X = 5E6DFBCEDA276EA14B1127E0046420B9026D19C5F0FDA61E71A7CC1D67CCC80DE9F9BF720ED82955A4894BE2B81863CC
7,308,665 UART: [art] PUB.Y = 286C3C95B0A8EEF93F38055CF04BAE359BDF9D691FC1F531E1C84DAEFB14EFD0087FBDEA4E19766ADE7DA37F1AF50032
7,315,613 UART: [art] SIG.R = 62BD76AB1A4242E2D1BF2C7CCCEB33C9A22B0387FE50FD3C85566DC58B5E5307057A7CA0219018357F8EDBB990C50BD1
7,322,385 UART: [art] SIG.S = 6C3A3424102F8245995F1ECF4A4AAC6465D3A2ECD3FE9DBFD7D569395B3D4E63E1B44D4464FB6C436E8306CEE2D30ABD
7,346,315 UART: Caliptra RT
7,346,566 UART: [state] CFI Enabled
7,712,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,743,695 UART: [rt]cmd =0x41545348, len=116
7,745,306 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,427 ready_for_fw is high
1,362,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,320 >>> mbox cmd response: success
3,041,965 UART:
3,041,981 UART: Running Caliptra FMC ...
3,042,389 UART:
3,042,443 UART: [state] CFI Enabled
3,053,023 UART: [fht] FMC Alias Private Key: 7
3,172,161 UART: [art] Extend RT PCRs Done
3,172,589 UART: [art] Lock RT PCRs Done
3,173,845 UART: [art] Populate DV Done
3,182,006 UART: [fht] FMC Alias Private Key: 7
3,183,124 UART: [art] Derive CDI
3,183,404 UART: [art] Store in slot 0x4
3,269,298 UART: [art] Derive Key Pair
3,269,658 UART: [art] Store priv key in slot 0x5
3,282,751 UART: [art] Derive Key Pair - Done
3,297,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,809 UART: [art] PUB.X = 2F64068ADD6B3CFF5C84BE00AB3873830B25E6036585F3475FD90DDCD7259167C80DE6C87A69A7015124BD0151960B6E
3,320,535 UART: [art] PUB.Y = 8B6E8E9D1492555FFE2343C518A73D5D7240B09AAAE88B260AB36F1499F5B4B69B085B96DC4B8186422449BF88ECB16C
3,327,485 UART: [art] SIG.R = 81EFFD97E3B696889D33AA38AA5B08A82D718EAF2B586EC30D21759DADADEF005FB2B1478F8064C49467475098061856
3,334,228 UART: [art] SIG.S = BAC940DB4B6DC8DAE66B564AF8333F3868C4F0523AA432B9C24F7DEB67C5EAFCB08FCFF713055FAC40F4A2D45E8036FB
3,358,397 UART: Caliptra RT
3,358,648 UART: [state] CFI Enabled
3,478,705 UART: [rt] RT listening for mailbox commands...
3,479,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,125 UART: [rt]cmd =0x41544d4e, len=14344
3,911,425 >>> mbox cmd response data (8 bytes)
3,911,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,635 UART: [rt]cmd =0x41545348, len=116
3,943,342 >>> mbox cmd response data (12 bytes)
3,943,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,759,143 >>> mbox cmd response: success
6,759,143 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,772,407 UART:
6,772,423 UART: Running Caliptra FMC ...
6,772,831 UART:
6,772,885 UART: [state] CFI Enabled
6,861,628 UART: [art] Extend RT PCRs Done
6,862,056 UART: [art] Lock RT PCRs Done
6,863,291 UART: [art] Populate DV Done
6,871,432 UART: [fht] FMC Alias Private Key: 7
6,872,526 UART: [art] Derive CDI
6,872,806 UART: [art] Store in slot 0x4
6,958,398 UART: [art] Derive Key Pair
6,958,758 UART: [art] Store priv key in slot 0x5
6,972,129 UART: [art] Derive Key Pair - Done
6,986,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,002,176 UART: [art] Erasing AUTHORITY.KEYID = 7
7,002,941 UART: [art] PUB.X = D727B9843A6FA3E9CD0AF548D90BCB168BECB3CB6BEA9F91C563A22859449451572187A1A9BEFC4C4C58AA6E9FDBFCCB
7,009,731 UART: [art] PUB.Y = 0D14B903BE6AFBCE60EE393FBC0532CBB3B6D73D0E4E27034193FBDCF213DAFBE8746BFA66446D7510630FA5274F7C3B
7,016,683 UART: [art] SIG.R = B5D26E0C20AA916C785A86BB5FF7629F13950DD4F32556318491C3794DB409C693B9FD3917FEB4DCBCC5F9382EEB9527
7,023,452 UART: [art] SIG.S = D07189A875BFF8D3BE5CCA430C9A073841CBDD59E4383E4766F842372E254003610CD2F02D9E8BF3EF6D3E795AB49637
7,047,294 UART: Caliptra RT
7,047,545 UART: [state] CFI Enabled
7,411,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,442,780 UART: [rt]cmd =0x41545348, len=116
7,444,683 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Unprovisioned
86,512 UART: [state] DebugLocked = No
86,998 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
890,946 UART: [kat] SHA2-256
892,884 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
903,169 UART: [kat] HMAC-384Kdf
907,699 UART: [kat] LMS
1,475,895 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,120 UART: [fht] Storing FHT @ 0x50003400
1,479,881 UART: [idev] ++
1,480,049 UART: [idev] CDI.KEYID = 6
1,480,409 UART: [idev] SUBJECT.KEYID = 7
1,480,833 UART: [idev] UDS.KEYID = 0
1,481,178 ready_for_fw is high
1,481,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,331 UART: [idev] Erasing UDS.KEYID = 0
1,505,957 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,713 UART: [idev] --
1,515,876 UART: [ldev] ++
1,516,044 UART: [ldev] CDI.KEYID = 6
1,516,407 UART: [ldev] SUBJECT.KEYID = 5
1,516,833 UART: [ldev] AUTHORITY.KEYID = 7
1,517,296 UART: [ldev] FE.KEYID = 1
1,522,556 UART: [ldev] Erasing FE.KEYID = 1
1,548,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,071 UART: [ldev] --
1,587,536 UART: [fwproc] Waiting for Commands...
1,588,261 UART: [fwproc] Received command 0x46574c44
1,589,052 UART: [fwproc] Received Image of size 118548 bytes
2,934,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,806 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,257 >>> mbox cmd response: success
3,133,489 UART: [afmc] ++
3,133,657 UART: [afmc] CDI.KEYID = 6
3,134,019 UART: [afmc] SUBJECT.KEYID = 7
3,134,444 UART: [afmc] AUTHORITY.KEYID = 5
3,169,419 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,383 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,755 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,438 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,276 UART: [afmc] --
3,212,290 UART: [cold-reset] --
3,213,016 UART: [state] Locking Datavault
3,214,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,831 UART: [state] Locking ICCM
3,215,359 UART: [exit] Launching FMC @ 0x40000130
3,220,689 UART:
3,220,705 UART: Running Caliptra FMC ...
3,221,113 UART:
3,221,256 UART: [state] CFI Enabled
3,232,044 UART: [fht] FMC Alias Private Key: 7
3,351,190 UART: [art] Extend RT PCRs Done
3,351,618 UART: [art] Lock RT PCRs Done
3,353,120 UART: [art] Populate DV Done
3,361,245 UART: [fht] FMC Alias Private Key: 7
3,362,235 UART: [art] Derive CDI
3,362,515 UART: [art] Store in slot 0x4
3,448,293 UART: [art] Derive Key Pair
3,448,653 UART: [art] Store priv key in slot 0x5
3,461,884 UART: [art] Derive Key Pair - Done
3,476,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,132 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,897 UART: [art] PUB.X = A787D836093BE85A2D70ABD551AF01F328077576807F1196AA319D9F37A0DFF80ECF277A8828CEADF04917C6333B83D3
3,500,659 UART: [art] PUB.Y = F3A7EBF1222476CABE104FDAED2ABB26A785CE420E8F5B89F66893DC91296928AE1D5AD47A651BA0C7DBBFB3B30F0B9F
3,507,626 UART: [art] SIG.R = C782EF4C82C15C02FD3E45CB40AB9917E5B3862CE4DD9B5C50C47394A559F61610DBFE8B705D7FAADC9E5587E25EC2D0
3,514,411 UART: [art] SIG.S = C28FB036F05E359F34774796540D5F66C824CD01AFC5976632234C8D9DBE78A2101A289DA62462F80D82C99A709BC983
3,538,176 UART: Caliptra RT
3,538,519 UART: [state] CFI Enabled
3,659,014 UART: [rt] RT listening for mailbox commands...
3,659,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,988 UART: [rt]cmd =0x41544d4e, len=14344
4,092,824 >>> mbox cmd response data (8 bytes)
4,092,825 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,074 UART: [rt]cmd =0x41545348, len=116
4,124,435 >>> mbox cmd response data (12 bytes)
4,124,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,125,198 UART:
4,125,214 UART: Running Caliptra ROM ...
4,125,622 UART:
4,125,763 UART: [state] CFI Enabled
4,128,029 UART: [state] LifecycleState = Unprovisioned
4,128,684 UART: [state] DebugLocked = No
4,129,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,130,669 UART: [kat] SHA2-256
4,924,600 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,928,715 UART: [kat] ++
4,928,867 UART: [kat] sha1
4,933,255 UART: [kat] SHA2-256
4,935,193 UART: [kat] SHA2-384
4,937,902 UART: [kat] SHA2-512-ACC
4,939,802 UART: [kat] ECC-384
4,945,743 UART: [kat] HMAC-384Kdf
4,950,395 UART: [kat] LMS
5,518,591 UART: [kat] --
5,519,678 UART: [update-reset] ++
6,900,248 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,901,378 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,056,645 >>> mbox cmd response: success
7,056,645 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
7,056,896 UART: [update-reset] Copying MAN_2 To MAN_1
7,064,910 UART: [update-reset Success] --
7,065,791 UART: [state] Locking Datavault
7,066,447 UART: [state] Locking PCR0, PCR1 and PCR31
7,067,051 UART: [state] Locking ICCM
7,067,671 UART: [exit] Launching FMC @ 0x40000130
7,073,001 UART:
7,073,017 UART: Running Caliptra FMC ...
7,073,425 UART:
7,073,568 UART: [state] CFI Enabled
7,162,935 UART: [art] Extend RT PCRs Done
7,163,363 UART: [art] Lock RT PCRs Done
7,164,402 UART: [art] Populate DV Done
7,172,875 UART: [fht] FMC Alias Private Key: 7
7,173,817 UART: [art] Derive CDI
7,174,097 UART: [art] Store in slot 0x4
7,259,699 UART: [art] Derive Key Pair
7,260,059 UART: [art] Store priv key in slot 0x5
7,272,344 UART: [art] Derive Key Pair - Done
7,286,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,302,174 UART: [art] Erasing AUTHORITY.KEYID = 7
7,302,939 UART: [art] PUB.X = 0B730B49E953F03C0567C45B94095BBA4C6CAB987493709949F8F58FD038BD539B12BE8BA6B9A17E37D7FCBD96E7800D
7,309,702 UART: [art] PUB.Y = E6C7B594B7B9EF657F16E0BBA5AFD4FB24CEE4649841D428EC808079A3F88D2B23D82F58BEC0F23954B6A084253A35A0
7,316,664 UART: [art] SIG.R = 6877F6A81223237EC3DF9560904BE5DF642F31320B6EFCD88B732B1A21A8A2F1523C8A5B48B1857F84211B6155E32605
7,323,424 UART: [art] SIG.S = 57BDC8B24E0BB80CC444E65EA04C67887831E8DFFE12FEFA4C848DFBB419C7A298E57DBC7FBA5ACC709E3AE8EE571710
7,347,212 UART: Caliptra RT
7,347,555 UART: [state] CFI Enabled
7,712,261 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,743,320 UART: [rt]cmd =0x41545348, len=116
7,745,111 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,768 ready_for_fw is high
1,362,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,631 >>> mbox cmd response: success
3,042,708 UART:
3,042,724 UART: Running Caliptra FMC ...
3,043,132 UART:
3,043,275 UART: [state] CFI Enabled
3,053,687 UART: [fht] FMC Alias Private Key: 7
3,172,751 UART: [art] Extend RT PCRs Done
3,173,179 UART: [art] Lock RT PCRs Done
3,174,705 UART: [art] Populate DV Done
3,182,882 UART: [fht] FMC Alias Private Key: 7
3,183,818 UART: [art] Derive CDI
3,184,098 UART: [art] Store in slot 0x4
3,269,540 UART: [art] Derive Key Pair
3,269,900 UART: [art] Store priv key in slot 0x5
3,283,551 UART: [art] Derive Key Pair - Done
3,298,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,549 UART: [art] PUB.X = B4CE7CD5809213E6E177E65F8565D33DD354D3D3E166706A2D0EC94BDBEB630FFA861BC7CC4487F69FD9617CC887EB11
3,321,327 UART: [art] PUB.Y = 8581A2C98776151867C8B796E858AC0FAA292B52C6E1327BE0038D0705B5265267879DB75C202419FBAE61E0FBBD3455
3,328,261 UART: [art] SIG.R = E6BF68EC708BC6A6E236F5501915AC91EB1C3E44921519709D8B09A61551E9DF6593C9FDF9A15F7CF7B281699F605EB4
3,335,034 UART: [art] SIG.S = 1C387D030539BC1DCAE80A379D172054DD157E0DC6638101B3896972958F535860659D14035490A4A3D36AEF744D2B39
3,359,418 UART: Caliptra RT
3,359,761 UART: [state] CFI Enabled
3,480,075 UART: [rt] RT listening for mailbox commands...
3,480,745 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,689 UART: [rt]cmd =0x41544d4e, len=14344
3,913,801 >>> mbox cmd response data (8 bytes)
3,913,802 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,017 UART: [rt]cmd =0x41545348, len=116
3,945,766 >>> mbox cmd response data (12 bytes)
3,945,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,760,132 >>> mbox cmd response: success
6,760,132 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,773,424 UART:
6,773,440 UART: Running Caliptra FMC ...
6,773,848 UART:
6,773,991 UART: [state] CFI Enabled
6,863,158 UART: [art] Extend RT PCRs Done
6,863,586 UART: [art] Lock RT PCRs Done
6,865,233 UART: [art] Populate DV Done
6,873,612 UART: [fht] FMC Alias Private Key: 7
6,874,678 UART: [art] Derive CDI
6,874,958 UART: [art] Store in slot 0x4
6,960,736 UART: [art] Derive Key Pair
6,961,096 UART: [art] Store priv key in slot 0x5
6,974,103 UART: [art] Derive Key Pair - Done
6,988,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,003,964 UART: [art] Erasing AUTHORITY.KEYID = 7
7,004,729 UART: [art] PUB.X = 62546062B02491380F894C73B886742C1C1FC7A2FFFD8C91099B60976886DBA3F647D07CE4AE0D00A40BEE4A6E5DAD3D
7,011,473 UART: [art] PUB.Y = 7D6AF9DF4EB41ED9FBC2F6ED698B692E5637B0472DAC99979C67AE923676C1EDCA4EBDF6065E1CEFD1D3B3336D5FA739
7,018,444 UART: [art] SIG.R = B06903387B90908C6850F824EE6BA581DB0230CA02F00D14DF6730E1852245C44A59C2F671B909CF20657BCCDF04DC52
7,025,196 UART: [art] SIG.S = 2B2B3BAB344A37C3475C3CD05F09AA7278F25E9BB15C5FB2B5AF140956349219CBE4F5E62314D1F6C328822F4B06CF1E
7,049,069 UART: Caliptra RT
7,049,412 UART: [state] CFI Enabled
7,418,219 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,449,352 UART: [rt]cmd =0x41545348, len=116
7,451,047 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,410 UART: [kat] SHA2-256
890,960 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,064 UART: [kat] ++
895,216 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,421 UART: [kat] HMAC-384Kdf
920,143 UART: [kat] LMS
1,168,455 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,152 UART: [fht] FHT @ 0x50003400
1,172,692 UART: [idev] ++
1,172,860 UART: [idev] CDI.KEYID = 6
1,173,221 UART: [idev] SUBJECT.KEYID = 7
1,173,646 UART: [idev] UDS.KEYID = 0
1,173,992 ready_for_fw is high
1,173,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,203 UART: [idev] Sha1 KeyId Algorithm
1,207,083 UART: [idev] --
1,208,114 UART: [ldev] ++
1,208,282 UART: [ldev] CDI.KEYID = 6
1,208,646 UART: [ldev] SUBJECT.KEYID = 5
1,209,073 UART: [ldev] AUTHORITY.KEYID = 7
1,209,536 UART: [ldev] FE.KEYID = 1
1,214,594 UART: [ldev] Erasing FE.KEYID = 1
1,241,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,938 UART: [ldev] --
1,281,143 UART: [fwproc] Wait for Commands...
1,281,816 UART: [fwproc] Recv command 0x46574c44
1,282,549 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,071 >>> mbox cmd response: success
2,826,087 UART: [afmc] ++
2,826,255 UART: [afmc] CDI.KEYID = 6
2,826,618 UART: [afmc] SUBJECT.KEYID = 7
2,827,044 UART: [afmc] AUTHORITY.KEYID = 5
2,862,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,047 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,638 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,339 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,144 UART: [afmc] --
2,905,987 UART: [cold-reset] --
2,906,941 UART: [state] Locking Datavault
2,908,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,828 UART: [state] Locking ICCM
2,909,354 UART: [exit] Launching FMC @ 0x40000130
2,914,684 UART:
2,914,700 UART: Running Caliptra FMC ...
2,915,108 UART:
2,915,162 UART: [state] CFI Enabled
2,925,170 UART: [fht] FMC Alias Private Key: 7
3,044,224 UART: [art] Extend RT PCRs Done
3,044,652 UART: [art] Lock RT PCRs Done
3,046,362 UART: [art] Populate DV Done
3,054,705 UART: [fht] FMC Alias Private Key: 7
3,055,725 UART: [art] Derive CDI
3,056,005 UART: [art] Store in slot 0x4
3,141,820 UART: [art] Derive Key Pair
3,142,180 UART: [art] Store priv key in slot 0x5
3,155,416 UART: [art] Derive Key Pair - Done
3,170,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,464 UART: [art] PUB.X = 8B3BCA32240E7D0811E165EE4356B2D8F2D8C102466C9C331375961B1BF01F0CBD6F74CA7B2F36E95B9949B91AD61D7C
3,193,230 UART: [art] PUB.Y = DA98BFD98CC775A7C813378FECDA95D89EB073D8FC9101D0794E842D358CBFACF16E70B41D115F60724377035B4E33F1
3,200,184 UART: [art] SIG.R = D9C1B37250CA9E77DF88DA157AECDFC0FDA466C555B8ED793FD24C4CDBE0F1A18EAF1593ADBE7CD188800C157187BB9D
3,206,979 UART: [art] SIG.S = 2F0A1FB22A7F21C238EAF91D087299C25B6949B13FCF06DA3002DC7CB1E48963CEF8E9825E6A11518152D402E5032782
3,230,495 UART: Caliptra RT
3,230,746 UART: [state] CFI Enabled
3,350,747 UART: [rt] RT listening for mailbox commands...
3,351,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,535 UART: [rt]cmd =0x41544d4e, len=14344
3,784,075 >>> mbox cmd response data (8 bytes)
3,784,076 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,267 UART: [rt]cmd =0x41545348, len=116
3,816,070 >>> mbox cmd response data (12 bytes)
3,816,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,854 UART:
3,816,870 UART: Running Caliptra ROM ...
3,817,278 UART:
3,817,333 UART: [state] CFI Enabled
3,819,965 UART: [state] LifecycleState = Unprovisioned
3,820,620 UART: [state] DebugLocked = No
3,821,108 UART: [state] WD Timer not started. Device not locked for debugging
3,822,280 UART: [kat] SHA2-256
4,625,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,629,934 UART: [kat] ++
4,630,086 UART: [kat] sha1
4,634,402 UART: [kat] SHA2-256
4,636,342 UART: [kat] SHA2-384
4,639,153 UART: [kat] SHA2-512-ACC
4,641,053 UART: [kat] ECC-384
4,650,870 UART: [kat] HMAC-384Kdf
4,655,462 UART: [kat] LMS
4,903,774 UART: [kat] --
4,904,684 UART: [update-reset] ++
6,263,387 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,264,460 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,419,675 >>> mbox cmd response: success
6,419,675 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,419,906 UART: [update-reset] Copying MAN_2 To MAN_1
6,427,920 UART: [update-reset Success] --
6,428,809 UART: [state] Locking Datavault
6,429,547 UART: [state] Locking PCR0, PCR1 and PCR31
6,430,151 UART: [state] Locking ICCM
6,430,797 UART: [exit] Launching FMC @ 0x40000130
6,436,127 UART:
6,436,143 UART: Running Caliptra FMC ...
6,436,551 UART:
6,436,605 UART: [state] CFI Enabled
6,525,762 UART: [art] Extend RT PCRs Done
6,526,190 UART: [art] Lock RT PCRs Done
6,527,513 UART: [art] Populate DV Done
6,535,798 UART: [fht] FMC Alias Private Key: 7
6,536,728 UART: [art] Derive CDI
6,537,008 UART: [art] Store in slot 0x4
6,622,553 UART: [art] Derive Key Pair
6,622,913 UART: [art] Store priv key in slot 0x5
6,636,453 UART: [art] Derive Key Pair - Done
6,651,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,666,661 UART: [art] Erasing AUTHORITY.KEYID = 7
6,667,426 UART: [art] PUB.X = 0687648E41254A6563409AC5F3F5126604A58D1105D6436A7124C0D124920D3CB99147FDB2B97705E891934A87F4D698
6,674,165 UART: [art] PUB.Y = 02BBA9FB614655D207895B3793A9445ED6537748D2C85CAC456FC2238457B1EA705A6DCB8BFAC2F881796CCE8950C0BE
6,681,117 UART: [art] SIG.R = 3531485A911B31767605B6894BC0CB81862518DFEF2C5AB049CAFD5767E4502416C13BFCC59EEE6225099C8FC3953463
6,687,879 UART: [art] SIG.S = 2148907F8B0A34F2BC41768127FBC18E54A386564D482924F9B40885AB7ECFB75E401C0E3683EED6176B00A5116BCEFC
6,711,558 UART: Caliptra RT
6,711,809 UART: [state] CFI Enabled
7,076,434 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,107,301 UART: [rt]cmd =0x41545348, len=116
7,109,310 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,212 ready_for_fw is high
1,059,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,262 >>> mbox cmd response: success
2,737,513 UART:
2,737,529 UART: Running Caliptra FMC ...
2,737,937 UART:
2,737,991 UART: [state] CFI Enabled
2,748,457 UART: [fht] FMC Alias Private Key: 7
2,867,911 UART: [art] Extend RT PCRs Done
2,868,339 UART: [art] Lock RT PCRs Done
2,870,125 UART: [art] Populate DV Done
2,878,498 UART: [fht] FMC Alias Private Key: 7
2,879,592 UART: [art] Derive CDI
2,879,872 UART: [art] Store in slot 0x4
2,965,763 UART: [art] Derive Key Pair
2,966,123 UART: [art] Store priv key in slot 0x5
2,979,001 UART: [art] Derive Key Pair - Done
2,993,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,631 UART: [art] PUB.X = B5740BE09D6810199D43978CD49C23B09C463560C781047B456EF07DD19BA121A0438CC0CC7B9ED1F13589E373F9A5A2
3,017,395 UART: [art] PUB.Y = 93EF43F9CCA457C15654FBFA9A77B36B9F18D80DE7756F10EECF42181D79F49D59E7498B490FAEB0F9368EBDE0370326
3,024,348 UART: [art] SIG.R = 14F942DD1013DC4A19F30880BA75C6307BD49F8342D823BBE240DEB1ACD1575B85CCA6EACC12CA75788161A0BE1A6D8F
3,031,131 UART: [art] SIG.S = 7A8F4E110C5B7B39356C05DBBDFD5543839A95927011B43A4BCA35FB7E62F8782567BA60F1BB4EB949C17EAB61389C4C
3,054,887 UART: Caliptra RT
3,055,138 UART: [state] CFI Enabled
3,175,064 UART: [rt] RT listening for mailbox commands...
3,175,734 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,526 UART: [rt]cmd =0x41544d4e, len=14344
3,608,718 >>> mbox cmd response data (8 bytes)
3,608,719 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,886 UART: [rt]cmd =0x41545348, len=116
3,640,805 >>> mbox cmd response data (12 bytes)
3,640,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,518 >>> mbox cmd response: success
6,129,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,143,025 UART:
6,143,041 UART: Running Caliptra FMC ...
6,143,449 UART:
6,143,503 UART: [state] CFI Enabled
6,232,362 UART: [art] Extend RT PCRs Done
6,232,790 UART: [art] Lock RT PCRs Done
6,234,251 UART: [art] Populate DV Done
6,242,512 UART: [fht] FMC Alias Private Key: 7
6,243,462 UART: [art] Derive CDI
6,243,742 UART: [art] Store in slot 0x4
6,329,433 UART: [art] Derive Key Pair
6,329,793 UART: [art] Store priv key in slot 0x5
6,342,633 UART: [art] Derive Key Pair - Done
6,357,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,948 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,713 UART: [art] PUB.X = 0616BEA84B0EC7B34CBD9A4165AA61E3CFBB3682ABCBAA77019C115DBC1C3267B4255327FE9088AD67830034FC2F7882
6,380,464 UART: [art] PUB.Y = E0AB6D34520B91A59F2AB2220A898830427BB75BCFA53792EB513B98717A0ACE09943B7C1D39342D73001EEE1D2DBF0D
6,387,385 UART: [art] SIG.R = 2C68D314E655F62D0A738F1A0050D414357763C9ADDE2BE52C1A337B67BE6A888C219BAA6B0187D7C1A45640107B0BCD
6,394,130 UART: [art] SIG.S = 21FAB798BE694247D1F74EF4A83A8B953720FC037C2A8D41C06BB97C00F56D6F1484D1AB5CE1DFD2C1A652D6AC814D5C
6,417,313 UART: Caliptra RT
6,417,564 UART: [state] CFI Enabled
6,786,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,817,010 UART: [rt]cmd =0x41545348, len=116
6,818,705 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,999 UART: [kat] ++
896,151 UART: [kat] sha1
900,421 UART: [kat] SHA2-256
902,361 UART: [kat] SHA2-384
905,004 UART: [kat] SHA2-512-ACC
906,905 UART: [kat] ECC-384
916,680 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,569 UART: [cold-reset] ++
1,170,975 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,175,039 ready_for_fw is high
1,175,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,732 UART: [idev] Sha1 KeyId Algorithm
1,208,632 UART: [idev] --
1,209,885 UART: [ldev] ++
1,210,053 UART: [ldev] CDI.KEYID = 6
1,210,417 UART: [ldev] SUBJECT.KEYID = 5
1,210,844 UART: [ldev] AUTHORITY.KEYID = 7
1,211,307 UART: [ldev] FE.KEYID = 1
1,216,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,241 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,206 >>> mbox cmd response: success
2,827,426 UART: [afmc] ++
2,827,594 UART: [afmc] CDI.KEYID = 6
2,827,957 UART: [afmc] SUBJECT.KEYID = 7
2,828,383 UART: [afmc] AUTHORITY.KEYID = 5
2,863,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,966 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,847 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,281 UART: [afmc] --
2,907,282 UART: [cold-reset] --
2,908,122 UART: [state] Locking Datavault
2,909,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,009 UART: [state] Locking ICCM
2,910,491 UART: [exit] Launching FMC @ 0x40000130
2,915,821 UART:
2,915,837 UART: Running Caliptra FMC ...
2,916,245 UART:
2,916,388 UART: [state] CFI Enabled
2,927,028 UART: [fht] FMC Alias Private Key: 7
3,045,284 UART: [art] Extend RT PCRs Done
3,045,712 UART: [art] Lock RT PCRs Done
3,046,924 UART: [art] Populate DV Done
3,055,089 UART: [fht] FMC Alias Private Key: 7
3,056,027 UART: [art] Derive CDI
3,056,307 UART: [art] Store in slot 0x4
3,142,020 UART: [art] Derive Key Pair
3,142,380 UART: [art] Store priv key in slot 0x5
3,156,082 UART: [art] Derive Key Pair - Done
3,170,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,215 UART: [art] PUB.X = CE75F2A3565C507C05D875F21954AEDDF0B2FCD81DB34749072D4DA1A008FF9C3A765FF7E52D33A4DFEA5E743036836A
3,193,990 UART: [art] PUB.Y = 282C0A08A7C88CA5E2057A2789F4EC39639B1D05A865ADE324DB902080A8BF1029F7C6E3DA69A3D10B28EFBA376AAE27
3,200,937 UART: [art] SIG.R = 1597E6FA3FCEB96786BFD8202CEA4B441AA3AD6EC03E5C30A9A72FD08870D34273F925BE924A298DAA10B97538AECD33
3,207,723 UART: [art] SIG.S = 36D72F0AF2143FDAE2E40949EE526AC41F3E0C8131DB599AEE22C83D3536595CFED691F0A4D161A87F14F0856AFE725A
3,231,264 UART: Caliptra RT
3,231,607 UART: [state] CFI Enabled
3,352,697 UART: [rt] RT listening for mailbox commands...
3,353,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,165 UART: [rt]cmd =0x41544d4e, len=14344
3,786,163 >>> mbox cmd response data (8 bytes)
3,786,164 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,011 UART: [rt]cmd =0x41545348, len=116
3,817,962 >>> mbox cmd response data (12 bytes)
3,817,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,650 UART:
3,818,666 UART: Running Caliptra ROM ...
3,819,074 UART:
3,819,216 UART: [state] CFI Enabled
3,821,930 UART: [state] LifecycleState = Unprovisioned
3,822,585 UART: [state] DebugLocked = No
3,823,101 UART: [state] WD Timer not started. Device not locked for debugging
3,824,335 UART: [kat] SHA2-256
4,627,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,631,989 UART: [kat] ++
4,632,141 UART: [kat] sha1
4,636,195 UART: [kat] SHA2-256
4,638,135 UART: [kat] SHA2-384
4,640,936 UART: [kat] SHA2-512-ACC
4,642,836 UART: [kat] ECC-384
4,653,085 UART: [kat] HMAC-384Kdf
4,657,571 UART: [kat] LMS
4,905,883 UART: [kat] --
4,906,709 UART: [update-reset] ++
6,265,094 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,266,137 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,421,352 >>> mbox cmd response: success
6,421,352 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,421,599 UART: [update-reset] Copying MAN_2 To MAN_1
6,429,613 UART: [update-reset Success] --
6,430,676 UART: [state] Locking Datavault
6,431,310 UART: [state] Locking PCR0, PCR1 and PCR31
6,431,914 UART: [state] Locking ICCM
6,432,336 UART: [exit] Launching FMC @ 0x40000130
6,437,666 UART:
6,437,682 UART: Running Caliptra FMC ...
6,438,090 UART:
6,438,233 UART: [state] CFI Enabled
6,526,966 UART: [art] Extend RT PCRs Done
6,527,394 UART: [art] Lock RT PCRs Done
6,528,567 UART: [art] Populate DV Done
6,537,028 UART: [fht] FMC Alias Private Key: 7
6,537,982 UART: [art] Derive CDI
6,538,262 UART: [art] Store in slot 0x4
6,624,331 UART: [art] Derive Key Pair
6,624,691 UART: [art] Store priv key in slot 0x5
6,638,069 UART: [art] Derive Key Pair - Done
6,652,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,668,527 UART: [art] Erasing AUTHORITY.KEYID = 7
6,669,292 UART: [art] PUB.X = 5BA7BFCD8F45727AB0B3BE8029129B6327C3AF797622DC72A14BD313867DC1CC0B7E5B6AAE26A6986C70EEBA83620FC8
6,676,072 UART: [art] PUB.Y = ECB6FB8DD651EF3A72F178C892262FE2BBACE9D8984F6D1091D08891F1BF0232B0E0482569F41F90DF5AC5B205BA555D
6,683,030 UART: [art] SIG.R = 5650CD33F6DFAA4DE5F6CDB0B149382E6A8F0930DCA0786C08937F83FA9AF2D3EE3F1E2301A3EEF436E336E9CB8FF170
6,689,811 UART: [art] SIG.S = 6EE3A5D1CD2F606573A15E905C9F2629DBE23B2A2AF2F810BF0E8ADD9AA78A227CD175019F8C1F9263D1D528675CA4DF
6,713,471 UART: Caliptra RT
6,713,814 UART: [state] CFI Enabled
7,080,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,111,214 UART: [rt]cmd =0x41545348, len=116
7,113,063 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,009 ready_for_fw is high
1,059,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,957 >>> mbox cmd response: success
2,742,372 UART:
2,742,388 UART: Running Caliptra FMC ...
2,742,796 UART:
2,742,939 UART: [state] CFI Enabled
2,752,997 UART: [fht] FMC Alias Private Key: 7
2,871,829 UART: [art] Extend RT PCRs Done
2,872,257 UART: [art] Lock RT PCRs Done
2,873,961 UART: [art] Populate DV Done
2,882,246 UART: [fht] FMC Alias Private Key: 7
2,883,322 UART: [art] Derive CDI
2,883,602 UART: [art] Store in slot 0x4
2,968,987 UART: [art] Derive Key Pair
2,969,347 UART: [art] Store priv key in slot 0x5
2,982,673 UART: [art] Derive Key Pair - Done
2,996,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,681 UART: [art] PUB.X = 4736A1DC9BDF3D39B77D3BBBBB31550A281B6E9C517D1F6DCC606FEF71C9325E0F934008F7534B38EE71E9415EF6130A
3,020,451 UART: [art] PUB.Y = CECF79CFDD2830A1125B349981A364C27CA2EB94EEE990EDA4E0C78E789DEDC718B5E730C2F7047A4BEA2A6D0FE2AE3D
3,027,421 UART: [art] SIG.R = B4105E1F53E0C3A1A6D176110E6EBEDAD6F2902F929997EB08B7DDEA630CFD63E38FD5FD197A5C31D86C5D52F3E339EC
3,034,202 UART: [art] SIG.S = 1B67E9359E37C752E0364AAA57373361657ADA396DC7B00F470B6423FC404453D9DBFC5AF9D77934BB0BCD930546499D
3,058,208 UART: Caliptra RT
3,058,551 UART: [state] CFI Enabled
3,178,680 UART: [rt] RT listening for mailbox commands...
3,179,350 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,342 UART: [rt]cmd =0x41544d4e, len=14344
3,612,922 >>> mbox cmd response data (8 bytes)
3,612,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,080 UART: [rt]cmd =0x41545348, len=116
3,644,681 >>> mbox cmd response data (12 bytes)
3,644,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,134,087 >>> mbox cmd response: success
6,134,087 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,147,530 UART:
6,147,546 UART: Running Caliptra FMC ...
6,147,954 UART:
6,148,097 UART: [state] CFI Enabled
6,237,770 UART: [art] Extend RT PCRs Done
6,238,198 UART: [art] Lock RT PCRs Done
6,239,667 UART: [art] Populate DV Done
6,248,064 UART: [fht] FMC Alias Private Key: 7
6,249,040 UART: [art] Derive CDI
6,249,320 UART: [art] Store in slot 0x4
6,335,189 UART: [art] Derive Key Pair
6,335,549 UART: [art] Store priv key in slot 0x5
6,349,139 UART: [art] Derive Key Pair - Done
6,364,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,379,733 UART: [art] Erasing AUTHORITY.KEYID = 7
6,380,498 UART: [art] PUB.X = 2C1AA64389CED061DCFF477839F914C5F43E426F1D11ABF1BDA9A95007FE2F123E953CA396064BEE8FAAE4929B4ABCEB
6,387,284 UART: [art] PUB.Y = 7EFB70F683D4282D9BB5F314E3C3CD268FA98BB726ADA1D041C46A25252792856F3C3F27392E974DFD379B02B79D3907
6,394,232 UART: [art] SIG.R = CD6DF9AB4FB911331DC3A243FF9C6E373C0D2FE9BB08E7D8A15DDC802F0D5DF42936F5C68F8BD9F1A815DFA77CEA98AD
6,401,023 UART: [art] SIG.S = 60A490115EDBE84E17A580C833FEB546F3E5F4AD0BA169A3FF83A60E5545E99BD85AFC9979EBDAF7A70A391B7D09FF43
6,425,079 UART: Caliptra RT
6,425,422 UART: [state] CFI Enabled
6,797,318 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,828,165 UART: [rt]cmd =0x41545348, len=116
6,829,938 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,109 UART: [kat] SHA2-256
904,049 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
919,074 UART: [kat] HMAC-384Kdf
923,726 UART: [kat] LMS
1,172,054 UART: [kat] --
1,173,081 UART: [cold-reset] ++
1,173,413 UART: [fht] FHT @ 0x50003400
1,175,896 UART: [idev] ++
1,176,064 UART: [idev] CDI.KEYID = 6
1,176,424 UART: [idev] SUBJECT.KEYID = 7
1,176,848 UART: [idev] UDS.KEYID = 0
1,177,193 ready_for_fw is high
1,177,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,636 UART: [idev] Erasing UDS.KEYID = 0
1,201,275 UART: [idev] Sha1 KeyId Algorithm
1,209,773 UART: [idev] --
1,210,809 UART: [ldev] ++
1,210,977 UART: [ldev] CDI.KEYID = 6
1,211,340 UART: [ldev] SUBJECT.KEYID = 5
1,211,766 UART: [ldev] AUTHORITY.KEYID = 7
1,212,229 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,667 UART: [ldev] --
1,283,174 UART: [fwproc] Wait for Commands...
1,283,996 UART: [fwproc] Recv command 0x46574c44
1,284,724 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,427 >>> mbox cmd response: success
2,829,609 UART: [afmc] ++
2,829,777 UART: [afmc] CDI.KEYID = 6
2,830,139 UART: [afmc] SUBJECT.KEYID = 7
2,830,564 UART: [afmc] AUTHORITY.KEYID = 5
2,865,843 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,973 UART: [afmc] --
2,909,099 UART: [cold-reset] --
2,910,021 UART: [state] Locking Datavault
2,911,138 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,742 UART: [state] Locking ICCM
2,912,396 UART: [exit] Launching FMC @ 0x40000130
2,917,726 UART:
2,917,742 UART: Running Caliptra FMC ...
2,918,150 UART:
2,918,204 UART: [state] CFI Enabled
2,928,540 UART: [fht] FMC Alias Private Key: 7
3,047,154 UART: [art] Extend RT PCRs Done
3,047,582 UART: [art] Lock RT PCRs Done
3,049,158 UART: [art] Populate DV Done
3,057,451 UART: [fht] FMC Alias Private Key: 7
3,058,419 UART: [art] Derive CDI
3,058,699 UART: [art] Store in slot 0x4
3,144,162 UART: [art] Derive Key Pair
3,144,522 UART: [art] Store priv key in slot 0x5
3,157,854 UART: [art] Derive Key Pair - Done
3,172,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,339 UART: [art] PUB.X = E231B9B356B6E6B0FCDD0678734F1F6301F9E4F0E2C6BCB3057E59C187A9E5F25D79F499908131BD0ED49DD86577C2D9
3,195,105 UART: [art] PUB.Y = AE0FBA4318712FAD7A42A7BE51B7BEF5487630AD1131B0ECBC7A24402B0DE07A490968064E960D04AA0CA6CF24B99DBE
3,202,052 UART: [art] SIG.R = 75E0F27786C99B6C0182617703F3D9A5F9557A844C3D9B4224A0F4C15031A64393198A2E025B8F57DD4E1236EE630431
3,208,800 UART: [art] SIG.S = 18311727B375DFE3AE2F7BD84FC2B79D084F56990F6BFB95BEA215AF359D8CC4922918D1911AE4F139D7C7C490BCB031
3,232,786 UART: Caliptra RT
3,233,037 UART: [state] CFI Enabled
3,353,089 UART: [rt] RT listening for mailbox commands...
3,353,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,871 UART: [rt]cmd =0x41544d4e, len=14344
3,786,531 >>> mbox cmd response data (8 bytes)
3,786,532 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,559 UART: [rt]cmd =0x41545348, len=116
3,817,958 >>> mbox cmd response data (12 bytes)
3,817,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,904 UART:
3,818,920 UART: Running Caliptra ROM ...
3,819,328 UART:
3,819,383 UART: [state] CFI Enabled
3,822,047 UART: [state] LifecycleState = Unprovisioned
3,822,702 UART: [state] DebugLocked = No
3,823,302 UART: [state] WD Timer not started. Device not locked for debugging
3,824,440 UART: [kat] SHA2-256
4,630,090 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,634,215 UART: [kat] ++
4,634,367 UART: [kat] sha1
4,638,713 UART: [kat] SHA2-256
4,640,653 UART: [kat] SHA2-384
4,643,358 UART: [kat] SHA2-512-ACC
4,645,258 UART: [kat] ECC-384
4,654,817 UART: [kat] HMAC-384Kdf
4,659,457 UART: [kat] LMS
4,907,785 UART: [kat] --
4,908,551 UART: [update-reset] ++
6,266,847 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,267,978 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,423,193 >>> mbox cmd response: success
6,423,193 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,423,534 UART: [update-reset] Copying MAN_2 To MAN_1
6,431,548 UART: [update-reset Success] --
6,432,569 UART: [state] Locking Datavault
6,433,577 UART: [state] Locking PCR0, PCR1 and PCR31
6,434,181 UART: [state] Locking ICCM
6,434,677 UART: [exit] Launching FMC @ 0x40000130
6,440,007 UART:
6,440,023 UART: Running Caliptra FMC ...
6,440,431 UART:
6,440,485 UART: [state] CFI Enabled
6,529,552 UART: [art] Extend RT PCRs Done
6,529,980 UART: [art] Lock RT PCRs Done
6,531,335 UART: [art] Populate DV Done
6,539,386 UART: [fht] FMC Alias Private Key: 7
6,540,332 UART: [art] Derive CDI
6,540,612 UART: [art] Store in slot 0x4
6,626,143 UART: [art] Derive Key Pair
6,626,503 UART: [art] Store priv key in slot 0x5
6,640,039 UART: [art] Derive Key Pair - Done
6,654,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,670,403 UART: [art] Erasing AUTHORITY.KEYID = 7
6,671,168 UART: [art] PUB.X = 34CD3ED3308B2883D38DF634ED68C97EA17AE43F4453BBEFC1BE9BC5D270F3C0993A0AA1F4F1FB22812E0F2B85F7681E
6,677,950 UART: [art] PUB.Y = 40409ADE1FE11C129BD8AF275417C6F2453EA0B3D4B6E2E884834E7C0EA9BCE352F79F6B4F006BE448BBB449B2473C0D
6,684,886 UART: [art] SIG.R = 5D637185E48941360DB134B678B2D17B2E1C27643DC70143F8B4B60E2C561E264408E87A42784F18F97831FF4F3AC624
6,691,636 UART: [art] SIG.S = 45D7B208A743A4503342B70111BF5FD40C597D4A9BD68C3BAB7DD4E7B6752743C492817847C2B372C98DCB2CACF3A60E
6,715,942 UART: Caliptra RT
6,716,193 UART: [state] CFI Enabled
7,081,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,112,759 UART: [rt]cmd =0x41545348, len=116
7,114,670 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,519 ready_for_fw is high
1,060,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,150 >>> mbox cmd response: success
2,741,073 UART:
2,741,089 UART: Running Caliptra FMC ...
2,741,497 UART:
2,741,551 UART: [state] CFI Enabled
2,752,051 UART: [fht] FMC Alias Private Key: 7
2,870,837 UART: [art] Extend RT PCRs Done
2,871,265 UART: [art] Lock RT PCRs Done
2,872,587 UART: [art] Populate DV Done
2,880,994 UART: [fht] FMC Alias Private Key: 7
2,881,996 UART: [art] Derive CDI
2,882,276 UART: [art] Store in slot 0x4
2,967,981 UART: [art] Derive Key Pair
2,968,341 UART: [art] Store priv key in slot 0x5
2,981,917 UART: [art] Derive Key Pair - Done
2,996,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,483 UART: [art] PUB.X = 62644F710D1A978D0B747BF951FCEA2431204324C4DB69B285AC7778B5A57E3EEEFD65EFBF42A09E3CBB890632B332E8
3,020,254 UART: [art] PUB.Y = F50898DAA26CBE039C1F796D686CC1293660FCD001A472F52A540ED9A47861C36FF020A708194CAEF86AD61D02789CE2
3,027,192 UART: [art] SIG.R = 9F33ECD40A5303DA5E59072F544B058411FE369EA0BB89ACA485C07C230ED81CB10E690AA52D16CD2A09A7CB994842D6
3,033,948 UART: [art] SIG.S = CA6E15B70429D39A214828D34CF9D206A6BA436B893000438AA96B4F611C5F982A54A2EC53DF501F3F4C9E27E78E725A
3,057,050 UART: Caliptra RT
3,057,301 UART: [state] CFI Enabled
3,175,909 UART: [rt] RT listening for mailbox commands...
3,176,579 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,619 UART: [rt]cmd =0x41544d4e, len=14344
3,608,791 >>> mbox cmd response data (8 bytes)
3,608,792 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,679 UART: [rt]cmd =0x41545348, len=116
3,640,184 >>> mbox cmd response data (12 bytes)
3,640,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,131,588 >>> mbox cmd response: success
6,131,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,144,749 UART:
6,144,765 UART: Running Caliptra FMC ...
6,145,173 UART:
6,145,227 UART: [state] CFI Enabled
6,234,448 UART: [art] Extend RT PCRs Done
6,234,876 UART: [art] Lock RT PCRs Done
6,236,229 UART: [art] Populate DV Done
6,244,486 UART: [fht] FMC Alias Private Key: 7
6,245,430 UART: [art] Derive CDI
6,245,710 UART: [art] Store in slot 0x4
6,331,579 UART: [art] Derive Key Pair
6,331,939 UART: [art] Store priv key in slot 0x5
6,345,531 UART: [art] Derive Key Pair - Done
6,360,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,375,666 UART: [art] Erasing AUTHORITY.KEYID = 7
6,376,431 UART: [art] PUB.X = 67AC4736A122ABCC6F88818398D0BB6E3BB88173B7D45CA5981E8ADC9B896773DC48CA8F19E2FEDCAD7DEE51523573F1
6,383,217 UART: [art] PUB.Y = 54EBE1F7F00A472446D0114E1408218FA2EDE01B4E342C39B8F96A05A63B0723B9AC674FAA85C805C5CCE1216CCE4D2C
6,390,164 UART: [art] SIG.R = 9B166FF9D786D103C7E978D0D86282F7C25A5D96A893338B4F0C26BC446C3AACC5E31D5AF78E3D277419AA66FACAD9F8
6,396,942 UART: [art] SIG.S = 0E03666D484A1B058AA7311744D64473AD8681AA0E976137AB0791A2E70D808E7B83D0A99355266D645E79922AE2E3C9
6,420,592 UART: Caliptra RT
6,420,843 UART: [state] CFI Enabled
6,788,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,819,644 UART: [rt]cmd =0x41545348, len=116
6,821,155 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,885 UART: [state] LifecycleState = Unprovisioned
86,540 UART: [state] DebugLocked = No
87,196 UART: [state] WD Timer not started. Device not locked for debugging
88,431 UART: [kat] SHA2-256
894,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,206 UART: [kat] ++
898,358 UART: [kat] sha1
902,452 UART: [kat] SHA2-256
904,392 UART: [kat] SHA2-384
907,039 UART: [kat] SHA2-512-ACC
908,940 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,047 UART: [kat] LMS
1,171,375 UART: [kat] --
1,172,016 UART: [cold-reset] ++
1,172,524 UART: [fht] FHT @ 0x50003400
1,175,005 UART: [idev] ++
1,175,173 UART: [idev] CDI.KEYID = 6
1,175,533 UART: [idev] SUBJECT.KEYID = 7
1,175,957 UART: [idev] UDS.KEYID = 0
1,176,302 ready_for_fw is high
1,176,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,777 UART: [idev] Erasing UDS.KEYID = 0
1,201,080 UART: [idev] Sha1 KeyId Algorithm
1,209,546 UART: [idev] --
1,210,526 UART: [ldev] ++
1,210,694 UART: [ldev] CDI.KEYID = 6
1,211,057 UART: [ldev] SUBJECT.KEYID = 5
1,211,483 UART: [ldev] AUTHORITY.KEYID = 7
1,211,946 UART: [ldev] FE.KEYID = 1
1,216,844 UART: [ldev] Erasing FE.KEYID = 1
1,243,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,438 UART: [ldev] --
1,282,819 UART: [fwproc] Wait for Commands...
1,283,541 UART: [fwproc] Recv command 0x46574c44
1,284,269 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,191 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,638 >>> mbox cmd response: success
2,828,844 UART: [afmc] ++
2,829,012 UART: [afmc] CDI.KEYID = 6
2,829,374 UART: [afmc] SUBJECT.KEYID = 7
2,829,799 UART: [afmc] AUTHORITY.KEYID = 5
2,865,482 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,991 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,630 UART: [afmc] --
2,908,756 UART: [cold-reset] --
2,909,640 UART: [state] Locking Datavault
2,910,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,117 UART: [state] Locking ICCM
2,911,721 UART: [exit] Launching FMC @ 0x40000130
2,917,051 UART:
2,917,067 UART: Running Caliptra FMC ...
2,917,475 UART:
2,917,618 UART: [state] CFI Enabled
2,928,164 UART: [fht] FMC Alias Private Key: 7
3,047,314 UART: [art] Extend RT PCRs Done
3,047,742 UART: [art] Lock RT PCRs Done
3,049,118 UART: [art] Populate DV Done
3,057,371 UART: [fht] FMC Alias Private Key: 7
3,058,313 UART: [art] Derive CDI
3,058,593 UART: [art] Store in slot 0x4
3,144,726 UART: [art] Derive Key Pair
3,145,086 UART: [art] Store priv key in slot 0x5
3,158,474 UART: [art] Derive Key Pair - Done
3,173,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,334 UART: [art] PUB.X = 9D3ABF9B2FA3F06E116BB32B0949D831DC533035CD0AE11751BEA87C873844C20F4B58436C304D0CF2CBDA5AFD33C579
3,196,106 UART: [art] PUB.Y = 75E309717D2282F9A7319BE7F0AC91968F3FB1199D08B43E11DB9A99B4E964800FF56BB7F23787030E6DF63592EF7A7E
3,203,043 UART: [art] SIG.R = 927D4296C9B1C78C651805661313648BD97FEAF5048FBA8A2B7EE13930BB9EA3DA5A1ACCFBAE0413D46F49D9860A9941
3,209,811 UART: [art] SIG.S = 3475C2269CCAC4A2CA9EDCB01BDD7416999ED0E8E2E5E34824834CFC7039C1065AEA0A84C6D1F928A08331FB111CA837
3,233,653 UART: Caliptra RT
3,233,996 UART: [state] CFI Enabled
3,353,263 UART: [rt] RT listening for mailbox commands...
3,353,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,919 UART: [rt]cmd =0x41544d4e, len=14344
3,787,123 >>> mbox cmd response data (8 bytes)
3,787,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,251 UART: [rt]cmd =0x41545348, len=116
3,818,980 >>> mbox cmd response data (12 bytes)
3,818,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,790 UART:
3,819,806 UART: Running Caliptra ROM ...
3,820,214 UART:
3,820,356 UART: [state] CFI Enabled
3,823,384 UART: [state] LifecycleState = Unprovisioned
3,824,039 UART: [state] DebugLocked = No
3,824,577 UART: [state] WD Timer not started. Device not locked for debugging
3,825,751 UART: [kat] SHA2-256
4,631,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,635,526 UART: [kat] ++
4,635,678 UART: [kat] sha1
4,639,938 UART: [kat] SHA2-256
4,641,878 UART: [kat] SHA2-384
4,644,463 UART: [kat] SHA2-512-ACC
4,646,363 UART: [kat] ECC-384
4,656,896 UART: [kat] HMAC-384Kdf
4,661,580 UART: [kat] LMS
4,909,908 UART: [kat] --
4,910,622 UART: [update-reset] ++
6,269,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,270,911 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,426,126 >>> mbox cmd response: success
6,426,126 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,426,449 UART: [update-reset] Copying MAN_2 To MAN_1
6,434,463 UART: [update-reset Success] --
6,435,380 UART: [state] Locking Datavault
6,436,132 UART: [state] Locking PCR0, PCR1 and PCR31
6,436,736 UART: [state] Locking ICCM
6,437,200 UART: [exit] Launching FMC @ 0x40000130
6,442,530 UART:
6,442,546 UART: Running Caliptra FMC ...
6,442,954 UART:
6,443,097 UART: [state] CFI Enabled
6,532,192 UART: [art] Extend RT PCRs Done
6,532,620 UART: [art] Lock RT PCRs Done
6,533,901 UART: [art] Populate DV Done
6,542,074 UART: [fht] FMC Alias Private Key: 7
6,543,048 UART: [art] Derive CDI
6,543,328 UART: [art] Store in slot 0x4
6,628,733 UART: [art] Derive Key Pair
6,629,093 UART: [art] Store priv key in slot 0x5
6,643,075 UART: [art] Derive Key Pair - Done
6,657,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,673,164 UART: [art] Erasing AUTHORITY.KEYID = 7
6,673,929 UART: [art] PUB.X = 35012D8D4FAED903D4C75994823127CF499417A69FA411A25CE749E715CF556F3C9CB1936F74B1AC53FC6D645ECAA8A2
6,680,701 UART: [art] PUB.Y = 8BA8F2D8BB5F243602236AE99BF55DB5C5982CDC65A852EFFEB0A43063EF403DE95D7B7E92B58AF585991C10D82D932A
6,687,662 UART: [art] SIG.R = E59AB84D8E183EDC66C30AC18956C6B88ED473B26687DEE1BFF4E40C85B49CF40F5B4EEC41A1318D02B8B5F548DFB894
6,694,438 UART: [art] SIG.S = A87AC33380E0A5DF4D2BB26227E363A82B4024426C8692318747F48B10027788993D5913406385E961AEC4A1308D3516
6,718,517 UART: Caliptra RT
6,718,860 UART: [state] CFI Enabled
7,085,453 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,116,532 UART: [rt]cmd =0x41545348, len=116
7,117,955 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.98s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,452 ready_for_fw is high
1,060,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,205 >>> mbox cmd response: success
2,746,510 UART:
2,746,526 UART: Running Caliptra FMC ...
2,746,934 UART:
2,747,077 UART: [state] CFI Enabled
2,757,687 UART: [fht] FMC Alias Private Key: 7
2,876,447 UART: [art] Extend RT PCRs Done
2,876,875 UART: [art] Lock RT PCRs Done
2,878,289 UART: [art] Populate DV Done
2,886,490 UART: [fht] FMC Alias Private Key: 7
2,887,560 UART: [art] Derive CDI
2,887,840 UART: [art] Store in slot 0x4
2,973,821 UART: [art] Derive Key Pair
2,974,181 UART: [art] Store priv key in slot 0x5
2,987,193 UART: [art] Derive Key Pair - Done
3,001,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,246 UART: [art] PUB.X = C168A35327F79519F2A5678EAD064ABA671564DF95B7BF458A7094BB8EBD3B41C29B098F1907C98A28EE8AB501A847F7
3,025,010 UART: [art] PUB.Y = 38F687B3E8D33942AE492E6577031495CE3370459079BC606B06A7656958086A3553FC27138748D52CB5D4F7D39BCFB1
3,031,941 UART: [art] SIG.R = 660F6D0CEF34985A402F081C9299402F1E2FABD9B1308D1C35F1B7E85DE8FFD5BF34583B6628972913C506C444AD4145
3,038,701 UART: [art] SIG.S = 78BCADEDC71F7F904311298DE9566D897D19A97AD41AE3D47A1F39058716B362E7C4F290EA5C280D296B395E5443611E
3,062,087 UART: Caliptra RT
3,062,430 UART: [state] CFI Enabled
3,182,310 UART: [rt] RT listening for mailbox commands...
3,182,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,072 UART: [rt]cmd =0x41544d4e, len=14344
3,616,170 >>> mbox cmd response data (8 bytes)
3,616,171 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,430 UART: [rt]cmd =0x41545348, len=116
3,648,071 >>> mbox cmd response data (12 bytes)
3,648,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,139,348 >>> mbox cmd response: success
6,139,348 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
6,152,801 UART:
6,152,817 UART: Running Caliptra FMC ...
6,153,225 UART:
6,153,368 UART: [state] CFI Enabled
6,242,711 UART: [art] Extend RT PCRs Done
6,243,139 UART: [art] Lock RT PCRs Done
6,244,398 UART: [art] Populate DV Done
6,252,803 UART: [fht] FMC Alias Private Key: 7
6,253,791 UART: [art] Derive CDI
6,254,071 UART: [art] Store in slot 0x4
6,339,906 UART: [art] Derive Key Pair
6,340,266 UART: [art] Store priv key in slot 0x5
6,354,538 UART: [art] Derive Key Pair - Done
6,369,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,384,935 UART: [art] Erasing AUTHORITY.KEYID = 7
6,385,700 UART: [art] PUB.X = 7DD0E0820069494D38BE97776C01012E35C31F69E2265EFD41FC08451289F93B0F9851F10E3C0EE590852F9524B0E941
6,392,422 UART: [art] PUB.Y = 219FB04E4E02E658A675F0C078605138C3DDD9CC0F98938BD5C44F7055AEC34135BB5EF49C8881A8B2F75AA37488E8CA
6,399,374 UART: [art] SIG.R = 829B6C4C6536A764740E7A093731AF44479E5EBFA3BE2DABE83447723F38F1CC85FE8A05BDBB90FF1782C5CA6998250F
6,406,142 UART: [art] SIG.S = 597891D744DF41D1A7A2B094C3DAEF28F9D959F1E1468F45E7A290F4E745BA460486684B6B0D4BC901FB156A3F325199
6,429,579 UART: Caliptra RT
6,429,922 UART: [state] CFI Enabled
6,794,706 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,825,379 UART: [rt]cmd =0x41545348, len=116
6,827,148 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_after_update_reset_unauthorized_fw_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,063 UART:
192,463 UART: Running Caliptra ROM ...
193,577 UART:
193,717 UART: [state] CFI Enabled
267,208 UART: [state] LifecycleState = Unprovisioned
269,200 UART: [state] DebugLocked = No
271,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,800 UART: [kat] SHA2-256
446,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,054 UART: [kat] ++
457,506 UART: [kat] sha1
468,026 UART: [kat] SHA2-256
470,757 UART: [kat] SHA2-384
475,111 UART: [kat] SHA2-512-ACC
477,477 UART: [kat] ECC-384
2,768,859 UART: [kat] HMAC-384Kdf
2,800,229 UART: [kat] LMS
3,990,500 UART: [kat] --
3,995,768 UART: [cold-reset] ++
3,998,194 UART: [fht] Storing FHT @ 0x50003400
4,008,110 UART: [idev] ++
4,008,678 UART: [idev] CDI.KEYID = 6
4,009,718 UART: [idev] SUBJECT.KEYID = 7
4,010,896 UART: [idev] UDS.KEYID = 0
4,011,948 ready_for_fw is high
4,012,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,237 UART: [idev] Erasing UDS.KEYID = 0
7,346,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,641 UART: [idev] --
7,372,219 UART: [ldev] ++
7,372,787 UART: [ldev] CDI.KEYID = 6
7,373,770 UART: [ldev] SUBJECT.KEYID = 5
7,374,984 UART: [ldev] AUTHORITY.KEYID = 7
7,376,231 UART: [ldev] FE.KEYID = 1
7,423,501 UART: [ldev] Erasing FE.KEYID = 1
10,759,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,564 UART: [ldev] --
13,140,511 UART: [fwproc] Waiting for Commands...
13,143,404 UART: [fwproc] Received command 0x46574c44
13,145,591 UART: [fwproc] Received Image of size 118548 bytes
17,255,545 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,328,469 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,401,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,729,614 >>> mbox cmd response: success
17,734,394 UART: [afmc] ++
17,735,023 UART: [afmc] CDI.KEYID = 6
17,735,941 UART: [afmc] SUBJECT.KEYID = 7
17,737,160 UART: [afmc] AUTHORITY.KEYID = 5
21,093,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,936 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,335 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,233 UART: [afmc] --
23,462,916 UART: [cold-reset] --
23,467,574 UART: [state] Locking Datavault
23,472,234 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,931 UART: [state] Locking ICCM
23,476,487 UART: [exit] Launching FMC @ 0x40000130
23,484,880 UART:
23,485,131 UART: Running Caliptra FMC ...
23,486,157 UART:
23,486,300 UART: [state] CFI Enabled
23,552,963 UART: [fht] FMC Alias Private Key: 7
25,893,374 UART: [art] Extend RT PCRs Done
25,894,599 UART: [art] Lock RT PCRs Done
25,896,632 UART: [art] Populate DV Done
25,902,041 UART: [fht] FMC Alias Private Key: 7
25,903,800 UART: [art] Derive CDI
25,904,538 UART: [art] Store in slot 0x4
25,961,907 UART: [art] Derive Key Pair
25,962,950 UART: [art] Store priv key in slot 0x5
29,255,808 UART: [art] Derive Key Pair - Done
29,268,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,686 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,196 UART: [art] PUB.X = 2B791207FB53FF5053D8A2907FA1621D5B2AC480FBD51814AADA641C9ADB8F27C4421B68E8A476214BE0C6AD3AC559C3
31,566,455 UART: [art] PUB.Y = D37173D0CDA7E8BF44CEEBA276A22DC3731C0FC344EA037B846796E2AAE583ED6111A0AC3457F956B8A41E13FE530C1A
31,573,744 UART: [art] SIG.R = 12BA87AB8A8A23CCC059E80A327A65F56FC0638BA253B22B8BD4311BE314064BC85ADBF271998E690D2C2A1EE9C05749
31,581,127 UART: [art] SIG.S = 633088A370F9D829CBDA9C02E598F40BB5B173C0C23AC5A45F1235467730C588903DD1628C8E8A0A8F481D251120C739
32,886,659 UART: Caliptra RT
32,887,360 UART: [state] CFI Enabled
33,082,266 UART: [rt] RT listening for mailbox commands...
33,084,388 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,115,284 UART: [rt]cmd =0x41545348, len=116
33,117,328 >>> mbox cmd response data (12 bytes)
35,188,627 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,294,391 UART:
35,294,743 UART: Running Caliptra ROM ...
35,295,894 UART:
35,296,065 UART: [state] CFI Enabled
35,374,842 UART: [state] LifecycleState = Unprovisioned
35,376,781 UART: [state] DebugLocked = No
35,378,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,382,532 UART: [kat] SHA2-256
35,552,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,562,721 UART: [kat] ++
35,563,182 UART: [kat] sha1
35,574,115 UART: [kat] SHA2-256
35,576,810 UART: [kat] SHA2-384
35,583,718 UART: [kat] SHA2-512-ACC
35,586,067 UART: [kat] ECC-384
37,875,816 UART: [kat] HMAC-384Kdf
37,907,045 UART: [kat] LMS
39,097,366 UART: [kat] --
39,103,585 UART: [update-reset] ++
42,855,311 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,858,228 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,130,921 >>> mbox cmd response: success
43,131,276 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,131,555 UART: [update-reset] Copying MAN_2 To MAN_1
43,153,938 UART: [update-reset Success] --
43,158,802 UART: [state] Locking Datavault
43,161,520 UART: [state] Locking PCR0, PCR1 and PCR31
43,163,277 UART: [state] Locking ICCM
43,165,537 UART: [exit] Launching FMC @ 0x40000130
43,173,946 UART:
43,174,183 UART: Running Caliptra FMC ...
43,175,286 UART:
43,175,443 UART: [state] CFI Enabled
43,273,626 UART: [art] Extend RT PCRs Done
43,274,823 UART: [art] Lock RT PCRs Done
43,276,279 UART: [art] Populate DV Done
43,281,845 UART: [fht] FMC Alias Private Key: 7
43,283,378 UART: [art] Derive CDI
43,284,243 UART: [art] Store in slot 0x4
43,342,940 UART: [art] Derive Key Pair
43,343,974 UART: [art] Store priv key in slot 0x5
46,636,838 UART: [art] Derive Key Pair - Done
46,649,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,938,219 UART: [art] Erasing AUTHORITY.KEYID = 7
48,939,730 UART: [art] PUB.X = AE566D4A453A8C521346AD91BFB996BE8CA7E9D161E5CD9F766CF333E3FC78C405E7498DD60233D18B00539548C94094
48,946,973 UART: [art] PUB.Y = 9D7130A1905727A22CEE1A66A064FBF50830002B2EB413F42227B5723AFEA318DD789E1C378627E9A55AA1746E56498A
48,954,204 UART: [art] SIG.R = A1556A78ACC03F41D4AB01B56BB2FB68793EE4678B963434CF4CD6492E534CCB4EAA64F889E15AE2EBF9E532FC7412F5
48,961,590 UART: [art] SIG.S = F0337035BC9C15B48217776D6AA3088B15CE6106B56705633B46169A6349237115031F6034601EA6DFF5C8F1F1A6423F
50,265,983 UART: mbox::rt_entry...
50,266,959 UART: ____ _ _ _ ____ _____
50,268,971 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,271,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,272,985 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,274,923 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,276,776 UART: |_|
50,277,577 UART:
50,648,648 UART: [rt] Runtime listening for mailbox commands...
50,650,816 >>> mbox cmd response data (48 bytes)
50,651,378 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,653,691 >>> mbox cmd response data (48 bytes)
50,654,581 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,670,156 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,807,132 ready_for_fw is high
3,807,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,959,060 >>> mbox cmd response: success
23,650,585 UART:
23,650,964 UART: Running Caliptra FMC ...
23,652,100 UART:
23,652,267 UART: [state] CFI Enabled
23,702,975 UART: [fht] FMC Alias Private Key: 7
26,042,807 UART: [art] Extend RT PCRs Done
26,044,037 UART: [art] Lock RT PCRs Done
26,045,727 UART: [art] Populate DV Done
26,051,105 UART: [fht] FMC Alias Private Key: 7
26,052,597 UART: [art] Derive CDI
26,053,363 UART: [art] Store in slot 0x4
26,112,411 UART: [art] Derive Key Pair
26,113,454 UART: [art] Store priv key in slot 0x5
29,406,140 UART: [art] Derive Key Pair - Done
29,419,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,645 UART: [art] Erasing AUTHORITY.KEYID = 7
31,709,189 UART: [art] PUB.X = E14DC22423F0E5E5916129A3099FFE29B4FCA8CC68B85F60E579CABDB0257FBCB33F823A346381BBA25EC5C0D1805F8F
31,716,443 UART: [art] PUB.Y = 526076376806408F2F8BBE28403BE1CAB2A239DBAC51409F90DB7CD65683D4903F8DAEE7C932D662FF3F9220712EC6C9
31,723,715 UART: [art] SIG.R = AE6CD10594FEB356ECED20303CD0A53DCC662B5A48F916B96477F02B3A8C9AE40AAE273AD8C3992C2D66F48244379BDA
31,731,173 UART: [art] SIG.S = D5F41311E64DF5CA858780A9699F7692871833E0A09E40ACB6D62AFBEB717048AED48644468AF0AF4609C0B472053DAD
33,035,473 UART: Caliptra RT
33,036,194 UART: [state] CFI Enabled
33,213,519 UART: [rt] RT listening for mailbox commands...
33,215,903 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,246,602 UART: [rt]cmd =0x41545348, len=116
33,248,732 >>> mbox cmd response data (12 bytes)
35,319,782 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,376,811 >>> mbox cmd response: success
43,377,297 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,412,428 UART:
43,412,763 UART: Running Caliptra FMC ...
43,413,805 UART:
43,413,960 UART: [state] CFI Enabled
43,513,188 UART: [art] Extend RT PCRs Done
43,514,374 UART: [art] Lock RT PCRs Done
43,515,787 UART: [art] Populate DV Done
43,521,207 UART: [fht] FMC Alias Private Key: 7
43,522,853 UART: [art] Derive CDI
43,523,587 UART: [art] Store in slot 0x4
43,582,761 UART: [art] Derive Key Pair
43,583,804 UART: [art] Store priv key in slot 0x5
46,876,582 UART: [art] Derive Key Pair - Done
46,889,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,178,291 UART: [art] Erasing AUTHORITY.KEYID = 7
49,179,795 UART: [art] PUB.X = 90E4C295DA2A21D0C09285C19E18734A616801222CFE34F37A0384E71264778DDAD6B3B551992C6284CA244933A669B0
49,187,036 UART: [art] PUB.Y = A4D1C7EDEE7A87B115973A007D9C5DF7E085FC3B5B0D615B0D6AB7AA04AC64573F0BE185A81F5C0CA5AE9E4250A2DECA
49,194,289 UART: [art] SIG.R = 15BE5A5D720428A0C3E9781E20F24D85943785314CCF96A1670F1C18A7FCF42C43568693BD12EBEBC55CC560A11034C0
49,201,674 UART: [art] SIG.S = 3987044873FE99D16EC5340DCA7A8CE541550B99A5FFC185E7B39C7C7F49D12F6D76FFE5FBE8B2BB7E4781A1A448979B
50,506,156 UART: mbox::rt_entry...
50,507,121 UART: ____ _ _ _ ____ _____
50,509,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,511,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,512,914 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,514,840 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,516,728 UART: |_|
50,517,559 UART:
50,889,843 UART: [rt] Runtime listening for mailbox commands...
50,892,026 >>> mbox cmd response data (48 bytes)
50,892,588 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,894,961 >>> mbox cmd response data (48 bytes)
50,895,817 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,911,411 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,388 UART:
192,748 UART: Running Caliptra ROM ...
193,839 UART:
603,598 UART: [state] CFI Enabled
616,142 UART: [state] LifecycleState = Unprovisioned
618,082 UART: [state] DebugLocked = No
620,952 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,244 UART: [kat] SHA2-256
794,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,496 UART: [kat] ++
806,013 UART: [kat] sha1
818,092 UART: [kat] SHA2-256
820,821 UART: [kat] SHA2-384
826,835 UART: [kat] SHA2-512-ACC
829,169 UART: [kat] ECC-384
3,112,228 UART: [kat] HMAC-384Kdf
3,123,125 UART: [kat] LMS
4,313,205 UART: [kat] --
4,317,940 UART: [cold-reset] ++
4,320,440 UART: [fht] Storing FHT @ 0x50003400
4,332,192 UART: [idev] ++
4,332,747 UART: [idev] CDI.KEYID = 6
4,333,690 UART: [idev] SUBJECT.KEYID = 7
4,334,924 UART: [idev] UDS.KEYID = 0
4,335,896 ready_for_fw is high
4,336,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,220 UART: [idev] Erasing UDS.KEYID = 0
7,619,793 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,570 UART: [idev] --
7,645,795 UART: [ldev] ++
7,646,430 UART: [ldev] CDI.KEYID = 6
7,647,352 UART: [ldev] SUBJECT.KEYID = 5
7,648,581 UART: [ldev] AUTHORITY.KEYID = 7
7,649,807 UART: [ldev] FE.KEYID = 1
7,661,690 UART: [ldev] Erasing FE.KEYID = 1
10,949,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,881 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,041 UART: [ldev] --
13,308,883 UART: [fwproc] Waiting for Commands...
13,311,796 UART: [fwproc] Received command 0x46574c44
13,314,030 UART: [fwproc] Received Image of size 118548 bytes
17,424,036 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,670 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,830 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,502 >>> mbox cmd response: success
17,906,419 UART: [afmc] ++
17,907,037 UART: [afmc] CDI.KEYID = 6
17,907,951 UART: [afmc] SUBJECT.KEYID = 7
17,909,099 UART: [afmc] AUTHORITY.KEYID = 5
21,224,295 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,501 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,901 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,844 UART: [afmc] --
23,586,886 UART: [cold-reset] --
23,589,660 UART: [state] Locking Datavault
23,594,413 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,155 UART: [state] Locking ICCM
23,598,061 UART: [exit] Launching FMC @ 0x40000130
23,606,466 UART:
23,606,704 UART: Running Caliptra FMC ...
23,607,728 UART:
23,607,871 UART: [state] CFI Enabled
23,615,941 UART: [fht] FMC Alias Private Key: 7
25,956,601 UART: [art] Extend RT PCRs Done
25,957,821 UART: [art] Lock RT PCRs Done
25,959,259 UART: [art] Populate DV Done
25,964,776 UART: [fht] FMC Alias Private Key: 7
25,966,412 UART: [art] Derive CDI
25,967,140 UART: [art] Store in slot 0x4
26,009,727 UART: [art] Derive Key Pair
26,010,725 UART: [art] Store priv key in slot 0x5
29,253,183 UART: [art] Derive Key Pair - Done
29,266,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,176 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,701 UART: [art] PUB.X = 10BB57761243B1470346C2A3F4F5B18E281A4DA0F7ABFC85E6C8644C06A57B59284DF2C94A7712EF2EB6AE95E0A83C01
31,554,948 UART: [art] PUB.Y = F7A8DE57B51018FB0511AB2F38FA680BDFAAB2FE47C0C0B2750579A2C01500F167443976E6F8E99B5003E716403146C6
31,562,174 UART: [art] SIG.R = FA89FF1DA655253A36644D0C8E47C0840D6162AA54EAA260D4E9468017E6205871EFF6120E1939E0A2623AFD9C849262
31,569,559 UART: [art] SIG.S = 758DE643254D267A82D30BA3097A465BC504EE42BB1C1FAEF9080AAF0154D0395069CEC525C97662D62B97686885F61D
32,874,747 UART: Caliptra RT
32,875,445 UART: [state] CFI Enabled
33,007,966 UART: [rt] RT listening for mailbox commands...
33,010,077 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,040,917 UART: [rt]cmd =0x41545348, len=116
33,043,179 >>> mbox cmd response data (12 bytes)
35,112,205 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,218,324 UART:
35,218,685 UART: Running Caliptra ROM ...
35,219,784 UART:
35,219,940 UART: [state] CFI Enabled
35,235,441 UART: [state] LifecycleState = Unprovisioned
35,237,390 UART: [state] DebugLocked = No
35,240,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,245,862 UART: [kat] SHA2-256
35,415,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,426,108 UART: [kat] ++
35,426,560 UART: [kat] sha1
35,437,550 UART: [kat] SHA2-256
35,440,250 UART: [kat] SHA2-384
35,445,800 UART: [kat] SHA2-512-ACC
35,448,143 UART: [kat] ECC-384
37,731,605 UART: [kat] HMAC-384Kdf
37,744,110 UART: [kat] LMS
38,934,159 UART: [kat] --
38,937,283 UART: [update-reset] ++
42,705,908 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,709,526 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,982,258 >>> mbox cmd response: success
42,982,608 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,984,072 UART: [update-reset] Copying MAN_2 To MAN_1
43,006,502 UART: [update-reset Success] --
43,010,257 UART: [state] Locking Datavault
43,012,639 UART: [state] Locking PCR0, PCR1 and PCR31
43,014,391 UART: [state] Locking ICCM
43,015,780 UART: [exit] Launching FMC @ 0x40000130
43,024,225 UART:
43,024,455 UART: Running Caliptra FMC ...
43,025,551 UART:
43,025,702 UART: [state] CFI Enabled
43,069,894 UART: [art] Extend RT PCRs Done
43,071,081 UART: [art] Lock RT PCRs Done
43,072,267 UART: [art] Populate DV Done
43,077,669 UART: [fht] FMC Alias Private Key: 7
43,079,254 UART: [art] Derive CDI
43,080,120 UART: [art] Store in slot 0x4
43,122,608 UART: [art] Derive Key Pair
43,123,605 UART: [art] Store priv key in slot 0x5
46,365,785 UART: [art] Derive Key Pair - Done
46,378,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,658,719 UART: [art] Erasing AUTHORITY.KEYID = 7
48,660,223 UART: [art] PUB.X = F5E30A7AC1BECE06264EF714B2A0FE4145025E0176C7FFAC2E947BD370C9BC28FBBC0B3632C74939499ADFE20B983FBB
48,667,539 UART: [art] PUB.Y = 21D3116BBFE77FE87C0F8EDAFD46A6D6E8825709FF1C1079A817429EC446BD359E56364F41176559DE7A8BB647C56669
48,674,764 UART: [art] SIG.R = 09FB109B7331D83F871CBAEAEBCFCC70452BC976B3D75991614519A46DC4676C4B486AB7A0FC8504159939DE883C2DB9
48,682,144 UART: [art] SIG.S = 8B9FF6609B9DFEB22C4616A25AA4CB708EFCE1688DD42CEC1D2316F4DDE8BA1DC36213FC4B6D3EEC680B9AF615116924
49,986,905 UART: mbox::rt_entry...
49,987,889 UART: ____ _ _ _ ____ _____
49,989,867 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,991,863 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,993,780 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,995,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,997,616 UART: |_|
49,998,417 UART:
50,370,399 UART: [rt] Runtime listening for mailbox commands...
50,372,570 >>> mbox cmd response data (48 bytes)
50,373,118 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,375,435 >>> mbox cmd response data (48 bytes)
50,376,280 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,391,840 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
4,125,766 ready_for_fw is high
4,126,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,058 >>> mbox cmd response: success
23,795,360 UART:
23,796,234 UART: Running Caliptra FMC ...
23,797,376 UART:
23,797,603 UART: [state] CFI Enabled
23,805,107 UART: [fht] FMC Alias Private Key: 7
26,145,433 UART: [art] Extend RT PCRs Done
26,146,669 UART: [art] Lock RT PCRs Done
26,148,363 UART: [art] Populate DV Done
26,153,630 UART: [fht] FMC Alias Private Key: 7
26,155,160 UART: [art] Derive CDI
26,155,926 UART: [art] Store in slot 0x4
26,198,302 UART: [art] Derive Key Pair
26,199,301 UART: [art] Store priv key in slot 0x5
29,441,007 UART: [art] Derive Key Pair - Done
29,453,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,260 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,775 UART: [art] PUB.X = 710AC39F803AE8CB664206EC5A1A5C0631C6732678C6EDDDCAB9CC7E608884FA53862C86DABFE91393699C54AB9272D0
31,743,032 UART: [art] PUB.Y = 4A629AEFA903497CC77DA5D3855FF243676CE0A4B015214FA73F27C6F95F20F9730D4B985190231D95A204F39BE66FD1
31,750,281 UART: [art] SIG.R = 765796FD025C52809533D02F0075DC47C17F588805429DB10AE8FE147804CEB8AA67659B77E6EBD141D8ED930077987C
31,757,603 UART: [art] SIG.S = 8A9D8AE5C594A7D59638BE1D5A5A49E7588132DF0D8F629828213B1353D2CB7FB64C9C6F526C62606407E769650AE261
33,062,682 UART: Caliptra RT
33,063,389 UART: [state] CFI Enabled
33,196,346 UART: [rt] RT listening for mailbox commands...
33,198,819 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,229,594 UART: [rt]cmd =0x41545348, len=116
33,231,852 >>> mbox cmd response data (12 bytes)
35,301,042 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,274,976 >>> mbox cmd response: success
43,275,469 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,308,484 UART:
43,308,765 UART: Running Caliptra FMC ...
43,309,881 UART:
43,310,039 UART: [state] CFI Enabled
43,353,963 UART: [art] Extend RT PCRs Done
43,355,144 UART: [art] Lock RT PCRs Done
43,356,546 UART: [art] Populate DV Done
43,362,178 UART: [fht] FMC Alias Private Key: 7
43,363,718 UART: [art] Derive CDI
43,364,448 UART: [art] Store in slot 0x4
43,406,706 UART: [art] Derive Key Pair
43,407,695 UART: [art] Store priv key in slot 0x5
46,649,335 UART: [art] Derive Key Pair - Done
46,661,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,942,365 UART: [art] Erasing AUTHORITY.KEYID = 7
48,943,883 UART: [art] PUB.X = EA7A8807B84C0B76C69AB0F057EC046C7D1CE221043DDB1EC817B2F136EE5543BE4F12159290502CDAE7331B003CD695
48,951,209 UART: [art] PUB.Y = 1C54B9A4041499D349343C7CCE7D8A9918C64C7BA22AF9E1E7B8FC8786CD034E08AB38E1F2C3B8C13C4AC5669D74D3A6
48,958,394 UART: [art] SIG.R = 8E6B617FEF6B8E66F2C6761CE893FBACCB88CE6855821E2EED1E4C09A3A89BBF1A62C255984453FD31A01B7FFF642230
48,965,791 UART: [art] SIG.S = 1CF39A6CA08BC717B2CBB0B337FDAB61514C059F301760EA9389F8E437D00921DE7464283C0A524A33A1D620D582E778
50,269,851 UART: mbox::rt_entry...
50,270,816 UART: ____ _ _ _ ____ _____
50,272,799 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,274,726 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,276,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,278,518 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,280,439 UART: |_|
50,281,245 UART:
50,656,692 UART: [rt] Runtime listening for mailbox commands...
50,658,876 >>> mbox cmd response data (48 bytes)
50,659,457 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,661,768 >>> mbox cmd response data (48 bytes)
50,662,632 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,678,188 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
191,948 UART:
192,327 UART: Running Caliptra ROM ...
193,523 UART:
193,697 UART: [state] CFI Enabled
262,773 UART: [state] LifecycleState = Unprovisioned
264,767 UART: [state] DebugLocked = No
266,021 UART: [state] WD Timer not started. Device not locked for debugging
269,501 UART: [kat] SHA2-256
449,191 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,929 UART: [kat] ++
460,448 UART: [kat] sha1
471,245 UART: [kat] SHA2-256
473,966 UART: [kat] SHA2-384
479,170 UART: [kat] SHA2-512-ACC
481,533 UART: [kat] ECC-384
2,926,883 UART: [kat] HMAC-384Kdf
2,950,209 UART: [kat] LMS
3,426,736 UART: [kat] --
3,430,874 UART: [cold-reset] ++
3,433,457 UART: [fht] FHT @ 0x50003400
3,445,284 UART: [idev] ++
3,445,841 UART: [idev] CDI.KEYID = 6
3,446,790 UART: [idev] SUBJECT.KEYID = 7
3,448,028 UART: [idev] UDS.KEYID = 0
3,448,928 ready_for_fw is high
3,449,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,187 UART: [idev] Erasing UDS.KEYID = 0
5,964,999 UART: [idev] Sha1 KeyId Algorithm
5,988,924 UART: [idev] --
5,993,731 UART: [ldev] ++
5,994,301 UART: [ldev] CDI.KEYID = 6
5,995,276 UART: [ldev] SUBJECT.KEYID = 5
5,996,431 UART: [ldev] AUTHORITY.KEYID = 7
5,997,711 UART: [ldev] FE.KEYID = 1
6,036,920 UART: [ldev] Erasing FE.KEYID = 1
8,548,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,615 UART: [ldev] --
10,353,592 UART: [fwproc] Wait for Commands...
10,355,413 UART: [fwproc] Recv command 0x46574c44
10,357,400 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,991,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,320,850 >>> mbox cmd response: success
14,325,691 UART: [afmc] ++
14,326,307 UART: [afmc] CDI.KEYID = 6
14,327,198 UART: [afmc] SUBJECT.KEYID = 7
14,328,434 UART: [afmc] AUTHORITY.KEYID = 5
16,876,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,894 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,878 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,977 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,183 UART: [afmc] --
18,695,667 UART: [cold-reset] --
18,697,736 UART: [state] Locking Datavault
18,703,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,102 UART: [state] Locking ICCM
18,706,847 UART: [exit] Launching FMC @ 0x40000130
18,715,290 UART:
18,715,532 UART: Running Caliptra FMC ...
18,716,556 UART:
18,716,721 UART: [state] CFI Enabled
18,774,921 UART: [fht] FMC Alias Private Key: 7
20,542,693 UART: [art] Extend RT PCRs Done
20,543,938 UART: [art] Lock RT PCRs Done
20,545,374 UART: [art] Populate DV Done
20,550,672 UART: [fht] FMC Alias Private Key: 7
20,552,421 UART: [art] Derive CDI
20,553,226 UART: [art] Store in slot 0x4
20,608,701 UART: [art] Derive Key Pair
20,609,730 UART: [art] Store priv key in slot 0x5
23,071,605 UART: [art] Derive Key Pair - Done
23,084,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,039 UART: [art] PUB.X = D02C44987EA69DED6044BA54437562D7AD04336B7A81F243CCFE9930992423CA83D5597D09C3AD1E481A77A57DB61A8F
24,806,340 UART: [art] PUB.Y = 6C055E250AB4D5DC00A7241F15B6268A6EBDEB4FB44F434AAF794A865AEF5BEDA48231EE669598A7880E42B313F53A0F
24,813,579 UART: [art] SIG.R = 2A5C36DB94A1B94EBBFAABA0E6B29C62AB01B3D88BC78A5AF71F20CA626EDC75F50063537F09457D686BDB2E5AE9ECAF
24,821,030 UART: [art] SIG.S = 780B53187AEC9A1EC21A1A48AE1985D6D76E8151C1BF3584ED25A0F36255B3255A23D40D1529BDE2E181150F63140B6F
25,800,441 UART: Caliptra RT
25,801,154 UART: [state] CFI Enabled
25,981,938 UART: [rt] RT listening for mailbox commands...
25,984,217 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,015,275 UART: [rt]cmd =0x41545348, len=116
26,017,777 >>> mbox cmd response data (12 bytes)
28,072,419 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,178,287 UART:
28,178,645 UART: Running Caliptra ROM ...
28,179,774 UART:
28,179,940 UART: [state] CFI Enabled
28,252,603 UART: [state] LifecycleState = Unprovisioned
28,254,492 UART: [state] DebugLocked = No
28,256,894 UART: [state] WD Timer not started. Device not locked for debugging
28,261,133 UART: [kat] SHA2-256
28,440,806 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,451,572 UART: [kat] ++
28,452,106 UART: [kat] sha1
28,462,238 UART: [kat] SHA2-256
28,464,925 UART: [kat] SHA2-384
28,471,122 UART: [kat] SHA2-512-ACC
28,473,462 UART: [kat] ECC-384
30,935,496 UART: [kat] HMAC-384Kdf
30,958,910 UART: [kat] LMS
31,435,401 UART: [kat] --
31,440,109 UART: [update-reset] ++
34,489,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,493,497 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,766,111 >>> mbox cmd response: success
34,766,500 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,767,807 UART: [update-reset] Copying MAN_2 To MAN_1
34,804,927 UART: [update-reset Success] --
34,809,804 UART: [state] Locking Datavault
34,813,699 UART: [state] Locking PCR0, PCR1 and PCR31
34,815,763 UART: [state] Locking ICCM
34,817,200 UART: [exit] Launching FMC @ 0x40000130
34,825,542 UART:
34,825,773 UART: Running Caliptra FMC ...
34,826,796 UART:
34,826,942 UART: [state] CFI Enabled
34,917,091 UART: [art] Extend RT PCRs Done
34,918,279 UART: [art] Lock RT PCRs Done
34,919,812 UART: [art] Populate DV Done
34,925,396 UART: [fht] FMC Alias Private Key: 7
34,926,888 UART: [art] Derive CDI
34,927,650 UART: [art] Store in slot 0x4
34,986,340 UART: [art] Derive Key Pair
34,987,369 UART: [art] Store priv key in slot 0x5
37,450,158 UART: [art] Derive Key Pair - Done
37,463,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,176,024 UART: [art] Erasing AUTHORITY.KEYID = 7
39,177,548 UART: [art] PUB.X = 52C4B8DA27E00D4A5AC4C514CEF35B4A1EF14FE3430A4A643CB329C6B8225DE7B6251FED4DF23ABBFA4F80F27304EC6E
39,184,811 UART: [art] PUB.Y = 39CE46D236E341E9C622BE13D36A0F98C813232F9E16FB4A9FF24BC9EE96553BFA71B87982BA1A7626915B4D903D9919
39,192,101 UART: [art] SIG.R = DE92C79E76DC59E7819ABF5CC349542A89FBB2897FB1F3D9B48B6FB094D0DA86232D6BB4AF0753A33F2A04D75216B0C1
39,199,487 UART: [art] SIG.S = E90A55EBD4C5DDC62FBED7DFAA4C442A771F9F9A04A5A2DFC8BEF27BF153324AA754DB9E38C08886F069539F0186CF84
40,178,426 UART: mbox::rt_entry...
40,179,409 UART: ____ _ _ _ ____ _____
40,181,399 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,183,401 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,185,344 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,187,274 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,189,205 UART: |_|
40,190,012 UART:
40,568,385 UART: [rt] Runtime listening for mailbox commands...
40,570,605 >>> mbox cmd response data (48 bytes)
40,571,195 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,573,528 >>> mbox cmd response data (48 bytes)
40,574,377 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,589,961 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,463,712 ready_for_fw is high
3,464,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,145 >>> mbox cmd response: success
18,519,079 UART:
18,519,515 UART: Running Caliptra FMC ...
18,520,684 UART:
18,520,845 UART: [state] CFI Enabled
18,587,053 UART: [fht] FMC Alias Private Key: 7
20,353,627 UART: [art] Extend RT PCRs Done
20,354,843 UART: [art] Lock RT PCRs Done
20,356,682 UART: [art] Populate DV Done
20,362,158 UART: [fht] FMC Alias Private Key: 7
20,363,812 UART: [art] Derive CDI
20,364,629 UART: [art] Store in slot 0x4
20,419,830 UART: [art] Derive Key Pair
20,420,818 UART: [art] Store priv key in slot 0x5
22,884,095 UART: [art] Derive Key Pair - Done
22,897,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,516 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,016 UART: [art] PUB.X = B5EEC7B15B95E80F84BCDDD0DD1126A1C3B890BB18C765871ECEA3ED90FEF0E522FF9183F5FC6D97B3AA8C469F5A6430
24,618,337 UART: [art] PUB.Y = 518813194B89BE283DC0714133A3EAB5A035E10E7A21B0C1BF13E9291093D695E6490113C8CF7F1D15799E4173AD450C
24,625,567 UART: [art] SIG.R = 70755619DCB1E835835AC9AD9BEFFA03608D996566BD7DE9254CC5C66AD4C0BCF412C6D793EF960B819A193B5E5E214E
24,632,963 UART: [art] SIG.S = 2B3730A86C4DA629C64F3F2D3E1FB555129DCF8EC6E47FFD5550E382AEE5CBE8EFD6AF69A1294A0CD02054C075AF6C6D
25,611,717 UART: Caliptra RT
25,612,430 UART: [state] CFI Enabled
25,794,023 UART: [rt] RT listening for mailbox commands...
25,796,346 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,827,190 UART: [rt]cmd =0x41545348, len=116
25,829,506 >>> mbox cmd response data (12 bytes)
27,883,741 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,584,987 >>> mbox cmd response: success
34,585,483 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,621,275 UART:
34,621,664 UART: Running Caliptra FMC ...
34,622,706 UART:
34,622,857 UART: [state] CFI Enabled
34,715,582 UART: [art] Extend RT PCRs Done
34,716,778 UART: [art] Lock RT PCRs Done
34,717,983 UART: [art] Populate DV Done
34,723,451 UART: [fht] FMC Alias Private Key: 7
34,725,147 UART: [art] Derive CDI
34,725,957 UART: [art] Store in slot 0x4
34,785,058 UART: [art] Derive Key Pair
34,786,098 UART: [art] Store priv key in slot 0x5
37,248,506 UART: [art] Derive Key Pair - Done
37,261,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,974,433 UART: [art] Erasing AUTHORITY.KEYID = 7
38,975,942 UART: [art] PUB.X = F015356828D807CE165140B15A6769BAB6D77D68BB2A34FBEF1B3AD2C16BC86A6B43E14C90C55421C4E4AC1459373C0A
38,983,195 UART: [art] PUB.Y = A5D25552C8D49FCF47D8F6E153622B097F95C1DEEF899EEA806CED32993811AE3159C62886492653120E83C740011348
38,990,430 UART: [art] SIG.R = 3C91F5D0C844C9F2B3259ABE960EC771E1108375C032F9BF9B39FF3F52D76C74C9BD648FEF9C74BCB096289D5D6ED6AB
38,997,835 UART: [art] SIG.S = CFF8D6985C000AD4FD8A25D7E48F47C3F14964BBB1EDAD055E4755A3EF2585754CF1103044DD422A36A0285F506CE832
39,976,207 UART: mbox::rt_entry...
39,977,176 UART: ____ _ _ _ ____ _____
39,979,158 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,981,160 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,983,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,985,015 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,986,939 UART: |_|
39,987,925 UART:
40,356,367 UART: [rt] Runtime listening for mailbox commands...
40,358,548 >>> mbox cmd response data (48 bytes)
40,359,119 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,361,471 >>> mbox cmd response data (48 bytes)
40,362,305 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,377,874 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,552 UART:
192,928 UART: Running Caliptra ROM ...
194,112 UART:
603,869 UART: [state] CFI Enabled
617,358 UART: [state] LifecycleState = Unprovisioned
619,326 UART: [state] DebugLocked = No
621,292 UART: [state] WD Timer not started. Device not locked for debugging
625,546 UART: [kat] SHA2-256
805,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,952 UART: [kat] ++
816,483 UART: [kat] sha1
826,232 UART: [kat] SHA2-256
828,959 UART: [kat] SHA2-384
834,816 UART: [kat] SHA2-512-ACC
837,189 UART: [kat] ECC-384
3,278,878 UART: [kat] HMAC-384Kdf
3,291,140 UART: [kat] LMS
3,767,670 UART: [kat] --
3,773,622 UART: [cold-reset] ++
3,775,701 UART: [fht] FHT @ 0x50003400
3,787,140 UART: [idev] ++
3,787,781 UART: [idev] CDI.KEYID = 6
3,788,671 UART: [idev] SUBJECT.KEYID = 7
3,789,917 UART: [idev] UDS.KEYID = 0
3,790,925 ready_for_fw is high
3,791,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,094 UART: [idev] Erasing UDS.KEYID = 0
6,271,271 UART: [idev] Sha1 KeyId Algorithm
6,294,480 UART: [idev] --
6,299,208 UART: [ldev] ++
6,299,791 UART: [ldev] CDI.KEYID = 6
6,300,761 UART: [ldev] SUBJECT.KEYID = 5
6,301,944 UART: [ldev] AUTHORITY.KEYID = 7
6,303,188 UART: [ldev] FE.KEYID = 1
6,313,892 UART: [ldev] Erasing FE.KEYID = 1
8,793,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,145 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,613 UART: [ldev] --
10,587,719 UART: [fwproc] Wait for Commands...
10,590,462 UART: [fwproc] Recv command 0x46574c44
10,592,450 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,374 >>> mbox cmd response: success
14,548,946 UART: [afmc] ++
14,549,535 UART: [afmc] CDI.KEYID = 6
14,550,477 UART: [afmc] SUBJECT.KEYID = 7
14,551,693 UART: [afmc] AUTHORITY.KEYID = 5
17,054,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,190 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,788 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,008 UART: [afmc] --
18,858,078 UART: [cold-reset] --
18,861,999 UART: [state] Locking Datavault
18,866,434 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,134 UART: [state] Locking ICCM
18,870,370 UART: [exit] Launching FMC @ 0x40000130
18,878,735 UART:
18,878,976 UART: Running Caliptra FMC ...
18,880,079 UART:
18,880,241 UART: [state] CFI Enabled
18,888,509 UART: [fht] FMC Alias Private Key: 7
20,654,127 UART: [art] Extend RT PCRs Done
20,655,353 UART: [art] Lock RT PCRs Done
20,656,847 UART: [art] Populate DV Done
20,662,422 UART: [fht] FMC Alias Private Key: 7
20,664,178 UART: [art] Derive CDI
20,664,915 UART: [art] Store in slot 0x4
20,707,732 UART: [art] Derive Key Pair
20,708,774 UART: [art] Store priv key in slot 0x5
23,135,937 UART: [art] Derive Key Pair - Done
23,148,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,125 UART: [art] PUB.X = 94FE9F873F1BEB9C73D404D943A19E00314D21C25F5A426602F9432BAE0A87F42193D76BFF77F0B7942BF3081F99EDF7
24,864,387 UART: [art] PUB.Y = 424000E661732D4B399346DD898FE80C3399E5A3F70DB623FA67CB658C5772456F20F5F60972AF17A334580D84FB22F6
24,871,565 UART: [art] SIG.R = 5C88497CCFEA2A4732493BFABB658A08D665106FA0051464E157E59D1FE45FAB195274672517B0A1E1FA73106F05DC26
24,878,963 UART: [art] SIG.S = 1F46944CEBECE204BD811B895DCF560D01D9A601BBFA166253F3AF854F173F2AC1CB4118932C6BABA0B6E29F7FAA09F3
25,858,442 UART: Caliptra RT
25,859,151 UART: [state] CFI Enabled
25,991,085 UART: [rt] RT listening for mailbox commands...
25,993,447 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,024,230 UART: [rt]cmd =0x41545348, len=116
26,026,336 >>> mbox cmd response data (12 bytes)
28,087,991 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,193,905 UART:
28,194,293 UART: Running Caliptra ROM ...
28,195,433 UART:
28,195,601 UART: [state] CFI Enabled
28,209,936 UART: [state] LifecycleState = Unprovisioned
28,211,870 UART: [state] DebugLocked = No
28,213,909 UART: [state] WD Timer not started. Device not locked for debugging
28,218,087 UART: [kat] SHA2-256
28,397,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,408,563 UART: [kat] ++
28,409,159 UART: [kat] sha1
28,419,515 UART: [kat] SHA2-256
28,422,200 UART: [kat] SHA2-384
28,427,811 UART: [kat] SHA2-512-ACC
28,430,167 UART: [kat] ECC-384
30,872,462 UART: [kat] HMAC-384Kdf
30,884,749 UART: [kat] LMS
31,361,256 UART: [kat] --
31,364,866 UART: [update-reset] ++
34,424,520 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,428,326 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,700,928 >>> mbox cmd response: success
34,701,295 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,702,661 UART: [update-reset] Copying MAN_2 To MAN_1
34,739,786 UART: [update-reset Success] --
34,745,373 UART: [state] Locking Datavault
34,747,600 UART: [state] Locking PCR0, PCR1 and PCR31
34,749,303 UART: [state] Locking ICCM
34,750,754 UART: [exit] Launching FMC @ 0x40000130
34,759,154 UART:
34,759,391 UART: Running Caliptra FMC ...
34,760,494 UART:
34,760,652 UART: [state] CFI Enabled
34,804,998 UART: [art] Extend RT PCRs Done
34,806,195 UART: [art] Lock RT PCRs Done
34,807,709 UART: [art] Populate DV Done
34,813,112 UART: [fht] FMC Alias Private Key: 7
34,814,706 UART: [art] Derive CDI
34,815,516 UART: [art] Store in slot 0x4
34,858,548 UART: [art] Derive Key Pair
34,859,591 UART: [art] Store priv key in slot 0x5
37,286,492 UART: [art] Derive Key Pair - Done
37,299,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,005,986 UART: [art] Erasing AUTHORITY.KEYID = 7
39,007,495 UART: [art] PUB.X = AED2ECF11714E3184D6B7FEEDE3E0046387149CA6448AEE5CEBDFE240B13F68ACB0A6B0A483981A6FCE89A6EDFD3AA78
39,014,753 UART: [art] PUB.Y = D577EDF0B3A1AAE6BCC5F2AE3792A2CE9A7602725159F99123EC50FDEC04464BA4B9CC872C028386AC9FBDAC3CE7132B
39,022,048 UART: [art] SIG.R = B6BD73F8D14FCDCD5DAC61F5C9286040EC1A72F4A45F199FB10855F703300E88478E643598B638539CBEB6B1B73E65B4
39,029,453 UART: [art] SIG.S = 81A713BD5DDC79720DF1A14F8D95A1A5593B2EEFEA3B4FE1A4E96D4431A29297E81F99841EED65B80EEFAED2D12126B7
40,008,124 UART: mbox::rt_entry...
40,009,106 UART: ____ _ _ _ ____ _____
40,011,045 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,013,060 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,014,920 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,016,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,018,732 UART: |_|
40,019,565 UART:
40,389,110 UART: [rt] Runtime listening for mailbox commands...
40,391,282 >>> mbox cmd response data (48 bytes)
40,391,851 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,394,167 >>> mbox cmd response data (48 bytes)
40,395,025 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,410,593 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,782,737 ready_for_fw is high
3,783,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,724 >>> mbox cmd response: success
18,706,213 UART:
18,706,650 UART: Running Caliptra FMC ...
18,707,766 UART:
18,707,934 UART: [state] CFI Enabled
18,715,835 UART: [fht] FMC Alias Private Key: 7
20,482,258 UART: [art] Extend RT PCRs Done
20,483,485 UART: [art] Lock RT PCRs Done
20,485,248 UART: [art] Populate DV Done
20,490,674 UART: [fht] FMC Alias Private Key: 7
20,492,275 UART: [art] Derive CDI
20,493,096 UART: [art] Store in slot 0x4
20,536,145 UART: [art] Derive Key Pair
20,537,189 UART: [art] Store priv key in slot 0x5
22,964,472 UART: [art] Derive Key Pair - Done
22,977,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,678 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,194 UART: [art] PUB.X = 3ED62A90BA0C45EABCF82207ABB10608B640C3B6AEEBF150BFA3ED4077D4BF35F479AA67F7169268FE120CB89AE7352C
24,692,457 UART: [art] PUB.Y = 57872A85DA4DB32977D1982E18A8836F83E49A5673217DDCF16890FCE204B5940027C6B1381E67B83485684A8B6E8EEA
24,699,701 UART: [art] SIG.R = 290161946C9BB105C1F45528B33B033DA25308FD780BA663E0B5E82EBF8747C8238961E6FCE42855604030DC81193142
24,707,058 UART: [art] SIG.S = 34D31FF64834C5D36697F301A94776C1FFAFC04921178D39E3586C7E942CE6632D6D70919B0C976F1B02ED97E9486B6C
25,685,419 UART: Caliptra RT
25,686,130 UART: [state] CFI Enabled
25,818,708 UART: [rt] RT listening for mailbox commands...
25,821,139 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
25,851,988 UART: [rt]cmd =0x41545348, len=116
25,854,418 >>> mbox cmd response data (12 bytes)
27,909,571 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,524,360 >>> mbox cmd response: success
34,524,856 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,559,348 UART:
34,559,669 UART: Running Caliptra FMC ...
34,560,796 UART:
34,560,963 UART: [state] CFI Enabled
34,604,874 UART: [art] Extend RT PCRs Done
34,606,028 UART: [art] Lock RT PCRs Done
34,607,278 UART: [art] Populate DV Done
34,612,917 UART: [fht] FMC Alias Private Key: 7
34,614,518 UART: [art] Derive CDI
34,615,336 UART: [art] Store in slot 0x4
34,657,601 UART: [art] Derive Key Pair
34,658,618 UART: [art] Store priv key in slot 0x5
37,085,457 UART: [art] Derive Key Pair - Done
37,098,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,804,544 UART: [art] Erasing AUTHORITY.KEYID = 7
38,806,048 UART: [art] PUB.X = F94708F5079580C314A6DDBA05A539FE9102EC62DD9171E218588CDA86A10E8997A975410466FAAF84BE18A817C4603F
38,813,318 UART: [art] PUB.Y = 1612D44AC1D9AF686DDCD0753C7A190B8458084162B488FC3B96F44A0B36F6BCFFF427A96858CE3DDA3DF090D5762693
38,820,559 UART: [art] SIG.R = 6DD00AD8A3FB6879F0D1D3AC4568931B9406CD54A8C391AD1D162AB9A64876028209099B6D6C170ACFC471C1BDA08123
38,827,956 UART: [art] SIG.S = FD4E1AD8FC60CD8DAC8A70D7FF1DCCB10FBDE9E3DACFA293FB8E916AFEFDCC1D64932BFBE4C57348299920DB46CE5218
39,806,170 UART: mbox::rt_entry...
39,807,118 UART: ____ _ _ _ ____ _____
39,809,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,811,077 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,812,937 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,814,863 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,816,908 UART: |_|
39,817,811 UART:
40,186,689 UART: [rt] Runtime listening for mailbox commands...
40,188,832 >>> mbox cmd response data (48 bytes)
40,189,403 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,191,723 >>> mbox cmd response data (48 bytes)
40,192,573 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,208,139 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,014 UART:
192,405 UART: Running Caliptra ROM ...
193,593 UART:
193,745 UART: [state] CFI Enabled
264,216 UART: [state] LifecycleState = Unprovisioned
266,636 UART: [state] DebugLocked = No
269,054 UART: [state] WD Timer not started. Device not locked for debugging
273,599 UART: [kat] SHA2-256
463,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,244 UART: [kat] ++
474,730 UART: [kat] sha1
486,308 UART: [kat] SHA2-256
489,315 UART: [kat] SHA2-384
496,389 UART: [kat] SHA2-512-ACC
499,008 UART: [kat] ECC-384
2,948,126 UART: [kat] HMAC-384Kdf
2,972,866 UART: [kat] LMS
3,504,606 UART: [kat] --
3,510,945 UART: [cold-reset] ++
3,512,942 UART: [fht] FHT @ 0x50003400
3,524,835 UART: [idev] ++
3,525,545 UART: [idev] CDI.KEYID = 6
3,526,556 UART: [idev] SUBJECT.KEYID = 7
3,527,731 UART: [idev] UDS.KEYID = 0
3,528,652 ready_for_fw is high
3,528,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,021 UART: [idev] Erasing UDS.KEYID = 0
6,029,433 UART: [idev] Sha1 KeyId Algorithm
6,052,238 UART: [idev] --
6,057,156 UART: [ldev] ++
6,057,889 UART: [ldev] CDI.KEYID = 6
6,058,798 UART: [ldev] SUBJECT.KEYID = 5
6,059,954 UART: [ldev] AUTHORITY.KEYID = 7
6,061,183 UART: [ldev] FE.KEYID = 1
6,100,891 UART: [ldev] Erasing FE.KEYID = 1
8,604,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,338 UART: [ldev] --
10,412,444 UART: [fwproc] Wait for Commands...
10,414,212 UART: [fwproc] Recv command 0x46574c44
10,416,525 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,688,518 >>> mbox cmd response: success
14,692,670 UART: [afmc] ++
14,693,406 UART: [afmc] CDI.KEYID = 6
14,694,602 UART: [afmc] SUBJECT.KEYID = 7
14,696,042 UART: [afmc] AUTHORITY.KEYID = 5
17,234,292 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,207 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,133 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,337 UART: [afmc] --
19,035,141 UART: [cold-reset] --
19,038,948 UART: [state] Locking Datavault
19,044,035 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,192 UART: [state] Locking ICCM
19,048,777 UART: [exit] Launching FMC @ 0x40000130
19,057,407 UART:
19,057,683 UART: Running Caliptra FMC ...
19,058,793 UART:
19,058,958 UART: [state] CFI Enabled
19,115,930 UART: [fht] FMC Alias Private Key: 7
20,881,647 UART: [art] Extend RT PCRs Done
20,882,864 UART: [art] Lock RT PCRs Done
20,884,485 UART: [art] Populate DV Done
20,889,889 UART: [fht] FMC Alias Private Key: 7
20,891,485 UART: [art] Derive CDI
20,892,224 UART: [art] Store in slot 0x4
20,948,720 UART: [art] Derive Key Pair
20,949,755 UART: [art] Store priv key in slot 0x5
23,412,781 UART: [art] Derive Key Pair - Done
23,425,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,297 UART: [art] PUB.X = 24620601F72C05E528662586D6BFFC5089898B55A5F5BD2718F6466374CE5952F0B8F231D27415D46F853E3F16453F66
25,147,568 UART: [art] PUB.Y = 90A136A5546DE8543173A66C9294545F62C775F8739C0075D66B807CCDB28CC742FDBA8A230550C2D8FA3A6008AA8559
25,154,755 UART: [art] SIG.R = 48FBA9DC1AD2A5AAFFBA3FBA6EBE9DB87D6AFAD5736DA4813DF82484AC3ECECB5BC04E46344E294575F5D8B5127EAC7C
25,162,207 UART: [art] SIG.S = 1E5C7227965A064B4D8ED2EBF92422A8B5F4B180594E0C3A00A4CBC24044A02311B28562DDF3D76405A6B9DA8B8BBAB8
26,141,307 UART: Caliptra RT
26,142,023 UART: [state] CFI Enabled
26,322,645 UART: [rt] RT listening for mailbox commands...
26,325,107 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,356,135 UART: [rt]cmd =0x41545348, len=116
26,358,640 >>> mbox cmd response data (12 bytes)
28,419,471 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,525,469 UART:
28,525,826 UART: Running Caliptra ROM ...
28,526,886 UART:
28,527,035 UART: [state] CFI Enabled
28,594,601 UART: [state] LifecycleState = Unprovisioned
28,596,729 UART: [state] DebugLocked = No
28,599,381 UART: [state] WD Timer not started. Device not locked for debugging
28,603,234 UART: [kat] SHA2-256
28,793,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,803,835 UART: [kat] ++
28,804,291 UART: [kat] sha1
28,816,696 UART: [kat] SHA2-256
28,819,706 UART: [kat] SHA2-384
28,825,316 UART: [kat] SHA2-512-ACC
28,827,929 UART: [kat] ECC-384
31,278,887 UART: [kat] HMAC-384Kdf
31,300,885 UART: [kat] LMS
31,832,449 UART: [kat] --
31,836,651 UART: [update-reset] ++
34,913,960 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,917,933 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,333,422 >>> mbox cmd response: success
35,334,453 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,334,765 UART: [update-reset] Copying MAN_2 To MAN_1
35,371,493 UART: [update-reset Success] --
35,376,040 UART: [state] Locking Datavault
35,380,619 UART: [state] Locking PCR0, PCR1 and PCR31
35,382,830 UART: [state] Locking ICCM
35,385,764 UART: [exit] Launching FMC @ 0x40000130
35,394,424 UART:
35,394,658 UART: Running Caliptra FMC ...
35,395,680 UART:
35,395,824 UART: [state] CFI Enabled
35,495,736 UART: [art] Extend RT PCRs Done
35,497,196 UART: [art] Lock RT PCRs Done
35,498,200 UART: [art] Populate DV Done
35,503,637 UART: [fht] FMC Alias Private Key: 7
35,505,300 UART: [art] Derive CDI
35,506,122 UART: [art] Store in slot 0x4
35,564,995 UART: [art] Derive Key Pair
35,566,127 UART: [art] Store priv key in slot 0x5
38,029,277 UART: [art] Derive Key Pair - Done
38,042,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,754,931 UART: [art] Erasing AUTHORITY.KEYID = 7
39,756,989 UART: [art] PUB.X = 2B5E2B7FB3C535B9262B59714C88CAFE27EB34EDB82EDC3CEFD654978EF6CE6E61174021F89869A760194668C92787CB
39,763,749 UART: [art] PUB.Y = B4F94C7A01286E53EF4D48FF1176A98D100282E79A3E73724BDE5AD48EC05A7B791B9EC2E534A9DDD7346E4DC3754EE0
39,770,997 UART: [art] SIG.R = 728D4BB0DC04895A31A610826D1356B8058D5F31FBC61CE99B0D24844B6600012D5D49BFAEB8C6718C04C6FD40D2B4E4
39,778,401 UART: [art] SIG.S = B26EB5E7343B24FED07D807F34D0D601745730D66DE814A30D0999118440ACF0FD451D34CB80BE4B583612CFFB26360C
40,756,398 UART: mbox::rt_entry...
40,757,352 UART: ____ _ _ _ ____ _____
40,759,328 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,761,333 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,763,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,765,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,767,071 UART: |_|
40,767,882 UART:
41,140,457 UART: [rt] Runtime listening for mailbox commands...
41,142,682 >>> mbox cmd response data (48 bytes)
41,143,318 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,145,663 >>> mbox cmd response data (48 bytes)
41,146,523 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,162,100 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,439,459 ready_for_fw is high
3,440,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,194 >>> mbox cmd response: success
19,110,041 UART:
19,110,563 UART: Running Caliptra FMC ...
19,111,674 UART:
19,111,827 UART: [state] CFI Enabled
19,180,111 UART: [fht] FMC Alias Private Key: 7
20,946,172 UART: [art] Extend RT PCRs Done
20,947,398 UART: [art] Lock RT PCRs Done
20,949,323 UART: [art] Populate DV Done
20,954,907 UART: [fht] FMC Alias Private Key: 7
20,956,391 UART: [art] Derive CDI
20,957,124 UART: [art] Store in slot 0x4
21,013,300 UART: [art] Derive Key Pair
21,014,359 UART: [art] Store priv key in slot 0x5
23,477,363 UART: [art] Derive Key Pair - Done
23,490,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,163 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,807 UART: [art] PUB.X = 41587295A7A576E52B66A9612747214A40E526F875120A34EFA156C5A4501D6960D162660CD0974ED76C8D4067B204E7
25,211,953 UART: [art] PUB.Y = BB21F54A92B78AB233A027EA8E68694DB6B1CA0D57612513EB995B267E857CDF22438E155E73DDDF529E31FAD79670B4
25,219,181 UART: [art] SIG.R = F2D28EE8213301E5A627115C0D699863EABBDBCB756C636D45859F18A1C3EA5FB477F0FC40A6208A2E6ED11B50386CAC
25,226,561 UART: [art] SIG.S = 1F8280A10319C1CBA82AC04C62CB60F0F0E1D66167BCC6BD4BA7E78BE65042AA6D5C0843F15B092CE3E3F404EEACF137
26,205,607 UART: Caliptra RT
26,206,296 UART: [state] CFI Enabled
26,387,452 UART: [rt] RT listening for mailbox commands...
26,389,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,420,861 UART: [rt]cmd =0x41545348, len=116
26,422,837 >>> mbox cmd response data (12 bytes)
28,482,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,586,525 >>> mbox cmd response: success
35,587,030 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,620,240 UART:
35,620,685 UART: Running Caliptra FMC ...
35,621,729 UART:
35,621,882 UART: [state] CFI Enabled
35,727,912 UART: [art] Extend RT PCRs Done
35,729,103 UART: [art] Lock RT PCRs Done
35,730,711 UART: [art] Populate DV Done
35,736,122 UART: [fht] FMC Alias Private Key: 7
35,737,820 UART: [art] Derive CDI
35,738,632 UART: [art] Store in slot 0x4
35,797,221 UART: [art] Derive Key Pair
35,798,286 UART: [art] Store priv key in slot 0x5
38,260,815 UART: [art] Derive Key Pair - Done
38,273,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,987,838 UART: [art] Erasing AUTHORITY.KEYID = 7
39,989,353 UART: [art] PUB.X = 079140B6B56023621066D5C9A8F293DA787CD7488769EC772B4310AEF544BF02C386F467DABCB7F658AFFD3F9FA33947
39,996,600 UART: [art] PUB.Y = 00482D201DB2F72B256D8ADAED932F2EB9180CBB1FA12E15EF9FD3D70BCD6B95D92EB76A97976E74DC74BF90F4B0B918
40,003,832 UART: [art] SIG.R = F93385335EABC645CE34ACEEF4F213AF3C18EAD9BCD81FA811665FB78BD0700CD19E4CEFEF8E0083BF46014EFCA54FC6
40,011,317 UART: [art] SIG.S = BE4C7C6E1C870E0DCC03198BD5F168AA4821DF8EF220207D8172684A42B5D54DEBE9005E4ECA786AF542A7E80C777A2E
40,990,181 UART: mbox::rt_entry...
40,991,112 UART: ____ _ _ _ ____ _____
40,993,093 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,995,097 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,997,029 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,998,957 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
41,000,882 UART: |_|
41,001,695 UART:
41,373,455 UART: [rt] Runtime listening for mailbox commands...
41,375,636 >>> mbox cmd response data (48 bytes)
41,376,212 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,378,571 >>> mbox cmd response data (48 bytes)
41,379,424 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,394,991 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,527 UART:
192,893 UART: Running Caliptra ROM ...
194,013 UART:
603,777 UART: [state] CFI Enabled
618,600 UART: [state] LifecycleState = Unprovisioned
620,919 UART: [state] DebugLocked = No
622,586 UART: [state] WD Timer not started. Device not locked for debugging
626,731 UART: [kat] SHA2-256
816,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,426 UART: [kat] ++
827,950 UART: [kat] sha1
839,250 UART: [kat] SHA2-256
842,264 UART: [kat] SHA2-384
847,979 UART: [kat] SHA2-512-ACC
850,566 UART: [kat] ECC-384
3,289,780 UART: [kat] HMAC-384Kdf
3,301,452 UART: [kat] LMS
3,833,286 UART: [kat] --
3,838,486 UART: [cold-reset] ++
3,840,493 UART: [fht] FHT @ 0x50003400
3,851,123 UART: [idev] ++
3,851,758 UART: [idev] CDI.KEYID = 6
3,852,747 UART: [idev] SUBJECT.KEYID = 7
3,853,942 UART: [idev] UDS.KEYID = 0
3,854,873 ready_for_fw is high
3,855,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,937 UART: [idev] Erasing UDS.KEYID = 0
6,334,236 UART: [idev] Sha1 KeyId Algorithm
6,355,855 UART: [idev] --
6,360,878 UART: [ldev] ++
6,361,561 UART: [ldev] CDI.KEYID = 6
6,362,475 UART: [ldev] SUBJECT.KEYID = 5
6,363,691 UART: [ldev] AUTHORITY.KEYID = 7
6,364,869 UART: [ldev] FE.KEYID = 1
6,375,518 UART: [ldev] Erasing FE.KEYID = 1
8,851,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,541 UART: [ldev] --
10,644,275 UART: [fwproc] Wait for Commands...
10,647,288 UART: [fwproc] Recv command 0x46574c44
10,649,599 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,480 >>> mbox cmd response: success
14,914,235 UART: [afmc] ++
14,914,943 UART: [afmc] CDI.KEYID = 6
14,916,134 UART: [afmc] SUBJECT.KEYID = 7
14,917,582 UART: [afmc] AUTHORITY.KEYID = 5
17,423,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,385 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,526 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,489 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,636 UART: [afmc] --
19,221,643 UART: [cold-reset] --
19,226,383 UART: [state] Locking Datavault
19,231,273 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,439 UART: [state] Locking ICCM
19,235,329 UART: [exit] Launching FMC @ 0x40000130
19,243,969 UART:
19,244,208 UART: Running Caliptra FMC ...
19,245,315 UART:
19,245,478 UART: [state] CFI Enabled
19,253,692 UART: [fht] FMC Alias Private Key: 7
21,020,411 UART: [art] Extend RT PCRs Done
21,021,640 UART: [art] Lock RT PCRs Done
21,023,507 UART: [art] Populate DV Done
21,028,931 UART: [fht] FMC Alias Private Key: 7
21,030,475 UART: [art] Derive CDI
21,031,439 UART: [art] Store in slot 0x4
21,073,858 UART: [art] Derive Key Pair
21,074,868 UART: [art] Store priv key in slot 0x5
23,501,645 UART: [art] Derive Key Pair - Done
23,514,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,189 UART: [art] PUB.X = 7C39C58E46A834D5B0DA24D5A2918ACD37E72D0A584CB53AB8F14E24CC1CD8129B04367141FC44D2334CCFEBAA304027
25,229,460 UART: [art] PUB.Y = 4BE33DC5BB2502818ACDDDA66FC046FF86860811285E1D6FF7F7031AF3BCA615EC2B4C344BAB5CBAA28E5EA592FB2D28
25,236,772 UART: [art] SIG.R = B63E6708B12884712DAF9BDA01A78F27C0BB80D61A41C9668F39006D3485F01FF186DAFB89EA4362F67ABDB36EEB1CF1
25,244,142 UART: [art] SIG.S = 0E3F91707D79380AFFECA87B32937D65AF20FE5F7F2AB708309FF3F73EF2AFDF926720D82CC7C0893E77FBE07C06E938
26,222,733 UART: Caliptra RT
26,223,450 UART: [state] CFI Enabled
26,355,314 UART: [rt] RT listening for mailbox commands...
26,357,589 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,388,706 UART: [rt]cmd =0x41545348, len=116
26,390,852 >>> mbox cmd response data (12 bytes)
28,455,850 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,561,718 UART:
28,562,088 UART: Running Caliptra ROM ...
28,563,193 UART:
28,563,361 UART: [state] CFI Enabled
28,578,844 UART: [state] LifecycleState = Unprovisioned
28,580,737 UART: [state] DebugLocked = No
28,581,954 UART: [state] WD Timer not started. Device not locked for debugging
28,586,560 UART: [kat] SHA2-256
28,776,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,787,179 UART: [kat] ++
28,787,777 UART: [kat] sha1
28,799,207 UART: [kat] SHA2-256
28,802,221 UART: [kat] SHA2-384
28,808,389 UART: [kat] SHA2-512-ACC
28,810,960 UART: [kat] ECC-384
31,252,954 UART: [kat] HMAC-384Kdf
31,265,853 UART: [kat] LMS
31,797,482 UART: [kat] --
31,802,824 UART: [update-reset] ++
34,868,627 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,872,382 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,287,808 >>> mbox cmd response: success
35,288,191 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,289,182 UART: [update-reset] Copying MAN_2 To MAN_1
35,326,729 UART: [update-reset Success] --
35,332,005 UART: [state] Locking Datavault
35,334,462 UART: [state] Locking PCR0, PCR1 and PCR31
35,336,620 UART: [state] Locking ICCM
35,338,624 UART: [exit] Launching FMC @ 0x40000130
35,347,256 UART:
35,347,492 UART: Running Caliptra FMC ...
35,348,521 UART:
35,348,672 UART: [state] CFI Enabled
35,392,867 UART: [art] Extend RT PCRs Done
35,394,051 UART: [art] Lock RT PCRs Done
35,395,706 UART: [art] Populate DV Done
35,401,167 UART: [fht] FMC Alias Private Key: 7
35,402,866 UART: [art] Derive CDI
35,403,603 UART: [art] Store in slot 0x4
35,446,628 UART: [art] Derive Key Pair
35,447,684 UART: [art] Store priv key in slot 0x5
37,874,286 UART: [art] Derive Key Pair - Done
37,887,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,593,331 UART: [art] Erasing AUTHORITY.KEYID = 7
39,594,927 UART: [art] PUB.X = B4CE1B30D69864F26F59D6AC2F38AD76F788E132C87C36469AFC6BAEB985F28323787244A00185431ECBC47620A467B0
39,602,036 UART: [art] PUB.Y = 3F6FAC693E76EDC30565D36F1BFBBC1986BA0B51A0D6778163AB2555DA590E27CCF9EA4332F46A888CF2C541D062B7C6
39,609,347 UART: [art] SIG.R = 64018416087F0102954D13399C5049C92C8359542EC93519B94454396C62AB1B209958130AA33B0D40916CC8E9DF3717
39,616,662 UART: [art] SIG.S = B570E95DD593C8A2D96049BB4DABC36BE551D9E6976C592846F55CF0272813611E18836026994FA349F173D543B506F3
40,595,483 UART: mbox::rt_entry...
40,596,432 UART: ____ _ _ _ ____ _____
40,598,416 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,600,432 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,602,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,604,300 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,606,231 UART: |_|
40,607,072 UART:
40,979,013 UART: [rt] Runtime listening for mailbox commands...
40,981,189 >>> mbox cmd response data (48 bytes)
40,981,792 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,984,133 >>> mbox cmd response data (48 bytes)
40,984,997 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,000,569 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,760,129 ready_for_fw is high
3,760,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,055,963 >>> mbox cmd response: success
19,310,178 UART:
19,310,557 UART: Running Caliptra FMC ...
19,311,718 UART:
19,311,888 UART: [state] CFI Enabled
19,320,211 UART: [fht] FMC Alias Private Key: 7
21,085,867 UART: [art] Extend RT PCRs Done
21,087,096 UART: [art] Lock RT PCRs Done
21,088,947 UART: [art] Populate DV Done
21,094,590 UART: [fht] FMC Alias Private Key: 7
21,096,297 UART: [art] Derive CDI
21,097,125 UART: [art] Store in slot 0x4
21,139,731 UART: [art] Derive Key Pair
21,140,735 UART: [art] Store priv key in slot 0x5
23,567,476 UART: [art] Derive Key Pair - Done
23,580,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,892 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,403 UART: [art] PUB.X = 9C6897E3110ED37EEBCE1C98DF51FD2877D17B54EC44CEBC169B19B755E3B9539878E1D5C143E1DEE6CDF35339EDD7B5
25,295,611 UART: [art] PUB.Y = 4F9BBC7D6A428282A2DC92D93095F7DC7199C831D4FBE08175943BC8AA71E7A248898D952041524FFC9C553B1AB833FE
25,302,913 UART: [art] SIG.R = F6E846118713777D869DBC71C03D018B92CD8189A313534452EC0B61B471586E134D6240D97392CC26FFE33C6EE84950
25,310,309 UART: [art] SIG.S = FD405269C4C084994FE5FF2B95E01563D12BBB9DFCAC3B8F3FA471F118E5F3C5BD2E505C697C1C527A4A1885C98277D1
26,288,627 UART: Caliptra RT
26,289,334 UART: [state] CFI Enabled
26,421,631 UART: [rt] RT listening for mailbox commands...
26,423,848 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
26,454,759 UART: [rt]cmd =0x41545348, len=116
26,456,790 >>> mbox cmd response data (12 bytes)
28,520,013 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,532,711 >>> mbox cmd response: success
35,533,273 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,568,195 UART:
35,568,536 UART: Running Caliptra FMC ...
35,569,587 UART:
35,569,740 UART: [state] CFI Enabled
35,613,926 UART: [art] Extend RT PCRs Done
35,615,076 UART: [art] Lock RT PCRs Done
35,616,686 UART: [art] Populate DV Done
35,622,267 UART: [fht] FMC Alias Private Key: 7
35,623,814 UART: [art] Derive CDI
35,624,549 UART: [art] Store in slot 0x4
35,667,205 UART: [art] Derive Key Pair
35,668,250 UART: [art] Store priv key in slot 0x5
38,094,706 UART: [art] Derive Key Pair - Done
38,107,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,813,615 UART: [art] Erasing AUTHORITY.KEYID = 7
39,815,127 UART: [art] PUB.X = 0DECC1B7B0505F7537ABBB509255F19738C366B5F384ABA1A25651602019235510A0EA73DC9BF07628DCA1029CC06D8D
39,822,401 UART: [art] PUB.Y = 4DECCCD6B3984FCEB62280CE5987DA1727D9A6A845D7AC9B56CF6E70FF0060CFF1578EB0A961079672DA1CD7F60DB9D3
39,829,618 UART: [art] SIG.R = 34ACA515ECBF81709B13813D8CC04ED1171CDB7D4893CD9B3F9C75D862BC1662BF753EDC432C063F37255BC33B1932E1
39,837,042 UART: [art] SIG.S = 08F55965739B4BA956969F83594FBFB5C1FD0B4803CC48906399458700163697ACB3BB7EBC3C99D0481DCA3BED8C709D
40,815,423 UART: mbox::rt_entry...
40,816,385 UART: ____ _ _ _ ____ _____
40,818,319 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,820,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,822,267 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,824,198 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,826,128 UART: |_|
40,826,938 UART:
41,192,774 UART: [rt] Runtime listening for mailbox commands...
41,194,951 >>> mbox cmd response data (48 bytes)
41,195,529 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,197,852 >>> mbox cmd response data (48 bytes)
41,198,720 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,214,286 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,183 UART: [kat] SHA2-256
892,121 UART: [kat] SHA2-384
894,752 UART: [kat] SHA2-512-ACC
896,653 UART: [kat] ECC-384
902,278 UART: [kat] HMAC-384Kdf
906,842 UART: [kat] LMS
1,475,038 UART: [kat] --
1,475,747 UART: [cold-reset] ++
1,476,255 UART: [fht] Storing FHT @ 0x50003400
1,478,882 UART: [idev] ++
1,479,050 UART: [idev] CDI.KEYID = 6
1,479,410 UART: [idev] SUBJECT.KEYID = 7
1,479,834 UART: [idev] UDS.KEYID = 0
1,480,179 ready_for_fw is high
1,480,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,648 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,438 UART: [idev] --
1,514,409 UART: [ldev] ++
1,514,577 UART: [ldev] CDI.KEYID = 6
1,514,940 UART: [ldev] SUBJECT.KEYID = 5
1,515,366 UART: [ldev] AUTHORITY.KEYID = 7
1,515,829 UART: [ldev] FE.KEYID = 1
1,520,929 UART: [ldev] Erasing FE.KEYID = 1
1,546,082 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,860 UART: [ldev] --
1,585,165 UART: [fwproc] Waiting for Commands...
1,585,886 UART: [fwproc] Received command 0x46574c44
1,586,677 UART: [fwproc] Received Image of size 118548 bytes
2,932,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,703 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,921 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,346 >>> mbox cmd response: success
3,132,540 UART: [afmc] ++
3,132,708 UART: [afmc] CDI.KEYID = 6
3,133,070 UART: [afmc] SUBJECT.KEYID = 7
3,133,495 UART: [afmc] AUTHORITY.KEYID = 5
3,168,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,888 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,668 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,377 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,260 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,943 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,901 UART: [afmc] --
3,212,027 UART: [cold-reset] --
3,212,819 UART: [state] Locking Datavault
3,213,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,562 UART: [state] Locking ICCM
3,215,042 UART: [exit] Launching FMC @ 0x40000130
3,220,372 UART:
3,220,388 UART: Running Caliptra FMC ...
3,220,796 UART:
3,220,850 UART: [state] CFI Enabled
3,231,226 UART: [fht] FMC Alias Private Key: 7
3,349,874 UART: [art] Extend RT PCRs Done
3,350,302 UART: [art] Lock RT PCRs Done
3,351,990 UART: [art] Populate DV Done
3,360,049 UART: [fht] FMC Alias Private Key: 7
3,361,093 UART: [art] Derive CDI
3,361,373 UART: [art] Store in slot 0x4
3,447,229 UART: [art] Derive Key Pair
3,447,589 UART: [art] Store priv key in slot 0x5
3,460,520 UART: [art] Derive Key Pair - Done
3,475,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,839 UART: [art] PUB.X = 516277B118938D76E6A5E1F2DC97C168B5932A6E267DC78F4EEBB00A08D2FA143F5CC8AA0EF116A396A8231563A3D82D
3,498,608 UART: [art] PUB.Y = EE05E1EF82B63897EAC985C1FCD010FC608F3E9E5E442DFD2CAFFDCC8A35FB24B410EC6286F5DDF675AF63AB85B61628
3,505,581 UART: [art] SIG.R = 4813BC91A4A079563F8E99BB844EBA7012769B8EF7D8785E637B006EF1F3B4F2CF8EB5E0B573E967B636C045B00BB99E
3,512,334 UART: [art] SIG.S = 2CFAE719478979CE9FCE7966A6C6F8E030AA11E28C121EBCBC2568D8A74A7EE98FF464729D23F44702EF1B9D357152E1
3,536,115 UART: Caliptra RT
3,536,366 UART: [state] CFI Enabled
3,656,805 UART: [rt] RT listening for mailbox commands...
3,657,475 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,137 UART: [rt]cmd =0x41545348, len=116
3,689,866 >>> mbox cmd response data (12 bytes)
3,689,867 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,441 UART:
3,690,457 UART: Running Caliptra ROM ...
3,690,865 UART:
3,690,919 UART: [state] CFI Enabled
3,693,379 UART: [state] LifecycleState = Unprovisioned
3,694,034 UART: [state] DebugLocked = No
3,694,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,319 UART: [kat] SHA2-256
4,490,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,365 UART: [kat] ++
4,494,517 UART: [kat] sha1
4,498,647 UART: [kat] SHA2-256
4,500,585 UART: [kat] SHA2-384
4,503,434 UART: [kat] SHA2-512-ACC
4,505,334 UART: [kat] ECC-384
4,511,041 UART: [kat] HMAC-384Kdf
4,515,551 UART: [kat] LMS
5,083,747 UART: [kat] --
5,084,632 UART: [update-reset] ++
6,057,389 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,058,629 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,160,322 >>> mbox cmd response: success
6,160,322 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,160,617 UART: [update-reset] Copying MAN_2 To MAN_1
6,168,631 UART: [update-reset Success] --
6,169,544 UART: [state] Locking Datavault
6,170,138 UART: [state] Locking PCR0, PCR1 and PCR31
6,170,742 UART: [state] Locking ICCM
6,171,304 UART: [exit] Launching FMC @ 0x40000130
6,176,634 UART:
6,176,650 UART: Running Caliptra FMC ...
6,177,058 UART:
6,177,112 UART: [state] CFI Enabled
6,266,049 UART: [art] Extend RT PCRs Done
6,266,477 UART: [art] Lock RT PCRs Done
6,267,920 UART: [art] Populate DV Done
6,276,261 UART: [fht] FMC Alias Private Key: 7
6,277,389 UART: [art] Derive CDI
6,277,669 UART: [art] Store in slot 0x4
6,363,531 UART: [art] Derive Key Pair
6,363,891 UART: [art] Store priv key in slot 0x5
6,377,022 UART: [art] Derive Key Pair - Done
6,392,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,407,670 UART: [art] Erasing AUTHORITY.KEYID = 7
6,408,435 UART: [art] PUB.X = D0029FB6676127ADAA23985B261FCE45662A2012000B6B67FE506BEB2817E50A7E63C112C5A708ACF0495847C78DC5EE
6,415,175 UART: [art] PUB.Y = 8EAB16072884A823F6E994399E28B52B801DBCED8D118D3D0F6C8FD0A3780513DB9130DFBC4CC906BC8B72C1309AE05D
6,422,125 UART: [art] SIG.R = F450AA8B47EBBC44015647DA259B1FF418A62414601548610D7EC5AFB0B899D36BD107969200FD1A7920972BF1CED2A8
6,428,868 UART: [art] SIG.S = 62020BE5DB158FDF10F289CF2BA99E2A858FF80D6AD750A0CE12204FCE3C8FE4EB87D49F1FE283EE856A2CB706AF8DBE
6,452,442 UART: mbox::rt_entry...
6,452,814 UART: ____ _ _ _ ____ _____
6,453,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,454,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,455,166 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,455,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,456,702 UART: |_|
6,457,014 UART:
6,822,597 UART: [rt] Runtime listening for mailbox commands...
6,823,795 >>> mbox cmd response data (48 bytes)
6,823,796 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,826,583 >>> mbox cmd response data (48 bytes)
6,826,584 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,842,530 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,937 ready_for_fw is high
1,361,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,908 >>> mbox cmd response: success
3,039,487 UART:
3,039,503 UART: Running Caliptra FMC ...
3,039,911 UART:
3,039,965 UART: [state] CFI Enabled
3,050,707 UART: [fht] FMC Alias Private Key: 7
3,169,171 UART: [art] Extend RT PCRs Done
3,169,599 UART: [art] Lock RT PCRs Done
3,171,253 UART: [art] Populate DV Done
3,179,300 UART: [fht] FMC Alias Private Key: 7
3,180,468 UART: [art] Derive CDI
3,180,748 UART: [art] Store in slot 0x4
3,266,416 UART: [art] Derive Key Pair
3,266,776 UART: [art] Store priv key in slot 0x5
3,280,295 UART: [art] Derive Key Pair - Done
3,294,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,181 UART: [art] Erasing AUTHORITY.KEYID = 7
3,310,946 UART: [art] PUB.X = C06BE29D0473D059A6CA9DC99AC2904EA7A87B43E4A00FFF7A8443D34D1FA8AC7EF0B566529E28F330D9026160A1C664
3,317,717 UART: [art] PUB.Y = 4D33A33D3A35098EE591EF8466D4ABE7880B5BC72FD844D6549D9E815DA4FC2E18F6B113057B0C2586A9EC7743964D4B
3,324,661 UART: [art] SIG.R = D9C786C9A2D18E1EFCCC7B087C70D12B947906E07C0C7F8FA644F698D963B3B4475E2509D69F76E419454CC4A824049D
3,331,420 UART: [art] SIG.S = BC2CAF4CD7C1365568335FF6C680F33EB06A7BE93043669926433F6B19129DCC9E11CAC1F699BC8C84233B7F9B3C582B
3,355,228 UART: Caliptra RT
3,355,479 UART: [state] CFI Enabled
3,475,110 UART: [rt] RT listening for mailbox commands...
3,475,780 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,302 UART: [rt]cmd =0x41545348, len=116
3,508,195 >>> mbox cmd response data (12 bytes)
3,508,196 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,859,613 >>> mbox cmd response: success
5,859,613 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,873,287 UART:
5,873,303 UART: Running Caliptra FMC ...
5,873,711 UART:
5,873,765 UART: [state] CFI Enabled
5,962,892 UART: [art] Extend RT PCRs Done
5,963,320 UART: [art] Lock RT PCRs Done
5,964,323 UART: [art] Populate DV Done
5,972,704 UART: [fht] FMC Alias Private Key: 7
5,973,760 UART: [art] Derive CDI
5,974,040 UART: [art] Store in slot 0x4
6,059,834 UART: [art] Derive Key Pair
6,060,194 UART: [art] Store priv key in slot 0x5
6,074,047 UART: [art] Derive Key Pair - Done
6,088,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,104,404 UART: [art] Erasing AUTHORITY.KEYID = 7
6,105,169 UART: [art] PUB.X = ABB5B37EFFA2806CAAD0D60681E9B335E1DEC1B465E49D9993B8333DDEFA859F2D9A8314A4BDD66D965913DF4AB154F7
6,111,956 UART: [art] PUB.Y = 3F1F9C3415F592F0C954FC76C493FADFD1915D167215F972FFD7EA6CE264218215AA2F906753696FADBFE92B1018D65C
6,118,914 UART: [art] SIG.R = 74FDCC194DC3037B734A3E58FB8E1E73031A2F96D72E176BF79640403F809101D34742681ACE6348E647BCE4FAC5335D
6,125,677 UART: [art] SIG.S = EB1BFBB12FB189816747A2E75412FA1C307F950091C441094245D0D11FEE65DD678EA8B6271A2A695CF1EE40403E3F40
6,149,520 UART: mbox::rt_entry...
6,149,892 UART: ____ _ _ _ ____ _____
6,150,676 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,151,476 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,152,244 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,153,012 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,153,780 UART: |_|
6,154,092 UART:
6,521,547 UART: [rt] Runtime listening for mailbox commands...
6,522,745 >>> mbox cmd response data (48 bytes)
6,522,746 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,525,533 >>> mbox cmd response data (48 bytes)
6,525,534 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,541,480 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,642 UART: [kat] SHA2-256
881,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,688 UART: [kat] ++
885,840 UART: [kat] sha1
890,066 UART: [kat] SHA2-256
892,004 UART: [kat] SHA2-384
894,659 UART: [kat] SHA2-512-ACC
896,560 UART: [kat] ECC-384
902,325 UART: [kat] HMAC-384Kdf
906,787 UART: [kat] LMS
1,474,983 UART: [kat] --
1,475,904 UART: [cold-reset] ++
1,476,258 UART: [fht] Storing FHT @ 0x50003400
1,479,161 UART: [idev] ++
1,479,329 UART: [idev] CDI.KEYID = 6
1,479,689 UART: [idev] SUBJECT.KEYID = 7
1,480,113 UART: [idev] UDS.KEYID = 0
1,480,458 ready_for_fw is high
1,480,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,293 UART: [idev] Erasing UDS.KEYID = 0
1,505,027 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,767 UART: [idev] --
1,514,858 UART: [ldev] ++
1,515,026 UART: [ldev] CDI.KEYID = 6
1,515,389 UART: [ldev] SUBJECT.KEYID = 5
1,515,815 UART: [ldev] AUTHORITY.KEYID = 7
1,516,278 UART: [ldev] FE.KEYID = 1
1,521,936 UART: [ldev] Erasing FE.KEYID = 1
1,547,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,879 UART: [ldev] --
1,587,360 UART: [fwproc] Waiting for Commands...
1,588,183 UART: [fwproc] Received command 0x46574c44
1,588,974 UART: [fwproc] Received Image of size 118548 bytes
2,933,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,600 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,113 >>> mbox cmd response: success
3,133,241 UART: [afmc] ++
3,133,409 UART: [afmc] CDI.KEYID = 6
3,133,771 UART: [afmc] SUBJECT.KEYID = 7
3,134,196 UART: [afmc] AUTHORITY.KEYID = 5
3,169,027 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,445 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,817 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,500 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,562 UART: [afmc] --
3,212,502 UART: [cold-reset] --
3,213,450 UART: [state] Locking Datavault
3,214,469 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,073 UART: [state] Locking ICCM
3,215,579 UART: [exit] Launching FMC @ 0x40000130
3,220,909 UART:
3,220,925 UART: Running Caliptra FMC ...
3,221,333 UART:
3,221,476 UART: [state] CFI Enabled
3,232,314 UART: [fht] FMC Alias Private Key: 7
3,351,504 UART: [art] Extend RT PCRs Done
3,351,932 UART: [art] Lock RT PCRs Done
3,353,700 UART: [art] Populate DV Done
3,361,763 UART: [fht] FMC Alias Private Key: 7
3,362,899 UART: [art] Derive CDI
3,363,179 UART: [art] Store in slot 0x4
3,449,317 UART: [art] Derive Key Pair
3,449,677 UART: [art] Store priv key in slot 0x5
3,462,594 UART: [art] Derive Key Pair - Done
3,477,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,651 UART: [art] PUB.X = DF6C9EA6E6BB7646EA8219D92B11FF2C2728856D98240D769DFB81AC32979DF217EBBED695AE8C99859DB15BE79CBC43
3,500,434 UART: [art] PUB.Y = 03C582E5DDEFF1994625BE7C9EC41668C819A437710C7DC29E79A033A69E7C511A4FE0C8768F34F6B700508931B53464
3,507,354 UART: [art] SIG.R = A76A5B98C21D509D9763A687F723588D8A816DC8D3DD1C7F97E44B06D3A61C32948FAAC1A2F05B192B13D753BE5C7D2E
3,514,131 UART: [art] SIG.S = B864931A0737981D3360BBE44C87582DBDBC6D94E11944A2211AEE202183D90A17A5EC8E13DD55F5585FF54957A55401
3,538,538 UART: Caliptra RT
3,538,881 UART: [state] CFI Enabled
3,659,108 UART: [rt] RT listening for mailbox commands...
3,659,778 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,402 UART: [rt]cmd =0x41545348, len=116
3,692,015 >>> mbox cmd response data (12 bytes)
3,692,016 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,774 UART:
3,692,790 UART: Running Caliptra ROM ...
3,693,198 UART:
3,693,339 UART: [state] CFI Enabled
3,696,263 UART: [state] LifecycleState = Unprovisioned
3,696,918 UART: [state] DebugLocked = No
3,697,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,699,119 UART: [kat] SHA2-256
4,493,050 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,497,165 UART: [kat] ++
4,497,317 UART: [kat] sha1
4,501,369 UART: [kat] SHA2-256
4,503,307 UART: [kat] SHA2-384
4,506,140 UART: [kat] SHA2-512-ACC
4,508,040 UART: [kat] ECC-384
4,513,465 UART: [kat] HMAC-384Kdf
4,518,117 UART: [kat] LMS
5,086,313 UART: [kat] --
5,086,908 UART: [update-reset] ++
6,058,701 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,059,919 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,161,612 >>> mbox cmd response: success
6,161,612 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,161,835 UART: [update-reset] Copying MAN_2 To MAN_1
6,169,849 UART: [update-reset Success] --
6,170,558 UART: [state] Locking Datavault
6,171,476 UART: [state] Locking PCR0, PCR1 and PCR31
6,172,080 UART: [state] Locking ICCM
6,172,582 UART: [exit] Launching FMC @ 0x40000130
6,177,912 UART:
6,177,928 UART: Running Caliptra FMC ...
6,178,336 UART:
6,178,479 UART: [state] CFI Enabled
6,267,408 UART: [art] Extend RT PCRs Done
6,267,836 UART: [art] Lock RT PCRs Done
6,269,053 UART: [art] Populate DV Done
6,277,238 UART: [fht] FMC Alias Private Key: 7
6,278,344 UART: [art] Derive CDI
6,278,624 UART: [art] Store in slot 0x4
6,364,600 UART: [art] Derive Key Pair
6,364,960 UART: [art] Store priv key in slot 0x5
6,378,411 UART: [art] Derive Key Pair - Done
6,393,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,408,596 UART: [art] Erasing AUTHORITY.KEYID = 7
6,409,361 UART: [art] PUB.X = C4C920C6E3EC6FB8E9585CF4C85448FF3C2978FE434A4EC9B18CAAD450219D5A86D463AA4C4D14406FF88D34FEAB9AAD
6,416,153 UART: [art] PUB.Y = 525164C2CC64379C8D2D5851A79D617B22BB811A48E7671A6B95BC7CAF6DD49F1F2A3A45848EA0CBFAB7F6AE00849F38
6,423,093 UART: [art] SIG.R = 6D7BBA86C7584182FFC1E517C91C7C0BEA8F8A1DD389C4879615272042C1D01FE7BF069071913EBB1FAA4D064909A1E6
6,429,859 UART: [art] SIG.S = B94B1A5446B5CD99B5C9730E0E119CDE5AA64E105D3AD1D7AD7D062AB54B1767D67FCE8788D3DDF046F9AA89A78533BE
6,453,946 UART: mbox::rt_entry...
6,454,318 UART: ____ _ _ _ ____ _____
6,455,102 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,455,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,456,670 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,457,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,458,206 UART: |_|
6,458,518 UART:
6,823,645 UART: [rt] Runtime listening for mailbox commands...
6,824,843 >>> mbox cmd response data (48 bytes)
6,824,844 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,827,631 >>> mbox cmd response data (48 bytes)
6,827,632 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,843,578 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,408 ready_for_fw is high
1,363,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,009 >>> mbox cmd response: success
3,042,198 UART:
3,042,214 UART: Running Caliptra FMC ...
3,042,622 UART:
3,042,765 UART: [state] CFI Enabled
3,053,411 UART: [fht] FMC Alias Private Key: 7
3,172,303 UART: [art] Extend RT PCRs Done
3,172,731 UART: [art] Lock RT PCRs Done
3,174,147 UART: [art] Populate DV Done
3,182,394 UART: [fht] FMC Alias Private Key: 7
3,183,506 UART: [art] Derive CDI
3,183,786 UART: [art] Store in slot 0x4
3,269,430 UART: [art] Derive Key Pair
3,269,790 UART: [art] Store priv key in slot 0x5
3,283,051 UART: [art] Derive Key Pair - Done
3,297,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,926 UART: [art] PUB.X = 5937547ED1FFFD8BF9D0030678DDA828C38493200649DF54D0B00EDBF788424CD347A1452BE9E830A6599334F491FADB
3,320,688 UART: [art] PUB.Y = 3AB22010C2E04D8CF3D8239C7503FFCFF1115960DB7DAAE2D25DB2CBBFB7EE47E042FE198E28E04B17E6BBF5DB7500B6
3,327,637 UART: [art] SIG.R = A6902960F53ECA0060E1111D2722DF0E91F4DEDA34C6BA69D8246D06722FC08968015CCD910A107997C642FE72EB9972
3,334,373 UART: [art] SIG.S = 64B609E98BAED8F9B26A733B3A72C2E947E53B617BEDA335A91994BBBD64E0BDE48F9D9DDD727BD88BBA8DC9A6A4C11B
3,358,352 UART: Caliptra RT
3,358,695 UART: [state] CFI Enabled
3,479,259 UART: [rt] RT listening for mailbox commands...
3,479,929 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,619 UART: [rt]cmd =0x41545348, len=116
3,512,438 >>> mbox cmd response data (12 bytes)
3,512,439 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,863,349 >>> mbox cmd response: success
5,863,349 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,876,477 UART:
5,876,493 UART: Running Caliptra FMC ...
5,876,901 UART:
5,877,044 UART: [state] CFI Enabled
5,966,397 UART: [art] Extend RT PCRs Done
5,966,825 UART: [art] Lock RT PCRs Done
5,968,024 UART: [art] Populate DV Done
5,976,421 UART: [fht] FMC Alias Private Key: 7
5,977,453 UART: [art] Derive CDI
5,977,733 UART: [art] Store in slot 0x4
6,063,437 UART: [art] Derive Key Pair
6,063,797 UART: [art] Store priv key in slot 0x5
6,076,582 UART: [art] Derive Key Pair - Done
6,091,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,008 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,773 UART: [art] PUB.X = 091E546498CAC4A174DA2CF4D6E26668ED553B258A24F2DA824DCB4DCED652DCB19FBF573F71E816A91B9A915C13DF00
6,114,534 UART: [art] PUB.Y = 47DD8FA1372DE5DD581BA12B78FD46416DB722B4D6E2F6F1ADBD3CBEDC5DE44A3F0A811F56A417212A019AA97D8736F0
6,121,498 UART: [art] SIG.R = 922101D6ABEB10EB52E06180DF038A2CA7C0C3803A35CAD335E2591D93E13DA2085399D10C2FDDA297D23D0158D3E755
6,128,259 UART: [art] SIG.S = 8CC11974928EA3D0D432D058F6D5716CE70BE6E4DD0E8AE93DDA129BF48F71C235E37734FF023F57E807116CFF6B1D1A
6,151,887 UART: mbox::rt_entry...
6,152,259 UART: ____ _ _ _ ____ _____
6,153,043 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,153,843 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,154,611 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,379 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,147 UART: |_|
6,156,459 UART:
6,520,765 UART: [rt] Runtime listening for mailbox commands...
6,521,963 >>> mbox cmd response data (48 bytes)
6,521,964 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,524,751 >>> mbox cmd response data (48 bytes)
6,524,752 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,540,698 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,865 UART: [kat] LMS
1,169,177 UART: [kat] --
1,170,134 UART: [cold-reset] ++
1,170,500 UART: [fht] FHT @ 0x50003400
1,173,118 UART: [idev] ++
1,173,286 UART: [idev] CDI.KEYID = 6
1,173,647 UART: [idev] SUBJECT.KEYID = 7
1,174,072 UART: [idev] UDS.KEYID = 0
1,174,418 ready_for_fw is high
1,174,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,151 UART: [idev] Erasing UDS.KEYID = 0
1,199,697 UART: [idev] Sha1 KeyId Algorithm
1,208,553 UART: [idev] --
1,209,552 UART: [ldev] ++
1,209,720 UART: [ldev] CDI.KEYID = 6
1,210,084 UART: [ldev] SUBJECT.KEYID = 5
1,210,511 UART: [ldev] AUTHORITY.KEYID = 7
1,210,974 UART: [ldev] FE.KEYID = 1
1,216,400 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,538 UART: [ldev] --
1,280,929 UART: [fwproc] Wait for Commands...
1,281,680 UART: [fwproc] Recv command 0x46574c44
1,282,413 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,438 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,727 >>> mbox cmd response: success
2,825,963 UART: [afmc] ++
2,826,131 UART: [afmc] CDI.KEYID = 6
2,826,494 UART: [afmc] SUBJECT.KEYID = 7
2,826,920 UART: [afmc] AUTHORITY.KEYID = 5
2,862,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,676 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,016 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,530 UART: [afmc] --
2,905,575 UART: [cold-reset] --
2,906,477 UART: [state] Locking Datavault
2,907,658 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,262 UART: [state] Locking ICCM
2,908,902 UART: [exit] Launching FMC @ 0x40000130
2,914,232 UART:
2,914,248 UART: Running Caliptra FMC ...
2,914,656 UART:
2,914,710 UART: [state] CFI Enabled
2,924,836 UART: [fht] FMC Alias Private Key: 7
3,043,318 UART: [art] Extend RT PCRs Done
3,043,746 UART: [art] Lock RT PCRs Done
3,045,108 UART: [art] Populate DV Done
3,053,343 UART: [fht] FMC Alias Private Key: 7
3,054,497 UART: [art] Derive CDI
3,054,777 UART: [art] Store in slot 0x4
3,140,896 UART: [art] Derive Key Pair
3,141,256 UART: [art] Store priv key in slot 0x5
3,154,336 UART: [art] Derive Key Pair - Done
3,169,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,957 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,722 UART: [art] PUB.X = 6E285D9EB8C66E4F38DE16B533EEE25474EB2603B62C3CD010435F58C8EFA49C726EB866B339874AD212738F018DC4A2
3,192,492 UART: [art] PUB.Y = 27CDA30BA79FD205FD03D6E929D712CA50459CACE538EF21306596D8F87C16FF84EBFAF337916D12AC19AA62BBCD97AA
3,199,453 UART: [art] SIG.R = FFAF415E75A56DDB4053973488784250E50289628F44E4608DEB44DAB7A416CDA75351C56CAB7C5E241BA4147F8ABEBD
3,206,230 UART: [art] SIG.S = ACE80E27350732B024DFD304DABAB80D2B44050644CF33FFF988D6F07FD5460E0F79525C8C5DB13C8BD7C5005F5578DE
3,230,506 UART: Caliptra RT
3,230,757 UART: [state] CFI Enabled
3,350,813 UART: [rt] RT listening for mailbox commands...
3,351,483 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,915 UART: [rt]cmd =0x41545348, len=116
3,383,624 >>> mbox cmd response data (12 bytes)
3,383,625 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,460 UART:
3,384,476 UART: Running Caliptra ROM ...
3,384,884 UART:
3,384,939 UART: [state] CFI Enabled
3,387,217 UART: [state] LifecycleState = Unprovisioned
3,387,872 UART: [state] DebugLocked = No
3,388,560 UART: [state] WD Timer not started. Device not locked for debugging
3,389,700 UART: [kat] SHA2-256
4,193,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,354 UART: [kat] ++
4,197,506 UART: [kat] sha1
4,201,512 UART: [kat] SHA2-256
4,203,452 UART: [kat] SHA2-384
4,206,311 UART: [kat] SHA2-512-ACC
4,208,211 UART: [kat] ECC-384
4,217,472 UART: [kat] HMAC-384Kdf
4,221,918 UART: [kat] LMS
4,470,230 UART: [kat] --
4,471,080 UART: [update-reset] ++
5,421,828 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,422,803 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,524,444 >>> mbox cmd response: success
5,524,444 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,524,789 UART: [update-reset] Copying MAN_2 To MAN_1
5,532,803 UART: [update-reset Success] --
5,533,788 UART: [state] Locking Datavault
5,534,462 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,066 UART: [state] Locking ICCM
5,535,492 UART: [exit] Launching FMC @ 0x40000130
5,540,822 UART:
5,540,838 UART: Running Caliptra FMC ...
5,541,246 UART:
5,541,300 UART: [state] CFI Enabled
5,630,709 UART: [art] Extend RT PCRs Done
5,631,137 UART: [art] Lock RT PCRs Done
5,632,510 UART: [art] Populate DV Done
5,640,739 UART: [fht] FMC Alias Private Key: 7
5,641,849 UART: [art] Derive CDI
5,642,129 UART: [art] Store in slot 0x4
5,727,572 UART: [art] Derive Key Pair
5,727,932 UART: [art] Store priv key in slot 0x5
5,740,700 UART: [art] Derive Key Pair - Done
5,755,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,771,224 UART: [art] Erasing AUTHORITY.KEYID = 7
5,771,989 UART: [art] PUB.X = A3A5CFBB0418412A8403AB83898CDC864605160B643EB0EABE8E645BF403047ECB500D00DCB0326588B706891CD647CE
5,778,719 UART: [art] PUB.Y = 05CD8AA414E81867D5AE3784276FBAE7BEC0B23BC062F209278860CCB0143216104094CA56562E12BBCB261987898090
5,785,659 UART: [art] SIG.R = 5D14878E56FA74C482C2427D1F4FD30190D31FA5B74E823CB02D5A73D4C5CE823924427EE1AFA2A87A43BF6DD009C8C0
5,792,433 UART: [art] SIG.S = 9376D21FAADB7FE82671D11F48F9C5440B5D62E9136BE5BB49F5843101666D63A9CD969996F9B785DD2354D3A28C4B5C
5,815,579 UART: mbox::rt_entry...
5,815,951 UART: ____ _ _ _ ____ _____
5,816,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,817,535 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,818,303 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,819,839 UART: |_|
5,820,151 UART:
6,182,753 UART: [rt] Runtime listening for mailbox commands...
6,183,951 >>> mbox cmd response data (48 bytes)
6,183,952 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,186,739 >>> mbox cmd response data (48 bytes)
6,186,740 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,202,686 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,256 ready_for_fw is high
1,059,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,260 >>> mbox cmd response: success
2,738,821 UART:
2,738,837 UART: Running Caliptra FMC ...
2,739,245 UART:
2,739,299 UART: [state] CFI Enabled
2,749,913 UART: [fht] FMC Alias Private Key: 7
2,868,653 UART: [art] Extend RT PCRs Done
2,869,081 UART: [art] Lock RT PCRs Done
2,870,529 UART: [art] Populate DV Done
2,878,694 UART: [fht] FMC Alias Private Key: 7
2,879,870 UART: [art] Derive CDI
2,880,150 UART: [art] Store in slot 0x4
2,966,079 UART: [art] Derive Key Pair
2,966,439 UART: [art] Store priv key in slot 0x5
2,979,505 UART: [art] Derive Key Pair - Done
2,993,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,012 UART: [art] PUB.X = C81A374ACAD0EEF4213BCC8772F20740D16D4200EDB0A1C671D45D5BB8AF7362883E375DFF7156483D7DFDD3A4BBD11F
3,016,775 UART: [art] PUB.Y = 277BA980472C838172F1A77D0AE6806AE4620F5001DE71EEEA9E4627F39A65C4EB9981376501EE0E273CCECEE3F3C8B1
3,023,718 UART: [art] SIG.R = 2634EC316E1797DC16B792454746BA055FCC4471B3E7872B7ABA88DCD5378936785C31BE83D96D25E7025DA2DF390DC2
3,030,481 UART: [art] SIG.S = 4B9E813106393424E98C718DB8DEFB62B3C30CD2A949A342D998C58955BD22A200BF9B16E82D499406FA7822ACF5D9DC
3,053,894 UART: Caliptra RT
3,054,145 UART: [state] CFI Enabled
3,174,241 UART: [rt] RT listening for mailbox commands...
3,174,911 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,499 UART: [rt]cmd =0x41545348, len=116
3,207,316 >>> mbox cmd response data (12 bytes)
3,207,317 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,233,812 >>> mbox cmd response: success
5,233,812 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,247,369 UART:
5,247,385 UART: Running Caliptra FMC ...
5,247,793 UART:
5,247,847 UART: [state] CFI Enabled
5,337,398 UART: [art] Extend RT PCRs Done
5,337,826 UART: [art] Lock RT PCRs Done
5,339,165 UART: [art] Populate DV Done
5,347,388 UART: [fht] FMC Alias Private Key: 7
5,348,324 UART: [art] Derive CDI
5,348,604 UART: [art] Store in slot 0x4
5,434,171 UART: [art] Derive Key Pair
5,434,531 UART: [art] Store priv key in slot 0x5
5,447,473 UART: [art] Derive Key Pair - Done
5,462,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,477,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,478,764 UART: [art] PUB.X = 656F6830A9594E5FC33C1518C3F4717820F7DB77DDA7FE02839AF985151295E43974A388B46392CA35A7053E6549D592
5,485,518 UART: [art] PUB.Y = 0B24A0B6743937E3EAD76DECEECC1EC643F9FD3D11738548463232C8189F542FD319EECA8102A8367768AC01EC627855
5,492,463 UART: [art] SIG.R = BFA2621426675B0F3058724E484DE49A0B23750D4DEBF05333E8FED65516F570A07F06929278E3DEF1F1ECF97E706AB6
5,499,225 UART: [art] SIG.S = 46FF653D08D872F5498010D426BF837E366FBE0B722B34C4F1D09A9588E3CCC50BC13251F8DABE78A565C492A1F0F0E0
5,523,294 UART: mbox::rt_entry...
5,523,666 UART: ____ _ _ _ ____ _____
5,524,450 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,525,250 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,526,018 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,526,786 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,527,554 UART: |_|
5,527,866 UART:
5,893,606 UART: [rt] Runtime listening for mailbox commands...
5,894,804 >>> mbox cmd response data (48 bytes)
5,894,805 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,897,592 >>> mbox cmd response data (48 bytes)
5,897,593 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,913,539 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,461 UART: [kat] SHA2-256
891,011 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,115 UART: [kat] ++
895,267 UART: [kat] sha1
899,289 UART: [kat] SHA2-256
901,229 UART: [kat] SHA2-384
904,064 UART: [kat] SHA2-512-ACC
905,965 UART: [kat] ECC-384
915,438 UART: [kat] HMAC-384Kdf
920,106 UART: [kat] LMS
1,168,418 UART: [kat] --
1,169,377 UART: [cold-reset] ++
1,169,787 UART: [fht] FHT @ 0x50003400
1,172,437 UART: [idev] ++
1,172,605 UART: [idev] CDI.KEYID = 6
1,172,966 UART: [idev] SUBJECT.KEYID = 7
1,173,391 UART: [idev] UDS.KEYID = 0
1,173,737 ready_for_fw is high
1,173,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,290 UART: [idev] Erasing UDS.KEYID = 0
1,198,582 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,541 UART: [ldev] ++
1,208,709 UART: [ldev] CDI.KEYID = 6
1,209,073 UART: [ldev] SUBJECT.KEYID = 5
1,209,500 UART: [ldev] AUTHORITY.KEYID = 7
1,209,963 UART: [ldev] FE.KEYID = 1
1,215,265 UART: [ldev] Erasing FE.KEYID = 1
1,240,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,769 UART: [ldev] --
1,280,172 UART: [fwproc] Wait for Commands...
1,280,957 UART: [fwproc] Recv command 0x46574c44
1,281,690 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,420 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,830 >>> mbox cmd response: success
2,825,958 UART: [afmc] ++
2,826,126 UART: [afmc] CDI.KEYID = 6
2,826,489 UART: [afmc] SUBJECT.KEYID = 7
2,826,915 UART: [afmc] AUTHORITY.KEYID = 5
2,861,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,013 UART: [afmc] --
2,904,874 UART: [cold-reset] --
2,905,872 UART: [state] Locking Datavault
2,906,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,477 UART: [state] Locking ICCM
2,907,983 UART: [exit] Launching FMC @ 0x40000130
2,913,313 UART:
2,913,329 UART: Running Caliptra FMC ...
2,913,737 UART:
2,913,880 UART: [state] CFI Enabled
2,924,722 UART: [fht] FMC Alias Private Key: 7
3,043,924 UART: [art] Extend RT PCRs Done
3,044,352 UART: [art] Lock RT PCRs Done
3,046,374 UART: [art] Populate DV Done
3,054,473 UART: [fht] FMC Alias Private Key: 7
3,055,463 UART: [art] Derive CDI
3,055,743 UART: [art] Store in slot 0x4
3,141,522 UART: [art] Derive Key Pair
3,141,882 UART: [art] Store priv key in slot 0x5
3,155,796 UART: [art] Derive Key Pair - Done
3,170,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,898 UART: [art] PUB.X = C69B531545E19ABFF17D3043972400F8656389121EA8CF16E2E5472B333DF83576DC627AC5455F7F31043726EF554CDD
3,193,639 UART: [art] PUB.Y = B07633EF3322EBFBB169956ABC63DC09FDE11CC19A26DB94892F3266DC2E51C74E71615C9B8E9C1918D3CA87BBDE26BC
3,200,604 UART: [art] SIG.R = 4A55457FA72EC7C6BA9930DCF11419617A7D9FF61B2E5530930A81233B4A9A0FB9066975F2E63813C49041F13CF256F7
3,207,363 UART: [art] SIG.S = EE1E989C1F2D6742D3F4566A8E5858E908D681E59411FB2A607B60D387837509033C9BD56E05CC9A8A1027A38AFA502D
3,230,583 UART: Caliptra RT
3,230,926 UART: [state] CFI Enabled
3,351,245 UART: [rt] RT listening for mailbox commands...
3,351,915 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,473 UART: [rt]cmd =0x41545348, len=116
3,384,440 >>> mbox cmd response data (12 bytes)
3,384,441 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,272 UART:
3,385,288 UART: Running Caliptra ROM ...
3,385,696 UART:
3,385,838 UART: [state] CFI Enabled
3,388,460 UART: [state] LifecycleState = Unprovisioned
3,389,115 UART: [state] DebugLocked = No
3,389,803 UART: [state] WD Timer not started. Device not locked for debugging
3,391,027 UART: [kat] SHA2-256
4,194,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,198,681 UART: [kat] ++
4,198,833 UART: [kat] sha1
4,203,047 UART: [kat] SHA2-256
4,204,987 UART: [kat] SHA2-384
4,207,696 UART: [kat] SHA2-512-ACC
4,209,596 UART: [kat] ECC-384
4,219,241 UART: [kat] HMAC-384Kdf
4,223,953 UART: [kat] LMS
4,472,265 UART: [kat] --
4,473,275 UART: [update-reset] ++
5,422,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,052 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,693 >>> mbox cmd response: success
5,525,693 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,525,840 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,854 UART: [update-reset Success] --
5,534,631 UART: [state] Locking Datavault
5,535,459 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,063 UART: [state] Locking ICCM
5,536,663 UART: [exit] Launching FMC @ 0x40000130
5,541,993 UART:
5,542,009 UART: Running Caliptra FMC ...
5,542,417 UART:
5,542,560 UART: [state] CFI Enabled
5,632,155 UART: [art] Extend RT PCRs Done
5,632,583 UART: [art] Lock RT PCRs Done
5,633,730 UART: [art] Populate DV Done
5,642,023 UART: [fht] FMC Alias Private Key: 7
5,642,971 UART: [art] Derive CDI
5,643,251 UART: [art] Store in slot 0x4
5,728,708 UART: [art] Derive Key Pair
5,729,068 UART: [art] Store priv key in slot 0x5
5,741,980 UART: [art] Derive Key Pair - Done
5,756,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,168 UART: [art] Erasing AUTHORITY.KEYID = 7
5,772,933 UART: [art] PUB.X = 0B22461F02F94A52C05ED3F11F56DE70A8FF7B8E2CE361BAC6A119D7077AA1F7C27D06E00A68E3AB2005CD1F0BB718ED
5,779,700 UART: [art] PUB.Y = 952563E5196858578BBA99937B21087E42A98FC40B0E19F7C015BDC4865BE7CCB60DF1A0B3FE29E64B12983071D249F0
5,786,638 UART: [art] SIG.R = 3D38F3F1F2F4746EB704C62B2ABBCB420FADD720F9EB367CA7E8C26347BBCF625F0AFC19AA1359F36032380374ABEC68
5,793,414 UART: [art] SIG.S = 02AE4ABAA34B3ED58CEF08766699E555CFD48764A97AE39C35EE377A73D4D322E693ACFBF0D1F4F448AE9CF5A61B6B3F
5,817,082 UART: mbox::rt_entry...
5,817,454 UART: ____ _ _ _ ____ _____
5,818,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,819,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,819,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,820,574 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,821,342 UART: |_|
5,821,654 UART:
6,191,663 UART: [rt] Runtime listening for mailbox commands...
6,192,861 >>> mbox cmd response data (48 bytes)
6,192,862 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,195,649 >>> mbox cmd response data (48 bytes)
6,195,650 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,211,596 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,161 ready_for_fw is high
1,059,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,021 >>> mbox cmd response: success
2,742,702 UART:
2,742,718 UART: Running Caliptra FMC ...
2,743,126 UART:
2,743,269 UART: [state] CFI Enabled
2,753,833 UART: [fht] FMC Alias Private Key: 7
2,872,497 UART: [art] Extend RT PCRs Done
2,872,925 UART: [art] Lock RT PCRs Done
2,874,781 UART: [art] Populate DV Done
2,883,224 UART: [fht] FMC Alias Private Key: 7
2,884,304 UART: [art] Derive CDI
2,884,584 UART: [art] Store in slot 0x4
2,970,313 UART: [art] Derive Key Pair
2,970,673 UART: [art] Store priv key in slot 0x5
2,983,715 UART: [art] Derive Key Pair - Done
2,998,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,874 UART: [art] PUB.X = DF371EBE8867CB234641ACD67B448D8147E364D0105C27AFA9A81DB4A5309B2577334D0774ACC1C605E6A343B9117D26
3,021,640 UART: [art] PUB.Y = C84EC7B17FFFA3690C3F4D0AF2A3D087C5BE7AB4B2AF7F8D922B72EE3A65B01A0CAB6EB9B37A5783806A054D5FB3392A
3,028,602 UART: [art] SIG.R = 91782AE8811C0B582794BECE412BE897FB190BEE3E01D07B93106C9ACD86C95F570E2A9E210BADE94BEB7EDC0DA2442A
3,035,372 UART: [art] SIG.S = 3089228640CB2592712910F5A28CDDBDFF1F7626CF5702672713FB7A3189DD25A0778D2656A5C781BE4C9BFB33BA0CC6
3,058,624 UART: Caliptra RT
3,058,967 UART: [state] CFI Enabled
3,179,018 UART: [rt] RT listening for mailbox commands...
3,179,688 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,474 UART: [rt]cmd =0x41545348, len=116
3,212,171 >>> mbox cmd response data (12 bytes)
3,212,172 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,346 >>> mbox cmd response: success
5,237,346 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,250,463 UART:
5,250,479 UART: Running Caliptra FMC ...
5,250,887 UART:
5,251,030 UART: [state] CFI Enabled
5,340,395 UART: [art] Extend RT PCRs Done
5,340,823 UART: [art] Lock RT PCRs Done
5,342,052 UART: [art] Populate DV Done
5,350,145 UART: [fht] FMC Alias Private Key: 7
5,351,163 UART: [art] Derive CDI
5,351,443 UART: [art] Store in slot 0x4
5,437,416 UART: [art] Derive Key Pair
5,437,776 UART: [art] Store priv key in slot 0x5
5,451,026 UART: [art] Derive Key Pair - Done
5,465,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,370 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,135 UART: [art] PUB.X = 356E4BE28A25947FE005B29A7D69872C5D4AD05B6091CEA4ABD9AC64E61842BDD8F434C0DF0F43CC64305CF57A195A8B
5,488,913 UART: [art] PUB.Y = 6EEBBA17C12AEC2885DA89A3E20354F032F1A8062CBD3B8A38C8AD7A79D1B18C507EA91B8B5C506934913A33718C334B
5,495,867 UART: [art] SIG.R = 99EF7E20867FBDD33B16155BFA0AD078CAC62B6377B94F3761A54BCD123430F6F839C6D3142AEAA87362A9411849D1D7
5,502,640 UART: [art] SIG.S = 2576D38499429D9DCD3548F6E5951095761500E5BEDBC0078ABB8F4192B8888117B3C04FD1244CD5658958A91630B291
5,526,289 UART: mbox::rt_entry...
5,526,661 UART: ____ _ _ _ ____ _____
5,527,445 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,528,245 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,529,013 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,529,781 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,530,549 UART: |_|
5,530,861 UART:
5,896,827 UART: [rt] Runtime listening for mailbox commands...
5,898,025 >>> mbox cmd response data (48 bytes)
5,898,026 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,900,813 >>> mbox cmd response data (48 bytes)
5,900,814 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,916,760 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
901,981 UART: [kat] SHA2-256
903,921 UART: [kat] SHA2-384
906,674 UART: [kat] SHA2-512-ACC
908,575 UART: [kat] ECC-384
918,608 UART: [kat] HMAC-384Kdf
923,290 UART: [kat] LMS
1,171,618 UART: [kat] --
1,172,509 UART: [cold-reset] ++
1,172,889 UART: [fht] FHT @ 0x50003400
1,175,502 UART: [idev] ++
1,175,670 UART: [idev] CDI.KEYID = 6
1,176,030 UART: [idev] SUBJECT.KEYID = 7
1,176,454 UART: [idev] UDS.KEYID = 0
1,176,799 ready_for_fw is high
1,176,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,929 UART: [idev] Sha1 KeyId Algorithm
1,209,545 UART: [idev] --
1,210,647 UART: [ldev] ++
1,210,815 UART: [ldev] CDI.KEYID = 6
1,211,178 UART: [ldev] SUBJECT.KEYID = 5
1,211,604 UART: [ldev] AUTHORITY.KEYID = 7
1,212,067 UART: [ldev] FE.KEYID = 1
1,217,241 UART: [ldev] Erasing FE.KEYID = 1
1,243,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,535 UART: [ldev] --
1,282,984 UART: [fwproc] Wait for Commands...
1,283,592 UART: [fwproc] Recv command 0x46574c44
1,284,320 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,054 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,309 >>> mbox cmd response: success
2,828,463 UART: [afmc] ++
2,828,631 UART: [afmc] CDI.KEYID = 6
2,828,993 UART: [afmc] SUBJECT.KEYID = 7
2,829,418 UART: [afmc] AUTHORITY.KEYID = 5
2,864,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,684 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,276 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,977 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,773 UART: [afmc] --
2,908,869 UART: [cold-reset] --
2,909,793 UART: [state] Locking Datavault
2,910,928 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,532 UART: [state] Locking ICCM
2,912,136 UART: [exit] Launching FMC @ 0x40000130
2,917,466 UART:
2,917,482 UART: Running Caliptra FMC ...
2,917,890 UART:
2,917,944 UART: [state] CFI Enabled
2,928,546 UART: [fht] FMC Alias Private Key: 7
3,047,446 UART: [art] Extend RT PCRs Done
3,047,874 UART: [art] Lock RT PCRs Done
3,049,360 UART: [art] Populate DV Done
3,057,733 UART: [fht] FMC Alias Private Key: 7
3,058,777 UART: [art] Derive CDI
3,059,057 UART: [art] Store in slot 0x4
3,144,918 UART: [art] Derive Key Pair
3,145,278 UART: [art] Store priv key in slot 0x5
3,158,884 UART: [art] Derive Key Pair - Done
3,173,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,992 UART: [art] PUB.X = 8617D9BEFD919DAA603B4B6B0528F7A585D450CA335EF2460A48E2C47A59258EC2191762FB831D90E6D5125A0B2F8E7F
3,196,759 UART: [art] PUB.Y = 039A4D59459540566AA363C1A4B10D8B87EBE16257CE86B4BCC38A950BE51AEDDCD241F9725D4B5577FCDB0F973FD886
3,203,709 UART: [art] SIG.R = 466ADC6152D1AFDCDE0DCB50271116B0EFE05403463DB3BB5682454556D119BD4F015F530D44EC203F510AA55E467289
3,210,468 UART: [art] SIG.S = 29E9282C61A772BBCFC7823C53893883443829CC199884DE8B2FC88FCF7CBFE81D4B143F5AB9B9BEDC1090C7484CC123
3,233,752 UART: Caliptra RT
3,234,003 UART: [state] CFI Enabled
3,354,659 UART: [rt] RT listening for mailbox commands...
3,355,329 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,017 UART: [rt]cmd =0x41545348, len=116
3,387,792 >>> mbox cmd response data (12 bytes)
3,387,793 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,526 UART:
3,388,542 UART: Running Caliptra ROM ...
3,388,950 UART:
3,389,005 UART: [state] CFI Enabled
3,391,359 UART: [state] LifecycleState = Unprovisioned
3,392,014 UART: [state] DebugLocked = No
3,392,748 UART: [state] WD Timer not started. Device not locked for debugging
3,393,898 UART: [kat] SHA2-256
4,199,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,203,673 UART: [kat] ++
4,203,825 UART: [kat] sha1
4,207,841 UART: [kat] SHA2-256
4,209,781 UART: [kat] SHA2-384
4,212,502 UART: [kat] SHA2-512-ACC
4,214,402 UART: [kat] ECC-384
4,223,995 UART: [kat] HMAC-384Kdf
4,228,601 UART: [kat] LMS
4,476,929 UART: [kat] --
4,477,667 UART: [update-reset] ++
5,427,892 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,429,015 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,530,656 >>> mbox cmd response: success
5,530,656 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,530,807 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,821 UART: [update-reset Success] --
5,539,716 UART: [state] Locking Datavault
5,540,554 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,158 UART: [state] Locking ICCM
5,541,654 UART: [exit] Launching FMC @ 0x40000130
5,546,984 UART:
5,547,000 UART: Running Caliptra FMC ...
5,547,408 UART:
5,547,462 UART: [state] CFI Enabled
5,636,827 UART: [art] Extend RT PCRs Done
5,637,255 UART: [art] Lock RT PCRs Done
5,638,606 UART: [art] Populate DV Done
5,646,857 UART: [fht] FMC Alias Private Key: 7
5,647,987 UART: [art] Derive CDI
5,648,267 UART: [art] Store in slot 0x4
5,734,326 UART: [art] Derive Key Pair
5,734,686 UART: [art] Store priv key in slot 0x5
5,747,822 UART: [art] Derive Key Pair - Done
5,762,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,718 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,483 UART: [art] PUB.X = F3A7B18A06B3BE3E9DBC9E6C8DD8E54C5D44DBEE8849A9188DC970F3DC271E765746FEA45C93C0B33A9419D6C7794CCD
5,785,270 UART: [art] PUB.Y = 6E620672CDF5144D07D4B7BDB6998CB90340EBC4D8FF2AD6280DEFB21F211BBCA5FAD0893070A43500369EE9927085A4
5,792,196 UART: [art] SIG.R = 328C4F79703480CD58B4BD6127B129264E9DA43AA309E137A278F359D7BBDCEC5F6CAA4342B4CD13FEC0039E13B2F429
5,798,970 UART: [art] SIG.S = A3CCFFD64BAC1AAF67A773A935A8C2518FF6574289E6E954601497C664053EA5B081CD5078825FDACCA4A3087D3E4895
5,822,390 UART: mbox::rt_entry...
5,822,762 UART: ____ _ _ _ ____ _____
5,823,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,824,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,825,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,650 UART: |_|
5,826,962 UART:
6,193,790 UART: [rt] Runtime listening for mailbox commands...
6,194,988 >>> mbox cmd response data (48 bytes)
6,194,989 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,197,776 >>> mbox cmd response data (48 bytes)
6,197,777 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,213,723 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,799 ready_for_fw is high
1,060,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,558 >>> mbox cmd response: success
2,741,989 UART:
2,742,005 UART: Running Caliptra FMC ...
2,742,413 UART:
2,742,467 UART: [state] CFI Enabled
2,753,147 UART: [fht] FMC Alias Private Key: 7
2,871,345 UART: [art] Extend RT PCRs Done
2,871,773 UART: [art] Lock RT PCRs Done
2,873,173 UART: [art] Populate DV Done
2,881,318 UART: [fht] FMC Alias Private Key: 7
2,882,314 UART: [art] Derive CDI
2,882,594 UART: [art] Store in slot 0x4
2,968,345 UART: [art] Derive Key Pair
2,968,705 UART: [art] Store priv key in slot 0x5
2,982,191 UART: [art] Derive Key Pair - Done
2,997,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,923 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,688 UART: [art] PUB.X = 9A5D7310C7356B942914B922299D63CE72BF38081623FBB273AC6201D50DF12A58F8B9B3D28BFC11BA47F9946609570C
3,020,441 UART: [art] PUB.Y = 8381C0B37C47482D8142D2B8C81D0ACEAA3F18DA79ACF5AE4267618344AB178EB3F81AF9DF7E600998A67480D83B3A5D
3,027,395 UART: [art] SIG.R = F68CBDF1A64EA12E772C45FC595932620FC10D2EF26A949BCAD501CA37AD2A2351CABF16A50536C9BE4014B241058AE7
3,034,164 UART: [art] SIG.S = 2FAB027193D00FE2B11F7B62A7A46E896E994C47F80698D3EBF9E10816CBC0ACE31BC6B1FF31BE9266FEEF683A23C71A
3,058,234 UART: Caliptra RT
3,058,485 UART: [state] CFI Enabled
3,178,118 UART: [rt] RT listening for mailbox commands...
3,178,788 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,954 UART: [rt]cmd =0x41545348, len=116
3,210,619 >>> mbox cmd response data (12 bytes)
3,210,620 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,238,958 >>> mbox cmd response: success
5,238,958 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,252,261 UART:
5,252,277 UART: Running Caliptra FMC ...
5,252,685 UART:
5,252,739 UART: [state] CFI Enabled
5,341,718 UART: [art] Extend RT PCRs Done
5,342,146 UART: [art] Lock RT PCRs Done
5,343,649 UART: [art] Populate DV Done
5,352,040 UART: [fht] FMC Alias Private Key: 7
5,353,142 UART: [art] Derive CDI
5,353,422 UART: [art] Store in slot 0x4
5,439,153 UART: [art] Derive Key Pair
5,439,513 UART: [art] Store priv key in slot 0x5
5,452,647 UART: [art] Derive Key Pair - Done
5,467,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,482,778 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,543 UART: [art] PUB.X = 572E316B88BBC80FB53AE50708CC4B8EC9A00016E4793D4EA12C2432CE1EE6BFB954AEA8F1719A122097C84ED50105DC
5,490,288 UART: [art] PUB.Y = AB536CC585A2004A03E898A7D7C60D8F69FFBE743DF74F5C601764E5196739CD9BA312783C22A19566E76FD26C0F4558
5,497,209 UART: [art] SIG.R = 910871889131A3258C3A0B5F2CC80EDCCEEB330DA95BEF69173E31ABDE4104415C49C8D9F2A4B57AA250EAEBDA240916
5,503,975 UART: [art] SIG.S = 66EAC4C98C77BDBCD257803363335A974E0E0BDDA50862C6BD9038B0297F79B4854E21287739E6C0F7E05B580EA3FEA5
5,527,281 UART: mbox::rt_entry...
5,527,653 UART: ____ _ _ _ ____ _____
5,528,437 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,237 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,005 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,773 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,541 UART: |_|
5,531,853 UART:
5,897,883 UART: [rt] Runtime listening for mailbox commands...
5,899,081 >>> mbox cmd response data (48 bytes)
5,899,082 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,901,869 >>> mbox cmd response data (48 bytes)
5,901,870 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,917,816 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,635 UART: [state] LifecycleState = Unprovisioned
86,290 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
893,761 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,886 UART: [kat] ++
898,038 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
906,907 UART: [kat] SHA2-512-ACC
908,808 UART: [kat] ECC-384
918,539 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,428 UART: [cold-reset] ++
1,172,868 UART: [fht] FHT @ 0x50003400
1,175,591 UART: [idev] ++
1,175,759 UART: [idev] CDI.KEYID = 6
1,176,119 UART: [idev] SUBJECT.KEYID = 7
1,176,543 UART: [idev] UDS.KEYID = 0
1,176,888 ready_for_fw is high
1,176,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,383 UART: [idev] Erasing UDS.KEYID = 0
1,202,220 UART: [idev] Sha1 KeyId Algorithm
1,210,726 UART: [idev] --
1,211,848 UART: [ldev] ++
1,212,016 UART: [ldev] CDI.KEYID = 6
1,212,379 UART: [ldev] SUBJECT.KEYID = 5
1,212,805 UART: [ldev] AUTHORITY.KEYID = 7
1,213,268 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,581 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,304 UART: [ldev] --
1,283,685 UART: [fwproc] Wait for Commands...
1,284,295 UART: [fwproc] Recv command 0x46574c44
1,285,023 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,456 >>> mbox cmd response: success
2,829,474 UART: [afmc] ++
2,829,642 UART: [afmc] CDI.KEYID = 6
2,830,004 UART: [afmc] SUBJECT.KEYID = 7
2,830,429 UART: [afmc] AUTHORITY.KEYID = 5
2,866,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,814 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,336 UART: [afmc] --
2,909,402 UART: [cold-reset] --
2,910,202 UART: [state] Locking Datavault
2,911,353 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,957 UART: [state] Locking ICCM
2,912,487 UART: [exit] Launching FMC @ 0x40000130
2,917,817 UART:
2,917,833 UART: Running Caliptra FMC ...
2,918,241 UART:
2,918,384 UART: [state] CFI Enabled
2,928,930 UART: [fht] FMC Alias Private Key: 7
3,047,610 UART: [art] Extend RT PCRs Done
3,048,038 UART: [art] Lock RT PCRs Done
3,049,462 UART: [art] Populate DV Done
3,057,819 UART: [fht] FMC Alias Private Key: 7
3,058,789 UART: [art] Derive CDI
3,059,069 UART: [art] Store in slot 0x4
3,144,720 UART: [art] Derive Key Pair
3,145,080 UART: [art] Store priv key in slot 0x5
3,158,156 UART: [art] Derive Key Pair - Done
3,173,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,499 UART: [art] PUB.X = E089A59292F100903A7A8777B6DD306D53FD572FBEB6A2BFF41A0BE7B5D859BBA8FAE4D00C3A6A2E439C1F42A1FFAD77
3,196,263 UART: [art] PUB.Y = 16C8CF7C4D8795906B3BADBA10ED8D23D060EDAC9D996D0BD6BA5BA6543D1BBC68BD2228C65A467D98621382094301AB
3,203,218 UART: [art] SIG.R = EFDFDA3707A7B1D1BD8E0B48A016CE3BD8A3907EAD4378CC8D4E8F4BADD50A57DB9A19612EA79D71825153E290C00A6A
3,209,998 UART: [art] SIG.S = D1C5B76B41D9FFD6EFAE9B02CE595DE5BD2F2E2069513DF2B12F206C42F95C537969B61AA1855D37277B7561BA84F17A
3,233,537 UART: Caliptra RT
3,233,880 UART: [state] CFI Enabled
3,352,964 UART: [rt] RT listening for mailbox commands...
3,353,634 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,976 UART: [rt]cmd =0x41545348, len=116
3,385,959 >>> mbox cmd response data (12 bytes)
3,385,960 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,569 UART:
3,386,585 UART: Running Caliptra ROM ...
3,386,993 UART:
3,387,135 UART: [state] CFI Enabled
3,389,723 UART: [state] LifecycleState = Unprovisioned
3,390,378 UART: [state] DebugLocked = No
3,391,080 UART: [state] WD Timer not started. Device not locked for debugging
3,392,336 UART: [kat] SHA2-256
4,197,986 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,111 UART: [kat] ++
4,202,263 UART: [kat] sha1
4,206,589 UART: [kat] SHA2-256
4,208,529 UART: [kat] SHA2-384
4,211,236 UART: [kat] SHA2-512-ACC
4,213,136 UART: [kat] ECC-384
4,222,865 UART: [kat] HMAC-384Kdf
4,227,357 UART: [kat] LMS
4,475,685 UART: [kat] --
4,476,497 UART: [update-reset] ++
5,426,776 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,925 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,529,566 >>> mbox cmd response: success
5,529,566 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,529,705 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,719 UART: [update-reset Success] --
5,538,678 UART: [state] Locking Datavault
5,539,492 UART: [state] Locking PCR0, PCR1 and PCR31
5,540,096 UART: [state] Locking ICCM
5,540,670 UART: [exit] Launching FMC @ 0x40000130
5,546,000 UART:
5,546,016 UART: Running Caliptra FMC ...
5,546,424 UART:
5,546,567 UART: [state] CFI Enabled
5,635,426 UART: [art] Extend RT PCRs Done
5,635,854 UART: [art] Lock RT PCRs Done
5,637,019 UART: [art] Populate DV Done
5,645,176 UART: [fht] FMC Alias Private Key: 7
5,646,140 UART: [art] Derive CDI
5,646,420 UART: [art] Store in slot 0x4
5,731,949 UART: [art] Derive Key Pair
5,732,309 UART: [art] Store priv key in slot 0x5
5,745,587 UART: [art] Derive Key Pair - Done
5,760,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,775,533 UART: [art] Erasing AUTHORITY.KEYID = 7
5,776,298 UART: [art] PUB.X = 1827F0CB6EDE464A7E9B4542BBEC7B532578B8787290DBB833CAFD1A240B64856622BF2D748BC4A07E79FBA5B38B6B6F
5,783,079 UART: [art] PUB.Y = 907DB11FD8561BD56DB3316399333539FB5B254154B1D209FD0C07F7E1D5C84C36A999C1BD4966180DC6D69F8AF428BF
5,790,021 UART: [art] SIG.R = 33DBBAB2BD8B462EDA6F3C6058BAF5119EA58A2471E404AAC9F0C9A3850F65445BCBF440F193E4C9E0AC05F8E6BD29CE
5,796,806 UART: [art] SIG.S = DCAF70A782EE63EEAF8B336B73A388720C7C6DE9D4BE630DC72F0B6785159DB5B5CDF48665F25767916DFC676B36204D
5,820,613 UART: mbox::rt_entry...
5,820,985 UART: ____ _ _ _ ____ _____
5,821,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,822,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,823,337 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,824,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,824,873 UART: |_|
5,825,185 UART:
6,189,581 UART: [rt] Runtime listening for mailbox commands...
6,190,779 >>> mbox cmd response data (48 bytes)
6,190,780 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,193,567 >>> mbox cmd response data (48 bytes)
6,193,568 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,209,514 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,476 ready_for_fw is high
1,060,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,721 >>> mbox cmd response: success
2,741,116 UART:
2,741,132 UART: Running Caliptra FMC ...
2,741,540 UART:
2,741,683 UART: [state] CFI Enabled
2,752,485 UART: [fht] FMC Alias Private Key: 7
2,871,473 UART: [art] Extend RT PCRs Done
2,871,901 UART: [art] Lock RT PCRs Done
2,873,641 UART: [art] Populate DV Done
2,881,848 UART: [fht] FMC Alias Private Key: 7
2,882,778 UART: [art] Derive CDI
2,883,058 UART: [art] Store in slot 0x4
2,968,703 UART: [art] Derive Key Pair
2,969,063 UART: [art] Store priv key in slot 0x5
2,982,391 UART: [art] Derive Key Pair - Done
2,996,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,396 UART: [art] PUB.X = F12771ABC986DC60803D5F1364E32F85B4137F47A70E990F8F73833106D5CD7B2680A6433DF4F10E68DA497A0BF4B7B4
3,020,153 UART: [art] PUB.Y = 89A8CE2B0CAB0C181753974529994BF0B7AFFE552F0ED29F4BFDDC527E9CE0E302A702F04B964CBC077D8942150616DD
3,027,094 UART: [art] SIG.R = 49C4B860320C5B1492A77D6DEA6E9F0FD26B0B32AD5BBDDA7A261FB83629BC1CE116B8A26CE403B9665BF74A54AAF9FC
3,033,874 UART: [art] SIG.S = D0189BF5C5D22D65E9115ED18820E0B4592025EAC1F3158CBAE9E8A976C2F422E4D6C4F0C72A955B576FD9BD41F885B0
3,057,546 UART: Caliptra RT
3,057,889 UART: [state] CFI Enabled
3,176,888 UART: [rt] RT listening for mailbox commands...
3,177,558 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,926 UART: [rt]cmd =0x41545348, len=116
3,209,607 >>> mbox cmd response data (12 bytes)
3,209,608 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,239,297 >>> mbox cmd response: success
5,239,297 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,252,330 UART:
5,252,346 UART: Running Caliptra FMC ...
5,252,754 UART:
5,252,897 UART: [state] CFI Enabled
5,342,412 UART: [art] Extend RT PCRs Done
5,342,840 UART: [art] Lock RT PCRs Done
5,343,971 UART: [art] Populate DV Done
5,352,228 UART: [fht] FMC Alias Private Key: 7
5,353,302 UART: [art] Derive CDI
5,353,582 UART: [art] Store in slot 0x4
5,439,837 UART: [art] Derive Key Pair
5,440,197 UART: [art] Store priv key in slot 0x5
5,453,403 UART: [art] Derive Key Pair - Done
5,468,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,475 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,240 UART: [art] PUB.X = C713D282D071B288B2ED96D3E66145DA63D5044A24CFD1CFF4AF99CADA175F2E8AF4262048B2F8AAEDD5F3FF173D4312
5,491,025 UART: [art] PUB.Y = E0B1784272ADF92C5DD7C65FA935D4A8A273ABA2462C669E0FED7F033FB696005DC99E2574638B9042A618AA0D569AB1
5,497,952 UART: [art] SIG.R = AD1A8250CB8EE0E148F7C8D7632DC287B0ED6304C432B5DF7DD2F9FADDECB9F315CB854165EFF1246B02B6B60DD08082
5,504,733 UART: [art] SIG.S = 8488A7B6B35B78A7F251D254502F2063E5A3BF3B1B43B14B54BED1FE9491E814E1A2A30664354D1DDA64499DAEC6EC2E
5,528,618 UART: mbox::rt_entry...
5,528,990 UART: ____ _ _ _ ____ _____
5,529,774 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,530,574 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,531,342 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,532,110 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,532,878 UART: |_|
5,533,190 UART:
5,898,801 UART: [rt] Runtime listening for mailbox commands...
5,899,999 >>> mbox cmd response data (48 bytes)
5,900,000 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,902,787 >>> mbox cmd response data (48 bytes)
5,902,788 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,918,734 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
192,125 UART:
192,489 UART: Running Caliptra ROM ...
193,678 UART:
193,837 UART: [state] CFI Enabled
263,728 UART: [state] LifecycleState = Unprovisioned
265,709 UART: [state] DebugLocked = No
267,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,791 UART: [kat] SHA2-256
441,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,022 UART: [kat] ++
452,506 UART: [kat] sha1
462,786 UART: [kat] SHA2-256
465,451 UART: [kat] SHA2-384
472,503 UART: [kat] SHA2-512-ACC
474,869 UART: [kat] ECC-384
2,766,827 UART: [kat] HMAC-384Kdf
2,799,260 UART: [kat] LMS
3,989,519 UART: [kat] --
3,993,318 UART: [cold-reset] ++
3,995,392 UART: [fht] Storing FHT @ 0x50003400
4,006,881 UART: [idev] ++
4,007,501 UART: [idev] CDI.KEYID = 6
4,008,428 UART: [idev] SUBJECT.KEYID = 7
4,009,631 UART: [idev] UDS.KEYID = 0
4,010,681 ready_for_fw is high
4,010,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,929 UART: [idev] Erasing UDS.KEYID = 0
7,347,838 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,527 UART: [idev] --
7,373,743 UART: [ldev] ++
7,374,376 UART: [ldev] CDI.KEYID = 6
7,375,291 UART: [ldev] SUBJECT.KEYID = 5
7,376,505 UART: [ldev] AUTHORITY.KEYID = 7
7,377,791 UART: [ldev] FE.KEYID = 1
7,422,869 UART: [ldev] Erasing FE.KEYID = 1
10,757,106 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,136 UART: [ldev] --
13,136,495 UART: [fwproc] Waiting for Commands...
13,139,618 UART: [fwproc] Received command 0x46574c44
13,141,797 UART: [fwproc] Received Image of size 118548 bytes
17,250,276 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,277 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,135 >>> mbox cmd response: success
17,729,643 UART: [afmc] ++
17,730,262 UART: [afmc] CDI.KEYID = 6
17,731,178 UART: [afmc] SUBJECT.KEYID = 7
17,732,396 UART: [afmc] AUTHORITY.KEYID = 5
21,095,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,947 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,374 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,837 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,444 UART: [afmc] --
23,462,988 UART: [cold-reset] --
23,466,265 UART: [state] Locking Datavault
23,471,566 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,320 UART: [state] Locking ICCM
23,474,659 UART: [exit] Launching FMC @ 0x40000130
23,483,056 UART:
23,483,297 UART: Running Caliptra FMC ...
23,484,399 UART:
23,484,563 UART: [state] CFI Enabled
23,552,398 UART: [fht] FMC Alias Private Key: 7
25,893,700 UART: [art] Extend RT PCRs Done
25,894,942 UART: [art] Lock RT PCRs Done
25,896,565 UART: [art] Populate DV Done
25,901,923 UART: [fht] FMC Alias Private Key: 7
25,903,622 UART: [art] Derive CDI
25,904,440 UART: [art] Store in slot 0x4
25,961,342 UART: [art] Derive Key Pair
25,962,408 UART: [art] Store priv key in slot 0x5
29,255,532 UART: [art] Derive Key Pair - Done
29,268,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,548 UART: [art] PUB.X = FE9F4F284ECDB871EF3F027A018476B4C47F8041AE363AFBCFAB785FB02B0A6D773E816E4828B039FC0CB47D1BD21C50
31,566,841 UART: [art] PUB.Y = B5A402607DF4243E2D8AB35920C11F3B2AAC230E768E3422837B16B094E74361B2898721AE4CCB78898E68FE6D6CA15D
31,574,117 UART: [art] SIG.R = 8F684DD0FBE6228B86BE7702B3BAE81AA3B8A6982B718C003CF34867513B4BE9D5E9F9466A9091991B37423A9EE7F755
31,581,512 UART: [art] SIG.S = 584E8CF43D6393F910F1531E8CC4C6AA1F68ACFE64AC2F9CF9CE50A5AE4A3DDE4A31EE81B295BA6EBB281A2C7444ACFF
32,886,289 UART: Caliptra RT
32,887,004 UART: [state] CFI Enabled
33,064,710 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,132,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,287,719 UART: [rt]cmd =0x41544d4e, len=14344
42,588,029 >>> mbox cmd response data (8 bytes)
42,588,618 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,619,301 UART: [rt]cmd =0x41545348, len=116
42,621,452 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,806,893 ready_for_fw is high
3,807,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,968,929 >>> mbox cmd response: success
23,654,216 UART:
23,654,620 UART: Running Caliptra FMC ...
23,655,767 UART:
23,655,923 UART: [state] CFI Enabled
23,722,114 UART: [fht] FMC Alias Private Key: 7
26,062,162 UART: [art] Extend RT PCRs Done
26,063,390 UART: [art] Lock RT PCRs Done
26,065,214 UART: [art] Populate DV Done
26,070,532 UART: [fht] FMC Alias Private Key: 7
26,072,131 UART: [art] Derive CDI
26,072,873 UART: [art] Store in slot 0x4
26,130,585 UART: [art] Derive Key Pair
26,131,629 UART: [art] Store priv key in slot 0x5
29,424,157 UART: [art] Derive Key Pair - Done
29,437,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,861 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,370 UART: [art] PUB.X = E9E7699D747A903348DC80688383335DF2D5D85F0F5E7FC867EFCF04A81A0BA3163D905E4219CA6384B41A71CE97DEF5
31,734,619 UART: [art] PUB.Y = CA4AB1BEA3105F82ACC521C7C23F30B936DE8A5CA6A3A773537D7BC942F0376774BDD644B08BBE180FE863114E65BF46
31,741,898 UART: [art] SIG.R = 1C33F1CED7EDA5D0EAE8FD6181B4B712A56FCA82EC94897086DC10F16AC93C6C46F093547B7DAE35A24A82C043DFB550
31,749,299 UART: [art] SIG.S = 0EA00540A5E3E14C84B342371814AFFCE33E17F82D5DE789BC1B358B244BEAC6DDD2907F081ACDFD448402385E7ADA6D
33,054,246 UART: Caliptra RT
33,055,439 UART: [state] CFI Enabled
33,232,168 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,300,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,456,255 UART: [rt]cmd =0x41544d4e, len=14344
42,757,101 >>> mbox cmd response data (8 bytes)
42,757,696 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,788,549 UART: [rt]cmd =0x41545348, len=116
42,790,910 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
192,380 UART:
192,760 UART: Running Caliptra ROM ...
194,211 UART:
603,605 UART: [state] CFI Enabled
616,795 UART: [state] LifecycleState = Unprovisioned
618,743 UART: [state] DebugLocked = No
620,968 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,607 UART: [kat] SHA2-256
796,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,932 UART: [kat] ++
807,570 UART: [kat] sha1
818,025 UART: [kat] SHA2-256
820,679 UART: [kat] SHA2-384
826,730 UART: [kat] SHA2-512-ACC
829,090 UART: [kat] ECC-384
3,114,524 UART: [kat] HMAC-384Kdf
3,126,759 UART: [kat] LMS
4,316,850 UART: [kat] --
4,321,902 UART: [cold-reset] ++
4,323,475 UART: [fht] Storing FHT @ 0x50003400
4,334,732 UART: [idev] ++
4,335,283 UART: [idev] CDI.KEYID = 6
4,336,303 UART: [idev] SUBJECT.KEYID = 7
4,337,464 UART: [idev] UDS.KEYID = 0
4,338,498 ready_for_fw is high
4,338,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,996 UART: [idev] Erasing UDS.KEYID = 0
7,621,704 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,248 UART: [idev] --
7,647,604 UART: [ldev] ++
7,648,232 UART: [ldev] CDI.KEYID = 6
7,649,142 UART: [ldev] SUBJECT.KEYID = 5
7,650,405 UART: [ldev] AUTHORITY.KEYID = 7
7,651,649 UART: [ldev] FE.KEYID = 1
7,662,778 UART: [ldev] Erasing FE.KEYID = 1
10,951,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,586 UART: [ldev] --
13,311,000 UART: [fwproc] Waiting for Commands...
13,313,529 UART: [fwproc] Received command 0x46574c44
13,315,744 UART: [fwproc] Received Image of size 118548 bytes
17,414,580 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,631 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,890,844 >>> mbox cmd response: success
17,894,281 UART: [afmc] ++
17,894,890 UART: [afmc] CDI.KEYID = 6
17,895,799 UART: [afmc] SUBJECT.KEYID = 7
17,897,011 UART: [afmc] AUTHORITY.KEYID = 5
21,215,870 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,926 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,377 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,219 UART: [afmc] --
23,583,890 UART: [cold-reset] --
23,588,234 UART: [state] Locking Datavault
23,595,201 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,899 UART: [state] Locking ICCM
23,599,150 UART: [exit] Launching FMC @ 0x40000130
23,607,536 UART:
23,607,782 UART: Running Caliptra FMC ...
23,608,878 UART:
23,609,039 UART: [state] CFI Enabled
23,616,901 UART: [fht] FMC Alias Private Key: 7
25,956,593 UART: [art] Extend RT PCRs Done
25,957,811 UART: [art] Lock RT PCRs Done
25,959,490 UART: [art] Populate DV Done
25,964,733 UART: [fht] FMC Alias Private Key: 7
25,966,329 UART: [art] Derive CDI
25,967,137 UART: [art] Store in slot 0x4
26,009,503 UART: [art] Derive Key Pair
26,010,504 UART: [art] Store priv key in slot 0x5
29,252,445 UART: [art] Derive Key Pair - Done
29,265,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,684 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,198 UART: [art] PUB.X = 1C6C6BA8409C2C140C23A0AC3FFEC248330375DD2FD9A24AC75333337F5FD8E85F496EBCD3A1C7D330D76634D6BEA2E7
31,554,518 UART: [art] PUB.Y = 46130E64ADA01F8AFE0B7A7DBCA351E36F054C8FC53D6A9B3CFC0055B569FAB5CC14A46C6807C39DF4447D73BE354482
31,561,748 UART: [art] SIG.R = 148686741EBF9D7D6037689035639277DD70C5B7E9A76A728DAF7A3FD71EB5F206A7C3E06B65442A7FD34768E06ED062
31,569,132 UART: [art] SIG.S = 38D53888BA9AA68980E35B30EA7C93BF8D1CCB88010151A45B1B4A352299841994BBF034F1D08BFEE998B9A2633B5AE4
32,873,581 UART: Caliptra RT
32,874,282 UART: [state] CFI Enabled
33,007,501 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,071,454 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,227,097 UART: [rt]cmd =0x41544d4e, len=14344
42,527,846 >>> mbox cmd response data (8 bytes)
42,528,429 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,559,157 UART: [rt]cmd =0x41545348, len=116
42,561,410 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
4,129,885 ready_for_fw is high
4,130,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,410 >>> mbox cmd response: success
23,808,183 UART:
23,808,572 UART: Running Caliptra FMC ...
23,809,684 UART:
23,809,857 UART: [state] CFI Enabled
23,818,190 UART: [fht] FMC Alias Private Key: 7
26,158,338 UART: [art] Extend RT PCRs Done
26,159,561 UART: [art] Lock RT PCRs Done
26,161,461 UART: [art] Populate DV Done
26,166,772 UART: [fht] FMC Alias Private Key: 7
26,168,368 UART: [art] Derive CDI
26,169,181 UART: [art] Store in slot 0x4
26,211,886 UART: [art] Derive Key Pair
26,212,929 UART: [art] Store priv key in slot 0x5
29,455,341 UART: [art] Derive Key Pair - Done
29,468,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,487 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,993 UART: [art] PUB.X = CE134F920BAEF9989E3D4DA3D624A8BBEFCFB0A425010B2593E4915855039F784EE0FEE1BB73D2ABFC1B517CCA0A7990
31,757,296 UART: [art] PUB.Y = 1B9179B4E7F32CE76A6BF1E5D6EE24CFFBA38D9CE920184F2BDCF5FB2B0D34562E3D626E952BC87ECF40F40E724A6CE9
31,764,594 UART: [art] SIG.R = 1A65750DF62A9D1194B096F4D238963638154329B43210CBD198731126891339450D95B2BA716B1ECE863A770AF6FE1C
31,771,949 UART: [art] SIG.S = 7369B1FA40442C6E32A9E34DF31E98673229C9AAC1497A77EF845919CE67EFCA14F9450B21C4831D7B8DA83B1439D96F
33,077,062 UART: Caliptra RT
33,077,789 UART: [state] CFI Enabled
33,210,576 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,272,809 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,428,233 UART: [rt]cmd =0x41544d4e, len=14344
42,729,344 >>> mbox cmd response data (8 bytes)
42,729,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,760,677 UART: [rt]cmd =0x41545348, len=116
42,763,122 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,998 UART:
192,364 UART: Running Caliptra ROM ...
193,544 UART:
193,695 UART: [state] CFI Enabled
263,166 UART: [state] LifecycleState = Unprovisioned
265,089 UART: [state] DebugLocked = No
267,199 UART: [state] WD Timer not started. Device not locked for debugging
271,795 UART: [kat] SHA2-256
451,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,269 UART: [kat] ++
462,804 UART: [kat] sha1
473,735 UART: [kat] SHA2-256
476,390 UART: [kat] SHA2-384
482,300 UART: [kat] SHA2-512-ACC
484,659 UART: [kat] ECC-384
2,948,950 UART: [kat] HMAC-384Kdf
2,971,844 UART: [kat] LMS
3,448,325 UART: [kat] --
3,452,741 UART: [cold-reset] ++
3,454,172 UART: [fht] FHT @ 0x50003400
3,466,138 UART: [idev] ++
3,466,706 UART: [idev] CDI.KEYID = 6
3,467,732 UART: [idev] SUBJECT.KEYID = 7
3,468,901 UART: [idev] UDS.KEYID = 0
3,469,965 ready_for_fw is high
3,470,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,388 UART: [idev] Erasing UDS.KEYID = 0
5,990,657 UART: [idev] Sha1 KeyId Algorithm
6,014,404 UART: [idev] --
6,018,957 UART: [ldev] ++
6,019,524 UART: [ldev] CDI.KEYID = 6
6,020,464 UART: [ldev] SUBJECT.KEYID = 5
6,021,671 UART: [ldev] AUTHORITY.KEYID = 7
6,022,953 UART: [ldev] FE.KEYID = 1
6,059,292 UART: [ldev] Erasing FE.KEYID = 1
8,561,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,835 UART: [ldev] --
10,373,944 UART: [fwproc] Wait for Commands...
10,376,293 UART: [fwproc] Recv command 0x46574c44
10,378,331 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,909 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,022 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,036 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,335,987 >>> mbox cmd response: success
14,340,067 UART: [afmc] ++
14,340,682 UART: [afmc] CDI.KEYID = 6
14,341,617 UART: [afmc] SUBJECT.KEYID = 7
14,342,826 UART: [afmc] AUTHORITY.KEYID = 5
16,875,414 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,910 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,094 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,884 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,499 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,061 UART: [afmc] --
18,695,697 UART: [cold-reset] --
18,699,722 UART: [state] Locking Datavault
18,705,179 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,923 UART: [state] Locking ICCM
18,708,505 UART: [exit] Launching FMC @ 0x40000130
18,716,940 UART:
18,717,175 UART: Running Caliptra FMC ...
18,718,198 UART:
18,718,342 UART: [state] CFI Enabled
18,775,249 UART: [fht] FMC Alias Private Key: 7
20,541,817 UART: [art] Extend RT PCRs Done
20,543,041 UART: [art] Lock RT PCRs Done
20,544,861 UART: [art] Populate DV Done
20,550,286 UART: [fht] FMC Alias Private Key: 7
20,551,980 UART: [art] Derive CDI
20,552,715 UART: [art] Store in slot 0x4
20,607,526 UART: [art] Derive Key Pair
20,608,520 UART: [art] Store priv key in slot 0x5
23,071,383 UART: [art] Derive Key Pair - Done
23,084,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,409 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,914 UART: [art] PUB.X = 832B45EA2EE2B34A0E2D4CD1AF0632197C35D7512045E566AA904B16997F6205018BA5632559F9F3B4E455207C1FFB1C
24,805,154 UART: [art] PUB.Y = 15B010DA0BAC5AE0721A22022BF95B94DD8FA314F5BA41DF16D4F6B2180C10CA1A2793F02B6846A46EB145C1D5033BC6
24,812,436 UART: [art] SIG.R = EC238797CA43B004B6046D4B4273451CE9EA14FAE3D0D775AB135D39680689125535E055DB787BD2D5EADBA30D44BE0C
24,819,826 UART: [art] SIG.S = D098CF1DFAC2524AB8BDEE2DF6CB5399AF355DD8187F2C2465D0E751B59D63D24DE7167B66DDB409182DD7014C95AA61
25,798,509 UART: Caliptra RT
25,799,200 UART: [state] CFI Enabled
25,979,115 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,014,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,170,207 UART: [rt]cmd =0x41544d4e, len=14344
34,165,877 >>> mbox cmd response data (8 bytes)
34,166,471 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,197,371 UART: [rt]cmd =0x41545348, len=116
34,199,633 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,462,654 ready_for_fw is high
3,463,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,938 >>> mbox cmd response: success
18,536,242 UART:
18,536,626 UART: Running Caliptra FMC ...
18,537,927 UART:
18,538,091 UART: [state] CFI Enabled
18,601,913 UART: [fht] FMC Alias Private Key: 7
20,368,433 UART: [art] Extend RT PCRs Done
20,369,657 UART: [art] Lock RT PCRs Done
20,371,443 UART: [art] Populate DV Done
20,376,906 UART: [fht] FMC Alias Private Key: 7
20,378,601 UART: [art] Derive CDI
20,379,416 UART: [art] Store in slot 0x4
20,434,834 UART: [art] Derive Key Pair
20,435,829 UART: [art] Store priv key in slot 0x5
22,898,437 UART: [art] Derive Key Pair - Done
22,911,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,275 UART: [art] PUB.X = 0DAB37BE10978C42BA82D32CB0E40942178A96AEE35173B442DB4A8B0FE9FAEF85B452DBBB97178EE5ED06D86AD44957
24,633,536 UART: [art] PUB.Y = 6DD1E99E530542AE881B2ECF35715776FCDA71C7E2E7A9358CE1A7D0D34DBC16C14E094FD5B862D2A1C3B3CC090CF224
24,640,839 UART: [art] SIG.R = E98AF3EEA399A13D9F733F90E631C1FE12BCEE67E3A113E89681A83183C656F2DDF67AAC3A33BE4629DFC4B36EAE386B
24,648,233 UART: [art] SIG.S = 967958F8EFE18CDABC182055741CA237E523F5D57577702825E9FDA5ABA52E008CEEAE04F5452667B87482AEB6F9734A
25,627,016 UART: Caliptra RT
25,627,735 UART: [state] CFI Enabled
25,808,088 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,842,979 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,998,689 UART: [rt]cmd =0x41544d4e, len=14344
33,995,079 >>> mbox cmd response data (8 bytes)
33,995,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,026,151 UART: [rt]cmd =0x41545348, len=116
34,028,254 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,333 UART:
192,820 UART: Running Caliptra ROM ...
193,962 UART:
603,691 UART: [state] CFI Enabled
619,027 UART: [state] LifecycleState = Unprovisioned
620,926 UART: [state] DebugLocked = No
623,879 UART: [state] WD Timer not started. Device not locked for debugging
626,854 UART: [kat] SHA2-256
806,496 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,284 UART: [kat] ++
817,763 UART: [kat] sha1
828,282 UART: [kat] SHA2-256
831,003 UART: [kat] SHA2-384
836,025 UART: [kat] SHA2-512-ACC
838,399 UART: [kat] ECC-384
3,280,658 UART: [kat] HMAC-384Kdf
3,293,402 UART: [kat] LMS
3,769,920 UART: [kat] --
3,774,609 UART: [cold-reset] ++
3,776,610 UART: [fht] FHT @ 0x50003400
3,789,009 UART: [idev] ++
3,789,589 UART: [idev] CDI.KEYID = 6
3,790,541 UART: [idev] SUBJECT.KEYID = 7
3,791,787 UART: [idev] UDS.KEYID = 0
3,792,713 ready_for_fw is high
3,792,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,863 UART: [idev] Erasing UDS.KEYID = 0
6,270,544 UART: [idev] Sha1 KeyId Algorithm
6,294,422 UART: [idev] --
6,299,298 UART: [ldev] ++
6,299,929 UART: [ldev] CDI.KEYID = 6
6,300,844 UART: [ldev] SUBJECT.KEYID = 5
6,302,004 UART: [ldev] AUTHORITY.KEYID = 7
6,303,300 UART: [ldev] FE.KEYID = 1
6,313,947 UART: [ldev] Erasing FE.KEYID = 1
8,792,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,251 UART: [ldev] --
10,586,013 UART: [fwproc] Wait for Commands...
10,588,548 UART: [fwproc] Recv command 0x46574c44
10,590,593 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,923 >>> mbox cmd response: success
14,564,570 UART: [afmc] ++
14,565,181 UART: [afmc] CDI.KEYID = 6
14,566,096 UART: [afmc] SUBJECT.KEYID = 7
14,567,321 UART: [afmc] AUTHORITY.KEYID = 5
17,068,544 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,604 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,605 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,482 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,071 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,781 UART: [afmc] --
18,870,062 UART: [cold-reset] --
18,873,172 UART: [state] Locking Datavault
18,878,659 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,419 UART: [state] Locking ICCM
18,882,410 UART: [exit] Launching FMC @ 0x40000130
18,890,840 UART:
18,891,142 UART: Running Caliptra FMC ...
18,892,260 UART:
18,892,424 UART: [state] CFI Enabled
18,900,451 UART: [fht] FMC Alias Private Key: 7
20,666,272 UART: [art] Extend RT PCRs Done
20,667,489 UART: [art] Lock RT PCRs Done
20,668,958 UART: [art] Populate DV Done
20,674,477 UART: [fht] FMC Alias Private Key: 7
20,676,127 UART: [art] Derive CDI
20,676,947 UART: [art] Store in slot 0x4
20,719,760 UART: [art] Derive Key Pair
20,720,762 UART: [art] Store priv key in slot 0x5
23,147,488 UART: [art] Derive Key Pair - Done
23,160,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,731 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,242 UART: [art] PUB.X = B9BA8B6747EB439E0459344366BA85FC6B0C9C943F90D65E08D7DB19C13EE427C8D23B4147F9ABDB5F6E9446C2D41D3F
24,875,489 UART: [art] PUB.Y = 5F9B618522191A3BC2348DCCCF0EF7638C328AC455C213C0268E02E5CE48D2B460E416493E3EDB192A61543A86F27B9C
24,882,764 UART: [art] SIG.R = 376E7E1955C9904769A7CEFB962A2E40B75E5C8782738E6B2FD5B6C6CC02F65B8E92B02245D080DD5CE28226E35FDF15
24,890,174 UART: [art] SIG.S = AC637A47F4C32BC01AEC93B6B13E43B517D9FCD748E46F6610F1A8D772DC73CB7FB0A0B47F9961D34FC303573AE863B7
25,869,035 UART: Caliptra RT
25,869,747 UART: [state] CFI Enabled
26,002,027 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,052,010 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,207,590 UART: [rt]cmd =0x41544d4e, len=14344
34,202,893 >>> mbox cmd response data (8 bytes)
34,203,452 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,234,048 UART: [rt]cmd =0x41545348, len=116
34,236,168 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,783,123 ready_for_fw is high
3,783,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,113 >>> mbox cmd response: success
18,696,200 UART:
18,696,604 UART: Running Caliptra FMC ...
18,697,799 UART:
18,697,984 UART: [state] CFI Enabled
18,706,005 UART: [fht] FMC Alias Private Key: 7
20,471,549 UART: [art] Extend RT PCRs Done
20,472,774 UART: [art] Lock RT PCRs Done
20,474,462 UART: [art] Populate DV Done
20,479,940 UART: [fht] FMC Alias Private Key: 7
20,481,520 UART: [art] Derive CDI
20,482,266 UART: [art] Store in slot 0x4
20,524,535 UART: [art] Derive Key Pair
20,525,537 UART: [art] Store priv key in slot 0x5
22,951,829 UART: [art] Derive Key Pair - Done
22,964,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,415 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,920 UART: [art] PUB.X = 7C2AA5E3F67A5194601788DF551CD405C4C3AA9BDFB1F96122E7507F47C5AEA460083E61CB3D686EE99049ACE474E729
24,680,240 UART: [art] PUB.Y = 76AD948AEA1C0CD3F3651D2110396EF6E1B9480922A316C1619CDFD479FA3A74A1DCAEF475899EAE450DBF3D42210C26
24,687,500 UART: [art] SIG.R = 9AD1E30A8461CEFFAD74E9D1EF1DA8A87D03AEB8B26C41039AD6AF323CA21C78786F3FA6FC83EF985C92B29D4114D82B
24,694,903 UART: [art] SIG.S = E44CFA116CEADA40EF89C88C9B11CD053C0B3BCEB41392F42319A1F0C8C7240B0E79F59A4086390AD93C3DE2301ED7A6
25,673,623 UART: Caliptra RT
25,674,324 UART: [state] CFI Enabled
25,807,394 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,848,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,004,290 UART: [rt]cmd =0x41544d4e, len=14344
33,999,391 >>> mbox cmd response data (8 bytes)
33,999,973 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,030,879 UART: [rt]cmd =0x41545348, len=116
34,033,092 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,116 UART:
192,475 UART: Running Caliptra ROM ...
193,663 UART:
193,815 UART: [state] CFI Enabled
263,194 UART: [state] LifecycleState = Unprovisioned
265,622 UART: [state] DebugLocked = No
268,152 UART: [state] WD Timer not started. Device not locked for debugging
272,906 UART: [kat] SHA2-256
462,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,605 UART: [kat] ++
474,095 UART: [kat] sha1
485,257 UART: [kat] SHA2-256
488,271 UART: [kat] SHA2-384
494,333 UART: [kat] SHA2-512-ACC
496,907 UART: [kat] ECC-384
2,948,147 UART: [kat] HMAC-384Kdf
2,971,480 UART: [kat] LMS
3,503,286 UART: [kat] --
3,508,413 UART: [cold-reset] ++
3,510,841 UART: [fht] FHT @ 0x50003400
3,523,660 UART: [idev] ++
3,524,369 UART: [idev] CDI.KEYID = 6
3,525,400 UART: [idev] SUBJECT.KEYID = 7
3,526,496 UART: [idev] UDS.KEYID = 0
3,527,543 ready_for_fw is high
3,527,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,310 UART: [idev] Erasing UDS.KEYID = 0
6,027,134 UART: [idev] Sha1 KeyId Algorithm
6,049,771 UART: [idev] --
6,054,734 UART: [ldev] ++
6,055,418 UART: [ldev] CDI.KEYID = 6
6,056,343 UART: [ldev] SUBJECT.KEYID = 5
6,057,522 UART: [ldev] AUTHORITY.KEYID = 7
6,058,700 UART: [ldev] FE.KEYID = 1
6,098,620 UART: [ldev] Erasing FE.KEYID = 1
8,606,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,035 UART: [ldev] --
10,413,838 UART: [fwproc] Wait for Commands...
10,415,661 UART: [fwproc] Recv command 0x46574c44
10,417,966 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,942 >>> mbox cmd response: success
14,683,851 UART: [afmc] ++
14,684,570 UART: [afmc] CDI.KEYID = 6
14,685,679 UART: [afmc] SUBJECT.KEYID = 7
14,687,222 UART: [afmc] AUTHORITY.KEYID = 5
17,231,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,092 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,024,609 UART: [afmc] --
19,028,559 UART: [cold-reset] --
19,031,887 UART: [state] Locking Datavault
19,039,033 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,188 UART: [state] Locking ICCM
19,044,131 UART: [exit] Launching FMC @ 0x40000130
19,052,767 UART:
19,052,998 UART: Running Caliptra FMC ...
19,054,037 UART:
19,054,185 UART: [state] CFI Enabled
19,112,866 UART: [fht] FMC Alias Private Key: 7
20,879,732 UART: [art] Extend RT PCRs Done
20,880,951 UART: [art] Lock RT PCRs Done
20,882,548 UART: [art] Populate DV Done
20,887,746 UART: [fht] FMC Alias Private Key: 7
20,889,281 UART: [art] Derive CDI
20,890,012 UART: [art] Store in slot 0x4
20,945,431 UART: [art] Derive Key Pair
20,946,467 UART: [art] Store priv key in slot 0x5
23,409,097 UART: [art] Derive Key Pair - Done
23,422,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,360 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,869 UART: [art] PUB.X = 76E3D8AA760BC6FAF92B25834C59F10AC9CA13473EFB2917D051C6EE8B45788F38C14177F918253C7920F74A0CFD29C4
25,143,134 UART: [art] PUB.Y = F1F3333CAAE35F3C860146792758E74799DA7C5A9AAECD858F379146DB814FF0FC9CE22AB2ED987AA321999AA79903EB
25,150,439 UART: [art] SIG.R = 8CDEADE678ECB1187F04FB40BBDDED8917C3EBF43187BF1E3982440B33BA990E9AAEDF27F6F3007A801E29FCF4D6C261
25,157,796 UART: [art] SIG.S = BD73C8323003791B78063D8691018B1D28EF2063683C3FC023E190690960A52D8B9FF6316AD12B898075ABF66292E9BC
26,137,149 UART: Caliptra RT
26,137,858 UART: [state] CFI Enabled
26,316,474 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,373,858 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,529,686 UART: [rt]cmd =0x41544d4e, len=14344
34,524,985 >>> mbox cmd response data (8 bytes)
34,525,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,556,193 UART: [rt]cmd =0x41545348, len=116
34,558,373 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,440,898 ready_for_fw is high
3,441,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,711 >>> mbox cmd response: success
19,145,212 UART:
19,145,600 UART: Running Caliptra FMC ...
19,146,769 UART:
19,146,932 UART: [state] CFI Enabled
19,211,530 UART: [fht] FMC Alias Private Key: 7
20,977,499 UART: [art] Extend RT PCRs Done
20,978,719 UART: [art] Lock RT PCRs Done
20,980,291 UART: [art] Populate DV Done
20,986,030 UART: [fht] FMC Alias Private Key: 7
20,987,577 UART: [art] Derive CDI
20,988,388 UART: [art] Store in slot 0x4
21,044,553 UART: [art] Derive Key Pair
21,045,592 UART: [art] Store priv key in slot 0x5
23,508,665 UART: [art] Derive Key Pair - Done
23,521,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,715 UART: [art] PUB.X = 1F579762E106F2B6B473C0BBC0CF530A4F3D4C35168A43E0439DE59C3A0781DF5BB55E227AA64DB17732C096332AF185
25,243,947 UART: [art] PUB.Y = 5A76B7BB7091A3025074EBCBA21619A95881984FA79F1D5B7A20A14F61B392CAD875B45A7C28A60EDC8330963CDE4ED0
25,251,203 UART: [art] SIG.R = 2ADA74EBA79189EB69FA4F97074A4A62A55CF1EE975E58BBD20534E5AA2368D0B8A4F0B8EF6CD7936436F6BDF288C7F0
25,258,646 UART: [art] SIG.S = 88AA305C81DF667C5D8CBB8C627C027D0F66391A2D59D02411E656BAC5CC490FDD1A1631696DEB6058FE1321A78F3F77
26,236,909 UART: Caliptra RT
26,237,646 UART: [state] CFI Enabled
26,418,534 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,469,656 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,625,141 UART: [rt]cmd =0x41544d4e, len=14344
34,620,889 >>> mbox cmd response data (8 bytes)
34,621,462 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,652,243 UART: [rt]cmd =0x41545348, len=116
34,654,100 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
192,340 UART:
192,706 UART: Running Caliptra ROM ...
193,852 UART:
603,337 UART: [state] CFI Enabled
616,524 UART: [state] LifecycleState = Unprovisioned
618,903 UART: [state] DebugLocked = No
621,206 UART: [state] WD Timer not started. Device not locked for debugging
625,748 UART: [kat] SHA2-256
815,585 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,393 UART: [kat] ++
826,841 UART: [kat] sha1
838,867 UART: [kat] SHA2-256
841,847 UART: [kat] SHA2-384
847,146 UART: [kat] SHA2-512-ACC
849,735 UART: [kat] ECC-384
3,288,286 UART: [kat] HMAC-384Kdf
3,300,970 UART: [kat] LMS
3,832,780 UART: [kat] --
3,836,780 UART: [cold-reset] ++
3,838,356 UART: [fht] FHT @ 0x50003400
3,848,769 UART: [idev] ++
3,849,475 UART: [idev] CDI.KEYID = 6
3,850,361 UART: [idev] SUBJECT.KEYID = 7
3,851,608 UART: [idev] UDS.KEYID = 0
3,852,514 ready_for_fw is high
3,852,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,603 UART: [idev] Erasing UDS.KEYID = 0
6,332,668 UART: [idev] Sha1 KeyId Algorithm
6,354,836 UART: [idev] --
6,360,323 UART: [ldev] ++
6,361,024 UART: [ldev] CDI.KEYID = 6
6,361,915 UART: [ldev] SUBJECT.KEYID = 5
6,363,146 UART: [ldev] AUTHORITY.KEYID = 7
6,364,327 UART: [ldev] FE.KEYID = 1
6,376,179 UART: [ldev] Erasing FE.KEYID = 1
8,855,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,780 UART: [ldev] --
10,647,019 UART: [fwproc] Wait for Commands...
10,648,471 UART: [fwproc] Recv command 0x46574c44
10,650,455 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,461 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,581 >>> mbox cmd response: success
14,909,755 UART: [afmc] ++
14,910,471 UART: [afmc] CDI.KEYID = 6
14,911,672 UART: [afmc] SUBJECT.KEYID = 7
14,913,127 UART: [afmc] AUTHORITY.KEYID = 5
17,415,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,135,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,137,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,152,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,167,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,182,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,952 UART: [afmc] --
19,209,982 UART: [cold-reset] --
19,213,972 UART: [state] Locking Datavault
19,217,899 UART: [state] Locking PCR0, PCR1 and PCR31
19,220,062 UART: [state] Locking ICCM
19,222,020 UART: [exit] Launching FMC @ 0x40000130
19,230,696 UART:
19,230,938 UART: Running Caliptra FMC ...
19,232,046 UART:
19,232,211 UART: [state] CFI Enabled
19,240,319 UART: [fht] FMC Alias Private Key: 7
21,007,005 UART: [art] Extend RT PCRs Done
21,008,244 UART: [art] Lock RT PCRs Done
21,010,152 UART: [art] Populate DV Done
21,015,632 UART: [fht] FMC Alias Private Key: 7
21,017,235 UART: [art] Derive CDI
21,018,058 UART: [art] Store in slot 0x4
21,060,821 UART: [art] Derive Key Pair
21,061,827 UART: [art] Store priv key in slot 0x5
23,488,762 UART: [art] Derive Key Pair - Done
23,501,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,229 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,756 UART: [art] PUB.X = A5157AFE95657C1B01F2522695857FD0463B2D7B4E20B76C6CEA73A2F4EE681AEA6DB2560E7728264FC5ACBBD7E1AE53
25,217,033 UART: [art] PUB.Y = BB722A0B507DF60FB10E2CE38F216A414232DDC1760FAAE6C21AF43425EF8BE0F2942620B64B12D7A6A0DE125D306135
25,224,302 UART: [art] SIG.R = 171E3A3BBD534411B50BA750819A33C95195C95390756769C97B07800EE190C0401C167CCF098CD1D41B6D2C5447AD48
25,231,673 UART: [art] SIG.S = 76844EAD7F98D402A84C59A09CB2F81527D9A174D9422885C863699820A6FC093DE11C8A405CBC3B92F4EECC6CEB0246
26,210,742 UART: Caliptra RT
26,211,439 UART: [state] CFI Enabled
26,344,103 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,403,241 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,559,243 UART: [rt]cmd =0x41544d4e, len=14344
34,554,585 >>> mbox cmd response data (8 bytes)
34,555,776 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,586,387 UART: [rt]cmd =0x41545348, len=116
34,588,510 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,757,331 ready_for_fw is high
3,757,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,333 >>> mbox cmd response: success
19,313,251 UART:
19,313,649 UART: Running Caliptra FMC ...
19,314,795 UART:
19,314,960 UART: [state] CFI Enabled
19,323,030 UART: [fht] FMC Alias Private Key: 7
21,089,155 UART: [art] Extend RT PCRs Done
21,090,388 UART: [art] Lock RT PCRs Done
21,091,971 UART: [art] Populate DV Done
21,097,189 UART: [fht] FMC Alias Private Key: 7
21,098,760 UART: [art] Derive CDI
21,099,538 UART: [art] Store in slot 0x4
21,142,357 UART: [art] Derive Key Pair
21,143,402 UART: [art] Store priv key in slot 0x5
23,569,707 UART: [art] Derive Key Pair - Done
23,582,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,288,689 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,198 UART: [art] PUB.X = A3AC90CE4398614DAC813A621C5B8A9C5F3295FE2BC6671800601992665EEC9F2A3D29D5103988133C8838A3D260E0C4
25,297,434 UART: [art] PUB.Y = 118F3CC816F3D0B7EE778F9A2F50B4A8A625F4E75BCE614F054ED382430C8280522EDB0469EC3214FC761E4538F8B0AB
25,304,660 UART: [art] SIG.R = 02C98C4FEBDC085CE83C30BAE3DA1CEEF82580057FE37E7B4CECAB223C48930CE7F1E90CF804398C03A3BDE0F55FB0E2
25,312,088 UART: [art] SIG.S = 90D5981195C48F46A008A9B0DE8DB77CC5A9B56C8FB3D58F641CFF159F46D29EA7E8128662B39B5EF5EEEF51A9A53F38
26,290,822 UART: Caliptra RT
26,291,534 UART: [state] CFI Enabled
26,425,304 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,482,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,638,414 UART: [rt]cmd =0x41544d4e, len=14344
34,633,942 >>> mbox cmd response data (8 bytes)
34,634,541 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,665,400 UART: [rt]cmd =0x41545348, len=116
34,667,157 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,748 UART: [kat] HMAC-384Kdf
907,510 UART: [kat] LMS
1,475,706 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,479,876 UART: [idev] ++
1,480,044 UART: [idev] CDI.KEYID = 6
1,480,404 UART: [idev] SUBJECT.KEYID = 7
1,480,828 UART: [idev] UDS.KEYID = 0
1,481,173 ready_for_fw is high
1,481,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,708 UART: [idev] Erasing UDS.KEYID = 0
1,504,912 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,574 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,239 UART: [ldev] Erasing FE.KEYID = 1
1,546,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,250 UART: [ldev] --
1,585,593 UART: [fwproc] Waiting for Commands...
1,586,428 UART: [fwproc] Received command 0x46574c44
1,587,219 UART: [fwproc] Received Image of size 118548 bytes
2,932,797 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,975 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,518 >>> mbox cmd response: success
3,132,666 UART: [afmc] ++
3,132,834 UART: [afmc] CDI.KEYID = 6
3,133,196 UART: [afmc] SUBJECT.KEYID = 7
3,133,621 UART: [afmc] AUTHORITY.KEYID = 5
3,168,498 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,414 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,194 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,903 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,786 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,469 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,333 UART: [afmc] --
3,211,213 UART: [cold-reset] --
3,212,019 UART: [state] Locking Datavault
3,213,318 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,922 UART: [state] Locking ICCM
3,214,488 UART: [exit] Launching FMC @ 0x40000130
3,219,818 UART:
3,219,834 UART: Running Caliptra FMC ...
3,220,242 UART:
3,220,296 UART: [state] CFI Enabled
3,230,586 UART: [fht] FMC Alias Private Key: 7
3,349,916 UART: [art] Extend RT PCRs Done
3,350,344 UART: [art] Lock RT PCRs Done
3,351,992 UART: [art] Populate DV Done
3,360,125 UART: [fht] FMC Alias Private Key: 7
3,361,207 UART: [art] Derive CDI
3,361,487 UART: [art] Store in slot 0x4
3,447,245 UART: [art] Derive Key Pair
3,447,605 UART: [art] Store priv key in slot 0x5
3,460,596 UART: [art] Derive Key Pair - Done
3,475,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,188 UART: [art] PUB.X = 685BEA8AF755F2ADCB7563CF29661412242F2D20CEA08E7673F4171CF8F482D31ED31BD9717137CA53C7EAE84F67B922
3,497,966 UART: [art] PUB.Y = AC4649D1382BD1CB35D3448C3415789DEE65D91F6256AE4F53A6B6184DF633918F3D09044E36D53503F593AA8E96AF99
3,504,907 UART: [art] SIG.R = 4D69245403BE9860E120ADAF91D13F2FF217F4EEB6A9D8E362168D6E7E8BB9206A1479214FD20ACF49C727EE2906C181
3,511,674 UART: [art] SIG.S = 76C4E3507C10E62A3313920E52027699D583414FC4A0D42D78621CB20637459E1C9C1DB96A620FFAA852D0E2D9BDB1F5
3,535,216 UART: Caliptra RT
3,535,467 UART: [state] CFI Enabled
3,656,380 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,800 UART: [rt]cmd =0x41544d4e, len=14344
4,089,535 >>> mbox cmd response data (8 bytes)
4,089,536 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,893 UART: [rt]cmd =0x41545348, len=116
4,121,703 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,365 ready_for_fw is high
1,362,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,298 >>> mbox cmd response: success
3,042,261 UART:
3,042,277 UART: Running Caliptra FMC ...
3,042,685 UART:
3,042,739 UART: [state] CFI Enabled
3,053,189 UART: [fht] FMC Alias Private Key: 7
3,172,499 UART: [art] Extend RT PCRs Done
3,172,927 UART: [art] Lock RT PCRs Done
3,174,379 UART: [art] Populate DV Done
3,182,764 UART: [fht] FMC Alias Private Key: 7
3,183,766 UART: [art] Derive CDI
3,184,046 UART: [art] Store in slot 0x4
3,269,894 UART: [art] Derive Key Pair
3,270,254 UART: [art] Store priv key in slot 0x5
3,283,115 UART: [art] Derive Key Pair - Done
3,297,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,239 UART: [art] PUB.X = 99017F495FF1F72CDB1D1A69615F221CCE257A4E08335682D67EBDB69DF32BF03DA9B5C490A016BC3B42D0148164ABE6
3,321,013 UART: [art] PUB.Y = 437A18CCD3EC7C4C68C3DC40D9D43FA9A65B21B06352C083AD4FF5E56C19C8011735344CF87133BF114FA8BF4ED4DF2B
3,327,976 UART: [art] SIG.R = A5557C9D4FB843C2E38B373B1F1CA810C490034D31977DD5DE2C44EC78C37DF185B1AD16CA678DCE99463EEFAAFC46DB
3,334,763 UART: [art] SIG.S = B61AD36636062FD7B4EB4DB069D9F263B7A5052C4666501C8995D12A07BAD5FF596073548B76C5BCB1840A7F7E22CCF9
3,358,827 UART: Caliptra RT
3,359,078 UART: [state] CFI Enabled
3,478,747 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,417 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,355 UART: [rt]cmd =0x41544d4e, len=14344
3,912,202 >>> mbox cmd response data (8 bytes)
3,912,203 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,416 UART: [rt]cmd =0x41545348, len=116
3,944,162 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,853 UART: [state] LifecycleState = Unprovisioned
86,508 UART: [state] DebugLocked = No
87,214 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,740 UART: [kat] SHA2-256
882,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,786 UART: [kat] ++
886,938 UART: [kat] sha1
891,160 UART: [kat] SHA2-256
893,098 UART: [kat] SHA2-384
895,789 UART: [kat] SHA2-512-ACC
897,690 UART: [kat] ECC-384
903,267 UART: [kat] HMAC-384Kdf
907,839 UART: [kat] LMS
1,476,035 UART: [kat] --
1,476,974 UART: [cold-reset] ++
1,477,310 UART: [fht] Storing FHT @ 0x50003400
1,480,077 UART: [idev] ++
1,480,245 UART: [idev] CDI.KEYID = 6
1,480,605 UART: [idev] SUBJECT.KEYID = 7
1,481,029 UART: [idev] UDS.KEYID = 0
1,481,374 ready_for_fw is high
1,481,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,207 UART: [idev] Erasing UDS.KEYID = 0
1,505,539 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,253 UART: [idev] --
1,515,136 UART: [ldev] ++
1,515,304 UART: [ldev] CDI.KEYID = 6
1,515,667 UART: [ldev] SUBJECT.KEYID = 5
1,516,093 UART: [ldev] AUTHORITY.KEYID = 7
1,516,556 UART: [ldev] FE.KEYID = 1
1,521,656 UART: [ldev] Erasing FE.KEYID = 1
1,547,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,829 UART: [ldev] --
1,587,326 UART: [fwproc] Waiting for Commands...
1,588,085 UART: [fwproc] Received command 0x46574c44
1,588,876 UART: [fwproc] Received Image of size 118548 bytes
2,932,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,356 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,574 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,003 >>> mbox cmd response: success
3,133,149 UART: [afmc] ++
3,133,317 UART: [afmc] CDI.KEYID = 6
3,133,679 UART: [afmc] SUBJECT.KEYID = 7
3,134,104 UART: [afmc] AUTHORITY.KEYID = 5
3,169,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,225 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,005 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,714 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,597 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,280 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,150 UART: [afmc] --
3,213,282 UART: [cold-reset] --
3,214,092 UART: [state] Locking Datavault
3,215,417 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,021 UART: [state] Locking ICCM
3,216,611 UART: [exit] Launching FMC @ 0x40000130
3,221,941 UART:
3,221,957 UART: Running Caliptra FMC ...
3,222,365 UART:
3,222,508 UART: [state] CFI Enabled
3,233,248 UART: [fht] FMC Alias Private Key: 7
3,352,064 UART: [art] Extend RT PCRs Done
3,352,492 UART: [art] Lock RT PCRs Done
3,353,862 UART: [art] Populate DV Done
3,361,975 UART: [fht] FMC Alias Private Key: 7
3,363,041 UART: [art] Derive CDI
3,363,321 UART: [art] Store in slot 0x4
3,449,219 UART: [art] Derive Key Pair
3,449,579 UART: [art] Store priv key in slot 0x5
3,463,248 UART: [art] Derive Key Pair - Done
3,477,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,940 UART: [art] PUB.X = 60785828DD0A9387EC393A475CB2BE7C8092D555D2BE8933AA47CA90B9FA97579A13B12BDF67590E242AA66BA38C8B1A
3,500,712 UART: [art] PUB.Y = B8AF62F961E964CC8FA2B6E3F345BCC34DB342ADA788AC745821F7FEDC39EF626F62F49E79C984DBC3418EBA191D89EF
3,507,684 UART: [art] SIG.R = 45EFDB1011ABB89BFA46974B43B7A6E06776D6904A4F31B02B37F4C7AB5CF0F8FB5C86B500B23C976AB52527405DCAF4
3,514,446 UART: [art] SIG.S = 1ECC548D24A8162019416EA75F38676BEEC314F6DB9854BB05B67DCF9336E700C3BFA5D64FFC1DC4D6314674118B89CA
3,538,065 UART: Caliptra RT
3,538,408 UART: [state] CFI Enabled
3,658,671 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,659,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,347 UART: [rt]cmd =0x41544d4e, len=14344
4,092,610 >>> mbox cmd response data (8 bytes)
4,092,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,620 UART: [rt]cmd =0x41545348, len=116
4,124,452 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 ready_for_fw is high
1,363,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,557 >>> mbox cmd response: success
3,043,976 UART:
3,043,992 UART: Running Caliptra FMC ...
3,044,400 UART:
3,044,543 UART: [state] CFI Enabled
3,055,103 UART: [fht] FMC Alias Private Key: 7
3,174,215 UART: [art] Extend RT PCRs Done
3,174,643 UART: [art] Lock RT PCRs Done
3,176,237 UART: [art] Populate DV Done
3,184,560 UART: [fht] FMC Alias Private Key: 7
3,185,500 UART: [art] Derive CDI
3,185,780 UART: [art] Store in slot 0x4
3,271,390 UART: [art] Derive Key Pair
3,271,750 UART: [art] Store priv key in slot 0x5
3,285,157 UART: [art] Derive Key Pair - Done
3,299,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,039 UART: [art] PUB.X = 9C3CA5EE9E2A45F008DF420ADCA948410558618C7536438D41A1CAC072AD2B59FC4BBB0E08255DFF7F514E72F5859198
3,322,802 UART: [art] PUB.Y = 5280E2AC2AF598E22E1722CC5434F2997AFE92FB8099E51ED4A22C271BA2CD6081E80525CE77CE23DC26CB59CE6F1276
3,329,759 UART: [art] SIG.R = E6372524606C5FCB5066AECAB6104404E2A9BC602CA90AACA6635D767D44C4AFDBFDE133D50715EE9E0ED206FF400AD7
3,336,529 UART: [art] SIG.S = A543F75B84EAEA90B020C29A8013019A496C26F9C9C3C5640EF00A68CD6D47D3CCEB0A023EF448B075394ABB5E60A11F
3,360,024 UART: Caliptra RT
3,360,367 UART: [state] CFI Enabled
3,480,350 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,481,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,748 UART: [rt]cmd =0x41544d4e, len=14344
3,913,471 >>> mbox cmd response data (8 bytes)
3,913,472 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,575 UART: [rt]cmd =0x41545348, len=116
3,945,519 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
891,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,288 UART: [kat] ++
895,440 UART: [kat] sha1
899,740 UART: [kat] SHA2-256
901,680 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,797 UART: [kat] LMS
1,169,109 UART: [kat] --
1,170,016 UART: [cold-reset] ++
1,170,484 UART: [fht] FHT @ 0x50003400
1,173,194 UART: [idev] ++
1,173,362 UART: [idev] CDI.KEYID = 6
1,173,723 UART: [idev] SUBJECT.KEYID = 7
1,174,148 UART: [idev] UDS.KEYID = 0
1,174,494 ready_for_fw is high
1,174,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,327 UART: [idev] Erasing UDS.KEYID = 0
1,199,521 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,214 UART: [ldev] ++
1,209,382 UART: [ldev] CDI.KEYID = 6
1,209,746 UART: [ldev] SUBJECT.KEYID = 5
1,210,173 UART: [ldev] AUTHORITY.KEYID = 7
1,210,636 UART: [ldev] FE.KEYID = 1
1,215,860 UART: [ldev] Erasing FE.KEYID = 1
1,242,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,666 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,702 UART: [fwproc] Recv command 0x46574c44
1,283,435 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,495 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,670 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,943 >>> mbox cmd response: success
2,828,207 UART: [afmc] ++
2,828,375 UART: [afmc] CDI.KEYID = 6
2,828,738 UART: [afmc] SUBJECT.KEYID = 7
2,829,164 UART: [afmc] AUTHORITY.KEYID = 5
2,864,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,088 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,837 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,428 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,072 UART: [afmc] --
2,908,069 UART: [cold-reset] --
2,908,903 UART: [state] Locking Datavault
2,910,214 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,818 UART: [state] Locking ICCM
2,911,458 UART: [exit] Launching FMC @ 0x40000130
2,916,788 UART:
2,916,804 UART: Running Caliptra FMC ...
2,917,212 UART:
2,917,266 UART: [state] CFI Enabled
2,927,824 UART: [fht] FMC Alias Private Key: 7
3,046,766 UART: [art] Extend RT PCRs Done
3,047,194 UART: [art] Lock RT PCRs Done
3,048,714 UART: [art] Populate DV Done
3,056,677 UART: [fht] FMC Alias Private Key: 7
3,057,651 UART: [art] Derive CDI
3,057,931 UART: [art] Store in slot 0x4
3,143,612 UART: [art] Derive Key Pair
3,143,972 UART: [art] Store priv key in slot 0x5
3,157,506 UART: [art] Derive Key Pair - Done
3,172,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,556 UART: [art] PUB.X = B5C714629F7E5F269DE569D545215A32618DD91FC7419F1C8B7712211F09A573AA23DE27F5F1CD933E4C08F5D852574E
3,195,320 UART: [art] PUB.Y = 826F4B55FEBF79E9B2CC17EFB80D4E9E1B69793C0483171C5AAC6C99D5B97E743199EA62D390EABB239E7F7E279B0B80
3,202,275 UART: [art] SIG.R = B2E590BF41BE2831CA1F5C6208CEA155EED14B0F06A5023B8A88C8416579CF057FD6911256D009055B94A270D0046DDE
3,209,025 UART: [art] SIG.S = 1AC3A61916858CBB945E0DC3D0C98A69DA6C15B7FAB6AB21844FDF42E00FE0A0E2E4192ED7AE28EE7FD5B731B3BE95F0
3,233,325 UART: Caliptra RT
3,233,576 UART: [state] CFI Enabled
3,352,885 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,343 UART: [rt]cmd =0x41544d4e, len=14344
3,785,918 >>> mbox cmd response data (8 bytes)
3,785,919 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,960 UART: [rt]cmd =0x41545348, len=116
3,817,644 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,062 ready_for_fw is high
1,059,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,488 >>> mbox cmd response: success
2,738,941 UART:
2,738,957 UART: Running Caliptra FMC ...
2,739,365 UART:
2,739,419 UART: [state] CFI Enabled
2,749,641 UART: [fht] FMC Alias Private Key: 7
2,868,791 UART: [art] Extend RT PCRs Done
2,869,219 UART: [art] Lock RT PCRs Done
2,870,915 UART: [art] Populate DV Done
2,879,370 UART: [fht] FMC Alias Private Key: 7
2,880,494 UART: [art] Derive CDI
2,880,774 UART: [art] Store in slot 0x4
2,967,031 UART: [art] Derive Key Pair
2,967,391 UART: [art] Store priv key in slot 0x5
2,980,499 UART: [art] Derive Key Pair - Done
2,995,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,739 UART: [art] PUB.X = 765C3BDFB3E9870AE59DC579E42778FB104880E421C421057F3DE489D660FA899F713F2CE3C64B365CBC70B82B171CB7
3,017,509 UART: [art] PUB.Y = B109661D12C3CD9C70285BC0956AA81E360EBCAC00C4C92CF0CF2AC7C5D99A46CDC7F02E3C2677C1EB951F4255E8AB09
3,024,446 UART: [art] SIG.R = F49015A3FC4FFFDF9F37CCA0D4EF9606C8418588455D476FA0328B0718CDA3716751B47A2884054D39858BD39B2D4AB4
3,031,211 UART: [art] SIG.S = 83181E8EC00B443EF7087127A08EE45BFFA23D086366491E31052DDF9CE0BA2938B4F7E0647F7271D2447A6F94A4B6D7
3,054,645 UART: Caliptra RT
3,054,896 UART: [state] CFI Enabled
3,174,240 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,174,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,344 UART: [rt]cmd =0x41544d4e, len=14344
3,607,993 >>> mbox cmd response data (8 bytes)
3,607,994 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,001 UART: [rt]cmd =0x41545348, len=116
3,639,407 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,545 UART: [state] LifecycleState = Unprovisioned
86,200 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,994 UART: [kat] SHA2-512-ACC
906,895 UART: [kat] ECC-384
917,006 UART: [kat] HMAC-384Kdf
921,642 UART: [kat] LMS
1,169,954 UART: [kat] --
1,170,751 UART: [cold-reset] ++
1,171,257 UART: [fht] FHT @ 0x50003400
1,173,997 UART: [idev] ++
1,174,165 UART: [idev] CDI.KEYID = 6
1,174,526 UART: [idev] SUBJECT.KEYID = 7
1,174,951 UART: [idev] UDS.KEYID = 0
1,175,297 ready_for_fw is high
1,175,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,160 UART: [idev] Erasing UDS.KEYID = 0
1,200,382 UART: [idev] Sha1 KeyId Algorithm
1,209,436 UART: [idev] --
1,210,349 UART: [ldev] ++
1,210,517 UART: [ldev] CDI.KEYID = 6
1,210,881 UART: [ldev] SUBJECT.KEYID = 5
1,211,308 UART: [ldev] AUTHORITY.KEYID = 7
1,211,771 UART: [ldev] FE.KEYID = 1
1,216,961 UART: [ldev] Erasing FE.KEYID = 1
1,244,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,177 UART: [ldev] --
1,283,580 UART: [fwproc] Wait for Commands...
1,284,275 UART: [fwproc] Recv command 0x46574c44
1,285,008 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,477 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,992 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,476 >>> mbox cmd response: success
2,828,700 UART: [afmc] ++
2,828,868 UART: [afmc] CDI.KEYID = 6
2,829,231 UART: [afmc] SUBJECT.KEYID = 7
2,829,657 UART: [afmc] AUTHORITY.KEYID = 5
2,865,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,978 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,569 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,861 UART: [afmc] --
2,908,770 UART: [cold-reset] --
2,909,686 UART: [state] Locking Datavault
2,911,111 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,715 UART: [state] Locking ICCM
2,912,183 UART: [exit] Launching FMC @ 0x40000130
2,917,513 UART:
2,917,529 UART: Running Caliptra FMC ...
2,917,937 UART:
2,918,080 UART: [state] CFI Enabled
2,928,876 UART: [fht] FMC Alias Private Key: 7
3,048,340 UART: [art] Extend RT PCRs Done
3,048,768 UART: [art] Lock RT PCRs Done
3,050,168 UART: [art] Populate DV Done
3,058,359 UART: [fht] FMC Alias Private Key: 7
3,059,393 UART: [art] Derive CDI
3,059,673 UART: [art] Store in slot 0x4
3,145,676 UART: [art] Derive Key Pair
3,146,036 UART: [art] Store priv key in slot 0x5
3,159,472 UART: [art] Derive Key Pair - Done
3,174,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,671 UART: [art] PUB.X = E18E24149AA678568960053E12D298546E6CD201ECC5EBB6CB4E50AB250D4A8ABDC4261F1BB680535254003632BB790B
3,197,409 UART: [art] PUB.Y = F04AC5167057B92AF3AE8F05383E1707C3BA5EBD4E90DDEFBCC4353A28703A1DAE1969CF8F09011D1D10F958C691E846
3,204,359 UART: [art] SIG.R = 8AD454EA7D15F461F45A8F1BC939DE3D93772E849EE18CD3C33B71345A2DE88791F47C8F95267F338F19FAFF03ABD761
3,211,136 UART: [art] SIG.S = 2D95C80BBBAB811E7C4DEB822D1AEA14CDEE39CB1EBBCF19755587E695DBC72D061A16F363B8883E28F8D168F03211C8
3,234,908 UART: Caliptra RT
3,235,251 UART: [state] CFI Enabled
3,354,890 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,792 UART: [rt]cmd =0x41544d4e, len=14344
3,788,767 >>> mbox cmd response data (8 bytes)
3,788,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,881 UART: [rt]cmd =0x41545348, len=116
3,820,763 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,967 ready_for_fw is high
1,059,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,217 >>> mbox cmd response: success
2,741,564 UART:
2,741,580 UART: Running Caliptra FMC ...
2,741,988 UART:
2,742,131 UART: [state] CFI Enabled
2,752,537 UART: [fht] FMC Alias Private Key: 7
2,871,765 UART: [art] Extend RT PCRs Done
2,872,193 UART: [art] Lock RT PCRs Done
2,873,629 UART: [art] Populate DV Done
2,881,730 UART: [fht] FMC Alias Private Key: 7
2,882,898 UART: [art] Derive CDI
2,883,178 UART: [art] Store in slot 0x4
2,968,999 UART: [art] Derive Key Pair
2,969,359 UART: [art] Store priv key in slot 0x5
2,983,307 UART: [art] Derive Key Pair - Done
2,997,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,624 UART: [art] PUB.X = 3ECED7938055446786E4F9040482090BCDAA5207C485F36D08C02E599922E55EB7AC7D0C4593BE71981FF016154ED0F7
3,021,371 UART: [art] PUB.Y = 93DFF50045933706F9EBF8BA6F82CFD7F59D8131783E8DE091BC7E2B1676AE08074520E4439C256DE6F355E5AFD62E2A
3,028,298 UART: [art] SIG.R = 31FD105497E048F2DE88A50478348BE78C4B84CCAA08560582DD73C4ECC1464D1C26325DD280432EE13790489ADDB830
3,035,059 UART: [art] SIG.S = 05110C935250BA4137DCB1CBDA1579BDCB78DBE8098B0C1F83F93386CE39CD4FAFBA836AC2D046758D0813DC4AFEF735
3,058,396 UART: Caliptra RT
3,058,739 UART: [state] CFI Enabled
3,177,749 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,415 UART: [rt]cmd =0x41544d4e, len=14344
3,611,432 >>> mbox cmd response data (8 bytes)
3,611,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,502 UART: [rt]cmd =0x41545348, len=116
3,643,138 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,540 UART: [kat] SHA2-256
893,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,315 UART: [kat] ++
897,467 UART: [kat] sha1
901,749 UART: [kat] SHA2-256
903,689 UART: [kat] SHA2-384
906,642 UART: [kat] SHA2-512-ACC
908,543 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,946 UART: [kat] LMS
1,171,274 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,229 UART: [fht] FHT @ 0x50003400
1,174,996 UART: [idev] ++
1,175,164 UART: [idev] CDI.KEYID = 6
1,175,524 UART: [idev] SUBJECT.KEYID = 7
1,175,948 UART: [idev] UDS.KEYID = 0
1,176,293 ready_for_fw is high
1,176,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,439 UART: [idev] Sha1 KeyId Algorithm
1,210,031 UART: [idev] --
1,211,151 UART: [ldev] ++
1,211,319 UART: [ldev] CDI.KEYID = 6
1,211,682 UART: [ldev] SUBJECT.KEYID = 5
1,212,108 UART: [ldev] AUTHORITY.KEYID = 7
1,212,571 UART: [ldev] FE.KEYID = 1
1,217,969 UART: [ldev] Erasing FE.KEYID = 1
1,244,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,733 UART: [ldev] --
1,283,230 UART: [fwproc] Wait for Commands...
1,283,810 UART: [fwproc] Recv command 0x46574c44
1,284,538 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,230 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,759 >>> mbox cmd response: success
2,828,803 UART: [afmc] ++
2,828,971 UART: [afmc] CDI.KEYID = 6
2,829,333 UART: [afmc] SUBJECT.KEYID = 7
2,829,758 UART: [afmc] AUTHORITY.KEYID = 5
2,865,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,272 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,612 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,313 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,029 UART: [afmc] --
2,909,003 UART: [cold-reset] --
2,909,813 UART: [state] Locking Datavault
2,910,952 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,556 UART: [state] Locking ICCM
2,912,092 UART: [exit] Launching FMC @ 0x40000130
2,917,422 UART:
2,917,438 UART: Running Caliptra FMC ...
2,917,846 UART:
2,917,900 UART: [state] CFI Enabled
2,928,364 UART: [fht] FMC Alias Private Key: 7
3,046,968 UART: [art] Extend RT PCRs Done
3,047,396 UART: [art] Lock RT PCRs Done
3,048,908 UART: [art] Populate DV Done
3,057,027 UART: [fht] FMC Alias Private Key: 7
3,058,059 UART: [art] Derive CDI
3,058,339 UART: [art] Store in slot 0x4
3,143,660 UART: [art] Derive Key Pair
3,144,020 UART: [art] Store priv key in slot 0x5
3,157,110 UART: [art] Derive Key Pair - Done
3,171,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,354 UART: [art] PUB.X = CFD082C2D1BB5732A68E363D47E0E92AEC37DB014E4951A7F502A34692F17C02D797DAA5190CDFEB46D40525514AC9B7
3,195,119 UART: [art] PUB.Y = CC40BF6264C699FAA1E834B263C0E359A81687FF76F2AD4FC79657F2B6FD9829E57639BF000DBECE2D86FF3EBD9928A8
3,202,060 UART: [art] SIG.R = 66A2A2A96402F250AE3912D6055409F5BEDEEA499CC70F8E0785EB08317EAB79D2E5026EC51D0A0D74FA04F300FB8115
3,208,786 UART: [art] SIG.S = 70133C45611CE80CECEF6661252B705DB6DDCF2A1FB2BB50114B1E7F882FE5E6B6C65E913F2102291C36CF60CC974FE5
3,232,724 UART: Caliptra RT
3,232,975 UART: [state] CFI Enabled
3,352,749 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,419 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,467 UART: [rt]cmd =0x41544d4e, len=14344
3,786,712 >>> mbox cmd response data (8 bytes)
3,786,713 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,598 UART: [rt]cmd =0x41545348, len=116
3,818,276 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,459 ready_for_fw is high
1,060,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,936 >>> mbox cmd response: success
2,740,929 UART:
2,740,945 UART: Running Caliptra FMC ...
2,741,353 UART:
2,741,407 UART: [state] CFI Enabled
2,751,843 UART: [fht] FMC Alias Private Key: 7
2,871,093 UART: [art] Extend RT PCRs Done
2,871,521 UART: [art] Lock RT PCRs Done
2,872,907 UART: [art] Populate DV Done
2,881,206 UART: [fht] FMC Alias Private Key: 7
2,882,324 UART: [art] Derive CDI
2,882,604 UART: [art] Store in slot 0x4
2,968,685 UART: [art] Derive Key Pair
2,969,045 UART: [art] Store priv key in slot 0x5
2,982,145 UART: [art] Derive Key Pair - Done
2,997,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,969 UART: [art] PUB.X = 19A406B69D5E7E454649B85E65662EB7A02E43B2545E58AA2C6D7C6E66F29172CC835EE936302D34F2451093298548D1
3,019,728 UART: [art] PUB.Y = 698E71C954466B26F7F331F460AF61DCAA9CAA0ADEFBB3A01F2139852BEADBBEF4F39955E1CCF4C367C64D47B2EFBAE8
3,026,703 UART: [art] SIG.R = D71A70FEE5EB1DD56EA8C60CA99CC550396646E8C8F0110EDD64F822DB62CE1C603B02DC15ED5D9698D0017A112D44C8
3,033,475 UART: [art] SIG.S = 70940B941146A6B223FAB5D69FDDCCA472BAC047AFF7A1766E49A55EFF425AF79CF90CDCA6E39F043A3B6A3105DEA4F5
3,056,947 UART: Caliptra RT
3,057,198 UART: [state] CFI Enabled
3,176,767 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,437 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,419 UART: [rt]cmd =0x41544d4e, len=14344
3,610,136 >>> mbox cmd response data (8 bytes)
3,610,137 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,308 UART: [rt]cmd =0x41545348, len=116
3,642,062 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
87,853 UART: [kat] SHA2-256
893,503 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,628 UART: [kat] ++
897,780 UART: [kat] sha1
902,114 UART: [kat] SHA2-256
904,054 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
923,007 UART: [kat] LMS
1,171,335 UART: [kat] --
1,172,150 UART: [cold-reset] ++
1,172,574 UART: [fht] FHT @ 0x50003400
1,175,163 UART: [idev] ++
1,175,331 UART: [idev] CDI.KEYID = 6
1,175,691 UART: [idev] SUBJECT.KEYID = 7
1,176,115 UART: [idev] UDS.KEYID = 0
1,176,460 ready_for_fw is high
1,176,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,103 UART: [idev] Erasing UDS.KEYID = 0
1,200,968 UART: [idev] Sha1 KeyId Algorithm
1,209,632 UART: [idev] --
1,210,688 UART: [ldev] ++
1,210,856 UART: [ldev] CDI.KEYID = 6
1,211,219 UART: [ldev] SUBJECT.KEYID = 5
1,211,645 UART: [ldev] AUTHORITY.KEYID = 7
1,212,108 UART: [ldev] FE.KEYID = 1
1,217,604 UART: [ldev] Erasing FE.KEYID = 1
1,243,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,956 UART: [ldev] --
1,283,369 UART: [fwproc] Wait for Commands...
1,283,985 UART: [fwproc] Recv command 0x46574c44
1,284,713 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,918 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,577 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,040 >>> mbox cmd response: success
2,830,250 UART: [afmc] ++
2,830,418 UART: [afmc] CDI.KEYID = 6
2,830,780 UART: [afmc] SUBJECT.KEYID = 7
2,831,205 UART: [afmc] AUTHORITY.KEYID = 5
2,866,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,023 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,724 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,650 UART: [afmc] --
2,909,648 UART: [cold-reset] --
2,910,346 UART: [state] Locking Datavault
2,911,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,373 UART: [state] Locking ICCM
2,912,845 UART: [exit] Launching FMC @ 0x40000130
2,918,175 UART:
2,918,191 UART: Running Caliptra FMC ...
2,918,599 UART:
2,918,742 UART: [state] CFI Enabled
2,929,400 UART: [fht] FMC Alias Private Key: 7
3,048,974 UART: [art] Extend RT PCRs Done
3,049,402 UART: [art] Lock RT PCRs Done
3,050,804 UART: [art] Populate DV Done
3,059,175 UART: [fht] FMC Alias Private Key: 7
3,060,213 UART: [art] Derive CDI
3,060,493 UART: [art] Store in slot 0x4
3,146,666 UART: [art] Derive Key Pair
3,147,026 UART: [art] Store priv key in slot 0x5
3,160,254 UART: [art] Derive Key Pair - Done
3,175,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,339 UART: [art] PUB.X = 43EB73D3195251FB0D127C42C2C5599703865DE98CFB2B53E44138D6B9086B5D493205A8BEAD92F6C47B54AE899E1944
3,198,097 UART: [art] PUB.Y = A630359FC0BDE9A4545766B76E069D37EBAA15494ECF73870590B9425AB247414D286D9142F40B6EC039EFBDD3F91BA3
3,205,044 UART: [art] SIG.R = 695C560F5ADEA2BDC7A6F5B6C52480096519DE7D2BA4BBCD02FDAB2D62902EB0C350EE38B873F74130316EA628E0E2A1
3,211,821 UART: [art] SIG.S = 3420E8B4D256164DBFAFA3593EC85C2D4832711B269822C7E2810E13546D2745643E80F0FA8EA361373EE9028A36DA66
3,235,611 UART: Caliptra RT
3,235,954 UART: [state] CFI Enabled
3,356,372 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,357,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,182 UART: [rt]cmd =0x41544d4e, len=14344
3,789,921 >>> mbox cmd response data (8 bytes)
3,789,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,935 UART: [rt]cmd =0x41545348, len=116
3,821,535 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,350 ready_for_fw is high
1,061,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,933 >>> mbox cmd response: success
2,741,044 UART:
2,741,060 UART: Running Caliptra FMC ...
2,741,468 UART:
2,741,611 UART: [state] CFI Enabled
2,752,243 UART: [fht] FMC Alias Private Key: 7
2,870,949 UART: [art] Extend RT PCRs Done
2,871,377 UART: [art] Lock RT PCRs Done
2,873,081 UART: [art] Populate DV Done
2,881,152 UART: [fht] FMC Alias Private Key: 7
2,882,290 UART: [art] Derive CDI
2,882,570 UART: [art] Store in slot 0x4
2,968,881 UART: [art] Derive Key Pair
2,969,241 UART: [art] Store priv key in slot 0x5
2,982,761 UART: [art] Derive Key Pair - Done
2,997,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,583 UART: [art] PUB.X = 577FED63FE48D159C7B2FE1E29F65222D904F3B1988BE480625DF8F8CBDC8E81C992CA901764D7EF7E66CF571A6F554B
3,020,362 UART: [art] PUB.Y = 56CC05DE599F1B0A8B6C1132E4360AF3DB82BC705B6A1E9292E93BAA53A22D168361FFE0A06857CBB0DF89465DC5FC63
3,027,317 UART: [art] SIG.R = D81517586C0F181DB05C08D329BB48C189E1096806CEC725A449C0969459A95CDAE1BCA1654F79F77C58679E7551291E
3,034,071 UART: [art] SIG.S = 8BBF993C2AF1BD3456727B8257A207C7A582FC21D92188FF679732B79AF8265941117A0C11D39362027B200062E2CCB4
3,057,494 UART: Caliptra RT
3,057,837 UART: [state] CFI Enabled
3,177,787 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,607 UART: [rt]cmd =0x41544d4e, len=14344
3,610,690 >>> mbox cmd response data (8 bytes)
3,610,691 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,986 UART: [rt]cmd =0x41545348, len=116
3,642,500 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_no_hash_or_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,026 UART:
192,390 UART: Running Caliptra ROM ...
193,492 UART:
193,636 UART: [state] CFI Enabled
265,700 UART: [state] LifecycleState = Unprovisioned
267,695 UART: [state] DebugLocked = No
268,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,100 UART: [kat] SHA2-256
442,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,280 UART: [kat] ++
453,767 UART: [kat] sha1
465,708 UART: [kat] SHA2-256
468,430 UART: [kat] SHA2-384
474,134 UART: [kat] SHA2-512-ACC
476,520 UART: [kat] ECC-384
2,769,028 UART: [kat] HMAC-384Kdf
2,802,403 UART: [kat] LMS
3,992,698 UART: [kat] --
3,998,297 UART: [cold-reset] ++
3,999,954 UART: [fht] Storing FHT @ 0x50003400
4,012,144 UART: [idev] ++
4,012,711 UART: [idev] CDI.KEYID = 6
4,013,799 UART: [idev] SUBJECT.KEYID = 7
4,014,837 UART: [idev] UDS.KEYID = 0
4,015,898 ready_for_fw is high
4,016,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,097 UART: [idev] Erasing UDS.KEYID = 0
7,347,304 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,874 UART: [idev] --
7,371,972 UART: [ldev] ++
7,372,571 UART: [ldev] CDI.KEYID = 6
7,373,682 UART: [ldev] SUBJECT.KEYID = 5
7,374,818 UART: [ldev] AUTHORITY.KEYID = 7
7,375,920 UART: [ldev] FE.KEYID = 1
7,424,282 UART: [ldev] Erasing FE.KEYID = 1
10,755,740 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,379 UART: [ldev] --
13,118,588 UART: [fwproc] Waiting for Commands...
13,121,340 UART: [fwproc] Received command 0x46574c44
13,123,580 UART: [fwproc] Received Image of size 118548 bytes
17,230,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,373 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,359 >>> mbox cmd response: success
17,710,947 UART: [afmc] ++
17,711,560 UART: [afmc] CDI.KEYID = 6
17,712,443 UART: [afmc] SUBJECT.KEYID = 7
17,713,713 UART: [afmc] AUTHORITY.KEYID = 5
21,073,996 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,289 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,715 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,114 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,017 UART: [afmc] --
23,443,320 UART: [cold-reset] --
23,446,640 UART: [state] Locking Datavault
23,452,590 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,343 UART: [state] Locking ICCM
23,456,288 UART: [exit] Launching FMC @ 0x40000130
23,464,690 UART:
23,464,926 UART: Running Caliptra FMC ...
23,466,026 UART:
23,466,191 UART: [state] CFI Enabled
23,532,126 UART: [fht] FMC Alias Private Key: 7
25,872,941 UART: [art] Extend RT PCRs Done
25,874,158 UART: [art] Lock RT PCRs Done
25,875,974 UART: [art] Populate DV Done
25,881,328 UART: [fht] FMC Alias Private Key: 7
25,882,916 UART: [art] Derive CDI
25,883,661 UART: [art] Store in slot 0x4
25,940,212 UART: [art] Derive Key Pair
25,941,248 UART: [art] Store priv key in slot 0x5
29,233,823 UART: [art] Derive Key Pair - Done
29,247,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,235 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,785 UART: [art] PUB.X = C9A30B52F8A62374D2D9B4F16EE82FD11F180607670096FF16CB831F2D0B867020BD5139AD54638874EDD4264F6BF756
31,542,982 UART: [art] PUB.Y = 166423D495EBBC7B3F6B4B46B0A9DF0A0B0099D9F5BA323D9F595BB1C962B1FAD0163386FAF2C87E4CA67714FFCD1AA4
31,550,272 UART: [art] SIG.R = 997D7AF4AE8DDFCC27E1FFE0004DBE6E747138AD49F75AAEBB705E96ECC8ABE35067B5B798063F93D892F2A22BD74633
31,557,661 UART: [art] SIG.S = 6B6E8F58F4D517BF9DE9B1487EAC2D4EDF22B2F3493C8B7F8C1BA316FADEE065816950BB60E7897501E199165076D737
32,862,764 UART: Caliptra RT
32,863,482 UART: [state] CFI Enabled
33,041,185 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,109,481 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,264,969 UART: [rt]cmd =0x41544d4e, len=14344
42,565,848 >>> mbox cmd response data (8 bytes)
42,566,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,597,144 UART: [rt]cmd =0x41545348, len=116
42,599,509 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,807,591 ready_for_fw is high
3,807,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,981,114 >>> mbox cmd response: success
23,674,332 UART:
23,674,736 UART: Running Caliptra FMC ...
23,675,944 UART:
23,676,118 UART: [state] CFI Enabled
23,744,595 UART: [fht] FMC Alias Private Key: 7
26,084,621 UART: [art] Extend RT PCRs Done
26,085,843 UART: [art] Lock RT PCRs Done
26,087,313 UART: [art] Populate DV Done
26,092,570 UART: [fht] FMC Alias Private Key: 7
26,094,260 UART: [art] Derive CDI
26,095,088 UART: [art] Store in slot 0x4
26,153,277 UART: [art] Derive Key Pair
26,154,294 UART: [art] Store priv key in slot 0x5
29,447,276 UART: [art] Derive Key Pair - Done
29,460,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,369 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,880 UART: [art] PUB.X = 2BFA3699BD1F2FE11B7E82FA22A304758C1E38746B46DC42F5F9B1449D1AF9E6CB41BCDAFC1B5EDCEFC6AECB034A20AD
31,758,209 UART: [art] PUB.Y = F3BD6A523374688398F502630CD4A1C2336733E119542CB38F162D316999E28A816DAA1F2082267F1423CC6F44D2E3E0
31,765,417 UART: [art] SIG.R = ADFF7C73DE97F5C4472B82A18657F7E38DC7B5EE81D1B2FB09CCCEFD67A1CC5638CEE41006EBFAD419C57EA054CDA22A
31,772,851 UART: [art] SIG.S = 3BCF87A2634E9E33B0A952F880393CAA020831E16C24696BB809EE75822A088FDC9EC7882338D684EE17517E34EF7C26
33,077,699 UART: Caliptra RT
33,078,409 UART: [state] CFI Enabled
33,255,469 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,325,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,481,437 UART: [rt]cmd =0x41544d4e, len=14344
42,782,159 >>> mbox cmd response data (8 bytes)
42,782,770 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,813,570 UART: [rt]cmd =0x41545348, len=116
42,815,603 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,401 UART:
192,771 UART: Running Caliptra ROM ...
193,961 UART:
603,812 UART: [state] CFI Enabled
619,464 UART: [state] LifecycleState = Unprovisioned
621,402 UART: [state] DebugLocked = No
623,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,196 UART: [kat] SHA2-256
797,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,428 UART: [kat] ++
809,027 UART: [kat] sha1
819,359 UART: [kat] SHA2-256
822,072 UART: [kat] SHA2-384
827,782 UART: [kat] SHA2-512-ACC
830,189 UART: [kat] ECC-384
3,113,430 UART: [kat] HMAC-384Kdf
3,125,377 UART: [kat] LMS
4,315,463 UART: [kat] --
4,321,224 UART: [cold-reset] ++
4,323,654 UART: [fht] Storing FHT @ 0x50003400
4,335,199 UART: [idev] ++
4,335,758 UART: [idev] CDI.KEYID = 6
4,336,885 UART: [idev] SUBJECT.KEYID = 7
4,337,983 UART: [idev] UDS.KEYID = 0
4,338,979 ready_for_fw is high
4,339,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,156 UART: [idev] Erasing UDS.KEYID = 0
7,626,288 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,343 UART: [idev] --
7,652,903 UART: [ldev] ++
7,653,470 UART: [ldev] CDI.KEYID = 6
7,654,429 UART: [ldev] SUBJECT.KEYID = 5
7,655,632 UART: [ldev] AUTHORITY.KEYID = 7
7,656,913 UART: [ldev] FE.KEYID = 1
7,667,531 UART: [ldev] Erasing FE.KEYID = 1
10,957,265 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,533 UART: [ldev] --
13,313,535 UART: [fwproc] Waiting for Commands...
13,316,650 UART: [fwproc] Received command 0x46574c44
13,318,897 UART: [fwproc] Received Image of size 118548 bytes
17,422,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,560 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,733 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,536 >>> mbox cmd response: success
17,904,234 UART: [afmc] ++
17,904,821 UART: [afmc] CDI.KEYID = 6
17,905,760 UART: [afmc] SUBJECT.KEYID = 7
17,907,026 UART: [afmc] AUTHORITY.KEYID = 5
21,219,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,358 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,784 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,211 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,592 UART: [afmc] --
23,584,912 UART: [cold-reset] --
23,589,318 UART: [state] Locking Datavault
23,594,071 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,822 UART: [state] Locking ICCM
23,598,072 UART: [exit] Launching FMC @ 0x40000130
23,606,459 UART:
23,606,725 UART: Running Caliptra FMC ...
23,607,764 UART:
23,607,908 UART: [state] CFI Enabled
23,616,408 UART: [fht] FMC Alias Private Key: 7
25,957,085 UART: [art] Extend RT PCRs Done
25,958,305 UART: [art] Lock RT PCRs Done
25,960,065 UART: [art] Populate DV Done
25,965,903 UART: [fht] FMC Alias Private Key: 7
25,967,595 UART: [art] Derive CDI
25,968,326 UART: [art] Store in slot 0x4
26,010,874 UART: [art] Derive Key Pair
26,011,871 UART: [art] Store priv key in slot 0x5
29,253,980 UART: [art] Derive Key Pair - Done
29,267,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,268 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,769 UART: [art] PUB.X = 54089D75347A02A4128E5278B9489086569849E2594284D57775B6EA645E4030093BBAF601920CB2FA2DC91B0B0DA96D
31,556,002 UART: [art] PUB.Y = F81DCBD8B27C6D70FA3FBACC82F6BFC2248EAC99A9B3687D7900F67E73DA01FCE518239C4BBAABD1F5AC549E1A1B34CA
31,563,339 UART: [art] SIG.R = 156BD577D9597E2C7D013CF936AFCA2C85A986DF3EDB7C50E6CCA43D4859202CBDBC3E8A52C010F185B0FCA5489DC0CB
31,570,780 UART: [art] SIG.S = 51D48B4B2B86FA2BB8A8321E460E83B5140B7F4CD670FC1343C823EF2814A4EEECF1CC5CC128FB0682524F0767ACAEA1
32,875,727 UART: Caliptra RT
32,876,425 UART: [state] CFI Enabled
33,010,513 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,072,699 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,228,378 UART: [rt]cmd =0x41544d4e, len=14344
42,529,518 >>> mbox cmd response data (8 bytes)
42,530,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,560,675 UART: [rt]cmd =0x41545348, len=116
42,562,926 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
4,131,139 ready_for_fw is high
4,132,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,688 >>> mbox cmd response: success
23,809,561 UART:
23,809,983 UART: Running Caliptra FMC ...
23,811,105 UART:
23,811,256 UART: [state] CFI Enabled
23,819,267 UART: [fht] FMC Alias Private Key: 7
26,158,943 UART: [art] Extend RT PCRs Done
26,160,169 UART: [art] Lock RT PCRs Done
26,161,661 UART: [art] Populate DV Done
26,166,970 UART: [fht] FMC Alias Private Key: 7
26,168,667 UART: [art] Derive CDI
26,169,399 UART: [art] Store in slot 0x4
26,211,770 UART: [art] Derive Key Pair
26,212,764 UART: [art] Store priv key in slot 0x5
29,454,890 UART: [art] Derive Key Pair - Done
29,467,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,716 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,224 UART: [art] PUB.X = A66F9C024C756412CD2235727D6AF8F178325F29EE9C37B023DE8367F7922CC6B03E59E5EA3D4C3AD4596CF568D4F679
31,756,490 UART: [art] PUB.Y = 1892AE89BE9CEF38385C2E87D90F4401E5A33412283530C81693ECF4E76DF46DFB93983B1AA7A3AFDDBFAFA58F74C858
31,763,791 UART: [art] SIG.R = 1848D31660E708CE06AE1723A313FBE64A23BEA79255068D1E62FCCD08BCF6C45F4BDF27305D9878744CF6EA9A84D14F
31,771,191 UART: [art] SIG.S = E5C6B45B3849BABC4611AE0A899F503654817B98E8253018CFABF0B29D79462F58E27AEFD24440630BF1236CC54A0C90
33,076,118 UART: Caliptra RT
33,076,836 UART: [state] CFI Enabled
33,210,281 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,271,195 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,427,033 UART: [rt]cmd =0x41544d4e, len=14344
42,728,091 >>> mbox cmd response data (8 bytes)
42,728,682 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,759,575 UART: [rt]cmd =0x41545348, len=116
42,761,885 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,026 UART:
192,390 UART: Running Caliptra ROM ...
193,562 UART:
193,731 UART: [state] CFI Enabled
264,630 UART: [state] LifecycleState = Unprovisioned
266,611 UART: [state] DebugLocked = No
268,142 UART: [state] WD Timer not started. Device not locked for debugging
272,246 UART: [kat] SHA2-256
451,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,715 UART: [kat] ++
463,246 UART: [kat] sha1
473,051 UART: [kat] SHA2-256
475,688 UART: [kat] SHA2-384
481,750 UART: [kat] SHA2-512-ACC
484,112 UART: [kat] ECC-384
2,946,947 UART: [kat] HMAC-384Kdf
2,971,421 UART: [kat] LMS
3,447,939 UART: [kat] --
3,452,740 UART: [cold-reset] ++
3,454,410 UART: [fht] FHT @ 0x50003400
3,466,811 UART: [idev] ++
3,467,370 UART: [idev] CDI.KEYID = 6
3,468,395 UART: [idev] SUBJECT.KEYID = 7
3,469,564 UART: [idev] UDS.KEYID = 0
3,470,497 ready_for_fw is high
3,470,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,739 UART: [idev] Erasing UDS.KEYID = 0
5,986,838 UART: [idev] Sha1 KeyId Algorithm
6,010,552 UART: [idev] --
6,015,736 UART: [ldev] ++
6,016,305 UART: [ldev] CDI.KEYID = 6
6,017,217 UART: [ldev] SUBJECT.KEYID = 5
6,018,434 UART: [ldev] AUTHORITY.KEYID = 7
6,019,716 UART: [ldev] FE.KEYID = 1
6,056,288 UART: [ldev] Erasing FE.KEYID = 1
8,565,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,349 UART: [ldev] --
10,373,902 UART: [fwproc] Wait for Commands...
10,377,020 UART: [fwproc] Recv command 0x46574c44
10,379,003 UART: [fwproc] Recv'd Img size: 118548 bytes
13,853,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,590 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,001,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,330,570 >>> mbox cmd response: success
14,334,542 UART: [afmc] ++
14,335,165 UART: [afmc] CDI.KEYID = 6
14,336,185 UART: [afmc] SUBJECT.KEYID = 7
14,337,361 UART: [afmc] AUTHORITY.KEYID = 5
16,874,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,495 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,552 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,154 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,179 UART: [afmc] --
18,694,496 UART: [cold-reset] --
18,696,623 UART: [state] Locking Datavault
18,701,870 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,619 UART: [state] Locking ICCM
18,704,631 UART: [exit] Launching FMC @ 0x40000130
18,713,067 UART:
18,713,322 UART: Running Caliptra FMC ...
18,714,421 UART:
18,714,596 UART: [state] CFI Enabled
18,772,848 UART: [fht] FMC Alias Private Key: 7
20,538,645 UART: [art] Extend RT PCRs Done
20,539,906 UART: [art] Lock RT PCRs Done
20,541,645 UART: [art] Populate DV Done
20,547,071 UART: [fht] FMC Alias Private Key: 7
20,548,769 UART: [art] Derive CDI
20,549,592 UART: [art] Store in slot 0x4
20,604,682 UART: [art] Derive Key Pair
20,605,683 UART: [art] Store priv key in slot 0x5
23,068,277 UART: [art] Derive Key Pair - Done
23,081,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,793,391 UART: [art] Erasing AUTHORITY.KEYID = 7
24,794,915 UART: [art] PUB.X = FDBA29627D2D87919E88C07A9214DC15340B03477A322DB9B21EED8902D93FF04436EBE3D29E6461C4B684A6A3BECAFF
24,802,172 UART: [art] PUB.Y = 1C3F411A09513FD9093BFD397E5B04295CCC57AA473EA823C8E5E386F38C7F5CA8632871CA90949BF7F252BF05E368F7
24,809,402 UART: [art] SIG.R = 7EEC2A55F27AAA5A6370BCC0BF02AE154E832096E555EC3ECAD35580550CDB82F964FD236B2AA77CD470D7A347EA6C7B
24,816,866 UART: [art] SIG.S = 3152974E447DE613642AE13ADAAD967E0270F121F57BE22CA225D9055E875390F227C278BE4228C8E11140A4BF128937
25,795,361 UART: Caliptra RT
25,796,085 UART: [state] CFI Enabled
25,976,550 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,020,118 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,175,505 UART: [rt]cmd =0x41544d4e, len=14344
34,170,543 >>> mbox cmd response data (8 bytes)
34,171,124 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,201,917 UART: [rt]cmd =0x41545348, len=116
34,204,502 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,460,661 ready_for_fw is high
3,461,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,190 >>> mbox cmd response: success
18,510,158 UART:
18,510,573 UART: Running Caliptra FMC ...
18,511,707 UART:
18,511,867 UART: [state] CFI Enabled
18,579,919 UART: [fht] FMC Alias Private Key: 7
20,367,127 UART: [art] Extend RT PCRs Done
20,368,352 UART: [art] Lock RT PCRs Done
20,370,303 UART: [art] Populate DV Done
20,375,668 UART: [fht] FMC Alias Private Key: 7
20,377,154 UART: [art] Derive CDI
20,377,911 UART: [art] Store in slot 0x4
20,433,230 UART: [art] Derive Key Pair
20,434,271 UART: [art] Store priv key in slot 0x5
22,896,897 UART: [art] Derive Key Pair - Done
22,909,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,222 UART: [art] PUB.X = 79274322CA5C62EFCCD6905313C0C937F4C819FD42AB38C9C910A5021CDFF1AA0D3D5716F15AC88E14A843E16A424649
24,631,475 UART: [art] PUB.Y = C8939BD274FFC44A28A3241A176EBE599AB44D4585E6BBCBC345CE51DD2EFEF4070524554B0ACEF70F88FF76D9BF0A14
24,638,773 UART: [art] SIG.R = 6A3B06CB5AC0D33B0EFEC231F1C2095C00CD1D51679D77FC8A0E147BF91C920F3575B246FBC8AAD5227DF4BA760A6173
24,646,184 UART: [art] SIG.S = EA892C04BBF9B4C50446E16DA4653CC59661C0059C3E3D5A3FA31010942370616F1B99A5344981BAB78EE5172EAA9373
25,624,934 UART: Caliptra RT
25,625,638 UART: [state] CFI Enabled
25,806,671 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,843,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,999,049 UART: [rt]cmd =0x41544d4e, len=14344
33,994,881 >>> mbox cmd response data (8 bytes)
33,995,475 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,026,003 UART: [rt]cmd =0x41545348, len=116
34,028,489 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,430 writing to cptra_bootfsm_go
203,630 UART:
203,992 UART: Running Caliptra ROM ...
205,094 UART:
614,959 UART: [state] CFI Enabled
630,686 UART: [state] LifecycleState = Unprovisioned
632,569 UART: [state] DebugLocked = No
634,089 UART: [state] WD Timer not started. Device not locked for debugging
638,558 UART: [kat] SHA2-256
818,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
829,017 UART: [kat] ++
829,470 UART: [kat] sha1
840,559 UART: [kat] SHA2-256
843,211 UART: [kat] SHA2-384
849,555 UART: [kat] SHA2-512-ACC
851,926 UART: [kat] ECC-384
3,290,061 UART: [kat] HMAC-384Kdf
3,302,237 UART: [kat] LMS
3,778,762 UART: [kat] --
3,784,121 UART: [cold-reset] ++
3,785,494 UART: [fht] FHT @ 0x50003400
3,797,835 UART: [idev] ++
3,798,473 UART: [idev] CDI.KEYID = 6
3,799,357 UART: [idev] SUBJECT.KEYID = 7
3,800,601 UART: [idev] UDS.KEYID = 0
3,801,602 ready_for_fw is high
3,801,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,950,822 UART: [idev] Erasing UDS.KEYID = 0
6,279,411 UART: [idev] Sha1 KeyId Algorithm
6,304,364 UART: [idev] --
6,310,029 UART: [ldev] ++
6,310,605 UART: [ldev] CDI.KEYID = 6
6,311,574 UART: [ldev] SUBJECT.KEYID = 5
6,312,734 UART: [ldev] AUTHORITY.KEYID = 7
6,314,021 UART: [ldev] FE.KEYID = 1
6,327,108 UART: [ldev] Erasing FE.KEYID = 1
8,804,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,525,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,540,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,556,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,572,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,593,177 UART: [ldev] --
10,599,164 UART: [fwproc] Wait for Commands...
10,601,697 UART: [fwproc] Recv command 0x46574c44
10,603,743 UART: [fwproc] Recv'd Img size: 118548 bytes
14,094,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,172,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,245,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,573,353 >>> mbox cmd response: success
14,578,201 UART: [afmc] ++
14,578,845 UART: [afmc] CDI.KEYID = 6
14,579,738 UART: [afmc] SUBJECT.KEYID = 7
14,580,956 UART: [afmc] AUTHORITY.KEYID = 5
17,083,257 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,716 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,807,953 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,839,807 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,855,417 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,880,776 UART: [afmc] --
18,884,373 UART: [cold-reset] --
18,887,578 UART: [state] Locking Datavault
18,892,682 UART: [state] Locking PCR0, PCR1 and PCR31
18,894,442 UART: [state] Locking ICCM
18,895,839 UART: [exit] Launching FMC @ 0x40000130
18,904,248 UART:
18,904,485 UART: Running Caliptra FMC ...
18,905,592 UART:
18,905,756 UART: [state] CFI Enabled
18,913,592 UART: [fht] FMC Alias Private Key: 7
20,679,170 UART: [art] Extend RT PCRs Done
20,680,400 UART: [art] Lock RT PCRs Done
20,681,733 UART: [art] Populate DV Done
20,687,268 UART: [fht] FMC Alias Private Key: 7
20,688,936 UART: [art] Derive CDI
20,689,678 UART: [art] Store in slot 0x4
20,732,279 UART: [art] Derive Key Pair
20,733,317 UART: [art] Store priv key in slot 0x5
23,160,426 UART: [art] Derive Key Pair - Done
23,173,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,354 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,862 UART: [art] PUB.X = 045059AD9C39BD615B5055DD4DC39594951E96E0A4E6FBE40414EE10B931653444050CF485D77625B617A79985600E43
24,888,111 UART: [art] PUB.Y = B7DE7890DA1E59C4B2F94A1178E0B478B20EE8B3BC6614B0992FF75677E59C120984D042ABE338988AE4910ABBFA3E1C
24,895,355 UART: [art] SIG.R = FD00023F38AAB5CF3C6AFD0275D0DF871809BF2D33E0DF8205DE814FB58C631393C6C46E310A499471E5807D4C940122
24,902,691 UART: [art] SIG.S = 2C84861B4E7094A6A4449E4083C02B9893CAD371B5AE097953577A0580E41F26DA35E217743C0D3AC2FF10DEC302902A
25,881,464 UART: Caliptra RT
25,882,151 UART: [state] CFI Enabled
26,014,720 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,064,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,220,385 UART: [rt]cmd =0x41544d4e, len=14344
34,215,683 >>> mbox cmd response data (8 bytes)
34,216,258 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,247,177 UART: [rt]cmd =0x41545348, len=116
34,249,581 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,780,260 ready_for_fw is high
3,780,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,616 >>> mbox cmd response: success
18,690,042 UART:
18,690,454 UART: Running Caliptra FMC ...
18,691,600 UART:
18,691,767 UART: [state] CFI Enabled
18,699,822 UART: [fht] FMC Alias Private Key: 7
20,465,874 UART: [art] Extend RT PCRs Done
20,467,091 UART: [art] Lock RT PCRs Done
20,468,607 UART: [art] Populate DV Done
20,474,351 UART: [fht] FMC Alias Private Key: 7
20,475,855 UART: [art] Derive CDI
20,476,624 UART: [art] Store in slot 0x4
20,519,335 UART: [art] Derive Key Pair
20,520,378 UART: [art] Store priv key in slot 0x5
22,946,675 UART: [art] Derive Key Pair - Done
22,959,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,617 UART: [art] PUB.X = 86F6E96E795A11B3733BD4DE6B0B16DE8830497FB919DA07C1EE8AE2FEC1665AC30EF9FA6EAC8FF245D1BCA4B03FFDC1
24,674,790 UART: [art] PUB.Y = 8B503EDEF798F76D31A435AC5CCC7EE1E63AB9FFE540F1DB559015FDF1C58EAEAE19B74C551C74B48374C8540EE312D7
24,682,053 UART: [art] SIG.R = 110FE3838B3A2663AFEADC497ED921D1324087A6A9BCEC5471D6EC3ACF70FDEF33DD55BBE919ABEAD38FBD7FA46AFE3C
24,689,529 UART: [art] SIG.S = C4215AB040FB7CA39AF28B0E6C298B70673147EF03EAB80A3D4A9BB16137CA567598E221DFC90B7EE4DDE16050EF2DC7
25,668,224 UART: Caliptra RT
25,668,944 UART: [state] CFI Enabled
25,800,826 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,842,243 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,997,964 UART: [rt]cmd =0x41544d4e, len=14344
33,993,252 >>> mbox cmd response data (8 bytes)
33,993,847 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,024,380 UART: [rt]cmd =0x41545348, len=116
34,026,762 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,143 UART:
192,516 UART: Running Caliptra ROM ...
193,705 UART:
193,854 UART: [state] CFI Enabled
261,470 UART: [state] LifecycleState = Unprovisioned
263,893 UART: [state] DebugLocked = No
266,418 UART: [state] WD Timer not started. Device not locked for debugging
271,241 UART: [kat] SHA2-256
461,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,919 UART: [kat] ++
472,453 UART: [kat] sha1
483,351 UART: [kat] SHA2-256
486,330 UART: [kat] SHA2-384
492,750 UART: [kat] SHA2-512-ACC
495,330 UART: [kat] ECC-384
2,946,578 UART: [kat] HMAC-384Kdf
2,970,697 UART: [kat] LMS
3,502,490 UART: [kat] --
3,505,589 UART: [cold-reset] ++
3,507,662 UART: [fht] FHT @ 0x50003400
3,519,314 UART: [idev] ++
3,520,065 UART: [idev] CDI.KEYID = 6
3,520,990 UART: [idev] SUBJECT.KEYID = 7
3,522,164 UART: [idev] UDS.KEYID = 0
3,523,078 ready_for_fw is high
3,523,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,172 UART: [idev] Erasing UDS.KEYID = 0
6,023,902 UART: [idev] Sha1 KeyId Algorithm
6,046,328 UART: [idev] --
6,052,047 UART: [ldev] ++
6,052,723 UART: [ldev] CDI.KEYID = 6
6,053,690 UART: [ldev] SUBJECT.KEYID = 5
6,054,789 UART: [ldev] AUTHORITY.KEYID = 7
6,056,074 UART: [ldev] FE.KEYID = 1
6,098,381 UART: [ldev] Erasing FE.KEYID = 1
8,606,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,283 UART: [ldev] --
10,414,200 UART: [fwproc] Wait for Commands...
10,417,045 UART: [fwproc] Recv command 0x46574c44
10,419,295 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,636 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,714 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,301 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,786 >>> mbox cmd response: success
14,682,451 UART: [afmc] ++
14,683,172 UART: [afmc] CDI.KEYID = 6
14,684,362 UART: [afmc] SUBJECT.KEYID = 7
14,685,848 UART: [afmc] AUTHORITY.KEYID = 5
17,232,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,711 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,669 UART: [afmc] --
19,031,506 UART: [cold-reset] --
19,035,698 UART: [state] Locking Datavault
19,039,645 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,812 UART: [state] Locking ICCM
19,043,810 UART: [exit] Launching FMC @ 0x40000130
19,052,436 UART:
19,052,672 UART: Running Caliptra FMC ...
19,053,701 UART:
19,053,850 UART: [state] CFI Enabled
19,114,557 UART: [fht] FMC Alias Private Key: 7
20,880,880 UART: [art] Extend RT PCRs Done
20,882,102 UART: [art] Lock RT PCRs Done
20,883,777 UART: [art] Populate DV Done
20,889,131 UART: [fht] FMC Alias Private Key: 7
20,890,662 UART: [art] Derive CDI
20,891,469 UART: [art] Store in slot 0x4
20,946,929 UART: [art] Derive Key Pair
20,947,924 UART: [art] Store priv key in slot 0x5
23,410,788 UART: [art] Derive Key Pair - Done
23,423,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,705 UART: [art] PUB.X = D0877868B6270B8C1706842173E74AD0A5CCF812C2F4F269D5253C199818EC1A3CE8D35B8C03ED2FAF91C7219C893837
25,145,912 UART: [art] PUB.Y = 7BAD94CE78888116DF3713C1B6E3842241824B8F49D736381B84F503ADC23C00C6F5BC270222D52CC440A0E6CCF33EA5
25,153,154 UART: [art] SIG.R = F9AD6D3FA62702F3F71D2C2FEA8D9E6B88CE209897F710A59F6DC0115D4731B0FA543F687CE113CE2D7C797D2BB97C48
25,160,572 UART: [art] SIG.S = E9E5BCAC139DC2F2F31EAD6864BA7F0E6D41EC7BF80125CF9065D37BFB11839DE2604C36767C8C2ED3DA60559557A245
26,139,034 UART: Caliptra RT
26,139,746 UART: [state] CFI Enabled
26,321,007 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,366,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,522,524 UART: [rt]cmd =0x41544d4e, len=14344
34,518,723 >>> mbox cmd response data (8 bytes)
34,519,380 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,550,184 UART: [rt]cmd =0x41545348, len=116
34,552,449 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,433,046 ready_for_fw is high
3,433,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,148 >>> mbox cmd response: success
19,102,047 UART:
19,102,434 UART: Running Caliptra FMC ...
19,103,628 UART:
19,103,808 UART: [state] CFI Enabled
19,171,141 UART: [fht] FMC Alias Private Key: 7
20,938,157 UART: [art] Extend RT PCRs Done
20,939,383 UART: [art] Lock RT PCRs Done
20,940,848 UART: [art] Populate DV Done
20,946,303 UART: [fht] FMC Alias Private Key: 7
20,947,886 UART: [art] Derive CDI
20,948,651 UART: [art] Store in slot 0x4
21,004,555 UART: [art] Derive Key Pair
21,005,564 UART: [art] Store priv key in slot 0x5
23,468,715 UART: [art] Derive Key Pair - Done
23,481,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,196,821 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,363 UART: [art] PUB.X = 52F85E2DBB5900A6BF219EDC43647218062C74F876E8E57843933C9B3E9E57FB118E2083F717F81D80A88A020D3C5EF0
25,205,547 UART: [art] PUB.Y = E4CC3CA79B8EFB51C90A93E046816D256BBBE547F852C75D8E6A382EB2438645A524A484CE317F8088FE272226DF2909
25,212,778 UART: [art] SIG.R = 3627C388A25DB553C5ED98E3C911C83AAA06CAECEEBBD384D00442EC33FE623FAA473C1A279C69F50131771763E7F3D4
25,220,219 UART: [art] SIG.S = 9BCAC216CE9B45173E3FCBF00CA952D7834CE02627BBE1CAEBA2E079D6A27802557753BF171009CD4F816A924CDC26E2
26,199,135 UART: Caliptra RT
26,199,829 UART: [state] CFI Enabled
26,381,417 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,427,973 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,583,560 UART: [rt]cmd =0x41544d4e, len=14344
34,579,887 >>> mbox cmd response data (8 bytes)
34,580,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,611,224 UART: [rt]cmd =0x41545348, len=116
34,613,647 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,443 UART:
192,801 UART: Running Caliptra ROM ...
193,962 UART:
603,846 UART: [state] CFI Enabled
618,629 UART: [state] LifecycleState = Unprovisioned
621,015 UART: [state] DebugLocked = No
623,267 UART: [state] WD Timer not started. Device not locked for debugging
627,746 UART: [kat] SHA2-256
817,629 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,366 UART: [kat] ++
828,975 UART: [kat] sha1
840,926 UART: [kat] SHA2-256
844,004 UART: [kat] SHA2-384
849,786 UART: [kat] SHA2-512-ACC
852,376 UART: [kat] ECC-384
3,295,253 UART: [kat] HMAC-384Kdf
3,308,345 UART: [kat] LMS
3,840,116 UART: [kat] --
3,845,698 UART: [cold-reset] ++
3,847,005 UART: [fht] FHT @ 0x50003400
3,858,085 UART: [idev] ++
3,858,863 UART: [idev] CDI.KEYID = 6
3,859,787 UART: [idev] SUBJECT.KEYID = 7
3,860,970 UART: [idev] UDS.KEYID = 0
3,861,898 ready_for_fw is high
3,862,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,844 UART: [idev] Erasing UDS.KEYID = 0
6,339,515 UART: [idev] Sha1 KeyId Algorithm
6,360,809 UART: [idev] --
6,364,533 UART: [ldev] ++
6,365,223 UART: [ldev] CDI.KEYID = 6
6,366,139 UART: [ldev] SUBJECT.KEYID = 5
6,367,304 UART: [ldev] AUTHORITY.KEYID = 7
6,368,541 UART: [ldev] FE.KEYID = 1
6,379,538 UART: [ldev] Erasing FE.KEYID = 1
8,859,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,076 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,173 UART: [ldev] --
10,652,412 UART: [fwproc] Wait for Commands...
10,655,196 UART: [fwproc] Recv command 0x46574c44
10,657,491 UART: [fwproc] Recv'd Img size: 118548 bytes
14,163,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,671 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,926,901 >>> mbox cmd response: success
14,930,846 UART: [afmc] ++
14,931,571 UART: [afmc] CDI.KEYID = 6
14,932,787 UART: [afmc] SUBJECT.KEYID = 7
14,934,235 UART: [afmc] AUTHORITY.KEYID = 5
17,436,075 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,158,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,160,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,175,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,191,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,205,949 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,933 UART: [afmc] --
19,234,485 UART: [cold-reset] --
19,238,416 UART: [state] Locking Datavault
19,244,778 UART: [state] Locking PCR0, PCR1 and PCR31
19,246,940 UART: [state] Locking ICCM
19,248,811 UART: [exit] Launching FMC @ 0x40000130
19,257,505 UART:
19,257,742 UART: Running Caliptra FMC ...
19,258,796 UART:
19,258,952 UART: [state] CFI Enabled
19,266,844 UART: [fht] FMC Alias Private Key: 7
21,032,402 UART: [art] Extend RT PCRs Done
21,033,645 UART: [art] Lock RT PCRs Done
21,034,933 UART: [art] Populate DV Done
21,040,413 UART: [fht] FMC Alias Private Key: 7
21,042,068 UART: [art] Derive CDI
21,042,899 UART: [art] Store in slot 0x4
21,085,763 UART: [art] Derive Key Pair
21,086,801 UART: [art] Store priv key in slot 0x5
23,513,713 UART: [art] Derive Key Pair - Done
23,526,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,232,417 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,931 UART: [art] PUB.X = 280AB706CBB8E5954C043EBFF378888D458E832D7887619D0C9957EA4E66B2849429F22CFD5FD8BA60DF17AFDA5D03A0
25,241,209 UART: [art] PUB.Y = 2CE8C23913B9EFAFD72A81BF72658C15BF9F31706A9E9621BF72E4EC9EB0634EA3B876F9DCF6EAF1E7E30C4AB290DB9C
25,248,539 UART: [art] SIG.R = 91A845D8FD352DB3FF74F757F1067F0DA18E7036F4ECBCE6DFF5A23FE9B72C54CB15F46F3AABDCD37E6639295D6A99D0
25,255,916 UART: [art] SIG.S = A1DAF5A8794AA9A1A3EE639323E607F42512C8D9E7DD31C8819DC5D1D7B549DBCCF263EEA981BAEB9BE2DF7E7AEA489C
26,234,933 UART: Caliptra RT
26,235,625 UART: [state] CFI Enabled
26,369,387 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,425,992 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,581,716 UART: [rt]cmd =0x41544d4e, len=14344
34,577,766 >>> mbox cmd response data (8 bytes)
34,578,750 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,609,524 UART: [rt]cmd =0x41545348, len=116
34,611,959 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,242 writing to cptra_bootfsm_go
3,755,250 ready_for_fw is high
3,755,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,872 >>> mbox cmd response: success
19,301,652 UART:
19,302,046 UART: Running Caliptra FMC ...
19,303,289 UART:
19,303,464 UART: [state] CFI Enabled
19,311,264 UART: [fht] FMC Alias Private Key: 7
21,076,659 UART: [art] Extend RT PCRs Done
21,077,888 UART: [art] Lock RT PCRs Done
21,079,745 UART: [art] Populate DV Done
21,085,126 UART: [fht] FMC Alias Private Key: 7
21,086,674 UART: [art] Derive CDI
21,087,436 UART: [art] Store in slot 0x4
21,130,475 UART: [art] Derive Key Pair
21,131,517 UART: [art] Store priv key in slot 0x5
23,558,296 UART: [art] Derive Key Pair - Done
23,571,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,037 UART: [art] PUB.X = 91AD5EEAD4EB2823129B372F8791250989496AF02C4D4E8E680B6B8E23F3208251A59CCD76DB3828F412483D55ACE3AD
25,286,332 UART: [art] PUB.Y = 1D1EBA7BA5AC98E44295854417ED324C373BC127086E6AF8B2F1A79A114C65D57780440118B68E6E6D78E765029A8559
25,293,553 UART: [art] SIG.R = 1DB0B1BF885A91DC4CD31E44D8960725435B00197EDCBB5E840E77891951372ABEF869D6AFB28298A0AD56CAAA944382
25,300,931 UART: [art] SIG.S = 9C14498BEFAE86E8002A2C335903599E81C7F2E2E1E8F547AB7FD1957B45AB09981BA7CD2E0977B89A07D4EEA63F56D3
26,280,333 UART: Caliptra RT
26,281,043 UART: [state] CFI Enabled
26,413,144 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,467,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,622,769 UART: [rt]cmd =0x41544d4e, len=14344
34,617,957 >>> mbox cmd response data (8 bytes)
34,618,545 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,649,141 UART: [rt]cmd =0x41545348, len=116
34,651,283 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,804 UART: [state] LifecycleState = Unprovisioned
85,459 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,807 UART: [kat] SHA2-256
881,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,853 UART: [kat] ++
886,005 UART: [kat] sha1
890,243 UART: [kat] SHA2-256
892,181 UART: [kat] SHA2-384
895,084 UART: [kat] SHA2-512-ACC
896,985 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,458 UART: [kat] LMS
1,475,654 UART: [kat] --
1,476,383 UART: [cold-reset] ++
1,476,775 UART: [fht] Storing FHT @ 0x50003400
1,479,606 UART: [idev] ++
1,479,774 UART: [idev] CDI.KEYID = 6
1,480,134 UART: [idev] SUBJECT.KEYID = 7
1,480,558 UART: [idev] UDS.KEYID = 0
1,480,903 ready_for_fw is high
1,480,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,505,298 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,782 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,411 UART: [ldev] Erasing FE.KEYID = 1
1,546,674 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,268 UART: [ldev] --
1,585,565 UART: [fwproc] Waiting for Commands...
1,586,352 UART: [fwproc] Received command 0x46574c44
1,587,143 UART: [fwproc] Received Image of size 118548 bytes
2,932,249 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,947 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,165 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,422 >>> mbox cmd response: success
3,131,434 UART: [afmc] ++
3,131,602 UART: [afmc] CDI.KEYID = 6
3,131,964 UART: [afmc] SUBJECT.KEYID = 7
3,132,389 UART: [afmc] AUTHORITY.KEYID = 5
3,167,654 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,188 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,871 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,641 UART: [afmc] --
3,210,629 UART: [cold-reset] --
3,211,517 UART: [state] Locking Datavault
3,212,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,470 UART: [state] Locking ICCM
3,214,014 UART: [exit] Launching FMC @ 0x40000130
3,219,344 UART:
3,219,360 UART: Running Caliptra FMC ...
3,219,768 UART:
3,219,822 UART: [state] CFI Enabled
3,230,236 UART: [fht] FMC Alias Private Key: 7
3,349,580 UART: [art] Extend RT PCRs Done
3,350,008 UART: [art] Lock RT PCRs Done
3,351,356 UART: [art] Populate DV Done
3,359,481 UART: [fht] FMC Alias Private Key: 7
3,360,411 UART: [art] Derive CDI
3,360,691 UART: [art] Store in slot 0x4
3,446,459 UART: [art] Derive Key Pair
3,446,819 UART: [art] Store priv key in slot 0x5
3,459,974 UART: [art] Derive Key Pair - Done
3,474,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,465 UART: [art] PUB.X = 6F3F2D5E325A33CEB4AC9D1975670E61633420C4D04FA30EB8AECAA9B6A65338CE6BEF22A07840A61C46E89E157A7948
3,498,239 UART: [art] PUB.Y = 04B8D62343928122591B0A00EE419B9E161BFDF95EB102508F2C5A079D0715C1F555F40C7FCB521E15CD39208F9058A4
3,505,147 UART: [art] SIG.R = C59C3B13894267D3F72AF0FE3A96E05E23DFCF189B884E810D4814BDE44ED8496A9BABD7FA31729F72232E5EF4F82B2C
3,511,928 UART: [art] SIG.S = B5ABA003EEFEE24E8F11CA802F58B19AD34B3C644946315ACCEB6E720D9671E7441AFBB0F3364B175A40579952680B02
3,536,318 UART: Caliptra RT
3,536,569 UART: [state] CFI Enabled
3,657,130 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,800 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,970 UART: [rt]cmd =0x41544d4e, len=14344
4,090,751 >>> mbox cmd response data (8 bytes)
4,090,752 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,589 UART: [rt]cmd =0x41545348, len=116
4,122,254 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,047 ready_for_fw is high
1,362,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,860 >>> mbox cmd response: success
3,040,789 UART:
3,040,805 UART: Running Caliptra FMC ...
3,041,213 UART:
3,041,267 UART: [state] CFI Enabled
3,051,515 UART: [fht] FMC Alias Private Key: 7
3,170,677 UART: [art] Extend RT PCRs Done
3,171,105 UART: [art] Lock RT PCRs Done
3,172,841 UART: [art] Populate DV Done
3,180,982 UART: [fht] FMC Alias Private Key: 7
3,182,116 UART: [art] Derive CDI
3,182,396 UART: [art] Store in slot 0x4
3,268,660 UART: [art] Derive Key Pair
3,269,020 UART: [art] Store priv key in slot 0x5
3,282,347 UART: [art] Derive Key Pair - Done
3,297,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,369 UART: [art] PUB.X = D34AFAB9C77EBAF8F428D3B367ECD4A7A233DA773C814F1B7EF517C19992C4C75D9893F96F476E679652C41543D94CD7
3,320,149 UART: [art] PUB.Y = 5A84D95F03319A04D7C879B00421040F399C91836BE55A1C55A3E1CC1711569B1E9AEFA785BA1C5B69556C967A654D10
3,327,082 UART: [art] SIG.R = 7CD49D3093F79DB1438DE59F9748C056766C9116FD3A4BBCD7B56592C27D39C4C272B8EBAA2FA2C5DCAEC134A4ED6273
3,333,868 UART: [art] SIG.S = D301EE58033316F97E80922041F225DC8F439B774382F1642B787C278A426A65EAE09089F7E318FD88F4F816D2E664CD
3,357,948 UART: Caliptra RT
3,358,199 UART: [state] CFI Enabled
3,478,181 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,851 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,765 UART: [rt]cmd =0x41544d4e, len=14344
3,911,650 >>> mbox cmd response data (8 bytes)
3,911,651 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,580 UART: [rt]cmd =0x41545348, len=116
3,943,537 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,760 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,260 UART: [kat] SHA2-256
882,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,306 UART: [kat] ++
886,458 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,903 UART: [kat] LMS
1,476,099 UART: [kat] --
1,476,880 UART: [cold-reset] ++
1,477,244 UART: [fht] Storing FHT @ 0x50003400
1,480,215 UART: [idev] ++
1,480,383 UART: [idev] CDI.KEYID = 6
1,480,743 UART: [idev] SUBJECT.KEYID = 7
1,481,167 UART: [idev] UDS.KEYID = 0
1,481,512 ready_for_fw is high
1,481,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,155 UART: [idev] Erasing UDS.KEYID = 0
1,506,181 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,809 UART: [idev] --
1,516,044 UART: [ldev] ++
1,516,212 UART: [ldev] CDI.KEYID = 6
1,516,575 UART: [ldev] SUBJECT.KEYID = 5
1,517,001 UART: [ldev] AUTHORITY.KEYID = 7
1,517,464 UART: [ldev] FE.KEYID = 1
1,522,704 UART: [ldev] Erasing FE.KEYID = 1
1,547,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,769 UART: [ldev] --
1,587,134 UART: [fwproc] Waiting for Commands...
1,587,937 UART: [fwproc] Received command 0x46574c44
1,588,728 UART: [fwproc] Received Image of size 118548 bytes
2,932,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,182 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,831 >>> mbox cmd response: success
3,132,001 UART: [afmc] ++
3,132,169 UART: [afmc] CDI.KEYID = 6
3,132,531 UART: [afmc] SUBJECT.KEYID = 7
3,132,956 UART: [afmc] AUTHORITY.KEYID = 5
3,168,085 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,393 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,882 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,765 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,448 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,450 UART: [afmc] --
3,211,356 UART: [cold-reset] --
3,212,124 UART: [state] Locking Datavault
3,213,405 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,009 UART: [state] Locking ICCM
3,214,455 UART: [exit] Launching FMC @ 0x40000130
3,219,785 UART:
3,219,801 UART: Running Caliptra FMC ...
3,220,209 UART:
3,220,352 UART: [state] CFI Enabled
3,231,236 UART: [fht] FMC Alias Private Key: 7
3,349,730 UART: [art] Extend RT PCRs Done
3,350,158 UART: [art] Lock RT PCRs Done
3,352,048 UART: [art] Populate DV Done
3,360,311 UART: [fht] FMC Alias Private Key: 7
3,361,313 UART: [art] Derive CDI
3,361,593 UART: [art] Store in slot 0x4
3,447,409 UART: [art] Derive Key Pair
3,447,769 UART: [art] Store priv key in slot 0x5
3,461,128 UART: [art] Derive Key Pair - Done
3,476,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,144 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,909 UART: [art] PUB.X = 07DA162712BB569ECF09581A8D286FCC0E4FAD7479A21EEF731D3ED16A3A6899145330B007CC1C797C4F9FC0C50B6A41
3,498,674 UART: [art] PUB.Y = F999AEBBF7018988B47309CAD6935AB1C636E4F1DBF5807500ED9828FAD735A4E92FFE49067BE712DDE795480D466F53
3,505,598 UART: [art] SIG.R = ED26BD45FA0C37F1A35431A3BEE7465A1BCC7B8E3D7F4F14F99937A9DD5890B45DF4810E8C8CAA4C7474378C26C26DE8
3,512,378 UART: [art] SIG.S = 6EC369024FB287ACB71422F05D0C669FAE8AC4B04B29FBDBE4AAA2291AA5916D226AF10E1219A8C1CA907866D62DBA8D
3,536,161 UART: Caliptra RT
3,536,504 UART: [state] CFI Enabled
3,656,270 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,004 UART: [rt]cmd =0x41544d4e, len=14344
4,089,857 >>> mbox cmd response data (8 bytes)
4,089,858 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,111 UART: [rt]cmd =0x41545348, len=116
4,121,982 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,830 ready_for_fw is high
1,362,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,407 >>> mbox cmd response: success
3,045,572 UART:
3,045,588 UART: Running Caliptra FMC ...
3,045,996 UART:
3,046,139 UART: [state] CFI Enabled
3,056,845 UART: [fht] FMC Alias Private Key: 7
3,176,091 UART: [art] Extend RT PCRs Done
3,176,519 UART: [art] Lock RT PCRs Done
3,178,085 UART: [art] Populate DV Done
3,186,492 UART: [fht] FMC Alias Private Key: 7
3,187,450 UART: [art] Derive CDI
3,187,730 UART: [art] Store in slot 0x4
3,273,958 UART: [art] Derive Key Pair
3,274,318 UART: [art] Store priv key in slot 0x5
3,287,397 UART: [art] Derive Key Pair - Done
3,302,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,318,245 UART: [art] Erasing AUTHORITY.KEYID = 7
3,319,010 UART: [art] PUB.X = 5143BB2D3AC7C22DEFA12084A194445C075D6ADF89B1D55FA65E4CC947C64646EBD04E12175CD11981126F3322528B7C
3,325,781 UART: [art] PUB.Y = 69AE737DE5EC39DDE265AF30978E622284BBAF978CAAA82A39128455ADD4B1FD3DE7FA9FE6884424DEF020A29F7ABB72
3,332,751 UART: [art] SIG.R = CE6A3225DEF5263FAFEE6BCC68A699ADD13BE41B258C34602EE036F61C0B9D51DFB9D17D9AF5AB6C3D41FBB553FFE87E
3,339,548 UART: [art] SIG.S = 92A3FFC07CB29CE4F5B3F53FB2B203F77EB868D71FA6B0F5D3997632591DE4DAFB9ED84B6B9632F5BB293B2DFB6E15C5
3,363,415 UART: Caliptra RT
3,363,758 UART: [state] CFI Enabled
3,484,455 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,485,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,163 UART: [rt]cmd =0x41544d4e, len=14344
3,918,222 >>> mbox cmd response data (8 bytes)
3,918,223 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,412 UART: [rt]cmd =0x41545348, len=116
3,950,459 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,606 UART: [kat] SHA2-256
901,546 UART: [kat] SHA2-384
904,531 UART: [kat] SHA2-512-ACC
906,432 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,775 UART: [kat] LMS
1,169,087 UART: [kat] --
1,170,030 UART: [cold-reset] ++
1,170,404 UART: [fht] FHT @ 0x50003400
1,173,048 UART: [idev] ++
1,173,216 UART: [idev] CDI.KEYID = 6
1,173,577 UART: [idev] SUBJECT.KEYID = 7
1,174,002 UART: [idev] UDS.KEYID = 0
1,174,348 ready_for_fw is high
1,174,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,551 UART: [idev] Erasing UDS.KEYID = 0
1,199,763 UART: [idev] Sha1 KeyId Algorithm
1,208,693 UART: [idev] --
1,209,704 UART: [ldev] ++
1,209,872 UART: [ldev] CDI.KEYID = 6
1,210,236 UART: [ldev] SUBJECT.KEYID = 5
1,210,663 UART: [ldev] AUTHORITY.KEYID = 7
1,211,126 UART: [ldev] FE.KEYID = 1
1,216,350 UART: [ldev] Erasing FE.KEYID = 1
1,242,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,218 UART: [ldev] --
1,281,435 UART: [fwproc] Wait for Commands...
1,282,242 UART: [fwproc] Recv command 0x46574c44
1,282,975 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,474 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,781 >>> mbox cmd response: success
2,825,939 UART: [afmc] ++
2,826,107 UART: [afmc] CDI.KEYID = 6
2,826,470 UART: [afmc] SUBJECT.KEYID = 7
2,826,896 UART: [afmc] AUTHORITY.KEYID = 5
2,861,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,761 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,776 UART: [afmc] --
2,904,683 UART: [cold-reset] --
2,905,633 UART: [state] Locking Datavault
2,906,470 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,074 UART: [state] Locking ICCM
2,907,506 UART: [exit] Launching FMC @ 0x40000130
2,912,836 UART:
2,912,852 UART: Running Caliptra FMC ...
2,913,260 UART:
2,913,314 UART: [state] CFI Enabled
2,923,888 UART: [fht] FMC Alias Private Key: 7
3,042,410 UART: [art] Extend RT PCRs Done
3,042,838 UART: [art] Lock RT PCRs Done
3,044,606 UART: [art] Populate DV Done
3,052,867 UART: [fht] FMC Alias Private Key: 7
3,053,825 UART: [art] Derive CDI
3,054,105 UART: [art] Store in slot 0x4
3,139,796 UART: [art] Derive Key Pair
3,140,156 UART: [art] Store priv key in slot 0x5
3,153,404 UART: [art] Derive Key Pair - Done
3,168,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,671 UART: [art] PUB.X = 8CC92084871376E48214B8A40F1A80CF05347BE055FB275AB88384913053E2FD7F5D5263DC305148F69E483A3CBDEF15
3,191,433 UART: [art] PUB.Y = ECFF6E132C49541DA0B4E29B7893DEC59CB7366A6CF820A4562C626F8BD5AEE347B84A0D69EFF3D08BF8349453819376
3,198,390 UART: [art] SIG.R = 6DE6DDC6FFCE5C47A6B2D6ADD96DC7E7C73DBC9F1476009632AC38D1532D3EB3A60CBAA4976A7287DB3B65B3DF9D798F
3,205,161 UART: [art] SIG.S = 646F9E267EB437BCAE52A558E41F550A2481AABB0CF830260594E8B9F5997B66CB6C9458EE340111A0B09958D173C11A
3,228,417 UART: Caliptra RT
3,228,668 UART: [state] CFI Enabled
3,349,350 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,350,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,094 UART: [rt]cmd =0x41544d4e, len=14344
3,783,225 >>> mbox cmd response data (8 bytes)
3,783,226 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,291 UART: [rt]cmd =0x41545348, len=116
3,815,228 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,028 ready_for_fw is high
1,059,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,338 >>> mbox cmd response: success
2,739,567 UART:
2,739,583 UART: Running Caliptra FMC ...
2,739,991 UART:
2,740,045 UART: [state] CFI Enabled
2,750,337 UART: [fht] FMC Alias Private Key: 7
2,868,991 UART: [art] Extend RT PCRs Done
2,869,419 UART: [art] Lock RT PCRs Done
2,870,911 UART: [art] Populate DV Done
2,879,088 UART: [fht] FMC Alias Private Key: 7
2,880,024 UART: [art] Derive CDI
2,880,304 UART: [art] Store in slot 0x4
2,966,399 UART: [art] Derive Key Pair
2,966,759 UART: [art] Store priv key in slot 0x5
2,980,235 UART: [art] Derive Key Pair - Done
2,994,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,142 UART: [art] PUB.X = E1FB464EB1419C7D044C1AC78DB564E164A2A829FF7AEEFB1FE3595D3D57858F6DA06256E38BE4454BAB9B31A243C9E6
3,017,925 UART: [art] PUB.Y = 9B6211FB5C503F9B5DA9E52F2CD0A1F55BDF816021A3147CE8D80558242D4FFF88F7F0B14BC0ADB552F5686007FCDFCC
3,024,887 UART: [art] SIG.R = 02F95E3B2105D937C1E478FD785769AB3495617D5E856FCB71E73267D4C5E18841F4D6B4824E726E10B0EBA594BA83F9
3,031,651 UART: [art] SIG.S = C16F4E7A698982F60A2125969D30514ED6F3B99DB78C73820C611C2EAA4F0D1C155686C6A57699E1D7070F52065B93EA
3,055,819 UART: Caliptra RT
3,056,070 UART: [state] CFI Enabled
3,175,625 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,585 UART: [rt]cmd =0x41544d4e, len=14344
3,609,706 >>> mbox cmd response data (8 bytes)
3,609,707 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,824 UART: [rt]cmd =0x41545348, len=116
3,641,481 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,765 UART: [kat] SHA2-256
891,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,419 UART: [kat] ++
895,571 UART: [kat] sha1
899,743 UART: [kat] SHA2-256
901,683 UART: [kat] SHA2-384
904,596 UART: [kat] SHA2-512-ACC
906,497 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,668 UART: [kat] LMS
1,168,980 UART: [kat] --
1,169,873 UART: [cold-reset] ++
1,170,447 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,174,497 ready_for_fw is high
1,174,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,028 UART: [idev] Erasing UDS.KEYID = 0
1,199,276 UART: [idev] Sha1 KeyId Algorithm
1,208,156 UART: [idev] --
1,209,081 UART: [ldev] ++
1,209,249 UART: [ldev] CDI.KEYID = 6
1,209,613 UART: [ldev] SUBJECT.KEYID = 5
1,210,040 UART: [ldev] AUTHORITY.KEYID = 7
1,210,503 UART: [ldev] FE.KEYID = 1
1,215,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,103 UART: [ldev] --
1,281,464 UART: [fwproc] Wait for Commands...
1,282,237 UART: [fwproc] Recv command 0x46574c44
1,282,970 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,412 >>> mbox cmd response: success
2,826,474 UART: [afmc] ++
2,826,642 UART: [afmc] CDI.KEYID = 6
2,827,005 UART: [afmc] SUBJECT.KEYID = 7
2,827,431 UART: [afmc] AUTHORITY.KEYID = 5
2,862,806 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,448 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,255 UART: [afmc] --
2,906,264 UART: [cold-reset] --
2,907,092 UART: [state] Locking Datavault
2,908,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,115 UART: [state] Locking ICCM
2,909,683 UART: [exit] Launching FMC @ 0x40000130
2,915,013 UART:
2,915,029 UART: Running Caliptra FMC ...
2,915,437 UART:
2,915,580 UART: [state] CFI Enabled
2,925,922 UART: [fht] FMC Alias Private Key: 7
3,045,282 UART: [art] Extend RT PCRs Done
3,045,710 UART: [art] Lock RT PCRs Done
3,047,214 UART: [art] Populate DV Done
3,055,467 UART: [fht] FMC Alias Private Key: 7
3,056,423 UART: [art] Derive CDI
3,056,703 UART: [art] Store in slot 0x4
3,142,308 UART: [art] Derive Key Pair
3,142,668 UART: [art] Store priv key in slot 0x5
3,156,112 UART: [art] Derive Key Pair - Done
3,170,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,254 UART: [art] PUB.X = D5BA2823E975BC43FF6D247D75E684067C734F3BDA19AEE63EF2959783D563B500F7EDA1AD9A2D4E85815A4C5149433B
3,194,007 UART: [art] PUB.Y = 231EF606E39731F6549C25FA9A2E37FE6BF8B4118912862D77A52CC515E24A6F9634566E729ED399978478CF45556668
3,200,944 UART: [art] SIG.R = 96E1D848382E3EECC1A42B71E74C196D178D3A3C5F07F831A6515D3AC6A887A5ACDB410CB2E22876E91258B02350C56C
3,207,714 UART: [art] SIG.S = 1EE0A11B17515974579822266625B07AFA7F3B56BFA740E3A0A2ED6BA3901CA2DA3AF30193E9C4D1BC3CF2D907600308
3,230,942 UART: Caliptra RT
3,231,285 UART: [state] CFI Enabled
3,351,426 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,096 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,248 UART: [rt]cmd =0x41544d4e, len=14344
3,785,483 >>> mbox cmd response data (8 bytes)
3,785,484 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,625 UART: [rt]cmd =0x41545348, len=116
3,817,390 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,961 ready_for_fw is high
1,058,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,527 >>> mbox cmd response: success
2,740,756 UART:
2,740,772 UART: Running Caliptra FMC ...
2,741,180 UART:
2,741,323 UART: [state] CFI Enabled
2,751,783 UART: [fht] FMC Alias Private Key: 7
2,871,741 UART: [art] Extend RT PCRs Done
2,872,169 UART: [art] Lock RT PCRs Done
2,873,887 UART: [art] Populate DV Done
2,882,214 UART: [fht] FMC Alias Private Key: 7
2,883,384 UART: [art] Derive CDI
2,883,664 UART: [art] Store in slot 0x4
2,969,235 UART: [art] Derive Key Pair
2,969,595 UART: [art] Store priv key in slot 0x5
2,982,885 UART: [art] Derive Key Pair - Done
2,997,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,322 UART: [art] PUB.X = 1D9F4AF5EAA49E9D5F1FF57F277408ED93C800B9C9DFE44720BC7D8BC932830D56A84AB600813E5AE75221193AC61743
3,021,050 UART: [art] PUB.Y = E50B492C18280A70A477CA17F04A946C0969133BC97CF0DD12B43A6AD715148B5E6FCAF13DC2BB99B7D9A80664AB860C
3,027,995 UART: [art] SIG.R = C62279C991CCF5D447FFFB76AF3C546453A41FE0D8C68C33C478E2E9EA63A96E50E81ED78B491D32A077EDBED8D03F59
3,034,781 UART: [art] SIG.S = CE063F1004EB18C4AF273153124B6F16B6E037AB50CEF2A9A40C07EF7D959FFE824BA7CE2820829DA210665327A54003
3,058,730 UART: Caliptra RT
3,059,073 UART: [state] CFI Enabled
3,179,773 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,453 UART: [rt]cmd =0x41544d4e, len=14344
3,613,442 >>> mbox cmd response data (8 bytes)
3,613,443 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,376 UART: [rt]cmd =0x41545348, len=116
3,645,259 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,480 UART: [kat] SHA2-256
893,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,255 UART: [kat] ++
897,407 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
918,260 UART: [kat] HMAC-384Kdf
922,924 UART: [kat] LMS
1,171,252 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,437 UART: [fht] FHT @ 0x50003400
1,174,978 UART: [idev] ++
1,175,146 UART: [idev] CDI.KEYID = 6
1,175,506 UART: [idev] SUBJECT.KEYID = 7
1,175,930 UART: [idev] UDS.KEYID = 0
1,176,275 ready_for_fw is high
1,176,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,592 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,208,847 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,344 UART: [ldev] SUBJECT.KEYID = 5
1,210,770 UART: [ldev] AUTHORITY.KEYID = 7
1,211,233 UART: [ldev] FE.KEYID = 1
1,216,373 UART: [ldev] Erasing FE.KEYID = 1
1,242,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,714 UART: [fwproc] Wait for Commands...
1,282,412 UART: [fwproc] Recv command 0x46574c44
1,283,140 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,355 >>> mbox cmd response: success
2,827,505 UART: [afmc] ++
2,827,673 UART: [afmc] CDI.KEYID = 6
2,828,035 UART: [afmc] SUBJECT.KEYID = 7
2,828,460 UART: [afmc] AUTHORITY.KEYID = 5
2,864,007 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,374 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,075 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,877 UART: [afmc] --
2,906,821 UART: [cold-reset] --
2,907,727 UART: [state] Locking Datavault
2,908,822 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,426 UART: [state] Locking ICCM
2,909,982 UART: [exit] Launching FMC @ 0x40000130
2,915,312 UART:
2,915,328 UART: Running Caliptra FMC ...
2,915,736 UART:
2,915,790 UART: [state] CFI Enabled
2,926,170 UART: [fht] FMC Alias Private Key: 7
3,045,114 UART: [art] Extend RT PCRs Done
3,045,542 UART: [art] Lock RT PCRs Done
3,047,170 UART: [art] Populate DV Done
3,055,325 UART: [fht] FMC Alias Private Key: 7
3,056,455 UART: [art] Derive CDI
3,056,735 UART: [art] Store in slot 0x4
3,142,446 UART: [art] Derive Key Pair
3,142,806 UART: [art] Store priv key in slot 0x5
3,156,152 UART: [art] Derive Key Pair - Done
3,171,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,455 UART: [art] PUB.X = 8A767882546814B00B3B82AA0465DF12FB19B583317A0F3D1919EA3DF5D2CACBD94D1DC102A80DC9EE8F0EC8C350586F
3,194,219 UART: [art] PUB.Y = E229BD9EE5C502949CCCD5A6BEA07A59CB26BDF737883805737CAC4F654B43EC745F2EA2D8CAED824397A277D7220C0D
3,201,173 UART: [art] SIG.R = 87AC024F5049E2D8B6DAAA320C9C649DE22C1F53360658E792F4F4622D61FC3C3097C0F2F20C2E26E72199BBCC9CB8D4
3,207,941 UART: [art] SIG.S = 512007AA37F3667DF2B1E3026AB4D8DF490D3B7BD92FFF89819C8613FD39166B684F24FA4B602749B6BBD039FFBEC6FD
3,232,178 UART: Caliptra RT
3,232,429 UART: [state] CFI Enabled
3,351,888 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,720 UART: [rt]cmd =0x41544d4e, len=14344
3,785,507 >>> mbox cmd response data (8 bytes)
3,785,508 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,637 UART: [rt]cmd =0x41545348, len=116
3,817,646 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,820 >>> mbox cmd response: success
2,739,301 UART:
2,739,317 UART: Running Caliptra FMC ...
2,739,725 UART:
2,739,779 UART: [state] CFI Enabled
2,750,271 UART: [fht] FMC Alias Private Key: 7
2,868,635 UART: [art] Extend RT PCRs Done
2,869,063 UART: [art] Lock RT PCRs Done
2,870,559 UART: [art] Populate DV Done
2,878,568 UART: [fht] FMC Alias Private Key: 7
2,879,500 UART: [art] Derive CDI
2,879,780 UART: [art] Store in slot 0x4
2,965,609 UART: [art] Derive Key Pair
2,965,969 UART: [art] Store priv key in slot 0x5
2,979,019 UART: [art] Derive Key Pair - Done
2,993,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,931 UART: [art] PUB.X = 4C0BD13F3DE949F58F2FB46E227314F1400935BB3B8B4E03297AF66F2DE28A534A62DBF8449B8F1B0C3520CCF14EA619
3,016,699 UART: [art] PUB.Y = E4FC1059683670855972CBF5A4E5B598A2EA6A3E0A520131E989ADB9A193FE27BC2C72E56E6C11D6EF00071C2FF38CEA
3,023,630 UART: [art] SIG.R = AE236D6E6B516C59E843B98C5E0EEFCD45E476BA48417E9D993A4AE127F9CBC2F70D84C9D8B86F93628A08567C63BEEE
3,030,407 UART: [art] SIG.S = 25329DF8B5E4389674371429BFDD388E7FE56214B0DF4A774522DD6D314A65E2220D522E0EEAFDACFEBE15E8E7B1B0D8
3,054,599 UART: Caliptra RT
3,054,850 UART: [state] CFI Enabled
3,174,407 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,175,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,237 UART: [rt]cmd =0x41544d4e, len=14344
3,607,890 >>> mbox cmd response data (8 bytes)
3,607,891 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,186 UART: [rt]cmd =0x41545348, len=116
3,639,889 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Unprovisioned
86,324 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,287 UART: [kat] SHA2-256
893,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,062 UART: [kat] ++
898,214 UART: [kat] sha1
902,252 UART: [kat] SHA2-256
904,192 UART: [kat] SHA2-384
906,925 UART: [kat] SHA2-512-ACC
908,826 UART: [kat] ECC-384
918,387 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,050 UART: [cold-reset] ++
1,172,400 UART: [fht] FHT @ 0x50003400
1,175,075 UART: [idev] ++
1,175,243 UART: [idev] CDI.KEYID = 6
1,175,603 UART: [idev] SUBJECT.KEYID = 7
1,176,027 UART: [idev] UDS.KEYID = 0
1,176,372 ready_for_fw is high
1,176,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,881 UART: [idev] Erasing UDS.KEYID = 0
1,201,208 UART: [idev] Sha1 KeyId Algorithm
1,209,648 UART: [idev] --
1,210,706 UART: [ldev] ++
1,210,874 UART: [ldev] CDI.KEYID = 6
1,211,237 UART: [ldev] SUBJECT.KEYID = 5
1,211,663 UART: [ldev] AUTHORITY.KEYID = 7
1,212,126 UART: [ldev] FE.KEYID = 1
1,217,468 UART: [ldev] Erasing FE.KEYID = 1
1,243,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,504 UART: [ldev] --
1,282,903 UART: [fwproc] Wait for Commands...
1,283,709 UART: [fwproc] Recv command 0x46574c44
1,284,437 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,844 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,911 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,408 >>> mbox cmd response: success
2,829,418 UART: [afmc] ++
2,829,586 UART: [afmc] CDI.KEYID = 6
2,829,948 UART: [afmc] SUBJECT.KEYID = 7
2,830,373 UART: [afmc] AUTHORITY.KEYID = 5
2,865,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,227 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,975 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,567 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,268 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,996 UART: [afmc] --
2,909,022 UART: [cold-reset] --
2,910,040 UART: [state] Locking Datavault
2,911,029 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,633 UART: [state] Locking ICCM
2,912,129 UART: [exit] Launching FMC @ 0x40000130
2,917,459 UART:
2,917,475 UART: Running Caliptra FMC ...
2,917,883 UART:
2,918,026 UART: [state] CFI Enabled
2,928,824 UART: [fht] FMC Alias Private Key: 7
3,047,882 UART: [art] Extend RT PCRs Done
3,048,310 UART: [art] Lock RT PCRs Done
3,049,854 UART: [art] Populate DV Done
3,058,387 UART: [fht] FMC Alias Private Key: 7
3,059,503 UART: [art] Derive CDI
3,059,783 UART: [art] Store in slot 0x4
3,145,020 UART: [art] Derive Key Pair
3,145,380 UART: [art] Store priv key in slot 0x5
3,158,714 UART: [art] Derive Key Pair - Done
3,173,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,388 UART: [art] PUB.X = 5533B3F4251CB9E3A27F7E598F7526447551998763983968E324D233E39F95E8200DE9CADB9186644D6C2F8E194FF85E
3,197,147 UART: [art] PUB.Y = 2E28586AC7D9477FD5144720A50EFEA074DE37ABE74F1A584B224E5216AC57F6F877C24C164799419E650C4ED7A9AB6F
3,204,097 UART: [art] SIG.R = C09154F26583E334D01A8D873F8D2257CBAFE74A5EE4786E61695B50AC8BF9AD24F184910D745EC67BBF6EFBB5C417FF
3,210,878 UART: [art] SIG.S = FC863A0E4C478AF17C31B208493C260B70D1F1E8AC101E1A6BC839B8FDB0A679AD2E72FF24279B48B903E022FA028192
3,234,683 UART: Caliptra RT
3,235,026 UART: [state] CFI Enabled
3,354,892 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,562 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,404 UART: [rt]cmd =0x41544d4e, len=14344
3,788,547 >>> mbox cmd response data (8 bytes)
3,788,548 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,613 UART: [rt]cmd =0x41545348, len=116
3,820,558 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 ready_for_fw is high
1,060,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,323 >>> mbox cmd response: success
2,740,514 UART:
2,740,530 UART: Running Caliptra FMC ...
2,740,938 UART:
2,741,081 UART: [state] CFI Enabled
2,751,613 UART: [fht] FMC Alias Private Key: 7
2,870,487 UART: [art] Extend RT PCRs Done
2,870,915 UART: [art] Lock RT PCRs Done
2,872,745 UART: [art] Populate DV Done
2,880,868 UART: [fht] FMC Alias Private Key: 7
2,881,828 UART: [art] Derive CDI
2,882,108 UART: [art] Store in slot 0x4
2,967,539 UART: [art] Derive Key Pair
2,967,899 UART: [art] Store priv key in slot 0x5
2,981,169 UART: [art] Derive Key Pair - Done
2,996,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,527 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,292 UART: [art] PUB.X = C2C5521A51D0358AD451D648925970121045A71822894F528E7265D5D271152AAED18F0FDA0F5E5E7D106CCCC279CF32
3,019,054 UART: [art] PUB.Y = DD47DA954F692EC4FE0AB5EDA088DAC240E995C6E423525258683C11CB0BED2E0DF76004A384373A8887F43A662818AA
3,026,000 UART: [art] SIG.R = 01B92D13B21ED09966EBDEC9845D3386E49A5CAF88FF7BEEDF081A08511F79AE113F455EB57F936AB0A70D6BAFE8CBDA
3,032,782 UART: [art] SIG.S = E5F99E805B02E7392D15D777713D242188CBC890EAF20A1F19CB4A136BCD5C85D06E8DECA72895234D1AC23BBD65A070
3,056,796 UART: Caliptra RT
3,057,139 UART: [state] CFI Enabled
3,177,194 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,864 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,956 UART: [rt]cmd =0x41544d4e, len=14344
3,610,881 >>> mbox cmd response data (8 bytes)
3,610,882 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,861 UART: [rt]cmd =0x41545348, len=116
3,642,824 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
192,241 UART:
192,592 UART: Running Caliptra ROM ...
193,771 UART:
193,927 UART: [state] CFI Enabled
262,754 UART: [state] LifecycleState = Unprovisioned
264,698 UART: [state] DebugLocked = No
267,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,182 UART: [kat] SHA2-256
441,861 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,389 UART: [kat] ++
452,866 UART: [kat] sha1
465,401 UART: [kat] SHA2-256
468,095 UART: [kat] SHA2-384
474,667 UART: [kat] SHA2-512-ACC
477,043 UART: [kat] ECC-384
2,766,963 UART: [kat] HMAC-384Kdf
2,798,330 UART: [kat] LMS
3,988,608 UART: [kat] --
3,994,449 UART: [cold-reset] ++
3,997,090 UART: [fht] Storing FHT @ 0x50003400
4,007,514 UART: [idev] ++
4,008,103 UART: [idev] CDI.KEYID = 6
4,009,017 UART: [idev] SUBJECT.KEYID = 7
4,010,271 UART: [idev] UDS.KEYID = 0
4,011,435 ready_for_fw is high
4,011,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,081 UART: [idev] Erasing UDS.KEYID = 0
7,344,242 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,050 UART: [idev] --
7,369,948 UART: [ldev] ++
7,370,518 UART: [ldev] CDI.KEYID = 6
7,371,496 UART: [ldev] SUBJECT.KEYID = 5
7,372,711 UART: [ldev] AUTHORITY.KEYID = 7
7,373,939 UART: [ldev] FE.KEYID = 1
7,420,245 UART: [ldev] Erasing FE.KEYID = 1
10,751,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,778 UART: [ldev] --
13,113,764 UART: [fwproc] Waiting for Commands...
13,115,966 UART: [fwproc] Received command 0x46574c44
13,118,147 UART: [fwproc] Received Image of size 118548 bytes
17,228,123 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,934 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,857 >>> mbox cmd response: success
17,710,700 UART: [afmc] ++
17,711,313 UART: [afmc] CDI.KEYID = 6
17,712,289 UART: [afmc] SUBJECT.KEYID = 7
17,713,508 UART: [afmc] AUTHORITY.KEYID = 5
21,067,741 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,800 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,225 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,261 UART: [afmc] --
23,440,350 UART: [cold-reset] --
23,443,128 UART: [state] Locking Datavault
23,449,236 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,987 UART: [state] Locking ICCM
23,452,867 UART: [exit] Launching FMC @ 0x40000130
23,461,262 UART:
23,461,504 UART: Running Caliptra FMC ...
23,462,606 UART:
23,462,770 UART: [state] CFI Enabled
23,528,541 UART: [fht] FMC Alias Private Key: 7
25,868,140 UART: [art] Extend RT PCRs Done
25,869,373 UART: [art] Lock RT PCRs Done
25,871,079 UART: [art] Populate DV Done
25,876,444 UART: [fht] FMC Alias Private Key: 7
25,878,085 UART: [art] Derive CDI
25,878,899 UART: [art] Store in slot 0x4
25,937,403 UART: [art] Derive Key Pair
25,938,440 UART: [art] Store priv key in slot 0x5
29,231,043 UART: [art] Derive Key Pair - Done
29,243,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,158 UART: [art] PUB.X = 3B742680E94CD7E4A3C625CCB4877DEFCC45885BD819774B9F7F5377FC3523D6322030C5E1859EC960136B9CB764EFF8
31,542,406 UART: [art] PUB.Y = F28F2A84AA2A10EF377FFA34DAAE0F937787B2A6E2DAE33FA6AC5C4B51547DE666D5A1868C2F4178F1E1A3B83987D5F8
31,549,738 UART: [art] SIG.R = B006C3AE7F795FE96D37DF9A658F040211AFEBD32072521F7D79CB954FAC650F307A32B558D826EECDFF96051320A1E3
31,557,130 UART: [art] SIG.S = DD1F01F3CBEC185C15091852351D0898943277B9BE6C0850F09C239E6B290A60810CD0CCD9108009FA5B48DB8A941557
32,862,560 UART: Caliptra RT
32,863,282 UART: [state] CFI Enabled
33,039,894 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,107,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,263,308 UART: [rt]cmd =0x41544d4e, len=14344
42,564,279 >>> mbox cmd response data (8 bytes)
42,564,846 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,595,582 UART: [rt]cmd =0x41545348, len=116
42,597,631 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,780,856 ready_for_fw is high
3,781,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,932,543 >>> mbox cmd response: success
23,650,329 UART:
23,650,768 UART: Running Caliptra FMC ...
23,651,928 UART:
23,652,097 UART: [state] CFI Enabled
23,722,286 UART: [fht] FMC Alias Private Key: 7
26,062,362 UART: [art] Extend RT PCRs Done
26,063,600 UART: [art] Lock RT PCRs Done
26,065,408 UART: [art] Populate DV Done
26,070,827 UART: [fht] FMC Alias Private Key: 7
26,072,430 UART: [art] Derive CDI
26,073,407 UART: [art] Store in slot 0x4
26,130,819 UART: [art] Derive Key Pair
26,131,826 UART: [art] Store priv key in slot 0x5
29,424,935 UART: [art] Derive Key Pair - Done
29,437,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,726,195 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,723 UART: [art] PUB.X = A22984C2B52A9DF8E26DBC523E24FBDC2908398F4811C6E0F589DBC4BEEE2A0147F0490C0B31520DE6C149F63D921D20
31,735,035 UART: [art] PUB.Y = 90E551710E2ACC6C4A3D5475658B3DA794C6E806FEE83669E30FCC0E0778FEEBAFDAFE6D80EB985FDA9DAA4D1E12E1BD
31,742,285 UART: [art] SIG.R = 7805F6148CEECDFE7F17DD9F4C6D3D441E9AB06340F272730A40F56B51B776832199F6C0C9F83E65406F37EAE52C6577
31,749,687 UART: [art] SIG.S = D9646AD8926AF5D512058EA25DD3F01CE6647BAE0E0E638C59080202A3BB8443A694DB6AE5F0C57AD6119FFCCD60070C
33,055,536 UART: Caliptra RT
33,056,240 UART: [state] CFI Enabled
33,252,848 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,319,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,474,963 UART: [rt]cmd =0x41544d4e, len=14344
42,776,007 >>> mbox cmd response data (8 bytes)
42,776,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,807,366 UART: [rt]cmd =0x41545348, len=116
42,809,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,505 UART:
192,870 UART: Running Caliptra ROM ...
193,970 UART:
603,657 UART: [state] CFI Enabled
616,265 UART: [state] LifecycleState = Unprovisioned
618,139 UART: [state] DebugLocked = No
619,448 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,009 UART: [kat] SHA2-256
794,760 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,295 UART: [kat] ++
805,894 UART: [kat] sha1
815,916 UART: [kat] SHA2-256
818,622 UART: [kat] SHA2-384
824,469 UART: [kat] SHA2-512-ACC
826,893 UART: [kat] ECC-384
3,109,313 UART: [kat] HMAC-384Kdf
3,121,043 UART: [kat] LMS
4,311,134 UART: [kat] --
4,316,043 UART: [cold-reset] ++
4,317,471 UART: [fht] Storing FHT @ 0x50003400
4,327,949 UART: [idev] ++
4,328,575 UART: [idev] CDI.KEYID = 6
4,329,479 UART: [idev] SUBJECT.KEYID = 7
4,330,724 UART: [idev] UDS.KEYID = 0
4,331,675 ready_for_fw is high
4,331,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,811 UART: [idev] Erasing UDS.KEYID = 0
7,617,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,018 UART: [idev] --
7,642,514 UART: [ldev] ++
7,643,091 UART: [ldev] CDI.KEYID = 6
7,644,106 UART: [ldev] SUBJECT.KEYID = 5
7,645,260 UART: [ldev] AUTHORITY.KEYID = 7
7,646,486 UART: [ldev] FE.KEYID = 1
7,655,451 UART: [ldev] Erasing FE.KEYID = 1
10,944,314 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,736 UART: [ldev] --
13,303,282 UART: [fwproc] Waiting for Commands...
13,305,364 UART: [fwproc] Received command 0x46574c44
13,307,558 UART: [fwproc] Received Image of size 118548 bytes
17,410,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,483,992 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,557,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,885,529 >>> mbox cmd response: success
17,889,860 UART: [afmc] ++
17,890,487 UART: [afmc] CDI.KEYID = 6
17,891,401 UART: [afmc] SUBJECT.KEYID = 7
17,892,617 UART: [afmc] AUTHORITY.KEYID = 5
21,204,739 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,496,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,498,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,513,269 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,527,986 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,542,448 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,563,301 UART: [afmc] --
23,566,901 UART: [cold-reset] --
23,569,731 UART: [state] Locking Datavault
23,575,187 UART: [state] Locking PCR0, PCR1 and PCR31
23,576,877 UART: [state] Locking ICCM
23,578,154 UART: [exit] Launching FMC @ 0x40000130
23,586,543 UART:
23,586,771 UART: Running Caliptra FMC ...
23,587,863 UART:
23,588,017 UART: [state] CFI Enabled
23,596,255 UART: [fht] FMC Alias Private Key: 7
25,936,562 UART: [art] Extend RT PCRs Done
25,937,781 UART: [art] Lock RT PCRs Done
25,939,481 UART: [art] Populate DV Done
25,944,778 UART: [fht] FMC Alias Private Key: 7
25,946,375 UART: [art] Derive CDI
25,947,121 UART: [art] Store in slot 0x4
25,989,549 UART: [art] Derive Key Pair
25,990,544 UART: [art] Store priv key in slot 0x5
29,233,110 UART: [art] Derive Key Pair - Done
29,246,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,526,545 UART: [art] Erasing AUTHORITY.KEYID = 7
31,528,058 UART: [art] PUB.X = 8A825E7169B085309FA2CCBB9E83A3F3954919CBDBEA7F59B4C54008C26D95F04BE8BA7C09C0BA7A39AFF2D304A38D73
31,535,297 UART: [art] PUB.Y = 9E7BC2096AAD3186BBE8A37DAE5D7CA5385CA7FF21C18D44FF5934BBA4535EFCF10CD9CD443130E31D158DE4E96B8740
31,542,631 UART: [art] SIG.R = 521B2C1D85DE6C555C05811344AE544CC626705D25558C08976926A621DCD30B7EEFFD0353F4D7B6946126AAC9ACF149
31,550,021 UART: [art] SIG.S = 7AA7233362334EF41245FD6C4996B56588937BCAD141A68B2CDB9EB2E834E6098C5E052AA845E814BF5AC395BC97621A
32,855,366 UART: Caliptra RT
32,856,064 UART: [state] CFI Enabled
32,990,254 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,052,472 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,208,022 UART: [rt]cmd =0x41544d4e, len=14344
42,508,995 >>> mbox cmd response data (8 bytes)
42,509,588 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,540,094 UART: [rt]cmd =0x41545348, len=116
42,541,919 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
4,132,690 ready_for_fw is high
4,133,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,504 >>> mbox cmd response: success
23,809,159 UART:
23,809,572 UART: Running Caliptra FMC ...
23,810,680 UART:
23,810,831 UART: [state] CFI Enabled
23,818,829 UART: [fht] FMC Alias Private Key: 7
26,159,094 UART: [art] Extend RT PCRs Done
26,160,326 UART: [art] Lock RT PCRs Done
26,161,982 UART: [art] Populate DV Done
26,167,677 UART: [fht] FMC Alias Private Key: 7
26,169,158 UART: [art] Derive CDI
26,169,918 UART: [art] Store in slot 0x4
26,212,478 UART: [art] Derive Key Pair
26,213,519 UART: [art] Store priv key in slot 0x5
29,455,471 UART: [art] Derive Key Pair - Done
29,468,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,347 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,855 UART: [art] PUB.X = 4EBAF82452ECD5E0833D0C26209A760205CB1303BCBD628D7B9911F81890A858C25885F1A1798D8C231DCBB144A43E2F
31,758,107 UART: [art] PUB.Y = 4CE650B34813B6F5861DF48F25FF7DB9F970A0B35D8A7F5CB904A04152A42FD565B286D19614120329B70C75745C4178
31,765,396 UART: [art] SIG.R = C5498939E104F63B4C7CE5D0D7008E8D4A1DEACF0136E708D6D1A0484A9D06CC52C15B03D13F125772A8305AF5B8EE95
31,772,740 UART: [art] SIG.S = FF92743F42B96965F181545B8DA551F9818BE4EFE23CC258280F314E993CB256EC299141920FA65C692E1DB7A6502017
33,078,270 UART: Caliptra RT
33,078,989 UART: [state] CFI Enabled
33,212,311 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,280,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,436,795 UART: [rt]cmd =0x41544d4e, len=14344
42,737,764 >>> mbox cmd response data (8 bytes)
42,738,492 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,769,117 UART: [rt]cmd =0x41545348, len=116
42,771,376 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,244 UART:
192,602 UART: Running Caliptra ROM ...
193,766 UART:
193,918 UART: [state] CFI Enabled
263,657 UART: [state] LifecycleState = Unprovisioned
265,574 UART: [state] DebugLocked = No
267,458 UART: [state] WD Timer not started. Device not locked for debugging
270,721 UART: [kat] SHA2-256
450,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,186 UART: [kat] ++
461,632 UART: [kat] sha1
473,589 UART: [kat] SHA2-256
476,279 UART: [kat] SHA2-384
482,763 UART: [kat] SHA2-512-ACC
485,120 UART: [kat] ECC-384
2,948,623 UART: [kat] HMAC-384Kdf
2,970,952 UART: [kat] LMS
3,447,431 UART: [kat] --
3,451,066 UART: [cold-reset] ++
3,453,348 UART: [fht] FHT @ 0x50003400
3,464,599 UART: [idev] ++
3,465,167 UART: [idev] CDI.KEYID = 6
3,466,122 UART: [idev] SUBJECT.KEYID = 7
3,467,379 UART: [idev] UDS.KEYID = 0
3,468,275 ready_for_fw is high
3,468,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,603 UART: [idev] Erasing UDS.KEYID = 0
5,991,553 UART: [idev] Sha1 KeyId Algorithm
6,014,305 UART: [idev] --
6,019,705 UART: [ldev] ++
6,020,328 UART: [ldev] CDI.KEYID = 6
6,021,215 UART: [ldev] SUBJECT.KEYID = 5
6,022,419 UART: [ldev] AUTHORITY.KEYID = 7
6,023,702 UART: [ldev] FE.KEYID = 1
6,059,971 UART: [ldev] Erasing FE.KEYID = 1
8,570,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,667 UART: [ldev] --
10,377,252 UART: [fwproc] Wait for Commands...
10,379,610 UART: [fwproc] Recv command 0x46574c44
10,381,588 UART: [fwproc] Recv'd Img size: 118548 bytes
13,872,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,359,271 >>> mbox cmd response: success
14,363,412 UART: [afmc] ++
14,364,030 UART: [afmc] CDI.KEYID = 6
14,364,941 UART: [afmc] SUBJECT.KEYID = 7
14,366,158 UART: [afmc] AUTHORITY.KEYID = 5
16,894,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,485 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,340 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,874 UART: [afmc] --
18,714,835 UART: [cold-reset] --
18,718,160 UART: [state] Locking Datavault
18,724,537 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,286 UART: [state] Locking ICCM
18,727,922 UART: [exit] Launching FMC @ 0x40000130
18,736,320 UART:
18,736,552 UART: Running Caliptra FMC ...
18,737,574 UART:
18,737,716 UART: [state] CFI Enabled
18,795,966 UART: [fht] FMC Alias Private Key: 7
20,562,621 UART: [art] Extend RT PCRs Done
20,563,862 UART: [art] Lock RT PCRs Done
20,565,588 UART: [art] Populate DV Done
20,570,784 UART: [fht] FMC Alias Private Key: 7
20,572,315 UART: [art] Derive CDI
20,573,045 UART: [art] Store in slot 0x4
20,628,678 UART: [art] Derive Key Pair
20,629,717 UART: [art] Store priv key in slot 0x5
23,092,462 UART: [art] Derive Key Pair - Done
23,105,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,869 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,373 UART: [art] PUB.X = 3BD15BFF6D3306D7F31AA8F678265A1FFE2A9151DAFEEA1857E6F0E296C3AF6B91865068580822CD5339BFC7150880A5
24,826,680 UART: [art] PUB.Y = F95DCD143C37C079F9E439DC460837C8930D40E1302163057E8575C93B0C2E4854EE3549409EB648A17993565D028E82
24,833,871 UART: [art] SIG.R = 4D846771CCC47298EE0793DFDEA11FE4F302BE29EA5724A30F17B4F05BC6FE2A13ED10271533C45808FADBA7E58AA017
24,841,257 UART: [art] SIG.S = 1C12DD97A5ABBA6A156FE95B3B141C0DD737B67270A91A14E9D2D3D47C987045F7E52D7FE819010D4DE181E59BDE232D
25,820,417 UART: Caliptra RT
25,821,133 UART: [state] CFI Enabled
26,001,266 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,044,043 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,199,572 UART: [rt]cmd =0x41544d4e, len=14344
34,195,216 >>> mbox cmd response data (8 bytes)
34,195,800 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,226,379 UART: [rt]cmd =0x41545348, len=116
34,228,572 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,463,547 ready_for_fw is high
3,463,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,216,014 >>> mbox cmd response: success
18,494,322 UART:
18,494,737 UART: Running Caliptra FMC ...
18,495,848 UART:
18,496,000 UART: [state] CFI Enabled
18,561,639 UART: [fht] FMC Alias Private Key: 7
20,327,787 UART: [art] Extend RT PCRs Done
20,329,015 UART: [art] Lock RT PCRs Done
20,330,593 UART: [art] Populate DV Done
20,335,967 UART: [fht] FMC Alias Private Key: 7
20,337,618 UART: [art] Derive CDI
20,338,434 UART: [art] Store in slot 0x4
20,394,078 UART: [art] Derive Key Pair
20,395,124 UART: [art] Store priv key in slot 0x5
22,858,058 UART: [art] Derive Key Pair - Done
22,871,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,795 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,299 UART: [art] PUB.X = B7A5029894C2E5A6E2116A3A5BBAC4E034023BCB1C606ECD5C5C86C8EF533EE8E7F264151056145A93EE67982141A3E9
24,592,506 UART: [art] PUB.Y = C8B080C0EA8AF5BA71E977513306A039064E483F61F3FA105A2E04F1BECD632F7FC068597F229D2D7F5445D2F62E1CEB
24,599,803 UART: [art] SIG.R = 96BC09FB13B5D8196B3285A66CDCC4EB336DBDFA15641E23E9D284D5985A3CAA4971182569BFF2537397E2FAEDB3C13E
24,607,214 UART: [art] SIG.S = 1889F8D624FE78A249658A430F14360D3975B7937A38BA809F6FFEABB35CA69BBC6310EAE627A302FC4BB198542CC02E
25,585,839 UART: Caliptra RT
25,586,587 UART: [state] CFI Enabled
25,767,819 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,802,946 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,958,670 UART: [rt]cmd =0x41544d4e, len=14344
33,954,096 >>> mbox cmd response data (8 bytes)
33,954,674 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
33,985,465 UART: [rt]cmd =0x41545348, len=116
33,987,729 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,526 UART:
192,938 UART: Running Caliptra ROM ...
194,062 UART:
603,642 UART: [state] CFI Enabled
616,782 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
620,865 UART: [state] WD Timer not started. Device not locked for debugging
624,574 UART: [kat] SHA2-256
804,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,968 UART: [kat] ++
815,419 UART: [kat] sha1
825,798 UART: [kat] SHA2-256
828,527 UART: [kat] SHA2-384
834,593 UART: [kat] SHA2-512-ACC
836,964 UART: [kat] ECC-384
3,277,041 UART: [kat] HMAC-384Kdf
3,289,486 UART: [kat] LMS
3,765,937 UART: [kat] --
3,771,495 UART: [cold-reset] ++
3,772,712 UART: [fht] FHT @ 0x50003400
3,784,038 UART: [idev] ++
3,784,672 UART: [idev] CDI.KEYID = 6
3,785,554 UART: [idev] SUBJECT.KEYID = 7
3,786,823 UART: [idev] UDS.KEYID = 0
3,787,799 ready_for_fw is high
3,788,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,889 UART: [idev] Erasing UDS.KEYID = 0
6,263,223 UART: [idev] Sha1 KeyId Algorithm
6,285,960 UART: [idev] --
6,291,257 UART: [ldev] ++
6,291,898 UART: [ldev] CDI.KEYID = 6
6,292,822 UART: [ldev] SUBJECT.KEYID = 5
6,294,042 UART: [ldev] AUTHORITY.KEYID = 7
6,295,183 UART: [ldev] FE.KEYID = 1
6,306,420 UART: [ldev] Erasing FE.KEYID = 1
8,786,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,028 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,891 UART: [ldev] --
10,577,913 UART: [fwproc] Wait for Commands...
10,580,768 UART: [fwproc] Recv command 0x46574c44
10,582,756 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,771 >>> mbox cmd response: success
14,556,661 UART: [afmc] ++
14,557,271 UART: [afmc] CDI.KEYID = 6
14,558,221 UART: [afmc] SUBJECT.KEYID = 7
14,559,439 UART: [afmc] AUTHORITY.KEYID = 5
17,062,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,557 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,741 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,590 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,215 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,307 UART: [afmc] --
18,862,213 UART: [cold-reset] --
18,865,493 UART: [state] Locking Datavault
18,868,809 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,568 UART: [state] Locking ICCM
18,871,914 UART: [exit] Launching FMC @ 0x40000130
18,880,370 UART:
18,880,608 UART: Running Caliptra FMC ...
18,881,712 UART:
18,881,873 UART: [state] CFI Enabled
18,889,653 UART: [fht] FMC Alias Private Key: 7
20,656,216 UART: [art] Extend RT PCRs Done
20,657,427 UART: [art] Lock RT PCRs Done
20,659,154 UART: [art] Populate DV Done
20,664,514 UART: [fht] FMC Alias Private Key: 7
20,666,052 UART: [art] Derive CDI
20,666,790 UART: [art] Store in slot 0x4
20,709,681 UART: [art] Derive Key Pair
20,710,717 UART: [art] Store priv key in slot 0x5
23,137,777 UART: [art] Derive Key Pair - Done
23,150,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,148 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,632 UART: [art] PUB.X = F9F209C59D4C2F0573C70939E271D473B82DBFD294E55EE04DD256A0F981D8C80894D7F3DE84303554E6C50B377BC47F
24,865,942 UART: [art] PUB.Y = 81317C79FCCBB9666BEC37C85FABAF9C771A52DD5C57C438ED32A4F49512D5CBA380FD7089D7A245CAC9ED2AF71B4237
24,873,229 UART: [art] SIG.R = 2EB98760C2AA490ABEDC159841A6529AB013D2092B963568DF4227C6621764404DB6968070C083C349FCA8CCCA28FC5C
24,880,570 UART: [art] SIG.S = 25216E529FDC7E84ACFBA4722D95831DA9C3220F6AEB41A5FDF169CDD3370F7137EAA3F3399E62D3582EE4DC9F3D7FB1
25,859,497 UART: Caliptra RT
25,860,206 UART: [state] CFI Enabled
25,992,905 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,042,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,197,977 UART: [rt]cmd =0x41544d4e, len=14344
34,193,194 >>> mbox cmd response data (8 bytes)
34,193,780 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,224,519 UART: [rt]cmd =0x41545348, len=116
34,226,761 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,781,086 ready_for_fw is high
3,781,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,432,159 >>> mbox cmd response: success
18,683,851 UART:
18,684,238 UART: Running Caliptra FMC ...
18,685,377 UART:
18,685,542 UART: [state] CFI Enabled
18,693,475 UART: [fht] FMC Alias Private Key: 7
20,459,308 UART: [art] Extend RT PCRs Done
20,460,535 UART: [art] Lock RT PCRs Done
20,462,170 UART: [art] Populate DV Done
20,467,432 UART: [fht] FMC Alias Private Key: 7
20,469,031 UART: [art] Derive CDI
20,469,853 UART: [art] Store in slot 0x4
20,512,404 UART: [art] Derive Key Pair
20,513,453 UART: [art] Store priv key in slot 0x5
22,940,112 UART: [art] Derive Key Pair - Done
22,952,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,071 UART: [art] PUB.X = A8851AB10AFB5DA16EA53A658A5BE26B7397C7112F447676010F5142590C06D553CE9229EA3CC4B81AAF120FF8BCD528
24,668,336 UART: [art] PUB.Y = 835A1DB3F806AEC64300FDB827DBF3D752433A3EBC879FFED68DAECC5B29C12B0790239D75371AF20DF5E871F634E2CF
24,675,600 UART: [art] SIG.R = 3A75326B0A7955538A9C138EBF2F498E7BA1A84759E16D74B207A56634B949F88673EEE2666D3EE3587B7C7854DC79F0
24,682,957 UART: [art] SIG.S = 1EB7F6A413E6271E7C91BE415F1D1CFB518183673045EAF3466140F4B75EF93B48C41658C50FF6DE5E1AB5B69D3F164A
25,661,472 UART: Caliptra RT
25,662,178 UART: [state] CFI Enabled
25,794,630 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,853,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,008,462 UART: [rt]cmd =0x41544d4e, len=14344
34,004,640 >>> mbox cmd response data (8 bytes)
34,005,209 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,035,954 UART: [rt]cmd =0x41545348, len=116
34,038,169 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,856 writing to cptra_bootfsm_go
191,947 UART:
192,197 UART: Running Caliptra ROM ...
193,290 UART:
193,429 UART: [state] CFI Enabled
265,260 UART: [state] LifecycleState = Unprovisioned
267,495 UART: [state] DebugLocked = No
269,641 UART: [state] WD Timer not started. Device not locked for debugging
273,788 UART: [kat] SHA2-256
463,664 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,478 UART: [kat] ++
474,925 UART: [kat] sha1
486,240 UART: [kat] SHA2-256
489,294 UART: [kat] SHA2-384
494,958 UART: [kat] SHA2-512-ACC
497,540 UART: [kat] ECC-384
2,947,789 UART: [kat] HMAC-384Kdf
2,972,021 UART: [kat] LMS
3,503,786 UART: [kat] --
3,509,649 UART: [cold-reset] ++
3,511,653 UART: [fht] FHT @ 0x50003400
3,522,413 UART: [idev] ++
3,523,113 UART: [idev] CDI.KEYID = 6
3,524,234 UART: [idev] SUBJECT.KEYID = 7
3,525,324 UART: [idev] UDS.KEYID = 0
3,526,221 ready_for_fw is high
3,526,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,345 UART: [idev] Erasing UDS.KEYID = 0
6,028,240 UART: [idev] Sha1 KeyId Algorithm
6,050,337 UART: [idev] --
6,054,835 UART: [ldev] ++
6,055,568 UART: [ldev] CDI.KEYID = 6
6,056,448 UART: [ldev] SUBJECT.KEYID = 5
6,057,653 UART: [ldev] AUTHORITY.KEYID = 7
6,058,828 UART: [ldev] FE.KEYID = 1
6,098,989 UART: [ldev] Erasing FE.KEYID = 1
8,602,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,477 UART: [ldev] --
10,411,431 UART: [fwproc] Wait for Commands...
10,413,261 UART: [fwproc] Recv command 0x46574c44
10,415,567 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,420 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,784 >>> mbox cmd response: success
14,690,237 UART: [afmc] ++
14,690,940 UART: [afmc] CDI.KEYID = 6
14,692,049 UART: [afmc] SUBJECT.KEYID = 7
14,693,595 UART: [afmc] AUTHORITY.KEYID = 5
17,236,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,979,858 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,981,773 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,996,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,018 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,026,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,050,078 UART: [afmc] --
19,054,100 UART: [cold-reset] --
19,058,572 UART: [state] Locking Datavault
19,063,095 UART: [state] Locking PCR0, PCR1 and PCR31
19,065,250 UART: [state] Locking ICCM
19,067,565 UART: [exit] Launching FMC @ 0x40000130
19,076,240 UART:
19,076,410 UART: Running Caliptra FMC ...
19,077,424 UART:
19,077,568 UART: [state] CFI Enabled
19,137,351 UART: [fht] FMC Alias Private Key: 7
20,903,510 UART: [art] Extend RT PCRs Done
20,904,738 UART: [art] Lock RT PCRs Done
20,906,114 UART: [art] Populate DV Done
20,911,632 UART: [fht] FMC Alias Private Key: 7
20,913,392 UART: [art] Derive CDI
20,914,128 UART: [art] Store in slot 0x4
20,969,922 UART: [art] Derive Key Pair
20,970,961 UART: [art] Store priv key in slot 0x5
23,434,220 UART: [art] Derive Key Pair - Done
23,447,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,879 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,389 UART: [art] PUB.X = CA60F203B7E8A6D55A7DC9835F10BEFF15B968682935ECCD2D573192DE2DBB16C91FE718D1C6E609BA8DF8B6F1275B72
25,168,706 UART: [art] PUB.Y = 8C478DB65A14458B0FB4E92D24A07759BCFB185A158D151CBE7B1B955AB530FBE3753712185025B8345B37060A03CED9
25,175,960 UART: [art] SIG.R = 7513B88750B7E4C2A5608A6AED1C039C77F06342A4A4D567EFE2D99FACC3B4109EE9CBBB42C93C7293ABAE03D2BE9B14
25,183,369 UART: [art] SIG.S = C9D856F0A5D9992BB7E13D04C5DE82C253394D2FB0DA7F03B381340676DE84DEC6417D19EBEA646420F0D8371C62B9D0
26,162,991 UART: Caliptra RT
26,163,706 UART: [state] CFI Enabled
26,343,394 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,389,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,545,736 UART: [rt]cmd =0x41544d4e, len=14344
34,541,103 >>> mbox cmd response data (8 bytes)
34,541,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,572,501 UART: [rt]cmd =0x41545348, len=116
34,574,363 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
3,439,589 ready_for_fw is high
3,440,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,433 >>> mbox cmd response: success
19,113,312 UART:
19,113,734 UART: Running Caliptra FMC ...
19,114,951 UART:
19,115,122 UART: [state] CFI Enabled
19,180,314 UART: [fht] FMC Alias Private Key: 7
20,946,982 UART: [art] Extend RT PCRs Done
20,948,196 UART: [art] Lock RT PCRs Done
20,949,763 UART: [art] Populate DV Done
20,955,131 UART: [fht] FMC Alias Private Key: 7
20,956,727 UART: [art] Derive CDI
20,957,541 UART: [art] Store in slot 0x4
21,012,327 UART: [art] Derive Key Pair
21,013,396 UART: [art] Store priv key in slot 0x5
23,476,719 UART: [art] Derive Key Pair - Done
23,489,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,174 UART: [art] PUB.X = 3E51221247B79914E1B55BD535F500FD3CA6259EAFD442135CF094F1386A29C2ED321E956D37485669A0AB01004460A4
25,211,376 UART: [art] PUB.Y = 0BF92F1AEDAE85D252DE42F74E6B0E832E227648DA966F58113C4F246662EFC76C044FBDAA61D49996545DB4123EAE37
25,218,654 UART: [art] SIG.R = E562681C1B330B2D0C8AD3B6F452C1479A28207EB1FD2EAD0CF3F6B3F384595ED0C199B296494B21E92DDDAEC232035B
25,226,037 UART: [art] SIG.S = A64A8CE1C2B7D355DFAF86C8BA98076FF96651165E2803DFAB2FA01920E9807C33D12506F5C33D8934A148900B52C94A
26,204,747 UART: Caliptra RT
26,205,439 UART: [state] CFI Enabled
26,386,420 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,432,377 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,587,996 UART: [rt]cmd =0x41544d4e, len=14344
34,583,299 >>> mbox cmd response data (8 bytes)
34,583,890 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,614,465 UART: [rt]cmd =0x41545348, len=116
34,616,721 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,515 UART:
192,868 UART: Running Caliptra ROM ...
194,070 UART:
603,783 UART: [state] CFI Enabled
616,790 UART: [state] LifecycleState = Unprovisioned
619,207 UART: [state] DebugLocked = No
621,458 UART: [state] WD Timer not started. Device not locked for debugging
625,536 UART: [kat] SHA2-256
815,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,258 UART: [kat] ++
826,719 UART: [kat] sha1
838,376 UART: [kat] SHA2-256
841,387 UART: [kat] SHA2-384
845,963 UART: [kat] SHA2-512-ACC
848,558 UART: [kat] ECC-384
3,289,001 UART: [kat] HMAC-384Kdf
3,302,242 UART: [kat] LMS
3,834,123 UART: [kat] --
3,840,606 UART: [cold-reset] ++
3,842,896 UART: [fht] FHT @ 0x50003400
3,854,024 UART: [idev] ++
3,854,669 UART: [idev] CDI.KEYID = 6
3,855,706 UART: [idev] SUBJECT.KEYID = 7
3,856,910 UART: [idev] UDS.KEYID = 0
3,857,842 ready_for_fw is high
3,858,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,990 UART: [idev] Erasing UDS.KEYID = 0
6,330,627 UART: [idev] Sha1 KeyId Algorithm
6,353,742 UART: [idev] --
6,358,814 UART: [ldev] ++
6,359,490 UART: [ldev] CDI.KEYID = 6
6,360,434 UART: [ldev] SUBJECT.KEYID = 5
6,361,594 UART: [ldev] AUTHORITY.KEYID = 7
6,362,833 UART: [ldev] FE.KEYID = 1
6,373,450 UART: [ldev] Erasing FE.KEYID = 1
8,849,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,528 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,233 UART: [ldev] --
10,641,613 UART: [fwproc] Wait for Commands...
10,644,741 UART: [fwproc] Recv command 0x46574c44
10,647,050 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,274 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,370 >>> mbox cmd response: success
14,916,412 UART: [afmc] ++
14,917,141 UART: [afmc] CDI.KEYID = 6
14,918,253 UART: [afmc] SUBJECT.KEYID = 7
14,919,808 UART: [afmc] AUTHORITY.KEYID = 5
17,421,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,490 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,655 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,566 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,421 UART: [afmc] --
19,214,317 UART: [cold-reset] --
19,218,788 UART: [state] Locking Datavault
19,225,037 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,205 UART: [state] Locking ICCM
19,229,583 UART: [exit] Launching FMC @ 0x40000130
19,238,222 UART:
19,238,470 UART: Running Caliptra FMC ...
19,239,530 UART:
19,239,682 UART: [state] CFI Enabled
19,247,681 UART: [fht] FMC Alias Private Key: 7
21,013,518 UART: [art] Extend RT PCRs Done
21,014,745 UART: [art] Lock RT PCRs Done
21,016,533 UART: [art] Populate DV Done
21,021,790 UART: [fht] FMC Alias Private Key: 7
21,023,289 UART: [art] Derive CDI
21,024,060 UART: [art] Store in slot 0x4
21,067,041 UART: [art] Derive Key Pair
21,068,050 UART: [art] Store priv key in slot 0x5
23,495,154 UART: [art] Derive Key Pair - Done
23,508,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,665 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,167 UART: [art] PUB.X = B559A91CE0CAF80BCF3BC406F756ACE90351DE283F2675B31ACCF729979A184285092FBD289E67294A96BADF0B9FD94B
25,223,436 UART: [art] PUB.Y = F31B3D71040D6ADC5AEEB3A27688AE0D1771DC3D5DD7F93FC6DEAEF85694B0FB0B14C30262C933314FDCA214F85C6B9D
25,230,749 UART: [art] SIG.R = F307BB349A9279C83C49234DBD53140DC425B053149CB303EADD45338B9E014642F35CAC102E9BBD6423B0A0D18FE4E3
25,238,127 UART: [art] SIG.S = 5AB2E8A79ADA92113415680C069486195C68873BE2646873C30B22161EFDC6478B95E7DB9014C19AA186E2F2477AD6D1
26,216,992 UART: Caliptra RT
26,217,705 UART: [state] CFI Enabled
26,349,781 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,406,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,562,217 UART: [rt]cmd =0x41544d4e, len=14344
34,557,549 >>> mbox cmd response data (8 bytes)
34,558,147 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,588,828 UART: [rt]cmd =0x41545348, len=116
34,591,253 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,759,416 ready_for_fw is high
3,759,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,775 >>> mbox cmd response: success
19,303,408 UART:
19,303,805 UART: Running Caliptra FMC ...
19,304,942 UART:
19,305,106 UART: [state] CFI Enabled
19,312,957 UART: [fht] FMC Alias Private Key: 7
21,079,390 UART: [art] Extend RT PCRs Done
21,080,622 UART: [art] Lock RT PCRs Done
21,082,224 UART: [art] Populate DV Done
21,087,812 UART: [fht] FMC Alias Private Key: 7
21,089,305 UART: [art] Derive CDI
21,090,075 UART: [art] Store in slot 0x4
21,132,733 UART: [art] Derive Key Pair
21,133,780 UART: [art] Store priv key in slot 0x5
23,560,308 UART: [art] Derive Key Pair - Done
23,573,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,187 UART: [art] PUB.X = 6E35E36AF975E31E87F889A685810FE929F11F658A2E3C1AF010A8AEE364832433C83ACEFBB2D2B5476E2FBA57B861E0
25,288,465 UART: [art] PUB.Y = D0F9C6B2CC88352001C2195A761179B1BAB18D54D7D72C16E6C70B369D6A61E8C16269B9D6273BC8AC54A5A65269A5F4
25,295,744 UART: [art] SIG.R = 298C97230F8B5D098CD03B8540B013F9375F3F002EFD09CCF2DF89A5161A78585CDD2E64BA143929AECFCA608A9CF3BF
25,303,122 UART: [art] SIG.S = 89E34A28FB8E51979E3A1585DE4CB46C3395F59CCDE45514142EF1984A92788D7B1DCB663DB5EE45AF8509DB2C711E40
26,281,503 UART: Caliptra RT
26,282,220 UART: [state] CFI Enabled
26,414,556 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,470,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,626,469 UART: [rt]cmd =0x41544d4e, len=14344
34,622,429 >>> mbox cmd response data (8 bytes)
34,623,456 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,653,947 UART: [rt]cmd =0x41545348, len=116
34,656,040 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,739 UART: [kat] SHA2-256
881,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,785 UART: [kat] ++
885,937 UART: [kat] sha1
890,333 UART: [kat] SHA2-256
892,271 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,384 UART: [kat] LMS
1,475,580 UART: [kat] --
1,476,519 UART: [cold-reset] ++
1,477,029 UART: [fht] Storing FHT @ 0x50003400
1,479,746 UART: [idev] ++
1,479,914 UART: [idev] CDI.KEYID = 6
1,480,274 UART: [idev] SUBJECT.KEYID = 7
1,480,698 UART: [idev] UDS.KEYID = 0
1,481,043 ready_for_fw is high
1,481,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,228 UART: [idev] --
1,515,125 UART: [ldev] ++
1,515,293 UART: [ldev] CDI.KEYID = 6
1,515,656 UART: [ldev] SUBJECT.KEYID = 5
1,516,082 UART: [ldev] AUTHORITY.KEYID = 7
1,516,545 UART: [ldev] FE.KEYID = 1
1,521,893 UART: [ldev] Erasing FE.KEYID = 1
1,547,206 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,904 UART: [ldev] --
1,586,273 UART: [fwproc] Waiting for Commands...
1,586,936 UART: [fwproc] Received command 0x46574c44
1,587,727 UART: [fwproc] Received Image of size 118548 bytes
2,931,683 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,791 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,009 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,382 >>> mbox cmd response: success
3,132,530 UART: [afmc] ++
3,132,698 UART: [afmc] CDI.KEYID = 6
3,133,060 UART: [afmc] SUBJECT.KEYID = 7
3,133,485 UART: [afmc] AUTHORITY.KEYID = 5
3,168,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,596 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,376 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,085 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,968 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,651 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,625 UART: [afmc] --
3,211,747 UART: [cold-reset] --
3,212,675 UART: [state] Locking Datavault
3,213,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,516 UART: [state] Locking ICCM
3,215,168 UART: [exit] Launching FMC @ 0x40000130
3,220,498 UART:
3,220,514 UART: Running Caliptra FMC ...
3,220,922 UART:
3,220,976 UART: [state] CFI Enabled
3,231,792 UART: [fht] FMC Alias Private Key: 7
3,351,378 UART: [art] Extend RT PCRs Done
3,351,806 UART: [art] Lock RT PCRs Done
3,353,168 UART: [art] Populate DV Done
3,361,173 UART: [fht] FMC Alias Private Key: 7
3,362,185 UART: [art] Derive CDI
3,362,465 UART: [art] Store in slot 0x4
3,448,369 UART: [art] Derive Key Pair
3,448,729 UART: [art] Store priv key in slot 0x5
3,462,080 UART: [art] Derive Key Pair - Done
3,477,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,022 UART: [art] PUB.X = 61896533FD53886163179E0CC6D550354FCFBB20155817078F127A1F61250B8F79C77E57BD46215D593989947226C629
3,499,765 UART: [art] PUB.Y = 43470E08F0013586BDDD9E0F85432F34E8F319ADDB632EAD5CCA412E7B4B11BCF0CBAD9871E27AB6BD7E3DDB09A95FE6
3,506,724 UART: [art] SIG.R = 7D5256718B91B154626E04E952A090D4CBC3A63E4B805E49E0C86E6ECD7B34BD9506906CE175EAEE403C7FAF41910034
3,513,470 UART: [art] SIG.S = 5FE8CA1FD0652A7BA96888708647D0659720F1D4F7533AE4D03C36E84E62487D9836B18A2FFF55DA1FB6CF1DE6B628E7
3,536,912 UART: Caliptra RT
3,537,163 UART: [state] CFI Enabled
3,657,344 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,014 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,022 UART: [rt]cmd =0x41544d4e, len=14344
4,090,907 >>> mbox cmd response data (8 bytes)
4,090,908 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,141 UART: [rt]cmd =0x41545348, len=116
4,122,984 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,168 >>> mbox cmd response: success
3,042,819 UART:
3,042,835 UART: Running Caliptra FMC ...
3,043,243 UART:
3,043,297 UART: [state] CFI Enabled
3,053,325 UART: [fht] FMC Alias Private Key: 7
3,172,309 UART: [art] Extend RT PCRs Done
3,172,737 UART: [art] Lock RT PCRs Done
3,174,045 UART: [art] Populate DV Done
3,182,270 UART: [fht] FMC Alias Private Key: 7
3,183,288 UART: [art] Derive CDI
3,183,568 UART: [art] Store in slot 0x4
3,269,372 UART: [art] Derive Key Pair
3,269,732 UART: [art] Store priv key in slot 0x5
3,282,605 UART: [art] Derive Key Pair - Done
3,297,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,547 UART: [art] PUB.X = 2D8C15FD258F84CFBB716E8E0F3EF0E88DCEAB7C5CD90369ECC0AD39A4D63D2E85C8DE410BC4F069599D4B4DB2824770
3,320,330 UART: [art] PUB.Y = 5688764B756018D5B29315802548AF9B87F8D16C0DA797FC977576EBF8672F66C717A7930D5D3D52D848C9A473B8BFE9
3,327,270 UART: [art] SIG.R = 628555DA17D4F23F5B2BED9A3E08DF55581FAA5ADC498147B332929E2E7ADAA738590EA3EC61A9DC5D348B20A527E160
3,334,046 UART: [art] SIG.S = 3A01052FF9573492E1E091F52EF8356FFBC7472A70AB24A61878B0FA2A21BB5C99B321E0960FFC837266350FC39F6059
3,357,818 UART: Caliptra RT
3,358,069 UART: [state] CFI Enabled
3,477,758 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,478,428 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,424 UART: [rt]cmd =0x41544d4e, len=14344
3,911,545 >>> mbox cmd response data (8 bytes)
3,911,546 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,371 UART: [rt]cmd =0x41545348, len=116
3,943,220 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,404 UART: [kat] SHA2-256
882,335 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,450 UART: [kat] ++
886,602 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
903,185 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,480 UART: [cold-reset] ++
1,476,896 UART: [fht] Storing FHT @ 0x50003400
1,479,537 UART: [idev] ++
1,479,705 UART: [idev] CDI.KEYID = 6
1,480,065 UART: [idev] SUBJECT.KEYID = 7
1,480,489 UART: [idev] UDS.KEYID = 0
1,480,834 ready_for_fw is high
1,480,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,515 UART: [idev] Erasing UDS.KEYID = 0
1,505,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,699 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,694 UART: [ldev] Erasing FE.KEYID = 1
1,546,865 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,313 UART: [ldev] --
1,586,612 UART: [fwproc] Waiting for Commands...
1,587,309 UART: [fwproc] Received command 0x46574c44
1,588,100 UART: [fwproc] Received Image of size 118548 bytes
2,932,124 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,456 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,674 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,973 >>> mbox cmd response: success
3,132,055 UART: [afmc] ++
3,132,223 UART: [afmc] CDI.KEYID = 6
3,132,585 UART: [afmc] SUBJECT.KEYID = 7
3,133,010 UART: [afmc] AUTHORITY.KEYID = 5
3,168,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,507 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,287 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,996 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,879 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,562 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,408 UART: [afmc] --
3,211,504 UART: [cold-reset] --
3,212,418 UART: [state] Locking Datavault
3,213,565 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,169 UART: [state] Locking ICCM
3,214,783 UART: [exit] Launching FMC @ 0x40000130
3,220,113 UART:
3,220,129 UART: Running Caliptra FMC ...
3,220,537 UART:
3,220,680 UART: [state] CFI Enabled
3,231,152 UART: [fht] FMC Alias Private Key: 7
3,350,454 UART: [art] Extend RT PCRs Done
3,350,882 UART: [art] Lock RT PCRs Done
3,352,284 UART: [art] Populate DV Done
3,360,453 UART: [fht] FMC Alias Private Key: 7
3,361,517 UART: [art] Derive CDI
3,361,797 UART: [art] Store in slot 0x4
3,447,567 UART: [art] Derive Key Pair
3,447,927 UART: [art] Store priv key in slot 0x5
3,461,168 UART: [art] Derive Key Pair - Done
3,476,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,378 UART: [art] PUB.X = 7DFA46159538A3F4A5553CD1EE5BC337682F574ECFDCADFF604743C512DAA81FFDD30B75E2502A223B8870A988D1D2DD
3,499,161 UART: [art] PUB.Y = 7830E5AA1913D27FD3F585B3C5AAA2CD6240AA0AF13672E6D8B38FAAA534CABBB22FFE61296486BF8B6135E4E4A7831E
3,506,126 UART: [art] SIG.R = A84847CD6131C6202EE77A5E4B6BD2363097D814FBE34DE3E34B866FE1FA26862FE51EFDE4224CBE77C9EDE835B698D4
3,512,910 UART: [art] SIG.S = 2BD3F6CFD2174C1B9C3FD3B1AE776EB6DF9E9FA21DF69221584BF32C402E39D283C0AAB13C6A3696BB942D78EBD6A91B
3,536,820 UART: Caliptra RT
3,537,163 UART: [state] CFI Enabled
3,657,903 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,573 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,605 UART: [rt]cmd =0x41544d4e, len=14344
4,091,402 >>> mbox cmd response data (8 bytes)
4,091,403 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,426 UART: [rt]cmd =0x41545348, len=116
4,122,937 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,660 ready_for_fw is high
1,362,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,995 >>> mbox cmd response: success
3,043,124 UART:
3,043,140 UART: Running Caliptra FMC ...
3,043,548 UART:
3,043,691 UART: [state] CFI Enabled
3,054,351 UART: [fht] FMC Alias Private Key: 7
3,172,803 UART: [art] Extend RT PCRs Done
3,173,231 UART: [art] Lock RT PCRs Done
3,174,701 UART: [art] Populate DV Done
3,183,214 UART: [fht] FMC Alias Private Key: 7
3,184,322 UART: [art] Derive CDI
3,184,602 UART: [art] Store in slot 0x4
3,270,458 UART: [art] Derive Key Pair
3,270,818 UART: [art] Store priv key in slot 0x5
3,283,469 UART: [art] Derive Key Pair - Done
3,297,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,021 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,786 UART: [art] PUB.X = 7CD3BA57FA89F89B4B142914051EEE7F54A962872EF9F6114A505055957DFB5416724B2F1A39EE079CC9520474422104
3,320,538 UART: [art] PUB.Y = F23599279D376C20CC072564AD9AFFD66006773DA7CF439403CD9212492138334CBA63F4BC9B618544D34C9E0DB84405
3,327,469 UART: [art] SIG.R = 3CD5B2ADFBF16A95F070F6EBFEBE674EB4E0A04CC70A87E3DC82550E2F21FCC108CFF19413023AB02C14C1CF52A08E48
3,334,251 UART: [art] SIG.S = 3E39340D5F2AA1D227C63F38DA20A0B4DA994A0D4BD7A6F61EB601884405F69EAF6BBEA82E91D387913FF8AAD69726A6
3,358,235 UART: Caliptra RT
3,358,578 UART: [state] CFI Enabled
3,479,481 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,027 UART: [rt]cmd =0x41544d4e, len=14344
3,912,654 >>> mbox cmd response data (8 bytes)
3,912,655 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,526 UART: [rt]cmd =0x41545348, len=116
3,944,307 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,704 UART: [kat] SHA2-256
901,644 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,243 UART: [kat] HMAC-384Kdf
920,735 UART: [kat] LMS
1,169,047 UART: [kat] --
1,169,954 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,240 UART: [idev] ++
1,173,408 UART: [idev] CDI.KEYID = 6
1,173,769 UART: [idev] SUBJECT.KEYID = 7
1,174,194 UART: [idev] UDS.KEYID = 0
1,174,540 ready_for_fw is high
1,174,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,277 UART: [idev] Erasing UDS.KEYID = 0
1,199,691 UART: [idev] Sha1 KeyId Algorithm
1,208,515 UART: [idev] --
1,209,466 UART: [ldev] ++
1,209,634 UART: [ldev] CDI.KEYID = 6
1,209,998 UART: [ldev] SUBJECT.KEYID = 5
1,210,425 UART: [ldev] AUTHORITY.KEYID = 7
1,210,888 UART: [ldev] FE.KEYID = 1
1,215,940 UART: [ldev] Erasing FE.KEYID = 1
1,241,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,281,101 UART: [fwproc] Wait for Commands...
1,281,882 UART: [fwproc] Recv command 0x46574c44
1,282,615 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,764 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,991 >>> mbox cmd response: success
2,827,105 UART: [afmc] ++
2,827,273 UART: [afmc] CDI.KEYID = 6
2,827,636 UART: [afmc] SUBJECT.KEYID = 7
2,828,062 UART: [afmc] AUTHORITY.KEYID = 5
2,863,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,801 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,093 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,092 UART: [afmc] --
2,907,031 UART: [cold-reset] --
2,907,711 UART: [state] Locking Datavault
2,908,880 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,484 UART: [state] Locking ICCM
2,909,992 UART: [exit] Launching FMC @ 0x40000130
2,915,322 UART:
2,915,338 UART: Running Caliptra FMC ...
2,915,746 UART:
2,915,800 UART: [state] CFI Enabled
2,926,066 UART: [fht] FMC Alias Private Key: 7
3,044,702 UART: [art] Extend RT PCRs Done
3,045,130 UART: [art] Lock RT PCRs Done
3,046,740 UART: [art] Populate DV Done
3,055,025 UART: [fht] FMC Alias Private Key: 7
3,056,169 UART: [art] Derive CDI
3,056,449 UART: [art] Store in slot 0x4
3,141,780 UART: [art] Derive Key Pair
3,142,140 UART: [art] Store priv key in slot 0x5
3,155,002 UART: [art] Derive Key Pair - Done
3,169,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,996 UART: [art] PUB.X = 2CC8DF2C5D57770CE5EEFC8D0A168464DF075BFCD8568C8F9ED06D89DEB627AAED7B8C394D86AA3922EC80EDA7768EF1
3,192,783 UART: [art] PUB.Y = D7B1C30108763687859F7426618F2833E406F92B8EF8112F3A763296C71401EFE258F7132C8E4CC1E52291F325BC4ADA
3,199,715 UART: [art] SIG.R = E5463FB9277D9ACFFD6FD485995A89FF3C10F10E3D409F959C43085CC55F370B8FFD1B7096471CA85931C17FA81F91EB
3,206,486 UART: [art] SIG.S = 70DC98B0F86A78D5D2EB37CA73E548B398AC9ACD29468705A9407C0CDD8991D96D500767A3F71370134332F058A0AE09
3,230,362 UART: Caliptra RT
3,230,613 UART: [state] CFI Enabled
3,350,778 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,448 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,574 UART: [rt]cmd =0x41544d4e, len=14344
3,784,441 >>> mbox cmd response data (8 bytes)
3,784,442 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,651 UART: [rt]cmd =0x41545348, len=116
3,816,178 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,046 ready_for_fw is high
1,059,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,456 >>> mbox cmd response: success
2,741,553 UART:
2,741,569 UART: Running Caliptra FMC ...
2,741,977 UART:
2,742,031 UART: [state] CFI Enabled
2,752,201 UART: [fht] FMC Alias Private Key: 7
2,871,377 UART: [art] Extend RT PCRs Done
2,871,805 UART: [art] Lock RT PCRs Done
2,873,395 UART: [art] Populate DV Done
2,881,236 UART: [fht] FMC Alias Private Key: 7
2,882,208 UART: [art] Derive CDI
2,882,488 UART: [art] Store in slot 0x4
2,968,091 UART: [art] Derive Key Pair
2,968,451 UART: [art] Store priv key in slot 0x5
2,981,543 UART: [art] Derive Key Pair - Done
2,996,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,906 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,671 UART: [art] PUB.X = A599728660A1F71338E430D94F87DB7A22AAFD3C707A689CC3F179567DF23B15FE878DF4E834C63FFEBC51A7A137E8A0
3,019,451 UART: [art] PUB.Y = C6AC02721046F0CDCA3118106EACB851187A685575F6AB8D31BCD7D133C5F77215C1CCEC0EB45A4C2A189368084CAB7B
3,026,404 UART: [art] SIG.R = F6405238E6BAEF1986B0D62EB860149F8522B5593D29049EBD1BDDFE7C593E545EE8050AC9322A07E7FDD5CAE5EED1A2
3,033,178 UART: [art] SIG.S = 26148A1AA2EB673411442FD448FAD8CB3E688E5C658A9D3AA931431E11D68D2713AD8B758D8ACD16576AE6F9637452A3
3,056,636 UART: Caliptra RT
3,056,887 UART: [state] CFI Enabled
3,176,946 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,616 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,514 UART: [rt]cmd =0x41544d4e, len=14344
3,610,477 >>> mbox cmd response data (8 bytes)
3,610,478 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,507 UART: [rt]cmd =0x41545348, len=116
3,642,328 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
891,395 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,499 UART: [kat] ++
895,651 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,622 UART: [kat] SHA2-512-ACC
906,523 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
920,950 UART: [kat] LMS
1,169,262 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,703 UART: [fht] FHT @ 0x50003400
1,173,377 UART: [idev] ++
1,173,545 UART: [idev] CDI.KEYID = 6
1,173,906 UART: [idev] SUBJECT.KEYID = 7
1,174,331 UART: [idev] UDS.KEYID = 0
1,174,677 ready_for_fw is high
1,174,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,014 UART: [idev] Sha1 KeyId Algorithm
1,207,832 UART: [idev] --
1,208,879 UART: [ldev] ++
1,209,047 UART: [ldev] CDI.KEYID = 6
1,209,411 UART: [ldev] SUBJECT.KEYID = 5
1,209,838 UART: [ldev] AUTHORITY.KEYID = 7
1,210,301 UART: [ldev] FE.KEYID = 1
1,215,717 UART: [ldev] Erasing FE.KEYID = 1
1,242,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,877 UART: [ldev] --
1,281,108 UART: [fwproc] Wait for Commands...
1,281,759 UART: [fwproc] Recv command 0x46574c44
1,282,492 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,102 >>> mbox cmd response: success
2,825,236 UART: [afmc] ++
2,825,404 UART: [afmc] CDI.KEYID = 6
2,825,767 UART: [afmc] SUBJECT.KEYID = 7
2,826,193 UART: [afmc] AUTHORITY.KEYID = 5
2,861,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,316 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,026 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,907 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,608 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,165 UART: [afmc] --
2,905,128 UART: [cold-reset] --
2,905,852 UART: [state] Locking Datavault
2,907,179 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,783 UART: [state] Locking ICCM
2,908,235 UART: [exit] Launching FMC @ 0x40000130
2,913,565 UART:
2,913,581 UART: Running Caliptra FMC ...
2,913,989 UART:
2,914,132 UART: [state] CFI Enabled
2,924,966 UART: [fht] FMC Alias Private Key: 7
3,044,064 UART: [art] Extend RT PCRs Done
3,044,492 UART: [art] Lock RT PCRs Done
3,046,172 UART: [art] Populate DV Done
3,054,325 UART: [fht] FMC Alias Private Key: 7
3,055,389 UART: [art] Derive CDI
3,055,669 UART: [art] Store in slot 0x4
3,141,480 UART: [art] Derive Key Pair
3,141,840 UART: [art] Store priv key in slot 0x5
3,155,094 UART: [art] Derive Key Pair - Done
3,169,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,003 UART: [art] PUB.X = E07FB39769EE5D7D65B472ECE11D63DF65D4A6CDB2BF92B6569927C35CDCD4C055CC65D14DCB4DDD0DE8D83EBE4EAFEB
3,192,804 UART: [art] PUB.Y = E2802E80FE3824914B6585B54D46CC8BC0FDBECAB54FF2474E296CF09DBE17E48A046A2EEE2EE2D29F1D57A9601CD10C
3,199,768 UART: [art] SIG.R = FC1163C7D98E4829855ED09126E67DB34D5CA607C337BA0B27CA26DA55C93DED4AD6A948B1960607DCEB2E970E909F62
3,206,533 UART: [art] SIG.S = F6C6C7580F1A540F1CC2D130873DFF21FA49CC7549A458B3235AC033FAE20D1E90D9D1FC5998CB7ACAE5F2BDF446E965
3,230,992 UART: Caliptra RT
3,231,335 UART: [state] CFI Enabled
3,350,357 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,027 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,265 UART: [rt]cmd =0x41544d4e, len=14344
3,783,804 >>> mbox cmd response data (8 bytes)
3,783,805 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,132 UART: [rt]cmd =0x41545348, len=116
3,815,889 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 ready_for_fw is high
1,059,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,627 >>> mbox cmd response: success
2,741,506 UART:
2,741,522 UART: Running Caliptra FMC ...
2,741,930 UART:
2,742,073 UART: [state] CFI Enabled
2,752,785 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,873,961 UART: [art] Populate DV Done
2,882,080 UART: [fht] FMC Alias Private Key: 7
2,883,124 UART: [art] Derive CDI
2,883,404 UART: [art] Store in slot 0x4
2,969,069 UART: [art] Derive Key Pair
2,969,429 UART: [art] Store priv key in slot 0x5
2,982,683 UART: [art] Derive Key Pair - Done
2,997,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,386 UART: [art] PUB.X = 3B083FA031F12745C2D4B997783422EF966216E587DA9C0470896CFD951A29FBEBF33CD7BA185964FE305280B8EDB5A8
3,020,154 UART: [art] PUB.Y = D67992AF4966A8571EB9D34BF50167A571511731F7ABDEA0FD34ED6FC5CAE9A078AF6A202E0F3DA5B12E7C7341A57FA3
3,027,114 UART: [art] SIG.R = 28053D75DA7C364300238729B35B38B16BED178C57A53570BAB5059A54B8A55B3BE5FC25AFB835FB0067402495E60198
3,033,827 UART: [art] SIG.S = 2217186E8056790B27145F1FC2B0557556D1EB1F1F7288DDBC6AC77B108007D03EEB93B053BB5B62615E1AC0C8F4404C
3,057,339 UART: Caliptra RT
3,057,682 UART: [state] CFI Enabled
3,177,376 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,046 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,948 UART: [rt]cmd =0x41544d4e, len=14344
3,610,553 >>> mbox cmd response data (8 bytes)
3,610,554 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,825 UART: [rt]cmd =0x41545348, len=116
3,642,556 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,758 UART: [state] LifecycleState = Unprovisioned
85,413 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,098 UART: [kat] SHA2-256
892,748 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,873 UART: [kat] ++
897,025 UART: [kat] sha1
901,295 UART: [kat] SHA2-256
903,235 UART: [kat] SHA2-384
905,948 UART: [kat] SHA2-512-ACC
907,849 UART: [kat] ECC-384
917,530 UART: [kat] HMAC-384Kdf
921,962 UART: [kat] LMS
1,170,290 UART: [kat] --
1,170,797 UART: [cold-reset] ++
1,171,227 UART: [fht] FHT @ 0x50003400
1,173,686 UART: [idev] ++
1,173,854 UART: [idev] CDI.KEYID = 6
1,174,214 UART: [idev] SUBJECT.KEYID = 7
1,174,638 UART: [idev] UDS.KEYID = 0
1,174,983 ready_for_fw is high
1,174,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,200 UART: [idev] Erasing UDS.KEYID = 0
1,198,441 UART: [idev] Sha1 KeyId Algorithm
1,206,967 UART: [idev] --
1,207,915 UART: [ldev] ++
1,208,083 UART: [ldev] CDI.KEYID = 6
1,208,446 UART: [ldev] SUBJECT.KEYID = 5
1,208,872 UART: [ldev] AUTHORITY.KEYID = 7
1,209,335 UART: [ldev] FE.KEYID = 1
1,214,601 UART: [ldev] Erasing FE.KEYID = 1
1,241,052 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,315 UART: [ldev] --
1,280,652 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,241 >>> mbox cmd response: success
2,825,439 UART: [afmc] ++
2,825,607 UART: [afmc] CDI.KEYID = 6
2,825,969 UART: [afmc] SUBJECT.KEYID = 7
2,826,394 UART: [afmc] AUTHORITY.KEYID = 5
2,861,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,922 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,670 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,262 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,745 UART: [afmc] --
2,904,771 UART: [cold-reset] --
2,905,563 UART: [state] Locking Datavault
2,906,944 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,548 UART: [state] Locking ICCM
2,908,202 UART: [exit] Launching FMC @ 0x40000130
2,913,532 UART:
2,913,548 UART: Running Caliptra FMC ...
2,913,956 UART:
2,914,010 UART: [state] CFI Enabled
2,924,268 UART: [fht] FMC Alias Private Key: 7
3,043,172 UART: [art] Extend RT PCRs Done
3,043,600 UART: [art] Lock RT PCRs Done
3,045,232 UART: [art] Populate DV Done
3,053,267 UART: [fht] FMC Alias Private Key: 7
3,054,315 UART: [art] Derive CDI
3,054,595 UART: [art] Store in slot 0x4
3,140,492 UART: [art] Derive Key Pair
3,140,852 UART: [art] Store priv key in slot 0x5
3,154,326 UART: [art] Derive Key Pair - Done
3,169,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,461 UART: [art] PUB.X = 8357074C88100469C2D5AC9463D87EDC4A204BDF2CF41540D35DD87780CB83206D5AE194BE6A37269BD0BE67E2284A3D
3,192,229 UART: [art] PUB.Y = 59722806A6AE943138598F5F84BB0C93BDE36E820FAE41A12EFE21C7FBA1BDAFF6C3FA5A789C82C1CB05D961F167A76E
3,199,185 UART: [art] SIG.R = 6AC2ACFCCA609D30D6577845AB19E7BEB767EC0B20F092FB7FA8ED6AB4DAE7E6973C487C0EDC8720D508AE6CE758431A
3,205,970 UART: [art] SIG.S = DA5FC86C2E552C586118903F966DB14AA1D06AA6081641FD536780802EB40486A69E0AF0EC44578C330FCD23CEEB71BE
3,229,834 UART: Caliptra RT
3,230,085 UART: [state] CFI Enabled
3,348,834 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,349,504 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,524 UART: [rt]cmd =0x41544d4e, len=14344
3,782,385 >>> mbox cmd response data (8 bytes)
3,782,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,297 UART: [rt]cmd =0x41545348, len=116
3,814,078 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 ready_for_fw is high
1,059,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,600 >>> mbox cmd response: success
2,741,333 UART:
2,741,349 UART: Running Caliptra FMC ...
2,741,757 UART:
2,741,811 UART: [state] CFI Enabled
2,752,357 UART: [fht] FMC Alias Private Key: 7
2,870,835 UART: [art] Extend RT PCRs Done
2,871,263 UART: [art] Lock RT PCRs Done
2,873,073 UART: [art] Populate DV Done
2,881,056 UART: [fht] FMC Alias Private Key: 7
2,882,144 UART: [art] Derive CDI
2,882,424 UART: [art] Store in slot 0x4
2,968,041 UART: [art] Derive Key Pair
2,968,401 UART: [art] Store priv key in slot 0x5
2,981,443 UART: [art] Derive Key Pair - Done
2,995,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,198 UART: [art] PUB.X = 440EF17E16A32B8E05E89F54105D71BACFDD1799B1E8121B848D15A9B19BFDEE6B371272F7649E4D8BF89B39B49EA1D9
3,018,974 UART: [art] PUB.Y = B1676C40D260AD50EC9981036CB9E092DB34EAE2276F421BC86A931F437018B418EA228C4A55D39B89EC3F91381E7FD5
3,025,925 UART: [art] SIG.R = DAAF69F290570F4A3C689B6B696B16AD4C1012460A18AFC8C530F3A13421598A69E42F5EE300C0A60602DBF72E509380
3,032,663 UART: [art] SIG.S = DFFD001F7B7B56FDFACAA1BED45A3D44BA5925223E8BCA84B713B5F4687EE6E10CABAA6C53B6406C1ECB42ACB69BDA64
3,056,798 UART: Caliptra RT
3,057,049 UART: [state] CFI Enabled
3,175,687 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,357 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,605 UART: [rt]cmd =0x41544d4e, len=14344
3,608,822 >>> mbox cmd response data (8 bytes)
3,608,823 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,884 UART: [rt]cmd =0x41545348, len=116
3,640,783 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,392 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,728 UART: [kat] SHA2-256
903,668 UART: [kat] SHA2-384
906,373 UART: [kat] SHA2-512-ACC
908,274 UART: [kat] ECC-384
918,319 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,186 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,333 UART: [idev] ++
1,175,501 UART: [idev] CDI.KEYID = 6
1,175,861 UART: [idev] SUBJECT.KEYID = 7
1,176,285 UART: [idev] UDS.KEYID = 0
1,176,630 ready_for_fw is high
1,176,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,403 UART: [idev] Erasing UDS.KEYID = 0
1,201,868 UART: [idev] Sha1 KeyId Algorithm
1,210,406 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,050 UART: [ldev] Erasing FE.KEYID = 1
1,244,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,020 UART: [ldev] --
1,283,495 UART: [fwproc] Wait for Commands...
1,284,305 UART: [fwproc] Recv command 0x46574c44
1,285,033 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,634 >>> mbox cmd response: success
2,829,714 UART: [afmc] ++
2,829,882 UART: [afmc] CDI.KEYID = 6
2,830,244 UART: [afmc] SUBJECT.KEYID = 7
2,830,669 UART: [afmc] AUTHORITY.KEYID = 5
2,866,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,071 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,819 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,411 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,112 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,848 UART: [afmc] --
2,909,780 UART: [cold-reset] --
2,910,558 UART: [state] Locking Datavault
2,911,781 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,385 UART: [state] Locking ICCM
2,913,025 UART: [exit] Launching FMC @ 0x40000130
2,918,355 UART:
2,918,371 UART: Running Caliptra FMC ...
2,918,779 UART:
2,918,922 UART: [state] CFI Enabled
2,929,498 UART: [fht] FMC Alias Private Key: 7
3,049,016 UART: [art] Extend RT PCRs Done
3,049,444 UART: [art] Lock RT PCRs Done
3,051,080 UART: [art] Populate DV Done
3,059,339 UART: [fht] FMC Alias Private Key: 7
3,060,501 UART: [art] Derive CDI
3,060,781 UART: [art] Store in slot 0x4
3,146,436 UART: [art] Derive Key Pair
3,146,796 UART: [art] Store priv key in slot 0x5
3,160,548 UART: [art] Derive Key Pair - Done
3,175,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,333 UART: [art] PUB.X = 535F46D77F5BF722245AED2CFF2ABD325B941EEC188082538A9B9E4C72BA1AA65FB8089B7FE2146237BA04A88041ECCC
3,198,111 UART: [art] PUB.Y = C564822BF7B7ECF75F11653A3F59949A0F1C545540E006DED2C84E92DB1DB2562447299ED1BD7176D8820AE8C18F7C0B
3,205,055 UART: [art] SIG.R = 12BE6DAB469948C012AC5B505C83AD150AC8FAF9E92D598A1F89E5D210438004017BE3D4DA1816455DEB06E2B106AC3F
3,211,820 UART: [art] SIG.S = 610C5D2BC22A0013FBAE9366ECBB7CD95B8371E90A15D4BF422F879D600C558BE22C50C1E8FB3CC12DE7068BF2F9BA85
3,235,310 UART: Caliptra RT
3,235,653 UART: [state] CFI Enabled
3,355,381 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,356,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,969 UART: [rt]cmd =0x41544d4e, len=14344
3,789,048 >>> mbox cmd response data (8 bytes)
3,789,049 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,168 UART: [rt]cmd =0x41545348, len=116
3,820,829 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,216 ready_for_fw is high
1,061,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,971 >>> mbox cmd response: success
2,741,610 UART:
2,741,626 UART: Running Caliptra FMC ...
2,742,034 UART:
2,742,177 UART: [state] CFI Enabled
2,753,367 UART: [fht] FMC Alias Private Key: 7
2,872,335 UART: [art] Extend RT PCRs Done
2,872,763 UART: [art] Lock RT PCRs Done
2,873,933 UART: [art] Populate DV Done
2,882,298 UART: [fht] FMC Alias Private Key: 7
2,883,408 UART: [art] Derive CDI
2,883,688 UART: [art] Store in slot 0x4
2,969,359 UART: [art] Derive Key Pair
2,969,719 UART: [art] Store priv key in slot 0x5
2,982,883 UART: [art] Derive Key Pair - Done
2,997,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,711 UART: [art] PUB.X = 1DADEDC53FA7E6E5F326E5E6C9DB8DF0F465BA698B6E7EBFDA89CE5D7698F855C6558C781F47C90C8EDAD92069659F37
3,020,500 UART: [art] PUB.Y = CC0AE500984D3675DBF162C38E83B8059D36D53135CBE03306AC6B452575663919750C006F02B8ADA71B333EF76CE2E9
3,027,391 UART: [art] SIG.R = ECC736B41C127B381526FEA0E8281617E4756CC960A7EB32CD41BE977C26BD823F5C4169F48708D9631576F30281A94F
3,034,153 UART: [art] SIG.S = E14D1516CD3F520EDF8571AF40769F093EDB67206D350753D1ECBD19191E3CB967B39F645D17DC7A5E5DB07E5BFC6553
3,057,836 UART: Caliptra RT
3,058,179 UART: [state] CFI Enabled
3,177,511 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,543 UART: [rt]cmd =0x41544d4e, len=14344
3,611,730 >>> mbox cmd response data (8 bytes)
3,611,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,696 UART: [rt]cmd =0x41545348, len=116
3,643,353 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_authorization_wrong_id_no_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
191,968 UART:
192,336 UART: Running Caliptra ROM ...
193,523 UART:
193,680 UART: [state] CFI Enabled
264,817 UART: [state] LifecycleState = Unprovisioned
266,740 UART: [state] DebugLocked = No
269,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,844 UART: [kat] SHA2-256
444,502 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,019 UART: [kat] ++
455,520 UART: [kat] sha1
465,490 UART: [kat] SHA2-256
468,144 UART: [kat] SHA2-384
473,572 UART: [kat] SHA2-512-ACC
475,941 UART: [kat] ECC-384
2,768,053 UART: [kat] HMAC-384Kdf
2,780,298 UART: [kat] LMS
3,970,606 UART: [kat] --
3,975,902 UART: [cold-reset] ++
3,977,546 UART: [fht] Storing FHT @ 0x50003400
3,990,157 UART: [idev] ++
3,990,721 UART: [idev] CDI.KEYID = 6
3,991,633 UART: [idev] SUBJECT.KEYID = 7
3,992,874 UART: [idev] UDS.KEYID = 0
3,993,882 ready_for_fw is high
3,994,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,304 UART: [idev] Erasing UDS.KEYID = 0
7,326,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,755 UART: [idev] --
7,354,418 UART: [ldev] ++
7,354,985 UART: [ldev] CDI.KEYID = 6
7,355,951 UART: [ldev] SUBJECT.KEYID = 5
7,357,164 UART: [ldev] AUTHORITY.KEYID = 7
7,358,454 UART: [ldev] FE.KEYID = 1
7,404,754 UART: [ldev] Erasing FE.KEYID = 1
10,739,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,024 UART: [ldev] --
13,120,597 UART: [fwproc] Waiting for Commands...
13,123,940 UART: [fwproc] Received command 0x46574c44
13,126,143 UART: [fwproc] Received Image of size 118548 bytes
17,230,383 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,176 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,345 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,189 >>> mbox cmd response: success
17,711,885 UART: [afmc] ++
17,712,495 UART: [afmc] CDI.KEYID = 6
17,713,409 UART: [afmc] SUBJECT.KEYID = 7
17,714,630 UART: [afmc] AUTHORITY.KEYID = 5
21,076,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,375,826 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,378,116 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,392,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,407,261 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,421,668 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,808 UART: [afmc] --
23,446,519 UART: [cold-reset] --
23,448,705 UART: [state] Locking Datavault
23,455,086 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,794 UART: [state] Locking ICCM
23,459,125 UART: [exit] Launching FMC @ 0x40000130
23,467,513 UART:
23,467,757 UART: Running Caliptra FMC ...
23,468,858 UART:
23,469,022 UART: [state] CFI Enabled
23,538,584 UART: [fht] FMC Alias Private Key: 7
25,879,115 UART: [art] Extend RT PCRs Done
25,880,340 UART: [art] Lock RT PCRs Done
25,882,149 UART: [art] Populate DV Done
25,887,391 UART: [fht] FMC Alias Private Key: 7
25,888,882 UART: [art] Derive CDI
25,889,643 UART: [art] Store in slot 0x4
25,949,025 UART: [art] Derive Key Pair
25,950,063 UART: [art] Store priv key in slot 0x5
29,243,028 UART: [art] Derive Key Pair - Done
29,256,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,551 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,062 UART: [art] PUB.X = 99648861428F3674827EE477FC468B9138C0F53732DEA7ABD4A4CFF808EDCFCDF8452C3117D3A4FBC806E62E0655307B
31,553,377 UART: [art] PUB.Y = DE64EEB419D678258A40B04A8CE2B29B9BC528BC5560FF00BE7FAE1E1DD1DDB83993312699659C8DAEA64F3A9127BDFF
31,560,607 UART: [art] SIG.R = 9BC718408B22E03748D0523C906984CF9987D02F5E8627CDEAF0BE5A4F234EE5D97B8AC168ADA3994852535FCDA12132
31,567,992 UART: [art] SIG.S = 0D30BDF81076DE3E4DB1BF645845EBF438B194C89B9B2EF7AE359D97D073CABBD8FD265AAEE1F9A85ABAA9B76300C582
32,873,318 UART: Caliptra RT
32,874,030 UART: [state] CFI Enabled
33,049,587 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,121,874 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,277,569 UART: [rt]cmd =0x41544d4e, len=14344
42,578,046 >>> mbox cmd response data (8 bytes)
42,578,828 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,609,567 UART: [rt]cmd =0x41545348, len=116
42,629,722 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,156 UART:
192,512 UART: Running Caliptra ROM ...
193,681 UART:
193,837 UART: [state] CFI Enabled
264,706 UART: [state] LifecycleState = Unprovisioned
266,687 UART: [state] DebugLocked = No
268,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,523 UART: [kat] SHA2-256
443,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,699 UART: [kat] ++
454,191 UART: [kat] sha1
464,641 UART: [kat] SHA2-256
467,370 UART: [kat] SHA2-384
473,001 UART: [kat] SHA2-512-ACC
475,375 UART: [kat] ECC-384
2,768,531 UART: [kat] HMAC-384Kdf
2,799,478 UART: [kat] LMS
3,989,766 UART: [kat] --
3,993,630 UART: [cold-reset] ++
3,995,632 UART: [fht] Storing FHT @ 0x50003400
4,006,327 UART: [idev] ++
4,006,906 UART: [idev] CDI.KEYID = 6
4,007,821 UART: [idev] SUBJECT.KEYID = 7
4,009,072 UART: [idev] UDS.KEYID = 0
4,010,148 ready_for_fw is high
4,010,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,438 UART: [idev] Erasing UDS.KEYID = 0
7,347,388 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,812 UART: [idev] --
7,373,023 UART: [ldev] ++
7,373,597 UART: [ldev] CDI.KEYID = 6
7,374,613 UART: [ldev] SUBJECT.KEYID = 5
7,375,790 UART: [ldev] AUTHORITY.KEYID = 7
7,377,023 UART: [ldev] FE.KEYID = 1
7,422,886 UART: [ldev] Erasing FE.KEYID = 1
10,755,977 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,676 UART: [ldev] --
13,137,289 UART: [fwproc] Waiting for Commands...
13,139,487 UART: [fwproc] Received command 0x46574c44
13,141,666 UART: [fwproc] Received Image of size 118548 bytes
17,246,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,207 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,369 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,724,664 >>> mbox cmd response: success
17,729,260 UART: [afmc] ++
17,729,915 UART: [afmc] CDI.KEYID = 6
17,730,807 UART: [afmc] SUBJECT.KEYID = 7
17,732,024 UART: [afmc] AUTHORITY.KEYID = 5
21,089,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,026 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,445 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,664 UART: [afmc] --
23,461,913 UART: [cold-reset] --
23,466,068 UART: [state] Locking Datavault
23,472,792 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,550 UART: [state] Locking ICCM
23,476,326 UART: [exit] Launching FMC @ 0x40000130
23,484,719 UART:
23,484,954 UART: Running Caliptra FMC ...
23,486,053 UART:
23,486,220 UART: [state] CFI Enabled
23,548,794 UART: [fht] FMC Alias Private Key: 7
25,889,036 UART: [art] Extend RT PCRs Done
25,890,270 UART: [art] Lock RT PCRs Done
25,892,241 UART: [art] Populate DV Done
25,897,759 UART: [fht] FMC Alias Private Key: 7
25,899,457 UART: [art] Derive CDI
25,900,194 UART: [art] Store in slot 0x4
25,957,608 UART: [art] Derive Key Pair
25,958,626 UART: [art] Store priv key in slot 0x5
29,251,606 UART: [art] Derive Key Pair - Done
29,264,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,017 UART: [art] PUB.X = 15FA9F321E5A9079594D1FC949B31DD7B5B707D7C02FE970438EB5F556A1F91952277324F797EE620D6DB5E417BDA77F
31,562,268 UART: [art] PUB.Y = 98040A1AF5454A94FBD2672C05C202FED868354AB051B7DA3CE55905BDE5AE256AD4DC97B59D25F778F4F6C44764D694
31,569,520 UART: [art] SIG.R = 2C206310FEC2CDC16667C95135D52DF7B00F55BE988623984F69011C9B726EAD039B829173B2874E7038B66143D6C475
31,576,863 UART: [art] SIG.S = 412818C436978980D898513D44F7954755EEC353D6D4D30E150C80272277B9D5B829AFC9D28F45CCE8150CAFBC3A7E77
32,881,734 UART: Caliptra RT
32,882,446 UART: [state] CFI Enabled
33,060,270 UART: [rt] RT listening for mailbox commands...
33,063,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,218,461 UART: [rt]cmd =0x41544d4e, len=14344
38,519,224 >>> mbox cmd response data (8 bytes)
38,519,830 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,550,451 UART: [rt]cmd =0x41545348, len=116
38,552,594 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,803,614 ready_for_fw is high
3,803,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,887 >>> mbox cmd response: success
23,646,523 UART:
23,646,926 UART: Running Caliptra FMC ...
23,648,050 UART:
23,648,215 UART: [state] CFI Enabled
23,698,318 UART: [fht] FMC Alias Private Key: 7
26,038,785 UART: [art] Extend RT PCRs Done
26,040,012 UART: [art] Lock RT PCRs Done
26,042,136 UART: [art] Populate DV Done
26,047,621 UART: [fht] FMC Alias Private Key: 7
26,049,328 UART: [art] Derive CDI
26,050,147 UART: [art] Store in slot 0x4
26,105,795 UART: [art] Derive Key Pair
26,106,841 UART: [art] Store priv key in slot 0x5
29,399,764 UART: [art] Derive Key Pair - Done
29,412,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,198 UART: [art] Erasing AUTHORITY.KEYID = 7
31,702,724 UART: [art] PUB.X = 0FD80022403DDA88A7AF43DA6D1C9266479159BE57E9A3D8CD2689706E1CA8D2A0C6975E2769BF67A0FF3FC4CEF2BC54
31,709,979 UART: [art] PUB.Y = A1A38E4E1144525ED2C22CAE7C766853710E4EB5AD81DAC6E0CAC29CD6D0C36C1911DDA831E2E2153466EBC5FAF95946
31,717,226 UART: [art] SIG.R = 3B921E82C085C1B1AD64C480E41B75A81DC881E583116E223D31D10310BD48DDA9692655330D463ED51C02ECEF682118
31,724,628 UART: [art] SIG.S = DF4ACF95DF502DB06F950E151FF3F388DF67B1AF879B6B43DC76D44157DEC2298CEB1C51FB5C2D2213FE32C73BF11CDE
33,029,807 UART: Caliptra RT
33,030,514 UART: [state] CFI Enabled
33,207,191 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,283,548 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,439,293 UART: [rt]cmd =0x41544d4e, len=14344
42,739,895 >>> mbox cmd response data (8 bytes)
42,740,584 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,771,282 UART: [rt]cmd =0x41545348, len=116
42,791,232 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,803,311 ready_for_fw is high
3,803,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,445 >>> mbox cmd response: success
23,646,520 UART:
23,646,936 UART: Running Caliptra FMC ...
23,648,057 UART:
23,648,218 UART: [state] CFI Enabled
23,719,106 UART: [fht] FMC Alias Private Key: 7
26,059,536 UART: [art] Extend RT PCRs Done
26,060,775 UART: [art] Lock RT PCRs Done
26,062,433 UART: [art] Populate DV Done
26,067,985 UART: [fht] FMC Alias Private Key: 7
26,069,583 UART: [art] Derive CDI
26,070,329 UART: [art] Store in slot 0x4
26,128,299 UART: [art] Derive Key Pair
26,129,365 UART: [art] Store priv key in slot 0x5
29,422,570 UART: [art] Derive Key Pair - Done
29,435,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,963 UART: [art] PUB.X = AFE28A2651AC86F6381A0CFF5F3A0A6660FEAB989BCB0CE32568ACA0C4DF458B2EF11047B6DF55AA47FC04BA1B9F306C
31,733,213 UART: [art] PUB.Y = 6E66D43A6CC404A00331E5868FBA4A709443F4439562E45791F08B810AAB1320709516EE41F138895EDF7D0E7B0F3872
31,740,464 UART: [art] SIG.R = C78805A27CE841A267DD3D6289C6DC773F63E71D25A9F4CF67DE10AA3ADE5D93A55D5CBD2D71CA6D5DC6F78387DDC6B1
31,747,862 UART: [art] SIG.S = 72AAE3571D235CAF2BEA67C1ABAF83CFFA1C9DA71AEEAA3DEAA17F5A70DBBC8AE2C687EF30B444FC6D5570ED32F91E45
33,053,297 UART: Caliptra RT
33,054,020 UART: [state] CFI Enabled
33,230,215 UART: [rt] RT listening for mailbox commands...
33,232,604 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,387,733 UART: [rt]cmd =0x41544d4e, len=14344
38,688,933 >>> mbox cmd response data (8 bytes)
38,689,518 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,720,142 UART: [rt]cmd =0x41545348, len=116
38,722,322 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,449 UART:
192,814 UART: Running Caliptra ROM ...
193,944 UART:
603,721 UART: [state] CFI Enabled
619,368 UART: [state] LifecycleState = Unprovisioned
621,305 UART: [state] DebugLocked = No
623,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,818 UART: [kat] SHA2-256
798,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,069 UART: [kat] ++
809,523 UART: [kat] sha1
820,246 UART: [kat] SHA2-256
822,963 UART: [kat] SHA2-384
827,738 UART: [kat] SHA2-512-ACC
830,109 UART: [kat] ECC-384
3,115,089 UART: [kat] HMAC-384Kdf
3,127,132 UART: [kat] LMS
4,317,187 UART: [kat] --
4,320,084 UART: [cold-reset] ++
4,321,527 UART: [fht] Storing FHT @ 0x50003400
4,333,708 UART: [idev] ++
4,334,342 UART: [idev] CDI.KEYID = 6
4,335,248 UART: [idev] SUBJECT.KEYID = 7
4,336,485 UART: [idev] UDS.KEYID = 0
4,337,547 ready_for_fw is high
4,337,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,683 UART: [idev] Erasing UDS.KEYID = 0
7,618,429 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,676 UART: [idev] --
7,642,925 UART: [ldev] ++
7,643,533 UART: [ldev] CDI.KEYID = 6
7,644,503 UART: [ldev] SUBJECT.KEYID = 5
7,645,732 UART: [ldev] AUTHORITY.KEYID = 7
7,646,964 UART: [ldev] FE.KEYID = 1
7,658,353 UART: [ldev] Erasing FE.KEYID = 1
10,948,039 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,504 UART: [ldev] --
13,307,921 UART: [fwproc] Waiting for Commands...
13,310,766 UART: [fwproc] Received command 0x46574c44
13,312,995 UART: [fwproc] Received Image of size 118548 bytes
17,417,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,066 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,743 >>> mbox cmd response: success
17,903,272 UART: [afmc] ++
17,903,889 UART: [afmc] CDI.KEYID = 6
17,904,802 UART: [afmc] SUBJECT.KEYID = 7
17,906,015 UART: [afmc] AUTHORITY.KEYID = 5
21,224,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,005 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,679 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,401 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,835 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,575 UART: [afmc] --
23,590,547 UART: [cold-reset] --
23,595,863 UART: [state] Locking Datavault
23,599,109 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,857 UART: [state] Locking ICCM
23,603,483 UART: [exit] Launching FMC @ 0x40000130
23,611,895 UART:
23,612,128 UART: Running Caliptra FMC ...
23,613,223 UART:
23,613,376 UART: [state] CFI Enabled
23,621,448 UART: [fht] FMC Alias Private Key: 7
25,961,645 UART: [art] Extend RT PCRs Done
25,962,879 UART: [art] Lock RT PCRs Done
25,964,775 UART: [art] Populate DV Done
25,970,129 UART: [fht] FMC Alias Private Key: 7
25,971,828 UART: [art] Derive CDI
25,972,637 UART: [art] Store in slot 0x4
26,015,008 UART: [art] Derive Key Pair
26,016,008 UART: [art] Store priv key in slot 0x5
29,258,414 UART: [art] Derive Key Pair - Done
29,271,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,665 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,181 UART: [art] PUB.X = 7C1DA0166A27BB8A0CF52C7615F1E5EAC493A4C5BA05072E75ADD3382F4B71492ACAEC749049908681DCB65FD38E7985
31,560,419 UART: [art] PUB.Y = 505FDF0F7307266196BD69DC12C58ED33BD60B05C5FAEEF474C78EC797AE956A9CF225B791C43465A26FF7F4244ABA9C
31,567,680 UART: [art] SIG.R = 5200A2C1CA22A7C369B87E93FF70E95FD98CE51393AC4A79F64627200230680D3540FFEEACEE03C8DF15D3EAF30A7267
31,575,085 UART: [art] SIG.S = 5EE02651FCFD27C8F7F837E3FD3723DDC4CF09A7E02AE5CF43EDE99E5D3AD5C7F91C1E624E1324B51A1DC9C517458220
32,880,481 UART: Caliptra RT
32,881,178 UART: [state] CFI Enabled
33,014,299 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,082,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,238,149 UART: [rt]cmd =0x41544d4e, len=14344
42,538,823 >>> mbox cmd response data (8 bytes)
42,539,401 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,570,186 UART: [rt]cmd =0x41545348, len=116
42,590,634 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,383 UART:
192,747 UART: Running Caliptra ROM ...
193,830 UART:
603,656 UART: [state] CFI Enabled
616,990 UART: [state] LifecycleState = Unprovisioned
618,934 UART: [state] DebugLocked = No
621,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,504 UART: [kat] SHA2-256
796,227 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,750 UART: [kat] ++
807,390 UART: [kat] sha1
818,340 UART: [kat] SHA2-256
821,057 UART: [kat] SHA2-384
826,474 UART: [kat] SHA2-512-ACC
828,912 UART: [kat] ECC-384
3,115,692 UART: [kat] HMAC-384Kdf
3,126,992 UART: [kat] LMS
4,317,036 UART: [kat] --
4,321,967 UART: [cold-reset] ++
4,323,253 UART: [fht] Storing FHT @ 0x50003400
4,333,664 UART: [idev] ++
4,334,238 UART: [idev] CDI.KEYID = 6
4,335,141 UART: [idev] SUBJECT.KEYID = 7
4,336,379 UART: [idev] UDS.KEYID = 0
4,337,385 ready_for_fw is high
4,337,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,427 UART: [idev] Erasing UDS.KEYID = 0
7,621,751 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,087 UART: [idev] --
7,646,817 UART: [ldev] ++
7,647,389 UART: [ldev] CDI.KEYID = 6
7,648,318 UART: [ldev] SUBJECT.KEYID = 5
7,649,574 UART: [ldev] AUTHORITY.KEYID = 7
7,650,848 UART: [ldev] FE.KEYID = 1
7,665,890 UART: [ldev] Erasing FE.KEYID = 1
10,956,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,521 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,398 UART: [ldev] --
13,316,808 UART: [fwproc] Waiting for Commands...
13,318,864 UART: [fwproc] Received command 0x46574c44
13,321,047 UART: [fwproc] Received Image of size 118548 bytes
17,427,218 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,987 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,816 >>> mbox cmd response: success
17,908,416 UART: [afmc] ++
17,909,100 UART: [afmc] CDI.KEYID = 6
17,909,995 UART: [afmc] SUBJECT.KEYID = 7
17,911,094 UART: [afmc] AUTHORITY.KEYID = 5
21,225,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,079 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,481 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,072 UART: [afmc] --
23,590,148 UART: [cold-reset] --
23,593,028 UART: [state] Locking Datavault
23,596,055 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,748 UART: [state] Locking ICCM
23,599,347 UART: [exit] Launching FMC @ 0x40000130
23,607,737 UART:
23,607,984 UART: Running Caliptra FMC ...
23,609,079 UART:
23,609,235 UART: [state] CFI Enabled
23,617,223 UART: [fht] FMC Alias Private Key: 7
25,956,764 UART: [art] Extend RT PCRs Done
25,957,987 UART: [art] Lock RT PCRs Done
25,959,802 UART: [art] Populate DV Done
25,965,381 UART: [fht] FMC Alias Private Key: 7
25,966,934 UART: [art] Derive CDI
25,967,673 UART: [art] Store in slot 0x4
26,010,338 UART: [art] Derive Key Pair
26,011,340 UART: [art] Store priv key in slot 0x5
29,253,344 UART: [art] Derive Key Pair - Done
29,266,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,196 UART: [art] PUB.X = 117EE57A39F444E976CEBAFD0EE5BB86EAD78B19CEF3E314EB0CDC57A278602B2DF5E893CADFC07CFE92ED06BA5675D4
31,555,428 UART: [art] PUB.Y = 36EBCE8D83713AA41F641C247BC4DEEA49A29DF73318F3440FD6E8C7B7838EF2326751BD05D31A296AFE1ED644E7C500
31,562,615 UART: [art] SIG.R = 5275F477A7774B58C71454C79247B9291669DE5D6BD5B456CEE8C6EBC7FBEC3622AF9C93C917E51A0B754F886D919345
31,570,000 UART: [art] SIG.S = 3614B18697B3133B2FB0CAE2F58ED9DED6D0A1A0B4877304AB985203C39F159C63320231949DB64E76801360A1CED418
32,875,120 UART: Caliptra RT
32,875,829 UART: [state] CFI Enabled
33,009,590 UART: [rt] RT listening for mailbox commands...
33,012,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,167,300 UART: [rt]cmd =0x41544d4e, len=14344
38,467,688 >>> mbox cmd response data (8 bytes)
38,468,296 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,499,072 UART: [rt]cmd =0x41545348, len=116
38,501,223 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,132,083 ready_for_fw is high
4,132,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,881 >>> mbox cmd response: success
23,802,564 UART:
23,802,974 UART: Running Caliptra FMC ...
23,804,084 UART:
23,804,242 UART: [state] CFI Enabled
23,811,713 UART: [fht] FMC Alias Private Key: 7
26,151,816 UART: [art] Extend RT PCRs Done
26,153,037 UART: [art] Lock RT PCRs Done
26,154,851 UART: [art] Populate DV Done
26,160,264 UART: [fht] FMC Alias Private Key: 7
26,161,797 UART: [art] Derive CDI
26,162,532 UART: [art] Store in slot 0x4
26,205,237 UART: [art] Derive Key Pair
26,206,279 UART: [art] Store priv key in slot 0x5
29,448,737 UART: [art] Derive Key Pair - Done
29,461,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,506 UART: [art] PUB.X = 98E6CBAF1CA04C646C7F323D5A7C7A7561AFDDD210B3A0A28E80B01CD7AAC7B8CDB7B63EDB63B11A1C24F4E2FB297C59
31,750,806 UART: [art] PUB.Y = 4C06068D3FEFE628EE8266637024F551EB786616FFC8F3D88305B28B038B9DE19F8D82920F49E1A08C9D7DE5782B7257
31,758,054 UART: [art] SIG.R = E3EE9F9072F09F05ADC689ACC7A6D74F44BF6DC29550F3F9E1DB6D6C9C8A1424403BD652B25FD9968602B3300938505C
31,765,467 UART: [art] SIG.S = 72527322EA1C9BBDAEDBCB50463B3018912A050FEE70A918A9BA61E57D302806D1EFB43EE75429CEE3F30F6A9A9C72E2
33,071,308 UART: Caliptra RT
33,072,044 UART: [state] CFI Enabled
33,205,518 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,276,878 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,432,672 UART: [rt]cmd =0x41544d4e, len=14344
42,733,644 >>> mbox cmd response data (8 bytes)
42,734,234 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,764,976 UART: [rt]cmd =0x41545348, len=116
42,784,600 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,129,486 ready_for_fw is high
4,129,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,669 >>> mbox cmd response: success
23,793,198 UART:
23,793,615 UART: Running Caliptra FMC ...
23,794,776 UART:
23,794,957 UART: [state] CFI Enabled
23,802,609 UART: [fht] FMC Alias Private Key: 7
26,142,006 UART: [art] Extend RT PCRs Done
26,143,249 UART: [art] Lock RT PCRs Done
26,145,098 UART: [art] Populate DV Done
26,150,761 UART: [fht] FMC Alias Private Key: 7
26,152,259 UART: [art] Derive CDI
26,152,992 UART: [art] Store in slot 0x4
26,195,526 UART: [art] Derive Key Pair
26,196,521 UART: [art] Store priv key in slot 0x5
29,438,825 UART: [art] Derive Key Pair - Done
29,451,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,026 UART: [art] PUB.X = 6C02B122CC1554C831B4639B7B05D2E2581386942AC1621DE5448F688FACA135B0FA79D884C7E06891F3E2EF6CC2C63A
31,741,286 UART: [art] PUB.Y = 723EA646722644EF69F8CF37C46E18C3A327ACA60D1D742A26BB0B0109B69A8E337C3AF7A32696E1AA34E5A261CA9B50
31,748,589 UART: [art] SIG.R = DFA9DC5D0ED4CDC39FB12ED3299FE7CB30E661893CB8323BAEE0523E65ABB3626E4FE2B32CC16C341F7C1A334CEF306C
31,756,022 UART: [art] SIG.S = 88C11D543A0040CEBBE4A9FA89065AB98E899E1F1A5796787A85469488A4B5DEA57D7B9655C945B3287E1FB44DB175AF
33,060,820 UART: Caliptra RT
33,061,543 UART: [state] CFI Enabled
33,194,883 UART: [rt] RT listening for mailbox commands...
33,197,379 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,352,529 UART: [rt]cmd =0x41544d4e, len=14344
38,653,710 >>> mbox cmd response data (8 bytes)
38,654,292 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,685,016 UART: [rt]cmd =0x41545348, len=116
38,687,271 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,069 UART:
192,437 UART: Running Caliptra ROM ...
193,612 UART:
193,760 UART: [state] CFI Enabled
264,806 UART: [state] LifecycleState = Unprovisioned
266,709 UART: [state] DebugLocked = No
268,026 UART: [state] WD Timer not started. Device not locked for debugging
271,204 UART: [kat] SHA2-256
450,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,654 UART: [kat] ++
462,098 UART: [kat] sha1
472,872 UART: [kat] SHA2-256
475,596 UART: [kat] SHA2-384
481,368 UART: [kat] SHA2-512-ACC
483,727 UART: [kat] ECC-384
2,926,048 UART: [kat] HMAC-384Kdf
2,950,017 UART: [kat] LMS
3,426,548 UART: [kat] --
3,429,903 UART: [cold-reset] ++
3,431,756 UART: [fht] FHT @ 0x50003400
3,442,800 UART: [idev] ++
3,443,354 UART: [idev] CDI.KEYID = 6
3,444,299 UART: [idev] SUBJECT.KEYID = 7
3,445,535 UART: [idev] UDS.KEYID = 0
3,446,542 ready_for_fw is high
3,446,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,205 UART: [idev] Erasing UDS.KEYID = 0
5,963,277 UART: [idev] Sha1 KeyId Algorithm
5,987,567 UART: [idev] --
5,991,756 UART: [ldev] ++
5,992,333 UART: [ldev] CDI.KEYID = 6
5,993,299 UART: [ldev] SUBJECT.KEYID = 5
5,994,453 UART: [ldev] AUTHORITY.KEYID = 7
5,995,733 UART: [ldev] FE.KEYID = 1
6,036,240 UART: [ldev] Erasing FE.KEYID = 1
8,541,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,087 UART: [ldev] --
10,351,859 UART: [fwproc] Wait for Commands...
10,355,079 UART: [fwproc] Recv command 0x46574c44
10,357,083 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,093 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,917,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,990,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,319,567 >>> mbox cmd response: success
14,324,546 UART: [afmc] ++
14,325,163 UART: [afmc] CDI.KEYID = 6
14,326,187 UART: [afmc] SUBJECT.KEYID = 7
14,327,343 UART: [afmc] AUTHORITY.KEYID = 5
16,856,244 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,123 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,619,110 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,635,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,650,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,674,660 UART: [afmc] --
18,678,488 UART: [cold-reset] --
18,683,482 UART: [state] Locking Datavault
18,689,975 UART: [state] Locking PCR0, PCR1 and PCR31
18,691,766 UART: [state] Locking ICCM
18,693,435 UART: [exit] Launching FMC @ 0x40000130
18,701,889 UART:
18,702,121 UART: Running Caliptra FMC ...
18,703,221 UART:
18,703,379 UART: [state] CFI Enabled
18,757,570 UART: [fht] FMC Alias Private Key: 7
20,524,248 UART: [art] Extend RT PCRs Done
20,525,595 UART: [art] Lock RT PCRs Done
20,527,007 UART: [art] Populate DV Done
20,532,366 UART: [fht] FMC Alias Private Key: 7
20,533,900 UART: [art] Derive CDI
20,534,711 UART: [art] Store in slot 0x4
20,589,554 UART: [art] Derive Key Pair
20,590,547 UART: [art] Store priv key in slot 0x5
23,053,459 UART: [art] Derive Key Pair - Done
23,066,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,779,437 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,940 UART: [art] PUB.X = 74A352658E5C31D9558517BC9CA1939142F044FED98DDCD943A4247A766CD5E3613F729B2BCFA0C03909E069783AD09A
24,788,247 UART: [art] PUB.Y = 5AFE78E8F6D05C741013F0FF413EB6D25948DF2B6BBCCB2ABF89271EC325C7C6ADF723E06A948A85E6810DEDFC9CDC5F
24,795,533 UART: [art] SIG.R = CC7AF0633781280F6B211599E572EA2FEBF430933A9CB1410AE16319C4923FEB3951287DEA5D590469332ADB397E4D12
24,802,876 UART: [art] SIG.S = 620F441DB1D21629C726AC579D66035F13C9ABCB617E62C60ED67EBD4E2F0EF134CE1A2D8F8FA32C36CB04D4480BE784
25,781,961 UART: Caliptra RT
25,782,653 UART: [state] CFI Enabled
25,964,714 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,011,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,167,322 UART: [rt]cmd =0x41544d4e, len=14344
34,163,009 >>> mbox cmd response data (8 bytes)
34,163,617 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,194,250 UART: [rt]cmd =0x41545348, len=116
34,214,278 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,140 UART:
192,492 UART: Running Caliptra ROM ...
193,574 UART:
193,716 UART: [state] CFI Enabled
260,730 UART: [state] LifecycleState = Unprovisioned
262,654 UART: [state] DebugLocked = No
264,028 UART: [state] WD Timer not started. Device not locked for debugging
268,621 UART: [kat] SHA2-256
448,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,110 UART: [kat] ++
459,586 UART: [kat] sha1
471,522 UART: [kat] SHA2-256
474,248 UART: [kat] SHA2-384
481,578 UART: [kat] SHA2-512-ACC
484,011 UART: [kat] ECC-384
2,946,981 UART: [kat] HMAC-384Kdf
2,968,965 UART: [kat] LMS
3,445,388 UART: [kat] --
3,449,382 UART: [cold-reset] ++
3,451,804 UART: [fht] FHT @ 0x50003400
3,462,770 UART: [idev] ++
3,463,333 UART: [idev] CDI.KEYID = 6
3,464,438 UART: [idev] SUBJECT.KEYID = 7
3,465,549 UART: [idev] UDS.KEYID = 0
3,466,448 ready_for_fw is high
3,466,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,572 UART: [idev] Erasing UDS.KEYID = 0
5,984,168 UART: [idev] Sha1 KeyId Algorithm
6,008,205 UART: [idev] --
6,012,959 UART: [ldev] ++
6,013,533 UART: [ldev] CDI.KEYID = 6
6,014,499 UART: [ldev] SUBJECT.KEYID = 5
6,015,661 UART: [ldev] AUTHORITY.KEYID = 7
6,016,940 UART: [ldev] FE.KEYID = 1
6,055,023 UART: [ldev] Erasing FE.KEYID = 1
8,561,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,146 UART: [ldev] --
10,371,050 UART: [fwproc] Wait for Commands...
10,373,647 UART: [fwproc] Recv command 0x46574c44
10,375,681 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,005 >>> mbox cmd response: success
14,347,439 UART: [afmc] ++
14,348,113 UART: [afmc] CDI.KEYID = 6
14,349,037 UART: [afmc] SUBJECT.KEYID = 7
14,350,151 UART: [afmc] AUTHORITY.KEYID = 5
16,893,445 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,271 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,314 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,879 UART: [afmc] --
18,715,940 UART: [cold-reset] --
18,719,800 UART: [state] Locking Datavault
18,726,664 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,422 UART: [state] Locking ICCM
18,731,267 UART: [exit] Launching FMC @ 0x40000130
18,739,662 UART:
18,739,894 UART: Running Caliptra FMC ...
18,740,991 UART:
18,741,171 UART: [state] CFI Enabled
18,794,513 UART: [fht] FMC Alias Private Key: 7
20,561,417 UART: [art] Extend RT PCRs Done
20,562,661 UART: [art] Lock RT PCRs Done
20,564,344 UART: [art] Populate DV Done
20,569,642 UART: [fht] FMC Alias Private Key: 7
20,571,176 UART: [art] Derive CDI
20,571,989 UART: [art] Store in slot 0x4
20,626,025 UART: [art] Derive Key Pair
20,627,070 UART: [art] Store priv key in slot 0x5
23,090,162 UART: [art] Derive Key Pair - Done
23,103,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,145 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,663 UART: [art] PUB.X = 79C1B7FCFEB4999A5083590B47CE9E4DD84C703C96AD739A9F09AF3C2915C01A01371FC2AFC3B00202121FBF05487B07
24,824,058 UART: [art] PUB.Y = DB0C11E757E470D708CD7D663050D3D244E0B78A4E811614831700A5F055E91A0C3261929E990BFDF0C28D9A5B2EE2D3
24,831,164 UART: [art] SIG.R = 9C803A1E3872AEC325E0B0D6201BCF00A27C64019F21CF72A304A1BA573C0628AB25CD106665D2E850B43663D8721DC7
24,838,506 UART: [art] SIG.S = 403638F369BCF4D16263862B8A5D4E3E7629D45A8FBB7578FD5947B7869361235A00ABFE084ADCDBBDA9F8E7B74CC021
25,817,723 UART: Caliptra RT
25,818,430 UART: [state] CFI Enabled
25,998,849 UART: [rt] RT listening for mailbox commands...
26,001,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,156,401 UART: [rt]cmd =0x41544d4e, len=14344
30,152,217 >>> mbox cmd response data (8 bytes)
30,152,840 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,183,459 UART: [rt]cmd =0x41545348, len=116
30,185,839 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,464,932 ready_for_fw is high
3,465,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,292 >>> mbox cmd response: success
18,539,588 UART:
18,539,977 UART: Running Caliptra FMC ...
18,541,180 UART:
18,541,352 UART: [state] CFI Enabled
18,605,385 UART: [fht] FMC Alias Private Key: 7
20,371,822 UART: [art] Extend RT PCRs Done
20,373,050 UART: [art] Lock RT PCRs Done
20,374,949 UART: [art] Populate DV Done
20,380,367 UART: [fht] FMC Alias Private Key: 7
20,382,030 UART: [art] Derive CDI
20,382,849 UART: [art] Store in slot 0x4
20,438,645 UART: [art] Derive Key Pair
20,439,679 UART: [art] Store priv key in slot 0x5
22,903,070 UART: [art] Derive Key Pair - Done
22,916,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,620 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,121 UART: [art] PUB.X = 917BC2E67F452519DCB1B2D8F31A8CCA6E4FCE5857916B3D9EE39F69543307B97E2A0B5BA062A30978E36B337AA95D57
24,637,378 UART: [art] PUB.Y = 86412809006C2C41CC572D6417E2FBB23A32B14A03CDADDE88B042B9FCE26D22640BC04C0FA56E35EC2EF8B44F22AC18
24,644,628 UART: [art] SIG.R = B78E81653DBF8ED8592B9E10E85124864019D7955030C9E7A90458BDF83924E0B9B0AEA68DC07714E67762A57713D0AE
24,652,029 UART: [art] SIG.S = 16342170D932D66E77A4E494343CA4A07554233AAA0D78DEC74B16A391A58041A6E6CCE28FC010D849BC6C96FD2B54CD
25,630,854 UART: Caliptra RT
25,631,563 UART: [state] CFI Enabled
25,813,263 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,859,112 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,015,247 UART: [rt]cmd =0x41544d4e, len=14344
34,010,463 >>> mbox cmd response data (8 bytes)
34,011,111 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,041,935 UART: [rt]cmd =0x41545348, len=116
34,061,565 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,459,027 ready_for_fw is high
3,459,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,545 >>> mbox cmd response: success
18,488,871 UART:
18,489,336 UART: Running Caliptra FMC ...
18,490,479 UART:
18,490,640 UART: [state] CFI Enabled
18,558,704 UART: [fht] FMC Alias Private Key: 7
20,325,264 UART: [art] Extend RT PCRs Done
20,326,488 UART: [art] Lock RT PCRs Done
20,327,848 UART: [art] Populate DV Done
20,333,192 UART: [fht] FMC Alias Private Key: 7
20,334,889 UART: [art] Derive CDI
20,335,701 UART: [art] Store in slot 0x4
20,391,340 UART: [art] Derive Key Pair
20,392,335 UART: [art] Store priv key in slot 0x5
22,855,137 UART: [art] Derive Key Pair - Done
22,867,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,581,362 UART: [art] Erasing AUTHORITY.KEYID = 7
24,582,869 UART: [art] PUB.X = 9126043E7117B4A23ADC24FC841EB57454DE8AF378BB62587BA8AD7ECA0024625FD5B5A9435EC603EC65A83B2DFDF975
24,590,140 UART: [art] PUB.Y = 425301F98C18150781EC6E7291690D40C92E7B569694FF9D1B9D8DFF71BEFBCCE7F26143F174DA6E209CB4255FA5E768
24,597,345 UART: [art] SIG.R = 2CE33E85B9EFED8EE204BA067B97618A64BC4BD12B1954FFB67FE6D0E2B1D0A66308FF30F4ED99FB103DB03377D48B5D
24,604,803 UART: [art] SIG.S = 0AC43A9B7E0DEAC3E1758FC56A329999EC6746AF74E1076EFEE4F4C1D7AF2DE078D583876FC887BF0469BDDF2F069EF1
25,583,853 UART: Caliptra RT
25,584,554 UART: [state] CFI Enabled
25,764,870 UART: [rt] RT listening for mailbox commands...
25,767,277 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,922,470 UART: [rt]cmd =0x41544d4e, len=14344
29,917,991 >>> mbox cmd response data (8 bytes)
29,918,613 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,949,345 UART: [rt]cmd =0x41545348, len=116
29,951,650 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,466 UART:
192,830 UART: Running Caliptra ROM ...
194,020 UART:
603,714 UART: [state] CFI Enabled
617,528 UART: [state] LifecycleState = Unprovisioned
619,480 UART: [state] DebugLocked = No
621,936 UART: [state] WD Timer not started. Device not locked for debugging
624,982 UART: [kat] SHA2-256
804,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,415 UART: [kat] ++
815,958 UART: [kat] sha1
826,950 UART: [kat] SHA2-256
829,859 UART: [kat] SHA2-384
836,958 UART: [kat] SHA2-512-ACC
839,348 UART: [kat] ECC-384
3,280,735 UART: [kat] HMAC-384Kdf
3,293,888 UART: [kat] LMS
3,770,356 UART: [kat] --
3,774,775 UART: [cold-reset] ++
3,776,642 UART: [fht] FHT @ 0x50003400
3,788,477 UART: [idev] ++
3,789,041 UART: [idev] CDI.KEYID = 6
3,790,147 UART: [idev] SUBJECT.KEYID = 7
3,791,278 UART: [idev] UDS.KEYID = 0
3,792,212 ready_for_fw is high
3,792,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,097 UART: [idev] Erasing UDS.KEYID = 0
6,269,728 UART: [idev] Sha1 KeyId Algorithm
6,294,622 UART: [idev] --
6,299,482 UART: [ldev] ++
6,300,056 UART: [ldev] CDI.KEYID = 6
6,301,078 UART: [ldev] SUBJECT.KEYID = 5
6,302,189 UART: [ldev] AUTHORITY.KEYID = 7
6,303,478 UART: [ldev] FE.KEYID = 1
6,313,643 UART: [ldev] Erasing FE.KEYID = 1
8,792,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,022 UART: [ldev] --
10,587,503 UART: [fwproc] Wait for Commands...
10,589,820 UART: [fwproc] Recv command 0x46574c44
10,591,706 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,548 >>> mbox cmd response: success
14,563,210 UART: [afmc] ++
14,563,824 UART: [afmc] CDI.KEYID = 6
14,564,794 UART: [afmc] SUBJECT.KEYID = 7
14,565,959 UART: [afmc] AUTHORITY.KEYID = 5
17,072,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,795,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,813,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,829,129 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,766 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,426 UART: [afmc] --
18,873,637 UART: [cold-reset] --
18,877,239 UART: [state] Locking Datavault
18,881,843 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,603 UART: [state] Locking ICCM
18,885,105 UART: [exit] Launching FMC @ 0x40000130
18,893,510 UART:
18,893,747 UART: Running Caliptra FMC ...
18,894,850 UART:
18,895,010 UART: [state] CFI Enabled
18,903,011 UART: [fht] FMC Alias Private Key: 7
20,669,396 UART: [art] Extend RT PCRs Done
20,670,757 UART: [art] Lock RT PCRs Done
20,671,957 UART: [art] Populate DV Done
20,677,645 UART: [fht] FMC Alias Private Key: 7
20,679,195 UART: [art] Derive CDI
20,679,955 UART: [art] Store in slot 0x4
20,722,408 UART: [art] Derive Key Pair
20,723,409 UART: [art] Store priv key in slot 0x5
23,150,395 UART: [art] Derive Key Pair - Done
23,163,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,114 UART: [art] PUB.X = A386785978012B78700F57300E6AE911F8B022659CE4EC0EDDA318364B9A554D8F456718A493AAF1F29006A28585D1BC
24,878,355 UART: [art] PUB.Y = 03E804062474A8F27E70C7283F47AF9BBE8DA0A250DD5C599154CD0D56F33717292953EF52CC3B4E66DA1B6A8C25D42E
24,885,640 UART: [art] SIG.R = 44E7D651AA013041042A3372C688FECA0BB0775C0606398952736CC8E83B5AB425B56F6C42EF4F3608BA831707493370
24,892,991 UART: [art] SIG.S = 2A04D9B97F12D94CF58329EBD356872A698794C9279A84809E805B04A895953A20B57DBAE5644E6830813AC406BE9E83
25,871,821 UART: Caliptra RT
25,872,534 UART: [state] CFI Enabled
26,005,065 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,057,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,213,068 UART: [rt]cmd =0x41544d4e, len=14344
34,208,998 >>> mbox cmd response data (8 bytes)
34,209,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,240,280 UART: [rt]cmd =0x41545348, len=116
34,260,528 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,341 UART:
192,711 UART: Running Caliptra ROM ...
194,011 UART:
603,299 UART: [state] CFI Enabled
616,244 UART: [state] LifecycleState = Unprovisioned
618,176 UART: [state] DebugLocked = No
620,627 UART: [state] WD Timer not started. Device not locked for debugging
624,803 UART: [kat] SHA2-256
804,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,195 UART: [kat] ++
815,818 UART: [kat] sha1
826,203 UART: [kat] SHA2-256
828,849 UART: [kat] SHA2-384
833,367 UART: [kat] SHA2-512-ACC
835,705 UART: [kat] ECC-384
3,276,741 UART: [kat] HMAC-384Kdf
3,288,759 UART: [kat] LMS
3,765,286 UART: [kat] --
3,769,986 UART: [cold-reset] ++
3,771,202 UART: [fht] FHT @ 0x50003400
3,782,543 UART: [idev] ++
3,783,112 UART: [idev] CDI.KEYID = 6
3,784,149 UART: [idev] SUBJECT.KEYID = 7
3,785,325 UART: [idev] UDS.KEYID = 0
3,786,256 ready_for_fw is high
3,786,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,286 UART: [idev] Erasing UDS.KEYID = 0
6,262,245 UART: [idev] Sha1 KeyId Algorithm
6,287,144 UART: [idev] --
6,292,516 UART: [ldev] ++
6,293,092 UART: [ldev] CDI.KEYID = 6
6,293,978 UART: [ldev] SUBJECT.KEYID = 5
6,295,191 UART: [ldev] AUTHORITY.KEYID = 7
6,296,484 UART: [ldev] FE.KEYID = 1
6,306,079 UART: [ldev] Erasing FE.KEYID = 1
8,782,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,906 UART: [ldev] --
10,576,095 UART: [fwproc] Wait for Commands...
10,577,834 UART: [fwproc] Recv command 0x46574c44
10,579,882 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,000 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,576 >>> mbox cmd response: success
14,555,261 UART: [afmc] ++
14,555,923 UART: [afmc] CDI.KEYID = 6
14,556,846 UART: [afmc] SUBJECT.KEYID = 7
14,558,018 UART: [afmc] AUTHORITY.KEYID = 5
17,063,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,193 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,015 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,106 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,700 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,612 UART: [afmc] --
18,862,907 UART: [cold-reset] --
18,868,821 UART: [state] Locking Datavault
18,875,473 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,237 UART: [state] Locking ICCM
18,878,800 UART: [exit] Launching FMC @ 0x40000130
18,887,202 UART:
18,887,443 UART: Running Caliptra FMC ...
18,888,545 UART:
18,888,706 UART: [state] CFI Enabled
18,896,920 UART: [fht] FMC Alias Private Key: 7
20,663,477 UART: [art] Extend RT PCRs Done
20,664,717 UART: [art] Lock RT PCRs Done
20,666,349 UART: [art] Populate DV Done
20,671,766 UART: [fht] FMC Alias Private Key: 7
20,673,407 UART: [art] Derive CDI
20,674,185 UART: [art] Store in slot 0x4
20,716,940 UART: [art] Derive Key Pair
20,717,942 UART: [art] Store priv key in slot 0x5
23,144,124 UART: [art] Derive Key Pair - Done
23,157,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,103 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,062 UART: [art] PUB.X = BB53CD876733296093B8D4640AE596978D6827B4EB3EE43F1452927CE0F40D6B479A265EF2D3E00B4161E9AB3823647B
24,871,896 UART: [art] PUB.Y = 29B9CFF6EA2FF114577C23E56EFCBC8B916F55CEA8DA6B780C8B43620166D92C22E0A243961EACD77B4E37A843D23A64
24,879,184 UART: [art] SIG.R = AAEC32262766291DCF45FA3F95BFD8335056FE731579942FDD5E0E7C7FA2FEEE9CEF69028372F1C19000D289FE744996
24,886,524 UART: [art] SIG.S = 699867BD034240E53C2E1C633B980C7136C2108A83471DDCEA0C33AD265F9A83098FC58525916C8342F2D4BD2AA206BE
25,865,239 UART: Caliptra RT
25,865,974 UART: [state] CFI Enabled
26,000,000 UART: [rt] RT listening for mailbox commands...
26,002,465 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,157,855 UART: [rt]cmd =0x41544d4e, len=14344
30,153,135 >>> mbox cmd response data (8 bytes)
30,154,075 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,184,696 UART: [rt]cmd =0x41545348, len=116
30,187,176 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,781,045 ready_for_fw is high
3,781,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,893 >>> mbox cmd response: success
18,701,175 UART:
18,701,573 UART: Running Caliptra FMC ...
18,702,778 UART:
18,702,948 UART: [state] CFI Enabled
18,711,103 UART: [fht] FMC Alias Private Key: 7
20,477,233 UART: [art] Extend RT PCRs Done
20,478,456 UART: [art] Lock RT PCRs Done
20,480,088 UART: [art] Populate DV Done
20,485,678 UART: [fht] FMC Alias Private Key: 7
20,487,337 UART: [art] Derive CDI
20,488,158 UART: [art] Store in slot 0x4
20,530,633 UART: [art] Derive Key Pair
20,531,677 UART: [art] Store priv key in slot 0x5
22,958,548 UART: [art] Derive Key Pair - Done
22,971,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,885 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,383 UART: [art] PUB.X = E4B48464FA8B6C4BA96E8E687A38341DEE6C059A66C53E9EE8AB2536875024FC2CEC89DA4D5AFA9E533C847EEFA71B55
24,686,637 UART: [art] PUB.Y = 64B81C58B48724889239743DF3702C83497FCCB8A898D8DF2A6FC08A9BA170015F97974D6E17978CC50A16BA9094E503
24,693,881 UART: [art] SIG.R = E1CDB5C4D226EC064F6C464E300DB245F40CAC496223AB07C02D851467B9611AA76AC59861054818588F95EF34A57A82
24,701,290 UART: [art] SIG.S = EEF3AE31F4C3130A8F0834DFF9526B614F9D91556F58CC84757DCD899EEDC4AE446648C0FF360FAD18648ABE895DE7FA
25,680,176 UART: Caliptra RT
25,680,880 UART: [state] CFI Enabled
25,813,238 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,865,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,021,597 UART: [rt]cmd =0x41544d4e, len=14344
34,016,847 >>> mbox cmd response data (8 bytes)
34,017,449 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,048,320 UART: [rt]cmd =0x41545348, len=116
34,068,111 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,373 writing to cptra_bootfsm_go
3,778,957 ready_for_fw is high
3,779,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,466 >>> mbox cmd response: success
18,693,521 UART:
18,693,917 UART: Running Caliptra FMC ...
18,695,117 UART:
18,695,312 UART: [state] CFI Enabled
18,703,269 UART: [fht] FMC Alias Private Key: 7
20,469,191 UART: [art] Extend RT PCRs Done
20,470,411 UART: [art] Lock RT PCRs Done
20,471,743 UART: [art] Populate DV Done
20,477,099 UART: [fht] FMC Alias Private Key: 7
20,478,703 UART: [art] Derive CDI
20,479,444 UART: [art] Store in slot 0x4
20,521,715 UART: [art] Derive Key Pair
20,522,718 UART: [art] Store priv key in slot 0x5
22,950,448 UART: [art] Derive Key Pair - Done
22,962,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,762 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,272 UART: [art] PUB.X = 1C20027DD9C1EA49358733E8EF7D0A5C02E2C1DC38E5AB2710510B5F3334E5F1EFF11CA1F2EBCD37F822F29445C51BE5
24,678,541 UART: [art] PUB.Y = 23639AD5AE0229205CDE251108F9EC35A6FF0F27104C9F72CDAFC370E0AAF07AFB33014675A7429F24D0D9EF6C13D621
24,685,830 UART: [art] SIG.R = 9067443C634E83C8D3ADDAC8E6928AA663621558D34D3E64FCC4B34778974171038AB5272A7792362C118C9749EA5E19
24,693,372 UART: [art] SIG.S = 55A647094B87FA83F227A6011E2EFAEB67811A9EEA716B4D369F4E0B84AB716E5C8A8D62DEC84E8CF7C2CEAF9CD78822
25,672,059 UART: Caliptra RT
25,672,763 UART: [state] CFI Enabled
25,804,258 UART: [rt] RT listening for mailbox commands...
25,806,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,962,249 UART: [rt]cmd =0x41544d4e, len=14344
29,958,336 >>> mbox cmd response data (8 bytes)
29,958,923 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,989,778 UART: [rt]cmd =0x41545348, len=116
29,992,394 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,197 UART:
192,545 UART: Running Caliptra ROM ...
193,720 UART:
193,874 UART: [state] CFI Enabled
262,081 UART: [state] LifecycleState = Unprovisioned
264,422 UART: [state] DebugLocked = No
266,309 UART: [state] WD Timer not started. Device not locked for debugging
271,328 UART: [kat] SHA2-256
461,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,942 UART: [kat] ++
472,396 UART: [kat] sha1
483,904 UART: [kat] SHA2-256
486,907 UART: [kat] SHA2-384
492,392 UART: [kat] SHA2-512-ACC
494,962 UART: [kat] ECC-384
2,947,506 UART: [kat] HMAC-384Kdf
2,971,697 UART: [kat] LMS
3,503,497 UART: [kat] --
3,507,703 UART: [cold-reset] ++
3,508,850 UART: [fht] FHT @ 0x50003400
3,519,685 UART: [idev] ++
3,520,432 UART: [idev] CDI.KEYID = 6
3,521,345 UART: [idev] SUBJECT.KEYID = 7
3,522,518 UART: [idev] UDS.KEYID = 0
3,523,440 ready_for_fw is high
3,523,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,739 UART: [idev] Erasing UDS.KEYID = 0
6,029,261 UART: [idev] Sha1 KeyId Algorithm
6,051,368 UART: [idev] --
6,055,199 UART: [ldev] ++
6,055,880 UART: [ldev] CDI.KEYID = 6
6,056,812 UART: [ldev] SUBJECT.KEYID = 5
6,057,972 UART: [ldev] AUTHORITY.KEYID = 7
6,059,200 UART: [ldev] FE.KEYID = 1
6,100,906 UART: [ldev] Erasing FE.KEYID = 1
8,607,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,469 UART: [ldev] --
10,415,581 UART: [fwproc] Wait for Commands...
10,417,628 UART: [fwproc] Recv command 0x46574c44
10,419,933 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,152 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,094 >>> mbox cmd response: success
14,687,890 UART: [afmc] ++
14,688,618 UART: [afmc] CDI.KEYID = 6
14,689,810 UART: [afmc] SUBJECT.KEYID = 7
14,691,297 UART: [afmc] AUTHORITY.KEYID = 5
17,234,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,962,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,964,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,979,166 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,311 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,009,171 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,565 UART: [afmc] --
19,035,275 UART: [cold-reset] --
19,038,940 UART: [state] Locking Datavault
19,044,790 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,939 UART: [state] Locking ICCM
19,049,821 UART: [exit] Launching FMC @ 0x40000130
19,058,506 UART:
19,058,745 UART: Running Caliptra FMC ...
19,059,796 UART:
19,059,948 UART: [state] CFI Enabled
19,118,364 UART: [fht] FMC Alias Private Key: 7
20,885,152 UART: [art] Extend RT PCRs Done
20,886,367 UART: [art] Lock RT PCRs Done
20,887,802 UART: [art] Populate DV Done
20,892,995 UART: [fht] FMC Alias Private Key: 7
20,894,637 UART: [art] Derive CDI
20,895,374 UART: [art] Store in slot 0x4
20,951,317 UART: [art] Derive Key Pair
20,952,349 UART: [art] Store priv key in slot 0x5
23,415,482 UART: [art] Derive Key Pair - Done
23,428,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,495 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,997 UART: [art] PUB.X = 40E5B9DC9DDFDC47669BD0C15C39EE0151A49247AB99C173B0B52BF12ECF4FFE2C598EED48D41E76FF6D53BA97F01528
25,150,308 UART: [art] PUB.Y = 15A4D36070093A02857C8FD87FFF50A9F92E4C798C12B25BE9BBC270DD2E9F2AF4F6BACC6E8BAEE2F5D19868EB09CA04
25,157,600 UART: [art] SIG.R = 91B06F550CCEACC1226347DADF5CDD5601612C4E8D448710DFA26B310137E67C96322F32954EA1F57B5D1FE1473E38A6
25,165,004 UART: [art] SIG.S = 7E3BE7225B4BC9AD80AC83CC8B3B1EB2F0D0A2EFA1212C8CD4CC9E4FE6E7CAC6E25CF1CD2F09508E4256A5E9D682E7D9
26,144,435 UART: Caliptra RT
26,145,144 UART: [state] CFI Enabled
26,336,970 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,394,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,549,931 UART: [rt]cmd =0x41544d4e, len=14344
34,545,544 >>> mbox cmd response data (8 bytes)
34,546,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,576,872 UART: [rt]cmd =0x41545348, len=116
34,596,555 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,006 UART:
192,374 UART: Running Caliptra ROM ...
193,461 UART:
193,604 UART: [state] CFI Enabled
262,651 UART: [state] LifecycleState = Unprovisioned
265,056 UART: [state] DebugLocked = No
266,513 UART: [state] WD Timer not started. Device not locked for debugging
271,396 UART: [kat] SHA2-256
461,305 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,037 UART: [kat] ++
472,490 UART: [kat] sha1
483,359 UART: [kat] SHA2-256
486,362 UART: [kat] SHA2-384
492,735 UART: [kat] SHA2-512-ACC
495,353 UART: [kat] ECC-384
2,948,627 UART: [kat] HMAC-384Kdf
2,971,102 UART: [kat] LMS
3,502,890 UART: [kat] --
3,507,655 UART: [cold-reset] ++
3,508,728 UART: [fht] FHT @ 0x50003400
3,519,646 UART: [idev] ++
3,520,277 UART: [idev] CDI.KEYID = 6
3,521,304 UART: [idev] SUBJECT.KEYID = 7
3,522,469 UART: [idev] UDS.KEYID = 0
3,523,392 ready_for_fw is high
3,523,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,000 UART: [idev] Erasing UDS.KEYID = 0
6,027,285 UART: [idev] Sha1 KeyId Algorithm
6,048,732 UART: [idev] --
6,053,808 UART: [ldev] ++
6,054,485 UART: [ldev] CDI.KEYID = 6
6,055,394 UART: [ldev] SUBJECT.KEYID = 5
6,056,551 UART: [ldev] AUTHORITY.KEYID = 7
6,057,779 UART: [ldev] FE.KEYID = 1
6,099,539 UART: [ldev] Erasing FE.KEYID = 1
8,606,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,005 UART: [ldev] --
10,412,723 UART: [fwproc] Wait for Commands...
10,415,365 UART: [fwproc] Recv command 0x46574c44
10,417,616 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,322 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,910 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,439 >>> mbox cmd response: success
14,683,302 UART: [afmc] ++
14,684,061 UART: [afmc] CDI.KEYID = 6
14,685,130 UART: [afmc] SUBJECT.KEYID = 7
14,686,683 UART: [afmc] AUTHORITY.KEYID = 5
17,214,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,121 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,274 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,144 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,371 UART: [afmc] --
19,031,542 UART: [cold-reset] --
19,035,516 UART: [state] Locking Datavault
19,040,607 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,759 UART: [state] Locking ICCM
19,044,946 UART: [exit] Launching FMC @ 0x40000130
19,053,646 UART:
19,053,920 UART: Running Caliptra FMC ...
19,054,950 UART:
19,055,097 UART: [state] CFI Enabled
19,115,349 UART: [fht] FMC Alias Private Key: 7
20,880,857 UART: [art] Extend RT PCRs Done
20,882,078 UART: [art] Lock RT PCRs Done
20,883,678 UART: [art] Populate DV Done
20,889,086 UART: [fht] FMC Alias Private Key: 7
20,890,668 UART: [art] Derive CDI
20,891,490 UART: [art] Store in slot 0x4
20,947,719 UART: [art] Derive Key Pair
20,948,717 UART: [art] Store priv key in slot 0x5
23,412,539 UART: [art] Derive Key Pair - Done
23,425,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,387 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,913 UART: [art] PUB.X = E5446BFC7DE18B43259AD00F9CF74C253A3123A0C3BF2977DA0DD914728E69929AA267845B19F73B54CB108F10EBF85B
25,146,177 UART: [art] PUB.Y = 186F7064094DA87099B347B3CE5CD158686A6BF3C93AFD22635E1C5A48A18032BCFD96ED9DF07D188EE0BE1484CD3E17
25,153,469 UART: [art] SIG.R = C0DB768C467421AF86CD9A4E2394081C829141E409BFAE9B0721ECCDC6F24851E0F753190A32870E8365D852E07EACF5
25,160,816 UART: [art] SIG.S = 4D2B6256D5B572CE40D18F962DCCB0181B4772077B86FE8B7CD5D954FB64CC1876BC99F2EBCAB17F178FF327AF5B4CA0
26,140,631 UART: Caliptra RT
26,141,323 UART: [state] CFI Enabled
26,321,654 UART: [rt] RT listening for mailbox commands...
26,324,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,479,662 UART: [rt]cmd =0x41544d4e, len=14344
30,475,424 >>> mbox cmd response data (8 bytes)
30,476,041 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,506,729 UART: [rt]cmd =0x41545348, len=116
30,509,175 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,439,786 ready_for_fw is high
3,440,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,565 >>> mbox cmd response: success
19,110,299 UART:
19,110,709 UART: Running Caliptra FMC ...
19,111,857 UART:
19,112,015 UART: [state] CFI Enabled
19,180,943 UART: [fht] FMC Alias Private Key: 7
20,947,694 UART: [art] Extend RT PCRs Done
20,948,920 UART: [art] Lock RT PCRs Done
20,950,551 UART: [art] Populate DV Done
20,956,235 UART: [fht] FMC Alias Private Key: 7
20,957,729 UART: [art] Derive CDI
20,958,487 UART: [art] Store in slot 0x4
21,013,800 UART: [art] Derive Key Pair
21,014,843 UART: [art] Store priv key in slot 0x5
23,477,339 UART: [art] Derive Key Pair - Done
23,490,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,940 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,473 UART: [art] PUB.X = D112E8339A2991E3F72D02E2575B9A66497F9DC2B0D4EE6C7E1B9595126E46186B612E70C3688F4C17CD8F3796E3E417
25,211,705 UART: [art] PUB.Y = F68776281E847828042175CCED786F7E1177DD1EAC361D721508D2E65CDF98595B71AEAE47CB177240A65DFF212E6971
25,218,977 UART: [art] SIG.R = 9785C711F54AD44D840A2BCAEDF2CEAA72BCA060512B76E61C5B0E6162F6F20B88FEABBDC537FEAB4A126A0A88504DCA
25,226,378 UART: [art] SIG.S = CBDCE26E4885157FAD519FA2B0D5E710D388D6AD3C48465DF73AA32B72B596ACDC8D4FDA526EC606B69CF00525B268B8
26,205,721 UART: Caliptra RT
26,206,411 UART: [state] CFI Enabled
26,387,352 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,446,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,602,490 UART: [rt]cmd =0x41544d4e, len=14344
34,597,857 >>> mbox cmd response data (8 bytes)
34,598,424 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,629,007 UART: [rt]cmd =0x41545348, len=116
34,648,542 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
3,426,738 ready_for_fw is high
3,427,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,792,815 >>> mbox cmd response: success
19,102,155 UART:
19,102,727 UART: Running Caliptra FMC ...
19,103,847 UART:
19,104,009 UART: [state] CFI Enabled
19,169,285 UART: [fht] FMC Alias Private Key: 7
20,935,712 UART: [art] Extend RT PCRs Done
20,936,938 UART: [art] Lock RT PCRs Done
20,938,578 UART: [art] Populate DV Done
20,943,938 UART: [fht] FMC Alias Private Key: 7
20,945,368 UART: [art] Derive CDI
20,946,133 UART: [art] Store in slot 0x4
21,002,310 UART: [art] Derive Key Pair
21,003,360 UART: [art] Store priv key in slot 0x5
23,466,358 UART: [art] Derive Key Pair - Done
23,479,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,191,889 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,392 UART: [art] PUB.X = 249E1D66202460A00714638C689AF8F393E673782FAEB3C26AADFF88006AD7B1082E49502B3818A317131035D13DDB36
25,200,623 UART: [art] PUB.Y = 05D740772824365A8F23FC133EE870BE2984B9CD3FB1E165B78DF5F5BEF1AD52AB8E82E5B18B406E326AD921C75B54FA
25,207,920 UART: [art] SIG.R = A4BD57CE27847140B8A4FBB10C0E955A5F899768D0AC855B3CA805AF2F5DD37B2ABD2BA51B18BBBEE07A89E3880D065C
25,215,318 UART: [art] SIG.S = 1571654EDCA45A11BFEE4CBE9FFF76BEA0EB88D3587B63A18C7DD14FC56496229CEC57C95ABCC131AB710ADCC22C7C67
26,194,243 UART: Caliptra RT
26,194,957 UART: [state] CFI Enabled
26,375,489 UART: [rt] RT listening for mailbox commands...
26,377,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,532,928 UART: [rt]cmd =0x41544d4e, len=14344
30,529,147 >>> mbox cmd response data (8 bytes)
30,529,742 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,560,370 UART: [rt]cmd =0x41545348, len=116
30,562,416 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,310 UART:
192,681 UART: Running Caliptra ROM ...
193,807 UART:
603,380 UART: [state] CFI Enabled
617,791 UART: [state] LifecycleState = Unprovisioned
619,896 UART: [state] DebugLocked = No
622,001 UART: [state] WD Timer not started. Device not locked for debugging
626,695 UART: [kat] SHA2-256
816,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,339 UART: [kat] ++
827,823 UART: [kat] sha1
839,908 UART: [kat] SHA2-256
842,919 UART: [kat] SHA2-384
849,834 UART: [kat] SHA2-512-ACC
852,429 UART: [kat] ECC-384
3,293,320 UART: [kat] HMAC-384Kdf
3,307,147 UART: [kat] LMS
3,838,936 UART: [kat] --
3,843,041 UART: [cold-reset] ++
3,844,339 UART: [fht] FHT @ 0x50003400
3,856,836 UART: [idev] ++
3,857,476 UART: [idev] CDI.KEYID = 6
3,858,439 UART: [idev] SUBJECT.KEYID = 7
3,859,685 UART: [idev] UDS.KEYID = 0
3,860,592 ready_for_fw is high
3,860,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,781 UART: [idev] Erasing UDS.KEYID = 0
6,336,132 UART: [idev] Sha1 KeyId Algorithm
6,357,355 UART: [idev] --
6,361,865 UART: [ldev] ++
6,362,613 UART: [ldev] CDI.KEYID = 6
6,363,497 UART: [ldev] SUBJECT.KEYID = 5
6,364,600 UART: [ldev] AUTHORITY.KEYID = 7
6,365,891 UART: [ldev] FE.KEYID = 1
6,378,808 UART: [ldev] Erasing FE.KEYID = 1
8,856,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,219 UART: [ldev] --
10,649,239 UART: [fwproc] Wait for Commands...
10,651,767 UART: [fwproc] Recv command 0x46574c44
10,654,075 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,294 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,926 >>> mbox cmd response: success
14,910,519 UART: [afmc] ++
14,911,228 UART: [afmc] CDI.KEYID = 6
14,912,418 UART: [afmc] SUBJECT.KEYID = 7
14,913,917 UART: [afmc] AUTHORITY.KEYID = 5
17,419,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,254 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,534 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,406 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,306 UART: [afmc] --
19,215,310 UART: [cold-reset] --
19,220,098 UART: [state] Locking Datavault
19,226,238 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,445 UART: [state] Locking ICCM
19,230,126 UART: [exit] Launching FMC @ 0x40000130
19,238,821 UART:
19,239,065 UART: Running Caliptra FMC ...
19,240,175 UART:
19,240,334 UART: [state] CFI Enabled
19,248,244 UART: [fht] FMC Alias Private Key: 7
21,014,505 UART: [art] Extend RT PCRs Done
21,015,733 UART: [art] Lock RT PCRs Done
21,017,017 UART: [art] Populate DV Done
21,022,331 UART: [fht] FMC Alias Private Key: 7
21,023,887 UART: [art] Derive CDI
21,024,708 UART: [art] Store in slot 0x4
21,067,690 UART: [art] Derive Key Pair
21,068,731 UART: [art] Store priv key in slot 0x5
23,495,807 UART: [art] Derive Key Pair - Done
23,508,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,573 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,086 UART: [art] PUB.X = 4BF6CD45755462879853A11577919DA35516D03E1F14088052C6EF56A7DF355949AFF81BEAB120D01C8514C6B83F87DC
25,224,307 UART: [art] PUB.Y = 3B2886E43A3173B4C3C04E745FC24E80280F32AD2FCE1E368DB17DAC7F51C2D8232FA98DDFE0C975E6FE43B7ED60711D
25,231,592 UART: [art] SIG.R = 1523D54C0E57DC1B10605C5B7BC7E1DC556E0934D73F0C79414F1456507FEBB5F787B80B568E32957ACBA467BDBCB949
25,239,033 UART: [art] SIG.S = 88D355B35116C2E6AD2A9015061FCBEBBEF40F45E5B2E5255127290A272B205308C4BB0164B8E0581D339C10C685C837
26,218,280 UART: Caliptra RT
26,218,987 UART: [state] CFI Enabled
26,352,063 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,414,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,570,218 UART: [rt]cmd =0x41544d4e, len=14344
34,565,811 >>> mbox cmd response data (8 bytes)
34,566,400 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,597,088 UART: [rt]cmd =0x41545348, len=116
34,617,696 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,401 UART:
192,764 UART: Running Caliptra ROM ...
193,971 UART:
603,563 UART: [state] CFI Enabled
617,168 UART: [state] LifecycleState = Unprovisioned
619,539 UART: [state] DebugLocked = No
620,925 UART: [state] WD Timer not started. Device not locked for debugging
625,325 UART: [kat] SHA2-256
815,265 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,018 UART: [kat] ++
826,635 UART: [kat] sha1
837,594 UART: [kat] SHA2-256
840,603 UART: [kat] SHA2-384
845,957 UART: [kat] SHA2-512-ACC
848,541 UART: [kat] ECC-384
3,288,848 UART: [kat] HMAC-384Kdf
3,302,207 UART: [kat] LMS
3,834,052 UART: [kat] --
3,836,772 UART: [cold-reset] ++
3,838,348 UART: [fht] FHT @ 0x50003400
3,849,539 UART: [idev] ++
3,850,175 UART: [idev] CDI.KEYID = 6
3,851,246 UART: [idev] SUBJECT.KEYID = 7
3,852,373 UART: [idev] UDS.KEYID = 0
3,853,312 ready_for_fw is high
3,853,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,234 UART: [idev] Erasing UDS.KEYID = 0
6,325,494 UART: [idev] Sha1 KeyId Algorithm
6,347,920 UART: [idev] --
6,353,725 UART: [ldev] ++
6,354,419 UART: [ldev] CDI.KEYID = 6
6,355,337 UART: [ldev] SUBJECT.KEYID = 5
6,356,550 UART: [ldev] AUTHORITY.KEYID = 7
6,357,726 UART: [ldev] FE.KEYID = 1
6,370,132 UART: [ldev] Erasing FE.KEYID = 1
8,848,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,829 UART: [ldev] --
10,637,816 UART: [fwproc] Wait for Commands...
10,640,027 UART: [fwproc] Recv command 0x46574c44
10,642,292 UART: [fwproc] Recv'd Img size: 118548 bytes
14,137,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,212,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,055 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,312 >>> mbox cmd response: success
14,901,038 UART: [afmc] ++
14,901,759 UART: [afmc] CDI.KEYID = 6
14,902,970 UART: [afmc] SUBJECT.KEYID = 7
14,904,419 UART: [afmc] AUTHORITY.KEYID = 5
17,405,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,126,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,128,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,143,333 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,158,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,173,366 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,197,727 UART: [afmc] --
19,200,962 UART: [cold-reset] --
19,205,810 UART: [state] Locking Datavault
19,211,517 UART: [state] Locking PCR0, PCR1 and PCR31
19,213,724 UART: [state] Locking ICCM
19,216,545 UART: [exit] Launching FMC @ 0x40000130
19,225,240 UART:
19,225,481 UART: Running Caliptra FMC ...
19,226,588 UART:
19,226,753 UART: [state] CFI Enabled
19,234,535 UART: [fht] FMC Alias Private Key: 7
21,001,047 UART: [art] Extend RT PCRs Done
21,002,277 UART: [art] Lock RT PCRs Done
21,003,883 UART: [art] Populate DV Done
21,009,250 UART: [fht] FMC Alias Private Key: 7
21,010,905 UART: [art] Derive CDI
21,011,648 UART: [art] Store in slot 0x4
21,054,351 UART: [art] Derive Key Pair
21,055,387 UART: [art] Store priv key in slot 0x5
23,482,596 UART: [art] Derive Key Pair - Done
23,496,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,099 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,618 UART: [art] PUB.X = 098967A35579E5DD9A7187AE265E50353A7F15215BEEFDCFC437A65759C268C75B9C3A5BE5D4D991CEDB090EF9FA789D
25,211,026 UART: [art] PUB.Y = 26F35D1C152EDC0CF7384BC8129A6B4CFDF0C197AE1D84E8760E688731C7E5A69B4529A4A1A6B1E26ADD70C380558CD6
25,218,188 UART: [art] SIG.R = 26D4E7D1D4118EA2246EB5C72580CE3B13D5F9F92BA144E966295A67821FB9E0799D7F481D6902387E370835C3D700A0
25,225,512 UART: [art] SIG.S = 32AE924FA9E6DE5D30E8049759A90D765DE95511BD8F4EE8DE067F40DEED11B1F12B1AE5E49AB1FFC210846A872AE02D
26,204,137 UART: Caliptra RT
26,204,847 UART: [state] CFI Enabled
26,337,323 UART: [rt] RT listening for mailbox commands...
26,339,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,494,967 UART: [rt]cmd =0x41544d4e, len=14344
30,490,463 >>> mbox cmd response data (8 bytes)
30,491,235 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,521,750 UART: [rt]cmd =0x41545348, len=116
30,524,176 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.68s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,754,192 ready_for_fw is high
3,754,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,656 >>> mbox cmd response: success
19,293,594 UART:
19,294,003 UART: Running Caliptra FMC ...
19,295,160 UART:
19,295,321 UART: [state] CFI Enabled
19,303,461 UART: [fht] FMC Alias Private Key: 7
21,069,526 UART: [art] Extend RT PCRs Done
21,070,763 UART: [art] Lock RT PCRs Done
21,072,351 UART: [art] Populate DV Done
21,077,508 UART: [fht] FMC Alias Private Key: 7
21,079,115 UART: [art] Derive CDI
21,079,933 UART: [art] Store in slot 0x4
21,121,995 UART: [art] Derive Key Pair
21,123,043 UART: [art] Store priv key in slot 0x5
23,549,980 UART: [art] Derive Key Pair - Done
23,563,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,410 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,922 UART: [art] PUB.X = CC8F4670B30DC5CEE75475174F416F10099C717AAF3865E55F795D468E476C7BA510C9A4163CB00604F25BDD0B223262
25,278,138 UART: [art] PUB.Y = 86942F5669E36C833289C1E6E9C3195B28C66207AEE39DEDB6C3A0064E742A0C474B69748A084C2851D4CF0B827A5B5F
25,285,366 UART: [art] SIG.R = F184AE10C2B05684592F44CAE8D01B472709784F2B911D359AAAEC3EEDA93E69586065611E33C860AE6DC6D37E727485
25,292,786 UART: [art] SIG.S = 7456E2BD4EC5E4BFA3A447C5734FFA1483346A7AA894869549C926572BC2D9091616EC9A5D3D5D903D41E5511CEC47A7
26,271,671 UART: Caliptra RT
26,272,370 UART: [state] CFI Enabled
26,405,102 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,467,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,623,216 UART: [rt]cmd =0x41544d4e, len=14344
34,618,862 >>> mbox cmd response data (8 bytes)
34,619,464 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,650,110 UART: [rt]cmd =0x41545348, len=116
34,670,382 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,753,024 ready_for_fw is high
3,753,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,900 >>> mbox cmd response: success
19,294,024 UART:
19,294,436 UART: Running Caliptra FMC ...
19,295,675 UART:
19,295,850 UART: [state] CFI Enabled
19,303,530 UART: [fht] FMC Alias Private Key: 7
21,069,813 UART: [art] Extend RT PCRs Done
21,071,038 UART: [art] Lock RT PCRs Done
21,072,594 UART: [art] Populate DV Done
21,078,222 UART: [fht] FMC Alias Private Key: 7
21,079,822 UART: [art] Derive CDI
21,080,565 UART: [art] Store in slot 0x4
21,123,009 UART: [art] Derive Key Pair
21,124,058 UART: [art] Store priv key in slot 0x5
23,550,564 UART: [art] Derive Key Pair - Done
23,563,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,907 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,416 UART: [art] PUB.X = 86E550BDB0053606A9233D2742E66458B814A08955AB8A548CA4644114A9D400F9DCC4BAC14A38DAC83B8B705B855DE9
25,278,622 UART: [art] PUB.Y = 29EEE30CE2C2A00DA9C44B7D05940D50DEE2FAF02A0A8D210E2F72DA9B600C0D8C7F99D463A2CEB236FB205F4102DC0C
25,285,927 UART: [art] SIG.R = 2F35F3A380184F70E5A0EA2E9E5ED6591AFA81C26F6089B178F5D2107B0CA3C2E00221530098D6697BC5FA6B696C17DD
25,293,293 UART: [art] SIG.S = 0F49BD6139436EE003B3FB693FBD97CDF56B6142168E2A1BB9289C1958A63C6AD843BE75EA77527B65B660A429170154
26,272,013 UART: Caliptra RT
26,272,720 UART: [state] CFI Enabled
26,406,112 UART: [rt] RT listening for mailbox commands...
26,408,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,564,021 UART: [rt]cmd =0x41544d4e, len=14344
30,559,573 >>> mbox cmd response data (8 bytes)
30,560,153 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,590,940 UART: [rt]cmd =0x41545348, len=116
30,593,365 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,055 UART: [kat] SHA2-256
881,986 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,101 UART: [kat] ++
886,253 UART: [kat] sha1
890,279 UART: [kat] SHA2-256
892,217 UART: [kat] SHA2-384
895,188 UART: [kat] SHA2-512-ACC
897,089 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,422 UART: [kat] LMS
1,475,618 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,878 UART: [idev] ++
1,480,046 UART: [idev] CDI.KEYID = 6
1,480,406 UART: [idev] SUBJECT.KEYID = 7
1,480,830 UART: [idev] UDS.KEYID = 0
1,481,175 ready_for_fw is high
1,481,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,504,680 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,154 UART: [idev] --
1,514,331 UART: [ldev] ++
1,514,499 UART: [ldev] CDI.KEYID = 6
1,514,862 UART: [ldev] SUBJECT.KEYID = 5
1,515,288 UART: [ldev] AUTHORITY.KEYID = 7
1,515,751 UART: [ldev] FE.KEYID = 1
1,520,975 UART: [ldev] Erasing FE.KEYID = 1
1,546,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,672 UART: [ldev] --
1,585,117 UART: [fwproc] Waiting for Commands...
1,585,784 UART: [fwproc] Received command 0x46574c44
1,586,575 UART: [fwproc] Received Image of size 118548 bytes
2,931,125 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,797 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,344 >>> mbox cmd response: success
3,131,594 UART: [afmc] ++
3,131,762 UART: [afmc] CDI.KEYID = 6
3,132,124 UART: [afmc] SUBJECT.KEYID = 7
3,132,549 UART: [afmc] AUTHORITY.KEYID = 5
3,167,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,279 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,162 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,845 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,667 UART: [afmc] --
3,210,609 UART: [cold-reset] --
3,211,497 UART: [state] Locking Datavault
3,212,646 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,250 UART: [state] Locking ICCM
3,213,906 UART: [exit] Launching FMC @ 0x40000130
3,219,236 UART:
3,219,252 UART: Running Caliptra FMC ...
3,219,660 UART:
3,219,714 UART: [state] CFI Enabled
3,229,990 UART: [fht] FMC Alias Private Key: 7
3,348,778 UART: [art] Extend RT PCRs Done
3,349,206 UART: [art] Lock RT PCRs Done
3,350,790 UART: [art] Populate DV Done
3,359,163 UART: [fht] FMC Alias Private Key: 7
3,360,243 UART: [art] Derive CDI
3,360,523 UART: [art] Store in slot 0x4
3,446,003 UART: [art] Derive Key Pair
3,446,363 UART: [art] Store priv key in slot 0x5
3,459,376 UART: [art] Derive Key Pair - Done
3,474,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,332 UART: [art] PUB.X = 937F62C587F9830AC5FF2087F639847D8CD7226C068945970A2E466CAF5BEA45B941B984DC59603D8D6CCBCF649D0C62
3,497,094 UART: [art] PUB.Y = 88EF0A4FC5881714CC05CCA9E50ED1DBDF928B21C701C32ED3063C879FD380372284669660F4F43BA27F5858A09F8158
3,504,031 UART: [art] SIG.R = 9E7F4B2F00E488509844816B385CD44A2CAAADD8BF3E3E1D4093CE243432F9A75146E04A3EAA768B8A3F34B9C8B05762
3,510,787 UART: [art] SIG.S = FAFA8BB6116F81E6B2301D1CC5E8AC42DC0B9B7565944DB5465E504C54DAF441E88F3B7D148F0D1E678F059AA08AC75A
3,534,256 UART: Caliptra RT
3,534,507 UART: [state] CFI Enabled
3,654,954 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,655,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,544 UART: [rt]cmd =0x41544d4e, len=14344
4,088,579 >>> mbox cmd response data (8 bytes)
4,088,580 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,817 UART: [rt]cmd =0x41545348, len=116
4,140,858 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,170 UART: [state] LifecycleState = Unprovisioned
85,825 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,310 UART: [kat] SHA2-512-ACC
897,211 UART: [kat] ECC-384
903,004 UART: [kat] HMAC-384Kdf
907,494 UART: [kat] LMS
1,475,690 UART: [kat] --
1,476,515 UART: [cold-reset] ++
1,476,933 UART: [fht] Storing FHT @ 0x50003400
1,479,776 UART: [idev] ++
1,479,944 UART: [idev] CDI.KEYID = 6
1,480,304 UART: [idev] SUBJECT.KEYID = 7
1,480,728 UART: [idev] UDS.KEYID = 0
1,481,073 ready_for_fw is high
1,481,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,018 UART: [idev] Erasing UDS.KEYID = 0
1,505,682 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,258 UART: [idev] --
1,515,305 UART: [ldev] ++
1,515,473 UART: [ldev] CDI.KEYID = 6
1,515,836 UART: [ldev] SUBJECT.KEYID = 5
1,516,262 UART: [ldev] AUTHORITY.KEYID = 7
1,516,725 UART: [ldev] FE.KEYID = 1
1,522,105 UART: [ldev] Erasing FE.KEYID = 1
1,547,524 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,916 UART: [ldev] --
1,586,217 UART: [fwproc] Waiting for Commands...
1,586,964 UART: [fwproc] Received command 0x46574c44
1,587,755 UART: [fwproc] Received Image of size 118548 bytes
2,931,541 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,807 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,025 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,474 >>> mbox cmd response: success
3,132,662 UART: [afmc] ++
3,132,830 UART: [afmc] CDI.KEYID = 6
3,133,192 UART: [afmc] SUBJECT.KEYID = 7
3,133,617 UART: [afmc] AUTHORITY.KEYID = 5
3,169,026 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,126 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,718 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,401 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,239 UART: [afmc] --
3,212,351 UART: [cold-reset] --
3,213,135 UART: [state] Locking Datavault
3,214,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,986 UART: [state] Locking ICCM
3,215,608 UART: [exit] Launching FMC @ 0x40000130
3,220,938 UART:
3,220,954 UART: Running Caliptra FMC ...
3,221,362 UART:
3,221,416 UART: [state] CFI Enabled
3,232,098 UART: [fht] FMC Alias Private Key: 7
3,351,238 UART: [art] Extend RT PCRs Done
3,351,666 UART: [art] Lock RT PCRs Done
3,353,368 UART: [art] Populate DV Done
3,361,519 UART: [fht] FMC Alias Private Key: 7
3,362,489 UART: [art] Derive CDI
3,362,769 UART: [art] Store in slot 0x4
3,448,553 UART: [art] Derive Key Pair
3,448,913 UART: [art] Store priv key in slot 0x5
3,462,632 UART: [art] Derive Key Pair - Done
3,477,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,604 UART: [art] PUB.X = 421604B89141EB143A88E3F33F16312517E06E32FA4031C63D8976FEC1180C32469989317493B9D920336D2ED62C0967
3,500,349 UART: [art] PUB.Y = 06A7D9DB6A840A3834DAEC537FE004D80DBDA21F7CB867EBD592FB1EC666591FB84E5F8F3BA4A83EAAEDFAC8C4B7107B
3,507,317 UART: [art] SIG.R = DAE254C70CE64E02911917E4F2D02C9C346EEB984028678ACD86E7626C3593F96B0EFBC32F357C8C29ECB250A1F46F03
3,514,083 UART: [art] SIG.S = 257878E4B79C602D33B6E662D3CC3E2A7288E53C2605B660546CA5D061F9F2E67AD9AF3D94CAAE330A204FAEAC48BA66
3,537,473 UART: Caliptra RT
3,537,724 UART: [state] CFI Enabled
3,657,034 UART: [rt] RT listening for mailbox commands...
3,657,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,444 UART: [rt]cmd =0x41544d4e, len=14344
4,090,186 >>> mbox cmd response data (8 bytes)
4,090,187 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,190 UART: [rt]cmd =0x41545348, len=116
4,122,155 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,157 ready_for_fw is high
1,363,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,842 >>> mbox cmd response: success
3,043,729 UART:
3,043,745 UART: Running Caliptra FMC ...
3,044,153 UART:
3,044,207 UART: [state] CFI Enabled
3,054,369 UART: [fht] FMC Alias Private Key: 7
3,173,529 UART: [art] Extend RT PCRs Done
3,173,957 UART: [art] Lock RT PCRs Done
3,175,599 UART: [art] Populate DV Done
3,184,138 UART: [fht] FMC Alias Private Key: 7
3,185,096 UART: [art] Derive CDI
3,185,376 UART: [art] Store in slot 0x4
3,270,962 UART: [art] Derive Key Pair
3,271,322 UART: [art] Store priv key in slot 0x5
3,283,819 UART: [art] Derive Key Pair - Done
3,298,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,548 UART: [art] PUB.X = F33C75BF8B0C2DF2D14D535F9995679BFD563AD23C5EB662453D90877D0433F68A1DCA2FBE4E99CD19088A8D9B5A794B
3,321,321 UART: [art] PUB.Y = A187DACA962450E8F447C63222859F95B7BAB79DFD94C6A14AD54525761CA44A25BF65E8DC519DBFA77B7783A921F366
3,328,279 UART: [art] SIG.R = CB5989855F7DF799D6CD0699CBD83625E77473B63845446A38FB0866FC421100613947B7C6D09E4724F772200EDBF5A3
3,335,012 UART: [art] SIG.S = 49968E6E622CD35430C0759D7CFD5958AFD70E9FED612DEB20339B8B33C7385E2702D965083FAD2B3EDEEF43DE64D319
3,358,545 UART: Caliptra RT
3,358,796 UART: [state] CFI Enabled
3,479,496 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,242 UART: [rt]cmd =0x41544d4e, len=14344
3,912,975 >>> mbox cmd response data (8 bytes)
3,912,976 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,291 UART: [rt]cmd =0x41545348, len=116
3,965,154 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,081 ready_for_fw is high
1,363,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,580 >>> mbox cmd response: success
3,042,291 UART:
3,042,307 UART: Running Caliptra FMC ...
3,042,715 UART:
3,042,769 UART: [state] CFI Enabled
3,053,011 UART: [fht] FMC Alias Private Key: 7
3,172,099 UART: [art] Extend RT PCRs Done
3,172,527 UART: [art] Lock RT PCRs Done
3,174,213 UART: [art] Populate DV Done
3,182,616 UART: [fht] FMC Alias Private Key: 7
3,183,766 UART: [art] Derive CDI
3,184,046 UART: [art] Store in slot 0x4
3,269,842 UART: [art] Derive Key Pair
3,270,202 UART: [art] Store priv key in slot 0x5
3,283,711 UART: [art] Derive Key Pair - Done
3,298,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,985 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,750 UART: [art] PUB.X = 2989FDFFEC54E38A4348BE55C225F0278627675D52201F5DFC8B596B543BA0C5D33CADAD6C67F3AA017411188F1EC47D
3,321,527 UART: [art] PUB.Y = A68819555545413160CBEA58C31E5392B20A63CB82BF09384D6913425324F824EC8442EB3BE8B5EF1FC4EC341BC4AE2E
3,328,475 UART: [art] SIG.R = 8B886B835EC09CAA85FD0A9D2F5172047A386C44C9ECDE1B7B830AAFC8F8254FE5948FBFC9A9E0D8B70D41F87A86AD74
3,335,253 UART: [art] SIG.S = BFBD4B78A01F3D009072CA05898F3BA1A09DDE4F9166A511E879BF8ADBA940884A791E324BFF75F805CC1A7E784F5BAA
3,359,417 UART: Caliptra RT
3,359,668 UART: [state] CFI Enabled
3,480,199 UART: [rt] RT listening for mailbox commands...
3,480,869 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,025 UART: [rt]cmd =0x41544d4e, len=14344
3,914,153 >>> mbox cmd response data (8 bytes)
3,914,154 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,299 UART: [rt]cmd =0x41545348, len=116
3,946,422 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,297 UART: [state] LifecycleState = Unprovisioned
85,952 UART: [state] DebugLocked = No
86,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,102 UART: [kat] SHA2-256
882,033 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,148 UART: [kat] ++
886,300 UART: [kat] sha1
890,544 UART: [kat] SHA2-256
892,482 UART: [kat] SHA2-384
895,151 UART: [kat] SHA2-512-ACC
897,052 UART: [kat] ECC-384
902,767 UART: [kat] HMAC-384Kdf
907,461 UART: [kat] LMS
1,475,657 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,476,946 UART: [fht] Storing FHT @ 0x50003400
1,479,755 UART: [idev] ++
1,479,923 UART: [idev] CDI.KEYID = 6
1,480,283 UART: [idev] SUBJECT.KEYID = 7
1,480,707 UART: [idev] UDS.KEYID = 0
1,481,052 ready_for_fw is high
1,481,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,409 UART: [idev] Erasing UDS.KEYID = 0
1,505,159 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,797 UART: [idev] --
1,515,060 UART: [ldev] ++
1,515,228 UART: [ldev] CDI.KEYID = 6
1,515,591 UART: [ldev] SUBJECT.KEYID = 5
1,516,017 UART: [ldev] AUTHORITY.KEYID = 7
1,516,480 UART: [ldev] FE.KEYID = 1
1,521,816 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,771 UART: [ldev] --
1,587,170 UART: [fwproc] Waiting for Commands...
1,587,919 UART: [fwproc] Received command 0x46574c44
1,588,710 UART: [fwproc] Received Image of size 118548 bytes
2,933,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,312 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,530 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,753 >>> mbox cmd response: success
3,132,937 UART: [afmc] ++
3,133,105 UART: [afmc] CDI.KEYID = 6
3,133,467 UART: [afmc] SUBJECT.KEYID = 7
3,133,892 UART: [afmc] AUTHORITY.KEYID = 5
3,169,465 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,583 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,363 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,072 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,955 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,638 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,684 UART: [afmc] --
3,212,778 UART: [cold-reset] --
3,213,610 UART: [state] Locking Datavault
3,215,027 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,631 UART: [state] Locking ICCM
3,216,129 UART: [exit] Launching FMC @ 0x40000130
3,221,459 UART:
3,221,475 UART: Running Caliptra FMC ...
3,221,883 UART:
3,222,026 UART: [state] CFI Enabled
3,232,600 UART: [fht] FMC Alias Private Key: 7
3,351,854 UART: [art] Extend RT PCRs Done
3,352,282 UART: [art] Lock RT PCRs Done
3,353,860 UART: [art] Populate DV Done
3,361,943 UART: [fht] FMC Alias Private Key: 7
3,363,099 UART: [art] Derive CDI
3,363,379 UART: [art] Store in slot 0x4
3,449,545 UART: [art] Derive Key Pair
3,449,905 UART: [art] Store priv key in slot 0x5
3,463,104 UART: [art] Derive Key Pair - Done
3,477,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,398 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,163 UART: [art] PUB.X = 4FB37B6A0319066C1E9C3C7F0E8FF2598212B5FEB33765838869C913D78ADD323E5E58121BAC19C6E2CEE918BB06D08E
3,500,929 UART: [art] PUB.Y = 9C09E229A2B374BD5BC4E65DA265F62984726BBD3AC6147AA0226A3F9CC8EC7FD3D577ED1D681AAF5453219DD21D383C
3,507,890 UART: [art] SIG.R = 33675757D7DFB3A2ED437E9CB08E1E6CE0664CF0231883E78391A67073D5BFF6087C666F32160F1BCA42F5AE797EF165
3,514,658 UART: [art] SIG.S = D02BF6E5C4796F53DB46B411BED77ED6AEFAC07AEF5EF0CB097A9821374EA41D536DB43ABCF78466336141422A1E5A5A
3,538,681 UART: Caliptra RT
3,539,024 UART: [state] CFI Enabled
3,660,214 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,660,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,700 UART: [rt]cmd =0x41544d4e, len=14344
4,092,909 >>> mbox cmd response data (8 bytes)
4,092,910 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,989 UART: [rt]cmd =0x41545348, len=116
4,144,510 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,902 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,548 UART: [kat] SHA2-256
882,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,594 UART: [kat] ++
886,746 UART: [kat] sha1
890,956 UART: [kat] SHA2-256
892,894 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
902,901 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,020 UART: [fht] Storing FHT @ 0x50003400
1,479,739 UART: [idev] ++
1,479,907 UART: [idev] CDI.KEYID = 6
1,480,267 UART: [idev] SUBJECT.KEYID = 7
1,480,691 UART: [idev] UDS.KEYID = 0
1,481,036 ready_for_fw is high
1,481,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,506,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,117 UART: [idev] --
1,516,066 UART: [ldev] ++
1,516,234 UART: [ldev] CDI.KEYID = 6
1,516,597 UART: [ldev] SUBJECT.KEYID = 5
1,517,023 UART: [ldev] AUTHORITY.KEYID = 7
1,517,486 UART: [ldev] FE.KEYID = 1
1,522,936 UART: [ldev] Erasing FE.KEYID = 1
1,548,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,779 UART: [ldev] --
1,588,196 UART: [fwproc] Waiting for Commands...
1,588,959 UART: [fwproc] Received command 0x46574c44
1,589,750 UART: [fwproc] Received Image of size 118548 bytes
2,934,058 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,460 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,678 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,997 >>> mbox cmd response: success
3,134,097 UART: [afmc] ++
3,134,265 UART: [afmc] CDI.KEYID = 6
3,134,627 UART: [afmc] SUBJECT.KEYID = 7
3,135,052 UART: [afmc] AUTHORITY.KEYID = 5
3,170,503 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,020 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,922 UART: [afmc] --
3,213,822 UART: [cold-reset] --
3,214,600 UART: [state] Locking Datavault
3,215,875 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,479 UART: [state] Locking ICCM
3,217,049 UART: [exit] Launching FMC @ 0x40000130
3,222,379 UART:
3,222,395 UART: Running Caliptra FMC ...
3,222,803 UART:
3,222,946 UART: [state] CFI Enabled
3,233,682 UART: [fht] FMC Alias Private Key: 7
3,352,630 UART: [art] Extend RT PCRs Done
3,353,058 UART: [art] Lock RT PCRs Done
3,354,810 UART: [art] Populate DV Done
3,363,035 UART: [fht] FMC Alias Private Key: 7
3,364,023 UART: [art] Derive CDI
3,364,303 UART: [art] Store in slot 0x4
3,449,783 UART: [art] Derive Key Pair
3,450,143 UART: [art] Store priv key in slot 0x5
3,463,054 UART: [art] Derive Key Pair - Done
3,477,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,183 UART: [art] PUB.X = 08D0808F789AF00D6EFF5B8CAE779468148FFEF71AF7F7E2A5945EE57922E680422A100F1B055DB5536D526EF8748D00
3,500,923 UART: [art] PUB.Y = BEBEA7DB3CCA466E2155C142AA145B49C956E3645243136C6FAABBA1BF46410896B807C00CC742CE4EF63DE544626C10
3,507,876 UART: [art] SIG.R = 4A19116050DAB4D17DE59D4CABBB88E2B3AE6D21252351DAEA22344282787F97369ABF2CC192EDE33B0833840F8E30C4
3,514,648 UART: [art] SIG.S = BEBDA301C3FCEB36D9F7B6A87CD66EB94291A6989D0BB7FFF76BA5EB26FE1834FB9B986E3F5155CE73B3B97FFD130F07
3,538,466 UART: Caliptra RT
3,538,809 UART: [state] CFI Enabled
3,658,759 UART: [rt] RT listening for mailbox commands...
3,659,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,335 UART: [rt]cmd =0x41544d4e, len=14344
4,092,827 >>> mbox cmd response data (8 bytes)
4,092,828 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,747 UART: [rt]cmd =0x41545348, len=116
4,124,524 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,126 ready_for_fw is high
1,363,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,179 >>> mbox cmd response: success
3,043,442 UART:
3,043,458 UART: Running Caliptra FMC ...
3,043,866 UART:
3,044,009 UART: [state] CFI Enabled
3,054,615 UART: [fht] FMC Alias Private Key: 7
3,173,773 UART: [art] Extend RT PCRs Done
3,174,201 UART: [art] Lock RT PCRs Done
3,175,983 UART: [art] Populate DV Done
3,184,356 UART: [fht] FMC Alias Private Key: 7
3,185,288 UART: [art] Derive CDI
3,185,568 UART: [art] Store in slot 0x4
3,271,254 UART: [art] Derive Key Pair
3,271,614 UART: [art] Store priv key in slot 0x5
3,284,807 UART: [art] Derive Key Pair - Done
3,299,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,651 UART: [art] PUB.X = 4D7E254D3F8334EAA6A5B95B179CFA2E26CDA87E9676FE24110CFBC782797B2F9169FFCBA64FB80F2C969936D642E761
3,322,427 UART: [art] PUB.Y = BBB360EED605CBA6502C123A66AF4A82E8112C5C091AB43225E715AF077DA8EF6E0BB0A8472E3BBEB73008FE7C5BBDA6
3,329,384 UART: [art] SIG.R = 7EE7655913A2B97F26949F63E475F503689874DF3E9BF80EC42A76FE3672A4F57BDFA57CE68BFD48AF6C6B4CDA9129F2
3,336,160 UART: [art] SIG.S = 347026E41455F15C2F0E8E3BA832E6CC8B94042FD044BB96AC34C541A5CA2AB9E96527D2958487F507034E1BC0A38BA0
3,360,340 UART: Caliptra RT
3,360,683 UART: [state] CFI Enabled
3,481,362 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,482,032 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,082 UART: [rt]cmd =0x41544d4e, len=14344
3,915,679 >>> mbox cmd response data (8 bytes)
3,915,680 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,867 UART: [rt]cmd =0x41545348, len=116
3,968,944 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 ready_for_fw is high
1,362,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,443 >>> mbox cmd response: success
3,044,596 UART:
3,044,612 UART: Running Caliptra FMC ...
3,045,020 UART:
3,045,163 UART: [state] CFI Enabled
3,055,907 UART: [fht] FMC Alias Private Key: 7
3,174,651 UART: [art] Extend RT PCRs Done
3,175,079 UART: [art] Lock RT PCRs Done
3,176,755 UART: [art] Populate DV Done
3,185,084 UART: [fht] FMC Alias Private Key: 7
3,186,186 UART: [art] Derive CDI
3,186,466 UART: [art] Store in slot 0x4
3,272,024 UART: [art] Derive Key Pair
3,272,384 UART: [art] Store priv key in slot 0x5
3,286,221 UART: [art] Derive Key Pair - Done
3,301,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,614 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,379 UART: [art] PUB.X = 9BB24457CDE94B51D0E4A8C1EA4584D13218D57ACA94FD1B3C577DD682FEB3BCE27458CFE2D76B676F8AC748B97C7173
3,324,165 UART: [art] PUB.Y = 304BA9EB1C6F93190BBAE5B5AF40DF5CF15CF5CCF6BCFAEF19904D81467B8495A0D6C55D39E9F2B80F7EE18CBE944722
3,331,133 UART: [art] SIG.R = 5E98711F86D938F8F18B9307A1044839FD265FF094077344883068048C2C4DBE204B69DF8F4E3917091CCA5537F12BAB
3,337,882 UART: [art] SIG.S = 1D5F04B2F6C7C99E152834BC9AA1D37EDD5957DB54E1DFA5CE58BEAF8509B22202C24ED25E073DC4E97001E2CA8CA0BA
3,362,555 UART: Caliptra RT
3,362,898 UART: [state] CFI Enabled
3,482,487 UART: [rt] RT listening for mailbox commands...
3,483,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,359 UART: [rt]cmd =0x41544d4e, len=14344
3,916,209 >>> mbox cmd response data (8 bytes)
3,916,210 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,351 UART: [rt]cmd =0x41545348, len=116
3,948,150 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,385 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,676 UART: [kat] SHA2-256
901,616 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,379 UART: [kat] LMS
1,168,691 UART: [kat] --
1,169,884 UART: [cold-reset] ++
1,170,318 UART: [fht] FHT @ 0x50003400
1,173,148 UART: [idev] ++
1,173,316 UART: [idev] CDI.KEYID = 6
1,173,677 UART: [idev] SUBJECT.KEYID = 7
1,174,102 UART: [idev] UDS.KEYID = 0
1,174,448 ready_for_fw is high
1,174,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,351 UART: [idev] Erasing UDS.KEYID = 0
1,199,579 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,648 UART: [ldev] ++
1,209,816 UART: [ldev] CDI.KEYID = 6
1,210,180 UART: [ldev] SUBJECT.KEYID = 5
1,210,607 UART: [ldev] AUTHORITY.KEYID = 7
1,211,070 UART: [ldev] FE.KEYID = 1
1,216,022 UART: [ldev] Erasing FE.KEYID = 1
1,242,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,426 UART: [ldev] --
1,281,733 UART: [fwproc] Wait for Commands...
1,282,312 UART: [fwproc] Recv command 0x46574c44
1,283,045 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,492 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,099 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,589 >>> mbox cmd response: success
2,827,837 UART: [afmc] ++
2,828,005 UART: [afmc] CDI.KEYID = 6
2,828,368 UART: [afmc] SUBJECT.KEYID = 7
2,828,794 UART: [afmc] AUTHORITY.KEYID = 5
2,863,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,786 UART: [afmc] --
2,906,741 UART: [cold-reset] --
2,907,711 UART: [state] Locking Datavault
2,908,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,294 UART: [state] Locking ICCM
2,909,796 UART: [exit] Launching FMC @ 0x40000130
2,915,126 UART:
2,915,142 UART: Running Caliptra FMC ...
2,915,550 UART:
2,915,604 UART: [state] CFI Enabled
2,925,888 UART: [fht] FMC Alias Private Key: 7
3,044,876 UART: [art] Extend RT PCRs Done
3,045,304 UART: [art] Lock RT PCRs Done
3,046,818 UART: [art] Populate DV Done
3,054,829 UART: [fht] FMC Alias Private Key: 7
3,055,995 UART: [art] Derive CDI
3,056,275 UART: [art] Store in slot 0x4
3,141,864 UART: [art] Derive Key Pair
3,142,224 UART: [art] Store priv key in slot 0x5
3,155,112 UART: [art] Derive Key Pair - Done
3,170,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,775 UART: [art] PUB.X = 1CF9287A0439A3A00DCDDE83C8FF3758FEADA7F17761CEB3BE545D27F6F7EE81166DC59E7E98393D94808BDCB485015A
3,193,552 UART: [art] PUB.Y = 636D7F38B59430E2AEEB93F107568D64D89969DF690E138D98ED150E6D03CC9E8B90AEC06A4E11ED1080DF0BA3669E34
3,200,495 UART: [art] SIG.R = 917BC4A6859D4FBEDE4BA0449512D2E14F14336D49696D93AFC4CDC09D59C8FA1F517F9CB80342FF8BC485BBB319BCF4
3,207,280 UART: [art] SIG.S = 88C1065E62FB68875974447EB1890077D8633399A7500992E1057FA55F97C0AF30342E1AA57C59CB7DAB4E9EDF1C504A
3,231,473 UART: Caliptra RT
3,231,724 UART: [state] CFI Enabled
3,351,762 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,346 UART: [rt]cmd =0x41544d4e, len=14344
3,785,057 >>> mbox cmd response data (8 bytes)
3,785,058 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,249 UART: [rt]cmd =0x41545348, len=116
3,836,792 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
87,053 UART: [state] WD Timer not started. Device not locked for debugging
88,352 UART: [kat] SHA2-256
891,902 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,006 UART: [kat] ++
896,158 UART: [kat] sha1
900,382 UART: [kat] SHA2-256
902,322 UART: [kat] SHA2-384
905,133 UART: [kat] SHA2-512-ACC
907,034 UART: [kat] ECC-384
916,535 UART: [kat] HMAC-384Kdf
921,155 UART: [kat] LMS
1,169,467 UART: [kat] --
1,170,358 UART: [cold-reset] ++
1,170,762 UART: [fht] FHT @ 0x50003400
1,173,402 UART: [idev] ++
1,173,570 UART: [idev] CDI.KEYID = 6
1,173,931 UART: [idev] SUBJECT.KEYID = 7
1,174,356 UART: [idev] UDS.KEYID = 0
1,174,702 ready_for_fw is high
1,174,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,499 UART: [idev] Sha1 KeyId Algorithm
1,208,231 UART: [idev] --
1,209,258 UART: [ldev] ++
1,209,426 UART: [ldev] CDI.KEYID = 6
1,209,790 UART: [ldev] SUBJECT.KEYID = 5
1,210,217 UART: [ldev] AUTHORITY.KEYID = 7
1,210,680 UART: [ldev] FE.KEYID = 1
1,215,842 UART: [ldev] Erasing FE.KEYID = 1
1,242,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,310 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x46574c44
1,283,127 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,537 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,953 >>> mbox cmd response: success
2,827,133 UART: [afmc] ++
2,827,301 UART: [afmc] CDI.KEYID = 6
2,827,664 UART: [afmc] SUBJECT.KEYID = 7
2,828,090 UART: [afmc] AUTHORITY.KEYID = 5
2,862,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,052 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,801 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,093 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,722 UART: [afmc] --
2,905,577 UART: [cold-reset] --
2,906,359 UART: [state] Locking Datavault
2,907,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,326 UART: [state] Locking ICCM
2,908,942 UART: [exit] Launching FMC @ 0x40000130
2,914,272 UART:
2,914,288 UART: Running Caliptra FMC ...
2,914,696 UART:
2,914,750 UART: [state] CFI Enabled
2,925,026 UART: [fht] FMC Alias Private Key: 7
3,043,802 UART: [art] Extend RT PCRs Done
3,044,230 UART: [art] Lock RT PCRs Done
3,045,656 UART: [art] Populate DV Done
3,053,981 UART: [fht] FMC Alias Private Key: 7
3,054,967 UART: [art] Derive CDI
3,055,247 UART: [art] Store in slot 0x4
3,141,106 UART: [art] Derive Key Pair
3,141,466 UART: [art] Store priv key in slot 0x5
3,154,744 UART: [art] Derive Key Pair - Done
3,169,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,712 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,477 UART: [art] PUB.X = 7CC649A86F1A1B67CCBAA22064B06A7FBF2B0C1DB50334569BC23CE28C6B2265AD5D15E6632AA6F60AF46D615B929D0C
3,192,251 UART: [art] PUB.Y = 4647BAF05F02034DDC1E51721EFC1ECE07C0949A567F67F3184F7DB062FF0A642D4965A3D2B7F1A3CA4A95BF1DB8F75E
3,199,205 UART: [art] SIG.R = E9F9616858339E647D5F09922023DE8A5B1024E6291F3D89C6860D729896945230DD2F5DABF48CD88FD64A53C515BC5B
3,205,967 UART: [art] SIG.S = 20E61AE9C2E6E95482430C6AE4A2992BE0866A6CCC87E65224F34FF33203B5291CB3D3FD7BB9E5831406C4A26463B628
3,229,458 UART: Caliptra RT
3,229,709 UART: [state] CFI Enabled
3,349,146 UART: [rt] RT listening for mailbox commands...
3,349,816 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,834 UART: [rt]cmd =0x41544d4e, len=14344
3,782,830 >>> mbox cmd response data (8 bytes)
3,782,831 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,000 UART: [rt]cmd =0x41545348, len=116
3,814,789 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,988 ready_for_fw is high
1,058,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,192 >>> mbox cmd response: success
2,740,003 UART:
2,740,019 UART: Running Caliptra FMC ...
2,740,427 UART:
2,740,481 UART: [state] CFI Enabled
2,750,463 UART: [fht] FMC Alias Private Key: 7
2,869,527 UART: [art] Extend RT PCRs Done
2,869,955 UART: [art] Lock RT PCRs Done
2,871,657 UART: [art] Populate DV Done
2,879,822 UART: [fht] FMC Alias Private Key: 7
2,880,940 UART: [art] Derive CDI
2,881,220 UART: [art] Store in slot 0x4
2,967,003 UART: [art] Derive Key Pair
2,967,363 UART: [art] Store priv key in slot 0x5
2,980,439 UART: [art] Derive Key Pair - Done
2,995,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,270 UART: [art] PUB.X = 8017CFD55DA4F21D7FEB0634C538A55B9E36CE7EC672AA8ABEAE9CBF8F4DA23A5132360C8E441BD665435EF6D6F2D692
3,018,054 UART: [art] PUB.Y = 1632C734F3A4D4A0A2FB3BE51B3BC70A180000C82A46BEC312BA610CF43DBDE02A181B31BC81EB47AC0043D4CADAB298
3,024,952 UART: [art] SIG.R = 14A2558A52A928AE013ED3D6FF9386E526EA03732BD23D763855EC84E0967A5C3ED7D2571C84FF1EE5E065E7713186BE
3,031,720 UART: [art] SIG.S = 73F394C351901C60253C707A04FD740E5E7E0FCEB2596CBD5E69993135E990CC932F37B8E48B768270155417F0EF13DF
3,055,379 UART: Caliptra RT
3,055,630 UART: [state] CFI Enabled
3,175,716 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,176,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,258 UART: [rt]cmd =0x41544d4e, len=14344
3,609,621 >>> mbox cmd response data (8 bytes)
3,609,622 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,733 UART: [rt]cmd =0x41545348, len=116
3,662,552 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,226 ready_for_fw is high
1,059,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,954 >>> mbox cmd response: success
2,739,687 UART:
2,739,703 UART: Running Caliptra FMC ...
2,740,111 UART:
2,740,165 UART: [state] CFI Enabled
2,750,601 UART: [fht] FMC Alias Private Key: 7
2,869,241 UART: [art] Extend RT PCRs Done
2,869,669 UART: [art] Lock RT PCRs Done
2,871,069 UART: [art] Populate DV Done
2,879,376 UART: [fht] FMC Alias Private Key: 7
2,880,362 UART: [art] Derive CDI
2,880,642 UART: [art] Store in slot 0x4
2,966,099 UART: [art] Derive Key Pair
2,966,459 UART: [art] Store priv key in slot 0x5
2,980,011 UART: [art] Derive Key Pair - Done
2,995,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,522 UART: [art] PUB.X = 25379DEE61A1129CA18CED7D95BF280BB8C1779C6053F29E2532AECA7228DB872213543C93F7242290E28E480B93B4A0
3,018,286 UART: [art] PUB.Y = 780CAE1C7B106172F47C3BEEBB9B0A6B009882920490D8BEB8C74F277C0DD62E2ABC5036189396959859A1CFCA1A3B05
3,025,207 UART: [art] SIG.R = 755593CFF489F27EF7D67C3E8275E4CAC8E8F279802E85B4A10432BA1EFFF4EF9F4702517413C9060E569F5C9559EC36
3,031,969 UART: [art] SIG.S = 265607E4EA3F5FC85B5AD3AC2C0D7FCF5E1120AC9694F57F7F30F755F2748A0C6196BBB9426C88BA988877C67D90EB73
3,055,270 UART: Caliptra RT
3,055,521 UART: [state] CFI Enabled
3,175,263 UART: [rt] RT listening for mailbox commands...
3,175,933 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,113 UART: [rt]cmd =0x41544d4e, len=14344
3,609,921 >>> mbox cmd response data (8 bytes)
3,609,922 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,747 UART: [rt]cmd =0x41545348, len=116
3,641,944 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,816 UART: [kat] HMAC-384Kdf
921,492 UART: [kat] LMS
1,169,804 UART: [kat] --
1,170,911 UART: [cold-reset] ++
1,171,449 UART: [fht] FHT @ 0x50003400
1,173,963 UART: [idev] ++
1,174,131 UART: [idev] CDI.KEYID = 6
1,174,492 UART: [idev] SUBJECT.KEYID = 7
1,174,917 UART: [idev] UDS.KEYID = 0
1,175,263 ready_for_fw is high
1,175,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,080 UART: [idev] Erasing UDS.KEYID = 0
1,200,264 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,216,661 UART: [ldev] Erasing FE.KEYID = 1
1,242,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,084 UART: [fwproc] Wait for Commands...
1,282,735 UART: [fwproc] Recv command 0x46574c44
1,283,468 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,550 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,074 >>> mbox cmd response: success
2,827,142 UART: [afmc] ++
2,827,310 UART: [afmc] CDI.KEYID = 6
2,827,673 UART: [afmc] SUBJECT.KEYID = 7
2,828,099 UART: [afmc] AUTHORITY.KEYID = 5
2,864,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,973 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,674 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,467 UART: [afmc] --
2,907,364 UART: [cold-reset] --
2,908,452 UART: [state] Locking Datavault
2,909,589 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,193 UART: [state] Locking ICCM
2,910,723 UART: [exit] Launching FMC @ 0x40000130
2,916,053 UART:
2,916,069 UART: Running Caliptra FMC ...
2,916,477 UART:
2,916,620 UART: [state] CFI Enabled
2,927,128 UART: [fht] FMC Alias Private Key: 7
3,045,670 UART: [art] Extend RT PCRs Done
3,046,098 UART: [art] Lock RT PCRs Done
3,047,516 UART: [art] Populate DV Done
3,055,841 UART: [fht] FMC Alias Private Key: 7
3,056,823 UART: [art] Derive CDI
3,057,103 UART: [art] Store in slot 0x4
3,143,306 UART: [art] Derive Key Pair
3,143,666 UART: [art] Store priv key in slot 0x5
3,157,746 UART: [art] Derive Key Pair - Done
3,172,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,420 UART: [art] PUB.X = 5EE25FEC954B14793AC7BF103D647C3B36145DE6D8B2A621F2C1B7EBF714F510549C4CB209647A531F2FC9BE66B297BA
3,196,199 UART: [art] PUB.Y = 1466B08A6BB51E284660AD52A2B91A4BC7D26A46FC28A9559D3381D9C7AFAF08ED7D4309E1C97F03980C125930232F56
3,203,139 UART: [art] SIG.R = 72D3C562994B568174743C9DA38660F5B1B3EDCC68409439946E297F1F1D734E83B191037A6232AD134465AEDA6AB772
3,209,900 UART: [art] SIG.S = 54712DC4F91419350E18041C9900AA3D6ABD64546D221D21E5A42AE14BA8C17F445F6F232E04B9A22598FD27350F798B
3,233,002 UART: Caliptra RT
3,233,345 UART: [state] CFI Enabled
3,353,175 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,845 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,843 UART: [rt]cmd =0x41544d4e, len=14344
3,786,132 >>> mbox cmd response data (8 bytes)
3,786,133 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,182 UART: [rt]cmd =0x41545348, len=116
3,837,907 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,064 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,047 UART: [kat] ++
896,199 UART: [kat] sha1
900,511 UART: [kat] SHA2-256
902,451 UART: [kat] SHA2-384
905,256 UART: [kat] SHA2-512-ACC
907,157 UART: [kat] ECC-384
917,046 UART: [kat] HMAC-384Kdf
921,696 UART: [kat] LMS
1,170,008 UART: [kat] --
1,171,027 UART: [cold-reset] ++
1,171,543 UART: [fht] FHT @ 0x50003400
1,174,021 UART: [idev] ++
1,174,189 UART: [idev] CDI.KEYID = 6
1,174,550 UART: [idev] SUBJECT.KEYID = 7
1,174,975 UART: [idev] UDS.KEYID = 0
1,175,321 ready_for_fw is high
1,175,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,876 UART: [idev] Erasing UDS.KEYID = 0
1,200,300 UART: [idev] Sha1 KeyId Algorithm
1,209,056 UART: [idev] --
1,210,035 UART: [ldev] ++
1,210,203 UART: [ldev] CDI.KEYID = 6
1,210,567 UART: [ldev] SUBJECT.KEYID = 5
1,210,994 UART: [ldev] AUTHORITY.KEYID = 7
1,211,457 UART: [ldev] FE.KEYID = 1
1,216,567 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,835 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,893 UART: [fwproc] Recv command 0x46574c44
1,283,626 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,994 >>> mbox cmd response: success
2,828,144 UART: [afmc] ++
2,828,312 UART: [afmc] CDI.KEYID = 6
2,828,675 UART: [afmc] SUBJECT.KEYID = 7
2,829,101 UART: [afmc] AUTHORITY.KEYID = 5
2,864,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,716 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,426 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,307 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,008 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,931 UART: [afmc] --
2,907,878 UART: [cold-reset] --
2,908,670 UART: [state] Locking Datavault
2,910,039 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,643 UART: [state] Locking ICCM
2,911,155 UART: [exit] Launching FMC @ 0x40000130
2,916,485 UART:
2,916,501 UART: Running Caliptra FMC ...
2,916,909 UART:
2,917,052 UART: [state] CFI Enabled
2,927,572 UART: [fht] FMC Alias Private Key: 7
3,046,596 UART: [art] Extend RT PCRs Done
3,047,024 UART: [art] Lock RT PCRs Done
3,048,690 UART: [art] Populate DV Done
3,057,227 UART: [fht] FMC Alias Private Key: 7
3,058,227 UART: [art] Derive CDI
3,058,507 UART: [art] Store in slot 0x4
3,144,648 UART: [art] Derive Key Pair
3,145,008 UART: [art] Store priv key in slot 0x5
3,158,710 UART: [art] Derive Key Pair - Done
3,173,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,273 UART: [art] PUB.X = 0F2AF8140CAD983D9FD0F4FA5524B82B9E6060CEF53C2E8A9BEEED10641D306F369B27286E334FDE3BD76E3ED08F7EFA
3,196,059 UART: [art] PUB.Y = F0286B4332370D70DA26BD948761DF85D504AA7B0632A895162FC9D18CF3DC3E1D303E6DC650BA969C48E49FD45C5350
3,203,004 UART: [art] SIG.R = D78BEB83953F5E93F5B42656CE9E69106B3057BFAEB40CF83206ACFFC1AF47194264A4AB626186E23639DAE8F58015DB
3,209,778 UART: [art] SIG.S = C35DFC024881E174E26428D1429012739586A0CA4F955E9B2370F7B5ADA22D35B890129D6F1310AB518A14DE47D27C6E
3,233,391 UART: Caliptra RT
3,233,734 UART: [state] CFI Enabled
3,353,290 UART: [rt] RT listening for mailbox commands...
3,353,960 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,188 UART: [rt]cmd =0x41544d4e, len=14344
3,786,570 >>> mbox cmd response data (8 bytes)
3,786,571 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,374 UART: [rt]cmd =0x41545348, len=116
3,818,103 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,633 ready_for_fw is high
1,059,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,163 >>> mbox cmd response: success
2,742,276 UART:
2,742,292 UART: Running Caliptra FMC ...
2,742,700 UART:
2,742,843 UART: [state] CFI Enabled
2,753,297 UART: [fht] FMC Alias Private Key: 7
2,872,435 UART: [art] Extend RT PCRs Done
2,872,863 UART: [art] Lock RT PCRs Done
2,874,521 UART: [art] Populate DV Done
2,882,516 UART: [fht] FMC Alias Private Key: 7
2,883,588 UART: [art] Derive CDI
2,883,868 UART: [art] Store in slot 0x4
2,969,527 UART: [art] Derive Key Pair
2,969,887 UART: [art] Store priv key in slot 0x5
2,983,631 UART: [art] Derive Key Pair - Done
2,998,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,177 UART: [art] PUB.X = DA8B72737C5CDF761B96F5E6BAE04C710AF3E985A21B5CC02413444DFA1C5FA90CD5F23C1D4EAF57B60A9A04006CC2F6
3,020,933 UART: [art] PUB.Y = 843E427152D1EF8F0F61D8E71B20FE62A2E6A4C1B0DAA31ED14A802D2B730A3BE408BDAC8488C9B5CBB8920C6CB01CF2
3,027,891 UART: [art] SIG.R = 92219B1E2BB2079BBCD871902B0E771388E98FD56C328CECCB806398D7AE35B33D3F70C8B5E9BB75F3599C586C6ACECA
3,034,669 UART: [art] SIG.S = 9E7535637E4FBCFF52797B89FE11BCA910E5F7F4C5DC721C95EA6F5D259E51FC15278C26805C784D41616BEED5FDA896
3,058,251 UART: Caliptra RT
3,058,594 UART: [state] CFI Enabled
3,178,172 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,178,842 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,898 UART: [rt]cmd =0x41544d4e, len=14344
3,612,177 >>> mbox cmd response data (8 bytes)
3,612,178 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,335 UART: [rt]cmd =0x41545348, len=116
3,665,158 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,155 ready_for_fw is high
1,059,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,249 >>> mbox cmd response: success
2,742,192 UART:
2,742,208 UART: Running Caliptra FMC ...
2,742,616 UART:
2,742,759 UART: [state] CFI Enabled
2,753,481 UART: [fht] FMC Alias Private Key: 7
2,871,617 UART: [art] Extend RT PCRs Done
2,872,045 UART: [art] Lock RT PCRs Done
2,873,807 UART: [art] Populate DV Done
2,882,068 UART: [fht] FMC Alias Private Key: 7
2,883,206 UART: [art] Derive CDI
2,883,486 UART: [art] Store in slot 0x4
2,969,511 UART: [art] Derive Key Pair
2,969,871 UART: [art] Store priv key in slot 0x5
2,983,779 UART: [art] Derive Key Pair - Done
2,998,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,155 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,920 UART: [art] PUB.X = 003D32F8820E43DB9D52255F423D1865175DE03875E79A209F63C551E007355A953569EB69EA44E13D566D495ACA0ED0
3,021,653 UART: [art] PUB.Y = BAC8F2D08C0512D98E487B7E9591D95FD750F76BD8B2CACA930CFEB71AD14905DBF3C6EE6C635195688471F899A5A20E
3,028,605 UART: [art] SIG.R = E2210A79B48EF2A0BE10774F74CCA9ED569A618CA8AF1109333656A3629418DEF64BECC0257D57BA33B2AA7FB38539E5
3,035,379 UART: [art] SIG.S = E8A9AAE099B2A30DEECE0DE6B9003A01D1FC9324DB61A797A01433D2159D2787499042295615FC55377154A27F9B3141
3,059,112 UART: Caliptra RT
3,059,455 UART: [state] CFI Enabled
3,178,103 UART: [rt] RT listening for mailbox commands...
3,178,773 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,895 UART: [rt]cmd =0x41544d4e, len=14344
3,612,151 >>> mbox cmd response data (8 bytes)
3,612,152 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,459 UART: [rt]cmd =0x41545348, len=116
3,644,376 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,520 UART: [kat] SHA2-256
893,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,295 UART: [kat] ++
897,447 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,310 UART: [kat] SHA2-512-ACC
908,211 UART: [kat] ECC-384
917,878 UART: [kat] HMAC-384Kdf
922,496 UART: [kat] LMS
1,170,824 UART: [kat] --
1,171,383 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,392 UART: [idev] ++
1,174,560 UART: [idev] CDI.KEYID = 6
1,174,920 UART: [idev] SUBJECT.KEYID = 7
1,175,344 UART: [idev] UDS.KEYID = 0
1,175,689 ready_for_fw is high
1,175,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,574 UART: [idev] Erasing UDS.KEYID = 0
1,201,035 UART: [idev] Sha1 KeyId Algorithm
1,209,443 UART: [idev] --
1,210,575 UART: [ldev] ++
1,210,743 UART: [ldev] CDI.KEYID = 6
1,211,106 UART: [ldev] SUBJECT.KEYID = 5
1,211,532 UART: [ldev] AUTHORITY.KEYID = 7
1,211,995 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,243,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,863 UART: [ldev] --
1,283,194 UART: [fwproc] Wait for Commands...
1,283,860 UART: [fwproc] Recv command 0x46574c44
1,284,588 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,584 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,754 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,935 >>> mbox cmd response: success
2,827,999 UART: [afmc] ++
2,828,167 UART: [afmc] CDI.KEYID = 6
2,828,529 UART: [afmc] SUBJECT.KEYID = 7
2,828,954 UART: [afmc] AUTHORITY.KEYID = 5
2,864,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,508 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,217 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,100 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,801 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,719 UART: [afmc] --
2,907,673 UART: [cold-reset] --
2,908,511 UART: [state] Locking Datavault
2,909,706 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,310 UART: [state] Locking ICCM
2,910,730 UART: [exit] Launching FMC @ 0x40000130
2,916,060 UART:
2,916,076 UART: Running Caliptra FMC ...
2,916,484 UART:
2,916,538 UART: [state] CFI Enabled
2,926,952 UART: [fht] FMC Alias Private Key: 7
3,046,372 UART: [art] Extend RT PCRs Done
3,046,800 UART: [art] Lock RT PCRs Done
3,048,260 UART: [art] Populate DV Done
3,056,517 UART: [fht] FMC Alias Private Key: 7
3,057,587 UART: [art] Derive CDI
3,057,867 UART: [art] Store in slot 0x4
3,143,740 UART: [art] Derive Key Pair
3,144,100 UART: [art] Store priv key in slot 0x5
3,157,048 UART: [art] Derive Key Pair - Done
3,171,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,174 UART: [art] PUB.X = 174C3768FBED2DB1AC42A47548809710CE8ECA6812385183F8D12CDED0A99EAD07372AA0A7AA475CEC0431A08A0AC4CA
3,194,951 UART: [art] PUB.Y = B8039D3A646223223248C8C989496336B88D90F599F9C0B920C8250B086B504F49711421C5B66523E5BD34EDE721E1AF
3,201,882 UART: [art] SIG.R = 2B4F582B6893CA65C1DC0B59E93307908B0D843D5169D62BFAC366039F1ADD52118459EB92939CDA40915582727A4E87
3,208,636 UART: [art] SIG.S = CF558D72811BEEF7B037B184FDF5EC53EFBF23CA309D3F05B03D3D00168447754645408CEC5DB983ACE478B0DC8F7614
3,232,923 UART: Caliptra RT
3,233,174 UART: [state] CFI Enabled
3,352,663 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,331 UART: [rt]cmd =0x41544d4e, len=14344
3,786,514 >>> mbox cmd response data (8 bytes)
3,786,515 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,434 UART: [rt]cmd =0x41545348, len=116
3,839,493 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,121 UART: [kat] SHA2-256
904,061 UART: [kat] SHA2-384
906,972 UART: [kat] SHA2-512-ACC
908,873 UART: [kat] ECC-384
918,878 UART: [kat] HMAC-384Kdf
923,534 UART: [kat] LMS
1,171,862 UART: [kat] --
1,172,799 UART: [cold-reset] ++
1,173,181 UART: [fht] FHT @ 0x50003400
1,175,830 UART: [idev] ++
1,175,998 UART: [idev] CDI.KEYID = 6
1,176,358 UART: [idev] SUBJECT.KEYID = 7
1,176,782 UART: [idev] UDS.KEYID = 0
1,177,127 ready_for_fw is high
1,177,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,942 UART: [idev] Erasing UDS.KEYID = 0
1,201,849 UART: [idev] Sha1 KeyId Algorithm
1,210,339 UART: [idev] --
1,211,535 UART: [ldev] ++
1,211,703 UART: [ldev] CDI.KEYID = 6
1,212,066 UART: [ldev] SUBJECT.KEYID = 5
1,212,492 UART: [ldev] AUTHORITY.KEYID = 7
1,212,955 UART: [ldev] FE.KEYID = 1
1,218,393 UART: [ldev] Erasing FE.KEYID = 1
1,244,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,911 UART: [ldev] --
1,284,214 UART: [fwproc] Wait for Commands...
1,285,008 UART: [fwproc] Recv command 0x46574c44
1,285,736 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,352 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,899 >>> mbox cmd response: success
2,830,027 UART: [afmc] ++
2,830,195 UART: [afmc] CDI.KEYID = 6
2,830,557 UART: [afmc] SUBJECT.KEYID = 7
2,830,982 UART: [afmc] AUTHORITY.KEYID = 5
2,866,169 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,582 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,174 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,875 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,543 UART: [afmc] --
2,909,477 UART: [cold-reset] --
2,910,331 UART: [state] Locking Datavault
2,911,288 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,892 UART: [state] Locking ICCM
2,912,336 UART: [exit] Launching FMC @ 0x40000130
2,917,666 UART:
2,917,682 UART: Running Caliptra FMC ...
2,918,090 UART:
2,918,144 UART: [state] CFI Enabled
2,928,848 UART: [fht] FMC Alias Private Key: 7
3,048,360 UART: [art] Extend RT PCRs Done
3,048,788 UART: [art] Lock RT PCRs Done
3,050,126 UART: [art] Populate DV Done
3,058,353 UART: [fht] FMC Alias Private Key: 7
3,059,409 UART: [art] Derive CDI
3,059,689 UART: [art] Store in slot 0x4
3,145,274 UART: [art] Derive Key Pair
3,145,634 UART: [art] Store priv key in slot 0x5
3,159,172 UART: [art] Derive Key Pair - Done
3,173,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,499 UART: [art] PUB.X = F8AF69BB251CC5D10446F794705C925D5019A633DA51BCBA7CF6B0DEF59BA06BC8ED51C7D5AA9466501334BE17D20137
3,197,275 UART: [art] PUB.Y = 8226E6D68584DF7CEFC77177A6B202ADA0B7177761F74EB38912F30B7E00B443217A5BCEAAF3DA04D8AA761AA0CF2C61
3,204,208 UART: [art] SIG.R = CF9EEA0F052C65788E871EC53E0D28964975AD2C8AA477669F144102B20E6DB6998203A572967696F1D98B991957D3AF
3,210,956 UART: [art] SIG.S = 99CD719DCA9B33ED6B179AEAC0851B70063F0DDCEE964FCBB863A7FFC9446005A253274D252302647006DA43A11313FF
3,234,879 UART: Caliptra RT
3,235,130 UART: [state] CFI Enabled
3,354,738 UART: [rt] RT listening for mailbox commands...
3,355,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,256 UART: [rt]cmd =0x41544d4e, len=14344
3,788,508 >>> mbox cmd response data (8 bytes)
3,788,509 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,726 UART: [rt]cmd =0x41545348, len=116
3,820,935 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,289 ready_for_fw is high
1,060,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,774 >>> mbox cmd response: success
2,742,413 UART:
2,742,429 UART: Running Caliptra FMC ...
2,742,837 UART:
2,742,891 UART: [state] CFI Enabled
2,753,461 UART: [fht] FMC Alias Private Key: 7
2,872,925 UART: [art] Extend RT PCRs Done
2,873,353 UART: [art] Lock RT PCRs Done
2,875,163 UART: [art] Populate DV Done
2,883,500 UART: [fht] FMC Alias Private Key: 7
2,884,632 UART: [art] Derive CDI
2,884,912 UART: [art] Store in slot 0x4
2,970,475 UART: [art] Derive Key Pair
2,970,835 UART: [art] Store priv key in slot 0x5
2,983,681 UART: [art] Derive Key Pair - Done
2,998,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,708 UART: [art] PUB.X = 78FB18868210F80B1348C7B4BB34974DD6968C09CF5C427646CF3C121E2B4DEADC7390521ECB18548DD6BA7959BC888F
3,021,478 UART: [art] PUB.Y = C6EC15B3D2DF626498513F6AD43F1BAD31FC01B3FA0DC3E136151C559F008A80AD10AA69D13D55B0B2B6E502657E1B90
3,028,409 UART: [art] SIG.R = 0E720BD34000D3826F2F48DDDF34B62603493C57FC732E9E1EDE200652EEE9E7AB40313C1F96BEA7C602CF24CBDA6F0A
3,035,155 UART: [art] SIG.S = 879CB5466F8447C5DF6D24847A53D13D168C5DD72549D8B42E22E77ABF4E1C3F0E9D4126BA62FD9A66FAB8833016F0F2
3,058,780 UART: Caliptra RT
3,059,031 UART: [state] CFI Enabled
3,179,496 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,166 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,324 UART: [rt]cmd =0x41544d4e, len=14344
3,613,385 >>> mbox cmd response data (8 bytes)
3,613,386 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,393 UART: [rt]cmd =0x41545348, len=116
3,665,778 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,209 ready_for_fw is high
1,059,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,956 >>> mbox cmd response: success
2,740,219 UART:
2,740,235 UART: Running Caliptra FMC ...
2,740,643 UART:
2,740,697 UART: [state] CFI Enabled
2,751,159 UART: [fht] FMC Alias Private Key: 7
2,870,599 UART: [art] Extend RT PCRs Done
2,871,027 UART: [art] Lock RT PCRs Done
2,872,509 UART: [art] Populate DV Done
2,880,766 UART: [fht] FMC Alias Private Key: 7
2,881,884 UART: [art] Derive CDI
2,882,164 UART: [art] Store in slot 0x4
2,968,255 UART: [art] Derive Key Pair
2,968,615 UART: [art] Store priv key in slot 0x5
2,981,523 UART: [art] Derive Key Pair - Done
2,996,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,702 UART: [art] PUB.X = 19EC2731CCE98DC864A01D709F7FA14C4D577A94B2D4684469B70A8715797E9955084F01D3E2CC849F151CD42F1F87C6
3,019,463 UART: [art] PUB.Y = 7CAF299E06F20F30E2D3C3C05D710411C9A7A4A679CE3CFDEABC2C0E0AE49C1834C9363DF42E5E41787C32E1C34F9D62
3,026,414 UART: [art] SIG.R = 5EC7E1552B115F39F23914DF382D457D281986C8C289D741954BB510E3C00ED379C569A1E12666D14586B36EBB87915D
3,033,175 UART: [art] SIG.S = F79988C31889CF526DC2751B06C87918E1CE99C44FE0381C24270B2D2F65AF48A1196272114CF350AEAC6622B3C946C1
3,056,879 UART: Caliptra RT
3,057,130 UART: [state] CFI Enabled
3,177,069 UART: [rt] RT listening for mailbox commands...
3,177,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,599 UART: [rt]cmd =0x41544d4e, len=14344
3,610,645 >>> mbox cmd response data (8 bytes)
3,610,646 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,653 UART: [rt]cmd =0x41545348, len=116
3,642,234 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,669 UART: [kat] SHA2-512-ACC
908,570 UART: [kat] ECC-384
918,281 UART: [kat] HMAC-384Kdf
922,895 UART: [kat] LMS
1,171,223 UART: [kat] --
1,172,254 UART: [cold-reset] ++
1,172,796 UART: [fht] FHT @ 0x50003400
1,175,457 UART: [idev] ++
1,175,625 UART: [idev] CDI.KEYID = 6
1,175,985 UART: [idev] SUBJECT.KEYID = 7
1,176,409 UART: [idev] UDS.KEYID = 0
1,176,754 ready_for_fw is high
1,176,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,475 UART: [idev] Erasing UDS.KEYID = 0
1,201,606 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,210,882 UART: [ldev] ++
1,211,050 UART: [ldev] CDI.KEYID = 6
1,211,413 UART: [ldev] SUBJECT.KEYID = 5
1,211,839 UART: [ldev] AUTHORITY.KEYID = 7
1,212,302 UART: [ldev] FE.KEYID = 1
1,217,452 UART: [ldev] Erasing FE.KEYID = 1
1,244,475 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,290 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,419 UART: [fwproc] Recv command 0x46574c44
1,285,147 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,442 >>> mbox cmd response: success
2,829,490 UART: [afmc] ++
2,829,658 UART: [afmc] CDI.KEYID = 6
2,830,020 UART: [afmc] SUBJECT.KEYID = 7
2,830,445 UART: [afmc] AUTHORITY.KEYID = 5
2,865,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,564 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,562 UART: [afmc] --
2,909,666 UART: [cold-reset] --
2,910,428 UART: [state] Locking Datavault
2,911,647 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,251 UART: [state] Locking ICCM
2,912,719 UART: [exit] Launching FMC @ 0x40000130
2,918,049 UART:
2,918,065 UART: Running Caliptra FMC ...
2,918,473 UART:
2,918,616 UART: [state] CFI Enabled
2,929,606 UART: [fht] FMC Alias Private Key: 7
3,048,888 UART: [art] Extend RT PCRs Done
3,049,316 UART: [art] Lock RT PCRs Done
3,050,776 UART: [art] Populate DV Done
3,058,859 UART: [fht] FMC Alias Private Key: 7
3,059,991 UART: [art] Derive CDI
3,060,271 UART: [art] Store in slot 0x4
3,145,948 UART: [art] Derive Key Pair
3,146,308 UART: [art] Store priv key in slot 0x5
3,159,890 UART: [art] Derive Key Pair - Done
3,174,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,678 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,443 UART: [art] PUB.X = 05D0624D1AA43CE9B28E517333DD23BB5E2C3B19684634FD0454C1C3017F1D99BA7FA0F9637F478B1F4BF2EF11CA187C
3,197,214 UART: [art] PUB.Y = 7A385E8002CE2323CFA1A55CDBA6DA0E53D699D7E75F0D8CBD16175AE77B0E78D0F789A46E85F50F0123DD3C08BC5BBA
3,204,163 UART: [art] SIG.R = CF7B68DA9CE4455E649B9EDD485160058AD832608B74BBF0C6DC313D06BCE5CCD255808D9CF1A9B35C3754F1034F0C6F
3,210,935 UART: [art] SIG.S = 9E0226D88C70FB0F4F9B7FC61D9909130883D608222EBF984DDBED922C207A01A2C84C210803D5D6EA8F7711F827FF7D
3,234,725 UART: Caliptra RT
3,235,068 UART: [state] CFI Enabled
3,354,976 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,764 UART: [rt]cmd =0x41544d4e, len=14344
3,788,321 >>> mbox cmd response data (8 bytes)
3,788,322 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,357 UART: [rt]cmd =0x41545348, len=116
3,840,386 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,513 UART: [state] LifecycleState = Unprovisioned
86,168 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
893,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,940 UART: [kat] ++
898,092 UART: [kat] sha1
902,316 UART: [kat] SHA2-256
904,256 UART: [kat] SHA2-384
906,861 UART: [kat] SHA2-512-ACC
908,762 UART: [kat] ECC-384
918,499 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,244 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,393 UART: [idev] ++
1,175,561 UART: [idev] CDI.KEYID = 6
1,175,921 UART: [idev] SUBJECT.KEYID = 7
1,176,345 UART: [idev] UDS.KEYID = 0
1,176,690 ready_for_fw is high
1,176,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,737 UART: [idev] Erasing UDS.KEYID = 0
1,201,980 UART: [idev] Sha1 KeyId Algorithm
1,210,552 UART: [idev] --
1,211,524 UART: [ldev] ++
1,211,692 UART: [ldev] CDI.KEYID = 6
1,212,055 UART: [ldev] SUBJECT.KEYID = 5
1,212,481 UART: [ldev] AUTHORITY.KEYID = 7
1,212,944 UART: [ldev] FE.KEYID = 1
1,218,248 UART: [ldev] Erasing FE.KEYID = 1
1,244,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,050 UART: [ldev] --
1,284,517 UART: [fwproc] Wait for Commands...
1,285,177 UART: [fwproc] Recv command 0x46574c44
1,285,905 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,024 >>> mbox cmd response: success
2,830,150 UART: [afmc] ++
2,830,318 UART: [afmc] CDI.KEYID = 6
2,830,680 UART: [afmc] SUBJECT.KEYID = 7
2,831,105 UART: [afmc] AUTHORITY.KEYID = 5
2,866,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,266 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,149 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,850 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,560 UART: [afmc] --
2,909,452 UART: [cold-reset] --
2,910,412 UART: [state] Locking Datavault
2,911,831 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,435 UART: [state] Locking ICCM
2,912,867 UART: [exit] Launching FMC @ 0x40000130
2,918,197 UART:
2,918,213 UART: Running Caliptra FMC ...
2,918,621 UART:
2,918,764 UART: [state] CFI Enabled
2,929,624 UART: [fht] FMC Alias Private Key: 7
3,048,934 UART: [art] Extend RT PCRs Done
3,049,362 UART: [art] Lock RT PCRs Done
3,050,724 UART: [art] Populate DV Done
3,058,725 UART: [fht] FMC Alias Private Key: 7
3,059,693 UART: [art] Derive CDI
3,059,973 UART: [art] Store in slot 0x4
3,145,796 UART: [art] Derive Key Pair
3,146,156 UART: [art] Store priv key in slot 0x5
3,159,246 UART: [art] Derive Key Pair - Done
3,173,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,702 UART: [art] PUB.X = 60AB5C73220D170CBC4A00354E50D5FFCA35731A2B30974D2A3A648EC2C2D8319313E821F428981DC80C1E4943D0DC70
3,196,443 UART: [art] PUB.Y = FDC00303E31149CA855AA73A43CE2A2AE7878F25D6B38448A286AB464E5E7A5024FB1D78522A8F7CECF876F60928CF8D
3,203,394 UART: [art] SIG.R = 810AEFEDDB311ACA2275BE6AE6922879FE91122BB62912DE755880C9AEFE2995FFF888A84A9114ED5F9578816D4CEF9C
3,210,175 UART: [art] SIG.S = 08C0066113C61B084428073EB48C5A8B11627B93D7A3D29D289455A3E06E41ED5B6342F2147B4397C2B5BEB3BAC9F22D
3,233,887 UART: Caliptra RT
3,234,230 UART: [state] CFI Enabled
3,353,711 UART: [rt] RT listening for mailbox commands...
3,354,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,807 UART: [rt]cmd =0x41544d4e, len=14344
3,787,715 >>> mbox cmd response data (8 bytes)
3,787,716 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,845 UART: [rt]cmd =0x41545348, len=116
3,819,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,154 ready_for_fw is high
1,060,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,201 >>> mbox cmd response: success
2,742,824 UART:
2,742,840 UART: Running Caliptra FMC ...
2,743,248 UART:
2,743,391 UART: [state] CFI Enabled
2,753,979 UART: [fht] FMC Alias Private Key: 7
2,873,171 UART: [art] Extend RT PCRs Done
2,873,599 UART: [art] Lock RT PCRs Done
2,875,181 UART: [art] Populate DV Done
2,883,538 UART: [fht] FMC Alias Private Key: 7
2,884,596 UART: [art] Derive CDI
2,884,876 UART: [art] Store in slot 0x4
2,970,063 UART: [art] Derive Key Pair
2,970,423 UART: [art] Store priv key in slot 0x5
2,983,749 UART: [art] Derive Key Pair - Done
2,998,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,703 UART: [art] PUB.X = 3B1337187F26B7DA9928E65C7CA0A3719F4863CE8759E1057A73A62FF0104CB4C3DCD52FDCF11D7DA6F2F579D87A5441
3,021,478 UART: [art] PUB.Y = 527321E9F3A3FC0D4E87843AE2EDC0EF78A44F87E9B7F27041B960A78DFAF9387AD969519CEF848541FFCDC22839AC60
3,028,437 UART: [art] SIG.R = 10423CB952206C525B7ADC7044E46DAA2310376CE5CAC94097401268F579C9AAAA589A09F4D1584D0357597540316298
3,035,191 UART: [art] SIG.S = C03E2CB0F4A8B6952189F6519705F69DD49F460F05360BEE652FB22D3313D321838A82770FF960D59BC66A9FAFD54107
3,059,531 UART: Caliptra RT
3,059,874 UART: [state] CFI Enabled
3,179,515 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,185 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,331 UART: [rt]cmd =0x41544d4e, len=14344
3,613,054 >>> mbox cmd response data (8 bytes)
3,613,055 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,158 UART: [rt]cmd =0x41545348, len=116
3,665,521 >>> mbox cmd response data (12 bytes)
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,784 ready_for_fw is high
1,060,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,405 >>> mbox cmd response: success
2,740,892 UART:
2,740,908 UART: Running Caliptra FMC ...
2,741,316 UART:
2,741,459 UART: [state] CFI Enabled
2,752,139 UART: [fht] FMC Alias Private Key: 7
2,871,067 UART: [art] Extend RT PCRs Done
2,871,495 UART: [art] Lock RT PCRs Done
2,873,409 UART: [art] Populate DV Done
2,881,432 UART: [fht] FMC Alias Private Key: 7
2,882,512 UART: [art] Derive CDI
2,882,792 UART: [art] Store in slot 0x4
2,968,929 UART: [art] Derive Key Pair
2,969,289 UART: [art] Store priv key in slot 0x5
2,982,429 UART: [art] Derive Key Pair - Done
2,997,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,869 UART: [art] PUB.X = B3C85F7072EC92FEDBF4724476B88A90E5A54CB96C45799BC27F52A51ACF430342A3E4294156F58525DF041DE6FF28D2
3,020,639 UART: [art] PUB.Y = 07352C5D5F14D5A7C25F7EC03E400C620D87EE5923D657B1B0C8013C3DCE7187C6C9A878E9757EE56B695102B120803B
3,027,574 UART: [art] SIG.R = 0457A995BB683877B7360377681FF6131CF977816413948E8D616D1692A7A69AA7B8469530E3DAEDA332F41A3C438BF4
3,034,330 UART: [art] SIG.S = 288EBBAF75A86B5D205FCF3919B560F4ADBECECBC22A6B4E12F9E3C793FFFDD839EDB75C39BD807DDFEED543CB07F323
3,058,111 UART: Caliptra RT
3,058,454 UART: [state] CFI Enabled
3,177,880 UART: [rt] RT listening for mailbox commands...
3,178,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,860 UART: [rt]cmd =0x41544d4e, len=14344
3,611,534 >>> mbox cmd response data (8 bytes)
3,611,535 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,584 UART: [rt]cmd =0x41545348, len=116
3,643,473 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_deny_second_bad_hash ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,116 UART:
192,476 UART: Running Caliptra ROM ...
193,664 UART:
193,825 UART: [state] CFI Enabled
263,143 UART: [state] LifecycleState = Unprovisioned
265,128 UART: [state] DebugLocked = No
266,876 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,831 UART: [kat] SHA2-256
440,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,082 UART: [kat] ++
451,568 UART: [kat] sha1
462,586 UART: [kat] SHA2-256
465,311 UART: [kat] SHA2-384
471,822 UART: [kat] SHA2-512-ACC
474,185 UART: [kat] ECC-384
2,767,772 UART: [kat] HMAC-384Kdf
2,800,269 UART: [kat] LMS
3,990,550 UART: [kat] --
3,994,903 UART: [cold-reset] ++
3,995,837 UART: [fht] Storing FHT @ 0x50003400
4,007,096 UART: [idev] ++
4,007,669 UART: [idev] CDI.KEYID = 6
4,008,705 UART: [idev] SUBJECT.KEYID = 7
4,009,884 UART: [idev] UDS.KEYID = 0
4,010,966 ready_for_fw is high
4,011,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,699 UART: [idev] Erasing UDS.KEYID = 0
7,343,377 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,371 UART: [idev] --
7,369,178 UART: [ldev] ++
7,369,761 UART: [ldev] CDI.KEYID = 6
7,370,730 UART: [ldev] SUBJECT.KEYID = 5
7,371,910 UART: [ldev] AUTHORITY.KEYID = 7
7,373,202 UART: [ldev] FE.KEYID = 1
7,399,571 UART: [ldev] Erasing FE.KEYID = 1
10,731,405 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,456 UART: [ldev] --
13,114,520 UART: [fwproc] Waiting for Commands...
13,117,608 UART: [fwproc] Received command 0x46574c44
13,119,795 UART: [fwproc] Received Image of size 118548 bytes
17,212,205 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,287,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,024 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,689,842 >>> mbox cmd response: success
17,693,459 UART: [afmc] ++
17,694,074 UART: [afmc] CDI.KEYID = 6
17,695,006 UART: [afmc] SUBJECT.KEYID = 7
17,696,156 UART: [afmc] AUTHORITY.KEYID = 5
21,063,127 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,364,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,366,685 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,381,112 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,395,837 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,410,227 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,431,643 UART: [afmc] --
23,435,053 UART: [cold-reset] --
23,438,815 UART: [state] Locking Datavault
23,445,358 UART: [state] Locking PCR0, PCR1 and PCR31
23,447,110 UART: [state] Locking ICCM
23,449,101 UART: [exit] Launching FMC @ 0x40000130
23,457,520 UART:
23,457,762 UART: Running Caliptra FMC ...
23,458,862 UART:
23,459,025 UART: [state] CFI Enabled
23,526,856 UART: [fht] FMC Alias Private Key: 7
25,888,534 UART: [art] Extend RT PCRs Done
25,889,749 UART: [art] Lock RT PCRs Done
25,891,293 UART: [art] Populate DV Done
25,896,591 UART: [fht] FMC Alias Private Key: 7
25,898,235 UART: [art] Derive CDI
25,899,046 UART: [art] Store in slot 0x4
25,956,033 UART: [art] Derive Key Pair
25,957,077 UART: [art] Store priv key in slot 0x5
29,249,517 UART: [art] Derive Key Pair - Done
29,262,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,241 UART: [art] PUB.X = 060BA034560781B9B9CBA715179C920CFA83FA4462A43540AE5DAB0744C78378312875FFB587DF2992ED31984835F370
31,559,482 UART: [art] PUB.Y = 459B561AD0CFD824C60543B0855A120567150C98110F683A69680A8854897484888366F325009A12561F45E4740F0788
31,566,647 UART: [art] SIG.R = 9F33F6219FF0B88CFE0D4651F778B8F54CE2E11B968CACB602BE59E36968C5D69BEB520B341F4CE862F671CF34E56AE5
31,574,090 UART: [art] SIG.S = 52723C6BDA605AC4C404FDF7A09322D6ECC1034A5AA622A053665371D494E7D802F703A92A5D612A2DA4DD97EE60F469
32,878,691 UART: Caliptra RT
32,879,398 UART: [state] CFI Enabled
33,057,638 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,125,387 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,280,768 UART: [rt]cmd =0x41544d4e, len=14344
42,581,315 >>> mbox cmd response data (8 bytes)
42,582,278 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,613,188 UART: [rt]cmd =0x41545348, len=116
42,634,036 >>> mbox cmd response data (12 bytes)
44,701,637 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,807,522 UART:
44,807,890 UART: Running Caliptra ROM ...
44,809,036 UART:
44,809,217 UART: [state] CFI Enabled
44,880,055 UART: [state] LifecycleState = Unprovisioned
44,881,985 UART: [state] DebugLocked = No
44,883,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,889,196 UART: [kat] SHA2-256
45,058,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
45,069,404 UART: [kat] ++
45,069,947 UART: [kat] sha1
45,080,249 UART: [kat] SHA2-256
45,082,917 UART: [kat] SHA2-384
45,090,318 UART: [kat] SHA2-512-ACC
45,092,671 UART: [kat] ECC-384
47,381,545 UART: [kat] HMAC-384Kdf
47,412,523 UART: [kat] LMS
48,602,850 UART: [kat] --
48,606,373 UART: [update-reset] ++
52,366,386 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,369,948 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,642,703 >>> mbox cmd response: success
52,643,059 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,644,040 UART: [update-reset] Copying MAN_2 To MAN_1
52,666,427 UART: [update-reset Success] --
52,671,414 UART: [state] Locking Datavault
52,674,555 UART: [state] Locking PCR0, PCR1 and PCR31
52,676,310 UART: [state] Locking ICCM
52,678,807 UART: [exit] Launching FMC @ 0x40000130
52,687,259 UART:
52,687,501 UART: Running Caliptra FMC ...
52,688,605 UART:
52,688,760 UART: [state] CFI Enabled
52,777,504 UART: [art] Extend RT PCRs Done
52,778,691 UART: [art] Lock RT PCRs Done
52,779,824 UART: [art] Populate DV Done
52,785,286 UART: [fht] FMC Alias Private Key: 7
52,786,887 UART: [art] Derive CDI
52,787,656 UART: [art] Store in slot 0x4
52,846,999 UART: [art] Derive Key Pair
52,848,004 UART: [art] Store priv key in slot 0x5
56,140,399 UART: [art] Derive Key Pair - Done
56,153,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,441,277 UART: [art] Erasing AUTHORITY.KEYID = 7
58,442,804 UART: [art] PUB.X = E0EE04AF6C2C5B2BA8211887EA5BBC50C3307482AD33518659DCB4527B9EF3945018634A3D8CBBFBADCBD7F3FBA0F974
58,450,041 UART: [art] PUB.Y = 9C595C6164A0409B80A359A371201D29CA3720A907FCF0C1C0F803FEDC3C4FD26EE32300C717E24744A3E5D398D9E680
58,457,275 UART: [art] SIG.R = D33515DC0DD38E783592AF152B7634F8CD6719AEF284A2E79DADEED97E46FA2E7AE8E7466CBCF459221BA965D79BCCED
58,464,714 UART: [art] SIG.S = 5120857A5CE4136EEB2B6DA819AED243A6A9BB19A278F45756B022AB367394478331492A4C42A8B44919FAE0967EAB75
59,769,610 UART: mbox::rt_entry...
59,770,571 UART: ____ _ _ _ ____ _____
59,772,500 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,774,508 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,776,365 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,778,289 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,780,188 UART: |_|
59,781,069 UART:
60,149,611 UART: [rt] Runtime listening for mailbox commands...
60,151,780 >>> mbox cmd response data (48 bytes)
60,152,348 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,154,658 >>> mbox cmd response data (48 bytes)
60,155,586 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,172,444 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,807,693 ready_for_fw is high
3,808,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,987,825 >>> mbox cmd response: success
23,671,513 UART:
23,671,928 UART: Running Caliptra FMC ...
23,673,073 UART:
23,673,238 UART: [state] CFI Enabled
23,739,192 UART: [fht] FMC Alias Private Key: 7
26,079,695 UART: [art] Extend RT PCRs Done
26,080,940 UART: [art] Lock RT PCRs Done
26,083,055 UART: [art] Populate DV Done
26,088,421 UART: [fht] FMC Alias Private Key: 7
26,089,920 UART: [art] Derive CDI
26,090,688 UART: [art] Store in slot 0x4
26,147,368 UART: [art] Derive Key Pair
26,148,368 UART: [art] Store priv key in slot 0x5
29,440,728 UART: [art] Derive Key Pair - Done
29,453,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,313 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,825 UART: [art] PUB.X = A3504D8F4C6D4131CC46D2A9DD6BEFEB3FAFA76987DE8E0D05F4AE8A996E34AD38CBAA246F735438A02C76947A4FC251
31,752,133 UART: [art] PUB.Y = BBEE4F28CCD140E3166FCE4561ED49D79DA43BB2DFE44444F1ABC9D98B4985DAFF603598B3D133C257E066E2EA58EAE0
31,759,438 UART: [art] SIG.R = BB0EE24D54ED107F0A4C4231FAEDF4CC2F53FF1BFAA05EEA642C0004DE0167AE3E36359831323320B5CA70BC731E5941
31,766,820 UART: [art] SIG.S = 57423341F5220B73148681B974BB3259BF88E108B883BBC2FE7760306CF33921E18D9E64B5A2C57F0B6F64B61C0107A6
33,072,465 UART: Caliptra RT
33,073,186 UART: [state] CFI Enabled
33,247,874 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,314,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,469,714 UART: [rt]cmd =0x41544d4e, len=14344
42,770,324 >>> mbox cmd response data (8 bytes)
42,771,122 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,801,980 UART: [rt]cmd =0x41545348, len=116
42,821,481 >>> mbox cmd response data (12 bytes)
44,888,435 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,936,340 >>> mbox cmd response: success
52,936,821 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,969,747 UART:
52,970,064 UART: Running Caliptra FMC ...
52,971,200 UART:
52,971,366 UART: [state] CFI Enabled
53,076,961 UART: [art] Extend RT PCRs Done
53,078,279 UART: [art] Lock RT PCRs Done
53,079,372 UART: [art] Populate DV Done
53,084,619 UART: [fht] FMC Alias Private Key: 7
53,086,321 UART: [art] Derive CDI
53,087,147 UART: [art] Store in slot 0x4
53,145,689 UART: [art] Derive Key Pair
53,146,728 UART: [art] Store priv key in slot 0x5
56,439,322 UART: [art] Derive Key Pair - Done
56,452,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,739,988 UART: [art] Erasing AUTHORITY.KEYID = 7
58,741,609 UART: [art] PUB.X = 6C57E0C92E5E4F1E43B14584296F5160836C1D4613526EC04372D02FAB332A1A18B264CF7432D37F1CEAA6B48887AA88
58,748,753 UART: [art] PUB.Y = 4D6020A06D7A0C97BC84E5E70E5561BCD87F3036695575B8CF049B6D1E024A5818E9F9C931E8F9287FD411DED07BE6B3
58,755,984 UART: [art] SIG.R = 39B79B9B86A623BBA22203BE3AC9920D4F6E4A7322020DC063477A57F1D6FFE4ADBA5999554A5952FE879A03AD996C62
58,763,374 UART: [art] SIG.S = 9E2CA67A71D4B988AC1978B1A774AB58AF900E46F1F4D8DB42A0F251C9844A5D873148DA58D1A13D3D576DE4DECB71C7
60,068,272 UART: mbox::rt_entry...
60,069,248 UART: ____ _ _ _ ____ _____
60,071,266 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
60,073,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
60,075,220 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
60,077,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
60,079,078 UART: |_|
60,079,895 UART:
60,446,956 UART: [rt] Runtime listening for mailbox commands...
60,449,169 >>> mbox cmd response data (48 bytes)
60,449,736 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,452,115 >>> mbox cmd response data (48 bytes)
60,453,007 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,469,908 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,169 writing to cptra_bootfsm_go
193,482 UART:
193,858 UART: Running Caliptra ROM ...
194,947 UART:
604,612 UART: [state] CFI Enabled
618,573 UART: [state] LifecycleState = Unprovisioned
620,514 UART: [state] DebugLocked = No
622,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,449 UART: [kat] SHA2-256
797,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,743 UART: [kat] ++
808,189 UART: [kat] sha1
818,348 UART: [kat] SHA2-256
820,998 UART: [kat] SHA2-384
826,561 UART: [kat] SHA2-512-ACC
828,921 UART: [kat] ECC-384
3,114,620 UART: [kat] HMAC-384Kdf
3,126,034 UART: [kat] LMS
4,316,127 UART: [kat] --
4,320,246 UART: [cold-reset] ++
4,321,613 UART: [fht] Storing FHT @ 0x50003400
4,333,954 UART: [idev] ++
4,334,536 UART: [idev] CDI.KEYID = 6
4,335,418 UART: [idev] SUBJECT.KEYID = 7
4,336,726 UART: [idev] UDS.KEYID = 0
4,337,786 ready_for_fw is high
4,337,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,911 UART: [idev] Erasing UDS.KEYID = 0
7,624,706 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,961 UART: [idev] --
7,651,662 UART: [ldev] ++
7,652,290 UART: [ldev] CDI.KEYID = 6
7,653,197 UART: [ldev] SUBJECT.KEYID = 5
7,654,403 UART: [ldev] AUTHORITY.KEYID = 7
7,655,700 UART: [ldev] FE.KEYID = 1
7,668,073 UART: [ldev] Erasing FE.KEYID = 1
10,953,136 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,182 UART: [ldev] --
13,312,198 UART: [fwproc] Waiting for Commands...
13,314,284 UART: [fwproc] Received command 0x46574c44
13,316,469 UART: [fwproc] Received Image of size 118548 bytes
17,420,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,015 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,834 >>> mbox cmd response: success
17,903,880 UART: [afmc] ++
17,904,522 UART: [afmc] CDI.KEYID = 6
17,905,437 UART: [afmc] SUBJECT.KEYID = 7
17,906,643 UART: [afmc] AUTHORITY.KEYID = 5
21,222,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,588 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,411 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,079 UART: [afmc] --
23,588,396 UART: [cold-reset] --
23,593,004 UART: [state] Locking Datavault
23,598,686 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,433 UART: [state] Locking ICCM
23,601,827 UART: [exit] Launching FMC @ 0x40000130
23,610,269 UART:
23,610,535 UART: Running Caliptra FMC ...
23,611,636 UART:
23,611,787 UART: [state] CFI Enabled
23,619,767 UART: [fht] FMC Alias Private Key: 7
25,959,622 UART: [art] Extend RT PCRs Done
25,960,842 UART: [art] Lock RT PCRs Done
25,962,839 UART: [art] Populate DV Done
25,968,459 UART: [fht] FMC Alias Private Key: 7
25,970,044 UART: [art] Derive CDI
25,970,853 UART: [art] Store in slot 0x4
26,013,171 UART: [art] Derive Key Pair
26,014,206 UART: [art] Store priv key in slot 0x5
29,256,274 UART: [art] Derive Key Pair - Done
29,269,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,621 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,127 UART: [art] PUB.X = 05B2329C0F84C7ACC9BF4EFC597795D07B5B137B598ECCAE17A90526BD0EBA5DE5B57F1DF838782F5AD81161B839CB66
31,558,434 UART: [art] PUB.Y = F9E7DFB8D1FE753237F847BD5E9F284ABE76A8358CD6CB59F4C4F0FE14B2F3E9E5B8561DACE49C64DBE1E8CA03100587
31,565,717 UART: [art] SIG.R = 3D8F90FED956D9C47DDB0CC1C0E14DB518546E20230E4B0FF6FFD1D4CF1C866690A605285D72B98BB6451C1C411BF807
31,573,099 UART: [art] SIG.S = B4BAD66618113ED14EE17DF8B60C02D419447EA9058601F38E35C29BE3B5BA08D6093E341079F8EC102CEC379DA5E4CB
32,878,122 UART: Caliptra RT
32,878,832 UART: [state] CFI Enabled
33,012,526 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,072,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,228,021 UART: [rt]cmd =0x41544d4e, len=14344
42,528,417 >>> mbox cmd response data (8 bytes)
42,529,400 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,560,048 UART: [rt]cmd =0x41545348, len=116
42,580,429 >>> mbox cmd response data (12 bytes)
44,647,134 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
44,752,879 UART:
44,753,228 UART: Running Caliptra ROM ...
44,754,347 UART:
44,754,513 UART: [state] CFI Enabled
44,766,833 UART: [state] LifecycleState = Unprovisioned
44,768,715 UART: [state] DebugLocked = No
44,770,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,775,743 UART: [kat] SHA2-256
44,945,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,955,987 UART: [kat] ++
44,956,484 UART: [kat] sha1
44,967,153 UART: [kat] SHA2-256
44,969,888 UART: [kat] SHA2-384
44,976,375 UART: [kat] SHA2-512-ACC
44,978,773 UART: [kat] ECC-384
47,262,723 UART: [kat] HMAC-384Kdf
47,274,798 UART: [kat] LMS
48,464,848 UART: [kat] --
48,468,809 UART: [update-reset] ++
52,234,173 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,238,579 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
52,511,331 >>> mbox cmd response: success
52,511,702 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,512,679 UART: [update-reset] Copying MAN_2 To MAN_1
52,535,116 UART: [update-reset Success] --
52,539,125 UART: [state] Locking Datavault
52,542,097 UART: [state] Locking PCR0, PCR1 and PCR31
52,543,851 UART: [state] Locking ICCM
52,546,102 UART: [exit] Launching FMC @ 0x40000130
52,554,561 UART:
52,554,802 UART: Running Caliptra FMC ...
52,555,898 UART:
52,556,049 UART: [state] CFI Enabled
52,600,284 UART: [art] Extend RT PCRs Done
52,601,465 UART: [art] Lock RT PCRs Done
52,602,806 UART: [art] Populate DV Done
52,608,474 UART: [fht] FMC Alias Private Key: 7
52,610,070 UART: [art] Derive CDI
52,610,830 UART: [art] Store in slot 0x4
52,653,475 UART: [art] Derive Key Pair
52,654,516 UART: [art] Store priv key in slot 0x5
55,896,408 UART: [art] Derive Key Pair - Done
55,909,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,189,835 UART: [art] Erasing AUTHORITY.KEYID = 7
58,191,337 UART: [art] PUB.X = 865A35ACD8AC4A41BBC8C743EBA935D239160502189A3D3FC351879BBDAA37AABD13052AA84986B94861B8E672048B26
58,198,650 UART: [art] PUB.Y = 26C18656DCE583B2E34D61A5F88A33D0CE6B05290E3C2B8DC1E4576CF688E62110C96838CDD7C22D30BE2AFF22E2E856
58,205,869 UART: [art] SIG.R = 0BB12B8789749801823816ECD3962CE079DD9169A5B5DB17FD494F146C2C3FA6848197AD68F4F5DA875D3EE3F7DC710C
58,213,259 UART: [art] SIG.S = 155F64271DB4EF47B7AAF3134DAA819C06A5E65C58AEDADD9C6A60F432D19166F64E41A901C848E1F6D2F421EC529745
59,518,458 UART: mbox::rt_entry...
59,519,424 UART: ____ _ _ _ ____ _____
59,521,404 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,523,606 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,525,546 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,527,473 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,529,396 UART: |_|
59,530,200 UART:
59,901,911 UART: [rt] Runtime listening for mailbox commands...
59,904,091 >>> mbox cmd response data (48 bytes)
59,904,655 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
59,906,968 >>> mbox cmd response data (48 bytes)
59,907,849 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
59,924,748 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
4,128,154 ready_for_fw is high
4,128,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,054 >>> mbox cmd response: success
23,811,184 UART:
23,811,571 UART: Running Caliptra FMC ...
23,812,711 UART:
23,812,870 UART: [state] CFI Enabled
23,820,652 UART: [fht] FMC Alias Private Key: 7
26,160,662 UART: [art] Extend RT PCRs Done
26,161,886 UART: [art] Lock RT PCRs Done
26,163,786 UART: [art] Populate DV Done
26,168,957 UART: [fht] FMC Alias Private Key: 7
26,170,499 UART: [art] Derive CDI
26,171,254 UART: [art] Store in slot 0x4
26,213,852 UART: [art] Derive Key Pair
26,214,895 UART: [art] Store priv key in slot 0x5
29,457,185 UART: [art] Derive Key Pair - Done
29,470,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,778 UART: [art] PUB.X = 0742C04B6C58D24A9281AB00D015AC81A4A2CE5CFD2768239E93FF98B979446B7F03C903587DB58FAD1A6B9C08855638
31,759,034 UART: [art] PUB.Y = A98B764148A58F31CF28A57C4754D6B29F87CAC213A11D1B497064444499D329213384093DD613AD1A3FC830DFD5007D
31,766,226 UART: [art] SIG.R = 1BB620EBDE58B94765BE962A7FF993A3B119F034D50C15B5755756212944BCB2F6B5EEAE976E06C10EC4AEC5915C522C
31,773,612 UART: [art] SIG.S = 77A7FEAC3215E54EFE7D049A35B4843F59A5F3434F271C189ECF536113A1FCD1D062352AF57A67E880D22793C5708455
33,078,479 UART: Caliptra RT
33,079,200 UART: [state] CFI Enabled
33,212,469 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,274,902 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,430,580 UART: [rt]cmd =0x41544d4e, len=14344
42,731,627 >>> mbox cmd response data (8 bytes)
42,732,375 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,763,139 UART: [rt]cmd =0x41545348, len=116
42,782,454 >>> mbox cmd response data (12 bytes)
44,850,593 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,831,961 >>> mbox cmd response: success
52,832,468 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
52,866,673 UART:
52,866,993 UART: Running Caliptra FMC ...
52,868,130 UART:
52,868,290 UART: [state] CFI Enabled
52,912,847 UART: [art] Extend RT PCRs Done
52,914,090 UART: [art] Lock RT PCRs Done
52,915,792 UART: [art] Populate DV Done
52,921,226 UART: [fht] FMC Alias Private Key: 7
52,922,865 UART: [art] Derive CDI
52,923,599 UART: [art] Store in slot 0x4
52,966,235 UART: [art] Derive Key Pair
52,967,229 UART: [art] Store priv key in slot 0x5
56,209,659 UART: [art] Derive Key Pair - Done
56,222,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
58,503,183 UART: [art] Erasing AUTHORITY.KEYID = 7
58,504,693 UART: [art] PUB.X = 183A7C99445BCF0C6F6D0787AC30206C329CBC0024864F3EBA0FDF5ED677A4B9588F25D4333928C6E3C5537BE97E80F4
58,511,939 UART: [art] PUB.Y = 72C2F0839265131D0A5591DFB69FA5BC3BD603E71916DD5126CB83BA74E784A001D73D0D14CF8471CF1A2D9FCF8E4466
58,519,193 UART: [art] SIG.R = B5A6B404AB9ED841D5F15AC5CDCECB8B1C909B05CE3C9A734C568CF4002FEB1B9BEF0153308444C5A7ED20D403458A37
58,526,619 UART: [art] SIG.S = 8F9699DEBC703858A023D119E9F16FBBAA1C0B6D7B2F5FFAC3E1307B062ABEEA4879FC25A4B4471BF42BAA2F09EF2A24
59,831,195 UART: mbox::rt_entry...
59,832,168 UART: ____ _ _ _ ____ _____
59,834,162 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
59,836,165 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
59,838,094 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
59,840,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
59,841,876 UART: |_|
59,842,752 UART:
60,208,267 UART: [rt] Runtime listening for mailbox commands...
60,210,499 >>> mbox cmd response data (48 bytes)
60,211,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
60,213,465 >>> mbox cmd response data (48 bytes)
60,214,467 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
60,231,373 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
192,283 UART:
192,636 UART: Running Caliptra ROM ...
193,827 UART:
193,975 UART: [state] CFI Enabled
262,079 UART: [state] LifecycleState = Unprovisioned
264,074 UART: [state] DebugLocked = No
265,610 UART: [state] WD Timer not started. Device not locked for debugging
269,362 UART: [kat] SHA2-256
448,983 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,815 UART: [kat] ++
460,329 UART: [kat] sha1
471,914 UART: [kat] SHA2-256
474,636 UART: [kat] SHA2-384
479,839 UART: [kat] SHA2-512-ACC
482,209 UART: [kat] ECC-384
2,927,038 UART: [kat] HMAC-384Kdf
2,950,166 UART: [kat] LMS
3,426,672 UART: [kat] --
3,430,482 UART: [cold-reset] ++
3,431,778 UART: [fht] FHT @ 0x50003400
3,442,753 UART: [idev] ++
3,443,320 UART: [idev] CDI.KEYID = 6
3,444,350 UART: [idev] SUBJECT.KEYID = 7
3,445,518 UART: [idev] UDS.KEYID = 0
3,446,447 ready_for_fw is high
3,446,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,741 UART: [idev] Erasing UDS.KEYID = 0
5,963,251 UART: [idev] Sha1 KeyId Algorithm
5,988,055 UART: [idev] --
5,993,005 UART: [ldev] ++
5,993,588 UART: [ldev] CDI.KEYID = 6
5,994,547 UART: [ldev] SUBJECT.KEYID = 5
5,995,710 UART: [ldev] AUTHORITY.KEYID = 7
5,996,991 UART: [ldev] FE.KEYID = 1
6,034,958 UART: [ldev] Erasing FE.KEYID = 1
8,541,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,250 UART: [ldev] --
10,351,188 UART: [fwproc] Wait for Commands...
10,353,192 UART: [fwproc] Recv command 0x46574c44
10,355,174 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,983,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,312,449 >>> mbox cmd response: success
14,316,076 UART: [afmc] ++
14,316,700 UART: [afmc] CDI.KEYID = 6
14,317,613 UART: [afmc] SUBJECT.KEYID = 7
14,318,828 UART: [afmc] AUTHORITY.KEYID = 5
16,848,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,572,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,575,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,590,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,607,031 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,622,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,646,854 UART: [afmc] --
18,649,860 UART: [cold-reset] --
18,653,773 UART: [state] Locking Datavault
18,658,962 UART: [state] Locking PCR0, PCR1 and PCR31
18,660,712 UART: [state] Locking ICCM
18,662,693 UART: [exit] Launching FMC @ 0x40000130
18,671,082 UART:
18,671,317 UART: Running Caliptra FMC ...
18,672,413 UART:
18,672,575 UART: [state] CFI Enabled
18,730,115 UART: [fht] FMC Alias Private Key: 7
20,497,041 UART: [art] Extend RT PCRs Done
20,498,256 UART: [art] Lock RT PCRs Done
20,499,927 UART: [art] Populate DV Done
20,505,279 UART: [fht] FMC Alias Private Key: 7
20,506,976 UART: [art] Derive CDI
20,507,813 UART: [art] Store in slot 0x4
20,563,223 UART: [art] Derive Key Pair
20,564,249 UART: [art] Store priv key in slot 0x5
23,026,655 UART: [art] Derive Key Pair - Done
23,039,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,753,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,754,525 UART: [art] PUB.X = 21989E7814421272D03EB3F9B8009DAE4434FF337213D24952E6F8196BED2C79087F7A4BDB933165F624F123F2A53D08
24,761,714 UART: [art] PUB.Y = C5EFEB05864CFD73EAC502BBD578E3AAD35C1BFADB5DD5968EFE4AB74674E49F13EE2023AB7C1788D83EDDB63B115668
24,769,058 UART: [art] SIG.R = EB764AEB41E726286F6AD4C651FC7F45038E65D19D41417B3BACDC9503AB0F82DB578820461C6BAF2EAF00677D1D8646
24,776,396 UART: [art] SIG.S = 0588B49D79071865E9639B5A0D37D3F238F4C2481D11A8B97C68943879B0DB7FEA47A0B80D97B1ABB6BCF8FF70B15E8A
25,755,918 UART: Caliptra RT
25,756,617 UART: [state] CFI Enabled
25,935,834 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,972,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,127,772 UART: [rt]cmd =0x41544d4e, len=14344
34,122,852 >>> mbox cmd response data (8 bytes)
34,123,769 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,154,589 UART: [rt]cmd =0x41545348, len=116
34,174,925 >>> mbox cmd response data (12 bytes)
36,226,104 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,332,438 UART:
36,332,805 UART: Running Caliptra ROM ...
36,333,856 UART:
36,334,005 UART: [state] CFI Enabled
36,396,848 UART: [state] LifecycleState = Unprovisioned
36,398,784 UART: [state] DebugLocked = No
36,400,432 UART: [state] WD Timer not started. Device not locked for debugging
36,404,387 UART: [kat] SHA2-256
36,584,073 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,594,850 UART: [kat] ++
36,595,311 UART: [kat] sha1
36,606,137 UART: [kat] SHA2-256
36,608,822 UART: [kat] SHA2-384
36,615,127 UART: [kat] SHA2-512-ACC
36,617,477 UART: [kat] ECC-384
39,081,372 UART: [kat] HMAC-384Kdf
39,103,700 UART: [kat] LMS
39,580,129 UART: [kat] --
39,583,735 UART: [update-reset] ++
42,637,185 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,640,181 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
42,912,769 >>> mbox cmd response: success
42,913,152 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,913,868 UART: [update-reset] Copying MAN_2 To MAN_1
42,950,985 UART: [update-reset Success] --
42,956,060 UART: [state] Locking Datavault
42,959,428 UART: [state] Locking PCR0, PCR1 and PCR31
42,961,179 UART: [state] Locking ICCM
42,963,484 UART: [exit] Launching FMC @ 0x40000130
42,971,875 UART:
42,972,114 UART: Running Caliptra FMC ...
42,973,212 UART:
42,973,367 UART: [state] CFI Enabled
43,062,147 UART: [art] Extend RT PCRs Done
43,063,335 UART: [art] Lock RT PCRs Done
43,064,793 UART: [art] Populate DV Done
43,070,034 UART: [fht] FMC Alias Private Key: 7
43,071,678 UART: [art] Derive CDI
43,072,505 UART: [art] Store in slot 0x4
43,131,551 UART: [art] Derive Key Pair
43,132,584 UART: [art] Store priv key in slot 0x5
45,595,727 UART: [art] Derive Key Pair - Done
45,608,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,321,224 UART: [art] Erasing AUTHORITY.KEYID = 7
47,322,728 UART: [art] PUB.X = A539770CDC92B7F9D4FCB39A8F4E928C1A686730AD3131B822CBDDAB55F3CFA8D17EA4EC7BA39AF703D0794D6E3F286F
47,329,979 UART: [art] PUB.Y = 797E02D32C18257E4BE3FD209A4ADC32AD441428DDA380F6D8D71D2CAA460166C2662E4E0D26C83302E95349D95DE6A2
47,337,258 UART: [art] SIG.R = 070AF84F6EF9F158990FE224C33DE0E53F32D81D260881612735C8A1772AC7539CF307572F5E34386022EFB89DC42F91
47,344,686 UART: [art] SIG.S = 10E1CCB2D1336475EC0F64120C561F2C3C8144972692651ADDB61C115352623E5D9AE90694A0A6359F02EBF607358F66
48,323,467 UART: mbox::rt_entry...
48,324,406 UART: ____ _ _ _ ____ _____
48,326,331 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,328,330 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,330,178 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,332,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,333,971 UART: |_|
48,334,850 UART:
48,704,833 UART: [rt] Runtime listening for mailbox commands...
48,706,998 >>> mbox cmd response data (48 bytes)
48,707,586 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,709,900 >>> mbox cmd response data (48 bytes)
48,710,761 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,727,681 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,460,519 ready_for_fw is high
3,460,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,218 >>> mbox cmd response: success
18,528,879 UART:
18,529,269 UART: Running Caliptra FMC ...
18,530,367 UART:
18,530,520 UART: [state] CFI Enabled
18,599,064 UART: [fht] FMC Alias Private Key: 7
20,365,537 UART: [art] Extend RT PCRs Done
20,366,767 UART: [art] Lock RT PCRs Done
20,368,363 UART: [art] Populate DV Done
20,374,052 UART: [fht] FMC Alias Private Key: 7
20,375,703 UART: [art] Derive CDI
20,376,439 UART: [art] Store in slot 0x4
20,431,400 UART: [art] Derive Key Pair
20,432,445 UART: [art] Store priv key in slot 0x5
22,895,416 UART: [art] Derive Key Pair - Done
22,908,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,620,552 UART: [art] Erasing AUTHORITY.KEYID = 7
24,622,060 UART: [art] PUB.X = 8022498F6AC940094CF487366EEF865CD031645630BC53ED8C2887CAEB05D30A5F3F4D1C266A25977ECAE62C9E632247
24,629,325 UART: [art] PUB.Y = 024FCADBAFE63FFFA6AC187081B3B276F2AC8B5A92A14BD99B1B98EF01480FD890B70D6050821C1AAB0BBD11F7C8D0C4
24,636,645 UART: [art] SIG.R = CFE9D942C9FDFD451406B5D783B2005A30274A4776216B3E117174CB6DCA278CB7622006AD7D0F6B77D0EB16D7A9F0FA
24,643,991 UART: [art] SIG.S = EC21021B5FA2EA428591409713A0CA49DC1AFF937F8A7A25728D47310D94D99F6A30F86306B5CE48454265B07B50E959
25,622,611 UART: Caliptra RT
25,623,337 UART: [state] CFI Enabled
25,803,551 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,842,571 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,998,182 UART: [rt]cmd =0x41544d4e, len=14344
33,993,956 >>> mbox cmd response data (8 bytes)
33,994,693 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,025,389 UART: [rt]cmd =0x41545348, len=116
34,045,825 >>> mbox cmd response data (12 bytes)
36,104,675 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,791,742 >>> mbox cmd response: success
42,792,208 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,829,280 UART:
42,829,564 UART: Running Caliptra FMC ...
42,830,831 UART:
42,830,998 UART: [state] CFI Enabled
42,931,585 UART: [art] Extend RT PCRs Done
42,932,905 UART: [art] Lock RT PCRs Done
42,934,096 UART: [art] Populate DV Done
42,939,460 UART: [fht] FMC Alias Private Key: 7
42,941,049 UART: [art] Derive CDI
42,941,865 UART: [art] Store in slot 0x4
43,000,830 UART: [art] Derive Key Pair
43,001,874 UART: [art] Store priv key in slot 0x5
45,464,878 UART: [art] Derive Key Pair - Done
45,477,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,191,826 UART: [art] Erasing AUTHORITY.KEYID = 7
47,193,341 UART: [art] PUB.X = 8B07F2C52EF601C024F57F56A7DC7F58111D8955936D2DAED397FD67A02731E1753ADD58A956C45E0105E58831D1A27D
47,200,599 UART: [art] PUB.Y = 1648DD40C8887B659E2975E3795C599E9E998EBF3839D81A782CB35F92B5B47654C0A3F5390E8672809852C7F2177B97
47,207,836 UART: [art] SIG.R = E9AA86BDEB996D94F654B9397CFC62000EE5CE7C938F5284DDABAF9797BBDD52D6C2326E6602486C9C263DF9473D0EBD
47,215,230 UART: [art] SIG.S = 1AAF28C6617626381A442DDA2658EA1BDED2E91E02DAA29ED988FAE8CA3E8A9E6E978703AA8FAE1D46405C824A3FB478
48,193,945 UART: mbox::rt_entry...
48,194,901 UART: ____ _ _ _ ____ _____
48,196,901 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,198,904 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,200,834 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,202,767 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,204,616 UART: |_|
48,205,446 UART:
48,575,012 UART: [rt] Runtime listening for mailbox commands...
48,577,166 >>> mbox cmd response data (48 bytes)
48,577,739 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,580,057 >>> mbox cmd response data (48 bytes)
48,580,955 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,597,829 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,425 writing to cptra_bootfsm_go
192,668 UART:
193,027 UART: Running Caliptra ROM ...
194,217 UART:
603,714 UART: [state] CFI Enabled
620,553 UART: [state] LifecycleState = Unprovisioned
622,468 UART: [state] DebugLocked = No
624,715 UART: [state] WD Timer not started. Device not locked for debugging
628,394 UART: [kat] SHA2-256
808,064 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,864 UART: [kat] ++
819,412 UART: [kat] sha1
829,799 UART: [kat] SHA2-256
832,525 UART: [kat] SHA2-384
838,515 UART: [kat] SHA2-512-ACC
840,886 UART: [kat] ECC-384
3,283,155 UART: [kat] HMAC-384Kdf
3,295,523 UART: [kat] LMS
3,772,050 UART: [kat] --
3,777,044 UART: [cold-reset] ++
3,778,692 UART: [fht] FHT @ 0x50003400
3,790,679 UART: [idev] ++
3,791,248 UART: [idev] CDI.KEYID = 6
3,792,173 UART: [idev] SUBJECT.KEYID = 7
3,793,424 UART: [idev] UDS.KEYID = 0
3,794,349 ready_for_fw is high
3,794,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,411 UART: [idev] Erasing UDS.KEYID = 0
6,272,338 UART: [idev] Sha1 KeyId Algorithm
6,295,906 UART: [idev] --
6,301,476 UART: [ldev] ++
6,302,084 UART: [ldev] CDI.KEYID = 6
6,303,009 UART: [ldev] SUBJECT.KEYID = 5
6,304,178 UART: [ldev] AUTHORITY.KEYID = 7
6,305,468 UART: [ldev] FE.KEYID = 1
6,315,849 UART: [ldev] Erasing FE.KEYID = 1
8,793,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,177 UART: [ldev] --
10,586,873 UART: [fwproc] Wait for Commands...
10,589,370 UART: [fwproc] Recv command 0x46574c44
10,591,365 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,441 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,466 >>> mbox cmd response: success
14,556,781 UART: [afmc] ++
14,557,423 UART: [afmc] CDI.KEYID = 6
14,558,336 UART: [afmc] SUBJECT.KEYID = 7
14,559,568 UART: [afmc] AUTHORITY.KEYID = 5
17,062,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,104 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,190 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,721 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,436 UART: [afmc] --
18,863,396 UART: [cold-reset] --
18,868,348 UART: [state] Locking Datavault
18,873,924 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,624 UART: [state] Locking ICCM
18,877,183 UART: [exit] Launching FMC @ 0x40000130
18,885,639 UART:
18,885,876 UART: Running Caliptra FMC ...
18,886,978 UART:
18,887,140 UART: [state] CFI Enabled
18,895,352 UART: [fht] FMC Alias Private Key: 7
20,661,425 UART: [art] Extend RT PCRs Done
20,662,645 UART: [art] Lock RT PCRs Done
20,664,192 UART: [art] Populate DV Done
20,669,774 UART: [fht] FMC Alias Private Key: 7
20,671,479 UART: [art] Derive CDI
20,672,240 UART: [art] Store in slot 0x4
20,715,224 UART: [art] Derive Key Pair
20,716,266 UART: [art] Store priv key in slot 0x5
23,143,639 UART: [art] Derive Key Pair - Done
23,156,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,026 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,530 UART: [art] PUB.X = 5427B79358477E5F4E287FB82A4B3E761F46E5DF1D8617EFD139B9313CE9E80E4793A9EB13688D5BBE36057994F6CD08
24,871,773 UART: [art] PUB.Y = 9A8D2722B0A2130EAAF4FDFA4FB5B827CAA33B992C3990A69085F4E844D6D7FF964E47A8B07E92B434EF39163A279236
24,879,066 UART: [art] SIG.R = BB208E035850774525208347F0C8D4401EC2907B79EE2F4CA3AEEBCE58B72CD081873D06FD296DC46916C541B3B4E457
24,886,411 UART: [art] SIG.S = 007113E8090EA144BB9FB9CFDF9D7FB0763F1BB70DB8622048222F5CB151C0B0B14FDF5833B3C09543FB536C79143A13
25,865,204 UART: Caliptra RT
25,865,910 UART: [state] CFI Enabled
25,999,294 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,041,284 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,197,283 UART: [rt]cmd =0x41544d4e, len=14344
34,192,491 >>> mbox cmd response data (8 bytes)
34,193,237 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,223,897 UART: [rt]cmd =0x41545348, len=116
34,244,507 >>> mbox cmd response data (12 bytes)
36,298,299 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,404,707 UART:
36,405,067 UART: Running Caliptra ROM ...
36,406,211 UART:
36,406,382 UART: [state] CFI Enabled
36,420,056 UART: [state] LifecycleState = Unprovisioned
36,421,957 UART: [state] DebugLocked = No
36,424,112 UART: [state] WD Timer not started. Device not locked for debugging
36,427,261 UART: [kat] SHA2-256
36,606,983 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,617,750 UART: [kat] ++
36,618,259 UART: [kat] sha1
36,629,997 UART: [kat] SHA2-256
36,632,716 UART: [kat] SHA2-384
36,637,627 UART: [kat] SHA2-512-ACC
36,639,978 UART: [kat] ECC-384
39,083,497 UART: [kat] HMAC-384Kdf
39,095,943 UART: [kat] LMS
39,572,430 UART: [kat] --
39,577,604 UART: [update-reset] ++
42,627,292 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,630,461 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
42,903,083 >>> mbox cmd response: success
42,903,464 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,903,739 UART: [update-reset] Copying MAN_2 To MAN_1
42,940,536 UART: [update-reset Success] --
42,945,404 UART: [state] Locking Datavault
42,949,689 UART: [state] Locking PCR0, PCR1 and PCR31
42,951,447 UART: [state] Locking ICCM
42,952,874 UART: [exit] Launching FMC @ 0x40000130
42,961,275 UART:
42,961,513 UART: Running Caliptra FMC ...
42,962,618 UART:
42,962,778 UART: [state] CFI Enabled
43,006,952 UART: [art] Extend RT PCRs Done
43,008,107 UART: [art] Lock RT PCRs Done
43,009,671 UART: [art] Populate DV Done
43,015,034 UART: [fht] FMC Alias Private Key: 7
43,016,685 UART: [art] Derive CDI
43,017,527 UART: [art] Store in slot 0x4
43,060,011 UART: [art] Derive Key Pair
43,061,049 UART: [art] Store priv key in slot 0x5
45,488,068 UART: [art] Derive Key Pair - Done
45,500,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,207,312 UART: [art] Erasing AUTHORITY.KEYID = 7
47,208,821 UART: [art] PUB.X = 06A1238283AD7A03D0C854F89137BE48C75B0954F801BDED565F655EDCEC24ABBF8C1004D2B5A2019805B4C7C1D17FBE
47,216,083 UART: [art] PUB.Y = E9FD4F726FA4595E0EB2B29BE21DB726C35F772DB970AF41ECDA61DDF775116A41A0712993BFADA581E742CBB98A43A1
47,223,373 UART: [art] SIG.R = 6BBA15435A7926AFC127664709CE9405C26BF919C7DCC7DCC22925EE98D4F241D06137A5A02C49D507FB318131DAF1FE
47,230,768 UART: [art] SIG.S = 79A92442AA1E64FE5AEE60920693B05FA8071ADF941B3763C16C5C9B7596172B40BBDF14F5918E6717526B61ABB64151
48,209,114 UART: mbox::rt_entry...
48,210,072 UART: ____ _ _ _ ____ _____
48,212,063 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,214,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,216,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,217,949 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,220,130 UART: |_|
48,220,978 UART:
48,590,528 UART: [rt] Runtime listening for mailbox commands...
48,592,697 >>> mbox cmd response data (48 bytes)
48,593,267 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,595,624 >>> mbox cmd response data (48 bytes)
48,596,507 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,613,427 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,780,043 ready_for_fw is high
3,780,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,489 >>> mbox cmd response: success
18,688,333 UART:
18,688,714 UART: Running Caliptra FMC ...
18,689,914 UART:
18,690,097 UART: [state] CFI Enabled
18,697,682 UART: [fht] FMC Alias Private Key: 7
20,463,349 UART: [art] Extend RT PCRs Done
20,464,578 UART: [art] Lock RT PCRs Done
20,466,100 UART: [art] Populate DV Done
20,471,592 UART: [fht] FMC Alias Private Key: 7
20,473,300 UART: [art] Derive CDI
20,474,038 UART: [art] Store in slot 0x4
20,517,014 UART: [art] Derive Key Pair
20,518,021 UART: [art] Store priv key in slot 0x5
22,944,614 UART: [art] Derive Key Pair - Done
22,957,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,663,610 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,106 UART: [art] PUB.X = 347ACFCA8B72D68D2E761E40E11F3C1A1F61EECDD4B986475B48F6540E28A9F81B4A5A72DC0BA151363D7BAF41B442C8
24,672,367 UART: [art] PUB.Y = B3D83F19E76BC07D7C38B882DC01B2D93FB6A83513C22A239E433B7C79D18FACC404393A51919565EF44D7C547EE8464
24,679,637 UART: [art] SIG.R = 494D07598CEC67457EA695D80B76C323BCC09F0AD384FF077D34AE63C2E7D43ED9C816E179A069919AA8B881F4C72EF8
24,687,034 UART: [art] SIG.S = A1E36C550C224A34C512ABBA4F717BB5CEBB2C6FC252DA3FFC0EC0312966766FF511103A8B7FEE4E2B60853150DD9207
25,665,950 UART: Caliptra RT
25,666,657 UART: [state] CFI Enabled
25,800,569 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,840,396 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,995,880 UART: [rt]cmd =0x41544d4e, len=14344
33,990,995 >>> mbox cmd response data (8 bytes)
33,991,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,022,568 UART: [rt]cmd =0x41545348, len=116
34,042,571 >>> mbox cmd response data (12 bytes)
36,100,717 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,712,789 >>> mbox cmd response: success
42,713,253 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,749,145 UART:
42,749,433 UART: Running Caliptra FMC ...
42,750,466 UART:
42,750,614 UART: [state] CFI Enabled
42,794,699 UART: [art] Extend RT PCRs Done
42,795,986 UART: [art] Lock RT PCRs Done
42,797,312 UART: [art] Populate DV Done
42,802,617 UART: [fht] FMC Alias Private Key: 7
42,804,104 UART: [art] Derive CDI
42,804,874 UART: [art] Store in slot 0x4
42,847,586 UART: [art] Derive Key Pair
42,848,625 UART: [art] Store priv key in slot 0x5
45,275,682 UART: [art] Derive Key Pair - Done
45,288,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,995,075 UART: [art] Erasing AUTHORITY.KEYID = 7
46,996,563 UART: [art] PUB.X = F5406DB4303A03283A1BE338DA6A07905083FB0D9FF2C684F4FEC66C6B07E98D1CD394D4B0B6BA35925E8E3067F5F532
47,003,889 UART: [art] PUB.Y = CDCF0020535593CACB133AE9138B5C16A6ABB680AADB61832ACE30E81B4F168F631026EB9DB1F97B793F8E321216B328
47,011,087 UART: [art] SIG.R = BA99977F368A71C414E29872F28EA6CBAD8EB3CADA7A9E648D4D49A82B78B81B830FB3A3FCA7F91EB367F60908B93AD9
47,018,500 UART: [art] SIG.S = 7876D36614681D8A8435B2859D1AF9F00E00B3C9766824C36E4134930238B42C3F7DFC25560428013A7541C336030156
47,996,637 UART: mbox::rt_entry...
47,997,605 UART: ____ _ _ _ ____ _____
47,999,600 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,001,611 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,003,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,005,497 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,007,437 UART: |_|
48,008,253 UART:
48,378,310 UART: [rt] Runtime listening for mailbox commands...
48,380,467 >>> mbox cmd response data (48 bytes)
48,381,029 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
48,383,375 >>> mbox cmd response data (48 bytes)
48,384,274 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
48,401,136 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,144 UART:
192,498 UART: Running Caliptra ROM ...
193,697 UART:
193,853 UART: [state] CFI Enabled
260,561 UART: [state] LifecycleState = Unprovisioned
262,902 UART: [state] DebugLocked = No
265,072 UART: [state] WD Timer not started. Device not locked for debugging
270,541 UART: [kat] SHA2-256
460,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,133 UART: [kat] ++
471,790 UART: [kat] sha1
482,884 UART: [kat] SHA2-256
485,890 UART: [kat] SHA2-384
492,233 UART: [kat] SHA2-512-ACC
494,810 UART: [kat] ECC-384
2,946,376 UART: [kat] HMAC-384Kdf
2,972,204 UART: [kat] LMS
3,503,930 UART: [kat] --
3,509,487 UART: [cold-reset] ++
3,511,014 UART: [fht] FHT @ 0x50003400
3,521,068 UART: [idev] ++
3,521,785 UART: [idev] CDI.KEYID = 6
3,522,690 UART: [idev] SUBJECT.KEYID = 7
3,523,928 UART: [idev] UDS.KEYID = 0
3,524,850 ready_for_fw is high
3,525,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,465 UART: [idev] Erasing UDS.KEYID = 0
6,028,064 UART: [idev] Sha1 KeyId Algorithm
6,050,001 UART: [idev] --
6,053,303 UART: [ldev] ++
6,053,984 UART: [ldev] CDI.KEYID = 6
6,054,871 UART: [ldev] SUBJECT.KEYID = 5
6,056,081 UART: [ldev] AUTHORITY.KEYID = 7
6,057,317 UART: [ldev] FE.KEYID = 1
6,099,260 UART: [ldev] Erasing FE.KEYID = 1
8,607,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,424 UART: [ldev] --
10,414,309 UART: [fwproc] Wait for Commands...
10,417,334 UART: [fwproc] Recv command 0x46574c44
10,419,647 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,618 >>> mbox cmd response: success
14,683,710 UART: [afmc] ++
14,684,427 UART: [afmc] CDI.KEYID = 6
14,685,620 UART: [afmc] SUBJECT.KEYID = 7
14,687,061 UART: [afmc] AUTHORITY.KEYID = 5
17,215,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,042 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,199 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,704 UART: [afmc] --
19,011,142 UART: [cold-reset] --
19,015,492 UART: [state] Locking Datavault
19,019,672 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,877 UART: [state] Locking ICCM
19,024,575 UART: [exit] Launching FMC @ 0x40000130
19,033,202 UART:
19,033,478 UART: Running Caliptra FMC ...
19,034,589 UART:
19,034,754 UART: [state] CFI Enabled
19,094,194 UART: [fht] FMC Alias Private Key: 7
20,861,620 UART: [art] Extend RT PCRs Done
20,862,838 UART: [art] Lock RT PCRs Done
20,864,837 UART: [art] Populate DV Done
20,870,051 UART: [fht] FMC Alias Private Key: 7
20,871,621 UART: [art] Derive CDI
20,872,402 UART: [art] Store in slot 0x4
20,927,547 UART: [art] Derive Key Pair
20,928,550 UART: [art] Store priv key in slot 0x5
23,391,579 UART: [art] Derive Key Pair - Done
23,404,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,438 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,950 UART: [art] PUB.X = A5B2E0C517624D6479C72ED2CF36B40617D0F80DAA93FA5BC892DCF9D8D0E431825557C4D1440F2D9275E35337A8180A
25,126,205 UART: [art] PUB.Y = DD01D3362BAE3CA6A9F45503EF73CB83DACB95A02120BFC061FA8D240164689F146C321CF4830F0BD6EE1C31DBDA8AB6
25,133,451 UART: [art] SIG.R = 000FA4C5ADAC5CA25ECCFD8DB211D519232725995D7CE993F4F179FD68676E2A9EB46493EE4EDAED9B7E2A46D820B99C
25,140,860 UART: [art] SIG.S = AB063351FE00D13513507CFBB0C539CAA1A7B52352B10FF421FFA8D34B1665D162380861D19DE98FB77A6200EE005698
26,119,695 UART: Caliptra RT
26,120,385 UART: [state] CFI Enabled
26,300,938 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,346,803 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,502,462 UART: [rt]cmd =0x41544d4e, len=14344
34,498,325 >>> mbox cmd response data (8 bytes)
34,499,067 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,529,760 UART: [rt]cmd =0x41545348, len=116
34,550,296 >>> mbox cmd response data (12 bytes)
36,607,668 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,714,487 UART:
36,714,895 UART: Running Caliptra ROM ...
36,715,986 UART:
36,716,148 UART: [state] CFI Enabled
36,780,338 UART: [state] LifecycleState = Unprovisioned
36,782,398 UART: [state] DebugLocked = No
36,784,386 UART: [state] WD Timer not started. Device not locked for debugging
36,788,230 UART: [kat] SHA2-256
36,978,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,988,866 UART: [kat] ++
36,989,351 UART: [kat] sha1
37,000,936 UART: [kat] SHA2-256
37,003,952 UART: [kat] SHA2-384
37,010,964 UART: [kat] SHA2-512-ACC
37,013,532 UART: [kat] ECC-384
39,464,949 UART: [kat] HMAC-384Kdf
39,490,298 UART: [kat] LMS
40,021,898 UART: [kat] --
40,026,101 UART: [update-reset] ++
43,096,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,100,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,516,357 >>> mbox cmd response: success
43,516,801 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,517,584 UART: [update-reset] Copying MAN_2 To MAN_1
43,555,141 UART: [update-reset Success] --
43,557,371 UART: [state] Locking Datavault
43,561,369 UART: [state] Locking PCR0, PCR1 and PCR31
43,563,500 UART: [state] Locking ICCM
43,566,055 UART: [exit] Launching FMC @ 0x40000130
43,574,723 UART:
43,574,967 UART: Running Caliptra FMC ...
43,576,070 UART:
43,576,227 UART: [state] CFI Enabled
43,682,659 UART: [art] Extend RT PCRs Done
43,683,851 UART: [art] Lock RT PCRs Done
43,684,925 UART: [art] Populate DV Done
43,690,223 UART: [fht] FMC Alias Private Key: 7
43,691,757 UART: [art] Derive CDI
43,692,584 UART: [art] Store in slot 0x4
43,751,864 UART: [art] Derive Key Pair
43,752,895 UART: [art] Store priv key in slot 0x5
46,215,515 UART: [art] Derive Key Pair - Done
46,228,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,940,840 UART: [art] Erasing AUTHORITY.KEYID = 7
47,942,408 UART: [art] PUB.X = 6CE98FC0A2B9C3C7834290773974015020FC3A72D7AA1999856DA8BF69CDD1E65F9ED827EDC3FC0FC0518BCEAC2B9D61
47,949,612 UART: [art] PUB.Y = 4CA21AC22197593FED5C21AD3D97213099B41CCE822B6D6D19F754A771FA47381201210005AB4798B6370131283A7105
47,956,795 UART: [art] SIG.R = 2523E9F8C8C83E57EABB4C3D25FB59193E82A71B1A58019CF6279CAF2624284BE203CA25C290438A72585B005D17171D
47,964,183 UART: [art] SIG.S = E6D4D5A10FEBE2AAB0567B3A225CCB3798246073552FBD12A596B098BEB0604731D7E32144BC17EDCCF91311EA7957AF
48,942,361 UART: mbox::rt_entry...
48,943,308 UART: ____ _ _ _ ____ _____
48,945,232 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,947,233 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,949,354 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,951,294 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,953,239 UART: |_|
48,954,067 UART:
49,323,659 UART: [rt] Runtime listening for mailbox commands...
49,325,821 >>> mbox cmd response data (48 bytes)
49,326,416 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,328,931 >>> mbox cmd response data (48 bytes)
49,329,831 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,346,690 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,436,609 ready_for_fw is high
3,437,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,196 >>> mbox cmd response: success
19,108,722 UART:
19,109,134 UART: Running Caliptra FMC ...
19,110,244 UART:
19,110,396 UART: [state] CFI Enabled
19,176,514 UART: [fht] FMC Alias Private Key: 7
20,963,515 UART: [art] Extend RT PCRs Done
20,964,744 UART: [art] Lock RT PCRs Done
20,966,348 UART: [art] Populate DV Done
20,971,714 UART: [fht] FMC Alias Private Key: 7
20,973,472 UART: [art] Derive CDI
20,974,291 UART: [art] Store in slot 0x4
21,029,767 UART: [art] Derive Key Pair
21,030,817 UART: [art] Store priv key in slot 0x5
23,493,722 UART: [art] Derive Key Pair - Done
23,506,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,961 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,472 UART: [art] PUB.X = F149E7D2253FC6265ED2D44FB8F43986AD243B257D80879FC67C30B539255BE3E0ACE7C29D8258CF24F48DA2AE79FD9B
25,227,797 UART: [art] PUB.Y = 14D367535A96144FD3E6F9C94FD924FF5EB385FE17FB59711393FE128ADC0D4562CEDF6F01585C0416EC43B034702766
25,235,014 UART: [art] SIG.R = 0DC5A7C95C8B21CBECD20532CF6A44E155175E99A9474960DBDB5B41CB28F6FD10BFE3258449A77F87FB00F20AA85336
25,242,364 UART: [art] SIG.S = DDD3962FB5B578157997896CAF937CB15F88735AECA649B94B650DB0D50DDBC5BCCAF78D5CCAE18FE4B8ACA5B92CD6EC
26,221,640 UART: Caliptra RT
26,222,332 UART: [state] CFI Enabled
26,402,825 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,449,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,604,668 UART: [rt]cmd =0x41544d4e, len=14344
34,600,319 >>> mbox cmd response data (8 bytes)
34,601,083 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,631,894 UART: [rt]cmd =0x41545348, len=116
34,652,256 >>> mbox cmd response data (12 bytes)
36,709,464 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,801,512 >>> mbox cmd response: success
43,802,068 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,835,849 UART:
43,836,135 UART: Running Caliptra FMC ...
43,837,170 UART:
43,837,318 UART: [state] CFI Enabled
43,927,630 UART: [art] Extend RT PCRs Done
43,928,923 UART: [art] Lock RT PCRs Done
43,930,370 UART: [art] Populate DV Done
43,935,731 UART: [fht] FMC Alias Private Key: 7
43,937,261 UART: [art] Derive CDI
43,937,990 UART: [art] Store in slot 0x4
43,997,121 UART: [art] Derive Key Pair
43,998,179 UART: [art] Store priv key in slot 0x5
46,461,573 UART: [art] Derive Key Pair - Done
46,474,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,187,708 UART: [art] Erasing AUTHORITY.KEYID = 7
48,189,218 UART: [art] PUB.X = CBB89BE72D75965FB30EA5D8DAC9F296A4336F25229FFBD18B437B8AEB74584FEEFFE817425756E62089464054869108
48,196,516 UART: [art] PUB.Y = 1D53C16AEA2756A4844153CC0BB161E4057A8A9CCD164CE57AFE0FABC9070A9ED11217A29D621F0BDD43DE914B81426E
48,203,741 UART: [art] SIG.R = 52C0D659C68EA4B5494D90AD2FF5DD4E7A19626F9A94DDB8C7D0CF500EC1E7F7A8052E7D8A6F18367AB2B9224CD17075
48,211,176 UART: [art] SIG.S = F5A0779C94F939463FAF0C545A600FE958C8914AC3C0FEEDA1AF11AC308FDB03392B3AC9EFF48AACD0477018C0AB7E8B
49,189,840 UART: mbox::rt_entry...
49,190,782 UART: ____ _ _ _ ____ _____
49,192,756 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,194,686 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,196,607 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,198,648 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,200,572 UART: |_|
49,201,376 UART:
49,576,937 UART: [rt] Runtime listening for mailbox commands...
49,579,141 >>> mbox cmd response data (48 bytes)
49,579,714 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,582,027 >>> mbox cmd response data (48 bytes)
49,582,917 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,599,832 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,320 UART:
192,684 UART: Running Caliptra ROM ...
193,884 UART:
603,349 UART: [state] CFI Enabled
616,478 UART: [state] LifecycleState = Unprovisioned
618,885 UART: [state] DebugLocked = No
620,991 UART: [state] WD Timer not started. Device not locked for debugging
625,832 UART: [kat] SHA2-256
815,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,501 UART: [kat] ++
827,107 UART: [kat] sha1
838,421 UART: [kat] SHA2-256
841,432 UART: [kat] SHA2-384
848,559 UART: [kat] SHA2-512-ACC
851,148 UART: [kat] ECC-384
3,294,969 UART: [kat] HMAC-384Kdf
3,308,356 UART: [kat] LMS
3,840,166 UART: [kat] --
3,844,405 UART: [cold-reset] ++
3,846,339 UART: [fht] FHT @ 0x50003400
3,858,244 UART: [idev] ++
3,858,888 UART: [idev] CDI.KEYID = 6
3,859,923 UART: [idev] SUBJECT.KEYID = 7
3,861,031 UART: [idev] UDS.KEYID = 0
3,861,968 ready_for_fw is high
3,862,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,113 UART: [idev] Erasing UDS.KEYID = 0
6,344,350 UART: [idev] Sha1 KeyId Algorithm
6,366,934 UART: [idev] --
6,370,876 UART: [ldev] ++
6,371,557 UART: [ldev] CDI.KEYID = 6
6,372,660 UART: [ldev] SUBJECT.KEYID = 5
6,373,785 UART: [ldev] AUTHORITY.KEYID = 7
6,374,974 UART: [ldev] FE.KEYID = 1
6,384,543 UART: [ldev] Erasing FE.KEYID = 1
8,860,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,576 UART: [ldev] --
10,649,433 UART: [fwproc] Wait for Commands...
10,651,853 UART: [fwproc] Recv command 0x46574c44
10,654,169 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,638 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,875 >>> mbox cmd response: success
14,917,614 UART: [afmc] ++
14,918,313 UART: [afmc] CDI.KEYID = 6
14,919,482 UART: [afmc] SUBJECT.KEYID = 7
14,920,976 UART: [afmc] AUTHORITY.KEYID = 5
17,430,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,643 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,750 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,923 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,823 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,935 UART: [afmc] --
19,226,328 UART: [cold-reset] --
19,230,905 UART: [state] Locking Datavault
19,238,283 UART: [state] Locking PCR0, PCR1 and PCR31
19,240,447 UART: [state] Locking ICCM
19,242,612 UART: [exit] Launching FMC @ 0x40000130
19,251,307 UART:
19,251,544 UART: Running Caliptra FMC ...
19,252,768 UART:
19,252,933 UART: [state] CFI Enabled
19,260,853 UART: [fht] FMC Alias Private Key: 7
21,027,689 UART: [art] Extend RT PCRs Done
21,028,918 UART: [art] Lock RT PCRs Done
21,030,335 UART: [art] Populate DV Done
21,035,647 UART: [fht] FMC Alias Private Key: 7
21,037,169 UART: [art] Derive CDI
21,037,942 UART: [art] Store in slot 0x4
21,080,807 UART: [art] Derive Key Pair
21,081,817 UART: [art] Store priv key in slot 0x5
23,508,668 UART: [art] Derive Key Pair - Done
23,521,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,863 UART: [art] PUB.X = 893B35EDE0200552F059BD6E4DD284B170B0995AAF0123A3043F8352FF32162ED724763F4B38F69D2AA69E8580987C0F
25,237,072 UART: [art] PUB.Y = AC3A7E241B3E5104D65C0887B5C7F51A9CC4E2AA154F5000B87DF9BE4EA35453E3C032E61FF6184B11D247CFC3A3C56D
25,244,336 UART: [art] SIG.R = 1991DF2E7DE457139943AA1ACF24E79A93C1EAA6DF37FD6938B87EBE65CDF748EC76FBC45BBF8093DC858753CB1166A8
25,251,763 UART: [art] SIG.S = 98BAC09A523F05BF35C660345A41D1736E8B056679DCBCCC3964BF5C462EA8F30CC3E435A3555B129FCCBBF310F750B4
26,230,997 UART: Caliptra RT
26,231,702 UART: [state] CFI Enabled
26,363,776 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,418,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,574,163 UART: [rt]cmd =0x41544d4e, len=14344
34,570,241 >>> mbox cmd response data (8 bytes)
34,570,965 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,601,594 UART: [rt]cmd =0x41545348, len=116
34,621,658 >>> mbox cmd response data (12 bytes)
36,682,839 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
36,788,760 UART:
36,789,124 UART: Running Caliptra ROM ...
36,790,261 UART:
36,790,434 UART: [state] CFI Enabled
36,803,898 UART: [state] LifecycleState = Unprovisioned
36,805,819 UART: [state] DebugLocked = No
36,807,474 UART: [state] WD Timer not started. Device not locked for debugging
36,811,887 UART: [kat] SHA2-256
37,001,786 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,012,627 UART: [kat] ++
37,013,128 UART: [kat] sha1
37,024,566 UART: [kat] SHA2-256
37,027,560 UART: [kat] SHA2-384
37,032,534 UART: [kat] SHA2-512-ACC
37,035,165 UART: [kat] ECC-384
39,476,853 UART: [kat] HMAC-384Kdf
39,489,627 UART: [kat] LMS
40,021,255 UART: [kat] --
40,026,057 UART: [update-reset] ++
43,095,313 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,098,101 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
43,513,559 >>> mbox cmd response: success
43,513,939 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,515,089 UART: [update-reset] Copying MAN_2 To MAN_1
43,552,618 UART: [update-reset Success] --
43,557,241 UART: [state] Locking Datavault
43,560,293 UART: [state] Locking PCR0, PCR1 and PCR31
43,562,440 UART: [state] Locking ICCM
43,565,031 UART: [exit] Launching FMC @ 0x40000130
43,573,722 UART:
43,573,997 UART: Running Caliptra FMC ...
43,575,031 UART:
43,575,187 UART: [state] CFI Enabled
43,619,312 UART: [art] Extend RT PCRs Done
43,620,457 UART: [art] Lock RT PCRs Done
43,621,992 UART: [art] Populate DV Done
43,627,613 UART: [fht] FMC Alias Private Key: 7
43,629,222 UART: [art] Derive CDI
43,629,961 UART: [art] Store in slot 0x4
43,672,824 UART: [art] Derive Key Pair
43,673,865 UART: [art] Store priv key in slot 0x5
46,100,419 UART: [art] Derive Key Pair - Done
46,113,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,819,429 UART: [art] Erasing AUTHORITY.KEYID = 7
47,821,438 UART: [art] PUB.X = FF0DAB8EA0B1847F0AFED5BD8BA3651AD0C5A5C64279E8B521F026EC75DB516FF9977CD1017A8773C00AB89AD85157D0
47,828,223 UART: [art] PUB.Y = CBE8413D8595D04770A971FAB772966A1A5A90639FE5C2CEEF8ADE8AAE9F14353766F5C7EED34478ED11B916CE165B3D
47,835,470 UART: [art] SIG.R = 8C4D7370FBAD45F4A44E7280B1A686B073F7F059C638DED13806DE56A53D599A2411C65DC687221F4538226F68FBCCA5
47,842,880 UART: [art] SIG.S = 1F9478F45AB0C7469A3709F084E6A6367244A87B6127689681489494886BF9BA15E25FA8A52C474CADD2440460AE0C8F
48,821,026 UART: mbox::rt_entry...
48,821,990 UART: ____ _ _ _ ____ _____
48,823,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
48,825,913 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
48,827,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
48,829,800 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
48,831,735 UART: |_|
48,832,575 UART:
49,206,576 UART: [rt] Runtime listening for mailbox commands...
49,208,758 >>> mbox cmd response data (48 bytes)
49,209,409 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,211,789 >>> mbox cmd response data (48 bytes)
49,212,674 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,229,569 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
3,750,771 ready_for_fw is high
3,751,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,330 >>> mbox cmd response: success
19,296,501 UART:
19,296,891 UART: Running Caliptra FMC ...
19,298,090 UART:
19,298,270 UART: [state] CFI Enabled
19,306,163 UART: [fht] FMC Alias Private Key: 7
21,071,709 UART: [art] Extend RT PCRs Done
21,072,945 UART: [art] Lock RT PCRs Done
21,074,588 UART: [art] Populate DV Done
21,080,045 UART: [fht] FMC Alias Private Key: 7
21,081,657 UART: [art] Derive CDI
21,082,483 UART: [art] Store in slot 0x4
21,125,196 UART: [art] Derive Key Pair
21,126,199 UART: [art] Store priv key in slot 0x5
23,552,970 UART: [art] Derive Key Pair - Done
23,565,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,462 UART: [art] PUB.X = 348C81576B83AB4261F83ABCC4CAC9A74100EED1B0B24ECC6FDACD7EE77ADA342A2DDF31EEA2A609DDDA69D151462DFF
25,280,738 UART: [art] PUB.Y = 8F78AFF232994310C6BED57811D630F3CB340954FD8C9E180F7B87E0595385F802AE7DF52E4A3D19C7E01CD986DF2D50
25,287,958 UART: [art] SIG.R = 5EC545B3879FE8DC15A6CA1A5E4C377453FEE65E5B7FEAF3C48CF05DC29F577D10EA3241E2484FC8B4C816052CD0FDC4
25,295,376 UART: [art] SIG.S = 14BA5D7EBE7421AC339EB08FC1B7607050F359C445A6902F84594B6B81968CA4846826F6F10235E881B33E80D780D426
26,274,353 UART: Caliptra RT
26,275,043 UART: [state] CFI Enabled
26,407,703 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,455,535 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,611,035 UART: [rt]cmd =0x41544d4e, len=14344
34,606,981 >>> mbox cmd response data (8 bytes)
34,607,774 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,638,696 UART: [rt]cmd =0x41545348, len=116
34,658,687 >>> mbox cmd response data (12 bytes)
36,716,690 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,733,005 >>> mbox cmd response: success
43,733,968 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,767,234 UART:
43,767,557 UART: Running Caliptra FMC ...
43,768,683 UART:
43,768,850 UART: [state] CFI Enabled
43,812,985 UART: [art] Extend RT PCRs Done
43,814,388 UART: [art] Lock RT PCRs Done
43,815,687 UART: [art] Populate DV Done
43,820,880 UART: [fht] FMC Alias Private Key: 7
43,822,527 UART: [art] Derive CDI
43,823,345 UART: [art] Store in slot 0x4
43,865,939 UART: [art] Derive Key Pair
43,866,944 UART: [art] Store priv key in slot 0x5
46,293,864 UART: [art] Derive Key Pair - Done
46,306,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,013,032 UART: [art] Erasing AUTHORITY.KEYID = 7
48,014,549 UART: [art] PUB.X = B00BB8521B6CEE895E8A1232A96C07784AF5D6C627E53DA614C753FC93B23E33A5D71400140CE8F4B834B17F0CB74D3D
48,021,779 UART: [art] PUB.Y = FC0451BDA5C0243353F1AE72683BCA89CE14182696EA2722C2C11A52C68CC62D3E804B247D14F1EC3B67241DA661F2AE
48,029,057 UART: [art] SIG.R = 7FB74191DB1210C8F031F011D82310BA6F03661C81A5C815BA548EFA10B2EAF72329EA130E68DD7F034B547632AC25C7
48,036,452 UART: [art] SIG.S = FB407FF7E139427E57F9956C685B41B26A9A9C51E3BD3757C2A6241D4F2BBFD2669505F175A52030CB935FCC80F23390
49,014,897 UART: mbox::rt_entry...
49,015,844 UART: ____ _ _ _ ____ _____
49,017,837 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,019,851 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,021,793 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,023,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,025,600 UART: |_|
49,026,407 UART:
49,397,796 UART: [rt] Runtime listening for mailbox commands...
49,399,950 >>> mbox cmd response data (48 bytes)
49,400,537 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
49,402,917 >>> mbox cmd response data (48 bytes)
49,403,811 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
49,420,677 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,627 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,107 UART: [kat] SHA2-256
882,038 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,153 UART: [kat] ++
886,305 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,292 UART: [kat] SHA2-512-ACC
897,193 UART: [kat] ECC-384
902,788 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,329 UART: [cold-reset] ++
1,476,695 UART: [fht] Storing FHT @ 0x50003400
1,479,390 UART: [idev] ++
1,479,558 UART: [idev] CDI.KEYID = 6
1,479,918 UART: [idev] SUBJECT.KEYID = 7
1,480,342 UART: [idev] UDS.KEYID = 0
1,480,687 ready_for_fw is high
1,480,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,160 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,852 UART: [idev] --
1,514,719 UART: [ldev] ++
1,514,887 UART: [ldev] CDI.KEYID = 6
1,515,250 UART: [ldev] SUBJECT.KEYID = 5
1,515,676 UART: [ldev] AUTHORITY.KEYID = 7
1,516,139 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,308 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,136 UART: [ldev] --
1,585,539 UART: [fwproc] Waiting for Commands...
1,586,188 UART: [fwproc] Received command 0x46574c44
1,586,979 UART: [fwproc] Received Image of size 118548 bytes
2,931,549 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,443 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,661 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,884 >>> mbox cmd response: success
3,130,914 UART: [afmc] ++
3,131,082 UART: [afmc] CDI.KEYID = 6
3,131,444 UART: [afmc] SUBJECT.KEYID = 7
3,131,869 UART: [afmc] AUTHORITY.KEYID = 5
3,166,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,597 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,480 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,163 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,931 UART: [afmc] --
3,209,813 UART: [cold-reset] --
3,210,661 UART: [state] Locking Datavault
3,212,026 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,630 UART: [state] Locking ICCM
3,213,120 UART: [exit] Launching FMC @ 0x40000130
3,218,450 UART:
3,218,466 UART: Running Caliptra FMC ...
3,218,874 UART:
3,218,928 UART: [state] CFI Enabled
3,229,426 UART: [fht] FMC Alias Private Key: 7
3,348,612 UART: [art] Extend RT PCRs Done
3,349,040 UART: [art] Lock RT PCRs Done
3,350,700 UART: [art] Populate DV Done
3,358,799 UART: [fht] FMC Alias Private Key: 7
3,359,881 UART: [art] Derive CDI
3,360,161 UART: [art] Store in slot 0x4
3,446,069 UART: [art] Derive Key Pair
3,446,429 UART: [art] Store priv key in slot 0x5
3,459,726 UART: [art] Derive Key Pair - Done
3,474,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,630 UART: [art] PUB.X = B7D80993A14FD9840C552CB69D9917D893A4F3FBF91D0C16230144E64393686E95A1D414BD4C3381DF01AA6A5907DEF4
3,497,384 UART: [art] PUB.Y = 47B4076AF3ADD3F252F08A6D143448A6660FFDC32C919159113904CF8E30C92A1666DCD9649B636C9082EB43ACCE7ABD
3,504,333 UART: [art] SIG.R = DB186DBB29FD1AAA9C333C14C8E7083C0C0FDCF321C374BF42CFABBFC118252AB15CC60ED7324499B1DC916A9FD874D6
3,511,115 UART: [art] SIG.S = E68612AF5E851615D4247F1EB90D1702AC502CA10DF678A26E5B92B3F98DE5EBD09C72D0DA7626346E13CE098181118F
3,535,015 UART: Caliptra RT
3,535,266 UART: [state] CFI Enabled
3,655,685 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,656,355 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,357 UART: [rt]cmd =0x41544d4e, len=14344
4,088,668 >>> mbox cmd response data (8 bytes)
4,088,669 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,770 UART: [rt]cmd =0x41545348, len=116
4,141,037 >>> mbox cmd response data (12 bytes)
4,141,038 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,806 UART:
4,141,822 UART: Running Caliptra ROM ...
4,142,230 UART:
4,142,284 UART: [state] CFI Enabled
4,145,084 UART: [state] LifecycleState = Unprovisioned
4,145,739 UART: [state] DebugLocked = No
4,146,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,148,054 UART: [kat] SHA2-256
4,941,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,946,100 UART: [kat] ++
4,946,252 UART: [kat] sha1
4,950,644 UART: [kat] SHA2-256
4,952,582 UART: [kat] SHA2-384
4,955,337 UART: [kat] SHA2-512-ACC
4,957,237 UART: [kat] ECC-384
4,962,868 UART: [kat] HMAC-384Kdf
4,967,404 UART: [kat] LMS
5,535,600 UART: [kat] --
5,536,491 UART: [update-reset] ++
6,509,262 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,510,452 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,612,145 >>> mbox cmd response: success
6,612,145 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,612,354 UART: [update-reset] Copying MAN_2 To MAN_1
6,620,368 UART: [update-reset Success] --
6,621,289 UART: [state] Locking Datavault
6,622,051 UART: [state] Locking PCR0, PCR1 and PCR31
6,622,655 UART: [state] Locking ICCM
6,623,275 UART: [exit] Launching FMC @ 0x40000130
6,628,605 UART:
6,628,621 UART: Running Caliptra FMC ...
6,629,029 UART:
6,629,083 UART: [state] CFI Enabled
6,718,234 UART: [art] Extend RT PCRs Done
6,718,662 UART: [art] Lock RT PCRs Done
6,719,877 UART: [art] Populate DV Done
6,728,090 UART: [fht] FMC Alias Private Key: 7
6,729,174 UART: [art] Derive CDI
6,729,454 UART: [art] Store in slot 0x4
6,814,762 UART: [art] Derive Key Pair
6,815,122 UART: [art] Store priv key in slot 0x5
6,828,949 UART: [art] Derive Key Pair - Done
6,843,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,858,914 UART: [art] Erasing AUTHORITY.KEYID = 7
6,859,679 UART: [art] PUB.X = 0E7BEA619003CCDF635305003D23B9E81086D4C1D08C236E10A2CE4A572AAA5139DB42C3C62E206B442080FEC68293A6
6,866,422 UART: [art] PUB.Y = D3AE31C843EC86E662C7867CC9055880AD3AF3AAECDD51F2C4F376A96A252A4C6133AA8D57BA2653B251C234B19EFEAA
6,873,387 UART: [art] SIG.R = 4319CC186B23764756ECD6CE63331CE0F0001DB0874E70E1F61336C2732F7B77D7A5E59338ACBD2A54C016257320D8F0
6,880,133 UART: [art] SIG.S = 7BADBC31900D07A78C06176978C24121E9E5F50B08C240761466849DB0EABD8C4C42F9F899976BB06040BAF4E1D627D0
6,903,524 UART: mbox::rt_entry...
6,903,896 UART: ____ _ _ _ ____ _____
6,904,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,905,480 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,906,248 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,907,016 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,907,784 UART: |_|
6,908,096 UART:
7,270,042 UART: [rt] Runtime listening for mailbox commands...
7,271,240 >>> mbox cmd response data (48 bytes)
7,271,241 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,274,028 >>> mbox cmd response data (48 bytes)
7,274,029 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,292,174 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,935 ready_for_fw is high
1,362,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,104 >>> mbox cmd response: success
3,043,017 UART:
3,043,033 UART: Running Caliptra FMC ...
3,043,441 UART:
3,043,495 UART: [state] CFI Enabled
3,054,007 UART: [fht] FMC Alias Private Key: 7
3,173,215 UART: [art] Extend RT PCRs Done
3,173,643 UART: [art] Lock RT PCRs Done
3,175,085 UART: [art] Populate DV Done
3,183,532 UART: [fht] FMC Alias Private Key: 7
3,184,508 UART: [art] Derive CDI
3,184,788 UART: [art] Store in slot 0x4
3,270,144 UART: [art] Derive Key Pair
3,270,504 UART: [art] Store priv key in slot 0x5
3,283,447 UART: [art] Derive Key Pair - Done
3,298,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,452 UART: [art] PUB.X = D03D286B95E08C8E3D5ECF108FB256F852CBA1235D524A0F7C57B83ACAF7DFBDA573512613F4C960DA9E051D100C9DC3
3,321,229 UART: [art] PUB.Y = 42A11AC77F0B10ED36B556613DA3814C72ED8984A89C788B2A3EB36D5AEC50FA95E280E92010D7CE84C8EF3DC5B1398D
3,328,188 UART: [art] SIG.R = E53D8EF06890BDBB5F145A3FD4498ECE0C907786F7FFCBA3F1CD3A9A4C4E6570392EE97FD2C0FE272BDC6F6FDBD967A7
3,334,983 UART: [art] SIG.S = 90B47926D0FC0E42E863B76665F0B62258BF4A852539F0C68D1BE01A6AF157992CC882411EBCDC2F0C127C7785A2542C
3,358,985 UART: Caliptra RT
3,359,236 UART: [state] CFI Enabled
3,479,527 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,197 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,457 UART: [rt]cmd =0x41544d4e, len=14344
3,913,130 >>> mbox cmd response data (8 bytes)
3,913,131 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,894 UART: [rt]cmd =0x41545348, len=116
3,964,675 >>> mbox cmd response data (12 bytes)
3,964,676 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,316,299 >>> mbox cmd response: success
6,316,299 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,329,413 UART:
6,329,429 UART: Running Caliptra FMC ...
6,329,837 UART:
6,329,891 UART: [state] CFI Enabled
6,418,674 UART: [art] Extend RT PCRs Done
6,419,102 UART: [art] Lock RT PCRs Done
6,420,329 UART: [art] Populate DV Done
6,428,708 UART: [fht] FMC Alias Private Key: 7
6,429,866 UART: [art] Derive CDI
6,430,146 UART: [art] Store in slot 0x4
6,515,824 UART: [art] Derive Key Pair
6,516,184 UART: [art] Store priv key in slot 0x5
6,529,595 UART: [art] Derive Key Pair - Done
6,544,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,559,738 UART: [art] Erasing AUTHORITY.KEYID = 7
6,560,503 UART: [art] PUB.X = 4F4416DBF9C7B565FCE047E370F8BB8930D2C4B67773D875BF088FBE14D614A398AA13C27E23295DEA2389B68EE9736B
6,567,278 UART: [art] PUB.Y = 7E04E63C677BE783A97E50EEEB4DD41214833FFB2B59CE231B44890454CFE10124F4EE271A7E3FC0A2480E9FC4448206
6,574,219 UART: [art] SIG.R = 53E6AE24B9345C82D4E066BBE7C44BDD38A22C3AA164D5D047DC8882C38814D129E214C2C561FE0BF5FB4C0116B58AF9
6,580,995 UART: [art] SIG.S = 384D73E10C39D999E36AC99F800AFB73C3E2955FEA175C4752D03B61D64DE1D9CFD8D003C6044F8D9CFE88413C16387D
6,604,467 UART: mbox::rt_entry...
6,604,839 UART: ____ _ _ _ ____ _____
6,605,623 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,606,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,607,191 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,607,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,608,727 UART: |_|
6,609,039 UART:
6,972,321 UART: [rt] Runtime listening for mailbox commands...
6,973,519 >>> mbox cmd response data (48 bytes)
6,973,520 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,976,307 >>> mbox cmd response data (48 bytes)
6,976,308 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,994,453 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,718 UART: [kat] SHA2-256
892,656 UART: [kat] SHA2-384
895,237 UART: [kat] SHA2-512-ACC
897,138 UART: [kat] ECC-384
902,499 UART: [kat] HMAC-384Kdf
907,243 UART: [kat] LMS
1,475,439 UART: [kat] --
1,476,138 UART: [cold-reset] ++
1,476,488 UART: [fht] Storing FHT @ 0x50003400
1,479,215 UART: [idev] ++
1,479,383 UART: [idev] CDI.KEYID = 6
1,479,743 UART: [idev] SUBJECT.KEYID = 7
1,480,167 UART: [idev] UDS.KEYID = 0
1,480,512 ready_for_fw is high
1,480,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,639 UART: [idev] Erasing UDS.KEYID = 0
1,505,547 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,283 UART: [idev] --
1,515,492 UART: [ldev] ++
1,515,660 UART: [ldev] CDI.KEYID = 6
1,516,023 UART: [ldev] SUBJECT.KEYID = 5
1,516,449 UART: [ldev] AUTHORITY.KEYID = 7
1,516,912 UART: [ldev] FE.KEYID = 1
1,522,374 UART: [ldev] Erasing FE.KEYID = 1
1,547,929 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,083 UART: [ldev] --
1,587,596 UART: [fwproc] Waiting for Commands...
1,588,423 UART: [fwproc] Received command 0x46574c44
1,589,214 UART: [fwproc] Received Image of size 118548 bytes
2,933,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,126 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,344 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,671 >>> mbox cmd response: success
3,133,719 UART: [afmc] ++
3,133,887 UART: [afmc] CDI.KEYID = 6
3,134,249 UART: [afmc] SUBJECT.KEYID = 7
3,134,674 UART: [afmc] AUTHORITY.KEYID = 5
3,169,983 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,000 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,804 UART: [afmc] --
3,212,856 UART: [cold-reset] --
3,213,756 UART: [state] Locking Datavault
3,215,165 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,769 UART: [state] Locking ICCM
3,216,203 UART: [exit] Launching FMC @ 0x40000130
3,221,533 UART:
3,221,549 UART: Running Caliptra FMC ...
3,221,957 UART:
3,222,100 UART: [state] CFI Enabled
3,232,550 UART: [fht] FMC Alias Private Key: 7
3,351,484 UART: [art] Extend RT PCRs Done
3,351,912 UART: [art] Lock RT PCRs Done
3,353,526 UART: [art] Populate DV Done
3,361,595 UART: [fht] FMC Alias Private Key: 7
3,362,673 UART: [art] Derive CDI
3,362,953 UART: [art] Store in slot 0x4
3,448,957 UART: [art] Derive Key Pair
3,449,317 UART: [art] Store priv key in slot 0x5
3,462,276 UART: [art] Derive Key Pair - Done
3,476,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,871 UART: [art] PUB.X = 772A469FEFFFAE81D6C5E72FE9D78651A0543995628A638BE9DAE094269DED334272D727F1E995EDFC6F090D1F880B13
3,499,640 UART: [art] PUB.Y = 8D39E8AE96B90AF862B1F2D603AC61AB1CBCCC557C35731DBD4975722148E10268594B5E864EA4109A5DF5CD0FB35E3B
3,506,590 UART: [art] SIG.R = FE6DCD0955F8958FFBB14CB1771F8A24E8427144FE1B1F60FD76F5AEE49FC101FD7ED6C5D857E6DD42DC8C2F7315D7B3
3,513,376 UART: [art] SIG.S = FB1AFD5399B117ABB892BA3F73C76759087A93E25F1961EA21F77BF77EA34A75E38D5F777F7181129C2164CDF8825D5F
3,537,685 UART: Caliptra RT
3,538,028 UART: [state] CFI Enabled
3,659,069 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,659,739 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,807 UART: [rt]cmd =0x41544d4e, len=14344
4,092,872 >>> mbox cmd response data (8 bytes)
4,092,873 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,880 UART: [rt]cmd =0x41545348, len=116
4,144,927 >>> mbox cmd response data (12 bytes)
4,144,928 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,772 UART:
4,145,788 UART: Running Caliptra ROM ...
4,146,196 UART:
4,146,337 UART: [state] CFI Enabled
4,149,239 UART: [state] LifecycleState = Unprovisioned
4,149,894 UART: [state] DebugLocked = No
4,150,444 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,151,963 UART: [kat] SHA2-256
4,945,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,950,009 UART: [kat] ++
4,950,161 UART: [kat] sha1
4,954,411 UART: [kat] SHA2-256
4,956,349 UART: [kat] SHA2-384
4,959,148 UART: [kat] SHA2-512-ACC
4,961,048 UART: [kat] ECC-384
4,966,639 UART: [kat] HMAC-384Kdf
4,971,391 UART: [kat] LMS
5,539,587 UART: [kat] --
5,540,410 UART: [update-reset] ++
6,512,969 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,514,101 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,615,794 >>> mbox cmd response: success
6,615,794 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,616,099 UART: [update-reset] Copying MAN_2 To MAN_1
6,624,113 UART: [update-reset Success] --
6,625,038 UART: [state] Locking Datavault
6,626,006 UART: [state] Locking PCR0, PCR1 and PCR31
6,626,610 UART: [state] Locking ICCM
6,627,232 UART: [exit] Launching FMC @ 0x40000130
6,632,562 UART:
6,632,578 UART: Running Caliptra FMC ...
6,632,986 UART:
6,633,129 UART: [state] CFI Enabled
6,722,134 UART: [art] Extend RT PCRs Done
6,722,562 UART: [art] Lock RT PCRs Done
6,723,879 UART: [art] Populate DV Done
6,731,752 UART: [fht] FMC Alias Private Key: 7
6,732,798 UART: [art] Derive CDI
6,733,078 UART: [art] Store in slot 0x4
6,819,012 UART: [art] Derive Key Pair
6,819,372 UART: [art] Store priv key in slot 0x5
6,832,061 UART: [art] Derive Key Pair - Done
6,847,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,862,625 UART: [art] Erasing AUTHORITY.KEYID = 7
6,863,390 UART: [art] PUB.X = 973C6344F4416A8E0A05AA9F06207763B6D1919B3676AE4F8108C9E0FEAE065DE4F18E157C2C303A6B31248959F51447
6,870,141 UART: [art] PUB.Y = BB4C317BCB13DD5B90612F3EC1708C756AE0603F3078E353B54F52C44CAB31143B61C18014537D3419ED03C4BE6AF176
6,877,092 UART: [art] SIG.R = F20EAA6A970F56D95AE8463DAC0D18311EBC52F8F8A933A4CC0C76DB304F644D757A06AA751B9596130DACB370785979
6,883,852 UART: [art] SIG.S = 8796C6AF15AD9E7F215CE8C73B96D8E6D5E32E18384A8A934BCC0AC92499EBE42896EA9AF8C5A870A8048C867AA14C8E
6,908,512 UART: mbox::rt_entry...
6,908,884 UART: ____ _ _ _ ____ _____
6,909,668 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,910,468 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,911,236 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,912,004 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,912,772 UART: |_|
6,913,084 UART:
7,278,096 UART: [rt] Runtime listening for mailbox commands...
7,279,294 >>> mbox cmd response data (48 bytes)
7,279,295 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
7,282,082 >>> mbox cmd response data (48 bytes)
7,282,083 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,300,228 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,970 ready_for_fw is high
1,362,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,685 >>> mbox cmd response: success
3,044,982 UART:
3,044,998 UART: Running Caliptra FMC ...
3,045,406 UART:
3,045,549 UART: [state] CFI Enabled
3,056,177 UART: [fht] FMC Alias Private Key: 7
3,175,217 UART: [art] Extend RT PCRs Done
3,175,645 UART: [art] Lock RT PCRs Done
3,177,329 UART: [art] Populate DV Done
3,185,832 UART: [fht] FMC Alias Private Key: 7
3,186,984 UART: [art] Derive CDI
3,187,264 UART: [art] Store in slot 0x4
3,273,342 UART: [art] Derive Key Pair
3,273,702 UART: [art] Store priv key in slot 0x5
3,287,027 UART: [art] Derive Key Pair - Done
3,301,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,637 UART: [art] PUB.X = BF7D9A6B41D1C364B1397D77C6D98E0DC70DB23316EDFF524764B29E3B439C57C20422E825649F97A6179B8AF635E559
3,324,400 UART: [art] PUB.Y = 991B7ED1D17A61A1AB41C910EBC8A1D8307E91E1F17C8043147FFC7ABBD3E0021DA519271479E65E24E22A7A97617ACA
3,331,357 UART: [art] SIG.R = 8ED463FCB2300FDD82BF5F7C5B3F5226526CEAA2FDCA989EAF980F8D4870CF51120A495F8CEC8C5E31BF98DA5C39A0E6
3,338,142 UART: [art] SIG.S = 1FDDE8D3FC2838691B2B20B4A2667B02EA5FDEC5F22FC99EBA4C2C9C2B775D23D3972B93F791F7042950AE5BC452B5FE
3,361,396 UART: Caliptra RT
3,361,739 UART: [state] CFI Enabled
3,481,841 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,482,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,623 UART: [rt]cmd =0x41544d4e, len=14344
3,915,634 >>> mbox cmd response data (8 bytes)
3,915,635 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,788 UART: [rt]cmd =0x41545348, len=116
3,968,107 >>> mbox cmd response data (12 bytes)
3,968,108 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,321,840 >>> mbox cmd response: success
6,321,840 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,335,026 UART:
6,335,042 UART: Running Caliptra FMC ...
6,335,450 UART:
6,335,593 UART: [state] CFI Enabled
6,424,454 UART: [art] Extend RT PCRs Done
6,424,882 UART: [art] Lock RT PCRs Done
6,426,183 UART: [art] Populate DV Done
6,434,194 UART: [fht] FMC Alias Private Key: 7
6,435,226 UART: [art] Derive CDI
6,435,506 UART: [art] Store in slot 0x4
6,521,150 UART: [art] Derive Key Pair
6,521,510 UART: [art] Store priv key in slot 0x5
6,534,773 UART: [art] Derive Key Pair - Done
6,549,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,564,918 UART: [art] Erasing AUTHORITY.KEYID = 7
6,565,683 UART: [art] PUB.X = 1EE19F512DC7CEBAD92AF893A9E0E0740B348CCBB6FE9146C68AF1DBFF464E69B30E21003AABA029DAF9A30F84D1744C
6,572,446 UART: [art] PUB.Y = CADCB9CAAED0CB03FC6442BAA6E2973D6143EA899C7B57C0B0646FF3AB5309336A5D4757A9E7968B3F0FCFC977B1EF13
6,579,409 UART: [art] SIG.R = EB2095A420657F512F3194387BD683ED73A46CAC1FA8FA223B9FECFA915FFC0CEE54637E0120488352647E367A302641
6,586,175 UART: [art] SIG.S = CF60FA785243C18EB1A4D2C8F988AE38A2FFCCD5B6726662F4145FF82B1C6249DC3DC083C1BA739FC3E6CDDC39D1A969
6,610,291 UART: mbox::rt_entry...
6,610,663 UART: ____ _ _ _ ____ _____
6,611,447 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,612,247 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,613,015 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,613,783 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,614,551 UART: |_|
6,614,863 UART:
6,981,063 UART: [rt] Runtime listening for mailbox commands...
6,982,261 >>> mbox cmd response data (48 bytes)
6,982,262 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,985,049 >>> mbox cmd response data (48 bytes)
6,985,050 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
7,003,195 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Unprovisioned
85,861 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,724 UART: [kat] SHA2-256
891,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,378 UART: [kat] ++
895,530 UART: [kat] sha1
899,834 UART: [kat] SHA2-256
901,774 UART: [kat] SHA2-384
904,459 UART: [kat] SHA2-512-ACC
906,360 UART: [kat] ECC-384
916,227 UART: [kat] HMAC-384Kdf
920,799 UART: [kat] LMS
1,169,111 UART: [kat] --
1,170,148 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,030 UART: [idev] ++
1,173,198 UART: [idev] CDI.KEYID = 6
1,173,559 UART: [idev] SUBJECT.KEYID = 7
1,173,984 UART: [idev] UDS.KEYID = 0
1,174,330 ready_for_fw is high
1,174,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,605 UART: [idev] Sha1 KeyId Algorithm
1,207,285 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,082 UART: [ldev] Erasing FE.KEYID = 1
1,241,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,039 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,755 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,356 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,584 UART: [ldev] --
1,281,033 UART: [fwproc] Wait for Commands...
1,281,628 UART: [fwproc] Recv command 0x46574c44
1,282,361 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,965 >>> mbox cmd response: success
2,826,055 UART: [afmc] ++
2,826,223 UART: [afmc] CDI.KEYID = 6
2,826,586 UART: [afmc] SUBJECT.KEYID = 7
2,827,012 UART: [afmc] AUTHORITY.KEYID = 5
2,862,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,322 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,662 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,363 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,214 UART: [afmc] --
2,906,235 UART: [cold-reset] --
2,907,209 UART: [state] Locking Datavault
2,908,544 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,148 UART: [state] Locking ICCM
2,909,594 UART: [exit] Launching FMC @ 0x40000130
2,914,924 UART:
2,914,940 UART: Running Caliptra FMC ...
2,915,348 UART:
2,915,402 UART: [state] CFI Enabled
2,926,334 UART: [fht] FMC Alias Private Key: 7
3,045,626 UART: [art] Extend RT PCRs Done
3,046,054 UART: [art] Lock RT PCRs Done
3,047,728 UART: [art] Populate DV Done
3,055,869 UART: [fht] FMC Alias Private Key: 7
3,056,973 UART: [art] Derive CDI
3,057,253 UART: [art] Store in slot 0x4
3,143,258 UART: [art] Derive Key Pair
3,143,618 UART: [art] Store priv key in slot 0x5
3,156,598 UART: [art] Derive Key Pair - Done
3,171,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,187 UART: [art] PUB.X = F51A8E09ECA7415385B5D6737BD1C5282E75AF86633718B91BDA14A67BCD4BC00F641D3268C67E928A7D25116556B2D0
3,194,953 UART: [art] PUB.Y = 5E530AD48AA621C428B65029B930604C68DABDAC74D20D6B50A7077DD349BEE45368C85332923C8DE3BC9030CF51F730
3,201,898 UART: [art] SIG.R = B0F75DDF68C691F697FEAB7CDA1C0ACD9786C57DC6C8CDC750FA1082A1355D08BAEEA66380B2CE1ECE5D1E33E4533797
3,208,686 UART: [art] SIG.S = 8BD678C2B26772484CB27FAC49A5DCAD4E5E94A2F12E56270BB59B75F9C3C2AD25F98ED5EF63FCB85E42184D6242A763
3,233,353 UART: Caliptra RT
3,233,604 UART: [state] CFI Enabled
3,352,592 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,272 UART: [rt]cmd =0x41544d4e, len=14344
3,786,641 >>> mbox cmd response data (8 bytes)
3,786,642 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,857 UART: [rt]cmd =0x41545348, len=116
3,839,156 >>> mbox cmd response data (12 bytes)
3,839,157 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,022 UART:
3,840,038 UART: Running Caliptra ROM ...
3,840,446 UART:
3,840,501 UART: [state] CFI Enabled
3,843,501 UART: [state] LifecycleState = Unprovisioned
3,844,156 UART: [state] DebugLocked = No
3,844,770 UART: [state] WD Timer not started. Device not locked for debugging
3,846,118 UART: [kat] SHA2-256
4,649,668 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,653,772 UART: [kat] ++
4,653,924 UART: [kat] sha1
4,658,120 UART: [kat] SHA2-256
4,660,060 UART: [kat] SHA2-384
4,662,699 UART: [kat] SHA2-512-ACC
4,664,599 UART: [kat] ECC-384
4,674,404 UART: [kat] HMAC-384Kdf
4,679,126 UART: [kat] LMS
4,927,438 UART: [kat] --
4,928,392 UART: [update-reset] ++
5,878,168 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,879,225 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,980,866 >>> mbox cmd response: success
5,980,866 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,980,975 UART: [update-reset] Copying MAN_2 To MAN_1
5,988,989 UART: [update-reset Success] --
5,990,058 UART: [state] Locking Datavault
5,990,852 UART: [state] Locking PCR0, PCR1 and PCR31
5,991,456 UART: [state] Locking ICCM
5,992,048 UART: [exit] Launching FMC @ 0x40000130
5,997,378 UART:
5,997,394 UART: Running Caliptra FMC ...
5,997,802 UART:
5,997,856 UART: [state] CFI Enabled
6,086,887 UART: [art] Extend RT PCRs Done
6,087,315 UART: [art] Lock RT PCRs Done
6,088,614 UART: [art] Populate DV Done
6,096,745 UART: [fht] FMC Alias Private Key: 7
6,097,701 UART: [art] Derive CDI
6,097,981 UART: [art] Store in slot 0x4
6,183,626 UART: [art] Derive Key Pair
6,183,986 UART: [art] Store priv key in slot 0x5
6,196,598 UART: [art] Derive Key Pair - Done
6,211,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,226,842 UART: [art] Erasing AUTHORITY.KEYID = 7
6,227,607 UART: [art] PUB.X = 8D7468C9620FEABB1F1C5EECF2557649A4E2114D310F06181CFFBDA94D033E7D9E051218517D3524282E0DE9871D36C0
6,234,363 UART: [art] PUB.Y = BAFC69E6A2025255829AFE8E6BA9AC1C9B5A378C0438E6DB6F6F71C0208B0442297E1D0558B113509C167718DD6D2C07
6,241,302 UART: [art] SIG.R = B78770B64B0123BA3869E523446DEFBE19386DFFC770FDBD56F4FAC1F38F5A5436B96613981C0B2233A56FF9D4423F4E
6,248,074 UART: [art] SIG.S = 89D3E95C68DDCDC2CCE515966711C12A64DFCECE7ECE636FF6C8B8054715C94A27BC218AAF16ACCCE5269B3E63D39C86
6,271,885 UART: mbox::rt_entry...
6,272,257 UART: ____ _ _ _ ____ _____
6,273,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,273,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,274,609 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,275,377 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,276,145 UART: |_|
6,276,457 UART:
6,642,388 UART: [rt] Runtime listening for mailbox commands...
6,643,586 >>> mbox cmd response data (48 bytes)
6,643,587 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,646,374 >>> mbox cmd response data (48 bytes)
6,646,375 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,664,520 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.83s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,462 ready_for_fw is high
1,059,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,002 >>> mbox cmd response: success
2,739,649 UART:
2,739,665 UART: Running Caliptra FMC ...
2,740,073 UART:
2,740,127 UART: [state] CFI Enabled
2,750,501 UART: [fht] FMC Alias Private Key: 7
2,870,095 UART: [art] Extend RT PCRs Done
2,870,523 UART: [art] Lock RT PCRs Done
2,871,779 UART: [art] Populate DV Done
2,879,876 UART: [fht] FMC Alias Private Key: 7
2,880,864 UART: [art] Derive CDI
2,881,144 UART: [art] Store in slot 0x4
2,967,091 UART: [art] Derive Key Pair
2,967,451 UART: [art] Store priv key in slot 0x5
2,980,799 UART: [art] Derive Key Pair - Done
2,995,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,497 UART: [art] PUB.X = 3EE7BED406C11E573E41D0881DB70C61A1C26AB7722CA5457259903EED208A1CAE2667EEE4DA60A2589E18B1A47C250B
3,018,268 UART: [art] PUB.Y = 24E78C2C4AF78CACBE683B8546FD15C4AD76CF9845854B50FF5817013997CC7F601F5C0B1E836980478193D8508B27D1
3,025,212 UART: [art] SIG.R = FA2989827A2135601B9E6B9B60A1FA5A7346AB2FA3C8A33BAA6FDE51E3E77B594F1270549F2D2A513730B953EBE9790A
3,031,987 UART: [art] SIG.S = A28773C78C263D1484FA88E470FE48DCED52E3F6E964D8337C3EFAE48A9EFC87896A22C43FD7EB76820FDFFAFF78DDD7
3,056,246 UART: Caliptra RT
3,056,497 UART: [state] CFI Enabled
3,177,179 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,849 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,839 UART: [rt]cmd =0x41544d4e, len=14344
3,610,710 >>> mbox cmd response data (8 bytes)
3,610,711 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,792 UART: [rt]cmd =0x41545348, len=116
3,663,051 >>> mbox cmd response data (12 bytes)
3,663,052 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,687,489 >>> mbox cmd response: success
5,687,489 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,701,090 UART:
5,701,106 UART: Running Caliptra FMC ...
5,701,514 UART:
5,701,568 UART: [state] CFI Enabled
5,790,963 UART: [art] Extend RT PCRs Done
5,791,391 UART: [art] Lock RT PCRs Done
5,792,290 UART: [art] Populate DV Done
5,800,793 UART: [fht] FMC Alias Private Key: 7
5,801,945 UART: [art] Derive CDI
5,802,225 UART: [art] Store in slot 0x4
5,888,160 UART: [art] Derive Key Pair
5,888,520 UART: [art] Store priv key in slot 0x5
5,901,920 UART: [art] Derive Key Pair - Done
5,916,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,932,176 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,941 UART: [art] PUB.X = 3F753628FC03D954A1351AFA647F3E0B9713A71F33A1C3E4C21F6597E8A83686BE138B9CCA5EB6C150E1EC593561C43B
5,939,711 UART: [art] PUB.Y = 6824539B5A96EC004C4F5570A3D015583C4EF244F3D251BF8F8B55023275ADC3521AF29E3FF7825637698645230DA33A
5,946,627 UART: [art] SIG.R = 6B164C04BE49F4486135189491816B73012981311CCE71F52D175806F754FB65EAD2C8777FB08168EBE420B07F81D59C
5,953,380 UART: [art] SIG.S = 262AE60B1DF3019AB8198FFA934466F516FF3A85E1E385A8F62F5243D14B68A9D772EE56BBCE7E1AC0E05E02FF9F54FC
5,976,867 UART: mbox::rt_entry...
5,977,239 UART: ____ _ _ _ ____ _____
5,978,023 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,823 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,591 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,980,359 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,981,127 UART: |_|
5,981,439 UART:
6,345,748 UART: [rt] Runtime listening for mailbox commands...
6,346,946 >>> mbox cmd response data (48 bytes)
6,346,947 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,349,734 >>> mbox cmd response data (48 bytes)
6,349,735 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,367,880 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,897 UART: [kat] SHA2-256
901,837 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
916,408 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,231 UART: [fht] FHT @ 0x50003400
1,172,931 UART: [idev] ++
1,173,099 UART: [idev] CDI.KEYID = 6
1,173,460 UART: [idev] SUBJECT.KEYID = 7
1,173,885 UART: [idev] UDS.KEYID = 0
1,174,231 ready_for_fw is high
1,174,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,360 UART: [idev] Erasing UDS.KEYID = 0
1,199,790 UART: [idev] Sha1 KeyId Algorithm
1,208,802 UART: [idev] --
1,209,823 UART: [ldev] ++
1,209,991 UART: [ldev] CDI.KEYID = 6
1,210,355 UART: [ldev] SUBJECT.KEYID = 5
1,210,782 UART: [ldev] AUTHORITY.KEYID = 7
1,211,245 UART: [ldev] FE.KEYID = 1
1,216,715 UART: [ldev] Erasing FE.KEYID = 1
1,242,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,281,892 UART: [fwproc] Wait for Commands...
1,282,619 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,417 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,282 >>> mbox cmd response: success
2,828,352 UART: [afmc] ++
2,828,520 UART: [afmc] CDI.KEYID = 6
2,828,883 UART: [afmc] SUBJECT.KEYID = 7
2,829,309 UART: [afmc] AUTHORITY.KEYID = 5
2,864,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,986 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,696 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,577 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,278 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,181 UART: [afmc] --
2,908,028 UART: [cold-reset] --
2,908,854 UART: [state] Locking Datavault
2,909,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,575 UART: [state] Locking ICCM
2,911,047 UART: [exit] Launching FMC @ 0x40000130
2,916,377 UART:
2,916,393 UART: Running Caliptra FMC ...
2,916,801 UART:
2,916,944 UART: [state] CFI Enabled
2,927,414 UART: [fht] FMC Alias Private Key: 7
3,046,408 UART: [art] Extend RT PCRs Done
3,046,836 UART: [art] Lock RT PCRs Done
3,048,426 UART: [art] Populate DV Done
3,056,711 UART: [fht] FMC Alias Private Key: 7
3,057,691 UART: [art] Derive CDI
3,057,971 UART: [art] Store in slot 0x4
3,143,916 UART: [art] Derive Key Pair
3,144,276 UART: [art] Store priv key in slot 0x5
3,156,736 UART: [art] Derive Key Pair - Done
3,171,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,246 UART: [art] PUB.X = 971EDAF4D4314411BCB7E66964A5C6A6562A34628A5D9C6583ACE9851093AF86B6C12B20787C3FF44865E33608626962
3,195,007 UART: [art] PUB.Y = 712B6D844EFA5218377714F84C2D195B17831793F0627358E6D63DFE583A14AF3FA03D05581CD9C21ABF31BAD5CE7A36
3,201,958 UART: [art] SIG.R = 426A951A203F123317A9E9870E1A7A6BE2FCFD46B3B786655FE2DACE5244ECB4B70598EF47724B38C0BB15D2CE11EF9D
3,208,736 UART: [art] SIG.S = E3120E06770EBBA2F753739358D6F13A2439B39D4B0D49E18E4C07EEF71B88045C1C7CA24DA5430F02E2F747AE56CE14
3,232,450 UART: Caliptra RT
3,232,793 UART: [state] CFI Enabled
3,351,620 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,290 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,322 UART: [rt]cmd =0x41544d4e, len=14344
3,785,045 >>> mbox cmd response data (8 bytes)
3,785,046 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,285 UART: [rt]cmd =0x41545348, len=116
3,836,870 >>> mbox cmd response data (12 bytes)
3,836,871 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,524 UART:
3,837,540 UART: Running Caliptra ROM ...
3,837,948 UART:
3,838,090 UART: [state] CFI Enabled
3,840,594 UART: [state] LifecycleState = Unprovisioned
3,841,249 UART: [state] DebugLocked = No
3,841,845 UART: [state] WD Timer not started. Device not locked for debugging
3,843,171 UART: [kat] SHA2-256
4,646,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,650,825 UART: [kat] ++
4,650,977 UART: [kat] sha1
4,655,121 UART: [kat] SHA2-256
4,657,061 UART: [kat] SHA2-384
4,659,752 UART: [kat] SHA2-512-ACC
4,661,652 UART: [kat] ECC-384
4,671,377 UART: [kat] HMAC-384Kdf
4,676,005 UART: [kat] LMS
4,924,317 UART: [kat] --
4,925,099 UART: [update-reset] ++
5,874,429 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,875,440 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,977,081 >>> mbox cmd response: success
5,977,081 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,977,406 UART: [update-reset] Copying MAN_2 To MAN_1
5,985,420 UART: [update-reset Success] --
5,986,385 UART: [state] Locking Datavault
5,987,179 UART: [state] Locking PCR0, PCR1 and PCR31
5,987,783 UART: [state] Locking ICCM
5,988,351 UART: [exit] Launching FMC @ 0x40000130
5,993,681 UART:
5,993,697 UART: Running Caliptra FMC ...
5,994,105 UART:
5,994,248 UART: [state] CFI Enabled
6,083,709 UART: [art] Extend RT PCRs Done
6,084,137 UART: [art] Lock RT PCRs Done
6,085,232 UART: [art] Populate DV Done
6,093,585 UART: [fht] FMC Alias Private Key: 7
6,094,587 UART: [art] Derive CDI
6,094,867 UART: [art] Store in slot 0x4
6,180,726 UART: [art] Derive Key Pair
6,181,086 UART: [art] Store priv key in slot 0x5
6,194,878 UART: [art] Derive Key Pair - Done
6,209,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,224,885 UART: [art] Erasing AUTHORITY.KEYID = 7
6,225,650 UART: [art] PUB.X = 069D5DA390B3CE1278E66A1CA65EAD7D5C858E7BC12598BC400F42B32E8913C153AA8750F177D9147BC42C2305492092
6,232,411 UART: [art] PUB.Y = 32CD8F21F4CD33D9916F7C4C8AE1D0761D3D615A6AD8007AB2C3B76EB5A2DE97D9F2EA7333C797D7DB18A619BF01A477
6,239,352 UART: [art] SIG.R = 1AE2E0F8DC1D038A83AF068F3E49DA85299929021963B37906D5BCD7635366ADC7E1DEC2A74348534DBB88F459757D8C
6,246,114 UART: [art] SIG.S = 5243ADAFB9E037028007DF393BD6756F84FB8AFA357257E59A3A8977805CD052682CBBB067BF55C6DF59234DCFBFE6CD
6,269,696 UART: mbox::rt_entry...
6,270,068 UART: ____ _ _ _ ____ _____
6,270,852 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,271,652 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,272,420 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,273,188 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,273,956 UART: |_|
6,274,268 UART:
6,634,647 UART: [rt] Runtime listening for mailbox commands...
6,635,845 >>> mbox cmd response data (48 bytes)
6,635,846 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,638,633 >>> mbox cmd response data (48 bytes)
6,638,634 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,656,779 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,629 ready_for_fw is high
1,059,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,701 >>> mbox cmd response: success
2,741,546 UART:
2,741,562 UART: Running Caliptra FMC ...
2,741,970 UART:
2,742,113 UART: [state] CFI Enabled
2,752,701 UART: [fht] FMC Alias Private Key: 7
2,871,655 UART: [art] Extend RT PCRs Done
2,872,083 UART: [art] Lock RT PCRs Done
2,873,523 UART: [art] Populate DV Done
2,881,702 UART: [fht] FMC Alias Private Key: 7
2,882,738 UART: [art] Derive CDI
2,883,018 UART: [art] Store in slot 0x4
2,968,783 UART: [art] Derive Key Pair
2,969,143 UART: [art] Store priv key in slot 0x5
2,982,431 UART: [art] Derive Key Pair - Done
2,996,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,147 UART: [art] PUB.X = 54FF2385E6C166BDFC17176564ABFFAF4818C0B7138DCBB5B3AB31F1C66B12AB028E8D997C920ACB4908486B96AA2B49
3,019,922 UART: [art] PUB.Y = 54B7BA804266FE70B3422C1CBB89EBE749133DBF8198CD66C15ED06434DBE8D40052FD55CF2BAE3A23FFE049AB5F1C7A
3,026,870 UART: [art] SIG.R = C05B3A0CDC0A9A651AFBF89D9AF3D2ED9F163C19A9E6DCAC92529422CD5BCAE9DF93B19FDD727DD167066A093F9985E5
3,033,652 UART: [art] SIG.S = 43D77BD318CA175E857C9ABE2544764CF07D54FFAE05776FC27F24A469DBDA8A83BDFC6EF21DB6501837CD8856E97FE4
3,057,303 UART: Caliptra RT
3,057,646 UART: [state] CFI Enabled
3,179,015 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,587 UART: [rt]cmd =0x41544d4e, len=14344
3,611,998 >>> mbox cmd response data (8 bytes)
3,611,999 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,984 UART: [rt]cmd =0x41545348, len=116
3,664,597 >>> mbox cmd response data (12 bytes)
3,664,598 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,690,158 >>> mbox cmd response: success
5,690,158 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,703,499 UART:
5,703,515 UART: Running Caliptra FMC ...
5,703,923 UART:
5,704,066 UART: [state] CFI Enabled
5,793,427 UART: [art] Extend RT PCRs Done
5,793,855 UART: [art] Lock RT PCRs Done
5,795,022 UART: [art] Populate DV Done
5,803,263 UART: [fht] FMC Alias Private Key: 7
5,804,441 UART: [art] Derive CDI
5,804,721 UART: [art] Store in slot 0x4
5,890,556 UART: [art] Derive Key Pair
5,890,916 UART: [art] Store priv key in slot 0x5
5,904,086 UART: [art] Derive Key Pair - Done
5,918,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,934,679 UART: [art] Erasing AUTHORITY.KEYID = 7
5,935,444 UART: [art] PUB.X = 530AC3DA4373ADA3E8265C3E44CD83BECB0D48237370F91311B4CB2142EB81F7C8047AD29FEFAB371E197BE1B562036C
5,942,214 UART: [art] PUB.Y = 808E8C03EF0548E1C8F53A043A7882EC05F58839BDDB11A9589E81EE3DAF129DA1B79455369217E1FEEA436EF1562583
5,949,156 UART: [art] SIG.R = 1AC81BB66F36C53A88ECF7BE1885B2DE7344AB3405E72FB6628EE507D4E07F4AC98D4EA3492DA8BFCCE26CF9350EC913
5,955,937 UART: [art] SIG.S = 3B04921F5ACE12EC3184F2A11E6289979235343621B39713138803D7F6EA33C99B8809EC602711BADC9CCC1663DFD103
5,979,559 UART: mbox::rt_entry...
5,979,931 UART: ____ _ _ _ ____ _____
5,980,715 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,981,515 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,982,283 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,983,051 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,983,819 UART: |_|
5,984,131 UART:
6,342,468 UART: [rt] Runtime listening for mailbox commands...
6,343,666 >>> mbox cmd response data (48 bytes)
6,343,667 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,346,454 >>> mbox cmd response data (48 bytes)
6,346,455 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,364,600 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,068 UART: [kat] SHA2-256
893,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,843 UART: [kat] ++
897,995 UART: [kat] sha1
902,017 UART: [kat] SHA2-256
903,957 UART: [kat] SHA2-384
906,714 UART: [kat] SHA2-512-ACC
908,615 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,508 UART: [kat] LMS
1,170,836 UART: [kat] --
1,171,699 UART: [cold-reset] ++
1,172,191 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,002 UART: [idev] Erasing UDS.KEYID = 0
1,200,989 UART: [idev] Sha1 KeyId Algorithm
1,209,439 UART: [idev] --
1,210,559 UART: [ldev] ++
1,210,727 UART: [ldev] CDI.KEYID = 6
1,211,090 UART: [ldev] SUBJECT.KEYID = 5
1,211,516 UART: [ldev] AUTHORITY.KEYID = 7
1,211,979 UART: [ldev] FE.KEYID = 1
1,217,139 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,260 UART: [fwproc] Wait for Commands...
1,283,008 UART: [fwproc] Recv command 0x46574c44
1,283,736 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,189 >>> mbox cmd response: success
2,828,377 UART: [afmc] ++
2,828,545 UART: [afmc] CDI.KEYID = 6
2,828,907 UART: [afmc] SUBJECT.KEYID = 7
2,829,332 UART: [afmc] AUTHORITY.KEYID = 5
2,864,895 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,068 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,816 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,525 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,408 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,109 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,991 UART: [afmc] --
2,908,031 UART: [cold-reset] --
2,908,703 UART: [state] Locking Datavault
2,909,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,530 UART: [state] Locking ICCM
2,911,110 UART: [exit] Launching FMC @ 0x40000130
2,916,440 UART:
2,916,456 UART: Running Caliptra FMC ...
2,916,864 UART:
2,916,918 UART: [state] CFI Enabled
2,927,542 UART: [fht] FMC Alias Private Key: 7
3,046,926 UART: [art] Extend RT PCRs Done
3,047,354 UART: [art] Lock RT PCRs Done
3,049,162 UART: [art] Populate DV Done
3,057,515 UART: [fht] FMC Alias Private Key: 7
3,058,695 UART: [art] Derive CDI
3,058,975 UART: [art] Store in slot 0x4
3,144,670 UART: [art] Derive Key Pair
3,145,030 UART: [art] Store priv key in slot 0x5
3,158,506 UART: [art] Derive Key Pair - Done
3,173,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,294 UART: [art] PUB.X = B9E400102B6D6575654349CEDC2D3558D3714BEA48D0640850414BCBE4E9D5EB9C72169A99B30C5FE163F2E932E9246F
3,196,038 UART: [art] PUB.Y = D973495C78AD3C70F3CB3D622598DED986A07E8D2EA4370F6BBB3DFD8B9694F96B2F9F393D190995B7C01234BCC14275
3,202,990 UART: [art] SIG.R = 3E249F802190E0CEF85175ECA1071B8D2D12FAB37FDE7E4066A7732CA14A2EF4A02850893A3B3F6F292888596CE060CC
3,209,763 UART: [art] SIG.S = 3DB642E96C9669AA598B3BE88AFDC02EAE3FE578FDB16EB3186B01129A18D58DCEDE5ADA2429FE667BEA586AD0F462C4
3,233,306 UART: Caliptra RT
3,233,557 UART: [state] CFI Enabled
3,352,957 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,435 UART: [rt]cmd =0x41544d4e, len=14344
3,786,432 >>> mbox cmd response data (8 bytes)
3,786,433 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,564 UART: [rt]cmd =0x41545348, len=116
3,838,485 >>> mbox cmd response data (12 bytes)
3,838,486 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,965 UART:
3,838,981 UART: Running Caliptra ROM ...
3,839,389 UART:
3,839,444 UART: [state] CFI Enabled
3,842,174 UART: [state] LifecycleState = Unprovisioned
3,842,829 UART: [state] DebugLocked = No
3,843,445 UART: [state] WD Timer not started. Device not locked for debugging
3,844,733 UART: [kat] SHA2-256
4,650,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,654,508 UART: [kat] ++
4,654,660 UART: [kat] sha1
4,659,086 UART: [kat] SHA2-256
4,661,026 UART: [kat] SHA2-384
4,663,819 UART: [kat] SHA2-512-ACC
4,665,719 UART: [kat] ECC-384
4,675,606 UART: [kat] HMAC-384Kdf
4,680,118 UART: [kat] LMS
4,928,446 UART: [kat] --
4,929,388 UART: [update-reset] ++
5,879,335 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,880,330 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,981,971 >>> mbox cmd response: success
5,981,971 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,982,198 UART: [update-reset] Copying MAN_2 To MAN_1
5,990,212 UART: [update-reset Success] --
5,991,187 UART: [state] Locking Datavault
5,991,983 UART: [state] Locking PCR0, PCR1 and PCR31
5,992,587 UART: [state] Locking ICCM
5,993,085 UART: [exit] Launching FMC @ 0x40000130
5,998,415 UART:
5,998,431 UART: Running Caliptra FMC ...
5,998,839 UART:
5,998,893 UART: [state] CFI Enabled
6,087,756 UART: [art] Extend RT PCRs Done
6,088,184 UART: [art] Lock RT PCRs Done
6,089,417 UART: [art] Populate DV Done
6,097,522 UART: [fht] FMC Alias Private Key: 7
6,098,630 UART: [art] Derive CDI
6,098,910 UART: [art] Store in slot 0x4
6,185,073 UART: [art] Derive Key Pair
6,185,433 UART: [art] Store priv key in slot 0x5
6,198,455 UART: [art] Derive Key Pair - Done
6,213,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,228,321 UART: [art] Erasing AUTHORITY.KEYID = 7
6,229,086 UART: [art] PUB.X = A8D2D03B55BD4A5A49F86C53944E15D61A5F403B2CCB941AA9E6FABAC9C0090CC0EB39E73F43AEDFB5B2C93E360EA34A
6,235,873 UART: [art] PUB.Y = B942955A32DDCA373C2C3CA51F6190E80C979E1995862725B1A0C33A7A55BF97731E44ECC664FDF391E34B01EA8F198D
6,242,823 UART: [art] SIG.R = 22D81B85BB89EE9B8D2E5E4D7D5CAF417478BA46DC84661975183FD4BAF9679C9DFE592E597D8C4FCCF2E7CCD4A4AA74
6,249,615 UART: [art] SIG.S = DBDF7ADFD0094E9BEB2B73092DBF555E0426D9749C2BE95002E03DB94C95890F696B36B4339B1107A909F9C5070B306B
6,273,276 UART: mbox::rt_entry...
6,273,648 UART: ____ _ _ _ ____ _____
6,274,432 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,275,232 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,276,000 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,276,768 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,277,536 UART: |_|
6,277,848 UART:
6,643,138 UART: [rt] Runtime listening for mailbox commands...
6,644,336 >>> mbox cmd response data (48 bytes)
6,644,337 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,647,124 >>> mbox cmd response data (48 bytes)
6,647,125 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,665,270 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,088 >>> mbox cmd response: success
2,741,677 UART:
2,741,693 UART: Running Caliptra FMC ...
2,742,101 UART:
2,742,155 UART: [state] CFI Enabled
2,752,799 UART: [fht] FMC Alias Private Key: 7
2,871,631 UART: [art] Extend RT PCRs Done
2,872,059 UART: [art] Lock RT PCRs Done
2,873,297 UART: [art] Populate DV Done
2,881,820 UART: [fht] FMC Alias Private Key: 7
2,882,888 UART: [art] Derive CDI
2,883,168 UART: [art] Store in slot 0x4
2,968,519 UART: [art] Derive Key Pair
2,968,879 UART: [art] Store priv key in slot 0x5
2,981,713 UART: [art] Derive Key Pair - Done
2,996,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,867 UART: [art] PUB.X = 665C7FA0657FB927758509248CA9374E379B04A6BEB8CA74797DD1F134807F28836014C51E5DD2E09954FC77D029331C
3,019,625 UART: [art] PUB.Y = A0DD7A402F1F5F3A2AF17B84C72D6AB8C50E2AAFADF0D3D52F9A10A8A6587028194468125995741F0D057511CCC43DC5
3,026,576 UART: [art] SIG.R = 24D79A40CA30C5A316B4FA2FE085CB4B99EFB00BF77A2A326769EA95FD9CE30BFE37BCAE4A06EBDC8907683E378AB459
3,033,356 UART: [art] SIG.S = DEB3AF545A5B6D51DE4D7B67163191CE6F33168376F2BD7928590C62DC2C4E6908513A54071ABF1154C8909F223D3824
3,057,339 UART: Caliptra RT
3,057,590 UART: [state] CFI Enabled
3,177,141 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,717 UART: [rt]cmd =0x41544d4e, len=14344
3,611,052 >>> mbox cmd response data (8 bytes)
3,611,053 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,948 UART: [rt]cmd =0x41545348, len=116
3,663,551 >>> mbox cmd response data (12 bytes)
3,663,552 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,688,836 >>> mbox cmd response: success
5,688,836 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,701,761 UART:
5,701,777 UART: Running Caliptra FMC ...
5,702,185 UART:
5,702,239 UART: [state] CFI Enabled
5,791,140 UART: [art] Extend RT PCRs Done
5,791,568 UART: [art] Lock RT PCRs Done
5,792,895 UART: [art] Populate DV Done
5,801,132 UART: [fht] FMC Alias Private Key: 7
5,802,178 UART: [art] Derive CDI
5,802,458 UART: [art] Store in slot 0x4
5,888,159 UART: [art] Derive Key Pair
5,888,519 UART: [art] Store priv key in slot 0x5
5,901,817 UART: [art] Derive Key Pair - Done
5,916,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,932,207 UART: [art] Erasing AUTHORITY.KEYID = 7
5,932,972 UART: [art] PUB.X = A72DF45C864FE102354D8B2DCBDABCD412911B6851AF3DD011E40AEB387D433A689463D83D135FCD0994B2B64EC7A81C
5,939,747 UART: [art] PUB.Y = 21F4C6B4ACA4A47C564D81FC8F62127741004DB4C0ECCB18AB4EDC43F0402A6D4DE4AEE9AFACFD48E4C443CD4FF44A8C
5,946,705 UART: [art] SIG.R = 126EF7120A3185749F3308B60F3D565DADC78CAF7F4F45002711C1CF4C813BD654CC9F545463AC023E8A8267A68CC4A2
5,953,445 UART: [art] SIG.S = 0FE2E35CA6D368E7863397C69426F591698076F9CD668D0201C2CEF6DE25BF22997897BC2F4B080713BAEC9C7DE28822
5,976,488 UART: mbox::rt_entry...
5,976,860 UART: ____ _ _ _ ____ _____
5,977,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,978,444 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,979,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,979,980 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,980,748 UART: |_|
5,981,060 UART:
6,343,191 UART: [rt] Runtime listening for mailbox commands...
6,344,389 >>> mbox cmd response data (48 bytes)
6,344,390 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,347,177 >>> mbox cmd response data (48 bytes)
6,347,178 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,365,323 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,839 UART: [state] LifecycleState = Unprovisioned
85,494 UART: [state] DebugLocked = No
86,186 UART: [state] WD Timer not started. Device not locked for debugging
87,497 UART: [kat] SHA2-256
893,147 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,272 UART: [kat] ++
897,424 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,463 UART: [kat] SHA2-512-ACC
908,364 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,759 UART: [kat] LMS
1,171,087 UART: [kat] --
1,171,998 UART: [cold-reset] ++
1,172,438 UART: [fht] FHT @ 0x50003400
1,174,959 UART: [idev] ++
1,175,127 UART: [idev] CDI.KEYID = 6
1,175,487 UART: [idev] SUBJECT.KEYID = 7
1,175,911 UART: [idev] UDS.KEYID = 0
1,176,256 ready_for_fw is high
1,176,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,733 UART: [idev] Erasing UDS.KEYID = 0
1,200,338 UART: [idev] Sha1 KeyId Algorithm
1,208,728 UART: [idev] --
1,209,712 UART: [ldev] ++
1,209,880 UART: [ldev] CDI.KEYID = 6
1,210,243 UART: [ldev] SUBJECT.KEYID = 5
1,210,669 UART: [ldev] AUTHORITY.KEYID = 7
1,211,132 UART: [ldev] FE.KEYID = 1
1,216,486 UART: [ldev] Erasing FE.KEYID = 1
1,242,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,640 UART: [ldev] --
1,281,925 UART: [fwproc] Wait for Commands...
1,282,623 UART: [fwproc] Recv command 0x46574c44
1,283,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,196 >>> mbox cmd response: success
2,827,248 UART: [afmc] ++
2,827,416 UART: [afmc] CDI.KEYID = 6
2,827,778 UART: [afmc] SUBJECT.KEYID = 7
2,828,203 UART: [afmc] AUTHORITY.KEYID = 5
2,863,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,299 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,898 UART: [afmc] --
2,906,992 UART: [cold-reset] --
2,907,928 UART: [state] Locking Datavault
2,909,059 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,663 UART: [state] Locking ICCM
2,910,135 UART: [exit] Launching FMC @ 0x40000130
2,915,465 UART:
2,915,481 UART: Running Caliptra FMC ...
2,915,889 UART:
2,916,032 UART: [state] CFI Enabled
2,926,454 UART: [fht] FMC Alias Private Key: 7
3,045,610 UART: [art] Extend RT PCRs Done
3,046,038 UART: [art] Lock RT PCRs Done
3,047,458 UART: [art] Populate DV Done
3,055,575 UART: [fht] FMC Alias Private Key: 7
3,056,719 UART: [art] Derive CDI
3,056,999 UART: [art] Store in slot 0x4
3,142,696 UART: [art] Derive Key Pair
3,143,056 UART: [art] Store priv key in slot 0x5
3,156,246 UART: [art] Derive Key Pair - Done
3,171,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,327 UART: [art] PUB.X = 6560649CE823C6F63887157961752D5983D29A717E24C2F092EA187EDF87972EED0C438999D62151F1FE1D3A5DAB71DB
3,194,092 UART: [art] PUB.Y = 302272E022D96FD2BFB01FE64F97160B81ED7F5BE255F9C19E3EA73038DFA8B1603E5CF9A7ABFC789BFFEDAAE549F8A2
3,201,063 UART: [art] SIG.R = 07CACD8F70315EDE1AEF66B33D1415009462BC874B067F76FF48E2DAC76469C617C1CB1AC893F057FD8DF41FDEF88E5E
3,207,823 UART: [art] SIG.S = 55E83A71E4B5E582E3A07A96553077BA667995B707D94A36DBED5E7EA34E11281981C58BDDE79955829399BDF0E7B624
3,231,366 UART: Caliptra RT
3,231,709 UART: [state] CFI Enabled
3,351,937 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,352,607 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,833 UART: [rt]cmd =0x41544d4e, len=14344
3,786,408 >>> mbox cmd response data (8 bytes)
3,786,409 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,498 UART: [rt]cmd =0x41545348, len=116
3,838,595 >>> mbox cmd response data (12 bytes)
3,838,596 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,213 UART:
3,839,229 UART: Running Caliptra ROM ...
3,839,637 UART:
3,839,779 UART: [state] CFI Enabled
3,842,531 UART: [state] LifecycleState = Unprovisioned
3,843,186 UART: [state] DebugLocked = No
3,843,872 UART: [state] WD Timer not started. Device not locked for debugging
3,845,150 UART: [kat] SHA2-256
4,650,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,654,925 UART: [kat] ++
4,655,077 UART: [kat] sha1
4,659,489 UART: [kat] SHA2-256
4,661,429 UART: [kat] SHA2-384
4,664,070 UART: [kat] SHA2-512-ACC
4,665,970 UART: [kat] ECC-384
4,675,703 UART: [kat] HMAC-384Kdf
4,680,363 UART: [kat] LMS
4,928,691 UART: [kat] --
4,929,531 UART: [update-reset] ++
5,881,014 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,882,135 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,983,776 >>> mbox cmd response: success
5,983,776 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,983,927 UART: [update-reset] Copying MAN_2 To MAN_1
5,991,941 UART: [update-reset Success] --
5,992,806 UART: [state] Locking Datavault
5,993,640 UART: [state] Locking PCR0, PCR1 and PCR31
5,994,244 UART: [state] Locking ICCM
5,994,754 UART: [exit] Launching FMC @ 0x40000130
6,000,084 UART:
6,000,100 UART: Running Caliptra FMC ...
6,000,508 UART:
6,000,651 UART: [state] CFI Enabled
6,089,830 UART: [art] Extend RT PCRs Done
6,090,258 UART: [art] Lock RT PCRs Done
6,091,803 UART: [art] Populate DV Done
6,099,772 UART: [fht] FMC Alias Private Key: 7
6,100,928 UART: [art] Derive CDI
6,101,208 UART: [art] Store in slot 0x4
6,186,747 UART: [art] Derive Key Pair
6,187,107 UART: [art] Store priv key in slot 0x5
6,200,481 UART: [art] Derive Key Pair - Done
6,215,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,230,428 UART: [art] Erasing AUTHORITY.KEYID = 7
6,231,193 UART: [art] PUB.X = 73995998C81039B5070E59B2C2DA49B7FB46DA7D624F3535B7857B1E8C24B4B5AE1174BF66BA27D0881726F9568F678D
6,237,955 UART: [art] PUB.Y = AC5E09EC264F79D9EEE8E8705A0A5C9AE6D64EE872D0E1718D72F86E8208BB604805D09AD5C0FAC70F63CFCAB05C0CD8
6,244,909 UART: [art] SIG.R = 7BFD785A70D8DD5B9F831A794435800702916E93E252F624F454B3408D2110FAB6B5E6E469E6CD9BC367489181461DB3
6,251,669 UART: [art] SIG.S = BBC6EA624AFC5A0B2AE36021C04869AF00A9E437E5138541CBE918D4484DA0F9F47C61A9D771117ACBB8D24CCB59FD35
6,275,402 UART: mbox::rt_entry...
6,275,774 UART: ____ _ _ _ ____ _____
6,276,558 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,277,358 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,278,126 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,278,894 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,279,662 UART: |_|
6,279,974 UART:
6,636,840 UART: [rt] Runtime listening for mailbox commands...
6,638,038 >>> mbox cmd response data (48 bytes)
6,638,039 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,640,826 >>> mbox cmd response data (48 bytes)
6,640,827 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,658,972 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,176 ready_for_fw is high
1,060,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,231 >>> mbox cmd response: success
2,742,768 UART:
2,742,784 UART: Running Caliptra FMC ...
2,743,192 UART:
2,743,335 UART: [state] CFI Enabled
2,753,847 UART: [fht] FMC Alias Private Key: 7
2,873,049 UART: [art] Extend RT PCRs Done
2,873,477 UART: [art] Lock RT PCRs Done
2,875,103 UART: [art] Populate DV Done
2,883,250 UART: [fht] FMC Alias Private Key: 7
2,884,422 UART: [art] Derive CDI
2,884,702 UART: [art] Store in slot 0x4
2,970,593 UART: [art] Derive Key Pair
2,970,953 UART: [art] Store priv key in slot 0x5
2,983,923 UART: [art] Derive Key Pair - Done
2,998,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,019 UART: [art] PUB.X = 52D242BF356852C4BDD04403133A47302FCFAD29380988C27E86542F05434710841BE8ABB48448866E9682FB42BABBFA
3,021,778 UART: [art] PUB.Y = 696235C62F5719BBF23B2739E9D3660E820A356F2F92A6C87F0A707BA2B8A64D4B87F75F0444EE84AE6622322EF2A489
3,028,716 UART: [art] SIG.R = A7ECDB8706151B73D0482A61249FAF4E63051FC6FE0109158C6AFC13E0EEE6FDEDBB7A5CFAE8CAFE3B07857BD7EC2C89
3,035,499 UART: [art] SIG.S = DDABD38F2A4BF8FD174813298D5137EDBA6401CA456B77D73428ABBCFB787BEE7610C43321B081AFDD55E4928B9F011F
3,059,489 UART: Caliptra RT
3,059,832 UART: [state] CFI Enabled
3,179,584 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,254 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,484 UART: [rt]cmd =0x41544d4e, len=14344
3,613,443 >>> mbox cmd response data (8 bytes)
3,613,444 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,507 UART: [rt]cmd =0x41545348, len=116
3,665,598 >>> mbox cmd response data (12 bytes)
3,665,599 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,693,286 >>> mbox cmd response: success
5,693,286 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,706,579 UART:
5,706,595 UART: Running Caliptra FMC ...
5,707,003 UART:
5,707,146 UART: [state] CFI Enabled
5,796,445 UART: [art] Extend RT PCRs Done
5,796,873 UART: [art] Lock RT PCRs Done
5,797,910 UART: [art] Populate DV Done
5,806,361 UART: [fht] FMC Alias Private Key: 7
5,807,401 UART: [art] Derive CDI
5,807,681 UART: [art] Store in slot 0x4
5,893,146 UART: [art] Derive Key Pair
5,893,506 UART: [art] Store priv key in slot 0x5
5,906,796 UART: [art] Derive Key Pair - Done
5,921,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,936,318 UART: [art] Erasing AUTHORITY.KEYID = 7
5,937,083 UART: [art] PUB.X = 54F2D05AF17EE9F1AA70CBDB89476F0BD055C52CFBB300AF40EC677CDF91A5227DD38F211B134B1F49AFC6A32DA2C364
5,943,850 UART: [art] PUB.Y = 0627E855AA500F58CB3C0BF5648A243A4DACE2BDFA96ECCB05B9A9FEF0E8A95E0CEE36E5B81B377631B821ADC92F590C
5,950,806 UART: [art] SIG.R = 5BE0D14DF299358EE3DD01256186C3CDA88E718B2186CBD75EEF229D71E5B5BC7C110619B77423B9D26A1ED287422CB7
5,957,578 UART: [art] SIG.S = 974FC9B9F4CE2FF8EF17D0842BBAE205B1F3FBD261194570AA6F946987893A28B69621E186FB64DE3D438E54E6447186
5,980,881 UART: mbox::rt_entry...
5,981,253 UART: ____ _ _ _ ____ _____
5,982,037 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,982,837 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,983,605 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,984,373 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,985,141 UART: |_|
5,985,453 UART:
6,347,807 UART: [rt] Runtime listening for mailbox commands...
6,349,005 >>> mbox cmd response data (48 bytes)
6,349,006 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,351,793 >>> mbox cmd response data (48 bytes)
6,351,794 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,369,939 >>> mbox cmd response data (48 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,181 UART:
192,535 UART: Running Caliptra ROM ...
193,723 UART:
193,894 UART: [state] CFI Enabled
265,147 UART: [state] LifecycleState = Unprovisioned
267,050 UART: [state] DebugLocked = No
269,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,662 UART: [kat] SHA2-256
444,327 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,818 UART: [kat] ++
455,315 UART: [kat] sha1
465,453 UART: [kat] SHA2-256
468,175 UART: [kat] SHA2-384
474,247 UART: [kat] SHA2-512-ACC
476,627 UART: [kat] ECC-384
2,770,176 UART: [kat] HMAC-384Kdf
2,800,681 UART: [kat] LMS
3,991,004 UART: [kat] --
3,994,035 UART: [cold-reset] ++
3,996,402 UART: [fht] Storing FHT @ 0x50003400
4,008,173 UART: [idev] ++
4,008,746 UART: [idev] CDI.KEYID = 6
4,009,633 UART: [idev] SUBJECT.KEYID = 7
4,010,879 UART: [idev] UDS.KEYID = 0
4,011,845 ready_for_fw is high
4,012,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,498 UART: [idev] Erasing UDS.KEYID = 0
7,346,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,111 UART: [idev] --
7,372,588 UART: [ldev] ++
7,373,210 UART: [ldev] CDI.KEYID = 6
7,374,146 UART: [ldev] SUBJECT.KEYID = 5
7,375,355 UART: [ldev] AUTHORITY.KEYID = 7
7,376,639 UART: [ldev] FE.KEYID = 1
7,420,503 UART: [ldev] Erasing FE.KEYID = 1
10,754,479 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,279 UART: [ldev] --
13,136,596 UART: [fwproc] Waiting for Commands...
13,139,014 UART: [fwproc] Received command 0x46574c44
13,141,205 UART: [fwproc] Received Image of size 118548 bytes
17,242,559 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,064 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,103 >>> mbox cmd response: success
17,725,069 UART: [afmc] ++
17,725,685 UART: [afmc] CDI.KEYID = 6
17,726,598 UART: [afmc] SUBJECT.KEYID = 7
17,727,874 UART: [afmc] AUTHORITY.KEYID = 5
21,091,840 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,521 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,775 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,254 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,152 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,435,363 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,575 UART: [afmc] --
23,460,796 UART: [cold-reset] --
23,463,055 UART: [state] Locking Datavault
23,467,498 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,250 UART: [state] Locking ICCM
23,470,482 UART: [exit] Launching FMC @ 0x40000130
23,478,882 UART:
23,479,117 UART: Running Caliptra FMC ...
23,480,227 UART:
23,480,389 UART: [state] CFI Enabled
23,550,842 UART: [fht] FMC Alias Private Key: 7
25,892,344 UART: [art] Extend RT PCRs Done
25,893,561 UART: [art] Lock RT PCRs Done
25,895,234 UART: [art] Populate DV Done
25,900,538 UART: [fht] FMC Alias Private Key: 7
25,902,059 UART: [art] Derive CDI
25,902,809 UART: [art] Store in slot 0x4
25,960,120 UART: [art] Derive Key Pair
25,961,147 UART: [art] Store priv key in slot 0x5
29,253,971 UART: [art] Derive Key Pair - Done
29,266,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,397 UART: [art] PUB.X = 57DE648565385A204BEACEC4C809D51D6CFAB1209758527FCC62A7F559DE7FDB8F6C23A50DBABCCF02A588F456594F7B
31,564,693 UART: [art] PUB.Y = B4E5F54988B31465318981EBE7C1B8D94428F0CFB173BDBBDCA606BE630E82D2453EA01C5D406C929790A760D5BB4937
31,571,981 UART: [art] SIG.R = 7E69D4A9361DA59444F4D6D2E91B970FC89E008140FC8246EE247A8076B15574036447E35F3957F86296849A55A4976E
31,579,321 UART: [art] SIG.S = 258A6847B1729FA4B5EA8386A5B9E5C9FEAC0184D13AC0972196C58906F0D62440559C0036EECCF0C0BD982B06FAB5F0
32,883,899 UART: Caliptra RT
32,884,596 UART: [state] CFI Enabled
33,063,416 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,129,247 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,284,950 UART: [rt]cmd =0x41544d4e, len=14344
42,585,700 >>> mbox cmd response data (8 bytes)
42,586,307 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,617,085 UART: [rt]cmd =0x41545348, len=116
42,637,204 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,806,943 ready_for_fw is high
3,807,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,709 >>> mbox cmd response: success
23,646,931 UART:
23,647,479 UART: Running Caliptra FMC ...
23,648,611 UART:
23,648,767 UART: [state] CFI Enabled
23,718,324 UART: [fht] FMC Alias Private Key: 7
26,058,471 UART: [art] Extend RT PCRs Done
26,059,702 UART: [art] Lock RT PCRs Done
26,061,361 UART: [art] Populate DV Done
26,067,168 UART: [fht] FMC Alias Private Key: 7
26,068,768 UART: [art] Derive CDI
26,069,515 UART: [art] Store in slot 0x4
26,126,516 UART: [art] Derive Key Pair
26,127,559 UART: [art] Store priv key in slot 0x5
29,420,543 UART: [art] Derive Key Pair - Done
29,433,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,898 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,440 UART: [art] PUB.X = CC4183EF89BFCEAFCC9C0CDC7BB7EABAFFC58C9CBF6D7A41569842CD7A25F9245152CD6DB345355ABB1B29D03926359F
31,731,710 UART: [art] PUB.Y = 98C96FA8A8718DDC53B76A4D6649B0F6D2F2EE4AD0D153FC6923BFBD1C334F6A4C0863731690EDA612A3D0EF2560C3D7
31,738,944 UART: [art] SIG.R = A3BED30836A5E62D354699DA3CF2CCE28B809814C5EA11F52CA0E26782CE7A64AA4F9126331A438281391E4F441E0AEA
31,746,339 UART: [art] SIG.S = EEB9B09B6D08CCE06E67BE3834306E8EBF3096844D2FFEBD80BEFC05F00D63D5B26C5296CEB9934718CC154D85C76DCB
33,051,492 UART: Caliptra RT
33,052,207 UART: [state] CFI Enabled
33,227,649 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,296,366 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,452,235 UART: [rt]cmd =0x41544d4e, len=14344
42,752,767 >>> mbox cmd response data (8 bytes)
42,753,365 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,784,060 UART: [rt]cmd =0x41545348, len=116
42,803,812 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,402 UART:
192,781 UART: Running Caliptra ROM ...
193,889 UART:
603,660 UART: [state] CFI Enabled
613,366 UART: [state] LifecycleState = Unprovisioned
615,315 UART: [state] DebugLocked = No
618,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,884 UART: [kat] SHA2-256
792,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,195 UART: [kat] ++
803,637 UART: [kat] sha1
814,528 UART: [kat] SHA2-256
817,212 UART: [kat] SHA2-384
824,288 UART: [kat] SHA2-512-ACC
826,666 UART: [kat] ECC-384
3,111,721 UART: [kat] HMAC-384Kdf
3,123,381 UART: [kat] LMS
4,313,500 UART: [kat] --
4,316,817 UART: [cold-reset] ++
4,318,889 UART: [fht] Storing FHT @ 0x50003400
4,329,301 UART: [idev] ++
4,329,868 UART: [idev] CDI.KEYID = 6
4,330,848 UART: [idev] SUBJECT.KEYID = 7
4,332,099 UART: [idev] UDS.KEYID = 0
4,333,130 ready_for_fw is high
4,333,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,143 UART: [idev] Erasing UDS.KEYID = 0
7,620,332 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,767 UART: [idev] --
7,646,422 UART: [ldev] ++
7,646,986 UART: [ldev] CDI.KEYID = 6
7,647,920 UART: [ldev] SUBJECT.KEYID = 5
7,649,180 UART: [ldev] AUTHORITY.KEYID = 7
7,650,325 UART: [ldev] FE.KEYID = 1
7,663,309 UART: [ldev] Erasing FE.KEYID = 1
10,949,093 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,807 UART: [ldev] --
13,311,338 UART: [fwproc] Waiting for Commands...
13,312,994 UART: [fwproc] Received command 0x46574c44
13,315,221 UART: [fwproc] Received Image of size 118548 bytes
17,427,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,954 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,992 >>> mbox cmd response: success
17,908,500 UART: [afmc] ++
17,909,113 UART: [afmc] CDI.KEYID = 6
17,910,002 UART: [afmc] SUBJECT.KEYID = 7
17,911,280 UART: [afmc] AUTHORITY.KEYID = 5
21,226,741 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,613 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,789 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,183 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,235 UART: [afmc] --
23,594,793 UART: [cold-reset] --
23,598,752 UART: [state] Locking Datavault
23,603,474 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,232 UART: [state] Locking ICCM
23,606,921 UART: [exit] Launching FMC @ 0x40000130
23,615,270 UART:
23,615,542 UART: Running Caliptra FMC ...
23,616,643 UART:
23,616,797 UART: [state] CFI Enabled
23,624,756 UART: [fht] FMC Alias Private Key: 7
25,964,907 UART: [art] Extend RT PCRs Done
25,966,128 UART: [art] Lock RT PCRs Done
25,967,758 UART: [art] Populate DV Done
25,973,011 UART: [fht] FMC Alias Private Key: 7
25,974,714 UART: [art] Derive CDI
25,975,518 UART: [art] Store in slot 0x4
26,018,166 UART: [art] Derive Key Pair
26,019,206 UART: [art] Store priv key in slot 0x5
29,261,345 UART: [art] Derive Key Pair - Done
29,274,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,474 UART: [art] PUB.X = FE0DFDE365055CAF613B74FD695863B9C3353D0410A1C5405EE9986CD14838C62640F7ED459323E9A1ADF479E32730C9
31,562,720 UART: [art] PUB.Y = AC7549CE07DDBE9E04F489FE89CAA7D25E7B7021B65111005EC0ADD89DEA374E057F552599873DA740BD345CBFC8498B
31,570,002 UART: [art] SIG.R = 6B5EAB4F408E633EBFD1C211301D285F7D1301BA56802BE9B22124D2FDB66B4F971EBFD51B65C190B9E356F2391267DB
31,577,390 UART: [art] SIG.S = 07BF7A017C64F23DAEC3B92295895B983F3C1765DCA8E7166AAE2BACEC359C346F2E4E69ECD7486CD3EB831C38525D80
32,883,170 UART: Caliptra RT
32,883,924 UART: [state] CFI Enabled
33,018,359 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,092,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,247,981 UART: [rt]cmd =0x41544d4e, len=14344
42,548,788 >>> mbox cmd response data (8 bytes)
42,549,378 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,579,885 UART: [rt]cmd =0x41545348, len=116
42,599,415 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,487 writing to cptra_bootfsm_go
4,132,351 ready_for_fw is high
4,132,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,867 >>> mbox cmd response: success
23,805,693 UART:
23,806,099 UART: Running Caliptra FMC ...
23,807,212 UART:
23,807,363 UART: [state] CFI Enabled
23,815,095 UART: [fht] FMC Alias Private Key: 7
26,155,679 UART: [art] Extend RT PCRs Done
26,156,911 UART: [art] Lock RT PCRs Done
26,158,728 UART: [art] Populate DV Done
26,164,150 UART: [fht] FMC Alias Private Key: 7
26,165,738 UART: [art] Derive CDI
26,166,469 UART: [art] Store in slot 0x4
26,209,124 UART: [art] Derive Key Pair
26,210,190 UART: [art] Store priv key in slot 0x5
29,452,177 UART: [art] Derive Key Pair - Done
29,465,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,739 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,243 UART: [art] PUB.X = D3735DD2FC9242E315371C2C812806EFFDBE66416536F49BF2FD675D6ABBC03CCBD03395506B132A51D685D7252B2EA3
31,754,547 UART: [art] PUB.Y = C1B014FA9E95F1E01843DAD7BD7E3B6E94ADDEAB31CB8CA9E0D4C713FD5A28091EF42706F300D93CAB46CE5A8C1F8BC5
31,761,851 UART: [art] SIG.R = F2C67D80C5AD36AB454EDB62ED16D859C951B9E9C3D2564DCE3A58A6D2FD3108FF1553149B6B5BD9A729D3BB059B9DC7
31,769,243 UART: [art] SIG.S = 8BD8D7DCF0AB2E9B8F1C0BE24E51E98DBDFEECBB2066B8CE797937980F1B04AC48C47ED4B1BF730FCE711A80434C63DE
33,074,368 UART: Caliptra RT
33,075,069 UART: [state] CFI Enabled
33,208,839 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
37,272,714 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,428,169 UART: [rt]cmd =0x41544d4e, len=14344
42,729,009 >>> mbox cmd response data (8 bytes)
42,729,623 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
42,760,632 UART: [rt]cmd =0x41545348, len=116
42,780,626 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,231 UART:
192,611 UART: Running Caliptra ROM ...
193,735 UART:
193,880 UART: [state] CFI Enabled
266,231 UART: [state] LifecycleState = Unprovisioned
268,165 UART: [state] DebugLocked = No
269,619 UART: [state] WD Timer not started. Device not locked for debugging
274,028 UART: [kat] SHA2-256
453,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,467 UART: [kat] ++
464,918 UART: [kat] sha1
475,225 UART: [kat] SHA2-256
477,946 UART: [kat] SHA2-384
484,217 UART: [kat] SHA2-512-ACC
486,579 UART: [kat] ECC-384
2,947,534 UART: [kat] HMAC-384Kdf
2,971,061 UART: [kat] LMS
3,447,540 UART: [kat] --
3,451,391 UART: [cold-reset] ++
3,453,531 UART: [fht] FHT @ 0x50003400
3,466,205 UART: [idev] ++
3,466,757 UART: [idev] CDI.KEYID = 6
3,467,787 UART: [idev] SUBJECT.KEYID = 7
3,469,150 UART: [idev] UDS.KEYID = 0
3,470,083 ready_for_fw is high
3,470,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,296 UART: [idev] Erasing UDS.KEYID = 0
5,985,072 UART: [idev] Sha1 KeyId Algorithm
6,009,353 UART: [idev] --
6,014,440 UART: [ldev] ++
6,015,012 UART: [ldev] CDI.KEYID = 6
6,015,943 UART: [ldev] SUBJECT.KEYID = 5
6,017,102 UART: [ldev] AUTHORITY.KEYID = 7
6,018,385 UART: [ldev] FE.KEYID = 1
6,056,317 UART: [ldev] Erasing FE.KEYID = 1
8,567,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,312 UART: [ldev] --
10,375,067 UART: [fwproc] Wait for Commands...
10,378,082 UART: [fwproc] Recv command 0x46574c44
10,380,067 UART: [fwproc] Recv'd Img size: 118548 bytes
13,873,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,848 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,223 >>> mbox cmd response: success
14,356,484 UART: [afmc] ++
14,357,126 UART: [afmc] CDI.KEYID = 6
14,358,036 UART: [afmc] SUBJECT.KEYID = 7
14,359,257 UART: [afmc] AUTHORITY.KEYID = 5
16,894,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,033 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,643 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,196 UART: [afmc] --
18,694,748 UART: [cold-reset] --
18,697,693 UART: [state] Locking Datavault
18,703,369 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,063 UART: [state] Locking ICCM
18,707,454 UART: [exit] Launching FMC @ 0x40000130
18,715,847 UART:
18,716,089 UART: Running Caliptra FMC ...
18,717,190 UART:
18,717,353 UART: [state] CFI Enabled
18,773,593 UART: [fht] FMC Alias Private Key: 7
20,540,061 UART: [art] Extend RT PCRs Done
20,541,285 UART: [art] Lock RT PCRs Done
20,542,752 UART: [art] Populate DV Done
20,548,156 UART: [fht] FMC Alias Private Key: 7
20,549,846 UART: [art] Derive CDI
20,550,653 UART: [art] Store in slot 0x4
20,606,555 UART: [art] Derive Key Pair
20,607,595 UART: [art] Store priv key in slot 0x5
23,070,223 UART: [art] Derive Key Pair - Done
23,082,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,794 UART: [art] PUB.X = 41338058AC3BDB708B7EEDBA9F939B406BC479A4620BE2AA5DE1C1181CD89776DE518118398B365DDBB7182D042ADD99
24,804,049 UART: [art] PUB.Y = 23818D438E759A6FBC536E63D5D991B3101FF498D40FD80E3E4F75A1E4624D23743AECAC5434ED3F4453BCC754235901
24,811,288 UART: [art] SIG.R = 4E5E8EB104EC5D50B239406A14E8C324C192B92ADBC02B9B24B64BD3792B7D406FF1725A2A0C9319272DB74047456273
24,818,685 UART: [art] SIG.S = 344DD822A3E5ACBCAEF2905DBD6E2E59917D6ED6C64771FB25AB3B661D6D5F6D54EEA7569DADA10FA0240E10F1C1D94F
25,797,435 UART: Caliptra RT
25,798,149 UART: [state] CFI Enabled
25,978,605 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,019,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,174,983 UART: [rt]cmd =0x41544d4e, len=14344
34,170,717 >>> mbox cmd response data (8 bytes)
34,171,302 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,201,995 UART: [rt]cmd =0x41545348, len=116
34,222,217 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,459,643 ready_for_fw is high
3,460,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,708 >>> mbox cmd response: success
18,509,175 UART:
18,510,052 UART: Running Caliptra FMC ...
18,511,183 UART:
18,511,338 UART: [state] CFI Enabled
18,578,427 UART: [fht] FMC Alias Private Key: 7
20,345,232 UART: [art] Extend RT PCRs Done
20,346,467 UART: [art] Lock RT PCRs Done
20,348,464 UART: [art] Populate DV Done
20,353,951 UART: [fht] FMC Alias Private Key: 7
20,355,494 UART: [art] Derive CDI
20,356,268 UART: [art] Store in slot 0x4
20,404,988 UART: [art] Derive Key Pair
20,406,031 UART: [art] Store priv key in slot 0x5
22,868,885 UART: [art] Derive Key Pair - Done
22,881,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,593,919 UART: [art] Erasing AUTHORITY.KEYID = 7
24,595,423 UART: [art] PUB.X = CF6DFBBA5E13F1E1C443A67366583FB881110F684C59443221B216FE2E9F2D2647EAC18C6F49AD2A03531917244AB85D
24,602,683 UART: [art] PUB.Y = A564EB292F3906646AC951414B5AC0A2C1FE888197513A8643B8852FB5075D80B2F7BF6D65B21F239CF545CF59E4681F
24,609,935 UART: [art] SIG.R = C6B2973C40A2581F4E321AE7EEF010F12CF5DEAF7D10B1826FCAD2CA42997CB3736FB15A54F19F81FF2909C0C1F26688
24,617,380 UART: [art] SIG.S = 2612F59524375FCB445442123B78E9702225162119E716BF71CF97CDDC54FF334C2DE794DD4DAA2CE906A481478D0875
25,596,612 UART: Caliptra RT
25,597,311 UART: [state] CFI Enabled
25,777,564 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,818,293 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
29,973,802 UART: [rt]cmd =0x41544d4e, len=14344
33,969,429 >>> mbox cmd response data (8 bytes)
33,970,030 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,000,732 UART: [rt]cmd =0x41545348, len=116
34,021,387 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
192,457 UART:
192,819 UART: Running Caliptra ROM ...
193,909 UART:
603,639 UART: [state] CFI Enabled
619,857 UART: [state] LifecycleState = Unprovisioned
621,736 UART: [state] DebugLocked = No
623,197 UART: [state] WD Timer not started. Device not locked for debugging
626,671 UART: [kat] SHA2-256
806,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,102 UART: [kat] ++
817,590 UART: [kat] sha1
827,970 UART: [kat] SHA2-256
830,699 UART: [kat] SHA2-384
836,411 UART: [kat] SHA2-512-ACC
838,807 UART: [kat] ECC-384
3,279,310 UART: [kat] HMAC-384Kdf
3,293,035 UART: [kat] LMS
3,769,572 UART: [kat] --
3,773,775 UART: [cold-reset] ++
3,775,990 UART: [fht] FHT @ 0x50003400
3,787,395 UART: [idev] ++
3,788,030 UART: [idev] CDI.KEYID = 6
3,788,940 UART: [idev] SUBJECT.KEYID = 7
3,790,189 UART: [idev] UDS.KEYID = 0
3,791,114 ready_for_fw is high
3,791,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,197 UART: [idev] Erasing UDS.KEYID = 0
6,267,147 UART: [idev] Sha1 KeyId Algorithm
6,289,695 UART: [idev] --
6,294,696 UART: [ldev] ++
6,295,283 UART: [ldev] CDI.KEYID = 6
6,296,194 UART: [ldev] SUBJECT.KEYID = 5
6,297,413 UART: [ldev] AUTHORITY.KEYID = 7
6,298,651 UART: [ldev] FE.KEYID = 1
6,309,949 UART: [ldev] Erasing FE.KEYID = 1
8,790,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,056 UART: [ldev] --
10,584,101 UART: [fwproc] Wait for Commands...
10,587,120 UART: [fwproc] Recv command 0x46574c44
10,589,105 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,499 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,796 >>> mbox cmd response: success
14,558,508 UART: [afmc] ++
14,559,135 UART: [afmc] CDI.KEYID = 6
14,560,024 UART: [afmc] SUBJECT.KEYID = 7
14,561,300 UART: [afmc] AUTHORITY.KEYID = 5
17,063,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,640 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,566 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,119 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,858,831 UART: [afmc] --
18,862,498 UART: [cold-reset] --
18,865,175 UART: [state] Locking Datavault
18,871,233 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,988 UART: [state] Locking ICCM
18,874,870 UART: [exit] Launching FMC @ 0x40000130
18,883,279 UART:
18,883,516 UART: Running Caliptra FMC ...
18,884,618 UART:
18,884,784 UART: [state] CFI Enabled
18,892,724 UART: [fht] FMC Alias Private Key: 7
20,658,156 UART: [art] Extend RT PCRs Done
20,659,380 UART: [art] Lock RT PCRs Done
20,661,169 UART: [art] Populate DV Done
20,666,799 UART: [fht] FMC Alias Private Key: 7
20,668,519 UART: [art] Derive CDI
20,669,337 UART: [art] Store in slot 0x4
20,711,936 UART: [art] Derive Key Pair
20,712,974 UART: [art] Store priv key in slot 0x5
23,139,386 UART: [art] Derive Key Pair - Done
23,152,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,889 UART: [art] PUB.X = 9F00F6AF88D4B761A5A742FB616E554026D71EE00E3F6305B4F6FEC3C62B1079D4C943701D4FC4114027ED2B2A92F5F1
24,867,138 UART: [art] PUB.Y = 00F4A3E49BEAB0F2DFB18870682E7DC27F722FAE96B6220B5C6BD51DF357046FE10E411A0692B2C2A65DEA3626F9109F
24,874,380 UART: [art] SIG.R = E68466020524287DD33FE62D71AEFED90D86D137E0347114040AF069B24D251956DB75BE26A3F50EDA283B3756F000C5
24,881,776 UART: [art] SIG.S = 8C674D7B689C597EEC67D3759BF5B8CC28CCDD1B8C8075D9954B9CABED846283CED8A7C28535B97F087BD8D58058456C
25,860,413 UART: Caliptra RT
25,861,112 UART: [state] CFI Enabled
25,993,372 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,036,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,192,373 UART: [rt]cmd =0x41544d4e, len=14344
34,187,953 >>> mbox cmd response data (8 bytes)
34,188,527 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,219,487 UART: [rt]cmd =0x41545348, len=116
34,238,909 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,783,652 ready_for_fw is high
3,784,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,628 >>> mbox cmd response: success
18,702,835 UART:
18,703,216 UART: Running Caliptra FMC ...
18,704,346 UART:
18,704,509 UART: [state] CFI Enabled
18,712,442 UART: [fht] FMC Alias Private Key: 7
20,478,026 UART: [art] Extend RT PCRs Done
20,479,250 UART: [art] Lock RT PCRs Done
20,480,670 UART: [art] Populate DV Done
20,486,318 UART: [fht] FMC Alias Private Key: 7
20,487,913 UART: [art] Derive CDI
20,488,736 UART: [art] Store in slot 0x4
20,531,666 UART: [art] Derive Key Pair
20,532,702 UART: [art] Store priv key in slot 0x5
22,959,487 UART: [art] Derive Key Pair - Done
22,972,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,144 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,654 UART: [art] PUB.X = 236ADFD4078F81B3112CF336D171EE112AFE11764189DC4D7D474184756C872C99FD8D4064E7E9873D8C22E8AB8FDFDA
24,687,921 UART: [art] PUB.Y = 1CC57C00FFF23E65F6098F1DD3C58DDDA5F770E4EBCE5EF55410EC3C9F5E875189A7A430860D69681607A24C31D825F1
24,695,181 UART: [art] SIG.R = E2764362E2EBD9C2BB7C03F316D301A86DD197242DC23FFE1B04F3A9A110891F781D833123D6297AF7B925FDC30F1893
24,702,533 UART: [art] SIG.S = FD3E9B9D67E44C2669A51830F165D84AFAE0600DCE7D3E34AA51AB8711F3F34D9631C1749878D3369EEEFFE78280E205
25,681,891 UART: Caliptra RT
25,682,594 UART: [state] CFI Enabled
25,816,256 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
29,850,793 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,006,448 UART: [rt]cmd =0x41544d4e, len=14344
34,001,853 >>> mbox cmd response data (8 bytes)
34,002,428 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,033,184 UART: [rt]cmd =0x41545348, len=116
34,052,287 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,129 UART:
192,496 UART: Running Caliptra ROM ...
193,626 UART:
193,795 UART: [state] CFI Enabled
264,132 UART: [state] LifecycleState = Unprovisioned
266,533 UART: [state] DebugLocked = No
268,557 UART: [state] WD Timer not started. Device not locked for debugging
273,009 UART: [kat] SHA2-256
462,857 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,675 UART: [kat] ++
474,145 UART: [kat] sha1
484,873 UART: [kat] SHA2-256
487,892 UART: [kat] SHA2-384
494,020 UART: [kat] SHA2-512-ACC
496,600 UART: [kat] ECC-384
2,946,992 UART: [kat] HMAC-384Kdf
2,971,586 UART: [kat] LMS
3,503,338 UART: [kat] --
3,505,697 UART: [cold-reset] ++
3,507,635 UART: [fht] FHT @ 0x50003400
3,519,108 UART: [idev] ++
3,519,818 UART: [idev] CDI.KEYID = 6
3,520,725 UART: [idev] SUBJECT.KEYID = 7
3,521,970 UART: [idev] UDS.KEYID = 0
3,522,890 ready_for_fw is high
3,523,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,487 UART: [idev] Erasing UDS.KEYID = 0
6,032,520 UART: [idev] Sha1 KeyId Algorithm
6,054,616 UART: [idev] --
6,059,742 UART: [ldev] ++
6,060,430 UART: [ldev] CDI.KEYID = 6
6,061,351 UART: [ldev] SUBJECT.KEYID = 5
6,062,508 UART: [ldev] AUTHORITY.KEYID = 7
6,063,740 UART: [ldev] FE.KEYID = 1
6,100,414 UART: [ldev] Erasing FE.KEYID = 1
8,608,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,405 UART: [ldev] --
10,415,498 UART: [fwproc] Wait for Commands...
10,417,751 UART: [fwproc] Recv command 0x46574c44
10,420,061 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,554 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,064 >>> mbox cmd response: success
14,680,595 UART: [afmc] ++
14,681,322 UART: [afmc] CDI.KEYID = 6
14,682,511 UART: [afmc] SUBJECT.KEYID = 7
14,684,022 UART: [afmc] AUTHORITY.KEYID = 5
17,213,402 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,968 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,920 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,238 UART: [afmc] --
19,013,104 UART: [cold-reset] --
19,017,401 UART: [state] Locking Datavault
19,021,695 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,842 UART: [state] Locking ICCM
19,025,670 UART: [exit] Launching FMC @ 0x40000130
19,034,347 UART:
19,034,580 UART: Running Caliptra FMC ...
19,035,681 UART:
19,035,861 UART: [state] CFI Enabled
19,096,545 UART: [fht] FMC Alias Private Key: 7
20,863,533 UART: [art] Extend RT PCRs Done
20,864,749 UART: [art] Lock RT PCRs Done
20,866,615 UART: [art] Populate DV Done
20,872,018 UART: [fht] FMC Alias Private Key: 7
20,873,715 UART: [art] Derive CDI
20,874,526 UART: [art] Store in slot 0x4
20,929,892 UART: [art] Derive Key Pair
20,930,927 UART: [art] Store priv key in slot 0x5
23,393,541 UART: [art] Derive Key Pair - Done
23,406,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,564 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,079 UART: [art] PUB.X = 312311D8700533876BAB1734564201B2AD1AEEB6618F0A38E408CFAD4B29F5F3CF73B5E5A23799BE1BEC368E60594F10
25,128,362 UART: [art] PUB.Y = 862719BDC510C001528980DA92002BF9411B7179151D8BB32DB0A49723D259D7BA14B66DCCB7C91521B338920A812B1E
25,135,609 UART: [art] SIG.R = 8F39FAF26DE6B06425A4042AB963911725064428BFDAC42217EE24C36B6EF320071313E093B6C7F897B65DAF30C34921
25,143,136 UART: [art] SIG.S = E85947B4094D39C750602E04872675C9738DB61A34E566A026FC3747B95DA0EAF674470CB3006CFB52A2E18BF4F96A10
26,121,435 UART: Caliptra RT
26,122,118 UART: [state] CFI Enabled
26,304,721 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,351,159 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,506,772 UART: [rt]cmd =0x41544d4e, len=14344
34,502,772 >>> mbox cmd response data (8 bytes)
34,503,354 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,533,977 UART: [rt]cmd =0x41545348, len=116
34,553,570 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,438,167 ready_for_fw is high
3,438,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,023 >>> mbox cmd response: success
19,132,853 UART:
19,133,247 UART: Running Caliptra FMC ...
19,134,352 UART:
19,134,507 UART: [state] CFI Enabled
19,201,489 UART: [fht] FMC Alias Private Key: 7
20,967,769 UART: [art] Extend RT PCRs Done
20,968,988 UART: [art] Lock RT PCRs Done
20,970,644 UART: [art] Populate DV Done
20,976,010 UART: [fht] FMC Alias Private Key: 7
20,977,659 UART: [art] Derive CDI
20,978,414 UART: [art] Store in slot 0x4
21,034,648 UART: [art] Derive Key Pair
21,035,692 UART: [art] Store priv key in slot 0x5
23,498,436 UART: [art] Derive Key Pair - Done
23,511,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,272 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,790 UART: [art] PUB.X = 7320E11BACB64670770B1BB3297F3980A869DC232406A5C90973F0437E91445C67AEF2E7CC6BCE645766E6294F916F33
25,233,030 UART: [art] PUB.Y = 42992C38B0E96BC5E997F9E49DBB1A45B6BFF074EA84D0F8DD704FDD5349325DB845ACFD0A7B474AE9AB7C0C0ED81AEB
25,240,314 UART: [art] SIG.R = 1FA143E50255994680EA17ED76C66CA736E7D27C5CC9C99C115768C4C3D24C6DBE354D73D9D870C55A7D36CED2E90CC2
25,247,845 UART: [art] SIG.S = 0CD8EC43434E73D2478C622560D9056E65C6A1DDF2F6739A507DCF3DF061EE0402A3C1DF79A670FE86D5C93A5BFBE2AC
26,226,527 UART: Caliptra RT
26,227,235 UART: [state] CFI Enabled
26,408,315 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,454,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,610,089 UART: [rt]cmd =0x41544d4e, len=14344
34,605,672 >>> mbox cmd response data (8 bytes)
34,606,270 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,637,023 UART: [rt]cmd =0x41545348, len=116
34,656,870 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,578 UART:
192,969 UART: Running Caliptra ROM ...
194,152 UART:
603,865 UART: [state] CFI Enabled
617,421 UART: [state] LifecycleState = Unprovisioned
619,804 UART: [state] DebugLocked = No
621,353 UART: [state] WD Timer not started. Device not locked for debugging
626,760 UART: [kat] SHA2-256
816,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,474 UART: [kat] ++
827,927 UART: [kat] sha1
839,445 UART: [kat] SHA2-256
842,464 UART: [kat] SHA2-384
848,954 UART: [kat] SHA2-512-ACC
851,544 UART: [kat] ECC-384
3,294,294 UART: [kat] HMAC-384Kdf
3,307,270 UART: [kat] LMS
3,839,030 UART: [kat] --
3,843,335 UART: [cold-reset] ++
3,844,707 UART: [fht] FHT @ 0x50003400
3,854,908 UART: [idev] ++
3,855,626 UART: [idev] CDI.KEYID = 6
3,856,538 UART: [idev] SUBJECT.KEYID = 7
3,857,789 UART: [idev] UDS.KEYID = 0
3,858,991 ready_for_fw is high
3,859,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,083 UART: [idev] Erasing UDS.KEYID = 0
6,335,244 UART: [idev] Sha1 KeyId Algorithm
6,359,059 UART: [idev] --
6,363,575 UART: [ldev] ++
6,364,266 UART: [ldev] CDI.KEYID = 6
6,365,151 UART: [ldev] SUBJECT.KEYID = 5
6,366,367 UART: [ldev] AUTHORITY.KEYID = 7
6,367,605 UART: [ldev] FE.KEYID = 1
6,379,005 UART: [ldev] Erasing FE.KEYID = 1
8,860,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,865 UART: [ldev] --
10,651,104 UART: [fwproc] Wait for Commands...
10,654,333 UART: [fwproc] Recv command 0x46574c44
10,656,643 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,426 >>> mbox cmd response: success
14,920,181 UART: [afmc] ++
14,920,890 UART: [afmc] CDI.KEYID = 6
14,922,022 UART: [afmc] SUBJECT.KEYID = 7
14,923,592 UART: [afmc] AUTHORITY.KEYID = 5
17,428,501 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,106 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,245 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,175 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,158 UART: [afmc] --
19,226,506 UART: [cold-reset] --
19,231,418 UART: [state] Locking Datavault
19,235,877 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,045 UART: [state] Locking ICCM
19,239,513 UART: [exit] Launching FMC @ 0x40000130
19,248,210 UART:
19,248,460 UART: Running Caliptra FMC ...
19,249,589 UART:
19,249,752 UART: [state] CFI Enabled
19,257,645 UART: [fht] FMC Alias Private Key: 7
21,024,219 UART: [art] Extend RT PCRs Done
21,025,449 UART: [art] Lock RT PCRs Done
21,026,899 UART: [art] Populate DV Done
21,032,480 UART: [fht] FMC Alias Private Key: 7
21,034,085 UART: [art] Derive CDI
21,034,830 UART: [art] Store in slot 0x4
21,077,487 UART: [art] Derive Key Pair
21,078,535 UART: [art] Store priv key in slot 0x5
23,505,515 UART: [art] Derive Key Pair - Done
23,518,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,618 UART: [art] PUB.X = 6F45F4705C3BB178AAE1B9FB6E017646697676324FE1694FCA2B21C33A959EE0BDE5FB303016118AB3C8E89CEDD88047
25,233,831 UART: [art] PUB.Y = 91076C062EDE679591D876E0F525BBB1AB4816355D99DDDC756651271C07F599CA9D0DCD9CA341A4BC732A0767AF7D19
25,241,108 UART: [art] SIG.R = F103B116F8EF35FD2366A868401C3CAABF7C0AC643C894EEF0C1D61B1731A5A85467C4909A6BAEBE77DEE354BA49FCE3
25,248,535 UART: [art] SIG.S = D927AA9012AB338290260943E73EE2C41AFB424F12B5C63FDBE3FB6B0DB3BC6D7F7BAE83B9477BD3BBA4EB6A5B7AC32B
26,227,584 UART: Caliptra RT
26,228,298 UART: [state] CFI Enabled
26,361,005 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,416,517 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,572,338 UART: [rt]cmd =0x41544d4e, len=14344
34,568,211 >>> mbox cmd response data (8 bytes)
34,568,793 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,599,663 UART: [rt]cmd =0x41545348, len=116
34,618,914 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
3,755,932 ready_for_fw is high
3,756,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,705 >>> mbox cmd response: success
19,301,645 UART:
19,302,030 UART: Running Caliptra FMC ...
19,303,244 UART:
19,303,422 UART: [state] CFI Enabled
19,311,221 UART: [fht] FMC Alias Private Key: 7
21,077,279 UART: [art] Extend RT PCRs Done
21,078,517 UART: [art] Lock RT PCRs Done
21,080,313 UART: [art] Populate DV Done
21,085,959 UART: [fht] FMC Alias Private Key: 7
21,087,455 UART: [art] Derive CDI
21,088,230 UART: [art] Store in slot 0x4
21,131,126 UART: [art] Derive Key Pair
21,132,194 UART: [art] Store priv key in slot 0x5
23,559,134 UART: [art] Derive Key Pair - Done
23,572,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,298 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,809 UART: [art] PUB.X = 5246BB3EA87287540ECFAE8E64B8345BC335D5BECF0ECE8F11A0E4D92A6B789C02DEB213A4A14886543ADB8DD0EADAD4
25,287,145 UART: [art] PUB.Y = A310A02F0626F1D9CEFD6E219062DFEC766C19BB901F244F07B9C21A5432CCF1F6443B7C1D66B4C8D986B5DF2A501E3D
25,294,415 UART: [art] SIG.R = 49BFF281BED48837B73E9A18B4DB78AC83C6982700B2AA3FD1A0EA99E10DEE67BE53225E5B22F3D96FD78A3033F16719
25,301,790 UART: [art] SIG.S = 55F23B6EB8A69347CAA381A9D7249E42EEF861591044005272DB46AD8CF9C4232CAD6220D776D87009E43BFCBC092DAB
26,280,642 UART: Caliptra RT
26,281,340 UART: [state] CFI Enabled
26,414,042 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,470,727 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
30,626,620 UART: [rt]cmd =0x41544d4e, len=14344
34,622,415 >>> mbox cmd response data (8 bytes)
34,623,040 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
34,653,851 UART: [rt]cmd =0x41545348, len=116
34,672,429 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,835 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,467 UART: [kat] SHA2-256
882,398 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,513 UART: [kat] ++
886,665 UART: [kat] sha1
890,859 UART: [kat] SHA2-256
892,797 UART: [kat] SHA2-384
895,694 UART: [kat] SHA2-512-ACC
897,595 UART: [kat] ECC-384
903,404 UART: [kat] HMAC-384Kdf
908,024 UART: [kat] LMS
1,476,220 UART: [kat] --
1,477,313 UART: [cold-reset] ++
1,477,695 UART: [fht] Storing FHT @ 0x50003400
1,480,644 UART: [idev] ++
1,480,812 UART: [idev] CDI.KEYID = 6
1,481,172 UART: [idev] SUBJECT.KEYID = 7
1,481,596 UART: [idev] UDS.KEYID = 0
1,481,941 ready_for_fw is high
1,481,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,692 UART: [idev] Erasing UDS.KEYID = 0
1,506,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,094 UART: [idev] --
1,516,283 UART: [ldev] ++
1,516,451 UART: [ldev] CDI.KEYID = 6
1,516,814 UART: [ldev] SUBJECT.KEYID = 5
1,517,240 UART: [ldev] AUTHORITY.KEYID = 7
1,517,703 UART: [ldev] FE.KEYID = 1
1,522,803 UART: [ldev] Erasing FE.KEYID = 1
1,548,140 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,608 UART: [ldev] --
1,586,963 UART: [fwproc] Waiting for Commands...
1,587,760 UART: [fwproc] Received command 0x46574c44
1,588,551 UART: [fwproc] Received Image of size 118548 bytes
2,933,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,079 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,297 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,668 >>> mbox cmd response: success
3,133,902 UART: [afmc] ++
3,134,070 UART: [afmc] CDI.KEYID = 6
3,134,432 UART: [afmc] SUBJECT.KEYID = 7
3,134,857 UART: [afmc] AUTHORITY.KEYID = 5
3,169,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,514 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,197 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,233 UART: [afmc] --
3,213,241 UART: [cold-reset] --
3,214,361 UART: [state] Locking Datavault
3,215,418 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,022 UART: [state] Locking ICCM
3,216,484 UART: [exit] Launching FMC @ 0x40000130
3,221,814 UART:
3,221,830 UART: Running Caliptra FMC ...
3,222,238 UART:
3,222,292 UART: [state] CFI Enabled
3,232,980 UART: [fht] FMC Alias Private Key: 7
3,351,262 UART: [art] Extend RT PCRs Done
3,351,690 UART: [art] Lock RT PCRs Done
3,353,164 UART: [art] Populate DV Done
3,361,271 UART: [fht] FMC Alias Private Key: 7
3,362,297 UART: [art] Derive CDI
3,362,577 UART: [art] Store in slot 0x4
3,448,453 UART: [art] Derive Key Pair
3,448,813 UART: [art] Store priv key in slot 0x5
3,461,740 UART: [art] Derive Key Pair - Done
3,476,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,938 UART: [art] PUB.X = 1B19510B27D563D33B12CB92AF1EDD55040279D7A0D4457DDAD14034FFC383E09375C850D078D258794183CF7982B05D
3,499,697 UART: [art] PUB.Y = 1C6DB950D1262FE6AF084E947E1CA990A5F573E1B32BCE59DB3DEBF2A86E98E384451856CC77B1BFD7E80758A62F410A
3,506,652 UART: [art] SIG.R = 742B9220974ABBC03CC9F837222FAF682AD1F1BFEAC10A9C600A5FF01E61060AF10FDD204FE1FEB475B9CAA63299D902
3,513,422 UART: [art] SIG.S = 660F1C027D13E0DAB60569A8E88B24C54CA53259F478C682FAE9AE28D0831E1A85F48DDE7A3B5AFDE54BAA730DAEB095
3,537,056 UART: Caliptra RT
3,537,307 UART: [state] CFI Enabled
3,657,712 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,658,382 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,400 UART: [rt]cmd =0x41544d4e, len=14344
4,091,169 >>> mbox cmd response data (8 bytes)
4,091,170 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,259 UART: [rt]cmd =0x41545348, len=116
4,142,098 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,705 ready_for_fw is high
1,362,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,340 >>> mbox cmd response: success
3,042,699 UART:
3,042,715 UART: Running Caliptra FMC ...
3,043,123 UART:
3,043,177 UART: [state] CFI Enabled
3,053,389 UART: [fht] FMC Alias Private Key: 7
3,172,105 UART: [art] Extend RT PCRs Done
3,172,533 UART: [art] Lock RT PCRs Done
3,174,049 UART: [art] Populate DV Done
3,182,236 UART: [fht] FMC Alias Private Key: 7
3,183,302 UART: [art] Derive CDI
3,183,582 UART: [art] Store in slot 0x4
3,269,568 UART: [art] Derive Key Pair
3,269,928 UART: [art] Store priv key in slot 0x5
3,282,821 UART: [art] Derive Key Pair - Done
3,297,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,195 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,960 UART: [art] PUB.X = 564CAEEA99C5C4C0F23840EEA91A0454EAA6A6B9AF1C3C08D70158E46265B4F5B7FAED8CED508D4E61008C7B64F45707
3,320,712 UART: [art] PUB.Y = 47289967BDF1AB016384C5D8FC6BDA07622B52E76F1F6D59DF162BD94980D7D20888C188617EB43FFF6C5476201C7FEE
3,327,659 UART: [art] SIG.R = 26FC2A8BBA373E4E2ADB59258F81618EB916AEBDECA5D4C53694778B4F0541904D60C4723F18157C4C985BF33355BF6C
3,334,434 UART: [art] SIG.S = CF29599937B20D86F8A7F0A0C5DB2A5EE47D5F130619CF0B2DF6F1A187214303F3657150C2A00C9A0EC701AC86BB4C44
3,358,279 UART: Caliptra RT
3,358,530 UART: [state] CFI Enabled
3,479,016 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,479,686 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,712 UART: [rt]cmd =0x41544d4e, len=14344
3,912,349 >>> mbox cmd response data (8 bytes)
3,912,350 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,751 UART: [rt]cmd =0x41545348, len=116
3,963,874 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,783 UART: [state] LifecycleState = Unprovisioned
86,438 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,726 UART: [kat] SHA2-256
882,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,772 UART: [kat] ++
886,924 UART: [kat] sha1
891,084 UART: [kat] SHA2-256
893,022 UART: [kat] SHA2-384
895,841 UART: [kat] SHA2-512-ACC
897,742 UART: [kat] ECC-384
903,433 UART: [kat] HMAC-384Kdf
908,015 UART: [kat] LMS
1,476,211 UART: [kat] --
1,477,054 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,349 UART: [idev] ++
1,480,517 UART: [idev] CDI.KEYID = 6
1,480,877 UART: [idev] SUBJECT.KEYID = 7
1,481,301 UART: [idev] UDS.KEYID = 0
1,481,646 ready_for_fw is high
1,481,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,503 UART: [idev] Erasing UDS.KEYID = 0
1,506,423 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,065 UART: [idev] --
1,516,128 UART: [ldev] ++
1,516,296 UART: [ldev] CDI.KEYID = 6
1,516,659 UART: [ldev] SUBJECT.KEYID = 5
1,517,085 UART: [ldev] AUTHORITY.KEYID = 7
1,517,548 UART: [ldev] FE.KEYID = 1
1,522,730 UART: [ldev] Erasing FE.KEYID = 1
1,548,287 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,859 UART: [ldev] --
1,587,372 UART: [fwproc] Waiting for Commands...
1,588,233 UART: [fwproc] Received command 0x46574c44
1,589,024 UART: [fwproc] Received Image of size 118548 bytes
2,934,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,500 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,718 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,001 >>> mbox cmd response: success
3,133,249 UART: [afmc] ++
3,133,417 UART: [afmc] CDI.KEYID = 6
3,133,779 UART: [afmc] SUBJECT.KEYID = 7
3,134,204 UART: [afmc] AUTHORITY.KEYID = 5
3,169,423 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,286 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,169 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,852 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,772 UART: [afmc] --
3,212,892 UART: [cold-reset] --
3,213,866 UART: [state] Locking Datavault
3,214,775 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,379 UART: [state] Locking ICCM
3,215,989 UART: [exit] Launching FMC @ 0x40000130
3,221,319 UART:
3,221,335 UART: Running Caliptra FMC ...
3,221,743 UART:
3,221,886 UART: [state] CFI Enabled
3,232,134 UART: [fht] FMC Alias Private Key: 7
3,351,180 UART: [art] Extend RT PCRs Done
3,351,608 UART: [art] Lock RT PCRs Done
3,353,162 UART: [art] Populate DV Done
3,361,117 UART: [fht] FMC Alias Private Key: 7
3,362,217 UART: [art] Derive CDI
3,362,497 UART: [art] Store in slot 0x4
3,448,137 UART: [art] Derive Key Pair
3,448,497 UART: [art] Store priv key in slot 0x5
3,461,672 UART: [art] Derive Key Pair - Done
3,476,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,827 UART: [art] PUB.X = B6A2148F782C483C249A71233D399BAC9273B620126C8E877C8FCDF42589587BB951B1961F01424DC81F03F7343D3B63
3,499,585 UART: [art] PUB.Y = 0A3421580978270A6DDD283F40C83B081896408129A9892E980CEB1AC0B805156CF7B5D5F979F122EEDC2353C2AC4564
3,506,513 UART: [art] SIG.R = E2877AE02B5681A1A906FC9D265743013BBCF01B0DB713745E25D0825082F170A56116627CB633DC5C1FB9438448DDA7
3,513,272 UART: [art] SIG.S = 9CA333EC217ED694523AF775B9AD262A302736CFE0EA8348AEB9BF7116E805BF2887CF6C3C296E838CD8A0827069629B
3,536,519 UART: Caliptra RT
3,536,862 UART: [state] CFI Enabled
3,657,203 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,657,873 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,607 UART: [rt]cmd =0x41544d4e, len=14344
4,090,610 >>> mbox cmd response data (8 bytes)
4,090,611 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,570 UART: [rt]cmd =0x41545348, len=116
4,141,629 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 ready_for_fw is high
1,363,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,379 >>> mbox cmd response: success
3,043,746 UART:
3,043,762 UART: Running Caliptra FMC ...
3,044,170 UART:
3,044,313 UART: [state] CFI Enabled
3,054,689 UART: [fht] FMC Alias Private Key: 7
3,173,467 UART: [art] Extend RT PCRs Done
3,173,895 UART: [art] Lock RT PCRs Done
3,175,503 UART: [art] Populate DV Done
3,183,782 UART: [fht] FMC Alias Private Key: 7
3,184,872 UART: [art] Derive CDI
3,185,152 UART: [art] Store in slot 0x4
3,270,788 UART: [art] Derive Key Pair
3,271,148 UART: [art] Store priv key in slot 0x5
3,284,955 UART: [art] Derive Key Pair - Done
3,299,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,333 UART: [art] PUB.X = 3BA2F1E201986C3DCB50EA967B9F95F5837F34DF27B2BC124A3E08C8B0822AF7B237D9C842C254748859E49A20736A2C
3,322,101 UART: [art] PUB.Y = C76FF69CB9975DCDFB58BC89702D4974BBF91D594B44975CD8649DE2CE4684ED60D18D65CC8274AC942F96E1E5738E7F
3,329,063 UART: [art] SIG.R = E1184F57F8AFFCFCE127C2636F42EA6FEF4CBD62C1DAA77E17CFC2D033F2556F97FAE2787D4E7EA99C4CDCE48368DCAA
3,335,865 UART: [art] SIG.S = 3BBF1C82C11673CF3BF68608154E851D13C69068683DE6EBD487BA226231F5119372991A439F5585A104ED6D00F96770
3,360,179 UART: Caliptra RT
3,360,522 UART: [state] CFI Enabled
3,479,840 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,480,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,420 UART: [rt]cmd =0x41544d4e, len=14344
3,912,929 >>> mbox cmd response data (8 bytes)
3,912,930 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,165 UART: [rt]cmd =0x41545348, len=116
3,964,826 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
891,374 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,478 UART: [kat] ++
895,630 UART: [kat] sha1
899,846 UART: [kat] SHA2-256
901,786 UART: [kat] SHA2-384
904,693 UART: [kat] SHA2-512-ACC
906,594 UART: [kat] ECC-384
916,345 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,152 UART: [cold-reset] ++
1,170,578 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,174,608 ready_for_fw is high
1,174,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,207 UART: [idev] --
1,209,318 UART: [ldev] ++
1,209,486 UART: [ldev] CDI.KEYID = 6
1,209,850 UART: [ldev] SUBJECT.KEYID = 5
1,210,277 UART: [ldev] AUTHORITY.KEYID = 7
1,210,740 UART: [ldev] FE.KEYID = 1
1,216,022 UART: [ldev] Erasing FE.KEYID = 1
1,242,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,888 UART: [ldev] --
1,281,223 UART: [fwproc] Wait for Commands...
1,281,908 UART: [fwproc] Recv command 0x46574c44
1,282,641 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,427 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,987 >>> mbox cmd response: success
2,827,117 UART: [afmc] ++
2,827,285 UART: [afmc] CDI.KEYID = 6
2,827,648 UART: [afmc] SUBJECT.KEYID = 7
2,828,074 UART: [afmc] AUTHORITY.KEYID = 5
2,863,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,293 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,884 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,200 UART: [afmc] --
2,906,209 UART: [cold-reset] --
2,907,117 UART: [state] Locking Datavault
2,908,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,866 UART: [state] Locking ICCM
2,909,296 UART: [exit] Launching FMC @ 0x40000130
2,914,626 UART:
2,914,642 UART: Running Caliptra FMC ...
2,915,050 UART:
2,915,104 UART: [state] CFI Enabled
2,925,716 UART: [fht] FMC Alias Private Key: 7
3,044,698 UART: [art] Extend RT PCRs Done
3,045,126 UART: [art] Lock RT PCRs Done
3,046,790 UART: [art] Populate DV Done
3,055,087 UART: [fht] FMC Alias Private Key: 7
3,056,063 UART: [art] Derive CDI
3,056,343 UART: [art] Store in slot 0x4
3,142,382 UART: [art] Derive Key Pair
3,142,742 UART: [art] Store priv key in slot 0x5
3,156,022 UART: [art] Derive Key Pair - Done
3,170,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,862 UART: [art] PUB.X = 236AB4D1AFA06640454451250088CC4C7B988104384A6288D7C05C095EE24A55AAD45D65125B7D621023696733EF914C
3,193,594 UART: [art] PUB.Y = B80B24CFADE454A990178FB930E8DB3AF01C9C52EFF2B0CF541BD77AFC85676D2BF9C812C71FED5720178039A01AEBC2
3,200,561 UART: [art] SIG.R = 3F8BE58FF63D1440D73388709A290ADAFCDD55CEE0BB0CD052E8C967FD7469F57D4885A08CDC2AE2F5014F456220C1A6
3,207,336 UART: [art] SIG.S = B0571609C5D20FAFED5E6963188E6E26007AD24EA7F1D7F0043A659A86ABE83B61FDD6CFA694622E5DBA63792B89AD98
3,230,857 UART: Caliptra RT
3,231,108 UART: [state] CFI Enabled
3,351,067 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,351,737 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,823 UART: [rt]cmd =0x41544d4e, len=14344
3,784,180 >>> mbox cmd response data (8 bytes)
3,784,181 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,106 UART: [rt]cmd =0x41545348, len=116
3,834,817 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,130 ready_for_fw is high
1,059,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,372 >>> mbox cmd response: success
2,740,009 UART:
2,740,025 UART: Running Caliptra FMC ...
2,740,433 UART:
2,740,487 UART: [state] CFI Enabled
2,751,017 UART: [fht] FMC Alias Private Key: 7
2,870,669 UART: [art] Extend RT PCRs Done
2,871,097 UART: [art] Lock RT PCRs Done
2,872,553 UART: [art] Populate DV Done
2,880,824 UART: [fht] FMC Alias Private Key: 7
2,881,764 UART: [art] Derive CDI
2,882,044 UART: [art] Store in slot 0x4
2,967,935 UART: [art] Derive Key Pair
2,968,295 UART: [art] Store priv key in slot 0x5
2,981,687 UART: [art] Derive Key Pair - Done
2,996,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,730 UART: [art] PUB.X = 74CB0A93689EF6B08E66B3B6B3BFC8954A1C467A1FF8899E363BE39A5DE3EAA1B738922F07F6D0ABAC8310E0BF5A038B
3,019,509 UART: [art] PUB.Y = 7F26BEE25B64F4918C17B62C72796E4779CE28321282678537D5B716C7F8E153492F175A82C337A894112182EC7B0ED6
3,026,446 UART: [art] SIG.R = CBFC04E9F25BC91FF424561B69B35DEDB3C2FEB670B2F7F52E75C5A791FD882B969E02B6710228681B399ECB929A829F
3,033,219 UART: [art] SIG.S = F6BA5D81A05A407C8C310C32D9030ACE5C2D750B6218942E3DCAFDE202675240E7D60ECA6BE96D6B01FA03A370E92484
3,057,183 UART: Caliptra RT
3,057,434 UART: [state] CFI Enabled
3,176,854 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,177,524 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,468 UART: [rt]cmd =0x41544d4e, len=14344
3,610,433 >>> mbox cmd response data (8 bytes)
3,610,434 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,697 UART: [rt]cmd =0x41545348, len=116
3,663,086 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
891,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,347 UART: [kat] ++
895,499 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
916,200 UART: [kat] HMAC-384Kdf
920,628 UART: [kat] LMS
1,168,940 UART: [kat] --
1,169,619 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 ready_for_fw is high
1,174,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,714 UART: [idev] Erasing UDS.KEYID = 0
1,198,748 UART: [idev] Sha1 KeyId Algorithm
1,207,678 UART: [idev] --
1,208,809 UART: [ldev] ++
1,208,977 UART: [ldev] CDI.KEYID = 6
1,209,341 UART: [ldev] SUBJECT.KEYID = 5
1,209,768 UART: [ldev] AUTHORITY.KEYID = 7
1,210,231 UART: [ldev] FE.KEYID = 1
1,215,113 UART: [ldev] Erasing FE.KEYID = 1
1,241,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,900 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,727 UART: [ldev] --
1,281,018 UART: [fwproc] Wait for Commands...
1,281,809 UART: [fwproc] Recv command 0x46574c44
1,282,542 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,312 >>> mbox cmd response: success
2,827,462 UART: [afmc] ++
2,827,630 UART: [afmc] CDI.KEYID = 6
2,827,993 UART: [afmc] SUBJECT.KEYID = 7
2,828,419 UART: [afmc] AUTHORITY.KEYID = 5
2,863,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,324 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,205 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,906 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,635 UART: [afmc] --
2,906,654 UART: [cold-reset] --
2,907,578 UART: [state] Locking Datavault
2,908,737 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,341 UART: [state] Locking ICCM
2,909,797 UART: [exit] Launching FMC @ 0x40000130
2,915,127 UART:
2,915,143 UART: Running Caliptra FMC ...
2,915,551 UART:
2,915,694 UART: [state] CFI Enabled
2,925,826 UART: [fht] FMC Alias Private Key: 7
3,045,032 UART: [art] Extend RT PCRs Done
3,045,460 UART: [art] Lock RT PCRs Done
3,046,972 UART: [art] Populate DV Done
3,055,123 UART: [fht] FMC Alias Private Key: 7
3,056,247 UART: [art] Derive CDI
3,056,527 UART: [art] Store in slot 0x4
3,142,710 UART: [art] Derive Key Pair
3,143,070 UART: [art] Store priv key in slot 0x5
3,156,302 UART: [art] Derive Key Pair - Done
3,171,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,420 UART: [art] PUB.X = E8617F5B8392EA2D001B2439849F043DABA3DECBD6157A6FDD743A455EE1553037465F52375C120181D02DA5FBB519CA
3,194,168 UART: [art] PUB.Y = 2433A564FA4E7525BE8F29D075EE612F0DAA707DE3E43E3F751EA02E99E893B6E6AC86005C639E46C3A9EA86577E3542
3,201,099 UART: [art] SIG.R = 73A2E0E612CDF402387D321DDB3481599DFEA44D0961839CFA36E87CC09C420F36807933B5775C12FE41B36B03D04DF8
3,207,859 UART: [art] SIG.S = 1754CF4A7E504FD279885D349A76D26C455BFDFCD79182B3AC0FC96A7F848C618E7E73855F11C2BECB51CAD05B2E5EB5
3,231,960 UART: Caliptra RT
3,232,303 UART: [state] CFI Enabled
3,352,983 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,353,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,445 UART: [rt]cmd =0x41544d4e, len=14344
3,786,024 >>> mbox cmd response data (8 bytes)
3,786,025 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,226 UART: [rt]cmd =0x41545348, len=116
3,837,793 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 ready_for_fw is high
1,059,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,053 >>> mbox cmd response: success
2,742,496 UART:
2,742,512 UART: Running Caliptra FMC ...
2,742,920 UART:
2,743,063 UART: [state] CFI Enabled
2,754,177 UART: [fht] FMC Alias Private Key: 7
2,873,239 UART: [art] Extend RT PCRs Done
2,873,667 UART: [art] Lock RT PCRs Done
2,875,237 UART: [art] Populate DV Done
2,883,152 UART: [fht] FMC Alias Private Key: 7
2,884,312 UART: [art] Derive CDI
2,884,592 UART: [art] Store in slot 0x4
2,970,221 UART: [art] Derive Key Pair
2,970,581 UART: [art] Store priv key in slot 0x5
2,983,975 UART: [art] Derive Key Pair - Done
2,998,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,923 UART: [art] PUB.X = 5F94E1ADDED2BEE30B8FB7423210F7C05FB5ECB9A712B979A22C8FA9DC50AAE7822BE7E34974B6838473039BDF1C505B
3,021,705 UART: [art] PUB.Y = 247B6C5026508022FCB8F811B5ADA04616895DA27700E5AD747E6B41F8C2B7ED922744D2B79274D691A4BEE8968429F9
3,028,631 UART: [art] SIG.R = D1AF43C0A3762451C46B6812ABC5F08F9473DD6671709DFEBA5DDA04D5BFB73BBA0C47218D81F482C3A9E96A068EB3AB
3,035,410 UART: [art] SIG.S = 9DFFD317F3678D3E1A8BB9765210F0EB14FD9308C89ADBBEEEB7DF7B97924F514CCC2EF01F4975CDD78F033A123528E7
3,058,602 UART: Caliptra RT
3,058,945 UART: [state] CFI Enabled
3,178,835 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,505 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,393 UART: [rt]cmd =0x41544d4e, len=14344
3,611,794 >>> mbox cmd response data (8 bytes)
3,611,795 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,988 UART: [rt]cmd =0x41545348, len=116
3,663,817 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
893,628 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,753 UART: [kat] ++
897,905 UART: [kat] sha1
902,355 UART: [kat] SHA2-256
904,295 UART: [kat] SHA2-384
907,036 UART: [kat] SHA2-512-ACC
908,937 UART: [kat] ECC-384
918,688 UART: [kat] HMAC-384Kdf
923,462 UART: [kat] LMS
1,171,790 UART: [kat] --
1,172,637 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,844 UART: [idev] ++
1,176,012 UART: [idev] CDI.KEYID = 6
1,176,372 UART: [idev] SUBJECT.KEYID = 7
1,176,796 UART: [idev] UDS.KEYID = 0
1,177,141 ready_for_fw is high
1,177,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,810 UART: [idev] Erasing UDS.KEYID = 0
1,201,461 UART: [idev] Sha1 KeyId Algorithm
1,209,715 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,613 UART: [ldev] Erasing FE.KEYID = 1
1,243,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,763 UART: [ldev] --
1,283,058 UART: [fwproc] Wait for Commands...
1,283,640 UART: [fwproc] Recv command 0x46574c44
1,284,368 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,692 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,011 >>> mbox cmd response: success
2,828,107 UART: [afmc] ++
2,828,275 UART: [afmc] CDI.KEYID = 6
2,828,637 UART: [afmc] SUBJECT.KEYID = 7
2,829,062 UART: [afmc] AUTHORITY.KEYID = 5
2,864,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,943 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,325 UART: [afmc] --
2,908,305 UART: [cold-reset] --
2,908,939 UART: [state] Locking Datavault
2,910,224 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,828 UART: [state] Locking ICCM
2,911,494 UART: [exit] Launching FMC @ 0x40000130
2,916,824 UART:
2,916,840 UART: Running Caliptra FMC ...
2,917,248 UART:
2,917,302 UART: [state] CFI Enabled
2,928,414 UART: [fht] FMC Alias Private Key: 7
3,047,018 UART: [art] Extend RT PCRs Done
3,047,446 UART: [art] Lock RT PCRs Done
3,048,972 UART: [art] Populate DV Done
3,057,167 UART: [fht] FMC Alias Private Key: 7
3,058,197 UART: [art] Derive CDI
3,058,477 UART: [art] Store in slot 0x4
3,144,582 UART: [art] Derive Key Pair
3,144,942 UART: [art] Store priv key in slot 0x5
3,158,094 UART: [art] Derive Key Pair - Done
3,172,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,926 UART: [art] PUB.X = CBE618FD9E34466E45523CC77614B6D21A5C8423C28545E45DAEAE8E7C926CA028DC32387C482AA0BB1C660C2C0F0FA4
3,195,699 UART: [art] PUB.Y = CD8FBE28C8C3D3C87FF5340A848E3FEDCD58B5255CC7C4DC0525C2735B95AA6FCFAE6271C08E8F81A1261A6D5459D70E
3,202,660 UART: [art] SIG.R = 89AF0DFF8066A1B69C6F6FAC76FB25C9196214083CE2B9F24D01DC39991711EF0DE7D9373B32C95B769E3DA0D4811C9C
3,209,428 UART: [art] SIG.S = 92CDC6BB96A63B27C31D154EADAF0E0F96867E45FA8EA2FA8795FE6CCDF36E716C4D6BE2D7EA643260580801EFB0A3B8
3,233,512 UART: Caliptra RT
3,233,763 UART: [state] CFI Enabled
3,353,705 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,354,375 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,459 UART: [rt]cmd =0x41544d4e, len=14344
3,786,948 >>> mbox cmd response data (8 bytes)
3,786,949 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,008 UART: [rt]cmd =0x41545348, len=116
3,837,833 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,107 ready_for_fw is high
1,059,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,828 >>> mbox cmd response: success
2,741,281 UART:
2,741,297 UART: Running Caliptra FMC ...
2,741,705 UART:
2,741,759 UART: [state] CFI Enabled
2,752,391 UART: [fht] FMC Alias Private Key: 7
2,871,641 UART: [art] Extend RT PCRs Done
2,872,069 UART: [art] Lock RT PCRs Done
2,873,771 UART: [art] Populate DV Done
2,882,024 UART: [fht] FMC Alias Private Key: 7
2,883,144 UART: [art] Derive CDI
2,883,424 UART: [art] Store in slot 0x4
2,969,451 UART: [art] Derive Key Pair
2,969,811 UART: [art] Store priv key in slot 0x5
2,983,169 UART: [art] Derive Key Pair - Done
2,998,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,143 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,908 UART: [art] PUB.X = 7DABCD6CF5E36EDC7201BF0405380582307E9C432F297D6074DC917DAE26C7151560BB2BD0D418F3F8DE18343CF1B5BB
3,020,678 UART: [art] PUB.Y = 05B942E7228F1E7B2E89DF869C3959037FCA466E7230EA391E2CEFAA5F3E19BCB2855ECBEED9283FBCE3358722A715E4
3,027,636 UART: [art] SIG.R = E4DEF73A8C0B546850E342629AA1D98E15A553F9A50DDFE900DCCE739057843AB34EC8A3EAC56CF6F6753D2428BCEB70
3,034,394 UART: [art] SIG.S = F3FAE3681CDF6317F35BE560C4C2A047E7B818ACF7A6881A2180AB90B937CC22E65028E308098CB615099CC190DC03B4
3,057,956 UART: Caliptra RT
3,058,207 UART: [state] CFI Enabled
3,179,511 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,180,181 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,499 UART: [rt]cmd =0x41544d4e, len=14344
3,612,538 >>> mbox cmd response data (8 bytes)
3,612,539 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,456 UART: [rt]cmd =0x41545348, len=116
3,664,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,889 UART: [state] LifecycleState = Unprovisioned
86,544 UART: [state] DebugLocked = No
87,072 UART: [state] WD Timer not started. Device not locked for debugging
88,431 UART: [kat] SHA2-256
894,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,206 UART: [kat] ++
898,358 UART: [kat] sha1
902,800 UART: [kat] SHA2-256
904,740 UART: [kat] SHA2-384
907,515 UART: [kat] SHA2-512-ACC
909,416 UART: [kat] ECC-384
919,345 UART: [kat] HMAC-384Kdf
924,007 UART: [kat] LMS
1,172,335 UART: [kat] --
1,172,954 UART: [cold-reset] ++
1,173,404 UART: [fht] FHT @ 0x50003400
1,175,863 UART: [idev] ++
1,176,031 UART: [idev] CDI.KEYID = 6
1,176,391 UART: [idev] SUBJECT.KEYID = 7
1,176,815 UART: [idev] UDS.KEYID = 0
1,177,160 ready_for_fw is high
1,177,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,765 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,910 UART: [idev] --
1,211,094 UART: [ldev] ++
1,211,262 UART: [ldev] CDI.KEYID = 6
1,211,625 UART: [ldev] SUBJECT.KEYID = 5
1,212,051 UART: [ldev] AUTHORITY.KEYID = 7
1,212,514 UART: [ldev] FE.KEYID = 1
1,217,564 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,618 UART: [ldev] --
1,282,983 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,971 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,390 >>> mbox cmd response: success
2,829,422 UART: [afmc] ++
2,829,590 UART: [afmc] CDI.KEYID = 6
2,829,952 UART: [afmc] SUBJECT.KEYID = 7
2,830,377 UART: [afmc] AUTHORITY.KEYID = 5
2,865,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,618 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,202 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,044 UART: [afmc] --
2,909,158 UART: [cold-reset] --
2,910,208 UART: [state] Locking Datavault
2,911,593 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,197 UART: [state] Locking ICCM
2,912,675 UART: [exit] Launching FMC @ 0x40000130
2,918,005 UART:
2,918,021 UART: Running Caliptra FMC ...
2,918,429 UART:
2,918,572 UART: [state] CFI Enabled
2,929,390 UART: [fht] FMC Alias Private Key: 7
3,047,968 UART: [art] Extend RT PCRs Done
3,048,396 UART: [art] Lock RT PCRs Done
3,049,826 UART: [art] Populate DV Done
3,058,129 UART: [fht] FMC Alias Private Key: 7
3,059,297 UART: [art] Derive CDI
3,059,577 UART: [art] Store in slot 0x4
3,145,108 UART: [art] Derive Key Pair
3,145,468 UART: [art] Store priv key in slot 0x5
3,158,230 UART: [art] Derive Key Pair - Done
3,172,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,055 UART: [art] PUB.X = 3EC930ABE4BB28536EAE985CAA5F730FAAD1DF5EB083AE78F8075D24DE233306801091FC2C9B8B6C5F7E612CE7A4A39D
3,195,836 UART: [art] PUB.Y = 2175C30D2DAA661E313AFC277E7EA7A194AD65244700B2BA7ACEF790D08E37B5EE7645DFDD4E1D247CE725D3DDFF33CB
3,202,783 UART: [art] SIG.R = CE50B34A94711414B716E5E00EF8F3BD5EC6BF6232C77CF7B876CB217041AD54D19D2771AA608083A79CAFC2D619CE7B
3,209,562 UART: [art] SIG.S = 82DDDCBB7DEA17658F70ECE884D3A38578043E96E0B78446990335D060F15DA18BCD3D8B7DB68507098B25CC5DC1EBC4
3,233,770 UART: Caliptra RT
3,234,113 UART: [state] CFI Enabled
3,354,857 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,355,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,563 UART: [rt]cmd =0x41544d4e, len=14344
3,788,422 >>> mbox cmd response data (8 bytes)
3,788,423 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,534 UART: [rt]cmd =0x41545348, len=116
3,840,483 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,302 ready_for_fw is high
1,060,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,287 >>> mbox cmd response: success
2,740,778 UART:
2,740,794 UART: Running Caliptra FMC ...
2,741,202 UART:
2,741,345 UART: [state] CFI Enabled
2,751,629 UART: [fht] FMC Alias Private Key: 7
2,871,241 UART: [art] Extend RT PCRs Done
2,871,669 UART: [art] Lock RT PCRs Done
2,873,099 UART: [art] Populate DV Done
2,881,234 UART: [fht] FMC Alias Private Key: 7
2,882,346 UART: [art] Derive CDI
2,882,626 UART: [art] Store in slot 0x4
2,968,201 UART: [art] Derive Key Pair
2,968,561 UART: [art] Store priv key in slot 0x5
2,982,301 UART: [art] Derive Key Pair - Done
2,997,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,517 UART: [art] PUB.X = 1DEA04BFECC29A1E433A7081D5CE096748A2F4C0DCAC86E69247BB2B6A2F8197EF0C038ADB1EE417549E75051FED0B60
3,020,287 UART: [art] PUB.Y = 732387F73492BEFBC00D3D13B324C380B8E1FACC43FFAAB784B3A66102479990DFEAF912F7AC652CD4E7F34CF1200EBD
3,027,246 UART: [art] SIG.R = 2782A5D9E50E77DB3FB2413F57E8637E57E844B81A51516689212BD8A4387908FF64D4C5F38D20B41E5FA417CF13D4AA
3,034,012 UART: [art] SIG.S = D099027512225AB548D04B582E94900439474BBD26154EB9DA8BE252E7AF23555FA693C2B9C0D856E0ACD4B3CF7497AE
3,057,872 UART: Caliptra RT
3,058,215 UART: [state] CFI Enabled
3,178,492 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,179,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,302,032 UART: [rt]cmd =0x41544d4e, len=14344
3,611,703 >>> mbox cmd response data (8 bytes)
3,611,704 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,641,637 UART: [rt]cmd =0x41545348, len=116
3,662,966 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_cmd_success_skip_auth ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,238 UART:
192,600 UART: Running Caliptra ROM ...
193,814 UART:
193,971 UART: [state] CFI Enabled
263,100 UART: [state] LifecycleState = Unprovisioned
265,092 UART: [state] DebugLocked = No
267,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,731 UART: [kat] SHA2-256
441,445 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,984 UART: [kat] ++
452,464 UART: [kat] sha1
463,770 UART: [kat] SHA2-256
466,430 UART: [kat] SHA2-384
473,557 UART: [kat] SHA2-512-ACC
475,925 UART: [kat] ECC-384
2,766,381 UART: [kat] HMAC-384Kdf
2,800,503 UART: [kat] LMS
3,990,803 UART: [kat] --
3,995,657 UART: [cold-reset] ++
3,998,243 UART: [fht] Storing FHT @ 0x50003400
4,008,622 UART: [idev] ++
4,009,201 UART: [idev] CDI.KEYID = 6
4,010,117 UART: [idev] SUBJECT.KEYID = 7
4,011,364 UART: [idev] UDS.KEYID = 0
4,012,351 ready_for_fw is high
4,012,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,654 UART: [idev] Erasing UDS.KEYID = 0
7,347,672 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,691 UART: [idev] --
7,371,580 UART: [ldev] ++
7,372,158 UART: [ldev] CDI.KEYID = 6
7,373,125 UART: [ldev] SUBJECT.KEYID = 5
7,374,284 UART: [ldev] AUTHORITY.KEYID = 7
7,375,570 UART: [ldev] FE.KEYID = 1
7,422,827 UART: [ldev] Erasing FE.KEYID = 1
10,759,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,483 UART: [ldev] --
13,136,007 UART: [fwproc] Waiting for Commands...
13,138,055 UART: [fwproc] Received command 0x46574c44
13,140,240 UART: [fwproc] Received Image of size 118548 bytes
17,240,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,074 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,249 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,459 >>> mbox cmd response: success
17,730,677 UART: [afmc] ++
17,731,295 UART: [afmc] CDI.KEYID = 6
17,732,207 UART: [afmc] SUBJECT.KEYID = 7
17,733,423 UART: [afmc] AUTHORITY.KEYID = 5
21,093,320 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,187 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,935 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,424 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,144 UART: [afmc] --
23,461,251 UART: [cold-reset] --
23,464,415 UART: [state] Locking Datavault
23,467,390 UART: [state] Locking PCR0, PCR1 and PCR31
23,469,144 UART: [state] Locking ICCM
23,471,863 UART: [exit] Launching FMC @ 0x40000130
23,480,257 UART:
23,480,486 UART: Running Caliptra FMC ...
23,481,587 UART:
23,481,751 UART: [state] CFI Enabled
23,553,090 UART: [fht] FMC Alias Private Key: 7
25,893,786 UART: [art] Extend RT PCRs Done
25,895,012 UART: [art] Lock RT PCRs Done
25,896,465 UART: [art] Populate DV Done
25,902,057 UART: [fht] FMC Alias Private Key: 7
25,903,599 UART: [art] Derive CDI
25,904,335 UART: [art] Store in slot 0x4
25,961,223 UART: [art] Derive Key Pair
25,962,267 UART: [art] Store priv key in slot 0x5
29,255,265 UART: [art] Derive Key Pair - Done
29,268,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,922 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,431 UART: [art] PUB.X = 36686AC2D37A462F7D988FB944E1EA8AC902D179046782A4CE994AFFA608C0BD8A0E52158D447274EA769FFF92A2CBDD
31,565,729 UART: [art] PUB.Y = 9A82EC47A87B09E65643E311162985885A2AF567A902B0EAC1A7A525848BCED0A33D20A7CD70DA68D9A27D0B7505C926
31,573,006 UART: [art] SIG.R = 24D820AD1E2AB5151059C659AB4C9624D1656E1D33446BF24B9F6DF08AB1EED71E40E150C8205812139FF65C168C8E47
31,580,412 UART: [art] SIG.S = 990CAF9F5BEC5B91D8745EBAD0A5B666667FA8C10F0E28CA609ED26044DB9275F34C67CFB94FAD789F1A8F51B8FB6382
32,885,248 UART: Caliptra RT
32,885,948 UART: [state] CFI Enabled
33,063,105 UART: [rt] RT listening for mailbox commands...
33,065,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,220,888 UART: [rt]cmd =0x41544d4e, len=14344
38,521,273 >>> mbox cmd response data (8 bytes)
38,521,880 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,552,511 UART: [rt]cmd =0x41545348, len=116
38,572,168 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,807,939 ready_for_fw is high
3,808,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,980,942 >>> mbox cmd response: success
23,672,964 UART:
23,673,354 UART: Running Caliptra FMC ...
23,674,511 UART:
23,674,671 UART: [state] CFI Enabled
23,742,775 UART: [fht] FMC Alias Private Key: 7
26,083,027 UART: [art] Extend RT PCRs Done
26,084,262 UART: [art] Lock RT PCRs Done
26,085,889 UART: [art] Populate DV Done
26,091,352 UART: [fht] FMC Alias Private Key: 7
26,093,057 UART: [art] Derive CDI
26,093,877 UART: [art] Store in slot 0x4
26,151,688 UART: [art] Derive Key Pair
26,152,730 UART: [art] Store priv key in slot 0x5
29,445,532 UART: [art] Derive Key Pair - Done
29,458,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,964 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,471 UART: [art] PUB.X = DE4E9972A909AF310C115684D88563020DF098602CA65412785FB9153A0F8ABC93EB0A3602027ECE85E899E9787C948F
31,755,722 UART: [art] PUB.Y = 29B609F2805A5935E2544E351FC0672889AEC03D5CA1505363BF5C962107E2BDD0D1704262A06FCB5AB5E14EB0752A11
31,762,928 UART: [art] SIG.R = 7AF05A43D23FBD35EE05BE706125AD6810E799776D310E837405C11BC95108712A3AF2B93D57894D5BC95A7C7BB3ED27
31,770,328 UART: [art] SIG.S = 7011375CF21561EB9B061CADB3D5C60A231103DA6E9EE393204725DBFE16B50EE68DEB8E56FB4582ECD93A68CDBADABE
33,075,726 UART: Caliptra RT
33,076,426 UART: [state] CFI Enabled
33,252,448 UART: [rt] RT listening for mailbox commands...
33,254,980 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,410,390 UART: [rt]cmd =0x41544d4e, len=14344
38,711,291 >>> mbox cmd response data (8 bytes)
38,711,997 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,742,849 UART: [rt]cmd =0x41545348, len=116
38,763,544 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,348 UART:
192,723 UART: Running Caliptra ROM ...
193,830 UART:
603,548 UART: [state] CFI Enabled
616,945 UART: [state] LifecycleState = Unprovisioned
618,877 UART: [state] DebugLocked = No
620,252 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,678 UART: [kat] SHA2-256
794,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,962 UART: [kat] ++
805,489 UART: [kat] sha1
816,249 UART: [kat] SHA2-256
818,942 UART: [kat] SHA2-384
825,074 UART: [kat] SHA2-512-ACC
827,446 UART: [kat] ECC-384
3,111,408 UART: [kat] HMAC-384Kdf
3,123,475 UART: [kat] LMS
4,313,575 UART: [kat] --
4,318,427 UART: [cold-reset] ++
4,320,775 UART: [fht] Storing FHT @ 0x50003400
4,332,100 UART: [idev] ++
4,332,660 UART: [idev] CDI.KEYID = 6
4,333,605 UART: [idev] SUBJECT.KEYID = 7
4,334,837 UART: [idev] UDS.KEYID = 0
4,335,959 ready_for_fw is high
4,336,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,313 UART: [idev] Erasing UDS.KEYID = 0
7,618,098 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,572 UART: [idev] --
7,645,219 UART: [ldev] ++
7,645,786 UART: [ldev] CDI.KEYID = 6
7,646,749 UART: [ldev] SUBJECT.KEYID = 5
7,647,953 UART: [ldev] AUTHORITY.KEYID = 7
7,649,232 UART: [ldev] FE.KEYID = 1
7,658,496 UART: [ldev] Erasing FE.KEYID = 1
10,945,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,766 UART: [ldev] --
13,303,987 UART: [fwproc] Waiting for Commands...
13,306,357 UART: [fwproc] Received command 0x46574c44
13,308,553 UART: [fwproc] Received Image of size 118548 bytes
17,414,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,873 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,034 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,054 >>> mbox cmd response: success
17,897,553 UART: [afmc] ++
17,898,169 UART: [afmc] CDI.KEYID = 6
17,899,078 UART: [afmc] SUBJECT.KEYID = 7
17,900,348 UART: [afmc] AUTHORITY.KEYID = 5
21,213,824 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,504,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,521,561 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,536,254 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,550,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,571,680 UART: [afmc] --
23,575,556 UART: [cold-reset] --
23,580,339 UART: [state] Locking Datavault
23,584,933 UART: [state] Locking PCR0, PCR1 and PCR31
23,586,687 UART: [state] Locking ICCM
23,588,162 UART: [exit] Launching FMC @ 0x40000130
23,596,551 UART:
23,596,779 UART: Running Caliptra FMC ...
23,597,874 UART:
23,598,044 UART: [state] CFI Enabled
23,605,770 UART: [fht] FMC Alias Private Key: 7
25,946,198 UART: [art] Extend RT PCRs Done
25,947,417 UART: [art] Lock RT PCRs Done
25,949,038 UART: [art] Populate DV Done
25,954,394 UART: [fht] FMC Alias Private Key: 7
25,956,044 UART: [art] Derive CDI
25,956,780 UART: [art] Store in slot 0x4
25,999,330 UART: [art] Derive Key Pair
26,000,327 UART: [art] Store priv key in slot 0x5
29,242,380 UART: [art] Derive Key Pair - Done
29,255,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,637 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,145 UART: [art] PUB.X = 2B04CF47329D80EDCBE376040E13D1316E4D639CE7FB3BF184851C843542CA524E4F9DDC7C6EB577FB7621F4F64EAC74
31,544,380 UART: [art] PUB.Y = 2AFCD3F7992C500B277F9470DC7974296CC0B33EC18E877922192438B48CB02D6E86B6CE8E6B347834B69F3E1FCE6471
31,551,657 UART: [art] SIG.R = E413BD2924D9260EEE0C1937EE65EAAAADA956EB5C9D9DBE2E97926852922758578EFF13E486C4D08635054DCC8449E9
31,559,037 UART: [art] SIG.S = E99B851F28741EDF537AB3186C47C201327B1FB4AA8895A60281AC74FA02380F471AAD3863BC8A0574A0C0B17A8A6EF0
32,864,300 UART: Caliptra RT
32,864,987 UART: [state] CFI Enabled
32,998,198 UART: [rt] RT listening for mailbox commands...
33,000,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,155,897 UART: [rt]cmd =0x41544d4e, len=14344
38,456,158 >>> mbox cmd response data (8 bytes)
38,456,768 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,487,237 UART: [rt]cmd =0x41545348, len=116
38,506,296 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
4,131,585 ready_for_fw is high
4,132,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,295 >>> mbox cmd response: success
23,794,076 UART:
23,794,481 UART: Running Caliptra FMC ...
23,795,623 UART:
23,795,777 UART: [state] CFI Enabled
23,803,768 UART: [fht] FMC Alias Private Key: 7
26,143,494 UART: [art] Extend RT PCRs Done
26,144,884 UART: [art] Lock RT PCRs Done
26,146,442 UART: [art] Populate DV Done
26,151,818 UART: [fht] FMC Alias Private Key: 7
26,153,378 UART: [art] Derive CDI
26,154,195 UART: [art] Store in slot 0x4
26,196,796 UART: [art] Derive Key Pair
26,197,837 UART: [art] Store priv key in slot 0x5
29,440,609 UART: [art] Derive Key Pair - Done
29,453,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,133 UART: [art] PUB.X = C250484C61ABE3F2F7F2CBAE121A4B5928E356A14769C775D04831F127E2513DA10FA6693342A67CF20AE5519701B7EE
31,743,010 UART: [art] PUB.Y = C91BE1FD46DFB8C2F9FBFA1F9CE0CD829BADB7F9A600F54984609EF06C454BB3C35E9B5662FB914B47E7B8AE78118E7B
31,750,276 UART: [art] SIG.R = 4FF8A3F2C79A9273927C381F180865F7FADC803EA233AAA06D5FADB3FD3B23BA897C86EBB6A348D4C19C17D7CC4AE471
31,757,671 UART: [art] SIG.S = 3038C1AA556FD936980BF71808EE1AE09A3A947552B56E13B65476FF2A7FFD2C9E16FE81A2F2E6733DA7F5596CAD632B
33,062,943 UART: Caliptra RT
33,063,665 UART: [state] CFI Enabled
33,196,714 UART: [rt] RT listening for mailbox commands...
33,199,121 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,354,557 UART: [rt]cmd =0x41544d4e, len=14344
38,655,279 >>> mbox cmd response data (8 bytes)
38,655,886 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,686,790 UART: [rt]cmd =0x41545348, len=116
38,707,228 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,226 UART:
192,573 UART: Running Caliptra ROM ...
193,799 UART:
193,959 UART: [state] CFI Enabled
263,865 UART: [state] LifecycleState = Unprovisioned
265,848 UART: [state] DebugLocked = No
267,943 UART: [state] WD Timer not started. Device not locked for debugging
272,534 UART: [kat] SHA2-256
452,149 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,960 UART: [kat] ++
463,441 UART: [kat] sha1
474,571 UART: [kat] SHA2-256
477,232 UART: [kat] SHA2-384
483,520 UART: [kat] SHA2-512-ACC
485,885 UART: [kat] ECC-384
2,947,654 UART: [kat] HMAC-384Kdf
2,969,345 UART: [kat] LMS
3,445,832 UART: [kat] --
3,449,489 UART: [cold-reset] ++
3,451,915 UART: [fht] FHT @ 0x50003400
3,463,097 UART: [idev] ++
3,463,658 UART: [idev] CDI.KEYID = 6
3,464,686 UART: [idev] SUBJECT.KEYID = 7
3,465,860 UART: [idev] UDS.KEYID = 0
3,466,784 ready_for_fw is high
3,466,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,135 UART: [idev] Erasing UDS.KEYID = 0
5,983,338 UART: [idev] Sha1 KeyId Algorithm
6,006,541 UART: [idev] --
6,012,901 UART: [ldev] ++
6,013,485 UART: [ldev] CDI.KEYID = 6
6,014,449 UART: [ldev] SUBJECT.KEYID = 5
6,015,606 UART: [ldev] AUTHORITY.KEYID = 7
6,016,889 UART: [ldev] FE.KEYID = 1
6,056,275 UART: [ldev] Erasing FE.KEYID = 1
8,563,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,573 UART: [ldev] --
10,371,478 UART: [fwproc] Wait for Commands...
10,373,788 UART: [fwproc] Recv command 0x46574c44
10,375,765 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,066 >>> mbox cmd response: success
14,343,262 UART: [afmc] ++
14,343,849 UART: [afmc] CDI.KEYID = 6
14,344,831 UART: [afmc] SUBJECT.KEYID = 7
14,345,997 UART: [afmc] AUTHORITY.KEYID = 5
16,893,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,824 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,914 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,466 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,999 UART: [afmc] --
18,715,329 UART: [cold-reset] --
18,719,849 UART: [state] Locking Datavault
18,726,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,574 UART: [state] Locking ICCM
18,729,910 UART: [exit] Launching FMC @ 0x40000130
18,738,304 UART:
18,738,549 UART: Running Caliptra FMC ...
18,739,666 UART:
18,739,825 UART: [state] CFI Enabled
18,793,274 UART: [fht] FMC Alias Private Key: 7
20,580,640 UART: [art] Extend RT PCRs Done
20,581,866 UART: [art] Lock RT PCRs Done
20,583,030 UART: [art] Populate DV Done
20,588,498 UART: [fht] FMC Alias Private Key: 7
20,590,030 UART: [art] Derive CDI
20,590,845 UART: [art] Store in slot 0x4
20,647,769 UART: [art] Derive Key Pair
20,648,810 UART: [art] Store priv key in slot 0x5
23,111,100 UART: [art] Derive Key Pair - Done
23,123,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,838,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,839,852 UART: [art] PUB.X = F1C14E4C2A917A4065DBAFE4B001ACBF1BCA52772E0585F8D98F4A63F1CFCB3FE83864618A64719F30F80E7B5C7D6AE8
24,847,158 UART: [art] PUB.Y = FC8E0F6B97B1BAB6E2C827BF1DCB65681D161353B4FD2DDA31041E7612BFAD45FB738C90B090DFB6CEAEAE90E3B4ADCD
24,854,459 UART: [art] SIG.R = 8DD85281CE4A63D219695B544132FE99388EED27750318D4896994C2AA3957240CE24366BB922BD610A949344F07DBD4
24,861,803 UART: [art] SIG.S = 68B37FF5F9E77D81E3D338BAE545FABA442D4441DC40FE04F47EC1E13F06C90A497B85C7E4D6E004BE3B54BB3EDB402B
25,840,483 UART: Caliptra RT
25,841,190 UART: [state] CFI Enabled
26,021,690 UART: [rt] RT listening for mailbox commands...
26,024,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,179,576 UART: [rt]cmd =0x41544d4e, len=14344
30,175,082 >>> mbox cmd response data (8 bytes)
30,175,686 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,206,142 UART: [rt]cmd =0x41545348, len=116
30,225,461 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,460,757 ready_for_fw is high
3,461,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,366 >>> mbox cmd response: success
18,535,518 UART:
18,535,923 UART: Running Caliptra FMC ...
18,537,119 UART:
18,537,282 UART: [state] CFI Enabled
18,604,886 UART: [fht] FMC Alias Private Key: 7
20,371,187 UART: [art] Extend RT PCRs Done
20,372,389 UART: [art] Lock RT PCRs Done
20,373,941 UART: [art] Populate DV Done
20,379,510 UART: [fht] FMC Alias Private Key: 7
20,381,156 UART: [art] Derive CDI
20,381,964 UART: [art] Store in slot 0x4
20,437,157 UART: [art] Derive Key Pair
20,438,153 UART: [art] Store priv key in slot 0x5
22,901,055 UART: [art] Derive Key Pair - Done
22,914,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,684 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,180 UART: [art] PUB.X = 3D2CAC10417BB4A58EEBB2E0E2F3651A692A4BED42920AE7609D8D420BF67984BDC53D53DCF26D965ACD70F5D6FFEFE7
24,636,505 UART: [art] PUB.Y = 6F04B5450DD44DFCC52FE77DCB8E11307D710697E4FF08DFABEC6D4D24D40B11EB19C0AE61E1BADDA37CA041888B8ED9
24,643,792 UART: [art] SIG.R = EB8631A0ED83B6B95F2D36E21EAA83B5A437C8CA4D48ED35A96243382F3DC4322F2775D0732BB02216F74E7C706B0151
24,651,193 UART: [art] SIG.S = BB98D42997955B4E084F9518130DEEEE79B9BDB0C1357F9F80291667982622B07764872C8F1008EFF295B54D7223F110
25,630,067 UART: Caliptra RT
25,630,778 UART: [state] CFI Enabled
25,811,228 UART: [rt] RT listening for mailbox commands...
25,813,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,969,082 UART: [rt]cmd =0x41544d4e, len=14344
29,964,534 >>> mbox cmd response data (8 bytes)
29,965,104 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,995,839 UART: [rt]cmd =0x41545348, len=116
30,016,440 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
192,556 UART:
192,912 UART: Running Caliptra ROM ...
194,029 UART:
603,625 UART: [state] CFI Enabled
619,278 UART: [state] LifecycleState = Unprovisioned
621,162 UART: [state] DebugLocked = No
623,267 UART: [state] WD Timer not started. Device not locked for debugging
627,567 UART: [kat] SHA2-256
807,236 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,030 UART: [kat] ++
818,485 UART: [kat] sha1
829,783 UART: [kat] SHA2-256
832,506 UART: [kat] SHA2-384
839,277 UART: [kat] SHA2-512-ACC
841,642 UART: [kat] ECC-384
3,285,361 UART: [kat] HMAC-384Kdf
3,298,252 UART: [kat] LMS
3,774,756 UART: [kat] --
3,778,435 UART: [cold-reset] ++
3,780,666 UART: [fht] FHT @ 0x50003400
3,790,793 UART: [idev] ++
3,791,359 UART: [idev] CDI.KEYID = 6
3,792,391 UART: [idev] SUBJECT.KEYID = 7
3,793,565 UART: [idev] UDS.KEYID = 0
3,794,649 ready_for_fw is high
3,794,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,703 UART: [idev] Erasing UDS.KEYID = 0
6,272,379 UART: [idev] Sha1 KeyId Algorithm
6,296,793 UART: [idev] --
6,300,680 UART: [ldev] ++
6,301,248 UART: [ldev] CDI.KEYID = 6
6,302,266 UART: [ldev] SUBJECT.KEYID = 5
6,303,393 UART: [ldev] AUTHORITY.KEYID = 7
6,304,785 UART: [ldev] FE.KEYID = 1
6,316,608 UART: [ldev] Erasing FE.KEYID = 1
8,798,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,435 UART: [ldev] --
10,592,162 UART: [fwproc] Wait for Commands...
10,595,124 UART: [fwproc] Recv command 0x46574c44
10,597,107 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,149 >>> mbox cmd response: success
14,557,956 UART: [afmc] ++
14,558,587 UART: [afmc] CDI.KEYID = 6
14,559,502 UART: [afmc] SUBJECT.KEYID = 7
14,560,725 UART: [afmc] AUTHORITY.KEYID = 5
17,066,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,590 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,450 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,046 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,727 UART: [afmc] --
18,869,673 UART: [cold-reset] --
18,873,597 UART: [state] Locking Datavault
18,879,549 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,313 UART: [state] Locking ICCM
18,882,707 UART: [exit] Launching FMC @ 0x40000130
18,891,127 UART:
18,891,365 UART: Running Caliptra FMC ...
18,892,467 UART:
18,892,626 UART: [state] CFI Enabled
18,900,567 UART: [fht] FMC Alias Private Key: 7
20,666,923 UART: [art] Extend RT PCRs Done
20,668,138 UART: [art] Lock RT PCRs Done
20,669,871 UART: [art] Populate DV Done
20,675,072 UART: [fht] FMC Alias Private Key: 7
20,676,621 UART: [art] Derive CDI
20,677,437 UART: [art] Store in slot 0x4
20,720,199 UART: [art] Derive Key Pair
20,721,233 UART: [art] Store priv key in slot 0x5
23,147,722 UART: [art] Derive Key Pair - Done
23,160,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,167 UART: [art] PUB.X = 0393063CB64D65B764A1B2063BF572F4A356552B777DC3775145DC136056976EEBF155DA82EE512013945A61D2B24A48
24,875,367 UART: [art] PUB.Y = 703CE342B0C9446A5E748FB1433C26738BAAF29B400CAD38A2C536FEB355A1E4FFFB3625BECB5ACA36FACA6096DDE280
24,882,655 UART: [art] SIG.R = 0C2E39575F07BC9961DDEBFC38CF4F65009B2E20D4766A96AFEFDB8B669F1F89E00E247EDF3F8BAC2F3185C3DBDB61F9
24,890,050 UART: [art] SIG.S = F2500C41AAC2064C8FAE60FEB937A4987D4D0C030300B6AF5DEA58780E5897D3E2259D0502F6FC1AF81DCEE4B457153A
25,869,229 UART: Caliptra RT
25,869,930 UART: [state] CFI Enabled
26,003,326 UART: [rt] RT listening for mailbox commands...
26,005,759 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,161,111 UART: [rt]cmd =0x41544d4e, len=14344
30,157,062 >>> mbox cmd response data (8 bytes)
30,157,644 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,188,417 UART: [rt]cmd =0x41545348, len=116
30,208,061 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,778,639 ready_for_fw is high
3,779,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,503 >>> mbox cmd response: success
18,692,266 UART:
18,692,653 UART: Running Caliptra FMC ...
18,693,777 UART:
18,693,932 UART: [state] CFI Enabled
18,701,669 UART: [fht] FMC Alias Private Key: 7
20,467,995 UART: [art] Extend RT PCRs Done
20,469,219 UART: [art] Lock RT PCRs Done
20,471,036 UART: [art] Populate DV Done
20,476,453 UART: [fht] FMC Alias Private Key: 7
20,478,050 UART: [art] Derive CDI
20,478,793 UART: [art] Store in slot 0x4
20,521,633 UART: [art] Derive Key Pair
20,522,678 UART: [art] Store priv key in slot 0x5
22,948,820 UART: [art] Derive Key Pair - Done
22,961,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,169 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,678 UART: [art] PUB.X = BC2D5995FA0212C1E69982FDF9D5B04D53C715DEF0739ED5A00797EA9D6650AE513CB5908178A27DCBB5A392C2C8147E
24,676,938 UART: [art] PUB.Y = B88FCED37DB7E983A0F7F477046C520EE55E8857B2774C7B2AA229455E2908893C62D8ACD48EAF1DF62AF694A8E82D6E
24,684,242 UART: [art] SIG.R = 864CB0B3AEB89484EC8FA341FED98A5E1640F3BFA9CF3AF9DCBD35F08CC1304C73D1DCE1A2737E157E6CC81B28A7F240
24,691,642 UART: [art] SIG.S = 5AF9ECC865AA25541D8346EA4982827448095EE926287C12599DD5B3F3674CC1D85BD4FEF2F9B6177D8CEC696172B7E1
25,670,587 UART: Caliptra RT
25,671,281 UART: [state] CFI Enabled
25,804,781 UART: [rt] RT listening for mailbox commands...
25,807,183 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,962,635 UART: [rt]cmd =0x41544d4e, len=14344
29,957,947 >>> mbox cmd response data (8 bytes)
29,958,546 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,989,082 UART: [rt]cmd =0x41545348, len=116
30,009,286 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,305 UART:
192,681 UART: Running Caliptra ROM ...
193,789 UART:
193,932 UART: [state] CFI Enabled
262,703 UART: [state] LifecycleState = Unprovisioned
265,126 UART: [state] DebugLocked = No
266,574 UART: [state] WD Timer not started. Device not locked for debugging
270,382 UART: [kat] SHA2-256
460,220 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,019 UART: [kat] ++
471,472 UART: [kat] sha1
482,767 UART: [kat] SHA2-256
485,802 UART: [kat] SHA2-384
492,205 UART: [kat] SHA2-512-ACC
494,802 UART: [kat] ECC-384
2,947,623 UART: [kat] HMAC-384Kdf
2,970,946 UART: [kat] LMS
3,502,745 UART: [kat] --
3,508,077 UART: [cold-reset] ++
3,510,007 UART: [fht] FHT @ 0x50003400
3,521,337 UART: [idev] ++
3,522,036 UART: [idev] CDI.KEYID = 6
3,523,015 UART: [idev] SUBJECT.KEYID = 7
3,524,351 UART: [idev] UDS.KEYID = 0
3,525,342 ready_for_fw is high
3,525,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,482 UART: [idev] Erasing UDS.KEYID = 0
6,030,469 UART: [idev] Sha1 KeyId Algorithm
6,052,303 UART: [idev] --
6,056,425 UART: [ldev] ++
6,057,108 UART: [ldev] CDI.KEYID = 6
6,058,127 UART: [ldev] SUBJECT.KEYID = 5
6,059,230 UART: [ldev] AUTHORITY.KEYID = 7
6,060,457 UART: [ldev] FE.KEYID = 1
6,099,764 UART: [ldev] Erasing FE.KEYID = 1
8,606,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,402 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,556 UART: [ldev] --
10,413,233 UART: [fwproc] Wait for Commands...
10,415,164 UART: [fwproc] Recv command 0x46574c44
10,417,411 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,268 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,122 >>> mbox cmd response: success
14,674,219 UART: [afmc] ++
14,674,941 UART: [afmc] CDI.KEYID = 6
14,676,051 UART: [afmc] SUBJECT.KEYID = 7
14,677,595 UART: [afmc] AUTHORITY.KEYID = 5
17,214,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,424 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,786 UART: [afmc] --
19,031,133 UART: [cold-reset] --
19,036,246 UART: [state] Locking Datavault
19,041,412 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,616 UART: [state] Locking ICCM
19,045,108 UART: [exit] Launching FMC @ 0x40000130
19,053,803 UART:
19,054,043 UART: Running Caliptra FMC ...
19,055,145 UART:
19,055,305 UART: [state] CFI Enabled
19,114,259 UART: [fht] FMC Alias Private Key: 7
20,880,414 UART: [art] Extend RT PCRs Done
20,881,611 UART: [art] Lock RT PCRs Done
20,883,337 UART: [art] Populate DV Done
20,888,751 UART: [fht] FMC Alias Private Key: 7
20,890,304 UART: [art] Derive CDI
20,891,038 UART: [art] Store in slot 0x4
20,946,774 UART: [art] Derive Key Pair
20,947,765 UART: [art] Store priv key in slot 0x5
23,410,765 UART: [art] Derive Key Pair - Done
23,423,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,281 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,792 UART: [art] PUB.X = 173227F2D77A31B3723326AA35E049EB515FA40D38119A705CB34769F922D267666E3A5CEC05BF2A133F1EE7969ADEFC
25,145,002 UART: [art] PUB.Y = 11A0CC40FF561F1BA372BA92326741B9B2EBB2B1A434F31670A28F23AF1F6CACDBA4AA7791BFECB73F8124F4185E6391
25,152,322 UART: [art] SIG.R = 29FEFB2AB497D4F5C7E0B9E774CDAA5C3469E50BD8DC68500BD3398FE92BB1EDF03C4F471817006C6EF00E11324D1DB1
25,159,726 UART: [art] SIG.S = B378F230F584975410FD637B7C9CC6622AE2BA0DFD079CFE784675AB1A024B46A37AC5C7A1EF536626CEE475BBE93227
26,138,540 UART: Caliptra RT
26,139,230 UART: [state] CFI Enabled
26,319,955 UART: [rt] RT listening for mailbox commands...
26,322,340 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,477,776 UART: [rt]cmd =0x41544d4e, len=14344
30,473,510 >>> mbox cmd response data (8 bytes)
30,474,127 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,504,759 UART: [rt]cmd =0x41545348, len=116
30,524,867 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,437,589 ready_for_fw is high
3,437,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,784 >>> mbox cmd response: success
19,107,547 UART:
19,107,941 UART: Running Caliptra FMC ...
19,109,041 UART:
19,109,195 UART: [state] CFI Enabled
19,177,873 UART: [fht] FMC Alias Private Key: 7
20,944,267 UART: [art] Extend RT PCRs Done
20,945,493 UART: [art] Lock RT PCRs Done
20,947,041 UART: [art] Populate DV Done
20,952,625 UART: [fht] FMC Alias Private Key: 7
20,954,109 UART: [art] Derive CDI
20,954,888 UART: [art] Store in slot 0x4
21,012,259 UART: [art] Derive Key Pair
21,013,295 UART: [art] Store priv key in slot 0x5
23,476,417 UART: [art] Derive Key Pair - Done
23,489,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,511 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,013 UART: [art] PUB.X = EE4DB6B187B2A2640E79255AAAD992F369D0E09EE00716F78852A3D425A95B03A6A99E4EF9A8A715EC5E738469F6EF0E
25,210,303 UART: [art] PUB.Y = AD86E5FFD1223B20079C892ECDDAFBBD3A44120AB2BEC3942C6EA9EAB483A39F4B14ACA658BC713DBF8721B88448F815
25,217,569 UART: [art] SIG.R = 12CA279674172130FFC245D5D26196FA7B5EB7E7BE9E78F6EA9EF86FD4BF28AC7735D1277148A03C8ACBC524AF6EDD04
25,225,025 UART: [art] SIG.S = 723CCFBB0D0F1C912C9DB3B5B9F01A509A793D47BBF3FFAF676A12FA80798DF8351CD708690B6EF386119F41146F72E0
26,204,197 UART: Caliptra RT
26,204,891 UART: [state] CFI Enabled
26,385,727 UART: [rt] RT listening for mailbox commands...
26,388,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,543,362 UART: [rt]cmd =0x41544d4e, len=14344
30,538,283 >>> mbox cmd response data (8 bytes)
30,539,454 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,570,056 UART: [rt]cmd =0x41545348, len=116
30,590,604 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,530 UART:
192,899 UART: Running Caliptra ROM ...
194,103 UART:
603,782 UART: [state] CFI Enabled
618,362 UART: [state] LifecycleState = Unprovisioned
620,736 UART: [state] DebugLocked = No
622,051 UART: [state] WD Timer not started. Device not locked for debugging
626,528 UART: [kat] SHA2-256
816,400 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,224 UART: [kat] ++
827,709 UART: [kat] sha1
839,936 UART: [kat] SHA2-256
842,954 UART: [kat] SHA2-384
849,306 UART: [kat] SHA2-512-ACC
851,841 UART: [kat] ECC-384
3,295,442 UART: [kat] HMAC-384Kdf
3,309,023 UART: [kat] LMS
3,840,789 UART: [kat] --
3,844,459 UART: [cold-reset] ++
3,845,900 UART: [fht] FHT @ 0x50003400
3,856,107 UART: [idev] ++
3,856,741 UART: [idev] CDI.KEYID = 6
3,857,697 UART: [idev] SUBJECT.KEYID = 7
3,858,949 UART: [idev] UDS.KEYID = 0
3,859,859 ready_for_fw is high
3,860,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,922 UART: [idev] Erasing UDS.KEYID = 0
6,335,582 UART: [idev] Sha1 KeyId Algorithm
6,358,975 UART: [idev] --
6,365,518 UART: [ldev] ++
6,366,215 UART: [ldev] CDI.KEYID = 6
6,367,185 UART: [ldev] SUBJECT.KEYID = 5
6,368,298 UART: [ldev] AUTHORITY.KEYID = 7
6,369,529 UART: [ldev] FE.KEYID = 1
6,380,241 UART: [ldev] Erasing FE.KEYID = 1
8,857,732 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,708 UART: [ldev] --
10,648,283 UART: [fwproc] Wait for Commands...
10,650,872 UART: [fwproc] Recv command 0x46574c44
10,653,185 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,852 >>> mbox cmd response: success
14,921,678 UART: [afmc] ++
14,922,408 UART: [afmc] CDI.KEYID = 6
14,923,525 UART: [afmc] SUBJECT.KEYID = 7
14,925,026 UART: [afmc] AUTHORITY.KEYID = 5
17,422,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,173 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,146 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,314 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,206 UART: [afmc] --
19,216,821 UART: [cold-reset] --
19,221,287 UART: [state] Locking Datavault
19,228,715 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,892 UART: [state] Locking ICCM
19,232,278 UART: [exit] Launching FMC @ 0x40000130
19,240,972 UART:
19,241,211 UART: Running Caliptra FMC ...
19,242,314 UART:
19,242,472 UART: [state] CFI Enabled
19,250,845 UART: [fht] FMC Alias Private Key: 7
21,017,118 UART: [art] Extend RT PCRs Done
21,018,346 UART: [art] Lock RT PCRs Done
21,019,929 UART: [art] Populate DV Done
21,025,295 UART: [fht] FMC Alias Private Key: 7
21,026,895 UART: [art] Derive CDI
21,027,640 UART: [art] Store in slot 0x4
21,070,677 UART: [art] Derive Key Pair
21,071,722 UART: [art] Store priv key in slot 0x5
23,499,234 UART: [art] Derive Key Pair - Done
23,512,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,075 UART: [art] PUB.X = 6170D498854A704A75D5852724F82C9052B4ACDF0A7C208B214B9B271734D7C7F2A66B3CD4ED47C6F7B3943504CCDE48
25,227,326 UART: [art] PUB.Y = AEB10DC4BE061AA07FDAC690B29FCD1889568E4B6E1A381F7AA143EA6E9F51502CAA5066465249ABE9D019586FDA0C65
25,234,589 UART: [art] SIG.R = C0F4B72030B85B928326D11B4EBBAB33F103C35AD89DDA501D7A18EDDA6072AD97308CB66E7D86E399F6C575E397C787
25,241,959 UART: [art] SIG.S = E7FD3C02831865ECAB792A217A46A92D4B5D82718E5C2059F404781073E7A1DC1F42B598305ABF0AD01D941302B0FDC7
26,221,381 UART: Caliptra RT
26,222,084 UART: [state] CFI Enabled
26,354,764 UART: [rt] RT listening for mailbox commands...
26,357,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,512,427 UART: [rt]cmd =0x41544d4e, len=14344
30,508,276 >>> mbox cmd response data (8 bytes)
30,508,882 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,539,716 UART: [rt]cmd =0x41545348, len=116
30,559,434 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
3,753,643 ready_for_fw is high
3,754,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,440 >>> mbox cmd response: success
19,289,829 UART:
19,290,218 UART: Running Caliptra FMC ...
19,291,438 UART:
19,291,611 UART: [state] CFI Enabled
19,299,759 UART: [fht] FMC Alias Private Key: 7
21,065,842 UART: [art] Extend RT PCRs Done
21,067,063 UART: [art] Lock RT PCRs Done
21,068,701 UART: [art] Populate DV Done
21,074,113 UART: [fht] FMC Alias Private Key: 7
21,075,833 UART: [art] Derive CDI
21,076,659 UART: [art] Store in slot 0x4
21,119,460 UART: [art] Derive Key Pair
21,120,502 UART: [art] Store priv key in slot 0x5
23,547,562 UART: [art] Derive Key Pair - Done
23,560,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,536 UART: [art] PUB.X = F5B23C98E3389E1FDE063E7D100259BF03969701056A2F069E75B747D3B10B5ABC231FC602F4D4D918157BA6E1D57CAE
25,275,805 UART: [art] PUB.Y = 68E586BE243FA7E223513E2C2EF1C3ACC3927395FB5899D1658BC37ED3A3E9CC2BBC100FB2E4B65748FFD54F4C6CA5BF
25,283,081 UART: [art] SIG.R = 904AAF409E76D5D49040137CDEBC163E48F50367A10FE6D809833D6840E344F1FCF9E773DB36DC9E7E13B4AE348622F6
25,290,513 UART: [art] SIG.S = 113C346C5AAB008EAC7004ADAA3AD4C54E1B4ABB67B74677D6EA392FBF64007BE36465A2F6737AE83CDB8B0EA00F7997
26,269,650 UART: Caliptra RT
26,270,364 UART: [state] CFI Enabled
26,402,832 UART: [rt] RT listening for mailbox commands...
26,405,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,560,576 UART: [rt]cmd =0x41544d4e, len=14344
30,556,085 >>> mbox cmd response data (8 bytes)
30,557,228 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,588,165 UART: [rt]cmd =0x41545348, len=116
30,609,459 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,481 UART: [kat] SHA2-256
881,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,527 UART: [kat] ++
885,679 UART: [kat] sha1
890,063 UART: [kat] SHA2-256
892,001 UART: [kat] SHA2-384
894,650 UART: [kat] SHA2-512-ACC
896,551 UART: [kat] ECC-384
902,480 UART: [kat] HMAC-384Kdf
906,992 UART: [kat] LMS
1,475,188 UART: [kat] --
1,476,217 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,518 UART: [idev] ++
1,479,686 UART: [idev] CDI.KEYID = 6
1,480,046 UART: [idev] SUBJECT.KEYID = 7
1,480,470 UART: [idev] UDS.KEYID = 0
1,480,815 ready_for_fw is high
1,480,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,198 UART: [idev] Erasing UDS.KEYID = 0
1,504,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,118 UART: [idev] --
1,514,205 UART: [ldev] ++
1,514,373 UART: [ldev] CDI.KEYID = 6
1,514,736 UART: [ldev] SUBJECT.KEYID = 5
1,515,162 UART: [ldev] AUTHORITY.KEYID = 7
1,515,625 UART: [ldev] FE.KEYID = 1
1,520,797 UART: [ldev] Erasing FE.KEYID = 1
1,546,042 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,818 UART: [ldev] --
1,585,271 UART: [fwproc] Waiting for Commands...
1,586,040 UART: [fwproc] Received command 0x46574c44
1,586,831 UART: [fwproc] Received Image of size 118548 bytes
2,932,341 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,971 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,189 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,606 >>> mbox cmd response: success
3,131,826 UART: [afmc] ++
3,131,994 UART: [afmc] CDI.KEYID = 6
3,132,356 UART: [afmc] SUBJECT.KEYID = 7
3,132,781 UART: [afmc] AUTHORITY.KEYID = 5
3,167,914 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,112 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,795 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,567 UART: [afmc] --
3,210,631 UART: [cold-reset] --
3,211,523 UART: [state] Locking Datavault
3,212,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,132 UART: [state] Locking ICCM
3,213,608 UART: [exit] Launching FMC @ 0x40000130
3,218,938 UART:
3,218,954 UART: Running Caliptra FMC ...
3,219,362 UART:
3,219,416 UART: [state] CFI Enabled
3,229,752 UART: [fht] FMC Alias Private Key: 7
3,349,138 UART: [art] Extend RT PCRs Done
3,349,566 UART: [art] Lock RT PCRs Done
3,351,340 UART: [art] Populate DV Done
3,359,767 UART: [fht] FMC Alias Private Key: 7
3,360,731 UART: [art] Derive CDI
3,361,011 UART: [art] Store in slot 0x4
3,446,825 UART: [art] Derive Key Pair
3,447,185 UART: [art] Store priv key in slot 0x5
3,460,060 UART: [art] Derive Key Pair - Done
3,474,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,952 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,717 UART: [art] PUB.X = 0CFBCD6A90EFDEA83B0CF6450C466EFD9D1CE75D5BA2BCD8F46E9DED360F817E18910C04D0359C4F6159A63F5B14D89C
3,497,493 UART: [art] PUB.Y = FF35F7845E83FDEF4C7CFDBE1069B56483EA796B7E7206330F3EFC144B5421F117CECABF1A7818C780B3AB74267AD7CB
3,504,455 UART: [art] SIG.R = DA74448B406C3AD8A585A76526462253191CD9A9A1AB711E0C6076A9EFD35F9B7704D847F03FF3DE443FC0C601FB24CD
3,511,224 UART: [art] SIG.S = A4B6636E2DB54BE926B9AAB764CB5A6DFA72ED0BF66012911641EBE8A824E1837536737E0A37945DAAE58572BCC93B10
3,534,590 UART: Caliptra RT
3,534,841 UART: [state] CFI Enabled
3,655,152 UART: [rt] RT listening for mailbox commands...
3,655,822 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,676 UART: [rt]cmd =0x41544d4e, len=14344
4,089,046 >>> mbox cmd response data (8 bytes)
4,089,047 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,202 UART: [rt]cmd =0x41545348, len=116
4,141,505 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,511 ready_for_fw is high
1,362,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,708 >>> mbox cmd response: success
3,042,859 UART:
3,042,875 UART: Running Caliptra FMC ...
3,043,283 UART:
3,043,337 UART: [state] CFI Enabled
3,053,989 UART: [fht] FMC Alias Private Key: 7
3,173,275 UART: [art] Extend RT PCRs Done
3,173,703 UART: [art] Lock RT PCRs Done
3,175,511 UART: [art] Populate DV Done
3,183,924 UART: [fht] FMC Alias Private Key: 7
3,184,900 UART: [art] Derive CDI
3,185,180 UART: [art] Store in slot 0x4
3,270,746 UART: [art] Derive Key Pair
3,271,106 UART: [art] Store priv key in slot 0x5
3,284,445 UART: [art] Derive Key Pair - Done
3,299,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,028 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,793 UART: [art] PUB.X = 04D56016D987AF2D275608376E9727ECFAC4BE025C2818AB5D8B14C61C3E4C57B17486EC3F3B114F80F6D0FF5EF24D21
3,322,562 UART: [art] PUB.Y = 82FD0E6512FEE7521D6FD85B4B39B486B3F740C3683F0AAFFCEDB046FEF071175D50467448AB8D3465ADE506E7819316
3,329,511 UART: [art] SIG.R = D540F26C71D1CAAE6A8FECA2BF3B94BB67FE8BDCC3BA09BD53A6A96C3F80CC7FAE9CCD7EE48C25A22CFFE33BB1E50402
3,336,312 UART: [art] SIG.S = EC1E6768FABAAE2E0C31098F8FF6C339DABF1F628FCF8367D2136A6AE79F8B52F44498B703E8F392DDD77B0D8B031C47
3,359,853 UART: Caliptra RT
3,360,104 UART: [state] CFI Enabled
3,479,895 UART: [rt] RT listening for mailbox commands...
3,480,565 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,549 UART: [rt]cmd =0x41544d4e, len=14344
3,913,675 >>> mbox cmd response data (8 bytes)
3,913,676 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,057 UART: [rt]cmd =0x41545348, len=116
3,966,152 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,970 UART: [kat] SHA2-256
892,908 UART: [kat] SHA2-384
895,733 UART: [kat] SHA2-512-ACC
897,634 UART: [kat] ECC-384
903,445 UART: [kat] HMAC-384Kdf
908,087 UART: [kat] LMS
1,476,283 UART: [kat] --
1,477,006 UART: [cold-reset] ++
1,477,370 UART: [fht] Storing FHT @ 0x50003400
1,480,249 UART: [idev] ++
1,480,417 UART: [idev] CDI.KEYID = 6
1,480,777 UART: [idev] SUBJECT.KEYID = 7
1,481,201 UART: [idev] UDS.KEYID = 0
1,481,546 ready_for_fw is high
1,481,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,221 UART: [idev] Erasing UDS.KEYID = 0
1,506,317 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,043 UART: [idev] --
1,515,992 UART: [ldev] ++
1,516,160 UART: [ldev] CDI.KEYID = 6
1,516,523 UART: [ldev] SUBJECT.KEYID = 5
1,516,949 UART: [ldev] AUTHORITY.KEYID = 7
1,517,412 UART: [ldev] FE.KEYID = 1
1,522,988 UART: [ldev] Erasing FE.KEYID = 1
1,548,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,339 UART: [ldev] --
1,587,854 UART: [fwproc] Waiting for Commands...
1,588,713 UART: [fwproc] Received command 0x46574c44
1,589,504 UART: [fwproc] Received Image of size 118548 bytes
2,934,404 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,295 >>> mbox cmd response: success
3,134,389 UART: [afmc] ++
3,134,557 UART: [afmc] CDI.KEYID = 6
3,134,919 UART: [afmc] SUBJECT.KEYID = 7
3,135,344 UART: [afmc] AUTHORITY.KEYID = 5
3,170,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,779 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,559 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,268 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,151 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,834 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,792 UART: [afmc] --
3,213,858 UART: [cold-reset] --
3,214,726 UART: [state] Locking Datavault
3,215,899 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,503 UART: [state] Locking ICCM
3,217,037 UART: [exit] Launching FMC @ 0x40000130
3,222,367 UART:
3,222,383 UART: Running Caliptra FMC ...
3,222,791 UART:
3,222,934 UART: [state] CFI Enabled
3,233,506 UART: [fht] FMC Alias Private Key: 7
3,352,544 UART: [art] Extend RT PCRs Done
3,352,972 UART: [art] Lock RT PCRs Done
3,354,496 UART: [art] Populate DV Done
3,362,671 UART: [fht] FMC Alias Private Key: 7
3,363,757 UART: [art] Derive CDI
3,364,037 UART: [art] Store in slot 0x4
3,449,715 UART: [art] Derive Key Pair
3,450,075 UART: [art] Store priv key in slot 0x5
3,462,924 UART: [art] Derive Key Pair - Done
3,477,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,086 UART: [art] PUB.X = A5810432B18A1B0E731D24997471E54E4FA492479FC7CCFE46CEC38995EB829B795D8EA383D43282553C6BD7D2C3232E
3,500,852 UART: [art] PUB.Y = 39CA448F41EABB384625C5A252A94AD013414EE2ED150E793EF7BC19C0EFDA233CB9F383816749CD83201BA751946BC7
3,507,807 UART: [art] SIG.R = A7F65F173847765E6E6A1071C11ADD54C135A98C4B50A61E8E2C47E91D8CE55AF57EE10D6112A4F5DEB3D0E553B3FD3F
3,514,588 UART: [art] SIG.S = 3226D025B23D03B8D64850F76CD7D089A28FCE3B9B45F23CD38FECF26CA466CA4DA770E7EECFAD6A7C3DB48EC91BED15
3,538,713 UART: Caliptra RT
3,539,056 UART: [state] CFI Enabled
3,659,714 UART: [rt] RT listening for mailbox commands...
3,660,384 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,554 UART: [rt]cmd =0x41544d4e, len=14344
4,093,118 >>> mbox cmd response data (8 bytes)
4,093,119 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,008 UART: [rt]cmd =0x41545348, len=116
4,145,489 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,644 ready_for_fw is high
1,361,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,053 >>> mbox cmd response: success
3,041,902 UART:
3,041,918 UART: Running Caliptra FMC ...
3,042,326 UART:
3,042,469 UART: [state] CFI Enabled
3,052,633 UART: [fht] FMC Alias Private Key: 7
3,171,517 UART: [art] Extend RT PCRs Done
3,171,945 UART: [art] Lock RT PCRs Done
3,173,445 UART: [art] Populate DV Done
3,181,428 UART: [fht] FMC Alias Private Key: 7
3,182,462 UART: [art] Derive CDI
3,182,742 UART: [art] Store in slot 0x4
3,268,630 UART: [art] Derive Key Pair
3,268,990 UART: [art] Store priv key in slot 0x5
3,281,861 UART: [art] Derive Key Pair - Done
3,296,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,434 UART: [art] PUB.X = 0737BCA628FD06992AED7545D74F13A1A5806D7B8075F023A3A395C1EBADD15DEF430DCBEC16544BE5C48411569CE004
3,319,202 UART: [art] PUB.Y = 67EDA39CC3F2E3E628226681B090F277642A0512D9EA257FD3A6CD266B2EC8197F292596D6E85B5A9A820BC44E0B4E1F
3,326,149 UART: [art] SIG.R = 2C65C72D9BFCF1D99C869BD2B8F933E1E4B0745B9AA9704A02E4843D14BA66A51A37103A89FDE58204B1FC9CDCEA6230
3,332,927 UART: [art] SIG.S = 5BAC8EF034B1FACFBBE215B37C78704957EF77CC6E5F53A7700BE59D3B911DE2CDC624B44B93C32FEA897C29DDAB189B
3,356,298 UART: Caliptra RT
3,356,641 UART: [state] CFI Enabled
3,476,478 UART: [rt] RT listening for mailbox commands...
3,477,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,278 UART: [rt]cmd =0x41544d4e, len=14344
3,910,630 >>> mbox cmd response data (8 bytes)
3,910,631 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,628 UART: [rt]cmd =0x41545348, len=116
3,962,173 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,562 UART: [state] LifecycleState = Unprovisioned
85,217 UART: [state] DebugLocked = No
85,935 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,254 UART: [kat] SHA2-256
901,194 UART: [kat] SHA2-384
903,927 UART: [kat] SHA2-512-ACC
905,828 UART: [kat] ECC-384
915,647 UART: [kat] HMAC-384Kdf
920,335 UART: [kat] LMS
1,168,647 UART: [kat] --
1,169,334 UART: [cold-reset] ++
1,169,782 UART: [fht] FHT @ 0x50003400
1,172,582 UART: [idev] ++
1,172,750 UART: [idev] CDI.KEYID = 6
1,173,111 UART: [idev] SUBJECT.KEYID = 7
1,173,536 UART: [idev] UDS.KEYID = 0
1,173,882 ready_for_fw is high
1,173,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,419 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,629 UART: [idev] --
1,208,634 UART: [ldev] ++
1,208,802 UART: [ldev] CDI.KEYID = 6
1,209,166 UART: [ldev] SUBJECT.KEYID = 5
1,209,593 UART: [ldev] AUTHORITY.KEYID = 7
1,210,056 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,509 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,804 UART: [ldev] --
1,280,027 UART: [fwproc] Wait for Commands...
1,280,652 UART: [fwproc] Recv command 0x46574c44
1,281,385 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,027 >>> mbox cmd response: success
2,825,243 UART: [afmc] ++
2,825,411 UART: [afmc] CDI.KEYID = 6
2,825,774 UART: [afmc] SUBJECT.KEYID = 7
2,826,200 UART: [afmc] AUTHORITY.KEYID = 5
2,862,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,139 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,274 UART: [afmc] --
2,905,273 UART: [cold-reset] --
2,905,997 UART: [state] Locking Datavault
2,907,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,666 UART: [state] Locking ICCM
2,908,134 UART: [exit] Launching FMC @ 0x40000130
2,913,464 UART:
2,913,480 UART: Running Caliptra FMC ...
2,913,888 UART:
2,913,942 UART: [state] CFI Enabled
2,924,186 UART: [fht] FMC Alias Private Key: 7
3,042,872 UART: [art] Extend RT PCRs Done
3,043,300 UART: [art] Lock RT PCRs Done
3,044,792 UART: [art] Populate DV Done
3,052,915 UART: [fht] FMC Alias Private Key: 7
3,053,927 UART: [art] Derive CDI
3,054,207 UART: [art] Store in slot 0x4
3,140,402 UART: [art] Derive Key Pair
3,140,762 UART: [art] Store priv key in slot 0x5
3,154,058 UART: [art] Derive Key Pair - Done
3,169,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,380 UART: [art] PUB.X = 07399DCEB44D0972768F35ADC5F4CF66C896B913360FDADFB1CA251A6EBECE4169B20D778E9EF2F169797D441EBDE09F
3,192,156 UART: [art] PUB.Y = CAA3179DEFFA026BEEA025E09C78EF21ED19903527AC63061E405484E708078BA82D78E6301CF6D82377C4A1DB4773D9
3,199,100 UART: [art] SIG.R = 3B53B1F8B9572A9A55D1FE28681A9C4B8BACC60D29690F5D03560DF53DE79D2603A7D2C87B4594CC9F382C18300738FD
3,205,858 UART: [art] SIG.S = 19F88DA3C5D1875BE697359C9DA39184F7E6B18DC61D383FEC8540DBA8592A214F32C8B075D087E5C9EA274ACDE1D30A
3,230,407 UART: Caliptra RT
3,230,658 UART: [state] CFI Enabled
3,349,942 UART: [rt] RT listening for mailbox commands...
3,350,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,356 UART: [rt]cmd =0x41544d4e, len=14344
3,783,286 >>> mbox cmd response data (8 bytes)
3,783,287 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,572 UART: [rt]cmd =0x41545348, len=116
3,835,449 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,976 ready_for_fw is high
1,059,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,600 >>> mbox cmd response: success
2,741,483 UART:
2,741,499 UART: Running Caliptra FMC ...
2,741,907 UART:
2,741,961 UART: [state] CFI Enabled
2,752,493 UART: [fht] FMC Alias Private Key: 7
2,871,183 UART: [art] Extend RT PCRs Done
2,871,611 UART: [art] Lock RT PCRs Done
2,873,243 UART: [art] Populate DV Done
2,881,340 UART: [fht] FMC Alias Private Key: 7
2,882,318 UART: [art] Derive CDI
2,882,598 UART: [art] Store in slot 0x4
2,968,413 UART: [art] Derive Key Pair
2,968,773 UART: [art] Store priv key in slot 0x5
2,981,687 UART: [art] Derive Key Pair - Done
2,996,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,449 UART: [art] PUB.X = CC5C9B5CB80B33CDDE3FC7CF14B8CD18B069665D8F5D15036D5F4CD31246A474D4006D3BCC03BB2F9E1166DD2DE2E24D
3,019,210 UART: [art] PUB.Y = 339E1BA93008C2D7065CA49CDF15C0D5338BD6EAB19788963A93DB96D619155DCC88F4BE1F22EF2E9B64CAFD9DBA157E
3,026,172 UART: [art] SIG.R = ED9F68C6499C55F85A178AFF99AB28703916C05C27F2D60A681ED268CBA031726F1ACB7499BF4DDC1934DA09A8E04CB0
3,032,948 UART: [art] SIG.S = 7AA42F0B135C694E37A2AD93506E95D74A10CB4E2DE768B47F41EA88524111A3ADBA332AE401CB791EFC201F617402DB
3,057,193 UART: Caliptra RT
3,057,444 UART: [state] CFI Enabled
3,177,115 UART: [rt] RT listening for mailbox commands...
3,177,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,737 UART: [rt]cmd =0x41544d4e, len=14344
3,610,425 >>> mbox cmd response data (8 bytes)
3,610,426 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,217 UART: [rt]cmd =0x41545348, len=116
3,662,730 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,768 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,485 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,561 UART: [idev] ++
1,173,729 UART: [idev] CDI.KEYID = 6
1,174,090 UART: [idev] SUBJECT.KEYID = 7
1,174,515 UART: [idev] UDS.KEYID = 0
1,174,861 ready_for_fw is high
1,174,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,624 UART: [idev] Erasing UDS.KEYID = 0
1,199,750 UART: [idev] Sha1 KeyId Algorithm
1,208,440 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,389 UART: [ldev] Erasing FE.KEYID = 1
1,242,748 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,417 UART: [ldev] --
1,281,820 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,558 >>> mbox cmd response: success
2,828,648 UART: [afmc] ++
2,828,816 UART: [afmc] CDI.KEYID = 6
2,829,179 UART: [afmc] SUBJECT.KEYID = 7
2,829,605 UART: [afmc] AUTHORITY.KEYID = 5
2,864,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,733 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,482 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,073 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,774 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,531 UART: [afmc] --
2,907,372 UART: [cold-reset] --
2,908,082 UART: [state] Locking Datavault
2,909,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,859 UART: [state] Locking ICCM
2,910,399 UART: [exit] Launching FMC @ 0x40000130
2,915,729 UART:
2,915,745 UART: Running Caliptra FMC ...
2,916,153 UART:
2,916,296 UART: [state] CFI Enabled
2,926,696 UART: [fht] FMC Alias Private Key: 7
3,045,504 UART: [art] Extend RT PCRs Done
3,045,932 UART: [art] Lock RT PCRs Done
3,047,522 UART: [art] Populate DV Done
3,055,941 UART: [fht] FMC Alias Private Key: 7
3,057,009 UART: [art] Derive CDI
3,057,289 UART: [art] Store in slot 0x4
3,142,944 UART: [art] Derive Key Pair
3,143,304 UART: [art] Store priv key in slot 0x5
3,155,902 UART: [art] Derive Key Pair - Done
3,171,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,764 UART: [art] PUB.X = 8666A5A8788C609D2B919B6CE76029E9C0E160A08A02E26C9AD0BD3F935107D7CB84E89EBDA66035639594A0AE2B9DC3
3,194,534 UART: [art] PUB.Y = 67F82491ABF4165D76581CB722A2AD86D18E3D8A9F4EC5799D8DB12C3A404ACC5C4FC1C01663D73771B36194F92FDBEA
3,201,496 UART: [art] SIG.R = DE20BBF93B711A615527FA71B3894998C3910277899C62EDAE475AF8C7BCC1E10C59CB2A58EB2B64C95ED5ECC51110F4
3,208,272 UART: [art] SIG.S = BA6BABAFD086379C179D1C0921C4001DF101F2662AA671EB2D7B7EF520285920C84B71D565B6F82465AB763DFA2BDF49
3,232,026 UART: Caliptra RT
3,232,369 UART: [state] CFI Enabled
3,352,679 UART: [rt] RT listening for mailbox commands...
3,353,349 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,351 UART: [rt]cmd =0x41544d4e, len=14344
3,786,287 >>> mbox cmd response data (8 bytes)
3,786,288 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,445 UART: [rt]cmd =0x41545348, len=116
3,838,442 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,697 ready_for_fw is high
1,059,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,217 >>> mbox cmd response: success
2,742,690 UART:
2,742,706 UART: Running Caliptra FMC ...
2,743,114 UART:
2,743,257 UART: [state] CFI Enabled
2,753,599 UART: [fht] FMC Alias Private Key: 7
2,873,713 UART: [art] Extend RT PCRs Done
2,874,141 UART: [art] Lock RT PCRs Done
2,875,611 UART: [art] Populate DV Done
2,883,978 UART: [fht] FMC Alias Private Key: 7
2,885,042 UART: [art] Derive CDI
2,885,322 UART: [art] Store in slot 0x4
2,970,795 UART: [art] Derive Key Pair
2,971,155 UART: [art] Store priv key in slot 0x5
2,984,713 UART: [art] Derive Key Pair - Done
2,999,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,495 UART: [art] PUB.X = 51863D1ED77440CF6BB9E584C2E2E1415032849AC936EA0AAC6586316453D8F7493914D09FCC392F5492811FBFDF2FE2
3,022,264 UART: [art] PUB.Y = 987242B04E0CBEB9D11FA0CE871FC96033DBA132D9917BB181DF6EF3C0CB6813AD18E2DD8436A8E729C60BCA54AC01C6
3,029,223 UART: [art] SIG.R = EE638D2383B49E286A59E391249A9E1251D327DB0E655D48E94377B9D6E9F134153D34242ED88411612BE594DA2D14D2
3,035,984 UART: [art] SIG.S = 5186B0CBCD4CD522A952447E1724ABC3CA48EEB865ECCA2014634D240BF1BFE3C86FF9B51D59DD1E4105E47ACAF5B92F
3,060,536 UART: Caliptra RT
3,060,879 UART: [state] CFI Enabled
3,180,554 UART: [rt] RT listening for mailbox commands...
3,181,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,454 UART: [rt]cmd =0x41544d4e, len=14344
3,614,730 >>> mbox cmd response data (8 bytes)
3,614,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,846 UART: [rt]cmd =0x41545348, len=116
3,666,823 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,632 UART: [state] LifecycleState = Unprovisioned
86,287 UART: [state] DebugLocked = No
86,953 UART: [state] WD Timer not started. Device not locked for debugging
88,126 UART: [kat] SHA2-256
893,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,901 UART: [kat] ++
898,053 UART: [kat] sha1
902,499 UART: [kat] SHA2-256
904,439 UART: [kat] SHA2-384
907,120 UART: [kat] SHA2-512-ACC
909,021 UART: [kat] ECC-384
918,738 UART: [kat] HMAC-384Kdf
923,252 UART: [kat] LMS
1,171,580 UART: [kat] --
1,172,631 UART: [cold-reset] ++
1,173,129 UART: [fht] FHT @ 0x50003400
1,175,762 UART: [idev] ++
1,175,930 UART: [idev] CDI.KEYID = 6
1,176,290 UART: [idev] SUBJECT.KEYID = 7
1,176,714 UART: [idev] UDS.KEYID = 0
1,177,059 ready_for_fw is high
1,177,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,582 UART: [idev] Erasing UDS.KEYID = 0
1,201,535 UART: [idev] Sha1 KeyId Algorithm
1,210,149 UART: [idev] --
1,211,331 UART: [ldev] ++
1,211,499 UART: [ldev] CDI.KEYID = 6
1,211,862 UART: [ldev] SUBJECT.KEYID = 5
1,212,288 UART: [ldev] AUTHORITY.KEYID = 7
1,212,751 UART: [ldev] FE.KEYID = 1
1,218,063 UART: [ldev] Erasing FE.KEYID = 1
1,244,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,206 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,129 UART: [ldev] --
1,283,440 UART: [fwproc] Wait for Commands...
1,284,068 UART: [fwproc] Recv command 0x46574c44
1,284,796 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,248 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,483 >>> mbox cmd response: success
2,828,657 UART: [afmc] ++
2,828,825 UART: [afmc] CDI.KEYID = 6
2,829,187 UART: [afmc] SUBJECT.KEYID = 7
2,829,612 UART: [afmc] AUTHORITY.KEYID = 5
2,865,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,732 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,433 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,129 UART: [afmc] --
2,908,117 UART: [cold-reset] --
2,909,015 UART: [state] Locking Datavault
2,910,336 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,940 UART: [state] Locking ICCM
2,911,428 UART: [exit] Launching FMC @ 0x40000130
2,916,758 UART:
2,916,774 UART: Running Caliptra FMC ...
2,917,182 UART:
2,917,236 UART: [state] CFI Enabled
2,927,366 UART: [fht] FMC Alias Private Key: 7
3,046,780 UART: [art] Extend RT PCRs Done
3,047,208 UART: [art] Lock RT PCRs Done
3,048,814 UART: [art] Populate DV Done
3,057,029 UART: [fht] FMC Alias Private Key: 7
3,058,071 UART: [art] Derive CDI
3,058,351 UART: [art] Store in slot 0x4
3,143,964 UART: [art] Derive Key Pair
3,144,324 UART: [art] Store priv key in slot 0x5
3,158,018 UART: [art] Derive Key Pair - Done
3,172,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,823 UART: [art] PUB.X = 85D524173C0AB5A9A248AC319116CC2139840F8F58869D6A85C1177D2B89AECB6612DA3452831CA112541FE998DF4131
3,195,583 UART: [art] PUB.Y = F08151615936613A59FDDD17B2A0CA6070A29CA9A2C0F4AB684A8A311FF97B58CA9073F69FD3CC480B87A5D8D19B993C
3,202,540 UART: [art] SIG.R = 9F2D5EA66DD3CEFE0519CDE20848BF284C5BC03FDA42C028505B975EB3DA79D30E9016085B0FBE421B039745CFF66277
3,209,304 UART: [art] SIG.S = CA79FFAE78CAA47E88330D602A88BE6A101D3FBFB29034FF7F3727F6E39C8047A6045DDF058757E1B34980C0146D8026
3,233,257 UART: Caliptra RT
3,233,508 UART: [state] CFI Enabled
3,352,370 UART: [rt] RT listening for mailbox commands...
3,353,040 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,110 UART: [rt]cmd =0x41544d4e, len=14344
3,786,148 >>> mbox cmd response data (8 bytes)
3,786,149 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,314 UART: [rt]cmd =0x41545348, len=116
3,838,921 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,619 ready_for_fw is high
1,059,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,294 >>> mbox cmd response: success
2,739,899 UART:
2,739,915 UART: Running Caliptra FMC ...
2,740,323 UART:
2,740,377 UART: [state] CFI Enabled
2,750,779 UART: [fht] FMC Alias Private Key: 7
2,869,629 UART: [art] Extend RT PCRs Done
2,870,057 UART: [art] Lock RT PCRs Done
2,871,877 UART: [art] Populate DV Done
2,879,770 UART: [fht] FMC Alias Private Key: 7
2,880,702 UART: [art] Derive CDI
2,880,982 UART: [art] Store in slot 0x4
2,966,571 UART: [art] Derive Key Pair
2,966,931 UART: [art] Store priv key in slot 0x5
2,980,459 UART: [art] Derive Key Pair - Done
2,995,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,320 UART: [art] PUB.X = 12B6EB657DE13A34C84997AB32A30C5A56AEF80DF1901E7878DB8A30A1B11830CF3F4A05F815B46CA5C9ACD26DD6E9D0
3,018,097 UART: [art] PUB.Y = 0500071899D4678B0033DCAA0A5B22FB698925D51EAF1246724B66098E0DD4A45AABEC6D9540CA47C7CEF2E8F532724E
3,024,994 UART: [art] SIG.R = 5B75C31FE972F5B763B0FACEA6527F098574801F7471C8A55D2100C463AEC23E89D6CCFB09669F54F4969B20C6E86922
3,031,738 UART: [art] SIG.S = D62937ADBD9FA7B0F42EC70DC9441DF713B20CC1971F38EF7F06B6E72E809BF25488A12889BE2432B1AD05973CBDD702
3,055,839 UART: Caliptra RT
3,056,090 UART: [state] CFI Enabled
3,175,759 UART: [rt] RT listening for mailbox commands...
3,176,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,543 UART: [rt]cmd =0x41544d4e, len=14344
3,609,177 >>> mbox cmd response data (8 bytes)
3,609,178 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,093 UART: [rt]cmd =0x41545348, len=116
3,661,114 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,380 UART: [kat] SHA2-256
904,320 UART: [kat] SHA2-384
907,093 UART: [kat] SHA2-512-ACC
908,994 UART: [kat] ECC-384
918,371 UART: [kat] HMAC-384Kdf
923,201 UART: [kat] LMS
1,171,529 UART: [kat] --
1,172,092 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,327 UART: [idev] ++
1,175,495 UART: [idev] CDI.KEYID = 6
1,175,855 UART: [idev] SUBJECT.KEYID = 7
1,176,279 UART: [idev] UDS.KEYID = 0
1,176,624 ready_for_fw is high
1,176,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,987 UART: [idev] Erasing UDS.KEYID = 0
1,201,386 UART: [idev] Sha1 KeyId Algorithm
1,209,788 UART: [idev] --
1,211,054 UART: [ldev] ++
1,211,222 UART: [ldev] CDI.KEYID = 6
1,211,585 UART: [ldev] SUBJECT.KEYID = 5
1,212,011 UART: [ldev] AUTHORITY.KEYID = 7
1,212,474 UART: [ldev] FE.KEYID = 1
1,217,906 UART: [ldev] Erasing FE.KEYID = 1
1,244,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,741 UART: [fwproc] Wait for Commands...
1,284,477 UART: [fwproc] Recv command 0x46574c44
1,285,205 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,590 >>> mbox cmd response: success
2,829,622 UART: [afmc] ++
2,829,790 UART: [afmc] CDI.KEYID = 6
2,830,152 UART: [afmc] SUBJECT.KEYID = 7
2,830,577 UART: [afmc] AUTHORITY.KEYID = 5
2,867,124 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,888 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,176 UART: [afmc] --
2,910,116 UART: [cold-reset] --
2,911,046 UART: [state] Locking Datavault
2,911,941 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,545 UART: [state] Locking ICCM
2,913,143 UART: [exit] Launching FMC @ 0x40000130
2,918,473 UART:
2,918,489 UART: Running Caliptra FMC ...
2,918,897 UART:
2,919,040 UART: [state] CFI Enabled
2,929,620 UART: [fht] FMC Alias Private Key: 7
3,048,878 UART: [art] Extend RT PCRs Done
3,049,306 UART: [art] Lock RT PCRs Done
3,051,030 UART: [art] Populate DV Done
3,059,047 UART: [fht] FMC Alias Private Key: 7
3,060,207 UART: [art] Derive CDI
3,060,487 UART: [art] Store in slot 0x4
3,146,118 UART: [art] Derive Key Pair
3,146,478 UART: [art] Store priv key in slot 0x5
3,159,988 UART: [art] Derive Key Pair - Done
3,175,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,147 UART: [art] PUB.X = BF60A47C484679C3BF72050FF8BD408185EDAA1C277FAF6783F8E269D9C5289565087C85ECB92D14FFF71AF4EDA4B8CE
3,197,924 UART: [art] PUB.Y = B1EAF7922D1D912EE3ED62BD6D1FA74014C0F80BE49D6C3C84431016BEC0F0F343F1ADB5058DAB75EC6A9700DD94AAAA
3,204,870 UART: [art] SIG.R = 55EACC1005D023001C78E82212BF6C584C30B06DA4CE44DECD36C1361B7D19B5659BDEA43AE90333FF65CD5E66AC160A
3,211,623 UART: [art] SIG.S = 4DA66965EE7BAF8F2A7CCE427F1D1EB915C82D9C7CECD75E4A9DEDF110BD3025A2FDF5B2FBDF0C97A5726949B3634DC4
3,235,490 UART: Caliptra RT
3,235,833 UART: [state] CFI Enabled
3,356,035 UART: [rt] RT listening for mailbox commands...
3,356,705 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,663 UART: [rt]cmd =0x41544d4e, len=14344
3,789,093 >>> mbox cmd response data (8 bytes)
3,789,094 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,063 UART: [rt]cmd =0x41545348, len=116
3,840,382 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,228 ready_for_fw is high
1,060,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,809 >>> mbox cmd response: success
2,742,014 UART:
2,742,030 UART: Running Caliptra FMC ...
2,742,438 UART:
2,742,581 UART: [state] CFI Enabled
2,753,219 UART: [fht] FMC Alias Private Key: 7
2,872,647 UART: [art] Extend RT PCRs Done
2,873,075 UART: [art] Lock RT PCRs Done
2,874,633 UART: [art] Populate DV Done
2,882,806 UART: [fht] FMC Alias Private Key: 7
2,883,952 UART: [art] Derive CDI
2,884,232 UART: [art] Store in slot 0x4
2,969,441 UART: [art] Derive Key Pair
2,969,801 UART: [art] Store priv key in slot 0x5
2,983,127 UART: [art] Derive Key Pair - Done
2,997,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,153 UART: [art] PUB.X = 1955B50D2338DF61B41B1158E9B55D2004EF5B485B098BE448FB9B5C94C156EF0811DCF11FFDEFDB4D4B72DAEA1042EE
3,020,929 UART: [art] PUB.Y = 35B17CA3317BD4EA90BA2F71A1BCE5BDFF359101F4969F84AF94C317939B5E3DB998F8A902ADD24F5EF935CFBE9F4814
3,027,891 UART: [art] SIG.R = 22F4E7CBD7C9C433829211658CC31AB3391C0F07B63CDBE561F76F33385E503A0B2B00350D5F6EDD0B802A6DBE3F1DC1
3,034,636 UART: [art] SIG.S = 1DE0F56758DC95BF2BB02C0FAE7FCD5B7CC5A47EC93D4E96EAD2B1BDD2EEBDF2E80264ACF6E38ECF6BCA990EAEA23F2E
3,058,763 UART: Caliptra RT
3,059,106 UART: [state] CFI Enabled
3,179,976 UART: [rt] RT listening for mailbox commands...
3,180,646 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,500 UART: [rt]cmd =0x41544d4e, len=14344
3,613,320 >>> mbox cmd response data (8 bytes)
3,613,321 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,530 UART: [rt]cmd =0x41545348, len=116
3,665,903 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,933 writing to cptra_bootfsm_go
193,232 UART:
193,579 UART: Running Caliptra ROM ...
194,686 UART:
194,829 UART: [state] CFI Enabled
268,561 UART: [state] LifecycleState = Unprovisioned
270,551 UART: [state] DebugLocked = No
272,568 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,645 UART: [kat] SHA2-256
447,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,849 UART: [kat] ++
458,294 UART: [kat] sha1
470,037 UART: [kat] SHA2-256
472,690 UART: [kat] SHA2-384
479,667 UART: [kat] SHA2-512-ACC
482,056 UART: [kat] ECC-384
2,767,685 UART: [kat] HMAC-384Kdf
2,800,256 UART: [kat] LMS
3,990,559 UART: [kat] --
3,993,849 UART: [cold-reset] ++
3,996,355 UART: [fht] Storing FHT @ 0x50003400
4,007,639 UART: [idev] ++
4,008,259 UART: [idev] CDI.KEYID = 6
4,009,161 UART: [idev] SUBJECT.KEYID = 7
4,010,412 UART: [idev] UDS.KEYID = 0
4,011,380 ready_for_fw is high
4,011,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,595 UART: [idev] Erasing UDS.KEYID = 0
7,345,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,310 UART: [idev] --
7,370,424 UART: [ldev] ++
7,371,053 UART: [ldev] CDI.KEYID = 6
7,371,988 UART: [ldev] SUBJECT.KEYID = 5
7,373,205 UART: [ldev] AUTHORITY.KEYID = 7
7,374,438 UART: [ldev] FE.KEYID = 1
7,422,017 UART: [ldev] Erasing FE.KEYID = 1
10,755,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,758 UART: [ldev] --
13,116,235 UART: [fwproc] Waiting for Commands...
13,119,299 UART: [fwproc] Received command 0x46574c44
13,121,735 UART: [fwproc] Received Image of size 118548 bytes
17,225,630 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,598 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,556 >>> mbox cmd response: success
17,709,992 UART: [afmc] ++
17,710,655 UART: [afmc] CDI.KEYID = 6
17,711,549 UART: [afmc] SUBJECT.KEYID = 7
17,712,723 UART: [afmc] AUTHORITY.KEYID = 5
21,069,003 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,366,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,369,073 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,383,501 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,398,220 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,412,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,433,961 UART: [afmc] --
23,437,226 UART: [cold-reset] --
23,440,923 UART: [state] Locking Datavault
23,446,405 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,180 UART: [state] Locking ICCM
23,449,248 UART: [exit] Launching FMC @ 0x40000130
23,457,647 UART:
23,457,936 UART: Running Caliptra FMC ...
23,458,995 UART:
23,459,156 UART: [state] CFI Enabled
23,528,991 UART: [fht] FMC Alias Private Key: 7
25,890,690 UART: [art] Extend RT PCRs Done
25,891,909 UART: [art] Lock RT PCRs Done
25,893,368 UART: [art] Populate DV Done
25,898,786 UART: [fht] FMC Alias Private Key: 7
25,900,383 UART: [art] Derive CDI
25,901,199 UART: [art] Store in slot 0x4
25,958,780 UART: [art] Derive Key Pair
25,959,842 UART: [art] Store priv key in slot 0x5
29,252,457 UART: [art] Derive Key Pair - Done
29,265,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,147 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,653 UART: [art] PUB.X = C356594AA1CD4787B091B2948312D4E21D84BA3F58E8722BBD7B8C58A23B419E49B65211A87C5C716FB2962151E09CFC
31,563,905 UART: [art] PUB.Y = 4A358A3E9041C094BA132405482CF349AF4FFD1CD4D02BAE0CAE51AD0E899B1A56635A06A08C6408828C27E3939C8249
31,571,132 UART: [art] SIG.R = A44AD27EF0E1C04F17BF8E0FB55CAA5897FEBAA14EF3F124DE0592894682677D718D8B9FC1BD8CFAB2BC89248AE78EEE
31,578,568 UART: [art] SIG.S = 2D9A653E20601B331035EE64AC3E180375DF56B67D6725BE158656B5C2E1ADF7B26FA6B000F6ABCA9328630DB863722D
32,883,228 UART: Caliptra RT
32,883,932 UART: [state] CFI Enabled
33,061,603 UART: [rt] RT listening for mailbox commands...
33,064,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,219,687 UART: [rt]cmd =0x41544d4e, len=14344
38,520,925 >>> mbox cmd response data (8 bytes)
38,521,533 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,552,201 UART: [rt]cmd =0x41545348, len=116
38,572,124 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,804,750 ready_for_fw is high
3,805,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,377 >>> mbox cmd response: success
23,641,819 UART:
23,642,254 UART: Running Caliptra FMC ...
23,643,377 UART:
23,643,531 UART: [state] CFI Enabled
23,707,803 UART: [fht] FMC Alias Private Key: 7
26,047,657 UART: [art] Extend RT PCRs Done
26,048,892 UART: [art] Lock RT PCRs Done
26,050,312 UART: [art] Populate DV Done
26,055,677 UART: [fht] FMC Alias Private Key: 7
26,057,332 UART: [art] Derive CDI
26,058,154 UART: [art] Store in slot 0x4
26,116,228 UART: [art] Derive Key Pair
26,117,299 UART: [art] Store priv key in slot 0x5
29,410,169 UART: [art] Derive Key Pair - Done
29,423,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,711,980 UART: [art] Erasing AUTHORITY.KEYID = 7
31,713,491 UART: [art] PUB.X = B475CC70099194C8EEA116CF4921C6D93790BB2A69DAED655935BADF9BB4120288B59A4FAD22CF5D0AC550722C8AC7DD
31,720,825 UART: [art] PUB.Y = 83436F72F966F7A92300AF719329DC5D982F4EC6EBEC7405D268E571DA578D0E52FC303CB19F4FE9D42D1AB02316C39A
31,728,039 UART: [art] SIG.R = 6C54E47EB0164F8782F25FF59094FC24EA683221DCC0A8A88E959D28DEA713470C5A9A88643C21B57669A91E0534FEC7
31,735,441 UART: [art] SIG.S = F410C341207ADB5A433428FE7958A555E410B2B171521234E662AC63A60E04F026074AE5E96BF2C9CF5148F7C884F882
33,040,247 UART: Caliptra RT
33,040,968 UART: [state] CFI Enabled
33,217,880 UART: [rt] RT listening for mailbox commands...
33,220,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,375,556 UART: [rt]cmd =0x41544d4e, len=14344
38,676,444 >>> mbox cmd response data (8 bytes)
38,677,027 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,707,655 UART: [rt]cmd =0x41545348, len=116
38,727,301 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,256 writing to cptra_bootfsm_go
193,579 UART:
193,934 UART: Running Caliptra ROM ...
195,133 UART:
604,914 UART: [state] CFI Enabled
618,805 UART: [state] LifecycleState = Unprovisioned
620,742 UART: [state] DebugLocked = No
623,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,111 UART: [kat] SHA2-256
797,896 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,398 UART: [kat] ++
808,866 UART: [kat] sha1
820,089 UART: [kat] SHA2-256
822,747 UART: [kat] SHA2-384
827,667 UART: [kat] SHA2-512-ACC
830,032 UART: [kat] ECC-384
3,114,920 UART: [kat] HMAC-384Kdf
3,126,249 UART: [kat] LMS
4,316,369 UART: [kat] --
4,321,667 UART: [cold-reset] ++
4,323,206 UART: [fht] Storing FHT @ 0x50003400
4,334,086 UART: [idev] ++
4,334,659 UART: [idev] CDI.KEYID = 6
4,335,637 UART: [idev] SUBJECT.KEYID = 7
4,336,874 UART: [idev] UDS.KEYID = 0
4,337,822 ready_for_fw is high
4,338,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,890 UART: [idev] Erasing UDS.KEYID = 0
7,628,893 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,349 UART: [idev] --
7,655,772 UART: [ldev] ++
7,656,337 UART: [ldev] CDI.KEYID = 6
7,657,270 UART: [ldev] SUBJECT.KEYID = 5
7,658,526 UART: [ldev] AUTHORITY.KEYID = 7
7,659,670 UART: [ldev] FE.KEYID = 1
7,670,384 UART: [ldev] Erasing FE.KEYID = 1
10,960,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,472 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,916 UART: [ldev] --
13,320,261 UART: [fwproc] Waiting for Commands...
13,322,423 UART: [fwproc] Received command 0x46574c44
13,324,598 UART: [fwproc] Received Image of size 118548 bytes
17,428,206 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,811 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,986 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,642 >>> mbox cmd response: success
17,906,135 UART: [afmc] ++
17,906,817 UART: [afmc] CDI.KEYID = 6
17,907,730 UART: [afmc] SUBJECT.KEYID = 7
17,908,945 UART: [afmc] AUTHORITY.KEYID = 5
21,229,211 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,745 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,200 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,593 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,723 UART: [afmc] --
23,593,726 UART: [cold-reset] --
23,596,664 UART: [state] Locking Datavault
23,603,261 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,003 UART: [state] Locking ICCM
23,607,599 UART: [exit] Launching FMC @ 0x40000130
23,616,004 UART:
23,616,242 UART: Running Caliptra FMC ...
23,617,334 UART:
23,617,488 UART: [state] CFI Enabled
23,625,097 UART: [fht] FMC Alias Private Key: 7
25,965,187 UART: [art] Extend RT PCRs Done
25,966,401 UART: [art] Lock RT PCRs Done
25,968,208 UART: [art] Populate DV Done
25,973,774 UART: [fht] FMC Alias Private Key: 7
25,975,360 UART: [art] Derive CDI
25,976,109 UART: [art] Store in slot 0x4
26,018,807 UART: [art] Derive Key Pair
26,019,845 UART: [art] Store priv key in slot 0x5
29,262,083 UART: [art] Derive Key Pair - Done
29,275,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,160 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,663 UART: [art] PUB.X = DE6EFD62E38937E42C71A7F775140FD37792690CEE99ED6E604FF22D5376535017280A5F48F816CB24E248E611359F62
31,563,898 UART: [art] PUB.Y = E44264255A75EA6898D2B2C4CC620E2E5D7A5EC3D5444205A3ADB5ABBCA39F1FB2B012AE549BAA71976D866525F53B0C
31,571,225 UART: [art] SIG.R = 3362FFA9E56310CE8008082684631CA84BB6D06F9F9D5C407FB9D5BF36E605E705D0DB99D32271D587CEDF340AC91A30
31,578,609 UART: [art] SIG.S = D7B3CA3FB56B493B425A11460EC0C6F65271C1A183B5B11C44FFCDBFD0083CC91BADAACDE5F8EA83BD20F2A634CAD605
32,883,698 UART: Caliptra RT
32,884,408 UART: [state] CFI Enabled
33,017,619 UART: [rt] RT listening for mailbox commands...
33,020,147 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,175,532 UART: [rt]cmd =0x41544d4e, len=14344
38,476,786 >>> mbox cmd response data (8 bytes)
38,477,404 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,508,361 UART: [rt]cmd =0x41545348, len=116
38,528,731 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,131,259 ready_for_fw is high
4,131,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,913 >>> mbox cmd response: success
23,811,625 UART:
23,812,155 UART: Running Caliptra FMC ...
23,813,284 UART:
23,813,438 UART: [state] CFI Enabled
23,821,430 UART: [fht] FMC Alias Private Key: 7
26,161,619 UART: [art] Extend RT PCRs Done
26,162,841 UART: [art] Lock RT PCRs Done
26,164,358 UART: [art] Populate DV Done
26,170,031 UART: [fht] FMC Alias Private Key: 7
26,171,628 UART: [art] Derive CDI
26,172,435 UART: [art] Store in slot 0x4
26,215,209 UART: [art] Derive Key Pair
26,216,268 UART: [art] Store priv key in slot 0x5
29,457,750 UART: [art] Derive Key Pair - Done
29,470,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,402 UART: [art] PUB.X = 9B266A278BD4A6AC41094408A9B48B6EB3EA58B6856042ED04545C7258B09B5427ED4C68787FF2A8F9A685C4C54411E6
31,759,661 UART: [art] PUB.Y = 10CB430979EB0B2D2CC22A2D3588FCC5D5147E9FCFD0AABCEEAAFF27FBB9D5F8F83EB792BF00AEC1443AE7094649BCC4
31,766,927 UART: [art] SIG.R = 7A5FA50AB61DAF8C6415EF3174EFB767FFEB155B5CF793F999D2D306C323E9DCD05B8F8C9405939EE590D920E02CF24B
31,774,316 UART: [art] SIG.S = C30ACD5C636C694214DD0235469DEE2F155225D064358148DE6C9BD0690400EEA8B6B8A885F7A69E28C67CDB12814858
33,079,817 UART: Caliptra RT
33,080,534 UART: [state] CFI Enabled
33,214,626 UART: [rt] RT listening for mailbox commands...
33,217,037 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,372,374 UART: [rt]cmd =0x41544d4e, len=14344
38,672,297 >>> mbox cmd response data (8 bytes)
38,672,872 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
38,703,720 UART: [rt]cmd =0x41545348, len=116
38,724,168 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
192,041 UART:
192,404 UART: Running Caliptra ROM ...
193,546 UART:
193,690 UART: [state] CFI Enabled
266,085 UART: [state] LifecycleState = Unprovisioned
268,012 UART: [state] DebugLocked = No
270,823 UART: [state] WD Timer not started. Device not locked for debugging
274,204 UART: [kat] SHA2-256
453,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,608 UART: [kat] ++
465,080 UART: [kat] sha1
476,098 UART: [kat] SHA2-256
478,833 UART: [kat] SHA2-384
484,674 UART: [kat] SHA2-512-ACC
487,055 UART: [kat] ECC-384
2,947,400 UART: [kat] HMAC-384Kdf
2,971,282 UART: [kat] LMS
3,447,813 UART: [kat] --
3,451,761 UART: [cold-reset] ++
3,453,617 UART: [fht] FHT @ 0x50003400
3,464,514 UART: [idev] ++
3,465,130 UART: [idev] CDI.KEYID = 6
3,466,044 UART: [idev] SUBJECT.KEYID = 7
3,467,292 UART: [idev] UDS.KEYID = 0
3,468,214 ready_for_fw is high
3,468,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,487 UART: [idev] Erasing UDS.KEYID = 0
5,987,821 UART: [idev] Sha1 KeyId Algorithm
6,010,323 UART: [idev] --
6,015,243 UART: [ldev] ++
6,015,836 UART: [ldev] CDI.KEYID = 6
6,016,751 UART: [ldev] SUBJECT.KEYID = 5
6,017,963 UART: [ldev] AUTHORITY.KEYID = 7
6,019,191 UART: [ldev] FE.KEYID = 1
6,057,331 UART: [ldev] Erasing FE.KEYID = 1
8,562,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,054 UART: [ldev] --
10,372,150 UART: [fwproc] Wait for Commands...
10,373,693 UART: [fwproc] Recv command 0x46574c44
10,375,672 UART: [fwproc] Recv'd Img size: 118548 bytes
13,850,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,931,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,004,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,332,576 >>> mbox cmd response: success
14,335,798 UART: [afmc] ++
14,336,390 UART: [afmc] CDI.KEYID = 6
14,337,331 UART: [afmc] SUBJECT.KEYID = 7
14,338,542 UART: [afmc] AUTHORITY.KEYID = 5
16,873,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,991 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,782 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,407 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,688 UART: [afmc] --
18,676,073 UART: [cold-reset] --
18,680,201 UART: [state] Locking Datavault
18,686,253 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,018 UART: [state] Locking ICCM
18,690,790 UART: [exit] Launching FMC @ 0x40000130
18,699,233 UART:
18,699,466 UART: Running Caliptra FMC ...
18,700,563 UART:
18,700,721 UART: [state] CFI Enabled
18,752,588 UART: [fht] FMC Alias Private Key: 7
20,519,438 UART: [art] Extend RT PCRs Done
20,520,655 UART: [art] Lock RT PCRs Done
20,522,371 UART: [art] Populate DV Done
20,527,722 UART: [fht] FMC Alias Private Key: 7
20,529,197 UART: [art] Derive CDI
20,529,926 UART: [art] Store in slot 0x4
20,585,550 UART: [art] Derive Key Pair
20,586,629 UART: [art] Store priv key in slot 0x5
23,050,072 UART: [art] Derive Key Pair - Done
23,063,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,291 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,816 UART: [art] PUB.X = 2E3605EAE476AC38F9A65E850199E6D58F45BE90FF61C8D91B9CFF662B1B08E3A80D9F88A1FF816B56F1CFE6FE745469
24,784,080 UART: [art] PUB.Y = 05191C0D05425709A9A49F734D4D44553D59178CA42C53E73929EC169B1DE4628C5B89CEBB900272DFE5A27C13263C89
24,791,318 UART: [art] SIG.R = 681E186BD1649213B23960B978105B82A8E9C46FBDF6DAACDB8D76D0173EB92B6CE1AA70F91AA0B71A82DDCE63855D36
24,798,713 UART: [art] SIG.S = 2A2B10911C08AD7D26328A0245761B9AC306E3854239799219D9C4E0024BA728C86E915503FFFC6DA446146CBD823652
25,777,405 UART: Caliptra RT
25,778,126 UART: [state] CFI Enabled
25,959,526 UART: [rt] RT listening for mailbox commands...
25,961,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,117,171 UART: [rt]cmd =0x41544d4e, len=14344
30,112,999 >>> mbox cmd response data (8 bytes)
30,113,681 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,144,528 UART: [rt]cmd =0x41545348, len=116
30,164,983 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,457,851 ready_for_fw is high
3,458,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,485 >>> mbox cmd response: success
18,533,489 UART:
18,533,911 UART: Running Caliptra FMC ...
18,535,026 UART:
18,535,219 UART: [state] CFI Enabled
18,600,576 UART: [fht] FMC Alias Private Key: 7
20,367,054 UART: [art] Extend RT PCRs Done
20,368,285 UART: [art] Lock RT PCRs Done
20,370,149 UART: [art] Populate DV Done
20,375,707 UART: [fht] FMC Alias Private Key: 7
20,377,352 UART: [art] Derive CDI
20,378,089 UART: [art] Store in slot 0x4
20,433,360 UART: [art] Derive Key Pair
20,434,403 UART: [art] Store priv key in slot 0x5
22,897,708 UART: [art] Derive Key Pair - Done
22,910,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,751 UART: [art] PUB.X = F09B52C4960B8FC173CC206DC0F5CD3158A70CEFF5065ABF232B92EE1608910C8FBDEF01B57C61DD972656E5C11B2C13
24,632,064 UART: [art] PUB.Y = A8090448D65723B8310F693A27F3A4918D27FBE227E87B7A433C9802BA0108D59EB260E6B1550DAED89E70F1C63BE1CD
24,639,305 UART: [art] SIG.R = 75005B53C89C51B1D0D901D7F2CD9118F083CF3CA12C87C1A9FBFCDA53DFF50203EFF4E3B9597139AB8AFC850939E0C0
24,646,725 UART: [art] SIG.S = FA7DA79B5D46C7DD8EF437D81AC08CBAACCFC4E366250D6C8B6AB635E6ED7023BD2058AAA038F879169C58E0B6CC0482
25,626,141 UART: Caliptra RT
25,626,857 UART: [state] CFI Enabled
25,807,146 UART: [rt] RT listening for mailbox commands...
25,809,546 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,964,836 UART: [rt]cmd =0x41544d4e, len=14344
29,960,562 >>> mbox cmd response data (8 bytes)
29,961,165 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,991,904 UART: [rt]cmd =0x41545348, len=116
30,011,528 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
192,528 UART:
192,903 UART: Running Caliptra ROM ...
194,102 UART:
603,891 UART: [state] CFI Enabled
617,704 UART: [state] LifecycleState = Unprovisioned
619,664 UART: [state] DebugLocked = No
622,115 UART: [state] WD Timer not started. Device not locked for debugging
625,361 UART: [kat] SHA2-256
804,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,776 UART: [kat] ++
816,225 UART: [kat] sha1
826,246 UART: [kat] SHA2-256
828,905 UART: [kat] SHA2-384
833,925 UART: [kat] SHA2-512-ACC
836,262 UART: [kat] ECC-384
3,279,016 UART: [kat] HMAC-384Kdf
3,292,239 UART: [kat] LMS
3,768,749 UART: [kat] --
3,772,262 UART: [cold-reset] ++
3,774,768 UART: [fht] FHT @ 0x50003400
3,787,174 UART: [idev] ++
3,787,742 UART: [idev] CDI.KEYID = 6
3,788,775 UART: [idev] SUBJECT.KEYID = 7
3,789,950 UART: [idev] UDS.KEYID = 0
3,790,853 ready_for_fw is high
3,791,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,915 UART: [idev] Erasing UDS.KEYID = 0
6,270,068 UART: [idev] Sha1 KeyId Algorithm
6,293,714 UART: [idev] --
6,299,453 UART: [ldev] ++
6,300,024 UART: [ldev] CDI.KEYID = 6
6,300,941 UART: [ldev] SUBJECT.KEYID = 5
6,302,160 UART: [ldev] AUTHORITY.KEYID = 7
6,303,395 UART: [ldev] FE.KEYID = 1
6,314,524 UART: [ldev] Erasing FE.KEYID = 1
8,795,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,552 UART: [ldev] --
10,590,157 UART: [fwproc] Wait for Commands...
10,591,878 UART: [fwproc] Recv command 0x46574c44
10,593,880 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,360 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,518 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,483 >>> mbox cmd response: success
14,564,912 UART: [afmc] ++
14,565,524 UART: [afmc] CDI.KEYID = 6
14,566,440 UART: [afmc] SUBJECT.KEYID = 7
14,567,668 UART: [afmc] AUTHORITY.KEYID = 5
17,069,109 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,460 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,112 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,162 UART: [afmc] --
18,867,977 UART: [cold-reset] --
18,872,492 UART: [state] Locking Datavault
18,878,230 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,988 UART: [state] Locking ICCM
18,882,412 UART: [exit] Launching FMC @ 0x40000130
18,890,815 UART:
18,891,052 UART: Running Caliptra FMC ...
18,892,109 UART:
18,892,262 UART: [state] CFI Enabled
18,900,477 UART: [fht] FMC Alias Private Key: 7
20,666,315 UART: [art] Extend RT PCRs Done
20,667,514 UART: [art] Lock RT PCRs Done
20,669,465 UART: [art] Populate DV Done
20,674,774 UART: [fht] FMC Alias Private Key: 7
20,676,475 UART: [art] Derive CDI
20,677,303 UART: [art] Store in slot 0x4
20,719,810 UART: [art] Derive Key Pair
20,720,810 UART: [art] Store priv key in slot 0x5
23,148,030 UART: [art] Derive Key Pair - Done
23,161,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,501 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,993 UART: [art] PUB.X = 483878E79CB9B1E80B493F9640CD981E2A78A2E2D14A75D8E9096896B4C9C7623ECC5EB89A083E2F44EFC743A9A6084E
24,876,248 UART: [art] PUB.Y = D92DAF5B536F8E705E9EEE05A3D523D60032C566D3643E63094F981653514317C3F2D3EE7B52DD993E8F4615482DBF6E
24,883,480 UART: [art] SIG.R = 485D57CB782644AFE6C983526F16CDC8162C3AE7F432641871DD31B1BE0481D20E86799FC12ED5427B2202E4B3EA1D46
24,890,873 UART: [art] SIG.S = F85F8AEB3AD1ED0B8FB61CF754B15E79F5955261CB369DE2BE57899C35C93915F256E74928DF37CFE0527F2BBBD7B6C2
25,868,936 UART: Caliptra RT
25,869,648 UART: [state] CFI Enabled
26,001,848 UART: [rt] RT listening for mailbox commands...
26,004,354 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,159,696 UART: [rt]cmd =0x41544d4e, len=14344
30,155,331 >>> mbox cmd response data (8 bytes)
30,155,916 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,186,385 UART: [rt]cmd =0x41545348, len=116
30,206,426 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
3,777,118 ready_for_fw is high
3,777,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,317 >>> mbox cmd response: success
18,696,637 UART:
18,697,028 UART: Running Caliptra FMC ...
18,698,247 UART:
18,698,424 UART: [state] CFI Enabled
18,706,426 UART: [fht] FMC Alias Private Key: 7
20,472,695 UART: [art] Extend RT PCRs Done
20,473,916 UART: [art] Lock RT PCRs Done
20,475,602 UART: [art] Populate DV Done
20,480,958 UART: [fht] FMC Alias Private Key: 7
20,482,508 UART: [art] Derive CDI
20,483,328 UART: [art] Store in slot 0x4
20,525,867 UART: [art] Derive Key Pair
20,526,902 UART: [art] Store priv key in slot 0x5
22,953,355 UART: [art] Derive Key Pair - Done
22,966,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,128 UART: [art] PUB.X = DF54B677AECDB49BAB996BD02D442476720919D50D568B41348CF36475A97B6C200A24B29C59047A7032E497E11EA711
24,681,386 UART: [art] PUB.Y = 2C50318E48719CCEA916DE067115A52AC53988FAC084D798BA93F87BC0B69A2AA724781D02CE9F7DB172FD591BD98B7E
24,688,679 UART: [art] SIG.R = D5D59ED4786DE563AD629F83FF9DB29DD970F438C21010A47EDB48E1333F7D6473EA1C43366BE38E686370F3AB600C10
24,696,081 UART: [art] SIG.S = 6C3A088B3F98DED12A44E70CC964A58D4ED9068EB6DB453E228184E279560AD94A3995356FC8DF625CBD28925DC34DFC
25,674,814 UART: Caliptra RT
25,675,504 UART: [state] CFI Enabled
25,808,639 UART: [rt] RT listening for mailbox commands...
25,811,028 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,966,691 UART: [rt]cmd =0x41544d4e, len=14344
29,962,453 >>> mbox cmd response data (8 bytes)
29,963,029 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
29,993,788 UART: [rt]cmd =0x41545348, len=116
30,014,032 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,009 UART:
192,386 UART: Running Caliptra ROM ...
193,541 UART:
193,689 UART: [state] CFI Enabled
265,499 UART: [state] LifecycleState = Unprovisioned
267,906 UART: [state] DebugLocked = No
269,582 UART: [state] WD Timer not started. Device not locked for debugging
274,680 UART: [kat] SHA2-256
464,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,342 UART: [kat] ++
475,836 UART: [kat] sha1
487,446 UART: [kat] SHA2-256
490,494 UART: [kat] SHA2-384
496,206 UART: [kat] SHA2-512-ACC
498,794 UART: [kat] ECC-384
2,947,920 UART: [kat] HMAC-384Kdf
2,971,540 UART: [kat] LMS
3,503,290 UART: [kat] --
3,507,306 UART: [cold-reset] ++
3,508,953 UART: [fht] FHT @ 0x50003400
3,520,354 UART: [idev] ++
3,521,063 UART: [idev] CDI.KEYID = 6
3,521,974 UART: [idev] SUBJECT.KEYID = 7
3,523,211 UART: [idev] UDS.KEYID = 0
3,524,131 ready_for_fw is high
3,524,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,553 UART: [idev] Erasing UDS.KEYID = 0
6,029,148 UART: [idev] Sha1 KeyId Algorithm
6,052,540 UART: [idev] --
6,056,264 UART: [ldev] ++
6,056,998 UART: [ldev] CDI.KEYID = 6
6,057,907 UART: [ldev] SUBJECT.KEYID = 5
6,059,062 UART: [ldev] AUTHORITY.KEYID = 7
6,060,288 UART: [ldev] FE.KEYID = 1
6,100,977 UART: [ldev] Erasing FE.KEYID = 1
8,606,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,548 UART: [ldev] --
10,415,068 UART: [fwproc] Wait for Commands...
10,417,796 UART: [fwproc] Recv command 0x46574c44
10,420,106 UART: [fwproc] Recv'd Img size: 118548 bytes
13,933,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,136,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,696,495 >>> mbox cmd response: success
14,700,339 UART: [afmc] ++
14,701,069 UART: [afmc] CDI.KEYID = 6
14,702,258 UART: [afmc] SUBJECT.KEYID = 7
14,703,698 UART: [afmc] AUTHORITY.KEYID = 5
17,234,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,087 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,957 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,011 UART: [afmc] --
19,034,607 UART: [cold-reset] --
19,039,723 UART: [state] Locking Datavault
19,046,337 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,527 UART: [state] Locking ICCM
19,050,151 UART: [exit] Launching FMC @ 0x40000130
19,058,780 UART:
19,059,014 UART: Running Caliptra FMC ...
19,060,116 UART:
19,060,275 UART: [state] CFI Enabled
19,117,652 UART: [fht] FMC Alias Private Key: 7
20,884,125 UART: [art] Extend RT PCRs Done
20,885,337 UART: [art] Lock RT PCRs Done
20,887,183 UART: [art] Populate DV Done
20,892,449 UART: [fht] FMC Alias Private Key: 7
20,894,100 UART: [art] Derive CDI
20,894,932 UART: [art] Store in slot 0x4
20,950,668 UART: [art] Derive Key Pair
20,951,671 UART: [art] Store priv key in slot 0x5
23,415,002 UART: [art] Derive Key Pair - Done
23,427,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,391 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,895 UART: [art] PUB.X = 78E2A460E1A4D765B9081D24A05376DA796210F96054F9E0BFCA53B1C1DA0FBB04D418E3908271C38B1ABCB1500CA403
25,149,166 UART: [art] PUB.Y = 2024343590751B6BCCBF7D9EB9268611E372F2D36FAE9EC2FD75468089E8DCD7D587050042AE25FABCF44A3E1E0C0ED4
25,156,465 UART: [art] SIG.R = 53C6916926D6C7D66AF22ABA09C9560A31D6F51C052A09D602B34067420BF75F46F168006078C602324E0AAEEEB9D22E
25,163,806 UART: [art] SIG.S = BEC2A0367D486DB442891C8F14C31BB48CE1C78CCC91A24E093CBD51958705EC7F69DE4CD67EEC7E5B13398D2DBD4296
26,142,783 UART: Caliptra RT
26,143,497 UART: [state] CFI Enabled
26,324,968 UART: [rt] RT listening for mailbox commands...
26,327,488 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,482,733 UART: [rt]cmd =0x41544d4e, len=14344
30,478,219 >>> mbox cmd response data (8 bytes)
30,478,827 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,509,347 UART: [rt]cmd =0x41545348, len=116
30,530,373 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,439,506 ready_for_fw is high
3,439,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,814,953 >>> mbox cmd response: success
19,110,382 UART:
19,110,771 UART: Running Caliptra FMC ...
19,111,973 UART:
19,112,156 UART: [state] CFI Enabled
19,180,494 UART: [fht] FMC Alias Private Key: 7
20,967,917 UART: [art] Extend RT PCRs Done
20,969,156 UART: [art] Lock RT PCRs Done
20,970,673 UART: [art] Populate DV Done
20,976,077 UART: [fht] FMC Alias Private Key: 7
20,977,631 UART: [art] Derive CDI
20,978,449 UART: [art] Store in slot 0x4
21,034,466 UART: [art] Derive Key Pair
21,035,477 UART: [art] Store priv key in slot 0x5
23,498,617 UART: [art] Derive Key Pair - Done
23,511,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,277 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,793 UART: [art] PUB.X = 7A3A2CFA7E7C6E20308011C3D9F92F858C5EC1830B8FD0EA8B6E4FA0701DF6AF01C4E51C0B18970A8C5990BF85E123FA
25,233,028 UART: [art] PUB.Y = 9F5563B2A6A3FB628FA4306FE7010F5E2A1245D73E50FE1D2DF3A869DB971EC4A62745B55D32553786AEF603A44D0D0B
25,240,270 UART: [art] SIG.R = 95FE5B3DDA70C41D1BC6C961AE854C83A9F04B8AA3B28E564B57BB059D343D386C272851F5FC09CFF5A0F8C5CD15CF9D
25,247,652 UART: [art] SIG.S = CAA2658E56A1B49657A20CF6D6AB29C3A492BBE1CEF39BA541D24667BCBC0B6D2EC32A60CDE5FAFAAB792FE3A00DF031
26,226,518 UART: Caliptra RT
26,227,232 UART: [state] CFI Enabled
26,406,362 UART: [rt] RT listening for mailbox commands...
26,408,776 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,564,309 UART: [rt]cmd =0x41544d4e, len=14344
30,560,058 >>> mbox cmd response data (8 bytes)
30,560,630 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,591,475 UART: [rt]cmd =0x41545348, len=116
30,610,709 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,428 UART:
192,787 UART: Running Caliptra ROM ...
193,903 UART:
603,599 UART: [state] CFI Enabled
618,990 UART: [state] LifecycleState = Unprovisioned
621,386 UART: [state] DebugLocked = No
624,047 UART: [state] WD Timer not started. Device not locked for debugging
629,305 UART: [kat] SHA2-256
819,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,948 UART: [kat] ++
830,474 UART: [kat] sha1
841,385 UART: [kat] SHA2-256
844,382 UART: [kat] SHA2-384
849,962 UART: [kat] SHA2-512-ACC
852,558 UART: [kat] ECC-384
3,294,392 UART: [kat] HMAC-384Kdf
3,307,761 UART: [kat] LMS
3,839,617 UART: [kat] --
3,845,183 UART: [cold-reset] ++
3,846,492 UART: [fht] FHT @ 0x50003400
3,857,195 UART: [idev] ++
3,857,907 UART: [idev] CDI.KEYID = 6
3,858,862 UART: [idev] SUBJECT.KEYID = 7
3,860,037 UART: [idev] UDS.KEYID = 0
3,860,947 ready_for_fw is high
3,861,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,015 UART: [idev] Erasing UDS.KEYID = 0
6,334,279 UART: [idev] Sha1 KeyId Algorithm
6,356,442 UART: [idev] --
6,362,486 UART: [ldev] ++
6,363,205 UART: [ldev] CDI.KEYID = 6
6,364,099 UART: [ldev] SUBJECT.KEYID = 5
6,365,213 UART: [ldev] AUTHORITY.KEYID = 7
6,366,502 UART: [ldev] FE.KEYID = 1
6,376,531 UART: [ldev] Erasing FE.KEYID = 1
8,855,244 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,674 UART: [ldev] --
10,648,697 UART: [fwproc] Wait for Commands...
10,651,116 UART: [fwproc] Recv command 0x46574c44
10,653,371 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,668 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,886 >>> mbox cmd response: success
14,920,320 UART: [afmc] ++
14,921,072 UART: [afmc] CDI.KEYID = 6
14,922,277 UART: [afmc] SUBJECT.KEYID = 7
14,923,745 UART: [afmc] AUTHORITY.KEYID = 5
17,431,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,186,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,201,198 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,878 UART: [afmc] --
19,227,728 UART: [cold-reset] --
19,230,415 UART: [state] Locking Datavault
19,237,841 UART: [state] Locking PCR0, PCR1 and PCR31
19,240,209 UART: [state] Locking ICCM
19,241,913 UART: [exit] Launching FMC @ 0x40000130
19,250,561 UART:
19,250,799 UART: Running Caliptra FMC ...
19,251,900 UART:
19,252,088 UART: [state] CFI Enabled
19,260,147 UART: [fht] FMC Alias Private Key: 7
21,027,054 UART: [art] Extend RT PCRs Done
21,028,302 UART: [art] Lock RT PCRs Done
21,029,725 UART: [art] Populate DV Done
21,035,145 UART: [fht] FMC Alias Private Key: 7
21,036,798 UART: [art] Derive CDI
21,037,617 UART: [art] Store in slot 0x4
21,080,218 UART: [art] Derive Key Pair
21,081,270 UART: [art] Store priv key in slot 0x5
23,508,121 UART: [art] Derive Key Pair - Done
23,521,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,324 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,824 UART: [art] PUB.X = 68F7404311A23BBAD2AA5AB94CA544335E3FC7DB9F9BED43E94CD1B5A176B6A67D12A75788FDD4981920CEDFD11062DB
25,236,133 UART: [art] PUB.Y = B248AB7B41CFE8608DB5719B3A6A6633B1B96426786439F7CA3C0CDF1D036308E03286A1ADE31AC13AD30E66C8EDAE28
25,243,363 UART: [art] SIG.R = 742A26D7A5A1E14B27C8177A26F6AA4473D4D4032CFDE07305E1662282E9A6C30D2FCC48E703505955F56C84EB5695F2
25,250,818 UART: [art] SIG.S = 98D181D31BECBF502AC95037D8B537EF052BC8FB236CAF874B1C7539B2504D6549008173C8B982A4079BCB5E6011307A
26,229,515 UART: Caliptra RT
26,230,244 UART: [state] CFI Enabled
26,362,644 UART: [rt] RT listening for mailbox commands...
26,365,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,520,302 UART: [rt]cmd =0x41544d4e, len=14344
30,515,833 >>> mbox cmd response data (8 bytes)
30,516,437 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,547,122 UART: [rt]cmd =0x41545348, len=116
30,567,127 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,758,214 ready_for_fw is high
3,758,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,388 >>> mbox cmd response: success
19,294,499 UART:
19,294,930 UART: Running Caliptra FMC ...
19,296,082 UART:
19,296,253 UART: [state] CFI Enabled
19,304,524 UART: [fht] FMC Alias Private Key: 7
21,070,582 UART: [art] Extend RT PCRs Done
21,071,814 UART: [art] Lock RT PCRs Done
21,073,343 UART: [art] Populate DV Done
21,078,925 UART: [fht] FMC Alias Private Key: 7
21,080,385 UART: [art] Derive CDI
21,081,159 UART: [art] Store in slot 0x4
21,123,652 UART: [art] Derive Key Pair
21,124,700 UART: [art] Store priv key in slot 0x5
23,551,403 UART: [art] Derive Key Pair - Done
23,564,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,070 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,577 UART: [art] PUB.X = BAB54F692B26A963D3A9DB61AD04488A40F1039CFB3B7FA3D2F4E87FAD82B320A9AD884154CDB3DFA152129CA1DF509C
25,279,850 UART: [art] PUB.Y = BC94B76277F0456BDC5D774DA7A2D733C4C5CC746C3CBFED5CE7B125E028B3735A32E51A4CBA73141CED9B019B0A7EAD
25,287,127 UART: [art] SIG.R = 13ABDB960631D7F2EBD139D9685BA0B9BA24C907787B5FF793F79766920CE4F9A7E9320B53E6B729AD958401BAEB2726
25,294,548 UART: [art] SIG.S = 1F01F7E68FB5D43C1BDFFF8A6429EE3C69F925F0E6E228E6FF49F11E94A8DD3FBFD4A0ADED2F6BFFE259FC9A444AA337
26,273,151 UART: Caliptra RT
26,273,864 UART: [state] CFI Enabled
26,405,632 UART: [rt] RT listening for mailbox commands...
26,408,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,563,251 UART: [rt]cmd =0x41544d4e, len=14344
30,558,656 >>> mbox cmd response data (8 bytes)
30,559,236 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
30,589,749 UART: [rt]cmd =0x41545348, len=116
30,609,519 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,218 UART: [kat] HMAC-384Kdf
906,588 UART: [kat] LMS
1,474,784 UART: [kat] --
1,475,681 UART: [cold-reset] ++
1,476,073 UART: [fht] Storing FHT @ 0x50003400
1,478,898 UART: [idev] ++
1,479,066 UART: [idev] CDI.KEYID = 6
1,479,426 UART: [idev] SUBJECT.KEYID = 7
1,479,850 UART: [idev] UDS.KEYID = 0
1,480,195 ready_for_fw is high
1,480,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,346 UART: [idev] --
1,514,419 UART: [ldev] ++
1,514,587 UART: [ldev] CDI.KEYID = 6
1,514,950 UART: [ldev] SUBJECT.KEYID = 5
1,515,376 UART: [ldev] AUTHORITY.KEYID = 7
1,515,839 UART: [ldev] FE.KEYID = 1
1,521,095 UART: [ldev] Erasing FE.KEYID = 1
1,545,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,764 UART: [ldev] --
1,585,055 UART: [fwproc] Waiting for Commands...
1,585,712 UART: [fwproc] Received command 0x46574c44
1,586,503 UART: [fwproc] Received Image of size 118548 bytes
2,931,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,186 >>> mbox cmd response: success
3,131,314 UART: [afmc] ++
3,131,482 UART: [afmc] CDI.KEYID = 6
3,131,844 UART: [afmc] SUBJECT.KEYID = 7
3,132,269 UART: [afmc] AUTHORITY.KEYID = 5
3,167,846 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,390 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,073 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,035 UART: [afmc] --
3,211,031 UART: [cold-reset] --
3,211,951 UART: [state] Locking Datavault
3,212,958 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,562 UART: [state] Locking ICCM
3,214,102 UART: [exit] Launching FMC @ 0x40000130
3,219,432 UART:
3,219,448 UART: Running Caliptra FMC ...
3,219,856 UART:
3,219,910 UART: [state] CFI Enabled
3,230,396 UART: [fht] FMC Alias Private Key: 7
3,349,296 UART: [art] Extend RT PCRs Done
3,349,724 UART: [art] Lock RT PCRs Done
3,351,668 UART: [art] Populate DV Done
3,360,119 UART: [fht] FMC Alias Private Key: 7
3,361,081 UART: [art] Derive CDI
3,361,361 UART: [art] Store in slot 0x4
3,447,025 UART: [art] Derive Key Pair
3,447,385 UART: [art] Store priv key in slot 0x5
3,461,166 UART: [art] Derive Key Pair - Done
3,475,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,176 UART: [art] PUB.X = C10B07B89B1B19F6E763EF6CD418CEBA331E2666584255BB10EAD39FA4C96DEB71BAB03A043B4DBC254C87F3F447FD5F
3,498,957 UART: [art] PUB.Y = 1FF317BEB23FAFE432677BC2A89191AA6B19E1AA8A1845310D526297C52BA580242738993976242F608ADE6E224851AB
3,505,902 UART: [art] SIG.R = 477678FDBED5DB96691CB19FD4E9B83C441230EB4C36A1645176BF44F2702044EBDDEB295A325B90675BB6AAD57ECBAD
3,512,688 UART: [art] SIG.S = 682AFCE986C7113799F02CBF85C38FF800D5B088EC003B0F71F49BA4EB054B7E94E5FEFF5AF841045E167D073B82E4C2
3,535,392 UART: Caliptra RT
3,535,643 UART: [state] CFI Enabled
3,656,396 UART: [rt] RT listening for mailbox commands...
3,657,066 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,166 UART: [rt]cmd =0x41544d4e, len=14344
4,090,290 >>> mbox cmd response data (8 bytes)
4,090,291 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,086 UART: [rt]cmd =0x41545348, len=116
4,141,643 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,307 ready_for_fw is high
1,362,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,116 >>> mbox cmd response: success
3,042,925 UART:
3,042,941 UART: Running Caliptra FMC ...
3,043,349 UART:
3,043,403 UART: [state] CFI Enabled
3,054,099 UART: [fht] FMC Alias Private Key: 7
3,173,117 UART: [art] Extend RT PCRs Done
3,173,545 UART: [art] Lock RT PCRs Done
3,175,247 UART: [art] Populate DV Done
3,183,446 UART: [fht] FMC Alias Private Key: 7
3,184,612 UART: [art] Derive CDI
3,184,892 UART: [art] Store in slot 0x4
3,270,544 UART: [art] Derive Key Pair
3,270,904 UART: [art] Store priv key in slot 0x5
3,284,393 UART: [art] Derive Key Pair - Done
3,299,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,080 UART: [art] PUB.X = C3AE0ACF74BB6B48626A98F0A764F6AC0A43395CD39DEE47074D1638E30A5BC472977410CD27528C29F81CCBE6D9AF06
3,321,847 UART: [art] PUB.Y = 78DE10199E287F73D721C3E4059287323BB026C36D86D6E54CFDB64573EBEAED2D5292A1AE0605BF8C83D54F384BC9D5
3,328,796 UART: [art] SIG.R = CE1D32C7788901D84C84E49FB284B1ABB4A58BD62ED022AFA809134B3131AE84A04EDA12D1631F46E228DF5ABCB8046C
3,335,571 UART: [art] SIG.S = 88E161E108B921D120EC9117FD1E9744464D03CB42FF713C8BB937FBEC34DDF85A181BAB3E007CA8660F849D35A41547
3,359,438 UART: Caliptra RT
3,359,689 UART: [state] CFI Enabled
3,479,038 UART: [rt] RT listening for mailbox commands...
3,479,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,752 UART: [rt]cmd =0x41544d4e, len=14344
3,913,380 >>> mbox cmd response data (8 bytes)
3,913,381 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,618 UART: [rt]cmd =0x41545348, len=116
3,966,157 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
87,066 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,724 UART: [kat] SHA2-256
882,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,770 UART: [kat] ++
886,922 UART: [kat] sha1
891,114 UART: [kat] SHA2-256
893,052 UART: [kat] SHA2-384
895,823 UART: [kat] SHA2-512-ACC
897,724 UART: [kat] ECC-384
903,009 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,476,572 UART: [cold-reset] ++
1,476,934 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,439 UART: [idev] Erasing UDS.KEYID = 0
1,505,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,891 UART: [idev] --
1,514,846 UART: [ldev] ++
1,515,014 UART: [ldev] CDI.KEYID = 6
1,515,377 UART: [ldev] SUBJECT.KEYID = 5
1,515,803 UART: [ldev] AUTHORITY.KEYID = 7
1,516,266 UART: [ldev] FE.KEYID = 1
1,521,350 UART: [ldev] Erasing FE.KEYID = 1
1,546,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,765 UART: [ldev] --
1,586,032 UART: [fwproc] Waiting for Commands...
1,586,665 UART: [fwproc] Received command 0x46574c44
1,587,456 UART: [fwproc] Received Image of size 118548 bytes
2,932,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,894 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,557 >>> mbox cmd response: success
3,131,703 UART: [afmc] ++
3,131,871 UART: [afmc] CDI.KEYID = 6
3,132,233 UART: [afmc] SUBJECT.KEYID = 7
3,132,658 UART: [afmc] AUTHORITY.KEYID = 5
3,167,729 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,849 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,629 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,338 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,221 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,904 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,674 UART: [afmc] --
3,210,722 UART: [cold-reset] --
3,211,628 UART: [state] Locking Datavault
3,212,935 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,539 UART: [state] Locking ICCM
3,214,055 UART: [exit] Launching FMC @ 0x40000130
3,219,385 UART:
3,219,401 UART: Running Caliptra FMC ...
3,219,809 UART:
3,219,952 UART: [state] CFI Enabled
3,230,574 UART: [fht] FMC Alias Private Key: 7
3,349,312 UART: [art] Extend RT PCRs Done
3,349,740 UART: [art] Lock RT PCRs Done
3,351,322 UART: [art] Populate DV Done
3,359,465 UART: [fht] FMC Alias Private Key: 7
3,360,633 UART: [art] Derive CDI
3,360,913 UART: [art] Store in slot 0x4
3,446,915 UART: [art] Derive Key Pair
3,447,275 UART: [art] Store priv key in slot 0x5
3,460,754 UART: [art] Derive Key Pair - Done
3,475,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,355 UART: [art] PUB.X = 5D8024C4AC4FC49D8A2C22E933C4B09CBCA7B5B90780B69B28309E36AEBD9D9C04A6672CD1D7D35A69E22335087F51BE
3,499,128 UART: [art] PUB.Y = E861BC5B78797957A21970BEE617CA393A648F1F3D1B148CBF631D7D484F74A6A92FC32C957DA19F89F2299145F096EA
3,506,082 UART: [art] SIG.R = 30453315DF1D02F72A56D0362A250DEEC9BA7E52DFE4FD9534E8ABEA650127FA538301F68D4E5468F8558179B5BA70CA
3,512,848 UART: [art] SIG.S = A9D747F7DF93323C4F066D58293548EBA66327590D63464E5C5B1552BA087957E0C7E8A19A2E4FB88E065A713E14738C
3,536,416 UART: Caliptra RT
3,536,759 UART: [state] CFI Enabled
3,656,833 UART: [rt] RT listening for mailbox commands...
3,657,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,525 UART: [rt]cmd =0x41544d4e, len=14344
4,090,283 >>> mbox cmd response data (8 bytes)
4,090,284 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,193 UART: [rt]cmd =0x41545348, len=116
4,142,724 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,596 ready_for_fw is high
1,362,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,239 >>> mbox cmd response: success
3,042,820 UART:
3,042,836 UART: Running Caliptra FMC ...
3,043,244 UART:
3,043,387 UART: [state] CFI Enabled
3,053,979 UART: [fht] FMC Alias Private Key: 7
3,172,681 UART: [art] Extend RT PCRs Done
3,173,109 UART: [art] Lock RT PCRs Done
3,174,749 UART: [art] Populate DV Done
3,183,182 UART: [fht] FMC Alias Private Key: 7
3,184,268 UART: [art] Derive CDI
3,184,548 UART: [art] Store in slot 0x4
3,270,396 UART: [art] Derive Key Pair
3,270,756 UART: [art] Store priv key in slot 0x5
3,284,033 UART: [art] Derive Key Pair - Done
3,299,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,410 UART: [art] PUB.X = 6CE5B4D7676030D92C14843CC013AB0AF5C23D820594DA100E5595F9770D479E29CBE279A1384C707725BAF4A2BDE403
3,322,167 UART: [art] PUB.Y = B68D78723493117F5E48F8E7523F9C145586823EF0235395012EA8BF6202318365E7B45F3580DFAE9831B75A8A37CE94
3,329,101 UART: [art] SIG.R = E28527B0C2CD5AF2D572345E56815E0F04AA21BF2076BC98CE108AF27A4B3FEECA1FCF6640B39D0F00C76A5E90719B5E
3,335,856 UART: [art] SIG.S = 779614E691995BE00118372EB680FCC2EA174A85E343FF1D0B6DB99D44D4CF796B6BA44FDFF21FBB57E79D4700D183FA
3,359,430 UART: Caliptra RT
3,359,773 UART: [state] CFI Enabled
3,480,563 UART: [rt] RT listening for mailbox commands...
3,481,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,607 UART: [rt]cmd =0x41544d4e, len=14344
3,914,487 >>> mbox cmd response data (8 bytes)
3,914,488 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,645 UART: [rt]cmd =0x41545348, len=116
3,966,608 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
890,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,046 UART: [kat] ++
895,198 UART: [kat] sha1
899,280 UART: [kat] SHA2-256
901,220 UART: [kat] SHA2-384
903,877 UART: [kat] SHA2-512-ACC
905,778 UART: [kat] ECC-384
915,177 UART: [kat] HMAC-384Kdf
919,911 UART: [kat] LMS
1,168,223 UART: [kat] --
1,169,250 UART: [cold-reset] ++
1,169,752 UART: [fht] FHT @ 0x50003400
1,172,322 UART: [idev] ++
1,172,490 UART: [idev] CDI.KEYID = 6
1,172,851 UART: [idev] SUBJECT.KEYID = 7
1,173,276 UART: [idev] UDS.KEYID = 0
1,173,622 ready_for_fw is high
1,173,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,295 UART: [idev] Erasing UDS.KEYID = 0
1,198,635 UART: [idev] Sha1 KeyId Algorithm
1,207,561 UART: [idev] --
1,208,676 UART: [ldev] ++
1,208,844 UART: [ldev] CDI.KEYID = 6
1,209,208 UART: [ldev] SUBJECT.KEYID = 5
1,209,635 UART: [ldev] AUTHORITY.KEYID = 7
1,210,098 UART: [ldev] FE.KEYID = 1
1,215,158 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,170 UART: [ldev] --
1,281,625 UART: [fwproc] Wait for Commands...
1,282,346 UART: [fwproc] Recv command 0x46574c44
1,283,079 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,277 >>> mbox cmd response: success
2,828,443 UART: [afmc] ++
2,828,611 UART: [afmc] CDI.KEYID = 6
2,828,974 UART: [afmc] SUBJECT.KEYID = 7
2,829,400 UART: [afmc] AUTHORITY.KEYID = 5
2,864,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,743 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,334 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,035 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,906 UART: [afmc] --
2,907,849 UART: [cold-reset] --
2,908,877 UART: [state] Locking Datavault
2,910,102 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,706 UART: [state] Locking ICCM
2,911,230 UART: [exit] Launching FMC @ 0x40000130
2,916,560 UART:
2,916,576 UART: Running Caliptra FMC ...
2,916,984 UART:
2,917,038 UART: [state] CFI Enabled
2,927,454 UART: [fht] FMC Alias Private Key: 7
3,047,302 UART: [art] Extend RT PCRs Done
3,047,730 UART: [art] Lock RT PCRs Done
3,049,402 UART: [art] Populate DV Done
3,057,963 UART: [fht] FMC Alias Private Key: 7
3,059,113 UART: [art] Derive CDI
3,059,393 UART: [art] Store in slot 0x4
3,145,336 UART: [art] Derive Key Pair
3,145,696 UART: [art] Store priv key in slot 0x5
3,158,562 UART: [art] Derive Key Pair - Done
3,173,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,247 UART: [art] PUB.X = 1585D1FE1BD65096EE7E2121D3A01C6CA9954F871CD95F051778EA3D8ADAEB67DDAF07D80F6B3C4DA24B5B28FACDCD2F
3,196,034 UART: [art] PUB.Y = 49D98DC89E2CA0278BB3BC5ADEFCA0B2A3245FA36D70C0467187F1F7CA0168BF93F73D5117E3D6A1FF563AE4934A6092
3,202,995 UART: [art] SIG.R = 1486CCF523A013B9B41E6EAC02878F69471A8EBADD52758EC9308748EFC2A6427081D7C0CF4EEADCB3837F45A2EF8A36
3,209,776 UART: [art] SIG.S = C5671B3663564E8A07E2199A0C082F83436FD865A2B46A4A279F80899D3AC331A79A31926755D89791AB866F9765762F
3,233,411 UART: Caliptra RT
3,233,662 UART: [state] CFI Enabled
3,353,431 UART: [rt] RT listening for mailbox commands...
3,354,101 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,949 UART: [rt]cmd =0x41544d4e, len=14344
3,786,867 >>> mbox cmd response data (8 bytes)
3,786,868 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,975 UART: [rt]cmd =0x41545348, len=116
3,839,278 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,962 ready_for_fw is high
1,058,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,022 >>> mbox cmd response: success
2,739,525 UART:
2,739,541 UART: Running Caliptra FMC ...
2,739,949 UART:
2,740,003 UART: [state] CFI Enabled
2,750,351 UART: [fht] FMC Alias Private Key: 7
2,868,633 UART: [art] Extend RT PCRs Done
2,869,061 UART: [art] Lock RT PCRs Done
2,870,259 UART: [art] Populate DV Done
2,878,590 UART: [fht] FMC Alias Private Key: 7
2,879,696 UART: [art] Derive CDI
2,879,976 UART: [art] Store in slot 0x4
2,965,303 UART: [art] Derive Key Pair
2,965,663 UART: [art] Store priv key in slot 0x5
2,979,465 UART: [art] Derive Key Pair - Done
2,994,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,652 UART: [art] PUB.X = 507B834735B733E8D13CF85F7E01FBC14E4EF22A6250CA7AD5FCF3732BE3D916AF3CCEEB3DF889E7E0A8E0FA357AAB9A
3,017,445 UART: [art] PUB.Y = B5E335B10F2ABEEEEE2DCB889058EDFA758E43EDF0047CD6246201A2117D41D62A6B77268CFD9BCAF91AF2BE2EDA2B53
3,024,412 UART: [art] SIG.R = E93958A01D2FFD34BE000C3F961D5E3CAE04194B2C380D1AA02CC7D1456D9E45EE857811B80A751835E8CEF23647C486
3,031,154 UART: [art] SIG.S = DEFCC5F41B0A6B485B6FF3CB4AB59B770B3F2B3A2D48F1E2183B33E4BCEC0E72133E95493BB1DFAB33A7BD000350E010
3,054,932 UART: Caliptra RT
3,055,183 UART: [state] CFI Enabled
3,174,509 UART: [rt] RT listening for mailbox commands...
3,175,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,297,963 UART: [rt]cmd =0x41544d4e, len=14344
3,608,239 >>> mbox cmd response data (8 bytes)
3,608,240 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,405 UART: [rt]cmd =0x41545348, len=116
3,661,280 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,861 UART: [kat] SHA2-256
901,801 UART: [kat] SHA2-384
904,584 UART: [kat] SHA2-512-ACC
906,485 UART: [kat] ECC-384
916,108 UART: [kat] HMAC-384Kdf
920,642 UART: [kat] LMS
1,168,954 UART: [kat] --
1,169,823 UART: [cold-reset] ++
1,170,161 UART: [fht] FHT @ 0x50003400
1,172,725 UART: [idev] ++
1,172,893 UART: [idev] CDI.KEYID = 6
1,173,254 UART: [idev] SUBJECT.KEYID = 7
1,173,679 UART: [idev] UDS.KEYID = 0
1,174,025 ready_for_fw is high
1,174,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,786 UART: [idev] Erasing UDS.KEYID = 0
1,198,362 UART: [idev] Sha1 KeyId Algorithm
1,207,128 UART: [idev] --
1,208,081 UART: [ldev] ++
1,208,249 UART: [ldev] CDI.KEYID = 6
1,208,613 UART: [ldev] SUBJECT.KEYID = 5
1,209,040 UART: [ldev] AUTHORITY.KEYID = 7
1,209,503 UART: [ldev] FE.KEYID = 1
1,214,655 UART: [ldev] Erasing FE.KEYID = 1
1,241,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,131 UART: [ldev] --
1,280,380 UART: [fwproc] Wait for Commands...
1,281,197 UART: [fwproc] Recv command 0x46574c44
1,281,930 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,041 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,568 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,090 >>> mbox cmd response: success
2,826,166 UART: [afmc] ++
2,826,334 UART: [afmc] CDI.KEYID = 6
2,826,697 UART: [afmc] SUBJECT.KEYID = 7
2,827,123 UART: [afmc] AUTHORITY.KEYID = 5
2,862,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,650 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,232 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,987 UART: [afmc] --
2,905,904 UART: [cold-reset] --
2,906,564 UART: [state] Locking Datavault
2,907,681 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,285 UART: [state] Locking ICCM
2,908,847 UART: [exit] Launching FMC @ 0x40000130
2,914,177 UART:
2,914,193 UART: Running Caliptra FMC ...
2,914,601 UART:
2,914,744 UART: [state] CFI Enabled
2,925,440 UART: [fht] FMC Alias Private Key: 7
3,044,916 UART: [art] Extend RT PCRs Done
3,045,344 UART: [art] Lock RT PCRs Done
3,046,576 UART: [art] Populate DV Done
3,054,551 UART: [fht] FMC Alias Private Key: 7
3,055,653 UART: [art] Derive CDI
3,055,933 UART: [art] Store in slot 0x4
3,142,002 UART: [art] Derive Key Pair
3,142,362 UART: [art] Store priv key in slot 0x5
3,155,792 UART: [art] Derive Key Pair - Done
3,170,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,612 UART: [art] PUB.X = 4A81EA533CECACD87493B9EE44E691A5F846545A5A57A49201936D044638BAA7DBA3ADC101120654ED2D0C8B181EB41C
3,193,377 UART: [art] PUB.Y = F2CC0E9F80233AB4A221CAE643576A08198634E6F8782FDAD051C0C7C5DA30A09C02B1F45E920A048E345134E3F723CD
3,200,318 UART: [art] SIG.R = 02803DA7E7A9AD17F2A3B2C39875A7ECA9D2B4A53C3E8BFDF7959FBBB4FB535E82AC38ECFD3E37E44E33F7C70D21024E
3,207,103 UART: [art] SIG.S = 41927F465CC33A05B45E030C9D3F082DA103874C87166C83EC7CEE680E2BBFCBCDC4D549B85E09D78A6CA5225863B496
3,231,194 UART: Caliptra RT
3,231,537 UART: [state] CFI Enabled
3,351,565 UART: [rt] RT listening for mailbox commands...
3,352,235 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,237 UART: [rt]cmd =0x41544d4e, len=14344
3,784,651 >>> mbox cmd response data (8 bytes)
3,784,652 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,635 UART: [rt]cmd =0x41545348, len=116
3,836,740 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,557 ready_for_fw is high
1,059,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,297 >>> mbox cmd response: success
2,741,084 UART:
2,741,100 UART: Running Caliptra FMC ...
2,741,508 UART:
2,741,651 UART: [state] CFI Enabled
2,752,011 UART: [fht] FMC Alias Private Key: 7
2,871,209 UART: [art] Extend RT PCRs Done
2,871,637 UART: [art] Lock RT PCRs Done
2,873,215 UART: [art] Populate DV Done
2,881,556 UART: [fht] FMC Alias Private Key: 7
2,882,614 UART: [art] Derive CDI
2,882,894 UART: [art] Store in slot 0x4
2,968,139 UART: [art] Derive Key Pair
2,968,499 UART: [art] Store priv key in slot 0x5
2,981,513 UART: [art] Derive Key Pair - Done
2,995,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,160 UART: [art] PUB.X = DFC2C76E0BCE975655756B2AF2B7AADCB78B249502B8C40D3A5519D7B887BE7B5413DBCAD4F961C35FE810EBD7F3868B
3,018,941 UART: [art] PUB.Y = 9EEBFC1B1BD2B0B98450CFFB7AA599F7848655A3305194A8D1D0DF434CCF09C5A2BAE456977256410D413CF4FD3777DE
3,025,899 UART: [art] SIG.R = 3EBADF03B6614FA53CE7BE5F92AAA44890317639FD9775710C04BFE09609FB0E8EB2B5731A4208D57E7E64E66836B240
3,032,657 UART: [art] SIG.S = E0C99412A6E0BDA80BAB3B5442865EA2766EA1F3F32252C913C1E40C7035B8BB35DB88AD06DFA326BF86A7C98F4C6D8D
3,056,306 UART: Caliptra RT
3,056,649 UART: [state] CFI Enabled
3,175,898 UART: [rt] RT listening for mailbox commands...
3,176,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,610 UART: [rt]cmd =0x41544d4e, len=14344
3,608,938 >>> mbox cmd response data (8 bytes)
3,608,939 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,816 UART: [rt]cmd =0x41545348, len=116
3,660,883 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,892 UART: [state] LifecycleState = Unprovisioned
85,547 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,729 UART: [kat] SHA2-256
903,669 UART: [kat] SHA2-384
906,514 UART: [kat] SHA2-512-ACC
908,415 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
923,190 UART: [kat] LMS
1,171,518 UART: [kat] --
1,172,241 UART: [cold-reset] ++
1,172,745 UART: [fht] FHT @ 0x50003400
1,175,596 UART: [idev] ++
1,175,764 UART: [idev] CDI.KEYID = 6
1,176,124 UART: [idev] SUBJECT.KEYID = 7
1,176,548 UART: [idev] UDS.KEYID = 0
1,176,893 ready_for_fw is high
1,176,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,582 UART: [idev] Erasing UDS.KEYID = 0
1,201,631 UART: [idev] Sha1 KeyId Algorithm
1,210,149 UART: [idev] --
1,211,301 UART: [ldev] ++
1,211,469 UART: [ldev] CDI.KEYID = 6
1,211,832 UART: [ldev] SUBJECT.KEYID = 5
1,212,258 UART: [ldev] AUTHORITY.KEYID = 7
1,212,721 UART: [ldev] FE.KEYID = 1
1,217,997 UART: [ldev] Erasing FE.KEYID = 1
1,244,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,287 UART: [ldev] --
1,283,752 UART: [fwproc] Wait for Commands...
1,284,524 UART: [fwproc] Recv command 0x46574c44
1,285,252 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,170 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,471 >>> mbox cmd response: success
2,829,571 UART: [afmc] ++
2,829,739 UART: [afmc] CDI.KEYID = 6
2,830,101 UART: [afmc] SUBJECT.KEYID = 7
2,830,526 UART: [afmc] AUTHORITY.KEYID = 5
2,865,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,375 UART: [afmc] --
2,909,403 UART: [cold-reset] --
2,910,183 UART: [state] Locking Datavault
2,911,584 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,188 UART: [state] Locking ICCM
2,912,740 UART: [exit] Launching FMC @ 0x40000130
2,918,070 UART:
2,918,086 UART: Running Caliptra FMC ...
2,918,494 UART:
2,918,548 UART: [state] CFI Enabled
2,928,990 UART: [fht] FMC Alias Private Key: 7
3,047,922 UART: [art] Extend RT PCRs Done
3,048,350 UART: [art] Lock RT PCRs Done
3,050,222 UART: [art] Populate DV Done
3,058,443 UART: [fht] FMC Alias Private Key: 7
3,059,425 UART: [art] Derive CDI
3,059,705 UART: [art] Store in slot 0x4
3,145,296 UART: [art] Derive Key Pair
3,145,656 UART: [art] Store priv key in slot 0x5
3,158,534 UART: [art] Derive Key Pair - Done
3,173,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,978 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,743 UART: [art] PUB.X = 48BAD1F4F211B04D7411C0454E971AB67DA6BEC6D402A1AC4143D796E58E8ADDB0AF0253DAC6057C761773341A4ECD1C
3,196,518 UART: [art] PUB.Y = E4C0EA89B0E61EBF50350731F2AD5DE94DC99274B97C289376F76D2DA8FA00EFEC318EB24640F87556EDBBFA326494C3
3,203,457 UART: [art] SIG.R = 0289BBE975726A686071ED76E8C0AEEFA9A9A14294EAC5AD067D709A8768A18E2B4B43C8F499051CDDA6B74E5335B176
3,210,226 UART: [art] SIG.S = E8EF5FE4B23D020DEE470895417F4529417DBBE6084B6A9B81E589ADFEF444562CDEFA875260F3A33DF6273C03122EED
3,234,405 UART: Caliptra RT
3,234,656 UART: [state] CFI Enabled
3,354,293 UART: [rt] RT listening for mailbox commands...
3,354,963 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,925 UART: [rt]cmd =0x41544d4e, len=14344
3,787,941 >>> mbox cmd response data (8 bytes)
3,787,942 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,841 UART: [rt]cmd =0x41545348, len=116
3,840,476 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 ready_for_fw is high
1,060,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,994 >>> mbox cmd response: success
2,740,807 UART:
2,740,823 UART: Running Caliptra FMC ...
2,741,231 UART:
2,741,285 UART: [state] CFI Enabled
2,751,741 UART: [fht] FMC Alias Private Key: 7
2,870,795 UART: [art] Extend RT PCRs Done
2,871,223 UART: [art] Lock RT PCRs Done
2,872,883 UART: [art] Populate DV Done
2,880,992 UART: [fht] FMC Alias Private Key: 7
2,882,168 UART: [art] Derive CDI
2,882,448 UART: [art] Store in slot 0x4
2,968,163 UART: [art] Derive Key Pair
2,968,523 UART: [art] Store priv key in slot 0x5
2,981,947 UART: [art] Derive Key Pair - Done
2,996,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,969 UART: [art] PUB.X = E8F1724E93B9C18E47BD24716E440DF8D1A56268F01F6DD41FB211E4C75EC021C30EE88B7B6401D204C5FEAAD71FACB9
3,019,743 UART: [art] PUB.Y = 5A0AD646EFB026E4C9F70744CCADD7DC9789B4083371806C191F9C498B3EACA2C3EFBE5D2E7D7C9FD475202C0584C9FB
3,026,699 UART: [art] SIG.R = 9A4B24476834829E68AD201BC8689FE2600872BD8048B4BF12CD648884D5E59DEB70A628D0D297818CE0098A8C4FD243
3,033,461 UART: [art] SIG.S = 944746C93B3C61D0F841FA59115A95091C3A81B8E01218361483A66D47FF8D00A3FEE92E6700536956A3FE5FB5E458E4
3,056,978 UART: Caliptra RT
3,057,229 UART: [state] CFI Enabled
3,175,943 UART: [rt] RT listening for mailbox commands...
3,176,613 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,747 UART: [rt]cmd =0x41544d4e, len=14344
3,610,197 >>> mbox cmd response data (8 bytes)
3,610,198 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,271 UART: [rt]cmd =0x41545348, len=116
3,662,140 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,415 UART: [state] LifecycleState = Unprovisioned
86,070 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,106 UART: [kat] SHA2-256
904,046 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,507 UART: [kat] HMAC-384Kdf
922,953 UART: [kat] LMS
1,171,281 UART: [kat] --
1,171,760 UART: [cold-reset] ++
1,172,268 UART: [fht] FHT @ 0x50003400
1,174,759 UART: [idev] ++
1,174,927 UART: [idev] CDI.KEYID = 6
1,175,287 UART: [idev] SUBJECT.KEYID = 7
1,175,711 UART: [idev] UDS.KEYID = 0
1,176,056 ready_for_fw is high
1,176,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,631 UART: [idev] Erasing UDS.KEYID = 0
1,200,464 UART: [idev] Sha1 KeyId Algorithm
1,208,924 UART: [idev] --
1,210,122 UART: [ldev] ++
1,210,290 UART: [ldev] CDI.KEYID = 6
1,210,653 UART: [ldev] SUBJECT.KEYID = 5
1,211,079 UART: [ldev] AUTHORITY.KEYID = 7
1,211,542 UART: [ldev] FE.KEYID = 1
1,216,834 UART: [ldev] Erasing FE.KEYID = 1
1,243,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,908 UART: [ldev] --
1,283,269 UART: [fwproc] Wait for Commands...
1,284,061 UART: [fwproc] Recv command 0x46574c44
1,284,789 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,257 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,427 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,770 >>> mbox cmd response: success
2,830,020 UART: [afmc] ++
2,830,188 UART: [afmc] CDI.KEYID = 6
2,830,550 UART: [afmc] SUBJECT.KEYID = 7
2,830,975 UART: [afmc] AUTHORITY.KEYID = 5
2,866,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,998 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,622 UART: [afmc] --
2,909,554 UART: [cold-reset] --
2,910,474 UART: [state] Locking Datavault
2,911,881 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,485 UART: [state] Locking ICCM
2,912,999 UART: [exit] Launching FMC @ 0x40000130
2,918,329 UART:
2,918,345 UART: Running Caliptra FMC ...
2,918,753 UART:
2,918,896 UART: [state] CFI Enabled
2,929,730 UART: [fht] FMC Alias Private Key: 7
3,048,894 UART: [art] Extend RT PCRs Done
3,049,322 UART: [art] Lock RT PCRs Done
3,050,770 UART: [art] Populate DV Done
3,059,157 UART: [fht] FMC Alias Private Key: 7
3,060,213 UART: [art] Derive CDI
3,060,493 UART: [art] Store in slot 0x4
3,146,444 UART: [art] Derive Key Pair
3,146,804 UART: [art] Store priv key in slot 0x5
3,159,608 UART: [art] Derive Key Pair - Done
3,174,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,107 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,872 UART: [art] PUB.X = A16DC93A149B1E0E373009FF8B7053F77757BE3F84E59EA00E88B44E565A00B94270CE8392A25D23E5B34C7454374B08
3,197,606 UART: [art] PUB.Y = BC3C89434E323548A7BF179D769165F605C3F52C5FD7ACA3C7BD2490B6D82FEB188AC073EC390FECB4A6120745C90308
3,204,549 UART: [art] SIG.R = 9D13EFE216E9E7DB4B81C69939873C113D60B24D8A20FAF3B25B98818E1AE91079FD51D395D706B20AA8EBC6FB4B4275
3,211,323 UART: [art] SIG.S = C245CE2C81FF202180DC15B2ED6CEE2047AE80029900CEA1E128F43F5D6C77424F9D22D7C9074B5677E194CCC23AF6A6
3,235,153 UART: Caliptra RT
3,235,496 UART: [state] CFI Enabled
3,354,978 UART: [rt] RT listening for mailbox commands...
3,355,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,612 UART: [rt]cmd =0x41544d4e, len=14344
3,788,730 >>> mbox cmd response data (8 bytes)
3,788,731 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,694 UART: [rt]cmd =0x41545348, len=116
3,839,899 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,312 ready_for_fw is high
1,061,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,209 >>> mbox cmd response: success
2,744,206 UART:
2,744,222 UART: Running Caliptra FMC ...
2,744,630 UART:
2,744,773 UART: [state] CFI Enabled
2,755,327 UART: [fht] FMC Alias Private Key: 7
2,874,551 UART: [art] Extend RT PCRs Done
2,874,979 UART: [art] Lock RT PCRs Done
2,876,415 UART: [art] Populate DV Done
2,884,480 UART: [fht] FMC Alias Private Key: 7
2,885,440 UART: [art] Derive CDI
2,885,720 UART: [art] Store in slot 0x4
2,971,655 UART: [art] Derive Key Pair
2,972,015 UART: [art] Store priv key in slot 0x5
2,985,397 UART: [art] Derive Key Pair - Done
3,000,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,965 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,730 UART: [art] PUB.X = 38A3D7E05721023FC809AE0072B269C9515A90203E69D55ACDB9C02320F3A71AE1E25D803D3B3399670FD1E5F035043C
3,023,464 UART: [art] PUB.Y = 813AE15A6A2E840F49EBA4CFE67D1D0BBB8F5BD182BD2B3299339E81C703A0BF83A3424D5A1A5A40E2567D2F36CBB18C
3,030,423 UART: [art] SIG.R = 8BCFE36F99AC9281CD6D57FC28149D061805F92AE66CF48D6BB7141D74C81F65B3D66ED02D32DC3DAC72A64AF79C56E1
3,037,203 UART: [art] SIG.S = F2A1F374AEE5FE801B25A61A926F647C1AD5458818EF5ECB61D9FA659E895BCA7AB4C33DAB8C56FCC7594A45C6D139C7
3,061,409 UART: Caliptra RT
3,061,752 UART: [state] CFI Enabled
3,181,256 UART: [rt] RT listening for mailbox commands...
3,181,926 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,088 UART: [rt]cmd =0x41544d4e, len=14344
3,614,824 >>> mbox cmd response data (8 bytes)
3,614,825 <<< Executing mbox cmd 0x41545348 (116 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,826 UART: [rt]cmd =0x41545348, len=116
3,666,655 >>> mbox cmd response data (12 bytes)
test test_authorize_and_stash::test_authorize_and_stash_fwid_127 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,084 UART:
192,449 UART: Running Caliptra ROM ...
193,568 UART:
193,714 UART: [state] CFI Enabled
266,743 UART: [state] LifecycleState = Unprovisioned
268,712 UART: [state] DebugLocked = No
271,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,734 UART: [kat] SHA2-256
446,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,926 UART: [kat] ++
457,448 UART: [kat] sha1
468,107 UART: [kat] SHA2-256
470,837 UART: [kat] SHA2-384
477,609 UART: [kat] SHA2-512-ACC
479,975 UART: [kat] ECC-384
2,768,301 UART: [kat] HMAC-384Kdf
2,782,043 UART: [kat] LMS
3,972,368 UART: [kat] --
3,976,263 UART: [cold-reset] ++
3,977,704 UART: [fht] Storing FHT @ 0x50003400
3,989,604 UART: [idev] ++
3,990,179 UART: [idev] CDI.KEYID = 6
3,991,177 UART: [idev] SUBJECT.KEYID = 7
3,992,351 UART: [idev] UDS.KEYID = 0
3,993,431 ready_for_fw is high
3,993,650 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,038,078 UART: [idev] Erasing UDS.KEYID = 0
7,326,348 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,094 UART: [idev] --
7,352,525 UART: [ldev] ++
7,353,149 UART: [ldev] CDI.KEYID = 6
7,354,120 UART: [ldev] SUBJECT.KEYID = 5
7,355,279 UART: [ldev] AUTHORITY.KEYID = 7
7,356,565 UART: [ldev] FE.KEYID = 1
7,382,836 UART: [ldev] Erasing FE.KEYID = 1
10,718,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,674 UART: [ldev] --
13,099,722 UART: [fwproc] Waiting for Commands...
13,102,784 UART: [fwproc] Received command 0x46574c44
13,104,960 UART: [fwproc] Received Image of size 34948 bytes
16,189,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,259,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,332,330 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,368,466 >>> mbox cmd response: success
16,371,983 UART: [afmc] ++
16,372,588 UART: [afmc] CDI.KEYID = 6
16,373,513 UART: [afmc] SUBJECT.KEYID = 7
16,374,783 UART: [afmc] AUTHORITY.KEYID = 5
19,735,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,029,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,031,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,046,323 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,060,992 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,075,426 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,096,993 UART: [afmc] --
22,099,996 UART: [cold-reset] --
22,104,316 UART: [state] Locking Datavault
22,108,987 UART: [state] Locking PCR0, PCR1 and PCR31
22,110,745 UART: [state] Locking ICCM
22,112,468 UART: [exit] Launching FMC @ 0x40000130
22,120,836 UART:
22,121,080 UART: Running Caliptra FMC ...
22,122,233 UART:
22,122,394 UART: [state] CFI Enabled
22,191,432 UART: [fht] FMC Alias Private Key: 7
24,552,483 UART: [art] Extend RT PCRs Done
24,553,745 UART: [art] Lock RT PCRs Done
24,555,694 UART: [art] Populate DV Done
24,561,201 UART: [fht] FMC Alias Private Key: 7
24,562,795 UART: [art] Derive CDI
24,563,569 UART: [art] Store in slot 0x4
24,621,088 UART: [art] Derive Key Pair
24,622,169 UART: [art] Store priv key in slot 0x5
27,915,150 UART: [art] Derive Key Pair - Done
27,928,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,216,896 UART: [art] Erasing AUTHORITY.KEYID = 7
30,218,450 UART: [art] PUB.X = ADBC7654C0AF820B59A036F16D141F429ADF6BA48027D0F9717E2E9CA6A1B6A3BBD14D2CF6A87853F69048685B37A639
30,225,679 UART: [art] PUB.Y = 16FCD70F50BD9EB5950035A15263FCB42274E2048A059F1811A6E925D00161D9FEB4448EA9CBF1682A591720F5C90751
30,232,921 UART: [art] SIG.R = AC787938D5F49B852DA285384001324A773B39027B6545B844D932E2F53FE210546EFB7229F125BE4FAA5FE36C6E2F43
30,240,326 UART: [art] SIG.S = 738A15EDFC0ED7BFFDC46A1793D8786BB7DBC64F1F1D9609C53D33820830F56CB4F4F74573F0A4489A2529B560718212
31,544,734 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
3,785,336 ready_for_fw is high
3,785,762 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,213,969 >>> mbox cmd response: success
21,904,010 UART:
21,904,408 UART: Running Caliptra FMC ...
21,905,629 UART:
21,905,804 UART: [state] CFI Enabled
21,975,710 UART: [fht] FMC Alias Private Key: 7
24,337,065 UART: [art] Extend RT PCRs Done
24,338,348 UART: [art] Lock RT PCRs Done
24,339,817 UART: [art] Populate DV Done
24,345,141 UART: [fht] FMC Alias Private Key: 7
24,346,678 UART: [art] Derive CDI
24,347,490 UART: [art] Store in slot 0x4
24,406,263 UART: [art] Derive Key Pair
24,407,356 UART: [art] Store priv key in slot 0x5
27,699,585 UART: [art] Derive Key Pair - Done
27,712,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,002,251 UART: [art] Erasing AUTHORITY.KEYID = 7
30,003,822 UART: [art] PUB.X = 947EE7490969DA872B4F1D3B8F610CE8122F760458867C27A203AFC69C1584BEAF9449CE93A5ADB52F2A26C86B5D9C2C
30,011,060 UART: [art] PUB.Y = B48068AD2DCD1D24B85C6434342CD917371855EBAD783980EA7BDA59D23F7F26A3C3B776BBF639D116BA67003EE1F39F
30,018,217 UART: [art] SIG.R = CB3CB98A74514F75AC87C4C72C4EBD9AED647F8D673455F6A26E39BC8DDCDB85684FF4E2E292DB45CCD57644C85C14BB
30,025,716 UART: [art] SIG.S = 1F08662A0EF0EAF02F540292A2C40413AA65E5DD66E7F15005B1627CF1531720BA2388431C1C92EB0B68D9E3AE61581F
31,330,354 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,292 UART:
192,671 UART: Running Caliptra ROM ...
193,856 UART:
603,454 UART: [state] CFI Enabled
615,489 UART: [state] LifecycleState = Unprovisioned
617,435 UART: [state] DebugLocked = No
619,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,314 UART: [kat] SHA2-256
793,101 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,613 UART: [kat] ++
804,090 UART: [kat] sha1
814,751 UART: [kat] SHA2-256
817,461 UART: [kat] SHA2-384
823,934 UART: [kat] SHA2-512-ACC
826,291 UART: [kat] ECC-384
3,108,847 UART: [kat] HMAC-384Kdf
3,121,708 UART: [kat] LMS
4,311,860 UART: [kat] --
4,316,584 UART: [cold-reset] ++
4,318,153 UART: [fht] Storing FHT @ 0x50003400
4,330,129 UART: [idev] ++
4,330,767 UART: [idev] CDI.KEYID = 6
4,331,643 UART: [idev] SUBJECT.KEYID = 7
4,332,880 UART: [idev] UDS.KEYID = 0
4,333,860 ready_for_fw is high
4,334,056 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
4,378,092 UART: [idev] Erasing UDS.KEYID = 0
7,620,888 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,824 UART: [idev] --
7,648,248 UART: [ldev] ++
7,648,864 UART: [ldev] CDI.KEYID = 6
7,649,742 UART: [ldev] SUBJECT.KEYID = 5
7,651,002 UART: [ldev] AUTHORITY.KEYID = 7
7,652,307 UART: [ldev] FE.KEYID = 1
7,662,440 UART: [ldev] Erasing FE.KEYID = 1
10,949,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,777 UART: [ldev] --
13,309,502 UART: [fwproc] Waiting for Commands...
13,311,591 UART: [fwproc] Received command 0x46574c44
13,313,772 UART: [fwproc] Received Image of size 34948 bytes
16,397,607 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,473,245 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,546,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
16,582,364 >>> mbox cmd response: success
16,586,315 UART: [afmc] ++
16,586,970 UART: [afmc] CDI.KEYID = 6
16,587,964 UART: [afmc] SUBJECT.KEYID = 7
16,589,139 UART: [afmc] AUTHORITY.KEYID = 5
19,908,643 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,202,175 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,204,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,218,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,233,604 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,248,018 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,269,836 UART: [afmc] --
22,273,959 UART: [cold-reset] --
22,278,941 UART: [state] Locking Datavault
22,283,620 UART: [state] Locking PCR0, PCR1 and PCR31
22,285,368 UART: [state] Locking ICCM
22,286,933 UART: [exit] Launching FMC @ 0x40000130
22,295,289 UART:
22,295,547 UART: Running Caliptra FMC ...
22,296,594 UART:
22,296,739 UART: [state] CFI Enabled
22,305,151 UART: [fht] FMC Alias Private Key: 7
24,645,844 UART: [art] Extend RT PCRs Done
24,647,097 UART: [art] Lock RT PCRs Done
24,648,423 UART: [art] Populate DV Done
24,653,729 UART: [fht] FMC Alias Private Key: 7
24,655,380 UART: [art] Derive CDI
24,656,144 UART: [art] Store in slot 0x4
24,698,859 UART: [art] Derive Key Pair
24,699,892 UART: [art] Store priv key in slot 0x5
27,941,986 UART: [art] Derive Key Pair - Done
27,954,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,235,644 UART: [art] Erasing AUTHORITY.KEYID = 7
30,237,197 UART: [art] PUB.X = B77B97C5F0B6A29884EC9F28755B9A31543C78DF7D6BC58AFE70D0C2EE1FF9801FFB11C34FBEDD9580D8443C976D6F1F
30,244,516 UART: [art] PUB.Y = 8B0341F37CE67F7CFD1D5EA5A9273955263861F4E4F8BDE8C66D3F130CB816C973C985B8B42C6452BC840B76282F8EA8
30,251,742 UART: [art] SIG.R = E76F6AC76D522A2D8C95779FBB4BED192C2E981E50CD3E66B5C71914155C39AB644786CB75097146B1F67DDD96DC7071
30,259,143 UART: [art] SIG.S = 7DDE6D66504B9E80BCC8FA021D33600230F0D2A6C949D75C87AA094300EADB6542EB62A3DBC40546D630CCB567D648AC
31,564,207 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,126,094 ready_for_fw is high
4,126,476 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
16,467,894 >>> mbox cmd response: success
22,110,982 UART:
22,111,375 UART: Running Caliptra FMC ...
22,112,565 UART:
22,112,736 UART: [state] CFI Enabled
22,120,776 UART: [fht] FMC Alias Private Key: 7
24,460,611 UART: [art] Extend RT PCRs Done
24,461,906 UART: [art] Lock RT PCRs Done
24,463,148 UART: [art] Populate DV Done
24,468,561 UART: [fht] FMC Alias Private Key: 7
24,470,161 UART: [art] Derive CDI
24,471,013 UART: [art] Store in slot 0x4
24,513,810 UART: [art] Derive Key Pair
24,514,851 UART: [art] Store priv key in slot 0x5
27,757,525 UART: [art] Derive Key Pair - Done
27,770,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,051,166 UART: [art] Erasing AUTHORITY.KEYID = 7
30,052,753 UART: [art] PUB.X = 97EBA5734F79CFEDDB25D575FF46825489A961438B19CC25D2B44F8E4A035855A39AE118A409F730C3D3416F30D18023
30,059,977 UART: [art] PUB.Y = 1EC4A9930EE30AA2D3A045BD8E805F0474765563287EF3B5CF0047C7C5BD2BEDAF197B3195740CD8981FBF3350C76D99
30,067,228 UART: [art] SIG.R = 4CD1694F4327F24BCA33CED491752C54E96BF0CD1B66ADB6B86682744AAD4DC36CF08B14FD6B4923D88E33548A6DC1B2
30,074,650 UART: [art] SIG.S = D421D625744452CE8CEEE98FD95D8DFCE73DF4FF05ED5866AD054AD81B95A59675EB404CD1A6923B23BAEADD996A93D9
31,379,247 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,276 UART:
192,683 UART: Running Caliptra ROM ...
193,851 UART:
194,024 UART: [state] CFI Enabled
266,568 UART: [state] LifecycleState = Unprovisioned
268,504 UART: [state] DebugLocked = No
270,959 UART: [state] WD Timer not started. Device not locked for debugging
275,630 UART: [kat] SHA2-256
455,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,048 UART: [kat] ++
466,495 UART: [kat] sha1
478,072 UART: [kat] SHA2-256
480,716 UART: [kat] SHA2-384
485,917 UART: [kat] SHA2-512-ACC
488,284 UART: [kat] ECC-384
2,949,209 UART: [kat] HMAC-384Kdf
2,972,881 UART: [kat] LMS
3,449,366 UART: [kat] --
3,452,015 UART: [cold-reset] ++
3,453,108 UART: [fht] FHT @ 0x50003400
3,463,569 UART: [idev] ++
3,464,151 UART: [idev] CDI.KEYID = 6
3,465,064 UART: [idev] SUBJECT.KEYID = 7
3,466,308 UART: [idev] UDS.KEYID = 0
3,467,226 ready_for_fw is high
3,467,409 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,511,542 UART: [idev] Erasing UDS.KEYID = 0
5,991,629 UART: [idev] Sha1 KeyId Algorithm
6,014,965 UART: [idev] --
6,019,962 UART: [ldev] ++
6,020,540 UART: [ldev] CDI.KEYID = 6
6,021,478 UART: [ldev] SUBJECT.KEYID = 5
6,022,693 UART: [ldev] AUTHORITY.KEYID = 7
6,023,920 UART: [ldev] FE.KEYID = 1
6,057,467 UART: [ldev] Erasing FE.KEYID = 1
8,564,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,876 UART: [ldev] --
10,372,594 UART: [fwproc] Wait for Commands...
10,374,463 UART: [fwproc] Recv command 0x46574c44
10,376,497 UART: [fwproc] Recv'd Img size: 34948 bytes
12,827,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,905,884 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,978,895 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,014,306 >>> mbox cmd response: success
13,018,008 UART: [afmc] ++
13,018,652 UART: [afmc] CDI.KEYID = 6
13,019,581 UART: [afmc] SUBJECT.KEYID = 7
13,020,760 UART: [afmc] AUTHORITY.KEYID = 5
15,550,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,273,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,276,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,291,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,307,892 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,323,485 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,347,731 UART: [afmc] --
17,352,135 UART: [cold-reset] --
17,355,050 UART: [state] Locking Datavault
17,358,955 UART: [state] Locking PCR0, PCR1 and PCR31
17,360,698 UART: [state] Locking ICCM
17,361,793 UART: [exit] Launching FMC @ 0x40000130
17,370,237 UART:
17,370,487 UART: Running Caliptra FMC ...
17,371,615 UART:
17,371,797 UART: [state] CFI Enabled
17,429,597 UART: [fht] FMC Alias Private Key: 7
19,196,313 UART: [art] Extend RT PCRs Done
19,197,579 UART: [art] Lock RT PCRs Done
19,199,114 UART: [art] Populate DV Done
19,204,417 UART: [fht] FMC Alias Private Key: 7
19,205,928 UART: [art] Derive CDI
19,206,691 UART: [art] Store in slot 0x4
19,262,252 UART: [art] Derive Key Pair
19,263,331 UART: [art] Store priv key in slot 0x5
21,725,483 UART: [art] Derive Key Pair - Done
21,738,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,451,769 UART: [art] Erasing AUTHORITY.KEYID = 7
23,453,330 UART: [art] PUB.X = E2F8C3E72146AEA120626BFD544CE4166432E59CBE2E2F0180636F062108D824F9D84F8306BCA15A248551DDD3B5FB60
23,460,554 UART: [art] PUB.Y = C37B9EF92C822F0363CA0E3C0A763B6B6E5A3D5004AD5D91BEA215DB7E0B74987A85B192EAF5857482D0842F22C6AF89
23,467,783 UART: [art] SIG.R = C168C0356AD9E1F6A28CD6EE8D7BAD2FAA0276BF14B7198BAD1563CFF9D1842CE6F40FAE0740776B4966B874454C6E7B
23,475,201 UART: [art] SIG.S = 617BEBFB8479DFF86C13A3EF675BCF971D04B87491290CF0137602A3EF051ABE7F5D76AD71DB3C9838F2FE0DB543999C
24,453,351 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,459,918 ready_for_fw is high
3,460,308 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
12,894,365 >>> mbox cmd response: success
17,193,630 UART:
17,194,100 UART: Running Caliptra FMC ...
17,195,217 UART:
17,195,368 UART: [state] CFI Enabled
17,259,054 UART: [fht] FMC Alias Private Key: 7
19,025,421 UART: [art] Extend RT PCRs Done
19,026,715 UART: [art] Lock RT PCRs Done
19,028,320 UART: [art] Populate DV Done
19,034,004 UART: [fht] FMC Alias Private Key: 7
19,035,748 UART: [art] Derive CDI
19,036,531 UART: [art] Store in slot 0x4
19,091,471 UART: [art] Derive Key Pair
19,092,571 UART: [art] Store priv key in slot 0x5
21,555,257 UART: [art] Derive Key Pair - Done
21,568,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,281,064 UART: [art] Erasing AUTHORITY.KEYID = 7
23,282,635 UART: [art] PUB.X = BB539963328107D8FBF63446E1C50F0E18676626566CD2D101697614C71858311B052F401AA25198E3971DCA02998A1B
23,289,764 UART: [art] PUB.Y = 22FF515727EB741DB45925D9129D1A446298725B2CB3308897045D27E78F208DDCE45BE86B59C0EF076D773770C2D04D
23,296,986 UART: [art] SIG.R = F6581DA7E1E8063EDFE2E9C367AA42A1E576C0E471CFF25CDA01EF656636D1D63D70EE342C73B01B93176FA66D40A8D7
23,304,473 UART: [art] SIG.S = 235447CBEE06835EF1717F8AC519FB38236095CFA74DFF30DAA895AB7018B4476FA3C1CBC5A34793CDA9C1A10F992BF4
24,283,125 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,291 writing to cptra_bootfsm_go
193,584 UART:
193,939 UART: Running Caliptra ROM ...
195,120 UART:
604,938 UART: [state] CFI Enabled
619,033 UART: [state] LifecycleState = Unprovisioned
620,991 UART: [state] DebugLocked = No
622,594 UART: [state] WD Timer not started. Device not locked for debugging
626,428 UART: [kat] SHA2-256
806,098 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,859 UART: [kat] ++
817,308 UART: [kat] sha1
829,246 UART: [kat] SHA2-256
831,908 UART: [kat] SHA2-384
837,334 UART: [kat] SHA2-512-ACC
839,654 UART: [kat] ECC-384
3,280,756 UART: [kat] HMAC-384Kdf
3,294,536 UART: [kat] LMS
3,771,051 UART: [kat] --
3,776,039 UART: [cold-reset] ++
3,777,331 UART: [fht] FHT @ 0x50003400
3,789,513 UART: [idev] ++
3,790,089 UART: [idev] CDI.KEYID = 6
3,791,012 UART: [idev] SUBJECT.KEYID = 7
3,792,261 UART: [idev] UDS.KEYID = 0
3,793,193 ready_for_fw is high
3,793,387 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,837,413 UART: [idev] Erasing UDS.KEYID = 0
6,270,498 UART: [idev] Sha1 KeyId Algorithm
6,293,687 UART: [idev] --
6,299,135 UART: [ldev] ++
6,299,726 UART: [ldev] CDI.KEYID = 6
6,300,643 UART: [ldev] SUBJECT.KEYID = 5
6,301,863 UART: [ldev] AUTHORITY.KEYID = 7
6,303,097 UART: [ldev] FE.KEYID = 1
6,315,102 UART: [ldev] Erasing FE.KEYID = 1
8,793,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,735 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,866 UART: [ldev] --
10,590,605 UART: [fwproc] Wait for Commands...
10,592,783 UART: [fwproc] Recv command 0x46574c44
10,594,833 UART: [fwproc] Recv'd Img size: 34948 bytes
13,047,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,130,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,203,744 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,239,880 >>> mbox cmd response: success
13,243,550 UART: [afmc] ++
13,244,205 UART: [afmc] CDI.KEYID = 6
13,245,145 UART: [afmc] SUBJECT.KEYID = 7
13,246,346 UART: [afmc] AUTHORITY.KEYID = 5
15,749,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,472,499 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,474,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,490,564 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,506,602 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,522,171 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,546,905 UART: [afmc] --
17,550,557 UART: [cold-reset] --
17,553,800 UART: [state] Locking Datavault
17,558,955 UART: [state] Locking PCR0, PCR1 and PCR31
17,560,731 UART: [state] Locking ICCM
17,562,312 UART: [exit] Launching FMC @ 0x40000130
17,570,749 UART:
17,570,998 UART: Running Caliptra FMC ...
17,572,133 UART:
17,572,295 UART: [state] CFI Enabled
17,580,373 UART: [fht] FMC Alias Private Key: 7
19,346,447 UART: [art] Extend RT PCRs Done
19,347,702 UART: [art] Lock RT PCRs Done
19,349,306 UART: [art] Populate DV Done
19,354,617 UART: [fht] FMC Alias Private Key: 7
19,356,207 UART: [art] Derive CDI
19,357,058 UART: [art] Store in slot 0x4
19,399,819 UART: [art] Derive Key Pair
19,400,896 UART: [art] Store priv key in slot 0x5
21,828,067 UART: [art] Derive Key Pair - Done
21,841,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,547,595 UART: [art] Erasing AUTHORITY.KEYID = 7
23,549,143 UART: [art] PUB.X = 3DE16B18AD2F373AC0E89823F1AB7D1034D4934130ED7B309F2D02EC30DB65809EBA7BAA9253C0409E18E1869C16105A
23,556,360 UART: [art] PUB.Y = 374A53CF9156C5E9B83844714E0DC29CF6A09A111B5CD94009305CCE00D428D7CF758FE3CFC78001158856D22865174E
23,563,683 UART: [art] SIG.R = 698B0A67A99DB9631C96C7BF849D5A131ABF5CB57D96653F846AC2C4C7BF94288B916809CAEE776F45D53E6EFE3AFE04
23,571,088 UART: [art] SIG.S = 088E8E70716DD469F27C5ECD3261FED373593F70910F069F93C31FAC16853224425094A3634A3E3D8CECFAFE55910CF7
24,549,583 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,776,416 ready_for_fw is high
3,776,830 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,104,656 >>> mbox cmd response: success
17,351,400 UART:
17,351,806 UART: Running Caliptra FMC ...
17,353,123 UART:
17,353,296 UART: [state] CFI Enabled
17,361,072 UART: [fht] FMC Alias Private Key: 7
19,126,957 UART: [art] Extend RT PCRs Done
19,128,240 UART: [art] Lock RT PCRs Done
19,130,029 UART: [art] Populate DV Done
19,135,566 UART: [fht] FMC Alias Private Key: 7
19,137,200 UART: [art] Derive CDI
19,138,068 UART: [art] Store in slot 0x4
19,180,422 UART: [art] Derive Key Pair
19,181,511 UART: [art] Store priv key in slot 0x5
21,608,646 UART: [art] Derive Key Pair - Done
21,621,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,327,280 UART: [art] Erasing AUTHORITY.KEYID = 7
23,328,836 UART: [art] PUB.X = AECE607006F19CCE8D83FB5D2AB6EA92AE4ABFA000927A3C27F35EB576C9C1CC9382291D1ED2F55C93ADA4614050B76E
23,336,052 UART: [art] PUB.Y = 790E91B9F184F88DD53304728B7F3C34E026D0BA1B497B789B35AFA67F80029955C4E4C58899F104E77DC5CBBDAC201E
23,343,369 UART: [art] SIG.R = 50A055CAA63AB09C15842104CB4F8CBAFE4BEF355A9A7439742D3917912DA4ED14435C5C12475F0A64A973228E1D6D49
23,350,782 UART: [art] SIG.S = 2CC96C784BE05E9C30D547DF1BE9CCE8DE743F60F68E96B3F15658C2152A49EC8DA44197BBFC9134FA54075C67512B50
24,329,031 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,233 UART:
192,587 UART: Running Caliptra ROM ...
193,758 UART:
193,916 UART: [state] CFI Enabled
264,643 UART: [state] LifecycleState = Unprovisioned
267,058 UART: [state] DebugLocked = No
268,385 UART: [state] WD Timer not started. Device not locked for debugging
273,769 UART: [kat] SHA2-256
463,680 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,414 UART: [kat] ++
474,872 UART: [kat] sha1
485,135 UART: [kat] SHA2-256
488,138 UART: [kat] SHA2-384
494,192 UART: [kat] SHA2-512-ACC
496,781 UART: [kat] ECC-384
2,946,061 UART: [kat] HMAC-384Kdf
2,971,828 UART: [kat] LMS
3,503,636 UART: [kat] --
3,508,351 UART: [cold-reset] ++
3,510,305 UART: [fht] FHT @ 0x50003400
3,520,786 UART: [idev] ++
3,521,486 UART: [idev] CDI.KEYID = 6
3,522,440 UART: [idev] SUBJECT.KEYID = 7
3,523,676 UART: [idev] UDS.KEYID = 0
3,524,574 ready_for_fw is high
3,524,793 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,568,981 UART: [idev] Erasing UDS.KEYID = 0
6,029,184 UART: [idev] Sha1 KeyId Algorithm
6,051,443 UART: [idev] --
6,055,547 UART: [ldev] ++
6,056,230 UART: [ldev] CDI.KEYID = 6
6,057,155 UART: [ldev] SUBJECT.KEYID = 5
6,058,307 UART: [ldev] AUTHORITY.KEYID = 7
6,059,532 UART: [ldev] FE.KEYID = 1
6,100,026 UART: [ldev] Erasing FE.KEYID = 1
8,604,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,360 UART: [ldev] --
10,414,571 UART: [fwproc] Wait for Commands...
10,416,499 UART: [fwproc] Recv command 0x46574c44
10,418,824 UART: [fwproc] Recv'd Img size: 34948 bytes
12,895,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,975,499 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,099,096 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,158,243 >>> mbox cmd response: success
13,162,204 UART: [afmc] ++
13,162,844 UART: [afmc] CDI.KEYID = 6
13,164,040 UART: [afmc] SUBJECT.KEYID = 7
13,165,545 UART: [afmc] AUTHORITY.KEYID = 5
15,700,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,423,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,425,165 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,440,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,455,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,470,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,494,933 UART: [afmc] --
17,498,459 UART: [cold-reset] --
17,503,056 UART: [state] Locking Datavault
17,508,923 UART: [state] Locking PCR0, PCR1 and PCR31
17,511,203 UART: [state] Locking ICCM
17,512,962 UART: [exit] Launching FMC @ 0x40000130
17,521,634 UART:
17,521,889 UART: Running Caliptra FMC ...
17,523,022 UART:
17,523,189 UART: [state] CFI Enabled
17,579,909 UART: [fht] FMC Alias Private Key: 7
19,346,619 UART: [art] Extend RT PCRs Done
19,348,035 UART: [art] Lock RT PCRs Done
19,349,396 UART: [art] Populate DV Done
19,354,698 UART: [fht] FMC Alias Private Key: 7
19,356,213 UART: [art] Derive CDI
19,357,060 UART: [art] Store in slot 0x4
19,414,233 UART: [art] Derive Key Pair
19,415,257 UART: [art] Store priv key in slot 0x5
21,877,994 UART: [art] Derive Key Pair - Done
21,891,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,603,560 UART: [art] Erasing AUTHORITY.KEYID = 7
23,605,147 UART: [art] PUB.X = 7B7025B6460B67FECDFBB93C2853E24406E004E6EF779C70181C480A5D1A86307A7C3466F701F4330223B5A0AFBC194E
23,612,358 UART: [art] PUB.Y = 71A07FA985D972D05EF899DCABD0771DADFC464568FFC201DB071BBA8C813AF7598031D69CCB592E27A062580BE67560
23,619,666 UART: [art] SIG.R = 5165A5078CF3BFC6EFF0D164B7488DD0E7AAE3EF52CBF94F2229AF3A0CE1348D269618C65D96384CEEFBADFCC7D22658
23,627,070 UART: [art] SIG.S = C9CE6DFE46F0D950DD262CBA1D35E2AC2F49F4933E1A393918D5C8980571FA9319F7AFB794216B136A04C235B45B39DB
24,605,728 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,766 writing to cptra_bootfsm_go
3,440,787 ready_for_fw is high
3,441,176 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,049,206 >>> mbox cmd response: success
17,342,703 UART:
17,343,102 UART: Running Caliptra FMC ...
17,344,237 UART:
17,344,396 UART: [state] CFI Enabled
17,407,625 UART: [fht] FMC Alias Private Key: 7
19,173,692 UART: [art] Extend RT PCRs Done
19,174,972 UART: [art] Lock RT PCRs Done
19,176,556 UART: [art] Populate DV Done
19,181,959 UART: [fht] FMC Alias Private Key: 7
19,183,626 UART: [art] Derive CDI
19,184,481 UART: [art] Store in slot 0x4
19,240,918 UART: [art] Derive Key Pair
19,242,008 UART: [art] Store priv key in slot 0x5
21,704,842 UART: [art] Derive Key Pair - Done
21,717,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,431,402 UART: [art] Erasing AUTHORITY.KEYID = 7
23,433,295 UART: [art] PUB.X = 6E1BD1B6CB4AC1D101EE40E0B61323542893CC515ABA2B6FB517299B450FD9700BFAD398C36C38E0EDDF050DBB1210A8
23,440,189 UART: [art] PUB.Y = E11F0DDAB3CA26A156E97D34E1177E81D24590A8FD2B73EB6999CC4707BEECB146D55DF8052C5DE6B38E719CB9F6FF0E
23,447,434 UART: [art] SIG.R = 469CBB6B3BC1AD4240D728DAE9D62717314D99D80B3687C473689D6DF6D71B2C92AAE71AB6CC70D8A8B773423E7D8ADA
23,454,857 UART: [art] SIG.S = E89E122C2F558BD99E47BBEF4D2E06D265BC990FFC62922D44274C917D386F9E3457C3864A0AC9262B1B615878F75D82
24,433,241 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,478 UART:
192,838 UART: Running Caliptra ROM ...
194,029 UART:
603,638 UART: [state] CFI Enabled
617,316 UART: [state] LifecycleState = Unprovisioned
619,697 UART: [state] DebugLocked = No
622,081 UART: [state] WD Timer not started. Device not locked for debugging
627,027 UART: [kat] SHA2-256
816,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,698 UART: [kat] ++
828,300 UART: [kat] sha1
841,102 UART: [kat] SHA2-256
844,124 UART: [kat] SHA2-384
849,413 UART: [kat] SHA2-512-ACC
852,022 UART: [kat] ECC-384
3,293,259 UART: [kat] HMAC-384Kdf
3,305,413 UART: [kat] LMS
3,837,282 UART: [kat] --
3,840,782 UART: [cold-reset] ++
3,842,001 UART: [fht] FHT @ 0x50003400
3,854,404 UART: [idev] ++
3,855,122 UART: [idev] CDI.KEYID = 6
3,856,111 UART: [idev] SUBJECT.KEYID = 7
3,857,291 UART: [idev] UDS.KEYID = 0
3,858,219 ready_for_fw is high
3,858,411 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
3,902,420 UART: [idev] Erasing UDS.KEYID = 0
6,334,932 UART: [idev] Sha1 KeyId Algorithm
6,357,888 UART: [idev] --
6,363,177 UART: [ldev] ++
6,363,928 UART: [ldev] CDI.KEYID = 6
6,364,846 UART: [ldev] SUBJECT.KEYID = 5
6,365,958 UART: [ldev] AUTHORITY.KEYID = 7
6,367,192 UART: [ldev] FE.KEYID = 1
6,379,789 UART: [ldev] Erasing FE.KEYID = 1
8,856,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,126 UART: [ldev] --
10,643,349 UART: [fwproc] Wait for Commands...
10,645,337 UART: [fwproc] Recv command 0x46574c44
10,647,647 UART: [fwproc] Recv'd Img size: 34948 bytes
13,116,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,197,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,320,613 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
13,379,945 >>> mbox cmd response: success
13,383,208 UART: [afmc] ++
13,383,825 UART: [afmc] CDI.KEYID = 6
13,384,937 UART: [afmc] SUBJECT.KEYID = 7
13,386,515 UART: [afmc] AUTHORITY.KEYID = 5
15,892,638 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,614,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,616,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,631,339 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,646,496 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,661,419 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,684,593 UART: [afmc] --
17,689,027 UART: [cold-reset] --
17,693,555 UART: [state] Locking Datavault
17,699,115 UART: [state] Locking PCR0, PCR1 and PCR31
17,701,334 UART: [state] Locking ICCM
17,703,033 UART: [exit] Launching FMC @ 0x40000130
17,711,711 UART:
17,711,960 UART: Running Caliptra FMC ...
17,713,099 UART:
17,713,267 UART: [state] CFI Enabled
17,721,317 UART: [fht] FMC Alias Private Key: 7
19,487,542 UART: [art] Extend RT PCRs Done
19,488,787 UART: [art] Lock RT PCRs Done
19,490,075 UART: [art] Populate DV Done
19,495,394 UART: [fht] FMC Alias Private Key: 7
19,497,069 UART: [art] Derive CDI
19,497,931 UART: [art] Store in slot 0x4
19,540,757 UART: [art] Derive Key Pair
19,541,832 UART: [art] Store priv key in slot 0x5
21,968,313 UART: [art] Derive Key Pair - Done
21,981,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,687,407 UART: [art] Erasing AUTHORITY.KEYID = 7
23,688,965 UART: [art] PUB.X = 4F1956BC7F6BC7E48194EC83EC9DDC8D3D57F8907AC5034F4DA765D086ACB5893C43DF830E0309A9F8455B1E5043BD06
23,696,193 UART: [art] PUB.Y = BBCE45A78EE417019E768676664FAEAC4CB7A60A66DC19D2B2D527567ECB1AF72C2D23B3F8B78CD8C15DDCCE4FA1255A
23,703,527 UART: [art] SIG.R = F14CEA55690967AB1C27732C9CC33E0699D0D1F65724ED364CD79D7CD47B76BB6527115E8443291A1FB97E68E15AD718
23,710,951 UART: [art] SIG.S = 414072F54F9DDAAF174E08F4D09C0C2F1228846A2453C345E847D1FAAD9247C1D678D8D656E56B3F04DF270DEC86A06C
24,689,562 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,752,542 ready_for_fw is high
3,752,989 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
13,258,138 >>> mbox cmd response: success
17,515,033 UART:
17,515,432 UART: Running Caliptra FMC ...
17,516,577 UART:
17,516,747 UART: [state] CFI Enabled
17,524,674 UART: [fht] FMC Alias Private Key: 7
19,290,683 UART: [art] Extend RT PCRs Done
19,291,969 UART: [art] Lock RT PCRs Done
19,293,613 UART: [art] Populate DV Done
19,299,230 UART: [fht] FMC Alias Private Key: 7
19,300,966 UART: [art] Derive CDI
19,301,770 UART: [art] Store in slot 0x4
19,344,271 UART: [art] Derive Key Pair
19,345,360 UART: [art] Store priv key in slot 0x5
21,772,287 UART: [art] Derive Key Pair - Done
21,785,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,491,772 UART: [art] Erasing AUTHORITY.KEYID = 7
23,493,340 UART: [art] PUB.X = 1DB457F55A3F2DABE586BF127D7704725089C3CE16F57CD579F0E77F360247A495E4A3FAA44D90F3E8F9F3016E41803A
23,500,482 UART: [art] PUB.Y = 09C9ECE86E264976E4CBAB59CC2468961768D9C17A279C332489072C378085C0FE03EF1FECAD663580ADAEE80508EB46
23,507,729 UART: [art] SIG.R = 2C0665383D50F86A4EB22608ECB1B737F301B93C0589F6CE04CA0AD3DFE8D02E5FFE018D46C9DDDF50E3EC41A87A55CD
23,515,158 UART: [art] SIG.S = 5491B61C2BBCE58D2B62F1D9A4A9D10CA7B3689EBF930A3D656B252266C01DC50168D33F0F4EE12E3A5D7662592758FB
24,493,681 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,145 UART: [kat] SHA2-256
882,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,191 UART: [kat] ++
886,343 UART: [kat] sha1
890,591 UART: [kat] SHA2-256
892,529 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
902,914 UART: [kat] HMAC-384Kdf
907,368 UART: [kat] LMS
1,475,564 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,496 UART: [idev] ++
1,479,664 UART: [idev] CDI.KEYID = 6
1,480,024 UART: [idev] SUBJECT.KEYID = 7
1,480,448 UART: [idev] UDS.KEYID = 0
1,480,793 ready_for_fw is high
1,480,793 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,382 UART: [idev] Erasing UDS.KEYID = 0
1,504,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,006 UART: [idev] --
1,514,127 UART: [ldev] ++
1,514,295 UART: [ldev] CDI.KEYID = 6
1,514,658 UART: [ldev] SUBJECT.KEYID = 5
1,515,084 UART: [ldev] AUTHORITY.KEYID = 7
1,515,547 UART: [ldev] FE.KEYID = 1
1,520,753 UART: [ldev] Erasing FE.KEYID = 1
1,545,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,618 UART: [ldev] --
1,584,923 UART: [fwproc] Waiting for Commands...
1,585,742 UART: [fwproc] Received command 0x46574c44
1,586,533 UART: [fwproc] Received Image of size 34948 bytes
1,974,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,469 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,687 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,648 >>> mbox cmd response: success
2,049,664 UART: [afmc] ++
2,049,832 UART: [afmc] CDI.KEYID = 6
2,050,194 UART: [afmc] SUBJECT.KEYID = 7
2,050,619 UART: [afmc] AUTHORITY.KEYID = 5
2,085,334 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,101,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,102,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,107,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,113,734 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,119,417 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,127,325 UART: [afmc] --
2,128,227 UART: [cold-reset] --
2,128,827 UART: [state] Locking Datavault
2,129,958 UART: [state] Locking PCR0, PCR1 and PCR31
2,130,562 UART: [state] Locking ICCM
2,131,114 UART: [exit] Launching FMC @ 0x40000130
2,136,444 UART:
2,136,460 UART: Running Caliptra FMC ...
2,136,868 UART:
2,136,922 UART: [state] CFI Enabled
2,147,298 UART: [fht] FMC Alias Private Key: 7
2,266,010 UART: [art] Extend RT PCRs Done
2,266,438 UART: [art] Lock RT PCRs Done
2,268,144 UART: [art] Populate DV Done
2,276,175 UART: [fht] FMC Alias Private Key: 7
2,277,189 UART: [art] Derive CDI
2,277,469 UART: [art] Store in slot 0x4
2,363,387 UART: [art] Derive Key Pair
2,363,747 UART: [art] Store priv key in slot 0x5
2,376,518 UART: [art] Derive Key Pair - Done
2,391,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,406,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,407,601 UART: [art] PUB.X = BA720661AE792AC8E44BC3CF0FA15D3CAACA5D8104F113F9B85F6F2A5A5DF29D5C82E48435D71DD177682AF3AEA64D47
2,414,382 UART: [art] PUB.Y = 4EB56753F957B175463A5DEA0790109ABE7ABF41C8241DEAB69FBDE5E8A23418DE12E27252C85AA3C9E59A4C573641B8
2,421,339 UART: [art] SIG.R = 29772F3B9B1619B3583C13EB9B46FF3E83ACDB803C704733E9C3023573343AD4DC1815629F7F67D31CBECCDFC22D0F7C
2,428,113 UART: [art] SIG.S = EDD84D89C9A8247A7C4B3342970FFFE04117CFEC823DC550AB36B290B834F62B54630F2EC6EBAAFF1F115F7E1FC532B6
2,451,578 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,797 ready_for_fw is high
1,362,797 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,900,370 >>> mbox cmd response: success
1,961,893 UART:
1,961,909 UART: Running Caliptra FMC ...
1,962,317 UART:
1,962,371 UART: [state] CFI Enabled
1,972,821 UART: [fht] FMC Alias Private Key: 7
2,091,005 UART: [art] Extend RT PCRs Done
2,091,433 UART: [art] Lock RT PCRs Done
2,092,699 UART: [art] Populate DV Done
2,101,200 UART: [fht] FMC Alias Private Key: 7
2,102,250 UART: [art] Derive CDI
2,102,530 UART: [art] Store in slot 0x4
2,188,212 UART: [art] Derive Key Pair
2,188,572 UART: [art] Store priv key in slot 0x5
2,202,121 UART: [art] Derive Key Pair - Done
2,216,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,614 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,379 UART: [art] PUB.X = 7D8D1F48A01B98FC446C2A961404B4EBEF2CD1B650D155D02F333074B78C3CAB790BA15674A863A625586B3E654EBB39
2,240,149 UART: [art] PUB.Y = A961A89E8C17C8D8BDD3F11F98B6A2ECAC15CFA7CC47C86F9B731A7B2862D96216EA723A795341ABB959D1A956AB3354
2,247,113 UART: [art] SIG.R = F420FE0082BDAB1472ECE7CFCBEA00C3F95F9EBC8ABC0325C458A7C7D18430E1DBB619B45095AA8374BCD748524BB477
2,253,856 UART: [art] SIG.S = FD924AD954D66D47EC58FA2348091C47CD90F5C7E28EDF52E073CA9989C8CB48877E208F56ADF1BF915618A11C517C0B
2,278,207 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,137 UART: [kat] SHA2-512-ACC
897,038 UART: [kat] ECC-384
902,467 UART: [kat] HMAC-384Kdf
907,077 UART: [kat] LMS
1,475,273 UART: [kat] --
1,475,998 UART: [cold-reset] ++
1,476,516 UART: [fht] Storing FHT @ 0x50003400
1,479,433 UART: [idev] ++
1,479,601 UART: [idev] CDI.KEYID = 6
1,479,961 UART: [idev] SUBJECT.KEYID = 7
1,480,385 UART: [idev] UDS.KEYID = 0
1,480,730 ready_for_fw is high
1,480,730 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,488,257 UART: [idev] Erasing UDS.KEYID = 0
1,505,113 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,613 UART: [idev] --
1,514,722 UART: [ldev] ++
1,514,890 UART: [ldev] CDI.KEYID = 6
1,515,253 UART: [ldev] SUBJECT.KEYID = 5
1,515,679 UART: [ldev] AUTHORITY.KEYID = 7
1,516,142 UART: [ldev] FE.KEYID = 1
1,521,522 UART: [ldev] Erasing FE.KEYID = 1
1,546,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,953 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,811 UART: [ldev] --
1,586,168 UART: [fwproc] Waiting for Commands...
1,587,019 UART: [fwproc] Received command 0x46574c44
1,587,810 UART: [fwproc] Received Image of size 34948 bytes
1,975,564 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,002,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,033,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 9020
2,048,723 >>> mbox cmd response: success
2,049,773 UART: [afmc] ++
2,049,941 UART: [afmc] CDI.KEYID = 6
2,050,303 UART: [afmc] SUBJECT.KEYID = 7
2,050,728 UART: [afmc] AUTHORITY.KEYID = 5
2,086,195 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,633 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,413 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,109,122 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,005 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,688 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,672 UART: [afmc] --
2,129,660 UART: [cold-reset] --
2,130,400 UART: [state] Locking Datavault
2,131,735 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,339 UART: [state] Locking ICCM
2,132,847 UART: [exit] Launching FMC @ 0x40000130
2,138,177 UART:
2,138,193 UART: Running Caliptra FMC ...
2,138,601 UART:
2,138,744 UART: [state] CFI Enabled
2,149,268 UART: [fht] FMC Alias Private Key: 7
2,268,500 UART: [art] Extend RT PCRs Done
2,268,928 UART: [art] Lock RT PCRs Done
2,270,506 UART: [art] Populate DV Done
2,278,695 UART: [fht] FMC Alias Private Key: 7
2,279,671 UART: [art] Derive CDI
2,279,951 UART: [art] Store in slot 0x4
2,365,751 UART: [art] Derive Key Pair
2,366,111 UART: [art] Store priv key in slot 0x5
2,379,158 UART: [art] Derive Key Pair - Done
2,393,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,169 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,934 UART: [art] PUB.X = B6B89A1B61784C8F84CC522EEFE7D681A9C777D1E2C4C1D02F355C42DD28CF309ADBB173C075B66721855DB95A58CCEC
2,416,720 UART: [art] PUB.Y = 0DA0F947C1E821BBBBDE0232820658591B51825ED40369BE2F88805402F0E98B21C1B162AD318534B5A98ADB1EAA26DC
2,423,661 UART: [art] SIG.R = F215D1CC105DC10EA69424196D31E9E329453490C68489169633C636EB0CE5F6544AA5AD6D133E94BD40478E300999AE
2,430,418 UART: [art] SIG.S = 8C03521C1FEE3060592F20F3BC132C849AB5A2C98CAAD9983A0F79C076A7501DC34FB4E98B8F3D7DE952A667263FCCDC
2,454,089 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,240 ready_for_fw is high
1,362,240 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,898,915 >>> mbox cmd response: success
1,960,996 UART:
1,961,012 UART: Running Caliptra FMC ...
1,961,420 UART:
1,961,563 UART: [state] CFI Enabled
1,972,279 UART: [fht] FMC Alias Private Key: 7
2,091,495 UART: [art] Extend RT PCRs Done
2,091,923 UART: [art] Lock RT PCRs Done
2,093,425 UART: [art] Populate DV Done
2,101,630 UART: [fht] FMC Alias Private Key: 7
2,102,700 UART: [art] Derive CDI
2,102,980 UART: [art] Store in slot 0x4
2,188,336 UART: [art] Derive Key Pair
2,188,696 UART: [art] Store priv key in slot 0x5
2,201,673 UART: [art] Derive Key Pair - Done
2,216,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,037 UART: [art] Erasing AUTHORITY.KEYID = 7
2,232,802 UART: [art] PUB.X = 06FE8DE67734AEC0E8130FA5F048EC31E4062C8E40617035FA5BFD36E8FC2A036CF5A3BCE30B2EDB8BA4F7B0BE36C868
2,239,579 UART: [art] PUB.Y = 8648F0464EFA9C6DFFEFFD16F9126C0338B104B2282A9E1B2EE659EFC9BC9FEC1F112ED2698B535576816BC5F8A63A5F
2,246,539 UART: [art] SIG.R = B1650EF8AAE7470E3381CCBD8D388595E0B237236C16C8CB451E76E60DE7E6D261801CBB4FA7EF8349DAF7DF72E6F07D
2,253,316 UART: [art] SIG.S = 73093B609FFB06FACC7551903894E4E243563623E8BA8B0672D7CCB305EF73C9059F3320A461AB347445A369BEC9F7B0
2,276,446 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
891,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,412 UART: [kat] ++
895,564 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,457 UART: [kat] SHA2-512-ACC
906,358 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,474 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,454 UART: [idev] ++
1,172,622 UART: [idev] CDI.KEYID = 6
1,172,983 UART: [idev] SUBJECT.KEYID = 7
1,173,408 UART: [idev] UDS.KEYID = 0
1,173,754 ready_for_fw is high
1,173,754 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,331 UART: [idev] --
1,208,498 UART: [ldev] ++
1,208,666 UART: [ldev] CDI.KEYID = 6
1,209,030 UART: [ldev] SUBJECT.KEYID = 5
1,209,457 UART: [ldev] AUTHORITY.KEYID = 7
1,209,920 UART: [ldev] FE.KEYID = 1
1,214,954 UART: [ldev] Erasing FE.KEYID = 1
1,241,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,840 UART: [ldev] --
1,280,063 UART: [fwproc] Wait for Commands...
1,280,662 UART: [fwproc] Recv command 0x46574c44
1,281,395 UART: [fwproc] Recv'd Img size: 34948 bytes
1,668,898 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,696,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,727,854 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,742,703 >>> mbox cmd response: success
1,743,937 UART: [afmc] ++
1,744,105 UART: [afmc] CDI.KEYID = 6
1,744,468 UART: [afmc] SUBJECT.KEYID = 7
1,744,894 UART: [afmc] AUTHORITY.KEYID = 5
1,779,771 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,795,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,796,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,802,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,808,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,814,013 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,821,998 UART: [afmc] --
1,822,927 UART: [cold-reset] --
1,823,749 UART: [state] Locking Datavault
1,825,116 UART: [state] Locking PCR0, PCR1 and PCR31
1,825,720 UART: [state] Locking ICCM
1,826,208 UART: [exit] Launching FMC @ 0x40000130
1,831,538 UART:
1,831,554 UART: Running Caliptra FMC ...
1,831,962 UART:
1,832,016 UART: [state] CFI Enabled
1,842,454 UART: [fht] FMC Alias Private Key: 7
1,961,298 UART: [art] Extend RT PCRs Done
1,961,726 UART: [art] Lock RT PCRs Done
1,963,596 UART: [art] Populate DV Done
1,971,713 UART: [fht] FMC Alias Private Key: 7
1,972,707 UART: [art] Derive CDI
1,972,987 UART: [art] Store in slot 0x4
2,058,662 UART: [art] Derive Key Pair
2,059,022 UART: [art] Store priv key in slot 0x5
2,071,744 UART: [art] Derive Key Pair - Done
2,086,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,102,331 UART: [art] Erasing AUTHORITY.KEYID = 7
2,103,096 UART: [art] PUB.X = 50765827CFF755C33F457E142046C465795582C76510FD37E5CBF50C61B955E35B72AC15F55527B150553C35062848D7
2,109,846 UART: [art] PUB.Y = 98B781470897E39C4FD27B337060078477A48B146B73602F312F424D1D997D2B1B127EA3955A83C0C6409C3CCC5CD782
2,116,782 UART: [art] SIG.R = 2EE1F3FB516D8BC747A66816A0D9DAB06D04359CD566CDD3934DD514015E3018AE3B989E83ADA9F4E23505FE88220C09
2,123,545 UART: [art] SIG.S = 43629E1E807DB3F51343BEBFDDBC89DABE181F9C2FC35D6F9BBB2182E8A6C9DC3642CCF2AE5143742916C0A53EB16D08
2,147,691 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,562 ready_for_fw is high
1,059,562 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,072 >>> mbox cmd response: success
1,658,863 UART:
1,658,879 UART: Running Caliptra FMC ...
1,659,287 UART:
1,659,341 UART: [state] CFI Enabled
1,669,999 UART: [fht] FMC Alias Private Key: 7
1,789,053 UART: [art] Extend RT PCRs Done
1,789,481 UART: [art] Lock RT PCRs Done
1,791,063 UART: [art] Populate DV Done
1,799,192 UART: [fht] FMC Alias Private Key: 7
1,800,264 UART: [art] Derive CDI
1,800,544 UART: [art] Store in slot 0x4
1,886,017 UART: [art] Derive Key Pair
1,886,377 UART: [art] Store priv key in slot 0x5
1,900,093 UART: [art] Derive Key Pair - Done
1,914,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,431 UART: [art] Erasing AUTHORITY.KEYID = 7
1,931,196 UART: [art] PUB.X = F576C0F0FEC77EE4B2903B64CEC430578C672A6C698AE5A66CA01EEE9256CCDCD74E9920116A079A620F615BC11767F6
1,937,970 UART: [art] PUB.Y = 0063B6444C90A74FB46D9F010C2DB9E15BA0023035B2D63434C0453DD42C0F91C32FC1CC63FF4A769E89127123C4CB3B
1,944,890 UART: [art] SIG.R = 7F9C98701A7064F8503AAF1EB1779F66390FF41D6BC56C3A9C84DB91C91621D4621BF087AFB43A7E1B48A1D9B74038AC
1,951,665 UART: [art] SIG.S = 81E0F032055DAEF3B19FC6B103EFC68FA364797F09D3204BDE813081F8AA3C2C89D113D93DD5330C49F45D7FCA687B54
1,975,014 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,117 UART: [state] LifecycleState = Unprovisioned
85,772 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,617 UART: [kat] SHA2-256
891,167 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,271 UART: [kat] ++
895,423 UART: [kat] sha1
899,601 UART: [kat] SHA2-256
901,541 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,134 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,729 UART: [cold-reset] ++
1,170,189 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,174,039 ready_for_fw is high
1,174,039 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,181,544 UART: [idev] Erasing UDS.KEYID = 0
1,198,798 UART: [idev] Sha1 KeyId Algorithm
1,207,548 UART: [idev] --
1,208,623 UART: [ldev] ++
1,208,791 UART: [ldev] CDI.KEYID = 6
1,209,155 UART: [ldev] SUBJECT.KEYID = 5
1,209,582 UART: [ldev] AUTHORITY.KEYID = 7
1,210,045 UART: [ldev] FE.KEYID = 1
1,215,379 UART: [ldev] Erasing FE.KEYID = 1
1,241,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,895 UART: [ldev] --
1,281,330 UART: [fwproc] Wait for Commands...
1,282,103 UART: [fwproc] Recv command 0x46574c44
1,282,836 UART: [fwproc] Recv'd Img size: 34948 bytes
1,669,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,640 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,815 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,743,616 >>> mbox cmd response: success
1,744,780 UART: [afmc] ++
1,744,948 UART: [afmc] CDI.KEYID = 6
1,745,311 UART: [afmc] SUBJECT.KEYID = 7
1,745,737 UART: [afmc] AUTHORITY.KEYID = 5
1,781,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,804,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,810,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,625 UART: [afmc] --
1,824,684 UART: [cold-reset] --
1,825,590 UART: [state] Locking Datavault
1,826,645 UART: [state] Locking PCR0, PCR1 and PCR31
1,827,249 UART: [state] Locking ICCM
1,827,783 UART: [exit] Launching FMC @ 0x40000130
1,833,113 UART:
1,833,129 UART: Running Caliptra FMC ...
1,833,537 UART:
1,833,680 UART: [state] CFI Enabled
1,844,416 UART: [fht] FMC Alias Private Key: 7
1,963,416 UART: [art] Extend RT PCRs Done
1,963,844 UART: [art] Lock RT PCRs Done
1,965,018 UART: [art] Populate DV Done
1,973,365 UART: [fht] FMC Alias Private Key: 7
1,974,369 UART: [art] Derive CDI
1,974,649 UART: [art] Store in slot 0x4
2,060,700 UART: [art] Derive Key Pair
2,061,060 UART: [art] Store priv key in slot 0x5
2,074,334 UART: [art] Derive Key Pair - Done
2,088,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,104,262 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,027 UART: [art] PUB.X = C8D7038FE009887AF118D142FB7BBCE7704CD55DC4A2764805DBD9860F1E0698F7EE0F634E896291B11039BE312A2236
2,111,781 UART: [art] PUB.Y = 049E0D71AD110FC42B36014AB6C17EB3EFDBA077EB0745F9038E04FC5F667241A0E0F91181BC7AF5C84A9EFBD1D250FD
2,118,728 UART: [art] SIG.R = 91478B78B44B9D527C58A5E639ACCBA926E1D5B46A9EBF223BB81F898DB35CCBC9F51406FF4CF377192AB4528433F0A4
2,125,507 UART: [art] SIG.S = 5F74065D51CA12199A011F723A13BB6F07A8FA22AB6CABE3F83F1A0BFA7665F977F0DCC6ADFA6D9555589A46B13577B1
2,148,862 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,883 ready_for_fw is high
1,059,883 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,367 >>> mbox cmd response: success
1,658,336 UART:
1,658,352 UART: Running Caliptra FMC ...
1,658,760 UART:
1,658,903 UART: [state] CFI Enabled
1,669,163 UART: [fht] FMC Alias Private Key: 7
1,788,397 UART: [art] Extend RT PCRs Done
1,788,825 UART: [art] Lock RT PCRs Done
1,790,591 UART: [art] Populate DV Done
1,798,778 UART: [fht] FMC Alias Private Key: 7
1,799,952 UART: [art] Derive CDI
1,800,232 UART: [art] Store in slot 0x4
1,886,017 UART: [art] Derive Key Pair
1,886,377 UART: [art] Store priv key in slot 0x5
1,899,849 UART: [art] Derive Key Pair - Done
1,914,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,930,044 UART: [art] Erasing AUTHORITY.KEYID = 7
1,930,809 UART: [art] PUB.X = 607A5933887589363FF8A82E8FEBA7F5A082854D29F349E1C04055E313C5BD9988814BE645D794BCF08E1471EB4403B4
1,937,572 UART: [art] PUB.Y = 18576654D3280E86CEF8EF86D53F8A9265C317546498975D490683E71101794ABB9D34A649195643C3D53535DCC287E8
1,944,499 UART: [art] SIG.R = 6B02FC24AA2492CE206421F4E77DC99869C7D1471D4FEB70DB5D9D6CB5AAECA3C8E4A4B299C26615F16209EF7F104AD6
1,951,279 UART: [art] SIG.S = EAB057D1939966D6CFB2CB623819A013C32EEE0FEEBDDA6F12ACB09CEAD98DC278222E4DF733C0ADCF9B4DF01A8017D2
1,975,465 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.94s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,750 UART: [state] LifecycleState = Unprovisioned
86,405 UART: [state] DebugLocked = No
86,895 UART: [state] WD Timer not started. Device not locked for debugging
88,210 UART: [kat] SHA2-256
893,860 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,985 UART: [kat] ++
898,137 UART: [kat] sha1
902,361 UART: [kat] SHA2-256
904,301 UART: [kat] SHA2-384
907,090 UART: [kat] SHA2-512-ACC
908,991 UART: [kat] ECC-384
918,896 UART: [kat] HMAC-384Kdf
923,386 UART: [kat] LMS
1,171,714 UART: [kat] --
1,172,619 UART: [cold-reset] ++
1,173,127 UART: [fht] FHT @ 0x50003400
1,175,778 UART: [idev] ++
1,175,946 UART: [idev] CDI.KEYID = 6
1,176,306 UART: [idev] SUBJECT.KEYID = 7
1,176,730 UART: [idev] UDS.KEYID = 0
1,177,075 ready_for_fw is high
1,177,075 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,854 UART: [idev] Erasing UDS.KEYID = 0
1,201,801 UART: [idev] Sha1 KeyId Algorithm
1,210,107 UART: [idev] --
1,211,003 UART: [ldev] ++
1,211,171 UART: [ldev] CDI.KEYID = 6
1,211,534 UART: [ldev] SUBJECT.KEYID = 5
1,211,960 UART: [ldev] AUTHORITY.KEYID = 7
1,212,423 UART: [ldev] FE.KEYID = 1
1,217,349 UART: [ldev] Erasing FE.KEYID = 1
1,244,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,989 UART: [ldev] --
1,283,304 UART: [fwproc] Wait for Commands...
1,284,056 UART: [fwproc] Recv command 0x46574c44
1,284,784 UART: [fwproc] Recv'd Img size: 34948 bytes
1,671,953 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,572 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,745,447 >>> mbox cmd response: success
1,746,577 UART: [afmc] ++
1,746,745 UART: [afmc] CDI.KEYID = 6
1,747,107 UART: [afmc] SUBJECT.KEYID = 7
1,747,532 UART: [afmc] AUTHORITY.KEYID = 5
1,782,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,002 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,750 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,043 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,824,973 UART: [afmc] --
1,826,085 UART: [cold-reset] --
1,826,863 UART: [state] Locking Datavault
1,828,176 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,780 UART: [state] Locking ICCM
1,829,238 UART: [exit] Launching FMC @ 0x40000130
1,834,568 UART:
1,834,584 UART: Running Caliptra FMC ...
1,834,992 UART:
1,835,046 UART: [state] CFI Enabled
1,845,542 UART: [fht] FMC Alias Private Key: 7
1,964,876 UART: [art] Extend RT PCRs Done
1,965,304 UART: [art] Lock RT PCRs Done
1,966,610 UART: [art] Populate DV Done
1,974,797 UART: [fht] FMC Alias Private Key: 7
1,975,787 UART: [art] Derive CDI
1,976,067 UART: [art] Store in slot 0x4
2,061,684 UART: [art] Derive Key Pair
2,062,044 UART: [art] Store priv key in slot 0x5
2,075,146 UART: [art] Derive Key Pair - Done
2,089,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,105,156 UART: [art] Erasing AUTHORITY.KEYID = 7
2,105,921 UART: [art] PUB.X = C555F8AC4311A6872884410F2668F6E4E08B1919990B53509324DDF15C6631AA2474B213B75616D1023E9FCBE9CEC154
2,112,676 UART: [art] PUB.Y = 96096A7B84B0D2FF5C29103CA5644481E886485B7C838AEA411EE850830A68F3E68515A0C5B0B181CDBB397251B15A9C
2,119,620 UART: [art] SIG.R = 35A7D0BAB4652E00933176F462470753C064F441AA307A61D085DCEE38E2ACD2A0F35A9C98383CB80DC7766D73527132
2,126,360 UART: [art] SIG.S = 143708739ABB93FDB90D5F03FD22EA349044AFCDBF729CB79EA8EDAF5F69CF264A6F3BE667186015E08D4A93B1342442
2,150,178 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,465 ready_for_fw is high
1,060,465 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,596,734 >>> mbox cmd response: success
1,659,121 UART:
1,659,137 UART: Running Caliptra FMC ...
1,659,545 UART:
1,659,599 UART: [state] CFI Enabled
1,669,883 UART: [fht] FMC Alias Private Key: 7
1,788,981 UART: [art] Extend RT PCRs Done
1,789,409 UART: [art] Lock RT PCRs Done
1,790,849 UART: [art] Populate DV Done
1,799,240 UART: [fht] FMC Alias Private Key: 7
1,800,316 UART: [art] Derive CDI
1,800,596 UART: [art] Store in slot 0x4
1,886,133 UART: [art] Derive Key Pair
1,886,493 UART: [art] Store priv key in slot 0x5
1,899,459 UART: [art] Derive Key Pair - Done
1,913,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,929,172 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,937 UART: [art] PUB.X = 973C1D6CAE4E1117E5B0C27244F39E734722BD6DA2C2B0CCCE9E1F05F0DBB1493DBDC0E7EDFD7D8C1EBC76C27A2C90DB
1,936,734 UART: [art] PUB.Y = 65407D084701599D48044BA551973B2F02E0553FF8D96BD0D6EA29194F1C223F5CEBEE012859144862E5E687111FC54F
1,943,663 UART: [art] SIG.R = 7A6562D40EF6BFF2A1118D9B6968B6784731E3374AA713BCFE67E8A0CBC0EA152A887FA7718D1C08186B412F8E3CFAEA
1,950,441 UART: [art] SIG.S = D83A6994B9A1C5864EB8B130F3617F9D4684191F52F27737AC4C462B933673F3AC0537D805A0124FFB718285251522B4
1,973,962 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,695 UART: [kat] SHA2-256
893,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,470 UART: [kat] ++
897,622 UART: [kat] sha1
901,954 UART: [kat] SHA2-256
903,894 UART: [kat] SHA2-384
906,595 UART: [kat] SHA2-512-ACC
908,496 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,305 UART: [kat] LMS
1,171,633 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,980 UART: [fht] FHT @ 0x50003400
1,175,599 UART: [idev] ++
1,175,767 UART: [idev] CDI.KEYID = 6
1,176,127 UART: [idev] SUBJECT.KEYID = 7
1,176,551 UART: [idev] UDS.KEYID = 0
1,176,896 ready_for_fw is high
1,176,896 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,184,833 UART: [idev] Erasing UDS.KEYID = 0
1,202,066 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,640 UART: [ldev] ++
1,211,808 UART: [ldev] CDI.KEYID = 6
1,212,171 UART: [ldev] SUBJECT.KEYID = 5
1,212,597 UART: [ldev] AUTHORITY.KEYID = 7
1,213,060 UART: [ldev] FE.KEYID = 1
1,218,306 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,252 UART: [ldev] --
1,283,741 UART: [fwproc] Wait for Commands...
1,284,429 UART: [fwproc] Recv command 0x46574c44
1,285,157 UART: [fwproc] Recv'd Img size: 34948 bytes
1,673,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,700,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,732,051 UART: [fwproc] Load Runtime at address 0x40005000 len 9020
1,746,864 >>> mbox cmd response: success
1,748,114 UART: [afmc] ++
1,748,282 UART: [afmc] CDI.KEYID = 6
1,748,644 UART: [afmc] SUBJECT.KEYID = 7
1,749,069 UART: [afmc] AUTHORITY.KEYID = 5
1,784,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,801,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,807,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,813,313 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,819,014 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,826,948 UART: [afmc] --
1,828,034 UART: [cold-reset] --
1,828,798 UART: [state] Locking Datavault
1,829,921 UART: [state] Locking PCR0, PCR1 and PCR31
1,830,525 UART: [state] Locking ICCM
1,831,193 UART: [exit] Launching FMC @ 0x40000130
1,836,523 UART:
1,836,539 UART: Running Caliptra FMC ...
1,836,947 UART:
1,837,090 UART: [state] CFI Enabled
1,847,892 UART: [fht] FMC Alias Private Key: 7
1,967,098 UART: [art] Extend RT PCRs Done
1,967,526 UART: [art] Lock RT PCRs Done
1,969,304 UART: [art] Populate DV Done
1,977,427 UART: [fht] FMC Alias Private Key: 7
1,978,401 UART: [art] Derive CDI
1,978,681 UART: [art] Store in slot 0x4
2,064,212 UART: [art] Derive Key Pair
2,064,572 UART: [art] Store priv key in slot 0x5
2,078,594 UART: [art] Derive Key Pair - Done
2,093,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,108,934 UART: [art] Erasing AUTHORITY.KEYID = 7
2,109,699 UART: [art] PUB.X = 8361628CF2A513834D3823CEBDBE16401C105EF25F6ABCA82A431C1471810094766C78DBA1E21D10AC339A93199CF38B
2,116,449 UART: [art] PUB.Y = 99CC36AD2ADDE3C563E072D4144D8057F76B7DAA455C94A5750FE32D0715D630428F67963770AD4E12DADD441EB96B04
2,123,396 UART: [art] SIG.R = F426F0EDC8BAC8B527AFE42AF5E22BADB380D9A0F544CD0F5BC38F5E179BF88BF8722D03C858FE40234E8B4DA18CB233
2,130,184 UART: [art] SIG.S = 16AE316E9B1C88C4B55BA8C19DDAF76BB661B5CBF09ABC0BB4CA45E8CF51B0062B4B8A92D5DC9B3DD3D4D3C78F2A0684
2,154,194 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,126 ready_for_fw is high
1,061,126 <<< Executing mbox cmd 0x46574c44 (34948 bytes) from SoC
1,597,611 >>> mbox cmd response: success
1,660,504 UART:
1,660,520 UART: Running Caliptra FMC ...
1,660,928 UART:
1,661,071 UART: [state] CFI Enabled
1,672,041 UART: [fht] FMC Alias Private Key: 7
1,791,109 UART: [art] Extend RT PCRs Done
1,791,537 UART: [art] Lock RT PCRs Done
1,792,855 UART: [art] Populate DV Done
1,800,932 UART: [fht] FMC Alias Private Key: 7
1,802,036 UART: [art] Derive CDI
1,802,316 UART: [art] Store in slot 0x4
1,888,063 UART: [art] Derive Key Pair
1,888,423 UART: [art] Store priv key in slot 0x5
1,901,617 UART: [art] Derive Key Pair - Done
1,916,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,169 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,934 UART: [art] PUB.X = AFA9343F80E8020CD145E7179321B3501FD61F5FDECF60E0E0C7951EF2A7D73038D3F86236EF8E5C3007B0B31A9351A0
1,939,701 UART: [art] PUB.Y = 70B379B8017728FF88354E09BEBE997553FF010B3876927D534312662B2F2E9BD05086CFDCFCC24440774C817769F763
1,946,631 UART: [art] SIG.R = C827126E808342B047B93D18D798D55E998DBF0CD742CD4445097BF2D1AAE8DDF2E7A8F8B241E03BA36A72839481F711
1,953,399 UART: [art] SIG.S = 2BA7D28E277BD3FBE238653CC243918DAB94CC72DCB4ED2BC8EF0C735848B9521C2CA724CC4FA7FAC49F3553BF7EF9EF
1,977,087 UART: boot::test_boot...[ok]
* TESTCASE PASSED
test test_boot::test_boot ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,005 UART:
192,381 UART: Running Caliptra ROM ...
193,576 UART:
193,732 UART: [state] CFI Enabled
264,964 UART: [state] LifecycleState = Unprovisioned
266,877 UART: [state] DebugLocked = No
268,838 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,847 UART: [kat] SHA2-256
442,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,078 UART: [kat] ++
453,623 UART: [kat] sha1
464,857 UART: [kat] SHA2-256
467,590 UART: [kat] SHA2-384
473,936 UART: [kat] SHA2-512-ACC
476,304 UART: [kat] ECC-384
2,769,492 UART: [kat] HMAC-384Kdf
2,799,914 UART: [kat] LMS
3,990,174 UART: [kat] --
3,995,735 UART: [cold-reset] ++
3,996,742 UART: [fht] Storing FHT @ 0x50003400
4,008,647 UART: [idev] ++
4,009,226 UART: [idev] CDI.KEYID = 6
4,010,302 UART: [idev] SUBJECT.KEYID = 7
4,011,340 UART: [idev] UDS.KEYID = 0
4,012,397 ready_for_fw is high
4,012,611 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,116,903 UART: [idev] Erasing UDS.KEYID = 0
7,347,671 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,792 UART: [idev] --
7,373,598 UART: [ldev] ++
7,374,231 UART: [ldev] CDI.KEYID = 6
7,375,131 UART: [ldev] SUBJECT.KEYID = 5
7,376,345 UART: [ldev] AUTHORITY.KEYID = 7
7,377,634 UART: [ldev] FE.KEYID = 1
7,424,005 UART: [ldev] Erasing FE.KEYID = 1
10,755,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,248 UART: [ldev] --
13,116,273 UART: [fwproc] Waiting for Commands...
13,119,447 UART: [fwproc] Received command 0x46574c44
13,121,682 UART: [fwproc] Received Image of size 82832 bytes
16,791,765 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,867,283 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,940,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,143,387 >>> mbox cmd response: success
17,144,370 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,147,525 UART: [afmc] ++
17,148,173 UART: [afmc] CDI.KEYID = 6
17,149,053 UART: [afmc] SUBJECT.KEYID = 7
17,150,329 UART: [afmc] AUTHORITY.KEYID = 5
20,509,366 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,805,171 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,807,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,821,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,836,637 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,851,029 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,872,395 UART: [afmc] --
22,875,446 UART: [cold-reset] --
22,879,628 UART: [state] Locking Datavault
22,884,936 UART: [state] Locking PCR0, PCR1 and PCR31
22,886,654 UART: [state] Locking ICCM
22,889,299 UART: [exit] Launching FMC @ 0x40000130
22,897,689 UART:
22,897,934 UART: Running Caliptra FMC ...
22,899,036 UART:
22,899,197 UART: [state] CFI Enabled
22,967,460 UART: [fht] FMC Alias Private Key: 7
25,308,186 UART: [art] Extend RT PCRs Done
25,309,416 UART: [art] Lock RT PCRs Done
25,310,824 UART: [art] Populate DV Done
25,316,349 UART: [fht] FMC Alias Private Key: 7
25,318,104 UART: [art] Derive CDI
25,318,920 UART: [art] Store in slot 0x4
25,375,733 UART: [art] Derive Key Pair
25,376,778 UART: [art] Store priv key in slot 0x5
28,668,519 UART: [art] Derive Key Pair - Done
28,681,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,972,890 UART: [art] Erasing AUTHORITY.KEYID = 7
30,974,414 UART: [art] PUB.X = B8BDA4900818D6A853B468EB4BD8CE3709DC06A8AF18E4FF902C5F9BCAB83C61B73DB246D9AE25FC70C434882ABDEE6C
30,981,719 UART: [art] PUB.Y = 6E2FB0A8A651586CF45AC4120F3E55141115982077DDC43C30554A9CDA8F5571BA71401AA30A7BCDD52A3D9E856D3EB4
30,988,998 UART: [art] SIG.R = AEB49A54ABBB451C63121C92EDDF4F77B0A4A9ABA289091BC9A0FF8AB3A012B0839DD29E4FB51ACBDF8B88FDEDFAC2A4
30,996,443 UART: [art] SIG.S = 37D0C6AC22CA7383782408FD526B7B60C5FB8CA0A83E389255B6B67F99353CAD94BEA79FF6F83673AEB65F43BA39B68D
32,301,712 UART: mbox::rt_entry...
32,302,683 UART: ____ _ _ _ ____ _____
32,304,624 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,306,632 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,308,484 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,310,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,312,459 UART: |_|
32,313,269 UART:
32,444,726 UART: [rt] Runtime listening for mailbox commands...
32,446,899 >>> mbox cmd response data (48 bytes)
32,447,564 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,449,913 >>> mbox cmd response data (48 bytes)
32,450,794 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,466,353 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,284 writing to cptra_bootfsm_go
3,806,809 ready_for_fw is high
3,807,404 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,233,324 >>> mbox cmd response: success
17,234,585 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,926,180 UART:
22,926,554 UART: Running Caliptra FMC ...
22,927,759 UART:
22,927,955 UART: [state] CFI Enabled
22,995,854 UART: [fht] FMC Alias Private Key: 7
25,336,565 UART: [art] Extend RT PCRs Done
25,337,784 UART: [art] Lock RT PCRs Done
25,339,465 UART: [art] Populate DV Done
25,344,897 UART: [fht] FMC Alias Private Key: 7
25,346,439 UART: [art] Derive CDI
25,347,252 UART: [art] Store in slot 0x4
25,405,084 UART: [art] Derive Key Pair
25,406,124 UART: [art] Store priv key in slot 0x5
28,699,247 UART: [art] Derive Key Pair - Done
28,712,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,001,636 UART: [art] Erasing AUTHORITY.KEYID = 7
31,003,147 UART: [art] PUB.X = A2B1090E377AEA19872EBFE9D43D82E660FC5E1B0CE65BDC8E088ECE52E832F5C4E2C30369DD75C0CF054D14E164464B
31,010,457 UART: [art] PUB.Y = 644111475EA939AF41472E07D34B50C72463B8A4EFF6E2618BBAD3F8D90C265A65F120D6D9E8AE93A7AEC4FA8EC49562
31,017,692 UART: [art] SIG.R = D58F377823E71C2C962398D03A50B166E234B1837AE4DFC948CC2BA126A6215510D59AEEBACC91CAC3FF0471B4F12D8A
31,025,085 UART: [art] SIG.S = 1E1F5F6D1BE1A9BB95AD5F967E172239FBB4CDD498D946DC6C340EE4AEB22D38D5B48C631511B5E2A971D165997EF2D6
32,330,329 UART: mbox::rt_entry...
32,331,333 UART: ____ _ _ _ ____ _____
32,333,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,335,269 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,337,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,339,197 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,130 UART: |_|
32,341,961 UART:
32,474,295 UART: [rt] Runtime listening for mailbox commands...
32,476,469 >>> mbox cmd response data (48 bytes)
32,477,063 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,479,386 >>> mbox cmd response data (48 bytes)
32,480,221 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,495,834 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,448 UART:
192,819 UART: Running Caliptra ROM ...
194,185 UART:
603,555 UART: [state] CFI Enabled
615,576 UART: [state] LifecycleState = Unprovisioned
617,528 UART: [state] DebugLocked = No
619,909 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,009 UART: [kat] SHA2-256
794,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,336 UART: [kat] ++
805,782 UART: [kat] sha1
816,453 UART: [kat] SHA2-256
819,173 UART: [kat] SHA2-384
824,443 UART: [kat] SHA2-512-ACC
826,802 UART: [kat] ECC-384
3,113,144 UART: [kat] HMAC-384Kdf
3,125,123 UART: [kat] LMS
4,315,268 UART: [kat] --
4,320,726 UART: [cold-reset] ++
4,322,874 UART: [fht] Storing FHT @ 0x50003400
4,332,782 UART: [idev] ++
4,333,357 UART: [idev] CDI.KEYID = 6
4,334,382 UART: [idev] SUBJECT.KEYID = 7
4,335,551 UART: [idev] UDS.KEYID = 0
4,336,623 ready_for_fw is high
4,336,826 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,441,142 UART: [idev] Erasing UDS.KEYID = 0
7,622,949 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,470 UART: [idev] --
7,647,880 UART: [ldev] ++
7,648,458 UART: [ldev] CDI.KEYID = 6
7,649,418 UART: [ldev] SUBJECT.KEYID = 5
7,650,627 UART: [ldev] AUTHORITY.KEYID = 7
7,651,857 UART: [ldev] FE.KEYID = 1
7,665,572 UART: [ldev] Erasing FE.KEYID = 1
10,957,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,969 UART: [ldev] --
13,318,630 UART: [fwproc] Waiting for Commands...
13,321,651 UART: [fwproc] Received command 0x46574c44
13,323,829 UART: [fwproc] Received Image of size 82832 bytes
16,997,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,071,877 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,145,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,349,095 >>> mbox cmd response: success
17,349,594 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,352,649 UART: [afmc] ++
17,353,222 UART: [afmc] CDI.KEYID = 6
17,354,156 UART: [afmc] SUBJECT.KEYID = 7
17,355,419 UART: [afmc] AUTHORITY.KEYID = 5
20,667,493 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,965,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,967,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,982,400 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,997,117 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,011,577 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,032,331 UART: [afmc] --
23,036,995 UART: [cold-reset] --
23,042,199 UART: [state] Locking Datavault
23,046,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,048,067 UART: [state] Locking ICCM
23,050,056 UART: [exit] Launching FMC @ 0x40000130
23,058,450 UART:
23,058,680 UART: Running Caliptra FMC ...
23,059,774 UART:
23,059,929 UART: [state] CFI Enabled
23,068,256 UART: [fht] FMC Alias Private Key: 7
25,408,436 UART: [art] Extend RT PCRs Done
25,409,663 UART: [art] Lock RT PCRs Done
25,411,257 UART: [art] Populate DV Done
25,416,552 UART: [fht] FMC Alias Private Key: 7
25,418,082 UART: [art] Derive CDI
25,418,888 UART: [art] Store in slot 0x4
25,461,423 UART: [art] Derive Key Pair
25,462,415 UART: [art] Store priv key in slot 0x5
28,704,517 UART: [art] Derive Key Pair - Done
28,717,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,997,591 UART: [art] Erasing AUTHORITY.KEYID = 7
30,999,095 UART: [art] PUB.X = C01AF670C6290F4563F2F52785B82B603A3BCE849417D41B6183BE93C70EBCFDEB483647938CE3E6B15E5D0840890162
31,006,337 UART: [art] PUB.Y = 3A8ECB91BA4B4E39E49C5318B02F9D784AFA05C04F774DC378067B2AFDFE3013C3EFD72D3E04B9E49C30B94A5A898A39
31,013,625 UART: [art] SIG.R = 8AB93A35FB09F8FDCBECC5801BC16DD3F42E8517FA45D3B453DA4CA1CB9F3CE83106D713052EEC39F2DBD4C2ACEC91BB
31,021,058 UART: [art] SIG.S = D2D3FCECDEF651DE7D9D4531C6074A537E6AB57093A55B55A76BB260520A07B695BA6194D2399D3BD721B9506670A657
32,325,744 UART: mbox::rt_entry...
32,326,686 UART: ____ _ _ _ ____ _____
32,328,609 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,330,603 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,332,453 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,334,375 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,336,225 UART: |_|
32,337,043 UART:
32,468,988 UART: [rt] Runtime listening for mailbox commands...
32,471,126 >>> mbox cmd response data (48 bytes)
32,471,729 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,474,041 >>> mbox cmd response data (48 bytes)
32,474,892 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,490,452 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,126,885 ready_for_fw is high
4,127,502 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,430,869 >>> mbox cmd response: success
17,431,981 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,072,938 UART:
23,073,350 UART: Running Caliptra FMC ...
23,074,499 UART:
23,074,659 UART: [state] CFI Enabled
23,082,440 UART: [fht] FMC Alias Private Key: 7
25,422,650 UART: [art] Extend RT PCRs Done
25,423,901 UART: [art] Lock RT PCRs Done
25,425,392 UART: [art] Populate DV Done
25,430,641 UART: [fht] FMC Alias Private Key: 7
25,432,235 UART: [art] Derive CDI
25,432,972 UART: [art] Store in slot 0x4
25,475,717 UART: [art] Derive Key Pair
25,476,716 UART: [art] Store priv key in slot 0x5
28,718,466 UART: [art] Derive Key Pair - Done
28,731,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,011,265 UART: [art] Erasing AUTHORITY.KEYID = 7
31,012,775 UART: [art] PUB.X = E508CF94202C41A3B885198D826F83457C3C2ED132F89243D59E262C51BA39CED966DF4742CE6880CE665DEB6096F245
31,020,022 UART: [art] PUB.Y = A4DC28D085923B37CB760805CF9D4EFB84C3C236345AF4B29C68F48F4E504A15858019C6016816FA7EB9B7F162836C98
31,027,265 UART: [art] SIG.R = 791D8F72E30B856D85E1F41CF979A92AE22A5A5A49B306935131BB8B4FB0F57D223879C71A5BB635A7CFC4F65D926918
31,034,656 UART: [art] SIG.S = 3A835A50BB70623E5BB6C70E91A8ACDBC82D8C55470C9FCA7B0F9B8A8D9691867E1ECA991F33A7F792C2F39D18BA884E
32,339,722 UART: mbox::rt_entry...
32,340,678 UART: ____ _ _ _ ____ _____
32,342,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,344,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,346,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,348,628 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,350,489 UART: |_|
32,351,332 UART:
32,483,648 UART: [rt] Runtime listening for mailbox commands...
32,485,838 >>> mbox cmd response data (48 bytes)
32,486,431 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,488,752 >>> mbox cmd response data (48 bytes)
32,489,600 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,505,161 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,965 UART:
192,335 UART: Running Caliptra ROM ...
193,469 UART:
193,613 UART: [state] CFI Enabled
263,644 UART: [state] LifecycleState = Unprovisioned
265,559 UART: [state] DebugLocked = No
268,393 UART: [state] WD Timer not started. Device not locked for debugging
271,713 UART: [kat] SHA2-256
451,377 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,144 UART: [kat] ++
462,617 UART: [kat] sha1
472,779 UART: [kat] SHA2-256
475,502 UART: [kat] SHA2-384
482,551 UART: [kat] SHA2-512-ACC
484,984 UART: [kat] ECC-384
2,948,096 UART: [kat] HMAC-384Kdf
2,971,530 UART: [kat] LMS
3,448,081 UART: [kat] --
3,451,794 UART: [cold-reset] ++
3,454,289 UART: [fht] FHT @ 0x50003400
3,466,422 UART: [idev] ++
3,467,015 UART: [idev] CDI.KEYID = 6
3,467,906 UART: [idev] SUBJECT.KEYID = 7
3,469,217 UART: [idev] UDS.KEYID = 0
3,470,114 ready_for_fw is high
3,470,348 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,681 UART: [idev] Erasing UDS.KEYID = 0
5,989,608 UART: [idev] Sha1 KeyId Algorithm
6,013,565 UART: [idev] --
6,018,594 UART: [ldev] ++
6,019,167 UART: [ldev] CDI.KEYID = 6
6,020,051 UART: [ldev] SUBJECT.KEYID = 5
6,021,316 UART: [ldev] AUTHORITY.KEYID = 7
6,022,547 UART: [ldev] FE.KEYID = 1
6,058,637 UART: [ldev] Erasing FE.KEYID = 1
8,562,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,901 UART: [ldev] --
10,372,618 UART: [fwproc] Wait for Commands...
10,374,818 UART: [fwproc] Recv command 0x46574c44
10,376,798 UART: [fwproc] Recv'd Img size: 82832 bytes
13,420,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,500,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,573,140 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,776,614 >>> mbox cmd response: success
13,777,726 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,780,141 UART: [afmc] ++
13,780,718 UART: [afmc] CDI.KEYID = 6
13,781,685 UART: [afmc] SUBJECT.KEYID = 7
13,782,893 UART: [afmc] AUTHORITY.KEYID = 5
16,320,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,060,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,062,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,078,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,094,432 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,110,038 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,134,709 UART: [afmc] --
18,139,281 UART: [cold-reset] --
18,142,274 UART: [state] Locking Datavault
18,147,081 UART: [state] Locking PCR0, PCR1 and PCR31
18,148,786 UART: [state] Locking ICCM
18,151,407 UART: [exit] Launching FMC @ 0x40000130
18,159,803 UART:
18,160,033 UART: Running Caliptra FMC ...
18,161,131 UART:
18,161,288 UART: [state] CFI Enabled
18,218,295 UART: [fht] FMC Alias Private Key: 7
19,984,197 UART: [art] Extend RT PCRs Done
19,985,415 UART: [art] Lock RT PCRs Done
19,986,876 UART: [art] Populate DV Done
19,992,201 UART: [fht] FMC Alias Private Key: 7
19,993,849 UART: [art] Derive CDI
19,994,661 UART: [art] Store in slot 0x4
20,050,972 UART: [art] Derive Key Pair
20,052,008 UART: [art] Store priv key in slot 0x5
22,514,359 UART: [art] Derive Key Pair - Done
22,527,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,240,154 UART: [art] Erasing AUTHORITY.KEYID = 7
24,241,670 UART: [art] PUB.X = 819E83213D8BBF003ED9381B0D00633954E0A663FC03D47CF0D250FA0CEEDEFCE4EE48F837C192CFC1277DEB17069E92
24,248,865 UART: [art] PUB.Y = 9521F58E414D904222AB7416C07D0AAF05E34E3B402845237300515BF3CFF7AE142A9AE989AE86BE9297E17375408CD1
24,256,099 UART: [art] SIG.R = E4D510EC4E14D08D20C0665A592D88642EB492C4F6FF28CF8767BDA9D741EB52E37E93F57153201159C4B88F9DF479A4
24,263,531 UART: [art] SIG.S = 9C9B475679625D57BCD61137D41E9F12F25FE8EB6E3325E73EA3FCB46280549D19BC57291DD3D6874EBCF783BCA470B7
25,241,863 UART: mbox::rt_entry...
25,242,832 UART: ____ _ _ _ ____ _____
25,244,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,246,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,248,640 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,250,569 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,252,442 UART: |_|
25,253,317 UART:
25,384,618 UART: [rt] Runtime listening for mailbox commands...
25,386,786 >>> mbox cmd response data (48 bytes)
25,387,393 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,389,715 >>> mbox cmd response data (48 bytes)
25,390,574 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,406,138 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,463,353 ready_for_fw is high
3,463,735 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,668,074 >>> mbox cmd response: success
13,669,495 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
17,957,609 UART:
17,958,006 UART: Running Caliptra FMC ...
17,959,153 UART:
17,959,310 UART: [state] CFI Enabled
18,027,908 UART: [fht] FMC Alias Private Key: 7
19,794,242 UART: [art] Extend RT PCRs Done
19,795,452 UART: [art] Lock RT PCRs Done
19,797,297 UART: [art] Populate DV Done
19,802,723 UART: [fht] FMC Alias Private Key: 7
19,804,202 UART: [art] Derive CDI
19,804,958 UART: [art] Store in slot 0x4
19,860,676 UART: [art] Derive Key Pair
19,861,710 UART: [art] Store priv key in slot 0x5
22,324,201 UART: [art] Derive Key Pair - Done
22,337,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,050,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,051,811 UART: [art] PUB.X = 220EB333CD92BFBE880F63C85051CE13A801019D45B778DE9138440132FBBC487504EF1ACA6D0B83A207DEE1F335D8B5
24,059,066 UART: [art] PUB.Y = B6B6FCA852E5D0A3D7552AF66A53BB49277A2AADA6108DFCAE83835E0C96CFA9FDBEFA236104E125AA976E05E0CE4546
24,066,373 UART: [art] SIG.R = 77C8555C53E81773765959DBC35B3093503C7AAABC28A428ACFADC6EA302BDB40CFD8FAA852F0645D6B1D2974AC219E3
24,073,759 UART: [art] SIG.S = 241ED707E86E4C50A885E5DEADC6867C241F422B59AF08029A1BE9EAA9B7CE7D37C83272FDF21BB28D2EF64C56DDD27A
25,052,096 UART: mbox::rt_entry...
25,053,066 UART: ____ _ _ _ ____ _____
25,054,972 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,056,971 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,058,872 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,060,869 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,062,726 UART: |_|
25,063,606 UART:
25,194,431 UART: [rt] Runtime listening for mailbox commands...
25,196,609 >>> mbox cmd response data (48 bytes)
25,197,220 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,199,554 >>> mbox cmd response data (48 bytes)
25,200,413 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,215,973 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
192,391 UART:
192,745 UART: Running Caliptra ROM ...
193,958 UART:
603,531 UART: [state] CFI Enabled
616,862 UART: [state] LifecycleState = Unprovisioned
618,805 UART: [state] DebugLocked = No
620,584 UART: [state] WD Timer not started. Device not locked for debugging
624,808 UART: [kat] SHA2-256
804,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,251 UART: [kat] ++
815,699 UART: [kat] sha1
826,857 UART: [kat] SHA2-256
829,574 UART: [kat] SHA2-384
834,357 UART: [kat] SHA2-512-ACC
836,725 UART: [kat] ECC-384
3,278,110 UART: [kat] HMAC-384Kdf
3,291,761 UART: [kat] LMS
3,768,276 UART: [kat] --
3,773,260 UART: [cold-reset] ++
3,774,693 UART: [fht] FHT @ 0x50003400
3,785,174 UART: [idev] ++
3,785,746 UART: [idev] CDI.KEYID = 6
3,786,781 UART: [idev] SUBJECT.KEYID = 7
3,787,957 UART: [idev] UDS.KEYID = 0
3,788,903 ready_for_fw is high
3,789,093 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,893,158 UART: [idev] Erasing UDS.KEYID = 0
6,262,703 UART: [idev] Sha1 KeyId Algorithm
6,286,321 UART: [idev] --
6,291,672 UART: [ldev] ++
6,292,244 UART: [ldev] CDI.KEYID = 6
6,293,159 UART: [ldev] SUBJECT.KEYID = 5
6,294,375 UART: [ldev] AUTHORITY.KEYID = 7
6,295,609 UART: [ldev] FE.KEYID = 1
6,305,616 UART: [ldev] Erasing FE.KEYID = 1
8,783,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,369 UART: [ldev] --
10,575,607 UART: [fwproc] Wait for Commands...
10,578,402 UART: [fwproc] Recv command 0x46574c44
10,580,443 UART: [fwproc] Recv'd Img size: 82832 bytes
13,619,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,695,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,768,365 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,971,982 >>> mbox cmd response: success
13,972,512 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
13,975,299 UART: [afmc] ++
13,975,876 UART: [afmc] CDI.KEYID = 6
13,976,816 UART: [afmc] SUBJECT.KEYID = 7
13,978,031 UART: [afmc] AUTHORITY.KEYID = 5
16,483,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,207,035 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,209,221 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,225,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,241,083 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,256,669 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,279,689 UART: [afmc] --
18,282,854 UART: [cold-reset] --
18,285,687 UART: [state] Locking Datavault
18,289,096 UART: [state] Locking PCR0, PCR1 and PCR31
18,290,796 UART: [state] Locking ICCM
18,292,243 UART: [exit] Launching FMC @ 0x40000130
18,300,652 UART:
18,300,936 UART: Running Caliptra FMC ...
18,301,967 UART:
18,302,119 UART: [state] CFI Enabled
18,310,355 UART: [fht] FMC Alias Private Key: 7
20,076,448 UART: [art] Extend RT PCRs Done
20,077,821 UART: [art] Lock RT PCRs Done
20,079,324 UART: [art] Populate DV Done
20,084,631 UART: [fht] FMC Alias Private Key: 7
20,086,260 UART: [art] Derive CDI
20,087,040 UART: [art] Store in slot 0x4
20,130,037 UART: [art] Derive Key Pair
20,131,035 UART: [art] Store priv key in slot 0x5
22,558,122 UART: [art] Derive Key Pair - Done
22,571,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,277,553 UART: [art] Erasing AUTHORITY.KEYID = 7
24,279,059 UART: [art] PUB.X = A50E62F0738F4EA926E16B76AAADC40F1AFAC0A8FAEE1689960D00D7D68AEEDA3CEED5C1BA7497E9534A587332EA590A
24,286,358 UART: [art] PUB.Y = 94E5F1FABBAF446FBDFDB2996326CC99B0A1207B98E7D125EC65D167506B08C7721BA88F436E5C8A20AACA5D1332AC13
24,293,640 UART: [art] SIG.R = FAFE6FC2C6834C73349DC9BEC190C60C5C7B028D41B64864760369FC7E0B7CCF13BEA312EBCD5A1F2651FC4965717216
24,301,070 UART: [art] SIG.S = CB573CA211F51FB4779E8CB6743F54420980DF40FCEC416E2D73F8A7B501733CE3A0B6A7FE3654344B654783C2985621
25,279,635 UART: mbox::rt_entry...
25,280,589 UART: ____ _ _ _ ____ _____
25,282,583 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,284,615 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,286,549 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,288,481 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,290,412 UART: |_|
25,291,248 UART:
25,423,345 UART: [rt] Runtime listening for mailbox commands...
25,425,572 >>> mbox cmd response data (48 bytes)
25,426,165 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,428,529 >>> mbox cmd response data (48 bytes)
25,429,386 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,445,010 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,460 writing to cptra_bootfsm_go
3,782,110 ready_for_fw is high
3,782,727 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,878,273 >>> mbox cmd response: success
13,878,908 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,128,625 UART:
18,129,014 UART: Running Caliptra FMC ...
18,130,163 UART:
18,130,323 UART: [state] CFI Enabled
18,138,657 UART: [fht] FMC Alias Private Key: 7
19,904,167 UART: [art] Extend RT PCRs Done
19,905,392 UART: [art] Lock RT PCRs Done
19,906,965 UART: [art] Populate DV Done
19,912,324 UART: [fht] FMC Alias Private Key: 7
19,913,931 UART: [art] Derive CDI
19,914,751 UART: [art] Store in slot 0x4
19,957,080 UART: [art] Derive Key Pair
19,958,122 UART: [art] Store priv key in slot 0x5
22,385,493 UART: [art] Derive Key Pair - Done
22,398,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,104,622 UART: [art] Erasing AUTHORITY.KEYID = 7
24,106,142 UART: [art] PUB.X = A279035C2B26D9F0EB24734C2FE1F00A01FEEB5BBD474816FADEE5B5A8F54CC1BB9CA4AF3004B515FD006FC79ACE382A
24,113,403 UART: [art] PUB.Y = 66E9DD94E2799420E9872EE5C64812C12E89773EE882E4F5DEEDA2817588F0A8E222E4BF7F756934360123E65BAE7786
24,120,647 UART: [art] SIG.R = AEC881A0EB684E5090E6BA0684701E0B0435006C33357E56A39DE0375432BE9F499E76F348E32DCC88D59CFE382A327C
24,127,997 UART: [art] SIG.S = BDAC157B20CED12FFDE6CE351C721BCEDCF820DF71CD8F649F882B61C7F2D43ADFC3428B60333317D094D4017194D977
25,106,865 UART: mbox::rt_entry...
25,107,819 UART: ____ _ _ _ ____ _____
25,109,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,111,752 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,113,686 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,115,687 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,117,621 UART: |_|
25,118,430 UART:
25,248,315 UART: [rt] Runtime listening for mailbox commands...
25,250,480 >>> mbox cmd response data (48 bytes)
25,251,081 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,253,451 >>> mbox cmd response data (48 bytes)
25,254,319 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,269,889 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,053 UART:
192,427 UART: Running Caliptra ROM ...
193,606 UART:
193,757 UART: [state] CFI Enabled
265,429 UART: [state] LifecycleState = Unprovisioned
267,811 UART: [state] DebugLocked = No
270,688 UART: [state] WD Timer not started. Device not locked for debugging
274,584 UART: [kat] SHA2-256
464,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,252 UART: [kat] ++
475,744 UART: [kat] sha1
487,823 UART: [kat] SHA2-256
490,855 UART: [kat] SHA2-384
495,497 UART: [kat] SHA2-512-ACC
498,077 UART: [kat] ECC-384
2,964,680 UART: [kat] HMAC-384Kdf
2,987,147 UART: [kat] LMS
3,518,919 UART: [kat] --
3,524,781 UART: [cold-reset] ++
3,527,350 UART: [fht] FHT @ 0x50003400
3,537,615 UART: [idev] ++
3,538,316 UART: [idev] CDI.KEYID = 6
3,539,265 UART: [idev] SUBJECT.KEYID = 7
3,540,504 UART: [idev] UDS.KEYID = 0
3,541,404 ready_for_fw is high
3,541,592 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,646,001 UART: [idev] Erasing UDS.KEYID = 0
6,045,349 UART: [idev] Sha1 KeyId Algorithm
6,066,278 UART: [idev] --
6,071,465 UART: [ldev] ++
6,072,141 UART: [ldev] CDI.KEYID = 6
6,073,103 UART: [ldev] SUBJECT.KEYID = 5
6,074,263 UART: [ldev] AUTHORITY.KEYID = 7
6,075,493 UART: [ldev] FE.KEYID = 1
6,116,220 UART: [ldev] Erasing FE.KEYID = 1
8,621,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,988 UART: [ldev] --
10,431,598 UART: [fwproc] Wait for Commands...
10,433,417 UART: [fwproc] Recv command 0x46574c44
10,435,664 UART: [fwproc] Recv'd Img size: 82832 bytes
13,498,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,579,187 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,702,762 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,048,204 >>> mbox cmd response: success
14,049,287 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,051,536 UART: [afmc] ++
14,052,247 UART: [afmc] CDI.KEYID = 6
14,053,486 UART: [afmc] SUBJECT.KEYID = 7
14,054,910 UART: [afmc] AUTHORITY.KEYID = 5
16,593,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,335,480 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,337,447 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,352,524 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,367,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,382,588 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,406,563 UART: [afmc] --
18,410,336 UART: [cold-reset] --
18,414,032 UART: [state] Locking Datavault
18,420,153 UART: [state] Locking PCR0, PCR1 and PCR31
18,422,284 UART: [state] Locking ICCM
18,424,484 UART: [exit] Launching FMC @ 0x40000130
18,433,195 UART:
18,433,427 UART: Running Caliptra FMC ...
18,434,471 UART:
18,434,618 UART: [state] CFI Enabled
18,495,050 UART: [fht] FMC Alias Private Key: 7
20,282,434 UART: [art] Extend RT PCRs Done
20,283,650 UART: [art] Lock RT PCRs Done
20,285,186 UART: [art] Populate DV Done
20,290,434 UART: [fht] FMC Alias Private Key: 7
20,292,131 UART: [art] Derive CDI
20,292,941 UART: [art] Store in slot 0x4
20,349,812 UART: [art] Derive Key Pair
20,350,813 UART: [art] Store priv key in slot 0x5
22,813,927 UART: [art] Derive Key Pair - Done
22,826,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,539,542 UART: [art] Erasing AUTHORITY.KEYID = 7
24,541,046 UART: [art] PUB.X = B1885AA73AB983F3594AB3CBB8EFA3B074D07DAE1F81FEEAB934B446D262D345F2E942C8C8D6082FD585E0F2E61D8DCD
24,548,353 UART: [art] PUB.Y = 02901A853AF15412D8E462A77BEB585F261EDD8943BEC81357B67DD13BAE6B171461B0A5CAC6530AC1B0D4EB510C5E28
24,555,637 UART: [art] SIG.R = 9C443A2FC42F6E1469E427F536CE3512436B69AFE8270C6F802BC7714BD4F43651EFB3AF7D1F6D8A58218B8A2A54C2B8
24,563,029 UART: [art] SIG.S = 4BCD0650381BF94F073B7C8101C156942821C940A9FD3A0698B2E5A1BAE8B6314FB8F6952EB83703CB9291ED2C6C72FC
25,541,852 UART: mbox::rt_entry...
25,542,802 UART: ____ _ _ _ ____ _____
25,544,781 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,546,780 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,548,706 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,550,630 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,552,550 UART: |_|
25,553,401 UART:
25,684,362 UART: [rt] Runtime listening for mailbox commands...
25,686,533 >>> mbox cmd response data (48 bytes)
25,687,148 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,689,512 >>> mbox cmd response data (48 bytes)
25,690,375 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,705,943 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
3,441,808 ready_for_fw is high
3,442,790 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,059,722 >>> mbox cmd response: success
14,061,767 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,372,228 UART:
18,372,647 UART: Running Caliptra FMC ...
18,373,770 UART:
18,373,934 UART: [state] CFI Enabled
18,439,775 UART: [fht] FMC Alias Private Key: 7
20,206,092 UART: [art] Extend RT PCRs Done
20,207,324 UART: [art] Lock RT PCRs Done
20,208,982 UART: [art] Populate DV Done
20,214,689 UART: [fht] FMC Alias Private Key: 7
20,216,340 UART: [art] Derive CDI
20,217,155 UART: [art] Store in slot 0x4
20,272,821 UART: [art] Derive Key Pair
20,273,869 UART: [art] Store priv key in slot 0x5
22,736,710 UART: [art] Derive Key Pair - Done
22,749,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,462,340 UART: [art] Erasing AUTHORITY.KEYID = 7
24,463,845 UART: [art] PUB.X = 619A8ACF5B1E714C71DDCA6345E81B435A67F75F985B8CFB1A878864DBA7EA962E6B8E8EE52203592B0FC8AEA23C5FAE
24,471,166 UART: [art] PUB.Y = 987C4358CB4E5BC4F133A1DAA65CEB123C88B8D5A1D0E2D68FC3857A76E5D7E9FDF90464F24EAD8C4685B46424D9F07B
24,478,408 UART: [art] SIG.R = 865A43C5FC9FAD8FEED4FFED547670B01C0FC7C8307C0944D42D853A4E7C08E759E9C559CC71F9FF2BD34E42721E7A32
24,485,847 UART: [art] SIG.S = 2E6BF02BCF6FFBE8676A84D8C275A45BEB1A1CA92B87D525C09F9172C531F67CE17E0CE61D8270C100CF0DC905496173
25,464,933 UART: mbox::rt_entry...
25,465,890 UART: ____ _ _ _ ____ _____
25,467,875 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,469,878 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,471,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,473,819 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,475,751 UART: |_|
25,476,560 UART:
25,606,928 UART: [rt] Runtime listening for mailbox commands...
25,609,093 >>> mbox cmd response data (48 bytes)
25,609,722 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,612,059 >>> mbox cmd response data (48 bytes)
25,612,937 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,628,506 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,391 UART:
192,766 UART: Running Caliptra ROM ...
193,920 UART:
603,560 UART: [state] CFI Enabled
614,813 UART: [state] LifecycleState = Unprovisioned
617,187 UART: [state] DebugLocked = No
619,641 UART: [state] WD Timer not started. Device not locked for debugging
624,396 UART: [kat] SHA2-256
814,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,033 UART: [kat] ++
825,563 UART: [kat] sha1
835,870 UART: [kat] SHA2-256
838,901 UART: [kat] SHA2-384
843,727 UART: [kat] SHA2-512-ACC
846,321 UART: [kat] ECC-384
3,289,755 UART: [kat] HMAC-384Kdf
3,301,943 UART: [kat] LMS
3,833,742 UART: [kat] --
3,838,493 UART: [cold-reset] ++
3,839,439 UART: [fht] FHT @ 0x50003400
3,851,271 UART: [idev] ++
3,851,990 UART: [idev] CDI.KEYID = 6
3,852,876 UART: [idev] SUBJECT.KEYID = 7
3,854,126 UART: [idev] UDS.KEYID = 0
3,855,031 ready_for_fw is high
3,855,227 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,959,462 UART: [idev] Erasing UDS.KEYID = 0
6,329,351 UART: [idev] Sha1 KeyId Algorithm
6,351,509 UART: [idev] --
6,356,964 UART: [ldev] ++
6,357,835 UART: [ldev] CDI.KEYID = 6
6,358,774 UART: [ldev] SUBJECT.KEYID = 5
6,359,889 UART: [ldev] AUTHORITY.KEYID = 7
6,361,074 UART: [ldev] FE.KEYID = 1
6,373,208 UART: [ldev] Erasing FE.KEYID = 1
8,848,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,653 UART: [ldev] --
10,639,815 UART: [fwproc] Wait for Commands...
10,641,644 UART: [fwproc] Recv command 0x46574c44
10,643,958 UART: [fwproc] Recv'd Img size: 82832 bytes
13,696,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,770,497 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,894,114 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,240,760 >>> mbox cmd response: success
14,241,708 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
14,244,661 UART: [afmc] ++
14,245,394 UART: [afmc] CDI.KEYID = 6
14,246,596 UART: [afmc] SUBJECT.KEYID = 7
14,247,966 UART: [afmc] AUTHORITY.KEYID = 5
16,754,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,474,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,476,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,491,746 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,506,883 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,521,821 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,546,085 UART: [afmc] --
18,550,018 UART: [cold-reset] --
18,554,914 UART: [state] Locking Datavault
18,558,499 UART: [state] Locking PCR0, PCR1 and PCR31
18,560,648 UART: [state] Locking ICCM
18,562,750 UART: [exit] Launching FMC @ 0x40000130
18,571,430 UART:
18,571,690 UART: Running Caliptra FMC ...
18,572,804 UART:
18,572,967 UART: [state] CFI Enabled
18,581,425 UART: [fht] FMC Alias Private Key: 7
20,347,292 UART: [art] Extend RT PCRs Done
20,348,533 UART: [art] Lock RT PCRs Done
20,350,218 UART: [art] Populate DV Done
20,355,799 UART: [fht] FMC Alias Private Key: 7
20,357,392 UART: [art] Derive CDI
20,358,366 UART: [art] Store in slot 0x4
20,401,039 UART: [art] Derive Key Pair
20,402,051 UART: [art] Store priv key in slot 0x5
22,829,174 UART: [art] Derive Key Pair - Done
22,841,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,548,094 UART: [art] Erasing AUTHORITY.KEYID = 7
24,549,593 UART: [art] PUB.X = 45D67DED5067D8A9F0AC62B2701F4AEFAD84D96C8A8DDD9F013C3391C350FB544797743BAA3FB446755697B55228AF2A
24,556,891 UART: [art] PUB.Y = 91652E27442C4409D46C35C3FADDE59EE5C940465B0CDAB1884B97E233A6066246277689A8C209BA445E7B7AD9E15753
24,564,095 UART: [art] SIG.R = 743D6EFB45FDDB6B3D9BD3A505A37CA2D398056ABA6D0837FA5C57A96A72D57A3027E696389A687F5134A74DDF7F1D02
24,571,514 UART: [art] SIG.S = 2561DF23864D713A2800E6E963A0B83C34B5AEE38AE74E86D5F0F1689DF8649F4DBBA05FFD320B849260297B8B8831F6
25,550,120 UART: mbox::rt_entry...
25,551,073 UART: ____ _ _ _ ____ _____
25,553,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,555,080 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,557,017 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,559,137 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,561,083 UART: |_|
25,562,079 UART:
25,692,717 UART: [rt] Runtime listening for mailbox commands...
25,694,911 >>> mbox cmd response data (48 bytes)
25,695,521 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,697,846 >>> mbox cmd response data (48 bytes)
25,698,696 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,714,293 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
3,756,441 ready_for_fw is high
3,756,889 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,278,660 >>> mbox cmd response: success
14,279,856 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,525,432 UART:
18,525,816 UART: Running Caliptra FMC ...
18,526,928 UART:
18,527,085 UART: [state] CFI Enabled
18,535,254 UART: [fht] FMC Alias Private Key: 7
20,300,976 UART: [art] Extend RT PCRs Done
20,302,199 UART: [art] Lock RT PCRs Done
20,303,904 UART: [art] Populate DV Done
20,309,151 UART: [fht] FMC Alias Private Key: 7
20,310,695 UART: [art] Derive CDI
20,311,433 UART: [art] Store in slot 0x4
20,354,243 UART: [art] Derive Key Pair
20,355,245 UART: [art] Store priv key in slot 0x5
22,782,170 UART: [art] Derive Key Pair - Done
22,794,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,501,039 UART: [art] Erasing AUTHORITY.KEYID = 7
24,502,553 UART: [art] PUB.X = EC249F0FB5E927DB75F261AA692454753B8DD2B57996BF83964AA6AE28A1A1C889AD8413D5E5EBBE5EAB514791910B20
24,509,822 UART: [art] PUB.Y = 3A00219D9C643A0BD701CBDD68E1392407D0A26DEDCEB69FD717D10143C6B2F2DE3A3C8076B68E864B1FC51339DC0F73
24,517,081 UART: [art] SIG.R = 55EC6B0232F5CDC4A98D65EF9358CF448253217F0C084269607571C9D392CF1F100DBAFD417DCB7D4E2F2D860E56320F
24,524,483 UART: [art] SIG.S = D09B9B91A3C668C624E1E949D421D6668E215375421F5F880B37555DCBB54038F2442A5B2C02E2E507356571D9109A64
25,503,258 UART: mbox::rt_entry...
25,504,215 UART: ____ _ _ _ ____ _____
25,506,144 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,508,152 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,510,010 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,512,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,514,062 UART: |_|
25,514,882 UART:
25,645,902 UART: [rt] Runtime listening for mailbox commands...
25,648,075 >>> mbox cmd response data (48 bytes)
25,648,693 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,651,021 >>> mbox cmd response data (48 bytes)
25,651,859 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,667,429 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,481 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,057 UART: [kat] SHA2-256
881,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,103 UART: [kat] ++
886,255 UART: [kat] sha1
890,413 UART: [kat] SHA2-256
892,351 UART: [kat] SHA2-384
895,010 UART: [kat] SHA2-512-ACC
896,911 UART: [kat] ECC-384
902,612 UART: [kat] HMAC-384Kdf
907,244 UART: [kat] LMS
1,475,440 UART: [kat] --
1,476,309 UART: [cold-reset] ++
1,476,795 UART: [fht] Storing FHT @ 0x50003400
1,479,786 UART: [idev] ++
1,479,954 UART: [idev] CDI.KEYID = 6
1,480,314 UART: [idev] SUBJECT.KEYID = 7
1,480,738 UART: [idev] UDS.KEYID = 0
1,481,083 ready_for_fw is high
1,481,083 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,564 UART: [idev] Erasing UDS.KEYID = 0
1,505,264 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,006 UART: [idev] --
1,514,865 UART: [ldev] ++
1,515,033 UART: [ldev] CDI.KEYID = 6
1,515,396 UART: [ldev] SUBJECT.KEYID = 5
1,515,822 UART: [ldev] AUTHORITY.KEYID = 7
1,516,285 UART: [ldev] FE.KEYID = 1
1,521,197 UART: [ldev] Erasing FE.KEYID = 1
1,546,498 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,430 UART: [ldev] --
1,585,769 UART: [fwproc] Waiting for Commands...
1,586,464 UART: [fwproc] Received command 0x46574c44
1,587,255 UART: [fwproc] Received Image of size 82832 bytes
2,522,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,328 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,580,546 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,327 >>> mbox cmd response: success
2,667,327 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,668,459 UART: [afmc] ++
2,668,627 UART: [afmc] CDI.KEYID = 6
2,668,989 UART: [afmc] SUBJECT.KEYID = 7
2,669,414 UART: [afmc] AUTHORITY.KEYID = 5
2,705,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,669 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,041 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,724 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,390 UART: [afmc] --
2,748,380 UART: [cold-reset] --
2,749,328 UART: [state] Locking Datavault
2,750,473 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,077 UART: [state] Locking ICCM
2,751,675 UART: [exit] Launching FMC @ 0x40000130
2,757,005 UART:
2,757,021 UART: Running Caliptra FMC ...
2,757,429 UART:
2,757,483 UART: [state] CFI Enabled
2,767,591 UART: [fht] FMC Alias Private Key: 7
2,886,701 UART: [art] Extend RT PCRs Done
2,887,129 UART: [art] Lock RT PCRs Done
2,888,607 UART: [art] Populate DV Done
2,896,912 UART: [fht] FMC Alias Private Key: 7
2,897,950 UART: [art] Derive CDI
2,898,230 UART: [art] Store in slot 0x4
2,983,638 UART: [art] Derive Key Pair
2,983,998 UART: [art] Store priv key in slot 0x5
2,997,113 UART: [art] Derive Key Pair - Done
3,012,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,191 UART: [art] PUB.X = 2BB7A86B0A052F471EB7444F00E331D252AEF7013FDAE4A1E7FC79CF17B811A043E3CA9DDC345E42659314B4B9C0420A
3,034,939 UART: [art] PUB.Y = 10E1D4710FAAA156A6927DA40F090ABFEDE8AE95032EA0437BCF0E0D706660FC57DDE6E81623503432E4364E7F5490DB
3,041,878 UART: [art] SIG.R = EEF6B993B2A7D64A0A336D164991D4CF11331BDE7626ADDF4664D42371C19A247B01D296E9C5194D9B16A150B263DAC7
3,048,648 UART: [art] SIG.S = D6625155F8D4B7C8163CAACC01F7EBFCB2E352F574432F9C255B4D3A285353196304A124BD335E0637D14F7B10849079
3,072,093 UART: mbox::rt_entry...
3,072,465 UART: ____ _ _ _ ____ _____
3,073,249 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,049 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,074,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,075,585 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,076,353 UART: |_|
3,076,665 UART:
3,196,091 UART: [rt] Runtime listening for mailbox commands...
3,197,280 >>> mbox cmd response data (48 bytes)
3,197,281 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,200,068 >>> mbox cmd response data (48 bytes)
3,200,069 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,216,015 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 ready_for_fw is high
1,362,985 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,155 >>> mbox cmd response: success
2,517,155 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,578,724 UART:
2,578,740 UART: Running Caliptra FMC ...
2,579,148 UART:
2,579,202 UART: [state] CFI Enabled
2,589,714 UART: [fht] FMC Alias Private Key: 7
2,709,740 UART: [art] Extend RT PCRs Done
2,710,168 UART: [art] Lock RT PCRs Done
2,711,858 UART: [art] Populate DV Done
2,720,293 UART: [fht] FMC Alias Private Key: 7
2,721,299 UART: [art] Derive CDI
2,721,579 UART: [art] Store in slot 0x4
2,807,171 UART: [art] Derive Key Pair
2,807,531 UART: [art] Store priv key in slot 0x5
2,820,456 UART: [art] Derive Key Pair - Done
2,835,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,305 UART: [art] PUB.X = 544F6CC7EBEE437EE87EF46E5213335564A263A001F499416BF5C05813EE1B2F732E0B7AC63342B205B3EDD0B054030E
2,858,064 UART: [art] PUB.Y = 56000A1B0A40F36512F1D89DF85350C07633F117EED8188E5691CB599EE5D2ABBE3F973460CBA9791DDECAE6307B8ECB
2,864,998 UART: [art] SIG.R = 3DB84C2FD82E97E20C3C089CBB643C2D7FF3E594ED4D21A78AB84A8C8466A268B228DD76275BF47574A22F6535F92A8D
2,871,772 UART: [art] SIG.S = 37002184031C3290469D5DDB3D35321C02A9DF07D63B6B9CD2D5CDDF57F294F2849511555288D6528402A0AA9DA3803B
2,895,654 UART: mbox::rt_entry...
2,896,026 UART: ____ _ _ _ ____ _____
2,896,810 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,610 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,378 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,146 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,914 UART: |_|
2,900,226 UART:
3,018,800 UART: [rt] Runtime listening for mailbox commands...
3,019,989 >>> mbox cmd response data (48 bytes)
3,019,990 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,022,777 >>> mbox cmd response data (48 bytes)
3,022,778 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,038,724 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,783 UART: [state] LifecycleState = Unprovisioned
85,438 UART: [state] DebugLocked = No
86,008 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,590 UART: [kat] SHA2-256
881,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,636 UART: [kat] ++
885,788 UART: [kat] sha1
889,910 UART: [kat] SHA2-256
891,848 UART: [kat] SHA2-384
894,589 UART: [kat] SHA2-512-ACC
896,490 UART: [kat] ECC-384
901,959 UART: [kat] HMAC-384Kdf
906,611 UART: [kat] LMS
1,474,807 UART: [kat] --
1,475,500 UART: [cold-reset] ++
1,476,026 UART: [fht] Storing FHT @ 0x50003400
1,478,931 UART: [idev] ++
1,479,099 UART: [idev] CDI.KEYID = 6
1,479,459 UART: [idev] SUBJECT.KEYID = 7
1,479,883 UART: [idev] UDS.KEYID = 0
1,480,228 ready_for_fw is high
1,480,228 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,487,809 UART: [idev] Erasing UDS.KEYID = 0
1,504,917 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,599 UART: [idev] --
1,514,484 UART: [ldev] ++
1,514,652 UART: [ldev] CDI.KEYID = 6
1,515,015 UART: [ldev] SUBJECT.KEYID = 5
1,515,441 UART: [ldev] AUTHORITY.KEYID = 7
1,515,904 UART: [ldev] FE.KEYID = 1
1,521,146 UART: [ldev] Erasing FE.KEYID = 1
1,546,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,360 UART: [fwproc] Waiting for Commands...
1,587,079 UART: [fwproc] Received command 0x46574c44
1,587,870 UART: [fwproc] Received Image of size 82832 bytes
2,522,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,549,959 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,912 >>> mbox cmd response: success
2,667,912 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,669,024 UART: [afmc] ++
2,669,192 UART: [afmc] CDI.KEYID = 6
2,669,554 UART: [afmc] SUBJECT.KEYID = 7
2,669,979 UART: [afmc] AUTHORITY.KEYID = 5
2,704,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,590 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,079 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,962 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,645 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,525 UART: [afmc] --
2,748,413 UART: [cold-reset] --
2,749,323 UART: [state] Locking Datavault
2,750,542 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,146 UART: [state] Locking ICCM
2,751,600 UART: [exit] Launching FMC @ 0x40000130
2,756,930 UART:
2,756,946 UART: Running Caliptra FMC ...
2,757,354 UART:
2,757,497 UART: [state] CFI Enabled
2,768,329 UART: [fht] FMC Alias Private Key: 7
2,887,529 UART: [art] Extend RT PCRs Done
2,887,957 UART: [art] Lock RT PCRs Done
2,889,775 UART: [art] Populate DV Done
2,898,014 UART: [fht] FMC Alias Private Key: 7
2,899,054 UART: [art] Derive CDI
2,899,334 UART: [art] Store in slot 0x4
2,985,280 UART: [art] Derive Key Pair
2,985,640 UART: [art] Store priv key in slot 0x5
2,998,637 UART: [art] Derive Key Pair - Done
3,013,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,500 UART: [art] PUB.X = 9E3B8117810C08AA8826B20D92CF4FA7707AD7DD9CC7080FA053577024EFF7C7D1BFD54E2ABE908AF0198FC48F789775
3,037,265 UART: [art] PUB.Y = 4E1B703E057E0C32C0189D010A8E67D5A27C8ED85083BD5E56BDBB1944756DDC9CFBD76D132E23B1272B9A42D62396FB
3,044,213 UART: [art] SIG.R = D69DDD92479B0A27F21CA05978FD54311B073A313EDB06E204D482B3DD86777C884B816B0138B6792FD233AF4B6C5657
3,050,968 UART: [art] SIG.S = 3BA757E6C4E723DD3C370A3A0B71B37FF80FF6DDB6F179ED8FF7C2D32A34A332E9D4F144C230F9500328C545D12B7089
3,074,408 UART: mbox::rt_entry...
3,074,780 UART: ____ _ _ _ ____ _____
3,075,564 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,364 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,900 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,668 UART: |_|
3,078,980 UART:
3,198,119 UART: [rt] Runtime listening for mailbox commands...
3,199,308 >>> mbox cmd response data (48 bytes)
3,199,309 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,202,096 >>> mbox cmd response data (48 bytes)
3,202,097 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,218,043 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,362 ready_for_fw is high
1,363,362 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,752 >>> mbox cmd response: success
2,519,752 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,580,755 UART:
2,580,771 UART: Running Caliptra FMC ...
2,581,179 UART:
2,581,322 UART: [state] CFI Enabled
2,591,882 UART: [fht] FMC Alias Private Key: 7
2,711,466 UART: [art] Extend RT PCRs Done
2,711,894 UART: [art] Lock RT PCRs Done
2,713,414 UART: [art] Populate DV Done
2,721,503 UART: [fht] FMC Alias Private Key: 7
2,722,565 UART: [art] Derive CDI
2,722,845 UART: [art] Store in slot 0x4
2,808,381 UART: [art] Derive Key Pair
2,808,741 UART: [art] Store priv key in slot 0x5
2,822,206 UART: [art] Derive Key Pair - Done
2,836,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,942 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,707 UART: [art] PUB.X = B9DA17415ECFA222AEEEA67A4E42E35CB990A3D7012C131A14C3F0A7C3687E796F9AF1FFD08948FB3206E175C49FA479
2,859,485 UART: [art] PUB.Y = 3F08EE5883B595AE97ADFE7DBE4E2DE8267F9AE7D90AE296E07DA056C0BA9A306B790E0C79CC6CD469B41021808BFCCA
2,866,445 UART: [art] SIG.R = 969F97B394B4CD78199C5E98A150EFDF06DFEEE62C991AB5E0774600F08541AF063D6CEEE313A6EBF00BB062CEC8FC55
2,873,202 UART: [art] SIG.S = EEF8543F1BD97C0B0073B549279C6A1ECCB1706A1327491A8814307EAFB386F55E225DF1684D84973AE2DB402EA408D5
2,897,390 UART: mbox::rt_entry...
2,897,762 UART: ____ _ _ _ ____ _____
2,898,546 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,899,346 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,900,114 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,882 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,650 UART: |_|
2,901,962 UART:
3,020,998 UART: [rt] Runtime listening for mailbox commands...
3,022,187 >>> mbox cmd response data (48 bytes)
3,022,188 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,024,975 >>> mbox cmd response data (48 bytes)
3,024,976 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,040,922 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,404 UART: [kat] SHA2-256
890,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,058 UART: [kat] ++
895,210 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,163 UART: [kat] SHA2-512-ACC
906,064 UART: [kat] ECC-384
915,271 UART: [kat] HMAC-384Kdf
919,809 UART: [kat] LMS
1,168,121 UART: [kat] --
1,169,132 UART: [cold-reset] ++
1,169,470 UART: [fht] FHT @ 0x50003400
1,172,136 UART: [idev] ++
1,172,304 UART: [idev] CDI.KEYID = 6
1,172,665 UART: [idev] SUBJECT.KEYID = 7
1,173,090 UART: [idev] UDS.KEYID = 0
1,173,436 ready_for_fw is high
1,173,436 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,291 UART: [idev] Erasing UDS.KEYID = 0
1,198,265 UART: [idev] Sha1 KeyId Algorithm
1,207,173 UART: [idev] --
1,208,296 UART: [ldev] ++
1,208,464 UART: [ldev] CDI.KEYID = 6
1,208,828 UART: [ldev] SUBJECT.KEYID = 5
1,209,255 UART: [ldev] AUTHORITY.KEYID = 7
1,209,718 UART: [ldev] FE.KEYID = 1
1,215,074 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,177 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,786 >>> mbox cmd response: success
2,363,786 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,364,816 UART: [afmc] ++
2,364,984 UART: [afmc] CDI.KEYID = 6
2,365,347 UART: [afmc] SUBJECT.KEYID = 7
2,365,773 UART: [afmc] AUTHORITY.KEYID = 5
2,401,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,260 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,851 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,215 UART: [afmc] --
2,445,026 UART: [cold-reset] --
2,446,026 UART: [state] Locking Datavault
2,447,131 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,735 UART: [state] Locking ICCM
2,448,319 UART: [exit] Launching FMC @ 0x40000130
2,453,649 UART:
2,453,665 UART: Running Caliptra FMC ...
2,454,073 UART:
2,454,127 UART: [state] CFI Enabled
2,464,563 UART: [fht] FMC Alias Private Key: 7
2,583,355 UART: [art] Extend RT PCRs Done
2,583,783 UART: [art] Lock RT PCRs Done
2,584,957 UART: [art] Populate DV Done
2,593,342 UART: [fht] FMC Alias Private Key: 7
2,594,410 UART: [art] Derive CDI
2,594,690 UART: [art] Store in slot 0x4
2,680,639 UART: [art] Derive Key Pair
2,680,999 UART: [art] Store priv key in slot 0x5
2,694,069 UART: [art] Derive Key Pair - Done
2,708,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,145 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,910 UART: [art] PUB.X = 8399690394FEEEE7BBACC36D003CA21382F0CF5EB07F409792D64B7AD8C4E769BA4BE308AC191A7D928A68FD4E2672C8
2,731,666 UART: [art] PUB.Y = 8AB3E9131DD5365C9D9C97134768FC2ECE4109C6CB22EDC296EB22F02FC769DA02C6D95E93DEC8AC53CCB176C7900AF4
2,738,625 UART: [art] SIG.R = E21845486EE37D01019CA277BC35C250701B43A4464C227EF8BFEB7D223B4324A7E4BA9312D9B48990E46E313BB8C761
2,745,389 UART: [art] SIG.S = 1C38AA791F801C7FB0F040EA64D3BC3D5F104D0C47BE3ADDC754850E90DAB5438FAF6B1638F3EBFDE6BE7507F48E430F
2,769,221 UART: mbox::rt_entry...
2,769,593 UART: ____ _ _ _ ____ _____
2,770,377 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,713 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,481 UART: |_|
2,773,793 UART:
2,891,823 UART: [rt] Runtime listening for mailbox commands...
2,893,012 >>> mbox cmd response data (48 bytes)
2,893,013 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,800 >>> mbox cmd response data (48 bytes)
2,895,801 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,747 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,762 ready_for_fw is high
1,058,762 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,214,099 >>> mbox cmd response: success
2,214,099 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,276,646 UART:
2,276,662 UART: Running Caliptra FMC ...
2,277,070 UART:
2,277,124 UART: [state] CFI Enabled
2,287,570 UART: [fht] FMC Alias Private Key: 7
2,407,234 UART: [art] Extend RT PCRs Done
2,407,662 UART: [art] Lock RT PCRs Done
2,409,156 UART: [art] Populate DV Done
2,417,525 UART: [fht] FMC Alias Private Key: 7
2,418,629 UART: [art] Derive CDI
2,418,909 UART: [art] Store in slot 0x4
2,504,568 UART: [art] Derive Key Pair
2,504,928 UART: [art] Store priv key in slot 0x5
2,518,314 UART: [art] Derive Key Pair - Done
2,533,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,434 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,199 UART: [art] PUB.X = D9066769C01EBCB5127365B5C8570A7138FB9DCA71CFD6B6395BCB3499FB930A0A43E47D8143C5EF22C64969D068D2DE
2,555,965 UART: [art] PUB.Y = D04F16174C9741D3C76168B98C501175863C00C56436C54D2DF3A7DE40F64E045E125186C53F90112E4033A531DF71F0
2,562,880 UART: [art] SIG.R = 5C19A1B8129B014F795D50BA8AEC0CCD8182A82B13343540E721342BF835DF59C405ABDC49A27BF74EF43157248AE2E8
2,569,647 UART: [art] SIG.S = D41A8032D736D9883527D02DDD1302D5D603682CC2BA16C216447FFCCC8C6FF77725C51C42957E43A0153F9DA734FA58
2,592,547 UART: mbox::rt_entry...
2,592,919 UART: ____ _ _ _ ____ _____
2,593,703 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,503 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,271 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,807 UART: |_|
2,597,119 UART:
2,715,755 UART: [rt] Runtime listening for mailbox commands...
2,716,944 >>> mbox cmd response data (48 bytes)
2,716,945 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,719,732 >>> mbox cmd response data (48 bytes)
2,719,733 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,735,679 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,976 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,808 UART: [kat] LMS
1,169,120 UART: [kat] --
1,169,993 UART: [cold-reset] ++
1,170,405 UART: [fht] FHT @ 0x50003400
1,173,029 UART: [idev] ++
1,173,197 UART: [idev] CDI.KEYID = 6
1,173,558 UART: [idev] SUBJECT.KEYID = 7
1,173,983 UART: [idev] UDS.KEYID = 0
1,174,329 ready_for_fw is high
1,174,329 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,928 UART: [idev] Erasing UDS.KEYID = 0
1,198,656 UART: [idev] Sha1 KeyId Algorithm
1,207,704 UART: [idev] --
1,208,567 UART: [ldev] ++
1,208,735 UART: [ldev] CDI.KEYID = 6
1,209,099 UART: [ldev] SUBJECT.KEYID = 5
1,209,526 UART: [ldev] AUTHORITY.KEYID = 7
1,209,989 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,241,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,243 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,841 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,016 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,769 >>> mbox cmd response: success
2,362,769 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,363,901 UART: [afmc] ++
2,364,069 UART: [afmc] CDI.KEYID = 6
2,364,432 UART: [afmc] SUBJECT.KEYID = 7
2,364,858 UART: [afmc] AUTHORITY.KEYID = 5
2,400,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,421 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,958 UART: [afmc] --
2,443,925 UART: [cold-reset] --
2,444,909 UART: [state] Locking Datavault
2,446,342 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,946 UART: [state] Locking ICCM
2,447,490 UART: [exit] Launching FMC @ 0x40000130
2,452,820 UART:
2,452,836 UART: Running Caliptra FMC ...
2,453,244 UART:
2,453,387 UART: [state] CFI Enabled
2,464,229 UART: [fht] FMC Alias Private Key: 7
2,583,235 UART: [art] Extend RT PCRs Done
2,583,663 UART: [art] Lock RT PCRs Done
2,585,311 UART: [art] Populate DV Done
2,593,508 UART: [fht] FMC Alias Private Key: 7
2,594,634 UART: [art] Derive CDI
2,594,914 UART: [art] Store in slot 0x4
2,680,257 UART: [art] Derive Key Pair
2,680,617 UART: [art] Store priv key in slot 0x5
2,694,295 UART: [art] Derive Key Pair - Done
2,709,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,360 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,125 UART: [art] PUB.X = 300A27F38E03664C2AC6EC216F7A7BB1FA737C519405CC4F1F989C908601929A56082BEBC08EBE6E3BB95CB6415D9C08
2,731,885 UART: [art] PUB.Y = 17FAB86D2AB6F07F7BAC210AF280071CA47C2E43BB130DA23B0B62A977B054E529CFF8DB3AB13E2CA6434A8890BB878D
2,738,841 UART: [art] SIG.R = 5C651860FB1A42F1F0778FECC3EC2DDDD71C86ADB1E5C6F86F580B5956A2F0B203BC47BCDBB79658907C7E7BED234550
2,745,623 UART: [art] SIG.S = 5BD980F11CA3744E3312A4F2C73E1382C8CA492CBD69093F49D73E7E63B524231AC6E371A8C46CF3BFA7B836ED4C4623
2,769,488 UART: mbox::rt_entry...
2,769,860 UART: ____ _ _ _ ____ _____
2,770,644 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,444 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,980 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,748 UART: |_|
2,774,060 UART:
2,891,721 UART: [rt] Runtime listening for mailbox commands...
2,892,910 >>> mbox cmd response data (48 bytes)
2,892,911 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,895,698 >>> mbox cmd response data (48 bytes)
2,895,699 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,911,645 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,223 ready_for_fw is high
1,059,223 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,256 >>> mbox cmd response: success
2,215,256 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,276,733 UART:
2,276,749 UART: Running Caliptra FMC ...
2,277,157 UART:
2,277,300 UART: [state] CFI Enabled
2,287,812 UART: [fht] FMC Alias Private Key: 7
2,406,396 UART: [art] Extend RT PCRs Done
2,406,824 UART: [art] Lock RT PCRs Done
2,407,984 UART: [art] Populate DV Done
2,416,333 UART: [fht] FMC Alias Private Key: 7
2,417,283 UART: [art] Derive CDI
2,417,563 UART: [art] Store in slot 0x4
2,503,628 UART: [art] Derive Key Pair
2,503,988 UART: [art] Store priv key in slot 0x5
2,517,656 UART: [art] Derive Key Pair - Done
2,532,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,711 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,476 UART: [art] PUB.X = 13B5FBEA923EC32FBF44C3D279933C6A8B318A173C88AC5F3232FDE962B4A0AA5A46C173A9D785C49E076BB6F44A5745
2,555,255 UART: [art] PUB.Y = BDFDEFBE0C01FA4A6D75F3BCB1025FCF62DF5C2A07FD4829E23FA041CD9EB5A8C8A5890B222CB19F8F2EB7018794C94E
2,562,215 UART: [art] SIG.R = 2F49D56457C1A5AA10517B2E07C1B31CF6AEA0ED70577DD27C68B7F951797AA7EDF123D79A4D73145944C4B0AF52A466
2,568,990 UART: [art] SIG.S = 2B5FDD54AFCAB4157CBCA599290563DC647A14BD546C004F050261F517DF2F16BEBBD41C516A83B6A9CBEEEAB6DF379D
2,592,583 UART: mbox::rt_entry...
2,592,955 UART: ____ _ _ _ ____ _____
2,593,739 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,539 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,307 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,075 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,843 UART: |_|
2,597,155 UART:
2,715,486 UART: [rt] Runtime listening for mailbox commands...
2,716,675 >>> mbox cmd response data (48 bytes)
2,716,676 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,719,463 >>> mbox cmd response data (48 bytes)
2,719,464 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,735,410 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
85,983 UART: [state] WD Timer not started. Device not locked for debugging
87,098 UART: [kat] SHA2-256
892,748 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,873 UART: [kat] ++
897,025 UART: [kat] sha1
901,241 UART: [kat] SHA2-256
903,181 UART: [kat] SHA2-384
905,968 UART: [kat] SHA2-512-ACC
907,869 UART: [kat] ECC-384
917,230 UART: [kat] HMAC-384Kdf
921,794 UART: [kat] LMS
1,170,122 UART: [kat] --
1,171,065 UART: [cold-reset] ++
1,171,511 UART: [fht] FHT @ 0x50003400
1,174,222 UART: [idev] ++
1,174,390 UART: [idev] CDI.KEYID = 6
1,174,750 UART: [idev] SUBJECT.KEYID = 7
1,175,174 UART: [idev] UDS.KEYID = 0
1,175,519 ready_for_fw is high
1,175,519 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,973 UART: [idev] Sha1 KeyId Algorithm
1,208,329 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,024 UART: [ldev] SUBJECT.KEYID = 5
1,210,450 UART: [ldev] AUTHORITY.KEYID = 7
1,210,913 UART: [ldev] FE.KEYID = 1
1,215,969 UART: [ldev] Erasing FE.KEYID = 1
1,241,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,997 UART: [ldev] --
1,281,364 UART: [fwproc] Wait for Commands...
1,282,044 UART: [fwproc] Recv command 0x46574c44
1,282,772 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,801 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,971 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,624 >>> mbox cmd response: success
2,364,624 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,365,700 UART: [afmc] ++
2,365,868 UART: [afmc] CDI.KEYID = 6
2,366,230 UART: [afmc] SUBJECT.KEYID = 7
2,366,655 UART: [afmc] AUTHORITY.KEYID = 5
2,401,516 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,313 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,014 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,788 UART: [afmc] --
2,444,864 UART: [cold-reset] --
2,445,682 UART: [state] Locking Datavault
2,446,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,439 UART: [state] Locking ICCM
2,447,935 UART: [exit] Launching FMC @ 0x40000130
2,453,265 UART:
2,453,281 UART: Running Caliptra FMC ...
2,453,689 UART:
2,453,743 UART: [state] CFI Enabled
2,464,215 UART: [fht] FMC Alias Private Key: 7
2,584,135 UART: [art] Extend RT PCRs Done
2,584,563 UART: [art] Lock RT PCRs Done
2,585,921 UART: [art] Populate DV Done
2,594,006 UART: [fht] FMC Alias Private Key: 7
2,594,946 UART: [art] Derive CDI
2,595,226 UART: [art] Store in slot 0x4
2,681,231 UART: [art] Derive Key Pair
2,681,591 UART: [art] Store priv key in slot 0x5
2,694,759 UART: [art] Derive Key Pair - Done
2,709,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,965 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,730 UART: [art] PUB.X = 9D0E10C2A28B8570A0EA7FFC83DBCAF514425A8B05D86955F2E043CC8B1027DE4B6BB451C07F367727841145FD3372B4
2,732,500 UART: [art] PUB.Y = F92488F7313A64024572BDB3387A57653A9CDE8278AABE049209CBC53388115C9C7FCA3BAAE0C69CBCB2952D675A7FF2
2,739,451 UART: [art] SIG.R = 781809C8640B3772463558B81162F75057319BFCFDB276A2E9EE55CAA1CFF87A1C1C19737A3D340FC8537D44A1DADBBE
2,746,220 UART: [art] SIG.S = 4995C600D9F1E6AE3C69B9A7CE1CFE220AB04E5E3568EDD43D8F563837D209F361B3ADD808D6D3D3EF537BA64635D927
2,770,353 UART: mbox::rt_entry...
2,770,725 UART: ____ _ _ _ ____ _____
2,771,509 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,309 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,077 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,845 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,613 UART: |_|
2,774,925 UART:
2,892,904 UART: [rt] Runtime listening for mailbox commands...
2,894,093 >>> mbox cmd response data (48 bytes)
2,894,094 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,896,881 >>> mbox cmd response data (48 bytes)
2,896,882 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,912,828 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 ready_for_fw is high
1,060,045 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,033 >>> mbox cmd response: success
2,216,033 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,278,066 UART:
2,278,082 UART: Running Caliptra FMC ...
2,278,490 UART:
2,278,544 UART: [state] CFI Enabled
2,288,984 UART: [fht] FMC Alias Private Key: 7
2,408,242 UART: [art] Extend RT PCRs Done
2,408,670 UART: [art] Lock RT PCRs Done
2,410,430 UART: [art] Populate DV Done
2,418,635 UART: [fht] FMC Alias Private Key: 7
2,419,779 UART: [art] Derive CDI
2,420,059 UART: [art] Store in slot 0x4
2,505,652 UART: [art] Derive Key Pair
2,506,012 UART: [art] Store priv key in slot 0x5
2,518,814 UART: [art] Derive Key Pair - Done
2,533,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,704 UART: [art] PUB.X = 2C51964A26FE44F3A2EDA5DB37B40EA045262E13369735014F3E71623D855A866013B5F5F7B48F1E8A4395FFB6DDDE41
2,556,472 UART: [art] PUB.Y = 91AC6FA293D8C8FAB1A2DE548863CF9ACF889BD9BECC8FD55B2ED6E2FDC45BA5619B33863A7A796554BDDB529C9176F6
2,563,446 UART: [art] SIG.R = FE866293F29566983D7656CDA789C39031EF240F45729ADDFA3AB8B3CC4B64D4B63D687E898A320C6606FC5A90BA731E
2,570,213 UART: [art] SIG.S = 070B2FE150736381B36E4537EC65A7D64FC37C09CE7EACD5031EF1FDB047FFE8FDF47447690A4539462AB32DE57A68D9
2,594,242 UART: mbox::rt_entry...
2,594,614 UART: ____ _ _ _ ____ _____
2,595,398 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,198 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,734 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,502 UART: |_|
2,598,814 UART:
2,715,816 UART: [rt] Runtime listening for mailbox commands...
2,717,005 >>> mbox cmd response data (48 bytes)
2,717,006 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,719,793 >>> mbox cmd response data (48 bytes)
2,719,794 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,735,740 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
893,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,526 UART: [kat] ++
897,678 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,102 UART: [cold-reset] ++
1,172,456 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 ready_for_fw is high
1,176,312 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,997 UART: [idev] Erasing UDS.KEYID = 0
1,200,828 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,346 UART: [ldev] ++
1,210,514 UART: [ldev] CDI.KEYID = 6
1,210,877 UART: [ldev] SUBJECT.KEYID = 5
1,211,303 UART: [ldev] AUTHORITY.KEYID = 7
1,211,766 UART: [ldev] FE.KEYID = 1
1,217,062 UART: [ldev] Erasing FE.KEYID = 1
1,243,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,778 UART: [ldev] --
1,283,211 UART: [fwproc] Wait for Commands...
1,284,001 UART: [fwproc] Recv command 0x46574c44
1,284,729 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,916 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,615 >>> mbox cmd response: success
2,363,615 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,364,871 UART: [afmc] ++
2,365,039 UART: [afmc] CDI.KEYID = 6
2,365,401 UART: [afmc] SUBJECT.KEYID = 7
2,365,826 UART: [afmc] AUTHORITY.KEYID = 5
2,401,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,000 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,603 UART: [afmc] --
2,444,667 UART: [cold-reset] --
2,445,677 UART: [state] Locking Datavault
2,446,718 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,322 UART: [state] Locking ICCM
2,447,888 UART: [exit] Launching FMC @ 0x40000130
2,453,218 UART:
2,453,234 UART: Running Caliptra FMC ...
2,453,642 UART:
2,453,785 UART: [state] CFI Enabled
2,464,569 UART: [fht] FMC Alias Private Key: 7
2,583,271 UART: [art] Extend RT PCRs Done
2,583,699 UART: [art] Lock RT PCRs Done
2,585,251 UART: [art] Populate DV Done
2,593,702 UART: [fht] FMC Alias Private Key: 7
2,594,774 UART: [art] Derive CDI
2,595,054 UART: [art] Store in slot 0x4
2,680,875 UART: [art] Derive Key Pair
2,681,235 UART: [art] Store priv key in slot 0x5
2,694,709 UART: [art] Derive Key Pair - Done
2,709,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,833 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,598 UART: [art] PUB.X = 9D24D77D57078C44830CBB67CBFB1DCEF3129996B967836019CC373F3C02449E8CCA27A9439B69D41D345B68D35F21B7
2,732,361 UART: [art] PUB.Y = D15A9B364BA72E77DF8106B933059E1E64E592EAA205A1A3135643C402E580AC76AEAD9F145DEC9172A7F90EAEE26C03
2,739,303 UART: [art] SIG.R = A478FEE64DD080E39589DC26B0F18002D602FBF43C6ECB5A0387C45709A110CD4B8CC6542E5CCC138DBEEA95422139DE
2,746,075 UART: [art] SIG.S = FA3892E11BFF8BBA019057CCF2DF648B173E2FE88408C63DBCEE461D05137C812F42C1F6A9F5FB182B56BA871DB88BAD
2,770,090 UART: mbox::rt_entry...
2,770,462 UART: ____ _ _ _ ____ _____
2,771,246 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,046 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,814 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,582 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,350 UART: |_|
2,774,662 UART:
2,893,315 UART: [rt] Runtime listening for mailbox commands...
2,894,504 >>> mbox cmd response data (48 bytes)
2,894,505 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,897,292 >>> mbox cmd response data (48 bytes)
2,897,293 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,913,239 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,634 ready_for_fw is high
1,060,634 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,332 >>> mbox cmd response: success
2,217,332 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,279,301 UART:
2,279,317 UART: Running Caliptra FMC ...
2,279,725 UART:
2,279,868 UART: [state] CFI Enabled
2,291,204 UART: [fht] FMC Alias Private Key: 7
2,409,698 UART: [art] Extend RT PCRs Done
2,410,126 UART: [art] Lock RT PCRs Done
2,411,504 UART: [art] Populate DV Done
2,419,659 UART: [fht] FMC Alias Private Key: 7
2,420,835 UART: [art] Derive CDI
2,421,115 UART: [art] Store in slot 0x4
2,506,870 UART: [art] Derive Key Pair
2,507,230 UART: [art] Store priv key in slot 0x5
2,520,566 UART: [art] Derive Key Pair - Done
2,535,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,341 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,106 UART: [art] PUB.X = 17CB4FF7FE986C70BBFD47503EE346E1C5485DD3D17298F0B6E1057AC1C78C0FD4BDA7DB68C6B39322FDC57FB6BD164D
2,558,892 UART: [art] PUB.Y = 952CA9AFD4E08D864E9106E4CBCD95CE751A751C0F3D34AA82A88AB45D18EF9705FE2A60DF6533089F7EA3EB98C0FC5E
2,565,850 UART: [art] SIG.R = 492E2738A37BE4ECC3E0892260ACA1AC0B6D6E87E650CC55254CA63751ABEC038AFDA6B314DE175C0B0558E26DE740A7
2,572,622 UART: [art] SIG.S = F9F0BB36FAE0BBDF9E6D1BF93AA9AC78A65B73A5990EA61E1DE980649C09D185440C2FD58B5A17DD54DB0ACA5BED0398
2,596,927 UART: mbox::rt_entry...
2,597,299 UART: ____ _ _ _ ____ _____
2,598,083 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,883 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,651 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,187 UART: |_|
2,601,499 UART:
2,719,687 UART: [rt] Runtime listening for mailbox commands...
2,720,876 >>> mbox cmd response data (48 bytes)
2,720,877 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,723,664 >>> mbox cmd response data (48 bytes)
2,723,665 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,739,611 >>> mbox cmd response data (48 bytes)
test test_boot::test_boot_tci_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,084 UART:
192,459 UART: Running Caliptra ROM ...
193,648 UART:
193,808 UART: [state] CFI Enabled
262,542 UART: [state] LifecycleState = Unprovisioned
264,474 UART: [state] DebugLocked = No
266,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,844 UART: [kat] SHA2-256
441,534 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,989 UART: [kat] ++
452,593 UART: [kat] sha1
464,754 UART: [kat] SHA2-256
467,477 UART: [kat] SHA2-384
474,101 UART: [kat] SHA2-512-ACC
476,469 UART: [kat] ECC-384
2,768,579 UART: [kat] HMAC-384Kdf
2,790,221 UART: [kat] LMS
3,980,503 UART: [kat] --
3,985,607 UART: [cold-reset] ++
3,987,756 UART: [fht] Storing FHT @ 0x50003400
3,998,671 UART: [idev] ++
3,999,234 UART: [idev] CDI.KEYID = 6
4,000,187 UART: [idev] SUBJECT.KEYID = 7
4,001,435 UART: [idev] UDS.KEYID = 0
4,002,499 ready_for_fw is high
4,002,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,151,884 UART: [idev] Erasing UDS.KEYID = 0
7,340,208 UART: [idev] Using Sha1 for KeyId Algorithm
7,360,840 UART: [idev] --
7,364,125 UART: [ldev] ++
7,364,743 UART: [ldev] CDI.KEYID = 6
7,365,649 UART: [ldev] SUBJECT.KEYID = 5
7,366,864 UART: [ldev] AUTHORITY.KEYID = 7
7,368,169 UART: [ldev] FE.KEYID = 1
7,413,885 UART: [ldev] Erasing FE.KEYID = 1
10,748,488 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,059,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,074,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,089,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,103,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,123,406 UART: [ldev] --
13,127,642 UART: [fwproc] Waiting for Commands...
13,129,358 UART: [fwproc] Received command 0x46574c44
13,131,536 UART: [fwproc] Received Image of size 118548 bytes
17,235,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,909 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,083 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,071 >>> mbox cmd response: success
17,716,334 UART: [afmc] ++
17,716,968 UART: [afmc] CDI.KEYID = 6
17,717,888 UART: [afmc] SUBJECT.KEYID = 7
17,719,105 UART: [afmc] AUTHORITY.KEYID = 5
21,087,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,383,734 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,385,995 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,400,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,415,171 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,429,574 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,451,080 UART: [afmc] --
23,455,013 UART: [cold-reset] --
23,457,848 UART: [state] Locking Datavault
23,465,033 UART: [state] Locking PCR0, PCR1 and PCR31
23,466,790 UART: [state] Locking ICCM
23,468,835 UART: [exit] Launching FMC @ 0x40000130
23,477,221 UART:
23,477,483 UART: Running Caliptra FMC ...
23,478,589 UART:
23,478,752 UART: [state] CFI Enabled
23,545,767 UART: [fht] FMC Alias Private Key: 7
25,885,569 UART: [art] Extend RT PCRs Done
25,886,789 UART: [art] Lock RT PCRs Done
25,888,550 UART: [art] Populate DV Done
25,893,847 UART: [fht] FMC Alias Private Key: 7
25,895,324 UART: [art] Derive CDI
25,896,055 UART: [art] Store in slot 0x4
25,953,745 UART: [art] Derive Key Pair
25,954,783 UART: [art] Store priv key in slot 0x5
29,247,187 UART: [art] Derive Key Pair - Done
29,260,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,511 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,020 UART: [art] PUB.X = 591885716F93E245BBD2660B67B7B490B3BA7E3A032855E84A5D22875A5F87D1A67865A143CCAFB4D641C469748B05CE
31,558,282 UART: [art] PUB.Y = 616B2EFA8E3CF12CAD86C1DA713B6E32494A0D72B6D7002654A308FE079D290E4D9F64A75ADD2338E5BEB3574F1DF95D
31,565,501 UART: [art] SIG.R = 093C138DDBFA9723C030B221B289E5F2D43E88F79AF86327891844D0106BACC250BE2C7D510C00B6F3D9FB5A5CBB5D5B
31,572,880 UART: [art] SIG.S = 59D703D6E14AC9EB287AF70BA1FC09D401483E558AB513DD7785AB6AD25515A9E4D4A282129A54BCE35D656C358CBE10
32,877,844 UART: Caliptra RT
32,878,545 UART: [state] CFI Enabled
33,055,472 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,783,872 ready_for_fw is high
3,784,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,578 >>> mbox cmd response: success
23,648,383 UART:
23,648,854 UART: Running Caliptra FMC ...
23,649,982 UART:
23,650,145 UART: [state] CFI Enabled
23,700,336 UART: [fht] FMC Alias Private Key: 7
26,061,165 UART: [art] Extend RT PCRs Done
26,062,394 UART: [art] Lock RT PCRs Done
26,064,134 UART: [art] Populate DV Done
26,069,456 UART: [fht] FMC Alias Private Key: 7
26,071,058 UART: [art] Derive CDI
26,072,008 UART: [art] Store in slot 0x4
26,130,048 UART: [art] Derive Key Pair
26,131,055 UART: [art] Store priv key in slot 0x5
29,423,569 UART: [art] Derive Key Pair - Done
29,436,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,908 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,411 UART: [art] PUB.X = FBF970D0D2F959E7154B76F2EB7E0AFEB94FD986CBC04ED3E7B9831BDD67AD779B48D33A53BD8FF487986AA828027D17
31,734,724 UART: [art] PUB.Y = CA204F02F1761405987592416CFC233150A407E8353DBAB9AEDF7F87D897B7A9C31E95F0097381945E4A08F812E7FBB9
31,741,977 UART: [art] SIG.R = 92F2D4A9F64392E05DC72021D1494E35784A5700EBF8554BF580263A85E39B4EF591690167AA224083CCC519520A628E
31,749,322 UART: [art] SIG.S = 082B660A8BAB682D4BC8702593BC37C43F23D1279D16D48C0F6C4AF5DC7FAADEA9FD9CAC68D561866AA46E7776147EA7
33,054,650 UART: Caliptra RT
33,055,354 UART: [state] CFI Enabled
33,230,971 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,448 UART:
192,807 UART: Running Caliptra ROM ...
193,995 UART:
603,833 UART: [state] CFI Enabled
618,916 UART: [state] LifecycleState = Unprovisioned
620,862 UART: [state] DebugLocked = No
622,247 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,954 UART: [kat] SHA2-256
796,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,280 UART: [kat] ++
807,801 UART: [kat] sha1
819,741 UART: [kat] SHA2-256
822,394 UART: [kat] SHA2-384
828,944 UART: [kat] SHA2-512-ACC
831,345 UART: [kat] ECC-384
3,116,392 UART: [kat] HMAC-384Kdf
3,128,265 UART: [kat] LMS
4,318,387 UART: [kat] --
4,321,239 UART: [cold-reset] ++
4,323,446 UART: [fht] Storing FHT @ 0x50003400
4,334,559 UART: [idev] ++
4,335,113 UART: [idev] CDI.KEYID = 6
4,336,136 UART: [idev] SUBJECT.KEYID = 7
4,337,309 UART: [idev] UDS.KEYID = 0
4,338,286 ready_for_fw is high
4,338,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,327 UART: [idev] Erasing UDS.KEYID = 0
7,623,502 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,785 UART: [idev] --
7,648,183 UART: [ldev] ++
7,648,833 UART: [ldev] CDI.KEYID = 6
7,649,744 UART: [ldev] SUBJECT.KEYID = 5
7,650,953 UART: [ldev] AUTHORITY.KEYID = 7
7,652,229 UART: [ldev] FE.KEYID = 1
7,661,842 UART: [ldev] Erasing FE.KEYID = 1
10,946,170 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,625 UART: [ldev] --
13,308,070 UART: [fwproc] Waiting for Commands...
13,310,212 UART: [fwproc] Received command 0x46574c44
13,312,410 UART: [fwproc] Received Image of size 118548 bytes
17,416,965 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,054 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,959 >>> mbox cmd response: success
17,897,650 UART: [afmc] ++
17,898,264 UART: [afmc] CDI.KEYID = 6
17,899,172 UART: [afmc] SUBJECT.KEYID = 7
17,900,436 UART: [afmc] AUTHORITY.KEYID = 5
21,216,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,292 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,766 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,304 UART: [afmc] --
23,582,461 UART: [cold-reset] --
23,588,420 UART: [state] Locking Datavault
23,594,252 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,023 UART: [state] Locking ICCM
23,598,067 UART: [exit] Launching FMC @ 0x40000130
23,606,461 UART:
23,606,688 UART: Running Caliptra FMC ...
23,607,781 UART:
23,607,940 UART: [state] CFI Enabled
23,615,660 UART: [fht] FMC Alias Private Key: 7
25,955,563 UART: [art] Extend RT PCRs Done
25,956,777 UART: [art] Lock RT PCRs Done
25,958,560 UART: [art] Populate DV Done
25,963,750 UART: [fht] FMC Alias Private Key: 7
25,965,239 UART: [art] Derive CDI
25,965,998 UART: [art] Store in slot 0x4
26,008,264 UART: [art] Derive Key Pair
26,009,263 UART: [art] Store priv key in slot 0x5
29,251,205 UART: [art] Derive Key Pair - Done
29,264,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,150 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,662 UART: [art] PUB.X = 4E08C77F242BD294ED98005E499E1D25BE54167065C65D4ADE99D761D397C8400BE1FE2E9114EBF681FD18C2C30F7FEF
31,552,957 UART: [art] PUB.Y = C36EF76179CFE386374B5E22FEAEFE21B2B2A5621DA4216BAC4BA4BCD8511EB6463BE82AEBB896ECD2608E8277B2AEEE
31,560,242 UART: [art] SIG.R = 86D19DC3CB5D38C8D23571985D98E670C1166A7CC00169033A6CAF1449088A225F5A19B143BFF6EC6672C3A9650FCF7E
31,567,627 UART: [art] SIG.S = 746FF1592C85833DD0EF8591E77F2133C4F03FA4C1767CF43D11B7F1B43A5D73FB359EB15EB958762FC9B4641F3AF51C
32,872,919 UART: Caliptra RT
32,873,633 UART: [state] CFI Enabled
33,007,389 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
4,124,153 ready_for_fw is high
4,124,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,003 >>> mbox cmd response: success
23,812,874 UART:
23,813,285 UART: Running Caliptra FMC ...
23,814,421 UART:
23,814,583 UART: [state] CFI Enabled
23,821,997 UART: [fht] FMC Alias Private Key: 7
26,161,524 UART: [art] Extend RT PCRs Done
26,162,775 UART: [art] Lock RT PCRs Done
26,164,269 UART: [art] Populate DV Done
26,169,704 UART: [fht] FMC Alias Private Key: 7
26,171,336 UART: [art] Derive CDI
26,172,158 UART: [art] Store in slot 0x4
26,214,749 UART: [art] Derive Key Pair
26,215,747 UART: [art] Store priv key in slot 0x5
29,457,586 UART: [art] Derive Key Pair - Done
29,470,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,360 UART: [art] PUB.X = E319D2AFB94774F02BFAF6FDD4E36E4145144616C0E709BCC7BF55E421A2A20122B4AAC91D8AF064F528F4BD43E77AE7
31,759,666 UART: [art] PUB.Y = 168FB2114F1F5A66EE368D3C085EB3AF4937E502101F2F3630191BD15E6D9E38B3749C0C9F95E13038C8B28D790F7B52
31,766,911 UART: [art] SIG.R = 9B5623917BB8D2C4B24636E24C23D721981C6D4CE22F3EEDA8678B394730728576C0155AD098451D2808A4E0F1EE5307
31,774,291 UART: [art] SIG.S = B42B010B832E47E8824E980C0111F348BDD99510CDE4A17DFA1997C9A208099A287B4057E4941196758FABC66A8D9756
33,079,541 UART: Caliptra RT
33,080,301 UART: [state] CFI Enabled
33,213,191 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,082 UART:
192,454 UART: Running Caliptra ROM ...
193,597 UART:
193,744 UART: [state] CFI Enabled
263,327 UART: [state] LifecycleState = Unprovisioned
265,262 UART: [state] DebugLocked = No
268,227 UART: [state] WD Timer not started. Device not locked for debugging
271,224 UART: [kat] SHA2-256
450,867 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,674 UART: [kat] ++
462,206 UART: [kat] sha1
473,157 UART: [kat] SHA2-256
475,868 UART: [kat] SHA2-384
481,071 UART: [kat] SHA2-512-ACC
483,434 UART: [kat] ECC-384
2,946,590 UART: [kat] HMAC-384Kdf
2,972,191 UART: [kat] LMS
3,448,683 UART: [kat] --
3,452,039 UART: [cold-reset] ++
3,454,464 UART: [fht] FHT @ 0x50003400
3,465,148 UART: [idev] ++
3,465,705 UART: [idev] CDI.KEYID = 6
3,466,679 UART: [idev] SUBJECT.KEYID = 7
3,467,920 UART: [idev] UDS.KEYID = 0
3,469,004 ready_for_fw is high
3,469,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,133 UART: [idev] Erasing UDS.KEYID = 0
5,987,357 UART: [idev] Sha1 KeyId Algorithm
6,011,515 UART: [idev] --
6,017,241 UART: [ldev] ++
6,017,809 UART: [ldev] CDI.KEYID = 6
6,018,695 UART: [ldev] SUBJECT.KEYID = 5
6,019,961 UART: [ldev] AUTHORITY.KEYID = 7
6,021,190 UART: [ldev] FE.KEYID = 1
6,058,583 UART: [ldev] Erasing FE.KEYID = 1
8,561,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,733 UART: [ldev] --
10,376,705 UART: [fwproc] Wait for Commands...
10,379,394 UART: [fwproc] Recv command 0x46574c44
10,381,426 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,342 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,371 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,154 >>> mbox cmd response: success
14,354,391 UART: [afmc] ++
14,355,059 UART: [afmc] CDI.KEYID = 6
14,355,949 UART: [afmc] SUBJECT.KEYID = 7
14,357,161 UART: [afmc] AUTHORITY.KEYID = 5
16,895,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,172 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,019 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,058 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,765 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,683 UART: [afmc] --
18,698,386 UART: [cold-reset] --
18,702,835 UART: [state] Locking Datavault
18,709,044 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,795 UART: [state] Locking ICCM
18,712,941 UART: [exit] Launching FMC @ 0x40000130
18,721,335 UART:
18,721,577 UART: Running Caliptra FMC ...
18,722,672 UART:
18,722,827 UART: [state] CFI Enabled
18,774,584 UART: [fht] FMC Alias Private Key: 7
20,540,829 UART: [art] Extend RT PCRs Done
20,542,066 UART: [art] Lock RT PCRs Done
20,543,664 UART: [art] Populate DV Done
20,548,962 UART: [fht] FMC Alias Private Key: 7
20,550,436 UART: [art] Derive CDI
20,551,164 UART: [art] Store in slot 0x4
20,606,851 UART: [art] Derive Key Pair
20,607,889 UART: [art] Store priv key in slot 0x5
23,070,565 UART: [art] Derive Key Pair - Done
23,083,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,103 UART: [art] PUB.X = DC9F1039105F3925C4A736FA061A782576337E5A5AF21B9E1ED22578054117AEA82E3FDF0E0C5A609FD308B2D56D055D
24,805,354 UART: [art] PUB.Y = 7DE0F4379A4D90F3889A806BF903933BA97C845CC8F1527C32D10A79C82079CB100A0C0FFDC9BB8167A90710C56074B0
24,812,577 UART: [art] SIG.R = 1FB784D2E108A803CF48E001659DD25D82CE7BCCB6C9D65BDE367B63D094847E3F162A48A95AE00AD08EC84B5E9DAC89
24,819,968 UART: [art] SIG.S = 303F56518A0B3C532CBB6E892CBF3FC7BC2DD69C0088F852FB56203FC9E18A57735F59569516A53917E66AE656E8A1E0
25,799,592 UART: Caliptra RT
25,800,309 UART: [state] CFI Enabled
25,980,190 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
3,458,579 ready_for_fw is high
3,459,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,735 >>> mbox cmd response: success
18,536,984 UART:
18,537,375 UART: Running Caliptra FMC ...
18,538,479 UART:
18,538,634 UART: [state] CFI Enabled
18,602,456 UART: [fht] FMC Alias Private Key: 7
20,369,609 UART: [art] Extend RT PCRs Done
20,370,845 UART: [art] Lock RT PCRs Done
20,372,581 UART: [art] Populate DV Done
20,378,100 UART: [fht] FMC Alias Private Key: 7
20,379,536 UART: [art] Derive CDI
20,380,275 UART: [art] Store in slot 0x4
20,435,637 UART: [art] Derive Key Pair
20,436,673 UART: [art] Store priv key in slot 0x5
22,898,990 UART: [art] Derive Key Pair - Done
22,912,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,548 UART: [art] PUB.X = D13254A76D81108B515CA81C85677E26147E18EEE8BB35732DF159B761E66520A25FC1B35A932676E40FF1C80BD1984D
24,633,805 UART: [art] PUB.Y = 86DDB10988D0F9BC4EE621D2190A51D9D99BB2CE8DFA79935BFC22B1804F12309EF2E2F53F2791AFECDC2D528D7F9D4E
24,641,068 UART: [art] SIG.R = EF447F912272024F48B80E0FB6A9D5B6E3F5803102C66A87764D2F59F7ADF3D6569CFF700E00596C14895BE817ACB641
24,648,416 UART: [art] SIG.S = 5C5749FDDA4966F7547E886AEDE89A0A32DBA177439E9CBDFECD95DCAC5B92D6B241C8E77F885DFF68F02B3261B7E0F6
25,628,033 UART: Caliptra RT
25,628,750 UART: [state] CFI Enabled
25,808,895 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,195 writing to cptra_bootfsm_go
192,482 UART:
192,843 UART: Running Caliptra ROM ...
194,042 UART:
603,550 UART: [state] CFI Enabled
619,074 UART: [state] LifecycleState = Unprovisioned
620,955 UART: [state] DebugLocked = No
622,726 UART: [state] WD Timer not started. Device not locked for debugging
626,063 UART: [kat] SHA2-256
805,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,485 UART: [kat] ++
817,007 UART: [kat] sha1
827,462 UART: [kat] SHA2-256
830,218 UART: [kat] SHA2-384
835,042 UART: [kat] SHA2-512-ACC
837,427 UART: [kat] ECC-384
3,278,180 UART: [kat] HMAC-384Kdf
3,290,285 UART: [kat] LMS
3,766,849 UART: [kat] --
3,772,502 UART: [cold-reset] ++
3,774,230 UART: [fht] FHT @ 0x50003400
3,786,206 UART: [idev] ++
3,786,773 UART: [idev] CDI.KEYID = 6
3,787,707 UART: [idev] SUBJECT.KEYID = 7
3,789,135 UART: [idev] UDS.KEYID = 0
3,790,082 ready_for_fw is high
3,790,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,989 UART: [idev] Erasing UDS.KEYID = 0
6,269,840 UART: [idev] Sha1 KeyId Algorithm
6,293,339 UART: [idev] --
6,297,877 UART: [ldev] ++
6,298,442 UART: [ldev] CDI.KEYID = 6
6,299,325 UART: [ldev] SUBJECT.KEYID = 5
6,300,540 UART: [ldev] AUTHORITY.KEYID = 7
6,301,834 UART: [ldev] FE.KEYID = 1
6,312,943 UART: [ldev] Erasing FE.KEYID = 1
8,794,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,375 UART: [ldev] --
10,588,266 UART: [fwproc] Wait for Commands...
10,590,188 UART: [fwproc] Recv command 0x46574c44
10,592,185 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,348 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,005 >>> mbox cmd response: success
14,555,348 UART: [afmc] ++
14,555,958 UART: [afmc] CDI.KEYID = 6
14,556,843 UART: [afmc] SUBJECT.KEYID = 7
14,558,119 UART: [afmc] AUTHORITY.KEYID = 5
17,064,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,613 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,451 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,152 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,664 UART: [afmc] --
18,865,962 UART: [cold-reset] --
18,868,907 UART: [state] Locking Datavault
18,873,782 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,536 UART: [state] Locking ICCM
18,878,255 UART: [exit] Launching FMC @ 0x40000130
18,886,650 UART:
18,886,886 UART: Running Caliptra FMC ...
18,887,915 UART:
18,888,065 UART: [state] CFI Enabled
18,896,550 UART: [fht] FMC Alias Private Key: 7
20,661,753 UART: [art] Extend RT PCRs Done
20,662,992 UART: [art] Lock RT PCRs Done
20,664,644 UART: [art] Populate DV Done
20,670,153 UART: [fht] FMC Alias Private Key: 7
20,671,833 UART: [art] Derive CDI
20,672,578 UART: [art] Store in slot 0x4
20,715,336 UART: [art] Derive Key Pair
20,716,335 UART: [art] Store priv key in slot 0x5
23,143,221 UART: [art] Derive Key Pair - Done
23,156,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,564 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,065 UART: [art] PUB.X = 51DEF830973F2995549DB9FD67B49E65627FB7A9FEBF60B73C04154A3BEBE9D61B0F27AF4C03ABC81A21F1DB9D355592
24,871,368 UART: [art] PUB.Y = 76B2DDD30B6A3802354C3E24CDFD91897E3C6FBEC83B548FE04482A21B9EB8D0B0AD45B562CEB90A0B4530BA245BA1B6
24,878,605 UART: [art] SIG.R = 8DFDF8110A625EA84E21BAC62C6BA73B3CCDB5D6F316A3C07865F52B92E20CA7BA0906A8F8C689DEAC071984BC487685
24,886,003 UART: [art] SIG.S = 1701ED4D366B1A51F06B7DBDB32DE423CF0FFB7E3939EA89BBFF1A9B17033167EF8421088CFDCEF66D7DDCF9B715FEC0
25,864,419 UART: Caliptra RT
25,865,121 UART: [state] CFI Enabled
25,998,251 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,777,812 ready_for_fw is high
3,778,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,612 >>> mbox cmd response: success
18,702,522 UART:
18,703,069 UART: Running Caliptra FMC ...
18,704,208 UART:
18,704,376 UART: [state] CFI Enabled
18,711,886 UART: [fht] FMC Alias Private Key: 7
20,478,062 UART: [art] Extend RT PCRs Done
20,479,296 UART: [art] Lock RT PCRs Done
20,480,749 UART: [art] Populate DV Done
20,486,067 UART: [fht] FMC Alias Private Key: 7
20,487,616 UART: [art] Derive CDI
20,488,376 UART: [art] Store in slot 0x4
20,531,349 UART: [art] Derive Key Pair
20,532,356 UART: [art] Store priv key in slot 0x5
22,959,439 UART: [art] Derive Key Pair - Done
22,972,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,326 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,812 UART: [art] PUB.X = 95D80F6B5DE85ECA4DD655C63C0DB8B27B269EAA6675E1551B7234313E2F89A51612BF57DA3CDBCEDD6CE196991D357A
24,687,064 UART: [art] PUB.Y = 44CBC5C6AE60F25E32592995720D5861B0EE1D26F68471E885DF2CC810E3C2324084FA0BBFBF9FA6C2FA2ECAC23867B9
24,694,383 UART: [art] SIG.R = 4E7AC8FC79AA45C2E48D595092B3656980512D8B16FF96FC50C8F594DC3AE127DDE3A2CAB1CE2597A4F259A15B12F0CE
24,701,796 UART: [art] SIG.S = FF2D48AE4E09B53DF67EF2016DA8E34481FE910A344A3475410614AA2E0EB6F500107E6532F72546356A18B40A17A952
25,680,547 UART: Caliptra RT
25,681,257 UART: [state] CFI Enabled
25,813,981 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
191,982 UART:
192,346 UART: Running Caliptra ROM ...
193,485 UART:
193,635 UART: [state] CFI Enabled
266,498 UART: [state] LifecycleState = Unprovisioned
268,938 UART: [state] DebugLocked = No
271,385 UART: [state] WD Timer not started. Device not locked for debugging
275,698 UART: [kat] SHA2-256
465,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,333 UART: [kat] ++
476,775 UART: [kat] sha1
487,716 UART: [kat] SHA2-256
490,715 UART: [kat] SHA2-384
496,225 UART: [kat] SHA2-512-ACC
498,767 UART: [kat] ECC-384
2,947,413 UART: [kat] HMAC-384Kdf
2,970,528 UART: [kat] LMS
3,502,266 UART: [kat] --
3,508,393 UART: [cold-reset] ++
3,509,892 UART: [fht] FHT @ 0x50003400
3,521,361 UART: [idev] ++
3,522,007 UART: [idev] CDI.KEYID = 6
3,522,966 UART: [idev] SUBJECT.KEYID = 7
3,524,209 UART: [idev] UDS.KEYID = 0
3,525,106 ready_for_fw is high
3,525,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,361 UART: [idev] Erasing UDS.KEYID = 0
6,025,647 UART: [idev] Sha1 KeyId Algorithm
6,047,799 UART: [idev] --
6,053,085 UART: [ldev] ++
6,053,763 UART: [ldev] CDI.KEYID = 6
6,054,697 UART: [ldev] SUBJECT.KEYID = 5
6,055,851 UART: [ldev] AUTHORITY.KEYID = 7
6,057,082 UART: [ldev] FE.KEYID = 1
6,100,117 UART: [ldev] Erasing FE.KEYID = 1
8,607,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,918 UART: [ldev] --
10,413,665 UART: [fwproc] Wait for Commands...
10,415,894 UART: [fwproc] Recv command 0x46574c44
10,418,229 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,435 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,761 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,367 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,847 >>> mbox cmd response: success
14,675,182 UART: [afmc] ++
14,675,912 UART: [afmc] CDI.KEYID = 6
14,677,106 UART: [afmc] SUBJECT.KEYID = 7
14,678,545 UART: [afmc] AUTHORITY.KEYID = 5
17,213,473 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,760 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,014 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,940 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,116 UART: [afmc] --
19,013,448 UART: [cold-reset] --
19,016,613 UART: [state] Locking Datavault
19,022,084 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,230 UART: [state] Locking ICCM
19,027,193 UART: [exit] Launching FMC @ 0x40000130
19,035,867 UART:
19,036,106 UART: Running Caliptra FMC ...
19,037,158 UART:
19,037,308 UART: [state] CFI Enabled
19,094,367 UART: [fht] FMC Alias Private Key: 7
20,861,360 UART: [art] Extend RT PCRs Done
20,862,579 UART: [art] Lock RT PCRs Done
20,864,447 UART: [art] Populate DV Done
20,869,903 UART: [fht] FMC Alias Private Key: 7
20,871,484 UART: [art] Derive CDI
20,872,214 UART: [art] Store in slot 0x4
20,927,948 UART: [art] Derive Key Pair
20,928,983 UART: [art] Store priv key in slot 0x5
23,391,888 UART: [art] Derive Key Pair - Done
23,404,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,309 UART: [art] PUB.X = 7588370A505AE1DE2A23355C6C849D49F8AB2F80E0C14E1ED8CFC0EB69ABDD6D81F764F038AF14C49172AB02A8E7EAF5
25,126,575 UART: [art] PUB.Y = 8EDE1C35F77F10FF4392C683E2074CC8108CE5EBFD579841330444A6F7329B81BD290D318A9EB5C9DAEED39A647D2A5D
25,133,878 UART: [art] SIG.R = E85496036858A1B3D80F73FFA06692CD27A884D07CFFF5C66431FC4A287AD9AB5B39CFF5B541CCF35DD94E1A4025DC7C
25,141,319 UART: [art] SIG.S = BF05DA2BE929EA9F5205A32BF414AF0339663C37D5678C771346C951340EFB5FD612E2E0D15C5FF8213BDF292CEFB9F9
26,120,692 UART: Caliptra RT
26,121,399 UART: [state] CFI Enabled
26,302,656 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,417,984 ready_for_fw is high
3,418,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,780,037 >>> mbox cmd response: success
19,072,058 UART:
19,072,460 UART: Running Caliptra FMC ...
19,073,562 UART:
19,073,716 UART: [state] CFI Enabled
19,139,244 UART: [fht] FMC Alias Private Key: 7
20,926,249 UART: [art] Extend RT PCRs Done
20,927,474 UART: [art] Lock RT PCRs Done
20,929,122 UART: [art] Populate DV Done
20,934,595 UART: [fht] FMC Alias Private Key: 7
20,936,138 UART: [art] Derive CDI
20,936,894 UART: [art] Store in slot 0x4
20,993,281 UART: [art] Derive Key Pair
20,994,280 UART: [art] Store priv key in slot 0x5
23,457,273 UART: [art] Derive Key Pair - Done
23,470,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,147 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,668 UART: [art] PUB.X = 361EE96978421E51C79393F57A90982E984411C1C4B9DA9384097E02723C80F7F8D6C9D887EB5A46DF797CC89158A07B
25,191,850 UART: [art] PUB.Y = E5430D9590FEA0691592F275EE6A90D9F8AE77CF23C27C5FC837E982D84292A2583B4DA68A4B7FAAA85E4A26E78425B7
25,199,126 UART: [art] SIG.R = 52E5965B85719A885BFDCED93E4957F7DC79330B82D02FFCF5C0A4E40BDF5B7C1E4DB8661D143EA7D9D61CC87454A5BF
25,206,553 UART: [art] SIG.S = 455958050839094BE07C44A0F663577BE88C50B3CEA0CF2D799573C6C76AE1C0C75FD1789BA55AAC6DF9331569077271
26,185,623 UART: Caliptra RT
26,186,341 UART: [state] CFI Enabled
26,367,775 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,420 UART:
192,788 UART: Running Caliptra ROM ...
193,893 UART:
603,611 UART: [state] CFI Enabled
620,396 UART: [state] LifecycleState = Unprovisioned
622,729 UART: [state] DebugLocked = No
625,405 UART: [state] WD Timer not started. Device not locked for debugging
630,605 UART: [kat] SHA2-256
820,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,299 UART: [kat] ++
831,918 UART: [kat] sha1
844,366 UART: [kat] SHA2-256
847,402 UART: [kat] SHA2-384
852,691 UART: [kat] SHA2-512-ACC
855,279 UART: [kat] ECC-384
3,298,266 UART: [kat] HMAC-384Kdf
3,312,517 UART: [kat] LMS
3,844,398 UART: [kat] --
3,849,678 UART: [cold-reset] ++
3,851,397 UART: [fht] FHT @ 0x50003400
3,862,175 UART: [idev] ++
3,862,927 UART: [idev] CDI.KEYID = 6
3,863,819 UART: [idev] SUBJECT.KEYID = 7
3,865,071 UART: [idev] UDS.KEYID = 0
3,865,984 ready_for_fw is high
3,866,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,968 UART: [idev] Erasing UDS.KEYID = 0
6,338,172 UART: [idev] Sha1 KeyId Algorithm
6,360,007 UART: [idev] --
6,364,686 UART: [ldev] ++
6,365,265 UART: [ldev] CDI.KEYID = 6
6,366,154 UART: [ldev] SUBJECT.KEYID = 5
6,367,264 UART: [ldev] AUTHORITY.KEYID = 7
6,368,554 UART: [ldev] FE.KEYID = 1
6,379,797 UART: [ldev] Erasing FE.KEYID = 1
8,856,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,530 UART: [ldev] --
10,649,419 UART: [fwproc] Wait for Commands...
10,651,565 UART: [fwproc] Recv command 0x46574c44
10,653,875 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,364 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,295 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,937 >>> mbox cmd response: success
14,917,803 UART: [afmc] ++
14,918,546 UART: [afmc] CDI.KEYID = 6
14,919,659 UART: [afmc] SUBJECT.KEYID = 7
14,921,165 UART: [afmc] AUTHORITY.KEYID = 5
17,428,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,269 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,084 UART: [afmc] --
19,224,022 UART: [cold-reset] --
19,228,341 UART: [state] Locking Datavault
19,234,704 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,882 UART: [state] Locking ICCM
19,239,051 UART: [exit] Launching FMC @ 0x40000130
19,247,703 UART:
19,247,942 UART: Running Caliptra FMC ...
19,249,049 UART:
19,249,217 UART: [state] CFI Enabled
19,257,109 UART: [fht] FMC Alias Private Key: 7
21,023,495 UART: [art] Extend RT PCRs Done
21,024,706 UART: [art] Lock RT PCRs Done
21,026,145 UART: [art] Populate DV Done
21,031,459 UART: [fht] FMC Alias Private Key: 7
21,033,057 UART: [art] Derive CDI
21,033,805 UART: [art] Store in slot 0x4
21,076,615 UART: [art] Derive Key Pair
21,077,707 UART: [art] Store priv key in slot 0x5
23,503,861 UART: [art] Derive Key Pair - Done
23,516,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,854 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,367 UART: [art] PUB.X = 089737948E5532D06A052441DA84DCE8AA42C95D67E764A7B08E86FF566BB32511BBCB3DDF7B7966851937E178635BF2
25,231,579 UART: [art] PUB.Y = BCA680F72AB0FC1AB90B13B44FEA89AE22BD5DD7463E3468F0E5992483F9DAE243540C30B67EE2A9E46E7FBFF2E1B6DF
25,238,891 UART: [art] SIG.R = B87336E0E62679CF61531E9F28C5714A5BCE8A46374BF526A70AAC77198322925BD67D4B5E01B48068336917B65881FA
25,246,250 UART: [art] SIG.S = 7968E61644FA368BC5900F703C0E719A9A4FF5E71627EEF7C24BD0B33BE861E9D6E804E0D3CF1EAE3FBB1E44278E3F96
26,225,454 UART: Caliptra RT
26,226,143 UART: [state] CFI Enabled
26,359,247 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,761,459 ready_for_fw is high
3,761,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,397 >>> mbox cmd response: success
19,307,868 UART:
19,308,245 UART: Running Caliptra FMC ...
19,309,447 UART:
19,309,619 UART: [state] CFI Enabled
19,317,438 UART: [fht] FMC Alias Private Key: 7
21,083,821 UART: [art] Extend RT PCRs Done
21,085,072 UART: [art] Lock RT PCRs Done
21,086,855 UART: [art] Populate DV Done
21,092,174 UART: [fht] FMC Alias Private Key: 7
21,093,723 UART: [art] Derive CDI
21,094,462 UART: [art] Store in slot 0x4
21,137,493 UART: [art] Derive Key Pair
21,138,533 UART: [art] Store priv key in slot 0x5
23,565,056 UART: [art] Derive Key Pair - Done
23,578,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,419 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,931 UART: [art] PUB.X = 3CCF619B44794A8AA0FC0C303CEFBA5D5B1A8F4C4E6E668474B29A96EF249EE96A13CE1A12421B3DCEF3D7BD3DA7EF3A
25,293,205 UART: [art] PUB.Y = 6F797F95AE72A6768737E0E3507000FE6C28EFCE2EA8384CACC326C736E6C263ABE4C8D569D3966B312852CEBF3C9FFB
25,300,459 UART: [art] SIG.R = 490CAC106F675D86083D26BBCA5D5D5637FDCBB6F8FA37D614D61EDB9750400240113A6C557B6F1FC5C833BECD0EE3A3
25,307,890 UART: [art] SIG.S = 7FF639EFDFE106CEC83AF5028E5507676CB27313023EF27C3B86400882D1AEC8ED7D4986EFB3AE60EBAC5D3DBDDB17A3
26,286,161 UART: Caliptra RT
26,286,848 UART: [state] CFI Enabled
26,418,797 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,868 UART: [kat] HMAC-384Kdf
907,538 UART: [kat] LMS
1,475,734 UART: [kat] --
1,476,593 UART: [cold-reset] ++
1,476,959 UART: [fht] Storing FHT @ 0x50003400
1,479,764 UART: [idev] ++
1,479,932 UART: [idev] CDI.KEYID = 6
1,480,292 UART: [idev] SUBJECT.KEYID = 7
1,480,716 UART: [idev] UDS.KEYID = 0
1,481,061 ready_for_fw is high
1,481,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,440 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,300 UART: [idev] --
1,514,461 UART: [ldev] ++
1,514,629 UART: [ldev] CDI.KEYID = 6
1,514,992 UART: [ldev] SUBJECT.KEYID = 5
1,515,418 UART: [ldev] AUTHORITY.KEYID = 7
1,515,881 UART: [ldev] FE.KEYID = 1
1,521,143 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,552 UART: [ldev] --
1,585,981 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 118548 bytes
2,932,511 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,041 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,259 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,462 >>> mbox cmd response: success
3,132,516 UART: [afmc] ++
3,132,684 UART: [afmc] CDI.KEYID = 6
3,133,046 UART: [afmc] SUBJECT.KEYID = 7
3,133,471 UART: [afmc] AUTHORITY.KEYID = 5
3,168,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,566 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,346 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,055 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,938 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,621 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,601 UART: [afmc] --
3,211,575 UART: [cold-reset] --
3,212,569 UART: [state] Locking Datavault
3,213,686 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,290 UART: [state] Locking ICCM
3,214,916 UART: [exit] Launching FMC @ 0x40000130
3,220,246 UART:
3,220,262 UART: Running Caliptra FMC ...
3,220,670 UART:
3,220,724 UART: [state] CFI Enabled
3,231,080 UART: [fht] FMC Alias Private Key: 7
3,350,118 UART: [art] Extend RT PCRs Done
3,350,546 UART: [art] Lock RT PCRs Done
3,352,304 UART: [art] Populate DV Done
3,360,417 UART: [fht] FMC Alias Private Key: 7
3,361,515 UART: [art] Derive CDI
3,361,795 UART: [art] Store in slot 0x4
3,447,711 UART: [art] Derive Key Pair
3,448,071 UART: [art] Store priv key in slot 0x5
3,461,236 UART: [art] Derive Key Pair - Done
3,476,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,851 UART: [art] PUB.X = 39A73662BC274E83789E950E004CFCE44FEA3FF9F18F35371C41FB1AFFF34BAB3134E4788C6A198C228593B910FDAB58
3,499,606 UART: [art] PUB.Y = 06E08A7D1BA061D4C20E985AE66D343B39888F77F59AE12753896D2F1E7D02DA1EC918B1EF391CFA2C6973943665CA17
3,506,551 UART: [art] SIG.R = 92E685BC48597F60F7540BEB41291127525CCF9893205A4E340196AE2877DE14DE3183293D7AF45EEEDC7FEB6C08AC7C
3,513,318 UART: [art] SIG.S = 7911188F8581B007C91D8B9443DF3D4CDB7C71B5628DCB5129EB8B9BF32B2EA65D45C1E7BD6CF7276FF6ECB0973BC9CC
3,536,829 UART: Caliptra RT
3,537,080 UART: [state] CFI Enabled
3,657,090 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,904 >>> mbox cmd response: success
3,042,005 UART:
3,042,021 UART: Running Caliptra FMC ...
3,042,429 UART:
3,042,483 UART: [state] CFI Enabled
3,052,747 UART: [fht] FMC Alias Private Key: 7
3,171,119 UART: [art] Extend RT PCRs Done
3,171,547 UART: [art] Lock RT PCRs Done
3,173,105 UART: [art] Populate DV Done
3,181,388 UART: [fht] FMC Alias Private Key: 7
3,182,396 UART: [art] Derive CDI
3,182,676 UART: [art] Store in slot 0x4
3,268,092 UART: [art] Derive Key Pair
3,268,452 UART: [art] Store priv key in slot 0x5
3,282,253 UART: [art] Derive Key Pair - Done
3,297,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,358 UART: [art] PUB.X = 37847CDB2BFA1CE2049AC826C56227B7E5A5F4AE5C7247671444B486F6BC52C3AA02BE332720582766032AFEE2F45858
3,320,121 UART: [art] PUB.Y = C1F004ADCDD9FCC049654F70EC06DB03F9F80DDF6A7258D2A1ACBE1D1ABEF233F2C70B123A7B2C76D86EFB37AFF52127
3,327,084 UART: [art] SIG.R = A1F0ACFEDB74DC393C763377A891B28FA75AA406A36AAA3870A55D4584963E955460C126B5EF12D95930040AF5A134E5
3,333,849 UART: [art] SIG.S = C288AB26D2333679EE9541D4551040DCC7231549AAE7DFF6203FFC05CDA34425D73CDF8386DB8050C29A745619DB443D
3,357,338 UART: Caliptra RT
3,357,589 UART: [state] CFI Enabled
3,476,520 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,993 UART: [kat] HMAC-384Kdf
907,707 UART: [kat] LMS
1,475,903 UART: [kat] --
1,476,834 UART: [cold-reset] ++
1,477,380 UART: [fht] Storing FHT @ 0x50003400
1,480,113 UART: [idev] ++
1,480,281 UART: [idev] CDI.KEYID = 6
1,480,641 UART: [idev] SUBJECT.KEYID = 7
1,481,065 UART: [idev] UDS.KEYID = 0
1,481,410 ready_for_fw is high
1,481,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,397 UART: [idev] Erasing UDS.KEYID = 0
1,505,919 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,689 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,450 UART: [ldev] Erasing FE.KEYID = 1
1,548,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,953 UART: [ldev] --
1,587,454 UART: [fwproc] Waiting for Commands...
1,588,281 UART: [fwproc] Received command 0x46574c44
1,589,072 UART: [fwproc] Received Image of size 118548 bytes
2,932,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,998 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,216 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,625 >>> mbox cmd response: success
3,132,757 UART: [afmc] ++
3,132,925 UART: [afmc] CDI.KEYID = 6
3,133,287 UART: [afmc] SUBJECT.KEYID = 7
3,133,712 UART: [afmc] AUTHORITY.KEYID = 5
3,168,687 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,233 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,605 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,288 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,162 UART: [afmc] --
3,212,082 UART: [cold-reset] --
3,212,872 UART: [state] Locking Datavault
3,214,085 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,689 UART: [state] Locking ICCM
3,215,351 UART: [exit] Launching FMC @ 0x40000130
3,220,681 UART:
3,220,697 UART: Running Caliptra FMC ...
3,221,105 UART:
3,221,248 UART: [state] CFI Enabled
3,231,800 UART: [fht] FMC Alias Private Key: 7
3,351,224 UART: [art] Extend RT PCRs Done
3,351,652 UART: [art] Lock RT PCRs Done
3,353,270 UART: [art] Populate DV Done
3,361,575 UART: [fht] FMC Alias Private Key: 7
3,362,723 UART: [art] Derive CDI
3,363,003 UART: [art] Store in slot 0x4
3,448,811 UART: [art] Derive Key Pair
3,449,171 UART: [art] Store priv key in slot 0x5
3,462,384 UART: [art] Derive Key Pair - Done
3,477,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,393 UART: [art] PUB.X = 592F7B0211132732FBB03D117FFBBEFE5804C02D941B3F338B69A7D06251B7D6D43B4662D726E23CCE994A7B0B367F01
3,500,155 UART: [art] PUB.Y = 5BF8BA6A76A2C0E3D374CB236478AC0976DCABD9A669143E64118CE73CBA303A1DB4705C6075BA68FE24B9A948D3296C
3,507,114 UART: [art] SIG.R = 31B624502A0DA3E6314D88954B53915AF9E673E1D2405EED69AD39E4A73D02EE0959A7B66DBCA47089538C5071DA59C4
3,513,877 UART: [art] SIG.S = 31501500EF6A1BE3BDB69DA8060D83787A5D698A33B0354701E847B9C015D4EB77E62C1A59F491D46DEF16782C9EF3C6
3,537,440 UART: Caliptra RT
3,537,783 UART: [state] CFI Enabled
3,658,138 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,150 ready_for_fw is high
1,362,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,357 >>> mbox cmd response: success
3,041,758 UART:
3,041,774 UART: Running Caliptra FMC ...
3,042,182 UART:
3,042,325 UART: [state] CFI Enabled
3,052,901 UART: [fht] FMC Alias Private Key: 7
3,172,089 UART: [art] Extend RT PCRs Done
3,172,517 UART: [art] Lock RT PCRs Done
3,173,907 UART: [art] Populate DV Done
3,182,064 UART: [fht] FMC Alias Private Key: 7
3,183,142 UART: [art] Derive CDI
3,183,422 UART: [art] Store in slot 0x4
3,269,474 UART: [art] Derive Key Pair
3,269,834 UART: [art] Store priv key in slot 0x5
3,282,969 UART: [art] Derive Key Pair - Done
3,297,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,259 UART: [art] PUB.X = 8111AC10700F1C5B316E1C8FED49B186B1D13F45AA924FDECF4829CEE0130726B6C27E366AA3F8C5E757C21B80397DBA
3,321,035 UART: [art] PUB.Y = CDB9E2E0F5CCF0A221469384076855B9C542C9E0B8FB71DDB372EB3628ABA21CBA5E05D7CEC1ABE597F76B7054DCDAEA
3,328,005 UART: [art] SIG.R = C0B81305F084ADA4B6CC8841731567D7B425392CAC134A5A2FC546E0A0E24419169A981279882F7FE1A97767BF857AC1
3,334,770 UART: [art] SIG.S = F87ED11223DF8B1CBDC57050E29CDD33742A4C61A486D57E30D98745B9ED7A93BF84DF096ABE91FCAEB3E2EC315C275F
3,358,741 UART: Caliptra RT
3,359,084 UART: [state] CFI Enabled
3,478,821 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,874 UART: [kat] SHA2-256
901,814 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
915,963 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,173,080 UART: [idev] ++
1,173,248 UART: [idev] CDI.KEYID = 6
1,173,609 UART: [idev] SUBJECT.KEYID = 7
1,174,034 UART: [idev] UDS.KEYID = 0
1,174,380 ready_for_fw is high
1,174,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,467 UART: [idev] Erasing UDS.KEYID = 0
1,199,673 UART: [idev] Sha1 KeyId Algorithm
1,208,397 UART: [idev] --
1,209,500 UART: [ldev] ++
1,209,668 UART: [ldev] CDI.KEYID = 6
1,210,032 UART: [ldev] SUBJECT.KEYID = 5
1,210,459 UART: [ldev] AUTHORITY.KEYID = 7
1,210,922 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,241,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,716 UART: [ldev] --
1,281,071 UART: [fwproc] Wait for Commands...
1,281,814 UART: [fwproc] Recv command 0x46574c44
1,282,547 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,344 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,617 >>> mbox cmd response: success
2,825,765 UART: [afmc] ++
2,825,933 UART: [afmc] CDI.KEYID = 6
2,826,296 UART: [afmc] SUBJECT.KEYID = 7
2,826,722 UART: [afmc] AUTHORITY.KEYID = 5
2,862,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,103 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,984 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,685 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,474 UART: [afmc] --
2,905,383 UART: [cold-reset] --
2,906,261 UART: [state] Locking Datavault
2,907,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,312 UART: [state] Locking ICCM
2,908,918 UART: [exit] Launching FMC @ 0x40000130
2,914,248 UART:
2,914,264 UART: Running Caliptra FMC ...
2,914,672 UART:
2,914,726 UART: [state] CFI Enabled
2,925,590 UART: [fht] FMC Alias Private Key: 7
3,044,512 UART: [art] Extend RT PCRs Done
3,044,940 UART: [art] Lock RT PCRs Done
3,046,898 UART: [art] Populate DV Done
3,055,249 UART: [fht] FMC Alias Private Key: 7
3,056,285 UART: [art] Derive CDI
3,056,565 UART: [art] Store in slot 0x4
3,142,444 UART: [art] Derive Key Pair
3,142,804 UART: [art] Store priv key in slot 0x5
3,155,900 UART: [art] Derive Key Pair - Done
3,170,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,400 UART: [art] PUB.X = 4B08C1C8FB51E391CC7234BCBC69B5EEB86E1204623988278B3DE45DEE0FE45902BD8BF1430E49049F798FA5CE67520C
3,194,159 UART: [art] PUB.Y = DD845B5947E8E4ADE6C1ADB3EC0C913922C825839C15121121E34F0DDE177A93BF02268F2B2D6CC9F4F3C2C84AF74EEA
3,201,116 UART: [art] SIG.R = 28FC6F332B7C48F18C7D0100FC3FDF448ADFCFB0187D3806EF0B9477704F657B9FAB44F50A27042EDF40FCF5B29B1C6A
3,207,867 UART: [art] SIG.S = 665FD7573F6BF0640A47699FEF80EA9509E871AE6232485997B3DC5DECFF2762BAE04A26D634DF06AE8B261F0AD95143
3,232,005 UART: Caliptra RT
3,232,256 UART: [state] CFI Enabled
3,352,160 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,534 ready_for_fw is high
1,058,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,702 >>> mbox cmd response: success
2,739,947 UART:
2,739,963 UART: Running Caliptra FMC ...
2,740,371 UART:
2,740,425 UART: [state] CFI Enabled
2,751,039 UART: [fht] FMC Alias Private Key: 7
2,869,513 UART: [art] Extend RT PCRs Done
2,869,941 UART: [art] Lock RT PCRs Done
2,871,551 UART: [art] Populate DV Done
2,879,794 UART: [fht] FMC Alias Private Key: 7
2,880,940 UART: [art] Derive CDI
2,881,220 UART: [art] Store in slot 0x4
2,967,329 UART: [art] Derive Key Pair
2,967,689 UART: [art] Store priv key in slot 0x5
2,980,611 UART: [art] Derive Key Pair - Done
2,995,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,327 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,092 UART: [art] PUB.X = 7227A633DC9DDA8A6D0963B246CAEDD1C0DA0733F45F057B0DC76ABFA2C68A675304A0E4188C12A9B9F6288D1383CDCC
3,018,863 UART: [art] PUB.Y = A71B20EE03CC68563F6C9753042678B336E73F8BC9CECFEF03B0D5A43D6548FDD0D3650BE4BB489A16B966C9FD67E350
3,025,813 UART: [art] SIG.R = E8D0429CBBB086DE11A7A91FC1825CE13C863BD2731748E51B1F0F3E0EE2CF4A83796C5BCFF84606205BFE006C8904D9
3,032,561 UART: [art] SIG.S = A093C449B6D11191263690EB058E5096B44B86E905E3973C688AFA35AC32344ABAA54A570982363742B8755E810A19F2
3,055,751 UART: Caliptra RT
3,056,002 UART: [state] CFI Enabled
3,174,662 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,861 UART: [state] LifecycleState = Unprovisioned
85,516 UART: [state] DebugLocked = No
86,012 UART: [state] WD Timer not started. Device not locked for debugging
87,247 UART: [kat] SHA2-256
890,797 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,901 UART: [kat] ++
895,053 UART: [kat] sha1
899,507 UART: [kat] SHA2-256
901,447 UART: [kat] SHA2-384
904,240 UART: [kat] SHA2-512-ACC
906,141 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,664 UART: [kat] LMS
1,168,976 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,193 UART: [fht] FHT @ 0x50003400
1,172,947 UART: [idev] ++
1,173,115 UART: [idev] CDI.KEYID = 6
1,173,476 UART: [idev] SUBJECT.KEYID = 7
1,173,901 UART: [idev] UDS.KEYID = 0
1,174,247 ready_for_fw is high
1,174,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,630 UART: [idev] Erasing UDS.KEYID = 0
1,198,664 UART: [idev] Sha1 KeyId Algorithm
1,207,536 UART: [idev] --
1,208,613 UART: [ldev] ++
1,208,781 UART: [ldev] CDI.KEYID = 6
1,209,145 UART: [ldev] SUBJECT.KEYID = 5
1,209,572 UART: [ldev] AUTHORITY.KEYID = 7
1,210,035 UART: [ldev] FE.KEYID = 1
1,215,405 UART: [ldev] Erasing FE.KEYID = 1
1,241,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,495 UART: [ldev] --
1,280,698 UART: [fwproc] Wait for Commands...
1,281,423 UART: [fwproc] Recv command 0x46574c44
1,282,156 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,696 >>> mbox cmd response: success
2,825,760 UART: [afmc] ++
2,825,928 UART: [afmc] CDI.KEYID = 6
2,826,291 UART: [afmc] SUBJECT.KEYID = 7
2,826,717 UART: [afmc] AUTHORITY.KEYID = 5
2,862,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,479 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,819 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,520 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,309 UART: [afmc] --
2,906,192 UART: [cold-reset] --
2,907,078 UART: [state] Locking Datavault
2,908,219 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,823 UART: [state] Locking ICCM
2,909,397 UART: [exit] Launching FMC @ 0x40000130
2,914,727 UART:
2,914,743 UART: Running Caliptra FMC ...
2,915,151 UART:
2,915,294 UART: [state] CFI Enabled
2,925,886 UART: [fht] FMC Alias Private Key: 7
3,044,072 UART: [art] Extend RT PCRs Done
3,044,500 UART: [art] Lock RT PCRs Done
3,046,270 UART: [art] Populate DV Done
3,054,619 UART: [fht] FMC Alias Private Key: 7
3,055,733 UART: [art] Derive CDI
3,056,013 UART: [art] Store in slot 0x4
3,141,980 UART: [art] Derive Key Pair
3,142,340 UART: [art] Store priv key in slot 0x5
3,155,664 UART: [art] Derive Key Pair - Done
3,170,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,329 UART: [art] PUB.X = BD3D515DE91339806C2C91A40EF404C5F896B3B0C719C0A2C1AA5F79ADD2ACB42F97DA73977FE6BD56EC3612DBE3B717
3,193,111 UART: [art] PUB.Y = CE31722E55A5C2A26126848A379A1EF51D9ABC6F4CB4E288EC7A6260B7CB75865FF0BEC46C36BBBCFE3A66B8BB0D9F2C
3,200,082 UART: [art] SIG.R = 716BEAA3B7E297858A5AB12C702C9E372FF7EC9F9AF2EF631CB989C2062292DB139340FF48A86416C81A5E719E5405BE
3,206,854 UART: [art] SIG.S = 53A695C2FE734C35E6F555425547260445DCFF6E87B339D1BF246AE9B5F556D116A446BE7091111F3AAD3F346813F48B
3,230,415 UART: Caliptra RT
3,230,758 UART: [state] CFI Enabled
3,350,810 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,671 ready_for_fw is high
1,059,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,051 >>> mbox cmd response: success
2,740,952 UART:
2,740,968 UART: Running Caliptra FMC ...
2,741,376 UART:
2,741,519 UART: [state] CFI Enabled
2,752,035 UART: [fht] FMC Alias Private Key: 7
2,871,049 UART: [art] Extend RT PCRs Done
2,871,477 UART: [art] Lock RT PCRs Done
2,872,897 UART: [art] Populate DV Done
2,881,280 UART: [fht] FMC Alias Private Key: 7
2,882,374 UART: [art] Derive CDI
2,882,654 UART: [art] Store in slot 0x4
2,968,551 UART: [art] Derive Key Pair
2,968,911 UART: [art] Store priv key in slot 0x5
2,983,107 UART: [art] Derive Key Pair - Done
2,997,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,036 UART: [art] PUB.X = 012B69C46901182D4136A221D0AC19F681679F6642CBE1018EBAE881DD14BD33714FF78A6FD0A405E358E36027727299
3,020,788 UART: [art] PUB.Y = D9DED9EB82BEE0B578D033AA9F65E7EF93BEA42145D58A0DCFF22D300C2CEF7FF21006C365062734B6E3FDC7C75414E5
3,027,746 UART: [art] SIG.R = 3BE15D6D30A5CFADCE4BA6265CC3A7A799E9B135EBC591545002F3C1AA96661E87182C56B75C00719D8BA569EE521DB6
3,034,503 UART: [art] SIG.S = 978260159CA6D26BC0037113DAAFA3203EF28C4D89CF2F961AF0B67233374D0DE365979974E9F2B2373739B20253F6F8
3,058,348 UART: Caliptra RT
3,058,691 UART: [state] CFI Enabled
3,178,876 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,429 UART: [state] WD Timer not started. Device not locked for debugging
87,758 UART: [kat] SHA2-256
893,408 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,533 UART: [kat] ++
897,685 UART: [kat] sha1
901,897 UART: [kat] SHA2-256
903,837 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
918,420 UART: [kat] HMAC-384Kdf
923,024 UART: [kat] LMS
1,171,352 UART: [kat] --
1,172,285 UART: [cold-reset] ++
1,172,675 UART: [fht] FHT @ 0x50003400
1,175,250 UART: [idev] ++
1,175,418 UART: [idev] CDI.KEYID = 6
1,175,778 UART: [idev] SUBJECT.KEYID = 7
1,176,202 UART: [idev] UDS.KEYID = 0
1,176,547 ready_for_fw is high
1,176,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,010 UART: [idev] Erasing UDS.KEYID = 0
1,201,373 UART: [idev] Sha1 KeyId Algorithm
1,209,773 UART: [idev] --
1,210,865 UART: [ldev] ++
1,211,033 UART: [ldev] CDI.KEYID = 6
1,211,396 UART: [ldev] SUBJECT.KEYID = 5
1,211,822 UART: [ldev] AUTHORITY.KEYID = 7
1,212,285 UART: [ldev] FE.KEYID = 1
1,217,405 UART: [ldev] Erasing FE.KEYID = 1
1,243,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,547 UART: [ldev] --
1,282,956 UART: [fwproc] Wait for Commands...
1,283,700 UART: [fwproc] Recv command 0x46574c44
1,284,428 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,966 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,399 >>> mbox cmd response: success
2,829,517 UART: [afmc] ++
2,829,685 UART: [afmc] CDI.KEYID = 6
2,830,047 UART: [afmc] SUBJECT.KEYID = 7
2,830,472 UART: [afmc] AUTHORITY.KEYID = 5
2,865,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,396 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,437 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,057 UART: [afmc] --
2,908,989 UART: [cold-reset] --
2,909,925 UART: [state] Locking Datavault
2,910,890 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,494 UART: [state] Locking ICCM
2,912,152 UART: [exit] Launching FMC @ 0x40000130
2,917,482 UART:
2,917,498 UART: Running Caliptra FMC ...
2,917,906 UART:
2,917,960 UART: [state] CFI Enabled
2,928,384 UART: [fht] FMC Alias Private Key: 7
3,047,412 UART: [art] Extend RT PCRs Done
3,047,840 UART: [art] Lock RT PCRs Done
3,049,560 UART: [art] Populate DV Done
3,057,715 UART: [fht] FMC Alias Private Key: 7
3,058,809 UART: [art] Derive CDI
3,059,089 UART: [art] Store in slot 0x4
3,145,122 UART: [art] Derive Key Pair
3,145,482 UART: [art] Store priv key in slot 0x5
3,158,554 UART: [art] Derive Key Pair - Done
3,173,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,427 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,192 UART: [art] PUB.X = 0E181321499450B1E15AFDA42087AF7A5CB94B0AA2CD057FE61543FFCC3952A23E5CC70916B9B70464E9CC86DB0AA3CF
3,195,958 UART: [art] PUB.Y = 59E91C612F7EE6E859182AA42A05F9F950751DF59007D0FD5063A885895DD4FF7A45B3F55F12F497367FE160E01710F9
3,202,900 UART: [art] SIG.R = 964501B6A019DE612E45E3246FDDECD400FFF864D75A453189D71B05CCA2F1E5D228B84E1680B1BDFAE23D7A151A23BD
3,209,656 UART: [art] SIG.S = 29868550554E615380B6B29E554533A79DCF9949B7453BBAA5BD8D9ACAEC8A94C787078C4D34A91E2108C5923667B44A
3,233,156 UART: Caliptra RT
3,233,407 UART: [state] CFI Enabled
3,353,024 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 ready_for_fw is high
1,060,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,370 >>> mbox cmd response: success
2,740,531 UART:
2,740,547 UART: Running Caliptra FMC ...
2,740,955 UART:
2,741,009 UART: [state] CFI Enabled
2,751,569 UART: [fht] FMC Alias Private Key: 7
2,870,615 UART: [art] Extend RT PCRs Done
2,871,043 UART: [art] Lock RT PCRs Done
2,872,509 UART: [art] Populate DV Done
2,880,782 UART: [fht] FMC Alias Private Key: 7
2,881,846 UART: [art] Derive CDI
2,882,126 UART: [art] Store in slot 0x4
2,967,349 UART: [art] Derive Key Pair
2,967,709 UART: [art] Store priv key in slot 0x5
2,980,623 UART: [art] Derive Key Pair - Done
2,995,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,069 UART: [art] PUB.X = CA3B63CB0BBA892A0EA54966300166FF9F77D514DFCABE4B1F2C62F8C24EC3B4F53A59FD53E9051619C90461A3668B03
3,018,833 UART: [art] PUB.Y = CDF04D9A65456364DE6A0847043541D4819A99E1E961C172F19340879097174F0714711D985F34634D74DE472CA809E3
3,025,755 UART: [art] SIG.R = AC61E740C89C961C202EF65C07779F60EAB58C960DD55118A6FD0B8FF065A3894A3E827FBAB3F0F8501B18AE2651CB02
3,032,523 UART: [art] SIG.S = 564734DE8FEC9DF77C81A6D9AAE89128ED313BE17F483A26A9BC6F04F9F44C3119EA238DB255C42045EBB043AD1D2F98
3,055,724 UART: Caliptra RT
3,055,975 UART: [state] CFI Enabled
3,175,806 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,600 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
893,525 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,650 UART: [kat] ++
897,802 UART: [kat] sha1
902,020 UART: [kat] SHA2-256
903,960 UART: [kat] SHA2-384
906,675 UART: [kat] SHA2-512-ACC
908,576 UART: [kat] ECC-384
918,121 UART: [kat] HMAC-384Kdf
922,813 UART: [kat] LMS
1,171,141 UART: [kat] --
1,171,896 UART: [cold-reset] ++
1,172,316 UART: [fht] FHT @ 0x50003400
1,175,005 UART: [idev] ++
1,175,173 UART: [idev] CDI.KEYID = 6
1,175,533 UART: [idev] SUBJECT.KEYID = 7
1,175,957 UART: [idev] UDS.KEYID = 0
1,176,302 ready_for_fw is high
1,176,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,733 UART: [idev] Erasing UDS.KEYID = 0
1,200,814 UART: [idev] Sha1 KeyId Algorithm
1,209,334 UART: [idev] --
1,210,330 UART: [ldev] ++
1,210,498 UART: [ldev] CDI.KEYID = 6
1,210,861 UART: [ldev] SUBJECT.KEYID = 5
1,211,287 UART: [ldev] AUTHORITY.KEYID = 7
1,211,750 UART: [ldev] FE.KEYID = 1
1,217,010 UART: [ldev] Erasing FE.KEYID = 1
1,243,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,570 UART: [ldev] --
1,283,083 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,591 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,336 >>> mbox cmd response: success
2,828,464 UART: [afmc] ++
2,828,632 UART: [afmc] CDI.KEYID = 6
2,828,994 UART: [afmc] SUBJECT.KEYID = 7
2,829,419 UART: [afmc] AUTHORITY.KEYID = 5
2,865,184 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,397 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,737 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,438 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,340 UART: [afmc] --
2,908,464 UART: [cold-reset] --
2,909,418 UART: [state] Locking Datavault
2,910,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,881 UART: [state] Locking ICCM
2,911,481 UART: [exit] Launching FMC @ 0x40000130
2,916,811 UART:
2,916,827 UART: Running Caliptra FMC ...
2,917,235 UART:
2,917,378 UART: [state] CFI Enabled
2,927,996 UART: [fht] FMC Alias Private Key: 7
3,046,506 UART: [art] Extend RT PCRs Done
3,046,934 UART: [art] Lock RT PCRs Done
3,048,434 UART: [art] Populate DV Done
3,056,395 UART: [fht] FMC Alias Private Key: 7
3,057,533 UART: [art] Derive CDI
3,057,813 UART: [art] Store in slot 0x4
3,143,654 UART: [art] Derive Key Pair
3,144,014 UART: [art] Store priv key in slot 0x5
3,157,360 UART: [art] Derive Key Pair - Done
3,171,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,505 UART: [art] PUB.X = 8D47F71ED013F9CEA654674CEEA5D539B5B93665F6B5A7C990421E8A99E4080A437FD51112662D192FD740EE6A2F543D
3,194,273 UART: [art] PUB.Y = 5FAE033EE675736F90CE2540AAF678C22AF1D7B197A9AE44BB9B28A61705353EB2630057ADE11A885EEF6ADB95A62539
3,201,205 UART: [art] SIG.R = 06EDD4DA776E6EE9AA6B8628258CCE13FA9E6F373F519BB34AD95F05D79F953CE10F772F00F1A822D7E7318980312643
3,207,950 UART: [art] SIG.S = B5392D5928F51890CBED64C28FD474A62CDB6A8D34E8F8101E5F17802555A3EEE43CB4A404090DFF94ACCA404F615975
3,231,815 UART: Caliptra RT
3,232,158 UART: [state] CFI Enabled
3,351,143 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,384 ready_for_fw is high
1,061,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,799 >>> mbox cmd response: success
2,742,944 UART:
2,742,960 UART: Running Caliptra FMC ...
2,743,368 UART:
2,743,511 UART: [state] CFI Enabled
2,754,027 UART: [fht] FMC Alias Private Key: 7
2,872,829 UART: [art] Extend RT PCRs Done
2,873,257 UART: [art] Lock RT PCRs Done
2,874,715 UART: [art] Populate DV Done
2,882,878 UART: [fht] FMC Alias Private Key: 7
2,883,874 UART: [art] Derive CDI
2,884,154 UART: [art] Store in slot 0x4
2,969,819 UART: [art] Derive Key Pair
2,970,179 UART: [art] Store priv key in slot 0x5
2,983,603 UART: [art] Derive Key Pair - Done
2,998,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,403 UART: [art] PUB.X = 0258690B22B785FBB3252194222571DE54D0AFDF61C20E68283DA1CBCD92EFE38B5A8424EF55FACFE0675B82B2131F7F
3,021,174 UART: [art] PUB.Y = 14CC9ADDF4844D3CD98BD13809C00C1D89C527E08EFEA30EB5003C95BF2C1DB411A6778CFC8D8707DDE73C8D6A7B527C
3,028,110 UART: [art] SIG.R = DB081E6EFC63BBA9E40FE69A5048C7297654CCA4EF8DEC6228130E27FDBB7448AA16F473CE6D8EB4F96C764F8964F087
3,034,887 UART: [art] SIG.S = 2400A5DB1ADDAE25BEBE99C3488D78E33A68AA75BDF0C925F8D70A246E8BA41D695664282006E040804BE24830862718
3,058,431 UART: Caliptra RT
3,058,774 UART: [state] CFI Enabled
3,179,113 UART: [rt] RT listening for mailbox commands...
test test_boot::test_fw_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,868 writing to cptra_bootfsm_go
2,227,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,228,684 UART:
2,228,946 UART: Running Caliptra ROM ...
2,230,071 UART:
2,230,229 UART: [state] CFI Enabled
2,231,129 UART: [state] LifecycleState = Unprovisioned
2,232,792 UART: [state] DebugLocked = No
2,233,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,237,222 UART: [kat] SHA2-256
2,237,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,240,896 UART: [kat] ++
2,241,346 UART: [kat] sha1
2,241,862 UART: [kat] SHA2-256
2,242,518 UART: [kat] SHA2-384
2,243,177 UART: [kat] SHA2-512-ACC
2,243,975 UART: [kat] ECC-384
2,765,054 UART: [kat] HMAC-384Kdf
2,777,646 UART: [kat] LMS
3,967,984 UART: [kat] --
3,971,515 UART: [cold-reset] ++
3,972,695 UART: [fht] Storing FHT @ 0x50003400
3,985,501 UART: [idev] ++
3,986,127 UART: [idev] CDI.KEYID = 6
3,987,038 UART: [idev] SUBJECT.KEYID = 7
3,988,312 UART: [idev] UDS.KEYID = 0
4,011,813 UART: [idev] Erasing UDS.KEYID = 0
7,324,411 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,034 UART: [idev] --
7,347,951 UART: [ldev] ++
7,348,518 UART: [ldev] CDI.KEYID = 6
7,349,455 UART: [ldev] SUBJECT.KEYID = 5
7,350,612 UART: [ldev] AUTHORITY.KEYID = 7
7,351,954 UART: [ldev] FE.KEYID = 1
7,398,630 UART: [ldev] Erasing FE.KEYID = 1
10,731,112 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,787 UART: [ldev] --
13,091,762 UART: [fwproc] Waiting for Commands...
13,094,943 UART: [fwproc] Received command 0x4d454153
13,103,832 >>> mbox cmd response data (12 bytes)
13,106,603 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,212,015 UART: [fwproc] Received command 0x46574c44
13,214,297 UART: [fwproc] Received Image of size 82832 bytes
16,885,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,963,222 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,036,372 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,239,428 >>> mbox cmd response: success
17,244,023 UART: [afmc] ++
17,244,613 UART: [afmc] CDI.KEYID = 6
17,245,527 UART: [afmc] SUBJECT.KEYID = 7
17,246,798 UART: [afmc] AUTHORITY.KEYID = 5
20,602,600 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,901,501 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,903,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,918,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,932,956 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,947,345 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,968,707 UART: [afmc] --
22,971,914 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
22,972,284 UART: [cold-reset] --
22,974,501 UART: [state] Locking Datavault
22,978,826 UART: [state] Locking PCR0, PCR1 and PCR31
22,980,546 UART: [state] Locking ICCM
22,982,751 UART: [exit] Launching FMC @ 0x40000130
22,991,150 UART:
22,991,385 UART: Running Caliptra FMC ...
22,992,485 UART:
22,992,649 UART: [state] CFI Enabled
23,060,912 UART: [fht] FMC Alias Private Key: 7
25,422,306 UART: [art] Extend RT PCRs Done
25,423,524 UART: [art] Lock RT PCRs Done
25,424,905 UART: [art] Populate DV Done
25,430,323 UART: [fht] FMC Alias Private Key: 7
25,431,912 UART: [art] Derive CDI
25,432,647 UART: [art] Store in slot 0x4
25,490,418 UART: [art] Derive Key Pair
25,491,453 UART: [art] Store priv key in slot 0x5
28,784,475 UART: [art] Derive Key Pair - Done
28,797,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,079,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,080,562 UART: [art] PUB.X = F6498F60F51E5EED82D21990B2D2DDD18675D55E89829CB4578925168A4105D8582AB57C58BC7EAFF6C949149674012D
31,087,791 UART: [art] PUB.Y = 7838AF830CFB596D10DE4F9FC701F11A9161491A6C2725228B3001C8299B75B5575C4B5CCA16E4AE9A62D416615B8D2D
31,095,029 UART: [art] SIG.R = 45F1779BF82C39954F333E400658B32E38CE0D37CD301B2695D69B5CEA9FB409D461DCC486ED5B145DFFAA79C8B3D6A1
31,102,417 UART: [art] SIG.S = C9EC8804FE601099155F196487469FF8DF78F3955E2099CE47F0CA6D613C40D0BF002E07931F70AD09E63E2BCDFA3097
32,406,789 UART: mbox::rt_entry...
32,407,886 UART: ____ _ _ _ ____ _____
32,409,898 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,411,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,413,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,415,766 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,417,696 UART: |_|
32,418,533 UART:
32,562,286 UART: [rt] Runtime listening for mailbox commands...
32,564,449 >>> mbox cmd response data (48 bytes)
32,565,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,567,592 >>> mbox cmd response data (48 bytes)
32,568,521 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,585,441 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
2,228,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,830,869 >>> mbox cmd response data (12 bytes)
12,834,448 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,330,164 >>> mbox cmd response: success
23,017,513 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,030,678 UART:
23,030,999 UART: Running Caliptra FMC ...
23,032,082 UART:
23,032,241 UART: [state] CFI Enabled
23,102,618 UART: [fht] FMC Alias Private Key: 7
25,442,540 UART: [art] Extend RT PCRs Done
25,443,763 UART: [art] Lock RT PCRs Done
25,445,526 UART: [art] Populate DV Done
25,450,887 UART: [fht] FMC Alias Private Key: 7
25,452,370 UART: [art] Derive CDI
25,453,137 UART: [art] Store in slot 0x4
25,511,505 UART: [art] Derive Key Pair
25,512,546 UART: [art] Store priv key in slot 0x5
28,804,711 UART: [art] Derive Key Pair - Done
28,817,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,107,588 UART: [art] Erasing AUTHORITY.KEYID = 7
31,109,117 UART: [art] PUB.X = 6CB3765FF8A4AE4E8C7470C046791D70E3A699929A2CD74402CD9F6EF2E4204EB6A88D1D8AEDA1B5DB377CEBF199051D
31,116,413 UART: [art] PUB.Y = 69B87EF35F7FCF1454C2DE5B4DA68D4D7A57411EE7215681DC6808A54A80C99A319B10F1893B13634F7212696B0B8B66
31,123,655 UART: [art] SIG.R = 0D9FC2E97FC1319170DD7E5880F245CDEB308033F92CAD54B5BE6941F9F72110446E2F99289AC35323CECF717C58AAD6
31,131,041 UART: [art] SIG.S = C37CF88B461783FED3E4B172D84FB3CCB8FE4C42B7B1C8A0ABE306E65B53FE7146BA1A54B8B6EA85EE47399CE5710776
32,436,028 UART: mbox::rt_entry...
32,437,001 UART: ____ _ _ _ ____ _____
32,439,216 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,441,237 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,443,171 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,445,128 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,447,058 UART: |_|
32,447,894 UART:
32,591,478 UART: [rt] Runtime listening for mailbox commands...
32,593,644 >>> mbox cmd response data (48 bytes)
32,594,180 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,596,500 >>> mbox cmd response data (48 bytes)
32,597,399 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,614,302 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
2,225,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,226,924 UART:
2,227,163 UART: Running Caliptra ROM ...
2,228,222 UART:
2,228,372 UART: [state] CFI Enabled
2,229,250 UART: [state] LifecycleState = Unprovisioned
2,230,803 UART: [state] DebugLocked = No
2,231,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,235,237 UART: [kat] SHA2-256
2,235,898 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,238,896 UART: [kat] ++
2,239,343 UART: [kat] sha1
2,239,852 UART: [kat] SHA2-256
2,240,501 UART: [kat] SHA2-384
2,241,152 UART: [kat] SHA2-512-ACC
2,241,944 UART: [kat] ECC-384
3,113,962 UART: [kat] HMAC-384Kdf
3,125,256 UART: [kat] LMS
4,315,377 UART: [kat] --
4,320,657 UART: [cold-reset] ++
4,323,088 UART: [fht] Storing FHT @ 0x50003400
4,334,847 UART: [idev] ++
4,335,405 UART: [idev] CDI.KEYID = 6
4,336,371 UART: [idev] SUBJECT.KEYID = 7
4,337,639 UART: [idev] UDS.KEYID = 0
4,355,290 UART: [idev] Erasing UDS.KEYID = 0
7,624,723 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,767 UART: [idev] --
7,649,460 UART: [ldev] ++
7,650,022 UART: [ldev] CDI.KEYID = 6
7,650,985 UART: [ldev] SUBJECT.KEYID = 5
7,652,194 UART: [ldev] AUTHORITY.KEYID = 7
7,653,501 UART: [ldev] FE.KEYID = 1
7,663,572 UART: [ldev] Erasing FE.KEYID = 1
10,954,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,157 UART: [ldev] --
13,313,143 UART: [fwproc] Waiting for Commands...
13,314,748 UART: [fwproc] Received command 0x4d454153
13,323,638 >>> mbox cmd response data (12 bytes)
13,326,413 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,431,865 UART: [fwproc] Received command 0x46574c44
13,434,131 UART: [fwproc] Received Image of size 82832 bytes
17,099,158 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,171,827 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,244,955 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,448,597 >>> mbox cmd response: success
17,453,497 UART: [afmc] ++
17,454,079 UART: [afmc] CDI.KEYID = 6
17,454,985 UART: [afmc] SUBJECT.KEYID = 7
17,456,247 UART: [afmc] AUTHORITY.KEYID = 5
20,773,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,066,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,068,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,083,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,097,823 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,112,290 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,133,995 UART: [afmc] --
23,136,900 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,137,257 UART: [cold-reset] --
23,142,123 UART: [state] Locking Datavault
23,147,870 UART: [state] Locking PCR0, PCR1 and PCR31
23,149,567 UART: [state] Locking ICCM
23,152,035 UART: [exit] Launching FMC @ 0x40000130
23,160,430 UART:
23,160,658 UART: Running Caliptra FMC ...
23,161,751 UART:
23,161,911 UART: [state] CFI Enabled
23,169,789 UART: [fht] FMC Alias Private Key: 7
25,509,743 UART: [art] Extend RT PCRs Done
25,510,957 UART: [art] Lock RT PCRs Done
25,512,738 UART: [art] Populate DV Done
25,518,082 UART: [fht] FMC Alias Private Key: 7
25,519,832 UART: [art] Derive CDI
25,520,635 UART: [art] Store in slot 0x4
25,563,547 UART: [art] Derive Key Pair
25,564,538 UART: [art] Store priv key in slot 0x5
28,805,858 UART: [art] Derive Key Pair - Done
28,818,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,099,079 UART: [art] Erasing AUTHORITY.KEYID = 7
31,100,596 UART: [art] PUB.X = C07A7443C5F58FF927E3AC552839977071AE5B2DBCECAB10F27F04B69F02CE8220DAE202F4D20CE3DA5EBB09F8A1DDC0
31,107,918 UART: [art] PUB.Y = 7AA325A7D04891E248BFF963DE9C7DFD77A30B46B68EA9D3ED06369050D6C3E88639DCFE27F62D849D45EFF2F967B676
31,115,148 UART: [art] SIG.R = 39C868445008FFC8598CCEBFA4BF8A6915045A20B58362CC60DD270B2680B758CB01CC68023E8A002FFC53C8F1033527
31,122,483 UART: [art] SIG.S = C62827F92E3971C74B720920D7E1A428A75E0A31FCFFDD47E36F8560B25DD14BF697A7C6C15F48102A720E35F292498E
32,427,652 UART: mbox::rt_entry...
32,428,785 UART: ____ _ _ _ ____ _____
32,430,690 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,432,686 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,434,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,436,538 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,438,463 UART: |_|
32,439,269 UART:
32,582,631 UART: [rt] Runtime listening for mailbox commands...
32,584,804 >>> mbox cmd response data (48 bytes)
32,585,412 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,587,849 >>> mbox cmd response data (48 bytes)
32,588,741 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,605,694 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,062 writing to cptra_bootfsm_go
2,227,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,056,870 >>> mbox cmd response data (12 bytes)
13,060,087 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,556,943 >>> mbox cmd response: success
23,180,776 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
23,196,366 UART:
23,196,693 UART: Running Caliptra FMC ...
23,197,771 UART:
23,197,920 UART: [state] CFI Enabled
23,205,732 UART: [fht] FMC Alias Private Key: 7
25,545,611 UART: [art] Extend RT PCRs Done
25,546,841 UART: [art] Lock RT PCRs Done
25,548,490 UART: [art] Populate DV Done
25,553,690 UART: [fht] FMC Alias Private Key: 7
25,555,330 UART: [art] Derive CDI
25,556,137 UART: [art] Store in slot 0x4
25,599,049 UART: [art] Derive Key Pair
25,600,048 UART: [art] Store priv key in slot 0x5
28,841,578 UART: [art] Derive Key Pair - Done
28,854,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,134,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,136,044 UART: [art] PUB.X = 0F9624345DBE0FBA74AD145733FCD40A157C02E7B75925CD6172C79AE2DB88033DF2EE2A67674F99A126E59B0192D857
31,143,300 UART: [art] PUB.Y = 6322034F5A43CCD5A7D82DC082E737951424B76FF8700662A96976E031D20778EEE024FA4F6553774FA9EF02E5862AA0
31,150,511 UART: [art] SIG.R = CEBB6DDAFAD4FD12EF370B243DEE8121F0536FA93B34A06BFAEF85B655AE73EA69099B243A056C3CC1A9CEDFDF6BEE8C
31,157,966 UART: [art] SIG.S = BF71EE572242AEBBB378206F8A53D62819FB7A7A2CD3B936B6656CB6436B56038EA60BBD7BAE8CFBDDEB6AECC46D6E52
32,463,002 UART: mbox::rt_entry...
32,463,979 UART: ____ _ _ _ ____ _____
32,465,962 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,467,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,469,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,471,846 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,473,771 UART: |_|
32,474,574 UART:
32,618,124 UART: [rt] Runtime listening for mailbox commands...
32,620,296 >>> mbox cmd response data (48 bytes)
32,620,853 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
32,623,187 >>> mbox cmd response data (48 bytes)
32,624,068 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
32,640,929 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
2,211,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,212,632 UART:
2,212,893 UART: Running Caliptra ROM ...
2,213,985 UART:
2,214,136 UART: [state] CFI Enabled
2,215,045 UART: [state] LifecycleState = Unprovisioned
2,216,709 UART: [state] DebugLocked = No
2,217,733 UART: [state] WD Timer not started. Device not locked for debugging
2,220,196 UART: [kat] SHA2-256
2,220,863 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,223,861 UART: [kat] ++
2,224,307 UART: [kat] sha1
2,224,814 UART: [kat] SHA2-256
2,225,471 UART: [kat] SHA2-384
2,226,127 UART: [kat] SHA2-512-ACC
2,226,924 UART: [kat] ECC-384
2,946,963 UART: [kat] HMAC-384Kdf
2,969,293 UART: [kat] LMS
3,445,780 UART: [kat] --
3,449,874 UART: [cold-reset] ++
3,450,992 UART: [fht] FHT @ 0x50003400
3,463,583 UART: [idev] ++
3,464,198 UART: [idev] CDI.KEYID = 6
3,465,139 UART: [idev] SUBJECT.KEYID = 7
3,466,348 UART: [idev] UDS.KEYID = 0
3,498,825 UART: [idev] Erasing UDS.KEYID = 0
5,985,417 UART: [idev] Sha1 KeyId Algorithm
6,008,883 UART: [idev] --
6,014,111 UART: [ldev] ++
6,014,691 UART: [ldev] CDI.KEYID = 6
6,015,576 UART: [ldev] SUBJECT.KEYID = 5
6,016,788 UART: [ldev] AUTHORITY.KEYID = 7
6,018,072 UART: [ldev] FE.KEYID = 1
6,054,459 UART: [ldev] Erasing FE.KEYID = 1
8,563,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,070 UART: [ldev] --
10,375,045 UART: [fwproc] Wait for Commands...
10,376,655 UART: [fwproc] Recv command 0x4d454153
10,385,879 >>> mbox cmd response data (12 bytes)
10,388,894 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,493,802 UART: [fwproc] Recv command 0x46574c44
10,495,875 UART: [fwproc] Recv'd Img size: 82832 bytes
13,533,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,612,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,685,830 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,888,476 >>> mbox cmd response: success
13,893,427 UART: [afmc] ++
13,894,014 UART: [afmc] CDI.KEYID = 6
13,894,901 UART: [afmc] SUBJECT.KEYID = 7
13,896,188 UART: [afmc] AUTHORITY.KEYID = 5
16,423,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,148,740 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,150,918 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,166,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,182,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,198,238 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,222,440 UART: [afmc] --
18,227,017 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,227,375 UART: [cold-reset] --
18,229,864 UART: [state] Locking Datavault
18,235,049 UART: [state] Locking PCR0, PCR1 and PCR31
18,236,800 UART: [state] Locking ICCM
18,237,998 UART: [exit] Launching FMC @ 0x40000130
18,246,439 UART:
18,246,679 UART: Running Caliptra FMC ...
18,247,726 UART:
18,247,874 UART: [state] CFI Enabled
18,304,418 UART: [fht] FMC Alias Private Key: 7
20,071,262 UART: [art] Extend RT PCRs Done
20,072,484 UART: [art] Lock RT PCRs Done
20,074,461 UART: [art] Populate DV Done
20,079,988 UART: [fht] FMC Alias Private Key: 7
20,081,513 UART: [art] Derive CDI
20,082,443 UART: [art] Store in slot 0x4
20,137,729 UART: [art] Derive Key Pair
20,138,732 UART: [art] Store priv key in slot 0x5
22,601,856 UART: [art] Derive Key Pair - Done
22,614,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,327,468 UART: [art] Erasing AUTHORITY.KEYID = 7
24,328,947 UART: [art] PUB.X = 6F42868010EF269A36F03828F860136DAA61EB88006D269BEA781C8B876DDAC111DC356D4E682096CE05E4CB3DBE5D44
24,336,244 UART: [art] PUB.Y = CEBAB17A002A382298C61369C1B49E570E8C82E82059498832E3FF68F004563FCD43583ABBDF888B3B1574E571574732
24,343,442 UART: [art] SIG.R = E3095AC38A29DD0D89AE7871696D7BE1028312749CC19BC8E34632815C662E69F76B726FA12CE55E6C73E4D39E8097BD
24,350,830 UART: [art] SIG.S = AB4F976EC1E048B34C98E8A6ED4DF324C8ED96E60A73EC76B3441563E6D64D2F4226E177551C70C5B8FB3B4484E2A852
25,329,020 UART: mbox::rt_entry...
25,329,992 UART: ____ _ _ _ ____ _____
25,331,977 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,333,977 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,335,905 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,337,830 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,339,752 UART: |_|
25,340,583 UART:
25,483,109 UART: [rt] Runtime listening for mailbox commands...
25,485,330 >>> mbox cmd response data (48 bytes)
25,485,883 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,488,204 >>> mbox cmd response data (48 bytes)
25,489,077 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,506,021 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,206,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,271,638 >>> mbox cmd response data (12 bytes)
10,273,948 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,756,168 >>> mbox cmd response: success
18,040,577 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,056,482 UART:
18,056,818 UART: Running Caliptra FMC ...
18,057,900 UART:
18,058,048 UART: [state] CFI Enabled
18,122,798 UART: [fht] FMC Alias Private Key: 7
19,889,271 UART: [art] Extend RT PCRs Done
19,890,484 UART: [art] Lock RT PCRs Done
19,892,078 UART: [art] Populate DV Done
19,897,624 UART: [fht] FMC Alias Private Key: 7
19,899,275 UART: [art] Derive CDI
19,900,086 UART: [art] Store in slot 0x4
19,955,405 UART: [art] Derive Key Pair
19,956,470 UART: [art] Store priv key in slot 0x5
22,418,944 UART: [art] Derive Key Pair - Done
22,431,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,144,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,146,282 UART: [art] PUB.X = B21D6C9A3FCAC41ABCD8CA5990C3D4BBF35B3367B12A0EEFA8F0867379BB2152FCC7FD17CA04807D65E1727D3B248716
24,153,593 UART: [art] PUB.Y = A61CF88D9F5D87BEC93EF4CE88EDAD147667B409896064951487AF8095C6218D10524C1FB1B94417061DE8151BE42BE4
24,160,802 UART: [art] SIG.R = 5297E4B63544322948F38E786B4BFC421C5AFCB2B15AA77485F7C32A2A16CB5E028EC4A066C629500E020416AF966487
24,168,202 UART: [art] SIG.S = 02A6DBF054863A0BB426CA2BD7FB94929D07FA98FFF8BDB46D24F75558C1660AB6F1FC7C3F89D6CF67AC27D7EAA9E13C
25,147,192 UART: mbox::rt_entry...
25,148,151 UART: ____ _ _ _ ____ _____
25,150,127 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,152,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,154,009 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,155,937 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,157,863 UART: |_|
25,158,669 UART:
25,301,497 UART: [rt] Runtime listening for mailbox commands...
25,303,616 >>> mbox cmd response data (48 bytes)
25,304,157 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,306,484 >>> mbox cmd response data (48 bytes)
25,307,376 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,324,290 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
2,214,921 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,216,488 UART:
2,216,752 UART: Running Caliptra ROM ...
2,217,833 UART:
2,217,989 UART: [state] CFI Enabled
2,218,886 UART: [state] LifecycleState = Unprovisioned
2,220,555 UART: [state] DebugLocked = No
2,221,622 UART: [state] WD Timer not started. Device not locked for debugging
2,224,105 UART: [kat] SHA2-256
2,224,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,227,793 UART: [kat] ++
2,228,251 UART: [kat] sha1
2,228,768 UART: [kat] SHA2-256
2,229,699 UART: [kat] SHA2-384
2,230,368 UART: [kat] SHA2-512-ACC
2,231,212 UART: [kat] ECC-384
3,278,481 UART: [kat] HMAC-384Kdf
3,292,062 UART: [kat] LMS
3,768,551 UART: [kat] --
3,772,816 UART: [cold-reset] ++
3,774,698 UART: [fht] FHT @ 0x50003400
3,785,192 UART: [idev] ++
3,785,766 UART: [idev] CDI.KEYID = 6
3,786,708 UART: [idev] SUBJECT.KEYID = 7
3,787,980 UART: [idev] UDS.KEYID = 0
3,805,284 UART: [idev] Erasing UDS.KEYID = 0
6,265,043 UART: [idev] Sha1 KeyId Algorithm
6,289,418 UART: [idev] --
6,294,496 UART: [ldev] ++
6,295,089 UART: [ldev] CDI.KEYID = 6
6,296,010 UART: [ldev] SUBJECT.KEYID = 5
6,297,178 UART: [ldev] AUTHORITY.KEYID = 7
6,298,476 UART: [ldev] FE.KEYID = 1
6,309,403 UART: [ldev] Erasing FE.KEYID = 1
8,791,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,390 UART: [ldev] --
10,586,367 UART: [fwproc] Wait for Commands...
10,587,873 UART: [fwproc] Recv command 0x4d454153
10,597,110 >>> mbox cmd response data (12 bytes)
10,599,801 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,704,337 UART: [fwproc] Recv command 0x46574c44
10,706,479 UART: [fwproc] Recv'd Img size: 82832 bytes
13,751,777 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,829,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,902,438 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,105,934 >>> mbox cmd response: success
14,110,031 UART: [afmc] ++
14,110,615 UART: [afmc] CDI.KEYID = 6
14,111,582 UART: [afmc] SUBJECT.KEYID = 7
14,112,800 UART: [afmc] AUTHORITY.KEYID = 5
16,612,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,335,853 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,338,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,353,760 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,369,790 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,385,384 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,410,075 UART: [afmc] --
18,412,962 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,413,325 UART: [cold-reset] --
18,417,818 UART: [state] Locking Datavault
18,422,743 UART: [state] Locking PCR0, PCR1 and PCR31
18,424,500 UART: [state] Locking ICCM
18,427,221 UART: [exit] Launching FMC @ 0x40000130
18,435,617 UART:
18,435,852 UART: Running Caliptra FMC ...
18,436,954 UART:
18,437,111 UART: [state] CFI Enabled
18,445,214 UART: [fht] FMC Alias Private Key: 7
20,211,573 UART: [art] Extend RT PCRs Done
20,212,793 UART: [art] Lock RT PCRs Done
20,214,443 UART: [art] Populate DV Done
20,219,852 UART: [fht] FMC Alias Private Key: 7
20,221,389 UART: [art] Derive CDI
20,222,171 UART: [art] Store in slot 0x4
20,265,037 UART: [art] Derive Key Pair
20,266,088 UART: [art] Store priv key in slot 0x5
22,693,116 UART: [art] Derive Key Pair - Done
22,705,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,412,053 UART: [art] Erasing AUTHORITY.KEYID = 7
24,413,555 UART: [art] PUB.X = 986BD21F1C1649252D016ED31C0907508F3782FF0B5A9DE5D9A0280BF38C357C35BDE38E6402E3D9FDBBA45F7F65AB82
24,420,858 UART: [art] PUB.Y = 973D7C07D2ADAABF5DCD9EE52F6A7151A9BB0DA37F4316F6214E02103A2D6D1F4C6020874767422624F73D7A60633443
24,428,143 UART: [art] SIG.R = E29CCC418741D6240E0E861BA151B66D6D80486FF91FD01AD39CD054FB7334E4B4AC4C58EC3F35AEB76F37E44232542C
24,435,537 UART: [art] SIG.S = 0C07332AAD6A440C3A5641E745AABF4AD6E8E70B393609070FF14B8BD36B52CF67394DC0EA3132258FD903EEEED689B5
25,413,955 UART: mbox::rt_entry...
25,414,909 UART: ____ _ _ _ ____ _____
25,416,894 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,418,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,420,832 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,422,761 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,424,718 UART: |_|
25,425,559 UART:
25,567,323 UART: [rt] Runtime listening for mailbox commands...
25,569,467 >>> mbox cmd response data (48 bytes)
25,570,015 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,572,346 >>> mbox cmd response data (48 bytes)
25,573,231 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,590,144 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
2,218,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,490,757 >>> mbox cmd response data (12 bytes)
10,493,063 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,980,906 >>> mbox cmd response: success
18,218,625 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,234,671 UART:
18,235,047 UART: Running Caliptra FMC ...
18,236,238 UART:
18,236,410 UART: [state] CFI Enabled
18,244,173 UART: [fht] FMC Alias Private Key: 7
20,010,053 UART: [art] Extend RT PCRs Done
20,011,283 UART: [art] Lock RT PCRs Done
20,012,646 UART: [art] Populate DV Done
20,017,949 UART: [fht] FMC Alias Private Key: 7
20,019,656 UART: [art] Derive CDI
20,020,479 UART: [art] Store in slot 0x4
20,063,136 UART: [art] Derive Key Pair
20,064,457 UART: [art] Store priv key in slot 0x5
22,490,993 UART: [art] Derive Key Pair - Done
22,503,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,210,110 UART: [art] Erasing AUTHORITY.KEYID = 7
24,211,612 UART: [art] PUB.X = 82ABF6C8E0BE2959CEB3851C9CA25B981F132F64CA387480A8E5712E6975B731B2508D4EE280C198EF2022D5BCCD9C60
24,218,886 UART: [art] PUB.Y = 10A0FD1092581685646DFCB53C3006BBE6C28050CF6AAABB35394C39C746385382A705C683C3055F23A31EB784A59CDB
24,226,127 UART: [art] SIG.R = F81C08B574FB29681D9D1939DB9E1540E9433D2ED2E6D59573625CF56C4A6A821FFD58DE6E785EF4D3B6730E3A89395B
24,233,541 UART: [art] SIG.S = CD9F8C0E3399A50DA1135321AC24CDC98A1ACEABAF6121ACFB9BF4F29355ABEBEC3022D36A4F1F049DA1FE75CE0F7DF0
25,211,964 UART: mbox::rt_entry...
25,212,928 UART: ____ _ _ _ ____ _____
25,214,911 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,216,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,218,854 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,220,812 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,222,744 UART: |_|
25,223,585 UART:
25,365,959 UART: [rt] Runtime listening for mailbox commands...
25,368,130 >>> mbox cmd response data (48 bytes)
25,368,678 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,371,032 >>> mbox cmd response data (48 bytes)
25,371,907 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,388,790 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
2,216,115 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,217,699 UART:
2,217,950 UART: Running Caliptra ROM ...
2,219,031 UART:
2,219,189 UART: [state] CFI Enabled
2,220,080 UART: [state] LifecycleState = Unprovisioned
2,221,639 UART: [state] DebugLocked = No
2,222,770 UART: [state] WD Timer not started. Device not locked for debugging
2,225,169 UART: [kat] SHA2-256
2,225,828 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,228,830 UART: [kat] ++
2,229,281 UART: [kat] sha1
2,229,793 UART: [kat] SHA2-256
2,230,469 UART: [kat] SHA2-384
2,231,122 UART: [kat] SHA2-512-ACC
2,231,956 UART: [kat] ECC-384
2,948,956 UART: [kat] HMAC-384Kdf
2,970,038 UART: [kat] LMS
3,501,826 UART: [kat] --
3,507,816 UART: [cold-reset] ++
3,509,417 UART: [fht] FHT @ 0x50003400
3,521,253 UART: [idev] ++
3,521,979 UART: [idev] CDI.KEYID = 6
3,522,941 UART: [idev] SUBJECT.KEYID = 7
3,524,096 UART: [idev] UDS.KEYID = 0
3,542,878 UART: [idev] Erasing UDS.KEYID = 0
6,026,729 UART: [idev] Sha1 KeyId Algorithm
6,049,721 UART: [idev] --
6,054,027 UART: [ldev] ++
6,054,740 UART: [ldev] CDI.KEYID = 6
6,055,650 UART: [ldev] SUBJECT.KEYID = 5
6,056,812 UART: [ldev] AUTHORITY.KEYID = 7
6,058,044 UART: [ldev] FE.KEYID = 1
6,097,749 UART: [ldev] Erasing FE.KEYID = 1
8,607,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,322 UART: [ldev] --
10,411,536 UART: [fwproc] Wait for Commands...
10,414,604 UART: [fwproc] Recv command 0x4d454153
10,424,318 >>> mbox cmd response data (12 bytes)
10,426,806 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,532,035 UART: [fwproc] Recv command 0x46574c44
10,534,071 UART: [fwproc] Recv'd Img size: 82832 bytes
13,589,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,667,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,791,419 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,137,352 >>> mbox cmd response: success
14,141,886 UART: [afmc] ++
14,142,584 UART: [afmc] CDI.KEYID = 6
14,143,816 UART: [afmc] SUBJECT.KEYID = 7
14,145,242 UART: [afmc] AUTHORITY.KEYID = 5
16,677,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,400,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,402,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,417,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,432,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,447,744 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,470,728 UART: [afmc] --
18,474,610 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,474,966 UART: [cold-reset] --
18,479,236 UART: [state] Locking Datavault
18,484,853 UART: [state] Locking PCR0, PCR1 and PCR31
18,487,035 UART: [state] Locking ICCM
18,488,677 UART: [exit] Launching FMC @ 0x40000130
18,497,385 UART:
18,497,627 UART: Running Caliptra FMC ...
18,498,727 UART:
18,498,882 UART: [state] CFI Enabled
18,558,144 UART: [fht] FMC Alias Private Key: 7
20,324,227 UART: [art] Extend RT PCRs Done
20,325,448 UART: [art] Lock RT PCRs Done
20,327,229 UART: [art] Populate DV Done
20,332,528 UART: [fht] FMC Alias Private Key: 7
20,334,167 UART: [art] Derive CDI
20,334,997 UART: [art] Store in slot 0x4
20,390,019 UART: [art] Derive Key Pair
20,391,055 UART: [art] Store priv key in slot 0x5
22,853,988 UART: [art] Derive Key Pair - Done
22,866,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,579,749 UART: [art] Erasing AUTHORITY.KEYID = 7
24,581,247 UART: [art] PUB.X = 1D870CDD61368C829D9A9C5C9E43AC7C48F639D33707C4CF9E7FB10E86EC1BCB97AF00052AB1B11D50FB940BC0561AF3
24,588,497 UART: [art] PUB.Y = 914A7981CCD791321AD9955904D489074D20671A95C5C45C1908EDCE6F42A66ABBF7002E4E356654F7E0DE38D486BF9E
24,595,711 UART: [art] SIG.R = CA05B448FBC0C36E0E20CC6883BFEA339E5AEC57BA9FC524D94A31889E882427E22480C959FA9C8E7AFFFA9BD1029130
24,603,124 UART: [art] SIG.S = E120F528FA586B9E6A14BAD56705100C38EB93DB93C646DBB541183D97145D06619DB4F1700244D2659D88ACA78D5F14
25,581,078 UART: mbox::rt_entry...
25,582,029 UART: ____ _ _ _ ____ _____
25,583,929 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,585,935 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,587,790 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,589,712 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,591,612 UART: |_|
25,592,494 UART:
25,733,494 UART: [rt] Runtime listening for mailbox commands...
25,735,653 >>> mbox cmd response data (48 bytes)
25,736,210 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,738,522 >>> mbox cmd response data (48 bytes)
25,739,406 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,756,317 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,214,384 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,247,170 >>> mbox cmd response data (12 bytes)
10,250,471 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,162,995 >>> mbox cmd response: success
18,453,645 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,469,527 UART:
18,469,873 UART: Running Caliptra FMC ...
18,471,029 UART:
18,471,204 UART: [state] CFI Enabled
18,537,803 UART: [fht] FMC Alias Private Key: 7
20,303,461 UART: [art] Extend RT PCRs Done
20,304,692 UART: [art] Lock RT PCRs Done
20,306,213 UART: [art] Populate DV Done
20,311,359 UART: [fht] FMC Alias Private Key: 7
20,312,939 UART: [art] Derive CDI
20,313,761 UART: [art] Store in slot 0x4
20,370,292 UART: [art] Derive Key Pair
20,371,284 UART: [art] Store priv key in slot 0x5
22,833,718 UART: [art] Derive Key Pair - Done
22,846,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,559,550 UART: [art] Erasing AUTHORITY.KEYID = 7
24,561,056 UART: [art] PUB.X = 3CF95286FF8301C97710C8CF98F292F63B6E1534F03F0EFED92B73C0586E32A5F627E75F7D5CB59B9CC3B3E1E43B4C00
24,568,302 UART: [art] PUB.Y = A1E992BDE15D08126F7B1CB4E09CAD679FBC26E7373241AEA2670645CC44E0129F6AA6DA5B0A5B6A7E4CCD9D7DCCAC6A
24,575,562 UART: [art] SIG.R = EFB5052F94798EF058D1A14FE7F088C2ACE936DEF11457073F4DAA6F91F5EAABA5001D0FDC66F7174C12995D2D8879F5
24,582,952 UART: [art] SIG.S = 2FA3BE4A32AFAE932635716448E8F697D199717E729C648EF90705DB1C2713068D736EE76A4DC467053CDF03D0FA7850
25,561,718 UART: mbox::rt_entry...
25,562,671 UART: ____ _ _ _ ____ _____
25,564,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,566,597 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,568,528 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,570,483 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,572,410 UART: |_|
25,573,247 UART:
25,715,396 UART: [rt] Runtime listening for mailbox commands...
25,717,568 >>> mbox cmd response data (48 bytes)
25,718,149 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,720,566 >>> mbox cmd response data (48 bytes)
25,721,440 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,738,545 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
2,227,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,229,128 UART:
2,229,396 UART: Running Caliptra ROM ...
2,230,472 UART:
2,230,631 UART: [state] CFI Enabled
2,231,526 UART: [state] LifecycleState = Unprovisioned
2,233,188 UART: [state] DebugLocked = No
2,234,262 UART: [state] WD Timer not started. Device not locked for debugging
2,236,744 UART: [kat] SHA2-256
2,237,416 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,240,425 UART: [kat] ++
2,240,884 UART: [kat] sha1
2,241,401 UART: [kat] SHA2-256
2,242,092 UART: [kat] SHA2-384
2,242,758 UART: [kat] SHA2-512-ACC
2,243,673 UART: [kat] ECC-384
3,293,080 UART: [kat] HMAC-384Kdf
3,306,996 UART: [kat] LMS
3,838,867 UART: [kat] --
3,844,177 UART: [cold-reset] ++
3,845,640 UART: [fht] FHT @ 0x50003400
3,857,176 UART: [idev] ++
3,857,856 UART: [idev] CDI.KEYID = 6
3,858,833 UART: [idev] SUBJECT.KEYID = 7
3,860,000 UART: [idev] UDS.KEYID = 0
3,877,500 UART: [idev] Erasing UDS.KEYID = 0
6,337,314 UART: [idev] Sha1 KeyId Algorithm
6,358,449 UART: [idev] --
6,363,468 UART: [ldev] ++
6,364,153 UART: [ldev] CDI.KEYID = 6
6,365,043 UART: [ldev] SUBJECT.KEYID = 5
6,366,228 UART: [ldev] AUTHORITY.KEYID = 7
6,367,472 UART: [ldev] FE.KEYID = 1
6,379,665 UART: [ldev] Erasing FE.KEYID = 1
8,856,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,377 UART: [ldev] --
10,651,305 UART: [fwproc] Wait for Commands...
10,654,167 UART: [fwproc] Recv command 0x4d454153
10,663,902 >>> mbox cmd response data (12 bytes)
10,666,605 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
10,771,730 UART: [fwproc] Recv command 0x46574c44
10,773,767 UART: [fwproc] Recv'd Img size: 82832 bytes
13,833,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,911,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,035,320 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,381,847 >>> mbox cmd response: success
14,385,941 UART: [afmc] ++
14,386,668 UART: [afmc] CDI.KEYID = 6
14,387,867 UART: [afmc] SUBJECT.KEYID = 7
14,389,309 UART: [afmc] AUTHORITY.KEYID = 5
16,890,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,645,665 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,660,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,683,097 UART: [afmc] --
18,686,058 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,686,417 UART: [cold-reset] --
18,689,582 UART: [state] Locking Datavault
18,694,137 UART: [state] Locking PCR0, PCR1 and PCR31
18,696,294 UART: [state] Locking ICCM
18,698,430 UART: [exit] Launching FMC @ 0x40000130
18,707,118 UART:
18,707,402 UART: Running Caliptra FMC ...
18,708,520 UART:
18,708,685 UART: [state] CFI Enabled
18,716,469 UART: [fht] FMC Alias Private Key: 7
20,482,381 UART: [art] Extend RT PCRs Done
20,483,606 UART: [art] Lock RT PCRs Done
20,485,020 UART: [art] Populate DV Done
20,490,668 UART: [fht] FMC Alias Private Key: 7
20,492,307 UART: [art] Derive CDI
20,493,077 UART: [art] Store in slot 0x4
20,535,519 UART: [art] Derive Key Pair
20,536,547 UART: [art] Store priv key in slot 0x5
22,963,173 UART: [art] Derive Key Pair - Done
22,976,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,151 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,652 UART: [art] PUB.X = 1C50F936D2B68214FA6EA5D13B15A4B9E63AA3408A4A8240C5E314DE20884F6C0BEC963A1E09733E2E1FE63FBA2AAF16
24,690,978 UART: [art] PUB.Y = 5AB2894F898C543E7715A90AB59FC7B08F9533EF0C1C8D5826419BF790B9DF6A94CDBE695FEE684D1C9812968D48EF35
24,698,229 UART: [art] SIG.R = AF4D94099B01AB93E3723DAAF419ADF35E27DF77BDADA22415072599121C9AD6D4202F99F21EE5D4EA84C06C82397DA4
24,705,658 UART: [art] SIG.S = FF83F9A69E28574089E1E39C7770EF29B66CBF5B9E6A1BE7782924A160FC9B4E2BA2B8C0D32C2D3CD208F6FA74C01314
25,683,968 UART: mbox::rt_entry...
25,684,910 UART: ____ _ _ _ ____ _____
25,686,846 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,688,856 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,690,715 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,692,641 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,694,526 UART: |_|
25,695,413 UART:
25,837,451 UART: [rt] Runtime listening for mailbox commands...
25,839,636 >>> mbox cmd response data (48 bytes)
25,840,202 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,842,529 >>> mbox cmd response data (48 bytes)
25,843,463 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,860,332 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
2,233,718 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,475,327 >>> mbox cmd response data (12 bytes)
10,478,714 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,402,175 >>> mbox cmd response: success
18,641,123 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
18,655,300 UART:
18,655,650 UART: Running Caliptra FMC ...
18,656,733 UART:
18,656,890 UART: [state] CFI Enabled
18,664,871 UART: [fht] FMC Alias Private Key: 7
20,430,473 UART: [art] Extend RT PCRs Done
20,431,699 UART: [art] Lock RT PCRs Done
20,433,545 UART: [art] Populate DV Done
20,439,122 UART: [fht] FMC Alias Private Key: 7
20,440,723 UART: [art] Derive CDI
20,441,544 UART: [art] Store in slot 0x4
20,483,927 UART: [art] Derive Key Pair
20,484,972 UART: [art] Store priv key in slot 0x5
22,912,117 UART: [art] Derive Key Pair - Done
22,924,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,631,585 UART: [art] Erasing AUTHORITY.KEYID = 7
24,633,092 UART: [art] PUB.X = 858ED942D79F72BAE271293DE91044027B483DF97A60B7450A9BA752BB08AB7082BF13D3CAEABE02FCE7A96F2B1F1271
24,640,396 UART: [art] PUB.Y = 475F9DE75965273C5D58563A7283A8B5EDDE5EBB362F8BFDE31682A47C118114FC5B8A904897A2094AA07B2CD9BE0A69
24,647,619 UART: [art] SIG.R = BAE9D91DDD39DD276F6C3860CA12B5B0F34C140301C6CBDAA915CA79A856876CBBFCECDFB344EBC1857D25066F27ED23
24,655,036 UART: [art] SIG.S = 5782088C1D7E3041D41C62C487EA0F82454B80814EA7770E2D6A3F8953E204B2983DDD5D9F9CED99544C652774BF5610
25,633,852 UART: mbox::rt_entry...
25,634,808 UART: ____ _ _ _ ____ _____
25,636,793 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,638,804 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,640,735 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,642,697 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,644,627 UART: |_|
25,645,440 UART:
25,787,679 UART: [rt] Runtime listening for mailbox commands...
25,789,850 >>> mbox cmd response data (48 bytes)
25,790,442 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
25,792,768 >>> mbox cmd response data (48 bytes)
25,793,674 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
25,810,788 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,241 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,257 UART: [kat] SHA2-256
892,195 UART: [kat] SHA2-384
894,790 UART: [kat] SHA2-512-ACC
896,691 UART: [kat] ECC-384
902,226 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,397 UART: [fht] Storing FHT @ 0x50003400
1,479,128 UART: [idev] ++
1,479,296 UART: [idev] CDI.KEYID = 6
1,479,656 UART: [idev] SUBJECT.KEYID = 7
1,480,080 UART: [idev] UDS.KEYID = 0
1,488,096 UART: [idev] Erasing UDS.KEYID = 0
1,504,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,365 UART: [ldev] ++
1,514,533 UART: [ldev] CDI.KEYID = 6
1,514,896 UART: [ldev] SUBJECT.KEYID = 5
1,515,322 UART: [ldev] AUTHORITY.KEYID = 7
1,515,785 UART: [ldev] FE.KEYID = 1
1,520,837 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,944 UART: [ldev] --
1,586,227 UART: [fwproc] Waiting for Commands...
1,586,986 UART: [fwproc] Received command 0x4d454153
1,591,050 >>> mbox cmd response data (12 bytes)
1,591,051 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,591,309 UART: [fwproc] Received command 0x46574c44
1,592,100 UART: [fwproc] Received Image of size 82832 bytes
2,527,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,554,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,585,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,672,012 >>> mbox cmd response: success
2,673,138 UART: [afmc] ++
2,673,306 UART: [afmc] CDI.KEYID = 6
2,673,668 UART: [afmc] SUBJECT.KEYID = 7
2,674,093 UART: [afmc] AUTHORITY.KEYID = 5
2,709,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,726,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,726,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,732,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,738,550 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,744,233 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,752,011 UART: [afmc] --
2,753,089 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,753,111 UART: [cold-reset] --
2,754,145 UART: [state] Locking Datavault
2,755,358 UART: [state] Locking PCR0, PCR1 and PCR31
2,755,962 UART: [state] Locking ICCM
2,756,558 UART: [exit] Launching FMC @ 0x40000130
2,761,888 UART:
2,761,904 UART: Running Caliptra FMC ...
2,762,312 UART:
2,762,366 UART: [state] CFI Enabled
2,772,754 UART: [fht] FMC Alias Private Key: 7
2,891,526 UART: [art] Extend RT PCRs Done
2,891,954 UART: [art] Lock RT PCRs Done
2,893,880 UART: [art] Populate DV Done
2,902,167 UART: [fht] FMC Alias Private Key: 7
2,903,227 UART: [art] Derive CDI
2,903,507 UART: [art] Store in slot 0x4
2,989,095 UART: [art] Derive Key Pair
2,989,455 UART: [art] Store priv key in slot 0x5
3,002,844 UART: [art] Derive Key Pair - Done
3,017,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,032,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,033,631 UART: [art] PUB.X = 7117BB909C8F5C0996182D30E7D9B22931ED76F7B3CF09E4625C55D241B6DDE71BDCB8317B936D906147C0ACDA97B76C
3,040,403 UART: [art] PUB.Y = 0C6177BFC1AAAF33F9683281E2EA3A741151D3429BB6FDF843FD6DDEC3CE8557D6FFE3EA60B4F268D7ACC4E2F33A30B7
3,047,374 UART: [art] SIG.R = 1646BDD693D70D4EEA5D9DE788C66C157C3BC896EE31BBEE38B7AD156F21225CFA42C308550FD17653D71C7CE6758C42
3,054,147 UART: [art] SIG.S = 6259E8CA00CC90146BFA1F5C24C34BCACEAE3E21ACCF50EDEAABE78397CE7AE68826AE2E8048C22EBA8F8A53EE0920F3
3,077,910 UART: mbox::rt_entry...
3,078,282 UART: ____ _ _ _ ____ _____
3,079,066 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,079,866 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,080,634 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,081,402 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,082,170 UART: |_|
3,082,482 UART:
3,212,796 UART: [rt] Runtime listening for mailbox commands...
3,213,985 >>> mbox cmd response data (48 bytes)
3,213,986 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,216,773 >>> mbox cmd response data (48 bytes)
3,216,774 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,234,919 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,443,713 >>> mbox cmd response data (12 bytes)
1,443,714 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,520,232 >>> mbox cmd response: success
2,575,727 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,581,989 UART:
2,582,005 UART: Running Caliptra FMC ...
2,582,413 UART:
2,582,467 UART: [state] CFI Enabled
2,593,097 UART: [fht] FMC Alias Private Key: 7
2,712,007 UART: [art] Extend RT PCRs Done
2,712,435 UART: [art] Lock RT PCRs Done
2,713,679 UART: [art] Populate DV Done
2,721,786 UART: [fht] FMC Alias Private Key: 7
2,722,916 UART: [art] Derive CDI
2,723,196 UART: [art] Store in slot 0x4
2,808,830 UART: [art] Derive Key Pair
2,809,190 UART: [art] Store priv key in slot 0x5
2,822,959 UART: [art] Derive Key Pair - Done
2,837,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,316 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,081 UART: [art] PUB.X = 2A3199E3FED84257F3B93B33EFCF423F133DB891096C69BE0760D2B9F03BF4CA705E6015BF11D9C99EF30813FEE3ACE9
2,860,856 UART: [art] PUB.Y = 4EBECD5610256653EFC3F9EA4401984BE0B4C9551E9A6EF093BD5E8E9891981779DB9BB57604EEB0982D8D7BA7511F87
2,867,808 UART: [art] SIG.R = 9E64731E51D336AD86FBBBB0A002EA953F2C7BD995B9232DB0099821D06171E8CFC646342F92BCAD14E9DB3C5259F8C0
2,874,582 UART: [art] SIG.S = 4850652C97E5F7C4080787B9AD1FA9DE50F5EC0DD6F0F40B466F3EB1891B7A2B0B3AA4D9296DF1E5F8157C1F36205D27
2,898,383 UART: mbox::rt_entry...
2,898,755 UART: ____ _ _ _ ____ _____
2,899,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,339 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,901,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,643 UART: |_|
2,902,955 UART:
3,034,612 UART: [rt] Runtime listening for mailbox commands...
3,035,801 >>> mbox cmd response data (48 bytes)
3,035,802 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,038,589 >>> mbox cmd response data (48 bytes)
3,038,590 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,056,735 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,911 UART: [state] LifecycleState = Unprovisioned
85,566 UART: [state] DebugLocked = No
86,106 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,726 UART: [kat] SHA2-256
881,657 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,772 UART: [kat] ++
885,924 UART: [kat] sha1
890,030 UART: [kat] SHA2-256
891,968 UART: [kat] SHA2-384
894,791 UART: [kat] SHA2-512-ACC
896,692 UART: [kat] ECC-384
902,139 UART: [kat] HMAC-384Kdf
906,785 UART: [kat] LMS
1,474,981 UART: [kat] --
1,475,646 UART: [cold-reset] ++
1,476,196 UART: [fht] Storing FHT @ 0x50003400
1,478,909 UART: [idev] ++
1,479,077 UART: [idev] CDI.KEYID = 6
1,479,437 UART: [idev] SUBJECT.KEYID = 7
1,479,861 UART: [idev] UDS.KEYID = 0
1,487,879 UART: [idev] Erasing UDS.KEYID = 0
1,504,245 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,851 UART: [idev] --
1,513,980 UART: [ldev] ++
1,514,148 UART: [ldev] CDI.KEYID = 6
1,514,511 UART: [ldev] SUBJECT.KEYID = 5
1,514,937 UART: [ldev] AUTHORITY.KEYID = 7
1,515,400 UART: [ldev] FE.KEYID = 1
1,520,376 UART: [ldev] Erasing FE.KEYID = 1
1,545,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,869 UART: [ldev] --
1,585,342 UART: [fwproc] Waiting for Commands...
1,586,187 UART: [fwproc] Received command 0x4d454153
1,590,251 >>> mbox cmd response data (12 bytes)
1,590,252 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,590,454 UART: [fwproc] Received command 0x46574c44
1,591,245 UART: [fwproc] Received Image of size 82832 bytes
2,526,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,554,554 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,585,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,672,517 >>> mbox cmd response: success
2,673,647 UART: [afmc] ++
2,673,815 UART: [afmc] CDI.KEYID = 6
2,674,177 UART: [afmc] SUBJECT.KEYID = 7
2,674,602 UART: [afmc] AUTHORITY.KEYID = 5
2,709,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,725,567 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,726,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,732,056 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,737,939 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,743,622 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,751,544 UART: [afmc] --
2,752,544 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,752,566 UART: [cold-reset] --
2,753,438 UART: [state] Locking Datavault
2,754,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,754,981 UART: [state] Locking ICCM
2,755,607 UART: [exit] Launching FMC @ 0x40000130
2,760,937 UART:
2,760,953 UART: Running Caliptra FMC ...
2,761,361 UART:
2,761,504 UART: [state] CFI Enabled
2,772,006 UART: [fht] FMC Alias Private Key: 7
2,891,168 UART: [art] Extend RT PCRs Done
2,891,596 UART: [art] Lock RT PCRs Done
2,893,198 UART: [art] Populate DV Done
2,901,417 UART: [fht] FMC Alias Private Key: 7
2,902,401 UART: [art] Derive CDI
2,902,681 UART: [art] Store in slot 0x4
2,988,391 UART: [art] Derive Key Pair
2,988,751 UART: [art] Store priv key in slot 0x5
3,001,874 UART: [art] Derive Key Pair - Done
3,016,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,031,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,032,614 UART: [art] PUB.X = 55275A95CC39734A49FD171B279BDCB85A667DD728BF9001545A0A33673E46F030C38572A8FF62A4E9F61E3EE4FC8A91
3,039,382 UART: [art] PUB.Y = F2148DFC89DD73A5453D167F322A425BE1FCB7886F6D9550956FC4496A9C24E240BA72A5E016170417DA0F72FC54C767
3,046,328 UART: [art] SIG.R = 755995CF123CDABDA4103E568928452B9F8A721006B3BCED7CC671610A057A2CBFDB78E09C3822A352D2646E50AA6713
3,053,093 UART: [art] SIG.S = 3335FF1F917BE7EE6D962CD8F74D33678AFA624F27E9367F3E2A1BEAAA39D02B8A4620797C322A44F8AE5F86753BD174
3,077,233 UART: mbox::rt_entry...
3,077,605 UART: ____ _ _ _ ____ _____
3,078,389 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,079,189 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,079,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,080,725 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,081,493 UART: |_|
3,081,805 UART:
3,212,391 UART: [rt] Runtime listening for mailbox commands...
3,213,580 >>> mbox cmd response data (48 bytes)
3,213,581 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,216,368 >>> mbox cmd response data (48 bytes)
3,216,369 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,234,514 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,802 >>> mbox cmd response data (12 bytes)
1,444,803 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,521,857 >>> mbox cmd response: success
2,577,800 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,583,698 UART:
2,583,714 UART: Running Caliptra FMC ...
2,584,122 UART:
2,584,265 UART: [state] CFI Enabled
2,594,881 UART: [fht] FMC Alias Private Key: 7
2,713,075 UART: [art] Extend RT PCRs Done
2,713,503 UART: [art] Lock RT PCRs Done
2,715,257 UART: [art] Populate DV Done
2,723,524 UART: [fht] FMC Alias Private Key: 7
2,724,664 UART: [art] Derive CDI
2,724,944 UART: [art] Store in slot 0x4
2,810,752 UART: [art] Derive Key Pair
2,811,112 UART: [art] Store priv key in slot 0x5
2,824,297 UART: [art] Derive Key Pair - Done
2,838,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,854,430 UART: [art] Erasing AUTHORITY.KEYID = 7
2,855,195 UART: [art] PUB.X = 3728B35BAB59237E1E677A48AF98561DA727AC370F9CB885907C31B47F5502912DC24AE4913D7645A6A0997DF3999876
2,861,953 UART: [art] PUB.Y = ABA8B78FE1B1558385B9BB7F64DBBBE17CD8B825C54CAFBFD36CEB1F21B796AE6398779DF8F3258F379D8E95819A0144
2,868,918 UART: [art] SIG.R = 1F9043BC98FC2BD7EA590A9442B11B9769585142A25CA3AAEEEA3D4D5F396213C94631A09DCC47EF52A1C982CE6D71DE
2,875,699 UART: [art] SIG.S = FA671C431ABA87253C29C4F8E53E05B6DEBAE7A0F4C3CC6E18EBA1DB5630928730592312BF953BCFBE6736095B8236AD
2,899,225 UART: mbox::rt_entry...
2,899,597 UART: ____ _ _ _ ____ _____
2,900,381 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,901,181 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,949 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,902,717 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,903,485 UART: |_|
2,903,797 UART:
3,035,276 UART: [rt] Runtime listening for mailbox commands...
3,036,465 >>> mbox cmd response data (48 bytes)
3,036,466 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
3,039,253 >>> mbox cmd response data (48 bytes)
3,039,254 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
3,057,399 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,068 UART: [kat] SHA2-256
902,008 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,543 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,196 UART: [cold-reset] ++
1,170,768 UART: [fht] FHT @ 0x50003400
1,173,428 UART: [idev] ++
1,173,596 UART: [idev] CDI.KEYID = 6
1,173,957 UART: [idev] SUBJECT.KEYID = 7
1,174,382 UART: [idev] UDS.KEYID = 0
1,182,401 UART: [idev] Erasing UDS.KEYID = 0
1,199,207 UART: [idev] Sha1 KeyId Algorithm
1,208,023 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,995 UART: [fwproc] Wait for Commands...
1,281,618 UART: [fwproc] Recv command 0x4d454153
1,285,641 >>> mbox cmd response data (12 bytes)
1,285,642 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,285,869 UART: [fwproc] Recv command 0x46574c44
1,286,602 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,896 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,719 >>> mbox cmd response: success
2,367,947 UART: [afmc] ++
2,368,115 UART: [afmc] CDI.KEYID = 6
2,368,478 UART: [afmc] SUBJECT.KEYID = 7
2,368,904 UART: [afmc] AUTHORITY.KEYID = 5
2,404,599 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,427,509 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,433,390 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,091 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,794 UART: [afmc] --
2,447,723 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,447,745 UART: [cold-reset] --
2,448,715 UART: [state] Locking Datavault
2,450,092 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,696 UART: [state] Locking ICCM
2,451,196 UART: [exit] Launching FMC @ 0x40000130
2,456,526 UART:
2,456,542 UART: Running Caliptra FMC ...
2,456,950 UART:
2,457,004 UART: [state] CFI Enabled
2,467,554 UART: [fht] FMC Alias Private Key: 7
2,586,846 UART: [art] Extend RT PCRs Done
2,587,274 UART: [art] Lock RT PCRs Done
2,588,580 UART: [art] Populate DV Done
2,596,775 UART: [fht] FMC Alias Private Key: 7
2,597,903 UART: [art] Derive CDI
2,598,183 UART: [art] Store in slot 0x4
2,683,622 UART: [art] Derive Key Pair
2,683,982 UART: [art] Store priv key in slot 0x5
2,697,398 UART: [art] Derive Key Pair - Done
2,711,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,450 UART: [art] PUB.X = B31FDE5AC0634C3569CD385C03C45A65D4B64AEC1FFE9452D4B515E50E68F9AC15959C68782B1FE907288AB82E5B024F
2,735,218 UART: [art] PUB.Y = 941BCD0A0047BAF5B9C40AE672C8E446D07CD8C155E27FCCD74F5DC56FAD4407061E37E5951B4C69183C94CBD7BA0C8B
2,742,149 UART: [art] SIG.R = F7A7F25EF894E08E0D4E0D81C31AE826B3A6E51BFCAEAE18381F8763C55264816B3A99A7B3ED940D54A3706696EA275C
2,748,920 UART: [art] SIG.S = 6E5810EBB61CCA55EFE6DB3CCDFBAC491380FF6526D6013D95F6631072181A06CBE0D2BECEB7EAD0F8638E7F21A417B3
2,773,586 UART: mbox::rt_entry...
2,773,958 UART: ____ _ _ _ ____ _____
2,774,742 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,775,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,776,310 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,777,078 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,777,846 UART: |_|
2,778,158 UART:
2,908,010 UART: [rt] Runtime listening for mailbox commands...
2,909,199 >>> mbox cmd response data (48 bytes)
2,909,200 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,911,987 >>> mbox cmd response data (48 bytes)
2,911,988 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,930,133 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,906 >>> mbox cmd response data (12 bytes)
1,142,907 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,220,930 >>> mbox cmd response: success
2,277,271 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,283,723 UART:
2,283,739 UART: Running Caliptra FMC ...
2,284,147 UART:
2,284,201 UART: [state] CFI Enabled
2,294,587 UART: [fht] FMC Alias Private Key: 7
2,413,995 UART: [art] Extend RT PCRs Done
2,414,423 UART: [art] Lock RT PCRs Done
2,415,749 UART: [art] Populate DV Done
2,424,106 UART: [fht] FMC Alias Private Key: 7
2,425,188 UART: [art] Derive CDI
2,425,468 UART: [art] Store in slot 0x4
2,511,333 UART: [art] Derive Key Pair
2,511,693 UART: [art] Store priv key in slot 0x5
2,524,675 UART: [art] Derive Key Pair - Done
2,539,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,797 UART: [art] Erasing AUTHORITY.KEYID = 7
2,555,562 UART: [art] PUB.X = A4633AE55FE9DDD872EF95951BB36DAAE01730C5FE806AF5B7366553A1968E5D2D01155FAB9930127B4F6F8690F44AD2
2,562,337 UART: [art] PUB.Y = 54315DA765B20F9B6FE79CC55DCBB1FCF9DBA52119E68F8EAE16E893F684F4DB46B57D5D2E8D4A4AFB5E5B36F231150D
2,569,303 UART: [art] SIG.R = 45ABDEECA51892909935C401857E52258932E0086C1BF6C681DFE53822B3FFDA1AA95429E8BA33CA5BC8EF3C91D16921
2,576,075 UART: [art] SIG.S = 9D041794229E9250BB1B9097EFD13770080D2284D7BBAB14E8C5967335E86ECBD6749232054F5B5E29214D9D611BB8CA
2,599,355 UART: mbox::rt_entry...
2,599,727 UART: ____ _ _ _ ____ _____
2,600,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,601,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,602,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,615 UART: |_|
2,603,927 UART:
2,734,433 UART: [rt] Runtime listening for mailbox commands...
2,735,622 >>> mbox cmd response data (48 bytes)
2,735,623 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,738,410 >>> mbox cmd response data (48 bytes)
2,738,411 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,756,556 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,995 UART: [kat] SHA2-256
891,545 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,649 UART: [kat] ++
895,801 UART: [kat] sha1
899,953 UART: [kat] SHA2-256
901,893 UART: [kat] SHA2-384
904,536 UART: [kat] SHA2-512-ACC
906,437 UART: [kat] ECC-384
915,978 UART: [kat] HMAC-384Kdf
920,484 UART: [kat] LMS
1,168,796 UART: [kat] --
1,169,741 UART: [cold-reset] ++
1,170,203 UART: [fht] FHT @ 0x50003400
1,173,015 UART: [idev] ++
1,173,183 UART: [idev] CDI.KEYID = 6
1,173,544 UART: [idev] SUBJECT.KEYID = 7
1,173,969 UART: [idev] UDS.KEYID = 0
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,199,240 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,121 UART: [ldev] ++
1,209,289 UART: [ldev] CDI.KEYID = 6
1,209,653 UART: [ldev] SUBJECT.KEYID = 5
1,210,080 UART: [ldev] AUTHORITY.KEYID = 7
1,210,543 UART: [ldev] FE.KEYID = 1
1,215,591 UART: [ldev] Erasing FE.KEYID = 1
1,241,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,775 UART: [ldev] --
1,281,114 UART: [fwproc] Wait for Commands...
1,281,823 UART: [fwproc] Recv command 0x4d454153
1,285,846 >>> mbox cmd response data (12 bytes)
1,285,847 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,286,012 UART: [fwproc] Recv command 0x46574c44
1,286,745 UART: [fwproc] Recv'd Img size: 82832 bytes
2,222,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,281,017 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,652 >>> mbox cmd response: success
2,368,774 UART: [afmc] ++
2,368,942 UART: [afmc] CDI.KEYID = 6
2,369,305 UART: [afmc] SUBJECT.KEYID = 7
2,369,731 UART: [afmc] AUTHORITY.KEYID = 5
2,405,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,668 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,549 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,440,250 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,448,029 UART: [afmc] --
2,448,898 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,448,920 UART: [cold-reset] --
2,449,882 UART: [state] Locking Datavault
2,451,059 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,663 UART: [state] Locking ICCM
2,452,153 UART: [exit] Launching FMC @ 0x40000130
2,457,483 UART:
2,457,499 UART: Running Caliptra FMC ...
2,457,907 UART:
2,458,050 UART: [state] CFI Enabled
2,468,774 UART: [fht] FMC Alias Private Key: 7
2,587,928 UART: [art] Extend RT PCRs Done
2,588,356 UART: [art] Lock RT PCRs Done
2,589,760 UART: [art] Populate DV Done
2,597,965 UART: [fht] FMC Alias Private Key: 7
2,598,937 UART: [art] Derive CDI
2,599,217 UART: [art] Store in slot 0x4
2,684,926 UART: [art] Derive Key Pair
2,685,286 UART: [art] Store priv key in slot 0x5
2,699,112 UART: [art] Derive Key Pair - Done
2,714,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,729,470 UART: [art] Erasing AUTHORITY.KEYID = 7
2,730,235 UART: [art] PUB.X = 3B7992507143740E2F029AD769A9F3907EB65C3336EF3CEA41452692F733014E1FD4F624BB50823E5C5F742544359A28
2,736,986 UART: [art] PUB.Y = 8D645A183249F7BF30F74CD592B58C637EE6B9653709F8156C5EC5195539E08E8A406E6CFA3292512C5FDC81542BC7F0
2,743,933 UART: [art] SIG.R = D56251EBFEE7322DB1923D424221F335A8BE2E2CB964D72B741E233444FCD344EE222A407B2CA2127ABE8482DA9B8DF7
2,750,713 UART: [art] SIG.S = 1758C7DB75DE2BFF785164FBFCFCBC379150F84324C3027B52FCFF11950C9E83138EBAAA94F56B408D6AD38C5EABC1A5
2,773,695 UART: mbox::rt_entry...
2,774,067 UART: ____ _ _ _ ____ _____
2,774,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,775,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,776,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,777,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,777,955 UART: |_|
2,778,267 UART:
2,909,117 UART: [rt] Runtime listening for mailbox commands...
2,910,306 >>> mbox cmd response data (48 bytes)
2,910,307 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,913,094 >>> mbox cmd response data (48 bytes)
2,913,095 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,931,240 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,441 >>> mbox cmd response data (12 bytes)
1,143,442 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,221,669 >>> mbox cmd response: success
2,276,504 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,804 UART:
2,282,820 UART: Running Caliptra FMC ...
2,283,228 UART:
2,283,371 UART: [state] CFI Enabled
2,294,359 UART: [fht] FMC Alias Private Key: 7
2,412,889 UART: [art] Extend RT PCRs Done
2,413,317 UART: [art] Lock RT PCRs Done
2,414,853 UART: [art] Populate DV Done
2,423,420 UART: [fht] FMC Alias Private Key: 7
2,424,436 UART: [art] Derive CDI
2,424,716 UART: [art] Store in slot 0x4
2,510,397 UART: [art] Derive Key Pair
2,510,757 UART: [art] Store priv key in slot 0x5
2,524,139 UART: [art] Derive Key Pair - Done
2,539,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,834 UART: [art] Erasing AUTHORITY.KEYID = 7
2,555,599 UART: [art] PUB.X = A24D6F89FD66901B5640B1C5CBD2EF2A9662B6C10384CDF0D2013B149228407851F37E6EC0326169B006FEDE6F014A09
2,562,356 UART: [art] PUB.Y = 9EC1D48BA95B45146B78EBDB4C4B6A3B26EDB33C281B9F873430A4E067946FF744EC300676EEF0F035ACC80E506DB507
2,569,309 UART: [art] SIG.R = 76AAB35CCE43CF221C10895035988C156F7AA032CCB01DF6D0888D82C7E7383E7B138B36A7EB8B94B17676E085CC2826
2,576,083 UART: [art] SIG.S = 82CFF36B12050986192D26E5432539742BB1A3BFA647AEB2EC2757F64127153A3996AA64ACC62DCB367890657C9F4ACB
2,599,777 UART: mbox::rt_entry...
2,600,149 UART: ____ _ _ _ ____ _____
2,600,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,601,733 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,602,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,603,269 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,604,037 UART: |_|
2,604,349 UART:
2,734,575 UART: [rt] Runtime listening for mailbox commands...
2,735,764 >>> mbox cmd response data (48 bytes)
2,735,765 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,738,552 >>> mbox cmd response data (48 bytes)
2,738,553 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,756,698 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
85,975 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
892,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,945 UART: [kat] ++
897,097 UART: [kat] sha1
901,421 UART: [kat] SHA2-256
903,361 UART: [kat] SHA2-384
906,324 UART: [kat] SHA2-512-ACC
908,225 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,368 UART: [kat] LMS
1,170,696 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,255 UART: [fht] FHT @ 0x50003400
1,175,072 UART: [idev] ++
1,175,240 UART: [idev] CDI.KEYID = 6
1,175,600 UART: [idev] SUBJECT.KEYID = 7
1,176,024 UART: [idev] UDS.KEYID = 0
1,183,794 UART: [idev] Erasing UDS.KEYID = 0
1,200,955 UART: [idev] Sha1 KeyId Algorithm
1,209,569 UART: [idev] --
1,210,623 UART: [ldev] ++
1,210,791 UART: [ldev] CDI.KEYID = 6
1,211,154 UART: [ldev] SUBJECT.KEYID = 5
1,211,580 UART: [ldev] AUTHORITY.KEYID = 7
1,212,043 UART: [ldev] FE.KEYID = 1
1,217,417 UART: [ldev] Erasing FE.KEYID = 1
1,243,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,128 UART: [fwproc] Wait for Commands...
1,283,882 UART: [fwproc] Recv command 0x4d454153
1,287,891 >>> mbox cmd response data (12 bytes)
1,287,892 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,288,007 UART: [fwproc] Recv command 0x46574c44
1,288,735 UART: [fwproc] Recv'd Img size: 82832 bytes
2,224,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,252,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,283,242 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,370,017 >>> mbox cmd response: success
2,371,091 UART: [afmc] ++
2,371,259 UART: [afmc] CDI.KEYID = 6
2,371,621 UART: [afmc] SUBJECT.KEYID = 7
2,372,046 UART: [afmc] AUTHORITY.KEYID = 5
2,408,085 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,424,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,425,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,430,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,436,720 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,442,421 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,450,259 UART: [afmc] --
2,451,357 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,451,379 UART: [cold-reset] --
2,452,205 UART: [state] Locking Datavault
2,453,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,453,942 UART: [state] Locking ICCM
2,454,434 UART: [exit] Launching FMC @ 0x40000130
2,459,764 UART:
2,459,780 UART: Running Caliptra FMC ...
2,460,188 UART:
2,460,242 UART: [state] CFI Enabled
2,470,678 UART: [fht] FMC Alias Private Key: 7
2,589,240 UART: [art] Extend RT PCRs Done
2,589,668 UART: [art] Lock RT PCRs Done
2,591,402 UART: [art] Populate DV Done
2,599,449 UART: [fht] FMC Alias Private Key: 7
2,600,535 UART: [art] Derive CDI
2,600,815 UART: [art] Store in slot 0x4
2,686,910 UART: [art] Derive Key Pair
2,687,270 UART: [art] Store priv key in slot 0x5
2,700,686 UART: [art] Derive Key Pair - Done
2,715,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,731,328 UART: [art] Erasing AUTHORITY.KEYID = 7
2,732,093 UART: [art] PUB.X = F05F77E7788573929409702D1198A97C564620D7AE177EC01BDD9FFFFA4F52ABA7FCE2C7A3CDAE47EE3A3DC47D45882F
2,738,876 UART: [art] PUB.Y = 10D3FD3474296DA6C92663EDAF58F5C6F742EF0ADAEA59BB7F0D3E1FDE451E00C916A607F7B5DEBDD79EFA031F1CDD01
2,745,817 UART: [art] SIG.R = 6030EFBCBCC9E108760CFCA5FC3D95C8623FAC40459B148D9C1D1B247EB2FDDEA65C6F3CCE63B122BD2C372E77082D5A
2,752,602 UART: [art] SIG.S = 50B26CB3DC7AE50CB86D3E500600E6F672224DFE6D6D5F2D61366E3EBA27EEE2BFC359B9588DA98C41FCF788575D452D
2,776,326 UART: mbox::rt_entry...
2,776,698 UART: ____ _ _ _ ____ _____
2,777,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,778,282 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,779,050 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,779,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,780,586 UART: |_|
2,780,898 UART:
2,911,217 UART: [rt] Runtime listening for mailbox commands...
2,912,406 >>> mbox cmd response data (48 bytes)
2,912,407 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,915,194 >>> mbox cmd response data (48 bytes)
2,915,195 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,933,340 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,943 >>> mbox cmd response data (12 bytes)
1,143,944 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,222,176 >>> mbox cmd response: success
2,278,295 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,284,529 UART:
2,284,545 UART: Running Caliptra FMC ...
2,284,953 UART:
2,285,007 UART: [state] CFI Enabled
2,295,227 UART: [fht] FMC Alias Private Key: 7
2,413,637 UART: [art] Extend RT PCRs Done
2,414,065 UART: [art] Lock RT PCRs Done
2,415,641 UART: [art] Populate DV Done
2,423,906 UART: [fht] FMC Alias Private Key: 7
2,424,938 UART: [art] Derive CDI
2,425,218 UART: [art] Store in slot 0x4
2,510,717 UART: [art] Derive Key Pair
2,511,077 UART: [art] Store priv key in slot 0x5
2,524,271 UART: [art] Derive Key Pair - Done
2,539,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,554,350 UART: [art] Erasing AUTHORITY.KEYID = 7
2,555,115 UART: [art] PUB.X = E99D97087D65E70772CD40F11338F2BF0C6EE42C75991447118C1F57C4300E5F6851B069C52EF0EE897EBEE288ED1FB7
2,561,877 UART: [art] PUB.Y = 15975EEDE848830A9916720A08DAB973657FA5AFC96613D5D037A2A1B403BC95A748BB3318CC0242C278532D00306C54
2,568,786 UART: [art] SIG.R = 910390BEF40AE28D31EBA59270886673951516C1823CE323A5306AD7CF3FEE85EBE87D1984CE55308432203E82FC8636
2,575,546 UART: [art] SIG.S = 19DFD752A1C1053976C5737EBE7573E2AE33BEB494ABE8989AF2AA9865241C273A178E254B1ADDC2CB701FDF2A696114
2,598,979 UART: mbox::rt_entry...
2,599,351 UART: ____ _ _ _ ____ _____
2,600,135 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,935 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,703 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,471 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,239 UART: |_|
2,603,551 UART:
2,735,467 UART: [rt] Runtime listening for mailbox commands...
2,736,656 >>> mbox cmd response data (48 bytes)
2,736,657 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,739,444 >>> mbox cmd response data (48 bytes)
2,739,445 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,757,590 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,722 UART: [state] DebugLocked = No
86,330 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,702 UART: [kat] SHA2-256
903,642 UART: [kat] SHA2-384
906,363 UART: [kat] SHA2-512-ACC
908,264 UART: [kat] ECC-384
917,943 UART: [kat] HMAC-384Kdf
922,743 UART: [kat] LMS
1,171,071 UART: [kat] --
1,171,864 UART: [cold-reset] ++
1,172,192 UART: [fht] FHT @ 0x50003400
1,174,965 UART: [idev] ++
1,175,133 UART: [idev] CDI.KEYID = 6
1,175,493 UART: [idev] SUBJECT.KEYID = 7
1,175,917 UART: [idev] UDS.KEYID = 0
1,183,927 UART: [idev] Erasing UDS.KEYID = 0
1,200,910 UART: [idev] Sha1 KeyId Algorithm
1,209,466 UART: [idev] --
1,210,498 UART: [ldev] ++
1,210,666 UART: [ldev] CDI.KEYID = 6
1,211,029 UART: [ldev] SUBJECT.KEYID = 5
1,211,455 UART: [ldev] AUTHORITY.KEYID = 7
1,211,918 UART: [ldev] FE.KEYID = 1
1,217,128 UART: [ldev] Erasing FE.KEYID = 1
1,243,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,504 UART: [ldev] --
1,282,833 UART: [fwproc] Wait for Commands...
1,283,609 UART: [fwproc] Recv command 0x4d454153
1,287,618 >>> mbox cmd response data (12 bytes)
1,287,619 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,287,890 UART: [fwproc] Recv command 0x46574c44
1,288,618 UART: [fwproc] Recv'd Img size: 82832 bytes
2,224,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,251,411 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,282,581 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,369,320 >>> mbox cmd response: success
2,370,580 UART: [afmc] ++
2,370,748 UART: [afmc] CDI.KEYID = 6
2,371,110 UART: [afmc] SUBJECT.KEYID = 7
2,371,535 UART: [afmc] AUTHORITY.KEYID = 5
2,407,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,424,307 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,425,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,430,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,436,647 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,442,348 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,450,108 UART: [afmc] --
2,451,026 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,451,048 UART: [cold-reset] --
2,451,954 UART: [state] Locking Datavault
2,452,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,453,557 UART: [state] Locking ICCM
2,454,039 UART: [exit] Launching FMC @ 0x40000130
2,459,369 UART:
2,459,385 UART: Running Caliptra FMC ...
2,459,793 UART:
2,459,936 UART: [state] CFI Enabled
2,470,492 UART: [fht] FMC Alias Private Key: 7
2,589,198 UART: [art] Extend RT PCRs Done
2,589,626 UART: [art] Lock RT PCRs Done
2,591,510 UART: [art] Populate DV Done
2,599,777 UART: [fht] FMC Alias Private Key: 7
2,600,857 UART: [art] Derive CDI
2,601,137 UART: [art] Store in slot 0x4
2,687,106 UART: [art] Derive Key Pair
2,687,466 UART: [art] Store priv key in slot 0x5
2,700,628 UART: [art] Derive Key Pair - Done
2,715,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,730,653 UART: [art] Erasing AUTHORITY.KEYID = 7
2,731,418 UART: [art] PUB.X = 93A884A215AA1AE1FE0B577E02474A855CD1467F20C231EDD38C1F7E6D0A77BDFB7A945E6EFFACC43EB411374742D523
2,738,193 UART: [art] PUB.Y = 33C3CBB8970C38AE3510B2D8218D3DFEABC91EAF5FF7BD7FA81091990BDDFF71959828E9454FE30F8CEFE51FF89753C3
2,745,154 UART: [art] SIG.R = 4672B7BAFCF94186D1D2820FCB2799C9A05C5C7B11602551A2D9C5AD20E023124B60D06DF2B272F1B8393F6D98B97DB1
2,751,927 UART: [art] SIG.S = A14A0D681BD6D41ADF8FDFD8D441845F3F042C22E35358FE8C4C2086C537D9E1BE2E10ECF9559CF79A62667AD0F22159
2,776,159 UART: mbox::rt_entry...
2,776,531 UART: ____ _ _ _ ____ _____
2,777,315 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,778,115 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,778,883 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,779,651 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,780,419 UART: |_|
2,780,731 UART:
2,910,941 UART: [rt] Runtime listening for mailbox commands...
2,912,130 >>> mbox cmd response data (48 bytes)
2,912,131 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,914,918 >>> mbox cmd response data (48 bytes)
2,914,919 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,933,064 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,142,732 >>> mbox cmd response data (12 bytes)
1,142,733 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,220,665 >>> mbox cmd response: success
2,276,214 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
2,282,224 UART:
2,282,240 UART: Running Caliptra FMC ...
2,282,648 UART:
2,282,791 UART: [state] CFI Enabled
2,293,149 UART: [fht] FMC Alias Private Key: 7
2,411,559 UART: [art] Extend RT PCRs Done
2,411,987 UART: [art] Lock RT PCRs Done
2,413,423 UART: [art] Populate DV Done
2,421,528 UART: [fht] FMC Alias Private Key: 7
2,422,672 UART: [art] Derive CDI
2,422,952 UART: [art] Store in slot 0x4
2,508,751 UART: [art] Derive Key Pair
2,509,111 UART: [art] Store priv key in slot 0x5
2,521,993 UART: [art] Derive Key Pair - Done
2,536,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,907 UART: [art] PUB.X = CBC6E26C0359EEBB14225FE99F0EB4D7270E17E591D6B8F7C38CE741195949ABE626D8A9A25E18FBE33CA6A55F82C831
2,559,682 UART: [art] PUB.Y = A568D1DD0EE690B0FD4954A7E4E621FAA9714381DF2C617623E1BD9408DFA00E2F546378D1D77E194E05E60370110FCA
2,566,620 UART: [art] SIG.R = 6A35B77DB6C0385528DB3B718A42236467977C69CD2CE914C26B1EF3D435F8E9CC9686A92C1DE96C6A01297422D4FF81
2,573,389 UART: [art] SIG.S = 9C52509346D8E5A20B3C45924CFDB7D811D73995A67506B10DA7DE9D069CDE0F6E45DF6BF9DA5DACB7BA953FDC41672F
2,597,224 UART: mbox::rt_entry...
2,597,596 UART: ____ _ _ _ ____ _____
2,598,380 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,180 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,716 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,484 UART: |_|
2,601,796 UART:
2,731,792 UART: [rt] Runtime listening for mailbox commands...
2,732,981 >>> mbox cmd response data (48 bytes)
2,732,982 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
2,735,769 >>> mbox cmd response data (48 bytes)
2,735,770 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
2,753,915 >>> mbox cmd response data (48 bytes)
test test_boot::test_measurement_in_measurement_log_added_to_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,047 UART:
192,419 UART: Running Caliptra ROM ...
193,558 UART:
193,727 UART: [state] CFI Enabled
264,049 UART: [state] LifecycleState = Unprovisioned
265,956 UART: [state] DebugLocked = No
267,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,216 UART: [kat] SHA2-256
441,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,437 UART: [kat] ++
452,920 UART: [kat] sha1
464,078 UART: [kat] SHA2-256
466,800 UART: [kat] SHA2-384
472,646 UART: [kat] SHA2-512-ACC
475,012 UART: [kat] ECC-384
2,767,096 UART: [kat] HMAC-384Kdf
2,780,124 UART: [kat] LMS
3,970,437 UART: [kat] --
3,976,569 UART: [cold-reset] ++
3,978,874 UART: [fht] Storing FHT @ 0x50003400
3,989,143 UART: [idev] ++
3,989,782 UART: [idev] CDI.KEYID = 6
3,990,691 UART: [idev] SUBJECT.KEYID = 7
3,991,934 UART: [idev] UDS.KEYID = 0
3,992,970 ready_for_fw is high
3,993,175 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,037,749 UART: [idev] Erasing UDS.KEYID = 0
7,326,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,218 UART: [idev] --
7,351,914 UART: [ldev] ++
7,352,537 UART: [ldev] CDI.KEYID = 6
7,353,510 UART: [ldev] SUBJECT.KEYID = 5
7,354,672 UART: [ldev] AUTHORITY.KEYID = 7
7,355,957 UART: [ldev] FE.KEYID = 1
7,403,471 UART: [ldev] Erasing FE.KEYID = 1
10,736,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,706 UART: [ldev] --
13,117,572 UART: [fwproc] Waiting for Commands...
13,119,830 UART: [fwproc] Received command 0x46574c44
13,122,060 UART: [fwproc] Received Image of size 35124 bytes
16,209,478 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,282,513 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,355,686 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,392,442 >>> mbox cmd response: success
16,396,216 UART: [afmc] ++
16,396,849 UART: [afmc] CDI.KEYID = 6
16,397,783 UART: [afmc] SUBJECT.KEYID = 7
16,399,082 UART: [afmc] AUTHORITY.KEYID = 5
19,771,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,072,471 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,074,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,089,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,103,911 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,118,341 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,140,321 UART: [afmc] --
22,144,588 UART: [cold-reset] --
22,148,647 UART: [state] Locking Datavault
22,153,817 UART: [state] Locking PCR0, PCR1 and PCR31
22,155,586 UART: [state] Locking ICCM
22,157,005 UART: [exit] Launching FMC @ 0x40000130
22,165,381 UART:
22,165,625 UART: Running Caliptra FMC ...
22,166,968 UART:
22,167,156 UART: [state] CFI Enabled
22,233,273 UART: [fht] FMC Alias Private Key: 7
24,593,729 UART: [art] Extend RT PCRs Done
24,594,981 UART: [art] Lock RT PCRs Done
24,596,684 UART: [art] Populate DV Done
24,602,196 UART: [fht] FMC Alias Private Key: 7
24,603,921 UART: [art] Derive CDI
24,604,765 UART: [art] Store in slot 0x4
24,662,148 UART: [art] Derive Key Pair
24,663,217 UART: [art] Store priv key in slot 0x5
27,955,821 UART: [art] Derive Key Pair - Done
27,968,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,258,297 UART: [art] Erasing AUTHORITY.KEYID = 7
30,259,845 UART: [art] PUB.X = 4CD7F3ED97D0B55F05CA9612F2802E70ABC1F2751D6DD7077E7DC5410CC6A36258D241E1A7FBF3726F6767B0940A45BC
30,267,077 UART: [art] PUB.Y = 9DE4BBD5C743DDF806FDC27367E895B6FD2B7B682D65484170299FC3F0E7A9690CA7DC1EA1F4BDDE6F48CA9086A751BC
30,274,308 UART: [art] SIG.R = CD755634B48B19D6D7E4CB496A4BAE2299BFA80B9276D91EE100A2CA1CCDB53EA5A41D2D2B1C322240D82165D50891A3
30,281,730 UART: [art] SIG.S = 350E8E4914261F0A8A8B299D6F97838ACC4271511D54D102A5E6B821FE7D90F56583AAB5F47428657A567E8CEF40A8BE
31,586,392 UART: persistent_rt::test_persistent_data_layout...[ok]
31,588,641 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,808,987 ready_for_fw is high
3,809,398 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,297,221 >>> mbox cmd response: success
21,988,526 UART:
21,988,938 UART: Running Caliptra FMC ...
21,990,048 UART:
21,990,210 UART: [state] CFI Enabled
22,057,982 UART: [fht] FMC Alias Private Key: 7
24,398,049 UART: [art] Extend RT PCRs Done
24,399,345 UART: [art] Lock RT PCRs Done
24,400,900 UART: [art] Populate DV Done
24,406,160 UART: [fht] FMC Alias Private Key: 7
24,407,628 UART: [art] Derive CDI
24,408,606 UART: [art] Store in slot 0x4
24,466,768 UART: [art] Derive Key Pair
24,467,828 UART: [art] Store priv key in slot 0x5
27,760,092 UART: [art] Derive Key Pair - Done
27,773,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,062,220 UART: [art] Erasing AUTHORITY.KEYID = 7
30,063,807 UART: [art] PUB.X = 1B170A15E5D94515114E5D50C3F9A2F4EBE71789E117EEB364F723E2BDAFFDAD4FA3A7A16A20D58E488A21D9BB7A33D2
30,071,040 UART: [art] PUB.Y = 749CCF6F25A680BA6EF6C39AC6E71C95C1A0B1EDA323621F3852BD333EB5EFF5CDD8F5EA873D08C3FADAC465C54AEF51
30,078,282 UART: [art] SIG.R = 043654F7E8222FFFACB94C383DCC273722C0D3B72D9537AACEE2F5B6CDAEAA01934C69CB0C90B3DE2CBBBD86F003DB74
30,085,689 UART: [art] SIG.S = AABF15A3D68CB7FE140E9E912411C6F458C64A7AEA02BEAB9DB22FFC47417DAF8CE9EC7BBE485BCF896AA7685D4B3F4B
31,390,090 UART: persistent_rt::test_persistent_data_layout...[ok]
31,392,361 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,338 UART:
192,697 UART: Running Caliptra ROM ...
193,800 UART:
603,488 UART: [state] CFI Enabled
615,682 UART: [state] LifecycleState = Unprovisioned
617,635 UART: [state] DebugLocked = No
618,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,891 UART: [kat] SHA2-256
792,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,146 UART: [kat] ++
803,625 UART: [kat] sha1
814,158 UART: [kat] SHA2-256
816,883 UART: [kat] SHA2-384
823,079 UART: [kat] SHA2-512-ACC
825,444 UART: [kat] ECC-384
3,108,748 UART: [kat] HMAC-384Kdf
3,121,828 UART: [kat] LMS
4,311,940 UART: [kat] --
4,316,444 UART: [cold-reset] ++
4,318,016 UART: [fht] Storing FHT @ 0x50003400
4,328,710 UART: [idev] ++
4,329,265 UART: [idev] CDI.KEYID = 6
4,330,166 UART: [idev] SUBJECT.KEYID = 7
4,331,475 UART: [idev] UDS.KEYID = 0
4,332,440 ready_for_fw is high
4,332,638 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
4,377,101 UART: [idev] Erasing UDS.KEYID = 0
7,621,061 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,744 UART: [idev] --
7,646,159 UART: [ldev] ++
7,646,750 UART: [ldev] CDI.KEYID = 6
7,647,656 UART: [ldev] SUBJECT.KEYID = 5
7,648,864 UART: [ldev] AUTHORITY.KEYID = 7
7,650,140 UART: [ldev] FE.KEYID = 1
7,661,045 UART: [ldev] Erasing FE.KEYID = 1
10,947,033 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,162 UART: [ldev] --
13,304,151 UART: [fwproc] Waiting for Commands...
13,306,451 UART: [fwproc] Received command 0x46574c44
13,308,700 UART: [fwproc] Received Image of size 35124 bytes
16,400,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,471,456 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,544,625 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
16,581,659 >>> mbox cmd response: success
16,585,345 UART: [afmc] ++
16,585,982 UART: [afmc] CDI.KEYID = 6
16,586,915 UART: [afmc] SUBJECT.KEYID = 7
16,588,077 UART: [afmc] AUTHORITY.KEYID = 5
19,903,546 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,199,895 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,202,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,216,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,231,267 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,245,682 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,266,658 UART: [afmc] --
22,270,522 UART: [cold-reset] --
22,274,612 UART: [state] Locking Datavault
22,280,182 UART: [state] Locking PCR0, PCR1 and PCR31
22,282,068 UART: [state] Locking ICCM
22,283,909 UART: [exit] Launching FMC @ 0x40000130
22,292,363 UART:
22,292,608 UART: Running Caliptra FMC ...
22,293,734 UART:
22,293,885 UART: [state] CFI Enabled
22,301,827 UART: [fht] FMC Alias Private Key: 7
24,642,762 UART: [art] Extend RT PCRs Done
24,644,021 UART: [art] Lock RT PCRs Done
24,645,559 UART: [art] Populate DV Done
24,650,862 UART: [fht] FMC Alias Private Key: 7
24,652,312 UART: [art] Derive CDI
24,653,269 UART: [art] Store in slot 0x4
24,695,901 UART: [art] Derive Key Pair
24,696,976 UART: [art] Store priv key in slot 0x5
27,939,177 UART: [art] Derive Key Pair - Done
27,952,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,232,349 UART: [art] Erasing AUTHORITY.KEYID = 7
30,233,910 UART: [art] PUB.X = 1DB3D6AB28C8B05027697DC17C32216596903AA09543E448464C353D37C25B317358DD8A88C19AE56ABAA8FEF3D2BE78
30,241,120 UART: [art] PUB.Y = FEB0A5BBF7312AEB6732E675881C08787354EA48928E036B02C347A7D037ABE3AE3794481AC297EE8794A23954065BDB
30,248,330 UART: [art] SIG.R = AA56DBC08844EEE78CA15AF420B68C49BBC182461B25AC0347859994866678BF89650DF57F299D827ED303A71A7BB2D3
30,255,737 UART: [art] SIG.S = 658F9DC3AE20DB5A1114D2154766B54ED0D3F0AC3CCD115D3237CE0FF7A396A8365703D386184BDCC38D894A507214BD
31,560,154 UART: persistent_rt::test_persistent_data_layout...[ok]
31,562,446 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
4,130,024 ready_for_fw is high
4,130,432 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
16,453,990 >>> mbox cmd response: success
22,090,097 UART:
22,090,536 UART: Running Caliptra FMC ...
22,091,689 UART:
22,091,853 UART: [state] CFI Enabled
22,099,633 UART: [fht] FMC Alias Private Key: 7
24,439,723 UART: [art] Extend RT PCRs Done
24,441,006 UART: [art] Lock RT PCRs Done
24,442,584 UART: [art] Populate DV Done
24,448,043 UART: [fht] FMC Alias Private Key: 7
24,449,607 UART: [art] Derive CDI
24,450,469 UART: [art] Store in slot 0x4
24,493,061 UART: [art] Derive Key Pair
24,494,106 UART: [art] Store priv key in slot 0x5
27,736,444 UART: [art] Derive Key Pair - Done
27,749,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,030,271 UART: [art] Erasing AUTHORITY.KEYID = 7
30,031,848 UART: [art] PUB.X = 057A8C67420CD0F5CA88464DA9870BF61404A12DD2DCE8F3EBB720813ADE0EFCAB733B1967D319BD9AB5698F83FA670C
30,039,072 UART: [art] PUB.Y = 93C3C309A0929BE21B581EC7A88AB059C6777D90A7B1F138B37595FF6777F9BAE2897D9361749D64095A85E1D7E32B34
30,046,307 UART: [art] SIG.R = 97AEA299802F7EEE8AFD82AF7A38AD559362D79A77AC3B7FF44CA45C3969344A49D630E3A38BE129F49AE944DCAE5BF2
30,053,707 UART: [art] SIG.S = B88F66D19AEF80FDC57DBAF6D965DC3B5F27C9CE0DA03AF5023FE6105D8FB720651BD29956A3BD36162FF2F7888D3174
31,358,806 UART: persistent_rt::test_persistent_data_layout...[ok]
31,361,087 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,161 UART:
192,517 UART: Running Caliptra ROM ...
193,604 UART:
193,746 UART: [state] CFI Enabled
265,858 UART: [state] LifecycleState = Unprovisioned
267,943 UART: [state] DebugLocked = No
269,136 UART: [state] WD Timer not started. Device not locked for debugging
273,762 UART: [kat] SHA2-256
453,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,153 UART: [kat] ++
464,651 UART: [kat] sha1
475,171 UART: [kat] SHA2-256
477,820 UART: [kat] SHA2-384
483,526 UART: [kat] SHA2-512-ACC
485,889 UART: [kat] ECC-384
2,949,247 UART: [kat] HMAC-384Kdf
2,971,470 UART: [kat] LMS
3,447,936 UART: [kat] --
3,452,075 UART: [cold-reset] ++
3,453,366 UART: [fht] FHT @ 0x50003400
3,464,164 UART: [idev] ++
3,464,763 UART: [idev] CDI.KEYID = 6
3,465,716 UART: [idev] SUBJECT.KEYID = 7
3,466,958 UART: [idev] UDS.KEYID = 0
3,467,856 ready_for_fw is high
3,468,070 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,512,524 UART: [idev] Erasing UDS.KEYID = 0
5,985,822 UART: [idev] Sha1 KeyId Algorithm
6,008,521 UART: [idev] --
6,013,061 UART: [ldev] ++
6,013,634 UART: [ldev] CDI.KEYID = 6
6,014,545 UART: [ldev] SUBJECT.KEYID = 5
6,015,758 UART: [ldev] AUTHORITY.KEYID = 7
6,017,042 UART: [ldev] FE.KEYID = 1
6,058,107 UART: [ldev] Erasing FE.KEYID = 1
8,564,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,339 UART: [ldev] --
10,375,576 UART: [fwproc] Wait for Commands...
10,377,310 UART: [fwproc] Recv command 0x46574c44
10,379,345 UART: [fwproc] Recv'd Img size: 35124 bytes
12,837,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,915,638 UART: [fwproc] Load FMC at address 0x40000000 len 20044
12,988,655 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,025,520 >>> mbox cmd response: success
13,029,874 UART: [afmc] ++
13,030,517 UART: [afmc] CDI.KEYID = 6
13,031,436 UART: [afmc] SUBJECT.KEYID = 7
13,032,623 UART: [afmc] AUTHORITY.KEYID = 5
15,575,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,316,445 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,318,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,334,464 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,350,488 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,366,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,390,459 UART: [afmc] --
17,393,535 UART: [cold-reset] --
17,397,080 UART: [state] Locking Datavault
17,403,677 UART: [state] Locking PCR0, PCR1 and PCR31
17,405,453 UART: [state] Locking ICCM
17,407,830 UART: [exit] Launching FMC @ 0x40000130
17,416,254 UART:
17,416,492 UART: Running Caliptra FMC ...
17,417,543 UART:
17,417,689 UART: [state] CFI Enabled
17,471,001 UART: [fht] FMC Alias Private Key: 7
19,237,564 UART: [art] Extend RT PCRs Done
19,238,812 UART: [art] Lock RT PCRs Done
19,240,231 UART: [art] Populate DV Done
19,245,673 UART: [fht] FMC Alias Private Key: 7
19,247,190 UART: [art] Derive CDI
19,247,970 UART: [art] Store in slot 0x4
19,303,986 UART: [art] Derive Key Pair
19,305,067 UART: [art] Store priv key in slot 0x5
21,767,681 UART: [art] Derive Key Pair - Done
21,780,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,492,845 UART: [art] Erasing AUTHORITY.KEYID = 7
23,494,406 UART: [art] PUB.X = B115EAFC2F3E00D9E1947E5BCBBDDEB1D183D0E9F6A4270452868C7C7CD5438C80DA6F06631D16A23E43D4F2AAB327B8
23,501,618 UART: [art] PUB.Y = 0CDEC6DC7F34B966D66B0536D956BC3A7BCB18E1D8B8CF6FDE404B7E5EFC1D88975DF0892E896770AB36242DE60FAC8A
23,508,929 UART: [art] SIG.R = DF8BF84ED42A518E04B6ACDBFFA3B1AA67461DED3A8217B61F6BB1CD76C3CE7D437659F7F25A2B29237BDB7A243B2DB2
23,516,325 UART: [art] SIG.S = 4B270076CB8499B813308AAC27EEC6CEFB347798E5CF02E8B104B3497760E00A2DDB1FFF3AD204A2A07FF035FA39DCB5
24,495,272 UART: persistent_rt::test_persistent_data_layout...[ok]
24,497,534 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
3,459,958 ready_for_fw is high
3,460,369 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
12,899,053 >>> mbox cmd response: success
17,187,513 UART:
17,187,938 UART: Running Caliptra FMC ...
17,189,054 UART:
17,189,211 UART: [state] CFI Enabled
17,258,814 UART: [fht] FMC Alias Private Key: 7
19,045,481 UART: [art] Extend RT PCRs Done
19,046,790 UART: [art] Lock RT PCRs Done
19,048,143 UART: [art] Populate DV Done
19,053,414 UART: [fht] FMC Alias Private Key: 7
19,055,083 UART: [art] Derive CDI
19,055,944 UART: [art] Store in slot 0x4
19,113,344 UART: [art] Derive Key Pair
19,114,434 UART: [art] Store priv key in slot 0x5
21,577,641 UART: [art] Derive Key Pair - Done
21,590,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,303,538 UART: [art] Erasing AUTHORITY.KEYID = 7
23,305,129 UART: [art] PUB.X = 8F89DC806B3000B4ECBB4E34AE2BDEC4D55D5BE6405126EC73060657B0807A8EEBBE8FF2DF5CB9C5E4D558548CF45C8F
23,312,348 UART: [art] PUB.Y = 3E024289D981AA52D6271FBD2500A87CB9BAC2B5EE79C825A5DBBFC50B8D6ABF119008B679D3EFEF6B95D70F8670BE4D
23,319,567 UART: [art] SIG.R = 56849B6A664CBA360AFC57C197C4DABA76C8814AA350546F470C6A18CE0D505EB4F87654CC0F83BE2CCA878ECEC00746
23,326,969 UART: [art] SIG.S = 3C210C5FA2E6CBF5D1423029EFF186ACAF6F46239E15F5E3410FC6FE577C041A834A0A20D8B8E2A96169FABD675A881C
24,305,038 UART: persistent_rt::test_persistent_data_layout...[ok]
24,307,287 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,455 UART:
192,838 UART: Running Caliptra ROM ...
193,940 UART:
603,581 UART: [state] CFI Enabled
619,795 UART: [state] LifecycleState = Unprovisioned
621,739 UART: [state] DebugLocked = No
623,684 UART: [state] WD Timer not started. Device not locked for debugging
628,025 UART: [kat] SHA2-256
807,723 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,522 UART: [kat] ++
818,968 UART: [kat] sha1
830,065 UART: [kat] SHA2-256
832,791 UART: [kat] SHA2-384
838,288 UART: [kat] SHA2-512-ACC
840,658 UART: [kat] ECC-384
3,282,192 UART: [kat] HMAC-384Kdf
3,295,351 UART: [kat] LMS
3,771,900 UART: [kat] --
3,775,195 UART: [cold-reset] ++
3,776,727 UART: [fht] FHT @ 0x50003400
3,787,750 UART: [idev] ++
3,788,324 UART: [idev] CDI.KEYID = 6
3,789,284 UART: [idev] SUBJECT.KEYID = 7
3,790,554 UART: [idev] UDS.KEYID = 0
3,791,457 ready_for_fw is high
3,791,650 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,835,902 UART: [idev] Erasing UDS.KEYID = 0
6,265,471 UART: [idev] Sha1 KeyId Algorithm
6,290,240 UART: [idev] --
6,295,640 UART: [ldev] ++
6,296,210 UART: [ldev] CDI.KEYID = 6
6,297,101 UART: [ldev] SUBJECT.KEYID = 5
6,298,314 UART: [ldev] AUTHORITY.KEYID = 7
6,299,601 UART: [ldev] FE.KEYID = 1
6,312,740 UART: [ldev] Erasing FE.KEYID = 1
8,791,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,188 UART: [ldev] --
10,585,437 UART: [fwproc] Wait for Commands...
10,587,482 UART: [fwproc] Recv command 0x46574c44
10,589,466 UART: [fwproc] Recv'd Img size: 35124 bytes
13,044,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,128,622 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,201,619 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,238,644 >>> mbox cmd response: success
13,241,920 UART: [afmc] ++
13,242,557 UART: [afmc] CDI.KEYID = 6
13,243,470 UART: [afmc] SUBJECT.KEYID = 7
13,244,567 UART: [afmc] AUTHORITY.KEYID = 5
15,748,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,470,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,472,682 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,488,525 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,504,568 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,520,160 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,544,689 UART: [afmc] --
17,547,634 UART: [cold-reset] --
17,552,955 UART: [state] Locking Datavault
17,558,944 UART: [state] Locking PCR0, PCR1 and PCR31
17,560,718 UART: [state] Locking ICCM
17,563,190 UART: [exit] Launching FMC @ 0x40000130
17,571,621 UART:
17,571,870 UART: Running Caliptra FMC ...
17,573,004 UART:
17,573,174 UART: [state] CFI Enabled
17,580,632 UART: [fht] FMC Alias Private Key: 7
19,346,112 UART: [art] Extend RT PCRs Done
19,347,373 UART: [art] Lock RT PCRs Done
19,349,342 UART: [art] Populate DV Done
19,354,930 UART: [fht] FMC Alias Private Key: 7
19,356,590 UART: [art] Derive CDI
19,357,360 UART: [art] Store in slot 0x4
19,400,324 UART: [art] Derive Key Pair
19,401,399 UART: [art] Store priv key in slot 0x5
21,828,421 UART: [art] Derive Key Pair - Done
21,841,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,547,644 UART: [art] Erasing AUTHORITY.KEYID = 7
23,549,197 UART: [art] PUB.X = 912A1DD0D2FDDD2DD2C5C707EBC3466C630500CF005F6C77C9D067AD496601A94E208FF4240C41CF57B725D8EDE70A56
23,556,419 UART: [art] PUB.Y = 8C9319AD7CE6667B1C5F1C7471F756C1A0D9CCFACE8B2A3BC59D8B640DF8E4BC6AC1D88868877101517F0DBB6C594887
23,563,648 UART: [art] SIG.R = 60C7A171E7DE2907F2162154706276D628CC8A0B9F810E008A2B41D99C160DE282D5B970553E89E27B61030061CA5130
23,570,961 UART: [art] SIG.S = F4053031BC25DFFE7779AAF64D8D53757EC34105CEDC1157F8BD5744924BEF902A422839C08FBC415F740405BEA944A1
24,549,783 UART: persistent_rt::test_persistent_data_layout...[ok]
24,552,064 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,790,922 ready_for_fw is high
3,791,329 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,111,876 >>> mbox cmd response: success
17,364,549 UART:
17,364,927 UART: Running Caliptra FMC ...
17,366,135 UART:
17,366,299 UART: [state] CFI Enabled
17,374,072 UART: [fht] FMC Alias Private Key: 7
19,139,989 UART: [art] Extend RT PCRs Done
19,141,276 UART: [art] Lock RT PCRs Done
19,142,765 UART: [art] Populate DV Done
19,148,088 UART: [fht] FMC Alias Private Key: 7
19,149,689 UART: [art] Derive CDI
19,150,566 UART: [art] Store in slot 0x4
19,193,342 UART: [art] Derive Key Pair
19,194,435 UART: [art] Store priv key in slot 0x5
21,620,872 UART: [art] Derive Key Pair - Done
21,633,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,340,416 UART: [art] Erasing AUTHORITY.KEYID = 7
23,341,984 UART: [art] PUB.X = 4914FB70545B0AD4C9C68DF94A36CE49796AAB562DAB94EBFFE29E55C9EB95B3174C1B9050D0CB3CF59F1A2F77183A6C
23,349,205 UART: [art] PUB.Y = D64809FE4E599597C7EF81A2B97808CF16D73B833B49FC54958B4FF6BCF19E7B468EF38048DE62CF2D4B87DEDFC17B0E
23,356,514 UART: [art] SIG.R = 9B5543C439E5C446B299709A2AB2316D3D1344A7040EC6971BA1DFB64578FC9CC4876EB3724674FA760C82E98DED901E
23,363,913 UART: [art] SIG.S = CBE2F085F4F0C33DA33E4B20156A199064723CB4DFAC24823B2C919E707326E9D0C055627AE20A1EA8EDC28B45E6D87B
24,342,348 UART: persistent_rt::test_persistent_data_layout...[ok]
24,344,621 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,072 UART:
192,432 UART: Running Caliptra ROM ...
193,614 UART:
193,764 UART: [state] CFI Enabled
262,010 UART: [state] LifecycleState = Unprovisioned
264,436 UART: [state] DebugLocked = No
265,913 UART: [state] WD Timer not started. Device not locked for debugging
269,802 UART: [kat] SHA2-256
459,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,477 UART: [kat] ++
470,943 UART: [kat] sha1
482,547 UART: [kat] SHA2-256
485,593 UART: [kat] SHA2-384
490,231 UART: [kat] SHA2-512-ACC
492,805 UART: [kat] ECC-384
2,946,569 UART: [kat] HMAC-384Kdf
2,972,160 UART: [kat] LMS
3,503,936 UART: [kat] --
3,509,098 UART: [cold-reset] ++
3,510,755 UART: [fht] FHT @ 0x50003400
3,522,120 UART: [idev] ++
3,522,720 UART: [idev] CDI.KEYID = 6
3,523,631 UART: [idev] SUBJECT.KEYID = 7
3,524,801 UART: [idev] UDS.KEYID = 0
3,525,720 ready_for_fw is high
3,525,905 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,570,296 UART: [idev] Erasing UDS.KEYID = 0
6,033,303 UART: [idev] Sha1 KeyId Algorithm
6,054,916 UART: [idev] --
6,060,046 UART: [ldev] ++
6,060,724 UART: [ldev] CDI.KEYID = 6
6,061,735 UART: [ldev] SUBJECT.KEYID = 5
6,062,840 UART: [ldev] AUTHORITY.KEYID = 7
6,064,066 UART: [ldev] FE.KEYID = 1
6,100,421 UART: [ldev] Erasing FE.KEYID = 1
8,610,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,977 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,178 UART: [ldev] --
10,414,366 UART: [fwproc] Wait for Commands...
10,416,746 UART: [fwproc] Recv command 0x46574c44
10,419,053 UART: [fwproc] Recv'd Img size: 35124 bytes
12,890,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,971,400 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,094,995 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,154,259 >>> mbox cmd response: success
13,158,784 UART: [afmc] ++
13,159,416 UART: [afmc] CDI.KEYID = 6
13,160,701 UART: [afmc] SUBJECT.KEYID = 7
13,162,107 UART: [afmc] AUTHORITY.KEYID = 5
15,699,913 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,423,797 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,425,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,440,842 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,455,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,470,839 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,494,264 UART: [afmc] --
17,497,154 UART: [cold-reset] --
17,500,846 UART: [state] Locking Datavault
17,507,449 UART: [state] Locking PCR0, PCR1 and PCR31
17,509,640 UART: [state] Locking ICCM
17,512,139 UART: [exit] Launching FMC @ 0x40000130
17,520,817 UART:
17,521,110 UART: Running Caliptra FMC ...
17,522,174 UART:
17,522,321 UART: [state] CFI Enabled
17,581,301 UART: [fht] FMC Alias Private Key: 7
19,348,232 UART: [art] Extend RT PCRs Done
19,349,490 UART: [art] Lock RT PCRs Done
19,350,955 UART: [art] Populate DV Done
19,356,603 UART: [fht] FMC Alias Private Key: 7
19,358,185 UART: [art] Derive CDI
19,359,174 UART: [art] Store in slot 0x4
19,414,550 UART: [art] Derive Key Pair
19,415,591 UART: [art] Store priv key in slot 0x5
21,878,007 UART: [art] Derive Key Pair - Done
21,890,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,604,073 UART: [art] Erasing AUTHORITY.KEYID = 7
23,605,633 UART: [art] PUB.X = B158F03D8C30535D4E83EB4F779E5092857C9C868191DE699A2F3155DBFF7F1368A3D3A97D7784F4DA1053DE671DB4CF
23,612,849 UART: [art] PUB.Y = A2DF40B24DFF6980AE4F32C0215CFD599AC0CFD8D100EBFE79FE175CA86ECAB2D4BF147EC00E6D7BFAB6D24189D28299
23,620,169 UART: [art] SIG.R = 9624E36BE083C521403EBDAE33CD1C0086610A5933984F7D9E9E2698470A66A6F918982BD945BA75A05AB20557CE63BC
23,627,568 UART: [art] SIG.S = 68ADCD39A27D2F83007A6368DD38E77F048BCF5FE71ED4A33AC7D98EFA8F6F1A291ECF4F9415B8406C0959C20CEAA40C
24,606,093 UART: persistent_rt::test_persistent_data_layout...[ok]
24,608,363 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,439,032 ready_for_fw is high
3,439,461 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,013,609 >>> mbox cmd response: success
17,298,828 UART:
17,299,247 UART: Running Caliptra FMC ...
17,300,457 UART:
17,300,628 UART: [state] CFI Enabled
17,370,137 UART: [fht] FMC Alias Private Key: 7
19,158,209 UART: [art] Extend RT PCRs Done
19,159,483 UART: [art] Lock RT PCRs Done
19,160,907 UART: [art] Populate DV Done
19,166,313 UART: [fht] FMC Alias Private Key: 7
19,167,932 UART: [art] Derive CDI
19,168,794 UART: [art] Store in slot 0x4
19,224,232 UART: [art] Derive Key Pair
19,225,261 UART: [art] Store priv key in slot 0x5
21,687,655 UART: [art] Derive Key Pair - Done
21,700,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,414,491 UART: [art] Erasing AUTHORITY.KEYID = 7
23,416,093 UART: [art] PUB.X = 6742AB7350A23D61BF04A4A316136F51F0783611FF85F004A8F947B91E364BB9CAD130A4468E55A99F7867B549134423
23,423,237 UART: [art] PUB.Y = F5EC1FA01DECD955F3CE1C3BD9C5A70492CE8DBA02911E69C4C649B55526ABD118A5CBC80C802FB8210499E6EDB30FC4
23,430,492 UART: [art] SIG.R = AD4AB90CB51684CDF910E9BDDC07D2BEB512D6CCC3E8147DAFB860C487D1E3E8DB18B352413CA739DA9D3514A3732B5A
23,437,900 UART: [art] SIG.S = B07901FA004648E1BA555C78A802F3F2202CF7653C17E1D0D901D85FD76F3938F14912291ADE74E8E20393A3CBDDA502
24,416,036 UART: persistent_rt::test_persistent_data_layout...[ok]
24,418,312 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,601 UART:
192,965 UART: Running Caliptra ROM ...
194,064 UART:
603,820 UART: [state] CFI Enabled
619,560 UART: [state] LifecycleState = Unprovisioned
621,878 UART: [state] DebugLocked = No
624,039 UART: [state] WD Timer not started. Device not locked for debugging
629,297 UART: [kat] SHA2-256
819,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,982 UART: [kat] ++
830,504 UART: [kat] sha1
843,508 UART: [kat] SHA2-256
846,513 UART: [kat] SHA2-384
851,587 UART: [kat] SHA2-512-ACC
854,182 UART: [kat] ECC-384
3,297,661 UART: [kat] HMAC-384Kdf
3,310,396 UART: [kat] LMS
3,842,223 UART: [kat] --
3,846,143 UART: [cold-reset] ++
3,848,307 UART: [fht] FHT @ 0x50003400
3,859,023 UART: [idev] ++
3,859,770 UART: [idev] CDI.KEYID = 6
3,860,689 UART: [idev] SUBJECT.KEYID = 7
3,861,867 UART: [idev] UDS.KEYID = 0
3,862,796 ready_for_fw is high
3,862,987 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
3,907,238 UART: [idev] Erasing UDS.KEYID = 0
6,340,922 UART: [idev] Sha1 KeyId Algorithm
6,364,495 UART: [idev] --
6,368,398 UART: [ldev] ++
6,369,078 UART: [ldev] CDI.KEYID = 6
6,369,971 UART: [ldev] SUBJECT.KEYID = 5
6,371,184 UART: [ldev] AUTHORITY.KEYID = 7
6,372,419 UART: [ldev] FE.KEYID = 1
6,384,009 UART: [ldev] Erasing FE.KEYID = 1
8,863,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,198 UART: [ldev] --
10,653,818 UART: [fwproc] Wait for Commands...
10,656,433 UART: [fwproc] Recv command 0x46574c44
10,658,696 UART: [fwproc] Recv'd Img size: 35124 bytes
13,131,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,206,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,329,726 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
13,389,053 >>> mbox cmd response: success
13,392,321 UART: [afmc] ++
13,392,966 UART: [afmc] CDI.KEYID = 6
13,394,168 UART: [afmc] SUBJECT.KEYID = 7
13,395,699 UART: [afmc] AUTHORITY.KEYID = 5
15,897,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,621,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,623,097 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
17,638,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
17,653,353 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
17,668,233 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
17,692,672 UART: [afmc] --
17,696,036 UART: [cold-reset] --
17,701,286 UART: [state] Locking Datavault
17,706,012 UART: [state] Locking PCR0, PCR1 and PCR31
17,708,133 UART: [state] Locking ICCM
17,709,768 UART: [exit] Launching FMC @ 0x40000130
17,718,449 UART:
17,718,699 UART: Running Caliptra FMC ...
17,719,842 UART:
17,720,027 UART: [state] CFI Enabled
17,728,010 UART: [fht] FMC Alias Private Key: 7
19,494,117 UART: [art] Extend RT PCRs Done
19,495,372 UART: [art] Lock RT PCRs Done
19,497,135 UART: [art] Populate DV Done
19,502,514 UART: [fht] FMC Alias Private Key: 7
19,504,172 UART: [art] Derive CDI
19,505,028 UART: [art] Store in slot 0x4
19,547,725 UART: [art] Derive Key Pair
19,548,803 UART: [art] Store priv key in slot 0x5
21,975,381 UART: [art] Derive Key Pair - Done
21,988,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,694,919 UART: [art] Erasing AUTHORITY.KEYID = 7
23,696,947 UART: [art] PUB.X = 417676D08AD9C16ABCE5B981CE64C3862CD6DA2D481368AF19D370B26730DD041A9D1264939E235281D06CD5FD0FC37C
23,703,689 UART: [art] PUB.Y = 3E867F8CC174768839541C9AF4380B6914DDEE81007D80BE98D83D99F1584A59F103C058D218B3A32BEDCEEF4442E427
23,710,940 UART: [art] SIG.R = D52A5AD507EEB3ACAE959233C749A708857D05DE293BCAA66FD3F2B5AE5DD075C9F0648D4D9CAAD0D094FE32B3878B09
23,718,381 UART: [art] SIG.S = 1625672A6A03CA8095F7D612D93C2DB427B7DB601B4CFB4273EB02F864EF4EDAC3578916C200621F67C0C553F0583997
24,697,048 UART: persistent_rt::test_persistent_data_layout...[ok]
24,699,314 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,756,308 ready_for_fw is high
3,756,722 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
13,236,633 >>> mbox cmd response: success
17,489,553 UART:
17,489,962 UART: Running Caliptra FMC ...
17,491,190 UART:
17,491,367 UART: [state] CFI Enabled
17,499,299 UART: [fht] FMC Alias Private Key: 7
19,265,356 UART: [art] Extend RT PCRs Done
19,266,634 UART: [art] Lock RT PCRs Done
19,268,138 UART: [art] Populate DV Done
19,273,535 UART: [fht] FMC Alias Private Key: 7
19,275,213 UART: [art] Derive CDI
19,276,076 UART: [art] Store in slot 0x4
19,318,750 UART: [art] Derive Key Pair
19,320,358 UART: [art] Store priv key in slot 0x5
21,746,624 UART: [art] Derive Key Pair - Done
21,759,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
23,466,155 UART: [art] Erasing AUTHORITY.KEYID = 7
23,467,712 UART: [art] PUB.X = B91E164741A77C3F26487A5D17381FE481B9BBD22C75DFC114B614CC657D1DB06BA1A816052F1E6802F1E881854BED04
23,474,938 UART: [art] PUB.Y = CA72734E47C114477F1CE48BC12C4CFBF84074751A32E8713B12B32F402AAD913636E8626F0593D0DE950B44C62F0119
23,482,213 UART: [art] SIG.R = 10EDEAAEFBB021C2EA79ED5809981A3906217DBB13D57B760829E4CD497D6EF19ED4F44655B7C94EDA92C21FB1A99EAA
23,489,640 UART: [art] SIG.S = 3B3A7C629B46D05B87AFC1AAF230C4EB5C87834ED92E598DB9653023E76450F190F393DECECB19EBDCD4803E77E4BD04
24,467,301 UART: persistent_rt::test_persistent_data_layout...[ok]
24,469,555 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,131 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,085 UART: [kat] SHA2-256
892,023 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
901,880 UART: [kat] HMAC-384Kdf
906,538 UART: [kat] LMS
1,474,734 UART: [kat] --
1,475,709 UART: [cold-reset] ++
1,476,103 UART: [fht] Storing FHT @ 0x50003400
1,478,902 UART: [idev] ++
1,479,070 UART: [idev] CDI.KEYID = 6
1,479,430 UART: [idev] SUBJECT.KEYID = 7
1,479,854 UART: [idev] UDS.KEYID = 0
1,480,199 ready_for_fw is high
1,480,199 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,488,072 UART: [idev] Erasing UDS.KEYID = 0
1,504,874 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,518 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,133 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,654 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,586,798 UART: [fwproc] Received command 0x46574c44
1,587,589 UART: [fwproc] Received Image of size 35124 bytes
1,976,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,003,369 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,034,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,049,718 >>> mbox cmd response: success
2,050,946 UART: [afmc] ++
2,051,114 UART: [afmc] CDI.KEYID = 6
2,051,476 UART: [afmc] SUBJECT.KEYID = 7
2,051,901 UART: [afmc] AUTHORITY.KEYID = 5
2,086,768 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,102,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,103,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,109,293 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,176 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,120,859 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,128,671 UART: [afmc] --
2,129,683 UART: [cold-reset] --
2,130,413 UART: [state] Locking Datavault
2,131,532 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,136 UART: [state] Locking ICCM
2,132,634 UART: [exit] Launching FMC @ 0x40000130
2,137,964 UART:
2,137,980 UART: Running Caliptra FMC ...
2,138,388 UART:
2,138,442 UART: [state] CFI Enabled
2,148,882 UART: [fht] FMC Alias Private Key: 7
2,267,506 UART: [art] Extend RT PCRs Done
2,267,934 UART: [art] Lock RT PCRs Done
2,269,650 UART: [art] Populate DV Done
2,277,955 UART: [fht] FMC Alias Private Key: 7
2,278,977 UART: [art] Derive CDI
2,279,257 UART: [art] Store in slot 0x4
2,364,913 UART: [art] Derive Key Pair
2,365,273 UART: [art] Store priv key in slot 0x5
2,378,852 UART: [art] Derive Key Pair - Done
2,393,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,204 UART: [art] Erasing AUTHORITY.KEYID = 7
2,409,969 UART: [art] PUB.X = 915615A8EDD0A0164A249D39D3066C3B7D5CD8C8B718012F32739F7243C5CBEC4EF93786743AE1FDE9F542F3B57FB2F4
2,416,741 UART: [art] PUB.Y = 878F4EE0D3A1A69ABBE7B826F00A85ED25175F95F3860AC8AF95361E6FD3A8660875CBF8F88391D0DB07D55D0FE602F3
2,423,685 UART: [art] SIG.R = C940953D428E1673A8EA4AE56E185203870715CC7353B27CA24ACFD03D79CBFBCB7850FE86AD4BB5948453C9EB57EFE5
2,430,461 UART: [art] SIG.S = E64899CD285437ECF3257B36F1BB343185399FF98463B26B4B18EB47F68D30942BF34A08ABE84C8025E40713225741CA
2,454,126 UART: persistent_rt::test_persistent_data_layout...[ok]
2,455,369 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,409 ready_for_fw is high
1,362,409 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,899,174 >>> mbox cmd response: success
1,960,433 UART:
1,960,449 UART: Running Caliptra FMC ...
1,960,857 UART:
1,960,911 UART: [state] CFI Enabled
1,971,455 UART: [fht] FMC Alias Private Key: 7
2,090,845 UART: [art] Extend RT PCRs Done
2,091,273 UART: [art] Lock RT PCRs Done
2,092,915 UART: [art] Populate DV Done
2,101,324 UART: [fht] FMC Alias Private Key: 7
2,102,380 UART: [art] Derive CDI
2,102,660 UART: [art] Store in slot 0x4
2,188,354 UART: [art] Derive Key Pair
2,188,714 UART: [art] Store priv key in slot 0x5
2,202,095 UART: [art] Derive Key Pair - Done
2,217,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,232,415 UART: [art] Erasing AUTHORITY.KEYID = 7
2,233,180 UART: [art] PUB.X = 210DDEE99D1648268C0B0D48959CAF4EF5D8CBEBC00457976ED0EEDD41DD064D01C63C78E68D122B17473F81E15735E7
2,239,942 UART: [art] PUB.Y = BE1DD460DC203A0A77C84CFCBA340CC76A6B5C0A4797DEC54E8E666C3794249E4B12518656602FABBDB7625C51B44D89
2,246,895 UART: [art] SIG.R = 741551955EE4B6CCD174389A40DD4A5FE28472F3DA74F4A7232739A4195F4D3427307C295FBA49604303F93F80F9F3E9
2,253,658 UART: [art] SIG.S = 3F03BC5B87143E77E1443750699C9A77EFBE96C3698CA1F3613576115EE0EAFC1B6D9BA2C9F2F5F7BFDF0839E58FFBC0
2,277,091 UART: persistent_rt::test_persistent_data_layout...[ok]
2,278,334 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,768 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,368 UART: [kat] SHA2-256
882,299 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,414 UART: [kat] ++
886,566 UART: [kat] sha1
890,900 UART: [kat] SHA2-256
892,838 UART: [kat] SHA2-384
895,427 UART: [kat] SHA2-512-ACC
897,328 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,527 UART: [kat] LMS
1,475,723 UART: [kat] --
1,476,534 UART: [cold-reset] ++
1,477,096 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 ready_for_fw is high
1,481,138 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,488,531 UART: [idev] Erasing UDS.KEYID = 0
1,504,683 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,315 UART: [idev] --
1,514,230 UART: [ldev] ++
1,514,398 UART: [ldev] CDI.KEYID = 6
1,514,761 UART: [ldev] SUBJECT.KEYID = 5
1,515,187 UART: [ldev] AUTHORITY.KEYID = 7
1,515,650 UART: [ldev] FE.KEYID = 1
1,521,000 UART: [ldev] Erasing FE.KEYID = 1
1,546,395 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,831 UART: [ldev] --
1,586,194 UART: [fwproc] Waiting for Commands...
1,586,919 UART: [fwproc] Received command 0x46574c44
1,587,710 UART: [fwproc] Received Image of size 35124 bytes
1,977,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,004,172 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,035,390 UART: [fwproc] Loading Runtime at address 0x40005000 len 9196
2,050,503 >>> mbox cmd response: success
2,051,735 UART: [afmc] ++
2,051,903 UART: [afmc] CDI.KEYID = 6
2,052,265 UART: [afmc] SUBJECT.KEYID = 7
2,052,690 UART: [afmc] AUTHORITY.KEYID = 5
2,087,441 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,103,353 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,104,133 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,109,842 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,115,725 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,121,408 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,129,246 UART: [afmc] --
2,130,274 UART: [cold-reset] --
2,131,020 UART: [state] Locking Datavault
2,132,121 UART: [state] Locking PCR0, PCR1 and PCR31
2,132,725 UART: [state] Locking ICCM
2,133,151 UART: [exit] Launching FMC @ 0x40000130
2,138,481 UART:
2,138,497 UART: Running Caliptra FMC ...
2,138,905 UART:
2,139,048 UART: [state] CFI Enabled
2,150,060 UART: [fht] FMC Alias Private Key: 7
2,268,844 UART: [art] Extend RT PCRs Done
2,269,272 UART: [art] Lock RT PCRs Done
2,270,996 UART: [art] Populate DV Done
2,279,401 UART: [fht] FMC Alias Private Key: 7
2,280,557 UART: [art] Derive CDI
2,280,837 UART: [art] Store in slot 0x4
2,366,273 UART: [art] Derive Key Pair
2,366,633 UART: [art] Store priv key in slot 0x5
2,379,736 UART: [art] Derive Key Pair - Done
2,394,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,409,545 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,310 UART: [art] PUB.X = BB4FA53A5D16B3264D9CBAD3E9D6D1DCE22F327C5E93C5FF5B3664B64885C5C4E4D46D9F0DF2460C270AEBDDE4AEB6E2
2,417,099 UART: [art] PUB.Y = 4328E32A418E1D83043BBE27532C83ADE1E85BDC4B2F67AF11DD4D4BB70C7D0F0FEDFEF7F50BF03B20685D657442545D
2,424,050 UART: [art] SIG.R = 939F21EAC3BCAAA4B1C4B5A3AA11499313167E54BDD42E88C0AB54C6224E606EA535B7A23DE2270724DA71C88659FCC9
2,430,829 UART: [art] SIG.S = 3D1002F53E9C2F83ACFFD01024DAA419E3F0DBA74FFC8C808A0A7E1F1B40B6D6FD20A29CCA88A3A5CC4C2B1EDE5CC9A4
2,454,604 UART: persistent_rt::test_persistent_data_layout...[ok]
2,455,847 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,680 ready_for_fw is high
1,362,680 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,899,401 >>> mbox cmd response: success
1,961,976 UART:
1,961,992 UART: Running Caliptra FMC ...
1,962,400 UART:
1,962,543 UART: [state] CFI Enabled
1,973,031 UART: [fht] FMC Alias Private Key: 7
2,091,741 UART: [art] Extend RT PCRs Done
2,092,169 UART: [art] Lock RT PCRs Done
2,094,055 UART: [art] Populate DV Done
2,102,232 UART: [fht] FMC Alias Private Key: 7
2,103,330 UART: [art] Derive CDI
2,103,610 UART: [art] Store in slot 0x4
2,189,280 UART: [art] Derive Key Pair
2,189,640 UART: [art] Store priv key in slot 0x5
2,203,141 UART: [art] Derive Key Pair - Done
2,218,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,233,666 UART: [art] Erasing AUTHORITY.KEYID = 7
2,234,431 UART: [art] PUB.X = CD0C4B2B4E5B4D9D15CA96B3517C7E16F451A8CAC5144F7882E6398D9F5D8AC7DDA719A3FC323F2D72A7D8E7650869EF
2,241,211 UART: [art] PUB.Y = ED6119EC6E0A5F5CDCC23C68C00FEAEF13C3F4AD68F327FFFF16478B352E71F16AC310F5888D3773E5CB9427448F2025
2,248,169 UART: [art] SIG.R = 3591CA88C92BD0BC18683C75F9A082721EBF05D4A18D8AE282A7443AAD48EC07DCD38707961F930C1EA2A24353394C1C
2,254,933 UART: [art] SIG.S = A2ED64E964A82DB185D57CC7738480D4DDEDDDF5817515DFC5F0AEE7479EC627071F88CF9A83A5C8FFB9D79AB424C885
2,278,817 UART: persistent_rt::test_persistent_data_layout...[ok]
2,280,060 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,752 UART: [kat] SHA2-256
901,692 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,009 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,650 UART: [cold-reset] ++
1,170,044 UART: [fht] FHT @ 0x50003400
1,172,510 UART: [idev] ++
1,172,678 UART: [idev] CDI.KEYID = 6
1,173,039 UART: [idev] SUBJECT.KEYID = 7
1,173,464 UART: [idev] UDS.KEYID = 0
1,173,810 ready_for_fw is high
1,173,810 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,709 UART: [idev] Sha1 KeyId Algorithm
1,207,417 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,215,164 UART: [ldev] Erasing FE.KEYID = 1
1,240,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,598 UART: [ldev] --
1,280,035 UART: [fwproc] Wait for Commands...
1,280,776 UART: [fwproc] Recv command 0x46574c44
1,281,509 UART: [fwproc] Recv'd Img size: 35124 bytes
1,669,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,697,033 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,728,208 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,743,267 >>> mbox cmd response: success
1,744,505 UART: [afmc] ++
1,744,673 UART: [afmc] CDI.KEYID = 6
1,745,036 UART: [afmc] SUBJECT.KEYID = 7
1,745,462 UART: [afmc] AUTHORITY.KEYID = 5
1,780,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,797,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,798,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,803,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,809,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,815,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,823,060 UART: [afmc] --
1,823,887 UART: [cold-reset] --
1,824,739 UART: [state] Locking Datavault
1,825,838 UART: [state] Locking PCR0, PCR1 and PCR31
1,826,442 UART: [state] Locking ICCM
1,826,946 UART: [exit] Launching FMC @ 0x40000130
1,832,276 UART:
1,832,292 UART: Running Caliptra FMC ...
1,832,700 UART:
1,832,754 UART: [state] CFI Enabled
1,843,104 UART: [fht] FMC Alias Private Key: 7
1,961,710 UART: [art] Extend RT PCRs Done
1,962,138 UART: [art] Lock RT PCRs Done
1,963,616 UART: [art] Populate DV Done
1,972,071 UART: [fht] FMC Alias Private Key: 7
1,973,183 UART: [art] Derive CDI
1,973,463 UART: [art] Store in slot 0x4
2,059,050 UART: [art] Derive Key Pair
2,059,410 UART: [art] Store priv key in slot 0x5
2,073,178 UART: [art] Derive Key Pair - Done
2,088,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,103,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,104,363 UART: [art] PUB.X = EA51BA8AF513E945BC230B3C5CA26D39B752ACAAAEB07F1723CFC2E807FF413C4040B9F39CB9134EBA6307A08D95F7A7
2,111,144 UART: [art] PUB.Y = D45E868BB75FAFF730A6A622F250E4E77721CCC662AEB9E28DB224BC11C0398EA9D6504BB5BBA9B5031A6AFE01940EF7
2,118,103 UART: [art] SIG.R = CFD087154C2C286012FB0A9FB57473B10E4A4C71270A9A4718BE243D8D69A7BF656194CE74A654F9E4849C16F54855B7
2,124,864 UART: [art] SIG.S = 39E869CA99D6037CDEBF95A731D7F6210323B68FADACA72F776C357F8B367F4008ED9D1F5F7A4143A1AD9C0BF6DC3981
2,148,899 UART: persistent_rt::test_persistent_data_layout...[ok]
2,150,142 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,512 ready_for_fw is high
1,058,512 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,596,270 >>> mbox cmd response: success
1,657,863 UART:
1,657,879 UART: Running Caliptra FMC ...
1,658,287 UART:
1,658,341 UART: [state] CFI Enabled
1,668,607 UART: [fht] FMC Alias Private Key: 7
1,787,883 UART: [art] Extend RT PCRs Done
1,788,311 UART: [art] Lock RT PCRs Done
1,789,817 UART: [art] Populate DV Done
1,798,032 UART: [fht] FMC Alias Private Key: 7
1,799,098 UART: [art] Derive CDI
1,799,378 UART: [art] Store in slot 0x4
1,885,245 UART: [art] Derive Key Pair
1,885,605 UART: [art] Store priv key in slot 0x5
1,898,741 UART: [art] Derive Key Pair - Done
1,913,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,928,789 UART: [art] Erasing AUTHORITY.KEYID = 7
1,929,554 UART: [art] PUB.X = 35021D8D7A668813FC77D85AE663EB93D3782034A4FACA78F4F13C0D2F5AFEB35836500532CC7A63CB5957B5D283A2AC
1,936,323 UART: [art] PUB.Y = 86780AD80F1D54E07F94E11AC766F8311C8E422D88A98B98561E2D68350DD31B73B9C5BE1790B7FFC86961962E8AAC0A
1,943,265 UART: [art] SIG.R = B0EEF6E7A099215FB7D8ABA16694B86CC4CED1A422E2F47B69238ADA2A917421C8583CF609AB6B229F54F1D592F8A51A
1,950,046 UART: [art] SIG.S = 067D99A589718F02A64C70CBBC98354A6C69AC8460A2746953DFD86D270017B8B8D32C1D7E9FE3D63D46DE8A00635A01
1,973,262 UART: persistent_rt::test_persistent_data_layout...[ok]
1,974,505 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,320 UART: [state] WD Timer not started. Device not locked for debugging
87,637 UART: [kat] SHA2-256
891,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,291 UART: [kat] ++
895,443 UART: [kat] sha1
899,771 UART: [kat] SHA2-256
901,711 UART: [kat] SHA2-384
904,458 UART: [kat] SHA2-512-ACC
906,359 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,753 UART: [cold-reset] ++
1,170,167 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,174,171 ready_for_fw is high
1,174,171 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,181,902 UART: [idev] Erasing UDS.KEYID = 0
1,199,300 UART: [idev] Sha1 KeyId Algorithm
1,208,190 UART: [idev] --
1,209,351 UART: [ldev] ++
1,209,519 UART: [ldev] CDI.KEYID = 6
1,209,883 UART: [ldev] SUBJECT.KEYID = 5
1,210,310 UART: [ldev] AUTHORITY.KEYID = 7
1,210,773 UART: [ldev] FE.KEYID = 1
1,216,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,911 UART: [ldev] --
1,282,148 UART: [fwproc] Wait for Commands...
1,282,735 UART: [fwproc] Recv command 0x46574c44
1,283,468 UART: [fwproc] Recv'd Img size: 35124 bytes
1,671,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,698,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,729,919 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,744,954 >>> mbox cmd response: success
1,746,072 UART: [afmc] ++
1,746,240 UART: [afmc] CDI.KEYID = 6
1,746,603 UART: [afmc] SUBJECT.KEYID = 7
1,747,029 UART: [afmc] AUTHORITY.KEYID = 5
1,783,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,840 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,422 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,181 UART: [afmc] --
1,826,186 UART: [cold-reset] --
1,827,308 UART: [state] Locking Datavault
1,828,205 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,809 UART: [state] Locking ICCM
1,829,275 UART: [exit] Launching FMC @ 0x40000130
1,834,605 UART:
1,834,621 UART: Running Caliptra FMC ...
1,835,029 UART:
1,835,172 UART: [state] CFI Enabled
1,846,210 UART: [fht] FMC Alias Private Key: 7
1,966,142 UART: [art] Extend RT PCRs Done
1,966,570 UART: [art] Lock RT PCRs Done
1,968,276 UART: [art] Populate DV Done
1,976,391 UART: [fht] FMC Alias Private Key: 7
1,977,397 UART: [art] Derive CDI
1,977,677 UART: [art] Store in slot 0x4
2,063,836 UART: [art] Derive Key Pair
2,064,196 UART: [art] Store priv key in slot 0x5
2,077,336 UART: [art] Derive Key Pair - Done
2,091,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,107,706 UART: [art] Erasing AUTHORITY.KEYID = 7
2,108,471 UART: [art] PUB.X = 53525E535123B9AE62000E2D94927626E14C0CB9EC4D19FFE3210A7F70A93E931AED4A43E5BD7702D0532E03A41BF5DA
2,115,210 UART: [art] PUB.Y = A5F20921F6B9F7FF6A1DF3CB3D59BC07CD9B6994BB45E2099FF9FD5D9443405EFDBCCEB953A728C6C30D291B8CBDB1E0
2,122,174 UART: [art] SIG.R = 8CB30C87B5D553E83079AA295EAFD5962A86733C4200646B87909E96F2DCC172E0F3C07E90F12A75D3553F3136F749A6
2,128,917 UART: [art] SIG.S = 517BD4FDAEA48F8F3A257382BFFDA6E8918B0659441ABC388B30C1FCA769A8B6783F30F191978D3F1CF3BFA193708BF8
2,152,705 UART: persistent_rt::test_persistent_data_layout...[ok]
2,153,948 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,345 ready_for_fw is high
1,059,345 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,598,662 >>> mbox cmd response: success
1,660,179 UART:
1,660,195 UART: Running Caliptra FMC ...
1,660,603 UART:
1,660,746 UART: [state] CFI Enabled
1,670,994 UART: [fht] FMC Alias Private Key: 7
1,790,074 UART: [art] Extend RT PCRs Done
1,790,502 UART: [art] Lock RT PCRs Done
1,791,936 UART: [art] Populate DV Done
1,800,155 UART: [fht] FMC Alias Private Key: 7
1,801,251 UART: [art] Derive CDI
1,801,531 UART: [art] Store in slot 0x4
1,887,798 UART: [art] Derive Key Pair
1,888,158 UART: [art] Store priv key in slot 0x5
1,901,836 UART: [art] Derive Key Pair - Done
1,916,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,182 UART: [art] Erasing AUTHORITY.KEYID = 7
1,932,947 UART: [art] PUB.X = F282F6707E33B6C0AB5B0EDB2EDE1D0F6DAB5CB0955DEE186A160554755ED3BB86B340FCDACD0FF55C23CF64C7F58277
1,939,729 UART: [art] PUB.Y = BE50B55A8BA322A3438B8BEECAA4B9E896237A7C859095AD9591C87E67CBE555FA71F79CBF569FAB77F228416BA1E09D
1,946,695 UART: [art] SIG.R = F86761DE1FE62686CE73D8E7CCD0A488C1E5A7A0D7D96B0080F5C0F1654F5184BD01089BB7EFF8DDCCEB2B307691D55F
1,953,455 UART: [art] SIG.S = 5D4398CA54995EBD448095F5C3249D5D4A71D7F33DAE885D7A9DB17B897A21C8653188B244190C117D299B50C2B152AC
1,977,251 UART: persistent_rt::test_persistent_data_layout...[ok]
1,978,494 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.93s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
893,536 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,661 UART: [kat] ++
897,813 UART: [kat] sha1
902,127 UART: [kat] SHA2-256
904,067 UART: [kat] SHA2-384
906,706 UART: [kat] SHA2-512-ACC
908,607 UART: [kat] ECC-384
918,324 UART: [kat] HMAC-384Kdf
922,808 UART: [kat] LMS
1,171,136 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,389 UART: [fht] FHT @ 0x50003400
1,174,966 UART: [idev] ++
1,175,134 UART: [idev] CDI.KEYID = 6
1,175,494 UART: [idev] SUBJECT.KEYID = 7
1,175,918 UART: [idev] UDS.KEYID = 0
1,176,263 ready_for_fw is high
1,176,263 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,184,022 UART: [idev] Erasing UDS.KEYID = 0
1,200,967 UART: [idev] Sha1 KeyId Algorithm
1,209,525 UART: [idev] --
1,210,571 UART: [ldev] ++
1,210,739 UART: [ldev] CDI.KEYID = 6
1,211,102 UART: [ldev] SUBJECT.KEYID = 5
1,211,528 UART: [ldev] AUTHORITY.KEYID = 7
1,211,991 UART: [ldev] FE.KEYID = 1
1,217,031 UART: [ldev] Erasing FE.KEYID = 1
1,243,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,129 UART: [ldev] --
1,282,608 UART: [fwproc] Wait for Commands...
1,283,278 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 35124 bytes
1,672,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,948 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,746,135 >>> mbox cmd response: success
1,747,151 UART: [afmc] ++
1,747,319 UART: [afmc] CDI.KEYID = 6
1,747,681 UART: [afmc] SUBJECT.KEYID = 7
1,748,106 UART: [afmc] AUTHORITY.KEYID = 5
1,783,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,800,012 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,800,760 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,806,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,812,352 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,818,053 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,915 UART: [afmc] --
1,826,857 UART: [cold-reset] --
1,827,699 UART: [state] Locking Datavault
1,829,062 UART: [state] Locking PCR0, PCR1 and PCR31
1,829,666 UART: [state] Locking ICCM
1,830,156 UART: [exit] Launching FMC @ 0x40000130
1,835,486 UART:
1,835,502 UART: Running Caliptra FMC ...
1,835,910 UART:
1,835,964 UART: [state] CFI Enabled
1,846,766 UART: [fht] FMC Alias Private Key: 7
1,966,586 UART: [art] Extend RT PCRs Done
1,967,014 UART: [art] Lock RT PCRs Done
1,968,566 UART: [art] Populate DV Done
1,976,887 UART: [fht] FMC Alias Private Key: 7
1,977,851 UART: [art] Derive CDI
1,978,131 UART: [art] Store in slot 0x4
2,063,682 UART: [art] Derive Key Pair
2,064,042 UART: [art] Store priv key in slot 0x5
2,077,202 UART: [art] Derive Key Pair - Done
2,092,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,107,928 UART: [art] Erasing AUTHORITY.KEYID = 7
2,108,693 UART: [art] PUB.X = F4AE110FE511F42A4577B9E234E14ED709FA59081C02F2F10EDFD81CEB3D9078D2F95CE21999E80465C494F17994FAE1
2,115,453 UART: [art] PUB.Y = 5F0CA51FCE44992F7B0EF563A6C6D14943206057CFAC639011E57A99F1B8A24F14F1BA1CCA2CED763A875384D993C805
2,122,402 UART: [art] SIG.R = B71DAF321FFB965D02D149C937595A57DC859BF697B7E37660ADF91C84F2CAAA3AB645EABC8DC8DCC89987F3A0C13628
2,129,187 UART: [art] SIG.S = 9EDB36F35D56C93D7687F2FF6F0F07CEBDA2EDB1808237D677FC6B65950474642793BB7D2C0E2170238997B16C267A94
2,152,198 UART: persistent_rt::test_persistent_data_layout...[ok]
2,153,441 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,599,338 >>> mbox cmd response: success
1,661,757 UART:
1,661,773 UART: Running Caliptra FMC ...
1,662,181 UART:
1,662,235 UART: [state] CFI Enabled
1,672,637 UART: [fht] FMC Alias Private Key: 7
1,790,763 UART: [art] Extend RT PCRs Done
1,791,191 UART: [art] Lock RT PCRs Done
1,792,625 UART: [art] Populate DV Done
1,800,972 UART: [fht] FMC Alias Private Key: 7
1,802,052 UART: [art] Derive CDI
1,802,332 UART: [art] Store in slot 0x4
1,888,191 UART: [art] Derive Key Pair
1,888,551 UART: [art] Store priv key in slot 0x5
1,901,537 UART: [art] Derive Key Pair - Done
1,916,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,932,279 UART: [art] Erasing AUTHORITY.KEYID = 7
1,933,044 UART: [art] PUB.X = A96FED92B99938BC0D678F001C569B7CE763032B2D9D130F9ED837E0D1528F253DED18DCA42AF7448C6B076C579E3D13
1,939,788 UART: [art] PUB.Y = 0B00400BD9678C29A2EFFEAABE95DF6F1F1B95DFED3BD308FDA5765384D81FBDC7CB2C95F1DB11C722D1E290A9869DE5
1,946,733 UART: [art] SIG.R = BADE82EA9615A29310BFEDFE2F1F90072D8FF01FD4F4CE415672495CEE24902EAC0E556B118F97E979D98BA75690B3C8
1,953,511 UART: [art] SIG.S = A40E36F4889F23B71F7038D4D95220176F0FE1914D52565E6DB129E47A50B4E6C5881166773AE261121F6D699D28CDD3
1,977,652 UART: persistent_rt::test_persistent_data_layout...[ok]
1,978,895 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
902,058 UART: [kat] SHA2-256
903,998 UART: [kat] SHA2-384
906,765 UART: [kat] SHA2-512-ACC
908,666 UART: [kat] ECC-384
918,221 UART: [kat] HMAC-384Kdf
922,919 UART: [kat] LMS
1,171,247 UART: [kat] --
1,172,298 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,501 UART: [idev] ++
1,175,669 UART: [idev] CDI.KEYID = 6
1,176,029 UART: [idev] SUBJECT.KEYID = 7
1,176,453 UART: [idev] UDS.KEYID = 0
1,176,798 ready_for_fw is high
1,176,798 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,184,329 UART: [idev] Erasing UDS.KEYID = 0
1,201,488 UART: [idev] Sha1 KeyId Algorithm
1,209,944 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,217,772 UART: [ldev] Erasing FE.KEYID = 1
1,243,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,467 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,402 UART: [ldev] --
1,282,891 UART: [fwproc] Wait for Commands...
1,283,569 UART: [fwproc] Recv command 0x46574c44
1,284,297 UART: [fwproc] Recv'd Img size: 35124 bytes
1,672,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,699,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
1,730,753 UART: [fwproc] Load Runtime at address 0x40005000 len 9196
1,745,944 >>> mbox cmd response: success
1,747,008 UART: [afmc] ++
1,747,176 UART: [afmc] CDI.KEYID = 6
1,747,538 UART: [afmc] SUBJECT.KEYID = 7
1,747,963 UART: [afmc] AUTHORITY.KEYID = 5
1,782,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,799,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,799,885 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
1,805,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
1,811,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
1,817,178 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
1,825,110 UART: [afmc] --
1,826,042 UART: [cold-reset] --
1,826,822 UART: [state] Locking Datavault
1,828,263 UART: [state] Locking PCR0, PCR1 and PCR31
1,828,867 UART: [state] Locking ICCM
1,829,481 UART: [exit] Launching FMC @ 0x40000130
1,834,811 UART:
1,834,827 UART: Running Caliptra FMC ...
1,835,235 UART:
1,835,378 UART: [state] CFI Enabled
1,846,046 UART: [fht] FMC Alias Private Key: 7
1,965,170 UART: [art] Extend RT PCRs Done
1,965,598 UART: [art] Lock RT PCRs Done
1,967,440 UART: [art] Populate DV Done
1,975,787 UART: [fht] FMC Alias Private Key: 7
1,976,941 UART: [art] Derive CDI
1,977,221 UART: [art] Store in slot 0x4
2,063,484 UART: [art] Derive Key Pair
2,063,844 UART: [art] Store priv key in slot 0x5
2,076,950 UART: [art] Derive Key Pair - Done
2,091,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,107,388 UART: [art] Erasing AUTHORITY.KEYID = 7
2,108,153 UART: [art] PUB.X = 7C8556226AE2FD68D26EC22B545778694EE41A73D9C39029703DF9167AF856461A558FD74823BA4BDADD3664D4C8D71E
2,114,925 UART: [art] PUB.Y = 285AC67D7C8830A9FEB5F0810DB4A59B5113B826C036ABBF17D184B5260ED1091CF6E9AFB0A3F5DEBF90051DFF92BD10
2,121,881 UART: [art] SIG.R = 0B1029D5D00D93350D43C4041A9E4C925705B65FBDEF3885A83C4944A35D75B354A07883550A5AD6155BDA907FD4DCEE
2,128,637 UART: [art] SIG.S = BC274D80D408187E05B6EE98180EC0DADF640D8C625AE12682BB1633BA2DCD352BFF144C20BE84EAFDD45C9A24EAD1DD
2,151,662 UART: persistent_rt::test_persistent_data_layout...[ok]
2,152,905 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,924 ready_for_fw is high
1,060,924 <<< Executing mbox cmd 0x46574c44 (35124 bytes) from SoC
1,599,755 >>> mbox cmd response: success
1,662,400 UART:
1,662,416 UART: Running Caliptra FMC ...
1,662,824 UART:
1,662,967 UART: [state] CFI Enabled
1,673,813 UART: [fht] FMC Alias Private Key: 7
1,792,965 UART: [art] Extend RT PCRs Done
1,793,393 UART: [art] Lock RT PCRs Done
1,795,229 UART: [art] Populate DV Done
1,803,436 UART: [fht] FMC Alias Private Key: 7
1,804,580 UART: [art] Derive CDI
1,804,860 UART: [art] Store in slot 0x4
1,890,673 UART: [art] Derive Key Pair
1,891,033 UART: [art] Store priv key in slot 0x5
1,904,803 UART: [art] Derive Key Pair - Done
1,919,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,934,451 UART: [art] Erasing AUTHORITY.KEYID = 7
1,935,216 UART: [art] PUB.X = 3A6EAF76689A878F2F4042847694E0B62D1C58AA24E0C60EA1657EDA1C9422EDBD74958A2FFFCA73116A0C8825D7E7D6
1,941,990 UART: [art] PUB.Y = 22B0D18AF42BA6E56C0165674572EBA58D50A5B79F774A7926438639B922AA144E17D54E244EA0C7F0701682257FE4AE
1,948,935 UART: [art] SIG.R = 015AEB528DE43A56E00B81C71693A0BAE8750CDDC1BCFDAEEF7075CE2E3718D7196CC25FBFC07655FA4831F60E637744
1,955,709 UART: [art] SIG.S = 21684E14952586DE83E4508A3D4AE59B0DB55621D8F17C2231D57C77C0700A5D18BB5CDB733CA09C4CA858DFC480F9BA
1,979,788 UART: persistent_rt::test_persistent_data_layout...[ok]
1,981,031 UART: persistent_rt::test_read_write...[ok]
* TESTCASE PASSED
test test_boot::test_persistent_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,241 UART:
192,605 UART: Running Caliptra ROM ...
193,759 UART:
193,910 UART: [state] CFI Enabled
263,879 UART: [state] LifecycleState = Unprovisioned
265,821 UART: [state] DebugLocked = No
268,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,700 UART: [kat] SHA2-256
443,386 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,922 UART: [kat] ++
454,398 UART: [kat] sha1
465,698 UART: [kat] SHA2-256
468,346 UART: [kat] SHA2-384
474,406 UART: [kat] SHA2-512-ACC
476,774 UART: [kat] ECC-384
2,766,916 UART: [kat] HMAC-384Kdf
2,799,700 UART: [kat] LMS
3,990,034 UART: [kat] --
3,996,384 UART: [cold-reset] ++
3,998,172 UART: [fht] Storing FHT @ 0x50003400
4,009,466 UART: [idev] ++
4,010,040 UART: [idev] CDI.KEYID = 6
4,010,958 UART: [idev] SUBJECT.KEYID = 7
4,012,207 UART: [idev] UDS.KEYID = 0
4,013,265 ready_for_fw is high
4,013,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,931 UART: [idev] Erasing UDS.KEYID = 0
7,345,016 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,524 UART: [idev] --
7,371,738 UART: [ldev] ++
7,372,364 UART: [ldev] CDI.KEYID = 6
7,373,329 UART: [ldev] SUBJECT.KEYID = 5
7,374,488 UART: [ldev] AUTHORITY.KEYID = 7
7,375,785 UART: [ldev] FE.KEYID = 1
7,420,996 UART: [ldev] Erasing FE.KEYID = 1
10,752,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,321 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,393 UART: [ldev] --
13,134,496 UART: [fwproc] Waiting for Commands...
13,136,905 UART: [fwproc] Received command 0x46574c44
13,139,086 UART: [fwproc] Received Image of size 118548 bytes
17,243,429 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,144 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,724,649 >>> mbox cmd response: success
17,729,201 UART: [afmc] ++
17,729,819 UART: [afmc] CDI.KEYID = 6
17,730,738 UART: [afmc] SUBJECT.KEYID = 7
17,732,011 UART: [afmc] AUTHORITY.KEYID = 5
21,088,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,960 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,403,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,403 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,432,807 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,454,309 UART: [afmc] --
23,457,252 UART: [cold-reset] --
23,461,168 UART: [state] Locking Datavault
23,466,094 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,849 UART: [state] Locking ICCM
23,470,383 UART: [exit] Launching FMC @ 0x40000130
23,478,658 UART:
23,478,904 UART: Running Caliptra FMC ...
23,480,010 UART:
23,480,176 UART: [state] CFI Enabled
23,545,939 UART: [fht] FMC Alias Private Key: 7
25,886,999 UART: [art] Extend RT PCRs Done
25,888,223 UART: [art] Lock RT PCRs Done
25,889,933 UART: [art] Populate DV Done
25,895,294 UART: [fht] FMC Alias Private Key: 7
25,896,892 UART: [art] Derive CDI
25,897,633 UART: [art] Store in slot 0x4
25,954,292 UART: [art] Derive Key Pair
25,955,333 UART: [art] Store priv key in slot 0x5
29,247,810 UART: [art] Derive Key Pair - Done
29,261,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,778 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,414 UART: [art] PUB.X = 9761753E63D579535A6ADE0E52B31730A0AC10B7F9186BBEC4C1AFB630E4BBE057237DF23D387A83996B5F4328B31880
31,558,562 UART: [art] PUB.Y = ACB0BC8411D6BDC6E6AC00FC8250D7AE9BE8867301917F57DA0BF3C23EF8B3571404A0F107B38D4B14BF187951C02E61
31,565,785 UART: [art] SIG.R = 3E1A79E57249FB87E095876F2ED805176A02E4BBEB5EF3D191A35A5AB866B1D734D5C7EF061A162D5FFF3ED8A1A8049E
31,573,175 UART: [art] SIG.S = F7A2D382C43250C96A56F9BB47D57C0A1B0372FAA88ADA7A765BD2297294782B57EF9F05ADE828F44A1580605E7D7D9F
32,878,070 UART: Caliptra RT
32,878,784 UART: [state] CFI Enabled
33,055,777 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,785,860 ready_for_fw is high
3,786,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,587 >>> mbox cmd response: success
23,651,461 UART:
23,651,856 UART: Running Caliptra FMC ...
23,652,988 UART:
23,653,144 UART: [state] CFI Enabled
23,722,821 UART: [fht] FMC Alias Private Key: 7
26,063,729 UART: [art] Extend RT PCRs Done
26,064,954 UART: [art] Lock RT PCRs Done
26,066,746 UART: [art] Populate DV Done
26,072,227 UART: [fht] FMC Alias Private Key: 7
26,073,826 UART: [art] Derive CDI
26,074,665 UART: [art] Store in slot 0x4
26,131,016 UART: [art] Derive Key Pair
26,132,067 UART: [art] Store priv key in slot 0x5
29,425,375 UART: [art] Derive Key Pair - Done
29,438,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,308 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,813 UART: [art] PUB.X = F69CE3CC5A4D8EB9376605515140B5504B0F7326D2EBE69925DD1222556987856D3AA458A29D063239D79A55D456AEAB
31,736,060 UART: [art] PUB.Y = 9BA620ADADFC34520B3654982FA1625BA6EB0FA568E58B58B7AB418D830B946D914A01E334BFDFB7884ADB8EC37BEC68
31,743,370 UART: [art] SIG.R = BE3A8861203F2197059423380817F9496E590219DBBA78864B565081A61FC8B40AE41053DC9F3601B2F260BCA449F4C3
31,750,718 UART: [art] SIG.S = 93E65BAD39EDEF093F5756F564326A707311EB1A900D71568509F017AEBB58882E9581D6D113418E3C93103A5988504A
33,055,799 UART: Caliptra RT
33,056,518 UART: [state] CFI Enabled
33,231,571 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,314 UART:
192,679 UART: Running Caliptra ROM ...
193,804 UART:
603,474 UART: [state] CFI Enabled
618,092 UART: [state] LifecycleState = Unprovisioned
620,036 UART: [state] DebugLocked = No
622,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,041 UART: [kat] SHA2-256
797,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,364 UART: [kat] ++
808,813 UART: [kat] sha1
820,746 UART: [kat] SHA2-256
823,462 UART: [kat] SHA2-384
829,019 UART: [kat] SHA2-512-ACC
831,381 UART: [kat] ECC-384
3,115,745 UART: [kat] HMAC-384Kdf
3,128,479 UART: [kat] LMS
4,318,607 UART: [kat] --
4,323,289 UART: [cold-reset] ++
4,324,188 UART: [fht] Storing FHT @ 0x50003400
4,334,963 UART: [idev] ++
4,335,605 UART: [idev] CDI.KEYID = 6
4,336,519 UART: [idev] SUBJECT.KEYID = 7
4,337,760 UART: [idev] UDS.KEYID = 0
4,338,817 ready_for_fw is high
4,339,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,930 UART: [idev] Erasing UDS.KEYID = 0
7,627,349 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,836 UART: [idev] --
7,653,946 UART: [ldev] ++
7,654,515 UART: [ldev] CDI.KEYID = 6
7,655,446 UART: [ldev] SUBJECT.KEYID = 5
7,656,705 UART: [ldev] AUTHORITY.KEYID = 7
7,657,858 UART: [ldev] FE.KEYID = 1
7,669,167 UART: [ldev] Erasing FE.KEYID = 1
10,957,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,314 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,332 UART: [ldev] --
13,320,533 UART: [fwproc] Waiting for Commands...
13,322,295 UART: [fwproc] Received command 0x46574c44
13,324,522 UART: [fwproc] Received Image of size 118548 bytes
17,432,693 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,637 >>> mbox cmd response: success
17,912,219 UART: [afmc] ++
17,912,836 UART: [afmc] CDI.KEYID = 6
17,913,744 UART: [afmc] SUBJECT.KEYID = 7
17,914,977 UART: [afmc] AUTHORITY.KEYID = 5
21,229,965 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,917 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,593 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,370 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,761 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,513 UART: [afmc] --
23,594,728 UART: [cold-reset] --
23,598,260 UART: [state] Locking Datavault
23,603,657 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,365 UART: [state] Locking ICCM
23,607,567 UART: [exit] Launching FMC @ 0x40000130
23,615,957 UART:
23,616,184 UART: Running Caliptra FMC ...
23,617,230 UART:
23,617,398 UART: [state] CFI Enabled
23,625,822 UART: [fht] FMC Alias Private Key: 7
25,966,127 UART: [art] Extend RT PCRs Done
25,967,353 UART: [art] Lock RT PCRs Done
25,969,033 UART: [art] Populate DV Done
25,974,176 UART: [fht] FMC Alias Private Key: 7
25,975,816 UART: [art] Derive CDI
25,976,549 UART: [art] Store in slot 0x4
26,019,358 UART: [art] Derive Key Pair
26,020,398 UART: [art] Store priv key in slot 0x5
29,262,296 UART: [art] Derive Key Pair - Done
29,275,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,844 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,353 UART: [art] PUB.X = 6ECC1FA3FBFCCB284489413E51B7BAAB55A9D69B4AA984BC57D56F65A75A881C4214E59BD948A3B955E015C2DE094824
31,564,644 UART: [art] PUB.Y = FD6EF66259981714DC40E4D39C8F87FEC050ACC04E9636CD23A238FBBB35D657CCA361B4AA74A9F407747AE4F54B496C
31,571,919 UART: [art] SIG.R = 1E607D190C05E6E73026E062011224704B14330332D57AB7ACAF62B7288F4547FD1833F2B8B2235A6EA5A77FC850F3AD
31,579,273 UART: [art] SIG.S = 42065B73E3781202CE94009AAE00CFE43EE22BEEAB31939D3DA69730CF4F2261365ACF6A5A560EE1B80DF7AE36CDA71E
32,884,812 UART: Caliptra RT
32,885,524 UART: [state] CFI Enabled
33,019,656 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,130,304 ready_for_fw is high
4,130,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,262 >>> mbox cmd response: success
23,800,555 UART:
23,800,958 UART: Running Caliptra FMC ...
23,802,261 UART:
23,802,431 UART: [state] CFI Enabled
23,810,211 UART: [fht] FMC Alias Private Key: 7
26,150,172 UART: [art] Extend RT PCRs Done
26,151,402 UART: [art] Lock RT PCRs Done
26,152,751 UART: [art] Populate DV Done
26,158,173 UART: [fht] FMC Alias Private Key: 7
26,159,871 UART: [art] Derive CDI
26,160,679 UART: [art] Store in slot 0x4
26,203,341 UART: [art] Derive Key Pair
26,204,383 UART: [art] Store priv key in slot 0x5
29,446,618 UART: [art] Derive Key Pair - Done
29,459,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,202 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,708 UART: [art] PUB.X = 3A770E69935967366583B0ABA3DE214D3C141B118BE865253957FBB751F9847AA59FFD07DDEF8A96F1AC78DE13AE5071
31,749,015 UART: [art] PUB.Y = 7A41A40470DE77D3A5426898B47FFA738639B4C09A16C3FA31E08C58D2D4DC09B6090F28F7FB885794844024E2D77E73
31,756,210 UART: [art] SIG.R = 988DC9E2D0799909D961C1599465C8CF9CC5B5088B77B8B8AAA9FF4CF6E4BBA87357C4A722E1E94170DA51687B84332B
31,763,606 UART: [art] SIG.S = D7FFE371EF4B7BC78BC67A6A91D69E2FE5E54F15C9847311DBDB06B61AEB5F6B043D8AE797C252FC20018810405F233F
33,068,737 UART: Caliptra RT
33,069,448 UART: [state] CFI Enabled
33,203,147 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,069 UART:
192,435 UART: Running Caliptra ROM ...
193,641 UART:
193,794 UART: [state] CFI Enabled
263,563 UART: [state] LifecycleState = Unprovisioned
265,472 UART: [state] DebugLocked = No
267,646 UART: [state] WD Timer not started. Device not locked for debugging
272,248 UART: [kat] SHA2-256
451,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,706 UART: [kat] ++
463,177 UART: [kat] sha1
473,939 UART: [kat] SHA2-256
476,661 UART: [kat] SHA2-384
482,657 UART: [kat] SHA2-512-ACC
485,018 UART: [kat] ECC-384
2,945,740 UART: [kat] HMAC-384Kdf
2,968,921 UART: [kat] LMS
3,445,412 UART: [kat] --
3,447,535 UART: [cold-reset] ++
3,448,573 UART: [fht] FHT @ 0x50003400
3,459,558 UART: [idev] ++
3,460,128 UART: [idev] CDI.KEYID = 6
3,461,156 UART: [idev] SUBJECT.KEYID = 7
3,462,329 UART: [idev] UDS.KEYID = 0
3,463,245 ready_for_fw is high
3,463,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,612,635 UART: [idev] Erasing UDS.KEYID = 0
5,988,196 UART: [idev] Sha1 KeyId Algorithm
6,011,128 UART: [idev] --
6,015,995 UART: [ldev] ++
6,016,573 UART: [ldev] CDI.KEYID = 6
6,017,483 UART: [ldev] SUBJECT.KEYID = 5
6,018,696 UART: [ldev] AUTHORITY.KEYID = 7
6,019,977 UART: [ldev] FE.KEYID = 1
6,054,500 UART: [ldev] Erasing FE.KEYID = 1
8,562,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,958 UART: [ldev] --
10,370,644 UART: [fwproc] Wait for Commands...
10,373,112 UART: [fwproc] Recv command 0x46574c44
10,375,089 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,705 >>> mbox cmd response: success
14,339,897 UART: [afmc] ++
14,340,507 UART: [afmc] CDI.KEYID = 6
14,341,473 UART: [afmc] SUBJECT.KEYID = 7
14,342,683 UART: [afmc] AUTHORITY.KEYID = 5
16,871,384 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,613,246 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,631,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,647,283 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,662,836 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,802 UART: [afmc] --
18,692,885 UART: [cold-reset] --
18,696,709 UART: [state] Locking Datavault
18,701,686 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,442 UART: [state] Locking ICCM
18,706,273 UART: [exit] Launching FMC @ 0x40000130
18,714,698 UART:
18,714,936 UART: Running Caliptra FMC ...
18,716,032 UART:
18,716,194 UART: [state] CFI Enabled
18,770,442 UART: [fht] FMC Alias Private Key: 7
20,557,890 UART: [art] Extend RT PCRs Done
20,559,108 UART: [art] Lock RT PCRs Done
20,560,748 UART: [art] Populate DV Done
20,566,155 UART: [fht] FMC Alias Private Key: 7
20,567,740 UART: [art] Derive CDI
20,568,471 UART: [art] Store in slot 0x4
20,625,830 UART: [art] Derive Key Pair
20,626,889 UART: [art] Store priv key in slot 0x5
23,089,447 UART: [art] Derive Key Pair - Done
23,102,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,466 UART: [art] PUB.X = DA7106FD4EB8DDC2E1DCDFB19FB2AC4CD3583D042B919277578CBB81DA08235ACBC6F08C4A7F4A7428524C6114D77213
24,823,776 UART: [art] PUB.Y = 1BD69E9AE9C2CD4FD149B81AEE5A23D278C935E204C5CA680909675881E6F39562F6DFD684AFAD169163CB268070FB0E
24,831,016 UART: [art] SIG.R = E5500082222CF8E685E7A6466E73AE4E439453F77D706D3402C00F8C1B72E5CFB4C4051B7A4DC7D72DFDC1AA6B0E4963
24,838,412 UART: [art] SIG.S = FDB96420E7714D0B9159D71C8FA51B860338F01423BDF0D8C148254C03690779C30DFDE20D02172FBC02BFAB3BC28922
25,817,524 UART: Caliptra RT
25,818,238 UART: [state] CFI Enabled
25,998,432 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,460,076 ready_for_fw is high
3,460,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,240 >>> mbox cmd response: success
18,536,620 UART:
18,537,005 UART: Running Caliptra FMC ...
18,538,113 UART:
18,538,262 UART: [state] CFI Enabled
18,601,345 UART: [fht] FMC Alias Private Key: 7
20,367,503 UART: [art] Extend RT PCRs Done
20,368,731 UART: [art] Lock RT PCRs Done
20,370,111 UART: [art] Populate DV Done
20,375,368 UART: [fht] FMC Alias Private Key: 7
20,376,956 UART: [art] Derive CDI
20,377,704 UART: [art] Store in slot 0x4
20,433,669 UART: [art] Derive Key Pair
20,434,711 UART: [art] Store priv key in slot 0x5
22,897,724 UART: [art] Derive Key Pair - Done
22,910,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,087 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,604 UART: [art] PUB.X = DA264AEA0C9912A11583141C0E6503981A703C804B121B60A3EEC11E9DE7773E1A7899C6A0D1C8ED3A6CF23D95E5F5F0
24,631,911 UART: [art] PUB.Y = B1A63FD1BB4FD942193E4BE90EEE0F22D93F4619D01CD7C5580E754ED0EEA7FB318452A0CE5D380CA8BC9C7EAFB80B37
24,639,148 UART: [art] SIG.R = C2B2EDB0CCA2F83FF336D5C238489C13EDDE90A38A472ACD176CCABEA7C2D5CD4DCDF53ABDB82DE47FA18FBCB89ABD7F
24,646,581 UART: [art] SIG.S = 437DBF6FF82D94BCC10A576C0721C133CC00B9C2F49D654DE6C465F1C7E2867B643160F3457023EEB19A1A4E5DEE304A
25,625,079 UART: Caliptra RT
25,625,802 UART: [state] CFI Enabled
25,806,441 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
12,629 writing to cptra_bootfsm_go
201,776 UART:
202,153 UART: Running Caliptra ROM ...
203,373 UART:
613,049 UART: [state] CFI Enabled
627,614 UART: [state] LifecycleState = Unprovisioned
629,501 UART: [state] DebugLocked = No
632,358 UART: [state] WD Timer not started. Device not locked for debugging
635,847 UART: [kat] SHA2-256
815,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
826,248 UART: [kat] ++
826,733 UART: [kat] sha1
837,822 UART: [kat] SHA2-256
840,481 UART: [kat] SHA2-384
845,904 UART: [kat] SHA2-512-ACC
848,276 UART: [kat] ECC-384
3,289,342 UART: [kat] HMAC-384Kdf
3,301,150 UART: [kat] LMS
3,777,638 UART: [kat] --
3,781,422 UART: [cold-reset] ++
3,782,571 UART: [fht] FHT @ 0x50003400
3,794,850 UART: [idev] ++
3,795,429 UART: [idev] CDI.KEYID = 6
3,796,415 UART: [idev] SUBJECT.KEYID = 7
3,797,594 UART: [idev] UDS.KEYID = 0
3,798,594 ready_for_fw is high
3,798,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,698 UART: [idev] Erasing UDS.KEYID = 0
6,275,792 UART: [idev] Sha1 KeyId Algorithm
6,298,905 UART: [idev] --
6,302,793 UART: [ldev] ++
6,303,364 UART: [ldev] CDI.KEYID = 6
6,304,277 UART: [ldev] SUBJECT.KEYID = 5
6,305,492 UART: [ldev] AUTHORITY.KEYID = 7
6,306,725 UART: [ldev] FE.KEYID = 1
6,319,660 UART: [ldev] Erasing FE.KEYID = 1
8,797,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,560 UART: [ldev] --
10,590,689 UART: [fwproc] Wait for Commands...
10,593,001 UART: [fwproc] Recv command 0x46574c44
10,594,992 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,258 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,181 >>> mbox cmd response: success
14,558,698 UART: [afmc] ++
14,559,312 UART: [afmc] CDI.KEYID = 6
14,560,197 UART: [afmc] SUBJECT.KEYID = 7
14,561,417 UART: [afmc] AUTHORITY.KEYID = 5
17,066,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,820 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,411 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,372 UART: [afmc] --
18,867,433 UART: [cold-reset] --
18,872,230 UART: [state] Locking Datavault
18,877,680 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,386 UART: [state] Locking ICCM
18,881,058 UART: [exit] Launching FMC @ 0x40000130
18,889,513 UART:
18,889,752 UART: Running Caliptra FMC ...
18,890,857 UART:
18,891,018 UART: [state] CFI Enabled
18,899,041 UART: [fht] FMC Alias Private Key: 7
20,664,990 UART: [art] Extend RT PCRs Done
20,666,217 UART: [art] Lock RT PCRs Done
20,667,601 UART: [art] Populate DV Done
20,673,286 UART: [fht] FMC Alias Private Key: 7
20,674,943 UART: [art] Derive CDI
20,675,683 UART: [art] Store in slot 0x4
20,718,279 UART: [art] Derive Key Pair
20,719,319 UART: [art] Store priv key in slot 0x5
23,146,225 UART: [art] Derive Key Pair - Done
23,158,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,246 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,753 UART: [art] PUB.X = 49D746857680656491AFDFDB135AD90F06FD88082969ED643C4B8E65BD714BE68B707B13FCB24E0CC62487B6656E6A3C
24,874,073 UART: [art] PUB.Y = 574921637E7A7F99E78AA1F5D656898AFB07B226B2373EBE5322EA727E80CB43437106FC2F9C2A9117DD3EBF53A46A4E
24,881,322 UART: [art] SIG.R = D96E1E92F74DFB9BA16E5F016EB05C2EDDB019E97D4B2DE12A7801D8EE6F82152911BCDEE20D329E67DE637915B02257
24,888,726 UART: [art] SIG.S = EF501FF3FB655CF9C6E7D54EF6E0879B70069FDE35482218860415A38F11EFBC944D9CA2705E52E9FF79199951A4DE6A
25,867,131 UART: Caliptra RT
25,867,831 UART: [state] CFI Enabled
25,999,933 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
3,775,824 ready_for_fw is high
3,776,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,233 >>> mbox cmd response: success
18,694,677 UART:
18,695,092 UART: Running Caliptra FMC ...
18,696,223 UART:
18,696,376 UART: [state] CFI Enabled
18,704,412 UART: [fht] FMC Alias Private Key: 7
20,469,975 UART: [art] Extend RT PCRs Done
20,471,191 UART: [art] Lock RT PCRs Done
20,472,845 UART: [art] Populate DV Done
20,478,098 UART: [fht] FMC Alias Private Key: 7
20,479,625 UART: [art] Derive CDI
20,480,365 UART: [art] Store in slot 0x4
20,522,926 UART: [art] Derive Key Pair
20,523,970 UART: [art] Store priv key in slot 0x5
22,950,849 UART: [art] Derive Key Pair - Done
22,963,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,669,788 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,287 UART: [art] PUB.X = F30AFE48D1A140D5A427DB478F6ABF631E39DA6B4F4CBB80E4231F5E7291F7B6EE96BF2E6CC6BB2DB5E0204006823CF5
24,678,603 UART: [art] PUB.Y = 6AB5E4A170D8E358C11521AC6268EB0B6CDFE81848D2F0C1C4A50963154E2972ADD6C0F6BB77E20E0E0984B119CA1998
24,685,809 UART: [art] SIG.R = F2DCB73D9E534E07FBC72B34CFF596DD6B71EF66D0A5817BBD260D48977D4721C3AE7498E1952401D32094E58E41F515
24,693,233 UART: [art] SIG.S = 5D012C613385D319B9474ECFB3C405B75C7A6C55FB79594E7B23624E21619B80E4C47EEF553F28512A1AE338B1B5EEF8
25,672,253 UART: Caliptra RT
25,672,960 UART: [state] CFI Enabled
25,805,855 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,055 UART:
192,432 UART: Running Caliptra ROM ...
193,524 UART:
193,666 UART: [state] CFI Enabled
262,230 UART: [state] LifecycleState = Unprovisioned
264,650 UART: [state] DebugLocked = No
267,108 UART: [state] WD Timer not started. Device not locked for debugging
272,074 UART: [kat] SHA2-256
461,945 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,708 UART: [kat] ++
473,194 UART: [kat] sha1
485,060 UART: [kat] SHA2-256
488,076 UART: [kat] SHA2-384
494,211 UART: [kat] SHA2-512-ACC
496,791 UART: [kat] ECC-384
2,950,003 UART: [kat] HMAC-384Kdf
2,971,120 UART: [kat] LMS
3,502,937 UART: [kat] --
3,508,707 UART: [cold-reset] ++
3,510,850 UART: [fht] FHT @ 0x50003400
3,522,245 UART: [idev] ++
3,522,955 UART: [idev] CDI.KEYID = 6
3,523,935 UART: [idev] SUBJECT.KEYID = 7
3,525,048 UART: [idev] UDS.KEYID = 0
3,526,095 ready_for_fw is high
3,526,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,378 UART: [idev] Erasing UDS.KEYID = 0
6,029,842 UART: [idev] Sha1 KeyId Algorithm
6,053,401 UART: [idev] --
6,058,453 UART: [ldev] ++
6,059,135 UART: [ldev] CDI.KEYID = 6
6,060,024 UART: [ldev] SUBJECT.KEYID = 5
6,061,237 UART: [ldev] AUTHORITY.KEYID = 7
6,062,413 UART: [ldev] FE.KEYID = 1
6,099,174 UART: [ldev] Erasing FE.KEYID = 1
8,605,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,030 UART: [ldev] --
10,411,612 UART: [fwproc] Wait for Commands...
10,414,624 UART: [fwproc] Recv command 0x46574c44
10,416,871 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,922 >>> mbox cmd response: success
14,674,581 UART: [afmc] ++
14,675,289 UART: [afmc] CDI.KEYID = 6
14,676,390 UART: [afmc] SUBJECT.KEYID = 7
14,677,921 UART: [afmc] AUTHORITY.KEYID = 5
17,213,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,049 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,229 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,764 UART: [afmc] --
19,012,526 UART: [cold-reset] --
19,014,322 UART: [state] Locking Datavault
19,020,874 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,005 UART: [state] Locking ICCM
19,025,102 UART: [exit] Launching FMC @ 0x40000130
19,033,769 UART:
19,034,002 UART: Running Caliptra FMC ...
19,035,104 UART:
19,035,264 UART: [state] CFI Enabled
19,093,724 UART: [fht] FMC Alias Private Key: 7
20,860,167 UART: [art] Extend RT PCRs Done
20,861,389 UART: [art] Lock RT PCRs Done
20,863,143 UART: [art] Populate DV Done
20,868,552 UART: [fht] FMC Alias Private Key: 7
20,870,050 UART: [art] Derive CDI
20,870,784 UART: [art] Store in slot 0x4
20,926,407 UART: [art] Derive Key Pair
20,927,403 UART: [art] Store priv key in slot 0x5
23,390,330 UART: [art] Derive Key Pair - Done
23,403,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,211 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,720 UART: [art] PUB.X = E15DD5B4A2856D971C931B8C358684E2B1DA988BAC18B694AEA53480EAD3A8D2D964D4CCF61BE7812E9E9985DA3E661C
25,123,971 UART: [art] PUB.Y = 393BBAB25379A9A141897F1D4C5F4BC11A007F69AABC6939DE6D4928EF7AC45C772A733A1212BF0BAABFA6762066A806
25,131,205 UART: [art] SIG.R = 5512DEBD66CE7812080496A6FC3C65F8FAC8C113E41B745074FE948F83305CD011697A27F0FAB543B7CB3A4200BF7CBB
25,138,595 UART: [art] SIG.S = 2479E4E9C7EC6CBFE93C486D0F3B6BCF65B590CCDB7C10DF89E642C34F86AA44382A3874CE95EA77A567029FFFE03E35
26,117,089 UART: Caliptra RT
26,117,801 UART: [state] CFI Enabled
26,298,577 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,438,449 ready_for_fw is high
3,438,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,738 >>> mbox cmd response: success
19,106,856 UART:
19,107,227 UART: Running Caliptra FMC ...
19,108,326 UART:
19,108,498 UART: [state] CFI Enabled
19,176,762 UART: [fht] FMC Alias Private Key: 7
20,942,882 UART: [art] Extend RT PCRs Done
20,944,101 UART: [art] Lock RT PCRs Done
20,945,629 UART: [art] Populate DV Done
20,950,894 UART: [fht] FMC Alias Private Key: 7
20,952,485 UART: [art] Derive CDI
20,953,301 UART: [art] Store in slot 0x4
21,009,968 UART: [art] Derive Key Pair
21,011,015 UART: [art] Store priv key in slot 0x5
23,474,405 UART: [art] Derive Key Pair - Done
23,487,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,944 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,450 UART: [art] PUB.X = 060DC3A6B9248811208BDA30B311EC49BB627976CC7EE4331E27E8767BA328FD24F624E94433A9E9A9D1D44D580FEA35
25,208,705 UART: [art] PUB.Y = 7CE93974B00CA5F084D790C6A8A2D7BEB83ED14F764C3BCF49B3970261AB439A02C47D6B46B85F88FBE6CECD5C92A52F
25,215,951 UART: [art] SIG.R = BA57A9FD2D7BE5C20BC5D85261530844AC1CB9411A47679966C549E2006D2A120D44371901C871313D6B762A4EE3977F
25,223,361 UART: [art] SIG.S = 76010B377ACA1298DAE37607E203CBC58B78CFC26753A4E4C3868B2706506BF5A3A650E9BC4B7E39BC3A76D7ED6EAB92
26,202,624 UART: Caliptra RT
26,203,318 UART: [state] CFI Enabled
26,384,309 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,288 UART:
192,660 UART: Running Caliptra ROM ...
193,878 UART:
603,550 UART: [state] CFI Enabled
617,434 UART: [state] LifecycleState = Unprovisioned
619,844 UART: [state] DebugLocked = No
621,085 UART: [state] WD Timer not started. Device not locked for debugging
625,294 UART: [kat] SHA2-256
815,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,996 UART: [kat] ++
826,521 UART: [kat] sha1
838,887 UART: [kat] SHA2-256
841,902 UART: [kat] SHA2-384
849,110 UART: [kat] SHA2-512-ACC
851,720 UART: [kat] ECC-384
3,294,533 UART: [kat] HMAC-384Kdf
3,306,835 UART: [kat] LMS
3,838,635 UART: [kat] --
3,845,135 UART: [cold-reset] ++
3,846,572 UART: [fht] FHT @ 0x50003400
3,857,553 UART: [idev] ++
3,858,201 UART: [idev] CDI.KEYID = 6
3,859,236 UART: [idev] SUBJECT.KEYID = 7
3,860,343 UART: [idev] UDS.KEYID = 0
3,861,276 ready_for_fw is high
3,861,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,727 UART: [idev] Erasing UDS.KEYID = 0
6,335,683 UART: [idev] Sha1 KeyId Algorithm
6,357,082 UART: [idev] --
6,361,362 UART: [ldev] ++
6,362,044 UART: [ldev] CDI.KEYID = 6
6,362,963 UART: [ldev] SUBJECT.KEYID = 5
6,364,175 UART: [ldev] AUTHORITY.KEYID = 7
6,365,352 UART: [ldev] FE.KEYID = 1
6,377,085 UART: [ldev] Erasing FE.KEYID = 1
8,854,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,184 UART: [ldev] --
10,645,529 UART: [fwproc] Wait for Commands...
10,647,456 UART: [fwproc] Recv command 0x46574c44
10,649,710 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,164 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,459 >>> mbox cmd response: success
14,910,760 UART: [afmc] ++
14,911,482 UART: [afmc] CDI.KEYID = 6
14,912,619 UART: [afmc] SUBJECT.KEYID = 7
14,914,113 UART: [afmc] AUTHORITY.KEYID = 5
17,417,677 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,938 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,112 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,987 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,868 UART: [afmc] --
19,215,521 UART: [cold-reset] --
19,219,924 UART: [state] Locking Datavault
19,226,910 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,062 UART: [state] Locking ICCM
19,230,984 UART: [exit] Launching FMC @ 0x40000130
19,239,660 UART:
19,239,894 UART: Running Caliptra FMC ...
19,240,942 UART:
19,241,095 UART: [state] CFI Enabled
19,249,418 UART: [fht] FMC Alias Private Key: 7
21,015,657 UART: [art] Extend RT PCRs Done
21,016,884 UART: [art] Lock RT PCRs Done
21,018,716 UART: [art] Populate DV Done
21,024,133 UART: [fht] FMC Alias Private Key: 7
21,025,674 UART: [art] Derive CDI
21,026,413 UART: [art] Store in slot 0x4
21,069,171 UART: [art] Derive Key Pair
21,070,175 UART: [art] Store priv key in slot 0x5
23,497,257 UART: [art] Derive Key Pair - Done
23,510,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,584 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,094 UART: [art] PUB.X = 08E95B9CB3FBF2EF41200D6993EBB74618C86B9812D0D52EFC62AC120A315EBA0D846CB13FDEB49F20ABCB6F7667FD56
25,225,433 UART: [art] PUB.Y = BE74097A03B120E0BB4A5E01104BB0BED661C9FB5C412AA42B3CE81A02C6FD2210AD5458F356BF6443403C8B173E8025
25,232,697 UART: [art] SIG.R = C3E6BE7515C94ED66F878564F9C60A6BADDAC17BB46067A12447667AE9DE12E57144606248DCBAFDCC0E945A1ABC47B1
25,240,063 UART: [art] SIG.S = C41B9DE0E70D115D05BF9FC97A84B42F6674DE084A79DCAE96E401D2EC6A91203B07897A61FF8184D83264948E9E8B64
26,218,750 UART: Caliptra RT
26,219,446 UART: [state] CFI Enabled
26,352,328 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,755,359 ready_for_fw is high
3,755,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,656 >>> mbox cmd response: success
19,309,045 UART:
19,309,473 UART: Running Caliptra FMC ...
19,310,682 UART:
19,310,859 UART: [state] CFI Enabled
19,318,874 UART: [fht] FMC Alias Private Key: 7
21,085,006 UART: [art] Extend RT PCRs Done
21,086,243 UART: [art] Lock RT PCRs Done
21,087,665 UART: [art] Populate DV Done
21,093,258 UART: [fht] FMC Alias Private Key: 7
21,094,857 UART: [art] Derive CDI
21,095,678 UART: [art] Store in slot 0x4
21,138,389 UART: [art] Derive Key Pair
21,139,433 UART: [art] Store priv key in slot 0x5
23,566,140 UART: [art] Derive Key Pair - Done
23,579,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,247 UART: [art] PUB.X = 1A48F4526CE08CD5773CA8F3B26EFEEB19CA9C848E49400466D18A5174B8089FC397DDF0259CCEA51DD14E7C94B2064F
25,294,550 UART: [art] PUB.Y = DE8A5851D7360079045838FFE143C887A25B2F4F45103AEDD8EB61FA96CE2E13D2A2FB4CBB526C37A9C10B3392FE46C3
25,301,795 UART: [art] SIG.R = D1449C7D3FC71CDF8B4230EB64B802622F98B5DA55E8BE8D99D5AF0FEF31DF017D5DCDA8C1C3EB50344A18609EACDAD6
25,309,211 UART: [art] SIG.S = 09ECB0AAF7165719F156FA4AC08A0D9AD0007BB2DA349B853060974CAF810326BB9A4CFF34C3102248D54D712154BF16
26,288,536 UART: Caliptra RT
26,289,250 UART: [state] CFI Enabled
26,422,100 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,527 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
902,980 UART: [kat] HMAC-384Kdf
907,596 UART: [kat] LMS
1,475,792 UART: [kat] --
1,476,649 UART: [cold-reset] ++
1,477,169 UART: [fht] Storing FHT @ 0x50003400
1,479,868 UART: [idev] ++
1,480,036 UART: [idev] CDI.KEYID = 6
1,480,396 UART: [idev] SUBJECT.KEYID = 7
1,480,820 UART: [idev] UDS.KEYID = 0
1,481,165 ready_for_fw is high
1,481,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,076 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,816 UART: [idev] --
1,514,687 UART: [ldev] ++
1,514,855 UART: [ldev] CDI.KEYID = 6
1,515,218 UART: [ldev] SUBJECT.KEYID = 5
1,515,644 UART: [ldev] AUTHORITY.KEYID = 7
1,516,107 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,314 UART: [ldev] --
1,585,693 UART: [fwproc] Waiting for Commands...
1,586,322 UART: [fwproc] Received command 0x46574c44
1,587,113 UART: [fwproc] Received Image of size 118548 bytes
2,932,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,439 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,980 >>> mbox cmd response: success
3,132,034 UART: [afmc] ++
3,132,202 UART: [afmc] CDI.KEYID = 6
3,132,564 UART: [afmc] SUBJECT.KEYID = 7
3,132,989 UART: [afmc] AUTHORITY.KEYID = 5
3,168,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,514 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,197 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,109 UART: [afmc] --
3,211,111 UART: [cold-reset] --
3,212,115 UART: [state] Locking Datavault
3,213,174 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,778 UART: [state] Locking ICCM
3,214,198 UART: [exit] Launching FMC @ 0x40000130
3,219,528 UART:
3,219,544 UART: Running Caliptra FMC ...
3,219,952 UART:
3,220,006 UART: [state] CFI Enabled
3,230,594 UART: [fht] FMC Alias Private Key: 7
3,349,852 UART: [art] Extend RT PCRs Done
3,350,280 UART: [art] Lock RT PCRs Done
3,351,692 UART: [art] Populate DV Done
3,360,055 UART: [fht] FMC Alias Private Key: 7
3,361,089 UART: [art] Derive CDI
3,361,369 UART: [art] Store in slot 0x4
3,447,459 UART: [art] Derive Key Pair
3,447,819 UART: [art] Store priv key in slot 0x5
3,460,818 UART: [art] Derive Key Pair - Done
3,475,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,918 UART: [art] PUB.X = A8114B63F4BCC10A86D0B7821173AC04725C6421E5DCB857382213043DBF2B414482F44AD9AF915C8D137DE86DF63EE7
3,498,683 UART: [art] PUB.Y = 0A4F399977A14D2E0A9363835DD4045CA2FC6F27C1C6D57F751FC99652E18A269CAAA1ED82E0720954AE9F662CC3B1C7
3,505,629 UART: [art] SIG.R = C53428B449BFA5CBA679AE6E2FA1FA5CB4338C75B72122494BBF1D6EC800C10DDDDBEECBD594B1A0B2318DF87F6A0C2B
3,512,399 UART: [art] SIG.S = 000FBBFDA0D0DD1D5411D657F9A4EBC641DEE1188ADE23F4625BA7D8C25A3447C4F0F925E5EDEC6A3EB8C5ED1C0E5ABB
3,536,277 UART: Caliptra RT
3,536,528 UART: [state] CFI Enabled
3,656,482 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,237 ready_for_fw is high
1,362,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,890 >>> mbox cmd response: success
3,042,121 UART:
3,042,137 UART: Running Caliptra FMC ...
3,042,545 UART:
3,042,599 UART: [state] CFI Enabled
3,053,029 UART: [fht] FMC Alias Private Key: 7
3,171,885 UART: [art] Extend RT PCRs Done
3,172,313 UART: [art] Lock RT PCRs Done
3,174,035 UART: [art] Populate DV Done
3,182,242 UART: [fht] FMC Alias Private Key: 7
3,183,348 UART: [art] Derive CDI
3,183,628 UART: [art] Store in slot 0x4
3,269,678 UART: [art] Derive Key Pair
3,270,038 UART: [art] Store priv key in slot 0x5
3,283,303 UART: [art] Derive Key Pair - Done
3,298,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,250 UART: [art] PUB.X = 8BFCEA61A83F14BB26DB2BC432BB0057E01BBF6A86F71FAB2399221E1849F1E6294E0B4ADD60F15B689BD565C5E53DB3
3,321,013 UART: [art] PUB.Y = AE8B24C5201276E18C897DAFABF1C742CCE1809EAA5A9439C167E3035922C83AF302FD49800493DBE5BFEEA11AC8DEF8
3,327,972 UART: [art] SIG.R = 0DE5610FB950A7C14229E66FBDCD16BF05C98937B1AAF569838A328A9A23F8A47AE00B9BDACC93FED0F888858D4C11A5
3,334,746 UART: [art] SIG.S = 0D59574646FFDDC50C0236475BF644D0E790CD9498D8018380E41C03A8D8F945891AB586C31B57D6F5DE886B0864967F
3,358,884 UART: Caliptra RT
3,359,135 UART: [state] CFI Enabled
3,479,550 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,649 UART: [state] LifecycleState = Unprovisioned
86,304 UART: [state] DebugLocked = No
86,916 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,542 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,837 UART: [idev] ++
1,480,005 UART: [idev] CDI.KEYID = 6
1,480,365 UART: [idev] SUBJECT.KEYID = 7
1,480,789 UART: [idev] UDS.KEYID = 0
1,481,134 ready_for_fw is high
1,481,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,999 UART: [idev] Erasing UDS.KEYID = 0
1,506,033 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,855 UART: [idev] --
1,515,910 UART: [ldev] ++
1,516,078 UART: [ldev] CDI.KEYID = 6
1,516,441 UART: [ldev] SUBJECT.KEYID = 5
1,516,867 UART: [ldev] AUTHORITY.KEYID = 7
1,517,330 UART: [ldev] FE.KEYID = 1
1,522,592 UART: [ldev] Erasing FE.KEYID = 1
1,547,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,671 UART: [ldev] --
1,587,048 UART: [fwproc] Waiting for Commands...
1,587,771 UART: [fwproc] Received command 0x46574c44
1,588,562 UART: [fwproc] Received Image of size 118548 bytes
2,932,566 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,416 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,829 >>> mbox cmd response: success
3,133,077 UART: [afmc] ++
3,133,245 UART: [afmc] CDI.KEYID = 6
3,133,607 UART: [afmc] SUBJECT.KEYID = 7
3,134,032 UART: [afmc] AUTHORITY.KEYID = 5
3,169,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,767 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,139 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,822 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,700 UART: [afmc] --
3,212,746 UART: [cold-reset] --
3,213,490 UART: [state] Locking Datavault
3,214,773 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,377 UART: [state] Locking ICCM
3,216,029 UART: [exit] Launching FMC @ 0x40000130
3,221,359 UART:
3,221,375 UART: Running Caliptra FMC ...
3,221,783 UART:
3,221,926 UART: [state] CFI Enabled
3,232,604 UART: [fht] FMC Alias Private Key: 7
3,351,598 UART: [art] Extend RT PCRs Done
3,352,026 UART: [art] Lock RT PCRs Done
3,353,684 UART: [art] Populate DV Done
3,361,649 UART: [fht] FMC Alias Private Key: 7
3,362,671 UART: [art] Derive CDI
3,362,951 UART: [art] Store in slot 0x4
3,448,635 UART: [art] Derive Key Pair
3,448,995 UART: [art] Store priv key in slot 0x5
3,462,254 UART: [art] Derive Key Pair - Done
3,477,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,553 UART: [art] PUB.X = 6EDF8340B3D0FD9AA4B9F174F9B84D3602899CB26645D0AAA9E6B842F36BD5078034CD105FAABB7795B7A5D4C417843E
3,500,329 UART: [art] PUB.Y = AE970A2A81472A01F2D35A377E6327A0A8F23879907D956140DFAE24EAB48EFA765F27E653FD4DDD118A74D4D6AF347B
3,507,283 UART: [art] SIG.R = 9453FF1397E062C12EC61C785E3AF960300EA680D9F8FA42E581BBAC4D874A4382E6542DF215EE490D2E15DD662943C2
3,514,051 UART: [art] SIG.S = AF9CB6C6967DAB91E4B45AD6539B278B4A063736825831990D5EE558E3916C2F6C26D484528CA5B266586BF543D2FB46
3,537,577 UART: Caliptra RT
3,537,920 UART: [state] CFI Enabled
3,657,653 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,646 ready_for_fw is high
1,362,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,941 >>> mbox cmd response: success
3,042,742 UART:
3,042,758 UART: Running Caliptra FMC ...
3,043,166 UART:
3,043,309 UART: [state] CFI Enabled
3,053,833 UART: [fht] FMC Alias Private Key: 7
3,172,729 UART: [art] Extend RT PCRs Done
3,173,157 UART: [art] Lock RT PCRs Done
3,174,789 UART: [art] Populate DV Done
3,182,982 UART: [fht] FMC Alias Private Key: 7
3,183,960 UART: [art] Derive CDI
3,184,240 UART: [art] Store in slot 0x4
3,269,526 UART: [art] Derive Key Pair
3,269,886 UART: [art] Store priv key in slot 0x5
3,283,379 UART: [art] Derive Key Pair - Done
3,298,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,450 UART: [art] PUB.X = 3D4192A7007B2B6D2213D0A556217D7AA789779EF6955A4F30C12749061F858DDBA127588CA69F2AE360198814651F0C
3,321,184 UART: [art] PUB.Y = 9AFC45CA2D815699AC3BB7835AA9AA9E6D512FFFFABD40D5B916FBF9A0FD745013A392B34C954976E35D38E63C78B0E2
3,328,152 UART: [art] SIG.R = 5E4AFBBE27CA34E961A6B4AFACE4F40BA6B49347AB14C34C672514A11215150626009DA8AE6291213B7C58D2180CC91D
3,334,899 UART: [art] SIG.S = 7437656E2068CD1C61599F7A06E5F6A9D3F991ED667043731C9AE6118C74106E4791769AB8A766F794C58BCF34FF0505
3,358,646 UART: Caliptra RT
3,358,989 UART: [state] CFI Enabled
3,478,890 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,667 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
899,836 UART: [kat] SHA2-256
901,776 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
915,823 UART: [kat] HMAC-384Kdf
920,551 UART: [kat] LMS
1,168,863 UART: [kat] --
1,169,838 UART: [cold-reset] ++
1,170,276 UART: [fht] FHT @ 0x50003400
1,172,940 UART: [idev] ++
1,173,108 UART: [idev] CDI.KEYID = 6
1,173,469 UART: [idev] SUBJECT.KEYID = 7
1,173,894 UART: [idev] UDS.KEYID = 0
1,174,240 ready_for_fw is high
1,174,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,723 UART: [idev] Erasing UDS.KEYID = 0
1,198,581 UART: [idev] Sha1 KeyId Algorithm
1,207,507 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,806 UART: [ldev] --
1,281,193 UART: [fwproc] Wait for Commands...
1,281,798 UART: [fwproc] Recv command 0x46574c44
1,282,531 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,101 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,276 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,653 >>> mbox cmd response: success
2,828,789 UART: [afmc] ++
2,828,957 UART: [afmc] CDI.KEYID = 6
2,829,320 UART: [afmc] SUBJECT.KEYID = 7
2,829,746 UART: [afmc] AUTHORITY.KEYID = 5
2,865,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,651 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,532 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,233 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,874 UART: [afmc] --
2,908,821 UART: [cold-reset] --
2,909,695 UART: [state] Locking Datavault
2,910,750 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,354 UART: [state] Locking ICCM
2,911,798 UART: [exit] Launching FMC @ 0x40000130
2,917,128 UART:
2,917,144 UART: Running Caliptra FMC ...
2,917,552 UART:
2,917,606 UART: [state] CFI Enabled
2,928,214 UART: [fht] FMC Alias Private Key: 7
3,047,306 UART: [art] Extend RT PCRs Done
3,047,734 UART: [art] Lock RT PCRs Done
3,049,684 UART: [art] Populate DV Done
3,057,887 UART: [fht] FMC Alias Private Key: 7
3,058,855 UART: [art] Derive CDI
3,059,135 UART: [art] Store in slot 0x4
3,144,708 UART: [art] Derive Key Pair
3,145,068 UART: [art] Store priv key in slot 0x5
3,158,310 UART: [art] Derive Key Pair - Done
3,173,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,638 UART: [art] PUB.X = E04D23CD34DB1FE310399AE2948EBEAD2D4A89F83C0EDF2785A908071A030E4D7A43A2B7E5148CDFE58532BC5D051D8B
3,196,406 UART: [art] PUB.Y = 1538F80A4D5C9463C446D72E24086066F24F642FD769B91C15DBE0AA8689A60DE00D97E8D9DB37638E4F62FCDF3F31B6
3,203,350 UART: [art] SIG.R = A026B9309C5EE068B525B9D37091BB535DBAE6DD5086F8D645297D65A11451D7438CB696A5266C4C350ED2C519D33CE2
3,210,119 UART: [art] SIG.S = F91289F0C97B6A986441E217C7AD8B236293D5100F568DF9DE4D41B9B4A7E189A313C26F712A73575D9F61AEE5E9DC0C
3,233,505 UART: Caliptra RT
3,233,756 UART: [state] CFI Enabled
3,353,586 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,626 ready_for_fw is high
1,058,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,840 >>> mbox cmd response: success
2,739,159 UART:
2,739,175 UART: Running Caliptra FMC ...
2,739,583 UART:
2,739,637 UART: [state] CFI Enabled
2,749,801 UART: [fht] FMC Alias Private Key: 7
2,868,549 UART: [art] Extend RT PCRs Done
2,868,977 UART: [art] Lock RT PCRs Done
2,870,395 UART: [art] Populate DV Done
2,878,660 UART: [fht] FMC Alias Private Key: 7
2,879,696 UART: [art] Derive CDI
2,879,976 UART: [art] Store in slot 0x4
2,965,551 UART: [art] Derive Key Pair
2,965,911 UART: [art] Store priv key in slot 0x5
2,979,269 UART: [art] Derive Key Pair - Done
2,993,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,157 UART: [art] PUB.X = 15F46B4D03C11C2B5FD09B949E6EC66D35C3D6C7ECBFE4AD78B80C0D88AD722767D03FE45335A11D578C431ADE863ADB
3,016,936 UART: [art] PUB.Y = C3E973C34E3F6F683A84F9842F2C762379BF40429DC56A2EE408914AD6A80EFD696BAC4570E5CE9E0CC79ADECFFCC551
3,023,895 UART: [art] SIG.R = B9A2E9096AC29283126CB97E6B2849315C546D1F3B4FC4BFD1820D07C345AF22DA09052FA53294EE2A243D0505D85BBF
3,030,650 UART: [art] SIG.S = EAD5B3E7EC7FEC2FB20EF17BA608B3AE8B27ECD0726A34077FE2DF2C93DE9D0757AE02C488D2BA99E7F633F810C2471E
3,054,457 UART: Caliptra RT
3,054,708 UART: [state] CFI Enabled
3,173,824 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,073 UART: [kat] SHA2-256
891,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,727 UART: [kat] ++
895,879 UART: [kat] sha1
900,105 UART: [kat] SHA2-256
902,045 UART: [kat] SHA2-384
904,842 UART: [kat] SHA2-512-ACC
906,743 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,342 UART: [kat] LMS
1,169,654 UART: [kat] --
1,170,755 UART: [cold-reset] ++
1,171,271 UART: [fht] FHT @ 0x50003400
1,174,051 UART: [idev] ++
1,174,219 UART: [idev] CDI.KEYID = 6
1,174,580 UART: [idev] SUBJECT.KEYID = 7
1,175,005 UART: [idev] UDS.KEYID = 0
1,175,351 ready_for_fw is high
1,175,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,340 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,209,068 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,671 UART: [ldev] SUBJECT.KEYID = 5
1,211,098 UART: [ldev] AUTHORITY.KEYID = 7
1,211,561 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,243,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,057 UART: [ldev] --
1,283,348 UART: [fwproc] Wait for Commands...
1,284,093 UART: [fwproc] Recv command 0x46574c44
1,284,826 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,848 >>> mbox cmd response: success
2,829,108 UART: [afmc] ++
2,829,276 UART: [afmc] CDI.KEYID = 6
2,829,639 UART: [afmc] SUBJECT.KEYID = 7
2,830,065 UART: [afmc] AUTHORITY.KEYID = 5
2,865,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,910 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,202 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,007 UART: [afmc] --
2,908,844 UART: [cold-reset] --
2,909,672 UART: [state] Locking Datavault
2,910,811 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,415 UART: [state] Locking ICCM
2,911,947 UART: [exit] Launching FMC @ 0x40000130
2,917,277 UART:
2,917,293 UART: Running Caliptra FMC ...
2,917,701 UART:
2,917,844 UART: [state] CFI Enabled
2,928,232 UART: [fht] FMC Alias Private Key: 7
3,047,256 UART: [art] Extend RT PCRs Done
3,047,684 UART: [art] Lock RT PCRs Done
3,049,374 UART: [art] Populate DV Done
3,057,479 UART: [fht] FMC Alias Private Key: 7
3,058,413 UART: [art] Derive CDI
3,058,693 UART: [art] Store in slot 0x4
3,144,104 UART: [art] Derive Key Pair
3,144,464 UART: [art] Store priv key in slot 0x5
3,157,232 UART: [art] Derive Key Pair - Done
3,172,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,415 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,180 UART: [art] PUB.X = 6BFDE2F7FD91CC216358595705D2F05314DEE38CC9F6F447E3C5A4D38A1372B21C9616BDCB1EEE48B9D1DFD29D003AC8
3,194,943 UART: [art] PUB.Y = D98599591570BC55EA37C260DBD3148DB10C975C35F97CEB63BDE7DEF8B57D9806D47E1A1B7871DAED63889F49E11C93
3,201,897 UART: [art] SIG.R = 7D06369BEDD72097338BD45635055CABE2A65D6C4AB55FC213E5DE1ED1880B80ECCCCAF5149E3D2B6CEAB1A18F94BBC5
3,208,682 UART: [art] SIG.S = 6C2CF1C50DD592BF3BAE30A550F8E899E72B0713551B5AA9D4D632244C8EFC0D921863AE576BCB3A42420703F6A7C23C
3,232,265 UART: Caliptra RT
3,232,608 UART: [state] CFI Enabled
3,352,252 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,095 ready_for_fw is high
1,060,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,589 >>> mbox cmd response: success
2,743,122 UART:
2,743,138 UART: Running Caliptra FMC ...
2,743,546 UART:
2,743,689 UART: [state] CFI Enabled
2,754,235 UART: [fht] FMC Alias Private Key: 7
2,873,071 UART: [art] Extend RT PCRs Done
2,873,499 UART: [art] Lock RT PCRs Done
2,874,853 UART: [art] Populate DV Done
2,882,732 UART: [fht] FMC Alias Private Key: 7
2,883,676 UART: [art] Derive CDI
2,883,956 UART: [art] Store in slot 0x4
2,969,789 UART: [art] Derive Key Pair
2,970,149 UART: [art] Store priv key in slot 0x5
2,983,607 UART: [art] Derive Key Pair - Done
2,998,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,753 UART: [art] PUB.X = F0DFE448E2095C2F3860FF320E3EE5CEDC059B3B23146E8FC18EEA70AF4B75E5FD5E01C2A5EA6BCF70002B8F17B5D50E
3,021,510 UART: [art] PUB.Y = 13708BDFB4FF7769D2D047F010DD087CA39B3A6C60A14F4D530FB455D7F43A2CD5A659E21BE8396DA100813A5AD75E52
3,028,442 UART: [art] SIG.R = 7912AD5E70B7CEDEB14C45EB2A60A4F8F4937B7D5F836674815063A01B21DCE025633E16D35B318CF6073D1552E0D09B
3,035,213 UART: [art] SIG.S = 5B0E5AF7DEFAF3F97262A5E7069BEA43EAAB5FCC6A87CC38B710A7E4F0297FF0C2E2B16578E5C48D27DC9F11EF755E5F
3,059,749 UART: Caliptra RT
3,060,092 UART: [state] CFI Enabled
3,178,640 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,907 UART: [kat] SHA2-256
903,847 UART: [kat] SHA2-384
906,550 UART: [kat] SHA2-512-ACC
908,451 UART: [kat] ECC-384
918,366 UART: [kat] HMAC-384Kdf
922,978 UART: [kat] LMS
1,171,306 UART: [kat] --
1,172,163 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,172 UART: [idev] ++
1,175,340 UART: [idev] CDI.KEYID = 6
1,175,700 UART: [idev] SUBJECT.KEYID = 7
1,176,124 UART: [idev] UDS.KEYID = 0
1,176,469 ready_for_fw is high
1,176,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,268 UART: [idev] Erasing UDS.KEYID = 0
1,201,329 UART: [idev] Sha1 KeyId Algorithm
1,209,929 UART: [idev] --
1,210,901 UART: [ldev] ++
1,211,069 UART: [ldev] CDI.KEYID = 6
1,211,432 UART: [ldev] SUBJECT.KEYID = 5
1,211,858 UART: [ldev] AUTHORITY.KEYID = 7
1,212,321 UART: [ldev] FE.KEYID = 1
1,217,843 UART: [ldev] Erasing FE.KEYID = 1
1,243,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,132 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,787 UART: [ldev] --
1,283,284 UART: [fwproc] Wait for Commands...
1,283,908 UART: [fwproc] Recv command 0x46574c44
1,284,636 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,040 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,210 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,589 >>> mbox cmd response: success
2,829,741 UART: [afmc] ++
2,829,909 UART: [afmc] CDI.KEYID = 6
2,830,271 UART: [afmc] SUBJECT.KEYID = 7
2,830,696 UART: [afmc] AUTHORITY.KEYID = 5
2,865,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,911 UART: [afmc] --
2,908,841 UART: [cold-reset] --
2,909,803 UART: [state] Locking Datavault
2,911,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,614 UART: [state] Locking ICCM
2,912,088 UART: [exit] Launching FMC @ 0x40000130
2,917,418 UART:
2,917,434 UART: Running Caliptra FMC ...
2,917,842 UART:
2,917,896 UART: [state] CFI Enabled
2,928,654 UART: [fht] FMC Alias Private Key: 7
3,047,798 UART: [art] Extend RT PCRs Done
3,048,226 UART: [art] Lock RT PCRs Done
3,049,956 UART: [art] Populate DV Done
3,058,193 UART: [fht] FMC Alias Private Key: 7
3,059,275 UART: [art] Derive CDI
3,059,555 UART: [art] Store in slot 0x4
3,145,220 UART: [art] Derive Key Pair
3,145,580 UART: [art] Store priv key in slot 0x5
3,158,718 UART: [art] Derive Key Pair - Done
3,173,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,455 UART: [art] PUB.X = 0723072D60C01A0BD01C3E02E761B33C8C0C227CD592A13C05554F5F71FB2FDD4A670394FA11783CC008BFD454807186
3,196,201 UART: [art] PUB.Y = 73F87923EEF7788A789A4468EDA1278C6736D0D989FA2B87253DEFA1256D4E0FDD573AC14EB4B828EB2D72E37315A421
3,203,154 UART: [art] SIG.R = 389A34F934B3BDAC74AAF902195918E2B1FAF52E19091B778D6DEA7E7F5367C6550D48B22680CA543D267D1511A9219C
3,209,917 UART: [art] SIG.S = 887F46DD2E082D3407B24E34E45761ADF7CBE5965BE28AE441FA19762C61AA69697DF97FA49F3354B95EE0E03F06D41A
3,233,888 UART: Caliptra RT
3,234,139 UART: [state] CFI Enabled
3,355,096 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 ready_for_fw is high
1,060,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,452 >>> mbox cmd response: success
2,741,161 UART:
2,741,177 UART: Running Caliptra FMC ...
2,741,585 UART:
2,741,639 UART: [state] CFI Enabled
2,752,197 UART: [fht] FMC Alias Private Key: 7
2,871,425 UART: [art] Extend RT PCRs Done
2,871,853 UART: [art] Lock RT PCRs Done
2,873,213 UART: [art] Populate DV Done
2,881,494 UART: [fht] FMC Alias Private Key: 7
2,882,582 UART: [art] Derive CDI
2,882,862 UART: [art] Store in slot 0x4
2,968,709 UART: [art] Derive Key Pair
2,969,069 UART: [art] Store priv key in slot 0x5
2,982,315 UART: [art] Derive Key Pair - Done
2,997,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,129 UART: [art] PUB.X = 6A4447D664498410F97D1EF298DB0D83B9388EB2733FBF6343F2F26C4488C872AD1F81F42ECF34BBCBFE925FB62FE7D0
3,020,908 UART: [art] PUB.Y = A0826CA045753A4D12D101E0763BE9936850ADDB36ECB4B24BCF87916BC93434829D686546E1F7F32DFED7ABE8E0F7E1
3,027,865 UART: [art] SIG.R = F1CAAF4EB2207C5E0DD809190B639E57A758B50FCB38CD161A4AF89716113A7CDAD17A7647217B01E22F7B1834F9AEEF
3,034,634 UART: [art] SIG.S = D886E85935771C9A57D3412BEE213EBF49995F4466EADF050818BA35837F25246594CFCB1C918A97D56B608ABD9A5981
3,058,304 UART: Caliptra RT
3,058,555 UART: [state] CFI Enabled
3,177,677 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
893,437 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,562 UART: [kat] ++
897,714 UART: [kat] sha1
901,976 UART: [kat] SHA2-256
903,916 UART: [kat] SHA2-384
906,605 UART: [kat] SHA2-512-ACC
908,506 UART: [kat] ECC-384
918,815 UART: [kat] HMAC-384Kdf
923,585 UART: [kat] LMS
1,171,913 UART: [kat] --
1,173,076 UART: [cold-reset] ++
1,173,432 UART: [fht] FHT @ 0x50003400
1,176,039 UART: [idev] ++
1,176,207 UART: [idev] CDI.KEYID = 6
1,176,567 UART: [idev] SUBJECT.KEYID = 7
1,176,991 UART: [idev] UDS.KEYID = 0
1,177,336 ready_for_fw is high
1,177,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,885 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,210,034 UART: [idev] --
1,210,986 UART: [ldev] ++
1,211,154 UART: [ldev] CDI.KEYID = 6
1,211,517 UART: [ldev] SUBJECT.KEYID = 5
1,211,943 UART: [ldev] AUTHORITY.KEYID = 7
1,212,406 UART: [ldev] FE.KEYID = 1
1,217,560 UART: [ldev] Erasing FE.KEYID = 1
1,243,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,018 UART: [ldev] --
1,283,289 UART: [fwproc] Wait for Commands...
1,283,881 UART: [fwproc] Recv command 0x46574c44
1,284,609 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,284 >>> mbox cmd response: success
2,829,464 UART: [afmc] ++
2,829,632 UART: [afmc] CDI.KEYID = 6
2,829,994 UART: [afmc] SUBJECT.KEYID = 7
2,830,419 UART: [afmc] AUTHORITY.KEYID = 5
2,865,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,947 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,648 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,476 UART: [afmc] --
2,909,414 UART: [cold-reset] --
2,910,182 UART: [state] Locking Datavault
2,911,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,117 UART: [state] Locking ICCM
2,912,585 UART: [exit] Launching FMC @ 0x40000130
2,917,915 UART:
2,917,931 UART: Running Caliptra FMC ...
2,918,339 UART:
2,918,482 UART: [state] CFI Enabled
2,928,796 UART: [fht] FMC Alias Private Key: 7
3,047,868 UART: [art] Extend RT PCRs Done
3,048,296 UART: [art] Lock RT PCRs Done
3,050,046 UART: [art] Populate DV Done
3,058,481 UART: [fht] FMC Alias Private Key: 7
3,059,481 UART: [art] Derive CDI
3,059,761 UART: [art] Store in slot 0x4
3,145,722 UART: [art] Derive Key Pair
3,146,082 UART: [art] Store priv key in slot 0x5
3,159,120 UART: [art] Derive Key Pair - Done
3,173,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,328 UART: [art] PUB.X = 40D0D021CEC24C8CEB57CEC300E16736FE5DB91A61033F054DCDA88C124E938E6AB8C82C811593B0EF3113DCF6A9223A
3,197,084 UART: [art] PUB.Y = 4442E27A6EB316B5F1022D49A5557533FA19B933B338300FA83A6BF495130801C7F4F5FA893EC5F57378A6B6E24F9460
3,204,018 UART: [art] SIG.R = DBB26B247B9614AF138F6D09CA2CCE1A6945653BC64E272BEED849545004F78CFD8631231ACEF6B731A1E82F0D6C7BBE
3,210,795 UART: [art] SIG.S = 9BB0B393777B42208DDEC45111897438DDF5ACB085334B012806CC79EFDAAB4FC505A06F7C4656C3FEDF3F644A31A0B1
3,234,078 UART: Caliptra RT
3,234,421 UART: [state] CFI Enabled
3,355,007 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,852 ready_for_fw is high
1,060,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,115 >>> mbox cmd response: success
2,739,262 UART:
2,739,278 UART: Running Caliptra FMC ...
2,739,686 UART:
2,739,829 UART: [state] CFI Enabled
2,750,489 UART: [fht] FMC Alias Private Key: 7
2,869,783 UART: [art] Extend RT PCRs Done
2,870,211 UART: [art] Lock RT PCRs Done
2,871,817 UART: [art] Populate DV Done
2,880,190 UART: [fht] FMC Alias Private Key: 7
2,881,278 UART: [art] Derive CDI
2,881,558 UART: [art] Store in slot 0x4
2,967,561 UART: [art] Derive Key Pair
2,967,921 UART: [art] Store priv key in slot 0x5
2,981,423 UART: [art] Derive Key Pair - Done
2,995,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,864 UART: [art] PUB.X = 19B8E635FD4B0F99F252154B42994D7C028DBBCF6D6FB319137451CCF8B10CB556C1AAE6DD5382EB839F828C82DF4984
3,018,635 UART: [art] PUB.Y = 69D227302E5CFCF7B934FF0071D7C39D10C36B8926661D4E8C8C41EC0A75E32BE88EF44EF2C24AFEB117A2A35C51D49C
3,025,574 UART: [art] SIG.R = 800F484AADFB63CE812CB393B76412DC4F3F0377717A2B5A5469656590995E73D5E6B5802E73463D0B02A124A7236640
3,032,324 UART: [art] SIG.S = 505001F36B88CB3F1B18CC1187E3617FC5E8096C3C1C98381D81C664E6CDC473EC217688A120F605E0C9D0BADF71739B
3,055,775 UART: Caliptra RT
3,056,118 UART: [state] CFI Enabled
3,176,081 UART: [rt] RT listening for mailbox commands...
test test_boot::test_standard ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
Truncated 1330315 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,711,944,412 UART:
3,711,944,649 UART: Running Caliptra FMC ...
3,711,945,676 UART:
3,711,945,826 UART: [state] CFI Enabled
3,712,051,532 UART: [art] Extend RT PCRs Done
3,712,052,732 UART: [art] Lock RT PCRs Done
3,712,054,066 UART: [art] Populate DV Done
3,712,059,650 UART: [fht] FMC Alias Private Key: 7
3,712,061,193 UART: [art] Derive CDI
3,712,061,961 UART: [art] Store in slot 0x4
3,712,120,136 UART: [art] Derive Key Pair
3,712,121,174 UART: [art] Store priv key in slot 0x5
3,715,412,895 UART: [art] Derive Key Pair - Done
3,715,425,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,717,714,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,717,716,122 UART: [art] PUB.X = 98861167D7073CB4D238FAF5BC973CAB55D56370B40B9F52F2E479E49155387644DA281D6A897128871F5D6032C5EF4D
3,717,723,392 UART: [art] PUB.Y = 5C310844B887F4123CE36D4086138A6AE2C67B1441245CFAE8433616DA3C1F62C08196A4F57B64D6536AB8A240331A3D
3,717,730,582 UART: [art] SIG.R = 9B9589FA89A18F10A9D074B7D07763C1206ECF72017E56D036B4B8E9F9EED2CFC11C06965FC95946E358816134148631
3,717,737,976 UART: [art] SIG.S = 46F4F85F015A2D36489F66BC4F83F43A0EC7A6D41EBE49550179258F568BB03AB5A678720B56367880C6C68E366E5289
3,719,043,466 UART: Caliptra RT
3,719,044,184 UART: [state] CFI Enabled
3,719,462,371 UART: [rt] RT listening for mailbox commands...
3,719,464,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,719,613,951 UART:
3,719,614,253 UART: Running Caliptra ROM ...
3,719,615,294 UART:
3,719,615,451 UART: [state] CFI Enabled
3,719,679,574 UART: [state] LifecycleState = Unprovisioned
3,719,681,508 UART: [state] DebugLocked = No
3,719,684,023 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,719,688,387 UART: [kat] SHA2-256
3,719,858,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,719,868,615 UART: [kat] ++
3,719,869,080 UART: [kat] sha1
3,719,880,182 UART: [kat] SHA2-256
3,719,882,919 UART: [kat] SHA2-384
3,719,888,589 UART: [kat] SHA2-512-ACC
3,719,890,935 UART: [kat] ECC-384
3,722,181,037 UART: [kat] HMAC-384Kdf
3,722,212,150 UART: [kat] LMS
3,723,402,509 UART: [kat] --
3,723,406,624 UART: [update-reset] ++
3,727,596,658 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,727,600,216 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,727,997,961 >>> mbox cmd response: success
3,727,999,166 UART: [update-reset] Copying MAN_2 To MAN_1
3,728,021,607 UART: [update-reset Success] --
3,728,027,305 UART: [state] Locking Datavault
3,728,030,886 UART: [state] Locking PCR0, PCR1 and PCR31
3,728,032,590 UART: [state] Locking ICCM
3,728,033,775 UART: [exit] Launching FMC @ 0x40000130
3,728,042,234 UART:
3,728,042,523 UART: Running Caliptra FMC ...
3,728,043,642 UART:
3,728,043,813 UART: [state] CFI Enabled
3,728,134,029 UART: [art] Extend RT PCRs Done
3,728,135,222 UART: [art] Lock RT PCRs Done
3,728,136,683 UART: [art] Populate DV Done
3,728,142,040 UART: [fht] FMC Alias Private Key: 7
3,728,143,590 UART: [art] Derive CDI
3,728,144,361 UART: [art] Store in slot 0x4
3,728,203,212 UART: [art] Derive Key Pair
3,728,204,446 UART: [art] Store priv key in slot 0x5
3,731,496,903 UART: [art] Derive Key Pair - Done
3,731,509,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,798,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,800,083 UART: [art] PUB.X = B35588500CC1EDB5822056BD9D49A9C671488EEC7AEBBF41082A0F4C6957B59DCF4EE279577DA587378A5E05A6687406
3,733,807,383 UART: [art] PUB.Y = 4377EC858A1059586A3740447E157DACE4F88FB40A08802501F4264A29227A0CE25A6121AF41B007F57B800A084C5AA0
3,733,814,563 UART: [art] SIG.R = 3085674FA11CDEC07AEA743D3F873AEDFD4718E72506D1EB3E4BF0BE78C680D73AC8AADE5676B76C591484A3BB54FB0A
3,733,821,946 UART: [art] SIG.S = 2D2EFDA028DB08CDD79C37E296F20F0AE5FE7EA262279795B1390BEF985B39923E480E48CD0B6EBB336ECC2F1398F984
3,735,126,848 UART: Caliptra RT
3,735,127,547 UART: [state] CFI Enabled
3,735,545,120 UART: [rt] RT listening for mailbox commands...
3,735,547,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,735,697,024 UART:
3,735,697,340 UART: Running Caliptra ROM ...
3,735,698,380 UART:
3,735,698,554 UART: [state] CFI Enabled
3,735,761,063 UART: [state] LifecycleState = Unprovisioned
3,735,763,002 UART: [state] DebugLocked = No
3,735,765,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,735,770,730 UART: [kat] SHA2-256
3,735,940,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,735,950,935 UART: [kat] ++
3,735,951,396 UART: [kat] sha1
3,735,961,897 UART: [kat] SHA2-256
3,735,964,573 UART: [kat] SHA2-384
3,735,969,502 UART: [kat] SHA2-512-ACC
3,735,971,910 UART: [kat] ECC-384
3,738,266,919 UART: [kat] HMAC-384Kdf
3,738,295,985 UART: [kat] LMS
3,739,486,291 UART: [kat] --
3,739,492,555 UART: [update-reset] ++
3,743,681,441 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,743,684,407 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,744,082,181 >>> mbox cmd response: success
3,744,083,071 UART: [update-reset] Copying MAN_2 To MAN_1
3,744,105,478 UART: [update-reset Success] --
3,744,110,255 UART: [state] Locking Datavault
3,744,112,915 UART: [state] Locking PCR0, PCR1 and PCR31
3,744,114,671 UART: [state] Locking ICCM
3,744,117,205 UART: [exit] Launching FMC @ 0x40000130
3,744,125,647 UART:
3,744,125,913 UART: Running Caliptra FMC ...
3,744,127,026 UART:
3,744,127,195 UART: [state] CFI Enabled
3,744,216,135 UART: [art] Extend RT PCRs Done
3,744,217,329 UART: [art] Lock RT PCRs Done
3,744,218,844 UART: [art] Populate DV Done
3,744,224,488 UART: [fht] FMC Alias Private Key: 7
3,744,226,031 UART: [art] Derive CDI
3,744,226,851 UART: [art] Store in slot 0x4
3,744,284,982 UART: [art] Derive Key Pair
3,744,286,029 UART: [art] Store priv key in slot 0x5
3,747,579,010 UART: [art] Derive Key Pair - Done
3,747,591,915 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,749,880,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,749,882,211 UART: [art] PUB.X = 98861167D7073CB4D238FAF5BC973CAB55D56370B40B9F52F2E479E49155387644DA281D6A897128871F5D6032C5EF4D
3,749,889,466 UART: [art] PUB.Y = 5C310844B887F4123CE36D4086138A6AE2C67B1441245CFAE8433616DA3C1F62C08196A4F57B64D6536AB8A240331A3D
3,749,896,704 UART: [art] SIG.R = 9B9589FA89A18F10A9D074B7D07763C1206ECF72017E56D036B4B8E9F9EED2CFC11C06965FC95946E358816134148631
3,749,904,100 UART: [art] SIG.S = 46F4F85F015A2D36489F66BC4F83F43A0EC7A6D41EBE49550179258F568BB03AB5A678720B56367880C6C68E366E5289
3,751,209,441 UART: Caliptra RT
3,751,210,146 UART: [state] CFI Enabled
3,751,631,632 UART: [rt] RT listening for mailbox commands...
3,751,633,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,751,783,338 UART:
3,751,783,644 UART: Running Caliptra ROM ...
3,751,784,686 UART:
3,751,784,839 UART: [state] CFI Enabled
3,751,843,294 UART: [state] LifecycleState = Unprovisioned
3,751,845,224 UART: [state] DebugLocked = No
3,751,846,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,751,851,645 UART: [kat] SHA2-256
3,752,021,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,752,031,807 UART: [kat] ++
3,752,032,267 UART: [kat] sha1
3,752,043,916 UART: [kat] SHA2-256
3,752,046,615 UART: [kat] SHA2-384
3,752,052,188 UART: [kat] SHA2-512-ACC
3,752,054,545 UART: [kat] ECC-384
3,754,346,350 UART: [kat] HMAC-384Kdf
3,754,377,702 UART: [kat] LMS
3,755,568,034 UART: [kat] --
3,755,572,191 UART: [update-reset] ++
3,759,774,949 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,759,778,617 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,760,176,320 >>> mbox cmd response: success
3,760,177,236 UART: [update-reset] Copying MAN_2 To MAN_1
3,760,199,675 UART: [update-reset Success] --
3,760,204,433 UART: [state] Locking Datavault
3,760,208,669 UART: [state] Locking PCR0, PCR1 and PCR31
3,760,210,428 UART: [state] Locking ICCM
3,760,211,529 UART: [exit] Launching FMC @ 0x40000130
3,760,219,980 UART:
3,760,220,219 UART: Running Caliptra FMC ...
3,760,221,247 UART:
3,760,221,400 UART: [state] CFI Enabled
3,760,320,067 UART: [art] Extend RT PCRs Done
3,760,321,263 UART: [art] Lock RT PCRs Done
3,760,322,857 UART: [art] Populate DV Done
3,760,328,157 UART: [fht] FMC Alias Private Key: 7
3,760,329,853 UART: [art] Derive CDI
3,760,330,593 UART: [art] Store in slot 0x4
3,760,389,042 UART: [art] Derive Key Pair
3,760,390,110 UART: [art] Store priv key in slot 0x5
3,763,682,926 UART: [art] Derive Key Pair - Done
3,763,696,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,765,983,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,765,985,358 UART: [art] PUB.X = B35588500CC1EDB5822056BD9D49A9C671488EEC7AEBBF41082A0F4C6957B59DCF4EE279577DA587378A5E05A6687406
3,765,992,604 UART: [art] PUB.Y = 4377EC858A1059586A3740447E157DACE4F88FB40A08802501F4264A29227A0CE25A6121AF41B007F57B800A084C5AA0
3,765,999,843 UART: [art] SIG.R = 3085674FA11CDEC07AEA743D3F873AEDFD4718E72506D1EB3E4BF0BE78C680D73AC8AADE5676B76C591484A3BB54FB0A
3,766,007,289 UART: [art] SIG.S = 2D2EFDA028DB08CDD79C37E296F20F0AE5FE7EA262279795B1390BEF985B39923E480E48CD0B6EBB336ECC2F1398F984
3,767,312,771 UART: Caliptra RT
3,767,313,506 UART: [state] CFI Enabled
3,767,754,829 UART: [rt] RT listening for mailbox commands...
3,767,756,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,767,906,628 UART:
3,767,906,932 UART: Running Caliptra ROM ...
3,767,907,968 UART:
3,767,908,121 UART: [state] CFI Enabled
3,767,964,136 UART: [state] LifecycleState = Unprovisioned
3,767,966,066 UART: [state] DebugLocked = No
3,767,967,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,767,972,634 UART: [kat] SHA2-256
3,768,142,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,768,152,826 UART: [kat] ++
3,768,153,316 UART: [kat] sha1
3,768,164,367 UART: [kat] SHA2-256
3,768,167,071 UART: [kat] SHA2-384
3,768,173,730 UART: [kat] SHA2-512-ACC
3,768,176,080 UART: [kat] ECC-384
3,770,470,448 UART: [kat] HMAC-384Kdf
3,770,500,010 UART: [kat] LMS
3,771,690,347 UART: [kat] --
3,771,693,330 UART: [update-reset] ++
3,775,880,146 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,775,884,580 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,776,282,341 >>> mbox cmd response: success
3,776,282,891 UART: [update-reset] Copying MAN_2 To MAN_1
3,776,305,279 UART: [update-reset Success] --
3,776,308,002 UART: [state] Locking Datavault
3,776,309,697 UART: [state] Locking PCR0, PCR1 and PCR31
3,776,311,401 UART: [state] Locking ICCM
3,776,312,847 UART: [exit] Launching FMC @ 0x40000130
3,776,321,258 UART:
3,776,321,517 UART: Running Caliptra FMC ...
3,776,322,624 UART:
3,776,322,785 UART: [state] CFI Enabled
3,776,424,079 UART: [art] Extend RT PCRs Done
3,776,425,275 UART: [art] Lock RT PCRs Done
3,776,426,731 UART: [art] Populate DV Done
3,776,432,195 UART: [fht] FMC Alias Private Key: 7
3,776,433,895 UART: [art] Derive CDI
3,776,434,711 UART: [art] Store in slot 0x4
3,776,492,946 UART: [art] Derive Key Pair
3,776,493,984 UART: [art] Store priv key in slot 0x5
3,779,786,583 UART: [art] Derive Key Pair - Done
3,779,799,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,782,087,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,782,089,461 UART: [art] PUB.X = 98861167D7073CB4D238FAF5BC973CAB55D56370B40B9F52F2E479E49155387644DA281D6A897128871F5D6032C5EF4D
3,782,096,707 UART: [art] PUB.Y = 5C310844B887F4123CE36D4086138A6AE2C67B1441245CFAE8433616DA3C1F62C08196A4F57B64D6536AB8A240331A3D
3,782,103,971 UART: [art] SIG.R = 9B9589FA89A18F10A9D074B7D07763C1206ECF72017E56D036B4B8E9F9EED2CFC11C06965FC95946E358816134148631
3,782,111,368 UART: [art] SIG.S = 46F4F85F015A2D36489F66BC4F83F43A0EC7A6D41EBE49550179258F568BB03AB5A678720B56367880C6C68E366E5289
3,783,416,345 UART: Caliptra RT
3,783,417,060 UART: [state] CFI Enabled
3,783,835,489 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 404.26s
Truncated 698673 bytes from beginning
= 7
3,788,864,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,788,865,572 UART: [art] PUB.X = D4C49D7D080324BC179D71057524FE6F64398E815E102DA1E42F46B11341CBBC5C37CE3AF99D06817170112E70E88BED
3,788,872,859 UART: [art] PUB.Y = EB94579F07328F16629B831FEAF3688545B0A0FA466CE01CDEE3444DCA424B71FC04EABD64734196A40A985F4A161EF6
3,788,880,097 UART: [art] SIG.R = EF6F81A705D876514F3E5AB3B0F79EF03FE1E5D8AB3605A5BDA4FBF69FF875A738A3CE39EBE13648F7FFA59CC7687817
3,788,887,450 UART: [art] SIG.S = 2F69BCF2B5B612A774A540A89EB446390AAFEF9786C193ACDB5E7DC497090A588CD4BE254D10614AD8C9804796477627
3,790,193,177 UART: Caliptra RT
3,790,193,877 UART: [state] CFI Enabled
3,790,608,966 UART: [rt] RT listening for mailbox commands...
3,790,610,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,799,423,649 >>> mbox cmd response: success
3,799,459,771 UART:
3,799,460,048 UART: Running Caliptra FMC ...
3,799,461,168 UART:
3,799,461,361 UART: [state] CFI Enabled
3,799,562,246 UART: [art] Extend RT PCRs Done
3,799,563,441 UART: [art] Lock RT PCRs Done
3,799,564,687 UART: [art] Populate DV Done
3,799,570,102 UART: [fht] FMC Alias Private Key: 7
3,799,571,814 UART: [art] Derive CDI
3,799,572,565 UART: [art] Store in slot 0x4
3,799,630,854 UART: [art] Derive Key Pair
3,799,631,853 UART: [art] Store priv key in slot 0x5
3,802,924,801 UART: [art] Derive Key Pair - Done
3,802,937,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,805,226,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,805,227,971 UART: [art] PUB.X = 28E12EDCBE016667721CE2B47DC789D3660848FA08AB0E62A134CB9ED2010A006B79770B00F4A02914C6F77BF3FB1ACC
3,805,235,222 UART: [art] PUB.Y = 69C04C28615C5E66ED48D8DE42A6B5447677D7FCB7CF22FCDFD061F516D97EF3BB6AF49CC1D62A74BCACD8FA33E8D234
3,805,242,492 UART: [art] SIG.R = 4862ED436475D4722AE01CAC8DB5EB0D4B98CE7C1976CFFBB4D672EA8B2E3B6500161F3F76B28598BDFF25696011A9BB
3,805,249,894 UART: [art] SIG.S = 9C488F1CBB226A90802145557C3D68FAA2508BC43A97017C9B55FB6A5B45169E8FDA3FD845C08BF0D10A2BF013FB3DA2
3,806,555,607 UART: Caliptra RT
3,806,556,312 UART: [state] CFI Enabled
3,806,978,268 UART: [rt] RT listening for mailbox commands...
3,806,980,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,815,787,148 >>> mbox cmd response: success
3,815,822,021 UART:
3,815,822,327 UART: Running Caliptra FMC ...
3,815,823,452 UART:
3,815,823,619 UART: [state] CFI Enabled
3,815,923,355 UART: [art] Extend RT PCRs Done
3,815,924,536 UART: [art] Lock RT PCRs Done
3,815,925,941 UART: [art] Populate DV Done
3,815,931,678 UART: [fht] FMC Alias Private Key: 7
3,815,933,322 UART: [art] Derive CDI
3,815,934,140 UART: [art] Store in slot 0x4
3,815,992,691 UART: [art] Derive Key Pair
3,815,993,744 UART: [art] Store priv key in slot 0x5
3,819,285,862 UART: [art] Derive Key Pair - Done
3,819,298,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,821,587,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,821,589,109 UART: [art] PUB.X = D4C49D7D080324BC179D71057524FE6F64398E815E102DA1E42F46B11341CBBC5C37CE3AF99D06817170112E70E88BED
3,821,596,304 UART: [art] PUB.Y = EB94579F07328F16629B831FEAF3688545B0A0FA466CE01CDEE3444DCA424B71FC04EABD64734196A40A985F4A161EF6
3,821,603,598 UART: [art] SIG.R = EF6F81A705D876514F3E5AB3B0F79EF03FE1E5D8AB3605A5BDA4FBF69FF875A738A3CE39EBE13648F7FFA59CC7687817
3,821,610,990 UART: [art] SIG.S = 2F69BCF2B5B612A774A540A89EB446390AAFEF9786C193ACDB5E7DC497090A588CD4BE254D10614AD8C9804796477627
3,822,916,141 UART: Caliptra RT
3,822,916,857 UART: [state] CFI Enabled
3,823,331,483 UART: [rt] RT listening for mailbox commands...
3,823,333,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,832,144,675 >>> mbox cmd response: success
3,832,179,436 UART:
3,832,179,713 UART: Running Caliptra FMC ...
3,832,180,832 UART:
3,832,181,012 UART: [state] CFI Enabled
3,832,281,576 UART: [art] Extend RT PCRs Done
3,832,282,772 UART: [art] Lock RT PCRs Done
3,832,284,077 UART: [art] Populate DV Done
3,832,289,384 UART: [fht] FMC Alias Private Key: 7
3,832,290,867 UART: [art] Derive CDI
3,832,291,631 UART: [art] Store in slot 0x4
3,832,350,837 UART: [art] Derive Key Pair
3,832,351,843 UART: [art] Store priv key in slot 0x5
3,835,644,258 UART: [art] Derive Key Pair - Done
3,835,657,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,837,946,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,837,947,860 UART: [art] PUB.X = 28E12EDCBE016667721CE2B47DC789D3660848FA08AB0E62A134CB9ED2010A006B79770B00F4A02914C6F77BF3FB1ACC
3,837,955,111 UART: [art] PUB.Y = 69C04C28615C5E66ED48D8DE42A6B5447677D7FCB7CF22FCDFD061F516D97EF3BB6AF49CC1D62A74BCACD8FA33E8D234
3,837,962,436 UART: [art] SIG.R = 4862ED436475D4722AE01CAC8DB5EB0D4B98CE7C1976CFFBB4D672EA8B2E3B6500161F3F76B28598BDFF25696011A9BB
3,837,969,790 UART: [art] SIG.S = 9C488F1CBB226A90802145557C3D68FAA2508BC43A97017C9B55FB6A5B45169E8FDA3FD845C08BF0D10A2BF013FB3DA2
3,839,275,000 UART: Caliptra RT
3,839,275,719 UART: [state] CFI Enabled
3,839,692,061 UART: [rt] RT listening for mailbox commands...
3,839,693,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,848,501,882 >>> mbox cmd response: success
3,848,537,551 UART:
3,848,537,871 UART: Running Caliptra FMC ...
3,848,538,997 UART:
3,848,539,187 UART: [state] CFI Enabled
3,848,643,142 UART: [art] Extend RT PCRs Done
3,848,644,334 UART: [art] Lock RT PCRs Done
3,848,645,903 UART: [art] Populate DV Done
3,848,651,479 UART: [fht] FMC Alias Private Key: 7
3,848,653,125 UART: [art] Derive CDI
3,848,653,946 UART: [art] Store in slot 0x4
3,848,711,724 UART: [art] Derive Key Pair
3,848,712,813 UART: [art] Store priv key in slot 0x5
3,852,005,536 UART: [art] Derive Key Pair - Done
3,852,018,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,854,307,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,854,308,823 UART: [art] PUB.X = D4C49D7D080324BC179D71057524FE6F64398E815E102DA1E42F46B11341CBBC5C37CE3AF99D06817170112E70E88BED
3,854,316,083 UART: [art] PUB.Y = EB94579F07328F16629B831FEAF3688545B0A0FA466CE01CDEE3444DCA424B71FC04EABD64734196A40A985F4A161EF6
3,854,323,319 UART: [art] SIG.R = EF6F81A705D876514F3E5AB3B0F79EF03FE1E5D8AB3605A5BDA4FBF69FF875A738A3CE39EBE13648F7FFA59CC7687817
3,854,330,713 UART: [art] SIG.S = 2F69BCF2B5B612A774A540A89EB446390AAFEF9786C193ACDB5E7DC497090A588CD4BE254D10614AD8C9804796477627
3,855,635,807 UART: Caliptra RT
3,855,636,533 UART: [state] CFI Enabled
3,856,052,063 UART: [rt] RT listening for mailbox commands...
3,856,053,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,864,876,850 >>> mbox cmd response: success
3,864,910,919 UART:
3,864,911,194 UART: Running Caliptra FMC ...
3,864,912,314 UART:
3,864,912,505 UART: [state] CFI Enabled
3,865,001,513 UART: [art] Extend RT PCRs Done
3,865,002,714 UART: [art] Lock RT PCRs Done
3,865,004,128 UART: [art] Populate DV Done
3,865,009,599 UART: [fht] FMC Alias Private Key: 7
3,865,011,089 UART: [art] Derive CDI
3,865,011,861 UART: [art] Store in slot 0x4
3,865,070,525 UART: [art] Derive Key Pair
3,865,071,530 UART: [art] Store priv key in slot 0x5
3,868,364,167 UART: [art] Derive Key Pair - Done
3,868,377,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,870,666,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,870,667,824 UART: [art] PUB.X = 28E12EDCBE016667721CE2B47DC789D3660848FA08AB0E62A134CB9ED2010A006B79770B00F4A02914C6F77BF3FB1ACC
3,870,675,084 UART: [art] PUB.Y = 69C04C28615C5E66ED48D8DE42A6B5447677D7FCB7CF22FCDFD061F516D97EF3BB6AF49CC1D62A74BCACD8FA33E8D234
3,870,682,326 UART: [art] SIG.R = 4862ED436475D4722AE01CAC8DB5EB0D4B98CE7C1976CFFBB4D672EA8B2E3B6500161F3F76B28598BDFF25696011A9BB
3,870,689,730 UART: [art] SIG.S = 9C488F1CBB226A90802145557C3D68FAA2508BC43A97017C9B55FB6A5B45169E8FDA3FD845C08BF0D10A2BF013FB3DA2
3,871,994,983 UART: Caliptra RT
3,871,995,699 UART: [state] CFI Enabled
3,872,416,026 UART: [rt] RT listening for mailbox commands...
3,872,417,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,881,226,525 >>> mbox cmd response: success
3,881,258,958 UART:
3,881,259,266 UART: Running Caliptra FMC ...
3,881,260,389 UART:
3,881,260,558 UART: [state] CFI Enabled
3,881,362,469 UART: [art] Extend RT PCRs Done
3,881,363,652 UART: [art] Lock RT PCRs Done
3,881,364,894 UART: [art] Populate DV Done
3,881,370,418 UART: [fht] FMC Alias Private Key: 7
3,881,371,967 UART: [art] Derive CDI
3,881,372,788 UART: [art] Store in slot 0x4
3,881,431,395 UART: [art] Derive Key Pair
3,881,432,458 UART: [art] Store priv key in slot 0x5
3,884,724,933 UART: [art] Derive Key Pair - Done
3,884,737,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,887,027,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,887,028,658 UART: [art] PUB.X = D4C49D7D080324BC179D71057524FE6F64398E815E102DA1E42F46B11341CBBC5C37CE3AF99D06817170112E70E88BED
3,887,035,915 UART: [art] PUB.Y = EB94579F07328F16629B831FEAF3688545B0A0FA466CE01CDEE3444DCA424B71FC04EABD64734196A40A985F4A161EF6
3,887,043,152 UART: [art] SIG.R = EF6F81A705D876514F3E5AB3B0F79EF03FE1E5D8AB3605A5BDA4FBF69FF875A738A3CE39EBE13648F7FFA59CC7687817
3,887,050,553 UART: [art] SIG.S = 2F69BCF2B5B612A774A540A89EB446390AAFEF9786C193ACDB5E7DC497090A588CD4BE254D10614AD8C9804796477627
3,888,355,736 UART: Caliptra RT
3,888,356,454 UART: [state] CFI Enabled
3,888,776,421 UART: [rt] RT listening for mailbox commands...
3,888,778,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,897,603,740 >>> mbox cmd response: success
3,897,637,979 UART:
3,897,638,284 UART: Running Caliptra FMC ...
3,897,639,411 UART:
3,897,639,599 UART: [state] CFI Enabled
3,897,742,054 UART: [art] Extend RT PCRs Done
3,897,743,250 UART: [art] Lock RT PCRs Done
3,897,744,874 UART: [art] Populate DV Done
3,897,750,504 UART: [fht] FMC Alias Private Key: 7
3,897,752,163 UART: [art] Derive CDI
3,897,752,987 UART: [art] Store in slot 0x4
3,897,810,898 UART: [art] Derive Key Pair
3,897,811,943 UART: [art] Store priv key in slot 0x5
3,901,104,541 UART: [art] Derive Key Pair - Done
3,901,117,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,903,405,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,903,407,444 UART: [art] PUB.X = 28E12EDCBE016667721CE2B47DC789D3660848FA08AB0E62A134CB9ED2010A006B79770B00F4A02914C6F77BF3FB1ACC
3,903,414,640 UART: [art] PUB.Y = 69C04C28615C5E66ED48D8DE42A6B5447677D7FCB7CF22FCDFD061F516D97EF3BB6AF49CC1D62A74BCACD8FA33E8D234
3,903,421,922 UART: [art] SIG.R = 4862ED436475D4722AE01CAC8DB5EB0D4B98CE7C1976CFFBB4D672EA8B2E3B6500161F3F76B28598BDFF25696011A9BB
3,903,429,312 UART: [art] SIG.S = 9C488F1CBB226A90802145557C3D68FAA2508BC43A97017C9B55FB6A5B45169E8FDA3FD845C08BF0D10A2BF013FB3DA2
3,904,734,503 UART: Caliptra RT
3,904,735,218 UART: [state] CFI Enabled
3,905,155,495 UART: [rt] RT listening for mailbox commands...
3,905,157,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,913,967,309 >>> mbox cmd response: success
3,914,002,022 UART:
3,914,002,302 UART: Running Caliptra FMC ...
3,914,003,345 UART:
3,914,003,502 UART: [state] CFI Enabled
3,914,099,718 UART: [art] Extend RT PCRs Done
3,914,100,914 UART: [art] Lock RT PCRs Done
3,914,102,454 UART: [art] Populate DV Done
3,914,107,972 UART: [fht] FMC Alias Private Key: 7
3,914,109,569 UART: [art] Derive CDI
3,914,110,317 UART: [art] Store in slot 0x4
3,914,168,878 UART: [art] Derive Key Pair
3,914,169,937 UART: [art] Store priv key in slot 0x5
3,917,462,948 UART: [art] Derive Key Pair - Done
3,917,475,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,919,764,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,919,765,533 UART: [art] PUB.X = D4C49D7D080324BC179D71057524FE6F64398E815E102DA1E42F46B11341CBBC5C37CE3AF99D06817170112E70E88BED
3,919,772,798 UART: [art] PUB.Y = EB94579F07328F16629B831FEAF3688545B0A0FA466CE01CDEE3444DCA424B71FC04EABD64734196A40A985F4A161EF6
3,919,780,092 UART: [art] SIG.R = EF6F81A705D876514F3E5AB3B0F79EF03FE1E5D8AB3605A5BDA4FBF69FF875A738A3CE39EBE13648F7FFA59CC7687817
3,919,787,489 UART: [art] SIG.S = 2F69BCF2B5B612A774A540A89EB446390AAFEF9786C193ACDB5E7DC497090A588CD4BE254D10614AD8C9804796477627
3,921,092,932 UART: Caliptra RT
3,921,093,643 UART: [state] CFI Enabled
3,921,511,339 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 411.15s
Truncated 1330153 bytes from beginning
UART: [exit] Launching FMC @ 0x40000130
3,594,167,571 UART:
3,594,167,799 UART: Running Caliptra FMC ...
3,594,168,823 UART:
3,594,168,968 UART: [state] CFI Enabled
3,594,213,089 UART: [art] Extend RT PCRs Done
3,594,214,279 UART: [art] Lock RT PCRs Done
3,594,215,758 UART: [art] Populate DV Done
3,594,221,289 UART: [fht] FMC Alias Private Key: 7
3,594,223,048 UART: [art] Derive CDI
3,594,223,788 UART: [art] Store in slot 0x4
3,594,266,356 UART: [art] Derive Key Pair
3,594,267,419 UART: [art] Store priv key in slot 0x5
3,597,509,188 UART: [art] Derive Key Pair - Done
3,597,522,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,599,802,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,599,804,047 UART: [art] PUB.X = 0891C6398D8FBC0A0D6F27E4C98F4F3D49702E37E97C98FDABA73AFDADDB6526EED826CCF2CC946B3ADAC2D7C6F95DF1
3,599,811,397 UART: [art] PUB.Y = E657892374978D760BA7BEFE9A0E5B605D744ACEC76F881DEE1F494FC17B5883972576C540763382FC8CECDD0B6B23D8
3,599,818,620 UART: [art] SIG.R = 12A2A7573F428C698B38C05FDA71DA359B052836A088DB74A44B2692DDF76A5DB663789252FDD85D9FA60A497E10A043
3,599,826,011 UART: [art] SIG.S = 9F09980DD2E4CF97CB86E4E7C325EEFED54D0AED09D6E44259B9504B217DC58E50D026046AAE18004B88556413C47DA6
3,601,131,429 UART: Caliptra RT
3,601,132,143 UART: [state] CFI Enabled
3,601,506,658 UART: [rt] RT listening for mailbox commands...
3,601,508,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,601,658,440 UART:
3,601,658,745 UART: Running Caliptra ROM ...
3,601,659,780 UART:
3,601,660,091 UART: [state] CFI Enabled
3,601,673,390 UART: [state] LifecycleState = Unprovisioned
3,601,675,277 UART: [state] DebugLocked = No
3,601,677,980 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,601,682,544 UART: [kat] SHA2-256
3,601,852,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,601,862,767 UART: [kat] ++
3,601,863,254 UART: [kat] sha1
3,601,874,246 UART: [kat] SHA2-256
3,601,876,941 UART: [kat] SHA2-384
3,601,882,015 UART: [kat] SHA2-512-ACC
3,601,884,372 UART: [kat] ECC-384
3,604,166,111 UART: [kat] HMAC-384Kdf
3,604,178,512 UART: [kat] LMS
3,605,368,621 UART: [kat] --
3,605,372,658 UART: [update-reset] ++
3,609,565,031 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,609,568,324 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,609,966,082 >>> mbox cmd response: success
3,609,967,396 UART: [update-reset] Copying MAN_2 To MAN_1
3,609,989,781 UART: [update-reset Success] --
3,609,993,931 UART: [state] Locking Datavault
3,609,996,866 UART: [state] Locking PCR0, PCR1 and PCR31
3,609,998,563 UART: [state] Locking ICCM
3,610,001,088 UART: [exit] Launching FMC @ 0x40000130
3,610,009,541 UART:
3,610,009,779 UART: Running Caliptra FMC ...
3,610,010,881 UART:
3,610,011,055 UART: [state] CFI Enabled
3,610,055,263 UART: [art] Extend RT PCRs Done
3,610,056,454 UART: [art] Lock RT PCRs Done
3,610,057,807 UART: [art] Populate DV Done
3,610,063,219 UART: [fht] FMC Alias Private Key: 7
3,610,064,754 UART: [art] Derive CDI
3,610,065,494 UART: [art] Store in slot 0x4
3,610,107,813 UART: [art] Derive Key Pair
3,610,109,063 UART: [art] Store priv key in slot 0x5
3,613,351,075 UART: [art] Derive Key Pair - Done
3,613,364,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,615,644,664 UART: [art] Erasing AUTHORITY.KEYID = 7
3,615,646,178 UART: [art] PUB.X = 4C65B3BF082F688CF8B82B9CC1D963FFBC36CE28D46927BA8F0E3A749D72A431FEBB546B749742622C851CBB0D4785CC
3,615,653,476 UART: [art] PUB.Y = 6778AFC3883700E025444A507EFE605C2EE15A2FCC15DFAC7D7B6C79392572BD680A3E723B2D7B98A71DBB8E491D7C55
3,615,660,710 UART: [art] SIG.R = B8953D6852E9505243D103D0CE8B0019282BC0D1BEF63256D81A2B3F5F37176FDF98E90F7778E2CABCD1AB650BFDF397
3,615,668,098 UART: [art] SIG.S = 0BDC0103A7D5F62AA797360E70E652892EACFD192A37E1ED4A55BA1B88F32EB01877A0BA38A8FE078488BA10BEE91F02
3,616,972,976 UART: Caliptra RT
3,616,973,681 UART: [state] CFI Enabled
3,617,350,534 UART: [rt] RT listening for mailbox commands...
3,617,352,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,502,290 UART:
3,617,502,606 UART: Running Caliptra ROM ...
3,617,503,727 UART:
3,617,503,946 UART: [state] CFI Enabled
3,617,518,558 UART: [state] LifecycleState = Unprovisioned
3,617,520,489 UART: [state] DebugLocked = No
3,617,523,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,617,527,521 UART: [kat] SHA2-256
3,617,697,234 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,617,707,782 UART: [kat] ++
3,617,708,240 UART: [kat] sha1
3,617,720,838 UART: [kat] SHA2-256
3,617,723,528 UART: [kat] SHA2-384
3,617,730,450 UART: [kat] SHA2-512-ACC
3,617,732,808 UART: [kat] ECC-384
3,620,015,669 UART: [kat] HMAC-384Kdf
3,620,026,442 UART: [kat] LMS
3,621,216,498 UART: [kat] --
3,621,221,022 UART: [update-reset] ++
3,625,418,587 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,625,422,365 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,625,820,121 >>> mbox cmd response: success
3,625,821,327 UART: [update-reset] Copying MAN_2 To MAN_1
3,625,843,770 UART: [update-reset Success] --
3,625,848,706 UART: [state] Locking Datavault
3,625,851,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,625,853,282 UART: [state] Locking ICCM
3,625,855,156 UART: [exit] Launching FMC @ 0x40000130
3,625,863,589 UART:
3,625,863,878 UART: Running Caliptra FMC ...
3,625,864,987 UART:
3,625,865,142 UART: [state] CFI Enabled
3,625,909,314 UART: [art] Extend RT PCRs Done
3,625,910,458 UART: [art] Lock RT PCRs Done
3,625,911,955 UART: [art] Populate DV Done
3,625,917,413 UART: [fht] FMC Alias Private Key: 7
3,625,918,947 UART: [art] Derive CDI
3,625,919,706 UART: [art] Store in slot 0x4
3,625,962,457 UART: [art] Derive Key Pair
3,625,963,496 UART: [art] Store priv key in slot 0x5
3,629,205,649 UART: [art] Derive Key Pair - Done
3,629,218,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,631,498,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,631,500,102 UART: [art] PUB.X = 0891C6398D8FBC0A0D6F27E4C98F4F3D49702E37E97C98FDABA73AFDADDB6526EED826CCF2CC946B3ADAC2D7C6F95DF1
3,631,507,396 UART: [art] PUB.Y = E657892374978D760BA7BEFE9A0E5B605D744ACEC76F881DEE1F494FC17B5883972576C540763382FC8CECDD0B6B23D8
3,631,514,648 UART: [art] SIG.R = 12A2A7573F428C698B38C05FDA71DA359B052836A088DB74A44B2692DDF76A5DB663789252FDD85D9FA60A497E10A043
3,631,522,037 UART: [art] SIG.S = 9F09980DD2E4CF97CB86E4E7C325EEFED54D0AED09D6E44259B9504B217DC58E50D026046AAE18004B88556413C47DA6
3,632,827,121 UART: Caliptra RT
3,632,827,839 UART: [state] CFI Enabled
3,633,206,283 UART: [rt] RT listening for mailbox commands...
3,633,208,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,633,357,930 UART:
3,633,358,231 UART: Running Caliptra ROM ...
3,633,359,346 UART:
3,633,359,562 UART: [state] CFI Enabled
3,633,372,415 UART: [state] LifecycleState = Unprovisioned
3,633,374,294 UART: [state] DebugLocked = No
3,633,376,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,633,381,390 UART: [kat] SHA2-256
3,633,551,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,633,561,632 UART: [kat] ++
3,633,562,188 UART: [kat] sha1
3,633,574,701 UART: [kat] SHA2-256
3,633,577,398 UART: [kat] SHA2-384
3,633,583,437 UART: [kat] SHA2-512-ACC
3,633,585,782 UART: [kat] ECC-384
3,635,872,709 UART: [kat] HMAC-384Kdf
3,635,885,321 UART: [kat] LMS
3,637,075,369 UART: [kat] --
3,637,081,536 UART: [update-reset] ++
3,641,284,495 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,641,287,840 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,641,685,597 >>> mbox cmd response: success
3,641,686,999 UART: [update-reset] Copying MAN_2 To MAN_1
3,641,709,385 UART: [update-reset Success] --
3,641,714,739 UART: [state] Locking Datavault
3,641,718,430 UART: [state] Locking PCR0, PCR1 and PCR31
3,641,720,203 UART: [state] Locking ICCM
3,641,721,355 UART: [exit] Launching FMC @ 0x40000130
3,641,729,799 UART:
3,641,730,033 UART: Running Caliptra FMC ...
3,641,731,133 UART:
3,641,731,291 UART: [state] CFI Enabled
3,641,775,243 UART: [art] Extend RT PCRs Done
3,641,776,389 UART: [art] Lock RT PCRs Done
3,641,778,162 UART: [art] Populate DV Done
3,641,783,608 UART: [fht] FMC Alias Private Key: 7
3,641,785,316 UART: [art] Derive CDI
3,641,786,127 UART: [art] Store in slot 0x4
3,641,828,286 UART: [art] Derive Key Pair
3,641,829,282 UART: [art] Store priv key in slot 0x5
3,645,071,755 UART: [art] Derive Key Pair - Done
3,645,084,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,647,364,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,647,366,476 UART: [art] PUB.X = 4C65B3BF082F688CF8B82B9CC1D963FFBC36CE28D46927BA8F0E3A749D72A431FEBB546B749742622C851CBB0D4785CC
3,647,373,774 UART: [art] PUB.Y = 6778AFC3883700E025444A507EFE605C2EE15A2FCC15DFAC7D7B6C79392572BD680A3E723B2D7B98A71DBB8E491D7C55
3,647,381,026 UART: [art] SIG.R = B8953D6852E9505243D103D0CE8B0019282BC0D1BEF63256D81A2B3F5F37176FDF98E90F7778E2CABCD1AB650BFDF397
3,647,388,432 UART: [art] SIG.S = 0BDC0103A7D5F62AA797360E70E652892EACFD192A37E1ED4A55BA1B88F32EB01877A0BA38A8FE078488BA10BEE91F02
3,648,693,732 UART: Caliptra RT
3,648,694,445 UART: [state] CFI Enabled
3,649,066,310 UART: [rt] RT listening for mailbox commands...
3,649,068,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,649,217,913 UART:
3,649,218,347 UART: Running Caliptra ROM ...
3,649,219,481 UART:
3,649,219,646 UART: [state] CFI Enabled
3,649,742,960 UART: [state] LifecycleState = Unprovisioned
3,649,744,997 UART: [state] DebugLocked = No
3,649,746,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,649,750,441 UART: [kat] SHA2-256
3,649,920,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,649,930,711 UART: [kat] ++
3,649,931,172 UART: [kat] sha1
3,649,942,709 UART: [kat] SHA2-256
3,649,945,394 UART: [kat] SHA2-384
3,649,950,035 UART: [kat] SHA2-512-ACC
3,649,952,442 UART: [kat] ECC-384
3,652,237,099 UART: [kat] HMAC-384Kdf
3,652,247,502 UART: [kat] LMS
3,653,437,560 UART: [kat] --
3,653,444,053 UART: [update-reset] ++
3,657,642,513 UART: [update-reset] Image verified using Vendor ECC Key Index 0
3,657,646,998 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
3,658,044,715 >>> mbox cmd response: success
3,658,045,908 UART: [update-reset] Copying MAN_2 To MAN_1
3,658,068,311 UART: [update-reset Success] --
3,658,072,437 UART: [state] Locking Datavault
3,658,074,877 UART: [state] Locking PCR0, PCR1 and PCR31
3,658,076,628 UART: [state] Locking ICCM
3,658,079,075 UART: [exit] Launching FMC @ 0x40000130
3,658,087,534 UART:
3,658,087,767 UART: Running Caliptra FMC ...
3,658,088,796 UART:
3,658,088,946 UART: [state] CFI Enabled
3,658,133,606 UART: [art] Extend RT PCRs Done
3,658,134,791 UART: [art] Lock RT PCRs Done
3,658,136,223 UART: [art] Populate DV Done
3,658,141,948 UART: [fht] FMC Alias Private Key: 7
3,658,143,595 UART: [art] Derive CDI
3,658,144,329 UART: [art] Store in slot 0x4
3,658,186,808 UART: [art] Derive Key Pair
3,658,187,863 UART: [art] Store priv key in slot 0x5
3,661,429,565 UART: [art] Derive Key Pair - Done
3,661,442,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,663,723,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,663,724,620 UART: [art] PUB.X = 0891C6398D8FBC0A0D6F27E4C98F4F3D49702E37E97C98FDABA73AFDADDB6526EED826CCF2CC946B3ADAC2D7C6F95DF1
3,663,731,914 UART: [art] PUB.Y = E657892374978D760BA7BEFE9A0E5B605D744ACEC76F881DEE1F494FC17B5883972576C540763382FC8CECDD0B6B23D8
3,663,739,188 UART: [art] SIG.R = 12A2A7573F428C698B38C05FDA71DA359B052836A088DB74A44B2692DDF76A5DB663789252FDD85D9FA60A497E10A043
3,663,746,580 UART: [art] SIG.S = 9F09980DD2E4CF97CB86E4E7C325EEFED54D0AED09D6E44259B9504B217DC58E50D026046AAE18004B88556413C47DA6
3,665,051,646 UART: Caliptra RT
3,665,052,365 UART: [state] CFI Enabled
3,665,427,708 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 398.34s
Truncated 698585 bytes from beginning
= 7
3,671,007,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,671,009,293 UART: [art] PUB.X = 17615EF7942B84480B9FB8634CAA6839D52DE6CE220569AE9BBF1F4A7AF9477AE3710CCAFFD0C6D3EED9FB69D195712A
3,671,016,602 UART: [art] PUB.Y = 86E9EA10C0A9E61A41AD664C9E0EFB18DCF31D0EEED1D6F704EA70DC00C47B73E68B56BB7415F20F1A6CC2F359FA0C8E
3,671,023,846 UART: [art] SIG.R = 66FDE51372793833BF310E723051B0472FB5B51BF20877EB9C062498C26157AA2AD79A647572D0D857FB98D52C12BF1D
3,671,031,241 UART: [art] SIG.S = A9FBA743C04EA04204B72E61B6E9D25B7783E2ECE8AED1C0E24D00C562137025D8927DFBC010818B0670B2461CA89088
3,672,336,399 UART: Caliptra RT
3,672,337,119 UART: [state] CFI Enabled
3,672,710,832 UART: [rt] RT listening for mailbox commands...
3,672,712,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,461,524 >>> mbox cmd response: success
3,681,492,909 UART:
3,681,493,179 UART: Running Caliptra FMC ...
3,681,494,219 UART:
3,681,494,371 UART: [state] CFI Enabled
3,681,538,402 UART: [art] Extend RT PCRs Done
3,681,539,593 UART: [art] Lock RT PCRs Done
3,681,540,944 UART: [art] Populate DV Done
3,681,546,514 UART: [fht] FMC Alias Private Key: 7
3,681,548,290 UART: [art] Derive CDI
3,681,549,040 UART: [art] Store in slot 0x4
3,681,591,746 UART: [art] Derive Key Pair
3,681,592,770 UART: [art] Store priv key in slot 0x5
3,684,834,619 UART: [art] Derive Key Pair - Done
3,684,847,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,687,127,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,687,129,054 UART: [art] PUB.X = 100365D9A1AE404461805F66CEF58CA6F3806D8B1225F1EC22C1FCCF4C98523FFF96022C943C0B0DD0602774BEE7BD35
3,687,136,314 UART: [art] PUB.Y = 48F3DB3DDF3507025BD8371A7FE7B41946FA13C22B4AE335E403E7764A9C134C3C10A579A1785FFB2E8D525D3ABF5921
3,687,143,599 UART: [art] SIG.R = EDD6F04000DF132E8438D87B147E8DC9F18156AE83CFAA8B6D9AC738A5572BEA7863CF44BA625548BB2FEE8231AE0E90
3,687,150,998 UART: [art] SIG.S = 28814AC8F4A912F25E1BEB6A083C3F0716A5C8A04981A3A2D0240672EDFAA0C571DF0461D8491983EC514C59B9446E48
3,688,456,405 UART: Caliptra RT
3,688,457,119 UART: [state] CFI Enabled
3,688,828,115 UART: [rt] RT listening for mailbox commands...
3,688,830,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,697,577,586 >>> mbox cmd response: success
3,697,614,578 UART:
3,697,614,881 UART: Running Caliptra FMC ...
3,697,616,000 UART:
3,697,616,192 UART: [state] CFI Enabled
3,697,660,965 UART: [art] Extend RT PCRs Done
3,697,662,110 UART: [art] Lock RT PCRs Done
3,697,663,451 UART: [art] Populate DV Done
3,697,668,801 UART: [fht] FMC Alias Private Key: 7
3,697,670,444 UART: [art] Derive CDI
3,697,671,252 UART: [art] Store in slot 0x4
3,697,713,473 UART: [art] Derive Key Pair
3,697,714,515 UART: [art] Store priv key in slot 0x5
3,700,956,330 UART: [art] Derive Key Pair - Done
3,700,969,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,703,250,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,703,251,887 UART: [art] PUB.X = 17615EF7942B84480B9FB8634CAA6839D52DE6CE220569AE9BBF1F4A7AF9477AE3710CCAFFD0C6D3EED9FB69D195712A
3,703,259,189 UART: [art] PUB.Y = 86E9EA10C0A9E61A41AD664C9E0EFB18DCF31D0EEED1D6F704EA70DC00C47B73E68B56BB7415F20F1A6CC2F359FA0C8E
3,703,266,480 UART: [art] SIG.R = 66FDE51372793833BF310E723051B0472FB5B51BF20877EB9C062498C26157AA2AD79A647572D0D857FB98D52C12BF1D
3,703,273,820 UART: [art] SIG.S = A9FBA743C04EA04204B72E61B6E9D25B7783E2ECE8AED1C0E24D00C562137025D8927DFBC010818B0670B2461CA89088
3,704,579,179 UART: Caliptra RT
3,704,579,895 UART: [state] CFI Enabled
3,704,953,398 UART: [rt] RT listening for mailbox commands...
3,704,955,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,713,699,596 >>> mbox cmd response: success
3,713,732,309 UART:
3,713,732,576 UART: Running Caliptra FMC ...
3,713,733,685 UART:
3,713,733,858 UART: [state] CFI Enabled
3,713,778,367 UART: [art] Extend RT PCRs Done
3,713,779,551 UART: [art] Lock RT PCRs Done
3,713,780,631 UART: [art] Populate DV Done
3,713,786,201 UART: [fht] FMC Alias Private Key: 7
3,713,787,898 UART: [art] Derive CDI
3,713,788,712 UART: [art] Store in slot 0x4
3,713,831,579 UART: [art] Derive Key Pair
3,713,832,593 UART: [art] Store priv key in slot 0x5
3,717,074,845 UART: [art] Derive Key Pair - Done
3,717,087,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,719,368,312 UART: [art] Erasing AUTHORITY.KEYID = 7
3,719,369,826 UART: [art] PUB.X = 100365D9A1AE404461805F66CEF58CA6F3806D8B1225F1EC22C1FCCF4C98523FFF96022C943C0B0DD0602774BEE7BD35
3,719,377,075 UART: [art] PUB.Y = 48F3DB3DDF3507025BD8371A7FE7B41946FA13C22B4AE335E403E7764A9C134C3C10A579A1785FFB2E8D525D3ABF5921
3,719,384,374 UART: [art] SIG.R = EDD6F04000DF132E8438D87B147E8DC9F18156AE83CFAA8B6D9AC738A5572BEA7863CF44BA625548BB2FEE8231AE0E90
3,719,391,712 UART: [art] SIG.S = 28814AC8F4A912F25E1BEB6A083C3F0716A5C8A04981A3A2D0240672EDFAA0C571DF0461D8491983EC514C59B9446E48
3,720,697,375 UART: Caliptra RT
3,720,698,073 UART: [state] CFI Enabled
3,721,069,612 UART: [rt] RT listening for mailbox commands...
3,721,071,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,729,825,629 >>> mbox cmd response: success
3,729,857,522 UART:
3,729,857,826 UART: Running Caliptra FMC ...
3,729,858,866 UART:
3,729,859,040 UART: [state] CFI Enabled
3,729,903,072 UART: [art] Extend RT PCRs Done
3,729,904,224 UART: [art] Lock RT PCRs Done
3,729,905,646 UART: [art] Populate DV Done
3,729,911,104 UART: [fht] FMC Alias Private Key: 7
3,729,912,582 UART: [art] Derive CDI
3,729,913,319 UART: [art] Store in slot 0x4
3,729,956,239 UART: [art] Derive Key Pair
3,729,957,282 UART: [art] Store priv key in slot 0x5
3,733,199,235 UART: [art] Derive Key Pair - Done
3,733,211,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,492,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,493,728 UART: [art] PUB.X = 17615EF7942B84480B9FB8634CAA6839D52DE6CE220569AE9BBF1F4A7AF9477AE3710CCAFFD0C6D3EED9FB69D195712A
3,735,501,033 UART: [art] PUB.Y = 86E9EA10C0A9E61A41AD664C9E0EFB18DCF31D0EEED1D6F704EA70DC00C47B73E68B56BB7415F20F1A6CC2F359FA0C8E
3,735,508,279 UART: [art] SIG.R = 66FDE51372793833BF310E723051B0472FB5B51BF20877EB9C062498C26157AA2AD79A647572D0D857FB98D52C12BF1D
3,735,515,672 UART: [art] SIG.S = A9FBA743C04EA04204B72E61B6E9D25B7783E2ECE8AED1C0E24D00C562137025D8927DFBC010818B0670B2461CA89088
3,736,821,089 UART: Caliptra RT
3,736,821,813 UART: [state] CFI Enabled
3,737,190,388 UART: [rt] RT listening for mailbox commands...
3,737,192,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,745,939,786 >>> mbox cmd response: success
3,745,975,850 UART:
3,745,976,128 UART: Running Caliptra FMC ...
3,745,977,239 UART:
3,745,977,401 UART: [state] CFI Enabled
3,746,021,914 UART: [art] Extend RT PCRs Done
3,746,023,111 UART: [art] Lock RT PCRs Done
3,746,024,409 UART: [art] Populate DV Done
3,746,030,033 UART: [fht] FMC Alias Private Key: 7
3,746,031,571 UART: [art] Derive CDI
3,746,032,386 UART: [art] Store in slot 0x4
3,746,075,038 UART: [art] Derive Key Pair
3,746,076,065 UART: [art] Store priv key in slot 0x5
3,749,317,835 UART: [art] Derive Key Pair - Done
3,749,330,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,751,611,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,751,612,573 UART: [art] PUB.X = 100365D9A1AE404461805F66CEF58CA6F3806D8B1225F1EC22C1FCCF4C98523FFF96022C943C0B0DD0602774BEE7BD35
3,751,619,871 UART: [art] PUB.Y = 48F3DB3DDF3507025BD8371A7FE7B41946FA13C22B4AE335E403E7764A9C134C3C10A579A1785FFB2E8D525D3ABF5921
3,751,627,155 UART: [art] SIG.R = EDD6F04000DF132E8438D87B147E8DC9F18156AE83CFAA8B6D9AC738A5572BEA7863CF44BA625548BB2FEE8231AE0E90
3,751,634,491 UART: [art] SIG.S = 28814AC8F4A912F25E1BEB6A083C3F0716A5C8A04981A3A2D0240672EDFAA0C571DF0461D8491983EC514C59B9446E48
3,752,938,928 UART: Caliptra RT
3,752,939,639 UART: [state] CFI Enabled
3,753,315,710 UART: [rt] RT listening for mailbox commands...
3,753,317,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,762,063,920 >>> mbox cmd response: success
3,762,098,335 UART:
3,762,098,652 UART: Running Caliptra FMC ...
3,762,099,785 UART:
3,762,099,978 UART: [state] CFI Enabled
3,762,144,763 UART: [art] Extend RT PCRs Done
3,762,145,907 UART: [art] Lock RT PCRs Done
3,762,147,308 UART: [art] Populate DV Done
3,762,152,610 UART: [fht] FMC Alias Private Key: 7
3,762,154,196 UART: [art] Derive CDI
3,762,155,005 UART: [art] Store in slot 0x4
3,762,197,395 UART: [art] Derive Key Pair
3,762,198,437 UART: [art] Store priv key in slot 0x5
3,765,440,429 UART: [art] Derive Key Pair - Done
3,765,453,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,767,733,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,767,735,178 UART: [art] PUB.X = 17615EF7942B84480B9FB8634CAA6839D52DE6CE220569AE9BBF1F4A7AF9477AE3710CCAFFD0C6D3EED9FB69D195712A
3,767,742,484 UART: [art] PUB.Y = 86E9EA10C0A9E61A41AD664C9E0EFB18DCF31D0EEED1D6F704EA70DC00C47B73E68B56BB7415F20F1A6CC2F359FA0C8E
3,767,749,715 UART: [art] SIG.R = 66FDE51372793833BF310E723051B0472FB5B51BF20877EB9C062498C26157AA2AD79A647572D0D857FB98D52C12BF1D
3,767,757,104 UART: [art] SIG.S = A9FBA743C04EA04204B72E61B6E9D25B7783E2ECE8AED1C0E24D00C562137025D8927DFBC010818B0670B2461CA89088
3,769,062,460 UART: Caliptra RT
3,769,063,178 UART: [state] CFI Enabled
3,769,435,120 UART: [rt] RT listening for mailbox commands...
3,769,437,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,778,315,953 >>> mbox cmd response: success
3,778,351,471 UART:
3,778,351,770 UART: Running Caliptra FMC ...
3,778,352,891 UART:
3,778,353,052 UART: [state] CFI Enabled
3,778,397,284 UART: [art] Extend RT PCRs Done
3,778,398,429 UART: [art] Lock RT PCRs Done
3,778,399,878 UART: [art] Populate DV Done
3,778,405,014 UART: [fht] FMC Alias Private Key: 7
3,778,406,652 UART: [art] Derive CDI
3,778,407,472 UART: [art] Store in slot 0x4
3,778,449,690 UART: [art] Derive Key Pair
3,778,450,709 UART: [art] Store priv key in slot 0x5
3,781,692,645 UART: [art] Derive Key Pair - Done
3,781,705,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,783,985,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,783,987,292 UART: [art] PUB.X = 100365D9A1AE404461805F66CEF58CA6F3806D8B1225F1EC22C1FCCF4C98523FFF96022C943C0B0DD0602774BEE7BD35
3,783,994,547 UART: [art] PUB.Y = 48F3DB3DDF3507025BD8371A7FE7B41946FA13C22B4AE335E403E7764A9C134C3C10A579A1785FFB2E8D525D3ABF5921
3,784,001,989 UART: [art] SIG.R = EDD6F04000DF132E8438D87B147E8DC9F18156AE83CFAA8B6D9AC738A5572BEA7863CF44BA625548BB2FEE8231AE0E90
3,784,009,212 UART: [art] SIG.S = 28814AC8F4A912F25E1BEB6A083C3F0716A5C8A04981A3A2D0240672EDFAA0C571DF0461D8491983EC514C59B9446E48
3,785,314,534 UART: Caliptra RT
3,785,315,229 UART: [state] CFI Enabled
3,785,687,872 UART: [rt] RT listening for mailbox commands...
3,785,689,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,794,427,768 >>> mbox cmd response: success
3,794,461,451 UART:
3,794,461,721 UART: Running Caliptra FMC ...
3,794,462,838 UART:
3,794,463,019 UART: [state] CFI Enabled
3,794,506,998 UART: [art] Extend RT PCRs Done
3,794,508,193 UART: [art] Lock RT PCRs Done
3,794,509,435 UART: [art] Populate DV Done
3,794,515,007 UART: [fht] FMC Alias Private Key: 7
3,794,516,601 UART: [art] Derive CDI
3,794,517,413 UART: [art] Store in slot 0x4
3,794,559,788 UART: [art] Derive Key Pair
3,794,560,785 UART: [art] Store priv key in slot 0x5
3,797,802,479 UART: [art] Derive Key Pair - Done
3,797,815,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,800,095,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,800,097,398 UART: [art] PUB.X = 17615EF7942B84480B9FB8634CAA6839D52DE6CE220569AE9BBF1F4A7AF9477AE3710CCAFFD0C6D3EED9FB69D195712A
3,800,104,709 UART: [art] PUB.Y = 86E9EA10C0A9E61A41AD664C9E0EFB18DCF31D0EEED1D6F704EA70DC00C47B73E68B56BB7415F20F1A6CC2F359FA0C8E
3,800,111,998 UART: [art] SIG.R = 66FDE51372793833BF310E723051B0472FB5B51BF20877EB9C062498C26157AA2AD79A647572D0D857FB98D52C12BF1D
3,800,119,333 UART: [art] SIG.S = A9FBA743C04EA04204B72E61B6E9D25B7783E2ECE8AED1C0E24D00C562137025D8927DFBC010818B0670B2461CA89088
3,801,424,874 UART: Caliptra RT
3,801,425,595 UART: [state] CFI Enabled
3,801,799,498 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 405.16s
Truncated 1311866 bytes from beginning
g Datavault
2,240,979,360 UART: [state] Locking PCR0, PCR1 and PCR31
2,240,981,059 UART: [state] Locking ICCM
2,240,983,741 UART: [exit] Launching FMC @ 0x40000130
2,240,992,131 UART:
2,240,992,381 UART: Running Caliptra FMC ...
2,240,993,407 UART:
2,240,993,557 UART: [state] CFI Enabled
2,241,090,436 UART: [art] Extend RT PCRs Done
2,241,091,658 UART: [art] Lock RT PCRs Done
2,241,092,990 UART: [art] Populate DV Done
2,241,098,493 UART: [fht] FMC Alias Private Key: 7
2,241,100,258 UART: [art] Derive CDI
2,241,101,032 UART: [art] Store in slot 0x4
2,241,159,989 UART: [art] Derive Key Pair
2,241,160,993 UART: [art] Store priv key in slot 0x5
2,243,624,477 UART: [art] Derive Key Pair - Done
2,243,637,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,245,349,939 UART: [art] Erasing AUTHORITY.KEYID = 7
2,245,351,441 UART: [art] PUB.X = 90B5E96E2EF07FE26E9F8B334E92611BF9E22BC5A801A35560F2E6CE57088BFB11822ED11CCADAE7AC70C9203E0282E8
2,245,358,759 UART: [art] PUB.Y = DC4F91A06D8C2B13483413AC02A62E4DFDA37066DBC58B7C4010C95AB64F36CBF3EF034503EB5F19A2C256B24332C8E1
2,245,366,073 UART: [art] SIG.R = E514B4824EFEE7B9F229ADFAAED91A660BC4F7C90274B0A14D758FD74365BC9F8DA228D94309755D6E7E83D48EA5C87D
2,245,373,476 UART: [art] SIG.S = F7AF1EB50E2AEBCD4B18F7BCBD21B9D532811F75A1FB684623F46955DD376BFCA7240E07E3DC98E4C7F784BB09AD91A8
2,246,351,760 UART: Caliptra RT
2,246,352,457 UART: [state] CFI Enabled
2,246,769,622 UART: [rt] RT listening for mailbox commands...
2,246,771,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,246,921,475 UART:
2,246,921,780 UART: Running Caliptra ROM ...
2,246,922,898 UART:
2,246,923,057 UART: [state] CFI Enabled
2,246,986,745 UART: [state] LifecycleState = Unprovisioned
2,246,988,675 UART: [state] DebugLocked = No
2,246,989,952 UART: [state] WD Timer not started. Device not locked for debugging
2,246,994,114 UART: [kat] SHA2-256
2,247,173,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,247,184,555 UART: [kat] ++
2,247,185,035 UART: [kat] sha1
2,247,196,411 UART: [kat] SHA2-256
2,247,199,104 UART: [kat] SHA2-384
2,247,205,738 UART: [kat] SHA2-512-ACC
2,247,208,138 UART: [kat] ECC-384
2,249,652,857 UART: [kat] HMAC-384Kdf
2,249,675,121 UART: [kat] LMS
2,250,151,574 UART: [kat] --
2,250,154,965 UART: [update-reset] ++
2,253,652,248 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,253,656,386 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,254,054,042 >>> mbox cmd response: success
2,254,054,431 UART: [update-reset] Copying MAN_2 To MAN_1
2,254,091,364 UART: [update-reset Success] --
2,254,094,503 UART: [state] Locking Datavault
2,254,099,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,254,100,990 UART: [state] Locking ICCM
2,254,102,845 UART: [exit] Launching FMC @ 0x40000130
2,254,111,184 UART:
2,254,111,424 UART: Running Caliptra FMC ...
2,254,112,448 UART:
2,254,112,597 UART: [state] CFI Enabled
2,254,210,760 UART: [art] Extend RT PCRs Done
2,254,211,943 UART: [art] Lock RT PCRs Done
2,254,213,427 UART: [art] Populate DV Done
2,254,218,887 UART: [fht] FMC Alias Private Key: 7
2,254,220,532 UART: [art] Derive CDI
2,254,221,301 UART: [art] Store in slot 0x4
2,254,279,331 UART: [art] Derive Key Pair
2,254,280,339 UART: [art] Store priv key in slot 0x5
2,256,743,380 UART: [art] Derive Key Pair - Done
2,256,755,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,258,469,599 UART: [art] Erasing AUTHORITY.KEYID = 7
2,258,471,126 UART: [art] PUB.X = F43C5C8A19097A63BD3BD46EA01C3329619BF78875CD455F2F41BF1C822599601CC1D2075ED7C229C5A25D49DCDDAD58
2,258,478,384 UART: [art] PUB.Y = 16087FA96AFDBF3237C4A2EE025592AA8C77667F248FC0CAC241BF8EC4B8E9823FF0C5361961F90A73887F5E6884646C
2,258,485,676 UART: [art] SIG.R = 481026F89F40F7186B6C7B8D8A0EC02F28C6993C687A823D33BC4AA79573A48DB87F73677CA28A7B6853A0A2FA44BF26
2,258,493,021 UART: [art] SIG.S = E01D4146A1BA60FD596D38C1B66FB66B72A71F33BD4BF19124BE90C318A5EC02951821D5C78E208B003E6B851557D75B
2,259,471,911 UART: Caliptra RT
2,259,472,605 UART: [state] CFI Enabled
2,259,892,986 UART: [rt] RT listening for mailbox commands...
2,259,894,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,260,044,953 UART:
2,260,045,271 UART: Running Caliptra ROM ...
2,260,046,401 UART:
2,260,046,569 UART: [state] CFI Enabled
2,260,109,830 UART: [state] LifecycleState = Unprovisioned
2,260,111,763 UART: [state] DebugLocked = No
2,260,114,392 UART: [state] WD Timer not started. Device not locked for debugging
2,260,117,769 UART: [kat] SHA2-256
2,260,297,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,260,308,177 UART: [kat] ++
2,260,308,722 UART: [kat] sha1
2,260,320,644 UART: [kat] SHA2-256
2,260,323,341 UART: [kat] SHA2-384
2,260,328,189 UART: [kat] SHA2-512-ACC
2,260,330,531 UART: [kat] ECC-384
2,262,794,962 UART: [kat] HMAC-384Kdf
2,262,817,138 UART: [kat] LMS
2,263,293,585 UART: [kat] --
2,263,299,262 UART: [update-reset] ++
2,266,792,049 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,266,796,349 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,267,193,965 >>> mbox cmd response: success
2,267,194,730 UART: [update-reset] Copying MAN_2 To MAN_1
2,267,231,827 UART: [update-reset Success] --
2,267,235,300 UART: [state] Locking Datavault
2,267,239,477 UART: [state] Locking PCR0, PCR1 and PCR31
2,267,241,174 UART: [state] Locking ICCM
2,267,242,653 UART: [exit] Launching FMC @ 0x40000130
2,267,251,042 UART:
2,267,251,282 UART: Running Caliptra FMC ...
2,267,252,380 UART:
2,267,252,537 UART: [state] CFI Enabled
2,267,350,628 UART: [art] Extend RT PCRs Done
2,267,351,823 UART: [art] Lock RT PCRs Done
2,267,353,627 UART: [art] Populate DV Done
2,267,359,191 UART: [fht] FMC Alias Private Key: 7
2,267,360,831 UART: [art] Derive CDI
2,267,361,644 UART: [art] Store in slot 0x4
2,267,419,276 UART: [art] Derive Key Pair
2,267,420,296 UART: [art] Store priv key in slot 0x5
2,269,882,911 UART: [art] Derive Key Pair - Done
2,269,896,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,271,608,583 UART: [art] Erasing AUTHORITY.KEYID = 7
2,271,610,092 UART: [art] PUB.X = 90B5E96E2EF07FE26E9F8B334E92611BF9E22BC5A801A35560F2E6CE57088BFB11822ED11CCADAE7AC70C9203E0282E8
2,271,617,403 UART: [art] PUB.Y = DC4F91A06D8C2B13483413AC02A62E4DFDA37066DBC58B7C4010C95AB64F36CBF3EF034503EB5F19A2C256B24332C8E1
2,271,624,649 UART: [art] SIG.R = E514B4824EFEE7B9F229ADFAAED91A660BC4F7C90274B0A14D758FD74365BC9F8DA228D94309755D6E7E83D48EA5C87D
2,271,632,051 UART: [art] SIG.S = F7AF1EB50E2AEBCD4B18F7BCBD21B9D532811F75A1FB684623F46955DD376BFCA7240E07E3DC98E4C7F784BB09AD91A8
2,272,611,335 UART: Caliptra RT
2,272,612,052 UART: [state] CFI Enabled
2,273,035,247 UART: [rt] RT listening for mailbox commands...
2,273,037,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,273,187,189 UART:
2,273,187,494 UART: Running Caliptra ROM ...
2,273,188,529 UART:
2,273,188,680 UART: [state] CFI Enabled
2,273,248,229 UART: [state] LifecycleState = Unprovisioned
2,273,250,117 UART: [state] DebugLocked = No
2,273,252,063 UART: [state] WD Timer not started. Device not locked for debugging
2,273,256,562 UART: [kat] SHA2-256
2,273,436,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,273,447,006 UART: [kat] ++
2,273,447,472 UART: [kat] sha1
2,273,457,712 UART: [kat] SHA2-256
2,273,460,398 UART: [kat] SHA2-384
2,273,467,570 UART: [kat] SHA2-512-ACC
2,273,469,924 UART: [kat] ECC-384
2,275,934,045 UART: [kat] HMAC-384Kdf
2,275,955,026 UART: [kat] LMS
2,276,431,472 UART: [kat] --
2,276,436,073 UART: [update-reset] ++
2,279,936,446 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,279,940,109 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,280,337,705 >>> mbox cmd response: success
2,280,339,226 UART: [update-reset] Copying MAN_2 To MAN_1
2,280,376,294 UART: [update-reset Success] --
2,280,380,851 UART: [state] Locking Datavault
2,280,383,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,280,385,368 UART: [state] Locking ICCM
2,280,387,034 UART: [exit] Launching FMC @ 0x40000130
2,280,395,434 UART:
2,280,395,668 UART: Running Caliptra FMC ...
2,280,396,766 UART:
2,280,396,923 UART: [state] CFI Enabled
2,280,486,903 UART: [art] Extend RT PCRs Done
2,280,488,101 UART: [art] Lock RT PCRs Done
2,280,489,343 UART: [art] Populate DV Done
2,280,494,966 UART: [fht] FMC Alias Private Key: 7
2,280,496,624 UART: [art] Derive CDI
2,280,497,437 UART: [art] Store in slot 0x4
2,280,556,119 UART: [art] Derive Key Pair
2,280,557,187 UART: [art] Store priv key in slot 0x5
2,283,020,044 UART: [art] Derive Key Pair - Done
2,283,032,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,284,745,431 UART: [art] Erasing AUTHORITY.KEYID = 7
2,284,746,943 UART: [art] PUB.X = F43C5C8A19097A63BD3BD46EA01C3329619BF78875CD455F2F41BF1C822599601CC1D2075ED7C229C5A25D49DCDDAD58
2,284,754,254 UART: [art] PUB.Y = 16087FA96AFDBF3237C4A2EE025592AA8C77667F248FC0CAC241BF8EC4B8E9823FF0C5361961F90A73887F5E6884646C
2,284,761,495 UART: [art] SIG.R = 481026F89F40F7186B6C7B8D8A0EC02F28C6993C687A823D33BC4AA79573A48DB87F73677CA28A7B6853A0A2FA44BF26
2,284,768,905 UART: [art] SIG.S = E01D4146A1BA60FD596D38C1B66FB66B72A71F33BD4BF19124BE90C318A5EC02951821D5C78E208B003E6B851557D75B
2,285,747,550 UART: Caliptra RT
2,285,748,254 UART: [state] CFI Enabled
2,286,164,733 UART: [rt] RT listening for mailbox commands...
2,286,166,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,286,316,539 UART:
2,286,316,862 UART: Running Caliptra ROM ...
2,286,317,899 UART:
2,286,318,049 UART: [state] CFI Enabled
2,286,386,656 UART: [state] LifecycleState = Unprovisioned
2,286,388,587 UART: [state] DebugLocked = No
2,286,391,004 UART: [state] WD Timer not started. Device not locked for debugging
2,286,394,530 UART: [kat] SHA2-256
2,286,574,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,286,585,005 UART: [kat] ++
2,286,585,547 UART: [kat] sha1
2,286,596,169 UART: [kat] SHA2-256
2,286,598,861 UART: [kat] SHA2-384
2,286,605,818 UART: [kat] SHA2-512-ACC
2,286,608,161 UART: [kat] ECC-384
2,289,070,346 UART: [kat] HMAC-384Kdf
2,289,090,808 UART: [kat] LMS
2,289,567,259 UART: [kat] --
2,289,572,867 UART: [update-reset] ++
2,293,073,502 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,293,076,937 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,293,474,557 >>> mbox cmd response: success
2,293,476,454 UART: [update-reset] Copying MAN_2 To MAN_1
2,293,513,575 UART: [update-reset Success] --
2,293,518,225 UART: [state] Locking Datavault
2,293,520,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,293,522,634 UART: [state] Locking ICCM
2,293,525,029 UART: [exit] Launching FMC @ 0x40000130
2,293,533,420 UART:
2,293,533,649 UART: Running Caliptra FMC ...
2,293,534,673 UART:
2,293,534,819 UART: [state] CFI Enabled
2,293,625,137 UART: [art] Extend RT PCRs Done
2,293,626,340 UART: [art] Lock RT PCRs Done
2,293,627,932 UART: [art] Populate DV Done
2,293,633,504 UART: [fht] FMC Alias Private Key: 7
2,293,635,043 UART: [art] Derive CDI
2,293,635,861 UART: [art] Store in slot 0x4
2,293,693,925 UART: [art] Derive Key Pair
2,293,694,965 UART: [art] Store priv key in slot 0x5
2,296,157,095 UART: [art] Derive Key Pair - Done
2,296,170,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,297,883,588 UART: [art] Erasing AUTHORITY.KEYID = 7
2,297,885,101 UART: [art] PUB.X = 90B5E96E2EF07FE26E9F8B334E92611BF9E22BC5A801A35560F2E6CE57088BFB11822ED11CCADAE7AC70C9203E0282E8
2,297,892,412 UART: [art] PUB.Y = DC4F91A06D8C2B13483413AC02A62E4DFDA37066DBC58B7C4010C95AB64F36CBF3EF034503EB5F19A2C256B24332C8E1
2,297,899,664 UART: [art] SIG.R = E514B4824EFEE7B9F229ADFAAED91A660BC4F7C90274B0A14D758FD74365BC9F8DA228D94309755D6E7E83D48EA5C87D
2,297,907,154 UART: [art] SIG.S = F7AF1EB50E2AEBCD4B18F7BCBD21B9D532811F75A1FB684623F46955DD376BFCA7240E07E3DC98E4C7F784BB09AD91A8
2,298,886,142 UART: Caliptra RT
2,298,886,893 UART: [state] CFI Enabled
2,299,310,326 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 330.04s
Truncated 697233 bytes from beginning
= 7
2,186,535,238 UART: [art] Erasing AUTHORITY.KEYID = 7
2,186,536,761 UART: [art] PUB.X = C3F4FF97E1EF4783EB7422C87B3CE044DF28E3B18C02882E33DE3AE1F24FBE5192F72C9134E2BB7EE37F8F726859315A
2,186,544,031 UART: [art] PUB.Y = 9DDE9DCC5AC55DDF72085EF00AD8C87F2550B70D28F2C36AF67247B91FB15D7091785F19F50808DB39D2ED14E6C76D2C
2,186,551,294 UART: [art] SIG.R = BB1C2F5A6AD3CB2E8AB40B1FF0D554DCC440AE81B2B57AF7621BB2F955B09B8E85FE911A6E9271838D3025384117F3D2
2,186,558,711 UART: [art] SIG.S = 6E80DE3EDB1E9F3FDA3BB45187024DB2A78BBD3FDC6DC089D53BF167C27A27EE42EDDDCA191144CBBAFBE1BFA972CF76
2,187,537,635 UART: Caliptra RT
2,187,538,326 UART: [state] CFI Enabled
2,187,963,086 UART: [rt] RT listening for mailbox commands...
2,187,964,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,195,260,962 >>> mbox cmd response: success
2,195,295,632 UART:
2,195,295,929 UART: Running Caliptra FMC ...
2,195,297,046 UART:
2,195,297,213 UART: [state] CFI Enabled
2,195,392,089 UART: [art] Extend RT PCRs Done
2,195,393,282 UART: [art] Lock RT PCRs Done
2,195,394,793 UART: [art] Populate DV Done
2,195,400,201 UART: [fht] FMC Alias Private Key: 7
2,195,401,950 UART: [art] Derive CDI
2,195,402,700 UART: [art] Store in slot 0x4
2,195,461,316 UART: [art] Derive Key Pair
2,195,462,361 UART: [art] Store priv key in slot 0x5
2,197,924,476 UART: [art] Derive Key Pair - Done
2,197,937,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,199,650,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,199,651,857 UART: [art] PUB.X = A176B79BF127026C385800BAD048C8CF735FA325C8619C9618BEC1B3487A457CC9A0CA41FC0443853880895922B5B401
2,199,659,024 UART: [art] PUB.Y = 0835E861A154FB296A2EFDC0FCDB24514EBE7D1855AF4CF6030471E014479FA687A67C9F8006E744570DB88CE904D501
2,199,666,291 UART: [art] SIG.R = 9174480B6AB9D900B7EBD7A080ADBBA704F538D65568B2D6744E864E485501294A76C083DF24A2F95EEC9E1E13738BAD
2,199,673,653 UART: [art] SIG.S = 3D0DE630AA2993A115F3D09E2FE5A3BC95ED7B64A516EDEBBC5CC4F73009EF711626B7061BDFE0BB5A24AED827BE2BF9
2,200,653,373 UART: Caliptra RT
2,200,654,064 UART: [state] CFI Enabled
2,201,072,352 UART: [rt] RT listening for mailbox commands...
2,201,074,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,208,388,261 >>> mbox cmd response: success
2,208,422,214 UART:
2,208,422,512 UART: Running Caliptra FMC ...
2,208,423,554 UART:
2,208,423,704 UART: [state] CFI Enabled
2,208,528,156 UART: [art] Extend RT PCRs Done
2,208,529,342 UART: [art] Lock RT PCRs Done
2,208,530,714 UART: [art] Populate DV Done
2,208,536,260 UART: [fht] FMC Alias Private Key: 7
2,208,537,746 UART: [art] Derive CDI
2,208,538,485 UART: [art] Store in slot 0x4
2,208,597,744 UART: [art] Derive Key Pair
2,208,598,798 UART: [art] Store priv key in slot 0x5
2,211,061,119 UART: [art] Derive Key Pair - Done
2,211,074,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,212,787,186 UART: [art] Erasing AUTHORITY.KEYID = 7
2,212,788,698 UART: [art] PUB.X = C3F4FF97E1EF4783EB7422C87B3CE044DF28E3B18C02882E33DE3AE1F24FBE5192F72C9134E2BB7EE37F8F726859315A
2,212,795,968 UART: [art] PUB.Y = 9DDE9DCC5AC55DDF72085EF00AD8C87F2550B70D28F2C36AF67247B91FB15D7091785F19F50808DB39D2ED14E6C76D2C
2,212,803,260 UART: [art] SIG.R = BB1C2F5A6AD3CB2E8AB40B1FF0D554DCC440AE81B2B57AF7621BB2F955B09B8E85FE911A6E9271838D3025384117F3D2
2,212,810,638 UART: [art] SIG.S = 6E80DE3EDB1E9F3FDA3BB45187024DB2A78BBD3FDC6DC089D53BF167C27A27EE42EDDDCA191144CBBAFBE1BFA972CF76
2,213,790,107 UART: Caliptra RT
2,213,790,815 UART: [state] CFI Enabled
2,214,209,615 UART: [rt] RT listening for mailbox commands...
2,214,211,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,221,516,374 >>> mbox cmd response: success
2,221,552,386 UART:
2,221,552,697 UART: Running Caliptra FMC ...
2,221,553,736 UART:
2,221,553,886 UART: [state] CFI Enabled
2,221,645,688 UART: [art] Extend RT PCRs Done
2,221,646,877 UART: [art] Lock RT PCRs Done
2,221,648,311 UART: [art] Populate DV Done
2,221,653,505 UART: [fht] FMC Alias Private Key: 7
2,221,655,092 UART: [art] Derive CDI
2,221,655,849 UART: [art] Store in slot 0x4
2,221,714,620 UART: [art] Derive Key Pair
2,221,715,659 UART: [art] Store priv key in slot 0x5
2,224,178,179 UART: [art] Derive Key Pair - Done
2,224,191,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,225,904,142 UART: [art] Erasing AUTHORITY.KEYID = 7
2,225,905,666 UART: [art] PUB.X = A176B79BF127026C385800BAD048C8CF735FA325C8619C9618BEC1B3487A457CC9A0CA41FC0443853880895922B5B401
2,225,912,882 UART: [art] PUB.Y = 0835E861A154FB296A2EFDC0FCDB24514EBE7D1855AF4CF6030471E014479FA687A67C9F8006E744570DB88CE904D501
2,225,920,150 UART: [art] SIG.R = 9174480B6AB9D900B7EBD7A080ADBBA704F538D65568B2D6744E864E485501294A76C083DF24A2F95EEC9E1E13738BAD
2,225,927,535 UART: [art] SIG.S = 3D0DE630AA2993A115F3D09E2FE5A3BC95ED7B64A516EDEBBC5CC4F73009EF711626B7061BDFE0BB5A24AED827BE2BF9
2,226,906,918 UART: Caliptra RT
2,226,907,615 UART: [state] CFI Enabled
2,227,332,116 UART: [rt] RT listening for mailbox commands...
2,227,333,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,234,646,504 >>> mbox cmd response: success
2,234,680,134 UART:
2,234,680,418 UART: Running Caliptra FMC ...
2,234,681,530 UART:
2,234,681,701 UART: [state] CFI Enabled
2,234,785,452 UART: [art] Extend RT PCRs Done
2,234,786,638 UART: [art] Lock RT PCRs Done
2,234,788,150 UART: [art] Populate DV Done
2,234,793,627 UART: [fht] FMC Alias Private Key: 7
2,234,795,222 UART: [art] Derive CDI
2,234,796,038 UART: [art] Store in slot 0x4
2,234,854,064 UART: [art] Derive Key Pair
2,234,855,109 UART: [art] Store priv key in slot 0x5
2,237,318,332 UART: [art] Derive Key Pair - Done
2,237,330,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,239,043,761 UART: [art] Erasing AUTHORITY.KEYID = 7
2,239,045,277 UART: [art] PUB.X = C3F4FF97E1EF4783EB7422C87B3CE044DF28E3B18C02882E33DE3AE1F24FBE5192F72C9134E2BB7EE37F8F726859315A
2,239,052,556 UART: [art] PUB.Y = 9DDE9DCC5AC55DDF72085EF00AD8C87F2550B70D28F2C36AF67247B91FB15D7091785F19F50808DB39D2ED14E6C76D2C
2,239,059,814 UART: [art] SIG.R = BB1C2F5A6AD3CB2E8AB40B1FF0D554DCC440AE81B2B57AF7621BB2F955B09B8E85FE911A6E9271838D3025384117F3D2
2,239,067,190 UART: [art] SIG.S = 6E80DE3EDB1E9F3FDA3BB45187024DB2A78BBD3FDC6DC089D53BF167C27A27EE42EDDDCA191144CBBAFBE1BFA972CF76
2,240,046,791 UART: Caliptra RT
2,240,047,488 UART: [state] CFI Enabled
2,240,469,931 UART: [rt] RT listening for mailbox commands...
2,240,471,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,247,781,384 >>> mbox cmd response: success
2,247,817,171 UART:
2,247,817,434 UART: Running Caliptra FMC ...
2,247,818,547 UART:
2,247,818,711 UART: [state] CFI Enabled
2,247,923,582 UART: [art] Extend RT PCRs Done
2,247,924,769 UART: [art] Lock RT PCRs Done
2,247,926,121 UART: [art] Populate DV Done
2,247,931,637 UART: [fht] FMC Alias Private Key: 7
2,247,933,333 UART: [art] Derive CDI
2,247,934,145 UART: [art] Store in slot 0x4
2,247,992,807 UART: [art] Derive Key Pair
2,247,993,798 UART: [art] Store priv key in slot 0x5
2,250,456,195 UART: [art] Derive Key Pair - Done
2,250,469,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,252,182,139 UART: [art] Erasing AUTHORITY.KEYID = 7
2,252,183,666 UART: [art] PUB.X = A176B79BF127026C385800BAD048C8CF735FA325C8619C9618BEC1B3487A457CC9A0CA41FC0443853880895922B5B401
2,252,190,838 UART: [art] PUB.Y = 0835E861A154FB296A2EFDC0FCDB24514EBE7D1855AF4CF6030471E014479FA687A67C9F8006E744570DB88CE904D501
2,252,198,104 UART: [art] SIG.R = 9174480B6AB9D900B7EBD7A080ADBBA704F538D65568B2D6744E864E485501294A76C083DF24A2F95EEC9E1E13738BAD
2,252,205,462 UART: [art] SIG.S = 3D0DE630AA2993A115F3D09E2FE5A3BC95ED7B64A516EDEBBC5CC4F73009EF711626B7061BDFE0BB5A24AED827BE2BF9
2,253,184,100 UART: Caliptra RT
2,253,184,812 UART: [state] CFI Enabled
2,253,603,583 UART: [rt] RT listening for mailbox commands...
2,253,605,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,260,916,133 >>> mbox cmd response: success
2,260,951,067 UART:
2,260,951,345 UART: Running Caliptra FMC ...
2,260,952,382 UART:
2,260,952,531 UART: [state] CFI Enabled
2,261,042,285 UART: [art] Extend RT PCRs Done
2,261,043,504 UART: [art] Lock RT PCRs Done
2,261,044,945 UART: [art] Populate DV Done
2,261,050,491 UART: [fht] FMC Alias Private Key: 7
2,261,052,147 UART: [art] Derive CDI
2,261,052,889 UART: [art] Store in slot 0x4
2,261,110,905 UART: [art] Derive Key Pair
2,261,111,908 UART: [art] Store priv key in slot 0x5
2,263,574,437 UART: [art] Derive Key Pair - Done
2,263,587,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,265,299,994 UART: [art] Erasing AUTHORITY.KEYID = 7
2,265,301,504 UART: [art] PUB.X = C3F4FF97E1EF4783EB7422C87B3CE044DF28E3B18C02882E33DE3AE1F24FBE5192F72C9134E2BB7EE37F8F726859315A
2,265,308,782 UART: [art] PUB.Y = 9DDE9DCC5AC55DDF72085EF00AD8C87F2550B70D28F2C36AF67247B91FB15D7091785F19F50808DB39D2ED14E6C76D2C
2,265,316,042 UART: [art] SIG.R = BB1C2F5A6AD3CB2E8AB40B1FF0D554DCC440AE81B2B57AF7621BB2F955B09B8E85FE911A6E9271838D3025384117F3D2
2,265,323,417 UART: [art] SIG.S = 6E80DE3EDB1E9F3FDA3BB45187024DB2A78BBD3FDC6DC089D53BF167C27A27EE42EDDDCA191144CBBAFBE1BFA972CF76
2,266,302,540 UART: Caliptra RT
2,266,303,241 UART: [state] CFI Enabled
2,266,717,213 UART: [rt] RT listening for mailbox commands...
2,266,719,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,274,029,184 >>> mbox cmd response: success
2,274,063,534 UART:
2,274,063,809 UART: Running Caliptra FMC ...
2,274,064,848 UART:
2,274,065,003 UART: [state] CFI Enabled
2,274,157,347 UART: [art] Extend RT PCRs Done
2,274,158,538 UART: [art] Lock RT PCRs Done
2,274,160,135 UART: [art] Populate DV Done
2,274,165,548 UART: [fht] FMC Alias Private Key: 7
2,274,167,237 UART: [art] Derive CDI
2,274,168,063 UART: [art] Store in slot 0x4
2,274,226,949 UART: [art] Derive Key Pair
2,274,227,953 UART: [art] Store priv key in slot 0x5
2,276,691,082 UART: [art] Derive Key Pair - Done
2,276,703,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,278,416,498 UART: [art] Erasing AUTHORITY.KEYID = 7
2,278,418,027 UART: [art] PUB.X = A176B79BF127026C385800BAD048C8CF735FA325C8619C9618BEC1B3487A457CC9A0CA41FC0443853880895922B5B401
2,278,425,202 UART: [art] PUB.Y = 0835E861A154FB296A2EFDC0FCDB24514EBE7D1855AF4CF6030471E014479FA687A67C9F8006E744570DB88CE904D501
2,278,432,472 UART: [art] SIG.R = 9174480B6AB9D900B7EBD7A080ADBBA704F538D65568B2D6744E864E485501294A76C083DF24A2F95EEC9E1E13738BAD
2,278,439,847 UART: [art] SIG.S = 3D0DE630AA2993A115F3D09E2FE5A3BC95ED7B64A516EDEBBC5CC4F73009EF711626B7061BDFE0BB5A24AED827BE2BF9
2,279,418,753 UART: Caliptra RT
2,279,419,447 UART: [state] CFI Enabled
2,279,840,495 UART: [rt] RT listening for mailbox commands...
2,279,842,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,287,152,498 >>> mbox cmd response: success
2,287,185,383 UART:
2,287,185,654 UART: Running Caliptra FMC ...
2,287,186,772 UART:
2,287,186,931 UART: [state] CFI Enabled
2,287,277,094 UART: [art] Extend RT PCRs Done
2,287,278,291 UART: [art] Lock RT PCRs Done
2,287,279,914 UART: [art] Populate DV Done
2,287,285,615 UART: [fht] FMC Alias Private Key: 7
2,287,287,139 UART: [art] Derive CDI
2,287,287,914 UART: [art] Store in slot 0x4
2,287,346,466 UART: [art] Derive Key Pair
2,287,347,471 UART: [art] Store priv key in slot 0x5
2,289,810,179 UART: [art] Derive Key Pair - Done
2,289,822,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,291,536,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,291,537,677 UART: [art] PUB.X = C3F4FF97E1EF4783EB7422C87B3CE044DF28E3B18C02882E33DE3AE1F24FBE5192F72C9134E2BB7EE37F8F726859315A
2,291,544,945 UART: [art] PUB.Y = 9DDE9DCC5AC55DDF72085EF00AD8C87F2550B70D28F2C36AF67247B91FB15D7091785F19F50808DB39D2ED14E6C76D2C
2,291,552,249 UART: [art] SIG.R = BB1C2F5A6AD3CB2E8AB40B1FF0D554DCC440AE81B2B57AF7621BB2F955B09B8E85FE911A6E9271838D3025384117F3D2
2,291,559,661 UART: [art] SIG.S = 6E80DE3EDB1E9F3FDA3BB45187024DB2A78BBD3FDC6DC089D53BF167C27A27EE42EDDDCA191144CBBAFBE1BFA972CF76
2,292,538,562 UART: Caliptra RT
2,292,539,272 UART: [state] CFI Enabled
2,292,959,384 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 329.72s
Truncated 1312178 bytes from beginning
g Datavault
2,358,353,573 UART: [state] Locking PCR0, PCR1 and PCR31
2,358,355,338 UART: [state] Locking ICCM
2,358,357,659 UART: [exit] Launching FMC @ 0x40000130
2,358,366,066 UART:
2,358,366,322 UART: Running Caliptra FMC ...
2,358,367,431 UART:
2,358,367,599 UART: [state] CFI Enabled
2,358,412,218 UART: [art] Extend RT PCRs Done
2,358,413,410 UART: [art] Lock RT PCRs Done
2,358,414,555 UART: [art] Populate DV Done
2,358,419,756 UART: [fht] FMC Alias Private Key: 7
2,358,421,355 UART: [art] Derive CDI
2,358,422,176 UART: [art] Store in slot 0x4
2,358,464,635 UART: [art] Derive Key Pair
2,358,465,648 UART: [art] Store priv key in slot 0x5
2,360,892,731 UART: [art] Derive Key Pair - Done
2,360,905,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,612,035 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,613,539 UART: [art] PUB.X = 2519B8AF08B5D2CA9A7F947905CAD0495C3582B00D75E75EA636D6896C4B4596884158314725C1E13D47912886BDCE49
2,362,620,797 UART: [art] PUB.Y = 030190A8ED0903AFCFB8A5975A2B05D79029BBF189712A0C434F0661ED4C129FF896162BF687BA44FAC58CA3073D4E6F
2,362,628,089 UART: [art] SIG.R = AE898F435D1178B2153DA3EF620F7409527A7621AF55E6C3F6E8E1413E6D71D2136F42323198C825AF81332EC1671569
2,362,635,436 UART: [art] SIG.S = 334BD41F3A5B93D2670ADCD9D1C331F96CD33F733E99F517B9A8F68391C080FFD427A382C894AF7248E4FED6E04B6249
2,363,614,479 UART: Caliptra RT
2,363,615,192 UART: [state] CFI Enabled
2,363,989,648 UART: [rt] RT listening for mailbox commands...
2,363,991,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,364,141,676 UART:
2,364,141,987 UART: Running Caliptra ROM ...
2,364,143,029 UART:
2,364,143,322 UART: [state] CFI Enabled
2,365,547,328 UART: [state] LifecycleState = Unprovisioned
2,365,549,295 UART: [state] DebugLocked = No
2,365,551,799 UART: [state] WD Timer not started. Device not locked for debugging
2,365,556,210 UART: [kat] SHA2-256
2,365,735,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,365,746,691 UART: [kat] ++
2,365,747,151 UART: [kat] sha1
2,365,758,959 UART: [kat] SHA2-256
2,365,761,658 UART: [kat] SHA2-384
2,365,767,327 UART: [kat] SHA2-512-ACC
2,365,769,682 UART: [kat] ECC-384
2,368,210,483 UART: [kat] HMAC-384Kdf
2,368,221,958 UART: [kat] LMS
2,368,698,409 UART: [kat] --
2,368,702,854 UART: [update-reset] ++
2,372,197,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,201,844 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,599,501 >>> mbox cmd response: success
2,372,599,883 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,636,992 UART: [update-reset Success] --
2,372,640,420 UART: [state] Locking Datavault
2,372,644,980 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,646,740 UART: [state] Locking ICCM
2,372,649,357 UART: [exit] Launching FMC @ 0x40000130
2,372,657,746 UART:
2,372,657,998 UART: Running Caliptra FMC ...
2,372,659,032 UART:
2,372,659,190 UART: [state] CFI Enabled
2,372,703,642 UART: [art] Extend RT PCRs Done
2,372,704,793 UART: [art] Lock RT PCRs Done
2,372,706,576 UART: [art] Populate DV Done
2,372,711,955 UART: [fht] FMC Alias Private Key: 7
2,372,713,554 UART: [art] Derive CDI
2,372,714,378 UART: [art] Store in slot 0x4
2,372,756,710 UART: [art] Derive Key Pair
2,372,757,758 UART: [art] Store priv key in slot 0x5
2,375,184,681 UART: [art] Derive Key Pair - Done
2,375,197,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,904,207 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,905,717 UART: [art] PUB.X = 067450E780FF1A46CE006D6C0409125D7F9A203FD5447A45001352F1AA19D194222838A99D71B144DB691B33AC155CD7
2,376,912,917 UART: [art] PUB.Y = 8475A11884925F57E8A98B564602F9A7656CAEB0704EDFA23C45A2D8208FE8EF546025C8823D347DBB99128CF8BCE053
2,376,920,205 UART: [art] SIG.R = 9C25514BEC80D7D5334CD381CB1610767B2CDAD1B8BDCDBF8CA572ECB4C2744FF7927EAC9B426F996795AC7D49104FD1
2,376,927,601 UART: [art] SIG.S = 29B1605241CCA2487E1E13D098F519262DD02A02DA91D4DEFB11F5D0292937D96FAA4E418385B636C95AD71EC9AC5296
2,377,905,993 UART: Caliptra RT
2,377,906,703 UART: [state] CFI Enabled
2,378,279,597 UART: [rt] RT listening for mailbox commands...
2,378,281,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,431,501 UART:
2,378,431,808 UART: Running Caliptra ROM ...
2,378,432,846 UART:
2,378,433,163 UART: [state] CFI Enabled
2,378,447,878 UART: [state] LifecycleState = Unprovisioned
2,378,449,773 UART: [state] DebugLocked = No
2,378,452,700 UART: [state] WD Timer not started. Device not locked for debugging
2,378,456,283 UART: [kat] SHA2-256
2,378,635,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,378,646,773 UART: [kat] ++
2,378,647,317 UART: [kat] sha1
2,378,658,325 UART: [kat] SHA2-256
2,378,661,063 UART: [kat] SHA2-384
2,378,667,665 UART: [kat] SHA2-512-ACC
2,378,670,028 UART: [kat] ECC-384
2,381,109,106 UART: [kat] HMAC-384Kdf
2,381,121,950 UART: [kat] LMS
2,381,598,443 UART: [kat] --
2,381,605,640 UART: [update-reset] ++
2,385,099,266 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,103,453 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,385,501,099 >>> mbox cmd response: success
2,385,501,863 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,538,947 UART: [update-reset Success] --
2,385,542,143 UART: [state] Locking Datavault
2,385,545,086 UART: [state] Locking PCR0, PCR1 and PCR31
2,385,546,798 UART: [state] Locking ICCM
2,385,548,470 UART: [exit] Launching FMC @ 0x40000130
2,385,556,879 UART:
2,385,557,126 UART: Running Caliptra FMC ...
2,385,558,235 UART:
2,385,558,399 UART: [state] CFI Enabled
2,385,602,709 UART: [art] Extend RT PCRs Done
2,385,603,866 UART: [art] Lock RT PCRs Done
2,385,605,269 UART: [art] Populate DV Done
2,385,611,030 UART: [fht] FMC Alias Private Key: 7
2,385,612,419 UART: [art] Derive CDI
2,385,613,172 UART: [art] Store in slot 0x4
2,385,655,830 UART: [art] Derive Key Pair
2,385,656,844 UART: [art] Store priv key in slot 0x5
2,388,083,748 UART: [art] Derive Key Pair - Done
2,388,096,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,803,386 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,804,898 UART: [art] PUB.X = 2519B8AF08B5D2CA9A7F947905CAD0495C3582B00D75E75EA636D6896C4B4596884158314725C1E13D47912886BDCE49
2,389,812,150 UART: [art] PUB.Y = 030190A8ED0903AFCFB8A5975A2B05D79029BBF189712A0C434F0661ED4C129FF896162BF687BA44FAC58CA3073D4E6F
2,389,819,404 UART: [art] SIG.R = AE898F435D1178B2153DA3EF620F7409527A7621AF55E6C3F6E8E1413E6D71D2136F42323198C825AF81332EC1671569
2,389,826,753 UART: [art] SIG.S = 334BD41F3A5B93D2670ADCD9D1C331F96CD33F733E99F517B9A8F68391C080FFD427A382C894AF7248E4FED6E04B6249
2,390,805,945 UART: Caliptra RT
2,390,806,660 UART: [state] CFI Enabled
2,391,177,285 UART: [rt] RT listening for mailbox commands...
2,391,179,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,391,328,790 UART:
2,391,329,095 UART: Running Caliptra ROM ...
2,391,330,139 UART:
2,391,330,401 UART: [state] CFI Enabled
2,391,343,329 UART: [state] LifecycleState = Unprovisioned
2,391,345,217 UART: [state] DebugLocked = No
2,391,347,765 UART: [state] WD Timer not started. Device not locked for debugging
2,391,352,325 UART: [kat] SHA2-256
2,391,532,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,391,542,814 UART: [kat] ++
2,391,543,271 UART: [kat] sha1
2,391,553,893 UART: [kat] SHA2-256
2,391,556,640 UART: [kat] SHA2-384
2,391,562,268 UART: [kat] SHA2-512-ACC
2,391,564,634 UART: [kat] ECC-384
2,394,007,453 UART: [kat] HMAC-384Kdf
2,394,018,937 UART: [kat] LMS
2,394,495,423 UART: [kat] --
2,394,501,646 UART: [update-reset] ++
2,398,002,879 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,006,855 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,398,404,496 >>> mbox cmd response: success
2,398,405,384 UART: [update-reset] Copying MAN_2 To MAN_1
2,398,442,471 UART: [update-reset Success] --
2,398,446,485 UART: [state] Locking Datavault
2,398,448,457 UART: [state] Locking PCR0, PCR1 and PCR31
2,398,450,225 UART: [state] Locking ICCM
2,398,451,843 UART: [exit] Launching FMC @ 0x40000130
2,398,460,199 UART:
2,398,460,472 UART: Running Caliptra FMC ...
2,398,461,588 UART:
2,398,461,753 UART: [state] CFI Enabled
2,398,505,724 UART: [art] Extend RT PCRs Done
2,398,506,917 UART: [art] Lock RT PCRs Done
2,398,508,488 UART: [art] Populate DV Done
2,398,514,067 UART: [fht] FMC Alias Private Key: 7
2,398,515,669 UART: [art] Derive CDI
2,398,516,493 UART: [art] Store in slot 0x4
2,398,558,825 UART: [art] Derive Key Pair
2,398,559,836 UART: [art] Store priv key in slot 0x5
2,400,986,563 UART: [art] Derive Key Pair - Done
2,400,999,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,705,929 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,707,438 UART: [art] PUB.X = 067450E780FF1A46CE006D6C0409125D7F9A203FD5447A45001352F1AA19D194222838A99D71B144DB691B33AC155CD7
2,402,714,696 UART: [art] PUB.Y = 8475A11884925F57E8A98B564602F9A7656CAEB0704EDFA23C45A2D8208FE8EF546025C8823D347DBB99128CF8BCE053
2,402,721,957 UART: [art] SIG.R = 9C25514BEC80D7D5334CD381CB1610767B2CDAD1B8BDCDBF8CA572ECB4C2744FF7927EAC9B426F996795AC7D49104FD1
2,402,729,356 UART: [art] SIG.S = 29B1605241CCA2487E1E13D098F519262DD02A02DA91D4DEFB11F5D0292937D96FAA4E418385B636C95AD71EC9AC5296
2,403,708,250 UART: Caliptra RT
2,403,708,944 UART: [state] CFI Enabled
2,404,079,528 UART: [rt] RT listening for mailbox commands...
2,404,081,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,404,231,711 UART:
2,404,232,014 UART: Running Caliptra ROM ...
2,404,233,140 UART:
2,404,233,306 UART: [state] CFI Enabled
2,405,673,101 UART: [state] LifecycleState = Unprovisioned
2,405,675,068 UART: [state] DebugLocked = No
2,405,676,525 UART: [state] WD Timer not started. Device not locked for debugging
2,405,680,277 UART: [kat] SHA2-256
2,405,860,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,405,870,763 UART: [kat] ++
2,405,871,272 UART: [kat] sha1
2,405,881,843 UART: [kat] SHA2-256
2,405,884,551 UART: [kat] SHA2-384
2,405,891,030 UART: [kat] SHA2-512-ACC
2,405,893,386 UART: [kat] ECC-384
2,408,336,183 UART: [kat] HMAC-384Kdf
2,408,347,703 UART: [kat] LMS
2,408,824,190 UART: [kat] --
2,408,829,824 UART: [update-reset] ++
2,412,330,542 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,333,273 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,412,731,109 >>> mbox cmd response: success
2,412,732,596 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,769,742 UART: [update-reset Success] --
2,412,772,954 UART: [state] Locking Datavault
2,412,777,188 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,778,913 UART: [state] Locking ICCM
2,412,780,372 UART: [exit] Launching FMC @ 0x40000130
2,412,788,785 UART:
2,412,789,028 UART: Running Caliptra FMC ...
2,412,790,142 UART:
2,412,790,316 UART: [state] CFI Enabled
2,412,834,349 UART: [art] Extend RT PCRs Done
2,412,835,544 UART: [art] Lock RT PCRs Done
2,412,836,744 UART: [art] Populate DV Done
2,412,842,324 UART: [fht] FMC Alias Private Key: 7
2,412,843,927 UART: [art] Derive CDI
2,412,844,754 UART: [art] Store in slot 0x4
2,412,887,353 UART: [art] Derive Key Pair
2,412,888,358 UART: [art] Store priv key in slot 0x5
2,415,315,374 UART: [art] Derive Key Pair - Done
2,415,328,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,417,034,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,035,997 UART: [art] PUB.X = 2519B8AF08B5D2CA9A7F947905CAD0495C3582B00D75E75EA636D6896C4B4596884158314725C1E13D47912886BDCE49
2,417,043,258 UART: [art] PUB.Y = 030190A8ED0903AFCFB8A5975A2B05D79029BBF189712A0C434F0661ED4C129FF896162BF687BA44FAC58CA3073D4E6F
2,417,050,501 UART: [art] SIG.R = AE898F435D1178B2153DA3EF620F7409527A7621AF55E6C3F6E8E1413E6D71D2136F42323198C825AF81332EC1671569
2,417,057,889 UART: [art] SIG.S = 334BD41F3A5B93D2670ADCD9D1C331F96CD33F733E99F517B9A8F68391C080FFD427A382C894AF7248E4FED6E04B6249
2,418,036,894 UART: Caliptra RT
2,418,037,592 UART: [state] CFI Enabled
2,418,414,644 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.99s
Truncated 697347 bytes from beginning
= 7
2,309,418,105 UART: [art] Erasing AUTHORITY.KEYID = 7
2,309,419,631 UART: [art] PUB.X = 4B32DB535373C17865EAD19955C5F2C9E85B85290FA65C435CE72F790769D89DB188ADB882D8F71BEF3C653E4EB4B4A9
2,309,426,895 UART: [art] PUB.Y = 32DE0C7C73A31029509D2E9EE1CAD413749C9042BB828DA09AE8816AE41CECF4E60B5EF4CF920ADC74FC5C2F05367D62
2,309,434,198 UART: [art] SIG.R = E4E52D453ABE6CEFB2AE2ABD9B1AFC327C1568DB11BB6406715E0755EC1643EB74AE9F4F4E982B33E7CDBD7269AF13E5
2,309,441,612 UART: [art] SIG.S = 3AF6DB8390033F9FAF2F0A4FCAA1035F35EFE79EE6C403DB2F8C893EE93A3FF2FFA6CE54AA8C327E7C10977603DDE046
2,310,420,588 UART: Caliptra RT
2,310,421,289 UART: [state] CFI Enabled
2,310,795,626 UART: [rt] RT listening for mailbox commands...
2,310,797,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,318,020,868 >>> mbox cmd response: success
2,318,055,593 UART:
2,318,055,909 UART: Running Caliptra FMC ...
2,318,057,039 UART:
2,318,057,208 UART: [state] CFI Enabled
2,318,101,287 UART: [art] Extend RT PCRs Done
2,318,102,437 UART: [art] Lock RT PCRs Done
2,318,103,785 UART: [art] Populate DV Done
2,318,109,221 UART: [fht] FMC Alias Private Key: 7
2,318,110,879 UART: [art] Derive CDI
2,318,111,625 UART: [art] Store in slot 0x4
2,318,154,560 UART: [art] Derive Key Pair
2,318,155,609 UART: [art] Store priv key in slot 0x5
2,320,582,481 UART: [art] Derive Key Pair - Done
2,320,595,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,322,301,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,322,303,057 UART: [art] PUB.X = E5174B09D91210A4F903F9C3EFF2B513EF8D784E947FB7CAF759A500DD086805C41A06CBA87AE89959D51440ADA8ECE9
2,322,310,324 UART: [art] PUB.Y = 71CCAACD677C20FE81A55A6777616B3EAAAE1DCF5A38175AEF76C5B346D94A87BD2999E9E82621C20A3CA13189943912
2,322,317,587 UART: [art] SIG.R = B8649A24444CF53B70A32CB39F3D90CBBC7193625CFB2E219E26E953CB28DD79EC3E05465CFE692D3372A667593F6B9E
2,322,324,995 UART: [art] SIG.S = CC4563F25611C67080CD1E843A762F820D6AA26AF156A3929CCA7F8D04BCF92790D2FE0B3798D1BDA71D3F9787EE4F89
2,323,303,305 UART: Caliptra RT
2,323,304,007 UART: [state] CFI Enabled
2,323,674,222 UART: [rt] RT listening for mailbox commands...
2,323,676,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,332,360,000 >>> mbox cmd response: success
2,332,394,778 UART:
2,332,395,051 UART: Running Caliptra FMC ...
2,332,396,094 UART:
2,332,396,251 UART: [state] CFI Enabled
2,332,440,272 UART: [art] Extend RT PCRs Done
2,332,441,477 UART: [art] Lock RT PCRs Done
2,332,442,915 UART: [art] Populate DV Done
2,332,448,234 UART: [fht] FMC Alias Private Key: 7
2,332,449,830 UART: [art] Derive CDI
2,332,450,572 UART: [art] Store in slot 0x4
2,332,493,174 UART: [art] Derive Key Pair
2,332,494,176 UART: [art] Store priv key in slot 0x5
2,334,921,220 UART: [art] Derive Key Pair - Done
2,334,933,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,336,639,774 UART: [art] Erasing AUTHORITY.KEYID = 7
2,336,641,298 UART: [art] PUB.X = 4B32DB535373C17865EAD19955C5F2C9E85B85290FA65C435CE72F790769D89DB188ADB882D8F71BEF3C653E4EB4B4A9
2,336,648,508 UART: [art] PUB.Y = 32DE0C7C73A31029509D2E9EE1CAD413749C9042BB828DA09AE8816AE41CECF4E60B5EF4CF920ADC74FC5C2F05367D62
2,336,655,807 UART: [art] SIG.R = E4E52D453ABE6CEFB2AE2ABD9B1AFC327C1568DB11BB6406715E0755EC1643EB74AE9F4F4E982B33E7CDBD7269AF13E5
2,336,663,220 UART: [art] SIG.S = 3AF6DB8390033F9FAF2F0A4FCAA1035F35EFE79EE6C403DB2F8C893EE93A3FF2FFA6CE54AA8C327E7C10977603DDE046
2,337,642,116 UART: Caliptra RT
2,337,642,825 UART: [state] CFI Enabled
2,338,015,627 UART: [rt] RT listening for mailbox commands...
2,338,017,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,345,250,779 >>> mbox cmd response: success
2,345,286,191 UART:
2,345,286,462 UART: Running Caliptra FMC ...
2,345,287,499 UART:
2,345,287,653 UART: [state] CFI Enabled
2,345,332,244 UART: [art] Extend RT PCRs Done
2,345,333,436 UART: [art] Lock RT PCRs Done
2,345,334,874 UART: [art] Populate DV Done
2,345,340,251 UART: [fht] FMC Alias Private Key: 7
2,345,341,964 UART: [art] Derive CDI
2,345,342,706 UART: [art] Store in slot 0x4
2,345,385,415 UART: [art] Derive Key Pair
2,345,386,418 UART: [art] Store priv key in slot 0x5
2,347,812,922 UART: [art] Derive Key Pair - Done
2,347,825,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,349,532,116 UART: [art] Erasing AUTHORITY.KEYID = 7
2,349,533,628 UART: [art] PUB.X = E5174B09D91210A4F903F9C3EFF2B513EF8D784E947FB7CAF759A500DD086805C41A06CBA87AE89959D51440ADA8ECE9
2,349,540,897 UART: [art] PUB.Y = 71CCAACD677C20FE81A55A6777616B3EAAAE1DCF5A38175AEF76C5B346D94A87BD2999E9E82621C20A3CA13189943912
2,349,548,144 UART: [art] SIG.R = B8649A24444CF53B70A32CB39F3D90CBBC7193625CFB2E219E26E953CB28DD79EC3E05465CFE692D3372A667593F6B9E
2,349,555,730 UART: [art] SIG.S = CC4563F25611C67080CD1E843A762F820D6AA26AF156A3929CCA7F8D04BCF92790D2FE0B3798D1BDA71D3F9787EE4F89
2,350,534,517 UART: Caliptra RT
2,350,535,223 UART: [state] CFI Enabled
2,350,904,817 UART: [rt] RT listening for mailbox commands...
2,350,906,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,358,135,708 >>> mbox cmd response: success
2,358,170,902 UART:
2,358,171,178 UART: Running Caliptra FMC ...
2,358,172,213 UART:
2,358,172,367 UART: [state] CFI Enabled
2,358,215,747 UART: [art] Extend RT PCRs Done
2,358,216,937 UART: [art] Lock RT PCRs Done
2,358,218,320 UART: [art] Populate DV Done
2,358,224,057 UART: [fht] FMC Alias Private Key: 7
2,358,225,602 UART: [art] Derive CDI
2,358,226,423 UART: [art] Store in slot 0x4
2,358,269,291 UART: [art] Derive Key Pair
2,358,270,296 UART: [art] Store priv key in slot 0x5
2,360,697,346 UART: [art] Derive Key Pair - Done
2,360,710,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,362,416,609 UART: [art] Erasing AUTHORITY.KEYID = 7
2,362,418,141 UART: [art] PUB.X = 4B32DB535373C17865EAD19955C5F2C9E85B85290FA65C435CE72F790769D89DB188ADB882D8F71BEF3C653E4EB4B4A9
2,362,425,351 UART: [art] PUB.Y = 32DE0C7C73A31029509D2E9EE1CAD413749C9042BB828DA09AE8816AE41CECF4E60B5EF4CF920ADC74FC5C2F05367D62
2,362,432,659 UART: [art] SIG.R = E4E52D453ABE6CEFB2AE2ABD9B1AFC327C1568DB11BB6406715E0755EC1643EB74AE9F4F4E982B33E7CDBD7269AF13E5
2,362,440,098 UART: [art] SIG.S = 3AF6DB8390033F9FAF2F0A4FCAA1035F35EFE79EE6C403DB2F8C893EE93A3FF2FFA6CE54AA8C327E7C10977603DDE046
2,363,419,492 UART: Caliptra RT
2,363,420,238 UART: [state] CFI Enabled
2,363,793,903 UART: [rt] RT listening for mailbox commands...
2,363,795,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,372,495,517 >>> mbox cmd response: success
2,372,529,933 UART:
2,372,530,237 UART: Running Caliptra FMC ...
2,372,531,282 UART:
2,372,531,444 UART: [state] CFI Enabled
2,372,575,362 UART: [art] Extend RT PCRs Done
2,372,576,514 UART: [art] Lock RT PCRs Done
2,372,578,280 UART: [art] Populate DV Done
2,372,583,815 UART: [fht] FMC Alias Private Key: 7
2,372,585,474 UART: [art] Derive CDI
2,372,586,220 UART: [art] Store in slot 0x4
2,372,628,835 UART: [art] Derive Key Pair
2,372,629,883 UART: [art] Store priv key in slot 0x5
2,375,056,854 UART: [art] Derive Key Pair - Done
2,375,069,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,376,776,363 UART: [art] Erasing AUTHORITY.KEYID = 7
2,376,777,865 UART: [art] PUB.X = E5174B09D91210A4F903F9C3EFF2B513EF8D784E947FB7CAF759A500DD086805C41A06CBA87AE89959D51440ADA8ECE9
2,376,785,127 UART: [art] PUB.Y = 71CCAACD677C20FE81A55A6777616B3EAAAE1DCF5A38175AEF76C5B346D94A87BD2999E9E82621C20A3CA13189943912
2,376,792,370 UART: [art] SIG.R = B8649A24444CF53B70A32CB39F3D90CBBC7193625CFB2E219E26E953CB28DD79EC3E05465CFE692D3372A667593F6B9E
2,376,799,782 UART: [art] SIG.S = CC4563F25611C67080CD1E843A762F820D6AA26AF156A3929CCA7F8D04BCF92790D2FE0B3798D1BDA71D3F9787EE4F89
2,377,778,433 UART: Caliptra RT
2,377,779,138 UART: [state] CFI Enabled
2,378,152,051 UART: [rt] RT listening for mailbox commands...
2,378,153,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,385,388,520 >>> mbox cmd response: success
2,385,425,135 UART:
2,385,425,444 UART: Running Caliptra FMC ...
2,385,426,574 UART:
2,385,426,738 UART: [state] CFI Enabled
2,385,471,515 UART: [art] Extend RT PCRs Done
2,385,472,667 UART: [art] Lock RT PCRs Done
2,385,474,062 UART: [art] Populate DV Done
2,385,479,537 UART: [fht] FMC Alias Private Key: 7
2,385,481,124 UART: [art] Derive CDI
2,385,481,952 UART: [art] Store in slot 0x4
2,385,525,041 UART: [art] Derive Key Pair
2,385,526,051 UART: [art] Store priv key in slot 0x5
2,387,952,444 UART: [art] Derive Key Pair - Done
2,387,965,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,389,671,469 UART: [art] Erasing AUTHORITY.KEYID = 7
2,389,672,995 UART: [art] PUB.X = 4B32DB535373C17865EAD19955C5F2C9E85B85290FA65C435CE72F790769D89DB188ADB882D8F71BEF3C653E4EB4B4A9
2,389,680,269 UART: [art] PUB.Y = 32DE0C7C73A31029509D2E9EE1CAD413749C9042BB828DA09AE8816AE41CECF4E60B5EF4CF920ADC74FC5C2F05367D62
2,389,687,511 UART: [art] SIG.R = E4E52D453ABE6CEFB2AE2ABD9B1AFC327C1568DB11BB6406715E0755EC1643EB74AE9F4F4E982B33E7CDBD7269AF13E5
2,389,694,968 UART: [art] SIG.S = 3AF6DB8390033F9FAF2F0A4FCAA1035F35EFE79EE6C403DB2F8C893EE93A3FF2FFA6CE54AA8C327E7C10977603DDE046
2,390,673,807 UART: Caliptra RT
2,390,674,514 UART: [state] CFI Enabled
2,391,042,824 UART: [rt] RT listening for mailbox commands...
2,391,044,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,398,264,941 >>> mbox cmd response: success
2,398,301,804 UART:
2,398,302,114 UART: Running Caliptra FMC ...
2,398,303,239 UART:
2,398,303,411 UART: [state] CFI Enabled
2,398,347,598 UART: [art] Extend RT PCRs Done
2,398,348,750 UART: [art] Lock RT PCRs Done
2,398,350,262 UART: [art] Populate DV Done
2,398,356,076 UART: [fht] FMC Alias Private Key: 7
2,398,357,562 UART: [art] Derive CDI
2,398,358,339 UART: [art] Store in slot 0x4
2,398,401,076 UART: [art] Derive Key Pair
2,398,402,084 UART: [art] Store priv key in slot 0x5
2,400,828,673 UART: [art] Derive Key Pair - Done
2,400,841,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,402,548,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,402,549,623 UART: [art] PUB.X = E5174B09D91210A4F903F9C3EFF2B513EF8D784E947FB7CAF759A500DD086805C41A06CBA87AE89959D51440ADA8ECE9
2,402,556,893 UART: [art] PUB.Y = 71CCAACD677C20FE81A55A6777616B3EAAAE1DCF5A38175AEF76C5B346D94A87BD2999E9E82621C20A3CA13189943912
2,402,564,139 UART: [art] SIG.R = B8649A24444CF53B70A32CB39F3D90CBBC7193625CFB2E219E26E953CB28DD79EC3E05465CFE692D3372A667593F6B9E
2,402,571,549 UART: [art] SIG.S = CC4563F25611C67080CD1E843A762F820D6AA26AF156A3929CCA7F8D04BCF92790D2FE0B3798D1BDA71D3F9787EE4F89
2,403,550,239 UART: Caliptra RT
2,403,550,945 UART: [state] CFI Enabled
2,403,921,356 UART: [rt] RT listening for mailbox commands...
2,403,923,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,412,610,559 >>> mbox cmd response: success
2,412,644,514 UART:
2,412,644,796 UART: Running Caliptra FMC ...
2,412,645,919 UART:
2,412,646,081 UART: [state] CFI Enabled
2,412,689,468 UART: [art] Extend RT PCRs Done
2,412,690,660 UART: [art] Lock RT PCRs Done
2,412,691,854 UART: [art] Populate DV Done
2,412,697,593 UART: [fht] FMC Alias Private Key: 7
2,412,699,250 UART: [art] Derive CDI
2,412,700,069 UART: [art] Store in slot 0x4
2,412,742,565 UART: [art] Derive Key Pair
2,412,743,571 UART: [art] Store priv key in slot 0x5
2,415,170,826 UART: [art] Derive Key Pair - Done
2,415,183,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,416,889,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,416,891,068 UART: [art] PUB.X = 4B32DB535373C17865EAD19955C5F2C9E85B85290FA65C435CE72F790769D89DB188ADB882D8F71BEF3C653E4EB4B4A9
2,416,898,349 UART: [art] PUB.Y = 32DE0C7C73A31029509D2E9EE1CAD413749C9042BB828DA09AE8816AE41CECF4E60B5EF4CF920ADC74FC5C2F05367D62
2,416,905,593 UART: [art] SIG.R = E4E52D453ABE6CEFB2AE2ABD9B1AFC327C1568DB11BB6406715E0755EC1643EB74AE9F4F4E982B33E7CDBD7269AF13E5
2,416,913,053 UART: [art] SIG.S = 3AF6DB8390033F9FAF2F0A4FCAA1035F35EFE79EE6C403DB2F8C893EE93A3FF2FFA6CE54AA8C327E7C10977603DDE046
2,417,891,882 UART: Caliptra RT
2,417,892,593 UART: [state] CFI Enabled
2,418,262,291 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 335.98s
Truncated 1312252 bytes from beginning
g Datavault
2,392,516,730 UART: [state] Locking PCR0, PCR1 and PCR31
2,392,518,874 UART: [state] Locking ICCM
2,392,520,269 UART: [exit] Launching FMC @ 0x40000130
2,392,528,940 UART:
2,392,529,197 UART: Running Caliptra FMC ...
2,392,530,302 UART:
2,392,530,463 UART: [state] CFI Enabled
2,392,624,774 UART: [art] Extend RT PCRs Done
2,392,625,986 UART: [art] Lock RT PCRs Done
2,392,627,555 UART: [art] Populate DV Done
2,392,633,234 UART: [fht] FMC Alias Private Key: 7
2,392,634,824 UART: [art] Derive CDI
2,392,635,636 UART: [art] Store in slot 0x4
2,392,693,840 UART: [art] Derive Key Pair
2,392,694,882 UART: [art] Store priv key in slot 0x5
2,395,157,925 UART: [art] Derive Key Pair - Done
2,395,171,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,396,882,990 UART: [art] Erasing AUTHORITY.KEYID = 7
2,396,884,975 UART: [art] PUB.X = A15C298E0C81905AC2772FDED1A9244DC74E2D220263F9B9DA53DCC70561D3A1D12734692639E1604282A5A02BE7F176
2,396,891,752 UART: [art] PUB.Y = 09CD42EA9F60998E2C4A716736ACAB830D01F6E3E512C049DAEDB34E68E9E622346327C23F855417043874AF65590F49
2,396,899,016 UART: [art] SIG.R = E357B84E51DA339C0F653D93D929B2D36486AFEDAE7D999F0B53CE6F9C5A5C28F7EA7942565365F6BCBE92AEF72ABD61
2,396,906,419 UART: [art] SIG.S = 39264DF888761972AA6E7A5B94FC0C477885DFFE2C597B48A05B571BA3FA101323D968F0CFBA0416E018DA33E837DAFF
2,397,885,080 UART: Caliptra RT
2,397,885,793 UART: [state] CFI Enabled
2,398,314,670 UART: [rt] RT listening for mailbox commands...
2,398,317,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,398,466,968 UART:
2,398,467,279 UART: Running Caliptra ROM ...
2,398,468,342 UART:
2,398,468,498 UART: [state] CFI Enabled
2,398,526,663 UART: [state] LifecycleState = Unprovisioned
2,398,528,655 UART: [state] DebugLocked = No
2,398,531,660 UART: [state] WD Timer not started. Device not locked for debugging
2,398,536,625 UART: [kat] SHA2-256
2,398,726,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,398,737,225 UART: [kat] ++
2,398,737,728 UART: [kat] sha1
2,398,749,373 UART: [kat] SHA2-256
2,398,752,390 UART: [kat] SHA2-384
2,398,758,699 UART: [kat] SHA2-512-ACC
2,398,761,320 UART: [kat] ECC-384
2,401,210,914 UART: [kat] HMAC-384Kdf
2,401,241,389 UART: [kat] LMS
2,401,772,970 UART: [kat] --
2,401,779,394 UART: [update-reset] ++
2,405,292,650 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,405,296,031 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,405,925,794 >>> mbox cmd response: success
2,405,926,207 UART: [update-reset] Copying MAN_2 To MAN_1
2,405,963,613 UART: [update-reset Success] --
2,405,969,733 UART: [state] Locking Datavault
2,405,972,803 UART: [state] Locking PCR0, PCR1 and PCR31
2,405,974,976 UART: [state] Locking ICCM
2,405,977,460 UART: [exit] Launching FMC @ 0x40000130
2,405,986,132 UART:
2,405,986,371 UART: Running Caliptra FMC ...
2,405,987,476 UART:
2,405,987,641 UART: [state] CFI Enabled
2,406,086,075 UART: [art] Extend RT PCRs Done
2,406,087,272 UART: [art] Lock RT PCRs Done
2,406,088,736 UART: [art] Populate DV Done
2,406,094,313 UART: [fht] FMC Alias Private Key: 7
2,406,095,961 UART: [art] Derive CDI
2,406,096,779 UART: [art] Store in slot 0x4
2,406,155,171 UART: [art] Derive Key Pair
2,406,156,214 UART: [art] Store priv key in slot 0x5
2,408,619,094 UART: [art] Derive Key Pair - Done
2,408,632,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,410,344,501 UART: [art] Erasing AUTHORITY.KEYID = 7
2,410,346,022 UART: [art] PUB.X = B30D9AB3D8507C26526E16F9EC5FF396F6CA5A57C8ED03F24C77035E4293FA675D6EA2C5BBF534403BE33E14B2D865D7
2,410,353,291 UART: [art] PUB.Y = 6164F0410E86C75F07C0B1F8B959BE39E71E3DC4C0D4732192DB8CEC54D9618689B5217992AB7C6B147BF8190ADDAFBB
2,410,360,531 UART: [art] SIG.R = F92B30B11ADE097B8203F0374B7F737A99D77F1A453D4C0B13C15E9721D6B9C8F562BB52F6D6195DA03E6F9754475026
2,410,367,935 UART: [art] SIG.S = F0EB2122C04D7C32881B11D7135E31C524DF027A92E55072B468A702B69161A4E4CA2C3AE67446D38BC5E19DF7D9B7CC
2,411,346,335 UART: Caliptra RT
2,411,347,039 UART: [state] CFI Enabled
2,411,771,110 UART: [rt] RT listening for mailbox commands...
2,411,773,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,411,923,116 UART:
2,411,923,430 UART: Running Caliptra ROM ...
2,411,924,555 UART:
2,411,924,717 UART: [state] CFI Enabled
2,411,985,041 UART: [state] LifecycleState = Unprovisioned
2,411,987,098 UART: [state] DebugLocked = No
2,411,988,763 UART: [state] WD Timer not started. Device not locked for debugging
2,411,993,387 UART: [kat] SHA2-256
2,412,183,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,412,194,000 UART: [kat] ++
2,412,194,492 UART: [kat] sha1
2,412,205,331 UART: [kat] SHA2-256
2,412,208,293 UART: [kat] SHA2-384
2,412,214,136 UART: [kat] SHA2-512-ACC
2,412,216,739 UART: [kat] ECC-384
2,414,666,615 UART: [kat] HMAC-384Kdf
2,414,691,413 UART: [kat] LMS
2,415,222,989 UART: [kat] --
2,415,226,436 UART: [update-reset] ++
2,418,737,888 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,418,740,996 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,419,370,734 >>> mbox cmd response: success
2,419,371,543 UART: [update-reset] Copying MAN_2 To MAN_1
2,419,409,070 UART: [update-reset Success] --
2,419,412,955 UART: [state] Locking Datavault
2,419,415,558 UART: [state] Locking PCR0, PCR1 and PCR31
2,419,417,754 UART: [state] Locking ICCM
2,419,420,066 UART: [exit] Launching FMC @ 0x40000130
2,419,428,738 UART:
2,419,428,983 UART: Running Caliptra FMC ...
2,419,430,088 UART:
2,419,430,254 UART: [state] CFI Enabled
2,419,524,057 UART: [art] Extend RT PCRs Done
2,419,525,251 UART: [art] Lock RT PCRs Done
2,419,526,760 UART: [art] Populate DV Done
2,419,532,218 UART: [fht] FMC Alias Private Key: 7
2,419,533,754 UART: [art] Derive CDI
2,419,534,567 UART: [art] Store in slot 0x4
2,419,593,003 UART: [art] Derive Key Pair
2,419,594,069 UART: [art] Store priv key in slot 0x5
2,422,057,460 UART: [art] Derive Key Pair - Done
2,422,070,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,423,782,727 UART: [art] Erasing AUTHORITY.KEYID = 7
2,423,784,215 UART: [art] PUB.X = A15C298E0C81905AC2772FDED1A9244DC74E2D220263F9B9DA53DCC70561D3A1D12734692639E1604282A5A02BE7F176
2,423,791,525 UART: [art] PUB.Y = 09CD42EA9F60998E2C4A716736ACAB830D01F6E3E512C049DAEDB34E68E9E622346327C23F855417043874AF65590F49
2,423,798,765 UART: [art] SIG.R = E357B84E51DA339C0F653D93D929B2D36486AFEDAE7D999F0B53CE6F9C5A5C28F7EA7942565365F6BCBE92AEF72ABD61
2,423,806,160 UART: [art] SIG.S = 39264DF888761972AA6E7A5B94FC0C477885DFFE2C597B48A05B571BA3FA101323D968F0CFBA0416E018DA33E837DAFF
2,424,785,212 UART: Caliptra RT
2,424,785,920 UART: [state] CFI Enabled
2,425,207,290 UART: [rt] RT listening for mailbox commands...
2,425,209,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,425,359,366 UART:
2,425,359,674 UART: Running Caliptra ROM ...
2,425,360,794 UART:
2,425,360,971 UART: [state] CFI Enabled
2,425,427,370 UART: [state] LifecycleState = Unprovisioned
2,425,429,458 UART: [state] DebugLocked = No
2,425,431,550 UART: [state] WD Timer not started. Device not locked for debugging
2,425,436,205 UART: [kat] SHA2-256
2,425,626,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,425,636,839 UART: [kat] ++
2,425,637,327 UART: [kat] sha1
2,425,648,808 UART: [kat] SHA2-256
2,425,651,809 UART: [kat] SHA2-384
2,425,657,735 UART: [kat] SHA2-512-ACC
2,425,660,360 UART: [kat] ECC-384
2,428,108,559 UART: [kat] HMAC-384Kdf
2,428,131,160 UART: [kat] LMS
2,428,662,670 UART: [kat] --
2,428,666,167 UART: [update-reset] ++
2,432,181,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,432,184,797 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,432,814,574 >>> mbox cmd response: success
2,432,815,111 UART: [update-reset] Copying MAN_2 To MAN_1
2,432,852,668 UART: [update-reset Success] --
2,432,857,208 UART: [state] Locking Datavault
2,432,860,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,432,862,551 UART: [state] Locking ICCM
2,432,864,598 UART: [exit] Launching FMC @ 0x40000130
2,432,873,275 UART:
2,432,873,513 UART: Running Caliptra FMC ...
2,432,874,542 UART:
2,432,874,694 UART: [state] CFI Enabled
2,432,964,094 UART: [art] Extend RT PCRs Done
2,432,965,286 UART: [art] Lock RT PCRs Done
2,432,966,881 UART: [art] Populate DV Done
2,432,972,445 UART: [fht] FMC Alias Private Key: 7
2,432,974,006 UART: [art] Derive CDI
2,432,974,750 UART: [art] Store in slot 0x4
2,433,033,350 UART: [art] Derive Key Pair
2,433,034,400 UART: [art] Store priv key in slot 0x5
2,435,497,407 UART: [art] Derive Key Pair - Done
2,435,510,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,437,222,216 UART: [art] Erasing AUTHORITY.KEYID = 7
2,437,223,729 UART: [art] PUB.X = B30D9AB3D8507C26526E16F9EC5FF396F6CA5A57C8ED03F24C77035E4293FA675D6EA2C5BBF534403BE33E14B2D865D7
2,437,230,988 UART: [art] PUB.Y = 6164F0410E86C75F07C0B1F8B959BE39E71E3DC4C0D4732192DB8CEC54D9618689B5217992AB7C6B147BF8190ADDAFBB
2,437,238,278 UART: [art] SIG.R = F92B30B11ADE097B8203F0374B7F737A99D77F1A453D4C0B13C15E9721D6B9C8F562BB52F6D6195DA03E6F9754475026
2,437,245,670 UART: [art] SIG.S = F0EB2122C04D7C32881B11D7135E31C524DF027A92E55072B468A702B69161A4E4CA2C3AE67446D38BC5E19DF7D9B7CC
2,438,224,743 UART: Caliptra RT
2,438,225,434 UART: [state] CFI Enabled
2,438,645,861 UART: [rt] RT listening for mailbox commands...
2,438,647,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,438,797,838 UART:
2,438,798,187 UART: Running Caliptra ROM ...
2,438,799,251 UART:
2,438,799,406 UART: [state] CFI Enabled
2,438,862,076 UART: [state] LifecycleState = Unprovisioned
2,438,864,176 UART: [state] DebugLocked = No
2,438,865,941 UART: [state] WD Timer not started. Device not locked for debugging
2,438,869,785 UART: [kat] SHA2-256
2,439,059,657 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,439,070,431 UART: [kat] ++
2,439,070,898 UART: [kat] sha1
2,439,081,302 UART: [kat] SHA2-256
2,439,084,323 UART: [kat] SHA2-384
2,439,090,147 UART: [kat] SHA2-512-ACC
2,439,092,750 UART: [kat] ECC-384
2,441,549,060 UART: [kat] HMAC-384Kdf
2,441,570,415 UART: [kat] LMS
2,442,101,970 UART: [kat] --
2,442,107,907 UART: [update-reset] ++
2,445,625,127 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,445,628,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,446,258,649 >>> mbox cmd response: success
2,446,259,945 UART: [update-reset] Copying MAN_2 To MAN_1
2,446,297,508 UART: [update-reset Success] --
2,446,302,313 UART: [state] Locking Datavault
2,446,307,031 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,309,182 UART: [state] Locking ICCM
2,446,310,797 UART: [exit] Launching FMC @ 0x40000130
2,446,319,468 UART:
2,446,319,703 UART: Running Caliptra FMC ...
2,446,320,804 UART:
2,446,320,964 UART: [state] CFI Enabled
2,446,426,251 UART: [art] Extend RT PCRs Done
2,446,427,455 UART: [art] Lock RT PCRs Done
2,446,428,854 UART: [art] Populate DV Done
2,446,434,255 UART: [fht] FMC Alias Private Key: 7
2,446,435,799 UART: [art] Derive CDI
2,446,436,613 UART: [art] Store in slot 0x4
2,446,495,269 UART: [art] Derive Key Pair
2,446,496,308 UART: [art] Store priv key in slot 0x5
2,448,959,081 UART: [art] Derive Key Pair - Done
2,448,971,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,450,685,235 UART: [art] Erasing AUTHORITY.KEYID = 7
2,450,686,734 UART: [art] PUB.X = A15C298E0C81905AC2772FDED1A9244DC74E2D220263F9B9DA53DCC70561D3A1D12734692639E1604282A5A02BE7F176
2,450,694,014 UART: [art] PUB.Y = 09CD42EA9F60998E2C4A716736ACAB830D01F6E3E512C049DAEDB34E68E9E622346327C23F855417043874AF65590F49
2,450,701,268 UART: [art] SIG.R = E357B84E51DA339C0F653D93D929B2D36486AFEDAE7D999F0B53CE6F9C5A5C28F7EA7942565365F6BCBE92AEF72ABD61
2,450,708,668 UART: [art] SIG.S = 39264DF888761972AA6E7A5B94FC0C477885DFFE2C597B48A05B571BA3FA101323D968F0CFBA0416E018DA33E837DAFF
2,451,687,176 UART: Caliptra RT
2,451,687,891 UART: [state] CFI Enabled
2,452,106,370 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 337.67s
Truncated 697537 bytes from beginning
= 7
2,482,080,491 UART: [art] Erasing AUTHORITY.KEYID = 7
2,482,082,003 UART: [art] PUB.X = AC3A75944266C2E93CB1E77794818587B0562037BCADAC2FD4B7D338A1D9C4B24C6B8873544EE1E75D674E5DED62DAF0
2,482,089,252 UART: [art] PUB.Y = E0856A73BBC4E5918D827AF4D77D08E16AC4A796DE3D9C82B885362AFE25F77529B53BC92BC1950B360BA9F464A5E9DA
2,482,096,541 UART: [art] SIG.R = 165009CF3C8CF4E8B40F46EED0F36F765FA1CB9B919901CF2C7666C243C6555FF8A5BD60FB9F2D82D239B330BFAFEFF7
2,482,103,996 UART: [art] SIG.S = EF1AD9FB5012FE9C081AF4422BF803B0EA90E4C4DE35BB8A5E66C1A9091B5B53ADBFB713C397E652ED17DD6927943065
2,483,083,286 UART: Caliptra RT
2,483,083,994 UART: [state] CFI Enabled
2,483,509,570 UART: [rt] RT listening for mailbox commands...
2,483,511,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,491,417,327 >>> mbox cmd response: success
2,491,450,485 UART:
2,491,450,764 UART: Running Caliptra FMC ...
2,491,451,880 UART:
2,491,452,046 UART: [state] CFI Enabled
2,491,538,841 UART: [art] Extend RT PCRs Done
2,491,540,041 UART: [art] Lock RT PCRs Done
2,491,541,560 UART: [art] Populate DV Done
2,491,546,912 UART: [fht] FMC Alias Private Key: 7
2,491,548,508 UART: [art] Derive CDI
2,491,549,256 UART: [art] Store in slot 0x4
2,491,607,982 UART: [art] Derive Key Pair
2,491,609,031 UART: [art] Store priv key in slot 0x5
2,494,071,722 UART: [art] Derive Key Pair - Done
2,494,084,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,495,797,983 UART: [art] Erasing AUTHORITY.KEYID = 7
2,495,799,495 UART: [art] PUB.X = C394A4CE1E52062F10C5967A34033FEAA32A0C384869528EABA56F5749E09587204EF5E8415A5860839CC26B24DEFA6E
2,495,806,742 UART: [art] PUB.Y = 0DA9D72FE9D81021064B2FBF04B2AC8F4014D4F4DB8F58E86242B255FA8EB454DCE81098C530C961B179DC0EECC12771
2,495,814,055 UART: [art] SIG.R = 393FF319D59FCA4DA8D52AF45151B957A17FA6A9C9B37E642115C6BD925B42FAE7DAFE30F7AD86816720FD12A0FEA201
2,495,821,476 UART: [art] SIG.S = 19B400D2387F375FC3E220109C47485B84CD52DE9E680829AAC3FEEDFC5358D1459A92682BB03FD45F554F67D4F05FA5
2,496,800,623 UART: Caliptra RT
2,496,801,330 UART: [state] CFI Enabled
2,497,220,392 UART: [rt] RT listening for mailbox commands...
2,497,222,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,505,140,521 >>> mbox cmd response: success
2,505,174,532 UART:
2,505,174,838 UART: Running Caliptra FMC ...
2,505,175,882 UART:
2,505,176,034 UART: [state] CFI Enabled
2,505,277,622 UART: [art] Extend RT PCRs Done
2,505,278,812 UART: [art] Lock RT PCRs Done
2,505,280,370 UART: [art] Populate DV Done
2,505,285,725 UART: [fht] FMC Alias Private Key: 7
2,505,287,314 UART: [art] Derive CDI
2,505,288,053 UART: [art] Store in slot 0x4
2,505,346,711 UART: [art] Derive Key Pair
2,505,347,753 UART: [art] Store priv key in slot 0x5
2,507,810,946 UART: [art] Derive Key Pair - Done
2,507,824,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,509,536,471 UART: [art] Erasing AUTHORITY.KEYID = 7
2,509,537,969 UART: [art] PUB.X = AC3A75944266C2E93CB1E77794818587B0562037BCADAC2FD4B7D338A1D9C4B24C6B8873544EE1E75D674E5DED62DAF0
2,509,545,215 UART: [art] PUB.Y = E0856A73BBC4E5918D827AF4D77D08E16AC4A796DE3D9C82B885362AFE25F77529B53BC92BC1950B360BA9F464A5E9DA
2,509,552,495 UART: [art] SIG.R = 165009CF3C8CF4E8B40F46EED0F36F765FA1CB9B919901CF2C7666C243C6555FF8A5BD60FB9F2D82D239B330BFAFEFF7
2,509,559,946 UART: [art] SIG.S = EF1AD9FB5012FE9C081AF4422BF803B0EA90E4C4DE35BB8A5E66C1A9091B5B53ADBFB713C397E652ED17DD6927943065
2,510,539,308 UART: Caliptra RT
2,510,540,026 UART: [state] CFI Enabled
2,510,957,516 UART: [rt] RT listening for mailbox commands...
2,510,959,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,518,866,132 >>> mbox cmd response: success
2,518,898,008 UART:
2,518,898,290 UART: Running Caliptra FMC ...
2,518,899,331 UART:
2,518,899,484 UART: [state] CFI Enabled
2,518,994,259 UART: [art] Extend RT PCRs Done
2,518,995,450 UART: [art] Lock RT PCRs Done
2,518,996,728 UART: [art] Populate DV Done
2,519,002,085 UART: [fht] FMC Alias Private Key: 7
2,519,003,848 UART: [art] Derive CDI
2,519,004,670 UART: [art] Store in slot 0x4
2,519,064,090 UART: [art] Derive Key Pair
2,519,065,142 UART: [art] Store priv key in slot 0x5
2,521,528,635 UART: [art] Derive Key Pair - Done
2,521,541,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,523,253,844 UART: [art] Erasing AUTHORITY.KEYID = 7
2,523,255,350 UART: [art] PUB.X = C394A4CE1E52062F10C5967A34033FEAA32A0C384869528EABA56F5749E09587204EF5E8415A5860839CC26B24DEFA6E
2,523,262,650 UART: [art] PUB.Y = 0DA9D72FE9D81021064B2FBF04B2AC8F4014D4F4DB8F58E86242B255FA8EB454DCE81098C530C961B179DC0EECC12771
2,523,269,878 UART: [art] SIG.R = 393FF319D59FCA4DA8D52AF45151B957A17FA6A9C9B37E642115C6BD925B42FAE7DAFE30F7AD86816720FD12A0FEA201
2,523,277,326 UART: [art] SIG.S = 19B400D2387F375FC3E220109C47485B84CD52DE9E680829AAC3FEEDFC5358D1459A92682BB03FD45F554F67D4F05FA5
2,524,256,166 UART: Caliptra RT
2,524,256,876 UART: [state] CFI Enabled
2,524,676,404 UART: [rt] RT listening for mailbox commands...
2,524,678,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,532,582,968 >>> mbox cmd response: success
2,532,616,205 UART:
2,532,616,514 UART: Running Caliptra FMC ...
2,532,617,636 UART:
2,532,617,812 UART: [state] CFI Enabled
2,532,710,093 UART: [art] Extend RT PCRs Done
2,532,711,291 UART: [art] Lock RT PCRs Done
2,532,712,667 UART: [art] Populate DV Done
2,532,718,186 UART: [fht] FMC Alias Private Key: 7
2,532,719,941 UART: [art] Derive CDI
2,532,720,759 UART: [art] Store in slot 0x4
2,532,779,589 UART: [art] Derive Key Pair
2,532,780,660 UART: [art] Store priv key in slot 0x5
2,535,243,109 UART: [art] Derive Key Pair - Done
2,535,256,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,536,969,375 UART: [art] Erasing AUTHORITY.KEYID = 7
2,536,970,881 UART: [art] PUB.X = AC3A75944266C2E93CB1E77794818587B0562037BCADAC2FD4B7D338A1D9C4B24C6B8873544EE1E75D674E5DED62DAF0
2,536,978,121 UART: [art] PUB.Y = E0856A73BBC4E5918D827AF4D77D08E16AC4A796DE3D9C82B885362AFE25F77529B53BC92BC1950B360BA9F464A5E9DA
2,536,985,405 UART: [art] SIG.R = 165009CF3C8CF4E8B40F46EED0F36F765FA1CB9B919901CF2C7666C243C6555FF8A5BD60FB9F2D82D239B330BFAFEFF7
2,536,992,858 UART: [art] SIG.S = EF1AD9FB5012FE9C081AF4422BF803B0EA90E4C4DE35BB8A5E66C1A9091B5B53ADBFB713C397E652ED17DD6927943065
2,537,971,634 UART: Caliptra RT
2,537,972,352 UART: [state] CFI Enabled
2,538,391,950 UART: [rt] RT listening for mailbox commands...
2,538,393,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,546,299,746 >>> mbox cmd response: success
2,546,335,160 UART:
2,546,335,440 UART: Running Caliptra FMC ...
2,546,336,556 UART:
2,546,336,724 UART: [state] CFI Enabled
2,546,425,597 UART: [art] Extend RT PCRs Done
2,546,426,794 UART: [art] Lock RT PCRs Done
2,546,428,307 UART: [art] Populate DV Done
2,546,433,500 UART: [fht] FMC Alias Private Key: 7
2,546,435,251 UART: [art] Derive CDI
2,546,436,072 UART: [art] Store in slot 0x4
2,546,495,147 UART: [art] Derive Key Pair
2,546,496,198 UART: [art] Store priv key in slot 0x5
2,548,958,927 UART: [art] Derive Key Pair - Done
2,548,971,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,684,152 UART: [art] Erasing AUTHORITY.KEYID = 7
2,550,685,655 UART: [art] PUB.X = C394A4CE1E52062F10C5967A34033FEAA32A0C384869528EABA56F5749E09587204EF5E8415A5860839CC26B24DEFA6E
2,550,692,962 UART: [art] PUB.Y = 0DA9D72FE9D81021064B2FBF04B2AC8F4014D4F4DB8F58E86242B255FA8EB454DCE81098C530C961B179DC0EECC12771
2,550,700,201 UART: [art] SIG.R = 393FF319D59FCA4DA8D52AF45151B957A17FA6A9C9B37E642115C6BD925B42FAE7DAFE30F7AD86816720FD12A0FEA201
2,550,707,587 UART: [art] SIG.S = 19B400D2387F375FC3E220109C47485B84CD52DE9E680829AAC3FEEDFC5358D1459A92682BB03FD45F554F67D4F05FA5
2,551,686,887 UART: Caliptra RT
2,551,687,609 UART: [state] CFI Enabled
2,552,106,887 UART: [rt] RT listening for mailbox commands...
2,552,108,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,560,022,033 >>> mbox cmd response: success
2,560,056,439 UART:
2,560,056,749 UART: Running Caliptra FMC ...
2,560,057,872 UART:
2,560,058,062 UART: [state] CFI Enabled
2,560,163,001 UART: [art] Extend RT PCRs Done
2,560,164,198 UART: [art] Lock RT PCRs Done
2,560,165,520 UART: [art] Populate DV Done
2,560,170,942 UART: [fht] FMC Alias Private Key: 7
2,560,172,482 UART: [art] Derive CDI
2,560,173,295 UART: [art] Store in slot 0x4
2,560,232,228 UART: [art] Derive Key Pair
2,560,233,271 UART: [art] Store priv key in slot 0x5
2,562,696,222 UART: [art] Derive Key Pair - Done
2,562,709,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,564,422,044 UART: [art] Erasing AUTHORITY.KEYID = 7
2,564,423,556 UART: [art] PUB.X = AC3A75944266C2E93CB1E77794818587B0562037BCADAC2FD4B7D338A1D9C4B24C6B8873544EE1E75D674E5DED62DAF0
2,564,430,799 UART: [art] PUB.Y = E0856A73BBC4E5918D827AF4D77D08E16AC4A796DE3D9C82B885362AFE25F77529B53BC92BC1950B360BA9F464A5E9DA
2,564,438,090 UART: [art] SIG.R = 165009CF3C8CF4E8B40F46EED0F36F765FA1CB9B919901CF2C7666C243C6555FF8A5BD60FB9F2D82D239B330BFAFEFF7
2,564,445,488 UART: [art] SIG.S = EF1AD9FB5012FE9C081AF4422BF803B0EA90E4C4DE35BB8A5E66C1A9091B5B53ADBFB713C397E652ED17DD6927943065
2,565,424,411 UART: Caliptra RT
2,565,425,107 UART: [state] CFI Enabled
2,565,846,184 UART: [rt] RT listening for mailbox commands...
2,565,848,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,573,752,456 >>> mbox cmd response: success
2,573,789,055 UART:
2,573,789,364 UART: Running Caliptra FMC ...
2,573,790,429 UART:
2,573,790,588 UART: [state] CFI Enabled
2,573,896,850 UART: [art] Extend RT PCRs Done
2,573,898,056 UART: [art] Lock RT PCRs Done
2,573,899,524 UART: [art] Populate DV Done
2,573,905,046 UART: [fht] FMC Alias Private Key: 7
2,573,906,638 UART: [art] Derive CDI
2,573,907,451 UART: [art] Store in slot 0x4
2,573,965,953 UART: [art] Derive Key Pair
2,573,966,957 UART: [art] Store priv key in slot 0x5
2,576,429,994 UART: [art] Derive Key Pair - Done
2,576,443,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,155,597 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,157,110 UART: [art] PUB.X = C394A4CE1E52062F10C5967A34033FEAA32A0C384869528EABA56F5749E09587204EF5E8415A5860839CC26B24DEFA6E
2,578,164,356 UART: [art] PUB.Y = 0DA9D72FE9D81021064B2FBF04B2AC8F4014D4F4DB8F58E86242B255FA8EB454DCE81098C530C961B179DC0EECC12771
2,578,171,637 UART: [art] SIG.R = 393FF319D59FCA4DA8D52AF45151B957A17FA6A9C9B37E642115C6BD925B42FAE7DAFE30F7AD86816720FD12A0FEA201
2,578,179,038 UART: [art] SIG.S = 19B400D2387F375FC3E220109C47485B84CD52DE9E680829AAC3FEEDFC5358D1459A92682BB03FD45F554F67D4F05FA5
2,579,158,075 UART: Caliptra RT
2,579,158,795 UART: [state] CFI Enabled
2,579,579,246 UART: [rt] RT listening for mailbox commands...
2,579,581,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,587,488,050 >>> mbox cmd response: success
2,587,522,962 UART:
2,587,523,265 UART: Running Caliptra FMC ...
2,587,524,390 UART:
2,587,524,555 UART: [state] CFI Enabled
2,587,629,918 UART: [art] Extend RT PCRs Done
2,587,631,104 UART: [art] Lock RT PCRs Done
2,587,632,528 UART: [art] Populate DV Done
2,587,638,100 UART: [fht] FMC Alias Private Key: 7
2,587,639,799 UART: [art] Derive CDI
2,587,640,614 UART: [art] Store in slot 0x4
2,587,699,060 UART: [art] Derive Key Pair
2,587,700,108 UART: [art] Store priv key in slot 0x5
2,590,162,811 UART: [art] Derive Key Pair - Done
2,590,175,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,591,888,129 UART: [art] Erasing AUTHORITY.KEYID = 7
2,591,889,641 UART: [art] PUB.X = AC3A75944266C2E93CB1E77794818587B0562037BCADAC2FD4B7D338A1D9C4B24C6B8873544EE1E75D674E5DED62DAF0
2,591,896,965 UART: [art] PUB.Y = E0856A73BBC4E5918D827AF4D77D08E16AC4A796DE3D9C82B885362AFE25F77529B53BC92BC1950B360BA9F464A5E9DA
2,591,904,207 UART: [art] SIG.R = 165009CF3C8CF4E8B40F46EED0F36F765FA1CB9B919901CF2C7666C243C6555FF8A5BD60FB9F2D82D239B330BFAFEFF7
2,591,911,607 UART: [art] SIG.S = EF1AD9FB5012FE9C081AF4422BF803B0EA90E4C4DE35BB8A5E66C1A9091B5B53ADBFB713C397E652ED17DD6927943065
2,592,890,624 UART: Caliptra RT
2,592,891,315 UART: [state] CFI Enabled
2,593,311,516 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 344.73s
Truncated 1312194 bytes from beginning
g Datavault
2,359,088,917 UART: [state] Locking PCR0, PCR1 and PCR31
2,359,091,086 UART: [state] Locking ICCM
2,359,092,888 UART: [exit] Launching FMC @ 0x40000130
2,359,101,583 UART:
2,359,101,826 UART: Running Caliptra FMC ...
2,359,102,937 UART:
2,359,103,111 UART: [state] CFI Enabled
2,359,147,351 UART: [art] Extend RT PCRs Done
2,359,148,698 UART: [art] Lock RT PCRs Done
2,359,150,087 UART: [art] Populate DV Done
2,359,155,846 UART: [fht] FMC Alias Private Key: 7
2,359,157,452 UART: [art] Derive CDI
2,359,158,299 UART: [art] Store in slot 0x4
2,359,201,041 UART: [art] Derive Key Pair
2,359,202,293 UART: [art] Store priv key in slot 0x5
2,361,628,508 UART: [art] Derive Key Pair - Done
2,361,641,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,363,348,310 UART: [art] Erasing AUTHORITY.KEYID = 7
2,363,349,807 UART: [art] PUB.X = F9CAB15C936245A36DC4BDDF0485F175C4F60DEFFA083331856CC494944E762B9CDCAD8EE65D1FE7C404D70C24ECED36
2,363,357,073 UART: [art] PUB.Y = F23AF0136BBAEF1A3EB2DC81652C808F8B5930678263862FEF0445E0F4B633D97CDD2662EBE8ECB2EFEA1136AAB05E31
2,363,364,390 UART: [art] SIG.R = F0A2F5B229A436A110F2B2D827D8427DB5D993E2DDE33120F1CCC9F0FEA11E8BB180B4FF8D82BF9AFAA0B53C7FAD3DA3
2,363,371,820 UART: [art] SIG.S = 22FF1D2DE11AF0CA1E8D35C58AE1377D7E4A0AA4CAFBD03EA08EBF766833610BCFD38F5D57E31DDCEB7F3A6E70350100
2,364,351,168 UART: Caliptra RT
2,364,351,883 UART: [state] CFI Enabled
2,364,724,535 UART: [rt] RT listening for mailbox commands...
2,364,727,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,364,876,963 UART:
2,364,877,286 UART: Running Caliptra ROM ...
2,364,878,434 UART:
2,364,878,599 UART: [state] CFI Enabled
2,365,366,653 UART: [state] LifecycleState = Unprovisioned
2,365,368,597 UART: [state] DebugLocked = No
2,365,371,402 UART: [state] WD Timer not started. Device not locked for debugging
2,365,375,392 UART: [kat] SHA2-256
2,365,565,271 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,365,576,052 UART: [kat] ++
2,365,576,660 UART: [kat] sha1
2,365,588,559 UART: [kat] SHA2-256
2,365,591,574 UART: [kat] SHA2-384
2,365,596,672 UART: [kat] SHA2-512-ACC
2,365,599,252 UART: [kat] ECC-384
2,368,039,284 UART: [kat] HMAC-384Kdf
2,368,053,193 UART: [kat] LMS
2,368,584,799 UART: [kat] --
2,368,587,458 UART: [update-reset] ++
2,372,095,701 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,372,098,271 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,372,728,023 >>> mbox cmd response: success
2,372,728,419 UART: [update-reset] Copying MAN_2 To MAN_1
2,372,765,838 UART: [update-reset Success] --
2,372,772,085 UART: [state] Locking Datavault
2,372,776,437 UART: [state] Locking PCR0, PCR1 and PCR31
2,372,778,589 UART: [state] Locking ICCM
2,372,781,615 UART: [exit] Launching FMC @ 0x40000130
2,372,790,248 UART:
2,372,790,526 UART: Running Caliptra FMC ...
2,372,791,641 UART:
2,372,791,809 UART: [state] CFI Enabled
2,372,835,882 UART: [art] Extend RT PCRs Done
2,372,837,039 UART: [art] Lock RT PCRs Done
2,372,838,462 UART: [art] Populate DV Done
2,372,844,091 UART: [fht] FMC Alias Private Key: 7
2,372,845,799 UART: [art] Derive CDI
2,372,846,618 UART: [art] Store in slot 0x4
2,372,889,714 UART: [art] Derive Key Pair
2,372,890,765 UART: [art] Store priv key in slot 0x5
2,375,317,692 UART: [art] Derive Key Pair - Done
2,375,330,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,377,036,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,377,037,900 UART: [art] PUB.X = DEE2E0A5B1B245D64293F1C4F87B326D4090153AE8A79FEA135C8B044C72FD60975BC0441BE6BAC685F43292EA0EE5D3
2,377,045,187 UART: [art] PUB.Y = 6624CC900855D049CA1F16DEAC01C90FD1E75F59AC8CE798F3248E265B52330D05AAEB81CAA7E6EA1EAF476D3A981251
2,377,052,443 UART: [art] SIG.R = 62198AD0D621BB34A1619E4D77089C1F57453A08BE6EC709C1BBDB79F18CA126EFF563CBAB29FE0E47D165DE939CAEFA
2,377,059,871 UART: [art] SIG.S = EED2EC70596B30E2F80835BC156EB59FFCCCF26A34CF0C24E20E11F37736FA42C6D6E82F6F06D8334F9D606A56E459DC
2,378,038,674 UART: Caliptra RT
2,378,039,391 UART: [state] CFI Enabled
2,378,417,549 UART: [rt] RT listening for mailbox commands...
2,378,419,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,378,569,629 UART:
2,378,569,935 UART: Running Caliptra ROM ...
2,378,570,974 UART:
2,378,571,238 UART: [state] CFI Enabled
2,378,586,165 UART: [state] LifecycleState = Unprovisioned
2,378,588,002 UART: [state] DebugLocked = No
2,378,590,450 UART: [state] WD Timer not started. Device not locked for debugging
2,378,594,547 UART: [kat] SHA2-256
2,378,784,410 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,378,795,199 UART: [kat] ++
2,378,795,660 UART: [kat] sha1
2,378,807,206 UART: [kat] SHA2-256
2,378,810,235 UART: [kat] SHA2-384
2,378,815,964 UART: [kat] SHA2-512-ACC
2,378,818,542 UART: [kat] ECC-384
2,381,258,562 UART: [kat] HMAC-384Kdf
2,381,271,646 UART: [kat] LMS
2,381,803,257 UART: [kat] --
2,381,809,196 UART: [update-reset] ++
2,385,320,104 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,385,324,030 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,385,953,789 >>> mbox cmd response: success
2,385,954,664 UART: [update-reset] Copying MAN_2 To MAN_1
2,385,992,230 UART: [update-reset Success] --
2,385,996,621 UART: [state] Locking Datavault
2,386,001,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,386,003,636 UART: [state] Locking ICCM
2,386,004,970 UART: [exit] Launching FMC @ 0x40000130
2,386,013,655 UART:
2,386,013,897 UART: Running Caliptra FMC ...
2,386,014,932 UART:
2,386,015,111 UART: [state] CFI Enabled
2,386,059,190 UART: [art] Extend RT PCRs Done
2,386,060,342 UART: [art] Lock RT PCRs Done
2,386,061,669 UART: [art] Populate DV Done
2,386,067,274 UART: [fht] FMC Alias Private Key: 7
2,386,068,937 UART: [art] Derive CDI
2,386,069,693 UART: [art] Store in slot 0x4
2,386,112,725 UART: [art] Derive Key Pair
2,386,113,734 UART: [art] Store priv key in slot 0x5
2,388,540,635 UART: [art] Derive Key Pair - Done
2,388,553,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,390,259,912 UART: [art] Erasing AUTHORITY.KEYID = 7
2,390,261,422 UART: [art] PUB.X = F9CAB15C936245A36DC4BDDF0485F175C4F60DEFFA083331856CC494944E762B9CDCAD8EE65D1FE7C404D70C24ECED36
2,390,268,695 UART: [art] PUB.Y = F23AF0136BBAEF1A3EB2DC81652C808F8B5930678263862FEF0445E0F4B633D97CDD2662EBE8ECB2EFEA1136AAB05E31
2,390,276,012 UART: [art] SIG.R = F0A2F5B229A436A110F2B2D827D8427DB5D993E2DDE33120F1CCC9F0FEA11E8BB180B4FF8D82BF9AFAA0B53C7FAD3DA3
2,390,283,438 UART: [art] SIG.S = 22FF1D2DE11AF0CA1E8D35C58AE1377D7E4A0AA4CAFBD03EA08EBF766833610BCFD38F5D57E31DDCEB7F3A6E70350100
2,391,262,466 UART: Caliptra RT
2,391,263,180 UART: [state] CFI Enabled
2,391,633,685 UART: [rt] RT listening for mailbox commands...
2,391,635,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,391,785,535 UART:
2,391,785,847 UART: Running Caliptra ROM ...
2,391,786,973 UART:
2,391,787,190 UART: [state] CFI Enabled
2,391,802,000 UART: [state] LifecycleState = Unprovisioned
2,391,803,846 UART: [state] DebugLocked = No
2,391,806,091 UART: [state] WD Timer not started. Device not locked for debugging
2,391,811,377 UART: [kat] SHA2-256
2,392,001,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,392,012,020 UART: [kat] ++
2,392,012,628 UART: [kat] sha1
2,392,023,537 UART: [kat] SHA2-256
2,392,026,594 UART: [kat] SHA2-384
2,392,031,950 UART: [kat] SHA2-512-ACC
2,392,034,535 UART: [kat] ECC-384
2,394,478,049 UART: [kat] HMAC-384Kdf
2,394,491,373 UART: [kat] LMS
2,395,022,971 UART: [kat] --
2,395,027,357 UART: [update-reset] ++
2,398,536,944 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,398,540,862 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,399,170,619 >>> mbox cmd response: success
2,399,171,068 UART: [update-reset] Copying MAN_2 To MAN_1
2,399,208,606 UART: [update-reset Success] --
2,399,212,349 UART: [state] Locking Datavault
2,399,216,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,399,218,538 UART: [state] Locking ICCM
2,399,220,708 UART: [exit] Launching FMC @ 0x40000130
2,399,229,366 UART:
2,399,229,613 UART: Running Caliptra FMC ...
2,399,230,730 UART:
2,399,230,900 UART: [state] CFI Enabled
2,399,275,187 UART: [art] Extend RT PCRs Done
2,399,276,379 UART: [art] Lock RT PCRs Done
2,399,277,790 UART: [art] Populate DV Done
2,399,283,369 UART: [fht] FMC Alias Private Key: 7
2,399,284,964 UART: [art] Derive CDI
2,399,285,784 UART: [art] Store in slot 0x4
2,399,328,221 UART: [art] Derive Key Pair
2,399,329,232 UART: [art] Store priv key in slot 0x5
2,401,756,679 UART: [art] Derive Key Pair - Done
2,401,769,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,403,475,414 UART: [art] Erasing AUTHORITY.KEYID = 7
2,403,476,925 UART: [art] PUB.X = DEE2E0A5B1B245D64293F1C4F87B326D4090153AE8A79FEA135C8B044C72FD60975BC0441BE6BAC685F43292EA0EE5D3
2,403,484,213 UART: [art] PUB.Y = 6624CC900855D049CA1F16DEAC01C90FD1E75F59AC8CE798F3248E265B52330D05AAEB81CAA7E6EA1EAF476D3A981251
2,403,491,476 UART: [art] SIG.R = 62198AD0D621BB34A1619E4D77089C1F57453A08BE6EC709C1BBDB79F18CA126EFF563CBAB29FE0E47D165DE939CAEFA
2,403,498,904 UART: [art] SIG.S = EED2EC70596B30E2F80835BC156EB59FFCCCF26A34CF0C24E20E11F37736FA42C6D6E82F6F06D8334F9D606A56E459DC
2,404,477,761 UART: Caliptra RT
2,404,478,458 UART: [state] CFI Enabled
2,404,853,185 UART: [rt] RT listening for mailbox commands...
2,404,855,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,405,004,822 UART:
2,405,005,144 UART: Running Caliptra ROM ...
2,405,006,282 UART:
2,405,006,462 UART: [state] CFI Enabled
2,405,484,664 UART: [state] LifecycleState = Unprovisioned
2,405,486,582 UART: [state] DebugLocked = No
2,405,487,824 UART: [state] WD Timer not started. Device not locked for debugging
2,405,493,278 UART: [kat] SHA2-256
2,405,683,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,405,693,895 UART: [kat] ++
2,405,694,497 UART: [kat] sha1
2,405,705,132 UART: [kat] SHA2-256
2,405,708,106 UART: [kat] SHA2-384
2,405,715,075 UART: [kat] SHA2-512-ACC
2,405,717,664 UART: [kat] ECC-384
2,408,160,083 UART: [kat] HMAC-384Kdf
2,408,171,841 UART: [kat] LMS
2,408,703,450 UART: [kat] --
2,408,708,459 UART: [update-reset] ++
2,412,212,674 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
2,412,215,300 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
2,412,845,016 >>> mbox cmd response: success
2,412,845,399 UART: [update-reset] Copying MAN_2 To MAN_1
2,412,882,807 UART: [update-reset Success] --
2,412,888,279 UART: [state] Locking Datavault
2,412,891,682 UART: [state] Locking PCR0, PCR1 and PCR31
2,412,893,889 UART: [state] Locking ICCM
2,412,896,784 UART: [exit] Launching FMC @ 0x40000130
2,412,905,464 UART:
2,412,905,710 UART: Running Caliptra FMC ...
2,412,906,745 UART:
2,412,906,899 UART: [state] CFI Enabled
2,412,951,505 UART: [art] Extend RT PCRs Done
2,412,952,694 UART: [art] Lock RT PCRs Done
2,412,954,242 UART: [art] Populate DV Done
2,412,959,763 UART: [fht] FMC Alias Private Key: 7
2,412,961,355 UART: [art] Derive CDI
2,412,962,108 UART: [art] Store in slot 0x4
2,413,004,922 UART: [art] Derive Key Pair
2,413,005,935 UART: [art] Store priv key in slot 0x5
2,415,432,841 UART: [art] Derive Key Pair - Done
2,415,445,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,417,152,467 UART: [art] Erasing AUTHORITY.KEYID = 7
2,417,153,968 UART: [art] PUB.X = F9CAB15C936245A36DC4BDDF0485F175C4F60DEFFA083331856CC494944E762B9CDCAD8EE65D1FE7C404D70C24ECED36
2,417,161,252 UART: [art] PUB.Y = F23AF0136BBAEF1A3EB2DC81652C808F8B5930678263862FEF0445E0F4B633D97CDD2662EBE8ECB2EFEA1136AAB05E31
2,417,168,567 UART: [art] SIG.R = F0A2F5B229A436A110F2B2D827D8427DB5D993E2DDE33120F1CCC9F0FEA11E8BB180B4FF8D82BF9AFAA0B53C7FAD3DA3
2,417,175,987 UART: [art] SIG.S = 22FF1D2DE11AF0CA1E8D35C58AE1377D7E4A0AA4CAFBD03EA08EBF766833610BCFD38F5D57E31DDCEB7F3A6E70350100
2,418,154,823 UART: Caliptra RT
2,418,155,539 UART: [state] CFI Enabled
2,418,533,237 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 336.00s
Truncated 697459 bytes from beginning
= 7
2,404,575,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,404,577,116 UART: [art] PUB.X = CAA9E883AAB45D34750525E177385FBBE18CC42A30D835C268F1B41083F9D3C28F7C381C5C9EDBADE64BE50B0668C5ED
2,404,584,394 UART: [art] PUB.Y = 4B2708DAE1004D3C6D3D166AC6DDB24C011014F800946F26E8571C4C72487ADFD29A18D0944EF21BA03CD9E0AFBD33D2
2,404,591,643 UART: [art] SIG.R = FA12043ED15D3CC3582AE380A05744C36D3036811B6F9264C702EA42A3B4F37046968B5D9AB3384DD906EC261A2DFA2F
2,404,599,013 UART: [art] SIG.S = C93532D40FEDA00250D2596063D0EC62D7DF9301147274231C89D32F204CC74E36B4FA65F2992F0AD052955F38B3664C
2,405,577,985 UART: Caliptra RT
2,405,578,699 UART: [state] CFI Enabled
2,405,955,851 UART: [rt] RT listening for mailbox commands...
2,405,957,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,413,780,544 >>> mbox cmd response: success
2,413,814,606 UART:
2,413,814,882 UART: Running Caliptra FMC ...
2,413,816,164 UART:
2,413,816,367 UART: [state] CFI Enabled
2,413,860,409 UART: [art] Extend RT PCRs Done
2,413,861,569 UART: [art] Lock RT PCRs Done
2,413,862,702 UART: [art] Populate DV Done
2,413,868,550 UART: [fht] FMC Alias Private Key: 7
2,413,870,262 UART: [art] Derive CDI
2,413,871,015 UART: [art] Store in slot 0x4
2,413,913,740 UART: [art] Derive Key Pair
2,413,914,791 UART: [art] Store priv key in slot 0x5
2,416,341,466 UART: [art] Derive Key Pair - Done
2,416,354,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,418,060,645 UART: [art] Erasing AUTHORITY.KEYID = 7
2,418,062,158 UART: [art] PUB.X = 0806FA14D51B52724838808753E88798BC6420ADA16638641B181EE34A7A245025AAAB38B42245B1A601478308D06387
2,418,069,374 UART: [art] PUB.Y = 216401CC0A8B61BAF8280CB999400720B3E415458E081F8CB4CC2B17624AAA96FB6636920D6517C22BC7A3A9C62B184F
2,418,076,639 UART: [art] SIG.R = A545E7A0F4E639904CC9663817B6AC05D769E815BC37EDF5AB8A0991D2ADE64A599A38D8E51CFF2A972247056AF21BC4
2,418,084,072 UART: [art] SIG.S = 4BFB7822E1FC521C2D102A5016F1B2771EB20EE3CC8A20DD4FEC9BE1B63AEE58230B15635C4A9018186FDA8A92D3632D
2,419,063,040 UART: Caliptra RT
2,419,063,738 UART: [state] CFI Enabled
2,419,437,936 UART: [rt] RT listening for mailbox commands...
2,419,439,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,427,266,140 >>> mbox cmd response: success
2,427,301,120 UART:
2,427,301,396 UART: Running Caliptra FMC ...
2,427,302,524 UART:
2,427,302,693 UART: [state] CFI Enabled
2,427,346,936 UART: [art] Extend RT PCRs Done
2,427,348,129 UART: [art] Lock RT PCRs Done
2,427,349,324 UART: [art] Populate DV Done
2,427,354,631 UART: [fht] FMC Alias Private Key: 7
2,427,356,173 UART: [art] Derive CDI
2,427,356,993 UART: [art] Store in slot 0x4
2,427,399,650 UART: [art] Derive Key Pair
2,427,400,674 UART: [art] Store priv key in slot 0x5
2,429,827,432 UART: [art] Derive Key Pair - Done
2,429,840,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,431,547,287 UART: [art] Erasing AUTHORITY.KEYID = 7
2,431,548,806 UART: [art] PUB.X = CAA9E883AAB45D34750525E177385FBBE18CC42A30D835C268F1B41083F9D3C28F7C381C5C9EDBADE64BE50B0668C5ED
2,431,556,081 UART: [art] PUB.Y = 4B2708DAE1004D3C6D3D166AC6DDB24C011014F800946F26E8571C4C72487ADFD29A18D0944EF21BA03CD9E0AFBD33D2
2,431,563,290 UART: [art] SIG.R = FA12043ED15D3CC3582AE380A05744C36D3036811B6F9264C702EA42A3B4F37046968B5D9AB3384DD906EC261A2DFA2F
2,431,570,669 UART: [art] SIG.S = C93532D40FEDA00250D2596063D0EC62D7DF9301147274231C89D32F204CC74E36B4FA65F2992F0AD052955F38B3664C
2,432,549,699 UART: Caliptra RT
2,432,550,421 UART: [state] CFI Enabled
2,432,919,592 UART: [rt] RT listening for mailbox commands...
2,432,921,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,440,737,629 >>> mbox cmd response: success
2,440,771,591 UART:
2,440,771,867 UART: Running Caliptra FMC ...
2,440,772,984 UART:
2,440,773,174 UART: [state] CFI Enabled
2,440,816,944 UART: [art] Extend RT PCRs Done
2,440,818,155 UART: [art] Lock RT PCRs Done
2,440,819,350 UART: [art] Populate DV Done
2,440,824,721 UART: [fht] FMC Alias Private Key: 7
2,440,826,267 UART: [art] Derive CDI
2,440,827,087 UART: [art] Store in slot 0x4
2,440,869,540 UART: [art] Derive Key Pair
2,440,870,588 UART: [art] Store priv key in slot 0x5
2,443,297,513 UART: [art] Derive Key Pair - Done
2,443,310,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,445,016,915 UART: [art] Erasing AUTHORITY.KEYID = 7
2,445,018,437 UART: [art] PUB.X = 0806FA14D51B52724838808753E88798BC6420ADA16638641B181EE34A7A245025AAAB38B42245B1A601478308D06387
2,445,025,669 UART: [art] PUB.Y = 216401CC0A8B61BAF8280CB999400720B3E415458E081F8CB4CC2B17624AAA96FB6636920D6517C22BC7A3A9C62B184F
2,445,032,883 UART: [art] SIG.R = A545E7A0F4E639904CC9663817B6AC05D769E815BC37EDF5AB8A0991D2ADE64A599A38D8E51CFF2A972247056AF21BC4
2,445,040,307 UART: [art] SIG.S = 4BFB7822E1FC521C2D102A5016F1B2771EB20EE3CC8A20DD4FEC9BE1B63AEE58230B15635C4A9018186FDA8A92D3632D
2,446,018,931 UART: Caliptra RT
2,446,019,628 UART: [state] CFI Enabled
2,446,393,746 UART: [rt] RT listening for mailbox commands...
2,446,395,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,454,214,932 >>> mbox cmd response: success
2,454,252,007 UART:
2,454,252,314 UART: Running Caliptra FMC ...
2,454,253,361 UART:
2,454,253,516 UART: [state] CFI Enabled
2,454,297,982 UART: [art] Extend RT PCRs Done
2,454,299,177 UART: [art] Lock RT PCRs Done
2,454,300,910 UART: [art] Populate DV Done
2,454,306,054 UART: [fht] FMC Alias Private Key: 7
2,454,307,816 UART: [art] Derive CDI
2,454,308,635 UART: [art] Store in slot 0x4
2,454,351,236 UART: [art] Derive Key Pair
2,454,352,265 UART: [art] Store priv key in slot 0x5
2,456,779,119 UART: [art] Derive Key Pair - Done
2,456,791,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,458,498,317 UART: [art] Erasing AUTHORITY.KEYID = 7
2,458,499,824 UART: [art] PUB.X = CAA9E883AAB45D34750525E177385FBBE18CC42A30D835C268F1B41083F9D3C28F7C381C5C9EDBADE64BE50B0668C5ED
2,458,507,152 UART: [art] PUB.Y = 4B2708DAE1004D3C6D3D166AC6DDB24C011014F800946F26E8571C4C72487ADFD29A18D0944EF21BA03CD9E0AFBD33D2
2,458,514,361 UART: [art] SIG.R = FA12043ED15D3CC3582AE380A05744C36D3036811B6F9264C702EA42A3B4F37046968B5D9AB3384DD906EC261A2DFA2F
2,458,521,728 UART: [art] SIG.S = C93532D40FEDA00250D2596063D0EC62D7DF9301147274231C89D32F204CC74E36B4FA65F2992F0AD052955F38B3664C
2,459,500,990 UART: Caliptra RT
2,459,501,700 UART: [state] CFI Enabled
2,459,878,325 UART: [rt] RT listening for mailbox commands...
2,459,880,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,467,713,323 >>> mbox cmd response: success
2,467,748,469 UART:
2,467,748,768 UART: Running Caliptra FMC ...
2,467,749,812 UART:
2,467,749,986 UART: [state] CFI Enabled
2,467,794,133 UART: [art] Extend RT PCRs Done
2,467,795,286 UART: [art] Lock RT PCRs Done
2,467,796,660 UART: [art] Populate DV Done
2,467,801,958 UART: [fht] FMC Alias Private Key: 7
2,467,803,606 UART: [art] Derive CDI
2,467,804,347 UART: [art] Store in slot 0x4
2,467,847,328 UART: [art] Derive Key Pair
2,467,848,395 UART: [art] Store priv key in slot 0x5
2,470,275,960 UART: [art] Derive Key Pair - Done
2,470,288,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,471,995,126 UART: [art] Erasing AUTHORITY.KEYID = 7
2,471,996,636 UART: [art] PUB.X = 0806FA14D51B52724838808753E88798BC6420ADA16638641B181EE34A7A245025AAAB38B42245B1A601478308D06387
2,472,003,855 UART: [art] PUB.Y = 216401CC0A8B61BAF8280CB999400720B3E415458E081F8CB4CC2B17624AAA96FB6636920D6517C22BC7A3A9C62B184F
2,472,011,122 UART: [art] SIG.R = A545E7A0F4E639904CC9663817B6AC05D769E815BC37EDF5AB8A0991D2ADE64A599A38D8E51CFF2A972247056AF21BC4
2,472,018,542 UART: [art] SIG.S = 4BFB7822E1FC521C2D102A5016F1B2771EB20EE3CC8A20DD4FEC9BE1B63AEE58230B15635C4A9018186FDA8A92D3632D
2,472,997,216 UART: Caliptra RT
2,472,997,936 UART: [state] CFI Enabled
2,473,373,268 UART: [rt] RT listening for mailbox commands...
2,473,375,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,203,906 >>> mbox cmd response: success
2,481,238,558 UART:
2,481,238,837 UART: Running Caliptra FMC ...
2,481,239,958 UART:
2,481,240,124 UART: [state] CFI Enabled
2,481,284,265 UART: [art] Extend RT PCRs Done
2,481,285,458 UART: [art] Lock RT PCRs Done
2,481,286,810 UART: [art] Populate DV Done
2,481,292,278 UART: [fht] FMC Alias Private Key: 7
2,481,293,768 UART: [art] Derive CDI
2,481,294,587 UART: [art] Store in slot 0x4
2,481,337,381 UART: [art] Derive Key Pair
2,481,338,456 UART: [art] Store priv key in slot 0x5
2,483,765,139 UART: [art] Derive Key Pair - Done
2,483,778,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,485,484,605 UART: [art] Erasing AUTHORITY.KEYID = 7
2,485,486,246 UART: [art] PUB.X = CAA9E883AAB45D34750525E177385FBBE18CC42A30D835C268F1B41083F9D3C28F7C381C5C9EDBADE64BE50B0668C5ED
2,485,493,446 UART: [art] PUB.Y = 4B2708DAE1004D3C6D3D166AC6DDB24C011014F800946F26E8571C4C72487ADFD29A18D0944EF21BA03CD9E0AFBD33D2
2,485,500,678 UART: [art] SIG.R = FA12043ED15D3CC3582AE380A05744C36D3036811B6F9264C702EA42A3B4F37046968B5D9AB3384DD906EC261A2DFA2F
2,485,508,048 UART: [art] SIG.S = C93532D40FEDA00250D2596063D0EC62D7DF9301147274231C89D32F204CC74E36B4FA65F2992F0AD052955F38B3664C
2,486,486,756 UART: Caliptra RT
2,486,487,459 UART: [state] CFI Enabled
2,486,858,431 UART: [rt] RT listening for mailbox commands...
2,486,860,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,494,690,591 >>> mbox cmd response: success
2,494,725,123 UART:
2,494,725,422 UART: Running Caliptra FMC ...
2,494,726,552 UART:
2,494,726,748 UART: [state] CFI Enabled
2,494,770,939 UART: [art] Extend RT PCRs Done
2,494,772,085 UART: [art] Lock RT PCRs Done
2,494,773,543 UART: [art] Populate DV Done
2,494,779,008 UART: [fht] FMC Alias Private Key: 7
2,494,780,597 UART: [art] Derive CDI
2,494,781,373 UART: [art] Store in slot 0x4
2,494,823,816 UART: [art] Derive Key Pair
2,494,824,824 UART: [art] Store priv key in slot 0x5
2,497,251,617 UART: [art] Derive Key Pair - Done
2,497,264,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,498,971,449 UART: [art] Erasing AUTHORITY.KEYID = 7
2,498,972,996 UART: [art] PUB.X = 0806FA14D51B52724838808753E88798BC6420ADA16638641B181EE34A7A245025AAAB38B42245B1A601478308D06387
2,498,980,163 UART: [art] PUB.Y = 216401CC0A8B61BAF8280CB999400720B3E415458E081F8CB4CC2B17624AAA96FB6636920D6517C22BC7A3A9C62B184F
2,498,987,418 UART: [art] SIG.R = A545E7A0F4E639904CC9663817B6AC05D769E815BC37EDF5AB8A0991D2ADE64A599A38D8E51CFF2A972247056AF21BC4
2,498,994,791 UART: [art] SIG.S = 4BFB7822E1FC521C2D102A5016F1B2771EB20EE3CC8A20DD4FEC9BE1B63AEE58230B15635C4A9018186FDA8A92D3632D
2,499,973,779 UART: Caliptra RT
2,499,974,494 UART: [state] CFI Enabled
2,500,347,915 UART: [rt] RT listening for mailbox commands...
2,500,349,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,162,224 >>> mbox cmd response: success
2,508,198,935 UART:
2,508,199,214 UART: Running Caliptra FMC ...
2,508,200,255 UART:
2,508,200,411 UART: [state] CFI Enabled
2,508,244,980 UART: [art] Extend RT PCRs Done
2,508,246,170 UART: [art] Lock RT PCRs Done
2,508,247,392 UART: [art] Populate DV Done
2,508,252,806 UART: [fht] FMC Alias Private Key: 7
2,508,254,347 UART: [art] Derive CDI
2,508,255,092 UART: [art] Store in slot 0x4
2,508,297,841 UART: [art] Derive Key Pair
2,508,298,898 UART: [art] Store priv key in slot 0x5
2,510,725,562 UART: [art] Derive Key Pair - Done
2,510,738,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,512,444,940 UART: [art] Erasing AUTHORITY.KEYID = 7
2,512,446,438 UART: [art] PUB.X = CAA9E883AAB45D34750525E177385FBBE18CC42A30D835C268F1B41083F9D3C28F7C381C5C9EDBADE64BE50B0668C5ED
2,512,453,714 UART: [art] PUB.Y = 4B2708DAE1004D3C6D3D166AC6DDB24C011014F800946F26E8571C4C72487ADFD29A18D0944EF21BA03CD9E0AFBD33D2
2,512,460,937 UART: [art] SIG.R = FA12043ED15D3CC3582AE380A05744C36D3036811B6F9264C702EA42A3B4F37046968B5D9AB3384DD906EC261A2DFA2F
2,512,468,365 UART: [art] SIG.S = C93532D40FEDA00250D2596063D0EC62D7DF9301147274231C89D32F204CC74E36B4FA65F2992F0AD052955F38B3664C
2,513,447,657 UART: Caliptra RT
2,513,448,347 UART: [state] CFI Enabled
2,513,819,149 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 340.76s
Truncated 1341950 bytes from beginning
01,024 UART: [art] Lock RT PCRs Done
1,784,402,333 UART: [art] Populate DV Done
1,784,410,732 UART: [fht] FMC Alias Private Key: 7
1,784,411,710 UART: [art] Derive CDI
1,784,411,990 UART: [art] Store in slot 0x4
1,784,497,452 UART: [art] Derive Key Pair
1,784,497,812 UART: [art] Store priv key in slot 0x5
1,784,511,339 UART: [art] Derive Key Pair - Done
1,784,526,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,784,541,442 UART: [art] Erasing AUTHORITY.KEYID = 7
1,784,542,207 UART: [art] PUB.X = 528A29DF83A73983FBA6AC9D6649073F5E0561B1098DD634064AA1100203E9DFD651CF49E556B4C7B11F1CD2CF049A52
1,784,548,960 UART: [art] PUB.Y = 17C0CF50842B33C902B5B5E5A2A05565A029DA3A9464B8C4DD4AACEF053A1EB4FFDE67007271C9F108578767F606ED86
1,784,555,884 UART: [art] SIG.R = 184B99CF848635E51CE69CA3D521D496CD6F1AADA6646B3E5879745AD94B8F324417643DAF0DE20046DAD020F8DB5472
1,784,562,635 UART: [art] SIG.S = 547C5421F3B562C092F66A0DD22A972E31DD35BBCAD46887AD3C4BE0FE7E7727E6397772E35854D3A3091E37680FEC4E
1,784,586,102 UART: Caliptra RT
1,784,586,353 UART: [state] CFI Enabled
1,784,952,499 UART: [rt] RT listening for mailbox commands...
1,784,953,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,784,954,217 UART:
1,784,954,233 UART: Running Caliptra ROM ...
1,784,954,641 UART:
1,784,954,695 UART: [state] CFI Enabled
1,784,957,139 UART: [state] LifecycleState = Unprovisioned
1,784,957,794 UART: [state] DebugLocked = No
1,784,958,436 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,784,959,915 UART: [kat] SHA2-256
1,785,753,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,785,757,961 UART: [kat] ++
1,785,758,113 UART: [kat] sha1
1,785,762,391 UART: [kat] SHA2-256
1,785,764,329 UART: [kat] SHA2-384
1,785,766,986 UART: [kat] SHA2-512-ACC
1,785,768,886 UART: [kat] ECC-384
1,785,774,547 UART: [kat] HMAC-384Kdf
1,785,779,211 UART: [kat] LMS
1,786,347,407 UART: [kat] --
1,786,348,330 UART: [update-reset] ++
1,787,729,542 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,787,730,774 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,787,886,041 >>> mbox cmd response: success
1,787,886,338 UART: [update-reset] Copying MAN_2 To MAN_1
1,787,894,352 UART: [update-reset Success] --
1,787,895,325 UART: [state] Locking Datavault
1,787,896,071 UART: [state] Locking PCR0, PCR1 and PCR31
1,787,896,675 UART: [state] Locking ICCM
1,787,897,313 UART: [exit] Launching FMC @ 0x40000130
1,787,902,643 UART:
1,787,902,659 UART: Running Caliptra FMC ...
1,787,903,067 UART:
1,787,903,121 UART: [state] CFI Enabled
1,787,992,562 UART: [art] Extend RT PCRs Done
1,787,992,990 UART: [art] Lock RT PCRs Done
1,787,994,081 UART: [art] Populate DV Done
1,788,002,252 UART: [fht] FMC Alias Private Key: 7
1,788,003,228 UART: [art] Derive CDI
1,788,003,508 UART: [art] Store in slot 0x4
1,788,088,948 UART: [art] Derive Key Pair
1,788,089,308 UART: [art] Store priv key in slot 0x5
1,788,102,199 UART: [art] Derive Key Pair - Done
1,788,116,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,132,146 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,132,911 UART: [art] PUB.X = 5E8B14162E75BF0C0068081F58F386F2F452CE4181B8A2697909F09A374C941F96133EE3C0885C3662BCA615D4691AE8
1,788,139,644 UART: [art] PUB.Y = BD887E35D8F40ABE27672B5871944EFAB1A468A8E276B185A04AC820FF01614B967DB338EE368991D9B6C3180C0BC162
1,788,146,586 UART: [art] SIG.R = F859B17660DA278FDC04D7F10636120E46CA8F6C671DEAFC5BD2BCDDF87B796DE0A972B5ED4AA7C00CEE2A7B2C5D73E9
1,788,153,370 UART: [art] SIG.S = 7BF4FEE49AF4ED896AE11C7A56B7C5B5550435D1B0E6366781DAB3503099E81A3C2DB1F99D94C3C748567212AFE2C8EA
1,788,178,053 UART: Caliptra RT
1,788,178,304 UART: [state] CFI Enabled
1,788,541,291 UART: [rt] RT listening for mailbox commands...
1,788,541,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,788,543,003 UART:
1,788,543,019 UART: Running Caliptra ROM ...
1,788,543,427 UART:
1,788,543,481 UART: [state] CFI Enabled
1,788,545,953 UART: [state] LifecycleState = Unprovisioned
1,788,546,608 UART: [state] DebugLocked = No
1,788,547,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,788,548,855 UART: [kat] SHA2-256
1,789,342,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,346,901 UART: [kat] ++
1,789,347,053 UART: [kat] sha1
1,789,351,423 UART: [kat] SHA2-256
1,789,353,361 UART: [kat] SHA2-384
1,789,356,230 UART: [kat] SHA2-512-ACC
1,789,358,130 UART: [kat] ECC-384
1,789,363,961 UART: [kat] HMAC-384Kdf
1,789,368,383 UART: [kat] LMS
1,789,936,579 UART: [kat] --
1,789,937,430 UART: [update-reset] ++
1,791,317,716 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,318,924 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,791,474,191 >>> mbox cmd response: success
1,791,474,546 UART: [update-reset] Copying MAN_2 To MAN_1
1,791,482,560 UART: [update-reset Success] --
1,791,483,581 UART: [state] Locking Datavault
1,791,484,403 UART: [state] Locking PCR0, PCR1 and PCR31
1,791,485,007 UART: [state] Locking ICCM
1,791,485,641 UART: [exit] Launching FMC @ 0x40000130
1,791,490,971 UART:
1,791,490,987 UART: Running Caliptra FMC ...
1,791,491,395 UART:
1,791,491,449 UART: [state] CFI Enabled
1,791,580,438 UART: [art] Extend RT PCRs Done
1,791,580,866 UART: [art] Lock RT PCRs Done
1,791,582,417 UART: [art] Populate DV Done
1,791,590,472 UART: [fht] FMC Alias Private Key: 7
1,791,591,496 UART: [art] Derive CDI
1,791,591,776 UART: [art] Store in slot 0x4
1,791,677,206 UART: [art] Derive Key Pair
1,791,677,566 UART: [art] Store priv key in slot 0x5
1,791,690,405 UART: [art] Derive Key Pair - Done
1,791,705,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,791,720,080 UART: [art] Erasing AUTHORITY.KEYID = 7
1,791,720,845 UART: [art] PUB.X = 528A29DF83A73983FBA6AC9D6649073F5E0561B1098DD634064AA1100203E9DFD651CF49E556B4C7B11F1CD2CF049A52
1,791,727,598 UART: [art] PUB.Y = 17C0CF50842B33C902B5B5E5A2A05565A029DA3A9464B8C4DD4AACEF053A1EB4FFDE67007271C9F108578767F606ED86
1,791,734,522 UART: [art] SIG.R = 184B99CF848635E51CE69CA3D521D496CD6F1AADA6646B3E5879745AD94B8F324417643DAF0DE20046DAD020F8DB5472
1,791,741,273 UART: [art] SIG.S = 547C5421F3B562C092F66A0DD22A972E31DD35BBCAD46887AD3C4BE0FE7E7727E6397772E35854D3A3091E37680FEC4E
1,791,764,588 UART: Caliptra RT
1,791,764,839 UART: [state] CFI Enabled
1,792,130,971 UART: [rt] RT listening for mailbox commands...
1,792,131,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,132,257 UART:
1,792,132,273 UART: Running Caliptra ROM ...
1,792,132,681 UART:
1,792,132,735 UART: [state] CFI Enabled
1,792,135,015 UART: [state] LifecycleState = Unprovisioned
1,792,135,670 UART: [state] DebugLocked = No
1,792,136,178 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,137,807 UART: [kat] SHA2-256
1,792,931,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,792,935,853 UART: [kat] ++
1,792,936,005 UART: [kat] sha1
1,792,940,173 UART: [kat] SHA2-256
1,792,942,111 UART: [kat] SHA2-384
1,792,944,872 UART: [kat] SHA2-512-ACC
1,792,946,772 UART: [kat] ECC-384
1,792,952,311 UART: [kat] HMAC-384Kdf
1,792,957,097 UART: [kat] LMS
1,793,525,293 UART: [kat] --
1,793,526,028 UART: [update-reset] ++
1,794,906,376 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,794,907,580 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,062,847 >>> mbox cmd response: success
1,795,063,010 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,071,024 UART: [update-reset Success] --
1,795,072,023 UART: [state] Locking Datavault
1,795,072,853 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,073,457 UART: [state] Locking ICCM
1,795,074,105 UART: [exit] Launching FMC @ 0x40000130
1,795,079,435 UART:
1,795,079,451 UART: Running Caliptra FMC ...
1,795,079,859 UART:
1,795,079,913 UART: [state] CFI Enabled
1,795,169,160 UART: [art] Extend RT PCRs Done
1,795,169,588 UART: [art] Lock RT PCRs Done
1,795,170,873 UART: [art] Populate DV Done
1,795,178,746 UART: [fht] FMC Alias Private Key: 7
1,795,179,838 UART: [art] Derive CDI
1,795,180,118 UART: [art] Store in slot 0x4
1,795,266,302 UART: [art] Derive Key Pair
1,795,266,662 UART: [art] Store priv key in slot 0x5
1,795,279,633 UART: [art] Derive Key Pair - Done
1,795,294,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,309,894 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,310,659 UART: [art] PUB.X = 5E8B14162E75BF0C0068081F58F386F2F452CE4181B8A2697909F09A374C941F96133EE3C0885C3662BCA615D4691AE8
1,795,317,392 UART: [art] PUB.Y = BD887E35D8F40ABE27672B5871944EFAB1A468A8E276B185A04AC820FF01614B967DB338EE368991D9B6C3180C0BC162
1,795,324,334 UART: [art] SIG.R = F859B17660DA278FDC04D7F10636120E46CA8F6C671DEAFC5BD2BCDDF87B796DE0A972B5ED4AA7C00CEE2A7B2C5D73E9
1,795,331,118 UART: [art] SIG.S = 7BF4FEE49AF4ED896AE11C7A56B7C5B5550435D1B0E6366781DAB3503099E81A3C2DB1F99D94C3C748567212AFE2C8EA
1,795,355,027 UART: Caliptra RT
1,795,355,278 UART: [state] CFI Enabled
1,795,721,017 UART: [rt] RT listening for mailbox commands...
1,795,721,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,795,722,455 UART:
1,795,722,471 UART: Running Caliptra ROM ...
1,795,722,879 UART:
1,795,722,933 UART: [state] CFI Enabled
1,795,725,465 UART: [state] LifecycleState = Unprovisioned
1,795,726,120 UART: [state] DebugLocked = No
1,795,726,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,795,728,419 UART: [kat] SHA2-256
1,796,522,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,796,526,465 UART: [kat] ++
1,796,526,617 UART: [kat] sha1
1,796,530,797 UART: [kat] SHA2-256
1,796,532,735 UART: [kat] SHA2-384
1,796,535,484 UART: [kat] SHA2-512-ACC
1,796,537,384 UART: [kat] ECC-384
1,796,542,843 UART: [kat] HMAC-384Kdf
1,796,547,365 UART: [kat] LMS
1,797,115,561 UART: [kat] --
1,797,116,362 UART: [update-reset] ++
1,798,497,472 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,798,498,630 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,798,653,897 >>> mbox cmd response: success
1,798,654,064 UART: [update-reset] Copying MAN_2 To MAN_1
1,798,662,078 UART: [update-reset Success] --
1,798,662,921 UART: [state] Locking Datavault
1,798,663,793 UART: [state] Locking PCR0, PCR1 and PCR31
1,798,664,397 UART: [state] Locking ICCM
1,798,664,911 UART: [exit] Launching FMC @ 0x40000130
1,798,670,241 UART:
1,798,670,257 UART: Running Caliptra FMC ...
1,798,670,665 UART:
1,798,670,719 UART: [state] CFI Enabled
1,798,760,000 UART: [art] Extend RT PCRs Done
1,798,760,428 UART: [art] Lock RT PCRs Done
1,798,761,989 UART: [art] Populate DV Done
1,798,770,308 UART: [fht] FMC Alias Private Key: 7
1,798,771,374 UART: [art] Derive CDI
1,798,771,654 UART: [art] Store in slot 0x4
1,798,857,522 UART: [art] Derive Key Pair
1,798,857,882 UART: [art] Store priv key in slot 0x5
1,798,871,513 UART: [art] Derive Key Pair - Done
1,798,886,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,798,902,302 UART: [art] Erasing AUTHORITY.KEYID = 7
1,798,903,067 UART: [art] PUB.X = 528A29DF83A73983FBA6AC9D6649073F5E0561B1098DD634064AA1100203E9DFD651CF49E556B4C7B11F1CD2CF049A52
1,798,909,820 UART: [art] PUB.Y = 17C0CF50842B33C902B5B5E5A2A05565A029DA3A9464B8C4DD4AACEF053A1EB4FFDE67007271C9F108578767F606ED86
1,798,916,744 UART: [art] SIG.R = 184B99CF848635E51CE69CA3D521D496CD6F1AADA6646B3E5879745AD94B8F324417643DAF0DE20046DAD020F8DB5472
1,798,923,495 UART: [art] SIG.S = 547C5421F3B562C092F66A0DD22A972E31DD35BBCAD46887AD3C4BE0FE7E7727E6397772E35854D3A3091E37680FEC4E
1,798,947,666 UART: Caliptra RT
1,798,947,917 UART: [state] CFI Enabled
1,799,314,831 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 360.50s
Truncated 718092 bytes from beginning
CDBD283F6A
1,710,116,018 UART: [art] SIG.S = 1E9342861840E471A7FC561B6BA8C3156E6C99B319D1627CE41AB76F1CF45A5B63EA7DA7FF45CA05F7A1227671A4E5B4
1,710,140,115 UART: Caliptra RT
1,710,140,366 UART: [state] CFI Enabled
1,710,510,153 UART: [rt] RT listening for mailbox commands...
1,710,510,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,323,827 >>> mbox cmd response: success
1,713,337,135 UART:
1,713,337,151 UART: Running Caliptra FMC ...
1,713,337,559 UART:
1,713,337,613 UART: [state] CFI Enabled
1,713,426,792 UART: [art] Extend RT PCRs Done
1,713,427,220 UART: [art] Lock RT PCRs Done
1,713,428,463 UART: [art] Populate DV Done
1,713,436,472 UART: [fht] FMC Alias Private Key: 7
1,713,437,558 UART: [art] Derive CDI
1,713,437,838 UART: [art] Store in slot 0x4
1,713,523,772 UART: [art] Derive Key Pair
1,713,524,132 UART: [art] Store priv key in slot 0x5
1,713,537,427 UART: [art] Derive Key Pair - Done
1,713,551,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,713,567,411 UART: [art] Erasing AUTHORITY.KEYID = 7
1,713,568,176 UART: [art] PUB.X = 70585E498F47CD0741836CEDC1C260B369C9A60B8F71D9AF12B227414E13B0262E4452A007BED2A925F0C791B206FC35
1,713,574,934 UART: [art] PUB.Y = 4DD9CF44446D2286DB8693CE851A801E65724742431CA3C3EA7CDC2491C158A647B1478A067A0093AD37B6BDD521381D
1,713,581,859 UART: [art] SIG.R = 9C7B27D0B7DFB87183C465487B558A00D755F9D65C2E13A994D1D9C93D39B538C18E04D4EAEF8342A8A3935D897B395B
1,713,588,608 UART: [art] SIG.S = 1AD80047FD63C50EC4CA568490463C625892FDFB7DD249297030EE94AF2E917EBB3A82C782D24FCBCFF613D4EB836A55
1,713,611,957 UART: Caliptra RT
1,713,612,208 UART: [state] CFI Enabled
1,713,979,215 UART: [rt] RT listening for mailbox commands...
1,713,979,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,716,795,143 >>> mbox cmd response: success
1,716,808,525 UART:
1,716,808,541 UART: Running Caliptra FMC ...
1,716,808,949 UART:
1,716,809,003 UART: [state] CFI Enabled
1,716,897,490 UART: [art] Extend RT PCRs Done
1,716,897,918 UART: [art] Lock RT PCRs Done
1,716,899,167 UART: [art] Populate DV Done
1,716,907,132 UART: [fht] FMC Alias Private Key: 7
1,716,908,274 UART: [art] Derive CDI
1,716,908,554 UART: [art] Store in slot 0x4
1,716,994,108 UART: [art] Derive Key Pair
1,716,994,468 UART: [art] Store priv key in slot 0x5
1,717,007,179 UART: [art] Derive Key Pair - Done
1,717,022,056 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,037,539 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,038,304 UART: [art] PUB.X = 078CDD903090EEBAFAA300D0A05A19F2D1F89E36817CE5A7BF68DA7EE07D892982AD541858D3C81341B3B24D2661A48A
1,717,045,059 UART: [art] PUB.Y = 96BD83206CD382798A8A869FC013F645EE588D385B3D1C8E8380E69BDD9BD476ADD7C51DF81E78384E0528AD7CE899E9
1,717,052,014 UART: [art] SIG.R = A9965CF389C1BDAE9A014CF6DCC7DAE50AE6E398EE14BC138037CA377A7CC9D74AF5645842DA2E17860AE5CDBD283F6A
1,717,058,799 UART: [art] SIG.S = 1E9342861840E471A7FC561B6BA8C3156E6C99B319D1627CE41AB76F1CF45A5B63EA7DA7FF45CA05F7A1227671A4E5B4
1,717,082,186 UART: Caliptra RT
1,717,082,437 UART: [state] CFI Enabled
1,717,448,410 UART: [rt] RT listening for mailbox commands...
1,717,449,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,263,644 >>> mbox cmd response: success
1,720,276,974 UART:
1,720,276,990 UART: Running Caliptra FMC ...
1,720,277,398 UART:
1,720,277,452 UART: [state] CFI Enabled
1,720,366,865 UART: [art] Extend RT PCRs Done
1,720,367,293 UART: [art] Lock RT PCRs Done
1,720,368,426 UART: [art] Populate DV Done
1,720,376,439 UART: [fht] FMC Alias Private Key: 7
1,720,377,419 UART: [art] Derive CDI
1,720,377,699 UART: [art] Store in slot 0x4
1,720,463,071 UART: [art] Derive Key Pair
1,720,463,431 UART: [art] Store priv key in slot 0x5
1,720,476,256 UART: [art] Derive Key Pair - Done
1,720,490,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,720,506,058 UART: [art] Erasing AUTHORITY.KEYID = 7
1,720,506,823 UART: [art] PUB.X = 70585E498F47CD0741836CEDC1C260B369C9A60B8F71D9AF12B227414E13B0262E4452A007BED2A925F0C791B206FC35
1,720,513,581 UART: [art] PUB.Y = 4DD9CF44446D2286DB8693CE851A801E65724742431CA3C3EA7CDC2491C158A647B1478A067A0093AD37B6BDD521381D
1,720,520,506 UART: [art] SIG.R = 9C7B27D0B7DFB87183C465487B558A00D755F9D65C2E13A994D1D9C93D39B538C18E04D4EAEF8342A8A3935D897B395B
1,720,527,255 UART: [art] SIG.S = 1AD80047FD63C50EC4CA568490463C625892FDFB7DD249297030EE94AF2E917EBB3A82C782D24FCBCFF613D4EB836A55
1,720,550,910 UART: Caliptra RT
1,720,551,161 UART: [state] CFI Enabled
1,720,916,638 UART: [rt] RT listening for mailbox commands...
1,720,917,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,723,731,142 >>> mbox cmd response: success
1,723,744,252 UART:
1,723,744,268 UART: Running Caliptra FMC ...
1,723,744,676 UART:
1,723,744,730 UART: [state] CFI Enabled
1,723,833,711 UART: [art] Extend RT PCRs Done
1,723,834,139 UART: [art] Lock RT PCRs Done
1,723,835,528 UART: [art] Populate DV Done
1,723,843,665 UART: [fht] FMC Alias Private Key: 7
1,723,844,659 UART: [art] Derive CDI
1,723,844,939 UART: [art] Store in slot 0x4
1,723,930,719 UART: [art] Derive Key Pair
1,723,931,079 UART: [art] Store priv key in slot 0x5
1,723,944,366 UART: [art] Derive Key Pair - Done
1,723,959,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,723,974,426 UART: [art] Erasing AUTHORITY.KEYID = 7
1,723,975,191 UART: [art] PUB.X = 078CDD903090EEBAFAA300D0A05A19F2D1F89E36817CE5A7BF68DA7EE07D892982AD541858D3C81341B3B24D2661A48A
1,723,981,946 UART: [art] PUB.Y = 96BD83206CD382798A8A869FC013F645EE588D385B3D1C8E8380E69BDD9BD476ADD7C51DF81E78384E0528AD7CE899E9
1,723,988,901 UART: [art] SIG.R = A9965CF389C1BDAE9A014CF6DCC7DAE50AE6E398EE14BC138037CA377A7CC9D74AF5645842DA2E17860AE5CDBD283F6A
1,723,995,686 UART: [art] SIG.S = 1E9342861840E471A7FC561B6BA8C3156E6C99B319D1627CE41AB76F1CF45A5B63EA7DA7FF45CA05F7A1227671A4E5B4
1,724,019,647 UART: Caliptra RT
1,724,019,898 UART: [state] CFI Enabled
1,724,386,067 UART: [rt] RT listening for mailbox commands...
1,724,386,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,201,239 >>> mbox cmd response: success
1,727,214,831 UART:
1,727,214,847 UART: Running Caliptra FMC ...
1,727,215,255 UART:
1,727,215,309 UART: [state] CFI Enabled
1,727,304,822 UART: [art] Extend RT PCRs Done
1,727,305,250 UART: [art] Lock RT PCRs Done
1,727,306,327 UART: [art] Populate DV Done
1,727,314,728 UART: [fht] FMC Alias Private Key: 7
1,727,315,822 UART: [art] Derive CDI
1,727,316,102 UART: [art] Store in slot 0x4
1,727,401,972 UART: [art] Derive Key Pair
1,727,402,332 UART: [art] Store priv key in slot 0x5
1,727,415,039 UART: [art] Derive Key Pair - Done
1,727,429,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,727,445,005 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,445,770 UART: [art] PUB.X = 70585E498F47CD0741836CEDC1C260B369C9A60B8F71D9AF12B227414E13B0262E4452A007BED2A925F0C791B206FC35
1,727,452,528 UART: [art] PUB.Y = 4DD9CF44446D2286DB8693CE851A801E65724742431CA3C3EA7CDC2491C158A647B1478A067A0093AD37B6BDD521381D
1,727,459,453 UART: [art] SIG.R = 9C7B27D0B7DFB87183C465487B558A00D755F9D65C2E13A994D1D9C93D39B538C18E04D4EAEF8342A8A3935D897B395B
1,727,466,202 UART: [art] SIG.S = 1AD80047FD63C50EC4CA568490463C625892FDFB7DD249297030EE94AF2E917EBB3A82C782D24FCBCFF613D4EB836A55
1,727,489,901 UART: Caliptra RT
1,727,490,152 UART: [state] CFI Enabled
1,727,853,157 UART: [rt] RT listening for mailbox commands...
1,727,853,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,730,669,121 >>> mbox cmd response: success
1,730,682,553 UART:
1,730,682,569 UART: Running Caliptra FMC ...
1,730,682,977 UART:
1,730,683,031 UART: [state] CFI Enabled
1,730,772,094 UART: [art] Extend RT PCRs Done
1,730,772,522 UART: [art] Lock RT PCRs Done
1,730,773,943 UART: [art] Populate DV Done
1,730,781,902 UART: [fht] FMC Alias Private Key: 7
1,730,782,886 UART: [art] Derive CDI
1,730,783,166 UART: [art] Store in slot 0x4
1,730,869,452 UART: [art] Derive Key Pair
1,730,869,812 UART: [art] Store priv key in slot 0x5
1,730,883,179 UART: [art] Derive Key Pair - Done
1,730,897,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,730,913,213 UART: [art] Erasing AUTHORITY.KEYID = 7
1,730,913,978 UART: [art] PUB.X = 078CDD903090EEBAFAA300D0A05A19F2D1F89E36817CE5A7BF68DA7EE07D892982AD541858D3C81341B3B24D2661A48A
1,730,920,733 UART: [art] PUB.Y = 96BD83206CD382798A8A869FC013F645EE588D385B3D1C8E8380E69BDD9BD476ADD7C51DF81E78384E0528AD7CE899E9
1,730,927,688 UART: [art] SIG.R = A9965CF389C1BDAE9A014CF6DCC7DAE50AE6E398EE14BC138037CA377A7CC9D74AF5645842DA2E17860AE5CDBD283F6A
1,730,934,473 UART: [art] SIG.S = 1E9342861840E471A7FC561B6BA8C3156E6C99B319D1627CE41AB76F1CF45A5B63EA7DA7FF45CA05F7A1227671A4E5B4
1,730,958,594 UART: Caliptra RT
1,730,958,845 UART: [state] CFI Enabled
1,731,324,680 UART: [rt] RT listening for mailbox commands...
1,731,325,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,140,070 >>> mbox cmd response: success
1,734,152,802 UART:
1,734,152,818 UART: Running Caliptra FMC ...
1,734,153,226 UART:
1,734,153,280 UART: [state] CFI Enabled
1,734,242,397 UART: [art] Extend RT PCRs Done
1,734,242,825 UART: [art] Lock RT PCRs Done
1,734,243,842 UART: [art] Populate DV Done
1,734,251,931 UART: [fht] FMC Alias Private Key: 7
1,734,252,905 UART: [art] Derive CDI
1,734,253,185 UART: [art] Store in slot 0x4
1,734,338,579 UART: [art] Derive Key Pair
1,734,338,939 UART: [art] Store priv key in slot 0x5
1,734,352,588 UART: [art] Derive Key Pair - Done
1,734,367,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,382,906 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,383,671 UART: [art] PUB.X = 70585E498F47CD0741836CEDC1C260B369C9A60B8F71D9AF12B227414E13B0262E4452A007BED2A925F0C791B206FC35
1,734,390,429 UART: [art] PUB.Y = 4DD9CF44446D2286DB8693CE851A801E65724742431CA3C3EA7CDC2491C158A647B1478A067A0093AD37B6BDD521381D
1,734,397,354 UART: [art] SIG.R = 9C7B27D0B7DFB87183C465487B558A00D755F9D65C2E13A994D1D9C93D39B538C18E04D4EAEF8342A8A3935D897B395B
1,734,404,103 UART: [art] SIG.S = 1AD80047FD63C50EC4CA568490463C625892FDFB7DD249297030EE94AF2E917EBB3A82C782D24FCBCFF613D4EB836A55
1,734,428,100 UART: Caliptra RT
1,734,428,351 UART: [state] CFI Enabled
1,734,794,458 UART: [rt] RT listening for mailbox commands...
1,734,795,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,737,609,436 >>> mbox cmd response: success
1,737,622,742 UART:
1,737,622,758 UART: Running Caliptra FMC ...
1,737,623,166 UART:
1,737,623,220 UART: [state] CFI Enabled
1,737,712,601 UART: [art] Extend RT PCRs Done
1,737,713,029 UART: [art] Lock RT PCRs Done
1,737,714,188 UART: [art] Populate DV Done
1,737,722,589 UART: [fht] FMC Alias Private Key: 7
1,737,723,723 UART: [art] Derive CDI
1,737,724,003 UART: [art] Store in slot 0x4
1,737,809,635 UART: [art] Derive Key Pair
1,737,809,995 UART: [art] Store priv key in slot 0x5
1,737,823,036 UART: [art] Derive Key Pair - Done
1,737,838,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,737,853,622 UART: [art] Erasing AUTHORITY.KEYID = 7
1,737,854,387 UART: [art] PUB.X = 078CDD903090EEBAFAA300D0A05A19F2D1F89E36817CE5A7BF68DA7EE07D892982AD541858D3C81341B3B24D2661A48A
1,737,861,142 UART: [art] PUB.Y = 96BD83206CD382798A8A869FC013F645EE588D385B3D1C8E8380E69BDD9BD476ADD7C51DF81E78384E0528AD7CE899E9
1,737,868,097 UART: [art] SIG.R = A9965CF389C1BDAE9A014CF6DCC7DAE50AE6E398EE14BC138037CA377A7CC9D74AF5645842DA2E17860AE5CDBD283F6A
1,737,874,882 UART: [art] SIG.S = 1E9342861840E471A7FC561B6BA8C3156E6C99B319D1627CE41AB76F1CF45A5B63EA7DA7FF45CA05F7A1227671A4E5B4
1,737,898,617 UART: Caliptra RT
1,737,898,868 UART: [state] CFI Enabled
1,738,264,117 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 348.92s
Truncated 1341954 bytes from beginning
73,823 UART: [art] Lock RT PCRs Done
1,784,875,050 UART: [art] Populate DV Done
1,784,883,171 UART: [fht] FMC Alias Private Key: 7
1,784,884,157 UART: [art] Derive CDI
1,784,884,437 UART: [art] Store in slot 0x4
1,784,970,675 UART: [art] Derive Key Pair
1,784,971,035 UART: [art] Store priv key in slot 0x5
1,784,984,786 UART: [art] Derive Key Pair - Done
1,784,999,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,785,015,133 UART: [art] Erasing AUTHORITY.KEYID = 7
1,785,015,898 UART: [art] PUB.X = B5A7DD4AA7EF316A10FB3D76475FD3E31B1B4F5C10013416E1D072F2318AC477D985537107C3A3C59606BDD6FEF1BCEC
1,785,022,673 UART: [art] PUB.Y = 9C524581267F026822D86079547197995FADF5E8627F57C0C6D5AFC994A5FED425946607B7BB3FBED3874887D55606EC
1,785,029,610 UART: [art] SIG.R = 0B0B0F566A621AF56880332BDD38A49EC3FBFD171BE5F034261C35D68B0C7969D4594E231932767A7FCA26C320969BC1
1,785,036,370 UART: [art] SIG.S = 01793C9E129300C22A70DBD54A67B4C8EB03642F2E77F97BF8CA8659F23E695839E3CABBDF2EF271BD3A94156864AA36
1,785,060,422 UART: Caliptra RT
1,785,060,765 UART: [state] CFI Enabled
1,785,425,649 UART: [rt] RT listening for mailbox commands...
1,785,426,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,785,427,299 UART:
1,785,427,315 UART: Running Caliptra ROM ...
1,785,427,723 UART:
1,785,427,864 UART: [state] CFI Enabled
1,785,430,584 UART: [state] LifecycleState = Unprovisioned
1,785,431,239 UART: [state] DebugLocked = No
1,785,431,797 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,785,433,400 UART: [kat] SHA2-256
1,786,227,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,786,231,446 UART: [kat] ++
1,786,231,598 UART: [kat] sha1
1,786,235,962 UART: [kat] SHA2-256
1,786,237,900 UART: [kat] SHA2-384
1,786,240,647 UART: [kat] SHA2-512-ACC
1,786,242,547 UART: [kat] ECC-384
1,786,247,922 UART: [kat] HMAC-384Kdf
1,786,252,790 UART: [kat] LMS
1,786,820,986 UART: [kat] --
1,786,821,893 UART: [update-reset] ++
1,788,204,013 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,788,205,123 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,788,360,390 >>> mbox cmd response: success
1,788,360,611 UART: [update-reset] Copying MAN_2 To MAN_1
1,788,368,625 UART: [update-reset Success] --
1,788,369,706 UART: [state] Locking Datavault
1,788,370,534 UART: [state] Locking PCR0, PCR1 and PCR31
1,788,371,138 UART: [state] Locking ICCM
1,788,371,728 UART: [exit] Launching FMC @ 0x40000130
1,788,377,058 UART:
1,788,377,074 UART: Running Caliptra FMC ...
1,788,377,482 UART:
1,788,377,625 UART: [state] CFI Enabled
1,788,467,096 UART: [art] Extend RT PCRs Done
1,788,467,524 UART: [art] Lock RT PCRs Done
1,788,468,441 UART: [art] Populate DV Done
1,788,476,348 UART: [fht] FMC Alias Private Key: 7
1,788,477,294 UART: [art] Derive CDI
1,788,477,574 UART: [art] Store in slot 0x4
1,788,563,664 UART: [art] Derive Key Pair
1,788,564,024 UART: [art] Store priv key in slot 0x5
1,788,576,519 UART: [art] Derive Key Pair - Done
1,788,591,178 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,788,606,337 UART: [art] Erasing AUTHORITY.KEYID = 7
1,788,607,102 UART: [art] PUB.X = A7EB3D64CA92477D4809F6EF4237DBE5BEAAD144113FB8833F56495CAC394AADE50D45A45233025B84019FEF796E86A4
1,788,613,870 UART: [art] PUB.Y = 126A0B7498E7A1727E725007EA19D8794F2F8B11B1DBF1D689A0A403CE728F5570C0E8101661D43F2A70DA30E6F36DA9
1,788,620,813 UART: [art] SIG.R = 5D9AFFF121D66BA207191FFE144C27582B42E0897B21B01AE22C52D97AE0B794EEB412B7783312A6ACA3BCE895B4871E
1,788,627,590 UART: [art] SIG.S = 0341EDF3523AA392140D239D10A7EF8C365E9F9BD78DE004D69B75A735576CC100DAF808096FC628CF8CC03FD757D035
1,788,651,491 UART: Caliptra RT
1,788,651,834 UART: [state] CFI Enabled
1,789,018,824 UART: [rt] RT listening for mailbox commands...
1,789,019,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,789,020,638 UART:
1,789,020,654 UART: Running Caliptra ROM ...
1,789,021,062 UART:
1,789,021,203 UART: [state] CFI Enabled
1,789,023,403 UART: [state] LifecycleState = Unprovisioned
1,789,024,058 UART: [state] DebugLocked = No
1,789,024,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,789,026,219 UART: [kat] SHA2-256
1,789,820,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,789,824,265 UART: [kat] ++
1,789,824,417 UART: [kat] sha1
1,789,828,527 UART: [kat] SHA2-256
1,789,830,465 UART: [kat] SHA2-384
1,789,833,228 UART: [kat] SHA2-512-ACC
1,789,835,128 UART: [kat] ECC-384
1,789,840,681 UART: [kat] HMAC-384Kdf
1,789,845,409 UART: [kat] LMS
1,790,413,605 UART: [kat] --
1,790,414,292 UART: [update-reset] ++
1,791,796,566 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,791,797,616 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,791,952,883 >>> mbox cmd response: success
1,791,953,042 UART: [update-reset] Copying MAN_2 To MAN_1
1,791,961,056 UART: [update-reset Success] --
1,791,961,937 UART: [state] Locking Datavault
1,791,962,621 UART: [state] Locking PCR0, PCR1 and PCR31
1,791,963,225 UART: [state] Locking ICCM
1,791,963,851 UART: [exit] Launching FMC @ 0x40000130
1,791,969,181 UART:
1,791,969,197 UART: Running Caliptra FMC ...
1,791,969,605 UART:
1,791,969,748 UART: [state] CFI Enabled
1,792,059,351 UART: [art] Extend RT PCRs Done
1,792,059,779 UART: [art] Lock RT PCRs Done
1,792,061,140 UART: [art] Populate DV Done
1,792,069,569 UART: [fht] FMC Alias Private Key: 7
1,792,070,641 UART: [art] Derive CDI
1,792,070,921 UART: [art] Store in slot 0x4
1,792,156,955 UART: [art] Derive Key Pair
1,792,157,315 UART: [art] Store priv key in slot 0x5
1,792,170,066 UART: [art] Derive Key Pair - Done
1,792,184,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,792,199,991 UART: [art] Erasing AUTHORITY.KEYID = 7
1,792,200,756 UART: [art] PUB.X = B5A7DD4AA7EF316A10FB3D76475FD3E31B1B4F5C10013416E1D072F2318AC477D985537107C3A3C59606BDD6FEF1BCEC
1,792,207,531 UART: [art] PUB.Y = 9C524581267F026822D86079547197995FADF5E8627F57C0C6D5AFC994A5FED425946607B7BB3FBED3874887D55606EC
1,792,214,468 UART: [art] SIG.R = 0B0B0F566A621AF56880332BDD38A49EC3FBFD171BE5F034261C35D68B0C7969D4594E231932767A7FCA26C320969BC1
1,792,221,228 UART: [art] SIG.S = 01793C9E129300C22A70DBD54A67B4C8EB03642F2E77F97BF8CA8659F23E695839E3CABBDF2EF271BD3A94156864AA36
1,792,245,068 UART: Caliptra RT
1,792,245,411 UART: [state] CFI Enabled
1,792,611,651 UART: [rt] RT listening for mailbox commands...
1,792,612,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,792,613,095 UART:
1,792,613,111 UART: Running Caliptra ROM ...
1,792,613,519 UART:
1,792,613,660 UART: [state] CFI Enabled
1,792,616,696 UART: [state] LifecycleState = Unprovisioned
1,792,617,351 UART: [state] DebugLocked = No
1,792,617,989 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,792,619,522 UART: [kat] SHA2-256
1,793,413,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,793,417,568 UART: [kat] ++
1,793,417,720 UART: [kat] sha1
1,793,421,848 UART: [kat] SHA2-256
1,793,423,786 UART: [kat] SHA2-384
1,793,426,533 UART: [kat] SHA2-512-ACC
1,793,428,433 UART: [kat] ECC-384
1,793,433,842 UART: [kat] HMAC-384Kdf
1,793,438,634 UART: [kat] LMS
1,794,006,830 UART: [kat] --
1,794,007,755 UART: [update-reset] ++
1,795,389,461 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,795,390,529 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,795,545,796 >>> mbox cmd response: success
1,795,545,957 UART: [update-reset] Copying MAN_2 To MAN_1
1,795,553,971 UART: [update-reset Success] --
1,795,555,068 UART: [state] Locking Datavault
1,795,555,696 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,556,300 UART: [state] Locking ICCM
1,795,556,858 UART: [exit] Launching FMC @ 0x40000130
1,795,562,188 UART:
1,795,562,204 UART: Running Caliptra FMC ...
1,795,562,612 UART:
1,795,562,755 UART: [state] CFI Enabled
1,795,652,328 UART: [art] Extend RT PCRs Done
1,795,652,756 UART: [art] Lock RT PCRs Done
1,795,653,829 UART: [art] Populate DV Done
1,795,662,254 UART: [fht] FMC Alias Private Key: 7
1,795,663,418 UART: [art] Derive CDI
1,795,663,698 UART: [art] Store in slot 0x4
1,795,749,464 UART: [art] Derive Key Pair
1,795,749,824 UART: [art] Store priv key in slot 0x5
1,795,763,615 UART: [art] Derive Key Pair - Done
1,795,778,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,795,794,179 UART: [art] Erasing AUTHORITY.KEYID = 7
1,795,794,944 UART: [art] PUB.X = A7EB3D64CA92477D4809F6EF4237DBE5BEAAD144113FB8833F56495CAC394AADE50D45A45233025B84019FEF796E86A4
1,795,801,712 UART: [art] PUB.Y = 126A0B7498E7A1727E725007EA19D8794F2F8B11B1DBF1D689A0A403CE728F5570C0E8101661D43F2A70DA30E6F36DA9
1,795,808,655 UART: [art] SIG.R = 5D9AFFF121D66BA207191FFE144C27582B42E0897B21B01AE22C52D97AE0B794EEB412B7783312A6ACA3BCE895B4871E
1,795,815,432 UART: [art] SIG.S = 0341EDF3523AA392140D239D10A7EF8C365E9F9BD78DE004D69B75A735576CC100DAF808096FC628CF8CC03FD757D035
1,795,838,983 UART: Caliptra RT
1,795,839,326 UART: [state] CFI Enabled
1,796,201,808 UART: [rt] RT listening for mailbox commands...
1,796,202,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,796,203,418 UART:
1,796,203,434 UART: Running Caliptra ROM ...
1,796,203,842 UART:
1,796,203,983 UART: [state] CFI Enabled
1,796,206,745 UART: [state] LifecycleState = Unprovisioned
1,796,207,400 UART: [state] DebugLocked = No
1,796,207,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,796,209,395 UART: [kat] SHA2-256
1,797,003,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,797,007,441 UART: [kat] ++
1,797,007,593 UART: [kat] sha1
1,797,011,859 UART: [kat] SHA2-256
1,797,013,797 UART: [kat] SHA2-384
1,797,016,684 UART: [kat] SHA2-512-ACC
1,797,018,584 UART: [kat] ECC-384
1,797,024,261 UART: [kat] HMAC-384Kdf
1,797,028,863 UART: [kat] LMS
1,797,597,059 UART: [kat] --
1,797,597,882 UART: [update-reset] ++
1,798,978,534 UART: [update-reset] Image verified using Vendor ECC Key Index 0
1,798,979,704 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
1,799,134,971 >>> mbox cmd response: success
1,799,135,124 UART: [update-reset] Copying MAN_2 To MAN_1
1,799,143,138 UART: [update-reset Success] --
1,799,144,121 UART: [state] Locking Datavault
1,799,144,957 UART: [state] Locking PCR0, PCR1 and PCR31
1,799,145,561 UART: [state] Locking ICCM
1,799,146,137 UART: [exit] Launching FMC @ 0x40000130
1,799,151,467 UART:
1,799,151,483 UART: Running Caliptra FMC ...
1,799,151,891 UART:
1,799,152,034 UART: [state] CFI Enabled
1,799,241,793 UART: [art] Extend RT PCRs Done
1,799,242,221 UART: [art] Lock RT PCRs Done
1,799,243,396 UART: [art] Populate DV Done
1,799,251,619 UART: [fht] FMC Alias Private Key: 7
1,799,252,581 UART: [art] Derive CDI
1,799,252,861 UART: [art] Store in slot 0x4
1,799,338,659 UART: [art] Derive Key Pair
1,799,339,019 UART: [art] Store priv key in slot 0x5
1,799,352,562 UART: [art] Derive Key Pair - Done
1,799,367,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,799,383,337 UART: [art] Erasing AUTHORITY.KEYID = 7
1,799,384,102 UART: [art] PUB.X = B5A7DD4AA7EF316A10FB3D76475FD3E31B1B4F5C10013416E1D072F2318AC477D985537107C3A3C59606BDD6FEF1BCEC
1,799,390,877 UART: [art] PUB.Y = 9C524581267F026822D86079547197995FADF5E8627F57C0C6D5AFC994A5FED425946607B7BB3FBED3874887D55606EC
1,799,397,814 UART: [art] SIG.R = 0B0B0F566A621AF56880332BDD38A49EC3FBFD171BE5F034261C35D68B0C7969D4594E231932767A7FCA26C320969BC1
1,799,404,574 UART: [art] SIG.S = 01793C9E129300C22A70DBD54A67B4C8EB03642F2E77F97BF8CA8659F23E695839E3CABBDF2EF271BD3A94156864AA36
1,799,428,198 UART: Caliptra RT
1,799,428,541 UART: [state] CFI Enabled
1,799,796,559 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 370.98s
Truncated 718092 bytes from beginning
DCF9027435
1,710,654,199 UART: [art] SIG.S = 29752EF5D7C12A63C404322F8187C2888B576176561231B5F113F3C263A8E73DB46FF5A3F16D5AE261465351245CF20B
1,710,678,215 UART: Caliptra RT
1,710,678,558 UART: [state] CFI Enabled
1,711,050,687 UART: [rt] RT listening for mailbox commands...
1,711,051,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,713,867,136 >>> mbox cmd response: success
1,713,880,500 UART:
1,713,880,516 UART: Running Caliptra FMC ...
1,713,880,924 UART:
1,713,881,067 UART: [state] CFI Enabled
1,713,970,600 UART: [art] Extend RT PCRs Done
1,713,971,028 UART: [art] Lock RT PCRs Done
1,713,972,161 UART: [art] Populate DV Done
1,713,980,246 UART: [fht] FMC Alias Private Key: 7
1,713,981,384 UART: [art] Derive CDI
1,713,981,664 UART: [art] Store in slot 0x4
1,714,067,274 UART: [art] Derive Key Pair
1,714,067,634 UART: [art] Store priv key in slot 0x5
1,714,081,561 UART: [art] Derive Key Pair - Done
1,714,096,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,714,111,880 UART: [art] Erasing AUTHORITY.KEYID = 7
1,714,112,645 UART: [art] PUB.X = D1B1F08FE021DDF9C626756526A81CB2139DFB05717A72A314809B39CE95932FF7862110CD0C6F7B7DEDD7DFA5E0E367
1,714,119,419 UART: [art] PUB.Y = 40B21D4BCC1F18189B0CF0BC32F15B1D9C02EA207B9E44E291E83D98C92C0EDD819EFC9D5EE3514F9BAB719C00E7BDD3
1,714,126,360 UART: [art] SIG.R = 704EFC682214AADC8589611DDCC36E3063117C363D20C0292D6E0E5716D8045A16B40FBE130EAF49C7B32466F2DFB919
1,714,133,122 UART: [art] SIG.S = EFC5FE1F1E12E27C5D82C5BF55A9246F14872760CCC48F04E93C37BFADDEE770D467A783A3C279D1A05EE1C532E8DF75
1,714,157,043 UART: Caliptra RT
1,714,157,386 UART: [state] CFI Enabled
1,714,517,589 UART: [rt] RT listening for mailbox commands...
1,714,518,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,717,333,686 >>> mbox cmd response: success
1,717,346,908 UART:
1,717,346,924 UART: Running Caliptra FMC ...
1,717,347,332 UART:
1,717,347,475 UART: [state] CFI Enabled
1,717,436,640 UART: [art] Extend RT PCRs Done
1,717,437,068 UART: [art] Lock RT PCRs Done
1,717,438,471 UART: [art] Populate DV Done
1,717,446,422 UART: [fht] FMC Alias Private Key: 7
1,717,447,518 UART: [art] Derive CDI
1,717,447,798 UART: [art] Store in slot 0x4
1,717,533,548 UART: [art] Derive Key Pair
1,717,533,908 UART: [art] Store priv key in slot 0x5
1,717,547,679 UART: [art] Derive Key Pair - Done
1,717,562,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,717,577,381 UART: [art] Erasing AUTHORITY.KEYID = 7
1,717,578,146 UART: [art] PUB.X = 2DEA8454B8495C507FA8DE6A17317DE2DA207142E02F54FC654A0CFCF950D67194724DF908A8B95734EA180BD9FC6AE7
1,717,584,917 UART: [art] PUB.Y = 33581BC63AB71D18288C6412A3B03D4C729467FD1970F7E2747E40F105CEFD768265F4C61F0585772ED04A765B6ED36F
1,717,591,859 UART: [art] SIG.R = BDB2D15D17C60541AD5CA75CFE2531DD016BEA187BF35EBAC6661F682CC45D77BD86BA71E8874CA111AD97DCF9027435
1,717,598,638 UART: [art] SIG.S = 29752EF5D7C12A63C404322F8187C2888B576176561231B5F113F3C263A8E73DB46FF5A3F16D5AE261465351245CF20B
1,717,622,482 UART: Caliptra RT
1,717,622,825 UART: [state] CFI Enabled
1,717,983,470 UART: [rt] RT listening for mailbox commands...
1,717,984,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,720,799,663 >>> mbox cmd response: success
1,720,812,911 UART:
1,720,812,927 UART: Running Caliptra FMC ...
1,720,813,335 UART:
1,720,813,478 UART: [state] CFI Enabled
1,720,902,475 UART: [art] Extend RT PCRs Done
1,720,902,903 UART: [art] Lock RT PCRs Done
1,720,904,244 UART: [art] Populate DV Done
1,720,912,623 UART: [fht] FMC Alias Private Key: 7
1,720,913,629 UART: [art] Derive CDI
1,720,913,909 UART: [art] Store in slot 0x4
1,720,999,881 UART: [art] Derive Key Pair
1,721,000,241 UART: [art] Store priv key in slot 0x5
1,721,013,564 UART: [art] Derive Key Pair - Done
1,721,028,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,721,043,865 UART: [art] Erasing AUTHORITY.KEYID = 7
1,721,044,630 UART: [art] PUB.X = D1B1F08FE021DDF9C626756526A81CB2139DFB05717A72A314809B39CE95932FF7862110CD0C6F7B7DEDD7DFA5E0E367
1,721,051,404 UART: [art] PUB.Y = 40B21D4BCC1F18189B0CF0BC32F15B1D9C02EA207B9E44E291E83D98C92C0EDD819EFC9D5EE3514F9BAB719C00E7BDD3
1,721,058,345 UART: [art] SIG.R = 704EFC682214AADC8589611DDCC36E3063117C363D20C0292D6E0E5716D8045A16B40FBE130EAF49C7B32466F2DFB919
1,721,065,107 UART: [art] SIG.S = EFC5FE1F1E12E27C5D82C5BF55A9246F14872760CCC48F04E93C37BFADDEE770D467A783A3C279D1A05EE1C532E8DF75
1,721,089,008 UART: Caliptra RT
1,721,089,351 UART: [state] CFI Enabled
1,721,454,544 UART: [rt] RT listening for mailbox commands...
1,721,455,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,724,270,033 >>> mbox cmd response: success
1,724,283,385 UART:
1,724,283,401 UART: Running Caliptra FMC ...
1,724,283,809 UART:
1,724,283,952 UART: [state] CFI Enabled
1,724,373,291 UART: [art] Extend RT PCRs Done
1,724,373,719 UART: [art] Lock RT PCRs Done
1,724,375,066 UART: [art] Populate DV Done
1,724,383,301 UART: [fht] FMC Alias Private Key: 7
1,724,384,373 UART: [art] Derive CDI
1,724,384,653 UART: [art] Store in slot 0x4
1,724,470,201 UART: [art] Derive Key Pair
1,724,470,561 UART: [art] Store priv key in slot 0x5
1,724,483,568 UART: [art] Derive Key Pair - Done
1,724,498,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,724,513,516 UART: [art] Erasing AUTHORITY.KEYID = 7
1,724,514,281 UART: [art] PUB.X = 2DEA8454B8495C507FA8DE6A17317DE2DA207142E02F54FC654A0CFCF950D67194724DF908A8B95734EA180BD9FC6AE7
1,724,521,052 UART: [art] PUB.Y = 33581BC63AB71D18288C6412A3B03D4C729467FD1970F7E2747E40F105CEFD768265F4C61F0585772ED04A765B6ED36F
1,724,527,994 UART: [art] SIG.R = BDB2D15D17C60541AD5CA75CFE2531DD016BEA187BF35EBAC6661F682CC45D77BD86BA71E8874CA111AD97DCF9027435
1,724,534,773 UART: [art] SIG.S = 29752EF5D7C12A63C404322F8187C2888B576176561231B5F113F3C263A8E73DB46FF5A3F16D5AE261465351245CF20B
1,724,558,989 UART: Caliptra RT
1,724,559,332 UART: [state] CFI Enabled
1,724,927,071 UART: [rt] RT listening for mailbox commands...
1,724,927,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,727,741,250 >>> mbox cmd response: success
1,727,754,520 UART:
1,727,754,536 UART: Running Caliptra FMC ...
1,727,754,944 UART:
1,727,755,087 UART: [state] CFI Enabled
1,727,844,342 UART: [art] Extend RT PCRs Done
1,727,844,770 UART: [art] Lock RT PCRs Done
1,727,846,049 UART: [art] Populate DV Done
1,727,854,316 UART: [fht] FMC Alias Private Key: 7
1,727,855,388 UART: [art] Derive CDI
1,727,855,668 UART: [art] Store in slot 0x4
1,727,941,352 UART: [art] Derive Key Pair
1,727,941,712 UART: [art] Store priv key in slot 0x5
1,727,955,169 UART: [art] Derive Key Pair - Done
1,727,969,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,727,985,254 UART: [art] Erasing AUTHORITY.KEYID = 7
1,727,986,019 UART: [art] PUB.X = D1B1F08FE021DDF9C626756526A81CB2139DFB05717A72A314809B39CE95932FF7862110CD0C6F7B7DEDD7DFA5E0E367
1,727,992,793 UART: [art] PUB.Y = 40B21D4BCC1F18189B0CF0BC32F15B1D9C02EA207B9E44E291E83D98C92C0EDD819EFC9D5EE3514F9BAB719C00E7BDD3
1,727,999,734 UART: [art] SIG.R = 704EFC682214AADC8589611DDCC36E3063117C363D20C0292D6E0E5716D8045A16B40FBE130EAF49C7B32466F2DFB919
1,728,006,496 UART: [art] SIG.S = EFC5FE1F1E12E27C5D82C5BF55A9246F14872760CCC48F04E93C37BFADDEE770D467A783A3C279D1A05EE1C532E8DF75
1,728,030,351 UART: Caliptra RT
1,728,030,694 UART: [state] CFI Enabled
1,728,398,499 UART: [rt] RT listening for mailbox commands...
1,728,399,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,731,213,734 >>> mbox cmd response: success
1,731,227,076 UART:
1,731,227,092 UART: Running Caliptra FMC ...
1,731,227,500 UART:
1,731,227,643 UART: [state] CFI Enabled
1,731,316,970 UART: [art] Extend RT PCRs Done
1,731,317,398 UART: [art] Lock RT PCRs Done
1,731,318,711 UART: [art] Populate DV Done
1,731,326,872 UART: [fht] FMC Alias Private Key: 7
1,731,327,890 UART: [art] Derive CDI
1,731,328,170 UART: [art] Store in slot 0x4
1,731,414,154 UART: [art] Derive Key Pair
1,731,414,514 UART: [art] Store priv key in slot 0x5
1,731,427,723 UART: [art] Derive Key Pair - Done
1,731,442,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,731,457,895 UART: [art] Erasing AUTHORITY.KEYID = 7
1,731,458,660 UART: [art] PUB.X = 2DEA8454B8495C507FA8DE6A17317DE2DA207142E02F54FC654A0CFCF950D67194724DF908A8B95734EA180BD9FC6AE7
1,731,465,431 UART: [art] PUB.Y = 33581BC63AB71D18288C6412A3B03D4C729467FD1970F7E2747E40F105CEFD768265F4C61F0585772ED04A765B6ED36F
1,731,472,373 UART: [art] SIG.R = BDB2D15D17C60541AD5CA75CFE2531DD016BEA187BF35EBAC6661F682CC45D77BD86BA71E8874CA111AD97DCF9027435
1,731,479,152 UART: [art] SIG.S = 29752EF5D7C12A63C404322F8187C2888B576176561231B5F113F3C263A8E73DB46FF5A3F16D5AE261465351245CF20B
1,731,502,812 UART: Caliptra RT
1,731,503,155 UART: [state] CFI Enabled
1,731,870,170 UART: [rt] RT listening for mailbox commands...
1,731,870,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,734,686,417 >>> mbox cmd response: success
1,734,700,241 UART:
1,734,700,257 UART: Running Caliptra FMC ...
1,734,700,665 UART:
1,734,700,808 UART: [state] CFI Enabled
1,734,790,249 UART: [art] Extend RT PCRs Done
1,734,790,677 UART: [art] Lock RT PCRs Done
1,734,791,972 UART: [art] Populate DV Done
1,734,800,275 UART: [fht] FMC Alias Private Key: 7
1,734,801,263 UART: [art] Derive CDI
1,734,801,543 UART: [art] Store in slot 0x4
1,734,886,875 UART: [art] Derive Key Pair
1,734,887,235 UART: [art] Store priv key in slot 0x5
1,734,900,732 UART: [art] Derive Key Pair - Done
1,734,915,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,734,930,515 UART: [art] Erasing AUTHORITY.KEYID = 7
1,734,931,280 UART: [art] PUB.X = D1B1F08FE021DDF9C626756526A81CB2139DFB05717A72A314809B39CE95932FF7862110CD0C6F7B7DEDD7DFA5E0E367
1,734,938,054 UART: [art] PUB.Y = 40B21D4BCC1F18189B0CF0BC32F15B1D9C02EA207B9E44E291E83D98C92C0EDD819EFC9D5EE3514F9BAB719C00E7BDD3
1,734,944,995 UART: [art] SIG.R = 704EFC682214AADC8589611DDCC36E3063117C363D20C0292D6E0E5716D8045A16B40FBE130EAF49C7B32466F2DFB919
1,734,951,757 UART: [art] SIG.S = EFC5FE1F1E12E27C5D82C5BF55A9246F14872760CCC48F04E93C37BFADDEE770D467A783A3C279D1A05EE1C532E8DF75
1,734,975,504 UART: Caliptra RT
1,734,975,847 UART: [state] CFI Enabled
1,735,341,322 UART: [rt] RT listening for mailbox commands...
1,735,341,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,738,156,367 >>> mbox cmd response: success
1,738,169,659 UART:
1,738,169,675 UART: Running Caliptra FMC ...
1,738,170,083 UART:
1,738,170,226 UART: [state] CFI Enabled
1,738,259,557 UART: [art] Extend RT PCRs Done
1,738,259,985 UART: [art] Lock RT PCRs Done
1,738,261,312 UART: [art] Populate DV Done
1,738,269,371 UART: [fht] FMC Alias Private Key: 7
1,738,270,405 UART: [art] Derive CDI
1,738,270,685 UART: [art] Store in slot 0x4
1,738,356,539 UART: [art] Derive Key Pair
1,738,356,899 UART: [art] Store priv key in slot 0x5
1,738,370,502 UART: [art] Derive Key Pair - Done
1,738,385,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,738,400,740 UART: [art] Erasing AUTHORITY.KEYID = 7
1,738,401,505 UART: [art] PUB.X = 2DEA8454B8495C507FA8DE6A17317DE2DA207142E02F54FC654A0CFCF950D67194724DF908A8B95734EA180BD9FC6AE7
1,738,408,276 UART: [art] PUB.Y = 33581BC63AB71D18288C6412A3B03D4C729467FD1970F7E2747E40F105CEFD768265F4C61F0585772ED04A765B6ED36F
1,738,415,218 UART: [art] SIG.R = BDB2D15D17C60541AD5CA75CFE2531DD016BEA187BF35EBAC6661F682CC45D77BD86BA71E8874CA111AD97DCF9027435
1,738,421,997 UART: [art] SIG.S = 29752EF5D7C12A63C404322F8187C2888B576176561231B5F113F3C263A8E73DB46FF5A3F16D5AE261465351245CF20B
1,738,445,517 UART: Caliptra RT
1,738,445,860 UART: [state] CFI Enabled
1,738,812,283 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 361.28s
Truncated 1323521 bytes from beginning
a FMC ...
1,620,596,729 UART:
1,620,596,783 UART: [state] CFI Enabled
1,620,685,430 UART: [art] Extend RT PCRs Done
1,620,685,858 UART: [art] Lock RT PCRs Done
1,620,686,987 UART: [art] Populate DV Done
1,620,695,282 UART: [fht] FMC Alias Private Key: 7
1,620,696,296 UART: [art] Derive CDI
1,620,696,576 UART: [art] Store in slot 0x4
1,620,782,353 UART: [art] Derive Key Pair
1,620,782,713 UART: [art] Store priv key in slot 0x5
1,620,796,047 UART: [art] Derive Key Pair - Done
1,620,810,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,620,826,351 UART: [art] Erasing AUTHORITY.KEYID = 7
1,620,827,116 UART: [art] PUB.X = 960C291B64869A0DC97A115C548D05B857B85553FD510517CCCEBC2308C927DFB1563CA5C6D479CC224D0A17C62A2F22
1,620,833,872 UART: [art] PUB.Y = 3103175CE5953AA58571F4464D249B4EA54280EDD0F653B023A7801CC6051D4847EBC2D916AD86BB717479845893FCD0
1,620,840,812 UART: [art] SIG.R = C28141DF5D8A5A08CA7946BEC1E4A65585B6336626E4F99CE3F84FF96E254CCD15860233AA3C071A719F70940DCCF0F4
1,620,847,578 UART: [art] SIG.S = 33E94568ABB31093D11BE6B7E6F406F0553CCAD99EAC34690AEDAAA137A3E8F97125CE7CA5CDF82AA9BA8BCD826CCB4A
1,620,871,010 UART: Caliptra RT
1,620,871,261 UART: [state] CFI Enabled
1,621,237,565 UART: [rt] RT listening for mailbox commands...
1,621,238,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,239,290 UART:
1,621,239,306 UART: Running Caliptra ROM ...
1,621,239,714 UART:
1,621,239,769 UART: [state] CFI Enabled
1,621,242,069 UART: [state] LifecycleState = Unprovisioned
1,621,242,724 UART: [state] DebugLocked = No
1,621,243,452 UART: [state] WD Timer not started. Device not locked for debugging
1,621,244,760 UART: [kat] SHA2-256
1,622,048,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,052,414 UART: [kat] ++
1,622,052,566 UART: [kat] sha1
1,622,056,862 UART: [kat] SHA2-256
1,622,058,802 UART: [kat] SHA2-384
1,622,061,399 UART: [kat] SHA2-512-ACC
1,622,063,299 UART: [kat] ECC-384
1,622,072,884 UART: [kat] HMAC-384Kdf
1,622,077,554 UART: [kat] LMS
1,622,325,866 UART: [kat] --
1,622,326,974 UART: [update-reset] ++
1,623,686,383 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,623,687,572 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,623,842,787 >>> mbox cmd response: success
1,623,843,048 UART: [update-reset] Copying MAN_2 To MAN_1
1,623,851,062 UART: [update-reset Success] --
1,623,852,061 UART: [state] Locking Datavault
1,623,852,995 UART: [state] Locking PCR0, PCR1 and PCR31
1,623,853,599 UART: [state] Locking ICCM
1,623,854,121 UART: [exit] Launching FMC @ 0x40000130
1,623,859,451 UART:
1,623,859,467 UART: Running Caliptra FMC ...
1,623,859,875 UART:
1,623,859,929 UART: [state] CFI Enabled
1,623,948,738 UART: [art] Extend RT PCRs Done
1,623,949,166 UART: [art] Lock RT PCRs Done
1,623,950,445 UART: [art] Populate DV Done
1,623,958,788 UART: [fht] FMC Alias Private Key: 7
1,623,959,804 UART: [art] Derive CDI
1,623,960,084 UART: [art] Store in slot 0x4
1,624,045,753 UART: [art] Derive Key Pair
1,624,046,113 UART: [art] Store priv key in slot 0x5
1,624,059,381 UART: [art] Derive Key Pair - Done
1,624,073,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,089,308 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,090,073 UART: [art] PUB.X = FEDAD240DD0E59B920603D010465E31CF1398FD4C96B5D63F7666DDF3DC6B4053717C45073D4CB8A6B0A7FAD1217547A
1,624,096,838 UART: [art] PUB.Y = D489E9521B70F8049465EC0C9A3CA837ED19B9A2B4165147665591F274386CE1479E6C39E8DF9A6F23C9ABF3841F0935
1,624,103,777 UART: [art] SIG.R = 469D249D0C851B50BF37C0C3E5ACC538DEE57C2FAB798BB21C680A464A021D7E9361C5083F843F867A082D0D50833240
1,624,110,531 UART: [art] SIG.S = 1AAD4CEFD303ED73D867BDD065EADA57A0C91EEE3A22960235804E0F78D20D6F9DD095923E221D7D89EA058CFF3E21CD
1,624,134,738 UART: Caliptra RT
1,624,134,989 UART: [state] CFI Enabled
1,624,499,770 UART: [rt] RT listening for mailbox commands...
1,624,500,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,624,501,425 UART:
1,624,501,441 UART: Running Caliptra ROM ...
1,624,501,849 UART:
1,624,501,904 UART: [state] CFI Enabled
1,624,504,222 UART: [state] LifecycleState = Unprovisioned
1,624,504,877 UART: [state] DebugLocked = No
1,624,505,411 UART: [state] WD Timer not started. Device not locked for debugging
1,624,506,593 UART: [kat] SHA2-256
1,625,310,143 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,314,247 UART: [kat] ++
1,625,314,399 UART: [kat] sha1
1,625,318,749 UART: [kat] SHA2-256
1,625,320,689 UART: [kat] SHA2-384
1,625,323,392 UART: [kat] SHA2-512-ACC
1,625,325,292 UART: [kat] ECC-384
1,625,335,027 UART: [kat] HMAC-384Kdf
1,625,339,591 UART: [kat] LMS
1,625,587,903 UART: [kat] --
1,625,588,833 UART: [update-reset] ++
1,626,948,440 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,626,949,507 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,104,722 >>> mbox cmd response: success
1,627,104,885 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,112,899 UART: [update-reset Success] --
1,627,114,012 UART: [state] Locking Datavault
1,627,114,664 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,115,268 UART: [state] Locking ICCM
1,627,115,776 UART: [exit] Launching FMC @ 0x40000130
1,627,121,106 UART:
1,627,121,122 UART: Running Caliptra FMC ...
1,627,121,530 UART:
1,627,121,584 UART: [state] CFI Enabled
1,627,211,039 UART: [art] Extend RT PCRs Done
1,627,211,467 UART: [art] Lock RT PCRs Done
1,627,212,836 UART: [art] Populate DV Done
1,627,220,791 UART: [fht] FMC Alias Private Key: 7
1,627,221,951 UART: [art] Derive CDI
1,627,222,231 UART: [art] Store in slot 0x4
1,627,307,444 UART: [art] Derive Key Pair
1,627,307,804 UART: [art] Store priv key in slot 0x5
1,627,321,310 UART: [art] Derive Key Pair - Done
1,627,335,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,351,024 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,351,789 UART: [art] PUB.X = 960C291B64869A0DC97A115C548D05B857B85553FD510517CCCEBC2308C927DFB1563CA5C6D479CC224D0A17C62A2F22
1,627,358,545 UART: [art] PUB.Y = 3103175CE5953AA58571F4464D249B4EA54280EDD0F653B023A7801CC6051D4847EBC2D916AD86BB717479845893FCD0
1,627,365,485 UART: [art] SIG.R = C28141DF5D8A5A08CA7946BEC1E4A65585B6336626E4F99CE3F84FF96E254CCD15860233AA3C071A719F70940DCCF0F4
1,627,372,251 UART: [art] SIG.S = 33E94568ABB31093D11BE6B7E6F406F0553CCAD99EAC34690AEDAAA137A3E8F97125CE7CA5CDF82AA9BA8BCD826CCB4A
1,627,396,209 UART: Caliptra RT
1,627,396,460 UART: [state] CFI Enabled
1,627,764,108 UART: [rt] RT listening for mailbox commands...
1,627,764,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,627,765,619 UART:
1,627,765,635 UART: Running Caliptra ROM ...
1,627,766,043 UART:
1,627,766,098 UART: [state] CFI Enabled
1,627,768,602 UART: [state] LifecycleState = Unprovisioned
1,627,769,257 UART: [state] DebugLocked = No
1,627,769,879 UART: [state] WD Timer not started. Device not locked for debugging
1,627,771,127 UART: [kat] SHA2-256
1,628,574,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,628,578,781 UART: [kat] ++
1,628,578,933 UART: [kat] sha1
1,628,583,015 UART: [kat] SHA2-256
1,628,584,955 UART: [kat] SHA2-384
1,628,587,682 UART: [kat] SHA2-512-ACC
1,628,589,582 UART: [kat] ECC-384
1,628,599,509 UART: [kat] HMAC-384Kdf
1,628,604,041 UART: [kat] LMS
1,628,852,353 UART: [kat] --
1,628,853,223 UART: [update-reset] ++
1,630,212,830 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,213,829 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,369,044 >>> mbox cmd response: success
1,630,369,385 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,377,399 UART: [update-reset Success] --
1,630,378,320 UART: [state] Locking Datavault
1,630,379,012 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,379,616 UART: [state] Locking ICCM
1,630,380,282 UART: [exit] Launching FMC @ 0x40000130
1,630,385,612 UART:
1,630,385,628 UART: Running Caliptra FMC ...
1,630,386,036 UART:
1,630,386,090 UART: [state] CFI Enabled
1,630,475,029 UART: [art] Extend RT PCRs Done
1,630,475,457 UART: [art] Lock RT PCRs Done
1,630,476,572 UART: [art] Populate DV Done
1,630,484,465 UART: [fht] FMC Alias Private Key: 7
1,630,485,467 UART: [art] Derive CDI
1,630,485,747 UART: [art] Store in slot 0x4
1,630,571,790 UART: [art] Derive Key Pair
1,630,572,150 UART: [art] Store priv key in slot 0x5
1,630,585,580 UART: [art] Derive Key Pair - Done
1,630,600,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,630,615,581 UART: [art] Erasing AUTHORITY.KEYID = 7
1,630,616,346 UART: [art] PUB.X = FEDAD240DD0E59B920603D010465E31CF1398FD4C96B5D63F7666DDF3DC6B4053717C45073D4CB8A6B0A7FAD1217547A
1,630,623,111 UART: [art] PUB.Y = D489E9521B70F8049465EC0C9A3CA837ED19B9A2B4165147665591F274386CE1479E6C39E8DF9A6F23C9ABF3841F0935
1,630,630,050 UART: [art] SIG.R = 469D249D0C851B50BF37C0C3E5ACC538DEE57C2FAB798BB21C680A464A021D7E9361C5083F843F867A082D0D50833240
1,630,636,804 UART: [art] SIG.S = 1AAD4CEFD303ED73D867BDD065EADA57A0C91EEE3A22960235804E0F78D20D6F9DD095923E221D7D89EA058CFF3E21CD
1,630,660,597 UART: Caliptra RT
1,630,660,848 UART: [state] CFI Enabled
1,631,028,193 UART: [rt] RT listening for mailbox commands...
1,631,028,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,029,736 UART:
1,631,029,752 UART: Running Caliptra ROM ...
1,631,030,160 UART:
1,631,030,215 UART: [state] CFI Enabled
1,631,032,679 UART: [state] LifecycleState = Unprovisioned
1,631,033,334 UART: [state] DebugLocked = No
1,631,034,068 UART: [state] WD Timer not started. Device not locked for debugging
1,631,035,226 UART: [kat] SHA2-256
1,631,838,776 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,631,842,880 UART: [kat] ++
1,631,843,032 UART: [kat] sha1
1,631,847,290 UART: [kat] SHA2-256
1,631,849,230 UART: [kat] SHA2-384
1,631,851,925 UART: [kat] SHA2-512-ACC
1,631,853,825 UART: [kat] ECC-384
1,631,863,188 UART: [kat] HMAC-384Kdf
1,631,867,828 UART: [kat] LMS
1,632,116,140 UART: [kat] --
1,632,116,918 UART: [update-reset] ++
1,633,476,025 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,633,477,238 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,633,632,453 >>> mbox cmd response: success
1,633,632,782 UART: [update-reset] Copying MAN_2 To MAN_1
1,633,640,796 UART: [update-reset Success] --
1,633,641,873 UART: [state] Locking Datavault
1,633,642,697 UART: [state] Locking PCR0, PCR1 and PCR31
1,633,643,301 UART: [state] Locking ICCM
1,633,643,881 UART: [exit] Launching FMC @ 0x40000130
1,633,649,211 UART:
1,633,649,227 UART: Running Caliptra FMC ...
1,633,649,635 UART:
1,633,649,689 UART: [state] CFI Enabled
1,633,738,704 UART: [art] Extend RT PCRs Done
1,633,739,132 UART: [art] Lock RT PCRs Done
1,633,740,307 UART: [art] Populate DV Done
1,633,748,538 UART: [fht] FMC Alias Private Key: 7
1,633,749,644 UART: [art] Derive CDI
1,633,749,924 UART: [art] Store in slot 0x4
1,633,835,873 UART: [art] Derive Key Pair
1,633,836,233 UART: [art] Store priv key in slot 0x5
1,633,849,467 UART: [art] Derive Key Pair - Done
1,633,864,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,633,879,347 UART: [art] Erasing AUTHORITY.KEYID = 7
1,633,880,112 UART: [art] PUB.X = 960C291B64869A0DC97A115C548D05B857B85553FD510517CCCEBC2308C927DFB1563CA5C6D479CC224D0A17C62A2F22
1,633,886,868 UART: [art] PUB.Y = 3103175CE5953AA58571F4464D249B4EA54280EDD0F653B023A7801CC6051D4847EBC2D916AD86BB717479845893FCD0
1,633,893,808 UART: [art] SIG.R = C28141DF5D8A5A08CA7946BEC1E4A65585B6336626E4F99CE3F84FF96E254CCD15860233AA3C071A719F70940DCCF0F4
1,633,900,574 UART: [art] SIG.S = 33E94568ABB31093D11BE6B7E6F406F0553CCAD99EAC34690AEDAAA137A3E8F97125CE7CA5CDF82AA9BA8BCD826CCB4A
1,633,924,500 UART: Caliptra RT
1,633,924,751 UART: [state] CFI Enabled
1,634,292,359 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 358.60s
Truncated 716652 bytes from beginning
A8409FEBB7
1,549,361,559 UART: [art] SIG.S = 39714F3392978409501DAAB36F815F8757945EEFFAD67BFAF213C6253EB48DAE91A98EBDB47742445D1F1FC439EBA117
1,549,385,686 UART: Caliptra RT
1,549,385,937 UART: [state] CFI Enabled
1,549,754,189 UART: [rt] RT listening for mailbox commands...
1,549,754,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,243,279 >>> mbox cmd response: success
1,552,256,594 UART:
1,552,256,610 UART: Running Caliptra FMC ...
1,552,257,018 UART:
1,552,257,072 UART: [state] CFI Enabled
1,552,345,787 UART: [art] Extend RT PCRs Done
1,552,346,215 UART: [art] Lock RT PCRs Done
1,552,347,354 UART: [art] Populate DV Done
1,552,355,699 UART: [fht] FMC Alias Private Key: 7
1,552,356,647 UART: [art] Derive CDI
1,552,356,927 UART: [art] Store in slot 0x4
1,552,442,614 UART: [art] Derive Key Pair
1,552,442,974 UART: [art] Store priv key in slot 0x5
1,552,456,724 UART: [art] Derive Key Pair - Done
1,552,471,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,552,487,310 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,488,075 UART: [art] PUB.X = DAD10A444F84E5B8157855161B82F0843FD5316E98C1D523D14C9DDA1099C8F4CD3E7C9FE9FA020697D579C69EA557A3
1,552,494,842 UART: [art] PUB.Y = 3AF2C58B36889E51327526EDDF85026EA3367B242F1B5300A5A9C4D2A4B0114199B118920E061804674D7DE2631A03F5
1,552,501,747 UART: [art] SIG.R = 0C80742B88C37AAC90AAAC0C17025E5DF387DFE8B31AC54BFFDC46B1636B0EE65A09C6C3C08D2A5FC808A36B4A863C88
1,552,508,519 UART: [art] SIG.S = 103FF1A6E77EAAA7C77C1827987F8575623F7095C583938D8EF8A8B1C96C95EA91E98A26456C0F1AE7BD483C97BC96A4
1,552,532,896 UART: Caliptra RT
1,552,533,147 UART: [state] CFI Enabled
1,552,898,448 UART: [rt] RT listening for mailbox commands...
1,552,899,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,389,486 >>> mbox cmd response: success
1,555,402,827 UART:
1,555,402,843 UART: Running Caliptra FMC ...
1,555,403,251 UART:
1,555,403,305 UART: [state] CFI Enabled
1,555,492,574 UART: [art] Extend RT PCRs Done
1,555,493,002 UART: [art] Lock RT PCRs Done
1,555,494,275 UART: [art] Populate DV Done
1,555,502,622 UART: [fht] FMC Alias Private Key: 7
1,555,503,658 UART: [art] Derive CDI
1,555,503,938 UART: [art] Store in slot 0x4
1,555,589,665 UART: [art] Derive Key Pair
1,555,590,025 UART: [art] Store priv key in slot 0x5
1,555,602,645 UART: [art] Derive Key Pair - Done
1,555,617,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,555,633,232 UART: [art] Erasing AUTHORITY.KEYID = 7
1,555,633,997 UART: [art] PUB.X = B9BDAA6C6087D27CE0C2011327557ADA68F41447A56D5940E1FE165455918B95E96CAB3F672AF0721013D0E3561A352E
1,555,640,764 UART: [art] PUB.Y = 134BDE11FE0410A01E777CFFF57ECA7FDCB86E28B8813FDC847C886077128A1B7542CD09C537E8ED3663387998DCAAAB
1,555,647,722 UART: [art] SIG.R = DE62FD7F7697FD0433399357605243CBBE1F64BD8546B4170F93EECE9A2EE8D67F0C6CF8F2BFAF2BADF814A8409FEBB7
1,555,654,505 UART: [art] SIG.S = 39714F3392978409501DAAB36F815F8757945EEFFAD67BFAF213C6253EB48DAE91A98EBDB47742445D1F1FC439EBA117
1,555,678,902 UART: Caliptra RT
1,555,679,153 UART: [state] CFI Enabled
1,556,045,797 UART: [rt] RT listening for mailbox commands...
1,556,046,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,558,535,355 >>> mbox cmd response: success
1,558,548,886 UART:
1,558,548,902 UART: Running Caliptra FMC ...
1,558,549,310 UART:
1,558,549,364 UART: [state] CFI Enabled
1,558,638,399 UART: [art] Extend RT PCRs Done
1,558,638,827 UART: [art] Lock RT PCRs Done
1,558,640,216 UART: [art] Populate DV Done
1,558,648,505 UART: [fht] FMC Alias Private Key: 7
1,558,649,607 UART: [art] Derive CDI
1,558,649,887 UART: [art] Store in slot 0x4
1,558,735,636 UART: [art] Derive Key Pair
1,558,735,996 UART: [art] Store priv key in slot 0x5
1,558,749,160 UART: [art] Derive Key Pair - Done
1,558,764,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,558,779,304 UART: [art] Erasing AUTHORITY.KEYID = 7
1,558,780,069 UART: [art] PUB.X = DAD10A444F84E5B8157855161B82F0843FD5316E98C1D523D14C9DDA1099C8F4CD3E7C9FE9FA020697D579C69EA557A3
1,558,786,836 UART: [art] PUB.Y = 3AF2C58B36889E51327526EDDF85026EA3367B242F1B5300A5A9C4D2A4B0114199B118920E061804674D7DE2631A03F5
1,558,793,741 UART: [art] SIG.R = 0C80742B88C37AAC90AAAC0C17025E5DF387DFE8B31AC54BFFDC46B1636B0EE65A09C6C3C08D2A5FC808A36B4A863C88
1,558,800,513 UART: [art] SIG.S = 103FF1A6E77EAAA7C77C1827987F8575623F7095C583938D8EF8A8B1C96C95EA91E98A26456C0F1AE7BD483C97BC96A4
1,558,824,716 UART: Caliptra RT
1,558,824,967 UART: [state] CFI Enabled
1,559,186,322 UART: [rt] RT listening for mailbox commands...
1,559,186,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,561,674,766 >>> mbox cmd response: success
1,561,688,145 UART:
1,561,688,161 UART: Running Caliptra FMC ...
1,561,688,569 UART:
1,561,688,623 UART: [state] CFI Enabled
1,561,777,688 UART: [art] Extend RT PCRs Done
1,561,778,116 UART: [art] Lock RT PCRs Done
1,561,779,309 UART: [art] Populate DV Done
1,561,787,762 UART: [fht] FMC Alias Private Key: 7
1,561,788,744 UART: [art] Derive CDI
1,561,789,024 UART: [art] Store in slot 0x4
1,561,874,771 UART: [art] Derive Key Pair
1,561,875,131 UART: [art] Store priv key in slot 0x5
1,561,888,355 UART: [art] Derive Key Pair - Done
1,561,903,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,561,918,512 UART: [art] Erasing AUTHORITY.KEYID = 7
1,561,919,277 UART: [art] PUB.X = B9BDAA6C6087D27CE0C2011327557ADA68F41447A56D5940E1FE165455918B95E96CAB3F672AF0721013D0E3561A352E
1,561,926,044 UART: [art] PUB.Y = 134BDE11FE0410A01E777CFFF57ECA7FDCB86E28B8813FDC847C886077128A1B7542CD09C537E8ED3663387998DCAAAB
1,561,933,002 UART: [art] SIG.R = DE62FD7F7697FD0433399357605243CBBE1F64BD8546B4170F93EECE9A2EE8D67F0C6CF8F2BFAF2BADF814A8409FEBB7
1,561,939,785 UART: [art] SIG.S = 39714F3392978409501DAAB36F815F8757945EEFFAD67BFAF213C6253EB48DAE91A98EBDB47742445D1F1FC439EBA117
1,561,963,410 UART: Caliptra RT
1,561,963,661 UART: [state] CFI Enabled
1,562,327,201 UART: [rt] RT listening for mailbox commands...
1,562,327,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,564,814,805 >>> mbox cmd response: success
1,564,828,366 UART:
1,564,828,382 UART: Running Caliptra FMC ...
1,564,828,790 UART:
1,564,828,844 UART: [state] CFI Enabled
1,564,918,093 UART: [art] Extend RT PCRs Done
1,564,918,521 UART: [art] Lock RT PCRs Done
1,564,919,716 UART: [art] Populate DV Done
1,564,928,135 UART: [fht] FMC Alias Private Key: 7
1,564,929,097 UART: [art] Derive CDI
1,564,929,377 UART: [art] Store in slot 0x4
1,565,014,982 UART: [art] Derive Key Pair
1,565,015,342 UART: [art] Store priv key in slot 0x5
1,565,028,016 UART: [art] Derive Key Pair - Done
1,565,042,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,058,372 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,059,137 UART: [art] PUB.X = DAD10A444F84E5B8157855161B82F0843FD5316E98C1D523D14C9DDA1099C8F4CD3E7C9FE9FA020697D579C69EA557A3
1,565,065,904 UART: [art] PUB.Y = 3AF2C58B36889E51327526EDDF85026EA3367B242F1B5300A5A9C4D2A4B0114199B118920E061804674D7DE2631A03F5
1,565,072,809 UART: [art] SIG.R = 0C80742B88C37AAC90AAAC0C17025E5DF387DFE8B31AC54BFFDC46B1636B0EE65A09C6C3C08D2A5FC808A36B4A863C88
1,565,079,581 UART: [art] SIG.S = 103FF1A6E77EAAA7C77C1827987F8575623F7095C583938D8EF8A8B1C96C95EA91E98A26456C0F1AE7BD483C97BC96A4
1,565,103,142 UART: Caliptra RT
1,565,103,393 UART: [state] CFI Enabled
1,565,471,178 UART: [rt] RT listening for mailbox commands...
1,565,471,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,567,960,288 >>> mbox cmd response: success
1,567,973,701 UART:
1,567,973,717 UART: Running Caliptra FMC ...
1,567,974,125 UART:
1,567,974,179 UART: [state] CFI Enabled
1,568,063,640 UART: [art] Extend RT PCRs Done
1,568,064,068 UART: [art] Lock RT PCRs Done
1,568,065,315 UART: [art] Populate DV Done
1,568,073,770 UART: [fht] FMC Alias Private Key: 7
1,568,074,718 UART: [art] Derive CDI
1,568,074,998 UART: [art] Store in slot 0x4
1,568,160,729 UART: [art] Derive Key Pair
1,568,161,089 UART: [art] Store priv key in slot 0x5
1,568,174,301 UART: [art] Derive Key Pair - Done
1,568,189,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,204,494 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,205,259 UART: [art] PUB.X = B9BDAA6C6087D27CE0C2011327557ADA68F41447A56D5940E1FE165455918B95E96CAB3F672AF0721013D0E3561A352E
1,568,212,026 UART: [art] PUB.Y = 134BDE11FE0410A01E777CFFF57ECA7FDCB86E28B8813FDC847C886077128A1B7542CD09C537E8ED3663387998DCAAAB
1,568,218,984 UART: [art] SIG.R = DE62FD7F7697FD0433399357605243CBBE1F64BD8546B4170F93EECE9A2EE8D67F0C6CF8F2BFAF2BADF814A8409FEBB7
1,568,225,767 UART: [art] SIG.S = 39714F3392978409501DAAB36F815F8757945EEFFAD67BFAF213C6253EB48DAE91A98EBDB47742445D1F1FC439EBA117
1,568,249,262 UART: Caliptra RT
1,568,249,513 UART: [state] CFI Enabled
1,568,616,881 UART: [rt] RT listening for mailbox commands...
1,568,617,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,105,767 >>> mbox cmd response: success
1,571,119,088 UART:
1,571,119,104 UART: Running Caliptra FMC ...
1,571,119,512 UART:
1,571,119,566 UART: [state] CFI Enabled
1,571,208,603 UART: [art] Extend RT PCRs Done
1,571,209,031 UART: [art] Lock RT PCRs Done
1,571,210,178 UART: [art] Populate DV Done
1,571,218,431 UART: [fht] FMC Alias Private Key: 7
1,571,219,541 UART: [art] Derive CDI
1,571,219,821 UART: [art] Store in slot 0x4
1,571,305,288 UART: [art] Derive Key Pair
1,571,305,648 UART: [art] Store priv key in slot 0x5
1,571,318,522 UART: [art] Derive Key Pair - Done
1,571,333,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,348,236 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,349,001 UART: [art] PUB.X = DAD10A444F84E5B8157855161B82F0843FD5316E98C1D523D14C9DDA1099C8F4CD3E7C9FE9FA020697D579C69EA557A3
1,571,355,768 UART: [art] PUB.Y = 3AF2C58B36889E51327526EDDF85026EA3367B242F1B5300A5A9C4D2A4B0114199B118920E061804674D7DE2631A03F5
1,571,362,673 UART: [art] SIG.R = 0C80742B88C37AAC90AAAC0C17025E5DF387DFE8B31AC54BFFDC46B1636B0EE65A09C6C3C08D2A5FC808A36B4A863C88
1,571,369,445 UART: [art] SIG.S = 103FF1A6E77EAAA7C77C1827987F8575623F7095C583938D8EF8A8B1C96C95EA91E98A26456C0F1AE7BD483C97BC96A4
1,571,393,738 UART: Caliptra RT
1,571,393,989 UART: [state] CFI Enabled
1,571,760,564 UART: [rt] RT listening for mailbox commands...
1,571,761,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,249,724 >>> mbox cmd response: success
1,574,263,333 UART:
1,574,263,349 UART: Running Caliptra FMC ...
1,574,263,757 UART:
1,574,263,811 UART: [state] CFI Enabled
1,574,353,490 UART: [art] Extend RT PCRs Done
1,574,353,918 UART: [art] Lock RT PCRs Done
1,574,355,383 UART: [art] Populate DV Done
1,574,363,636 UART: [fht] FMC Alias Private Key: 7
1,574,364,742 UART: [art] Derive CDI
1,574,365,022 UART: [art] Store in slot 0x4
1,574,451,281 UART: [art] Derive Key Pair
1,574,451,641 UART: [art] Store priv key in slot 0x5
1,574,465,163 UART: [art] Derive Key Pair - Done
1,574,479,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,574,494,766 UART: [art] Erasing AUTHORITY.KEYID = 7
1,574,495,531 UART: [art] PUB.X = B9BDAA6C6087D27CE0C2011327557ADA68F41447A56D5940E1FE165455918B95E96CAB3F672AF0721013D0E3561A352E
1,574,502,298 UART: [art] PUB.Y = 134BDE11FE0410A01E777CFFF57ECA7FDCB86E28B8813FDC847C886077128A1B7542CD09C537E8ED3663387998DCAAAB
1,574,509,256 UART: [art] SIG.R = DE62FD7F7697FD0433399357605243CBBE1F64BD8546B4170F93EECE9A2EE8D67F0C6CF8F2BFAF2BADF814A8409FEBB7
1,574,516,039 UART: [art] SIG.S = 39714F3392978409501DAAB36F815F8757945EEFFAD67BFAF213C6253EB48DAE91A98EBDB47742445D1F1FC439EBA117
1,574,539,626 UART: Caliptra RT
1,574,539,877 UART: [state] CFI Enabled
1,574,907,579 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 323.39s
Truncated 1323521 bytes from beginning
a FMC ...
1,621,128,244 UART:
1,621,128,387 UART: [state] CFI Enabled
1,621,216,806 UART: [art] Extend RT PCRs Done
1,621,217,234 UART: [art] Lock RT PCRs Done
1,621,218,653 UART: [art] Populate DV Done
1,621,226,742 UART: [fht] FMC Alias Private Key: 7
1,621,227,792 UART: [art] Derive CDI
1,621,228,072 UART: [art] Store in slot 0x4
1,621,313,713 UART: [art] Derive Key Pair
1,621,314,073 UART: [art] Store priv key in slot 0x5
1,621,327,621 UART: [art] Derive Key Pair - Done
1,621,342,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,621,358,669 UART: [art] Erasing AUTHORITY.KEYID = 7
1,621,359,434 UART: [art] PUB.X = 6ACC49540D45513C598550E4C76B1ED1039B792D89EDA0EC261C659597BF593EF050D2FB4A67CEDA849848A12285A7ED
1,621,366,204 UART: [art] PUB.Y = 30869BE7A10773F163BBDE48ADDBBD624D9C6E885B1EB871AC160AAFF2970D4E25069B4AC2D36D4E6F59290646CEA6A1
1,621,373,155 UART: [art] SIG.R = FE7B4A8F7F1B97B578A8B51D3F2EBA4C10D43B62F2CAFCD3EBCE29CCBB0DD203894DD1552FEE2B84406B8E226C373271
1,621,379,943 UART: [art] SIG.S = 97A24B2C83B5074FE72FD6E74A553856DE2F0D6EF0A88DF1BE4DF594305B11612F2ADA00FFCF70C1AC08440EA8D713FC
1,621,403,929 UART: Caliptra RT
1,621,404,272 UART: [state] CFI Enabled
1,621,772,903 UART: [rt] RT listening for mailbox commands...
1,621,773,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,774,360 UART:
1,621,774,376 UART: Running Caliptra ROM ...
1,621,774,784 UART:
1,621,774,926 UART: [state] CFI Enabled
1,621,777,960 UART: [state] LifecycleState = Unprovisioned
1,621,778,615 UART: [state] DebugLocked = No
1,621,779,119 UART: [state] WD Timer not started. Device not locked for debugging
1,621,780,439 UART: [kat] SHA2-256
1,622,583,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,622,588,093 UART: [kat] ++
1,622,588,245 UART: [kat] sha1
1,622,592,469 UART: [kat] SHA2-256
1,622,594,409 UART: [kat] SHA2-384
1,622,597,314 UART: [kat] SHA2-512-ACC
1,622,599,214 UART: [kat] ECC-384
1,622,608,795 UART: [kat] HMAC-384Kdf
1,622,613,321 UART: [kat] LMS
1,622,861,633 UART: [kat] --
1,622,862,629 UART: [update-reset] ++
1,624,221,780 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,222,985 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,624,378,200 >>> mbox cmd response: success
1,624,378,445 UART: [update-reset] Copying MAN_2 To MAN_1
1,624,386,459 UART: [update-reset Success] --
1,624,387,574 UART: [state] Locking Datavault
1,624,388,404 UART: [state] Locking PCR0, PCR1 and PCR31
1,624,389,008 UART: [state] Locking ICCM
1,624,389,460 UART: [exit] Launching FMC @ 0x40000130
1,624,394,790 UART:
1,624,394,806 UART: Running Caliptra FMC ...
1,624,395,214 UART:
1,624,395,357 UART: [state] CFI Enabled
1,624,484,512 UART: [art] Extend RT PCRs Done
1,624,484,940 UART: [art] Lock RT PCRs Done
1,624,486,263 UART: [art] Populate DV Done
1,624,494,742 UART: [fht] FMC Alias Private Key: 7
1,624,495,886 UART: [art] Derive CDI
1,624,496,166 UART: [art] Store in slot 0x4
1,624,582,023 UART: [art] Derive Key Pair
1,624,582,383 UART: [art] Store priv key in slot 0x5
1,624,595,789 UART: [art] Derive Key Pair - Done
1,624,610,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,624,625,922 UART: [art] Erasing AUTHORITY.KEYID = 7
1,624,626,687 UART: [art] PUB.X = D213AC8BF20A6355444A181C3D1CE7F08F0A227A2079A01D13AA5C0660F90E5121A6152C953D6AB97FBEEBC88410D872
1,624,633,451 UART: [art] PUB.Y = E10A43C54011B001409EAFEE8B5AFBEF17EB4C434D5DD058A536FA90776F63CDC6E97640533CD29BCF3F6CAFA28A8AB0
1,624,640,417 UART: [art] SIG.R = 5285CC6360C42FAD1C025A16E8EC48C505E3BE819FD785F82786FCCBFE477269F0C420D64CC83F567D6ACFC83F1BC87C
1,624,647,197 UART: [art] SIG.S = 4C090330B156F75DB7313ECBC1CEF7911714F466D387B5850BB5863ACE1F027A2EEA4589EE6E9EB37B9425423C7C1318
1,624,671,113 UART: Caliptra RT
1,624,671,456 UART: [state] CFI Enabled
1,625,031,459 UART: [rt] RT listening for mailbox commands...
1,625,032,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,033,070 UART:
1,625,033,086 UART: Running Caliptra ROM ...
1,625,033,494 UART:
1,625,033,636 UART: [state] CFI Enabled
1,625,036,226 UART: [state] LifecycleState = Unprovisioned
1,625,036,881 UART: [state] DebugLocked = No
1,625,037,567 UART: [state] WD Timer not started. Device not locked for debugging
1,625,038,771 UART: [kat] SHA2-256
1,625,842,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,625,846,425 UART: [kat] ++
1,625,846,577 UART: [kat] sha1
1,625,850,821 UART: [kat] SHA2-256
1,625,852,761 UART: [kat] SHA2-384
1,625,855,416 UART: [kat] SHA2-512-ACC
1,625,857,316 UART: [kat] ECC-384
1,625,867,037 UART: [kat] HMAC-384Kdf
1,625,871,741 UART: [kat] LMS
1,626,120,053 UART: [kat] --
1,626,120,969 UART: [update-reset] ++
1,627,480,172 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,627,481,339 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,627,636,554 >>> mbox cmd response: success
1,627,636,729 UART: [update-reset] Copying MAN_2 To MAN_1
1,627,644,743 UART: [update-reset Success] --
1,627,645,850 UART: [state] Locking Datavault
1,627,646,540 UART: [state] Locking PCR0, PCR1 and PCR31
1,627,647,144 UART: [state] Locking ICCM
1,627,647,642 UART: [exit] Launching FMC @ 0x40000130
1,627,652,972 UART:
1,627,652,988 UART: Running Caliptra FMC ...
1,627,653,396 UART:
1,627,653,539 UART: [state] CFI Enabled
1,627,742,764 UART: [art] Extend RT PCRs Done
1,627,743,192 UART: [art] Lock RT PCRs Done
1,627,744,739 UART: [art] Populate DV Done
1,627,753,104 UART: [fht] FMC Alias Private Key: 7
1,627,754,232 UART: [art] Derive CDI
1,627,754,512 UART: [art] Store in slot 0x4
1,627,840,233 UART: [art] Derive Key Pair
1,627,840,593 UART: [art] Store priv key in slot 0x5
1,627,854,133 UART: [art] Derive Key Pair - Done
1,627,868,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,627,884,311 UART: [art] Erasing AUTHORITY.KEYID = 7
1,627,885,076 UART: [art] PUB.X = 6ACC49540D45513C598550E4C76B1ED1039B792D89EDA0EC261C659597BF593EF050D2FB4A67CEDA849848A12285A7ED
1,627,891,846 UART: [art] PUB.Y = 30869BE7A10773F163BBDE48ADDBBD624D9C6E885B1EB871AC160AAFF2970D4E25069B4AC2D36D4E6F59290646CEA6A1
1,627,898,797 UART: [art] SIG.R = FE7B4A8F7F1B97B578A8B51D3F2EBA4C10D43B62F2CAFCD3EBCE29CCBB0DD203894DD1552FEE2B84406B8E226C373271
1,627,905,585 UART: [art] SIG.S = 97A24B2C83B5074FE72FD6E74A553856DE2F0D6EF0A88DF1BE4DF594305B11612F2ADA00FFCF70C1AC08440EA8D713FC
1,627,929,131 UART: Caliptra RT
1,627,929,474 UART: [state] CFI Enabled
1,628,293,547 UART: [rt] RT listening for mailbox commands...
1,628,294,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,628,295,180 UART:
1,628,295,196 UART: Running Caliptra ROM ...
1,628,295,604 UART:
1,628,295,746 UART: [state] CFI Enabled
1,628,298,054 UART: [state] LifecycleState = Unprovisioned
1,628,298,709 UART: [state] DebugLocked = No
1,628,299,245 UART: [state] WD Timer not started. Device not locked for debugging
1,628,300,367 UART: [kat] SHA2-256
1,629,103,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,629,108,021 UART: [kat] ++
1,629,108,173 UART: [kat] sha1
1,629,112,435 UART: [kat] SHA2-256
1,629,114,375 UART: [kat] SHA2-384
1,629,117,056 UART: [kat] SHA2-512-ACC
1,629,118,956 UART: [kat] ECC-384
1,629,128,943 UART: [kat] HMAC-384Kdf
1,629,133,687 UART: [kat] LMS
1,629,381,999 UART: [kat] --
1,629,383,087 UART: [update-reset] ++
1,630,741,896 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,630,743,071 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,630,898,286 >>> mbox cmd response: success
1,630,898,401 UART: [update-reset] Copying MAN_2 To MAN_1
1,630,906,415 UART: [update-reset Success] --
1,630,907,378 UART: [state] Locking Datavault
1,630,907,960 UART: [state] Locking PCR0, PCR1 and PCR31
1,630,908,564 UART: [state] Locking ICCM
1,630,909,104 UART: [exit] Launching FMC @ 0x40000130
1,630,914,434 UART:
1,630,914,450 UART: Running Caliptra FMC ...
1,630,914,858 UART:
1,630,915,001 UART: [state] CFI Enabled
1,631,004,488 UART: [art] Extend RT PCRs Done
1,631,004,916 UART: [art] Lock RT PCRs Done
1,631,006,439 UART: [art] Populate DV Done
1,631,014,818 UART: [fht] FMC Alias Private Key: 7
1,631,015,948 UART: [art] Derive CDI
1,631,016,228 UART: [art] Store in slot 0x4
1,631,101,857 UART: [art] Derive Key Pair
1,631,102,217 UART: [art] Store priv key in slot 0x5
1,631,116,031 UART: [art] Derive Key Pair - Done
1,631,130,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,146,588 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,147,353 UART: [art] PUB.X = D213AC8BF20A6355444A181C3D1CE7F08F0A227A2079A01D13AA5C0660F90E5121A6152C953D6AB97FBEEBC88410D872
1,631,154,117 UART: [art] PUB.Y = E10A43C54011B001409EAFEE8B5AFBEF17EB4C434D5DD058A536FA90776F63CDC6E97640533CD29BCF3F6CAFA28A8AB0
1,631,161,083 UART: [art] SIG.R = 5285CC6360C42FAD1C025A16E8EC48C505E3BE819FD785F82786FCCBFE477269F0C420D64CC83F567D6ACFC83F1BC87C
1,631,167,863 UART: [art] SIG.S = 4C090330B156F75DB7313ECBC1CEF7911714F466D387B5850BB5863ACE1F027A2EEA4589EE6E9EB37B9425423C7C1318
1,631,191,549 UART: Caliptra RT
1,631,191,892 UART: [state] CFI Enabled
1,631,553,379 UART: [rt] RT listening for mailbox commands...
1,631,554,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,631,555,016 UART:
1,631,555,032 UART: Running Caliptra ROM ...
1,631,555,440 UART:
1,631,555,582 UART: [state] CFI Enabled
1,631,558,260 UART: [state] LifecycleState = Unprovisioned
1,631,558,915 UART: [state] DebugLocked = No
1,631,559,423 UART: [state] WD Timer not started. Device not locked for debugging
1,631,560,755 UART: [kat] SHA2-256
1,632,364,305 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,632,368,409 UART: [kat] ++
1,632,368,561 UART: [kat] sha1
1,632,372,897 UART: [kat] SHA2-256
1,632,374,837 UART: [kat] SHA2-384
1,632,377,606 UART: [kat] SHA2-512-ACC
1,632,379,506 UART: [kat] ECC-384
1,632,388,973 UART: [kat] HMAC-384Kdf
1,632,393,559 UART: [kat] LMS
1,632,641,871 UART: [kat] --
1,632,642,905 UART: [update-reset] ++
1,634,001,814 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,634,002,801 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,158,016 >>> mbox cmd response: success
1,634,158,251 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,166,265 UART: [update-reset Success] --
1,634,167,364 UART: [state] Locking Datavault
1,634,168,190 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,168,794 UART: [state] Locking ICCM
1,634,169,296 UART: [exit] Launching FMC @ 0x40000130
1,634,174,626 UART:
1,634,174,642 UART: Running Caliptra FMC ...
1,634,175,050 UART:
1,634,175,193 UART: [state] CFI Enabled
1,634,264,246 UART: [art] Extend RT PCRs Done
1,634,264,674 UART: [art] Lock RT PCRs Done
1,634,266,091 UART: [art] Populate DV Done
1,634,274,614 UART: [fht] FMC Alias Private Key: 7
1,634,275,678 UART: [art] Derive CDI
1,634,275,958 UART: [art] Store in slot 0x4
1,634,361,637 UART: [art] Derive Key Pair
1,634,361,997 UART: [art] Store priv key in slot 0x5
1,634,375,601 UART: [art] Derive Key Pair - Done
1,634,390,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,634,405,827 UART: [art] Erasing AUTHORITY.KEYID = 7
1,634,406,592 UART: [art] PUB.X = 6ACC49540D45513C598550E4C76B1ED1039B792D89EDA0EC261C659597BF593EF050D2FB4A67CEDA849848A12285A7ED
1,634,413,362 UART: [art] PUB.Y = 30869BE7A10773F163BBDE48ADDBBD624D9C6E885B1EB871AC160AAFF2970D4E25069B4AC2D36D4E6F59290646CEA6A1
1,634,420,313 UART: [art] SIG.R = FE7B4A8F7F1B97B578A8B51D3F2EBA4C10D43B62F2CAFCD3EBCE29CCBB0DD203894DD1552FEE2B84406B8E226C373271
1,634,427,101 UART: [art] SIG.S = 97A24B2C83B5074FE72FD6E74A553856DE2F0D6EF0A88DF1BE4DF594305B11612F2ADA00FFCF70C1AC08440EA8D713FC
1,634,450,885 UART: Caliptra RT
1,634,451,228 UART: [state] CFI Enabled
1,634,815,761 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 344.88s
Truncated 716652 bytes from beginning
C561E6C88B
1,549,849,050 UART: [art] SIG.S = E5D897DA87B002723DC1592624262F6DC7161C8288F5797B777B85499E7CB52DDB0234A508F06F98A39E223FAA980BB0
1,549,872,664 UART: Caliptra RT
1,549,873,007 UART: [state] CFI Enabled
1,550,238,521 UART: [rt] RT listening for mailbox commands...
1,550,239,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,552,728,080 >>> mbox cmd response: success
1,552,741,501 UART:
1,552,741,517 UART: Running Caliptra FMC ...
1,552,741,925 UART:
1,552,742,068 UART: [state] CFI Enabled
1,552,831,333 UART: [art] Extend RT PCRs Done
1,552,831,761 UART: [art] Lock RT PCRs Done
1,552,833,040 UART: [art] Populate DV Done
1,552,841,307 UART: [fht] FMC Alias Private Key: 7
1,552,842,383 UART: [art] Derive CDI
1,552,842,663 UART: [art] Store in slot 0x4
1,552,928,468 UART: [art] Derive Key Pair
1,552,928,828 UART: [art] Store priv key in slot 0x5
1,552,942,168 UART: [art] Derive Key Pair - Done
1,552,957,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,552,972,812 UART: [art] Erasing AUTHORITY.KEYID = 7
1,552,973,577 UART: [art] PUB.X = A04BE34C15DF5D3C5BD753F12BAF3256FBB1CD6640531000EF7DDC14C7DC33203507463F75E51CF816E48A05552A057C
1,552,980,324 UART: [art] PUB.Y = DF6F905B903A5CB032E33A601C1F85A199186FEE6EBAF11F37E73CF2539C6DB9427EFE80D81CCD5DDFF4102A58E6203C
1,552,987,292 UART: [art] SIG.R = 5CB71F0BE40D4472202D113CAB974A0BF1F30F47E35C16B03B1C62D185B65875748ABE6AAF0EF2D69C5CDF7ECED0DFCF
1,552,994,071 UART: [art] SIG.S = B6ACBB98C32AEE95244C2FB15DC467657656D240051F8BEE5BD0C4C5D9AC92AA26D086FD2C88F35BDFA19810ACAB808B
1,553,017,990 UART: Caliptra RT
1,553,018,333 UART: [state] CFI Enabled
1,553,382,513 UART: [rt] RT listening for mailbox commands...
1,553,383,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,555,872,692 >>> mbox cmd response: success
1,555,885,993 UART:
1,555,886,009 UART: Running Caliptra FMC ...
1,555,886,417 UART:
1,555,886,560 UART: [state] CFI Enabled
1,555,976,001 UART: [art] Extend RT PCRs Done
1,555,976,429 UART: [art] Lock RT PCRs Done
1,555,977,754 UART: [art] Populate DV Done
1,555,985,873 UART: [fht] FMC Alias Private Key: 7
1,555,986,935 UART: [art] Derive CDI
1,555,987,215 UART: [art] Store in slot 0x4
1,556,072,820 UART: [art] Derive Key Pair
1,556,073,180 UART: [art] Store priv key in slot 0x5
1,556,086,820 UART: [art] Derive Key Pair - Done
1,556,101,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,117,011 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,117,776 UART: [art] PUB.X = 3A3E6DFB6139583C6907B4AB72EFE89020C8C4464AE43434EC246A06BA5C2943AE2E76F975C2329ADB278E482065B2E5
1,556,124,544 UART: [art] PUB.Y = D77C1463CE0C12E5F599C5035E6CE4C761230F65686BAADC01AA700396A7F5A5A2DC644BF6DDCAAC125D9E91BA621DCA
1,556,131,499 UART: [art] SIG.R = 683FA2AF18599A78B86FBA4F29FFBC9C1C63092B41191ACAF38926717FA5082D8DF6ABF7375E1DFEDF6867C561E6C88B
1,556,138,279 UART: [art] SIG.S = E5D897DA87B002723DC1592624262F6DC7161C8288F5797B777B85499E7CB52DDB0234A508F06F98A39E223FAA980BB0
1,556,162,715 UART: Caliptra RT
1,556,163,058 UART: [state] CFI Enabled
1,556,526,190 UART: [rt] RT listening for mailbox commands...
1,556,526,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,015,391 >>> mbox cmd response: success
1,559,028,476 UART:
1,559,028,492 UART: Running Caliptra FMC ...
1,559,028,900 UART:
1,559,029,043 UART: [state] CFI Enabled
1,559,118,314 UART: [art] Extend RT PCRs Done
1,559,118,742 UART: [art] Lock RT PCRs Done
1,559,119,787 UART: [art] Populate DV Done
1,559,128,144 UART: [fht] FMC Alias Private Key: 7
1,559,129,206 UART: [art] Derive CDI
1,559,129,486 UART: [art] Store in slot 0x4
1,559,215,647 UART: [art] Derive Key Pair
1,559,216,007 UART: [art] Store priv key in slot 0x5
1,559,229,651 UART: [art] Derive Key Pair - Done
1,559,244,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,260,231 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,260,996 UART: [art] PUB.X = A04BE34C15DF5D3C5BD753F12BAF3256FBB1CD6640531000EF7DDC14C7DC33203507463F75E51CF816E48A05552A057C
1,559,267,743 UART: [art] PUB.Y = DF6F905B903A5CB032E33A601C1F85A199186FEE6EBAF11F37E73CF2539C6DB9427EFE80D81CCD5DDFF4102A58E6203C
1,559,274,711 UART: [art] SIG.R = 5CB71F0BE40D4472202D113CAB974A0BF1F30F47E35C16B03B1C62D185B65875748ABE6AAF0EF2D69C5CDF7ECED0DFCF
1,559,281,490 UART: [art] SIG.S = B6ACBB98C32AEE95244C2FB15DC467657656D240051F8BEE5BD0C4C5D9AC92AA26D086FD2C88F35BDFA19810ACAB808B
1,559,305,153 UART: Caliptra RT
1,559,305,496 UART: [state] CFI Enabled
1,559,671,222 UART: [rt] RT listening for mailbox commands...
1,559,671,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,160,009 >>> mbox cmd response: success
1,562,173,322 UART:
1,562,173,338 UART: Running Caliptra FMC ...
1,562,173,746 UART:
1,562,173,889 UART: [state] CFI Enabled
1,562,263,828 UART: [art] Extend RT PCRs Done
1,562,264,256 UART: [art] Lock RT PCRs Done
1,562,265,533 UART: [art] Populate DV Done
1,562,273,852 UART: [fht] FMC Alias Private Key: 7
1,562,274,988 UART: [art] Derive CDI
1,562,275,268 UART: [art] Store in slot 0x4
1,562,361,035 UART: [art] Derive Key Pair
1,562,361,395 UART: [art] Store priv key in slot 0x5
1,562,375,107 UART: [art] Derive Key Pair - Done
1,562,389,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,405,816 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,406,581 UART: [art] PUB.X = 3A3E6DFB6139583C6907B4AB72EFE89020C8C4464AE43434EC246A06BA5C2943AE2E76F975C2329ADB278E482065B2E5
1,562,413,349 UART: [art] PUB.Y = D77C1463CE0C12E5F599C5035E6CE4C761230F65686BAADC01AA700396A7F5A5A2DC644BF6DDCAAC125D9E91BA621DCA
1,562,420,304 UART: [art] SIG.R = 683FA2AF18599A78B86FBA4F29FFBC9C1C63092B41191ACAF38926717FA5082D8DF6ABF7375E1DFEDF6867C561E6C88B
1,562,427,084 UART: [art] SIG.S = E5D897DA87B002723DC1592624262F6DC7161C8288F5797B777B85499E7CB52DDB0234A508F06F98A39E223FAA980BB0
1,562,451,396 UART: Caliptra RT
1,562,451,739 UART: [state] CFI Enabled
1,562,815,871 UART: [rt] RT listening for mailbox commands...
1,562,816,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,304,836 >>> mbox cmd response: success
1,565,318,287 UART:
1,565,318,303 UART: Running Caliptra FMC ...
1,565,318,711 UART:
1,565,318,854 UART: [state] CFI Enabled
1,565,408,151 UART: [art] Extend RT PCRs Done
1,565,408,579 UART: [art] Lock RT PCRs Done
1,565,409,618 UART: [art] Populate DV Done
1,565,417,789 UART: [fht] FMC Alias Private Key: 7
1,565,418,759 UART: [art] Derive CDI
1,565,419,039 UART: [art] Store in slot 0x4
1,565,504,988 UART: [art] Derive Key Pair
1,565,505,348 UART: [art] Store priv key in slot 0x5
1,565,518,156 UART: [art] Derive Key Pair - Done
1,565,532,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,548,686 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,549,451 UART: [art] PUB.X = A04BE34C15DF5D3C5BD753F12BAF3256FBB1CD6640531000EF7DDC14C7DC33203507463F75E51CF816E48A05552A057C
1,565,556,198 UART: [art] PUB.Y = DF6F905B903A5CB032E33A601C1F85A199186FEE6EBAF11F37E73CF2539C6DB9427EFE80D81CCD5DDFF4102A58E6203C
1,565,563,166 UART: [art] SIG.R = 5CB71F0BE40D4472202D113CAB974A0BF1F30F47E35C16B03B1C62D185B65875748ABE6AAF0EF2D69C5CDF7ECED0DFCF
1,565,569,945 UART: [art] SIG.S = B6ACBB98C32AEE95244C2FB15DC467657656D240051F8BEE5BD0C4C5D9AC92AA26D086FD2C88F35BDFA19810ACAB808B
1,565,594,422 UART: Caliptra RT
1,565,594,765 UART: [state] CFI Enabled
1,565,958,703 UART: [rt] RT listening for mailbox commands...
1,565,959,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,447,574 >>> mbox cmd response: success
1,568,461,031 UART:
1,568,461,047 UART: Running Caliptra FMC ...
1,568,461,455 UART:
1,568,461,598 UART: [state] CFI Enabled
1,568,550,309 UART: [art] Extend RT PCRs Done
1,568,550,737 UART: [art] Lock RT PCRs Done
1,568,552,166 UART: [art] Populate DV Done
1,568,560,341 UART: [fht] FMC Alias Private Key: 7
1,568,561,435 UART: [art] Derive CDI
1,568,561,715 UART: [art] Store in slot 0x4
1,568,647,652 UART: [art] Derive Key Pair
1,568,648,012 UART: [art] Store priv key in slot 0x5
1,568,661,738 UART: [art] Derive Key Pair - Done
1,568,676,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,691,573 UART: [art] Erasing AUTHORITY.KEYID = 7
1,568,692,338 UART: [art] PUB.X = 3A3E6DFB6139583C6907B4AB72EFE89020C8C4464AE43434EC246A06BA5C2943AE2E76F975C2329ADB278E482065B2E5
1,568,699,106 UART: [art] PUB.Y = D77C1463CE0C12E5F599C5035E6CE4C761230F65686BAADC01AA700396A7F5A5A2DC644BF6DDCAAC125D9E91BA621DCA
1,568,706,061 UART: [art] SIG.R = 683FA2AF18599A78B86FBA4F29FFBC9C1C63092B41191ACAF38926717FA5082D8DF6ABF7375E1DFEDF6867C561E6C88B
1,568,712,841 UART: [art] SIG.S = E5D897DA87B002723DC1592624262F6DC7161C8288F5797B777B85499E7CB52DDB0234A508F06F98A39E223FAA980BB0
1,568,736,435 UART: Caliptra RT
1,568,736,778 UART: [state] CFI Enabled
1,569,102,002 UART: [rt] RT listening for mailbox commands...
1,569,102,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,590,607 >>> mbox cmd response: success
1,571,604,182 UART:
1,571,604,198 UART: Running Caliptra FMC ...
1,571,604,606 UART:
1,571,604,749 UART: [state] CFI Enabled
1,571,693,624 UART: [art] Extend RT PCRs Done
1,571,694,052 UART: [art] Lock RT PCRs Done
1,571,695,199 UART: [art] Populate DV Done
1,571,703,416 UART: [fht] FMC Alias Private Key: 7
1,571,704,418 UART: [art] Derive CDI
1,571,704,698 UART: [art] Store in slot 0x4
1,571,790,607 UART: [art] Derive Key Pair
1,571,790,967 UART: [art] Store priv key in slot 0x5
1,571,804,627 UART: [art] Derive Key Pair - Done
1,571,819,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,571,834,699 UART: [art] Erasing AUTHORITY.KEYID = 7
1,571,835,464 UART: [art] PUB.X = A04BE34C15DF5D3C5BD753F12BAF3256FBB1CD6640531000EF7DDC14C7DC33203507463F75E51CF816E48A05552A057C
1,571,842,211 UART: [art] PUB.Y = DF6F905B903A5CB032E33A601C1F85A199186FEE6EBAF11F37E73CF2539C6DB9427EFE80D81CCD5DDFF4102A58E6203C
1,571,849,179 UART: [art] SIG.R = 5CB71F0BE40D4472202D113CAB974A0BF1F30F47E35C16B03B1C62D185B65875748ABE6AAF0EF2D69C5CDF7ECED0DFCF
1,571,855,958 UART: [art] SIG.S = B6ACBB98C32AEE95244C2FB15DC467657656D240051F8BEE5BD0C4C5D9AC92AA26D086FD2C88F35BDFA19810ACAB808B
1,571,879,609 UART: Caliptra RT
1,571,879,952 UART: [state] CFI Enabled
1,572,245,292 UART: [rt] RT listening for mailbox commands...
1,572,245,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,574,734,583 >>> mbox cmd response: success
1,574,747,792 UART:
1,574,747,808 UART: Running Caliptra FMC ...
1,574,748,216 UART:
1,574,748,359 UART: [state] CFI Enabled
1,574,837,594 UART: [art] Extend RT PCRs Done
1,574,838,022 UART: [art] Lock RT PCRs Done
1,574,839,417 UART: [art] Populate DV Done
1,574,847,580 UART: [fht] FMC Alias Private Key: 7
1,574,848,586 UART: [art] Derive CDI
1,574,848,866 UART: [art] Store in slot 0x4
1,574,934,717 UART: [art] Derive Key Pair
1,574,935,077 UART: [art] Store priv key in slot 0x5
1,574,948,593 UART: [art] Derive Key Pair - Done
1,574,963,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,574,978,858 UART: [art] Erasing AUTHORITY.KEYID = 7
1,574,979,623 UART: [art] PUB.X = 3A3E6DFB6139583C6907B4AB72EFE89020C8C4464AE43434EC246A06BA5C2943AE2E76F975C2329ADB278E482065B2E5
1,574,986,391 UART: [art] PUB.Y = D77C1463CE0C12E5F599C5035E6CE4C761230F65686BAADC01AA700396A7F5A5A2DC644BF6DDCAAC125D9E91BA621DCA
1,574,993,346 UART: [art] SIG.R = 683FA2AF18599A78B86FBA4F29FFBC9C1C63092B41191ACAF38926717FA5082D8DF6ABF7375E1DFEDF6867C561E6C88B
1,575,000,126 UART: [art] SIG.S = E5D897DA87B002723DC1592624262F6DC7161C8288F5797B777B85499E7CB52DDB0234A508F06F98A39E223FAA980BB0
1,575,023,484 UART: Caliptra RT
1,575,023,827 UART: [state] CFI Enabled
1,575,388,415 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 345.28s
Truncated 1323525 bytes from beginning
a FMC ...
1,621,859,381 UART:
1,621,859,435 UART: [state] CFI Enabled
1,621,948,644 UART: [art] Extend RT PCRs Done
1,621,949,072 UART: [art] Lock RT PCRs Done
1,621,950,497 UART: [art] Populate DV Done
1,621,958,708 UART: [fht] FMC Alias Private Key: 7
1,621,959,678 UART: [art] Derive CDI
1,621,959,958 UART: [art] Store in slot 0x4
1,622,046,199 UART: [art] Derive Key Pair
1,622,046,559 UART: [art] Store priv key in slot 0x5
1,622,059,801 UART: [art] Derive Key Pair - Done
1,622,075,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,622,090,912 UART: [art] Erasing AUTHORITY.KEYID = 7
1,622,091,677 UART: [art] PUB.X = E76F212113A927197904D9FFF74A379D8EDEF6AC420B1C04555D460F314F0064EB6032D8ACBEB8050F62448974F31A1E
1,622,098,409 UART: [art] PUB.Y = 1673BFEBAC0CB2604A88970FF8AC7B5C321E0119D047FA01A2F2ACD3D7817411AA51DB7E18A8F9F83B8A9F9279A084B0
1,622,105,361 UART: [art] SIG.R = 18F8EAA9EDC1042A2A718449EC1EEB82DC5A8480FCB5E70A804DE1CAA98C5370793BA4D86E0AB4A41364498DDD986B82
1,622,112,138 UART: [art] SIG.S = 38EFCDEED5F2D5C74A0D13E2861B6C26D3ACFF3F0402BACCC5B938B68840F0714157F3E39A11B7A0991AC7A5354AF150
1,622,136,469 UART: Caliptra RT
1,622,136,720 UART: [state] CFI Enabled
1,622,502,195 UART: [rt] RT listening for mailbox commands...
1,622,502,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,503,800 UART:
1,622,503,816 UART: Running Caliptra ROM ...
1,622,504,224 UART:
1,622,504,279 UART: [state] CFI Enabled
1,622,506,805 UART: [state] LifecycleState = Unprovisioned
1,622,507,460 UART: [state] DebugLocked = No
1,622,508,062 UART: [state] WD Timer not started. Device not locked for debugging
1,622,509,284 UART: [kat] SHA2-256
1,623,314,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,319,059 UART: [kat] ++
1,623,319,211 UART: [kat] sha1
1,623,323,347 UART: [kat] SHA2-256
1,623,325,287 UART: [kat] SHA2-384
1,623,328,134 UART: [kat] SHA2-512-ACC
1,623,330,034 UART: [kat] ECC-384
1,623,339,819 UART: [kat] HMAC-384Kdf
1,623,344,379 UART: [kat] LMS
1,623,592,707 UART: [kat] --
1,623,593,651 UART: [update-reset] ++
1,624,954,371 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,624,955,552 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,110,767 >>> mbox cmd response: success
1,625,110,908 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,118,922 UART: [update-reset Success] --
1,625,119,851 UART: [state] Locking Datavault
1,625,120,851 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,121,455 UART: [state] Locking ICCM
1,625,122,063 UART: [exit] Launching FMC @ 0x40000130
1,625,127,393 UART:
1,625,127,409 UART: Running Caliptra FMC ...
1,625,127,817 UART:
1,625,127,871 UART: [state] CFI Enabled
1,625,217,436 UART: [art] Extend RT PCRs Done
1,625,217,864 UART: [art] Lock RT PCRs Done
1,625,218,983 UART: [art] Populate DV Done
1,625,227,298 UART: [fht] FMC Alias Private Key: 7
1,625,228,446 UART: [art] Derive CDI
1,625,228,726 UART: [art] Store in slot 0x4
1,625,314,469 UART: [art] Derive Key Pair
1,625,314,829 UART: [art] Store priv key in slot 0x5
1,625,328,059 UART: [art] Derive Key Pair - Done
1,625,342,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,358,426 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,359,191 UART: [art] PUB.X = 7424692C804D076A1EF11300DD74E5ECF393B44E23574FEBCEE6D4957E3E582DB54FC4C6E1D637C5F06A72F75B3CA687
1,625,365,946 UART: [art] PUB.Y = 204F0462FA6A96A8BF39E03846C698D56183EE0EA8C3DDA61242B01843A3AFEF519BED4A9B3DD2F548347AF5EE4CF4A5
1,625,372,906 UART: [art] SIG.R = C0A9A88FB485F8D0F14679217DD0871D1E3A70569682AFD36DC616928FFD929EB1D8DA0D8F9281B4F3690E9B93EC9B55
1,625,379,678 UART: [art] SIG.S = 31AC304703AB5A4B7C711798F5A3F414B767642555FF5C989F44442C47A2B79961DFAC824FE7F392A8197760B10922D3
1,625,403,570 UART: Caliptra RT
1,625,403,821 UART: [state] CFI Enabled
1,625,773,601 UART: [rt] RT listening for mailbox commands...
1,625,774,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,625,775,162 UART:
1,625,775,178 UART: Running Caliptra ROM ...
1,625,775,586 UART:
1,625,775,641 UART: [state] CFI Enabled
1,625,778,603 UART: [state] LifecycleState = Unprovisioned
1,625,779,258 UART: [state] DebugLocked = No
1,625,779,786 UART: [state] WD Timer not started. Device not locked for debugging
1,625,780,932 UART: [kat] SHA2-256
1,626,586,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,626,590,707 UART: [kat] ++
1,626,590,859 UART: [kat] sha1
1,626,595,299 UART: [kat] SHA2-256
1,626,597,239 UART: [kat] SHA2-384
1,626,600,046 UART: [kat] SHA2-512-ACC
1,626,601,946 UART: [kat] ECC-384
1,626,611,977 UART: [kat] HMAC-384Kdf
1,626,616,563 UART: [kat] LMS
1,626,864,891 UART: [kat] --
1,626,865,985 UART: [update-reset] ++
1,628,226,335 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,227,464 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,382,679 >>> mbox cmd response: success
1,628,382,960 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,390,974 UART: [update-reset Success] --
1,628,392,025 UART: [state] Locking Datavault
1,628,392,691 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,393,295 UART: [state] Locking ICCM
1,628,393,745 UART: [exit] Launching FMC @ 0x40000130
1,628,399,075 UART:
1,628,399,091 UART: Running Caliptra FMC ...
1,628,399,499 UART:
1,628,399,553 UART: [state] CFI Enabled
1,628,488,766 UART: [art] Extend RT PCRs Done
1,628,489,194 UART: [art] Lock RT PCRs Done
1,628,490,785 UART: [art] Populate DV Done
1,628,498,948 UART: [fht] FMC Alias Private Key: 7
1,628,499,928 UART: [art] Derive CDI
1,628,500,208 UART: [art] Store in slot 0x4
1,628,585,887 UART: [art] Derive Key Pair
1,628,586,247 UART: [art] Store priv key in slot 0x5
1,628,599,467 UART: [art] Derive Key Pair - Done
1,628,614,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,628,629,876 UART: [art] Erasing AUTHORITY.KEYID = 7
1,628,630,641 UART: [art] PUB.X = E76F212113A927197904D9FFF74A379D8EDEF6AC420B1C04555D460F314F0064EB6032D8ACBEB8050F62448974F31A1E
1,628,637,373 UART: [art] PUB.Y = 1673BFEBAC0CB2604A88970FF8AC7B5C321E0119D047FA01A2F2ACD3D7817411AA51DB7E18A8F9F83B8A9F9279A084B0
1,628,644,325 UART: [art] SIG.R = 18F8EAA9EDC1042A2A718449EC1EEB82DC5A8480FCB5E70A804DE1CAA98C5370793BA4D86E0AB4A41364498DDD986B82
1,628,651,102 UART: [art] SIG.S = 38EFCDEED5F2D5C74A0D13E2861B6C26D3ACFF3F0402BACCC5B938B68840F0714157F3E39A11B7A0991AC7A5354AF150
1,628,675,257 UART: Caliptra RT
1,628,675,508 UART: [state] CFI Enabled
1,629,046,341 UART: [rt] RT listening for mailbox commands...
1,629,047,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,629,047,854 UART:
1,629,047,870 UART: Running Caliptra ROM ...
1,629,048,278 UART:
1,629,048,333 UART: [state] CFI Enabled
1,629,050,831 UART: [state] LifecycleState = Unprovisioned
1,629,051,486 UART: [state] DebugLocked = No
1,629,052,126 UART: [state] WD Timer not started. Device not locked for debugging
1,629,053,314 UART: [kat] SHA2-256
1,629,858,964 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,629,863,089 UART: [kat] ++
1,629,863,241 UART: [kat] sha1
1,629,867,435 UART: [kat] SHA2-256
1,629,869,375 UART: [kat] SHA2-384
1,629,872,006 UART: [kat] SHA2-512-ACC
1,629,873,906 UART: [kat] ECC-384
1,629,883,771 UART: [kat] HMAC-384Kdf
1,629,888,383 UART: [kat] LMS
1,630,136,711 UART: [kat] --
1,630,137,535 UART: [update-reset] ++
1,631,497,013 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,498,156 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,631,653,371 >>> mbox cmd response: success
1,631,653,498 UART: [update-reset] Copying MAN_2 To MAN_1
1,631,661,512 UART: [update-reset Success] --
1,631,662,639 UART: [state] Locking Datavault
1,631,663,375 UART: [state] Locking PCR0, PCR1 and PCR31
1,631,663,979 UART: [state] Locking ICCM
1,631,664,449 UART: [exit] Launching FMC @ 0x40000130
1,631,669,779 UART:
1,631,669,795 UART: Running Caliptra FMC ...
1,631,670,203 UART:
1,631,670,257 UART: [state] CFI Enabled
1,631,759,502 UART: [art] Extend RT PCRs Done
1,631,759,930 UART: [art] Lock RT PCRs Done
1,631,761,155 UART: [art] Populate DV Done
1,631,769,522 UART: [fht] FMC Alias Private Key: 7
1,631,770,514 UART: [art] Derive CDI
1,631,770,794 UART: [art] Store in slot 0x4
1,631,856,707 UART: [art] Derive Key Pair
1,631,857,067 UART: [art] Store priv key in slot 0x5
1,631,869,983 UART: [art] Derive Key Pair - Done
1,631,884,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,631,900,326 UART: [art] Erasing AUTHORITY.KEYID = 7
1,631,901,091 UART: [art] PUB.X = 7424692C804D076A1EF11300DD74E5ECF393B44E23574FEBCEE6D4957E3E582DB54FC4C6E1D637C5F06A72F75B3CA687
1,631,907,846 UART: [art] PUB.Y = 204F0462FA6A96A8BF39E03846C698D56183EE0EA8C3DDA61242B01843A3AFEF519BED4A9B3DD2F548347AF5EE4CF4A5
1,631,914,806 UART: [art] SIG.R = C0A9A88FB485F8D0F14679217DD0871D1E3A70569682AFD36DC616928FFD929EB1D8DA0D8F9281B4F3690E9B93EC9B55
1,631,921,578 UART: [art] SIG.S = 31AC304703AB5A4B7C711798F5A3F414B767642555FF5C989F44442C47A2B79961DFAC824FE7F392A8197760B10922D3
1,631,945,784 UART: Caliptra RT
1,631,946,035 UART: [state] CFI Enabled
1,632,312,061 UART: [rt] RT listening for mailbox commands...
1,632,312,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,313,924 UART:
1,632,313,940 UART: Running Caliptra ROM ...
1,632,314,348 UART:
1,632,314,403 UART: [state] CFI Enabled
1,632,316,881 UART: [state] LifecycleState = Unprovisioned
1,632,317,536 UART: [state] DebugLocked = No
1,632,318,064 UART: [state] WD Timer not started. Device not locked for debugging
1,632,319,302 UART: [kat] SHA2-256
1,633,124,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,129,077 UART: [kat] ++
1,633,129,229 UART: [kat] sha1
1,633,133,391 UART: [kat] SHA2-256
1,633,135,331 UART: [kat] SHA2-384
1,633,138,106 UART: [kat] SHA2-512-ACC
1,633,140,006 UART: [kat] ECC-384
1,633,149,981 UART: [kat] HMAC-384Kdf
1,633,154,615 UART: [kat] LMS
1,633,402,943 UART: [kat] --
1,633,403,885 UART: [update-reset] ++
1,634,763,971 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,634,765,016 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,634,920,231 >>> mbox cmd response: success
1,634,920,544 UART: [update-reset] Copying MAN_2 To MAN_1
1,634,928,558 UART: [update-reset Success] --
1,634,929,533 UART: [state] Locking Datavault
1,634,930,455 UART: [state] Locking PCR0, PCR1 and PCR31
1,634,931,059 UART: [state] Locking ICCM
1,634,931,621 UART: [exit] Launching FMC @ 0x40000130
1,634,936,951 UART:
1,634,936,967 UART: Running Caliptra FMC ...
1,634,937,375 UART:
1,634,937,429 UART: [state] CFI Enabled
1,635,026,438 UART: [art] Extend RT PCRs Done
1,635,026,866 UART: [art] Lock RT PCRs Done
1,635,028,301 UART: [art] Populate DV Done
1,635,036,260 UART: [fht] FMC Alias Private Key: 7
1,635,037,264 UART: [art] Derive CDI
1,635,037,544 UART: [art] Store in slot 0x4
1,635,123,361 UART: [art] Derive Key Pair
1,635,123,721 UART: [art] Store priv key in slot 0x5
1,635,136,881 UART: [art] Derive Key Pair - Done
1,635,151,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,167,160 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,167,925 UART: [art] PUB.X = E76F212113A927197904D9FFF74A379D8EDEF6AC420B1C04555D460F314F0064EB6032D8ACBEB8050F62448974F31A1E
1,635,174,657 UART: [art] PUB.Y = 1673BFEBAC0CB2604A88970FF8AC7B5C321E0119D047FA01A2F2ACD3D7817411AA51DB7E18A8F9F83B8A9F9279A084B0
1,635,181,609 UART: [art] SIG.R = 18F8EAA9EDC1042A2A718449EC1EEB82DC5A8480FCB5E70A804DE1CAA98C5370793BA4D86E0AB4A41364498DDD986B82
1,635,188,386 UART: [art] SIG.S = 38EFCDEED5F2D5C74A0D13E2861B6C26D3ACFF3F0402BACCC5B938B68840F0714157F3E39A11B7A0991AC7A5354AF150
1,635,211,475 UART: Caliptra RT
1,635,211,726 UART: [state] CFI Enabled
1,635,578,025 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 353.06s
Truncated 716656 bytes from beginning
63967737ED
1,550,153,222 UART: [art] SIG.S = E13B28A620A11790F17DCAD0241054F3FD3E2F752C477E726367C5BA5236FC87933B32E24E7135AA02E3140F81C1B9C4
1,550,177,162 UART: Caliptra RT
1,550,177,413 UART: [state] CFI Enabled
1,550,542,572 UART: [rt] RT listening for mailbox commands...
1,550,543,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,553,033,691 >>> mbox cmd response: success
1,553,047,170 UART:
1,553,047,186 UART: Running Caliptra FMC ...
1,553,047,594 UART:
1,553,047,648 UART: [state] CFI Enabled
1,553,137,301 UART: [art] Extend RT PCRs Done
1,553,137,729 UART: [art] Lock RT PCRs Done
1,553,138,802 UART: [art] Populate DV Done
1,553,147,123 UART: [fht] FMC Alias Private Key: 7
1,553,148,207 UART: [art] Derive CDI
1,553,148,487 UART: [art] Store in slot 0x4
1,553,234,500 UART: [art] Derive Key Pair
1,553,234,860 UART: [art] Store priv key in slot 0x5
1,553,247,604 UART: [art] Derive Key Pair - Done
1,553,262,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,278,133 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,278,898 UART: [art] PUB.X = A3F103D0F124740195BA1125F1F5355941B831F09E3E31C2F51530C2A14BA7AE674AEECCB529D3879DD64B31913C69DC
1,553,285,666 UART: [art] PUB.Y = E9838812A3144261CA2E1BE49BB91A01BBC024D4EF730CAC09C46292A1177237F9B317C43A38BD85A852885D720ACD67
1,553,292,606 UART: [art] SIG.R = 931EA7582179CECD9A6D48CD8984C9F83C0CF7A48E8EFE0EE01A9480A329A1E0DD16D8CFEF946CFAF4D58781963F8F3B
1,553,299,390 UART: [art] SIG.S = 55B11BF97C3FBC9B55CDB981F4DCE07538193A2E43325CFD946A5DA027DAFBCE30E1BF9ED1EA3DA11E63786629F92B15
1,553,323,518 UART: Caliptra RT
1,553,323,769 UART: [state] CFI Enabled
1,553,692,879 UART: [rt] RT listening for mailbox commands...
1,553,693,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,183,138 >>> mbox cmd response: success
1,556,196,247 UART:
1,556,196,263 UART: Running Caliptra FMC ...
1,556,196,671 UART:
1,556,196,725 UART: [state] CFI Enabled
1,556,286,342 UART: [art] Extend RT PCRs Done
1,556,286,770 UART: [art] Lock RT PCRs Done
1,556,288,011 UART: [art] Populate DV Done
1,556,295,956 UART: [fht] FMC Alias Private Key: 7
1,556,296,922 UART: [art] Derive CDI
1,556,297,202 UART: [art] Store in slot 0x4
1,556,382,965 UART: [art] Derive Key Pair
1,556,383,325 UART: [art] Store priv key in slot 0x5
1,556,396,923 UART: [art] Derive Key Pair - Done
1,556,411,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,427,026 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,427,791 UART: [art] PUB.X = B5E275FCF2A854BFCE35AD86E08B321093B06EF2F1F5952278FF9DD130A1F491856789B13889FC3D91FC735DC51BFDC3
1,556,434,573 UART: [art] PUB.Y = BEFC53FDE8A88FD4720F517C0BC8024B6FB9F4763D474E6C4E81027224DA385A96507C817D8138F503092ECE708DB4B6
1,556,441,511 UART: [art] SIG.R = 8E8A488E5C083A97C8B3BBF55AF36AD97EFB658EE439B41B670233F2EBACDDA0812512CAED709AFE537B8863967737ED
1,556,448,291 UART: [art] SIG.S = E13B28A620A11790F17DCAD0241054F3FD3E2F752C477E726367C5BA5236FC87933B32E24E7135AA02E3140F81C1B9C4
1,556,472,061 UART: Caliptra RT
1,556,472,312 UART: [state] CFI Enabled
1,556,834,227 UART: [rt] RT listening for mailbox commands...
1,556,834,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,324,674 >>> mbox cmd response: success
1,559,338,397 UART:
1,559,338,413 UART: Running Caliptra FMC ...
1,559,338,821 UART:
1,559,338,875 UART: [state] CFI Enabled
1,559,428,040 UART: [art] Extend RT PCRs Done
1,559,428,468 UART: [art] Lock RT PCRs Done
1,559,429,695 UART: [art] Populate DV Done
1,559,437,914 UART: [fht] FMC Alias Private Key: 7
1,559,439,038 UART: [art] Derive CDI
1,559,439,318 UART: [art] Store in slot 0x4
1,559,524,931 UART: [art] Derive Key Pair
1,559,525,291 UART: [art] Store priv key in slot 0x5
1,559,538,653 UART: [art] Derive Key Pair - Done
1,559,553,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,568,514 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,569,279 UART: [art] PUB.X = A3F103D0F124740195BA1125F1F5355941B831F09E3E31C2F51530C2A14BA7AE674AEECCB529D3879DD64B31913C69DC
1,559,576,047 UART: [art] PUB.Y = E9838812A3144261CA2E1BE49BB91A01BBC024D4EF730CAC09C46292A1177237F9B317C43A38BD85A852885D720ACD67
1,559,582,987 UART: [art] SIG.R = 931EA7582179CECD9A6D48CD8984C9F83C0CF7A48E8EFE0EE01A9480A329A1E0DD16D8CFEF946CFAF4D58781963F8F3B
1,559,589,771 UART: [art] SIG.S = 55B11BF97C3FBC9B55CDB981F4DCE07538193A2E43325CFD946A5DA027DAFBCE30E1BF9ED1EA3DA11E63786629F92B15
1,559,612,991 UART: Caliptra RT
1,559,613,242 UART: [state] CFI Enabled
1,559,972,160 UART: [rt] RT listening for mailbox commands...
1,559,972,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,463,595 >>> mbox cmd response: success
1,562,476,902 UART:
1,562,476,918 UART: Running Caliptra FMC ...
1,562,477,326 UART:
1,562,477,380 UART: [state] CFI Enabled
1,562,566,419 UART: [art] Extend RT PCRs Done
1,562,566,847 UART: [art] Lock RT PCRs Done
1,562,568,056 UART: [art] Populate DV Done
1,562,576,443 UART: [fht] FMC Alias Private Key: 7
1,562,577,463 UART: [art] Derive CDI
1,562,577,743 UART: [art] Store in slot 0x4
1,562,663,378 UART: [art] Derive Key Pair
1,562,663,738 UART: [art] Store priv key in slot 0x5
1,562,677,232 UART: [art] Derive Key Pair - Done
1,562,692,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,562,707,511 UART: [art] Erasing AUTHORITY.KEYID = 7
1,562,708,276 UART: [art] PUB.X = B5E275FCF2A854BFCE35AD86E08B321093B06EF2F1F5952278FF9DD130A1F491856789B13889FC3D91FC735DC51BFDC3
1,562,715,058 UART: [art] PUB.Y = BEFC53FDE8A88FD4720F517C0BC8024B6FB9F4763D474E6C4E81027224DA385A96507C817D8138F503092ECE708DB4B6
1,562,721,996 UART: [art] SIG.R = 8E8A488E5C083A97C8B3BBF55AF36AD97EFB658EE439B41B670233F2EBACDDA0812512CAED709AFE537B8863967737ED
1,562,728,776 UART: [art] SIG.S = E13B28A620A11790F17DCAD0241054F3FD3E2F752C477E726367C5BA5236FC87933B32E24E7135AA02E3140F81C1B9C4
1,562,752,988 UART: Caliptra RT
1,562,753,239 UART: [state] CFI Enabled
1,563,119,532 UART: [rt] RT listening for mailbox commands...
1,563,120,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,608,593 >>> mbox cmd response: success
1,565,621,590 UART:
1,565,621,606 UART: Running Caliptra FMC ...
1,565,622,014 UART:
1,565,622,068 UART: [state] CFI Enabled
1,565,711,591 UART: [art] Extend RT PCRs Done
1,565,712,019 UART: [art] Lock RT PCRs Done
1,565,713,404 UART: [art] Populate DV Done
1,565,721,533 UART: [fht] FMC Alias Private Key: 7
1,565,722,701 UART: [art] Derive CDI
1,565,722,981 UART: [art] Store in slot 0x4
1,565,808,936 UART: [art] Derive Key Pair
1,565,809,296 UART: [art] Store priv key in slot 0x5
1,565,822,444 UART: [art] Derive Key Pair - Done
1,565,837,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,565,852,779 UART: [art] Erasing AUTHORITY.KEYID = 7
1,565,853,544 UART: [art] PUB.X = A3F103D0F124740195BA1125F1F5355941B831F09E3E31C2F51530C2A14BA7AE674AEECCB529D3879DD64B31913C69DC
1,565,860,312 UART: [art] PUB.Y = E9838812A3144261CA2E1BE49BB91A01BBC024D4EF730CAC09C46292A1177237F9B317C43A38BD85A852885D720ACD67
1,565,867,252 UART: [art] SIG.R = 931EA7582179CECD9A6D48CD8984C9F83C0CF7A48E8EFE0EE01A9480A329A1E0DD16D8CFEF946CFAF4D58781963F8F3B
1,565,874,036 UART: [art] SIG.S = 55B11BF97C3FBC9B55CDB981F4DCE07538193A2E43325CFD946A5DA027DAFBCE30E1BF9ED1EA3DA11E63786629F92B15
1,565,897,968 UART: Caliptra RT
1,565,898,219 UART: [state] CFI Enabled
1,566,263,763 UART: [rt] RT listening for mailbox commands...
1,566,264,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,568,754,480 >>> mbox cmd response: success
1,568,767,703 UART:
1,568,767,719 UART: Running Caliptra FMC ...
1,568,768,127 UART:
1,568,768,181 UART: [state] CFI Enabled
1,568,857,434 UART: [art] Extend RT PCRs Done
1,568,857,862 UART: [art] Lock RT PCRs Done
1,568,859,249 UART: [art] Populate DV Done
1,568,867,466 UART: [fht] FMC Alias Private Key: 7
1,568,868,648 UART: [art] Derive CDI
1,568,868,928 UART: [art] Store in slot 0x4
1,568,954,729 UART: [art] Derive Key Pair
1,568,955,089 UART: [art] Store priv key in slot 0x5
1,568,968,847 UART: [art] Derive Key Pair - Done
1,568,983,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,568,999,354 UART: [art] Erasing AUTHORITY.KEYID = 7
1,569,000,119 UART: [art] PUB.X = B5E275FCF2A854BFCE35AD86E08B321093B06EF2F1F5952278FF9DD130A1F491856789B13889FC3D91FC735DC51BFDC3
1,569,006,901 UART: [art] PUB.Y = BEFC53FDE8A88FD4720F517C0BC8024B6FB9F4763D474E6C4E81027224DA385A96507C817D8138F503092ECE708DB4B6
1,569,013,839 UART: [art] SIG.R = 8E8A488E5C083A97C8B3BBF55AF36AD97EFB658EE439B41B670233F2EBACDDA0812512CAED709AFE537B8863967737ED
1,569,020,619 UART: [art] SIG.S = E13B28A620A11790F17DCAD0241054F3FD3E2F752C477E726367C5BA5236FC87933B32E24E7135AA02E3140F81C1B9C4
1,569,044,299 UART: Caliptra RT
1,569,044,550 UART: [state] CFI Enabled
1,569,403,557 UART: [rt] RT listening for mailbox commands...
1,569,404,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,571,895,232 >>> mbox cmd response: success
1,571,908,493 UART:
1,571,908,509 UART: Running Caliptra FMC ...
1,571,908,917 UART:
1,571,908,971 UART: [state] CFI Enabled
1,571,997,674 UART: [art] Extend RT PCRs Done
1,571,998,102 UART: [art] Lock RT PCRs Done
1,571,999,243 UART: [art] Populate DV Done
1,572,007,406 UART: [fht] FMC Alias Private Key: 7
1,572,008,398 UART: [art] Derive CDI
1,572,008,678 UART: [art] Store in slot 0x4
1,572,094,275 UART: [art] Derive Key Pair
1,572,094,635 UART: [art] Store priv key in slot 0x5
1,572,107,955 UART: [art] Derive Key Pair - Done
1,572,122,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,138,446 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,139,211 UART: [art] PUB.X = A3F103D0F124740195BA1125F1F5355941B831F09E3E31C2F51530C2A14BA7AE674AEECCB529D3879DD64B31913C69DC
1,572,145,979 UART: [art] PUB.Y = E9838812A3144261CA2E1BE49BB91A01BBC024D4EF730CAC09C46292A1177237F9B317C43A38BD85A852885D720ACD67
1,572,152,919 UART: [art] SIG.R = 931EA7582179CECD9A6D48CD8984C9F83C0CF7A48E8EFE0EE01A9480A329A1E0DD16D8CFEF946CFAF4D58781963F8F3B
1,572,159,703 UART: [art] SIG.S = 55B11BF97C3FBC9B55CDB981F4DCE07538193A2E43325CFD946A5DA027DAFBCE30E1BF9ED1EA3DA11E63786629F92B15
1,572,183,501 UART: Caliptra RT
1,572,183,752 UART: [state] CFI Enabled
1,572,547,828 UART: [rt] RT listening for mailbox commands...
1,572,548,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,575,037,979 >>> mbox cmd response: success
1,575,051,518 UART:
1,575,051,534 UART: Running Caliptra FMC ...
1,575,051,942 UART:
1,575,051,996 UART: [state] CFI Enabled
1,575,141,193 UART: [art] Extend RT PCRs Done
1,575,141,621 UART: [art] Lock RT PCRs Done
1,575,142,888 UART: [art] Populate DV Done
1,575,151,329 UART: [fht] FMC Alias Private Key: 7
1,575,152,261 UART: [art] Derive CDI
1,575,152,541 UART: [art] Store in slot 0x4
1,575,238,216 UART: [art] Derive Key Pair
1,575,238,576 UART: [art] Store priv key in slot 0x5
1,575,251,906 UART: [art] Derive Key Pair - Done
1,575,266,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,281,873 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,282,638 UART: [art] PUB.X = B5E275FCF2A854BFCE35AD86E08B321093B06EF2F1F5952278FF9DD130A1F491856789B13889FC3D91FC735DC51BFDC3
1,575,289,420 UART: [art] PUB.Y = BEFC53FDE8A88FD4720F517C0BC8024B6FB9F4763D474E6C4E81027224DA385A96507C817D8138F503092ECE708DB4B6
1,575,296,358 UART: [art] SIG.R = 8E8A488E5C083A97C8B3BBF55AF36AD97EFB658EE439B41B670233F2EBACDDA0812512CAED709AFE537B8863967737ED
1,575,303,138 UART: [art] SIG.S = E13B28A620A11790F17DCAD0241054F3FD3E2F752C477E726367C5BA5236FC87933B32E24E7135AA02E3140F81C1B9C4
1,575,326,698 UART: Caliptra RT
1,575,326,949 UART: [state] CFI Enabled
1,575,695,924 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 346.00s
Truncated 1323543 bytes from beginning
a FMC ...
1,622,355,480 UART:
1,622,355,623 UART: [state] CFI Enabled
1,622,445,056 UART: [art] Extend RT PCRs Done
1,622,445,484 UART: [art] Lock RT PCRs Done
1,622,446,975 UART: [art] Populate DV Done
1,622,455,276 UART: [fht] FMC Alias Private Key: 7
1,622,456,362 UART: [art] Derive CDI
1,622,456,642 UART: [art] Store in slot 0x4
1,622,542,491 UART: [art] Derive Key Pair
1,622,542,851 UART: [art] Store priv key in slot 0x5
1,622,555,995 UART: [art] Derive Key Pair - Done
1,622,570,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,622,585,837 UART: [art] Erasing AUTHORITY.KEYID = 7
1,622,586,602 UART: [art] PUB.X = B145B36F6BD6D84C31AA4A2724537F0C914A1D9CD2CCA913CED8AE09CA46CC528ED8B986F04A1690711174BFD794CDEA
1,622,593,384 UART: [art] PUB.Y = 38EE63EBD3948215FD035D9919A3282179098580D90736CA5ED8DF4419CDB1303DE100AC565D423D0716BED0A32B1609
1,622,600,295 UART: [art] SIG.R = C9328C40DE615ED0501CF99682DB9A3E6CCB8BAEC05F5E10F8490E1B84CEAFB42025BD1EBE768F6F1F9C98C3C91DA622
1,622,607,084 UART: [art] SIG.S = 54E87E6603302648502D4AFE2B985420E7A4F6C2DFFA1FA929C59F25C7208EAC7C77409D581E616A6414F23136B4CDF0
1,622,630,825 UART: Caliptra RT
1,622,631,168 UART: [state] CFI Enabled
1,622,996,760 UART: [rt] RT listening for mailbox commands...
1,622,997,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,998,177 UART:
1,622,998,193 UART: Running Caliptra ROM ...
1,622,998,601 UART:
1,622,998,743 UART: [state] CFI Enabled
1,623,001,713 UART: [state] LifecycleState = Unprovisioned
1,623,002,368 UART: [state] DebugLocked = No
1,623,002,906 UART: [state] WD Timer not started. Device not locked for debugging
1,623,004,262 UART: [kat] SHA2-256
1,623,809,912 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,623,814,037 UART: [kat] ++
1,623,814,189 UART: [kat] sha1
1,623,818,317 UART: [kat] SHA2-256
1,623,820,257 UART: [kat] SHA2-384
1,623,823,048 UART: [kat] SHA2-512-ACC
1,623,824,948 UART: [kat] ECC-384
1,623,834,517 UART: [kat] HMAC-384Kdf
1,623,839,091 UART: [kat] LMS
1,624,087,419 UART: [kat] --
1,624,088,487 UART: [update-reset] ++
1,625,448,239 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,625,449,414 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,625,604,629 >>> mbox cmd response: success
1,625,604,902 UART: [update-reset] Copying MAN_2 To MAN_1
1,625,612,916 UART: [update-reset Success] --
1,625,614,021 UART: [state] Locking Datavault
1,625,614,941 UART: [state] Locking PCR0, PCR1 and PCR31
1,625,615,545 UART: [state] Locking ICCM
1,625,616,111 UART: [exit] Launching FMC @ 0x40000130
1,625,621,441 UART:
1,625,621,457 UART: Running Caliptra FMC ...
1,625,621,865 UART:
1,625,622,008 UART: [state] CFI Enabled
1,625,711,723 UART: [art] Extend RT PCRs Done
1,625,712,151 UART: [art] Lock RT PCRs Done
1,625,713,354 UART: [art] Populate DV Done
1,625,721,787 UART: [fht] FMC Alias Private Key: 7
1,625,722,913 UART: [art] Derive CDI
1,625,723,193 UART: [art] Store in slot 0x4
1,625,809,200 UART: [art] Derive Key Pair
1,625,809,560 UART: [art] Store priv key in slot 0x5
1,625,822,888 UART: [art] Derive Key Pair - Done
1,625,837,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,625,852,974 UART: [art] Erasing AUTHORITY.KEYID = 7
1,625,853,739 UART: [art] PUB.X = A365BA878AFAD93DCCBF556B74971D7706C2F46ECE3F417079CCCFC2BCB1AE5AC4362D6BD6A81B274BB2A6C26A24A09B
1,625,860,532 UART: [art] PUB.Y = 32A72E802CC86661651ECE62BC7AC5F59A201AF3ED9CB9EAA7B95E23471924D698C64D2610C6CBC3C1747F8E3A32A1BB
1,625,867,496 UART: [art] SIG.R = 23865814820EFC361F18C30B565C0B2EC311BC0386FE8822AEC99FB62475DE0F4B782D17DF40363E7F70055B72603335
1,625,874,244 UART: [art] SIG.S = ACF597736CBF0DE2BA427BBEAD580D231F351FB04FB6D715FE5F11FCED035BA9316B843DF5716028B173607AA31DEE28
1,625,898,043 UART: Caliptra RT
1,625,898,386 UART: [state] CFI Enabled
1,626,259,616 UART: [rt] RT listening for mailbox commands...
1,626,260,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,626,261,085 UART:
1,626,261,101 UART: Running Caliptra ROM ...
1,626,261,509 UART:
1,626,261,651 UART: [state] CFI Enabled
1,626,264,401 UART: [state] LifecycleState = Unprovisioned
1,626,265,056 UART: [state] DebugLocked = No
1,626,265,648 UART: [state] WD Timer not started. Device not locked for debugging
1,626,266,920 UART: [kat] SHA2-256
1,627,072,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,627,076,695 UART: [kat] ++
1,627,076,847 UART: [kat] sha1
1,627,081,119 UART: [kat] SHA2-256
1,627,083,059 UART: [kat] SHA2-384
1,627,085,834 UART: [kat] SHA2-512-ACC
1,627,087,734 UART: [kat] ECC-384
1,627,096,943 UART: [kat] HMAC-384Kdf
1,627,101,411 UART: [kat] LMS
1,627,349,739 UART: [kat] --
1,627,350,613 UART: [update-reset] ++
1,628,709,161 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,628,710,178 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,628,865,393 >>> mbox cmd response: success
1,628,865,736 UART: [update-reset] Copying MAN_2 To MAN_1
1,628,873,750 UART: [update-reset Success] --
1,628,874,807 UART: [state] Locking Datavault
1,628,875,617 UART: [state] Locking PCR0, PCR1 and PCR31
1,628,876,221 UART: [state] Locking ICCM
1,628,876,853 UART: [exit] Launching FMC @ 0x40000130
1,628,882,183 UART:
1,628,882,199 UART: Running Caliptra FMC ...
1,628,882,607 UART:
1,628,882,750 UART: [state] CFI Enabled
1,628,971,725 UART: [art] Extend RT PCRs Done
1,628,972,153 UART: [art] Lock RT PCRs Done
1,628,973,340 UART: [art] Populate DV Done
1,628,981,701 UART: [fht] FMC Alias Private Key: 7
1,628,982,805 UART: [art] Derive CDI
1,628,983,085 UART: [art] Store in slot 0x4
1,629,068,946 UART: [art] Derive Key Pair
1,629,069,306 UART: [art] Store priv key in slot 0x5
1,629,083,258 UART: [art] Derive Key Pair - Done
1,629,097,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,629,113,284 UART: [art] Erasing AUTHORITY.KEYID = 7
1,629,114,049 UART: [art] PUB.X = B145B36F6BD6D84C31AA4A2724537F0C914A1D9CD2CCA913CED8AE09CA46CC528ED8B986F04A1690711174BFD794CDEA
1,629,120,831 UART: [art] PUB.Y = 38EE63EBD3948215FD035D9919A3282179098580D90736CA5ED8DF4419CDB1303DE100AC565D423D0716BED0A32B1609
1,629,127,742 UART: [art] SIG.R = C9328C40DE615ED0501CF99682DB9A3E6CCB8BAEC05F5E10F8490E1B84CEAFB42025BD1EBE768F6F1F9C98C3C91DA622
1,629,134,531 UART: [art] SIG.S = 54E87E6603302648502D4AFE2B985420E7A4F6C2DFFA1FA929C59F25C7208EAC7C77409D581E616A6414F23136B4CDF0
1,629,158,052 UART: Caliptra RT
1,629,158,395 UART: [state] CFI Enabled
1,629,529,235 UART: [rt] RT listening for mailbox commands...
1,629,529,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,629,530,880 UART:
1,629,530,896 UART: Running Caliptra ROM ...
1,629,531,304 UART:
1,629,531,446 UART: [state] CFI Enabled
1,629,534,082 UART: [state] LifecycleState = Unprovisioned
1,629,534,737 UART: [state] DebugLocked = No
1,629,535,363 UART: [state] WD Timer not started. Device not locked for debugging
1,629,536,511 UART: [kat] SHA2-256
1,630,342,161 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,630,346,286 UART: [kat] ++
1,630,346,438 UART: [kat] sha1
1,630,350,676 UART: [kat] SHA2-256
1,630,352,616 UART: [kat] SHA2-384
1,630,355,265 UART: [kat] SHA2-512-ACC
1,630,357,165 UART: [kat] ECC-384
1,630,366,800 UART: [kat] HMAC-384Kdf
1,630,371,532 UART: [kat] LMS
1,630,619,860 UART: [kat] --
1,630,620,844 UART: [update-reset] ++
1,631,979,140 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,631,980,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,632,135,362 >>> mbox cmd response: success
1,632,135,465 UART: [update-reset] Copying MAN_2 To MAN_1
1,632,143,479 UART: [update-reset Success] --
1,632,144,298 UART: [state] Locking Datavault
1,632,145,262 UART: [state] Locking PCR0, PCR1 and PCR31
1,632,145,866 UART: [state] Locking ICCM
1,632,146,458 UART: [exit] Launching FMC @ 0x40000130
1,632,151,788 UART:
1,632,151,804 UART: Running Caliptra FMC ...
1,632,152,212 UART:
1,632,152,355 UART: [state] CFI Enabled
1,632,241,718 UART: [art] Extend RT PCRs Done
1,632,242,146 UART: [art] Lock RT PCRs Done
1,632,243,341 UART: [art] Populate DV Done
1,632,251,628 UART: [fht] FMC Alias Private Key: 7
1,632,252,716 UART: [art] Derive CDI
1,632,252,996 UART: [art] Store in slot 0x4
1,632,339,049 UART: [art] Derive Key Pair
1,632,339,409 UART: [art] Store priv key in slot 0x5
1,632,352,049 UART: [art] Derive Key Pair - Done
1,632,366,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,632,382,393 UART: [art] Erasing AUTHORITY.KEYID = 7
1,632,383,158 UART: [art] PUB.X = A365BA878AFAD93DCCBF556B74971D7706C2F46ECE3F417079CCCFC2BCB1AE5AC4362D6BD6A81B274BB2A6C26A24A09B
1,632,389,951 UART: [art] PUB.Y = 32A72E802CC86661651ECE62BC7AC5F59A201AF3ED9CB9EAA7B95E23471924D698C64D2610C6CBC3C1747F8E3A32A1BB
1,632,396,915 UART: [art] SIG.R = 23865814820EFC361F18C30B565C0B2EC311BC0386FE8822AEC99FB62475DE0F4B782D17DF40363E7F70055B72603335
1,632,403,663 UART: [art] SIG.S = ACF597736CBF0DE2BA427BBEAD580D231F351FB04FB6D715FE5F11FCED035BA9316B843DF5716028B173607AA31DEE28
1,632,427,068 UART: Caliptra RT
1,632,427,411 UART: [state] CFI Enabled
1,632,794,857 UART: [rt] RT listening for mailbox commands...
1,632,795,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,632,796,364 UART:
1,632,796,380 UART: Running Caliptra ROM ...
1,632,796,788 UART:
1,632,796,930 UART: [state] CFI Enabled
1,632,799,744 UART: [state] LifecycleState = Unprovisioned
1,632,800,399 UART: [state] DebugLocked = No
1,632,801,049 UART: [state] WD Timer not started. Device not locked for debugging
1,632,802,179 UART: [kat] SHA2-256
1,633,607,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,633,611,954 UART: [kat] ++
1,633,612,106 UART: [kat] sha1
1,633,616,274 UART: [kat] SHA2-256
1,633,618,214 UART: [kat] SHA2-384
1,633,621,041 UART: [kat] SHA2-512-ACC
1,633,622,941 UART: [kat] ECC-384
1,633,632,714 UART: [kat] HMAC-384Kdf
1,633,637,344 UART: [kat] LMS
1,633,885,672 UART: [kat] --
1,633,886,638 UART: [update-reset] ++
1,635,246,334 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
1,635,247,393 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
1,635,402,608 >>> mbox cmd response: success
1,635,402,775 UART: [update-reset] Copying MAN_2 To MAN_1
1,635,410,789 UART: [update-reset Success] --
1,635,411,808 UART: [state] Locking Datavault
1,635,412,540 UART: [state] Locking PCR0, PCR1 and PCR31
1,635,413,144 UART: [state] Locking ICCM
1,635,413,768 UART: [exit] Launching FMC @ 0x40000130
1,635,419,098 UART:
1,635,419,114 UART: Running Caliptra FMC ...
1,635,419,522 UART:
1,635,419,665 UART: [state] CFI Enabled
1,635,509,126 UART: [art] Extend RT PCRs Done
1,635,509,554 UART: [art] Lock RT PCRs Done
1,635,510,889 UART: [art] Populate DV Done
1,635,519,176 UART: [fht] FMC Alias Private Key: 7
1,635,520,132 UART: [art] Derive CDI
1,635,520,412 UART: [art] Store in slot 0x4
1,635,606,117 UART: [art] Derive Key Pair
1,635,606,477 UART: [art] Store priv key in slot 0x5
1,635,619,819 UART: [art] Derive Key Pair - Done
1,635,634,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,635,650,347 UART: [art] Erasing AUTHORITY.KEYID = 7
1,635,651,112 UART: [art] PUB.X = B145B36F6BD6D84C31AA4A2724537F0C914A1D9CD2CCA913CED8AE09CA46CC528ED8B986F04A1690711174BFD794CDEA
1,635,657,894 UART: [art] PUB.Y = 38EE63EBD3948215FD035D9919A3282179098580D90736CA5ED8DF4419CDB1303DE100AC565D423D0716BED0A32B1609
1,635,664,805 UART: [art] SIG.R = C9328C40DE615ED0501CF99682DB9A3E6CCB8BAEC05F5E10F8490E1B84CEAFB42025BD1EBE768F6F1F9C98C3C91DA622
1,635,671,594 UART: [art] SIG.S = 54E87E6603302648502D4AFE2B985420E7A4F6C2DFFA1FA929C59F25C7208EAC7C77409D581E616A6414F23136B4CDF0
1,635,695,163 UART: Caliptra RT
1,635,695,506 UART: [state] CFI Enabled
1,636,060,420 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 342.09s
Truncated 716666 bytes from beginning
B2B31A3C52
1,550,508,457 UART: [art] SIG.S = D065A4ADF54D1901BC6F1C6028E4D06B474B006BE42CCBB04126CCC69349EC922878A1D06E24E57ED55E636364BD9D83
1,550,531,500 UART: Caliptra RT
1,550,531,843 UART: [state] CFI Enabled
1,550,894,869 UART: [rt] RT listening for mailbox commands...
1,550,895,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,553,387,567 >>> mbox cmd response: success
1,553,400,622 UART:
1,553,400,638 UART: Running Caliptra FMC ...
1,553,401,046 UART:
1,553,401,189 UART: [state] CFI Enabled
1,553,490,598 UART: [art] Extend RT PCRs Done
1,553,491,026 UART: [art] Lock RT PCRs Done
1,553,492,321 UART: [art] Populate DV Done
1,553,500,572 UART: [fht] FMC Alias Private Key: 7
1,553,501,736 UART: [art] Derive CDI
1,553,502,016 UART: [art] Store in slot 0x4
1,553,587,555 UART: [art] Derive Key Pair
1,553,587,915 UART: [art] Store priv key in slot 0x5
1,553,600,901 UART: [art] Derive Key Pair - Done
1,553,615,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,553,631,266 UART: [art] Erasing AUTHORITY.KEYID = 7
1,553,632,031 UART: [art] PUB.X = A74F0F356C1917D2E5800A06E9391582F96FD4B5DECF77E092C41F9383349A0931B597A5477EAC27F9A380128DDDD5EC
1,553,638,793 UART: [art] PUB.Y = 8BD017D621AF461F70680A0BD4E0FDA229CF905D773001DDEE99D27116ACD6C914DFFAF476A99D96E5D4C60EB6ED0C94
1,553,645,746 UART: [art] SIG.R = 27D0D2CDBAD7911B8BD6B0D4862E3EB4287065C384F94D6C689141D005BA0593C69053D6A85DB309DE29FBED7A0420D5
1,553,652,512 UART: [art] SIG.S = 99F04152AA88EEA4845462676342E282E8755BF5D32BA180BA9A142F19A563273334D15030F2F9E39F6C07F0CB5284C6
1,553,676,235 UART: Caliptra RT
1,553,676,578 UART: [state] CFI Enabled
1,554,045,472 UART: [rt] RT listening for mailbox commands...
1,554,046,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,556,536,180 >>> mbox cmd response: success
1,556,549,649 UART:
1,556,549,665 UART: Running Caliptra FMC ...
1,556,550,073 UART:
1,556,550,216 UART: [state] CFI Enabled
1,556,639,515 UART: [art] Extend RT PCRs Done
1,556,639,943 UART: [art] Lock RT PCRs Done
1,556,641,110 UART: [art] Populate DV Done
1,556,649,253 UART: [fht] FMC Alias Private Key: 7
1,556,650,419 UART: [art] Derive CDI
1,556,650,699 UART: [art] Store in slot 0x4
1,556,736,306 UART: [art] Derive Key Pair
1,556,736,666 UART: [art] Store priv key in slot 0x5
1,556,749,784 UART: [art] Derive Key Pair - Done
1,556,764,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,556,779,631 UART: [art] Erasing AUTHORITY.KEYID = 7
1,556,780,396 UART: [art] PUB.X = 264FC6D75DB3028147F4826C4457C1F4BDD1090D8AF6882D18E3C4E884CBAC70352769932A494A78542858116113C8D0
1,556,787,149 UART: [art] PUB.Y = 0E0A5E6196D939CC2387223E500140FE25C460776BE2F125049236649A2086343C117A8696F476F7148699E42E85BC49
1,556,794,069 UART: [art] SIG.R = 10BBDA96BA95C63FAB54DE964695F02FE367EC644A12E295461765040A0CA355F98D3CECD59D04B689B72DB2B31A3C52
1,556,800,837 UART: [art] SIG.S = D065A4ADF54D1901BC6F1C6028E4D06B474B006BE42CCBB04126CCC69349EC922878A1D06E24E57ED55E636364BD9D83
1,556,824,412 UART: Caliptra RT
1,556,824,755 UART: [state] CFI Enabled
1,557,188,243 UART: [rt] RT listening for mailbox commands...
1,557,188,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,559,679,697 >>> mbox cmd response: success
1,559,693,366 UART:
1,559,693,382 UART: Running Caliptra FMC ...
1,559,693,790 UART:
1,559,693,933 UART: [state] CFI Enabled
1,559,782,960 UART: [art] Extend RT PCRs Done
1,559,783,388 UART: [art] Lock RT PCRs Done
1,559,784,715 UART: [art] Populate DV Done
1,559,793,130 UART: [fht] FMC Alias Private Key: 7
1,559,794,086 UART: [art] Derive CDI
1,559,794,366 UART: [art] Store in slot 0x4
1,559,879,927 UART: [art] Derive Key Pair
1,559,880,287 UART: [art] Store priv key in slot 0x5
1,559,893,675 UART: [art] Derive Key Pair - Done
1,559,908,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,559,924,226 UART: [art] Erasing AUTHORITY.KEYID = 7
1,559,924,991 UART: [art] PUB.X = A74F0F356C1917D2E5800A06E9391582F96FD4B5DECF77E092C41F9383349A0931B597A5477EAC27F9A380128DDDD5EC
1,559,931,753 UART: [art] PUB.Y = 8BD017D621AF461F70680A0BD4E0FDA229CF905D773001DDEE99D27116ACD6C914DFFAF476A99D96E5D4C60EB6ED0C94
1,559,938,706 UART: [art] SIG.R = 27D0D2CDBAD7911B8BD6B0D4862E3EB4287065C384F94D6C689141D005BA0593C69053D6A85DB309DE29FBED7A0420D5
1,559,945,472 UART: [art] SIG.S = 99F04152AA88EEA4845462676342E282E8755BF5D32BA180BA9A142F19A563273334D15030F2F9E39F6C07F0CB5284C6
1,559,969,089 UART: Caliptra RT
1,559,969,432 UART: [state] CFI Enabled
1,560,330,294 UART: [rt] RT listening for mailbox commands...
1,560,330,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,562,822,738 >>> mbox cmd response: success
1,562,835,905 UART:
1,562,835,921 UART: Running Caliptra FMC ...
1,562,836,329 UART:
1,562,836,472 UART: [state] CFI Enabled
1,562,925,293 UART: [art] Extend RT PCRs Done
1,562,925,721 UART: [art] Lock RT PCRs Done
1,562,926,830 UART: [art] Populate DV Done
1,562,934,929 UART: [fht] FMC Alias Private Key: 7
1,562,935,941 UART: [art] Derive CDI
1,562,936,221 UART: [art] Store in slot 0x4
1,563,022,244 UART: [art] Derive Key Pair
1,563,022,604 UART: [art] Store priv key in slot 0x5
1,563,036,208 UART: [art] Derive Key Pair - Done
1,563,051,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,563,066,559 UART: [art] Erasing AUTHORITY.KEYID = 7
1,563,067,324 UART: [art] PUB.X = 264FC6D75DB3028147F4826C4457C1F4BDD1090D8AF6882D18E3C4E884CBAC70352769932A494A78542858116113C8D0
1,563,074,077 UART: [art] PUB.Y = 0E0A5E6196D939CC2387223E500140FE25C460776BE2F125049236649A2086343C117A8696F476F7148699E42E85BC49
1,563,080,997 UART: [art] SIG.R = 10BBDA96BA95C63FAB54DE964695F02FE367EC644A12E295461765040A0CA355F98D3CECD59D04B689B72DB2B31A3C52
1,563,087,765 UART: [art] SIG.S = D065A4ADF54D1901BC6F1C6028E4D06B474B006BE42CCBB04126CCC69349EC922878A1D06E24E57ED55E636364BD9D83
1,563,111,056 UART: Caliptra RT
1,563,111,399 UART: [state] CFI Enabled
1,563,472,769 UART: [rt] RT listening for mailbox commands...
1,563,473,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,565,963,291 >>> mbox cmd response: success
1,565,976,432 UART:
1,565,976,448 UART: Running Caliptra FMC ...
1,565,976,856 UART:
1,565,976,999 UART: [state] CFI Enabled
1,566,066,130 UART: [art] Extend RT PCRs Done
1,566,066,558 UART: [art] Lock RT PCRs Done
1,566,067,899 UART: [art] Populate DV Done
1,566,076,030 UART: [fht] FMC Alias Private Key: 7
1,566,077,052 UART: [art] Derive CDI
1,566,077,332 UART: [art] Store in slot 0x4
1,566,163,117 UART: [art] Derive Key Pair
1,566,163,477 UART: [art] Store priv key in slot 0x5
1,566,176,691 UART: [art] Derive Key Pair - Done
1,566,191,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,566,206,966 UART: [art] Erasing AUTHORITY.KEYID = 7
1,566,207,731 UART: [art] PUB.X = A74F0F356C1917D2E5800A06E9391582F96FD4B5DECF77E092C41F9383349A0931B597A5477EAC27F9A380128DDDD5EC
1,566,214,493 UART: [art] PUB.Y = 8BD017D621AF461F70680A0BD4E0FDA229CF905D773001DDEE99D27116ACD6C914DFFAF476A99D96E5D4C60EB6ED0C94
1,566,221,446 UART: [art] SIG.R = 27D0D2CDBAD7911B8BD6B0D4862E3EB4287065C384F94D6C689141D005BA0593C69053D6A85DB309DE29FBED7A0420D5
1,566,228,212 UART: [art] SIG.S = 99F04152AA88EEA4845462676342E282E8755BF5D32BA180BA9A142F19A563273334D15030F2F9E39F6C07F0CB5284C6
1,566,252,041 UART: Caliptra RT
1,566,252,384 UART: [state] CFI Enabled
1,566,618,828 UART: [rt] RT listening for mailbox commands...
1,566,619,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,569,108,908 >>> mbox cmd response: success
1,569,122,183 UART:
1,569,122,199 UART: Running Caliptra FMC ...
1,569,122,607 UART:
1,569,122,750 UART: [state] CFI Enabled
1,569,211,533 UART: [art] Extend RT PCRs Done
1,569,211,961 UART: [art] Lock RT PCRs Done
1,569,213,266 UART: [art] Populate DV Done
1,569,221,473 UART: [fht] FMC Alias Private Key: 7
1,569,222,463 UART: [art] Derive CDI
1,569,222,743 UART: [art] Store in slot 0x4
1,569,308,586 UART: [art] Derive Key Pair
1,569,308,946 UART: [art] Store priv key in slot 0x5
1,569,322,592 UART: [art] Derive Key Pair - Done
1,569,337,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,569,352,477 UART: [art] Erasing AUTHORITY.KEYID = 7
1,569,353,242 UART: [art] PUB.X = 264FC6D75DB3028147F4826C4457C1F4BDD1090D8AF6882D18E3C4E884CBAC70352769932A494A78542858116113C8D0
1,569,359,995 UART: [art] PUB.Y = 0E0A5E6196D939CC2387223E500140FE25C460776BE2F125049236649A2086343C117A8696F476F7148699E42E85BC49
1,569,366,915 UART: [art] SIG.R = 10BBDA96BA95C63FAB54DE964695F02FE367EC644A12E295461765040A0CA355F98D3CECD59D04B689B72DB2B31A3C52
1,569,373,683 UART: [art] SIG.S = D065A4ADF54D1901BC6F1C6028E4D06B474B006BE42CCBB04126CCC69349EC922878A1D06E24E57ED55E636364BD9D83
1,569,397,284 UART: Caliptra RT
1,569,397,627 UART: [state] CFI Enabled
1,569,764,313 UART: [rt] RT listening for mailbox commands...
1,569,764,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,572,255,859 >>> mbox cmd response: success
1,572,268,822 UART:
1,572,268,838 UART: Running Caliptra FMC ...
1,572,269,246 UART:
1,572,269,389 UART: [state] CFI Enabled
1,572,358,856 UART: [art] Extend RT PCRs Done
1,572,359,284 UART: [art] Lock RT PCRs Done
1,572,360,571 UART: [art] Populate DV Done
1,572,368,834 UART: [fht] FMC Alias Private Key: 7
1,572,369,972 UART: [art] Derive CDI
1,572,370,252 UART: [art] Store in slot 0x4
1,572,455,821 UART: [art] Derive Key Pair
1,572,456,181 UART: [art] Store priv key in slot 0x5
1,572,469,871 UART: [art] Derive Key Pair - Done
1,572,484,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,572,500,334 UART: [art] Erasing AUTHORITY.KEYID = 7
1,572,501,099 UART: [art] PUB.X = A74F0F356C1917D2E5800A06E9391582F96FD4B5DECF77E092C41F9383349A0931B597A5477EAC27F9A380128DDDD5EC
1,572,507,861 UART: [art] PUB.Y = 8BD017D621AF461F70680A0BD4E0FDA229CF905D773001DDEE99D27116ACD6C914DFFAF476A99D96E5D4C60EB6ED0C94
1,572,514,814 UART: [art] SIG.R = 27D0D2CDBAD7911B8BD6B0D4862E3EB4287065C384F94D6C689141D005BA0593C69053D6A85DB309DE29FBED7A0420D5
1,572,521,580 UART: [art] SIG.S = 99F04152AA88EEA4845462676342E282E8755BF5D32BA180BA9A142F19A563273334D15030F2F9E39F6C07F0CB5284C6
1,572,544,905 UART: Caliptra RT
1,572,545,248 UART: [state] CFI Enabled
1,572,907,394 UART: [rt] RT listening for mailbox commands...
1,572,908,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,575,398,796 >>> mbox cmd response: success
1,575,412,407 UART:
1,575,412,423 UART: Running Caliptra FMC ...
1,575,412,831 UART:
1,575,412,974 UART: [state] CFI Enabled
1,575,502,205 UART: [art] Extend RT PCRs Done
1,575,502,633 UART: [art] Lock RT PCRs Done
1,575,503,928 UART: [art] Populate DV Done
1,575,511,925 UART: [fht] FMC Alias Private Key: 7
1,575,512,947 UART: [art] Derive CDI
1,575,513,227 UART: [art] Store in slot 0x4
1,575,598,854 UART: [art] Derive Key Pair
1,575,599,214 UART: [art] Store priv key in slot 0x5
1,575,612,044 UART: [art] Derive Key Pair - Done
1,575,627,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
1,575,642,611 UART: [art] Erasing AUTHORITY.KEYID = 7
1,575,643,376 UART: [art] PUB.X = 264FC6D75DB3028147F4826C4457C1F4BDD1090D8AF6882D18E3C4E884CBAC70352769932A494A78542858116113C8D0
1,575,650,129 UART: [art] PUB.Y = 0E0A5E6196D939CC2387223E500140FE25C460776BE2F125049236649A2086343C117A8696F476F7148699E42E85BC49
1,575,657,049 UART: [art] SIG.R = 10BBDA96BA95C63FAB54DE964695F02FE367EC644A12E295461765040A0CA355F98D3CECD59D04B689B72DB2B31A3C52
1,575,663,817 UART: [art] SIG.S = D065A4ADF54D1901BC6F1C6028E4D06B474B006BE42CCBB04126CCC69349EC922878A1D06E24E57ED55E636364BD9D83
1,575,687,728 UART: Caliptra RT
1,575,688,071 UART: [state] CFI Enabled
1,576,050,305 UART: [rt] RT listening for mailbox commands...
test test_boot::test_stress_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 331.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,008 UART:
192,377 UART: Running Caliptra ROM ...
193,510 UART:
193,665 UART: [state] CFI Enabled
263,223 UART: [state] LifecycleState = Unprovisioned
265,136 UART: [state] DebugLocked = No
266,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,043 UART: [kat] SHA2-256
441,715 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,246 UART: [kat] ++
452,728 UART: [kat] sha1
463,109 UART: [kat] SHA2-256
465,768 UART: [kat] SHA2-384
471,975 UART: [kat] SHA2-512-ACC
474,346 UART: [kat] ECC-384
2,768,443 UART: [kat] HMAC-384Kdf
2,786,374 UART: [kat] LMS
3,976,699 UART: [kat] --
3,984,259 UART: [cold-reset] ++
3,985,281 UART: [fht] Storing FHT @ 0x50003400
3,996,971 UART: [idev] ++
3,997,533 UART: [idev] CDI.KEYID = 6
3,998,570 UART: [idev] SUBJECT.KEYID = 7
3,999,745 UART: [idev] UDS.KEYID = 0
4,000,884 ready_for_fw is high
4,001,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,150,306 UART: [idev] Erasing UDS.KEYID = 0
7,333,022 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,648 UART: [idev] --
7,357,153 UART: [ldev] ++
7,357,782 UART: [ldev] CDI.KEYID = 6
7,358,720 UART: [ldev] SUBJECT.KEYID = 5
7,359,949 UART: [ldev] AUTHORITY.KEYID = 7
7,361,185 UART: [ldev] FE.KEYID = 1
7,389,495 UART: [ldev] Erasing FE.KEYID = 1
10,720,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,030,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,045,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,056 UART: [ldev] --
13,085,582 UART: [fwproc] Waiting for Commands...
13,087,642 UART: [fwproc] Received command 0x46574c44
13,089,838 UART: [fwproc] Received Image of size 118548 bytes
17,195,571 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,266,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,340,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,668,531 >>> mbox cmd response: success
17,669,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,818,805 UART: [afmc] ++
17,819,449 UART: [afmc] CDI.KEYID = 6
17,820,367 UART: [afmc] SUBJECT.KEYID = 7
17,821,473 UART: [afmc] AUTHORITY.KEYID = 5
21,038,240 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,338,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,340,681 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,355,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,369,820 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,384,271 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,405,793 UART: [afmc] --
23,409,028 UART: [cold-reset] --
23,411,670 UART: [state] Locking Datavault
23,418,050 UART: [state] Locking PCR0, PCR1 and PCR31
23,419,774 UART: [state] Locking ICCM
23,421,581 UART: [exit] Launching FMC @ 0x40000130
23,429,972 UART:
23,430,205 UART: Running Caliptra FMC ...
23,431,232 UART:
23,431,376 UART: [state] CFI Enabled
23,495,605 UART: [fht] FMC Alias Private Key: 7
25,836,080 UART: [art] Extend RT PCRs Done
25,837,672 UART: [art] Lock RT PCRs Done
25,839,117 UART: [art] Populate DV Done
25,844,660 UART: [fht] FMC Alias Private Key: 7
25,846,303 UART: [art] Derive CDI
25,847,037 UART: [art] Store in slot 0x4
25,904,702 UART: [art] Derive Key Pair
25,905,791 UART: [art] Store priv key in slot 0x5
29,198,905 UART: [art] Derive Key Pair - Done
29,211,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,499,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,501,083 UART: [art] PUB.X = 7FEA8CD803BCA99C2EC65CFF9A3AC80EDC6ADDA88D91F66EBAB6A58080970207945558ECE5B434AE253305F6DC4A3771
31,508,334 UART: [art] PUB.Y = D0364247760568F4CDFE0C43494FD24A6F546C0BEEE39DD35F3697CA57312AD11285CCC65780A2423DA82D1191818E43
31,515,559 UART: [art] SIG.R = 5825EC80AD50486695C8E3DCE6DE5FF3A765989636928D289DBC514D1085A41C291561F25F738BD46975B2FD590D0052
31,522,951 UART: [art] SIG.S = 37BBB6CE82533C3653C65BFE2D782FEB7D71538E5F408588DB72162EE8D1947B75C0FF4666BC4A562ED279306F70230D
32,828,093 UART: Caliptra RT
32,828,809 UART: [state] CFI Enabled
33,005,805 UART: [rt] RT listening for mailbox commands...
33,009,043 UART:
33,009,221 UART: Running Caliptra ROM ...
33,010,334 UART:
33,010,495 UART: [state] CFI Enabled
33,078,651 UART: [state] LifecycleState = Unprovisioned
33,080,589 UART: [state] DebugLocked = No
33,082,277 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,087,788 UART: [kat] SHA2-256
33,257,473 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,267,989 UART: [kat] ++
33,268,442 UART: [kat] sha1
33,279,379 UART: [kat] SHA2-256
33,282,116 UART: [kat] SHA2-384
33,287,666 UART: [kat] SHA2-512-ACC
33,290,067 UART: [kat] ECC-384
35,582,223 UART: [kat] HMAC-384Kdf
35,613,732 UART: [kat] LMS
36,804,085 UART: [kat] --
36,808,366 UART: [update-reset] ++
41,009,198 UART: [update-reset] Image verified using Vendor ECC Key Index 0
41,012,326 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,410,043 >>> mbox cmd response: success
41,410,842 UART: [update-reset] Copying MAN_2 To MAN_1
41,433,312 UART: [update-reset Success] --
41,438,455 UART: [state] Locking Datavault
41,440,362 UART: [state] Locking PCR0, PCR1 and PCR31
41,442,123 UART: [state] Locking ICCM
41,444,598 UART: [exit] Launching FMC @ 0x40000130
41,452,990 UART:
41,453,223 UART: Running Caliptra FMC ...
41,454,268 UART:
41,454,419 UART: [state] CFI Enabled
41,555,247 UART: [art] Extend RT PCRs Done
41,556,577 UART: [art] Lock RT PCRs Done
41,557,749 UART: [art] Populate DV Done
41,563,325 UART: [fht] FMC Alias Private Key: 7
41,564,870 UART: [art] Derive CDI
41,565,601 UART: [art] Store in slot 0x4
41,624,098 UART: [art] Derive Key Pair
41,625,122 UART: [art] Store priv key in slot 0x5
44,917,655 UART: [art] Derive Key Pair - Done
44,930,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,218,448 UART: [art] Erasing AUTHORITY.KEYID = 7
47,219,959 UART: [art] PUB.X = 5ABC6447E9AD4C9ABC6A9CA944E9F303853BEB8D05D6F79EE520B4FC96D436CF6A41692F34FE8219F7CB66A1D85EDB9D
47,227,256 UART: [art] PUB.Y = 312EB890A290D017AA4CC0566569C7E719E46B9F5DBCD60A117B4BBEE7543EFD60615CC66FF456D46DFCEE2D23E248A6
47,234,538 UART: [art] SIG.R = 2C71A5725B17C502D10AEC9903615AC6EF0AA1569C1E5F23E4D4E023CB19A9320D59FD5D7B00AF223080075D9021BA55
47,241,964 UART: [art] SIG.S = E687AB0D5232682480C24F15611338362776B7268D79808A7802C8F0106666454AEC5EA9EDAD01F4163019F7936A2061
48,547,294 UART: Caliptra RT
48,548,000 UART: [state] CFI Enabled
48,961,272 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,804,187 ready_for_fw is high
3,804,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,394 >>> mbox cmd response: success
17,962,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,654,586 UART:
23,654,983 UART: Running Caliptra FMC ...
23,656,117 UART:
23,656,283 UART: [state] CFI Enabled
23,725,435 UART: [fht] FMC Alias Private Key: 7
26,065,753 UART: [art] Extend RT PCRs Done
26,066,973 UART: [art] Lock RT PCRs Done
26,068,708 UART: [art] Populate DV Done
26,074,255 UART: [fht] FMC Alias Private Key: 7
26,075,693 UART: [art] Derive CDI
26,076,600 UART: [art] Store in slot 0x4
26,134,498 UART: [art] Derive Key Pair
26,135,537 UART: [art] Store priv key in slot 0x5
29,428,813 UART: [art] Derive Key Pair - Done
29,441,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,186 UART: [art] PUB.X = 69CCAE012BC9EA23527263EA3F094F65FFAA646242BAA52F07CA4C541A65BF0C85C35F26324EA5EF238906EA8841A913
31,739,544 UART: [art] PUB.Y = D8DA3F8C4E89ACD99FC613BD39C8AD50BEF647E745521FFFD63B0797F2577E434BED1D75C4CF604E18B99591D4DA65DF
31,746,771 UART: [art] SIG.R = FDADC95A5AC4D14EA90A1C0FAE597C39924B351B4B33BECE9EFFEF4D2E9F9CA22D4A154510011FB3AC70E364C7160122
31,754,189 UART: [art] SIG.S = 78FC2AD31EDFB76C1ED522F9000281A6BF2D00BB7948F68CC85BEB1AF4D5F5B85A7FCFD1CD1293F6C7AB90D1734A677F
33,060,304 UART: Caliptra RT
33,061,022 UART: [state] CFI Enabled
33,238,487 UART: [rt] RT listening for mailbox commands...
41,921,581 >>> mbox cmd response: success
41,957,407 UART:
41,957,688 UART: Running Caliptra FMC ...
41,958,722 UART:
41,958,874 UART: [state] CFI Enabled
42,062,216 UART: [art] Extend RT PCRs Done
42,063,422 UART: [art] Lock RT PCRs Done
42,065,177 UART: [art] Populate DV Done
42,070,807 UART: [fht] FMC Alias Private Key: 7
42,072,483 UART: [art] Derive CDI
42,073,227 UART: [art] Store in slot 0x4
42,131,252 UART: [art] Derive Key Pair
42,132,290 UART: [art] Store priv key in slot 0x5
45,424,595 UART: [art] Derive Key Pair - Done
45,437,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,725,833 UART: [art] Erasing AUTHORITY.KEYID = 7
47,727,346 UART: [art] PUB.X = DA5962C87BE53B7CCF04BF08245DE0E23D41583C5F50FDC5D3AF6E95AA70B483BF4FDF05C636242E43687320FA80FEC2
47,734,613 UART: [art] PUB.Y = 41968C3D2786FB46E7E374B0DC9FF01D631A3B64F589CF32D57214017D61D9B52B40217E4BFE8929DA0D5BED06CA4F8B
47,741,898 UART: [art] SIG.R = 958F780493E5BA97B2F191B145695ABFAB51346C4988025F2787A71FC2B43EA4236EB865643495F208EE916FAB821C27
47,749,238 UART: [art] SIG.S = FF4744F1820394BA8A415BCEF6997251E1C9C3B052447B3E125D27510F9DEB0EE9CE7AAA5ACC07EE071FC1ECB4F00F27
49,054,207 UART: Caliptra RT
49,054,918 UART: [state] CFI Enabled
49,471,412 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,462 UART:
192,818 UART: Running Caliptra ROM ...
193,897 UART:
603,512 UART: [state] CFI Enabled
619,397 UART: [state] LifecycleState = Unprovisioned
621,281 UART: [state] DebugLocked = No
622,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,805 UART: [kat] SHA2-256
796,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,100 UART: [kat] ++
807,541 UART: [kat] sha1
818,623 UART: [kat] SHA2-256
821,335 UART: [kat] SHA2-384
826,923 UART: [kat] SHA2-512-ACC
829,303 UART: [kat] ECC-384
3,114,690 UART: [kat] HMAC-384Kdf
3,126,601 UART: [kat] LMS
4,316,737 UART: [kat] --
4,321,827 UART: [cold-reset] ++
4,324,466 UART: [fht] Storing FHT @ 0x50003400
4,335,809 UART: [idev] ++
4,336,441 UART: [idev] CDI.KEYID = 6
4,337,354 UART: [idev] SUBJECT.KEYID = 7
4,338,587 UART: [idev] UDS.KEYID = 0
4,339,657 ready_for_fw is high
4,339,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,848 UART: [idev] Erasing UDS.KEYID = 0
7,625,184 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,911 UART: [idev] --
7,651,686 UART: [ldev] ++
7,652,326 UART: [ldev] CDI.KEYID = 6
7,653,205 UART: [ldev] SUBJECT.KEYID = 5
7,654,469 UART: [ldev] AUTHORITY.KEYID = 7
7,655,695 UART: [ldev] FE.KEYID = 1
7,665,502 UART: [ldev] Erasing FE.KEYID = 1
10,949,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,148 UART: [ldev] --
13,310,012 UART: [fwproc] Waiting for Commands...
13,313,357 UART: [fwproc] Received command 0x46574c44
13,315,532 UART: [fwproc] Received Image of size 118548 bytes
17,416,263 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,485,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,558,909 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,887,546 >>> mbox cmd response: success
17,888,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,037,854 UART: [afmc] ++
18,038,515 UART: [afmc] CDI.KEYID = 6
18,039,436 UART: [afmc] SUBJECT.KEYID = 7
18,040,540 UART: [afmc] AUTHORITY.KEYID = 5
21,208,407 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,502,108 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,504,360 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,533,544 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,950 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,570,222 UART: [afmc] --
23,574,514 UART: [cold-reset] --
23,578,154 UART: [state] Locking Datavault
23,581,689 UART: [state] Locking PCR0, PCR1 and PCR31
23,583,438 UART: [state] Locking ICCM
23,585,051 UART: [exit] Launching FMC @ 0x40000130
23,593,444 UART:
23,593,673 UART: Running Caliptra FMC ...
23,594,769 UART:
23,594,920 UART: [state] CFI Enabled
23,603,069 UART: [fht] FMC Alias Private Key: 7
25,942,762 UART: [art] Extend RT PCRs Done
25,943,984 UART: [art] Lock RT PCRs Done
25,945,598 UART: [art] Populate DV Done
25,951,025 UART: [fht] FMC Alias Private Key: 7
25,952,669 UART: [art] Derive CDI
25,953,401 UART: [art] Store in slot 0x4
25,996,097 UART: [art] Derive Key Pair
25,997,091 UART: [art] Store priv key in slot 0x5
29,239,324 UART: [art] Derive Key Pair - Done
29,252,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,427 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,928 UART: [art] PUB.X = ECAC96496BC0BD492E68F1CCE03A86AF888DE23C963209BB26C1D46EA40576D3D069FEBA734683CF1F81FADEE87FD20B
31,541,216 UART: [art] PUB.Y = 664D2A4C1D8184F4CC1EE197C0FAB348E4242E9213A457A684FA419EB401AE202DF88EA60B34CB2BF56C8AB3F3029D5B
31,548,480 UART: [art] SIG.R = CA5B3AF274D0C9FBDA6AC511F34EFA52407A44B4E01E2FBE02B5DCDF05690133650CCE6C364D32C216504A955D1A0D91
31,555,875 UART: [art] SIG.S = 574C0FEBEEDE3EB14E2A42DCD98588E047A1053DD59AB3891DABE98F5BBF13182CC241BEFDD015C09C948E3D9FE45874
32,861,519 UART: Caliptra RT
32,862,229 UART: [state] CFI Enabled
32,995,242 UART: [rt] RT listening for mailbox commands...
32,998,088 UART:
32,998,254 UART: Running Caliptra ROM ...
32,999,354 UART:
32,999,726 UART: [state] CFI Enabled
33,012,004 UART: [state] LifecycleState = Unprovisioned
33,013,882 UART: [state] DebugLocked = No
33,015,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,020,681 UART: [kat] SHA2-256
33,190,407 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,200,924 UART: [kat] ++
33,201,370 UART: [kat] sha1
33,212,790 UART: [kat] SHA2-256
33,215,474 UART: [kat] SHA2-384
33,222,369 UART: [kat] SHA2-512-ACC
33,224,705 UART: [kat] ECC-384
35,508,791 UART: [kat] HMAC-384Kdf
35,521,221 UART: [kat] LMS
36,711,279 UART: [kat] --
36,715,480 UART: [update-reset] ++
40,909,745 UART: [update-reset] Image verified using Vendor ECC Key Index 0
40,912,926 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
41,310,649 >>> mbox cmd response: success
41,311,920 UART: [update-reset] Copying MAN_2 To MAN_1
41,334,307 UART: [update-reset Success] --
41,338,964 UART: [state] Locking Datavault
41,343,453 UART: [state] Locking PCR0, PCR1 and PCR31
41,345,200 UART: [state] Locking ICCM
41,347,697 UART: [exit] Launching FMC @ 0x40000130
41,356,138 UART:
41,356,363 UART: Running Caliptra FMC ...
41,357,383 UART:
41,357,526 UART: [state] CFI Enabled
41,401,646 UART: [art] Extend RT PCRs Done
41,402,832 UART: [art] Lock RT PCRs Done
41,404,308 UART: [art] Populate DV Done
41,409,869 UART: [fht] FMC Alias Private Key: 7
41,411,450 UART: [art] Derive CDI
41,412,253 UART: [art] Store in slot 0x4
41,454,729 UART: [art] Derive Key Pair
41,455,732 UART: [art] Store priv key in slot 0x5
44,697,873 UART: [art] Derive Key Pair - Done
44,711,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,991,688 UART: [art] Erasing AUTHORITY.KEYID = 7
46,993,195 UART: [art] PUB.X = 9D9F347AA19E7846DA998DBF5E0C97812B656FAA68CA73990EFA7B2354034403242BEEEDEA8CFDECAAE236783B7AA9BA
47,000,432 UART: [art] PUB.Y = 509F4A85875E324E2D8F70E338C526447E56F79B982DA9DFC930168C55DF525766E74B99216C84B39CDBB597C9CA310B
47,007,719 UART: [art] SIG.R = 31025170A752FB4B03E0DAC3E398C42A559B6CD016AD95698C58AC2B8A480AC438DF2B652FA1B9735C085BF5FBCD9601
47,015,103 UART: [art] SIG.S = 4C5D53B9E885CA891E476D6A3D962A52E2188CF32965DCBCC1FD03792E5AE437FEB75F733481BEAABFE455616266790C
48,320,772 UART: Caliptra RT
48,321,485 UART: [state] CFI Enabled
48,696,573 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,129,274 ready_for_fw is high
4,129,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,145,046 >>> mbox cmd response: success
18,146,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,790,464 UART:
23,790,866 UART: Running Caliptra FMC ...
23,791,976 UART:
23,792,125 UART: [state] CFI Enabled
23,800,054 UART: [fht] FMC Alias Private Key: 7
26,139,583 UART: [art] Extend RT PCRs Done
26,140,807 UART: [art] Lock RT PCRs Done
26,142,510 UART: [art] Populate DV Done
26,148,036 UART: [fht] FMC Alias Private Key: 7
26,149,710 UART: [art] Derive CDI
26,150,448 UART: [art] Store in slot 0x4
26,193,311 UART: [art] Derive Key Pair
26,194,306 UART: [art] Store priv key in slot 0x5
29,435,948 UART: [art] Derive Key Pair - Done
29,448,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,404 UART: [art] PUB.X = 6EDBDEB9C9B8C593372AE84B0477F373881C737DDAFDBA9DCAB8D2DDE2685A34F2D085B17CF44A8EEC1219830B249085
31,737,706 UART: [art] PUB.Y = A3558A178E2C3DA92844109C8A16709EFBC7B3F9ABEC0F06B15091ED0DE6E6DB2DE043C49262D0A96D6067F6D893D917
31,745,000 UART: [art] SIG.R = 0AD8FC6813D5D83E7DC8BDB6DF67CD34B0BFB2A554041D86FAFF40B0ADEE7C418F14F67A65715DFF765516E38AD7ED1F
31,752,403 UART: [art] SIG.S = 057482B426E0F47CA22720D583A74F28EC9FD39A8DCDD2E9B4CF872B0200866E6862ACA5BA043C697A55F5ACDEA6EF7D
33,057,148 UART: Caliptra RT
33,057,868 UART: [state] CFI Enabled
33,191,528 UART: [rt] RT listening for mailbox commands...
41,792,779 >>> mbox cmd response: success
41,827,449 UART:
41,827,763 UART: Running Caliptra FMC ...
41,828,799 UART:
41,828,944 UART: [state] CFI Enabled
41,873,125 UART: [art] Extend RT PCRs Done
41,874,267 UART: [art] Lock RT PCRs Done
41,875,901 UART: [art] Populate DV Done
41,881,194 UART: [fht] FMC Alias Private Key: 7
41,883,159 UART: [art] Derive CDI
41,883,913 UART: [art] Store in slot 0x4
41,926,638 UART: [art] Derive Key Pair
41,927,639 UART: [art] Store priv key in slot 0x5
45,169,721 UART: [art] Derive Key Pair - Done
45,183,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,463,442 UART: [art] Erasing AUTHORITY.KEYID = 7
47,464,954 UART: [art] PUB.X = 18BABD84D5EAE8C8B4009765DFAE2987B06193F682C57BF62B7B96CD19175A03D3BE5D0879553E8437A10566074DACC5
47,472,203 UART: [art] PUB.Y = 152D367BE83AE17134824F1E474664D36AC851248CE7D73147F342EBCDA4CC0CDE606E77BD54810B0CBCBD5EEE1BAD24
47,479,457 UART: [art] SIG.R = F6CB0DD619F1C4D775DD7574243A3A5EA0A6E047ECC300B7B2FC54DC8C4C0118EAC55CF6FF350BA99821F1184B66760E
47,486,885 UART: [art] SIG.S = E7C5FF47633DD6B05643A2D92848E342576338D25F80FEA7312AF4B2E002C8F44983601D415FC3D16C160B315825CBA0
48,792,032 UART: Caliptra RT
48,792,750 UART: [state] CFI Enabled
49,169,804 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,065 UART:
192,445 UART: Running Caliptra ROM ...
193,556 UART:
193,701 UART: [state] CFI Enabled
262,828 UART: [state] LifecycleState = Unprovisioned
264,797 UART: [state] DebugLocked = No
266,544 UART: [state] WD Timer not started. Device not locked for debugging
269,653 UART: [kat] SHA2-256
449,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,079 UART: [kat] ++
460,556 UART: [kat] sha1
471,498 UART: [kat] SHA2-256
474,220 UART: [kat] SHA2-384
479,276 UART: [kat] SHA2-512-ACC
481,636 UART: [kat] ECC-384
2,926,855 UART: [kat] HMAC-384Kdf
2,952,353 UART: [kat] LMS
3,428,817 UART: [kat] --
3,433,345 UART: [cold-reset] ++
3,435,498 UART: [fht] FHT @ 0x50003400
3,446,281 UART: [idev] ++
3,446,851 UART: [idev] CDI.KEYID = 6
3,447,760 UART: [idev] SUBJECT.KEYID = 7
3,448,998 UART: [idev] UDS.KEYID = 0
3,450,038 ready_for_fw is high
3,450,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,847 UART: [idev] Erasing UDS.KEYID = 0
5,966,128 UART: [idev] Sha1 KeyId Algorithm
5,989,530 UART: [idev] --
5,994,227 UART: [ldev] ++
5,994,844 UART: [ldev] CDI.KEYID = 6
5,995,722 UART: [ldev] SUBJECT.KEYID = 5
5,996,979 UART: [ldev] AUTHORITY.KEYID = 7
5,998,154 UART: [ldev] FE.KEYID = 1
6,037,794 UART: [ldev] Erasing FE.KEYID = 1
8,548,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,216 UART: [ldev] --
10,356,430 UART: [fwproc] Wait for Commands...
10,358,364 UART: [fwproc] Recv command 0x46574c44
10,360,401 UART: [fwproc] Recv'd Img size: 118548 bytes
13,847,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,508 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,329,628 >>> mbox cmd response: success
14,334,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,484,242 UART: [afmc] ++
14,484,919 UART: [afmc] CDI.KEYID = 6
14,485,854 UART: [afmc] SUBJECT.KEYID = 7
14,486,966 UART: [afmc] AUTHORITY.KEYID = 5
16,875,478 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,193 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,990 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,033 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,591 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,670,638 UART: [afmc] --
18,674,871 UART: [cold-reset] --
18,677,874 UART: [state] Locking Datavault
18,681,388 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,137 UART: [state] Locking ICCM
18,685,783 UART: [exit] Launching FMC @ 0x40000130
18,694,178 UART:
18,694,408 UART: Running Caliptra FMC ...
18,695,508 UART:
18,695,667 UART: [state] CFI Enabled
18,755,402 UART: [fht] FMC Alias Private Key: 7
20,521,583 UART: [art] Extend RT PCRs Done
20,522,823 UART: [art] Lock RT PCRs Done
20,524,422 UART: [art] Populate DV Done
20,530,161 UART: [fht] FMC Alias Private Key: 7
20,531,750 UART: [art] Derive CDI
20,532,565 UART: [art] Store in slot 0x4
20,589,105 UART: [art] Derive Key Pair
20,590,139 UART: [art] Store priv key in slot 0x5
23,052,747 UART: [art] Derive Key Pair - Done
23,065,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,904 UART: [art] PUB.X = 6F7A25B59AE97194113A83FA17888A382D19B84B0EFB0FA303BA3ACBCB4009443AEA1029B1B5F27885430746BE4B6ED6
24,787,204 UART: [art] PUB.Y = 3936B566A5C559EA116598576BDBD42BFF2AE4024D9FFDE1D69AB2E4FDDF27C64F89363B121D5B230C70E95DFD57B16C
24,794,490 UART: [art] SIG.R = 10EDD666823C975DA9D2C596D5787CDB6CEA62FDBE4A8F0100BCE6E6D93910D3E9262432AFD1320D4B6FF34468B8C387
24,801,878 UART: [art] SIG.S = C25B6C74EB6DE783A20F80D4F80F7DEEA81AAE02D9BA7523BC2C796879EF8BEAB54F76F076053C3FC9380E3565C018FA
25,781,260 UART: Caliptra RT
25,781,955 UART: [state] CFI Enabled
25,963,295 UART: [rt] RT listening for mailbox commands...
25,966,414 UART:
25,966,580 UART: Running Caliptra ROM ...
25,967,685 UART:
25,967,840 UART: [state] CFI Enabled
26,036,474 UART: [state] LifecycleState = Unprovisioned
26,038,450 UART: [state] DebugLocked = No
26,040,750 UART: [state] WD Timer not started. Device not locked for debugging
26,043,844 UART: [kat] SHA2-256
26,223,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,234,302 UART: [kat] ++
26,234,836 UART: [kat] sha1
26,245,725 UART: [kat] SHA2-256
26,248,418 UART: [kat] SHA2-384
26,253,104 UART: [kat] SHA2-512-ACC
26,255,502 UART: [kat] ECC-384
28,719,789 UART: [kat] HMAC-384Kdf
28,742,439 UART: [kat] LMS
29,218,858 UART: [kat] --
29,224,347 UART: [update-reset] ++
32,725,382 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,729,287 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,126,941 >>> mbox cmd response: success
33,128,731 UART: [update-reset] Copying MAN_2 To MAN_1
33,165,861 UART: [update-reset Success] --
33,169,560 UART: [state] Locking Datavault
33,172,442 UART: [state] Locking PCR0, PCR1 and PCR31
33,174,198 UART: [state] Locking ICCM
33,175,241 UART: [exit] Launching FMC @ 0x40000130
33,183,630 UART:
33,183,869 UART: Running Caliptra FMC ...
33,184,963 UART:
33,185,124 UART: [state] CFI Enabled
33,277,114 UART: [art] Extend RT PCRs Done
33,278,292 UART: [art] Lock RT PCRs Done
33,279,850 UART: [art] Populate DV Done
33,285,417 UART: [fht] FMC Alias Private Key: 7
33,287,012 UART: [art] Derive CDI
33,287,824 UART: [art] Store in slot 0x4
33,346,369 UART: [art] Derive Key Pair
33,347,407 UART: [art] Store priv key in slot 0x5
35,810,159 UART: [art] Derive Key Pair - Done
35,823,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,547,197 UART: [art] Erasing AUTHORITY.KEYID = 7
37,548,704 UART: [art] PUB.X = 95A9238573A9C1F105960F3ABF8BB73E0CC1F07A8240E948804AFCC16B642B440B1B29ED93CC3F13B3BBDA4818CC251A
37,555,959 UART: [art] PUB.Y = 91B82EA1AD4938AF73DFCF365FFD4BAB4C47B26F9C748C35A24AAF60F4D41CCC3C19315FA2FE4F967020FB0532602E34
37,563,255 UART: [art] SIG.R = 370FB39F625BCABC9B484AD5B57F0B0F97BF7455F22779161A26B03255908D8432A939DDAED26B90F8624A45438E8653
37,570,649 UART: [art] SIG.S = 8C8F5CDF80C188253DDBBC2B62CF01C687585B3C38616AC79BB42AB2F6A9AA0E708C65EE8EFC02281B586543AB82812D
38,549,865 UART: Caliptra RT
38,550,566 UART: [state] CFI Enabled
38,966,538 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,458,648 ready_for_fw is high
3,459,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,465 >>> mbox cmd response: success
14,243,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,537,784 UART:
18,538,193 UART: Running Caliptra FMC ...
18,539,333 UART:
18,539,494 UART: [state] CFI Enabled
18,603,344 UART: [fht] FMC Alias Private Key: 7
20,391,055 UART: [art] Extend RT PCRs Done
20,392,280 UART: [art] Lock RT PCRs Done
20,393,744 UART: [art] Populate DV Done
20,399,060 UART: [fht] FMC Alias Private Key: 7
20,400,700 UART: [art] Derive CDI
20,401,529 UART: [art] Store in slot 0x4
20,457,324 UART: [art] Derive Key Pair
20,458,323 UART: [art] Store priv key in slot 0x5
22,921,144 UART: [art] Derive Key Pair - Done
22,934,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,648,934 UART: [art] PUB.X = 17257A54FCE464B7745856C24A1578ED689FFB0C23612F14ECE68A6109A12C0C2D541F5A90C25CACA3BF2DD34B66A0C5
24,656,185 UART: [art] PUB.Y = 4760845519A2E404EBCDD840C09F8ACBCB38B15966269F0E89FD23FFBBAC6EC99990100ECA0A2157AD23A0818538DFB6
24,663,473 UART: [art] SIG.R = 8C79DB376767E0D41C8CAC522CF4CD26995249F5BB33FA35C7EBAC0B2F5B7372A04A70860FFE3D7128D77043C484C403
24,670,866 UART: [art] SIG.S = BD3EDD2CD9B43F94AD03A4BF066394CC87BDF9D9405382254A458E2964E704288D59DC9BD81F734198F0EC4C557CC304
25,649,490 UART: Caliptra RT
25,650,195 UART: [state] CFI Enabled
25,831,060 UART: [rt] RT listening for mailbox commands...
32,996,101 >>> mbox cmd response: success
33,030,393 UART:
33,030,667 UART: Running Caliptra FMC ...
33,031,783 UART:
33,031,966 UART: [state] CFI Enabled
33,121,618 UART: [art] Extend RT PCRs Done
33,122,808 UART: [art] Lock RT PCRs Done
33,124,103 UART: [art] Populate DV Done
33,129,503 UART: [fht] FMC Alias Private Key: 7
33,131,043 UART: [art] Derive CDI
33,131,810 UART: [art] Store in slot 0x4
33,191,174 UART: [art] Derive Key Pair
33,192,166 UART: [art] Store priv key in slot 0x5
35,654,510 UART: [art] Derive Key Pair - Done
35,667,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,380,460 UART: [art] Erasing AUTHORITY.KEYID = 7
37,381,965 UART: [art] PUB.X = 5C03988FA003DCA2276452D41C500AA7E847F99BD1FEDF19288110C52E84E4407B8E96CC40495EFA8B14DA2753D725D0
37,389,239 UART: [art] PUB.Y = E56EC76A7C4935C7A4DBD0F1B174B5176E2D12F9C7A9B3409246A10A3A0731CDDB32DB4F31122CB7113B5FE9370A02D0
37,396,487 UART: [art] SIG.R = 425F09DDE1C30504512BE805EC2304D2A2406855B3B20A23118E54713469092C5974850D2FA53D34DAB250ADE5E9C928
37,403,843 UART: [art] SIG.S = 03033A74B2785241663BC866983E84A33E769299B7D1E0F398F0BEDAEB3C9132DAA7512CAC7541487EF0899F9E864E65
38,382,673 UART: Caliptra RT
38,383,390 UART: [state] CFI Enabled
38,803,079 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,380 UART:
192,739 UART: Running Caliptra ROM ...
193,854 UART:
603,678 UART: [state] CFI Enabled
616,305 UART: [state] LifecycleState = Unprovisioned
618,252 UART: [state] DebugLocked = No
620,497 UART: [state] WD Timer not started. Device not locked for debugging
624,465 UART: [kat] SHA2-256
804,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,874 UART: [kat] ++
815,353 UART: [kat] sha1
825,239 UART: [kat] SHA2-256
827,969 UART: [kat] SHA2-384
833,250 UART: [kat] SHA2-512-ACC
835,619 UART: [kat] ECC-384
3,279,443 UART: [kat] HMAC-384Kdf
3,291,213 UART: [kat] LMS
3,767,758 UART: [kat] --
3,771,395 UART: [cold-reset] ++
3,773,392 UART: [fht] FHT @ 0x50003400
3,785,646 UART: [idev] ++
3,786,219 UART: [idev] CDI.KEYID = 6
3,787,203 UART: [idev] SUBJECT.KEYID = 7
3,788,378 UART: [idev] UDS.KEYID = 0
3,789,449 ready_for_fw is high
3,789,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,667 UART: [idev] Erasing UDS.KEYID = 0
6,266,216 UART: [idev] Sha1 KeyId Algorithm
6,289,244 UART: [idev] --
6,293,726 UART: [ldev] ++
6,294,296 UART: [ldev] CDI.KEYID = 6
6,295,209 UART: [ldev] SUBJECT.KEYID = 5
6,296,420 UART: [ldev] AUTHORITY.KEYID = 7
6,297,647 UART: [ldev] FE.KEYID = 1
6,309,426 UART: [ldev] Erasing FE.KEYID = 1
8,789,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,003 UART: [ldev] --
10,587,872 UART: [fwproc] Wait for Commands...
10,589,801 UART: [fwproc] Recv command 0x46574c44
10,591,785 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,815 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,442 >>> mbox cmd response: success
14,570,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,720,030 UART: [afmc] ++
14,720,676 UART: [afmc] CDI.KEYID = 6
14,721,760 UART: [afmc] SUBJECT.KEYID = 7
14,722,891 UART: [afmc] AUTHORITY.KEYID = 5
17,078,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,801,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,819,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,835,945 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,876,153 UART: [afmc] --
18,880,276 UART: [cold-reset] --
18,885,551 UART: [state] Locking Datavault
18,890,095 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,802 UART: [state] Locking ICCM
18,894,442 UART: [exit] Launching FMC @ 0x40000130
18,902,840 UART:
18,903,087 UART: Running Caliptra FMC ...
18,904,195 UART:
18,904,376 UART: [state] CFI Enabled
18,912,212 UART: [fht] FMC Alias Private Key: 7
20,678,737 UART: [art] Extend RT PCRs Done
20,679,955 UART: [art] Lock RT PCRs Done
20,681,690 UART: [art] Populate DV Done
20,687,208 UART: [fht] FMC Alias Private Key: 7
20,688,801 UART: [art] Derive CDI
20,689,617 UART: [art] Store in slot 0x4
20,732,443 UART: [art] Derive Key Pair
20,733,481 UART: [art] Store priv key in slot 0x5
23,160,180 UART: [art] Derive Key Pair - Done
23,173,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,536 UART: [art] Erasing AUTHORITY.KEYID = 7
24,881,043 UART: [art] PUB.X = 8672FFAF147D73C472B3E5B830A72C6CEF3F26286FCE7119EA888349E9B3B71789205847C9C70CFD239F9AB5A1196A81
24,888,346 UART: [art] PUB.Y = 7177986207470D2FEEE96A1878149ABFCB00455A364219F7AEC5217331100957E53BD642A1E579D9356B68F7E0D46B56
24,895,572 UART: [art] SIG.R = F47D07A2063A58A451808CE2AB895BFE89775EBE578E9427F339966A149677FF2717D7A15892014F6FE2F356AA393ED4
24,902,930 UART: [art] SIG.S = 4FEED918724D050875A9EAF7ABEAB6297E665BF6F49615536079DA7C4554C36ECE35CF21ECF5D8BE2DBB6A0946103F98
25,882,204 UART: Caliptra RT
25,882,932 UART: [state] CFI Enabled
26,016,165 UART: [rt] RT listening for mailbox commands...
26,018,957 UART:
26,019,161 UART: Running Caliptra ROM ...
26,020,276 UART:
26,020,552 UART: [state] CFI Enabled
26,034,173 UART: [state] LifecycleState = Unprovisioned
26,036,061 UART: [state] DebugLocked = No
26,037,933 UART: [state] WD Timer not started. Device not locked for debugging
26,041,462 UART: [kat] SHA2-256
26,221,217 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,232,002 UART: [kat] ++
26,232,685 UART: [kat] sha1
26,242,724 UART: [kat] SHA2-256
26,245,453 UART: [kat] SHA2-384
26,252,232 UART: [kat] SHA2-512-ACC
26,254,594 UART: [kat] ECC-384
28,698,853 UART: [kat] HMAC-384Kdf
28,710,805 UART: [kat] LMS
29,187,296 UART: [kat] --
29,190,528 UART: [update-reset] ++
32,689,491 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
32,693,034 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,090,644 >>> mbox cmd response: success
33,091,763 UART: [update-reset] Copying MAN_2 To MAN_1
33,128,903 UART: [update-reset Success] --
33,133,599 UART: [state] Locking Datavault
33,137,177 UART: [state] Locking PCR0, PCR1 and PCR31
33,138,884 UART: [state] Locking ICCM
33,140,749 UART: [exit] Launching FMC @ 0x40000130
33,149,113 UART:
33,149,352 UART: Running Caliptra FMC ...
33,150,453 UART:
33,150,610 UART: [state] CFI Enabled
33,194,574 UART: [art] Extend RT PCRs Done
33,195,762 UART: [art] Lock RT PCRs Done
33,197,111 UART: [art] Populate DV Done
33,202,574 UART: [fht] FMC Alias Private Key: 7
33,204,066 UART: [art] Derive CDI
33,204,977 UART: [art] Store in slot 0x4
33,247,631 UART: [art] Derive Key Pair
33,248,634 UART: [art] Store priv key in slot 0x5
35,675,418 UART: [art] Derive Key Pair - Done
35,688,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,394,632 UART: [art] Erasing AUTHORITY.KEYID = 7
37,396,129 UART: [art] PUB.X = 98FEA938F1184F080CD8CC9F609A5971E84BA2BCBDB0F53E4C1F384820519E6707FA69BEC32EFF3F8CEB4881A95D94D2
37,403,452 UART: [art] PUB.Y = 700D56261F914970018A2D572999ACBFC905EF64D25EA50A5D0367505ACDF865B91E18238128C67134FD060DEC2BD28F
37,410,687 UART: [art] SIG.R = 64E987AA0A50D3B08708AF4FBF37685DEB50CEE3F87AABC042D9D81DF2F450873786549278FE822652E25A1482188904
37,418,085 UART: [art] SIG.S = A2F391CF50E5740B64BEB5D2474764EBDE5EEC5185CADE631F120E9AF57B27CD849E10077FC1AE25F1DE727CDD756B6D
38,397,327 UART: Caliptra RT
38,398,035 UART: [state] CFI Enabled
38,771,726 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,773,426 ready_for_fw is high
3,774,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,491 >>> mbox cmd response: success
14,452,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,697,666 UART:
18,698,054 UART: Running Caliptra FMC ...
18,699,292 UART:
18,699,465 UART: [state] CFI Enabled
18,707,212 UART: [fht] FMC Alias Private Key: 7
20,473,893 UART: [art] Extend RT PCRs Done
20,475,118 UART: [art] Lock RT PCRs Done
20,476,744 UART: [art] Populate DV Done
20,482,066 UART: [fht] FMC Alias Private Key: 7
20,483,707 UART: [art] Derive CDI
20,484,533 UART: [art] Store in slot 0x4
20,527,564 UART: [art] Derive Key Pair
20,528,619 UART: [art] Store priv key in slot 0x5
22,955,727 UART: [art] Derive Key Pair - Done
22,968,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,862 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,359 UART: [art] PUB.X = F12DB3ADF5747B03EC8AD424071119AAB113A1EA652B3FA5CCE76382AE32BB1BB98B05F658993B25F1A7B9BE65A583BD
24,683,675 UART: [art] PUB.Y = 8A6481CCEA44D663833369F7B7D8B0916BF509477EDD10FEDA0A0DD7707C24577AFFE78AED07B791287A339F05D94ED5
24,690,915 UART: [art] SIG.R = 92E3211095FB5FC6236241B41C84019CF5F72F63259FB0F9F78C2C75680F8A02D078ED5A22FE703E95A9E81686F8C6EE
24,698,322 UART: [art] SIG.S = CB9CBD0599D6055C4440109C14C17374A4D57F8569035B0FEFD05728D6CB4BCFE848DBCABAE7F26C5A83B5024E83F434
25,676,803 UART: Caliptra RT
25,677,510 UART: [state] CFI Enabled
25,811,611 UART: [rt] RT listening for mailbox commands...
32,888,940 >>> mbox cmd response: success
32,923,765 UART:
32,924,041 UART: Running Caliptra FMC ...
32,925,161 UART:
32,925,325 UART: [state] CFI Enabled
32,969,080 UART: [art] Extend RT PCRs Done
32,970,273 UART: [art] Lock RT PCRs Done
32,971,409 UART: [art] Populate DV Done
32,976,658 UART: [fht] FMC Alias Private Key: 7
32,978,266 UART: [art] Derive CDI
32,979,089 UART: [art] Store in slot 0x4
33,021,656 UART: [art] Derive Key Pair
33,022,661 UART: [art] Store priv key in slot 0x5
35,449,517 UART: [art] Derive Key Pair - Done
35,462,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
37,168,848 UART: [art] Erasing AUTHORITY.KEYID = 7
37,170,350 UART: [art] PUB.X = 7AE35FBDDAA734246AB664388122B61F14D8F7DA2A795ABD1C101A4EADA8A9F40516C96B724E8F7996CDBCD81E4DF178
37,177,658 UART: [art] PUB.Y = 19C8C51B794CB2878F575F6C2927D0F5DA258FD29238108C979B48B8F5F46397F5C194217123067D06EC887BB5112880
37,184,861 UART: [art] SIG.R = D79AC93CB3B518D3D4BF0E9131DBCADAF568717A033F567C9DB64967677C495D24B17D0148B462DE9B6AA4BFF959D1BA
37,192,275 UART: [art] SIG.S = E533C6B6E147B7A84D1EC726FDBA0603FEA352E700270DFD1B81F4BF6722CB68B6D69438C7C9D845F1FD89D9EA8C540E
38,170,911 UART: Caliptra RT
38,171,619 UART: [state] CFI Enabled
38,548,172 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,032 UART:
192,391 UART: Running Caliptra ROM ...
193,569 UART:
193,746 UART: [state] CFI Enabled
264,390 UART: [state] LifecycleState = Unprovisioned
266,802 UART: [state] DebugLocked = No
268,425 UART: [state] WD Timer not started. Device not locked for debugging
272,894 UART: [kat] SHA2-256
462,723 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,549 UART: [kat] ++
474,024 UART: [kat] sha1
486,389 UART: [kat] SHA2-256
489,394 UART: [kat] SHA2-384
495,519 UART: [kat] SHA2-512-ACC
498,091 UART: [kat] ECC-384
2,949,679 UART: [kat] HMAC-384Kdf
2,974,976 UART: [kat] LMS
3,506,770 UART: [kat] --
3,512,415 UART: [cold-reset] ++
3,514,927 UART: [fht] FHT @ 0x50003400
3,527,036 UART: [idev] ++
3,527,682 UART: [idev] CDI.KEYID = 6
3,528,634 UART: [idev] SUBJECT.KEYID = 7
3,529,874 UART: [idev] UDS.KEYID = 0
3,530,772 ready_for_fw is high
3,530,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,680,177 UART: [idev] Erasing UDS.KEYID = 0
6,034,068 UART: [idev] Sha1 KeyId Algorithm
6,056,310 UART: [idev] --
6,061,069 UART: [ldev] ++
6,061,814 UART: [ldev] CDI.KEYID = 6
6,062,737 UART: [ldev] SUBJECT.KEYID = 5
6,063,893 UART: [ldev] AUTHORITY.KEYID = 7
6,065,069 UART: [ldev] FE.KEYID = 1
6,103,804 UART: [ldev] Erasing FE.KEYID = 1
8,613,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,203 UART: [ldev] --
10,418,998 UART: [fwproc] Wait for Commands...
10,421,785 UART: [fwproc] Recv command 0x46574c44
10,424,093 UART: [fwproc] Recv'd Img size: 118548 bytes
13,924,985 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,095 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,521 >>> mbox cmd response: success
14,687,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,836,685 UART: [afmc] ++
14,837,321 UART: [afmc] CDI.KEYID = 6
14,838,260 UART: [afmc] SUBJECT.KEYID = 7
14,839,374 UART: [afmc] AUTHORITY.KEYID = 5
17,241,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,984,061 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,986,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,001,120 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,016,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,031,164 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,054,918 UART: [afmc] --
19,057,754 UART: [cold-reset] --
19,060,804 UART: [state] Locking Datavault
19,065,942 UART: [state] Locking PCR0, PCR1 and PCR31
19,068,126 UART: [state] Locking ICCM
19,070,649 UART: [exit] Launching FMC @ 0x40000130
19,079,316 UART:
19,079,594 UART: Running Caliptra FMC ...
19,080,723 UART:
19,080,883 UART: [state] CFI Enabled
19,141,269 UART: [fht] FMC Alias Private Key: 7
20,907,541 UART: [art] Extend RT PCRs Done
20,908,774 UART: [art] Lock RT PCRs Done
20,910,502 UART: [art] Populate DV Done
20,915,855 UART: [fht] FMC Alias Private Key: 7
20,917,427 UART: [art] Derive CDI
20,918,249 UART: [art] Store in slot 0x4
20,974,126 UART: [art] Derive Key Pair
20,975,125 UART: [art] Store priv key in slot 0x5
23,438,185 UART: [art] Derive Key Pair - Done
23,451,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,164,434 UART: [art] Erasing AUTHORITY.KEYID = 7
25,165,935 UART: [art] PUB.X = 40EFD4BB1F5F06355673BB89384E3783E7286408E98A281EEB78C9BC84E9EF4B442293283FFCE5A9A08BCEC3EAC45153
25,173,237 UART: [art] PUB.Y = 7E0EEDDC8FDDF4C6561CE0CF4431200489084AFA3D6CD8D0EEF100ACCF11D473C714321302B02BC07D1A9AF525711A0E
25,180,484 UART: [art] SIG.R = 307301654E2F137D0A7878411CC1BD5D0A4B65EFDCC9A1D6F2BABD544CD6059A6E4DA98FB4F6177384821C8BC2F80260
25,187,879 UART: [art] SIG.S = D1F95BBE034728EA273E2B0479335E91557F1A3A1A33DDBAF50CEC2F8212B3C042AA2ADE1A3FDE01C86F3450EF2104EE
26,166,142 UART: Caliptra RT
26,166,858 UART: [state] CFI Enabled
26,348,740 UART: [rt] RT listening for mailbox commands...
26,351,754 UART:
26,352,003 UART: Running Caliptra ROM ...
26,353,116 UART:
26,353,275 UART: [state] CFI Enabled
26,422,864 UART: [state] LifecycleState = Unprovisioned
26,424,944 UART: [state] DebugLocked = No
26,426,891 UART: [state] WD Timer not started. Device not locked for debugging
26,432,298 UART: [kat] SHA2-256
26,622,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,632,935 UART: [kat] ++
26,633,385 UART: [kat] sha1
26,645,203 UART: [kat] SHA2-256
26,648,212 UART: [kat] SHA2-384
26,654,299 UART: [kat] SHA2-512-ACC
26,656,865 UART: [kat] ECC-384
29,102,308 UART: [kat] HMAC-384Kdf
29,128,472 UART: [kat] LMS
29,660,031 UART: [kat] --
29,665,173 UART: [update-reset] ++
33,185,189 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,187,865 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,817,608 >>> mbox cmd response: success
33,818,236 UART: [update-reset] Copying MAN_2 To MAN_1
33,855,802 UART: [update-reset Success] --
33,859,164 UART: [state] Locking Datavault
33,863,221 UART: [state] Locking PCR0, PCR1 and PCR31
33,865,405 UART: [state] Locking ICCM
33,867,466 UART: [exit] Launching FMC @ 0x40000130
33,876,092 UART:
33,876,374 UART: Running Caliptra FMC ...
33,877,403 UART:
33,877,553 UART: [state] CFI Enabled
33,983,293 UART: [art] Extend RT PCRs Done
33,984,475 UART: [art] Lock RT PCRs Done
33,986,058 UART: [art] Populate DV Done
33,991,678 UART: [fht] FMC Alias Private Key: 7
33,993,373 UART: [art] Derive CDI
33,994,106 UART: [art] Store in slot 0x4
34,052,755 UART: [art] Derive Key Pair
34,053,796 UART: [art] Store priv key in slot 0x5
36,516,260 UART: [art] Derive Key Pair - Done
36,529,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,242,056 UART: [art] Erasing AUTHORITY.KEYID = 7
38,243,588 UART: [art] PUB.X = AD2D0EFE23A7A6B48F9224DFE0BF3B3D14335D28815B90C0AE7660E73D2240DC066DAC40286385FE5C2EF1A48A9B8EA7
38,250,840 UART: [art] PUB.Y = 5EF6A3A4B080EDE7A2013E65B294A5C5511A60B187354D1CC12DE5583D27F687FE64F7539A8BC4890C5ABBB5A49FFEB6
38,258,128 UART: [art] SIG.R = FD6C2503A0908C59908451627874711C1D3D265B25B98B6C923DCE627C9D4CF265B316D3F1E06FA229894FEF192A062A
38,265,526 UART: [art] SIG.S = E46ADB87A12211E7CCF23D5BAB3D6EC8332F300F8AA68374057606183E4096676E62F8909C24306E0C5BE2AF9BF6347D
39,244,579 UART: Caliptra RT
39,245,275 UART: [state] CFI Enabled
39,665,393 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,435,099 ready_for_fw is high
3,435,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,723 >>> mbox cmd response: success
14,825,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,114,440 UART:
19,114,855 UART: Running Caliptra FMC ...
19,115,992 UART:
19,116,165 UART: [state] CFI Enabled
19,178,454 UART: [fht] FMC Alias Private Key: 7
20,945,187 UART: [art] Extend RT PCRs Done
20,946,419 UART: [art] Lock RT PCRs Done
20,947,804 UART: [art] Populate DV Done
20,953,238 UART: [fht] FMC Alias Private Key: 7
20,954,885 UART: [art] Derive CDI
20,955,702 UART: [art] Store in slot 0x4
21,011,750 UART: [art] Derive Key Pair
21,012,796 UART: [art] Store priv key in slot 0x5
23,475,542 UART: [art] Derive Key Pair - Done
23,488,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,575 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,077 UART: [art] PUB.X = 1A82F2EAEB1E0B611A9F5F75C374309F156627672A58411F1F122A250D73D5A2DBBD962DBADCFCAA8AA7B5D1E9330716
25,210,381 UART: [art] PUB.Y = 93942692DBE6BA506BAEDC808D1BB6099FA738DAE3A8D3021DB62CF2710A6B91C219D9DFCB0F51F49A7C4EC55215AFD8
25,217,633 UART: [art] SIG.R = 5F8B83227AD4B7515018C3C8D0D44566A3DF621C10C8D4A175DC2A75A3BB22AD58B7A2E5949B09CB60776235FC16B071
25,225,042 UART: [art] SIG.S = 1B93F72C5DDBD3FA131420B984FA16C94FBB049E17FC4BC647ABCB03A31A99E74AC4B514FB4281D4026F9AA1B9F335DC
26,203,595 UART: Caliptra RT
26,204,299 UART: [state] CFI Enabled
26,386,227 UART: [rt] RT listening for mailbox commands...
34,150,416 >>> mbox cmd response: success
34,183,352 UART:
34,183,624 UART: Running Caliptra FMC ...
34,184,735 UART:
34,184,889 UART: [state] CFI Enabled
34,275,499 UART: [art] Extend RT PCRs Done
34,276,690 UART: [art] Lock RT PCRs Done
34,278,042 UART: [art] Populate DV Done
34,283,446 UART: [fht] FMC Alias Private Key: 7
34,284,925 UART: [art] Derive CDI
34,285,688 UART: [art] Store in slot 0x4
34,344,177 UART: [art] Derive Key Pair
34,345,191 UART: [art] Store priv key in slot 0x5
36,807,787 UART: [art] Derive Key Pair - Done
36,820,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,533,544 UART: [art] Erasing AUTHORITY.KEYID = 7
38,535,041 UART: [art] PUB.X = B92767F5B9FAC1D22ED03EEC54A5D90285A349D9FB94737185DF156FB3393C8BF34F8F1504AFDBA518BE939F24285A28
38,542,304 UART: [art] PUB.Y = E3E6D6D0D614689098AAC053519A45AA62A5A1AEB716B2CD388EAFFB8D81678ECE4FBB5CAF25ECB2FFD8E6A8BA76A73E
38,549,591 UART: [art] SIG.R = 54A01292064556BFF53A25F52078D68CA041CDD24DA8935968C7ED316BA4768BA7F6ECFB430EE79933549E6447C7EA5A
38,556,989 UART: [art] SIG.S = 3BFE73C24CCED041D84A63DBCFCBC534C7698CD69EF34EE55C1D55210441B090A9DC902A43E4BE6C439CE94878489363
39,535,796 UART: Caliptra RT
39,536,505 UART: [state] CFI Enabled
39,956,246 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,469 UART:
192,853 UART: Running Caliptra ROM ...
193,944 UART:
603,791 UART: [state] CFI Enabled
615,554 UART: [state] LifecycleState = Unprovisioned
617,876 UART: [state] DebugLocked = No
620,187 UART: [state] WD Timer not started. Device not locked for debugging
625,454 UART: [kat] SHA2-256
815,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,131 UART: [kat] ++
826,738 UART: [kat] sha1
838,120 UART: [kat] SHA2-256
841,196 UART: [kat] SHA2-384
847,964 UART: [kat] SHA2-512-ACC
850,617 UART: [kat] ECC-384
3,291,941 UART: [kat] HMAC-384Kdf
3,305,492 UART: [kat] LMS
3,837,364 UART: [kat] --
3,841,223 UART: [cold-reset] ++
3,842,893 UART: [fht] FHT @ 0x50003400
3,855,015 UART: [idev] ++
3,855,669 UART: [idev] CDI.KEYID = 6
3,856,705 UART: [idev] SUBJECT.KEYID = 7
3,857,814 UART: [idev] UDS.KEYID = 0
3,858,749 ready_for_fw is high
3,858,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,957 UART: [idev] Erasing UDS.KEYID = 0
6,337,001 UART: [idev] Sha1 KeyId Algorithm
6,359,376 UART: [idev] --
6,363,835 UART: [ldev] ++
6,364,525 UART: [ldev] CDI.KEYID = 6
6,365,438 UART: [ldev] SUBJECT.KEYID = 5
6,366,601 UART: [ldev] AUTHORITY.KEYID = 7
6,367,834 UART: [ldev] FE.KEYID = 1
6,380,372 UART: [ldev] Erasing FE.KEYID = 1
8,857,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,870 UART: [ldev] --
10,649,753 UART: [fwproc] Wait for Commands...
10,652,394 UART: [fwproc] Recv command 0x46574c44
10,654,709 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,269 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,806 >>> mbox cmd response: success
14,910,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,059,719 UART: [afmc] ++
15,060,361 UART: [afmc] CDI.KEYID = 6
15,061,510 UART: [afmc] SUBJECT.KEYID = 7
15,062,636 UART: [afmc] AUTHORITY.KEYID = 5
17,420,369 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,107 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,325 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,182 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,254 UART: [afmc] --
19,218,849 UART: [cold-reset] --
19,223,482 UART: [state] Locking Datavault
19,226,726 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,887 UART: [state] Locking ICCM
19,230,383 UART: [exit] Launching FMC @ 0x40000130
19,239,061 UART:
19,239,302 UART: Running Caliptra FMC ...
19,240,433 UART:
19,240,596 UART: [state] CFI Enabled
19,248,915 UART: [fht] FMC Alias Private Key: 7
21,015,568 UART: [art] Extend RT PCRs Done
21,016,794 UART: [art] Lock RT PCRs Done
21,018,399 UART: [art] Populate DV Done
21,023,818 UART: [fht] FMC Alias Private Key: 7
21,025,305 UART: [art] Derive CDI
21,026,049 UART: [art] Store in slot 0x4
21,068,863 UART: [art] Derive Key Pair
21,069,911 UART: [art] Store priv key in slot 0x5
23,496,689 UART: [art] Derive Key Pair - Done
23,509,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,638 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,147 UART: [art] PUB.X = 9159DEB7A1947C537C02143178F49AEF91B258C06973E360A408CE65CC5340A52725B3D28D99604AE95F907CE67F530E
25,224,381 UART: [art] PUB.Y = 33A074A8D75F8A86C703A99DB027D098ADC672091B7CE4911B91240F134E15605AEBAE4006739144502BAAD767844C18
25,231,601 UART: [art] SIG.R = 51FD72670430A4D4B405920B78591271B18D8E4E2E6B3DFD1490065AA75CF1A048985246E4CCCD040BAD5DCF259D23E2
25,238,970 UART: [art] SIG.S = 4B10FF0B2495C757ADEC96A8252CBCE6838F6DE54D22B27E198FD6F4488D93F7F81B34A1DE3B070C0DB102C3631935F8
26,217,597 UART: Caliptra RT
26,218,305 UART: [state] CFI Enabled
26,350,234 UART: [rt] RT listening for mailbox commands...
26,353,299 UART:
26,353,553 UART: Running Caliptra ROM ...
26,354,659 UART:
26,354,929 UART: [state] CFI Enabled
26,367,466 UART: [state] LifecycleState = Unprovisioned
26,369,360 UART: [state] DebugLocked = No
26,371,120 UART: [state] WD Timer not started. Device not locked for debugging
26,375,536 UART: [kat] SHA2-256
26,565,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,576,169 UART: [kat] ++
26,576,685 UART: [kat] sha1
26,589,427 UART: [kat] SHA2-256
26,592,438 UART: [kat] SHA2-384
26,597,681 UART: [kat] SHA2-512-ACC
26,600,254 UART: [kat] ECC-384
29,040,869 UART: [kat] HMAC-384Kdf
29,054,506 UART: [kat] LMS
29,586,135 UART: [kat] --
29,590,686 UART: [update-reset] ++
33,103,625 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
33,107,545 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
33,737,300 >>> mbox cmd response: success
33,738,561 UART: [update-reset] Copying MAN_2 To MAN_1
33,776,161 UART: [update-reset Success] --
33,781,843 UART: [state] Locking Datavault
33,785,407 UART: [state] Locking PCR0, PCR1 and PCR31
33,787,630 UART: [state] Locking ICCM
33,789,433 UART: [exit] Launching FMC @ 0x40000130
33,798,066 UART:
33,798,315 UART: Running Caliptra FMC ...
33,799,425 UART:
33,799,595 UART: [state] CFI Enabled
33,843,723 UART: [art] Extend RT PCRs Done
33,845,002 UART: [art] Lock RT PCRs Done
33,846,396 UART: [art] Populate DV Done
33,851,976 UART: [fht] FMC Alias Private Key: 7
33,853,523 UART: [art] Derive CDI
33,854,346 UART: [art] Store in slot 0x4
33,897,050 UART: [art] Derive Key Pair
33,898,248 UART: [art] Store priv key in slot 0x5
36,324,077 UART: [art] Derive Key Pair - Done
36,336,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,043,296 UART: [art] Erasing AUTHORITY.KEYID = 7
38,044,846 UART: [art] PUB.X = 539933D0458084F48344D82359EEEC67B1C434633C701F6EC296AE450F40DF62DDE149A93A35C20CF10DA922FFD3BA8E
38,052,070 UART: [art] PUB.Y = A1287881248920B3CB25EAABC87F3B98F1DCB96A5C271BE947B05217CA073485E6F7D9A59DB2C369B80C1E4FA5320918
38,059,330 UART: [art] SIG.R = 2E350134E5128E499111C21087954ED4809F431823540B71F938BB904C1E47AC451137FAF83109D3BEB79B46ED6FDFBA
38,066,694 UART: [art] SIG.S = 94A4B666A7C1C67C21F4DDBEB47845C5AEE3DA5054AD44046DA027E3AF1ABE16103E2ED78AA05E38BE0FCC19129FE5E4
39,045,379 UART: Caliptra RT
39,046,083 UART: [state] CFI Enabled
39,424,714 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,752,251 ready_for_fw is high
3,752,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,436 >>> mbox cmd response: success
15,044,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,292,069 UART:
19,292,495 UART: Running Caliptra FMC ...
19,293,605 UART:
19,293,789 UART: [state] CFI Enabled
19,301,756 UART: [fht] FMC Alias Private Key: 7
21,067,395 UART: [art] Extend RT PCRs Done
21,068,852 UART: [art] Lock RT PCRs Done
21,070,571 UART: [art] Populate DV Done
21,075,945 UART: [fht] FMC Alias Private Key: 7
21,077,546 UART: [art] Derive CDI
21,078,288 UART: [art] Store in slot 0x4
21,121,054 UART: [art] Derive Key Pair
21,122,101 UART: [art] Store priv key in slot 0x5
23,548,684 UART: [art] Derive Key Pair - Done
23,561,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,791 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,296 UART: [art] PUB.X = E20068E37B32BA4B920B03A3ADD3289CCD157842BD31F96F792FD8F5F49DE47ECCFE2F3E01CDA1D29B410065380149BD
25,276,556 UART: [art] PUB.Y = E75756BDCFC5296C424FC181F099FE101DF091A2AFBD7B617B21B098BFD1E667D1B93FC956755EA44B48433FAF0F4EF5
25,283,842 UART: [art] SIG.R = B3DCB3841CE7468D812560D68AD6EBC72F1361363B1491ADE4D62DCF88711091270E6EE0A2F59AB405623EABCD8F055B
25,291,244 UART: [art] SIG.S = A3BE4DE9B51AB6ABF270E357D7B16845663A18A9B1B7718951BF8FF38F58332C0671596D2D7F65A6341642C5606AE0C1
26,270,414 UART: Caliptra RT
26,271,128 UART: [state] CFI Enabled
26,403,710 UART: [rt] RT listening for mailbox commands...
34,082,151 >>> mbox cmd response: success
34,116,571 UART:
34,116,848 UART: Running Caliptra FMC ...
34,117,970 UART:
34,118,138 UART: [state] CFI Enabled
34,162,107 UART: [art] Extend RT PCRs Done
34,163,294 UART: [art] Lock RT PCRs Done
34,164,536 UART: [art] Populate DV Done
34,170,062 UART: [fht] FMC Alias Private Key: 7
34,171,622 UART: [art] Derive CDI
34,172,391 UART: [art] Store in slot 0x4
34,215,151 UART: [art] Derive Key Pair
34,216,174 UART: [art] Store priv key in slot 0x5
36,642,801 UART: [art] Derive Key Pair - Done
36,655,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,362,083 UART: [art] Erasing AUTHORITY.KEYID = 7
38,363,582 UART: [art] PUB.X = F1C60BBC029E2E7F98023A4CFC4D24058986877CD0E9852E05BB963B9ACF1079A7A9F15360AA50228F0CD818B53948C5
38,370,846 UART: [art] PUB.Y = 28A7F6F299C4B3AFFC20F7CD6B833ED06BE54F1A6AF6B2ADFB0E60CB8DEE7DF35FE76A86833286050D2AFF10D994C2B6
38,378,148 UART: [art] SIG.R = 4158F72FF4A5CC2B4BF0A73FB9B920C5FDF0509F8070AD4F4CB0B3814F1D81F6737D766031CE5320D85C7DE5EBFCFD32
38,385,551 UART: [art] SIG.S = BD69ED1291731E59FC1A0B052529DF843B3B44121B51AB70E283462FD9E4D286108D6FA4EACF19918693F6EDC7F10322
39,364,442 UART: Caliptra RT
39,365,155 UART: [state] CFI Enabled
39,735,655 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,413 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,513 UART: [kat] SHA2-256
892,451 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,558 UART: [kat] HMAC-384Kdf
907,028 UART: [kat] LMS
1,475,224 UART: [kat] --
1,476,151 UART: [cold-reset] ++
1,476,589 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,735 ready_for_fw is high
1,480,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,766 UART: [idev] Erasing UDS.KEYID = 0
1,505,392 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,186 UART: [idev] --
1,515,197 UART: [ldev] ++
1,515,365 UART: [ldev] CDI.KEYID = 6
1,515,728 UART: [ldev] SUBJECT.KEYID = 5
1,516,154 UART: [ldev] AUTHORITY.KEYID = 7
1,516,617 UART: [ldev] FE.KEYID = 1
1,521,693 UART: [ldev] Erasing FE.KEYID = 1
1,547,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,510 UART: [ldev] --
1,586,939 UART: [fwproc] Waiting for Commands...
1,587,632 UART: [fwproc] Received command 0x46574c44
1,588,423 UART: [fwproc] Received Image of size 118548 bytes
2,932,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,387 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,872 >>> mbox cmd response: success
3,130,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,912 UART: [afmc] ++
3,132,080 UART: [afmc] CDI.KEYID = 6
3,132,442 UART: [afmc] SUBJECT.KEYID = 7
3,132,867 UART: [afmc] AUTHORITY.KEYID = 5
3,168,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,241 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,124 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,807 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,671 UART: [afmc] --
3,211,655 UART: [cold-reset] --
3,212,593 UART: [state] Locking Datavault
3,213,726 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,330 UART: [state] Locking ICCM
3,214,812 UART: [exit] Launching FMC @ 0x40000130
3,220,142 UART:
3,220,158 UART: Running Caliptra FMC ...
3,220,566 UART:
3,220,620 UART: [state] CFI Enabled
3,231,130 UART: [fht] FMC Alias Private Key: 7
3,350,984 UART: [art] Extend RT PCRs Done
3,351,412 UART: [art] Lock RT PCRs Done
3,353,368 UART: [art] Populate DV Done
3,361,477 UART: [fht] FMC Alias Private Key: 7
3,362,585 UART: [art] Derive CDI
3,362,865 UART: [art] Store in slot 0x4
3,448,723 UART: [art] Derive Key Pair
3,449,083 UART: [art] Store priv key in slot 0x5
3,461,924 UART: [art] Derive Key Pair - Done
3,476,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,555 UART: [art] PUB.X = B949846E0C4DB48CC10BCF5172FC8BAEC622D2EA9C8692D85EB2EAB459703D961874791573505937479629EF9B5A1EAC
3,499,325 UART: [art] PUB.Y = 45258F4C7FA09D2EBEA71D30EC477D1E45636948415660A75F0A5F40EE668B1FF3A96F1A9D6139A1E87B6AB2D89FF498
3,506,280 UART: [art] SIG.R = 607E463DA54B0B714C63AD2FB4A4BBBAEB501E1ACD1C920132F548FDDCCABEC62A86A98F9495076050336B3EF773ED97
3,513,059 UART: [art] SIG.S = 032824BA4323C476743DADB3630480AF4359C19CEC83AFE3F71A2E229142D93A05A84EEE808485FC890FB9FD1017176D
3,537,155 UART: Caliptra RT
3,537,406 UART: [state] CFI Enabled
3,657,285 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,880 UART:
3,658,896 UART: Running Caliptra ROM ...
3,659,304 UART:
3,659,358 UART: [state] CFI Enabled
3,661,962 UART: [state] LifecycleState = Unprovisioned
3,662,617 UART: [state] DebugLocked = No
3,663,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,664,962 UART: [kat] SHA2-256
4,458,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,008 UART: [kat] ++
4,463,160 UART: [kat] sha1
4,467,520 UART: [kat] SHA2-256
4,469,458 UART: [kat] SHA2-384
4,472,167 UART: [kat] SHA2-512-ACC
4,474,067 UART: [kat] ECC-384
4,479,680 UART: [kat] HMAC-384Kdf
4,484,164 UART: [kat] LMS
5,052,360 UART: [kat] --
5,053,321 UART: [update-reset] ++
6,433,555 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,434,715 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,589,982 >>> mbox cmd response: success
6,590,243 UART: [update-reset] Copying MAN_2 To MAN_1
6,598,257 UART: [update-reset Success] --
6,599,244 UART: [state] Locking Datavault
6,600,068 UART: [state] Locking PCR0, PCR1 and PCR31
6,600,672 UART: [state] Locking ICCM
6,601,174 UART: [exit] Launching FMC @ 0x40000130
6,606,504 UART:
6,606,520 UART: Running Caliptra FMC ...
6,606,928 UART:
6,606,982 UART: [state] CFI Enabled
6,696,039 UART: [art] Extend RT PCRs Done
6,696,467 UART: [art] Lock RT PCRs Done
6,697,304 UART: [art] Populate DV Done
6,705,685 UART: [fht] FMC Alias Private Key: 7
6,706,859 UART: [art] Derive CDI
6,707,139 UART: [art] Store in slot 0x4
6,792,637 UART: [art] Derive Key Pair
6,792,997 UART: [art] Store priv key in slot 0x5
6,806,588 UART: [art] Derive Key Pair - Done
6,821,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,836,671 UART: [art] Erasing AUTHORITY.KEYID = 7
6,837,436 UART: [art] PUB.X = 77136959C8CAC10D9BBE1CA520FADB8758F21DABC4248C9CA662FF8537AE3E6BDDCDFE66A37FE2793EDD6599098AB38C
6,844,224 UART: [art] PUB.Y = 153939998320740525B47241178CADC65825B88CB663065294637092E8255596270B46C4F263438027E45C56295C45BD
6,851,137 UART: [art] SIG.R = 2A314D5DE0BB50CE4BAE80A61DD047DF55B08CC493DED628B8BD1D80A0E41A0DA3CFCC4A3926D01BC97AC6CD53537326
6,857,928 UART: [art] SIG.S = 486F0AA3296AC8AC32AF24B31F36D0A766F3EEF574C7F3FECE5790366ABF06B18DE5153AE4FC89EE6F0ED4B4F3BA7930
6,881,533 UART: Caliptra RT
6,881,784 UART: [state] CFI Enabled
7,254,358 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,302 >>> mbox cmd response: success
2,979,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,040,313 UART:
3,040,329 UART: Running Caliptra FMC ...
3,040,737 UART:
3,040,791 UART: [state] CFI Enabled
3,051,193 UART: [fht] FMC Alias Private Key: 7
3,170,643 UART: [art] Extend RT PCRs Done
3,171,071 UART: [art] Lock RT PCRs Done
3,172,519 UART: [art] Populate DV Done
3,180,556 UART: [fht] FMC Alias Private Key: 7
3,181,670 UART: [art] Derive CDI
3,181,950 UART: [art] Store in slot 0x4
3,267,710 UART: [art] Derive Key Pair
3,268,070 UART: [art] Store priv key in slot 0x5
3,280,523 UART: [art] Derive Key Pair - Done
3,295,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,720 UART: [art] PUB.X = 3E2BBD5D76F0DCDE5E8381DDD84009614876DD8A37D5AFED97725A70D4EE7BEBD7F5AE3D92F977567D6F12C23034350C
3,318,500 UART: [art] PUB.Y = 650F33C162354E84181B9B448EFA598416E85873529DAC34756469E3BF1CF6267846D75817EDE4ED7D22BA27E07A3316
3,325,441 UART: [art] SIG.R = 764641B5BAE53E2702C3670EAD797F192E9633EC79AD2F961A7EBEA1E6ACA6EE1A981F40516401E00260F8ABE9E945D9
3,332,209 UART: [art] SIG.S = 16CC113E2A6AB84A034E73FF10E8AAFF6870EB184D2044336727AEEEF12CE519356E977FA5DE16154C4B97E7D0A1265D
3,356,716 UART: Caliptra RT
3,356,967 UART: [state] CFI Enabled
3,476,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,293,045 >>> mbox cmd response: success
6,306,337 UART:
6,306,353 UART: Running Caliptra FMC ...
6,306,761 UART:
6,306,815 UART: [state] CFI Enabled
6,396,228 UART: [art] Extend RT PCRs Done
6,396,656 UART: [art] Lock RT PCRs Done
6,397,975 UART: [art] Populate DV Done
6,405,912 UART: [fht] FMC Alias Private Key: 7
6,406,848 UART: [art] Derive CDI
6,407,128 UART: [art] Store in slot 0x4
6,492,906 UART: [art] Derive Key Pair
6,493,266 UART: [art] Store priv key in slot 0x5
6,506,427 UART: [art] Derive Key Pair - Done
6,521,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,536,573 UART: [art] Erasing AUTHORITY.KEYID = 7
6,537,338 UART: [art] PUB.X = AAC6D6ADCFC59E1AA44D7287104030DE02D0085D7446E259AC9C87A66EA9EE624C957FF6B0819ECC4BCEE7061D9FB569
6,544,117 UART: [art] PUB.Y = EED05189E883A15B45DC849DBBB6BF1EC4AF2C52380E3FC8C5CBFD7A8400A5FE4BA489B70197D97B95F00417E80CD595
6,551,051 UART: [art] SIG.R = 704D6DA0197771620A7360A907E0AE1B82DA618C0B6BF971877D85756088DD72EDDFF027D4FD19663537C19C781DC718
6,557,810 UART: [art] SIG.S = 3BBAA73673564AA9C4307D02B8B815AF5D94F152B7E1B759A1320D4D5BF03D6F0A604D038C401334984D7C6FB4DCB5EF
6,582,324 UART: Caliptra RT
6,582,575 UART: [state] CFI Enabled
6,943,931 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,044 UART: [kat] SHA2-256
881,975 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,090 UART: [kat] ++
886,242 UART: [kat] sha1
890,286 UART: [kat] SHA2-256
892,224 UART: [kat] SHA2-384
895,167 UART: [kat] SHA2-512-ACC
897,068 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,231 UART: [kat] LMS
1,475,427 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,810 UART: [fht] Storing FHT @ 0x50003400
1,479,433 UART: [idev] ++
1,479,601 UART: [idev] CDI.KEYID = 6
1,479,961 UART: [idev] SUBJECT.KEYID = 7
1,480,385 UART: [idev] UDS.KEYID = 0
1,480,730 ready_for_fw is high
1,480,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,145 UART: [idev] Erasing UDS.KEYID = 0
1,505,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,567 UART: [idev] --
1,514,616 UART: [ldev] ++
1,514,784 UART: [ldev] CDI.KEYID = 6
1,515,147 UART: [ldev] SUBJECT.KEYID = 5
1,515,573 UART: [ldev] AUTHORITY.KEYID = 7
1,516,036 UART: [ldev] FE.KEYID = 1
1,521,134 UART: [ldev] Erasing FE.KEYID = 1
1,546,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,387 UART: [ldev] --
1,585,690 UART: [fwproc] Waiting for Commands...
1,586,385 UART: [fwproc] Received command 0x46574c44
1,587,176 UART: [fwproc] Received Image of size 118548 bytes
2,932,368 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,696 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,914 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,223 >>> mbox cmd response: success
3,131,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,132,377 UART: [afmc] ++
3,132,545 UART: [afmc] CDI.KEYID = 6
3,132,907 UART: [afmc] SUBJECT.KEYID = 7
3,133,332 UART: [afmc] AUTHORITY.KEYID = 5
3,168,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,577 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,357 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,066 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,632 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,536 UART: [afmc] --
3,211,438 UART: [cold-reset] --
3,212,424 UART: [state] Locking Datavault
3,213,615 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,219 UART: [state] Locking ICCM
3,214,743 UART: [exit] Launching FMC @ 0x40000130
3,220,073 UART:
3,220,089 UART: Running Caliptra FMC ...
3,220,497 UART:
3,220,640 UART: [state] CFI Enabled
3,231,146 UART: [fht] FMC Alias Private Key: 7
3,350,354 UART: [art] Extend RT PCRs Done
3,350,782 UART: [art] Lock RT PCRs Done
3,352,080 UART: [art] Populate DV Done
3,360,435 UART: [fht] FMC Alias Private Key: 7
3,361,555 UART: [art] Derive CDI
3,361,835 UART: [art] Store in slot 0x4
3,447,895 UART: [art] Derive Key Pair
3,448,255 UART: [art] Store priv key in slot 0x5
3,461,300 UART: [art] Derive Key Pair - Done
3,476,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,731 UART: [art] PUB.X = 1B20F69CE8C35CD3E40274D0EB39DE88F3E39E9D0ECAD6989E41947747689C29C6A8928BF0782671AD39A7F3900E106E
3,499,496 UART: [art] PUB.Y = 674DB35D64A9B377C5AC4CB262FC058EBB079D93DAF7C170F78B45FDDD0A2BA5E8229AE28C11A16FD3EE6C8B09FEE453
3,506,458 UART: [art] SIG.R = 1026B9F28B35750EC5C68D6CFE80DE4F44F063DDBD339E51DB7FF782E540F29DC97EAE9D4E0CDA114F6A52F4956978FB
3,513,240 UART: [art] SIG.S = B52DF52018331FA22E75E74F358F96669FA23B67865B8FFBB88BF8F5D4FDE3447C92493A4066D74994F8FFB3667649A8
3,537,252 UART: Caliptra RT
3,537,595 UART: [state] CFI Enabled
3,657,577 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,484 UART:
3,659,500 UART: Running Caliptra ROM ...
3,659,908 UART:
3,660,049 UART: [state] CFI Enabled
3,662,623 UART: [state] LifecycleState = Unprovisioned
3,663,278 UART: [state] DebugLocked = No
3,663,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,405 UART: [kat] SHA2-256
4,459,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,451 UART: [kat] ++
4,463,603 UART: [kat] sha1
4,467,837 UART: [kat] SHA2-256
4,469,775 UART: [kat] SHA2-384
4,472,488 UART: [kat] SHA2-512-ACC
4,474,388 UART: [kat] ECC-384
4,480,011 UART: [kat] HMAC-384Kdf
4,484,627 UART: [kat] LMS
5,052,823 UART: [kat] --
5,053,628 UART: [update-reset] ++
6,434,834 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,436,050 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,591,317 >>> mbox cmd response: success
6,591,496 UART: [update-reset] Copying MAN_2 To MAN_1
6,599,510 UART: [update-reset Success] --
6,600,441 UART: [state] Locking Datavault
6,601,227 UART: [state] Locking PCR0, PCR1 and PCR31
6,601,831 UART: [state] Locking ICCM
6,602,329 UART: [exit] Launching FMC @ 0x40000130
6,607,659 UART:
6,607,675 UART: Running Caliptra FMC ...
6,608,083 UART:
6,608,226 UART: [state] CFI Enabled
6,697,923 UART: [art] Extend RT PCRs Done
6,698,351 UART: [art] Lock RT PCRs Done
6,699,324 UART: [art] Populate DV Done
6,707,607 UART: [fht] FMC Alias Private Key: 7
6,708,755 UART: [art] Derive CDI
6,709,035 UART: [art] Store in slot 0x4
6,794,877 UART: [art] Derive Key Pair
6,795,237 UART: [art] Store priv key in slot 0x5
6,808,656 UART: [art] Derive Key Pair - Done
6,823,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,839,369 UART: [art] Erasing AUTHORITY.KEYID = 7
6,840,134 UART: [art] PUB.X = 8AB184372CF2CE0BE22CF362D876C1D5500A6BBB2E71D8F81B475F9AB0334AD8E08462CCA6391268F124ECA6A4C3AD2C
6,846,914 UART: [art] PUB.Y = DEC36775C8E066C164ED273EC70A8D3A0FABFE32EEC8124A4D23014FB966BF8060712BE259EEBD03A87235707A562320
6,853,860 UART: [art] SIG.R = 55067B99434637D7EFB4A848E26DA8682B13FD5343AADDB68DDB45EBA62908675D282B2EEB8207159C087CDF1A75A7A4
6,860,626 UART: [art] SIG.S = C479AD4F743BC8884444081BC9F41AA835914051308EEF53FDB2416E701B2C6825138C847D20DF1623F4AE4DCE3FF82D
6,884,309 UART: Caliptra RT
6,884,652 UART: [state] CFI Enabled
7,251,293 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 ready_for_fw is high
1,362,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,437 >>> mbox cmd response: success
2,980,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,041,136 UART:
3,041,152 UART: Running Caliptra FMC ...
3,041,560 UART:
3,041,703 UART: [state] CFI Enabled
3,052,483 UART: [fht] FMC Alias Private Key: 7
3,171,167 UART: [art] Extend RT PCRs Done
3,171,595 UART: [art] Lock RT PCRs Done
3,173,381 UART: [art] Populate DV Done
3,181,640 UART: [fht] FMC Alias Private Key: 7
3,182,758 UART: [art] Derive CDI
3,183,038 UART: [art] Store in slot 0x4
3,268,532 UART: [art] Derive Key Pair
3,268,892 UART: [art] Store priv key in slot 0x5
3,282,167 UART: [art] Derive Key Pair - Done
3,297,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,977 UART: [art] PUB.X = C7CBAFF040CFA6FCE35FD565240B7B34F1BF6DD6061E0C7AD58E80E3CD272F1C6A65C24B55460871350CF8AF2D8EA34B
3,320,754 UART: [art] PUB.Y = 542DBC2667CAE0FE2C4CD822150792A116965EFE0C7E0276595A729380DB75C14AFA187544F6D74EBA47FA6885EC8539
3,327,699 UART: [art] SIG.R = E6ED23F28D0B5EFC2719CB5737A33E97BA4B814657A0348EE50755CFFF47B36589AB1BF658D225AE1CC5E0322D3C78D2
3,334,475 UART: [art] SIG.S = DDC6190FB41E5FABF728ED942E7FA4B500726F74FC619E49CF2A3212B9B4DACA8AAE04A1D03678F0FB7B25529D9E42B8
3,358,461 UART: Caliptra RT
3,358,804 UART: [state] CFI Enabled
3,479,589 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,296,435 >>> mbox cmd response: success
6,309,931 UART:
6,309,947 UART: Running Caliptra FMC ...
6,310,355 UART:
6,310,498 UART: [state] CFI Enabled
6,399,977 UART: [art] Extend RT PCRs Done
6,400,405 UART: [art] Lock RT PCRs Done
6,401,668 UART: [art] Populate DV Done
6,409,777 UART: [fht] FMC Alias Private Key: 7
6,410,851 UART: [art] Derive CDI
6,411,131 UART: [art] Store in slot 0x4
6,497,283 UART: [art] Derive Key Pair
6,497,643 UART: [art] Store priv key in slot 0x5
6,511,022 UART: [art] Derive Key Pair - Done
6,525,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,541,005 UART: [art] Erasing AUTHORITY.KEYID = 7
6,541,770 UART: [art] PUB.X = 4FA7DF16A19955E115A65A44876BE1A4D970059C1EFC0C1C1C21219C2EE50E9EE90D1CE37A5964DD88F62720E564B1B9
6,548,536 UART: [art] PUB.Y = 759403C227882FB9A232C9745BA78484A043488701E29D1A2CD9C9C66825CEB5D2405B8CF2BFF6F27B078AC704355901
6,555,467 UART: [art] SIG.R = 571891567F3CF6F8E45CFBBE5007C9C9BC31A738E1A27E704239DE731EDC6341ADAF8689DE90CB61EA797DBF14CA9BFC
6,562,254 UART: [art] SIG.S = FD951BA11ED7A7DFA442A2210FBC9781013FAFDF361C98BB4122915A0062CEA7AE48ED7264CB35D1F5CA89D6D2C0C734
6,586,026 UART: Caliptra RT
6,586,369 UART: [state] CFI Enabled
6,955,772 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.81s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
890,930 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,034 UART: [kat] ++
895,186 UART: [kat] sha1
899,410 UART: [kat] SHA2-256
901,350 UART: [kat] SHA2-384
903,921 UART: [kat] SHA2-512-ACC
905,822 UART: [kat] ECC-384
915,517 UART: [kat] HMAC-384Kdf
920,299 UART: [kat] LMS
1,168,611 UART: [kat] --
1,169,672 UART: [cold-reset] ++
1,170,056 UART: [fht] FHT @ 0x50003400
1,172,630 UART: [idev] ++
1,172,798 UART: [idev] CDI.KEYID = 6
1,173,159 UART: [idev] SUBJECT.KEYID = 7
1,173,584 UART: [idev] UDS.KEYID = 0
1,173,930 ready_for_fw is high
1,173,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,473 UART: [idev] Erasing UDS.KEYID = 0
1,198,261 UART: [idev] Sha1 KeyId Algorithm
1,207,213 UART: [idev] --
1,208,180 UART: [ldev] ++
1,208,348 UART: [ldev] CDI.KEYID = 6
1,208,712 UART: [ldev] SUBJECT.KEYID = 5
1,209,139 UART: [ldev] AUTHORITY.KEYID = 7
1,209,602 UART: [ldev] FE.KEYID = 1
1,214,672 UART: [ldev] Erasing FE.KEYID = 1
1,240,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,019 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,700 UART: [ldev] --
1,280,137 UART: [fwproc] Wait for Commands...
1,280,950 UART: [fwproc] Recv command 0x46574c44
1,281,683 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,343 >>> mbox cmd response: success
2,824,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,825,361 UART: [afmc] ++
2,825,529 UART: [afmc] CDI.KEYID = 6
2,825,892 UART: [afmc] SUBJECT.KEYID = 7
2,826,318 UART: [afmc] AUTHORITY.KEYID = 5
2,862,339 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,865 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,746 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,447 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,078 UART: [afmc] --
2,904,999 UART: [cold-reset] --
2,905,773 UART: [state] Locking Datavault
2,906,822 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,426 UART: [state] Locking ICCM
2,907,900 UART: [exit] Launching FMC @ 0x40000130
2,913,230 UART:
2,913,246 UART: Running Caliptra FMC ...
2,913,654 UART:
2,913,708 UART: [state] CFI Enabled
2,924,136 UART: [fht] FMC Alias Private Key: 7
3,043,350 UART: [art] Extend RT PCRs Done
3,043,778 UART: [art] Lock RT PCRs Done
3,044,918 UART: [art] Populate DV Done
3,053,183 UART: [fht] FMC Alias Private Key: 7
3,054,161 UART: [art] Derive CDI
3,054,441 UART: [art] Store in slot 0x4
3,140,670 UART: [art] Derive Key Pair
3,141,030 UART: [art] Store priv key in slot 0x5
3,153,914 UART: [art] Derive Key Pair - Done
3,168,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,093 UART: [art] PUB.X = 734378350944B33E8FA74688D5784342C3AB5FB079370A273BDE61BA5D2D809810775E0B9212BF8CAB4AC26A15D592D8
3,191,852 UART: [art] PUB.Y = 7A7B54DE629FA7B2B408414FA869DC0A5692DE04B8BE4778FB02BC88AC99C50500144B3B875E03B1225769DFC0D7ED9C
3,198,772 UART: [art] SIG.R = 0113FE066BA728EB9A071326016496D074FD7E178919679B4266DC3D9CF5787A12244BE884E9335740AC8AE6ED70254D
3,205,524 UART: [art] SIG.S = 9FCD21C7B94CB6682A312F37FF079A1A6388AC159693AC0CFB9CCBD1150F83ABE80DE5485E31391CEDA13DD266098971
3,228,999 UART: Caliptra RT
3,229,250 UART: [state] CFI Enabled
3,349,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,805 UART:
3,351,821 UART: Running Caliptra ROM ...
3,352,229 UART:
3,352,284 UART: [state] CFI Enabled
3,355,078 UART: [state] LifecycleState = Unprovisioned
3,355,733 UART: [state] DebugLocked = No
3,356,369 UART: [state] WD Timer not started. Device not locked for debugging
3,357,683 UART: [kat] SHA2-256
4,161,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,337 UART: [kat] ++
4,165,489 UART: [kat] sha1
4,169,763 UART: [kat] SHA2-256
4,171,703 UART: [kat] SHA2-384
4,174,440 UART: [kat] SHA2-512-ACC
4,176,340 UART: [kat] ECC-384
4,186,233 UART: [kat] HMAC-384Kdf
4,190,715 UART: [kat] LMS
4,439,027 UART: [kat] --
4,439,595 UART: [update-reset] ++
5,799,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,800,167 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,955,382 >>> mbox cmd response: success
5,955,703 UART: [update-reset] Copying MAN_2 To MAN_1
5,963,717 UART: [update-reset Success] --
5,964,492 UART: [state] Locking Datavault
5,965,070 UART: [state] Locking PCR0, PCR1 and PCR31
5,965,674 UART: [state] Locking ICCM
5,966,296 UART: [exit] Launching FMC @ 0x40000130
5,971,626 UART:
5,971,642 UART: Running Caliptra FMC ...
5,972,050 UART:
5,972,104 UART: [state] CFI Enabled
6,061,697 UART: [art] Extend RT PCRs Done
6,062,125 UART: [art] Lock RT PCRs Done
6,063,470 UART: [art] Populate DV Done
6,071,609 UART: [fht] FMC Alias Private Key: 7
6,072,767 UART: [art] Derive CDI
6,073,047 UART: [art] Store in slot 0x4
6,158,870 UART: [art] Derive Key Pair
6,159,230 UART: [art] Store priv key in slot 0x5
6,172,262 UART: [art] Derive Key Pair - Done
6,187,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,202,688 UART: [art] Erasing AUTHORITY.KEYID = 7
6,203,453 UART: [art] PUB.X = C3592FF8EF367F8AE22A9775FF8354D75C255110AA3BF0B5A8F39110202D9B699293C5CA7AA30857702A44EC83C61884
6,210,220 UART: [art] PUB.Y = 5FEBAA9D307103395B00F50216FEF51849682488746970E49E3B3761F0735D9BC656A792D407F0B169BC32964E9CA6C2
6,217,133 UART: [art] SIG.R = 1022B37941D3C8A87BCD9785A73F5CD418A916EC555FC11AADA12A742E24791E9360E5BFF5BCA13981FACFC5C523CC25
6,223,917 UART: [art] SIG.S = E580975B7B3CECFCFD72DA30D1854D84930294F0616F2DAD9EB678F1BE9AB09714513CDE933FD16BD585F7E19FC2A667
6,247,592 UART: Caliptra RT
6,247,843 UART: [state] CFI Enabled
6,614,145 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,866 ready_for_fw is high
1,058,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,826 >>> mbox cmd response: success
2,677,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,833 UART:
2,741,849 UART: Running Caliptra FMC ...
2,742,257 UART:
2,742,311 UART: [state] CFI Enabled
2,752,687 UART: [fht] FMC Alias Private Key: 7
2,871,497 UART: [art] Extend RT PCRs Done
2,871,925 UART: [art] Lock RT PCRs Done
2,873,829 UART: [art] Populate DV Done
2,881,890 UART: [fht] FMC Alias Private Key: 7
2,882,944 UART: [art] Derive CDI
2,883,224 UART: [art] Store in slot 0x4
2,969,201 UART: [art] Derive Key Pair
2,969,561 UART: [art] Store priv key in slot 0x5
2,982,723 UART: [art] Derive Key Pair - Done
2,997,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,683 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,448 UART: [art] PUB.X = 529811A04E4F056E5D80C0F533B30AEC7652D88C7B7CB5EF285A9FB22E3D89058BA46F3A92152DA38634DC842EEE9794
3,020,215 UART: [art] PUB.Y = BA4C979E61B382D13564848E78B11CFC01574F913F3AFC27771D3E8A1FB56ADC2B50F11A048FC51389C389E8069FBC6B
3,027,164 UART: [art] SIG.R = 8E8DF8D89C51113B37CF2613FC5F7F6D6AB7F23DE94420A6869E30293D7D26C890039A1E6413775153EDCA98EDC5CEC6
3,033,939 UART: [art] SIG.S = A1CFF12684045B1CD2550ADA85D0BEFBEFFF0B675B584F1877383D861DDD7B7083B57A7ED1990802E811D7032EE7862C
3,057,695 UART: Caliptra RT
3,057,946 UART: [state] CFI Enabled
3,175,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,665,791 >>> mbox cmd response: success
5,679,024 UART:
5,679,040 UART: Running Caliptra FMC ...
5,679,448 UART:
5,679,502 UART: [state] CFI Enabled
5,768,107 UART: [art] Extend RT PCRs Done
5,768,535 UART: [art] Lock RT PCRs Done
5,769,510 UART: [art] Populate DV Done
5,777,767 UART: [fht] FMC Alias Private Key: 7
5,778,851 UART: [art] Derive CDI
5,779,131 UART: [art] Store in slot 0x4
5,864,818 UART: [art] Derive Key Pair
5,865,178 UART: [art] Store priv key in slot 0x5
5,878,338 UART: [art] Derive Key Pair - Done
5,893,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,908,172 UART: [art] Erasing AUTHORITY.KEYID = 7
5,908,937 UART: [art] PUB.X = 1BC8BC74FECFED2706829677180D7C4F47848B622F8C3E64CA3448F5BFB94A868F1AE32E40445ADA398C058B73EC884B
5,915,708 UART: [art] PUB.Y = 7D53572422666D87395381E1DF8B9B57A564FB2CCEF8D3F8ADD347A8778307826E9DBCC9900B1E727F1D1C22EB16B753
5,922,656 UART: [art] SIG.R = BD191A9AB7C0F13C84B4BE630D6ADF9AC1B98A60626A8D6F83D58401A6D847F5BF68AA6581B12056CC7C7BA7051D12B7
5,929,431 UART: [art] SIG.S = 5959DB8C2190276BF04F16F0779A6C88DAD2A385E44EC92310EA5708F60D08CFD7456735ED3E97D162FFA33D1D9FE78E
5,953,614 UART: Caliptra RT
5,953,865 UART: [state] CFI Enabled
6,322,537 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,588 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,079 UART: [cold-reset] ++
1,170,459 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,174,225 ready_for_fw is high
1,174,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,940 UART: [idev] Erasing UDS.KEYID = 0
1,198,750 UART: [idev] Sha1 KeyId Algorithm
1,207,488 UART: [idev] --
1,208,723 UART: [ldev] ++
1,208,891 UART: [ldev] CDI.KEYID = 6
1,209,255 UART: [ldev] SUBJECT.KEYID = 5
1,209,682 UART: [ldev] AUTHORITY.KEYID = 7
1,210,145 UART: [ldev] FE.KEYID = 1
1,215,305 UART: [ldev] Erasing FE.KEYID = 1
1,241,684 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,171 UART: [ldev] --
1,280,404 UART: [fwproc] Wait for Commands...
1,281,023 UART: [fwproc] Recv command 0x46574c44
1,281,756 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,968 >>> mbox cmd response: success
2,824,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,196 UART: [afmc] ++
2,826,364 UART: [afmc] CDI.KEYID = 6
2,826,727 UART: [afmc] SUBJECT.KEYID = 7
2,827,153 UART: [afmc] AUTHORITY.KEYID = 5
2,862,442 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,612 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,203 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,904 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,511 UART: [afmc] --
2,905,462 UART: [cold-reset] --
2,906,248 UART: [state] Locking Datavault
2,907,461 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,065 UART: [state] Locking ICCM
2,908,713 UART: [exit] Launching FMC @ 0x40000130
2,914,043 UART:
2,914,059 UART: Running Caliptra FMC ...
2,914,467 UART:
2,914,610 UART: [state] CFI Enabled
2,925,302 UART: [fht] FMC Alias Private Key: 7
3,044,516 UART: [art] Extend RT PCRs Done
3,044,944 UART: [art] Lock RT PCRs Done
3,046,312 UART: [art] Populate DV Done
3,054,431 UART: [fht] FMC Alias Private Key: 7
3,055,481 UART: [art] Derive CDI
3,055,761 UART: [art] Store in slot 0x4
3,141,250 UART: [art] Derive Key Pair
3,141,610 UART: [art] Store priv key in slot 0x5
3,155,146 UART: [art] Derive Key Pair - Done
3,169,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,173 UART: [art] PUB.X = 61F70FE7036FFC23729B6A2F3EDB49B9D01F217DE1FA9D5297447E2FAD799695F27AD863BC02058D4E5D30BAF159F660
3,192,941 UART: [art] PUB.Y = 0877E162518BB34EDBDFE733DE0D8AE8595AA377C288A410761311B638D083D93D9B492292CC8D586D0514C89D0550A1
3,199,877 UART: [art] SIG.R = 2A831021DA2150B4350946DBD2204ADACB5F2747C3C69D334ABC40FB850591C2B118B08530371671A4404A1EBD0D120B
3,206,635 UART: [art] SIG.S = 191548F0231241CD7C7C66BC241A45EC4B413D2B215D28582CDA7BB3A33F88B79A406AC5530ED42FC6C45FFA1F4C1ACD
3,230,560 UART: Caliptra RT
3,230,903 UART: [state] CFI Enabled
3,350,793 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,595 UART:
3,352,611 UART: Running Caliptra ROM ...
3,353,019 UART:
3,353,161 UART: [state] CFI Enabled
3,355,529 UART: [state] LifecycleState = Unprovisioned
3,356,184 UART: [state] DebugLocked = No
3,356,702 UART: [state] WD Timer not started. Device not locked for debugging
3,358,018 UART: [kat] SHA2-256
4,161,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,672 UART: [kat] ++
4,165,824 UART: [kat] sha1
4,169,878 UART: [kat] SHA2-256
4,171,818 UART: [kat] SHA2-384
4,174,489 UART: [kat] SHA2-512-ACC
4,176,389 UART: [kat] ECC-384
4,186,134 UART: [kat] HMAC-384Kdf
4,190,780 UART: [kat] LMS
4,439,092 UART: [kat] --
4,440,086 UART: [update-reset] ++
5,799,935 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,801,146 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,956,361 >>> mbox cmd response: success
5,956,504 UART: [update-reset] Copying MAN_2 To MAN_1
5,964,518 UART: [update-reset Success] --
5,965,411 UART: [state] Locking Datavault
5,966,119 UART: [state] Locking PCR0, PCR1 and PCR31
5,966,723 UART: [state] Locking ICCM
5,967,289 UART: [exit] Launching FMC @ 0x40000130
5,972,619 UART:
5,972,635 UART: Running Caliptra FMC ...
5,973,043 UART:
5,973,186 UART: [state] CFI Enabled
6,062,637 UART: [art] Extend RT PCRs Done
6,063,065 UART: [art] Lock RT PCRs Done
6,064,562 UART: [art] Populate DV Done
6,072,827 UART: [fht] FMC Alias Private Key: 7
6,073,837 UART: [art] Derive CDI
6,074,117 UART: [art] Store in slot 0x4
6,160,098 UART: [art] Derive Key Pair
6,160,458 UART: [art] Store priv key in slot 0x5
6,173,768 UART: [art] Derive Key Pair - Done
6,188,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,204,742 UART: [art] Erasing AUTHORITY.KEYID = 7
6,205,507 UART: [art] PUB.X = D1E768E0E7C10CC9737A6D2261501C6773DDA279E8C87ACA722AD171224B657D5602232D279AEDD678406AB09DB9048C
6,212,270 UART: [art] PUB.Y = 574857D9FE137F8CA2035B82E8AECD3B28C8071D57D9975D3D421C6A61F9FADE17B93A8BDFEFB02E67510F44CBEC7E31
6,219,229 UART: [art] SIG.R = CB4DECF6D05D3EA5818271954E4048002680D310956E834057FC45B5AD3D1F464BE7497ED60DB71B69B8F6C30B37A9B7
6,225,975 UART: [art] SIG.S = C5A462F2F3C138B77D39352C4F873AAEB5712E72120B735A23FDC2B2DB8809A9BF6AC136BCC96F8259B4EACEA4A20BCE
6,249,976 UART: Caliptra RT
6,250,319 UART: [state] CFI Enabled
6,617,264 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,503 ready_for_fw is high
1,059,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,773 >>> mbox cmd response: success
2,680,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,743,630 UART:
2,743,646 UART: Running Caliptra FMC ...
2,744,054 UART:
2,744,197 UART: [state] CFI Enabled
2,754,631 UART: [fht] FMC Alias Private Key: 7
2,873,565 UART: [art] Extend RT PCRs Done
2,873,993 UART: [art] Lock RT PCRs Done
2,875,481 UART: [art] Populate DV Done
2,883,558 UART: [fht] FMC Alias Private Key: 7
2,884,686 UART: [art] Derive CDI
2,884,966 UART: [art] Store in slot 0x4
2,971,251 UART: [art] Derive Key Pair
2,971,611 UART: [art] Store priv key in slot 0x5
2,985,185 UART: [art] Derive Key Pair - Done
2,999,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,261 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,026 UART: [art] PUB.X = F281F6F1E72D0E2AF6D65BFE67F2957CE8A72D49209A90B6FF1F57AB8BCFA2217017E873CCD441CEF41E979BD36919F3
3,022,809 UART: [art] PUB.Y = 65BEC01A6CCAE7905C2761822060A18E9FABE3B7BD735237C81A01D97761F5CAC437E54A7668756F89E6BC1F002378EA
3,029,740 UART: [art] SIG.R = C1EEBBE9AB3B4FFA06954968E8C9C851328FA339DC3F2D1EB40E20D142103F49A1A775111903CF7229A7BBCB5E28F3CA
3,036,517 UART: [art] SIG.S = DF1C03919312C07B02D4E880D488F52AC108D10422B7F03221E0D6E7A1A1B568376854BF81880C2BA47E105291B82F49
3,060,182 UART: Caliptra RT
3,060,525 UART: [state] CFI Enabled
3,180,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,671,497 >>> mbox cmd response: success
5,684,758 UART:
5,684,774 UART: Running Caliptra FMC ...
5,685,182 UART:
5,685,325 UART: [state] CFI Enabled
5,774,230 UART: [art] Extend RT PCRs Done
5,774,658 UART: [art] Lock RT PCRs Done
5,775,891 UART: [art] Populate DV Done
5,784,072 UART: [fht] FMC Alias Private Key: 7
5,785,146 UART: [art] Derive CDI
5,785,426 UART: [art] Store in slot 0x4
5,871,047 UART: [art] Derive Key Pair
5,871,407 UART: [art] Store priv key in slot 0x5
5,885,317 UART: [art] Derive Key Pair - Done
5,900,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,916,709 UART: [art] Erasing AUTHORITY.KEYID = 7
5,917,474 UART: [art] PUB.X = 33D73C136C42023DF21B46F0F97B8C98616C94365578152055E6211847BD6E36EBDD83D358A8921D4A27EA14E47356C6
5,924,233 UART: [art] PUB.Y = C46E97DC1F726CAC1EBA6CFC740F2BF39ADE083F9874EA3A3464973E641408B481D18CCD4CC0BCADA8C6E9C9FFF9D62C
5,931,202 UART: [art] SIG.R = B9B3EDD1CE265D21C7D3FB5F48E825BA2E7E7BCBB2458DFC2FF7A148AF1559B26935F58E47ABA88FCF9778D61F062805
5,937,986 UART: [art] SIG.S = 5A378BAA6A67876992D9845B1B1892D8256B761CEBD5F89C1C253DFA9B6B2FA1B768FAF8B9D6ABC1D80EB548EF3B4903
5,961,766 UART: Caliptra RT
5,962,109 UART: [state] CFI Enabled
6,330,545 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,815 UART: [state] WD Timer not started. Device not locked for debugging
88,096 UART: [kat] SHA2-256
893,746 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,871 UART: [kat] ++
898,023 UART: [kat] sha1
902,205 UART: [kat] SHA2-256
904,145 UART: [kat] SHA2-384
906,904 UART: [kat] SHA2-512-ACC
908,805 UART: [kat] ECC-384
918,476 UART: [kat] HMAC-384Kdf
922,988 UART: [kat] LMS
1,171,316 UART: [kat] --
1,171,965 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,175,058 UART: [idev] ++
1,175,226 UART: [idev] CDI.KEYID = 6
1,175,586 UART: [idev] SUBJECT.KEYID = 7
1,176,010 UART: [idev] UDS.KEYID = 0
1,176,355 ready_for_fw is high
1,176,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,637 UART: [idev] --
1,210,739 UART: [ldev] ++
1,210,907 UART: [ldev] CDI.KEYID = 6
1,211,270 UART: [ldev] SUBJECT.KEYID = 5
1,211,696 UART: [ldev] AUTHORITY.KEYID = 7
1,212,159 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,243,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,949 UART: [ldev] --
1,283,382 UART: [fwproc] Wait for Commands...
1,283,960 UART: [fwproc] Recv command 0x46574c44
1,284,688 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,825 >>> mbox cmd response: success
2,828,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,830,071 UART: [afmc] ++
2,830,239 UART: [afmc] CDI.KEYID = 6
2,830,601 UART: [afmc] SUBJECT.KEYID = 7
2,831,026 UART: [afmc] AUTHORITY.KEYID = 5
2,866,031 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,219 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,145 UART: [afmc] --
2,909,081 UART: [cold-reset] --
2,909,913 UART: [state] Locking Datavault
2,911,056 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,660 UART: [state] Locking ICCM
2,912,188 UART: [exit] Launching FMC @ 0x40000130
2,917,518 UART:
2,917,534 UART: Running Caliptra FMC ...
2,917,942 UART:
2,917,996 UART: [state] CFI Enabled
2,928,278 UART: [fht] FMC Alias Private Key: 7
3,047,758 UART: [art] Extend RT PCRs Done
3,048,186 UART: [art] Lock RT PCRs Done
3,049,720 UART: [art] Populate DV Done
3,057,871 UART: [fht] FMC Alias Private Key: 7
3,058,829 UART: [art] Derive CDI
3,059,109 UART: [art] Store in slot 0x4
3,145,092 UART: [art] Derive Key Pair
3,145,452 UART: [art] Store priv key in slot 0x5
3,158,730 UART: [art] Derive Key Pair - Done
3,173,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,452 UART: [art] PUB.X = 10A05A3BEEE9282BE848A7C699216CDD97A60E43735421D6B4238E2ED4B53F11EC1364F85AF880BF452E61306CF4B32E
3,196,225 UART: [art] PUB.Y = 87903314CAF2CE4A1D6FE383C4887D7C89C940A625BF0FBB9EA5E4FDAB139AA66CABAA688B56DE233BEF27114D8E7C7A
3,203,196 UART: [art] SIG.R = BF42EFADE5E1ADCF0EA57A4D826548D62AC6D81F52FC3AA44DFD00406ECA0688BE4EEBD27E258013D1B10A8337575706
3,209,952 UART: [art] SIG.S = 398F47B47311629DDD8385DDE81A61476F8F9660F598B554CA80A96B2831C6293F574DF1A80D9FA0E60ABCDF7DF58BD4
3,233,184 UART: Caliptra RT
3,233,435 UART: [state] CFI Enabled
3,354,222 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,254 UART:
3,356,270 UART: Running Caliptra ROM ...
3,356,678 UART:
3,356,733 UART: [state] CFI Enabled
3,359,295 UART: [state] LifecycleState = Unprovisioned
3,359,950 UART: [state] DebugLocked = No
3,360,490 UART: [state] WD Timer not started. Device not locked for debugging
3,361,830 UART: [kat] SHA2-256
4,167,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,605 UART: [kat] ++
4,171,757 UART: [kat] sha1
4,175,993 UART: [kat] SHA2-256
4,177,933 UART: [kat] SHA2-384
4,180,696 UART: [kat] SHA2-512-ACC
4,182,596 UART: [kat] ECC-384
4,192,199 UART: [kat] HMAC-384Kdf
4,196,931 UART: [kat] LMS
4,445,259 UART: [kat] --
4,446,075 UART: [update-reset] ++
5,805,175 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,806,302 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,961,517 >>> mbox cmd response: success
5,961,812 UART: [update-reset] Copying MAN_2 To MAN_1
5,969,826 UART: [update-reset Success] --
5,970,837 UART: [state] Locking Datavault
5,971,671 UART: [state] Locking PCR0, PCR1 and PCR31
5,972,275 UART: [state] Locking ICCM
5,972,827 UART: [exit] Launching FMC @ 0x40000130
5,978,157 UART:
5,978,173 UART: Running Caliptra FMC ...
5,978,581 UART:
5,978,635 UART: [state] CFI Enabled
6,067,584 UART: [art] Extend RT PCRs Done
6,068,012 UART: [art] Lock RT PCRs Done
6,069,471 UART: [art] Populate DV Done
6,077,610 UART: [fht] FMC Alias Private Key: 7
6,078,702 UART: [art] Derive CDI
6,078,982 UART: [art] Store in slot 0x4
6,164,411 UART: [art] Derive Key Pair
6,164,771 UART: [art] Store priv key in slot 0x5
6,178,567 UART: [art] Derive Key Pair - Done
6,193,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,209,020 UART: [art] Erasing AUTHORITY.KEYID = 7
6,209,785 UART: [art] PUB.X = EE03B2D07A9978234D3B8366C50E8C6512F9B8ABB5C5FA47D566FC511DAFA6E23C3634982DC0C1B8483CFBCF8A604003
6,216,558 UART: [art] PUB.Y = 565C61C3475DB3E96CA1B2EC5058AB2D90185BCE0E820B7F30157C105EF23A02C4841CC91FD1F92BAFEF3A6253F2BCB4
6,223,515 UART: [art] SIG.R = FEC232791689D7BB0276CBE8B4D8E06138C43515549765008DBE608268BC38F7FB848B33E5827ED74414C275A1DD1C41
6,230,258 UART: [art] SIG.S = 606A2988DC797F530994D414875867B290BE43962A427689E4037AB3E4FF51C7B1D4215683757740A4BA4738622D4F07
6,253,863 UART: Caliptra RT
6,254,114 UART: [state] CFI Enabled
6,619,612 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,661 ready_for_fw is high
1,059,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,768 >>> mbox cmd response: success
2,678,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,273 UART:
2,740,289 UART: Running Caliptra FMC ...
2,740,697 UART:
2,740,751 UART: [state] CFI Enabled
2,751,177 UART: [fht] FMC Alias Private Key: 7
2,870,065 UART: [art] Extend RT PCRs Done
2,870,493 UART: [art] Lock RT PCRs Done
2,872,161 UART: [art] Populate DV Done
2,880,614 UART: [fht] FMC Alias Private Key: 7
2,881,712 UART: [art] Derive CDI
2,881,992 UART: [art] Store in slot 0x4
2,967,655 UART: [art] Derive Key Pair
2,968,015 UART: [art] Store priv key in slot 0x5
2,981,031 UART: [art] Derive Key Pair - Done
2,995,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,231 UART: [art] PUB.X = 9B955AFF813BFD06279ACD55FC3E83875AA56E9B2332F5F9EE2C54727FE896323A4021DAF97D52321DC31EF2EA9D6F69
3,019,010 UART: [art] PUB.Y = 35ED1F3FF7A2E9B14B80AB581AD5A92A584CAC91E921CB8CB71FDD2F3642652C8695ACC0BEBB89257C584477149E8E91
3,025,974 UART: [art] SIG.R = 897D756715F2928D908ACB7F12E545137CC1064FB6125D486D67CDEA2AF2B5213443BDF46E7A30E63064ABEDFD8A73ED
3,032,751 UART: [art] SIG.S = 68EA6E6A43DD4DE97C3941E1EAC18E2291E6326CC965657BE56F5448270AE4B4AD7801C9211D59A4F8175F0542128D70
3,057,472 UART: Caliptra RT
3,057,723 UART: [state] CFI Enabled
3,177,796 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,669,464 >>> mbox cmd response: success
5,683,109 UART:
5,683,125 UART: Running Caliptra FMC ...
5,683,533 UART:
5,683,587 UART: [state] CFI Enabled
5,772,108 UART: [art] Extend RT PCRs Done
5,772,536 UART: [art] Lock RT PCRs Done
5,774,005 UART: [art] Populate DV Done
5,782,184 UART: [fht] FMC Alias Private Key: 7
5,783,172 UART: [art] Derive CDI
5,783,452 UART: [art] Store in slot 0x4
5,869,697 UART: [art] Derive Key Pair
5,870,057 UART: [art] Store priv key in slot 0x5
5,883,127 UART: [art] Derive Key Pair - Done
5,897,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,913,547 UART: [art] Erasing AUTHORITY.KEYID = 7
5,914,312 UART: [art] PUB.X = 4914B5E4E483D0693AA228046557293B4D4CD25E1AA6B709A40B5224FD9B6DCBC2122685159801AA7A598B48A5A1D08F
5,921,070 UART: [art] PUB.Y = D0E7AF92EA1C562BFF338147778983FDC253CB0FE0E0EB49173832527FC86F9702E441678D3F85FA005F75BD2F237CCD
5,928,000 UART: [art] SIG.R = 7CD476DA7AFCB650517EBBCD32FA4EFE39A7D3382A7366E5078BFDACD99F59A8A3D547345F93E828076A1560CEEB17E5
5,934,782 UART: [art] SIG.S = 18866515A12C572FDC05944641B5CE0FE1F4E4B37FB2337C809C03F7D4F65BE1F61798D1647693B8CA616DC78CD3A3AF
5,958,925 UART: Caliptra RT
5,959,176 UART: [state] CFI Enabled
6,323,747 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,205 UART: [state] LifecycleState = Unprovisioned
85,860 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,201 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,220 UART: [cold-reset] ++
1,172,630 UART: [fht] FHT @ 0x50003400
1,175,243 UART: [idev] ++
1,175,411 UART: [idev] CDI.KEYID = 6
1,175,771 UART: [idev] SUBJECT.KEYID = 7
1,176,195 UART: [idev] UDS.KEYID = 0
1,176,540 ready_for_fw is high
1,176,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,147 UART: [idev] Erasing UDS.KEYID = 0
1,201,516 UART: [idev] Sha1 KeyId Algorithm
1,210,038 UART: [idev] --
1,211,252 UART: [ldev] ++
1,211,420 UART: [ldev] CDI.KEYID = 6
1,211,783 UART: [ldev] SUBJECT.KEYID = 5
1,212,209 UART: [ldev] AUTHORITY.KEYID = 7
1,212,672 UART: [ldev] FE.KEYID = 1
1,217,956 UART: [ldev] Erasing FE.KEYID = 1
1,244,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,830 UART: [ldev] --
1,284,305 UART: [fwproc] Wait for Commands...
1,285,019 UART: [fwproc] Recv command 0x46574c44
1,285,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,631 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,188 >>> mbox cmd response: success
2,828,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,829,304 UART: [afmc] ++
2,829,472 UART: [afmc] CDI.KEYID = 6
2,829,834 UART: [afmc] SUBJECT.KEYID = 7
2,830,259 UART: [afmc] AUTHORITY.KEYID = 5
2,865,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,927 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,628 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,384 UART: [afmc] --
2,908,276 UART: [cold-reset] --
2,909,002 UART: [state] Locking Datavault
2,910,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,611 UART: [state] Locking ICCM
2,911,153 UART: [exit] Launching FMC @ 0x40000130
2,916,483 UART:
2,916,499 UART: Running Caliptra FMC ...
2,916,907 UART:
2,917,050 UART: [state] CFI Enabled
2,927,732 UART: [fht] FMC Alias Private Key: 7
3,047,248 UART: [art] Extend RT PCRs Done
3,047,676 UART: [art] Lock RT PCRs Done
3,049,374 UART: [art] Populate DV Done
3,057,291 UART: [fht] FMC Alias Private Key: 7
3,058,363 UART: [art] Derive CDI
3,058,643 UART: [art] Store in slot 0x4
3,144,738 UART: [art] Derive Key Pair
3,145,098 UART: [art] Store priv key in slot 0x5
3,158,246 UART: [art] Derive Key Pair - Done
3,173,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,295 UART: [art] PUB.X = 36542F1CADA794E058E0157D899688E47798C40C7264B7C17BBA0ED06C2396DA8FC81EA032EAE9DE6D7679EB81574132
3,196,063 UART: [art] PUB.Y = 4C30525342F8ABD1CD79587B7D7C0E62CD0BB820810D15507068C94868262BD02C0139A140C6E44B5DC29D39F5127B91
3,202,997 UART: [art] SIG.R = 68CDC36E55ECFEAF143C5480317500D846E114001EE720F5319581D995783F150ED1986938F488199FA6458E69F2D445
3,209,710 UART: [art] SIG.S = 73C1A5AC46DCAC1D68E8AA68D82808775DD51106EB56F2CAE7557D4A1B73529F78A71FE5AFC61FCDCDB1EBE5219535EF
3,233,594 UART: Caliptra RT
3,233,937 UART: [state] CFI Enabled
3,353,781 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,547 UART:
3,355,563 UART: Running Caliptra ROM ...
3,355,971 UART:
3,356,113 UART: [state] CFI Enabled
3,358,871 UART: [state] LifecycleState = Unprovisioned
3,359,526 UART: [state] DebugLocked = No
3,360,020 UART: [state] WD Timer not started. Device not locked for debugging
3,361,280 UART: [kat] SHA2-256
4,166,930 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,171,055 UART: [kat] ++
4,171,207 UART: [kat] sha1
4,175,629 UART: [kat] SHA2-256
4,177,569 UART: [kat] SHA2-384
4,180,170 UART: [kat] SHA2-512-ACC
4,182,070 UART: [kat] ECC-384
4,191,859 UART: [kat] HMAC-384Kdf
4,196,479 UART: [kat] LMS
4,444,807 UART: [kat] --
4,445,761 UART: [update-reset] ++
5,804,773 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,805,952 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,961,167 >>> mbox cmd response: success
5,961,280 UART: [update-reset] Copying MAN_2 To MAN_1
5,969,294 UART: [update-reset Success] --
5,970,261 UART: [state] Locking Datavault
5,971,047 UART: [state] Locking PCR0, PCR1 and PCR31
5,971,651 UART: [state] Locking ICCM
5,972,307 UART: [exit] Launching FMC @ 0x40000130
5,977,637 UART:
5,977,653 UART: Running Caliptra FMC ...
5,978,061 UART:
5,978,204 UART: [state] CFI Enabled
6,067,675 UART: [art] Extend RT PCRs Done
6,068,103 UART: [art] Lock RT PCRs Done
6,069,478 UART: [art] Populate DV Done
6,077,973 UART: [fht] FMC Alias Private Key: 7
6,078,985 UART: [art] Derive CDI
6,079,265 UART: [art] Store in slot 0x4
6,165,402 UART: [art] Derive Key Pair
6,165,762 UART: [art] Store priv key in slot 0x5
6,179,074 UART: [art] Derive Key Pair - Done
6,193,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,208,826 UART: [art] Erasing AUTHORITY.KEYID = 7
6,209,591 UART: [art] PUB.X = B9F7BC4AB1F1BF7758516FE13A156FD1E931D045BC44E43F12671A32A0C098EF5D13139AF7697123FFCF0A60EC49F6F9
6,216,370 UART: [art] PUB.Y = AA01E978D958552DCBD055358E7FF008C142421ED96881C161575AEFE7BB6C2C364EC2B0E1B20185791518F712165220
6,223,307 UART: [art] SIG.R = 71A403C1713096DB8DCC2B1B322A0055805C1D37D769513F19C28CBDC45D9CB58CC4D299F379A28D07667508667DBB17
6,230,046 UART: [art] SIG.S = C127D3D04F5BBAAAE503A2138E45BF47977ABDAA3576B669F89D4F45BD9B2E24BBAE5D16B2CB267A10399D623B46CBC4
6,253,361 UART: Caliptra RT
6,253,704 UART: [state] CFI Enabled
6,617,478 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,324 ready_for_fw is high
1,061,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,257 >>> mbox cmd response: success
2,682,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,744,718 UART:
2,744,734 UART: Running Caliptra FMC ...
2,745,142 UART:
2,745,285 UART: [state] CFI Enabled
2,755,819 UART: [fht] FMC Alias Private Key: 7
2,874,857 UART: [art] Extend RT PCRs Done
2,875,285 UART: [art] Lock RT PCRs Done
2,876,863 UART: [art] Populate DV Done
2,885,012 UART: [fht] FMC Alias Private Key: 7
2,886,020 UART: [art] Derive CDI
2,886,300 UART: [art] Store in slot 0x4
2,972,181 UART: [art] Derive Key Pair
2,972,541 UART: [art] Store priv key in slot 0x5
2,986,213 UART: [art] Derive Key Pair - Done
3,001,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,153 UART: [art] PUB.X = 31D3BA04904DAD2043E16D1D5475248D2D407C869DD74E334A5FBAE7A2E39746893BB31991D8A42B52FE88924B2FB8AD
3,023,926 UART: [art] PUB.Y = F9741BA79F63FF157E158A02A1EB6667BF46EFC906C194C62F7D2218965476FD2E94A28AD4563583673BBAD9F7C4D98D
3,030,876 UART: [art] SIG.R = 2E70E330A099992D285EE44F8C8703E2DEA7B2278C8147B8E20C93F341A8BC0FCBF08E945A8040401A40D7875D11C0B5
3,037,639 UART: [art] SIG.S = 4A8A261CC7B15AD346F44AB7D80DF51F6F1D37D8BC08943B67F8D34C3C7FB9738B842AA850658F86E11C1818EFAE5E01
3,061,536 UART: Caliptra RT
3,061,879 UART: [state] CFI Enabled
3,181,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,672,508 >>> mbox cmd response: success
5,685,995 UART:
5,686,011 UART: Running Caliptra FMC ...
5,686,419 UART:
5,686,562 UART: [state] CFI Enabled
5,776,145 UART: [art] Extend RT PCRs Done
5,776,573 UART: [art] Lock RT PCRs Done
5,777,726 UART: [art] Populate DV Done
5,785,797 UART: [fht] FMC Alias Private Key: 7
5,786,793 UART: [art] Derive CDI
5,787,073 UART: [art] Store in slot 0x4
5,872,764 UART: [art] Derive Key Pair
5,873,124 UART: [art] Store priv key in slot 0x5
5,886,482 UART: [art] Derive Key Pair - Done
5,901,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,916,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,917,071 UART: [art] PUB.X = 69DB4B7D0B963D4C1D0F2149200F4E4EC557B0CC9D758C82C0A1EA2FD50F6403AACC5006E0B1F48AD0ABCFFF8388D34C
5,923,845 UART: [art] PUB.Y = A95CD3A411D0CAB5C5618CDF78E042559D17B485D989F7D56BC7FF1C3FBF2A5711EFE2F15AB054AF6F2639EEC195EF13
5,930,815 UART: [art] SIG.R = 4776B141AF415A59D18C75432720C280CD1FF6BA001A8388945284945864CDB81AF02C0D9C3C9EE5C9CF120BD714B3AB
5,937,561 UART: [art] SIG.S = 52E513CD35F7ADB2D4AAB46B4C714EC46D5ECE067F94CB257D236F9873F463F7CF6714E56E33D2B6DF77ADB0DCD93908
5,961,597 UART: Caliptra RT
5,961,940 UART: [state] CFI Enabled
6,328,039 UART: [rt] RT listening for mailbox commands...
test test_boot::test_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,157 UART:
192,521 UART: Running Caliptra ROM ...
193,627 UART:
193,772 UART: [state] CFI Enabled
265,787 UART: [state] LifecycleState = Unprovisioned
267,740 UART: [state] DebugLocked = No
269,765 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,879 UART: [kat] SHA2-256
444,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,090 UART: [kat] ++
455,632 UART: [kat] sha1
465,449 UART: [kat] SHA2-256
468,106 UART: [kat] SHA2-384
474,452 UART: [kat] SHA2-512-ACC
476,825 UART: [kat] ECC-384
2,767,663 UART: [kat] HMAC-384Kdf
2,799,655 UART: [kat] LMS
3,989,996 UART: [kat] --
3,994,442 UART: [cold-reset] ++
3,996,382 UART: [fht] Storing FHT @ 0x50003400
4,008,568 UART: [idev] ++
4,009,140 UART: [idev] CDI.KEYID = 6
4,010,054 UART: [idev] SUBJECT.KEYID = 7
4,011,328 UART: [idev] UDS.KEYID = 0
4,012,374 ready_for_fw is high
4,012,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,652 UART: [idev] Erasing UDS.KEYID = 0
7,344,852 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,484 UART: [idev] --
7,370,427 UART: [ldev] ++
7,370,999 UART: [ldev] CDI.KEYID = 6
7,372,017 UART: [ldev] SUBJECT.KEYID = 5
7,373,186 UART: [ldev] AUTHORITY.KEYID = 7
7,374,343 UART: [ldev] FE.KEYID = 1
7,414,610 UART: [ldev] Erasing FE.KEYID = 1
10,750,367 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,932 UART: [ldev] --
13,130,141 UART: [fwproc] Waiting for Commands...
13,132,453 UART: [fwproc] Received command 0x46574c44
13,134,634 UART: [fwproc] Received Image of size 118548 bytes
17,238,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,314,961 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,716,530 >>> mbox cmd response: success
17,720,563 UART: [afmc] ++
17,721,175 UART: [afmc] CDI.KEYID = 6
17,722,093 UART: [afmc] SUBJECT.KEYID = 7
17,723,374 UART: [afmc] AUTHORITY.KEYID = 5
21,082,709 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,381,604 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,383,866 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,398,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,413,014 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,427,417 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,450,217 UART: [afmc] --
23,453,218 UART: [cold-reset] --
23,455,508 UART: [state] Locking Datavault
23,460,486 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,236 UART: [state] Locking ICCM
23,463,466 UART: [exit] Launching FMC @ 0x40000130
23,471,871 UART:
23,472,160 UART: Running Caliptra FMC ...
23,473,273 UART:
23,473,437 UART: [state] CFI Enabled
23,542,155 UART: [fht] FMC Alias Private Key: 7
25,882,272 UART: [art] Extend RT PCRs Done
25,883,500 UART: [art] Lock RT PCRs Done
25,884,954 UART: [art] Populate DV Done
25,890,424 UART: [fht] FMC Alias Private Key: 7
25,892,011 UART: [art] Derive CDI
25,892,756 UART: [art] Store in slot 0x4
25,951,094 UART: [art] Derive Key Pair
25,952,139 UART: [art] Store priv key in slot 0x5
29,245,103 UART: [art] Derive Key Pair - Done
29,257,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,389 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,894 UART: [art] PUB.X = 9FF8D3D64FA98AA0F32264F5B9AB872119462A630F9AB317AC8CDDE50F9A8B81FE566D01DFF2991A99BBCD2AF18FABEE
31,555,215 UART: [art] PUB.Y = 79A954D1225A2BE27D8D0E5A2F3E0B2B5A6127272B59A78709D8EC5D392243812ED00BB7E3E27D63BAF9CF4239B9ADF3
31,562,449 UART: [art] SIG.R = 899D0B9D6CA5BAE1207B3CF0BE075BB735D97C3AF5D69508D977F49B096E08C656E9960A2FECF6780334E77D79869B75
31,569,845 UART: [art] SIG.S = 4EBAB2633B65D23C6F10A9198855AE3AFF1306387B294C85BD6E17B336A17F62AA6509CC9D59A6B6F0F1145BA049FEBD
32,874,695 UART: Caliptra RT
32,875,405 UART: [state] CFI Enabled
33,050,673 UART: [rt] RT listening for mailbox commands...
33,052,601 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,083,125 UART: [rt]cmd =0x434b4558, len=80
38,821,353 >>> mbox cmd response data (6280 bytes)
38,855,122 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,885,179 UART: [rt]cmd =0x414c544e, len=41
38,887,522 >>> mbox cmd response data (8 bytes)
38,888,108 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,918,568 UART: [rt]cmd =0x434b4558, len=80
44,664,939 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
3,783,291 ready_for_fw is high
3,783,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,938,599 >>> mbox cmd response: success
23,632,267 UART:
23,632,662 UART: Running Caliptra FMC ...
23,633,791 UART:
23,633,950 UART: [state] CFI Enabled
23,698,691 UART: [fht] FMC Alias Private Key: 7
26,038,915 UART: [art] Extend RT PCRs Done
26,040,138 UART: [art] Lock RT PCRs Done
26,041,658 UART: [art] Populate DV Done
26,047,018 UART: [fht] FMC Alias Private Key: 7
26,048,628 UART: [art] Derive CDI
26,049,451 UART: [art] Store in slot 0x4
26,107,204 UART: [art] Derive Key Pair
26,108,267 UART: [art] Store priv key in slot 0x5
29,400,978 UART: [art] Derive Key Pair - Done
29,413,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,774 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,280 UART: [art] PUB.X = 6842C5A379CB0ACD55EF7068FB29DB9C651DE8D80C2B924EA492C31B33D946BAEF0F1574E9BA992A380A0E6021E6025B
31,710,585 UART: [art] PUB.Y = D96F9FE5BF0521040544E0F0F8F144E8248986348C99E144386685DE5E51BF47939CB6E8D6FCB83CD5E4458A541D2095
31,717,819 UART: [art] SIG.R = 30F1C265FE464AA917AC6E027E902C17E49A0D3C2CD746F0EC3946D2FF562C14F8AA5BAF9B62E7CD9B3C022EAC5E43F1
31,725,270 UART: [art] SIG.S = F9D24B419CF7F52C1C56751FCAF399281ACFD5ACDDA9CF528FE8440C503AA7DBF19571A6AFA6242842505569F4B2A1E7
33,030,872 UART: Caliptra RT
33,031,586 UART: [state] CFI Enabled
33,208,741 UART: [rt] RT listening for mailbox commands...
33,210,638 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,240,939 UART: [rt]cmd =0x434b4558, len=80
38,977,101 >>> mbox cmd response data (6280 bytes)
39,010,623 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
39,040,926 UART: [rt]cmd =0x414c544e, len=41
39,043,323 >>> mbox cmd response data (8 bytes)
39,043,885 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
39,074,220 UART: [rt]cmd =0x434b4558, len=80
44,822,283 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,505 UART:
192,859 UART: Running Caliptra ROM ...
194,002 UART:
603,957 UART: [state] CFI Enabled
620,387 UART: [state] LifecycleState = Unprovisioned
622,356 UART: [state] DebugLocked = No
624,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,878 UART: [kat] SHA2-256
799,678 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,196 UART: [kat] ++
810,721 UART: [kat] sha1
820,390 UART: [kat] SHA2-256
823,102 UART: [kat] SHA2-384
829,794 UART: [kat] SHA2-512-ACC
832,222 UART: [kat] ECC-384
3,117,463 UART: [kat] HMAC-384Kdf
3,128,631 UART: [kat] LMS
4,318,758 UART: [kat] --
4,323,573 UART: [cold-reset] ++
4,325,930 UART: [fht] Storing FHT @ 0x50003400
4,336,688 UART: [idev] ++
4,337,242 UART: [idev] CDI.KEYID = 6
4,338,188 UART: [idev] SUBJECT.KEYID = 7
4,339,418 UART: [idev] UDS.KEYID = 0
4,340,366 ready_for_fw is high
4,340,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,625 UART: [idev] Erasing UDS.KEYID = 0
7,627,751 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,502 UART: [idev] --
7,654,006 UART: [ldev] ++
7,654,585 UART: [ldev] CDI.KEYID = 6
7,655,489 UART: [ldev] SUBJECT.KEYID = 5
7,656,745 UART: [ldev] AUTHORITY.KEYID = 7
7,657,966 UART: [ldev] FE.KEYID = 1
7,668,946 UART: [ldev] Erasing FE.KEYID = 1
10,959,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,769 UART: [ldev] --
13,320,429 UART: [fwproc] Waiting for Commands...
13,322,987 UART: [fwproc] Received command 0x46574c44
13,325,167 UART: [fwproc] Received Image of size 118548 bytes
17,431,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,268 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,172 >>> mbox cmd response: success
17,916,084 UART: [afmc] ++
17,916,705 UART: [afmc] CDI.KEYID = 6
17,917,803 UART: [afmc] SUBJECT.KEYID = 7
17,918,904 UART: [afmc] AUTHORITY.KEYID = 5
21,235,442 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,241 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,491 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,900 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,681 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,134 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,960 UART: [afmc] --
23,600,466 UART: [cold-reset] --
23,603,629 UART: [state] Locking Datavault
23,610,274 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,966 UART: [state] Locking ICCM
23,613,463 UART: [exit] Launching FMC @ 0x40000130
23,621,853 UART:
23,622,089 UART: Running Caliptra FMC ...
23,623,210 UART:
23,623,368 UART: [state] CFI Enabled
23,631,115 UART: [fht] FMC Alias Private Key: 7
25,971,450 UART: [art] Extend RT PCRs Done
25,972,671 UART: [art] Lock RT PCRs Done
25,974,239 UART: [art] Populate DV Done
25,979,482 UART: [fht] FMC Alias Private Key: 7
25,981,012 UART: [art] Derive CDI
25,981,772 UART: [art] Store in slot 0x4
26,024,494 UART: [art] Derive Key Pair
26,025,485 UART: [art] Store priv key in slot 0x5
29,267,897 UART: [art] Derive Key Pair - Done
29,280,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,388 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,895 UART: [art] PUB.X = CBE6606F47BF7C9311A127C7A9CAE44AF098B29DF24CDA1DD48C077353870BCA80CF5677E5BA5ED94FDAA907E3DC9241
31,570,209 UART: [art] PUB.Y = 0E5B2B78FECBB606EAB4C55F328EF0C387D8CA73BB0B6CCD060D526F59E25DA31B7830FCC150525605646EEDB85D7365
31,577,466 UART: [art] SIG.R = 1E0D4A539E7C0BF7CFCD37305EA50B294E71AA0B40D55FCA512845C2194C6624F6BAAF228057CFB094D189C4DB05F1CF
31,584,854 UART: [art] SIG.S = 019CD9F8442B860B0F17C9507D2B9AF924F315129CE31CAD228444DFA4489AFF9CEC5FBE7C4AC2EF531D35511A06E4BD
32,889,911 UART: Caliptra RT
32,890,624 UART: [state] CFI Enabled
33,024,608 UART: [rt] RT listening for mailbox commands...
33,026,517 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,056,976 UART: [rt]cmd =0x434b4558, len=80
38,717,898 >>> mbox cmd response data (6280 bytes)
38,751,378 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,781,455 UART: [rt]cmd =0x414c544e, len=41
38,783,629 >>> mbox cmd response data (8 bytes)
38,784,128 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,814,430 UART: [rt]cmd =0x434b4558, len=80
44,475,698 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,129,696 ready_for_fw is high
4,130,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,753 >>> mbox cmd response: success
23,807,129 UART:
23,807,516 UART: Running Caliptra FMC ...
23,808,833 UART:
23,809,002 UART: [state] CFI Enabled
23,816,322 UART: [fht] FMC Alias Private Key: 7
26,156,141 UART: [art] Extend RT PCRs Done
26,157,363 UART: [art] Lock RT PCRs Done
26,159,227 UART: [art] Populate DV Done
26,164,607 UART: [fht] FMC Alias Private Key: 7
26,166,210 UART: [art] Derive CDI
26,167,024 UART: [art] Store in slot 0x4
26,209,723 UART: [art] Derive Key Pair
26,210,717 UART: [art] Store priv key in slot 0x5
29,453,437 UART: [art] Derive Key Pair - Done
29,466,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,212 UART: [art] PUB.X = 57EC6AE8099621EEEF8E9092F8FF381EFC43666C07C5844027662C8CDC5B2EE1E4B60846EE1E97565CA92AD904785764
31,755,454 UART: [art] PUB.Y = 61A0CD242593F11D874230E2842E3C4A9DC8D13ADD72AD23EB977721F600233A7A416C66AB517D0B72D4E2C099B1CB8C
31,762,740 UART: [art] SIG.R = 72285B64AC07FC0446D649A991787F8E0DEF15930703C3B1D6BF11B5B29E1980C387C838EC48DBD8C8FFE6B96551BC92
31,770,147 UART: [art] SIG.S = F823BC13E54520E96B83B7919CE52A56A8FE5C964643D69CF42323B6693F6118B746BE51147EC810FBE8007A3F0CA866
33,075,539 UART: Caliptra RT
33,076,242 UART: [state] CFI Enabled
33,209,415 UART: [rt] RT listening for mailbox commands...
33,211,309 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,241,867 UART: [rt]cmd =0x434b4558, len=80
38,902,665 >>> mbox cmd response data (6280 bytes)
38,936,319 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
38,966,644 UART: [rt]cmd =0x414c544e, len=41
38,968,904 >>> mbox cmd response data (8 bytes)
38,969,389 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
38,999,789 UART: [rt]cmd =0x434b4558, len=80
44,659,864 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,132 UART:
192,577 UART: Running Caliptra ROM ...
193,714 UART:
193,859 UART: [state] CFI Enabled
264,536 UART: [state] LifecycleState = Unprovisioned
266,522 UART: [state] DebugLocked = No
268,546 UART: [state] WD Timer not started. Device not locked for debugging
273,160 UART: [kat] SHA2-256
452,805 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,617 UART: [kat] ++
464,148 UART: [kat] sha1
474,257 UART: [kat] SHA2-256
476,943 UART: [kat] SHA2-384
482,224 UART: [kat] SHA2-512-ACC
484,603 UART: [kat] ECC-384
2,949,229 UART: [kat] HMAC-384Kdf
2,970,767 UART: [kat] LMS
3,447,298 UART: [kat] --
3,452,001 UART: [cold-reset] ++
3,453,795 UART: [fht] FHT @ 0x50003400
3,466,970 UART: [idev] ++
3,467,527 UART: [idev] CDI.KEYID = 6
3,468,475 UART: [idev] SUBJECT.KEYID = 7
3,469,715 UART: [idev] UDS.KEYID = 0
3,470,614 ready_for_fw is high
3,470,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,915 UART: [idev] Erasing UDS.KEYID = 0
5,986,914 UART: [idev] Sha1 KeyId Algorithm
6,009,795 UART: [idev] --
6,015,872 UART: [ldev] ++
6,016,526 UART: [ldev] CDI.KEYID = 6
6,017,602 UART: [ldev] SUBJECT.KEYID = 5
6,018,710 UART: [ldev] AUTHORITY.KEYID = 7
6,019,884 UART: [ldev] FE.KEYID = 1
6,057,911 UART: [ldev] Erasing FE.KEYID = 1
8,564,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,321 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,225 UART: [ldev] --
10,375,182 UART: [fwproc] Wait for Commands...
10,377,642 UART: [fwproc] Recv command 0x46574c44
10,379,685 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,957 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,358,901 >>> mbox cmd response: success
14,362,500 UART: [afmc] ++
14,363,118 UART: [afmc] CDI.KEYID = 6
14,364,088 UART: [afmc] SUBJECT.KEYID = 7
14,365,252 UART: [afmc] AUTHORITY.KEYID = 5
16,899,335 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,587 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,787 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,568 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,656 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,197 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,550 UART: [afmc] --
18,716,643 UART: [cold-reset] --
18,719,701 UART: [state] Locking Datavault
18,725,807 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,574 UART: [state] Locking ICCM
18,729,829 UART: [exit] Launching FMC @ 0x40000130
18,738,219 UART:
18,738,446 UART: Running Caliptra FMC ...
18,739,541 UART:
18,739,694 UART: [state] CFI Enabled
18,797,135 UART: [fht] FMC Alias Private Key: 7
20,563,424 UART: [art] Extend RT PCRs Done
20,564,625 UART: [art] Lock RT PCRs Done
20,566,619 UART: [art] Populate DV Done
20,572,086 UART: [fht] FMC Alias Private Key: 7
20,573,739 UART: [art] Derive CDI
20,574,553 UART: [art] Store in slot 0x4
20,630,020 UART: [art] Derive Key Pair
20,631,053 UART: [art] Store priv key in slot 0x5
23,093,738 UART: [art] Derive Key Pair - Done
23,106,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,675 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,157 UART: [art] PUB.X = D54B88818B06AF805971226B5F54E07614546B95DAD03225FE7105D532D796C30F06E893AE75CCA17571E75ACC20013F
24,828,395 UART: [art] PUB.Y = 0AF1935F046D79EC720AC1E7E7E8B863FA53DAA240F8439DFE4549447E75F3E352C0A20F06EC30508F988C7DF08D3EBE
24,835,680 UART: [art] SIG.R = BCC0060270BFBD5C3F256669622F7237BAC02C32A63FCEE86274E487B481BE9BB6AA03F05E3541B4E0A491B30A5F24C9
24,843,071 UART: [art] SIG.S = 33CF84C11F27F21AD6059A94B4AE6FEB00CB35F07B0AFEC7EEAACE46614D409CF9B2A9D6874777BF8848AB6B40C7530F
25,822,056 UART: Caliptra RT
25,822,767 UART: [state] CFI Enabled
26,003,618 UART: [rt] RT listening for mailbox commands...
26,005,533 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,035,836 UART: [rt]cmd =0x434b4558, len=80
30,368,744 >>> mbox cmd response data (6280 bytes)
30,402,502 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,432,854 UART: [rt]cmd =0x414c544e, len=41
30,435,246 >>> mbox cmd response data (8 bytes)
30,435,834 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,466,083 UART: [rt]cmd =0x434b4558, len=80
34,805,596 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,461,507 ready_for_fw is high
3,462,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,528 >>> mbox cmd response: success
18,534,690 UART:
18,535,121 UART: Running Caliptra FMC ...
18,536,238 UART:
18,536,393 UART: [state] CFI Enabled
18,603,865 UART: [fht] FMC Alias Private Key: 7
20,369,670 UART: [art] Extend RT PCRs Done
20,370,891 UART: [art] Lock RT PCRs Done
20,372,599 UART: [art] Populate DV Done
20,377,852 UART: [fht] FMC Alias Private Key: 7
20,379,486 UART: [art] Derive CDI
20,380,230 UART: [art] Store in slot 0x4
20,436,590 UART: [art] Derive Key Pair
20,437,584 UART: [art] Store priv key in slot 0x5
22,900,363 UART: [art] Derive Key Pair - Done
22,913,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,038 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,525 UART: [art] PUB.X = C5E4B4C4677E307A5F46C4A3C2057A443DD2F9A9FED8EA25E7D32A7C541712CC2B4669CABA042245A17FA86EA149BD76
24,634,773 UART: [art] PUB.Y = 13282CB4FA91CE59D0D6E8CE76D00D160BCAEE78FEB08586E137E2EE84EE7E4A549F546DA4F8AF5F7E68058C7ADCB881
24,642,079 UART: [art] SIG.R = 0FAD1323144F597D043500F640D2BF6E788DACE57193DAC236657FC69FD9268457460CF590D05765754CF7EEC5812BD2
24,649,419 UART: [art] SIG.S = 67D7691515FE14F72A0E4EC9FD8642B39082B2A84E08144D073C1A948D7520899265FDF2CEAF5F804498B5176F76891B
25,627,873 UART: Caliptra RT
25,628,614 UART: [state] CFI Enabled
25,809,022 UART: [rt] RT listening for mailbox commands...
25,810,921 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,841,333 UART: [rt]cmd =0x434b4558, len=80
30,171,849 >>> mbox cmd response data (6280 bytes)
30,205,563 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,235,894 UART: [rt]cmd =0x414c544e, len=41
30,238,361 >>> mbox cmd response data (8 bytes)
30,238,923 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,269,436 UART: [rt]cmd =0x434b4558, len=80
34,607,416 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,491 UART:
192,852 UART: Running Caliptra ROM ...
193,992 UART:
603,620 UART: [state] CFI Enabled
615,809 UART: [state] LifecycleState = Unprovisioned
617,757 UART: [state] DebugLocked = No
619,492 UART: [state] WD Timer not started. Device not locked for debugging
623,670 UART: [kat] SHA2-256
803,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,131 UART: [kat] ++
814,584 UART: [kat] sha1
824,466 UART: [kat] SHA2-256
827,191 UART: [kat] SHA2-384
833,395 UART: [kat] SHA2-512-ACC
835,776 UART: [kat] ECC-384
3,277,061 UART: [kat] HMAC-384Kdf
3,288,805 UART: [kat] LMS
3,765,346 UART: [kat] --
3,770,625 UART: [cold-reset] ++
3,771,566 UART: [fht] FHT @ 0x50003400
3,782,185 UART: [idev] ++
3,782,748 UART: [idev] CDI.KEYID = 6
3,783,701 UART: [idev] SUBJECT.KEYID = 7
3,784,951 UART: [idev] UDS.KEYID = 0
3,785,974 ready_for_fw is high
3,786,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,035 UART: [idev] Erasing UDS.KEYID = 0
6,264,004 UART: [idev] Sha1 KeyId Algorithm
6,287,107 UART: [idev] --
6,291,864 UART: [ldev] ++
6,292,436 UART: [ldev] CDI.KEYID = 6
6,293,370 UART: [ldev] SUBJECT.KEYID = 5
6,294,532 UART: [ldev] AUTHORITY.KEYID = 7
6,295,822 UART: [ldev] FE.KEYID = 1
6,306,069 UART: [ldev] Erasing FE.KEYID = 1
8,785,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,776 UART: [ldev] --
10,582,598 UART: [fwproc] Wait for Commands...
10,584,857 UART: [fwproc] Recv command 0x46574c44
10,586,903 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,729 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,362 >>> mbox cmd response: success
14,550,961 UART: [afmc] ++
14,551,612 UART: [afmc] CDI.KEYID = 6
14,552,523 UART: [afmc] SUBJECT.KEYID = 7
14,553,739 UART: [afmc] AUTHORITY.KEYID = 5
17,053,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,472 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,554 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,112 UART: [afmc] --
18,854,495 UART: [cold-reset] --
18,858,789 UART: [state] Locking Datavault
18,863,388 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,088 UART: [state] Locking ICCM
18,867,572 UART: [exit] Launching FMC @ 0x40000130
18,876,035 UART:
18,876,277 UART: Running Caliptra FMC ...
18,877,381 UART:
18,877,563 UART: [state] CFI Enabled
18,885,666 UART: [fht] FMC Alias Private Key: 7
20,652,335 UART: [art] Extend RT PCRs Done
20,653,555 UART: [art] Lock RT PCRs Done
20,655,155 UART: [art] Populate DV Done
20,660,695 UART: [fht] FMC Alias Private Key: 7
20,662,294 UART: [art] Derive CDI
20,663,110 UART: [art] Store in slot 0x4
20,705,600 UART: [art] Derive Key Pair
20,706,604 UART: [art] Store priv key in slot 0x5
23,133,768 UART: [art] Derive Key Pair - Done
23,146,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,939 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,448 UART: [art] PUB.X = 431C5A0AE3DE032AA99A9E1CEE3951409BB0BF17720C8F6B2CF9AE1A46AA1B6A30E84C2E86C43CB4AB828102065CCC1D
24,861,753 UART: [art] PUB.Y = 8835BE258265166ED0C712263EBA240D01A7B6911F0350483E92B04659BB2D6AECCE79D2C00C687904066F745649D128
24,868,939 UART: [art] SIG.R = FF76DB57D239A885E8D7FFB55B16E32515E2D70D4C46AD7CB7B87B180AAA9791688F3F9958D9E20A989052A01A814D7C
24,876,335 UART: [art] SIG.S = 2B52B7348A29B74980AEDBF5D4A0ED8821502FB2D7E3D4D633CE4E345330A8FA981B293986FF0E1352DE7ED580FF6460
25,855,156 UART: Caliptra RT
25,855,866 UART: [state] CFI Enabled
25,987,950 UART: [rt] RT listening for mailbox commands...
25,989,851 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,020,183 UART: [rt]cmd =0x434b4558, len=80
30,292,101 >>> mbox cmd response data (6280 bytes)
30,326,256 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,356,634 UART: [rt]cmd =0x414c544e, len=41
30,359,028 >>> mbox cmd response data (8 bytes)
30,359,619 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,390,032 UART: [rt]cmd =0x434b4558, len=80
34,661,684 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,780,929 ready_for_fw is high
3,781,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,529 >>> mbox cmd response: success
18,697,298 UART:
18,697,672 UART: Running Caliptra FMC ...
18,698,787 UART:
18,698,944 UART: [state] CFI Enabled
18,706,730 UART: [fht] FMC Alias Private Key: 7
20,472,780 UART: [art] Extend RT PCRs Done
20,474,001 UART: [art] Lock RT PCRs Done
20,475,558 UART: [art] Populate DV Done
20,480,928 UART: [fht] FMC Alias Private Key: 7
20,482,437 UART: [art] Derive CDI
20,483,180 UART: [art] Store in slot 0x4
20,525,883 UART: [art] Derive Key Pair
20,526,882 UART: [art] Store priv key in slot 0x5
22,953,381 UART: [art] Derive Key Pair - Done
22,966,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,587 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,086 UART: [art] PUB.X = A7F2D741D04CC6C041B0A4FF103B64E4556382DCC19B1B28E63282B8590D5D6830A823F07E5A72A3DEE928C5642EC8C1
24,681,352 UART: [art] PUB.Y = EEC70F85967FA86EA33765124D937C1F752024CE0A8D8E8CE04180B6389D711676417F59F663F524E37749B17E780D91
24,688,570 UART: [art] SIG.R = CF1E7C8283E1CCB27F557638DAA0520526E2DF4FC81518E50227D998BE9BDB38FAA9A4379890746031F02777C7AC88D1
24,695,925 UART: [art] SIG.S = 93841036444B7FBD38ED17D071EDE452B431784D69B903CAD0B8CB9F4F7D05C52D4851A0CCE8BB263AF8AD409D7D413A
25,674,871 UART: Caliptra RT
25,675,564 UART: [state] CFI Enabled
25,807,584 UART: [rt] RT listening for mailbox commands...
25,809,478 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,839,689 UART: [rt]cmd =0x434b4558, len=80
30,110,442 >>> mbox cmd response data (6280 bytes)
30,144,167 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,174,572 UART: [rt]cmd =0x414c544e, len=41
30,176,938 >>> mbox cmd response data (8 bytes)
30,177,441 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,207,741 UART: [rt]cmd =0x434b4558, len=80
34,479,263 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,053 UART:
192,444 UART: Running Caliptra ROM ...
193,635 UART:
193,796 UART: [state] CFI Enabled
265,979 UART: [state] LifecycleState = Unprovisioned
268,394 UART: [state] DebugLocked = No
270,426 UART: [state] WD Timer not started. Device not locked for debugging
274,821 UART: [kat] SHA2-256
464,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,426 UART: [kat] ++
475,914 UART: [kat] sha1
486,361 UART: [kat] SHA2-256
489,372 UART: [kat] SHA2-384
495,782 UART: [kat] SHA2-512-ACC
498,360 UART: [kat] ECC-384
2,947,502 UART: [kat] HMAC-384Kdf
2,970,467 UART: [kat] LMS
3,502,235 UART: [kat] --
3,505,091 UART: [cold-reset] ++
3,507,163 UART: [fht] FHT @ 0x50003400
3,518,206 UART: [idev] ++
3,518,906 UART: [idev] CDI.KEYID = 6
3,519,931 UART: [idev] SUBJECT.KEYID = 7
3,521,029 UART: [idev] UDS.KEYID = 0
3,521,955 ready_for_fw is high
3,522,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,201 UART: [idev] Erasing UDS.KEYID = 0
6,029,544 UART: [idev] Sha1 KeyId Algorithm
6,051,541 UART: [idev] --
6,054,895 UART: [ldev] ++
6,055,568 UART: [ldev] CDI.KEYID = 6
6,056,479 UART: [ldev] SUBJECT.KEYID = 5
6,057,689 UART: [ldev] AUTHORITY.KEYID = 7
6,059,191 UART: [ldev] FE.KEYID = 1
6,098,671 UART: [ldev] Erasing FE.KEYID = 1
8,604,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,225 UART: [ldev] --
10,413,783 UART: [fwproc] Wait for Commands...
10,416,191 UART: [fwproc] Recv command 0x46574c44
10,418,492 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,391 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,543 >>> mbox cmd response: success
14,678,447 UART: [afmc] ++
14,679,196 UART: [afmc] CDI.KEYID = 6
14,680,307 UART: [afmc] SUBJECT.KEYID = 7
14,681,851 UART: [afmc] AUTHORITY.KEYID = 5
17,214,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,003 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,008 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,158 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,079 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,211 UART: [afmc] --
19,013,959 UART: [cold-reset] --
19,017,498 UART: [state] Locking Datavault
19,024,846 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,017 UART: [state] Locking ICCM
19,029,368 UART: [exit] Launching FMC @ 0x40000130
19,038,043 UART:
19,038,299 UART: Running Caliptra FMC ...
19,039,324 UART:
19,039,470 UART: [state] CFI Enabled
19,096,304 UART: [fht] FMC Alias Private Key: 7
20,883,523 UART: [art] Extend RT PCRs Done
20,884,739 UART: [art] Lock RT PCRs Done
20,886,487 UART: [art] Populate DV Done
20,891,780 UART: [fht] FMC Alias Private Key: 7
20,893,481 UART: [art] Derive CDI
20,894,214 UART: [art] Store in slot 0x4
20,950,058 UART: [art] Derive Key Pair
20,951,091 UART: [art] Store priv key in slot 0x5
23,413,951 UART: [art] Derive Key Pair - Done
23,427,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,859 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,374 UART: [art] PUB.X = 7AD5B319089ACE5F97586DC2A2614661CC5C4C195F501BF3A2560D9F0B4A2B26AC7E15D4918718E9A1024E2145B0D4BC
25,148,663 UART: [art] PUB.Y = 68FB40E3251FDC9DFA4859826C524A445D22C6AE34635D1F37CA20DA2CB745DD44836417CC68D6A628925CD1C04F0B0C
25,155,917 UART: [art] SIG.R = F3638AA5191747E9B68F27ED2B382D136C798747F70F226C3E00FA4452040020CCFD18922141B7EEFCF2E5B7AFC4C2EB
25,163,266 UART: [art] SIG.S = BA84896F050BE0AD420436109DDE23051D54DDB20CA67FDF69FD27D34FB60468F91B8A45C61322B8CFB8551FEEB7D9CA
26,141,999 UART: Caliptra RT
26,142,683 UART: [state] CFI Enabled
26,323,723 UART: [rt] RT listening for mailbox commands...
26,325,621 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,356,083 UART: [rt]cmd =0x434b4558, len=80
30,689,013 >>> mbox cmd response data (6280 bytes)
30,722,551 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,752,879 UART: [rt]cmd =0x414c544e, len=41
30,755,215 >>> mbox cmd response data (8 bytes)
30,755,787 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,786,209 UART: [rt]cmd =0x434b4558, len=80
35,125,804 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,439,699 ready_for_fw is high
3,440,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,829,705 >>> mbox cmd response: success
19,107,219 UART:
19,107,604 UART: Running Caliptra FMC ...
19,108,799 UART:
19,108,968 UART: [state] CFI Enabled
19,176,654 UART: [fht] FMC Alias Private Key: 7
20,943,079 UART: [art] Extend RT PCRs Done
20,944,310 UART: [art] Lock RT PCRs Done
20,945,611 UART: [art] Populate DV Done
20,951,030 UART: [fht] FMC Alias Private Key: 7
20,952,572 UART: [art] Derive CDI
20,953,387 UART: [art] Store in slot 0x4
21,009,803 UART: [art] Derive Key Pair
21,010,856 UART: [art] Store priv key in slot 0x5
23,473,902 UART: [art] Derive Key Pair - Done
23,486,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,108 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,608 UART: [art] PUB.X = AE7D98E9F0BCA6D1A740551551287C70CD11E959B57F143A7F77B781D5CB0086916B45DAA332B4371292EB3D71580FFE
25,208,838 UART: [art] PUB.Y = A18A385A378526F6FB702E085631F587DBF0A2191592BAACB016C39C9D760E312858D5E484D95B83E827F6BDFDC9890A
25,216,109 UART: [art] SIG.R = 57E4094B5B42BD9B02E97BB8B68C5D34BF8BC3C8A3241EDBBC3A18CC89B222F473644E9BBB86A35A94B7140CA4EECE29
25,223,550 UART: [art] SIG.S = 3FF83CDEF45FBCB5E8A5749C713068EC935C19816305CFC012CD0DA722F77C2EFAD3F3587758EDD075950C7DC7F9CF61
26,202,352 UART: Caliptra RT
26,203,076 UART: [state] CFI Enabled
26,384,482 UART: [rt] RT listening for mailbox commands...
26,386,378 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,416,779 UART: [rt]cmd =0x434b4558, len=80
30,748,020 >>> mbox cmd response data (6280 bytes)
30,781,522 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,811,930 UART: [rt]cmd =0x414c544e, len=41
30,814,420 >>> mbox cmd response data (8 bytes)
30,815,007 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,845,374 UART: [rt]cmd =0x434b4558, len=80
35,184,450 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,395 UART:
192,756 UART: Running Caliptra ROM ...
193,885 UART:
603,653 UART: [state] CFI Enabled
617,851 UART: [state] LifecycleState = Unprovisioned
620,243 UART: [state] DebugLocked = No
622,629 UART: [state] WD Timer not started. Device not locked for debugging
627,815 UART: [kat] SHA2-256
817,712 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,454 UART: [kat] ++
829,086 UART: [kat] sha1
841,778 UART: [kat] SHA2-256
844,835 UART: [kat] SHA2-384
851,333 UART: [kat] SHA2-512-ACC
853,922 UART: [kat] ECC-384
3,294,448 UART: [kat] HMAC-384Kdf
3,308,685 UART: [kat] LMS
3,840,502 UART: [kat] --
3,844,849 UART: [cold-reset] ++
3,845,998 UART: [fht] FHT @ 0x50003400
3,857,265 UART: [idev] ++
3,857,972 UART: [idev] CDI.KEYID = 6
3,859,010 UART: [idev] SUBJECT.KEYID = 7
3,860,122 UART: [idev] UDS.KEYID = 0
3,861,046 ready_for_fw is high
3,861,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,131 UART: [idev] Erasing UDS.KEYID = 0
6,342,795 UART: [idev] Sha1 KeyId Algorithm
6,365,841 UART: [idev] --
6,369,967 UART: [ldev] ++
6,370,657 UART: [ldev] CDI.KEYID = 6
6,371,584 UART: [ldev] SUBJECT.KEYID = 5
6,372,743 UART: [ldev] AUTHORITY.KEYID = 7
6,373,976 UART: [ldev] FE.KEYID = 1
6,384,950 UART: [ldev] Erasing FE.KEYID = 1
8,860,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,779 UART: [ldev] --
10,651,669 UART: [fwproc] Wait for Commands...
10,654,217 UART: [fwproc] Recv command 0x46574c44
10,656,532 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,926 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,056 >>> mbox cmd response: success
14,922,017 UART: [afmc] ++
14,922,752 UART: [afmc] CDI.KEYID = 6
14,923,951 UART: [afmc] SUBJECT.KEYID = 7
14,925,400 UART: [afmc] AUTHORITY.KEYID = 5
17,426,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,343 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,279 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,035 UART: [afmc] --
19,223,318 UART: [cold-reset] --
19,226,601 UART: [state] Locking Datavault
19,231,493 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,663 UART: [state] Locking ICCM
19,235,887 UART: [exit] Launching FMC @ 0x40000130
19,244,511 UART:
19,244,759 UART: Running Caliptra FMC ...
19,245,868 UART:
19,246,027 UART: [state] CFI Enabled
19,254,190 UART: [fht] FMC Alias Private Key: 7
21,020,454 UART: [art] Extend RT PCRs Done
21,021,688 UART: [art] Lock RT PCRs Done
21,023,345 UART: [art] Populate DV Done
21,029,034 UART: [fht] FMC Alias Private Key: 7
21,030,584 UART: [art] Derive CDI
21,031,349 UART: [art] Store in slot 0x4
21,074,002 UART: [art] Derive Key Pair
21,075,013 UART: [art] Store priv key in slot 0x5
23,502,026 UART: [art] Derive Key Pair - Done
23,514,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,983 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,489 UART: [art] PUB.X = 8216BB2D1AA564CB6F3F436CEF5C00AAC4B5BC27BBA3342FC969A3BF7A7E974C0D7074BD6EB66939928993157DD1AFD7
25,229,762 UART: [art] PUB.Y = A71E647EC0B86F0E125E489C6DB0A960644A173B06210768C4FE5AE85BEF4044DAD09A4397FF0FBE2555DF77B94AC6EC
25,237,053 UART: [art] SIG.R = 38B4773E66A5220854D04CB4E1C09E9B600EFDF4483D0D626DC4E8E5C1F5FCA7EC5527FBFE001AD9CCD9B68F27D80935
25,244,434 UART: [art] SIG.S = 925A362730B2E33B00081C0507488BB2527F12D5CE9A4458E45F9DDAB91E80FBFE7A5E80EAC7FB66ED0C3B91C539BDC6
26,223,406 UART: Caliptra RT
26,224,096 UART: [state] CFI Enabled
26,356,501 UART: [rt] RT listening for mailbox commands...
26,358,401 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,389,090 UART: [rt]cmd =0x434b4558, len=80
30,660,615 >>> mbox cmd response data (6280 bytes)
30,694,999 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,724,992 UART: [rt]cmd =0x414c544e, len=41
30,727,299 >>> mbox cmd response data (8 bytes)
30,727,870 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,758,488 UART: [rt]cmd =0x434b4558, len=80
35,030,511 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,753,406 ready_for_fw is high
3,753,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,856 >>> mbox cmd response: success
19,299,272 UART:
19,299,664 UART: Running Caliptra FMC ...
19,300,980 UART:
19,301,151 UART: [state] CFI Enabled
19,308,947 UART: [fht] FMC Alias Private Key: 7
21,075,242 UART: [art] Extend RT PCRs Done
21,076,469 UART: [art] Lock RT PCRs Done
21,078,033 UART: [art] Populate DV Done
21,083,589 UART: [fht] FMC Alias Private Key: 7
21,085,191 UART: [art] Derive CDI
21,085,934 UART: [art] Store in slot 0x4
21,129,079 UART: [art] Derive Key Pair
21,130,085 UART: [art] Store priv key in slot 0x5
23,557,023 UART: [art] Derive Key Pair - Done
23,569,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,079 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,582 UART: [art] PUB.X = 87E7C1550241B8B4AE5FD6EEAC63FABEADE1F6C0AE60F30A50A727CB1DCA91E4E171E680795E24B3F5849E4F8E17949C
25,284,847 UART: [art] PUB.Y = 32C18CD8708793154A6D8610F9755DF3EABB1C314749B5DB2F103569FCA77A80533CBC5AF35FC2B13E082B8A38CBC8BB
25,292,129 UART: [art] SIG.R = 60E522EAE59FA298AF4AF0B001038A96EBB652E80CBE8A88B61D55D7ACAA1F8F1BAB0E036015A1FF70D7F56BE31F819E
25,299,607 UART: [art] SIG.S = 5B8683DB1B2B951C8DB6E14F6770276AB3E6A09F50D312E63CB1931CD9FA6AFC7F8BCCE33BE85D281430703AE7EDB288
26,278,078 UART: Caliptra RT
26,278,790 UART: [state] CFI Enabled
26,411,999 UART: [rt] RT listening for mailbox commands...
26,413,896 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,444,440 UART: [rt]cmd =0x434b4558, len=80
30,716,457 >>> mbox cmd response data (6280 bytes)
30,750,178 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
30,780,299 UART: [rt]cmd =0x414c544e, len=41
30,782,697 >>> mbox cmd response data (8 bytes)
30,783,196 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
30,813,612 UART: [rt]cmd =0x434b4558, len=80
35,084,938 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,856 UART: [state] LifecycleState = Unprovisioned
85,511 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 UART: [kat] SHA2-256
881,790 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,905 UART: [kat] ++
886,057 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,764 UART: [kat] HMAC-384Kdf
907,306 UART: [kat] LMS
1,475,502 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,700 UART: [idev] ++
1,479,868 UART: [idev] CDI.KEYID = 6
1,480,228 UART: [idev] SUBJECT.KEYID = 7
1,480,652 UART: [idev] UDS.KEYID = 0
1,480,997 ready_for_fw is high
1,480,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,468 UART: [idev] Erasing UDS.KEYID = 0
1,504,756 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,250 UART: [idev] --
1,514,297 UART: [ldev] ++
1,514,465 UART: [ldev] CDI.KEYID = 6
1,514,828 UART: [ldev] SUBJECT.KEYID = 5
1,515,254 UART: [ldev] AUTHORITY.KEYID = 7
1,515,717 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,310 UART: [ldev] --
1,585,783 UART: [fwproc] Waiting for Commands...
1,586,456 UART: [fwproc] Received command 0x46574c44
1,587,247 UART: [fwproc] Received Image of size 118548 bytes
2,932,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,047 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,265 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,584 >>> mbox cmd response: success
3,132,788 UART: [afmc] ++
3,132,956 UART: [afmc] CDI.KEYID = 6
3,133,318 UART: [afmc] SUBJECT.KEYID = 7
3,133,743 UART: [afmc] AUTHORITY.KEYID = 5
3,168,560 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,798 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,170 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,853 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,833 UART: [afmc] --
3,211,761 UART: [cold-reset] --
3,212,531 UART: [state] Locking Datavault
3,213,702 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,306 UART: [state] Locking ICCM
3,214,870 UART: [exit] Launching FMC @ 0x40000130
3,220,200 UART:
3,220,216 UART: Running Caliptra FMC ...
3,220,624 UART:
3,220,678 UART: [state] CFI Enabled
3,230,878 UART: [fht] FMC Alias Private Key: 7
3,349,606 UART: [art] Extend RT PCRs Done
3,350,034 UART: [art] Lock RT PCRs Done
3,351,604 UART: [art] Populate DV Done
3,359,805 UART: [fht] FMC Alias Private Key: 7
3,360,893 UART: [art] Derive CDI
3,361,173 UART: [art] Store in slot 0x4
3,447,059 UART: [art] Derive Key Pair
3,447,419 UART: [art] Store priv key in slot 0x5
3,461,068 UART: [art] Derive Key Pair - Done
3,475,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,273 UART: [art] PUB.X = 866339CA2BB9155294B2A0568F8FEFE6AEFB50952FEDF379E6CFE8DA703C7C1C96A397E535054AF8B288009D97CD5E54
3,499,030 UART: [art] PUB.Y = 13FA5BE8287AFB8F605DCC9BE65C8B4DF1001A5B2AE081A9E9168D7DDF5DFD972F5DD01C0DC97DFA79339315C858325B
3,505,975 UART: [art] SIG.R = 922D5A546229CE600E96629C23E4A53815C7D7148A3C0471A99AFFC98595E77D97D6F88D775B39D11E89944156C88921
3,512,729 UART: [art] SIG.S = A9E882FC271CDDCB2B31A779DAD1E72873DA38294445B6362AD28BEED969D37C4390F0DE8E7DC8A660826BD100C2CCEA
3,536,163 UART: Caliptra RT
3,536,414 UART: [state] CFI Enabled
3,657,097 UART: [rt] RT listening for mailbox commands...
3,657,767 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,285 UART: [rt]cmd =0x434b4558, len=80
3,857,808 >>> mbox cmd response data (6280 bytes)
3,857,809 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,377 UART: [rt]cmd =0x414c544e, len=41
3,889,332 >>> mbox cmd response data (8 bytes)
3,889,333 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,192 UART: [rt]cmd =0x434b4558, len=80
4,088,657 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,573 ready_for_fw is high
1,362,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,136 >>> mbox cmd response: success
3,041,347 UART:
3,041,363 UART: Running Caliptra FMC ...
3,041,771 UART:
3,041,825 UART: [state] CFI Enabled
3,051,993 UART: [fht] FMC Alias Private Key: 7
3,171,235 UART: [art] Extend RT PCRs Done
3,171,663 UART: [art] Lock RT PCRs Done
3,173,289 UART: [art] Populate DV Done
3,181,438 UART: [fht] FMC Alias Private Key: 7
3,182,482 UART: [art] Derive CDI
3,182,762 UART: [art] Store in slot 0x4
3,268,752 UART: [art] Derive Key Pair
3,269,112 UART: [art] Store priv key in slot 0x5
3,282,037 UART: [art] Derive Key Pair - Done
3,296,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,996 UART: [art] PUB.X = E7A91EB0F5278FD622EA8C19E884E8D5FA7C24A8548B19DE302C6B7094EC553AE3BF0BCBF2139DF5BB7084DFD4D9AEF9
3,319,787 UART: [art] PUB.Y = 427E0AE3F39FDF4856F98652FA275FF8A6C67E1A03A987BCDDFB924B6EA8ED59C92BA3D4948657D28ED1DBDF61129B26
3,326,749 UART: [art] SIG.R = EA0449C0677843B4C2036905C6ABA656E5813C90CE758B93D4E55C05B4453CC53A4CCE3ECA196343CBE5B2661DCF8F44
3,333,515 UART: [art] SIG.S = 21D4A28A6CC2B1F638DC6926BE758BD6C31ECCC04D9A3EC4D6516287EEDDF48A6D9A103CA452EF2F61FFAD4AB3794BB1
3,357,567 UART: Caliptra RT
3,357,818 UART: [state] CFI Enabled
3,478,720 UART: [rt] RT listening for mailbox commands...
3,479,390 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,396 UART: [rt]cmd =0x434b4558, len=80
3,679,145 >>> mbox cmd response data (6280 bytes)
3,679,146 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,866 UART: [rt]cmd =0x414c544e, len=41
3,710,975 >>> mbox cmd response data (8 bytes)
3,710,976 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,917 UART: [rt]cmd =0x434b4558, len=80
3,910,618 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,443 UART: [kat] SHA2-512-ACC
897,344 UART: [kat] ECC-384
902,727 UART: [kat] HMAC-384Kdf
907,379 UART: [kat] LMS
1,475,575 UART: [kat] --
1,476,274 UART: [cold-reset] ++
1,476,742 UART: [fht] Storing FHT @ 0x50003400
1,479,573 UART: [idev] ++
1,479,741 UART: [idev] CDI.KEYID = 6
1,480,101 UART: [idev] SUBJECT.KEYID = 7
1,480,525 UART: [idev] UDS.KEYID = 0
1,480,870 ready_for_fw is high
1,480,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,227 UART: [idev] Erasing UDS.KEYID = 0
1,505,037 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,721 UART: [idev] --
1,514,726 UART: [ldev] ++
1,514,894 UART: [ldev] CDI.KEYID = 6
1,515,257 UART: [ldev] SUBJECT.KEYID = 5
1,515,683 UART: [ldev] AUTHORITY.KEYID = 7
1,516,146 UART: [ldev] FE.KEYID = 1
1,521,228 UART: [ldev] Erasing FE.KEYID = 1
1,545,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,181 UART: [ldev] --
1,585,444 UART: [fwproc] Waiting for Commands...
1,586,225 UART: [fwproc] Received command 0x46574c44
1,587,016 UART: [fwproc] Received Image of size 118548 bytes
2,931,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,992 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,210 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,551 >>> mbox cmd response: success
3,131,807 UART: [afmc] ++
3,131,975 UART: [afmc] CDI.KEYID = 6
3,132,337 UART: [afmc] SUBJECT.KEYID = 7
3,132,762 UART: [afmc] AUTHORITY.KEYID = 5
3,167,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,109 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,889 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,598 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,481 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,164 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,964 UART: [afmc] --
3,210,926 UART: [cold-reset] --
3,211,732 UART: [state] Locking Datavault
3,212,923 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,527 UART: [state] Locking ICCM
3,214,199 UART: [exit] Launching FMC @ 0x40000130
3,219,529 UART:
3,219,545 UART: Running Caliptra FMC ...
3,219,953 UART:
3,220,096 UART: [state] CFI Enabled
3,230,654 UART: [fht] FMC Alias Private Key: 7
3,349,592 UART: [art] Extend RT PCRs Done
3,350,020 UART: [art] Lock RT PCRs Done
3,351,354 UART: [art] Populate DV Done
3,359,663 UART: [fht] FMC Alias Private Key: 7
3,360,687 UART: [art] Derive CDI
3,360,967 UART: [art] Store in slot 0x4
3,447,151 UART: [art] Derive Key Pair
3,447,511 UART: [art] Store priv key in slot 0x5
3,460,374 UART: [art] Derive Key Pair - Done
3,475,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,894 UART: [art] PUB.X = A8AD193E75A8C58B3E4B412D313F3FF2E2BDFB8FECEFCD753763D34AF3A6A8622BD361010DB22C669CBD5F4241B52DAC
3,498,682 UART: [art] PUB.Y = E13D31336CEF1DFE32B4165DD4522DAC53288C33129DE0C76CE8D2829E7A1E39090E6A296F28BFF07D3632781E9C025A
3,505,629 UART: [art] SIG.R = CDA5A14C052BAF3EAB2DD0FDDB7D15BC2091C67CC9F9D638F6738F9E4ED60AFFF98F28AB599FF7141E06EAADB64F9CDF
3,512,426 UART: [art] SIG.S = D84147C9DE4B0948969EA0A291724636E5012F233982F92B6A3A8393DF82B6C1C224BA53B2DE28B0F220461FCBDF6023
3,536,466 UART: Caliptra RT
3,536,809 UART: [state] CFI Enabled
3,656,532 UART: [rt] RT listening for mailbox commands...
3,657,202 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,530 UART: [rt]cmd =0x434b4558, len=80
3,857,164 >>> mbox cmd response data (6280 bytes)
3,857,165 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,769 UART: [rt]cmd =0x414c544e, len=41
3,888,518 >>> mbox cmd response data (8 bytes)
3,888,519 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,194 UART: [rt]cmd =0x434b4558, len=80
4,087,312 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,954 ready_for_fw is high
1,362,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,459 >>> mbox cmd response: success
3,043,838 UART:
3,043,854 UART: Running Caliptra FMC ...
3,044,262 UART:
3,044,405 UART: [state] CFI Enabled
3,055,171 UART: [fht] FMC Alias Private Key: 7
3,174,173 UART: [art] Extend RT PCRs Done
3,174,601 UART: [art] Lock RT PCRs Done
3,176,015 UART: [art] Populate DV Done
3,184,242 UART: [fht] FMC Alias Private Key: 7
3,185,314 UART: [art] Derive CDI
3,185,594 UART: [art] Store in slot 0x4
3,271,384 UART: [art] Derive Key Pair
3,271,744 UART: [art] Store priv key in slot 0x5
3,284,877 UART: [art] Derive Key Pair - Done
3,299,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,714 UART: [art] PUB.X = 7C58DAF0F4094F15345961D051CA527D5B9D6BF5EB6C228083E4BD80655DB2B7113A23743A48470EC4613CB746917C07
3,322,473 UART: [art] PUB.Y = E06B06F1AAF3E3F3006C232E40AEBFC90604F92F4DDE7389F6A268854BAF9B4935E4A2ACC7C995AD6C656989CB07FABE
3,329,409 UART: [art] SIG.R = 3A9E032DA4B38F8ECDD4B0F859EC090EB481AB8A6FD4FA5CC781C016CE8008512142BCE84906A88756C378AF1D65084A
3,336,173 UART: [art] SIG.S = B262FCCB4D827333D57B3025D7131140C6EFEA175DC38C568C01A3021C9B291F57E42CAE92A8DB0EF20B643239256107
3,359,808 UART: Caliptra RT
3,360,151 UART: [state] CFI Enabled
3,481,455 UART: [rt] RT listening for mailbox commands...
3,482,125 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,237 UART: [rt]cmd =0x434b4558, len=80
3,682,390 >>> mbox cmd response data (6280 bytes)
3,682,391 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,089 UART: [rt]cmd =0x414c544e, len=41
3,714,004 >>> mbox cmd response data (8 bytes)
3,714,005 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,964 UART: [rt]cmd =0x434b4558, len=80
3,913,099 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,711 UART: [state] WD Timer not started. Device not locked for debugging
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,831 UART: [kat] LMS
1,169,143 UART: [kat] --
1,170,070 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,172,978 UART: [idev] ++
1,173,146 UART: [idev] CDI.KEYID = 6
1,173,507 UART: [idev] SUBJECT.KEYID = 7
1,173,932 UART: [idev] UDS.KEYID = 0
1,174,278 ready_for_fw is high
1,174,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,787 UART: [idev] Erasing UDS.KEYID = 0
1,198,607 UART: [idev] Sha1 KeyId Algorithm
1,207,519 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,204 UART: [ldev] Erasing FE.KEYID = 1
1,240,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,988 UART: [ldev] --
1,280,333 UART: [fwproc] Wait for Commands...
1,281,012 UART: [fwproc] Recv command 0x46574c44
1,281,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,581 >>> mbox cmd response: success
2,824,713 UART: [afmc] ++
2,824,881 UART: [afmc] CDI.KEYID = 6
2,825,244 UART: [afmc] SUBJECT.KEYID = 7
2,825,670 UART: [afmc] AUTHORITY.KEYID = 5
2,861,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,808 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,292 UART: [afmc] --
2,904,139 UART: [cold-reset] --
2,905,285 UART: [state] Locking Datavault
2,906,604 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,208 UART: [state] Locking ICCM
2,907,750 UART: [exit] Launching FMC @ 0x40000130
2,913,080 UART:
2,913,096 UART: Running Caliptra FMC ...
2,913,504 UART:
2,913,558 UART: [state] CFI Enabled
2,924,230 UART: [fht] FMC Alias Private Key: 7
3,043,398 UART: [art] Extend RT PCRs Done
3,043,826 UART: [art] Lock RT PCRs Done
3,045,316 UART: [art] Populate DV Done
3,053,495 UART: [fht] FMC Alias Private Key: 7
3,054,661 UART: [art] Derive CDI
3,054,941 UART: [art] Store in slot 0x4
3,140,640 UART: [art] Derive Key Pair
3,141,000 UART: [art] Store priv key in slot 0x5
3,154,184 UART: [art] Derive Key Pair - Done
3,168,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,916 UART: [art] PUB.X = 5F88E2E794EC65EFEE0E71CA2738CADA3B118359FA9785EA80A1D0E1F3E7D093F06A92BC92C729270B8A85AA9D2FA799
3,191,696 UART: [art] PUB.Y = AB4629FE8FADAD3A72F876AAD177B45AC33CEF3A3B55752522711957D1E1F5DD0D1DEF04934C8FEC9B7606CEE7F97B86
3,198,657 UART: [art] SIG.R = 04223154391AED7930F252D11CB78F2A963ABEA99EA2621E686CD1C216BEA5056A5E93F731F37C2992CCE5380AA35E8D
3,205,424 UART: [art] SIG.S = 84B2405BB7CFEC4C04B07578AB21D6F91488EA6FCECF1A6DAF3C9D5A73FC6FA919C1DD6FF469D5A693362858EA7DDAF0
3,229,009 UART: Caliptra RT
3,229,260 UART: [state] CFI Enabled
3,348,597 UART: [rt] RT listening for mailbox commands...
3,349,267 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,375 UART: [rt]cmd =0x434b4558, len=80
3,549,722 >>> mbox cmd response data (6280 bytes)
3,549,723 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,579,597 UART: [rt]cmd =0x414c544e, len=41
3,581,532 >>> mbox cmd response data (8 bytes)
3,581,533 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,364 UART: [rt]cmd =0x434b4558, len=80
3,781,919 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,078 ready_for_fw is high
1,059,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,190 >>> mbox cmd response: success
2,740,579 UART:
2,740,595 UART: Running Caliptra FMC ...
2,741,003 UART:
2,741,057 UART: [state] CFI Enabled
2,751,327 UART: [fht] FMC Alias Private Key: 7
2,870,463 UART: [art] Extend RT PCRs Done
2,870,891 UART: [art] Lock RT PCRs Done
2,872,569 UART: [art] Populate DV Done
2,880,822 UART: [fht] FMC Alias Private Key: 7
2,881,838 UART: [art] Derive CDI
2,882,118 UART: [art] Store in slot 0x4
2,967,221 UART: [art] Derive Key Pair
2,967,581 UART: [art] Store priv key in slot 0x5
2,980,615 UART: [art] Derive Key Pair - Done
2,995,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,039 UART: [art] PUB.X = 7B278E0B8D041F7EAA427087ED96F9445D321E2953738E4CCEDD344AC0A17A42FC19A3FC1F175543CDBC0471E9AC42BC
3,018,814 UART: [art] PUB.Y = EB1D3C9297CAFB97729845160999094FA30FC731756607F4885522D3E2FBF5386FF1CAF6B28EB42DEF6274CBC89CCDD5
3,025,762 UART: [art] SIG.R = E041476201E3EAEBFA0802A181ACD2720E064FB5A94D0A229740677D429874ED945B09E098F18922DBA85C7225CF4283
3,032,509 UART: [art] SIG.S = 7F28F400DFFC7BAEB038B8F4E0E516903EA1D4FC391E56E9BF794ED96925C0CFE28EC0485738E313F5788A986DE65F65
3,056,379 UART: Caliptra RT
3,056,630 UART: [state] CFI Enabled
3,177,211 UART: [rt] RT listening for mailbox commands...
3,177,881 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,019 UART: [rt]cmd =0x434b4558, len=80
3,378,525 >>> mbox cmd response data (6280 bytes)
3,378,526 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,408,116 UART: [rt]cmd =0x414c544e, len=41
3,409,991 >>> mbox cmd response data (8 bytes)
3,409,992 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,939 UART: [rt]cmd =0x434b4558, len=80
3,609,551 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,684 UART: [kat] SHA2-512-ACC
906,585 UART: [kat] ECC-384
916,718 UART: [kat] HMAC-384Kdf
921,490 UART: [kat] LMS
1,169,802 UART: [kat] --
1,170,487 UART: [cold-reset] ++
1,170,949 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,174,811 ready_for_fw is high
1,174,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,510 UART: [idev] --
1,209,443 UART: [ldev] ++
1,209,611 UART: [ldev] CDI.KEYID = 6
1,209,975 UART: [ldev] SUBJECT.KEYID = 5
1,210,402 UART: [ldev] AUTHORITY.KEYID = 7
1,210,865 UART: [ldev] FE.KEYID = 1
1,216,179 UART: [ldev] Erasing FE.KEYID = 1
1,242,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,711 UART: [ldev] --
1,280,914 UART: [fwproc] Wait for Commands...
1,281,523 UART: [fwproc] Recv command 0x46574c44
1,282,256 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,345 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,750 >>> mbox cmd response: success
2,826,852 UART: [afmc] ++
2,827,020 UART: [afmc] CDI.KEYID = 6
2,827,383 UART: [afmc] SUBJECT.KEYID = 7
2,827,809 UART: [afmc] AUTHORITY.KEYID = 5
2,862,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,058 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,768 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,649 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,350 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,169 UART: [afmc] --
2,906,146 UART: [cold-reset] --
2,906,898 UART: [state] Locking Datavault
2,907,957 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,561 UART: [state] Locking ICCM
2,909,091 UART: [exit] Launching FMC @ 0x40000130
2,914,421 UART:
2,914,437 UART: Running Caliptra FMC ...
2,914,845 UART:
2,914,988 UART: [state] CFI Enabled
2,925,770 UART: [fht] FMC Alias Private Key: 7
3,044,644 UART: [art] Extend RT PCRs Done
3,045,072 UART: [art] Lock RT PCRs Done
3,046,782 UART: [art] Populate DV Done
3,055,145 UART: [fht] FMC Alias Private Key: 7
3,056,221 UART: [art] Derive CDI
3,056,501 UART: [art] Store in slot 0x4
3,142,742 UART: [art] Derive Key Pair
3,143,102 UART: [art] Store priv key in slot 0x5
3,156,512 UART: [art] Derive Key Pair - Done
3,171,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,073 UART: [art] PUB.X = E40EC7EB16A453A573035B99BFF27ACE7AD4BF4F035798CA0267140271C334F253CD8AAB9E6A37AB61EBF9AC51C2FB65
3,193,846 UART: [art] PUB.Y = 2485FD2F2019145157B006F088783231E0309A182BBE28A351EDF05FA33ACF1E90E3D0B4525426A44D8BAE01595F02F8
3,200,785 UART: [art] SIG.R = EA4225848B8D81B3BC35AC2A8692F8CB9C635BBD7E929E8E170C946CE4A65EE7E9853BB559B438EDC9D8C0A3921F15A3
3,207,566 UART: [art] SIG.S = 3B08EC2BB191C759D62FA8BCD5C4CE5C669D25BB40468C254984C7DDE51ABDBF395AB79453438E3E81C6ABB6F38639C3
3,231,877 UART: Caliptra RT
3,232,220 UART: [state] CFI Enabled
3,351,829 UART: [rt] RT listening for mailbox commands...
3,352,499 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,761 UART: [rt]cmd =0x434b4558, len=80
3,554,271 >>> mbox cmd response data (6280 bytes)
3,554,272 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,866 UART: [rt]cmd =0x414c544e, len=41
3,585,799 >>> mbox cmd response data (8 bytes)
3,585,800 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,785 UART: [rt]cmd =0x434b4558, len=80
3,786,127 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,983 ready_for_fw is high
1,059,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,389 >>> mbox cmd response: success
2,744,472 UART:
2,744,488 UART: Running Caliptra FMC ...
2,744,896 UART:
2,745,039 UART: [state] CFI Enabled
2,755,617 UART: [fht] FMC Alias Private Key: 7
2,874,773 UART: [art] Extend RT PCRs Done
2,875,201 UART: [art] Lock RT PCRs Done
2,876,747 UART: [art] Populate DV Done
2,885,290 UART: [fht] FMC Alias Private Key: 7
2,886,272 UART: [art] Derive CDI
2,886,552 UART: [art] Store in slot 0x4
2,972,309 UART: [art] Derive Key Pair
2,972,669 UART: [art] Store priv key in slot 0x5
2,985,541 UART: [art] Derive Key Pair - Done
2,999,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,571 UART: [art] PUB.X = 98B141967481041A6E1C7E50C47B9A5E1572D649C433FC4688393807E796C0C925D123C0526CF4D8D0D4D8473B9BB6B6
3,022,329 UART: [art] PUB.Y = F9D767D96ED3CCFE1AFCB11831991E860A1D3C54D1B94E129FC9689F01336088EE79C53E3AB799E62FEA05E9B3565287
3,029,278 UART: [art] SIG.R = BEBA758DFE7B9571A671534C780A189AACC0A48058F521FA35A9B81BF63EA2A371ECB1CED6468F62387B6A164BCC87CA
3,036,063 UART: [art] SIG.S = ABAA773C2F4CB2800A6A73A9D368EECDDC36F279196D21CA551E104EA4EF6F2E21D869DFFE5EDA499871384918BFBFA9
3,059,810 UART: Caliptra RT
3,060,153 UART: [state] CFI Enabled
3,179,807 UART: [rt] RT listening for mailbox commands...
3,180,477 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,875 UART: [rt]cmd =0x434b4558, len=80
3,380,685 >>> mbox cmd response data (6280 bytes)
3,380,686 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,048 UART: [rt]cmd =0x414c544e, len=41
3,411,857 >>> mbox cmd response data (8 bytes)
3,411,858 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,757 UART: [rt]cmd =0x434b4558, len=80
3,611,057 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,919 UART: [kat] SHA2-256
903,859 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,579 UART: [cold-reset] ++
1,171,975 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 ready_for_fw is high
1,175,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,200,063 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,551 UART: [ldev] ++
1,209,719 UART: [ldev] CDI.KEYID = 6
1,210,082 UART: [ldev] SUBJECT.KEYID = 5
1,210,508 UART: [ldev] AUTHORITY.KEYID = 7
1,210,971 UART: [ldev] FE.KEYID = 1
1,216,319 UART: [ldev] Erasing FE.KEYID = 1
1,242,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,947 UART: [ldev] --
1,281,404 UART: [fwproc] Wait for Commands...
1,282,184 UART: [fwproc] Recv command 0x46574c44
1,282,912 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,857 >>> mbox cmd response: success
2,826,995 UART: [afmc] ++
2,827,163 UART: [afmc] CDI.KEYID = 6
2,827,525 UART: [afmc] SUBJECT.KEYID = 7
2,827,950 UART: [afmc] AUTHORITY.KEYID = 5
2,863,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,710 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,302 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,881 UART: [afmc] --
2,906,851 UART: [cold-reset] --
2,908,015 UART: [state] Locking Datavault
2,909,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,650 UART: [state] Locking ICCM
2,910,324 UART: [exit] Launching FMC @ 0x40000130
2,915,654 UART:
2,915,670 UART: Running Caliptra FMC ...
2,916,078 UART:
2,916,132 UART: [state] CFI Enabled
2,926,364 UART: [fht] FMC Alias Private Key: 7
3,045,416 UART: [art] Extend RT PCRs Done
3,045,844 UART: [art] Lock RT PCRs Done
3,047,210 UART: [art] Populate DV Done
3,055,347 UART: [fht] FMC Alias Private Key: 7
3,056,381 UART: [art] Derive CDI
3,056,661 UART: [art] Store in slot 0x4
3,142,418 UART: [art] Derive Key Pair
3,142,778 UART: [art] Store priv key in slot 0x5
3,155,584 UART: [art] Derive Key Pair - Done
3,170,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,672 UART: [art] PUB.X = E5A0835C6D626829EB61E0F7D3A3015B9A6817F011B98A9B5BAECB2754824E65743BBD0B2B5655EF61CFE9B9C664B66D
3,193,446 UART: [art] PUB.Y = 961C7AE8AD624B167F35C806060C053B10C9CE7A52249291B223344A7A992EF5C27DA3DABB622D51B06C05CFF5976BBF
3,200,389 UART: [art] SIG.R = A1803E174FEB0114D12023C9A3BA6928A74F1888A132EDDB5045A3FDAA28EADA8E1E47A4D8C1D065C952AF2B3FCA2371
3,207,172 UART: [art] SIG.S = 5AB822069C725DF11272BF0514B8EDFD4A0E986F6048568E728C9DD7D6086250AD63B1465E5222A098B1B9B0FB6CD719
3,231,900 UART: Caliptra RT
3,232,151 UART: [state] CFI Enabled
3,351,984 UART: [rt] RT listening for mailbox commands...
3,352,654 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,066 UART: [rt]cmd =0x434b4558, len=80
3,552,166 >>> mbox cmd response data (6280 bytes)
3,552,167 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,935 UART: [rt]cmd =0x414c544e, len=41
3,583,918 >>> mbox cmd response data (8 bytes)
3,583,919 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,712 UART: [rt]cmd =0x434b4558, len=80
3,783,298 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,951 ready_for_fw is high
1,060,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,396 >>> mbox cmd response: success
2,742,395 UART:
2,742,411 UART: Running Caliptra FMC ...
2,742,819 UART:
2,742,873 UART: [state] CFI Enabled
2,753,751 UART: [fht] FMC Alias Private Key: 7
2,872,303 UART: [art] Extend RT PCRs Done
2,872,731 UART: [art] Lock RT PCRs Done
2,874,529 UART: [art] Populate DV Done
2,882,858 UART: [fht] FMC Alias Private Key: 7
2,883,852 UART: [art] Derive CDI
2,884,132 UART: [art] Store in slot 0x4
2,969,959 UART: [art] Derive Key Pair
2,970,319 UART: [art] Store priv key in slot 0x5
2,984,095 UART: [art] Derive Key Pair - Done
2,998,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,176 UART: [art] PUB.X = 005D44509200D9C9E831586D68A4A34E5B0636F3079A377C09C10E7C9810D2CD7502C20D14001C35BBDF7608BED33740
3,021,853 UART: [art] PUB.Y = B2AEDBC6AAD79F6476CF86004160CA664012076AC1D79468F8118FCD403F802F4ADBDC3C304E7D0200435A0FCB82491F
3,028,760 UART: [art] SIG.R = B3CC1BE035DEFFE79BD551B46685F999EE6D5B91F228BEDA0D7D1FC34E18BA0DAF7705C2F2D7F41FD0F461C6C7BECCFA
3,035,555 UART: [art] SIG.S = 02CE76ECFF1A29E0E6094F5D1219FC1A76E1DA28E5B3EBEBB865271D3EB063372165136ED35079C82C726B962A3B9ADC
3,058,783 UART: Caliptra RT
3,059,034 UART: [state] CFI Enabled
3,179,567 UART: [rt] RT listening for mailbox commands...
3,180,237 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,427 UART: [rt]cmd =0x434b4558, len=80
3,381,005 >>> mbox cmd response data (6280 bytes)
3,381,006 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,536 UART: [rt]cmd =0x414c544e, len=41
3,412,625 >>> mbox cmd response data (8 bytes)
3,412,626 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,715 UART: [rt]cmd =0x434b4558, len=80
3,612,411 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,799 UART: [kat] SHA2-256
893,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,574 UART: [kat] ++
897,726 UART: [kat] sha1
901,958 UART: [kat] SHA2-256
903,898 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,053 UART: [kat] HMAC-384Kdf
922,849 UART: [kat] LMS
1,171,177 UART: [kat] --
1,172,170 UART: [cold-reset] ++
1,172,534 UART: [fht] FHT @ 0x50003400
1,175,029 UART: [idev] ++
1,175,197 UART: [idev] CDI.KEYID = 6
1,175,557 UART: [idev] SUBJECT.KEYID = 7
1,175,981 UART: [idev] UDS.KEYID = 0
1,176,326 ready_for_fw is high
1,176,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,879 UART: [idev] Erasing UDS.KEYID = 0
1,201,034 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,576 UART: [ldev] ++
1,210,744 UART: [ldev] CDI.KEYID = 6
1,211,107 UART: [ldev] SUBJECT.KEYID = 5
1,211,533 UART: [ldev] AUTHORITY.KEYID = 7
1,211,996 UART: [ldev] FE.KEYID = 1
1,217,186 UART: [ldev] Erasing FE.KEYID = 1
1,243,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,572 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,853 UART: [fwproc] Recv command 0x46574c44
1,284,581 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,473 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,728 >>> mbox cmd response: success
2,828,910 UART: [afmc] ++
2,829,078 UART: [afmc] CDI.KEYID = 6
2,829,440 UART: [afmc] SUBJECT.KEYID = 7
2,829,865 UART: [afmc] AUTHORITY.KEYID = 5
2,865,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,605 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,306 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,224 UART: [afmc] --
2,909,244 UART: [cold-reset] --
2,909,888 UART: [state] Locking Datavault
2,911,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,637 UART: [state] Locking ICCM
2,912,117 UART: [exit] Launching FMC @ 0x40000130
2,917,447 UART:
2,917,463 UART: Running Caliptra FMC ...
2,917,871 UART:
2,918,014 UART: [state] CFI Enabled
2,928,494 UART: [fht] FMC Alias Private Key: 7
3,047,904 UART: [art] Extend RT PCRs Done
3,048,332 UART: [art] Lock RT PCRs Done
3,049,990 UART: [art] Populate DV Done
3,058,055 UART: [fht] FMC Alias Private Key: 7
3,059,207 UART: [art] Derive CDI
3,059,487 UART: [art] Store in slot 0x4
3,144,982 UART: [art] Derive Key Pair
3,145,342 UART: [art] Store priv key in slot 0x5
3,158,692 UART: [art] Derive Key Pair - Done
3,173,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,277 UART: [art] PUB.X = 5C417F5A8F56ECB34D77A7E430A31867FEF1F0C60D5CF89450AFCAFAEE2BFB391513AC543CC58C48935CD00FAAEF893A
3,197,065 UART: [art] PUB.Y = 673D831E8166F9A1F8E17B5E4C1F67AE31F7521576D13287AE8E7A966AA235B1E7A6CEA1CE42801AEC3C2DA389AFE98D
3,204,029 UART: [art] SIG.R = 273BC91424380446880BED35C2B7F11A513B82F349DD40920B3089050892B1B93D9587E4D4AA71FA53525C4FB25F0ED4
3,210,777 UART: [art] SIG.S = CAAE500093067ADCF8C36F9FAD23EF17E92D76B6C8E6A2D1F48527B2B72B07582628A5CAF690A73086AD09FDFF42D547
3,234,726 UART: Caliptra RT
3,235,069 UART: [state] CFI Enabled
3,354,788 UART: [rt] RT listening for mailbox commands...
3,355,458 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,762 UART: [rt]cmd =0x434b4558, len=80
3,555,699 >>> mbox cmd response data (6280 bytes)
3,555,700 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,558 UART: [rt]cmd =0x414c544e, len=41
3,587,417 >>> mbox cmd response data (8 bytes)
3,587,418 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,549 UART: [rt]cmd =0x434b4558, len=80
3,787,260 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 ready_for_fw is high
1,060,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,687 >>> mbox cmd response: success
2,740,944 UART:
2,740,960 UART: Running Caliptra FMC ...
2,741,368 UART:
2,741,511 UART: [state] CFI Enabled
2,751,929 UART: [fht] FMC Alias Private Key: 7
2,870,547 UART: [art] Extend RT PCRs Done
2,870,975 UART: [art] Lock RT PCRs Done
2,872,505 UART: [art] Populate DV Done
2,880,632 UART: [fht] FMC Alias Private Key: 7
2,881,792 UART: [art] Derive CDI
2,882,072 UART: [art] Store in slot 0x4
2,968,181 UART: [art] Derive Key Pair
2,968,541 UART: [art] Store priv key in slot 0x5
2,982,495 UART: [art] Derive Key Pair - Done
2,997,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,358 UART: [art] PUB.X = B2A2FC2BB1E2396215008FA0C9E1E46816BB9D6C93B68240D16F37948EF0E5AD921CA35F7B01717D31BA0883D9786671
3,020,102 UART: [art] PUB.Y = A8731EBAE972DB389657CEAF82933AA3FEF43F0840097C319C07AF74E5FC11F001D9C5EB35CCB0FF4735A4BD5CBA5CFC
3,027,064 UART: [art] SIG.R = 0F9D6842670219DF1F85424051B63AAD2D41F2F832FA24282B00A3A99BC6BB9B65AD240534D89E8573BA5C71FD1D204D
3,033,807 UART: [art] SIG.S = 6DA05F20444724197A1438B8A916B8297410D6FA89C505883DE75CA70326A4C1662AE585DCA328426105C6080B096EA2
3,058,119 UART: Caliptra RT
3,058,462 UART: [state] CFI Enabled
3,178,534 UART: [rt] RT listening for mailbox commands...
3,179,204 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,542 UART: [rt]cmd =0x434b4558, len=80
3,380,185 >>> mbox cmd response data (6280 bytes)
3,380,186 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,804 UART: [rt]cmd =0x414c544e, len=41
3,411,821 >>> mbox cmd response data (8 bytes)
3,411,822 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,821 UART: [rt]cmd =0x434b4558, len=80
3,611,578 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_not_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,249 UART:
192,621 UART: Running Caliptra ROM ...
193,721 UART:
193,889 UART: [state] CFI Enabled
262,038 UART: [state] LifecycleState = Unprovisioned
263,948 UART: [state] DebugLocked = No
266,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,913 UART: [kat] SHA2-256
441,626 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,117 UART: [kat] ++
452,598 UART: [kat] sha1
464,043 UART: [kat] SHA2-256
466,790 UART: [kat] SHA2-384
472,577 UART: [kat] SHA2-512-ACC
474,948 UART: [kat] ECC-384
2,766,581 UART: [kat] HMAC-384Kdf
2,777,841 UART: [kat] LMS
3,968,192 UART: [kat] --
3,970,858 UART: [cold-reset] ++
3,971,981 UART: [fht] Storing FHT @ 0x50003400
3,983,364 UART: [idev] ++
3,983,946 UART: [idev] CDI.KEYID = 6
3,984,835 UART: [idev] SUBJECT.KEYID = 7
3,986,082 UART: [idev] UDS.KEYID = 0
3,987,054 ready_for_fw is high
3,987,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,347 UART: [idev] Erasing UDS.KEYID = 0
7,324,411 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,873 UART: [idev] --
7,352,192 UART: [ldev] ++
7,352,773 UART: [ldev] CDI.KEYID = 6
7,353,742 UART: [ldev] SUBJECT.KEYID = 5
7,354,905 UART: [ldev] AUTHORITY.KEYID = 7
7,356,249 UART: [ldev] FE.KEYID = 1
7,401,401 UART: [ldev] Erasing FE.KEYID = 1
10,733,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,869 UART: [ldev] --
13,095,412 UART: [fwproc] Waiting for Commands...
13,098,630 UART: [fwproc] Received command 0x46574c44
13,100,878 UART: [fwproc] Received Image of size 118548 bytes
17,203,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,284,719 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,357,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,102 >>> mbox cmd response: success
17,690,129 UART: [afmc] ++
17,690,751 UART: [afmc] CDI.KEYID = 6
17,691,665 UART: [afmc] SUBJECT.KEYID = 7
17,692,902 UART: [afmc] AUTHORITY.KEYID = 5
21,052,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,366,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,380,982 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,376 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,627 UART: [afmc] --
23,420,798 UART: [cold-reset] --
23,424,827 UART: [state] Locking Datavault
23,429,704 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,459 UART: [state] Locking ICCM
23,433,718 UART: [exit] Launching FMC @ 0x40000130
23,442,114 UART:
23,442,351 UART: Running Caliptra FMC ...
23,443,455 UART:
23,443,637 UART: [state] CFI Enabled
23,511,174 UART: [fht] FMC Alias Private Key: 7
25,851,538 UART: [art] Extend RT PCRs Done
25,852,758 UART: [art] Lock RT PCRs Done
25,854,435 UART: [art] Populate DV Done
25,859,842 UART: [fht] FMC Alias Private Key: 7
25,861,592 UART: [art] Derive CDI
25,862,401 UART: [art] Store in slot 0x4
25,919,816 UART: [art] Derive Key Pair
25,920,859 UART: [art] Store priv key in slot 0x5
29,213,373 UART: [art] Derive Key Pair - Done
29,226,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,514,976 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,477 UART: [art] PUB.X = A32D8992826FF15C633F0BB8155D425C045E83BFC3FFEF033E845412489A03086C2E87FBF10B6E0A17E9F79C50468C77
31,523,776 UART: [art] PUB.Y = B67440E4F7441C9088E7B9C5B1BBC7809D363F62742CF678F1F3EA2A6CAA9478ABD0E9853336932EEB42360A459B8EEC
31,531,049 UART: [art] SIG.R = E4F90165EF7F9211DD531D8958E108D119DDCEE7A2DD2C1041DE3F62B3A46CB35865B434F436976A10BE254E7660960B
31,538,461 UART: [art] SIG.S = ABAE88F023E8654EF02E909C107E01250F06D47DEEDDF4C973D99851AC2E66A36D6766B9E2CC1D29E9E86ED23F048599
32,843,580 UART: Caliptra RT
32,844,293 UART: [state] CFI Enabled
33,022,013 UART: [rt] RT listening for mailbox commands...
33,023,914 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,054,063 UART: [rt]cmd =0x414c544e, len=41
33,056,448 >>> mbox cmd response data (8 bytes)
33,057,214 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,087,576 UART: [rt]cmd =0x434b4558, len=80
38,834,151 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,784,964 ready_for_fw is high
3,785,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,946 >>> mbox cmd response: success
23,651,308 UART:
23,651,730 UART: Running Caliptra FMC ...
23,652,853 UART:
23,653,006 UART: [state] CFI Enabled
23,719,943 UART: [fht] FMC Alias Private Key: 7
26,060,804 UART: [art] Extend RT PCRs Done
26,062,031 UART: [art] Lock RT PCRs Done
26,063,906 UART: [art] Populate DV Done
26,069,564 UART: [fht] FMC Alias Private Key: 7
26,071,275 UART: [art] Derive CDI
26,072,017 UART: [art] Store in slot 0x4
26,128,959 UART: [art] Derive Key Pair
26,129,999 UART: [art] Store priv key in slot 0x5
29,422,510 UART: [art] Derive Key Pair - Done
29,435,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,044 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,563 UART: [art] PUB.X = AC051657FCF6378F49538AEE528CC632B99E4CE78489361FF540608ED1547FBDA692D44970E6508AB2A1F0CDF7E5C56B
31,732,818 UART: [art] PUB.Y = B002AE720A3C59764D49FE843C6AD4E5C19920E002C221DDE0A7FCD0FD2A97641A2B6533DBE6D167FBA49141C69E67FF
31,740,062 UART: [art] SIG.R = 585EF6B2FDE8EB367D0B12EC6469F7A1CF9E0EFC6B204E9C6EC1CEC7EC168DFABD6B865FC9852DC90016457C68ACDC94
31,747,460 UART: [art] SIG.S = BDB4AA987271ACE88B4093CF94AA4BF68B5E0F1286EC6E116DE2014942E6249FD9AC3740E3F8CB40BCE1205EF6420B6E
33,052,596 UART: Caliptra RT
33,053,304 UART: [state] CFI Enabled
33,230,084 UART: [rt] RT listening for mailbox commands...
33,231,987 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,262,138 UART: [rt]cmd =0x414c544e, len=41
33,264,490 >>> mbox cmd response data (8 bytes)
33,265,341 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,295,795 UART: [rt]cmd =0x434b4558, len=80
39,043,518 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,294 UART:
192,651 UART: Running Caliptra ROM ...
193,770 UART:
603,595 UART: [state] CFI Enabled
618,534 UART: [state] LifecycleState = Unprovisioned
620,484 UART: [state] DebugLocked = No
622,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,657 UART: [kat] SHA2-256
797,391 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,940 UART: [kat] ++
808,418 UART: [kat] sha1
819,501 UART: [kat] SHA2-256
822,154 UART: [kat] SHA2-384
828,139 UART: [kat] SHA2-512-ACC
830,520 UART: [kat] ECC-384
3,113,225 UART: [kat] HMAC-384Kdf
3,124,108 UART: [kat] LMS
4,314,264 UART: [kat] --
4,320,489 UART: [cold-reset] ++
4,322,996 UART: [fht] Storing FHT @ 0x50003400
4,335,603 UART: [idev] ++
4,336,161 UART: [idev] CDI.KEYID = 6
4,337,133 UART: [idev] SUBJECT.KEYID = 7
4,338,369 UART: [idev] UDS.KEYID = 0
4,339,414 ready_for_fw is high
4,339,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,545 UART: [idev] Erasing UDS.KEYID = 0
7,627,675 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,722 UART: [idev] --
7,652,581 UART: [ldev] ++
7,653,173 UART: [ldev] CDI.KEYID = 6
7,654,108 UART: [ldev] SUBJECT.KEYID = 5
7,655,315 UART: [ldev] AUTHORITY.KEYID = 7
7,656,591 UART: [ldev] FE.KEYID = 1
7,666,401 UART: [ldev] Erasing FE.KEYID = 1
10,950,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,407 UART: [ldev] --
13,310,127 UART: [fwproc] Waiting for Commands...
13,312,698 UART: [fwproc] Received command 0x46574c44
13,314,928 UART: [fwproc] Received Image of size 118548 bytes
17,417,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,496 >>> mbox cmd response: success
17,899,444 UART: [afmc] ++
17,900,027 UART: [afmc] CDI.KEYID = 6
17,900,939 UART: [afmc] SUBJECT.KEYID = 7
17,902,205 UART: [afmc] AUTHORITY.KEYID = 5
21,217,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,242 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,695 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,581,068 UART: [afmc] --
23,584,393 UART: [cold-reset] --
23,587,652 UART: [state] Locking Datavault
23,592,510 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,283 UART: [state] Locking ICCM
23,596,967 UART: [exit] Launching FMC @ 0x40000130
23,605,354 UART:
23,605,581 UART: Running Caliptra FMC ...
23,606,674 UART:
23,606,828 UART: [state] CFI Enabled
23,614,930 UART: [fht] FMC Alias Private Key: 7
25,954,374 UART: [art] Extend RT PCRs Done
25,955,594 UART: [art] Lock RT PCRs Done
25,957,139 UART: [art] Populate DV Done
25,962,595 UART: [fht] FMC Alias Private Key: 7
25,964,173 UART: [art] Derive CDI
25,964,907 UART: [art] Store in slot 0x4
26,007,870 UART: [art] Derive Key Pair
26,008,866 UART: [art] Store priv key in slot 0x5
29,251,224 UART: [art] Derive Key Pair - Done
29,264,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,767 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,276 UART: [art] PUB.X = 2745074F1DE226902D44B42B5DDBE9FB041C435A355CF00CBC0049EAF74D41367664182E42FBB96134CB649CA7C1FAE7
31,553,510 UART: [art] PUB.Y = 104C62A7C17BA40E76BE35886251EC3A9C2FA2B85761EC7A3F25580C1EA36E53CE04123D7D816697D394E9D01E505D3A
31,560,821 UART: [art] SIG.R = 195CB41CC31A14274869A8A705A62F944453CC6C5FD0CA8BB52CCFA7B0FC4F627F4B4490202D29583414CA731114BB12
31,568,164 UART: [art] SIG.S = A2F97471664DA8AED607DFF43D233C879E8502C87246D2F703BEE2F47311D2D5EB5A97D64F7C43725D6F3D0CD44EF4F1
32,873,453 UART: Caliptra RT
32,874,166 UART: [state] CFI Enabled
33,007,696 UART: [rt] RT listening for mailbox commands...
33,009,596 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,039,792 UART: [rt]cmd =0x414c544e, len=41
33,042,377 >>> mbox cmd response data (8 bytes)
33,043,337 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,073,992 UART: [rt]cmd =0x434b4558, len=80
38,737,305 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
4,126,856 ready_for_fw is high
4,127,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,439 >>> mbox cmd response: success
23,810,063 UART:
23,810,455 UART: Running Caliptra FMC ...
23,811,600 UART:
23,811,757 UART: [state] CFI Enabled
23,819,591 UART: [fht] FMC Alias Private Key: 7
26,159,596 UART: [art] Extend RT PCRs Done
26,160,819 UART: [art] Lock RT PCRs Done
26,162,713 UART: [art] Populate DV Done
26,168,177 UART: [fht] FMC Alias Private Key: 7
26,169,773 UART: [art] Derive CDI
26,170,584 UART: [art] Store in slot 0x4
26,213,833 UART: [art] Derive Key Pair
26,214,873 UART: [art] Store priv key in slot 0x5
29,457,115 UART: [art] Derive Key Pair - Done
29,469,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,261 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,766 UART: [art] PUB.X = 1AF13DBDE2F8B9CC7C4F09A761CC0195A10668F44E84AA44A12DB74F0A0CB56E9FF085198093DA9C4B05901183191C65
31,759,067 UART: [art] PUB.Y = A5E134628B47C30DEC19E6F8745B01C518EEB206571C77E61E98057A9098F210995134321F70DE7682A0BE6438ABD9DE
31,766,257 UART: [art] SIG.R = 3799616F2C7436DB7E35F7DB4ACC3B62B7FE03FADD3EA8ECD5D41B37BE920EB735EBA9764009C28FABC760285058DFE2
31,773,701 UART: [art] SIG.S = 08F551977229D7E6F98D25FDBF784E185A06431DB3F4A4D9BE9C9729864214CE98BD8D5D816518F10E8658E18B0BB2FD
33,078,866 UART: Caliptra RT
33,079,602 UART: [state] CFI Enabled
33,213,628 UART: [rt] RT listening for mailbox commands...
33,215,515 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
33,245,594 UART: [rt]cmd =0x414c544e, len=41
33,248,065 >>> mbox cmd response data (8 bytes)
33,249,020 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,279,378 UART: [rt]cmd =0x434b4558, len=80
38,942,743 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
191,979 UART:
192,358 UART: Running Caliptra ROM ...
193,498 UART:
193,646 UART: [state] CFI Enabled
264,260 UART: [state] LifecycleState = Unprovisioned
266,257 UART: [state] DebugLocked = No
268,151 UART: [state] WD Timer not started. Device not locked for debugging
271,478 UART: [kat] SHA2-256
451,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,913 UART: [kat] ++
462,361 UART: [kat] sha1
472,594 UART: [kat] SHA2-256
475,313 UART: [kat] SHA2-384
481,584 UART: [kat] SHA2-512-ACC
483,943 UART: [kat] ECC-384
2,950,430 UART: [kat] HMAC-384Kdf
2,971,190 UART: [kat] LMS
3,447,717 UART: [kat] --
3,452,283 UART: [cold-reset] ++
3,454,141 UART: [fht] FHT @ 0x50003400
3,465,607 UART: [idev] ++
3,466,182 UART: [idev] CDI.KEYID = 6
3,467,214 UART: [idev] SUBJECT.KEYID = 7
3,468,382 UART: [idev] UDS.KEYID = 0
3,469,426 ready_for_fw is high
3,469,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,832 UART: [idev] Erasing UDS.KEYID = 0
5,989,013 UART: [idev] Sha1 KeyId Algorithm
6,012,136 UART: [idev] --
6,017,242 UART: [ldev] ++
6,017,878 UART: [ldev] CDI.KEYID = 6
6,018,804 UART: [ldev] SUBJECT.KEYID = 5
6,019,962 UART: [ldev] AUTHORITY.KEYID = 7
6,021,243 UART: [ldev] FE.KEYID = 1
6,060,303 UART: [ldev] Erasing FE.KEYID = 1
8,568,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,341 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,524 UART: [ldev] --
10,376,380 UART: [fwproc] Wait for Commands...
10,379,650 UART: [fwproc] Recv command 0x46574c44
10,381,624 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,187 >>> mbox cmd response: success
14,354,979 UART: [afmc] ++
14,355,604 UART: [afmc] CDI.KEYID = 6
14,356,494 UART: [afmc] SUBJECT.KEYID = 7
14,357,710 UART: [afmc] AUTHORITY.KEYID = 5
16,894,222 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,337 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,368 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,973 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,471 UART: [afmc] --
18,696,733 UART: [cold-reset] --
18,699,947 UART: [state] Locking Datavault
18,705,078 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,830 UART: [state] Locking ICCM
18,709,624 UART: [exit] Launching FMC @ 0x40000130
18,718,014 UART:
18,718,253 UART: Running Caliptra FMC ...
18,719,350 UART:
18,719,505 UART: [state] CFI Enabled
18,776,461 UART: [fht] FMC Alias Private Key: 7
20,543,521 UART: [art] Extend RT PCRs Done
20,544,751 UART: [art] Lock RT PCRs Done
20,546,481 UART: [art] Populate DV Done
20,551,888 UART: [fht] FMC Alias Private Key: 7
20,553,584 UART: [art] Derive CDI
20,554,391 UART: [art] Store in slot 0x4
20,609,648 UART: [art] Derive Key Pair
20,610,692 UART: [art] Store priv key in slot 0x5
23,073,394 UART: [art] Derive Key Pair - Done
23,086,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,934 UART: [art] PUB.X = 9F302493C1B141564993A7EB0301D3A6B7337AC205DB5073036119740BF2B562753058433D7D38EBAC091CD8A5FCCBEA
24,808,205 UART: [art] PUB.Y = E4DA4646A8D6171D276762F41F85FA24843E651CAA1C9432E5D20E521FFECE42C477D61F1C89485F4806665F739A588F
24,815,445 UART: [art] SIG.R = 268BDAD2523ED20DFABF7C21FCA4DB96B1C5FD7F5816C03986D4547D0A3F56AD33CC3F644B2B2ADB34FD41F629BF17C7
24,822,842 UART: [art] SIG.S = 542AB5445F9945BBF14EFF494D2E9266B02A9A00531C701B9AF2139FFF04188DA5EA47517B7C6396E4524BDA37795040
25,801,857 UART: Caliptra RT
25,802,583 UART: [state] CFI Enabled
25,982,769 UART: [rt] RT listening for mailbox commands...
25,984,652 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,014,597 UART: [rt]cmd =0x414c544e, len=41
26,017,058 >>> mbox cmd response data (8 bytes)
26,017,977 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,048,426 UART: [rt]cmd =0x434b4558, len=80
30,388,648 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
3,461,733 ready_for_fw is high
3,462,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,984 >>> mbox cmd response: success
18,523,177 UART:
18,523,583 UART: Running Caliptra FMC ...
18,524,733 UART:
18,524,896 UART: [state] CFI Enabled
18,594,189 UART: [fht] FMC Alias Private Key: 7
20,360,214 UART: [art] Extend RT PCRs Done
20,361,445 UART: [art] Lock RT PCRs Done
20,362,916 UART: [art] Populate DV Done
20,368,280 UART: [fht] FMC Alias Private Key: 7
20,369,997 UART: [art] Derive CDI
20,370,737 UART: [art] Store in slot 0x4
20,427,506 UART: [art] Derive Key Pair
20,428,504 UART: [art] Store priv key in slot 0x5
22,891,391 UART: [art] Derive Key Pair - Done
22,904,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,617,846 UART: [art] Erasing AUTHORITY.KEYID = 7
24,619,357 UART: [art] PUB.X = CC1E225B2EC50F4B7C9914D21DDAE13DF104892509C435E7084627AF46F819C9FAC44BD94BC7750CD1BC648A5010FD3F
24,626,620 UART: [art] PUB.Y = 799D51093BA63BC13F8E873A4E24AD518E562A53FFF302CCFB4F4BC6DA2E8DC334014D28C876077BD31DDAC7C677C348
24,633,932 UART: [art] SIG.R = 9BF229A32081B004D22E7910B73C4E5B74F0973C5ECA81D2E3945FFE801D5454B51CE90C393BF9777746DF5ADA244BA7
24,641,333 UART: [art] SIG.S = 9F242AB8582AF5F0FFFDFA8FB364A1A11B790C03BF3B9E722CFDD59E0AE28D7681072938454EDAEF46D3A58688932E1A
25,620,212 UART: Caliptra RT
25,620,927 UART: [state] CFI Enabled
25,801,229 UART: [rt] RT listening for mailbox commands...
25,803,114 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,833,044 UART: [rt]cmd =0x414c544e, len=41
25,835,384 >>> mbox cmd response data (8 bytes)
25,836,234 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,866,689 UART: [rt]cmd =0x434b4558, len=80
30,208,725 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,201 writing to cptra_bootfsm_go
193,285 UART:
193,650 UART: Running Caliptra ROM ...
194,771 UART:
604,720 UART: [state] CFI Enabled
617,771 UART: [state] LifecycleState = Unprovisioned
619,654 UART: [state] DebugLocked = No
621,827 UART: [state] WD Timer not started. Device not locked for debugging
625,086 UART: [kat] SHA2-256
804,752 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,549 UART: [kat] ++
816,035 UART: [kat] sha1
827,487 UART: [kat] SHA2-256
830,219 UART: [kat] SHA2-384
835,647 UART: [kat] SHA2-512-ACC
837,949 UART: [kat] ECC-384
3,279,730 UART: [kat] HMAC-384Kdf
3,292,890 UART: [kat] LMS
3,769,356 UART: [kat] --
3,774,293 UART: [cold-reset] ++
3,776,439 UART: [fht] FHT @ 0x50003400
3,787,712 UART: [idev] ++
3,788,350 UART: [idev] CDI.KEYID = 6
3,789,234 UART: [idev] SUBJECT.KEYID = 7
3,790,426 UART: [idev] UDS.KEYID = 0
3,791,545 ready_for_fw is high
3,791,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,587 UART: [idev] Erasing UDS.KEYID = 0
6,263,090 UART: [idev] Sha1 KeyId Algorithm
6,286,315 UART: [idev] --
6,292,042 UART: [ldev] ++
6,292,614 UART: [ldev] CDI.KEYID = 6
6,293,554 UART: [ldev] SUBJECT.KEYID = 5
6,294,770 UART: [ldev] AUTHORITY.KEYID = 7
6,296,003 UART: [ldev] FE.KEYID = 1
6,308,079 UART: [ldev] Erasing FE.KEYID = 1
8,789,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,090 UART: [ldev] --
10,587,289 UART: [fwproc] Wait for Commands...
10,589,440 UART: [fwproc] Recv command 0x46574c44
10,591,483 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,164 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,042 >>> mbox cmd response: success
14,553,700 UART: [afmc] ++
14,554,293 UART: [afmc] CDI.KEYID = 6
14,555,230 UART: [afmc] SUBJECT.KEYID = 7
14,556,453 UART: [afmc] AUTHORITY.KEYID = 5
17,063,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,789,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,821,868 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,870 UART: [afmc] --
18,867,497 UART: [cold-reset] --
18,873,360 UART: [state] Locking Datavault
18,879,048 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,817 UART: [state] Locking ICCM
18,883,144 UART: [exit] Launching FMC @ 0x40000130
18,891,591 UART:
18,891,843 UART: Running Caliptra FMC ...
18,892,970 UART:
18,893,135 UART: [state] CFI Enabled
18,901,028 UART: [fht] FMC Alias Private Key: 7
20,667,359 UART: [art] Extend RT PCRs Done
20,668,580 UART: [art] Lock RT PCRs Done
20,670,269 UART: [art] Populate DV Done
20,675,847 UART: [fht] FMC Alias Private Key: 7
20,677,605 UART: [art] Derive CDI
20,678,427 UART: [art] Store in slot 0x4
20,721,004 UART: [art] Derive Key Pair
20,722,014 UART: [art] Store priv key in slot 0x5
23,148,248 UART: [art] Derive Key Pair - Done
23,161,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,455 UART: [art] PUB.X = BB92C3217E6313FB9AA846DA76DCB08ACDEC451451BB654F867DAD5E769D114D3E906EB2BC03A8BFCED8FABDE5323041
24,876,766 UART: [art] PUB.Y = 24630281E933C8E2E53CE44E3256008DD565A76C30D39C2BEDB9FE9568B23B2DEEE58DB377B13CF3CE60000892D41E1C
24,884,053 UART: [art] SIG.R = 272C2966F025759CC6A3B115E4386866B71AF83AFCC90A45469EC1AD453E4E5A5B4DEDF42A7B69639E5DF25F12F7B4C4
24,891,415 UART: [art] SIG.S = BAC5397CD3F8C513950669E2E372F8D47A9147F1B4D481B48EA74D18057DC9691E2CCBB3E365CC55861B6388A7935E5A
25,869,852 UART: Caliptra RT
25,870,567 UART: [state] CFI Enabled
26,003,480 UART: [rt] RT listening for mailbox commands...
26,005,375 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,035,635 UART: [rt]cmd =0x414c544e, len=41
26,038,071 >>> mbox cmd response data (8 bytes)
26,039,091 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,069,613 UART: [rt]cmd =0x434b4558, len=80
30,344,328 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,780,678 ready_for_fw is high
3,781,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,099 >>> mbox cmd response: success
18,697,811 UART:
18,698,192 UART: Running Caliptra FMC ...
18,699,388 UART:
18,699,576 UART: [state] CFI Enabled
18,707,459 UART: [fht] FMC Alias Private Key: 7
20,473,902 UART: [art] Extend RT PCRs Done
20,475,118 UART: [art] Lock RT PCRs Done
20,476,640 UART: [art] Populate DV Done
20,482,160 UART: [fht] FMC Alias Private Key: 7
20,483,877 UART: [art] Derive CDI
20,484,699 UART: [art] Store in slot 0x4
20,527,785 UART: [art] Derive Key Pair
20,528,853 UART: [art] Store priv key in slot 0x5
22,955,733 UART: [art] Derive Key Pair - Done
22,968,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,353 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,850 UART: [art] PUB.X = 6447BED0E1F3C591685CC0DDA44E333FAB6452239D91DB5BC2A8F28A51B9363C69B7D2EE4701D06CD2F4194B4D4F55E8
24,684,127 UART: [art] PUB.Y = 49841FD8849E9589AED8A0D07235B8C9EE0D05CCA90660A32CDB31EA7DAC967364402F86DA10FBEC4794070461915AD7
24,691,389 UART: [art] SIG.R = D7470F49F7591AE85E6D487582CE8888665E3E7305D951AEF8B0844BF763090FA825F568923763222ED4A8D2AB5E0E0B
24,698,750 UART: [art] SIG.S = 0D54AA5F99C2A32D8C3C8B39BFE8B2EB4BF1F52333D92E05927341724C692F881BD6B9109212A159D99C5906B53BF121
25,677,336 UART: Caliptra RT
25,678,028 UART: [state] CFI Enabled
25,810,289 UART: [rt] RT listening for mailbox commands...
25,812,189 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
25,842,332 UART: [rt]cmd =0x414c544e, len=41
25,844,711 >>> mbox cmd response data (8 bytes)
25,845,647 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,876,198 UART: [rt]cmd =0x434b4558, len=80
30,150,579 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
191,999 UART:
192,361 UART: Running Caliptra ROM ...
194,009 UART:
194,184 UART: [state] CFI Enabled
262,992 UART: [state] LifecycleState = Unprovisioned
265,351 UART: [state] DebugLocked = No
267,442 UART: [state] WD Timer not started. Device not locked for debugging
271,254 UART: [kat] SHA2-256
460,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,689 UART: [kat] ++
472,136 UART: [kat] sha1
483,790 UART: [kat] SHA2-256
486,794 UART: [kat] SHA2-384
492,351 UART: [kat] SHA2-512-ACC
494,936 UART: [kat] ECC-384
2,946,522 UART: [kat] HMAC-384Kdf
2,971,285 UART: [kat] LMS
3,503,045 UART: [kat] --
3,508,919 UART: [cold-reset] ++
3,509,867 UART: [fht] FHT @ 0x50003400
3,521,559 UART: [idev] ++
3,522,266 UART: [idev] CDI.KEYID = 6
3,523,248 UART: [idev] SUBJECT.KEYID = 7
3,524,420 UART: [idev] UDS.KEYID = 0
3,525,344 ready_for_fw is high
3,525,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,664 UART: [idev] Erasing UDS.KEYID = 0
6,029,132 UART: [idev] Sha1 KeyId Algorithm
6,051,712 UART: [idev] --
6,055,902 UART: [ldev] ++
6,056,593 UART: [ldev] CDI.KEYID = 6
6,057,505 UART: [ldev] SUBJECT.KEYID = 5
6,058,664 UART: [ldev] AUTHORITY.KEYID = 7
6,059,896 UART: [ldev] FE.KEYID = 1
6,100,348 UART: [ldev] Erasing FE.KEYID = 1
8,600,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,320,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,335,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,350,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,365,614 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,386,663 UART: [ldev] --
10,392,914 UART: [fwproc] Wait for Commands...
10,395,758 UART: [fwproc] Recv command 0x46574c44
10,398,005 UART: [fwproc] Recv'd Img size: 118548 bytes
13,897,331 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,972,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,095,905 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,655,684 >>> mbox cmd response: success
14,659,319 UART: [afmc] ++
14,660,074 UART: [afmc] CDI.KEYID = 6
14,661,186 UART: [afmc] SUBJECT.KEYID = 7
14,662,724 UART: [afmc] AUTHORITY.KEYID = 5
17,192,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,915,659 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,917,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,932,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,947,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,962,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,985,482 UART: [afmc] --
18,989,500 UART: [cold-reset] --
18,993,636 UART: [state] Locking Datavault
18,998,338 UART: [state] Locking PCR0, PCR1 and PCR31
19,000,489 UART: [state] Locking ICCM
19,002,760 UART: [exit] Launching FMC @ 0x40000130
19,011,445 UART:
19,011,689 UART: Running Caliptra FMC ...
19,012,717 UART:
19,012,865 UART: [state] CFI Enabled
19,074,858 UART: [fht] FMC Alias Private Key: 7
20,841,194 UART: [art] Extend RT PCRs Done
20,842,425 UART: [art] Lock RT PCRs Done
20,844,239 UART: [art] Populate DV Done
20,849,756 UART: [fht] FMC Alias Private Key: 7
20,851,475 UART: [art] Derive CDI
20,852,212 UART: [art] Store in slot 0x4
20,907,899 UART: [art] Derive Key Pair
20,908,896 UART: [art] Store priv key in slot 0x5
23,371,681 UART: [art] Derive Key Pair - Done
23,384,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,097,671 UART: [art] Erasing AUTHORITY.KEYID = 7
25,099,187 UART: [art] PUB.X = 8EB411BCB3A137415E86D55147450D3EE60C10164CD7988470408DFF9E68DD9D5155E0E200CE40C1E03B4A57B7A4CBDB
25,106,455 UART: [art] PUB.Y = 95B42ED26A06E7F42B5C2BD13FCC540D5A7B0E89691DF03D4BE5D54AA3FC86371F786710D9D57E13B15A03EDFB07D4FC
25,113,706 UART: [art] SIG.R = C984613E0ADC1C0DE13B17481D3A55E46A499464AAA5AE90F61803E48C14DFA780BFDE1EFFFD528729D0E974B902330B
25,121,109 UART: [art] SIG.S = 5DEDB741EEE2957DC9A7E79861EFB64B48520865BE6F4D303CF9AE30952D44F7ADC7B431BDD2827137A6306198635986
26,100,101 UART: Caliptra RT
26,100,795 UART: [state] CFI Enabled
26,282,418 UART: [rt] RT listening for mailbox commands...
26,284,318 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,314,370 UART: [rt]cmd =0x414c544e, len=41
26,316,928 >>> mbox cmd response data (8 bytes)
26,317,774 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,348,026 UART: [rt]cmd =0x434b4558, len=80
30,688,704 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,441,756 ready_for_fw is high
3,442,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,848,576 >>> mbox cmd response: success
19,152,019 UART:
19,152,423 UART: Running Caliptra FMC ...
19,153,622 UART:
19,153,786 UART: [state] CFI Enabled
19,219,240 UART: [fht] FMC Alias Private Key: 7
20,985,900 UART: [art] Extend RT PCRs Done
20,987,131 UART: [art] Lock RT PCRs Done
20,988,650 UART: [art] Populate DV Done
20,994,122 UART: [fht] FMC Alias Private Key: 7
20,995,718 UART: [art] Derive CDI
20,996,535 UART: [art] Store in slot 0x4
21,052,446 UART: [art] Derive Key Pair
21,053,489 UART: [art] Store priv key in slot 0x5
23,516,222 UART: [art] Derive Key Pair - Done
23,529,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,756 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,264 UART: [art] PUB.X = 953CF7A4D572FF60DB38BD53B75D7F2D0D3A3AAF2B35D3A8C62668CD563F755876960EBD4490F8B40D32DC445C81C97C
25,250,503 UART: [art] PUB.Y = D99A7F84D23E62F2B07AC7D90E5E438C4D8F594ED9FE7F7C02103F26357598022EF2545E0CE72CEF541677AEB582730E
25,257,783 UART: [art] SIG.R = 5A8B658D2E3267FC8BB6F7699BB1FA8F17A10643FD95DFB3D2249B3D0AB32B31D48C80417C982CE52F326E81F2DF47C2
25,265,194 UART: [art] SIG.S = 0E140360E48190E51CAF4F60E460A62672111E80671B13BF8079BEAE0A84235464664A365260B9F9891DF6A26B7ABF9F
26,243,935 UART: Caliptra RT
26,244,649 UART: [state] CFI Enabled
26,426,073 UART: [rt] RT listening for mailbox commands...
26,427,968 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,458,011 UART: [rt]cmd =0x414c544e, len=41
26,460,440 >>> mbox cmd response data (8 bytes)
26,461,353 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,491,733 UART: [rt]cmd =0x434b4558, len=80
30,832,417 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,387 UART:
192,779 UART: Running Caliptra ROM ...
193,916 UART:
603,593 UART: [state] CFI Enabled
616,288 UART: [state] LifecycleState = Unprovisioned
618,686 UART: [state] DebugLocked = No
621,074 UART: [state] WD Timer not started. Device not locked for debugging
626,057 UART: [kat] SHA2-256
815,898 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,707 UART: [kat] ++
827,234 UART: [kat] sha1
839,860 UART: [kat] SHA2-256
842,918 UART: [kat] SHA2-384
848,782 UART: [kat] SHA2-512-ACC
851,366 UART: [kat] ECC-384
3,293,528 UART: [kat] HMAC-384Kdf
3,307,465 UART: [kat] LMS
3,839,289 UART: [kat] --
3,843,167 UART: [cold-reset] ++
3,844,538 UART: [fht] FHT @ 0x50003400
3,855,869 UART: [idev] ++
3,856,579 UART: [idev] CDI.KEYID = 6
3,857,491 UART: [idev] SUBJECT.KEYID = 7
3,858,740 UART: [idev] UDS.KEYID = 0
3,859,669 ready_for_fw is high
3,859,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,766 UART: [idev] Erasing UDS.KEYID = 0
6,338,042 UART: [idev] Sha1 KeyId Algorithm
6,361,273 UART: [idev] --
6,366,324 UART: [ldev] ++
6,367,017 UART: [ldev] CDI.KEYID = 6
6,367,938 UART: [ldev] SUBJECT.KEYID = 5
6,369,101 UART: [ldev] AUTHORITY.KEYID = 7
6,370,280 UART: [ldev] FE.KEYID = 1
6,380,495 UART: [ldev] Erasing FE.KEYID = 1
8,858,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,001 UART: [ldev] --
10,650,732 UART: [fwproc] Wait for Commands...
10,653,586 UART: [fwproc] Recv command 0x46574c44
10,655,916 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,882 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,758 >>> mbox cmd response: success
14,919,881 UART: [afmc] ++
14,920,594 UART: [afmc] CDI.KEYID = 6
14,921,845 UART: [afmc] SUBJECT.KEYID = 7
14,923,291 UART: [afmc] AUTHORITY.KEYID = 5
17,427,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,280 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,953 UART: [afmc] --
19,225,304 UART: [cold-reset] --
19,231,398 UART: [state] Locking Datavault
19,237,528 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,701 UART: [state] Locking ICCM
19,241,489 UART: [exit] Launching FMC @ 0x40000130
19,250,185 UART:
19,250,428 UART: Running Caliptra FMC ...
19,251,533 UART:
19,251,700 UART: [state] CFI Enabled
19,259,696 UART: [fht] FMC Alias Private Key: 7
21,025,985 UART: [art] Extend RT PCRs Done
21,027,211 UART: [art] Lock RT PCRs Done
21,028,872 UART: [art] Populate DV Done
21,034,129 UART: [fht] FMC Alias Private Key: 7
21,035,629 UART: [art] Derive CDI
21,036,405 UART: [art] Store in slot 0x4
21,078,865 UART: [art] Derive Key Pair
21,079,917 UART: [art] Store priv key in slot 0x5
23,507,423 UART: [art] Derive Key Pair - Done
23,520,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,959 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,612 UART: [art] PUB.X = D0212BE264499592C8F3C29D3C1C5F14E316537625370764BAC04B2F59989B684CD01AA06CB93AB8D2B43AF39CD8C9F8
25,235,665 UART: [art] PUB.Y = 420D51D0FBF83B2D2BEF63E047154645C17A872126CE79D4107781DF6A72C5E1E7CC623B6D7FE53E99E7C6D747DAC618
25,242,978 UART: [art] SIG.R = 9F0D40972E3D4475E2EAAEDD28B841A168A8495EBAFA8C4F83539195E43DD7D66BEE80FDB7FB4C1F59AD8E90139D14EA
25,250,361 UART: [art] SIG.S = A9F30E3C752F529B2E807452FF74031E65AD68B8AF0BE3C597FE28CB685E63866C1457FC76D3A8CBFB8DA3DAE95AC779
26,229,581 UART: Caliptra RT
26,230,275 UART: [state] CFI Enabled
26,363,452 UART: [rt] RT listening for mailbox commands...
26,365,349 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,395,395 UART: [rt]cmd =0x414c544e, len=41
26,397,667 >>> mbox cmd response data (8 bytes)
26,398,724 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,429,136 UART: [rt]cmd =0x434b4558, len=80
30,702,651 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,759,535 ready_for_fw is high
3,759,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,989 >>> mbox cmd response: success
19,313,990 UART:
19,314,373 UART: Running Caliptra FMC ...
19,315,480 UART:
19,315,636 UART: [state] CFI Enabled
19,323,535 UART: [fht] FMC Alias Private Key: 7
21,089,424 UART: [art] Extend RT PCRs Done
21,090,657 UART: [art] Lock RT PCRs Done
21,091,994 UART: [art] Populate DV Done
21,097,053 UART: [fht] FMC Alias Private Key: 7
21,098,606 UART: [art] Derive CDI
21,099,350 UART: [art] Store in slot 0x4
21,142,507 UART: [art] Derive Key Pair
21,143,514 UART: [art] Store priv key in slot 0x5
23,570,525 UART: [art] Derive Key Pair - Done
23,583,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,343 UART: [art] PUB.X = 452BB0F1F916A7A7F51F4A213CE54F1262F302479D7D2CDA39E34813F7243405CE2C32F61718B51A7D912AF87783F9FB
25,298,562 UART: [art] PUB.Y = 7454DD8A091AAFDDF02A0CA4053257543766D13039EC68898B4382C7B3261B59E415C8225FFB5477C38B0B083B30A9FE
25,305,822 UART: [art] SIG.R = 0F032CC4FBFEA0EAE2350987B9754BC545D782225352E969C0E6C5C2907F5857C15D0F7ED51120B2CC93F0A35B823BD0
25,313,256 UART: [art] SIG.S = 83B17A30B693CFE037B0C403C90BBF648B9F50EA51027873EC513D7F54548B1C875EFFBDD31EC5D62FD3EF19C7686AF1
26,292,848 UART: Caliptra RT
26,293,539 UART: [state] CFI Enabled
26,426,366 UART: [rt] RT listening for mailbox commands...
26,428,248 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
26,458,474 UART: [rt]cmd =0x414c544e, len=41
26,460,912 >>> mbox cmd response data (8 bytes)
26,461,785 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,491,950 UART: [rt]cmd =0x434b4558, len=80
30,765,505 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,451 UART: [kat] SHA2-256
892,389 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,354 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,201 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,332 UART: [idev] ++
1,479,500 UART: [idev] CDI.KEYID = 6
1,479,860 UART: [idev] SUBJECT.KEYID = 7
1,480,284 UART: [idev] UDS.KEYID = 0
1,480,629 ready_for_fw is high
1,480,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,334 UART: [idev] Erasing UDS.KEYID = 0
1,505,302 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,838 UART: [idev] --
1,515,099 UART: [ldev] ++
1,515,267 UART: [ldev] CDI.KEYID = 6
1,515,630 UART: [ldev] SUBJECT.KEYID = 5
1,516,056 UART: [ldev] AUTHORITY.KEYID = 7
1,516,519 UART: [ldev] FE.KEYID = 1
1,521,857 UART: [ldev] Erasing FE.KEYID = 1
1,547,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,424 UART: [ldev] --
1,586,693 UART: [fwproc] Waiting for Commands...
1,587,482 UART: [fwproc] Received command 0x46574c44
1,588,273 UART: [fwproc] Received Image of size 118548 bytes
2,931,879 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,081 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,612 >>> mbox cmd response: success
3,131,626 UART: [afmc] ++
3,131,794 UART: [afmc] CDI.KEYID = 6
3,132,156 UART: [afmc] SUBJECT.KEYID = 7
3,132,581 UART: [afmc] AUTHORITY.KEYID = 5
3,168,020 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,326 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,035 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,918 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,601 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,469 UART: [afmc] --
3,211,469 UART: [cold-reset] --
3,212,331 UART: [state] Locking Datavault
3,213,684 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,288 UART: [state] Locking ICCM
3,214,824 UART: [exit] Launching FMC @ 0x40000130
3,220,154 UART:
3,220,170 UART: Running Caliptra FMC ...
3,220,578 UART:
3,220,632 UART: [state] CFI Enabled
3,230,846 UART: [fht] FMC Alias Private Key: 7
3,350,060 UART: [art] Extend RT PCRs Done
3,350,488 UART: [art] Lock RT PCRs Done
3,352,104 UART: [art] Populate DV Done
3,360,443 UART: [fht] FMC Alias Private Key: 7
3,361,539 UART: [art] Derive CDI
3,361,819 UART: [art] Store in slot 0x4
3,447,149 UART: [art] Derive Key Pair
3,447,509 UART: [art] Store priv key in slot 0x5
3,460,480 UART: [art] Derive Key Pair - Done
3,475,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,517 UART: [art] PUB.X = 6E36F60D02BC18B034120372D9AD70BA3308259368AA64477BC320C476A75E36D96183D137B1B273BB626F9DF759634B
3,498,269 UART: [art] PUB.Y = A7BD03E80CE9FC4CBFDCA4BE324FE5BECB49A48CC714D0DA2B10B38356CE7E2DB0C874CE50198E345F233E74E0A88D71
3,505,239 UART: [art] SIG.R = 7F3D54049BB1B4FEDECFE1D95372A3FA206F6F86CAAAD247D859340146FE3BC5A6EC2349FB973F0D46F79199E084EEE3
3,512,018 UART: [art] SIG.S = 7961C19B1E9BAB7316F6BB9C1775841F2BC9FD1AF37E473D00247373E294ABA3A05F9C6B7B44462D7B6EBB1EC6BE32ED
3,536,658 UART: Caliptra RT
3,536,909 UART: [state] CFI Enabled
3,657,062 UART: [rt] RT listening for mailbox commands...
3,657,732 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,673 UART: [rt]cmd =0x414c544e, len=41
3,689,802 >>> mbox cmd response data (8 bytes)
3,689,803 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,592 UART: [rt]cmd =0x434b4558, len=80
3,890,613 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,161 ready_for_fw is high
1,362,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,202 >>> mbox cmd response: success
3,041,703 UART:
3,041,719 UART: Running Caliptra FMC ...
3,042,127 UART:
3,042,181 UART: [state] CFI Enabled
3,052,727 UART: [fht] FMC Alias Private Key: 7
3,171,599 UART: [art] Extend RT PCRs Done
3,172,027 UART: [art] Lock RT PCRs Done
3,173,651 UART: [art] Populate DV Done
3,181,754 UART: [fht] FMC Alias Private Key: 7
3,182,764 UART: [art] Derive CDI
3,183,044 UART: [art] Store in slot 0x4
3,268,664 UART: [art] Derive Key Pair
3,269,024 UART: [art] Store priv key in slot 0x5
3,282,663 UART: [art] Derive Key Pair - Done
3,297,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,703 UART: [art] PUB.X = 0CE8E0C7B1AA3F8C9C20B98971BAEA9CED926E9C18511382E809C15EBDED48F5096B2EBAC0DA34D9219E936BB837E06C
3,320,484 UART: [art] PUB.Y = 27F7D4E63CC7CC90903ACAD0BD4A5DA97F24F21443651A0A31126CF189EF74E3074ECD83B5785B7A34424FF6529D7CE2
3,327,438 UART: [art] SIG.R = DB29E991F05C6888D63C77E339090BDFDE0D4A25B60F537085832A6E507805CD7DFE00936A47116AAE6804748516B761
3,334,164 UART: [art] SIG.S = B469D75CE44190A61CF0829BC26624EE361246586A158EE4EFD573E5B985329626D6F97C7B7D47EB4E1508FFCABDC7B6
3,358,389 UART: Caliptra RT
3,358,640 UART: [state] CFI Enabled
3,477,923 UART: [rt] RT listening for mailbox commands...
3,478,593 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,734 UART: [rt]cmd =0x414c544e, len=41
3,510,585 >>> mbox cmd response data (8 bytes)
3,510,586 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,553 UART: [rt]cmd =0x434b4558, len=80
3,713,263 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,744 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,874 UART: [kat] SHA2-256
892,812 UART: [kat] SHA2-384
895,661 UART: [kat] SHA2-512-ACC
897,562 UART: [kat] ECC-384
903,089 UART: [kat] HMAC-384Kdf
907,767 UART: [kat] LMS
1,475,963 UART: [kat] --
1,476,852 UART: [cold-reset] ++
1,477,190 UART: [fht] Storing FHT @ 0x50003400
1,479,931 UART: [idev] ++
1,480,099 UART: [idev] CDI.KEYID = 6
1,480,459 UART: [idev] SUBJECT.KEYID = 7
1,480,883 UART: [idev] UDS.KEYID = 0
1,481,228 ready_for_fw is high
1,481,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,807 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,345 UART: [idev] --
1,515,386 UART: [ldev] ++
1,515,554 UART: [ldev] CDI.KEYID = 6
1,515,917 UART: [ldev] SUBJECT.KEYID = 5
1,516,343 UART: [ldev] AUTHORITY.KEYID = 7
1,516,806 UART: [ldev] FE.KEYID = 1
1,522,190 UART: [ldev] Erasing FE.KEYID = 1
1,547,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,659 UART: [ldev] --
1,586,996 UART: [fwproc] Waiting for Commands...
1,587,797 UART: [fwproc] Received command 0x46574c44
1,588,588 UART: [fwproc] Received Image of size 118548 bytes
2,933,010 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,936 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,154 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,493 >>> mbox cmd response: success
3,133,601 UART: [afmc] ++
3,133,769 UART: [afmc] CDI.KEYID = 6
3,134,131 UART: [afmc] SUBJECT.KEYID = 7
3,134,556 UART: [afmc] AUTHORITY.KEYID = 5
3,169,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,037 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,409 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,092 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,986 UART: [afmc] --
3,213,048 UART: [cold-reset] --
3,213,916 UART: [state] Locking Datavault
3,215,111 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,715 UART: [state] Locking ICCM
3,216,389 UART: [exit] Launching FMC @ 0x40000130
3,221,719 UART:
3,221,735 UART: Running Caliptra FMC ...
3,222,143 UART:
3,222,286 UART: [state] CFI Enabled
3,233,000 UART: [fht] FMC Alias Private Key: 7
3,351,828 UART: [art] Extend RT PCRs Done
3,352,256 UART: [art] Lock RT PCRs Done
3,353,766 UART: [art] Populate DV Done
3,362,163 UART: [fht] FMC Alias Private Key: 7
3,363,283 UART: [art] Derive CDI
3,363,563 UART: [art] Store in slot 0x4
3,449,551 UART: [art] Derive Key Pair
3,449,911 UART: [art] Store priv key in slot 0x5
3,463,228 UART: [art] Derive Key Pair - Done
3,477,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,258 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,023 UART: [art] PUB.X = 94DFE8C8FCAA52F95FF08E3EFFDE6BC9350CF40B4CED7001A869FFA2339170F082978560D0A005864778EDD16E3D6E0E
3,500,794 UART: [art] PUB.Y = A505B2BFA0426FB4B978021240C0EAE6ACDF9D6B75EB2EFE72765F988B556B0EC787F20F2B9B159BC0731536C43B64E8
3,507,744 UART: [art] SIG.R = D62AD3F8A75A0B49134B9E41DAA0D35BA2652BCEA36F55AB467745966361A3D3EFAFBD60DE8F0B9218BAC8939A812750
3,514,522 UART: [art] SIG.S = 8432751AF19E7A4DFDC74BAC9F129FC6376C9741D8AA0B30DD54E546C5F90432AA59B80C32D342950630E57CDBB9FCAF
3,538,282 UART: Caliptra RT
3,538,625 UART: [state] CFI Enabled
3,658,636 UART: [rt] RT listening for mailbox commands...
3,659,306 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,127 UART: [rt]cmd =0x414c544e, len=41
3,691,206 >>> mbox cmd response data (8 bytes)
3,691,207 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,192 UART: [rt]cmd =0x434b4558, len=80
3,892,545 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,172 ready_for_fw is high
1,363,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,831 >>> mbox cmd response: success
3,041,676 UART:
3,041,692 UART: Running Caliptra FMC ...
3,042,100 UART:
3,042,243 UART: [state] CFI Enabled
3,052,865 UART: [fht] FMC Alias Private Key: 7
3,171,911 UART: [art] Extend RT PCRs Done
3,172,339 UART: [art] Lock RT PCRs Done
3,174,011 UART: [art] Populate DV Done
3,182,220 UART: [fht] FMC Alias Private Key: 7
3,183,342 UART: [art] Derive CDI
3,183,622 UART: [art] Store in slot 0x4
3,269,288 UART: [art] Derive Key Pair
3,269,648 UART: [art] Store priv key in slot 0x5
3,283,489 UART: [art] Derive Key Pair - Done
3,298,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,221 UART: [art] PUB.X = 65AA8843BC7BEBEEBE9476284AA02069CE87EC714468EF094FDC7D6D8AAA95404E908D1E2C5DC219833BA7E1FEB3494D
3,321,006 UART: [art] PUB.Y = 83F6C2746E9F3AF781EECD3FABE6692883A501D51FD1EEBEA921982ACCF56F0CD0A3386053FDE5079DB074FD32E5E233
3,327,965 UART: [art] SIG.R = 5AB80A95E410B7B9502ADBD89FEDC41FF36A853C1E212073DC773DC6EA6A4625FB2A82B6948EE7F18588290440E88DE9
3,334,739 UART: [art] SIG.S = 48DF4D1C895D2C45D52A776D454895F558C4E7505B15E8AFB7B7F9D0FD90A79798E78ADC9955E929BEAD360A5802993F
3,358,565 UART: Caliptra RT
3,358,908 UART: [state] CFI Enabled
3,478,759 UART: [rt] RT listening for mailbox commands...
3,479,429 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,700 UART: [rt]cmd =0x414c544e, len=41
3,511,637 >>> mbox cmd response data (8 bytes)
3,511,638 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,521 UART: [rt]cmd =0x434b4558, len=80
3,713,714 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,736 UART: [kat] SHA2-256
901,676 UART: [kat] SHA2-384
904,369 UART: [kat] SHA2-512-ACC
906,270 UART: [kat] ECC-384
916,133 UART: [kat] HMAC-384Kdf
920,763 UART: [kat] LMS
1,169,075 UART: [kat] --
1,170,214 UART: [cold-reset] ++
1,170,672 UART: [fht] FHT @ 0x50003400
1,173,328 UART: [idev] ++
1,173,496 UART: [idev] CDI.KEYID = 6
1,173,857 UART: [idev] SUBJECT.KEYID = 7
1,174,282 UART: [idev] UDS.KEYID = 0
1,174,628 ready_for_fw is high
1,174,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,747 UART: [idev] Sha1 KeyId Algorithm
1,207,699 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,214,996 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,126 UART: [ldev] --
1,280,477 UART: [fwproc] Wait for Commands...
1,281,182 UART: [fwproc] Recv command 0x46574c44
1,281,915 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,889 >>> mbox cmd response: success
2,826,079 UART: [afmc] ++
2,826,247 UART: [afmc] CDI.KEYID = 6
2,826,610 UART: [afmc] SUBJECT.KEYID = 7
2,827,036 UART: [afmc] AUTHORITY.KEYID = 5
2,861,613 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,762 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,221 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,102 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,803 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,616 UART: [afmc] --
2,904,547 UART: [cold-reset] --
2,905,517 UART: [state] Locking Datavault
2,906,722 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,326 UART: [state] Locking ICCM
2,907,946 UART: [exit] Launching FMC @ 0x40000130
2,913,276 UART:
2,913,292 UART: Running Caliptra FMC ...
2,913,700 UART:
2,913,754 UART: [state] CFI Enabled
2,924,000 UART: [fht] FMC Alias Private Key: 7
3,042,802 UART: [art] Extend RT PCRs Done
3,043,230 UART: [art] Lock RT PCRs Done
3,044,518 UART: [art] Populate DV Done
3,052,695 UART: [fht] FMC Alias Private Key: 7
3,053,779 UART: [art] Derive CDI
3,054,059 UART: [art] Store in slot 0x4
3,139,658 UART: [art] Derive Key Pair
3,140,018 UART: [art] Store priv key in slot 0x5
3,153,300 UART: [art] Derive Key Pair - Done
3,168,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,583 UART: [art] PUB.X = 635EAF56FE34AD15A070ABD5FFD4116DB4957EDD33F6F5D0444C5657BC4DDDF7DC4B3A312B5E16FF8C8F7EDDE5113876
3,191,377 UART: [art] PUB.Y = 6ACA2BCDB103DA7F34A73C72F44EADCC7F5EE3F9132DD2A014CA8DE650950157494303A6CD2B85B02D55FC6245B14C6A
3,198,336 UART: [art] SIG.R = 5455A26B7EC6B876F9E592DAEE325C7D910ED512EDD02227DDA49758C16AB29F1FD8C48AED88AA6100397303D0A0BD1E
3,205,092 UART: [art] SIG.S = A2414AF597F0011C7BB837C75362B1CD14B0E48A77A4822A7559A80FA33595AAE69E8B802684D750BDABF11F23E0401A
3,228,888 UART: Caliptra RT
3,229,139 UART: [state] CFI Enabled
3,348,886 UART: [rt] RT listening for mailbox commands...
3,349,556 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,375 UART: [rt]cmd =0x414c544e, len=41
3,381,530 >>> mbox cmd response data (8 bytes)
3,381,531 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,446 UART: [rt]cmd =0x434b4558, len=80
3,583,419 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,580 ready_for_fw is high
1,058,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,430 >>> mbox cmd response: success
2,740,561 UART:
2,740,577 UART: Running Caliptra FMC ...
2,740,985 UART:
2,741,039 UART: [state] CFI Enabled
2,751,469 UART: [fht] FMC Alias Private Key: 7
2,869,807 UART: [art] Extend RT PCRs Done
2,870,235 UART: [art] Lock RT PCRs Done
2,871,667 UART: [art] Populate DV Done
2,879,828 UART: [fht] FMC Alias Private Key: 7
2,880,874 UART: [art] Derive CDI
2,881,154 UART: [art] Store in slot 0x4
2,967,179 UART: [art] Derive Key Pair
2,967,539 UART: [art] Store priv key in slot 0x5
2,981,317 UART: [art] Derive Key Pair - Done
2,996,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,936 UART: [art] PUB.X = 2D7A14E226F3B248D053E7D4285C765F3BAE494821F5BA24ECCC3E13FC268CE8334B30E293D64CF43DAE795BAD824047
3,019,716 UART: [art] PUB.Y = 27D5FAF43EFE5E06E09A5415F80B8B3030ED6AE8888BFC8B5A413B33BE1B714D33B4DA87B8F730C99C144D8F14C2F73F
3,026,676 UART: [art] SIG.R = DD7A0B12989A5D9B5130142F7D16AE90FDB7FC1785CF6ACE25D270F2F453176FBD023120DB4B4625D6656E2F3046C64D
3,033,448 UART: [art] SIG.S = 932E899D398897F01A3F26629B68458DD1F3F685B7753827D6AA317C1E6D85AA8228693DC2B2AA3B84FCE93566363A0B
3,057,327 UART: Caliptra RT
3,057,578 UART: [state] CFI Enabled
3,176,900 UART: [rt] RT listening for mailbox commands...
3,177,570 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,703 UART: [rt]cmd =0x414c544e, len=41
3,209,532 >>> mbox cmd response data (8 bytes)
3,209,533 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,430 UART: [rt]cmd =0x434b4558, len=80
3,410,957 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,927 UART: [kat] SHA2-256
891,477 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,581 UART: [kat] ++
895,733 UART: [kat] sha1
899,973 UART: [kat] SHA2-256
901,913 UART: [kat] SHA2-384
904,628 UART: [kat] SHA2-512-ACC
906,529 UART: [kat] ECC-384
916,172 UART: [kat] HMAC-384Kdf
920,750 UART: [kat] LMS
1,169,062 UART: [kat] --
1,169,863 UART: [cold-reset] ++
1,170,339 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 ready_for_fw is high
1,174,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,228 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,280 UART: [idev] --
1,209,329 UART: [ldev] ++
1,209,497 UART: [ldev] CDI.KEYID = 6
1,209,861 UART: [ldev] SUBJECT.KEYID = 5
1,210,288 UART: [ldev] AUTHORITY.KEYID = 7
1,210,751 UART: [ldev] FE.KEYID = 1
1,216,093 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,909 UART: [ldev] --
1,282,282 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,455 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,953 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,328 >>> mbox cmd response: success
2,828,560 UART: [afmc] ++
2,828,728 UART: [afmc] CDI.KEYID = 6
2,829,091 UART: [afmc] SUBJECT.KEYID = 7
2,829,517 UART: [afmc] AUTHORITY.KEYID = 5
2,865,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,415 UART: [afmc] --
2,909,470 UART: [cold-reset] --
2,910,416 UART: [state] Locking Datavault
2,911,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,079 UART: [state] Locking ICCM
2,912,659 UART: [exit] Launching FMC @ 0x40000130
2,917,989 UART:
2,918,005 UART: Running Caliptra FMC ...
2,918,413 UART:
2,918,556 UART: [state] CFI Enabled
2,929,434 UART: [fht] FMC Alias Private Key: 7
3,048,420 UART: [art] Extend RT PCRs Done
3,048,848 UART: [art] Lock RT PCRs Done
3,050,424 UART: [art] Populate DV Done
3,058,665 UART: [fht] FMC Alias Private Key: 7
3,059,697 UART: [art] Derive CDI
3,059,977 UART: [art] Store in slot 0x4
3,145,790 UART: [art] Derive Key Pair
3,146,150 UART: [art] Store priv key in slot 0x5
3,159,320 UART: [art] Derive Key Pair - Done
3,173,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,338 UART: [art] PUB.X = 49024E150F970E6D401E45088A42DBB9485C8B7104AB3B98F81FEE491570EAB381CB6B957EC52454236323AA18615349
3,197,087 UART: [art] PUB.Y = D89D19DC98ACFC50D1C97D8374CACAC45728C864B23E51DAA0C792A367DB68EB1A43191263E18428143AB36BA3196CDE
3,204,049 UART: [art] SIG.R = 11EC054B459BD306D913454CE6403C0AA67767F29BCC22563BDEA27E8C52D54801B9774C8A31BBC4A5FDD5D25887FAA9
3,210,817 UART: [art] SIG.S = B0EEA571247BE2B68C5C7DDFF8463CEB45F2657E422DE98CA7FBBF968BB43F79A81629F58FBE7058D29EC0E40A0F229F
3,235,333 UART: Caliptra RT
3,235,676 UART: [state] CFI Enabled
3,355,281 UART: [rt] RT listening for mailbox commands...
3,355,951 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,122 UART: [rt]cmd =0x414c544e, len=41
3,388,275 >>> mbox cmd response data (8 bytes)
3,388,276 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,221 UART: [rt]cmd =0x434b4558, len=80
3,590,719 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,151 ready_for_fw is high
1,060,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,599 >>> mbox cmd response: success
2,740,568 UART:
2,740,584 UART: Running Caliptra FMC ...
2,740,992 UART:
2,741,135 UART: [state] CFI Enabled
2,751,659 UART: [fht] FMC Alias Private Key: 7
2,870,111 UART: [art] Extend RT PCRs Done
2,870,539 UART: [art] Lock RT PCRs Done
2,872,297 UART: [art] Populate DV Done
2,880,548 UART: [fht] FMC Alias Private Key: 7
2,881,710 UART: [art] Derive CDI
2,881,990 UART: [art] Store in slot 0x4
2,967,621 UART: [art] Derive Key Pair
2,967,981 UART: [art] Store priv key in slot 0x5
2,981,411 UART: [art] Derive Key Pair - Done
2,996,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,700 UART: [art] PUB.X = 7987A0F3A40B82C074F3834D91A5F4A3A6A0158321C1405B612FAEC5229D790452E2AEA1F4E228CFD746AB38ED68D352
3,019,468 UART: [art] PUB.Y = 7A55BFAF4D4EAB02645A802DEBEE984549A5406AB5187C215765AAC3D915F146F48C57465BAF7AA98477DA2C6C7E6E54
3,026,427 UART: [art] SIG.R = C3DE9EE528FA20093297320DEC509D5F7D579D95ECC9153DE3EBAC947A99FAD9A1CCFB60928447308C4D980B7DC2DE92
3,033,204 UART: [art] SIG.S = D894684D00DED0F4F16D315946E90D0A4053ED0685C249A08F9D29C9743D567427897E644D3030C8512351ECE77904B3
3,056,974 UART: Caliptra RT
3,057,317 UART: [state] CFI Enabled
3,176,399 UART: [rt] RT listening for mailbox commands...
3,177,069 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,072 UART: [rt]cmd =0x414c544e, len=41
3,209,181 >>> mbox cmd response data (8 bytes)
3,209,182 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,029 UART: [rt]cmd =0x434b4558, len=80
3,411,612 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,980 UART: [state] LifecycleState = Unprovisioned
85,635 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,498 UART: [kat] LMS
1,170,826 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,041 UART: [fht] FHT @ 0x50003400
1,174,744 UART: [idev] ++
1,174,912 UART: [idev] CDI.KEYID = 6
1,175,272 UART: [idev] SUBJECT.KEYID = 7
1,175,696 UART: [idev] UDS.KEYID = 0
1,176,041 ready_for_fw is high
1,176,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,361 UART: [idev] Sha1 KeyId Algorithm
1,208,931 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,476 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,243,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,327 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,646 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,228 UART: [fwproc] Wait for Commands...
1,282,954 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,311 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,188 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,358 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,645 >>> mbox cmd response: success
2,827,655 UART: [afmc] ++
2,827,823 UART: [afmc] CDI.KEYID = 6
2,828,185 UART: [afmc] SUBJECT.KEYID = 7
2,828,610 UART: [afmc] AUTHORITY.KEYID = 5
2,864,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,714 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,462 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,171 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,054 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,755 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,619 UART: [afmc] --
2,907,655 UART: [cold-reset] --
2,908,691 UART: [state] Locking Datavault
2,909,798 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,402 UART: [state] Locking ICCM
2,910,928 UART: [exit] Launching FMC @ 0x40000130
2,916,258 UART:
2,916,274 UART: Running Caliptra FMC ...
2,916,682 UART:
2,916,736 UART: [state] CFI Enabled
2,927,370 UART: [fht] FMC Alias Private Key: 7
3,047,092 UART: [art] Extend RT PCRs Done
3,047,520 UART: [art] Lock RT PCRs Done
3,049,012 UART: [art] Populate DV Done
3,056,929 UART: [fht] FMC Alias Private Key: 7
3,057,881 UART: [art] Derive CDI
3,058,161 UART: [art] Store in slot 0x4
3,144,300 UART: [art] Derive Key Pair
3,144,660 UART: [art] Store priv key in slot 0x5
3,157,806 UART: [art] Derive Key Pair - Done
3,172,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,128 UART: [art] PUB.X = 8894F37A84144D6EA99176995F8CC258616593D23C3289B84DF327CEA164C9843799FCFE9BE470355F08B1C6C00F6FA9
3,194,890 UART: [art] PUB.Y = AB834B642F4EA432E2D0C72CCD8A28E9316981B690A624B89FD9745FE5811B9158C338976A72B1B6B1F4884EF59248BD
3,201,842 UART: [art] SIG.R = 2FEF78D0D05262E3C99BC7BF4C44863CA7EB2641CF3CE2AE24C9D993A6B28FEDEE45BC34E3B5C153153C4BB09163BE1A
3,208,634 UART: [art] SIG.S = 9FBD31B032254A70C1E29D9AD8E89C3498A479254537160AA49F9D9A720F6B5BB8A2B051A9E7730D227E1B2379A4F343
3,232,395 UART: Caliptra RT
3,232,646 UART: [state] CFI Enabled
3,351,989 UART: [rt] RT listening for mailbox commands...
3,352,659 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,790 UART: [rt]cmd =0x414c544e, len=41
3,384,645 >>> mbox cmd response data (8 bytes)
3,384,646 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,471 UART: [rt]cmd =0x434b4558, len=80
3,586,754 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,487 ready_for_fw is high
1,060,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,848 >>> mbox cmd response: success
2,740,695 UART:
2,740,711 UART: Running Caliptra FMC ...
2,741,119 UART:
2,741,173 UART: [state] CFI Enabled
2,751,599 UART: [fht] FMC Alias Private Key: 7
2,870,793 UART: [art] Extend RT PCRs Done
2,871,221 UART: [art] Lock RT PCRs Done
2,872,791 UART: [art] Populate DV Done
2,881,186 UART: [fht] FMC Alias Private Key: 7
2,882,328 UART: [art] Derive CDI
2,882,608 UART: [art] Store in slot 0x4
2,968,607 UART: [art] Derive Key Pair
2,968,967 UART: [art] Store priv key in slot 0x5
2,982,091 UART: [art] Derive Key Pair - Done
2,996,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,300 UART: [art] PUB.X = 2DA80031BC1177CB0E5F77448E11596EE0E835066049F327C8F868657C9DAC613D8B975981C696F36918F890B46E2D9C
3,020,036 UART: [art] PUB.Y = C42A22CC3FF9779E3CC996F966A714F8F6268C65485264165B639386BF2A16155DCCA917029C56213F7E4F16059A969A
3,026,974 UART: [art] SIG.R = E0FF1C791EC2F9554BEE9A6AE0084A78748198860FE54CFE9ECD71331617DD8F9C6FD98A89F95D8C96979CB1EDB86A85
3,033,752 UART: [art] SIG.S = 4B2BA6D1FEB3D276D3FFFD8AE78FCE4D38F471A9FFA547F63B18D0DC8E51700B1AB616AC953251DE2CBFD09DF60201CD
3,057,383 UART: Caliptra RT
3,057,634 UART: [state] CFI Enabled
3,177,283 UART: [rt] RT listening for mailbox commands...
3,177,953 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,776 UART: [rt]cmd =0x414c544e, len=41
3,209,703 >>> mbox cmd response data (8 bytes)
3,209,704 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,775 UART: [rt]cmd =0x434b4558, len=80
3,411,783 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,497 UART: [state] LifecycleState = Unprovisioned
86,152 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,328 UART: [kat] SHA2-256
904,268 UART: [kat] SHA2-384
907,111 UART: [kat] SHA2-512-ACC
909,012 UART: [kat] ECC-384
918,309 UART: [kat] HMAC-384Kdf
922,977 UART: [kat] LMS
1,171,305 UART: [kat] --
1,171,938 UART: [cold-reset] ++
1,172,396 UART: [fht] FHT @ 0x50003400
1,175,075 UART: [idev] ++
1,175,243 UART: [idev] CDI.KEYID = 6
1,175,603 UART: [idev] SUBJECT.KEYID = 7
1,176,027 UART: [idev] UDS.KEYID = 0
1,176,372 ready_for_fw is high
1,176,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,935 UART: [idev] Erasing UDS.KEYID = 0
1,201,394 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,210,982 UART: [ldev] ++
1,211,150 UART: [ldev] CDI.KEYID = 6
1,211,513 UART: [ldev] SUBJECT.KEYID = 5
1,211,939 UART: [ldev] AUTHORITY.KEYID = 7
1,212,402 UART: [ldev] FE.KEYID = 1
1,217,686 UART: [ldev] Erasing FE.KEYID = 1
1,244,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,836 UART: [ldev] --
1,283,321 UART: [fwproc] Wait for Commands...
1,284,069 UART: [fwproc] Recv command 0x46574c44
1,284,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,363 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,644 >>> mbox cmd response: success
2,827,862 UART: [afmc] ++
2,828,030 UART: [afmc] CDI.KEYID = 6
2,828,392 UART: [afmc] SUBJECT.KEYID = 7
2,828,817 UART: [afmc] AUTHORITY.KEYID = 5
2,864,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,398 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,281 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,982 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,848 UART: [afmc] --
2,907,740 UART: [cold-reset] --
2,908,748 UART: [state] Locking Datavault
2,909,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,419 UART: [state] Locking ICCM
2,910,887 UART: [exit] Launching FMC @ 0x40000130
2,916,217 UART:
2,916,233 UART: Running Caliptra FMC ...
2,916,641 UART:
2,916,784 UART: [state] CFI Enabled
2,927,278 UART: [fht] FMC Alias Private Key: 7
3,046,788 UART: [art] Extend RT PCRs Done
3,047,216 UART: [art] Lock RT PCRs Done
3,048,882 UART: [art] Populate DV Done
3,057,085 UART: [fht] FMC Alias Private Key: 7
3,058,143 UART: [art] Derive CDI
3,058,423 UART: [art] Store in slot 0x4
3,144,388 UART: [art] Derive Key Pair
3,144,748 UART: [art] Store priv key in slot 0x5
3,158,472 UART: [art] Derive Key Pair - Done
3,173,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,839 UART: [art] PUB.X = DE4EBA121E968D129F6B19432E12E6967E20BFBAE58A0381BD7DA7E8B5CC5DBA1F8A3BD4637CFC58B50F7F4D9B673181
3,196,623 UART: [art] PUB.Y = 49482D481C70C395F73E24EA9A86D58F60C8FF9D734AC6813D24A1EA45D9205C9F66B073914C22A7D4CC52268D31FEEE
3,203,579 UART: [art] SIG.R = 1BB7D1C2F5DABD2D7E854C2451393DAE146486C24BFADA33CC8800EDD31412582A4B6E53D1AC68B36A6802F5C64B401F
3,210,338 UART: [art] SIG.S = F4B04F0A7D385D7EB60B76632FDD9782711648076226FAE561D1F2EBC3623FF2A4B29E4906C7081A6B9CB6A09D2BCB96
3,234,345 UART: Caliptra RT
3,234,688 UART: [state] CFI Enabled
3,354,229 UART: [rt] RT listening for mailbox commands...
3,354,899 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,026 UART: [rt]cmd =0x414c544e, len=41
3,386,843 >>> mbox cmd response data (8 bytes)
3,386,844 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,605 UART: [rt]cmd =0x434b4558, len=80
3,588,681 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,800 ready_for_fw is high
1,060,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,333 >>> mbox cmd response: success
2,740,998 UART:
2,741,014 UART: Running Caliptra FMC ...
2,741,422 UART:
2,741,565 UART: [state] CFI Enabled
2,752,385 UART: [fht] FMC Alias Private Key: 7
2,871,259 UART: [art] Extend RT PCRs Done
2,871,687 UART: [art] Lock RT PCRs Done
2,873,403 UART: [art] Populate DV Done
2,881,464 UART: [fht] FMC Alias Private Key: 7
2,882,544 UART: [art] Derive CDI
2,882,824 UART: [art] Store in slot 0x4
2,968,769 UART: [art] Derive Key Pair
2,969,129 UART: [art] Store priv key in slot 0x5
2,982,349 UART: [art] Derive Key Pair - Done
2,996,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,043 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,808 UART: [art] PUB.X = DF6259FE9644B2D89A417036641118EA89E2E91AFB1D96E70FD799BC5C5C5D46F57F7BE3555207BC239C9FE2120EF797
3,019,575 UART: [art] PUB.Y = E0E95962C58B583681D1DE343C1753E077C768F584ECAEE1997603DE7F79931D34F0AAB007CE5CC5DFB6743ACBD5E15F
3,026,531 UART: [art] SIG.R = 1F7D9E14A5F359F2CA697F3AC6C50911154188BBCE615B0DE3CC8911DBE2BB88394B693FDA143C65468DD4C1198AC91D
3,033,307 UART: [art] SIG.S = F88B880F3C1F2E1551FF0CD1B0317DAD93B95213C4A7C3210A42028842B6EB08C47AF78C13736831D5E0320EB56A9603
3,057,090 UART: Caliptra RT
3,057,433 UART: [state] CFI Enabled
3,177,108 UART: [rt] RT listening for mailbox commands...
3,177,778 <<< Executing mbox cmd 0x414c544e (41 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,817 UART: [rt]cmd =0x414c544e, len=41
3,209,680 >>> mbox cmd response data (8 bytes)
3,209,681 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,494 UART: [rt]cmd =0x434b4558, len=80
3,412,195 >>> mbox cmd response data (6280 bytes)
test test_certify_key_extended::test_dmtf_other_name_extension_present ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
192,238 UART:
192,579 UART: Running Caliptra ROM ...
193,759 UART:
193,914 UART: [state] CFI Enabled
265,291 UART: [state] LifecycleState = Unprovisioned
267,280 UART: [state] DebugLocked = No
268,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,556 UART: [kat] SHA2-256
442,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,764 UART: [kat] ++
453,210 UART: [kat] sha1
464,787 UART: [kat] SHA2-256
467,227 UART: [kat] SHA2-384
473,168 UART: [kat] SHA2-512-ACC
475,556 UART: [kat] ECC-384
2,770,216 UART: [kat] HMAC-384Kdf
2,800,500 UART: [kat] LMS
3,990,792 UART: [kat] --
3,994,928 UART: [cold-reset] ++
3,997,421 UART: [fht] Storing FHT @ 0x50003400
4,009,184 UART: [idev] ++
4,009,752 UART: [idev] CDI.KEYID = 6
4,010,793 UART: [idev] SUBJECT.KEYID = 7
4,011,975 UART: [idev] UDS.KEYID = 0
4,012,961 ready_for_fw is high
4,013,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,226 UART: [idev] Erasing UDS.KEYID = 0
7,348,315 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,683 UART: [idev] --
7,372,969 UART: [ldev] ++
7,373,554 UART: [ldev] CDI.KEYID = 6
7,374,580 UART: [ldev] SUBJECT.KEYID = 5
7,375,737 UART: [ldev] AUTHORITY.KEYID = 7
7,376,967 UART: [ldev] FE.KEYID = 1
7,423,024 UART: [ldev] Erasing FE.KEYID = 1
10,758,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,638 UART: [ldev] --
13,116,673 UART: [fwproc] Waiting for Commands...
13,119,466 UART: [fwproc] Received command 0x46574c44
13,121,652 UART: [fwproc] Received Image of size 118548 bytes
17,228,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,641 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,979 >>> mbox cmd response: success
17,711,008 UART: [afmc] ++
17,711,630 UART: [afmc] CDI.KEYID = 6
17,712,557 UART: [afmc] SUBJECT.KEYID = 7
17,713,782 UART: [afmc] AUTHORITY.KEYID = 5
21,072,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,002 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,736 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,127 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,944 UART: [afmc] --
23,443,339 UART: [cold-reset] --
23,445,422 UART: [state] Locking Datavault
23,451,157 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,927 UART: [state] Locking ICCM
23,454,208 UART: [exit] Launching FMC @ 0x40000130
23,462,600 UART:
23,462,838 UART: Running Caliptra FMC ...
23,463,936 UART:
23,464,097 UART: [state] CFI Enabled
23,533,153 UART: [fht] FMC Alias Private Key: 7
25,873,662 UART: [art] Extend RT PCRs Done
25,874,873 UART: [art] Lock RT PCRs Done
25,876,601 UART: [art] Populate DV Done
25,882,060 UART: [fht] FMC Alias Private Key: 7
25,883,653 UART: [art] Derive CDI
25,884,465 UART: [art] Store in slot 0x4
25,941,984 UART: [art] Derive Key Pair
25,943,014 UART: [art] Store priv key in slot 0x5
29,236,607 UART: [art] Derive Key Pair - Done
29,249,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,440 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,946 UART: [art] PUB.X = 907933E4902A47876A4E5B22BACD1591B1220E0FBD080F6FD2CD7EA49D0834B7C84FA4E81184C20AB135275FA9F8100F
31,547,236 UART: [art] PUB.Y = 2C157B7BD3ECF92ED2EE5FBE4E5F3A4C75AA17DD2317111D435092DB2EA4159E6B8077A49B2D10EA73096A74C8B3E600
31,554,512 UART: [art] SIG.R = 0B84385B0975DC300DF18797A62870DA3E2F5668B2212D6393C4740CEF863857DE133651ACBA74A3A6FC115ED6A11A37
31,561,836 UART: [art] SIG.S = E4670D6682DAD869EA14C33CD789710E724B69D9FEE2FED4AB4EE14FC352AEBBAC13E77B6DC3164D1610BDBE06BE968F
32,866,630 UART: Caliptra RT
32,867,339 UART: [state] CFI Enabled
33,044,919 UART: [rt] RT listening for mailbox commands...
33,046,813 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,076,983 UART: [rt]cmd =0x414c544e, len=20
33,078,482 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,805,561 ready_for_fw is high
3,806,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,979,449 >>> mbox cmd response: success
23,671,359 UART:
23,671,770 UART: Running Caliptra FMC ...
23,672,884 UART:
23,673,037 UART: [state] CFI Enabled
23,739,871 UART: [fht] FMC Alias Private Key: 7
26,080,630 UART: [art] Extend RT PCRs Done
26,081,857 UART: [art] Lock RT PCRs Done
26,083,386 UART: [art] Populate DV Done
26,088,862 UART: [fht] FMC Alias Private Key: 7
26,090,496 UART: [art] Derive CDI
26,091,323 UART: [art] Store in slot 0x4
26,147,714 UART: [art] Derive Key Pair
26,148,717 UART: [art] Store priv key in slot 0x5
29,441,284 UART: [art] Derive Key Pair - Done
29,454,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,392 UART: [art] PUB.X = DF51C7E1AB50979D4971DA2D9EDE599B3A251EE153BDF50A4850FA7BD3545324F9602E57857F0753BD4EA51EB00078EE
31,749,635 UART: [art] PUB.Y = 0805C3DC74217ABEB3F35B57221AD348931B76608CF1F175658998307F5913651606A87795226729E2A5B763665E6D9F
31,756,821 UART: [art] SIG.R = 7E11BCE8F0C860124264021CFA530C96AE774507AD85E4C335DA4B309A1B9826116E838C341DC455DC59C071F1A57D48
31,764,205 UART: [art] SIG.S = C9D1D59A5C8D213D514B6467D347633FA4683B58ECEB694563BEFB24C4206E1FA7FD9192897045D5BF904B76DD29FFBB
33,069,249 UART: Caliptra RT
33,069,968 UART: [state] CFI Enabled
33,246,666 UART: [rt] RT listening for mailbox commands...
33,248,568 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,278,683 UART: [rt]cmd =0x414c544e, len=20
33,280,381 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,453 UART:
192,826 UART: Running Caliptra ROM ...
194,023 UART:
603,743 UART: [state] CFI Enabled
618,630 UART: [state] LifecycleState = Unprovisioned
620,575 UART: [state] DebugLocked = No
621,955 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,107 UART: [kat] SHA2-256
795,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,428 UART: [kat] ++
806,905 UART: [kat] sha1
819,199 UART: [kat] SHA2-256
821,848 UART: [kat] SHA2-384
827,778 UART: [kat] SHA2-512-ACC
830,141 UART: [kat] ECC-384
3,114,370 UART: [kat] HMAC-384Kdf
3,125,138 UART: [kat] LMS
4,315,211 UART: [kat] --
4,320,560 UART: [cold-reset] ++
4,322,207 UART: [fht] Storing FHT @ 0x50003400
4,333,376 UART: [idev] ++
4,333,966 UART: [idev] CDI.KEYID = 6
4,334,872 UART: [idev] SUBJECT.KEYID = 7
4,336,111 UART: [idev] UDS.KEYID = 0
4,337,159 ready_for_fw is high
4,337,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,267 UART: [idev] Erasing UDS.KEYID = 0
7,622,092 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,767 UART: [idev] --
7,648,244 UART: [ldev] ++
7,648,810 UART: [ldev] CDI.KEYID = 6
7,649,763 UART: [ldev] SUBJECT.KEYID = 5
7,650,966 UART: [ldev] AUTHORITY.KEYID = 7
7,652,246 UART: [ldev] FE.KEYID = 1
7,661,207 UART: [ldev] Erasing FE.KEYID = 1
10,952,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,075 UART: [ldev] --
13,315,040 UART: [fwproc] Waiting for Commands...
13,317,348 UART: [fwproc] Received command 0x46574c44
13,319,581 UART: [fwproc] Received Image of size 118548 bytes
17,424,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,628 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,043 >>> mbox cmd response: success
17,905,705 UART: [afmc] ++
17,906,293 UART: [afmc] CDI.KEYID = 6
17,907,252 UART: [afmc] SUBJECT.KEYID = 7
17,908,458 UART: [afmc] AUTHORITY.KEYID = 5
21,217,878 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,547 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,978 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,657 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,107 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,875 UART: [afmc] --
23,582,115 UART: [cold-reset] --
23,586,995 UART: [state] Locking Datavault
23,592,578 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,325 UART: [state] Locking ICCM
23,597,118 UART: [exit] Launching FMC @ 0x40000130
23,605,505 UART:
23,605,777 UART: Running Caliptra FMC ...
23,606,880 UART:
23,607,037 UART: [state] CFI Enabled
23,615,138 UART: [fht] FMC Alias Private Key: 7
25,955,625 UART: [art] Extend RT PCRs Done
25,956,842 UART: [art] Lock RT PCRs Done
25,958,462 UART: [art] Populate DV Done
25,963,761 UART: [fht] FMC Alias Private Key: 7
25,965,294 UART: [art] Derive CDI
25,966,045 UART: [art] Store in slot 0x4
26,008,588 UART: [art] Derive Key Pair
26,009,630 UART: [art] Store priv key in slot 0x5
29,251,247 UART: [art] Derive Key Pair - Done
29,264,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,883 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,388 UART: [art] PUB.X = 95B1961BB25E183FA8ECE8A1040F42EF10D0DF559091A9974F90B8774F0819A68E16F5D765857BA54C0322151A0B1857
31,553,624 UART: [art] PUB.Y = 5DA8B7F69538CE2B6DAEB074D6C1F9672634916AD9FF8C0906DEE4A695697B411E4C8BE68D61DFEA94C0604766FD1543
31,560,897 UART: [art] SIG.R = 15908BA7FD7ECAF3FC36D447B0C4621642026499458EC070BF565796B583328BCCE4B756A98EAD490D47E81BD00B949B
31,568,279 UART: [art] SIG.S = 665443CD67607B43DB8641B3721218AA3A97AF4C630188F3518FEFF8474218CC9C8CFA6745C2F971AC46438B801DCC26
32,873,365 UART: Caliptra RT
32,874,077 UART: [state] CFI Enabled
33,007,580 UART: [rt] RT listening for mailbox commands...
33,009,484 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,039,396 UART: [rt]cmd =0x414c544e, len=20
33,040,940 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
4,133,678 ready_for_fw is high
4,134,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,471 >>> mbox cmd response: success
23,798,828 UART:
23,799,220 UART: Running Caliptra FMC ...
23,800,360 UART:
23,800,520 UART: [state] CFI Enabled
23,808,469 UART: [fht] FMC Alias Private Key: 7
26,148,583 UART: [art] Extend RT PCRs Done
26,149,806 UART: [art] Lock RT PCRs Done
26,151,595 UART: [art] Populate DV Done
26,156,980 UART: [fht] FMC Alias Private Key: 7
26,158,642 UART: [art] Derive CDI
26,159,457 UART: [art] Store in slot 0x4
26,202,275 UART: [art] Derive Key Pair
26,203,315 UART: [art] Store priv key in slot 0x5
29,445,546 UART: [art] Derive Key Pair - Done
29,458,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,762 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,268 UART: [art] PUB.X = 54AC32F1EC301270ABF95A3C59D19E409D002C6DD00D56CF89BF66D764E528341EC6FA511ED4A7030F1E700CDCC9E836
31,747,578 UART: [art] PUB.Y = 19CD9C0E13A8D695A392EA711353F31354085E4832AC10B165E585F2C75F3E5D308C7345F3C1804F9883B5946B9DEAC5
31,754,818 UART: [art] SIG.R = 3AB6257BCA2AD8E09DF3201586262D577DA71178CBAC83732FB2B9DF1A8C3384A3B369591600EEFDC0982FC62117D404
31,762,162 UART: [art] SIG.S = 2EF2C87FDAF0133454E4911336E6A111D2EED134DBB58269EED7C6E2D75D3B675EFA2F7B98158DC9B5069A8ED2BF3CF2
33,067,481 UART: Caliptra RT
33,068,205 UART: [state] CFI Enabled
33,201,209 UART: [rt] RT listening for mailbox commands...
33,203,097 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
33,233,073 UART: [rt]cmd =0x414c544e, len=20
33,234,709 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,051 UART:
192,415 UART: Running Caliptra ROM ...
193,751 UART:
193,904 UART: [state] CFI Enabled
265,849 UART: [state] LifecycleState = Unprovisioned
267,785 UART: [state] DebugLocked = No
269,882 UART: [state] WD Timer not started. Device not locked for debugging
274,390 UART: [kat] SHA2-256
452,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,614 UART: [kat] ++
464,092 UART: [kat] sha1
474,686 UART: [kat] SHA2-256
477,408 UART: [kat] SHA2-384
483,038 UART: [kat] SHA2-512-ACC
485,404 UART: [kat] ECC-384
2,945,569 UART: [kat] HMAC-384Kdf
2,971,506 UART: [kat] LMS
3,448,005 UART: [kat] --
3,453,273 UART: [cold-reset] ++
3,455,053 UART: [fht] FHT @ 0x50003400
3,467,901 UART: [idev] ++
3,468,517 UART: [idev] CDI.KEYID = 6
3,469,402 UART: [idev] SUBJECT.KEYID = 7
3,470,714 UART: [idev] UDS.KEYID = 0
3,471,653 ready_for_fw is high
3,471,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,923 UART: [idev] Erasing UDS.KEYID = 0
5,986,852 UART: [idev] Sha1 KeyId Algorithm
6,010,948 UART: [idev] --
6,015,483 UART: [ldev] ++
6,016,056 UART: [ldev] CDI.KEYID = 6
6,016,970 UART: [ldev] SUBJECT.KEYID = 5
6,018,182 UART: [ldev] AUTHORITY.KEYID = 7
6,019,464 UART: [ldev] FE.KEYID = 1
6,057,382 UART: [ldev] Erasing FE.KEYID = 1
8,565,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,193 UART: [ldev] --
10,372,252 UART: [fwproc] Wait for Commands...
10,375,486 UART: [fwproc] Recv command 0x46574c44
10,377,463 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,671 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,922 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,993 >>> mbox cmd response: success
14,341,365 UART: [afmc] ++
14,341,975 UART: [afmc] CDI.KEYID = 6
14,342,887 UART: [afmc] SUBJECT.KEYID = 7
14,344,099 UART: [afmc] AUTHORITY.KEYID = 5
16,870,502 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,253 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,428 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,573 UART: [afmc] --
18,673,705 UART: [cold-reset] --
18,677,440 UART: [state] Locking Datavault
18,684,149 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,897 UART: [state] Locking ICCM
18,687,555 UART: [exit] Launching FMC @ 0x40000130
18,695,998 UART:
18,696,226 UART: Running Caliptra FMC ...
18,697,323 UART:
18,697,480 UART: [state] CFI Enabled
18,749,938 UART: [fht] FMC Alias Private Key: 7
20,516,094 UART: [art] Extend RT PCRs Done
20,517,313 UART: [art] Lock RT PCRs Done
20,518,823 UART: [art] Populate DV Done
20,524,468 UART: [fht] FMC Alias Private Key: 7
20,526,073 UART: [art] Derive CDI
20,526,886 UART: [art] Store in slot 0x4
20,583,325 UART: [art] Derive Key Pair
20,584,319 UART: [art] Store priv key in slot 0x5
23,047,306 UART: [art] Derive Key Pair - Done
23,060,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,773,046 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,549 UART: [art] PUB.X = 90504B41EFE19229D05717858DF9786D42CDAD1F4BC02E989879B52EE46CE565C3820718BF68C4EBFFCC3EE09B1A3270
24,781,865 UART: [art] PUB.Y = 1AB1279708EB32C5A6B7F5652BB4B15926476FAE551D9611BA4D540C63C1CC3BF5E512BFFFFB4619BF30A06628981E14
24,789,095 UART: [art] SIG.R = 64FAD0C399137343C806C735F97662ECB2D100E708C3FA7B9FB6F8E9D4C28AAAA8567B8610383092D8777A8447E3D440
24,796,482 UART: [art] SIG.S = 9CB9302AEDB59D13F209C511576E14977238AC6605209EFA37B6B6B461309076857B5EA0CCFE841799384CD07F25B570
25,775,580 UART: Caliptra RT
25,776,294 UART: [state] CFI Enabled
25,955,288 UART: [rt] RT listening for mailbox commands...
25,957,179 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,987,207 UART: [rt]cmd =0x414c544e, len=20
25,988,862 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,458,698 ready_for_fw is high
3,459,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,408 >>> mbox cmd response: success
18,536,490 UART:
18,536,894 UART: Running Caliptra FMC ...
18,538,098 UART:
18,538,273 UART: [state] CFI Enabled
18,603,455 UART: [fht] FMC Alias Private Key: 7
20,369,754 UART: [art] Extend RT PCRs Done
20,370,971 UART: [art] Lock RT PCRs Done
20,372,386 UART: [art] Populate DV Done
20,377,420 UART: [fht] FMC Alias Private Key: 7
20,379,076 UART: [art] Derive CDI
20,379,896 UART: [art] Store in slot 0x4
20,435,861 UART: [art] Derive Key Pair
20,436,894 UART: [art] Store priv key in slot 0x5
22,900,341 UART: [art] Derive Key Pair - Done
22,913,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,993 UART: [art] PUB.X = F8CBC857119F07FD72F9489E9248A24EF71F9EF949A7FBE499CC97DC3BCBF37BE8AD61420BB1F7DF4342C11636649DBC
24,634,254 UART: [art] PUB.Y = 519DCA6E6EA7CDF8DFE503E953373A06C4D36E02260AF3E51B6B81EED6FB28B5E9FB33F1DDEC098ABEF2333242A53BF2
24,641,556 UART: [art] SIG.R = CB228F19C1361DFB98A19501E498B14639A162A65BA1F7CB376551934D1B8ECEC8AE3DD6CAAE44659ACAD377357B6A1F
24,648,956 UART: [art] SIG.S = F5E93EBD39A099B5D175EA85667A3E06CCD2013ABFC60235315B97D2D8A1969DF6913134E451EA4E65F0C3B1D2D333BF
25,627,909 UART: Caliptra RT
25,628,623 UART: [state] CFI Enabled
25,808,707 UART: [rt] RT listening for mailbox commands...
25,810,601 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,840,447 UART: [rt]cmd =0x414c544e, len=20
25,842,156 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,310 UART:
192,672 UART: Running Caliptra ROM ...
193,759 UART:
603,594 UART: [state] CFI Enabled
617,696 UART: [state] LifecycleState = Unprovisioned
619,645 UART: [state] DebugLocked = No
622,245 UART: [state] WD Timer not started. Device not locked for debugging
626,852 UART: [kat] SHA2-256
806,532 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,317 UART: [kat] ++
817,856 UART: [kat] sha1
829,035 UART: [kat] SHA2-256
831,768 UART: [kat] SHA2-384
837,903 UART: [kat] SHA2-512-ACC
840,280 UART: [kat] ECC-384
3,281,553 UART: [kat] HMAC-384Kdf
3,294,104 UART: [kat] LMS
3,770,590 UART: [kat] --
3,773,800 UART: [cold-reset] ++
3,776,369 UART: [fht] FHT @ 0x50003400
3,787,134 UART: [idev] ++
3,787,768 UART: [idev] CDI.KEYID = 6
3,788,650 UART: [idev] SUBJECT.KEYID = 7
3,789,967 UART: [idev] UDS.KEYID = 0
3,790,865 ready_for_fw is high
3,791,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,932 UART: [idev] Erasing UDS.KEYID = 0
6,268,581 UART: [idev] Sha1 KeyId Algorithm
6,292,253 UART: [idev] --
6,298,137 UART: [ldev] ++
6,298,710 UART: [ldev] CDI.KEYID = 6
6,299,638 UART: [ldev] SUBJECT.KEYID = 5
6,300,816 UART: [ldev] AUTHORITY.KEYID = 7
6,302,104 UART: [ldev] FE.KEYID = 1
6,310,756 UART: [ldev] Erasing FE.KEYID = 1
8,789,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,473 UART: [ldev] --
10,587,505 UART: [fwproc] Wait for Commands...
10,589,826 UART: [fwproc] Recv command 0x46574c44
10,591,865 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,942 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,261 >>> mbox cmd response: success
14,554,054 UART: [afmc] ++
14,554,728 UART: [afmc] CDI.KEYID = 6
14,555,655 UART: [afmc] SUBJECT.KEYID = 7
14,556,823 UART: [afmc] AUTHORITY.KEYID = 5
17,061,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,874 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,487 UART: [afmc] --
18,861,084 UART: [cold-reset] --
18,866,299 UART: [state] Locking Datavault
18,871,120 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,828 UART: [state] Locking ICCM
18,874,691 UART: [exit] Launching FMC @ 0x40000130
18,883,108 UART:
18,883,347 UART: Running Caliptra FMC ...
18,884,452 UART:
18,884,623 UART: [state] CFI Enabled
18,892,634 UART: [fht] FMC Alias Private Key: 7
20,659,002 UART: [art] Extend RT PCRs Done
20,660,233 UART: [art] Lock RT PCRs Done
20,661,699 UART: [art] Populate DV Done
20,667,284 UART: [fht] FMC Alias Private Key: 7
20,668,932 UART: [art] Derive CDI
20,669,672 UART: [art] Store in slot 0x4
20,712,432 UART: [art] Derive Key Pair
20,713,435 UART: [art] Store priv key in slot 0x5
23,140,225 UART: [art] Derive Key Pair - Done
23,153,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,767 UART: [art] Erasing AUTHORITY.KEYID = 7
24,861,290 UART: [art] PUB.X = 236C8572748B4E500C66E413B316B8420A723086A71E02732E51B287ED5971C56B50C64387BF39C59EC31A7D131E4072
24,868,538 UART: [art] PUB.Y = EED971253B6982BE8A5F6B5269481E3A4AE43E46B324585C464F60ACAE178D1CD80B119C5B40198F096ECA6F4FF7E101
24,875,783 UART: [art] SIG.R = 10756DCB7760869A77CCF850C57011A4B058DD9D2CC0BC9DBAA2E4D9D7125456DB27C9E990BC022BB40C987D7DAE0708
24,883,181 UART: [art] SIG.S = 1251D74F37C4460157A0D67DE67A31D89C586C43594A6E2EAC44B971726238FE3C51C18526792237EA269F69B2587D85
25,861,846 UART: Caliptra RT
25,862,538 UART: [state] CFI Enabled
25,994,922 UART: [rt] RT listening for mailbox commands...
25,996,823 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,026,961 UART: [rt]cmd =0x414c544e, len=20
26,028,761 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,773,889 ready_for_fw is high
3,774,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,236 >>> mbox cmd response: success
18,695,967 UART:
18,696,352 UART: Running Caliptra FMC ...
18,697,463 UART:
18,697,617 UART: [state] CFI Enabled
18,705,567 UART: [fht] FMC Alias Private Key: 7
20,472,139 UART: [art] Extend RT PCRs Done
20,473,382 UART: [art] Lock RT PCRs Done
20,475,048 UART: [art] Populate DV Done
20,480,539 UART: [fht] FMC Alias Private Key: 7
20,482,299 UART: [art] Derive CDI
20,483,114 UART: [art] Store in slot 0x4
20,525,637 UART: [art] Derive Key Pair
20,526,677 UART: [art] Store priv key in slot 0x5
22,953,462 UART: [art] Derive Key Pair - Done
22,966,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,443 UART: [art] PUB.X = DE28FCF7E352371D43C5839D1A59928DB6060AE3DEDB5C2278E70ECD39C2DAFD0DE8F6847FB11287F57024F0193711EB
24,681,749 UART: [art] PUB.Y = 8902CE8D4F1A3EA4FA1A5CFDAD25781406A7968E9C922434844B5E9529A007D5480690C2A7F24DE395B3F69601E75484
24,688,951 UART: [art] SIG.R = F143AB8EB670F407C59CB0604F014F855846BED4EA79FD6A3080AA582AA8CD279C093AC7553193416E33D33C77721BDD
24,696,359 UART: [art] SIG.S = 1A52998B9EE36FE65C47BB44C60159C926C6E11AB70B6881B3C65AB28AF6F4F8FE2585DCC2355A15254B157FF506E35C
25,675,099 UART: Caliptra RT
25,675,803 UART: [state] CFI Enabled
25,809,261 UART: [rt] RT listening for mailbox commands...
25,811,147 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
25,840,934 UART: [rt]cmd =0x414c544e, len=20
25,842,581 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
191,973 UART:
192,341 UART: Running Caliptra ROM ...
193,438 UART:
193,579 UART: [state] CFI Enabled
264,795 UART: [state] LifecycleState = Unprovisioned
267,170 UART: [state] DebugLocked = No
268,487 UART: [state] WD Timer not started. Device not locked for debugging
273,650 UART: [kat] SHA2-256
463,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,366 UART: [kat] ++
474,809 UART: [kat] sha1
486,391 UART: [kat] SHA2-256
489,465 UART: [kat] SHA2-384
495,027 UART: [kat] SHA2-512-ACC
497,606 UART: [kat] ECC-384
2,949,631 UART: [kat] HMAC-384Kdf
2,971,950 UART: [kat] LMS
3,503,712 UART: [kat] --
3,509,126 UART: [cold-reset] ++
3,510,208 UART: [fht] FHT @ 0x50003400
3,520,680 UART: [idev] ++
3,521,310 UART: [idev] CDI.KEYID = 6
3,522,334 UART: [idev] SUBJECT.KEYID = 7
3,523,507 UART: [idev] UDS.KEYID = 0
3,524,467 ready_for_fw is high
3,524,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,081 UART: [idev] Erasing UDS.KEYID = 0
6,029,422 UART: [idev] Sha1 KeyId Algorithm
6,050,976 UART: [idev] --
6,055,894 UART: [ldev] ++
6,056,578 UART: [ldev] CDI.KEYID = 6
6,057,487 UART: [ldev] SUBJECT.KEYID = 5
6,058,645 UART: [ldev] AUTHORITY.KEYID = 7
6,059,878 UART: [ldev] FE.KEYID = 1
6,100,064 UART: [ldev] Erasing FE.KEYID = 1
8,604,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,088 UART: [ldev] --
10,413,977 UART: [fwproc] Wait for Commands...
10,415,633 UART: [fwproc] Recv command 0x46574c44
10,417,880 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,521 >>> mbox cmd response: success
14,674,955 UART: [afmc] ++
14,675,693 UART: [afmc] CDI.KEYID = 6
14,676,889 UART: [afmc] SUBJECT.KEYID = 7
14,678,326 UART: [afmc] AUTHORITY.KEYID = 5
17,216,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,862 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,744 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,952 UART: [afmc] --
19,035,202 UART: [cold-reset] --
19,039,877 UART: [state] Locking Datavault
19,045,294 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,439 UART: [state] Locking ICCM
19,049,861 UART: [exit] Launching FMC @ 0x40000130
19,058,539 UART:
19,058,772 UART: Running Caliptra FMC ...
19,059,872 UART:
19,060,034 UART: [state] CFI Enabled
19,115,894 UART: [fht] FMC Alias Private Key: 7
20,904,023 UART: [art] Extend RT PCRs Done
20,905,246 UART: [art] Lock RT PCRs Done
20,906,814 UART: [art] Populate DV Done
20,912,369 UART: [fht] FMC Alias Private Key: 7
20,913,964 UART: [art] Derive CDI
20,914,773 UART: [art] Store in slot 0x4
20,970,023 UART: [art] Derive Key Pair
20,971,019 UART: [art] Store priv key in slot 0x5
23,433,336 UART: [art] Derive Key Pair - Done
23,446,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,822 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,332 UART: [art] PUB.X = 427E6B3DA25996D3732DE91D556432658176223085EA64B75B2459CEC520C87DEC8EB82C80D2366D5436E76E49A95DB1
25,168,594 UART: [art] PUB.Y = B1AC89F702DEEAED2F25B8D3E36447AF97E70956F168A7B1A95F21BD14DE007C49F315C2E3678407CC7F5D01979867B5
25,175,862 UART: [art] SIG.R = 69B6FF1B3ACCA481A81BB9D7491EDD0D9B8C12416214C5C94FADF36E9A14A4EEFCE8CD33EF734D06142EF1FF28114841
25,183,258 UART: [art] SIG.S = 8CFCD158898D1D52873960B169BEB8C8E69C74CAA96DE03263CEEB3A744EEF5D52A5DDC765CE6381B868A9BA491ECA55
26,162,048 UART: Caliptra RT
26,162,740 UART: [state] CFI Enabled
26,344,047 UART: [rt] RT listening for mailbox commands...
26,346,079 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,376,132 UART: [rt]cmd =0x414c544e, len=20
26,377,680 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,440,441 ready_for_fw is high
3,440,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,791,105 >>> mbox cmd response: success
19,072,158 UART:
19,072,534 UART: Running Caliptra FMC ...
19,073,746 UART:
19,073,914 UART: [state] CFI Enabled
19,140,184 UART: [fht] FMC Alias Private Key: 7
20,906,012 UART: [art] Extend RT PCRs Done
20,907,238 UART: [art] Lock RT PCRs Done
20,908,971 UART: [art] Populate DV Done
20,914,601 UART: [fht] FMC Alias Private Key: 7
20,916,087 UART: [art] Derive CDI
20,916,852 UART: [art] Store in slot 0x4
20,972,811 UART: [art] Derive Key Pair
20,973,810 UART: [art] Store priv key in slot 0x5
23,436,888 UART: [art] Derive Key Pair - Done
23,449,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,163,254 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,763 UART: [art] PUB.X = 581A2E4B802F35358AD65C8D8EFE484A1D0A3904677D7AD8D3A85704D3501766E1AB026B6C83730514EEB026BE6CC8F1
25,172,055 UART: [art] PUB.Y = 39E02B44D80A4930E0937BE8C8CE2D7C02B7CD2F2F7D05C0CC4F37F05C8443C3B904D8CEC544C96CD190558C02FDB784
25,179,287 UART: [art] SIG.R = 29BE46524264454681652E1F10CDF74D8D74D1F75D5E2B7853CE47A553B362779B4032814765428F94CACED6C9B1F2AE
25,186,663 UART: [art] SIG.S = FD549BA15D3D9CD982D944A9D833368C335AA79DE22223A05E2E9587AE002F06F15A179C12EE81B8BE0D6E98E2ABA983
26,165,907 UART: Caliptra RT
26,166,593 UART: [state] CFI Enabled
26,347,642 UART: [rt] RT listening for mailbox commands...
26,349,518 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,379,372 UART: [rt]cmd =0x414c544e, len=20
26,381,079 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,525 UART:
192,898 UART: Running Caliptra ROM ...
194,093 UART:
603,620 UART: [state] CFI Enabled
619,209 UART: [state] LifecycleState = Unprovisioned
621,525 UART: [state] DebugLocked = No
622,774 UART: [state] WD Timer not started. Device not locked for debugging
627,169 UART: [kat] SHA2-256
817,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,819 UART: [kat] ++
828,375 UART: [kat] sha1
840,911 UART: [kat] SHA2-256
843,893 UART: [kat] SHA2-384
849,687 UART: [kat] SHA2-512-ACC
852,276 UART: [kat] ECC-384
3,293,298 UART: [kat] HMAC-384Kdf
3,306,812 UART: [kat] LMS
3,838,604 UART: [kat] --
3,842,277 UART: [cold-reset] ++
3,844,073 UART: [fht] FHT @ 0x50003400
3,855,129 UART: [idev] ++
3,855,838 UART: [idev] CDI.KEYID = 6
3,856,724 UART: [idev] SUBJECT.KEYID = 7
3,857,968 UART: [idev] UDS.KEYID = 0
3,858,911 ready_for_fw is high
3,859,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,076 UART: [idev] Erasing UDS.KEYID = 0
6,334,703 UART: [idev] Sha1 KeyId Algorithm
6,356,161 UART: [idev] --
6,360,999 UART: [ldev] ++
6,361,696 UART: [ldev] CDI.KEYID = 6
6,362,607 UART: [ldev] SUBJECT.KEYID = 5
6,363,768 UART: [ldev] AUTHORITY.KEYID = 7
6,365,000 UART: [ldev] FE.KEYID = 1
6,377,006 UART: [ldev] Erasing FE.KEYID = 1
8,850,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,144 UART: [ldev] --
10,643,398 UART: [fwproc] Wait for Commands...
10,646,523 UART: [fwproc] Recv command 0x46574c44
10,648,777 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,646 >>> mbox cmd response: success
14,918,655 UART: [afmc] ++
14,919,391 UART: [afmc] CDI.KEYID = 6
14,920,515 UART: [afmc] SUBJECT.KEYID = 7
14,922,079 UART: [afmc] AUTHORITY.KEYID = 5
17,425,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,691 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,906 UART: [afmc] --
19,227,319 UART: [cold-reset] --
19,232,228 UART: [state] Locking Datavault
19,236,030 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,209 UART: [state] Locking ICCM
19,239,900 UART: [exit] Launching FMC @ 0x40000130
19,248,547 UART:
19,248,786 UART: Running Caliptra FMC ...
19,249,893 UART:
19,250,052 UART: [state] CFI Enabled
19,257,841 UART: [fht] FMC Alias Private Key: 7
21,024,429 UART: [art] Extend RT PCRs Done
21,025,658 UART: [art] Lock RT PCRs Done
21,027,406 UART: [art] Populate DV Done
21,032,822 UART: [fht] FMC Alias Private Key: 7
21,034,491 UART: [art] Derive CDI
21,035,313 UART: [art] Store in slot 0x4
21,077,805 UART: [art] Derive Key Pair
21,078,852 UART: [art] Store priv key in slot 0x5
23,505,707 UART: [art] Derive Key Pair - Done
23,518,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,104 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,606 UART: [art] PUB.X = 732F55AC9B4B4DF675C7056A10088A42FF46C68BB7C5CB983F89020E8BB8DB5FA885915F66F7B4361BFA85FC1D912BC4
25,233,882 UART: [art] PUB.Y = BD15F5C6091A56906A6C2EE0F66ED72BB491561F1707DD9A94F1099A7877A2FC72D68DAC126084DB3A743E0ED99E36EB
25,241,148 UART: [art] SIG.R = 0CC869DB92971173CBB8439E773BB2ADA8F8E4191A6BC6DFFDC1BDC44D164698DED24D82FDC7121B2316B6F007C7CA98
25,248,522 UART: [art] SIG.S = D95B1E1F3177C72B15DA205FA1BBA53A73E08ED7D434A7E6FC14083FC1A871C2E774E7B4684B95CC6C97A6F81E54BF36
26,227,449 UART: Caliptra RT
26,228,142 UART: [state] CFI Enabled
26,360,601 UART: [rt] RT listening for mailbox commands...
26,362,516 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,392,316 UART: [rt]cmd =0x414c544e, len=20
26,393,995 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,756,473 ready_for_fw is high
3,756,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,034,444 >>> mbox cmd response: success
19,283,861 UART:
19,284,324 UART: Running Caliptra FMC ...
19,285,536 UART:
19,285,712 UART: [state] CFI Enabled
19,293,123 UART: [fht] FMC Alias Private Key: 7
21,058,837 UART: [art] Extend RT PCRs Done
21,060,059 UART: [art] Lock RT PCRs Done
21,061,538 UART: [art] Populate DV Done
21,067,025 UART: [fht] FMC Alias Private Key: 7
21,068,686 UART: [art] Derive CDI
21,069,512 UART: [art] Store in slot 0x4
21,112,026 UART: [art] Derive Key Pair
21,113,070 UART: [art] Store priv key in slot 0x5
23,539,941 UART: [art] Derive Key Pair - Done
23,552,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,258,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,260,420 UART: [art] PUB.X = 4CD25C4EDF3BF67A09B09DD69C0DE9489645D9D6FFB1F687509A8433FD3C03AE0AD4B631012367FA4E7C4E0096FAC9ED
25,267,673 UART: [art] PUB.Y = DABB3AD7A7562F0FA596E13C3D69EDF5B391B7414046C0B8A35C56A58126CEF234CC305F133C91562779B48CE35DA65B
25,274,921 UART: [art] SIG.R = C989D8810DF4DAE92CA2629E341DF4A03CFDC2D1377563F0F84D120181ACDE067CF19393FE12CFE66E67B9A3B47A1904
25,282,297 UART: [art] SIG.S = A6E7FFA5AA1F427AA98012CBB1DE949B679FA9359036005A9B119334DFDEED47B858201CE097E775813CE509611DAECB
26,261,314 UART: Caliptra RT
26,262,009 UART: [state] CFI Enabled
26,395,617 UART: [rt] RT listening for mailbox commands...
26,397,509 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
26,427,682 UART: [rt]cmd =0x414c544e, len=20
26,429,390 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,663 UART: [kat] SHA2-256
881,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,709 UART: [kat] ++
885,861 UART: [kat] sha1
890,221 UART: [kat] SHA2-256
892,159 UART: [kat] SHA2-384
895,064 UART: [kat] SHA2-512-ACC
896,965 UART: [kat] ECC-384
902,694 UART: [kat] HMAC-384Kdf
907,372 UART: [kat] LMS
1,475,568 UART: [kat] --
1,476,281 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 ready_for_fw is high
1,480,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,012 UART: [idev] Erasing UDS.KEYID = 0
1,505,878 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,350 UART: [idev] --
1,515,351 UART: [ldev] ++
1,515,519 UART: [ldev] CDI.KEYID = 6
1,515,882 UART: [ldev] SUBJECT.KEYID = 5
1,516,308 UART: [ldev] AUTHORITY.KEYID = 7
1,516,771 UART: [ldev] FE.KEYID = 1
1,521,963 UART: [ldev] Erasing FE.KEYID = 1
1,547,266 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,006 UART: [ldev] --
1,586,315 UART: [fwproc] Waiting for Commands...
1,587,018 UART: [fwproc] Received command 0x46574c44
1,587,809 UART: [fwproc] Received Image of size 118548 bytes
2,931,873 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,019 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,646 >>> mbox cmd response: success
3,131,700 UART: [afmc] ++
3,131,868 UART: [afmc] CDI.KEYID = 6
3,132,230 UART: [afmc] SUBJECT.KEYID = 7
3,132,655 UART: [afmc] AUTHORITY.KEYID = 5
3,167,144 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,921 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,804 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,487 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,223 UART: [afmc] --
3,210,315 UART: [cold-reset] --
3,210,985 UART: [state] Locking Datavault
3,211,990 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,594 UART: [state] Locking ICCM
3,213,242 UART: [exit] Launching FMC @ 0x40000130
3,218,572 UART:
3,218,588 UART: Running Caliptra FMC ...
3,218,996 UART:
3,219,050 UART: [state] CFI Enabled
3,229,596 UART: [fht] FMC Alias Private Key: 7
3,349,020 UART: [art] Extend RT PCRs Done
3,349,448 UART: [art] Lock RT PCRs Done
3,351,076 UART: [art] Populate DV Done
3,359,161 UART: [fht] FMC Alias Private Key: 7
3,360,161 UART: [art] Derive CDI
3,360,441 UART: [art] Store in slot 0x4
3,446,131 UART: [art] Derive Key Pair
3,446,491 UART: [art] Store priv key in slot 0x5
3,459,834 UART: [art] Derive Key Pair - Done
3,475,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,450 UART: [art] PUB.X = 7A75BC463B0A11BAD9CBEF3D49C29FDAF767FF654668D910BAC761ECCF5A901DA20E5A339A104B306718A11C4E451B47
3,498,230 UART: [art] PUB.Y = FC068BC536067538C697665F9103977470836C8A8AD063740EEB49193BF299FBBAE442783B229BFA5B52F27360A04F26
3,505,162 UART: [art] SIG.R = 23D26ADAE15DB776022860F138CCA5C256ECB4BBE1857FA32A27CD33676463CDC18962FE9B67035EC3FEE9A4FB2C6931
3,511,940 UART: [art] SIG.S = 49BA2D003366A0103598C7F15FA2F76420B2C28866598AD906AE3B0A8C5E5383488B1B4E7CD64FC0027ECC6F81572F4F
3,535,345 UART: Caliptra RT
3,535,596 UART: [state] CFI Enabled
3,655,751 UART: [rt] RT listening for mailbox commands...
3,656,421 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,395 UART: [rt]cmd =0x414c544e, len=20
3,687,645 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,715 ready_for_fw is high
1,362,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,528 >>> mbox cmd response: success
3,042,475 UART:
3,042,491 UART: Running Caliptra FMC ...
3,042,899 UART:
3,042,953 UART: [state] CFI Enabled
3,053,321 UART: [fht] FMC Alias Private Key: 7
3,171,587 UART: [art] Extend RT PCRs Done
3,172,015 UART: [art] Lock RT PCRs Done
3,173,591 UART: [art] Populate DV Done
3,181,854 UART: [fht] FMC Alias Private Key: 7
3,183,030 UART: [art] Derive CDI
3,183,310 UART: [art] Store in slot 0x4
3,269,090 UART: [art] Derive Key Pair
3,269,450 UART: [art] Store priv key in slot 0x5
3,282,785 UART: [art] Derive Key Pair - Done
3,297,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,805 UART: [art] PUB.X = C2B3985A3705E21508B180FB34A12E9563D9C70F0E2CD058AFEEF58DA86497234A9527E5C70C7CB968A7A7EAC0F31DC8
3,320,570 UART: [art] PUB.Y = E9E620AAA4825EC5B36AD5D1D72B077B3DB167CCF47D8DAEF5FBD7D1B2C177D108561D3C06DB517AE462C53343D9D464
3,327,529 UART: [art] SIG.R = EF5F2EF3C09E43767039ADA770F9F18D4A68E082AFBE9AAB8309A9084D9A07C861CB0D2C0C60A8646DD6BD02E371A067
3,334,295 UART: [art] SIG.S = 74085189204F4FA36765841454A716A267755907FC08679DADEA064A77B88F2FDD60CC344CF7CB206BDB1BA41E6A2F1C
3,358,525 UART: Caliptra RT
3,358,776 UART: [state] CFI Enabled
3,479,390 UART: [rt] RT listening for mailbox commands...
3,480,060 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,002 UART: [rt]cmd =0x414c544e, len=20
3,511,340 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,644 UART: [kat] SHA2-256
882,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,690 UART: [kat] ++
886,842 UART: [kat] sha1
891,052 UART: [kat] SHA2-256
892,990 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,447 UART: [kat] HMAC-384Kdf
908,143 UART: [kat] LMS
1,476,339 UART: [kat] --
1,477,256 UART: [cold-reset] ++
1,477,824 UART: [fht] Storing FHT @ 0x50003400
1,480,381 UART: [idev] ++
1,480,549 UART: [idev] CDI.KEYID = 6
1,480,909 UART: [idev] SUBJECT.KEYID = 7
1,481,333 UART: [idev] UDS.KEYID = 0
1,481,678 ready_for_fw is high
1,481,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,447 UART: [idev] Erasing UDS.KEYID = 0
1,506,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,873 UART: [idev] --
1,515,956 UART: [ldev] ++
1,516,124 UART: [ldev] CDI.KEYID = 6
1,516,487 UART: [ldev] SUBJECT.KEYID = 5
1,516,913 UART: [ldev] AUTHORITY.KEYID = 7
1,517,376 UART: [ldev] FE.KEYID = 1
1,522,590 UART: [ldev] Erasing FE.KEYID = 1
1,548,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,299 UART: [ldev] --
1,587,684 UART: [fwproc] Waiting for Commands...
1,588,415 UART: [fwproc] Received command 0x46574c44
1,589,206 UART: [fwproc] Received Image of size 118548 bytes
2,934,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,580 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,123 >>> mbox cmd response: success
3,135,171 UART: [afmc] ++
3,135,339 UART: [afmc] CDI.KEYID = 6
3,135,701 UART: [afmc] SUBJECT.KEYID = 7
3,136,126 UART: [afmc] AUTHORITY.KEYID = 5
3,171,859 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,841 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,621 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,213 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,896 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,750 UART: [afmc] --
3,214,700 UART: [cold-reset] --
3,215,510 UART: [state] Locking Datavault
3,216,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,483 UART: [state] Locking ICCM
3,218,151 UART: [exit] Launching FMC @ 0x40000130
3,223,481 UART:
3,223,497 UART: Running Caliptra FMC ...
3,223,905 UART:
3,224,048 UART: [state] CFI Enabled
3,234,858 UART: [fht] FMC Alias Private Key: 7
3,353,230 UART: [art] Extend RT PCRs Done
3,353,658 UART: [art] Lock RT PCRs Done
3,355,300 UART: [art] Populate DV Done
3,363,459 UART: [fht] FMC Alias Private Key: 7
3,364,577 UART: [art] Derive CDI
3,364,857 UART: [art] Store in slot 0x4
3,450,699 UART: [art] Derive Key Pair
3,451,059 UART: [art] Store priv key in slot 0x5
3,464,514 UART: [art] Derive Key Pair - Done
3,479,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,921 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,686 UART: [art] PUB.X = 473FBD2E72C1E591975057DF8368C8C0BB2D262676F1FB03BC1A41967B5BA176218413A325852FC5A0A563D989CCC353
3,502,453 UART: [art] PUB.Y = E0D75AD3D79DD40315E4EA6245A1117C2F83FC865B2D629900F1658212C9683E198F2A6BA71C7FB4EA4BDBA5EBDD21FA
3,509,394 UART: [art] SIG.R = A6BF134B34C50729B088A4AD44D727888717D8ED056895076A7E2AEEEADF3818403A5258901F744B46C5B70B79AEC10C
3,516,151 UART: [art] SIG.S = C947E87BC64D74723634E51B670AAF95FA38F4BD44F1A743D2540A70C7A5D06FA16EAA9BC9E922F80F81F86F62751849
3,539,790 UART: Caliptra RT
3,540,133 UART: [state] CFI Enabled
3,660,248 UART: [rt] RT listening for mailbox commands...
3,660,918 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,936 UART: [rt]cmd =0x414c544e, len=20
3,692,360 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,098 ready_for_fw is high
1,363,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,449 >>> mbox cmd response: success
3,043,146 UART:
3,043,162 UART: Running Caliptra FMC ...
3,043,570 UART:
3,043,713 UART: [state] CFI Enabled
3,054,253 UART: [fht] FMC Alias Private Key: 7
3,172,965 UART: [art] Extend RT PCRs Done
3,173,393 UART: [art] Lock RT PCRs Done
3,174,939 UART: [art] Populate DV Done
3,183,304 UART: [fht] FMC Alias Private Key: 7
3,184,262 UART: [art] Derive CDI
3,184,542 UART: [art] Store in slot 0x4
3,270,478 UART: [art] Derive Key Pair
3,270,838 UART: [art] Store priv key in slot 0x5
3,284,067 UART: [art] Derive Key Pair - Done
3,299,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,767 UART: [art] PUB.X = 6DFDA1E141BD6D3A7EA8C4B35A26ECDD640617DA5F18CABDA81770C8F827130FB6C764F8D6DD583FBE70A525D6E3977C
3,322,553 UART: [art] PUB.Y = 3348D55637B1E2D0D242DFA4F3EEE28184F803FEA4F48F01815AF3FD7D679A9C82E88567C706D35B5514B3FF95FE648E
3,329,502 UART: [art] SIG.R = 26492337A5F60A040306820E6DA0809773C5F16043D4FAA03E726B66C46A7F767B9CCFFB5A8B766AAD234D6DE60B5611
3,336,256 UART: [art] SIG.S = 77C54C84ED9F79A142AA0AEBD9FC6B79D11231A8C76BF6F34C2CE3B895454FCDDF55B0A80EE4919AEA94FCE57A49142C
3,360,000 UART: Caliptra RT
3,360,343 UART: [state] CFI Enabled
3,480,958 UART: [rt] RT listening for mailbox commands...
3,481,628 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,642 UART: [rt]cmd =0x414c544e, len=20
3,512,812 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,542 UART: [state] LifecycleState = Unprovisioned
86,197 UART: [state] DebugLocked = No
86,891 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
891,576 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,680 UART: [kat] ++
895,832 UART: [kat] sha1
899,844 UART: [kat] SHA2-256
901,784 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,169,624 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 ready_for_fw is high
1,174,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,579 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,735 UART: [idev] --
1,208,774 UART: [ldev] ++
1,208,942 UART: [ldev] CDI.KEYID = 6
1,209,306 UART: [ldev] SUBJECT.KEYID = 5
1,209,733 UART: [ldev] AUTHORITY.KEYID = 7
1,210,196 UART: [ldev] FE.KEYID = 1
1,215,414 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,622 UART: [ldev] --
1,280,985 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,633 >>> mbox cmd response: success
2,826,825 UART: [afmc] ++
2,826,993 UART: [afmc] CDI.KEYID = 6
2,827,356 UART: [afmc] SUBJECT.KEYID = 7
2,827,782 UART: [afmc] AUTHORITY.KEYID = 5
2,862,517 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,819 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,978 UART: [afmc] --
2,906,003 UART: [cold-reset] --
2,906,881 UART: [state] Locking Datavault
2,908,018 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,622 UART: [state] Locking ICCM
2,909,176 UART: [exit] Launching FMC @ 0x40000130
2,914,506 UART:
2,914,522 UART: Running Caliptra FMC ...
2,914,930 UART:
2,914,984 UART: [state] CFI Enabled
2,925,436 UART: [fht] FMC Alias Private Key: 7
3,044,154 UART: [art] Extend RT PCRs Done
3,044,582 UART: [art] Lock RT PCRs Done
3,046,182 UART: [art] Populate DV Done
3,054,449 UART: [fht] FMC Alias Private Key: 7
3,055,603 UART: [art] Derive CDI
3,055,883 UART: [art] Store in slot 0x4
3,141,762 UART: [art] Derive Key Pair
3,142,122 UART: [art] Store priv key in slot 0x5
3,154,868 UART: [art] Derive Key Pair - Done
3,169,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,268 UART: [art] PUB.X = 51B7228572ED38504B67CB211EF762C73EC290A0300C2B3B1BE98A557073ABB8966AFEAFB2421CBFADBC1E43DE12B3A6
3,192,051 UART: [art] PUB.Y = E68F6275D878D656C516DE6B4A2336A7AD75617113CF853E3B8916B4A6656AE91D5454FBA6A9DA3068BFE5C78BD03C93
3,199,007 UART: [art] SIG.R = 6C9155FC92F280F13F179F6C9CCA60E1D4CD3BE7568A9C219DCE5A261B60B51A8B1048541C959DF1113D7B1D0538321B
3,205,780 UART: [art] SIG.S = 4BF39B38DFC10BFE24353D1BF707C546944DB1C66B20E4E973256973EDB32FD5EAE48704FCE32D00F4535E05893C1755
3,229,126 UART: Caliptra RT
3,229,377 UART: [state] CFI Enabled
3,347,511 UART: [rt] RT listening for mailbox commands...
3,348,181 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,089 UART: [rt]cmd =0x414c544e, len=20
3,379,321 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,804 ready_for_fw is high
1,058,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,552 >>> mbox cmd response: success
2,741,157 UART:
2,741,173 UART: Running Caliptra FMC ...
2,741,581 UART:
2,741,635 UART: [state] CFI Enabled
2,752,289 UART: [fht] FMC Alias Private Key: 7
2,871,393 UART: [art] Extend RT PCRs Done
2,871,821 UART: [art] Lock RT PCRs Done
2,873,477 UART: [art] Populate DV Done
2,882,032 UART: [fht] FMC Alias Private Key: 7
2,883,170 UART: [art] Derive CDI
2,883,450 UART: [art] Store in slot 0x4
2,969,513 UART: [art] Derive Key Pair
2,969,873 UART: [art] Store priv key in slot 0x5
2,982,931 UART: [art] Derive Key Pair - Done
2,997,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,048 UART: [art] PUB.X = 39A215F7870D89D19B76CD21340F12F3798927BC9A19BDED4B6499CCD178E48E2F2B51A253241AF4E01A8C88424D83E2
3,020,814 UART: [art] PUB.Y = E84C679C4B230CF5B88A5CB69877CFCC248690195150116C4BF03952E67DA92E81CCF5436E01C1F553FAA05A80643A07
3,027,757 UART: [art] SIG.R = 4D6F625E6F507E562C2C9067DCBFFBB186D949503596089C6CC28B7227162996D0A1189410E283A534460A765B94BB81
3,034,513 UART: [art] SIG.S = 63E46978085D28E94EBA503FA0A314DA58D254CC0FC974F67B43229CFDB7375BB0A99A9E72332E0660D60379DD1E31A6
3,057,805 UART: Caliptra RT
3,058,056 UART: [state] CFI Enabled
3,177,430 UART: [rt] RT listening for mailbox commands...
3,178,100 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,096 UART: [rt]cmd =0x414c544e, len=20
3,209,508 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,993 UART: [kat] SHA2-256
901,933 UART: [kat] SHA2-384
904,468 UART: [kat] SHA2-512-ACC
906,369 UART: [kat] ECC-384
916,018 UART: [kat] HMAC-384Kdf
920,550 UART: [kat] LMS
1,168,862 UART: [kat] --
1,169,479 UART: [cold-reset] ++
1,169,913 UART: [fht] FHT @ 0x50003400
1,172,501 UART: [idev] ++
1,172,669 UART: [idev] CDI.KEYID = 6
1,173,030 UART: [idev] SUBJECT.KEYID = 7
1,173,455 UART: [idev] UDS.KEYID = 0
1,173,801 ready_for_fw is high
1,173,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,206 UART: [idev] Erasing UDS.KEYID = 0
1,198,296 UART: [idev] Sha1 KeyId Algorithm
1,207,260 UART: [idev] --
1,208,213 UART: [ldev] ++
1,208,381 UART: [ldev] CDI.KEYID = 6
1,208,745 UART: [ldev] SUBJECT.KEYID = 5
1,209,172 UART: [ldev] AUTHORITY.KEYID = 7
1,209,635 UART: [ldev] FE.KEYID = 1
1,214,797 UART: [ldev] Erasing FE.KEYID = 1
1,241,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,141 UART: [ldev] --
1,280,428 UART: [fwproc] Wait for Commands...
1,281,217 UART: [fwproc] Recv command 0x46574c44
1,281,950 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,416 >>> mbox cmd response: success
2,824,586 UART: [afmc] ++
2,824,754 UART: [afmc] CDI.KEYID = 6
2,825,117 UART: [afmc] SUBJECT.KEYID = 7
2,825,543 UART: [afmc] AUTHORITY.KEYID = 5
2,861,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,561 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,262 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,049 UART: [afmc] --
2,905,016 UART: [cold-reset] --
2,905,788 UART: [state] Locking Datavault
2,906,853 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,457 UART: [state] Locking ICCM
2,908,101 UART: [exit] Launching FMC @ 0x40000130
2,913,431 UART:
2,913,447 UART: Running Caliptra FMC ...
2,913,855 UART:
2,913,998 UART: [state] CFI Enabled
2,924,646 UART: [fht] FMC Alias Private Key: 7
3,043,870 UART: [art] Extend RT PCRs Done
3,044,298 UART: [art] Lock RT PCRs Done
3,045,992 UART: [art] Populate DV Done
3,054,351 UART: [fht] FMC Alias Private Key: 7
3,055,407 UART: [art] Derive CDI
3,055,687 UART: [art] Store in slot 0x4
3,141,180 UART: [art] Derive Key Pair
3,141,540 UART: [art] Store priv key in slot 0x5
3,154,636 UART: [art] Derive Key Pair - Done
3,169,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,832 UART: [art] PUB.X = BA0B63978CDC3C2BF1403535383D215F434CBF63296500E56BCD1D32147976A717C8E471CF4DC014B68C4E65E1ED20FD
3,192,583 UART: [art] PUB.Y = 1C902AD429D3803D53A00391E2111F3EF192DC6FD10ABA216F8D1CCC5AFE3A2BF05F825D95ECA749517868709FE9D906
3,199,534 UART: [art] SIG.R = C0AEA77C9C96BF3A8850669948E268D71350002E8BF3D2AFFFFF5B7A459B4EBBCE75D7571D21D2F79066072E7E654CAA
3,206,293 UART: [art] SIG.S = 8431ED6AA80806F8CC35ECDE89C87849622F88F3A377A6306E495756FD3657D0FFA696ABE39EAC8F9A236FBE95E117E5
3,230,165 UART: Caliptra RT
3,230,508 UART: [state] CFI Enabled
3,350,414 UART: [rt] RT listening for mailbox commands...
3,351,084 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,394 UART: [rt]cmd =0x414c544e, len=20
3,382,608 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,131 ready_for_fw is high
1,060,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,739 >>> mbox cmd response: success
2,743,710 UART:
2,743,726 UART: Running Caliptra FMC ...
2,744,134 UART:
2,744,277 UART: [state] CFI Enabled
2,754,565 UART: [fht] FMC Alias Private Key: 7
2,873,259 UART: [art] Extend RT PCRs Done
2,873,687 UART: [art] Lock RT PCRs Done
2,875,233 UART: [art] Populate DV Done
2,883,368 UART: [fht] FMC Alias Private Key: 7
2,884,388 UART: [art] Derive CDI
2,884,668 UART: [art] Store in slot 0x4
2,970,525 UART: [art] Derive Key Pair
2,970,885 UART: [art] Store priv key in slot 0x5
2,984,459 UART: [art] Derive Key Pair - Done
2,999,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,866 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,631 UART: [art] PUB.X = DB9D3070A27E329CF7D440BE24E8049B2B40186D8AB33FAD6035802663DCA118672D77CFC7F923B49BEC00CD58E5D485
3,022,384 UART: [art] PUB.Y = 72FD7B5ADACBADE56E72A123D51BCD451BE37FF40AA19433E50FA38530772FA092B8C2B3B2165F5AC6C94E6C740566E7
3,029,341 UART: [art] SIG.R = 9141805071BFCC769B67ACA3A10AA05C3895175C068BF828B97E28F5A1C16F0A8AD2D032510DD1CCEEAD4C12FA622C54
3,036,111 UART: [art] SIG.S = F341B0BD63631FBEEEDBEC87D0C2CD42DA993653CCFF3FAEF0FB9C56CFCB560C0D7413A64BA088380A505C41821C6EF0
3,059,394 UART: Caliptra RT
3,059,737 UART: [state] CFI Enabled
3,179,325 UART: [rt] RT listening for mailbox commands...
3,179,995 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,935 UART: [rt]cmd =0x414c544e, len=20
3,211,351 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
893,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,469 UART: [kat] ++
897,621 UART: [kat] sha1
901,917 UART: [kat] SHA2-256
903,857 UART: [kat] SHA2-384
906,620 UART: [kat] SHA2-512-ACC
908,521 UART: [kat] ECC-384
918,178 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,793 UART: [cold-reset] ++
1,172,293 UART: [fht] FHT @ 0x50003400
1,175,104 UART: [idev] ++
1,175,272 UART: [idev] CDI.KEYID = 6
1,175,632 UART: [idev] SUBJECT.KEYID = 7
1,176,056 UART: [idev] UDS.KEYID = 0
1,176,401 ready_for_fw is high
1,176,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,988 UART: [idev] Erasing UDS.KEYID = 0
1,200,923 UART: [idev] Sha1 KeyId Algorithm
1,209,539 UART: [idev] --
1,210,727 UART: [ldev] ++
1,210,895 UART: [ldev] CDI.KEYID = 6
1,211,258 UART: [ldev] SUBJECT.KEYID = 5
1,211,684 UART: [ldev] AUTHORITY.KEYID = 7
1,212,147 UART: [ldev] FE.KEYID = 1
1,217,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,823 UART: [ldev] --
1,283,176 UART: [fwproc] Wait for Commands...
1,283,996 UART: [fwproc] Recv command 0x46574c44
1,284,724 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,689 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,233 >>> mbox cmd response: success
2,828,421 UART: [afmc] ++
2,828,589 UART: [afmc] CDI.KEYID = 6
2,828,951 UART: [afmc] SUBJECT.KEYID = 7
2,829,376 UART: [afmc] AUTHORITY.KEYID = 5
2,864,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,500 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,209 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,092 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,793 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,467 UART: [afmc] --
2,907,559 UART: [cold-reset] --
2,908,223 UART: [state] Locking Datavault
2,909,298 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,902 UART: [state] Locking ICCM
2,910,456 UART: [exit] Launching FMC @ 0x40000130
2,915,786 UART:
2,915,802 UART: Running Caliptra FMC ...
2,916,210 UART:
2,916,264 UART: [state] CFI Enabled
2,926,602 UART: [fht] FMC Alias Private Key: 7
3,045,852 UART: [art] Extend RT PCRs Done
3,046,280 UART: [art] Lock RT PCRs Done
3,047,754 UART: [art] Populate DV Done
3,055,899 UART: [fht] FMC Alias Private Key: 7
3,056,897 UART: [art] Derive CDI
3,057,177 UART: [art] Store in slot 0x4
3,142,496 UART: [art] Derive Key Pair
3,142,856 UART: [art] Store priv key in slot 0x5
3,155,592 UART: [art] Derive Key Pair - Done
3,170,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,684 UART: [art] PUB.X = 3B51A4A916D0FF143ADA3BE2F00963AA8263B717469D6A0B3E543B33456E8F588EEB63283E9E8739135A3011E318A203
3,193,443 UART: [art] PUB.Y = 6BD93ECE5546D56ACA0A2313386F1B92397A6FBFE23A2C80631481D86CE8F506876C81C881902FABE17FBE88D905B134
3,200,390 UART: [art] SIG.R = 1CF93D044C715DC48459E5602BDF77053C578067BB1B887A053FD6A3661716CF49CE8BF09B87590F371A018501C65589
3,207,136 UART: [art] SIG.S = 4A7653B1BD0EBCCC06318EBE760387797115E1AC2156E05739AC8ABB6FFE5EED0F5EE2EB67E4A8410BFCF5E601772BB6
3,230,940 UART: Caliptra RT
3,231,191 UART: [state] CFI Enabled
3,350,389 UART: [rt] RT listening for mailbox commands...
3,351,059 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,709 UART: [rt]cmd =0x414c544e, len=20
3,382,109 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,000 >>> mbox cmd response: success
2,741,315 UART:
2,741,331 UART: Running Caliptra FMC ...
2,741,739 UART:
2,741,793 UART: [state] CFI Enabled
2,752,435 UART: [fht] FMC Alias Private Key: 7
2,871,205 UART: [art] Extend RT PCRs Done
2,871,633 UART: [art] Lock RT PCRs Done
2,873,127 UART: [art] Populate DV Done
2,881,558 UART: [fht] FMC Alias Private Key: 7
2,882,738 UART: [art] Derive CDI
2,883,018 UART: [art] Store in slot 0x4
2,968,407 UART: [art] Derive Key Pair
2,968,767 UART: [art] Store priv key in slot 0x5
2,981,575 UART: [art] Derive Key Pair - Done
2,996,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,261 UART: [art] PUB.X = B9F80459D334440019E1A940C879EE718ED53B2C3BA05BAF0D77BF09D52AF63961845706C78521B17C20CF7A42CD3810
3,018,997 UART: [art] PUB.Y = 05DA6FE023FE4203C6A81C6D46AAA14F00BA28A7AD163003377CE66308931B79ED9C4B4E81681E387E5D24B8403602BA
3,025,914 UART: [art] SIG.R = 794087E36B97F398145337C57113CEAB559BBCB88AAF72477D62DE1B9BBE3D8AEB248317BAC4CFCD3AA5B724CC359A47
3,032,700 UART: [art] SIG.S = 7A1DF25C25A7CE4A153F993DB3EB7BDBC91B03F17EFF0382322B9AC0A52151E906FC886F941E3267D5A5312216E31E84
3,056,205 UART: Caliptra RT
3,056,456 UART: [state] CFI Enabled
3,176,316 UART: [rt] RT listening for mailbox commands...
3,176,986 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,940 UART: [rt]cmd =0x414c544e, len=20
3,208,288 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,021 UART: [state] LifecycleState = Unprovisioned
85,676 UART: [state] DebugLocked = No
86,362 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
893,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,464 UART: [kat] ++
897,616 UART: [kat] sha1
902,052 UART: [kat] SHA2-256
903,992 UART: [kat] SHA2-384
906,845 UART: [kat] SHA2-512-ACC
908,746 UART: [kat] ECC-384
918,393 UART: [kat] HMAC-384Kdf
923,075 UART: [kat] LMS
1,171,403 UART: [kat] --
1,172,422 UART: [cold-reset] ++
1,172,908 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,210,086 UART: [idev] --
1,211,086 UART: [ldev] ++
1,211,254 UART: [ldev] CDI.KEYID = 6
1,211,617 UART: [ldev] SUBJECT.KEYID = 5
1,212,043 UART: [ldev] AUTHORITY.KEYID = 7
1,212,506 UART: [ldev] FE.KEYID = 1
1,218,142 UART: [ldev] Erasing FE.KEYID = 1
1,243,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,634 UART: [ldev] --
1,283,047 UART: [fwproc] Wait for Commands...
1,283,633 UART: [fwproc] Recv command 0x46574c44
1,284,361 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,013 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,183 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,424 >>> mbox cmd response: success
2,829,534 UART: [afmc] ++
2,829,702 UART: [afmc] CDI.KEYID = 6
2,830,064 UART: [afmc] SUBJECT.KEYID = 7
2,830,489 UART: [afmc] AUTHORITY.KEYID = 5
2,865,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,071 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,060 UART: [afmc] --
2,909,092 UART: [cold-reset] --
2,909,804 UART: [state] Locking Datavault
2,910,725 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,329 UART: [state] Locking ICCM
2,911,827 UART: [exit] Launching FMC @ 0x40000130
2,917,157 UART:
2,917,173 UART: Running Caliptra FMC ...
2,917,581 UART:
2,917,724 UART: [state] CFI Enabled
2,928,420 UART: [fht] FMC Alias Private Key: 7
3,047,386 UART: [art] Extend RT PCRs Done
3,047,814 UART: [art] Lock RT PCRs Done
3,049,462 UART: [art] Populate DV Done
3,057,983 UART: [fht] FMC Alias Private Key: 7
3,058,987 UART: [art] Derive CDI
3,059,267 UART: [art] Store in slot 0x4
3,145,218 UART: [art] Derive Key Pair
3,145,578 UART: [art] Store priv key in slot 0x5
3,158,412 UART: [art] Derive Key Pair - Done
3,173,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,420 UART: [art] PUB.X = 287701E555D225C372F2251C29F06C0B4203537CF3C0BBEDB983E462042EB6984983050BB07732B13426759B579B3E07
3,196,157 UART: [art] PUB.Y = CC3E09D08626B05F3F2A0393BA05A501EFD991994F634884113CF92BA79699781111AE8AF8F0B477F0EB03EE85C8538C
3,203,094 UART: [art] SIG.R = 423D0CD326FE5F0E6C5CBEC92677BC7854AC74614145D402B774E50BB1F7C480E84CA2BB0485768CBACBE2D1CCDF92F3
3,209,867 UART: [art] SIG.S = AC0BE0F18C56DC2906D3B3B4212FD69C41A1E2A195A3AEC8EC2397F12B3D23F6422746F2653E018FB37CC3869B0F7FB0
3,234,065 UART: Caliptra RT
3,234,408 UART: [state] CFI Enabled
3,354,857 UART: [rt] RT listening for mailbox commands...
3,355,527 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,593 UART: [rt]cmd =0x414c544e, len=20
3,386,999 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 ready_for_fw is high
1,060,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,441 >>> mbox cmd response: success
2,742,674 UART:
2,742,690 UART: Running Caliptra FMC ...
2,743,098 UART:
2,743,241 UART: [state] CFI Enabled
2,753,905 UART: [fht] FMC Alias Private Key: 7
2,873,529 UART: [art] Extend RT PCRs Done
2,873,957 UART: [art] Lock RT PCRs Done
2,875,727 UART: [art] Populate DV Done
2,883,634 UART: [fht] FMC Alias Private Key: 7
2,884,712 UART: [art] Derive CDI
2,884,992 UART: [art] Store in slot 0x4
2,970,683 UART: [art] Derive Key Pair
2,971,043 UART: [art] Store priv key in slot 0x5
2,984,363 UART: [art] Derive Key Pair - Done
2,999,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,141 UART: [art] PUB.X = 71EB56338FDD8FE24132A5F147B796EA6E59E7157E4CFD8D0015932A0F9DCA263CF672B26E89C0AF5FF82587DE7089E5
3,021,896 UART: [art] PUB.Y = E133932EBF707C672C20BA790AC012704F31950053ED0299A6B7E6DB4781C6603DEDC1E8C9912DA6501EC0FF18E2CAA7
3,028,826 UART: [art] SIG.R = 38A46A91D6D8D79414D43CFB6E67C37E9AA1D4382B62E037150DC1606A321FC02B6913B341943C36B9FF952823F4E8C1
3,035,593 UART: [art] SIG.S = 089D8485C84B4716D295274D103095A901E2D5D36329B4635B44CE256AC988D086861FD71B3D2852D2304DBA0B85FE13
3,059,724 UART: Caliptra RT
3,060,067 UART: [state] CFI Enabled
3,180,203 UART: [rt] RT listening for mailbox commands...
3,180,873 <<< Executing mbox cmd 0x414c544e (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,887 UART: [rt]cmd =0x414c544e, len=20
3,212,031 >>> mbox cmd response: failed
test test_certify_key_extended::test_dmtf_other_name_validation_fail ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,590,930 UART: [afmc] --
23,595,078 UART: [cold-reset] --
23,599,437 UART: [state] Locking Datavault
23,602,411 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,110 UART: [state] Locking ICCM
23,606,578 UART: [exit] Launching FMC @ 0x40000130
23,614,965 UART:
23,615,206 UART: Running Caliptra FMC ...
23,616,309 UART:
23,616,469 UART: [state] CFI Enabled
23,681,982 UART: [fht] FMC Alias Private Key: 7
26,022,077 UART: [art] Extend RT PCRs Done
26,023,305 UART: [art] Lock RT PCRs Done
26,025,066 UART: [art] Populate DV Done
26,030,428 UART: [fht] FMC Alias Private Key: 7
26,032,128 UART: [art] Derive CDI
26,032,946 UART: [art] Store in slot 0x4
26,090,201 UART: [art] Derive Key Pair
26,091,245 UART: [art] Store priv key in slot 0x5
29,383,560 UART: [art] Derive Key Pair - Done
29,396,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,685,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,687,048 UART: [art] PUB.X = B9A5799F1B49CA000C23017D7AFD43562598F37615A3CC7115395D3BD514DE999598BB8DB791A66C81F5483EE33D0A1C
31,694,298 UART: [art] PUB.Y = C62781FFEC93DFA6CB9F84D580307CA5CE8F9F4518A5A2B00D566286DB037354032831C7B03568E1B343558B555A91F9
31,701,517 UART: [art] SIG.R = 11B9EFC6BA54D361BD1E2BCBE7A635E9BBFD08CB47C8D90355285704F5423249C9A820B1BF5B78EE7BF87A5568F19C6E
31,708,895 UART: [art] SIG.S = 985669A3AF088F458C6353F1567130BCDF2CB269541C2A5CFBB22A49AE94A316E75E3172F766798DF1EBB1D0E13F12B0
33,013,831 UART: Caliptra RT
33,014,558 UART: [state] CFI Enabled
33,202,248 UART: [rt] RT listening for mailbox commands...
33,234,365 UART: [rt]cmd =0x44504543, len=92
38,993,856 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
190,244 UART:
190,534 UART: Running Caliptra ROM ...
191,644 UART:
191,795 UART: [state] CFI Enabled
252,129 UART: [state] LifecycleState = Unprovisioned
254,055 UART: [state] DebugLocked = No
256,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,630 UART: [kat] SHA2-256
431,283 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,832 UART: [kat] ++
442,358 UART: [kat] sha1
453,353 UART: [kat] SHA2-256
456,030 UART: [kat] SHA2-384
462,413 UART: [kat] SHA2-512-ACC
464,789 UART: [kat] ECC-384
2,754,903 UART: [kat] HMAC-384Kdf
2,786,572 UART: [kat] LMS
3,976,868 UART: [kat] --
3,982,297 UART: [cold-reset] ++
3,983,872 UART: [fht] Storing FHT @ 0x50003400
3,996,491 UART: [idev] ++
3,997,061 UART: [idev] CDI.KEYID = 6
3,998,103 UART: [idev] SUBJECT.KEYID = 7
3,999,277 UART: [idev] UDS.KEYID = 0
4,000,203 ready_for_fw is high
4,000,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,149,719 UART: [idev] Erasing UDS.KEYID = 0
7,333,873 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,589 UART: [idev] --
7,359,531 UART: [ldev] ++
7,360,102 UART: [ldev] CDI.KEYID = 6
7,361,064 UART: [ldev] SUBJECT.KEYID = 5
7,362,301 UART: [ldev] AUTHORITY.KEYID = 7
7,363,534 UART: [ldev] FE.KEYID = 1
7,408,988 UART: [ldev] Erasing FE.KEYID = 1
10,745,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,057,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,072,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,087,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,101,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,119,662 UART: [ldev] --
13,124,820 UART: [fwproc] Waiting for Commands...
13,127,185 UART: [fwproc] Received command 0x46574c44
13,129,369 UART: [fwproc] Received Image of size 118548 bytes
17,233,297 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,395 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,562 >>> mbox cmd response: success
17,708,964 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,713,648 UART: [afmc] ++
17,714,218 UART: [afmc] CDI.KEYID = 6
17,715,234 UART: [afmc] SUBJECT.KEYID = 7
17,716,389 UART: [afmc] AUTHORITY.KEYID = 5
21,079,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,378,642 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,380,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,395,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,410,044 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,424,475 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,445,089 UART: [afmc] --
23,449,222 UART: [cold-reset] --
23,454,052 UART: [state] Locking Datavault
23,460,980 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,680 UART: [state] Locking ICCM
23,464,250 UART: [exit] Launching FMC @ 0x40000130
23,472,647 UART:
23,472,885 UART: Running Caliptra FMC ...
23,473,986 UART:
23,474,141 UART: [state] CFI Enabled
23,539,816 UART: [fht] FMC Alias Private Key: 7
25,879,792 UART: [art] Extend RT PCRs Done
25,881,012 UART: [art] Lock RT PCRs Done
25,882,422 UART: [art] Populate DV Done
25,887,780 UART: [fht] FMC Alias Private Key: 7
25,889,426 UART: [art] Derive CDI
25,890,238 UART: [art] Store in slot 0x4
25,948,599 UART: [art] Derive Key Pair
25,949,640 UART: [art] Store priv key in slot 0x5
29,242,433 UART: [art] Derive Key Pair - Done
29,255,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,480 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,985 UART: [art] PUB.X = B9A5799F1B49CA000C23017D7AFD43562598F37615A3CC7115395D3BD514DE999598BB8DB791A66C81F5483EE33D0A1C
31,553,217 UART: [art] PUB.Y = C62781FFEC93DFA6CB9F84D580307CA5CE8F9F4518A5A2B00D566286DB037354032831C7B03568E1B343558B555A91F9
31,560,491 UART: [art] SIG.R = 11B9EFC6BA54D361BD1E2BCBE7A635E9BBFD08CB47C8D90355285704F5423249C9A820B1BF5B78EE7BF87A5568F19C6E
31,567,880 UART: [art] SIG.S = 985669A3AF088F458C6353F1567130BCDF2CB269541C2A5CFBB22A49AE94A316E75E3172F766798DF1EBB1D0E13F12B0
32,873,102 UART: Caliptra RT
32,873,792 UART: [state] CFI Enabled
33,050,431 UART: [rt] RT listening for mailbox commands...
33,082,451 UART: [rt]cmd =0x4d454153, len=108
33,101,270 >>> mbox cmd response data (12 bytes)
33,101,846 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,132,270 UART: [rt]cmd =0x44504543, len=92
38,898,669 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,067 writing to cptra_bootfsm_go
190,186 UART:
190,504 UART: Running Caliptra ROM ...
191,533 UART:
191,674 UART: [state] CFI Enabled
254,345 UART: [state] LifecycleState = Unprovisioned
256,278 UART: [state] DebugLocked = No
258,796 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,836 UART: [kat] SHA2-256
432,478 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,026 UART: [kat] ++
443,507 UART: [kat] sha1
453,387 UART: [kat] SHA2-256
456,107 UART: [kat] SHA2-384
461,247 UART: [kat] SHA2-512-ACC
463,622 UART: [kat] ECC-384
2,758,839 UART: [kat] HMAC-384Kdf
2,789,937 UART: [kat] LMS
3,980,250 UART: [kat] --
3,983,283 UART: [cold-reset] ++
3,985,368 UART: [fht] Storing FHT @ 0x50003400
3,997,849 UART: [idev] ++
3,998,415 UART: [idev] CDI.KEYID = 6
3,999,443 UART: [idev] SUBJECT.KEYID = 7
4,000,624 UART: [idev] UDS.KEYID = 0
4,001,678 ready_for_fw is high
4,001,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,150,872 UART: [idev] Erasing UDS.KEYID = 0
7,335,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,356,450 UART: [idev] --
7,360,939 UART: [ldev] ++
7,361,517 UART: [ldev] CDI.KEYID = 6
7,362,477 UART: [ldev] SUBJECT.KEYID = 5
7,363,697 UART: [ldev] AUTHORITY.KEYID = 7
7,365,002 UART: [ldev] FE.KEYID = 1
7,391,800 UART: [ldev] Erasing FE.KEYID = 1
10,722,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,080,265 UART: [ldev] --
13,085,156 UART: [fwproc] Waiting for Commands...
13,087,964 UART: [fwproc] Received command 0x46574c44
13,090,152 UART: [fwproc] Received Image of size 118548 bytes
17,193,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,374 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,344,542 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,672,661 >>> mbox cmd response: success
17,673,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,677,282 UART: [afmc] ++
17,677,858 UART: [afmc] CDI.KEYID = 6
17,678,821 UART: [afmc] SUBJECT.KEYID = 7
17,680,031 UART: [afmc] AUTHORITY.KEYID = 5
21,041,569 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,339,163 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,341,423 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,355,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,370,603 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,385,015 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,407,832 UART: [afmc] --
23,411,324 UART: [cold-reset] --
23,415,885 UART: [state] Locking Datavault
23,420,861 UART: [state] Locking PCR0, PCR1 and PCR31
23,422,612 UART: [state] Locking ICCM
23,424,668 UART: [exit] Launching FMC @ 0x40000130
23,433,031 UART:
23,433,271 UART: Running Caliptra FMC ...
23,434,374 UART:
23,434,535 UART: [state] CFI Enabled
23,500,979 UART: [fht] FMC Alias Private Key: 7
25,841,120 UART: [art] Extend RT PCRs Done
25,842,339 UART: [art] Lock RT PCRs Done
25,844,284 UART: [art] Populate DV Done
25,849,687 UART: [fht] FMC Alias Private Key: 7
25,851,153 UART: [art] Derive CDI
25,852,076 UART: [art] Store in slot 0x4
25,909,201 UART: [art] Derive Key Pair
25,910,200 UART: [art] Store priv key in slot 0x5
29,203,192 UART: [art] Derive Key Pair - Done
29,216,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,504,453 UART: [art] Erasing AUTHORITY.KEYID = 7
31,505,977 UART: [art] PUB.X = B9A5799F1B49CA000C23017D7AFD43562598F37615A3CC7115395D3BD514DE999598BB8DB791A66C81F5483EE33D0A1C
31,513,159 UART: [art] PUB.Y = C62781FFEC93DFA6CB9F84D580307CA5CE8F9F4518A5A2B00D566286DB037354032831C7B03568E1B343558B555A91F9
31,520,430 UART: [art] SIG.R = 11B9EFC6BA54D361BD1E2BCBE7A635E9BBFD08CB47C8D90355285704F5423249C9A820B1BF5B78EE7BF87A5568F19C6E
31,527,895 UART: [art] SIG.S = 985669A3AF088F458C6353F1567130BCDF2CB269541C2A5CFBB22A49AE94A316E75E3172F766798DF1EBB1D0E13F12B0
32,833,136 UART: Caliptra RT
32,833,835 UART: [state] CFI Enabled
33,030,026 UART: [rt] RT listening for mailbox commands...
33,062,243 UART: [rt]cmd =0x44504543, len=96
33,093,858 >>> mbox cmd response data (56 bytes)
33,094,649 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,125,397 UART: [rt]cmd =0x44504543, len=92
38,876,827 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,962 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
12,873,820 >>> mbox cmd response data (12 bytes)
12,875,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,140,012 >>> mbox cmd response: success
18,140,504 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,822,115 UART:
23,822,494 UART: Running Caliptra FMC ...
23,823,761 UART:
23,823,931 UART: [state] CFI Enabled
23,874,802 UART: [fht] FMC Alias Private Key: 7
26,214,605 UART: [art] Extend RT PCRs Done
26,215,837 UART: [art] Lock RT PCRs Done
26,217,760 UART: [art] Populate DV Done
26,223,237 UART: [fht] FMC Alias Private Key: 7
26,224,905 UART: [art] Derive CDI
26,225,720 UART: [art] Store in slot 0x4
26,283,272 UART: [art] Derive Key Pair
26,284,310 UART: [art] Store priv key in slot 0x5
29,577,022 UART: [art] Derive Key Pair - Done
29,589,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,879,312 UART: [art] Erasing AUTHORITY.KEYID = 7
31,880,827 UART: [art] PUB.X = A77802EA66B92B7857ED55256A60C53811E4900E99072CF414591735F12D014E6D1EACC66BAC7A95E11D55BBBF000195
31,888,076 UART: [art] PUB.Y = 5DE07B24B2155EFA674025D910ED633C06D805DB85C1B91BCB6BBF060313DF622B17110863DD7D3917F993AFF29B10F6
31,895,281 UART: [art] SIG.R = 7BE7A6857559B1C46B47AA9261393FA49518B7609FED48FC080C4560CB4CE850C3E01BE7ACEDA900D8DA0EBBDB1C5FD4
31,902,678 UART: [art] SIG.S = 8F064CCF0AF3BE98056714D91BD0864CBE7AE3D4D04435441B1182A7F297F778F6A57CF94949BA290CAAF2F0DE6A9B90
33,207,775 UART: Caliptra RT
33,208,488 UART: [state] CFI Enabled
33,398,960 UART: [rt] RT listening for mailbox commands...
33,430,701 UART: [rt]cmd =0x44504543, len=92
39,191,012 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,087 writing to cptra_bootfsm_go
3,794,339 ready_for_fw is high
3,794,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,953,857 >>> mbox cmd response: success
17,954,286 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,637,570 UART:
23,637,943 UART: Running Caliptra FMC ...
23,638,986 UART:
23,639,144 UART: [state] CFI Enabled
23,708,235 UART: [fht] FMC Alias Private Key: 7
26,049,801 UART: [art] Extend RT PCRs Done
26,051,092 UART: [art] Lock RT PCRs Done
26,052,613 UART: [art] Populate DV Done
26,058,084 UART: [fht] FMC Alias Private Key: 7
26,059,569 UART: [art] Derive CDI
26,060,354 UART: [art] Store in slot 0x4
26,118,619 UART: [art] Derive Key Pair
26,119,658 UART: [art] Store priv key in slot 0x5
29,412,505 UART: [art] Derive Key Pair - Done
29,425,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,715,096 UART: [art] Erasing AUTHORITY.KEYID = 7
31,716,601 UART: [art] PUB.X = A77802EA66B92B7857ED55256A60C53811E4900E99072CF414591735F12D014E6D1EACC66BAC7A95E11D55BBBF000195
31,723,873 UART: [art] PUB.Y = 5DE07B24B2155EFA674025D910ED633C06D805DB85C1B91BCB6BBF060313DF622B17110863DD7D3917F993AFF29B10F6
31,731,110 UART: [art] SIG.R = 7BE7A6857559B1C46B47AA9261393FA49518B7609FED48FC080C4560CB4CE850C3E01BE7ACEDA900D8DA0EBBDB1C5FD4
31,738,494 UART: [art] SIG.S = 8F064CCF0AF3BE98056714D91BD0864CBE7AE3D4D04435441B1182A7F297F778F6A57CF94949BA290CAAF2F0DE6A9B90
33,043,795 UART: Caliptra RT
33,044,517 UART: [state] CFI Enabled
33,221,934 UART: [rt] RT listening for mailbox commands...
33,254,059 UART: [rt]cmd =0x4d454153, len=108
33,272,885 >>> mbox cmd response data (12 bytes)
33,273,376 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,303,660 UART: [rt]cmd =0x44504543, len=92
39,069,328 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,079 writing to cptra_bootfsm_go
3,774,728 ready_for_fw is high
3,775,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,946,905 >>> mbox cmd response: success
17,947,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,638,582 UART:
23,638,955 UART: Running Caliptra FMC ...
23,640,029 UART:
23,640,192 UART: [state] CFI Enabled
23,710,304 UART: [fht] FMC Alias Private Key: 7
26,050,624 UART: [art] Extend RT PCRs Done
26,051,847 UART: [art] Lock RT PCRs Done
26,053,392 UART: [art] Populate DV Done
26,058,988 UART: [fht] FMC Alias Private Key: 7
26,060,580 UART: [art] Derive CDI
26,061,401 UART: [art] Store in slot 0x4
26,118,695 UART: [art] Derive Key Pair
26,119,741 UART: [art] Store priv key in slot 0x5
29,412,339 UART: [art] Derive Key Pair - Done
29,425,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,714,892 UART: [art] Erasing AUTHORITY.KEYID = 7
31,716,400 UART: [art] PUB.X = A77802EA66B92B7857ED55256A60C53811E4900E99072CF414591735F12D014E6D1EACC66BAC7A95E11D55BBBF000195
31,723,592 UART: [art] PUB.Y = 5DE07B24B2155EFA674025D910ED633C06D805DB85C1B91BCB6BBF060313DF622B17110863DD7D3917F993AFF29B10F6
31,730,869 UART: [art] SIG.R = 7BE7A6857559B1C46B47AA9261393FA49518B7609FED48FC080C4560CB4CE850C3E01BE7ACEDA900D8DA0EBBDB1C5FD4
31,738,255 UART: [art] SIG.S = 8F064CCF0AF3BE98056714D91BD0864CBE7AE3D4D04435441B1182A7F297F778F6A57CF94949BA290CAAF2F0DE6A9B90
33,043,604 UART: Caliptra RT
33,044,300 UART: [state] CFI Enabled
33,219,967 UART: [rt] RT listening for mailbox commands...
33,251,834 UART: [rt]cmd =0x44504543, len=96
33,283,871 >>> mbox cmd response data (56 bytes)
33,284,637 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,315,044 UART: [rt]cmd =0x44504543, len=92
39,065,990 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.99s
Truncated 3992 bytes from beginning
EE5B2D241C0658C744D3C7FB6407
23,749,227 UART: [afmc] --
23,753,568 UART: [cold-reset] --
23,759,383 UART: [state] Locking Datavault
23,764,675 UART: [state] Locking PCR0, PCR1 and PCR31
23,766,418 UART: [state] Locking ICCM
23,769,211 UART: [exit] Launching FMC @ 0x40000130
23,777,600 UART:
23,777,838 UART: Running Caliptra FMC ...
23,778,934 UART:
23,779,085 UART: [state] CFI Enabled
23,786,920 UART: [fht] FMC Alias Private Key: 7
26,126,994 UART: [art] Extend RT PCRs Done
26,128,216 UART: [art] Lock RT PCRs Done
26,130,014 UART: [art] Populate DV Done
26,135,261 UART: [fht] FMC Alias Private Key: 7
26,136,844 UART: [art] Derive CDI
26,137,648 UART: [art] Store in slot 0x4
26,180,340 UART: [art] Derive Key Pair
26,181,552 UART: [art] Store priv key in slot 0x5
29,423,003 UART: [art] Derive Key Pair - Done
29,435,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,716,549 UART: [art] Erasing AUTHORITY.KEYID = 7
31,718,051 UART: [art] PUB.X = 0DCC96A2DFFB44E695FF87E1921EAE7DB325FFB8A4619FC251B8F1F44F346939B72D68E2C5B8EDEFD10B8894CBC3636C
31,725,347 UART: [art] PUB.Y = 0845C1254B077C75798110B8676A8637D45972DB7A5C75D556CA17545D30889655D9C3D3E24E7291179FB01243E786B9
31,732,562 UART: [art] SIG.R = 135715BDE292A8087C2ADEC927B65AAD5FB06713E99D685EB872408C821B68BA2801229D5D384C51DDD1460ABA71D1EB
31,739,934 UART: [art] SIG.S = 1504CDDC4E5085FBE0E56F49EE3E8B9A835D35F758B2F4F2559D7BC5034E2830F1543BA5C26958F189B0A9651537CA93
33,045,351 UART: Caliptra RT
33,046,063 UART: [state] CFI Enabled
33,190,962 UART: [rt] RT listening for mailbox commands...
33,223,123 UART: [rt]cmd =0x44504543, len=92
38,905,028 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,083 writing to cptra_bootfsm_go
190,215 UART:
190,524 UART: Running Caliptra ROM ...
191,631 UART:
1,600,461 UART: [state] CFI Enabled
1,614,036 UART: [state] LifecycleState = Unprovisioned
1,615,950 UART: [state] DebugLocked = No
1,618,889 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,622,926 UART: [kat] SHA2-256
1,792,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
1,803,202 UART: [kat] ++
1,803,651 UART: [kat] sha1
1,813,412 UART: [kat] SHA2-256
1,816,074 UART: [kat] SHA2-384
1,821,584 UART: [kat] SHA2-512-ACC
1,823,885 UART: [kat] ECC-384
4,107,083 UART: [kat] HMAC-384Kdf
4,119,022 UART: [kat] LMS
5,309,147 UART: [kat] --
5,315,869 UART: [cold-reset] ++
5,316,948 UART: [fht] Storing FHT @ 0x50003400
5,328,586 UART: [idev] ++
5,329,194 UART: [idev] CDI.KEYID = 6
5,330,110 UART: [idev] SUBJECT.KEYID = 7
5,331,358 UART: [idev] UDS.KEYID = 0
5,332,406 ready_for_fw is high
5,332,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,481,555 UART: [idev] Erasing UDS.KEYID = 0
8,618,817 UART: [idev] Using Sha1 for KeyId Algorithm
8,641,598 UART: [idev] --
8,644,458 UART: [ldev] ++
8,645,022 UART: [ldev] CDI.KEYID = 6
8,645,986 UART: [ldev] SUBJECT.KEYID = 5
8,647,191 UART: [ldev] AUTHORITY.KEYID = 7
8,648,490 UART: [ldev] FE.KEYID = 1
8,658,271 UART: [ldev] Erasing FE.KEYID = 1
11,947,758 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,240,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,254,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,269,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,284,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,302,226 UART: [ldev] --
14,307,496 UART: [fwproc] Waiting for Commands...
14,310,180 UART: [fwproc] Received command 0x46574c44
14,312,413 UART: [fwproc] Received Image of size 118548 bytes
18,417,603 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,491,351 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,564,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
18,892,422 >>> mbox cmd response: success
18,892,778 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,897,093 UART: [afmc] ++
18,897,676 UART: [afmc] CDI.KEYID = 6
18,898,690 UART: [afmc] SUBJECT.KEYID = 7
18,899,841 UART: [afmc] AUTHORITY.KEYID = 5
22,213,012 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,507,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,509,848 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,524,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,539,005 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,553,352 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,574,924 UART: [afmc] --
24,578,295 UART: [cold-reset] --
24,582,907 UART: [state] Locking Datavault
24,586,257 UART: [state] Locking PCR0, PCR1 and PCR31
24,588,002 UART: [state] Locking ICCM
24,589,339 UART: [exit] Launching FMC @ 0x40000130
24,597,746 UART:
24,597,980 UART: Running Caliptra FMC ...
24,599,071 UART:
24,599,224 UART: [state] CFI Enabled
24,607,381 UART: [fht] FMC Alias Private Key: 7
26,947,210 UART: [art] Extend RT PCRs Done
26,948,429 UART: [art] Lock RT PCRs Done
26,950,026 UART: [art] Populate DV Done
26,955,380 UART: [fht] FMC Alias Private Key: 7
26,956,964 UART: [art] Derive CDI
26,957,771 UART: [art] Store in slot 0x4
27,000,464 UART: [art] Derive Key Pair
27,001,465 UART: [art] Store priv key in slot 0x5
30,243,136 UART: [art] Derive Key Pair - Done
30,255,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,536,040 UART: [art] Erasing AUTHORITY.KEYID = 7
32,537,566 UART: [art] PUB.X = 0DCC96A2DFFB44E695FF87E1921EAE7DB325FFB8A4619FC251B8F1F44F346939B72D68E2C5B8EDEFD10B8894CBC3636C
32,544,860 UART: [art] PUB.Y = 0845C1254B077C75798110B8676A8637D45972DB7A5C75D556CA17545D30889655D9C3D3E24E7291179FB01243E786B9
32,552,090 UART: [art] SIG.R = 135715BDE292A8087C2ADEC927B65AAD5FB06713E99D685EB872408C821B68BA2801229D5D384C51DDD1460ABA71D1EB
32,559,471 UART: [art] SIG.S = 1504CDDC4E5085FBE0E56F49EE3E8B9A835D35F758B2F4F2559D7BC5034E2830F1543BA5C26958F189B0A9651537CA93
33,864,525 UART: Caliptra RT
33,865,226 UART: [state] CFI Enabled
33,997,745 UART: [rt] RT listening for mailbox commands...
34,030,025 UART: [rt]cmd =0x4d454153, len=108
34,049,212 >>> mbox cmd response data (12 bytes)
34,049,723 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,080,413 UART: [rt]cmd =0x44504543, len=92
39,761,867 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,035 writing to cptra_bootfsm_go
190,140 UART:
190,432 UART: Running Caliptra ROM ...
191,562 UART:
1,930,109 UART: [state] CFI Enabled
1,947,362 UART: [state] LifecycleState = Unprovisioned
1,949,239 UART: [state] DebugLocked = No
1,950,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
1,955,884 UART: [kat] SHA2-256
2,125,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,136,172 UART: [kat] ++
2,136,652 UART: [kat] sha1
2,149,241 UART: [kat] SHA2-256
2,151,962 UART: [kat] SHA2-384
2,158,527 UART: [kat] SHA2-512-ACC
2,160,901 UART: [kat] ECC-384
4,445,273 UART: [kat] HMAC-384Kdf
4,456,857 UART: [kat] LMS
5,646,936 UART: [kat] --
5,651,477 UART: [cold-reset] ++
5,653,482 UART: [fht] Storing FHT @ 0x50003400
5,665,676 UART: [idev] ++
5,666,237 UART: [idev] CDI.KEYID = 6
5,667,264 UART: [idev] SUBJECT.KEYID = 7
5,668,430 UART: [idev] UDS.KEYID = 0
5,669,468 ready_for_fw is high
5,669,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,818,452 UART: [idev] Erasing UDS.KEYID = 0
8,954,054 UART: [idev] Using Sha1 for KeyId Algorithm
8,976,241 UART: [idev] --
8,981,076 UART: [ldev] ++
8,981,652 UART: [ldev] CDI.KEYID = 6
8,982,610 UART: [ldev] SUBJECT.KEYID = 5
8,983,812 UART: [ldev] AUTHORITY.KEYID = 7
8,985,095 UART: [ldev] FE.KEYID = 1
8,994,355 UART: [ldev] Erasing FE.KEYID = 1
12,280,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
14,572,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
14,587,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
14,602,290 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
14,616,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
14,635,611 UART: [ldev] --
14,640,810 UART: [fwproc] Waiting for Commands...
14,643,061 UART: [fwproc] Received command 0x46574c44
14,645,239 UART: [fwproc] Received Image of size 118548 bytes
18,752,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
18,832,136 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
18,905,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,233,476 >>> mbox cmd response: success
19,233,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,238,101 UART: [afmc] ++
19,238,695 UART: [afmc] CDI.KEYID = 6
19,239,659 UART: [afmc] SUBJECT.KEYID = 7
19,240,864 UART: [afmc] AUTHORITY.KEYID = 5
22,557,226 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
24,847,006 UART: [afmc] Erasing AUTHORITY.KEYID = 5
24,849,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
24,863,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
24,878,443 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
24,892,836 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
24,914,722 UART: [afmc] --
24,918,588 UART: [cold-reset] --
24,922,496 UART: [state] Locking Datavault
24,927,625 UART: [state] Locking PCR0, PCR1 and PCR31
24,929,380 UART: [state] Locking ICCM
24,930,445 UART: [exit] Launching FMC @ 0x40000130
24,938,828 UART:
24,939,074 UART: Running Caliptra FMC ...
24,940,174 UART:
24,940,327 UART: [state] CFI Enabled
24,948,417 UART: [fht] FMC Alias Private Key: 7
27,288,892 UART: [art] Extend RT PCRs Done
27,290,114 UART: [art] Lock RT PCRs Done
27,291,626 UART: [art] Populate DV Done
27,297,194 UART: [fht] FMC Alias Private Key: 7
27,298,774 UART: [art] Derive CDI
27,299,537 UART: [art] Store in slot 0x4
27,342,008 UART: [art] Derive Key Pair
27,343,007 UART: [art] Store priv key in slot 0x5
30,584,820 UART: [art] Derive Key Pair - Done
30,598,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,878,498 UART: [art] Erasing AUTHORITY.KEYID = 7
32,879,989 UART: [art] PUB.X = 0DCC96A2DFFB44E695FF87E1921EAE7DB325FFB8A4619FC251B8F1F44F346939B72D68E2C5B8EDEFD10B8894CBC3636C
32,887,348 UART: [art] PUB.Y = 0845C1254B077C75798110B8676A8637D45972DB7A5C75D556CA17545D30889655D9C3D3E24E7291179FB01243E786B9
32,894,511 UART: [art] SIG.R = 135715BDE292A8087C2ADEC927B65AAD5FB06713E99D685EB872408C821B68BA2801229D5D384C51DDD1460ABA71D1EB
32,901,969 UART: [art] SIG.S = 1504CDDC4E5085FBE0E56F49EE3E8B9A835D35F758B2F4F2559D7BC5034E2830F1543BA5C26958F189B0A9651537CA93
34,207,220 UART: Caliptra RT
34,207,899 UART: [state] CFI Enabled
34,341,955 UART: [rt] RT listening for mailbox commands...
34,374,092 UART: [rt]cmd =0x44504543, len=96
34,405,891 >>> mbox cmd response data (56 bytes)
34,406,717 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,437,316 UART: [rt]cmd =0x44504543, len=92
40,118,735 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.06s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
4,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,047,819 >>> mbox cmd response data (12 bytes)
13,049,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,313,943 >>> mbox cmd response: success
18,314,414 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,957,017 UART:
23,957,397 UART: Running Caliptra FMC ...
23,958,641 UART:
23,958,801 UART: [state] CFI Enabled
23,966,668 UART: [fht] FMC Alias Private Key: 7
26,306,791 UART: [art] Extend RT PCRs Done
26,308,012 UART: [art] Lock RT PCRs Done
26,309,559 UART: [art] Populate DV Done
26,314,978 UART: [fht] FMC Alias Private Key: 7
26,316,695 UART: [art] Derive CDI
26,317,513 UART: [art] Store in slot 0x4
26,360,005 UART: [art] Derive Key Pair
26,361,010 UART: [art] Store priv key in slot 0x5
29,603,637 UART: [art] Derive Key Pair - Done
29,616,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,896,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,898,428 UART: [art] PUB.X = 4BD81E2809CAAF2617CD55F90A72BAC872CF50094EF5B4681FC75A286E33FB4DF49586D0B028501CD260CB63235F1DD7
31,905,730 UART: [art] PUB.Y = 0173B99A3BA700BEAF77253119A07FBEB8805B421148EAF9C933157E470DDAE0DD772F829EDE19D046C0BCC791406C70
31,912,951 UART: [art] SIG.R = F17BAEABB7B685496BDAEC7F014BACDE999322D43670E8A4C526E7796508447EE45AAD4DFCD897C5E9C55220FFADB0E8
31,920,357 UART: [art] SIG.S = A2429F2558D6D9612372AEF79005E19F4308D8A54CBD8F3D942B127F63CDAF841522AE85306D4E01BAAA5D745EF2FE0C
33,225,608 UART: Caliptra RT
33,226,323 UART: [state] CFI Enabled
33,371,594 UART: [rt] RT listening for mailbox commands...
33,403,601 UART: [rt]cmd =0x44504543, len=92
39,085,148 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,094 writing to cptra_bootfsm_go
4,929,647 ready_for_fw is high
4,930,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,957,508 >>> mbox cmd response: success
18,958,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
24,600,313 UART:
24,600,662 UART: Running Caliptra FMC ...
24,601,704 UART:
24,601,853 UART: [state] CFI Enabled
24,609,902 UART: [fht] FMC Alias Private Key: 7
26,950,253 UART: [art] Extend RT PCRs Done
26,951,570 UART: [art] Lock RT PCRs Done
26,952,955 UART: [art] Populate DV Done
26,958,642 UART: [fht] FMC Alias Private Key: 7
26,960,122 UART: [art] Derive CDI
26,960,871 UART: [art] Store in slot 0x4
27,003,675 UART: [art] Derive Key Pair
27,004,676 UART: [art] Store priv key in slot 0x5
30,247,135 UART: [art] Derive Key Pair - Done
30,260,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,540,603 UART: [art] Erasing AUTHORITY.KEYID = 7
32,542,112 UART: [art] PUB.X = 4BD81E2809CAAF2617CD55F90A72BAC872CF50094EF5B4681FC75A286E33FB4DF49586D0B028501CD260CB63235F1DD7
32,549,364 UART: [art] PUB.Y = 0173B99A3BA700BEAF77253119A07FBEB8805B421148EAF9C933157E470DDAE0DD772F829EDE19D046C0BCC791406C70
32,556,639 UART: [art] SIG.R = F17BAEABB7B685496BDAEC7F014BACDE999322D43670E8A4C526E7796508447EE45AAD4DFCD897C5E9C55220FFADB0E8
32,564,039 UART: [art] SIG.S = A2429F2558D6D9612372AEF79005E19F4308D8A54CBD8F3D942B127F63CDAF841522AE85306D4E01BAAA5D745EF2FE0C
33,869,746 UART: Caliptra RT
33,870,448 UART: [state] CFI Enabled
34,003,564 UART: [rt] RT listening for mailbox commands...
34,035,959 UART: [rt]cmd =0x4d454153, len=108
34,054,676 >>> mbox cmd response data (12 bytes)
34,055,182 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,085,474 UART: [rt]cmd =0x44504543, len=92
39,767,026 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,061 writing to cptra_bootfsm_go
5,263,776 ready_for_fw is high
5,264,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,296,835 >>> mbox cmd response: success
19,297,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,941,439 UART:
24,941,781 UART: Running Caliptra FMC ...
24,942,854 UART:
24,943,008 UART: [state] CFI Enabled
24,951,504 UART: [fht] FMC Alias Private Key: 7
27,291,185 UART: [art] Extend RT PCRs Done
27,292,412 UART: [art] Lock RT PCRs Done
27,294,038 UART: [art] Populate DV Done
27,299,683 UART: [fht] FMC Alias Private Key: 7
27,301,157 UART: [art] Derive CDI
27,302,077 UART: [art] Store in slot 0x4
27,344,731 UART: [art] Derive Key Pair
27,345,775 UART: [art] Store priv key in slot 0x5
30,588,258 UART: [art] Derive Key Pair - Done
30,601,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
32,881,212 UART: [art] Erasing AUTHORITY.KEYID = 7
32,882,721 UART: [art] PUB.X = 4BD81E2809CAAF2617CD55F90A72BAC872CF50094EF5B4681FC75A286E33FB4DF49586D0B028501CD260CB63235F1DD7
32,889,972 UART: [art] PUB.Y = 0173B99A3BA700BEAF77253119A07FBEB8805B421148EAF9C933157E470DDAE0DD772F829EDE19D046C0BCC791406C70
32,897,256 UART: [art] SIG.R = F17BAEABB7B685496BDAEC7F014BACDE999322D43670E8A4C526E7796508447EE45AAD4DFCD897C5E9C55220FFADB0E8
32,904,640 UART: [art] SIG.S = A2429F2558D6D9612372AEF79005E19F4308D8A54CBD8F3D942B127F63CDAF841522AE85306D4E01BAAA5D745EF2FE0C
34,209,653 UART: Caliptra RT
34,210,359 UART: [state] CFI Enabled
34,343,040 UART: [rt] RT listening for mailbox commands...
34,375,256 UART: [rt]cmd =0x44504543, len=96
34,407,426 >>> mbox cmd response data (56 bytes)
34,408,220 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,438,709 UART: [rt]cmd =0x44504543, len=92
40,119,410 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 6.07s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
18,796,032 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,820,761 UART: [afmc] --
18,825,262 UART: [cold-reset] --
18,830,069 UART: [state] Locking Datavault
18,834,327 UART: [state] Locking PCR0, PCR1 and PCR31
18,836,085 UART: [state] Locking ICCM
18,837,508 UART: [exit] Launching FMC @ 0x40000130
18,845,948 UART:
18,846,190 UART: Running Caliptra FMC ...
18,847,290 UART:
18,847,449 UART: [state] CFI Enabled
18,904,157 UART: [fht] FMC Alias Private Key: 7
20,670,914 UART: [art] Extend RT PCRs Done
20,672,133 UART: [art] Lock RT PCRs Done
20,673,867 UART: [art] Populate DV Done
20,679,273 UART: [fht] FMC Alias Private Key: 7
20,680,857 UART: [art] Derive CDI
20,681,667 UART: [art] Store in slot 0x4
20,736,629 UART: [art] Derive Key Pair
20,737,640 UART: [art] Store priv key in slot 0x5
23,200,975 UART: [art] Derive Key Pair - Done
23,213,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,926,035 UART: [art] Erasing AUTHORITY.KEYID = 7
24,927,525 UART: [art] PUB.X = 0DA1C7810DDA161880FAD403186051DE2EB0FD4797A15BF046671809AFA2380A390471DC0C5A8F18AD14390BFE9BD763
24,934,765 UART: [art] PUB.Y = 1FCF41BF729F3024A8BE6A60308010098D9837F997DAF87DDE4AEE902758A9554D5BB432B2EA7F558A7D7E12E5D55D4C
24,942,048 UART: [art] SIG.R = 6403F260F98DAB8443027CB9B7ED4AECED7E3558FA30627449DFC3A28CB09912BFAAF8BEE7C950C160BB9A4371686AFD
24,949,443 UART: [art] SIG.S = 863089D73FDFED8AD922A146B2CE66E3D06E48A8EBDF39CAB60F849CE3C279A57EFD83835059DF5A5A51AD25BD3CB2C8
25,927,970 UART: Caliptra RT
25,928,675 UART: [state] CFI Enabled
26,121,104 UART: [rt] RT listening for mailbox commands...
26,153,283 UART: [rt]cmd =0x44504543, len=92
30,507,525 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
190,238 UART:
190,549 UART: Running Caliptra ROM ...
191,574 UART:
191,712 UART: [state] CFI Enabled
249,422 UART: [state] LifecycleState = Unprovisioned
251,350 UART: [state] DebugLocked = No
253,011 UART: [state] WD Timer not started. Device not locked for debugging
256,866 UART: [kat] SHA2-256
436,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,349 UART: [kat] ++
447,793 UART: [kat] sha1
459,246 UART: [kat] SHA2-256
462,011 UART: [kat] SHA2-384
467,373 UART: [kat] SHA2-512-ACC
469,739 UART: [kat] ECC-384
2,914,331 UART: [kat] HMAC-384Kdf
2,937,794 UART: [kat] LMS
3,414,272 UART: [kat] --
3,419,905 UART: [cold-reset] ++
3,420,909 UART: [fht] FHT @ 0x50003400
3,432,661 UART: [idev] ++
3,433,228 UART: [idev] CDI.KEYID = 6
3,434,259 UART: [idev] SUBJECT.KEYID = 7
3,435,429 UART: [idev] UDS.KEYID = 0
3,436,354 ready_for_fw is high
3,436,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,585,517 UART: [idev] Erasing UDS.KEYID = 0
5,954,417 UART: [idev] Sha1 KeyId Algorithm
5,977,800 UART: [idev] --
5,982,474 UART: [ldev] ++
5,983,048 UART: [ldev] CDI.KEYID = 6
5,984,069 UART: [ldev] SUBJECT.KEYID = 5
5,985,168 UART: [ldev] AUTHORITY.KEYID = 7
5,986,472 UART: [ldev] FE.KEYID = 1
6,024,604 UART: [ldev] Erasing FE.KEYID = 1
8,533,374 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,265,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,281,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,297,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,312,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,335,178 UART: [ldev] --
10,340,816 UART: [fwproc] Wait for Commands...
10,343,823 UART: [fwproc] Recv command 0x46574c44
10,345,857 UART: [fwproc] Recv'd Img size: 118548 bytes
13,828,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,981,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,309,351 >>> mbox cmd response: success
14,309,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,312,644 UART: [afmc] ++
14,313,218 UART: [afmc] CDI.KEYID = 6
14,314,180 UART: [afmc] SUBJECT.KEYID = 7
14,315,386 UART: [afmc] AUTHORITY.KEYID = 5
16,846,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,587,006 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,589,242 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,605,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,621,068 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,636,635 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,662,656 UART: [afmc] --
18,665,761 UART: [cold-reset] --
18,670,430 UART: [state] Locking Datavault
18,677,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,678,835 UART: [state] Locking ICCM
18,681,119 UART: [exit] Launching FMC @ 0x40000130
18,689,527 UART:
18,689,761 UART: Running Caliptra FMC ...
18,690,856 UART:
18,691,009 UART: [state] CFI Enabled
18,743,888 UART: [fht] FMC Alias Private Key: 7
20,510,237 UART: [art] Extend RT PCRs Done
20,511,449 UART: [art] Lock RT PCRs Done
20,513,337 UART: [art] Populate DV Done
20,518,694 UART: [fht] FMC Alias Private Key: 7
20,520,177 UART: [art] Derive CDI
20,520,932 UART: [art] Store in slot 0x4
20,576,543 UART: [art] Derive Key Pair
20,577,573 UART: [art] Store priv key in slot 0x5
23,040,554 UART: [art] Derive Key Pair - Done
23,053,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,766,288 UART: [art] Erasing AUTHORITY.KEYID = 7
24,767,818 UART: [art] PUB.X = 0DA1C7810DDA161880FAD403186051DE2EB0FD4797A15BF046671809AFA2380A390471DC0C5A8F18AD14390BFE9BD763
24,775,095 UART: [art] PUB.Y = 1FCF41BF729F3024A8BE6A60308010098D9837F997DAF87DDE4AEE902758A9554D5BB432B2EA7F558A7D7E12E5D55D4C
24,782,297 UART: [art] SIG.R = 6403F260F98DAB8443027CB9B7ED4AECED7E3558FA30627449DFC3A28CB09912BFAAF8BEE7C950C160BB9A4371686AFD
24,789,740 UART: [art] SIG.S = 863089D73FDFED8AD922A146B2CE66E3D06E48A8EBDF39CAB60F849CE3C279A57EFD83835059DF5A5A51AD25BD3CB2C8
25,768,385 UART: Caliptra RT
25,769,070 UART: [state] CFI Enabled
25,950,764 UART: [rt] RT listening for mailbox commands...
25,983,067 UART: [rt]cmd =0x4d454153, len=108
26,001,869 >>> mbox cmd response data (12 bytes)
26,002,411 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,033,050 UART: [rt]cmd =0x44504543, len=92
30,392,534 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,049 writing to cptra_bootfsm_go
190,113 UART:
190,404 UART: Running Caliptra ROM ...
191,609 UART:
191,788 UART: [state] CFI Enabled
253,741 UART: [state] LifecycleState = Unprovisioned
255,633 UART: [state] DebugLocked = No
257,288 UART: [state] WD Timer not started. Device not locked for debugging
261,199 UART: [kat] SHA2-256
440,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
451,686 UART: [kat] ++
452,131 UART: [kat] sha1
464,064 UART: [kat] SHA2-256
466,786 UART: [kat] SHA2-384
473,124 UART: [kat] SHA2-512-ACC
475,487 UART: [kat] ECC-384
2,934,484 UART: [kat] HMAC-384Kdf
2,957,650 UART: [kat] LMS
3,434,113 UART: [kat] --
3,437,767 UART: [cold-reset] ++
3,438,923 UART: [fht] FHT @ 0x50003400
3,450,741 UART: [idev] ++
3,451,364 UART: [idev] CDI.KEYID = 6
3,452,241 UART: [idev] SUBJECT.KEYID = 7
3,453,555 UART: [idev] UDS.KEYID = 0
3,454,477 ready_for_fw is high
3,454,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,603,604 UART: [idev] Erasing UDS.KEYID = 0
5,972,814 UART: [idev] Sha1 KeyId Algorithm
5,996,808 UART: [idev] --
6,002,208 UART: [ldev] ++
6,002,777 UART: [ldev] CDI.KEYID = 6
6,003,751 UART: [ldev] SUBJECT.KEYID = 5
6,004,910 UART: [ldev] AUTHORITY.KEYID = 7
6,006,194 UART: [ldev] FE.KEYID = 1
6,043,432 UART: [ldev] Erasing FE.KEYID = 1
8,549,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,283,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,299,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,315,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,330,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,352,236 UART: [ldev] --
10,357,916 UART: [fwproc] Wait for Commands...
10,360,620 UART: [fwproc] Recv command 0x46574c44
10,362,608 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,321,779 >>> mbox cmd response: success
14,322,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,326,157 UART: [afmc] ++
14,326,753 UART: [afmc] CDI.KEYID = 6
14,327,719 UART: [afmc] SUBJECT.KEYID = 7
14,328,931 UART: [afmc] AUTHORITY.KEYID = 5
16,860,432 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,601,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,603,607 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,619,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,635,479 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,651,050 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,676,008 UART: [afmc] --
18,679,751 UART: [cold-reset] --
18,683,507 UART: [state] Locking Datavault
18,689,621 UART: [state] Locking PCR0, PCR1 and PCR31
18,691,369 UART: [state] Locking ICCM
18,692,542 UART: [exit] Launching FMC @ 0x40000130
18,700,984 UART:
18,701,233 UART: Running Caliptra FMC ...
18,702,331 UART:
18,702,492 UART: [state] CFI Enabled
18,758,175 UART: [fht] FMC Alias Private Key: 7
20,525,060 UART: [art] Extend RT PCRs Done
20,526,276 UART: [art] Lock RT PCRs Done
20,527,847 UART: [art] Populate DV Done
20,533,577 UART: [fht] FMC Alias Private Key: 7
20,535,109 UART: [art] Derive CDI
20,535,919 UART: [art] Store in slot 0x4
20,590,013 UART: [art] Derive Key Pair
20,591,010 UART: [art] Store priv key in slot 0x5
23,053,617 UART: [art] Derive Key Pair - Done
23,067,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,756 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,259 UART: [art] PUB.X = 0DA1C7810DDA161880FAD403186051DE2EB0FD4797A15BF046671809AFA2380A390471DC0C5A8F18AD14390BFE9BD763
24,787,531 UART: [art] PUB.Y = 1FCF41BF729F3024A8BE6A60308010098D9837F997DAF87DDE4AEE902758A9554D5BB432B2EA7F558A7D7E12E5D55D4C
24,794,766 UART: [art] SIG.R = 6403F260F98DAB8443027CB9B7ED4AECED7E3558FA30627449DFC3A28CB09912BFAAF8BEE7C950C160BB9A4371686AFD
24,802,205 UART: [art] SIG.S = 863089D73FDFED8AD922A146B2CE66E3D06E48A8EBDF39CAB60F849CE3C279A57EFD83835059DF5A5A51AD25BD3CB2C8
25,780,703 UART: Caliptra RT
25,781,394 UART: [state] CFI Enabled
25,961,375 UART: [rt] RT listening for mailbox commands...
25,993,771 UART: [rt]cmd =0x44504543, len=96
26,025,113 >>> mbox cmd response data (56 bytes)
26,025,966 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,056,467 UART: [rt]cmd =0x44504543, len=92
30,403,124 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,293,326 >>> mbox cmd response data (12 bytes)
10,294,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,399,447 >>> mbox cmd response: success
14,399,944 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,689,236 UART:
18,689,640 UART: Running Caliptra FMC ...
18,690,837 UART:
18,691,001 UART: [state] CFI Enabled
18,756,853 UART: [fht] FMC Alias Private Key: 7
20,523,527 UART: [art] Extend RT PCRs Done
20,524,746 UART: [art] Lock RT PCRs Done
20,526,097 UART: [art] Populate DV Done
20,531,682 UART: [fht] FMC Alias Private Key: 7
20,533,275 UART: [art] Derive CDI
20,534,010 UART: [art] Store in slot 0x4
20,589,916 UART: [art] Derive Key Pair
20,590,954 UART: [art] Store priv key in slot 0x5
23,053,506 UART: [art] Derive Key Pair - Done
23,066,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,780,320 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,828 UART: [art] PUB.X = 04E238E6FBD495288A127BBDDA6E8EA39E055E510A219786722C0A19364A40CE6D97C96BDFF66A1C86941A0422309F04
24,789,079 UART: [art] PUB.Y = 448305DF6E32D27EB33D8ABB978413239B2300B1707AB70D6B82D20C564B37D207F940429E3FA748FC435170A09BEC08
24,796,314 UART: [art] SIG.R = 4A6F4210299619ECDEA178343881AEB09D3ADAFDE2A9FFAA28DF95C15DAAC2B80086F59967BF13139186352119724C4B
24,803,654 UART: [art] SIG.S = 838AF52DEE56184A9B7536234A7A90ADA1F175E810BE0109A82BAA30052DDCF7507AAED0D7E1D7D2E9D92A5EA36F253E
25,782,886 UART: Caliptra RT
25,783,589 UART: [state] CFI Enabled
25,975,355 UART: [rt] RT listening for mailbox commands...
26,007,529 UART: [rt]cmd =0x44504543, len=92
30,362,815 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,057 writing to cptra_bootfsm_go
3,449,662 ready_for_fw is high
3,450,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,200,261 >>> mbox cmd response: success
14,200,684 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
18,478,589 UART:
18,479,226 UART: Running Caliptra FMC ...
18,480,271 UART:
18,480,444 UART: [state] CFI Enabled
18,546,670 UART: [fht] FMC Alias Private Key: 7
20,313,575 UART: [art] Extend RT PCRs Done
20,314,918 UART: [art] Lock RT PCRs Done
20,316,350 UART: [art] Populate DV Done
20,321,984 UART: [fht] FMC Alias Private Key: 7
20,323,472 UART: [art] Derive CDI
20,324,205 UART: [art] Store in slot 0x4
20,379,979 UART: [art] Derive Key Pair
20,381,048 UART: [art] Store priv key in slot 0x5
22,844,139 UART: [art] Derive Key Pair - Done
22,857,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,569,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,571,091 UART: [art] PUB.X = 04E238E6FBD495288A127BBDDA6E8EA39E055E510A219786722C0A19364A40CE6D97C96BDFF66A1C86941A0422309F04
24,578,338 UART: [art] PUB.Y = 448305DF6E32D27EB33D8ABB978413239B2300B1707AB70D6B82D20C564B37D207F940429E3FA748FC435170A09BEC08
24,585,573 UART: [art] SIG.R = 4A6F4210299619ECDEA178343881AEB09D3ADAFDE2A9FFAA28DF95C15DAAC2B80086F59967BF13139186352119724C4B
24,592,972 UART: [art] SIG.S = 838AF52DEE56184A9B7536234A7A90ADA1F175E810BE0109A82BAA30052DDCF7507AAED0D7E1D7D2E9D92A5EA36F253E
25,571,338 UART: Caliptra RT
25,572,052 UART: [state] CFI Enabled
25,752,762 UART: [rt] RT listening for mailbox commands...
25,784,869 UART: [rt]cmd =0x4d454153, len=108
25,802,801 >>> mbox cmd response data (12 bytes)
25,803,405 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,833,851 UART: [rt]cmd =0x44504543, len=92
30,194,112 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,090 writing to cptra_bootfsm_go
3,424,580 ready_for_fw is high
3,424,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,505 >>> mbox cmd response: success
14,218,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,504,047 UART:
18,504,392 UART: Running Caliptra FMC ...
18,505,461 UART:
18,505,619 UART: [state] CFI Enabled
18,571,573 UART: [fht] FMC Alias Private Key: 7
20,338,282 UART: [art] Extend RT PCRs Done
20,339,502 UART: [art] Lock RT PCRs Done
20,340,967 UART: [art] Populate DV Done
20,346,271 UART: [fht] FMC Alias Private Key: 7
20,347,872 UART: [art] Derive CDI
20,348,706 UART: [art] Store in slot 0x4
20,404,370 UART: [art] Derive Key Pair
20,405,410 UART: [art] Store priv key in slot 0x5
22,868,267 UART: [art] Derive Key Pair - Done
22,881,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,593,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,595,308 UART: [art] PUB.X = 04E238E6FBD495288A127BBDDA6E8EA39E055E510A219786722C0A19364A40CE6D97C96BDFF66A1C86941A0422309F04
24,602,636 UART: [art] PUB.Y = 448305DF6E32D27EB33D8ABB978413239B2300B1707AB70D6B82D20C564B37D207F940429E3FA748FC435170A09BEC08
24,609,833 UART: [art] SIG.R = 4A6F4210299619ECDEA178343881AEB09D3ADAFDE2A9FFAA28DF95C15DAAC2B80086F59967BF13139186352119724C4B
24,617,170 UART: [art] SIG.S = 838AF52DEE56184A9B7536234A7A90ADA1F175E810BE0109A82BAA30052DDCF7507AAED0D7E1D7D2E9D92A5EA36F253E
25,596,192 UART: Caliptra RT
25,596,879 UART: [state] CFI Enabled
25,774,852 UART: [rt] RT listening for mailbox commands...
25,806,831 UART: [rt]cmd =0x44504543, len=96
25,838,602 >>> mbox cmd response data (56 bytes)
25,839,405 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,869,851 UART: [rt]cmd =0x44504543, len=92
30,216,277 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.66s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,005,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,640 UART: [afmc] --
19,033,241 UART: [cold-reset] --
19,035,857 UART: [state] Locking Datavault
19,039,700 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,459 UART: [state] Locking ICCM
19,042,829 UART: [exit] Launching FMC @ 0x40000130
19,051,251 UART:
19,051,493 UART: Running Caliptra FMC ...
19,052,600 UART:
19,052,764 UART: [state] CFI Enabled
19,060,873 UART: [fht] FMC Alias Private Key: 7
20,826,950 UART: [art] Extend RT PCRs Done
20,828,171 UART: [art] Lock RT PCRs Done
20,830,076 UART: [art] Populate DV Done
20,835,222 UART: [fht] FMC Alias Private Key: 7
20,836,898 UART: [art] Derive CDI
20,837,671 UART: [art] Store in slot 0x4
20,880,322 UART: [art] Derive Key Pair
20,881,318 UART: [art] Store priv key in slot 0x5
23,307,745 UART: [art] Derive Key Pair - Done
23,320,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,027,139 UART: [art] Erasing AUTHORITY.KEYID = 7
25,028,796 UART: [art] PUB.X = 2693D36AC0655302C222F3DC989017C4C0A5D8645D053577BDAC196EDCF5BB0A196912F50227DAA905CA514F62AF2ADC
25,035,948 UART: [art] PUB.Y = 0750A4A8812670815E51703E7EDB7D8E118BA008B8866C71334F8B3CCC136FC35121B5CB7BD0F3480C4F20D796493846
25,043,181 UART: [art] SIG.R = 9F37FA7C6B923E123129F9AD611F1346D81FCF752355E6C5EE90B445AD4478BC4CD38558367A781461A06294FBA1AA96
25,050,577 UART: [art] SIG.S = C2536A67520EF36C14E50A2290D6DEEE21363F2131D387A391CCCEDA1D76E7C311745F8C084B7773065BA777CF86FBCA
26,029,582 UART: Caliptra RT
26,030,307 UART: [state] CFI Enabled
26,174,409 UART: [rt] RT listening for mailbox commands...
26,206,700 UART: [rt]cmd =0x44504543, len=92
30,499,690 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,099 writing to cptra_bootfsm_go
190,231 UART:
190,525 UART: Running Caliptra ROM ...
191,556 UART:
10,000,946 UART: [state] CFI Enabled
10,017,085 UART: [state] LifecycleState = Unprovisioned
10,019,032 UART: [state] DebugLocked = No
10,021,220 UART: [state] WD Timer not started. Device not locked for debugging
10,025,800 UART: [kat] SHA2-256
10,205,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,216,199 UART: [kat] ++
10,216,655 UART: [kat] sha1
10,227,320 UART: [kat] SHA2-256
10,230,020 UART: [kat] SHA2-384
10,235,893 UART: [kat] SHA2-512-ACC
10,238,209 UART: [kat] ECC-384
12,683,379 UART: [kat] HMAC-384Kdf
12,697,304 UART: [kat] LMS
13,173,762 UART: [kat] --
13,178,041 UART: [cold-reset] ++
13,179,688 UART: [fht] FHT @ 0x50003400
13,191,103 UART: [idev] ++
13,191,721 UART: [idev] CDI.KEYID = 6
13,192,640 UART: [idev] SUBJECT.KEYID = 7
13,193,887 UART: [idev] UDS.KEYID = 0
13,194,811 ready_for_fw is high
13,195,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,343,653 UART: [idev] Erasing UDS.KEYID = 0
15,671,402 UART: [idev] Sha1 KeyId Algorithm
15,694,796 UART: [idev] --
15,700,195 UART: [ldev] ++
15,700,762 UART: [ldev] CDI.KEYID = 6
15,701,701 UART: [ldev] SUBJECT.KEYID = 5
15,702,916 UART: [ldev] AUTHORITY.KEYID = 7
15,704,072 UART: [ldev] FE.KEYID = 1
15,715,207 UART: [ldev] Erasing FE.KEYID = 1
18,188,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,909,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,925,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,940,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,956,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,978,358 UART: [ldev] --
19,983,943 UART: [fwproc] Wait for Commands...
19,985,551 UART: [fwproc] Recv command 0x46574c44
19,987,506 UART: [fwproc] Recv'd Img size: 118548 bytes
23,477,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,552,568 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,625,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,954,119 >>> mbox cmd response: success
23,954,494 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,958,849 UART: [afmc] ++
23,959,426 UART: [afmc] CDI.KEYID = 6
23,960,389 UART: [afmc] SUBJECT.KEYID = 7
23,961,626 UART: [afmc] AUTHORITY.KEYID = 5
26,464,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,186,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,188,626 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,204,445 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,220,525 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,236,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,261,587 UART: [afmc] --
28,266,043 UART: [cold-reset] --
28,268,772 UART: [state] Locking Datavault
28,273,747 UART: [state] Locking PCR0, PCR1 and PCR31
28,275,499 UART: [state] Locking ICCM
28,276,600 UART: [exit] Launching FMC @ 0x40000130
28,284,997 UART:
28,285,236 UART: Running Caliptra FMC ...
28,286,338 UART:
28,286,499 UART: [state] CFI Enabled
28,294,893 UART: [fht] FMC Alias Private Key: 7
30,061,360 UART: [art] Extend RT PCRs Done
30,062,588 UART: [art] Lock RT PCRs Done
30,064,382 UART: [art] Populate DV Done
30,069,853 UART: [fht] FMC Alias Private Key: 7
30,071,537 UART: [art] Derive CDI
30,072,365 UART: [art] Store in slot 0x4
30,115,133 UART: [art] Derive Key Pair
30,116,136 UART: [art] Store priv key in slot 0x5
32,542,344 UART: [art] Derive Key Pair - Done
32,555,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,261,950 UART: [art] Erasing AUTHORITY.KEYID = 7
34,263,456 UART: [art] PUB.X = 2693D36AC0655302C222F3DC989017C4C0A5D8645D053577BDAC196EDCF5BB0A196912F50227DAA905CA514F62AF2ADC
34,270,705 UART: [art] PUB.Y = 0750A4A8812670815E51703E7EDB7D8E118BA008B8866C71334F8B3CCC136FC35121B5CB7BD0F3480C4F20D796493846
34,277,992 UART: [art] SIG.R = 9F37FA7C6B923E123129F9AD611F1346D81FCF752355E6C5EE90B445AD4478BC4CD38558367A781461A06294FBA1AA96
34,285,330 UART: [art] SIG.S = C2536A67520EF36C14E50A2290D6DEEE21363F2131D387A391CCCEDA1D76E7C311745F8C084B7773065BA777CF86FBCA
35,264,054 UART: Caliptra RT
35,264,777 UART: [state] CFI Enabled
35,398,353 UART: [rt] RT listening for mailbox commands...
35,430,303 UART: [rt]cmd =0x4d454153, len=108
35,448,991 >>> mbox cmd response data (12 bytes)
35,449,566 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,480,155 UART: [rt]cmd =0x44504543, len=92
39,773,031 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,054 writing to cptra_bootfsm_go
190,130 UART:
190,429 UART: Running Caliptra ROM ...
191,491 UART:
10,323,229 UART: [state] CFI Enabled
10,337,166 UART: [state] LifecycleState = Unprovisioned
10,339,083 UART: [state] DebugLocked = No
10,341,712 UART: [state] WD Timer not started. Device not locked for debugging
10,346,258 UART: [kat] SHA2-256
10,525,942 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,536,714 UART: [kat] ++
10,537,197 UART: [kat] sha1
10,547,798 UART: [kat] SHA2-256
10,550,533 UART: [kat] SHA2-384
10,555,620 UART: [kat] SHA2-512-ACC
10,558,002 UART: [kat] ECC-384
12,997,394 UART: [kat] HMAC-384Kdf
13,010,685 UART: [kat] LMS
13,487,237 UART: [kat] --
13,492,864 UART: [cold-reset] ++
13,495,219 UART: [fht] FHT @ 0x50003400
13,507,617 UART: [idev] ++
13,508,260 UART: [idev] CDI.KEYID = 6
13,509,189 UART: [idev] SUBJECT.KEYID = 7
13,510,440 UART: [idev] UDS.KEYID = 0
13,511,367 ready_for_fw is high
13,511,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,660,324 UART: [idev] Erasing UDS.KEYID = 0
15,992,453 UART: [idev] Sha1 KeyId Algorithm
16,014,990 UART: [idev] --
16,019,530 UART: [ldev] ++
16,020,095 UART: [ldev] CDI.KEYID = 6
16,021,035 UART: [ldev] SUBJECT.KEYID = 5
16,022,252 UART: [ldev] AUTHORITY.KEYID = 7
16,023,484 UART: [ldev] FE.KEYID = 1
16,033,960 UART: [ldev] Erasing FE.KEYID = 1
18,515,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
20,234,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
20,250,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
20,266,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
20,282,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
20,304,552 UART: [ldev] --
20,310,789 UART: [fwproc] Wait for Commands...
20,312,563 UART: [fwproc] Recv command 0x46574c44
20,314,556 UART: [fwproc] Recv'd Img size: 118548 bytes
23,795,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,875,531 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,948,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,276,432 >>> mbox cmd response: success
24,276,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,281,393 UART: [afmc] ++
24,282,027 UART: [afmc] CDI.KEYID = 6
24,282,916 UART: [afmc] SUBJECT.KEYID = 7
24,284,185 UART: [afmc] AUTHORITY.KEYID = 5
26,785,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,507,941 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,510,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,525,961 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,542,029 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,557,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,582,287 UART: [afmc] --
28,586,591 UART: [cold-reset] --
28,592,715 UART: [state] Locking Datavault
28,598,672 UART: [state] Locking PCR0, PCR1 and PCR31
28,600,432 UART: [state] Locking ICCM
28,602,367 UART: [exit] Launching FMC @ 0x40000130
28,610,823 UART:
28,611,067 UART: Running Caliptra FMC ...
28,612,173 UART:
28,612,333 UART: [state] CFI Enabled
28,620,547 UART: [fht] FMC Alias Private Key: 7
30,387,248 UART: [art] Extend RT PCRs Done
30,388,476 UART: [art] Lock RT PCRs Done
30,390,669 UART: [art] Populate DV Done
30,396,135 UART: [fht] FMC Alias Private Key: 7
30,397,670 UART: [art] Derive CDI
30,398,406 UART: [art] Store in slot 0x4
30,441,161 UART: [art] Derive Key Pair
30,442,204 UART: [art] Store priv key in slot 0x5
32,868,884 UART: [art] Derive Key Pair - Done
32,881,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,588,300 UART: [art] Erasing AUTHORITY.KEYID = 7
34,589,788 UART: [art] PUB.X = 2693D36AC0655302C222F3DC989017C4C0A5D8645D053577BDAC196EDCF5BB0A196912F50227DAA905CA514F62AF2ADC
34,597,083 UART: [art] PUB.Y = 0750A4A8812670815E51703E7EDB7D8E118BA008B8866C71334F8B3CCC136FC35121B5CB7BD0F3480C4F20D796493846
34,604,314 UART: [art] SIG.R = 9F37FA7C6B923E123129F9AD611F1346D81FCF752355E6C5EE90B445AD4478BC4CD38558367A781461A06294FBA1AA96
34,611,706 UART: [art] SIG.S = C2536A67520EF36C14E50A2290D6DEEE21363F2131D387A391CCCEDA1D76E7C311745F8C084B7773065BA777CF86FBCA
35,590,326 UART: Caliptra RT
35,591,064 UART: [state] CFI Enabled
35,724,785 UART: [rt] RT listening for mailbox commands...
35,756,470 UART: [rt]cmd =0x44504543, len=96
35,788,316 >>> mbox cmd response data (56 bytes)
35,789,217 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,819,754 UART: [rt]cmd =0x44504543, len=92
40,111,944 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
4,287 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,496,172 >>> mbox cmd response data (12 bytes)
10,497,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,597,141 >>> mbox cmd response: success
14,597,616 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,845,100 UART:
18,845,496 UART: Running Caliptra FMC ...
18,846,657 UART:
18,846,835 UART: [state] CFI Enabled
18,854,949 UART: [fht] FMC Alias Private Key: 7
20,621,025 UART: [art] Extend RT PCRs Done
20,622,255 UART: [art] Lock RT PCRs Done
20,623,851 UART: [art] Populate DV Done
20,629,316 UART: [fht] FMC Alias Private Key: 7
20,630,859 UART: [art] Derive CDI
20,631,592 UART: [art] Store in slot 0x4
20,673,927 UART: [art] Derive Key Pair
20,674,965 UART: [art] Store priv key in slot 0x5
23,102,169 UART: [art] Derive Key Pair - Done
23,114,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,170 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,669 UART: [art] PUB.X = 4B9672377DE1E1EA73CF7678C25118AB4AEA749DBAAC0EC7B0B973E54D1082F20D128C69A1AA791870E31F9C8C8E3C13
24,829,927 UART: [art] PUB.Y = CB4BF92B77CA77CD4F7596483FB4529B6CE76B9547C8B3817B3BD7DCC68BD727FD6994523F44BEEEFD744860DB262504
24,837,202 UART: [art] SIG.R = A6D0C1DA40A9909FD5BD82E9E9DC2B5EA8D092B8A2699DE54781D20C832B480A184ACEAF3BB6B050CC393B0DCB81EFAA
24,844,620 UART: [art] SIG.S = E50B57E8F01EFB3A9367BF00E95E51BF7817D3508541194F2D5FCA2ABC1CE66E32292C4A54CE61CC1F5CAAA3E2ED8C3F
25,823,274 UART: Caliptra RT
25,823,985 UART: [state] CFI Enabled
25,967,197 UART: [rt] RT listening for mailbox commands...
25,999,254 UART: [rt]cmd =0x44504543, len=92
30,291,996 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,098 writing to cptra_bootfsm_go
13,387,043 ready_for_fw is high
13,387,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,056,000 >>> mbox cmd response: success
24,056,460 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,308,534 UART:
28,308,863 UART: Running Caliptra FMC ...
28,309,937 UART:
28,310,094 UART: [state] CFI Enabled
28,317,869 UART: [fht] FMC Alias Private Key: 7
30,083,719 UART: [art] Extend RT PCRs Done
30,085,020 UART: [art] Lock RT PCRs Done
30,086,659 UART: [art] Populate DV Done
30,091,865 UART: [fht] FMC Alias Private Key: 7
30,093,460 UART: [art] Derive CDI
30,094,282 UART: [art] Store in slot 0x4
30,137,364 UART: [art] Derive Key Pair
30,138,372 UART: [art] Store priv key in slot 0x5
32,565,011 UART: [art] Derive Key Pair - Done
32,578,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,284,443 UART: [art] Erasing AUTHORITY.KEYID = 7
34,285,928 UART: [art] PUB.X = 4B9672377DE1E1EA73CF7678C25118AB4AEA749DBAAC0EC7B0B973E54D1082F20D128C69A1AA791870E31F9C8C8E3C13
34,293,178 UART: [art] PUB.Y = CB4BF92B77CA77CD4F7596483FB4529B6CE76B9547C8B3817B3BD7DCC68BD727FD6994523F44BEEEFD744860DB262504
34,300,478 UART: [art] SIG.R = A6D0C1DA40A9909FD5BD82E9E9DC2B5EA8D092B8A2699DE54781D20C832B480A184ACEAF3BB6B050CC393B0DCB81EFAA
34,307,879 UART: [art] SIG.S = E50B57E8F01EFB3A9367BF00E95E51BF7817D3508541194F2D5FCA2ABC1CE66E32292C4A54CE61CC1F5CAAA3E2ED8C3F
35,286,777 UART: Caliptra RT
35,287,484 UART: [state] CFI Enabled
35,420,208 UART: [rt] RT listening for mailbox commands...
35,452,310 UART: [rt]cmd =0x4d454153, len=108
35,470,728 >>> mbox cmd response data (12 bytes)
35,471,236 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,501,489 UART: [rt]cmd =0x44504543, len=92
39,794,232 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,051 writing to cptra_bootfsm_go
13,681,006 ready_for_fw is high
13,681,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,338,520 >>> mbox cmd response: success
24,339,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,596,961 UART:
28,597,294 UART: Running Caliptra FMC ...
28,598,447 UART:
28,598,611 UART: [state] CFI Enabled
28,606,721 UART: [fht] FMC Alias Private Key: 7
30,372,692 UART: [art] Extend RT PCRs Done
30,373,917 UART: [art] Lock RT PCRs Done
30,375,434 UART: [art] Populate DV Done
30,380,799 UART: [fht] FMC Alias Private Key: 7
30,382,344 UART: [art] Derive CDI
30,383,109 UART: [art] Store in slot 0x4
30,425,870 UART: [art] Derive Key Pair
30,426,912 UART: [art] Store priv key in slot 0x5
32,853,716 UART: [art] Derive Key Pair - Done
32,866,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,573,624 UART: [art] Erasing AUTHORITY.KEYID = 7
34,575,128 UART: [art] PUB.X = 4B9672377DE1E1EA73CF7678C25118AB4AEA749DBAAC0EC7B0B973E54D1082F20D128C69A1AA791870E31F9C8C8E3C13
34,582,389 UART: [art] PUB.Y = CB4BF92B77CA77CD4F7596483FB4529B6CE76B9547C8B3817B3BD7DCC68BD727FD6994523F44BEEEFD744860DB262504
34,589,646 UART: [art] SIG.R = A6D0C1DA40A9909FD5BD82E9E9DC2B5EA8D092B8A2699DE54781D20C832B480A184ACEAF3BB6B050CC393B0DCB81EFAA
34,597,055 UART: [art] SIG.S = E50B57E8F01EFB3A9367BF00E95E51BF7817D3508541194F2D5FCA2ABC1CE66E32292C4A54CE61CC1F5CAAA3E2ED8C3F
35,575,821 UART: Caliptra RT
35,576,506 UART: [state] CFI Enabled
35,709,346 UART: [rt] RT listening for mailbox commands...
35,741,296 UART: [rt]cmd =0x44504543, len=96
35,772,718 >>> mbox cmd response data (56 bytes)
35,773,571 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,804,155 UART: [rt]cmd =0x44504543, len=92
40,097,521 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.63s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,178,152 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,200,319 UART: [afmc] --
19,203,171 UART: [cold-reset] --
19,206,273 UART: [state] Locking Datavault
19,212,592 UART: [state] Locking PCR0, PCR1 and PCR31
19,214,769 UART: [state] Locking ICCM
19,217,722 UART: [exit] Launching FMC @ 0x40000130
19,226,392 UART:
19,226,625 UART: Running Caliptra FMC ...
19,227,720 UART:
19,227,874 UART: [state] CFI Enabled
19,287,290 UART: [fht] FMC Alias Private Key: 7
21,053,343 UART: [art] Extend RT PCRs Done
21,054,562 UART: [art] Lock RT PCRs Done
21,056,321 UART: [art] Populate DV Done
21,061,962 UART: [fht] FMC Alias Private Key: 7
21,063,617 UART: [art] Derive CDI
21,064,352 UART: [art] Store in slot 0x4
21,119,794 UART: [art] Derive Key Pair
21,120,835 UART: [art] Store priv key in slot 0x5
23,583,328 UART: [art] Derive Key Pair - Done
23,596,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,308,621 UART: [art] Erasing AUTHORITY.KEYID = 7
25,310,121 UART: [art] PUB.X = 7C697DA68D6FDEBCE915B797607FE3406C0715ED3AB0A972586A27797F53A7774A64D36EEEF70FE56246DE448011C736
25,317,415 UART: [art] PUB.Y = A4CC06C22CFBA2077C068FDA532CE6AF172DC1131987ABCCBAC6C8465C6CE38499EE18EB3769BF11B990ADBBCEBEC919
25,324,708 UART: [art] SIG.R = C09860503DA2AA1592E585AA6ADAB0FB1A970908C7F891463133BB5F822F996D59A9E70447F1BB365694D56602D6E9CB
25,332,097 UART: [art] SIG.S = 2480CA68FAC894CF6EBD69416BA2E49295376711CA2856980D59BA095682C9A321910D641C4F713B213B2BDF51C4FF88
26,310,997 UART: Caliptra RT
26,311,701 UART: [state] CFI Enabled
26,502,944 UART: [rt] RT listening for mailbox commands...
26,535,175 UART: [rt]cmd =0x44504543, len=92
30,888,946 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,064 writing to cptra_bootfsm_go
190,175 UART:
190,464 UART: Running Caliptra ROM ...
191,491 UART:
191,628 UART: [state] CFI Enabled
250,519 UART: [state] LifecycleState = Unprovisioned
252,835 UART: [state] DebugLocked = No
255,413 UART: [state] WD Timer not started. Device not locked for debugging
259,463 UART: [kat] SHA2-256
449,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
460,097 UART: [kat] ++
460,544 UART: [kat] sha1
472,976 UART: [kat] SHA2-256
476,000 UART: [kat] SHA2-384
481,735 UART: [kat] SHA2-512-ACC
484,386 UART: [kat] ECC-384
2,936,657 UART: [kat] HMAC-384Kdf
2,960,675 UART: [kat] LMS
3,492,429 UART: [kat] --
3,496,700 UART: [cold-reset] ++
3,497,631 UART: [fht] FHT @ 0x50003400
3,509,026 UART: [idev] ++
3,509,660 UART: [idev] CDI.KEYID = 6
3,510,635 UART: [idev] SUBJECT.KEYID = 7
3,511,802 UART: [idev] UDS.KEYID = 0
3,512,851 ready_for_fw is high
3,513,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,662,026 UART: [idev] Erasing UDS.KEYID = 0
6,016,925 UART: [idev] Sha1 KeyId Algorithm
6,040,480 UART: [idev] --
6,044,697 UART: [ldev] ++
6,045,388 UART: [ldev] CDI.KEYID = 6
6,046,300 UART: [ldev] SUBJECT.KEYID = 5
6,047,406 UART: [ldev] AUTHORITY.KEYID = 7
6,048,691 UART: [ldev] FE.KEYID = 1
6,088,658 UART: [ldev] Erasing FE.KEYID = 1
8,594,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,329,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,345,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,360,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,375,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,870 UART: [ldev] --
10,400,456 UART: [fwproc] Wait for Commands...
10,402,715 UART: [fwproc] Recv command 0x46574c44
10,405,024 UART: [fwproc] Recv'd Img size: 118548 bytes
13,898,178 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,666,989 >>> mbox cmd response: success
14,667,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
14,671,281 UART: [afmc] ++
14,671,964 UART: [afmc] CDI.KEYID = 6
14,673,117 UART: [afmc] SUBJECT.KEYID = 7
14,674,650 UART: [afmc] AUTHORITY.KEYID = 5
17,200,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,928,801 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,930,730 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,945,818 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,960,945 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,975,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,000,464 UART: [afmc] --
19,003,964 UART: [cold-reset] --
19,008,446 UART: [state] Locking Datavault
19,013,212 UART: [state] Locking PCR0, PCR1 and PCR31
19,015,341 UART: [state] Locking ICCM
19,017,713 UART: [exit] Launching FMC @ 0x40000130
19,026,384 UART:
19,026,626 UART: Running Caliptra FMC ...
19,027,727 UART:
19,027,886 UART: [state] CFI Enabled
19,084,376 UART: [fht] FMC Alias Private Key: 7
20,850,619 UART: [art] Extend RT PCRs Done
20,851,836 UART: [art] Lock RT PCRs Done
20,853,162 UART: [art] Populate DV Done
20,858,680 UART: [fht] FMC Alias Private Key: 7
20,860,370 UART: [art] Derive CDI
20,861,101 UART: [art] Store in slot 0x4
20,917,186 UART: [art] Derive Key Pair
20,918,243 UART: [art] Store priv key in slot 0x5
23,380,717 UART: [art] Derive Key Pair - Done
23,393,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,106,734 UART: [art] Erasing AUTHORITY.KEYID = 7
25,108,241 UART: [art] PUB.X = 7C697DA68D6FDEBCE915B797607FE3406C0715ED3AB0A972586A27797F53A7774A64D36EEEF70FE56246DE448011C736
25,115,543 UART: [art] PUB.Y = A4CC06C22CFBA2077C068FDA532CE6AF172DC1131987ABCCBAC6C8465C6CE38499EE18EB3769BF11B990ADBBCEBEC919
25,122,828 UART: [art] SIG.R = C09860503DA2AA1592E585AA6ADAB0FB1A970908C7F891463133BB5F822F996D59A9E70447F1BB365694D56602D6E9CB
25,130,225 UART: [art] SIG.S = 2480CA68FAC894CF6EBD69416BA2E49295376711CA2856980D59BA095682C9A321910D641C4F713B213B2BDF51C4FF88
26,108,818 UART: Caliptra RT
26,109,520 UART: [state] CFI Enabled
26,290,494 UART: [rt] RT listening for mailbox commands...
26,322,717 UART: [rt]cmd =0x4d454153, len=108
26,342,293 >>> mbox cmd response data (12 bytes)
26,342,803 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,373,390 UART: [rt]cmd =0x44504543, len=92
30,735,588 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,097 writing to cptra_bootfsm_go
190,175 UART:
190,494 UART: Running Caliptra ROM ...
191,556 UART:
191,706 UART: [state] CFI Enabled
251,402 UART: [state] LifecycleState = Unprovisioned
253,767 UART: [state] DebugLocked = No
255,937 UART: [state] WD Timer not started. Device not locked for debugging
261,278 UART: [kat] SHA2-256
451,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,977 UART: [kat] ++
462,510 UART: [kat] sha1
474,176 UART: [kat] SHA2-256
477,175 UART: [kat] SHA2-384
484,935 UART: [kat] SHA2-512-ACC
487,541 UART: [kat] ECC-384
2,935,064 UART: [kat] HMAC-384Kdf
2,955,555 UART: [kat] LMS
3,487,342 UART: [kat] --
3,491,829 UART: [cold-reset] ++
3,493,258 UART: [fht] FHT @ 0x50003400
3,505,114 UART: [idev] ++
3,505,790 UART: [idev] CDI.KEYID = 6
3,506,698 UART: [idev] SUBJECT.KEYID = 7
3,507,943 UART: [idev] UDS.KEYID = 0
3,508,876 ready_for_fw is high
3,509,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,657,929 UART: [idev] Erasing UDS.KEYID = 0
6,010,360 UART: [idev] Sha1 KeyId Algorithm
6,032,352 UART: [idev] --
6,037,374 UART: [ldev] ++
6,038,072 UART: [ldev] CDI.KEYID = 6
6,039,035 UART: [ldev] SUBJECT.KEYID = 5
6,040,137 UART: [ldev] AUTHORITY.KEYID = 7
6,041,364 UART: [ldev] FE.KEYID = 1
6,083,287 UART: [ldev] Erasing FE.KEYID = 1
8,592,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,775 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,670 UART: [ldev] --
10,399,573 UART: [fwproc] Wait for Commands...
10,401,612 UART: [fwproc] Recv command 0x46574c44
10,403,866 UART: [fwproc] Recv'd Img size: 118548 bytes
13,896,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,971,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,094,926 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,655,043 >>> mbox cmd response: success
14,655,519 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,658,842 UART: [afmc] ++
14,659,536 UART: [afmc] CDI.KEYID = 6
14,660,768 UART: [afmc] SUBJECT.KEYID = 7
14,662,196 UART: [afmc] AUTHORITY.KEYID = 5
17,199,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,921,921 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,923,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,938,902 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,954,075 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,968,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,992,159 UART: [afmc] --
18,996,230 UART: [cold-reset] --
18,998,900 UART: [state] Locking Datavault
19,005,303 UART: [state] Locking PCR0, PCR1 and PCR31
19,007,489 UART: [state] Locking ICCM
19,008,934 UART: [exit] Launching FMC @ 0x40000130
19,017,602 UART:
19,017,835 UART: Running Caliptra FMC ...
19,018,883 UART:
19,019,035 UART: [state] CFI Enabled
19,080,499 UART: [fht] FMC Alias Private Key: 7
20,846,669 UART: [art] Extend RT PCRs Done
20,847,881 UART: [art] Lock RT PCRs Done
20,849,558 UART: [art] Populate DV Done
20,854,908 UART: [fht] FMC Alias Private Key: 7
20,856,392 UART: [art] Derive CDI
20,857,150 UART: [art] Store in slot 0x4
20,913,409 UART: [art] Derive Key Pair
20,914,453 UART: [art] Store priv key in slot 0x5
23,377,135 UART: [art] Derive Key Pair - Done
23,389,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,103,872 UART: [art] Erasing AUTHORITY.KEYID = 7
25,105,379 UART: [art] PUB.X = 7C697DA68D6FDEBCE915B797607FE3406C0715ED3AB0A972586A27797F53A7774A64D36EEEF70FE56246DE448011C736
25,112,629 UART: [art] PUB.Y = A4CC06C22CFBA2077C068FDA532CE6AF172DC1131987ABCCBAC6C8465C6CE38499EE18EB3769BF11B990ADBBCEBEC919
25,119,912 UART: [art] SIG.R = C09860503DA2AA1592E585AA6ADAB0FB1A970908C7F891463133BB5F822F996D59A9E70447F1BB365694D56602D6E9CB
25,127,308 UART: [art] SIG.S = 2480CA68FAC894CF6EBD69416BA2E49295376711CA2856980D59BA095682C9A321910D641C4F713B213B2BDF51C4FF88
26,106,088 UART: Caliptra RT
26,106,783 UART: [state] CFI Enabled
26,287,418 UART: [rt] RT listening for mailbox commands...
26,319,523 UART: [rt]cmd =0x44504543, len=96
26,351,778 >>> mbox cmd response data (56 bytes)
26,352,567 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,383,128 UART: [rt]cmd =0x44504543, len=92
30,730,546 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,685 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,248,829 >>> mbox cmd response data (12 bytes)
10,250,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,980,013 >>> mbox cmd response: success
14,980,571 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,278,099 UART:
19,278,514 UART: Running Caliptra FMC ...
19,279,763 UART:
19,279,928 UART: [state] CFI Enabled
19,346,999 UART: [fht] FMC Alias Private Key: 7
21,113,584 UART: [art] Extend RT PCRs Done
21,114,812 UART: [art] Lock RT PCRs Done
21,116,333 UART: [art] Populate DV Done
21,121,695 UART: [fht] FMC Alias Private Key: 7
21,123,134 UART: [art] Derive CDI
21,123,910 UART: [art] Store in slot 0x4
21,179,145 UART: [art] Derive Key Pair
21,180,144 UART: [art] Store priv key in slot 0x5
23,643,386 UART: [art] Derive Key Pair - Done
23,656,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,368,434 UART: [art] Erasing AUTHORITY.KEYID = 7
25,369,931 UART: [art] PUB.X = 870BB700C972492A96BE48FC7BCE575D01048C38D59C39E75FC783F998B7E3060EF62EAA1EAC8763441CF46AB8C22311
25,377,224 UART: [art] PUB.Y = D3A864C9C279EBEFD7B18CC7603BCE854CFB95E3674FCACABA53ECE5DE4B75A699C9D106C23DCA12E1B95B866580A1AE
25,384,528 UART: [art] SIG.R = BD2DF534974730C8D8852812E609B7D7A27B037CC51CF43D7C1A3ECDC450B1DCC4B6EE4461A30E81E9B2019871C50FC0
25,391,857 UART: [art] SIG.S = 57024F1EFBE0B9CEF0E2D92DF0A4190B61C5F960C67B733610A723CF7FDD084BE5C731EA27A7C1F3E563D67D696D47EF
26,371,185 UART: Caliptra RT
26,371,900 UART: [state] CFI Enabled
26,562,979 UART: [rt] RT listening for mailbox commands...
26,594,996 UART: [rt]cmd =0x44504543, len=92
30,949,643 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,082 writing to cptra_bootfsm_go
3,425,732 ready_for_fw is high
3,426,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,084 >>> mbox cmd response: success
14,813,502 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
19,095,429 UART:
19,095,763 UART: Running Caliptra FMC ...
19,096,892 UART:
19,097,058 UART: [state] CFI Enabled
19,163,946 UART: [fht] FMC Alias Private Key: 7
20,930,430 UART: [art] Extend RT PCRs Done
20,931,711 UART: [art] Lock RT PCRs Done
20,933,231 UART: [art] Populate DV Done
20,938,745 UART: [fht] FMC Alias Private Key: 7
20,940,281 UART: [art] Derive CDI
20,941,041 UART: [art] Store in slot 0x4
20,996,533 UART: [art] Derive Key Pair
20,997,524 UART: [art] Store priv key in slot 0x5
23,460,101 UART: [art] Derive Key Pair - Done
23,473,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,186,507 UART: [art] Erasing AUTHORITY.KEYID = 7
25,188,014 UART: [art] PUB.X = 870BB700C972492A96BE48FC7BCE575D01048C38D59C39E75FC783F998B7E3060EF62EAA1EAC8763441CF46AB8C22311
25,195,259 UART: [art] PUB.Y = D3A864C9C279EBEFD7B18CC7603BCE854CFB95E3674FCACABA53ECE5DE4B75A699C9D106C23DCA12E1B95B866580A1AE
25,202,534 UART: [art] SIG.R = BD2DF534974730C8D8852812E609B7D7A27B037CC51CF43D7C1A3ECDC450B1DCC4B6EE4461A30E81E9B2019871C50FC0
25,209,927 UART: [art] SIG.S = 57024F1EFBE0B9CEF0E2D92DF0A4190B61C5F960C67B733610A723CF7FDD084BE5C731EA27A7C1F3E563D67D696D47EF
26,188,509 UART: Caliptra RT
26,189,220 UART: [state] CFI Enabled
26,371,135 UART: [rt] RT listening for mailbox commands...
26,403,420 UART: [rt]cmd =0x4d454153, len=108
26,421,866 >>> mbox cmd response data (12 bytes)
26,422,391 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,452,936 UART: [rt]cmd =0x44504543, len=92
30,812,228 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,070 writing to cptra_bootfsm_go
3,429,683 ready_for_fw is high
3,430,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,836,101 >>> mbox cmd response: success
14,836,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,121,184 UART:
19,121,517 UART: Running Caliptra FMC ...
19,122,584 UART:
19,122,736 UART: [state] CFI Enabled
19,191,347 UART: [fht] FMC Alias Private Key: 7
20,956,985 UART: [art] Extend RT PCRs Done
20,958,215 UART: [art] Lock RT PCRs Done
20,959,933 UART: [art] Populate DV Done
20,965,164 UART: [fht] FMC Alias Private Key: 7
20,966,694 UART: [art] Derive CDI
20,967,430 UART: [art] Store in slot 0x4
21,024,327 UART: [art] Derive Key Pair
21,025,348 UART: [art] Store priv key in slot 0x5
23,488,233 UART: [art] Derive Key Pair - Done
23,501,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,278 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,790 UART: [art] PUB.X = 870BB700C972492A96BE48FC7BCE575D01048C38D59C39E75FC783F998B7E3060EF62EAA1EAC8763441CF46AB8C22311
25,223,034 UART: [art] PUB.Y = D3A864C9C279EBEFD7B18CC7603BCE854CFB95E3674FCACABA53ECE5DE4B75A699C9D106C23DCA12E1B95B866580A1AE
25,230,319 UART: [art] SIG.R = BD2DF534974730C8D8852812E609B7D7A27B037CC51CF43D7C1A3ECDC450B1DCC4B6EE4461A30E81E9B2019871C50FC0
25,237,713 UART: [art] SIG.S = 57024F1EFBE0B9CEF0E2D92DF0A4190B61C5F960C67B733610A723CF7FDD084BE5C731EA27A7C1F3E563D67D696D47EF
26,216,335 UART: Caliptra RT
26,217,020 UART: [state] CFI Enabled
26,398,999 UART: [rt] RT listening for mailbox commands...
26,431,119 UART: [rt]cmd =0x44504543, len=96
26,463,199 >>> mbox cmd response data (56 bytes)
26,463,956 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,494,712 UART: [rt]cmd =0x44504543, len=92
30,840,705 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.75s
Truncated 3769 bytes from beginning
C2054496BBC57652E17DE254731722A293751A54846D
19,349,678 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,373,127 UART: [afmc] --
19,376,832 UART: [cold-reset] --
19,379,838 UART: [state] Locking Datavault
19,384,550 UART: [state] Locking PCR0, PCR1 and PCR31
19,386,748 UART: [state] Locking ICCM
19,388,721 UART: [exit] Launching FMC @ 0x40000130
19,397,403 UART:
19,397,638 UART: Running Caliptra FMC ...
19,398,742 UART:
19,398,900 UART: [state] CFI Enabled
19,407,006 UART: [fht] FMC Alias Private Key: 7
21,172,932 UART: [art] Extend RT PCRs Done
21,174,183 UART: [art] Lock RT PCRs Done
21,175,947 UART: [art] Populate DV Done
21,181,148 UART: [fht] FMC Alias Private Key: 7
21,182,679 UART: [art] Derive CDI
21,183,424 UART: [art] Store in slot 0x4
21,226,078 UART: [art] Derive Key Pair
21,227,087 UART: [art] Store priv key in slot 0x5
23,654,603 UART: [art] Derive Key Pair - Done
23,667,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,373,517 UART: [art] Erasing AUTHORITY.KEYID = 7
25,375,033 UART: [art] PUB.X = EC77784098FAAB74E9FF0F890674C9A19613CC328A988F5CA3EC7E2FF17C99280F292463E1C865CB8589B4C87ACD7371
25,382,298 UART: [art] PUB.Y = 9DDF97569443EFED00DD252881E90710F9ED1D7C7F3062769DBEC169232D8DC3A8EE1FBE407B472DB3BF746C84D6BA2F
25,389,546 UART: [art] SIG.R = 0FC160054898D6109AAC63B15BA06031850709E08886E4D6B781ECB8169E6F08F994F7EE149ECAEDA0CA846110265B36
25,396,915 UART: [art] SIG.S = EFCB39E2364372C3FFE572BB307A0CEB3270A0744B2E3720692E019D9115A85BAF4FC47AD577D7C1A9F5EF24ADCBAD54
26,375,446 UART: Caliptra RT
26,376,163 UART: [state] CFI Enabled
26,519,996 UART: [rt] RT listening for mailbox commands...
26,552,211 UART: [rt]cmd =0x44504543, len=92
30,844,986 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,109 writing to cptra_bootfsm_go
190,246 UART:
190,540 UART: Running Caliptra ROM ...
191,658 UART:
9,652,384 UART: [state] CFI Enabled
9,670,405 UART: [state] LifecycleState = Unprovisioned
9,672,798 UART: [state] DebugLocked = No
9,675,347 UART: [state] WD Timer not started. Device not locked for debugging
9,680,299 UART: [kat] SHA2-256
9,870,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,880,913 UART: [kat] ++
9,881,476 UART: [kat] sha1
9,894,376 UART: [kat] SHA2-256
9,897,413 UART: [kat] SHA2-384
9,903,637 UART: [kat] SHA2-512-ACC
9,906,271 UART: [kat] ECC-384
12,349,979 UART: [kat] HMAC-384Kdf
12,363,285 UART: [kat] LMS
12,895,103 UART: [kat] --
12,898,961 UART: [cold-reset] ++
12,901,030 UART: [fht] FHT @ 0x50003400
12,913,647 UART: [idev] ++
12,914,364 UART: [idev] CDI.KEYID = 6
12,915,273 UART: [idev] SUBJECT.KEYID = 7
12,916,518 UART: [idev] UDS.KEYID = 0
12,917,446 ready_for_fw is high
12,917,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,066,382 UART: [idev] Erasing UDS.KEYID = 0
15,393,451 UART: [idev] Sha1 KeyId Algorithm
15,415,827 UART: [idev] --
15,420,964 UART: [ldev] ++
15,421,641 UART: [ldev] CDI.KEYID = 6
15,422,551 UART: [ldev] SUBJECT.KEYID = 5
15,423,709 UART: [ldev] AUTHORITY.KEYID = 7
15,424,942 UART: [ldev] FE.KEYID = 1
15,435,230 UART: [ldev] Erasing FE.KEYID = 1
17,912,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,631,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,646,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,661,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,676,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,696,957 UART: [ldev] --
19,702,984 UART: [fwproc] Wait for Commands...
19,704,759 UART: [fwproc] Recv command 0x46574c44
19,707,101 UART: [fwproc] Recv'd Img size: 118548 bytes
23,206,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,288,375 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,411,963 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,972,327 >>> mbox cmd response: success
23,972,794 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
23,975,937 UART: [afmc] ++
23,976,624 UART: [afmc] CDI.KEYID = 6
23,977,865 UART: [afmc] SUBJECT.KEYID = 7
23,979,300 UART: [afmc] AUTHORITY.KEYID = 5
26,483,586 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,206,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,208,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,223,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,238,589 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,253,521 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,277,422 UART: [afmc] --
28,281,826 UART: [cold-reset] --
28,284,881 UART: [state] Locking Datavault
28,290,360 UART: [state] Locking PCR0, PCR1 and PCR31
28,292,560 UART: [state] Locking ICCM
28,295,506 UART: [exit] Launching FMC @ 0x40000130
28,304,127 UART:
28,304,363 UART: Running Caliptra FMC ...
28,305,935 UART:
28,306,123 UART: [state] CFI Enabled
28,313,937 UART: [fht] FMC Alias Private Key: 7
30,080,082 UART: [art] Extend RT PCRs Done
30,081,297 UART: [art] Lock RT PCRs Done
30,083,226 UART: [art] Populate DV Done
30,088,590 UART: [fht] FMC Alias Private Key: 7
30,090,193 UART: [art] Derive CDI
30,090,956 UART: [art] Store in slot 0x4
30,134,042 UART: [art] Derive Key Pair
30,135,050 UART: [art] Store priv key in slot 0x5
32,561,925 UART: [art] Derive Key Pair - Done
32,574,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,281,087 UART: [art] Erasing AUTHORITY.KEYID = 7
34,282,604 UART: [art] PUB.X = EC77784098FAAB74E9FF0F890674C9A19613CC328A988F5CA3EC7E2FF17C99280F292463E1C865CB8589B4C87ACD7371
34,289,870 UART: [art] PUB.Y = 9DDF97569443EFED00DD252881E90710F9ED1D7C7F3062769DBEC169232D8DC3A8EE1FBE407B472DB3BF746C84D6BA2F
34,297,118 UART: [art] SIG.R = 0FC160054898D6109AAC63B15BA06031850709E08886E4D6B781ECB8169E6F08F994F7EE149ECAEDA0CA846110265B36
34,304,542 UART: [art] SIG.S = EFCB39E2364372C3FFE572BB307A0CEB3270A0744B2E3720692E019D9115A85BAF4FC47AD577D7C1A9F5EF24ADCBAD54
35,283,141 UART: Caliptra RT
35,283,856 UART: [state] CFI Enabled
35,417,113 UART: [rt] RT listening for mailbox commands...
35,449,268 UART: [rt]cmd =0x4d454153, len=108
35,467,848 >>> mbox cmd response data (12 bytes)
35,468,463 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,499,068 UART: [rt]cmd =0x44504543, len=92
39,791,173 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,093 writing to cptra_bootfsm_go
190,215 UART:
190,513 UART: Running Caliptra ROM ...
191,639 UART:
9,951,951 UART: [state] CFI Enabled
9,966,957 UART: [state] LifecycleState = Unprovisioned
9,969,321 UART: [state] DebugLocked = No
9,971,719 UART: [state] WD Timer not started. Device not locked for debugging
9,975,526 UART: [kat] SHA2-256
10,165,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,176,182 UART: [kat] ++
10,176,713 UART: [kat] sha1
10,189,017 UART: [kat] SHA2-256
10,191,985 UART: [kat] SHA2-384
10,197,709 UART: [kat] SHA2-512-ACC
10,200,303 UART: [kat] ECC-384
12,640,345 UART: [kat] HMAC-384Kdf
12,654,520 UART: [kat] LMS
13,186,396 UART: [kat] --
13,191,038 UART: [cold-reset] ++
13,193,552 UART: [fht] FHT @ 0x50003400
13,205,682 UART: [idev] ++
13,206,430 UART: [idev] CDI.KEYID = 6
13,207,349 UART: [idev] SUBJECT.KEYID = 7
13,208,531 UART: [idev] UDS.KEYID = 0
13,209,464 ready_for_fw is high
13,209,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,358,283 UART: [idev] Erasing UDS.KEYID = 0
15,683,787 UART: [idev] Sha1 KeyId Algorithm
15,706,164 UART: [idev] --
15,710,659 UART: [ldev] ++
15,711,346 UART: [ldev] CDI.KEYID = 6
15,712,257 UART: [ldev] SUBJECT.KEYID = 5
15,713,421 UART: [ldev] AUTHORITY.KEYID = 7
15,714,651 UART: [ldev] FE.KEYID = 1
15,726,818 UART: [ldev] Erasing FE.KEYID = 1
18,205,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,925,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,941,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,956,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,971,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,992,633 UART: [ldev] --
19,997,373 UART: [fwproc] Wait for Commands...
20,000,404 UART: [fwproc] Recv command 0x46574c44
20,002,687 UART: [fwproc] Recv'd Img size: 118548 bytes
23,497,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,574,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,697,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,257,426 >>> mbox cmd response: success
24,257,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
24,262,313 UART: [afmc] ++
24,263,021 UART: [afmc] CDI.KEYID = 6
24,264,222 UART: [afmc] SUBJECT.KEYID = 7
24,265,670 UART: [afmc] AUTHORITY.KEYID = 5
26,769,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
28,492,387 UART: [afmc] Erase AUTHORITY.KEYID = 5
28,494,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
28,509,458 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
28,524,600 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
28,539,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
28,562,193 UART: [afmc] --
28,565,218 UART: [cold-reset] --
28,567,080 UART: [state] Locking Datavault
28,572,132 UART: [state] Locking PCR0, PCR1 and PCR31
28,574,280 UART: [state] Locking ICCM
28,577,196 UART: [exit] Launching FMC @ 0x40000130
28,585,824 UART:
28,586,067 UART: Running Caliptra FMC ...
28,587,174 UART:
28,587,334 UART: [state] CFI Enabled
28,595,385 UART: [fht] FMC Alias Private Key: 7
30,362,025 UART: [art] Extend RT PCRs Done
30,363,253 UART: [art] Lock RT PCRs Done
30,365,232 UART: [art] Populate DV Done
30,370,927 UART: [fht] FMC Alias Private Key: 7
30,372,463 UART: [art] Derive CDI
30,373,200 UART: [art] Store in slot 0x4
30,416,153 UART: [art] Derive Key Pair
30,417,204 UART: [art] Store priv key in slot 0x5
32,844,119 UART: [art] Derive Key Pair - Done
32,856,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,562,992 UART: [art] Erasing AUTHORITY.KEYID = 7
34,564,504 UART: [art] PUB.X = EC77784098FAAB74E9FF0F890674C9A19613CC328A988F5CA3EC7E2FF17C99280F292463E1C865CB8589B4C87ACD7371
34,571,794 UART: [art] PUB.Y = 9DDF97569443EFED00DD252881E90710F9ED1D7C7F3062769DBEC169232D8DC3A8EE1FBE407B472DB3BF746C84D6BA2F
34,579,053 UART: [art] SIG.R = 0FC160054898D6109AAC63B15BA06031850709E08886E4D6B781ECB8169E6F08F994F7EE149ECAEDA0CA846110265B36
34,586,425 UART: [art] SIG.S = EFCB39E2364372C3FFE572BB307A0CEB3270A0744B2E3720692E019D9115A85BAF4FC47AD577D7C1A9F5EF24ADCBAD54
35,564,979 UART: Caliptra RT
35,565,667 UART: [state] CFI Enabled
35,699,279 UART: [rt] RT listening for mailbox commands...
35,731,284 UART: [rt]cmd =0x44504543, len=96
35,763,731 >>> mbox cmd response data (56 bytes)
35,764,513 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,795,255 UART: [rt]cmd =0x44504543, len=92
40,087,675 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
10,474,320 >>> mbox cmd response data (12 bytes)
10,475,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,200,532 >>> mbox cmd response: success
15,201,012 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,453,712 UART:
19,454,093 UART: Running Caliptra FMC ...
19,455,364 UART:
19,455,527 UART: [state] CFI Enabled
19,463,407 UART: [fht] FMC Alias Private Key: 7
21,229,299 UART: [art] Extend RT PCRs Done
21,230,530 UART: [art] Lock RT PCRs Done
21,232,271 UART: [art] Populate DV Done
21,237,701 UART: [fht] FMC Alias Private Key: 7
21,239,304 UART: [art] Derive CDI
21,240,124 UART: [art] Store in slot 0x4
21,282,891 UART: [art] Derive Key Pair
21,283,897 UART: [art] Store priv key in slot 0x5
23,710,537 UART: [art] Derive Key Pair - Done
23,723,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,429,593 UART: [art] Erasing AUTHORITY.KEYID = 7
25,431,110 UART: [art] PUB.X = 2E265AB465AA962BF0FA1AB5C7D6782D0D95BDA1381772C90422182EB124CB72FCC5EF4255973D00399F12DC3140F43E
25,438,315 UART: [art] PUB.Y = 7ACAF8CFFB0B5A6A939B91D781EC030D75D9405FDDCAD67D9FA03E8DAE210DBB5881B991D89224D57150648CDD4483DE
25,445,606 UART: [art] SIG.R = 105A75A92C0C6A2C63C854EF9291FC9F78D3901E59853BB423CED1348A8DB84A761079B1E5A2305C7A3315A4DCF6A05F
25,452,969 UART: [art] SIG.S = CD5B4F1C7F16A20173CF807E8F4405EB1F396421B500ECF332B10433AC11F8153593D1FA56D461B0A4153820E3540B80
26,431,946 UART: Caliptra RT
26,432,652 UART: [state] CFI Enabled
26,576,449 UART: [rt] RT listening for mailbox commands...
26,608,501 UART: [rt]cmd =0x44504543, len=92
30,902,200 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,091 writing to cptra_bootfsm_go
12,747,583 ready_for_fw is high
12,748,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,042,628 >>> mbox cmd response: success
24,043,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
28,292,558 UART:
28,292,895 UART: Running Caliptra FMC ...
28,293,969 UART:
28,294,125 UART: [state] CFI Enabled
28,302,138 UART: [fht] FMC Alias Private Key: 7
30,068,123 UART: [art] Extend RT PCRs Done
30,069,453 UART: [art] Lock RT PCRs Done
30,070,764 UART: [art] Populate DV Done
30,076,241 UART: [fht] FMC Alias Private Key: 7
30,077,948 UART: [art] Derive CDI
30,078,771 UART: [art] Store in slot 0x4
30,121,552 UART: [art] Derive Key Pair
30,122,557 UART: [art] Store priv key in slot 0x5
32,549,120 UART: [art] Derive Key Pair - Done
32,562,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,269,053 UART: [art] Erasing AUTHORITY.KEYID = 7
34,270,568 UART: [art] PUB.X = 2E265AB465AA962BF0FA1AB5C7D6782D0D95BDA1381772C90422182EB124CB72FCC5EF4255973D00399F12DC3140F43E
34,277,793 UART: [art] PUB.Y = 7ACAF8CFFB0B5A6A939B91D781EC030D75D9405FDDCAD67D9FA03E8DAE210DBB5881B991D89224D57150648CDD4483DE
34,285,105 UART: [art] SIG.R = 105A75A92C0C6A2C63C854EF9291FC9F78D3901E59853BB423CED1348A8DB84A761079B1E5A2305C7A3315A4DCF6A05F
34,292,497 UART: [art] SIG.S = CD5B4F1C7F16A20173CF807E8F4405EB1F396421B500ECF332B10433AC11F8153593D1FA56D461B0A4153820E3540B80
35,271,627 UART: Caliptra RT
35,272,339 UART: [state] CFI Enabled
35,404,844 UART: [rt] RT listening for mailbox commands...
35,437,163 UART: [rt]cmd =0x4d454153, len=108
35,455,744 >>> mbox cmd response data (12 bytes)
35,456,313 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,487,009 UART: [rt]cmd =0x44504543, len=92
39,779,567 >>> mbox cmd response data (6284 bytes)
Initializing fuses
1,068 writing to cptra_bootfsm_go
13,061,564 ready_for_fw is high
13,061,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,351,204 >>> mbox cmd response: success
24,351,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,600,763 UART:
28,601,095 UART: Running Caliptra FMC ...
28,602,180 UART:
28,602,339 UART: [state] CFI Enabled
28,610,406 UART: [fht] FMC Alias Private Key: 7
30,376,939 UART: [art] Extend RT PCRs Done
30,378,161 UART: [art] Lock RT PCRs Done
30,379,901 UART: [art] Populate DV Done
30,385,263 UART: [fht] FMC Alias Private Key: 7
30,386,855 UART: [art] Derive CDI
30,387,676 UART: [art] Store in slot 0x4
30,430,063 UART: [art] Derive Key Pair
30,431,104 UART: [art] Store priv key in slot 0x5
32,857,614 UART: [art] Derive Key Pair - Done
32,870,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,577,000 UART: [art] Erasing AUTHORITY.KEYID = 7
34,578,512 UART: [art] PUB.X = 2E265AB465AA962BF0FA1AB5C7D6782D0D95BDA1381772C90422182EB124CB72FCC5EF4255973D00399F12DC3140F43E
34,585,785 UART: [art] PUB.Y = 7ACAF8CFFB0B5A6A939B91D781EC030D75D9405FDDCAD67D9FA03E8DAE210DBB5881B991D89224D57150648CDD4483DE
34,593,034 UART: [art] SIG.R = 105A75A92C0C6A2C63C854EF9291FC9F78D3901E59853BB423CED1348A8DB84A761079B1E5A2305C7A3315A4DCF6A05F
34,600,452 UART: [art] SIG.S = CD5B4F1C7F16A20173CF807E8F4405EB1F396421B500ECF332B10433AC11F8153593D1FA56D461B0A4153820E3540B80
35,579,257 UART: Caliptra RT
35,579,939 UART: [state] CFI Enabled
35,712,778 UART: [rt] RT listening for mailbox commands...
35,744,951 UART: [rt]cmd =0x44504543, len=96
35,776,469 >>> mbox cmd response data (56 bytes)
35,777,291 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,807,877 UART: [rt]cmd =0x44504543, len=92
40,099,990 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 5.66s
Truncated 4904 bytes from beginning
PUB.X = E1C2B30A000E9D87770549153E494099C45A776E5A7E0BA6BE47F6651B6219FF3E1D2CAAFEB7DA7B55D2F4A0D3B07FFC
3,501,840 UART: [art] PUB.Y = DF31CCCA49E48D13D2CE2301DBEA9F1A6F5CAFDA241BFE40CD7123333FE230B7CA3A9117E34F4730F526A6BC17B2DA8A
3,508,813 UART: [art] SIG.R = E41C9AD78977DEFC0C846370BB384B4F03C3A6AA61FBF8AC152C0DF8A4409D284DC3850D35ABAC25E3A4022654B99138
3,515,580 UART: [art] SIG.S = 7B356571767433225A5D17E11C053CF2C29E1FD2F4329EBC87BAC70C27EB4945B3F1342BDEDC1DD435E3E263122BB564
3,539,078 UART: Caliptra RT
3,539,329 UART: [state] CFI Enabled
3,672,117 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,703,135 UART: [rt]cmd =0x44504543, len=92
3,895,357 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,607 UART: [kat] SHA2-256
892,545 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,470 UART: [kat] LMS
1,475,666 UART: [kat] --
1,476,569 UART: [cold-reset] ++
1,476,931 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 ready_for_fw is high
1,481,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,998 UART: [idev] Erasing UDS.KEYID = 0
1,505,718 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,230 UART: [idev] --
1,515,147 UART: [ldev] ++
1,515,315 UART: [ldev] CDI.KEYID = 6
1,515,678 UART: [ldev] SUBJECT.KEYID = 5
1,516,104 UART: [ldev] AUTHORITY.KEYID = 7
1,516,567 UART: [ldev] FE.KEYID = 1
1,521,665 UART: [ldev] Erasing FE.KEYID = 1
1,547,360 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,412 UART: [ldev] --
1,586,895 UART: [fwproc] Waiting for Commands...
1,587,558 UART: [fwproc] Received command 0x46574c44
1,588,349 UART: [fwproc] Received Image of size 118548 bytes
2,933,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,507 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,725 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,992 >>> mbox cmd response: success
3,131,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,133,144 UART: [afmc] ++
3,133,312 UART: [afmc] CDI.KEYID = 6
3,133,674 UART: [afmc] SUBJECT.KEYID = 7
3,134,099 UART: [afmc] AUTHORITY.KEYID = 5
3,169,030 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,140 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,920 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,512 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,195 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,049 UART: [afmc] --
3,211,949 UART: [cold-reset] --
3,212,939 UART: [state] Locking Datavault
3,213,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,576 UART: [state] Locking ICCM
3,215,132 UART: [exit] Launching FMC @ 0x40000130
3,220,462 UART:
3,220,478 UART: Running Caliptra FMC ...
3,220,886 UART:
3,220,940 UART: [state] CFI Enabled
3,231,264 UART: [fht] FMC Alias Private Key: 7
3,349,728 UART: [art] Extend RT PCRs Done
3,350,156 UART: [art] Lock RT PCRs Done
3,352,008 UART: [art] Populate DV Done
3,360,405 UART: [fht] FMC Alias Private Key: 7
3,361,437 UART: [art] Derive CDI
3,361,717 UART: [art] Store in slot 0x4
3,447,071 UART: [art] Derive Key Pair
3,447,431 UART: [art] Store priv key in slot 0x5
3,460,654 UART: [art] Derive Key Pair - Done
3,475,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,194 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,959 UART: [art] PUB.X = E1C2B30A000E9D87770549153E494099C45A776E5A7E0BA6BE47F6651B6219FF3E1D2CAAFEB7DA7B55D2F4A0D3B07FFC
3,498,711 UART: [art] PUB.Y = DF31CCCA49E48D13D2CE2301DBEA9F1A6F5CAFDA241BFE40CD7123333FE230B7CA3A9117E34F4730F526A6BC17B2DA8A
3,505,684 UART: [art] SIG.R = E41C9AD78977DEFC0C846370BB384B4F03C3A6AA61FBF8AC152C0DF8A4409D284DC3850D35ABAC25E3A4022654B99138
3,512,451 UART: [art] SIG.S = 7B356571767433225A5D17E11C053CF2C29E1FD2F4329EBC87BAC70C27EB4945B3F1342BDEDC1DD435E3E263122BB564
3,536,243 UART: Caliptra RT
3,536,494 UART: [state] CFI Enabled
3,656,762 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,274 UART: [rt]cmd =0x4d454153, len=108
3,708,682 >>> mbox cmd response data (12 bytes)
3,708,683 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,438 UART: [rt]cmd =0x44504543, len=92
3,930,536 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,943 UART: [kat] SHA2-256
881,874 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,989 UART: [kat] ++
886,141 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,274 UART: [kat] SHA2-512-ACC
897,175 UART: [kat] ECC-384
902,668 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,403 UART: [cold-reset] ++
1,476,965 UART: [fht] Storing FHT @ 0x50003400
1,479,768 UART: [idev] ++
1,479,936 UART: [idev] CDI.KEYID = 6
1,480,296 UART: [idev] SUBJECT.KEYID = 7
1,480,720 UART: [idev] UDS.KEYID = 0
1,481,065 ready_for_fw is high
1,481,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,714 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,524 UART: [idev] --
1,514,701 UART: [ldev] ++
1,514,869 UART: [ldev] CDI.KEYID = 6
1,515,232 UART: [ldev] SUBJECT.KEYID = 5
1,515,658 UART: [ldev] AUTHORITY.KEYID = 7
1,516,121 UART: [ldev] FE.KEYID = 1
1,521,085 UART: [ldev] Erasing FE.KEYID = 1
1,546,456 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,262 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,218 UART: [ldev] --
1,585,659 UART: [fwproc] Waiting for Commands...
1,586,390 UART: [fwproc] Received command 0x46574c44
1,587,181 UART: [fwproc] Received Image of size 118548 bytes
2,932,245 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,065 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,283 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,662 >>> mbox cmd response: success
3,131,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,792 UART: [afmc] ++
3,132,960 UART: [afmc] CDI.KEYID = 6
3,133,322 UART: [afmc] SUBJECT.KEYID = 7
3,133,747 UART: [afmc] AUTHORITY.KEYID = 5
3,169,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,634 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,414 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,123 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,006 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,689 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,563 UART: [afmc] --
3,212,519 UART: [cold-reset] --
3,213,477 UART: [state] Locking Datavault
3,214,888 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,492 UART: [state] Locking ICCM
3,216,008 UART: [exit] Launching FMC @ 0x40000130
3,221,338 UART:
3,221,354 UART: Running Caliptra FMC ...
3,221,762 UART:
3,221,816 UART: [state] CFI Enabled
3,232,254 UART: [fht] FMC Alias Private Key: 7
3,351,206 UART: [art] Extend RT PCRs Done
3,351,634 UART: [art] Lock RT PCRs Done
3,352,812 UART: [art] Populate DV Done
3,361,065 UART: [fht] FMC Alias Private Key: 7
3,362,153 UART: [art] Derive CDI
3,362,433 UART: [art] Store in slot 0x4
3,448,219 UART: [art] Derive Key Pair
3,448,579 UART: [art] Store priv key in slot 0x5
3,461,676 UART: [art] Derive Key Pair - Done
3,476,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,361 UART: [art] PUB.X = E1C2B30A000E9D87770549153E494099C45A776E5A7E0BA6BE47F6651B6219FF3E1D2CAAFEB7DA7B55D2F4A0D3B07FFC
3,499,113 UART: [art] PUB.Y = DF31CCCA49E48D13D2CE2301DBEA9F1A6F5CAFDA241BFE40CD7123333FE230B7CA3A9117E34F4730F526A6BC17B2DA8A
3,506,086 UART: [art] SIG.R = E41C9AD78977DEFC0C846370BB384B4F03C3A6AA61FBF8AC152C0DF8A4409D284DC3850D35ABAC25E3A4022654B99138
3,512,853 UART: [art] SIG.S = 7B356571767433225A5D17E11C053CF2C29E1FD2F4329EBC87BAC70C27EB4945B3F1342BDEDC1DD435E3E263122BB564
3,537,065 UART: Caliptra RT
3,537,316 UART: [state] CFI Enabled
3,657,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,196 UART: [rt]cmd =0x44504543, len=96
3,721,166 >>> mbox cmd response data (56 bytes)
3,721,167 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,938 UART: [rt]cmd =0x44504543, len=92
3,943,396 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,303 >>> mbox cmd response data (12 bytes)
1,444,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,985,201 >>> mbox cmd response: success
2,985,201 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,046,872 UART:
3,046,888 UART: Running Caliptra FMC ...
3,047,296 UART:
3,047,350 UART: [state] CFI Enabled
3,058,214 UART: [fht] FMC Alias Private Key: 7
3,177,448 UART: [art] Extend RT PCRs Done
3,177,876 UART: [art] Lock RT PCRs Done
3,179,614 UART: [art] Populate DV Done
3,188,133 UART: [fht] FMC Alias Private Key: 7
3,189,235 UART: [art] Derive CDI
3,189,515 UART: [art] Store in slot 0x4
3,275,469 UART: [art] Derive Key Pair
3,275,829 UART: [art] Store priv key in slot 0x5
3,289,218 UART: [art] Derive Key Pair - Done
3,304,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,319,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,320,741 UART: [art] PUB.X = 27C326021D0CDE1480211898F8355CC9C7DEEF9095308219E8C4E14D73CF26C47987D273EA5D8538F839973D9DA6EB99
3,327,503 UART: [art] PUB.Y = 8508157D6D334D49A512EE5AB25206841BB5EBA7FA786A49E13830C50D9712A6088A6207B627D0F4A0B807042A836F10
3,334,426 UART: [art] SIG.R = CDE8709BA9A7907071E85E7074EC4C648D48F4955EFE7E30B94142D47D6D20029C09F31A7B0BD778608F54F2C5E70421
3,341,184 UART: [art] SIG.S = 825675B187BA9A2DA2B87A26EC1A9F5F3A5CD7492616CFD6A1C0FBC1D64909A6F8E80398809C737D60BA5655051CFE14
3,365,165 UART: Caliptra RT
3,365,416 UART: [state] CFI Enabled
3,498,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,529,121 UART: [rt]cmd =0x44504543, len=92
3,721,862 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,977 ready_for_fw is high
1,361,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,744 >>> mbox cmd response: success
2,979,744 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,040,635 UART:
3,040,651 UART: Running Caliptra FMC ...
3,041,059 UART:
3,041,113 UART: [state] CFI Enabled
3,051,559 UART: [fht] FMC Alias Private Key: 7
3,170,219 UART: [art] Extend RT PCRs Done
3,170,647 UART: [art] Lock RT PCRs Done
3,171,925 UART: [art] Populate DV Done
3,180,250 UART: [fht] FMC Alias Private Key: 7
3,181,360 UART: [art] Derive CDI
3,181,640 UART: [art] Store in slot 0x4
3,266,992 UART: [art] Derive Key Pair
3,267,352 UART: [art] Store priv key in slot 0x5
3,280,203 UART: [art] Derive Key Pair - Done
3,294,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,458 UART: [art] PUB.X = 27C326021D0CDE1480211898F8355CC9C7DEEF9095308219E8C4E14D73CF26C47987D273EA5D8538F839973D9DA6EB99
3,318,220 UART: [art] PUB.Y = 8508157D6D334D49A512EE5AB25206841BB5EBA7FA786A49E13830C50D9712A6088A6207B627D0F4A0B807042A836F10
3,325,143 UART: [art] SIG.R = CDE8709BA9A7907071E85E7074EC4C648D48F4955EFE7E30B94142D47D6D20029C09F31A7B0BD778608F54F2C5E70421
3,331,901 UART: [art] SIG.S = 825675B187BA9A2DA2B87A26EC1A9F5F3A5CD7492616CFD6A1C0FBC1D64909A6F8E80398809C737D60BA5655051CFE14
3,355,676 UART: Caliptra RT
3,355,927 UART: [state] CFI Enabled
3,474,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,505,916 UART: [rt]cmd =0x4d454153, len=108
3,526,054 >>> mbox cmd response data (12 bytes)
3,526,055 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,874 UART: [rt]cmd =0x44504543, len=92
3,749,237 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,637 ready_for_fw is high
1,361,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,242 >>> mbox cmd response: success
2,979,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,039,819 UART:
3,039,835 UART: Running Caliptra FMC ...
3,040,243 UART:
3,040,297 UART: [state] CFI Enabled
3,050,791 UART: [fht] FMC Alias Private Key: 7
3,169,605 UART: [art] Extend RT PCRs Done
3,170,033 UART: [art] Lock RT PCRs Done
3,171,735 UART: [art] Populate DV Done
3,180,194 UART: [fht] FMC Alias Private Key: 7
3,181,246 UART: [art] Derive CDI
3,181,526 UART: [art] Store in slot 0x4
3,267,502 UART: [art] Derive Key Pair
3,267,862 UART: [art] Store priv key in slot 0x5
3,281,179 UART: [art] Derive Key Pair - Done
3,295,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,902 UART: [art] PUB.X = 27C326021D0CDE1480211898F8355CC9C7DEEF9095308219E8C4E14D73CF26C47987D273EA5D8538F839973D9DA6EB99
3,318,664 UART: [art] PUB.Y = 8508157D6D334D49A512EE5AB25206841BB5EBA7FA786A49E13830C50D9712A6088A6207B627D0F4A0B807042A836F10
3,325,587 UART: [art] SIG.R = CDE8709BA9A7907071E85E7074EC4C648D48F4955EFE7E30B94142D47D6D20029C09F31A7B0BD778608F54F2C5E70421
3,332,345 UART: [art] SIG.S = 825675B187BA9A2DA2B87A26EC1A9F5F3A5CD7492616CFD6A1C0FBC1D64909A6F8E80398809C737D60BA5655051CFE14
3,356,874 UART: Caliptra RT
3,357,125 UART: [state] CFI Enabled
3,477,282 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,100 UART: [rt]cmd =0x44504543, len=96
3,541,310 >>> mbox cmd response data (56 bytes)
3,541,311 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,166 UART: [rt]cmd =0x44504543, len=92
3,763,249 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.73s
Truncated 4904 bytes from beginning
PUB.X = 06C049E3A2F45D14311C85C430339BCADF2DF36B2C204C34E85F92C2DF0C4371D866BC6EBF683D8C2913E104171498F5
3,503,246 UART: [art] PUB.Y = 0208575CED7F42D463D3236F7DA134EBD58FF58A55B480B956E78BD443D7BF854D2FD808E4518289FD9711B01E1F9328
3,510,189 UART: [art] SIG.R = 75FA0C27D2B5B52747992406BC00A5A71617761D709518A66F8D2274BACE1BB9CB186C1F3B739DB7BD2C52E982D7F7C5
3,516,937 UART: [art] SIG.S = 2156E425BBAC3E8A34F60A7DE24320970B36740CE31473865063B52B83D9F49CDFD37F3A7D1F1423BFB9ACE2E890D04F
3,541,152 UART: Caliptra RT
3,541,495 UART: [state] CFI Enabled
3,675,580 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,768 UART: [rt]cmd =0x44504543, len=92
3,898,959 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,975 UART: [state] LifecycleState = Unprovisioned
86,630 UART: [state] DebugLocked = No
87,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
89,016 UART: [kat] SHA2-256
882,947 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,062 UART: [kat] ++
887,214 UART: [kat] sha1
891,364 UART: [kat] SHA2-256
893,302 UART: [kat] SHA2-384
896,037 UART: [kat] SHA2-512-ACC
897,938 UART: [kat] ECC-384
903,567 UART: [kat] HMAC-384Kdf
908,253 UART: [kat] LMS
1,476,449 UART: [kat] --
1,477,382 UART: [cold-reset] ++
1,477,794 UART: [fht] Storing FHT @ 0x50003400
1,480,731 UART: [idev] ++
1,480,899 UART: [idev] CDI.KEYID = 6
1,481,259 UART: [idev] SUBJECT.KEYID = 7
1,481,683 UART: [idev] UDS.KEYID = 0
1,482,028 ready_for_fw is high
1,482,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,765 UART: [idev] Erasing UDS.KEYID = 0
1,506,393 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,943 UART: [idev] --
1,516,064 UART: [ldev] ++
1,516,232 UART: [ldev] CDI.KEYID = 6
1,516,595 UART: [ldev] SUBJECT.KEYID = 5
1,517,021 UART: [ldev] AUTHORITY.KEYID = 7
1,517,484 UART: [ldev] FE.KEYID = 1
1,522,970 UART: [ldev] Erasing FE.KEYID = 1
1,548,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,435 UART: [ldev] --
1,587,796 UART: [fwproc] Waiting for Commands...
1,588,519 UART: [fwproc] Received command 0x46574c44
1,589,310 UART: [fwproc] Received Image of size 118548 bytes
2,933,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,850 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,068 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,327 >>> mbox cmd response: success
3,132,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,133,369 UART: [afmc] ++
3,133,537 UART: [afmc] CDI.KEYID = 6
3,133,899 UART: [afmc] SUBJECT.KEYID = 7
3,134,324 UART: [afmc] AUTHORITY.KEYID = 5
3,170,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,771 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,363 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,046 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,086 UART: [afmc] --
3,213,018 UART: [cold-reset] --
3,214,060 UART: [state] Locking Datavault
3,215,177 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,781 UART: [state] Locking ICCM
3,216,407 UART: [exit] Launching FMC @ 0x40000130
3,221,737 UART:
3,221,753 UART: Running Caliptra FMC ...
3,222,161 UART:
3,222,304 UART: [state] CFI Enabled
3,232,820 UART: [fht] FMC Alias Private Key: 7
3,351,636 UART: [art] Extend RT PCRs Done
3,352,064 UART: [art] Lock RT PCRs Done
3,353,772 UART: [art] Populate DV Done
3,362,221 UART: [fht] FMC Alias Private Key: 7
3,363,359 UART: [art] Derive CDI
3,363,639 UART: [art] Store in slot 0x4
3,449,385 UART: [art] Derive Key Pair
3,449,745 UART: [art] Store priv key in slot 0x5
3,462,494 UART: [art] Derive Key Pair - Done
3,476,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,250 UART: [art] PUB.X = 06C049E3A2F45D14311C85C430339BCADF2DF36B2C204C34E85F92C2DF0C4371D866BC6EBF683D8C2913E104171498F5
3,500,015 UART: [art] PUB.Y = 0208575CED7F42D463D3236F7DA134EBD58FF58A55B480B956E78BD443D7BF854D2FD808E4518289FD9711B01E1F9328
3,506,958 UART: [art] SIG.R = 75FA0C27D2B5B52747992406BC00A5A71617761D709518A66F8D2274BACE1BB9CB186C1F3B739DB7BD2C52E982D7F7C5
3,513,706 UART: [art] SIG.S = 2156E425BBAC3E8A34F60A7DE24320970B36740CE31473865063B52B83D9F49CDFD37F3A7D1F1423BFB9ACE2E890D04F
3,537,679 UART: Caliptra RT
3,538,022 UART: [state] CFI Enabled
3,658,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,023 UART: [rt]cmd =0x4d454153, len=108
3,711,017 >>> mbox cmd response data (12 bytes)
3,711,018 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,845 UART: [rt]cmd =0x44504543, len=92
3,932,674 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,149 UART: [state] LifecycleState = Unprovisioned
85,804 UART: [state] DebugLocked = No
86,484 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,281 UART: [kat] SHA2-512-ACC
897,182 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,185 UART: [kat] LMS
1,475,381 UART: [kat] --
1,476,172 UART: [cold-reset] ++
1,476,644 UART: [fht] Storing FHT @ 0x50003400
1,479,349 UART: [idev] ++
1,479,517 UART: [idev] CDI.KEYID = 6
1,479,877 UART: [idev] SUBJECT.KEYID = 7
1,480,301 UART: [idev] UDS.KEYID = 0
1,480,646 ready_for_fw is high
1,480,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,317 UART: [idev] Erasing UDS.KEYID = 0
1,505,267 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,915 UART: [idev] --
1,514,876 UART: [ldev] ++
1,515,044 UART: [ldev] CDI.KEYID = 6
1,515,407 UART: [ldev] SUBJECT.KEYID = 5
1,515,833 UART: [ldev] AUTHORITY.KEYID = 7
1,516,296 UART: [ldev] FE.KEYID = 1
1,521,586 UART: [ldev] Erasing FE.KEYID = 1
1,546,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,220 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,667 UART: [ldev] --
1,585,992 UART: [fwproc] Waiting for Commands...
1,586,683 UART: [fwproc] Received command 0x46574c44
1,587,474 UART: [fwproc] Received Image of size 118548 bytes
2,932,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,534 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,117 >>> mbox cmd response: success
3,131,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,255 UART: [afmc] ++
3,132,423 UART: [afmc] CDI.KEYID = 6
3,132,785 UART: [afmc] SUBJECT.KEYID = 7
3,133,210 UART: [afmc] AUTHORITY.KEYID = 5
3,168,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,654 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,498 UART: [afmc] --
3,211,452 UART: [cold-reset] --
3,212,428 UART: [state] Locking Datavault
3,213,723 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,327 UART: [state] Locking ICCM
3,214,761 UART: [exit] Launching FMC @ 0x40000130
3,220,091 UART:
3,220,107 UART: Running Caliptra FMC ...
3,220,515 UART:
3,220,658 UART: [state] CFI Enabled
3,231,038 UART: [fht] FMC Alias Private Key: 7
3,350,458 UART: [art] Extend RT PCRs Done
3,350,886 UART: [art] Lock RT PCRs Done
3,352,228 UART: [art] Populate DV Done
3,360,539 UART: [fht] FMC Alias Private Key: 7
3,361,639 UART: [art] Derive CDI
3,361,919 UART: [art] Store in slot 0x4
3,448,067 UART: [art] Derive Key Pair
3,448,427 UART: [art] Store priv key in slot 0x5
3,461,826 UART: [art] Derive Key Pair - Done
3,476,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,124 UART: [art] PUB.X = 06C049E3A2F45D14311C85C430339BCADF2DF36B2C204C34E85F92C2DF0C4371D866BC6EBF683D8C2913E104171498F5
3,499,889 UART: [art] PUB.Y = 0208575CED7F42D463D3236F7DA134EBD58FF58A55B480B956E78BD443D7BF854D2FD808E4518289FD9711B01E1F9328
3,506,832 UART: [art] SIG.R = 75FA0C27D2B5B52747992406BC00A5A71617761D709518A66F8D2274BACE1BB9CB186C1F3B739DB7BD2C52E982D7F7C5
3,513,580 UART: [art] SIG.S = 2156E425BBAC3E8A34F60A7DE24320970B36740CE31473865063B52B83D9F49CDFD37F3A7D1F1423BFB9ACE2E890D04F
3,537,743 UART: Caliptra RT
3,538,086 UART: [state] CFI Enabled
3,658,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,379 UART: [rt]cmd =0x44504543, len=96
3,722,559 >>> mbox cmd response data (56 bytes)
3,722,560 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,531 UART: [rt]cmd =0x44504543, len=92
3,944,754 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,444,670 >>> mbox cmd response data (12 bytes)
1,444,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,620 >>> mbox cmd response: success
2,984,620 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,046,383 UART:
3,046,399 UART: Running Caliptra FMC ...
3,046,807 UART:
3,046,950 UART: [state] CFI Enabled
3,057,548 UART: [fht] FMC Alias Private Key: 7
3,176,734 UART: [art] Extend RT PCRs Done
3,177,162 UART: [art] Lock RT PCRs Done
3,178,702 UART: [art] Populate DV Done
3,186,761 UART: [fht] FMC Alias Private Key: 7
3,187,701 UART: [art] Derive CDI
3,187,981 UART: [art] Store in slot 0x4
3,273,345 UART: [art] Derive Key Pair
3,273,705 UART: [art] Store priv key in slot 0x5
3,287,062 UART: [art] Derive Key Pair - Done
3,301,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,661 UART: [art] PUB.X = CD0BBD6C9731EF2C30BE3CD738636B98406365045B23CEBB8FDBF53276D0799894426C4506E0EEDFF638039E761799AD
3,324,425 UART: [art] PUB.Y = 730A107D83098A2D9FFFB1C7DCE8CE60B5B29C28FCFBAA2AC2ACC5CDF84B4952ECBD49365E28710C345A84C64BF6EF71
3,331,392 UART: [art] SIG.R = 6E88187F007B0DAC9650749BDB87ED9EDBA29DCE354D7D408736181D0710E8961BB4FA54609E28CDEBD547152C8AE05E
3,338,144 UART: [art] SIG.S = 1234AA98FA07C0DF98D93F92DF93727348C1385261C258C6F2121545A64CE72380C7E4A1F4BF39678E09225329DC3483
3,362,440 UART: Caliptra RT
3,362,783 UART: [state] CFI Enabled
3,495,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,602 UART: [rt]cmd =0x44504543, len=92
3,718,441 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,558 ready_for_fw is high
1,363,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,823 >>> mbox cmd response: success
2,982,823 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
3,044,948 UART:
3,044,964 UART: Running Caliptra FMC ...
3,045,372 UART:
3,045,515 UART: [state] CFI Enabled
3,055,919 UART: [fht] FMC Alias Private Key: 7
3,174,867 UART: [art] Extend RT PCRs Done
3,175,295 UART: [art] Lock RT PCRs Done
3,176,949 UART: [art] Populate DV Done
3,185,246 UART: [fht] FMC Alias Private Key: 7
3,186,326 UART: [art] Derive CDI
3,186,606 UART: [art] Store in slot 0x4
3,272,496 UART: [art] Derive Key Pair
3,272,856 UART: [art] Store priv key in slot 0x5
3,285,909 UART: [art] Derive Key Pair - Done
3,300,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,466 UART: [art] PUB.X = CD0BBD6C9731EF2C30BE3CD738636B98406365045B23CEBB8FDBF53276D0799894426C4506E0EEDFF638039E761799AD
3,323,230 UART: [art] PUB.Y = 730A107D83098A2D9FFFB1C7DCE8CE60B5B29C28FCFBAA2AC2ACC5CDF84B4952ECBD49365E28710C345A84C64BF6EF71
3,330,197 UART: [art] SIG.R = 6E88187F007B0DAC9650749BDB87ED9EDBA29DCE354D7D408736181D0710E8961BB4FA54609E28CDEBD547152C8AE05E
3,336,949 UART: [art] SIG.S = 1234AA98FA07C0DF98D93F92DF93727348C1385261C258C6F2121545A64CE72380C7E4A1F4BF39678E09225329DC3483
3,360,821 UART: Caliptra RT
3,361,164 UART: [state] CFI Enabled
3,482,163 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,267 UART: [rt]cmd =0x4d454153, len=108
3,533,833 >>> mbox cmd response data (12 bytes)
3,533,834 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,675 UART: [rt]cmd =0x44504543, len=92
3,756,252 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,540 ready_for_fw is high
1,362,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,735 >>> mbox cmd response: success
2,980,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,064 UART:
3,043,080 UART: Running Caliptra FMC ...
3,043,488 UART:
3,043,631 UART: [state] CFI Enabled
3,054,039 UART: [fht] FMC Alias Private Key: 7
3,172,993 UART: [art] Extend RT PCRs Done
3,173,421 UART: [art] Lock RT PCRs Done
3,174,855 UART: [art] Populate DV Done
3,183,024 UART: [fht] FMC Alias Private Key: 7
3,184,140 UART: [art] Derive CDI
3,184,420 UART: [art] Store in slot 0x4
3,270,420 UART: [art] Derive Key Pair
3,270,780 UART: [art] Store priv key in slot 0x5
3,283,959 UART: [art] Derive Key Pair - Done
3,298,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,862 UART: [art] PUB.X = CD0BBD6C9731EF2C30BE3CD738636B98406365045B23CEBB8FDBF53276D0799894426C4506E0EEDFF638039E761799AD
3,321,626 UART: [art] PUB.Y = 730A107D83098A2D9FFFB1C7DCE8CE60B5B29C28FCFBAA2AC2ACC5CDF84B4952ECBD49365E28710C345A84C64BF6EF71
3,328,593 UART: [art] SIG.R = 6E88187F007B0DAC9650749BDB87ED9EDBA29DCE354D7D408736181D0710E8961BB4FA54609E28CDEBD547152C8AE05E
3,335,345 UART: [art] SIG.S = 1234AA98FA07C0DF98D93F92DF93727348C1385261C258C6F2121545A64CE72380C7E4A1F4BF39678E09225329DC3483
3,358,939 UART: Caliptra RT
3,359,282 UART: [state] CFI Enabled
3,479,875 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,915 UART: [rt]cmd =0x44504543, len=96
3,543,037 >>> mbox cmd response data (56 bytes)
3,543,038 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,809 UART: [rt]cmd =0x44504543, len=92
3,765,602 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.11s
Truncated 4681 bytes from beginning
r - Done
3,174,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,462 UART: [art] PUB.X = 7EF3E068B607BF57C6EF574A8E933305F39AEC9E8CA1E72FB4196CE4545C07F82E75AF638C6B522B0DE18D164AE29FD9
3,197,234 UART: [art] PUB.Y = 7B7C929456E1F6A5283203D2C69BC2709117A5026B3A0FC2C678FA782E8A727509C5C001A5C5E1C81D81CE10555299E0
3,204,165 UART: [art] SIG.R = C566E94F43703025DB16A24838D2E34D4A22E41F34B21CD0FA5729585EFB0E87DF447D1860815B8A737C52F6BD56E3EA
3,210,936 UART: [art] SIG.S = ABF37721956D676CA0C17F244B1C0B60C65FFC1709BDB0BC51BCA810CDD15E8740B45FE09A360BE7CE9464FBA9C34E6D
3,235,257 UART: Caliptra RT
3,235,508 UART: [state] CFI Enabled
3,366,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,654 UART: [rt]cmd =0x44504543, len=92
3,589,255 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,760 UART: [state] LifecycleState = Unprovisioned
85,415 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,168 UART: [kat] SHA2-256
890,718 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,822 UART: [kat] ++
894,974 UART: [kat] sha1
899,200 UART: [kat] SHA2-256
901,140 UART: [kat] SHA2-384
903,781 UART: [kat] SHA2-512-ACC
905,682 UART: [kat] ECC-384
915,073 UART: [kat] HMAC-384Kdf
919,651 UART: [kat] LMS
1,167,963 UART: [kat] --
1,169,020 UART: [cold-reset] ++
1,169,396 UART: [fht] FHT @ 0x50003400
1,172,258 UART: [idev] ++
1,172,426 UART: [idev] CDI.KEYID = 6
1,172,787 UART: [idev] SUBJECT.KEYID = 7
1,173,212 UART: [idev] UDS.KEYID = 0
1,173,558 ready_for_fw is high
1,173,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,749 UART: [idev] Erasing UDS.KEYID = 0
1,197,469 UART: [idev] Sha1 KeyId Algorithm
1,206,305 UART: [idev] --
1,207,574 UART: [ldev] ++
1,207,742 UART: [ldev] CDI.KEYID = 6
1,208,106 UART: [ldev] SUBJECT.KEYID = 5
1,208,533 UART: [ldev] AUTHORITY.KEYID = 7
1,208,996 UART: [ldev] FE.KEYID = 1
1,213,898 UART: [ldev] Erasing FE.KEYID = 1
1,240,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,146 UART: [ldev] --
1,279,463 UART: [fwproc] Wait for Commands...
1,280,080 UART: [fwproc] Recv command 0x46574c44
1,280,813 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,009 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,184 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,481 >>> mbox cmd response: success
2,824,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,825,693 UART: [afmc] ++
2,825,861 UART: [afmc] CDI.KEYID = 6
2,826,224 UART: [afmc] SUBJECT.KEYID = 7
2,826,650 UART: [afmc] AUTHORITY.KEYID = 5
2,861,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,170 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,582 UART: [afmc] --
2,904,439 UART: [cold-reset] --
2,905,547 UART: [state] Locking Datavault
2,906,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,432 UART: [state] Locking ICCM
2,908,100 UART: [exit] Launching FMC @ 0x40000130
2,913,430 UART:
2,913,446 UART: Running Caliptra FMC ...
2,913,854 UART:
2,913,908 UART: [state] CFI Enabled
2,924,790 UART: [fht] FMC Alias Private Key: 7
3,044,104 UART: [art] Extend RT PCRs Done
3,044,532 UART: [art] Lock RT PCRs Done
3,046,208 UART: [art] Populate DV Done
3,054,385 UART: [fht] FMC Alias Private Key: 7
3,055,567 UART: [art] Derive CDI
3,055,847 UART: [art] Store in slot 0x4
3,141,680 UART: [art] Derive Key Pair
3,142,040 UART: [art] Store priv key in slot 0x5
3,155,350 UART: [art] Derive Key Pair - Done
3,170,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,491 UART: [art] PUB.X = 7EF3E068B607BF57C6EF574A8E933305F39AEC9E8CA1E72FB4196CE4545C07F82E75AF638C6B522B0DE18D164AE29FD9
3,193,263 UART: [art] PUB.Y = 7B7C929456E1F6A5283203D2C69BC2709117A5026B3A0FC2C678FA782E8A727509C5C001A5C5E1C81D81CE10555299E0
3,200,194 UART: [art] SIG.R = C566E94F43703025DB16A24838D2E34D4A22E41F34B21CD0FA5729585EFB0E87DF447D1860815B8A737C52F6BD56E3EA
3,206,965 UART: [art] SIG.S = ABF37721956D676CA0C17F244B1C0B60C65FFC1709BDB0BC51BCA810CDD15E8740B45FE09A360BE7CE9464FBA9C34E6D
3,231,018 UART: Caliptra RT
3,231,269 UART: [state] CFI Enabled
3,352,029 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,003 UART: [rt]cmd =0x4d454153, len=108
3,403,557 >>> mbox cmd response data (12 bytes)
3,403,558 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,503 UART: [rt]cmd =0x44504543, len=92
3,626,438 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,720 UART: [kat] SHA2-256
891,270 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,374 UART: [kat] ++
895,526 UART: [kat] sha1
899,662 UART: [kat] SHA2-256
901,602 UART: [kat] SHA2-384
904,215 UART: [kat] SHA2-512-ACC
906,116 UART: [kat] ECC-384
916,297 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,478 UART: [fht] FHT @ 0x50003400
1,173,130 UART: [idev] ++
1,173,298 UART: [idev] CDI.KEYID = 6
1,173,659 UART: [idev] SUBJECT.KEYID = 7
1,174,084 UART: [idev] UDS.KEYID = 0
1,174,430 ready_for_fw is high
1,174,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,198,823 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,564 UART: [ldev] ++
1,208,732 UART: [ldev] CDI.KEYID = 6
1,209,096 UART: [ldev] SUBJECT.KEYID = 5
1,209,523 UART: [ldev] AUTHORITY.KEYID = 7
1,209,986 UART: [ldev] FE.KEYID = 1
1,215,036 UART: [ldev] Erasing FE.KEYID = 1
1,240,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,243 UART: [fwproc] Wait for Commands...
1,280,858 UART: [fwproc] Recv command 0x46574c44
1,281,591 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,305 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,635 >>> mbox cmd response: success
2,824,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,839 UART: [afmc] ++
2,826,007 UART: [afmc] CDI.KEYID = 6
2,826,370 UART: [afmc] SUBJECT.KEYID = 7
2,826,796 UART: [afmc] AUTHORITY.KEYID = 5
2,862,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,152 UART: [afmc] --
2,906,027 UART: [cold-reset] --
2,906,847 UART: [state] Locking Datavault
2,908,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,826 UART: [state] Locking ICCM
2,909,320 UART: [exit] Launching FMC @ 0x40000130
2,914,650 UART:
2,914,666 UART: Running Caliptra FMC ...
2,915,074 UART:
2,915,128 UART: [state] CFI Enabled
2,926,014 UART: [fht] FMC Alias Private Key: 7
3,045,432 UART: [art] Extend RT PCRs Done
3,045,860 UART: [art] Lock RT PCRs Done
3,047,396 UART: [art] Populate DV Done
3,055,805 UART: [fht] FMC Alias Private Key: 7
3,056,771 UART: [art] Derive CDI
3,057,051 UART: [art] Store in slot 0x4
3,142,556 UART: [art] Derive Key Pair
3,142,916 UART: [art] Store priv key in slot 0x5
3,155,930 UART: [art] Derive Key Pair - Done
3,170,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,711 UART: [art] PUB.X = 7EF3E068B607BF57C6EF574A8E933305F39AEC9E8CA1E72FB4196CE4545C07F82E75AF638C6B522B0DE18D164AE29FD9
3,193,483 UART: [art] PUB.Y = 7B7C929456E1F6A5283203D2C69BC2709117A5026B3A0FC2C678FA782E8A727509C5C001A5C5E1C81D81CE10555299E0
3,200,414 UART: [art] SIG.R = C566E94F43703025DB16A24838D2E34D4A22E41F34B21CD0FA5729585EFB0E87DF447D1860815B8A737C52F6BD56E3EA
3,207,185 UART: [art] SIG.S = ABF37721956D676CA0C17F244B1C0B60C65FFC1709BDB0BC51BCA810CDD15E8740B45FE09A360BE7CE9464FBA9C34E6D
3,231,634 UART: Caliptra RT
3,231,885 UART: [state] CFI Enabled
3,352,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,437 UART: [rt]cmd =0x44504543, len=96
3,416,901 >>> mbox cmd response data (56 bytes)
3,416,902 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,981 UART: [rt]cmd =0x44504543, len=92
3,638,690 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,141,870 >>> mbox cmd response data (12 bytes)
1,141,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,665 >>> mbox cmd response: success
2,681,665 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,744,262 UART:
2,744,278 UART: Running Caliptra FMC ...
2,744,686 UART:
2,744,740 UART: [state] CFI Enabled
2,754,922 UART: [fht] FMC Alias Private Key: 7
2,873,880 UART: [art] Extend RT PCRs Done
2,874,308 UART: [art] Lock RT PCRs Done
2,875,748 UART: [art] Populate DV Done
2,883,845 UART: [fht] FMC Alias Private Key: 7
2,884,849 UART: [art] Derive CDI
2,885,129 UART: [art] Store in slot 0x4
2,971,154 UART: [art] Derive Key Pair
2,971,514 UART: [art] Store priv key in slot 0x5
2,984,522 UART: [art] Derive Key Pair - Done
2,999,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,420 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,185 UART: [art] PUB.X = 49827B286D3A0C0E154FF4AC34422803F97C1BC5B380A65E6034FA846A1AFDAC524D11CCF1FD14F52FD1F763B34B9C29
3,021,958 UART: [art] PUB.Y = 4F3318F2AC9AF6932DE4E4593D94801BA60C028E41740D7A5B0139FEDB973D9F9736A302E18E6E3F54A5F6E7C63C038F
3,028,896 UART: [art] SIG.R = 6AA45B280CA4DDF24F3A90688BBB2C71ABB3B2AFA4E26EABABABC1549F10D31BAD0E88EA8D982B634953BFC13F4AADEA
3,035,696 UART: [art] SIG.S = 447F77E830DBD5A15D3F1085C8B2BA11438B70DB53827DF8A864ADAD1184BD7896FD63537ED922184EA8CE9328B78627
3,059,246 UART: Caliptra RT
3,059,497 UART: [state] CFI Enabled
3,191,677 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,515 UART: [rt]cmd =0x44504543, len=92
3,415,345 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,724 ready_for_fw is high
1,059,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,262 >>> mbox cmd response: success
2,679,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,740,543 UART:
2,740,559 UART: Running Caliptra FMC ...
2,740,967 UART:
2,741,021 UART: [state] CFI Enabled
2,751,035 UART: [fht] FMC Alias Private Key: 7
2,869,595 UART: [art] Extend RT PCRs Done
2,870,023 UART: [art] Lock RT PCRs Done
2,871,695 UART: [art] Populate DV Done
2,879,940 UART: [fht] FMC Alias Private Key: 7
2,880,936 UART: [art] Derive CDI
2,881,216 UART: [art] Store in slot 0x4
2,966,763 UART: [art] Derive Key Pair
2,967,123 UART: [art] Store priv key in slot 0x5
2,980,687 UART: [art] Derive Key Pair - Done
2,995,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,338 UART: [art] PUB.X = 49827B286D3A0C0E154FF4AC34422803F97C1BC5B380A65E6034FA846A1AFDAC524D11CCF1FD14F52FD1F763B34B9C29
3,018,111 UART: [art] PUB.Y = 4F3318F2AC9AF6932DE4E4593D94801BA60C028E41740D7A5B0139FEDB973D9F9736A302E18E6E3F54A5F6E7C63C038F
3,025,049 UART: [art] SIG.R = 6AA45B280CA4DDF24F3A90688BBB2C71ABB3B2AFA4E26EABABABC1549F10D31BAD0E88EA8D982B634953BFC13F4AADEA
3,031,849 UART: [art] SIG.S = 447F77E830DBD5A15D3F1085C8B2BA11438B70DB53827DF8A864ADAD1184BD7896FD63537ED922184EA8CE9328B78627
3,056,097 UART: Caliptra RT
3,056,348 UART: [state] CFI Enabled
3,175,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,822 UART: [rt]cmd =0x4d454153, len=108
3,227,924 >>> mbox cmd response data (12 bytes)
3,227,925 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,060 UART: [rt]cmd =0x44504543, len=92
3,451,096 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,736 ready_for_fw is high
1,059,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,598 >>> mbox cmd response: success
2,679,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,031 UART:
2,741,047 UART: Running Caliptra FMC ...
2,741,455 UART:
2,741,509 UART: [state] CFI Enabled
2,752,151 UART: [fht] FMC Alias Private Key: 7
2,870,747 UART: [art] Extend RT PCRs Done
2,871,175 UART: [art] Lock RT PCRs Done
2,872,521 UART: [art] Populate DV Done
2,880,760 UART: [fht] FMC Alias Private Key: 7
2,881,884 UART: [art] Derive CDI
2,882,164 UART: [art] Store in slot 0x4
2,967,905 UART: [art] Derive Key Pair
2,968,265 UART: [art] Store priv key in slot 0x5
2,981,355 UART: [art] Derive Key Pair - Done
2,996,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,845 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,610 UART: [art] PUB.X = 49827B286D3A0C0E154FF4AC34422803F97C1BC5B380A65E6034FA846A1AFDAC524D11CCF1FD14F52FD1F763B34B9C29
3,019,383 UART: [art] PUB.Y = 4F3318F2AC9AF6932DE4E4593D94801BA60C028E41740D7A5B0139FEDB973D9F9736A302E18E6E3F54A5F6E7C63C038F
3,026,321 UART: [art] SIG.R = 6AA45B280CA4DDF24F3A90688BBB2C71ABB3B2AFA4E26EABABABC1549F10D31BAD0E88EA8D982B634953BFC13F4AADEA
3,033,121 UART: [art] SIG.S = 447F77E830DBD5A15D3F1085C8B2BA11438B70DB53827DF8A864ADAD1184BD7896FD63537ED922184EA8CE9328B78627
3,057,371 UART: Caliptra RT
3,057,622 UART: [state] CFI Enabled
3,177,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,054 UART: [rt]cmd =0x44504543, len=96
3,242,140 >>> mbox cmd response data (56 bytes)
3,242,141 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,212 UART: [rt]cmd =0x44504543, len=92
3,464,812 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.71s
Truncated 4681 bytes from beginning
r - Done
3,175,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,948 UART: [art] PUB.X = 596AA657E14A89170E3105B2A6E399C6DFA40EE8AFB852295FC89AA096889695538BF15E9181B98E1DEC95666077DFAD
3,198,713 UART: [art] PUB.Y = 8B8398BDA42E2BA0216E0CD6985E40151C89D45C6CF5622727A8C7E6228D159C15718349459051D3D66DC2BE807DCC9F
3,205,660 UART: [art] SIG.R = 3861DEAA30EFCBE0B886AFDEFCBCBDF573325BFBE0F58EEA5785547CDCECE9DE2E85C15CA6DE03258ABAD68E0FE879D2
3,212,464 UART: [art] SIG.S = 1D7374FE296EF24A817356EEBA50B9D008E3FD425E0C8F292824B178BD56BE3CBD0EB763A8CFA66034F9F49654174E9F
3,236,405 UART: Caliptra RT
3,236,748 UART: [state] CFI Enabled
3,369,696 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,898 UART: [rt]cmd =0x44504543, len=92
3,593,869 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,857 UART: [state] LifecycleState = Unprovisioned
85,512 UART: [state] DebugLocked = No
86,238 UART: [state] WD Timer not started. Device not locked for debugging
87,549 UART: [kat] SHA2-256
891,099 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,203 UART: [kat] ++
895,355 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,120 UART: [kat] SHA2-512-ACC
906,021 UART: [kat] ECC-384
915,902 UART: [kat] HMAC-384Kdf
920,510 UART: [kat] LMS
1,168,822 UART: [kat] --
1,169,537 UART: [cold-reset] ++
1,170,009 UART: [fht] FHT @ 0x50003400
1,172,667 UART: [idev] ++
1,172,835 UART: [idev] CDI.KEYID = 6
1,173,196 UART: [idev] SUBJECT.KEYID = 7
1,173,621 UART: [idev] UDS.KEYID = 0
1,173,967 ready_for_fw is high
1,173,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,426 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,241,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,921 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,749 UART: [fwproc] Recv command 0x46574c44
1,282,482 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,492 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,667 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,918 >>> mbox cmd response: success
2,825,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,827,058 UART: [afmc] ++
2,827,226 UART: [afmc] CDI.KEYID = 6
2,827,589 UART: [afmc] SUBJECT.KEYID = 7
2,828,015 UART: [afmc] AUTHORITY.KEYID = 5
2,863,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,518 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,100 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,971 UART: [afmc] --
2,907,020 UART: [cold-reset] --
2,907,918 UART: [state] Locking Datavault
2,909,237 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,841 UART: [state] Locking ICCM
2,910,401 UART: [exit] Launching FMC @ 0x40000130
2,915,731 UART:
2,915,747 UART: Running Caliptra FMC ...
2,916,155 UART:
2,916,298 UART: [state] CFI Enabled
2,926,704 UART: [fht] FMC Alias Private Key: 7
3,045,246 UART: [art] Extend RT PCRs Done
3,045,674 UART: [art] Lock RT PCRs Done
3,047,252 UART: [art] Populate DV Done
3,055,441 UART: [fht] FMC Alias Private Key: 7
3,056,547 UART: [art] Derive CDI
3,056,827 UART: [art] Store in slot 0x4
3,142,600 UART: [art] Derive Key Pair
3,142,960 UART: [art] Store priv key in slot 0x5
3,156,176 UART: [art] Derive Key Pair - Done
3,170,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,440 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,205 UART: [art] PUB.X = 596AA657E14A89170E3105B2A6E399C6DFA40EE8AFB852295FC89AA096889695538BF15E9181B98E1DEC95666077DFAD
3,193,970 UART: [art] PUB.Y = 8B8398BDA42E2BA0216E0CD6985E40151C89D45C6CF5622727A8C7E6228D159C15718349459051D3D66DC2BE807DCC9F
3,200,917 UART: [art] SIG.R = 3861DEAA30EFCBE0B886AFDEFCBCBDF573325BFBE0F58EEA5785547CDCECE9DE2E85C15CA6DE03258ABAD68E0FE879D2
3,207,721 UART: [art] SIG.S = 1D7374FE296EF24A817356EEBA50B9D008E3FD425E0C8F292824B178BD56BE3CBD0EB763A8CFA66034F9F49654174E9F
3,231,312 UART: Caliptra RT
3,231,655 UART: [state] CFI Enabled
3,351,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,877 UART: [rt]cmd =0x4d454153, len=108
3,403,631 >>> mbox cmd response data (12 bytes)
3,403,632 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,573 UART: [rt]cmd =0x44504543, len=92
3,626,838 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,751 UART: [state] LifecycleState = Unprovisioned
86,406 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,155 UART: [kat] SHA2-256
891,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,809 UART: [kat] ++
895,961 UART: [kat] sha1
900,227 UART: [kat] SHA2-256
902,167 UART: [kat] SHA2-384
904,970 UART: [kat] SHA2-512-ACC
906,871 UART: [kat] ECC-384
916,848 UART: [kat] HMAC-384Kdf
921,360 UART: [kat] LMS
1,169,672 UART: [kat] --
1,170,525 UART: [cold-reset] ++
1,170,925 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,175,011 ready_for_fw is high
1,175,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,850 UART: [idev] Erasing UDS.KEYID = 0
1,199,680 UART: [idev] Sha1 KeyId Algorithm
1,208,496 UART: [idev] --
1,209,557 UART: [ldev] ++
1,209,725 UART: [ldev] CDI.KEYID = 6
1,210,089 UART: [ldev] SUBJECT.KEYID = 5
1,210,516 UART: [ldev] AUTHORITY.KEYID = 7
1,210,979 UART: [ldev] FE.KEYID = 1
1,216,251 UART: [ldev] Erasing FE.KEYID = 1
1,242,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,357 UART: [ldev] --
1,281,782 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,049 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,251 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,514 >>> mbox cmd response: success
2,825,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,758 UART: [afmc] ++
2,826,926 UART: [afmc] CDI.KEYID = 6
2,827,289 UART: [afmc] SUBJECT.KEYID = 7
2,827,715 UART: [afmc] AUTHORITY.KEYID = 5
2,863,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,579 UART: [afmc] --
2,906,458 UART: [cold-reset] --
2,907,470 UART: [state] Locking Datavault
2,908,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,937 UART: [state] Locking ICCM
2,909,481 UART: [exit] Launching FMC @ 0x40000130
2,914,811 UART:
2,914,827 UART: Running Caliptra FMC ...
2,915,235 UART:
2,915,378 UART: [state] CFI Enabled
2,926,176 UART: [fht] FMC Alias Private Key: 7
3,045,258 UART: [art] Extend RT PCRs Done
3,045,686 UART: [art] Lock RT PCRs Done
3,047,472 UART: [art] Populate DV Done
3,055,693 UART: [fht] FMC Alias Private Key: 7
3,056,731 UART: [art] Derive CDI
3,057,011 UART: [art] Store in slot 0x4
3,142,824 UART: [art] Derive Key Pair
3,143,184 UART: [art] Store priv key in slot 0x5
3,156,176 UART: [art] Derive Key Pair - Done
3,171,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,439 UART: [art] PUB.X = 596AA657E14A89170E3105B2A6E399C6DFA40EE8AFB852295FC89AA096889695538BF15E9181B98E1DEC95666077DFAD
3,194,204 UART: [art] PUB.Y = 8B8398BDA42E2BA0216E0CD6985E40151C89D45C6CF5622727A8C7E6228D159C15718349459051D3D66DC2BE807DCC9F
3,201,151 UART: [art] SIG.R = 3861DEAA30EFCBE0B886AFDEFCBCBDF573325BFBE0F58EEA5785547CDCECE9DE2E85C15CA6DE03258ABAD68E0FE879D2
3,207,955 UART: [art] SIG.S = 1D7374FE296EF24A817356EEBA50B9D008E3FD425E0C8F292824B178BD56BE3CBD0EB763A8CFA66034F9F49654174E9F
3,231,914 UART: Caliptra RT
3,232,257 UART: [state] CFI Enabled
3,351,519 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,441 UART: [rt]cmd =0x44504543, len=96
3,415,441 >>> mbox cmd response data (56 bytes)
3,415,442 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,401 UART: [rt]cmd =0x44504543, len=92
3,637,530 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,731 >>> mbox cmd response data (12 bytes)
1,143,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,388 >>> mbox cmd response: success
2,683,388 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,745,201 UART:
2,745,217 UART: Running Caliptra FMC ...
2,745,625 UART:
2,745,768 UART: [state] CFI Enabled
2,756,706 UART: [fht] FMC Alias Private Key: 7
2,875,100 UART: [art] Extend RT PCRs Done
2,875,528 UART: [art] Lock RT PCRs Done
2,877,118 UART: [art] Populate DV Done
2,885,257 UART: [fht] FMC Alias Private Key: 7
2,886,267 UART: [art] Derive CDI
2,886,547 UART: [art] Store in slot 0x4
2,972,722 UART: [art] Derive Key Pair
2,973,082 UART: [art] Store priv key in slot 0x5
2,985,634 UART: [art] Derive Key Pair - Done
3,000,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,347 UART: [art] PUB.X = 9C43B1F25FABE2A28C8834CC7491B4DFB552A362E58D9879A72E9F0DC4E723DCA21ACEBD11C26637D34FDAE0ADB1ED7C
3,023,140 UART: [art] PUB.Y = 5EB25983881EB5036FD52E99DFFE80AA62601FFF73C5255571C561DB878BAA4FAF67A644F776F0E76C984D986FF50031
3,030,071 UART: [art] SIG.R = C213AD0DDEF416A913ED4512EDBD83540BD4DC6A8DF0B89547FE3FA17BC09FD5FE5AFE54C159F96DD1C09B8D149D74CF
3,036,863 UART: [art] SIG.S = 1A4C1833FC403F7C00125737C0D2BC210A2AF8AA26D6AA82E9C864F461CCAB086AE92FBB55F02F0F1C24D4557F342CA9
3,060,878 UART: Caliptra RT
3,061,221 UART: [state] CFI Enabled
3,193,936 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,088 UART: [rt]cmd =0x44504543, len=92
3,417,342 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,311 ready_for_fw is high
1,059,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,731 >>> mbox cmd response: success
2,677,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,739,106 UART:
2,739,122 UART: Running Caliptra FMC ...
2,739,530 UART:
2,739,673 UART: [state] CFI Enabled
2,750,199 UART: [fht] FMC Alias Private Key: 7
2,869,283 UART: [art] Extend RT PCRs Done
2,869,711 UART: [art] Lock RT PCRs Done
2,870,853 UART: [art] Populate DV Done
2,879,010 UART: [fht] FMC Alias Private Key: 7
2,880,116 UART: [art] Derive CDI
2,880,396 UART: [art] Store in slot 0x4
2,965,881 UART: [art] Derive Key Pair
2,966,241 UART: [art] Store priv key in slot 0x5
2,979,209 UART: [art] Derive Key Pair - Done
2,994,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,539 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,304 UART: [art] PUB.X = 9C43B1F25FABE2A28C8834CC7491B4DFB552A362E58D9879A72E9F0DC4E723DCA21ACEBD11C26637D34FDAE0ADB1ED7C
3,017,097 UART: [art] PUB.Y = 5EB25983881EB5036FD52E99DFFE80AA62601FFF73C5255571C561DB878BAA4FAF67A644F776F0E76C984D986FF50031
3,024,028 UART: [art] SIG.R = C213AD0DDEF416A913ED4512EDBD83540BD4DC6A8DF0B89547FE3FA17BC09FD5FE5AFE54C159F96DD1C09B8D149D74CF
3,030,820 UART: [art] SIG.S = 1A4C1833FC403F7C00125737C0D2BC210A2AF8AA26D6AA82E9C864F461CCAB086AE92FBB55F02F0F1C24D4557F342CA9
3,055,113 UART: Caliptra RT
3,055,456 UART: [state] CFI Enabled
3,176,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,209 UART: [rt]cmd =0x4d454153, len=108
3,228,343 >>> mbox cmd response data (12 bytes)
3,228,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,258,175 UART: [rt]cmd =0x44504543, len=92
3,450,331 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,937 ready_for_fw is high
1,058,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,249 >>> mbox cmd response: success
2,679,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,474 UART:
2,740,490 UART: Running Caliptra FMC ...
2,740,898 UART:
2,741,041 UART: [state] CFI Enabled
2,751,955 UART: [fht] FMC Alias Private Key: 7
2,871,145 UART: [art] Extend RT PCRs Done
2,871,573 UART: [art] Lock RT PCRs Done
2,872,795 UART: [art] Populate DV Done
2,881,102 UART: [fht] FMC Alias Private Key: 7
2,882,158 UART: [art] Derive CDI
2,882,438 UART: [art] Store in slot 0x4
2,968,297 UART: [art] Derive Key Pair
2,968,657 UART: [art] Store priv key in slot 0x5
2,982,151 UART: [art] Derive Key Pair - Done
2,996,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,362 UART: [art] PUB.X = 9C43B1F25FABE2A28C8834CC7491B4DFB552A362E58D9879A72E9F0DC4E723DCA21ACEBD11C26637D34FDAE0ADB1ED7C
3,020,155 UART: [art] PUB.Y = 5EB25983881EB5036FD52E99DFFE80AA62601FFF73C5255571C561DB878BAA4FAF67A644F776F0E76C984D986FF50031
3,027,086 UART: [art] SIG.R = C213AD0DDEF416A913ED4512EDBD83540BD4DC6A8DF0B89547FE3FA17BC09FD5FE5AFE54C159F96DD1C09B8D149D74CF
3,033,878 UART: [art] SIG.S = 1A4C1833FC403F7C00125737C0D2BC210A2AF8AA26D6AA82E9C864F461CCAB086AE92FBB55F02F0F1C24D4557F342CA9
3,057,353 UART: Caliptra RT
3,057,696 UART: [state] CFI Enabled
3,177,299 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,211 UART: [rt]cmd =0x44504543, len=96
3,241,515 >>> mbox cmd response data (56 bytes)
3,241,516 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,443 UART: [rt]cmd =0x44504543, len=92
3,464,045 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.88s
Truncated 4681 bytes from beginning
r - Done
3,176,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,210 UART: [art] PUB.X = 7CFC57A30D54ED5034C666253185ECEACC8FCF28DE6CBE8177F80B8FB14377A1CC332B6A762F61C60E03C9A0ED092272
3,198,979 UART: [art] PUB.Y = C7E6EBB5109FA60576813F49A0EAB077C189DCBE515D46D3CBBFEAC6099388D0EFB213A418EE16DF9730EBFFF472D3C9
3,205,945 UART: [art] SIG.R = 852C0938119AE845482133CC16DA7467A114B7BD6B90DB0E3FC97427EA9E8FB6C680E5D3AD9EAE4C3000F4707456976D
3,212,691 UART: [art] SIG.S = 28588DD1961519C49566DDD3124D30220766800D6705324023F4723CC36AE9476452412CCF22F74910ADBBEF48A44E87
3,236,194 UART: Caliptra RT
3,236,445 UART: [state] CFI Enabled
3,368,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,022 UART: [rt]cmd =0x44504543, len=92
3,592,009 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,565 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
893,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,645 UART: [kat] ++
897,797 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
918,714 UART: [kat] HMAC-384Kdf
923,388 UART: [kat] LMS
1,171,716 UART: [kat] --
1,172,661 UART: [cold-reset] ++
1,173,155 UART: [fht] FHT @ 0x50003400
1,175,906 UART: [idev] ++
1,176,074 UART: [idev] CDI.KEYID = 6
1,176,434 UART: [idev] SUBJECT.KEYID = 7
1,176,858 UART: [idev] UDS.KEYID = 0
1,177,203 ready_for_fw is high
1,177,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,840 UART: [idev] Erasing UDS.KEYID = 0
1,201,475 UART: [idev] Sha1 KeyId Algorithm
1,210,013 UART: [idev] --
1,211,253 UART: [ldev] ++
1,211,421 UART: [ldev] CDI.KEYID = 6
1,211,784 UART: [ldev] SUBJECT.KEYID = 5
1,212,210 UART: [ldev] AUTHORITY.KEYID = 7
1,212,673 UART: [ldev] FE.KEYID = 1
1,217,995 UART: [ldev] Erasing FE.KEYID = 1
1,244,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,165 UART: [ldev] --
1,283,556 UART: [fwproc] Wait for Commands...
1,284,318 UART: [fwproc] Recv command 0x46574c44
1,285,046 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,701 >>> mbox cmd response: success
2,827,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,828,877 UART: [afmc] ++
2,829,045 UART: [afmc] CDI.KEYID = 6
2,829,407 UART: [afmc] SUBJECT.KEYID = 7
2,829,832 UART: [afmc] AUTHORITY.KEYID = 5
2,865,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,982 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,730 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,322 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,023 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,875 UART: [afmc] --
2,908,863 UART: [cold-reset] --
2,909,513 UART: [state] Locking Datavault
2,910,860 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,464 UART: [state] Locking ICCM
2,912,034 UART: [exit] Launching FMC @ 0x40000130
2,917,364 UART:
2,917,380 UART: Running Caliptra FMC ...
2,917,788 UART:
2,917,842 UART: [state] CFI Enabled
2,928,230 UART: [fht] FMC Alias Private Key: 7
3,047,044 UART: [art] Extend RT PCRs Done
3,047,472 UART: [art] Lock RT PCRs Done
3,048,900 UART: [art] Populate DV Done
3,057,277 UART: [fht] FMC Alias Private Key: 7
3,058,225 UART: [art] Derive CDI
3,058,505 UART: [art] Store in slot 0x4
3,144,300 UART: [art] Derive Key Pair
3,144,660 UART: [art] Store priv key in slot 0x5
3,157,634 UART: [art] Derive Key Pair - Done
3,172,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,251 UART: [art] PUB.X = 7CFC57A30D54ED5034C666253185ECEACC8FCF28DE6CBE8177F80B8FB14377A1CC332B6A762F61C60E03C9A0ED092272
3,195,020 UART: [art] PUB.Y = C7E6EBB5109FA60576813F49A0EAB077C189DCBE515D46D3CBBFEAC6099388D0EFB213A418EE16DF9730EBFFF472D3C9
3,201,986 UART: [art] SIG.R = 852C0938119AE845482133CC16DA7467A114B7BD6B90DB0E3FC97427EA9E8FB6C680E5D3AD9EAE4C3000F4707456976D
3,208,732 UART: [art] SIG.S = 28588DD1961519C49566DDD3124D30220766800D6705324023F4723CC36AE9476452412CCF22F74910ADBBEF48A44E87
3,232,255 UART: Caliptra RT
3,232,506 UART: [state] CFI Enabled
3,352,027 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,143 UART: [rt]cmd =0x4d454153, len=108
3,403,737 >>> mbox cmd response data (12 bytes)
3,403,738 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,867 UART: [rt]cmd =0x44504543, len=92
3,626,778 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,670 UART: [kat] SHA2-256
893,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,445 UART: [kat] ++
897,597 UART: [kat] sha1
901,583 UART: [kat] SHA2-256
903,523 UART: [kat] SHA2-384
906,276 UART: [kat] SHA2-512-ACC
908,177 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,328 UART: [kat] LMS
1,170,656 UART: [kat] --
1,171,335 UART: [cold-reset] ++
1,171,709 UART: [fht] FHT @ 0x50003400
1,174,310 UART: [idev] ++
1,174,478 UART: [idev] CDI.KEYID = 6
1,174,838 UART: [idev] SUBJECT.KEYID = 7
1,175,262 UART: [idev] UDS.KEYID = 0
1,175,607 ready_for_fw is high
1,175,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,604 UART: [idev] Erasing UDS.KEYID = 0
1,200,271 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,688 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,242,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,463 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,072 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,395 >>> mbox cmd response: success
2,826,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,471 UART: [afmc] ++
2,827,639 UART: [afmc] CDI.KEYID = 6
2,828,001 UART: [afmc] SUBJECT.KEYID = 7
2,828,426 UART: [afmc] AUTHORITY.KEYID = 5
2,864,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,332 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,033 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,853 UART: [afmc] --
2,907,965 UART: [cold-reset] --
2,908,849 UART: [state] Locking Datavault
2,909,892 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,496 UART: [state] Locking ICCM
2,910,956 UART: [exit] Launching FMC @ 0x40000130
2,916,286 UART:
2,916,302 UART: Running Caliptra FMC ...
2,916,710 UART:
2,916,764 UART: [state] CFI Enabled
2,927,446 UART: [fht] FMC Alias Private Key: 7
3,046,006 UART: [art] Extend RT PCRs Done
3,046,434 UART: [art] Lock RT PCRs Done
3,048,286 UART: [art] Populate DV Done
3,056,365 UART: [fht] FMC Alias Private Key: 7
3,057,301 UART: [art] Derive CDI
3,057,581 UART: [art] Store in slot 0x4
3,143,452 UART: [art] Derive Key Pair
3,143,812 UART: [art] Store priv key in slot 0x5
3,156,536 UART: [art] Derive Key Pair - Done
3,171,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,703 UART: [art] PUB.X = 7CFC57A30D54ED5034C666253185ECEACC8FCF28DE6CBE8177F80B8FB14377A1CC332B6A762F61C60E03C9A0ED092272
3,193,472 UART: [art] PUB.Y = C7E6EBB5109FA60576813F49A0EAB077C189DCBE515D46D3CBBFEAC6099388D0EFB213A418EE16DF9730EBFFF472D3C9
3,200,438 UART: [art] SIG.R = 852C0938119AE845482133CC16DA7467A114B7BD6B90DB0E3FC97427EA9E8FB6C680E5D3AD9EAE4C3000F4707456976D
3,207,184 UART: [art] SIG.S = 28588DD1961519C49566DDD3124D30220766800D6705324023F4723CC36AE9476452412CCF22F74910ADBBEF48A44E87
3,230,825 UART: Caliptra RT
3,231,076 UART: [state] CFI Enabled
3,351,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,887 UART: [rt]cmd =0x44504543, len=96
3,415,737 >>> mbox cmd response data (56 bytes)
3,415,738 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,847 UART: [rt]cmd =0x44504543, len=92
3,638,114 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,143,607 >>> mbox cmd response data (12 bytes)
1,143,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,684,415 >>> mbox cmd response: success
2,684,415 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,746,862 UART:
2,746,878 UART: Running Caliptra FMC ...
2,747,286 UART:
2,747,340 UART: [state] CFI Enabled
2,757,880 UART: [fht] FMC Alias Private Key: 7
2,876,480 UART: [art] Extend RT PCRs Done
2,876,908 UART: [art] Lock RT PCRs Done
2,878,530 UART: [art] Populate DV Done
2,886,721 UART: [fht] FMC Alias Private Key: 7
2,887,671 UART: [art] Derive CDI
2,887,951 UART: [art] Store in slot 0x4
2,973,712 UART: [art] Derive Key Pair
2,974,072 UART: [art] Store priv key in slot 0x5
2,987,424 UART: [art] Derive Key Pair - Done
3,002,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,070 UART: [art] PUB.X = 2ACC2AE667E9FAE7C0F7391DAF4C0C489F8899C44A36D10A0187079F3E034EF8BAB9645246452C2BCDA1562F93EE4DC7
3,024,839 UART: [art] PUB.Y = 221D9A6D7F9C0AAABA69A35A3D88D8C8AC54E5CD319E52ADE8D89525E377999A0DBC005FF8926348B142FE750C179CDA
3,031,774 UART: [art] SIG.R = 9E428AB44BCB36B4A8BB2E50BBFA6D6EE2CFC7BC83D700A8D2BF5970D473A89994B5F39982DD9634161E96FCD5069898
3,038,533 UART: [art] SIG.S = D83797BFEC23FD4EAFB1B9DC46C9456F1A85BA31EE0FE6444FEEBD10332F96291BD5BD221C232A2AAA0EA4FB4169A25E
3,061,551 UART: Caliptra RT
3,061,802 UART: [state] CFI Enabled
3,193,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,656 UART: [rt]cmd =0x44504543, len=92
3,416,170 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,923 ready_for_fw is high
1,059,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,878 >>> mbox cmd response: success
2,678,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,741,315 UART:
2,741,331 UART: Running Caliptra FMC ...
2,741,739 UART:
2,741,793 UART: [state] CFI Enabled
2,752,269 UART: [fht] FMC Alias Private Key: 7
2,871,003 UART: [art] Extend RT PCRs Done
2,871,431 UART: [art] Lock RT PCRs Done
2,872,975 UART: [art] Populate DV Done
2,881,182 UART: [fht] FMC Alias Private Key: 7
2,882,300 UART: [art] Derive CDI
2,882,580 UART: [art] Store in slot 0x4
2,968,627 UART: [art] Derive Key Pair
2,968,987 UART: [art] Store priv key in slot 0x5
2,982,261 UART: [art] Derive Key Pair - Done
2,996,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,543 UART: [art] PUB.X = 2ACC2AE667E9FAE7C0F7391DAF4C0C489F8899C44A36D10A0187079F3E034EF8BAB9645246452C2BCDA1562F93EE4DC7
3,020,312 UART: [art] PUB.Y = 221D9A6D7F9C0AAABA69A35A3D88D8C8AC54E5CD319E52ADE8D89525E377999A0DBC005FF8926348B142FE750C179CDA
3,027,247 UART: [art] SIG.R = 9E428AB44BCB36B4A8BB2E50BBFA6D6EE2CFC7BC83D700A8D2BF5970D473A89994B5F39982DD9634161E96FCD5069898
3,034,006 UART: [art] SIG.S = D83797BFEC23FD4EAFB1B9DC46C9456F1A85BA31EE0FE6444FEEBD10332F96291BD5BD221C232A2AAA0EA4FB4169A25E
3,058,374 UART: Caliptra RT
3,058,625 UART: [state] CFI Enabled
3,177,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,713 UART: [rt]cmd =0x4d454153, len=108
3,229,521 >>> mbox cmd response data (12 bytes)
3,229,522 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,259,351 UART: [rt]cmd =0x44504543, len=92
3,452,209 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,123 ready_for_fw is high
1,060,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,072 >>> mbox cmd response: success
2,679,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,645 UART:
2,740,661 UART: Running Caliptra FMC ...
2,741,069 UART:
2,741,123 UART: [state] CFI Enabled
2,751,513 UART: [fht] FMC Alias Private Key: 7
2,870,495 UART: [art] Extend RT PCRs Done
2,870,923 UART: [art] Lock RT PCRs Done
2,872,399 UART: [art] Populate DV Done
2,880,594 UART: [fht] FMC Alias Private Key: 7
2,881,588 UART: [art] Derive CDI
2,881,868 UART: [art] Store in slot 0x4
2,967,807 UART: [art] Derive Key Pair
2,968,167 UART: [art] Store priv key in slot 0x5
2,980,633 UART: [art] Derive Key Pair - Done
2,995,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,927 UART: [art] PUB.X = 2ACC2AE667E9FAE7C0F7391DAF4C0C489F8899C44A36D10A0187079F3E034EF8BAB9645246452C2BCDA1562F93EE4DC7
3,017,696 UART: [art] PUB.Y = 221D9A6D7F9C0AAABA69A35A3D88D8C8AC54E5CD319E52ADE8D89525E377999A0DBC005FF8926348B142FE750C179CDA
3,024,631 UART: [art] SIG.R = 9E428AB44BCB36B4A8BB2E50BBFA6D6EE2CFC7BC83D700A8D2BF5970D473A89994B5F39982DD9634161E96FCD5069898
3,031,390 UART: [art] SIG.S = D83797BFEC23FD4EAFB1B9DC46C9456F1A85BA31EE0FE6444FEEBD10332F96291BD5BD221C232A2AAA0EA4FB4169A25E
3,055,030 UART: Caliptra RT
3,055,281 UART: [state] CFI Enabled
3,175,815 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,987 UART: [rt]cmd =0x44504543, len=96
3,239,801 >>> mbox cmd response data (56 bytes)
3,239,802 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,675 UART: [rt]cmd =0x44504543, len=92
3,461,647 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.18s
Truncated 4681 bytes from beginning
r - Done
3,176,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,242 UART: [art] PUB.X = 5C2409E78F3190C0DCEA3C28D9DC9074176167379A061368D69BB89E3C237D5A58F264BC68C53AA3DC1FC879A26E7D4F
3,200,012 UART: [art] PUB.Y = A639D3587376780E8216181D1C9C9078C8F1F0942BCCD31607276843F3BFBE3DCF8EFEA45B1D11F3367B3133A149EA43
3,206,958 UART: [art] SIG.R = 7EF5911F4E57346E9997E65F88D7A52E9A001D52E54E4449FE68D30896C706A072E25E374AA10103E4398BD0254EDBA7
3,213,692 UART: [art] SIG.S = 18C521FF17225E59766558B3C3C8C28C1F99E92449CFA7C87ECB9D3DF858D895458B685A57B22ABE809AD32EEB0325D4
3,237,355 UART: Caliptra RT
3,237,698 UART: [state] CFI Enabled
3,370,284 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,310 UART: [rt]cmd =0x44504543, len=92
3,593,734 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,951 UART: [kat] SHA2-256
893,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,726 UART: [kat] ++
897,878 UART: [kat] sha1
902,014 UART: [kat] SHA2-256
903,954 UART: [kat] SHA2-384
906,599 UART: [kat] SHA2-512-ACC
908,500 UART: [kat] ECC-384
918,479 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,464 UART: [cold-reset] ++
1,172,870 UART: [fht] FHT @ 0x50003400
1,175,419 UART: [idev] ++
1,175,587 UART: [idev] CDI.KEYID = 6
1,175,947 UART: [idev] SUBJECT.KEYID = 7
1,176,371 UART: [idev] UDS.KEYID = 0
1,176,716 ready_for_fw is high
1,176,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,883 UART: [idev] Erasing UDS.KEYID = 0
1,200,780 UART: [idev] Sha1 KeyId Algorithm
1,209,312 UART: [idev] --
1,210,380 UART: [ldev] ++
1,210,548 UART: [ldev] CDI.KEYID = 6
1,210,911 UART: [ldev] SUBJECT.KEYID = 5
1,211,337 UART: [ldev] AUTHORITY.KEYID = 7
1,211,800 UART: [ldev] FE.KEYID = 1
1,217,220 UART: [ldev] Erasing FE.KEYID = 1
1,242,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,336 UART: [ldev] --
1,281,793 UART: [fwproc] Wait for Commands...
1,282,363 UART: [fwproc] Recv command 0x46574c44
1,283,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,926 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,219 >>> mbox cmd response: success
2,825,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,826,461 UART: [afmc] ++
2,826,629 UART: [afmc] CDI.KEYID = 6
2,826,991 UART: [afmc] SUBJECT.KEYID = 7
2,827,416 UART: [afmc] AUTHORITY.KEYID = 5
2,862,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,042 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,163 UART: [afmc] --
2,906,243 UART: [cold-reset] --
2,907,171 UART: [state] Locking Datavault
2,908,248 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,852 UART: [state] Locking ICCM
2,909,406 UART: [exit] Launching FMC @ 0x40000130
2,914,736 UART:
2,914,752 UART: Running Caliptra FMC ...
2,915,160 UART:
2,915,303 UART: [state] CFI Enabled
2,925,971 UART: [fht] FMC Alias Private Key: 7
3,045,145 UART: [art] Extend RT PCRs Done
3,045,573 UART: [art] Lock RT PCRs Done
3,047,447 UART: [art] Populate DV Done
3,055,680 UART: [fht] FMC Alias Private Key: 7
3,056,660 UART: [art] Derive CDI
3,056,940 UART: [art] Store in slot 0x4
3,142,461 UART: [art] Derive Key Pair
3,142,821 UART: [art] Store priv key in slot 0x5
3,156,865 UART: [art] Derive Key Pair - Done
3,171,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,691 UART: [art] PUB.X = 5C2409E78F3190C0DCEA3C28D9DC9074176167379A061368D69BB89E3C237D5A58F264BC68C53AA3DC1FC879A26E7D4F
3,194,461 UART: [art] PUB.Y = A639D3587376780E8216181D1C9C9078C8F1F0942BCCD31607276843F3BFBE3DCF8EFEA45B1D11F3367B3133A149EA43
3,201,407 UART: [art] SIG.R = 7EF5911F4E57346E9997E65F88D7A52E9A001D52E54E4449FE68D30896C706A072E25E374AA10103E4398BD0254EDBA7
3,208,141 UART: [art] SIG.S = 18C521FF17225E59766558B3C3C8C28C1F99E92449CFA7C87ECB9D3DF858D895458B685A57B22ABE809AD32EEB0325D4
3,232,546 UART: Caliptra RT
3,232,889 UART: [state] CFI Enabled
3,352,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,795 UART: [rt]cmd =0x4d454153, len=108
3,403,161 >>> mbox cmd response data (12 bytes)
3,403,162 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,241 UART: [rt]cmd =0x44504543, len=92
3,624,869 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,228 UART: [state] WD Timer not started. Device not locked for debugging
88,531 UART: [kat] SHA2-256
894,181 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,306 UART: [kat] ++
898,458 UART: [kat] sha1
902,560 UART: [kat] SHA2-256
904,500 UART: [kat] SHA2-384
907,251 UART: [kat] SHA2-512-ACC
909,152 UART: [kat] ECC-384
919,403 UART: [kat] HMAC-384Kdf
924,081 UART: [kat] LMS
1,172,409 UART: [kat] --
1,173,302 UART: [cold-reset] ++
1,173,686 UART: [fht] FHT @ 0x50003400
1,176,287 UART: [idev] ++
1,176,455 UART: [idev] CDI.KEYID = 6
1,176,815 UART: [idev] SUBJECT.KEYID = 7
1,177,239 UART: [idev] UDS.KEYID = 0
1,177,584 ready_for_fw is high
1,177,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,749 UART: [idev] Erasing UDS.KEYID = 0
1,202,142 UART: [idev] Sha1 KeyId Algorithm
1,210,640 UART: [idev] --
1,211,706 UART: [ldev] ++
1,211,874 UART: [ldev] CDI.KEYID = 6
1,212,237 UART: [ldev] SUBJECT.KEYID = 5
1,212,663 UART: [ldev] AUTHORITY.KEYID = 7
1,213,126 UART: [ldev] FE.KEYID = 1
1,218,478 UART: [ldev] Erasing FE.KEYID = 1
1,245,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,440 UART: [ldev] --
1,284,737 UART: [fwproc] Wait for Commands...
1,285,487 UART: [fwproc] Recv command 0x46574c44
1,286,215 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,681 >>> mbox cmd response: success
2,828,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,767 UART: [afmc] ++
2,829,935 UART: [afmc] CDI.KEYID = 6
2,830,297 UART: [afmc] SUBJECT.KEYID = 7
2,830,722 UART: [afmc] AUTHORITY.KEYID = 5
2,866,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,584 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,285 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,063 UART: [afmc] --
2,909,189 UART: [cold-reset] --
2,910,055 UART: [state] Locking Datavault
2,911,192 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,796 UART: [state] Locking ICCM
2,912,248 UART: [exit] Launching FMC @ 0x40000130
2,917,578 UART:
2,917,594 UART: Running Caliptra FMC ...
2,918,002 UART:
2,918,145 UART: [state] CFI Enabled
2,928,861 UART: [fht] FMC Alias Private Key: 7
3,048,783 UART: [art] Extend RT PCRs Done
3,049,211 UART: [art] Lock RT PCRs Done
3,050,625 UART: [art] Populate DV Done
3,058,900 UART: [fht] FMC Alias Private Key: 7
3,059,994 UART: [art] Derive CDI
3,060,274 UART: [art] Store in slot 0x4
3,146,359 UART: [art] Derive Key Pair
3,146,719 UART: [art] Store priv key in slot 0x5
3,160,173 UART: [art] Derive Key Pair - Done
3,175,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,347 UART: [art] PUB.X = 5C2409E78F3190C0DCEA3C28D9DC9074176167379A061368D69BB89E3C237D5A58F264BC68C53AA3DC1FC879A26E7D4F
3,198,117 UART: [art] PUB.Y = A639D3587376780E8216181D1C9C9078C8F1F0942BCCD31607276843F3BFBE3DCF8EFEA45B1D11F3367B3133A149EA43
3,205,063 UART: [art] SIG.R = 7EF5911F4E57346E9997E65F88D7A52E9A001D52E54E4449FE68D30896C706A072E25E374AA10103E4398BD0254EDBA7
3,211,797 UART: [art] SIG.S = 18C521FF17225E59766558B3C3C8C28C1F99E92449CFA7C87ECB9D3DF858D895458B685A57B22ABE809AD32EEB0325D4
3,235,768 UART: Caliptra RT
3,236,111 UART: [state] CFI Enabled
3,356,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,289 UART: [rt]cmd =0x44504543, len=96
3,419,485 >>> mbox cmd response data (56 bytes)
3,419,486 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,451 UART: [rt]cmd =0x44504543, len=92
3,640,675 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
1,145,352 >>> mbox cmd response data (12 bytes)
1,145,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,684,952 >>> mbox cmd response: success
2,684,952 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,747,253 UART:
2,747,269 UART: Running Caliptra FMC ...
2,747,677 UART:
2,747,820 UART: [state] CFI Enabled
2,758,196 UART: [fht] FMC Alias Private Key: 7
2,877,342 UART: [art] Extend RT PCRs Done
2,877,770 UART: [art] Lock RT PCRs Done
2,879,412 UART: [art] Populate DV Done
2,887,625 UART: [fht] FMC Alias Private Key: 7
2,888,759 UART: [art] Derive CDI
2,889,039 UART: [art] Store in slot 0x4
2,974,850 UART: [art] Derive Key Pair
2,975,210 UART: [art] Store priv key in slot 0x5
2,988,422 UART: [art] Derive Key Pair - Done
3,003,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,019,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,019,917 UART: [art] PUB.X = F0AD0874DADA2A2FAEAB517397FD6C7FF1D68DEFF77F0AA94FA304F054944AB37A47E5F481F686D3C20047345C8F064C
3,026,671 UART: [art] PUB.Y = F3C716068D0FF97F52703536031C60C0046133AA9318D0041F7936AB0872D4D4E5D31A35C876E866D8FCE6A8B2FF6BB1
3,033,603 UART: [art] SIG.R = C61077E584F73D6721E9F8EDD4530778062AE54484575D347FE59A9CDFC3B2EA55F33D73A19117196D05B758022075CA
3,040,357 UART: [art] SIG.S = F1970F08D2AD7829A3303832E553FAAD5563BAA3C19488C29179AE93D87D7FA09075B1679F69027A0B517F88FDDDBDD5
3,064,103 UART: Caliptra RT
3,064,446 UART: [state] CFI Enabled
3,194,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,798 UART: [rt]cmd =0x44504543, len=92
3,418,165 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,628 ready_for_fw is high
1,060,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,603 >>> mbox cmd response: success
2,680,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,742,838 UART:
2,742,854 UART: Running Caliptra FMC ...
2,743,262 UART:
2,743,405 UART: [state] CFI Enabled
2,754,011 UART: [fht] FMC Alias Private Key: 7
2,873,097 UART: [art] Extend RT PCRs Done
2,873,525 UART: [art] Lock RT PCRs Done
2,875,283 UART: [art] Populate DV Done
2,883,456 UART: [fht] FMC Alias Private Key: 7
2,884,580 UART: [art] Derive CDI
2,884,860 UART: [art] Store in slot 0x4
2,970,911 UART: [art] Derive Key Pair
2,971,271 UART: [art] Store priv key in slot 0x5
2,984,353 UART: [art] Derive Key Pair - Done
2,999,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,620 UART: [art] PUB.X = F0AD0874DADA2A2FAEAB517397FD6C7FF1D68DEFF77F0AA94FA304F054944AB37A47E5F481F686D3C20047345C8F064C
3,022,374 UART: [art] PUB.Y = F3C716068D0FF97F52703536031C60C0046133AA9318D0041F7936AB0872D4D4E5D31A35C876E866D8FCE6A8B2FF6BB1
3,029,306 UART: [art] SIG.R = C61077E584F73D6721E9F8EDD4530778062AE54484575D347FE59A9CDFC3B2EA55F33D73A19117196D05B758022075CA
3,036,060 UART: [art] SIG.S = F1970F08D2AD7829A3303832E553FAAD5563BAA3C19488C29179AE93D87D7FA09075B1679F69027A0B517F88FDDDBDD5
3,059,352 UART: Caliptra RT
3,059,695 UART: [state] CFI Enabled
3,179,499 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,559 UART: [rt]cmd =0x4d454153, len=108
3,231,119 >>> mbox cmd response data (12 bytes)
3,231,120 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,215 UART: [rt]cmd =0x44504543, len=92
3,453,042 >>> mbox cmd response data (6284 bytes)
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,276 ready_for_fw is high
1,061,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,967 >>> mbox cmd response: success
2,678,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,718 UART:
2,741,734 UART: Running Caliptra FMC ...
2,742,142 UART:
2,742,285 UART: [state] CFI Enabled
2,753,287 UART: [fht] FMC Alias Private Key: 7
2,872,071 UART: [art] Extend RT PCRs Done
2,872,499 UART: [art] Lock RT PCRs Done
2,874,121 UART: [art] Populate DV Done
2,882,610 UART: [fht] FMC Alias Private Key: 7
2,883,758 UART: [art] Derive CDI
2,884,038 UART: [art] Store in slot 0x4
2,969,949 UART: [art] Derive Key Pair
2,970,309 UART: [art] Store priv key in slot 0x5
2,984,189 UART: [art] Derive Key Pair - Done
2,999,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,300 UART: [art] PUB.X = F0AD0874DADA2A2FAEAB517397FD6C7FF1D68DEFF77F0AA94FA304F054944AB37A47E5F481F686D3C20047345C8F064C
3,022,054 UART: [art] PUB.Y = F3C716068D0FF97F52703536031C60C0046133AA9318D0041F7936AB0872D4D4E5D31A35C876E866D8FCE6A8B2FF6BB1
3,028,986 UART: [art] SIG.R = C61077E584F73D6721E9F8EDD4530778062AE54484575D347FE59A9CDFC3B2EA55F33D73A19117196D05B758022075CA
3,035,740 UART: [art] SIG.S = F1970F08D2AD7829A3303832E553FAAD5563BAA3C19488C29179AE93D87D7FA09075B1679F69027A0B517F88FDDDBDD5
3,059,262 UART: Caliptra RT
3,059,605 UART: [state] CFI Enabled
3,179,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,985 UART: [rt]cmd =0x44504543, len=96
3,242,615 >>> mbox cmd response data (56 bytes)
3,242,616 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,583 UART: [rt]cmd =0x44504543, len=92
3,465,568 >>> mbox cmd response data (6284 bytes)
test test_certs::test_all_measurement_apis ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,202 UART:
192,571 UART: Running Caliptra ROM ...
193,674 UART:
193,819 UART: [state] CFI Enabled
264,519 UART: [state] LifecycleState = Unprovisioned
266,449 UART: [state] DebugLocked = No
268,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,925 UART: [kat] SHA2-256
442,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,114 UART: [kat] ++
453,765 UART: [kat] sha1
463,866 UART: [kat] SHA2-256
466,579 UART: [kat] SHA2-384
472,530 UART: [kat] SHA2-512-ACC
474,900 UART: [kat] ECC-384
2,764,915 UART: [kat] HMAC-384Kdf
2,777,146 UART: [kat] LMS
3,967,495 UART: [kat] --
3,969,509 UART: [cold-reset] ++
3,970,742 UART: [fht] Storing FHT @ 0x50003400
3,982,998 UART: [idev] ++
3,983,578 UART: [idev] CDI.KEYID = 6
3,984,612 UART: [idev] SUBJECT.KEYID = 7
3,985,788 UART: [idev] UDS.KEYID = 0
3,986,860 ready_for_fw is high
3,987,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,240 UART: [idev] Erasing UDS.KEYID = 0
7,323,290 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,737 UART: [idev] --
7,350,269 UART: [ldev] ++
7,350,935 UART: [ldev] CDI.KEYID = 6
7,351,862 UART: [ldev] SUBJECT.KEYID = 5
7,353,025 UART: [ldev] AUTHORITY.KEYID = 7
7,354,318 UART: [ldev] FE.KEYID = 1
7,401,457 UART: [ldev] Erasing FE.KEYID = 1
10,735,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,178 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,006 UART: [ldev] --
13,113,343 UART: [fwproc] Waiting for Commands...
13,115,884 UART: [fwproc] Received command 0x46574c44
13,118,068 UART: [fwproc] Received Image of size 118548 bytes
17,231,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,831 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,013 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,034 >>> mbox cmd response: success
17,711,088 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,714,528 UART: [afmc] ++
17,715,110 UART: [afmc] CDI.KEYID = 6
17,716,074 UART: [afmc] SUBJECT.KEYID = 7
17,717,284 UART: [afmc] AUTHORITY.KEYID = 5
21,095,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,203 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,460 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,637 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,075 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,940 UART: [afmc] --
23,464,397 UART: [cold-reset] --
23,466,686 UART: [state] Locking Datavault
23,471,604 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,359 UART: [state] Locking ICCM
23,475,939 UART: [exit] Launching FMC @ 0x40000130
23,484,330 UART:
23,484,564 UART: Running Caliptra FMC ...
23,485,662 UART:
23,485,824 UART: [state] CFI Enabled
23,553,302 UART: [fht] FMC Alias Private Key: 7
25,893,555 UART: [art] Extend RT PCRs Done
25,894,776 UART: [art] Lock RT PCRs Done
25,896,377 UART: [art] Populate DV Done
25,901,894 UART: [fht] FMC Alias Private Key: 7
25,903,537 UART: [art] Derive CDI
25,904,350 UART: [art] Store in slot 0x4
25,960,766 UART: [art] Derive Key Pair
25,961,803 UART: [art] Store priv key in slot 0x5
29,254,013 UART: [art] Derive Key Pair - Done
29,266,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,566 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,074 UART: [art] PUB.X = 09C8B2B634A37F8C4CB1742934C6EA1E9AA6D79B79E5FAE160581F46012D2B0F8AC1ACCACE3D3D9334757225FDBD9DA9
31,564,380 UART: [art] PUB.Y = 0B797450CE72474F0A1903A458A2F24EEC298D3567F77FC55E774B8C2F9D2FDE33653DEDB912361AB8A16F51FB3FB02A
31,571,613 UART: [art] SIG.R = D0FF9A970DD9A549CB96D8D6DF91C865CF834FD50C3D200F12EC5EB05422408FE4F1B6827BB0F97F21D582F4DD3708D6
31,579,051 UART: [art] SIG.S = DEDFCBE6C482F1FB9FED4FF8FA48581CCCC3EAF035CDD66FC9E3EC5B63F5C9A3ACC8A354229D8D6E670CE906B0CED5FE
32,884,176 UART: Caliptra RT
32,884,884 UART: [state] CFI Enabled
33,059,854 UART: [rt] RT listening for mailbox commands...
33,091,219 UART: [rt]cmd =0x43455252, len=4
33,102,466 >>> mbox cmd response data (784 bytes)
33,146,103 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,176,885 UART: [rt]cmd =0x44504543, len=92
38,928,287 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,781,351 ready_for_fw is high
3,781,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,952,316 >>> mbox cmd response: success
17,953,693 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,652,847 UART:
23,653,256 UART: Running Caliptra FMC ...
23,654,385 UART:
23,654,551 UART: [state] CFI Enabled
23,721,825 UART: [fht] FMC Alias Private Key: 7
26,083,323 UART: [art] Extend RT PCRs Done
26,084,577 UART: [art] Lock RT PCRs Done
26,086,270 UART: [art] Populate DV Done
26,091,593 UART: [fht] FMC Alias Private Key: 7
26,093,190 UART: [art] Derive CDI
26,094,007 UART: [art] Store in slot 0x4
26,152,011 UART: [art] Derive Key Pair
26,153,061 UART: [art] Store priv key in slot 0x5
29,445,769 UART: [art] Derive Key Pair - Done
29,458,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,961 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,465 UART: [art] PUB.X = 9E8B08BC95ABC61CFEC5A0CE9773E1F32F97B15A5646EA298A2538A4C0276FC502721808C3D1C9C88798D180BC5DE4F9
31,756,760 UART: [art] PUB.Y = 3B167357DCCE6C94D6000C0D2B858E312D92B6E8FE90C6DE27BE8ED434F299ED25084E4855D2CC773281EA8EF8BAD4D7
31,764,004 UART: [art] SIG.R = DC49396CD904C7A986570AE8FDD36BA658C98F6FF256BFD562D14D7F2018DEE0F6BB0B8EA0CD9750AEA50D53379BB5A6
31,771,408 UART: [art] SIG.S = 72DEF1050768F8EC8AEE326A9955100B8F6A867A2785E65568823F6D3064913140AF85C073A5BD37DB3729DF5C86283B
33,076,737 UART: Caliptra RT
33,077,462 UART: [state] CFI Enabled
33,254,755 UART: [rt] RT listening for mailbox commands...
33,286,129 UART: [rt]cmd =0x43455252, len=4
33,297,437 >>> mbox cmd response data (783 bytes)
33,341,377 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,371,902 UART: [rt]cmd =0x44504543, len=92
39,122,741 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,484 UART:
192,843 UART: Running Caliptra ROM ...
193,963 UART:
603,817 UART: [state] CFI Enabled
617,798 UART: [state] LifecycleState = Unprovisioned
619,745 UART: [state] DebugLocked = No
622,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,902 UART: [kat] SHA2-256
796,629 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,148 UART: [kat] ++
807,690 UART: [kat] sha1
819,058 UART: [kat] SHA2-256
821,805 UART: [kat] SHA2-384
827,619 UART: [kat] SHA2-512-ACC
829,990 UART: [kat] ECC-384
3,115,136 UART: [kat] HMAC-384Kdf
3,126,389 UART: [kat] LMS
4,316,520 UART: [kat] --
4,320,471 UART: [cold-reset] ++
4,322,979 UART: [fht] Storing FHT @ 0x50003400
4,334,405 UART: [idev] ++
4,335,036 UART: [idev] CDI.KEYID = 6
4,335,956 UART: [idev] SUBJECT.KEYID = 7
4,337,194 UART: [idev] UDS.KEYID = 0
4,338,267 ready_for_fw is high
4,338,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,402 UART: [idev] Erasing UDS.KEYID = 0
7,627,850 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,879 UART: [idev] --
7,654,028 UART: [ldev] ++
7,654,602 UART: [ldev] CDI.KEYID = 6
7,655,561 UART: [ldev] SUBJECT.KEYID = 5
7,656,764 UART: [ldev] AUTHORITY.KEYID = 7
7,657,989 UART: [ldev] FE.KEYID = 1
7,668,574 UART: [ldev] Erasing FE.KEYID = 1
10,960,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,251 UART: [ldev] --
13,320,086 UART: [fwproc] Waiting for Commands...
13,322,402 UART: [fwproc] Received command 0x46574c44
13,324,632 UART: [fwproc] Received Image of size 118548 bytes
17,437,933 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,996 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,587,149 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,915,281 >>> mbox cmd response: success
17,916,331 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,919,162 UART: [afmc] ++
17,919,746 UART: [afmc] CDI.KEYID = 6
17,920,766 UART: [afmc] SUBJECT.KEYID = 7
17,921,936 UART: [afmc] AUTHORITY.KEYID = 5
21,232,788 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,585 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,318 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,715 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,370 UART: [afmc] --
23,600,019 UART: [cold-reset] --
23,604,688 UART: [state] Locking Datavault
23,609,330 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,077 UART: [state] Locking ICCM
23,613,604 UART: [exit] Launching FMC @ 0x40000130
23,622,005 UART:
23,622,285 UART: Running Caliptra FMC ...
23,623,389 UART:
23,623,564 UART: [state] CFI Enabled
23,631,391 UART: [fht] FMC Alias Private Key: 7
25,972,260 UART: [art] Extend RT PCRs Done
25,973,475 UART: [art] Lock RT PCRs Done
25,974,797 UART: [art] Populate DV Done
25,980,256 UART: [fht] FMC Alias Private Key: 7
25,981,948 UART: [art] Derive CDI
25,982,754 UART: [art] Store in slot 0x4
26,025,662 UART: [art] Derive Key Pair
26,026,703 UART: [art] Store priv key in slot 0x5
29,268,674 UART: [art] Derive Key Pair - Done
29,281,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,882 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,393 UART: [art] PUB.X = BBE240EA415D3A6C64D768CBBE0630135C28C703A42231F56BD1AADC23527AA46E111989A8A37C1CE4C71F0AC9D420AE
31,570,626 UART: [art] PUB.Y = 34965C342061FE87932E572E6BFCCA482D48966631357776480CEB8970CA9835AE6564AB1E5016312309A3839C0D4C7E
31,577,846 UART: [art] SIG.R = 6F8CACE800819996A5ECA1CB14380346B9FF4BBAD23B01E94F1E05CAFE363522FC7B3526F351536B2F17C663B93FD130
31,585,258 UART: [art] SIG.S = 64479A482AF4C01E4CE3A328EC640662F071584FA27599376CA256A769C594CA2FE89E427FF4270D50DBC325D9B66F9F
32,890,160 UART: Caliptra RT
32,890,862 UART: [state] CFI Enabled
33,022,414 UART: [rt] RT listening for mailbox commands...
33,053,556 UART: [rt]cmd =0x43455252, len=4
33,065,058 >>> mbox cmd response data (782 bytes)
33,108,508 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,139,354 UART: [rt]cmd =0x44504543, len=92
38,814,919 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
4,129,065 ready_for_fw is high
4,129,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,072 >>> mbox cmd response: success
18,151,269 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,793,621 UART:
23,794,004 UART: Running Caliptra FMC ...
23,795,123 UART:
23,795,275 UART: [state] CFI Enabled
23,803,175 UART: [fht] FMC Alias Private Key: 7
26,143,524 UART: [art] Extend RT PCRs Done
26,144,752 UART: [art] Lock RT PCRs Done
26,146,405 UART: [art] Populate DV Done
26,151,948 UART: [fht] FMC Alias Private Key: 7
26,153,542 UART: [art] Derive CDI
26,154,281 UART: [art] Store in slot 0x4
26,197,191 UART: [art] Derive Key Pair
26,198,185 UART: [art] Store priv key in slot 0x5
29,440,244 UART: [art] Derive Key Pair - Done
29,453,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,477 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,983 UART: [art] PUB.X = 64ABDA52E601437A8E73B187A2C71EE0DB2E0159949A39860B8FEA4DA9E60E6117BD667065BB9693323184E163E3C61C
31,742,281 UART: [art] PUB.Y = 4150B48DE7D43315928F0D4CF628BB979B4DDF2EB2D5E66C841C3C9B1AF8DEA9689FB99575F6B37BF78D19C6002BE931
31,749,534 UART: [art] SIG.R = 50F7F2419CDF76A4F1595EEC90F0FEF1A2F7A2905121F9A31A85D36BFF59DA38D84E4E53EBC6D7284F8DBE6B7DB1AB13
31,756,926 UART: [art] SIG.S = 7C2EF6404F56C432CF5B13BDA36856A4966DB782574D970E05E98707AE4C085604043F0FAFAF34349DA086C65823734E
33,062,081 UART: Caliptra RT
33,062,784 UART: [state] CFI Enabled
33,196,437 UART: [rt] RT listening for mailbox commands...
33,227,690 UART: [rt]cmd =0x43455252, len=4
33,239,329 >>> mbox cmd response data (782 bytes)
33,283,267 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,314,112 UART: [rt]cmd =0x44504543, len=92
38,989,247 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,224 UART:
192,583 UART: Running Caliptra ROM ...
193,764 UART:
193,932 UART: [state] CFI Enabled
262,307 UART: [state] LifecycleState = Unprovisioned
264,299 UART: [state] DebugLocked = No
267,117 UART: [state] WD Timer not started. Device not locked for debugging
270,086 UART: [kat] SHA2-256
449,764 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,528 UART: [kat] ++
461,064 UART: [kat] sha1
470,706 UART: [kat] SHA2-256
473,412 UART: [kat] SHA2-384
479,123 UART: [kat] SHA2-512-ACC
481,486 UART: [kat] ECC-384
2,925,106 UART: [kat] HMAC-384Kdf
2,950,870 UART: [kat] LMS
3,427,337 UART: [kat] --
3,431,114 UART: [cold-reset] ++
3,433,766 UART: [fht] FHT @ 0x50003400
3,444,947 UART: [idev] ++
3,445,509 UART: [idev] CDI.KEYID = 6
3,446,536 UART: [idev] SUBJECT.KEYID = 7
3,447,699 UART: [idev] UDS.KEYID = 0
3,448,740 ready_for_fw is high
3,448,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,021 UART: [idev] Erasing UDS.KEYID = 0
5,962,699 UART: [idev] Sha1 KeyId Algorithm
5,986,670 UART: [idev] --
5,991,942 UART: [ldev] ++
5,992,516 UART: [ldev] CDI.KEYID = 6
5,993,586 UART: [ldev] SUBJECT.KEYID = 5
5,994,687 UART: [ldev] AUTHORITY.KEYID = 7
5,995,913 UART: [ldev] FE.KEYID = 1
6,036,854 UART: [ldev] Erasing FE.KEYID = 1
8,539,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,179 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,703 UART: [ldev] --
10,354,233 UART: [fwproc] Wait for Commands...
10,356,053 UART: [fwproc] Recv command 0x46574c44
10,358,089 UART: [fwproc] Recv'd Img size: 118548 bytes
13,843,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,925,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,998,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,326,599 >>> mbox cmd response: success
14,327,755 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,330,708 UART: [afmc] ++
14,331,350 UART: [afmc] CDI.KEYID = 6
14,332,250 UART: [afmc] SUBJECT.KEYID = 7
14,333,465 UART: [afmc] AUTHORITY.KEYID = 5
16,874,995 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,483 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,538 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,664 UART: [afmc] --
18,695,557 UART: [cold-reset] --
18,698,979 UART: [state] Locking Datavault
18,704,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,497 UART: [state] Locking ICCM
18,707,953 UART: [exit] Launching FMC @ 0x40000130
18,716,357 UART:
18,716,589 UART: Running Caliptra FMC ...
18,717,706 UART:
18,717,865 UART: [state] CFI Enabled
18,775,381 UART: [fht] FMC Alias Private Key: 7
20,542,647 UART: [art] Extend RT PCRs Done
20,544,055 UART: [art] Lock RT PCRs Done
20,545,613 UART: [art] Populate DV Done
20,550,927 UART: [fht] FMC Alias Private Key: 7
20,552,471 UART: [art] Derive CDI
20,553,284 UART: [art] Store in slot 0x4
20,607,975 UART: [art] Derive Key Pair
20,608,971 UART: [art] Store priv key in slot 0x5
23,072,445 UART: [art] Derive Key Pair - Done
23,085,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,445 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,960 UART: [art] PUB.X = AB1BA07B59A9665BF6A1B62C2F70D83BC0BC65B5C717611FA15E6D925894452317EB95121044C66D2C88834BDDC0EDAB
24,807,213 UART: [art] PUB.Y = 5A55BFD8A1B326FEF2040394553750814D857BB31546F4E20F692F8335AC88384BD739692C38DAE9E7BAA788818A79D9
24,814,471 UART: [art] SIG.R = A628F523D96186D171391F860574ED67DA425EEAAAD3CED606B1EB2FACA18066102F6C6B3222EDF20AAF1E5B30A55263
24,821,864 UART: [art] SIG.S = 1670DCD0FE23197BE621973A89E81554374744D61DAA5EB59892B261C2F8CACE3DB206D22DF424A3FAEAC41DE3E4B275
25,800,869 UART: Caliptra RT
25,801,582 UART: [state] CFI Enabled
25,981,173 UART: [rt] RT listening for mailbox commands...
26,012,580 UART: [rt]cmd =0x43455252, len=4
26,023,761 >>> mbox cmd response data (783 bytes)
26,066,867 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,097,631 UART: [rt]cmd =0x44504543, len=92
30,445,940 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,477,592 ready_for_fw is high
3,478,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,725 >>> mbox cmd response: success
14,248,942 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,545,225 UART:
18,545,610 UART: Running Caliptra FMC ...
18,546,738 UART:
18,546,896 UART: [state] CFI Enabled
18,614,847 UART: [fht] FMC Alias Private Key: 7
20,380,912 UART: [art] Extend RT PCRs Done
20,382,171 UART: [art] Lock RT PCRs Done
20,384,143 UART: [art] Populate DV Done
20,389,814 UART: [fht] FMC Alias Private Key: 7
20,391,303 UART: [art] Derive CDI
20,392,060 UART: [art] Store in slot 0x4
20,447,887 UART: [art] Derive Key Pair
20,448,932 UART: [art] Store priv key in slot 0x5
22,911,906 UART: [art] Derive Key Pair - Done
22,925,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,637,213 UART: [art] Erasing AUTHORITY.KEYID = 7
24,638,714 UART: [art] PUB.X = C1AA1D8EA512499A18405D3A2095501A571012BD3B29CD19B73375A6560E446F1CAFD8DA54436D985E0919F097CC9B37
24,645,968 UART: [art] PUB.Y = E2FEFFC1B6108554329465A606C85DDAD45818A2677781E86F053B60E416ADE2F4A889F1BFE134298F3C3DCAF7E06E1F
24,653,237 UART: [art] SIG.R = 7F7D1F9393217712678739B382FA6226597E4F0A721DEBF1498977EDA62AE4B583DCD1BB564B065F57B4F635E60C4E66
24,660,576 UART: [art] SIG.S = B2062CD1A0C09F0B542C98F4C8D5266637AD370B2AC3094CBC5869B4E900E3F402170E758DF45EB7AE589522BE520BE6
25,640,022 UART: Caliptra RT
25,640,741 UART: [state] CFI Enabled
25,820,479 UART: [rt] RT listening for mailbox commands...
25,851,837 UART: [rt]cmd =0x43455252, len=4
25,863,158 >>> mbox cmd response data (783 bytes)
25,906,016 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,936,878 UART: [rt]cmd =0x44504543, len=92
30,283,679 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,549 UART:
192,910 UART: Running Caliptra ROM ...
194,099 UART:
603,572 UART: [state] CFI Enabled
616,151 UART: [state] LifecycleState = Unprovisioned
618,095 UART: [state] DebugLocked = No
619,549 UART: [state] WD Timer not started. Device not locked for debugging
624,288 UART: [kat] SHA2-256
803,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,697 UART: [kat] ++
815,148 UART: [kat] sha1
826,949 UART: [kat] SHA2-256
829,624 UART: [kat] SHA2-384
835,444 UART: [kat] SHA2-512-ACC
837,823 UART: [kat] ECC-384
3,279,208 UART: [kat] HMAC-384Kdf
3,291,135 UART: [kat] LMS
3,767,655 UART: [kat] --
3,774,278 UART: [cold-reset] ++
3,776,419 UART: [fht] FHT @ 0x50003400
3,788,763 UART: [idev] ++
3,789,502 UART: [idev] CDI.KEYID = 6
3,790,451 UART: [idev] SUBJECT.KEYID = 7
3,791,572 UART: [idev] UDS.KEYID = 0
3,792,502 ready_for_fw is high
3,792,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,541 UART: [idev] Erasing UDS.KEYID = 0
6,270,740 UART: [idev] Sha1 KeyId Algorithm
6,293,965 UART: [idev] --
6,299,150 UART: [ldev] ++
6,299,720 UART: [ldev] CDI.KEYID = 6
6,300,687 UART: [ldev] SUBJECT.KEYID = 5
6,301,853 UART: [ldev] AUTHORITY.KEYID = 7
6,303,141 UART: [ldev] FE.KEYID = 1
6,313,737 UART: [ldev] Erasing FE.KEYID = 1
8,791,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,404 UART: [ldev] --
10,586,027 UART: [fwproc] Wait for Commands...
10,588,341 UART: [fwproc] Recv command 0x46574c44
10,590,365 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,258 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,187 >>> mbox cmd response: success
14,551,265 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,553,892 UART: [afmc] ++
14,554,485 UART: [afmc] CDI.KEYID = 6
14,555,396 UART: [afmc] SUBJECT.KEYID = 7
14,556,633 UART: [afmc] AUTHORITY.KEYID = 5
17,056,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,855 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,503 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,701 UART: [afmc] --
18,857,625 UART: [cold-reset] --
18,863,491 UART: [state] Locking Datavault
18,870,633 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,389 UART: [state] Locking ICCM
18,873,618 UART: [exit] Launching FMC @ 0x40000130
18,882,068 UART:
18,882,306 UART: Running Caliptra FMC ...
18,883,411 UART:
18,883,588 UART: [state] CFI Enabled
18,891,638 UART: [fht] FMC Alias Private Key: 7
20,658,200 UART: [art] Extend RT PCRs Done
20,659,421 UART: [art] Lock RT PCRs Done
20,661,179 UART: [art] Populate DV Done
20,666,758 UART: [fht] FMC Alias Private Key: 7
20,668,412 UART: [art] Derive CDI
20,669,230 UART: [art] Store in slot 0x4
20,711,918 UART: [art] Derive Key Pair
20,712,929 UART: [art] Store priv key in slot 0x5
23,140,012 UART: [art] Derive Key Pair - Done
23,152,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,372 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,868 UART: [art] PUB.X = 8ECDE01676D9B6937E940D459F0390BEAB357C0B531AB8D5627144FFFFDAD2B499A471433432B5E53AFBA5D6521C5F1B
24,868,165 UART: [art] PUB.Y = 72EF04706BDA472FB813216A23DDBE275A2671B09ECEE5179A7BD078F5ECA5C3A694548B5ED3FD20CB059A139D5200B3
24,875,449 UART: [art] SIG.R = 79C62D7E764FD95A406396FB1D8C37E7203F215F9469BB34CADBF3D3FAEEDE18CF89E13CCBE4FDE9D9DE807252DF4F1A
24,882,871 UART: [art] SIG.S = A1B23B4CAEE0AE6814BBA7244A34B245F83A72280FD1439C8790816FDE48298D37BE487A1065FF137CE8C7418AFD5543
25,861,947 UART: Caliptra RT
25,862,655 UART: [state] CFI Enabled
25,995,603 UART: [rt] RT listening for mailbox commands...
26,026,696 UART: [rt]cmd =0x43455252, len=4
26,038,116 >>> mbox cmd response data (783 bytes)
26,080,465 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,111,136 UART: [rt]cmd =0x44504543, len=92
30,397,350 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,783,126 ready_for_fw is high
3,783,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,460,524 >>> mbox cmd response: success
14,461,634 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,716,746 UART:
18,717,132 UART: Running Caliptra FMC ...
18,718,268 UART:
18,718,433 UART: [state] CFI Enabled
18,726,490 UART: [fht] FMC Alias Private Key: 7
20,493,101 UART: [art] Extend RT PCRs Done
20,494,300 UART: [art] Lock RT PCRs Done
20,495,893 UART: [art] Populate DV Done
20,501,312 UART: [fht] FMC Alias Private Key: 7
20,502,853 UART: [art] Derive CDI
20,503,671 UART: [art] Store in slot 0x4
20,546,185 UART: [art] Derive Key Pair
20,547,242 UART: [art] Store priv key in slot 0x5
22,974,077 UART: [art] Derive Key Pair - Done
22,986,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,692,904 UART: [art] Erasing AUTHORITY.KEYID = 7
24,694,402 UART: [art] PUB.X = 1FD6FCDE1687B7612F39D765F486A73967FB58F85C515C2CB1A80EED660EC04BF3CE2328841BD3F009084B11245AF104
24,701,712 UART: [art] PUB.Y = 26B9149D689BA121B1ED9962EBDB1DBAA3D2DC9ED0239F837290383EDB007C0635D38B54B5693CCD2BD9C408D1990BA4
24,708,944 UART: [art] SIG.R = 4F96BA21404B6665A012BFB4482226E94AA794C4FCB39DE8A11150679A6E079C36182E3F815AC4946D9CBAACAEA67E41
24,716,349 UART: [art] SIG.S = AC03670CD7C6D8621D9A4C16A816399CA3060515124902C8E70D5D7864C560AC64C2A26190F26D0A0A66FBFA7E8DF0FE
25,694,749 UART: Caliptra RT
25,695,436 UART: [state] CFI Enabled
25,828,329 UART: [rt] RT listening for mailbox commands...
25,859,698 UART: [rt]cmd =0x43455252, len=4
25,871,061 >>> mbox cmd response data (783 bytes)
25,913,814 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,944,568 UART: [rt]cmd =0x44504543, len=92
30,230,566 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
192,109 UART:
192,473 UART: Running Caliptra ROM ...
193,588 UART:
193,735 UART: [state] CFI Enabled
264,266 UART: [state] LifecycleState = Unprovisioned
266,333 UART: [state] DebugLocked = No
267,444 UART: [state] WD Timer not started. Device not locked for debugging
270,906 UART: [kat] SHA2-256
460,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,606 UART: [kat] ++
472,057 UART: [kat] sha1
483,860 UART: [kat] SHA2-256
486,941 UART: [kat] SHA2-384
492,717 UART: [kat] SHA2-512-ACC
495,304 UART: [kat] ECC-384
2,948,653 UART: [kat] HMAC-384Kdf
2,972,110 UART: [kat] LMS
3,503,847 UART: [kat] --
3,506,703 UART: [cold-reset] ++
3,507,776 UART: [fht] FHT @ 0x50003400
3,519,038 UART: [idev] ++
3,519,674 UART: [idev] CDI.KEYID = 6
3,520,649 UART: [idev] SUBJECT.KEYID = 7
3,521,821 UART: [idev] UDS.KEYID = 0
3,522,864 ready_for_fw is high
3,523,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,159 UART: [idev] Erasing UDS.KEYID = 0
6,028,038 UART: [idev] Sha1 KeyId Algorithm
6,051,176 UART: [idev] --
6,056,446 UART: [ldev] ++
6,057,132 UART: [ldev] CDI.KEYID = 6
6,058,050 UART: [ldev] SUBJECT.KEYID = 5
6,059,210 UART: [ldev] AUTHORITY.KEYID = 7
6,060,438 UART: [ldev] FE.KEYID = 1
6,101,433 UART: [ldev] Erasing FE.KEYID = 1
8,608,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,859 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,982 UART: [ldev] --
10,413,729 UART: [fwproc] Wait for Commands...
10,415,175 UART: [fwproc] Recv command 0x46574c44
10,417,153 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,867 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,836 >>> mbox cmd response: success
14,682,385 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,685,057 UART: [afmc] ++
14,685,755 UART: [afmc] CDI.KEYID = 6
14,686,999 UART: [afmc] SUBJECT.KEYID = 7
14,688,425 UART: [afmc] AUTHORITY.KEYID = 5
17,235,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,959 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,905 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,127 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,065 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,672 UART: [afmc] --
19,034,078 UART: [cold-reset] --
19,037,621 UART: [state] Locking Datavault
19,042,002 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,191 UART: [state] Locking ICCM
19,046,390 UART: [exit] Launching FMC @ 0x40000130
19,055,052 UART:
19,055,288 UART: Running Caliptra FMC ...
19,056,388 UART:
19,056,549 UART: [state] CFI Enabled
19,115,655 UART: [fht] FMC Alias Private Key: 7
20,881,651 UART: [art] Extend RT PCRs Done
20,882,864 UART: [art] Lock RT PCRs Done
20,884,697 UART: [art] Populate DV Done
20,890,338 UART: [fht] FMC Alias Private Key: 7
20,891,821 UART: [art] Derive CDI
20,892,581 UART: [art] Store in slot 0x4
20,948,133 UART: [art] Derive Key Pair
20,949,171 UART: [art] Store priv key in slot 0x5
23,413,068 UART: [art] Derive Key Pair - Done
23,425,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,419 UART: [art] PUB.X = 35852FB6054033FD3CBEE4E1A41318E60D7E5339D346BBE76E46E86C75660407CD64C0BFADF8CB3BBABEFA27AB6B37D0
25,147,724 UART: [art] PUB.Y = D73152D8E32829B10EF6BB825222D71C856F5A2092F763AD5CF01740DD29DAD9FD0B114FFEC7D100CD3AA260710B6630
25,154,964 UART: [art] SIG.R = 9414C132383FCE2A312D5D3DC14A9C0B13B0F0ADCAD683EF3491D5E17A831DEC5B7C2594ADCD0D410C91F4C1FCE53011
25,162,388 UART: [art] SIG.S = 4F8BC819DAD8467D22C08056CF07497377674D0C3B358A5C95BEE452C34718C6388BDB23F1830D7FEE0B7C5E64BCDCB3
26,141,561 UART: Caliptra RT
26,142,273 UART: [state] CFI Enabled
26,321,785 UART: [rt] RT listening for mailbox commands...
26,353,197 UART: [rt]cmd =0x43455252, len=4
26,364,622 >>> mbox cmd response data (783 bytes)
26,407,384 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,437,883 UART: [rt]cmd =0x44504543, len=92
30,784,841 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,440,228 ready_for_fw is high
3,440,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,806,232 >>> mbox cmd response: success
14,807,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,091,364 UART:
19,091,788 UART: Running Caliptra FMC ...
19,092,895 UART:
19,093,051 UART: [state] CFI Enabled
19,159,415 UART: [fht] FMC Alias Private Key: 7
20,926,066 UART: [art] Extend RT PCRs Done
20,927,292 UART: [art] Lock RT PCRs Done
20,928,730 UART: [art] Populate DV Done
20,933,935 UART: [fht] FMC Alias Private Key: 7
20,935,418 UART: [art] Derive CDI
20,936,182 UART: [art] Store in slot 0x4
20,991,921 UART: [art] Derive Key Pair
20,992,955 UART: [art] Store priv key in slot 0x5
23,455,805 UART: [art] Derive Key Pair - Done
23,468,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,053 UART: [art] PUB.X = 634A0D070DFB345CE158AF3673CDDAF9D8D426262726A746E9C62753A638C759A55573A4223025B71E552278C69B9C96
25,190,271 UART: [art] PUB.Y = D7AC8422F0ACBBAA682FBB42CC237724CFECAE40DABB1E2730E38F1757B13C20C96E06C2A102A98AF816873DF63E3BEE
25,197,519 UART: [art] SIG.R = 624D8100C1FF696861B274A3228B8D40C1DB4DD1C9F75D229F9B0FFA7CCFA7476B715E1ECDA54A1508F58D6121BCCC5C
25,204,963 UART: [art] SIG.S = 8ADDE8CB56990F2C3B9EF46D816EC7ED8E03BE7D07A0438F0E82D341EDA1B13438170C3A3022A7452919C7C5E38BBD51
26,183,894 UART: Caliptra RT
26,184,608 UART: [state] CFI Enabled
26,363,524 UART: [rt] RT listening for mailbox commands...
26,394,947 UART: [rt]cmd =0x43455252, len=4
26,406,249 >>> mbox cmd response data (783 bytes)
26,448,838 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,479,338 UART: [rt]cmd =0x44504543, len=92
30,827,321 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,479 UART:
192,837 UART: Running Caliptra ROM ...
194,022 UART:
603,811 UART: [state] CFI Enabled
617,314 UART: [state] LifecycleState = Unprovisioned
619,736 UART: [state] DebugLocked = No
622,359 UART: [state] WD Timer not started. Device not locked for debugging
627,768 UART: [kat] SHA2-256
817,681 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,495 UART: [kat] ++
828,973 UART: [kat] sha1
840,491 UART: [kat] SHA2-256
843,522 UART: [kat] SHA2-384
848,947 UART: [kat] SHA2-512-ACC
851,534 UART: [kat] ECC-384
3,293,807 UART: [kat] HMAC-384Kdf
3,308,373 UART: [kat] LMS
3,840,188 UART: [kat] --
3,844,676 UART: [cold-reset] ++
3,845,695 UART: [fht] FHT @ 0x50003400
3,857,956 UART: [idev] ++
3,858,667 UART: [idev] CDI.KEYID = 6
3,859,703 UART: [idev] SUBJECT.KEYID = 7
3,860,809 UART: [idev] UDS.KEYID = 0
3,861,712 ready_for_fw is high
3,861,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,818 UART: [idev] Erasing UDS.KEYID = 0
6,335,139 UART: [idev] Sha1 KeyId Algorithm
6,357,310 UART: [idev] --
6,361,359 UART: [ldev] ++
6,362,042 UART: [ldev] CDI.KEYID = 6
6,362,973 UART: [ldev] SUBJECT.KEYID = 5
6,364,141 UART: [ldev] AUTHORITY.KEYID = 7
6,365,374 UART: [ldev] FE.KEYID = 1
6,377,157 UART: [ldev] Erasing FE.KEYID = 1
8,855,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,233 UART: [ldev] --
10,643,805 UART: [fwproc] Wait for Commands...
10,646,547 UART: [fwproc] Recv command 0x46574c44
10,648,854 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,115 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,052 >>> mbox cmd response: success
14,910,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,913,608 UART: [afmc] ++
14,914,309 UART: [afmc] CDI.KEYID = 6
14,915,502 UART: [afmc] SUBJECT.KEYID = 7
14,916,947 UART: [afmc] AUTHORITY.KEYID = 5
17,425,349 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,994 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,046 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,222 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,140 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,382 UART: [afmc] --
19,220,371 UART: [cold-reset] --
19,223,805 UART: [state] Locking Datavault
19,229,280 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,479 UART: [state] Locking ICCM
19,234,318 UART: [exit] Launching FMC @ 0x40000130
19,242,940 UART:
19,243,179 UART: Running Caliptra FMC ...
19,244,280 UART:
19,244,442 UART: [state] CFI Enabled
19,252,834 UART: [fht] FMC Alias Private Key: 7
21,019,000 UART: [art] Extend RT PCRs Done
21,020,220 UART: [art] Lock RT PCRs Done
21,021,776 UART: [art] Populate DV Done
21,027,194 UART: [fht] FMC Alias Private Key: 7
21,028,630 UART: [art] Derive CDI
21,029,399 UART: [art] Store in slot 0x4
21,071,854 UART: [art] Derive Key Pair
21,072,866 UART: [art] Store priv key in slot 0x5
23,499,515 UART: [art] Derive Key Pair - Done
23,512,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,711 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,205 UART: [art] PUB.X = 486F07A24F466F7391085DEDF98C7591C5A29216F799DD2DB0CE2002513BE86462E3022C088716652D902BCAC96F3E9E
25,227,410 UART: [art] PUB.Y = E335CBB366A6EE34D67735095460EECFAD7234546979A097931984C6D0A4EC9158F903C35B1000C0A268953003C6A488
25,234,657 UART: [art] SIG.R = 5FE19786F04DC4F02DAB221B9A64D1C3267C3F8DDAE7D78BA1C97046CEDCF9B3881F84E648A3457651B0ED61ED91FBF2
25,242,064 UART: [art] SIG.S = 36D6F33B9B67CE271C86FBD2F91C2B0F94C8FD75DA7D21A3FDDF28733F954ED9715658E3F73F49079BB05727F03D0CFF
26,220,848 UART: Caliptra RT
26,221,553 UART: [state] CFI Enabled
26,353,733 UART: [rt] RT listening for mailbox commands...
26,385,187 UART: [rt]cmd =0x43455252, len=4
26,396,524 >>> mbox cmd response data (782 bytes)
26,440,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,471,368 UART: [rt]cmd =0x44504543, len=92
30,757,929 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,751,660 ready_for_fw is high
3,752,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,822 >>> mbox cmd response: success
15,038,024 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,295,813 UART:
19,296,213 UART: Running Caliptra FMC ...
19,297,366 UART:
19,297,535 UART: [state] CFI Enabled
19,305,485 UART: [fht] FMC Alias Private Key: 7
21,071,951 UART: [art] Extend RT PCRs Done
21,073,189 UART: [art] Lock RT PCRs Done
21,074,908 UART: [art] Populate DV Done
21,080,556 UART: [fht] FMC Alias Private Key: 7
21,082,178 UART: [art] Derive CDI
21,083,006 UART: [art] Store in slot 0x4
21,125,514 UART: [art] Derive Key Pair
21,126,564 UART: [art] Store priv key in slot 0x5
23,553,141 UART: [art] Derive Key Pair - Done
23,566,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,864 UART: [art] PUB.X = 3645430F4F4566051E72A10BC5452AC51A4B9B9460D1ABBEDAAA3DEDE83E531C8ABDB3EE7D7B22E95290A92CEC2759C3
25,281,129 UART: [art] PUB.Y = F8482DBFB2D8285D48C655234EE9E0534BD63509D1127E55BCA413CC480A9F13845BF92F1CBAE5D74000891CDF4F971C
25,288,398 UART: [art] SIG.R = DDFE1DBF9ECBC2B0B2331334024C0C4BAF505D405D42BB89D4B927644C0264312D152CED8BAEE72359E1F09857A5B263
25,295,758 UART: [art] SIG.S = DE1F635D9AD9BBC59D75D3EB564E5BBA90D22401F1721376540533477E37C72D3F6C31142F4D1B3A9018E6DD879A6D4B
26,273,829 UART: Caliptra RT
26,274,544 UART: [state] CFI Enabled
26,407,284 UART: [rt] RT listening for mailbox commands...
26,438,589 UART: [rt]cmd =0x43455252, len=4
26,449,997 >>> mbox cmd response data (784 bytes)
26,494,433 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,525,106 UART: [rt]cmd =0x44504543, len=92
30,811,830 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,557 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,537 UART: [kat] SHA2-256
892,475 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
907,024 UART: [kat] LMS
1,475,220 UART: [kat] --
1,476,269 UART: [cold-reset] ++
1,476,811 UART: [fht] Storing FHT @ 0x50003400
1,479,564 UART: [idev] ++
1,479,732 UART: [idev] CDI.KEYID = 6
1,480,092 UART: [idev] SUBJECT.KEYID = 7
1,480,516 UART: [idev] UDS.KEYID = 0
1,480,861 ready_for_fw is high
1,480,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,130 UART: [idev] Erasing UDS.KEYID = 0
1,504,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,176 UART: [idev] --
1,514,083 UART: [ldev] ++
1,514,251 UART: [ldev] CDI.KEYID = 6
1,514,614 UART: [ldev] SUBJECT.KEYID = 5
1,515,040 UART: [ldev] AUTHORITY.KEYID = 7
1,515,503 UART: [ldev] FE.KEYID = 1
1,520,761 UART: [ldev] Erasing FE.KEYID = 1
1,545,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,121 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,914 UART: [ldev] --
1,585,299 UART: [fwproc] Waiting for Commands...
1,586,164 UART: [fwproc] Received command 0x46574c44
1,586,955 UART: [fwproc] Received Image of size 118548 bytes
2,931,567 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,145 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,363 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,788 >>> mbox cmd response: success
3,130,788 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,131,856 UART: [afmc] ++
3,132,024 UART: [afmc] CDI.KEYID = 6
3,132,386 UART: [afmc] SUBJECT.KEYID = 7
3,132,811 UART: [afmc] AUTHORITY.KEYID = 5
3,167,856 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,806 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,295 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,178 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,861 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,867 UART: [afmc] --
3,210,971 UART: [cold-reset] --
3,211,605 UART: [state] Locking Datavault
3,212,756 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,360 UART: [state] Locking ICCM
3,213,840 UART: [exit] Launching FMC @ 0x40000130
3,219,170 UART:
3,219,186 UART: Running Caliptra FMC ...
3,219,594 UART:
3,219,648 UART: [state] CFI Enabled
3,230,364 UART: [fht] FMC Alias Private Key: 7
3,349,200 UART: [art] Extend RT PCRs Done
3,349,628 UART: [art] Lock RT PCRs Done
3,350,770 UART: [art] Populate DV Done
3,359,089 UART: [fht] FMC Alias Private Key: 7
3,360,193 UART: [art] Derive CDI
3,360,473 UART: [art] Store in slot 0x4
3,446,475 UART: [art] Derive Key Pair
3,446,835 UART: [art] Store priv key in slot 0x5
3,460,006 UART: [art] Derive Key Pair - Done
3,474,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,894 UART: [art] PUB.X = 086D07BAE45FD8A34EB16B6FF1CE9418DAB09138E11BFBD957A49461EAF500CC9FC214A56A3ACF89813F3789D0F1A169
3,497,652 UART: [art] PUB.Y = 14C86F7E9FA614F74EE672CE2860B48DDC4A66D0EA67C9CBD842A678BB3CAF3DCDB74D3F0F212ADDABF713EDEF6252C1
3,504,629 UART: [art] SIG.R = B5436220C667D2B58D6D8D4A9F02436DE126A3CCB0B34675F5C2AA96536EE45135B817DCAD1EFBEE33EAE6098B3BBDB4
3,511,411 UART: [art] SIG.S = BFAEE509098F8E7EC96EF45416A40341E59A317F5E6A59A7D9CF665ED0613C019A804CB2EF24DA62981F70B375AE1663
3,535,033 UART: Caliptra RT
3,535,284 UART: [state] CFI Enabled
3,655,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,891 UART: [rt]cmd =0x43455252, len=4
3,696,649 >>> mbox cmd response data (784 bytes)
3,696,650 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,697 UART: [rt]cmd =0x44504543, len=92
3,910,472 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,245 ready_for_fw is high
1,361,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,010 >>> mbox cmd response: success
2,980,010 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,040,435 UART:
3,040,451 UART: Running Caliptra FMC ...
3,040,859 UART:
3,040,913 UART: [state] CFI Enabled
3,051,243 UART: [fht] FMC Alias Private Key: 7
3,170,499 UART: [art] Extend RT PCRs Done
3,170,927 UART: [art] Lock RT PCRs Done
3,172,453 UART: [art] Populate DV Done
3,180,582 UART: [fht] FMC Alias Private Key: 7
3,181,752 UART: [art] Derive CDI
3,182,032 UART: [art] Store in slot 0x4
3,268,038 UART: [art] Derive Key Pair
3,268,398 UART: [art] Store priv key in slot 0x5
3,281,745 UART: [art] Derive Key Pair - Done
3,296,249 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,639 UART: [art] PUB.X = D2568E6CBF4C3C25794456E57D6A4959A251414B9237B1FE0BF603A486C58D02C4B15BF78292D32943F8F08032D222A0
3,319,396 UART: [art] PUB.Y = C60889743E57B2DB520C0AF9F8F6B0ECB78A8977CF9399DB77C0F580AED0ED198EB9F082C2F813484F8C9997EB6D1A9D
3,326,351 UART: [art] SIG.R = 63F09C391EA67BB6BBDA90DC6B79A29C787AABB6D4BFAEABA94D6F2350E54C54AE1025A37ED03085A2332EFAA7A9C5DD
3,333,149 UART: [art] SIG.S = 7A66AA0DDBD12A1F93CC63ADFB16BAD7FD89158F2A8B601976546D7D9B86EFDA8672B4F468DC9FC6DB5A8DC321C7EF2B
3,356,248 UART: Caliptra RT
3,356,499 UART: [state] CFI Enabled
3,477,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,024 UART: [rt]cmd =0x43455252, len=4
3,518,953 >>> mbox cmd response data (782 bytes)
3,518,954 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,099 UART: [rt]cmd =0x44504543, len=92
3,734,071 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,432 UART: [kat] SHA2-256
892,370 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,629 UART: [kat] HMAC-384Kdf
907,439 UART: [kat] LMS
1,475,635 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,477,052 UART: [fht] Storing FHT @ 0x50003400
1,479,697 UART: [idev] ++
1,479,865 UART: [idev] CDI.KEYID = 6
1,480,225 UART: [idev] SUBJECT.KEYID = 7
1,480,649 UART: [idev] UDS.KEYID = 0
1,480,994 ready_for_fw is high
1,480,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,579 UART: [idev] Erasing UDS.KEYID = 0
1,505,583 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,143 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,061 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,051 UART: [ldev] --
1,586,386 UART: [fwproc] Waiting for Commands...
1,587,187 UART: [fwproc] Received command 0x46574c44
1,587,978 UART: [fwproc] Received Image of size 118548 bytes
2,932,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,418 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,636 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,987 >>> mbox cmd response: success
3,130,987 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,027 UART: [afmc] ++
3,132,195 UART: [afmc] CDI.KEYID = 6
3,132,557 UART: [afmc] SUBJECT.KEYID = 7
3,132,982 UART: [afmc] AUTHORITY.KEYID = 5
3,168,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,313 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,996 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,866 UART: [afmc] --
3,211,832 UART: [cold-reset] --
3,212,696 UART: [state] Locking Datavault
3,213,851 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,455 UART: [state] Locking ICCM
3,214,965 UART: [exit] Launching FMC @ 0x40000130
3,220,295 UART:
3,220,311 UART: Running Caliptra FMC ...
3,220,719 UART:
3,220,862 UART: [state] CFI Enabled
3,231,476 UART: [fht] FMC Alias Private Key: 7
3,350,862 UART: [art] Extend RT PCRs Done
3,351,290 UART: [art] Lock RT PCRs Done
3,352,884 UART: [art] Populate DV Done
3,360,885 UART: [fht] FMC Alias Private Key: 7
3,361,997 UART: [art] Derive CDI
3,362,277 UART: [art] Store in slot 0x4
3,448,187 UART: [art] Derive Key Pair
3,448,547 UART: [art] Store priv key in slot 0x5
3,462,382 UART: [art] Derive Key Pair - Done
3,477,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,555 UART: [art] PUB.X = 303FCE110165065C735F07F0A4DFCD6765DD312AABC043A7BD24F63C5D9D24DB7678C922F27701BF2D0D380852E2D55F
3,500,315 UART: [art] PUB.Y = A7B85F60FFD5BA80A494102E60CB55E5185CB396A152AEEC4E42AEB56CFE9982010AC0DCB349BFB2E67894BFD8654C0B
3,507,276 UART: [art] SIG.R = A64302AEA02A56BFB82795B10D59C20E916FB03D01E53EBF64A550655A50C5E77DBED870C36D0FC4849FB48D3FAFC96D
3,514,047 UART: [art] SIG.S = D788C8E7C171BEBCF8EDA64A0FAD6793047DEF2AE4D679FB9C68F4E204DCE2290EBECE2EDD9DE39F3106C4801F148DEF
3,537,602 UART: Caliptra RT
3,537,945 UART: [state] CFI Enabled
3,657,898 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,596 UART: [rt]cmd =0x43455252, len=4
3,699,308 >>> mbox cmd response data (784 bytes)
3,699,309 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,290 UART: [rt]cmd =0x44504543, len=92
3,913,267 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,006 ready_for_fw is high
1,363,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,681 >>> mbox cmd response: success
2,980,681 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,042,122 UART:
3,042,138 UART: Running Caliptra FMC ...
3,042,546 UART:
3,042,689 UART: [state] CFI Enabled
3,053,217 UART: [fht] FMC Alias Private Key: 7
3,171,897 UART: [art] Extend RT PCRs Done
3,172,325 UART: [art] Lock RT PCRs Done
3,174,273 UART: [art] Populate DV Done
3,182,316 UART: [fht] FMC Alias Private Key: 7
3,183,352 UART: [art] Derive CDI
3,183,632 UART: [art] Store in slot 0x4
3,268,984 UART: [art] Derive Key Pair
3,269,344 UART: [art] Store priv key in slot 0x5
3,282,675 UART: [art] Derive Key Pair - Done
3,297,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,493 UART: [art] PUB.X = DC8E9848A0284819C8216950F1F0010161F725FA04FAEC1DF376A403AC37A26BF3DA3FC6E886E507B015DBC40822A258
3,320,249 UART: [art] PUB.Y = 751E8DF504515127E4AFC577785C7E36E90AE02AEBCA1AC434AD48B19A08DA65079896733D312DF02133B72ED8BC9804
3,327,188 UART: [art] SIG.R = 05B2D2499B38AF06F1D4DA60E4BE424CE142C4A89AC45950BB8B1DF08C4BF174EBEC415C8A0562AF9B3F9D9D543C6F27
3,333,967 UART: [art] SIG.S = D4F874ABDD78AAA14163FE413F9AEC1218C281F7554F0633E41D11C91DD4AE41FD4820B29C14094A2A202394E7DDA758
3,358,129 UART: Caliptra RT
3,358,472 UART: [state] CFI Enabled
3,478,342 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,616 UART: [rt]cmd =0x43455252, len=4
3,519,589 >>> mbox cmd response data (783 bytes)
3,519,590 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,263 UART: [rt]cmd =0x44504543, len=92
3,733,270 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,748 UART: [kat] SHA2-256
891,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,402 UART: [kat] ++
895,554 UART: [kat] sha1
899,586 UART: [kat] SHA2-256
901,526 UART: [kat] SHA2-384
904,197 UART: [kat] SHA2-512-ACC
906,098 UART: [kat] ECC-384
915,759 UART: [kat] HMAC-384Kdf
920,441 UART: [kat] LMS
1,168,753 UART: [kat] --
1,169,696 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,173,944 ready_for_fw is high
1,173,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,183 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,298 UART: [ldev] ++
1,208,466 UART: [ldev] CDI.KEYID = 6
1,208,830 UART: [ldev] SUBJECT.KEYID = 5
1,209,257 UART: [ldev] AUTHORITY.KEYID = 7
1,209,720 UART: [ldev] FE.KEYID = 1
1,214,718 UART: [ldev] Erasing FE.KEYID = 1
1,240,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,306 UART: [ldev] --
1,279,521 UART: [fwproc] Wait for Commands...
1,280,100 UART: [fwproc] Recv command 0x46574c44
1,280,833 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,498 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,687 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,121 >>> mbox cmd response: success
2,824,121 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,825,151 UART: [afmc] ++
2,825,319 UART: [afmc] CDI.KEYID = 6
2,825,682 UART: [afmc] SUBJECT.KEYID = 7
2,826,108 UART: [afmc] AUTHORITY.KEYID = 5
2,861,581 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,167 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,749 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,596 UART: [afmc] --
2,904,557 UART: [cold-reset] --
2,905,269 UART: [state] Locking Datavault
2,906,440 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,044 UART: [state] Locking ICCM
2,907,636 UART: [exit] Launching FMC @ 0x40000130
2,912,966 UART:
2,912,982 UART: Running Caliptra FMC ...
2,913,390 UART:
2,913,444 UART: [state] CFI Enabled
2,923,912 UART: [fht] FMC Alias Private Key: 7
3,042,338 UART: [art] Extend RT PCRs Done
3,042,766 UART: [art] Lock RT PCRs Done
3,044,116 UART: [art] Populate DV Done
3,052,385 UART: [fht] FMC Alias Private Key: 7
3,053,317 UART: [art] Derive CDI
3,053,597 UART: [art] Store in slot 0x4
3,139,510 UART: [art] Derive Key Pair
3,139,870 UART: [art] Store priv key in slot 0x5
3,152,860 UART: [art] Derive Key Pair - Done
3,167,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,793 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,558 UART: [art] PUB.X = B0D3122E0FF80932E4A141764599E7CF853206D6519E1312FE71482E309B4A7E4ADC01374B4EE6FAC2525AE979708CDC
3,190,318 UART: [art] PUB.Y = 5A0D46EF5ECF2ADEA5BDB94504D2250CC64CBE878264E116066B01FF997E89B1E645E75923E2448ECD98845B656BEE59
3,197,263 UART: [art] SIG.R = D59EC24C25EF657609F19E540FA532F0D433DD1676ED90430ADDC5C56E070E1F2581B2175F2B0DD06B8FA3E55788F91E
3,204,023 UART: [art] SIG.S = E6DFA3B0DC011148C586B8851368E33690D4616933C613B3D1303801755E1897CDCCF991278DA6FB5F0CF74FA0DD69BC
3,227,570 UART: Caliptra RT
3,227,821 UART: [state] CFI Enabled
3,347,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,351 UART: [rt]cmd =0x43455252, len=4
3,388,987 >>> mbox cmd response data (784 bytes)
3,388,988 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,881 UART: [rt]cmd =0x44504543, len=92
3,602,850 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,444 ready_for_fw is high
1,059,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,366 >>> mbox cmd response: success
2,679,366 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,740,295 UART:
2,740,311 UART: Running Caliptra FMC ...
2,740,719 UART:
2,740,773 UART: [state] CFI Enabled
2,751,067 UART: [fht] FMC Alias Private Key: 7
2,869,851 UART: [art] Extend RT PCRs Done
2,870,279 UART: [art] Lock RT PCRs Done
2,871,995 UART: [art] Populate DV Done
2,880,448 UART: [fht] FMC Alias Private Key: 7
2,881,518 UART: [art] Derive CDI
2,881,798 UART: [art] Store in slot 0x4
2,967,853 UART: [art] Derive Key Pair
2,968,213 UART: [art] Store priv key in slot 0x5
2,981,569 UART: [art] Derive Key Pair - Done
2,996,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,580 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,345 UART: [art] PUB.X = C785CA69418BB8EBD6F4C336F11AAD4B3CCEE59A9DD406CD40D837B10213E001C39DDFFFF476C4B9D2F23DE6D436EC50
3,019,130 UART: [art] PUB.Y = 7D7120B2A4CAE7E753B8C2905AFDFEF12DF8184E2028FEB0998471E1F6094E5AD099E6C5C620C7F8D539DF21F7FC59CE
3,026,093 UART: [art] SIG.R = 6FD99E19F2CC320974462053B3D03639907EA4B53646A1D65A0FEBED1D3E994A3B5B91D65BC99A5DC4AE5DBB8784DA9F
3,032,871 UART: [art] SIG.S = A449D0AB76247C296031A2E590A65E4915E5E145CBE44E3FC846DB3AAEDB82773D15E345DA46161BB888A52A8F820959
3,056,154 UART: Caliptra RT
3,056,405 UART: [state] CFI Enabled
3,176,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,250 UART: [rt]cmd =0x43455252, len=4
3,218,197 >>> mbox cmd response data (783 bytes)
3,218,198 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,961 UART: [rt]cmd =0x44504543, len=92
3,432,382 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,396 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,671 UART: [kat] SHA2-256
901,611 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,908 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,170,145 UART: [cold-reset] ++
1,170,541 UART: [fht] FHT @ 0x50003400
1,173,331 UART: [idev] ++
1,173,499 UART: [idev] CDI.KEYID = 6
1,173,860 UART: [idev] SUBJECT.KEYID = 7
1,174,285 UART: [idev] UDS.KEYID = 0
1,174,631 ready_for_fw is high
1,174,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,494 UART: [idev] Erasing UDS.KEYID = 0
1,199,866 UART: [idev] Sha1 KeyId Algorithm
1,208,566 UART: [idev] --
1,209,647 UART: [ldev] ++
1,209,815 UART: [ldev] CDI.KEYID = 6
1,210,179 UART: [ldev] SUBJECT.KEYID = 5
1,210,606 UART: [ldev] AUTHORITY.KEYID = 7
1,211,069 UART: [ldev] FE.KEYID = 1
1,216,435 UART: [ldev] Erasing FE.KEYID = 1
1,243,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,864 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,173 UART: [ldev] --
1,282,578 UART: [fwproc] Wait for Commands...
1,283,317 UART: [fwproc] Recv command 0x46574c44
1,284,050 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,774 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,318 >>> mbox cmd response: success
2,826,318 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,456 UART: [afmc] ++
2,827,624 UART: [afmc] CDI.KEYID = 6
2,827,987 UART: [afmc] SUBJECT.KEYID = 7
2,828,413 UART: [afmc] AUTHORITY.KEYID = 5
2,864,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,617 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,366 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,076 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,957 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,658 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,293 UART: [afmc] --
2,907,218 UART: [cold-reset] --
2,908,170 UART: [state] Locking Datavault
2,909,307 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,911 UART: [state] Locking ICCM
2,910,449 UART: [exit] Launching FMC @ 0x40000130
2,915,779 UART:
2,915,795 UART: Running Caliptra FMC ...
2,916,203 UART:
2,916,346 UART: [state] CFI Enabled
2,926,302 UART: [fht] FMC Alias Private Key: 7
3,044,912 UART: [art] Extend RT PCRs Done
3,045,340 UART: [art] Lock RT PCRs Done
3,047,008 UART: [art] Populate DV Done
3,055,213 UART: [fht] FMC Alias Private Key: 7
3,056,377 UART: [art] Derive CDI
3,056,657 UART: [art] Store in slot 0x4
3,143,002 UART: [art] Derive Key Pair
3,143,362 UART: [art] Store priv key in slot 0x5
3,156,952 UART: [art] Derive Key Pair - Done
3,171,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,347 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,112 UART: [art] PUB.X = 5B58274DB73590018C7F57C8A476CC729F3318B65E3CC0B926D4840596E570D69438AD7FA78CE649CFBB38C95FD628F5
3,194,878 UART: [art] PUB.Y = 40F9BD4BB73836061D883AC895F0461E2E7F309C8251DA3B9A970FA9BB9374961E3953A28CD97355D224535F1554F8C0
3,201,818 UART: [art] SIG.R = E4C522683495A39E00B63A53EBC3B85B0C53FAE383749ADB13B961B46F7B55FDA020C7F2ED6612A31CA7927FAEA11CA6
3,208,577 UART: [art] SIG.S = C6CB6E1447DA79C2B8701AD8C453E90731688FF5736EE3969ED8EEE8319D843E0B4289E589AFBA417C784B1E88D02551
3,232,197 UART: Caliptra RT
3,232,540 UART: [state] CFI Enabled
3,351,782 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,522 UART: [rt]cmd =0x43455252, len=4
3,393,276 >>> mbox cmd response data (784 bytes)
3,393,277 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,160 UART: [rt]cmd =0x44504543, len=92
3,607,843 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,643 ready_for_fw is high
1,059,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,231 >>> mbox cmd response: success
2,678,231 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,739,538 UART:
2,739,554 UART: Running Caliptra FMC ...
2,739,962 UART:
2,740,105 UART: [state] CFI Enabled
2,750,545 UART: [fht] FMC Alias Private Key: 7
2,869,689 UART: [art] Extend RT PCRs Done
2,870,117 UART: [art] Lock RT PCRs Done
2,871,619 UART: [art] Populate DV Done
2,879,876 UART: [fht] FMC Alias Private Key: 7
2,880,810 UART: [art] Derive CDI
2,881,090 UART: [art] Store in slot 0x4
2,966,483 UART: [art] Derive Key Pair
2,966,843 UART: [art] Store priv key in slot 0x5
2,980,185 UART: [art] Derive Key Pair - Done
2,995,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,519 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,284 UART: [art] PUB.X = 9AB149C87EC24E46308147F9C08CA9509C6E146CA8085A7A973774F2517680968FC78DF1C565D95BC373083D7107FBE6
3,018,041 UART: [art] PUB.Y = 53F888F61479280B195785D7F5CA83966FC5F5886B979098B4C13C09A5D56095517166BEA73700A213AC01BD6E56D78B
3,024,952 UART: [art] SIG.R = 1FF84BE7F9E319D8741B8A72B015ECFDF96B32693E7F3E917623E5D6DDC00982EC4851ABDB87C8AE780AFA2DB74760EE
3,031,734 UART: [art] SIG.S = BD64EBE677ABB371875DEDAB1818457AC85A28396D86A45A9115ABA1DEA0F7CADD98C2EE71A0AF8287916AFFB49FC601
3,055,917 UART: Caliptra RT
3,056,260 UART: [state] CFI Enabled
3,175,545 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,975 UART: [rt]cmd =0x43455252, len=4
3,216,792 >>> mbox cmd response data (783 bytes)
3,216,793 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,246,790 UART: [rt]cmd =0x44504543, len=92
3,431,380 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,662 UART: [state] LifecycleState = Unprovisioned
85,317 UART: [state] DebugLocked = No
85,843 UART: [state] WD Timer not started. Device not locked for debugging
87,072 UART: [kat] SHA2-256
892,722 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,847 UART: [kat] ++
896,999 UART: [kat] sha1
901,211 UART: [kat] SHA2-256
903,151 UART: [kat] SHA2-384
906,120 UART: [kat] SHA2-512-ACC
908,021 UART: [kat] ECC-384
917,644 UART: [kat] HMAC-384Kdf
922,060 UART: [kat] LMS
1,170,388 UART: [kat] --
1,171,435 UART: [cold-reset] ++
1,171,977 UART: [fht] FHT @ 0x50003400
1,174,638 UART: [idev] ++
1,174,806 UART: [idev] CDI.KEYID = 6
1,175,166 UART: [idev] SUBJECT.KEYID = 7
1,175,590 UART: [idev] UDS.KEYID = 0
1,175,935 ready_for_fw is high
1,175,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,710 UART: [idev] Erasing UDS.KEYID = 0
1,200,351 UART: [idev] Sha1 KeyId Algorithm
1,208,965 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,420 UART: [ldev] SUBJECT.KEYID = 5
1,210,846 UART: [ldev] AUTHORITY.KEYID = 7
1,211,309 UART: [ldev] FE.KEYID = 1
1,216,775 UART: [ldev] Erasing FE.KEYID = 1
1,243,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,366 UART: [fwproc] Recv command 0x46574c44
1,284,094 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,306 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,849 >>> mbox cmd response: success
2,828,849 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,829,949 UART: [afmc] ++
2,830,117 UART: [afmc] CDI.KEYID = 6
2,830,479 UART: [afmc] SUBJECT.KEYID = 7
2,830,904 UART: [afmc] AUTHORITY.KEYID = 5
2,867,069 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,636 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,093 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,976 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,677 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,547 UART: [afmc] --
2,910,525 UART: [cold-reset] --
2,911,467 UART: [state] Locking Datavault
2,912,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,228 UART: [state] Locking ICCM
2,913,742 UART: [exit] Launching FMC @ 0x40000130
2,919,072 UART:
2,919,088 UART: Running Caliptra FMC ...
2,919,496 UART:
2,919,550 UART: [state] CFI Enabled
2,930,134 UART: [fht] FMC Alias Private Key: 7
3,049,062 UART: [art] Extend RT PCRs Done
3,049,490 UART: [art] Lock RT PCRs Done
3,051,046 UART: [art] Populate DV Done
3,059,051 UART: [fht] FMC Alias Private Key: 7
3,060,089 UART: [art] Derive CDI
3,060,369 UART: [art] Store in slot 0x4
3,146,320 UART: [art] Derive Key Pair
3,146,680 UART: [art] Store priv key in slot 0x5
3,159,520 UART: [art] Derive Key Pair - Done
3,174,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,155 UART: [art] PUB.X = 2FD6D891D6320513B7583E3266A57BD2F702A6F2D24A9734CE3E5BF9DB1444DD66D90980B38AC4CFE6CAF617DC60B554
3,196,926 UART: [art] PUB.Y = 47B8C48332D0A637E66F0C10F8B60FECBF71044A7C888DC9965E2B887AF87A726C5980DE3DB0F60EFE165D61A7F88762
3,203,872 UART: [art] SIG.R = 160649AC0DA4DEAE598D31859BF39F1A146DF0226992ADC699DF92EBC3EFF4C92AA820DF06CCBA86C33FB554CAF32FBE
3,210,659 UART: [art] SIG.S = 8D7696C9DA582A970812960ECA30306280AD5A5CDE7DBEE878C65F5DFC8D618A0BC63E175233A4DDA28103339AFFB78E
3,234,623 UART: Caliptra RT
3,234,874 UART: [state] CFI Enabled
3,354,071 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,433 UART: [rt]cmd =0x43455252, len=4
3,395,136 >>> mbox cmd response data (783 bytes)
3,395,137 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,008 UART: [rt]cmd =0x44504543, len=92
3,609,267 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,717 ready_for_fw is high
1,059,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,490 >>> mbox cmd response: success
2,679,490 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,741,423 UART:
2,741,439 UART: Running Caliptra FMC ...
2,741,847 UART:
2,741,901 UART: [state] CFI Enabled
2,752,215 UART: [fht] FMC Alias Private Key: 7
2,871,365 UART: [art] Extend RT PCRs Done
2,871,793 UART: [art] Lock RT PCRs Done
2,873,207 UART: [art] Populate DV Done
2,881,302 UART: [fht] FMC Alias Private Key: 7
2,882,322 UART: [art] Derive CDI
2,882,602 UART: [art] Store in slot 0x4
2,968,719 UART: [art] Derive Key Pair
2,969,079 UART: [art] Store priv key in slot 0x5
2,982,619 UART: [art] Derive Key Pair - Done
2,997,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,683 UART: [art] PUB.X = 0868B1BD46C1DD15C96339C752E0B30C40E5D61AADB3136F62B3C36F438E6C8A35578A8D11DB63DBF8A025DC4046728F
3,020,455 UART: [art] PUB.Y = 24BDF675269D9D1174CB106777EC1BBBCDEAE37496310F0DA0FE06C4BA6F841C8F67DE951EDBAC84BACC5E44E3B2FC5A
3,027,424 UART: [art] SIG.R = 7855D5DD3BC918024E29936961A71D722516C591698D97DB41E1AB249090B42D1864AE72FFF981D2EA77A50704342D00
3,034,155 UART: [art] SIG.S = 0F288A7CE0CD0048DDF503FEA859EB7396752A1622FE52005FDFFA930EB25BDA4FF99F1BDD8344FE03B2F038C6721BDB
3,058,225 UART: Caliptra RT
3,058,476 UART: [state] CFI Enabled
3,178,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,652 UART: [rt]cmd =0x43455252, len=4
3,220,539 >>> mbox cmd response data (782 bytes)
3,220,540 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,405 UART: [rt]cmd =0x44504543, len=92
3,434,664 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
893,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,214 UART: [kat] ++
897,366 UART: [kat] sha1
901,500 UART: [kat] SHA2-256
903,440 UART: [kat] SHA2-384
906,341 UART: [kat] SHA2-512-ACC
908,242 UART: [kat] ECC-384
918,195 UART: [kat] HMAC-384Kdf
922,923 UART: [kat] LMS
1,171,251 UART: [kat] --
1,172,300 UART: [cold-reset] ++
1,172,750 UART: [fht] FHT @ 0x50003400
1,175,405 UART: [idev] ++
1,175,573 UART: [idev] CDI.KEYID = 6
1,175,933 UART: [idev] SUBJECT.KEYID = 7
1,176,357 UART: [idev] UDS.KEYID = 0
1,176,702 ready_for_fw is high
1,176,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,379 UART: [idev] Erasing UDS.KEYID = 0
1,201,330 UART: [idev] Sha1 KeyId Algorithm
1,209,878 UART: [idev] --
1,210,960 UART: [ldev] ++
1,211,128 UART: [ldev] CDI.KEYID = 6
1,211,491 UART: [ldev] SUBJECT.KEYID = 5
1,211,917 UART: [ldev] AUTHORITY.KEYID = 7
1,212,380 UART: [ldev] FE.KEYID = 1
1,217,292 UART: [ldev] Erasing FE.KEYID = 1
1,243,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,588 UART: [ldev] --
1,282,925 UART: [fwproc] Wait for Commands...
1,283,737 UART: [fwproc] Recv command 0x46574c44
1,284,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,166 >>> mbox cmd response: success
2,827,166 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,828,314 UART: [afmc] ++
2,828,482 UART: [afmc] CDI.KEYID = 6
2,828,844 UART: [afmc] SUBJECT.KEYID = 7
2,829,269 UART: [afmc] AUTHORITY.KEYID = 5
2,864,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,517 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,265 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,857 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,558 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,528 UART: [afmc] --
2,908,656 UART: [cold-reset] --
2,909,632 UART: [state] Locking Datavault
2,910,953 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,557 UART: [state] Locking ICCM
2,912,007 UART: [exit] Launching FMC @ 0x40000130
2,917,337 UART:
2,917,353 UART: Running Caliptra FMC ...
2,917,761 UART:
2,917,904 UART: [state] CFI Enabled
2,928,702 UART: [fht] FMC Alias Private Key: 7
3,047,664 UART: [art] Extend RT PCRs Done
3,048,092 UART: [art] Lock RT PCRs Done
3,049,412 UART: [art] Populate DV Done
3,057,471 UART: [fht] FMC Alias Private Key: 7
3,058,517 UART: [art] Derive CDI
3,058,797 UART: [art] Store in slot 0x4
3,144,194 UART: [art] Derive Key Pair
3,144,554 UART: [art] Store priv key in slot 0x5
3,158,336 UART: [art] Derive Key Pair - Done
3,173,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,246 UART: [art] PUB.X = F71A5D0C2929413E3BD7F8B92782D30E1E3D5AACD05A9C2C5DC1917076EDC8E7A32EE38A61418C56819E478E3ED5158B
3,196,020 UART: [art] PUB.Y = B42222BA705898EA453D239EBBC448B315F4BBE628653DB7F2709998C2EC176ABAEF0B6FD69BF47AA0DF4DF0D46ADA16
3,202,987 UART: [art] SIG.R = B46CF13B84B0317A725DED43D1792FEC2E2AB2C6D253A7F3EB302AB2885DF6376F1E677015DC128B7DAB9CC1BCB74594
3,209,773 UART: [art] SIG.S = A7201840AEBA2B97A16964D580A942EAAC0D0506777821A76A55CE716A46D8DE4E0DD5C249985AFFF26F1C0F1207AB36
3,233,399 UART: Caliptra RT
3,233,742 UART: [state] CFI Enabled
3,353,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,784 UART: [rt]cmd =0x43455252, len=4
3,394,656 >>> mbox cmd response data (784 bytes)
3,394,657 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,512 UART: [rt]cmd =0x44504543, len=92
3,609,573 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 ready_for_fw is high
1,060,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,425 >>> mbox cmd response: success
2,680,425 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,334 UART:
2,742,350 UART: Running Caliptra FMC ...
2,742,758 UART:
2,742,901 UART: [state] CFI Enabled
2,753,849 UART: [fht] FMC Alias Private Key: 7
2,873,123 UART: [art] Extend RT PCRs Done
2,873,551 UART: [art] Lock RT PCRs Done
2,875,245 UART: [art] Populate DV Done
2,883,532 UART: [fht] FMC Alias Private Key: 7
2,884,634 UART: [art] Derive CDI
2,884,914 UART: [art] Store in slot 0x4
2,970,737 UART: [art] Derive Key Pair
2,971,097 UART: [art] Store priv key in slot 0x5
2,984,351 UART: [art] Derive Key Pair - Done
2,999,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,189 UART: [art] PUB.X = 935BA5B43220807323F9A3DF749A3A6FF5D5EA2FB76ADE376B872F03A49D4869E7D33C40B0DD553F230FAF06F5985F63
3,021,958 UART: [art] PUB.Y = 30692E150D27B72760255167F881A1E2BD7B830AA9C1F6DEB2D9A7A01E48842F59798ACFE96AA2A6788D06FA7C7A24E3
3,028,905 UART: [art] SIG.R = A210C47A901684676D2AC50BD888696DEDE01EEC29BE0683CF8B69CE3749692C5AE98249E3831A5AAF0B866E39FF96E9
3,035,674 UART: [art] SIG.S = C901EEB10DECBC3A32A7E6C1D08D5B5BED10FD459E5C9D581397EA27517418F2DB7B738C2365625BCCFA93833CC555E3
3,059,896 UART: Caliptra RT
3,060,239 UART: [state] CFI Enabled
3,180,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,583 UART: [rt]cmd =0x43455252, len=4
3,221,287 >>> mbox cmd response data (784 bytes)
3,221,288 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,987 UART: [rt]cmd =0x44504543, len=92
3,435,844 >>> mbox cmd response data (6284 bytes)
test test_certs::test_dpe_leaf_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,919 writing to cptra_bootfsm_go
193,206 UART:
193,539 UART: Running Caliptra ROM ...
194,732 UART:
194,889 UART: [state] CFI Enabled
262,603 UART: [state] LifecycleState = Unprovisioned
264,523 UART: [state] DebugLocked = No
267,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,782 UART: [kat] SHA2-256
441,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,975 UART: [kat] ++
452,452 UART: [kat] sha1
463,828 UART: [kat] SHA2-256
466,560 UART: [kat] SHA2-384
472,196 UART: [kat] SHA2-512-ACC
474,561 UART: [kat] ECC-384
2,769,075 UART: [kat] HMAC-384Kdf
2,800,597 UART: [kat] LMS
3,990,848 UART: [kat] --
3,996,269 UART: [cold-reset] ++
3,998,837 UART: [fht] Storing FHT @ 0x50003400
4,010,058 UART: [idev] ++
4,010,664 UART: [idev] CDI.KEYID = 6
4,011,555 UART: [idev] SUBJECT.KEYID = 7
4,012,804 UART: [idev] UDS.KEYID = 0
4,013,776 ready_for_fw is high
4,013,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,521 UART: [idev] Erasing UDS.KEYID = 0
7,349,068 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,461 UART: [idev] --
7,374,887 UART: [ldev] ++
7,375,520 UART: [ldev] CDI.KEYID = 6
7,376,428 UART: [ldev] SUBJECT.KEYID = 5
7,377,660 UART: [ldev] AUTHORITY.KEYID = 7
7,378,954 UART: [ldev] FE.KEYID = 1
7,422,273 UART: [ldev] Erasing FE.KEYID = 1
10,753,015 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,611 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,563 UART: [ldev] --
13,114,876 UART: [fwproc] Waiting for Commands...
13,116,584 UART: [fwproc] Received command 0x46574c44
13,118,761 UART: [fwproc] Received Image of size 118548 bytes
17,225,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,486 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,649 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,933 >>> mbox cmd response: success
17,703,947 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,706,496 UART: [afmc] ++
17,707,083 UART: [afmc] CDI.KEYID = 6
17,708,053 UART: [afmc] SUBJECT.KEYID = 7
17,709,271 UART: [afmc] AUTHORITY.KEYID = 5
21,070,734 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,750 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,435 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,159 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,550 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,736 UART: [afmc] --
23,441,651 UART: [cold-reset] --
23,444,998 UART: [state] Locking Datavault
23,451,043 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,809 UART: [state] Locking ICCM
23,453,956 UART: [exit] Launching FMC @ 0x40000130
23,462,357 UART:
23,462,597 UART: Running Caliptra FMC ...
23,463,700 UART:
23,463,860 UART: [state] CFI Enabled
23,530,504 UART: [fht] FMC Alias Private Key: 7
25,870,452 UART: [art] Extend RT PCRs Done
25,871,679 UART: [art] Lock RT PCRs Done
25,873,118 UART: [art] Populate DV Done
25,878,419 UART: [fht] FMC Alias Private Key: 7
25,880,061 UART: [art] Derive CDI
25,880,875 UART: [art] Store in slot 0x4
25,938,377 UART: [art] Derive Key Pair
25,939,419 UART: [art] Store priv key in slot 0x5
29,231,684 UART: [art] Derive Key Pair - Done
29,244,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,303 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,816 UART: [art] PUB.X = 3299A48410B4F1D8D7A06ED5DF11B9E7392C3A80C11CC29B3B436833FA0384F0F368991AC26FFF8A537E6B08A3144A37
31,541,116 UART: [art] PUB.Y = E3E723EE55E66C0D9D497845E1A93C5A9A72EDB59CCA4F3A3C4E3E9D8C9C1A007B5CF907A00A4535AA3338E8A6DE7452
31,548,336 UART: [art] SIG.R = 9E001E50E520FAA26442DCA4024C0F4EBFEE2C48EAED884320C25E71C87D1A0B4D7432C0FBA45C4CCEB78AB1C4BE78B1
31,555,719 UART: [art] SIG.S = EE2C5B40E2C95D1E283869BCB5A59DCA05B9CD473ABC11312465FF37847397E0FA6F255B10613A0318ED7C5015285131
32,860,695 UART: Caliptra RT
32,861,399 UART: [state] CFI Enabled
33,037,897 UART: [rt] RT listening for mailbox commands...
33,069,097 UART: [rt]cmd =0x4c444556, len=4
33,080,281 >>> mbox cmd response data (687 bytes)
33,121,364 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,151,473 UART: [rt]cmd =0x43455246, len=4
33,164,467 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,784,071 ready_for_fw is high
3,784,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,036 >>> mbox cmd response: success
17,943,246 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,629,853 UART:
23,630,248 UART: Running Caliptra FMC ...
23,631,543 UART:
23,631,737 UART: [state] CFI Enabled
23,697,657 UART: [fht] FMC Alias Private Key: 7
26,037,898 UART: [art] Extend RT PCRs Done
26,039,122 UART: [art] Lock RT PCRs Done
26,040,994 UART: [art] Populate DV Done
26,046,631 UART: [fht] FMC Alias Private Key: 7
26,048,230 UART: [art] Derive CDI
26,049,048 UART: [art] Store in slot 0x4
26,106,603 UART: [art] Derive Key Pair
26,107,602 UART: [art] Store priv key in slot 0x5
29,400,126 UART: [art] Derive Key Pair - Done
29,413,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,203 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,704 UART: [art] PUB.X = AE90AA6ECA79F2340217EC56AE90C7C1255D8EF69DDF1A6EC28F132A07748B583D85B88707F149F6ED7C13C4B778A37F
31,711,009 UART: [art] PUB.Y = 68B4AB0B142C6A8E156FF21C5F2ECFDA123B1DC2A7802F3DEC62EFDDC23C21CF71FA099ED9BFE107E38178DCA5726D66
31,718,281 UART: [art] SIG.R = 8240167EEA259802CA4E72D2FCA13D8D11E78B97A034D04995C5BBC83ED0D2C2474ABF13E853175684AA49F4DEC6A3BD
31,725,684 UART: [art] SIG.S = 98FD292A9808669DAE38EC37C85154E2E9A1D75FABC359A05B3B4AF21010218580C37B32D5B02815F4962BBE41FB241F
33,031,382 UART: Caliptra RT
33,032,085 UART: [state] CFI Enabled
33,209,404 UART: [rt] RT listening for mailbox commands...
33,240,961 UART: [rt]cmd =0x4c444556, len=4
33,252,037 >>> mbox cmd response data (687 bytes)
33,293,021 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,322,933 UART: [rt]cmd =0x43455246, len=4
33,335,782 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,579 writing to cptra_bootfsm_go
192,802 UART:
193,156 UART: Running Caliptra ROM ...
194,334 UART:
604,178 UART: [state] CFI Enabled
617,613 UART: [state] LifecycleState = Unprovisioned
619,558 UART: [state] DebugLocked = No
622,081 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,887 UART: [kat] SHA2-256
796,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,194 UART: [kat] ++
807,727 UART: [kat] sha1
818,673 UART: [kat] SHA2-256
821,391 UART: [kat] SHA2-384
825,901 UART: [kat] SHA2-512-ACC
828,266 UART: [kat] ECC-384
3,112,543 UART: [kat] HMAC-384Kdf
3,124,357 UART: [kat] LMS
4,314,439 UART: [kat] --
4,318,954 UART: [cold-reset] ++
4,321,239 UART: [fht] Storing FHT @ 0x50003400
4,333,421 UART: [idev] ++
4,333,975 UART: [idev] CDI.KEYID = 6
4,334,949 UART: [idev] SUBJECT.KEYID = 7
4,336,188 UART: [idev] UDS.KEYID = 0
4,337,178 ready_for_fw is high
4,337,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,303 UART: [idev] Erasing UDS.KEYID = 0
7,629,008 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,686 UART: [idev] --
7,654,562 UART: [ldev] ++
7,655,125 UART: [ldev] CDI.KEYID = 6
7,656,057 UART: [ldev] SUBJECT.KEYID = 5
7,657,184 UART: [ldev] AUTHORITY.KEYID = 7
7,658,562 UART: [ldev] FE.KEYID = 1
7,670,102 UART: [ldev] Erasing FE.KEYID = 1
10,959,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,528 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,849 UART: [ldev] --
13,317,896 UART: [fwproc] Waiting for Commands...
13,319,875 UART: [fwproc] Received command 0x46574c44
13,322,101 UART: [fwproc] Received Image of size 118548 bytes
17,423,083 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,983 >>> mbox cmd response: success
17,904,010 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,906,397 UART: [afmc] ++
17,907,043 UART: [afmc] CDI.KEYID = 6
17,907,950 UART: [afmc] SUBJECT.KEYID = 7
17,909,243 UART: [afmc] AUTHORITY.KEYID = 5
21,220,350 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,348 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,609 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,025 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,749 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,185 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,914 UART: [afmc] --
23,588,478 UART: [cold-reset] --
23,592,665 UART: [state] Locking Datavault
23,597,813 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,507 UART: [state] Locking ICCM
23,601,165 UART: [exit] Launching FMC @ 0x40000130
23,609,552 UART:
23,609,786 UART: Running Caliptra FMC ...
23,610,881 UART:
23,611,034 UART: [state] CFI Enabled
23,619,291 UART: [fht] FMC Alias Private Key: 7
25,959,700 UART: [art] Extend RT PCRs Done
25,960,915 UART: [art] Lock RT PCRs Done
25,962,807 UART: [art] Populate DV Done
25,968,047 UART: [fht] FMC Alias Private Key: 7
25,969,739 UART: [art] Derive CDI
25,970,542 UART: [art] Store in slot 0x4
26,013,344 UART: [art] Derive Key Pair
26,014,405 UART: [art] Store priv key in slot 0x5
29,256,195 UART: [art] Derive Key Pair - Done
29,269,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,817 UART: [art] PUB.X = A1AA0D284A0EDCC2FA581114ACD3CCFCAAEFFBA516AD1952133CC6A94F887593E9BCD0F933643C8FDDD985CB990EF6AE
31,558,118 UART: [art] PUB.Y = 4CFEB30EEC2D1B8AC6D0FC7D1ED0D78EE960D9FC695DB81E93BF38365D9C32A68FE33A6E3EE33EFE8ECD108C13C2DC42
31,565,391 UART: [art] SIG.R = F24014C780D39987BC52A30199030CFC3EA7C2D32455558E177FCEFB3C091F0C282070658079A2114702B4FA4597EAFB
31,572,770 UART: [art] SIG.S = BDBC36AA17EC5737D948BA22FB626019D2851792B6C75ADB1EED3BB9143A2E3313C64F228C91E40FD868B9079F70AAA6
32,877,475 UART: Caliptra RT
32,878,170 UART: [state] CFI Enabled
33,011,693 UART: [rt] RT listening for mailbox commands...
33,042,809 UART: [rt]cmd =0x4c444556, len=4
33,053,987 >>> mbox cmd response data (687 bytes)
33,095,718 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,125,597 UART: [rt]cmd =0x43455246, len=4
33,138,649 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
4,125,676 ready_for_fw is high
4,126,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,117 >>> mbox cmd response: success
18,162,398 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,801,115 UART:
23,801,516 UART: Running Caliptra FMC ...
23,802,679 UART:
23,802,840 UART: [state] CFI Enabled
23,810,580 UART: [fht] FMC Alias Private Key: 7
26,150,185 UART: [art] Extend RT PCRs Done
26,151,480 UART: [art] Lock RT PCRs Done
26,153,098 UART: [art] Populate DV Done
26,158,223 UART: [fht] FMC Alias Private Key: 7
26,159,764 UART: [art] Derive CDI
26,160,497 UART: [art] Store in slot 0x4
26,203,357 UART: [art] Derive Key Pair
26,204,350 UART: [art] Store priv key in slot 0x5
29,446,351 UART: [art] Derive Key Pair - Done
29,459,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,804 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,310 UART: [art] PUB.X = AF0B6572ADCD181439B7450D3F55A44B8F4807AE2A75230A5B906E712C240151BD3B4DC2BFA73FD6A34B36D0321A8818
31,748,614 UART: [art] PUB.Y = 1CDBC908C693E47313CBC4540B1A95DDF3FCBAB5446C84F39CEB1C4A7507C0635676545B263EF78EBC208C2A653EEA7E
31,755,912 UART: [art] SIG.R = F3F3F61F1ADE14D6BF6E0EFA72660907C21880EE5ABFF0A74AAD6BAECF9A2467790AB41C55034125A6EA182DDC96D55A
31,763,320 UART: [art] SIG.S = 23C74BB617F1D9CEBC9EA4857446DDB936D6A54290452C337B52635AD00F5AB0BB6B12A71E66766868187C0056B0A722
33,069,079 UART: Caliptra RT
33,069,783 UART: [state] CFI Enabled
33,203,420 UART: [rt] RT listening for mailbox commands...
33,234,908 UART: [rt]cmd =0x4c444556, len=4
33,246,108 >>> mbox cmd response data (687 bytes)
33,287,969 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,318,291 UART: [rt]cmd =0x43455246, len=4
33,331,203 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,198 UART:
192,563 UART: Running Caliptra ROM ...
193,748 UART:
193,900 UART: [state] CFI Enabled
262,739 UART: [state] LifecycleState = Unprovisioned
264,728 UART: [state] DebugLocked = No
266,759 UART: [state] WD Timer not started. Device not locked for debugging
271,505 UART: [kat] SHA2-256
451,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,949 UART: [kat] ++
462,450 UART: [kat] sha1
472,476 UART: [kat] SHA2-256
475,196 UART: [kat] SHA2-384
479,618 UART: [kat] SHA2-512-ACC
481,997 UART: [kat] ECC-384
2,947,941 UART: [kat] HMAC-384Kdf
2,969,437 UART: [kat] LMS
3,445,961 UART: [kat] --
3,452,152 UART: [cold-reset] ++
3,454,719 UART: [fht] FHT @ 0x50003400
3,465,972 UART: [idev] ++
3,466,538 UART: [idev] CDI.KEYID = 6
3,467,439 UART: [idev] SUBJECT.KEYID = 7
3,468,676 UART: [idev] UDS.KEYID = 0
3,469,717 ready_for_fw is high
3,469,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,240 UART: [idev] Erasing UDS.KEYID = 0
5,986,092 UART: [idev] Sha1 KeyId Algorithm
6,008,330 UART: [idev] --
6,013,246 UART: [ldev] ++
6,013,890 UART: [ldev] CDI.KEYID = 6
6,014,783 UART: [ldev] SUBJECT.KEYID = 5
6,015,994 UART: [ldev] AUTHORITY.KEYID = 7
6,017,222 UART: [ldev] FE.KEYID = 1
6,055,520 UART: [ldev] Erasing FE.KEYID = 1
8,562,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,925 UART: [ldev] --
10,372,724 UART: [fwproc] Wait for Commands...
10,374,862 UART: [fwproc] Recv command 0x46574c44
10,376,840 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,524 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,674 >>> mbox cmd response: success
14,347,859 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,351,358 UART: [afmc] ++
14,351,941 UART: [afmc] CDI.KEYID = 6
14,352,905 UART: [afmc] SUBJECT.KEYID = 7
14,354,065 UART: [afmc] AUTHORITY.KEYID = 5
16,895,344 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,812 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,874 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,426 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,297 UART: [afmc] --
18,713,797 UART: [cold-reset] --
18,717,762 UART: [state] Locking Datavault
18,721,781 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,587 UART: [state] Locking ICCM
18,725,880 UART: [exit] Launching FMC @ 0x40000130
18,734,280 UART:
18,734,511 UART: Running Caliptra FMC ...
18,735,607 UART:
18,735,761 UART: [state] CFI Enabled
18,794,723 UART: [fht] FMC Alias Private Key: 7
20,561,200 UART: [art] Extend RT PCRs Done
20,562,432 UART: [art] Lock RT PCRs Done
20,564,296 UART: [art] Populate DV Done
20,569,756 UART: [fht] FMC Alias Private Key: 7
20,571,345 UART: [art] Derive CDI
20,572,079 UART: [art] Store in slot 0x4
20,627,642 UART: [art] Derive Key Pair
20,628,684 UART: [art] Store priv key in slot 0x5
23,091,113 UART: [art] Derive Key Pair - Done
23,104,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,183 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,692 UART: [art] PUB.X = 585991646159853E6E99FF1C3AE9C29D5EF6A104C03B012D392DB9C0085B7AAF57DE443422B109EEB57F31739DE02285
24,824,942 UART: [art] PUB.Y = E57DE01BF65B94D3C9643EBB9E08B3DDF4C67B1EBACB46B7D8AA8D12CFB1B51310C20C51472A495EDD972ECAF2ACB995
24,832,236 UART: [art] SIG.R = E739CD7D3F148E3A261724F748CC976B7295521317B674E066393A8D5613447DF418BBD06E0BDD048042C6035D91ABA8
24,839,630 UART: [art] SIG.S = F421C2770198DBE4799529D71D1328F01A19C53384982B2515A18E387CF537296089B4F7C695990C5B8D31A829AFBD07
25,818,465 UART: Caliptra RT
25,819,317 UART: [state] CFI Enabled
25,998,460 UART: [rt] RT listening for mailbox commands...
26,029,927 UART: [rt]cmd =0x4c444556, len=4
26,040,965 >>> mbox cmd response data (687 bytes)
26,082,159 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,112,059 UART: [rt]cmd =0x43455246, len=4
26,124,707 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,463,355 ready_for_fw is high
3,463,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,702 >>> mbox cmd response: success
14,236,167 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,514,034 UART:
18,514,446 UART: Running Caliptra FMC ...
18,515,641 UART:
18,515,807 UART: [state] CFI Enabled
18,584,445 UART: [fht] FMC Alias Private Key: 7
20,371,972 UART: [art] Extend RT PCRs Done
20,373,194 UART: [art] Lock RT PCRs Done
20,374,771 UART: [art] Populate DV Done
20,380,036 UART: [fht] FMC Alias Private Key: 7
20,381,634 UART: [art] Derive CDI
20,382,452 UART: [art] Store in slot 0x4
20,438,546 UART: [art] Derive Key Pair
20,439,591 UART: [art] Store priv key in slot 0x5
22,903,020 UART: [art] Derive Key Pair - Done
22,915,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,994 UART: [art] PUB.X = AE4DB09D6C9562026BAB00F313E3123BD8647EB25B2A178F9A172AD743589056D18915D2461A977EC583BC6EF766050C
24,637,198 UART: [art] PUB.Y = 1D79CEE1D37C49AF8C53E3429B62E27C8E6BA08379491A15896801DF4DCEEEFD096759729B2300F511DDFDA47DA2200B
24,644,457 UART: [art] SIG.R = 9B2E7188D1D2DEC7DA2A99819091EAE04C523963B972693562F6C533778ABF9F99B62AB456926269E44091F6B6BA7106
24,651,888 UART: [art] SIG.S = 607E0F91D04A872AA8C9B82F0B8A420738791A735468BE7EAE34E66C8B2D4033A986CE11C8FA0787DDA631E95FD3E7DC
25,630,783 UART: Caliptra RT
25,631,486 UART: [state] CFI Enabled
25,811,687 UART: [rt] RT listening for mailbox commands...
25,843,042 UART: [rt]cmd =0x4c444556, len=4
25,854,172 >>> mbox cmd response data (687 bytes)
25,895,196 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,924,966 UART: [rt]cmd =0x43455246, len=4
25,937,442 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,458 UART:
192,821 UART: Running Caliptra ROM ...
193,925 UART:
603,646 UART: [state] CFI Enabled
620,204 UART: [state] LifecycleState = Unprovisioned
622,180 UART: [state] DebugLocked = No
623,709 UART: [state] WD Timer not started. Device not locked for debugging
627,047 UART: [kat] SHA2-256
806,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,504 UART: [kat] ++
817,953 UART: [kat] sha1
828,257 UART: [kat] SHA2-256
830,977 UART: [kat] SHA2-384
836,258 UART: [kat] SHA2-512-ACC
838,626 UART: [kat] ECC-384
3,280,430 UART: [kat] HMAC-384Kdf
3,291,669 UART: [kat] LMS
3,768,199 UART: [kat] --
3,773,545 UART: [cold-reset] ++
3,774,856 UART: [fht] FHT @ 0x50003400
3,785,295 UART: [idev] ++
3,785,858 UART: [idev] CDI.KEYID = 6
3,786,741 UART: [idev] SUBJECT.KEYID = 7
3,788,064 UART: [idev] UDS.KEYID = 0
3,788,966 ready_for_fw is high
3,789,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,018 UART: [idev] Erasing UDS.KEYID = 0
6,265,178 UART: [idev] Sha1 KeyId Algorithm
6,288,244 UART: [idev] --
6,293,290 UART: [ldev] ++
6,293,892 UART: [ldev] CDI.KEYID = 6
6,294,781 UART: [ldev] SUBJECT.KEYID = 5
6,295,942 UART: [ldev] AUTHORITY.KEYID = 7
6,297,286 UART: [ldev] FE.KEYID = 1
6,308,805 UART: [ldev] Erasing FE.KEYID = 1
8,789,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,150 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,494 UART: [ldev] --
10,582,572 UART: [fwproc] Wait for Commands...
10,584,184 UART: [fwproc] Recv command 0x46574c44
10,586,172 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,080 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,139,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,212,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,540,683 >>> mbox cmd response: success
14,541,172 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,543,944 UART: [afmc] ++
14,544,521 UART: [afmc] CDI.KEYID = 6
14,545,479 UART: [afmc] SUBJECT.KEYID = 7
14,546,701 UART: [afmc] AUTHORITY.KEYID = 5
17,049,090 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,774,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,776,421 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,792,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,808,311 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,823,839 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,912 UART: [afmc] --
18,852,458 UART: [cold-reset] --
18,855,453 UART: [state] Locking Datavault
18,861,095 UART: [state] Locking PCR0, PCR1 and PCR31
18,862,855 UART: [state] Locking ICCM
18,864,199 UART: [exit] Launching FMC @ 0x40000130
18,872,632 UART:
18,872,881 UART: Running Caliptra FMC ...
18,874,007 UART:
18,874,174 UART: [state] CFI Enabled
18,882,164 UART: [fht] FMC Alias Private Key: 7
20,648,507 UART: [art] Extend RT PCRs Done
20,649,731 UART: [art] Lock RT PCRs Done
20,651,304 UART: [art] Populate DV Done
20,656,777 UART: [fht] FMC Alias Private Key: 7
20,658,426 UART: [art] Derive CDI
20,659,243 UART: [art] Store in slot 0x4
20,701,519 UART: [art] Derive Key Pair
20,702,556 UART: [art] Store priv key in slot 0x5
23,129,389 UART: [art] Derive Key Pair - Done
23,142,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,848,806 UART: [art] Erasing AUTHORITY.KEYID = 7
24,850,312 UART: [art] PUB.X = E2CE59991FE8CAC1DD70C9D166E7097C4137FF150E3C176928D160A5A3BBC9959F264ACCD9CF4CEEBCC1DB4EFB5C10D6
24,857,674 UART: [art] PUB.Y = AABC33DA240FB79C3F8A5FAF216CC0A4622EA487695E7B37855427E22F099E3A4AEF33A006A398644A2A39435361405D
24,864,874 UART: [art] SIG.R = 7A5419AEBD1014CF586F304E809916BC55A3E8DAAF7742D42451CCA77B700C180E5F308BF6EDF83CB02E169B22AB2828
24,872,265 UART: [art] SIG.S = C0165E334A237000AA2A3BA58D760F8801E4C6216E9C11ED8BBF1FB14920B6D18593F6D4B023A36A47B47401D8D53475
25,851,074 UART: Caliptra RT
25,851,788 UART: [state] CFI Enabled
25,984,530 UART: [rt] RT listening for mailbox commands...
26,016,221 UART: [rt]cmd =0x4c444556, len=4
26,027,262 >>> mbox cmd response data (687 bytes)
26,068,512 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,098,502 UART: [rt]cmd =0x43455246, len=4
26,111,248 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,539 writing to cptra_bootfsm_go
3,790,824 ready_for_fw is high
3,791,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,460,444 >>> mbox cmd response: success
14,461,254 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,711,910 UART:
18,712,284 UART: Running Caliptra FMC ...
18,713,493 UART:
18,713,690 UART: [state] CFI Enabled
18,721,767 UART: [fht] FMC Alias Private Key: 7
20,487,799 UART: [art] Extend RT PCRs Done
20,489,010 UART: [art] Lock RT PCRs Done
20,491,019 UART: [art] Populate DV Done
20,496,488 UART: [fht] FMC Alias Private Key: 7
20,498,029 UART: [art] Derive CDI
20,498,849 UART: [art] Store in slot 0x4
20,541,446 UART: [art] Derive Key Pair
20,542,450 UART: [art] Store priv key in slot 0x5
22,969,686 UART: [art] Derive Key Pair - Done
22,982,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,095 UART: [art] PUB.X = 5E640EFEA0F24B9FA8B9FE3E509E44A03B2990B7A87817DB884A8691132B974F16B158DE940C9E3FA666292A1DC037C4
24,697,408 UART: [art] PUB.Y = AF3B50AF1FC1110D129EAC26F77E80151500991798489B166BEE0AC94C8F631C76103FFCAB0058738A69F04AF49F4B42
24,704,615 UART: [art] SIG.R = 33FBDF107F4F39D405C39046EDC394123AAA18257EF0CB3A83977A1F83F921F9AC2454D14D86E7E26C8A901121903A4A
24,712,035 UART: [art] SIG.S = 86D08A8E856594D37EBB7D2EC79AD503A92325E2F9A3FDCB507150732761C6635CFD807B214C5586CA02B66653374E9C
25,690,947 UART: Caliptra RT
25,691,664 UART: [state] CFI Enabled
25,824,486 UART: [rt] RT listening for mailbox commands...
25,856,013 UART: [rt]cmd =0x4c444556, len=4
25,867,236 >>> mbox cmd response data (687 bytes)
25,907,933 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,937,856 UART: [rt]cmd =0x43455246, len=4
25,950,583 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,106 UART:
192,484 UART: Running Caliptra ROM ...
193,631 UART:
193,778 UART: [state] CFI Enabled
264,937 UART: [state] LifecycleState = Unprovisioned
267,341 UART: [state] DebugLocked = No
269,801 UART: [state] WD Timer not started. Device not locked for debugging
274,969 UART: [kat] SHA2-256
464,859 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,609 UART: [kat] ++
476,085 UART: [kat] sha1
486,891 UART: [kat] SHA2-256
489,891 UART: [kat] SHA2-384
495,664 UART: [kat] SHA2-512-ACC
498,249 UART: [kat] ECC-384
2,950,071 UART: [kat] HMAC-384Kdf
2,972,979 UART: [kat] LMS
3,504,789 UART: [kat] --
3,508,995 UART: [cold-reset] ++
3,510,146 UART: [fht] FHT @ 0x50003400
3,521,263 UART: [idev] ++
3,521,970 UART: [idev] CDI.KEYID = 6
3,522,875 UART: [idev] SUBJECT.KEYID = 7
3,524,116 UART: [idev] UDS.KEYID = 0
3,525,020 ready_for_fw is high
3,525,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,349 UART: [idev] Erasing UDS.KEYID = 0
6,029,082 UART: [idev] Sha1 KeyId Algorithm
6,052,803 UART: [idev] --
6,057,473 UART: [ldev] ++
6,058,160 UART: [ldev] CDI.KEYID = 6
6,059,044 UART: [ldev] SUBJECT.KEYID = 5
6,060,276 UART: [ldev] AUTHORITY.KEYID = 7
6,061,406 UART: [ldev] FE.KEYID = 1
6,102,121 UART: [ldev] Erasing FE.KEYID = 1
8,607,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,654 UART: [ldev] --
10,416,639 UART: [fwproc] Wait for Commands...
10,419,813 UART: [fwproc] Recv command 0x46574c44
10,422,066 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,256 >>> mbox cmd response: success
14,682,321 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,684,755 UART: [afmc] ++
14,685,451 UART: [afmc] CDI.KEYID = 6
14,686,683 UART: [afmc] SUBJECT.KEYID = 7
14,688,160 UART: [afmc] AUTHORITY.KEYID = 5
17,215,725 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,477 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,736 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,629 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,101 UART: [afmc] --
19,013,464 UART: [cold-reset] --
19,018,001 UART: [state] Locking Datavault
19,023,526 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,712 UART: [state] Locking ICCM
19,027,933 UART: [exit] Launching FMC @ 0x40000130
19,036,599 UART:
19,036,843 UART: Running Caliptra FMC ...
19,037,943 UART:
19,038,105 UART: [state] CFI Enabled
19,095,623 UART: [fht] FMC Alias Private Key: 7
20,862,274 UART: [art] Extend RT PCRs Done
20,863,500 UART: [art] Lock RT PCRs Done
20,865,177 UART: [art] Populate DV Done
20,870,852 UART: [fht] FMC Alias Private Key: 7
20,872,327 UART: [art] Derive CDI
20,873,081 UART: [art] Store in slot 0x4
20,928,632 UART: [art] Derive Key Pair
20,929,618 UART: [art] Store priv key in slot 0x5
23,392,416 UART: [art] Derive Key Pair - Done
23,405,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,284 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,794 UART: [art] PUB.X = D6C09EB745D218994406D631672E68B2FD6A4F978AEF47B2E18707FCAB8268A99CB75C13A50A1ECBFDB0355399D3EBFB
25,127,094 UART: [art] PUB.Y = 218A32EE73B731C687983A2DF15A523BD9FF5B732DA71230CD8A99D2A87CCDF8E87CD7C481E2D80FC6C894EE53EEDD5B
25,134,381 UART: [art] SIG.R = DB683F33488B3F5F4041EF30DB9AFB7B064ECC3AD8FEA90440567EBEC93E32920A7CD963232DB5F99B6027C68063D578
25,141,776 UART: [art] SIG.S = DD5338B0D68444D3B4994426AE775CFA8A0A1C2A65942FE762EA58B5329066189391133B81DA555820BE46787223A084
26,120,832 UART: Caliptra RT
26,121,519 UART: [state] CFI Enabled
26,302,629 UART: [rt] RT listening for mailbox commands...
26,334,036 UART: [rt]cmd =0x4c444556, len=4
26,345,281 >>> mbox cmd response data (687 bytes)
26,386,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,416,361 UART: [rt]cmd =0x43455246, len=4
26,429,101 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,538 writing to cptra_bootfsm_go
3,442,948 ready_for_fw is high
3,443,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,850,436 >>> mbox cmd response: success
14,851,621 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,133,306 UART:
19,133,674 UART: Running Caliptra FMC ...
19,134,865 UART:
19,135,034 UART: [state] CFI Enabled
19,202,405 UART: [fht] FMC Alias Private Key: 7
20,968,855 UART: [art] Extend RT PCRs Done
20,970,083 UART: [art] Lock RT PCRs Done
20,971,932 UART: [art] Populate DV Done
20,977,407 UART: [fht] FMC Alias Private Key: 7
20,978,892 UART: [art] Derive CDI
20,979,672 UART: [art] Store in slot 0x4
21,035,553 UART: [art] Derive Key Pair
21,036,556 UART: [art] Store priv key in slot 0x5
23,498,797 UART: [art] Derive Key Pair - Done
23,511,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,145 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,660 UART: [art] PUB.X = 1DFCD880BEC7840B6003737A7B54C48653C019D41CBB881F1743C737E1A9966CB1D0F4974379578127CFD5181A20E29B
25,232,854 UART: [art] PUB.Y = DF9DA6496F16C4993C8854BB0D8299ECA69449531A187DCB691C385949B24E4C78C8C3E73C57F01D93844E228035C26F
25,240,093 UART: [art] SIG.R = 749EDA32088DD2955C38E111F4B320A8373D677AB19802D11B40ABEDEDD58F2DD099C218AAF2A65940BB8B56878DA224
25,247,494 UART: [art] SIG.S = 29175E5A7E8C926E70257D8251892AF8EC29F45BFFE542AAE1058A4B2D3AD63B484713FD35B53CB5AEEDE4577457B8F1
26,226,101 UART: Caliptra RT
26,226,783 UART: [state] CFI Enabled
26,408,544 UART: [rt] RT listening for mailbox commands...
26,439,682 UART: [rt]cmd =0x4c444556, len=4
26,450,917 >>> mbox cmd response data (687 bytes)
26,491,526 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,521,463 UART: [rt]cmd =0x43455246, len=4
26,534,093 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,567 UART:
192,973 UART: Running Caliptra ROM ...
194,194 UART:
603,871 UART: [state] CFI Enabled
617,337 UART: [state] LifecycleState = Unprovisioned
619,656 UART: [state] DebugLocked = No
621,904 UART: [state] WD Timer not started. Device not locked for debugging
626,179 UART: [kat] SHA2-256
816,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,863 UART: [kat] ++
827,473 UART: [kat] sha1
839,142 UART: [kat] SHA2-256
842,158 UART: [kat] SHA2-384
847,515 UART: [kat] SHA2-512-ACC
850,104 UART: [kat] ECC-384
3,289,398 UART: [kat] HMAC-384Kdf
3,302,425 UART: [kat] LMS
3,834,209 UART: [kat] --
3,838,503 UART: [cold-reset] ++
3,839,738 UART: [fht] FHT @ 0x50003400
3,852,592 UART: [idev] ++
3,853,268 UART: [idev] CDI.KEYID = 6
3,854,196 UART: [idev] SUBJECT.KEYID = 7
3,855,451 UART: [idev] UDS.KEYID = 0
3,856,380 ready_for_fw is high
3,856,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,313 UART: [idev] Erasing UDS.KEYID = 0
6,329,888 UART: [idev] Sha1 KeyId Algorithm
6,351,600 UART: [idev] --
6,355,972 UART: [ldev] ++
6,356,717 UART: [ldev] CDI.KEYID = 6
6,357,656 UART: [ldev] SUBJECT.KEYID = 5
6,358,767 UART: [ldev] AUTHORITY.KEYID = 7
6,359,995 UART: [ldev] FE.KEYID = 1
6,373,182 UART: [ldev] Erasing FE.KEYID = 1
8,850,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,354 UART: [ldev] --
10,640,328 UART: [fwproc] Wait for Commands...
10,641,994 UART: [fwproc] Recv command 0x46574c44
10,644,302 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,106 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,729 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,806 >>> mbox cmd response: success
14,904,874 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,907,279 UART: [afmc] ++
14,907,968 UART: [afmc] CDI.KEYID = 6
14,909,208 UART: [afmc] SUBJECT.KEYID = 7
14,910,647 UART: [afmc] AUTHORITY.KEYID = 5
17,415,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,328 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,298 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,394 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,529 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,262 UART: [afmc] --
19,211,206 UART: [cold-reset] --
19,215,550 UART: [state] Locking Datavault
19,220,988 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,155 UART: [state] Locking ICCM
19,224,565 UART: [exit] Launching FMC @ 0x40000130
19,233,247 UART:
19,233,494 UART: Running Caliptra FMC ...
19,234,600 UART:
19,234,762 UART: [state] CFI Enabled
19,242,568 UART: [fht] FMC Alias Private Key: 7
21,009,037 UART: [art] Extend RT PCRs Done
21,010,266 UART: [art] Lock RT PCRs Done
21,012,088 UART: [art] Populate DV Done
21,017,510 UART: [fht] FMC Alias Private Key: 7
21,019,160 UART: [art] Derive CDI
21,019,978 UART: [art] Store in slot 0x4
21,062,579 UART: [art] Derive Key Pair
21,063,627 UART: [art] Store priv key in slot 0x5
23,490,503 UART: [art] Derive Key Pair - Done
23,503,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,209,865 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,527 UART: [art] PUB.X = 4FCE7FA50ADD0DA9903A2901F0B6637A0239D52970BD8C36C4531C014EBEB812EA2B79E9181CE8847CD6FFF14BE34F71
25,218,657 UART: [art] PUB.Y = 255FD1FE70485E8E1880A3610C172C6FDC9F9DF0CCEA0A5032508B807F59639639FE87D8885BBDEEC2BB6F596D97EA6A
25,225,909 UART: [art] SIG.R = 69CD403D1B06397B44CDDFFC0DB9C810FB8F09EC521F465DF6AFFFA75A7EB2B9EE435031D35660A3280C38D0ECA77EC2
25,233,326 UART: [art] SIG.S = 28EFAE3ADAE6844DC9E5A50521F5C6D3FBD64BA9225801158C6091BAE7C094E6668EF6B5B1449140613D734C48730132
26,211,658 UART: Caliptra RT
26,212,347 UART: [state] CFI Enabled
26,344,858 UART: [rt] RT listening for mailbox commands...
26,376,274 UART: [rt]cmd =0x4c444556, len=4
26,387,302 >>> mbox cmd response data (687 bytes)
26,429,689 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,459,447 UART: [rt]cmd =0x43455246, len=4
26,472,144 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,747,877 ready_for_fw is high
3,748,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,028,505 >>> mbox cmd response: success
15,029,793 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,281,146 UART:
19,281,554 UART: Running Caliptra FMC ...
19,282,697 UART:
19,282,864 UART: [state] CFI Enabled
19,290,723 UART: [fht] FMC Alias Private Key: 7
21,056,979 UART: [art] Extend RT PCRs Done
21,058,203 UART: [art] Lock RT PCRs Done
21,059,573 UART: [art] Populate DV Done
21,065,056 UART: [fht] FMC Alias Private Key: 7
21,066,596 UART: [art] Derive CDI
21,067,344 UART: [art] Store in slot 0x4
21,110,120 UART: [art] Derive Key Pair
21,111,169 UART: [art] Store priv key in slot 0x5
23,538,179 UART: [art] Derive Key Pair - Done
23,551,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,257,530 UART: [art] Erasing AUTHORITY.KEYID = 7
25,259,041 UART: [art] PUB.X = 519474696B34391F311C96DCEFB12BF63F8F852842A0A6EBC47B9F11974F372405CC9E18E439358E7A48CAFF920A1AF4
25,266,346 UART: [art] PUB.Y = 2705F02D11206079660ED12159892C046BE95743F96EC90CB7BC182EF8B6549D9AE0CAF0343BF8041C4DCE732C3FE27A
25,273,582 UART: [art] SIG.R = CB97B683853BBFDD4346057175A5D86D4E2D415393C005DFECB7977353DB4F11EA455F55438655A46E59A72287B129FD
25,280,952 UART: [art] SIG.S = 9E7E6EE8893907B2FFA793E3C799A41CEEA0294C47494FAE496EC2120124DE1F6B393DD5E148A70C9436D2F7303A24F3
26,259,864 UART: Caliptra RT
26,260,583 UART: [state] CFI Enabled
26,393,329 UART: [rt] RT listening for mailbox commands...
26,424,481 UART: [rt]cmd =0x4c444556, len=4
26,435,563 >>> mbox cmd response data (687 bytes)
26,477,646 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,507,736 UART: [rt]cmd =0x43455246, len=4
26,520,422 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,767 UART: [kat] SHA2-256
881,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,813 UART: [kat] ++
885,965 UART: [kat] sha1
890,319 UART: [kat] SHA2-256
892,257 UART: [kat] SHA2-384
895,058 UART: [kat] SHA2-512-ACC
896,959 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,208 UART: [kat] LMS
1,475,404 UART: [kat] --
1,476,421 UART: [cold-reset] ++
1,476,797 UART: [fht] Storing FHT @ 0x50003400
1,479,540 UART: [idev] ++
1,479,708 UART: [idev] CDI.KEYID = 6
1,480,068 UART: [idev] SUBJECT.KEYID = 7
1,480,492 UART: [idev] UDS.KEYID = 0
1,480,837 ready_for_fw is high
1,480,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,964 UART: [idev] Erasing UDS.KEYID = 0
1,504,496 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,208 UART: [idev] --
1,514,355 UART: [ldev] ++
1,514,523 UART: [ldev] CDI.KEYID = 6
1,514,886 UART: [ldev] SUBJECT.KEYID = 5
1,515,312 UART: [ldev] AUTHORITY.KEYID = 7
1,515,775 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,066 UART: [ldev] --
1,585,349 UART: [fwproc] Waiting for Commands...
1,586,112 UART: [fwproc] Received command 0x46574c44
1,586,903 UART: [fwproc] Received Image of size 118548 bytes
2,931,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,133 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,740 >>> mbox cmd response: success
3,130,740 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,131,864 UART: [afmc] ++
3,132,032 UART: [afmc] CDI.KEYID = 6
3,132,394 UART: [afmc] SUBJECT.KEYID = 7
3,132,819 UART: [afmc] AUTHORITY.KEYID = 5
3,168,440 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,000 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,683 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,503 UART: [afmc] --
3,211,535 UART: [cold-reset] --
3,212,327 UART: [state] Locking Datavault
3,213,518 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,122 UART: [state] Locking ICCM
3,214,668 UART: [exit] Launching FMC @ 0x40000130
3,219,998 UART:
3,220,014 UART: Running Caliptra FMC ...
3,220,422 UART:
3,220,476 UART: [state] CFI Enabled
3,230,788 UART: [fht] FMC Alias Private Key: 7
3,349,760 UART: [art] Extend RT PCRs Done
3,350,188 UART: [art] Lock RT PCRs Done
3,351,744 UART: [art] Populate DV Done
3,360,249 UART: [fht] FMC Alias Private Key: 7
3,361,375 UART: [art] Derive CDI
3,361,655 UART: [art] Store in slot 0x4
3,446,927 UART: [art] Derive Key Pair
3,447,287 UART: [art] Store priv key in slot 0x5
3,460,454 UART: [art] Derive Key Pair - Done
3,475,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,369 UART: [art] PUB.X = DD94DA4B73C65BD97E6DB771145337A0D9E37F8E81ED3AA63188C1281B46FC53B3FD0271F700072907D7D28F53722D45
3,498,110 UART: [art] PUB.Y = 4A67F3B5FFBA19BD976C3D23C01A0C8C458069A762FB1FF44626306E3D1E1622D52A556E778F5FE9E26119FAAE46A833
3,505,065 UART: [art] SIG.R = 5B6138F506325DDD94B02A7ED4F5BBA915A17179DE95DCDFD9E3FD32B473354983DC1E95F27F3444E791E684F59F909E
3,511,840 UART: [art] SIG.S = BDB919DAFE16ED46270D0600CFEE3E547D35475A610791DAEC999335D228CBFCBDC5EDF1EB9717B21E35393E679B003F
3,535,381 UART: Caliptra RT
3,535,632 UART: [state] CFI Enabled
3,655,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,216 UART: [rt]cmd =0x4c444556, len=4
3,696,618 >>> mbox cmd response data (687 bytes)
3,696,619 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,870 UART: [rt]cmd =0x43455246, len=4
3,738,388 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,225 ready_for_fw is high
1,362,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,232 >>> mbox cmd response: success
2,979,232 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,201 UART:
3,041,217 UART: Running Caliptra FMC ...
3,041,625 UART:
3,041,679 UART: [state] CFI Enabled
3,052,107 UART: [fht] FMC Alias Private Key: 7
3,170,901 UART: [art] Extend RT PCRs Done
3,171,329 UART: [art] Lock RT PCRs Done
3,172,737 UART: [art] Populate DV Done
3,180,852 UART: [fht] FMC Alias Private Key: 7
3,182,022 UART: [art] Derive CDI
3,182,302 UART: [art] Store in slot 0x4
3,267,390 UART: [art] Derive Key Pair
3,267,750 UART: [art] Store priv key in slot 0x5
3,280,947 UART: [art] Derive Key Pair - Done
3,295,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,556 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,321 UART: [art] PUB.X = 5A56119A52F6B2A9497687801A9739DCA1588F5CBE7E262306F72E20ADBE35AE0AFE9EC785E61E9C0D6A7B42D1C73184
3,319,090 UART: [art] PUB.Y = 58C4360DBEE416CCF55B759C04B83E8280D939410BF0C42B2A17736F68EFCEBFD722FE2FD1CFCD4C9F4AA43DECCEA6DF
3,326,061 UART: [art] SIG.R = 47675560B5551BB3AAC48DB2FAB85F966E518E01209542316716577DB4214F2ECD7452C6EB32ADF19EDF582339DDD359
3,332,830 UART: [art] SIG.S = A9694C61E8E57FE005A3ACC53F855185FDDE7586CDE4F3184F1DC121FCF60E76844B2FA030A37DA8A1AB47FA475330F4
3,356,918 UART: Caliptra RT
3,357,169 UART: [state] CFI Enabled
3,477,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,267 UART: [rt]cmd =0x4c444556, len=4
3,518,741 >>> mbox cmd response data (687 bytes)
3,518,742 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,007 UART: [rt]cmd =0x43455246, len=4
3,560,239 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,250 UART: [kat] SHA2-256
882,181 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,296 UART: [kat] ++
886,448 UART: [kat] sha1
890,596 UART: [kat] SHA2-256
892,534 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,499 UART: [kat] HMAC-384Kdf
907,039 UART: [kat] LMS
1,475,235 UART: [kat] --
1,476,068 UART: [cold-reset] ++
1,476,404 UART: [fht] Storing FHT @ 0x50003400
1,479,223 UART: [idev] ++
1,479,391 UART: [idev] CDI.KEYID = 6
1,479,751 UART: [idev] SUBJECT.KEYID = 7
1,480,175 UART: [idev] UDS.KEYID = 0
1,480,520 ready_for_fw is high
1,480,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,209 UART: [idev] Erasing UDS.KEYID = 0
1,504,649 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,137 UART: [idev] --
1,514,178 UART: [ldev] ++
1,514,346 UART: [ldev] CDI.KEYID = 6
1,514,709 UART: [ldev] SUBJECT.KEYID = 5
1,515,135 UART: [ldev] AUTHORITY.KEYID = 7
1,515,598 UART: [ldev] FE.KEYID = 1
1,521,066 UART: [ldev] Erasing FE.KEYID = 1
1,546,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,533 UART: [ldev] --
1,586,004 UART: [fwproc] Waiting for Commands...
1,586,849 UART: [fwproc] Received command 0x46574c44
1,587,640 UART: [fwproc] Received Image of size 118548 bytes
2,931,754 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,630 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,161 >>> mbox cmd response: success
3,131,161 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,251 UART: [afmc] ++
3,132,419 UART: [afmc] CDI.KEYID = 6
3,132,781 UART: [afmc] SUBJECT.KEYID = 7
3,133,206 UART: [afmc] AUTHORITY.KEYID = 5
3,168,427 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,387 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,876 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,759 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,442 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,304 UART: [afmc] --
3,211,300 UART: [cold-reset] --
3,212,044 UART: [state] Locking Datavault
3,213,069 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,673 UART: [state] Locking ICCM
3,214,275 UART: [exit] Launching FMC @ 0x40000130
3,219,605 UART:
3,219,621 UART: Running Caliptra FMC ...
3,220,029 UART:
3,220,172 UART: [state] CFI Enabled
3,230,734 UART: [fht] FMC Alias Private Key: 7
3,349,772 UART: [art] Extend RT PCRs Done
3,350,200 UART: [art] Lock RT PCRs Done
3,351,750 UART: [art] Populate DV Done
3,360,165 UART: [fht] FMC Alias Private Key: 7
3,361,209 UART: [art] Derive CDI
3,361,489 UART: [art] Store in slot 0x4
3,447,383 UART: [art] Derive Key Pair
3,447,743 UART: [art] Store priv key in slot 0x5
3,461,130 UART: [art] Derive Key Pair - Done
3,475,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,385 UART: [art] PUB.X = 649D1F03D4E01FD53B099BB437FB2CC3D79D32D65371C7CAF29C4A50C5E93958A109424B28D7A82E5723A098E045CE21
3,499,150 UART: [art] PUB.Y = BEF33943D6CA44227AF780C3E0B4AEC944ECFB761B67393CF62C8B2368408D6F224059147FA02520B829A91F9C0155D9
3,506,099 UART: [art] SIG.R = 70B050C8897FE901D8963C1E22AD667BD8A62C6036F1B74F72DF56FE11B67BEE95A07CC2026BA873C42F756C239295EF
3,512,869 UART: [art] SIG.S = 249E7F9F45167435EFA5C6F65FBD129D777235C20A4EED68086BC984B37B579B7DFEC7130E4F4E43F007890B049D46EF
3,536,351 UART: Caliptra RT
3,536,694 UART: [state] CFI Enabled
3,657,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,049 UART: [rt]cmd =0x4c444556, len=4
3,698,457 >>> mbox cmd response data (687 bytes)
3,698,458 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,803 UART: [rt]cmd =0x43455246, len=4
3,739,961 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 ready_for_fw is high
1,362,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,533 >>> mbox cmd response: success
2,981,533 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,862 UART:
3,042,878 UART: Running Caliptra FMC ...
3,043,286 UART:
3,043,429 UART: [state] CFI Enabled
3,054,299 UART: [fht] FMC Alias Private Key: 7
3,173,199 UART: [art] Extend RT PCRs Done
3,173,627 UART: [art] Lock RT PCRs Done
3,175,363 UART: [art] Populate DV Done
3,183,356 UART: [fht] FMC Alias Private Key: 7
3,184,370 UART: [art] Derive CDI
3,184,650 UART: [art] Store in slot 0x4
3,270,540 UART: [art] Derive Key Pair
3,270,900 UART: [art] Store priv key in slot 0x5
3,284,569 UART: [art] Derive Key Pair - Done
3,299,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,141 UART: [art] PUB.X = A91AE4E303176BF87282211E017E54DD8B226F1B4D69C6F41DDD07B4D5A4F23C1FB47F5FFDB3A54BDE33183F6F6C23F8
3,322,918 UART: [art] PUB.Y = 87410EA1E8467CA780DC9492AD71642E62B2C29AA429DF5808F9F7038B89A455877DCE0517F9D45B99498BA39565286B
3,329,852 UART: [art] SIG.R = E832645C793F243C9529CCE9EA34FEF4C030A6ABAF8B5FF292AEBCBA56BB3273434E6BD0A047C372C53A67BC4B791AAA
3,336,644 UART: [art] SIG.S = 64290C1B5CADB5C5D93AF28661B6A94D39E5013AEFA80D31CEF4834C97D73537060CE4FA2FF7C7907B35A368B68064CD
3,359,953 UART: Caliptra RT
3,360,296 UART: [state] CFI Enabled
3,479,896 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,614 UART: [rt]cmd =0x4c444556, len=4
3,521,022 >>> mbox cmd response data (687 bytes)
3,521,023 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,386 UART: [rt]cmd =0x43455246, len=4
3,562,758 >>> mbox cmd response data (920 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,149 UART: [kat] HMAC-384Kdf
920,745 UART: [kat] LMS
1,169,057 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,770 UART: [idev] ++
1,172,938 UART: [idev] CDI.KEYID = 6
1,173,299 UART: [idev] SUBJECT.KEYID = 7
1,173,724 UART: [idev] UDS.KEYID = 0
1,174,070 ready_for_fw is high
1,174,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,435 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,409 UART: [idev] --
1,208,322 UART: [ldev] ++
1,208,490 UART: [ldev] CDI.KEYID = 6
1,208,854 UART: [ldev] SUBJECT.KEYID = 5
1,209,281 UART: [ldev] AUTHORITY.KEYID = 7
1,209,744 UART: [ldev] FE.KEYID = 1
1,214,986 UART: [ldev] Erasing FE.KEYID = 1
1,240,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,784 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,584 UART: [ldev] --
1,279,827 UART: [fwproc] Wait for Commands...
1,280,524 UART: [fwproc] Recv command 0x46574c44
1,281,257 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,329 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,691 >>> mbox cmd response: success
2,823,691 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,824,951 UART: [afmc] ++
2,825,119 UART: [afmc] CDI.KEYID = 6
2,825,482 UART: [afmc] SUBJECT.KEYID = 7
2,825,908 UART: [afmc] AUTHORITY.KEYID = 5
2,861,179 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,378 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,127 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,718 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,419 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,194 UART: [afmc] --
2,904,163 UART: [cold-reset] --
2,904,703 UART: [state] Locking Datavault
2,906,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,648 UART: [state] Locking ICCM
2,907,150 UART: [exit] Launching FMC @ 0x40000130
2,912,480 UART:
2,912,496 UART: Running Caliptra FMC ...
2,912,904 UART:
2,912,958 UART: [state] CFI Enabled
2,923,142 UART: [fht] FMC Alias Private Key: 7
3,041,812 UART: [art] Extend RT PCRs Done
3,042,240 UART: [art] Lock RT PCRs Done
3,043,638 UART: [art] Populate DV Done
3,051,699 UART: [fht] FMC Alias Private Key: 7
3,052,735 UART: [art] Derive CDI
3,053,015 UART: [art] Store in slot 0x4
3,138,534 UART: [art] Derive Key Pair
3,138,894 UART: [art] Store priv key in slot 0x5
3,152,040 UART: [art] Derive Key Pair - Done
3,166,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,182,807 UART: [art] PUB.X = 4352BECB916620D762E86158B8EF39D47B0F368126E1E3743CE3A696697732BEF52290B0B5B75B61208452D58820CC36
3,189,566 UART: [art] PUB.Y = 66B48AF4D0644240D0B38D50E263B39B91241376A01E352E8DB9F223B10A055D1A6DA646AD1DC483B744236CC0194007
3,196,503 UART: [art] SIG.R = 29807FFEAFBF65185319C03CAE0012066851042B7D3E7098DC9A28B4F69CDD00291B395F6EC3856766E7DEBB39FC8C6C
3,203,231 UART: [art] SIG.S = F066B5CA2DFA70FC7D8EF2196211C79441D386B7217ED6A37AE22E8434DF54A9E38EDD5F8BD5C4EF185086206227B701
3,227,318 UART: Caliptra RT
3,227,569 UART: [state] CFI Enabled
3,346,394 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,376,894 UART: [rt]cmd =0x4c444556, len=4
3,387,336 >>> mbox cmd response data (687 bytes)
3,387,337 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,852 UART: [rt]cmd =0x43455246, len=4
3,429,031 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,256 ready_for_fw is high
1,059,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,944 >>> mbox cmd response: success
2,678,944 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,457 UART:
2,740,473 UART: Running Caliptra FMC ...
2,740,881 UART:
2,740,935 UART: [state] CFI Enabled
2,751,237 UART: [fht] FMC Alias Private Key: 7
2,870,049 UART: [art] Extend RT PCRs Done
2,870,477 UART: [art] Lock RT PCRs Done
2,872,401 UART: [art] Populate DV Done
2,880,652 UART: [fht] FMC Alias Private Key: 7
2,881,796 UART: [art] Derive CDI
2,882,076 UART: [art] Store in slot 0x4
2,967,871 UART: [art] Derive Key Pair
2,968,231 UART: [art] Store priv key in slot 0x5
2,981,259 UART: [art] Derive Key Pair - Done
2,995,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,241 UART: [art] PUB.X = F8EF5DF0D924A388E9B66D878697C525E4F409D447DE932F18328E71FCA79F50045D02492C405FAD6E30EDA07D36E449
3,019,006 UART: [art] PUB.Y = D09939D8E07C72F0C630D878A7386182FE5070B566F0195961940412F2CFF38113335C490807D56DE0559DFF36D174C3
3,025,935 UART: [art] SIG.R = 59AE9A2C2FFAF5ED199537B799BD35A60934F50DBB9F7A6CB81B3478BC3549FAD6FA738F76973C9277BAE7D29DF586AC
3,032,717 UART: [art] SIG.S = B90389AC0B4310192AAD801698C25B6954E407807545D43ED9DF5FF86E4E9AAE08148A1531F527BC350947E722F4F26B
3,056,720 UART: Caliptra RT
3,056,971 UART: [state] CFI Enabled
3,177,122 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,532 UART: [rt]cmd =0x4c444556, len=4
3,218,196 >>> mbox cmd response data (687 bytes)
3,218,197 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,476 UART: [rt]cmd =0x43455246, len=4
3,259,525 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,019 UART: [state] LifecycleState = Unprovisioned
85,674 UART: [state] DebugLocked = No
86,188 UART: [state] WD Timer not started. Device not locked for debugging
87,445 UART: [kat] SHA2-256
890,995 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,099 UART: [kat] ++
895,251 UART: [kat] sha1
899,383 UART: [kat] SHA2-256
901,323 UART: [kat] SHA2-384
903,932 UART: [kat] SHA2-512-ACC
905,833 UART: [kat] ECC-384
915,670 UART: [kat] HMAC-384Kdf
920,506 UART: [kat] LMS
1,168,818 UART: [kat] --
1,169,703 UART: [cold-reset] ++
1,170,261 UART: [fht] FHT @ 0x50003400
1,172,975 UART: [idev] ++
1,173,143 UART: [idev] CDI.KEYID = 6
1,173,504 UART: [idev] SUBJECT.KEYID = 7
1,173,929 UART: [idev] UDS.KEYID = 0
1,174,275 ready_for_fw is high
1,174,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,756 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,208,050 UART: [idev] --
1,209,107 UART: [ldev] ++
1,209,275 UART: [ldev] CDI.KEYID = 6
1,209,639 UART: [ldev] SUBJECT.KEYID = 5
1,210,066 UART: [ldev] AUTHORITY.KEYID = 7
1,210,529 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,242,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,854 UART: [fwproc] Wait for Commands...
1,282,543 UART: [fwproc] Recv command 0x46574c44
1,283,276 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,164 >>> mbox cmd response: success
2,825,164 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,826,334 UART: [afmc] ++
2,826,502 UART: [afmc] CDI.KEYID = 6
2,826,865 UART: [afmc] SUBJECT.KEYID = 7
2,827,291 UART: [afmc] AUTHORITY.KEYID = 5
2,863,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,395 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,144 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,854 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,159 UART: [afmc] --
2,906,050 UART: [cold-reset] --
2,906,894 UART: [state] Locking Datavault
2,907,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,513 UART: [state] Locking ICCM
2,909,067 UART: [exit] Launching FMC @ 0x40000130
2,914,397 UART:
2,914,413 UART: Running Caliptra FMC ...
2,914,821 UART:
2,914,964 UART: [state] CFI Enabled
2,925,796 UART: [fht] FMC Alias Private Key: 7
3,044,860 UART: [art] Extend RT PCRs Done
3,045,288 UART: [art] Lock RT PCRs Done
3,046,648 UART: [art] Populate DV Done
3,054,815 UART: [fht] FMC Alias Private Key: 7
3,055,951 UART: [art] Derive CDI
3,056,231 UART: [art] Store in slot 0x4
3,141,506 UART: [art] Derive Key Pair
3,141,866 UART: [art] Store priv key in slot 0x5
3,154,936 UART: [art] Derive Key Pair - Done
3,169,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,222 UART: [art] PUB.X = 0EE605645604EA52306B3EFB1BD1A462224421AFDD2ABADE4C325F24E4A94F64D46BA2246C430F925789DDE1452A446F
3,192,988 UART: [art] PUB.Y = 2FC1F01D23A50E8BF5BCA75FE747FAC71BD1F74C57BAE2A78B863E2D02551194D7CB4732BE2DECFB784209872DF079E7
3,199,947 UART: [art] SIG.R = 344DC6F319A618CBEA9CD455D596C34F06AA1972C825947994A81658F6DA80BF09D58A0D2F5DF7180E953E56A94B1580
3,206,707 UART: [art] SIG.S = DFF18C81EB57B2128963E87226743FF575785A94A795772E4840303055F00270FA7E57C389A03D55A20A7DA4BF7B3AA4
3,230,357 UART: Caliptra RT
3,230,700 UART: [state] CFI Enabled
3,350,251 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,067 UART: [rt]cmd =0x4c444556, len=4
3,391,585 >>> mbox cmd response data (687 bytes)
3,391,586 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,807 UART: [rt]cmd =0x43455246, len=4
3,432,834 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,243 ready_for_fw is high
1,060,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,495 >>> mbox cmd response: success
2,681,495 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,743,348 UART:
2,743,364 UART: Running Caliptra FMC ...
2,743,772 UART:
2,743,915 UART: [state] CFI Enabled
2,754,987 UART: [fht] FMC Alias Private Key: 7
2,874,483 UART: [art] Extend RT PCRs Done
2,874,911 UART: [art] Lock RT PCRs Done
2,876,419 UART: [art] Populate DV Done
2,884,674 UART: [fht] FMC Alias Private Key: 7
2,885,656 UART: [art] Derive CDI
2,885,936 UART: [art] Store in slot 0x4
2,971,637 UART: [art] Derive Key Pair
2,971,997 UART: [art] Store priv key in slot 0x5
2,985,685 UART: [art] Derive Key Pair - Done
3,000,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,358 UART: [art] PUB.X = 560DD98C5DB6B84692573CC63F42691003B3299E34BBB64805989623BA3EAB4F5BB409FEE96DCBD33D98D91B74F36506
3,023,117 UART: [art] PUB.Y = B5C939AE7B751B73C2061159DA0529C38A59F9F6BE9A0412396BEF12D2584E1649259CFE7D6ABF656EC6204BEA06FB90
3,030,063 UART: [art] SIG.R = DEC7A0B4BFB3381A5812B897A61171B49B28F09C3EB96CCA9CD15467D02F3477B1CAF106EE017E4EB658EA9E7118813E
3,036,839 UART: [art] SIG.S = 60FB4BE138DC40C2EF5D068467329364723F3C35E467B9A101D46B34CA28EB96FC1B2BC1F6322329B9AF3E5EF6746E29
3,060,691 UART: Caliptra RT
3,061,034 UART: [state] CFI Enabled
3,180,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,291 UART: [rt]cmd =0x4c444556, len=4
3,221,747 >>> mbox cmd response data (687 bytes)
3,221,748 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,251,067 UART: [rt]cmd =0x43455246, len=4
3,263,264 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,752 UART: [state] LifecycleState = Unprovisioned
85,407 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,318 UART: [kat] SHA2-256
892,968 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,093 UART: [kat] ++
897,245 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,230 UART: [kat] SHA2-512-ACC
908,131 UART: [kat] ECC-384
917,650 UART: [kat] HMAC-384Kdf
922,362 UART: [kat] LMS
1,170,690 UART: [kat] --
1,171,517 UART: [cold-reset] ++
1,172,011 UART: [fht] FHT @ 0x50003400
1,174,914 UART: [idev] ++
1,175,082 UART: [idev] CDI.KEYID = 6
1,175,442 UART: [idev] SUBJECT.KEYID = 7
1,175,866 UART: [idev] UDS.KEYID = 0
1,176,211 ready_for_fw is high
1,176,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,928 UART: [idev] Erasing UDS.KEYID = 0
1,200,873 UART: [idev] Sha1 KeyId Algorithm
1,209,491 UART: [idev] --
1,210,683 UART: [ldev] ++
1,210,851 UART: [ldev] CDI.KEYID = 6
1,211,214 UART: [ldev] SUBJECT.KEYID = 5
1,211,640 UART: [ldev] AUTHORITY.KEYID = 7
1,212,103 UART: [ldev] FE.KEYID = 1
1,217,351 UART: [ldev] Erasing FE.KEYID = 1
1,243,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,345 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,226 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,169 >>> mbox cmd response: success
2,828,169 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,829,275 UART: [afmc] ++
2,829,443 UART: [afmc] CDI.KEYID = 6
2,829,805 UART: [afmc] SUBJECT.KEYID = 7
2,830,230 UART: [afmc] AUTHORITY.KEYID = 5
2,865,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,369 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,252 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,953 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,621 UART: [afmc] --
2,908,507 UART: [cold-reset] --
2,909,315 UART: [state] Locking Datavault
2,910,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,990 UART: [state] Locking ICCM
2,911,644 UART: [exit] Launching FMC @ 0x40000130
2,916,974 UART:
2,916,990 UART: Running Caliptra FMC ...
2,917,398 UART:
2,917,452 UART: [state] CFI Enabled
2,927,986 UART: [fht] FMC Alias Private Key: 7
3,047,230 UART: [art] Extend RT PCRs Done
3,047,658 UART: [art] Lock RT PCRs Done
3,049,420 UART: [art] Populate DV Done
3,057,547 UART: [fht] FMC Alias Private Key: 7
3,058,711 UART: [art] Derive CDI
3,058,991 UART: [art] Store in slot 0x4
3,144,782 UART: [art] Derive Key Pair
3,145,142 UART: [art] Store priv key in slot 0x5
3,158,080 UART: [art] Derive Key Pair - Done
3,172,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,824 UART: [art] PUB.X = D319D6C38819E493EFFA9EDC038F711368386B5A7B35B58B6DCDF3E425CE810C866CEA3B87C5DC300B33C9854DE35280
3,195,595 UART: [art] PUB.Y = 827B1667749865265E604C6C3EC1E7616DC22889EB9A4E4E1BA5C6D9412EA3CE0D50CF8B7B9F7D5C6761F856972BCE47
3,202,548 UART: [art] SIG.R = 1D353DA81787AAC7908BE449A4828213D799F841FB313885218B4B754CF0D82AA70D19221E8688CF69D441A14E27C34D
3,209,311 UART: [art] SIG.S = B40AF117C13DAA8B8B11A6C66C7AB119C7C88D816422BEFD94FFEF94E2672663852C76AE72B7438FCA75CFEDE33F53A2
3,232,962 UART: Caliptra RT
3,233,213 UART: [state] CFI Enabled
3,353,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,584 UART: [rt]cmd =0x4c444556, len=4
3,394,040 >>> mbox cmd response data (687 bytes)
3,394,041 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,306 UART: [rt]cmd =0x43455246, len=4
3,435,313 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,061 ready_for_fw is high
1,060,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,328 >>> mbox cmd response: success
2,678,328 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,333 UART:
2,740,349 UART: Running Caliptra FMC ...
2,740,757 UART:
2,740,811 UART: [state] CFI Enabled
2,751,571 UART: [fht] FMC Alias Private Key: 7
2,870,235 UART: [art] Extend RT PCRs Done
2,870,663 UART: [art] Lock RT PCRs Done
2,872,053 UART: [art] Populate DV Done
2,880,314 UART: [fht] FMC Alias Private Key: 7
2,881,376 UART: [art] Derive CDI
2,881,656 UART: [art] Store in slot 0x4
2,967,143 UART: [art] Derive Key Pair
2,967,503 UART: [art] Store priv key in slot 0x5
2,981,169 UART: [art] Derive Key Pair - Done
2,996,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,482 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,247 UART: [art] PUB.X = D3F276AEA50ED44C880C886212B4CEF040291B22C3F84B47845B7A4295E870BA9F53AF79B47B6E39E1A4B8ABECA5CFE9
3,019,027 UART: [art] PUB.Y = F726A1F7C23EC16E3278DE14F6766BC3727CE8B9F47E3EB938AB4D6D3B44B40C9B58A43E47B00204E722C9B5E9252EEA
3,025,980 UART: [art] SIG.R = 1807E465BBF91B2844DEA5396661313B7452338399C6A56C5F97BD6DB4741F01C30A048F8EA92F3F750C8AE7187FADDD
3,032,739 UART: [art] SIG.S = 9B7B6B1DCCDB64281C844952543E330AD2855C76B42AB40A78F79371C8E2A3B7B0FF7B7881D55987974D33EEBB640BB7
3,056,772 UART: Caliptra RT
3,057,023 UART: [state] CFI Enabled
3,177,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,120 UART: [rt]cmd =0x4c444556, len=4
3,218,650 >>> mbox cmd response data (687 bytes)
3,218,651 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,962 UART: [rt]cmd =0x43455246, len=4
3,260,103 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
893,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,654 UART: [kat] ++
897,806 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,921 UART: [kat] SHA2-512-ACC
908,822 UART: [kat] ECC-384
918,733 UART: [kat] HMAC-384Kdf
923,555 UART: [kat] LMS
1,171,883 UART: [kat] --
1,172,534 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,659 UART: [idev] ++
1,175,827 UART: [idev] CDI.KEYID = 6
1,176,187 UART: [idev] SUBJECT.KEYID = 7
1,176,611 UART: [idev] UDS.KEYID = 0
1,176,956 ready_for_fw is high
1,176,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,497 UART: [idev] Erasing UDS.KEYID = 0
1,201,656 UART: [idev] Sha1 KeyId Algorithm
1,210,224 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,217,954 UART: [ldev] Erasing FE.KEYID = 1
1,244,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,263 UART: [fwproc] Wait for Commands...
1,284,873 UART: [fwproc] Recv command 0x46574c44
1,285,601 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,198 >>> mbox cmd response: success
2,828,198 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,829,330 UART: [afmc] ++
2,829,498 UART: [afmc] CDI.KEYID = 6
2,829,860 UART: [afmc] SUBJECT.KEYID = 7
2,830,285 UART: [afmc] AUTHORITY.KEYID = 5
2,865,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,973 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,565 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,160 UART: [afmc] --
2,909,254 UART: [cold-reset] --
2,910,086 UART: [state] Locking Datavault
2,911,529 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,133 UART: [state] Locking ICCM
2,912,621 UART: [exit] Launching FMC @ 0x40000130
2,917,951 UART:
2,917,967 UART: Running Caliptra FMC ...
2,918,375 UART:
2,918,518 UART: [state] CFI Enabled
2,929,222 UART: [fht] FMC Alias Private Key: 7
3,049,118 UART: [art] Extend RT PCRs Done
3,049,546 UART: [art] Lock RT PCRs Done
3,051,166 UART: [art] Populate DV Done
3,059,229 UART: [fht] FMC Alias Private Key: 7
3,060,299 UART: [art] Derive CDI
3,060,579 UART: [art] Store in slot 0x4
3,146,242 UART: [art] Derive Key Pair
3,146,602 UART: [art] Store priv key in slot 0x5
3,160,504 UART: [art] Derive Key Pair - Done
3,175,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,442 UART: [art] PUB.X = 373E3C76F93F69D1DFDD03EF7B943AAE77D282BE5562B45950321D878A9B107CA12BE3F63B06A5B04AE5A273A294BF54
3,198,216 UART: [art] PUB.Y = 50DA5AB57C4D654EFC007B7BBF22816668CF391C765C4CFF5FCD83B1B90F0B5E7D1EB5AC9A700FDB8433E2945FE1784B
3,205,155 UART: [art] SIG.R = 9CE96DF6F97577520A773F4A6CF891E99DF82EEA861DBD9B934CB88C4540C6DA635F2A77373B9C1700B73A1DEB87CE19
3,211,912 UART: [art] SIG.S = DBF10DF8F994512FDA8C6338F039D0B352D9E31BDCEE178924F88A4B1245258863278F6FE000E94CB152CD16048536F2
3,236,024 UART: Caliptra RT
3,236,367 UART: [state] CFI Enabled
3,355,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,997 UART: [rt]cmd =0x4c444556, len=4
3,396,507 >>> mbox cmd response data (687 bytes)
3,396,508 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,673 UART: [rt]cmd =0x43455246, len=4
3,437,576 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,974 ready_for_fw is high
1,060,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,311 >>> mbox cmd response: success
2,680,311 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,998 UART:
2,742,014 UART: Running Caliptra FMC ...
2,742,422 UART:
2,742,565 UART: [state] CFI Enabled
2,753,157 UART: [fht] FMC Alias Private Key: 7
2,872,993 UART: [art] Extend RT PCRs Done
2,873,421 UART: [art] Lock RT PCRs Done
2,875,107 UART: [art] Populate DV Done
2,883,432 UART: [fht] FMC Alias Private Key: 7
2,884,604 UART: [art] Derive CDI
2,884,884 UART: [art] Store in slot 0x4
2,970,671 UART: [art] Derive Key Pair
2,971,031 UART: [art] Store priv key in slot 0x5
2,984,065 UART: [art] Derive Key Pair - Done
2,998,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,921 UART: [art] PUB.X = 9ABD8D56CB8FDBB897D7411C2D0E865F9C7D2C2B57DE7EEF9E216836B9F85A5590EBE1D07679A943E0DD01E693A4BDEC
3,021,707 UART: [art] PUB.Y = A25D8B5FBD1940493D4B5DB1D30AA4BC64D422381248576438913C9FC25D148E0C901D06BD77DDAC81B0B1FC8C5E4F4A
3,028,660 UART: [art] SIG.R = 4F263F25D9C951E318F68ED1BB610E3995FBB513395C8D1A32582C8C8118B6C66D250C5F2F669ABD17FA67A001C8AB58
3,035,427 UART: [art] SIG.S = 131CEBDB52BDA7A49CEA7318E94D3AFF690D82016F6919FA90248E2796B9E5D968D8EFA9FBED1DEC8A7E4D2BD047EEB4
3,059,509 UART: Caliptra RT
3,059,852 UART: [state] CFI Enabled
3,180,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,452 UART: [rt]cmd =0x4c444556, len=4
3,220,884 >>> mbox cmd response data (687 bytes)
3,220,885 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,268 UART: [rt]cmd =0x43455246, len=4
3,262,313 >>> mbox cmd response data (888 bytes)
test test_certs::test_fmc_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
192,042 UART:
192,398 UART: Running Caliptra ROM ...
193,587 UART:
193,765 UART: [state] CFI Enabled
265,983 UART: [state] LifecycleState = Unprovisioned
267,966 UART: [state] DebugLocked = No
270,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,945 UART: [kat] SHA2-256
444,675 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,142 UART: [kat] ++
455,634 UART: [kat] sha1
465,801 UART: [kat] SHA2-256
468,536 UART: [kat] SHA2-384
473,888 UART: [kat] SHA2-512-ACC
476,253 UART: [kat] ECC-384
2,768,194 UART: [kat] HMAC-384Kdf
2,779,429 UART: [kat] LMS
3,969,689 UART: [kat] --
3,974,509 UART: [cold-reset] ++
3,975,605 UART: [fht] Storing FHT @ 0x50003400
3,987,796 UART: [idev] ++
3,988,359 UART: [idev] CDI.KEYID = 6
3,989,350 UART: [idev] SUBJECT.KEYID = 7
3,990,599 UART: [idev] UDS.KEYID = 0
3,991,692 ready_for_fw is high
3,991,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,503 UART: [idev] Erasing UDS.KEYID = 0
7,323,172 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,162 UART: [idev] --
7,348,517 UART: [ldev] ++
7,349,089 UART: [ldev] CDI.KEYID = 6
7,350,064 UART: [ldev] SUBJECT.KEYID = 5
7,351,285 UART: [ldev] AUTHORITY.KEYID = 7
7,352,519 UART: [ldev] FE.KEYID = 1
7,401,503 UART: [ldev] Erasing FE.KEYID = 1
10,735,752 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,535 UART: [ldev] --
13,116,053 UART: [fwproc] Waiting for Commands...
13,118,854 UART: [fwproc] Received command 0x46574c44
13,121,035 UART: [fwproc] Received Image of size 118548 bytes
17,229,944 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,665 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,880 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,119 >>> mbox cmd response: success
17,706,149 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,708,484 UART: [afmc] ++
17,709,068 UART: [afmc] CDI.KEYID = 6
17,710,058 UART: [afmc] SUBJECT.KEYID = 7
17,711,223 UART: [afmc] AUTHORITY.KEYID = 5
21,073,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,727 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,991 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,185 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,629 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,554 UART: [afmc] --
23,442,094 UART: [cold-reset] --
23,445,093 UART: [state] Locking Datavault
23,450,019 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,778 UART: [state] Locking ICCM
23,453,280 UART: [exit] Launching FMC @ 0x40000130
23,461,678 UART:
23,461,914 UART: Running Caliptra FMC ...
23,463,030 UART:
23,463,194 UART: [state] CFI Enabled
23,531,357 UART: [fht] FMC Alias Private Key: 7
25,871,161 UART: [art] Extend RT PCRs Done
25,872,384 UART: [art] Lock RT PCRs Done
25,874,031 UART: [art] Populate DV Done
25,879,500 UART: [fht] FMC Alias Private Key: 7
25,881,151 UART: [art] Derive CDI
25,881,888 UART: [art] Store in slot 0x4
25,939,493 UART: [art] Derive Key Pair
25,940,529 UART: [art] Store priv key in slot 0x5
29,233,271 UART: [art] Derive Key Pair - Done
29,246,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,831 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,340 UART: [art] PUB.X = FACF49B39B04A950B9F64F97FEB33ACC349116FB52D9CD18D910BAA3818AF46ED7C8ECAFC3AD6414E59C55B278655C6D
31,542,637 UART: [art] PUB.Y = A17039818BAE0EFBF862AFB4473BD42461B677E438429EE39A2C82A294F0225100CBCA49E9CBDA67271C9E0718B4EA09
31,549,877 UART: [art] SIG.R = F31DEE1E9A2CFCE2E0330DB0BE7EE3112D420D35E6A95A77AC8031B00E57B1320CD26275B002D7690546597562766187
31,557,259 UART: [art] SIG.S = 88291A9A4BB3FE4B4663C8F5C3CE356DFF8C4A7AC51496EBDD36F6DD920FD9935F6BF7F0FC2ADB300E9ED5351DF63DB9
32,862,608 UART: Caliptra RT
32,863,302 UART: [state] CFI Enabled
33,041,613 UART: [rt] RT listening for mailbox commands...
33,072,754 UART: [rt]cmd =0x4c444556, len=4
33,083,734 >>> mbox cmd response data (687 bytes)
33,124,962 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,155,156 UART: [rt]cmd =0x43455246, len=4
33,167,995 >>> mbox cmd response data (920 bytes)
33,185,004 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,214,933 UART: [rt]cmd =0x43455252, len=4
33,226,424 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,783,555 ready_for_fw is high
3,783,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,923,179 >>> mbox cmd response: success
17,924,550 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,609,507 UART:
23,609,894 UART: Running Caliptra FMC ...
23,611,006 UART:
23,611,166 UART: [state] CFI Enabled
23,679,748 UART: [fht] FMC Alias Private Key: 7
26,040,391 UART: [art] Extend RT PCRs Done
26,041,617 UART: [art] Lock RT PCRs Done
26,043,058 UART: [art] Populate DV Done
26,048,535 UART: [fht] FMC Alias Private Key: 7
26,050,086 UART: [art] Derive CDI
26,050,828 UART: [art] Store in slot 0x4
26,109,439 UART: [art] Derive Key Pair
26,110,485 UART: [art] Store priv key in slot 0x5
29,404,083 UART: [art] Derive Key Pair - Done
29,416,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,161 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,666 UART: [art] PUB.X = D6E1B38B105B45F0486214EE382D44B46C48DEB1431BEE5BDF15E4A8E3512F49E0E921387C9788904D1037F6085D63AB
31,713,970 UART: [art] PUB.Y = 8A49281ADC68E016EC12DD072BFD7553C478B6CC48E954319C41FAE6AEFDBE9C2CD73AFCE79815992DA7444E850CF92A
31,721,204 UART: [art] SIG.R = 2F438094A3946DAD52F5DCA55A61A3B1269B9AF599844EB5395CA6D56506D38DF8AC44B578B839E24F32CD976C5B0D95
31,728,596 UART: [art] SIG.S = 7B1824406CB5311F6BEDFB81E24ABCA7D742A33CBD4389B1BEF33E75793D5D92EC90BA3C07341D4C09C2D41E915E0877
33,033,448 UART: Caliptra RT
33,034,154 UART: [state] CFI Enabled
33,210,909 UART: [rt] RT listening for mailbox commands...
33,242,382 UART: [rt]cmd =0x4c444556, len=4
33,253,626 >>> mbox cmd response data (687 bytes)
33,294,940 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,325,023 UART: [rt]cmd =0x43455246, len=4
33,338,096 >>> mbox cmd response data (920 bytes)
33,355,060 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,385,148 UART: [rt]cmd =0x43455252, len=4
33,396,432 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,411 UART:
192,788 UART: Running Caliptra ROM ...
193,968 UART:
603,751 UART: [state] CFI Enabled
619,192 UART: [state] LifecycleState = Unprovisioned
621,128 UART: [state] DebugLocked = No
623,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,010 UART: [kat] SHA2-256
797,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,258 UART: [kat] ++
808,891 UART: [kat] sha1
818,916 UART: [kat] SHA2-256
821,636 UART: [kat] SHA2-384
827,973 UART: [kat] SHA2-512-ACC
830,332 UART: [kat] ECC-384
3,116,193 UART: [kat] HMAC-384Kdf
3,127,237 UART: [kat] LMS
4,317,404 UART: [kat] --
4,322,890 UART: [cold-reset] ++
4,324,605 UART: [fht] Storing FHT @ 0x50003400
4,335,935 UART: [idev] ++
4,336,499 UART: [idev] CDI.KEYID = 6
4,337,529 UART: [idev] SUBJECT.KEYID = 7
4,338,699 UART: [idev] UDS.KEYID = 0
4,339,679 ready_for_fw is high
4,339,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,742 UART: [idev] Erasing UDS.KEYID = 0
7,623,361 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,313 UART: [idev] --
7,647,592 UART: [ldev] ++
7,648,210 UART: [ldev] CDI.KEYID = 6
7,649,166 UART: [ldev] SUBJECT.KEYID = 5
7,650,373 UART: [ldev] AUTHORITY.KEYID = 7
7,651,620 UART: [ldev] FE.KEYID = 1
7,662,807 UART: [ldev] Erasing FE.KEYID = 1
10,949,116 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,374 UART: [ldev] --
13,311,362 UART: [fwproc] Waiting for Commands...
13,313,509 UART: [fwproc] Received command 0x46574c44
13,315,738 UART: [fwproc] Received Image of size 118548 bytes
17,421,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,371 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,490 >>> mbox cmd response: success
17,900,004 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,904,107 UART: [afmc] ++
17,904,894 UART: [afmc] CDI.KEYID = 6
17,905,971 UART: [afmc] SUBJECT.KEYID = 7
17,907,071 UART: [afmc] AUTHORITY.KEYID = 5
21,226,480 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,753 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,141 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,087 UART: [afmc] --
23,593,587 UART: [cold-reset] --
23,598,152 UART: [state] Locking Datavault
23,601,231 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,972 UART: [state] Locking ICCM
23,605,387 UART: [exit] Launching FMC @ 0x40000130
23,613,792 UART:
23,614,032 UART: Running Caliptra FMC ...
23,615,131 UART:
23,615,282 UART: [state] CFI Enabled
23,623,644 UART: [fht] FMC Alias Private Key: 7
25,963,988 UART: [art] Extend RT PCRs Done
25,965,219 UART: [art] Lock RT PCRs Done
25,966,770 UART: [art] Populate DV Done
25,972,233 UART: [fht] FMC Alias Private Key: 7
25,973,763 UART: [art] Derive CDI
25,974,492 UART: [art] Store in slot 0x4
26,017,735 UART: [art] Derive Key Pair
26,018,776 UART: [art] Store priv key in slot 0x5
29,260,809 UART: [art] Derive Key Pair - Done
29,274,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,811 UART: [art] PUB.X = B8BD9469B2F82153EDB70D4B475DE0BD8D920E07D8F8C94EE62698D9CD9964DB8818878DCD92D8A37CD3C5B2D52337A7
31,563,109 UART: [art] PUB.Y = EA882CFA1276EC9260E44389CA04C9532A9134561FB98C18CC905C990D044920A1B3D6BFDDFA26578CF82BECA5AB9E88
31,570,327 UART: [art] SIG.R = 05545D82EFE611D840D06FA4408AC895B3EF877C3BD066EF71D19F2E737ACF9CF5CD5168338D2C30D3CBB283228F43C6
31,577,762 UART: [art] SIG.S = D83ECACB355C6DD4521A398B90AF6C0FE78CD5DA70FA62DCB9A710DB517678BF204628F505CCF121E8983DDAC52A8985
32,882,560 UART: Caliptra RT
32,883,269 UART: [state] CFI Enabled
33,017,392 UART: [rt] RT listening for mailbox commands...
33,048,740 UART: [rt]cmd =0x4c444556, len=4
33,060,015 >>> mbox cmd response data (687 bytes)
33,101,915 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,132,041 UART: [rt]cmd =0x43455246, len=4
33,144,978 >>> mbox cmd response data (920 bytes)
33,162,057 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,192,229 UART: [rt]cmd =0x43455252, len=4
33,203,557 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,125,732 ready_for_fw is high
4,126,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,184 >>> mbox cmd response: success
18,159,981 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,798,469 UART:
23,798,854 UART: Running Caliptra FMC ...
23,799,996 UART:
23,800,145 UART: [state] CFI Enabled
23,808,359 UART: [fht] FMC Alias Private Key: 7
26,148,261 UART: [art] Extend RT PCRs Done
26,149,480 UART: [art] Lock RT PCRs Done
26,151,130 UART: [art] Populate DV Done
26,156,402 UART: [fht] FMC Alias Private Key: 7
26,157,896 UART: [art] Derive CDI
26,158,655 UART: [art] Store in slot 0x4
26,201,218 UART: [art] Derive Key Pair
26,202,281 UART: [art] Store priv key in slot 0x5
29,443,694 UART: [art] Derive Key Pair - Done
29,456,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,783 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,294 UART: [art] PUB.X = 79FCD15AE32E82CCF01AEF97C5B8090051676840057C20C3C174FBCCFC4A56EE9F352012D4441538B4B5BB4E0DE5AABA
31,745,595 UART: [art] PUB.Y = FA391AB5496ADFDC7D38E5DB5C4CB099C1A4595F1042CCF712EA04B3CB4B4CA4540BD55C01F3953279E3F75E0103E937
31,752,839 UART: [art] SIG.R = 5C2048680C160794AB86683B2179F77910CDB853F34FF29CF3EC248DFD71C09E35CBA59DD38EB0D4004629395FD07CFF
31,760,238 UART: [art] SIG.S = B2A6069FE55F4CB868F6305A874B6F6EAC91956403857CBC6A1279D61CEAE20E3886218AA31473CB3916EF05545DCDFB
33,065,000 UART: Caliptra RT
33,065,725 UART: [state] CFI Enabled
33,199,266 UART: [rt] RT listening for mailbox commands...
33,230,400 UART: [rt]cmd =0x4c444556, len=4
33,241,314 >>> mbox cmd response data (687 bytes)
33,283,060 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
33,312,799 UART: [rt]cmd =0x43455246, len=4
33,325,957 >>> mbox cmd response data (920 bytes)
33,342,814 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,372,670 UART: [rt]cmd =0x43455252, len=4
33,384,053 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,022 UART:
192,392 UART: Running Caliptra ROM ...
193,480 UART:
193,624 UART: [state] CFI Enabled
260,786 UART: [state] LifecycleState = Unprovisioned
262,774 UART: [state] DebugLocked = No
265,084 UART: [state] WD Timer not started. Device not locked for debugging
268,908 UART: [kat] SHA2-256
448,517 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,320 UART: [kat] ++
459,869 UART: [kat] sha1
470,039 UART: [kat] SHA2-256
472,755 UART: [kat] SHA2-384
478,316 UART: [kat] SHA2-512-ACC
480,676 UART: [kat] ECC-384
2,928,714 UART: [kat] HMAC-384Kdf
2,951,129 UART: [kat] LMS
3,427,593 UART: [kat] --
3,433,075 UART: [cold-reset] ++
3,435,144 UART: [fht] FHT @ 0x50003400
3,447,389 UART: [idev] ++
3,447,945 UART: [idev] CDI.KEYID = 6
3,448,970 UART: [idev] SUBJECT.KEYID = 7
3,450,134 UART: [idev] UDS.KEYID = 0
3,451,221 ready_for_fw is high
3,451,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,600,356 UART: [idev] Erasing UDS.KEYID = 0
5,966,297 UART: [idev] Sha1 KeyId Algorithm
5,990,828 UART: [idev] --
5,996,933 UART: [ldev] ++
5,997,499 UART: [ldev] CDI.KEYID = 6
5,998,380 UART: [ldev] SUBJECT.KEYID = 5
5,999,636 UART: [ldev] AUTHORITY.KEYID = 7
6,000,860 UART: [ldev] FE.KEYID = 1
6,037,065 UART: [ldev] Erasing FE.KEYID = 1
8,544,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,772 UART: [ldev] --
10,354,320 UART: [fwproc] Wait for Commands...
10,355,945 UART: [fwproc] Recv command 0x46574c44
10,357,983 UART: [fwproc] Recv'd Img size: 118548 bytes
13,844,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,994,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,132 >>> mbox cmd response: success
14,324,289 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,326,419 UART: [afmc] ++
14,327,053 UART: [afmc] CDI.KEYID = 6
14,327,941 UART: [afmc] SUBJECT.KEYID = 7
14,329,202 UART: [afmc] AUTHORITY.KEYID = 5
16,875,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,755 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,776 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,367 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,180 UART: [afmc] --
18,676,813 UART: [cold-reset] --
18,679,007 UART: [state] Locking Datavault
18,684,202 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,947 UART: [state] Locking ICCM
18,687,772 UART: [exit] Launching FMC @ 0x40000130
18,696,157 UART:
18,696,387 UART: Running Caliptra FMC ...
18,697,485 UART:
18,697,644 UART: [state] CFI Enabled
18,755,504 UART: [fht] FMC Alias Private Key: 7
20,522,610 UART: [art] Extend RT PCRs Done
20,523,818 UART: [art] Lock RT PCRs Done
20,525,492 UART: [art] Populate DV Done
20,530,896 UART: [fht] FMC Alias Private Key: 7
20,532,552 UART: [art] Derive CDI
20,533,365 UART: [art] Store in slot 0x4
20,588,051 UART: [art] Derive Key Pair
20,589,089 UART: [art] Store priv key in slot 0x5
23,052,463 UART: [art] Derive Key Pair - Done
23,065,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,779,872 UART: [art] PUB.X = 1AB547F06F38853C0C2D28E21D7C2FA98CEE7B930675CDD56F003B66B70146441B2872731E1373C37CF7983F4E207404
24,787,166 UART: [art] PUB.Y = 58467F8A806332E93E824436B53F4471C07345E4E6DF46AE3028DAA11BD01900D589DC3CA2F05B0C2C9DDD4E2301AF49
24,794,394 UART: [art] SIG.R = 797FBD3A5BCC3F16053FD348C8B4066704667B3FD51D68E43987215A80D6019E7C41D925833007A9C69FFA290C0B2DDE
24,801,732 UART: [art] SIG.S = 9E4F7B186A5B0D44AEFB556CC5D5F33C4FFEA5A915A42592C341F736ED302CC4EC097029B2077C9E7622737C6703D413
25,781,100 UART: Caliptra RT
25,781,814 UART: [state] CFI Enabled
25,961,956 UART: [rt] RT listening for mailbox commands...
25,992,936 UART: [rt]cmd =0x4c444556, len=4
26,003,858 >>> mbox cmd response data (687 bytes)
26,045,054 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,074,995 UART: [rt]cmd =0x43455246, len=4
26,087,469 >>> mbox cmd response data (888 bytes)
26,104,100 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,134,088 UART: [rt]cmd =0x43455252, len=4
26,145,474 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
3,460,625 ready_for_fw is high
3,461,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,074 >>> mbox cmd response: success
14,249,243 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,537,887 UART:
18,538,275 UART: Running Caliptra FMC ...
18,539,470 UART:
18,539,644 UART: [state] CFI Enabled
18,604,184 UART: [fht] FMC Alias Private Key: 7
20,370,186 UART: [art] Extend RT PCRs Done
20,371,411 UART: [art] Lock RT PCRs Done
20,373,112 UART: [art] Populate DV Done
20,378,433 UART: [fht] FMC Alias Private Key: 7
20,379,976 UART: [art] Derive CDI
20,380,791 UART: [art] Store in slot 0x4
20,436,697 UART: [art] Derive Key Pair
20,437,745 UART: [art] Store priv key in slot 0x5
22,900,735 UART: [art] Derive Key Pair - Done
22,914,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,641 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,142 UART: [art] PUB.X = 1D517468FFB1F736359E63CED672C6485457F145EB5FF5F9555970D156F7F50BF318799AEC08DE693E714A1E5BF76C53
24,635,398 UART: [art] PUB.Y = FB6CD030B2BD6AF0BEF01C341497FAEADF10D6882EE8108C5CBB024045DE33018E94A313991B7554DECA7F16B3B6CCBE
24,642,713 UART: [art] SIG.R = E4B7618666B838D5A32DDF7E6666B6EBB8E7D371699457DD3AFBE93193EF0A987473E16B7CF7348BD29771B103EE83F4
24,650,114 UART: [art] SIG.S = 1EE038AFA73999E3C4AC177DE680CBE81FED95A7DA2164560CC3AF495EC84B17C06990272985D00270C1C5C1B39FEE97
25,628,931 UART: Caliptra RT
25,629,634 UART: [state] CFI Enabled
25,810,008 UART: [rt] RT listening for mailbox commands...
25,841,388 UART: [rt]cmd =0x4c444556, len=4
25,852,560 >>> mbox cmd response data (687 bytes)
25,893,414 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,923,516 UART: [rt]cmd =0x43455246, len=4
25,936,096 >>> mbox cmd response data (888 bytes)
25,952,806 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,982,735 UART: [rt]cmd =0x43455252, len=4
25,994,066 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,498 UART:
192,885 UART: Running Caliptra ROM ...
193,990 UART:
603,643 UART: [state] CFI Enabled
617,522 UART: [state] LifecycleState = Unprovisioned
619,413 UART: [state] DebugLocked = No
621,801 UART: [state] WD Timer not started. Device not locked for debugging
626,051 UART: [kat] SHA2-256
805,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,484 UART: [kat] ++
817,201 UART: [kat] sha1
826,455 UART: [kat] SHA2-256
829,118 UART: [kat] SHA2-384
834,689 UART: [kat] SHA2-512-ACC
837,129 UART: [kat] ECC-384
3,278,097 UART: [kat] HMAC-384Kdf
3,290,843 UART: [kat] LMS
3,767,379 UART: [kat] --
3,772,999 UART: [cold-reset] ++
3,775,504 UART: [fht] FHT @ 0x50003400
3,786,700 UART: [idev] ++
3,787,279 UART: [idev] CDI.KEYID = 6
3,788,191 UART: [idev] SUBJECT.KEYID = 7
3,789,439 UART: [idev] UDS.KEYID = 0
3,790,388 ready_for_fw is high
3,790,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,608 UART: [idev] Erasing UDS.KEYID = 0
6,269,315 UART: [idev] Sha1 KeyId Algorithm
6,292,647 UART: [idev] --
6,297,128 UART: [ldev] ++
6,297,696 UART: [ldev] CDI.KEYID = 6
6,298,606 UART: [ldev] SUBJECT.KEYID = 5
6,299,820 UART: [ldev] AUTHORITY.KEYID = 7
6,301,054 UART: [ldev] FE.KEYID = 1
6,311,702 UART: [ldev] Erasing FE.KEYID = 1
8,788,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,841 UART: [ldev] --
10,582,081 UART: [fwproc] Wait for Commands...
10,585,083 UART: [fwproc] Recv command 0x46574c44
10,587,080 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,133 >>> mbox cmd response: success
14,561,270 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,564,807 UART: [afmc] ++
14,565,392 UART: [afmc] CDI.KEYID = 6
14,566,337 UART: [afmc] SUBJECT.KEYID = 7
14,567,549 UART: [afmc] AUTHORITY.KEYID = 5
17,070,819 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,956 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,577 UART: [afmc] --
18,868,488 UART: [cold-reset] --
18,871,483 UART: [state] Locking Datavault
18,876,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,164 UART: [state] Locking ICCM
18,879,722 UART: [exit] Launching FMC @ 0x40000130
18,888,119 UART:
18,888,355 UART: Running Caliptra FMC ...
18,889,457 UART:
18,889,618 UART: [state] CFI Enabled
18,897,836 UART: [fht] FMC Alias Private Key: 7
20,663,350 UART: [art] Extend RT PCRs Done
20,664,569 UART: [art] Lock RT PCRs Done
20,666,210 UART: [art] Populate DV Done
20,671,461 UART: [fht] FMC Alias Private Key: 7
20,673,001 UART: [art] Derive CDI
20,673,820 UART: [art] Store in slot 0x4
20,716,632 UART: [art] Derive Key Pair
20,717,632 UART: [art] Store priv key in slot 0x5
23,144,534 UART: [art] Derive Key Pair - Done
23,156,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,364 UART: [art] PUB.X = 8C3F015AA1F18B51EC1C3C9B6DF659788803E70C816F13B741037D893CE3EEB1D4A9C6D839BFD8BD1905FA8BA9358440
24,872,608 UART: [art] PUB.Y = 9A3A157DE561249BE20A97FC63AA86F9D591C162996719483289E5BCCE2D4243B3C29B759F6ABDB2BA2560487E3975FD
24,879,893 UART: [art] SIG.R = 392DF5D80E6E1A8171BA9ACBC767D405F991FDEE4BCDA119EC34EE305490BB7E8BC9E76061CA6E4C0D392C1F576BDF1D
24,887,281 UART: [art] SIG.S = 8B7EBDD5589E2A2E7DC92B6DBBD3ACFA8259A1015485B52D00A778CC3849B4CE0E348D9F5AEB3B8999287C3191C20E8F
25,865,994 UART: Caliptra RT
25,866,696 UART: [state] CFI Enabled
25,999,860 UART: [rt] RT listening for mailbox commands...
26,031,130 UART: [rt]cmd =0x4c444556, len=4
26,042,302 >>> mbox cmd response data (687 bytes)
26,082,990 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,112,935 UART: [rt]cmd =0x43455246, len=4
26,125,558 >>> mbox cmd response data (888 bytes)
26,142,137 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,172,043 UART: [rt]cmd =0x43455252, len=4
26,183,585 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,782,951 ready_for_fw is high
3,783,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,416 >>> mbox cmd response: success
14,450,767 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,705,192 UART:
18,705,602 UART: Running Caliptra FMC ...
18,706,717 UART:
18,706,875 UART: [state] CFI Enabled
18,714,343 UART: [fht] FMC Alias Private Key: 7
20,480,197 UART: [art] Extend RT PCRs Done
20,481,425 UART: [art] Lock RT PCRs Done
20,483,297 UART: [art] Populate DV Done
20,488,940 UART: [fht] FMC Alias Private Key: 7
20,490,648 UART: [art] Derive CDI
20,491,388 UART: [art] Store in slot 0x4
20,534,041 UART: [art] Derive Key Pair
20,535,054 UART: [art] Store priv key in slot 0x5
22,961,981 UART: [art] Derive Key Pair - Done
22,975,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,583 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,086 UART: [art] PUB.X = 428A3F6487CB33AAD192E814DA4DF20C816CE83817C369663BE1E25706803BC9BD7F0A583B56AE41E77C2BB75CC1ABCA
24,690,345 UART: [art] PUB.Y = A2522BA7E826CC1D499659FF9A58B75AEFEF912A28B229383227725D84F14E81770768248559C0EE050B785B0BB54BCB
24,697,604 UART: [art] SIG.R = FC7031896445BF69FD4735293A782E430F23CD7788F6D4614F48DF915FABEE2338850B707F84FD285AAF6F4A297A4278
24,705,049 UART: [art] SIG.S = B569630037E33212AA264CFF746D749CC2D57E6949CBA619665D595F8A123C39EBE0A38D348BC248FBB61D900D3F45D0
25,683,884 UART: Caliptra RT
25,684,596 UART: [state] CFI Enabled
25,817,584 UART: [rt] RT listening for mailbox commands...
25,849,041 UART: [rt]cmd =0x4c444556, len=4
25,860,105 >>> mbox cmd response data (687 bytes)
25,900,578 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
25,930,432 UART: [rt]cmd =0x43455246, len=4
25,943,154 >>> mbox cmd response data (888 bytes)
25,959,518 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,989,624 UART: [rt]cmd =0x43455252, len=4
26,000,772 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,134 UART:
192,494 UART: Running Caliptra ROM ...
193,592 UART:
193,734 UART: [state] CFI Enabled
263,491 UART: [state] LifecycleState = Unprovisioned
265,897 UART: [state] DebugLocked = No
267,563 UART: [state] WD Timer not started. Device not locked for debugging
271,877 UART: [kat] SHA2-256
461,765 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,524 UART: [kat] ++
472,977 UART: [kat] sha1
483,763 UART: [kat] SHA2-256
486,774 UART: [kat] SHA2-384
492,975 UART: [kat] SHA2-512-ACC
495,550 UART: [kat] ECC-384
2,948,071 UART: [kat] HMAC-384Kdf
2,969,244 UART: [kat] LMS
3,500,979 UART: [kat] --
3,506,262 UART: [cold-reset] ++
3,508,689 UART: [fht] FHT @ 0x50003400
3,520,513 UART: [idev] ++
3,521,224 UART: [idev] CDI.KEYID = 6
3,522,135 UART: [idev] SUBJECT.KEYID = 7
3,523,376 UART: [idev] UDS.KEYID = 0
3,524,297 ready_for_fw is high
3,524,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,657 UART: [idev] Erasing UDS.KEYID = 0
6,026,324 UART: [idev] Sha1 KeyId Algorithm
6,048,871 UART: [idev] --
6,055,085 UART: [ldev] ++
6,055,768 UART: [ldev] CDI.KEYID = 6
6,056,652 UART: [ldev] SUBJECT.KEYID = 5
6,057,865 UART: [ldev] AUTHORITY.KEYID = 7
6,059,041 UART: [ldev] FE.KEYID = 1
6,097,245 UART: [ldev] Erasing FE.KEYID = 1
8,603,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,583 UART: [ldev] --
10,408,686 UART: [fwproc] Wait for Commands...
10,411,047 UART: [fwproc] Recv command 0x46574c44
10,413,320 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,996 >>> mbox cmd response: success
14,673,083 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,676,675 UART: [afmc] ++
14,677,361 UART: [afmc] CDI.KEYID = 6
14,678,592 UART: [afmc] SUBJECT.KEYID = 7
14,680,019 UART: [afmc] AUTHORITY.KEYID = 5
17,213,056 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,953,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,955,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,970,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,455 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,000,349 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,023,156 UART: [afmc] --
19,025,871 UART: [cold-reset] --
19,029,039 UART: [state] Locking Datavault
19,032,181 UART: [state] Locking PCR0, PCR1 and PCR31
19,034,364 UART: [state] Locking ICCM
19,035,864 UART: [exit] Launching FMC @ 0x40000130
19,044,524 UART:
19,044,758 UART: Running Caliptra FMC ...
19,045,860 UART:
19,046,018 UART: [state] CFI Enabled
19,113,945 UART: [fht] FMC Alias Private Key: 7
20,901,386 UART: [art] Extend RT PCRs Done
20,902,604 UART: [art] Lock RT PCRs Done
20,904,552 UART: [art] Populate DV Done
20,909,797 UART: [fht] FMC Alias Private Key: 7
20,911,330 UART: [art] Derive CDI
20,912,157 UART: [art] Store in slot 0x4
20,967,413 UART: [art] Derive Key Pair
20,968,447 UART: [art] Store priv key in slot 0x5
23,431,620 UART: [art] Derive Key Pair - Done
23,444,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,156,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,398 UART: [art] PUB.X = C5198CDD615DC85F4DC408168AA63AF6EB88C7FA80D89B258CFC246AFB812405BCC9F29F43F6478DA3163E1D891FBDB1
25,165,695 UART: [art] PUB.Y = D415D374E2E81BFB65F4B82EE0C264B9CCBC6C6E46571BF91D7BE645B0006D8E908ADF4F7D1964608AFD56D8A4D209E9
25,172,973 UART: [art] SIG.R = 8E67971907F9CA6444F18EDD1F62DBDBC52D52DFFFDFCE80419B4F1F44158DC99B7FE5F622AB4CB8642DBF7A328E211A
25,180,395 UART: [art] SIG.S = B46FB402AE20C3EBF00519F67F9AD2974A444505101B1F85A1C13818B6E356F11C3557EB59C37DC55640E23B2870EC40
26,159,555 UART: Caliptra RT
26,160,237 UART: [state] CFI Enabled
26,340,545 UART: [rt] RT listening for mailbox commands...
26,372,010 UART: [rt]cmd =0x4c444556, len=4
26,383,150 >>> mbox cmd response data (687 bytes)
26,423,642 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,453,752 UART: [rt]cmd =0x43455246, len=4
26,466,578 >>> mbox cmd response data (888 bytes)
26,483,080 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,513,220 UART: [rt]cmd =0x43455252, len=4
26,524,546 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,442,046 ready_for_fw is high
3,442,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,840,964 >>> mbox cmd response: success
14,842,136 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,135,288 UART:
19,135,677 UART: Running Caliptra FMC ...
19,136,779 UART:
19,136,928 UART: [state] CFI Enabled
19,203,111 UART: [fht] FMC Alias Private Key: 7
20,969,132 UART: [art] Extend RT PCRs Done
20,970,360 UART: [art] Lock RT PCRs Done
20,972,014 UART: [art] Populate DV Done
20,977,648 UART: [fht] FMC Alias Private Key: 7
20,979,350 UART: [art] Derive CDI
20,980,164 UART: [art] Store in slot 0x4
21,035,406 UART: [art] Derive Key Pair
21,036,451 UART: [art] Store priv key in slot 0x5
23,499,692 UART: [art] Derive Key Pair - Done
23,512,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,765 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,265 UART: [art] PUB.X = 0711A3839314B4123687272D754DAAA98CD086784BEC51576A0959C7832AC478870253095F34E14F2C149FDD534AC491
25,233,514 UART: [art] PUB.Y = 8D185E6E3E614DE5AED18D55D1B22327A619C255005CCC47C84ADEAFBD40040431A730A643C6F1C21187FD5DCDD4DF65
25,240,753 UART: [art] SIG.R = 6356F67EC57C33027B8FC556CB46AFAF0F430CC195737AFAB23D6CFAECD91750EDEB56A3A1E429E7E569DE434864B842
25,248,196 UART: [art] SIG.S = 53FE4B406AEF5618367999364EBCDFEBCB100483C3B3D93D6760ECDF38605242DD26C6DA3EE0309770967907FFB4E4EA
26,227,287 UART: Caliptra RT
26,227,997 UART: [state] CFI Enabled
26,407,913 UART: [rt] RT listening for mailbox commands...
26,439,280 UART: [rt]cmd =0x4c444556, len=4
26,450,582 >>> mbox cmd response data (687 bytes)
26,491,320 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,521,269 UART: [rt]cmd =0x43455246, len=4
26,533,856 >>> mbox cmd response data (888 bytes)
26,550,682 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,580,586 UART: [rt]cmd =0x43455252, len=4
26,592,135 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,446 UART:
192,817 UART: Running Caliptra ROM ...
194,010 UART:
603,637 UART: [state] CFI Enabled
618,679 UART: [state] LifecycleState = Unprovisioned
621,086 UART: [state] DebugLocked = No
623,203 UART: [state] WD Timer not started. Device not locked for debugging
628,041 UART: [kat] SHA2-256
817,881 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,688 UART: [kat] ++
829,234 UART: [kat] sha1
840,892 UART: [kat] SHA2-256
843,908 UART: [kat] SHA2-384
850,632 UART: [kat] SHA2-512-ACC
853,219 UART: [kat] ECC-384
3,293,978 UART: [kat] HMAC-384Kdf
3,307,369 UART: [kat] LMS
3,839,177 UART: [kat] --
3,843,053 UART: [cold-reset] ++
3,845,416 UART: [fht] FHT @ 0x50003400
3,855,755 UART: [idev] ++
3,856,463 UART: [idev] CDI.KEYID = 6
3,857,418 UART: [idev] SUBJECT.KEYID = 7
3,858,594 UART: [idev] UDS.KEYID = 0
3,859,528 ready_for_fw is high
3,859,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,575 UART: [idev] Erasing UDS.KEYID = 0
6,330,124 UART: [idev] Sha1 KeyId Algorithm
6,353,086 UART: [idev] --
6,359,546 UART: [ldev] ++
6,360,229 UART: [ldev] CDI.KEYID = 6
6,361,145 UART: [ldev] SUBJECT.KEYID = 5
6,362,306 UART: [ldev] AUTHORITY.KEYID = 7
6,363,537 UART: [ldev] FE.KEYID = 1
6,373,809 UART: [ldev] Erasing FE.KEYID = 1
8,857,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,952 UART: [ldev] --
10,651,083 UART: [fwproc] Wait for Commands...
10,653,672 UART: [fwproc] Recv command 0x46574c44
10,655,982 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,651 >>> mbox cmd response: success
14,912,895 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,916,613 UART: [afmc] ++
14,917,321 UART: [afmc] CDI.KEYID = 6
14,918,522 UART: [afmc] SUBJECT.KEYID = 7
14,919,959 UART: [afmc] AUTHORITY.KEYID = 5
17,420,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,689 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,646 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,337 UART: [afmc] --
19,214,348 UART: [cold-reset] --
19,219,213 UART: [state] Locking Datavault
19,225,287 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,492 UART: [state] Locking ICCM
19,229,704 UART: [exit] Launching FMC @ 0x40000130
19,238,389 UART:
19,238,625 UART: Running Caliptra FMC ...
19,239,663 UART:
19,239,813 UART: [state] CFI Enabled
19,248,154 UART: [fht] FMC Alias Private Key: 7
21,014,371 UART: [art] Extend RT PCRs Done
21,015,737 UART: [art] Lock RT PCRs Done
21,017,161 UART: [art] Populate DV Done
21,022,312 UART: [fht] FMC Alias Private Key: 7
21,023,911 UART: [art] Derive CDI
21,024,732 UART: [art] Store in slot 0x4
21,067,060 UART: [art] Derive Key Pair
21,068,089 UART: [art] Store priv key in slot 0x5
23,494,751 UART: [art] Derive Key Pair - Done
23,507,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,648 UART: [art] PUB.X = 128874CDFF6D2902A79CF30056AFEE6836F0A96AD265432FFFE2765C5BD1332C9E57CC5D4CF74731D90E268DE0427C4B
25,222,917 UART: [art] PUB.Y = ECBE1C04F1EA0E9538CCA12C8AAF523D0E48D73C2E49683C4FB5B68109F2D846EE95C4AAD0E76D8DC49E9B6083D2A6B5
25,230,231 UART: [art] SIG.R = DDE48EA15838BB114792D698C29A43B406A20FCBB0A1025CB35ABA678586B0574235928DDFC59368F337EC10F980A8F0
25,237,594 UART: [art] SIG.S = 5C06D567C70AACCDCE3028F012A62BF340A498FAE671E3460A8F5F6EEA0DEF70D4EA8119115A16E08C3F86783CACE2CC
26,216,443 UART: Caliptra RT
26,217,164 UART: [state] CFI Enabled
26,349,552 UART: [rt] RT listening for mailbox commands...
26,380,799 UART: [rt]cmd =0x4c444556, len=4
26,391,755 >>> mbox cmd response data (687 bytes)
26,433,753 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,463,759 UART: [rt]cmd =0x43455246, len=4
26,476,221 >>> mbox cmd response data (888 bytes)
26,492,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,522,835 UART: [rt]cmd =0x43455252, len=4
26,534,277 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,761,887 ready_for_fw is high
3,762,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,182 >>> mbox cmd response: success
15,054,354 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,303,347 UART:
19,303,733 UART: Running Caliptra FMC ...
19,304,944 UART:
19,305,119 UART: [state] CFI Enabled
19,312,933 UART: [fht] FMC Alias Private Key: 7
21,078,603 UART: [art] Extend RT PCRs Done
21,079,838 UART: [art] Lock RT PCRs Done
21,081,370 UART: [art] Populate DV Done
21,086,698 UART: [fht] FMC Alias Private Key: 7
21,088,354 UART: [art] Derive CDI
21,089,177 UART: [art] Store in slot 0x4
21,132,104 UART: [art] Derive Key Pair
21,133,106 UART: [art] Store priv key in slot 0x5
23,560,565 UART: [art] Derive Key Pair - Done
23,573,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,227 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,736 UART: [art] PUB.X = D8A4E62A36D0BD0859A98E5FE2C03153F52B579D4A7D6B56DBD11877CB64493EB3B916F4C05730A1FB3169FCC66CD0B4
25,289,010 UART: [art] PUB.Y = 6BEB5D2C5F233236AD94B4DC71236C1C35AC837308DBC87D8B1380DCB0055CFB354EE82E034FA2C82008865494795AF7
25,296,225 UART: [art] SIG.R = D66E47AF1C6CD794B9BFC6ABAEBC608B4ACAE2E725811DA0D111CE48E2CA36BCB29401094FA5ECCC950E6551F91F6C47
25,303,732 UART: [art] SIG.S = BA1A2F572A46012CB4BA7E3D03CDA2F44762236C1DA7EEDFD9CCCE7AE9BF6319CF8974F06714DBAC3C37A217D4169197
26,282,152 UART: Caliptra RT
26,282,847 UART: [state] CFI Enabled
26,415,891 UART: [rt] RT listening for mailbox commands...
26,447,433 UART: [rt]cmd =0x4c444556, len=4
26,458,595 >>> mbox cmd response data (687 bytes)
26,500,349 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,530,853 UART: [rt]cmd =0x43455246, len=4
26,543,550 >>> mbox cmd response data (888 bytes)
26,560,215 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,590,245 UART: [rt]cmd =0x43455252, len=4
26,601,346 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,054 UART: [kat] SHA2-512-ACC
896,955 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
907,128 UART: [kat] LMS
1,475,324 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 ready_for_fw is high
1,480,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,628 UART: [idev] --
1,514,517 UART: [ldev] ++
1,514,685 UART: [ldev] CDI.KEYID = 6
1,515,048 UART: [ldev] SUBJECT.KEYID = 5
1,515,474 UART: [ldev] AUTHORITY.KEYID = 7
1,515,937 UART: [ldev] FE.KEYID = 1
1,521,339 UART: [ldev] Erasing FE.KEYID = 1
1,546,368 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,915 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,646 UART: [ldev] --
1,585,961 UART: [fwproc] Waiting for Commands...
1,586,662 UART: [fwproc] Received command 0x46574c44
1,587,453 UART: [fwproc] Received Image of size 118548 bytes
2,932,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,899 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,374 >>> mbox cmd response: success
3,131,374 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,622 UART: [afmc] ++
3,132,790 UART: [afmc] CDI.KEYID = 6
3,133,152 UART: [afmc] SUBJECT.KEYID = 7
3,133,577 UART: [afmc] AUTHORITY.KEYID = 5
3,168,610 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,382 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,754 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,437 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,261 UART: [afmc] --
3,211,253 UART: [cold-reset] --
3,212,185 UART: [state] Locking Datavault
3,213,496 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,100 UART: [state] Locking ICCM
3,214,628 UART: [exit] Launching FMC @ 0x40000130
3,219,958 UART:
3,219,974 UART: Running Caliptra FMC ...
3,220,382 UART:
3,220,436 UART: [state] CFI Enabled
3,230,836 UART: [fht] FMC Alias Private Key: 7
3,349,250 UART: [art] Extend RT PCRs Done
3,349,678 UART: [art] Lock RT PCRs Done
3,351,232 UART: [art] Populate DV Done
3,359,369 UART: [fht] FMC Alias Private Key: 7
3,360,397 UART: [art] Derive CDI
3,360,677 UART: [art] Store in slot 0x4
3,446,399 UART: [art] Derive Key Pair
3,446,759 UART: [art] Store priv key in slot 0x5
3,460,308 UART: [art] Derive Key Pair - Done
3,475,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,660 UART: [art] PUB.X = 02B443B9824810EFFD50A37A86D2419D80C5DAA471BDBA45F0404E5AE56E13C4B435685651C273FCFAEA7111993820B0
3,498,431 UART: [art] PUB.Y = CB6A80F9EC199DA98F072FF9328F5D77D690F63302C954FD30B9C9881DB0517D7DA945A16F6C1AEDF65EBA424470E40A
3,505,384 UART: [art] SIG.R = 0ECDEF0891CF0670EC86A1ED5CF5B89E69321E90DA6F097B594B2F9938E46123E5989C18BC056B8EC92D47012DC5FF43
3,512,146 UART: [art] SIG.S = DEA31BC90C871458157D409EABCAB5BDA1E5A43D053D5FC189DF4561406B2881E9408D1AB09669E6C14D9E8EF5A7C1A0
3,536,568 UART: Caliptra RT
3,536,819 UART: [state] CFI Enabled
3,656,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,803 UART: [rt]cmd =0x4c444556, len=4
3,697,307 >>> mbox cmd response data (687 bytes)
3,697,308 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,661 UART: [rt]cmd =0x43455246, len=4
3,738,991 >>> mbox cmd response data (920 bytes)
3,738,992 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,123 UART: [rt]cmd =0x43455252, len=4
3,778,984 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,513 ready_for_fw is high
1,362,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,992 >>> mbox cmd response: success
2,979,992 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,289 UART:
3,041,305 UART: Running Caliptra FMC ...
3,041,713 UART:
3,041,767 UART: [state] CFI Enabled
3,052,377 UART: [fht] FMC Alias Private Key: 7
3,171,237 UART: [art] Extend RT PCRs Done
3,171,665 UART: [art] Lock RT PCRs Done
3,173,215 UART: [art] Populate DV Done
3,181,558 UART: [fht] FMC Alias Private Key: 7
3,182,682 UART: [art] Derive CDI
3,182,962 UART: [art] Store in slot 0x4
3,268,662 UART: [art] Derive Key Pair
3,269,022 UART: [art] Store priv key in slot 0x5
3,282,455 UART: [art] Derive Key Pair - Done
3,297,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,565 UART: [art] PUB.X = 148D20195BB38ADDFEE76F715A67B77C6ED378FDAC4A4549B6B4EB8FE4AB022691BF3C21EA05FF8C31C281909E546DBF
3,320,349 UART: [art] PUB.Y = F42F3FD2E23085A86AFE71AB1C42C5881E28D098F6F941E2CB89F837FBA0824C09C4FBA73F4072DAA534029687C8490D
3,327,298 UART: [art] SIG.R = CACECF3C1130CE0F6837E2C594A02968A53633129B6D06428CE297078AD37A13141EA9B0BA35151F1553E5A1D61E2C38
3,334,061 UART: [art] SIG.S = 4D8593DF73248220806FFB5A72201033C14F107556B2BEBFDC76478C16250F1815269677E41B35BAF7561776DB0FD617
3,358,249 UART: Caliptra RT
3,358,500 UART: [state] CFI Enabled
3,478,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,492 UART: [rt]cmd =0x4c444556, len=4
3,519,920 >>> mbox cmd response data (687 bytes)
3,519,921 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,998 UART: [rt]cmd =0x43455246, len=4
3,561,418 >>> mbox cmd response data (920 bytes)
3,561,419 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,590,726 UART: [rt]cmd =0x43455252, len=4
3,601,385 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
890,862 UART: [kat] SHA2-256
892,800 UART: [kat] SHA2-384
895,495 UART: [kat] SHA2-512-ACC
897,396 UART: [kat] ECC-384
902,921 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,730 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,480,097 UART: [idev] ++
1,480,265 UART: [idev] CDI.KEYID = 6
1,480,625 UART: [idev] SUBJECT.KEYID = 7
1,481,049 UART: [idev] UDS.KEYID = 0
1,481,394 ready_for_fw is high
1,481,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,013 UART: [idev] Erasing UDS.KEYID = 0
1,506,229 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,779 UART: [idev] --
1,515,888 UART: [ldev] ++
1,516,056 UART: [ldev] CDI.KEYID = 6
1,516,419 UART: [ldev] SUBJECT.KEYID = 5
1,516,845 UART: [ldev] AUTHORITY.KEYID = 7
1,517,308 UART: [ldev] FE.KEYID = 1
1,522,582 UART: [ldev] Erasing FE.KEYID = 1
1,548,489 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,339 UART: [ldev] --
1,587,602 UART: [fwproc] Waiting for Commands...
1,588,435 UART: [fwproc] Received command 0x46574c44
1,589,226 UART: [fwproc] Received Image of size 118548 bytes
2,934,696 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,192 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,739 >>> mbox cmd response: success
3,132,739 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,133,759 UART: [afmc] ++
3,133,927 UART: [afmc] CDI.KEYID = 6
3,134,289 UART: [afmc] SUBJECT.KEYID = 7
3,134,714 UART: [afmc] AUTHORITY.KEYID = 5
3,170,027 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,317 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,097 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,806 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,689 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,372 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,142 UART: [afmc] --
3,213,180 UART: [cold-reset] --
3,214,046 UART: [state] Locking Datavault
3,215,365 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,969 UART: [state] Locking ICCM
3,216,489 UART: [exit] Launching FMC @ 0x40000130
3,221,819 UART:
3,221,835 UART: Running Caliptra FMC ...
3,222,243 UART:
3,222,386 UART: [state] CFI Enabled
3,232,812 UART: [fht] FMC Alias Private Key: 7
3,352,236 UART: [art] Extend RT PCRs Done
3,352,664 UART: [art] Lock RT PCRs Done
3,354,032 UART: [art] Populate DV Done
3,362,395 UART: [fht] FMC Alias Private Key: 7
3,363,323 UART: [art] Derive CDI
3,363,603 UART: [art] Store in slot 0x4
3,449,375 UART: [art] Derive Key Pair
3,449,735 UART: [art] Store priv key in slot 0x5
3,463,090 UART: [art] Derive Key Pair - Done
3,477,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,222 UART: [art] PUB.X = 17AF3C921BED2EC8AA41CDAA5EA186548064664C5ACE0A06BD901EA63552E24BFF972B9E725DA907B0220C9103B53354
3,500,987 UART: [art] PUB.Y = 9C3847AC45C49535154CDD896AF5BA9B6F681743AF6BE4731384FC04B1B718F8F6E434D4A4B3260362475AA2E54AABC7
3,507,937 UART: [art] SIG.R = 03BFCCB351BE94F601FC0368B86B3445C151463A00E378218FFFABA3BCBC71FF3D4378BF8EF3A456E6BDFFA39D12FBDD
3,514,702 UART: [art] SIG.S = 936481FD62DFA51A55E136A3CDF1E1606E630F0075C38A57A2CDF7B2CF4A2E55AA7108958500707BA4E8A4D9442A35C0
3,537,840 UART: Caliptra RT
3,538,183 UART: [state] CFI Enabled
3,659,297 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,643 UART: [rt]cmd =0x4c444556, len=4
3,700,093 >>> mbox cmd response data (687 bytes)
3,700,094 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,523 UART: [rt]cmd =0x43455246, len=4
3,741,799 >>> mbox cmd response data (920 bytes)
3,741,800 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,071 UART: [rt]cmd =0x43455252, len=4
3,781,992 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,450 ready_for_fw is high
1,362,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,175 >>> mbox cmd response: success
2,981,175 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,042,812 UART:
3,042,828 UART: Running Caliptra FMC ...
3,043,236 UART:
3,043,379 UART: [state] CFI Enabled
3,054,069 UART: [fht] FMC Alias Private Key: 7
3,173,199 UART: [art] Extend RT PCRs Done
3,173,627 UART: [art] Lock RT PCRs Done
3,174,977 UART: [art] Populate DV Done
3,183,146 UART: [fht] FMC Alias Private Key: 7
3,184,166 UART: [art] Derive CDI
3,184,446 UART: [art] Store in slot 0x4
3,270,144 UART: [art] Derive Key Pair
3,270,504 UART: [art] Store priv key in slot 0x5
3,284,135 UART: [art] Derive Key Pair - Done
3,298,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,215 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,980 UART: [art] PUB.X = 95B3D2C96F873E3B4D6B741BD31610FA1A06D89C4F521252EA9993C782854B3ECF3BDE5AF2AD113856AE0EDC93E837ED
3,321,758 UART: [art] PUB.Y = 192EE649AC432A45510B22DBB87F8E9957666D373EF6D97CEFE9999536E317F3A4332C406A3749F541933CE4468E5FE5
3,328,703 UART: [art] SIG.R = 6CAC7F557FA7DD15A3C0A99E3B65AA0D0099A6740C01272F463621B81DA310C4098FF4D0E12A32F69EF5DB5073A2213B
3,335,447 UART: [art] SIG.S = 9CDB439AB58118AAF43A61D295FF1CAA898872FDEC8B683482936B6B5A8F91EF4B053F7AEC82BDBC7308D8B76E30E38A
3,359,791 UART: Caliptra RT
3,360,134 UART: [state] CFI Enabled
3,480,382 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,712 UART: [rt]cmd =0x4c444556, len=4
3,521,218 >>> mbox cmd response data (687 bytes)
3,521,219 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,708 UART: [rt]cmd =0x43455246, len=4
3,563,020 >>> mbox cmd response data (920 bytes)
3,563,021 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,518 UART: [rt]cmd =0x43455252, len=4
3,603,447 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,641 UART: [kat] LMS
1,168,953 UART: [kat] --
1,169,908 UART: [cold-reset] ++
1,170,376 UART: [fht] FHT @ 0x50003400
1,173,138 UART: [idev] ++
1,173,306 UART: [idev] CDI.KEYID = 6
1,173,667 UART: [idev] SUBJECT.KEYID = 7
1,174,092 UART: [idev] UDS.KEYID = 0
1,174,438 ready_for_fw is high
1,174,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,198,641 UART: [idev] Sha1 KeyId Algorithm
1,207,513 UART: [idev] --
1,208,536 UART: [ldev] ++
1,208,704 UART: [ldev] CDI.KEYID = 6
1,209,068 UART: [ldev] SUBJECT.KEYID = 5
1,209,495 UART: [ldev] AUTHORITY.KEYID = 7
1,209,958 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,248 UART: [ldev] --
1,280,543 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,841 >>> mbox cmd response: success
2,824,841 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,949 UART: [afmc] ++
2,826,117 UART: [afmc] CDI.KEYID = 6
2,826,480 UART: [afmc] SUBJECT.KEYID = 7
2,826,906 UART: [afmc] AUTHORITY.KEYID = 5
2,862,233 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,638 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,978 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,679 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,574 UART: [afmc] --
2,905,561 UART: [cold-reset] --
2,906,283 UART: [state] Locking Datavault
2,907,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,966 UART: [state] Locking ICCM
2,908,622 UART: [exit] Launching FMC @ 0x40000130
2,913,952 UART:
2,913,968 UART: Running Caliptra FMC ...
2,914,376 UART:
2,914,430 UART: [state] CFI Enabled
2,925,156 UART: [fht] FMC Alias Private Key: 7
3,044,082 UART: [art] Extend RT PCRs Done
3,044,510 UART: [art] Lock RT PCRs Done
3,045,820 UART: [art] Populate DV Done
3,053,993 UART: [fht] FMC Alias Private Key: 7
3,055,021 UART: [art] Derive CDI
3,055,301 UART: [art] Store in slot 0x4
3,141,352 UART: [art] Derive Key Pair
3,141,712 UART: [art] Store priv key in slot 0x5
3,154,878 UART: [art] Derive Key Pair - Done
3,169,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,516 UART: [art] PUB.X = CAE73CB51E1BB592EF9963104577191F5CC6938DFBA2F0A2415E4BBFE48520B0F12FC18E2250CD1D1B57A4BA4F3C6E07
3,192,299 UART: [art] PUB.Y = 71188A85300D7C47B19CBB8F4F9B562B7E7497CB4EC999C7260A27EF14CC77341DFB4B8F7D89DA0F076B289AA2F36C2B
3,199,249 UART: [art] SIG.R = 67D4079305E3E46AC82C6A4C9FF648C02469946484309D42301609B5E8309D1894F3868B1E344C2A0718951016CAF98B
3,205,993 UART: [art] SIG.S = CEBB3427678F2449C1B29B2E651E5AFCA6F7ED8EA3D5A88607EC526F8FEFD21A7D5766F60670A62CD0AC75301BA70F9B
3,229,886 UART: Caliptra RT
3,230,137 UART: [state] CFI Enabled
3,349,114 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,572 UART: [rt]cmd =0x4c444556, len=4
3,389,908 >>> mbox cmd response data (687 bytes)
3,389,909 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,214 UART: [rt]cmd =0x43455246, len=4
3,431,355 >>> mbox cmd response data (888 bytes)
3,431,356 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,623 UART: [rt]cmd =0x43455252, len=4
3,471,562 >>> mbox cmd response data (783 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,284 ready_for_fw is high
1,059,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,422 >>> mbox cmd response: success
2,679,422 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,741,565 UART:
2,741,581 UART: Running Caliptra FMC ...
2,741,989 UART:
2,742,043 UART: [state] CFI Enabled
2,752,537 UART: [fht] FMC Alias Private Key: 7
2,871,801 UART: [art] Extend RT PCRs Done
2,872,229 UART: [art] Lock RT PCRs Done
2,873,683 UART: [art] Populate DV Done
2,881,898 UART: [fht] FMC Alias Private Key: 7
2,882,982 UART: [art] Derive CDI
2,883,262 UART: [art] Store in slot 0x4
2,969,063 UART: [art] Derive Key Pair
2,969,423 UART: [art] Store priv key in slot 0x5
2,982,619 UART: [art] Derive Key Pair - Done
2,997,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,258 UART: [art] PUB.X = 50D14423EC25912C20F2B1624B48EF5D47F63F73101984B02D0BF45B8F1F3AC6859FE23FB8EDCBE93BAE807D5217AF1D
3,020,037 UART: [art] PUB.Y = 1DBCBE632EDDBA305DD359122E98B43BF0BE589D6EB5B3D892BE787DEE40EEF402BA9E3089A2FF9D8D95B2B9A78B7149
3,027,008 UART: [art] SIG.R = 00DD31E0F609BE3B6EE4ECFD438AA3D205D183A006CEDC2A684CC89D7D7B5511F47BB4A30288605879F9344BF5122A7D
3,033,756 UART: [art] SIG.S = 4DCF89B0CE99FE655D005A860E448DA3BB04DD0E63BF2F3B03F037AB7FE55A5A23E16E0CD02302949FA218C69716A8F1
3,057,422 UART: Caliptra RT
3,057,673 UART: [state] CFI Enabled
3,176,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,578 UART: [rt]cmd =0x4c444556, len=4
3,216,978 >>> mbox cmd response data (687 bytes)
3,216,979 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,246,446 UART: [rt]cmd =0x43455246, len=4
3,258,379 >>> mbox cmd response data (888 bytes)
3,258,380 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,287,859 UART: [rt]cmd =0x43455252, len=4
3,298,825 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,791 UART: [state] LifecycleState = Unprovisioned
86,446 UART: [state] DebugLocked = No
86,998 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,311 UART: [kat] SHA2-256
902,251 UART: [kat] SHA2-384
904,898 UART: [kat] SHA2-512-ACC
906,799 UART: [kat] ECC-384
916,240 UART: [kat] HMAC-384Kdf
920,928 UART: [kat] LMS
1,169,240 UART: [kat] --
1,170,123 UART: [cold-reset] ++
1,170,473 UART: [fht] FHT @ 0x50003400
1,172,989 UART: [idev] ++
1,173,157 UART: [idev] CDI.KEYID = 6
1,173,518 UART: [idev] SUBJECT.KEYID = 7
1,173,943 UART: [idev] UDS.KEYID = 0
1,174,289 ready_for_fw is high
1,174,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,784 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,750 UART: [idev] --
1,208,845 UART: [ldev] ++
1,209,013 UART: [ldev] CDI.KEYID = 6
1,209,377 UART: [ldev] SUBJECT.KEYID = 5
1,209,804 UART: [ldev] AUTHORITY.KEYID = 7
1,210,267 UART: [ldev] FE.KEYID = 1
1,215,395 UART: [ldev] Erasing FE.KEYID = 1
1,241,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,149 UART: [ldev] --
1,280,562 UART: [fwproc] Wait for Commands...
1,281,333 UART: [fwproc] Recv command 0x46574c44
1,282,066 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,622 >>> mbox cmd response: success
2,824,622 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,792 UART: [afmc] ++
2,825,960 UART: [afmc] CDI.KEYID = 6
2,826,323 UART: [afmc] SUBJECT.KEYID = 7
2,826,749 UART: [afmc] AUTHORITY.KEYID = 5
2,861,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,626 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,349 UART: [afmc] --
2,905,336 UART: [cold-reset] --
2,905,960 UART: [state] Locking Datavault
2,907,035 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,639 UART: [state] Locking ICCM
2,908,181 UART: [exit] Launching FMC @ 0x40000130
2,913,511 UART:
2,913,527 UART: Running Caliptra FMC ...
2,913,935 UART:
2,914,078 UART: [state] CFI Enabled
2,924,576 UART: [fht] FMC Alias Private Key: 7
3,043,668 UART: [art] Extend RT PCRs Done
3,044,096 UART: [art] Lock RT PCRs Done
3,045,540 UART: [art] Populate DV Done
3,053,755 UART: [fht] FMC Alias Private Key: 7
3,054,705 UART: [art] Derive CDI
3,054,985 UART: [art] Store in slot 0x4
3,140,694 UART: [art] Derive Key Pair
3,141,054 UART: [art] Store priv key in slot 0x5
3,154,598 UART: [art] Derive Key Pair - Done
3,169,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,209 UART: [art] PUB.X = 50813ED90D9C5386127A9A12A0FC38562783883457508CC72F2333DC9F5DF4DBF3F34F2EA94E5FB4ABF446615818C058
3,191,976 UART: [art] PUB.Y = B27942EB56BDB0DB5B158AF19CCC7C6D6EDDA65076C40A80C92AD83D1FD000BCA646F5BB3FF88774C049117D011DD0FA
3,198,920 UART: [art] SIG.R = C7C2E9176E8C2BBFD39540D3084A5C495CE5D3A3CE674E70D462576FF074C6A82B4CFD07E2AA359A957490409D21746F
3,205,690 UART: [art] SIG.S = 9B0DB83521C84F497B00162B87A455E661BA0A797A2195C1DA4FE7197D6BA447A6B25259C94D68ABB2A998DAFD80E8FF
3,229,852 UART: Caliptra RT
3,230,195 UART: [state] CFI Enabled
3,350,279 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,877 UART: [rt]cmd =0x4c444556, len=4
3,391,439 >>> mbox cmd response data (687 bytes)
3,391,440 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,851 UART: [rt]cmd =0x43455246, len=4
3,432,912 >>> mbox cmd response data (888 bytes)
3,432,913 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,280 UART: [rt]cmd =0x43455252, len=4
3,473,088 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,725 ready_for_fw is high
1,059,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,277 >>> mbox cmd response: success
2,680,277 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,630 UART:
2,742,646 UART: Running Caliptra FMC ...
2,743,054 UART:
2,743,197 UART: [state] CFI Enabled
2,753,713 UART: [fht] FMC Alias Private Key: 7
2,873,341 UART: [art] Extend RT PCRs Done
2,873,769 UART: [art] Lock RT PCRs Done
2,875,479 UART: [art] Populate DV Done
2,883,484 UART: [fht] FMC Alias Private Key: 7
2,884,568 UART: [art] Derive CDI
2,884,848 UART: [art] Store in slot 0x4
2,970,581 UART: [art] Derive Key Pair
2,970,941 UART: [art] Store priv key in slot 0x5
2,984,955 UART: [art] Derive Key Pair - Done
2,999,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,363 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,128 UART: [art] PUB.X = 771AC1EF7C7D8708668023D81513CF477A1B6C40AF557AFE2A0A7AFE66FDCA6A73313E50E3F06E201EFDDAEC08F870B6
3,022,907 UART: [art] PUB.Y = 032941B87531A7C95F7297DD67AABC31FC30FE486C6A962A82B5BCE47D301F2F75C5256D51E562B53FCD5F54250F1E84
3,029,857 UART: [art] SIG.R = BC8D8A7A995D5121BAA4BA45068B70D033B5D767C21D892167B30002201C5FE9314FA14E97DAC3A9FB0FF48248BAFD37
3,036,606 UART: [art] SIG.S = B4CC40F78CC41BAFE588DE7453C2213FB2840224B0E7F80D92F9BAA745C80B60DE86846EE73100C9521D279875B59DF3
3,060,741 UART: Caliptra RT
3,061,084 UART: [state] CFI Enabled
3,180,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,470 UART: [rt]cmd =0x4c444556, len=4
3,221,968 >>> mbox cmd response data (687 bytes)
3,221,969 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,251,488 UART: [rt]cmd =0x43455246, len=4
3,263,489 >>> mbox cmd response data (888 bytes)
3,263,490 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,292,919 UART: [rt]cmd =0x43455252, len=4
3,303,903 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,576 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,831 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
892,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,921 UART: [kat] ++
897,073 UART: [kat] sha1
901,263 UART: [kat] SHA2-256
903,203 UART: [kat] SHA2-384
905,800 UART: [kat] SHA2-512-ACC
907,701 UART: [kat] ECC-384
917,410 UART: [kat] HMAC-384Kdf
921,972 UART: [kat] LMS
1,170,300 UART: [kat] --
1,171,339 UART: [cold-reset] ++
1,171,831 UART: [fht] FHT @ 0x50003400
1,174,548 UART: [idev] ++
1,174,716 UART: [idev] CDI.KEYID = 6
1,175,076 UART: [idev] SUBJECT.KEYID = 7
1,175,500 UART: [idev] UDS.KEYID = 0
1,175,845 ready_for_fw is high
1,175,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,200,119 UART: [idev] Sha1 KeyId Algorithm
1,208,347 UART: [idev] --
1,209,337 UART: [ldev] ++
1,209,505 UART: [ldev] CDI.KEYID = 6
1,209,868 UART: [ldev] SUBJECT.KEYID = 5
1,210,294 UART: [ldev] AUTHORITY.KEYID = 7
1,210,757 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,241,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,585 UART: [ldev] --
1,280,876 UART: [fwproc] Wait for Commands...
1,281,624 UART: [fwproc] Recv command 0x46574c44
1,282,352 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,773 >>> mbox cmd response: success
2,825,773 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,826,905 UART: [afmc] ++
2,827,073 UART: [afmc] CDI.KEYID = 6
2,827,435 UART: [afmc] SUBJECT.KEYID = 7
2,827,860 UART: [afmc] AUTHORITY.KEYID = 5
2,863,021 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,186 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,643 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,526 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,227 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,971 UART: [afmc] --
2,906,055 UART: [cold-reset] --
2,906,979 UART: [state] Locking Datavault
2,908,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,628 UART: [state] Locking ICCM
2,909,270 UART: [exit] Launching FMC @ 0x40000130
2,914,600 UART:
2,914,616 UART: Running Caliptra FMC ...
2,915,024 UART:
2,915,078 UART: [state] CFI Enabled
2,925,782 UART: [fht] FMC Alias Private Key: 7
3,045,134 UART: [art] Extend RT PCRs Done
3,045,562 UART: [art] Lock RT PCRs Done
3,047,276 UART: [art] Populate DV Done
3,055,483 UART: [fht] FMC Alias Private Key: 7
3,056,591 UART: [art] Derive CDI
3,056,871 UART: [art] Store in slot 0x4
3,142,904 UART: [art] Derive Key Pair
3,143,264 UART: [art] Store priv key in slot 0x5
3,156,892 UART: [art] Derive Key Pair - Done
3,171,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,919 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,684 UART: [art] PUB.X = FBA0A9B24B851E4B5CA634F3BECDD337BAC0900C6F0264D57BA7931D01841F85B9EA358E43D926598B99521FBC8EFF79
3,194,459 UART: [art] PUB.Y = CE7F49959AD66249327AC223D9A36444CBFE06B476EC7D0C3A8472F09906F92F0866F7527D405DABEDF891EFF324D845
3,201,403 UART: [art] SIG.R = CDDF7C7321E9AE2183DE9EA497282EB75CBB7CC977C60B0825B80FFD224CEA75E304A45B13D8D67121370D4DEBB4E2B2
3,208,176 UART: [art] SIG.S = A605ED7F2B8593271187E83377585D1981B7549A4978E9A7D733D2BD676BD7AA60FB44120E1C7DEEBD8A8A5161CD7380
3,230,962 UART: Caliptra RT
3,231,213 UART: [state] CFI Enabled
3,349,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,541 UART: [rt]cmd =0x4c444556, len=4
3,391,069 >>> mbox cmd response data (687 bytes)
3,391,070 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,373 UART: [rt]cmd =0x43455246, len=4
3,432,414 >>> mbox cmd response data (888 bytes)
3,432,415 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,728 UART: [rt]cmd =0x43455252, len=4
3,472,486 >>> mbox cmd response data (784 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 ready_for_fw is high
1,060,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,140 >>> mbox cmd response: success
2,680,140 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,337 UART:
2,742,353 UART: Running Caliptra FMC ...
2,742,761 UART:
2,742,815 UART: [state] CFI Enabled
2,753,179 UART: [fht] FMC Alias Private Key: 7
2,872,791 UART: [art] Extend RT PCRs Done
2,873,219 UART: [art] Lock RT PCRs Done
2,874,277 UART: [art] Populate DV Done
2,882,784 UART: [fht] FMC Alias Private Key: 7
2,883,808 UART: [art] Derive CDI
2,884,088 UART: [art] Store in slot 0x4
2,969,929 UART: [art] Derive Key Pair
2,970,289 UART: [art] Store priv key in slot 0x5
2,984,125 UART: [art] Derive Key Pair - Done
2,998,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,961 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,726 UART: [art] PUB.X = 49A1A9488D8861287ECDA08EE6416C6D987CB7F71A67506365BB908C4AB67D8D40DC2AB7E28B693BEB7E4FF8F90173C4
3,021,503 UART: [art] PUB.Y = 337B5084566F6BD513C42FA5F065F9F7D014FFE8D2A006D631478D8B7C7A6B97982FF025F159F05B068183ADBEA443BA
3,028,453 UART: [art] SIG.R = 160C6E95B14948ACEEDA8E8C9EA263509BA691AC35E505C01B311520441A2EBAD322541EED352254D87E23BEC92FF202
3,035,222 UART: [art] SIG.S = 2973BFA5B38F30ADF1D31F25B05C9F6C5942B8C810D05D2E0D008327962B491961A5847729A3A02CC47B740056AF5850
3,059,513 UART: Caliptra RT
3,059,764 UART: [state] CFI Enabled
3,178,980 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,640 UART: [rt]cmd =0x4c444556, len=4
3,220,044 >>> mbox cmd response data (687 bytes)
3,220,045 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,468 UART: [rt]cmd =0x43455246, len=4
3,261,329 >>> mbox cmd response data (888 bytes)
3,261,330 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,290,729 UART: [rt]cmd =0x43455252, len=4
3,301,596 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,841 UART: [state] LifecycleState = Unprovisioned
86,496 UART: [state] DebugLocked = No
87,166 UART: [state] WD Timer not started. Device not locked for debugging
88,299 UART: [kat] SHA2-256
893,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,074 UART: [kat] ++
898,226 UART: [kat] sha1
902,418 UART: [kat] SHA2-256
904,358 UART: [kat] SHA2-384
907,137 UART: [kat] SHA2-512-ACC
909,038 UART: [kat] ECC-384
919,039 UART: [kat] HMAC-384Kdf
923,683 UART: [kat] LMS
1,172,011 UART: [kat] --
1,173,038 UART: [cold-reset] ++
1,173,522 UART: [fht] FHT @ 0x50003400
1,176,153 UART: [idev] ++
1,176,321 UART: [idev] CDI.KEYID = 6
1,176,681 UART: [idev] SUBJECT.KEYID = 7
1,177,105 UART: [idev] UDS.KEYID = 0
1,177,450 ready_for_fw is high
1,177,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,608 UART: [idev] Sha1 KeyId Algorithm
1,211,188 UART: [idev] --
1,212,118 UART: [ldev] ++
1,212,286 UART: [ldev] CDI.KEYID = 6
1,212,649 UART: [ldev] SUBJECT.KEYID = 5
1,213,075 UART: [ldev] AUTHORITY.KEYID = 7
1,213,538 UART: [ldev] FE.KEYID = 1
1,218,736 UART: [ldev] Erasing FE.KEYID = 1
1,245,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,408 UART: [ldev] --
1,284,803 UART: [fwproc] Wait for Commands...
1,285,493 UART: [fwproc] Recv command 0x46574c44
1,286,221 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,649 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,014 >>> mbox cmd response: success
2,830,014 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,831,050 UART: [afmc] ++
2,831,218 UART: [afmc] CDI.KEYID = 6
2,831,580 UART: [afmc] SUBJECT.KEYID = 7
2,832,005 UART: [afmc] AUTHORITY.KEYID = 5
2,867,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,241 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,950 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,833 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,534 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,256 UART: [afmc] --
2,911,348 UART: [cold-reset] --
2,912,128 UART: [state] Locking Datavault
2,913,209 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,813 UART: [state] Locking ICCM
2,914,401 UART: [exit] Launching FMC @ 0x40000130
2,919,731 UART:
2,919,747 UART: Running Caliptra FMC ...
2,920,155 UART:
2,920,298 UART: [state] CFI Enabled
2,930,714 UART: [fht] FMC Alias Private Key: 7
3,049,818 UART: [art] Extend RT PCRs Done
3,050,246 UART: [art] Lock RT PCRs Done
3,051,852 UART: [art] Populate DV Done
3,060,197 UART: [fht] FMC Alias Private Key: 7
3,061,337 UART: [art] Derive CDI
3,061,617 UART: [art] Store in slot 0x4
3,147,410 UART: [art] Derive Key Pair
3,147,770 UART: [art] Store priv key in slot 0x5
3,160,824 UART: [art] Derive Key Pair - Done
3,175,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,262 UART: [art] PUB.X = D736D4BD660BB3F54C88C26F57F25034C9871898348F6F0D718A4DB998B9E02CDF11EF6E064F3F58AD1CAA2F399780E2
3,198,031 UART: [art] PUB.Y = 7C86BAB3CA6962AB5733F388C11F1767509501D2F1B8A26A9A67FE3E4D657B3E96FE1DAAC3F73967652966523F48E145
3,204,980 UART: [art] SIG.R = 18A209975BA0091CDCDA3C7CDE6ED0D3A11379AA1A71CE4C272819B4AA51665F16CEEF5463F4C73962C7B4EECE6AA0FC
3,211,766 UART: [art] SIG.S = 5086C5EB6233843C76FF17F76821BCCD0724E557A195C6C63F87E1937BC5DF31E8F135087E6FB3D82B6800A8FE0D28BA
3,235,429 UART: Caliptra RT
3,235,772 UART: [state] CFI Enabled
3,355,728 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,484 UART: [rt]cmd =0x4c444556, len=4
3,397,032 >>> mbox cmd response data (687 bytes)
3,397,033 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,448 UART: [rt]cmd =0x43455246, len=4
3,438,445 >>> mbox cmd response data (888 bytes)
3,438,446 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,467,749 UART: [rt]cmd =0x43455252, len=4
3,478,498 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 ready_for_fw is high
1,060,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,215 >>> mbox cmd response: success
2,680,215 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,314 UART:
2,742,330 UART: Running Caliptra FMC ...
2,742,738 UART:
2,742,881 UART: [state] CFI Enabled
2,753,891 UART: [fht] FMC Alias Private Key: 7
2,873,459 UART: [art] Extend RT PCRs Done
2,873,887 UART: [art] Lock RT PCRs Done
2,875,471 UART: [art] Populate DV Done
2,884,004 UART: [fht] FMC Alias Private Key: 7
2,885,186 UART: [art] Derive CDI
2,885,466 UART: [art] Store in slot 0x4
2,971,421 UART: [art] Derive Key Pair
2,971,781 UART: [art] Store priv key in slot 0x5
2,984,715 UART: [art] Derive Key Pair - Done
2,999,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,940 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,705 UART: [art] PUB.X = ADDF9A455364A85AB8D6E1597B36B08613B0AE93D82A2B829A34AC3BFA995CB73561BBF19180896AFC199D715C1929CE
3,022,485 UART: [art] PUB.Y = 32E7E6B6D9228830DC47FEC6C95B872223EDD0DE8C3F0523E2C92D576126D8B7CC0C56F5A9CF8929767007289159A88D
3,029,428 UART: [art] SIG.R = 2F79A31F4F240F1EA37C9B88F55F104A86E902ED655BF432A4DB157A98DC904A1B7101A164752953D91EAFF226ABAC88
3,036,197 UART: [art] SIG.S = 246B63D54911DD21B77BDC2ACE41EE4D97C502A3E0466E96581E87BBDA5FCC864A0830F1558E2EE3CE08DB16C1FBFE5F
3,059,636 UART: Caliptra RT
3,059,979 UART: [state] CFI Enabled
3,180,713 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,337 UART: [rt]cmd =0x4c444556, len=4
3,221,869 >>> mbox cmd response data (687 bytes)
3,221,870 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,971 UART: [rt]cmd =0x43455246, len=4
3,262,882 >>> mbox cmd response data (888 bytes)
3,262,883 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,292,350 UART: [rt]cmd =0x43455252, len=4
3,303,249 >>> mbox cmd response data (782 bytes)
test test_certs::test_full_cert_chain ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,031 UART:
192,390 UART: Running Caliptra ROM ...
193,513 UART:
193,660 UART: [state] CFI Enabled
261,859 UART: [state] LifecycleState = Unprovisioned
263,849 UART: [state] DebugLocked = No
266,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,628 UART: [kat] SHA2-256
441,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,788 UART: [kat] ++
452,240 UART: [kat] sha1
463,456 UART: [kat] SHA2-256
466,123 UART: [kat] SHA2-384
472,539 UART: [kat] SHA2-512-ACC
474,908 UART: [kat] ECC-384
2,766,958 UART: [kat] HMAC-384Kdf
2,779,214 UART: [kat] LMS
3,969,536 UART: [kat] --
3,975,815 UART: [cold-reset] ++
3,977,492 UART: [fht] Storing FHT @ 0x50003400
3,988,980 UART: [idev] ++
3,989,553 UART: [idev] CDI.KEYID = 6
3,990,502 UART: [idev] SUBJECT.KEYID = 7
3,991,766 UART: [idev] UDS.KEYID = 0
3,992,722 ready_for_fw is high
3,992,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,960 UART: [idev] Erasing UDS.KEYID = 0
7,324,753 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,389 UART: [idev] --
7,350,578 UART: [ldev] ++
7,351,159 UART: [ldev] CDI.KEYID = 6
7,352,128 UART: [ldev] SUBJECT.KEYID = 5
7,353,345 UART: [ldev] AUTHORITY.KEYID = 7
7,354,526 UART: [ldev] FE.KEYID = 1
7,400,310 UART: [ldev] Erasing FE.KEYID = 1
10,731,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,982 UART: [ldev] --
13,115,827 UART: [fwproc] Waiting for Commands...
13,118,727 UART: [fwproc] Received command 0x46574c44
13,120,909 UART: [fwproc] Received Image of size 118548 bytes
17,227,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,995 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,813 >>> mbox cmd response: success
18,171,183 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,172,222 UART: [afmc] ++
18,172,744 UART: [afmc] CDI.KEYID = 6
18,173,733 UART: [afmc] SUBJECT.KEYID = 7
18,174,845 UART: [afmc] AUTHORITY.KEYID = 5
21,070,029 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,432 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,124 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,862 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,309 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,697 UART: [afmc] --
23,443,778 UART: [cold-reset] --
23,449,419 UART: [state] Locking Datavault
23,455,154 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,854 UART: [state] Locking ICCM
23,458,520 UART: [exit] Launching FMC @ 0x40000130
23,466,916 UART:
23,467,155 UART: Running Caliptra FMC ...
23,468,254 UART:
23,468,415 UART: [state] CFI Enabled
23,532,473 UART: [fht] FMC Alias Private Key: 7
25,872,556 UART: [art] Extend RT PCRs Done
25,873,780 UART: [art] Lock RT PCRs Done
25,875,554 UART: [art] Populate DV Done
25,880,820 UART: [fht] FMC Alias Private Key: 7
25,882,469 UART: [art] Derive CDI
25,883,284 UART: [art] Store in slot 0x4
25,941,169 UART: [art] Derive Key Pair
25,942,204 UART: [art] Store priv key in slot 0x5
29,235,185 UART: [art] Derive Key Pair - Done
29,248,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,341 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,857 UART: [art] PUB.X = 6BB6B874560D7CB6A2E43FE4895078FF886D5E43B78EEA020E0502F96A5BE21DA80B6F173EAFABEBB9E8117F91552C21
31,546,163 UART: [art] PUB.Y = 853D218E1A998A6E96A3CE91F4411B3AF22198D34557AB16DA9D022512EBF1A3FEDB2C7C9824A986FF89D29E5C1E738A
31,553,389 UART: [art] SIG.R = DA72F10D7C2D69479D2824D08B65EFBCF4FBAA4F335F14A17DE4001D7E9BD8A7E8F5DE7CEAD2B5EB21968A3C62148EC9
31,560,826 UART: [art] SIG.S = 0465CBED6262A0C0B76ACAC95ACE1C02D435B2C516DCCFD38572337DA6AB593BD7BA3CC8738C7A03B2179053AB497D5A
32,866,017 UART: Caliptra RT
32,866,739 UART: [state] CFI Enabled
33,042,693 UART: [rt] RT listening for mailbox commands...
33,076,490 UART: [rt]cmd =0x49444543, len=327
33,085,623 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,782,174 ready_for_fw is high
3,782,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,791 >>> mbox cmd response: success
18,407,660 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,634,085 UART:
23,634,495 UART: Running Caliptra FMC ...
23,635,599 UART:
23,635,771 UART: [state] CFI Enabled
23,702,907 UART: [fht] FMC Alias Private Key: 7
26,043,234 UART: [art] Extend RT PCRs Done
26,044,462 UART: [art] Lock RT PCRs Done
26,045,960 UART: [art] Populate DV Done
26,051,472 UART: [fht] FMC Alias Private Key: 7
26,053,190 UART: [art] Derive CDI
26,054,016 UART: [art] Store in slot 0x4
26,111,864 UART: [art] Derive Key Pair
26,112,909 UART: [art] Store priv key in slot 0x5
29,405,274 UART: [art] Derive Key Pair - Done
29,418,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,130 UART: [art] PUB.X = 55E9D2C469C34B869E5202EA556F33567FA64B351BB58EB5219CED6DEA04718459EDE03DA2DD05C05AE5C54772A105C9
31,715,388 UART: [art] PUB.Y = FC03221A082E376F2069BF33250A698C5EEA0E29E2C603C102F229641531582046743F2E692D3C1E54023127E4C02F67
31,722,597 UART: [art] SIG.R = AEFE2C97328063EF17C4F02B6E40629C617AE6AC3D2425A208331F69A9083C982CEBA202374D84FC0D37340143358008
31,729,935 UART: [art] SIG.S = DB30F8EFD2CC91593FC641656509CB52EDCF341A7C903655E5F914D9A31C73A2AC0D6AE61FC9DE832F68F7E7A13B3D7A
33,035,182 UART: Caliptra RT
33,035,908 UART: [state] CFI Enabled
33,232,161 UART: [rt] RT listening for mailbox commands...
33,265,913 UART: [rt]cmd =0x49444543, len=327
33,275,000 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,419 UART:
192,780 UART: Running Caliptra ROM ...
193,948 UART:
603,545 UART: [state] CFI Enabled
618,002 UART: [state] LifecycleState = Unprovisioned
619,940 UART: [state] DebugLocked = No
622,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,939 UART: [kat] SHA2-256
797,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,263 UART: [kat] ++
808,708 UART: [kat] sha1
820,146 UART: [kat] SHA2-256
822,866 UART: [kat] SHA2-384
827,073 UART: [kat] SHA2-512-ACC
829,577 UART: [kat] ECC-384
3,113,883 UART: [kat] HMAC-384Kdf
3,126,679 UART: [kat] LMS
4,316,824 UART: [kat] --
4,321,024 UART: [cold-reset] ++
4,322,257 UART: [fht] Storing FHT @ 0x50003400
4,335,227 UART: [idev] ++
4,335,790 UART: [idev] CDI.KEYID = 6
4,336,738 UART: [idev] SUBJECT.KEYID = 7
4,337,973 UART: [idev] UDS.KEYID = 0
4,338,946 ready_for_fw is high
4,339,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,016 UART: [idev] Erasing UDS.KEYID = 0
7,627,306 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,545 UART: [idev] --
7,654,133 UART: [ldev] ++
7,654,696 UART: [ldev] CDI.KEYID = 6
7,655,630 UART: [ldev] SUBJECT.KEYID = 5
7,656,883 UART: [ldev] AUTHORITY.KEYID = 7
7,658,159 UART: [ldev] FE.KEYID = 1
7,671,340 UART: [ldev] Erasing FE.KEYID = 1
10,956,960 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,524 UART: [ldev] --
13,318,305 UART: [fwproc] Waiting for Commands...
13,320,574 UART: [fwproc] Received command 0x46574c44
13,322,748 UART: [fwproc] Received Image of size 118548 bytes
17,433,901 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,410 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,601 >>> mbox cmd response: success
18,373,586 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,374,659 UART: [afmc] ++
18,375,192 UART: [afmc] CDI.KEYID = 6
18,376,073 UART: [afmc] SUBJECT.KEYID = 7
18,377,193 UART: [afmc] AUTHORITY.KEYID = 5
21,229,235 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,918 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,636 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,337 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,799 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,051 UART: [afmc] --
23,596,703 UART: [cold-reset] --
23,599,371 UART: [state] Locking Datavault
23,604,336 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,082 UART: [state] Locking ICCM
23,608,235 UART: [exit] Launching FMC @ 0x40000130
23,616,633 UART:
23,616,857 UART: Running Caliptra FMC ...
23,617,949 UART:
23,618,108 UART: [state] CFI Enabled
23,625,949 UART: [fht] FMC Alias Private Key: 7
25,966,181 UART: [art] Extend RT PCRs Done
25,967,411 UART: [art] Lock RT PCRs Done
25,969,304 UART: [art] Populate DV Done
25,974,546 UART: [fht] FMC Alias Private Key: 7
25,976,238 UART: [art] Derive CDI
25,977,047 UART: [art] Store in slot 0x4
26,019,534 UART: [art] Derive Key Pair
26,020,532 UART: [art] Store priv key in slot 0x5
29,263,280 UART: [art] Derive Key Pair - Done
29,276,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,326 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,835 UART: [art] PUB.X = 0925CB53E8E85D1639E1AD6A510288DEE211A1875B0E4881F33BAE492E85C3D9448625BC34F7EA832A0968AB7B0CC327
31,565,072 UART: [art] PUB.Y = 5F74F2CEAC95A5D582EFF524BD6D82406ABFE11301E18E2249BCD069083E6C4CD56193F6FEAF64E43583660924DB8135
31,572,352 UART: [art] SIG.R = BAB69479035064EACFCD894049E937392335F2D25BBBEB190634579B7A0B38133C3CF7E5620790F00FFEAEFEC3700FEB
31,579,736 UART: [art] SIG.S = 57E8F50AB02D8117D5D002EA7803818EB53A725BE20DD3C6C37330EF8597189B503225C98916CF7639E8A6178D4AC98D
32,885,411 UART: Caliptra RT
32,886,127 UART: [state] CFI Enabled
33,020,003 UART: [rt] RT listening for mailbox commands...
33,053,419 UART: [rt]cmd =0x49444543, len=327
33,062,526 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
4,126,767 ready_for_fw is high
4,127,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,140,279 >>> mbox cmd response: success
18,601,840 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
23,778,794 UART:
23,779,694 UART: Running Caliptra FMC ...
23,780,832 UART:
23,780,989 UART: [state] CFI Enabled
23,788,556 UART: [fht] FMC Alias Private Key: 7
26,128,412 UART: [art] Extend RT PCRs Done
26,129,653 UART: [art] Lock RT PCRs Done
26,131,450 UART: [art] Populate DV Done
26,137,115 UART: [fht] FMC Alias Private Key: 7
26,138,844 UART: [art] Derive CDI
26,139,578 UART: [art] Store in slot 0x4
26,182,003 UART: [art] Derive Key Pair
26,183,013 UART: [art] Store priv key in slot 0x5
29,424,728 UART: [art] Derive Key Pair - Done
29,437,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,719,927 UART: [art] PUB.X = FB2DC9DAEB617B5D1C2D5172894FE0EF770BDF6BE7CEAEA0395FDDC14E4B5245749CE9E6E730E99907828F56CD8F1027
31,727,228 UART: [art] PUB.Y = 63CDE55FC6B0723A13E29058D32DAD80E4FF523E3090B9DCACEC3FD9B4F8A3171FF658D6A55C51DABD6635D96C240031
31,734,479 UART: [art] SIG.R = 6EC2121EB9EED46E92761222A7F1E3A1846F8B2F9259490D3510F8282EA67554607999C362743A0E91A421F29908064A
31,741,810 UART: [art] SIG.S = 08F91CA6EE171BE650B11F6DEAC1CB2261417C00B55198ADE28619FA4BF878EA2B632344804CE8E6785D10531549B021
33,046,745 UART: Caliptra RT
33,047,451 UART: [state] CFI Enabled
33,180,729 UART: [rt] RT listening for mailbox commands...
33,214,411 UART: [rt]cmd =0x49444543, len=327
33,223,352 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
192,122 UART:
192,490 UART: Running Caliptra ROM ...
193,663 UART:
193,817 UART: [state] CFI Enabled
260,748 UART: [state] LifecycleState = Unprovisioned
262,662 UART: [state] DebugLocked = No
265,612 UART: [state] WD Timer not started. Device not locked for debugging
269,283 UART: [kat] SHA2-256
448,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,664 UART: [kat] ++
460,270 UART: [kat] sha1
471,430 UART: [kat] SHA2-256
474,142 UART: [kat] SHA2-384
479,125 UART: [kat] SHA2-512-ACC
481,484 UART: [kat] ECC-384
2,944,855 UART: [kat] HMAC-384Kdf
2,971,368 UART: [kat] LMS
3,447,834 UART: [kat] --
3,451,757 UART: [cold-reset] ++
3,453,398 UART: [fht] FHT @ 0x50003400
3,464,671 UART: [idev] ++
3,465,305 UART: [idev] CDI.KEYID = 6
3,466,212 UART: [idev] SUBJECT.KEYID = 7
3,467,455 UART: [idev] UDS.KEYID = 0
3,468,496 ready_for_fw is high
3,468,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,748 UART: [idev] Erasing UDS.KEYID = 0
5,985,295 UART: [idev] Sha1 KeyId Algorithm
6,008,344 UART: [idev] --
6,013,366 UART: [ldev] ++
6,013,933 UART: [ldev] CDI.KEYID = 6
6,014,849 UART: [ldev] SUBJECT.KEYID = 5
6,016,061 UART: [ldev] AUTHORITY.KEYID = 7
6,017,346 UART: [ldev] FE.KEYID = 1
6,057,867 UART: [ldev] Erasing FE.KEYID = 1
8,567,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,296 UART: [ldev] --
10,375,870 UART: [fwproc] Wait for Commands...
10,378,460 UART: [fwproc] Recv command 0x46574c44
10,380,503 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,185 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,201 >>> mbox cmd response: success
14,807,429 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
14,808,454 UART: [afmc] ++
14,808,976 UART: [afmc] CDI.KEYID = 6
14,809,861 UART: [afmc] SUBJECT.KEYID = 7
14,810,915 UART: [afmc] AUTHORITY.KEYID = 5
16,895,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,514 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,066 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,061 UART: [afmc] --
18,696,647 UART: [cold-reset] --
18,700,416 UART: [state] Locking Datavault
18,706,544 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,258 UART: [state] Locking ICCM
18,709,595 UART: [exit] Launching FMC @ 0x40000130
18,718,043 UART:
18,718,282 UART: Running Caliptra FMC ...
18,719,380 UART:
18,719,541 UART: [state] CFI Enabled
18,776,485 UART: [fht] FMC Alias Private Key: 7
20,542,316 UART: [art] Extend RT PCRs Done
20,543,528 UART: [art] Lock RT PCRs Done
20,545,197 UART: [art] Populate DV Done
20,550,548 UART: [fht] FMC Alias Private Key: 7
20,552,136 UART: [art] Derive CDI
20,552,949 UART: [art] Store in slot 0x4
20,609,419 UART: [art] Derive Key Pair
20,610,413 UART: [art] Store priv key in slot 0x5
23,073,458 UART: [art] Derive Key Pair - Done
23,086,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,273 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,784 UART: [art] PUB.X = FA694856661A50377486080A5561816865355E080789A0C3414211D6D7B5A47A47A48873D338ADADE235D8E42D9C6D68
24,807,979 UART: [art] PUB.Y = C17B808215B929A3AACFE4618874948058B83C3DC8B43491D451D2068BD44A0BABAB410F7950DBF8ADB0F08B89B7A052
24,815,269 UART: [art] SIG.R = C593B9AFC399EE488E793BEC054AF8C549FE74D2B9A5D964210FB23604D4EFC6129C894320DCFA5721861A0197A8267A
24,822,659 UART: [art] SIG.S = 20531E5FE731CF9848A811434EED49EFB8114038897B02E953580C0162E95BBF23466BF101D3CA5C174D42D25DCAC9BB
25,801,476 UART: Caliptra RT
25,802,216 UART: [state] CFI Enabled
25,983,304 UART: [rt] RT listening for mailbox commands...
26,017,263 UART: [rt]cmd =0x49444543, len=327
26,026,312 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,457,763 ready_for_fw is high
3,458,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,196,233 >>> mbox cmd response: success
14,658,112 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,494,248 UART:
18,494,660 UART: Running Caliptra FMC ...
18,495,753 UART:
18,495,914 UART: [state] CFI Enabled
18,562,353 UART: [fht] FMC Alias Private Key: 7
20,328,614 UART: [art] Extend RT PCRs Done
20,329,841 UART: [art] Lock RT PCRs Done
20,331,631 UART: [art] Populate DV Done
20,336,969 UART: [fht] FMC Alias Private Key: 7
20,338,584 UART: [art] Derive CDI
20,339,407 UART: [art] Store in slot 0x4
20,395,939 UART: [art] Derive Key Pair
20,396,985 UART: [art] Store priv key in slot 0x5
22,858,892 UART: [art] Derive Key Pair - Done
22,872,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,160 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,646 UART: [art] PUB.X = F2571F84D70FD0DD97ACA3E91E85CE65282ED717EA1AFBB83CCDE5239FECB953C76CAFF2E3E8EDB70F5A4C07215B7C54
24,592,971 UART: [art] PUB.Y = E93B1E1FB20D5299C0ADD5B90A8780EED8277DC12869CE2DAAD734A32AF226613F36C45BCAEC811814E6FA47C2CC3DBF
24,600,244 UART: [art] SIG.R = 0AD23343A816DA097BA4E1BEF6A2A0C632D9F3BB1DF04975019AF6B409094BC670B1A5DE15C55ECB04EBB5C8D305F074
24,607,647 UART: [art] SIG.S = A8A975038DAE27F9FAB9E5E26FE89D230065945EC0DE6CB8AA3E1FA0945B290FC69566E822DCFD7806254C2DEFCD4F52
25,586,149 UART: Caliptra RT
25,586,860 UART: [state] CFI Enabled
25,768,111 UART: [rt] RT listening for mailbox commands...
25,801,784 UART: [rt]cmd =0x49444543, len=327
25,810,865 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,471 UART:
192,817 UART: Running Caliptra ROM ...
194,013 UART:
603,576 UART: [state] CFI Enabled
616,817 UART: [state] LifecycleState = Unprovisioned
618,773 UART: [state] DebugLocked = No
621,370 UART: [state] WD Timer not started. Device not locked for debugging
625,187 UART: [kat] SHA2-256
804,803 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,579 UART: [kat] ++
816,106 UART: [kat] sha1
828,495 UART: [kat] SHA2-256
831,231 UART: [kat] SHA2-384
835,943 UART: [kat] SHA2-512-ACC
838,315 UART: [kat] ECC-384
3,280,961 UART: [kat] HMAC-384Kdf
3,294,265 UART: [kat] LMS
3,770,799 UART: [kat] --
3,773,442 UART: [cold-reset] ++
3,775,156 UART: [fht] FHT @ 0x50003400
3,785,707 UART: [idev] ++
3,786,278 UART: [idev] CDI.KEYID = 6
3,787,261 UART: [idev] SUBJECT.KEYID = 7
3,788,504 UART: [idev] UDS.KEYID = 0
3,789,454 ready_for_fw is high
3,789,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,612 UART: [idev] Erasing UDS.KEYID = 0
6,272,048 UART: [idev] Sha1 KeyId Algorithm
6,295,976 UART: [idev] --
6,302,178 UART: [ldev] ++
6,302,756 UART: [ldev] CDI.KEYID = 6
6,303,779 UART: [ldev] SUBJECT.KEYID = 5
6,304,885 UART: [ldev] AUTHORITY.KEYID = 7
6,306,168 UART: [ldev] FE.KEYID = 1
6,317,842 UART: [ldev] Erasing FE.KEYID = 1
8,797,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,193 UART: [ldev] --
10,592,246 UART: [fwproc] Wait for Commands...
10,595,256 UART: [fwproc] Recv command 0x46574c44
10,597,295 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,996 >>> mbox cmd response: success
15,023,563 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,024,594 UART: [afmc] ++
15,025,128 UART: [afmc] CDI.KEYID = 6
15,026,057 UART: [afmc] SUBJECT.KEYID = 7
15,027,179 UART: [afmc] AUTHORITY.KEYID = 5
17,070,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,164 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,201 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,818 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,716 UART: [afmc] --
18,870,094 UART: [cold-reset] --
18,872,015 UART: [state] Locking Datavault
18,876,293 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,990 UART: [state] Locking ICCM
18,879,190 UART: [exit] Launching FMC @ 0x40000130
18,887,606 UART:
18,887,857 UART: Running Caliptra FMC ...
18,888,916 UART:
18,889,079 UART: [state] CFI Enabled
18,897,080 UART: [fht] FMC Alias Private Key: 7
20,663,138 UART: [art] Extend RT PCRs Done
20,664,365 UART: [art] Lock RT PCRs Done
20,665,400 UART: [art] Populate DV Done
20,670,762 UART: [fht] FMC Alias Private Key: 7
20,672,268 UART: [art] Derive CDI
20,673,032 UART: [art] Store in slot 0x4
20,715,848 UART: [art] Derive Key Pair
20,716,851 UART: [art] Store priv key in slot 0x5
23,143,971 UART: [art] Derive Key Pair - Done
23,157,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,042 UART: [art] PUB.X = 7DAB352899D262CB0ED9F33496105808064DD5FA60B6D4FA673FC49EFAD16440C6F4864D835500C5F9FB5643370D29FA
24,872,293 UART: [art] PUB.Y = C40ADA144DA102A8A69C4F52880FA354BBC1D7CEF227E5D2423E337C3C03146A0405F3797F6C444EDB5D8AB905A275F5
24,879,565 UART: [art] SIG.R = 3F394F9E88598047E7E650E60D6C9E223EEF7F2FF1E4D40985049A6BF27EF83279BBF7FF9D4E3A921F769F19C9AE0125
24,886,978 UART: [art] SIG.S = 6F091DFA263C04464EFF5356370DC88D1D4B105A516A49AD47872525FD03BFCF321DAD47AF6B85ACBE815AFD2B8DEAED
25,865,864 UART: Caliptra RT
25,866,579 UART: [state] CFI Enabled
25,998,565 UART: [rt] RT listening for mailbox commands...
26,032,251 UART: [rt]cmd =0x49444543, len=327
26,041,573 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
3,780,350 ready_for_fw is high
3,780,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,782 >>> mbox cmd response: success
14,912,345 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
18,700,100 UART:
18,700,509 UART: Running Caliptra FMC ...
18,701,614 UART:
18,701,779 UART: [state] CFI Enabled
18,710,031 UART: [fht] FMC Alias Private Key: 7
20,476,068 UART: [art] Extend RT PCRs Done
20,477,317 UART: [art] Lock RT PCRs Done
20,479,054 UART: [art] Populate DV Done
20,484,451 UART: [fht] FMC Alias Private Key: 7
20,485,949 UART: [art] Derive CDI
20,486,715 UART: [art] Store in slot 0x4
20,529,042 UART: [art] Derive Key Pair
20,530,090 UART: [art] Store priv key in slot 0x5
22,957,147 UART: [art] Derive Key Pair - Done
22,969,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,966 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,477 UART: [art] PUB.X = 902BA736ADBB77002402C9D6ABE38782F2563085E9759A6D40EB1A68E14D2F6597540B6E6A7C174607948F25260BC710
24,684,688 UART: [art] PUB.Y = FB6AC31C43C54F453CA428C11B341D23D2F2ADA5E81C4B6D06652565BECECDD2ADBA5519A0825727D42BDF0E1B1A28E8
24,691,965 UART: [art] SIG.R = 18C82D7D1C093FDD06B65CA60BD97AA51F82E60B2C25004C360E5ABF20F65457FCE51CFD676202BFE56FE176378C2B69
24,699,365 UART: [art] SIG.S = DB13F9AAADC60EC9B8E3FF29E9065F269F834531862769A510D1AB82F737F1EF7C2C8D5C79B2FA6D815720A056DC9D39
25,678,165 UART: Caliptra RT
25,678,868 UART: [state] CFI Enabled
25,812,008 UART: [rt] RT listening for mailbox commands...
25,845,968 UART: [rt]cmd =0x49444543, len=327
25,855,123 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,054 UART:
192,434 UART: Running Caliptra ROM ...
193,622 UART:
193,774 UART: [state] CFI Enabled
264,932 UART: [state] LifecycleState = Unprovisioned
267,009 UART: [state] DebugLocked = No
269,618 UART: [state] WD Timer not started. Device not locked for debugging
273,374 UART: [kat] SHA2-256
463,239 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,973 UART: [kat] ++
474,516 UART: [kat] sha1
485,689 UART: [kat] SHA2-256
488,683 UART: [kat] SHA2-384
495,319 UART: [kat] SHA2-512-ACC
497,969 UART: [kat] ECC-384
2,945,672 UART: [kat] HMAC-384Kdf
2,972,123 UART: [kat] LMS
3,503,902 UART: [kat] --
3,507,824 UART: [cold-reset] ++
3,509,396 UART: [fht] FHT @ 0x50003400
3,521,376 UART: [idev] ++
3,522,143 UART: [idev] CDI.KEYID = 6
3,523,070 UART: [idev] SUBJECT.KEYID = 7
3,524,248 UART: [idev] UDS.KEYID = 0
3,525,171 ready_for_fw is high
3,525,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,332 UART: [idev] Erasing UDS.KEYID = 0
6,031,475 UART: [idev] Sha1 KeyId Algorithm
6,053,797 UART: [idev] --
6,057,472 UART: [ldev] ++
6,058,206 UART: [ldev] CDI.KEYID = 6
6,059,115 UART: [ldev] SUBJECT.KEYID = 5
6,060,271 UART: [ldev] AUTHORITY.KEYID = 7
6,061,500 UART: [ldev] FE.KEYID = 1
6,099,171 UART: [ldev] Erasing FE.KEYID = 1
8,604,373 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,990 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,386 UART: [ldev] --
10,413,384 UART: [fwproc] Wait for Commands...
10,416,445 UART: [fwproc] Recv command 0x46574c44
10,418,753 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,704 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,360 >>> mbox cmd response: success
15,138,264 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,139,293 UART: [afmc] ++
15,139,817 UART: [afmc] CDI.KEYID = 6
15,140,702 UART: [afmc] SUBJECT.KEYID = 7
15,141,718 UART: [afmc] AUTHORITY.KEYID = 5
17,213,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,303 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,591 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,455 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,256 UART: [afmc] --
19,012,855 UART: [cold-reset] --
19,016,116 UART: [state] Locking Datavault
19,022,558 UART: [state] Locking PCR0, PCR1 and PCR31
19,024,741 UART: [state] Locking ICCM
19,026,867 UART: [exit] Launching FMC @ 0x40000130
19,035,525 UART:
19,035,760 UART: Running Caliptra FMC ...
19,036,860 UART:
19,037,018 UART: [state] CFI Enabled
19,093,944 UART: [fht] FMC Alias Private Key: 7
20,860,282 UART: [art] Extend RT PCRs Done
20,861,527 UART: [art] Lock RT PCRs Done
20,862,960 UART: [art] Populate DV Done
20,868,377 UART: [fht] FMC Alias Private Key: 7
20,869,861 UART: [art] Derive CDI
20,870,617 UART: [art] Store in slot 0x4
20,926,828 UART: [art] Derive Key Pair
20,927,867 UART: [art] Store priv key in slot 0x5
23,389,760 UART: [art] Derive Key Pair - Done
23,402,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,047 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,561 UART: [art] PUB.X = 503F41F5DEC960D7177842D6E015CB224AB1BB554F2786ABBFC3635AAF22527BC11D991200B1876CDD68B7BF9B65C06A
25,124,835 UART: [art] PUB.Y = 5F140E4C36962F4B720F2C47232619F1D01138778B98D20B46D5353002B3204A0D1A34189665ED0A7B4AB00A4556FDD4
25,132,077 UART: [art] SIG.R = CF1E65583AA933B34181DD6F89D84A3E1196F2F6A14DF36FC84FE5B95CB1AE80D1149832B4E2CC063EBEEBF31D9065E0
25,139,422 UART: [art] SIG.S = 9468701ACDF6FCF5389963BC83EE3BF71FDCC37EB57A87044007E126F176EDB26AA7B69246D08FA4435CC227E06FCA1A
26,118,137 UART: Caliptra RT
26,118,825 UART: [state] CFI Enabled
26,300,454 UART: [rt] RT listening for mailbox commands...
26,334,555 UART: [rt]cmd =0x49444543, len=327
26,343,787 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,438,521 ready_for_fw is high
3,439,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,837,904 >>> mbox cmd response: success
15,299,272 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,136,769 UART:
19,137,193 UART: Running Caliptra FMC ...
19,138,328 UART:
19,138,492 UART: [state] CFI Enabled
19,202,188 UART: [fht] FMC Alias Private Key: 7
20,968,438 UART: [art] Extend RT PCRs Done
20,969,656 UART: [art] Lock RT PCRs Done
20,971,393 UART: [art] Populate DV Done
20,976,832 UART: [fht] FMC Alias Private Key: 7
20,978,377 UART: [art] Derive CDI
20,979,143 UART: [art] Store in slot 0x4
21,035,297 UART: [art] Derive Key Pair
21,036,293 UART: [art] Store priv key in slot 0x5
23,498,954 UART: [art] Derive Key Pair - Done
23,511,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,960 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,475 UART: [art] PUB.X = 165832557E0A61EEA5420D405945016EEB7669B8A94A7636EB24074A4F75869661467629793A80938BA1D5FF36BA956B
25,233,681 UART: [art] PUB.Y = 52300B2C9CF7EAEFDDB432C2A9541D14FA9878EF9042B736B00A73FB811E987A8BB71C9715005A52A46C435972B4A6BF
25,240,940 UART: [art] SIG.R = 3C6D74CD9BC2F7A2857185D2190A51E9F28080D7470E4371119B70855990E20AA31A6B76A1DFC94C74AB03BE217094C9
25,248,274 UART: [art] SIG.S = B846DA424DF52A0D334E8B6EC1DE0CF9CC3CD72D3E1C93918F7769FA5F56AA10B3A27DBC4C76D93AB6F339A35160537E
26,227,106 UART: Caliptra RT
26,227,816 UART: [state] CFI Enabled
26,407,764 UART: [rt] RT listening for mailbox commands...
26,441,664 UART: [rt]cmd =0x49444543, len=327
26,450,654 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,432 UART:
192,806 UART: Running Caliptra ROM ...
194,006 UART:
603,828 UART: [state] CFI Enabled
614,742 UART: [state] LifecycleState = Unprovisioned
617,102 UART: [state] DebugLocked = No
619,212 UART: [state] WD Timer not started. Device not locked for debugging
623,131 UART: [kat] SHA2-256
813,059 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,834 UART: [kat] ++
824,286 UART: [kat] sha1
835,660 UART: [kat] SHA2-256
838,744 UART: [kat] SHA2-384
844,949 UART: [kat] SHA2-512-ACC
847,534 UART: [kat] ECC-384
3,288,571 UART: [kat] HMAC-384Kdf
3,301,154 UART: [kat] LMS
3,833,014 UART: [kat] --
3,838,713 UART: [cold-reset] ++
3,840,721 UART: [fht] FHT @ 0x50003400
3,852,192 UART: [idev] ++
3,852,845 UART: [idev] CDI.KEYID = 6
3,853,800 UART: [idev] SUBJECT.KEYID = 7
3,855,044 UART: [idev] UDS.KEYID = 0
3,855,991 ready_for_fw is high
3,856,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,055 UART: [idev] Erasing UDS.KEYID = 0
6,326,413 UART: [idev] Sha1 KeyId Algorithm
6,348,884 UART: [idev] --
6,354,612 UART: [ldev] ++
6,355,351 UART: [ldev] CDI.KEYID = 6
6,356,262 UART: [ldev] SUBJECT.KEYID = 5
6,357,423 UART: [ldev] AUTHORITY.KEYID = 7
6,358,656 UART: [ldev] FE.KEYID = 1
6,371,682 UART: [ldev] Erasing FE.KEYID = 1
8,848,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,794 UART: [ldev] --
10,639,554 UART: [fwproc] Wait for Commands...
10,642,193 UART: [fwproc] Recv command 0x46574c44
10,644,505 UART: [fwproc] Recv'd Img size: 118548 bytes
14,136,696 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,212,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,274 >>> mbox cmd response: success
15,360,196 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
15,361,240 UART: [afmc] ++
15,361,767 UART: [afmc] CDI.KEYID = 6
15,362,653 UART: [afmc] SUBJECT.KEYID = 7
15,363,674 UART: [afmc] AUTHORITY.KEYID = 5
17,403,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,127,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,129,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,144,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,159,943 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,174,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,197,790 UART: [afmc] --
19,201,508 UART: [cold-reset] --
19,204,733 UART: [state] Locking Datavault
19,211,237 UART: [state] Locking PCR0, PCR1 and PCR31
19,213,393 UART: [state] Locking ICCM
19,215,497 UART: [exit] Launching FMC @ 0x40000130
19,224,177 UART:
19,224,415 UART: Running Caliptra FMC ...
19,225,518 UART:
19,225,687 UART: [state] CFI Enabled
19,233,584 UART: [fht] FMC Alias Private Key: 7
20,999,734 UART: [art] Extend RT PCRs Done
21,000,982 UART: [art] Lock RT PCRs Done
21,002,855 UART: [art] Populate DV Done
21,008,387 UART: [fht] FMC Alias Private Key: 7
21,010,096 UART: [art] Derive CDI
21,010,916 UART: [art] Store in slot 0x4
21,053,348 UART: [art] Derive Key Pair
21,054,379 UART: [art] Store priv key in slot 0x5
23,481,501 UART: [art] Derive Key Pair - Done
23,494,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,946 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,462 UART: [art] PUB.X = DF6E231E41492AD13F69D53DCD3175F0593FEE81A8FD25AED8DB4C239A5136EE05D8075F9091817BF2F111D842808DAA
25,209,681 UART: [art] PUB.Y = 399C78EB1A203556B761AC4B5EE517F00AB13D958E0AEECA6710C77DC564E17F1AB687CD87840C24B9699A23F4F45115
25,216,930 UART: [art] SIG.R = D9ED756C1D5EE2B69479F5968432AF05733A7215BC6296AD859437B4B39E8A6093D63363A337E3ACA0ED57366CFF021B
25,224,348 UART: [art] SIG.S = 76D26B8B76D7FC3DDDDEF523858C9172807D15B723F788B55554366F7224579568D94D499E30135B771FCA882F1DC01C
26,203,387 UART: Caliptra RT
26,204,101 UART: [state] CFI Enabled
26,336,864 UART: [rt] RT listening for mailbox commands...
26,370,929 UART: [rt]cmd =0x49444543, len=327
26,379,883 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
3,753,651 ready_for_fw is high
3,754,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,030,775 >>> mbox cmd response: success
15,494,813 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
19,284,542 UART:
19,284,954 UART: Running Caliptra FMC ...
19,286,108 UART:
19,286,273 UART: [state] CFI Enabled
19,294,190 UART: [fht] FMC Alias Private Key: 7
21,061,019 UART: [art] Extend RT PCRs Done
21,062,247 UART: [art] Lock RT PCRs Done
21,064,211 UART: [art] Populate DV Done
21,069,659 UART: [fht] FMC Alias Private Key: 7
21,071,204 UART: [art] Derive CDI
21,072,024 UART: [art] Store in slot 0x4
21,114,785 UART: [art] Derive Key Pair
21,115,790 UART: [art] Store priv key in slot 0x5
23,542,961 UART: [art] Derive Key Pair - Done
23,556,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,264,354 UART: [art] PUB.X = 6AECED284AB134FDB19CE5E4C9609103698DBC4D9D135ED5506EE73C6F44DF85163DA607FD6F29AEA677B76C408091CE
25,271,633 UART: [art] PUB.Y = 13C516115D4439C8D490BBFF1531A5AC501467D97E55F63596889C576F533D3D7AA03D68CC6DA0D62902E842F6705D0F
25,278,880 UART: [art] SIG.R = E6303131A8347A9F3CD68418ACAEB64F93EBD51DE449D6B6471C6F7EB4C410C3C7209615D329BD10EC49F81C3E3526B1
25,286,243 UART: [art] SIG.S = 9E9986B97F1374619AC3961F89E9626B36B907EA9C52E04C9B05AB92822B2314BF3ABBACA8A3F746A9D67FD63A508814
26,265,328 UART: Caliptra RT
26,266,015 UART: [state] CFI Enabled
26,399,032 UART: [rt] RT listening for mailbox commands...
26,433,141 UART: [rt]cmd =0x49444543, len=327
26,442,271 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
85,895 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,445 UART: [kat] SHA2-256
881,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,491 UART: [kat] ++
885,643 UART: [kat] sha1
889,871 UART: [kat] SHA2-256
891,809 UART: [kat] SHA2-384
894,758 UART: [kat] SHA2-512-ACC
896,659 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,475,947 UART: [cold-reset] ++
1,476,439 UART: [fht] Storing FHT @ 0x50003400
1,479,312 UART: [idev] ++
1,479,480 UART: [idev] CDI.KEYID = 6
1,479,840 UART: [idev] SUBJECT.KEYID = 7
1,480,264 UART: [idev] UDS.KEYID = 0
1,480,609 ready_for_fw is high
1,480,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,310 UART: [idev] Erasing UDS.KEYID = 0
1,505,088 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,742 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,109 UART: [ldev] Erasing FE.KEYID = 1
1,546,168 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,646 UART: [ldev] --
1,585,047 UART: [fwproc] Waiting for Commands...
1,585,744 UART: [fwproc] Received command 0x46574c44
1,586,535 UART: [fwproc] Received Image of size 118548 bytes
2,930,321 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,885 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,103 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,330 >>> mbox cmd response: success
3,129,330 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,130,476 UART: [afmc] ++
3,130,644 UART: [afmc] CDI.KEYID = 6
3,131,006 UART: [afmc] SUBJECT.KEYID = 7
3,131,431 UART: [afmc] AUTHORITY.KEYID = 5
3,165,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,181,908 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,397 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,280 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,199,963 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,695 UART: [afmc] --
3,208,795 UART: [cold-reset] --
3,209,745 UART: [state] Locking Datavault
3,210,728 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,332 UART: [state] Locking ICCM
3,211,908 UART: [exit] Launching FMC @ 0x40000130
3,217,238 UART:
3,217,254 UART: Running Caliptra FMC ...
3,217,662 UART:
3,217,716 UART: [state] CFI Enabled
3,228,238 UART: [fht] FMC Alias Private Key: 7
3,348,164 UART: [art] Extend RT PCRs Done
3,348,592 UART: [art] Lock RT PCRs Done
3,349,710 UART: [art] Populate DV Done
3,358,061 UART: [fht] FMC Alias Private Key: 7
3,359,079 UART: [art] Derive CDI
3,359,359 UART: [art] Store in slot 0x4
3,445,099 UART: [art] Derive Key Pair
3,445,459 UART: [art] Store priv key in slot 0x5
3,459,346 UART: [art] Derive Key Pair - Done
3,474,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,353 UART: [art] PUB.X = E241D69B9E039F7BCDFC278DBDDE36BBDB194B090DFD66A73B9223FB9406311ABB043A84E0530119320B9156856C49D2
3,497,110 UART: [art] PUB.Y = 02F3A837FF8F4F8B4FAB64E260AB9DB68B4C0474E62A7EFECD66BC7C7D6B87E5B81B53942F7AF7D51646E5CB4D025773
3,504,069 UART: [art] SIG.R = CD85CB38B1DF2CB4E14247DF1F18040CE2BD1949AA0A43F0093DC9BED697880C8E0FE4D7B0244DA6FAD0B74C4EE4470B
3,510,840 UART: [art] SIG.S = 5FA487D631B4C763D15D81321B296BA5C55B2FC8E252C206A222FF571F9B586BC1292BA6EDF88EFDCB003CDB1F6CA04F
3,534,643 UART: Caliptra RT
3,534,894 UART: [state] CFI Enabled
3,655,082 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,689 UART: [rt]cmd =0x49444543, len=327
3,696,059 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,461 ready_for_fw is high
1,362,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,334 >>> mbox cmd response: success
2,980,334 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,042,245 UART:
3,042,261 UART: Running Caliptra FMC ...
3,042,669 UART:
3,042,723 UART: [state] CFI Enabled
3,053,045 UART: [fht] FMC Alias Private Key: 7
3,171,807 UART: [art] Extend RT PCRs Done
3,172,235 UART: [art] Lock RT PCRs Done
3,173,725 UART: [art] Populate DV Done
3,181,832 UART: [fht] FMC Alias Private Key: 7
3,182,848 UART: [art] Derive CDI
3,183,128 UART: [art] Store in slot 0x4
3,269,104 UART: [art] Derive Key Pair
3,269,464 UART: [art] Store priv key in slot 0x5
3,282,715 UART: [art] Derive Key Pair - Done
3,297,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,510 UART: [art] PUB.X = 9700A3E1E71342D3EFCF7F8BC076D688CC55D96B6B48FED1AFA0C70C05FC89AEA37EF0305288CAE08922F4D3E88EC48C
3,320,272 UART: [art] PUB.Y = 8395B125DAAFE7F47EC4C724F6797C2AC2070A2C6D8B80BAA8BCE9F364BE6095441D60DF71694524829828C0BCF01448
3,327,222 UART: [art] SIG.R = BC7B08A0B6D198B852E9D3061499D8DCC48CE10F83BEB967ECE40BC2B6AFD505A86240F47B1B7979E9133FEDA223A936
3,333,991 UART: [art] SIG.S = CB4909A2C5CB0FD1AFC35DAFA7A4122E6C970E2BC069D41C7833C407EE52B8DD7B1E6DAA9C6B240C794B141ADB9CE06C
3,357,480 UART: Caliptra RT
3,357,731 UART: [state] CFI Enabled
3,477,668 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,211 UART: [rt]cmd =0x49444543, len=327
3,518,816 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,400 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,952 UART: [kat] SHA2-256
881,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,998 UART: [kat] ++
886,150 UART: [kat] sha1
890,200 UART: [kat] SHA2-256
892,138 UART: [kat] SHA2-384
894,881 UART: [kat] SHA2-512-ACC
896,782 UART: [kat] ECC-384
902,611 UART: [kat] HMAC-384Kdf
907,089 UART: [kat] LMS
1,475,285 UART: [kat] --
1,476,132 UART: [cold-reset] ++
1,476,470 UART: [fht] Storing FHT @ 0x50003400
1,479,475 UART: [idev] ++
1,479,643 UART: [idev] CDI.KEYID = 6
1,480,003 UART: [idev] SUBJECT.KEYID = 7
1,480,427 UART: [idev] UDS.KEYID = 0
1,480,772 ready_for_fw is high
1,480,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,273 UART: [idev] Erasing UDS.KEYID = 0
1,504,953 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,559 UART: [idev] --
1,514,584 UART: [ldev] ++
1,514,752 UART: [ldev] CDI.KEYID = 6
1,515,115 UART: [ldev] SUBJECT.KEYID = 5
1,515,541 UART: [ldev] AUTHORITY.KEYID = 7
1,516,004 UART: [ldev] FE.KEYID = 1
1,521,168 UART: [ldev] Erasing FE.KEYID = 1
1,546,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,629 UART: [ldev] --
1,586,140 UART: [fwproc] Waiting for Commands...
1,586,825 UART: [fwproc] Received command 0x46574c44
1,587,616 UART: [fwproc] Received Image of size 118548 bytes
2,933,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,284 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,869 >>> mbox cmd response: success
3,131,869 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,132,935 UART: [afmc] ++
3,133,103 UART: [afmc] CDI.KEYID = 6
3,133,465 UART: [afmc] SUBJECT.KEYID = 7
3,133,890 UART: [afmc] AUTHORITY.KEYID = 5
3,168,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,733 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,105 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,788 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,872 UART: [afmc] --
3,211,776 UART: [cold-reset] --
3,212,686 UART: [state] Locking Datavault
3,213,745 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,349 UART: [state] Locking ICCM
3,214,999 UART: [exit] Launching FMC @ 0x40000130
3,220,329 UART:
3,220,345 UART: Running Caliptra FMC ...
3,220,753 UART:
3,220,896 UART: [state] CFI Enabled
3,231,812 UART: [fht] FMC Alias Private Key: 7
3,351,374 UART: [art] Extend RT PCRs Done
3,351,802 UART: [art] Lock RT PCRs Done
3,353,384 UART: [art] Populate DV Done
3,361,671 UART: [fht] FMC Alias Private Key: 7
3,362,663 UART: [art] Derive CDI
3,362,943 UART: [art] Store in slot 0x4
3,448,677 UART: [art] Derive Key Pair
3,449,037 UART: [art] Store priv key in slot 0x5
3,462,864 UART: [art] Derive Key Pair - Done
3,477,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,013 UART: [art] PUB.X = 58AF8BA4D3A339B7E0528AB6137A8A7F68FD3B39B233E1D13F8F93542980A938FF5DC5ADA2B8FEF516687E2BD999C020
3,499,795 UART: [art] PUB.Y = 36EE2367D1143EB44A4672EF908C7360E86BBE7FD27BC591D1C3D435F7EB6274B6DA8E1DF9173FCD7AB621C2225FA068
3,506,757 UART: [art] SIG.R = C4C04ABDA9BC2E499671740E80BE127B6EF5E72FF5CB01D141ACA1B959DDAF9296E20F84DE7387EF29F2072E14000D36
3,513,504 UART: [art] SIG.S = CC7CF4713955839247D1B2D41826FB153391FA6B95E0D2896065DBD74D018E46CC2CB07D04690F3D4992A8225EF25CDC
3,537,475 UART: Caliptra RT
3,537,818 UART: [state] CFI Enabled
3,657,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,576 UART: [rt]cmd =0x49444543, len=327
3,698,964 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,374 ready_for_fw is high
1,363,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,515 >>> mbox cmd response: success
2,980,515 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
3,041,916 UART:
3,041,932 UART: Running Caliptra FMC ...
3,042,340 UART:
3,042,483 UART: [state] CFI Enabled
3,052,841 UART: [fht] FMC Alias Private Key: 7
3,171,221 UART: [art] Extend RT PCRs Done
3,171,649 UART: [art] Lock RT PCRs Done
3,173,197 UART: [art] Populate DV Done
3,181,310 UART: [fht] FMC Alias Private Key: 7
3,182,254 UART: [art] Derive CDI
3,182,534 UART: [art] Store in slot 0x4
3,268,430 UART: [art] Derive Key Pair
3,268,790 UART: [art] Store priv key in slot 0x5
3,282,173 UART: [art] Derive Key Pair - Done
3,296,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,308 UART: [art] PUB.X = B39D535AEE5A08B516FB43DC91781AA1C7D09D17BD04A1DAD5366DDAA51D36436C7F28243020A6F18484B59EAE8F715A
3,320,084 UART: [art] PUB.Y = 71FB35CA1F857BB4FE35D29FBC3DD92F76B0CB31A5F2435263B5E514D6A9E9C31FA9D6774F422E5E57379138C7D851B0
3,327,044 UART: [art] SIG.R = 0A13661802EBBB806F493E16B1C5C079ABE550BD89918A1A5213D4B5C84F0C360B058AB091848BE6AD4F67D74796E81D
3,333,803 UART: [art] SIG.S = EAF22E2B3FDCD39EC74AD295A6C8EFD900D576591CA274FB20B3876909FCC69CA282F73C0E283C4BAF9EDF90C3D4CC9F
3,357,683 UART: Caliptra RT
3,358,026 UART: [state] CFI Enabled
3,478,014 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,487 UART: [rt]cmd =0x49444543, len=327
3,519,021 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
891,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,370 UART: [kat] ++
895,522 UART: [kat] sha1
899,950 UART: [kat] SHA2-256
901,890 UART: [kat] SHA2-384
904,495 UART: [kat] SHA2-512-ACC
906,396 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,581 UART: [kat] LMS
1,168,893 UART: [kat] --
1,169,744 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 ready_for_fw is high
1,174,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,951 UART: [idev] Erasing UDS.KEYID = 0
1,199,013 UART: [idev] Sha1 KeyId Algorithm
1,207,757 UART: [idev] --
1,208,860 UART: [ldev] ++
1,209,028 UART: [ldev] CDI.KEYID = 6
1,209,392 UART: [ldev] SUBJECT.KEYID = 5
1,209,819 UART: [ldev] AUTHORITY.KEYID = 7
1,210,282 UART: [ldev] FE.KEYID = 1
1,215,610 UART: [ldev] Erasing FE.KEYID = 1
1,242,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,104 UART: [ldev] --
1,281,559 UART: [fwproc] Wait for Commands...
1,282,288 UART: [fwproc] Recv command 0x46574c44
1,283,021 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,738 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,525 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,983 >>> mbox cmd response: success
2,825,983 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,826,997 UART: [afmc] ++
2,827,165 UART: [afmc] CDI.KEYID = 6
2,827,528 UART: [afmc] SUBJECT.KEYID = 7
2,827,954 UART: [afmc] AUTHORITY.KEYID = 5
2,863,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,955 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,537 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,272 UART: [afmc] --
2,907,183 UART: [cold-reset] --
2,908,029 UART: [state] Locking Datavault
2,909,272 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,876 UART: [state] Locking ICCM
2,910,522 UART: [exit] Launching FMC @ 0x40000130
2,915,852 UART:
2,915,868 UART: Running Caliptra FMC ...
2,916,276 UART:
2,916,330 UART: [state] CFI Enabled
2,926,454 UART: [fht] FMC Alias Private Key: 7
3,045,840 UART: [art] Extend RT PCRs Done
3,046,268 UART: [art] Lock RT PCRs Done
3,047,656 UART: [art] Populate DV Done
3,056,083 UART: [fht] FMC Alias Private Key: 7
3,057,201 UART: [art] Derive CDI
3,057,481 UART: [art] Store in slot 0x4
3,143,216 UART: [art] Derive Key Pair
3,143,576 UART: [art] Store priv key in slot 0x5
3,156,506 UART: [art] Derive Key Pair - Done
3,171,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,796 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,561 UART: [art] PUB.X = 33DAEEC0E7448884346417A40C4500FC81D0CE73515E82B6A2374D24AA13DE9558E7DA27E5D7C752E3FAACAF71195744
3,194,312 UART: [art] PUB.Y = 9A54AE38A697248A210E43D32FF49AB84B01A470407C0CBB4A810480AC2DC30760A13342CD271B3D830CEB0045A33923
3,201,222 UART: [art] SIG.R = AD28702E5BA8D51CA1A036FAF1F65EE25ABC846D2B21425ED1CD118CFAE16BDC227F155C41507A6940F98723F0821A6D
3,208,006 UART: [art] SIG.S = FD8F26B0472AF3931E64E67EE3F9B2DD4CF5B0F1204C07A339D0696DF65CA239B477697E7E747B045322F7DB6C249802
3,231,855 UART: Caliptra RT
3,232,106 UART: [state] CFI Enabled
3,351,076 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,935 UART: [rt]cmd =0x49444543, len=327
3,392,314 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,688 ready_for_fw is high
1,059,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,146 >>> mbox cmd response: success
2,677,146 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,738,747 UART:
2,738,763 UART: Running Caliptra FMC ...
2,739,171 UART:
2,739,225 UART: [state] CFI Enabled
2,749,703 UART: [fht] FMC Alias Private Key: 7
2,868,613 UART: [art] Extend RT PCRs Done
2,869,041 UART: [art] Lock RT PCRs Done
2,870,373 UART: [art] Populate DV Done
2,878,696 UART: [fht] FMC Alias Private Key: 7
2,879,692 UART: [art] Derive CDI
2,879,972 UART: [art] Store in slot 0x4
2,965,583 UART: [art] Derive Key Pair
2,965,943 UART: [art] Store priv key in slot 0x5
2,979,387 UART: [art] Derive Key Pair - Done
2,994,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,718 UART: [art] PUB.X = 71A876B3C863FD6769585634925FF0A1958591D8121C65CB8DD501CEC69A1B44222C2B861C339BD685F05012C1B8D80D
3,017,478 UART: [art] PUB.Y = 631603CD257B7D13DF88434B18503929DAA1E3FAE15746F4C2B991EA929DDDBA7EB189D4DDB3253D308F4A16D598331D
3,024,433 UART: [art] SIG.R = E7B3612CBA8163C10C080C0AA2540140A1DAD391077DBB5602936820FFF20B64B2A5CA2B53901FCCD790C3101B46D98C
3,031,185 UART: [art] SIG.S = E07DBC9A0801929D2E158AA98132FDF926FEF5FBDB1803226F81D621990524CFD170FC98F57291900784175613E9DB43
3,054,740 UART: Caliptra RT
3,054,991 UART: [state] CFI Enabled
3,175,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,514 UART: [rt]cmd =0x49444543, len=327
3,216,965 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,554 UART: [state] WD Timer not started. Device not locked for debugging
87,879 UART: [kat] SHA2-256
891,429 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,533 UART: [kat] ++
895,685 UART: [kat] sha1
899,879 UART: [kat] SHA2-256
901,819 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,326 UART: [kat] HMAC-384Kdf
920,946 UART: [kat] LMS
1,169,258 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,784 UART: [idev] Sha1 KeyId Algorithm
1,208,534 UART: [idev] --
1,209,445 UART: [ldev] ++
1,209,613 UART: [ldev] CDI.KEYID = 6
1,209,977 UART: [ldev] SUBJECT.KEYID = 5
1,210,404 UART: [ldev] AUTHORITY.KEYID = 7
1,210,867 UART: [ldev] FE.KEYID = 1
1,216,013 UART: [ldev] Erasing FE.KEYID = 1
1,242,348 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,836 UART: [fwproc] Wait for Commands...
1,282,657 UART: [fwproc] Recv command 0x46574c44
1,283,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,384 >>> mbox cmd response: success
2,824,384 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,825,512 UART: [afmc] ++
2,825,680 UART: [afmc] CDI.KEYID = 6
2,826,043 UART: [afmc] SUBJECT.KEYID = 7
2,826,469 UART: [afmc] AUTHORITY.KEYID = 5
2,862,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,583 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,284 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,013 UART: [afmc] --
2,905,956 UART: [cold-reset] --
2,906,726 UART: [state] Locking Datavault
2,907,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,337 UART: [state] Locking ICCM
2,908,883 UART: [exit] Launching FMC @ 0x40000130
2,914,213 UART:
2,914,229 UART: Running Caliptra FMC ...
2,914,637 UART:
2,914,780 UART: [state] CFI Enabled
2,925,456 UART: [fht] FMC Alias Private Key: 7
3,044,500 UART: [art] Extend RT PCRs Done
3,044,928 UART: [art] Lock RT PCRs Done
3,046,660 UART: [art] Populate DV Done
3,054,937 UART: [fht] FMC Alias Private Key: 7
3,056,031 UART: [art] Derive CDI
3,056,311 UART: [art] Store in slot 0x4
3,141,980 UART: [art] Derive Key Pair
3,142,340 UART: [art] Store priv key in slot 0x5
3,155,570 UART: [art] Derive Key Pair - Done
3,170,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,737 UART: [art] PUB.X = FDF16D739F223F1D2D58B4A5133AA5A70724B24D8C8814810ADEDA584C3914B52D3C65EE4A09590B1FD2C7B7D7634BC9
3,193,505 UART: [art] PUB.Y = E810209557C7EC7EB127E3A0BCE418462CE1A19C4D24925F95997A74F6FBB642DFE34E3267179F6BCFE095642A929625
3,200,457 UART: [art] SIG.R = 15BDB23CA514B468D2894BDFF65A3724EB49E154A1A4F1D7D359E81D60CBD47677B5A825F640E616F5750A86324F68D9
3,207,228 UART: [art] SIG.S = FAE1965F658DD6993AE92CF7D7CBB833BBC65B0C3185096210FB9FC11EAFA82991A951A3280A705DB1F4E8675388F0FF
3,230,867 UART: Caliptra RT
3,231,210 UART: [state] CFI Enabled
3,350,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,454 UART: [rt]cmd =0x49444543, len=327
3,391,859 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,347 ready_for_fw is high
1,059,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,119 >>> mbox cmd response: success
2,679,119 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,741,458 UART:
2,741,474 UART: Running Caliptra FMC ...
2,741,882 UART:
2,742,025 UART: [state] CFI Enabled
2,752,749 UART: [fht] FMC Alias Private Key: 7
2,871,601 UART: [art] Extend RT PCRs Done
2,872,029 UART: [art] Lock RT PCRs Done
2,873,599 UART: [art] Populate DV Done
2,881,736 UART: [fht] FMC Alias Private Key: 7
2,882,760 UART: [art] Derive CDI
2,883,040 UART: [art] Store in slot 0x4
2,968,659 UART: [art] Derive Key Pair
2,969,019 UART: [art] Store priv key in slot 0x5
2,982,763 UART: [art] Derive Key Pair - Done
2,997,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,254 UART: [art] PUB.X = C80227D43B423B887898D1BB3A024984C82ED0463DE5B6A8FE9324E4A289B7D491999E735B930393FFE34D09C32B2B5F
3,020,012 UART: [art] PUB.Y = 4D60B65F692EDEB3DB67990FF357A972851C881F354B0E706AA46AE331FBAEBA1D1B534F1F09FDFCDDA06F445A7DDB17
3,026,975 UART: [art] SIG.R = F5D026286A8A0203E39A4FDA81390749D29A1AB8D5220F45C8F5AFF7CA7DA32B85945405531A46316B5C4301170D709B
3,033,722 UART: [art] SIG.S = 4601F01FD3845111F692B5232F2FD0BA46FA870F9CE6EA5403B62D6E4AC0F9FC904B3D949A1F35A18642E1C94DF4542D
3,057,389 UART: Caliptra RT
3,057,732 UART: [state] CFI Enabled
3,176,979 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,704 UART: [rt]cmd =0x49444543, len=327
3,218,071 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,848 UART: [kat] SHA2-256
893,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,623 UART: [kat] ++
897,775 UART: [kat] sha1
902,013 UART: [kat] SHA2-256
903,953 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,172,125 UART: [cold-reset] ++
1,172,681 UART: [fht] FHT @ 0x50003400
1,175,460 UART: [idev] ++
1,175,628 UART: [idev] CDI.KEYID = 6
1,175,988 UART: [idev] SUBJECT.KEYID = 7
1,176,412 UART: [idev] UDS.KEYID = 0
1,176,757 ready_for_fw is high
1,176,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,472 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,569 UART: [idev] --
1,210,711 UART: [ldev] ++
1,210,879 UART: [ldev] CDI.KEYID = 6
1,211,242 UART: [ldev] SUBJECT.KEYID = 5
1,211,668 UART: [ldev] AUTHORITY.KEYID = 7
1,212,131 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,452 UART: [fwproc] Recv command 0x46574c44
1,284,180 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,253 >>> mbox cmd response: success
2,827,253 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,828,405 UART: [afmc] ++
2,828,573 UART: [afmc] CDI.KEYID = 6
2,828,935 UART: [afmc] SUBJECT.KEYID = 7
2,829,360 UART: [afmc] AUTHORITY.KEYID = 5
2,864,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,692 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,440 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,149 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,032 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,733 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,499 UART: [afmc] --
2,907,433 UART: [cold-reset] --
2,907,999 UART: [state] Locking Datavault
2,909,322 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,926 UART: [state] Locking ICCM
2,910,518 UART: [exit] Launching FMC @ 0x40000130
2,915,848 UART:
2,915,864 UART: Running Caliptra FMC ...
2,916,272 UART:
2,916,326 UART: [state] CFI Enabled
2,926,714 UART: [fht] FMC Alias Private Key: 7
3,046,142 UART: [art] Extend RT PCRs Done
3,046,570 UART: [art] Lock RT PCRs Done
3,048,196 UART: [art] Populate DV Done
3,056,315 UART: [fht] FMC Alias Private Key: 7
3,057,297 UART: [art] Derive CDI
3,057,577 UART: [art] Store in slot 0x4
3,143,530 UART: [art] Derive Key Pair
3,143,890 UART: [art] Store priv key in slot 0x5
3,157,426 UART: [art] Derive Key Pair - Done
3,172,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,762 UART: [art] PUB.X = 6BF592407E5423A86C0E8F40D446BE7D0724C04E38FAD903632FBFDEE48D4863D0275C9BB9533CC5B53D40957FFDD186
3,195,531 UART: [art] PUB.Y = 203576807B9B64E4F32545862FBD035DA10298CBC0BFC59F6279E10E9D7B123CB05EFFD12AB2A94E96C469AD54520B7D
3,202,477 UART: [art] SIG.R = 0FC4094F4C419D69EF0B23F1EA2C4DD63D2C17DD6CDABE782B9D4507E4E1DB3A625CCF38773A4A99F5F6FD7FFE28B1FC
3,209,263 UART: [art] SIG.S = DA2CE5935A6683396C5E5EFEC778E20B4EE91694827E62D0EF8ED800D38CB835B60564A8B1AE372D8368E3698D3D16AA
3,233,375 UART: Caliptra RT
3,233,626 UART: [state] CFI Enabled
3,352,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,246 UART: [rt]cmd =0x49444543, len=327
3,393,805 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,085 ready_for_fw is high
1,060,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,752 >>> mbox cmd response: success
2,678,752 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,741,515 UART:
2,741,531 UART: Running Caliptra FMC ...
2,741,939 UART:
2,741,993 UART: [state] CFI Enabled
2,752,263 UART: [fht] FMC Alias Private Key: 7
2,871,623 UART: [art] Extend RT PCRs Done
2,872,051 UART: [art] Lock RT PCRs Done
2,873,399 UART: [art] Populate DV Done
2,881,820 UART: [fht] FMC Alias Private Key: 7
2,882,988 UART: [art] Derive CDI
2,883,268 UART: [art] Store in slot 0x4
2,968,819 UART: [art] Derive Key Pair
2,969,179 UART: [art] Store priv key in slot 0x5
2,982,701 UART: [art] Derive Key Pair - Done
2,997,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,463 UART: [art] PUB.X = E96F04AEB4BAF9BB2450EB44C1BF4E76F120A1A26145646D63984685A23002C4FC94B6F791C4C92C476D313BDF956D36
3,020,233 UART: [art] PUB.Y = B548DC4EEB2988E3550F1B00B8F328FF76693B5039353C195DCCB8397AD0786708F12B9D0EB01338CC422BFE1A0EF288
3,027,155 UART: [art] SIG.R = AE2D10080CFB7E3B8B3F355A668FA6A38BE6AA0F1FE6F23558381A2312978CF07E739D68FC24DDF10BDD2F106D13D883
3,033,927 UART: [art] SIG.S = 591C57FC6108E13477029EB354CCABE19988C0C2DA0D246C69E5123D8DC97C855F7C302D16233CD7E23B09057E5D8FA3
3,056,952 UART: Caliptra RT
3,057,203 UART: [state] CFI Enabled
3,177,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,897 UART: [rt]cmd =0x49444543, len=327
3,218,369 >>> mbox cmd response data (356 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,054 UART: [kat] SHA2-256
903,994 UART: [kat] SHA2-384
906,797 UART: [kat] SHA2-512-ACC
908,698 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
923,003 UART: [kat] LMS
1,171,331 UART: [kat] --
1,172,376 UART: [cold-reset] ++
1,172,890 UART: [fht] FHT @ 0x50003400
1,175,555 UART: [idev] ++
1,175,723 UART: [idev] CDI.KEYID = 6
1,176,083 UART: [idev] SUBJECT.KEYID = 7
1,176,507 UART: [idev] UDS.KEYID = 0
1,176,852 ready_for_fw is high
1,176,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,805 UART: [idev] Erasing UDS.KEYID = 0
1,202,116 UART: [idev] Sha1 KeyId Algorithm
1,210,462 UART: [idev] --
1,211,444 UART: [ldev] ++
1,211,612 UART: [ldev] CDI.KEYID = 6
1,211,975 UART: [ldev] SUBJECT.KEYID = 5
1,212,401 UART: [ldev] AUTHORITY.KEYID = 7
1,212,864 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,243,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,648 UART: [ldev] --
1,282,997 UART: [fwproc] Wait for Commands...
1,283,729 UART: [fwproc] Recv command 0x46574c44
1,284,457 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,921 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,170 >>> mbox cmd response: success
2,828,170 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,829,246 UART: [afmc] ++
2,829,414 UART: [afmc] CDI.KEYID = 6
2,829,776 UART: [afmc] SUBJECT.KEYID = 7
2,830,201 UART: [afmc] AUTHORITY.KEYID = 5
2,865,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,203 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,904 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,826 UART: [afmc] --
2,908,856 UART: [cold-reset] --
2,909,604 UART: [state] Locking Datavault
2,910,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,319 UART: [state] Locking ICCM
2,911,913 UART: [exit] Launching FMC @ 0x40000130
2,917,243 UART:
2,917,259 UART: Running Caliptra FMC ...
2,917,667 UART:
2,917,810 UART: [state] CFI Enabled
2,928,342 UART: [fht] FMC Alias Private Key: 7
3,048,142 UART: [art] Extend RT PCRs Done
3,048,570 UART: [art] Lock RT PCRs Done
3,049,958 UART: [art] Populate DV Done
3,058,099 UART: [fht] FMC Alias Private Key: 7
3,059,087 UART: [art] Derive CDI
3,059,367 UART: [art] Store in slot 0x4
3,144,930 UART: [art] Derive Key Pair
3,145,290 UART: [art] Store priv key in slot 0x5
3,159,544 UART: [art] Derive Key Pair - Done
3,174,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,749 UART: [art] PUB.X = DEEC6D8B7827BEB29FBE4D33178CB25D40E88DBB1A8D406BFDBD55700E4708A786A4805FBC2D6390D450C0D06F75AE57
3,197,531 UART: [art] PUB.Y = 29E4F73B6754C6B12867B93ABCA9667917760DF66713CC8A91AA328247C07CCC2405589689F93ECEBECE5AE57AE70950
3,204,476 UART: [art] SIG.R = BD1AD3729F4526FC59027396E301A408F15A7DF56692E030ACC27B1E90B57BB15ACBC2F0320C3D85EEFE332EFE4735C0
3,211,246 UART: [art] SIG.S = D0EA4278BCC278D28A8C1A13B4B10CFB04775308BFFD76075D71F45FBE26F82FD14AC4263B5FF36CA32ABF2DAC57350C
3,235,035 UART: Caliptra RT
3,235,378 UART: [state] CFI Enabled
3,355,574 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,947 UART: [rt]cmd =0x49444543, len=327
3,396,528 >>> mbox cmd response data (358 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,704 ready_for_fw is high
1,060,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,601 >>> mbox cmd response: success
2,681,601 <<< Executing mbox cmd 0x49444543 (327 bytes) from SoC
2,744,488 UART:
2,744,504 UART: Running Caliptra FMC ...
2,744,912 UART:
2,745,055 UART: [state] CFI Enabled
2,755,947 UART: [fht] FMC Alias Private Key: 7
2,875,381 UART: [art] Extend RT PCRs Done
2,875,809 UART: [art] Lock RT PCRs Done
2,877,621 UART: [art] Populate DV Done
2,885,914 UART: [fht] FMC Alias Private Key: 7
2,887,080 UART: [art] Derive CDI
2,887,360 UART: [art] Store in slot 0x4
2,972,789 UART: [art] Derive Key Pair
2,973,149 UART: [art] Store priv key in slot 0x5
2,986,943 UART: [art] Derive Key Pair - Done
3,001,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,693 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,458 UART: [art] PUB.X = 1F6192D39EBDC1158942562AD45EF9929F9D31597639CC51B0A3288AA7F455A12B5A4E996EDD530F7E9B37FAEB3AB12E
3,025,235 UART: [art] PUB.Y = 66A76EB8C1D21F67118968B19BBE4EF62789EDCC1B378DC6E7B9273A2790177A2D2912F3336D1BCB4131750B4930D6DB
3,032,186 UART: [art] SIG.R = C857C8C56B3D5CA08F2DA6254A1C66481E290C275EDE0DDD709B06A0AF5BC5BCB421D99E979F89E655B5264A5996A4B0
3,038,959 UART: [art] SIG.S = 2D4AF982C4AA2CFE632C55165E2569AE5D059F5ECF7E2B28CF4FDBB773DBB350434B47F25898895A1FABE0D6676E28DF
3,062,654 UART: Caliptra RT
3,062,997 UART: [state] CFI Enabled
3,183,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,215,935 UART: [rt]cmd =0x49444543, len=327
3,224,414 >>> mbox cmd response data (357 bytes)
test test_certs::test_idev_id_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_certs::test_idev_id_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,102 UART:
192,474 UART: Running Caliptra ROM ...
193,672 UART:
193,826 UART: [state] CFI Enabled
266,495 UART: [state] LifecycleState = Unprovisioned
268,424 UART: [state] DebugLocked = No
271,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,189 UART: [kat] SHA2-256
445,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,373 UART: [kat] ++
456,922 UART: [kat] sha1
466,592 UART: [kat] SHA2-256
469,311 UART: [kat] SHA2-384
475,591 UART: [kat] SHA2-512-ACC
477,958 UART: [kat] ECC-384
2,770,175 UART: [kat] HMAC-384Kdf
2,801,008 UART: [kat] LMS
3,991,282 UART: [kat] --
3,994,093 UART: [cold-reset] ++
3,996,386 UART: [fht] Storing FHT @ 0x50003400
4,008,218 UART: [idev] ++
4,008,784 UART: [idev] CDI.KEYID = 6
4,009,816 UART: [idev] SUBJECT.KEYID = 7
4,010,992 UART: [idev] UDS.KEYID = 0
4,012,081 ready_for_fw is high
4,012,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,452 UART: [idev] Erasing UDS.KEYID = 0
7,346,799 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,999 UART: [idev] --
7,371,116 UART: [ldev] ++
7,371,683 UART: [ldev] CDI.KEYID = 6
7,372,668 UART: [ldev] SUBJECT.KEYID = 5
7,373,882 UART: [ldev] AUTHORITY.KEYID = 7
7,375,180 UART: [ldev] FE.KEYID = 1
7,423,368 UART: [ldev] Erasing FE.KEYID = 1
10,758,393 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,982 UART: [ldev] --
13,134,593 UART: [fwproc] Waiting for Commands...
13,137,235 UART: [fwproc] Received command 0x46574c44
13,139,631 UART: [fwproc] Received Image of size 118548 bytes
17,246,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,631 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,723,103 >>> mbox cmd response: success
17,724,194 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,726,399 UART: [afmc] ++
17,727,034 UART: [afmc] CDI.KEYID = 6
17,727,942 UART: [afmc] SUBJECT.KEYID = 7
17,729,211 UART: [afmc] AUTHORITY.KEYID = 5
21,099,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,400,001 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,402,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,416,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,431,443 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,445,838 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,466,782 UART: [afmc] --
23,470,433 UART: [cold-reset] --
23,474,991 UART: [state] Locking Datavault
23,479,054 UART: [state] Locking PCR0, PCR1 and PCR31
23,480,805 UART: [state] Locking ICCM
23,482,068 UART: [exit] Launching FMC @ 0x40000130
23,490,477 UART:
23,490,710 UART: Running Caliptra FMC ...
23,491,734 UART:
23,491,878 UART: [state] CFI Enabled
23,561,494 UART: [fht] FMC Alias Private Key: 7
25,902,005 UART: [art] Extend RT PCRs Done
25,903,892 UART: [art] Lock RT PCRs Done
25,904,968 UART: [art] Populate DV Done
25,910,351 UART: [fht] FMC Alias Private Key: 7
25,911,892 UART: [art] Derive CDI
25,912,677 UART: [art] Store in slot 0x4
25,960,039 UART: [art] Derive Key Pair
25,961,178 UART: [art] Store priv key in slot 0x5
29,235,772 UART: [art] Derive Key Pair - Done
29,248,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,514 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,661 UART: [art] PUB.X = CAB57D37B77D2C4A1FE5142FDFE632D4268795E22E3B2C78A509C88ED637BEF544F862BAE82166DD5C363B5595AADE1E
31,551,348 UART: [art] PUB.Y = 1F44C769BF3775D5AB39E4C51BB1C89B0BE92CC6FEE26CF6A3B181989F237E527F600826DADBA5F04940BF656BC792A6
31,558,540 UART: [art] SIG.R = 9CD1E6C1F83C3058C267CD87AE4A590A86A1657BB70BF6FABC19098EBC97D92552C4F6C1F4A861CF8316EE44107B91FC
31,565,937 UART: [art] SIG.S = 91BC1D421B59B60B06A281D126D67B86BCF13A9B4D7B160DD297E5F6D310BCFE9D4A409A0FC261274AC4784BAD8EDF17
32,871,672 UART: Caliptra RT
32,873,140 UART: [state] CFI Enabled
33,063,292 UART: [rt] RT listening for mailbox commands...
33,094,499 UART: [rt]cmd =0x4c444556, len=4
33,105,727 >>> mbox cmd response data (687 bytes)
33,149,680 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,180,077 UART: [rt]cmd =0x49444549, len=4
33,183,023 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,805,410 ready_for_fw is high
3,805,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,125 >>> mbox cmd response: success
17,941,432 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,635,634 UART:
23,636,024 UART: Running Caliptra FMC ...
23,637,230 UART:
23,637,399 UART: [state] CFI Enabled
23,703,246 UART: [fht] FMC Alias Private Key: 7
26,043,631 UART: [art] Extend RT PCRs Done
26,044,862 UART: [art] Lock RT PCRs Done
26,046,387 UART: [art] Populate DV Done
26,051,649 UART: [fht] FMC Alias Private Key: 7
26,053,248 UART: [art] Derive CDI
26,054,062 UART: [art] Store in slot 0x4
26,112,005 UART: [art] Derive Key Pair
26,113,057 UART: [art] Store priv key in slot 0x5
29,405,952 UART: [art] Derive Key Pair - Done
29,418,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,769 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,277 UART: [art] PUB.X = 3AEE1DFE950271B3939A0BF1686206864F52FC38CCFED4442654D4E573DCDF7DDEA567C440EE12A6E9F2334CE3BBDDE8
31,715,570 UART: [art] PUB.Y = 90718B9931DA6C5135040EF811545A8C6D899AA6D88A29F20AB09AB4F9F955B31E8FF2957D3A45343C604E15E511842E
31,722,811 UART: [art] SIG.R = 8EA0BC941A90C5FC0E51D7594FE3C3F38F1F916E25E94BCFB8DFB81F40BDA69DAE90920EF6538F1A777411FA4606A4EF
31,730,255 UART: [art] SIG.S = 8DE853234104A46BB2F6FD92A180DEB559A25B77675DE4FE5D920BFF01830DC91A897F6D2A83EAD60CA16AF57A8149FB
33,035,900 UART: Caliptra RT
33,036,615 UART: [state] CFI Enabled
33,211,875 UART: [rt] RT listening for mailbox commands...
33,243,512 UART: [rt]cmd =0x4c444556, len=4
33,254,705 >>> mbox cmd response data (687 bytes)
33,296,132 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,326,340 UART: [rt]cmd =0x49444549, len=4
33,329,036 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,483 UART:
192,874 UART: Running Caliptra ROM ...
194,009 UART:
603,515 UART: [state] CFI Enabled
618,393 UART: [state] LifecycleState = Unprovisioned
620,259 UART: [state] DebugLocked = No
622,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,146 UART: [kat] SHA2-256
796,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,417 UART: [kat] ++
807,890 UART: [kat] sha1
819,402 UART: [kat] SHA2-256
822,124 UART: [kat] SHA2-384
828,395 UART: [kat] SHA2-512-ACC
830,763 UART: [kat] ECC-384
3,112,917 UART: [kat] HMAC-384Kdf
3,125,001 UART: [kat] LMS
4,315,115 UART: [kat] --
4,318,700 UART: [cold-reset] ++
4,319,777 UART: [fht] Storing FHT @ 0x50003400
4,331,777 UART: [idev] ++
4,332,378 UART: [idev] CDI.KEYID = 6
4,333,291 UART: [idev] SUBJECT.KEYID = 7
4,334,532 UART: [idev] UDS.KEYID = 0
4,335,598 ready_for_fw is high
4,335,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,621 UART: [idev] Erasing UDS.KEYID = 0
7,616,008 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,374 UART: [idev] --
7,642,442 UART: [ldev] ++
7,643,002 UART: [ldev] CDI.KEYID = 6
7,643,963 UART: [ldev] SUBJECT.KEYID = 5
7,645,167 UART: [ldev] AUTHORITY.KEYID = 7
7,646,446 UART: [ldev] FE.KEYID = 1
7,657,462 UART: [ldev] Erasing FE.KEYID = 1
10,945,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,001 UART: [ldev] --
13,305,595 UART: [fwproc] Waiting for Commands...
13,307,741 UART: [fwproc] Received command 0x46574c44
13,309,972 UART: [fwproc] Received Image of size 118548 bytes
17,417,088 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,853 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,007 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,356 >>> mbox cmd response: success
17,897,868 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
17,901,129 UART: [afmc] ++
17,901,709 UART: [afmc] CDI.KEYID = 6
17,902,613 UART: [afmc] SUBJECT.KEYID = 7
17,903,874 UART: [afmc] AUTHORITY.KEYID = 5
21,220,082 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,281 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,668 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,068 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,532 UART: [afmc] --
23,584,117 UART: [cold-reset] --
23,587,911 UART: [state] Locking Datavault
23,593,311 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,052 UART: [state] Locking ICCM
23,596,143 UART: [exit] Launching FMC @ 0x40000130
23,604,524 UART:
23,604,749 UART: Running Caliptra FMC ...
23,605,768 UART:
23,605,909 UART: [state] CFI Enabled
23,613,677 UART: [fht] FMC Alias Private Key: 7
25,954,162 UART: [art] Extend RT PCRs Done
25,955,382 UART: [art] Lock RT PCRs Done
25,956,757 UART: [art] Populate DV Done
25,962,295 UART: [fht] FMC Alias Private Key: 7
25,963,880 UART: [art] Derive CDI
25,964,607 UART: [art] Store in slot 0x4
26,007,628 UART: [art] Derive Key Pair
26,008,667 UART: [art] Store priv key in slot 0x5
29,250,958 UART: [art] Derive Key Pair - Done
29,263,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,825 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,328 UART: [art] PUB.X = C562DED94DC6518A23E5C8C01B8088EF2B811011887A009F0B378BA3742AEE733F9D9FE8C3BD716AA63B7B0235F40174
31,552,570 UART: [art] PUB.Y = C5C7152432D5374E7EF04AFB6924C5628981F2927BD8DDCDF3F7810C94DF0F3AE249A7EA22076F0DE337C44AEF062C5D
31,559,837 UART: [art] SIG.R = 085CC5DDBB90B600E2A825175DCD5B39C53B1620D07EF06B110C53048F6A68A609F599DDD97A982A0A022832C9ECC385
31,567,212 UART: [art] SIG.S = 7BC0EC3F79D5052576687C3D284C86427859E3C9BA30ADC98E81E860FAE2B421408E14EBF19AEF55864311738516E39E
32,872,444 UART: Caliptra RT
32,873,159 UART: [state] CFI Enabled
33,006,333 UART: [rt] RT listening for mailbox commands...
33,037,598 UART: [rt]cmd =0x4c444556, len=4
33,048,813 >>> mbox cmd response data (687 bytes)
33,090,285 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,120,311 UART: [rt]cmd =0x49444549, len=4
33,123,053 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
4,131,600 ready_for_fw is high
4,132,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,803 >>> mbox cmd response: success
18,155,457 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
23,800,465 UART:
23,800,857 UART: Running Caliptra FMC ...
23,801,973 UART:
23,802,126 UART: [state] CFI Enabled
23,809,979 UART: [fht] FMC Alias Private Key: 7
26,149,850 UART: [art] Extend RT PCRs Done
26,151,085 UART: [art] Lock RT PCRs Done
26,152,645 UART: [art] Populate DV Done
26,158,286 UART: [fht] FMC Alias Private Key: 7
26,159,847 UART: [art] Derive CDI
26,160,661 UART: [art] Store in slot 0x4
26,203,263 UART: [art] Derive Key Pair
26,204,306 UART: [art] Store priv key in slot 0x5
29,447,032 UART: [art] Derive Key Pair - Done
29,459,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,660 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,812 UART: [art] PUB.X = D5C930985A6C997A5C7EA8123C8BB068FB8EBB61CA4ACB070914425DEA2954FA621BBFA66B43C58A5B13D137E7A18C28
31,748,564 UART: [art] PUB.Y = DB66A86778C4A2491ED0EF8A92F9937F4DE2A09C1322301169526AFC4249613D4403BF71C43445BD5A51C736DBA5572B
31,755,685 UART: [art] SIG.R = CE99722AB098A81784972A8DEE6EA085D8B0FC29326AB58B01111CC3878BE2348EAB8E4AFC8561E31A595ABB5FA43DB8
31,763,089 UART: [art] SIG.S = 5587107F4DEEDE4CAB7F472D00EF8DB51E0A380C64607F806300DD77523A91D27BA08C868DEC8543742E6B96273C1D8E
33,068,136 UART: Caliptra RT
33,069,300 UART: [state] CFI Enabled
33,202,168 UART: [rt] RT listening for mailbox commands...
33,233,849 UART: [rt]cmd =0x4c444556, len=4
33,244,862 >>> mbox cmd response data (687 bytes)
33,286,617 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
33,316,711 UART: [rt]cmd =0x49444549, len=4
33,319,552 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,065 UART:
192,438 UART: Running Caliptra ROM ...
193,521 UART:
193,661 UART: [state] CFI Enabled
269,163 UART: [state] LifecycleState = Unprovisioned
271,062 UART: [state] DebugLocked = No
273,227 UART: [state] WD Timer not started. Device not locked for debugging
277,187 UART: [kat] SHA2-256
456,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
467,635 UART: [kat] ++
468,079 UART: [kat] sha1
479,238 UART: [kat] SHA2-256
481,887 UART: [kat] SHA2-384
487,727 UART: [kat] SHA2-512-ACC
490,089 UART: [kat] ECC-384
2,950,156 UART: [kat] HMAC-384Kdf
2,973,659 UART: [kat] LMS
3,450,113 UART: [kat] --
3,455,123 UART: [cold-reset] ++
3,457,145 UART: [fht] FHT @ 0x50003400
3,468,475 UART: [idev] ++
3,469,040 UART: [idev] CDI.KEYID = 6
3,470,072 UART: [idev] SUBJECT.KEYID = 7
3,471,242 UART: [idev] UDS.KEYID = 0
3,472,164 ready_for_fw is high
3,472,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,864 UART: [idev] Erasing UDS.KEYID = 0
5,989,636 UART: [idev] Sha1 KeyId Algorithm
6,012,689 UART: [idev] --
6,017,039 UART: [ldev] ++
6,017,615 UART: [ldev] CDI.KEYID = 6
6,018,628 UART: [ldev] SUBJECT.KEYID = 5
6,019,748 UART: [ldev] AUTHORITY.KEYID = 7
6,021,038 UART: [ldev] FE.KEYID = 1
6,058,423 UART: [ldev] Erasing FE.KEYID = 1
8,566,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,708 UART: [ldev] --
10,375,271 UART: [fwproc] Wait for Commands...
10,377,844 UART: [fwproc] Recv command 0x46574c44
10,379,820 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,262 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,307 >>> mbox cmd response: success
14,345,472 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,348,380 UART: [afmc] ++
14,348,962 UART: [afmc] CDI.KEYID = 6
14,349,903 UART: [afmc] SUBJECT.KEYID = 7
14,351,111 UART: [afmc] AUTHORITY.KEYID = 5
16,896,023 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,052 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,604 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,840 UART: [afmc] --
18,698,111 UART: [cold-reset] --
18,700,939 UART: [state] Locking Datavault
18,704,936 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,628 UART: [state] Locking ICCM
18,709,016 UART: [exit] Launching FMC @ 0x40000130
18,717,461 UART:
18,717,707 UART: Running Caliptra FMC ...
18,718,806 UART:
18,718,963 UART: [state] CFI Enabled
18,776,373 UART: [fht] FMC Alias Private Key: 7
20,543,132 UART: [art] Extend RT PCRs Done
20,544,344 UART: [art] Lock RT PCRs Done
20,545,964 UART: [art] Populate DV Done
20,551,528 UART: [fht] FMC Alias Private Key: 7
20,553,220 UART: [art] Derive CDI
20,554,028 UART: [art] Store in slot 0x4
20,609,632 UART: [art] Derive Key Pair
20,610,663 UART: [art] Store priv key in slot 0x5
23,073,567 UART: [art] Derive Key Pair - Done
23,086,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,382 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,901 UART: [art] PUB.X = 5B6011647F93FD257787EC28619CD8E987E3300BE440F27645A16C301EDB4A4BADD1C3B98C235ACD25615962545403C6
24,808,150 UART: [art] PUB.Y = 341DB49BDA2BE9CE293192A350E4DCB179DC4EC8C28BE89FD6D5B64654E0E308F3B606BF2A74B8FB1F26BE269740887A
24,815,419 UART: [art] SIG.R = C23C856B233F63879502022FE51914C983755980EFBFE46810AD43AAF7C38E5126E24234C9EB8672451C97AE7A4CEC92
24,822,828 UART: [art] SIG.S = 9CA6D48CE95C86F3BC23FD8236014E679DDAD7FC26A20D06250A732C019E9F6A62F299AA5884DA5B831244E07011AE28
25,801,842 UART: Caliptra RT
25,802,535 UART: [state] CFI Enabled
25,983,268 UART: [rt] RT listening for mailbox commands...
26,014,716 UART: [rt]cmd =0x4c444556, len=4
26,025,998 >>> mbox cmd response data (687 bytes)
26,066,824 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,096,643 UART: [rt]cmd =0x49444549, len=4
26,099,161 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,464,496 ready_for_fw is high
3,464,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,310 >>> mbox cmd response: success
14,246,013 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,535,934 UART:
18,536,335 UART: Running Caliptra FMC ...
18,537,436 UART:
18,537,585 UART: [state] CFI Enabled
18,606,786 UART: [fht] FMC Alias Private Key: 7
20,373,310 UART: [art] Extend RT PCRs Done
20,374,535 UART: [art] Lock RT PCRs Done
20,376,100 UART: [art] Populate DV Done
20,381,310 UART: [fht] FMC Alias Private Key: 7
20,382,904 UART: [art] Derive CDI
20,383,640 UART: [art] Store in slot 0x4
20,439,193 UART: [art] Derive Key Pair
20,440,187 UART: [art] Store priv key in slot 0x5
22,903,215 UART: [art] Derive Key Pair - Done
22,916,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,745 UART: [art] Erasing AUTHORITY.KEYID = 7
24,630,245 UART: [art] PUB.X = DB6ECC66ADD3EF8D4115A1399A8A21497DC89DE2A860F42E07128561EF9A41CDBD7D53FF632A7B2E842F22E96E7E469E
24,637,556 UART: [art] PUB.Y = E0F46EE6B0CA16618E6740F9D7A408B4B288EA1E0130408F833B4FBE66A16885A2EABE7FD9E94F9EA9C62D64CB335580
24,644,804 UART: [art] SIG.R = 7900747A46D96E13619C310211F50F5ED824104AF94E298ED8D6BF587648CAD9CADE65E9C64874B90530A3808B5A044A
24,652,194 UART: [art] SIG.S = 30B29832D1C5CD7787AF7EB6D457CA5056DB315AF7F1BD7B50056536D130A27BC9C7F8D1FF386A2255D3DE52E87DE1F8
25,630,847 UART: Caliptra RT
25,631,556 UART: [state] CFI Enabled
25,811,130 UART: [rt] RT listening for mailbox commands...
25,842,563 UART: [rt]cmd =0x4c444556, len=4
25,853,652 >>> mbox cmd response data (687 bytes)
25,894,708 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,924,697 UART: [rt]cmd =0x49444549, len=4
25,927,550 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,497 UART:
192,872 UART: Running Caliptra ROM ...
194,007 UART:
603,719 UART: [state] CFI Enabled
615,680 UART: [state] LifecycleState = Unprovisioned
617,628 UART: [state] DebugLocked = No
619,435 UART: [state] WD Timer not started. Device not locked for debugging
624,176 UART: [kat] SHA2-256
803,802 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,627 UART: [kat] ++
815,074 UART: [kat] sha1
826,094 UART: [kat] SHA2-256
828,779 UART: [kat] SHA2-384
835,874 UART: [kat] SHA2-512-ACC
838,182 UART: [kat] ECC-384
3,278,002 UART: [kat] HMAC-384Kdf
3,289,549 UART: [kat] LMS
3,766,028 UART: [kat] --
3,770,737 UART: [cold-reset] ++
3,772,456 UART: [fht] FHT @ 0x50003400
3,783,149 UART: [idev] ++
3,783,713 UART: [idev] CDI.KEYID = 6
3,784,745 UART: [idev] SUBJECT.KEYID = 7
3,785,918 UART: [idev] UDS.KEYID = 0
3,786,845 ready_for_fw is high
3,787,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,055 UART: [idev] Erasing UDS.KEYID = 0
6,263,347 UART: [idev] Sha1 KeyId Algorithm
6,286,291 UART: [idev] --
6,291,774 UART: [ldev] ++
6,292,356 UART: [ldev] CDI.KEYID = 6
6,293,268 UART: [ldev] SUBJECT.KEYID = 5
6,294,480 UART: [ldev] AUTHORITY.KEYID = 7
6,295,738 UART: [ldev] FE.KEYID = 1
6,307,551 UART: [ldev] Erasing FE.KEYID = 1
8,787,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,234 UART: [ldev] --
10,581,224 UART: [fwproc] Wait for Commands...
10,583,485 UART: [fwproc] Recv command 0x46574c44
10,585,469 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,650 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,979 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,559 >>> mbox cmd response: success
14,558,086 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,561,855 UART: [afmc] ++
14,562,435 UART: [afmc] CDI.KEYID = 6
14,563,320 UART: [afmc] SUBJECT.KEYID = 7
14,564,598 UART: [afmc] AUTHORITY.KEYID = 5
17,066,707 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,560 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,464 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,797 UART: [afmc] --
18,867,641 UART: [cold-reset] --
18,871,771 UART: [state] Locking Datavault
18,876,857 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,609 UART: [state] Locking ICCM
18,879,921 UART: [exit] Launching FMC @ 0x40000130
18,888,331 UART:
18,888,571 UART: Running Caliptra FMC ...
18,889,674 UART:
18,889,833 UART: [state] CFI Enabled
18,898,128 UART: [fht] FMC Alias Private Key: 7
20,664,692 UART: [art] Extend RT PCRs Done
20,665,910 UART: [art] Lock RT PCRs Done
20,667,508 UART: [art] Populate DV Done
20,672,805 UART: [fht] FMC Alias Private Key: 7
20,674,514 UART: [art] Derive CDI
20,675,256 UART: [art] Store in slot 0x4
20,717,952 UART: [art] Derive Key Pair
20,718,953 UART: [art] Store priv key in slot 0x5
23,145,506 UART: [art] Derive Key Pair - Done
23,158,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,796 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,320 UART: [art] PUB.X = CEDB086B711F6CB2F68686354B70AEE525222FBB8472D57AA5AFCCB8F4DB50D702AEDA240C1CF1E4B7E0EFE639CBC307
24,873,624 UART: [art] PUB.Y = 55E5C38C2C5EBC99FE77C2838BE6C5A31AAAD38B58BE64B7D138F812B6B034BBE8423A03B4EFD0966D8DE93E52E77F54
24,880,909 UART: [art] SIG.R = 4013326B77B8D4BD989E067CA8E1A3E028398CFF98E3C70DA1A476BE9A8C358E28D8A9FFBE5B0E652C4CFBD2794F2CAA
24,888,301 UART: [art] SIG.S = F8309972D380F27CA9014E879606B5E6815C52B50F29B6F4203CEEFAE8A60D581E2A4B950D395E32A2142DAD6F172B40
25,867,847 UART: Caliptra RT
25,868,562 UART: [state] CFI Enabled
26,000,529 UART: [rt] RT listening for mailbox commands...
26,031,983 UART: [rt]cmd =0x4c444556, len=4
26,042,987 >>> mbox cmd response data (687 bytes)
26,083,791 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,113,667 UART: [rt]cmd =0x49444549, len=4
26,116,670 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,778,038 ready_for_fw is high
3,778,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,404 >>> mbox cmd response: success
14,451,976 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
18,703,747 UART:
18,704,136 UART: Running Caliptra FMC ...
18,705,244 UART:
18,705,403 UART: [state] CFI Enabled
18,713,201 UART: [fht] FMC Alias Private Key: 7
20,479,238 UART: [art] Extend RT PCRs Done
20,480,462 UART: [art] Lock RT PCRs Done
20,482,171 UART: [art] Populate DV Done
20,487,592 UART: [fht] FMC Alias Private Key: 7
20,489,136 UART: [art] Derive CDI
20,489,960 UART: [art] Store in slot 0x4
20,532,521 UART: [art] Derive Key Pair
20,533,526 UART: [art] Store priv key in slot 0x5
22,960,229 UART: [art] Derive Key Pair - Done
22,973,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,208 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,708 UART: [art] PUB.X = 8F660D7FFD86A3CBE9C4CDFBE709CE96D561A1405EF56E0110C09ACF95C23540B0C21C3D4C739FF4466016CDC3271A1B
24,688,015 UART: [art] PUB.Y = E6BDA4B3A928D259263889738654682EB68B01A16A4C90BB5E7CF8D464C454451402A3758B843CC7858C2CAEC086C1F8
24,695,278 UART: [art] SIG.R = 05DE47811055653E3C0C04AF0F036551048ACDC1C4576769C515A4D241474E7B800DFFE0528E5DD5DD7CBA08B473837D
24,702,634 UART: [art] SIG.S = B7CA2FADD59FACB15035A01901882DA2396C7F49377523E7BB72D832925EAB1BD3E03FA30F040512756FB5748E888BD1
25,681,318 UART: Caliptra RT
25,682,024 UART: [state] CFI Enabled
25,815,704 UART: [rt] RT listening for mailbox commands...
25,847,211 UART: [rt]cmd =0x4c444556, len=4
25,858,537 >>> mbox cmd response data (687 bytes)
25,899,237 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
25,929,019 UART: [rt]cmd =0x49444549, len=4
25,931,691 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,170 UART:
192,513 UART: Running Caliptra ROM ...
193,685 UART:
193,835 UART: [state] CFI Enabled
265,664 UART: [state] LifecycleState = Unprovisioned
268,080 UART: [state] DebugLocked = No
270,045 UART: [state] WD Timer not started. Device not locked for debugging
274,792 UART: [kat] SHA2-256
464,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,401 UART: [kat] ++
475,848 UART: [kat] sha1
487,002 UART: [kat] SHA2-256
490,011 UART: [kat] SHA2-384
496,781 UART: [kat] SHA2-512-ACC
499,365 UART: [kat] ECC-384
2,950,942 UART: [kat] HMAC-384Kdf
2,972,499 UART: [kat] LMS
3,504,254 UART: [kat] --
3,508,417 UART: [cold-reset] ++
3,510,137 UART: [fht] FHT @ 0x50003400
3,522,135 UART: [idev] ++
3,522,814 UART: [idev] CDI.KEYID = 6
3,523,768 UART: [idev] SUBJECT.KEYID = 7
3,524,939 UART: [idev] UDS.KEYID = 0
3,525,886 ready_for_fw is high
3,526,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,175 UART: [idev] Erasing UDS.KEYID = 0
6,029,505 UART: [idev] Sha1 KeyId Algorithm
6,052,191 UART: [idev] --
6,056,830 UART: [ldev] ++
6,057,569 UART: [ldev] CDI.KEYID = 6
6,058,477 UART: [ldev] SUBJECT.KEYID = 5
6,059,633 UART: [ldev] AUTHORITY.KEYID = 7
6,060,862 UART: [ldev] FE.KEYID = 1
6,100,193 UART: [ldev] Erasing FE.KEYID = 1
8,607,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,378 UART: [ldev] --
10,413,193 UART: [fwproc] Wait for Commands...
10,416,312 UART: [fwproc] Recv command 0x46574c44
10,418,567 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,040 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,842 >>> mbox cmd response: success
14,674,893 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,678,383 UART: [afmc] ++
14,679,073 UART: [afmc] CDI.KEYID = 6
14,680,311 UART: [afmc] SUBJECT.KEYID = 7
14,681,742 UART: [afmc] AUTHORITY.KEYID = 5
17,213,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,259 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,360 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,483 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,697 UART: [afmc] --
19,030,066 UART: [cold-reset] --
19,035,283 UART: [state] Locking Datavault
19,040,144 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,286 UART: [state] Locking ICCM
19,044,412 UART: [exit] Launching FMC @ 0x40000130
19,053,068 UART:
19,053,302 UART: Running Caliptra FMC ...
19,054,326 UART:
19,054,471 UART: [state] CFI Enabled
19,114,302 UART: [fht] FMC Alias Private Key: 7
20,880,672 UART: [art] Extend RT PCRs Done
20,881,892 UART: [art] Lock RT PCRs Done
20,883,250 UART: [art] Populate DV Done
20,888,614 UART: [fht] FMC Alias Private Key: 7
20,890,250 UART: [art] Derive CDI
20,890,980 UART: [art] Store in slot 0x4
20,947,232 UART: [art] Derive Key Pair
20,948,224 UART: [art] Store priv key in slot 0x5
23,411,066 UART: [art] Derive Key Pair - Done
23,423,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,371 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,878 UART: [art] PUB.X = CB71415D69CEF8F9AE662828F1DBCA9F215EED016836BEF99739F43D0A26FE10F086A11C55C67AC6C877D3ADED892F49
25,146,181 UART: [art] PUB.Y = 530DC0113FC5F28ABC1FC5007819B7752BA6B1D6A8F09DAFB29357D46198EAC262E8704AD4B25AF6B51BAD0EE4CFD7EA
25,153,460 UART: [art] SIG.R = 071D157DF9AB15015768B9C5EAF9E96FB807BB19FE8A8689CDCC452C083D946CE57AEFD949573D191D5C7C3A0FF7AAD9
25,160,856 UART: [art] SIG.S = 8F82D6228E38469BB4E8B7C8C053F42F384E3B9D588B5A5B398DA3813561788D313CCB489CA68DAFD00CF9929AD7A07B
26,139,966 UART: Caliptra RT
26,140,650 UART: [state] CFI Enabled
26,320,928 UART: [rt] RT listening for mailbox commands...
26,352,500 UART: [rt]cmd =0x4c444556, len=4
26,363,536 >>> mbox cmd response data (687 bytes)
26,404,356 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,434,225 UART: [rt]cmd =0x49444549, len=4
26,436,920 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,440,404 ready_for_fw is high
3,441,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,709 >>> mbox cmd response: success
14,821,990 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,116,168 UART:
19,116,577 UART: Running Caliptra FMC ...
19,117,685 UART:
19,117,841 UART: [state] CFI Enabled
19,181,054 UART: [fht] FMC Alias Private Key: 7
20,947,509 UART: [art] Extend RT PCRs Done
20,948,732 UART: [art] Lock RT PCRs Done
20,949,957 UART: [art] Populate DV Done
20,955,758 UART: [fht] FMC Alias Private Key: 7
20,957,355 UART: [art] Derive CDI
20,958,091 UART: [art] Store in slot 0x4
21,014,242 UART: [art] Derive Key Pair
21,015,235 UART: [art] Store priv key in slot 0x5
23,477,646 UART: [art] Derive Key Pair - Done
23,490,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,120 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,635 UART: [art] PUB.X = 4D26DF896881FD6865646D085AA4045564C48A19E3488051C1484A3D7FAD7C3E8F1F23FB619693BDC43A1098B8647BF3
25,212,874 UART: [art] PUB.Y = B724E4BB9E360AE3220102E75B2EC2E68C69A6652A98F3D5922C46614E7165F0C27CA664009D74106FBEFD2B895D490A
25,220,108 UART: [art] SIG.R = F0F5F41EAFF4043268CE7F8F392AFE3920AB7E56F7CD8AC8D92540212515E80D3127A34A8F85D7142E77C9B3BA688824
25,227,494 UART: [art] SIG.S = A8324A2BDFCB6AC549ABC3C662BF99E4F8B30B2DD298A6CADB0056316ACEC4AF6ACC9105BCFF7B27B0F5F87A8C9985E1
26,206,952 UART: Caliptra RT
26,207,644 UART: [state] CFI Enabled
26,387,962 UART: [rt] RT listening for mailbox commands...
26,419,483 UART: [rt]cmd =0x4c444556, len=4
26,430,618 >>> mbox cmd response data (687 bytes)
26,471,356 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,501,227 UART: [rt]cmd =0x49444549, len=4
26,503,792 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,371 UART:
192,732 UART: Running Caliptra ROM ...
193,875 UART:
603,654 UART: [state] CFI Enabled
618,574 UART: [state] LifecycleState = Unprovisioned
620,966 UART: [state] DebugLocked = No
622,911 UART: [state] WD Timer not started. Device not locked for debugging
626,889 UART: [kat] SHA2-256
816,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,540 UART: [kat] ++
828,091 UART: [kat] sha1
838,769 UART: [kat] SHA2-256
841,789 UART: [kat] SHA2-384
847,003 UART: [kat] SHA2-512-ACC
849,606 UART: [kat] ECC-384
3,289,276 UART: [kat] HMAC-384Kdf
3,302,662 UART: [kat] LMS
3,834,528 UART: [kat] --
3,838,100 UART: [cold-reset] ++
3,840,672 UART: [fht] FHT @ 0x50003400
3,851,603 UART: [idev] ++
3,852,251 UART: [idev] CDI.KEYID = 6
3,853,286 UART: [idev] SUBJECT.KEYID = 7
3,854,395 UART: [idev] UDS.KEYID = 0
3,855,323 ready_for_fw is high
3,855,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,403 UART: [idev] Erasing UDS.KEYID = 0
6,326,938 UART: [idev] Sha1 KeyId Algorithm
6,350,647 UART: [idev] --
6,354,834 UART: [ldev] ++
6,355,527 UART: [ldev] CDI.KEYID = 6
6,356,441 UART: [ldev] SUBJECT.KEYID = 5
6,357,608 UART: [ldev] AUTHORITY.KEYID = 7
6,358,846 UART: [ldev] FE.KEYID = 1
6,369,604 UART: [ldev] Erasing FE.KEYID = 1
8,847,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,730 UART: [ldev] --
10,639,696 UART: [fwproc] Wait for Commands...
10,641,357 UART: [fwproc] Recv command 0x46574c44
10,643,666 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,664 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,519 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,808 >>> mbox cmd response: success
14,906,788 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
14,909,442 UART: [afmc] ++
14,910,150 UART: [afmc] CDI.KEYID = 6
14,911,404 UART: [afmc] SUBJECT.KEYID = 7
14,912,865 UART: [afmc] AUTHORITY.KEYID = 5
17,411,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,132,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,149,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,179,977 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,203,721 UART: [afmc] --
19,207,432 UART: [cold-reset] --
19,210,273 UART: [state] Locking Datavault
19,216,456 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,482 UART: [state] Locking ICCM
19,221,244 UART: [exit] Launching FMC @ 0x40000130
19,229,926 UART:
19,230,162 UART: Running Caliptra FMC ...
19,231,267 UART:
19,231,447 UART: [state] CFI Enabled
19,239,499 UART: [fht] FMC Alias Private Key: 7
21,005,655 UART: [art] Extend RT PCRs Done
21,006,870 UART: [art] Lock RT PCRs Done
21,008,669 UART: [art] Populate DV Done
21,013,927 UART: [fht] FMC Alias Private Key: 7
21,015,526 UART: [art] Derive CDI
21,016,350 UART: [art] Store in slot 0x4
21,059,111 UART: [art] Derive Key Pair
21,060,150 UART: [art] Store priv key in slot 0x5
23,487,020 UART: [art] Derive Key Pair - Done
23,500,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,479 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,976 UART: [art] PUB.X = 1BEE2DDB032DE4A537A089DB48544FD6A8E9D9CB6FCCA7E19ACE36EB67B1EA665101BB1EC8438AA02CD2023A83D1E4D4
25,215,290 UART: [art] PUB.Y = D0135C40E2E20E22DDDC8DB4B99B59FEE656FFFD1BCC653E2AA7E5891273F58710BE766F9B0FC7DB6C44AEEB1EF1D7CF
25,222,593 UART: [art] SIG.R = 1CB628F13873BCC8E20963C282C4FEFB435DFA96572C720B450880FF93B37B1682FE14AB1AF2DFE4D4CE33F81EA75D2B
25,230,032 UART: [art] SIG.S = 62B59B0A8C3F5C5C886F62E7BE5CA6C4B8190BF713190481FB2F6F4324444A6CF880CA40D6261765094E4B4710C0EAB0
26,208,900 UART: Caliptra RT
26,209,622 UART: [state] CFI Enabled
26,342,474 UART: [rt] RT listening for mailbox commands...
26,373,620 UART: [rt]cmd =0x4c444556, len=4
26,384,866 >>> mbox cmd response data (687 bytes)
26,427,099 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,457,097 UART: [rt]cmd =0x49444549, len=4
26,459,968 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,757,335 ready_for_fw is high
3,758,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,935 >>> mbox cmd response: success
15,040,117 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
19,294,997 UART:
19,295,401 UART: Running Caliptra FMC ...
19,296,550 UART:
19,296,717 UART: [state] CFI Enabled
19,304,845 UART: [fht] FMC Alias Private Key: 7
21,070,186 UART: [art] Extend RT PCRs Done
21,071,419 UART: [art] Lock RT PCRs Done
21,073,269 UART: [art] Populate DV Done
21,078,806 UART: [fht] FMC Alias Private Key: 7
21,080,408 UART: [art] Derive CDI
21,081,230 UART: [art] Store in slot 0x4
21,124,156 UART: [art] Derive Key Pair
21,125,203 UART: [art] Store priv key in slot 0x5
23,552,108 UART: [art] Derive Key Pair - Done
23,565,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,518 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,031 UART: [art] PUB.X = 9E68726C484583D0253A791E5D9C27F9315176225A0E0A7B704F3ACFB66D307C9F3E0511CA5246C37FAEB9A5FEC31384
25,280,249 UART: [art] PUB.Y = BA674A3879774362184B0F0299EA14EC44FD32A379E5B9C4DE3E6FCEE4621B3D009A53DBA1E04D374A4CDB9FDD9974DB
25,287,467 UART: [art] SIG.R = AB6FD4F9F1571E402C29110B9F8FF4F61996F800BF81DE72EBECF69397A12118C200AA1AA71AEFA71F5616DFE2F11149
25,294,890 UART: [art] SIG.S = 5DC3BD04CF04976FBC21E5A12805437A25E9BF37D1871E67AEC2475E22283E1A92D3C6FBC989EF57BF7F75FEDB73558F
26,273,810 UART: Caliptra RT
26,274,532 UART: [state] CFI Enabled
26,407,420 UART: [rt] RT listening for mailbox commands...
26,438,839 UART: [rt]cmd =0x4c444556, len=4
26,449,986 >>> mbox cmd response data (687 bytes)
26,492,077 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
26,522,073 UART: [rt]cmd =0x49444549, len=4
26,525,041 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,195 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,817 UART: [kat] SHA2-256
881,748 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,863 UART: [kat] ++
886,015 UART: [kat] sha1
890,359 UART: [kat] SHA2-256
892,297 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,470 UART: [kat] HMAC-384Kdf
907,200 UART: [kat] LMS
1,475,396 UART: [kat] --
1,476,277 UART: [cold-reset] ++
1,476,673 UART: [fht] Storing FHT @ 0x50003400
1,479,372 UART: [idev] ++
1,479,540 UART: [idev] CDI.KEYID = 6
1,479,900 UART: [idev] SUBJECT.KEYID = 7
1,480,324 UART: [idev] UDS.KEYID = 0
1,480,669 ready_for_fw is high
1,480,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,504,860 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,289 UART: [ldev] ++
1,514,457 UART: [ldev] CDI.KEYID = 6
1,514,820 UART: [ldev] SUBJECT.KEYID = 5
1,515,246 UART: [ldev] AUTHORITY.KEYID = 7
1,515,709 UART: [ldev] FE.KEYID = 1
1,520,995 UART: [ldev] Erasing FE.KEYID = 1
1,546,414 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,248 UART: [ldev] --
1,585,709 UART: [fwproc] Waiting for Commands...
1,586,394 UART: [fwproc] Received command 0x46574c44
1,587,185 UART: [fwproc] Received Image of size 118548 bytes
2,932,751 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,539 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,130 >>> mbox cmd response: success
3,131,130 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,132,198 UART: [afmc] ++
3,132,366 UART: [afmc] CDI.KEYID = 6
3,132,728 UART: [afmc] SUBJECT.KEYID = 7
3,133,153 UART: [afmc] AUTHORITY.KEYID = 5
3,167,592 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,778 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,150 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,833 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,479 UART: [afmc] --
3,210,437 UART: [cold-reset] --
3,211,229 UART: [state] Locking Datavault
3,212,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,754 UART: [state] Locking ICCM
3,213,186 UART: [exit] Launching FMC @ 0x40000130
3,218,516 UART:
3,218,532 UART: Running Caliptra FMC ...
3,218,940 UART:
3,218,994 UART: [state] CFI Enabled
3,229,258 UART: [fht] FMC Alias Private Key: 7
3,348,560 UART: [art] Extend RT PCRs Done
3,348,988 UART: [art] Lock RT PCRs Done
3,350,716 UART: [art] Populate DV Done
3,359,153 UART: [fht] FMC Alias Private Key: 7
3,360,259 UART: [art] Derive CDI
3,360,539 UART: [art] Store in slot 0x4
3,445,965 UART: [art] Derive Key Pair
3,446,325 UART: [art] Store priv key in slot 0x5
3,459,570 UART: [art] Derive Key Pair - Done
3,474,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,408 UART: [art] PUB.X = 9480FE8ED8E2A1D60370A37B821E653748A7C61815820DFBB7245170389F6CC6E33642562B75EEFFE14493B483BD9E34
3,497,170 UART: [art] PUB.Y = 4F7E5D88E000A2428FE83F6E8B0AA5850D65D4154925A8FC70989B7B75493AFEAD47C48AB94815FBB021AA0E8374CB6D
3,504,099 UART: [art] SIG.R = ECB1676D9088FFC150EE2803298F1D0A6EE4F530BE5E5F7CCAD14A12C304FDDFEA40E24F169EE57178BE8761398F532E
3,510,876 UART: [art] SIG.S = 9CE5398253438D062C01B9FC1B46FE8B340493D81F0BD021AE74A39FF697C4CD4551A5F4E686D4033FB789032FEC597A
3,535,060 UART: Caliptra RT
3,535,311 UART: [state] CFI Enabled
3,656,602 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,078 UART: [rt]cmd =0x4c444556, len=4
3,697,484 >>> mbox cmd response data (687 bytes)
3,697,485 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,760 UART: [rt]cmd =0x49444549, len=4
3,729,259 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,627 ready_for_fw is high
1,362,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,484 >>> mbox cmd response: success
2,980,484 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,041,393 UART:
3,041,409 UART: Running Caliptra FMC ...
3,041,817 UART:
3,041,871 UART: [state] CFI Enabled
3,052,105 UART: [fht] FMC Alias Private Key: 7
3,171,263 UART: [art] Extend RT PCRs Done
3,171,691 UART: [art] Lock RT PCRs Done
3,173,223 UART: [art] Populate DV Done
3,181,582 UART: [fht] FMC Alias Private Key: 7
3,182,524 UART: [art] Derive CDI
3,182,804 UART: [art] Store in slot 0x4
3,268,806 UART: [art] Derive Key Pair
3,269,166 UART: [art] Store priv key in slot 0x5
3,282,785 UART: [art] Derive Key Pair - Done
3,297,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,373 UART: [art] PUB.X = BB75B63D60030ADB344B5C2400575E90589174EBF814E6412C084537C3D1625CD048CFF76BCB2B976D26179EBC3CAF56
3,320,116 UART: [art] PUB.Y = 6BAAF2493C10FCB67358FAA470D9B0913825E9B2B64F874489D8B8476EB81429D2FB14B259303AAFDCDB2DF5675CBCC9
3,327,080 UART: [art] SIG.R = BFC62B0FCCB658D511F74DA7BD5A374C0699C4510B423D6D8B37BC09EB69A296E9E541A446B4819B45DB2E27637A6DFE
3,333,852 UART: [art] SIG.S = F7660BDE092CDB21871F0795F607D03BE210C1BB9441A011DE11C4BB330B3744036EE9D0C345A8BAD2C826DA89A065A2
3,357,750 UART: Caliptra RT
3,358,001 UART: [state] CFI Enabled
3,477,322 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,106 UART: [rt]cmd =0x4c444556, len=4
3,518,794 >>> mbox cmd response data (687 bytes)
3,518,795 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,854 UART: [rt]cmd =0x49444549, len=4
3,550,195 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,897 UART: [state] LifecycleState = Unprovisioned
86,552 UART: [state] DebugLocked = No
87,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,660 UART: [kat] SHA2-256
882,591 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,706 UART: [kat] ++
886,858 UART: [kat] sha1
890,930 UART: [kat] SHA2-256
892,868 UART: [kat] SHA2-384
895,643 UART: [kat] SHA2-512-ACC
897,544 UART: [kat] ECC-384
903,173 UART: [kat] HMAC-384Kdf
908,027 UART: [kat] LMS
1,476,223 UART: [kat] --
1,476,994 UART: [cold-reset] ++
1,477,540 UART: [fht] Storing FHT @ 0x50003400
1,480,359 UART: [idev] ++
1,480,527 UART: [idev] CDI.KEYID = 6
1,480,887 UART: [idev] SUBJECT.KEYID = 7
1,481,311 UART: [idev] UDS.KEYID = 0
1,481,656 ready_for_fw is high
1,481,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,506,481 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,187 UART: [idev] --
1,516,176 UART: [ldev] ++
1,516,344 UART: [ldev] CDI.KEYID = 6
1,516,707 UART: [ldev] SUBJECT.KEYID = 5
1,517,133 UART: [ldev] AUTHORITY.KEYID = 7
1,517,596 UART: [ldev] FE.KEYID = 1
1,522,976 UART: [ldev] Erasing FE.KEYID = 1
1,548,643 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,831 UART: [ldev] --
1,588,188 UART: [fwproc] Waiting for Commands...
1,588,809 UART: [fwproc] Received command 0x46574c44
1,589,600 UART: [fwproc] Received Image of size 118548 bytes
2,934,346 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,614 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,059 >>> mbox cmd response: success
3,133,059 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,134,155 UART: [afmc] ++
3,134,323 UART: [afmc] CDI.KEYID = 6
3,134,685 UART: [afmc] SUBJECT.KEYID = 7
3,135,110 UART: [afmc] AUTHORITY.KEYID = 5
3,170,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,957 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,329 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,012 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,992 UART: [afmc] --
3,213,888 UART: [cold-reset] --
3,214,568 UART: [state] Locking Datavault
3,215,849 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,453 UART: [state] Locking ICCM
3,217,113 UART: [exit] Launching FMC @ 0x40000130
3,222,443 UART:
3,222,459 UART: Running Caliptra FMC ...
3,222,867 UART:
3,223,010 UART: [state] CFI Enabled
3,233,486 UART: [fht] FMC Alias Private Key: 7
3,352,356 UART: [art] Extend RT PCRs Done
3,352,784 UART: [art] Lock RT PCRs Done
3,354,732 UART: [art] Populate DV Done
3,362,877 UART: [fht] FMC Alias Private Key: 7
3,363,897 UART: [art] Derive CDI
3,364,177 UART: [art] Store in slot 0x4
3,449,613 UART: [art] Derive Key Pair
3,449,973 UART: [art] Store priv key in slot 0x5
3,463,074 UART: [art] Derive Key Pair - Done
3,477,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,048 UART: [art] PUB.X = 385CC875B1C26A2B2D69A68CAEBEED75D20E6B3A12FCCF737F9384E8ADC1BF92C15A7DA54D75269BD0C39AF5AE2DA560
3,500,841 UART: [art] PUB.Y = 74AD7540230B24996E4D37AC9D2BD2FB10FF2C97D206041D43219BA4E3FFC256F87E1E900B0F27503FD50AF366F14D83
3,507,779 UART: [art] SIG.R = 97054645CFE9D770E5FFA3BA5D6277D14F5CAD561031749B0C5CB349C809050A676A02579EB2B8988218A018B6042C6E
3,514,526 UART: [art] SIG.S = 26E4CE5C9C1BD56B3D47F23933B46CF592D39EBE7104C933E00D0705D1E8206F4EB2A84ECF2A3D6E4B2F6929B8177559
3,538,480 UART: Caliptra RT
3,538,823 UART: [state] CFI Enabled
3,658,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,283 UART: [rt]cmd =0x4c444556, len=4
3,699,691 >>> mbox cmd response data (687 bytes)
3,699,692 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,729,147 UART: [rt]cmd =0x49444549, len=4
3,731,378 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,318 ready_for_fw is high
1,363,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,691 >>> mbox cmd response: success
2,981,691 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
3,043,642 UART:
3,043,658 UART: Running Caliptra FMC ...
3,044,066 UART:
3,044,209 UART: [state] CFI Enabled
3,054,779 UART: [fht] FMC Alias Private Key: 7
3,173,077 UART: [art] Extend RT PCRs Done
3,173,505 UART: [art] Lock RT PCRs Done
3,175,261 UART: [art] Populate DV Done
3,183,314 UART: [fht] FMC Alias Private Key: 7
3,184,364 UART: [art] Derive CDI
3,184,644 UART: [art] Store in slot 0x4
3,270,152 UART: [art] Derive Key Pair
3,270,512 UART: [art] Store priv key in slot 0x5
3,284,157 UART: [art] Derive Key Pair - Done
3,298,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,857 UART: [art] PUB.X = 52AE133A669EE8C0BAECEA10479BC2082FA35F48C41CD1B30BFDF6E45A0642A879D8068E6F0402CD1F7B71870C911FEF
3,322,622 UART: [art] PUB.Y = 37D19F95BC16510CEE91B10C6101AFEB05A576CAEF4313E69AC04386770C3E9FCF7D5AB08D07D72BD2CDFA0797D6A7A9
3,329,569 UART: [art] SIG.R = C80B9DC4B22E798B1802B223D6A543CB808BE83750B8D78F6233459F868933EBB0B9BBFDC59EC796B94857804E7E8E38
3,336,337 UART: [art] SIG.S = 3352D997F849C24647BCFA1B00F9A301FDB6AB878AF6FECBA37564F13D902B6C388E98DD322692AA720D617BBC9AF5A7
3,360,329 UART: Caliptra RT
3,360,672 UART: [state] CFI Enabled
3,481,364 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,718 UART: [rt]cmd =0x4c444556, len=4
3,522,332 >>> mbox cmd response data (687 bytes)
3,522,333 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,608 UART: [rt]cmd =0x49444549, len=4
3,553,909 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
891,356 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,460 UART: [kat] ++
895,612 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,761 UART: [kat] SHA2-512-ACC
906,662 UART: [kat] ECC-384
916,321 UART: [kat] HMAC-384Kdf
920,753 UART: [kat] LMS
1,169,065 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 ready_for_fw is high
1,174,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,731 UART: [idev] Erasing UDS.KEYID = 0
1,198,111 UART: [idev] Sha1 KeyId Algorithm
1,206,881 UART: [idev] --
1,207,846 UART: [ldev] ++
1,208,014 UART: [ldev] CDI.KEYID = 6
1,208,378 UART: [ldev] SUBJECT.KEYID = 5
1,208,805 UART: [ldev] AUTHORITY.KEYID = 7
1,209,268 UART: [ldev] FE.KEYID = 1
1,214,214 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,834 UART: [ldev] --
1,280,163 UART: [fwproc] Wait for Commands...
1,280,980 UART: [fwproc] Recv command 0x46574c44
1,281,713 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,101 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,276 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,485 >>> mbox cmd response: success
2,824,485 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,825,679 UART: [afmc] ++
2,825,847 UART: [afmc] CDI.KEYID = 6
2,826,210 UART: [afmc] SUBJECT.KEYID = 7
2,826,636 UART: [afmc] AUTHORITY.KEYID = 5
2,862,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,453 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,044 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,745 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,670 UART: [afmc] --
2,905,597 UART: [cold-reset] --
2,906,369 UART: [state] Locking Datavault
2,907,838 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,442 UART: [state] Locking ICCM
2,909,034 UART: [exit] Launching FMC @ 0x40000130
2,914,364 UART:
2,914,380 UART: Running Caliptra FMC ...
2,914,788 UART:
2,914,842 UART: [state] CFI Enabled
2,925,690 UART: [fht] FMC Alias Private Key: 7
3,045,094 UART: [art] Extend RT PCRs Done
3,045,522 UART: [art] Lock RT PCRs Done
3,047,214 UART: [art] Populate DV Done
3,055,299 UART: [fht] FMC Alias Private Key: 7
3,056,345 UART: [art] Derive CDI
3,056,625 UART: [art] Store in slot 0x4
3,142,518 UART: [art] Derive Key Pair
3,142,878 UART: [art] Store priv key in slot 0x5
3,156,518 UART: [art] Derive Key Pair - Done
3,171,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,770 UART: [art] PUB.X = 6378AF3291EF89BCCC606F3702372400047226D16946DEF993FCE7ADE9DA93D690B1DF41483CFE1C427D47C5993C2A5E
3,194,518 UART: [art] PUB.Y = A0E08D838E1F0A5F555021617375F46255F68A8EEA0445A3855419818BF72A73FB0BB696BCE6559C41000E81CB3AD5A3
3,201,434 UART: [art] SIG.R = D0CA5CEF6554B8B303E1F465B0E285FC8EC10747C38ADD3BCA289B9196B0669FBD2A847578DBB4727A337B9A011F7F2A
3,208,209 UART: [art] SIG.S = 17ABDA9266F38B1C08ABC4A12081BD881EB627C6E5085DCDE656C5A9E9C3163B8E2385674E87B68EFC2FCDA279172AD6
3,232,375 UART: Caliptra RT
3,232,626 UART: [state] CFI Enabled
3,352,451 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,035 UART: [rt]cmd =0x4c444556, len=4
3,393,413 >>> mbox cmd response data (687 bytes)
3,393,414 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,639 UART: [rt]cmd =0x49444549, len=4
3,424,978 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,398 ready_for_fw is high
1,059,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,158 >>> mbox cmd response: success
2,678,158 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,739,663 UART:
2,739,679 UART: Running Caliptra FMC ...
2,740,087 UART:
2,740,141 UART: [state] CFI Enabled
2,750,515 UART: [fht] FMC Alias Private Key: 7
2,869,537 UART: [art] Extend RT PCRs Done
2,869,965 UART: [art] Lock RT PCRs Done
2,871,823 UART: [art] Populate DV Done
2,879,914 UART: [fht] FMC Alias Private Key: 7
2,880,994 UART: [art] Derive CDI
2,881,274 UART: [art] Store in slot 0x4
2,966,889 UART: [art] Derive Key Pair
2,967,249 UART: [art] Store priv key in slot 0x5
2,980,967 UART: [art] Derive Key Pair - Done
2,995,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,800 UART: [art] PUB.X = 46774BCCECB5C50D3FF5E6EB50BE4D07EA0368A24145395368D9A5B1810354961A0E88BACE10A4B6EF83428B7C9E862C
3,018,565 UART: [art] PUB.Y = 315E893E7FBD1129C8C3676144F64AA6DCEE2205B65C7728C5F3712CE201AD131930052ED9B5AEBED66628CFF42E63DD
3,025,516 UART: [art] SIG.R = B37ABE58A1F3D6CC5B3ACE9BAE5786AE66FA339A77FA27F7B6CA31BAE307C5A449385E2DF51D3BC11B91747E82B1D5FB
3,032,309 UART: [art] SIG.S = 4A72DC278F07022349DC969F5BABAAE4333F6F0B2CADF107866C0F130015D86BA60D05C2D2676CCE201983F436D6BB2B
3,056,060 UART: Caliptra RT
3,056,311 UART: [state] CFI Enabled
3,176,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,434 UART: [rt]cmd =0x4c444556, len=4
3,217,740 >>> mbox cmd response data (687 bytes)
3,217,741 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,178 UART: [rt]cmd =0x49444549, len=4
3,249,449 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,727 UART: [state] LifecycleState = Unprovisioned
86,382 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,195 UART: [kat] SHA2-256
891,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,849 UART: [kat] ++
896,001 UART: [kat] sha1
900,151 UART: [kat] SHA2-256
902,091 UART: [kat] SHA2-384
904,686 UART: [kat] SHA2-512-ACC
906,587 UART: [kat] ECC-384
916,676 UART: [kat] HMAC-384Kdf
921,352 UART: [kat] LMS
1,169,664 UART: [kat] --
1,170,879 UART: [cold-reset] ++
1,171,385 UART: [fht] FHT @ 0x50003400
1,174,151 UART: [idev] ++
1,174,319 UART: [idev] CDI.KEYID = 6
1,174,680 UART: [idev] SUBJECT.KEYID = 7
1,175,105 UART: [idev] UDS.KEYID = 0
1,175,451 ready_for_fw is high
1,175,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,586 UART: [idev] Sha1 KeyId Algorithm
1,209,538 UART: [idev] --
1,210,743 UART: [ldev] ++
1,210,911 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,702 UART: [ldev] AUTHORITY.KEYID = 7
1,212,165 UART: [ldev] FE.KEYID = 1
1,217,547 UART: [ldev] Erasing FE.KEYID = 1
1,244,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,157 UART: [ldev] --
1,283,510 UART: [fwproc] Wait for Commands...
1,284,079 UART: [fwproc] Recv command 0x46574c44
1,284,812 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,605 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,618 >>> mbox cmd response: success
2,827,618 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,670 UART: [afmc] ++
2,828,838 UART: [afmc] CDI.KEYID = 6
2,829,201 UART: [afmc] SUBJECT.KEYID = 7
2,829,627 UART: [afmc] AUTHORITY.KEYID = 5
2,865,934 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,168 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,049 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,750 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,409 UART: [afmc] --
2,909,378 UART: [cold-reset] --
2,910,258 UART: [state] Locking Datavault
2,911,365 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,969 UART: [state] Locking ICCM
2,912,461 UART: [exit] Launching FMC @ 0x40000130
2,917,791 UART:
2,917,807 UART: Running Caliptra FMC ...
2,918,215 UART:
2,918,358 UART: [state] CFI Enabled
2,928,956 UART: [fht] FMC Alias Private Key: 7
3,048,156 UART: [art] Extend RT PCRs Done
3,048,584 UART: [art] Lock RT PCRs Done
3,050,040 UART: [art] Populate DV Done
3,058,405 UART: [fht] FMC Alias Private Key: 7
3,059,457 UART: [art] Derive CDI
3,059,737 UART: [art] Store in slot 0x4
3,145,480 UART: [art] Derive Key Pair
3,145,840 UART: [art] Store priv key in slot 0x5
3,159,616 UART: [art] Derive Key Pair - Done
3,174,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,954 UART: [art] PUB.X = 3ECE116AF3E11621ABD228125D3A047E58ED0EE254CC35F9A1A89CDE59DE9C2BBD91D843D064A452849D5891057044CB
3,197,725 UART: [art] PUB.Y = C635298C9BCDE9CBC2F532AC77DAFADE000ED143B146DC11F2EAFF27EE60C18F895852DA0B3BA9E03A55B33E3F006A7C
3,204,651 UART: [art] SIG.R = 684A1E69320AB174E440F862381E166DBF24768B67A346625F8D2337D4FF679D22DEB461D71FFE1E8FB580A0F50F2D97
3,211,417 UART: [art] SIG.S = 82F63E9362395E36BCFA1A20171D2F47B63F3431FE1F6251E6C883C97D59E2F775C0114FEF6EA14A26B9C36B78AE25E8
3,234,923 UART: Caliptra RT
3,235,266 UART: [state] CFI Enabled
3,355,211 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,739 UART: [rt]cmd =0x4c444556, len=4
3,396,333 >>> mbox cmd response data (687 bytes)
3,396,334 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,425,523 UART: [rt]cmd =0x49444549, len=4
3,427,914 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,595 ready_for_fw is high
1,058,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,531 >>> mbox cmd response: success
2,679,531 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,134 UART:
2,742,150 UART: Running Caliptra FMC ...
2,742,558 UART:
2,742,701 UART: [state] CFI Enabled
2,753,101 UART: [fht] FMC Alias Private Key: 7
2,871,617 UART: [art] Extend RT PCRs Done
2,872,045 UART: [art] Lock RT PCRs Done
2,873,593 UART: [art] Populate DV Done
2,881,758 UART: [fht] FMC Alias Private Key: 7
2,882,850 UART: [art] Derive CDI
2,883,130 UART: [art] Store in slot 0x4
2,968,817 UART: [art] Derive Key Pair
2,969,177 UART: [art] Store priv key in slot 0x5
2,982,569 UART: [art] Derive Key Pair - Done
2,997,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,586 UART: [art] PUB.X = 6EBDDC7EB3FF0AC4A72B703E3B968095885A3601423BAA2D6CE6AF3EB7B8E621D17920E8BD2ED326051D46DCFA2CE600
3,020,345 UART: [art] PUB.Y = 85FDC8E06DC0012248C75EFB535E6955B0E053928A177CE717359EE0A804D0337AA034F52DF3FF4D913BCF7ACD9B6549
3,027,297 UART: [art] SIG.R = F14EB910A64DB43AA70968897FF1E91CE80D6797F5A82DB3D47BF847417BA96D4A70FF75244A2E1F80209EF9E30BB833
3,034,066 UART: [art] SIG.S = 1443BE5A06AD9DDD438D780627BD8FE03F1F7F5EFF186F2DF809350E0D2E5FC45085A7EB41673FA4F3CF71B3B8ED87BB
3,058,515 UART: Caliptra RT
3,058,858 UART: [state] CFI Enabled
3,179,017 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,609 UART: [rt]cmd =0x4c444556, len=4
3,220,025 >>> mbox cmd response data (687 bytes)
3,220,026 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,257 UART: [rt]cmd =0x49444549, len=4
3,251,604 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,400 UART: [state] LifecycleState = Unprovisioned
86,055 UART: [state] DebugLocked = No
86,725 UART: [state] WD Timer not started. Device not locked for debugging
88,026 UART: [kat] SHA2-256
893,676 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,801 UART: [kat] ++
897,953 UART: [kat] sha1
902,157 UART: [kat] SHA2-256
904,097 UART: [kat] SHA2-384
906,900 UART: [kat] SHA2-512-ACC
908,801 UART: [kat] ECC-384
918,426 UART: [kat] HMAC-384Kdf
922,912 UART: [kat] LMS
1,171,240 UART: [kat] --
1,172,115 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,078 UART: [idev] ++
1,175,246 UART: [idev] CDI.KEYID = 6
1,175,606 UART: [idev] SUBJECT.KEYID = 7
1,176,030 UART: [idev] UDS.KEYID = 0
1,176,375 ready_for_fw is high
1,176,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,012 UART: [idev] Erasing UDS.KEYID = 0
1,201,331 UART: [idev] Sha1 KeyId Algorithm
1,209,823 UART: [idev] --
1,210,985 UART: [ldev] ++
1,211,153 UART: [ldev] CDI.KEYID = 6
1,211,516 UART: [ldev] SUBJECT.KEYID = 5
1,211,942 UART: [ldev] AUTHORITY.KEYID = 7
1,212,405 UART: [ldev] FE.KEYID = 1
1,217,641 UART: [ldev] Erasing FE.KEYID = 1
1,243,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,446 UART: [fwproc] Recv command 0x46574c44
1,284,174 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,445 >>> mbox cmd response: success
2,826,445 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,827,689 UART: [afmc] ++
2,827,857 UART: [afmc] CDI.KEYID = 6
2,828,219 UART: [afmc] SUBJECT.KEYID = 7
2,828,644 UART: [afmc] AUTHORITY.KEYID = 5
2,864,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,046 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,747 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,705 UART: [afmc] --
2,907,643 UART: [cold-reset] --
2,908,619 UART: [state] Locking Datavault
2,909,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,358 UART: [state] Locking ICCM
2,910,858 UART: [exit] Launching FMC @ 0x40000130
2,916,188 UART:
2,916,204 UART: Running Caliptra FMC ...
2,916,612 UART:
2,916,666 UART: [state] CFI Enabled
2,927,214 UART: [fht] FMC Alias Private Key: 7
3,046,076 UART: [art] Extend RT PCRs Done
3,046,504 UART: [art] Lock RT PCRs Done
3,048,274 UART: [art] Populate DV Done
3,056,543 UART: [fht] FMC Alias Private Key: 7
3,057,661 UART: [art] Derive CDI
3,057,941 UART: [art] Store in slot 0x4
3,143,822 UART: [art] Derive Key Pair
3,144,182 UART: [art] Store priv key in slot 0x5
3,157,676 UART: [art] Derive Key Pair - Done
3,172,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,866 UART: [art] PUB.X = BE0D8ACBCDC3599442120E1079FAE592F42A6773CE5B0DC1821BFC4A4341BC275ED145E810C85753686D083B98C194EA
3,195,632 UART: [art] PUB.Y = 0C444B6749CDA09668FC7CF446E9E468D53DC67BF236A5FCFDF8EB31355F3F4A0464F388C90C9367A2FCEE62C2FC7B37
3,202,589 UART: [art] SIG.R = 1DA57FBA08783165F152793F2FB3B8479F3FC6DB7FE5FD68A2736BC498E00C71DC1157CF40F10BA1F8B0C49B9C17CA42
3,209,364 UART: [art] SIG.S = 1B26EA1398AA059B2274B67D110D8207D805EE2663E821A5BF35E70E45DB42FA376D1C45B1F40EB01B9E9175F08F563D
3,233,024 UART: Caliptra RT
3,233,275 UART: [state] CFI Enabled
3,353,903 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,527 UART: [rt]cmd =0x4c444556, len=4
3,394,957 >>> mbox cmd response data (687 bytes)
3,394,958 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,315 UART: [rt]cmd =0x49444549, len=4
3,426,600 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,805 ready_for_fw is high
1,060,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,530 >>> mbox cmd response: success
2,680,530 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,742,583 UART:
2,742,599 UART: Running Caliptra FMC ...
2,743,007 UART:
2,743,061 UART: [state] CFI Enabled
2,753,687 UART: [fht] FMC Alias Private Key: 7
2,872,353 UART: [art] Extend RT PCRs Done
2,872,781 UART: [art] Lock RT PCRs Done
2,874,143 UART: [art] Populate DV Done
2,882,184 UART: [fht] FMC Alias Private Key: 7
2,883,340 UART: [art] Derive CDI
2,883,620 UART: [art] Store in slot 0x4
2,969,513 UART: [art] Derive Key Pair
2,969,873 UART: [art] Store priv key in slot 0x5
2,983,711 UART: [art] Derive Key Pair - Done
2,998,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,593 UART: [art] PUB.X = 4D50BABF28EAC6D49823DC8D40C9DF88187BB574F6B132C662613D83E6F46BB34186F0256D63051DE790B167B5A98893
3,021,362 UART: [art] PUB.Y = 8841CF591550619F3C893B52589AD79446EA6B1BE60319208043AE58E2BD53358CC9752A43B6476E1BD215C0981F9406
3,028,296 UART: [art] SIG.R = 6BF3139D0BE2F7388117412E304E1316F173251CEBD7EA14635A12BB3BAF544D4E703575D5D5F675B23DD5AB624BFE34
3,035,069 UART: [art] SIG.S = DA7ABF951E8EA66D18FAC2230FC9EADE923BCC91BAB3E0C3E5EA015559DE7C57FCE081E74A3FD52B5DF0E3BE4931573F
3,058,519 UART: Caliptra RT
3,058,770 UART: [state] CFI Enabled
3,178,035 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,197 UART: [rt]cmd =0x4c444556, len=4
3,218,817 >>> mbox cmd response data (687 bytes)
3,218,818 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,133 UART: [rt]cmd =0x49444549, len=4
3,250,400 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,662 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
893,429 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,554 UART: [kat] ++
897,706 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,667 UART: [kat] SHA2-512-ACC
908,568 UART: [kat] ECC-384
918,175 UART: [kat] HMAC-384Kdf
922,815 UART: [kat] LMS
1,171,143 UART: [kat] --
1,172,120 UART: [cold-reset] ++
1,172,636 UART: [fht] FHT @ 0x50003400
1,175,305 UART: [idev] ++
1,175,473 UART: [idev] CDI.KEYID = 6
1,175,833 UART: [idev] SUBJECT.KEYID = 7
1,176,257 UART: [idev] UDS.KEYID = 0
1,176,602 ready_for_fw is high
1,176,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,392 UART: [idev] Sha1 KeyId Algorithm
1,209,852 UART: [idev] --
1,211,076 UART: [ldev] ++
1,211,244 UART: [ldev] CDI.KEYID = 6
1,211,607 UART: [ldev] SUBJECT.KEYID = 5
1,212,033 UART: [ldev] AUTHORITY.KEYID = 7
1,212,496 UART: [ldev] FE.KEYID = 1
1,217,842 UART: [ldev] Erasing FE.KEYID = 1
1,243,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,866 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,757 UART: [fwproc] Recv command 0x46574c44
1,284,485 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,093 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,488 >>> mbox cmd response: success
2,827,488 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,828,624 UART: [afmc] ++
2,828,792 UART: [afmc] CDI.KEYID = 6
2,829,154 UART: [afmc] SUBJECT.KEYID = 7
2,829,579 UART: [afmc] AUTHORITY.KEYID = 5
2,865,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,467 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,807 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,404 UART: [afmc] --
2,908,402 UART: [cold-reset] --
2,909,286 UART: [state] Locking Datavault
2,910,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,827 UART: [state] Locking ICCM
2,911,373 UART: [exit] Launching FMC @ 0x40000130
2,916,703 UART:
2,916,719 UART: Running Caliptra FMC ...
2,917,127 UART:
2,917,270 UART: [state] CFI Enabled
2,927,418 UART: [fht] FMC Alias Private Key: 7
3,046,650 UART: [art] Extend RT PCRs Done
3,047,078 UART: [art] Lock RT PCRs Done
3,048,822 UART: [art] Populate DV Done
3,057,129 UART: [fht] FMC Alias Private Key: 7
3,058,141 UART: [art] Derive CDI
3,058,421 UART: [art] Store in slot 0x4
3,144,130 UART: [art] Derive Key Pair
3,144,490 UART: [art] Store priv key in slot 0x5
3,158,184 UART: [art] Derive Key Pair - Done
3,172,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,535 UART: [art] PUB.X = 679552346BF0537405CB102928249470C34BC108AF03B68A561ABC998BA7E0B58A94E76FCD0C9E454804616A17EA45CF
3,196,288 UART: [art] PUB.Y = E4D7D55C915A3A27AD663FFF73A1FD07A37CF3616403F33835A546957C97343D84FF02014996460773C4219D778EAC88
3,203,217 UART: [art] SIG.R = DB801BEB69D8EF4CC4A8C8957C705A9B934ADBBB1F03BE6EF209F9AF4D77BECE7B6C2BB420C3F5A0F63CD6A186B18909
3,210,006 UART: [art] SIG.S = 11CF76F3F9D76E049A5E541EA67C404EE5B08E14AA0170EBFA7C9BB73502F2BB61DC4A0DFC71EE88D2B06858D6A0B865
3,233,420 UART: Caliptra RT
3,233,763 UART: [state] CFI Enabled
3,352,988 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,498 UART: [rt]cmd =0x4c444556, len=4
3,393,878 >>> mbox cmd response data (687 bytes)
3,393,879 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,296 UART: [rt]cmd =0x49444549, len=4
3,425,401 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 ready_for_fw is high
1,060,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,235 >>> mbox cmd response: success
2,678,235 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,740,466 UART:
2,740,482 UART: Running Caliptra FMC ...
2,740,890 UART:
2,741,033 UART: [state] CFI Enabled
2,751,781 UART: [fht] FMC Alias Private Key: 7
2,871,089 UART: [art] Extend RT PCRs Done
2,871,517 UART: [art] Lock RT PCRs Done
2,872,929 UART: [art] Populate DV Done
2,881,074 UART: [fht] FMC Alias Private Key: 7
2,882,216 UART: [art] Derive CDI
2,882,496 UART: [art] Store in slot 0x4
2,968,101 UART: [art] Derive Key Pair
2,968,461 UART: [art] Store priv key in slot 0x5
2,981,647 UART: [art] Derive Key Pair - Done
2,996,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,568 UART: [art] PUB.X = DA678FB4E0A012D14117919B26BF65931F6937918ADC65CF2892E563AF2FFB61798F16D765D3EEB19E6290A270E21654
3,020,338 UART: [art] PUB.Y = 6F9C2187229370986AA696E51C829EAB594E8B64CAD5B53C9930D88FC4911BCF6A496EBA733F91F153DA6D134816D1EA
3,027,294 UART: [art] SIG.R = 92EC6B3E9749DC6F9E44EFA87ED4F159F9620D244F116BBAAC5A99A8EF40BCA4D491208887EEB2D9CD2AB9163B02F1F2
3,034,078 UART: [art] SIG.S = 964A14F80146762EC8F7CAA3FA1FED89F306E852303AB17A6A06B16A5CEA8E6769E943D9EECB5AA67DD262D39C0AC0DA
3,058,704 UART: Caliptra RT
3,059,047 UART: [state] CFI Enabled
3,178,539 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,125 UART: [rt]cmd =0x4c444556, len=4
3,219,593 >>> mbox cmd response data (687 bytes)
3,219,594 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,043 UART: [rt]cmd =0x49444549, len=4
3,251,336 >>> mbox cmd response data (104 bytes)
test test_certs::test_ldev_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,991 UART:
192,354 UART: Running Caliptra ROM ...
193,518 UART:
193,672 UART: [state] CFI Enabled
266,166 UART: [state] LifecycleState = Unprovisioned
268,103 UART: [state] DebugLocked = No
271,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,425 UART: [kat] SHA2-256
446,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,622 UART: [kat] ++
457,098 UART: [kat] sha1
468,900 UART: [kat] SHA2-256
471,550 UART: [kat] SHA2-384
477,831 UART: [kat] SHA2-512-ACC
480,199 UART: [kat] ECC-384
2,768,718 UART: [kat] HMAC-384Kdf
2,799,143 UART: [kat] LMS
3,989,469 UART: [kat] --
3,993,721 UART: [cold-reset] ++
3,995,376 UART: [fht] Storing FHT @ 0x50003400
4,007,001 UART: [idev] ++
4,007,575 UART: [idev] CDI.KEYID = 6
4,008,614 UART: [idev] SUBJECT.KEYID = 7
4,009,797 UART: [idev] UDS.KEYID = 0
4,010,786 ready_for_fw is high
4,010,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,083 UART: [idev] Erasing UDS.KEYID = 0
7,361,000 UART: [idev] Using Sha1 for KeyId Algorithm
7,383,413 UART: [idev] --
7,388,592 UART: [ldev] ++
7,389,218 UART: [ldev] CDI.KEYID = 6
7,390,102 UART: [ldev] SUBJECT.KEYID = 5
7,391,576 UART: [ldev] AUTHORITY.KEYID = 7
7,392,720 UART: [ldev] FE.KEYID = 1
7,434,737 UART: [ldev] Erasing FE.KEYID = 1
10,769,227 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,081,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,096,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,111,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,125,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,145,336 UART: [ldev] --
13,150,329 UART: [fwproc] Waiting for Commands...
13,152,784 UART: [fwproc] Received command 0x46574c44
13,155,032 UART: [fwproc] Received Image of size 118548 bytes
17,256,219 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,333,758 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,406,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,734,977 >>> mbox cmd response: success
17,736,112 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,738,323 UART: [afmc] ++
17,738,939 UART: [afmc] CDI.KEYID = 6
17,739,854 UART: [afmc] SUBJECT.KEYID = 7
17,741,072 UART: [afmc] AUTHORITY.KEYID = 5
21,102,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,401,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,403,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,417,881 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,432,604 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,446,995 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,469,586 UART: [afmc] --
23,473,935 UART: [cold-reset] --
23,478,208 UART: [state] Locking Datavault
23,483,738 UART: [state] Locking PCR0, PCR1 and PCR31
23,485,493 UART: [state] Locking ICCM
23,486,972 UART: [exit] Launching FMC @ 0x40000130
23,495,364 UART:
23,495,614 UART: Running Caliptra FMC ...
23,496,641 UART:
23,496,791 UART: [state] CFI Enabled
23,560,248 UART: [fht] FMC Alias Private Key: 7
25,900,565 UART: [art] Extend RT PCRs Done
25,901,787 UART: [art] Lock RT PCRs Done
25,903,711 UART: [art] Populate DV Done
25,908,904 UART: [fht] FMC Alias Private Key: 7
25,910,601 UART: [art] Derive CDI
25,911,335 UART: [art] Store in slot 0x4
25,968,241 UART: [art] Derive Key Pair
25,969,287 UART: [art] Store priv key in slot 0x5
29,261,861 UART: [art] Derive Key Pair - Done
29,275,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,787 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,292 UART: [art] PUB.X = 125D82A6564ABC8628A1B7A0CF2A80315F31BD76EF2E3CBAA8AEC80C111458819139B1DD7EE032B84C656F2950ADD39A
31,572,607 UART: [art] PUB.Y = 10855931FE62F4EBDAE57D99771624F0E5533002671E9D0A2EE0BA016A75E17FDF81D6157E19BA847BA10A15DB1F9430
31,579,827 UART: [art] SIG.R = BCFBE42B0E5002C7248C54A0CE674900A60FA5FFFE12263267E3C0B85D9CA9946F36A7B2688068C2509EAFF7795573A7
31,587,207 UART: [art] SIG.S = 5E2283590F06927D5A8B9D4E909FA2A30370EBD2BEDA9226FAF0831CEF05C4DFD0BF5328EA5876F502C4A94382ACE7B0
32,892,261 UART: Caliptra RT
32,892,973 UART: [state] CFI Enabled
33,068,704 UART: [rt] RT listening for mailbox commands...
33,100,380 UART: [rt]cmd =0x43455246, len=4
33,113,445 >>> mbox cmd response data (920 bytes)
33,156,084 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,186,130 UART: [rt]cmd =0x43455252, len=4
33,197,619 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,784,368 ready_for_fw is high
3,784,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,923,198 >>> mbox cmd response: success
17,924,291 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,607,719 UART:
23,608,096 UART: Running Caliptra FMC ...
23,609,246 UART:
23,609,409 UART: [state] CFI Enabled
23,677,482 UART: [fht] FMC Alias Private Key: 7
26,018,504 UART: [art] Extend RT PCRs Done
26,019,749 UART: [art] Lock RT PCRs Done
26,021,441 UART: [art] Populate DV Done
26,026,924 UART: [fht] FMC Alias Private Key: 7
26,028,626 UART: [art] Derive CDI
26,029,441 UART: [art] Store in slot 0x4
26,085,919 UART: [art] Derive Key Pair
26,086,986 UART: [art] Store priv key in slot 0x5
29,379,602 UART: [art] Derive Key Pair - Done
29,392,658 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,680,795 UART: [art] Erasing AUTHORITY.KEYID = 7
31,682,307 UART: [art] PUB.X = 031EBABA8FF89AD8261106DAB08F0D64AD37B6E4FE3E4021C7D8BB74237A556E1EEB1CF39C4D6626CDBD59C98C615E66
31,689,606 UART: [art] PUB.Y = 2C9C48DFFD9F019D670BCA9831CD136E9C9EBB730021B2CBBD17B3BF1846A66FDED713E163602BD14D7C1298DF35E8DE
31,696,858 UART: [art] SIG.R = F808125074DA456E71491C654A4A75649B8928A774456E770654BD9A6B2B281A171AD48732F2A46D0BD9F4C04F398C85
31,704,249 UART: [art] SIG.S = 508A963640591CB3A79599EE1B687A7CB2AAB983AAA4D8B1FB305F3341676E6422F201DC247D12742D667A0C8CC4BA5F
33,009,551 UART: Caliptra RT
33,010,279 UART: [state] CFI Enabled
33,186,623 UART: [rt] RT listening for mailbox commands...
33,218,208 UART: [rt]cmd =0x43455246, len=4
33,231,341 >>> mbox cmd response data (920 bytes)
33,273,895 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,303,856 UART: [rt]cmd =0x43455252, len=4
33,315,303 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,405 UART:
192,761 UART: Running Caliptra ROM ...
193,840 UART:
603,595 UART: [state] CFI Enabled
616,916 UART: [state] LifecycleState = Unprovisioned
618,854 UART: [state] DebugLocked = No
620,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,378 UART: [kat] SHA2-256
795,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,644 UART: [kat] ++
806,091 UART: [kat] sha1
816,937 UART: [kat] SHA2-256
819,640 UART: [kat] SHA2-384
824,372 UART: [kat] SHA2-512-ACC
826,741 UART: [kat] ECC-384
3,110,172 UART: [kat] HMAC-384Kdf
3,121,906 UART: [kat] LMS
4,311,971 UART: [kat] --
4,316,530 UART: [cold-reset] ++
4,317,887 UART: [fht] Storing FHT @ 0x50003400
4,329,089 UART: [idev] ++
4,329,691 UART: [idev] CDI.KEYID = 6
4,330,605 UART: [idev] SUBJECT.KEYID = 7
4,331,849 UART: [idev] UDS.KEYID = 0
4,332,829 ready_for_fw is high
4,333,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,745 UART: [idev] Erasing UDS.KEYID = 0
7,623,963 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,791 UART: [idev] --
7,650,412 UART: [ldev] ++
7,650,974 UART: [ldev] CDI.KEYID = 6
7,651,901 UART: [ldev] SUBJECT.KEYID = 5
7,653,154 UART: [ldev] AUTHORITY.KEYID = 7
7,654,375 UART: [ldev] FE.KEYID = 1
7,666,964 UART: [ldev] Erasing FE.KEYID = 1
10,956,228 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,744 UART: [ldev] --
13,318,685 UART: [fwproc] Waiting for Commands...
13,321,150 UART: [fwproc] Received command 0x46574c44
13,323,379 UART: [fwproc] Received Image of size 118548 bytes
17,422,459 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,492,706 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,850 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,048 >>> mbox cmd response: success
17,895,182 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
17,898,449 UART: [afmc] ++
17,899,080 UART: [afmc] CDI.KEYID = 6
17,899,985 UART: [afmc] SUBJECT.KEYID = 7
17,901,246 UART: [afmc] AUTHORITY.KEYID = 5
21,215,215 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,020 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,509,272 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,523,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,538,432 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,552,842 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,573,976 UART: [afmc] --
23,577,179 UART: [cold-reset] --
23,580,182 UART: [state] Locking Datavault
23,585,960 UART: [state] Locking PCR0, PCR1 and PCR31
23,587,655 UART: [state] Locking ICCM
23,589,662 UART: [exit] Launching FMC @ 0x40000130
23,598,043 UART:
23,598,274 UART: Running Caliptra FMC ...
23,599,312 UART:
23,599,453 UART: [state] CFI Enabled
23,607,886 UART: [fht] FMC Alias Private Key: 7
25,947,461 UART: [art] Extend RT PCRs Done
25,948,684 UART: [art] Lock RT PCRs Done
25,950,118 UART: [art] Populate DV Done
25,955,583 UART: [fht] FMC Alias Private Key: 7
25,957,115 UART: [art] Derive CDI
25,957,845 UART: [art] Store in slot 0x4
26,000,212 UART: [art] Derive Key Pair
26,001,223 UART: [art] Store priv key in slot 0x5
29,242,839 UART: [art] Derive Key Pair - Done
29,255,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,083 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,593 UART: [art] PUB.X = 2A04B4CC83CC2F229FF809DEE943DB6E6C0A0AC4E7E4F1AB97DC6BFA017E241424C803437FA45EFDB5CE2474B0C2D9B7
31,544,884 UART: [art] PUB.Y = 8D1DDE2CBECBDC5095B9ACD581C0C0D554814E2B8B0DBCEA06F3F6179182EB69E9C396AAE9DE5A2F513D8C6150EA8C2D
31,552,154 UART: [art] SIG.R = EA26E4D7EE77FF8E573ED74BFC3D459E80A310DF6BBD249F544511E19C41D49F3C98873E36F32ED286E1DBFC600AFE2B
31,559,589 UART: [art] SIG.S = 4411F3575FA59F689D9C6059E79087EA98420D334B23A9E40A059144C480CA278680722CF0810BA85E39B456DC142C02
32,864,031 UART: Caliptra RT
32,864,752 UART: [state] CFI Enabled
32,998,135 UART: [rt] RT listening for mailbox commands...
33,029,711 UART: [rt]cmd =0x43455246, len=4
33,042,743 >>> mbox cmd response data (920 bytes)
33,085,612 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,115,523 UART: [rt]cmd =0x43455252, len=4
33,126,859 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
4,125,037 ready_for_fw is high
4,125,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,414 >>> mbox cmd response: success
18,151,786 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
23,790,386 UART:
23,790,764 UART: Running Caliptra FMC ...
23,791,954 UART:
23,792,123 UART: [state] CFI Enabled
23,800,151 UART: [fht] FMC Alias Private Key: 7
26,140,499 UART: [art] Extend RT PCRs Done
26,141,728 UART: [art] Lock RT PCRs Done
26,143,294 UART: [art] Populate DV Done
26,148,989 UART: [fht] FMC Alias Private Key: 7
26,150,568 UART: [art] Derive CDI
26,151,386 UART: [art] Store in slot 0x4
26,194,086 UART: [art] Derive Key Pair
26,195,087 UART: [art] Store priv key in slot 0x5
29,437,261 UART: [art] Derive Key Pair - Done
29,450,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,966 UART: [art] PUB.X = C8292C13FB8B2FC0DE03050E826F3A6603F1935C05BC7EA832A9D4483DB5640352C361FDFD5170856A1265D1C2316022
31,739,216 UART: [art] PUB.Y = 55F7170602337B9FD90A10ED7D062A8A5A068708C0534CE726F900923151E09171516C591FC2A9A71B5C0DF1107B3CF9
31,746,424 UART: [art] SIG.R = 0738FBE58CAFE5BFBAF7177C97070166739FD1C2252F49391CEA05671E0FDF36F878F2444D7D79A7682CE686EA2837A4
31,753,888 UART: [art] SIG.S = 4FE14EFA2F814955BECBA610020586CEC37CD85F0A43064918C286BF20F3F097C18EF2CDA98372FA1755109D199E74A3
33,059,432 UART: Caliptra RT
33,060,138 UART: [state] CFI Enabled
33,192,957 UART: [rt] RT listening for mailbox commands...
33,224,555 UART: [rt]cmd =0x43455246, len=4
33,237,635 >>> mbox cmd response data (920 bytes)
33,280,420 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,310,271 UART: [rt]cmd =0x43455252, len=4
33,321,822 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,303 UART:
192,654 UART: Running Caliptra ROM ...
193,770 UART:
193,941 UART: [state] CFI Enabled
263,248 UART: [state] LifecycleState = Unprovisioned
265,180 UART: [state] DebugLocked = No
266,719 UART: [state] WD Timer not started. Device not locked for debugging
271,183 UART: [kat] SHA2-256
450,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,561 UART: [kat] ++
462,044 UART: [kat] sha1
473,420 UART: [kat] SHA2-256
476,151 UART: [kat] SHA2-384
483,059 UART: [kat] SHA2-512-ACC
485,419 UART: [kat] ECC-384
2,948,034 UART: [kat] HMAC-384Kdf
2,969,724 UART: [kat] LMS
3,446,253 UART: [kat] --
3,450,815 UART: [cold-reset] ++
3,453,123 UART: [fht] FHT @ 0x50003400
3,465,656 UART: [idev] ++
3,466,284 UART: [idev] CDI.KEYID = 6
3,467,186 UART: [idev] SUBJECT.KEYID = 7
3,468,426 UART: [idev] UDS.KEYID = 0
3,469,420 ready_for_fw is high
3,469,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,676 UART: [idev] Erasing UDS.KEYID = 0
5,986,854 UART: [idev] Sha1 KeyId Algorithm
6,011,217 UART: [idev] --
6,015,212 UART: [ldev] ++
6,015,836 UART: [ldev] CDI.KEYID = 6
6,016,745 UART: [ldev] SUBJECT.KEYID = 5
6,017,956 UART: [ldev] AUTHORITY.KEYID = 7
6,019,186 UART: [ldev] FE.KEYID = 1
6,056,456 UART: [ldev] Erasing FE.KEYID = 1
8,565,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,028 UART: [ldev] --
10,374,446 UART: [fwproc] Wait for Commands...
10,377,650 UART: [fwproc] Recv command 0x46574c44
10,379,639 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,164 >>> mbox cmd response: success
14,339,331 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,341,960 UART: [afmc] ++
14,342,542 UART: [afmc] CDI.KEYID = 6
14,343,531 UART: [afmc] SUBJECT.KEYID = 7
14,344,687 UART: [afmc] AUTHORITY.KEYID = 5
16,874,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,758 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,842 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,395 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,182 UART: [afmc] --
18,693,350 UART: [cold-reset] --
18,698,331 UART: [state] Locking Datavault
18,704,778 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,475 UART: [state] Locking ICCM
18,709,271 UART: [exit] Launching FMC @ 0x40000130
18,717,715 UART:
18,717,948 UART: Running Caliptra FMC ...
18,719,068 UART:
18,719,242 UART: [state] CFI Enabled
18,788,869 UART: [fht] FMC Alias Private Key: 7
20,555,410 UART: [art] Extend RT PCRs Done
20,556,634 UART: [art] Lock RT PCRs Done
20,558,528 UART: [art] Populate DV Done
20,563,991 UART: [fht] FMC Alias Private Key: 7
20,565,692 UART: [art] Derive CDI
20,566,500 UART: [art] Store in slot 0x4
20,621,632 UART: [art] Derive Key Pair
20,622,669 UART: [art] Store priv key in slot 0x5
23,085,822 UART: [art] Derive Key Pair - Done
23,098,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,811,747 UART: [art] Erasing AUTHORITY.KEYID = 7
24,813,246 UART: [art] PUB.X = C23752B0EDBE6BAA4A7B508A2A95B5F22D408B2CE092729C4176A55A8F09AC414491EE8417066E82E7B4336F218F5747
24,820,489 UART: [art] PUB.Y = D68FA1B88A3E63A3A644134A04FAED6669EB54CB598E9696D223BAA2FD53619A343E5CA8DAFA4B703BF4A6B813E32183
24,827,793 UART: [art] SIG.R = 457C011D3F2D71217C34B7B188463CD592D043D85FFDA036293C48A4DB38FF12A5BDA3BD4949AC71AD42733A3B7F785F
24,835,181 UART: [art] SIG.S = 90FE330D5DD9F86282878398741BC5AB171ACF94D3C9FD08732A42AC162957A88C4B8DEC4D8285803D5C0EDF1CF35234
25,813,839 UART: Caliptra RT
25,814,549 UART: [state] CFI Enabled
25,996,344 UART: [rt] RT listening for mailbox commands...
26,027,536 UART: [rt]cmd =0x43455246, len=4
26,040,296 >>> mbox cmd response data (888 bytes)
26,082,630 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,112,555 UART: [rt]cmd =0x43455252, len=4
26,123,838 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,461,008 ready_for_fw is high
3,461,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,286 >>> mbox cmd response: success
14,229,528 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,516,346 UART:
18,516,736 UART: Running Caliptra FMC ...
18,517,872 UART:
18,518,032 UART: [state] CFI Enabled
18,582,760 UART: [fht] FMC Alias Private Key: 7
20,348,985 UART: [art] Extend RT PCRs Done
20,350,205 UART: [art] Lock RT PCRs Done
20,351,772 UART: [art] Populate DV Done
20,357,239 UART: [fht] FMC Alias Private Key: 7
20,358,896 UART: [art] Derive CDI
20,359,709 UART: [art] Store in slot 0x4
20,414,830 UART: [art] Derive Key Pair
20,415,822 UART: [art] Store priv key in slot 0x5
22,879,476 UART: [art] Derive Key Pair - Done
22,892,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,750 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,257 UART: [art] PUB.X = 0A7787C565D6B08FE549BC1BA1D9321C70894429233FECEA4B7D16E87453513C4E664368217779B0A0B6ACBB64D14ECE
24,613,507 UART: [art] PUB.Y = C95BA9BC375C63FF6F5A60C814A813195E8BEE9D7BD64D314CC16B82F73FBB517B464284B9317D50093FCEB6A46CD9A7
24,620,821 UART: [art] SIG.R = F92E38E59934A63D1BF03E93C3BB8CD27A9F806E15EB9DC172C20FD5FEE966813318E426C549CB0B09A8C39C72168138
24,628,213 UART: [art] SIG.S = C84DEB5118FA2900B78E5FB5C33A59E47D3F61E7DC05142B3F0A6EF02D598076750F0568EB08AC249A367F5F9710F95A
25,607,168 UART: Caliptra RT
25,607,874 UART: [state] CFI Enabled
25,787,696 UART: [rt] RT listening for mailbox commands...
25,819,011 UART: [rt]cmd =0x43455246, len=4
25,831,558 >>> mbox cmd response data (888 bytes)
25,874,206 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,904,150 UART: [rt]cmd =0x43455252, len=4
25,915,546 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,425 UART:
192,793 UART: Running Caliptra ROM ...
193,886 UART:
603,744 UART: [state] CFI Enabled
616,215 UART: [state] LifecycleState = Unprovisioned
618,135 UART: [state] DebugLocked = No
619,603 UART: [state] WD Timer not started. Device not locked for debugging
622,865 UART: [kat] SHA2-256
802,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,342 UART: [kat] ++
813,882 UART: [kat] sha1
824,551 UART: [kat] SHA2-256
827,279 UART: [kat] SHA2-384
833,287 UART: [kat] SHA2-512-ACC
835,663 UART: [kat] ECC-384
3,276,232 UART: [kat] HMAC-384Kdf
3,288,909 UART: [kat] LMS
3,765,458 UART: [kat] --
3,770,525 UART: [cold-reset] ++
3,771,397 UART: [fht] FHT @ 0x50003400
3,783,513 UART: [idev] ++
3,784,088 UART: [idev] CDI.KEYID = 6
3,785,010 UART: [idev] SUBJECT.KEYID = 7
3,786,260 UART: [idev] UDS.KEYID = 0
3,787,310 ready_for_fw is high
3,787,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,467 UART: [idev] Erasing UDS.KEYID = 0
6,267,041 UART: [idev] Sha1 KeyId Algorithm
6,289,737 UART: [idev] --
6,295,589 UART: [ldev] ++
6,296,169 UART: [ldev] CDI.KEYID = 6
6,297,260 UART: [ldev] SUBJECT.KEYID = 5
6,298,381 UART: [ldev] AUTHORITY.KEYID = 7
6,299,570 UART: [ldev] FE.KEYID = 1
6,310,996 UART: [ldev] Erasing FE.KEYID = 1
8,788,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,704 UART: [ldev] --
10,584,507 UART: [fwproc] Wait for Commands...
10,586,813 UART: [fwproc] Recv command 0x46574c44
10,588,799 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,439 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,905 >>> mbox cmd response: success
14,550,972 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,553,859 UART: [afmc] ++
14,554,493 UART: [afmc] CDI.KEYID = 6
14,555,403 UART: [afmc] SUBJECT.KEYID = 7
14,556,627 UART: [afmc] AUTHORITY.KEYID = 5
17,061,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,438 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,025 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,480 UART: [afmc] --
18,863,573 UART: [cold-reset] --
18,869,243 UART: [state] Locking Datavault
18,874,389 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,145 UART: [state] Locking ICCM
18,877,977 UART: [exit] Launching FMC @ 0x40000130
18,886,375 UART:
18,886,610 UART: Running Caliptra FMC ...
18,887,708 UART:
18,887,865 UART: [state] CFI Enabled
18,895,996 UART: [fht] FMC Alias Private Key: 7
20,661,968 UART: [art] Extend RT PCRs Done
20,663,189 UART: [art] Lock RT PCRs Done
20,664,770 UART: [art] Populate DV Done
20,670,394 UART: [fht] FMC Alias Private Key: 7
20,671,877 UART: [art] Derive CDI
20,672,691 UART: [art] Store in slot 0x4
20,715,770 UART: [art] Derive Key Pair
20,716,830 UART: [art] Store priv key in slot 0x5
23,143,564 UART: [art] Derive Key Pair - Done
23,156,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,984 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,483 UART: [art] PUB.X = 227D1DE27DBAC6CEED9C02AEF7FC7E9261EFC2716D049FE7A06E6117A674515EC9B5D5FCD5C9FA17C2991694E64359B3
24,871,786 UART: [art] PUB.Y = 9311350F3E10C8D12C6DD2D1AD4754FA0EE7D594FF4D86BFECC15308FD538265B8FA39A5D129F7D1CD25842ACD54313A
24,879,021 UART: [art] SIG.R = C5B4A3D7B9DE00BB6390BB1DD05012691BC2B81A492DEBF07B37648A921B22A7D4B3153F543AA04A2D759FC2C46E4E29
24,886,413 UART: [art] SIG.S = DF09E12D24A363E9EE3A78C5C8C934940CE27549B5616FC3B2080D910DF9857FD8483D8F26E06AF2FB0F7E5774EC64B1
25,865,094 UART: Caliptra RT
25,865,794 UART: [state] CFI Enabled
25,997,336 UART: [rt] RT listening for mailbox commands...
26,028,478 UART: [rt]cmd =0x43455246, len=4
26,041,079 >>> mbox cmd response data (888 bytes)
26,082,885 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,112,889 UART: [rt]cmd =0x43455252, len=4
26,124,285 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,780,601 ready_for_fw is high
3,780,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,695 >>> mbox cmd response: success
14,446,790 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
18,698,059 UART:
18,698,441 UART: Running Caliptra FMC ...
18,699,580 UART:
18,699,737 UART: [state] CFI Enabled
18,707,412 UART: [fht] FMC Alias Private Key: 7
20,473,679 UART: [art] Extend RT PCRs Done
20,474,899 UART: [art] Lock RT PCRs Done
20,476,418 UART: [art] Populate DV Done
20,481,995 UART: [fht] FMC Alias Private Key: 7
20,483,589 UART: [art] Derive CDI
20,484,428 UART: [art] Store in slot 0x4
20,527,144 UART: [art] Derive Key Pair
20,528,149 UART: [art] Store priv key in slot 0x5
22,955,102 UART: [art] Derive Key Pair - Done
22,967,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,029 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,539 UART: [art] PUB.X = 54400FA5E7959BBAF10236FF2769C237BEBFC46D2E64A95BA391E1F3558606C12B7315D33E2BA780CB1F0C2A2EC4D503
24,682,849 UART: [art] PUB.Y = ABFD2DBB8C079C7C568ECB61EB471B3A6C739D15C330917FE96397C480FBD747290814B4617A8E8A87B44E7D509B4CFF
24,690,110 UART: [art] SIG.R = BDEF3B386A68904B52F730B65C0B1F1199CA6FED14107C37BF8A048211097555DDC35F26224F581012D969E44325401E
24,697,460 UART: [art] SIG.S = 6046F68CBC9136A93770CB2F12F9E27B31FC07D461441A351312A0CEAB9DC940C967AEBE77045E96FF256F3F60A29283
25,676,506 UART: Caliptra RT
25,677,220 UART: [state] CFI Enabled
25,809,922 UART: [rt] RT listening for mailbox commands...
25,841,157 UART: [rt]cmd =0x43455246, len=4
25,853,995 >>> mbox cmd response data (888 bytes)
25,895,423 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
25,925,548 UART: [rt]cmd =0x43455252, len=4
25,937,093 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,013 UART:
192,395 UART: Running Caliptra ROM ...
193,586 UART:
193,745 UART: [state] CFI Enabled
264,144 UART: [state] LifecycleState = Unprovisioned
266,576 UART: [state] DebugLocked = No
268,456 UART: [state] WD Timer not started. Device not locked for debugging
272,912 UART: [kat] SHA2-256
462,803 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,546 UART: [kat] ++
473,995 UART: [kat] sha1
484,011 UART: [kat] SHA2-256
487,017 UART: [kat] SHA2-384
492,299 UART: [kat] SHA2-512-ACC
494,885 UART: [kat] ECC-384
2,948,042 UART: [kat] HMAC-384Kdf
2,972,786 UART: [kat] LMS
3,504,573 UART: [kat] --
3,509,122 UART: [cold-reset] ++
3,510,914 UART: [fht] FHT @ 0x50003400
3,522,391 UART: [idev] ++
3,523,114 UART: [idev] CDI.KEYID = 6
3,524,146 UART: [idev] SUBJECT.KEYID = 7
3,525,246 UART: [idev] UDS.KEYID = 0
3,526,190 ready_for_fw is high
3,526,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,929 UART: [idev] Erasing UDS.KEYID = 0
6,029,553 UART: [idev] Sha1 KeyId Algorithm
6,051,809 UART: [idev] --
6,057,510 UART: [ldev] ++
6,058,193 UART: [ldev] CDI.KEYID = 6
6,059,082 UART: [ldev] SUBJECT.KEYID = 5
6,060,294 UART: [ldev] AUTHORITY.KEYID = 7
6,061,475 UART: [ldev] FE.KEYID = 1
6,101,313 UART: [ldev] Erasing FE.KEYID = 1
8,609,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,389 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,434 UART: [ldev] --
10,414,044 UART: [fwproc] Wait for Commands...
10,416,033 UART: [fwproc] Recv command 0x46574c44
10,418,344 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,769 >>> mbox cmd response: success
14,676,788 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,679,687 UART: [afmc] ++
14,680,383 UART: [afmc] CDI.KEYID = 6
14,681,489 UART: [afmc] SUBJECT.KEYID = 7
14,683,026 UART: [afmc] AUTHORITY.KEYID = 5
17,210,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,243 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,472 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,003,966 UART: [afmc] --
19,006,911 UART: [cold-reset] --
19,010,500 UART: [state] Locking Datavault
19,015,789 UART: [state] Locking PCR0, PCR1 and PCR31
19,017,927 UART: [state] Locking ICCM
19,020,810 UART: [exit] Launching FMC @ 0x40000130
19,029,468 UART:
19,029,703 UART: Running Caliptra FMC ...
19,030,811 UART:
19,030,970 UART: [state] CFI Enabled
19,092,611 UART: [fht] FMC Alias Private Key: 7
20,858,575 UART: [art] Extend RT PCRs Done
20,859,791 UART: [art] Lock RT PCRs Done
20,861,276 UART: [art] Populate DV Done
20,866,960 UART: [fht] FMC Alias Private Key: 7
20,868,602 UART: [art] Derive CDI
20,869,414 UART: [art] Store in slot 0x4
20,924,919 UART: [art] Derive Key Pair
20,925,920 UART: [art] Store priv key in slot 0x5
23,388,662 UART: [art] Derive Key Pair - Done
23,401,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,645 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,154 UART: [art] PUB.X = 3814E400F1CAEF4EBB3CEF2B5CBBE0FCDD06CEBADE55CFFD67846F4B3A394E0DD415FBE3D69D64EBDD9EEAC12F8A83AE
25,122,455 UART: [art] PUB.Y = 8AA67A781125B4C73EE48BA147F88A0FF2C18061F49D38C56DDB060AC805BD0DE4B8A1F7269E608F5A62A39E046EA8AE
25,129,682 UART: [art] SIG.R = 4FD793179B22C77B8310C2B5CCBF69944371A481341212CDEE43BAEA881FEDD607988B66381C0A5A9E0C9688350F3AD2
25,137,076 UART: [art] SIG.S = D4EA49768EBAA4F802B1F41A42D1FFABCDEB83DFD26D80AACBD0D16DCE2C7EF27EFB0F8A5A69CB794F2835445E87561F
26,115,949 UART: Caliptra RT
26,116,639 UART: [state] CFI Enabled
26,296,023 UART: [rt] RT listening for mailbox commands...
26,327,337 UART: [rt]cmd =0x43455246, len=4
26,340,089 >>> mbox cmd response data (888 bytes)
26,382,153 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,412,226 UART: [rt]cmd =0x43455252, len=4
26,423,724 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,437,830 ready_for_fw is high
3,438,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,901 >>> mbox cmd response: success
14,819,244 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,120,070 UART:
19,120,450 UART: Running Caliptra FMC ...
19,121,588 UART:
19,121,763 UART: [state] CFI Enabled
19,180,559 UART: [fht] FMC Alias Private Key: 7
20,946,764 UART: [art] Extend RT PCRs Done
20,947,970 UART: [art] Lock RT PCRs Done
20,949,812 UART: [art] Populate DV Done
20,954,965 UART: [fht] FMC Alias Private Key: 7
20,956,558 UART: [art] Derive CDI
20,957,296 UART: [art] Store in slot 0x4
21,013,847 UART: [art] Derive Key Pair
21,014,915 UART: [art] Store priv key in slot 0x5
23,477,879 UART: [art] Derive Key Pair - Done
23,490,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,046 UART: [art] PUB.X = 19678160CDBEE7DA30894B85DD58D86B6C06639DC978F528461D1958651B4AC390574A068585C6F80FF9DEA306DF0605
25,212,307 UART: [art] PUB.Y = B0DD0DFA938EE5BBC04F546EB05C51D68455D7B03995E2CFF45A265164696C3B05B07B6A74EDAF9802CD1889AB59AA99
25,219,554 UART: [art] SIG.R = F2EC0A3388F8F06DE98A7DDFCFD795B96269EF2124803E6C28360BD58600AC9CE3AC5D6189A877BCABE0F76867D09EF6
25,226,964 UART: [art] SIG.S = D0BA0BDF1FD32C85DAF67417958583F7E2364161ACD87CD5C373F7BE544157639D0C3EDDAAB438E2AB70008F67BCDF28
26,205,482 UART: Caliptra RT
26,206,196 UART: [state] CFI Enabled
26,387,824 UART: [rt] RT listening for mailbox commands...
26,419,232 UART: [rt]cmd =0x43455246, len=4
26,431,875 >>> mbox cmd response data (888 bytes)
26,473,683 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,503,624 UART: [rt]cmd =0x43455252, len=4
26,514,835 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,431 UART:
192,871 UART: Running Caliptra ROM ...
194,004 UART:
603,533 UART: [state] CFI Enabled
615,886 UART: [state] LifecycleState = Unprovisioned
618,258 UART: [state] DebugLocked = No
620,996 UART: [state] WD Timer not started. Device not locked for debugging
625,127 UART: [kat] SHA2-256
815,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,830 UART: [kat] ++
826,355 UART: [kat] sha1
837,658 UART: [kat] SHA2-256
840,664 UART: [kat] SHA2-384
845,092 UART: [kat] SHA2-512-ACC
847,693 UART: [kat] ECC-384
3,289,123 UART: [kat] HMAC-384Kdf
3,301,364 UART: [kat] LMS
3,833,145 UART: [kat] --
3,837,445 UART: [cold-reset] ++
3,838,886 UART: [fht] FHT @ 0x50003400
3,850,385 UART: [idev] ++
3,851,033 UART: [idev] CDI.KEYID = 6
3,852,072 UART: [idev] SUBJECT.KEYID = 7
3,853,187 UART: [idev] UDS.KEYID = 0
3,854,117 ready_for_fw is high
3,854,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,277 UART: [idev] Erasing UDS.KEYID = 0
6,326,953 UART: [idev] Sha1 KeyId Algorithm
6,349,185 UART: [idev] --
6,354,047 UART: [ldev] ++
6,354,787 UART: [ldev] CDI.KEYID = 6
6,355,699 UART: [ldev] SUBJECT.KEYID = 5
6,356,858 UART: [ldev] AUTHORITY.KEYID = 7
6,358,090 UART: [ldev] FE.KEYID = 1
6,369,496 UART: [ldev] Erasing FE.KEYID = 1
8,845,975 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,563,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,578,458 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,593,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,608,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,629,704 UART: [ldev] --
10,635,689 UART: [fwproc] Wait for Commands...
10,637,139 UART: [fwproc] Recv command 0x46574c44
10,639,404 UART: [fwproc] Recv'd Img size: 118548 bytes
14,133,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,209,083 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,332,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,893,774 >>> mbox cmd response: success
14,894,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
14,897,960 UART: [afmc] ++
14,898,721 UART: [afmc] CDI.KEYID = 6
14,899,833 UART: [afmc] SUBJECT.KEYID = 7
14,901,400 UART: [afmc] AUTHORITY.KEYID = 5
17,404,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,123,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,125,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,140,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,156,107 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,171,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,194,555 UART: [afmc] --
19,197,297 UART: [cold-reset] --
19,201,218 UART: [state] Locking Datavault
19,207,394 UART: [state] Locking PCR0, PCR1 and PCR31
19,209,595 UART: [state] Locking ICCM
19,211,943 UART: [exit] Launching FMC @ 0x40000130
19,220,613 UART:
19,220,857 UART: Running Caliptra FMC ...
19,221,884 UART:
19,222,055 UART: [state] CFI Enabled
19,229,898 UART: [fht] FMC Alias Private Key: 7
20,995,721 UART: [art] Extend RT PCRs Done
20,996,940 UART: [art] Lock RT PCRs Done
20,998,538 UART: [art] Populate DV Done
21,004,066 UART: [fht] FMC Alias Private Key: 7
21,005,832 UART: [art] Derive CDI
21,006,652 UART: [art] Store in slot 0x4
21,049,722 UART: [art] Derive Key Pair
21,050,761 UART: [art] Store priv key in slot 0x5
23,477,313 UART: [art] Derive Key Pair - Done
23,490,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,196,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,190 UART: [art] PUB.X = 7E4EDB6CC2F5999DB86E5808BCD80C266926180BF45F4C3B17C321C6E2CE0C96ECFF63FCD339A6548CD8834F1010CB76
25,205,460 UART: [art] PUB.Y = 1DC268BCB7C70F74F07C0C2F1AC1970C309F07652FB713A92FC2A611C0B19C5D4D5FDA652C86CB76CF613F5EE4086D23
25,212,710 UART: [art] SIG.R = 2A7977D422AD3F068DF412069A89FEAF73233F5505AC58498F3AAAF57259EB2F7512B5D5E95709368D2A99EA0089028A
25,220,094 UART: [art] SIG.S = B2B535CBF757A9778BF84A64296972B84D587DA274628DB1DC65B8F818D404598A742633A32ED445ADEC406667E18508
26,198,669 UART: Caliptra RT
26,199,358 UART: [state] CFI Enabled
26,331,274 UART: [rt] RT listening for mailbox commands...
26,362,739 UART: [rt]cmd =0x43455246, len=4
26,375,558 >>> mbox cmd response data (888 bytes)
26,418,851 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,448,828 UART: [rt]cmd =0x43455252, len=4
26,460,115 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,758,412 ready_for_fw is high
3,759,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,189 >>> mbox cmd response: success
15,050,410 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
19,297,553 UART:
19,297,933 UART: Running Caliptra FMC ...
19,299,131 UART:
19,299,299 UART: [state] CFI Enabled
19,307,140 UART: [fht] FMC Alias Private Key: 7
21,073,739 UART: [art] Extend RT PCRs Done
21,074,965 UART: [art] Lock RT PCRs Done
21,076,493 UART: [art] Populate DV Done
21,082,239 UART: [fht] FMC Alias Private Key: 7
21,083,819 UART: [art] Derive CDI
21,084,574 UART: [art] Store in slot 0x4
21,127,026 UART: [art] Derive Key Pair
21,128,037 UART: [art] Store priv key in slot 0x5
23,555,013 UART: [art] Derive Key Pair - Done
23,568,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,699 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,218 UART: [art] PUB.X = 60A61AE566A3E721BB0D33C76588BE7BEB8DF78B1F33DF5A78800662A63EF7B03CE722712FBFF899F5C493FD7634B8D8
25,283,438 UART: [art] PUB.Y = EC2BF590C72B5B79B62FA95DFE38D4EC0188948200E5755C8D434BFACFACBEA65B0921EECC21653C481744CA7A65E44D
25,290,697 UART: [art] SIG.R = 3E2FE8AE8B66555BA0F1DA13A3E399175BBC4D3E3B96BAC6871ACD55B3050FC527C2A62F49C2566EB68367195925CD98
25,298,111 UART: [art] SIG.S = E5951AF18034E84029AB088EE71492BE804C1B6EA3830C3F4AB1A296A7CFA8E483E040DB5191468BED21A139D1858D81
26,277,489 UART: Caliptra RT
26,278,184 UART: [state] CFI Enabled
26,410,483 UART: [rt] RT listening for mailbox commands...
26,442,060 UART: [rt]cmd =0x43455246, len=4
26,454,819 >>> mbox cmd response data (888 bytes)
26,497,823 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,527,700 UART: [rt]cmd =0x43455252, len=4
26,539,313 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,121 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
890,311 UART: [kat] SHA2-256
892,249 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,392 UART: [kat] HMAC-384Kdf
906,952 UART: [kat] LMS
1,475,148 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,815 UART: [fht] Storing FHT @ 0x50003400
1,479,810 UART: [idev] ++
1,479,978 UART: [idev] CDI.KEYID = 6
1,480,338 UART: [idev] SUBJECT.KEYID = 7
1,480,762 UART: [idev] UDS.KEYID = 0
1,481,107 ready_for_fw is high
1,481,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,505,098 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,622 UART: [idev] --
1,514,629 UART: [ldev] ++
1,514,797 UART: [ldev] CDI.KEYID = 6
1,515,160 UART: [ldev] SUBJECT.KEYID = 5
1,515,586 UART: [ldev] AUTHORITY.KEYID = 7
1,516,049 UART: [ldev] FE.KEYID = 1
1,521,193 UART: [ldev] Erasing FE.KEYID = 1
1,546,460 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,350 UART: [ldev] --
1,585,653 UART: [fwproc] Waiting for Commands...
1,586,428 UART: [fwproc] Received command 0x46574c44
1,587,219 UART: [fwproc] Received Image of size 118548 bytes
2,931,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,405 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,623 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,822 >>> mbox cmd response: success
3,130,822 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,131,874 UART: [afmc] ++
3,132,042 UART: [afmc] CDI.KEYID = 6
3,132,404 UART: [afmc] SUBJECT.KEYID = 7
3,132,829 UART: [afmc] AUTHORITY.KEYID = 5
3,168,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,202 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,574 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,257 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,121 UART: [afmc] --
3,211,085 UART: [cold-reset] --
3,212,233 UART: [state] Locking Datavault
3,213,278 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,882 UART: [state] Locking ICCM
3,214,326 UART: [exit] Launching FMC @ 0x40000130
3,219,656 UART:
3,219,672 UART: Running Caliptra FMC ...
3,220,080 UART:
3,220,134 UART: [state] CFI Enabled
3,230,728 UART: [fht] FMC Alias Private Key: 7
3,349,552 UART: [art] Extend RT PCRs Done
3,349,980 UART: [art] Lock RT PCRs Done
3,351,124 UART: [art] Populate DV Done
3,359,173 UART: [fht] FMC Alias Private Key: 7
3,360,199 UART: [art] Derive CDI
3,360,479 UART: [art] Store in slot 0x4
3,446,481 UART: [art] Derive Key Pair
3,446,841 UART: [art] Store priv key in slot 0x5
3,459,622 UART: [art] Derive Key Pair - Done
3,474,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,301 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,066 UART: [art] PUB.X = 9AEDFE9BA94C213BC753828F6EE1D0DD85DBBD6741E334729F3091C991D0C85B3E59BAB68285B81ED98887AF3DAC17FC
3,497,854 UART: [art] PUB.Y = DF2859CDFEB7B2A3C155FA7DAF90F16A50C86871D203967E663855064655856BC3D96B3078DC0343DED5579E4D756ED1
3,504,799 UART: [art] SIG.R = BF7B7FC2E72C0FD009B01F0D7F43E62EE919F1F50CF777B7C6941417C637E81601CEE0C4DB3596CDEC367308FCF33B39
3,511,565 UART: [art] SIG.S = 03BAF5A55607F7380DCD30DB5D02B98C14BC380E9FA983B5C1981D69E8828DE3D989BA2FFE103E4CC5B4C80E531B2C5E
3,535,515 UART: Caliptra RT
3,535,766 UART: [state] CFI Enabled
3,655,808 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,276 UART: [rt]cmd =0x43455246, len=4
3,698,580 >>> mbox cmd response data (920 bytes)
3,698,581 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,980 UART: [rt]cmd =0x43455252, len=4
3,738,801 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,671 ready_for_fw is high
1,362,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,548 >>> mbox cmd response: success
2,982,548 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,044,161 UART:
3,044,177 UART: Running Caliptra FMC ...
3,044,585 UART:
3,044,639 UART: [state] CFI Enabled
3,055,133 UART: [fht] FMC Alias Private Key: 7
3,173,941 UART: [art] Extend RT PCRs Done
3,174,369 UART: [art] Lock RT PCRs Done
3,176,235 UART: [art] Populate DV Done
3,184,430 UART: [fht] FMC Alias Private Key: 7
3,185,388 UART: [art] Derive CDI
3,185,668 UART: [art] Store in slot 0x4
3,271,332 UART: [art] Derive Key Pair
3,271,692 UART: [art] Store priv key in slot 0x5
3,285,121 UART: [art] Derive Key Pair - Done
3,299,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,311 UART: [art] PUB.X = D84EE1A7FC093804FE637A11AC2D5A0F7FABE74EA73BDE421ED7DBC42B0074221DED0F8958319401844BC5FF00D5D5D9
3,323,040 UART: [art] PUB.Y = 04B8977DDF51E3FFA6D42CA42AFB91546C64006B2CD7D8D361895D99653E7A6A2BDC0E1FE1C60EE4B13F62E024275C11
3,329,971 UART: [art] SIG.R = FBBA53A827D35B3F313AD6EE362E1F6A0CCF5E1147FEA009F184672633937DC434D2618240903CE9FFFBC68EDB4092C3
3,336,747 UART: [art] SIG.S = A1839C4CBB4051AFF7FCDCB81D4C861BA13B01823CF2A2A796190E6AB631A53191827EAD91412DCE0F9F0A4E0CA45058
3,360,770 UART: Caliptra RT
3,361,021 UART: [state] CFI Enabled
3,481,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,454 UART: [rt]cmd =0x43455246, len=4
3,523,952 >>> mbox cmd response data (920 bytes)
3,523,953 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,376 UART: [rt]cmd =0x43455252, len=4
3,564,130 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,322 UART: [kat] SHA2-256
882,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,368 UART: [kat] ++
886,520 UART: [kat] sha1
890,850 UART: [kat] SHA2-256
892,788 UART: [kat] SHA2-384
895,393 UART: [kat] SHA2-512-ACC
897,294 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,245 UART: [kat] LMS
1,475,441 UART: [kat] --
1,476,206 UART: [cold-reset] ++
1,476,698 UART: [fht] Storing FHT @ 0x50003400
1,479,511 UART: [idev] ++
1,479,679 UART: [idev] CDI.KEYID = 6
1,480,039 UART: [idev] SUBJECT.KEYID = 7
1,480,463 UART: [idev] UDS.KEYID = 0
1,480,808 ready_for_fw is high
1,480,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,239 UART: [idev] Erasing UDS.KEYID = 0
1,504,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,149 UART: [idev] --
1,513,982 UART: [ldev] ++
1,514,150 UART: [ldev] CDI.KEYID = 6
1,514,513 UART: [ldev] SUBJECT.KEYID = 5
1,514,939 UART: [ldev] AUTHORITY.KEYID = 7
1,515,402 UART: [ldev] FE.KEYID = 1
1,520,728 UART: [ldev] Erasing FE.KEYID = 1
1,546,809 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,677 UART: [ldev] --
1,585,974 UART: [fwproc] Waiting for Commands...
1,586,631 UART: [fwproc] Received command 0x46574c44
1,587,422 UART: [fwproc] Received Image of size 118548 bytes
2,932,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,900 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,491 >>> mbox cmd response: success
3,131,491 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,132,531 UART: [afmc] ++
3,132,699 UART: [afmc] CDI.KEYID = 6
3,133,061 UART: [afmc] SUBJECT.KEYID = 7
3,133,486 UART: [afmc] AUTHORITY.KEYID = 5
3,169,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,659 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,439 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,148 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,031 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,714 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,572 UART: [afmc] --
3,212,544 UART: [cold-reset] --
3,213,216 UART: [state] Locking Datavault
3,214,367 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,971 UART: [state] Locking ICCM
3,215,603 UART: [exit] Launching FMC @ 0x40000130
3,220,933 UART:
3,220,949 UART: Running Caliptra FMC ...
3,221,357 UART:
3,221,500 UART: [state] CFI Enabled
3,232,140 UART: [fht] FMC Alias Private Key: 7
3,351,152 UART: [art] Extend RT PCRs Done
3,351,580 UART: [art] Lock RT PCRs Done
3,353,220 UART: [art] Populate DV Done
3,361,777 UART: [fht] FMC Alias Private Key: 7
3,362,883 UART: [art] Derive CDI
3,363,163 UART: [art] Store in slot 0x4
3,448,881 UART: [art] Derive Key Pair
3,449,241 UART: [art] Store priv key in slot 0x5
3,462,646 UART: [art] Derive Key Pair - Done
3,477,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,530 UART: [art] PUB.X = 90EB560C929C566D97C381CFFAC92AB503677E1963C6A71F51EA45F19C84CFCD54C2263FD0CE7C4FEE247D657F6B29B3
3,500,308 UART: [art] PUB.Y = ECF96729A6305D8D51F39C2C0C6854CD7AEFC6D95FB0D2217D16BDC27C23118CFAF9BAD067B5FEBED74D82DD84961E27
3,507,277 UART: [art] SIG.R = 19510C9524E51B8EDAC2861C412560FE38BE87BC56FB68DFB7B8EFED30CA6BA64499F628A838DDE6821E3A85312821EC
3,514,056 UART: [art] SIG.S = 861AE70DFA65694BD91C10CCACE1F3BF4F59EA804904E669C964A7CD9A86A6EDA31BE2A408D970898145F01DFB1631AF
3,537,339 UART: Caliptra RT
3,537,682 UART: [state] CFI Enabled
3,657,970 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,840 UART: [rt]cmd =0x43455246, len=4
3,701,206 >>> mbox cmd response data (920 bytes)
3,701,207 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,648 UART: [rt]cmd =0x43455252, len=4
3,741,515 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,326 ready_for_fw is high
1,363,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,775 >>> mbox cmd response: success
2,981,775 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,044,178 UART:
3,044,194 UART: Running Caliptra FMC ...
3,044,602 UART:
3,044,745 UART: [state] CFI Enabled
3,055,671 UART: [fht] FMC Alias Private Key: 7
3,174,321 UART: [art] Extend RT PCRs Done
3,174,749 UART: [art] Lock RT PCRs Done
3,176,353 UART: [art] Populate DV Done
3,184,536 UART: [fht] FMC Alias Private Key: 7
3,185,554 UART: [art] Derive CDI
3,185,834 UART: [art] Store in slot 0x4
3,271,520 UART: [art] Derive Key Pair
3,271,880 UART: [art] Store priv key in slot 0x5
3,285,405 UART: [art] Derive Key Pair - Done
3,300,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,320 UART: [art] PUB.X = 47A2D48B8939AF77092CA6D36ED94A473181D81B0D13CDBEF9FB32D997DFAF19B2E741CDAB31C1CA037360E0C6C63807
3,323,092 UART: [art] PUB.Y = CE1DF471257D03A001A0C3184119BA22BE1F9D25CD6A9F2E0A0205D7F6D1F5FDEAE44C88E56F373372ABBA62C4BAC939
3,330,045 UART: [art] SIG.R = 490DF1E1120A11B11CFB354C8E874EA04206D2C12E3057FD0AED0FE6E51B30FD87685BFD8C698B9354F767E1B0FC20A9
3,336,812 UART: [art] SIG.S = 891AF94434D004A93FB045920F0465214B7CCDA110A0DF26A6A79481859610C9709211D15413BAA769CB390F2CC7D703
3,360,873 UART: Caliptra RT
3,361,216 UART: [state] CFI Enabled
3,480,802 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,260 UART: [rt]cmd =0x43455246, len=4
3,523,600 >>> mbox cmd response data (920 bytes)
3,523,601 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,924 UART: [rt]cmd =0x43455252, len=4
3,563,791 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,255 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
915,501 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,210 UART: [cold-reset] ++
1,169,702 UART: [fht] FHT @ 0x50003400
1,172,360 UART: [idev] ++
1,172,528 UART: [idev] CDI.KEYID = 6
1,172,889 UART: [idev] SUBJECT.KEYID = 7
1,173,314 UART: [idev] UDS.KEYID = 0
1,173,660 ready_for_fw is high
1,173,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,197,851 UART: [idev] Sha1 KeyId Algorithm
1,206,607 UART: [idev] --
1,207,560 UART: [ldev] ++
1,207,728 UART: [ldev] CDI.KEYID = 6
1,208,092 UART: [ldev] SUBJECT.KEYID = 5
1,208,519 UART: [ldev] AUTHORITY.KEYID = 7
1,208,982 UART: [ldev] FE.KEYID = 1
1,214,066 UART: [ldev] Erasing FE.KEYID = 1
1,240,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,796 UART: [ldev] --
1,280,023 UART: [fwproc] Wait for Commands...
1,280,776 UART: [fwproc] Recv command 0x46574c44
1,281,509 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,699 >>> mbox cmd response: success
2,824,699 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,825,779 UART: [afmc] ++
2,825,947 UART: [afmc] CDI.KEYID = 6
2,826,310 UART: [afmc] SUBJECT.KEYID = 7
2,826,736 UART: [afmc] AUTHORITY.KEYID = 5
2,861,987 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,237 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,947 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,828 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,404 UART: [afmc] --
2,905,217 UART: [cold-reset] --
2,906,229 UART: [state] Locking Datavault
2,907,392 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,996 UART: [state] Locking ICCM
2,908,606 UART: [exit] Launching FMC @ 0x40000130
2,913,936 UART:
2,913,952 UART: Running Caliptra FMC ...
2,914,360 UART:
2,914,414 UART: [state] CFI Enabled
2,924,732 UART: [fht] FMC Alias Private Key: 7
3,043,414 UART: [art] Extend RT PCRs Done
3,043,842 UART: [art] Lock RT PCRs Done
3,045,528 UART: [art] Populate DV Done
3,054,035 UART: [fht] FMC Alias Private Key: 7
3,055,199 UART: [art] Derive CDI
3,055,479 UART: [art] Store in slot 0x4
3,141,350 UART: [art] Derive Key Pair
3,141,710 UART: [art] Store priv key in slot 0x5
3,154,800 UART: [art] Derive Key Pair - Done
3,169,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,925 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,690 UART: [art] PUB.X = DAB2CA73548206900642CEEDA58F96D1510F2F2F9ED173AAF744FC77720B80386C7573A0C9BE865069D3D516247C58D6
3,192,450 UART: [art] PUB.Y = FC95A40E90AFA3AE043188C52BBC2704196966622EB89E9ED1179EAB642AEC535A3AD27EAD85F2CED1579A9D24348EA7
3,199,405 UART: [art] SIG.R = F623EBB69B53957CC674608631A06CC1F1FFEDFDE9C0BA18E029572C072E742E0292B25042138BFBCE522AB43B4E82C0
3,206,179 UART: [art] SIG.S = 9DACD39D22498052B6E8D94370E66E3DA39AA5E3134C332111622DD8D2A8E3DDDDAC537161E81AB092162F0A28FB2300
3,230,198 UART: Caliptra RT
3,230,449 UART: [state] CFI Enabled
3,349,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,307 UART: [rt]cmd =0x43455246, len=4
3,392,126 >>> mbox cmd response data (888 bytes)
3,392,127 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,536 UART: [rt]cmd =0x43455252, len=4
3,432,398 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,266 ready_for_fw is high
1,059,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,056 >>> mbox cmd response: success
2,677,056 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,739,301 UART:
2,739,317 UART: Running Caliptra FMC ...
2,739,725 UART:
2,739,779 UART: [state] CFI Enabled
2,750,185 UART: [fht] FMC Alias Private Key: 7
2,869,397 UART: [art] Extend RT PCRs Done
2,869,825 UART: [art] Lock RT PCRs Done
2,871,481 UART: [art] Populate DV Done
2,879,632 UART: [fht] FMC Alias Private Key: 7
2,880,704 UART: [art] Derive CDI
2,880,984 UART: [art] Store in slot 0x4
2,966,915 UART: [art] Derive Key Pair
2,967,275 UART: [art] Store priv key in slot 0x5
2,980,837 UART: [art] Derive Key Pair - Done
2,995,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,216 UART: [art] PUB.X = BFA80C0058FDEB1B3A5691E86915DB94C0F9AD74EE75F785E08E9BDD1D6F753209F2983F7FB2219F8D366074E6404786
3,018,964 UART: [art] PUB.Y = 0DDE95997ACF0A5BECD34B114DBE298856DB700524AD7DDC7AB766BBA1F54539DB3569DF2A5DA0B4627447ED6B32E278
3,025,923 UART: [art] SIG.R = 1454BE6A28FD54E2709CE58BB5158BDE0EF5BA7791508F8B86AB485C3A0919711F806D748E7FC80794B686D8C4CE40A5
3,032,690 UART: [art] SIG.S = 2619CD1147888BA257A715397A73B69B17D7E3795D4B9B1F84257287CCDF7C073D109B4EE9ADF837A74B6109C3BE396B
3,056,098 UART: Caliptra RT
3,056,349 UART: [state] CFI Enabled
3,175,769 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,329 UART: [rt]cmd =0x43455246, len=4
3,218,602 >>> mbox cmd response data (888 bytes)
3,218,603 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,024 UART: [rt]cmd =0x43455252, len=4
3,258,817 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,738 UART: [kat] HMAC-384Kdf
921,332 UART: [kat] LMS
1,169,644 UART: [kat] --
1,170,537 UART: [cold-reset] ++
1,170,901 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 ready_for_fw is high
1,174,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,398 UART: [idev] Erasing UDS.KEYID = 0
1,199,310 UART: [idev] Sha1 KeyId Algorithm
1,207,988 UART: [idev] --
1,209,021 UART: [ldev] ++
1,209,189 UART: [ldev] CDI.KEYID = 6
1,209,553 UART: [ldev] SUBJECT.KEYID = 5
1,209,980 UART: [ldev] AUTHORITY.KEYID = 7
1,210,443 UART: [ldev] FE.KEYID = 1
1,215,505 UART: [ldev] Erasing FE.KEYID = 1
1,241,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,159 UART: [ldev] --
1,280,414 UART: [fwproc] Wait for Commands...
1,281,085 UART: [fwproc] Recv command 0x46574c44
1,281,818 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,634 >>> mbox cmd response: success
2,824,634 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,825,776 UART: [afmc] ++
2,825,944 UART: [afmc] CDI.KEYID = 6
2,826,307 UART: [afmc] SUBJECT.KEYID = 7
2,826,733 UART: [afmc] AUTHORITY.KEYID = 5
2,862,242 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,717 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,466 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,057 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,758 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,625 UART: [afmc] --
2,905,608 UART: [cold-reset] --
2,906,524 UART: [state] Locking Datavault
2,907,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,159 UART: [state] Locking ICCM
2,908,601 UART: [exit] Launching FMC @ 0x40000130
2,913,931 UART:
2,913,947 UART: Running Caliptra FMC ...
2,914,355 UART:
2,914,498 UART: [state] CFI Enabled
2,925,096 UART: [fht] FMC Alias Private Key: 7
3,044,424 UART: [art] Extend RT PCRs Done
3,044,852 UART: [art] Lock RT PCRs Done
3,046,448 UART: [art] Populate DV Done
3,054,677 UART: [fht] FMC Alias Private Key: 7
3,055,685 UART: [art] Derive CDI
3,055,965 UART: [art] Store in slot 0x4
3,141,848 UART: [art] Derive Key Pair
3,142,208 UART: [art] Store priv key in slot 0x5
3,155,042 UART: [art] Derive Key Pair - Done
3,169,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,117 UART: [art] PUB.X = 6FC73ADCB157BB5F4B6972E18BB827B6540B8A69918ABDD6900FE4D925B5941D4A5F7A524F3E2B44FAFC41146B7F1E0A
3,192,894 UART: [art] PUB.Y = 257A64AD185D52E9A1077C546892BAE1B6688A2ED7AF96C19043417B9C3CD6F42579A3130C75113763FEDB8D24F9C69D
3,199,840 UART: [art] SIG.R = 4F97AC4879111B58BDC37DFB7B3E7012E544FC2A93E4A36C963A784FD1530273CE20E0C3C3CD239F6E681E02E7E68D43
3,206,612 UART: [art] SIG.S = 0A2894BF1EBDACFB99B9C72604016081136D0DB1BE4B6839BFC054853567113874CF07DDC1517F80E1D32BC09F0B01F0
3,230,451 UART: Caliptra RT
3,230,794 UART: [state] CFI Enabled
3,350,832 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,112 UART: [rt]cmd =0x43455246, len=4
3,393,353 >>> mbox cmd response data (888 bytes)
3,393,354 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,671 UART: [rt]cmd =0x43455252, len=4
3,433,516 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,747 ready_for_fw is high
1,058,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,379 >>> mbox cmd response: success
2,676,379 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,738,192 UART:
2,738,208 UART: Running Caliptra FMC ...
2,738,616 UART:
2,738,759 UART: [state] CFI Enabled
2,749,455 UART: [fht] FMC Alias Private Key: 7
2,868,823 UART: [art] Extend RT PCRs Done
2,869,251 UART: [art] Lock RT PCRs Done
2,871,169 UART: [art] Populate DV Done
2,879,388 UART: [fht] FMC Alias Private Key: 7
2,880,326 UART: [art] Derive CDI
2,880,606 UART: [art] Store in slot 0x4
2,966,829 UART: [art] Derive Key Pair
2,967,189 UART: [art] Store priv key in slot 0x5
2,981,113 UART: [art] Derive Key Pair - Done
2,995,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,490 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,255 UART: [art] PUB.X = 97437645C1AD8177EFE2C3B6A05407FB95820D7A5AA9AB4EC8D25CA0DAE4241CFF02FC82B0358612AA4E0CBD1EB3A1CC
3,019,035 UART: [art] PUB.Y = 7112863F0928DBA45AE61145B97BE2637FE901EEC497265E87014D6A8F558FD63598F133755BA20F1E9349122F22C4E4
3,025,967 UART: [art] SIG.R = FC6569C4DB0C54B16F93C82932CAA65C491730DAA13CF756E611394E0D5DCED9F7F0B74C9CB40FA066409EC702FC6312
3,032,737 UART: [art] SIG.S = 3752F1FC962410A740FD1CEBA22B99670FADD6AE718CA8C0215330822355E50113BE1C181022DB9549B2625105250C11
3,056,469 UART: Caliptra RT
3,056,812 UART: [state] CFI Enabled
3,176,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,389 UART: [rt]cmd =0x43455246, len=4
3,219,596 >>> mbox cmd response data (888 bytes)
3,219,597 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,754 UART: [rt]cmd =0x43455252, len=4
3,259,367 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,318 UART: [kat] SHA2-512-ACC
908,219 UART: [kat] ECC-384
917,758 UART: [kat] HMAC-384Kdf
922,208 UART: [kat] LMS
1,170,536 UART: [kat] --
1,171,413 UART: [cold-reset] ++
1,171,779 UART: [fht] FHT @ 0x50003400
1,174,410 UART: [idev] ++
1,174,578 UART: [idev] CDI.KEYID = 6
1,174,938 UART: [idev] SUBJECT.KEYID = 7
1,175,362 UART: [idev] UDS.KEYID = 0
1,175,707 ready_for_fw is high
1,175,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,199,971 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,569 UART: [ldev] ++
1,209,737 UART: [ldev] CDI.KEYID = 6
1,210,100 UART: [ldev] SUBJECT.KEYID = 5
1,210,526 UART: [ldev] AUTHORITY.KEYID = 7
1,210,989 UART: [ldev] FE.KEYID = 1
1,216,291 UART: [ldev] Erasing FE.KEYID = 1
1,242,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,746 UART: [fwproc] Wait for Commands...
1,282,528 UART: [fwproc] Recv command 0x46574c44
1,283,256 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,390 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,573 >>> mbox cmd response: success
2,826,573 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,827,819 UART: [afmc] ++
2,827,987 UART: [afmc] CDI.KEYID = 6
2,828,349 UART: [afmc] SUBJECT.KEYID = 7
2,828,774 UART: [afmc] AUTHORITY.KEYID = 5
2,864,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,338 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,957 UART: [afmc] --
2,908,049 UART: [cold-reset] --
2,908,909 UART: [state] Locking Datavault
2,909,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,534 UART: [state] Locking ICCM
2,911,160 UART: [exit] Launching FMC @ 0x40000130
2,916,490 UART:
2,916,506 UART: Running Caliptra FMC ...
2,916,914 UART:
2,916,968 UART: [state] CFI Enabled
2,927,760 UART: [fht] FMC Alias Private Key: 7
3,047,222 UART: [art] Extend RT PCRs Done
3,047,650 UART: [art] Lock RT PCRs Done
3,049,112 UART: [art] Populate DV Done
3,057,095 UART: [fht] FMC Alias Private Key: 7
3,058,177 UART: [art] Derive CDI
3,058,457 UART: [art] Store in slot 0x4
3,144,024 UART: [art] Derive Key Pair
3,144,384 UART: [art] Store priv key in slot 0x5
3,157,888 UART: [art] Derive Key Pair - Done
3,172,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,810 UART: [art] PUB.X = 30A3CFAB2811A7B6CB87F1B4843EEBEBAB2342CE7E84DD7EA0072CF7445A9E90B8B8FADE3FDF1BF224DA674535F58C40
3,195,603 UART: [art] PUB.Y = 6E2932EC4617CEC025E7CA4CEB995484E2884360160DB437D9A8B83C5EA81272CFEA9D1DCC1C639A4E18DB144D719581
3,202,558 UART: [art] SIG.R = 8794F4AA729D1F7CBA0BFEFB766926B4B5C34A4D1A95B0AD0357974E3CB4DF4AD90305F3D0E2A14740DC3101B6A612B1
3,209,327 UART: [art] SIG.S = 5B087FD2E140D808A3272DC7DBE6C1AD4FDD62D284E467A1EED8A8D44C4BE33B1D8AE79EA3B23B85FA17C0DDE9233BD3
3,233,129 UART: Caliptra RT
3,233,380 UART: [state] CFI Enabled
3,351,963 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,601 UART: [rt]cmd =0x43455246, len=4
3,394,554 >>> mbox cmd response data (888 bytes)
3,394,555 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,804 UART: [rt]cmd =0x43455252, len=4
3,434,595 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,975 ready_for_fw is high
1,059,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,846 >>> mbox cmd response: success
2,678,846 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,740,885 UART:
2,740,901 UART: Running Caliptra FMC ...
2,741,309 UART:
2,741,363 UART: [state] CFI Enabled
2,751,417 UART: [fht] FMC Alias Private Key: 7
2,870,565 UART: [art] Extend RT PCRs Done
2,870,993 UART: [art] Lock RT PCRs Done
2,872,861 UART: [art] Populate DV Done
2,881,134 UART: [fht] FMC Alias Private Key: 7
2,882,196 UART: [art] Derive CDI
2,882,476 UART: [art] Store in slot 0x4
2,968,553 UART: [art] Derive Key Pair
2,968,913 UART: [art] Store priv key in slot 0x5
2,982,121 UART: [art] Derive Key Pair - Done
2,996,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,744 UART: [art] PUB.X = 95C964F80FB3A36D1504FFB9BE06EBCF30B99FE0EBE4E83B9700338DF5CC9F36BA51262E5B1708E4825E63F8A7209837
3,019,490 UART: [art] PUB.Y = 46A6CB6F10D172F1998876CE31B91E3BEAA692C8D57C7B53FBDEE4DBA408E1C1B7BE4E6C76243A09D4F314239C791847
3,026,446 UART: [art] SIG.R = D03CE8E13C80823A18F79F1040FCCB935ACC5109185146119E5ADA9BECD57B4287C6753150145D762DE26BBCD5391244
3,033,215 UART: [art] SIG.S = F5A371CEED8EEAE09B3C99442D53705092810B15DF29612E8139B3C5ADC01D69CA7BC523D1A9E2F9AF62F63172981A43
3,056,684 UART: Caliptra RT
3,056,935 UART: [state] CFI Enabled
3,176,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,389 UART: [rt]cmd =0x43455246, len=4
3,219,364 >>> mbox cmd response data (888 bytes)
3,219,365 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,248,812 UART: [rt]cmd =0x43455252, len=4
3,259,532 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
87,028 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
893,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,920 UART: [kat] ++
898,072 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,951 UART: [kat] SHA2-512-ACC
908,852 UART: [kat] ECC-384
919,007 UART: [kat] HMAC-384Kdf
923,423 UART: [kat] LMS
1,171,751 UART: [kat] --
1,172,620 UART: [cold-reset] ++
1,172,970 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 ready_for_fw is high
1,176,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,202,008 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,610 UART: [ldev] ++
1,211,778 UART: [ldev] CDI.KEYID = 6
1,212,141 UART: [ldev] SUBJECT.KEYID = 5
1,212,567 UART: [ldev] AUTHORITY.KEYID = 7
1,213,030 UART: [ldev] FE.KEYID = 1
1,218,240 UART: [ldev] Erasing FE.KEYID = 1
1,244,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,620 UART: [ldev] --
1,283,995 UART: [fwproc] Wait for Commands...
1,284,593 UART: [fwproc] Recv command 0x46574c44
1,285,321 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,671 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,220 >>> mbox cmd response: success
2,829,220 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,830,274 UART: [afmc] ++
2,830,442 UART: [afmc] CDI.KEYID = 6
2,830,804 UART: [afmc] SUBJECT.KEYID = 7
2,831,229 UART: [afmc] AUTHORITY.KEYID = 5
2,867,086 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,023 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,724 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,492 UART: [afmc] --
2,910,560 UART: [cold-reset] --
2,911,626 UART: [state] Locking Datavault
2,912,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,573 UART: [state] Locking ICCM
2,914,149 UART: [exit] Launching FMC @ 0x40000130
2,919,479 UART:
2,919,495 UART: Running Caliptra FMC ...
2,919,903 UART:
2,920,046 UART: [state] CFI Enabled
2,930,930 UART: [fht] FMC Alias Private Key: 7
3,049,822 UART: [art] Extend RT PCRs Done
3,050,250 UART: [art] Lock RT PCRs Done
3,051,682 UART: [art] Populate DV Done
3,059,833 UART: [fht] FMC Alias Private Key: 7
3,060,853 UART: [art] Derive CDI
3,061,133 UART: [art] Store in slot 0x4
3,146,872 UART: [art] Derive Key Pair
3,147,232 UART: [art] Store priv key in slot 0x5
3,160,728 UART: [art] Derive Key Pair - Done
3,175,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,367 UART: [art] PUB.X = C0C4DC508D331E1ED108CEAADF0DBAF01C1B397F78B9A74609991A931F1D403853D187D8286BCFDC16CE3EE602A1B12B
3,198,143 UART: [art] PUB.Y = F235D6D0829DB51D015B34B4EC008F57CAFCF59B410526DB36FAAC351FA36C250CED12331352C07129BA4B92E24EC53D
3,205,074 UART: [art] SIG.R = 552F1E96B24592661C287A90A34A25C667ED8E07FCD6B317EF5B05D515B6748A4EB31913C87B0B2CC7A936900FFC15FC
3,211,838 UART: [art] SIG.S = 570D6A3A5D8CB82A74D402375454B41E21ACA015FA53C65AE6B53A4716DD76007BCCF56680CB037ED145FABA2F70007A
3,235,937 UART: Caliptra RT
3,236,280 UART: [state] CFI Enabled
3,354,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,258 UART: [rt]cmd =0x43455246, len=4
3,397,255 >>> mbox cmd response data (888 bytes)
3,397,256 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,661 UART: [rt]cmd =0x43455252, len=4
3,437,672 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,494 ready_for_fw is high
1,060,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,081 >>> mbox cmd response: success
2,680,081 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
2,742,238 UART:
2,742,254 UART: Running Caliptra FMC ...
2,742,662 UART:
2,742,805 UART: [state] CFI Enabled
2,753,541 UART: [fht] FMC Alias Private Key: 7
2,872,565 UART: [art] Extend RT PCRs Done
2,872,993 UART: [art] Lock RT PCRs Done
2,874,545 UART: [art] Populate DV Done
2,882,852 UART: [fht] FMC Alias Private Key: 7
2,883,870 UART: [art] Derive CDI
2,884,150 UART: [art] Store in slot 0x4
2,969,533 UART: [art] Derive Key Pair
2,969,893 UART: [art] Store priv key in slot 0x5
2,983,065 UART: [art] Derive Key Pair - Done
2,997,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,769 UART: [art] PUB.X = 6D18CA35A0E12A6B1A537960EC836A94BC2E476886A671E911399B69986B439CF463CCEA7EE0107C8BE76496E0D55129
3,020,539 UART: [art] PUB.Y = 73865B42EB5FB558C47D807847C8AA4665C47F36E7964BAB0FB8373943409C9CAC8B48D0E558C50E158D0079C0638FE4
3,027,461 UART: [art] SIG.R = 8312A620B83094BFDB97854A746E56D78428B33E57FDC5B45984534A25FF7632A8A90AAE6A0F2093EA65430BAC02CC2D
3,034,223 UART: [art] SIG.S = FA764D19B6CF064C2E8D0F45D30A4AF3FCB2B743E9C8965DC228FDD36FDD865585B8EBD91D6263D548286EFB4A76E344
3,057,822 UART: Caliptra RT
3,058,165 UART: [state] CFI Enabled
3,177,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,305 UART: [rt]cmd =0x43455246, len=4
3,220,430 >>> mbox cmd response data (888 bytes)
3,220,431 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,249,748 UART: [rt]cmd =0x43455252, len=4
3,260,548 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_alias_cert ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,007 UART:
192,370 UART: Running Caliptra ROM ...
193,559 UART:
193,716 UART: [state] CFI Enabled
261,814 UART: [state] LifecycleState = Unprovisioned
263,795 UART: [state] DebugLocked = No
266,609 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,043 UART: [kat] SHA2-256
440,682 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,214 UART: [kat] ++
451,665 UART: [kat] sha1
461,971 UART: [kat] SHA2-256
464,648 UART: [kat] SHA2-384
470,213 UART: [kat] SHA2-512-ACC
472,588 UART: [kat] ECC-384
2,766,863 UART: [kat] HMAC-384Kdf
2,800,915 UART: [kat] LMS
3,991,225 UART: [kat] --
3,996,640 UART: [cold-reset] ++
3,998,142 UART: [fht] Storing FHT @ 0x50003400
4,010,329 UART: [idev] ++
4,010,893 UART: [idev] CDI.KEYID = 6
4,011,814 UART: [idev] SUBJECT.KEYID = 7
4,013,064 UART: [idev] UDS.KEYID = 0
4,014,059 ready_for_fw is high
4,014,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,700 UART: [idev] Erasing UDS.KEYID = 0
7,347,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,575 UART: [idev] --
7,374,076 UART: [ldev] ++
7,374,705 UART: [ldev] CDI.KEYID = 6
7,375,617 UART: [ldev] SUBJECT.KEYID = 5
7,376,770 UART: [ldev] AUTHORITY.KEYID = 7
7,378,105 UART: [ldev] FE.KEYID = 1
7,421,928 UART: [ldev] Erasing FE.KEYID = 1
10,757,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,716 UART: [ldev] --
13,138,302 UART: [fwproc] Waiting for Commands...
13,140,505 UART: [fwproc] Received command 0x46574c44
13,142,687 UART: [fwproc] Received Image of size 118548 bytes
17,248,421 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,721 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,722,892 >>> mbox cmd response: success
17,723,854 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,728,676 UART: [afmc] ++
17,729,273 UART: [afmc] CDI.KEYID = 6
17,730,184 UART: [afmc] SUBJECT.KEYID = 7
17,731,400 UART: [afmc] AUTHORITY.KEYID = 5
21,094,698 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,379 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,687 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,847 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,437,188 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,459,061 UART: [afmc] --
23,462,144 UART: [cold-reset] --
23,464,334 UART: [state] Locking Datavault
23,469,253 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,001 UART: [state] Locking ICCM
23,473,047 UART: [exit] Launching FMC @ 0x40000130
23,481,401 UART:
23,481,816 UART: Running Caliptra FMC ...
23,482,946 UART:
23,483,113 UART: [state] CFI Enabled
23,553,326 UART: [fht] FMC Alias Private Key: 7
25,893,844 UART: [art] Extend RT PCRs Done
25,895,059 UART: [art] Lock RT PCRs Done
25,896,577 UART: [art] Populate DV Done
25,902,256 UART: [fht] FMC Alias Private Key: 7
25,903,901 UART: [art] Derive CDI
25,904,714 UART: [art] Store in slot 0x4
25,961,803 UART: [art] Derive Key Pair
25,962,838 UART: [art] Store priv key in slot 0x5
29,256,028 UART: [art] Derive Key Pair - Done
29,268,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,436 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,956 UART: [art] PUB.X = EEF7C73495587B70AB014AB875E17BACE8A2625740DADFB57699FB350310FD4B330D24326D23CB11CB5D974D581479CC
31,567,219 UART: [art] PUB.Y = E057858FB2BEFEDC2D13B0399E0C72F4BF6499F7822D5C2A0DF81D48138E3C7E6CE20E60F5CD71056C54BD601FF60056
31,574,406 UART: [art] SIG.R = 228F8E3BFAF8C3E0CF1F4079FD15131C17C4F0E48C001DC34D0ED08B4890EA0DB0A64EBD7B1A160A45A8916B6A5E0DD7
31,581,849 UART: [art] SIG.S = D00E356D4AB1AC940673E677A9123CAC93441515893B216FCA3DC7DE3D9AE248C87D1E174A35AFD2255B1BA345FB21CB
32,887,245 UART: Caliptra RT
32,887,945 UART: [state] CFI Enabled
33,064,209 UART: [rt] RT listening for mailbox commands...
33,095,613 UART: [rt]cmd =0x43455252, len=4
33,107,169 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,784,304 ready_for_fw is high
3,784,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,406 >>> mbox cmd response: success
17,972,597 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,670,687 UART:
23,671,077 UART: Running Caliptra FMC ...
23,672,224 UART:
23,672,387 UART: [state] CFI Enabled
23,722,266 UART: [fht] FMC Alias Private Key: 7
26,063,213 UART: [art] Extend RT PCRs Done
26,064,466 UART: [art] Lock RT PCRs Done
26,065,908 UART: [art] Populate DV Done
26,071,566 UART: [fht] FMC Alias Private Key: 7
26,073,162 UART: [art] Derive CDI
26,073,980 UART: [art] Store in slot 0x4
26,132,038 UART: [art] Derive Key Pair
26,133,079 UART: [art] Store priv key in slot 0x5
29,425,809 UART: [art] Derive Key Pair - Done
29,438,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,537 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,046 UART: [art] PUB.X = C5D60EB554505034A4BFCDA7AE2E3A3A295CEAEFCB0C6114DEAA508F846EC9FD9D669A5F03B1A794776EBCA694CA7100
31,736,298 UART: [art] PUB.Y = CE8D1911B183517FE908B2FCCD3EAD7E2400DF09DE857289C3463B183D2D46AE502DB90200F2F1516D3E5AA6099FDD4F
31,743,540 UART: [art] SIG.R = E97F2A84F6B645FE5EEBE6BB561C88F4C398810A89812446BCA6DDDD9C25874A33AF6B103B8854C8B7272E03A8D3D898
31,750,929 UART: [art] SIG.S = C4C90E641BAA1C517A4C7E7871B373C791D8D758E52EDBFA57BE6C434D02396E97551E36E9EEE096191C9A995281AE52
33,055,715 UART: Caliptra RT
33,056,433 UART: [state] CFI Enabled
33,234,638 UART: [rt] RT listening for mailbox commands...
33,266,002 UART: [rt]cmd =0x43455252, len=4
33,277,381 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,240 UART:
192,619 UART: Running Caliptra ROM ...
194,011 UART:
603,505 UART: [state] CFI Enabled
617,645 UART: [state] LifecycleState = Unprovisioned
619,526 UART: [state] DebugLocked = No
622,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,273 UART: [kat] SHA2-256
796,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,523 UART: [kat] ++
808,005 UART: [kat] sha1
819,522 UART: [kat] SHA2-256
822,247 UART: [kat] SHA2-384
828,481 UART: [kat] SHA2-512-ACC
830,852 UART: [kat] ECC-384
3,116,451 UART: [kat] HMAC-384Kdf
3,128,420 UART: [kat] LMS
4,318,587 UART: [kat] --
4,323,646 UART: [cold-reset] ++
4,325,075 UART: [fht] Storing FHT @ 0x50003400
4,337,403 UART: [idev] ++
4,337,970 UART: [idev] CDI.KEYID = 6
4,338,872 UART: [idev] SUBJECT.KEYID = 7
4,340,109 UART: [idev] UDS.KEYID = 0
4,341,092 ready_for_fw is high
4,341,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,262 UART: [idev] Erasing UDS.KEYID = 0
7,628,846 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,006 UART: [idev] --
7,656,325 UART: [ldev] ++
7,656,886 UART: [ldev] CDI.KEYID = 6
7,657,870 UART: [ldev] SUBJECT.KEYID = 5
7,659,074 UART: [ldev] AUTHORITY.KEYID = 7
7,660,354 UART: [ldev] FE.KEYID = 1
7,671,401 UART: [ldev] Erasing FE.KEYID = 1
10,957,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,410 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,569 UART: [ldev] --
13,317,832 UART: [fwproc] Waiting for Commands...
13,321,000 UART: [fwproc] Received command 0x46574c44
13,323,182 UART: [fwproc] Received Image of size 118548 bytes
17,424,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,587 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,622 >>> mbox cmd response: success
17,906,637 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
17,910,559 UART: [afmc] ++
17,911,148 UART: [afmc] CDI.KEYID = 6
17,912,055 UART: [afmc] SUBJECT.KEYID = 7
17,913,270 UART: [afmc] AUTHORITY.KEYID = 5
21,227,659 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,812 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,069 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,261 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
23,568,609 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
23,590,698 UART: [afmc] --
23,595,415 UART: [cold-reset] --
23,598,562 UART: [state] Locking Datavault
23,603,201 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,888 UART: [state] Locking ICCM
23,606,790 UART: [exit] Launching FMC @ 0x40000130
23,615,174 UART:
23,615,402 UART: Running Caliptra FMC ...
23,616,496 UART:
23,616,649 UART: [state] CFI Enabled
23,625,125 UART: [fht] FMC Alias Private Key: 7
25,964,591 UART: [art] Extend RT PCRs Done
25,965,814 UART: [art] Lock RT PCRs Done
25,967,413 UART: [art] Populate DV Done
25,972,838 UART: [fht] FMC Alias Private Key: 7
25,974,369 UART: [art] Derive CDI
25,975,102 UART: [art] Store in slot 0x4
26,017,686 UART: [art] Derive Key Pair
26,018,678 UART: [art] Store priv key in slot 0x5
29,261,261 UART: [art] Derive Key Pair - Done
29,274,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,609 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,115 UART: [art] PUB.X = F3942C5790ED8F4D7E96E8EB576A14E6CCA47BF8F3CDFC0A7D8433AFD1B0850458ED71D673E283623B10B7DA83123ADA
31,563,407 UART: [art] PUB.Y = 4059D6631293424EF28752C6D189DBD879EE1C938155A5F6A10FDB8E92B394D4BFB002383904A2ADEBFB01757A787369
31,570,681 UART: [art] SIG.R = A80B6E9EF462DD86DB488371A5703FC1DDE7FC53B5ED2A91CF2CF1CAABB44BF21AFA83037B20BA4531DB7774028D48BA
31,578,065 UART: [art] SIG.S = 69C13B8D409734C0B92BD42256052F92A66ED7F57E76F0901A6B2475F7EF031128FC782F47A0D9435C9AC43DE7F8B2C5
32,883,781 UART: Caliptra RT
32,884,489 UART: [state] CFI Enabled
33,017,817 UART: [rt] RT listening for mailbox commands...
33,048,963 UART: [rt]cmd =0x43455252, len=4
33,060,393 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
4,129,975 ready_for_fw is high
4,130,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,534 >>> mbox cmd response: success
18,156,673 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
23,796,878 UART:
23,797,271 UART: Running Caliptra FMC ...
23,798,375 UART:
23,798,528 UART: [state] CFI Enabled
23,806,653 UART: [fht] FMC Alias Private Key: 7
26,147,244 UART: [art] Extend RT PCRs Done
26,148,468 UART: [art] Lock RT PCRs Done
26,150,117 UART: [art] Populate DV Done
26,155,533 UART: [fht] FMC Alias Private Key: 7
26,157,231 UART: [art] Derive CDI
26,157,986 UART: [art] Store in slot 0x4
26,200,630 UART: [art] Derive Key Pair
26,201,623 UART: [art] Store priv key in slot 0x5
29,443,623 UART: [art] Derive Key Pair - Done
29,457,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,589 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,098 UART: [art] PUB.X = 9972733D7C8791B531BAB39AD2A9C1B03FB6BFC05C92181F99CF4AD1291011123374A98B2FB6F4B50975383757458FC3
31,746,346 UART: [art] PUB.Y = 921BC4412CB68D4C3450CC6841663D1011B0C5300CBBA73C87E69DC63BBE865C0A73FEA82822C7E2227F4B488B20458E
31,753,604 UART: [art] SIG.R = 613A677C14AF64208505D089393BC3F8633E33E5EEED94D4FDB74C3C0FB8245949A4BC5275556C4364501843A5768836
31,760,998 UART: [art] SIG.S = 7323334F5B08FE078D452DDEA26C3EB2A5A04D92DBB46A00EDAF81B990A485FD8EE3FEA5CE70AD7587E3A71F3D33D962
33,066,319 UART: Caliptra RT
33,067,048 UART: [state] CFI Enabled
33,200,288 UART: [rt] RT listening for mailbox commands...
33,231,651 UART: [rt]cmd =0x43455252, len=4
33,243,157 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,284 UART:
192,634 UART: Running Caliptra ROM ...
193,813 UART:
193,960 UART: [state] CFI Enabled
265,483 UART: [state] LifecycleState = Unprovisioned
267,473 UART: [state] DebugLocked = No
269,786 UART: [state] WD Timer not started. Device not locked for debugging
273,111 UART: [kat] SHA2-256
452,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,595 UART: [kat] ++
464,042 UART: [kat] sha1
475,219 UART: [kat] SHA2-256
477,917 UART: [kat] SHA2-384
483,627 UART: [kat] SHA2-512-ACC
486,059 UART: [kat] ECC-384
2,949,507 UART: [kat] HMAC-384Kdf
2,972,118 UART: [kat] LMS
3,448,664 UART: [kat] --
3,454,505 UART: [cold-reset] ++
3,455,863 UART: [fht] FHT @ 0x50003400
3,467,709 UART: [idev] ++
3,468,349 UART: [idev] CDI.KEYID = 6
3,469,250 UART: [idev] SUBJECT.KEYID = 7
3,470,487 UART: [idev] UDS.KEYID = 0
3,471,549 ready_for_fw is high
3,471,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,786 UART: [idev] Erasing UDS.KEYID = 0
5,987,158 UART: [idev] Sha1 KeyId Algorithm
6,009,754 UART: [idev] --
6,014,943 UART: [ldev] ++
6,015,517 UART: [ldev] CDI.KEYID = 6
6,016,405 UART: [ldev] SUBJECT.KEYID = 5
6,017,671 UART: [ldev] AUTHORITY.KEYID = 7
6,018,851 UART: [ldev] FE.KEYID = 1
6,057,769 UART: [ldev] Erasing FE.KEYID = 1
8,566,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,079 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,489 UART: [ldev] --
10,376,773 UART: [fwproc] Wait for Commands...
10,379,126 UART: [fwproc] Recv command 0x46574c44
10,381,160 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,724 >>> mbox cmd response: success
14,345,818 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,350,162 UART: [afmc] ++
14,350,747 UART: [afmc] CDI.KEYID = 6
14,351,704 UART: [afmc] SUBJECT.KEYID = 7
14,352,914 UART: [afmc] AUTHORITY.KEYID = 5
16,902,104 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,441 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,295 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,691,789 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,715,626 UART: [afmc] --
18,719,399 UART: [cold-reset] --
18,723,425 UART: [state] Locking Datavault
18,728,719 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,463 UART: [state] Locking ICCM
18,732,584 UART: [exit] Launching FMC @ 0x40000130
18,740,978 UART:
18,741,207 UART: Running Caliptra FMC ...
18,742,228 UART:
18,742,372 UART: [state] CFI Enabled
18,799,363 UART: [fht] FMC Alias Private Key: 7
20,565,994 UART: [art] Extend RT PCRs Done
20,567,235 UART: [art] Lock RT PCRs Done
20,568,962 UART: [art] Populate DV Done
20,574,372 UART: [fht] FMC Alias Private Key: 7
20,575,854 UART: [art] Derive CDI
20,576,588 UART: [art] Store in slot 0x4
20,631,988 UART: [art] Derive Key Pair
20,633,032 UART: [art] Store priv key in slot 0x5
23,095,854 UART: [art] Derive Key Pair - Done
23,109,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,821,773 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,304 UART: [art] PUB.X = 514B8FA79D600562331869AF03F211F7943556E5DCF36A472ABD35DFB8165C9E9DA4E4E917300A4F0D9A3B1FB2C9B7D0
24,830,555 UART: [art] PUB.Y = C013CBEA33AC34DE8A185849A52E408261B62A33D12A3D1DAD8FC789A1EEAF9F6A3BEE4E589C4C3E05061690B198F86A
24,837,852 UART: [art] SIG.R = 7A188EC11EBD3C7BD2D9DBA3999C572D1B78F9C6375611C53094FCEB9E5503FDF9ED4F9729D729930A726AF553FA6129
24,845,239 UART: [art] SIG.S = 41D008A018D0D8F03BB9BF66F09DBF189648E538BDD35519F62C8595AE0E95AA48774039546348515D6B1EE8BB60492E
25,824,044 UART: Caliptra RT
25,824,771 UART: [state] CFI Enabled
26,007,009 UART: [rt] RT listening for mailbox commands...
26,038,297 UART: [rt]cmd =0x43455252, len=4
26,049,710 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,461,108 ready_for_fw is high
3,461,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,069 >>> mbox cmd response: success
14,236,356 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,515,908 UART:
18,516,301 UART: Running Caliptra FMC ...
18,517,407 UART:
18,517,555 UART: [state] CFI Enabled
18,581,834 UART: [fht] FMC Alias Private Key: 7
20,348,370 UART: [art] Extend RT PCRs Done
20,349,595 UART: [art] Lock RT PCRs Done
20,351,135 UART: [art] Populate DV Done
20,356,503 UART: [fht] FMC Alias Private Key: 7
20,358,044 UART: [art] Derive CDI
20,358,864 UART: [art] Store in slot 0x4
20,414,419 UART: [art] Derive Key Pair
20,415,418 UART: [art] Store priv key in slot 0x5
22,878,144 UART: [art] Derive Key Pair - Done
22,891,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,502 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,007 UART: [art] PUB.X = 60F7092A3DC1AFE3C0176A2AFD1E599629B5B14F1973C29B91971907080335EAA601B3AEEDE34232605D7A9A37168B10
24,612,264 UART: [art] PUB.Y = ADE360E59500ED0EE7361E18BFF57A2FBAA7A2CED85974696AD77C9B459BB18B61BFFA189CB0E5B4EB7910D760ED64E6
24,619,514 UART: [art] SIG.R = 799138098130DF0B368BF5F16133756265F47082E016606932F1727B2643B0F97D16AE4C6B2AEBB42DD34B57019D7C27
24,626,912 UART: [art] SIG.S = F0C8DD29160C5170DE621944F37981C2090DA6EBF97DEF1FB4848810EF62EE6E5A49ECAA761223AB78C8E45987EB4E68
25,606,457 UART: Caliptra RT
25,607,160 UART: [state] CFI Enabled
25,786,829 UART: [rt] RT listening for mailbox commands...
25,818,210 UART: [rt]cmd =0x43455252, len=4
25,829,577 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,629 writing to cptra_bootfsm_go
193,959 UART:
194,311 UART: Running Caliptra ROM ...
195,427 UART:
605,050 UART: [state] CFI Enabled
617,235 UART: [state] LifecycleState = Unprovisioned
619,109 UART: [state] DebugLocked = No
621,497 UART: [state] WD Timer not started. Device not locked for debugging
624,760 UART: [kat] SHA2-256
804,412 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,215 UART: [kat] ++
815,662 UART: [kat] sha1
827,460 UART: [kat] SHA2-256
830,187 UART: [kat] SHA2-384
836,396 UART: [kat] SHA2-512-ACC
838,764 UART: [kat] ECC-384
3,281,353 UART: [kat] HMAC-384Kdf
3,292,942 UART: [kat] LMS
3,769,432 UART: [kat] --
3,774,748 UART: [cold-reset] ++
3,777,110 UART: [fht] FHT @ 0x50003400
3,787,445 UART: [idev] ++
3,788,018 UART: [idev] CDI.KEYID = 6
3,788,974 UART: [idev] SUBJECT.KEYID = 7
3,790,218 UART: [idev] UDS.KEYID = 0
3,791,190 ready_for_fw is high
3,791,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,219 UART: [idev] Erasing UDS.KEYID = 0
6,267,966 UART: [idev] Sha1 KeyId Algorithm
6,292,358 UART: [idev] --
6,297,328 UART: [ldev] ++
6,297,905 UART: [ldev] CDI.KEYID = 6
6,298,792 UART: [ldev] SUBJECT.KEYID = 5
6,300,058 UART: [ldev] AUTHORITY.KEYID = 7
6,301,294 UART: [ldev] FE.KEYID = 1
6,312,281 UART: [ldev] Erasing FE.KEYID = 1
8,791,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,988 UART: [ldev] --
10,582,938 UART: [fwproc] Wait for Commands...
10,585,681 UART: [fwproc] Recv command 0x46574c44
10,587,720 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,754 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,841 >>> mbox cmd response: success
14,564,022 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,567,672 UART: [afmc] ++
14,568,280 UART: [afmc] CDI.KEYID = 6
14,569,223 UART: [afmc] SUBJECT.KEYID = 7
14,570,438 UART: [afmc] AUTHORITY.KEYID = 5
17,074,759 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,887 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,846,372 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
18,870,324 UART: [afmc] --
18,873,431 UART: [cold-reset] --
18,876,646 UART: [state] Locking Datavault
18,879,948 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,682 UART: [state] Locking ICCM
18,883,977 UART: [exit] Launching FMC @ 0x40000130
18,892,375 UART:
18,892,627 UART: Running Caliptra FMC ...
18,893,656 UART:
18,893,807 UART: [state] CFI Enabled
18,901,990 UART: [fht] FMC Alias Private Key: 7
20,667,699 UART: [art] Extend RT PCRs Done
20,668,919 UART: [art] Lock RT PCRs Done
20,670,786 UART: [art] Populate DV Done
20,676,087 UART: [fht] FMC Alias Private Key: 7
20,677,738 UART: [art] Derive CDI
20,678,475 UART: [art] Store in slot 0x4
20,721,179 UART: [art] Derive Key Pair
20,722,215 UART: [art] Store priv key in slot 0x5
23,149,066 UART: [art] Derive Key Pair - Done
23,162,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,038 UART: [art] PUB.X = DE8CB09FD50D0105F8BC1F6F4BDE853BBB6FAEEFAE329250938AF8EF9F4957F1581BC5B44C265ADAF4CDBC23AD86D111
24,877,358 UART: [art] PUB.Y = 7760A2B6D25A60045F55429FB2E21DD3710B38588F679D36D8E9C32807DE84BD08652AAFF79074F438E4A1438B30B96B
24,884,553 UART: [art] SIG.R = 80DE6635A8BFF3D05AD73B92F51EE856DBB3C13C9158A90D822CCD9C7D04FDB980560B8CBD33EAA45D105C016964CEA1
24,891,963 UART: [art] SIG.S = EF7C98B014F98DBFC2437A206C8F7046FF0CFB8409D39EDED945F418A2FB69D76E83BAA35103DCB2C60E4B21C0E174CE
25,870,604 UART: Caliptra RT
25,871,292 UART: [state] CFI Enabled
26,004,724 UART: [rt] RT listening for mailbox commands...
26,035,709 UART: [rt]cmd =0x43455252, len=4
26,046,906 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,780,116 ready_for_fw is high
3,780,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,014 >>> mbox cmd response: success
14,453,166 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
18,699,301 UART:
18,699,687 UART: Running Caliptra FMC ...
18,700,792 UART:
18,700,944 UART: [state] CFI Enabled
18,709,205 UART: [fht] FMC Alias Private Key: 7
20,474,861 UART: [art] Extend RT PCRs Done
20,476,088 UART: [art] Lock RT PCRs Done
20,477,660 UART: [art] Populate DV Done
20,483,197 UART: [fht] FMC Alias Private Key: 7
20,484,699 UART: [art] Derive CDI
20,485,469 UART: [art] Store in slot 0x4
20,528,178 UART: [art] Derive Key Pair
20,529,222 UART: [art] Store priv key in slot 0x5
22,955,500 UART: [art] Derive Key Pair - Done
22,968,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,024 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,533 UART: [art] PUB.X = 59D4E39A746E7453722ADA56E7E710B65060D880F39EE7305BF3BFBEBEB9ABA31AB2C9DC0F282474066BDC723CFFAE7E
24,683,820 UART: [art] PUB.Y = 3D2B492AEDB090AC44C6EFAD37E3B947F79AA3D4EDCCBCEC5050479EE28F31CEAD863EF9D911D89EF1296B29EB8AE4D4
24,691,139 UART: [art] SIG.R = 378F82503725DE65C3A36703068B1909F718405B921404AE7EEB488B368AEA441D4685CD5B213141551FE4F2CA31B66B
24,698,492 UART: [art] SIG.S = 0C07D30B30291776804D86D89929FA25E2DC5C1EEDA7A7047C7AB6046FF4CEE4F703505300D564404F51404461240048
25,677,166 UART: Caliptra RT
25,677,867 UART: [state] CFI Enabled
25,811,797 UART: [rt] RT listening for mailbox commands...
25,843,608 UART: [rt]cmd =0x43455252, len=4
25,855,079 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
191,960 UART:
192,335 UART: Running Caliptra ROM ...
193,525 UART:
193,675 UART: [state] CFI Enabled
266,682 UART: [state] LifecycleState = Unprovisioned
269,088 UART: [state] DebugLocked = No
271,480 UART: [state] WD Timer not started. Device not locked for debugging
276,937 UART: [kat] SHA2-256
466,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,587 UART: [kat] ++
478,068 UART: [kat] sha1
490,225 UART: [kat] SHA2-256
493,228 UART: [kat] SHA2-384
498,996 UART: [kat] SHA2-512-ACC
501,578 UART: [kat] ECC-384
2,948,222 UART: [kat] HMAC-384Kdf
2,972,349 UART: [kat] LMS
3,504,083 UART: [kat] --
3,509,594 UART: [cold-reset] ++
3,511,950 UART: [fht] FHT @ 0x50003400
3,523,437 UART: [idev] ++
3,524,147 UART: [idev] CDI.KEYID = 6
3,525,178 UART: [idev] SUBJECT.KEYID = 7
3,526,276 UART: [idev] UDS.KEYID = 0
3,527,204 ready_for_fw is high
3,527,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,471 UART: [idev] Erasing UDS.KEYID = 0
6,029,481 UART: [idev] Sha1 KeyId Algorithm
6,051,330 UART: [idev] --
6,054,924 UART: [ldev] ++
6,055,612 UART: [ldev] CDI.KEYID = 6
6,056,579 UART: [ldev] SUBJECT.KEYID = 5
6,057,736 UART: [ldev] AUTHORITY.KEYID = 7
6,058,964 UART: [ldev] FE.KEYID = 1
6,101,362 UART: [ldev] Erasing FE.KEYID = 1
8,605,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,617 UART: [ldev] --
10,412,282 UART: [fwproc] Wait for Commands...
10,415,183 UART: [fwproc] Recv command 0x46574c44
10,417,484 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,412 >>> mbox cmd response: success
14,672,541 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,676,033 UART: [afmc] ++
14,676,742 UART: [afmc] CDI.KEYID = 6
14,677,901 UART: [afmc] SUBJECT.KEYID = 7
14,679,451 UART: [afmc] AUTHORITY.KEYID = 5
17,217,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,924 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,087 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
18,986,097 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,009,027 UART: [afmc] --
19,012,823 UART: [cold-reset] --
19,016,418 UART: [state] Locking Datavault
19,021,774 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,957 UART: [state] Locking ICCM
19,025,345 UART: [exit] Launching FMC @ 0x40000130
19,034,063 UART:
19,034,297 UART: Running Caliptra FMC ...
19,035,397 UART:
19,035,575 UART: [state] CFI Enabled
19,097,282 UART: [fht] FMC Alias Private Key: 7
20,863,868 UART: [art] Extend RT PCRs Done
20,865,101 UART: [art] Lock RT PCRs Done
20,866,614 UART: [art] Populate DV Done
20,872,019 UART: [fht] FMC Alias Private Key: 7
20,873,556 UART: [art] Derive CDI
20,874,311 UART: [art] Store in slot 0x4
20,929,970 UART: [art] Derive Key Pair
20,931,015 UART: [art] Store priv key in slot 0x5
23,393,989 UART: [art] Derive Key Pair - Done
23,406,866 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,200 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,705 UART: [art] PUB.X = 62D54F3F355B961395BB32953D9D7B17948CD2776A6D5E15C3570AAD795C46B29302C07312C30B3E18CA330C2BC02EF5
25,128,945 UART: [art] PUB.Y = 8C702B11394F1D9819F59E76C905DB7EA1C2C9915C51D4E08FD0D5B720B1A1A1947845E57D02315999C4BFB44B5CF9D5
25,136,227 UART: [art] SIG.R = 5B3E8ECFDCC39ADFD06FC6BB3E70D1B941F3D5C78232C697237020029DB65BCB002B85B62C32FB0A5630342AF399A147
25,143,580 UART: [art] SIG.S = 37218D9D0FF672DFB53AD842252A0D366BEF32B9B3299437C0DE3737F8D12380A403AFD12DB48C2F532495ABB8114A77
26,122,107 UART: Caliptra RT
26,122,788 UART: [state] CFI Enabled
26,304,989 UART: [rt] RT listening for mailbox commands...
26,336,255 UART: [rt]cmd =0x43455252, len=4
26,347,668 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
3,417,219 ready_for_fw is high
3,417,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,800,635 >>> mbox cmd response: success
14,801,943 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,092,619 UART:
19,093,015 UART: Running Caliptra FMC ...
19,094,176 UART:
19,094,347 UART: [state] CFI Enabled
19,158,628 UART: [fht] FMC Alias Private Key: 7
20,924,808 UART: [art] Extend RT PCRs Done
20,926,037 UART: [art] Lock RT PCRs Done
20,927,559 UART: [art] Populate DV Done
20,932,953 UART: [fht] FMC Alias Private Key: 7
20,934,606 UART: [art] Derive CDI
20,935,434 UART: [art] Store in slot 0x4
20,991,641 UART: [art] Derive Key Pair
20,992,637 UART: [art] Store priv key in slot 0x5
23,455,873 UART: [art] Derive Key Pair - Done
23,469,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,160 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,679 UART: [art] PUB.X = 76669FFE242DB2C6A9A349E5E828C267E7B490DDB91F02C5857E06032716B8A5AECDBE6909076AA9B3C166A19AABEAF9
25,189,923 UART: [art] PUB.Y = 8C2F36373D54D54422EA88A812788E2334BB4B28FE2978C8FBEB1B2BE24DBF66798B0DF18958964435950B38F6C6AF03
25,197,216 UART: [art] SIG.R = 30618200BC1FEAF51EB49E3C2292281E9B7C383277A7F0E9E70C1DA57BA8F81BC10AA05541D15906880FB7B703253BA2
25,204,558 UART: [art] SIG.S = BBD43E913E49CC99F5705469BBC6C5B79964809BB82DA6D96C15420962AC316769C344B6DD57F3A42A7B322144F7D26A
26,183,223 UART: Caliptra RT
26,183,936 UART: [state] CFI Enabled
26,363,228 UART: [rt] RT listening for mailbox commands...
26,394,848 UART: [rt]cmd =0x43455252, len=4
26,406,290 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,492 UART:
192,866 UART: Running Caliptra ROM ...
194,005 UART:
603,496 UART: [state] CFI Enabled
617,039 UART: [state] LifecycleState = Unprovisioned
619,422 UART: [state] DebugLocked = No
621,726 UART: [state] WD Timer not started. Device not locked for debugging
625,846 UART: [kat] SHA2-256
815,690 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,504 UART: [kat] ++
826,953 UART: [kat] sha1
838,633 UART: [kat] SHA2-256
841,696 UART: [kat] SHA2-384
846,992 UART: [kat] SHA2-512-ACC
849,577 UART: [kat] ECC-384
3,293,050 UART: [kat] HMAC-384Kdf
3,305,179 UART: [kat] LMS
3,836,993 UART: [kat] --
3,839,764 UART: [cold-reset] ++
3,841,064 UART: [fht] FHT @ 0x50003400
3,852,694 UART: [idev] ++
3,853,409 UART: [idev] CDI.KEYID = 6
3,854,331 UART: [idev] SUBJECT.KEYID = 7
3,855,587 UART: [idev] UDS.KEYID = 0
3,856,784 ready_for_fw is high
3,857,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,084 UART: [idev] Erasing UDS.KEYID = 0
6,331,287 UART: [idev] Sha1 KeyId Algorithm
6,354,354 UART: [idev] --
6,360,044 UART: [ldev] ++
6,360,737 UART: [ldev] CDI.KEYID = 6
6,361,676 UART: [ldev] SUBJECT.KEYID = 5
6,362,841 UART: [ldev] AUTHORITY.KEYID = 7
6,364,074 UART: [ldev] FE.KEYID = 1
6,376,291 UART: [ldev] Erasing FE.KEYID = 1
8,851,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,741 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,490 UART: [ldev] --
10,641,589 UART: [fwproc] Wait for Commands...
10,644,226 UART: [fwproc] Recv command 0x46574c44
10,646,536 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,304 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,082 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,873 >>> mbox cmd response: success
14,903,894 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
14,907,581 UART: [afmc] ++
14,908,293 UART: [afmc] CDI.KEYID = 6
14,909,491 UART: [afmc] SUBJECT.KEYID = 7
14,910,935 UART: [afmc] AUTHORITY.KEYID = 5
17,416,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,945 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,156 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
19,186,187 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
19,209,182 UART: [afmc] --
19,212,671 UART: [cold-reset] --
19,217,078 UART: [state] Locking Datavault
19,221,580 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,801 UART: [state] Locking ICCM
19,225,510 UART: [exit] Launching FMC @ 0x40000130
19,234,141 UART:
19,234,415 UART: Running Caliptra FMC ...
19,235,453 UART:
19,235,604 UART: [state] CFI Enabled
19,243,680 UART: [fht] FMC Alias Private Key: 7
21,010,037 UART: [art] Extend RT PCRs Done
21,011,258 UART: [art] Lock RT PCRs Done
21,013,026 UART: [art] Populate DV Done
21,018,821 UART: [fht] FMC Alias Private Key: 7
21,020,415 UART: [art] Derive CDI
21,021,160 UART: [art] Store in slot 0x4
21,063,545 UART: [art] Derive Key Pair
21,064,550 UART: [art] Store priv key in slot 0x5
23,491,379 UART: [art] Derive Key Pair - Done
23,504,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,576 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,072 UART: [art] PUB.X = DC9D5A7742BD564E44A5DDA26AA64E225ABDC307CDA5AA6E88306D18B4AC54CD07D826ECEEBBB9C3DD27020A43214A67
25,219,395 UART: [art] PUB.Y = 42953A923A3AAA67A49DCF2720DF81FE9C6715EBF891A4703DA9659DF6BDD51EE99A87437B169697CEECAC5150CFA0C2
25,226,650 UART: [art] SIG.R = B89F4AE3429CE91D6EE25CABB9D45D53CADB21F38BEC324E4B4A5FCF2B3D9163DFC58E40F01B0F50753E16645E44D00B
25,234,092 UART: [art] SIG.S = A270582AD09E086ED09E27C9D82A2538FD7886F6B2DBD35F4C65F445509481350E6DE1AF15ED4CCF330FA79EBABEDA72
26,213,005 UART: Caliptra RT
26,213,726 UART: [state] CFI Enabled
26,345,696 UART: [rt] RT listening for mailbox commands...
26,377,422 UART: [rt]cmd =0x43455252, len=4
26,388,753 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
3,755,772 ready_for_fw is high
3,756,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,083 >>> mbox cmd response: success
15,045,289 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
19,292,865 UART:
19,293,264 UART: Running Caliptra FMC ...
19,294,462 UART:
19,294,639 UART: [state] CFI Enabled
19,302,592 UART: [fht] FMC Alias Private Key: 7
21,068,579 UART: [art] Extend RT PCRs Done
21,069,807 UART: [art] Lock RT PCRs Done
21,071,568 UART: [art] Populate DV Done
21,076,945 UART: [fht] FMC Alias Private Key: 7
21,078,548 UART: [art] Derive CDI
21,079,370 UART: [art] Store in slot 0x4
21,122,239 UART: [art] Derive Key Pair
21,123,241 UART: [art] Store priv key in slot 0x5
23,549,711 UART: [art] Derive Key Pair - Done
23,562,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,921 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,428 UART: [art] PUB.X = 3C3F0402009F6027E1369D07B5F5ACAB7655E4D71F7ED5A31659238D98FF0AB49F7320161C50203A1D9C7315B12DFADB
25,277,645 UART: [art] PUB.Y = 77B65DCA6DF96EC3F5E5B1E348F631E3EBCC16BC19172119FBF3DAB636873ADCF3E1F17E7B76772A251EE14EA7C9E746
25,284,912 UART: [art] SIG.R = 17D16841F5E6B85B2B469166EEFBE0AA443A9EDAE7B07B7E3D3BE1F627EC2E28B03BB78CD7189843545A7BBE7E877DBE
25,292,371 UART: [art] SIG.S = B8F1DA1EFB161AE6CC93877B3B11D7A54BC0076E035EB4EA8EBFAEAF707184A909B95DD01A1E90836AB16C45E72F34D6
26,271,576 UART: Caliptra RT
26,272,267 UART: [state] CFI Enabled
26,405,041 UART: [rt] RT listening for mailbox commands...
26,436,351 UART: [rt]cmd =0x43455252, len=4
26,447,961 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,416 UART: [state] LifecycleState = Unprovisioned
86,071 UART: [state] DebugLocked = No
86,619 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,339 UART: [kat] SHA2-256
882,270 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,385 UART: [kat] ++
886,537 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,528 UART: [kat] HMAC-384Kdf
907,074 UART: [kat] LMS
1,475,270 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,665 UART: [fht] Storing FHT @ 0x50003400
1,479,606 UART: [idev] ++
1,479,774 UART: [idev] CDI.KEYID = 6
1,480,134 UART: [idev] SUBJECT.KEYID = 7
1,480,558 UART: [idev] UDS.KEYID = 0
1,480,903 ready_for_fw is high
1,480,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,634 UART: [idev] Erasing UDS.KEYID = 0
1,505,246 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,309 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,101 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,464 UART: [ldev] --
1,585,841 UART: [fwproc] Waiting for Commands...
1,586,622 UART: [fwproc] Received command 0x46574c44
1,587,413 UART: [fwproc] Received Image of size 118548 bytes
2,932,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,745 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,963 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,266 >>> mbox cmd response: success
3,131,266 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,132,568 UART: [afmc] ++
3,132,736 UART: [afmc] CDI.KEYID = 6
3,133,098 UART: [afmc] SUBJECT.KEYID = 7
3,133,523 UART: [afmc] AUTHORITY.KEYID = 5
3,168,562 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,188 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,202,903 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,210,806 UART: [afmc] --
3,211,726 UART: [cold-reset] --
3,212,470 UART: [state] Locking Datavault
3,213,501 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,105 UART: [state] Locking ICCM
3,214,667 UART: [exit] Launching FMC @ 0x40000130
3,219,997 UART:
3,220,013 UART: Running Caliptra FMC ...
3,220,421 UART:
3,220,475 UART: [state] CFI Enabled
3,230,939 UART: [fht] FMC Alias Private Key: 7
3,349,795 UART: [art] Extend RT PCRs Done
3,350,223 UART: [art] Lock RT PCRs Done
3,351,689 UART: [art] Populate DV Done
3,359,894 UART: [fht] FMC Alias Private Key: 7
3,360,838 UART: [art] Derive CDI
3,361,118 UART: [art] Store in slot 0x4
3,446,784 UART: [art] Derive Key Pair
3,447,144 UART: [art] Store priv key in slot 0x5
3,460,145 UART: [art] Derive Key Pair - Done
3,475,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,228 UART: [art] PUB.X = 0701F80C961E0E92DBFFFF9796E1BD47F58D192C88A6EA6DF1F415FBB1A2298F612C05EE49E994E1548A5F70EDC5CA3F
3,498,001 UART: [art] PUB.Y = CC64C334EE3F2740F79BFB00058B5758857E6F45E377FD513F9999C63373E490FB530815298D707B23823FD140DAD351
3,504,917 UART: [art] SIG.R = F7AC4F28B1BDDB48FA012B53B3A55C89DEB05E17F94D26874D901797495B8E7D96AA894110CC515D5CBB70745F728445
3,511,690 UART: [art] SIG.S = D5C4DE4F1EC045FFA4CA6442EA6C5C54F7A922727569F1EF3148D6ABFCA7A3C3AF2F59B0C41B2D43638B90F25C336CEF
3,535,654 UART: Caliptra RT
3,535,905 UART: [state] CFI Enabled
3,656,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,019 UART: [rt]cmd =0x43455252, len=4
3,697,779 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,123 ready_for_fw is high
1,363,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,656 >>> mbox cmd response: success
2,982,656 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,044,107 UART:
3,044,123 UART: Running Caliptra FMC ...
3,044,531 UART:
3,044,585 UART: [state] CFI Enabled
3,054,875 UART: [fht] FMC Alias Private Key: 7
3,173,409 UART: [art] Extend RT PCRs Done
3,173,837 UART: [art] Lock RT PCRs Done
3,175,391 UART: [art] Populate DV Done
3,183,820 UART: [fht] FMC Alias Private Key: 7
3,184,868 UART: [art] Derive CDI
3,185,148 UART: [art] Store in slot 0x4
3,270,774 UART: [art] Derive Key Pair
3,271,134 UART: [art] Store priv key in slot 0x5
3,284,305 UART: [art] Derive Key Pair - Done
3,299,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,592 UART: [art] PUB.X = 0E7F5AB1FA0EE50333F24BDDD1FE5AEF851273CCEDE69BDF0B2A5EF039CA09BF3B04E7F02E4EA8B3853C7721F84B5E3B
3,322,374 UART: [art] PUB.Y = 6CBE5C50A80D9F3F90E89B811761ABD54CDD7475A604115B05B83A809FC7047DE426F92AE30526F2E954D548879B511D
3,329,311 UART: [art] SIG.R = 5618C0F5DAD9FF6FABD94F259BE79CB97B6F0DC33E2766F6AC2FF5165D9CBA61418EB9FB3351A8C4389B6669113B0BA7
3,336,093 UART: [art] SIG.S = 97A4BDD2EA58C90C355086468F3C5C00F5C348D6F74653CC11840C69086BE1D4909FC222C3CEC7A94545BDF69688674C
3,359,624 UART: Caliptra RT
3,359,875 UART: [state] CFI Enabled
3,480,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,568 UART: [rt]cmd =0x43455252, len=4
3,521,445 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,862 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,506 UART: [kat] SHA2-256
882,437 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,552 UART: [kat] ++
886,704 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,769 UART: [kat] SHA2-512-ACC
897,670 UART: [kat] ECC-384
903,449 UART: [kat] HMAC-384Kdf
908,237 UART: [kat] LMS
1,476,433 UART: [kat] --
1,477,416 UART: [cold-reset] ++
1,477,988 UART: [fht] Storing FHT @ 0x50003400
1,480,755 UART: [idev] ++
1,480,923 UART: [idev] CDI.KEYID = 6
1,481,283 UART: [idev] SUBJECT.KEYID = 7
1,481,707 UART: [idev] UDS.KEYID = 0
1,482,052 ready_for_fw is high
1,482,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,839 UART: [idev] Erasing UDS.KEYID = 0
1,506,355 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,843 UART: [idev] --
1,516,062 UART: [ldev] ++
1,516,230 UART: [ldev] CDI.KEYID = 6
1,516,593 UART: [ldev] SUBJECT.KEYID = 5
1,517,019 UART: [ldev] AUTHORITY.KEYID = 7
1,517,482 UART: [ldev] FE.KEYID = 1
1,522,728 UART: [ldev] Erasing FE.KEYID = 1
1,547,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,659 UART: [ldev] --
1,587,006 UART: [fwproc] Waiting for Commands...
1,587,855 UART: [fwproc] Received command 0x46574c44
1,588,646 UART: [fwproc] Received Image of size 118548 bytes
2,933,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,674 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,892 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,293 >>> mbox cmd response: success
3,132,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,133,625 UART: [afmc] ++
3,133,793 UART: [afmc] CDI.KEYID = 6
3,134,155 UART: [afmc] SUBJECT.KEYID = 7
3,134,580 UART: [afmc] AUTHORITY.KEYID = 5
3,169,545 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,701 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,481 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,190 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,073 UART: [afmc] SIG.R = 0496C67BA7F71B1EA67BC9CCC915CDE3B7CF2D8D7E9589CB4461368121C369C4E0507A673BC18CF45B9B56D5322CAF64
3,203,788 UART: [afmc] SIG.S = CA7A6A2F55E6ABA1AD199668B52DD658A1318D57261ACBD6263AF71182980DF771B529238ABD43C2EA0A7535D0A3BB03
3,211,649 UART: [afmc] --
3,212,575 UART: [cold-reset] --
3,213,309 UART: [state] Locking Datavault
3,214,550 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,154 UART: [state] Locking ICCM
3,215,782 UART: [exit] Launching FMC @ 0x40000130
3,221,112 UART:
3,221,128 UART: Running Caliptra FMC ...
3,221,536 UART:
3,221,679 UART: [state] CFI Enabled
3,232,665 UART: [fht] FMC Alias Private Key: 7
3,352,205 UART: [art] Extend RT PCRs Done
3,352,633 UART: [art] Lock RT PCRs Done
3,354,159 UART: [art] Populate DV Done
3,362,514 UART: [fht] FMC Alias Private Key: 7
3,363,524 UART: [art] Derive CDI
3,363,804 UART: [art] Store in slot 0x4
3,449,456 UART: [art] Derive Key Pair
3,449,816 UART: [art] Store priv key in slot 0x5
3,463,319 UART: [art] Derive Key Pair - Done
3,477,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,391 UART: [art] PUB.X = 7C6F3AD700D043B16E79D5399A1961CDF5DF21CBBE3F486EC2FC2C25DD598C0C181EFC9779ED53E6A11B5788CD275153
3,501,150 UART: [art] PUB.Y = 5BEB687FEC3A407D7B4D4A40C2969A1139DB854C5D92F6B2012FBCB93558AD53D8BC784703438E61F76B1085132C1C64
3,508,098 UART: [art] SIG.R = 4E3E43582CB19D5ECAE759BC4ABF00386DD314B403B3E544D59A6808C8BD9A9062FAD1985651C1FFFCF61BA66BBA50B8
3,514,858 UART: [art] SIG.S = 93A005E79A6F0B8F4E8728AE413C14C8DD625C29210C21D98C57358936DD0644F283C801F063A0676A8E8CDB9B0CA014
3,538,642 UART: Caliptra RT
3,538,985 UART: [state] CFI Enabled
3,658,788 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,078 UART: [rt]cmd =0x43455252, len=4
3,699,811 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,122 ready_for_fw is high
1,363,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,711 >>> mbox cmd response: success
2,982,711 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
3,045,058 UART:
3,045,074 UART: Running Caliptra FMC ...
3,045,482 UART:
3,045,625 UART: [state] CFI Enabled
3,056,409 UART: [fht] FMC Alias Private Key: 7
3,175,235 UART: [art] Extend RT PCRs Done
3,175,663 UART: [art] Lock RT PCRs Done
3,177,191 UART: [art] Populate DV Done
3,185,178 UART: [fht] FMC Alias Private Key: 7
3,186,152 UART: [art] Derive CDI
3,186,432 UART: [art] Store in slot 0x4
3,272,196 UART: [art] Derive Key Pair
3,272,556 UART: [art] Store priv key in slot 0x5
3,285,953 UART: [art] Derive Key Pair - Done
3,300,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,136 UART: [art] PUB.X = 88C193BCF631484408126BA3081F4A4DB0BEB75A729D77FFA8D060CF13F1DDFA1F810526FE4DEC673727D0FCBDCDC28C
3,323,917 UART: [art] PUB.Y = 84EC4887444ADAC6A6CEB7B9ED2596D3E55822D3D30DBEE88B89E54FD5056BF4B327FA82853C0FEE3F5F48FC7F273DEE
3,330,880 UART: [art] SIG.R = 751FB40BA296FFAC71CB9C2EB8C83776BD2828789DD06D3004BBBE23BE3240377414F72CF2F6A2F9D9D28D771F7A0FBE
3,337,657 UART: [art] SIG.S = 025444C4B0868C22B47066E8B9140132BEDDC3046678A18F68F4D09DF81972A36BF3306B66F44C4C46E0FFF9F3AAA299
3,361,780 UART: Caliptra RT
3,362,123 UART: [state] CFI Enabled
3,482,029 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,629 UART: [rt]cmd =0x43455252, len=4
3,523,470 >>> mbox cmd response data (782 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,320 UART: [state] LifecycleState = Unprovisioned
85,975 UART: [state] DebugLocked = No
86,457 UART: [state] WD Timer not started. Device not locked for debugging
87,810 UART: [kat] SHA2-256
891,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,464 UART: [kat] ++
895,616 UART: [kat] sha1
899,870 UART: [kat] SHA2-256
901,810 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,578 UART: [idev] ++
1,172,746 UART: [idev] CDI.KEYID = 6
1,173,107 UART: [idev] SUBJECT.KEYID = 7
1,173,532 UART: [idev] UDS.KEYID = 0
1,173,878 ready_for_fw is high
1,173,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,503 UART: [idev] Erasing UDS.KEYID = 0
1,198,617 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,486 UART: [ldev] ++
1,208,654 UART: [ldev] CDI.KEYID = 6
1,209,018 UART: [ldev] SUBJECT.KEYID = 5
1,209,445 UART: [ldev] AUTHORITY.KEYID = 7
1,209,908 UART: [ldev] FE.KEYID = 1
1,214,616 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,144 UART: [ldev] --
1,280,493 UART: [fwproc] Wait for Commands...
1,281,252 UART: [fwproc] Recv command 0x46574c44
1,281,985 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,197 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,605 >>> mbox cmd response: success
2,823,605 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,824,885 UART: [afmc] ++
2,825,053 UART: [afmc] CDI.KEYID = 6
2,825,416 UART: [afmc] SUBJECT.KEYID = 7
2,825,842 UART: [afmc] AUTHORITY.KEYID = 5
2,861,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,910 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,896,611 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,904,516 UART: [afmc] --
2,905,555 UART: [cold-reset] --
2,906,489 UART: [state] Locking Datavault
2,907,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,228 UART: [state] Locking ICCM
2,908,682 UART: [exit] Launching FMC @ 0x40000130
2,914,012 UART:
2,914,028 UART: Running Caliptra FMC ...
2,914,436 UART:
2,914,490 UART: [state] CFI Enabled
2,925,168 UART: [fht] FMC Alias Private Key: 7
3,044,054 UART: [art] Extend RT PCRs Done
3,044,482 UART: [art] Lock RT PCRs Done
3,046,072 UART: [art] Populate DV Done
3,054,389 UART: [fht] FMC Alias Private Key: 7
3,055,355 UART: [art] Derive CDI
3,055,635 UART: [art] Store in slot 0x4
3,141,684 UART: [art] Derive Key Pair
3,142,044 UART: [art] Store priv key in slot 0x5
3,155,400 UART: [art] Derive Key Pair - Done
3,170,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,735 UART: [art] PUB.X = C47A61861D347BA41595FBB0D35B7765A7452F073C70AA10699E4B06C76A61D3BD492484B366C9A5523F2E4AD21647E6
3,193,497 UART: [art] PUB.Y = AF2152D4B04F869ED9F96C4472741AE0E3B7F0BB5238EE83463AD56E9541D7D10CF8CB00602AF5BF500979C72187DC4A
3,200,427 UART: [art] SIG.R = 58B3581288B3127959C0E132AA0608B59A922968277516D6FC3AF4A6C3DDE9D13E5B05790DB622F9C77A22374DBB1260
3,207,181 UART: [art] SIG.S = B4D02C47B71B16A1E670E4B0826EA69BE0F02AECB4C5E97118E36CB4087DA662F933CD51566A1FC9F87D779FCB451F56
3,230,292 UART: Caliptra RT
3,230,543 UART: [state] CFI Enabled
3,351,215 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,661 UART: [rt]cmd =0x43455252, len=4
3,392,542 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,100 ready_for_fw is high
1,059,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,830 >>> mbox cmd response: success
2,677,830 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,739,833 UART:
2,739,849 UART: Running Caliptra FMC ...
2,740,257 UART:
2,740,311 UART: [state] CFI Enabled
2,750,851 UART: [fht] FMC Alias Private Key: 7
2,869,489 UART: [art] Extend RT PCRs Done
2,869,917 UART: [art] Lock RT PCRs Done
2,871,535 UART: [art] Populate DV Done
2,879,910 UART: [fht] FMC Alias Private Key: 7
2,880,968 UART: [art] Derive CDI
2,881,248 UART: [art] Store in slot 0x4
2,967,111 UART: [art] Derive Key Pair
2,967,471 UART: [art] Store priv key in slot 0x5
2,980,435 UART: [art] Derive Key Pair - Done
2,995,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,062 UART: [art] PUB.X = 99B022B4A8F09E0E1809E22E7FA4F8A82E5CF3E84925F1D44811B995DA0A2B26FB536AD74F8D4FF6A9D85250DE7AC214
3,018,835 UART: [art] PUB.Y = F67A5AE441EA64DA52B94AF0C248DE7AC282FFB035F8E312F579A70AD175DAB75B8B728B90C51B095027BC34FB9B830B
3,025,792 UART: [art] SIG.R = 987B4EF0F769D39A7EF95E3A07A517FF81C188AC8D237DF53AF56F4C4655854B93A517FACD87E994AEC85A429B04C2C4
3,032,568 UART: [art] SIG.S = 5CEF4EA2362F3C971CA78176C040B93AC8B93C6264BAFD29FB38D4D879B5B91D21E9B5E7FF2C2DD029B638C87A697089
3,056,616 UART: Caliptra RT
3,056,867 UART: [state] CFI Enabled
3,176,365 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,929 UART: [rt]cmd =0x43455252, len=4
3,217,708 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,502 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,720 UART: [kat] SHA2-512-ACC
906,621 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,314 UART: [kat] LMS
1,169,626 UART: [kat] --
1,170,507 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,489 UART: [idev] ++
1,173,657 UART: [idev] CDI.KEYID = 6
1,174,018 UART: [idev] SUBJECT.KEYID = 7
1,174,443 UART: [idev] UDS.KEYID = 0
1,174,789 ready_for_fw is high
1,174,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,306 UART: [idev] Erasing UDS.KEYID = 0
1,199,548 UART: [idev] Sha1 KeyId Algorithm
1,208,308 UART: [idev] --
1,209,419 UART: [ldev] ++
1,209,587 UART: [ldev] CDI.KEYID = 6
1,209,951 UART: [ldev] SUBJECT.KEYID = 5
1,210,378 UART: [ldev] AUTHORITY.KEYID = 7
1,210,841 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,517 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,451 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,290 >>> mbox cmd response: success
2,827,290 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,828,640 UART: [afmc] ++
2,828,808 UART: [afmc] CDI.KEYID = 6
2,829,171 UART: [afmc] SUBJECT.KEYID = 7
2,829,597 UART: [afmc] AUTHORITY.KEYID = 5
2,865,374 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,585 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,334 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,925 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,899,626 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,427 UART: [afmc] --
2,908,318 UART: [cold-reset] --
2,909,060 UART: [state] Locking Datavault
2,910,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,815 UART: [state] Locking ICCM
2,911,445 UART: [exit] Launching FMC @ 0x40000130
2,916,775 UART:
2,916,791 UART: Running Caliptra FMC ...
2,917,199 UART:
2,917,342 UART: [state] CFI Enabled
2,928,086 UART: [fht] FMC Alias Private Key: 7
3,047,562 UART: [art] Extend RT PCRs Done
3,047,990 UART: [art] Lock RT PCRs Done
3,049,486 UART: [art] Populate DV Done
3,057,725 UART: [fht] FMC Alias Private Key: 7
3,058,777 UART: [art] Derive CDI
3,059,057 UART: [art] Store in slot 0x4
3,144,778 UART: [art] Derive Key Pair
3,145,138 UART: [art] Store priv key in slot 0x5
3,158,966 UART: [art] Derive Key Pair - Done
3,173,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,718 UART: [art] PUB.X = 1EF16D86BCEB3B00755E1D273316876881ABABA13984A2FF2752CDA64DFA1DD0F6B47B80D92D41264140569454C5FE5B
3,196,474 UART: [art] PUB.Y = 7BCDD7481D94EFD62344004847D20DDE9C069EF45F1B17AABE34EBE13FC4FB93661511CF23D65DEFE9511F83502BEBA9
3,203,414 UART: [art] SIG.R = C304120819607586B51679D04F4794589093A70D4A236AB39A8651C89DBE6D37F49996CF0F1D974329EA1D7CE453B055
3,210,162 UART: [art] SIG.S = 145E135B2C6E4090ED50A90C1D2F9525395129CF65F728E672FD9D13CA57446D99B96DBADB41894DC45F1B3B959BD614
3,234,071 UART: Caliptra RT
3,234,414 UART: [state] CFI Enabled
3,353,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,996 UART: [rt]cmd =0x43455252, len=4
3,394,761 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,079 ready_for_fw is high
1,060,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,293 >>> mbox cmd response: success
2,679,293 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,096 UART:
2,742,112 UART: Running Caliptra FMC ...
2,742,520 UART:
2,742,663 UART: [state] CFI Enabled
2,753,441 UART: [fht] FMC Alias Private Key: 7
2,872,909 UART: [art] Extend RT PCRs Done
2,873,337 UART: [art] Lock RT PCRs Done
2,874,945 UART: [art] Populate DV Done
2,883,232 UART: [fht] FMC Alias Private Key: 7
2,884,216 UART: [art] Derive CDI
2,884,496 UART: [art] Store in slot 0x4
2,970,267 UART: [art] Derive Key Pair
2,970,627 UART: [art] Store priv key in slot 0x5
2,983,983 UART: [art] Derive Key Pair - Done
2,998,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,213 UART: [art] PUB.X = D8B0459632BB6F1D415C5429C5E49A409B2B3F812E7705B2F135D6ED345D18BDF7B96D724C7945909ED6313ADCB0EB9D
3,021,988 UART: [art] PUB.Y = 2E96E1E2CA62291E5A126259C11A6DF8061CA2E659F5727D66083DC60AC7EAAA4AD863A5918ABB64744223D99C8C0407
3,028,927 UART: [art] SIG.R = A230485588DA4AA1CB7F8BCC9064E6E05F5CBB621B93FDA5D50FB6CB5B9E90DCBC6D757947BC522DC57829E8EA12F1C3
3,035,716 UART: [art] SIG.S = 3FC8093B630881B043F6B5A59B02F987FBB38860EFEA0914961D3137E11B9C0A6F0D60A0613BA0FC8F0108C55E0A3756
3,059,417 UART: Caliptra RT
3,059,760 UART: [state] CFI Enabled
3,179,420 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,734 UART: [rt]cmd =0x43455252, len=4
3,220,617 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
893,014 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,139 UART: [kat] ++
897,291 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,392 UART: [kat] LMS
1,170,720 UART: [kat] --
1,171,411 UART: [cold-reset] ++
1,171,829 UART: [fht] FHT @ 0x50003400
1,174,454 UART: [idev] ++
1,174,622 UART: [idev] CDI.KEYID = 6
1,174,982 UART: [idev] SUBJECT.KEYID = 7
1,175,406 UART: [idev] UDS.KEYID = 0
1,175,751 ready_for_fw is high
1,175,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,364 UART: [idev] Erasing UDS.KEYID = 0
1,200,373 UART: [idev] Sha1 KeyId Algorithm
1,208,665 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,172 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,399 UART: [ldev] Erasing FE.KEYID = 1
1,242,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,556 UART: [fwproc] Recv command 0x46574c44
1,283,284 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,303 >>> mbox cmd response: success
2,826,303 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,827,709 UART: [afmc] ++
2,827,877 UART: [afmc] CDI.KEYID = 6
2,828,239 UART: [afmc] SUBJECT.KEYID = 7
2,828,664 UART: [afmc] AUTHORITY.KEYID = 5
2,864,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,290 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,630 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,899,331 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,365 UART: [afmc] --
2,908,301 UART: [cold-reset] --
2,909,231 UART: [state] Locking Datavault
2,910,426 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,030 UART: [state] Locking ICCM
2,911,558 UART: [exit] Launching FMC @ 0x40000130
2,916,888 UART:
2,916,904 UART: Running Caliptra FMC ...
2,917,312 UART:
2,917,366 UART: [state] CFI Enabled
2,927,830 UART: [fht] FMC Alias Private Key: 7
3,047,040 UART: [art] Extend RT PCRs Done
3,047,468 UART: [art] Lock RT PCRs Done
3,049,184 UART: [art] Populate DV Done
3,057,317 UART: [fht] FMC Alias Private Key: 7
3,058,337 UART: [art] Derive CDI
3,058,617 UART: [art] Store in slot 0x4
3,143,778 UART: [art] Derive Key Pair
3,144,138 UART: [art] Store priv key in slot 0x5
3,156,770 UART: [art] Derive Key Pair - Done
3,171,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,937 UART: [art] PUB.X = 9B861B21223753FF299FBC3FC4DF17B2F06FC12E4E58E0CB24F9C088F86D501B15C47FE169FEB3361968A9BC009634C5
3,194,693 UART: [art] PUB.Y = C5A77E0A0197458E155C64353DCF3E8E433E4F76614A5F9EBE81F93821103EBB89DC31C49551CB29707AA2A162573B2A
3,201,639 UART: [art] SIG.R = 6C0FA8018093987FAF8D42C67C59FA11B50BAF88C522FD14DFC4F81597AD128C925E159CC3762C0A684C0B584357472E
3,208,398 UART: [art] SIG.S = 8B81E2BC3A6B9560D3BD4C90D6E2BE3691ACDD98F133DFECCDE62F3EE7506179E9D3E0E65757D082F929998816E9D448
3,232,422 UART: Caliptra RT
3,232,673 UART: [state] CFI Enabled
3,352,799 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,439 UART: [rt]cmd =0x43455252, len=4
3,394,370 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,419 ready_for_fw is high
1,060,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,526 >>> mbox cmd response: success
2,679,526 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,307 UART:
2,742,323 UART: Running Caliptra FMC ...
2,742,731 UART:
2,742,785 UART: [state] CFI Enabled
2,752,785 UART: [fht] FMC Alias Private Key: 7
2,871,397 UART: [art] Extend RT PCRs Done
2,871,825 UART: [art] Lock RT PCRs Done
2,873,351 UART: [art] Populate DV Done
2,881,472 UART: [fht] FMC Alias Private Key: 7
2,882,420 UART: [art] Derive CDI
2,882,700 UART: [art] Store in slot 0x4
2,968,257 UART: [art] Derive Key Pair
2,968,617 UART: [art] Store priv key in slot 0x5
2,981,241 UART: [art] Derive Key Pair - Done
2,996,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,399 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,164 UART: [art] PUB.X = BF6FD2B6D75DB4C0DAE83D7B5EDB7C1BD29A80768873FDF736ABAEEA67E558F3EF3EC3A2C578C2DBD4AE067A525FBEE5
3,019,967 UART: [art] PUB.Y = 77AD65CDC1EC0D8F52BD930EF66FE9643E6049A83A669443B00040FEEAA6308FC5F6EE99D020724D265133FB1D5E5C98
3,026,899 UART: [art] SIG.R = BC7B52A5C767F47E530E5DE3D47CDC2A8B57205D14F83F4BD4AD4DB5F56C5E67F977D7BE39A854839E79314537603F8B
3,033,676 UART: [art] SIG.S = DE2A62A605560B95009EB1C78116DE528F1E2E4D3F35EFD25755E6348B0CB93C7A204C38BC811CE098CE6B189651A9A7
3,057,273 UART: Caliptra RT
3,057,524 UART: [state] CFI Enabled
3,177,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,851 UART: [rt]cmd =0x43455252, len=4
3,218,771 >>> mbox cmd response data (784 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,553 UART: [state] LifecycleState = Unprovisioned
86,208 UART: [state] DebugLocked = No
86,702 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,649 UART: [kat] SHA2-512-ACC
908,550 UART: [kat] ECC-384
918,791 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,662 UART: [fht] FHT @ 0x50003400
1,175,153 UART: [idev] ++
1,175,321 UART: [idev] CDI.KEYID = 6
1,175,681 UART: [idev] SUBJECT.KEYID = 7
1,176,105 UART: [idev] UDS.KEYID = 0
1,176,450 ready_for_fw is high
1,176,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,441 UART: [idev] Erasing UDS.KEYID = 0
1,201,776 UART: [idev] Sha1 KeyId Algorithm
1,210,244 UART: [idev] --
1,211,160 UART: [ldev] ++
1,211,328 UART: [ldev] CDI.KEYID = 6
1,211,691 UART: [ldev] SUBJECT.KEYID = 5
1,212,117 UART: [ldev] AUTHORITY.KEYID = 7
1,212,580 UART: [ldev] FE.KEYID = 1
1,218,014 UART: [ldev] Erasing FE.KEYID = 1
1,244,897 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,708 UART: [ldev] --
1,284,103 UART: [fwproc] Wait for Commands...
1,284,679 UART: [fwproc] Recv command 0x46574c44
1,285,407 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,264 >>> mbox cmd response: success
2,827,264 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,828,560 UART: [afmc] ++
2,828,728 UART: [afmc] CDI.KEYID = 6
2,829,090 UART: [afmc] SUBJECT.KEYID = 7
2,829,515 UART: [afmc] AUTHORITY.KEYID = 5
2,865,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,719 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,428 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,311 UART: [afmc] SIG.R = BBA98CA1B5441E4D38094354026407949EF90B1FBDF0FFCC4B7D8DAB8373826C6231A36854FF8D53927B5C68529074F0
2,900,012 UART: [afmc] SIG.S = B77D73EA2D2A1F7AF9E242375F41FD6E38FB164302EA77253467CD63F2CEC9154BDA57F82572BF3DE8C0C717FCC232E4
2,907,844 UART: [afmc] --
2,908,972 UART: [cold-reset] --
2,909,740 UART: [state] Locking Datavault
2,910,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,443 UART: [state] Locking ICCM
2,912,027 UART: [exit] Launching FMC @ 0x40000130
2,917,357 UART:
2,917,373 UART: Running Caliptra FMC ...
2,917,781 UART:
2,917,924 UART: [state] CFI Enabled
2,928,730 UART: [fht] FMC Alias Private Key: 7
3,047,624 UART: [art] Extend RT PCRs Done
3,048,052 UART: [art] Lock RT PCRs Done
3,049,698 UART: [art] Populate DV Done
3,058,151 UART: [fht] FMC Alias Private Key: 7
3,059,147 UART: [art] Derive CDI
3,059,427 UART: [art] Store in slot 0x4
3,145,124 UART: [art] Derive Key Pair
3,145,484 UART: [art] Store priv key in slot 0x5
3,159,384 UART: [art] Derive Key Pair - Done
3,174,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,832 UART: [art] PUB.X = 2A6F9E7FA3CF03102C3137DCFC5FF0449E0AD04DC4961381ECD6FCD88B9B0C05836731D76CA00086D5B13004C68EFE00
3,197,555 UART: [art] PUB.Y = 5BC3F4DD7542B0B17F943E1D1B103866B729A5AC460FC50734E783969DBF8FC991DBD255E6152C7FE8C9FB57E23B5D40
3,204,509 UART: [art] SIG.R = 7B2DCAF32036D34514D9802370FDB141FC600BD4DA2A7D7A98A495DD07B1497166B2F4654F3AE95B1B6C312C9BD11AF1
3,211,283 UART: [art] SIG.S = DC195A6FEF528BBDF909223DC6CC564B5D4D4444C68FDE49FFEB3CB460AC37E3D9ECF8DB1605BA6F4B0EC06D98FDDFB9
3,235,058 UART: Caliptra RT
3,235,401 UART: [state] CFI Enabled
3,355,021 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,337 UART: [rt]cmd =0x43455252, len=4
3,396,310 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,194 ready_for_fw is high
1,060,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,101 >>> mbox cmd response: success
2,679,101 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
2,742,332 UART:
2,742,348 UART: Running Caliptra FMC ...
2,742,756 UART:
2,742,899 UART: [state] CFI Enabled
2,753,509 UART: [fht] FMC Alias Private Key: 7
2,871,981 UART: [art] Extend RT PCRs Done
2,872,409 UART: [art] Lock RT PCRs Done
2,874,103 UART: [art] Populate DV Done
2,882,430 UART: [fht] FMC Alias Private Key: 7
2,883,428 UART: [art] Derive CDI
2,883,708 UART: [art] Store in slot 0x4
2,969,081 UART: [art] Derive Key Pair
2,969,441 UART: [art] Store priv key in slot 0x5
2,982,927 UART: [art] Derive Key Pair - Done
2,997,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,601 UART: [art] PUB.X = 7B5A3996A2F0FD849F32B55F4FEF7E90F61D9DB0E0117131DD034B8B0D2188AD30594AD69362D6772DD7B5E366C04386
3,020,369 UART: [art] PUB.Y = AD6F0C846E4E349C9C8264DC7F779C527A5C3D9AA0E63EA3925E15CCB94D3CE53BF4C20E857429E01E032BFFCC00C7C7
3,027,306 UART: [art] SIG.R = 4BD593984FDCE9082C0C9C31B7C6DA185C514A588C893ABA48C037FEDE43BAEB0E09093116F4C743C87F8233DBBB6942
3,034,073 UART: [art] SIG.S = CA610A1EE4979FB6FEC257408E987A238A36FC4F9966AD6D622A9002C610371267CFCF23CB4E47325F5E876DB6B08005
3,058,144 UART: Caliptra RT
3,058,487 UART: [state] CFI Enabled
3,179,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,625 UART: [rt]cmd =0x43455252, len=4
3,220,506 >>> mbox cmd response data (783 bytes)
test test_certs::test_rt_cert_with_custom_dates ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,183 UART:
192,564 UART: Running Caliptra ROM ...
193,762 UART:
193,916 UART: [state] CFI Enabled
265,733 UART: [state] LifecycleState = Unprovisioned
267,729 UART: [state] DebugLocked = No
269,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,923 UART: [kat] SHA2-256
443,691 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,153 UART: [kat] ++
454,601 UART: [kat] sha1
466,327 UART: [kat] SHA2-256
469,056 UART: [kat] SHA2-384
474,342 UART: [kat] SHA2-512-ACC
476,681 UART: [kat] ECC-384
2,766,374 UART: [kat] HMAC-384Kdf
2,799,783 UART: [kat] LMS
3,990,087 UART: [kat] --
3,993,530 UART: [cold-reset] ++
3,995,485 UART: [fht] Storing FHT @ 0x50003400
4,007,362 UART: [idev] ++
4,007,947 UART: [idev] CDI.KEYID = 6
4,008,836 UART: [idev] SUBJECT.KEYID = 7
4,010,081 UART: [idev] UDS.KEYID = 0
4,011,165 ready_for_fw is high
4,011,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,552 UART: [idev] Erasing UDS.KEYID = 0
7,346,399 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,174 UART: [idev] --
7,373,122 UART: [ldev] ++
7,373,700 UART: [ldev] CDI.KEYID = 6
7,374,667 UART: [ldev] SUBJECT.KEYID = 5
7,375,830 UART: [ldev] AUTHORITY.KEYID = 7
7,377,134 UART: [ldev] FE.KEYID = 1
7,421,156 UART: [ldev] Erasing FE.KEYID = 1
10,753,934 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,046 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,753 UART: [ldev] --
13,134,549 UART: [fwproc] Waiting for Commands...
13,137,509 UART: [fwproc] Received command 0x46574c44
13,139,686 UART: [fwproc] Received Image of size 118548 bytes
17,244,515 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,725 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,889 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,749 >>> mbox cmd response: success
17,719,827 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,723,341 UART: [afmc] ++
17,723,928 UART: [afmc] CDI.KEYID = 6
17,724,868 UART: [afmc] SUBJECT.KEYID = 7
17,726,138 UART: [afmc] AUTHORITY.KEYID = 5
21,089,238 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,388,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,403,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,044 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,432,496 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,817 UART: [afmc] --
23,456,580 UART: [cold-reset] --
23,461,357 UART: [state] Locking Datavault
23,466,873 UART: [state] Locking PCR0, PCR1 and PCR31
23,468,631 UART: [state] Locking ICCM
23,471,269 UART: [exit] Launching FMC @ 0x40000130
23,479,683 UART:
23,479,921 UART: Running Caliptra FMC ...
23,481,021 UART:
23,481,188 UART: [state] CFI Enabled
23,547,943 UART: [fht] FMC Alias Private Key: 7
25,887,999 UART: [art] Extend RT PCRs Done
25,889,218 UART: [art] Lock RT PCRs Done
25,890,758 UART: [art] Populate DV Done
25,896,114 UART: [fht] FMC Alias Private Key: 7
25,897,708 UART: [art] Derive CDI
25,898,523 UART: [art] Store in slot 0x4
25,956,023 UART: [art] Derive Key Pair
25,957,065 UART: [art] Store priv key in slot 0x5
29,249,331 UART: [art] Derive Key Pair - Done
29,262,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,335 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,864 UART: [art] PUB.X = 0899546D7892A75CA86F701DED1A141B380013A1A63842BCC069FCD015B0F286EA74830DADA6E997C761829D5F888550
31,559,109 UART: [art] PUB.Y = 446DC9536E739A64661E186432DEFAC8912A8B64C2976D593AA0A0737AD823678E8810A0BFB5492680CD86CD81BF0AEB
31,566,334 UART: [art] SIG.R = 38317C5D2E889B92E6DB9C0D2D2CA39C84D52BB118548EF64E8AA1E3E25C671BACE9E8FDD1D513E42B148D2A5657B50E
31,573,773 UART: [art] SIG.S = 8E479E3FFB1282A710C6CA30278C50BA94A3CDEDA05E9A5721E6ED53707C4FD5C75F64774E1314A1E330E2800F9F2BBA
32,878,825 UART: Caliptra RT
32,879,542 UART: [state] CFI Enabled
33,055,329 UART: [rt] RT listening for mailbox commands...
33,086,749 UART: [rt]cmd =0x4453424c, len=4
36,393,917 >>> mbox cmd response data (8 bytes)
38,465,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,616,710 UART:
38,617,109 UART: Running Caliptra ROM ...
38,618,164 UART:
38,618,316 UART: [state] CFI Enabled
38,675,215 UART: [state] LifecycleState = Unprovisioned
38,677,156 UART: [state] DebugLocked = No
38,678,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,683,798 UART: [kat] SHA2-256
38,853,498 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,864,020 UART: [kat] ++
38,864,482 UART: [kat] sha1
38,877,086 UART: [kat] SHA2-256
38,879,764 UART: [kat] SHA2-384
38,884,626 UART: [kat] SHA2-512-ACC
38,887,031 UART: [kat] ECC-384
41,177,629 UART: [kat] HMAC-384Kdf
41,208,921 UART: [kat] LMS
42,399,267 UART: [kat] --
42,405,395 UART: [update-reset] ++
46,593,736 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,597,081 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,994,854 >>> mbox cmd response: success
46,995,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,995,828 UART: [update-reset] Copying MAN_2 To MAN_1
47,018,278 UART: [update-reset Success] --
47,023,327 UART: [state] Locking Datavault
47,027,388 UART: [state] Locking PCR0, PCR1 and PCR31
47,029,144 UART: [state] Locking ICCM
47,031,297 UART: [exit] Launching FMC @ 0x40000130
47,039,728 UART:
47,040,014 UART: Running Caliptra FMC ...
47,041,136 UART:
47,041,304 UART: [state] CFI Enabled
47,129,365 UART: [art] Extend RT PCRs Done
47,130,552 UART: [art] Lock RT PCRs Done
47,132,064 UART: [art] Populate DV Done
47,137,692 UART: [fht] FMC Alias Private Key: 7
47,139,334 UART: [art] Derive CDI
47,140,209 UART: [art] Store in slot 0x4
47,198,466 UART: [art] Derive Key Pair
47,199,508 UART: [art] Store priv key in slot 0x5
50,493,148 UART: [art] Derive Key Pair - Done
50,506,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,794,129 UART: [art] Erasing AUTHORITY.KEYID = 7
52,795,764 UART: [art] PUB.X = 1D99A867EF956054DD123D1E25375C10247465064C8C85C2E024A31F3BFB5752212CFA0BE32DCCE0E4A144F3F95386E4
52,802,900 UART: [art] PUB.Y = 7AAD1037DB492015209EBEBBC059A7F67D6F2D362C0A77B1DE5810208526FAC7681250AC2CD5A3906468FC87A541A0DD
52,810,187 UART: [art] SIG.R = CA05103AE2100F58DB50D5E331B95110E73C553E71A1AD816F85268954AB6616DE5FDE197618ECFC1818E4699B453088
52,817,570 UART: [art] SIG.S = 85DCEF5213D613E525BC6411A0E84FEAA8BB6455B3DD744F921105FB1A013254E31EC1F41F92BB40A922935CA7D73F0D
54,122,172 UART: Caliptra RT
54,122,884 UART: [state] CFI Enabled
57,838,806 UART: [rt] RT listening for mailbox commands...
57,869,657 UART: [rt]cmd =0x494e464f, len=4
57,873,890 >>> mbox cmd response data (312 bytes)
57,875,743 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,905,293 UART: [rt]cmd =0x43455252, len=4
57,916,714 >>> mbox cmd response data (784 bytes)
57,957,936 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,988,720 UART: [rt]cmd =0x44504543, len=92
63,747,256 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,803,672 ready_for_fw is high
3,804,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,949,671 >>> mbox cmd response: success
17,951,338 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,632,698 UART:
23,633,129 UART: Running Caliptra FMC ...
23,634,238 UART:
23,634,402 UART: [state] CFI Enabled
23,703,817 UART: [fht] FMC Alias Private Key: 7
26,044,131 UART: [art] Extend RT PCRs Done
26,045,359 UART: [art] Lock RT PCRs Done
26,046,829 UART: [art] Populate DV Done
26,051,992 UART: [fht] FMC Alias Private Key: 7
26,053,519 UART: [art] Derive CDI
26,054,311 UART: [art] Store in slot 0x4
26,111,868 UART: [art] Derive Key Pair
26,112,871 UART: [art] Store priv key in slot 0x5
29,405,366 UART: [art] Derive Key Pair - Done
29,418,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,068 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,576 UART: [art] PUB.X = 6285FC64FF5F6030BB8F847F1BA82184D0F7EAE35A036A36EEB12EB23639C93795F536B712A93EF0B45ACAB0EB2D0A10
31,715,880 UART: [art] PUB.Y = 91571A1C49A00E849278CE7F35DD7D2CDD1A5A3447A80F79625395139C85DADB9FA25FB9B163F41C9F9F9EE91A9B0086
31,723,122 UART: [art] SIG.R = 1D207FB1D4E7FE733C5D6B0AB2DFB4C3D7A53B3612F07A5261AB13121163ABB4ACBBED2F5CAD1A0C16D8FF268E0508A6
31,730,520 UART: [art] SIG.S = 90ACA592E979A06F552FBA53DA4F0A93C4177F6AE986B4D95A60B2D5810D88EE5EBC2326DFDF264026B4457688D4A817
33,035,955 UART: Caliptra RT
33,036,692 UART: [state] CFI Enabled
33,213,240 UART: [rt] RT listening for mailbox commands...
33,244,661 UART: [rt]cmd =0x4453424c, len=4
36,531,108 >>> mbox cmd response data (8 bytes)
38,603,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,426,076 >>> mbox cmd response: success
47,426,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,459,714 UART:
47,459,996 UART: Running Caliptra FMC ...
47,461,112 UART:
47,461,287 UART: [state] CFI Enabled
47,563,122 UART: [art] Extend RT PCRs Done
47,564,319 UART: [art] Lock RT PCRs Done
47,565,705 UART: [art] Populate DV Done
47,571,238 UART: [fht] FMC Alias Private Key: 7
47,572,762 UART: [art] Derive CDI
47,573,554 UART: [art] Store in slot 0x4
47,631,866 UART: [art] Derive Key Pair
47,632,868 UART: [art] Store priv key in slot 0x5
50,925,199 UART: [art] Derive Key Pair - Done
50,938,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,226,217 UART: [art] Erasing AUTHORITY.KEYID = 7
53,227,729 UART: [art] PUB.X = 3EA1FE4B52725C7FCABABC74D372CFC188EB989CA3C5AC4912D1993344822592B45E2FCF6B457FA37C67DE4A4BA2FF50
53,234,983 UART: [art] PUB.Y = 537387A6024D0818EA1529B89333437E1A3CBC2CB777209E9ADBB4A85DA16ACB2119E143717486F1C0BC07927ECDB090
53,242,266 UART: [art] SIG.R = 472AB39F207C6AF778A71DE331AC84C8C77DE69464C8DDC137A87DC069407E40681E0442996B8ECE27B59AC5A68F7D32
53,249,648 UART: [art] SIG.S = 2DC573919E64B581651C2D67C6A91782BBB6E3737ABAA48355279B2D8469A03BBB41B952DDD1A4514AE6D9FE5BAFF62C
54,555,308 UART: Caliptra RT
54,556,025 UART: [state] CFI Enabled
58,272,556 UART: [rt] RT listening for mailbox commands...
58,303,571 UART: [rt]cmd =0x494e464f, len=4
58,307,718 >>> mbox cmd response data (312 bytes)
58,309,566 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
58,339,230 UART: [rt]cmd =0x43455252, len=4
58,350,525 >>> mbox cmd response data (782 bytes)
58,392,697 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,423,386 UART: [rt]cmd =0x44504543, len=92
64,185,696 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
192,351 UART:
192,711 UART: Running Caliptra ROM ...
193,837 UART:
603,697 UART: [state] CFI Enabled
620,507 UART: [state] LifecycleState = Unprovisioned
622,485 UART: [state] DebugLocked = No
624,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,082 UART: [kat] SHA2-256
799,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,390 UART: [kat] ++
810,872 UART: [kat] sha1
822,665 UART: [kat] SHA2-256
825,380 UART: [kat] SHA2-384
830,434 UART: [kat] SHA2-512-ACC
832,799 UART: [kat] ECC-384
3,116,877 UART: [kat] HMAC-384Kdf
3,128,639 UART: [kat] LMS
4,318,774 UART: [kat] --
4,322,243 UART: [cold-reset] ++
4,324,176 UART: [fht] Storing FHT @ 0x50003400
4,336,214 UART: [idev] ++
4,336,851 UART: [idev] CDI.KEYID = 6
4,337,728 UART: [idev] SUBJECT.KEYID = 7
4,338,962 UART: [idev] UDS.KEYID = 0
4,339,928 ready_for_fw is high
4,340,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,412 UART: [idev] Erasing UDS.KEYID = 0
7,626,758 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,288 UART: [idev] --
7,653,752 UART: [ldev] ++
7,654,330 UART: [ldev] CDI.KEYID = 6
7,655,291 UART: [ldev] SUBJECT.KEYID = 5
7,656,494 UART: [ldev] AUTHORITY.KEYID = 7
7,657,781 UART: [ldev] FE.KEYID = 1
7,669,305 UART: [ldev] Erasing FE.KEYID = 1
10,962,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,288,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,323,292 UART: [ldev] --
13,327,511 UART: [fwproc] Waiting for Commands...
13,330,554 UART: [fwproc] Received command 0x46574c44
13,332,736 UART: [fwproc] Received Image of size 118548 bytes
17,437,241 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,627 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,918,397 >>> mbox cmd response: success
17,918,898 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
17,923,355 UART: [afmc] ++
17,923,960 UART: [afmc] CDI.KEYID = 6
17,924,840 UART: [afmc] SUBJECT.KEYID = 7
17,926,110 UART: [afmc] AUTHORITY.KEYID = 5
21,242,829 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,537,999 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,540,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,554,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,569,407 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,583,806 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,605,519 UART: [afmc] --
23,610,136 UART: [cold-reset] --
23,613,835 UART: [state] Locking Datavault
23,617,993 UART: [state] Locking PCR0, PCR1 and PCR31
23,619,737 UART: [state] Locking ICCM
23,621,203 UART: [exit] Launching FMC @ 0x40000130
23,629,585 UART:
23,629,838 UART: Running Caliptra FMC ...
23,630,859 UART:
23,630,999 UART: [state] CFI Enabled
23,639,093 UART: [fht] FMC Alias Private Key: 7
25,980,084 UART: [art] Extend RT PCRs Done
25,981,310 UART: [art] Lock RT PCRs Done
25,982,905 UART: [art] Populate DV Done
25,988,257 UART: [fht] FMC Alias Private Key: 7
25,989,896 UART: [art] Derive CDI
25,990,627 UART: [art] Store in slot 0x4
26,033,750 UART: [art] Derive Key Pair
26,034,747 UART: [art] Store priv key in slot 0x5
29,276,450 UART: [art] Derive Key Pair - Done
29,289,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,569,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,340 UART: [art] PUB.X = F86E38FAD8F5A895FDFD1AFA0C08BB5B6EB2F287EE03FD02CC704BAD7AC7F0AD48720DC6E276503F71B7359CE30041F7
31,578,612 UART: [art] PUB.Y = 4BFC0763570EDD665145591398F701867B42B38987979BFF7B694896EF6F82176C3371B83875A803843B6A29DF9F6A86
31,585,778 UART: [art] SIG.R = 5D6D7B3B64D9305E656BC91DA1B5D285F25462701B3F93A259FE23637EFA638E95B76F4880C56C9A9026A10ABECAD5C9
31,593,157 UART: [art] SIG.S = 40BD3DF64EB2AB5003D61380D20232083D18D8DCDB4484D74D19D21269EBE80B2CAE1136C17D3AD799D3EA16A2478B7E
32,898,473 UART: Caliptra RT
32,899,185 UART: [state] CFI Enabled
33,032,467 UART: [rt] RT listening for mailbox commands...
33,064,043 UART: [rt]cmd =0x4453424c, len=4
36,310,128 >>> mbox cmd response data (8 bytes)
38,378,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,529,533 UART:
38,529,896 UART: Running Caliptra ROM ...
38,531,078 UART:
38,531,255 UART: [state] CFI Enabled
38,547,841 UART: [state] LifecycleState = Unprovisioned
38,549,784 UART: [state] DebugLocked = No
38,552,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
38,557,675 UART: [kat] SHA2-256
38,727,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
38,737,890 UART: [kat] ++
38,738,389 UART: [kat] sha1
38,749,921 UART: [kat] SHA2-256
38,752,610 UART: [kat] SHA2-384
38,758,209 UART: [kat] SHA2-512-ACC
38,760,550 UART: [kat] ECC-384
41,043,713 UART: [kat] HMAC-384Kdf
41,054,858 UART: [kat] LMS
42,244,903 UART: [kat] --
42,250,596 UART: [update-reset] ++
46,443,183 UART: [update-reset] Image verified using Vendor ECC Key Index 0
46,446,800 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
46,844,557 >>> mbox cmd response: success
46,844,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
46,845,529 UART: [update-reset] Copying MAN_2 To MAN_1
46,867,947 UART: [update-reset Success] --
46,872,641 UART: [state] Locking Datavault
46,875,188 UART: [state] Locking PCR0, PCR1 and PCR31
46,876,939 UART: [state] Locking ICCM
46,878,355 UART: [exit] Launching FMC @ 0x40000130
46,886,798 UART:
46,887,034 UART: Running Caliptra FMC ...
46,888,133 UART:
46,888,285 UART: [state] CFI Enabled
46,932,452 UART: [art] Extend RT PCRs Done
46,933,644 UART: [art] Lock RT PCRs Done
46,934,989 UART: [art] Populate DV Done
46,940,389 UART: [fht] FMC Alias Private Key: 7
46,942,133 UART: [art] Derive CDI
46,942,990 UART: [art] Store in slot 0x4
46,985,689 UART: [art] Derive Key Pair
46,986,686 UART: [art] Store priv key in slot 0x5
50,229,261 UART: [art] Derive Key Pair - Done
50,242,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,522,241 UART: [art] Erasing AUTHORITY.KEYID = 7
52,523,751 UART: [art] PUB.X = 2777F842A1FC381A0E9C3C4BA4F62AB7986E0F9B9198BD010684F5FA013DA9152EEF7C90ACEFD9C8E4C9235FD71206A7
52,531,080 UART: [art] PUB.Y = F4EB2AB11F03DA827F0652DBE9094E5BB589839C2ACCD54EC6945F9BA3F0478DCF34E599FDB4B46D8A341831C92FD9B6
52,538,368 UART: [art] SIG.R = D46EE4D41AE3A7C54F16E856E75881408A627CDFC9C745B534646F98A8FCF79E801F6AC8FF04897462BBD3206E54AEC6
52,545,751 UART: [art] SIG.S = CE473E5793B4AC8E1B06A370C57CFAED75C045920A36BE4032170B6D451DC2E24DB086E65A6F19BDBB3BCA5A5E687C37
53,851,123 UART: Caliptra RT
53,851,825 UART: [state] CFI Enabled
57,469,102 UART: [rt] RT listening for mailbox commands...
57,500,265 UART: [rt]cmd =0x494e464f, len=4
57,504,575 >>> mbox cmd response data (312 bytes)
57,506,430 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,536,057 UART: [rt]cmd =0x43455252, len=4
57,547,353 >>> mbox cmd response data (784 bytes)
57,588,890 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
57,619,877 UART: [rt]cmd =0x44504543, len=92
63,294,923 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
4,127,395 ready_for_fw is high
4,127,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,633 >>> mbox cmd response: success
18,160,399 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
23,800,597 UART:
23,800,979 UART: Running Caliptra FMC ...
23,802,125 UART:
23,802,278 UART: [state] CFI Enabled
23,810,434 UART: [fht] FMC Alias Private Key: 7
26,149,688 UART: [art] Extend RT PCRs Done
26,150,925 UART: [art] Lock RT PCRs Done
26,152,245 UART: [art] Populate DV Done
26,157,413 UART: [fht] FMC Alias Private Key: 7
26,159,010 UART: [art] Derive CDI
26,159,829 UART: [art] Store in slot 0x4
26,202,437 UART: [art] Derive Key Pair
26,203,478 UART: [art] Store priv key in slot 0x5
29,445,414 UART: [art] Derive Key Pair - Done
29,458,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,309 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,812 UART: [art] PUB.X = 9499CBDAA4DEA2997DF5A2BDB0B8FA28F249BD6E19437FC85C315001673246ECAAFF2AEE7AF383ED3415B27B42B42DD4
31,747,112 UART: [art] PUB.Y = 88AE8D846E32E9AE7850EAFD7EF5E588462DF5261F79FDB730FFB7D4A36696A2979DF621FE9C1EDB253EAB507F72324B
31,754,413 UART: [art] SIG.R = 3114677B551D5FACF738FA04540335E25F2FB9283C2485D19E63024A97E03A99B57825FA93C1BAED1CE3858D95B9999F
31,761,799 UART: [art] SIG.S = 74FD19EC0E55982066A5C960F102B5DE0D7059886EA0C1716CFFA6F1E04B4D40B1FDE8D2CE30F558BF00D15892CF4390
33,067,099 UART: Caliptra RT
33,067,819 UART: [state] CFI Enabled
33,201,590 UART: [rt] RT listening for mailbox commands...
33,232,911 UART: [rt]cmd =0x4453424c, len=4
36,479,361 >>> mbox cmd response data (8 bytes)
38,553,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,308,023 >>> mbox cmd response: success
47,308,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
47,344,778 UART:
47,345,086 UART: Running Caliptra FMC ...
47,346,205 UART:
47,346,365 UART: [state] CFI Enabled
47,390,269 UART: [art] Extend RT PCRs Done
47,391,404 UART: [art] Lock RT PCRs Done
47,393,031 UART: [art] Populate DV Done
47,398,454 UART: [fht] FMC Alias Private Key: 7
47,400,191 UART: [art] Derive CDI
47,401,014 UART: [art] Store in slot 0x4
47,443,455 UART: [art] Derive Key Pair
47,444,450 UART: [art] Store priv key in slot 0x5
50,687,051 UART: [art] Derive Key Pair - Done
50,700,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
52,980,346 UART: [art] Erasing AUTHORITY.KEYID = 7
52,981,853 UART: [art] PUB.X = DD62DDC4589CBE40C8165664C893C2A51C636AAAF44842D4E488F2F3E5DFAFAECDEAB0EE55355065604589BF697EBF9A
52,989,096 UART: [art] PUB.Y = 70AA80E32ACAD3638D1E31EA12956AA1C913D30A44566CF4377C38A893AE3E4FA9B17DBF7046C6C1CBAE15A85F5AA044
52,996,386 UART: [art] SIG.R = 217C536DE175189514A1C7B226EA86D238EB5837A1CA6981C461599260D61CFF3E98B6B8D7DAEE500D0A31F7219CCB2F
53,003,807 UART: [art] SIG.S = B611CF1302AAE1BC0746EBF57B9B24CBCC710603FC735C15D8E066F8EB9ED9049AC24EB7B7CEE6340ED202B944D8D784
54,309,157 UART: Caliptra RT
54,309,870 UART: [state] CFI Enabled
57,927,288 UART: [rt] RT listening for mailbox commands...
57,958,052 UART: [rt]cmd =0x494e464f, len=4
57,962,374 >>> mbox cmd response data (312 bytes)
57,964,205 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
57,993,858 UART: [rt]cmd =0x43455252, len=4
58,005,264 >>> mbox cmd response data (783 bytes)
58,047,383 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
58,078,095 UART: [rt]cmd =0x44504543, len=92
63,753,171 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,997 UART:
192,365 UART: Running Caliptra ROM ...
193,560 UART:
193,714 UART: [state] CFI Enabled
264,613 UART: [state] LifecycleState = Unprovisioned
266,387 UART: [state] DebugLocked = No
268,557 UART: [state] WD Timer not started. Device not locked for debugging
272,317 UART: [kat] SHA2-256
451,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,720 UART: [kat] ++
463,212 UART: [kat] sha1
474,224 UART: [kat] SHA2-256
476,885 UART: [kat] SHA2-384
482,585 UART: [kat] SHA2-512-ACC
484,954 UART: [kat] ECC-384
2,950,574 UART: [kat] HMAC-384Kdf
2,973,319 UART: [kat] LMS
3,449,785 UART: [kat] --
3,453,781 UART: [cold-reset] ++
3,455,135 UART: [fht] FHT @ 0x50003400
3,468,129 UART: [idev] ++
3,468,728 UART: [idev] CDI.KEYID = 6
3,469,681 UART: [idev] SUBJECT.KEYID = 7
3,470,923 UART: [idev] UDS.KEYID = 0
3,471,816 ready_for_fw is high
3,471,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,909 UART: [idev] Erasing UDS.KEYID = 0
5,989,453 UART: [idev] Sha1 KeyId Algorithm
6,012,867 UART: [idev] --
6,017,566 UART: [ldev] ++
6,018,139 UART: [ldev] CDI.KEYID = 6
6,019,021 UART: [ldev] SUBJECT.KEYID = 5
6,020,236 UART: [ldev] AUTHORITY.KEYID = 7
6,021,525 UART: [ldev] FE.KEYID = 1
6,059,160 UART: [ldev] Erasing FE.KEYID = 1
8,565,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,628 UART: [ldev] --
10,378,966 UART: [fwproc] Wait for Commands...
10,381,541 UART: [fwproc] Recv command 0x46574c44
10,383,572 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,901 >>> mbox cmd response: success
14,351,949 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,355,781 UART: [afmc] ++
14,356,365 UART: [afmc] CDI.KEYID = 6
14,357,306 UART: [afmc] SUBJECT.KEYID = 7
14,358,522 UART: [afmc] AUTHORITY.KEYID = 5
16,903,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,645,124 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,647,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,663,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,679,204 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,694,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,720,289 UART: [afmc] --
18,724,160 UART: [cold-reset] --
18,727,973 UART: [state] Locking Datavault
18,732,352 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,100 UART: [state] Locking ICCM
18,736,028 UART: [exit] Launching FMC @ 0x40000130
18,744,420 UART:
18,744,850 UART: Running Caliptra FMC ...
18,745,966 UART:
18,746,123 UART: [state] CFI Enabled
18,800,179 UART: [fht] FMC Alias Private Key: 7
20,566,377 UART: [art] Extend RT PCRs Done
20,567,593 UART: [art] Lock RT PCRs Done
20,569,211 UART: [art] Populate DV Done
20,574,524 UART: [fht] FMC Alias Private Key: 7
20,576,220 UART: [art] Derive CDI
20,577,029 UART: [art] Store in slot 0x4
20,633,097 UART: [art] Derive Key Pair
20,634,136 UART: [art] Store priv key in slot 0x5
23,096,993 UART: [art] Derive Key Pair - Done
23,109,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,421 UART: [art] PUB.X = 515FA5FC3BDD1A8CF24D2007AD67CF70F8597A851BBA8B05278DA148E9345E0C7FF5D2DEE44BD3E35CA3935BFCFC55E1
24,831,740 UART: [art] PUB.Y = 045E1327FF1D4602C6682B35BE930BC0999FC2B3720E5924C57FE29A54353184E39ACA6B286BA2A8A155F912432E2835
24,838,987 UART: [art] SIG.R = E5D82F96854C8683D8C10A86EE0EE48470656C08BDEFF1BE259CB74658EAB9F339008E9AF94EDFD9F9B5234061A70825
24,846,371 UART: [art] SIG.S = A4723A0ACFB1D0778BCC9F4E4E3F07F47F6A598211CE49A91073FB274393F39896613B5D9D2EAF5919D513E7563A7675
25,826,014 UART: Caliptra RT
25,826,728 UART: [state] CFI Enabled
26,007,572 UART: [rt] RT listening for mailbox commands...
26,038,921 UART: [rt]cmd =0x4453424c, len=4
28,516,205 >>> mbox cmd response data (8 bytes)
30,578,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,728,985 UART:
30,729,376 UART: Running Caliptra ROM ...
30,730,512 UART:
30,730,681 UART: [state] CFI Enabled
30,792,487 UART: [state] LifecycleState = Unprovisioned
30,794,411 UART: [state] DebugLocked = No
30,796,767 UART: [state] WD Timer not started. Device not locked for debugging
30,800,937 UART: [kat] SHA2-256
30,980,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,991,402 UART: [kat] ++
30,991,939 UART: [kat] sha1
31,003,858 UART: [kat] SHA2-256
31,006,552 UART: [kat] SHA2-384
31,011,909 UART: [kat] SHA2-512-ACC
31,014,256 UART: [kat] ECC-384
33,456,573 UART: [kat] HMAC-384Kdf
33,481,456 UART: [kat] LMS
33,957,903 UART: [kat] --
33,962,004 UART: [update-reset] ++
37,456,998 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,460,881 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,858,506 >>> mbox cmd response: success
37,858,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,859,836 UART: [update-reset] Copying MAN_2 To MAN_1
37,896,960 UART: [update-reset Success] --
37,900,473 UART: [state] Locking Datavault
37,903,074 UART: [state] Locking PCR0, PCR1 and PCR31
37,904,773 UART: [state] Locking ICCM
37,906,625 UART: [exit] Launching FMC @ 0x40000130
37,914,987 UART:
37,915,233 UART: Running Caliptra FMC ...
37,916,333 UART:
37,916,486 UART: [state] CFI Enabled
38,014,034 UART: [art] Extend RT PCRs Done
38,015,227 UART: [art] Lock RT PCRs Done
38,016,414 UART: [art] Populate DV Done
38,021,931 UART: [fht] FMC Alias Private Key: 7
38,023,623 UART: [art] Derive CDI
38,024,434 UART: [art] Store in slot 0x4
38,083,229 UART: [art] Derive Key Pair
38,084,244 UART: [art] Store priv key in slot 0x5
40,546,675 UART: [art] Derive Key Pair - Done
40,559,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,272,285 UART: [art] Erasing AUTHORITY.KEYID = 7
42,273,795 UART: [art] PUB.X = AF5240D3319196600D8257A0A449648A67A6C45A97ED2F649A032080EEFEE6B3FC85CA23EDD991C335F5C5000F6F8D65
42,281,064 UART: [art] PUB.Y = EC074E9A0CB7262C191CE757722F1CA0A8C9B26C7454974CFCBB29DFD436A36E048498E5C90D511B20EEA9DBBFBA059E
42,288,293 UART: [art] SIG.R = 406E0536D22575C7AABEB3601B889444E96F120619A763A8BA6A696A5F7AB6733D651849122CA9548EBD9546DF179218
42,295,677 UART: [art] SIG.S = 77DA130261B0FE725468B0AEE4A5C498F09745F5FEE23BDBD0C8847A444BC88027A20D7D507642DAB61C64CC2AE875EB
43,274,333 UART: Caliptra RT
43,275,034 UART: [state] CFI Enabled
46,168,546 UART: [rt] RT listening for mailbox commands...
46,199,717 UART: [rt]cmd =0x494e464f, len=4
46,204,091 >>> mbox cmd response data (312 bytes)
46,205,989 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,235,643 UART: [rt]cmd =0x43455252, len=4
46,247,209 >>> mbox cmd response data (782 bytes)
46,289,022 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,319,823 UART: [rt]cmd =0x44504543, len=92
50,668,657 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,463,803 ready_for_fw is high
3,464,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,264,926 >>> mbox cmd response: success
14,266,542 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,563,247 UART:
18,563,650 UART: Running Caliptra FMC ...
18,564,846 UART:
18,565,017 UART: [state] CFI Enabled
18,629,345 UART: [fht] FMC Alias Private Key: 7
20,395,709 UART: [art] Extend RT PCRs Done
20,396,942 UART: [art] Lock RT PCRs Done
20,398,514 UART: [art] Populate DV Done
20,404,199 UART: [fht] FMC Alias Private Key: 7
20,405,689 UART: [art] Derive CDI
20,406,448 UART: [art] Store in slot 0x4
20,462,047 UART: [art] Derive Key Pair
20,463,087 UART: [art] Store priv key in slot 0x5
22,925,850 UART: [art] Derive Key Pair - Done
22,938,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,651,938 UART: [art] Erasing AUTHORITY.KEYID = 7
24,653,457 UART: [art] PUB.X = 0211051E01DF3ADC3A6A68ABD46627A519042649DCB36DA3122910EF2520B8BE27A2B0B65413195F99959E854B61F16B
24,660,673 UART: [art] PUB.Y = CF93D457F346AADD95191713F449894E4EDCFC0A1E56BA5B38F6275FC229F109444AFA3465D659E2A0A0472CBCD84A32
24,667,931 UART: [art] SIG.R = 28493A1F718863BC161AFF51398FAB8DF431D61685CD6F4D9E6E33D8E2E900B550F34AD8FFF7488BB77BE1B877F0C014
24,675,318 UART: [art] SIG.S = DDC1BCD3755E52F1C94FF24E0A99BD26B9CE2B6921046B8E48A9B215A0CBD6ADFCFB8440FC010C2A9194A61432719D8F
25,654,694 UART: Caliptra RT
25,655,396 UART: [state] CFI Enabled
25,836,337 UART: [rt] RT listening for mailbox commands...
25,867,644 UART: [rt]cmd =0x4453424c, len=4
28,344,836 >>> mbox cmd response data (8 bytes)
30,405,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,718,151 >>> mbox cmd response: success
37,718,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,753,004 UART:
37,753,302 UART: Running Caliptra FMC ...
37,754,419 UART:
37,754,580 UART: [state] CFI Enabled
37,843,233 UART: [art] Extend RT PCRs Done
37,844,419 UART: [art] Lock RT PCRs Done
37,845,636 UART: [art] Populate DV Done
37,850,894 UART: [fht] FMC Alias Private Key: 7
37,852,548 UART: [art] Derive CDI
37,853,280 UART: [art] Store in slot 0x4
37,912,427 UART: [art] Derive Key Pair
37,913,472 UART: [art] Store priv key in slot 0x5
40,376,469 UART: [art] Derive Key Pair - Done
40,389,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,102,418 UART: [art] Erasing AUTHORITY.KEYID = 7
42,103,945 UART: [art] PUB.X = F5C7D67E7557CE734CF24B65DDBBD4E165BFE82B8FB38CFE1C000AB38C7737DF2D8ADF5F7503CAA920AE3B24FDA54EBC
42,111,265 UART: [art] PUB.Y = 19FC25AFC230A361D165914C695E29FDA8E281C6357A51213773659D8B42A1A1E5CB3B387E5C483F23417FD6944E80AE
42,118,494 UART: [art] SIG.R = 294BCC274F27D0274C925B6CB2EBEF74083A982DA2BAC1EB3B1E52AC03130B1164970B27DD092F1EFFC9C618C9D8903D
42,125,902 UART: [art] SIG.S = E707245F08A5338831BB33D8AE85C3ECD15B85EBFE888194AC25644AFF7343BF495F6D51EA5E2CD2F6F0272A8B5210A1
43,104,901 UART: Caliptra RT
43,105,607 UART: [state] CFI Enabled
45,998,019 UART: [rt] RT listening for mailbox commands...
46,029,124 UART: [rt]cmd =0x494e464f, len=4
46,033,422 >>> mbox cmd response data (312 bytes)
46,035,479 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,065,237 UART: [rt]cmd =0x43455252, len=4
46,076,841 >>> mbox cmd response data (783 bytes)
46,118,453 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,149,461 UART: [rt]cmd =0x44504543, len=92
50,501,556 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,326 UART:
192,687 UART: Running Caliptra ROM ...
193,774 UART:
603,425 UART: [state] CFI Enabled
619,392 UART: [state] LifecycleState = Unprovisioned
621,301 UART: [state] DebugLocked = No
623,342 UART: [state] WD Timer not started. Device not locked for debugging
627,812 UART: [kat] SHA2-256
807,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,222 UART: [kat] ++
818,671 UART: [kat] sha1
830,042 UART: [kat] SHA2-256
832,704 UART: [kat] SHA2-384
839,200 UART: [kat] SHA2-512-ACC
841,575 UART: [kat] ECC-384
3,282,926 UART: [kat] HMAC-384Kdf
3,295,154 UART: [kat] LMS
3,771,667 UART: [kat] --
3,775,739 UART: [cold-reset] ++
3,777,383 UART: [fht] FHT @ 0x50003400
3,788,436 UART: [idev] ++
3,789,009 UART: [idev] CDI.KEYID = 6
3,789,916 UART: [idev] SUBJECT.KEYID = 7
3,791,165 UART: [idev] UDS.KEYID = 0
3,792,068 ready_for_fw is high
3,792,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,484 UART: [idev] Erasing UDS.KEYID = 0
6,273,891 UART: [idev] Sha1 KeyId Algorithm
6,296,860 UART: [idev] --
6,301,480 UART: [ldev] ++
6,302,058 UART: [ldev] CDI.KEYID = 6
6,302,949 UART: [ldev] SUBJECT.KEYID = 5
6,304,218 UART: [ldev] AUTHORITY.KEYID = 7
6,305,458 UART: [ldev] FE.KEYID = 1
6,317,808 UART: [ldev] Erasing FE.KEYID = 1
8,793,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,649 UART: [ldev] --
10,586,406 UART: [fwproc] Wait for Commands...
10,588,013 UART: [fwproc] Recv command 0x46574c44
10,590,063 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,375 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,380 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,805 >>> mbox cmd response: success
14,557,979 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,561,094 UART: [afmc] ++
14,561,686 UART: [afmc] CDI.KEYID = 6
14,562,568 UART: [afmc] SUBJECT.KEYID = 7
14,563,838 UART: [afmc] AUTHORITY.KEYID = 5
17,072,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,077 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,268 UART: [afmc] --
18,872,892 UART: [cold-reset] --
18,876,858 UART: [state] Locking Datavault
18,881,884 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,641 UART: [state] Locking ICCM
18,885,337 UART: [exit] Launching FMC @ 0x40000130
18,893,785 UART:
18,894,020 UART: Running Caliptra FMC ...
18,895,049 UART:
18,895,202 UART: [state] CFI Enabled
18,903,089 UART: [fht] FMC Alias Private Key: 7
20,669,280 UART: [art] Extend RT PCRs Done
20,670,496 UART: [art] Lock RT PCRs Done
20,672,251 UART: [art] Populate DV Done
20,677,661 UART: [fht] FMC Alias Private Key: 7
20,679,414 UART: [art] Derive CDI
20,680,154 UART: [art] Store in slot 0x4
20,722,642 UART: [art] Derive Key Pair
20,723,679 UART: [art] Store priv key in slot 0x5
23,150,661 UART: [art] Derive Key Pair - Done
23,163,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,521 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,034 UART: [art] PUB.X = 8642E64B61CE5DFBB3CADF4EDC44EEE286C247B9582BDEE8544F0A81507932E9E3B1A54479418F1BBB0935560F0DD73A
24,878,341 UART: [art] PUB.Y = 72D97EDC01A3AC5EA2270EC0577DEF4E49D89AE61003AFCB4CE7A27739E59DF8199E4BBBF453DEC4D480E906D8D424B8
24,885,587 UART: [art] SIG.R = 8CA80BFE77A8676B59B67A641C9D39822A9DDB1E2DE0BFCCBE8D38E055E7865938B08F08A443835E789016D046F2B362
24,892,983 UART: [art] SIG.S = 370EDBCBEE96FB5032C1E49B4CA17A96E3408ED392B67BAFF5684AF65767BD3F511C388E860469E3730680D2E5932104
25,872,186 UART: Caliptra RT
25,872,915 UART: [state] CFI Enabled
26,005,007 UART: [rt] RT listening for mailbox commands...
26,036,265 UART: [rt]cmd =0x4453424c, len=4
28,466,851 >>> mbox cmd response data (8 bytes)
30,528,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,679,499 UART:
30,679,880 UART: Running Caliptra ROM ...
30,681,014 UART:
30,681,189 UART: [state] CFI Enabled
30,697,792 UART: [state] LifecycleState = Unprovisioned
30,699,725 UART: [state] DebugLocked = No
30,701,491 UART: [state] WD Timer not started. Device not locked for debugging
30,705,477 UART: [kat] SHA2-256
30,885,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
30,896,000 UART: [kat] ++
30,896,499 UART: [kat] sha1
30,906,366 UART: [kat] SHA2-256
30,909,064 UART: [kat] SHA2-384
30,914,673 UART: [kat] SHA2-512-ACC
30,917,021 UART: [kat] ECC-384
33,359,213 UART: [kat] HMAC-384Kdf
33,371,920 UART: [kat] LMS
33,848,383 UART: [kat] --
33,852,522 UART: [update-reset] ++
37,348,077 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,352,158 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
37,749,757 >>> mbox cmd response: success
37,750,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,750,418 UART: [update-reset] Copying MAN_2 To MAN_1
37,787,220 UART: [update-reset Success] --
37,791,985 UART: [state] Locking Datavault
37,796,527 UART: [state] Locking PCR0, PCR1 and PCR31
37,798,225 UART: [state] Locking ICCM
37,799,403 UART: [exit] Launching FMC @ 0x40000130
37,807,797 UART:
37,808,033 UART: Running Caliptra FMC ...
37,809,137 UART:
37,809,315 UART: [state] CFI Enabled
37,853,543 UART: [art] Extend RT PCRs Done
37,854,692 UART: [art] Lock RT PCRs Done
37,855,978 UART: [art] Populate DV Done
37,861,337 UART: [fht] FMC Alias Private Key: 7
37,862,939 UART: [art] Derive CDI
37,863,752 UART: [art] Store in slot 0x4
37,906,423 UART: [art] Derive Key Pair
37,907,463 UART: [art] Store priv key in slot 0x5
40,334,189 UART: [art] Derive Key Pair - Done
40,347,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,053,398 UART: [art] Erasing AUTHORITY.KEYID = 7
42,054,901 UART: [art] PUB.X = BB70E977A0D17110086006BD6D14BC96BB2F04B271E774353F24817FFC33B1099D63D32675A8AC2CC32DC24550F01340
42,062,151 UART: [art] PUB.Y = 0A3A0AFAF31AD9D8520EE6BF9865589FFCC6A214C5456DCF589835ACEBB4939EA90D44A30987525FBC8B0AFDBD75CC32
42,069,436 UART: [art] SIG.R = 64891AEDF5FEFCCEA626BDCC6E6F2D66610A36D416DEF588456E002241344ABE5E8D4D6A28A475BFA459AB71559AA640
42,076,840 UART: [art] SIG.S = DF03F50137E07236C0C65CE376C0C26EA2C9A695BF81BAA0D195249244BC0B2F8147C688B1337608CDB112A54BD12179
43,055,803 UART: Caliptra RT
43,056,507 UART: [state] CFI Enabled
45,855,599 UART: [rt] RT listening for mailbox commands...
45,886,624 UART: [rt]cmd =0x494e464f, len=4
45,891,018 >>> mbox cmd response data (312 bytes)
45,892,890 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,922,527 UART: [rt]cmd =0x43455252, len=4
45,934,174 >>> mbox cmd response data (783 bytes)
45,975,551 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,006,184 UART: [rt]cmd =0x44504543, len=92
50,292,177 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
3,781,017 ready_for_fw is high
3,781,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,440,678 >>> mbox cmd response: success
14,441,887 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
18,690,208 UART:
18,690,593 UART: Running Caliptra FMC ...
18,691,737 UART:
18,691,894 UART: [state] CFI Enabled
18,699,813 UART: [fht] FMC Alias Private Key: 7
20,466,460 UART: [art] Extend RT PCRs Done
20,467,684 UART: [art] Lock RT PCRs Done
20,469,099 UART: [art] Populate DV Done
20,474,205 UART: [fht] FMC Alias Private Key: 7
20,475,709 UART: [art] Derive CDI
20,476,476 UART: [art] Store in slot 0x4
20,519,016 UART: [art] Derive Key Pair
20,520,027 UART: [art] Store priv key in slot 0x5
22,947,103 UART: [art] Derive Key Pair - Done
22,960,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,084 UART: [art] PUB.X = 48401F971EBDA1078CB0F1FBA2894FA946301E02EDA9836A373877AF2A9E9059717B589EE330B974C83821B7B5461EE1
24,675,344 UART: [art] PUB.Y = 04059C600B6A6D72D27D3526A66C99BE274DF1E0A9E11CBA8976E82566F949CEC475A3BB2A7EAAD0765677962A76B104
24,682,550 UART: [art] SIG.R = 0BA405583C3CD9CCB73E1D21DC24504634DEC641C4FFC6018463BF531D48671C6F75E3CE2CB5C4047A07BCFD1C7ECAD5
24,690,000 UART: [art] SIG.S = 15E153DCAEAED7D41E9CDC0F2A0E22E053B7B66CDDB24633F975886C8785AF89DD762803FA675B36EE095C97B17F9186
25,669,139 UART: Caliptra RT
25,669,850 UART: [state] CFI Enabled
25,803,331 UART: [rt] RT listening for mailbox commands...
25,834,741 UART: [rt]cmd =0x4453424c, len=4
28,265,885 >>> mbox cmd response data (8 bytes)
30,327,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,549,969 >>> mbox cmd response: success
37,550,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
37,586,956 UART:
37,587,284 UART: Running Caliptra FMC ...
37,588,413 UART:
37,588,579 UART: [state] CFI Enabled
37,632,463 UART: [art] Extend RT PCRs Done
37,633,618 UART: [art] Lock RT PCRs Done
37,635,345 UART: [art] Populate DV Done
37,640,872 UART: [fht] FMC Alias Private Key: 7
37,642,576 UART: [art] Derive CDI
37,643,316 UART: [art] Store in slot 0x4
37,685,541 UART: [art] Derive Key Pair
37,686,581 UART: [art] Store priv key in slot 0x5
40,113,279 UART: [art] Derive Key Pair - Done
40,126,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,832,193 UART: [art] Erasing AUTHORITY.KEYID = 7
41,833,681 UART: [art] PUB.X = 569F189977F07075E543F56216508FBFCD85F9BEFE09B7124D5CB26964BF25B5A34E9CB162E2FDE10C5902821A6C09A8
41,840,930 UART: [art] PUB.Y = 68749E025C2F1473825F5609CB823B2870C0E05291340E0838568EABBD2D974EF957698F33DF454A53C01283525ABF5C
41,848,168 UART: [art] SIG.R = 70ECE9FBB0E84773CD47BD4EAF647312506EDCD3C1DBC3EC33ED595E64250D568A649B4199958E044C485DE649063E80
41,855,564 UART: [art] SIG.S = CC19CB17E6F0C75EA79474A02F9DC86A6BBFDBCE993B16ACC669957390FEDA0D38832B28ADFF13BA8917D4D666692E35
42,834,262 UART: Caliptra RT
42,834,998 UART: [state] CFI Enabled
45,631,712 UART: [rt] RT listening for mailbox commands...
45,662,714 UART: [rt]cmd =0x494e464f, len=4
45,667,195 >>> mbox cmd response data (312 bytes)
45,669,049 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
45,698,803 UART: [rt]cmd =0x43455252, len=4
45,710,209 >>> mbox cmd response data (783 bytes)
45,751,290 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
45,782,134 UART: [rt]cmd =0x44504543, len=92
50,068,670 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,094 UART:
192,469 UART: Running Caliptra ROM ...
193,653 UART:
193,804 UART: [state] CFI Enabled
262,417 UART: [state] LifecycleState = Unprovisioned
264,813 UART: [state] DebugLocked = No
266,060 UART: [state] WD Timer not started. Device not locked for debugging
271,308 UART: [kat] SHA2-256
461,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,957 UART: [kat] ++
472,401 UART: [kat] sha1
484,265 UART: [kat] SHA2-256
487,268 UART: [kat] SHA2-384
492,846 UART: [kat] SHA2-512-ACC
495,425 UART: [kat] ECC-384
2,946,523 UART: [kat] HMAC-384Kdf
2,968,497 UART: [kat] LMS
3,500,243 UART: [kat] --
3,504,546 UART: [cold-reset] ++
3,506,480 UART: [fht] FHT @ 0x50003400
3,517,596 UART: [idev] ++
3,518,301 UART: [idev] CDI.KEYID = 6
3,519,331 UART: [idev] SUBJECT.KEYID = 7
3,520,426 UART: [idev] UDS.KEYID = 0
3,521,350 ready_for_fw is high
3,521,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,591 UART: [idev] Erasing UDS.KEYID = 0
6,026,145 UART: [idev] Sha1 KeyId Algorithm
6,048,700 UART: [idev] --
6,054,284 UART: [ldev] ++
6,054,964 UART: [ldev] CDI.KEYID = 6
6,055,850 UART: [ldev] SUBJECT.KEYID = 5
6,057,013 UART: [ldev] AUTHORITY.KEYID = 7
6,058,246 UART: [ldev] FE.KEYID = 1
6,096,642 UART: [ldev] Erasing FE.KEYID = 1
8,602,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,131 UART: [ldev] --
10,410,391 UART: [fwproc] Wait for Commands...
10,412,314 UART: [fwproc] Recv command 0x46574c44
10,414,618 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,324 >>> mbox cmd response: success
14,673,408 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,676,524 UART: [afmc] ++
14,677,283 UART: [afmc] CDI.KEYID = 6
14,678,385 UART: [afmc] SUBJECT.KEYID = 7
14,679,914 UART: [afmc] AUTHORITY.KEYID = 5
17,210,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,374 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,275 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,665 UART: [afmc] --
19,010,849 UART: [cold-reset] --
19,016,074 UART: [state] Locking Datavault
19,021,011 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,186 UART: [state] Locking ICCM
19,025,908 UART: [exit] Launching FMC @ 0x40000130
19,034,575 UART:
19,034,807 UART: Running Caliptra FMC ...
19,035,905 UART:
19,036,064 UART: [state] CFI Enabled
19,091,581 UART: [fht] FMC Alias Private Key: 7
20,878,511 UART: [art] Extend RT PCRs Done
20,879,736 UART: [art] Lock RT PCRs Done
20,881,333 UART: [art] Populate DV Done
20,886,687 UART: [fht] FMC Alias Private Key: 7
20,888,328 UART: [art] Derive CDI
20,889,057 UART: [art] Store in slot 0x4
20,944,993 UART: [art] Derive Key Pair
20,946,048 UART: [art] Store priv key in slot 0x5
23,408,901 UART: [art] Derive Key Pair - Done
23,422,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,538 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,053 UART: [art] PUB.X = 5FE38202EA94A227A00D52E155D9FB7FAF87731E082FD4C990B46B52638BD434B3358CD18C83BFA653A841DDE869757B
25,144,342 UART: [art] PUB.Y = 682C8D2D14336279D1224427797E3D2A56FBA2D2F5214DF07B86C4A38BBBFF3DF04F299188F007F658E32671B35244CB
25,151,533 UART: [art] SIG.R = 6DF603AD52DE13BB8EC3911BF16317FD31FCEA874B8B99430C35FF74E7DD2F9AF090C5DCFD6E1DB5808EF941A7E217EF
25,158,980 UART: [art] SIG.S = 05CAA7E5FCCD2C18D2F435081E5C8A14532521ADD63E485D75EFB92664DCF088C45DFF76A8337218E308AA1766E1958E
26,138,371 UART: Caliptra RT
26,139,081 UART: [state] CFI Enabled
26,319,679 UART: [rt] RT listening for mailbox commands...
26,351,253 UART: [rt]cmd =0x4453424c, len=4
28,828,762 >>> mbox cmd response data (8 bytes)
30,892,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,043,050 UART:
31,043,421 UART: Running Caliptra ROM ...
31,044,560 UART:
31,044,731 UART: [state] CFI Enabled
31,106,648 UART: [state] LifecycleState = Unprovisioned
31,108,738 UART: [state] DebugLocked = No
31,110,552 UART: [state] WD Timer not started. Device not locked for debugging
31,114,778 UART: [kat] SHA2-256
31,304,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,315,426 UART: [kat] ++
31,315,878 UART: [kat] sha1
31,326,874 UART: [kat] SHA2-256
31,329,894 UART: [kat] SHA2-384
31,337,518 UART: [kat] SHA2-512-ACC
31,340,085 UART: [kat] ECC-384
33,790,894 UART: [kat] HMAC-384Kdf
33,814,840 UART: [kat] LMS
34,346,444 UART: [kat] --
34,350,487 UART: [update-reset] ++
37,851,707 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,855,295 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,485,053 >>> mbox cmd response: success
38,485,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,487,004 UART: [update-reset] Copying MAN_2 To MAN_1
38,524,612 UART: [update-reset Success] --
38,528,995 UART: [state] Locking Datavault
38,532,781 UART: [state] Locking PCR0, PCR1 and PCR31
38,534,964 UART: [state] Locking ICCM
38,536,244 UART: [exit] Launching FMC @ 0x40000130
38,544,916 UART:
38,545,226 UART: Running Caliptra FMC ...
38,546,348 UART:
38,546,509 UART: [state] CFI Enabled
38,647,611 UART: [art] Extend RT PCRs Done
38,648,793 UART: [art] Lock RT PCRs Done
38,650,300 UART: [art] Populate DV Done
38,655,972 UART: [fht] FMC Alias Private Key: 7
38,657,504 UART: [art] Derive CDI
38,658,316 UART: [art] Store in slot 0x4
38,716,817 UART: [art] Derive Key Pair
38,717,844 UART: [art] Store priv key in slot 0x5
41,180,555 UART: [art] Derive Key Pair - Done
41,193,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,905,971 UART: [art] Erasing AUTHORITY.KEYID = 7
42,907,473 UART: [art] PUB.X = 485FA9D171BBC2D89E70007437A7C03F9793A80086702619B6E881E67587CC9E890BDE92583E9F0E145C54319A3775AF
42,914,694 UART: [art] PUB.Y = 96069A9785447CE8BE17BE01CD8830DA1F47AE7EE20AF32038D7CC359EDD11B3F261E952A2BFFD87C73852D062657B72
42,921,976 UART: [art] SIG.R = A125F1928147DE885D07C0A0B79108B595DF99C16455221C49C793DC2B1B34FB6F84BEDD5279B45C32F0EAF966FC81DD
42,929,371 UART: [art] SIG.S = 923E374CD5CE2C4DC5A868D8FCE0EADA7F8F4A2BB3BAAE5E19060CABC42A33805FB6E84B5FD4E028FB025F90099EAC52
43,908,292 UART: Caliptra RT
43,909,007 UART: [state] CFI Enabled
46,801,009 UART: [rt] RT listening for mailbox commands...
46,832,055 UART: [rt]cmd =0x494e464f, len=4
46,836,509 >>> mbox cmd response data (312 bytes)
46,838,363 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,868,101 UART: [rt]cmd =0x43455252, len=4
46,879,565 >>> mbox cmd response data (784 bytes)
46,920,237 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,950,742 UART: [rt]cmd =0x44504543, len=92
51,306,526 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,438,593 ready_for_fw is high
3,438,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,565 >>> mbox cmd response: success
14,825,897 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,112,102 UART:
19,112,480 UART: Running Caliptra FMC ...
19,113,627 UART:
19,113,786 UART: [state] CFI Enabled
19,178,528 UART: [fht] FMC Alias Private Key: 7
20,945,205 UART: [art] Extend RT PCRs Done
20,946,412 UART: [art] Lock RT PCRs Done
20,947,875 UART: [art] Populate DV Done
20,953,236 UART: [fht] FMC Alias Private Key: 7
20,954,737 UART: [art] Derive CDI
20,955,501 UART: [art] Store in slot 0x4
21,011,408 UART: [art] Derive Key Pair
21,012,471 UART: [art] Store priv key in slot 0x5
23,475,438 UART: [art] Derive Key Pair - Done
23,488,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,109 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,613 UART: [art] PUB.X = 0563357A607707438C893929DBA8CBA7D7B4E519BA4EBF9DFBB78A41DDEDE2F58355E9724CAE0D7236A22F8E2A4A86F7
25,209,856 UART: [art] PUB.Y = DE0F74F83191019D319025A7F76875CD4913184F686D67070C8417994D6688A504D08A3A1C56880EE30C3FFA6ABC7A18
25,217,076 UART: [art] SIG.R = 92D302055E4C2C376D1D4A5C7FB9B7F92F493B477AAAFA17FFB3E7D633BD7B35CFB2BBBBAFE1C0F2A2E7B61113BA2F6E
25,224,477 UART: [art] SIG.S = EBCE8C882993B6599253914F8422F7D4497F04651F40D95AD16AEF39628362F67BD991627CED0918C2A2F773ABEF9441
26,203,626 UART: Caliptra RT
26,204,318 UART: [state] CFI Enabled
26,385,281 UART: [rt] RT listening for mailbox commands...
26,416,791 UART: [rt]cmd =0x4453424c, len=4
28,893,465 >>> mbox cmd response data (8 bytes)
30,954,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,874,866 >>> mbox cmd response: success
38,875,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,908,390 UART:
38,908,711 UART: Running Caliptra FMC ...
38,909,838 UART:
38,910,022 UART: [state] CFI Enabled
39,008,711 UART: [art] Extend RT PCRs Done
39,009,893 UART: [art] Lock RT PCRs Done
39,011,401 UART: [art] Populate DV Done
39,017,197 UART: [fht] FMC Alias Private Key: 7
39,018,788 UART: [art] Derive CDI
39,019,602 UART: [art] Store in slot 0x4
39,077,788 UART: [art] Derive Key Pair
39,078,822 UART: [art] Store priv key in slot 0x5
41,541,934 UART: [art] Derive Key Pair - Done
41,554,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,267,522 UART: [art] Erasing AUTHORITY.KEYID = 7
43,269,035 UART: [art] PUB.X = 002247C886103D708698D807014F547310299A508E013845BAB8DAFBAEAF9DA6E64302EA7BEA871CEB7F830709BCE496
43,276,280 UART: [art] PUB.Y = A8CCF6F288F9EB6A9E1D2EE7387C43678E041274DC2E110233AE46BB3DACC4EE878E76F326D71B716FDBEBB8E0A24FED
43,283,560 UART: [art] SIG.R = F8D76740779D5CF7CB98AF9B675481F0F811BA60C98FE75175C3D76ADA8FA01CE2FAB3EC11A1A073A3CA92A302BBC9E9
43,291,092 UART: [art] SIG.S = FEEE6DEA44D06BD06000DED992C0F10BC288EE028E53C2BAD747E45B4C0011AFCAA80E68BE7A9A8EB51074895A3ABCFE
44,270,228 UART: Caliptra RT
44,270,932 UART: [state] CFI Enabled
47,166,433 UART: [rt] RT listening for mailbox commands...
47,197,452 UART: [rt]cmd =0x494e464f, len=4
47,201,797 >>> mbox cmd response data (312 bytes)
47,203,647 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
47,233,724 UART: [rt]cmd =0x43455252, len=4
47,245,058 >>> mbox cmd response data (784 bytes)
47,285,776 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
47,316,406 UART: [rt]cmd =0x44504543, len=92
51,666,854 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,439 UART:
192,792 UART: Running Caliptra ROM ...
193,924 UART:
603,695 UART: [state] CFI Enabled
617,435 UART: [state] LifecycleState = Unprovisioned
619,819 UART: [state] DebugLocked = No
622,493 UART: [state] WD Timer not started. Device not locked for debugging
627,185 UART: [kat] SHA2-256
817,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,852 UART: [kat] ++
828,464 UART: [kat] sha1
840,488 UART: [kat] SHA2-256
843,489 UART: [kat] SHA2-384
849,767 UART: [kat] SHA2-512-ACC
852,364 UART: [kat] ECC-384
3,295,049 UART: [kat] HMAC-384Kdf
3,307,598 UART: [kat] LMS
3,839,422 UART: [kat] --
3,843,586 UART: [cold-reset] ++
3,845,047 UART: [fht] FHT @ 0x50003400
3,854,908 UART: [idev] ++
3,855,619 UART: [idev] CDI.KEYID = 6
3,856,650 UART: [idev] SUBJECT.KEYID = 7
3,857,753 UART: [idev] UDS.KEYID = 0
3,858,683 ready_for_fw is high
3,858,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,822 UART: [idev] Erasing UDS.KEYID = 0
6,338,719 UART: [idev] Sha1 KeyId Algorithm
6,362,031 UART: [idev] --
6,366,090 UART: [ldev] ++
6,366,778 UART: [ldev] CDI.KEYID = 6
6,367,688 UART: [ldev] SUBJECT.KEYID = 5
6,368,849 UART: [ldev] AUTHORITY.KEYID = 7
6,370,080 UART: [ldev] FE.KEYID = 1
6,379,004 UART: [ldev] Erasing FE.KEYID = 1
8,856,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,597 UART: [ldev] --
10,649,570 UART: [fwproc] Wait for Commands...
10,652,794 UART: [fwproc] Recv command 0x46574c44
10,655,103 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,068 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,926,023 >>> mbox cmd response: success
14,927,077 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
14,930,894 UART: [afmc] ++
14,931,587 UART: [afmc] CDI.KEYID = 6
14,932,770 UART: [afmc] SUBJECT.KEYID = 7
14,934,260 UART: [afmc] AUTHORITY.KEYID = 5
17,439,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,159,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,161,308 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,176,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,191,545 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,206,461 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,581 UART: [afmc] --
19,234,130 UART: [cold-reset] --
19,239,083 UART: [state] Locking Datavault
19,243,218 UART: [state] Locking PCR0, PCR1 and PCR31
19,245,366 UART: [state] Locking ICCM
19,248,094 UART: [exit] Launching FMC @ 0x40000130
19,256,775 UART:
19,257,010 UART: Running Caliptra FMC ...
19,258,063 UART:
19,258,221 UART: [state] CFI Enabled
19,266,492 UART: [fht] FMC Alias Private Key: 7
21,032,969 UART: [art] Extend RT PCRs Done
21,034,190 UART: [art] Lock RT PCRs Done
21,035,966 UART: [art] Populate DV Done
21,041,278 UART: [fht] FMC Alias Private Key: 7
21,042,819 UART: [art] Derive CDI
21,043,561 UART: [art] Store in slot 0x4
21,086,579 UART: [art] Derive Key Pair
21,087,623 UART: [art] Store priv key in slot 0x5
23,514,547 UART: [art] Derive Key Pair - Done
23,527,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,235,479 UART: [art] PUB.X = 56F7CCA241751CF4DC1963D7BB2F9D465714F66A4686A9C16CF547082FC7B12EBBDD85D8DC25C3D7D0A48AA522085F54
25,242,752 UART: [art] PUB.Y = 525B871AE26F0C65F439EC7054BBD3BD6BB58AA894DC463FEEEE51EB6CB9AA48957F5E5C415975865ED644F2658B29CB
25,250,069 UART: [art] SIG.R = 946E4D3804E9967541CAE2623CCC198F55A350575ADBA9490FB44A324E4BA29D8C3B6904043910C41E30C61C4016EA4F
25,257,492 UART: [art] SIG.S = 37AA4A9E284A1321B4DB43B4F897BD499FCE1A42368AC6F1AB47ACED56278A947254639936790DE5A5C0E8DDF6867B40
26,236,075 UART: Caliptra RT
26,236,772 UART: [state] CFI Enabled
26,369,298 UART: [rt] RT listening for mailbox commands...
26,400,818 UART: [rt]cmd =0x4453424c, len=4
28,831,875 >>> mbox cmd response data (8 bytes)
30,897,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,048,194 UART:
31,048,567 UART: Running Caliptra ROM ...
31,049,656 UART:
31,049,845 UART: [state] CFI Enabled
31,063,435 UART: [state] LifecycleState = Unprovisioned
31,065,314 UART: [state] DebugLocked = No
31,067,947 UART: [state] WD Timer not started. Device not locked for debugging
31,072,433 UART: [kat] SHA2-256
31,262,321 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,273,067 UART: [kat] ++
31,273,668 UART: [kat] sha1
31,284,511 UART: [kat] SHA2-256
31,287,542 UART: [kat] SHA2-384
31,293,479 UART: [kat] SHA2-512-ACC
31,296,104 UART: [kat] ECC-384
33,736,290 UART: [kat] HMAC-384Kdf
33,748,467 UART: [kat] LMS
34,280,075 UART: [kat] --
34,283,099 UART: [update-reset] ++
37,790,757 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
37,793,816 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
38,423,548 >>> mbox cmd response: success
38,423,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,425,219 UART: [update-reset] Copying MAN_2 To MAN_1
38,462,785 UART: [update-reset Success] --
38,468,483 UART: [state] Locking Datavault
38,472,498 UART: [state] Locking PCR0, PCR1 and PCR31
38,474,707 UART: [state] Locking ICCM
38,477,219 UART: [exit] Launching FMC @ 0x40000130
38,485,896 UART:
38,486,129 UART: Running Caliptra FMC ...
38,487,160 UART:
38,487,312 UART: [state] CFI Enabled
38,531,764 UART: [art] Extend RT PCRs Done
38,532,948 UART: [art] Lock RT PCRs Done
38,534,456 UART: [art] Populate DV Done
38,539,972 UART: [fht] FMC Alias Private Key: 7
38,541,509 UART: [art] Derive CDI
38,542,275 UART: [art] Store in slot 0x4
38,584,872 UART: [art] Derive Key Pair
38,585,902 UART: [art] Store priv key in slot 0x5
41,012,074 UART: [art] Derive Key Pair - Done
41,025,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,731,853 UART: [art] Erasing AUTHORITY.KEYID = 7
42,733,362 UART: [art] PUB.X = 2A1FD70E6CA75D3DC816BDE0F7E2FF7D618362A9B7176F0BB44A2AFF93A69A983A0B82BDAE5BE36266E1ED6E169A2976
42,740,812 UART: [art] PUB.Y = 8A09624536295F495BDBF8AE000021D1ACD90B607F563CD6D79A1BA72EE5319DF3C5019175919CE829EAB483DB3F87C6
42,747,901 UART: [art] SIG.R = 0AD81D14E4F680FFF0BCC52EDFBA75B8BB703C913621B10C239A961117A6664C3EB33FB9801D5D2ACACD9E043CF2B27A
42,755,327 UART: [art] SIG.S = 55EBDEB0FE84BBA61D8B898B7278E28D7F664E80807390733E96AF02DA5B2174447177A26556B22CEB7718FF644D990A
43,734,447 UART: Caliptra RT
43,735,161 UART: [state] CFI Enabled
46,535,905 UART: [rt] RT listening for mailbox commands...
46,567,155 UART: [rt]cmd =0x494e464f, len=4
46,571,390 >>> mbox cmd response data (312 bytes)
46,573,247 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,602,859 UART: [rt]cmd =0x43455252, len=4
46,614,138 >>> mbox cmd response data (782 bytes)
46,655,953 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,686,982 UART: [rt]cmd =0x44504543, len=92
50,973,831 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,754,831 ready_for_fw is high
3,755,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,774 >>> mbox cmd response: success
15,039,082 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
19,292,038 UART:
19,292,426 UART: Running Caliptra FMC ...
19,293,631 UART:
19,293,800 UART: [state] CFI Enabled
19,301,482 UART: [fht] FMC Alias Private Key: 7
21,067,886 UART: [art] Extend RT PCRs Done
21,069,120 UART: [art] Lock RT PCRs Done
21,071,185 UART: [art] Populate DV Done
21,076,454 UART: [fht] FMC Alias Private Key: 7
21,078,056 UART: [art] Derive CDI
21,078,882 UART: [art] Store in slot 0x4
21,121,107 UART: [art] Derive Key Pair
21,122,133 UART: [art] Store priv key in slot 0x5
23,548,542 UART: [art] Derive Key Pair - Done
23,561,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,557 UART: [art] PUB.X = F0EB702B3F69FFCADAC46D15D3340A7046BB45B5B84FB3F584D25F7EE5C547EDB2BA95E3713C69DFEEEFAE5DF4443B93
25,276,876 UART: [art] PUB.Y = ED464604D763B71EAB2E754EFBE5D26A3648350C5923A2AAD5EB685B2E34BDB5C7BA80A3BFDF13E079F3700E190C7835
25,284,138 UART: [art] SIG.R = 74FE82BB0B21AF11B106BF1B66FB9D3E23E7A5C80984C0451B1EF1DE6952E51C870F8F0C2223EF86775CC840D319AEFB
25,291,555 UART: [art] SIG.S = CAD192C5B252F65CE311B33520CC16C6A0A483D67FD54DDA8670242C920604DAF721619D46BD9B63605CD3CBBD9C029F
26,270,380 UART: Caliptra RT
26,271,103 UART: [state] CFI Enabled
26,403,995 UART: [rt] RT listening for mailbox commands...
26,435,352 UART: [rt]cmd =0x4453424c, len=4
28,865,858 >>> mbox cmd response data (8 bytes)
30,932,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
38,754,758 >>> mbox cmd response: success
38,755,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
38,789,581 UART:
38,789,876 UART: Running Caliptra FMC ...
38,790,997 UART:
38,791,162 UART: [state] CFI Enabled
38,835,013 UART: [art] Extend RT PCRs Done
38,836,211 UART: [art] Lock RT PCRs Done
38,837,486 UART: [art] Populate DV Done
38,842,958 UART: [fht] FMC Alias Private Key: 7
38,844,659 UART: [art] Derive CDI
38,845,474 UART: [art] Store in slot 0x4
38,888,446 UART: [art] Derive Key Pair
38,889,471 UART: [art] Store priv key in slot 0x5
41,316,513 UART: [art] Derive Key Pair - Done
41,329,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,036,040 UART: [art] Erasing AUTHORITY.KEYID = 7
43,037,554 UART: [art] PUB.X = 1561A9D108C529CF36964D0B1A97F17A5234A5453613068DFD1CEFB548F0AD4B822CF91AFE0E628914435E6F56A113E7
43,044,838 UART: [art] PUB.Y = 1B5969CDE149516E9B196173B9288B0DC1F1510B422ACF8A0F1E0981A3058F9E3E03FAA335D108E6BA5D1B1BBF8DC1ED
43,052,039 UART: [art] SIG.R = 7B75B479D906FD505DEE79454FF94E330ED0F72E8B506201E78FAAA874F8E6395A8067E4FFF039BFDDA6A07CED878B3A
43,059,500 UART: [art] SIG.S = E8665240D64AC35EEA4F51EED247DEB3792D6477D5F43AAB902543FD322E49E9E8E2DFD9F8BA893334871541EF17D074
44,038,117 UART: Caliptra RT
44,038,806 UART: [state] CFI Enabled
46,837,838 UART: [rt] RT listening for mailbox commands...
46,869,062 UART: [rt]cmd =0x494e464f, len=4
46,873,255 >>> mbox cmd response data (312 bytes)
46,875,161 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
46,904,889 UART: [rt]cmd =0x43455252, len=4
46,916,342 >>> mbox cmd response data (783 bytes)
46,959,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
46,990,080 UART: [rt]cmd =0x44504543, len=92
51,277,735 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Unprovisioned
85,507 UART: [state] DebugLocked = No
85,999 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,535 UART: [kat] SHA2-256
881,466 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,581 UART: [kat] ++
885,733 UART: [kat] sha1
889,905 UART: [kat] SHA2-256
891,843 UART: [kat] SHA2-384
894,698 UART: [kat] SHA2-512-ACC
896,599 UART: [kat] ECC-384
902,326 UART: [kat] HMAC-384Kdf
906,948 UART: [kat] LMS
1,475,144 UART: [kat] --
1,476,097 UART: [cold-reset] ++
1,476,473 UART: [fht] Storing FHT @ 0x50003400
1,479,210 UART: [idev] ++
1,479,378 UART: [idev] CDI.KEYID = 6
1,479,738 UART: [idev] SUBJECT.KEYID = 7
1,480,162 UART: [idev] UDS.KEYID = 0
1,480,507 ready_for_fw is high
1,480,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,980 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,376 UART: [idev] --
1,514,411 UART: [ldev] ++
1,514,579 UART: [ldev] CDI.KEYID = 6
1,514,942 UART: [ldev] SUBJECT.KEYID = 5
1,515,368 UART: [ldev] AUTHORITY.KEYID = 7
1,515,831 UART: [ldev] FE.KEYID = 1
1,521,075 UART: [ldev] Erasing FE.KEYID = 1
1,546,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,256 UART: [ldev] --
1,585,749 UART: [fwproc] Waiting for Commands...
1,586,574 UART: [fwproc] Received command 0x46574c44
1,587,365 UART: [fwproc] Received Image of size 118548 bytes
2,932,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,911 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,129 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,526 >>> mbox cmd response: success
3,131,526 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,132,632 UART: [afmc] ++
3,132,800 UART: [afmc] CDI.KEYID = 6
3,133,162 UART: [afmc] SUBJECT.KEYID = 7
3,133,587 UART: [afmc] AUTHORITY.KEYID = 5
3,168,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,448 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,228 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,937 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,820 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,503 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,273 UART: [afmc] --
3,211,331 UART: [cold-reset] --
3,212,157 UART: [state] Locking Datavault
3,213,282 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,886 UART: [state] Locking ICCM
3,214,428 UART: [exit] Launching FMC @ 0x40000130
3,219,758 UART:
3,219,774 UART: Running Caliptra FMC ...
3,220,182 UART:
3,220,236 UART: [state] CFI Enabled
3,230,540 UART: [fht] FMC Alias Private Key: 7
3,350,408 UART: [art] Extend RT PCRs Done
3,350,836 UART: [art] Lock RT PCRs Done
3,352,268 UART: [art] Populate DV Done
3,360,681 UART: [fht] FMC Alias Private Key: 7
3,361,657 UART: [art] Derive CDI
3,361,937 UART: [art] Store in slot 0x4
3,447,665 UART: [art] Derive Key Pair
3,448,025 UART: [art] Store priv key in slot 0x5
3,460,870 UART: [art] Derive Key Pair - Done
3,475,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,591 UART: [art] PUB.X = 43783E8C188CD1D3D4C95EB2FFCD455E033F6D8AAF3224E93EA31CFAE88B24AD0CE18260935B6D750745D2EDC0DE6C4C
3,499,372 UART: [art] PUB.Y = 07FC8B8A96C5F473C97EF0A97C4300B454D473925F872DBF74F75337F15959DF3CB59128DA9988BFDA5B16DD82611E84
3,506,301 UART: [art] SIG.R = CC2C471B8F2068F5365E1BEFE4AB4E0EF56BA7C44B589E3E0E13C049DDFAEA1E79AE6B922443DE790CC104978B962015
3,513,075 UART: [art] SIG.S = 249CC0FA1D03FCCF2D427004280E43358A16F9CB78DA4BA178F18BBD0BA0648BB4EFE29E04BB4C81AB30BFE6D8B8B425
3,536,542 UART: Caliptra RT
3,536,793 UART: [state] CFI Enabled
3,657,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,817 UART: [rt]cmd =0x4453424c, len=4
3,705,497 >>> mbox cmd response data (8 bytes)
3,705,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,242 UART:
3,706,258 UART: Running Caliptra ROM ...
3,706,666 UART:
3,706,720 UART: [state] CFI Enabled
3,709,304 UART: [state] LifecycleState = Unprovisioned
3,709,959 UART: [state] DebugLocked = No
3,710,589 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,712,158 UART: [kat] SHA2-256
4,506,089 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,510,204 UART: [kat] ++
4,510,356 UART: [kat] sha1
4,514,810 UART: [kat] SHA2-256
4,516,748 UART: [kat] SHA2-384
4,519,527 UART: [kat] SHA2-512-ACC
4,521,427 UART: [kat] ECC-384
4,527,128 UART: [kat] HMAC-384Kdf
4,531,842 UART: [kat] LMS
5,100,038 UART: [kat] --
5,101,041 UART: [update-reset] ++
6,482,369 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,483,531 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,638,798 >>> mbox cmd response: success
6,638,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,638,975 UART: [update-reset] Copying MAN_2 To MAN_1
6,646,989 UART: [update-reset Success] --
6,647,946 UART: [state] Locking Datavault
6,648,844 UART: [state] Locking PCR0, PCR1 and PCR31
6,649,448 UART: [state] Locking ICCM
6,649,900 UART: [exit] Launching FMC @ 0x40000130
6,655,230 UART:
6,655,246 UART: Running Caliptra FMC ...
6,655,654 UART:
6,655,708 UART: [state] CFI Enabled
6,744,291 UART: [art] Extend RT PCRs Done
6,744,719 UART: [art] Lock RT PCRs Done
6,745,850 UART: [art] Populate DV Done
6,754,227 UART: [fht] FMC Alias Private Key: 7
6,755,385 UART: [art] Derive CDI
6,755,665 UART: [art] Store in slot 0x4
6,841,715 UART: [art] Derive Key Pair
6,842,075 UART: [art] Store priv key in slot 0x5
6,855,078 UART: [art] Derive Key Pair - Done
6,870,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,885,635 UART: [art] Erasing AUTHORITY.KEYID = 7
6,886,400 UART: [art] PUB.X = FF9C4A9427C15A1F43FA37EF24BB26B4BC102FBFF02609947C8880E2CA12628D021532DC46BDCCD677E55EC5E9FB83C3
6,893,180 UART: [art] PUB.Y = 7DB6784E40C066B814D3F05B5B3F52003B4BAAABD352389167E43AFD9D95E4D4F231D81637401B9C3957090C92798E23
6,900,100 UART: [art] SIG.R = 2DEDCC448CACBF65290CAE42E30D166A43D2602099EAADA9518179F1824C6A57FA3FACE8982D0AD47C8B22AB73D78C17
6,906,879 UART: [art] SIG.S = 449564A46E5C20A73DB2DB968EB8C034F3528FF930E3FE30B626C77799A66A23BDCFEC4606EA9AFF753107AB9D3361E7
6,930,403 UART: Caliptra RT
6,930,654 UART: [state] CFI Enabled
7,312,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,343,138 UART: [rt]cmd =0x494e464f, len=4
7,346,868 >>> mbox cmd response data (312 bytes)
7,346,869 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,376,244 UART: [rt]cmd =0x43455252, len=4
7,387,147 >>> mbox cmd response data (782 bytes)
7,387,148 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,417,161 UART: [rt]cmd =0x44504543, len=92
7,601,939 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,707 ready_for_fw is high
1,362,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,584 >>> mbox cmd response: success
2,980,584 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,041,617 UART:
3,041,633 UART: Running Caliptra FMC ...
3,042,041 UART:
3,042,095 UART: [state] CFI Enabled
3,052,385 UART: [fht] FMC Alias Private Key: 7
3,170,957 UART: [art] Extend RT PCRs Done
3,171,385 UART: [art] Lock RT PCRs Done
3,172,939 UART: [art] Populate DV Done
3,180,982 UART: [fht] FMC Alias Private Key: 7
3,182,084 UART: [art] Derive CDI
3,182,364 UART: [art] Store in slot 0x4
3,267,842 UART: [art] Derive Key Pair
3,268,202 UART: [art] Store priv key in slot 0x5
3,280,921 UART: [art] Derive Key Pair - Done
3,295,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,307 UART: [art] PUB.X = 9F18AF068C21E9203DB54DA0E5BEB04B8929E1329EE7B1E55D1E82D88F82FDED12F6251412AFAEB54ACE0A1B19079CE8
3,318,086 UART: [art] PUB.Y = EC06F302961BD27601BDD652A2647A9A96795186A3AFF7CB4A931F6908108FF66FC57C2434E8581C432C6CFA22F38C15
3,325,026 UART: [art] SIG.R = 0C9EB85B7382C5D433EB002231649D5832F922250B066780F8CEDCB93D6025E921B76F9C07CCCA7E81BBB790013280A1
3,331,759 UART: [art] SIG.S = 4D02DEE2B13E6DB9D767161BF15469BC094A7253D4148789B84484C70F99EDD4A652C60B4D311241146514A75E544357
3,355,965 UART: Caliptra RT
3,356,216 UART: [state] CFI Enabled
3,476,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,265 UART: [rt]cmd =0x4453424c, len=4
3,524,483 >>> mbox cmd response data (8 bytes)
3,524,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,339,420 >>> mbox cmd response: success
6,339,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,352,874 UART:
6,352,890 UART: Running Caliptra FMC ...
6,353,298 UART:
6,353,352 UART: [state] CFI Enabled
6,442,337 UART: [art] Extend RT PCRs Done
6,442,765 UART: [art] Lock RT PCRs Done
6,444,118 UART: [art] Populate DV Done
6,452,453 UART: [fht] FMC Alias Private Key: 7
6,453,425 UART: [art] Derive CDI
6,453,705 UART: [art] Store in slot 0x4
6,539,491 UART: [art] Derive Key Pair
6,539,851 UART: [art] Store priv key in slot 0x5
6,553,052 UART: [art] Derive Key Pair - Done
6,568,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,583,998 UART: [art] Erasing AUTHORITY.KEYID = 7
6,584,763 UART: [art] PUB.X = 1E17FF3A5B866163595D2BFAF6BC037D2CBF48B61C1AACE46B2612A4CA39518A70046E960B45062B2DB44CD2C6635139
6,591,529 UART: [art] PUB.Y = 21F46DA76A8972DEB4E97645E261BDAF5885F26BAA8788344926ABB3C03B0495F0180A92EAF8E0B353B25172C7A77289
6,598,475 UART: [art] SIG.R = 04D2FDF5432641F2D6A08C526915B6D1CA9CBB47DEDB46450552D6DFC86D5702A9C1547B28259271160FFC64D914E261
6,605,235 UART: [art] SIG.S = AFCBC97694E5A9C34B661FEF55313054E44DE51498DB5639ED529AC1FD8FCE265E856CD8A18362E5512557BA90F0A2DB
6,628,885 UART: Caliptra RT
6,629,136 UART: [state] CFI Enabled
7,012,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,781 UART: [rt]cmd =0x494e464f, len=4
7,046,291 >>> mbox cmd response data (312 bytes)
7,046,292 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,075,679 UART: [rt]cmd =0x43455252, len=4
7,086,744 >>> mbox cmd response data (783 bytes)
7,086,745 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,116,826 UART: [rt]cmd =0x44504543, len=92
7,301,070 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,731 UART: [state] LifecycleState = Unprovisioned
86,386 UART: [state] DebugLocked = No
87,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,796 UART: [kat] SHA2-256
882,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,842 UART: [kat] ++
886,994 UART: [kat] sha1
891,354 UART: [kat] SHA2-256
893,292 UART: [kat] SHA2-384
895,955 UART: [kat] SHA2-512-ACC
897,856 UART: [kat] ECC-384
903,797 UART: [kat] HMAC-384Kdf
908,523 UART: [kat] LMS
1,476,719 UART: [kat] --
1,477,562 UART: [cold-reset] ++
1,477,890 UART: [fht] Storing FHT @ 0x50003400
1,480,899 UART: [idev] ++
1,481,067 UART: [idev] CDI.KEYID = 6
1,481,427 UART: [idev] SUBJECT.KEYID = 7
1,481,851 UART: [idev] UDS.KEYID = 0
1,482,196 ready_for_fw is high
1,482,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,955 UART: [idev] Erasing UDS.KEYID = 0
1,506,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,299 UART: [idev] --
1,516,394 UART: [ldev] ++
1,516,562 UART: [ldev] CDI.KEYID = 6
1,516,925 UART: [ldev] SUBJECT.KEYID = 5
1,517,351 UART: [ldev] AUTHORITY.KEYID = 7
1,517,814 UART: [ldev] FE.KEYID = 1
1,523,134 UART: [ldev] Erasing FE.KEYID = 1
1,548,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,785 UART: [ldev] --
1,588,194 UART: [fwproc] Waiting for Commands...
1,589,025 UART: [fwproc] Received command 0x46574c44
1,589,816 UART: [fwproc] Received Image of size 118548 bytes
2,933,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,105 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,323 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,704 >>> mbox cmd response: success
3,132,704 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,133,926 UART: [afmc] ++
3,134,094 UART: [afmc] CDI.KEYID = 6
3,134,456 UART: [afmc] SUBJECT.KEYID = 7
3,134,881 UART: [afmc] AUTHORITY.KEYID = 5
3,170,356 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,246 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,929 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,783 UART: [afmc] --
3,213,879 UART: [cold-reset] --
3,214,889 UART: [state] Locking Datavault
3,215,952 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,556 UART: [state] Locking ICCM
3,216,986 UART: [exit] Launching FMC @ 0x40000130
3,222,316 UART:
3,222,332 UART: Running Caliptra FMC ...
3,222,740 UART:
3,222,883 UART: [state] CFI Enabled
3,233,545 UART: [fht] FMC Alias Private Key: 7
3,351,719 UART: [art] Extend RT PCRs Done
3,352,147 UART: [art] Lock RT PCRs Done
3,353,563 UART: [art] Populate DV Done
3,361,892 UART: [fht] FMC Alias Private Key: 7
3,363,020 UART: [art] Derive CDI
3,363,300 UART: [art] Store in slot 0x4
3,448,954 UART: [art] Derive Key Pair
3,449,314 UART: [art] Store priv key in slot 0x5
3,462,549 UART: [art] Derive Key Pair - Done
3,477,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,639 UART: [art] PUB.X = 31E23EDE5DF9198EE91434FCCE894B3D1DC96257E40A5FD13C500BE38A2565A04A8DB896662ADF5F3484163573D59535
3,500,407 UART: [art] PUB.Y = 0E34867B45AD18FFA9D273BFEB9F4DAD574F1F87C4B05786547F6DE65318708E568B4FCC84DA1C2BAD45BC74F38ACC49
3,507,372 UART: [art] SIG.R = 641ED809AA54F4B2CD257E86C30471A2C431E3924494F92E23C3CCF76107A10D7F387CFE81B23D35A53D2A969B93A0E4
3,514,134 UART: [art] SIG.S = F3D449DD66875B2B0CB3A3A6E09C5F44E6186B676FEF196B154AC4F9EB3090EED744F008EC1AED48940C1DC6DA20D454
3,537,537 UART: Caliptra RT
3,537,880 UART: [state] CFI Enabled
3,658,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,456 UART: [rt]cmd =0x4453424c, len=4
3,705,950 >>> mbox cmd response data (8 bytes)
3,705,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,706,795 UART:
3,706,811 UART: Running Caliptra ROM ...
3,707,219 UART:
3,707,360 UART: [state] CFI Enabled
3,709,628 UART: [state] LifecycleState = Unprovisioned
3,710,283 UART: [state] DebugLocked = No
3,710,913 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,712,630 UART: [kat] SHA2-256
4,506,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,510,676 UART: [kat] ++
4,510,828 UART: [kat] sha1
4,515,274 UART: [kat] SHA2-256
4,517,212 UART: [kat] SHA2-384
4,519,889 UART: [kat] SHA2-512-ACC
4,521,789 UART: [kat] ECC-384
4,527,884 UART: [kat] HMAC-384Kdf
4,532,404 UART: [kat] LMS
5,100,600 UART: [kat] --
5,101,519 UART: [update-reset] ++
6,483,289 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,484,509 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,639,776 >>> mbox cmd response: success
6,639,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,640,081 UART: [update-reset] Copying MAN_2 To MAN_1
6,648,095 UART: [update-reset Success] --
6,649,088 UART: [state] Locking Datavault
6,649,964 UART: [state] Locking PCR0, PCR1 and PCR31
6,650,568 UART: [state] Locking ICCM
6,651,172 UART: [exit] Launching FMC @ 0x40000130
6,656,502 UART:
6,656,518 UART: Running Caliptra FMC ...
6,656,926 UART:
6,657,069 UART: [state] CFI Enabled
6,746,318 UART: [art] Extend RT PCRs Done
6,746,746 UART: [art] Lock RT PCRs Done
6,747,755 UART: [art] Populate DV Done
6,756,004 UART: [fht] FMC Alias Private Key: 7
6,757,152 UART: [art] Derive CDI
6,757,432 UART: [art] Store in slot 0x4
6,843,078 UART: [art] Derive Key Pair
6,843,438 UART: [art] Store priv key in slot 0x5
6,856,811 UART: [art] Derive Key Pair - Done
6,871,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,887,218 UART: [art] Erasing AUTHORITY.KEYID = 7
6,887,983 UART: [art] PUB.X = 0AC2629871EA25C1D52FBB91248C5A1E5AE6E4A69634019972168D0C4C2EAD33EE4CD0C3CEE886E3F98DAED83D38DBC0
6,894,762 UART: [art] PUB.Y = C491AD32A58B5D9093AA7123000F3D217DACE3D658C333174EEE0A07089846815110D67E2C4E25705C72E437FDBA1B7A
6,901,680 UART: [art] SIG.R = 6BB1EE84DE019F8655BBD2FAC8FDD0C6AACADCAE9DBDC60814C0D7E55399670AD714D2B7BAB0091D2BC88720941AD599
6,908,464 UART: [art] SIG.S = CA0458FCE049307FB7C2099EA426ADAB80F3727DCF0CD90E40C0D42D9BC843D0CC5F63183B76C58F51915E3D2F792311
6,932,440 UART: Caliptra RT
6,932,783 UART: [state] CFI Enabled
7,312,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,342,534 UART: [rt]cmd =0x494e464f, len=4
7,346,294 >>> mbox cmd response data (312 bytes)
7,346,295 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,375,760 UART: [rt]cmd =0x43455252, len=4
7,386,613 >>> mbox cmd response data (783 bytes)
7,386,614 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,416,319 UART: [rt]cmd =0x44504543, len=92
7,601,292 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,410 ready_for_fw is high
1,362,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,745 >>> mbox cmd response: success
2,981,745 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
3,043,342 UART:
3,043,358 UART: Running Caliptra FMC ...
3,043,766 UART:
3,043,909 UART: [state] CFI Enabled
3,054,387 UART: [fht] FMC Alias Private Key: 7
3,173,311 UART: [art] Extend RT PCRs Done
3,173,739 UART: [art] Lock RT PCRs Done
3,175,089 UART: [art] Populate DV Done
3,183,544 UART: [fht] FMC Alias Private Key: 7
3,184,694 UART: [art] Derive CDI
3,184,974 UART: [art] Store in slot 0x4
3,270,676 UART: [art] Derive Key Pair
3,271,036 UART: [art] Store priv key in slot 0x5
3,284,593 UART: [art] Derive Key Pair - Done
3,299,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,059 UART: [art] PUB.X = 6A750BD311FEA2B5DEA669439E5611D1E9AA888B78902018CA14CC05923F7F4093A7FE9D2667F3627AE5E8D26AC2859E
3,321,829 UART: [art] PUB.Y = 7CDB4D2217243AB4F86C6EAA27E13244D2473A4FEFC7139AA78CB42055F27F993793C7633386F05256983C90159BF67B
3,328,777 UART: [art] SIG.R = 77A478077080F324677D5D412F8789C34C982F9C71B967C132018E19E356474E20369E8286863CEC99D52DC6D3EB9648
3,335,527 UART: [art] SIG.S = BBA66D77A991AFF96095029D9C3101B4F822CE7628F48DF88490AC847A784E31C60D45BC7844A1581770B4789C5535D6
3,359,266 UART: Caliptra RT
3,359,609 UART: [state] CFI Enabled
3,479,977 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,691 UART: [rt]cmd =0x4453424c, len=4
3,527,803 >>> mbox cmd response data (8 bytes)
3,527,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,342,837 >>> mbox cmd response: success
6,342,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,355,883 UART:
6,355,899 UART: Running Caliptra FMC ...
6,356,307 UART:
6,356,450 UART: [state] CFI Enabled
6,446,011 UART: [art] Extend RT PCRs Done
6,446,439 UART: [art] Lock RT PCRs Done
6,447,788 UART: [art] Populate DV Done
6,455,977 UART: [fht] FMC Alias Private Key: 7
6,457,159 UART: [art] Derive CDI
6,457,439 UART: [art] Store in slot 0x4
6,543,117 UART: [art] Derive Key Pair
6,543,477 UART: [art] Store priv key in slot 0x5
6,557,060 UART: [art] Derive Key Pair - Done
6,571,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,587,426 UART: [art] Erasing AUTHORITY.KEYID = 7
6,588,191 UART: [art] PUB.X = 6A8CF96D4BF06268D585E4D6587A76298CD2E1BF91FA25A404D6DB14A11EE6DC906CD158C4D1FB61225404CB8F5C54FA
6,594,969 UART: [art] PUB.Y = 30A1BB0CE3E7D621DD0B2829032F6A779DECB5613D361A25A9756D79935C03D034E0F611785FF48BB1D319DB2B452A37
6,601,911 UART: [art] SIG.R = 36351EDFC2D302A6CB18073661360FF5EBBE95F45B50DAD0A384C6EDFE9F09478AB11383702B61B19DE3853702FFAACB
6,608,680 UART: [art] SIG.S = CBB02C6FB5EAD2E5C48B57F3A02F38D29E9BBBD77B6A944AD649DE25763648A6AB03821DFDA006BCDE2C84A601A87088
6,632,943 UART: Caliptra RT
6,633,286 UART: [state] CFI Enabled
7,014,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,044,547 UART: [rt]cmd =0x494e464f, len=4
7,048,349 >>> mbox cmd response data (312 bytes)
7,048,350 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,077,721 UART: [rt]cmd =0x43455252, len=4
7,088,762 >>> mbox cmd response data (783 bytes)
7,088,763 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,118,454 UART: [rt]cmd =0x44504543, len=92
7,304,012 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,684 UART: [kat] SHA2-256
891,234 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,338 UART: [kat] ++
895,490 UART: [kat] sha1
899,896 UART: [kat] SHA2-256
901,836 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
916,151 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,864 UART: [cold-reset] ++
1,170,414 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,174,442 ready_for_fw is high
1,174,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,031 UART: [idev] Erasing UDS.KEYID = 0
1,199,163 UART: [idev] Sha1 KeyId Algorithm
1,208,235 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,216,066 UART: [ldev] Erasing FE.KEYID = 1
1,241,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,830 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,878 UART: [ldev] --
1,281,161 UART: [fwproc] Wait for Commands...
1,281,836 UART: [fwproc] Recv command 0x46574c44
1,282,569 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,986 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,927 >>> mbox cmd response: success
2,825,927 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,827,025 UART: [afmc] ++
2,827,193 UART: [afmc] CDI.KEYID = 6
2,827,556 UART: [afmc] SUBJECT.KEYID = 7
2,827,982 UART: [afmc] AUTHORITY.KEYID = 5
2,862,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,593 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,303 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,184 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,885 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,502 UART: [afmc] --
2,905,475 UART: [cold-reset] --
2,906,487 UART: [state] Locking Datavault
2,907,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,258 UART: [state] Locking ICCM
2,908,910 UART: [exit] Launching FMC @ 0x40000130
2,914,240 UART:
2,914,256 UART: Running Caliptra FMC ...
2,914,664 UART:
2,914,718 UART: [state] CFI Enabled
2,924,930 UART: [fht] FMC Alias Private Key: 7
3,043,620 UART: [art] Extend RT PCRs Done
3,044,048 UART: [art] Lock RT PCRs Done
3,045,530 UART: [art] Populate DV Done
3,053,655 UART: [fht] FMC Alias Private Key: 7
3,054,689 UART: [art] Derive CDI
3,054,969 UART: [art] Store in slot 0x4
3,140,426 UART: [art] Derive Key Pair
3,140,786 UART: [art] Store priv key in slot 0x5
3,154,350 UART: [art] Derive Key Pair - Done
3,168,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,127 UART: [art] PUB.X = 3E13B511FFBEC091727DDF9534CAFAE719B29E874BA7C581E6F166C7060BAD201C14878986FDBB74F8C919C75B5F3171
3,191,901 UART: [art] PUB.Y = 6526774AAAD405E20517A3AC0EF14626004ABCF6217CB1D1A811CED3D4DD1211B6799C5858F71F8A3434DC4A4D7EDF4A
3,198,832 UART: [art] SIG.R = 9C9CE7D71AD182757E43689E0C72B9C8A4B741D996EB7479372533FB3AF73CA2E099400955034A91E309BBF85C04466A
3,205,585 UART: [art] SIG.S = 0F40996A4EA469F211092322AABAB60D51024B05B6D1514C4ED74A5813D020C348C81F8D18C6F0FC2588DC73EBA085FA
3,230,026 UART: Caliptra RT
3,230,277 UART: [state] CFI Enabled
3,350,624 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,162 UART: [rt]cmd =0x4453424c, len=4
3,398,902 >>> mbox cmd response data (8 bytes)
3,398,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,399,446 UART:
3,399,462 UART: Running Caliptra ROM ...
3,399,870 UART:
3,399,925 UART: [state] CFI Enabled
3,402,593 UART: [state] LifecycleState = Unprovisioned
3,403,248 UART: [state] DebugLocked = No
3,403,896 UART: [state] WD Timer not started. Device not locked for debugging
3,405,224 UART: [kat] SHA2-256
4,208,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,212,878 UART: [kat] ++
4,213,030 UART: [kat] sha1
4,217,090 UART: [kat] SHA2-256
4,219,030 UART: [kat] SHA2-384
4,221,651 UART: [kat] SHA2-512-ACC
4,223,551 UART: [kat] ECC-384
4,233,458 UART: [kat] HMAC-384Kdf
4,238,020 UART: [kat] LMS
4,486,332 UART: [kat] --
4,487,024 UART: [update-reset] ++
5,845,703 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,846,902 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,002,117 >>> mbox cmd response: success
6,002,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,002,374 UART: [update-reset] Copying MAN_2 To MAN_1
6,010,388 UART: [update-reset Success] --
6,011,347 UART: [state] Locking Datavault
6,011,947 UART: [state] Locking PCR0, PCR1 and PCR31
6,012,551 UART: [state] Locking ICCM
6,013,221 UART: [exit] Launching FMC @ 0x40000130
6,018,551 UART:
6,018,567 UART: Running Caliptra FMC ...
6,018,975 UART:
6,019,029 UART: [state] CFI Enabled
6,108,046 UART: [art] Extend RT PCRs Done
6,108,474 UART: [art] Lock RT PCRs Done
6,109,783 UART: [art] Populate DV Done
6,118,078 UART: [fht] FMC Alias Private Key: 7
6,119,182 UART: [art] Derive CDI
6,119,462 UART: [art] Store in slot 0x4
6,205,511 UART: [art] Derive Key Pair
6,205,871 UART: [art] Store priv key in slot 0x5
6,218,659 UART: [art] Derive Key Pair - Done
6,233,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,249,036 UART: [art] Erasing AUTHORITY.KEYID = 7
6,249,801 UART: [art] PUB.X = 67655D2FB9F1A427149694FF2349EDA6FEC98D53647EC611BE9A82F8DBC527613EFC92AD5E79C75DE8687C0800BCA59F
6,256,558 UART: [art] PUB.Y = 5C009802BE1B0B302DE8671C8CF23EA5C397B54E8E6B40315157DA52011C8E3F2308DBB71DFBB32F3D08BA162122B7DC
6,263,481 UART: [art] SIG.R = 7839ECAD7F9916BCCD17CC6BAC944CD3A786F96470BF72F4514DC7B7320BDE3A8D26CDE1E8452F5B58A30C9221E29BE4
6,270,263 UART: [art] SIG.S = 4889C364CE81CA02A6F0A1F99AFC5EE1E2E550C7F0EA137DF20DB3F14EB1FEBF5D9F84C58AE11D746E266966A4D004D0
6,294,064 UART: Caliptra RT
6,294,315 UART: [state] CFI Enabled
6,673,889 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,704,084 UART: [rt]cmd =0x494e464f, len=4
6,707,820 >>> mbox cmd response data (312 bytes)
6,707,821 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,737,060 UART: [rt]cmd =0x43455252, len=4
6,747,827 >>> mbox cmd response data (782 bytes)
6,747,828 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,777,931 UART: [rt]cmd =0x44504543, len=92
6,962,647 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,546 ready_for_fw is high
1,059,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,932 >>> mbox cmd response: success
2,677,932 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,739,957 UART:
2,739,973 UART: Running Caliptra FMC ...
2,740,381 UART:
2,740,435 UART: [state] CFI Enabled
2,750,711 UART: [fht] FMC Alias Private Key: 7
2,869,747 UART: [art] Extend RT PCRs Done
2,870,175 UART: [art] Lock RT PCRs Done
2,871,673 UART: [art] Populate DV Done
2,879,674 UART: [fht] FMC Alias Private Key: 7
2,880,716 UART: [art] Derive CDI
2,880,996 UART: [art] Store in slot 0x4
2,966,697 UART: [art] Derive Key Pair
2,967,057 UART: [art] Store priv key in slot 0x5
2,979,945 UART: [art] Derive Key Pair - Done
2,994,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,397 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,162 UART: [art] PUB.X = 7D424ABADCCBB08F3C05A569A902B0ABF80AEFA44EFBD0B73F09757CCA60B6FB675921824BD8CAA31F9E8266ED59C434
3,017,944 UART: [art] PUB.Y = B944CE4C78859E7356819856C62C36F450C6F8D08C202FF789A2BD90FB41FEF755E7D2E719BE1C404675AB39D5C925E7
3,024,898 UART: [art] SIG.R = 18D4499B443E0FF131DDE5F67B339368BABD2381217D965E0203ADCE5300E4BB62FB5A1979C98D6D7B50A058544AA348
3,031,641 UART: [art] SIG.S = 19EC9F155FA23CAE4E786E21C25C663FCCEC207757227B1DC0D6D187EF88F1A5010D154FB068ED33C64DAC9440361590
3,055,965 UART: Caliptra RT
3,056,216 UART: [state] CFI Enabled
3,175,928 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,294 UART: [rt]cmd =0x4453424c, len=4
3,223,232 >>> mbox cmd response data (8 bytes)
3,223,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,712,645 >>> mbox cmd response: success
5,712,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,726,246 UART:
5,726,262 UART: Running Caliptra FMC ...
5,726,670 UART:
5,726,724 UART: [state] CFI Enabled
5,815,803 UART: [art] Extend RT PCRs Done
5,816,231 UART: [art] Lock RT PCRs Done
5,817,412 UART: [art] Populate DV Done
5,825,661 UART: [fht] FMC Alias Private Key: 7
5,826,647 UART: [art] Derive CDI
5,826,927 UART: [art] Store in slot 0x4
5,912,628 UART: [art] Derive Key Pair
5,912,988 UART: [art] Store priv key in slot 0x5
5,925,578 UART: [art] Derive Key Pair - Done
5,940,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,955,621 UART: [art] Erasing AUTHORITY.KEYID = 7
5,956,386 UART: [art] PUB.X = 36B43672FF6F8F0508A6892E7DAE6E3AAB4CF7F6F5C69213473A132B988CF3169EF229C8C227F0A6C3695EE4F17A4AE4
5,963,160 UART: [art] PUB.Y = 2221BF2DEB78244B3692F771712B31BA53851DC98FE7B10D9086575A4E71DEF3EBB7B7FA6C10495721C078B4734E23D1
5,970,109 UART: [art] SIG.R = 3D11CEC4D3F42B32F81CCA664AEC9344E7C1422CDBF9D9E75993DA0A3F988A5C0BC0351BC47403DA8DD8421C823105EA
5,976,883 UART: [art] SIG.S = 375DC881AB38F5B836CCED3B46925D1FB8DCC9E14C026D93CACCA34851D024B1C0244D8453F6C5F94A47B0CBBBC6AB1C
6,001,262 UART: Caliptra RT
6,001,513 UART: [state] CFI Enabled
6,377,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,408,012 UART: [rt]cmd =0x494e464f, len=4
6,411,860 >>> mbox cmd response data (312 bytes)
6,411,861 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,440,974 UART: [rt]cmd =0x43455252, len=4
6,451,759 >>> mbox cmd response data (782 bytes)
6,451,760 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,481,811 UART: [rt]cmd =0x44504543, len=92
6,666,409 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,610 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,632 UART: [kat] SHA2-512-ACC
906,533 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,310 UART: [kat] LMS
1,169,622 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,999 UART: [fht] FHT @ 0x50003400
1,173,677 UART: [idev] ++
1,173,845 UART: [idev] CDI.KEYID = 6
1,174,206 UART: [idev] SUBJECT.KEYID = 7
1,174,631 UART: [idev] UDS.KEYID = 0
1,174,977 ready_for_fw is high
1,174,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,970 UART: [idev] Erasing UDS.KEYID = 0
1,199,954 UART: [idev] Sha1 KeyId Algorithm
1,208,816 UART: [idev] --
1,209,957 UART: [ldev] ++
1,210,125 UART: [ldev] CDI.KEYID = 6
1,210,489 UART: [ldev] SUBJECT.KEYID = 5
1,210,916 UART: [ldev] AUTHORITY.KEYID = 7
1,211,379 UART: [ldev] FE.KEYID = 1
1,216,907 UART: [ldev] Erasing FE.KEYID = 1
1,242,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,697 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,629 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,431 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,654 >>> mbox cmd response: success
2,825,654 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,826,834 UART: [afmc] ++
2,827,002 UART: [afmc] CDI.KEYID = 6
2,827,365 UART: [afmc] SUBJECT.KEYID = 7
2,827,791 UART: [afmc] AUTHORITY.KEYID = 5
2,863,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,061 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,762 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,693 UART: [afmc] --
2,906,674 UART: [cold-reset] --
2,907,470 UART: [state] Locking Datavault
2,908,633 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,237 UART: [state] Locking ICCM
2,909,767 UART: [exit] Launching FMC @ 0x40000130
2,915,097 UART:
2,915,113 UART: Running Caliptra FMC ...
2,915,521 UART:
2,915,664 UART: [state] CFI Enabled
2,926,076 UART: [fht] FMC Alias Private Key: 7
3,045,200 UART: [art] Extend RT PCRs Done
3,045,628 UART: [art] Lock RT PCRs Done
3,046,728 UART: [art] Populate DV Done
3,055,059 UART: [fht] FMC Alias Private Key: 7
3,056,087 UART: [art] Derive CDI
3,056,367 UART: [art] Store in slot 0x4
3,142,042 UART: [art] Derive Key Pair
3,142,402 UART: [art] Store priv key in slot 0x5
3,155,546 UART: [art] Derive Key Pair - Done
3,170,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,126 UART: [art] PUB.X = 19399C5DE5A4C42A04F58276F5A973CDEC90B74F59B199A63010D70522B8B1C3B19B85AFED599F96B6D9B0ACD6DA4339
3,193,900 UART: [art] PUB.Y = 8530D6C08949B21046322D743A052E06FCCFA59D54678C7D699381007820ABA910333F2738ABC4789CE8DC607CCBE74B
3,200,820 UART: [art] SIG.R = C2C803294BC8DE3D05CF44AF78D563DBDC46F2ACC9BAF3378738AA07A2A694CE0FF57B234322F81DBFDD44FE35FBC5FD
3,207,606 UART: [art] SIG.S = 10A5AD79FDFADC17ED925F50FBAD9F8CFF0B89AB56E1B85B8D4A3C509A1C9660BA4CB392B770012AF1D2C2CD264F2B46
3,231,876 UART: Caliptra RT
3,232,219 UART: [state] CFI Enabled
3,352,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,110 UART: [rt]cmd =0x4453424c, len=4
3,400,198 >>> mbox cmd response data (8 bytes)
3,400,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,108 UART:
3,401,124 UART: Running Caliptra ROM ...
3,401,532 UART:
3,401,674 UART: [state] CFI Enabled
3,404,180 UART: [state] LifecycleState = Unprovisioned
3,404,835 UART: [state] DebugLocked = No
3,405,557 UART: [state] WD Timer not started. Device not locked for debugging
3,406,867 UART: [kat] SHA2-256
4,210,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,214,521 UART: [kat] ++
4,214,673 UART: [kat] sha1
4,218,967 UART: [kat] SHA2-256
4,220,907 UART: [kat] SHA2-384
4,223,550 UART: [kat] SHA2-512-ACC
4,225,450 UART: [kat] ECC-384
4,235,371 UART: [kat] HMAC-384Kdf
4,239,853 UART: [kat] LMS
4,488,165 UART: [kat] --
4,489,063 UART: [update-reset] ++
5,848,064 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,849,265 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,004,480 >>> mbox cmd response: success
6,004,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,004,729 UART: [update-reset] Copying MAN_2 To MAN_1
6,012,743 UART: [update-reset Success] --
6,013,678 UART: [state] Locking Datavault
6,014,444 UART: [state] Locking PCR0, PCR1 and PCR31
6,015,048 UART: [state] Locking ICCM
6,015,562 UART: [exit] Launching FMC @ 0x40000130
6,020,892 UART:
6,020,908 UART: Running Caliptra FMC ...
6,021,316 UART:
6,021,459 UART: [state] CFI Enabled
6,110,346 UART: [art] Extend RT PCRs Done
6,110,774 UART: [art] Lock RT PCRs Done
6,111,955 UART: [art] Populate DV Done
6,120,084 UART: [fht] FMC Alias Private Key: 7
6,121,144 UART: [art] Derive CDI
6,121,424 UART: [art] Store in slot 0x4
6,207,111 UART: [art] Derive Key Pair
6,207,471 UART: [art] Store priv key in slot 0x5
6,220,927 UART: [art] Derive Key Pair - Done
6,235,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,250,796 UART: [art] Erasing AUTHORITY.KEYID = 7
6,251,561 UART: [art] PUB.X = 0385147524EDF6E7CA00EFB28CF6499D2A49B25B65CDF5EDB27E06ECB305F07D423A263C820FB49E6254B5E54E495379
6,258,305 UART: [art] PUB.Y = 961612561DD3FBC401A295E37971E35C7A9A324866E459A4B5D04A0D8BCFF654B08F6716B04E677CE7C7771A96F2AE1E
6,265,253 UART: [art] SIG.R = 2C906B9825ECF574468E0B2AB1BDDECA3419B018C1597112E32D1B0F4B1B06D2B35F18DE066167054F021EE9B5613B8E
6,272,011 UART: [art] SIG.S = D003130489966D1316AFC78B5BC9385D8670098D2B8DF9609B7CC3394EEDC83CFA4A88B37B7A58A251806CD4933F0008
6,295,495 UART: Caliptra RT
6,295,838 UART: [state] CFI Enabled
6,679,103 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,709,212 UART: [rt]cmd =0x494e464f, len=4
6,712,972 >>> mbox cmd response data (312 bytes)
6,712,973 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,742,170 UART: [rt]cmd =0x43455252, len=4
6,753,009 >>> mbox cmd response data (783 bytes)
6,753,010 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,782,817 UART: [rt]cmd =0x44504543, len=92
6,967,193 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 ready_for_fw is high
1,060,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,017 >>> mbox cmd response: success
2,681,017 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,743,390 UART:
2,743,406 UART: Running Caliptra FMC ...
2,743,814 UART:
2,743,957 UART: [state] CFI Enabled
2,754,523 UART: [fht] FMC Alias Private Key: 7
2,873,663 UART: [art] Extend RT PCRs Done
2,874,091 UART: [art] Lock RT PCRs Done
2,875,193 UART: [art] Populate DV Done
2,883,340 UART: [fht] FMC Alias Private Key: 7
2,884,388 UART: [art] Derive CDI
2,884,668 UART: [art] Store in slot 0x4
2,970,535 UART: [art] Derive Key Pair
2,970,895 UART: [art] Store priv key in slot 0x5
2,984,539 UART: [art] Derive Key Pair - Done
2,999,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,848 UART: [art] PUB.X = F7997E2D4E25099A317979816CE8B607D44ED90C945FC5DCD2C8869216CE538FCF7E9551859DA3C34089858136C7E193
3,022,605 UART: [art] PUB.Y = CDB5093322C91A746D460CD7AC8090D52AF6E4673C4CBDAF69333B4CE917C80CF6E2D7B093617446F720EDBE86CEAB34
3,029,560 UART: [art] SIG.R = F59D71932C8413C532173C443B860C337C4E4EB5C197E8D56EF69FE33B04EC0CB91C322CDEEE1F1480D7F8025C55F274
3,036,324 UART: [art] SIG.S = 5D73CE2639750C5FA7523EFFCBFA90866C6A732A672055579EA96EFD4523FE06DDB9FAB942D3F705ACCC654CF75E92B2
3,059,737 UART: Caliptra RT
3,060,080 UART: [state] CFI Enabled
3,179,921 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,475 UART: [rt]cmd =0x4453424c, len=4
3,228,153 >>> mbox cmd response data (8 bytes)
3,228,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,716,019 >>> mbox cmd response: success
5,716,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,729,806 UART:
5,729,822 UART: Running Caliptra FMC ...
5,730,230 UART:
5,730,373 UART: [state] CFI Enabled
5,819,808 UART: [art] Extend RT PCRs Done
5,820,236 UART: [art] Lock RT PCRs Done
5,821,167 UART: [art] Populate DV Done
5,829,600 UART: [fht] FMC Alias Private Key: 7
5,830,764 UART: [art] Derive CDI
5,831,044 UART: [art] Store in slot 0x4
5,916,511 UART: [art] Derive Key Pair
5,916,871 UART: [art] Store priv key in slot 0x5
5,929,889 UART: [art] Derive Key Pair - Done
5,944,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,960,124 UART: [art] Erasing AUTHORITY.KEYID = 7
5,960,889 UART: [art] PUB.X = CA2C3D7F88FA50394248DE7B18C991C04CC9C0093DDB28DF41508B4CDDFFE83C3921526D49DF7CA007980BE65512945A
5,967,660 UART: [art] PUB.Y = 8BB452F798812AD5E4749A0515474E89C453F2E60368DD54AF29200347118A0B7AEECDD29EF3A798AA895A1489C37D50
5,974,598 UART: [art] SIG.R = CC3CFE379FD903DEEF87D88A6F1428C93A4B5DB1B73EFF433AAEAA8CA3E0D267F057B039F04D9AB7C6CD23C198F8F4B3
5,981,393 UART: [art] SIG.S = 0988221BC5987B2C9BC6EF9AA0948DE6C6E5C86B21F4D2B899E7DF9CBE6D592F523226C364F5050AC08A11BA038D7901
6,004,774 UART: Caliptra RT
6,005,117 UART: [state] CFI Enabled
6,387,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,417,709 UART: [rt]cmd =0x494e464f, len=4
6,421,323 >>> mbox cmd response data (312 bytes)
6,421,324 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,450,625 UART: [rt]cmd =0x43455252, len=4
6,461,340 >>> mbox cmd response data (783 bytes)
6,461,341 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,491,300 UART: [rt]cmd =0x44504543, len=92
6,675,842 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,769 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
902,225 UART: [kat] SHA2-256
904,165 UART: [kat] SHA2-384
906,824 UART: [kat] SHA2-512-ACC
908,725 UART: [kat] ECC-384
918,442 UART: [kat] HMAC-384Kdf
923,000 UART: [kat] LMS
1,171,328 UART: [kat] --
1,172,161 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 ready_for_fw is high
1,176,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,072 UART: [idev] Erasing UDS.KEYID = 0
1,201,281 UART: [idev] Sha1 KeyId Algorithm
1,209,591 UART: [idev] --
1,210,455 UART: [ldev] ++
1,210,623 UART: [ldev] CDI.KEYID = 6
1,210,986 UART: [ldev] SUBJECT.KEYID = 5
1,211,412 UART: [ldev] AUTHORITY.KEYID = 7
1,211,875 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,645 UART: [ldev] --
1,282,998 UART: [fwproc] Wait for Commands...
1,283,654 UART: [fwproc] Recv command 0x46574c44
1,284,382 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,265 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,033 >>> mbox cmd response: success
2,828,033 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,829,093 UART: [afmc] ++
2,829,261 UART: [afmc] CDI.KEYID = 6
2,829,623 UART: [afmc] SUBJECT.KEYID = 7
2,830,048 UART: [afmc] AUTHORITY.KEYID = 5
2,865,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,418 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,166 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,875 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,758 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,459 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,461 UART: [afmc] --
2,908,517 UART: [cold-reset] --
2,909,201 UART: [state] Locking Datavault
2,910,134 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,738 UART: [state] Locking ICCM
2,911,280 UART: [exit] Launching FMC @ 0x40000130
2,916,610 UART:
2,916,626 UART: Running Caliptra FMC ...
2,917,034 UART:
2,917,088 UART: [state] CFI Enabled
2,927,594 UART: [fht] FMC Alias Private Key: 7
3,047,004 UART: [art] Extend RT PCRs Done
3,047,432 UART: [art] Lock RT PCRs Done
3,048,652 UART: [art] Populate DV Done
3,056,849 UART: [fht] FMC Alias Private Key: 7
3,057,785 UART: [art] Derive CDI
3,058,065 UART: [art] Store in slot 0x4
3,144,086 UART: [art] Derive Key Pair
3,144,446 UART: [art] Store priv key in slot 0x5
3,157,700 UART: [art] Derive Key Pair - Done
3,172,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,099 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,864 UART: [art] PUB.X = 79B7D0FD6FA591E2D6F472C7EA4B4288512F3AC5CFEF613B50F4B4C732C32CD3A82926A58EA0E6266443B260022303FE
3,195,636 UART: [art] PUB.Y = 08B91EEB26B030B30A35A2D1A35A659B432F7C8D537E5AF8D35713539A05820BA15A5DD85B21C0498263E141579A1875
3,202,570 UART: [art] SIG.R = 409FF73A87F13B54A057C3924084EEA4028946E063B8F19FA54EAB4E90AAB2B12D49C3D2FBFC9092E4B4418BAF701D16
3,209,347 UART: [art] SIG.S = 20A288CC731F289B8357950901EBBC3382107D817B2AFB3448B8A2DBAA6BB7DDFF4DA2CBFD836CF5753776A1BDC4CF11
3,233,279 UART: Caliptra RT
3,233,530 UART: [state] CFI Enabled
3,353,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,976 UART: [rt]cmd =0x4453424c, len=4
3,400,988 >>> mbox cmd response data (8 bytes)
3,400,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,832 UART:
3,401,848 UART: Running Caliptra ROM ...
3,402,256 UART:
3,402,311 UART: [state] CFI Enabled
3,404,819 UART: [state] LifecycleState = Unprovisioned
3,405,474 UART: [state] DebugLocked = No
3,405,972 UART: [state] WD Timer not started. Device not locked for debugging
3,407,228 UART: [kat] SHA2-256
4,212,878 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,217,003 UART: [kat] ++
4,217,155 UART: [kat] sha1
4,221,365 UART: [kat] SHA2-256
4,223,305 UART: [kat] SHA2-384
4,226,018 UART: [kat] SHA2-512-ACC
4,227,918 UART: [kat] ECC-384
4,237,817 UART: [kat] HMAC-384Kdf
4,242,473 UART: [kat] LMS
4,490,801 UART: [kat] --
4,491,603 UART: [update-reset] ++
5,851,431 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,852,598 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,007,813 >>> mbox cmd response: success
6,007,813 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,008,122 UART: [update-reset] Copying MAN_2 To MAN_1
6,016,136 UART: [update-reset Success] --
6,017,041 UART: [state] Locking Datavault
6,017,705 UART: [state] Locking PCR0, PCR1 and PCR31
6,018,309 UART: [state] Locking ICCM
6,018,889 UART: [exit] Launching FMC @ 0x40000130
6,024,219 UART:
6,024,235 UART: Running Caliptra FMC ...
6,024,643 UART:
6,024,697 UART: [state] CFI Enabled
6,114,504 UART: [art] Extend RT PCRs Done
6,114,932 UART: [art] Lock RT PCRs Done
6,116,339 UART: [art] Populate DV Done
6,124,600 UART: [fht] FMC Alias Private Key: 7
6,125,710 UART: [art] Derive CDI
6,125,990 UART: [art] Store in slot 0x4
6,211,929 UART: [art] Derive Key Pair
6,212,289 UART: [art] Store priv key in slot 0x5
6,224,835 UART: [art] Derive Key Pair - Done
6,239,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,255,307 UART: [art] Erasing AUTHORITY.KEYID = 7
6,256,072 UART: [art] PUB.X = 89796EBEF2C6D31CF56BBF9552D600A11C60CE5FCF68B660D36FCC990BFCE3D840868C53E0FF7E0B3D5D999F965A477E
6,262,832 UART: [art] PUB.Y = 949D81A8274B3C1EB2A7159BE615C0FA8BE6DFD105051EDED111EA7F1F9B8648F9E62F9BD65D911D49015D030C11FCAD
6,269,783 UART: [art] SIG.R = 8A8B2E4EF462AE1F96031482092306394EF9C7F0BF0DBCFD2B6277320BF37C8EA8446B4F449896DE8CEF168AD704BD38
6,276,545 UART: [art] SIG.S = C62D9EDBBA5D0D7627FDD7F5F2391107CBA05469B7AD0609A0743E916DEC67610E5FAC3BC3D48FEAB5A279298CB6BC81
6,300,710 UART: Caliptra RT
6,300,961 UART: [state] CFI Enabled
6,682,819 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,713,172 UART: [rt]cmd =0x494e464f, len=4
6,716,820 >>> mbox cmd response data (312 bytes)
6,716,821 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,746,080 UART: [rt]cmd =0x43455252, len=4
6,756,770 >>> mbox cmd response data (784 bytes)
6,756,771 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,786,862 UART: [rt]cmd =0x44504543, len=92
6,971,188 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,449 ready_for_fw is high
1,060,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,238 >>> mbox cmd response: success
2,678,238 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,739,451 UART:
2,739,467 UART: Running Caliptra FMC ...
2,739,875 UART:
2,739,929 UART: [state] CFI Enabled
2,750,653 UART: [fht] FMC Alias Private Key: 7
2,869,889 UART: [art] Extend RT PCRs Done
2,870,317 UART: [art] Lock RT PCRs Done
2,871,863 UART: [art] Populate DV Done
2,879,968 UART: [fht] FMC Alias Private Key: 7
2,881,066 UART: [art] Derive CDI
2,881,346 UART: [art] Store in slot 0x4
2,966,979 UART: [art] Derive Key Pair
2,967,339 UART: [art] Store priv key in slot 0x5
2,980,649 UART: [art] Derive Key Pair - Done
2,995,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,213 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,978 UART: [art] PUB.X = A805B3110BAE048E9847F82385026400668D5A8A25E59F53B00BCA02A9314B0A41F2C9F1D83DDC0173118C14F6EC2E6F
3,017,704 UART: [art] PUB.Y = 06AB41824671A997EE02F62CDA703D568C52E8E20C9C2A19E9B9702214B9C7664F07254899D69F093274FAA39541C5D5
3,024,633 UART: [art] SIG.R = 5DB1B3D33BDC9D4F91645838D6542FD0F65732942EB5EB9B720BA94FA1DF3E6C7312BB9138A400A36363D111EB8F7F3B
3,031,388 UART: [art] SIG.S = 335A559D9D6AB0CC1868E9394EC773C42605E0076BD65412A409409AD20C9F42516068A4CF2F03112F11D2EB707F86B4
3,055,427 UART: Caliptra RT
3,055,678 UART: [state] CFI Enabled
3,175,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,868 UART: [rt]cmd =0x4453424c, len=4
3,223,122 >>> mbox cmd response data (8 bytes)
3,223,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,712,284 >>> mbox cmd response: success
5,712,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,726,241 UART:
5,726,257 UART: Running Caliptra FMC ...
5,726,665 UART:
5,726,719 UART: [state] CFI Enabled
5,815,698 UART: [art] Extend RT PCRs Done
5,816,126 UART: [art] Lock RT PCRs Done
5,817,387 UART: [art] Populate DV Done
5,825,796 UART: [fht] FMC Alias Private Key: 7
5,826,842 UART: [art] Derive CDI
5,827,122 UART: [art] Store in slot 0x4
5,912,595 UART: [art] Derive Key Pair
5,912,955 UART: [art] Store priv key in slot 0x5
5,925,579 UART: [art] Derive Key Pair - Done
5,939,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,955,484 UART: [art] Erasing AUTHORITY.KEYID = 7
5,956,249 UART: [art] PUB.X = 8B1C496787BD13A8FD5D26733C325488F45E9E90D3B42A71CB64CF8E7FA2C7EA744527847E24AF14AF7E33FFFD7322E0
5,963,029 UART: [art] PUB.Y = 315A3CA565B167545C7055B594B46FCD42292CF561291EA93DC42127D6CD0AFCA1E01539EFCE7C480AF121C6DB528F57
5,969,981 UART: [art] SIG.R = 7EF7FB994C0730614724AA98EB2F134151591EF369370FD45AF3C6824AEAAC4B668C9BC6A50F90C32FF91659DED2D4AA
5,976,754 UART: [art] SIG.S = E9AFB3B67FECB84B77A6523AADA0F8603A9B1E390BB9D84597BDE19140BB0211BAA454A96D8ABCFE84196A617371EB34
6,000,302 UART: Caliptra RT
6,000,553 UART: [state] CFI Enabled
6,379,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,409,569 UART: [rt]cmd =0x494e464f, len=4
6,413,263 >>> mbox cmd response data (312 bytes)
6,413,264 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,442,773 UART: [rt]cmd =0x43455252, len=4
6,453,604 >>> mbox cmd response data (783 bytes)
6,453,605 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,483,598 UART: [rt]cmd =0x44504543, len=92
6,668,664 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,973 UART: [kat] SHA2-256
893,623 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,748 UART: [kat] ++
897,900 UART: [kat] sha1
902,060 UART: [kat] SHA2-256
904,000 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
917,977 UART: [kat] HMAC-384Kdf
922,607 UART: [kat] LMS
1,170,935 UART: [kat] --
1,171,660 UART: [cold-reset] ++
1,172,070 UART: [fht] FHT @ 0x50003400
1,174,605 UART: [idev] ++
1,174,773 UART: [idev] CDI.KEYID = 6
1,175,133 UART: [idev] SUBJECT.KEYID = 7
1,175,557 UART: [idev] UDS.KEYID = 0
1,175,902 ready_for_fw is high
1,175,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,791 UART: [idev] Erasing UDS.KEYID = 0
1,200,880 UART: [idev] Sha1 KeyId Algorithm
1,209,278 UART: [idev] --
1,210,470 UART: [ldev] ++
1,210,638 UART: [ldev] CDI.KEYID = 6
1,211,001 UART: [ldev] SUBJECT.KEYID = 5
1,211,427 UART: [ldev] AUTHORITY.KEYID = 7
1,211,890 UART: [ldev] FE.KEYID = 1
1,217,022 UART: [ldev] Erasing FE.KEYID = 1
1,244,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,816 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,298 UART: [ldev] --
1,283,575 UART: [fwproc] Wait for Commands...
1,284,361 UART: [fwproc] Recv command 0x46574c44
1,285,089 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,781 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,098 >>> mbox cmd response: success
2,828,098 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,829,260 UART: [afmc] ++
2,829,428 UART: [afmc] CDI.KEYID = 6
2,829,790 UART: [afmc] SUBJECT.KEYID = 7
2,830,215 UART: [afmc] AUTHORITY.KEYID = 5
2,866,026 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,619 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,367 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,076 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,959 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,660 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,446 UART: [afmc] --
2,909,498 UART: [cold-reset] --
2,910,286 UART: [state] Locking Datavault
2,911,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,987 UART: [state] Locking ICCM
2,912,501 UART: [exit] Launching FMC @ 0x40000130
2,917,831 UART:
2,917,847 UART: Running Caliptra FMC ...
2,918,255 UART:
2,918,398 UART: [state] CFI Enabled
2,929,368 UART: [fht] FMC Alias Private Key: 7
3,048,360 UART: [art] Extend RT PCRs Done
3,048,788 UART: [art] Lock RT PCRs Done
3,050,506 UART: [art] Populate DV Done
3,058,541 UART: [fht] FMC Alias Private Key: 7
3,059,723 UART: [art] Derive CDI
3,060,003 UART: [art] Store in slot 0x4
3,145,404 UART: [art] Derive Key Pair
3,145,764 UART: [art] Store priv key in slot 0x5
3,159,426 UART: [art] Derive Key Pair - Done
3,174,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,987 UART: [art] PUB.X = 0FCC49EDD141C9615841619B80F9627D86D33C5FECD931240FC994C219F950ABB7B345FF32C51DCE36B274380C90EAB6
3,197,756 UART: [art] PUB.Y = D9875188026E3CD2755124762C0C03C27EDD3E878E9BEB2376954739B5FFDB03AC93357A4DA5AC8DFB5759FB8515F50C
3,204,697 UART: [art] SIG.R = 1F4CCE725189AD2A2C9F6E7F51CAA4EA5EA6E0AC0B5C4B27D1C8BCB94676229623ECAA529ADE4607649646D11F4A1FE5
3,211,481 UART: [art] SIG.S = A88F609B8994CF4DBA5DC9D833B5FD4FB0545AA352B5ACA5AD53FD039C445B020EED68DBE752BACDD4D6314D2D9CB344
3,235,438 UART: Caliptra RT
3,235,781 UART: [state] CFI Enabled
3,356,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,744 UART: [rt]cmd =0x4453424c, len=4
3,403,984 >>> mbox cmd response data (8 bytes)
3,403,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,698 UART:
3,404,714 UART: Running Caliptra ROM ...
3,405,122 UART:
3,405,264 UART: [state] CFI Enabled
3,408,394 UART: [state] LifecycleState = Unprovisioned
3,409,049 UART: [state] DebugLocked = No
3,409,567 UART: [state] WD Timer not started. Device not locked for debugging
3,410,727 UART: [kat] SHA2-256
4,216,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,220,502 UART: [kat] ++
4,220,654 UART: [kat] sha1
4,224,764 UART: [kat] SHA2-256
4,226,704 UART: [kat] SHA2-384
4,229,629 UART: [kat] SHA2-512-ACC
4,231,529 UART: [kat] ECC-384
4,241,232 UART: [kat] HMAC-384Kdf
4,245,980 UART: [kat] LMS
4,494,308 UART: [kat] --
4,495,208 UART: [update-reset] ++
5,853,802 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,854,955 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,010,170 >>> mbox cmd response: success
6,010,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,010,301 UART: [update-reset] Copying MAN_2 To MAN_1
6,018,315 UART: [update-reset Success] --
6,019,424 UART: [state] Locking Datavault
6,020,274 UART: [state] Locking PCR0, PCR1 and PCR31
6,020,878 UART: [state] Locking ICCM
6,021,390 UART: [exit] Launching FMC @ 0x40000130
6,026,720 UART:
6,026,736 UART: Running Caliptra FMC ...
6,027,144 UART:
6,027,287 UART: [state] CFI Enabled
6,116,928 UART: [art] Extend RT PCRs Done
6,117,356 UART: [art] Lock RT PCRs Done
6,118,617 UART: [art] Populate DV Done
6,126,712 UART: [fht] FMC Alias Private Key: 7
6,127,852 UART: [art] Derive CDI
6,128,132 UART: [art] Store in slot 0x4
6,214,055 UART: [art] Derive Key Pair
6,214,415 UART: [art] Store priv key in slot 0x5
6,227,737 UART: [art] Derive Key Pair - Done
6,242,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,258,036 UART: [art] Erasing AUTHORITY.KEYID = 7
6,258,801 UART: [art] PUB.X = D17FDC53C92FFB4AAB4AC18398706EF4FEC2B6431C1888B47D6951604514ACAF50658F548D02A0FABE146B134D26A06C
6,265,580 UART: [art] PUB.Y = 276ED5D15D4E3230D2F423D8E1E9260582249687818A5C21D9A6378EE465F826B9C1BA26A4032D9AEADF88EE57C28725
6,272,524 UART: [art] SIG.R = 695EC18767DE0D0206FC4BAC8598425D4F1797A6EBB985BB478C83618A8F805F8D5A10ECDC8638A36E87E55A1A63C105
6,279,288 UART: [art] SIG.S = 7850A6DD50253A6FC4AB20F92CB00043295AC8D4EAA39690C27B97F9C312DD54DCF14806058E828E97AF0AFFFC9E818F
6,302,167 UART: Caliptra RT
6,302,510 UART: [state] CFI Enabled
6,690,056 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,720,507 UART: [rt]cmd =0x494e464f, len=4
6,724,089 >>> mbox cmd response data (312 bytes)
6,724,090 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,753,585 UART: [rt]cmd =0x43455252, len=4
6,764,442 >>> mbox cmd response data (782 bytes)
6,764,443 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,794,170 UART: [rt]cmd =0x44504543, len=92
6,978,695 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,992 ready_for_fw is high
1,060,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,423 >>> mbox cmd response: success
2,680,423 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
2,742,052 UART:
2,742,068 UART: Running Caliptra FMC ...
2,742,476 UART:
2,742,619 UART: [state] CFI Enabled
2,753,273 UART: [fht] FMC Alias Private Key: 7
2,872,191 UART: [art] Extend RT PCRs Done
2,872,619 UART: [art] Lock RT PCRs Done
2,874,187 UART: [art] Populate DV Done
2,882,524 UART: [fht] FMC Alias Private Key: 7
2,883,492 UART: [art] Derive CDI
2,883,772 UART: [art] Store in slot 0x4
2,969,735 UART: [art] Derive Key Pair
2,970,095 UART: [art] Store priv key in slot 0x5
2,982,891 UART: [art] Derive Key Pair - Done
2,997,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,022 UART: [art] PUB.X = 625C870F4EFC6BF2F29FDB82661968B3DC0493D7304D25BA237B9FBA43883B67D3BA37CCAE1900339B4E0E9F610F7845
3,020,766 UART: [art] PUB.Y = 672FE3BC32D36A258E4114B69BEA53324D8D3ABFDAD42A68C0DFB91F57FAB95765BA0EA84B0A08879218543C5D11315B
3,027,719 UART: [art] SIG.R = 707800FD8EB01D6CF4FA2490EC09E02F4B6B16751733585CE23B9E2FC6A6EF6EA067A7507DB22D0539C6DA5D6B756493
3,034,469 UART: [art] SIG.S = 14B53E7A98BFC48A142813C261F5E4935EABB2EF79D1254F3A8F14A82BAF3434633842A035236DA44CC381D3A21F8B68
3,058,749 UART: Caliptra RT
3,059,092 UART: [state] CFI Enabled
3,179,882 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,356 UART: [rt]cmd =0x4453424c, len=4
3,227,086 >>> mbox cmd response data (8 bytes)
3,227,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,717,811 >>> mbox cmd response: success
5,717,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,731,414 UART:
5,731,430 UART: Running Caliptra FMC ...
5,731,838 UART:
5,731,981 UART: [state] CFI Enabled
5,821,732 UART: [art] Extend RT PCRs Done
5,822,160 UART: [art] Lock RT PCRs Done
5,823,539 UART: [art] Populate DV Done
5,831,690 UART: [fht] FMC Alias Private Key: 7
5,832,638 UART: [art] Derive CDI
5,832,918 UART: [art] Store in slot 0x4
5,918,961 UART: [art] Derive Key Pair
5,919,321 UART: [art] Store priv key in slot 0x5
5,932,931 UART: [art] Derive Key Pair - Done
5,947,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,963,960 UART: [art] Erasing AUTHORITY.KEYID = 7
5,964,725 UART: [art] PUB.X = 1A1F876C3D7AE3F38E239846042DE2BC1A2EEF0AC5AF70C4EE3F4B99CBCEB11DE56A626B6307C3ED0B758D8129D35966
5,971,501 UART: [art] PUB.Y = 56968572ECEE474067820B844D7DC41CD963D41031649070CFDE2FCC6B5FA22B1A8C3A879A49489C194951F3B93221D0
5,978,446 UART: [art] SIG.R = 0230E4410C76A45AAF5EC3309927BF987944FB2D1733B85180E5586509F2AABDEE5F8B826A0E2C8161F4A8B4564CAC87
5,985,208 UART: [art] SIG.S = 5D55FE16141CA95B783A05B72C43B9C5E4DA80A550C83FA4A2031485A13ED9802796CFF5AC0A0F87FB05F6D5B23CF750
6,009,065 UART: Caliptra RT
6,009,408 UART: [state] CFI Enabled
6,390,036 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,420,239 UART: [rt]cmd =0x494e464f, len=4
6,423,739 >>> mbox cmd response data (312 bytes)
6,423,740 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,453,081 UART: [rt]cmd =0x43455252, len=4
6,463,996 >>> mbox cmd response data (782 bytes)
6,463,997 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,493,770 UART: [rt]cmd =0x44504543, len=92
6,678,315 >>> mbox cmd response data (6284 bytes)
test test_disable::test_attestation_disabled_flag_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,179 UART:
192,526 UART: Running Caliptra ROM ...
193,715 UART:
193,872 UART: [state] CFI Enabled
268,178 UART: [state] LifecycleState = Unprovisioned
270,097 UART: [state] DebugLocked = No
271,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,512 UART: [kat] SHA2-256
445,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,728 UART: [kat] ++
456,206 UART: [kat] sha1
468,004 UART: [kat] SHA2-256
470,683 UART: [kat] SHA2-384
476,035 UART: [kat] SHA2-512-ACC
478,437 UART: [kat] ECC-384
2,767,693 UART: [kat] HMAC-384Kdf
2,800,546 UART: [kat] LMS
3,990,837 UART: [kat] --
3,993,988 UART: [cold-reset] ++
3,995,144 UART: [fht] Storing FHT @ 0x50003400
4,006,744 UART: [idev] ++
4,007,329 UART: [idev] CDI.KEYID = 6
4,008,369 UART: [idev] SUBJECT.KEYID = 7
4,009,550 UART: [idev] UDS.KEYID = 0
4,010,596 ready_for_fw is high
4,010,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,854 UART: [idev] Erasing UDS.KEYID = 0
7,348,308 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,493 UART: [idev] --
7,375,715 UART: [ldev] ++
7,376,301 UART: [ldev] CDI.KEYID = 6
7,377,283 UART: [ldev] SUBJECT.KEYID = 5
7,378,447 UART: [ldev] AUTHORITY.KEYID = 7
7,379,737 UART: [ldev] FE.KEYID = 1
7,406,682 UART: [ldev] Erasing FE.KEYID = 1
10,737,413 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,472 UART: [ldev] --
13,096,448 UART: [fwproc] Waiting for Commands...
13,098,925 UART: [fwproc] Received command 0x46574c44
13,101,111 UART: [fwproc] Received Image of size 118548 bytes
17,212,720 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,284,960 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,122 >>> mbox cmd response: success
17,686,748 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,689,489 UART: [afmc] ++
17,690,072 UART: [afmc] CDI.KEYID = 6
17,691,017 UART: [afmc] SUBJECT.KEYID = 7
17,692,150 UART: [afmc] AUTHORITY.KEYID = 5
21,056,454 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,354,439 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,357,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,371,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,385,866 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,400,264 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,421,397 UART: [afmc] --
23,425,979 UART: [cold-reset] --
23,431,782 UART: [state] Locking Datavault
23,437,166 UART: [state] Locking PCR0, PCR1 and PCR31
23,438,818 UART: [state] Locking ICCM
23,439,949 UART: [exit] Launching FMC @ 0x40000130
23,448,351 UART:
23,448,587 UART: Running Caliptra FMC ...
23,449,684 UART:
23,449,840 UART: [state] CFI Enabled
23,513,798 UART: [fht] FMC Alias Private Key: 7
25,854,605 UART: [art] Extend RT PCRs Done
25,855,826 UART: [art] Lock RT PCRs Done
25,857,797 UART: [art] Populate DV Done
25,863,154 UART: [fht] FMC Alias Private Key: 7
25,864,865 UART: [art] Derive CDI
25,865,684 UART: [art] Store in slot 0x4
25,922,287 UART: [art] Derive Key Pair
25,923,323 UART: [art] Store priv key in slot 0x5
29,216,169 UART: [art] Derive Key Pair - Done
29,229,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,518,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,519,875 UART: [art] PUB.X = 6F51D9D11746C048A335DDC0D80CCC174CCC6754D6BE40E470B2694EA1822B4D8416F931BD40DDCEB4567B5A8E48246E
31,527,169 UART: [art] PUB.Y = 27207CE41D6111DC00BEBA50D87A6E6B84F7CCD90624D90F65768A1EA07C06A0A85CD36652655FA51682897EA575321C
31,534,452 UART: [art] SIG.R = BB3B40E6752AABAD16813B386194AD1F1BBCC10178B359157565BE3B8BAF2F76473B4D67A45C151ABCC292DF32870997
31,541,835 UART: [art] SIG.S = 3C5EC8A50419051BDBE47A4740B95AC45E1928F8CC31869F29468C5AA3611C841B7F85AC7B6FEE053D3DB72151D26250
32,846,702 UART: Caliptra RT
32,847,422 UART: [state] CFI Enabled
33,023,803 UART: [rt] RT listening for mailbox commands...
33,056,183 UART: [rt]cmd =0x44504543, len=136
38,687,798 >>> mbox cmd response data (136 bytes)
38,689,130 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,719,070 UART: [rt]cmd =0x4453424c, len=4
42,037,390 >>> mbox cmd response data (8 bytes)
42,037,938 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,068,267 UART: [rt]cmd =0x44504543, len=92
47,829,256 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
3,805,151 ready_for_fw is high
3,805,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,984,273 >>> mbox cmd response: success
17,985,317 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,670,746 UART:
23,671,141 UART: Running Caliptra FMC ...
23,672,297 UART:
23,672,455 UART: [state] CFI Enabled
23,738,762 UART: [fht] FMC Alias Private Key: 7
26,078,682 UART: [art] Extend RT PCRs Done
26,079,906 UART: [art] Lock RT PCRs Done
26,081,615 UART: [art] Populate DV Done
26,087,041 UART: [fht] FMC Alias Private Key: 7
26,088,645 UART: [art] Derive CDI
26,089,463 UART: [art] Store in slot 0x4
26,147,243 UART: [art] Derive Key Pair
26,148,280 UART: [art] Store priv key in slot 0x5
29,440,269 UART: [art] Derive Key Pair - Done
29,453,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,524 UART: [art] PUB.X = 1CFD89A08160CACEB680D1BBF32373B5B7B7729C0470935DF88B4A7D424ECD4A292F518F8451D5825CAD878BC1A0190E
31,751,770 UART: [art] PUB.Y = 14118BFB490628F5D328C83990F642E2442ADB9F2EE36374D2A804EAFD8AE801985381C8BB11DFBC0D2B546E52B14E06
31,759,071 UART: [art] SIG.R = F110EAEF7CE9C64C693456C0DFDD4697B18C9A9586DFDD296E63679D3F8111D24E72CC1F939CF4846B8F77D4AA6B86DB
31,766,482 UART: [art] SIG.S = 930C2885C7B37DFE792B59BF9F5ACF7AE920044A128E76B56DB9ED216B8DD15FE4E7696827EA4E5953277476EFA8CE9D
33,071,473 UART: Caliptra RT
33,072,183 UART: [state] CFI Enabled
33,250,466 UART: [rt] RT listening for mailbox commands...
33,283,016 UART: [rt]cmd =0x44504543, len=136
38,911,153 >>> mbox cmd response data (136 bytes)
38,912,472 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,942,362 UART: [rt]cmd =0x4453424c, len=4
42,261,753 >>> mbox cmd response data (8 bytes)
42,262,289 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,292,819 UART: [rt]cmd =0x44504543, len=92
48,054,071 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,376 UART:
192,751 UART: Running Caliptra ROM ...
193,841 UART:
603,417 UART: [state] CFI Enabled
613,240 UART: [state] LifecycleState = Unprovisioned
615,175 UART: [state] DebugLocked = No
616,769 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,480 UART: [kat] SHA2-256
792,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,805 UART: [kat] ++
803,283 UART: [kat] sha1
815,256 UART: [kat] SHA2-256
817,948 UART: [kat] SHA2-384
823,577 UART: [kat] SHA2-512-ACC
825,939 UART: [kat] ECC-384
3,110,695 UART: [kat] HMAC-384Kdf
3,123,658 UART: [kat] LMS
4,313,722 UART: [kat] --
4,318,099 UART: [cold-reset] ++
4,319,544 UART: [fht] Storing FHT @ 0x50003400
4,330,097 UART: [idev] ++
4,330,847 UART: [idev] CDI.KEYID = 6
4,331,746 UART: [idev] SUBJECT.KEYID = 7
4,332,792 UART: [idev] UDS.KEYID = 0
4,333,907 ready_for_fw is high
4,334,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,829 UART: [idev] Erasing UDS.KEYID = 0
7,623,845 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,082 UART: [idev] --
7,650,782 UART: [ldev] ++
7,651,348 UART: [ldev] CDI.KEYID = 6
7,652,305 UART: [ldev] SUBJECT.KEYID = 5
7,653,509 UART: [ldev] AUTHORITY.KEYID = 7
7,654,786 UART: [ldev] FE.KEYID = 1
7,666,396 UART: [ldev] Erasing FE.KEYID = 1
10,955,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,656 UART: [ldev] --
13,314,538 UART: [fwproc] Waiting for Commands...
13,317,818 UART: [fwproc] Received command 0x46574c44
13,320,016 UART: [fwproc] Received Image of size 118548 bytes
17,420,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,390 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,175 >>> mbox cmd response: success
17,901,725 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,905,367 UART: [afmc] ++
17,905,942 UART: [afmc] CDI.KEYID = 6
17,906,818 UART: [afmc] SUBJECT.KEYID = 7
17,908,143 UART: [afmc] AUTHORITY.KEYID = 5
21,225,988 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,863 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,241 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,682 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,112 UART: [afmc] --
23,592,726 UART: [cold-reset] --
23,598,851 UART: [state] Locking Datavault
23,605,766 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,457 UART: [state] Locking ICCM
23,608,577 UART: [exit] Launching FMC @ 0x40000130
23,616,972 UART:
23,617,248 UART: Running Caliptra FMC ...
23,618,350 UART:
23,618,505 UART: [state] CFI Enabled
23,626,541 UART: [fht] FMC Alias Private Key: 7
25,966,434 UART: [art] Extend RT PCRs Done
25,967,658 UART: [art] Lock RT PCRs Done
25,969,283 UART: [art] Populate DV Done
25,974,746 UART: [fht] FMC Alias Private Key: 7
25,976,279 UART: [art] Derive CDI
25,977,051 UART: [art] Store in slot 0x4
26,020,082 UART: [art] Derive Key Pair
26,021,131 UART: [art] Store priv key in slot 0x5
29,263,651 UART: [art] Derive Key Pair - Done
29,277,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,602 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,108 UART: [art] PUB.X = D5FF70873FCE4ED7434BDA4B34F847099DE3A0BA60EED15495CB288F9465C1338988E928E284282EC306BFE533F4D65A
31,566,392 UART: [art] PUB.Y = C483BA21ECB800D1883942448E6A9271435037DD0F5D408811A94B5BDA54EF1742F8071ADE746BB9FF6F141CB90924E6
31,573,661 UART: [art] SIG.R = B6C4F1C100C23A198250CC217D27F43B2C336B13A21101E40AD6DFC12949459556FB5657A9A26EB07B49F5067E4E79CB
31,580,983 UART: [art] SIG.S = DB5271B8F072BB140AA1C1FA341EB91D026531FEF862216181067115424CF0EDA1C589DAAF03A6B55C6919DB459B3D67
32,885,927 UART: Caliptra RT
32,886,628 UART: [state] CFI Enabled
33,019,254 UART: [rt] RT listening for mailbox commands...
33,051,906 UART: [rt]cmd =0x44504543, len=136
38,610,362 >>> mbox cmd response data (136 bytes)
38,611,654 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,641,616 UART: [rt]cmd =0x4453424c, len=4
41,887,485 >>> mbox cmd response data (8 bytes)
41,888,083 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
41,918,791 UART: [rt]cmd =0x44504543, len=92
47,594,344 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
4,126,184 ready_for_fw is high
4,126,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,343 >>> mbox cmd response: success
18,158,528 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,799,670 UART:
23,800,053 UART: Running Caliptra FMC ...
23,801,281 UART:
23,801,446 UART: [state] CFI Enabled
23,809,182 UART: [fht] FMC Alias Private Key: 7
26,149,501 UART: [art] Extend RT PCRs Done
26,150,725 UART: [art] Lock RT PCRs Done
26,152,244 UART: [art] Populate DV Done
26,157,764 UART: [fht] FMC Alias Private Key: 7
26,159,307 UART: [art] Derive CDI
26,160,118 UART: [art] Store in slot 0x4
26,203,281 UART: [art] Derive Key Pair
26,204,316 UART: [art] Store priv key in slot 0x5
29,446,187 UART: [art] Derive Key Pair - Done
29,459,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,362 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,869 UART: [art] PUB.X = CF8A8CBA71DA65E86C9A6D9B5980CC1E2B5D0B88DF3E00F31DF626C1B7087A3B02C3A5316F0F89F2CC8024C849FE8F96
31,748,116 UART: [art] PUB.Y = 2E615846A613B1465F119E6F0F2130038083C4AE2826CB0038B702E6B213347B789BD083F4FFED9F2580174FB0A2F5C1
31,755,385 UART: [art] SIG.R = 7C3E732ED239215297FB3E582136DA5D7ABEA67CACA0967A3990BBD11A468962CAF474FC31E09E4CF606B4D9D83D4222
31,762,743 UART: [art] SIG.S = 3261853391DB570FB068D79EE09C9CCECA5C539E83BC45E20E89F1048169A89987C0389845DA812598ED058684421613
33,068,284 UART: Caliptra RT
33,069,008 UART: [state] CFI Enabled
33,202,009 UART: [rt] RT listening for mailbox commands...
33,234,342 UART: [rt]cmd =0x44504543, len=136
38,794,122 >>> mbox cmd response data (136 bytes)
38,795,406 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
38,825,293 UART: [rt]cmd =0x4453424c, len=4
42,071,104 >>> mbox cmd response data (8 bytes)
42,071,633 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
42,102,172 UART: [rt]cmd =0x44504543, len=92
47,778,349 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,150 UART:
192,524 UART: Running Caliptra ROM ...
193,663 UART:
193,809 UART: [state] CFI Enabled
262,538 UART: [state] LifecycleState = Unprovisioned
264,524 UART: [state] DebugLocked = No
267,125 UART: [state] WD Timer not started. Device not locked for debugging
271,652 UART: [kat] SHA2-256
451,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,086 UART: [kat] ++
462,569 UART: [kat] sha1
473,371 UART: [kat] SHA2-256
476,033 UART: [kat] SHA2-384
481,244 UART: [kat] SHA2-512-ACC
483,611 UART: [kat] ECC-384
2,948,928 UART: [kat] HMAC-384Kdf
2,971,672 UART: [kat] LMS
3,448,190 UART: [kat] --
3,452,398 UART: [cold-reset] ++
3,453,552 UART: [fht] FHT @ 0x50003400
3,464,451 UART: [idev] ++
3,465,084 UART: [idev] CDI.KEYID = 6
3,465,990 UART: [idev] SUBJECT.KEYID = 7
3,467,228 UART: [idev] UDS.KEYID = 0
3,468,271 ready_for_fw is high
3,468,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,552 UART: [idev] Erasing UDS.KEYID = 0
5,988,250 UART: [idev] Sha1 KeyId Algorithm
6,011,600 UART: [idev] --
6,017,487 UART: [ldev] ++
6,018,062 UART: [ldev] CDI.KEYID = 6
6,018,998 UART: [ldev] SUBJECT.KEYID = 5
6,020,214 UART: [ldev] AUTHORITY.KEYID = 7
6,021,443 UART: [ldev] FE.KEYID = 1
6,058,931 UART: [ldev] Erasing FE.KEYID = 1
8,567,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,297 UART: [ldev] --
10,373,461 UART: [fwproc] Wait for Commands...
10,376,412 UART: [fwproc] Recv command 0x46574c44
10,378,392 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,849 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,863 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,455 >>> mbox cmd response: success
14,341,699 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,344,922 UART: [afmc] ++
14,345,555 UART: [afmc] CDI.KEYID = 6
14,346,470 UART: [afmc] SUBJECT.KEYID = 7
14,347,679 UART: [afmc] AUTHORITY.KEYID = 5
16,873,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,451 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,662 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,462 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,499 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,046 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,149 UART: [afmc] --
18,675,094 UART: [cold-reset] --
18,677,610 UART: [state] Locking Datavault
18,681,247 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,059 UART: [state] Locking ICCM
18,684,141 UART: [exit] Launching FMC @ 0x40000130
18,692,594 UART:
18,692,825 UART: Running Caliptra FMC ...
18,693,921 UART:
18,694,083 UART: [state] CFI Enabled
18,755,657 UART: [fht] FMC Alias Private Key: 7
20,522,679 UART: [art] Extend RT PCRs Done
20,523,899 UART: [art] Lock RT PCRs Done
20,525,413 UART: [art] Populate DV Done
20,530,714 UART: [fht] FMC Alias Private Key: 7
20,532,298 UART: [art] Derive CDI
20,533,110 UART: [art] Store in slot 0x4
20,589,575 UART: [art] Derive Key Pair
20,590,571 UART: [art] Store priv key in slot 0x5
23,053,843 UART: [art] Derive Key Pair - Done
23,066,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,779,537 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,062 UART: [art] PUB.X = CA3B82F25D577AB1D526A31E8C29543242403C461C8FF21C1821488D16106758B588C17A06A76E6E21C917057F062B9D
24,788,264 UART: [art] PUB.Y = 3B59DD264A06AE5DFDA0B8C0C075A09FECE0010FB61BEBA31CAB1D95A94336D47BF5DEC0F693F3D3BA5E77BAFBBEAEB8
24,795,605 UART: [art] SIG.R = 487563F9D285276C65EA82AD48AC315DFB86745FF4A727B5F98231A34ACE109EE640E40432DC68CD16DE2F3962D28BA4
24,802,997 UART: [art] SIG.S = D63936E80CF14A4A2AC0E13E2DAD76730EFB9810E7EE9D793A40DED68D6833D65FAA9CFCD79DCE3703027D31E9582E85
25,782,310 UART: Caliptra RT
25,783,016 UART: [state] CFI Enabled
25,962,469 UART: [rt] RT listening for mailbox commands...
25,994,908 UART: [rt]cmd =0x44504543, len=136
30,219,619 >>> mbox cmd response data (136 bytes)
30,220,981 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,250,979 UART: [rt]cmd =0x4453424c, len=4
32,738,386 >>> mbox cmd response data (8 bytes)
32,738,936 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,769,652 UART: [rt]cmd =0x44504543, len=92
37,124,680 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,055 writing to cptra_bootfsm_go
3,459,677 ready_for_fw is high
3,460,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,604 >>> mbox cmd response: success
14,244,868 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,532,188 UART:
18,532,560 UART: Running Caliptra FMC ...
18,533,754 UART:
18,533,923 UART: [state] CFI Enabled
18,601,328 UART: [fht] FMC Alias Private Key: 7
20,367,924 UART: [art] Extend RT PCRs Done
20,369,151 UART: [art] Lock RT PCRs Done
20,370,427 UART: [art] Populate DV Done
20,375,867 UART: [fht] FMC Alias Private Key: 7
20,377,519 UART: [art] Derive CDI
20,378,330 UART: [art] Store in slot 0x4
20,434,358 UART: [art] Derive Key Pair
20,435,397 UART: [art] Store priv key in slot 0x5
22,897,883 UART: [art] Derive Key Pair - Done
22,910,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,283 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,786 UART: [art] PUB.X = A6C90656FC513C1BBCC9EC7EAFF1A1674F9A55B3BC5D7397E22A36DAD5D46FBA35D24352215ADD3743EB0DE0EC4E4DA0
24,633,112 UART: [art] PUB.Y = 27684096AE7583512A8956C45E938A5EC83E104208759B704E5ABD8F8458B05662E0877EAB8E5BC17B2C5B121DB60B9C
24,640,333 UART: [art] SIG.R = 6C20D76542C8A38EC8509742DEFB259CFB8593D61C60381CE6B8D4608101989132AE549F129101200CA45B9BFD355EBE
24,647,732 UART: [art] SIG.S = 30A0396AD92885722407EC597654D5AE9567A76DC89B98F6B9818E7596F197ABF70309066DBF65CD18F9435C601B015E
25,626,903 UART: Caliptra RT
25,627,602 UART: [state] CFI Enabled
25,809,546 UART: [rt] RT listening for mailbox commands...
25,842,167 UART: [rt]cmd =0x44504543, len=136
30,064,888 >>> mbox cmd response data (136 bytes)
30,066,357 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,096,007 UART: [rt]cmd =0x4453424c, len=4
32,583,991 >>> mbox cmd response data (8 bytes)
32,584,500 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,614,867 UART: [rt]cmd =0x44504543, len=92
36,970,213 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,423 UART:
192,770 UART: Running Caliptra ROM ...
193,892 UART:
603,630 UART: [state] CFI Enabled
616,968 UART: [state] LifecycleState = Unprovisioned
618,921 UART: [state] DebugLocked = No
621,023 UART: [state] WD Timer not started. Device not locked for debugging
625,429 UART: [kat] SHA2-256
805,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,912 UART: [kat] ++
816,362 UART: [kat] sha1
828,088 UART: [kat] SHA2-256
830,837 UART: [kat] SHA2-384
837,755 UART: [kat] SHA2-512-ACC
840,126 UART: [kat] ECC-384
3,282,200 UART: [kat] HMAC-384Kdf
3,294,701 UART: [kat] LMS
3,771,219 UART: [kat] --
3,775,640 UART: [cold-reset] ++
3,777,719 UART: [fht] FHT @ 0x50003400
3,788,977 UART: [idev] ++
3,789,540 UART: [idev] CDI.KEYID = 6
3,790,494 UART: [idev] SUBJECT.KEYID = 7
3,791,739 UART: [idev] UDS.KEYID = 0
3,792,642 ready_for_fw is high
3,792,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,765 UART: [idev] Erasing UDS.KEYID = 0
6,270,137 UART: [idev] Sha1 KeyId Algorithm
6,294,045 UART: [idev] --
6,298,347 UART: [ldev] ++
6,298,983 UART: [ldev] CDI.KEYID = 6
6,299,898 UART: [ldev] SUBJECT.KEYID = 5
6,301,061 UART: [ldev] AUTHORITY.KEYID = 7
6,302,353 UART: [ldev] FE.KEYID = 1
6,313,056 UART: [ldev] Erasing FE.KEYID = 1
8,793,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,945 UART: [ldev] --
10,585,236 UART: [fwproc] Wait for Commands...
10,587,816 UART: [fwproc] Recv command 0x46574c44
10,589,800 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,303 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,391 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,402 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,438 >>> mbox cmd response: success
14,553,638 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,556,918 UART: [afmc] ++
14,557,518 UART: [afmc] CDI.KEYID = 6
14,558,401 UART: [afmc] SUBJECT.KEYID = 7
14,559,679 UART: [afmc] AUTHORITY.KEYID = 5
17,061,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,331 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,946 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,537 UART: [afmc] --
18,865,086 UART: [cold-reset] --
18,869,014 UART: [state] Locking Datavault
18,874,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,565 UART: [state] Locking ICCM
18,878,772 UART: [exit] Launching FMC @ 0x40000130
18,887,221 UART:
18,887,456 UART: Running Caliptra FMC ...
18,888,559 UART:
18,888,718 UART: [state] CFI Enabled
18,896,519 UART: [fht] FMC Alias Private Key: 7
20,663,010 UART: [art] Extend RT PCRs Done
20,664,233 UART: [art] Lock RT PCRs Done
20,665,885 UART: [art] Populate DV Done
20,671,142 UART: [fht] FMC Alias Private Key: 7
20,672,788 UART: [art] Derive CDI
20,673,525 UART: [art] Store in slot 0x4
20,716,193 UART: [art] Derive Key Pair
20,717,234 UART: [art] Store priv key in slot 0x5
23,144,585 UART: [art] Derive Key Pair - Done
23,157,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,691 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,192 UART: [art] PUB.X = 36483F965B2C0F745B56059FC6D288ADB4B012A1E6698A21710F5A38AFE8A82EF405FE0BD728F1489730FEBBBE3305CD
24,872,488 UART: [art] PUB.Y = 992396A14D4C08DF037F864B8066F8EAE364F1E387005D4D1D3747CEDA129081A350FCF65B0EADED84D20AE6B07197EA
24,879,769 UART: [art] SIG.R = D1EDD8B55426EBB6A093D96EE09E73CCD5C7B3A3DFECBBE85D786B53A9FB183C75E9A71A257F00F6F9ADC3F164FC4BF0
24,887,162 UART: [art] SIG.S = 277CFD860E090B483F9CF690BB4ABA70AF87501F309D3519E2AA38EEC620FACAD1419CAC96AEB0D467C1E3F5962771B3
25,866,215 UART: Caliptra RT
25,866,922 UART: [state] CFI Enabled
25,999,649 UART: [rt] RT listening for mailbox commands...
26,032,092 UART: [rt]cmd =0x44504543, len=136
30,202,227 >>> mbox cmd response data (136 bytes)
30,203,524 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,233,622 UART: [rt]cmd =0x4453424c, len=4
32,664,924 >>> mbox cmd response data (8 bytes)
32,665,445 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,695,884 UART: [rt]cmd =0x44504543, len=92
36,982,230 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,781,788 ready_for_fw is high
3,782,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,158 >>> mbox cmd response: success
14,458,333 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,707,216 UART:
18,707,600 UART: Running Caliptra FMC ...
18,708,724 UART:
18,708,877 UART: [state] CFI Enabled
18,717,479 UART: [fht] FMC Alias Private Key: 7
20,483,508 UART: [art] Extend RT PCRs Done
20,484,731 UART: [art] Lock RT PCRs Done
20,486,354 UART: [art] Populate DV Done
20,491,721 UART: [fht] FMC Alias Private Key: 7
20,493,210 UART: [art] Derive CDI
20,493,974 UART: [art] Store in slot 0x4
20,536,736 UART: [art] Derive Key Pair
20,537,781 UART: [art] Store priv key in slot 0x5
22,963,538 UART: [art] Derive Key Pair - Done
22,976,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,848 UART: [art] PUB.X = 71DBA369A567A4ED6E07D93F5E668806035B2140E488FA282FA4CF2507479B99864F9A7EDB0F9D5215D6F56215F506E1
24,691,098 UART: [art] PUB.Y = 1A52C6C8EDEE63F874256FE01EA5006B1E10BF3303FA327910200D6D41ADE2BD09E25D5B5C4F583904D7B961A8938239
24,698,338 UART: [art] SIG.R = CFC6B5F8426970F177273E333DB06FC723AAA261A096EA31C085EBCC2C9461A2AD412E5BC9EBB4401FC275C5C5E6C260
24,705,746 UART: [art] SIG.S = 991491CCB79889A2CD584970928969C14EAE270AEE5972AF3F87BAA8B0E764890C388E2604010E4267C53972E736152B
25,684,615 UART: Caliptra RT
25,685,314 UART: [state] CFI Enabled
25,817,376 UART: [rt] RT listening for mailbox commands...
25,850,082 UART: [rt]cmd =0x44504543, len=136
30,020,025 >>> mbox cmd response data (136 bytes)
30,021,293 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,051,301 UART: [rt]cmd =0x4453424c, len=4
32,482,368 >>> mbox cmd response data (8 bytes)
32,482,926 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
32,513,436 UART: [rt]cmd =0x44504543, len=92
36,800,455 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,855 writing to cptra_bootfsm_go
191,981 UART:
192,354 UART: Running Caliptra ROM ...
193,441 UART:
193,584 UART: [state] CFI Enabled
264,446 UART: [state] LifecycleState = Unprovisioned
266,834 UART: [state] DebugLocked = No
269,278 UART: [state] WD Timer not started. Device not locked for debugging
274,447 UART: [kat] SHA2-256
464,282 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,088 UART: [kat] ++
475,539 UART: [kat] sha1
486,477 UART: [kat] SHA2-256
489,528 UART: [kat] SHA2-384
496,092 UART: [kat] SHA2-512-ACC
498,673 UART: [kat] ECC-384
2,947,600 UART: [kat] HMAC-384Kdf
2,971,602 UART: [kat] LMS
3,503,361 UART: [kat] --
3,507,456 UART: [cold-reset] ++
3,508,398 UART: [fht] FHT @ 0x50003400
3,518,805 UART: [idev] ++
3,519,506 UART: [idev] CDI.KEYID = 6
3,520,413 UART: [idev] SUBJECT.KEYID = 7
3,521,652 UART: [idev] UDS.KEYID = 0
3,522,577 ready_for_fw is high
3,522,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,993 UART: [idev] Erasing UDS.KEYID = 0
6,028,955 UART: [idev] Sha1 KeyId Algorithm
6,051,650 UART: [idev] --
6,055,916 UART: [ldev] ++
6,056,595 UART: [ldev] CDI.KEYID = 6
6,057,504 UART: [ldev] SUBJECT.KEYID = 5
6,058,680 UART: [ldev] AUTHORITY.KEYID = 7
6,059,915 UART: [ldev] FE.KEYID = 1
6,100,213 UART: [ldev] Erasing FE.KEYID = 1
8,605,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,350 UART: [ldev] --
10,414,967 UART: [fwproc] Wait for Commands...
10,418,137 UART: [fwproc] Recv command 0x46574c44
10,420,441 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,644 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,016 >>> mbox cmd response: success
14,683,219 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,686,273 UART: [afmc] ++
14,686,963 UART: [afmc] CDI.KEYID = 6
14,688,203 UART: [afmc] SUBJECT.KEYID = 7
14,689,693 UART: [afmc] AUTHORITY.KEYID = 5
17,233,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,781 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,938 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,837 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,267 UART: [afmc] --
19,031,939 UART: [cold-reset] --
19,034,776 UART: [state] Locking Datavault
19,039,967 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,151 UART: [state] Locking ICCM
19,044,588 UART: [exit] Launching FMC @ 0x40000130
19,053,254 UART:
19,053,494 UART: Running Caliptra FMC ...
19,054,600 UART:
19,054,759 UART: [state] CFI Enabled
19,114,750 UART: [fht] FMC Alias Private Key: 7
20,880,896 UART: [art] Extend RT PCRs Done
20,882,117 UART: [art] Lock RT PCRs Done
20,884,010 UART: [art] Populate DV Done
20,889,581 UART: [fht] FMC Alias Private Key: 7
20,891,114 UART: [art] Derive CDI
20,891,922 UART: [art] Store in slot 0x4
20,947,801 UART: [art] Derive Key Pair
20,948,842 UART: [art] Store priv key in slot 0x5
23,411,818 UART: [art] Derive Key Pair - Done
23,424,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,724 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,226 UART: [art] PUB.X = C2D014946FAD55769B89E9B0A8D2E6776F2B86FA2742661CB4064389050D60C4C7882B129D91F7CF8523717647CB5ED9
25,146,492 UART: [art] PUB.Y = 155AA981CB7936779074CA8C96BDC1508E0B6250F68AE2010005E7BE85F42059149830CB597E125136592710013ACE30
25,153,685 UART: [art] SIG.R = 12E5B4C54164427633A53CE3D934A9B459FBCB82EFD651B180E22DDA844102C3293408EFB40C4F8477A62F10E5F74E08
25,161,076 UART: [art] SIG.S = 73E7EC698FC2D8662310AA57E75C89E88AA49578AEDE2124BB5E331780C534649C12CE916E3046FA0011FE92DF560FC6
26,139,718 UART: Caliptra RT
26,140,423 UART: [state] CFI Enabled
26,321,051 UART: [rt] RT listening for mailbox commands...
26,353,596 UART: [rt]cmd =0x44504543, len=136
30,576,841 >>> mbox cmd response data (136 bytes)
30,578,144 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,608,195 UART: [rt]cmd =0x4453424c, len=4
33,094,928 >>> mbox cmd response data (8 bytes)
33,095,462 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,125,941 UART: [rt]cmd =0x44504543, len=92
37,479,718 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
3,439,813 ready_for_fw is high
3,440,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,673 >>> mbox cmd response: success
14,831,945 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,108,061 UART:
19,108,449 UART: Running Caliptra FMC ...
19,109,559 UART:
19,109,719 UART: [state] CFI Enabled
19,180,106 UART: [fht] FMC Alias Private Key: 7
20,946,255 UART: [art] Extend RT PCRs Done
20,947,474 UART: [art] Lock RT PCRs Done
20,948,827 UART: [art] Populate DV Done
20,954,478 UART: [fht] FMC Alias Private Key: 7
20,956,072 UART: [art] Derive CDI
20,956,895 UART: [art] Store in slot 0x4
21,012,951 UART: [art] Derive Key Pair
21,014,001 UART: [art] Store priv key in slot 0x5
23,476,990 UART: [art] Derive Key Pair - Done
23,489,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,090 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,604 UART: [art] PUB.X = 62002E99744C1B45F3D05A3655945F056E7E0FEAF83A64A945FFB335D0D084A7EFEFC9E83543F4CEF545F9B4DA43F3AA
25,211,853 UART: [art] PUB.Y = 36FC1C1AB012270CF00EA2C18269101AA1907FC11FA7C3063611AF663CF4DE1B6C6CDE9484D0567A326536EE959EC520
25,219,088 UART: [art] SIG.R = 272BDF192A4759B185FB0DD88BD1F43C30077AEB4CBC5DD3DD0328FCB0CE0E77D82DA3784ACC727BF744A13607807E97
25,226,519 UART: [art] SIG.S = DF9D9C1D60C6F55CDB839F36C904E85ADF99D0A763C887B53855B04DABB9641BEEAD359799FAC0D1BE88EC7A8B7AF03C
26,205,390 UART: Caliptra RT
26,206,095 UART: [state] CFI Enabled
26,387,281 UART: [rt] RT listening for mailbox commands...
26,419,503 UART: [rt]cmd =0x44504543, len=136
30,643,095 >>> mbox cmd response data (136 bytes)
30,644,384 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,674,271 UART: [rt]cmd =0x4453424c, len=4
33,162,696 >>> mbox cmd response data (8 bytes)
33,163,206 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,193,583 UART: [rt]cmd =0x44504543, len=92
37,548,554 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,373 UART:
192,734 UART: Running Caliptra ROM ...
193,840 UART:
603,362 UART: [state] CFI Enabled
616,352 UART: [state] LifecycleState = Unprovisioned
618,740 UART: [state] DebugLocked = No
620,487 UART: [state] WD Timer not started. Device not locked for debugging
624,480 UART: [kat] SHA2-256
814,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,167 UART: [kat] ++
825,773 UART: [kat] sha1
836,799 UART: [kat] SHA2-256
839,817 UART: [kat] SHA2-384
845,317 UART: [kat] SHA2-512-ACC
847,925 UART: [kat] ECC-384
3,290,268 UART: [kat] HMAC-384Kdf
3,302,930 UART: [kat] LMS
3,834,737 UART: [kat] --
3,839,944 UART: [cold-reset] ++
3,842,445 UART: [fht] FHT @ 0x50003400
3,852,783 UART: [idev] ++
3,853,503 UART: [idev] CDI.KEYID = 6
3,854,430 UART: [idev] SUBJECT.KEYID = 7
3,855,608 UART: [idev] UDS.KEYID = 0
3,856,540 ready_for_fw is high
3,856,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,602 UART: [idev] Erasing UDS.KEYID = 0
6,330,876 UART: [idev] Sha1 KeyId Algorithm
6,353,522 UART: [idev] --
6,357,414 UART: [ldev] ++
6,358,121 UART: [ldev] CDI.KEYID = 6
6,359,037 UART: [ldev] SUBJECT.KEYID = 5
6,360,205 UART: [ldev] AUTHORITY.KEYID = 7
6,361,384 UART: [ldev] FE.KEYID = 1
6,373,010 UART: [ldev] Erasing FE.KEYID = 1
8,853,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,930 UART: [ldev] --
10,643,345 UART: [fwproc] Wait for Commands...
10,644,854 UART: [fwproc] Recv command 0x46574c44
10,647,167 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,560 >>> mbox cmd response: success
14,909,630 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,913,353 UART: [afmc] ++
14,914,059 UART: [afmc] CDI.KEYID = 6
14,915,314 UART: [afmc] SUBJECT.KEYID = 7
14,916,755 UART: [afmc] AUTHORITY.KEYID = 5
17,415,468 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,764 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,674 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,206,281 UART: [afmc] --
19,210,661 UART: [cold-reset] --
19,215,231 UART: [state] Locking Datavault
19,221,105 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,254 UART: [state] Locking ICCM
19,225,981 UART: [exit] Launching FMC @ 0x40000130
19,234,612 UART:
19,234,851 UART: Running Caliptra FMC ...
19,235,879 UART:
19,236,027 UART: [state] CFI Enabled
19,243,813 UART: [fht] FMC Alias Private Key: 7
21,010,679 UART: [art] Extend RT PCRs Done
21,011,947 UART: [art] Lock RT PCRs Done
21,013,336 UART: [art] Populate DV Done
21,018,755 UART: [fht] FMC Alias Private Key: 7
21,020,407 UART: [art] Derive CDI
21,021,226 UART: [art] Store in slot 0x4
21,064,043 UART: [art] Derive Key Pair
21,065,090 UART: [art] Store priv key in slot 0x5
23,492,052 UART: [art] Derive Key Pair - Done
23,504,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,916 UART: [art] PUB.X = 57A28F0C30B1A36EDE7F4F5B7C78C29D182330250ACFA99864299D773E33B62207779B5351CB463C1DE08B3A95C4537D
25,220,173 UART: [art] PUB.Y = B2A113A9C7CE00EC0E053ED70E4A1258F4B1C3AFB9901FF74E3273C8AAC8DDEF163204DAF704A6A52DB2CC4601753DC3
25,227,385 UART: [art] SIG.R = A1DD6F60C233A87A8A28E73BFCAA8F6A3C0D9F4363401156D3338B64E611DFDB87464178CCB74FC6B7FCCF779F0350A7
25,234,803 UART: [art] SIG.S = 9AC3046744D7081EF26B6C7522D3BB9D6AF191A6F0BDD4CBEBDB8444CA8E1FB3A0CCA3249B4D84263B35F1538FB38DEC
26,214,414 UART: Caliptra RT
26,215,126 UART: [state] CFI Enabled
26,347,333 UART: [rt] RT listening for mailbox commands...
26,379,781 UART: [rt]cmd =0x44504543, len=136
30,549,867 >>> mbox cmd response data (136 bytes)
30,551,187 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,580,978 UART: [rt]cmd =0x4453424c, len=4
33,011,802 >>> mbox cmd response data (8 bytes)
33,012,351 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,042,809 UART: [rt]cmd =0x44504543, len=92
37,328,349 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,751,811 ready_for_fw is high
3,752,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,432 >>> mbox cmd response: success
15,055,569 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,306,093 UART:
19,306,480 UART: Running Caliptra FMC ...
19,307,617 UART:
19,307,779 UART: [state] CFI Enabled
19,315,781 UART: [fht] FMC Alias Private Key: 7
21,081,578 UART: [art] Extend RT PCRs Done
21,082,801 UART: [art] Lock RT PCRs Done
21,084,435 UART: [art] Populate DV Done
21,090,192 UART: [fht] FMC Alias Private Key: 7
21,091,734 UART: [art] Derive CDI
21,092,500 UART: [art] Store in slot 0x4
21,135,265 UART: [art] Derive Key Pair
21,136,306 UART: [art] Store priv key in slot 0x5
23,562,927 UART: [art] Derive Key Pair - Done
23,576,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,723 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,231 UART: [art] PUB.X = ACD2FDCA9190F4FE0ED56098FE36A5431125CDC6AA1E1550064C1906AE40513552889FE0A00D8DC78B1DD0FB784464CF
25,291,500 UART: [art] PUB.Y = 8E46DAFAF933008C66BB9A352C7B3F4E05A8680C187C576EFD26B673DF86FE07A511C297B853E4CB0263A4F9815C3AA0
25,298,736 UART: [art] SIG.R = 63097637D9F927C76B65172A842C21A0BD7B781166A0570FD9D0539D5114D2F1547705DBF17FE42E0E1DE5E28E58E8D6
25,306,107 UART: [art] SIG.S = 8A19F3C4934F06FC13696FB1039B5F5344BBDEF32C8517DB525A03EDBCAF8EA7606CEE677DDF2482B7D75238705ED1B9
26,285,135 UART: Caliptra RT
26,285,817 UART: [state] CFI Enabled
26,417,897 UART: [rt] RT listening for mailbox commands...
26,450,337 UART: [rt]cmd =0x44504543, len=136
30,620,397 >>> mbox cmd response data (136 bytes)
30,621,687 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
30,651,405 UART: [rt]cmd =0x4453424c, len=4
33,082,798 >>> mbox cmd response data (8 bytes)
33,083,325 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,113,973 UART: [rt]cmd =0x44504543, len=92
37,399,435 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,401 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,037 UART: [kat] SHA2-256
881,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,083 UART: [kat] ++
886,235 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,572 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,407 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,736 UART: [idev] ++
1,479,904 UART: [idev] CDI.KEYID = 6
1,480,264 UART: [idev] SUBJECT.KEYID = 7
1,480,688 UART: [idev] UDS.KEYID = 0
1,481,033 ready_for_fw is high
1,481,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,710 UART: [idev] Erasing UDS.KEYID = 0
1,505,066 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,672 UART: [idev] --
1,514,769 UART: [ldev] ++
1,514,937 UART: [ldev] CDI.KEYID = 6
1,515,300 UART: [ldev] SUBJECT.KEYID = 5
1,515,726 UART: [ldev] AUTHORITY.KEYID = 7
1,516,189 UART: [ldev] FE.KEYID = 1
1,521,605 UART: [ldev] Erasing FE.KEYID = 1
1,546,790 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,808 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,594 UART: [ldev] --
1,585,971 UART: [fwproc] Waiting for Commands...
1,586,810 UART: [fwproc] Received command 0x46574c44
1,587,601 UART: [fwproc] Received Image of size 118548 bytes
2,933,295 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,124 >>> mbox cmd response: success
3,132,124 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,133,154 UART: [afmc] ++
3,133,322 UART: [afmc] CDI.KEYID = 6
3,133,684 UART: [afmc] SUBJECT.KEYID = 7
3,134,109 UART: [afmc] AUTHORITY.KEYID = 5
3,169,382 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,096 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,805 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,688 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,371 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,315 UART: [afmc] --
3,212,213 UART: [cold-reset] --
3,213,265 UART: [state] Locking Datavault
3,214,264 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,868 UART: [state] Locking ICCM
3,215,426 UART: [exit] Launching FMC @ 0x40000130
3,220,756 UART:
3,220,772 UART: Running Caliptra FMC ...
3,221,180 UART:
3,221,234 UART: [state] CFI Enabled
3,231,772 UART: [fht] FMC Alias Private Key: 7
3,350,222 UART: [art] Extend RT PCRs Done
3,350,650 UART: [art] Lock RT PCRs Done
3,352,290 UART: [art] Populate DV Done
3,360,483 UART: [fht] FMC Alias Private Key: 7
3,361,417 UART: [art] Derive CDI
3,361,697 UART: [art] Store in slot 0x4
3,447,357 UART: [art] Derive Key Pair
3,447,717 UART: [art] Store priv key in slot 0x5
3,461,280 UART: [art] Derive Key Pair - Done
3,476,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,896 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,661 UART: [art] PUB.X = EDC39C7E05BB94C413217D0D0DD71E77C483B08EC102BD0BA3A5FE53132E394B445FD6C35308B68E8984DD6C3F120175
3,499,418 UART: [art] PUB.Y = 020CFCBF70FABB8006C028E992F510FFC96F9C6DACC2F06989D2A31CE27C479E58769DE87AD6B1CFA7A9D4C9BD56E542
3,506,381 UART: [art] SIG.R = 1D3AE35E3725F41A5440BE31162CE4416F622C9FCB356CE7F6AC838550F7AA05384656FF30426DDD8EDD38323B50F0D3
3,513,154 UART: [art] SIG.S = 7556D543AA11C4D89D6F782A08CAAA5653A43116C611365BCD6BC653C9E1FE69B701EFF424B9F75B7D9DA4333AA359DB
3,536,272 UART: Caliptra RT
3,536,523 UART: [state] CFI Enabled
3,655,958 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,226 UART: [rt]cmd =0x44504543, len=136
3,750,450 >>> mbox cmd response data (136 bytes)
3,750,451 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,588 UART: [rt]cmd =0x4453424c, len=4
3,796,726 >>> mbox cmd response data (8 bytes)
3,796,727 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,692 UART: [rt]cmd =0x44504543, len=92
4,010,445 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 ready_for_fw is high
1,362,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,826 >>> mbox cmd response: success
2,978,826 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,039,819 UART:
3,039,835 UART: Running Caliptra FMC ...
3,040,243 UART:
3,040,297 UART: [state] CFI Enabled
3,050,665 UART: [fht] FMC Alias Private Key: 7
3,169,445 UART: [art] Extend RT PCRs Done
3,169,873 UART: [art] Lock RT PCRs Done
3,171,449 UART: [art] Populate DV Done
3,179,682 UART: [fht] FMC Alias Private Key: 7
3,180,644 UART: [art] Derive CDI
3,180,924 UART: [art] Store in slot 0x4
3,266,688 UART: [art] Derive Key Pair
3,267,048 UART: [art] Store priv key in slot 0x5
3,280,197 UART: [art] Derive Key Pair - Done
3,295,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,522 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,287 UART: [art] PUB.X = 8B0DD1296189307997AFDC4E3B579DDA857ACD9DD149EEC119AB4E7C660C46DF4C35893F08A12B177A63E73932D54055
3,318,054 UART: [art] PUB.Y = 57E2F3B430FFCD7C8F04E0D28C42C19EDB9ADBBE22721F427445646EBA6B74BEAE6B3A985CC9842C357EDC2DCA1FE248
3,325,025 UART: [art] SIG.R = 4BD2C85E5FB09FE5960918B85E623CEB1414FF987BD22BFC4E159B680B8EAC7B1C13DAF4DC7085B147FAB52EB30F8E70
3,331,806 UART: [art] SIG.S = 9E7B24F5D873DD549A0D4002D42555C7B35A2428B8CC6DC0139B4BC09A3189084B1BBCFA75703844AA167513DEA1C6ED
3,355,849 UART: Caliptra RT
3,356,100 UART: [state] CFI Enabled
3,475,622 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,914 UART: [rt]cmd =0x44504543, len=136
3,570,484 >>> mbox cmd response data (136 bytes)
3,570,485 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,599,726 UART: [rt]cmd =0x4453424c, len=4
3,617,010 >>> mbox cmd response data (8 bytes)
3,617,011 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,820 UART: [rt]cmd =0x44504543, len=92
3,832,411 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,962 UART: [kat] SHA2-256
881,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,008 UART: [kat] ++
886,160 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,165 UART: [kat] SHA2-512-ACC
897,066 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,335 UART: [kat] LMS
1,475,531 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,710 UART: [fht] Storing FHT @ 0x50003400
1,479,429 UART: [idev] ++
1,479,597 UART: [idev] CDI.KEYID = 6
1,479,957 UART: [idev] SUBJECT.KEYID = 7
1,480,381 UART: [idev] UDS.KEYID = 0
1,480,726 ready_for_fw is high
1,480,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,707 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,989 UART: [idev] --
1,515,054 UART: [ldev] ++
1,515,222 UART: [ldev] CDI.KEYID = 6
1,515,585 UART: [ldev] SUBJECT.KEYID = 5
1,516,011 UART: [ldev] AUTHORITY.KEYID = 7
1,516,474 UART: [ldev] FE.KEYID = 1
1,521,624 UART: [ldev] Erasing FE.KEYID = 1
1,547,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,550 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,441 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,225 UART: [ldev] --
1,586,682 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 118548 bytes
2,931,668 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,808 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,026 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,245 >>> mbox cmd response: success
3,130,245 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,131,399 UART: [afmc] ++
3,131,567 UART: [afmc] CDI.KEYID = 6
3,131,929 UART: [afmc] SUBJECT.KEYID = 7
3,132,354 UART: [afmc] AUTHORITY.KEYID = 5
3,168,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,411 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,191 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,900 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,783 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,466 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,308 UART: [afmc] --
3,211,290 UART: [cold-reset] --
3,212,328 UART: [state] Locking Datavault
3,213,431 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,035 UART: [state] Locking ICCM
3,214,531 UART: [exit] Launching FMC @ 0x40000130
3,219,861 UART:
3,219,877 UART: Running Caliptra FMC ...
3,220,285 UART:
3,220,428 UART: [state] CFI Enabled
3,231,214 UART: [fht] FMC Alias Private Key: 7
3,349,520 UART: [art] Extend RT PCRs Done
3,349,948 UART: [art] Lock RT PCRs Done
3,351,718 UART: [art] Populate DV Done
3,359,943 UART: [fht] FMC Alias Private Key: 7
3,361,035 UART: [art] Derive CDI
3,361,315 UART: [art] Store in slot 0x4
3,446,851 UART: [art] Derive Key Pair
3,447,211 UART: [art] Store priv key in slot 0x5
3,460,610 UART: [art] Derive Key Pair - Done
3,475,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,125 UART: [art] PUB.X = BC540DD0E5134C2B73CA183E13A17C1F7BCD344334D40D833F97190033836B007C1B67C9058F31E2FD21649365398E65
3,497,836 UART: [art] PUB.Y = 6BA89AC44B7D28F07784DB8EAF86402E250C15DB1F0AA0BB40F2C11DE8F7990F6211890A3E71EB804C69BC5ED49CA4AE
3,504,792 UART: [art] SIG.R = 7D7FCB7DD173C47A536196AF3AA7031052F7EC72C00C63DF600CC9FDEDF202EC9AC772ABE008621BB214095AF7A35B35
3,511,560 UART: [art] SIG.S = D3794DD0D7A6D82D0E380B2179E557ED0501300A274D6961A5BB57F0FDF150F0CB8D336FAC6B8B13216751939584DEE4
3,535,579 UART: Caliptra RT
3,535,922 UART: [state] CFI Enabled
3,656,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,188 UART: [rt]cmd =0x44504543, len=136
3,752,126 >>> mbox cmd response data (136 bytes)
3,752,127 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,572 UART: [rt]cmd =0x4453424c, len=4
3,799,216 >>> mbox cmd response data (8 bytes)
3,799,217 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,829,038 UART: [rt]cmd =0x44504543, len=92
4,013,890 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,338 ready_for_fw is high
1,362,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,681 >>> mbox cmd response: success
2,981,681 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,043,298 UART:
3,043,314 UART: Running Caliptra FMC ...
3,043,722 UART:
3,043,865 UART: [state] CFI Enabled
3,054,523 UART: [fht] FMC Alias Private Key: 7
3,173,385 UART: [art] Extend RT PCRs Done
3,173,813 UART: [art] Lock RT PCRs Done
3,175,523 UART: [art] Populate DV Done
3,183,780 UART: [fht] FMC Alias Private Key: 7
3,184,774 UART: [art] Derive CDI
3,185,054 UART: [art] Store in slot 0x4
3,271,084 UART: [art] Derive Key Pair
3,271,444 UART: [art] Store priv key in slot 0x5
3,284,249 UART: [art] Derive Key Pair - Done
3,299,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,191 UART: [art] PUB.X = 858E42DF506D6683EE7BEAD4FE9EF071416287D49A82860EEFDAB87AC183A06D14EC82AF1A71B5D8CA65A14D63CB9430
3,321,974 UART: [art] PUB.Y = ECE060367F3A593EA88D64C0C3E263B076F4A3FFD9EEFA291087C12AA080F0E6512A56B98C58011A75AF8986C798980F
3,328,924 UART: [art] SIG.R = 573B3CEC7ED2977FFF14759A05EF3ACBB6B1F7E57AA57122C1E65CE6C8237B3B670F14505609DCB541D50517BB83CFFC
3,335,698 UART: [art] SIG.S = F52E4E7EE38D518983C6B7931EC4D9BE1B7A1F04F79716D33D4B05116AA0EDC7329D713104C6EEAA2FB165CE4320702E
3,359,447 UART: Caliptra RT
3,359,790 UART: [state] CFI Enabled
3,479,508 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,796 UART: [rt]cmd =0x44504543, len=136
3,574,254 >>> mbox cmd response data (136 bytes)
3,574,255 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,494 UART: [rt]cmd =0x4453424c, len=4
3,620,314 >>> mbox cmd response data (8 bytes)
3,620,315 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,098 UART: [rt]cmd =0x44504543, len=92
3,834,687 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
891,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,182 UART: [kat] ++
895,334 UART: [kat] sha1
899,702 UART: [kat] SHA2-256
901,642 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
915,457 UART: [kat] HMAC-384Kdf
920,063 UART: [kat] LMS
1,168,375 UART: [kat] --
1,169,110 UART: [cold-reset] ++
1,169,586 UART: [fht] FHT @ 0x50003400
1,172,018 UART: [idev] ++
1,172,186 UART: [idev] CDI.KEYID = 6
1,172,547 UART: [idev] SUBJECT.KEYID = 7
1,172,972 UART: [idev] UDS.KEYID = 0
1,173,318 ready_for_fw is high
1,173,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,383 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,209,016 UART: [ldev] ++
1,209,184 UART: [ldev] CDI.KEYID = 6
1,209,548 UART: [ldev] SUBJECT.KEYID = 5
1,209,975 UART: [ldev] AUTHORITY.KEYID = 7
1,210,438 UART: [ldev] FE.KEYID = 1
1,215,546 UART: [ldev] Erasing FE.KEYID = 1
1,242,235 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,164 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,220 UART: [fwproc] Recv command 0x46574c44
1,282,953 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,761 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,936 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,283 >>> mbox cmd response: success
2,825,283 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,826,305 UART: [afmc] ++
2,826,473 UART: [afmc] CDI.KEYID = 6
2,826,836 UART: [afmc] SUBJECT.KEYID = 7
2,827,262 UART: [afmc] AUTHORITY.KEYID = 5
2,863,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,950 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,290 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,991 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,640 UART: [afmc] --
2,906,467 UART: [cold-reset] --
2,907,123 UART: [state] Locking Datavault
2,908,274 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,878 UART: [state] Locking ICCM
2,909,320 UART: [exit] Launching FMC @ 0x40000130
2,914,650 UART:
2,914,666 UART: Running Caliptra FMC ...
2,915,074 UART:
2,915,128 UART: [state] CFI Enabled
2,925,564 UART: [fht] FMC Alias Private Key: 7
3,044,900 UART: [art] Extend RT PCRs Done
3,045,328 UART: [art] Lock RT PCRs Done
3,046,954 UART: [art] Populate DV Done
3,055,109 UART: [fht] FMC Alias Private Key: 7
3,056,249 UART: [art] Derive CDI
3,056,529 UART: [art] Store in slot 0x4
3,142,444 UART: [art] Derive Key Pair
3,142,804 UART: [art] Store priv key in slot 0x5
3,156,468 UART: [art] Derive Key Pair - Done
3,170,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,249 UART: [art] PUB.X = F4B8B5CE567910B35E7AE254DBF5A98C4596B562CE0E5CF48004196CFB415D07CE370719B031E7DDA8881D4BE0D19826
3,194,015 UART: [art] PUB.Y = EE896ED06B4BFA3BFEB6A1C70B9769BAF4588C5958B9C1DD34A38D60860B384D04867FFFFB6BB503F98B13A0C012B29B
3,200,971 UART: [art] SIG.R = 5166754A71D6A8D59904E98F9FFC3F43F3BEC22C5DF92C748A540876E6ACB4247F8A5F89AE4E577B033624C19BA6FFB2
3,207,742 UART: [art] SIG.S = 48466177EE85995E1E7C8D47D9B4943E721181FCC9C30DE86C9F9DACDF44B7C291923011069CD6A185BFE6DEE1F1B8A6
3,231,182 UART: Caliptra RT
3,231,433 UART: [state] CFI Enabled
3,349,421 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,595 UART: [rt]cmd =0x44504543, len=136
3,444,127 >>> mbox cmd response data (136 bytes)
3,444,128 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,303 UART: [rt]cmd =0x4453424c, len=4
3,491,051 >>> mbox cmd response data (8 bytes)
3,491,052 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,845 UART: [rt]cmd =0x44504543, len=92
3,705,933 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,974 ready_for_fw is high
1,058,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,096 >>> mbox cmd response: success
2,678,096 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,739,609 UART:
2,739,625 UART: Running Caliptra FMC ...
2,740,033 UART:
2,740,087 UART: [state] CFI Enabled
2,750,489 UART: [fht] FMC Alias Private Key: 7
2,869,927 UART: [art] Extend RT PCRs Done
2,870,355 UART: [art] Lock RT PCRs Done
2,871,799 UART: [art] Populate DV Done
2,879,836 UART: [fht] FMC Alias Private Key: 7
2,880,930 UART: [art] Derive CDI
2,881,210 UART: [art] Store in slot 0x4
2,966,851 UART: [art] Derive Key Pair
2,967,211 UART: [art] Store priv key in slot 0x5
2,980,181 UART: [art] Derive Key Pair - Done
2,995,111 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,261 UART: [art] PUB.X = FE6F8A6C84684FF0288249243BED450DC391E05B83BBB2CFEF667CBFAB9D6C88A9909AFAD521B523509DAA5C47033148
3,018,039 UART: [art] PUB.Y = CADDA0536B23E1D8F7D4AFE57B0AEB211EBF81E83B43182E57583F5A5D5E358C5B225DAA627F79B52D8AEBE9BFEA2422
3,025,010 UART: [art] SIG.R = 9BADB747BA2470EC229920EF9884D811C41F9D46E333160FDCCBE5AF1A99BD4841C0D216E08ACA592146534FC5F24A05
3,031,784 UART: [art] SIG.S = 99D936D437EB395F65B310606B4F926EB83DD8EFC8AA49A4403AF68D2204DB2A6D6D403AFBFF4596FE0738136732C4AE
3,055,722 UART: Caliptra RT
3,055,973 UART: [state] CFI Enabled
3,175,673 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,107 UART: [rt]cmd =0x44504543, len=136
3,270,351 >>> mbox cmd response data (136 bytes)
3,270,352 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,709 UART: [rt]cmd =0x4453424c, len=4
3,317,441 >>> mbox cmd response data (8 bytes)
3,317,442 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,347,169 UART: [rt]cmd =0x44504543, len=92
3,531,272 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,899 UART: [kat] SHA2-256
891,449 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,553 UART: [kat] ++
895,705 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
921,160 UART: [kat] LMS
1,169,472 UART: [kat] --
1,170,455 UART: [cold-reset] ++
1,170,839 UART: [fht] FHT @ 0x50003400
1,173,651 UART: [idev] ++
1,173,819 UART: [idev] CDI.KEYID = 6
1,174,180 UART: [idev] SUBJECT.KEYID = 7
1,174,605 UART: [idev] UDS.KEYID = 0
1,174,951 ready_for_fw is high
1,174,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,242 UART: [idev] Sha1 KeyId Algorithm
1,208,052 UART: [idev] --
1,208,973 UART: [ldev] ++
1,209,141 UART: [ldev] CDI.KEYID = 6
1,209,505 UART: [ldev] SUBJECT.KEYID = 5
1,209,932 UART: [ldev] AUTHORITY.KEYID = 7
1,210,395 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,241,850 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,695 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,719 UART: [ldev] --
1,280,936 UART: [fwproc] Wait for Commands...
1,281,657 UART: [fwproc] Recv command 0x46574c44
1,282,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,936 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,111 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,330 >>> mbox cmd response: success
2,826,330 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,418 UART: [afmc] ++
2,827,586 UART: [afmc] CDI.KEYID = 6
2,827,949 UART: [afmc] SUBJECT.KEYID = 7
2,828,375 UART: [afmc] AUTHORITY.KEYID = 5
2,864,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,565 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,239 UART: [afmc] --
2,907,278 UART: [cold-reset] --
2,908,036 UART: [state] Locking Datavault
2,909,293 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,897 UART: [state] Locking ICCM
2,910,373 UART: [exit] Launching FMC @ 0x40000130
2,915,703 UART:
2,915,719 UART: Running Caliptra FMC ...
2,916,127 UART:
2,916,270 UART: [state] CFI Enabled
2,927,062 UART: [fht] FMC Alias Private Key: 7
3,046,130 UART: [art] Extend RT PCRs Done
3,046,558 UART: [art] Lock RT PCRs Done
3,047,902 UART: [art] Populate DV Done
3,056,277 UART: [fht] FMC Alias Private Key: 7
3,057,451 UART: [art] Derive CDI
3,057,731 UART: [art] Store in slot 0x4
3,143,838 UART: [art] Derive Key Pair
3,144,198 UART: [art] Store priv key in slot 0x5
3,157,032 UART: [art] Derive Key Pair - Done
3,172,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,634 UART: [art] PUB.X = E9EC6ECC36D9B7F6A1054B5DFD9C9B2BE1A238794E6B83A6724CE91697F6429CE7A691E2C8BF63953839168A9B40DE7A
3,195,413 UART: [art] PUB.Y = 38387E8F6350ACF2B4CDFE1A7AC7524B6DF0E936E9DD7BDD5D9C3031DB3E968C7B12AF29995F891FEBAC7691810AAF7E
3,202,382 UART: [art] SIG.R = E2C9D8BE6EA778EDA87006427629C05EB1039B6D7504CAE82DA0FADE033B6EC49A8A9A4428E92B73D9CC85203447C34E
3,209,152 UART: [art] SIG.S = A911BF6A145AE2521FACB94595D47DCD0C48EE11F8DC4AD37F1266AFA0628110C4A7B96B7C96FD8217E60B220BB74D9C
3,233,071 UART: Caliptra RT
3,233,414 UART: [state] CFI Enabled
3,353,732 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,968 UART: [rt]cmd =0x44504543, len=136
3,449,262 >>> mbox cmd response data (136 bytes)
3,449,263 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,440 UART: [rt]cmd =0x4453424c, len=4
3,495,970 >>> mbox cmd response data (8 bytes)
3,495,971 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,954 UART: [rt]cmd =0x44504543, len=92
3,710,063 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,859 ready_for_fw is high
1,059,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,459 >>> mbox cmd response: success
2,679,459 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,740,740 UART:
2,740,756 UART: Running Caliptra FMC ...
2,741,164 UART:
2,741,307 UART: [state] CFI Enabled
2,752,017 UART: [fht] FMC Alias Private Key: 7
2,871,557 UART: [art] Extend RT PCRs Done
2,871,985 UART: [art] Lock RT PCRs Done
2,873,399 UART: [art] Populate DV Done
2,881,516 UART: [fht] FMC Alias Private Key: 7
2,882,526 UART: [art] Derive CDI
2,882,806 UART: [art] Store in slot 0x4
2,968,573 UART: [art] Derive Key Pair
2,968,933 UART: [art] Store priv key in slot 0x5
2,982,297 UART: [art] Derive Key Pair - Done
2,997,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,374 UART: [art] PUB.X = C132526A4E6D87895F556D95C367C11F98D50D26AB87233E92581AE05D2CED5CBCA27888CF17AB082FC5AD64E16328B9
3,020,144 UART: [art] PUB.Y = 85A956B9DDCA7762B6CDEA649332CFB6CB118709F60006E834F0BECEFC18BB14F3E223124EDC1DD930360B2426CB5604
3,027,072 UART: [art] SIG.R = E3AE36348B8CFBF287042B7EF26012FEF4A1379EFC1FCD36A890EC207A6DABA13C63ED31CD2DE79F39D54565E14BEC0F
3,033,860 UART: [art] SIG.S = 33AECBE00FD7DF4F0E5AE40F28C13C26A0013E758C7536AD3924C0414C2A5227F18B95731EAFF35CBB282F19808EAEC2
3,057,804 UART: Caliptra RT
3,058,147 UART: [state] CFI Enabled
3,178,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,520 UART: [rt]cmd =0x44504543, len=136
3,273,508 >>> mbox cmd response data (136 bytes)
3,273,509 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,044 UART: [rt]cmd =0x4453424c, len=4
3,320,384 >>> mbox cmd response data (8 bytes)
3,320,385 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,350,360 UART: [rt]cmd =0x44504543, len=92
3,535,281 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,603 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,574 UART: [kat] SHA2-512-ACC
908,475 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,734 UART: [kat] LMS
1,171,062 UART: [kat] --
1,171,891 UART: [cold-reset] ++
1,172,231 UART: [fht] FHT @ 0x50003400
1,174,856 UART: [idev] ++
1,175,024 UART: [idev] CDI.KEYID = 6
1,175,384 UART: [idev] SUBJECT.KEYID = 7
1,175,808 UART: [idev] UDS.KEYID = 0
1,176,153 ready_for_fw is high
1,176,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,936 UART: [idev] Erasing UDS.KEYID = 0
1,201,007 UART: [idev] Sha1 KeyId Algorithm
1,209,475 UART: [idev] --
1,210,651 UART: [ldev] ++
1,210,819 UART: [ldev] CDI.KEYID = 6
1,211,182 UART: [ldev] SUBJECT.KEYID = 5
1,211,608 UART: [ldev] AUTHORITY.KEYID = 7
1,212,071 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,068 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,953 UART: [ldev] --
1,282,232 UART: [fwproc] Wait for Commands...
1,282,984 UART: [fwproc] Recv command 0x46574c44
1,283,712 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,946 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,395 >>> mbox cmd response: success
2,826,395 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,403 UART: [afmc] ++
2,827,571 UART: [afmc] CDI.KEYID = 6
2,827,933 UART: [afmc] SUBJECT.KEYID = 7
2,828,358 UART: [afmc] AUTHORITY.KEYID = 5
2,863,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,582 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,174 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,875 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,719 UART: [afmc] --
2,906,731 UART: [cold-reset] --
2,907,591 UART: [state] Locking Datavault
2,909,028 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,632 UART: [state] Locking ICCM
2,910,156 UART: [exit] Launching FMC @ 0x40000130
2,915,486 UART:
2,915,502 UART: Running Caliptra FMC ...
2,915,910 UART:
2,915,964 UART: [state] CFI Enabled
2,926,308 UART: [fht] FMC Alias Private Key: 7
3,044,908 UART: [art] Extend RT PCRs Done
3,045,336 UART: [art] Lock RT PCRs Done
3,047,006 UART: [art] Populate DV Done
3,055,559 UART: [fht] FMC Alias Private Key: 7
3,056,629 UART: [art] Derive CDI
3,056,909 UART: [art] Store in slot 0x4
3,142,976 UART: [art] Derive Key Pair
3,143,336 UART: [art] Store priv key in slot 0x5
3,156,778 UART: [art] Derive Key Pair - Done
3,171,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,386 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,151 UART: [art] PUB.X = 5B4C077CEF146EBCBF744EA8CA2C95AD6961636E9A973CA845DB5AEBDD69E4DDF8DC28AF8D404FC525BE29412FB8BA10
3,194,946 UART: [art] PUB.Y = 823C3DE385CACD55DD5DF8307E9C2CAC9CF70B4E1A4C328BBED507E14C847B0441EED616D89D32181A2C9E7E395873A3
3,201,903 UART: [art] SIG.R = A392B11EB9763660D5AE99F8072E4858E375C86716109CCF3518156F5EF33001DA0A38D54C2BFFB3C821CE0332558DF4
3,208,661 UART: [art] SIG.S = 42F186E6C12ED6A1EBFF89CA77A0858EB81011FD2237B8724BFE712413FE38750A2613296093236F912B090C8558F6F3
3,232,224 UART: Caliptra RT
3,232,475 UART: [state] CFI Enabled
3,352,034 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,378 UART: [rt]cmd =0x44504543, len=136
3,447,122 >>> mbox cmd response data (136 bytes)
3,447,123 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,522 UART: [rt]cmd =0x4453424c, len=4
3,493,820 >>> mbox cmd response data (8 bytes)
3,493,821 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,624 UART: [rt]cmd =0x44504543, len=92
3,708,419 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,523 ready_for_fw is high
1,059,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,956 >>> mbox cmd response: success
2,679,956 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,742,063 UART:
2,742,079 UART: Running Caliptra FMC ...
2,742,487 UART:
2,742,541 UART: [state] CFI Enabled
2,752,905 UART: [fht] FMC Alias Private Key: 7
2,871,825 UART: [art] Extend RT PCRs Done
2,872,253 UART: [art] Lock RT PCRs Done
2,873,675 UART: [art] Populate DV Done
2,881,796 UART: [fht] FMC Alias Private Key: 7
2,882,776 UART: [art] Derive CDI
2,883,056 UART: [art] Store in slot 0x4
2,969,129 UART: [art] Derive Key Pair
2,969,489 UART: [art] Store priv key in slot 0x5
2,982,927 UART: [art] Derive Key Pair - Done
2,997,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,904 UART: [art] PUB.X = 3852C3DDB01969DA41EF7F300BE25E8A779A8B3681FABB23ADAD64AD3B8FCC361114E5732D7F19ED2AD7CA36B2E3E836
3,020,691 UART: [art] PUB.Y = 8D1E8E5152E00A5B6BA14CFC0D4A6F0FAF32322B36E6545CCA2D405E79F605D7B6B0A4899F7AF9062B58CA3DA32556BF
3,027,642 UART: [art] SIG.R = 3E8198291D21D66D1261C2AA50ADA44DB7E9C2556F46E26DC1F72C9E7786839B79323E9D352469F3200977F932EBFF78
3,034,407 UART: [art] SIG.S = 31ABA758FB3D67F7CAE92DB50AADBE93D355FF12581015F41C7D493A5101DE1956B36075CD478AFA87E26B644B2B33A4
3,058,751 UART: Caliptra RT
3,059,002 UART: [state] CFI Enabled
3,178,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,596 UART: [rt]cmd =0x44504543, len=136
3,273,826 >>> mbox cmd response data (136 bytes)
3,273,827 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,110 UART: [rt]cmd =0x4453424c, len=4
3,321,072 >>> mbox cmd response data (8 bytes)
3,321,073 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,104 UART: [rt]cmd =0x44504543, len=92
3,535,406 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,085 UART: [state] LifecycleState = Unprovisioned
85,740 UART: [state] DebugLocked = No
86,248 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
893,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,372 UART: [kat] ++
897,524 UART: [kat] sha1
901,804 UART: [kat] SHA2-256
903,744 UART: [kat] SHA2-384
906,537 UART: [kat] SHA2-512-ACC
908,438 UART: [kat] ECC-384
918,335 UART: [kat] HMAC-384Kdf
922,775 UART: [kat] LMS
1,171,103 UART: [kat] --
1,172,242 UART: [cold-reset] ++
1,172,746 UART: [fht] FHT @ 0x50003400
1,175,507 UART: [idev] ++
1,175,675 UART: [idev] CDI.KEYID = 6
1,176,035 UART: [idev] SUBJECT.KEYID = 7
1,176,459 UART: [idev] UDS.KEYID = 0
1,176,804 ready_for_fw is high
1,176,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,201,412 UART: [idev] Sha1 KeyId Algorithm
1,209,840 UART: [idev] --
1,210,878 UART: [ldev] ++
1,211,046 UART: [ldev] CDI.KEYID = 6
1,211,409 UART: [ldev] SUBJECT.KEYID = 5
1,211,835 UART: [ldev] AUTHORITY.KEYID = 7
1,212,298 UART: [ldev] FE.KEYID = 1
1,217,636 UART: [ldev] Erasing FE.KEYID = 1
1,244,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,675 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,818 UART: [ldev] --
1,283,285 UART: [fwproc] Wait for Commands...
1,284,041 UART: [fwproc] Recv command 0x46574c44
1,284,769 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,119 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,526 >>> mbox cmd response: success
2,827,526 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,578 UART: [afmc] ++
2,828,746 UART: [afmc] CDI.KEYID = 6
2,829,108 UART: [afmc] SUBJECT.KEYID = 7
2,829,533 UART: [afmc] AUTHORITY.KEYID = 5
2,865,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,793 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,541 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,250 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,133 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,834 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,768 UART: [afmc] --
2,908,866 UART: [cold-reset] --
2,909,580 UART: [state] Locking Datavault
2,910,733 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,337 UART: [state] Locking ICCM
2,911,913 UART: [exit] Launching FMC @ 0x40000130
2,917,243 UART:
2,917,259 UART: Running Caliptra FMC ...
2,917,667 UART:
2,917,810 UART: [state] CFI Enabled
2,928,724 UART: [fht] FMC Alias Private Key: 7
3,047,614 UART: [art] Extend RT PCRs Done
3,048,042 UART: [art] Lock RT PCRs Done
3,049,338 UART: [art] Populate DV Done
3,057,649 UART: [fht] FMC Alias Private Key: 7
3,058,745 UART: [art] Derive CDI
3,059,025 UART: [art] Store in slot 0x4
3,144,844 UART: [art] Derive Key Pair
3,145,204 UART: [art] Store priv key in slot 0x5
3,158,598 UART: [art] Derive Key Pair - Done
3,173,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,397 UART: [art] PUB.X = 55666CB65FB32F3FDD2D1E841C530BA3CB5DA1F21994E08659B4A491BEA1F7B4E889C73E16C0E14DB864ABAFBBA74C13
3,197,184 UART: [art] PUB.Y = A15A57BC96EC809F7C845D442068E60DAB20D4AE712376F549369C2DC5C832CD74C55C43D8E37379E2A3DF8288D97094
3,204,133 UART: [art] SIG.R = 0217DE7D39FB845E70641E4BDB2D31C9F9D5A3DFA531CAEB5EE4B30DDDF16A540C26C3B33623879BB762E5AE77CC48B7
3,210,914 UART: [art] SIG.S = 2A37087EF73C858EBEA9170578B75134AAA635485D02E29EFAA2BDB30180EE680FB2F3900A1C7D7D2460E01CCECC8080
3,234,512 UART: Caliptra RT
3,234,855 UART: [state] CFI Enabled
3,354,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,347 UART: [rt]cmd =0x44504543, len=136
3,449,659 >>> mbox cmd response data (136 bytes)
3,449,660 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,053 UART: [rt]cmd =0x4453424c, len=4
3,496,261 >>> mbox cmd response data (8 bytes)
3,496,262 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,073 UART: [rt]cmd =0x44504543, len=92
3,710,001 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,233 >>> mbox cmd response: success
2,682,233 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,743,784 UART:
2,743,800 UART: Running Caliptra FMC ...
2,744,208 UART:
2,744,351 UART: [state] CFI Enabled
2,755,021 UART: [fht] FMC Alias Private Key: 7
2,873,931 UART: [art] Extend RT PCRs Done
2,874,359 UART: [art] Lock RT PCRs Done
2,875,821 UART: [art] Populate DV Done
2,884,232 UART: [fht] FMC Alias Private Key: 7
2,885,346 UART: [art] Derive CDI
2,885,626 UART: [art] Store in slot 0x4
2,971,165 UART: [art] Derive Key Pair
2,971,525 UART: [art] Store priv key in slot 0x5
2,984,617 UART: [art] Derive Key Pair - Done
2,999,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,887 UART: [art] PUB.X = B9E904F91A90966A0772CB0CC2C60F2216EA04359402B6BF77D2D11387D8BAD8CC2292A7BF7E9FA231EF0DE3D4692627
3,022,644 UART: [art] PUB.Y = 601795983B8D48CA7A6FF39A20F3EE247F24F728EA6AE1A2544395736236AD7B9D35B2DD8CCFE286C2B6CA0553FCF43E
3,029,603 UART: [art] SIG.R = EC2D44596DECF37099F685781710E22EA98A9073081E76693A8F25FBBA78E2605D497AF067B8C047BB9E3DF346BBA892
3,036,374 UART: [art] SIG.S = D20FA99A27AEDD620E5373112855EC3FC6DA95C1327057B6C2BA6A5CC30CB4B72008971A634845128E9D36446C093240
3,060,031 UART: Caliptra RT
3,060,374 UART: [state] CFI Enabled
3,180,846 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,128 UART: [rt]cmd =0x44504543, len=136
3,276,628 >>> mbox cmd response data (136 bytes)
3,276,629 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,988 UART: [rt]cmd =0x4453424c, len=4
3,323,272 >>> mbox cmd response data (8 bytes)
3,323,273 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,204 UART: [rt]cmd =0x44504543, len=92
3,538,841 >>> mbox cmd response data (6284 bytes)
test test_disable::test_disable_attestation_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.88s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38189 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.29s
Truncated 34815 bytes from beginning
oofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 10.30s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.87s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.86s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 38115 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 34814 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 7.88s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.65s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.62s
Truncated 47748 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.67s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.59s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.69s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.42s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.47s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 5.60s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.62s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.55s
Truncated 47675 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.57s
Truncated 44374 bytes from beginning
roofResults {
id: 213,
comment: "Signature with special case values r=n + 1 and s=n + 1",
},
WycheproofResults {
id: 214,
comment: "Signature with special case values r=n + 1 and s=p",
},
WycheproofResults {
id: 215,
comment: "Signature with special case values r=n + 1 and s=p + 1",
},
WycheproofResults {
id: 216,
comment: "Signature with special case values r=p and s=0",
},
WycheproofResults {
id: 217,
comment: "Signature with special case values r=p and s=1",
},
WycheproofResults {
id: 219,
comment: "Signature with special case values r=p and s=n",
},
WycheproofResults {
id: 220,
comment: "Signature with special case values r=p and s=n - 1",
},
WycheproofResults {
id: 221,
comment: "Signature with special case values r=p and s=n + 1",
},
WycheproofResults {
id: 222,
comment: "Signature with special case values r=p and s=p",
},
WycheproofResults {
id: 223,
comment: "Signature with special case values r=p and s=p + 1",
},
WycheproofResults {
id: 224,
comment: "Signature with special case values r=p + 1 and s=0",
},
WycheproofResults {
id: 225,
comment: "Signature with special case values r=p + 1 and s=1",
},
WycheproofResults {
id: 227,
comment: "Signature with special case values r=p + 1 and s=n",
},
WycheproofResults {
id: 228,
comment: "Signature with special case values r=p + 1 and s=n - 1",
},
WycheproofResults {
id: 229,
comment: "Signature with special case values r=p + 1 and s=n + 1",
},
WycheproofResults {
id: 230,
comment: "Signature with special case values r=p + 1 and s=p",
},
WycheproofResults {
id: 231,
comment: "Signature with special case values r=p + 1 and s=p + 1",
},
WycheproofResults {
id: 295,
comment: "Edge case for Shamir multiplication",
},
WycheproofResults {
id: 296,
comment: "special case hash",
},
WycheproofResults {
id: 297,
comment: "special case hash",
},
WycheproofResults {
id: 298,
comment: "special case hash",
},
WycheproofResults {
id: 299,
comment: "special case hash",
},
WycheproofResults {
id: 300,
comment: "special case hash",
},
WycheproofResults {
id: 301,
comment: "special case hash",
},
WycheproofResults {
id: 302,
comment: "special case hash",
},
WycheproofResults {
id: 303,
comment: "special case hash",
},
WycheproofResults {
id: 304,
comment: "special case hash",
},
WycheproofResults {
id: 305,
comment: "special case hash",
},
WycheproofResults {
id: 306,
comment: "special case hash",
},
WycheproofResults {
id: 307,
comment: "special case hash",
},
WycheproofResults {
id: 308,
comment: "special case hash",
},
WycheproofResults {
id: 309,
comment: "special case hash",
},
WycheproofResults {
id: 310,
comment: "special case hash",
},
WycheproofResults {
id: 311,
comment: "special case hash",
},
WycheproofResults {
id: 312,
comment: "special case hash",
},
WycheproofResults {
id: 313,
comment: "special case hash",
},
WycheproofResults {
id: 314,
comment: "special case hash",
},
WycheproofResults {
id: 315,
comment: "special case hash",
},
WycheproofResults {
id: 316,
comment: "special case hash",
},
WycheproofResults {
id: 317,
comment: "special case hash",
},
WycheproofResults {
id: 318,
comment: "special case hash",
},
WycheproofResults {
id: 319,
comment: "special case hash",
},
WycheproofResults {
id: 320,
comment: "special case hash",
},
WycheproofResults {
id: 321,
comment: "special case hash",
},
WycheproofResults {
id: 322,
comment: "special case hash",
},
WycheproofResults {
id: 323,
comment: "special case hash",
},
WycheproofResults {
id: 324,
comment: "special case hash",
},
WycheproofResults {
id: 325,
comment: "special case hash",
},
WycheproofResults {
id: 326,
comment: "special case hash",
},
WycheproofResults {
id: 327,
comment: "special case hash",
},
WycheproofResults {
id: 328,
comment: "special case hash",
},
WycheproofResults {
id: 329,
comment: "special case hash",
},
WycheproofResults {
id: 330,
comment: "special case hash",
},
WycheproofResults {
id: 331,
comment: "special case hash",
},
WycheproofResults {
id: 332,
comment: "special case hash",
},
WycheproofResults {
id: 333,
comment: "special case hash",
},
WycheproofResults {
id: 334,
comment: "special case hash",
},
WycheproofResults {
id: 335,
comment: "special case hash",
},
WycheproofResults {
id: 336,
comment: "special case hash",
},
WycheproofResults {
id: 337,
comment: "special case hash",
},
WycheproofResults {
id: 338,
comment: "special case hash",
},
WycheproofResults {
id: 339,
comment: "special case hash",
},
WycheproofResults {
id: 340,
comment: "special case hash",
},
WycheproofResults {
id: 341,
comment: "special case hash",
},
WycheproofResults {
id: 342,
comment: "special case hash",
},
WycheproofResults {
id: 343,
comment: "special case hash",
},
WycheproofResults {
id: 344,
comment: "special case hash",
},
WycheproofResults {
id: 345,
comment: "special case hash",
},
WycheproofResults {
id: 346,
comment: "special case hash",
},
WycheproofResults {
id: 347,
comment: "special case hash",
},
WycheproofResults {
id: 348,
comment: "special case hash",
},
WycheproofResults {
id: 349,
comment: "special case hash",
},
WycheproofResults {
id: 350,
comment: "special case hash",
},
WycheproofResults {
id: 351,
comment: "special case hash",
},
WycheproofResults {
id: 352,
comment: "special case hash",
},
WycheproofResults {
id: 353,
comment: "special case hash",
},
WycheproofResults {
id: 354,
comment: "special case hash",
},
WycheproofResults {
id: 355,
comment: "special case hash",
},
WycheproofResults {
id: 356,
comment: "special case hash",
},
WycheproofResults {
id: 357,
comment: "special case hash",
},
WycheproofResults {
id: 358,
comment: "special case hash",
},
WycheproofResults {
id: 359,
comment: "special case hash",
},
WycheproofResults {
id: 360,
comment: "special case hash",
},
WycheproofResults {
id: 361,
comment: "special case hash",
},
WycheproofResults {
id: 362,
comment: "special case hash",
},
WycheproofResults {
id: 363,
comment: "special case hash",
},
WycheproofResults {
id: 364,
comment: "special case hash",
},
WycheproofResults {
id: 365,
comment: "special case hash",
},
WycheproofResults {
id: 366,
comment: "special case hash",
},
WycheproofResults {
id: 367,
comment: "special case hash",
},
WycheproofResults {
id: 368,
comment: "special case hash",
},
WycheproofResults {
id: 369,
comment: "special case hash",
},
WycheproofResults {
id: 370,
comment: "special case hash",
},
WycheproofResults {
id: 371,
comment: "special case hash",
},
WycheproofResults {
id: 372,
comment: "special case hash",
},
WycheproofResults {
id: 373,
comment: "special case hash",
},
WycheproofResults {
id: 374,
comment: "special case hash",
},
WycheproofResults {
id: 375,
comment: "special case hash",
},
WycheproofResults {
id: 376,
comment: "special case hash",
},
WycheproofResults {
id: 377,
comment: "special case hash",
},
WycheproofResults {
id: 378,
comment: "special case hash",
},
WycheproofResults {
id: 379,
comment: "special case hash",
},
WycheproofResults {
id: 380,
comment: "special case hash",
},
WycheproofResults {
id: 381,
comment: "special case hash",
},
WycheproofResults {
id: 384,
comment: "r,s are large",
},
WycheproofResults {
id: 387,
comment: "small r and s",
},
WycheproofResults {
id: 390,
comment: "small r and s",
},
WycheproofResults {
id: 392,
comment: "small r and s",
},
WycheproofResults {
id: 393,
comment: "r is larger than n",
},
WycheproofResults {
id: 396,
comment: "smallish r and s^-1",
},
WycheproofResults {
id: 403,
comment: "r and s are 128-bit integer",
},
WycheproofResults {
id: 408,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 410,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 411,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 418,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 419,
comment: "edge case modular inverse",
},
WycheproofResults {
id: 423,
comment: "edge case for signature malleability",
},
WycheproofResults {
id: 429,
comment: "edge case for u1",
},
WycheproofResults {
id: 433,
comment: "edge case for u1",
},
WycheproofResults {
id: 434,
comment: "edge case for u1",
},
WycheproofResults {
id: 435,
comment: "edge case for u1",
},
WycheproofResults {
id: 442,
comment: "edge case for u2",
},
WycheproofResults {
id: 444,
comment: "edge case for u2",
},
WycheproofResults {
id: 447,
comment: "edge case for u2",
},
WycheproofResults {
id: 449,
comment: "edge case for u2",
},
WycheproofResults {
id: 452,
comment: "edge case for u2",
},
WycheproofResults {
id: 458,
comment: "extreme value for k and edgecase s",
},
WycheproofResults {
id: 459,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 461,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 462,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 465,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 466,
comment: "extreme value for k and s^-1",
},
WycheproofResults {
id: 468,
comment: "extreme value for k and s^-1",
},
]
test test_ecdsa::ecdsa_cmd_run_wycheproof ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,053 UART:
192,423 UART: Running Caliptra ROM ...
193,639 UART:
193,797 UART: [state] CFI Enabled
262,237 UART: [state] LifecycleState = Unprovisioned
264,240 UART: [state] DebugLocked = No
266,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,719 UART: [kat] SHA2-256
440,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,962 UART: [kat] ++
451,410 UART: [kat] sha1
461,790 UART: [kat] SHA2-256
464,511 UART: [kat] SHA2-384
470,008 UART: [kat] SHA2-512-ACC
472,325 UART: [kat] ECC-384
2,766,414 UART: [kat] HMAC-384Kdf
2,799,555 UART: [kat] LMS
3,989,852 UART: [kat] --
3,993,933 UART: [cold-reset] ++
3,994,946 UART: [fht] Storing FHT @ 0x50003400
4,006,702 UART: [idev] ++
4,007,261 UART: [idev] CDI.KEYID = 6
4,008,148 UART: [idev] SUBJECT.KEYID = 7
4,009,465 UART: [idev] UDS.KEYID = 0
4,010,446 ready_for_fw is high
4,010,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,749 UART: [idev] Erasing UDS.KEYID = 0
7,340,937 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,729 UART: [idev] --
7,366,860 UART: [ldev] ++
7,367,430 UART: [ldev] CDI.KEYID = 6
7,368,399 UART: [ldev] SUBJECT.KEYID = 5
7,369,612 UART: [ldev] AUTHORITY.KEYID = 7
7,370,902 UART: [ldev] FE.KEYID = 1
7,401,073 UART: [ldev] Erasing FE.KEYID = 1
10,732,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,248 UART: [ldev] --
13,096,427 UART: [fwproc] Waiting for Commands...
13,098,688 UART: [fwproc] Received command 0x46574c44
13,100,865 UART: [fwproc] Received Image of size 118548 bytes
17,210,792 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,963 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,360,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,689,266 >>> mbox cmd response: success
17,690,310 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,693,231 UART: [afmc] ++
17,693,891 UART: [afmc] CDI.KEYID = 6
17,694,772 UART: [afmc] SUBJECT.KEYID = 7
17,695,987 UART: [afmc] AUTHORITY.KEYID = 5
21,069,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,367,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,149 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,384,568 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,289 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,413,679 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,435,210 UART: [afmc] --
23,438,707 UART: [cold-reset] --
23,442,295 UART: [state] Locking Datavault
23,447,160 UART: [state] Locking PCR0, PCR1 and PCR31
23,448,912 UART: [state] Locking ICCM
23,451,144 UART: [exit] Launching FMC @ 0x40000130
23,459,535 UART:
23,459,796 UART: Running Caliptra FMC ...
23,460,818 UART:
23,460,964 UART: [state] CFI Enabled
23,527,028 UART: [fht] FMC Alias Private Key: 7
25,866,933 UART: [art] Extend RT PCRs Done
25,868,152 UART: [art] Lock RT PCRs Done
25,869,910 UART: [art] Populate DV Done
25,875,528 UART: [fht] FMC Alias Private Key: 7
25,877,056 UART: [art] Derive CDI
25,877,790 UART: [art] Store in slot 0x4
25,934,751 UART: [art] Derive Key Pair
25,935,794 UART: [art] Store priv key in slot 0x5
29,227,767 UART: [art] Derive Key Pair - Done
29,240,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,528,463 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,976 UART: [art] PUB.X = 65451C637345FDDCE5F192D1CDC5D79B0AC157CE92BF18C70D8E0E5E55B52EF7B893A819F1513854CB56998006F1BF4F
31,537,286 UART: [art] PUB.Y = A43CB6B1AAF58A4B96C2DC86DD14F6E0E07D262C076562892DB64FE51409CA00C3E41DCAAA495C38FF80FCA3D0A358AF
31,544,561 UART: [art] SIG.R = 46F461D33011641F54D02920387CB6174F26E0A2677C5692992B42D1C81DCE1A5E3AD3C78916FDED9308BD18C766978A
31,551,897 UART: [art] SIG.S = 98CA143EA8EA54577F447A5B253CDE24F5076A4A8DCCA59BE0B8D3C0915899A13186AD4B21824A4AE361CD235FB014AE
32,856,657 UART: Caliptra RT
32,857,362 UART: [state] CFI Enabled
33,034,435 UART: [rt] RT listening for mailbox commands...
33,067,256 UART: [rt]cmd =0x53494756, len=196
33,072,289 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,887 writing to cptra_bootfsm_go
3,807,585 ready_for_fw is high
3,808,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,524 >>> mbox cmd response: success
17,972,785 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,670,735 UART:
23,671,121 UART: Running Caliptra FMC ...
23,672,270 UART:
23,672,431 UART: [state] CFI Enabled
23,741,344 UART: [fht] FMC Alias Private Key: 7
26,082,168 UART: [art] Extend RT PCRs Done
26,083,542 UART: [art] Lock RT PCRs Done
26,084,743 UART: [art] Populate DV Done
26,090,385 UART: [fht] FMC Alias Private Key: 7
26,091,979 UART: [art] Derive CDI
26,092,797 UART: [art] Store in slot 0x4
26,149,276 UART: [art] Derive Key Pair
26,150,271 UART: [art] Store priv key in slot 0x5
29,443,627 UART: [art] Derive Key Pair - Done
29,456,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,256 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,758 UART: [art] PUB.X = AE2C1AFAF86F983F8FFD34EAA0C0D153ECB36DBF530D944CE18356410457D012D679774919D3DDC4E970D1B50C75DE92
31,754,052 UART: [art] PUB.Y = F83B67467F6A01B7AA9ACAA6FA2D30A145A8ECBE8043C0A1C522E7A77B1507A786D6D4F857345C9FD72CEEBDC926E1B2
31,761,361 UART: [art] SIG.R = A3791B09094588D0E7282AC8B16261294CD99E7401C2377758FDB9749F1F08E5B0576D251B61B99B462FDAB2CB2D9F9B
31,768,732 UART: [art] SIG.S = 36AF34A232C48548DCAD68282FED26C7ABD4ABFA6AA3C44CA9ADB5C410D7F8FF5CBC8388F4DDF326B4DF569E97D70189
33,073,904 UART: Caliptra RT
33,074,624 UART: [state] CFI Enabled
33,250,771 UART: [rt] RT listening for mailbox commands...
33,283,588 UART: [rt]cmd =0x53494756, len=196
33,288,436 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,432 UART:
193,090 UART: Running Caliptra ROM ...
194,230 UART:
603,776 UART: [state] CFI Enabled
615,693 UART: [state] LifecycleState = Unprovisioned
617,578 UART: [state] DebugLocked = No
619,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,536 UART: [kat] SHA2-256
793,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,827 UART: [kat] ++
804,313 UART: [kat] sha1
816,324 UART: [kat] SHA2-256
819,040 UART: [kat] SHA2-384
825,243 UART: [kat] SHA2-512-ACC
827,601 UART: [kat] ECC-384
3,112,133 UART: [kat] HMAC-384Kdf
3,125,628 UART: [kat] LMS
4,315,730 UART: [kat] --
4,317,966 UART: [cold-reset] ++
4,319,683 UART: [fht] Storing FHT @ 0x50003400
4,330,155 UART: [idev] ++
4,330,720 UART: [idev] CDI.KEYID = 6
4,331,669 UART: [idev] SUBJECT.KEYID = 7
4,332,902 UART: [idev] UDS.KEYID = 0
4,333,876 ready_for_fw is high
4,334,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,057 UART: [idev] Erasing UDS.KEYID = 0
7,626,027 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,683 UART: [idev] --
7,651,868 UART: [ldev] ++
7,652,442 UART: [ldev] CDI.KEYID = 6
7,653,380 UART: [ldev] SUBJECT.KEYID = 5
7,654,605 UART: [ldev] AUTHORITY.KEYID = 7
7,655,831 UART: [ldev] FE.KEYID = 1
7,668,042 UART: [ldev] Erasing FE.KEYID = 1
10,955,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,960 UART: [ldev] --
13,317,275 UART: [fwproc] Waiting for Commands...
13,319,513 UART: [fwproc] Received command 0x46574c44
13,321,696 UART: [fwproc] Received Image of size 118548 bytes
17,430,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,454 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,584,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,681 >>> mbox cmd response: success
17,913,816 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,917,548 UART: [afmc] ++
17,918,124 UART: [afmc] CDI.KEYID = 6
17,919,084 UART: [afmc] SUBJECT.KEYID = 7
17,920,293 UART: [afmc] AUTHORITY.KEYID = 5
21,236,305 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,970 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,400 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,806 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,038 UART: [afmc] --
23,599,306 UART: [cold-reset] --
23,603,267 UART: [state] Locking Datavault
23,608,987 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,732 UART: [state] Locking ICCM
23,612,407 UART: [exit] Launching FMC @ 0x40000130
23,620,799 UART:
23,621,035 UART: Running Caliptra FMC ...
23,622,130 UART:
23,622,285 UART: [state] CFI Enabled
23,630,268 UART: [fht] FMC Alias Private Key: 7
25,970,036 UART: [art] Extend RT PCRs Done
25,971,253 UART: [art] Lock RT PCRs Done
25,972,765 UART: [art] Populate DV Done
25,977,952 UART: [fht] FMC Alias Private Key: 7
25,979,587 UART: [art] Derive CDI
25,980,395 UART: [art] Store in slot 0x4
26,022,654 UART: [art] Derive Key Pair
26,023,645 UART: [art] Store priv key in slot 0x5
29,265,906 UART: [art] Derive Key Pair - Done
29,278,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,733 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,237 UART: [art] PUB.X = 1A8E1B2531BA27A4B69CCD57240F3CDF8407D143D93ABB3CB555B5A338441FAB639635FEFF2FD3A5E8B4BF638A5B1F07
31,567,539 UART: [art] PUB.Y = BCD26A9D31DD566C2E57AA753016D4064730566450307C795E5133605B0D47E0B50B2D1D4589B1E5E51E6897383FECB7
31,574,760 UART: [art] SIG.R = 50AFF23D5DFCC7E8F5B0CDFE5FCE0643654ED678174277CB5F16F089A86EC7B55DB92E8B30F2D567C362308CBA4589BE
31,582,193 UART: [art] SIG.S = BEEFDEC4A1726B49FDE1B2F2E246463BA79F27C0ED0FC248C7976921144F9AE7B0617A3D404CA343E53160AB24ECC702
32,887,401 UART: Caliptra RT
32,888,107 UART: [state] CFI Enabled
33,021,437 UART: [rt] RT listening for mailbox commands...
33,054,420 UART: [rt]cmd =0x53494756, len=196
33,059,341 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
4,133,884 ready_for_fw is high
4,134,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,896 >>> mbox cmd response: success
18,166,122 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,807,757 UART:
23,808,142 UART: Running Caliptra FMC ...
23,809,456 UART:
23,809,623 UART: [state] CFI Enabled
23,817,416 UART: [fht] FMC Alias Private Key: 7
26,157,736 UART: [art] Extend RT PCRs Done
26,158,957 UART: [art] Lock RT PCRs Done
26,160,425 UART: [art] Populate DV Done
26,165,842 UART: [fht] FMC Alias Private Key: 7
26,167,484 UART: [art] Derive CDI
26,168,216 UART: [art] Store in slot 0x4
26,211,293 UART: [art] Derive Key Pair
26,212,346 UART: [art] Store priv key in slot 0x5
29,454,821 UART: [art] Derive Key Pair - Done
29,467,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,101 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,628 UART: [art] PUB.X = BC2863D2DA10E190A3E12149DE713D152EC88062368083B224EA406FA9DF0113997E32A0A74D6B57B1BEAF8D22A21FB4
31,756,874 UART: [art] PUB.Y = 05984450E426699DBD6EC5A6F7B3C15513EA7DE49699D584C43582877DB683A1EFF36A54A3D1B645156B22E48EE099C3
31,764,072 UART: [art] SIG.R = C58082F24F1F647067AC5CD19E31F890A2695D5E8B8545A482004BDB63BB5E975087D43DFE8D5B992A083E2055A06E33
31,771,467 UART: [art] SIG.S = 6740EAB20A5A3042F69C9C67E8F58BF9AA1926E7F74DBC1BC19CCABBC53C2174C7B464E06C3316840F40078912E53BCE
33,076,745 UART: Caliptra RT
33,077,444 UART: [state] CFI Enabled
33,210,330 UART: [rt] RT listening for mailbox commands...
33,243,032 UART: [rt]cmd =0x53494756, len=196
33,247,446 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,190 UART:
192,553 UART: Running Caliptra ROM ...
193,631 UART:
193,774 UART: [state] CFI Enabled
263,326 UART: [state] LifecycleState = Unprovisioned
265,240 UART: [state] DebugLocked = No
267,751 UART: [state] WD Timer not started. Device not locked for debugging
272,072 UART: [kat] SHA2-256
451,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,509 UART: [kat] ++
463,038 UART: [kat] sha1
473,636 UART: [kat] SHA2-256
476,354 UART: [kat] SHA2-384
481,132 UART: [kat] SHA2-512-ACC
483,507 UART: [kat] ECC-384
2,944,831 UART: [kat] HMAC-384Kdf
2,970,504 UART: [kat] LMS
3,446,989 UART: [kat] --
3,452,331 UART: [cold-reset] ++
3,453,972 UART: [fht] FHT @ 0x50003400
3,464,878 UART: [idev] ++
3,465,445 UART: [idev] CDI.KEYID = 6
3,466,475 UART: [idev] SUBJECT.KEYID = 7
3,467,647 UART: [idev] UDS.KEYID = 0
3,468,684 ready_for_fw is high
3,468,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,963 UART: [idev] Erasing UDS.KEYID = 0
5,984,874 UART: [idev] Sha1 KeyId Algorithm
6,008,254 UART: [idev] --
6,012,932 UART: [ldev] ++
6,013,510 UART: [ldev] CDI.KEYID = 6
6,014,446 UART: [ldev] SUBJECT.KEYID = 5
6,015,661 UART: [ldev] AUTHORITY.KEYID = 7
6,016,890 UART: [ldev] FE.KEYID = 1
6,055,305 UART: [ldev] Erasing FE.KEYID = 1
8,562,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,431 UART: [ldev] --
10,373,413 UART: [fwproc] Wait for Commands...
10,376,047 UART: [fwproc] Recv command 0x46574c44
10,378,087 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,015 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,136 >>> mbox cmd response: success
14,348,294 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,351,164 UART: [afmc] ++
14,351,753 UART: [afmc] CDI.KEYID = 6
14,352,690 UART: [afmc] SUBJECT.KEYID = 7
14,353,905 UART: [afmc] AUTHORITY.KEYID = 5
16,895,824 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,478 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,316 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,472 UART: [afmc] --
18,718,043 UART: [cold-reset] --
18,722,160 UART: [state] Locking Datavault
18,727,786 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,552 UART: [state] Locking ICCM
18,730,920 UART: [exit] Launching FMC @ 0x40000130
18,739,364 UART:
18,739,600 UART: Running Caliptra FMC ...
18,740,696 UART:
18,740,855 UART: [state] CFI Enabled
18,796,812 UART: [fht] FMC Alias Private Key: 7
20,562,633 UART: [art] Extend RT PCRs Done
20,563,851 UART: [art] Lock RT PCRs Done
20,565,150 UART: [art] Populate DV Done
20,570,363 UART: [fht] FMC Alias Private Key: 7
20,571,947 UART: [art] Derive CDI
20,572,754 UART: [art] Store in slot 0x4
20,629,537 UART: [art] Derive Key Pair
20,630,529 UART: [art] Store priv key in slot 0x5
23,093,337 UART: [art] Derive Key Pair - Done
23,106,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,470 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,953 UART: [art] PUB.X = CD099D7CCB5F107C8623FBBA203710F5562A69EAB76A912DAF56D5521F625A159BA3E695CA9C775423645DFFD71FDC5E
24,828,248 UART: [art] PUB.Y = E30E5890B474C84E2924D437EEFE367414923A2A884077AF128FDC05888F059D4244F7F8C9260D80CB761B1EAEB4FD78
24,835,534 UART: [art] SIG.R = 5D083366D110F2D75E4BD46180CCD44806246262CA4FF020C633E4B06DA487B46F13A3ED926692B6B2A4C8D45635147C
24,842,865 UART: [art] SIG.S = 10DDD7FFD820EDB17C591D460CAE188AD152886618AA7C588703660DC8BFE881F1099D66FB760D3C6E5D0184BA65FC51
25,821,727 UART: Caliptra RT
25,822,439 UART: [state] CFI Enabled
26,002,870 UART: [rt] RT listening for mailbox commands...
26,035,875 UART: [rt]cmd =0x53494756, len=196
26,040,287 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,452,212 ready_for_fw is high
3,452,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,232 >>> mbox cmd response: success
14,231,519 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,523,607 UART:
18,523,982 UART: Running Caliptra FMC ...
18,525,177 UART:
18,525,346 UART: [state] CFI Enabled
18,593,130 UART: [fht] FMC Alias Private Key: 7
20,359,309 UART: [art] Extend RT PCRs Done
20,360,529 UART: [art] Lock RT PCRs Done
20,362,048 UART: [art] Populate DV Done
20,367,472 UART: [fht] FMC Alias Private Key: 7
20,368,957 UART: [art] Derive CDI
20,369,713 UART: [art] Store in slot 0x4
20,425,535 UART: [art] Derive Key Pair
20,426,523 UART: [art] Store priv key in slot 0x5
22,889,311 UART: [art] Derive Key Pair - Done
22,902,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,615,363 UART: [art] Erasing AUTHORITY.KEYID = 7
24,616,869 UART: [art] PUB.X = A45A24E256F7F82F78F2AEE2BCF5E68B0F28392E0890A135661674D0AA6C90772F3E73977614F1F7585D31FC2E30AC75
24,624,116 UART: [art] PUB.Y = 5C4AD4EF94EB3CF1F0780FB01420DF0EEB7177700EB5CC88CFD95BE676B306DCB1D38A408605B514324E10E06A4223BE
24,631,386 UART: [art] SIG.R = 0E77ED006A1CBC37D6445C15693EDF0F24EBD20DB871F61CE5D23C72BFC34B83EFC77ADBA8B2493DEA2710D72A5C9B6D
24,638,779 UART: [art] SIG.S = F1312D683D538F1A0062345F50AFBB829A4A6541F7D1B009A049A803F96CDA9A190AC2C795A0145F19044AE1F0147182
25,618,025 UART: Caliptra RT
25,618,729 UART: [state] CFI Enabled
25,799,652 UART: [rt] RT listening for mailbox commands...
25,832,734 UART: [rt]cmd =0x53494756, len=196
25,837,332 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,347 UART:
192,708 UART: Running Caliptra ROM ...
193,996 UART:
603,407 UART: [state] CFI Enabled
617,389 UART: [state] LifecycleState = Unprovisioned
619,345 UART: [state] DebugLocked = No
620,733 UART: [state] WD Timer not started. Device not locked for debugging
624,283 UART: [kat] SHA2-256
803,954 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,762 UART: [kat] ++
815,239 UART: [kat] sha1
825,477 UART: [kat] SHA2-256
828,208 UART: [kat] SHA2-384
833,705 UART: [kat] SHA2-512-ACC
836,081 UART: [kat] ECC-384
3,275,910 UART: [kat] HMAC-384Kdf
3,288,557 UART: [kat] LMS
3,765,040 UART: [kat] --
3,768,768 UART: [cold-reset] ++
3,770,983 UART: [fht] FHT @ 0x50003400
3,783,307 UART: [idev] ++
3,783,880 UART: [idev] CDI.KEYID = 6
3,785,019 UART: [idev] SUBJECT.KEYID = 7
3,786,130 UART: [idev] UDS.KEYID = 0
3,787,059 ready_for_fw is high
3,787,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,105 UART: [idev] Erasing UDS.KEYID = 0
6,266,827 UART: [idev] Sha1 KeyId Algorithm
6,290,748 UART: [idev] --
6,295,795 UART: [ldev] ++
6,296,381 UART: [ldev] CDI.KEYID = 6
6,297,352 UART: [ldev] SUBJECT.KEYID = 5
6,298,516 UART: [ldev] AUTHORITY.KEYID = 7
6,299,753 UART: [ldev] FE.KEYID = 1
6,311,502 UART: [ldev] Erasing FE.KEYID = 1
8,789,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,245 UART: [ldev] --
10,583,353 UART: [fwproc] Wait for Commands...
10,586,580 UART: [fwproc] Recv command 0x46574c44
10,588,563 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,370 >>> mbox cmd response: success
14,557,550 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,559,755 UART: [afmc] ++
14,560,351 UART: [afmc] CDI.KEYID = 6
14,561,263 UART: [afmc] SUBJECT.KEYID = 7
14,562,521 UART: [afmc] AUTHORITY.KEYID = 5
17,063,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,810 UART: [afmc] --
18,863,675 UART: [cold-reset] --
18,868,182 UART: [state] Locking Datavault
18,873,914 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,610 UART: [state] Locking ICCM
18,878,461 UART: [exit] Launching FMC @ 0x40000130
18,886,855 UART:
18,887,110 UART: Running Caliptra FMC ...
18,888,211 UART:
18,888,371 UART: [state] CFI Enabled
18,896,148 UART: [fht] FMC Alias Private Key: 7
20,662,796 UART: [art] Extend RT PCRs Done
20,664,019 UART: [art] Lock RT PCRs Done
20,665,982 UART: [art] Populate DV Done
20,671,660 UART: [fht] FMC Alias Private Key: 7
20,673,137 UART: [art] Derive CDI
20,674,045 UART: [art] Store in slot 0x4
20,716,974 UART: [art] Derive Key Pair
20,717,984 UART: [art] Store priv key in slot 0x5
23,145,136 UART: [art] Derive Key Pair - Done
23,158,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,421 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,926 UART: [art] PUB.X = 440B7A55B6DA025D8111A8C3B56C0C80732711E4C4F90CEB60B4C0BF89C88F8F069ABBAFADCBC1F39C933AF751863B02
24,873,254 UART: [art] PUB.Y = 5FAC2169484C57D36B64419FE67C5E27CD8AF83EF1462DFA7ED2154488B60DC4CA7FB5449125C5A9946E33F5F61C6846
24,880,439 UART: [art] SIG.R = BF51A559B98DE35A1CAEB9EA36AAE2B1DFD5BD509AEC3F524C0AA119E7B19FCFED80A21EB8457113708F71BC914CD592
24,887,884 UART: [art] SIG.S = 40510E99D8A14D058E4EE5150C65357AD75D5549C61E093CE0A8E631801D363575E526BE63178F58F96C0ED99FBBA6C2
25,866,352 UART: Caliptra RT
25,867,059 UART: [state] CFI Enabled
25,999,030 UART: [rt] RT listening for mailbox commands...
26,031,745 UART: [rt]cmd =0x53494756, len=196
26,036,512 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,777,907 ready_for_fw is high
3,778,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,186 >>> mbox cmd response: success
14,451,462 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,700,643 UART:
18,701,040 UART: Running Caliptra FMC ...
18,702,191 UART:
18,702,355 UART: [state] CFI Enabled
18,710,218 UART: [fht] FMC Alias Private Key: 7
20,475,919 UART: [art] Extend RT PCRs Done
20,477,144 UART: [art] Lock RT PCRs Done
20,478,854 UART: [art] Populate DV Done
20,484,227 UART: [fht] FMC Alias Private Key: 7
20,485,841 UART: [art] Derive CDI
20,486,660 UART: [art] Store in slot 0x4
20,529,317 UART: [art] Derive Key Pair
20,530,360 UART: [art] Store priv key in slot 0x5
22,957,603 UART: [art] Derive Key Pair - Done
22,970,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,519 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,027 UART: [art] PUB.X = 09A337C43E71911C22E7977FDFE21E115F0BE3DF21563ACCB4B15618CACC3EAC905A492E9A51489AABB3D939D1A2E881
24,685,338 UART: [art] PUB.Y = E7EAD2BBD4C13079CC38A82ADADC69FCCEE149AC701CE45D6E4E8B48EF3B6C1D928701C4274B3C1E878BD08F49F59D78
24,692,636 UART: [art] SIG.R = A54B423BDFC050F0F20E2158CD732AF8D838D68318F7EC0957773DCCA6A3F10920A40EFE40A892CF159D6E03B7074831
24,700,038 UART: [art] SIG.S = BEB7E20B6C0DEEC31B0CA4B978C31DA65813E4A9238DEFFD70357B7B61685988738C926E3BFB3E380984352A554140F1
25,679,229 UART: Caliptra RT
25,679,945 UART: [state] CFI Enabled
25,813,172 UART: [rt] RT listening for mailbox commands...
25,846,214 UART: [rt]cmd =0x53494756, len=196
25,851,040 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
191,942 UART:
192,309 UART: Running Caliptra ROM ...
193,443 UART:
193,590 UART: [state] CFI Enabled
265,105 UART: [state] LifecycleState = Unprovisioned
267,469 UART: [state] DebugLocked = No
268,811 UART: [state] WD Timer not started. Device not locked for debugging
274,074 UART: [kat] SHA2-256
464,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,767 UART: [kat] ++
475,308 UART: [kat] sha1
486,115 UART: [kat] SHA2-256
489,184 UART: [kat] SHA2-384
495,450 UART: [kat] SHA2-512-ACC
498,024 UART: [kat] ECC-384
2,951,043 UART: [kat] HMAC-384Kdf
2,973,035 UART: [kat] LMS
3,504,794 UART: [kat] --
3,511,989 UART: [cold-reset] ++
3,513,990 UART: [fht] FHT @ 0x50003400
3,526,190 UART: [idev] ++
3,526,826 UART: [idev] CDI.KEYID = 6
3,527,852 UART: [idev] SUBJECT.KEYID = 7
3,529,023 UART: [idev] UDS.KEYID = 0
3,529,949 ready_for_fw is high
3,530,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,679,321 UART: [idev] Erasing UDS.KEYID = 0
6,052,422 UART: [idev] Sha1 KeyId Algorithm
6,073,775 UART: [idev] --
6,078,572 UART: [ldev] ++
6,079,249 UART: [ldev] CDI.KEYID = 6
6,080,158 UART: [ldev] SUBJECT.KEYID = 5
6,081,373 UART: [ldev] AUTHORITY.KEYID = 7
6,082,552 UART: [ldev] FE.KEYID = 1
6,122,419 UART: [ldev] Erasing FE.KEYID = 1
8,628,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,365,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,396,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,411,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,514 UART: [ldev] --
10,436,328 UART: [fwproc] Wait for Commands...
10,439,030 UART: [fwproc] Recv command 0x46574c44
10,441,341 UART: [fwproc] Recv'd Img size: 118548 bytes
13,935,889 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,082 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,137,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,214 >>> mbox cmd response: success
14,699,346 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,702,364 UART: [afmc] ++
14,703,050 UART: [afmc] CDI.KEYID = 6
14,704,289 UART: [afmc] SUBJECT.KEYID = 7
14,705,793 UART: [afmc] AUTHORITY.KEYID = 5
17,234,491 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,916 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,009 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,035 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,149 UART: [afmc] --
19,033,954 UART: [cold-reset] --
19,037,750 UART: [state] Locking Datavault
19,043,965 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,143 UART: [state] Locking ICCM
19,047,803 UART: [exit] Launching FMC @ 0x40000130
19,056,465 UART:
19,056,707 UART: Running Caliptra FMC ...
19,057,810 UART:
19,057,993 UART: [state] CFI Enabled
19,118,356 UART: [fht] FMC Alias Private Key: 7
20,885,225 UART: [art] Extend RT PCRs Done
20,886,443 UART: [art] Lock RT PCRs Done
20,887,875 UART: [art] Populate DV Done
20,893,059 UART: [fht] FMC Alias Private Key: 7
20,894,755 UART: [art] Derive CDI
20,895,486 UART: [art] Store in slot 0x4
20,951,309 UART: [art] Derive Key Pair
20,952,352 UART: [art] Store priv key in slot 0x5
23,414,914 UART: [art] Derive Key Pair - Done
23,427,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,062 UART: [art] PUB.X = 1A5D628ED872D7A0A0808F09880D4B0D921A6349FE5D50E4609113DB1E0520E27BCF11137AAC87B83CE4EA622DB5A877
25,150,337 UART: [art] PUB.Y = FF0AE4327F7A69D0564D1EE110D862304EC3DDB79AB66337166BEB09075FD6A501A701B0441B01E4C21F3A5330027F6D
25,157,576 UART: [art] SIG.R = 06ED0ADBC098780D6D89492920EF73651651FCF037329F658545E09B34EBA206CCE8480E37F3A19B74A7AE9BB50C6D44
25,164,927 UART: [art] SIG.S = 72C96958967AA0B6ECEC0C03AE4FD17476FB0A1300C391998F1795064EBE4B3D122D0B6C8F258F42DB735248B574C519
26,143,484 UART: Caliptra RT
26,144,187 UART: [state] CFI Enabled
26,324,173 UART: [rt] RT listening for mailbox commands...
26,356,928 UART: [rt]cmd =0x53494756, len=196
26,361,990 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,406,244 ready_for_fw is high
3,407,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,782,014 >>> mbox cmd response: success
14,783,322 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,077,026 UART:
19,077,420 UART: Running Caliptra FMC ...
19,078,584 UART:
19,078,752 UART: [state] CFI Enabled
19,145,612 UART: [fht] FMC Alias Private Key: 7
20,932,163 UART: [art] Extend RT PCRs Done
20,933,385 UART: [art] Lock RT PCRs Done
20,935,063 UART: [art] Populate DV Done
20,940,485 UART: [fht] FMC Alias Private Key: 7
20,942,132 UART: [art] Derive CDI
20,942,946 UART: [art] Store in slot 0x4
20,999,049 UART: [art] Derive Key Pair
21,000,092 UART: [art] Store priv key in slot 0x5
23,462,865 UART: [art] Derive Key Pair - Done
23,475,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,188,905 UART: [art] Erasing AUTHORITY.KEYID = 7
25,190,404 UART: [art] PUB.X = 1762D5F9230BC3D9AEB4764FE9FF8D8277E4162A2BA6CF425EAF02C55397FF5C916DC2E27D8D5B7C38A47D9F9248EBAD
25,197,752 UART: [art] PUB.Y = D8D681A1B162C1467005621D4EE679066D02B0D0D51BC63C0ADBD312656B5326157A0BA72DEA245D39C01665C54F7FC2
25,205,003 UART: [art] SIG.R = 1A0788A4600CD4EAE0066002F35008776AE7FAA526D4C18A1731447553623C0907722785685DB730E0B4538262F630E5
25,212,393 UART: [art] SIG.S = 2D870014F44DB314DED651C0E8C344C6225261E2CA9AC2A10AD2AD26FA8FEECD15E8657D64C73BDCCB8993BB900A98E2
26,191,168 UART: Caliptra RT
26,191,882 UART: [state] CFI Enabled
26,371,831 UART: [rt] RT listening for mailbox commands...
26,404,596 UART: [rt]cmd =0x53494756, len=196
26,408,927 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,570 UART:
192,941 UART: Running Caliptra ROM ...
194,062 UART:
603,610 UART: [state] CFI Enabled
617,047 UART: [state] LifecycleState = Unprovisioned
619,392 UART: [state] DebugLocked = No
621,488 UART: [state] WD Timer not started. Device not locked for debugging
626,696 UART: [kat] SHA2-256
816,602 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,338 UART: [kat] ++
827,864 UART: [kat] sha1
839,380 UART: [kat] SHA2-256
842,397 UART: [kat] SHA2-384
849,323 UART: [kat] SHA2-512-ACC
851,913 UART: [kat] ECC-384
3,294,160 UART: [kat] HMAC-384Kdf
3,308,291 UART: [kat] LMS
3,840,096 UART: [kat] --
3,844,430 UART: [cold-reset] ++
3,845,663 UART: [fht] FHT @ 0x50003400
3,855,529 UART: [idev] ++
3,856,250 UART: [idev] CDI.KEYID = 6
3,857,168 UART: [idev] SUBJECT.KEYID = 7
3,858,348 UART: [idev] UDS.KEYID = 0
3,859,277 ready_for_fw is high
3,859,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,359 UART: [idev] Erasing UDS.KEYID = 0
6,334,837 UART: [idev] Sha1 KeyId Algorithm
6,357,586 UART: [idev] --
6,362,286 UART: [ldev] ++
6,362,970 UART: [ldev] CDI.KEYID = 6
6,363,851 UART: [ldev] SUBJECT.KEYID = 5
6,365,062 UART: [ldev] AUTHORITY.KEYID = 7
6,366,298 UART: [ldev] FE.KEYID = 1
6,376,237 UART: [ldev] Erasing FE.KEYID = 1
8,851,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,225 UART: [ldev] --
10,641,951 UART: [fwproc] Wait for Commands...
10,643,398 UART: [fwproc] Recv command 0x46574c44
10,645,658 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,915 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,912 >>> mbox cmd response: success
14,913,955 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,917,310 UART: [afmc] ++
14,918,016 UART: [afmc] CDI.KEYID = 6
14,919,128 UART: [afmc] SUBJECT.KEYID = 7
14,920,697 UART: [afmc] AUTHORITY.KEYID = 5
17,421,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,153 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,436 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,311 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,201 UART: [afmc] --
19,221,015 UART: [cold-reset] --
19,223,916 UART: [state] Locking Datavault
19,232,032 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,239 UART: [state] Locking ICCM
19,237,183 UART: [exit] Launching FMC @ 0x40000130
19,245,802 UART:
19,246,037 UART: Running Caliptra FMC ...
19,247,075 UART:
19,247,249 UART: [state] CFI Enabled
19,255,125 UART: [fht] FMC Alias Private Key: 7
21,021,694 UART: [art] Extend RT PCRs Done
21,022,930 UART: [art] Lock RT PCRs Done
21,024,289 UART: [art] Populate DV Done
21,029,875 UART: [fht] FMC Alias Private Key: 7
21,031,422 UART: [art] Derive CDI
21,032,189 UART: [art] Store in slot 0x4
21,074,845 UART: [art] Derive Key Pair
21,075,849 UART: [art] Store priv key in slot 0x5
23,502,370 UART: [art] Derive Key Pair - Done
23,515,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,748 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,257 UART: [art] PUB.X = 36380F2770D70F04B92904AAD9AF3EDAE4A14759961FDF2A0ED65D62162DCA148E44AE52D17BF9BF5AB057330DA15C63
25,230,528 UART: [art] PUB.Y = 3E32AF5ECFA637575C6124EA38176571E93FCC50926867B244015B4F6FE87534B17CF4D3C95B5688B20BC1DF1579F638
25,237,784 UART: [art] SIG.R = 3BAB57A2305A55BF0145DA08AE81F46204BDA530797E6E281CC37E8D0D5D878AC6E50D0A297F16EFADD1E9FBC73737B4
25,245,164 UART: [art] SIG.S = 8650C7B8292AF28F4F08ACE66AC7BE41833963033521287655BD769466D36AADF494305C82C310F37D02F265F938FC92
26,224,225 UART: Caliptra RT
26,224,938 UART: [state] CFI Enabled
26,356,805 UART: [rt] RT listening for mailbox commands...
26,389,891 UART: [rt]cmd =0x53494756, len=196
26,394,471 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,753,239 ready_for_fw is high
3,753,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,777 >>> mbox cmd response: success
15,047,986 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,306,191 UART:
19,306,576 UART: Running Caliptra FMC ...
19,307,679 UART:
19,307,836 UART: [state] CFI Enabled
19,316,169 UART: [fht] FMC Alias Private Key: 7
21,082,070 UART: [art] Extend RT PCRs Done
21,083,306 UART: [art] Lock RT PCRs Done
21,084,917 UART: [art] Populate DV Done
21,090,072 UART: [fht] FMC Alias Private Key: 7
21,091,556 UART: [art] Derive CDI
21,092,325 UART: [art] Store in slot 0x4
21,134,881 UART: [art] Derive Key Pair
21,135,883 UART: [art] Store priv key in slot 0x5
23,562,602 UART: [art] Derive Key Pair - Done
23,575,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,416 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,925 UART: [art] PUB.X = BFC4235B82CCE3E5C2B4FB89A4830A2D562F3A459FD0C43F4C2A33A89CB688234F8F2598A47C21650C487388FFB1E21D
25,290,195 UART: [art] PUB.Y = F984AF210D7898EFC7D5C3081E8D919D5EE8DBD0E665316A044A23193546E682882B41AA97229B6B8447313EF5389DE1
25,297,459 UART: [art] SIG.R = 46136FCE1F6A9B04654F7722747C4B82D225EAEBE3853035EA27915849D2C5A7A318FFCAB8C5276FBDF689A6EF174DD4
25,304,813 UART: [art] SIG.S = 69A17B43CE887CE53734E836F569CF99AE3A26564D0E249B6688EA18E2EA3FEC53D33E629A9771DEAE1453D547ABF3FB
26,283,743 UART: Caliptra RT
26,284,458 UART: [state] CFI Enabled
26,416,169 UART: [rt] RT listening for mailbox commands...
26,449,264 UART: [rt]cmd =0x53494756, len=196
26,454,143 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_hw_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,005 UART:
192,368 UART: Running Caliptra ROM ...
193,506 UART:
193,654 UART: [state] CFI Enabled
263,034 UART: [state] LifecycleState = Unprovisioned
264,965 UART: [state] DebugLocked = No
267,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,143 UART: [kat] SHA2-256
442,899 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,377 UART: [kat] ++
453,862 UART: [kat] sha1
465,665 UART: [kat] SHA2-256
468,319 UART: [kat] SHA2-384
474,954 UART: [kat] SHA2-512-ACC
477,324 UART: [kat] ECC-384
2,769,824 UART: [kat] HMAC-384Kdf
2,800,462 UART: [kat] LMS
3,990,736 UART: [kat] --
3,994,253 UART: [cold-reset] ++
3,995,763 UART: [fht] Storing FHT @ 0x50003400
4,007,591 UART: [idev] ++
4,008,159 UART: [idev] CDI.KEYID = 6
4,009,074 UART: [idev] SUBJECT.KEYID = 7
4,010,335 UART: [idev] UDS.KEYID = 0
4,011,376 ready_for_fw is high
4,011,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,160 UART: [idev] Erasing UDS.KEYID = 0
7,347,603 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,022 UART: [idev] --
7,374,571 UART: [ldev] ++
7,375,139 UART: [ldev] CDI.KEYID = 6
7,376,099 UART: [ldev] SUBJECT.KEYID = 5
7,377,321 UART: [ldev] AUTHORITY.KEYID = 7
7,378,511 UART: [ldev] FE.KEYID = 1
7,422,868 UART: [ldev] Erasing FE.KEYID = 1
10,757,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,993 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,513 UART: [ldev] --
13,140,043 UART: [fwproc] Waiting for Commands...
13,142,245 UART: [fwproc] Received command 0x46574c44
13,144,426 UART: [fwproc] Received Image of size 118548 bytes
17,245,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,496 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,661 >>> mbox cmd response: success
17,720,754 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,723,241 UART: [afmc] ++
17,723,833 UART: [afmc] CDI.KEYID = 6
17,724,768 UART: [afmc] SUBJECT.KEYID = 7
17,726,041 UART: [afmc] AUTHORITY.KEYID = 5
21,094,654 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,284 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,593 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,740 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,141 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,462,030 UART: [afmc] --
23,466,005 UART: [cold-reset] --
23,470,949 UART: [state] Locking Datavault
23,475,816 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,593 UART: [state] Locking ICCM
23,478,667 UART: [exit] Launching FMC @ 0x40000130
23,487,063 UART:
23,487,301 UART: Running Caliptra FMC ...
23,488,402 UART:
23,488,560 UART: [state] CFI Enabled
23,554,966 UART: [fht] FMC Alias Private Key: 7
25,894,673 UART: [art] Extend RT PCRs Done
25,895,894 UART: [art] Lock RT PCRs Done
25,897,458 UART: [art] Populate DV Done
25,902,762 UART: [fht] FMC Alias Private Key: 7
25,904,300 UART: [art] Derive CDI
25,905,110 UART: [art] Store in slot 0x4
25,963,747 UART: [art] Derive Key Pair
25,964,744 UART: [art] Store priv key in slot 0x5
29,238,259 UART: [art] Derive Key Pair - Done
29,251,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,644 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,152 UART: [art] PUB.X = F5DF6CA644878F4C74747BCEBE6C34E69371EF0F2DCB7D178F0E3C99EBC183AD2851C5215382B8F1E8FCC19D22B1E377
31,548,453 UART: [art] PUB.Y = EC411C38700BF8A6D418439172E33DD938E3B37366747738AB1542577B950264C42801F608CFE6C1EA76574B1C0B4B56
31,555,674 UART: [art] SIG.R = AC35F142CC0C3B7C04FCB9BF242995D30B4EA4A67AF5525FC388E43AE4EB7E4836F758A580DC61686C44131E81018644
31,563,058 UART: [art] SIG.S = 8E163ADDFCFB8C06F6B640DB19F4119D82EF2F5289327B9E7C7CCCD332AE2F86AED6DA4790591007E896B9389A19A04B
32,868,024 UART: Caliptra RT
32,868,725 UART: [state] CFI Enabled
33,045,918 UART: [rt] RT listening for mailbox commands...
33,061,357 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,788,848 ready_for_fw is high
3,789,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,905 >>> mbox cmd response: success
17,956,378 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,651,545 UART:
23,651,942 UART: Running Caliptra FMC ...
23,653,257 UART:
23,653,450 UART: [state] CFI Enabled
23,721,753 UART: [fht] FMC Alias Private Key: 7
26,062,451 UART: [art] Extend RT PCRs Done
26,063,680 UART: [art] Lock RT PCRs Done
26,065,093 UART: [art] Populate DV Done
26,070,622 UART: [fht] FMC Alias Private Key: 7
26,072,157 UART: [art] Derive CDI
26,072,974 UART: [art] Store in slot 0x4
26,129,185 UART: [art] Derive Key Pair
26,130,226 UART: [art] Store priv key in slot 0x5
29,423,269 UART: [art] Derive Key Pair - Done
29,436,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,738 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,244 UART: [art] PUB.X = 5052CDDE1DB486036B33A7C9C66A543C050DB27D5544A5A90D65C555E1F7D243B3BABB9F96799299980931C43EBDA040
31,732,495 UART: [art] PUB.Y = 4868372FCA33E832C1D6D3F0CA3AE94CBCF2B3DA23FD9B17728B9D28D8E9C91E83AAB7730E94F710CECB91B798C61BA0
31,739,790 UART: [art] SIG.R = 397C619F2B137FBE678801B0FC376CC1809BFBED336E4DFF8A537162DEB15BA1BD01586FACC16BD10353F2E7CA106B5B
31,747,197 UART: [art] SIG.S = AD6103C6CFF2AF6094832515568A521F02132973651251DCDAB677ECC4FA65322D5C7B8A15921D83CFFE8FEFB1976651
33,051,622 UART: Caliptra RT
33,052,324 UART: [state] CFI Enabled
33,228,647 UART: [rt] RT listening for mailbox commands...
33,244,010 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,397 UART:
192,769 UART: Running Caliptra ROM ...
193,948 UART:
603,605 UART: [state] CFI Enabled
619,326 UART: [state] LifecycleState = Unprovisioned
621,269 UART: [state] DebugLocked = No
623,719 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,293 UART: [kat] SHA2-256
798,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,541 UART: [kat] ++
808,986 UART: [kat] sha1
818,577 UART: [kat] SHA2-256
821,287 UART: [kat] SHA2-384
827,380 UART: [kat] SHA2-512-ACC
829,572 UART: [kat] ECC-384
3,113,036 UART: [kat] HMAC-384Kdf
3,125,492 UART: [kat] LMS
4,315,573 UART: [kat] --
4,320,482 UART: [cold-reset] ++
4,321,909 UART: [fht] Storing FHT @ 0x50003400
4,332,452 UART: [idev] ++
4,333,009 UART: [idev] CDI.KEYID = 6
4,333,991 UART: [idev] SUBJECT.KEYID = 7
4,335,228 UART: [idev] UDS.KEYID = 0
4,336,180 ready_for_fw is high
4,336,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,222 UART: [idev] Erasing UDS.KEYID = 0
7,622,027 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,890 UART: [idev] --
7,646,293 UART: [ldev] ++
7,646,881 UART: [ldev] CDI.KEYID = 6
7,647,847 UART: [ldev] SUBJECT.KEYID = 5
7,649,052 UART: [ldev] AUTHORITY.KEYID = 7
7,650,281 UART: [ldev] FE.KEYID = 1
7,662,001 UART: [ldev] Erasing FE.KEYID = 1
10,948,638 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,834 UART: [ldev] --
13,308,450 UART: [fwproc] Waiting for Commands...
13,310,159 UART: [fwproc] Received command 0x46574c44
13,312,345 UART: [fwproc] Received Image of size 118548 bytes
17,414,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,487,708 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,560,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,890,098 >>> mbox cmd response: success
17,891,175 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
17,894,363 UART: [afmc] ++
17,895,002 UART: [afmc] CDI.KEYID = 6
17,895,884 UART: [afmc] SUBJECT.KEYID = 7
17,897,151 UART: [afmc] AUTHORITY.KEYID = 5
21,212,069 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,506,539 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,508,852 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,523,264 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,537,974 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,552,401 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,573,377 UART: [afmc] --
23,577,884 UART: [cold-reset] --
23,581,537 UART: [state] Locking Datavault
23,587,488 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,234 UART: [state] Locking ICCM
23,591,786 UART: [exit] Launching FMC @ 0x40000130
23,600,172 UART:
23,600,398 UART: Running Caliptra FMC ...
23,601,417 UART:
23,601,557 UART: [state] CFI Enabled
23,609,377 UART: [fht] FMC Alias Private Key: 7
25,949,034 UART: [art] Extend RT PCRs Done
25,950,258 UART: [art] Lock RT PCRs Done
25,951,910 UART: [art] Populate DV Done
25,957,430 UART: [fht] FMC Alias Private Key: 7
25,959,075 UART: [art] Derive CDI
25,959,887 UART: [art] Store in slot 0x4
26,002,318 UART: [art] Derive Key Pair
26,003,336 UART: [art] Store priv key in slot 0x5
29,245,318 UART: [art] Derive Key Pair - Done
29,257,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,853 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,360 UART: [art] PUB.X = D4445A91AA9CDFA3390707E3C4C65DB76537A3BB175FDD4F54DCDFE793EFDF6A835948F7430B25396A9EA02A54BC2C3D
31,546,653 UART: [art] PUB.Y = 9A7DDA1CB9322AF3310A86C3985D613F2547DCC596E00C969D9446B09C94C7031EADB0ABF3855EF770C889763D43ED6A
31,553,892 UART: [art] SIG.R = B1CCD399FC011D1035F74BB91A2C061253C91BD20EA5A1FD9F97A5B440888E28D758A416CE33EEC44A1248E63B7CF348
31,561,284 UART: [art] SIG.S = 4FCBC7E2D26E8BC50B443D9E490BC1EB6D75D11D3BC12BEED5EE1DB9DB94BF7BD84ED8BD5ADE3F70DF9B1519044AB4DC
32,866,444 UART: Caliptra RT
32,867,153 UART: [state] CFI Enabled
33,000,265 UART: [rt] RT listening for mailbox commands...
33,015,253 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,129,935 ready_for_fw is high
4,130,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,714 >>> mbox cmd response: success
18,172,102 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
23,814,526 UART:
23,814,924 UART: Running Caliptra FMC ...
23,816,058 UART:
23,816,223 UART: [state] CFI Enabled
23,823,962 UART: [fht] FMC Alias Private Key: 7
26,164,072 UART: [art] Extend RT PCRs Done
26,165,304 UART: [art] Lock RT PCRs Done
26,166,873 UART: [art] Populate DV Done
26,172,227 UART: [fht] FMC Alias Private Key: 7
26,173,820 UART: [art] Derive CDI
26,174,631 UART: [art] Store in slot 0x4
26,217,003 UART: [art] Derive Key Pair
26,217,999 UART: [art] Store priv key in slot 0x5
29,460,531 UART: [art] Derive Key Pair - Done
29,473,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,526 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,025 UART: [art] PUB.X = 15CFEC112922D6069947B6441FC92289118C4F63BD32E582B050DC56ED73631D4BEAC1840666F346FF8BADB7B2643887
31,763,289 UART: [art] PUB.Y = 6864AE097B10D2D2FAAD9384D19B05DD66433C5410F149D295FB78AA396104F8F9FA860B6A1C488012B41DD5ECEC7D91
31,770,535 UART: [art] SIG.R = 9AC4C634F0AD34F878ADEC6FD5B0168E721D2E3F57CE1B36281A3B562EF33483643753F2F4C4186DD53CDFC5844AD3B9
31,777,928 UART: [art] SIG.S = CEA81D7EA25DE5A4C077228C2270E850A662CDF4DDE55165D77D0D9234AF1967EC933E85A31CC3D4D0129B5A79534209
33,083,138 UART: Caliptra RT
33,083,847 UART: [state] CFI Enabled
33,217,240 UART: [rt] RT listening for mailbox commands...
33,231,964 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
191,991 UART:
192,363 UART: Running Caliptra ROM ...
193,456 UART:
193,598 UART: [state] CFI Enabled
264,256 UART: [state] LifecycleState = Unprovisioned
266,299 UART: [state] DebugLocked = No
268,458 UART: [state] WD Timer not started. Device not locked for debugging
272,095 UART: [kat] SHA2-256
451,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,496 UART: [kat] ++
462,943 UART: [kat] sha1
473,954 UART: [kat] SHA2-256
476,669 UART: [kat] SHA2-384
482,728 UART: [kat] SHA2-512-ACC
485,099 UART: [kat] ECC-384
2,949,429 UART: [kat] HMAC-384Kdf
2,971,498 UART: [kat] LMS
3,447,966 UART: [kat] --
3,451,534 UART: [cold-reset] ++
3,453,038 UART: [fht] FHT @ 0x50003400
3,464,088 UART: [idev] ++
3,464,835 UART: [idev] CDI.KEYID = 6
3,465,834 UART: [idev] SUBJECT.KEYID = 7
3,466,961 UART: [idev] UDS.KEYID = 0
3,467,885 ready_for_fw is high
3,468,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,982 UART: [idev] Erasing UDS.KEYID = 0
5,986,196 UART: [idev] Sha1 KeyId Algorithm
6,009,049 UART: [idev] --
6,015,750 UART: [ldev] ++
6,016,325 UART: [ldev] CDI.KEYID = 6
6,017,207 UART: [ldev] SUBJECT.KEYID = 5
6,018,365 UART: [ldev] AUTHORITY.KEYID = 7
6,019,702 UART: [ldev] FE.KEYID = 1
6,058,246 UART: [ldev] Erasing FE.KEYID = 1
8,566,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,358 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,281 UART: [ldev] --
10,375,520 UART: [fwproc] Wait for Commands...
10,378,690 UART: [fwproc] Recv command 0x46574c44
10,380,671 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,013 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,465 >>> mbox cmd response: success
14,346,540 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,350,429 UART: [afmc] ++
14,351,010 UART: [afmc] CDI.KEYID = 6
14,351,920 UART: [afmc] SUBJECT.KEYID = 7
14,353,130 UART: [afmc] AUTHORITY.KEYID = 5
16,895,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,311 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,471 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,308 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,314 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,684,925 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,708,231 UART: [afmc] --
18,712,638 UART: [cold-reset] --
18,717,953 UART: [state] Locking Datavault
18,724,652 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,405 UART: [state] Locking ICCM
18,727,503 UART: [exit] Launching FMC @ 0x40000130
18,735,893 UART:
18,736,123 UART: Running Caliptra FMC ...
18,737,222 UART:
18,737,380 UART: [state] CFI Enabled
18,794,860 UART: [fht] FMC Alias Private Key: 7
20,561,767 UART: [art] Extend RT PCRs Done
20,563,020 UART: [art] Lock RT PCRs Done
20,564,454 UART: [art] Populate DV Done
20,569,868 UART: [fht] FMC Alias Private Key: 7
20,571,470 UART: [art] Derive CDI
20,572,232 UART: [art] Store in slot 0x4
20,627,838 UART: [art] Derive Key Pair
20,628,883 UART: [art] Store priv key in slot 0x5
23,092,493 UART: [art] Derive Key Pair - Done
23,105,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,023 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,525 UART: [art] PUB.X = F9AFD35E273BCE0FF8D385E999C761285B66619E2374BA7541695961C86D86764E23E13407778D88E0548E668DBBAA52
24,826,747 UART: [art] PUB.Y = C476E5A2E932D81FD3D9DD806F0DBE54DB26646234647B9EC9D0942ED5DF404F07DD251BA671CB1D93F2A80587F9AA0F
24,834,041 UART: [art] SIG.R = 256083B0B4D0BA55ED7A4A3EC69951362A06577FB9CAB824032225552072672C8A847A3509F6DD7D88C1DD3E40ACD742
24,841,379 UART: [art] SIG.S = 96F7E4C44A241A8D642E6A683302D67311183E0F4511AD994DAA99FB1399286EB1E9C316F10C492B5CBC89CA8A4DABF9
25,820,112 UART: Caliptra RT
25,821,167 UART: [state] CFI Enabled
26,001,458 UART: [rt] RT listening for mailbox commands...
26,016,599 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,463,398 ready_for_fw is high
3,463,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,701 >>> mbox cmd response: success
14,217,161 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,492,862 UART:
18,493,251 UART: Running Caliptra FMC ...
18,494,444 UART:
18,494,614 UART: [state] CFI Enabled
18,562,469 UART: [fht] FMC Alias Private Key: 7
20,329,203 UART: [art] Extend RT PCRs Done
20,330,425 UART: [art] Lock RT PCRs Done
20,332,380 UART: [art] Populate DV Done
20,338,008 UART: [fht] FMC Alias Private Key: 7
20,339,569 UART: [art] Derive CDI
20,340,382 UART: [art] Store in slot 0x4
20,394,914 UART: [art] Derive Key Pair
20,395,952 UART: [art] Store priv key in slot 0x5
22,858,813 UART: [art] Derive Key Pair - Done
22,871,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,584,059 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,579 UART: [art] PUB.X = 8210DBF20D850FFC16F1AE07C2BB8705C4A1D2D5B284324FA2E5282D1B7BC32787EF8EC3BEF3F6204A1E5345B7E6B8D0
24,592,892 UART: [art] PUB.Y = 00CA5D2BDA1F5C9F065D51889E9FCD3DBFF0EFF3F69296BA42FC2C29DCE7A4F9B59F35562692CE39C1209EB4D0ECD0A5
24,600,109 UART: [art] SIG.R = A674224EA35832F1241D8E54E188A8B91BED7D13AD1BFADA1BEE2135AD34E551A71CF51F16DAC286F85E0E3160A5BE49
24,607,563 UART: [art] SIG.S = 3A6FEB6222E186BA839F87FEF658A23BF46EF34BEA9DC80521AA176760EACE2B1845295BE7B494025CF4BCB0DE2F9D98
25,586,208 UART: Caliptra RT
25,586,910 UART: [state] CFI Enabled
25,766,630 UART: [rt] RT listening for mailbox commands...
25,781,885 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,625 UART:
192,996 UART: Running Caliptra ROM ...
194,184 UART:
603,775 UART: [state] CFI Enabled
619,603 UART: [state] LifecycleState = Unprovisioned
621,589 UART: [state] DebugLocked = No
624,336 UART: [state] WD Timer not started. Device not locked for debugging
627,450 UART: [kat] SHA2-256
807,043 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,852 UART: [kat] ++
818,340 UART: [kat] sha1
829,646 UART: [kat] SHA2-256
832,327 UART: [kat] SHA2-384
837,614 UART: [kat] SHA2-512-ACC
839,982 UART: [kat] ECC-384
3,283,155 UART: [kat] HMAC-384Kdf
3,296,235 UART: [kat] LMS
3,772,702 UART: [kat] --
3,776,152 UART: [cold-reset] ++
3,777,868 UART: [fht] FHT @ 0x50003400
3,790,131 UART: [idev] ++
3,790,700 UART: [idev] CDI.KEYID = 6
3,791,585 UART: [idev] SUBJECT.KEYID = 7
3,792,899 UART: [idev] UDS.KEYID = 0
3,793,804 ready_for_fw is high
3,794,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,946 UART: [idev] Erasing UDS.KEYID = 0
6,270,992 UART: [idev] Sha1 KeyId Algorithm
6,294,932 UART: [idev] --
6,299,880 UART: [ldev] ++
6,300,460 UART: [ldev] CDI.KEYID = 6
6,301,442 UART: [ldev] SUBJECT.KEYID = 5
6,302,605 UART: [ldev] AUTHORITY.KEYID = 7
6,303,839 UART: [ldev] FE.KEYID = 1
6,315,460 UART: [ldev] Erasing FE.KEYID = 1
8,795,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,519 UART: [ldev] --
10,592,377 UART: [fwproc] Wait for Commands...
10,593,985 UART: [fwproc] Recv command 0x46574c44
10,596,028 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,185 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,199 >>> mbox cmd response: success
14,566,366 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,568,524 UART: [afmc] ++
14,569,123 UART: [afmc] CDI.KEYID = 6
14,570,006 UART: [afmc] SUBJECT.KEYID = 7
14,571,233 UART: [afmc] AUTHORITY.KEYID = 5
17,070,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,797,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,858 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,463 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,298 UART: [afmc] --
18,873,361 UART: [cold-reset] --
18,877,821 UART: [state] Locking Datavault
18,882,096 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,798 UART: [state] Locking ICCM
18,884,924 UART: [exit] Launching FMC @ 0x40000130
18,893,379 UART:
18,893,614 UART: Running Caliptra FMC ...
18,894,718 UART:
18,894,877 UART: [state] CFI Enabled
18,902,840 UART: [fht] FMC Alias Private Key: 7
20,669,163 UART: [art] Extend RT PCRs Done
20,670,378 UART: [art] Lock RT PCRs Done
20,672,114 UART: [art] Populate DV Done
20,677,688 UART: [fht] FMC Alias Private Key: 7
20,679,336 UART: [art] Derive CDI
20,680,153 UART: [art] Store in slot 0x4
20,722,983 UART: [art] Derive Key Pair
20,724,019 UART: [art] Store priv key in slot 0x5
23,150,833 UART: [art] Derive Key Pair - Done
23,163,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,984 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,486 UART: [art] PUB.X = 5EFCB39A3342B5AAF9961AB2DD394FA611E46B05A794C0968C78B9BBF8BD88770579EE8F6FEA8A7F8BFF3E03D34EEA77
24,878,786 UART: [art] PUB.Y = 73FEB4BF19658355154D331F18ABA7AAE7AFB3BEED56CDE52DC38AA93EC474A0F75AECDD25AA4BE203A9899A776E5682
24,886,071 UART: [art] SIG.R = FAF060DF6A19AD91170C1A052F3FAA3FE5541FF9B1B43B11D7F950FD62CF7328B52111D0663BCB4EDA7130E1DB4CB4AE
24,893,518 UART: [art] SIG.S = 4AB4BC1A0A886E807798366E4F18BEE475D3B45F127559C3A8FD6468692308C6380970538DE30BE3E765E8C22A3CA838
25,872,928 UART: Caliptra RT
25,873,631 UART: [state] CFI Enabled
26,006,153 UART: [rt] RT listening for mailbox commands...
26,021,522 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,784,150 ready_for_fw is high
3,784,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,366 >>> mbox cmd response: success
14,445,817 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
18,685,440 UART:
18,685,815 UART: Running Caliptra FMC ...
18,687,015 UART:
18,687,201 UART: [state] CFI Enabled
18,694,940 UART: [fht] FMC Alias Private Key: 7
20,460,662 UART: [art] Extend RT PCRs Done
20,461,883 UART: [art] Lock RT PCRs Done
20,463,558 UART: [art] Populate DV Done
20,469,045 UART: [fht] FMC Alias Private Key: 7
20,470,740 UART: [art] Derive CDI
20,471,569 UART: [art] Store in slot 0x4
20,514,062 UART: [art] Derive Key Pair
20,515,089 UART: [art] Store priv key in slot 0x5
22,941,911 UART: [art] Derive Key Pair - Done
22,955,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,661,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,392 UART: [art] PUB.X = 62EB2743A9BEB45911A3C3076C02C6295273C562F116504619486AA0FC7E9887EA81FD9AD0DAFD95B66EEB4CDCB043AD
24,670,653 UART: [art] PUB.Y = 5759D910FB71D91CA1484F41BFBEE782099280D984B145D6CC28A011EDBDFDA396C1EAAD2E7D9D571F4A5277D321B07F
24,677,914 UART: [art] SIG.R = E1CCB01A111A076D62E04189D9F4098E4BA02556ACCAD5DDF90B2A5B77E8E705E6FA9BFE14C5A5950E51DBBFF58EADF2
24,685,369 UART: [art] SIG.S = 3217C6307B50EEB20572021328725EAE2D38EA2440851D52133877C8072FF364DFC5A61BF36065F046598F7C4AB34E35
25,664,249 UART: Caliptra RT
25,664,951 UART: [state] CFI Enabled
25,797,586 UART: [rt] RT listening for mailbox commands...
25,812,840 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,959 UART:
192,321 UART: Running Caliptra ROM ...
193,457 UART:
193,601 UART: [state] CFI Enabled
266,154 UART: [state] LifecycleState = Unprovisioned
268,574 UART: [state] DebugLocked = No
269,897 UART: [state] WD Timer not started. Device not locked for debugging
274,778 UART: [kat] SHA2-256
464,606 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,413 UART: [kat] ++
475,888 UART: [kat] sha1
488,112 UART: [kat] SHA2-256
491,092 UART: [kat] SHA2-384
497,127 UART: [kat] SHA2-512-ACC
499,716 UART: [kat] ECC-384
2,948,525 UART: [kat] HMAC-384Kdf
2,971,735 UART: [kat] LMS
3,503,527 UART: [kat] --
3,507,267 UART: [cold-reset] ++
3,509,913 UART: [fht] FHT @ 0x50003400
3,521,595 UART: [idev] ++
3,522,236 UART: [idev] CDI.KEYID = 6
3,523,213 UART: [idev] SUBJECT.KEYID = 7
3,524,380 UART: [idev] UDS.KEYID = 0
3,525,423 ready_for_fw is high
3,525,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,687 UART: [idev] Erasing UDS.KEYID = 0
6,029,379 UART: [idev] Sha1 KeyId Algorithm
6,053,280 UART: [idev] --
6,058,138 UART: [ldev] ++
6,058,823 UART: [ldev] CDI.KEYID = 6
6,059,739 UART: [ldev] SUBJECT.KEYID = 5
6,060,899 UART: [ldev] AUTHORITY.KEYID = 7
6,062,127 UART: [ldev] FE.KEYID = 1
6,100,646 UART: [ldev] Erasing FE.KEYID = 1
8,609,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,608 UART: [ldev] --
10,414,581 UART: [fwproc] Wait for Commands...
10,416,118 UART: [fwproc] Recv command 0x46574c44
10,418,431 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,757 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,636 >>> mbox cmd response: success
14,674,750 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,678,534 UART: [afmc] ++
14,679,237 UART: [afmc] CDI.KEYID = 6
14,680,416 UART: [afmc] SUBJECT.KEYID = 7
14,681,894 UART: [afmc] AUTHORITY.KEYID = 5
17,210,763 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,022 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,174 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,663 UART: [afmc] --
19,012,061 UART: [cold-reset] --
19,015,821 UART: [state] Locking Datavault
19,023,442 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,633 UART: [state] Locking ICCM
19,026,975 UART: [exit] Launching FMC @ 0x40000130
19,035,639 UART:
19,035,873 UART: Running Caliptra FMC ...
19,036,974 UART:
19,037,137 UART: [state] CFI Enabled
19,093,967 UART: [fht] FMC Alias Private Key: 7
20,860,144 UART: [art] Extend RT PCRs Done
20,861,365 UART: [art] Lock RT PCRs Done
20,863,122 UART: [art] Populate DV Done
20,868,641 UART: [fht] FMC Alias Private Key: 7
20,870,336 UART: [art] Derive CDI
20,871,072 UART: [art] Store in slot 0x4
20,926,314 UART: [art] Derive Key Pair
20,927,355 UART: [art] Store priv key in slot 0x5
23,390,064 UART: [art] Derive Key Pair - Done
23,402,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,461 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,967 UART: [art] PUB.X = 31A8E3FF3F8C1AF879D84128AE25E83D52B99C16ED2783CC881438BE384BE9A6FCA34C8426B99D0CA258B6DEB5E116F6
25,124,226 UART: [art] PUB.Y = C1C614C1205A15AD3776A5DCEA35B680248E964559B6BB937B8410AC4DFF1A4476CD037D030AB173ECE298CA4BC5B687
25,131,487 UART: [art] SIG.R = 1920C1195D6496C7BC094ADA78117B56C8155B1A43D47B7A421524B0728CDB7D3E299135E028F6B05564CCF37742F4A6
25,138,889 UART: [art] SIG.S = 3242C34CEA6579B4FA2DEE97BD05844382E157E6312F2E840A686013EFA748130F68F4CAB7A08E878B36AB513FA65F65
26,117,956 UART: Caliptra RT
26,118,672 UART: [state] CFI Enabled
26,298,510 UART: [rt] RT listening for mailbox commands...
26,313,659 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,440,778 ready_for_fw is high
3,441,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,567 >>> mbox cmd response: success
14,819,992 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,133,024 UART:
19,133,424 UART: Running Caliptra FMC ...
19,134,525 UART:
19,134,682 UART: [state] CFI Enabled
19,202,312 UART: [fht] FMC Alias Private Key: 7
20,990,298 UART: [art] Extend RT PCRs Done
20,991,522 UART: [art] Lock RT PCRs Done
20,993,089 UART: [art] Populate DV Done
20,998,302 UART: [fht] FMC Alias Private Key: 7
20,999,841 UART: [art] Derive CDI
21,000,657 UART: [art] Store in slot 0x4
21,055,955 UART: [art] Derive Key Pair
21,056,957 UART: [art] Store priv key in slot 0x5
23,519,552 UART: [art] Derive Key Pair - Done
23,532,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,245,802 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,312 UART: [art] PUB.X = 757B86909FB0DBD5547EBBE1D97B06D56A7291048B1E30384F8B15C4DC96709CB5656661088A67F9F08533550D3B37DA
25,254,551 UART: [art] PUB.Y = 04AA8E51AC2A0A9040D776210AE020E7C0E65B630F1A6F1D792286EAFBE1F9C11518B4ACA679DF6F2FC8EB1BFE00BFA7
25,261,785 UART: [art] SIG.R = AF0275C98C184ED4C3F02EF5BD94F6AC4660A44257D4425A193369DD26CB7C4A69EFAA16AF23D8BA8C98E333508B4170
25,269,181 UART: [art] SIG.S = 6DF0A38C40CE89F9CA961ED150D849437B5B4FE25DD9A5A4D4E8255F7CCA366FCBBDE2ACEFACA54B23AE28B7B09A194A
26,247,827 UART: Caliptra RT
26,248,554 UART: [state] CFI Enabled
26,429,110 UART: [rt] RT listening for mailbox commands...
26,444,256 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,935 writing to cptra_bootfsm_go
194,083 UART:
194,454 UART: Running Caliptra ROM ...
195,656 UART:
605,115 UART: [state] CFI Enabled
616,825 UART: [state] LifecycleState = Unprovisioned
619,211 UART: [state] DebugLocked = No
620,749 UART: [state] WD Timer not started. Device not locked for debugging
624,800 UART: [kat] SHA2-256
814,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,471 UART: [kat] ++
826,009 UART: [kat] sha1
836,929 UART: [kat] SHA2-256
839,891 UART: [kat] SHA2-384
845,681 UART: [kat] SHA2-512-ACC
848,268 UART: [kat] ECC-384
3,289,039 UART: [kat] HMAC-384Kdf
3,301,355 UART: [kat] LMS
3,833,137 UART: [kat] --
3,838,055 UART: [cold-reset] ++
3,839,847 UART: [fht] FHT @ 0x50003400
3,851,413 UART: [idev] ++
3,852,166 UART: [idev] CDI.KEYID = 6
3,853,061 UART: [idev] SUBJECT.KEYID = 7
3,854,247 UART: [idev] UDS.KEYID = 0
3,855,361 ready_for_fw is high
3,855,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,535 UART: [idev] Erasing UDS.KEYID = 0
6,331,514 UART: [idev] Sha1 KeyId Algorithm
6,355,600 UART: [idev] --
6,361,219 UART: [ldev] ++
6,361,903 UART: [ldev] CDI.KEYID = 6
6,362,821 UART: [ldev] SUBJECT.KEYID = 5
6,364,071 UART: [ldev] AUTHORITY.KEYID = 7
6,365,262 UART: [ldev] FE.KEYID = 1
6,377,695 UART: [ldev] Erasing FE.KEYID = 1
8,853,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,611 UART: [ldev] --
10,643,102 UART: [fwproc] Wait for Commands...
10,645,269 UART: [fwproc] Recv command 0x46574c44
10,647,597 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,126 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,403 >>> mbox cmd response: success
14,905,484 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
14,909,278 UART: [afmc] ++
14,909,987 UART: [afmc] CDI.KEYID = 6
14,911,101 UART: [afmc] SUBJECT.KEYID = 7
14,912,652 UART: [afmc] AUTHORITY.KEYID = 5
17,416,240 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,690 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,602 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,357 UART: [afmc] --
19,212,078 UART: [cold-reset] --
19,216,176 UART: [state] Locking Datavault
19,222,569 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,716 UART: [state] Locking ICCM
19,226,223 UART: [exit] Launching FMC @ 0x40000130
19,234,851 UART:
19,235,086 UART: Running Caliptra FMC ...
19,236,196 UART:
19,236,359 UART: [state] CFI Enabled
19,244,490 UART: [fht] FMC Alias Private Key: 7
21,011,337 UART: [art] Extend RT PCRs Done
21,012,549 UART: [art] Lock RT PCRs Done
21,014,143 UART: [art] Populate DV Done
21,019,504 UART: [fht] FMC Alias Private Key: 7
21,021,206 UART: [art] Derive CDI
21,022,035 UART: [art] Store in slot 0x4
21,064,599 UART: [art] Derive Key Pair
21,065,669 UART: [art] Store priv key in slot 0x5
23,492,391 UART: [art] Derive Key Pair - Done
23,505,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,901 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,403 UART: [art] PUB.X = 9065B506F5D3F50EAFFAADBDAC11BCF1DC6617654E3BA66222DCDB7039EA7AF521C06E9F8459C59484A4ECD25AC68DEA
25,220,670 UART: [art] PUB.Y = A1DF4D33307BC25554BECE2BE10B3B95125CF92ED840AE21C6979EDFB8D5FFA313630BD03C1EA34109ABA398C2D7E376
25,227,979 UART: [art] SIG.R = C29673B121B7D1D35D84F8BFA8FE9BA620C3146471A6A83AF944378CE27F2E9681E3634056B68960B62C0D270A8B6F53
25,235,341 UART: [art] SIG.S = 80D99343799C95F6E6AF266530B745C08AB23CC7DAA08E359AD267F9C08C8C6B4346543D8AFBAB2BE27811BB0F082611
26,214,310 UART: Caliptra RT
26,215,004 UART: [state] CFI Enabled
26,346,658 UART: [rt] RT listening for mailbox commands...
26,361,765 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,754,422 ready_for_fw is high
3,755,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,554 >>> mbox cmd response: success
15,050,749 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
19,300,559 UART:
19,300,937 UART: Running Caliptra FMC ...
19,302,134 UART:
19,302,324 UART: [state] CFI Enabled
19,309,904 UART: [fht] FMC Alias Private Key: 7
21,075,619 UART: [art] Extend RT PCRs Done
21,076,857 UART: [art] Lock RT PCRs Done
21,078,574 UART: [art] Populate DV Done
21,084,122 UART: [fht] FMC Alias Private Key: 7
21,085,732 UART: [art] Derive CDI
21,086,480 UART: [art] Store in slot 0x4
21,129,353 UART: [art] Derive Key Pair
21,130,353 UART: [art] Store priv key in slot 0x5
23,557,747 UART: [art] Derive Key Pair - Done
23,570,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,214 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,718 UART: [art] PUB.X = 16D5293EE0B3F430D8E43F96BE6E2E951904DB8C7FA7E68C7CE9582EE0397E40B8465B8709051CDDB92CE2FE6B90D579
25,285,987 UART: [art] PUB.Y = 718265C9CB0F60603F98BD297511E1FC06002B3DB3FD76B237CAFB49C84B3252E598EA9805D9D54442F15372D0B11A09
25,293,246 UART: [art] SIG.R = F5061D63EEBD3C178E1F90C111BDE014D067686E3CF0D8CBA691D0AC1D5E831A01A8E2DD83DC24FE97B218F60F415D3C
25,300,649 UART: [art] SIG.S = 0CA56D7215C5211F371C2B2F78335745ACDEA1B12C7E10A2BA5ECD423BF3F3C618E8A3A48BF2E1F36DE7ED3A7DCE5CA4
26,280,147 UART: Caliptra RT
26,280,863 UART: [state] CFI Enabled
26,414,124 UART: [rt] RT listening for mailbox commands...
26,429,578 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,079 UART: [kat] SHA2-256
882,010 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,125 UART: [kat] ++
886,277 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,306 UART: [kat] SHA2-512-ACC
897,207 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,112 UART: [kat] LMS
1,475,308 UART: [kat] --
1,476,291 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,722 UART: [idev] ++
1,479,890 UART: [idev] CDI.KEYID = 6
1,480,250 UART: [idev] SUBJECT.KEYID = 7
1,480,674 UART: [idev] UDS.KEYID = 0
1,481,019 ready_for_fw is high
1,481,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,854 UART: [idev] Erasing UDS.KEYID = 0
1,505,198 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,928 UART: [idev] --
1,515,075 UART: [ldev] ++
1,515,243 UART: [ldev] CDI.KEYID = 6
1,515,606 UART: [ldev] SUBJECT.KEYID = 5
1,516,032 UART: [ldev] AUTHORITY.KEYID = 7
1,516,495 UART: [ldev] FE.KEYID = 1
1,521,671 UART: [ldev] Erasing FE.KEYID = 1
1,547,044 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,616 UART: [ldev] --
1,585,973 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 118548 bytes
2,931,893 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,287 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,806 >>> mbox cmd response: success
3,130,806 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,131,978 UART: [afmc] ++
3,132,146 UART: [afmc] CDI.KEYID = 6
3,132,508 UART: [afmc] SUBJECT.KEYID = 7
3,132,933 UART: [afmc] AUTHORITY.KEYID = 5
3,168,286 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,610 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,099 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,982 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,665 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,639 UART: [afmc] --
3,211,755 UART: [cold-reset] --
3,212,503 UART: [state] Locking Datavault
3,213,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,434 UART: [state] Locking ICCM
3,215,088 UART: [exit] Launching FMC @ 0x40000130
3,220,418 UART:
3,220,434 UART: Running Caliptra FMC ...
3,220,842 UART:
3,220,896 UART: [state] CFI Enabled
3,231,292 UART: [fht] FMC Alias Private Key: 7
3,350,110 UART: [art] Extend RT PCRs Done
3,350,538 UART: [art] Lock RT PCRs Done
3,351,878 UART: [art] Populate DV Done
3,360,271 UART: [fht] FMC Alias Private Key: 7
3,361,233 UART: [art] Derive CDI
3,361,513 UART: [art] Store in slot 0x4
3,447,137 UART: [art] Derive Key Pair
3,447,497 UART: [art] Store priv key in slot 0x5
3,460,396 UART: [art] Derive Key Pair - Done
3,475,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,701 UART: [art] PUB.X = 1AAC6DC00FE26CF7AC5A348FDF82E659C7D35E26E034047146607E86F9B0235C5F3D8857D56EA4F9C7023157DCE6F803
3,498,467 UART: [art] PUB.Y = BCF5D79F0D0517A31866D97C788C030B1C318457777389F2AB0943943972F25C8E2B3FB7203BD5CDA45487ECFD009D36
3,505,380 UART: [art] SIG.R = 058E34B456E5E8EE6393273D131924589A7B290477A4621588110A37B8AE194E8B3FEB0FBA7E9A418113F01B8132A90F
3,512,129 UART: [art] SIG.S = F3974B58B28ABA1415933F98A669C537CBF52BDCCEEBDA9FDC85928EB68AF4AC55CDB7C8160503A4B6D37C009E76B1FE
3,535,927 UART: Caliptra RT
3,536,178 UART: [state] CFI Enabled
3,656,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,807 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,925 ready_for_fw is high
1,361,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,240 >>> mbox cmd response: success
2,980,240 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,041,571 UART:
3,041,587 UART: Running Caliptra FMC ...
3,041,995 UART:
3,042,049 UART: [state] CFI Enabled
3,052,657 UART: [fht] FMC Alias Private Key: 7
3,171,323 UART: [art] Extend RT PCRs Done
3,171,751 UART: [art] Lock RT PCRs Done
3,173,151 UART: [art] Populate DV Done
3,181,144 UART: [fht] FMC Alias Private Key: 7
3,182,188 UART: [art] Derive CDI
3,182,468 UART: [art] Store in slot 0x4
3,267,758 UART: [art] Derive Key Pair
3,268,118 UART: [art] Store priv key in slot 0x5
3,281,417 UART: [art] Derive Key Pair - Done
3,296,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,581 UART: [art] PUB.X = 4CE7D28459A5939A5131A1E6CE365978991240B5ECB0417085C419262630A0BF1577FC318E0ECD3B95E7A7F590D8F351
3,319,344 UART: [art] PUB.Y = 7A05B64C6F8A00BF50A5EF270AC8CABAD83EF930917EB5BE8682E744344D1077E3C9C22F7A36E965A1B9940B5E78C322
3,326,273 UART: [art] SIG.R = B4B943509DEA14F8957A0D51DEFEDE3E91DD4AF9CEAC4A54AAAC5F7DA7273F2278EF2D789A093D484B35944BA48CFB13
3,333,061 UART: [art] SIG.S = 6DCA287A2D949B484537836E08CBA3A6CD893B478CD351AB5FCDE77D0CD33D506F0C9416FC9C9045F8A31D877D1349DD
3,357,070 UART: Caliptra RT
3,357,321 UART: [state] CFI Enabled
3,477,229 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,638 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,300 UART: [kat] SHA2-256
882,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,346 UART: [kat] ++
886,498 UART: [kat] sha1
890,774 UART: [kat] SHA2-256
892,712 UART: [kat] SHA2-384
895,565 UART: [kat] SHA2-512-ACC
897,466 UART: [kat] ECC-384
903,387 UART: [kat] HMAC-384Kdf
908,019 UART: [kat] LMS
1,476,215 UART: [kat] --
1,476,984 UART: [cold-reset] ++
1,477,388 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 ready_for_fw is high
1,481,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,506,279 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,979 UART: [idev] --
1,515,840 UART: [ldev] ++
1,516,008 UART: [ldev] CDI.KEYID = 6
1,516,371 UART: [ldev] SUBJECT.KEYID = 5
1,516,797 UART: [ldev] AUTHORITY.KEYID = 7
1,517,260 UART: [ldev] FE.KEYID = 1
1,522,728 UART: [ldev] Erasing FE.KEYID = 1
1,548,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,099 UART: [ldev] --
1,587,472 UART: [fwproc] Waiting for Commands...
1,588,205 UART: [fwproc] Received command 0x46574c44
1,588,996 UART: [fwproc] Received Image of size 118548 bytes
2,933,200 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,378 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,596 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,809 >>> mbox cmd response: success
3,131,809 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,133,025 UART: [afmc] ++
3,133,193 UART: [afmc] CDI.KEYID = 6
3,133,555 UART: [afmc] SUBJECT.KEYID = 7
3,133,980 UART: [afmc] AUTHORITY.KEYID = 5
3,168,967 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,305 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,794 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,677 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,360 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,170 UART: [afmc] --
3,212,194 UART: [cold-reset] --
3,212,952 UART: [state] Locking Datavault
3,214,075 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,679 UART: [state] Locking ICCM
3,215,111 UART: [exit] Launching FMC @ 0x40000130
3,220,441 UART:
3,220,457 UART: Running Caliptra FMC ...
3,220,865 UART:
3,221,008 UART: [state] CFI Enabled
3,231,410 UART: [fht] FMC Alias Private Key: 7
3,350,924 UART: [art] Extend RT PCRs Done
3,351,352 UART: [art] Lock RT PCRs Done
3,352,794 UART: [art] Populate DV Done
3,360,817 UART: [fht] FMC Alias Private Key: 7
3,361,841 UART: [art] Derive CDI
3,362,121 UART: [art] Store in slot 0x4
3,448,065 UART: [art] Derive Key Pair
3,448,425 UART: [art] Store priv key in slot 0x5
3,462,098 UART: [art] Derive Key Pair - Done
3,476,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,410 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,175 UART: [art] PUB.X = 202A608737DD78682EE5E479F73CED4111EFF5D40D161552CE4A1DAF5BE015EF1ED3A771897BCD36A6F42FCC524EDF2F
3,499,960 UART: [art] PUB.Y = 42CB9241BF4CD82347BC77FF817D50B300C548BD317875418F013ABCBE44D4C9BCB4409BCB353BBDC1DEDFF002220E89
3,506,895 UART: [art] SIG.R = 62E240A0A63823B93FA80892FB0BE6A54A36633F2176A4DC636A65F019A812590693D8BF21454661E609D89757ABDC3A
3,513,649 UART: [art] SIG.S = 75BE40E7B047EF6EBDF35B530F8E4B82D18BA430629D790E6E3AFA37A28716CFAF391E903257D45614B61822F0ECC58C
3,537,245 UART: Caliptra RT
3,537,588 UART: [state] CFI Enabled
3,658,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,672,758 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,126 ready_for_fw is high
1,363,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,693 >>> mbox cmd response: success
2,981,693 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
3,043,394 UART:
3,043,410 UART: Running Caliptra FMC ...
3,043,818 UART:
3,043,961 UART: [state] CFI Enabled
3,054,291 UART: [fht] FMC Alias Private Key: 7
3,173,283 UART: [art] Extend RT PCRs Done
3,173,711 UART: [art] Lock RT PCRs Done
3,175,089 UART: [art] Populate DV Done
3,183,396 UART: [fht] FMC Alias Private Key: 7
3,184,444 UART: [art] Derive CDI
3,184,724 UART: [art] Store in slot 0x4
3,270,686 UART: [art] Derive Key Pair
3,271,046 UART: [art] Store priv key in slot 0x5
3,285,035 UART: [art] Derive Key Pair - Done
3,299,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,727 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,492 UART: [art] PUB.X = 2CAB29C52683057FD3E1834F2FEABF7FB1441C1E98E845DB708A8D6D0BA10230903AFAB356447403D79D8AB6A398E858
3,323,258 UART: [art] PUB.Y = 72E3AFAC0D7AA200540AECF6EE508F750A94616F7604C54E27544EB518E6F6B7CF79CC02C65BCFD8C073851FC262AA32
3,330,185 UART: [art] SIG.R = DDB62036D73A6B71510F5515847154217B2ACA65E94F4E1CD633CA4784998EDA55FEADC6AEB6AEDC46FB81A9F872DE7B
3,336,970 UART: [art] SIG.S = 1A4ED50B450F7A3027B0A296CA04E02063C0BD31530C39700CF684E017E74A1CF8A9F4D792B489BCF89C1B17E74DBB8E
3,361,287 UART: Caliptra RT
3,361,630 UART: [state] CFI Enabled
3,481,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,496,123 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,639 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
891,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,562 UART: [kat] ++
895,714 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,605 UART: [kat] SHA2-512-ACC
906,506 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,743 UART: [kat] LMS
1,169,055 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,282 UART: [fht] FHT @ 0x50003400
1,173,038 UART: [idev] ++
1,173,206 UART: [idev] CDI.KEYID = 6
1,173,567 UART: [idev] SUBJECT.KEYID = 7
1,173,992 UART: [idev] UDS.KEYID = 0
1,174,338 ready_for_fw is high
1,174,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,173 UART: [idev] --
1,209,108 UART: [ldev] ++
1,209,276 UART: [ldev] CDI.KEYID = 6
1,209,640 UART: [ldev] SUBJECT.KEYID = 5
1,210,067 UART: [ldev] AUTHORITY.KEYID = 7
1,210,530 UART: [ldev] FE.KEYID = 1
1,215,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,886 UART: [ldev] --
1,280,157 UART: [fwproc] Wait for Commands...
1,280,940 UART: [fwproc] Recv command 0x46574c44
1,281,673 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,443 >>> mbox cmd response: success
2,824,443 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,825,665 UART: [afmc] ++
2,825,833 UART: [afmc] CDI.KEYID = 6
2,826,196 UART: [afmc] SUBJECT.KEYID = 7
2,826,622 UART: [afmc] AUTHORITY.KEYID = 5
2,862,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,299 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,180 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,881 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,664 UART: [afmc] --
2,905,647 UART: [cold-reset] --
2,906,533 UART: [state] Locking Datavault
2,907,688 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,292 UART: [state] Locking ICCM
2,908,808 UART: [exit] Launching FMC @ 0x40000130
2,914,138 UART:
2,914,154 UART: Running Caliptra FMC ...
2,914,562 UART:
2,914,616 UART: [state] CFI Enabled
2,925,444 UART: [fht] FMC Alias Private Key: 7
3,044,270 UART: [art] Extend RT PCRs Done
3,044,698 UART: [art] Lock RT PCRs Done
3,045,936 UART: [art] Populate DV Done
3,054,169 UART: [fht] FMC Alias Private Key: 7
3,055,263 UART: [art] Derive CDI
3,055,543 UART: [art] Store in slot 0x4
3,140,920 UART: [art] Derive Key Pair
3,141,280 UART: [art] Store priv key in slot 0x5
3,154,558 UART: [art] Derive Key Pair - Done
3,169,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,025 UART: [art] PUB.X = 60B4275F09A7C1AB4D1B125906BA0D10893AB463BAC08FC6340B46800F6F3DEF055846A213A7F3F64CD73CF5C82A3CBB
3,192,789 UART: [art] PUB.Y = 9DBD3E6D47193ED4E32A1F8605326272EBDF56A6E212E213A1B1AAE4F5C97C42E16B6D9214593DDFA44CFB7F9030AB73
3,199,750 UART: [art] SIG.R = A637FA287932CE6A8E2CBB3CFBEDFDCEFF2153E4E23DE1FCA26890A15C089D9097DEE6968134B66A469BA7B7D8FFAA34
3,206,543 UART: [art] SIG.S = 2E0B44D502A5825C32D299053BB92B64C1DA5D9C797AA2480DEF76D573E40337FD56698B157D872178CD4582F994615E
3,230,112 UART: Caliptra RT
3,230,363 UART: [state] CFI Enabled
3,351,100 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,365,271 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,470 ready_for_fw is high
1,059,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,614 >>> mbox cmd response: success
2,677,614 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,739,133 UART:
2,739,149 UART: Running Caliptra FMC ...
2,739,557 UART:
2,739,611 UART: [state] CFI Enabled
2,750,041 UART: [fht] FMC Alias Private Key: 7
2,869,061 UART: [art] Extend RT PCRs Done
2,869,489 UART: [art] Lock RT PCRs Done
2,870,993 UART: [art] Populate DV Done
2,879,100 UART: [fht] FMC Alias Private Key: 7
2,880,072 UART: [art] Derive CDI
2,880,352 UART: [art] Store in slot 0x4
2,965,949 UART: [art] Derive Key Pair
2,966,309 UART: [art] Store priv key in slot 0x5
2,979,711 UART: [art] Derive Key Pair - Done
2,994,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,203 UART: [art] PUB.X = 48FBE012D35ADCF157C97F75D5224DFE4C514470687F04E148B7F66BBBB25F0661545502062084EA98BF14936D9AC8DA
3,016,965 UART: [art] PUB.Y = 15F170ACC853E639869DAA370119EAFDD41A65025289FE721FB0D76A4C44FFBDD870EEA16F34169DB9DB34A84F350C4C
3,023,920 UART: [art] SIG.R = 73E455A4D7EC37C5083CEB1E49397137657DB88BFAEC0B57D34108B44EAF87031D94520D2B3C367A3003C14F6A68EBB1
3,030,678 UART: [art] SIG.S = 9C9A1F982395D3D13F53B43D33B8E01E75162CB9FF94284AB7AAC444C8E2939FDF1E579FDFFF6610250C1E1F92DE4EF3
3,054,229 UART: Caliptra RT
3,054,480 UART: [state] CFI Enabled
3,174,517 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,162 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
891,241 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,345 UART: [kat] ++
895,497 UART: [kat] sha1
899,543 UART: [kat] SHA2-256
901,483 UART: [kat] SHA2-384
904,194 UART: [kat] SHA2-512-ACC
906,095 UART: [kat] ECC-384
915,896 UART: [kat] HMAC-384Kdf
920,644 UART: [kat] LMS
1,168,956 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,465 UART: [fht] FHT @ 0x50003400
1,173,127 UART: [idev] ++
1,173,295 UART: [idev] CDI.KEYID = 6
1,173,656 UART: [idev] SUBJECT.KEYID = 7
1,174,081 UART: [idev] UDS.KEYID = 0
1,174,427 ready_for_fw is high
1,174,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,036 UART: [idev] Sha1 KeyId Algorithm
1,207,930 UART: [idev] --
1,209,043 UART: [ldev] ++
1,209,211 UART: [ldev] CDI.KEYID = 6
1,209,575 UART: [ldev] SUBJECT.KEYID = 5
1,210,002 UART: [ldev] AUTHORITY.KEYID = 7
1,210,465 UART: [ldev] FE.KEYID = 1
1,215,637 UART: [ldev] Erasing FE.KEYID = 1
1,241,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,085 UART: [ldev] --
1,280,286 UART: [fwproc] Wait for Commands...
1,281,077 UART: [fwproc] Recv command 0x46574c44
1,281,810 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,325 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,580 >>> mbox cmd response: success
2,824,580 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,825,684 UART: [afmc] ++
2,825,852 UART: [afmc] CDI.KEYID = 6
2,826,215 UART: [afmc] SUBJECT.KEYID = 7
2,826,641 UART: [afmc] AUTHORITY.KEYID = 5
2,862,732 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,904 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,495 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,196 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,855 UART: [afmc] --
2,905,850 UART: [cold-reset] --
2,906,620 UART: [state] Locking Datavault
2,907,685 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,289 UART: [state] Locking ICCM
2,908,735 UART: [exit] Launching FMC @ 0x40000130
2,914,065 UART:
2,914,081 UART: Running Caliptra FMC ...
2,914,489 UART:
2,914,632 UART: [state] CFI Enabled
2,925,592 UART: [fht] FMC Alias Private Key: 7
3,044,286 UART: [art] Extend RT PCRs Done
3,044,714 UART: [art] Lock RT PCRs Done
3,046,044 UART: [art] Populate DV Done
3,054,291 UART: [fht] FMC Alias Private Key: 7
3,055,227 UART: [art] Derive CDI
3,055,507 UART: [art] Store in slot 0x4
3,141,204 UART: [art] Derive Key Pair
3,141,564 UART: [art] Store priv key in slot 0x5
3,155,378 UART: [art] Derive Key Pair - Done
3,169,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,708 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,473 UART: [art] PUB.X = 2ADD1A6232FA4F7D082A05F54D9FF23DE1546D2773E0B93F33F49C6A0BF8FC99894EA1E379D544AC0A541C92772902AE
3,193,238 UART: [art] PUB.Y = B842876A1F6118BBAF46F205335E40259C932353AF9DD35AFA7F83D7D1197593E045C53990EE09C5CECB1C6D33D1B802
3,200,183 UART: [art] SIG.R = 4F5F9187CF0C55B41F3E21D6994D4E2B343140E0B4D0E72F4D441A9D97152EDAA67883E5B5846054B0E3EA4CDD0E08D2
3,206,952 UART: [art] SIG.S = C6801271182E3ACD4A0B057CAD19923273E84078A02C5F79449F406E56A7EF2077816FF468278B03EB88A6A06C8E0DF9
3,230,418 UART: Caliptra RT
3,230,761 UART: [state] CFI Enabled
3,349,754 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,597 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,959 ready_for_fw is high
1,059,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,699 >>> mbox cmd response: success
2,678,699 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,741,498 UART:
2,741,514 UART: Running Caliptra FMC ...
2,741,922 UART:
2,742,065 UART: [state] CFI Enabled
2,752,577 UART: [fht] FMC Alias Private Key: 7
2,871,191 UART: [art] Extend RT PCRs Done
2,871,619 UART: [art] Lock RT PCRs Done
2,873,487 UART: [art] Populate DV Done
2,881,678 UART: [fht] FMC Alias Private Key: 7
2,882,740 UART: [art] Derive CDI
2,883,020 UART: [art] Store in slot 0x4
2,968,963 UART: [art] Derive Key Pair
2,969,323 UART: [art] Store priv key in slot 0x5
2,982,687 UART: [art] Derive Key Pair - Done
2,997,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,643 UART: [art] PUB.X = EDE7901E59035C108096625413242AC2ABBF9587A6766B64A77E171769018A96919261FA3CD7DB910DDDCE5F4CE507AE
3,020,403 UART: [art] PUB.Y = 229C8BE074D966C397BF35CE91A7C3633EFBB758A61B40E851F9A8B9C23B67164F7B2E94A4A4DE7354BD9D0860CD25D1
3,027,360 UART: [art] SIG.R = 29D804041CBE2941B8ABC902C637780FD9CE7418BBAACFED9A2100173AC1DAC3F7B85D90F54A12A75A8CE07AAB1D8737
3,034,114 UART: [art] SIG.S = 1529D64830D5070C6FC51EC641BA0DE6A52C5460E4465CDB27D0F54E3C191A012CF5595642CA7905D68A7913E4DBAF60
3,058,059 UART: Caliptra RT
3,058,402 UART: [state] CFI Enabled
3,178,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,191,925 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,700 UART: [kat] SHA2-256
893,350 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,475 UART: [kat] ++
897,627 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,586 UART: [kat] SHA2-512-ACC
908,487 UART: [kat] ECC-384
917,872 UART: [kat] HMAC-384Kdf
922,482 UART: [kat] LMS
1,170,810 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,171,993 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 ready_for_fw is high
1,176,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,727 UART: [idev] Sha1 KeyId Algorithm
1,209,339 UART: [idev] --
1,210,435 UART: [ldev] ++
1,210,603 UART: [ldev] CDI.KEYID = 6
1,210,966 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,217,147 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,793 UART: [ldev] --
1,282,068 UART: [fwproc] Wait for Commands...
1,282,774 UART: [fwproc] Recv command 0x46574c44
1,283,502 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,725 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,490 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,777 >>> mbox cmd response: success
2,826,777 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,827,925 UART: [afmc] ++
2,828,093 UART: [afmc] CDI.KEYID = 6
2,828,455 UART: [afmc] SUBJECT.KEYID = 7
2,828,880 UART: [afmc] AUTHORITY.KEYID = 5
2,865,305 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,216 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,808 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,373 UART: [afmc] --
2,908,357 UART: [cold-reset] --
2,909,197 UART: [state] Locking Datavault
2,910,394 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,998 UART: [state] Locking ICCM
2,911,434 UART: [exit] Launching FMC @ 0x40000130
2,916,764 UART:
2,916,780 UART: Running Caliptra FMC ...
2,917,188 UART:
2,917,242 UART: [state] CFI Enabled
2,927,556 UART: [fht] FMC Alias Private Key: 7
3,046,654 UART: [art] Extend RT PCRs Done
3,047,082 UART: [art] Lock RT PCRs Done
3,048,880 UART: [art] Populate DV Done
3,057,117 UART: [fht] FMC Alias Private Key: 7
3,058,073 UART: [art] Derive CDI
3,058,353 UART: [art] Store in slot 0x4
3,144,226 UART: [art] Derive Key Pair
3,144,586 UART: [art] Store priv key in slot 0x5
3,157,368 UART: [art] Derive Key Pair - Done
3,172,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,030 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,795 UART: [art] PUB.X = 6750E4EF120DEB17B409E5A4A2E208B4952DCEB0292D09E303434806C5B4E520FA31C22FC2110786698EA32EF132C0B6
3,194,546 UART: [art] PUB.Y = E43A06E022A1B5A2F239B5C564ECC46427B4D9FDEA573F08087671395E00F2B12B4B91A3DF3897428E116182B48704BE
3,201,462 UART: [art] SIG.R = 665C765E536BCB183AE78271DB75F9589DA45DF7DD6DE345EBAC63ACA4B37A095A335C9E15A9E1429483CAEB4CDBB1F0
3,208,249 UART: [art] SIG.S = 439133AA0D1295EDD2CF419F50BC1206D56B492862469B573D2C0633B13A488A4A86B6A37B4E4D433961102C91F49F53
3,232,146 UART: Caliptra RT
3,232,397 UART: [state] CFI Enabled
3,352,379 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,684 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,285 ready_for_fw is high
1,060,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,220 >>> mbox cmd response: success
2,679,220 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,741,323 UART:
2,741,339 UART: Running Caliptra FMC ...
2,741,747 UART:
2,741,801 UART: [state] CFI Enabled
2,752,043 UART: [fht] FMC Alias Private Key: 7
2,870,641 UART: [art] Extend RT PCRs Done
2,871,069 UART: [art] Lock RT PCRs Done
2,872,741 UART: [art] Populate DV Done
2,880,932 UART: [fht] FMC Alias Private Key: 7
2,881,910 UART: [art] Derive CDI
2,882,190 UART: [art] Store in slot 0x4
2,968,205 UART: [art] Derive Key Pair
2,968,565 UART: [art] Store priv key in slot 0x5
2,982,085 UART: [art] Derive Key Pair - Done
2,996,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,263 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,028 UART: [art] PUB.X = F5CE56A8518F020C0F09091FC6F660CDEED034396F2AF89172B4C6285EB444DD691FD1591DE310C7F6EB709E08BEFF2E
3,019,794 UART: [art] PUB.Y = 6D894541C01F7EB4C7890AAC25083CBEDCCFCAE9E734480A2CA56411397E1B58390C82DF593B7BD6B73873CAFC6EE396
3,026,746 UART: [art] SIG.R = 8F90C3476EE54C17504C11325917E5A8A7BE258EF5BB3113AC0E9F2FF02C18A300786F4A8881E6E4EC66F4A12D0103F6
3,033,489 UART: [art] SIG.S = 4752F85D775759506F074CFA0F1880B555CE7729E7D707CA7DBA80FBC6EFD44CDF5D57A7C155BDFB0B7EAEC6D527CDE2
3,056,927 UART: Caliptra RT
3,057,178 UART: [state] CFI Enabled
3,177,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,191,504 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,306 UART: [kat] SHA2-256
904,246 UART: [kat] SHA2-384
907,127 UART: [kat] SHA2-512-ACC
909,028 UART: [kat] ECC-384
918,981 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,868 UART: [cold-reset] ++
1,173,424 UART: [fht] FHT @ 0x50003400
1,176,079 UART: [idev] ++
1,176,247 UART: [idev] CDI.KEYID = 6
1,176,607 UART: [idev] SUBJECT.KEYID = 7
1,177,031 UART: [idev] UDS.KEYID = 0
1,177,376 ready_for_fw is high
1,177,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,001 UART: [idev] Erasing UDS.KEYID = 0
1,202,346 UART: [idev] Sha1 KeyId Algorithm
1,210,674 UART: [idev] --
1,211,724 UART: [ldev] ++
1,211,892 UART: [ldev] CDI.KEYID = 6
1,212,255 UART: [ldev] SUBJECT.KEYID = 5
1,212,681 UART: [ldev] AUTHORITY.KEYID = 7
1,213,144 UART: [ldev] FE.KEYID = 1
1,218,660 UART: [ldev] Erasing FE.KEYID = 1
1,245,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,368 UART: [ldev] --
1,284,727 UART: [fwproc] Wait for Commands...
1,285,447 UART: [fwproc] Recv command 0x46574c44
1,286,175 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,820 >>> mbox cmd response: success
2,830,820 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,832,080 UART: [afmc] ++
2,832,248 UART: [afmc] CDI.KEYID = 6
2,832,610 UART: [afmc] SUBJECT.KEYID = 7
2,833,035 UART: [afmc] AUTHORITY.KEYID = 5
2,869,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,885,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,886,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,897,755 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,903,456 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,911,266 UART: [afmc] --
2,912,214 UART: [cold-reset] --
2,913,052 UART: [state] Locking Datavault
2,914,403 UART: [state] Locking PCR0, PCR1 and PCR31
2,915,007 UART: [state] Locking ICCM
2,915,459 UART: [exit] Launching FMC @ 0x40000130
2,920,789 UART:
2,920,805 UART: Running Caliptra FMC ...
2,921,213 UART:
2,921,356 UART: [state] CFI Enabled
2,932,062 UART: [fht] FMC Alias Private Key: 7
3,051,152 UART: [art] Extend RT PCRs Done
3,051,580 UART: [art] Lock RT PCRs Done
3,052,988 UART: [art] Populate DV Done
3,061,247 UART: [fht] FMC Alias Private Key: 7
3,062,235 UART: [art] Derive CDI
3,062,515 UART: [art] Store in slot 0x4
3,148,398 UART: [art] Derive Key Pair
3,148,758 UART: [art] Store priv key in slot 0x5
3,161,818 UART: [art] Derive Key Pair - Done
3,176,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,193,246 UART: [art] PUB.X = F4D1C0D090259F68DEE2635F98F9504AD119A1AC2BC876BB51BCAA05ECCDC246671E8483EA6BA270BD3390D793287891
3,200,023 UART: [art] PUB.Y = 3F6A2D96A5EB9591D702C8621E7AEA8AB36C9BBFD676731B8542B9B8A9218AA30C8FA4F64BEE23F324530BB75AD3014D
3,206,975 UART: [art] SIG.R = D2151AD1772AA957276172027B82F46B92B431D30F0F8BF52D0BD15AECC9D474C4AC77022FF263FA8BE1D4BFC3795280
3,213,738 UART: [art] SIG.S = A4DC6CA803E145B8BF2AFD964A26463B9970A54862B8141B8BF144D7088815FA529AB18A496C477AB10FC852F1A1F71B
3,237,897 UART: Caliptra RT
3,238,240 UART: [state] CFI Enabled
3,358,306 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,372,517 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,316 ready_for_fw is high
1,060,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,315 >>> mbox cmd response: success
2,678,315 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
2,740,708 UART:
2,740,724 UART: Running Caliptra FMC ...
2,741,132 UART:
2,741,275 UART: [state] CFI Enabled
2,751,789 UART: [fht] FMC Alias Private Key: 7
2,871,535 UART: [art] Extend RT PCRs Done
2,871,963 UART: [art] Lock RT PCRs Done
2,873,357 UART: [art] Populate DV Done
2,881,560 UART: [fht] FMC Alias Private Key: 7
2,882,684 UART: [art] Derive CDI
2,882,964 UART: [art] Store in slot 0x4
2,968,655 UART: [art] Derive Key Pair
2,969,015 UART: [art] Store priv key in slot 0x5
2,982,247 UART: [art] Derive Key Pair - Done
2,997,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,012 UART: [art] PUB.X = 80589B7D86B2D7AD0F5E0977D3178809C0E327E607030E6FF65525219C744381C7B165121DEE3B65E77861FC9B12AED2
3,020,760 UART: [art] PUB.Y = 262C2DB91EB51D28F91C1D8BAD688B7E90210EE1EBEE47AB10EC4AE6EC2E24E00955DBC6F112EC0AFD5C091EAC87843C
3,027,724 UART: [art] SIG.R = 69D40C755BC1843500D1F8FA6FAA5A94C9B5C69D86967C689354393E04EA68101A1E60F0ABB1B1B58EF883CFD2CF0783
3,034,471 UART: [art] SIG.S = 0B8917484E68ADD21F4F521B168BB2D1E2E825D134C70520BB6309FA77F596054B496A555ABF433BFFC664FD9C58B7A0
3,058,253 UART: Caliptra RT
3,058,596 UART: [state] CFI Enabled
3,178,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,192,417 >>> mbox cmd response: failed
test test_ecdsa::test_ecdsa_verify_bad_chksum ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,157 UART:
192,534 UART: Running Caliptra ROM ...
193,677 UART:
193,828 UART: [state] CFI Enabled
261,405 UART: [state] LifecycleState = Unprovisioned
263,353 UART: [state] DebugLocked = No
265,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,758 UART: [kat] SHA2-256
439,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,976 UART: [kat] ++
450,424 UART: [kat] sha1
462,221 UART: [kat] SHA2-256
464,875 UART: [kat] SHA2-384
470,719 UART: [kat] SHA2-512-ACC
473,094 UART: [kat] ECC-384
2,768,533 UART: [kat] HMAC-384Kdf
2,800,737 UART: [kat] LMS
3,990,992 UART: [kat] --
3,997,494 UART: [cold-reset] ++
3,999,925 UART: [fht] Storing FHT @ 0x50003400
4,010,764 UART: [idev] ++
4,011,333 UART: [idev] CDI.KEYID = 6
4,012,368 UART: [idev] SUBJECT.KEYID = 7
4,013,542 UART: [idev] UDS.KEYID = 0
4,014,580 ready_for_fw is high
4,014,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,857 UART: [idev] Erasing UDS.KEYID = 0
7,348,768 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,835 UART: [idev] --
7,374,771 UART: [ldev] ++
7,375,339 UART: [ldev] CDI.KEYID = 6
7,376,352 UART: [ldev] SUBJECT.KEYID = 5
7,377,507 UART: [ldev] AUTHORITY.KEYID = 7
7,378,810 UART: [ldev] FE.KEYID = 1
7,423,070 UART: [ldev] Erasing FE.KEYID = 1
10,753,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,280 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,548 UART: [ldev] --
13,116,810 UART: [fwproc] Waiting for Commands...
13,119,022 UART: [fwproc] Received command 0x46574c44
13,121,267 UART: [fwproc] Received Image of size 118548 bytes
17,228,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,380,885 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,709,746 >>> mbox cmd response: success
17,714,278 UART: [afmc] ++
17,714,929 UART: [afmc] CDI.KEYID = 6
17,715,848 UART: [afmc] SUBJECT.KEYID = 7
17,716,953 UART: [afmc] AUTHORITY.KEYID = 5
21,075,667 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,676 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,350 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,113 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,522 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,957 UART: [afmc] --
23,443,331 UART: [cold-reset] --
23,446,652 UART: [state] Locking Datavault
23,452,059 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,768 UART: [state] Locking ICCM
23,456,460 UART: [exit] Launching FMC @ 0x40000130
23,464,856 UART:
23,465,112 UART: Running Caliptra FMC ...
23,466,215 UART:
23,466,378 UART: [state] CFI Enabled
23,532,871 UART: [fht] FMC Alias Private Key: 7
25,874,212 UART: [art] Extend RT PCRs Done
25,875,447 UART: [art] Lock RT PCRs Done
25,876,744 UART: [art] Populate DV Done
25,882,272 UART: [fht] FMC Alias Private Key: 7
25,883,808 UART: [art] Derive CDI
25,884,620 UART: [art] Store in slot 0x4
25,941,653 UART: [art] Derive Key Pair
25,942,648 UART: [art] Store priv key in slot 0x5
29,235,062 UART: [art] Derive Key Pair - Done
29,247,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,561 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,070 UART: [art] PUB.X = BD8340186C9DC2126FEF22FFB16E4E53AF55257C7FCAB6CC41F58CD27AD7CFCF0B4C2EEDBEA1B6B232BF57FE3330B73B
31,545,395 UART: [art] PUB.Y = 771F68431F7EF05273B113FA27ADC5673F230109B95DE9373ACDF47DA21046FE234FC815A6B425B06DEE7102573817E8
31,552,626 UART: [art] SIG.R = 6ACADD9239FF921042092207D5B155CAC6FB82264CB3D1E6E76CDE62089C0BF5C2182A85E3B4BFB13B908324A467000A
31,560,064 UART: [art] SIG.S = 6C93A69C3BEA40D9AD15134216AA3C38137285B85240FD117D1D34950E8814EACFB09E16E8107F90785326EC2BEE61F3
32,865,535 UART: Caliptra RT
32,866,245 UART: [state] CFI Enabled
33,062,467 UART: [rt] RT listening for mailbox commands...
33,065,318 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,096,809 UART: [rt]cmd =0x53494756, len=196
34,388,772 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,779,921 ready_for_fw is high
3,780,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,923,739 >>> mbox cmd response: success
23,609,322 UART:
23,609,724 UART: Running Caliptra FMC ...
23,610,835 UART:
23,610,990 UART: [state] CFI Enabled
23,676,748 UART: [fht] FMC Alias Private Key: 7
26,017,709 UART: [art] Extend RT PCRs Done
26,018,932 UART: [art] Lock RT PCRs Done
26,020,931 UART: [art] Populate DV Done
26,026,574 UART: [fht] FMC Alias Private Key: 7
26,028,281 UART: [art] Derive CDI
26,029,102 UART: [art] Store in slot 0x4
26,085,447 UART: [art] Derive Key Pair
26,086,494 UART: [art] Store priv key in slot 0x5
29,379,397 UART: [art] Derive Key Pair - Done
29,391,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,680,390 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,889 UART: [art] PUB.X = D70A50318A22F3DC2E29EEA80B215228C30DE683635DE8DF515FECB49ED28826AA8AEAA17CC2344540918AC2394D4AE4
31,689,147 UART: [art] PUB.Y = 7FEA961DCFA3939D372BF5B02DCBCEFA0D9C9EF191974B6DD1EAED12DB66F19B2EC408A9B2A2535AE7B771E94E11995D
31,696,449 UART: [art] SIG.R = 3884C79924011EEC32C945A1B818BE2C915825FE98E35DD0DD47404C307B723F01B48F2F9D40DFFC37C60307FFD0FB50
31,703,835 UART: [art] SIG.S = FD71A93797BC572C8EAB74BB8D99547C9E6D2EF0FB4EA98A8F0D3129B18DE0D3D30877FABDAABED6EF209C3DB521BCEE
33,009,171 UART: Caliptra RT
33,009,881 UART: [state] CFI Enabled
33,186,721 UART: [rt] RT listening for mailbox commands...
33,189,473 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,221,167 UART: [rt]cmd =0x53494756, len=196
34,512,502 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,472 UART:
192,834 UART: Running Caliptra ROM ...
194,008 UART:
603,824 UART: [state] CFI Enabled
620,871 UART: [state] LifecycleState = Unprovisioned
622,861 UART: [state] DebugLocked = No
625,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,546 UART: [kat] SHA2-256
799,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,853 UART: [kat] ++
810,337 UART: [kat] sha1
821,065 UART: [kat] SHA2-256
823,804 UART: [kat] SHA2-384
829,859 UART: [kat] SHA2-512-ACC
832,227 UART: [kat] ECC-384
3,117,530 UART: [kat] HMAC-384Kdf
3,128,699 UART: [kat] LMS
4,318,782 UART: [kat] --
4,322,494 UART: [cold-reset] ++
4,323,567 UART: [fht] Storing FHT @ 0x50003400
4,334,185 UART: [idev] ++
4,334,753 UART: [idev] CDI.KEYID = 6
4,335,655 UART: [idev] SUBJECT.KEYID = 7
4,336,893 UART: [idev] UDS.KEYID = 0
4,337,931 ready_for_fw is high
4,338,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,437 UART: [idev] Erasing UDS.KEYID = 0
7,623,258 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,294 UART: [idev] --
7,650,413 UART: [ldev] ++
7,650,979 UART: [ldev] CDI.KEYID = 6
7,651,935 UART: [ldev] SUBJECT.KEYID = 5
7,653,137 UART: [ldev] AUTHORITY.KEYID = 7
7,654,418 UART: [ldev] FE.KEYID = 1
7,668,958 UART: [ldev] Erasing FE.KEYID = 1
10,954,156 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,360 UART: [ldev] --
13,317,619 UART: [fwproc] Waiting for Commands...
13,319,648 UART: [fwproc] Received command 0x46574c44
13,321,873 UART: [fwproc] Received Image of size 118548 bytes
17,428,731 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,746 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,932 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,662 >>> mbox cmd response: success
17,914,981 UART: [afmc] ++
17,915,569 UART: [afmc] CDI.KEYID = 6
17,916,474 UART: [afmc] SUBJECT.KEYID = 7
17,917,736 UART: [afmc] AUTHORITY.KEYID = 5
21,225,426 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,371 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,764 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,689 UART: [afmc] --
23,594,237 UART: [cold-reset] --
23,598,113 UART: [state] Locking Datavault
23,604,329 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,091 UART: [state] Locking ICCM
23,608,135 UART: [exit] Launching FMC @ 0x40000130
23,616,528 UART:
23,616,759 UART: Running Caliptra FMC ...
23,617,851 UART:
23,618,008 UART: [state] CFI Enabled
23,626,166 UART: [fht] FMC Alias Private Key: 7
25,966,349 UART: [art] Extend RT PCRs Done
25,967,566 UART: [art] Lock RT PCRs Done
25,969,321 UART: [art] Populate DV Done
25,974,619 UART: [fht] FMC Alias Private Key: 7
25,976,215 UART: [art] Derive CDI
25,977,026 UART: [art] Store in slot 0x4
26,019,455 UART: [art] Derive Key Pair
26,020,517 UART: [art] Store priv key in slot 0x5
29,262,085 UART: [art] Derive Key Pair - Done
29,275,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,105 UART: [art] PUB.X = 0D95A5802B3DEC2CE9E31321C107BA3E5AFF3BBF78CB6D6BB627470300354A22700D581EAFDF783064F3CD99C38BB46F
31,564,396 UART: [art] PUB.Y = F5E8FA4E4368EAD59B817ECFA5AB9E49B369B502D4206118DC9CFC3A94C67291B5585C938D86808E45C022A3941BCCAC
31,571,674 UART: [art] SIG.R = 49AA4F723C404427592B3B7A6C0E43E43700D21CD65CAA50C327FE3680BAEB282D36961443BC7FD29114736DE8D65861
31,579,044 UART: [art] SIG.S = 261729C5915860807BE05BFF7B24FB45DB05211A0BE0AB9597A9D226EB275CE56BFBA95AB7E2089A12915A93B00A1D55
32,884,862 UART: Caliptra RT
32,885,559 UART: [state] CFI Enabled
33,020,608 UART: [rt] RT listening for mailbox commands...
33,023,444 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,055,231 UART: [rt]cmd =0x53494756, len=196
34,347,028 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,128,857 ready_for_fw is high
4,129,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,670 >>> mbox cmd response: success
23,803,901 UART:
23,804,301 UART: Running Caliptra FMC ...
23,805,409 UART:
23,805,559 UART: [state] CFI Enabled
23,813,608 UART: [fht] FMC Alias Private Key: 7
26,153,311 UART: [art] Extend RT PCRs Done
26,154,529 UART: [art] Lock RT PCRs Done
26,156,336 UART: [art] Populate DV Done
26,161,653 UART: [fht] FMC Alias Private Key: 7
26,163,361 UART: [art] Derive CDI
26,164,171 UART: [art] Store in slot 0x4
26,206,889 UART: [art] Derive Key Pair
26,207,930 UART: [art] Store priv key in slot 0x5
29,450,313 UART: [art] Derive Key Pair - Done
29,463,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,656 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,161 UART: [art] PUB.X = 6B132AD1E68147BF04883EDE4E6C7F4AC3FB7A0F54E9AF843D4E86812770E6FA050DCB3FA18504177D1B11AE437F031F
31,752,457 UART: [art] PUB.Y = A3CFF0A17843B5B4D74030D256CDD183E458DADB023EA88797D679D1938ED28BA6B03EC1E881342B7E7895079B95AA90
31,759,704 UART: [art] SIG.R = 8EE3A7363DC5E83912F89F19D06A3765B7D32277D8FD0E87BEF476FE2908F09538DE5D190319E4F615FC7F6672857512
31,767,099 UART: [art] SIG.S = 596A8F1BABDB123F1C2439224A49F7DBCF8D5657FF83915BB6AB966C39D1595B3620D392766855975EFBA8A98003A017
33,071,839 UART: Caliptra RT
33,072,564 UART: [state] CFI Enabled
33,206,591 UART: [rt] RT listening for mailbox commands...
33,209,336 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
33,240,921 UART: [rt]cmd =0x53494756, len=196
34,532,563 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,175 UART:
192,531 UART: Running Caliptra ROM ...
193,702 UART:
193,852 UART: [state] CFI Enabled
260,586 UART: [state] LifecycleState = Unprovisioned
262,560 UART: [state] DebugLocked = No
265,366 UART: [state] WD Timer not started. Device not locked for debugging
268,690 UART: [kat] SHA2-256
448,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,178 UART: [kat] ++
459,629 UART: [kat] sha1
469,714 UART: [kat] SHA2-256
472,424 UART: [kat] SHA2-384
477,430 UART: [kat] SHA2-512-ACC
479,789 UART: [kat] ECC-384
2,927,169 UART: [kat] HMAC-384Kdf
2,949,868 UART: [kat] LMS
3,426,360 UART: [kat] --
3,431,090 UART: [cold-reset] ++
3,433,736 UART: [fht] FHT @ 0x50003400
3,445,629 UART: [idev] ++
3,446,266 UART: [idev] CDI.KEYID = 6
3,447,149 UART: [idev] SUBJECT.KEYID = 7
3,448,385 UART: [idev] UDS.KEYID = 0
3,449,353 ready_for_fw is high
3,449,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,684 UART: [idev] Erasing UDS.KEYID = 0
5,961,454 UART: [idev] Sha1 KeyId Algorithm
5,985,380 UART: [idev] --
5,990,613 UART: [ldev] ++
5,991,186 UART: [ldev] CDI.KEYID = 6
5,992,062 UART: [ldev] SUBJECT.KEYID = 5
5,993,328 UART: [ldev] AUTHORITY.KEYID = 7
5,994,555 UART: [ldev] FE.KEYID = 1
6,035,624 UART: [ldev] Erasing FE.KEYID = 1
8,539,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,470 UART: [ldev] --
10,349,352 UART: [fwproc] Wait for Commands...
10,352,244 UART: [fwproc] Recv command 0x46574c44
10,354,276 UART: [fwproc] Recv'd Img size: 118548 bytes
13,836,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,915,835 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,988,849 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,934 >>> mbox cmd response: success
14,321,934 UART: [afmc] ++
14,322,554 UART: [afmc] CDI.KEYID = 6
14,323,463 UART: [afmc] SUBJECT.KEYID = 7
14,324,679 UART: [afmc] AUTHORITY.KEYID = 5
16,855,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,543 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,611 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,164 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,906 UART: [afmc] --
18,678,351 UART: [cold-reset] --
18,682,204 UART: [state] Locking Datavault
18,688,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,751 UART: [state] Locking ICCM
18,691,391 UART: [exit] Launching FMC @ 0x40000130
18,699,837 UART:
18,700,106 UART: Running Caliptra FMC ...
18,701,127 UART:
18,701,270 UART: [state] CFI Enabled
18,756,753 UART: [fht] FMC Alias Private Key: 7
20,523,376 UART: [art] Extend RT PCRs Done
20,524,583 UART: [art] Lock RT PCRs Done
20,526,499 UART: [art] Populate DV Done
20,531,795 UART: [fht] FMC Alias Private Key: 7
20,533,337 UART: [art] Derive CDI
20,534,098 UART: [art] Store in slot 0x4
20,589,581 UART: [art] Derive Key Pair
20,590,622 UART: [art] Store priv key in slot 0x5
23,053,328 UART: [art] Derive Key Pair - Done
23,066,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,555 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,055 UART: [art] PUB.X = 3131A1999B1CCE1432FEAA132DFF13C6CD0BE813687F7C66B5C1CF17815FC436FB38FA240AF512B63103FDBFA7CF5C5F
24,787,313 UART: [art] PUB.Y = EABCF1DF99F219F86C84F2605A371C741584D4D61FE7BBBCC43F0454637D02E9F92F7508AB5B1B9D0AEEE054019AE425
24,794,541 UART: [art] SIG.R = DB14CE68AF5B294A1BE6B5EA8655E111F2E26861AADA16CE90458E1BF97829A69062591785A4699E65856F28F5F63672
24,801,928 UART: [art] SIG.S = 0279CD7E6761F4CA328C7B79C2B9B76F3E3D03E5CEBB2FABF9981C2855EA56D731B9A6D63A6C887766C3C43196F849BD
25,780,769 UART: Caliptra RT
25,781,470 UART: [state] CFI Enabled
25,962,408 UART: [rt] RT listening for mailbox commands...
25,965,163 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,996,688 UART: [rt]cmd =0x53494756, len=196
26,962,160 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,457,722 ready_for_fw is high
3,458,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,788 >>> mbox cmd response: success
18,515,140 UART:
18,515,558 UART: Running Caliptra FMC ...
18,516,695 UART:
18,516,862 UART: [state] CFI Enabled
18,582,543 UART: [fht] FMC Alias Private Key: 7
20,348,709 UART: [art] Extend RT PCRs Done
20,349,945 UART: [art] Lock RT PCRs Done
20,351,514 UART: [art] Populate DV Done
20,357,205 UART: [fht] FMC Alias Private Key: 7
20,358,853 UART: [art] Derive CDI
20,359,664 UART: [art] Store in slot 0x4
20,415,758 UART: [art] Derive Key Pair
20,416,795 UART: [art] Store priv key in slot 0x5
22,879,706 UART: [art] Derive Key Pair - Done
22,892,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,409 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,924 UART: [art] PUB.X = 7BA27D02C5CABC973E7A6430F156DC4A5744825EDC6228FA2C3686BFCC168E4B6A09410A08117CB21CA151687723859E
24,614,183 UART: [art] PUB.Y = C510736D0592B9D63ED96555B143C2E32246F28CE984D9003E855B51B1E98A0804D3BC4A02830DE67CECDFDA902A6F95
24,621,440 UART: [art] SIG.R = DEF90F4719854321ACD526E51956DEC921F43F5C7C1B4E566457A018B19D00A69255FCB9B8147935B95C6F70CFB6AAE6
24,628,790 UART: [art] SIG.S = F2ED2F1A24741B0CF5A5314AFA9DEA01B367A0BF2FE9CABE2D3016C64B67889F2C30AE0013CB95D044BDA1344E4D045D
25,606,900 UART: Caliptra RT
25,607,599 UART: [state] CFI Enabled
25,788,325 UART: [rt] RT listening for mailbox commands...
25,791,106 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,822,531 UART: [rt]cmd =0x53494756, len=196
26,787,923 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,409 UART:
192,775 UART: Running Caliptra ROM ...
193,879 UART:
603,738 UART: [state] CFI Enabled
615,922 UART: [state] LifecycleState = Unprovisioned
617,801 UART: [state] DebugLocked = No
620,338 UART: [state] WD Timer not started. Device not locked for debugging
623,799 UART: [kat] SHA2-256
803,470 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,261 UART: [kat] ++
814,711 UART: [kat] sha1
824,163 UART: [kat] SHA2-256
826,812 UART: [kat] SHA2-384
832,450 UART: [kat] SHA2-512-ACC
834,819 UART: [kat] ECC-384
3,275,581 UART: [kat] HMAC-384Kdf
3,286,959 UART: [kat] LMS
3,763,449 UART: [kat] --
3,766,666 UART: [cold-reset] ++
3,768,396 UART: [fht] FHT @ 0x50003400
3,779,056 UART: [idev] ++
3,779,635 UART: [idev] CDI.KEYID = 6
3,780,689 UART: [idev] SUBJECT.KEYID = 7
3,781,872 UART: [idev] UDS.KEYID = 0
3,782,803 ready_for_fw is high
3,783,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,932,327 UART: [idev] Erasing UDS.KEYID = 0
6,260,136 UART: [idev] Sha1 KeyId Algorithm
6,284,600 UART: [idev] --
6,289,402 UART: [ldev] ++
6,289,971 UART: [ldev] CDI.KEYID = 6
6,290,880 UART: [ldev] SUBJECT.KEYID = 5
6,292,097 UART: [ldev] AUTHORITY.KEYID = 7
6,293,336 UART: [ldev] FE.KEYID = 1
6,305,014 UART: [ldev] Erasing FE.KEYID = 1
8,782,566 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,929 UART: [ldev] --
10,577,529 UART: [fwproc] Wait for Commands...
10,579,952 UART: [fwproc] Recv command 0x46574c44
10,581,939 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,317 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,250 >>> mbox cmd response: success
14,547,124 UART: [afmc] ++
14,547,750 UART: [afmc] CDI.KEYID = 6
14,548,637 UART: [afmc] SUBJECT.KEYID = 7
14,549,856 UART: [afmc] AUTHORITY.KEYID = 5
17,055,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,254 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,354 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,826,948 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,556 UART: [afmc] --
18,855,915 UART: [cold-reset] --
18,860,155 UART: [state] Locking Datavault
18,866,755 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,452 UART: [state] Locking ICCM
18,871,204 UART: [exit] Launching FMC @ 0x40000130
18,879,603 UART:
18,879,842 UART: Running Caliptra FMC ...
18,880,942 UART:
18,881,104 UART: [state] CFI Enabled
18,889,481 UART: [fht] FMC Alias Private Key: 7
20,655,532 UART: [art] Extend RT PCRs Done
20,656,765 UART: [art] Lock RT PCRs Done
20,658,724 UART: [art] Populate DV Done
20,664,028 UART: [fht] FMC Alias Private Key: 7
20,665,622 UART: [art] Derive CDI
20,666,439 UART: [art] Store in slot 0x4
20,709,468 UART: [art] Derive Key Pair
20,710,461 UART: [art] Store priv key in slot 0x5
23,137,424 UART: [art] Derive Key Pair - Done
23,150,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,915 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,420 UART: [art] PUB.X = 6CE31E7842047D7A74E6DE3AEFC4900E574EE39D6EF66BF6F3A49258C695BEAF1DAEFFAFEA15D6C9155DDA4C460FD9FA
24,865,724 UART: [art] PUB.Y = D76840E36093B0178127805970D7612A03C11987836ED49BCB4902C4E84402C37E6C42D83857109BF2104559DCFC9B03
24,872,960 UART: [art] SIG.R = 34F9F079813AE872FE698CABD612C43AE8F1CB47991FE4C1DFF7CF7B720CFD2E0EE643DEAD245B53235D9195407E3544
24,880,354 UART: [art] SIG.S = 3BFCC4745F852F81DE6F2DFB36419253085B7778329F2C98CB5D25A96A5781A9132135214555C44A963EC090300E5E4C
25,859,777 UART: Caliptra RT
25,860,468 UART: [state] CFI Enabled
25,993,801 UART: [rt] RT listening for mailbox commands...
25,996,585 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,028,265 UART: [rt]cmd =0x53494756, len=196
26,993,843 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,779,088 ready_for_fw is high
3,779,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,953 >>> mbox cmd response: success
18,697,232 UART:
18,697,628 UART: Running Caliptra FMC ...
18,698,770 UART:
18,698,934 UART: [state] CFI Enabled
18,706,711 UART: [fht] FMC Alias Private Key: 7
20,473,030 UART: [art] Extend RT PCRs Done
20,474,260 UART: [art] Lock RT PCRs Done
20,475,671 UART: [art] Populate DV Done
20,481,148 UART: [fht] FMC Alias Private Key: 7
20,482,845 UART: [art] Derive CDI
20,483,681 UART: [art] Store in slot 0x4
20,525,977 UART: [art] Derive Key Pair
20,526,982 UART: [art] Store priv key in slot 0x5
22,953,461 UART: [art] Derive Key Pair - Done
22,966,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,995 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,494 UART: [art] PUB.X = 7F815C3089899D5F4BC6456065A13EC42CA20DF56D56CFD47D14EA543DB0C16BC076C495AEDB87A75CC902F6FEB4B23F
24,681,754 UART: [art] PUB.Y = 620AB786A2A1261B1B8E8C61679C6121176BA7EE02D74720531DFB80BED1DA0146A512A3CEEC5A247A1365704E8E0829
24,689,016 UART: [art] SIG.R = 678C982F1DC4EF8114F4C051C24F4368BDF7B055ACB336ECCADCF25339446C04C11C11DC6A74B2F23258693DD9C766F0
24,696,426 UART: [art] SIG.S = E402DE37959183E38C2CDCE627115110B5841B0F5D725AB6D1B4F78AEDC4DB0B83A89318E5F483E4B087BA3930BE023B
25,675,310 UART: Caliptra RT
25,676,011 UART: [state] CFI Enabled
25,808,429 UART: [rt] RT listening for mailbox commands...
25,811,197 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
25,842,885 UART: [rt]cmd =0x53494756, len=196
26,808,555 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
191,932 UART:
192,301 UART: Running Caliptra ROM ...
193,928 UART:
194,095 UART: [state] CFI Enabled
266,100 UART: [state] LifecycleState = Unprovisioned
268,463 UART: [state] DebugLocked = No
270,135 UART: [state] WD Timer not started. Device not locked for debugging
274,530 UART: [kat] SHA2-256
464,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,206 UART: [kat] ++
475,681 UART: [kat] sha1
487,756 UART: [kat] SHA2-256
490,763 UART: [kat] SHA2-384
496,961 UART: [kat] SHA2-512-ACC
499,537 UART: [kat] ECC-384
2,947,695 UART: [kat] HMAC-384Kdf
2,972,791 UART: [kat] LMS
3,504,606 UART: [kat] --
3,507,112 UART: [cold-reset] ++
3,509,178 UART: [fht] FHT @ 0x50003400
3,521,093 UART: [idev] ++
3,521,799 UART: [idev] CDI.KEYID = 6
3,522,703 UART: [idev] SUBJECT.KEYID = 7
3,523,941 UART: [idev] UDS.KEYID = 0
3,524,858 ready_for_fw is high
3,525,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,111 UART: [idev] Erasing UDS.KEYID = 0
6,027,914 UART: [idev] Sha1 KeyId Algorithm
6,048,681 UART: [idev] --
6,053,808 UART: [ldev] ++
6,054,497 UART: [ldev] CDI.KEYID = 6
6,055,386 UART: [ldev] SUBJECT.KEYID = 5
6,056,551 UART: [ldev] AUTHORITY.KEYID = 7
6,057,838 UART: [ldev] FE.KEYID = 1
6,101,411 UART: [ldev] Erasing FE.KEYID = 1
8,605,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,369 UART: [ldev] --
10,414,001 UART: [fwproc] Wait for Commands...
10,416,956 UART: [fwproc] Recv command 0x46574c44
10,419,259 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,617 >>> mbox cmd response: success
14,684,538 UART: [afmc] ++
14,685,262 UART: [afmc] CDI.KEYID = 6
14,686,455 UART: [afmc] SUBJECT.KEYID = 7
14,687,893 UART: [afmc] AUTHORITY.KEYID = 5
17,213,133 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,840 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,758 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,858 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,005 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,937 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,864 UART: [afmc] --
19,013,787 UART: [cold-reset] --
19,016,841 UART: [state] Locking Datavault
19,020,851 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,004 UART: [state] Locking ICCM
19,025,273 UART: [exit] Launching FMC @ 0x40000130
19,033,954 UART:
19,034,186 UART: Running Caliptra FMC ...
19,035,287 UART:
19,035,445 UART: [state] CFI Enabled
19,093,504 UART: [fht] FMC Alias Private Key: 7
20,859,870 UART: [art] Extend RT PCRs Done
20,861,095 UART: [art] Lock RT PCRs Done
20,862,802 UART: [art] Populate DV Done
20,868,480 UART: [fht] FMC Alias Private Key: 7
20,870,180 UART: [art] Derive CDI
20,870,918 UART: [art] Store in slot 0x4
20,925,567 UART: [art] Derive Key Pair
20,926,603 UART: [art] Store priv key in slot 0x5
23,389,358 UART: [art] Derive Key Pair - Done
23,402,233 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,375 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,881 UART: [art] PUB.X = 711FBA131465A34638F0C629A8B49BA9239DD2EF2D6907B3A47F816AA2347C3B038133D9B3FB8A9F5411D5967B97EB99
25,123,140 UART: [art] PUB.Y = F6CA989BC9F4B30CDE27B78ED46F1AEAB591BBAE13603176088AEC7A9751E36C7153B6882593F3F4ECE0951CB6040BB5
25,130,444 UART: [art] SIG.R = 219B8AA255DA6B89C2233E41973FBB4364D8ADF9A3F5EF4740BDB0983D45ED33C36D4A2C76392CD7F6AD0D5A2E54A821
25,137,857 UART: [art] SIG.S = 97049A5949EFE010BF6ECB240B512BBBF76BB317684332B3C98D4D95E21D93448A4C2F7D8A0500170CE8635624C27DB0
26,116,481 UART: Caliptra RT
26,117,175 UART: [state] CFI Enabled
26,298,638 UART: [rt] RT listening for mailbox commands...
26,301,387 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,332,917 UART: [rt]cmd =0x53494756, len=196
27,298,507 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,438,581 ready_for_fw is high
3,438,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,160 >>> mbox cmd response: success
19,133,141 UART:
19,133,550 UART: Running Caliptra FMC ...
19,134,656 UART:
19,134,826 UART: [state] CFI Enabled
19,201,367 UART: [fht] FMC Alias Private Key: 7
20,968,160 UART: [art] Extend RT PCRs Done
20,969,380 UART: [art] Lock RT PCRs Done
20,971,469 UART: [art] Populate DV Done
20,977,161 UART: [fht] FMC Alias Private Key: 7
20,978,749 UART: [art] Derive CDI
20,979,481 UART: [art] Store in slot 0x4
21,034,187 UART: [art] Derive Key Pair
21,035,186 UART: [art] Store priv key in slot 0x5
23,498,212 UART: [art] Derive Key Pair - Done
23,511,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,206 UART: [art] PUB.X = C4F73D8F696E67B5598D5752283A1A512F98BE6E42DF52178787479F64BD02CA2B88D3044C4769D977EBFA3213BC00F1
25,233,390 UART: [art] PUB.Y = 0613B5AB15ED010C917F115B30173D78CEEB58C5EA392B0363FA5EBB7DA6EF44128E530433ABFE1CCE13847172626B91
25,240,648 UART: [art] SIG.R = 42A14D1F4A6BCEC778A304A160329A2522B8301C3E543796CB994E6F0E673B877933707C7B6388B10FEEF12683EB65F5
25,248,059 UART: [art] SIG.S = C15BF399D0CBC1E539BACB6455FCADFE21C8F0DB9A4BCA31D67A527A3790D71DBDFE066C6838152AF4770D6200498DB0
26,226,881 UART: Caliptra RT
26,227,575 UART: [state] CFI Enabled
26,408,522 UART: [rt] RT listening for mailbox commands...
26,411,296 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,442,825 UART: [rt]cmd =0x53494756, len=196
27,408,315 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
192,365 UART:
192,736 UART: Running Caliptra ROM ...
193,867 UART:
603,356 UART: [state] CFI Enabled
620,261 UART: [state] LifecycleState = Unprovisioned
622,609 UART: [state] DebugLocked = No
625,436 UART: [state] WD Timer not started. Device not locked for debugging
630,704 UART: [kat] SHA2-256
820,604 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,409 UART: [kat] ++
831,857 UART: [kat] sha1
843,234 UART: [kat] SHA2-256
846,248 UART: [kat] SHA2-384
850,891 UART: [kat] SHA2-512-ACC
853,531 UART: [kat] ECC-384
3,293,649 UART: [kat] HMAC-384Kdf
3,306,836 UART: [kat] LMS
3,838,630 UART: [kat] --
3,843,194 UART: [cold-reset] ++
3,844,484 UART: [fht] FHT @ 0x50003400
3,856,881 UART: [idev] ++
3,857,590 UART: [idev] CDI.KEYID = 6
3,858,498 UART: [idev] SUBJECT.KEYID = 7
3,859,749 UART: [idev] UDS.KEYID = 0
3,860,660 ready_for_fw is high
3,860,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,811 UART: [idev] Erasing UDS.KEYID = 0
6,338,042 UART: [idev] Sha1 KeyId Algorithm
6,360,307 UART: [idev] --
6,366,095 UART: [ldev] ++
6,366,782 UART: [ldev] CDI.KEYID = 6
6,367,802 UART: [ldev] SUBJECT.KEYID = 5
6,368,910 UART: [ldev] AUTHORITY.KEYID = 7
6,370,142 UART: [ldev] FE.KEYID = 1
6,380,683 UART: [ldev] Erasing FE.KEYID = 1
8,858,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,299 UART: [ldev] --
10,648,518 UART: [fwproc] Wait for Commands...
10,650,400 UART: [fwproc] Recv command 0x46574c44
10,652,713 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,301 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,938 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,031 >>> mbox cmd response: success
14,914,440 UART: [afmc] ++
14,915,151 UART: [afmc] CDI.KEYID = 6
14,916,400 UART: [afmc] SUBJECT.KEYID = 7
14,917,844 UART: [afmc] AUTHORITY.KEYID = 5
17,424,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,260 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,352 UART: [afmc] --
19,218,256 UART: [cold-reset] --
19,223,429 UART: [state] Locking Datavault
19,228,322 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,484 UART: [state] Locking ICCM
19,231,948 UART: [exit] Launching FMC @ 0x40000130
19,240,592 UART:
19,240,828 UART: Running Caliptra FMC ...
19,241,855 UART:
19,242,007 UART: [state] CFI Enabled
19,250,388 UART: [fht] FMC Alias Private Key: 7
21,016,646 UART: [art] Extend RT PCRs Done
21,017,898 UART: [art] Lock RT PCRs Done
21,019,347 UART: [art] Populate DV Done
21,024,495 UART: [fht] FMC Alias Private Key: 7
21,026,201 UART: [art] Derive CDI
21,027,023 UART: [art] Store in slot 0x4
21,069,957 UART: [art] Derive Key Pair
21,070,965 UART: [art] Store priv key in slot 0x5
23,498,427 UART: [art] Derive Key Pair - Done
23,511,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,527 UART: [art] PUB.X = BA5FD381E2B9F915C8B251720C2A1AC1D66A8FC3F1CFEF320A41317EC8BC9B728611DEA09DF7C863ECF3242A0DC60592
25,226,786 UART: [art] PUB.Y = 4C10D5EB1CAC44D1FA1B424E84C2C4AFE20496A54505BC43B8AD2DFCBF1C3172FCC68FBEC49748144AF980D694B8B4BE
25,234,109 UART: [art] SIG.R = 93C593BD54C80E74F967EB60BB82183ADEDF266E1267B1C29C74745ECF35833160FE6C28A813E838E605D74FF221B4C8
25,241,484 UART: [art] SIG.S = BE78B4CCBC0ECE180094915077D42A9F8F37889E37765AD922D9ADAF6942B2936945136AD527B7A05C31C7F361E3CCB6
26,220,570 UART: Caliptra RT
26,221,261 UART: [state] CFI Enabled
26,354,054 UART: [rt] RT listening for mailbox commands...
26,356,841 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,388,325 UART: [rt]cmd =0x53494756, len=196
27,353,772 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
3,760,057 ready_for_fw is high
3,760,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,863 >>> mbox cmd response: success
19,292,605 UART:
19,293,012 UART: Running Caliptra FMC ...
19,294,131 UART:
19,294,291 UART: [state] CFI Enabled
19,302,094 UART: [fht] FMC Alias Private Key: 7
21,068,096 UART: [art] Extend RT PCRs Done
21,069,332 UART: [art] Lock RT PCRs Done
21,071,263 UART: [art] Populate DV Done
21,076,915 UART: [fht] FMC Alias Private Key: 7
21,078,573 UART: [art] Derive CDI
21,079,317 UART: [art] Store in slot 0x4
21,121,987 UART: [art] Derive Key Pair
21,123,052 UART: [art] Store priv key in slot 0x5
23,550,082 UART: [art] Derive Key Pair - Done
23,563,244 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,826 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,335 UART: [art] PUB.X = 940A3853D74631921EB1213AB9A29A94D71B13B6BA377CFAE421901297D3811977C162D22F7E3ECD839F0A074AB2B693
25,278,630 UART: [art] PUB.Y = 9C395627131B070EDD2E1BD9F172A1CA9E11B1704D133B7710BCA88B525486EC1BB9B966EB843F694A5ED2BA5F745E2A
25,285,825 UART: [art] SIG.R = 011495C94CA48494275128FFD9098E650FD364D44CA462DE91C67AE7CDA02C1573573C30A60B0B0F220D018AB175CF72
25,293,200 UART: [art] SIG.S = 6BC692A6D4286CA417BBE611B38D0A8AE09A34DFCBF32B5E2CD5C844A104710E3912B10429EFFF37026BDF7CFB36E462
26,271,914 UART: Caliptra RT
26,272,608 UART: [state] CFI Enabled
26,405,348 UART: [rt] RT listening for mailbox commands...
26,408,128 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
26,439,591 UART: [rt]cmd =0x53494756, len=196
27,405,056 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,583 UART: [kat] SHA2-256
892,521 UART: [kat] SHA2-384
895,296 UART: [kat] SHA2-512-ACC
897,197 UART: [kat] ECC-384
902,678 UART: [kat] HMAC-384Kdf
907,430 UART: [kat] LMS
1,475,626 UART: [kat] --
1,476,737 UART: [cold-reset] ++
1,477,261 UART: [fht] Storing FHT @ 0x50003400
1,480,082 UART: [idev] ++
1,480,250 UART: [idev] CDI.KEYID = 6
1,480,610 UART: [idev] SUBJECT.KEYID = 7
1,481,034 UART: [idev] UDS.KEYID = 0
1,481,379 ready_for_fw is high
1,481,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,270 UART: [idev] Erasing UDS.KEYID = 0
1,505,974 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,640 UART: [idev] --
1,515,709 UART: [ldev] ++
1,515,877 UART: [ldev] CDI.KEYID = 6
1,516,240 UART: [ldev] SUBJECT.KEYID = 5
1,516,666 UART: [ldev] AUTHORITY.KEYID = 7
1,517,129 UART: [ldev] FE.KEYID = 1
1,522,367 UART: [ldev] Erasing FE.KEYID = 1
1,547,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,522 UART: [ldev] --
1,586,985 UART: [fwproc] Waiting for Commands...
1,587,666 UART: [fwproc] Received command 0x46574c44
1,588,457 UART: [fwproc] Received Image of size 118548 bytes
2,933,141 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,382 >>> mbox cmd response: success
3,133,482 UART: [afmc] ++
3,133,650 UART: [afmc] CDI.KEYID = 6
3,134,012 UART: [afmc] SUBJECT.KEYID = 7
3,134,437 UART: [afmc] AUTHORITY.KEYID = 5
3,169,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,724 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,213 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,096 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,779 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,707 UART: [afmc] --
3,212,689 UART: [cold-reset] --
3,213,587 UART: [state] Locking Datavault
3,214,744 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,348 UART: [state] Locking ICCM
3,215,964 UART: [exit] Launching FMC @ 0x40000130
3,221,294 UART:
3,221,310 UART: Running Caliptra FMC ...
3,221,718 UART:
3,221,772 UART: [state] CFI Enabled
3,232,188 UART: [fht] FMC Alias Private Key: 7
3,350,912 UART: [art] Extend RT PCRs Done
3,351,340 UART: [art] Lock RT PCRs Done
3,352,730 UART: [art] Populate DV Done
3,360,853 UART: [fht] FMC Alias Private Key: 7
3,361,841 UART: [art] Derive CDI
3,362,121 UART: [art] Store in slot 0x4
3,447,925 UART: [art] Derive Key Pair
3,448,285 UART: [art] Store priv key in slot 0x5
3,462,158 UART: [art] Derive Key Pair - Done
3,477,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,556 UART: [art] PUB.X = 30F6BF32B41E5BA86EF9315C2D192F97C822C9CBB083C4D1841AAD91EF57F62CF77827B1A52CCE6A25EB17099FDE98AC
3,500,341 UART: [art] PUB.Y = CA39F595610848884C8D0158746BD4A23A75C93BEFE87899758CEA25C3AB5EDF64778F579F91C19888AFA7DEE5235AF9
3,507,291 UART: [art] SIG.R = 0DCCA06AF3D750E1E735C9DB7EA1EA4ABB41324009D3505DAA334EF09C3D46740DFEBCF7CE84F17F25FB3EE4A13D86CD
3,514,080 UART: [art] SIG.S = FE2B361B346036DB4CE17E5FBF3531A481A536F9961F71B8C374668973DE3C66FA11699D47EFDA0AB1936F6019549BC1
3,537,689 UART: Caliptra RT
3,537,940 UART: [state] CFI Enabled
3,656,912 UART: [rt] RT listening for mailbox commands...
3,657,582 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,358 UART: [rt]cmd =0x53494756, len=196
3,693,832 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,299 ready_for_fw is high
1,363,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,898 >>> mbox cmd response: success
3,044,289 UART:
3,044,305 UART: Running Caliptra FMC ...
3,044,713 UART:
3,044,767 UART: [state] CFI Enabled
3,055,345 UART: [fht] FMC Alias Private Key: 7
3,174,563 UART: [art] Extend RT PCRs Done
3,174,991 UART: [art] Lock RT PCRs Done
3,176,459 UART: [art] Populate DV Done
3,184,630 UART: [fht] FMC Alias Private Key: 7
3,185,646 UART: [art] Derive CDI
3,185,926 UART: [art] Store in slot 0x4
3,271,148 UART: [art] Derive Key Pair
3,271,508 UART: [art] Store priv key in slot 0x5
3,284,491 UART: [art] Derive Key Pair - Done
3,299,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,251 UART: [art] PUB.X = 270FB36FD32A8D0792368FD2BC6F450FC7728E2992C7EBFE722FEA3A494A688E8C579301B13BD7E0AE66FC2C5656AD12
3,322,021 UART: [art] PUB.Y = 10979E41C10682D88B355F1A416266A18B391CA2893FDD2AA1E550710D30AB0C78275BDA2886E11D80E62C65175662A3
3,328,956 UART: [art] SIG.R = 44E2EDB8BB4813E5ACC1354877374AF2A528EF7D20980BDE6FDE713CB8C306E76B3C8146FC90F8C6BFDBA19F483A598D
3,335,738 UART: [art] SIG.S = 263705292904E46169DF459C7C718685A937E8F1CAEBEBE9C77BBE269D1871FE5EC5736226A57E8D4CF75C43FA278BA8
3,359,542 UART: Caliptra RT
3,359,793 UART: [state] CFI Enabled
3,480,536 UART: [rt] RT listening for mailbox commands...
3,481,206 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,454 UART: [rt]cmd =0x53494756, len=196
3,518,074 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,473 UART: [kat] SHA2-512-ACC
897,374 UART: [kat] ECC-384
903,241 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,476,802 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,873 UART: [idev] ++
1,480,041 UART: [idev] CDI.KEYID = 6
1,480,401 UART: [idev] SUBJECT.KEYID = 7
1,480,825 UART: [idev] UDS.KEYID = 0
1,481,170 ready_for_fw is high
1,481,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,981 UART: [idev] Erasing UDS.KEYID = 0
1,505,779 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,155 UART: [idev] --
1,515,204 UART: [ldev] ++
1,515,372 UART: [ldev] CDI.KEYID = 6
1,515,735 UART: [ldev] SUBJECT.KEYID = 5
1,516,161 UART: [ldev] AUTHORITY.KEYID = 7
1,516,624 UART: [ldev] FE.KEYID = 1
1,521,962 UART: [ldev] Erasing FE.KEYID = 1
1,547,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,289 UART: [ldev] --
1,586,570 UART: [fwproc] Waiting for Commands...
1,587,197 UART: [fwproc] Received command 0x46574c44
1,587,988 UART: [fwproc] Received Image of size 118548 bytes
2,933,148 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,220 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,795 >>> mbox cmd response: success
3,132,805 UART: [afmc] ++
3,132,973 UART: [afmc] CDI.KEYID = 6
3,133,335 UART: [afmc] SUBJECT.KEYID = 7
3,133,760 UART: [afmc] AUTHORITY.KEYID = 5
3,169,261 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,571 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,351 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,060 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,943 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,626 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,572 UART: [afmc] --
3,212,544 UART: [cold-reset] --
3,213,224 UART: [state] Locking Datavault
3,214,397 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,001 UART: [state] Locking ICCM
3,215,641 UART: [exit] Launching FMC @ 0x40000130
3,220,971 UART:
3,220,987 UART: Running Caliptra FMC ...
3,221,395 UART:
3,221,538 UART: [state] CFI Enabled
3,232,048 UART: [fht] FMC Alias Private Key: 7
3,350,948 UART: [art] Extend RT PCRs Done
3,351,376 UART: [art] Lock RT PCRs Done
3,352,816 UART: [art] Populate DV Done
3,360,831 UART: [fht] FMC Alias Private Key: 7
3,361,873 UART: [art] Derive CDI
3,362,153 UART: [art] Store in slot 0x4
3,448,207 UART: [art] Derive Key Pair
3,448,567 UART: [art] Store priv key in slot 0x5
3,461,994 UART: [art] Derive Key Pair - Done
3,476,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,207 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,972 UART: [art] PUB.X = 1E398311090E7D3A6E084D7B5CC7A79AE79BA851E5E7805246B7AB86EDD9CF2C215F623806B4030DAC19EE655DA85721
3,499,730 UART: [art] PUB.Y = A348E74153B0B69FFB44B8AB830545FE594284D1E016B04955B5FD23C0C3E385F3245F4744E302097DC9A992683A45D7
3,506,667 UART: [art] SIG.R = D0BA746F6F0593B5707113EC4F1512A85F8A80451665EC528AD16887DFF021983F50107C1633FDBEFEF71FA91ABBDA53
3,513,442 UART: [art] SIG.S = A94642AD41A0135438C62DA01B453DBE52B67067868F0B31DD0FF3E905C4F5AAF912615B1C64482892E4D8E7D3FD5AF8
3,537,281 UART: Caliptra RT
3,537,624 UART: [state] CFI Enabled
3,657,283 UART: [rt] RT listening for mailbox commands...
3,657,953 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,953 UART: [rt]cmd =0x53494756, len=196
3,694,013 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,214 ready_for_fw is high
1,362,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,289 >>> mbox cmd response: success
3,040,562 UART:
3,040,578 UART: Running Caliptra FMC ...
3,040,986 UART:
3,041,129 UART: [state] CFI Enabled
3,051,915 UART: [fht] FMC Alias Private Key: 7
3,170,763 UART: [art] Extend RT PCRs Done
3,171,191 UART: [art] Lock RT PCRs Done
3,172,863 UART: [art] Populate DV Done
3,180,912 UART: [fht] FMC Alias Private Key: 7
3,181,950 UART: [art] Derive CDI
3,182,230 UART: [art] Store in slot 0x4
3,267,900 UART: [art] Derive Key Pair
3,268,260 UART: [art] Store priv key in slot 0x5
3,281,661 UART: [art] Derive Key Pair - Done
3,296,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,745 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,510 UART: [art] PUB.X = 4D26C177F93D72338D64E519B54B1AD06F297DCA6440EFB358B778F5B21BFB5DA83964253A28657F20FF4852507CDE06
3,319,279 UART: [art] PUB.Y = F5298917A6510F624A886B65781AAF383D7D3340223E8D0AB1D6CCAEFF90E3F5A376DFF5C6A011090C9D41C1136B7376
3,326,221 UART: [art] SIG.R = 0A3FCFD6CC40A779AC50471DF3E26B5EF8A49FB4248A8ED401FDB194615B2FBF85F313841A3CA999C364EA26489E41A6
3,332,999 UART: [art] SIG.S = 1FC0383842E6979FB1FAD91A49F79919F40697DC7031E36A02227143D8CA05F87EDB981FBFF50F21AB33871F839C1631
3,356,221 UART: Caliptra RT
3,356,564 UART: [state] CFI Enabled
3,476,031 UART: [rt] RT listening for mailbox commands...
3,476,701 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,813 UART: [rt]cmd =0x53494756, len=196
3,513,657 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,700 UART: [kat] SHA2-256
901,640 UART: [kat] SHA2-384
904,203 UART: [kat] SHA2-512-ACC
906,104 UART: [kat] ECC-384
916,023 UART: [kat] HMAC-384Kdf
920,627 UART: [kat] LMS
1,168,939 UART: [kat] --
1,169,998 UART: [cold-reset] ++
1,170,386 UART: [fht] FHT @ 0x50003400
1,172,898 UART: [idev] ++
1,173,066 UART: [idev] CDI.KEYID = 6
1,173,427 UART: [idev] SUBJECT.KEYID = 7
1,173,852 UART: [idev] UDS.KEYID = 0
1,174,198 ready_for_fw is high
1,174,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,429 UART: [idev] Sha1 KeyId Algorithm
1,208,343 UART: [idev] --
1,209,384 UART: [ldev] ++
1,209,552 UART: [ldev] CDI.KEYID = 6
1,209,916 UART: [ldev] SUBJECT.KEYID = 5
1,210,343 UART: [ldev] AUTHORITY.KEYID = 7
1,210,806 UART: [ldev] FE.KEYID = 1
1,216,080 UART: [ldev] Erasing FE.KEYID = 1
1,241,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,666 UART: [fwproc] Recv command 0x46574c44
1,282,399 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,733 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,908 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,223 >>> mbox cmd response: success
2,827,437 UART: [afmc] ++
2,827,605 UART: [afmc] CDI.KEYID = 6
2,827,968 UART: [afmc] SUBJECT.KEYID = 7
2,828,394 UART: [afmc] AUTHORITY.KEYID = 5
2,864,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,409 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,119 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,000 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,446 UART: [afmc] --
2,907,331 UART: [cold-reset] --
2,908,257 UART: [state] Locking Datavault
2,909,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,832 UART: [state] Locking ICCM
2,910,440 UART: [exit] Launching FMC @ 0x40000130
2,915,770 UART:
2,915,786 UART: Running Caliptra FMC ...
2,916,194 UART:
2,916,248 UART: [state] CFI Enabled
2,926,534 UART: [fht] FMC Alias Private Key: 7
3,045,160 UART: [art] Extend RT PCRs Done
3,045,588 UART: [art] Lock RT PCRs Done
3,047,158 UART: [art] Populate DV Done
3,055,595 UART: [fht] FMC Alias Private Key: 7
3,056,687 UART: [art] Derive CDI
3,056,967 UART: [art] Store in slot 0x4
3,142,450 UART: [art] Derive Key Pair
3,142,810 UART: [art] Store priv key in slot 0x5
3,156,110 UART: [art] Derive Key Pair - Done
3,171,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,231 UART: [art] PUB.X = 18639CF494956E02357989F0CF91195A730061DA31971571519BB4DEA9AE3E5CA76524B614A04F35F94AD6E804E17FA0
3,193,969 UART: [art] PUB.Y = 21DF001081FF178EDCC0C24FBA7862F28D4E3968A40944568E77017ECBDFA2E4C1D4EC3CFBD946B13B8C0A410AE9EA42
3,200,903 UART: [art] SIG.R = 74F5DC25C57716BB2F512165577CDCBBFC02795C29A83A6966354F716B7FB4F2B3378E2EC722E0E16CABFA4F175F6185
3,207,678 UART: [art] SIG.S = 8ADF88E9AA44B6DC0539996F62931772A18DB2B7992308F62CAA6407978F439882D2D37D9D21D4ED0B1CB28A10362294
3,231,138 UART: Caliptra RT
3,231,389 UART: [state] CFI Enabled
3,350,768 UART: [rt] RT listening for mailbox commands...
3,351,438 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,618 UART: [rt]cmd =0x53494756, len=196
3,388,266 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,978 ready_for_fw is high
1,058,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,464 >>> mbox cmd response: success
2,739,391 UART:
2,739,407 UART: Running Caliptra FMC ...
2,739,815 UART:
2,739,869 UART: [state] CFI Enabled
2,750,303 UART: [fht] FMC Alias Private Key: 7
2,868,425 UART: [art] Extend RT PCRs Done
2,868,853 UART: [art] Lock RT PCRs Done
2,870,177 UART: [art] Populate DV Done
2,878,452 UART: [fht] FMC Alias Private Key: 7
2,879,600 UART: [art] Derive CDI
2,879,880 UART: [art] Store in slot 0x4
2,965,849 UART: [art] Derive Key Pair
2,966,209 UART: [art] Store priv key in slot 0x5
2,978,869 UART: [art] Derive Key Pair - Done
2,993,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,248 UART: [art] PUB.X = D3ADBC2E7582EDF207880B6D11D69C25E85F7930A70AF92E39D91E6B9E032CEA74ECA04C8201C0DFC217BAD7EC131538
3,016,019 UART: [art] PUB.Y = 032286F21619A7F0CCAA63D125BA83C8463D76A9C71C26CF2413410D6966686A165AAC7A4EA80E239E03547273E6A47C
3,022,955 UART: [art] SIG.R = 8207F923A458A49234946707F6C2C4068C81963BE4D645A2E218BF3870C8521EAF9578CF66BDBD41F1C66C9B4617FC59
3,029,714 UART: [art] SIG.S = 479E7565F1573675ED76C3A9E95A817A083990608B656AF9675B85FFE0B047FB399560A07C9C1A7FAEF4607111E8D997
3,053,689 UART: Caliptra RT
3,053,940 UART: [state] CFI Enabled
3,174,117 UART: [rt] RT listening for mailbox commands...
3,174,787 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,249 UART: [rt]cmd =0x53494756, len=196
3,211,705 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,183 UART: [state] LifecycleState = Unprovisioned
85,838 UART: [state] DebugLocked = No
86,364 UART: [state] WD Timer not started. Device not locked for debugging
87,659 UART: [kat] SHA2-256
891,209 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,313 UART: [kat] ++
895,465 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,266 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,173,119 UART: [idev] ++
1,173,287 UART: [idev] CDI.KEYID = 6
1,173,648 UART: [idev] SUBJECT.KEYID = 7
1,174,073 UART: [idev] UDS.KEYID = 0
1,174,419 ready_for_fw is high
1,174,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,396 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,075 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,671 UART: [ldev] --
1,282,110 UART: [fwproc] Wait for Commands...
1,282,789 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,446 >>> mbox cmd response: success
2,827,622 UART: [afmc] ++
2,827,790 UART: [afmc] CDI.KEYID = 6
2,828,153 UART: [afmc] SUBJECT.KEYID = 7
2,828,579 UART: [afmc] AUTHORITY.KEYID = 5
2,864,034 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,797 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,498 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,219 UART: [afmc] --
2,907,234 UART: [cold-reset] --
2,908,224 UART: [state] Locking Datavault
2,909,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,063 UART: [state] Locking ICCM
2,910,541 UART: [exit] Launching FMC @ 0x40000130
2,915,871 UART:
2,915,887 UART: Running Caliptra FMC ...
2,916,295 UART:
2,916,438 UART: [state] CFI Enabled
2,927,168 UART: [fht] FMC Alias Private Key: 7
3,045,964 UART: [art] Extend RT PCRs Done
3,046,392 UART: [art] Lock RT PCRs Done
3,047,924 UART: [art] Populate DV Done
3,055,889 UART: [fht] FMC Alias Private Key: 7
3,057,013 UART: [art] Derive CDI
3,057,293 UART: [art] Store in slot 0x4
3,143,352 UART: [art] Derive Key Pair
3,143,712 UART: [art] Store priv key in slot 0x5
3,157,324 UART: [art] Derive Key Pair - Done
3,172,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,450 UART: [art] PUB.X = F8E4833EF8788C0C733AFBC709356504A92300CF6CDC2BBE99B7BA6A0670FE1D702FA8517DCC60BF6531308FC968C440
3,195,196 UART: [art] PUB.Y = BE4DF5783C911D88E10FE8B4C87454E3D3CB9A7C52D90E81E5136DED5A236AFC44362CB8522A166EC3394E6734861683
3,202,144 UART: [art] SIG.R = 7EA6DF29789D5C45B1CCF5DDB18B45DA4725AAB270654DE87BE095F9CA2618F414968B33E991FB0D3798F69589E6E490
3,208,919 UART: [art] SIG.S = F9B99549AC9558F0BA0D3DBD6470546F9288291024E8FADC1FED20C72077CEB4FDC85795BCCAE18F5F59D8D485C05068
3,232,648 UART: Caliptra RT
3,232,991 UART: [state] CFI Enabled
3,352,108 UART: [rt] RT listening for mailbox commands...
3,352,778 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,982 UART: [rt]cmd =0x53494756, len=196
3,389,168 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,011 ready_for_fw is high
1,060,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,687 >>> mbox cmd response: success
2,742,294 UART:
2,742,310 UART: Running Caliptra FMC ...
2,742,718 UART:
2,742,861 UART: [state] CFI Enabled
2,753,651 UART: [fht] FMC Alias Private Key: 7
2,872,263 UART: [art] Extend RT PCRs Done
2,872,691 UART: [art] Lock RT PCRs Done
2,874,171 UART: [art] Populate DV Done
2,882,398 UART: [fht] FMC Alias Private Key: 7
2,883,386 UART: [art] Derive CDI
2,883,666 UART: [art] Store in slot 0x4
2,969,361 UART: [art] Derive Key Pair
2,969,721 UART: [art] Store priv key in slot 0x5
2,982,485 UART: [art] Derive Key Pair - Done
2,997,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,182 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,947 UART: [art] PUB.X = C5881026B56CD0AA994AA8992F52DA16236692E2B7C473E8B01E0C7DE4B756F1BA003A7D58CA06E6344D494DEC62513D
3,020,695 UART: [art] PUB.Y = 5B46F00B5225448D927A6A63F607D7203DDF893491E93E77F2AD3CA70613B692FD018F9AF0B208700B396785CA9F7B3D
3,027,627 UART: [art] SIG.R = FFA5B180D164EB4A6D23A7C4F8748E7C9143F131E0FC8A54F9938C872E029422CD62F32E2BDA32F6EA4224AA77E5E891
3,034,404 UART: [art] SIG.S = EA2E700D270527C204C657C6C3B9FBA1EDB1E4D94E9438A125FE913D277F59290AF1632670967B9CDD66033220E3E75B
3,058,499 UART: Caliptra RT
3,058,842 UART: [state] CFI Enabled
3,178,868 UART: [rt] RT listening for mailbox commands...
3,179,538 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,704 UART: [rt]cmd =0x53494756, len=196
3,215,880 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Unprovisioned
85,541 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
892,962 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,087 UART: [kat] ++
897,239 UART: [kat] sha1
901,373 UART: [kat] SHA2-256
903,313 UART: [kat] SHA2-384
906,024 UART: [kat] SHA2-512-ACC
907,925 UART: [kat] ECC-384
917,930 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,799 UART: [cold-reset] ++
1,172,127 UART: [fht] FHT @ 0x50003400
1,174,928 UART: [idev] ++
1,175,096 UART: [idev] CDI.KEYID = 6
1,175,456 UART: [idev] SUBJECT.KEYID = 7
1,175,880 UART: [idev] UDS.KEYID = 0
1,176,225 ready_for_fw is high
1,176,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,822 UART: [idev] Erasing UDS.KEYID = 0
1,201,041 UART: [idev] Sha1 KeyId Algorithm
1,209,555 UART: [idev] --
1,210,669 UART: [ldev] ++
1,210,837 UART: [ldev] CDI.KEYID = 6
1,211,200 UART: [ldev] SUBJECT.KEYID = 5
1,211,626 UART: [ldev] AUTHORITY.KEYID = 7
1,212,089 UART: [ldev] FE.KEYID = 1
1,217,401 UART: [ldev] Erasing FE.KEYID = 1
1,243,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,018 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,390 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,812 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,195 >>> mbox cmd response: success
2,828,429 UART: [afmc] ++
2,828,597 UART: [afmc] CDI.KEYID = 6
2,828,959 UART: [afmc] SUBJECT.KEYID = 7
2,829,384 UART: [afmc] AUTHORITY.KEYID = 5
2,865,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,232 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,941 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,824 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,525 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,421 UART: [afmc] --
2,908,495 UART: [cold-reset] --
2,909,265 UART: [state] Locking Datavault
2,910,474 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,078 UART: [state] Locking ICCM
2,911,708 UART: [exit] Launching FMC @ 0x40000130
2,917,038 UART:
2,917,054 UART: Running Caliptra FMC ...
2,917,462 UART:
2,917,516 UART: [state] CFI Enabled
2,928,198 UART: [fht] FMC Alias Private Key: 7
3,047,484 UART: [art] Extend RT PCRs Done
3,047,912 UART: [art] Lock RT PCRs Done
3,049,476 UART: [art] Populate DV Done
3,058,011 UART: [fht] FMC Alias Private Key: 7
3,059,143 UART: [art] Derive CDI
3,059,423 UART: [art] Store in slot 0x4
3,145,240 UART: [art] Derive Key Pair
3,145,600 UART: [art] Store priv key in slot 0x5
3,158,902 UART: [art] Derive Key Pair - Done
3,173,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,417 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,182 UART: [art] PUB.X = 4FDA20A1AF3C0A996752829A0EFE762FAD1DFD8F40FD594F123723B995C8B9F2E75A8DC59C896F4DC08240752F34AB32
3,195,958 UART: [art] PUB.Y = 791A5155C9C4EE9F0389C494C89EE496EE6A60A4FDB1B86B305A0EEAC0257BABD0EEE1B7A50E0A7F3FFBCFDCAD9CAF62
3,202,930 UART: [art] SIG.R = 63004C4AE3F9EDAFA5A1A1AA4522258F005282831324E1889F32A3BE8ECC75C55D1D3E9136059CD95BB1F0643141C072
3,209,655 UART: [art] SIG.S = 1D296D73DC513B4ACA1C4326C4FDA24E36F5EB23AE2EE6B7EDF05A12E830E9136F6176790DDD5BD572923628AD1A1EA0
3,233,420 UART: Caliptra RT
3,233,671 UART: [state] CFI Enabled
3,352,839 UART: [rt] RT listening for mailbox commands...
3,353,509 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,319 UART: [rt]cmd =0x53494756, len=196
3,389,613 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,229 ready_for_fw is high
1,060,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,352 >>> mbox cmd response: success
2,741,801 UART:
2,741,817 UART: Running Caliptra FMC ...
2,742,225 UART:
2,742,279 UART: [state] CFI Enabled
2,752,813 UART: [fht] FMC Alias Private Key: 7
2,871,635 UART: [art] Extend RT PCRs Done
2,872,063 UART: [art] Lock RT PCRs Done
2,873,483 UART: [art] Populate DV Done
2,881,586 UART: [fht] FMC Alias Private Key: 7
2,882,544 UART: [art] Derive CDI
2,882,824 UART: [art] Store in slot 0x4
2,968,733 UART: [art] Derive Key Pair
2,969,093 UART: [art] Store priv key in slot 0x5
2,982,169 UART: [art] Derive Key Pair - Done
2,997,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,717 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,482 UART: [art] PUB.X = 2F0E1689D8E3085E25198B2DC52736B82DFE24E17589190333C3A355331EC7CDD1B92D3A60131C16C446D4F5E5555ED6
3,020,241 UART: [art] PUB.Y = 459EF1C5E330D1ADB0AECDE54AA2CB2E5C77B72EF1B29DD47743A91B63666899E8A49F9E08DFA461EA55A50EF9F7FDB3
3,027,209 UART: [art] SIG.R = 9FF2B8AB46BE0EA8BE23092760DBE20C0097B82DA27E6E0CCD172F47107FD10BFD849694EC251A2D3FBE24F54CE682EE
3,033,962 UART: [art] SIG.S = 5411270F041D14117C31DB1F028FC7A48CEF2396EC69B4FD9E8B5987211666CCF0575144F7FB6AF51930C2BFBBA2194A
3,057,879 UART: Caliptra RT
3,058,130 UART: [state] CFI Enabled
3,178,053 UART: [rt] RT listening for mailbox commands...
3,178,723 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,787 UART: [rt]cmd =0x53494756, len=196
3,214,883 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
893,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,938 UART: [kat] ++
898,090 UART: [kat] sha1
902,222 UART: [kat] SHA2-256
904,162 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,421 UART: [kat] LMS
1,171,749 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,172,984 UART: [fht] FHT @ 0x50003400
1,175,665 UART: [idev] ++
1,175,833 UART: [idev] CDI.KEYID = 6
1,176,193 UART: [idev] SUBJECT.KEYID = 7
1,176,617 UART: [idev] UDS.KEYID = 0
1,176,962 ready_for_fw is high
1,176,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,343 UART: [idev] Erasing UDS.KEYID = 0
1,201,732 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,240 UART: [ldev] ++
1,211,408 UART: [ldev] CDI.KEYID = 6
1,211,771 UART: [ldev] SUBJECT.KEYID = 5
1,212,197 UART: [ldev] AUTHORITY.KEYID = 7
1,212,660 UART: [ldev] FE.KEYID = 1
1,218,206 UART: [ldev] Erasing FE.KEYID = 1
1,244,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,606 UART: [ldev] --
1,283,871 UART: [fwproc] Wait for Commands...
1,284,523 UART: [fwproc] Recv command 0x46574c44
1,285,251 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,842 >>> mbox cmd response: success
2,830,036 UART: [afmc] ++
2,830,204 UART: [afmc] CDI.KEYID = 6
2,830,566 UART: [afmc] SUBJECT.KEYID = 7
2,830,991 UART: [afmc] AUTHORITY.KEYID = 5
2,866,062 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,332 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,916 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,974 UART: [afmc] --
2,910,038 UART: [cold-reset] --
2,910,822 UART: [state] Locking Datavault
2,911,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,419 UART: [state] Locking ICCM
2,913,049 UART: [exit] Launching FMC @ 0x40000130
2,918,379 UART:
2,918,395 UART: Running Caliptra FMC ...
2,918,803 UART:
2,918,946 UART: [state] CFI Enabled
2,929,948 UART: [fht] FMC Alias Private Key: 7
3,048,384 UART: [art] Extend RT PCRs Done
3,048,812 UART: [art] Lock RT PCRs Done
3,050,476 UART: [art] Populate DV Done
3,058,933 UART: [fht] FMC Alias Private Key: 7
3,059,979 UART: [art] Derive CDI
3,060,259 UART: [art] Store in slot 0x4
3,146,200 UART: [art] Derive Key Pair
3,146,560 UART: [art] Store priv key in slot 0x5
3,159,554 UART: [art] Derive Key Pair - Done
3,174,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,672 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,437 UART: [art] PUB.X = 960F71DB8D1F4D3261AE3CD3F92A1E389E4F1964E939017D20C747C00BE1821B199A1C388A6E52F6FC72A552CBB4A032
3,197,204 UART: [art] PUB.Y = C9EA678D70D3FCFDFBA7630DC568917FE3A82AE039F392D8324F26628603890F3B8E02A7A825AB04751704B506B8E9E4
3,204,137 UART: [art] SIG.R = B46121DBC048149C7F021BBB8C1B162F6094AC481C3E9FEDA9FF4929940DFE1C465FB971A92FA18C881C48CD6B6F5EB6
3,210,917 UART: [art] SIG.S = 2EA2F186C8993987ADFCCC349BC818CE12C216A4934D1B64352A695E8D03FF644712523702D467DADE15A87E62F0F1B5
3,234,705 UART: Caliptra RT
3,235,048 UART: [state] CFI Enabled
3,354,341 UART: [rt] RT listening for mailbox commands...
3,355,011 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,015 UART: [rt]cmd =0x53494756, len=196
3,391,403 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,200 ready_for_fw is high
1,060,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,343 >>> mbox cmd response: success
2,740,438 UART:
2,740,454 UART: Running Caliptra FMC ...
2,740,862 UART:
2,741,005 UART: [state] CFI Enabled
2,751,787 UART: [fht] FMC Alias Private Key: 7
2,870,293 UART: [art] Extend RT PCRs Done
2,870,721 UART: [art] Lock RT PCRs Done
2,872,015 UART: [art] Populate DV Done
2,880,408 UART: [fht] FMC Alias Private Key: 7
2,881,478 UART: [art] Derive CDI
2,881,758 UART: [art] Store in slot 0x4
2,967,137 UART: [art] Derive Key Pair
2,967,497 UART: [art] Store priv key in slot 0x5
2,980,655 UART: [art] Derive Key Pair - Done
2,995,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,802 UART: [art] PUB.X = 63B64AF0CD64C65F1F16C379DEC6F46FDB2D9DA165360E955A67DCD6DE79ADF8C3848DE90297B8B8BBE5A3ADD78343D5
3,018,588 UART: [art] PUB.Y = 1BFA074731F9BBD169B6117156FF086A4BA18182C14590B46456C4787BB5E3416EC1E4C3BE7D292592E426BC1ED9793E
3,025,534 UART: [art] SIG.R = 965ECC80DCF110514B8EB2DD92ACF2D14E40F9F3E9554B268CD35AB9DB497F33583E975EA2D70902B62EDFDF81D4B082
3,032,314 UART: [art] SIG.S = F91193507CF2F3A344DDB09E3A72BC7316F2D1409F75EF4A8A4E7E60E397381E1F4AA1469401BA0FEE97C08AC9563FB0
3,056,056 UART: Caliptra RT
3,056,399 UART: [state] CFI Enabled
3,176,275 UART: [rt] RT listening for mailbox commands...
3,176,945 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,195 UART: [rt]cmd =0x53494756, len=196
3,213,385 >>> mbox cmd response data (8 bytes)
test test_ecdsa::test_ecdsa_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,178 UART:
192,538 UART: Running Caliptra ROM ...
193,720 UART:
193,876 UART: [state] CFI Enabled
267,051 UART: [state] LifecycleState = Unprovisioned
269,029 UART: [state] DebugLocked = No
271,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,589 UART: [kat] SHA2-256
445,319 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,839 UART: [kat] ++
456,321 UART: [kat] sha1
467,764 UART: [kat] SHA2-256
470,488 UART: [kat] SHA2-384
476,336 UART: [kat] SHA2-512-ACC
478,713 UART: [kat] ECC-384
2,769,040 UART: [kat] HMAC-384Kdf
2,801,876 UART: [kat] LMS
3,992,176 UART: [kat] --
3,995,251 UART: [cold-reset] ++
3,996,326 UART: [fht] Storing FHT @ 0x50003400
4,008,228 UART: [idev] ++
4,008,795 UART: [idev] CDI.KEYID = 6
4,009,719 UART: [idev] SUBJECT.KEYID = 7
4,010,968 UART: [idev] UDS.KEYID = 0
4,012,061 ready_for_fw is high
4,012,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,801 UART: [idev] Erasing UDS.KEYID = 0
7,345,624 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,571 UART: [idev] --
7,369,700 UART: [ldev] ++
7,370,269 UART: [ldev] CDI.KEYID = 6
7,371,240 UART: [ldev] SUBJECT.KEYID = 5
7,372,456 UART: [ldev] AUTHORITY.KEYID = 7
7,373,686 UART: [ldev] FE.KEYID = 1
7,403,133 UART: [ldev] Erasing FE.KEYID = 1
10,738,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,066,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,587 UART: [ldev] --
13,119,178 UART: [fwproc] Waiting for Commands...
13,121,979 UART: [fwproc] Received command 0x46574c44
13,124,158 UART: [fwproc] Received Image of size 118548 bytes
17,233,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,309,325 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,382,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,711,310 >>> mbox cmd response: success
17,712,395 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,715,618 UART: [afmc] ++
17,716,198 UART: [afmc] CDI.KEYID = 6
17,717,165 UART: [afmc] SUBJECT.KEYID = 7
17,718,385 UART: [afmc] AUTHORITY.KEYID = 5
21,072,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,695 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,126 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,009 UART: [afmc] --
23,442,779 UART: [cold-reset] --
23,445,784 UART: [state] Locking Datavault
23,452,657 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,408 UART: [state] Locking ICCM
23,455,693 UART: [exit] Launching FMC @ 0x40000130
23,464,092 UART:
23,464,331 UART: Running Caliptra FMC ...
23,465,432 UART:
23,465,598 UART: [state] CFI Enabled
23,533,443 UART: [fht] FMC Alias Private Key: 7
25,873,869 UART: [art] Extend RT PCRs Done
25,875,082 UART: [art] Lock RT PCRs Done
25,876,512 UART: [art] Populate DV Done
25,881,872 UART: [fht] FMC Alias Private Key: 7
25,883,464 UART: [art] Derive CDI
25,884,276 UART: [art] Store in slot 0x4
25,942,329 UART: [art] Derive Key Pair
25,943,368 UART: [art] Store priv key in slot 0x5
29,236,272 UART: [art] Derive Key Pair - Done
29,249,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,292 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,812 UART: [art] PUB.X = DA7AA7155213F9C974B3A9418EFDCB6BE92821C67B594FA0C15BD03822B7A9EBA6B7A5AC26CE692A9155BBEBF026D5B1
31,546,089 UART: [art] PUB.Y = 6B0C1A6462DD119A59F4ABAEE259323F84CEEE6C68C7C6698A3864AEA1688141246DC57C73D611CA730697FAD3112F60
31,553,321 UART: [art] SIG.R = A03B02A0392062AA7C18DB85930D9ACA9468E983072E567D2DA7F0A6EDA31EF28F5AC625624E4DF30F565B2B0072B46B
31,560,709 UART: [art] SIG.S = 0646E31DE23C7EB5FE3EA96DECCF81BE2A0BC0C46233B87B956106663FE8DBE9365BF9FC1B8D8CC5FEECA83E6932FBB3
32,865,543 UART: Caliptra RT
32,866,247 UART: [state] CFI Enabled
33,042,605 UART: [rt] RT listening for mailbox commands...
33,073,772 UART: [rt]cmd =0x46505344, len=4
33,183,919 >>> mbox cmd response data (8 bytes)
33,184,484 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,184,772 UART: Fatal Error: 0x000E0008
33,185,912 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,785,241 ready_for_fw is high
3,785,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,917,869 >>> mbox cmd response: success
17,919,169 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,609,761 UART:
23,610,158 UART: Running Caliptra FMC ...
23,611,300 UART:
23,611,464 UART: [state] CFI Enabled
23,679,273 UART: [fht] FMC Alias Private Key: 7
26,019,010 UART: [art] Extend RT PCRs Done
26,020,241 UART: [art] Lock RT PCRs Done
26,021,977 UART: [art] Populate DV Done
26,027,291 UART: [fht] FMC Alias Private Key: 7
26,028,874 UART: [art] Derive CDI
26,029,682 UART: [art] Store in slot 0x4
26,087,683 UART: [art] Derive Key Pair
26,088,694 UART: [art] Store priv key in slot 0x5
29,380,964 UART: [art] Derive Key Pair - Done
29,394,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,683,955 UART: [art] Erasing AUTHORITY.KEYID = 7
31,685,458 UART: [art] PUB.X = 9110B972F29095E342E0E86379BE16CEC32189CA3DFA7799993909661A298B0DDE335FF2550D6A182C0BE01BDA924B3C
31,692,761 UART: [art] PUB.Y = B0BCDDF2288F8B5C21CD9D0729F5D3AE4162FF06FB002683A2E825C9E98364834B89DF87908EF7F2D7491898BC0FD511
31,699,997 UART: [art] SIG.R = 6F687F66216BC73A92067AF8AB10E1F5B10D1A0D537CFCA9D45598873158BAAF1DE20DC9263E8C0054D330B1742921D9
31,707,330 UART: [art] SIG.S = 5B064FFC7278BD3D5496462ECB13B38E56BC60E11DF846CD880FBC5EA68B84B1B0B1C8B7AD5EF0D126E8643E65612BE1
33,012,832 UART: Caliptra RT
33,013,539 UART: [state] CFI Enabled
33,190,850 UART: [rt] RT listening for mailbox commands...
33,222,264 UART: [rt]cmd =0x46505344, len=4
33,332,396 >>> mbox cmd response data (8 bytes)
33,332,948 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,333,232 UART: Fatal Error: 0x000E0008
33,334,359 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,431 UART:
192,786 UART: Running Caliptra ROM ...
193,869 UART:
603,841 UART: [state] CFI Enabled
617,368 UART: [state] LifecycleState = Unprovisioned
619,236 UART: [state] DebugLocked = No
621,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,248 UART: [kat] SHA2-256
796,037 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,555 UART: [kat] ++
807,054 UART: [kat] sha1
817,010 UART: [kat] SHA2-256
819,724 UART: [kat] SHA2-384
825,066 UART: [kat] SHA2-512-ACC
827,439 UART: [kat] ECC-384
3,112,720 UART: [kat] HMAC-384Kdf
3,125,092 UART: [kat] LMS
4,315,233 UART: [kat] --
4,320,873 UART: [cold-reset] ++
4,323,587 UART: [fht] Storing FHT @ 0x50003400
4,334,003 UART: [idev] ++
4,334,566 UART: [idev] CDI.KEYID = 6
4,335,595 UART: [idev] SUBJECT.KEYID = 7
4,336,765 UART: [idev] UDS.KEYID = 0
4,337,835 ready_for_fw is high
4,338,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,980 UART: [idev] Erasing UDS.KEYID = 0
7,622,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,967 UART: [idev] --
7,648,505 UART: [ldev] ++
7,649,081 UART: [ldev] CDI.KEYID = 6
7,650,053 UART: [ldev] SUBJECT.KEYID = 5
7,651,262 UART: [ldev] AUTHORITY.KEYID = 7
7,652,540 UART: [ldev] FE.KEYID = 1
7,665,563 UART: [ldev] Erasing FE.KEYID = 1
10,956,120 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,160 UART: [ldev] --
13,316,654 UART: [fwproc] Waiting for Commands...
13,319,077 UART: [fwproc] Received command 0x46574c44
13,321,277 UART: [fwproc] Received Image of size 118548 bytes
17,427,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,055 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,250 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,914 >>> mbox cmd response: success
17,903,997 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,907,126 UART: [afmc] ++
17,907,766 UART: [afmc] CDI.KEYID = 6
17,908,645 UART: [afmc] SUBJECT.KEYID = 7
17,909,906 UART: [afmc] AUTHORITY.KEYID = 5
21,221,772 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,099 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,358 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,475 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,922 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,118 UART: [afmc] --
23,588,469 UART: [cold-reset] --
23,593,088 UART: [state] Locking Datavault
23,596,982 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,735 UART: [state] Locking ICCM
23,600,070 UART: [exit] Launching FMC @ 0x40000130
23,608,459 UART:
23,608,688 UART: Running Caliptra FMC ...
23,609,779 UART:
23,609,931 UART: [state] CFI Enabled
23,617,808 UART: [fht] FMC Alias Private Key: 7
25,957,859 UART: [art] Extend RT PCRs Done
25,959,073 UART: [art] Lock RT PCRs Done
25,960,698 UART: [art] Populate DV Done
25,965,881 UART: [fht] FMC Alias Private Key: 7
25,967,590 UART: [art] Derive CDI
25,968,399 UART: [art] Store in slot 0x4
26,010,716 UART: [art] Derive Key Pair
26,011,712 UART: [art] Store priv key in slot 0x5
29,253,556 UART: [art] Derive Key Pair - Done
29,266,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,124 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,626 UART: [art] PUB.X = 2B4A7604657C499D9FF20F328868DBFE1D583180D8B43F7E410BB6E95801FF03FEC345C2DE9C9D4C983AA0C59D6F5CA9
31,555,913 UART: [art] PUB.Y = 9B7476C7BEE20099BFB0D0F9715955EDA5E4852AC04857754F6966CF60262BED1A72F9C2074DD5CD9BA6A52C4A390CF4
31,563,168 UART: [art] SIG.R = 34FBD4F908E21499C1040E0C336A7A11303D98874553B63E6008829DCB27A81E98DA19F5D9932F5E9DCA9D26B5CAF55A
31,570,571 UART: [art] SIG.S = 6582C56F24851FA688FFABADA9A32CDBABCE5B07B5CAAEB0E973A73F918FC5E904E20D2D8CA32BB760ACBF7268E38D58
32,876,075 UART: Caliptra RT
32,876,777 UART: [state] CFI Enabled
33,010,913 UART: [rt] RT listening for mailbox commands...
33,042,435 UART: [rt]cmd =0x46505344, len=4
33,152,596 >>> mbox cmd response data (8 bytes)
33,153,144 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,153,422 UART: Fatal Error: 0x000E0008
33,154,556 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,125,490 ready_for_fw is high
4,126,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,466 >>> mbox cmd response: success
18,151,734 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,782,296 UART:
23,782,672 UART: Running Caliptra FMC ...
23,783,824 UART:
23,783,979 UART: [state] CFI Enabled
23,791,931 UART: [fht] FMC Alias Private Key: 7
26,131,451 UART: [art] Extend RT PCRs Done
26,132,695 UART: [art] Lock RT PCRs Done
26,134,051 UART: [art] Populate DV Done
26,139,532 UART: [fht] FMC Alias Private Key: 7
26,141,024 UART: [art] Derive CDI
26,141,762 UART: [art] Store in slot 0x4
26,184,623 UART: [art] Derive Key Pair
26,185,646 UART: [art] Store priv key in slot 0x5
29,427,864 UART: [art] Derive Key Pair - Done
29,440,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,125 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,634 UART: [art] PUB.X = D7D65EF5BF4FCD7E4C9026CE570447E66C8F443B825B668827A786EC12DD1B317549CFA0C2AA5B9BDC36AF1A1EBEA44B
31,729,939 UART: [art] PUB.Y = 914F53D5255DD47490FE0679092547759A5D3A8A3FC3817446E8A1A52DF9180FF02EA20E1D970C866E824A678D5EC1AB
31,737,183 UART: [art] SIG.R = 4164DE8FB6847F789FAEA530AF32D9D3D3C9807CE5D4439A60F3A84F9C9A8BF257F7D78BCEF9F80DC7F0AA6D9B27B641
31,744,677 UART: [art] SIG.S = B17C63C92494F93796B7007ADE869DFD7A080221B5C190FAAE6DD3ABF3516EBAF6377EDA93BED6D47F08B9FBF92A6681
33,049,332 UART: Caliptra RT
33,050,042 UART: [state] CFI Enabled
33,183,811 UART: [rt] RT listening for mailbox commands...
33,215,392 UART: [rt]cmd =0x46505344, len=4
33,325,511 >>> mbox cmd response data (8 bytes)
33,326,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,326,362 UART: Fatal Error: 0x000E0008
33,327,486 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,079 UART:
192,462 UART: Running Caliptra ROM ...
193,650 UART:
193,809 UART: [state] CFI Enabled
266,649 UART: [state] LifecycleState = Unprovisioned
268,683 UART: [state] DebugLocked = No
271,286 UART: [state] WD Timer not started. Device not locked for debugging
275,750 UART: [kat] SHA2-256
455,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,238 UART: [kat] ++
466,765 UART: [kat] sha1
478,351 UART: [kat] SHA2-256
481,063 UART: [kat] SHA2-384
486,552 UART: [kat] SHA2-512-ACC
488,912 UART: [kat] ECC-384
2,948,691 UART: [kat] HMAC-384Kdf
2,971,849 UART: [kat] LMS
3,448,353 UART: [kat] --
3,453,875 UART: [cold-reset] ++
3,455,741 UART: [fht] FHT @ 0x50003400
3,467,526 UART: [idev] ++
3,468,140 UART: [idev] CDI.KEYID = 6
3,469,067 UART: [idev] SUBJECT.KEYID = 7
3,470,318 UART: [idev] UDS.KEYID = 0
3,471,239 ready_for_fw is high
3,471,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,433 UART: [idev] Erasing UDS.KEYID = 0
5,989,759 UART: [idev] Sha1 KeyId Algorithm
6,013,652 UART: [idev] --
6,017,978 UART: [ldev] ++
6,018,551 UART: [ldev] CDI.KEYID = 6
6,019,511 UART: [ldev] SUBJECT.KEYID = 5
6,020,729 UART: [ldev] AUTHORITY.KEYID = 7
6,021,962 UART: [ldev] FE.KEYID = 1
6,058,625 UART: [ldev] Erasing FE.KEYID = 1
8,562,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,673 UART: [ldev] --
10,373,515 UART: [fwproc] Wait for Commands...
10,375,608 UART: [fwproc] Recv command 0x46574c44
10,377,588 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,612 >>> mbox cmd response: success
14,346,738 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,350,405 UART: [afmc] ++
14,351,020 UART: [afmc] CDI.KEYID = 6
14,351,914 UART: [afmc] SUBJECT.KEYID = 7
14,353,071 UART: [afmc] AUTHORITY.KEYID = 5
16,894,898 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,391 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,278 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,555 UART: [afmc] --
18,696,694 UART: [cold-reset] --
18,700,820 UART: [state] Locking Datavault
18,706,655 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,374 UART: [state] Locking ICCM
18,710,956 UART: [exit] Launching FMC @ 0x40000130
18,719,350 UART:
18,719,585 UART: Running Caliptra FMC ...
18,720,679 UART:
18,720,836 UART: [state] CFI Enabled
18,776,315 UART: [fht] FMC Alias Private Key: 7
20,563,196 UART: [art] Extend RT PCRs Done
20,564,434 UART: [art] Lock RT PCRs Done
20,566,164 UART: [art] Populate DV Done
20,571,627 UART: [fht] FMC Alias Private Key: 7
20,573,322 UART: [art] Derive CDI
20,574,130 UART: [art] Store in slot 0x4
20,630,013 UART: [art] Derive Key Pair
20,631,058 UART: [art] Store priv key in slot 0x5
23,094,376 UART: [art] Derive Key Pair - Done
23,107,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,506 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,033 UART: [art] PUB.X = 7D444CF0C9DEE8E5327C8BB908AF64A8992FE4541C09946909F63B964B68F8AD7D896B041E3FA6C2916246486AF3DFF4
24,829,294 UART: [art] PUB.Y = 70E942887CA1352C08175A082DC2FAA393A967A6FD1DFF4996AB2BED51D7DF868CD1E7BB60EC49422D9AE8F811130F15
24,836,535 UART: [art] SIG.R = CE60B12D7DEBA2D2BB78D54C1209F57812234B4376D575FC0C568EA0CA47C1F7A56CCC398835AFA8DC3717B96C4B987E
24,843,921 UART: [art] SIG.S = 91023EE318A8AE7F60DF13FFDFCCC46F83F2EB1ABEE52A1D00DFA5E64CC16C39F97385A9BEE33CF997428BCFC433F1B8
25,822,983 UART: Caliptra RT
25,823,701 UART: [state] CFI Enabled
26,004,508 UART: [rt] RT listening for mailbox commands...
26,035,759 UART: [rt]cmd =0x46505344, len=4
26,145,688 >>> mbox cmd response data (8 bytes)
26,146,243 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,146,534 UART: Fatal Error: 0x000E0008
26,147,659 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,463,575 ready_for_fw is high
3,464,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,199,233 >>> mbox cmd response: success
14,200,597 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,498,195 UART:
18,498,582 UART: Running Caliptra FMC ...
18,499,718 UART:
18,499,879 UART: [state] CFI Enabled
18,562,351 UART: [fht] FMC Alias Private Key: 7
20,328,615 UART: [art] Extend RT PCRs Done
20,329,838 UART: [art] Lock RT PCRs Done
20,331,755 UART: [art] Populate DV Done
20,337,118 UART: [fht] FMC Alias Private Key: 7
20,338,704 UART: [art] Derive CDI
20,339,513 UART: [art] Store in slot 0x4
20,395,390 UART: [art] Derive Key Pair
20,396,386 UART: [art] Store priv key in slot 0x5
22,859,397 UART: [art] Derive Key Pair - Done
22,872,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,585,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,834 UART: [art] PUB.X = E81611E45B1312C5F747C870D22489A1C8D73946C47AD468E782907029B2A353C1737DEBE32E28CE997CB0B9455E734C
24,594,086 UART: [art] PUB.Y = 6C3F210C6380326EB01E89294268AC326FB55147428E469EDCD59DEE42FE8AD8F031FFDEDD899A4D830BD60F474775D6
24,601,353 UART: [art] SIG.R = D6122FD56DAF6734A9B6B37D9223F9D9BF809E7EFD2567B382FA7635BB9BA3FDC98CF3FC1851EA3903F35A8602431104
24,608,752 UART: [art] SIG.S = AC271C12081DD8D9ADA4551476D11B301BEC891349EF03607723387C52F9569010BFAEC7359077766C62ACFF472E82D1
25,587,630 UART: Caliptra RT
25,588,342 UART: [state] CFI Enabled
25,767,526 UART: [rt] RT listening for mailbox commands...
25,799,131 UART: [rt]cmd =0x46505344, len=4
25,908,927 >>> mbox cmd response data (8 bytes)
25,909,458 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,909,744 UART: Fatal Error: 0x000E0008
25,910,881 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,446 UART:
192,808 UART: Running Caliptra ROM ...
193,907 UART:
603,460 UART: [state] CFI Enabled
614,731 UART: [state] LifecycleState = Unprovisioned
616,631 UART: [state] DebugLocked = No
619,504 UART: [state] WD Timer not started. Device not locked for debugging
622,835 UART: [kat] SHA2-256
802,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,238 UART: [kat] ++
813,684 UART: [kat] sha1
824,887 UART: [kat] SHA2-256
827,581 UART: [kat] SHA2-384
834,288 UART: [kat] SHA2-512-ACC
836,590 UART: [kat] ECC-384
3,278,025 UART: [kat] HMAC-384Kdf
3,290,833 UART: [kat] LMS
3,767,379 UART: [kat] --
3,771,746 UART: [cold-reset] ++
3,773,752 UART: [fht] FHT @ 0x50003400
3,786,452 UART: [idev] ++
3,787,083 UART: [idev] CDI.KEYID = 6
3,788,010 UART: [idev] SUBJECT.KEYID = 7
3,789,263 UART: [idev] UDS.KEYID = 0
3,790,190 ready_for_fw is high
3,790,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,076 UART: [idev] Erasing UDS.KEYID = 0
6,263,437 UART: [idev] Sha1 KeyId Algorithm
6,286,655 UART: [idev] --
6,291,894 UART: [ldev] ++
6,292,465 UART: [ldev] CDI.KEYID = 6
6,293,434 UART: [ldev] SUBJECT.KEYID = 5
6,294,597 UART: [ldev] AUTHORITY.KEYID = 7
6,295,886 UART: [ldev] FE.KEYID = 1
6,306,591 UART: [ldev] Erasing FE.KEYID = 1
8,790,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,743 UART: [ldev] --
10,584,398 UART: [fwproc] Wait for Commands...
10,587,127 UART: [fwproc] Recv command 0x46574c44
10,589,174 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,594 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,607 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,061 >>> mbox cmd response: success
14,553,585 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,557,508 UART: [afmc] ++
14,558,090 UART: [afmc] CDI.KEYID = 6
14,559,063 UART: [afmc] SUBJECT.KEYID = 7
14,560,228 UART: [afmc] AUTHORITY.KEYID = 5
17,067,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,894 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,491 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,996 UART: [afmc] --
18,866,003 UART: [cold-reset] --
18,869,975 UART: [state] Locking Datavault
18,875,712 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,465 UART: [state] Locking ICCM
18,880,155 UART: [exit] Launching FMC @ 0x40000130
18,888,549 UART:
18,888,786 UART: Running Caliptra FMC ...
18,889,891 UART:
18,890,053 UART: [state] CFI Enabled
18,898,318 UART: [fht] FMC Alias Private Key: 7
20,663,940 UART: [art] Extend RT PCRs Done
20,665,159 UART: [art] Lock RT PCRs Done
20,666,558 UART: [art] Populate DV Done
20,672,193 UART: [fht] FMC Alias Private Key: 7
20,673,674 UART: [art] Derive CDI
20,674,409 UART: [art] Store in slot 0x4
20,717,538 UART: [art] Derive Key Pair
20,718,536 UART: [art] Store priv key in slot 0x5
23,145,299 UART: [art] Derive Key Pair - Done
23,158,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,611 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,110 UART: [art] PUB.X = 0FC9B7C5E00ACD48EEBFDD63F2625A8F77DE5AECA7781C62C472913C085D9086F11CFB9647B4635146A7FABB955D3B42
24,873,405 UART: [art] PUB.Y = AB2508D0A8A343B291D867293768E21AF3251673EDF295F01194DBD17D608819C3E4107265915C234728878547E80F0E
24,880,638 UART: [art] SIG.R = 2B4919FD71EB8CE20F328230CCB809E948A2754295F14C3B8E4B90BA9C01B9F08A572F6161883D4CAF44B166872C6234
24,887,971 UART: [art] SIG.S = EC13B41AC1B50AE9E46B12F2EE365C0FF0C914C29DBE827F62E25310E5BE2EAFB15A1C3AA0E80EDDCD590387DA1A6AFD
25,866,703 UART: Caliptra RT
25,867,403 UART: [state] CFI Enabled
26,000,018 UART: [rt] RT listening for mailbox commands...
26,031,636 UART: [rt]cmd =0x46505344, len=4
26,141,668 >>> mbox cmd response data (8 bytes)
26,142,182 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,142,497 UART: Fatal Error: 0x000E0008
26,143,665 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,785,291 ready_for_fw is high
3,785,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,458,002 >>> mbox cmd response: success
14,458,784 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,707,284 UART:
18,707,671 UART: Running Caliptra FMC ...
18,708,772 UART:
18,708,929 UART: [state] CFI Enabled
18,716,811 UART: [fht] FMC Alias Private Key: 7
20,483,310 UART: [art] Extend RT PCRs Done
20,484,530 UART: [art] Lock RT PCRs Done
20,486,288 UART: [art] Populate DV Done
20,491,550 UART: [fht] FMC Alias Private Key: 7
20,493,013 UART: [art] Derive CDI
20,493,757 UART: [art] Store in slot 0x4
20,536,646 UART: [art] Derive Key Pair
20,537,641 UART: [art] Store priv key in slot 0x5
22,963,878 UART: [art] Derive Key Pair - Done
22,976,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,066 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,571 UART: [art] PUB.X = 13786AC31BE03982B6093DBC2F5ACBEB3F39D71CDEAD82F8CD8C1A78BDD7FA88E60D218848E217753ABAB96975952F59
24,691,830 UART: [art] PUB.Y = 911672A805D22C4C8BB212C57A5D74210C79C8A5B096A306E3AD33D5EE0A171620FAECA60F9C8D1E3F414A79C5CF359A
24,699,092 UART: [art] SIG.R = 52825603325173AEA308E8652F8D1A8B5F5D20B76416B2ED321AADA3AE26C1B64902DCC0E55792AE7FECD2C2BBC08571
24,706,539 UART: [art] SIG.S = 3680825CBC60AB2CC11DDB71230D1B58246A4DF3D0623613D3244B4867460C2C9AC66D4F8522DD53019A910729BF394E
25,685,362 UART: Caliptra RT
25,686,071 UART: [state] CFI Enabled
25,818,971 UART: [rt] RT listening for mailbox commands...
25,850,481 UART: [rt]cmd =0x46505344, len=4
25,960,673 >>> mbox cmd response data (8 bytes)
25,961,231 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,961,519 UART: Fatal Error: 0x000E0008
25,962,640 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
192,035 UART:
192,402 UART: Running Caliptra ROM ...
193,587 UART:
193,742 UART: [state] CFI Enabled
258,723 UART: [state] LifecycleState = Unprovisioned
260,799 UART: [state] DebugLocked = No
262,711 UART: [state] WD Timer not started. Device not locked for debugging
267,936 UART: [kat] SHA2-256
457,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,579 UART: [kat] ++
469,024 UART: [kat] sha1
482,028 UART: [kat] SHA2-256
485,034 UART: [kat] SHA2-384
491,446 UART: [kat] SHA2-512-ACC
494,021 UART: [kat] ECC-384
2,948,731 UART: [kat] HMAC-384Kdf
2,972,196 UART: [kat] LMS
3,503,978 UART: [kat] --
3,507,851 UART: [cold-reset] ++
3,510,421 UART: [fht] FHT @ 0x50003400
3,520,349 UART: [idev] ++
3,521,061 UART: [idev] CDI.KEYID = 6
3,522,017 UART: [idev] SUBJECT.KEYID = 7
3,523,187 UART: [idev] UDS.KEYID = 0
3,524,086 ready_for_fw is high
3,524,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,323 UART: [idev] Erasing UDS.KEYID = 0
6,030,801 UART: [idev] Sha1 KeyId Algorithm
6,053,777 UART: [idev] --
6,058,864 UART: [ldev] ++
6,059,550 UART: [ldev] CDI.KEYID = 6
6,060,467 UART: [ldev] SUBJECT.KEYID = 5
6,061,625 UART: [ldev] AUTHORITY.KEYID = 7
6,062,854 UART: [ldev] FE.KEYID = 1
6,101,910 UART: [ldev] Erasing FE.KEYID = 1
8,606,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,580 UART: [ldev] --
10,415,699 UART: [fwproc] Wait for Commands...
10,417,516 UART: [fwproc] Recv command 0x46574c44
10,419,827 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,239 >>> mbox cmd response: success
14,686,393 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,689,223 UART: [afmc] ++
14,689,910 UART: [afmc] CDI.KEYID = 6
14,691,146 UART: [afmc] SUBJECT.KEYID = 7
14,692,589 UART: [afmc] AUTHORITY.KEYID = 5
17,237,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,300 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,453 UART: [afmc] --
19,033,126 UART: [cold-reset] --
19,036,283 UART: [state] Locking Datavault
19,043,149 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,340 UART: [state] Locking ICCM
19,046,789 UART: [exit] Launching FMC @ 0x40000130
19,055,457 UART:
19,055,692 UART: Running Caliptra FMC ...
19,056,792 UART:
19,056,974 UART: [state] CFI Enabled
19,117,385 UART: [fht] FMC Alias Private Key: 7
20,883,650 UART: [art] Extend RT PCRs Done
20,884,868 UART: [art] Lock RT PCRs Done
20,886,621 UART: [art] Populate DV Done
20,891,812 UART: [fht] FMC Alias Private Key: 7
20,893,456 UART: [art] Derive CDI
20,894,266 UART: [art] Store in slot 0x4
20,949,765 UART: [art] Derive Key Pair
20,950,803 UART: [art] Store priv key in slot 0x5
23,413,563 UART: [art] Derive Key Pair - Done
23,426,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,359 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,872 UART: [art] PUB.X = 0B4563545FC3AA96DE3C48882C98CB34B60A04FAB4CE685B2042A9EF190720205CA1F02163A47F22B940DCE3E01F166C
25,148,150 UART: [art] PUB.Y = 7913A32E5213350A565838420122EDC57AAC9C726669459CE8FFF3869E7EB95790BEA8668A578608E8E46206C834864F
25,155,338 UART: [art] SIG.R = 97756779A8CB3B6E0804B9BE0433EA6046F84A522CABAC9185AC7A7FA508B32A3FF19CBF889620749E5116E6A9B58CD8
25,162,747 UART: [art] SIG.S = AD448FFF004002839422A0015216C400B80EAE89D602ED3B36B026056000E9D580EB5882EF95C7B16B19D6EEE399008F
26,141,275 UART: Caliptra RT
26,141,987 UART: [state] CFI Enabled
26,322,163 UART: [rt] RT listening for mailbox commands...
26,353,680 UART: [rt]cmd =0x46505344, len=4
26,463,758 >>> mbox cmd response data (8 bytes)
26,464,294 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,464,579 UART: Fatal Error: 0x000E0008
26,465,715 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,437,990 ready_for_fw is high
3,438,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,803,644 >>> mbox cmd response: success
14,805,319 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,086,079 UART:
19,086,465 UART: Running Caliptra FMC ...
19,087,659 UART:
19,087,830 UART: [state] CFI Enabled
19,152,737 UART: [fht] FMC Alias Private Key: 7
20,940,065 UART: [art] Extend RT PCRs Done
20,941,300 UART: [art] Lock RT PCRs Done
20,942,873 UART: [art] Populate DV Done
20,948,288 UART: [fht] FMC Alias Private Key: 7
20,949,881 UART: [art] Derive CDI
20,950,643 UART: [art] Store in slot 0x4
21,005,634 UART: [art] Derive Key Pair
21,006,682 UART: [art] Store priv key in slot 0x5
23,469,992 UART: [art] Derive Key Pair - Done
23,482,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,195,500 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,005 UART: [art] PUB.X = EF625A9F472499638EAF128E6F3B25C8164E97F770F681B76F486A80A33B45C296666C5BE727DA83856F558646D3182D
25,204,257 UART: [art] PUB.Y = 49581772386EA8F1C0CD643C2CBF1BDB75CE5558C95262D55926EE1C259D0B4D337EC18CB1BEEAC608576B1B222C7894
25,211,500 UART: [art] SIG.R = 76645C2A8FF8FE9034441985AB005BB7CC5C0BC7D72EEA8F4EE2C8583C5CBEE039567B4E10BEE826FF6C7CCA0B612A54
25,218,953 UART: [art] SIG.S = 7CC3B2B6F54622AFAEB11853C6750B23163E8EA8F02E3F332ADF5B9DBA32B2D7F5BE825997A813070BA935C99DDE50CB
26,198,050 UART: Caliptra RT
26,198,736 UART: [state] CFI Enabled
26,379,653 UART: [rt] RT listening for mailbox commands...
26,410,949 UART: [rt]cmd =0x46505344, len=4
26,520,997 >>> mbox cmd response data (8 bytes)
26,521,524 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,521,814 UART: Fatal Error: 0x000E0008
26,523,009 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,277 writing to cptra_bootfsm_go
193,405 UART:
193,761 UART: Running Caliptra ROM ...
194,870 UART:
604,770 UART: [state] CFI Enabled
617,026 UART: [state] LifecycleState = Unprovisioned
619,330 UART: [state] DebugLocked = No
622,343 UART: [state] WD Timer not started. Device not locked for debugging
626,535 UART: [kat] SHA2-256
816,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,212 UART: [kat] ++
827,731 UART: [kat] sha1
838,627 UART: [kat] SHA2-256
841,641 UART: [kat] SHA2-384
846,144 UART: [kat] SHA2-512-ACC
848,733 UART: [kat] ECC-384
3,290,608 UART: [kat] HMAC-384Kdf
3,303,543 UART: [kat] LMS
3,835,426 UART: [kat] --
3,840,651 UART: [cold-reset] ++
3,842,392 UART: [fht] FHT @ 0x50003400
3,853,066 UART: [idev] ++
3,853,796 UART: [idev] CDI.KEYID = 6
3,854,713 UART: [idev] SUBJECT.KEYID = 7
3,855,967 UART: [idev] UDS.KEYID = 0
3,856,899 ready_for_fw is high
3,857,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,025 UART: [idev] Erasing UDS.KEYID = 0
6,332,122 UART: [idev] Sha1 KeyId Algorithm
6,354,542 UART: [idev] --
6,359,565 UART: [ldev] ++
6,360,245 UART: [ldev] CDI.KEYID = 6
6,361,155 UART: [ldev] SUBJECT.KEYID = 5
6,362,374 UART: [ldev] AUTHORITY.KEYID = 7
6,363,554 UART: [ldev] FE.KEYID = 1
6,372,204 UART: [ldev] Erasing FE.KEYID = 1
8,850,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,038 UART: [ldev] --
10,642,392 UART: [fwproc] Wait for Commands...
10,644,364 UART: [fwproc] Recv command 0x46574c44
10,646,697 UART: [fwproc] Recv'd Img size: 118548 bytes
14,136,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,210,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,334,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,894,401 >>> mbox cmd response: success
14,895,475 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,898,477 UART: [afmc] ++
14,899,189 UART: [afmc] CDI.KEYID = 6
14,900,353 UART: [afmc] SUBJECT.KEYID = 7
14,901,843 UART: [afmc] AUTHORITY.KEYID = 5
17,407,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,039 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,163,212 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,119 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,834 UART: [afmc] --
19,206,226 UART: [cold-reset] --
19,210,378 UART: [state] Locking Datavault
19,216,183 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,332 UART: [state] Locking ICCM
19,219,840 UART: [exit] Launching FMC @ 0x40000130
19,228,519 UART:
19,228,758 UART: Running Caliptra FMC ...
19,229,813 UART:
19,229,970 UART: [state] CFI Enabled
19,237,726 UART: [fht] FMC Alias Private Key: 7
21,004,051 UART: [art] Extend RT PCRs Done
21,005,277 UART: [art] Lock RT PCRs Done
21,006,806 UART: [art] Populate DV Done
21,012,550 UART: [fht] FMC Alias Private Key: 7
21,014,097 UART: [art] Derive CDI
21,014,946 UART: [art] Store in slot 0x4
21,057,533 UART: [art] Derive Key Pair
21,058,592 UART: [art] Store priv key in slot 0x5
23,485,797 UART: [art] Derive Key Pair - Done
23,498,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,383 UART: [art] PUB.X = BFBDC6CA6BB5F9902933C6A2E813C93AD25FACC52BC0A1A7C00D8D97EB51F7A8C9DFACAD648A8F6126BEE9DBA951ECAA
25,213,702 UART: [art] PUB.Y = 38E74713823D5C971BA927B951AF70281BABDA8516305514F99E1D889021E3E2961CE5D00BCFA282ABED376A199DEB3A
25,220,954 UART: [art] SIG.R = 80AD6AF4E2E73E36E46BADF9660DE6E6D0306E351A4C0ACF3DC2FFB2FD35ED8010CBC72E0CB39BF9973CB1D41039A73F
25,228,428 UART: [art] SIG.S = DF27E59428F4DA10591AE9F30DE57ED1F5E4A74486CD8FBA5169E38F2A9932EF1DA2F823DD7DE53B621CD2F98400974F
26,207,234 UART: Caliptra RT
26,207,934 UART: [state] CFI Enabled
26,339,323 UART: [rt] RT listening for mailbox commands...
26,370,747 UART: [rt]cmd =0x46505344, len=4
26,480,476 >>> mbox cmd response data (8 bytes)
26,481,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,481,356 UART: Fatal Error: 0x000E0008
26,482,687 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
3,754,251 ready_for_fw is high
3,754,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,394 >>> mbox cmd response: success
15,041,621 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,295,934 UART:
19,296,325 UART: Running Caliptra FMC ...
19,297,530 UART:
19,297,699 UART: [state] CFI Enabled
19,305,753 UART: [fht] FMC Alias Private Key: 7
21,071,469 UART: [art] Extend RT PCRs Done
21,072,702 UART: [art] Lock RT PCRs Done
21,074,418 UART: [art] Populate DV Done
21,080,070 UART: [fht] FMC Alias Private Key: 7
21,081,673 UART: [art] Derive CDI
21,082,438 UART: [art] Store in slot 0x4
21,125,151 UART: [art] Derive Key Pair
21,126,155 UART: [art] Store priv key in slot 0x5
23,552,564 UART: [art] Derive Key Pair - Done
23,565,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,737 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,848 UART: [art] PUB.X = E365A3997C149A9C091A3704A441956B851EB5BA25F9C44C9A0BD5BB58BF54929B472B88156B88C1066CF6585140A4A7
25,280,551 UART: [art] PUB.Y = F3E5C24AFFED496576A0509BF12F84C2DCCB5845EAD479F8E904354DFD6458616D43AAC27B6D82C417D534437AD2533C
25,287,787 UART: [art] SIG.R = 371BD13B7FAAFD9A4119C718DB1F2891D0EBE3691C355255D36D1C92283AE98CE460D88AEFED3AFE2DDE2AAFC5099A21
25,295,208 UART: [art] SIG.S = E5F0B011C02DCB30E55545CF37030A6D5E0060CD4C3A56E6BE5047290E104D4ADAB4D85BE2C9E618C05E382879B8762E
26,274,008 UART: Caliptra RT
26,275,250 UART: [state] CFI Enabled
26,407,898 UART: [rt] RT listening for mailbox commands...
26,439,449 UART: [rt]cmd =0x46505344, len=4
26,549,428 >>> mbox cmd response data (8 bytes)
26,550,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,550,393 UART: Fatal Error: 0x000E0008
26,551,522 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,555 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,239 UART: [kat] SHA2-256
882,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,285 UART: [kat] ++
886,437 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,094 UART: [kat] SHA2-512-ACC
896,995 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,347 UART: [cold-reset] ++
1,476,761 UART: [fht] Storing FHT @ 0x50003400
1,479,408 UART: [idev] ++
1,479,576 UART: [idev] CDI.KEYID = 6
1,479,936 UART: [idev] SUBJECT.KEYID = 7
1,480,360 UART: [idev] UDS.KEYID = 0
1,480,705 ready_for_fw is high
1,480,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,294 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,034 UART: [idev] --
1,515,041 UART: [ldev] ++
1,515,209 UART: [ldev] CDI.KEYID = 6
1,515,572 UART: [ldev] SUBJECT.KEYID = 5
1,515,998 UART: [ldev] AUTHORITY.KEYID = 7
1,516,461 UART: [ldev] FE.KEYID = 1
1,521,765 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,648 UART: [ldev] --
1,586,091 UART: [fwproc] Waiting for Commands...
1,586,828 UART: [fwproc] Received command 0x46574c44
1,587,619 UART: [fwproc] Received Image of size 118548 bytes
2,931,767 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,115 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,778 >>> mbox cmd response: success
3,130,778 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,131,938 UART: [afmc] ++
3,132,106 UART: [afmc] CDI.KEYID = 6
3,132,468 UART: [afmc] SUBJECT.KEYID = 7
3,132,893 UART: [afmc] AUTHORITY.KEYID = 5
3,168,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,888 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,571 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,489 UART: [afmc] --
3,211,527 UART: [cold-reset] --
3,212,421 UART: [state] Locking Datavault
3,213,724 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,328 UART: [state] Locking ICCM
3,214,938 UART: [exit] Launching FMC @ 0x40000130
3,220,268 UART:
3,220,284 UART: Running Caliptra FMC ...
3,220,692 UART:
3,220,746 UART: [state] CFI Enabled
3,231,040 UART: [fht] FMC Alias Private Key: 7
3,349,874 UART: [art] Extend RT PCRs Done
3,350,302 UART: [art] Lock RT PCRs Done
3,351,650 UART: [art] Populate DV Done
3,359,867 UART: [fht] FMC Alias Private Key: 7
3,361,023 UART: [art] Derive CDI
3,361,303 UART: [art] Store in slot 0x4
3,446,835 UART: [art] Derive Key Pair
3,447,195 UART: [art] Store priv key in slot 0x5
3,460,098 UART: [art] Derive Key Pair - Done
3,474,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,386 UART: [art] PUB.X = 227FBCE3AA237F7C8DAC4AB13453DA5EA535E49AD34FC876310352A6293C1E8D3BD4C21E48621EA3B437FEF6CBA8F0D9
3,497,173 UART: [art] PUB.Y = A5282A9738F505195395BB66FE6246DFB0A3D1D1664143F5C5EBC09E7FBAC7FC4AFB8EED378C60F0686AC9FAE9D84EDF
3,504,142 UART: [art] SIG.R = 4F4519C7E85E6D83B79C42DBE2E1EE9E19CF542FB9060F5BE426AB39219F4F920D0068760A3CAF1CEAF86DCD1D9F095C
3,510,893 UART: [art] SIG.S = 5A80585CAB231ADF062D157581C9C4690FEB091CCDCEFC5931F603B02FC6141277C28310F3BA12FF460EE138549E9E29
3,533,916 UART: Caliptra RT
3,534,167 UART: [state] CFI Enabled
3,655,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,966 UART: [rt]cmd =0x46505344, len=4
3,794,479 >>> mbox cmd response data (8 bytes)
3,794,480 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,794,516 UART: Fatal Error: 0x000E0008
3,795,639 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 ready_for_fw is high
1,362,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,086 >>> mbox cmd response: success
2,982,086 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,043,743 UART:
3,043,759 UART: Running Caliptra FMC ...
3,044,167 UART:
3,044,221 UART: [state] CFI Enabled
3,054,815 UART: [fht] FMC Alias Private Key: 7
3,173,741 UART: [art] Extend RT PCRs Done
3,174,169 UART: [art] Lock RT PCRs Done
3,175,545 UART: [art] Populate DV Done
3,183,698 UART: [fht] FMC Alias Private Key: 7
3,184,774 UART: [art] Derive CDI
3,185,054 UART: [art] Store in slot 0x4
3,270,488 UART: [art] Derive Key Pair
3,270,848 UART: [art] Store priv key in slot 0x5
3,283,495 UART: [art] Derive Key Pair - Done
3,298,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,342 UART: [art] PUB.X = 59C9606D6256B28E0484762AF731F6234177E95C30D92B99663B1168605E7F333C1C753E169AA65EB9B674DEA370EC39
3,322,101 UART: [art] PUB.Y = E4D83D1C77C549236412FE55519F3D54230306CE2938166195FF5E91DA695614A1EF2EC8ABAB84F9BEE7B34DEE3D05CA
3,329,052 UART: [art] SIG.R = 41B7ED21EA07D4497A41AA7FA0F007677B07C4099B9BF337890223659E01A86775AF609727A4C1462FD4A82BCAFA9DB6
3,335,808 UART: [art] SIG.S = 6EA03262D3E38BB2A009E5EE9FDF265E01155308ECB687402C03886050BE8FEA6BB982D09B510EF39D7AC0B41DCEA768
3,359,479 UART: Caliptra RT
3,359,730 UART: [state] CFI Enabled
3,479,273 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,805 UART: [rt]cmd =0x46505344, len=4
3,618,632 >>> mbox cmd response data (8 bytes)
3,618,633 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,618,669 UART: Fatal Error: 0x000E0008
3,619,792 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,672 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,394 UART: [kat] SHA2-256
882,325 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,440 UART: [kat] ++
886,592 UART: [kat] sha1
890,996 UART: [kat] SHA2-256
892,934 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,187 UART: [kat] HMAC-384Kdf
907,819 UART: [kat] LMS
1,476,015 UART: [kat] --
1,477,094 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,371 UART: [idev] ++
1,480,539 UART: [idev] CDI.KEYID = 6
1,480,899 UART: [idev] SUBJECT.KEYID = 7
1,481,323 UART: [idev] UDS.KEYID = 0
1,481,668 ready_for_fw is high
1,481,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,109 UART: [idev] Erasing UDS.KEYID = 0
1,506,379 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,001 UART: [idev] --
1,516,276 UART: [ldev] ++
1,516,444 UART: [ldev] CDI.KEYID = 6
1,516,807 UART: [ldev] SUBJECT.KEYID = 5
1,517,233 UART: [ldev] AUTHORITY.KEYID = 7
1,517,696 UART: [ldev] FE.KEYID = 1
1,522,908 UART: [ldev] Erasing FE.KEYID = 1
1,548,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,903 UART: [ldev] --
1,588,298 UART: [fwproc] Waiting for Commands...
1,588,913 UART: [fwproc] Received command 0x46574c44
1,589,704 UART: [fwproc] Received Image of size 118548 bytes
2,934,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,080 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,697 >>> mbox cmd response: success
3,133,697 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,134,843 UART: [afmc] ++
3,135,011 UART: [afmc] CDI.KEYID = 6
3,135,373 UART: [afmc] SUBJECT.KEYID = 7
3,135,798 UART: [afmc] AUTHORITY.KEYID = 5
3,171,277 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,829 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,609 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,200,201 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,884 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,788 UART: [afmc] --
3,214,708 UART: [cold-reset] --
3,215,568 UART: [state] Locking Datavault
3,216,881 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,485 UART: [state] Locking ICCM
3,218,037 UART: [exit] Launching FMC @ 0x40000130
3,223,367 UART:
3,223,383 UART: Running Caliptra FMC ...
3,223,791 UART:
3,223,934 UART: [state] CFI Enabled
3,234,794 UART: [fht] FMC Alias Private Key: 7
3,353,936 UART: [art] Extend RT PCRs Done
3,354,364 UART: [art] Lock RT PCRs Done
3,355,980 UART: [art] Populate DV Done
3,364,611 UART: [fht] FMC Alias Private Key: 7
3,365,791 UART: [art] Derive CDI
3,366,071 UART: [art] Store in slot 0x4
3,451,773 UART: [art] Derive Key Pair
3,452,133 UART: [art] Store priv key in slot 0x5
3,465,818 UART: [art] Derive Key Pair - Done
3,480,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,495,784 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,549 UART: [art] PUB.X = 9294F74B5D3B9E360531C804A9F2D19C19F3632BBBEEE1C192D24D68AE5918EEE061A1ECD905EB58AED4363A3C49FDD3
3,503,326 UART: [art] PUB.Y = 9B144FFD24D2F60ADBFA284514B972CCECEE130485778AD91D45149ED950DD63230AAE363E2EA2C0E5BD90272631A9E1
3,510,279 UART: [art] SIG.R = 34A822BDC8A624A761ACE0F66D87164ADF1086DDCCF56AFAC3B84FB6E91A97CB982272EABA89E4CDA6596B88787D220C
3,517,066 UART: [art] SIG.S = 5BDCF352F42B782FC126A3E694491FD2142E984A4BB7D817C84191B6EF90D68B38B06C5049879C205F8DA68EE51EF5F4
3,540,630 UART: Caliptra RT
3,540,973 UART: [state] CFI Enabled
3,662,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,192 UART: [rt]cmd =0x46505344, len=4
3,801,889 >>> mbox cmd response data (8 bytes)
3,801,890 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,801,926 UART: Fatal Error: 0x000E0008
3,803,049 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,604 ready_for_fw is high
1,362,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,417 >>> mbox cmd response: success
2,981,417 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,042,962 UART:
3,042,978 UART: Running Caliptra FMC ...
3,043,386 UART:
3,043,529 UART: [state] CFI Enabled
3,054,463 UART: [fht] FMC Alias Private Key: 7
3,173,587 UART: [art] Extend RT PCRs Done
3,174,015 UART: [art] Lock RT PCRs Done
3,175,897 UART: [art] Populate DV Done
3,183,896 UART: [fht] FMC Alias Private Key: 7
3,184,998 UART: [art] Derive CDI
3,185,278 UART: [art] Store in slot 0x4
3,271,074 UART: [art] Derive Key Pair
3,271,434 UART: [art] Store priv key in slot 0x5
3,284,121 UART: [art] Derive Key Pair - Done
3,298,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,206 UART: [art] PUB.X = F1703A2093C84C06C3B7EFB168B489B48E5447EC8C20DE867D4C7E3194F78355B8A9F8C2213F92D730BFEC1BA7CC09DA
3,321,982 UART: [art] PUB.Y = F0907BF5C92F33711772CC4FE170BC61699BE6B0D6C62CBDC342CA61520F13972AF5638AA63F94480B08F5AB18381E7B
3,328,929 UART: [art] SIG.R = 6F5903381EFB1F31DDC521A9657E70A43ECDBBD6F1948A2FA65489D3E240D4E79BCB9DBF20E7F3F9C2FC1B2612B98B72
3,335,714 UART: [art] SIG.S = D61F92E086C3E3D4BA36B8B94DD894AD9A098912F2E913861D2309FB9BCE26707369F5ED2E2322DE9A045510FA734294
3,359,287 UART: Caliptra RT
3,359,630 UART: [state] CFI Enabled
3,480,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,264 UART: [rt]cmd =0x46505344, len=4
3,619,577 >>> mbox cmd response data (8 bytes)
3,619,578 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,619,614 UART: Fatal Error: 0x000E0008
3,620,737 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,339 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,510 UART: [kat] SHA2-256
901,450 UART: [kat] SHA2-384
904,331 UART: [kat] SHA2-512-ACC
906,232 UART: [kat] ECC-384
915,527 UART: [kat] HMAC-384Kdf
920,229 UART: [kat] LMS
1,168,541 UART: [kat] --
1,169,488 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,173,972 ready_for_fw is high
1,173,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,507 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,453 UART: [idev] --
1,208,414 UART: [ldev] ++
1,208,582 UART: [ldev] CDI.KEYID = 6
1,208,946 UART: [ldev] SUBJECT.KEYID = 5
1,209,373 UART: [ldev] AUTHORITY.KEYID = 7
1,209,836 UART: [ldev] FE.KEYID = 1
1,214,922 UART: [ldev] Erasing FE.KEYID = 1
1,241,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,279 UART: [fwproc] Wait for Commands...
1,280,856 UART: [fwproc] Recv command 0x46574c44
1,281,589 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,195 >>> mbox cmd response: success
2,825,195 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,826,387 UART: [afmc] ++
2,826,555 UART: [afmc] CDI.KEYID = 6
2,826,918 UART: [afmc] SUBJECT.KEYID = 7
2,827,344 UART: [afmc] AUTHORITY.KEYID = 5
2,863,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,201 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,911 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,792 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,493 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,222 UART: [afmc] --
2,906,165 UART: [cold-reset] --
2,907,015 UART: [state] Locking Datavault
2,908,238 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,842 UART: [state] Locking ICCM
2,909,368 UART: [exit] Launching FMC @ 0x40000130
2,914,698 UART:
2,914,714 UART: Running Caliptra FMC ...
2,915,122 UART:
2,915,176 UART: [state] CFI Enabled
2,925,046 UART: [fht] FMC Alias Private Key: 7
3,044,796 UART: [art] Extend RT PCRs Done
3,045,224 UART: [art] Lock RT PCRs Done
3,046,358 UART: [art] Populate DV Done
3,054,599 UART: [fht] FMC Alias Private Key: 7
3,055,573 UART: [art] Derive CDI
3,055,853 UART: [art] Store in slot 0x4
3,141,870 UART: [art] Derive Key Pair
3,142,230 UART: [art] Store priv key in slot 0x5
3,156,196 UART: [art] Derive Key Pair - Done
3,171,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,871 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,636 UART: [art] PUB.X = FCA763A8A32DEA3F05761832B1C8C51B40064C401291F6996B2EF004DEA696DAEA9A0ECC9643FCA8E4D2EF33059C391C
3,194,405 UART: [art] PUB.Y = 623D5085366D365064F1FF112A8AED8521B817C5A287D1C60C09E435C94C379AF89822A8F50E0AF09EB6BDD4D6EDC1FA
3,201,353 UART: [art] SIG.R = BD159F14D72FB492BAE9F493550EADB7CBEC3E01B23778FBF5A4174B6C537F747B1B6E0D5C64C592F6ACC9BA7B5F72E2
3,208,136 UART: [art] SIG.S = BDE09F3C06A3C10625B25919674703E98A89AB6558DAD4671DD1BB16FC792D3D82BBEE47CF3ACD79BE49E9D150DBDD52
3,231,429 UART: Caliptra RT
3,231,680 UART: [state] CFI Enabled
3,351,450 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,826 UART: [rt]cmd =0x46505344, len=4
3,490,539 >>> mbox cmd response data (8 bytes)
3,490,540 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,490,576 UART: Fatal Error: 0x000E0008
3,491,699 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,200 ready_for_fw is high
1,059,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,206 >>> mbox cmd response: success
2,678,206 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,740,015 UART:
2,740,031 UART: Running Caliptra FMC ...
2,740,439 UART:
2,740,493 UART: [state] CFI Enabled
2,751,035 UART: [fht] FMC Alias Private Key: 7
2,869,581 UART: [art] Extend RT PCRs Done
2,870,009 UART: [art] Lock RT PCRs Done
2,871,405 UART: [art] Populate DV Done
2,879,532 UART: [fht] FMC Alias Private Key: 7
2,880,494 UART: [art] Derive CDI
2,880,774 UART: [art] Store in slot 0x4
2,966,579 UART: [art] Derive Key Pair
2,966,939 UART: [art] Store priv key in slot 0x5
2,980,305 UART: [art] Derive Key Pair - Done
2,994,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,930 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,695 UART: [art] PUB.X = 418FB16B241B0095A1415D58F729E8BB9013E186A17CCA22355E4D7844996467A73D02AD3F415B0FA41ED9300C0ECD06
3,017,428 UART: [art] PUB.Y = BBF1EBF943196661D9845C4F8EDDDDB5F1CF3A49C7B31FB45658BFBC5DF95C20E49112FB9C0B17787066FE00D99483C5
3,024,369 UART: [art] SIG.R = 4D774C7B228BAD39ED508B3AEAFAD5D47A6891915F090E19B9A3DDA4FAD1B7EB4F5473EFF3EE4EBA8220F7C6C3FC67AB
3,031,163 UART: [art] SIG.S = 27E3B8D349D688E05E180495C68F62518C5C9C48CD95C16959267087BE92DC65BD5A12F87DB632804DEA41263A8DE124
3,055,258 UART: Caliptra RT
3,055,509 UART: [state] CFI Enabled
3,175,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,171 UART: [rt]cmd =0x46505344, len=4
3,315,216 >>> mbox cmd response data (8 bytes)
3,315,217 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,315,253 UART: Fatal Error: 0x000E0008
3,316,376 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,184 UART: [state] WD Timer not started. Device not locked for debugging
88,517 UART: [kat] SHA2-256
892,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,171 UART: [kat] ++
896,323 UART: [kat] sha1
900,575 UART: [kat] SHA2-256
902,515 UART: [kat] SHA2-384
905,220 UART: [kat] SHA2-512-ACC
907,121 UART: [kat] ECC-384
917,104 UART: [kat] HMAC-384Kdf
921,558 UART: [kat] LMS
1,169,870 UART: [kat] --
1,170,899 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,900 UART: [idev] Erasing UDS.KEYID = 0
1,200,576 UART: [idev] Sha1 KeyId Algorithm
1,209,566 UART: [idev] --
1,210,539 UART: [ldev] ++
1,210,707 UART: [ldev] CDI.KEYID = 6
1,211,071 UART: [ldev] SUBJECT.KEYID = 5
1,211,498 UART: [ldev] AUTHORITY.KEYID = 7
1,211,961 UART: [ldev] FE.KEYID = 1
1,217,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,947 UART: [ldev] --
1,283,360 UART: [fwproc] Wait for Commands...
1,284,055 UART: [fwproc] Recv command 0x46574c44
1,284,788 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,746 >>> mbox cmd response: success
2,827,746 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,828,828 UART: [afmc] ++
2,828,996 UART: [afmc] CDI.KEYID = 6
2,829,359 UART: [afmc] SUBJECT.KEYID = 7
2,829,785 UART: [afmc] AUTHORITY.KEYID = 5
2,865,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,922 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,183 UART: [afmc] --
2,908,200 UART: [cold-reset] --
2,909,184 UART: [state] Locking Datavault
2,910,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,853 UART: [state] Locking ICCM
2,911,477 UART: [exit] Launching FMC @ 0x40000130
2,916,807 UART:
2,916,823 UART: Running Caliptra FMC ...
2,917,231 UART:
2,917,374 UART: [state] CFI Enabled
2,928,236 UART: [fht] FMC Alias Private Key: 7
3,047,526 UART: [art] Extend RT PCRs Done
3,047,954 UART: [art] Lock RT PCRs Done
3,049,614 UART: [art] Populate DV Done
3,057,979 UART: [fht] FMC Alias Private Key: 7
3,059,033 UART: [art] Derive CDI
3,059,313 UART: [art] Store in slot 0x4
3,144,884 UART: [art] Derive Key Pair
3,145,244 UART: [art] Store priv key in slot 0x5
3,159,168 UART: [art] Derive Key Pair - Done
3,173,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,811 UART: [art] PUB.X = 84FAF2A9F223331F662022072884D5626699551D6FDD5EC935CDA39D0D5628988BC672F70263DB0A1503010D99E10E9F
3,196,551 UART: [art] PUB.Y = F363F97551C8199FD9EA527C0777608AD875636E3C5702AE19996B81163DBAB6BC34E373F153CE4AC55C013D4DE95A0B
3,203,493 UART: [art] SIG.R = DCD3138282336BA1B38DFC1F70536F6080066B79D93FC5BD363F7AD105C70521AFFCA4EDD4D4AD846E13F16A68C9E81A
3,210,268 UART: [art] SIG.S = C2A7C81D01FE15D64CF33E67C5FC66ED6611D2589E3DFC3DBDC815ED93162FF8F647E61CA0EA603521BC4683159DF2F8
3,233,587 UART: Caliptra RT
3,233,930 UART: [state] CFI Enabled
3,353,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,234 UART: [rt]cmd =0x46505344, len=4
3,492,423 >>> mbox cmd response data (8 bytes)
3,492,424 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,492,460 UART: Fatal Error: 0x000E0008
3,493,583 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,245 ready_for_fw is high
1,059,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,645 >>> mbox cmd response: success
2,679,645 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,741,590 UART:
2,741,606 UART: Running Caliptra FMC ...
2,742,014 UART:
2,742,157 UART: [state] CFI Enabled
2,752,461 UART: [fht] FMC Alias Private Key: 7
2,871,335 UART: [art] Extend RT PCRs Done
2,871,763 UART: [art] Lock RT PCRs Done
2,873,279 UART: [art] Populate DV Done
2,881,764 UART: [fht] FMC Alias Private Key: 7
2,882,898 UART: [art] Derive CDI
2,883,178 UART: [art] Store in slot 0x4
2,968,929 UART: [art] Derive Key Pair
2,969,289 UART: [art] Store priv key in slot 0x5
2,982,763 UART: [art] Derive Key Pair - Done
2,997,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,417 UART: [art] PUB.X = 40C0392D48722BCBD2DCE5F79D918B30CEE241975FE39A12A9E8AD95AA5EB897F0110E8A14D25C3057B322BF2A7CD544
3,020,196 UART: [art] PUB.Y = CF4A90324C73D612CDA2B02CDE505CEB0139EC39D20B6EA9A11C71EACC16DAABDB1C3C1350EB2F920DAAC57B33D4F30D
3,027,164 UART: [art] SIG.R = 76FE2FB607859C0AD981D983B4477E40B354A4ACA19CD6CD2983526143AB2367877DE55C7460F29F0012D6314CD7CD5B
3,033,908 UART: [art] SIG.S = B626A69A678CFF5FEB53B80AF86771424A9D7B815D124499838DB4B8611B0A17A0A64874A63C5A52B3B7233D484DB74B
3,057,712 UART: Caliptra RT
3,058,055 UART: [state] CFI Enabled
3,178,628 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,102 UART: [rt]cmd =0x46505344, len=4
3,317,589 >>> mbox cmd response data (8 bytes)
3,317,590 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,317,626 UART: Fatal Error: 0x000E0008
3,318,749 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,819 UART: [state] WD Timer not started. Device not locked for debugging
88,162 UART: [kat] SHA2-256
893,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,937 UART: [kat] ++
898,089 UART: [kat] sha1
902,103 UART: [kat] SHA2-256
904,043 UART: [kat] SHA2-384
907,004 UART: [kat] SHA2-512-ACC
908,905 UART: [kat] ECC-384
918,610 UART: [kat] HMAC-384Kdf
923,172 UART: [kat] LMS
1,171,500 UART: [kat] --
1,172,587 UART: [cold-reset] ++
1,173,141 UART: [fht] FHT @ 0x50003400
1,175,720 UART: [idev] ++
1,175,888 UART: [idev] CDI.KEYID = 6
1,176,248 UART: [idev] SUBJECT.KEYID = 7
1,176,672 UART: [idev] UDS.KEYID = 0
1,177,017 ready_for_fw is high
1,177,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,578 UART: [idev] Erasing UDS.KEYID = 0
1,201,685 UART: [idev] Sha1 KeyId Algorithm
1,210,053 UART: [idev] --
1,211,055 UART: [ldev] ++
1,211,223 UART: [ldev] CDI.KEYID = 6
1,211,586 UART: [ldev] SUBJECT.KEYID = 5
1,212,012 UART: [ldev] AUTHORITY.KEYID = 7
1,212,475 UART: [ldev] FE.KEYID = 1
1,217,801 UART: [ldev] Erasing FE.KEYID = 1
1,244,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,603 UART: [ldev] --
1,283,874 UART: [fwproc] Wait for Commands...
1,284,556 UART: [fwproc] Recv command 0x46574c44
1,285,284 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,742 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,021 >>> mbox cmd response: success
2,828,021 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,829,133 UART: [afmc] ++
2,829,301 UART: [afmc] CDI.KEYID = 6
2,829,663 UART: [afmc] SUBJECT.KEYID = 7
2,830,088 UART: [afmc] AUTHORITY.KEYID = 5
2,865,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,481 UART: [afmc] --
2,908,573 UART: [cold-reset] --
2,909,485 UART: [state] Locking Datavault
2,910,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,312 UART: [state] Locking ICCM
2,911,916 UART: [exit] Launching FMC @ 0x40000130
2,917,246 UART:
2,917,262 UART: Running Caliptra FMC ...
2,917,670 UART:
2,917,724 UART: [state] CFI Enabled
2,927,926 UART: [fht] FMC Alias Private Key: 7
3,046,244 UART: [art] Extend RT PCRs Done
3,046,672 UART: [art] Lock RT PCRs Done
3,048,612 UART: [art] Populate DV Done
3,056,737 UART: [fht] FMC Alias Private Key: 7
3,057,815 UART: [art] Derive CDI
3,058,095 UART: [art] Store in slot 0x4
3,143,900 UART: [art] Derive Key Pair
3,144,260 UART: [art] Store priv key in slot 0x5
3,157,818 UART: [art] Derive Key Pair - Done
3,172,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,140 UART: [art] PUB.X = F610B0A7DF4F1A006FB1B866490BC78600A9AB3A9A0D16F8C7AC00580973984E2FE376385BAA9F0E2D427838DF4056A5
3,195,838 UART: [art] PUB.Y = 48A2F051C49D3FFC32351EE604BAE78F8D7D5650B44A9E145ACD105A50AC8C65A1BAC007D211058E4587C2D59690DC66
3,202,787 UART: [art] SIG.R = 4C115959375D60EAFEC90F8197CD48DD7009001933396CD87B48BB187D1130E3107654C1824E66AEEF9EC9A45A617F4D
3,209,529 UART: [art] SIG.S = EFF15561A5D03F1D1266D22153EDB843F282F31871D3634392F9F6AA761FC17538B586C4EF1BAC7F914FBCFC6416FADB
3,232,739 UART: Caliptra RT
3,232,990 UART: [state] CFI Enabled
3,352,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,819 UART: [rt]cmd =0x46505344, len=4
3,491,428 >>> mbox cmd response data (8 bytes)
3,491,429 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,491,465 UART: Fatal Error: 0x000E0008
3,492,588 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,743 ready_for_fw is high
1,060,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,964 >>> mbox cmd response: success
2,680,964 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,742,181 UART:
2,742,197 UART: Running Caliptra FMC ...
2,742,605 UART:
2,742,659 UART: [state] CFI Enabled
2,753,003 UART: [fht] FMC Alias Private Key: 7
2,872,093 UART: [art] Extend RT PCRs Done
2,872,521 UART: [art] Lock RT PCRs Done
2,874,449 UART: [art] Populate DV Done
2,882,598 UART: [fht] FMC Alias Private Key: 7
2,883,724 UART: [art] Derive CDI
2,884,004 UART: [art] Store in slot 0x4
2,969,611 UART: [art] Derive Key Pair
2,969,971 UART: [art] Store priv key in slot 0x5
2,983,001 UART: [art] Derive Key Pair - Done
2,998,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,419 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,184 UART: [art] PUB.X = DE997759EE127F0477D4DEBBBAECFCC3E0215B89ECAF4280792926DE5BAA1FAD8C8A9218B3A71FF29C1A2212F8350686
3,020,966 UART: [art] PUB.Y = 4D4AD80ACD4D6AD56D6C8222AFFE946C35572916A6094E89493B6994F3472E111445BBA2902F567587103AB2FE6ADB83
3,027,912 UART: [art] SIG.R = 79DF36A8E1F14FEE169823C9589D9691A0219A72653CBF1B2FE783A8D8438C6055DBA50575E541B81E7009EA4A13C621
3,034,676 UART: [art] SIG.S = 97492DC33233EF3B4CC99428A245B10289505500FA314F540C18B3C6EF92E768BAF115F5E50DA5CDC8BC1B0F448CACE9
3,058,412 UART: Caliptra RT
3,058,663 UART: [state] CFI Enabled
3,177,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,090 UART: [rt]cmd =0x46505344, len=4
3,316,729 >>> mbox cmd response data (8 bytes)
3,316,730 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,316,766 UART: Fatal Error: 0x000E0008
3,317,889 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,871 UART: [state] LifecycleState = Unprovisioned
86,526 UART: [state] DebugLocked = No
87,110 UART: [state] WD Timer not started. Device not locked for debugging
88,381 UART: [kat] SHA2-256
894,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,156 UART: [kat] ++
898,308 UART: [kat] sha1
902,660 UART: [kat] SHA2-256
904,600 UART: [kat] SHA2-384
907,413 UART: [kat] SHA2-512-ACC
909,314 UART: [kat] ECC-384
918,741 UART: [kat] HMAC-384Kdf
923,475 UART: [kat] LMS
1,171,803 UART: [kat] --
1,172,878 UART: [cold-reset] ++
1,173,322 UART: [fht] FHT @ 0x50003400
1,175,865 UART: [idev] ++
1,176,033 UART: [idev] CDI.KEYID = 6
1,176,393 UART: [idev] SUBJECT.KEYID = 7
1,176,817 UART: [idev] UDS.KEYID = 0
1,177,162 ready_for_fw is high
1,177,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,559 UART: [idev] Erasing UDS.KEYID = 0
1,201,976 UART: [idev] Sha1 KeyId Algorithm
1,210,350 UART: [idev] --
1,211,458 UART: [ldev] ++
1,211,626 UART: [ldev] CDI.KEYID = 6
1,211,989 UART: [ldev] SUBJECT.KEYID = 5
1,212,415 UART: [ldev] AUTHORITY.KEYID = 7
1,212,878 UART: [ldev] FE.KEYID = 1
1,218,196 UART: [ldev] Erasing FE.KEYID = 1
1,244,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,022 UART: [ldev] --
1,284,533 UART: [fwproc] Wait for Commands...
1,285,257 UART: [fwproc] Recv command 0x46574c44
1,285,985 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,862 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,151 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,321 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,532 >>> mbox cmd response: success
2,828,532 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,829,690 UART: [afmc] ++
2,829,858 UART: [afmc] CDI.KEYID = 6
2,830,220 UART: [afmc] SUBJECT.KEYID = 7
2,830,645 UART: [afmc] AUTHORITY.KEYID = 5
2,866,336 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,860 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,604 UART: [afmc] --
2,909,582 UART: [cold-reset] --
2,910,246 UART: [state] Locking Datavault
2,911,351 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,955 UART: [state] Locking ICCM
2,912,431 UART: [exit] Launching FMC @ 0x40000130
2,917,761 UART:
2,917,777 UART: Running Caliptra FMC ...
2,918,185 UART:
2,918,328 UART: [state] CFI Enabled
2,928,762 UART: [fht] FMC Alias Private Key: 7
3,047,928 UART: [art] Extend RT PCRs Done
3,048,356 UART: [art] Lock RT PCRs Done
3,049,982 UART: [art] Populate DV Done
3,058,247 UART: [fht] FMC Alias Private Key: 7
3,059,407 UART: [art] Derive CDI
3,059,687 UART: [art] Store in slot 0x4
3,145,908 UART: [art] Derive Key Pair
3,146,268 UART: [art] Store priv key in slot 0x5
3,159,652 UART: [art] Derive Key Pair - Done
3,174,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,494 UART: [art] PUB.X = A387BAFA53F385829BFE801E2F3B4BD46ED55D21148D55A5A33746865AC98E01668050A8C47A6AA08642E6952D45CBA5
3,197,265 UART: [art] PUB.Y = 952E20F2478A49CA56DCD17F603CE7AB31725292E90DC5E5847B5EE680C14B07409D67873CA1E5F518A1423D6C237691
3,204,207 UART: [art] SIG.R = CE6A14220D4A664F5671FBC1A4DEAA83D8A58A889C251EA2AAE92BE7AE89E0FBA6E30AE74B83E7489FD8CAF9F8A70EF0
3,210,996 UART: [art] SIG.S = 3E5E7001E445B63AD62A66E67725BF07D7A5C274BFBD1BC9F053761B4090481BEF4A678D10CF73AE29CE613D22F4CE0C
3,235,227 UART: Caliptra RT
3,235,570 UART: [state] CFI Enabled
3,354,449 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,639 UART: [rt]cmd =0x46505344, len=4
3,493,282 >>> mbox cmd response data (8 bytes)
3,493,283 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,493,319 UART: Fatal Error: 0x000E0008
3,494,442 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,508 ready_for_fw is high
1,060,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,813 >>> mbox cmd response: success
2,679,813 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,741,236 UART:
2,741,252 UART: Running Caliptra FMC ...
2,741,660 UART:
2,741,803 UART: [state] CFI Enabled
2,752,441 UART: [fht] FMC Alias Private Key: 7
2,871,341 UART: [art] Extend RT PCRs Done
2,871,769 UART: [art] Lock RT PCRs Done
2,873,213 UART: [art] Populate DV Done
2,881,376 UART: [fht] FMC Alias Private Key: 7
2,882,416 UART: [art] Derive CDI
2,882,696 UART: [art] Store in slot 0x4
2,968,515 UART: [art] Derive Key Pair
2,968,875 UART: [art] Store priv key in slot 0x5
2,982,429 UART: [art] Derive Key Pair - Done
2,997,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,536 UART: [art] PUB.X = 388FBD5514CDAC3B208F0C039CD0CE8BEF540D1891770924EBF200185C0A947C38D5296C0F8B57E75EB5804BAE6FDA57
3,020,278 UART: [art] PUB.Y = DB1533601D3197E9602762D1689C8F245B6A8B5DC8299D9F2172E44850D4EF3DC0990F8755B3BB01F11415427960D090
3,027,212 UART: [art] SIG.R = 1FF7A9E56AF4D8FAD654E348B732D5EFD8675A315F0588E38469E985F8EFC9E9D3CCECEB7AF17145D9F27CA27B0A07FE
3,033,995 UART: [art] SIG.S = E312C7821296D4530C059BD782319D0F1B502CD97503F194A75368A643678D302233A4BD2BAE4439225F90713B76656D
3,058,465 UART: Caliptra RT
3,058,808 UART: [state] CFI Enabled
3,179,427 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,095 UART: [rt]cmd =0x46505344, len=4
3,318,732 >>> mbox cmd response data (8 bytes)
3,318,733 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,318,769 UART: Fatal Error: 0x000E0008
3,319,892 >>> mbox cmd response: failed
test test_fips::test_fips_shutdown ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,226 UART:
192,581 UART: Running Caliptra ROM ...
193,680 UART:
193,823 UART: [state] CFI Enabled
264,347 UART: [state] LifecycleState = Unprovisioned
266,289 UART: [state] DebugLocked = No
269,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,749 UART: [kat] SHA2-256
444,442 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,975 UART: [kat] ++
455,424 UART: [kat] sha1
465,969 UART: [kat] SHA2-256
468,701 UART: [kat] SHA2-384
474,434 UART: [kat] SHA2-512-ACC
476,847 UART: [kat] ECC-384
2,766,421 UART: [kat] HMAC-384Kdf
2,790,161 UART: [kat] LMS
3,980,473 UART: [kat] --
3,984,147 UART: [cold-reset] ++
3,986,655 UART: [fht] Storing FHT @ 0x50003400
3,998,866 UART: [idev] ++
3,999,470 UART: [idev] CDI.KEYID = 6
4,000,361 UART: [idev] SUBJECT.KEYID = 7
4,001,612 UART: [idev] UDS.KEYID = 0
4,002,585 ready_for_fw is high
4,002,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,151,727 UART: [idev] Erasing UDS.KEYID = 0
7,337,392 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,324 UART: [idev] --
7,361,963 UART: [ldev] ++
7,362,536 UART: [ldev] CDI.KEYID = 6
7,363,520 UART: [ldev] SUBJECT.KEYID = 5
7,364,621 UART: [ldev] AUTHORITY.KEYID = 7
7,365,966 UART: [ldev] FE.KEYID = 1
7,414,689 UART: [ldev] Erasing FE.KEYID = 1
10,748,238 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,240 UART: [ldev] --
13,128,865 UART: [fwproc] Waiting for Commands...
13,131,980 UART: [fwproc] Received command 0x46574c44
13,134,178 UART: [fwproc] Received Image of size 118548 bytes
17,233,676 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,261 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,424 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,280 >>> mbox cmd response: success
17,709,419 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,712,420 UART: [afmc] ++
17,713,042 UART: [afmc] CDI.KEYID = 6
17,713,930 UART: [afmc] SUBJECT.KEYID = 7
17,715,147 UART: [afmc] AUTHORITY.KEYID = 5
21,084,990 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,382,266 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,384,531 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,399,000 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,413,736 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,428,132 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,449,401 UART: [afmc] --
23,453,663 UART: [cold-reset] --
23,457,522 UART: [state] Locking Datavault
23,461,956 UART: [state] Locking PCR0, PCR1 and PCR31
23,463,706 UART: [state] Locking ICCM
23,466,288 UART: [exit] Launching FMC @ 0x40000130
23,474,694 UART:
23,474,928 UART: Running Caliptra FMC ...
23,475,957 UART:
23,476,108 UART: [state] CFI Enabled
23,540,985 UART: [fht] FMC Alias Private Key: 7
25,880,894 UART: [art] Extend RT PCRs Done
25,882,110 UART: [art] Lock RT PCRs Done
25,884,056 UART: [art] Populate DV Done
25,889,365 UART: [fht] FMC Alias Private Key: 7
25,890,902 UART: [art] Derive CDI
25,891,685 UART: [art] Store in slot 0x4
25,950,104 UART: [art] Derive Key Pair
25,951,139 UART: [art] Store priv key in slot 0x5
29,243,587 UART: [art] Derive Key Pair - Done
29,256,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,201 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,706 UART: [art] PUB.X = 2D6C6C5D8AE2856CD58897120FB599EF0103E49157657E48984CE38E317A30015A95D2CC4C600B0ECA479CCC1DE5F1A6
31,554,003 UART: [art] PUB.Y = F6FB850474BE44D20B76C5E877C4D513175C31D48BF19BBDD0C85EFDDB048E95FF32A1CD9D0D2C380111E9A962FB422D
31,561,287 UART: [art] SIG.R = 30DC1B6A3280D21C7F1F03CDEC6AA9E2D0947386C59206437A1E31E408A9FE70CEE261F42C6FAC49DB6E0A0D1E8D1FDE
31,568,672 UART: [art] SIG.S = 8D95DE7759AFDDAB737CAF8AB76828E6918D0FC411B88C312092BC4953481F35B9B20B298B09572BBC3C2A370EE01DE0
32,874,083 UART: Caliptra RT
32,874,788 UART: [state] CFI Enabled
33,050,625 UART: [rt] RT listening for mailbox commands...
33,082,074 UART: [rt]cmd =0x46505652, len=4
33,083,331 UART: [rt] FIPS Version
33,084,767 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,785,558 ready_for_fw is high
3,785,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,948,888 >>> mbox cmd response: success
17,950,211 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,631,317 UART:
23,631,709 UART: Running Caliptra FMC ...
23,632,863 UART:
23,633,027 UART: [state] CFI Enabled
23,701,631 UART: [fht] FMC Alias Private Key: 7
26,042,266 UART: [art] Extend RT PCRs Done
26,043,502 UART: [art] Lock RT PCRs Done
26,045,356 UART: [art] Populate DV Done
26,050,891 UART: [fht] FMC Alias Private Key: 7
26,052,443 UART: [art] Derive CDI
26,053,260 UART: [art] Store in slot 0x4
26,109,583 UART: [art] Derive Key Pair
26,110,625 UART: [art] Store priv key in slot 0x5
29,403,705 UART: [art] Derive Key Pair - Done
29,416,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,586 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,100 UART: [art] PUB.X = 9F68817E5BD19657312BF784B1BF5BB656F2FF9FBB97BF39CACF89A3FE603A485360FF44743AF5C14E43177D3D6E8FFA
31,714,372 UART: [art] PUB.Y = D00B8FD2AA912D6678C1D0C19884ACDE49692664CFB0475DB6DFEFD95A47D467276C2F38A4ECF51F9CD5EAA38BC6EF53
31,721,670 UART: [art] SIG.R = 8F3A45640CE037A736883E70C40B2C3D112295574F670467DB1E2CEE4DB04182BBB2F7D9CFCC32EE73D0642930DED5FA
31,729,058 UART: [art] SIG.S = 0D753B331221574E8B6E780BDDC64927C1A5A55F55811F8F2545BCFFBDF15BCB150149DE7CE3FFC095C6921B88ECE32E
33,034,236 UART: Caliptra RT
33,034,957 UART: [state] CFI Enabled
33,231,485 UART: [rt] RT listening for mailbox commands...
33,262,793 UART: [rt]cmd =0x46505652, len=4
33,264,041 UART: [rt] FIPS Version
33,265,101 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,564 UART:
192,925 UART: Running Caliptra ROM ...
194,103 UART:
603,955 UART: [state] CFI Enabled
617,715 UART: [state] LifecycleState = Unprovisioned
619,589 UART: [state] DebugLocked = No
621,610 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,754 UART: [kat] SHA2-256
795,492 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,075 UART: [kat] ++
806,616 UART: [kat] sha1
817,065 UART: [kat] SHA2-256
819,777 UART: [kat] SHA2-384
826,275 UART: [kat] SHA2-512-ACC
828,643 UART: [kat] ECC-384
3,113,200 UART: [kat] HMAC-384Kdf
3,126,154 UART: [kat] LMS
4,316,236 UART: [kat] --
4,321,105 UART: [cold-reset] ++
4,322,495 UART: [fht] Storing FHT @ 0x50003400
4,332,492 UART: [idev] ++
4,333,052 UART: [idev] CDI.KEYID = 6
4,334,082 UART: [idev] SUBJECT.KEYID = 7
4,335,255 UART: [idev] UDS.KEYID = 0
4,336,290 ready_for_fw is high
4,336,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,772 UART: [idev] Erasing UDS.KEYID = 0
7,614,753 UART: [idev] Using Sha1 for KeyId Algorithm
7,636,343 UART: [idev] --
7,640,083 UART: [ldev] ++
7,640,658 UART: [ldev] CDI.KEYID = 6
7,641,621 UART: [ldev] SUBJECT.KEYID = 5
7,642,824 UART: [ldev] AUTHORITY.KEYID = 7
7,644,104 UART: [ldev] FE.KEYID = 1
7,655,499 UART: [ldev] Erasing FE.KEYID = 1
10,943,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,234,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,248,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,263,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,278,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,296,591 UART: [ldev] --
13,301,850 UART: [fwproc] Waiting for Commands...
13,305,138 UART: [fwproc] Received command 0x46574c44
13,307,315 UART: [fwproc] Received Image of size 118548 bytes
17,412,898 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,488,834 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,890,945 >>> mbox cmd response: success
17,891,994 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,895,791 UART: [afmc] ++
17,896,429 UART: [afmc] CDI.KEYID = 6
17,897,332 UART: [afmc] SUBJECT.KEYID = 7
17,898,603 UART: [afmc] AUTHORITY.KEYID = 5
21,213,479 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,506,793 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,509,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,523,498 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,538,224 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,552,608 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,573,630 UART: [afmc] --
23,577,919 UART: [cold-reset] --
23,582,381 UART: [state] Locking Datavault
23,587,844 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,591 UART: [state] Locking ICCM
23,591,033 UART: [exit] Launching FMC @ 0x40000130
23,599,473 UART:
23,599,741 UART: Running Caliptra FMC ...
23,600,767 UART:
23,600,911 UART: [state] CFI Enabled
23,609,272 UART: [fht] FMC Alias Private Key: 7
25,949,000 UART: [art] Extend RT PCRs Done
25,950,227 UART: [art] Lock RT PCRs Done
25,951,983 UART: [art] Populate DV Done
25,957,500 UART: [fht] FMC Alias Private Key: 7
25,959,189 UART: [art] Derive CDI
25,959,996 UART: [art] Store in slot 0x4
26,002,748 UART: [art] Derive Key Pair
26,003,814 UART: [art] Store priv key in slot 0x5
29,246,064 UART: [art] Derive Key Pair - Done
29,259,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,451 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,959 UART: [art] PUB.X = C11C040E313619ACCCD172802BC14E1AA461668FE1FA5884ABDC842E9A56DEAF3D955B84553EC689E6F9693D06100B1C
31,548,263 UART: [art] PUB.Y = EB7E4A84B3E901AEF7BEEED36BB57C9A094B6C3EC5E50B787835D04B8D619CDD09129878DE2F46F10525F2332F20E543
31,555,491 UART: [art] SIG.R = 134D93759C2D04EE0F7ABFE183DB1AEE5CF7F1469E0322FAC860ED586F5B72B968D14DAA71E31E59BE9B5005C434CE6B
31,562,875 UART: [art] SIG.S = 17E17B232101973B5045CF0A6DEE3888484700F3D2075CAEAEB05334BC3E0C94F478ED2735AEA02932DF73AC5CF0CDE5
32,867,849 UART: Caliptra RT
32,868,547 UART: [state] CFI Enabled
33,000,905 UART: [rt] RT listening for mailbox commands...
33,032,322 UART: [rt]cmd =0x46505652, len=4
33,033,571 UART: [rt] FIPS Version
33,034,784 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,125,887 ready_for_fw is high
4,126,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,747 >>> mbox cmd response: success
18,160,360 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,803,905 UART:
23,804,289 UART: Running Caliptra FMC ...
23,805,487 UART:
23,805,654 UART: [state] CFI Enabled
23,813,326 UART: [fht] FMC Alias Private Key: 7
26,153,320 UART: [art] Extend RT PCRs Done
26,154,570 UART: [art] Lock RT PCRs Done
26,156,094 UART: [art] Populate DV Done
26,161,633 UART: [fht] FMC Alias Private Key: 7
26,163,166 UART: [art] Derive CDI
26,163,974 UART: [art] Store in slot 0x4
26,206,679 UART: [art] Derive Key Pair
26,207,720 UART: [art] Store priv key in slot 0x5
29,449,800 UART: [art] Derive Key Pair - Done
29,462,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,710 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,219 UART: [art] PUB.X = A1E6EF4CCEE39A5A0FEA68EA0FDAEEF2B58911B4B71F7DEB4002E59A11E9DC94E0A8728BD03A3E76265EEB3B7066E14C
31,751,575 UART: [art] PUB.Y = FEC9E34C71B9EAEE674830A0EA9D13C263912829513EBA7CAC1DC5C7AD64FBBF58EBCB0AC96FE793068F435C552448E8
31,758,819 UART: [art] SIG.R = 1E239BBE03848358ED2EB57A652C2692200DDE68BD7C7C8021E8F6B6429942E85FB7EAD6CE2112B94B335374145AD713
31,766,253 UART: [art] SIG.S = 3B822732AD79DB7B9C9196CE79FEC70F0DB4C7DC6094FF247CD80C4AF00BB1D14B48954EAE9893992027E2E3DA89EDD7
33,071,676 UART: Caliptra RT
33,072,395 UART: [state] CFI Enabled
33,206,725 UART: [rt] RT listening for mailbox commands...
33,238,303 UART: [rt]cmd =0x46505652, len=4
33,239,599 UART: [rt] FIPS Version
33,240,812 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,055 UART:
192,433 UART: Running Caliptra ROM ...
193,611 UART:
193,766 UART: [state] CFI Enabled
266,228 UART: [state] LifecycleState = Unprovisioned
268,223 UART: [state] DebugLocked = No
269,618 UART: [state] WD Timer not started. Device not locked for debugging
272,790 UART: [kat] SHA2-256
452,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,235 UART: [kat] ++
463,674 UART: [kat] sha1
474,118 UART: [kat] SHA2-256
476,834 UART: [kat] SHA2-384
483,167 UART: [kat] SHA2-512-ACC
485,526 UART: [kat] ECC-384
2,950,121 UART: [kat] HMAC-384Kdf
2,970,969 UART: [kat] LMS
3,447,400 UART: [kat] --
3,454,093 UART: [cold-reset] ++
3,456,374 UART: [fht] FHT @ 0x50003400
3,467,995 UART: [idev] ++
3,468,620 UART: [idev] CDI.KEYID = 6
3,469,506 UART: [idev] SUBJECT.KEYID = 7
3,470,750 UART: [idev] UDS.KEYID = 0
3,471,717 ready_for_fw is high
3,471,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,077 UART: [idev] Erasing UDS.KEYID = 0
5,985,522 UART: [idev] Sha1 KeyId Algorithm
6,009,790 UART: [idev] --
6,015,303 UART: [ldev] ++
6,015,872 UART: [ldev] CDI.KEYID = 6
6,016,779 UART: [ldev] SUBJECT.KEYID = 5
6,017,988 UART: [ldev] AUTHORITY.KEYID = 7
6,019,367 UART: [ldev] FE.KEYID = 1
6,057,146 UART: [ldev] Erasing FE.KEYID = 1
8,565,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,548 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,286 UART: [ldev] --
10,377,251 UART: [fwproc] Wait for Commands...
10,379,605 UART: [fwproc] Recv command 0x46574c44
10,381,579 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,582 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,547 >>> mbox cmd response: success
14,349,699 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,351,776 UART: [afmc] ++
14,352,353 UART: [afmc] CDI.KEYID = 6
14,353,364 UART: [afmc] SUBJECT.KEYID = 7
14,354,517 UART: [afmc] AUTHORITY.KEYID = 5
16,895,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,274 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,684,906 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,709,532 UART: [afmc] --
18,712,848 UART: [cold-reset] --
18,718,490 UART: [state] Locking Datavault
18,722,921 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,668 UART: [state] Locking ICCM
18,726,490 UART: [exit] Launching FMC @ 0x40000130
18,734,881 UART:
18,735,116 UART: Running Caliptra FMC ...
18,736,215 UART:
18,736,375 UART: [state] CFI Enabled
18,794,683 UART: [fht] FMC Alias Private Key: 7
20,561,048 UART: [art] Extend RT PCRs Done
20,562,270 UART: [art] Lock RT PCRs Done
20,563,645 UART: [art] Populate DV Done
20,569,274 UART: [fht] FMC Alias Private Key: 7
20,570,917 UART: [art] Derive CDI
20,571,650 UART: [art] Store in slot 0x4
20,627,494 UART: [art] Derive Key Pair
20,628,529 UART: [art] Store priv key in slot 0x5
23,091,405 UART: [art] Derive Key Pair - Done
23,104,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,765 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,403 UART: [art] PUB.X = F65E1E078A41A8729548337757672BBEA4CC09DDF8192F35BBF1DFD131DA568D12FEF1307AC548641A02513FB22C9CF4
24,826,556 UART: [art] PUB.Y = 805BD1546DB57BEAD6F24401409045682C1DE4DF1720403A4FC8F7D4EC97AE30435BE6FD51B2E5B11139A3A4B085A761
24,833,791 UART: [art] SIG.R = E4A2FD1792C75F2F83279844499CDE18626ADF7AD7D97C13D00B5CAE763E3A65876C622602D894E34382174BA3189B98
24,841,184 UART: [art] SIG.S = 755F97599D3680716E2C9ED26965ABD0A001DA63C75DC02231DBC971E29CE2B77C271595F3058D7DA87C8823228CF28C
25,820,019 UART: Caliptra RT
25,820,730 UART: [state] CFI Enabled
26,002,031 UART: [rt] RT listening for mailbox commands...
26,033,487 UART: [rt]cmd =0x46505652, len=4
26,034,762 UART: [rt] FIPS Version
26,036,093 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,457,865 ready_for_fw is high
3,458,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,233,665 >>> mbox cmd response: success
14,234,855 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,513,116 UART:
18,513,494 UART: Running Caliptra FMC ...
18,514,672 UART:
18,514,837 UART: [state] CFI Enabled
18,579,586 UART: [fht] FMC Alias Private Key: 7
20,346,148 UART: [art] Extend RT PCRs Done
20,347,369 UART: [art] Lock RT PCRs Done
20,348,837 UART: [art] Populate DV Done
20,354,413 UART: [fht] FMC Alias Private Key: 7
20,356,110 UART: [art] Derive CDI
20,356,924 UART: [art] Store in slot 0x4
20,412,400 UART: [art] Derive Key Pair
20,413,445 UART: [art] Store priv key in slot 0x5
22,876,060 UART: [art] Derive Key Pair - Done
22,889,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,970 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,493 UART: [art] PUB.X = 4BDDE1B874DB9516ABA23AED23D56CBC05C96A864AD388E52FBA827ECBF40024EDB7062BD0E47E8E8147C1E68DE1AED1
24,610,750 UART: [art] PUB.Y = 4D46EA8A8E63C8DAC9DDD879951398AE79F01D659A849CB126999500FA8560B534C32DEC99B0E5D630586EE1C0338C63
24,617,996 UART: [art] SIG.R = 1175E14CC0857AF7B935B33B6C1595692C77102F5BAE7964512BB67AA8911753EAE559831669C695E8942F7116D48CE9
24,625,342 UART: [art] SIG.S = 7E6704FC5D82C2E8AFC75782DA23365298B063B0AADCEBAA4631C51541D103E28AF6430AB8CA77B5598D3563FFF3EA66
25,604,446 UART: Caliptra RT
25,605,159 UART: [state] CFI Enabled
25,786,333 UART: [rt] RT listening for mailbox commands...
25,817,808 UART: [rt]cmd =0x46505652, len=4
25,819,055 UART: [rt] FIPS Version
25,820,109 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,368 UART:
192,736 UART: Running Caliptra ROM ...
193,868 UART:
603,523 UART: [state] CFI Enabled
617,702 UART: [state] LifecycleState = Unprovisioned
619,657 UART: [state] DebugLocked = No
621,330 UART: [state] WD Timer not started. Device not locked for debugging
624,731 UART: [kat] SHA2-256
804,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,200 UART: [kat] ++
815,654 UART: [kat] sha1
826,175 UART: [kat] SHA2-256
828,900 UART: [kat] SHA2-384
835,317 UART: [kat] SHA2-512-ACC
837,688 UART: [kat] ECC-384
3,281,424 UART: [kat] HMAC-384Kdf
3,294,171 UART: [kat] LMS
3,770,683 UART: [kat] --
3,775,185 UART: [cold-reset] ++
3,776,142 UART: [fht] FHT @ 0x50003400
3,788,180 UART: [idev] ++
3,788,740 UART: [idev] CDI.KEYID = 6
3,789,692 UART: [idev] SUBJECT.KEYID = 7
3,790,936 UART: [idev] UDS.KEYID = 0
3,791,836 ready_for_fw is high
3,792,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,890 UART: [idev] Erasing UDS.KEYID = 0
6,266,849 UART: [idev] Sha1 KeyId Algorithm
6,291,639 UART: [idev] --
6,295,576 UART: [ldev] ++
6,296,151 UART: [ldev] CDI.KEYID = 6
6,297,089 UART: [ldev] SUBJECT.KEYID = 5
6,298,307 UART: [ldev] AUTHORITY.KEYID = 7
6,299,547 UART: [ldev] FE.KEYID = 1
6,311,895 UART: [ldev] Erasing FE.KEYID = 1
8,788,661 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,711 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,795 UART: [ldev] --
10,583,506 UART: [fwproc] Wait for Commands...
10,585,603 UART: [fwproc] Recv command 0x46574c44
10,587,589 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,760 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,281 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,156 >>> mbox cmd response: success
14,547,383 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,550,932 UART: [afmc] ++
14,551,516 UART: [afmc] CDI.KEYID = 6
14,552,477 UART: [afmc] SUBJECT.KEYID = 7
14,553,696 UART: [afmc] AUTHORITY.KEYID = 5
17,054,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,793,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,378 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,824,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,848,844 UART: [afmc] --
18,853,463 UART: [cold-reset] --
18,857,049 UART: [state] Locking Datavault
18,863,385 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,137 UART: [state] Locking ICCM
18,866,773 UART: [exit] Launching FMC @ 0x40000130
18,875,218 UART:
18,875,455 UART: Running Caliptra FMC ...
18,876,576 UART:
18,876,736 UART: [state] CFI Enabled
18,884,683 UART: [fht] FMC Alias Private Key: 7
20,651,142 UART: [art] Extend RT PCRs Done
20,652,363 UART: [art] Lock RT PCRs Done
20,654,040 UART: [art] Populate DV Done
20,659,350 UART: [fht] FMC Alias Private Key: 7
20,660,792 UART: [art] Derive CDI
20,661,557 UART: [art] Store in slot 0x4
20,704,044 UART: [art] Derive Key Pair
20,705,051 UART: [art] Store priv key in slot 0x5
23,131,736 UART: [art] Derive Key Pair - Done
23,144,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,505 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,004 UART: [art] PUB.X = D2482F1C51D95E5CF24BA36383A010CA6DF15F3E431AECB4A587F4E8F5500C9C8D35B47A8EA3F39934B3D96A2623A34E
24,859,320 UART: [art] PUB.Y = EB374CA6C419E4963CB9399CE24DA5FBE183D8A87B341FBFB92C455A6C3A6DF38E8811E3D0FCB654F20B06331571E968
24,866,567 UART: [art] SIG.R = B218835EF5322CFB7C515F5FB33155ADD0FCED4032B66AA17540611B5C183E79910766C4CF09199E2040254F9B535187
24,873,961 UART: [art] SIG.S = D7F803166263B0E881FC16DFCD8E7D71E360A683EE787192CD127D3C6C60A0C24B10BC7E3DC8DDF5BAC68B9EBFC39AC8
25,853,102 UART: Caliptra RT
25,853,802 UART: [state] CFI Enabled
25,985,875 UART: [rt] RT listening for mailbox commands...
26,017,538 UART: [rt]cmd =0x46505652, len=4
26,018,812 UART: [rt] FIPS Version
26,020,089 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,773,995 ready_for_fw is high
3,774,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,459 >>> mbox cmd response: success
14,439,603 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,688,606 UART:
18,688,990 UART: Running Caliptra FMC ...
18,690,201 UART:
18,690,374 UART: [state] CFI Enabled
18,698,517 UART: [fht] FMC Alias Private Key: 7
20,464,493 UART: [art] Extend RT PCRs Done
20,465,717 UART: [art] Lock RT PCRs Done
20,467,637 UART: [art] Populate DV Done
20,472,900 UART: [fht] FMC Alias Private Key: 7
20,474,443 UART: [art] Derive CDI
20,475,259 UART: [art] Store in slot 0x4
20,517,916 UART: [art] Derive Key Pair
20,518,955 UART: [art] Store priv key in slot 0x5
22,945,218 UART: [art] Derive Key Pair - Done
22,958,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,260 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,770 UART: [art] PUB.X = CC4DF80296EAC791B02AF810CEB0008E3B64E9C7D2A877771A4F694BAEF87291FAE28B092BE2DC51EA703F56D2F029DE
24,673,032 UART: [art] PUB.Y = 88176832E2DFCF1CD8A0D36CBE649381885400623821D9FCA61F2448E7F770D411F0C5E691EE3099FE2214B4242E1CD3
24,680,249 UART: [art] SIG.R = 929C6871079EC0EF7DE638F0386E6AF8770738029401004930DF9FCEB4E97911D66B02C1DED5E18B42445EBA4C2A48F0
24,687,592 UART: [art] SIG.S = C34D5C75751C83F378FCEE608BB5AAB32EB60B73D0869FE532478EB765AC218C909B52FC670463B21B87226242CBAC6D
25,666,036 UART: Caliptra RT
25,666,740 UART: [state] CFI Enabled
25,799,375 UART: [rt] RT listening for mailbox commands...
25,830,752 UART: [rt]cmd =0x46505652, len=4
25,832,054 UART: [rt] FIPS Version
25,833,379 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
192,165 UART:
192,528 UART: Running Caliptra ROM ...
193,702 UART:
193,853 UART: [state] CFI Enabled
267,469 UART: [state] LifecycleState = Unprovisioned
269,893 UART: [state] DebugLocked = No
271,710 UART: [state] WD Timer not started. Device not locked for debugging
276,027 UART: [kat] SHA2-256
465,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,686 UART: [kat] ++
477,174 UART: [kat] sha1
488,062 UART: [kat] SHA2-256
491,081 UART: [kat] SHA2-384
497,991 UART: [kat] SHA2-512-ACC
500,565 UART: [kat] ECC-384
2,946,122 UART: [kat] HMAC-384Kdf
2,971,576 UART: [kat] LMS
3,503,383 UART: [kat] --
3,508,296 UART: [cold-reset] ++
3,509,519 UART: [fht] FHT @ 0x50003400
3,520,564 UART: [idev] ++
3,521,265 UART: [idev] CDI.KEYID = 6
3,522,169 UART: [idev] SUBJECT.KEYID = 7
3,523,405 UART: [idev] UDS.KEYID = 0
3,524,320 ready_for_fw is high
3,524,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,763 UART: [idev] Erasing UDS.KEYID = 0
6,027,476 UART: [idev] Sha1 KeyId Algorithm
6,049,579 UART: [idev] --
6,052,869 UART: [ldev] ++
6,053,438 UART: [ldev] CDI.KEYID = 6
6,054,351 UART: [ldev] SUBJECT.KEYID = 5
6,055,504 UART: [ldev] AUTHORITY.KEYID = 7
6,056,783 UART: [ldev] FE.KEYID = 1
6,100,214 UART: [ldev] Erasing FE.KEYID = 1
8,606,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,983 UART: [ldev] --
10,412,627 UART: [fwproc] Wait for Commands...
10,414,181 UART: [fwproc] Recv command 0x46574c44
10,416,506 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,867 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,981,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,105,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,665,573 >>> mbox cmd response: success
14,666,696 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,670,134 UART: [afmc] ++
14,670,815 UART: [afmc] CDI.KEYID = 6
14,672,045 UART: [afmc] SUBJECT.KEYID = 7
14,673,475 UART: [afmc] AUTHORITY.KEYID = 5
17,214,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,309 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,368 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,003 UART: [afmc] --
19,031,457 UART: [cold-reset] --
19,036,634 UART: [state] Locking Datavault
19,045,176 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,367 UART: [state] Locking ICCM
19,049,087 UART: [exit] Launching FMC @ 0x40000130
19,057,758 UART:
19,057,993 UART: Running Caliptra FMC ...
19,059,094 UART:
19,059,263 UART: [state] CFI Enabled
19,115,125 UART: [fht] FMC Alias Private Key: 7
20,881,680 UART: [art] Extend RT PCRs Done
20,882,886 UART: [art] Lock RT PCRs Done
20,884,508 UART: [art] Populate DV Done
20,889,971 UART: [fht] FMC Alias Private Key: 7
20,891,514 UART: [art] Derive CDI
20,892,347 UART: [art] Store in slot 0x4
20,948,002 UART: [art] Derive Key Pair
20,949,038 UART: [art] Store priv key in slot 0x5
23,412,059 UART: [art] Derive Key Pair - Done
23,424,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,520 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,013 UART: [art] PUB.X = B55411524BCD5C9B3D37B1B054D29366986CB959F538771E4C93A8BC5ACE155F847C870CF7CCAA343572220870DE06C8
25,146,253 UART: [art] PUB.Y = ED21F9B46D5C59D66B12A7F41526E5E91752290C307F8BBE46E0E389E4CEB3818F07673E80662593891D852CD34BB5BB
25,153,541 UART: [art] SIG.R = 7A790ACAB84821B11B454872C4FA715F4F9CC75C422445CA6B6CEB7C6DBCBE36D0EA87F27107C8A7404714966C4F06DF
25,160,924 UART: [art] SIG.S = E5ED4D78687AF9797AC05177FD82C9497CBEC876DE3CF13A59745BAE1A20431A959C64F795E62BEDE53EBEF1EBEA83BE
26,139,816 UART: Caliptra RT
26,140,521 UART: [state] CFI Enabled
26,321,101 UART: [rt] RT listening for mailbox commands...
26,352,462 UART: [rt]cmd =0x46505652, len=4
26,353,709 UART: [rt] FIPS Version
26,354,980 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
3,441,416 ready_for_fw is high
3,441,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,950 >>> mbox cmd response: success
14,832,275 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,114,698 UART:
19,115,092 UART: Running Caliptra FMC ...
19,116,301 UART:
19,116,491 UART: [state] CFI Enabled
19,181,437 UART: [fht] FMC Alias Private Key: 7
20,947,660 UART: [art] Extend RT PCRs Done
20,948,872 UART: [art] Lock RT PCRs Done
20,950,661 UART: [art] Populate DV Done
20,956,073 UART: [fht] FMC Alias Private Key: 7
20,957,726 UART: [art] Derive CDI
20,958,563 UART: [art] Store in slot 0x4
21,014,123 UART: [art] Derive Key Pair
21,015,168 UART: [art] Store priv key in slot 0x5
23,477,968 UART: [art] Derive Key Pair - Done
23,490,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,401 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,897 UART: [art] PUB.X = 59739C57CD973ADAE3BCD53A46B7C86225CC738D0CC5D8CF5119B5F352C77FFEBB0E5D6AB28FBDFDF0150BFC405096BE
25,213,249 UART: [art] PUB.Y = 7628FA0BB57D60538FF26C9E3488C59453EBA55FBA19DC836AE824EE65E4F067D504EBD8924DC93658C04FF1BDFFFA6F
25,220,485 UART: [art] SIG.R = 6CC3FF081FE489E731B1800CD7B25BDF0E8449441504A087F84E17D41A3F12DB2C8A9196530273AB8BF60EB1D326D4BD
25,227,938 UART: [art] SIG.S = B2A645300B48C3BFA0800D93A8DF069B082332DA8DFF60966E47CE10DCC18AB4EF89FC9BF8DF10749EDA89F180F6F112
26,207,106 UART: Caliptra RT
26,207,800 UART: [state] CFI Enabled
26,388,928 UART: [rt] RT listening for mailbox commands...
26,420,126 UART: [rt]cmd =0x46505652, len=4
26,421,421 UART: [rt] FIPS Version
26,422,552 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,376 UART:
192,748 UART: Running Caliptra ROM ...
193,940 UART:
603,367 UART: [state] CFI Enabled
615,125 UART: [state] LifecycleState = Unprovisioned
617,530 UART: [state] DebugLocked = No
619,212 UART: [state] WD Timer not started. Device not locked for debugging
623,267 UART: [kat] SHA2-256
813,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,957 UART: [kat] ++
824,481 UART: [kat] sha1
835,430 UART: [kat] SHA2-256
838,440 UART: [kat] SHA2-384
843,580 UART: [kat] SHA2-512-ACC
846,173 UART: [kat] ECC-384
3,291,449 UART: [kat] HMAC-384Kdf
3,305,559 UART: [kat] LMS
3,837,396 UART: [kat] --
3,843,154 UART: [cold-reset] ++
3,843,960 UART: [fht] FHT @ 0x50003400
3,855,575 UART: [idev] ++
3,856,301 UART: [idev] CDI.KEYID = 6
3,857,194 UART: [idev] SUBJECT.KEYID = 7
3,858,441 UART: [idev] UDS.KEYID = 0
3,859,351 ready_for_fw is high
3,859,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,475 UART: [idev] Erasing UDS.KEYID = 0
6,334,517 UART: [idev] Sha1 KeyId Algorithm
6,356,132 UART: [idev] --
6,361,092 UART: [ldev] ++
6,361,785 UART: [ldev] CDI.KEYID = 6
6,362,704 UART: [ldev] SUBJECT.KEYID = 5
6,363,926 UART: [ldev] AUTHORITY.KEYID = 7
6,365,108 UART: [ldev] FE.KEYID = 1
6,376,135 UART: [ldev] Erasing FE.KEYID = 1
8,851,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,046 UART: [ldev] --
10,642,494 UART: [fwproc] Wait for Commands...
10,645,306 UART: [fwproc] Recv command 0x46574c44
10,647,640 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,445 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,474 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,261 >>> mbox cmd response: success
14,919,353 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,922,247 UART: [afmc] ++
14,922,947 UART: [afmc] CDI.KEYID = 6
14,924,195 UART: [afmc] SUBJECT.KEYID = 7
14,925,634 UART: [afmc] AUTHORITY.KEYID = 5
17,429,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,806 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,870 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,066 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,966 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,031 UART: [afmc] --
19,228,147 UART: [cold-reset] --
19,230,936 UART: [state] Locking Datavault
19,236,732 UART: [state] Locking PCR0, PCR1 and PCR31
19,238,880 UART: [state] Locking ICCM
19,241,823 UART: [exit] Launching FMC @ 0x40000130
19,250,448 UART:
19,250,685 UART: Running Caliptra FMC ...
19,251,788 UART:
19,251,948 UART: [state] CFI Enabled
19,259,829 UART: [fht] FMC Alias Private Key: 7
21,026,365 UART: [art] Extend RT PCRs Done
21,027,591 UART: [art] Lock RT PCRs Done
21,029,143 UART: [art] Populate DV Done
21,034,561 UART: [fht] FMC Alias Private Key: 7
21,036,213 UART: [art] Derive CDI
21,036,956 UART: [art] Store in slot 0x4
21,079,807 UART: [art] Derive Key Pair
21,080,825 UART: [art] Store priv key in slot 0x5
23,507,592 UART: [art] Derive Key Pair - Done
23,520,635 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,305 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,807 UART: [art] PUB.X = 0BDD9C3FD2F9FD8AC11F59758B88510A4046C73C8C874F56127640C68A2E8C1A769548EF28AA0E9B6737D9F42206A9C5
25,236,076 UART: [art] PUB.Y = 88410B8A49714D9475F44AB61546981378DEF55BC5537E0866FAE51279089C7F09ED02385A2F55166E349D8DD20164A0
25,243,277 UART: [art] SIG.R = F03B6EC0F78002BDB3DB7ACAFB999D5788980AF84C766A76268FA458F958368081D8FA62B159F19C60D16FBFB14D7D9C
25,250,692 UART: [art] SIG.S = 5BA69917B98A18CAE7FAAD9C1A5BDB9EBFE88545B07D5A14C14F9945B5383365151C9C373EBD317C15F605AA60E50869
26,229,251 UART: Caliptra RT
26,229,958 UART: [state] CFI Enabled
26,362,704 UART: [rt] RT listening for mailbox commands...
26,394,016 UART: [rt]cmd =0x46505652, len=4
26,395,273 UART: [rt] FIPS Version
26,396,597 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,754,650 ready_for_fw is high
3,755,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,945 >>> mbox cmd response: success
15,056,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,306,351 UART:
19,306,738 UART: Running Caliptra FMC ...
19,307,936 UART:
19,308,127 UART: [state] CFI Enabled
19,316,194 UART: [fht] FMC Alias Private Key: 7
21,082,427 UART: [art] Extend RT PCRs Done
21,083,658 UART: [art] Lock RT PCRs Done
21,085,129 UART: [art] Populate DV Done
21,090,614 UART: [fht] FMC Alias Private Key: 7
21,092,248 UART: [art] Derive CDI
21,093,033 UART: [art] Store in slot 0x4
21,135,988 UART: [art] Derive Key Pair
21,136,998 UART: [art] Store priv key in slot 0x5
23,563,989 UART: [art] Derive Key Pair - Done
23,577,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,548 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,060 UART: [art] PUB.X = 776344E869A2080709EB34EE243DE8C2BD86B48A295326B7E262B9FAF812484B33968EFBAB36DD38527FF3DE39DEB1EC
25,292,332 UART: [art] PUB.Y = A014B7ABE682C43521120021086F9159711A196FE1040D520F93F9F83033ACA5894A0FAA5B75A8DD08FCAAB7300A5CF5
25,299,593 UART: [art] SIG.R = 17E5B29C0C7FDBD19DC52D28FF7BEA9E6C3BA01F5B88207CA686112C3653D0B9778A54C851A3CA4C42121977D56D1E5F
25,306,959 UART: [art] SIG.S = 21AB1C14A7EE4EBB8C23A2A55B8277BDAEC9A34770000BFDD57AFA37D08D6D2BFC8504119E6534972D54BE8E9E80DA57
26,286,041 UART: Caliptra RT
26,286,755 UART: [state] CFI Enabled
26,419,164 UART: [rt] RT listening for mailbox commands...
26,450,746 UART: [rt]cmd =0x46505652, len=4
26,452,188 UART: [rt] FIPS Version
26,453,126 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,143 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,771 UART: [kat] SHA2-256
881,702 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,817 UART: [kat] ++
885,969 UART: [kat] sha1
890,131 UART: [kat] SHA2-256
892,069 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,080 UART: [kat] HMAC-384Kdf
906,594 UART: [kat] LMS
1,474,790 UART: [kat] --
1,475,859 UART: [cold-reset] ++
1,476,357 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 ready_for_fw is high
1,480,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,428 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,230 UART: [idev] --
1,514,265 UART: [ldev] ++
1,514,433 UART: [ldev] CDI.KEYID = 6
1,514,796 UART: [ldev] SUBJECT.KEYID = 5
1,515,222 UART: [ldev] AUTHORITY.KEYID = 7
1,515,685 UART: [ldev] FE.KEYID = 1
1,520,727 UART: [ldev] Erasing FE.KEYID = 1
1,546,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,186 UART: [ldev] --
1,585,607 UART: [fwproc] Waiting for Commands...
1,586,244 UART: [fwproc] Received command 0x46574c44
1,587,035 UART: [fwproc] Received Image of size 118548 bytes
2,932,059 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,957 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,502 >>> mbox cmd response: success
3,130,502 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,131,752 UART: [afmc] ++
3,131,920 UART: [afmc] CDI.KEYID = 6
3,132,282 UART: [afmc] SUBJECT.KEYID = 7
3,132,707 UART: [afmc] AUTHORITY.KEYID = 5
3,167,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,836 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,616 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,325 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,208 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,891 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,711 UART: [afmc] --
3,210,705 UART: [cold-reset] --
3,211,487 UART: [state] Locking Datavault
3,212,518 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,122 UART: [state] Locking ICCM
3,213,776 UART: [exit] Launching FMC @ 0x40000130
3,219,106 UART:
3,219,122 UART: Running Caliptra FMC ...
3,219,530 UART:
3,219,584 UART: [state] CFI Enabled
3,230,300 UART: [fht] FMC Alias Private Key: 7
3,349,046 UART: [art] Extend RT PCRs Done
3,349,474 UART: [art] Lock RT PCRs Done
3,351,190 UART: [art] Populate DV Done
3,359,263 UART: [fht] FMC Alias Private Key: 7
3,360,393 UART: [art] Derive CDI
3,360,673 UART: [art] Store in slot 0x4
3,446,357 UART: [art] Derive Key Pair
3,446,717 UART: [art] Store priv key in slot 0x5
3,459,552 UART: [art] Derive Key Pair - Done
3,474,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,509 UART: [art] PUB.X = 3528CBABEBF39A3317FC46C2A7B86566F7EC225B932BE91B3ED678B701A77B4872EF4ABDB36B9E192D18AF08E85CBC47
3,497,291 UART: [art] PUB.Y = 99C904F02E66B2C73C1FE18AA6B9E226ABF1DABE7D409911CFD3CFD5B07F579AA5D628DBB8E8D06DD9B8581C6B708DA6
3,504,262 UART: [art] SIG.R = 7BF09702379A2E511318DE13B0581CDC38DA79483D67A82861803BA7DF6335746E86D786172C00E8756131605CCBB490
3,510,997 UART: [art] SIG.S = 0E8297783552063AEBC90B4E65991C36DBDAE8FA169C7A898624033766A96A7512A7EFD833EBCE6BD16380EA9577C964
3,535,069 UART: Caliptra RT
3,535,320 UART: [state] CFI Enabled
3,656,137 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,467 UART: [rt]cmd =0x46505652, len=4
3,687,127 UART: [rt] FIPS Version
3,688,148 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,457 ready_for_fw is high
1,362,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,576 >>> mbox cmd response: success
2,980,576 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,041,687 UART:
3,041,703 UART: Running Caliptra FMC ...
3,042,111 UART:
3,042,165 UART: [state] CFI Enabled
3,052,077 UART: [fht] FMC Alias Private Key: 7
3,170,975 UART: [art] Extend RT PCRs Done
3,171,403 UART: [art] Lock RT PCRs Done
3,172,681 UART: [art] Populate DV Done
3,180,944 UART: [fht] FMC Alias Private Key: 7
3,182,002 UART: [art] Derive CDI
3,182,282 UART: [art] Store in slot 0x4
3,267,800 UART: [art] Derive Key Pair
3,268,160 UART: [art] Store priv key in slot 0x5
3,281,905 UART: [art] Derive Key Pair - Done
3,296,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,468 UART: [art] PUB.X = 28BD7B9C43E96D120695A6E0EF655FDEAF53623A0490E705CE343E44B92EFBA1150E7411E81A5BF6C95897D0E6ADE46C
3,319,238 UART: [art] PUB.Y = A388A58FF8D162C68351F7019EA4B8EA2452BCEBA3ABB13E0AE8857F1E1CAD4BA31C8AD7C966E5F0262BB1B7474E8AB8
3,326,204 UART: [art] SIG.R = 3CF395FA2A96320E5E156243295AE82DD12B211616AD012854A80004224404B7C3E3CBFF9847F449CA131D17234BEEBC
3,332,940 UART: [art] SIG.S = DE4D393951CAF399443FB8FCEC155110D181F681826E337B43359493B645C4B6C88307290C9C2C2B15EFA7F7ED0BD069
3,356,479 UART: Caliptra RT
3,356,730 UART: [state] CFI Enabled
3,476,230 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,770 UART: [rt]cmd =0x46505652, len=4
3,507,430 UART: [rt] FIPS Version
3,508,425 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,060 UART: [kat] SHA2-256
881,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,106 UART: [kat] ++
886,258 UART: [kat] sha1
890,472 UART: [kat] SHA2-256
892,410 UART: [kat] SHA2-384
895,163 UART: [kat] SHA2-512-ACC
897,064 UART: [kat] ECC-384
902,349 UART: [kat] HMAC-384Kdf
906,851 UART: [kat] LMS
1,475,047 UART: [kat] --
1,476,048 UART: [cold-reset] ++
1,476,446 UART: [fht] Storing FHT @ 0x50003400
1,479,175 UART: [idev] ++
1,479,343 UART: [idev] CDI.KEYID = 6
1,479,703 UART: [idev] SUBJECT.KEYID = 7
1,480,127 UART: [idev] UDS.KEYID = 0
1,480,472 ready_for_fw is high
1,480,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,101 UART: [idev] Erasing UDS.KEYID = 0
1,504,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,221 UART: [idev] --
1,514,440 UART: [ldev] ++
1,514,608 UART: [ldev] CDI.KEYID = 6
1,514,971 UART: [ldev] SUBJECT.KEYID = 5
1,515,397 UART: [ldev] AUTHORITY.KEYID = 7
1,515,860 UART: [ldev] FE.KEYID = 1
1,520,932 UART: [ldev] Erasing FE.KEYID = 1
1,546,375 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,593 UART: [ldev] --
1,585,982 UART: [fwproc] Waiting for Commands...
1,586,627 UART: [fwproc] Received command 0x46574c44
1,587,418 UART: [fwproc] Received Image of size 118548 bytes
2,933,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,096 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,314 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,509 >>> mbox cmd response: success
3,131,509 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,721 UART: [afmc] ++
3,132,889 UART: [afmc] CDI.KEYID = 6
3,133,251 UART: [afmc] SUBJECT.KEYID = 7
3,133,676 UART: [afmc] AUTHORITY.KEYID = 5
3,168,701 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,063 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,435 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,118 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,052 UART: [afmc] --
3,211,976 UART: [cold-reset] --
3,212,758 UART: [state] Locking Datavault
3,214,091 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,695 UART: [state] Locking ICCM
3,215,335 UART: [exit] Launching FMC @ 0x40000130
3,220,665 UART:
3,220,681 UART: Running Caliptra FMC ...
3,221,089 UART:
3,221,232 UART: [state] CFI Enabled
3,231,954 UART: [fht] FMC Alias Private Key: 7
3,351,076 UART: [art] Extend RT PCRs Done
3,351,504 UART: [art] Lock RT PCRs Done
3,353,118 UART: [art] Populate DV Done
3,361,405 UART: [fht] FMC Alias Private Key: 7
3,362,435 UART: [art] Derive CDI
3,362,715 UART: [art] Store in slot 0x4
3,448,469 UART: [art] Derive Key Pair
3,448,829 UART: [art] Store priv key in slot 0x5
3,462,044 UART: [art] Derive Key Pair - Done
3,476,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,567 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,332 UART: [art] PUB.X = E4B486939B6E96A9250AA1A79E39DDD23A24624E8238EEA58CFAC2B6042211E9F3B3EA3807119194CF63BFFADB658295
3,500,101 UART: [art] PUB.Y = 34E8B3852E0CBE256F1BA485AA310BEA47F4FB52263B76770428A51BED3BD44B99E4843D6D41AD7BA883FA659805BDC8
3,507,051 UART: [art] SIG.R = F6F688B6E252C5C1E465152D38A1521A6510ACB5C8C148225DBCDB5A3328BD823AEFA798FAA4D82B62F12D68C642A6E7
3,513,833 UART: [art] SIG.S = 626CFEDD318091E881B6D6AA98EA8F852CF5D9F01A21C6ABB9BFDCE767D88B578D35439D278F01701B4992CC87202AE5
3,537,770 UART: Caliptra RT
3,538,113 UART: [state] CFI Enabled
3,658,481 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,815 UART: [rt]cmd =0x46505652, len=4
3,689,475 UART: [rt] FIPS Version
3,690,500 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,040 ready_for_fw is high
1,363,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,605 >>> mbox cmd response: success
2,982,605 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,044,116 UART:
3,044,132 UART: Running Caliptra FMC ...
3,044,540 UART:
3,044,683 UART: [state] CFI Enabled
3,055,299 UART: [fht] FMC Alias Private Key: 7
3,174,431 UART: [art] Extend RT PCRs Done
3,174,859 UART: [art] Lock RT PCRs Done
3,176,205 UART: [art] Populate DV Done
3,184,388 UART: [fht] FMC Alias Private Key: 7
3,185,420 UART: [art] Derive CDI
3,185,700 UART: [art] Store in slot 0x4
3,271,506 UART: [art] Derive Key Pair
3,271,866 UART: [art] Store priv key in slot 0x5
3,284,629 UART: [art] Derive Key Pair - Done
3,299,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,310 UART: [art] PUB.X = AFA0D378060D22386D690C61CE178B36D9BFA1FEDCD513FF8E8DE7AD9CCCA2A7CE34955D2F224AEBCABE4BCF5778AC1C
3,322,105 UART: [art] PUB.Y = DF655632D77BF8E0F8247A1E0F3EB0E66566F28F7E64EFFD119360AE55587D964A1DEA54661CFDC391683EF154320100
3,329,031 UART: [art] SIG.R = 0C96854B96A6F29932CA3B501D93E24A5D8F3F927EE9FE77AFF29BF48337F61C02FA873955314C3EF61328AA3E003E3C
3,335,779 UART: [art] SIG.S = ABD1DFA4471A191EC54EBC13DF2C4650E7E7818B5545D1E639B850CBEDE2FF51764C0D0C27B7473A271EEC7CA72597DA
3,359,905 UART: Caliptra RT
3,360,248 UART: [state] CFI Enabled
3,480,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,158 UART: [rt]cmd =0x46505652, len=4
3,511,818 UART: [rt] FIPS Version
3,512,783 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,251 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
891,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,240 UART: [kat] ++
895,392 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,243 UART: [kat] SHA2-512-ACC
906,144 UART: [kat] ECC-384
916,229 UART: [kat] HMAC-384Kdf
920,813 UART: [kat] LMS
1,169,125 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,172,750 UART: [idev] ++
1,172,918 UART: [idev] CDI.KEYID = 6
1,173,279 UART: [idev] SUBJECT.KEYID = 7
1,173,704 UART: [idev] UDS.KEYID = 0
1,174,050 ready_for_fw is high
1,174,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,827 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,814 UART: [ldev] ++
1,208,982 UART: [ldev] CDI.KEYID = 6
1,209,346 UART: [ldev] SUBJECT.KEYID = 5
1,209,773 UART: [ldev] AUTHORITY.KEYID = 7
1,210,236 UART: [ldev] FE.KEYID = 1
1,215,532 UART: [ldev] Erasing FE.KEYID = 1
1,241,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,240 UART: [ldev] --
1,280,613 UART: [fwproc] Wait for Commands...
1,281,420 UART: [fwproc] Recv command 0x46574c44
1,282,153 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,724 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,920 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,175 >>> mbox cmd response: success
2,825,175 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,333 UART: [afmc] ++
2,826,501 UART: [afmc] CDI.KEYID = 6
2,826,864 UART: [afmc] SUBJECT.KEYID = 7
2,827,290 UART: [afmc] AUTHORITY.KEYID = 5
2,863,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,109 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,700 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,236 UART: [afmc] --
2,906,179 UART: [cold-reset] --
2,906,915 UART: [state] Locking Datavault
2,907,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,376 UART: [state] Locking ICCM
2,908,944 UART: [exit] Launching FMC @ 0x40000130
2,914,274 UART:
2,914,290 UART: Running Caliptra FMC ...
2,914,698 UART:
2,914,752 UART: [state] CFI Enabled
2,925,440 UART: [fht] FMC Alias Private Key: 7
3,045,024 UART: [art] Extend RT PCRs Done
3,045,452 UART: [art] Lock RT PCRs Done
3,046,848 UART: [art] Populate DV Done
3,055,099 UART: [fht] FMC Alias Private Key: 7
3,056,275 UART: [art] Derive CDI
3,056,555 UART: [art] Store in slot 0x4
3,142,372 UART: [art] Derive Key Pair
3,142,732 UART: [art] Store priv key in slot 0x5
3,155,762 UART: [art] Derive Key Pair - Done
3,170,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,490 UART: [art] PUB.X = 25C959DB6BB360D8D6B7141DE8396C84EE651B853A53F5EEB35288CD96B1F694EDED6520B2240B2AEF91ACB3D4730453
3,193,264 UART: [art] PUB.Y = C8634BCF834B2BE147D40B723427ECE31D14C790FAE3370C7AA8F5AAB40CA3C84B10C02ADE8F3938133BE19DED5BF091
3,200,223 UART: [art] SIG.R = 4E92373E858254706EF5219DAE46E68015F9E6CC430DE6480EA4F991AB0C4F521A8E02CBB5ADB8A5E621191C677929ED
3,206,987 UART: [art] SIG.S = F140EE7CEA619B0CCE08F4D8C747A1154D6BF3EE344CD60CADA10F6A03DACF33768589A1D7A78CC0566CFD3C3CF4B3F1
3,231,006 UART: Caliptra RT
3,231,257 UART: [state] CFI Enabled
3,351,618 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,264 UART: [rt]cmd =0x46505652, len=4
3,382,924 UART: [rt] FIPS Version
3,384,027 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,250 ready_for_fw is high
1,059,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,104 >>> mbox cmd response: success
2,678,104 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,183 UART:
2,740,199 UART: Running Caliptra FMC ...
2,740,607 UART:
2,740,661 UART: [state] CFI Enabled
2,751,329 UART: [fht] FMC Alias Private Key: 7
2,869,787 UART: [art] Extend RT PCRs Done
2,870,215 UART: [art] Lock RT PCRs Done
2,871,679 UART: [art] Populate DV Done
2,879,826 UART: [fht] FMC Alias Private Key: 7
2,880,904 UART: [art] Derive CDI
2,881,184 UART: [art] Store in slot 0x4
2,966,981 UART: [art] Derive Key Pair
2,967,341 UART: [art] Store priv key in slot 0x5
2,980,231 UART: [art] Derive Key Pair - Done
2,994,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,225 UART: [art] PUB.X = 006C145123072BA7D7D7B1671187A3C0CFFA0AE21C138EE24D285B8AC213BAF9C02D08C3E357BAC3E11A4F03C7EF4430
3,017,973 UART: [art] PUB.Y = C663F5AA33F1B7B853EBC0BEE3A151CBF0F78930AD2E4BE0B60756D88BCA01575A0C1097EDC01577344EA67F2EA2816F
3,024,930 UART: [art] SIG.R = 6F4B2E1F7C21B59186ADF4DEA506C2FBFB88A9774AA4B19181C1FA187F1D4CFFAAF43C20F915A41867350767D7BC1C9B
3,031,712 UART: [art] SIG.S = 5BB2A14D6263889503E5DCFA4C0C3FEFA53840370061A92756F1394D28C0EAE3D53D1C4219EF5E0747D6F359386E1FB4
3,055,873 UART: Caliptra RT
3,056,124 UART: [state] CFI Enabled
3,174,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,474 UART: [rt]cmd =0x46505652, len=4
3,206,134 UART: [rt] FIPS Version
3,207,255 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,269 UART: [state] LifecycleState = Unprovisioned
85,924 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,989 UART: [kat] SHA2-256
891,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,643 UART: [kat] ++
895,795 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,169,919 UART: [cold-reset] ++
1,170,471 UART: [fht] FHT @ 0x50003400
1,173,235 UART: [idev] ++
1,173,403 UART: [idev] CDI.KEYID = 6
1,173,764 UART: [idev] SUBJECT.KEYID = 7
1,174,189 UART: [idev] UDS.KEYID = 0
1,174,535 ready_for_fw is high
1,174,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,916 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,207,858 UART: [idev] --
1,209,045 UART: [ldev] ++
1,209,213 UART: [ldev] CDI.KEYID = 6
1,209,577 UART: [ldev] SUBJECT.KEYID = 5
1,210,004 UART: [ldev] AUTHORITY.KEYID = 7
1,210,467 UART: [ldev] FE.KEYID = 1
1,215,839 UART: [ldev] Erasing FE.KEYID = 1
1,243,118 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,075 UART: [ldev] --
1,282,530 UART: [fwproc] Wait for Commands...
1,283,307 UART: [fwproc] Recv command 0x46574c44
1,284,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,004 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,179 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,522 >>> mbox cmd response: success
2,827,522 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,542 UART: [afmc] ++
2,828,710 UART: [afmc] CDI.KEYID = 6
2,829,073 UART: [afmc] SUBJECT.KEYID = 7
2,829,499 UART: [afmc] AUTHORITY.KEYID = 5
2,864,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,223 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,682 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,563 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,264 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,027 UART: [afmc] --
2,907,972 UART: [cold-reset] --
2,908,588 UART: [state] Locking Datavault
2,910,047 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,651 UART: [state] Locking ICCM
2,911,195 UART: [exit] Launching FMC @ 0x40000130
2,916,525 UART:
2,916,541 UART: Running Caliptra FMC ...
2,916,949 UART:
2,917,092 UART: [state] CFI Enabled
2,927,718 UART: [fht] FMC Alias Private Key: 7
3,047,232 UART: [art] Extend RT PCRs Done
3,047,660 UART: [art] Lock RT PCRs Done
3,049,174 UART: [art] Populate DV Done
3,057,207 UART: [fht] FMC Alias Private Key: 7
3,058,341 UART: [art] Derive CDI
3,058,621 UART: [art] Store in slot 0x4
3,144,860 UART: [art] Derive Key Pair
3,145,220 UART: [art] Store priv key in slot 0x5
3,158,660 UART: [art] Derive Key Pair - Done
3,173,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,804 UART: [art] PUB.X = 0F0292305B8CCF81EC3D48C03EA068B3EE1D9BB20242ACE85ADD6F4E31EB3451D0DCAFC86648D3DA21940F41D2B6E8C5
3,196,582 UART: [art] PUB.Y = 3213FF1DC8611F34901C3796AA50F8FB68CAE9C823977798EFEAC4C1F0DB99E6613270CB962E5396119B2DA27B43453C
3,203,536 UART: [art] SIG.R = 7FA7E71B6F416FCE6FC41A961B4CE756D4F503E40F421FD7DC8734CBA70FA1F2885A89EE24FA9B32CC7B5060E8C65806
3,210,310 UART: [art] SIG.S = 84D46E86F7C56A8F724579B115A684E6AC8E18C99A64512D599A45C81E296119E03A5780C26818E2AD3A5E2FFDEC4D1C
3,233,756 UART: Caliptra RT
3,234,099 UART: [state] CFI Enabled
3,354,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,634 UART: [rt]cmd =0x46505652, len=4
3,385,294 UART: [rt] FIPS Version
3,386,489 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,135 ready_for_fw is high
1,059,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,639 >>> mbox cmd response: success
2,678,639 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,994 UART:
2,741,010 UART: Running Caliptra FMC ...
2,741,418 UART:
2,741,561 UART: [state] CFI Enabled
2,752,173 UART: [fht] FMC Alias Private Key: 7
2,871,075 UART: [art] Extend RT PCRs Done
2,871,503 UART: [art] Lock RT PCRs Done
2,872,919 UART: [art] Populate DV Done
2,881,174 UART: [fht] FMC Alias Private Key: 7
2,882,180 UART: [art] Derive CDI
2,882,460 UART: [art] Store in slot 0x4
2,968,063 UART: [art] Derive Key Pair
2,968,423 UART: [art] Store priv key in slot 0x5
2,982,687 UART: [art] Derive Key Pair - Done
2,997,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,868 UART: [art] PUB.X = FA308E2540BA62A0C2026497F47B0716F9DD06FC989DD55BEAB44BB2F12555A0C86EE75328E8A46CA64E43ED90EA2CCB
3,020,645 UART: [art] PUB.Y = 23031B5DC7188A42417F9635461A12100B51385B0EC1F9E91DFABEC2DC2393E4DAD100873954A0C09E15246E6D57648B
3,027,562 UART: [art] SIG.R = 464264A5AE25F8A0B22064FD243C31BAF61AA5C475F60469BAF71C301720137C41223DD5EE8766A3135D3D6D538C263A
3,034,329 UART: [art] SIG.S = 72C5AEB66823CF4010BEF4F9F26BC37E43FAB4257E892613926E052F28F5924E1F15B014277D4101CAFCF78ED3F6C1F0
3,058,189 UART: Caliptra RT
3,058,532 UART: [state] CFI Enabled
3,178,654 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,098 UART: [rt]cmd =0x46505652, len=4
3,209,758 UART: [rt] FIPS Version
3,210,695 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,765 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,289 UART: [kat] SHA2-256
904,229 UART: [kat] SHA2-384
906,884 UART: [kat] SHA2-512-ACC
908,785 UART: [kat] ECC-384
918,314 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,449 UART: [cold-reset] ++
1,172,861 UART: [fht] FHT @ 0x50003400
1,175,764 UART: [idev] ++
1,175,932 UART: [idev] CDI.KEYID = 6
1,176,292 UART: [idev] SUBJECT.KEYID = 7
1,176,716 UART: [idev] UDS.KEYID = 0
1,177,061 ready_for_fw is high
1,177,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,390 UART: [idev] Erasing UDS.KEYID = 0
1,201,497 UART: [idev] Sha1 KeyId Algorithm
1,210,139 UART: [idev] --
1,211,189 UART: [ldev] ++
1,211,357 UART: [ldev] CDI.KEYID = 6
1,211,720 UART: [ldev] SUBJECT.KEYID = 5
1,212,146 UART: [ldev] AUTHORITY.KEYID = 7
1,212,609 UART: [ldev] FE.KEYID = 1
1,217,831 UART: [ldev] Erasing FE.KEYID = 1
1,244,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,623 UART: [ldev] --
1,284,132 UART: [fwproc] Wait for Commands...
1,284,834 UART: [fwproc] Recv command 0x46574c44
1,285,562 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,356 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,526 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,791 >>> mbox cmd response: success
2,829,791 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,830,937 UART: [afmc] ++
2,831,105 UART: [afmc] CDI.KEYID = 6
2,831,467 UART: [afmc] SUBJECT.KEYID = 7
2,831,892 UART: [afmc] AUTHORITY.KEYID = 5
2,868,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,891,079 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,403 UART: [afmc] --
2,911,393 UART: [cold-reset] --
2,912,301 UART: [state] Locking Datavault
2,913,644 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,248 UART: [state] Locking ICCM
2,914,838 UART: [exit] Launching FMC @ 0x40000130
2,920,168 UART:
2,920,184 UART: Running Caliptra FMC ...
2,920,592 UART:
2,920,646 UART: [state] CFI Enabled
2,931,584 UART: [fht] FMC Alias Private Key: 7
3,050,636 UART: [art] Extend RT PCRs Done
3,051,064 UART: [art] Lock RT PCRs Done
3,052,508 UART: [art] Populate DV Done
3,060,899 UART: [fht] FMC Alias Private Key: 7
3,062,061 UART: [art] Derive CDI
3,062,341 UART: [art] Store in slot 0x4
3,148,114 UART: [art] Derive Key Pair
3,148,474 UART: [art] Store priv key in slot 0x5
3,161,422 UART: [art] Derive Key Pair - Done
3,176,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,778 UART: [art] PUB.X = F72F869EB5D3FED7CABBBE0747722C9BF961130B7F8FEE4EE0BA72D1715332BA4FA530DF97C2287C285BD7BFD9AA4084
3,199,564 UART: [art] PUB.Y = B42EC9E676B82BAEFAAC91C390FD895E50684BC5530B17E591D23A149F8D5FEE8C91119E9B84F4C7378906BFA5A7A4A7
3,206,522 UART: [art] SIG.R = AC20730FF39FAAB67167024C64C5787C9D8D9C71E142B12D83421FBBF4A3249AB4147EE7C4701CC1FA060FC90ACA2DCE
3,213,293 UART: [art] SIG.S = 6BC3D7C8AE33384384A303390FCC550286635E8E6D5E59AB3E35C235CDC4CBE1C2A42DC19818FDF4D7BFAC7A2DA1F09E
3,237,058 UART: Caliptra RT
3,237,309 UART: [state] CFI Enabled
3,357,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,694 UART: [rt]cmd =0x46505652, len=4
3,388,354 UART: [rt] FIPS Version
3,389,459 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,715 ready_for_fw is high
1,059,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,702 >>> mbox cmd response: success
2,677,702 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,739,713 UART:
2,739,729 UART: Running Caliptra FMC ...
2,740,137 UART:
2,740,191 UART: [state] CFI Enabled
2,750,605 UART: [fht] FMC Alias Private Key: 7
2,869,229 UART: [art] Extend RT PCRs Done
2,869,657 UART: [art] Lock RT PCRs Done
2,871,135 UART: [art] Populate DV Done
2,879,226 UART: [fht] FMC Alias Private Key: 7
2,880,204 UART: [art] Derive CDI
2,880,484 UART: [art] Store in slot 0x4
2,966,635 UART: [art] Derive Key Pair
2,966,995 UART: [art] Store priv key in slot 0x5
2,980,145 UART: [art] Derive Key Pair - Done
2,995,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,961 UART: [art] PUB.X = F1613263853E39484A8EA3739E491242C7178F9EE7B776217AEA9867DB1AA5BB687EB6A0DCF68A7478ECCCE8EC852AA0
3,017,741 UART: [art] PUB.Y = 72441623936C17855EDE14C7C1742278D855EBB2DA9AED7959CD42EB6FF638B13B977DFDBCBA4EF9D220A7EE593FCFD4
3,024,709 UART: [art] SIG.R = 8824ED21F2BF12E80561520B1A702B6381CE00DD9CEC571CF8D28389F54641D26C5C7652F735696494E78597389DC697
3,031,443 UART: [art] SIG.S = CEF74F858BC93A01ECEF163F7C6D10CBF803B4232B149D2BE584865E8703CCB9C53B0D6D30DDC49057B8E046E6E189B1
3,054,783 UART: Caliptra RT
3,055,034 UART: [state] CFI Enabled
3,175,186 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,808 UART: [rt]cmd =0x46505652, len=4
3,206,468 UART: [rt] FIPS Version
3,207,477 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,212 UART: [state] WD Timer not started. Device not locked for debugging
87,483 UART: [kat] SHA2-256
893,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,258 UART: [kat] ++
897,410 UART: [kat] sha1
901,596 UART: [kat] SHA2-256
903,536 UART: [kat] SHA2-384
906,443 UART: [kat] SHA2-512-ACC
908,344 UART: [kat] ECC-384
918,487 UART: [kat] HMAC-384Kdf
923,017 UART: [kat] LMS
1,171,345 UART: [kat] --
1,172,508 UART: [cold-reset] ++
1,172,998 UART: [fht] FHT @ 0x50003400
1,175,835 UART: [idev] ++
1,176,003 UART: [idev] CDI.KEYID = 6
1,176,363 UART: [idev] SUBJECT.KEYID = 7
1,176,787 UART: [idev] UDS.KEYID = 0
1,177,132 ready_for_fw is high
1,177,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,641 UART: [idev] Erasing UDS.KEYID = 0
1,201,772 UART: [idev] Sha1 KeyId Algorithm
1,210,298 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,218,064 UART: [ldev] Erasing FE.KEYID = 1
1,244,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,592 UART: [ldev] --
1,284,041 UART: [fwproc] Wait for Commands...
1,284,677 UART: [fwproc] Recv command 0x46574c44
1,285,405 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,444 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,351 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,521 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,784 >>> mbox cmd response: success
2,829,784 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,830,902 UART: [afmc] ++
2,831,070 UART: [afmc] CDI.KEYID = 6
2,831,432 UART: [afmc] SUBJECT.KEYID = 7
2,831,857 UART: [afmc] AUTHORITY.KEYID = 5
2,867,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,935 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,644 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,527 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,228 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,074 UART: [afmc] --
2,911,126 UART: [cold-reset] --
2,911,890 UART: [state] Locking Datavault
2,913,415 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,019 UART: [state] Locking ICCM
2,914,669 UART: [exit] Launching FMC @ 0x40000130
2,919,999 UART:
2,920,015 UART: Running Caliptra FMC ...
2,920,423 UART:
2,920,566 UART: [state] CFI Enabled
2,931,332 UART: [fht] FMC Alias Private Key: 7
3,050,116 UART: [art] Extend RT PCRs Done
3,050,544 UART: [art] Lock RT PCRs Done
3,052,082 UART: [art] Populate DV Done
3,060,299 UART: [fht] FMC Alias Private Key: 7
3,061,391 UART: [art] Derive CDI
3,061,671 UART: [art] Store in slot 0x4
3,147,352 UART: [art] Derive Key Pair
3,147,712 UART: [art] Store priv key in slot 0x5
3,161,396 UART: [art] Derive Key Pair - Done
3,176,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,192,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,765 UART: [art] PUB.X = 74852438C0C0343EA1ECEA3D62ECE4F92D1FBEC9449D12B175BB8ACF131A5DB04CB39C21C2F4AEB822AB9AD95029CFAB
3,199,561 UART: [art] PUB.Y = 30F453D24636D84F0AF0B3BB12DE61364623731A6E899033ED664A3D6A58180EDBD024BEEEB5A93E83DFD13773ACF7A6
3,206,515 UART: [art] SIG.R = D2498AC4B5ADA875EAD46D399611078F0D72303BAC7DDE882AE1289A50E8DB5DC48AD47D13820D892E04D032DCD84A11
3,213,285 UART: [art] SIG.S = 440173A6CD210DB3CFE2E8C4C4CFF72AFDDCEC854FBDCB0E62A32645E5B95F6429153190A5FDD37BCD05389EAF6BC65B
3,236,645 UART: Caliptra RT
3,236,988 UART: [state] CFI Enabled
3,356,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,083 UART: [rt]cmd =0x46505652, len=4
3,387,743 UART: [rt] FIPS Version
3,388,640 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,430 ready_for_fw is high
1,060,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,679 >>> mbox cmd response: success
2,680,679 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,288 UART:
2,743,304 UART: Running Caliptra FMC ...
2,743,712 UART:
2,743,855 UART: [state] CFI Enabled
2,754,441 UART: [fht] FMC Alias Private Key: 7
2,873,137 UART: [art] Extend RT PCRs Done
2,873,565 UART: [art] Lock RT PCRs Done
2,875,317 UART: [art] Populate DV Done
2,883,756 UART: [fht] FMC Alias Private Key: 7
2,884,938 UART: [art] Derive CDI
2,885,218 UART: [art] Store in slot 0x4
2,971,311 UART: [art] Derive Key Pair
2,971,671 UART: [art] Store priv key in slot 0x5
2,985,383 UART: [art] Derive Key Pair - Done
3,000,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,426 UART: [art] PUB.X = 4E2785581C9532D42D334E614ADE01D05299B5B54DA42C66A77CB9589CB4C5B24B74C12E535EBDCC929EF6E7747E07CD
3,023,198 UART: [art] PUB.Y = CA42B4F5D3CB76A8C41EB33F662CF4B3F6633DBCCA9720D3FB6065B4D932F4F2C749AB6185B85A1CA4AB0E9FBB46803C
3,030,167 UART: [art] SIG.R = D5BA2ED4D1F47844576121F0873E5D44FA575073A436C705F316B2D2E5BE1DC7E83648A5DCC08753DBBD235AACFACA55
3,036,948 UART: [art] SIG.S = A1199F7D46E4B9F74F4A87BEE3345E17A44F4CE7B9336F67FDFFF905518328739756E00AADBB71E61861969E8E4C7DD4
3,060,740 UART: Caliptra RT
3,061,083 UART: [state] CFI Enabled
3,180,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,177 UART: [rt]cmd =0x46505652, len=4
3,211,837 UART: [rt] FIPS Version
3,213,090 >>> mbox cmd response data (36 bytes)
test test_fips::test_fips_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,334 UART:
192,700 UART: Running Caliptra ROM ...
193,944 UART:
194,108 UART: [state] CFI Enabled
264,985 UART: [state] LifecycleState = Unprovisioned
266,961 UART: [state] DebugLocked = No
268,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,157 UART: [kat] SHA2-256
442,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,356 UART: [kat] ++
453,838 UART: [kat] sha1
464,378 UART: [kat] SHA2-256
467,037 UART: [kat] SHA2-384
472,111 UART: [kat] SHA2-512-ACC
474,478 UART: [kat] ECC-384
2,767,531 UART: [kat] HMAC-384Kdf
2,800,014 UART: [kat] LMS
3,990,333 UART: [kat] --
3,994,573 UART: [cold-reset] ++
3,995,726 UART: [fht] Storing FHT @ 0x50003400
4,007,275 UART: [idev] ++
4,007,895 UART: [idev] CDI.KEYID = 6
4,008,793 UART: [idev] SUBJECT.KEYID = 7
4,009,989 UART: [idev] UDS.KEYID = 0
4,010,954 ready_for_fw is high
4,011,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,278 UART: [idev] Erasing UDS.KEYID = 0
7,349,536 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,045 UART: [idev] --
7,376,035 UART: [ldev] ++
7,376,609 UART: [ldev] CDI.KEYID = 6
7,377,628 UART: [ldev] SUBJECT.KEYID = 5
7,378,787 UART: [ldev] AUTHORITY.KEYID = 7
7,380,075 UART: [ldev] FE.KEYID = 1
7,425,076 UART: [ldev] Erasing FE.KEYID = 1
10,756,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,270 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,973 UART: [ldev] --
13,118,367 UART: [fwproc] Waiting for Commands...
13,120,508 UART: [fwproc] Received command 0x46574c44
13,122,706 UART: [fwproc] Received Image of size 118548 bytes
17,228,926 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,422 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,588 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,705,898 >>> mbox cmd response: success
17,706,897 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,709,408 UART: [afmc] ++
17,710,000 UART: [afmc] CDI.KEYID = 6
17,711,138 UART: [afmc] SUBJECT.KEYID = 7
17,712,240 UART: [afmc] AUTHORITY.KEYID = 5
21,070,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,796 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,999 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,397 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,006 UART: [afmc] --
23,442,226 UART: [cold-reset] --
23,447,001 UART: [state] Locking Datavault
23,452,908 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,606 UART: [state] Locking ICCM
23,456,646 UART: [exit] Launching FMC @ 0x40000130
23,465,038 UART:
23,465,279 UART: Running Caliptra FMC ...
23,466,379 UART:
23,466,536 UART: [state] CFI Enabled
23,530,975 UART: [fht] FMC Alias Private Key: 7
25,871,461 UART: [art] Extend RT PCRs Done
25,872,686 UART: [art] Lock RT PCRs Done
25,874,364 UART: [art] Populate DV Done
25,879,989 UART: [fht] FMC Alias Private Key: 7
25,881,621 UART: [art] Derive CDI
25,882,463 UART: [art] Store in slot 0x4
25,939,207 UART: [art] Derive Key Pair
25,940,210 UART: [art] Store priv key in slot 0x5
29,232,865 UART: [art] Derive Key Pair - Done
29,245,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,008 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,522 UART: [art] PUB.X = 7D70C99DF7984C1C851907E9E0334FD8276193BA896BEF336FB05A2A9804C6C8576C6F3BAA6AAF2910B2C4084E163A51
31,542,771 UART: [art] PUB.Y = C66FFC779103BA11E1501C3C05288ACE11EB17220D98F74F7020992D138BBC808E9AA872EA65C0600B27B99012572A3D
31,549,997 UART: [art] SIG.R = FB654C4D2BBE5A5683DA7E4EB672D64DED34F758F1BD85E4FE6C2119F7D947C0D2C8E859438E6E66555CA9A5ED863A6F
31,557,380 UART: [art] SIG.S = 8C676BE7A9BEA7F3839C5BA8DD9FDA574FB7817A237EF6D57A337C349696ECB0A948D3861EC83E1FBC24E396D5A735D4
32,862,487 UART: Caliptra RT
32,863,204 UART: [state] CFI Enabled
33,040,726 UART: [rt] RT listening for mailbox commands...
33,072,036 UART: [rt]cmd =0x464d4352, len=4
33,082,419 >>> mbox cmd response data (780 bytes)
33,252,899 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,282,953 UART: [rt]cmd =0x43455252, len=4
33,294,133 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,807,090 ready_for_fw is high
3,807,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,977,826 >>> mbox cmd response: success
17,978,994 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,668,956 UART:
23,669,339 UART: Running Caliptra FMC ...
23,670,453 UART:
23,670,629 UART: [state] CFI Enabled
23,739,579 UART: [fht] FMC Alias Private Key: 7
26,079,452 UART: [art] Extend RT PCRs Done
26,080,678 UART: [art] Lock RT PCRs Done
26,082,330 UART: [art] Populate DV Done
26,087,859 UART: [fht] FMC Alias Private Key: 7
26,089,346 UART: [art] Derive CDI
26,090,087 UART: [art] Store in slot 0x4
26,147,104 UART: [art] Derive Key Pair
26,148,124 UART: [art] Store priv key in slot 0x5
29,441,465 UART: [art] Derive Key Pair - Done
29,454,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,741 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,257 UART: [art] PUB.X = 8EC17E139A4FED4B0634E8E1C5D1A8825D5B470DB8708EFA4D9A151F1765479FCE977E2AD137D2912F9D6F0520864960
31,750,502 UART: [art] PUB.Y = E64E1D43E10F4062B54AD28C1B3D7F3B0900674590E80F94A8E1CE6BB4279D5C7428615B8D3A0C28602E703895FEA28A
31,757,744 UART: [art] SIG.R = 50C832663F9C0BDD956E254254BE3632F72CA88802E2DB0904957BB7914C8FA76E7D5D2D7777A297034E78AC3313F151
31,765,162 UART: [art] SIG.S = E3CF7ADE71EE2F57E23C5028A166BA9FB834DA54C9BF0DFC338975F12860BA53F0919867711B84EBE99389E0A314F1E4
33,070,547 UART: Caliptra RT
33,071,271 UART: [state] CFI Enabled
33,248,222 UART: [rt] RT listening for mailbox commands...
33,279,592 UART: [rt]cmd =0x464d4352, len=4
33,289,929 >>> mbox cmd response data (780 bytes)
33,460,516 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,490,650 UART: [rt]cmd =0x43455252, len=4
33,502,161 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,308 writing to cptra_bootfsm_go
203,432 UART:
203,794 UART: Running Caliptra ROM ...
204,979 UART:
614,541 UART: [state] CFI Enabled
629,565 UART: [state] LifecycleState = Unprovisioned
631,505 UART: [state] DebugLocked = No
634,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
640,009 UART: [kat] SHA2-256
809,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
820,325 UART: [kat] ++
820,788 UART: [kat] sha1
832,087 UART: [kat] SHA2-256
834,734 UART: [kat] SHA2-384
839,934 UART: [kat] SHA2-512-ACC
842,305 UART: [kat] ECC-384
3,125,278 UART: [kat] HMAC-384Kdf
3,137,527 UART: [kat] LMS
4,327,623 UART: [kat] --
4,332,988 UART: [cold-reset] ++
4,333,854 UART: [fht] Storing FHT @ 0x50003400
4,345,464 UART: [idev] ++
4,346,028 UART: [idev] CDI.KEYID = 6
4,346,943 UART: [idev] SUBJECT.KEYID = 7
4,348,183 UART: [idev] UDS.KEYID = 0
4,349,258 ready_for_fw is high
4,349,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,498,432 UART: [idev] Erasing UDS.KEYID = 0
7,639,259 UART: [idev] Using Sha1 for KeyId Algorithm
7,660,860 UART: [idev] --
7,664,688 UART: [ldev] ++
7,665,307 UART: [ldev] CDI.KEYID = 6
7,666,262 UART: [ldev] SUBJECT.KEYID = 5
7,667,467 UART: [ldev] AUTHORITY.KEYID = 7
7,668,689 UART: [ldev] FE.KEYID = 1
7,679,274 UART: [ldev] Erasing FE.KEYID = 1
10,970,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,261,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,276,296 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,291,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,305,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,325,039 UART: [ldev] --
13,329,814 UART: [fwproc] Waiting for Commands...
13,333,157 UART: [fwproc] Received command 0x46574c44
13,335,389 UART: [fwproc] Received Image of size 118548 bytes
17,450,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,525,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,599,008 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,928,222 >>> mbox cmd response: success
17,928,727 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
17,931,841 UART: [afmc] ++
17,932,428 UART: [afmc] CDI.KEYID = 6
17,933,393 UART: [afmc] SUBJECT.KEYID = 7
17,934,600 UART: [afmc] AUTHORITY.KEYID = 5
21,252,630 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,546,605 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,548,862 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,563,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,578,057 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,592,476 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,615,133 UART: [afmc] --
23,618,573 UART: [cold-reset] --
23,622,432 UART: [state] Locking Datavault
23,627,727 UART: [state] Locking PCR0, PCR1 and PCR31
23,629,472 UART: [state] Locking ICCM
23,632,046 UART: [exit] Launching FMC @ 0x40000130
23,640,434 UART:
23,640,667 UART: Running Caliptra FMC ...
23,641,759 UART:
23,641,909 UART: [state] CFI Enabled
23,649,895 UART: [fht] FMC Alias Private Key: 7
25,989,711 UART: [art] Extend RT PCRs Done
25,990,932 UART: [art] Lock RT PCRs Done
25,992,551 UART: [art] Populate DV Done
25,998,064 UART: [fht] FMC Alias Private Key: 7
25,999,615 UART: [art] Derive CDI
26,000,424 UART: [art] Store in slot 0x4
26,043,193 UART: [art] Derive Key Pair
26,044,232 UART: [art] Store priv key in slot 0x5
29,285,741 UART: [art] Derive Key Pair - Done
29,298,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,875 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,380 UART: [art] PUB.X = 61DD79DF8E630622130F866C70F6D8B58D1661C8B323D00EBCD80B026473E137ACD205BBD0A031B84630AFCB1B96931E
31,587,620 UART: [art] PUB.Y = 21B6F7D94445D5C3E2ECD0E95ACB71525F4A4D32BCB29AE19472B7DB41DF23978147943DEF1589D3738F8A6242824E3B
31,594,894 UART: [art] SIG.R = 3472160DD58F13AD409FE1F8EE61B40A33573C7F5A93DEF23A39703D8D3149C30059BA5F363D11DCBA1F92D3F0206922
31,602,412 UART: [art] SIG.S = 76B1F808D07BFFE98A8C631FEBC392C01F6ADEEB2268944E8DD2E81A816F9525B68E82EDFC5443FD4360677CC06A2404
32,908,228 UART: Caliptra RT
32,908,938 UART: [state] CFI Enabled
33,043,031 UART: [rt] RT listening for mailbox commands...
33,074,562 UART: [rt]cmd =0x464d4352, len=4
33,084,998 >>> mbox cmd response data (780 bytes)
33,256,539 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,286,564 UART: [rt]cmd =0x43455252, len=4
33,297,930 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,278 writing to cptra_bootfsm_go
4,134,117 ready_for_fw is high
4,134,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,172,808 >>> mbox cmd response: success
18,173,486 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
23,809,528 UART:
23,809,912 UART: Running Caliptra FMC ...
23,811,009 UART:
23,811,171 UART: [state] CFI Enabled
23,819,290 UART: [fht] FMC Alias Private Key: 7
26,159,575 UART: [art] Extend RT PCRs Done
26,160,820 UART: [art] Lock RT PCRs Done
26,162,363 UART: [art] Populate DV Done
26,167,995 UART: [fht] FMC Alias Private Key: 7
26,169,638 UART: [art] Derive CDI
26,170,373 UART: [art] Store in slot 0x4
26,212,805 UART: [art] Derive Key Pair
26,213,845 UART: [art] Store priv key in slot 0x5
29,455,214 UART: [art] Derive Key Pair - Done
29,468,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,501 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,008 UART: [art] PUB.X = 237EA83CA7118D6A4E5A29AED90A441D0A5D9130A1FCA1B0B714DB39CEAA9C8D2EB55C875B1D143C06D82DAABA207ED6
31,757,313 UART: [art] PUB.Y = 2F2F407F6904F352EB9E2B8A469B1DEAC98B24B3996290935DBF1DE4805735BCDFC3BF52DC3E4CBFCC55F3DB9ADD4C93
31,764,602 UART: [art] SIG.R = 61E7C991C259D2A2E31FF480F5F6176E7E188CEAAA7988A00DECBAFB4480E11968B7042D8A42599C7606C78268801A9F
31,771,987 UART: [art] SIG.S = DE9F12C81E589698B48ACB701DF566CA284AD2B0E3938119ADBACC1DE6DED525EEECDFB6CF218B6BD56BF851A5A21031
33,076,621 UART: Caliptra RT
33,077,350 UART: [state] CFI Enabled
33,210,878 UART: [rt] RT listening for mailbox commands...
33,242,298 UART: [rt]cmd =0x464d4352, len=4
33,252,413 >>> mbox cmd response data (780 bytes)
33,423,525 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
33,453,342 UART: [rt]cmd =0x43455252, len=4
33,464,958 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
191,982 UART:
192,390 UART: Running Caliptra ROM ...
193,496 UART:
193,641 UART: [state] CFI Enabled
263,246 UART: [state] LifecycleState = Unprovisioned
265,226 UART: [state] DebugLocked = No
268,095 UART: [state] WD Timer not started. Device not locked for debugging
272,232 UART: [kat] SHA2-256
451,861 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,676 UART: [kat] ++
463,151 UART: [kat] sha1
473,667 UART: [kat] SHA2-256
476,394 UART: [kat] SHA2-384
483,161 UART: [kat] SHA2-512-ACC
485,527 UART: [kat] ECC-384
2,945,613 UART: [kat] HMAC-384Kdf
2,969,865 UART: [kat] LMS
3,446,375 UART: [kat] --
3,452,020 UART: [cold-reset] ++
3,453,384 UART: [fht] FHT @ 0x50003400
3,464,167 UART: [idev] ++
3,464,735 UART: [idev] CDI.KEYID = 6
3,465,686 UART: [idev] SUBJECT.KEYID = 7
3,466,944 UART: [idev] UDS.KEYID = 0
3,467,864 ready_for_fw is high
3,468,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,121 UART: [idev] Erasing UDS.KEYID = 0
5,983,880 UART: [idev] Sha1 KeyId Algorithm
6,005,938 UART: [idev] --
6,009,132 UART: [ldev] ++
6,009,700 UART: [ldev] CDI.KEYID = 6
6,010,720 UART: [ldev] SUBJECT.KEYID = 5
6,011,876 UART: [ldev] AUTHORITY.KEYID = 7
6,013,104 UART: [ldev] FE.KEYID = 1
6,055,670 UART: [ldev] Erasing FE.KEYID = 1
8,562,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,253 UART: [ldev] --
10,372,381 UART: [fwproc] Wait for Commands...
10,374,132 UART: [fwproc] Recv command 0x46574c44
10,376,178 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,352 >>> mbox cmd response: success
14,344,510 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,346,821 UART: [afmc] ++
14,347,399 UART: [afmc] CDI.KEYID = 6
14,348,411 UART: [afmc] SUBJECT.KEYID = 7
14,349,566 UART: [afmc] AUTHORITY.KEYID = 5
16,893,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,103 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,176 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,721 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,744 UART: [afmc] --
18,715,212 UART: [cold-reset] --
18,719,394 UART: [state] Locking Datavault
18,725,663 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,406 UART: [state] Locking ICCM
18,730,228 UART: [exit] Launching FMC @ 0x40000130
18,738,621 UART:
18,738,852 UART: Running Caliptra FMC ...
18,739,873 UART:
18,740,017 UART: [state] CFI Enabled
18,792,329 UART: [fht] FMC Alias Private Key: 7
20,579,463 UART: [art] Extend RT PCRs Done
20,580,703 UART: [art] Lock RT PCRs Done
20,582,250 UART: [art] Populate DV Done
20,587,819 UART: [fht] FMC Alias Private Key: 7
20,589,513 UART: [art] Derive CDI
20,590,246 UART: [art] Store in slot 0x4
20,646,055 UART: [art] Derive Key Pair
20,647,090 UART: [art] Store priv key in slot 0x5
23,109,527 UART: [art] Derive Key Pair - Done
23,122,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,835,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,836,712 UART: [art] PUB.X = D41A848442914A1CC6674089E684FBFD92A996D8DE85A9259D1C62EDF251FC5507A1DEAF01C503753FC826283264BA56
24,843,957 UART: [art] PUB.Y = 88C9F8004146F1B23471E82F72EAF13C393C33F02E7F1B1DC75F41F01EC138379A90499C44B1B23ECCFF68D66044007B
24,851,216 UART: [art] SIG.R = 769F59A2981FA752558A4D18476AEDF6D6E37DF1A37CF5FD458FAD73438B0C68961CE1816ADFD7F4CB1A82C831B64E0B
24,858,622 UART: [art] SIG.S = 38B6C680ED88A806AF3F1C99DF2F392662BA944EF03B7F87897608E890C1909123D5E5E249145C7D8D793D0989F7A6A0
25,837,402 UART: Caliptra RT
25,838,119 UART: [state] CFI Enabled
26,018,524 UART: [rt] RT listening for mailbox commands...
26,050,201 UART: [rt]cmd =0x464d4352, len=4
26,060,288 >>> mbox cmd response data (780 bytes)
26,230,536 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,260,540 UART: [rt]cmd =0x43455252, len=4
26,271,989 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,459,606 ready_for_fw is high
3,460,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,993 >>> mbox cmd response: success
14,221,183 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,512,703 UART:
18,513,087 UART: Running Caliptra FMC ...
18,514,241 UART:
18,514,402 UART: [state] CFI Enabled
18,580,753 UART: [fht] FMC Alias Private Key: 7
20,346,657 UART: [art] Extend RT PCRs Done
20,347,927 UART: [art] Lock RT PCRs Done
20,349,151 UART: [art] Populate DV Done
20,354,541 UART: [fht] FMC Alias Private Key: 7
20,356,145 UART: [art] Derive CDI
20,356,983 UART: [art] Store in slot 0x4
20,418,974 UART: [art] Derive Key Pair
20,420,012 UART: [art] Store priv key in slot 0x5
22,883,129 UART: [art] Derive Key Pair - Done
22,896,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,936 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,434 UART: [art] PUB.X = F472C60DD3AA524FA2312A159D3E50BF34956A68575D18042262FFAE0C3B97C24A5B293A48ED31DEF9AFEC94FEA6C723
24,617,734 UART: [art] PUB.Y = EEAE3A2C95A937E6BC705E689770120E5BCD4CF496DBE4B3C4AF7E39BED30229AEBA793439A2CA0525EF6BE2E7C3811A
24,625,041 UART: [art] SIG.R = B987ED8C1AE7FE179A6A42AFE6A2C7B4731CF6A7709A180673D193008EAC95C2CF78549FB2AD6DE631FF501D6E96F954
24,632,443 UART: [art] SIG.S = 1FB9AA565391741103DACD2039D8BB17E68F6A3E6F49A13EAC755C9D073D1926DCDBDF37F773F96E7C0CA3ED20C91FAD
25,611,188 UART: Caliptra RT
25,611,887 UART: [state] CFI Enabled
25,792,319 UART: [rt] RT listening for mailbox commands...
25,823,578 UART: [rt]cmd =0x464d4352, len=4
25,833,911 >>> mbox cmd response data (780 bytes)
26,003,775 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,033,898 UART: [rt]cmd =0x43455252, len=4
26,045,109 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,513 UART:
192,883 UART: Running Caliptra ROM ...
194,064 UART:
603,517 UART: [state] CFI Enabled
617,230 UART: [state] LifecycleState = Unprovisioned
619,220 UART: [state] DebugLocked = No
620,885 UART: [state] WD Timer not started. Device not locked for debugging
625,071 UART: [kat] SHA2-256
804,746 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,562 UART: [kat] ++
816,047 UART: [kat] sha1
827,429 UART: [kat] SHA2-256
830,151 UART: [kat] SHA2-384
837,140 UART: [kat] SHA2-512-ACC
839,509 UART: [kat] ECC-384
3,280,297 UART: [kat] HMAC-384Kdf
3,291,910 UART: [kat] LMS
3,768,444 UART: [kat] --
3,773,506 UART: [cold-reset] ++
3,775,154 UART: [fht] FHT @ 0x50003400
3,786,699 UART: [idev] ++
3,787,274 UART: [idev] CDI.KEYID = 6
3,788,272 UART: [idev] SUBJECT.KEYID = 7
3,789,521 UART: [idev] UDS.KEYID = 0
3,790,449 ready_for_fw is high
3,790,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,649 UART: [idev] Erasing UDS.KEYID = 0
6,269,491 UART: [idev] Sha1 KeyId Algorithm
6,293,690 UART: [idev] --
6,298,918 UART: [ldev] ++
6,299,499 UART: [ldev] CDI.KEYID = 6
6,300,411 UART: [ldev] SUBJECT.KEYID = 5
6,301,625 UART: [ldev] AUTHORITY.KEYID = 7
6,302,857 UART: [ldev] FE.KEYID = 1
6,313,827 UART: [ldev] Erasing FE.KEYID = 1
8,791,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,457 UART: [ldev] --
10,585,525 UART: [fwproc] Wait for Commands...
10,587,354 UART: [fwproc] Recv command 0x46574c44
10,589,339 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,434 >>> mbox cmd response: success
14,549,925 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,553,994 UART: [afmc] ++
14,554,571 UART: [afmc] CDI.KEYID = 6
14,555,540 UART: [afmc] SUBJECT.KEYID = 7
14,556,751 UART: [afmc] AUTHORITY.KEYID = 5
17,061,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,052 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,880 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,511 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,328 UART: [afmc] --
18,860,307 UART: [cold-reset] --
18,863,307 UART: [state] Locking Datavault
18,869,040 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,796 UART: [state] Locking ICCM
18,873,491 UART: [exit] Launching FMC @ 0x40000130
18,881,890 UART:
18,882,126 UART: Running Caliptra FMC ...
18,883,227 UART:
18,883,387 UART: [state] CFI Enabled
18,891,300 UART: [fht] FMC Alias Private Key: 7
20,657,439 UART: [art] Extend RT PCRs Done
20,658,645 UART: [art] Lock RT PCRs Done
20,660,380 UART: [art] Populate DV Done
20,665,756 UART: [fht] FMC Alias Private Key: 7
20,667,405 UART: [art] Derive CDI
20,668,222 UART: [art] Store in slot 0x4
20,711,063 UART: [art] Derive Key Pair
20,712,099 UART: [art] Store priv key in slot 0x5
23,139,601 UART: [art] Derive Key Pair - Done
23,152,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,813 UART: [art] PUB.X = 5D76F0E982C6822FFC7175AFB1F9F22093F592D43416C1F83ED6CC1546D5061438E34646B652B550700D7F69990DB647
24,868,114 UART: [art] PUB.Y = E0255A4D881E06CED3354004A056288017F77063DC52B6642F798991DACCC63573986EA76EC156D291B8EBC936D3C643
24,875,345 UART: [art] SIG.R = 3C3B83D3F454E3AB279D59330E02D0ECD3C0478239EF541172442483AB30FD169DE6D33AAC2576BF6CB47B10C4CBCD5B
24,882,738 UART: [art] SIG.S = 8E1CA56DE68B35681EE38ECA2758FD96E43D09351FD4B532D1EB12ED842DD863C4E7823BA54273E68A0C06B7E70A7CCC
25,861,288 UART: Caliptra RT
25,861,997 UART: [state] CFI Enabled
25,994,570 UART: [rt] RT listening for mailbox commands...
26,025,817 UART: [rt]cmd =0x464d4352, len=4
26,035,739 >>> mbox cmd response data (780 bytes)
26,205,440 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,235,500 UART: [rt]cmd =0x43455252, len=4
26,246,926 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,780,936 ready_for_fw is high
3,781,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,461,592 >>> mbox cmd response: success
14,462,159 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
18,712,067 UART:
18,712,464 UART: Running Caliptra FMC ...
18,713,663 UART:
18,713,843 UART: [state] CFI Enabled
18,721,624 UART: [fht] FMC Alias Private Key: 7
20,487,987 UART: [art] Extend RT PCRs Done
20,489,214 UART: [art] Lock RT PCRs Done
20,490,649 UART: [art] Populate DV Done
20,496,243 UART: [fht] FMC Alias Private Key: 7
20,497,935 UART: [art] Derive CDI
20,498,766 UART: [art] Store in slot 0x4
20,540,931 UART: [art] Derive Key Pair
20,541,933 UART: [art] Store priv key in slot 0x5
22,968,692 UART: [art] Derive Key Pair - Done
22,981,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,457 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,964 UART: [art] PUB.X = 2A73670146A4D25B69603B7E3D53007D72EEF3DBA5AB7F7DDEF3DE8EFB33CCA75F1204E8B0AB97D26AED2129E9254ACD
24,697,224 UART: [art] PUB.Y = BCBB4EE21DEC329000A05CA3B2F796F976F4E3E4750B9B6D87169648502E9539A2A4EB1A751FD4BC331A8AC774B433CF
24,704,490 UART: [art] SIG.R = F47EC9BFBB69354BBBD722016B9337E8F5F8E1C5021F33E34E4200A43B826899ECBDE7DF65AC8542D1C2476A9A6D244D
24,711,891 UART: [art] SIG.S = 0C7401468A66A5FA6A3FA62C62E5C09FBDF374416F009A2C49BF566D0ED148160BBCE683474B5AC4787D3D1466982DF1
25,691,305 UART: Caliptra RT
25,692,017 UART: [state] CFI Enabled
25,824,206 UART: [rt] RT listening for mailbox commands...
25,855,483 UART: [rt]cmd =0x464d4352, len=4
25,865,899 >>> mbox cmd response data (780 bytes)
26,035,220 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,065,356 UART: [rt]cmd =0x43455252, len=4
26,076,759 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,960 UART:
192,330 UART: Running Caliptra ROM ...
193,481 UART:
193,624 UART: [state] CFI Enabled
261,397 UART: [state] LifecycleState = Unprovisioned
263,798 UART: [state] DebugLocked = No
265,685 UART: [state] WD Timer not started. Device not locked for debugging
269,783 UART: [kat] SHA2-256
459,662 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,418 UART: [kat] ++
470,864 UART: [kat] sha1
482,945 UART: [kat] SHA2-256
485,978 UART: [kat] SHA2-384
491,760 UART: [kat] SHA2-512-ACC
494,338 UART: [kat] ECC-384
2,950,115 UART: [kat] HMAC-384Kdf
2,972,159 UART: [kat] LMS
3,503,904 UART: [kat] --
3,507,472 UART: [cold-reset] ++
3,509,904 UART: [fht] FHT @ 0x50003400
3,522,012 UART: [idev] ++
3,522,652 UART: [idev] CDI.KEYID = 6
3,523,626 UART: [idev] SUBJECT.KEYID = 7
3,524,868 UART: [idev] UDS.KEYID = 0
3,525,786 ready_for_fw is high
3,525,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,027 UART: [idev] Erasing UDS.KEYID = 0
6,032,547 UART: [idev] Sha1 KeyId Algorithm
6,054,172 UART: [idev] --
6,057,986 UART: [ldev] ++
6,058,666 UART: [ldev] CDI.KEYID = 6
6,059,579 UART: [ldev] SUBJECT.KEYID = 5
6,060,788 UART: [ldev] AUTHORITY.KEYID = 7
6,062,018 UART: [ldev] FE.KEYID = 1
6,100,800 UART: [ldev] Erasing FE.KEYID = 1
8,606,193 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,129 UART: [ldev] --
10,411,551 UART: [fwproc] Wait for Commands...
10,413,587 UART: [fwproc] Recv command 0x46574c44
10,415,837 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,929 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,050 >>> mbox cmd response: success
14,680,561 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,683,472 UART: [afmc] ++
14,684,159 UART: [afmc] CDI.KEYID = 6
14,685,388 UART: [afmc] SUBJECT.KEYID = 7
14,686,861 UART: [afmc] AUTHORITY.KEYID = 5
17,211,570 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,813 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,009 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,663 UART: [afmc] --
19,009,934 UART: [cold-reset] --
19,014,870 UART: [state] Locking Datavault
19,019,432 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,619 UART: [state] Locking ICCM
19,024,090 UART: [exit] Launching FMC @ 0x40000130
19,032,753 UART:
19,032,987 UART: Running Caliptra FMC ...
19,034,086 UART:
19,034,249 UART: [state] CFI Enabled
19,091,423 UART: [fht] FMC Alias Private Key: 7
20,858,168 UART: [art] Extend RT PCRs Done
20,859,388 UART: [art] Lock RT PCRs Done
20,860,904 UART: [art] Populate DV Done
20,866,256 UART: [fht] FMC Alias Private Key: 7
20,867,783 UART: [art] Derive CDI
20,868,590 UART: [art] Store in slot 0x4
20,923,881 UART: [art] Derive Key Pair
20,924,880 UART: [art] Store priv key in slot 0x5
23,387,438 UART: [art] Derive Key Pair - Done
23,400,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,613 UART: [art] PUB.X = 56B44FA3933E64BC379DACEFFCBAEE147611410C2DE112E9A1336ADABC7D2B474BA0B8DC810B815FC9D51E8FED6E5117
25,121,910 UART: [art] PUB.Y = 8CE45AB92745DB55C60BB253C4174ED6FEAE28AE310471CCDA03054808410CA9192FF41EAD57C33A00BCC16FFC3D7FB0
25,129,191 UART: [art] SIG.R = E62C7C0244C486CCC9C2062638489604D90802922B7D68DBB49FAE320146534ECDD4C520059A9EB62AA27D96E0BC4930
25,136,579 UART: [art] SIG.S = 74C1F3624996E2B30345D5635D00BF914DBC9052FF2C406BEC092008E7CF342676FA204E6E478107417D36216A5C1C4E
26,115,609 UART: Caliptra RT
26,116,318 UART: [state] CFI Enabled
26,296,518 UART: [rt] RT listening for mailbox commands...
26,328,173 UART: [rt]cmd =0x464d4352, len=4
26,338,446 >>> mbox cmd response data (780 bytes)
26,507,629 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,537,601 UART: [rt]cmd =0x43455252, len=4
26,548,974 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,439,333 ready_for_fw is high
3,439,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,934 >>> mbox cmd response: success
14,827,758 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,112,655 UART:
19,113,047 UART: Running Caliptra FMC ...
19,114,187 UART:
19,114,348 UART: [state] CFI Enabled
19,179,835 UART: [fht] FMC Alias Private Key: 7
20,945,850 UART: [art] Extend RT PCRs Done
20,947,073 UART: [art] Lock RT PCRs Done
20,948,702 UART: [art] Populate DV Done
20,954,024 UART: [fht] FMC Alias Private Key: 7
20,955,631 UART: [art] Derive CDI
20,956,447 UART: [art] Store in slot 0x4
21,012,551 UART: [art] Derive Key Pair
21,013,593 UART: [art] Store priv key in slot 0x5
23,476,911 UART: [art] Derive Key Pair - Done
23,489,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,866 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,401 UART: [art] PUB.X = C51C59A9DB13944EF0EBE70EF7E9F23281997D34A391D22AFB1BF94EFE5AB2CA77419B3E9F8AB9ECAE44FDAA8FECC6C3
25,211,651 UART: [art] PUB.Y = 1A0A40AD1701A421CE6D547E9C97114F7A2A162628098642AA96CA7626C855093CBA08C9F72B2D863781B0615B2D5ECA
25,218,901 UART: [art] SIG.R = 42F95B8A2B508001537B3737438D57ABFE9821484C35E46DA8B0980E1E0D5DFDA082470BB971ABEA305DE923FEF22F89
25,226,342 UART: [art] SIG.S = 7E0253E357A63DA6A31513A7B6AE99B2914211C3C32A832DE9B56B6ABDAC8084352847729775B334BA28882132496567
26,204,529 UART: Caliptra RT
26,205,252 UART: [state] CFI Enabled
26,386,814 UART: [rt] RT listening for mailbox commands...
26,418,183 UART: [rt]cmd =0x464d4352, len=4
26,428,652 >>> mbox cmd response data (780 bytes)
26,598,466 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,628,916 UART: [rt]cmd =0x43455252, len=4
26,640,316 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,544 UART:
192,918 UART: Running Caliptra ROM ...
194,123 UART:
603,715 UART: [state] CFI Enabled
615,552 UART: [state] LifecycleState = Unprovisioned
617,936 UART: [state] DebugLocked = No
619,896 UART: [state] WD Timer not started. Device not locked for debugging
624,020 UART: [kat] SHA2-256
813,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,647 UART: [kat] ++
825,190 UART: [kat] sha1
835,924 UART: [kat] SHA2-256
838,937 UART: [kat] SHA2-384
844,789 UART: [kat] SHA2-512-ACC
847,377 UART: [kat] ECC-384
3,288,872 UART: [kat] HMAC-384Kdf
3,302,044 UART: [kat] LMS
3,833,829 UART: [kat] --
3,839,062 UART: [cold-reset] ++
3,841,011 UART: [fht] FHT @ 0x50003400
3,852,162 UART: [idev] ++
3,852,907 UART: [idev] CDI.KEYID = 6
3,853,806 UART: [idev] SUBJECT.KEYID = 7
3,854,982 UART: [idev] UDS.KEYID = 0
3,855,968 ready_for_fw is high
3,856,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,965 UART: [idev] Erasing UDS.KEYID = 0
6,334,392 UART: [idev] Sha1 KeyId Algorithm
6,356,002 UART: [idev] --
6,361,839 UART: [ldev] ++
6,362,521 UART: [ldev] CDI.KEYID = 6
6,363,405 UART: [ldev] SUBJECT.KEYID = 5
6,364,620 UART: [ldev] AUTHORITY.KEYID = 7
6,365,801 UART: [ldev] FE.KEYID = 1
6,377,804 UART: [ldev] Erasing FE.KEYID = 1
8,855,056 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,956 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,956 UART: [ldev] --
10,644,897 UART: [fwproc] Wait for Commands...
10,646,852 UART: [fwproc] Recv command 0x46574c44
10,649,212 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,752 >>> mbox cmd response: success
14,906,769 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
14,909,396 UART: [afmc] ++
14,910,108 UART: [afmc] CDI.KEYID = 6
14,911,217 UART: [afmc] SUBJECT.KEYID = 7
14,912,765 UART: [afmc] AUTHORITY.KEYID = 5
17,415,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,239 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,715 UART: [afmc] --
19,213,380 UART: [cold-reset] --
19,217,849 UART: [state] Locking Datavault
19,222,619 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,765 UART: [state] Locking ICCM
19,226,865 UART: [exit] Launching FMC @ 0x40000130
19,235,543 UART:
19,235,777 UART: Running Caliptra FMC ...
19,236,880 UART:
19,237,040 UART: [state] CFI Enabled
19,245,469 UART: [fht] FMC Alias Private Key: 7
21,011,782 UART: [art] Extend RT PCRs Done
21,013,016 UART: [art] Lock RT PCRs Done
21,014,516 UART: [art] Populate DV Done
21,020,098 UART: [fht] FMC Alias Private Key: 7
21,021,660 UART: [art] Derive CDI
21,022,404 UART: [art] Store in slot 0x4
21,065,059 UART: [art] Derive Key Pair
21,066,105 UART: [art] Store priv key in slot 0x5
23,492,502 UART: [art] Derive Key Pair - Done
23,505,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,956 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,466 UART: [art] PUB.X = 9382CBAF86417C8C9A867F705E2E6D32405BAACF73079C126DF33C42AF10A057DC92EEBE0901CB6793A30064AB35A469
25,219,731 UART: [art] PUB.Y = 5D9D00F0B20B95B8AFAB74D721D32E3F93921BF83F3F662EFF2D3A432F47B6A5A251A9E50EE511990FB60798B98F3B16
25,226,977 UART: [art] SIG.R = B11F104B097AB26BE0A9BEAE3A733DC6F30D1F2D634D0CAF11BFEDBAE26FB098B32747C024F0AC1B88471E11E45761B8
25,234,389 UART: [art] SIG.S = E8C2EB8722D144B7CE0D34A0AC1C03D8E79593ADF7CC0B6E049290EEC87F021DF90261B7A9D70A04093E79E992BC44F1
26,213,323 UART: Caliptra RT
26,214,029 UART: [state] CFI Enabled
26,346,395 UART: [rt] RT listening for mailbox commands...
26,377,761 UART: [rt]cmd =0x464d4352, len=4
26,388,199 >>> mbox cmd response data (780 bytes)
26,558,678 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,588,648 UART: [rt]cmd =0x43455252, len=4
26,600,125 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
3,755,365 ready_for_fw is high
3,755,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,813 >>> mbox cmd response: success
15,044,444 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
19,301,047 UART:
19,301,429 UART: Running Caliptra FMC ...
19,302,637 UART:
19,302,805 UART: [state] CFI Enabled
19,310,759 UART: [fht] FMC Alias Private Key: 7
21,077,467 UART: [art] Extend RT PCRs Done
21,078,717 UART: [art] Lock RT PCRs Done
21,080,143 UART: [art] Populate DV Done
21,085,463 UART: [fht] FMC Alias Private Key: 7
21,087,074 UART: [art] Derive CDI
21,087,902 UART: [art] Store in slot 0x4
21,130,569 UART: [art] Derive Key Pair
21,131,614 UART: [art] Store priv key in slot 0x5
23,558,720 UART: [art] Derive Key Pair - Done
23,571,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,843 UART: [art] PUB.X = 502E8D749D1D73BF5A2072D624766F34C5357291A311AFBB3794D0D57F5ED72157D149A3ED01A06D566C0D8A9BF42E3F
25,287,086 UART: [art] PUB.Y = 9DC48E1A28F521E544C587AA88D4A6FED6DA42764D9808C88EB73FDC99AD12D7DF895F8C334EDB52AE8ECCA04EEF0EBF
25,294,367 UART: [art] SIG.R = 8BA123E6D699D2989E133CBDBA95AD64E8771983D3CC92936069A1984E2AC1498EF2184F5ED8E3C053CF28891E38AD4A
25,301,788 UART: [art] SIG.S = C39FC6CF48A6CDE0942A3593F7C3F7BF251716A1D9D2487ED7D38F7B3E8370041BC6A068BA771E867D3547C459D6A956
26,280,838 UART: Caliptra RT
26,281,519 UART: [state] CFI Enabled
26,413,540 UART: [rt] RT listening for mailbox commands...
26,445,129 UART: [rt]cmd =0x464d4352, len=4
26,455,407 >>> mbox cmd response data (780 bytes)
26,626,337 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
26,656,287 UART: [rt]cmd =0x43455252, len=4
26,667,498 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,505 UART: [kat] SHA2-256
882,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,551 UART: [kat] ++
886,703 UART: [kat] sha1
890,799 UART: [kat] SHA2-256
892,737 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
902,936 UART: [kat] HMAC-384Kdf
907,578 UART: [kat] LMS
1,475,774 UART: [kat] --
1,476,715 UART: [cold-reset] ++
1,477,171 UART: [fht] Storing FHT @ 0x50003400
1,479,862 UART: [idev] ++
1,480,030 UART: [idev] CDI.KEYID = 6
1,480,390 UART: [idev] SUBJECT.KEYID = 7
1,480,814 UART: [idev] UDS.KEYID = 0
1,481,159 ready_for_fw is high
1,481,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,560 UART: [idev] Erasing UDS.KEYID = 0
1,505,354 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,828 UART: [idev] --
1,514,883 UART: [ldev] ++
1,515,051 UART: [ldev] CDI.KEYID = 6
1,515,414 UART: [ldev] SUBJECT.KEYID = 5
1,515,840 UART: [ldev] AUTHORITY.KEYID = 7
1,516,303 UART: [ldev] FE.KEYID = 1
1,521,261 UART: [ldev] Erasing FE.KEYID = 1
1,546,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,181 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,510 UART: [ldev] --
1,585,951 UART: [fwproc] Waiting for Commands...
1,586,602 UART: [fwproc] Received command 0x46574c44
1,587,393 UART: [fwproc] Received Image of size 118548 bytes
2,932,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,287 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,840 >>> mbox cmd response: success
3,131,840 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,133,052 UART: [afmc] ++
3,133,220 UART: [afmc] CDI.KEYID = 6
3,133,582 UART: [afmc] SUBJECT.KEYID = 7
3,134,007 UART: [afmc] AUTHORITY.KEYID = 5
3,169,036 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,676 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,456 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,165 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,048 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,731 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,365 UART: [afmc] --
3,212,417 UART: [cold-reset] --
3,213,135 UART: [state] Locking Datavault
3,214,210 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,814 UART: [state] Locking ICCM
3,215,334 UART: [exit] Launching FMC @ 0x40000130
3,220,664 UART:
3,220,680 UART: Running Caliptra FMC ...
3,221,088 UART:
3,221,142 UART: [state] CFI Enabled
3,231,746 UART: [fht] FMC Alias Private Key: 7
3,350,702 UART: [art] Extend RT PCRs Done
3,351,130 UART: [art] Lock RT PCRs Done
3,353,124 UART: [art] Populate DV Done
3,361,689 UART: [fht] FMC Alias Private Key: 7
3,362,799 UART: [art] Derive CDI
3,363,079 UART: [art] Store in slot 0x4
3,448,739 UART: [art] Derive Key Pair
3,449,099 UART: [art] Store priv key in slot 0x5
3,462,258 UART: [art] Derive Key Pair - Done
3,477,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,993 UART: [art] PUB.X = EACF4B45E32E28E32C0C352A7284C45B9E896434CA8CA7F863D3AEDEAD14EC82EB7C7B1604949AA03F326CBD9AC322A5
3,499,777 UART: [art] PUB.Y = 5B276675F3C641C04197E20DAE125BC75290967EE74C2F5707EA25C748CAB7CE76A2A0A38EF8D33203B5E02D3700BC4C
3,506,702 UART: [art] SIG.R = B20290EDAA729739A543B0037E65D382BA8DBF3FDA748E6D10ED06E86470ED52DC649911ADCE8234C00FAF9158FC54F0
3,513,472 UART: [art] SIG.S = 6A9CE0FB204AAED83FDDCE26BA7E4139B940D0EE40862F4CEB2409C7EE317C63EE5E23F7EA8278C04D92AE617ECA5784
3,536,751 UART: Caliptra RT
3,537,002 UART: [state] CFI Enabled
3,657,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,866 UART: [rt]cmd =0x464d4352, len=4
3,697,449 >>> mbox cmd response data (780 bytes)
3,697,450 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,979 UART: [rt]cmd =0x43455252, len=4
3,737,624 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,719 ready_for_fw is high
1,362,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,638 >>> mbox cmd response: success
2,981,638 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,043,937 UART:
3,043,953 UART: Running Caliptra FMC ...
3,044,361 UART:
3,044,415 UART: [state] CFI Enabled
3,055,257 UART: [fht] FMC Alias Private Key: 7
3,174,695 UART: [art] Extend RT PCRs Done
3,175,123 UART: [art] Lock RT PCRs Done
3,177,013 UART: [art] Populate DV Done
3,185,040 UART: [fht] FMC Alias Private Key: 7
3,186,020 UART: [art] Derive CDI
3,186,300 UART: [art] Store in slot 0x4
3,271,534 UART: [art] Derive Key Pair
3,271,894 UART: [art] Store priv key in slot 0x5
3,284,719 UART: [art] Derive Key Pair - Done
3,299,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,592 UART: [art] PUB.X = 88B5170ACFA9192F240DD08F0CCDE65584AA3986BE74C14AED7A947C4EE6AAFCE79BFE9CFE7799D3DC130839228818EC
3,322,370 UART: [art] PUB.Y = B6F29217ED5C3AC03889ECF74FA42268061053CFA0885CC9FE7D5796DAF07D99F6FE476F6B2AA0526B5ADA2A70DC89F3
3,329,333 UART: [art] SIG.R = E3F01D2630D15AB744CF8E86C7FF004CDB9A1DC47485899EDF183114E63E13F645E6EB461267DD001EC697EEF9396186
3,336,065 UART: [art] SIG.S = 67CFFB4AF2AE219095BE70AB86FAE2EAC76246E03B62786E16B15F84A60058B60648B96739AD7A82F219F8AF6238D1DE
3,359,318 UART: Caliptra RT
3,359,569 UART: [state] CFI Enabled
3,479,789 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,333 UART: [rt]cmd =0x464d4352, len=4
3,520,160 >>> mbox cmd response data (780 bytes)
3,520,161 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,510 UART: [rt]cmd =0x43455252, len=4
3,560,279 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,836 UART: [kat] SHA2-256
882,767 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,882 UART: [kat] ++
887,034 UART: [kat] sha1
891,192 UART: [kat] SHA2-256
893,130 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,983 UART: [kat] LMS
1,476,179 UART: [kat] --
1,476,920 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,265 UART: [idev] ++
1,480,433 UART: [idev] CDI.KEYID = 6
1,480,793 UART: [idev] SUBJECT.KEYID = 7
1,481,217 UART: [idev] UDS.KEYID = 0
1,481,562 ready_for_fw is high
1,481,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,377 UART: [idev] Erasing UDS.KEYID = 0
1,505,881 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,483 UART: [idev] --
1,515,290 UART: [ldev] ++
1,515,458 UART: [ldev] CDI.KEYID = 6
1,515,821 UART: [ldev] SUBJECT.KEYID = 5
1,516,247 UART: [ldev] AUTHORITY.KEYID = 7
1,516,710 UART: [ldev] FE.KEYID = 1
1,521,966 UART: [ldev] Erasing FE.KEYID = 1
1,547,963 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,709 UART: [ldev] --
1,587,126 UART: [fwproc] Waiting for Commands...
1,587,893 UART: [fwproc] Received command 0x46574c44
1,588,684 UART: [fwproc] Received Image of size 118548 bytes
2,934,084 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,496 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,065 >>> mbox cmd response: success
3,133,065 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,134,243 UART: [afmc] ++
3,134,411 UART: [afmc] CDI.KEYID = 6
3,134,773 UART: [afmc] SUBJECT.KEYID = 7
3,135,198 UART: [afmc] AUTHORITY.KEYID = 5
3,170,273 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,717 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,206 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,089 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,772 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,608 UART: [afmc] --
3,213,508 UART: [cold-reset] --
3,214,230 UART: [state] Locking Datavault
3,215,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,003 UART: [state] Locking ICCM
3,216,603 UART: [exit] Launching FMC @ 0x40000130
3,221,933 UART:
3,221,949 UART: Running Caliptra FMC ...
3,222,357 UART:
3,222,500 UART: [state] CFI Enabled
3,233,016 UART: [fht] FMC Alias Private Key: 7
3,351,652 UART: [art] Extend RT PCRs Done
3,352,080 UART: [art] Lock RT PCRs Done
3,353,516 UART: [art] Populate DV Done
3,361,563 UART: [fht] FMC Alias Private Key: 7
3,362,703 UART: [art] Derive CDI
3,362,983 UART: [art] Store in slot 0x4
3,448,807 UART: [art] Derive Key Pair
3,449,167 UART: [art] Store priv key in slot 0x5
3,462,386 UART: [art] Derive Key Pair - Done
3,477,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,511 UART: [art] PUB.X = EA2BB1B2D24A420FFA7FDBE3003A48F85B6921A9640A2D15974DC598FB9A507079E4ED103F526CE08B2B0A70CD3FB654
3,500,264 UART: [art] PUB.Y = EEB9D5FEECA51671D8AFCE7D41ECB3F7DA46484AF222963B94508B70924F1C02E1BEAC140A0AFB18DEAB0EF716330C00
3,507,201 UART: [art] SIG.R = 4E3AFD0FCBF414CCB30653781BF2F1F82287F82D05CCCA5BE9E803035AC4DF7576B76174D92FDFE0E523804C019BDF33
3,513,969 UART: [art] SIG.S = 408C4C7675361AA6C90871ECE11FACFDCB3FCE8D671D11EF3D5B4630134EAA506620EE7B61938B30A1F8AC5767136FCA
3,538,226 UART: Caliptra RT
3,538,569 UART: [state] CFI Enabled
3,659,256 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,628 UART: [rt]cmd =0x464d4352, len=4
3,699,337 >>> mbox cmd response data (780 bytes)
3,699,338 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,845 UART: [rt]cmd =0x43455252, len=4
3,739,612 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,510 ready_for_fw is high
1,362,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,325 >>> mbox cmd response: success
2,982,325 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
3,044,214 UART:
3,044,230 UART: Running Caliptra FMC ...
3,044,638 UART:
3,044,781 UART: [state] CFI Enabled
3,055,185 UART: [fht] FMC Alias Private Key: 7
3,174,455 UART: [art] Extend RT PCRs Done
3,174,883 UART: [art] Lock RT PCRs Done
3,176,221 UART: [art] Populate DV Done
3,184,402 UART: [fht] FMC Alias Private Key: 7
3,185,470 UART: [art] Derive CDI
3,185,750 UART: [art] Store in slot 0x4
3,271,534 UART: [art] Derive Key Pair
3,271,894 UART: [art] Store priv key in slot 0x5
3,284,927 UART: [art] Derive Key Pair - Done
3,299,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,566 UART: [art] PUB.X = 2739BBA702B40D65239C8E545F526D9061F4C5264889B96AD66A037355166DFCACA6840DC65E9B2888457FCF6E08C2A1
3,322,321 UART: [art] PUB.Y = A12F92E641E4B1A1DC9FB0A6566DAF897E017205C7982EE6219B77E10E68FCCE3BD58D86FA196D64F7E830750BD65566
3,329,267 UART: [art] SIG.R = 039581DADBAFDC4AD47862D45ECB44165CA300A5AEDEBE2C11F001379B43FA97F51A638B175709B4698F7AC38A621D50
3,336,018 UART: [art] SIG.S = F20552A9BBA85A62F25FBE660FC0EBF81CD1A8E703E50526D9EDC6E2936BDAB920A4E0168E22CBAF833F517B80C197C9
3,359,906 UART: Caliptra RT
3,360,249 UART: [state] CFI Enabled
3,481,105 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,597 UART: [rt]cmd =0x464d4352, len=4
3,521,436 >>> mbox cmd response data (780 bytes)
3,521,437 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,654 UART: [rt]cmd =0x43455252, len=4
3,561,471 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,056 UART: [state] LifecycleState = Unprovisioned
85,711 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,376 UART: [kat] SHA2-256
890,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,030 UART: [kat] ++
895,182 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,713 UART: [kat] HMAC-384Kdf
920,405 UART: [kat] LMS
1,168,717 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,170,010 UART: [fht] FHT @ 0x50003400
1,172,820 UART: [idev] ++
1,172,988 UART: [idev] CDI.KEYID = 6
1,173,349 UART: [idev] SUBJECT.KEYID = 7
1,173,774 UART: [idev] UDS.KEYID = 0
1,174,120 ready_for_fw is high
1,174,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,829 UART: [idev] Erasing UDS.KEYID = 0
1,198,871 UART: [idev] Sha1 KeyId Algorithm
1,207,665 UART: [idev] --
1,208,704 UART: [ldev] ++
1,208,872 UART: [ldev] CDI.KEYID = 6
1,209,236 UART: [ldev] SUBJECT.KEYID = 5
1,209,663 UART: [ldev] AUTHORITY.KEYID = 7
1,210,126 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,096 UART: [ldev] --
1,280,517 UART: [fwproc] Wait for Commands...
1,281,096 UART: [fwproc] Recv command 0x46574c44
1,281,829 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,143 >>> mbox cmd response: success
2,824,143 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,825,277 UART: [afmc] ++
2,825,445 UART: [afmc] CDI.KEYID = 6
2,825,808 UART: [afmc] SUBJECT.KEYID = 7
2,826,234 UART: [afmc] AUTHORITY.KEYID = 5
2,860,915 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,294 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,214 UART: [afmc] --
2,904,065 UART: [cold-reset] --
2,904,785 UART: [state] Locking Datavault
2,905,906 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,510 UART: [state] Locking ICCM
2,906,934 UART: [exit] Launching FMC @ 0x40000130
2,912,264 UART:
2,912,280 UART: Running Caliptra FMC ...
2,912,688 UART:
2,912,742 UART: [state] CFI Enabled
2,923,196 UART: [fht] FMC Alias Private Key: 7
3,042,570 UART: [art] Extend RT PCRs Done
3,042,998 UART: [art] Lock RT PCRs Done
3,044,500 UART: [art] Populate DV Done
3,052,641 UART: [fht] FMC Alias Private Key: 7
3,053,619 UART: [art] Derive CDI
3,053,899 UART: [art] Store in slot 0x4
3,139,532 UART: [art] Derive Key Pair
3,139,892 UART: [art] Store priv key in slot 0x5
3,153,862 UART: [art] Derive Key Pair - Done
3,168,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,110 UART: [art] PUB.X = EF6FF741E5E7D36A468F5BEDD20FAA4B4E2C1D436944C3C2A56BF117F6714805B15A81440844B9AA003396B06C334FCD
3,191,859 UART: [art] PUB.Y = 1DD80A0E719F98DAF87B80442DF54EE662190EAE7845171C7F88A47C85194082F444DF5337B607EE29B2C555581C58E2
3,198,795 UART: [art] SIG.R = E44C01233F4F42DF85A983480BD0E6F99B6CB0B6CC7444E64483D0DDDA7E0DF4A1AC849FF38D2823B84F7CA3727B25C7
3,205,570 UART: [art] SIG.S = 3ECD46C6A9B0D6BDCB5F9A2BF3B0F168FFEF2076556BD020EF16BDF3CF2BF844094B8F6644F86CBF24C5927596B1884B
3,229,141 UART: Caliptra RT
3,229,392 UART: [state] CFI Enabled
3,349,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,855 UART: [rt]cmd =0x464d4352, len=4
3,389,740 >>> mbox cmd response data (780 bytes)
3,389,741 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,086 UART: [rt]cmd =0x43455252, len=4
3,430,037 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,560 ready_for_fw is high
1,058,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,682 >>> mbox cmd response: success
2,678,682 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,740,895 UART:
2,740,911 UART: Running Caliptra FMC ...
2,741,319 UART:
2,741,373 UART: [state] CFI Enabled
2,751,925 UART: [fht] FMC Alias Private Key: 7
2,870,375 UART: [art] Extend RT PCRs Done
2,870,803 UART: [art] Lock RT PCRs Done
2,872,599 UART: [art] Populate DV Done
2,880,884 UART: [fht] FMC Alias Private Key: 7
2,881,878 UART: [art] Derive CDI
2,882,158 UART: [art] Store in slot 0x4
2,968,061 UART: [art] Derive Key Pair
2,968,421 UART: [art] Store priv key in slot 0x5
2,981,981 UART: [art] Derive Key Pair - Done
2,996,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,935 UART: [art] PUB.X = 9D745BD00452BDCADF7FCCB8D4877D25F239F8B9E77D97CA8AC8EE3D048871E251252AD05116472CB56C5B14B81A746E
3,019,711 UART: [art] PUB.Y = 75AE15F8D771BCF27783FEC0FA7BADC642016B9466936C76FE4C8E885B55355BB97302FB9BDF1ED1517F0F8379EBF54F
3,026,666 UART: [art] SIG.R = 6B3C854E5151CDAF0EE9435EC162BC61FFAE814DBCA4A36719C3DB7F2DBBB439F5012BC1C34E8E6B6C62E0A8949020D5
3,033,450 UART: [art] SIG.S = 09B5C58147B71C6A4F5658C38363A1AD230723D268EFCA306BDF6CA7BAADEC228E64B13B1E234F1BA4396D9992E7D8FA
3,057,060 UART: Caliptra RT
3,057,311 UART: [state] CFI Enabled
3,177,993 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,353 UART: [rt]cmd =0x464d4352, len=4
3,218,266 >>> mbox cmd response data (780 bytes)
3,218,267 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,668 UART: [rt]cmd =0x43455252, len=4
3,258,381 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,229 UART: [kat] SHA2-256
902,169 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,462 UART: [kat] HMAC-384Kdf
921,216 UART: [kat] LMS
1,169,528 UART: [kat] --
1,170,599 UART: [cold-reset] ++
1,170,985 UART: [fht] FHT @ 0x50003400
1,173,833 UART: [idev] ++
1,174,001 UART: [idev] CDI.KEYID = 6
1,174,362 UART: [idev] SUBJECT.KEYID = 7
1,174,787 UART: [idev] UDS.KEYID = 0
1,175,133 ready_for_fw is high
1,175,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,816 UART: [idev] Sha1 KeyId Algorithm
1,208,644 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,271 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,297 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,699 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,411 UART: [ldev] --
1,282,692 UART: [fwproc] Wait for Commands...
1,283,373 UART: [fwproc] Recv command 0x46574c44
1,284,106 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,913 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,120 >>> mbox cmd response: success
2,827,120 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,828,376 UART: [afmc] ++
2,828,544 UART: [afmc] CDI.KEYID = 6
2,828,907 UART: [afmc] SUBJECT.KEYID = 7
2,829,333 UART: [afmc] AUTHORITY.KEYID = 5
2,865,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,815 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,516 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,395 UART: [afmc] --
2,908,436 UART: [cold-reset] --
2,909,318 UART: [state] Locking Datavault
2,910,303 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,907 UART: [state] Locking ICCM
2,911,469 UART: [exit] Launching FMC @ 0x40000130
2,916,799 UART:
2,916,815 UART: Running Caliptra FMC ...
2,917,223 UART:
2,917,366 UART: [state] CFI Enabled
2,928,104 UART: [fht] FMC Alias Private Key: 7
3,046,506 UART: [art] Extend RT PCRs Done
3,046,934 UART: [art] Lock RT PCRs Done
3,048,644 UART: [art] Populate DV Done
3,056,891 UART: [fht] FMC Alias Private Key: 7
3,057,885 UART: [art] Derive CDI
3,058,165 UART: [art] Store in slot 0x4
3,143,628 UART: [art] Derive Key Pair
3,143,988 UART: [art] Store priv key in slot 0x5
3,157,416 UART: [art] Derive Key Pair - Done
3,172,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,494 UART: [art] PUB.X = 46A6AC905E04CAD8EF690F3B5217B26AD1CCA05ABE4315E3916DB286F2E2BC51D1DE492374B7CA56AABF763C64C9B850
3,195,276 UART: [art] PUB.Y = 864FA590B56374B851457EAA02F05ACDA460DF975ADE7DF1E6F418218FA342F2A4692C267AAD59778BB804151E6A8522
3,202,224 UART: [art] SIG.R = 2BCFC72E3600A8D77E2F29D2E0E7D6707F065625E5E81B0A5369D86D546512E2DFC91695267FB07DCC012EC239F34C88
3,208,967 UART: [art] SIG.S = 7CFFF14A4B0D8BF917CC4B9FFAC257142E2DBA9543A6191C22FA6CF13D106B2F18D0092D81109C0CB5C4CC375BAEAB8B
3,232,744 UART: Caliptra RT
3,233,087 UART: [state] CFI Enabled
3,352,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,459 UART: [rt]cmd =0x464d4352, len=4
3,392,232 >>> mbox cmd response data (780 bytes)
3,392,233 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,520 UART: [rt]cmd =0x43455252, len=4
3,432,321 >>> mbox cmd response data (782 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,739 ready_for_fw is high
1,059,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,863 >>> mbox cmd response: success
2,678,863 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,740,500 UART:
2,740,516 UART: Running Caliptra FMC ...
2,740,924 UART:
2,741,067 UART: [state] CFI Enabled
2,751,991 UART: [fht] FMC Alias Private Key: 7
2,870,757 UART: [art] Extend RT PCRs Done
2,871,185 UART: [art] Lock RT PCRs Done
2,872,407 UART: [art] Populate DV Done
2,880,612 UART: [fht] FMC Alias Private Key: 7
2,881,680 UART: [art] Derive CDI
2,881,960 UART: [art] Store in slot 0x4
2,968,161 UART: [art] Derive Key Pair
2,968,521 UART: [art] Store priv key in slot 0x5
2,981,507 UART: [art] Derive Key Pair - Done
2,996,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,788 UART: [art] PUB.X = 4B0E9D3F592E00EAAE174FF5809B561D2346D95D3AED4D1803A8F65B361A1476FB3A2022C87C29DB6B457D1F285B271B
3,018,538 UART: [art] PUB.Y = FE45B7124CB873346988E80B7D7150DBE1C87C3923518EE79FC84BA9C274336C2009B6704A5D7A9192191DA367F74740
3,025,476 UART: [art] SIG.R = F220F9E40388F7709610D9F5F63A0015329D52854685C48FCE6C10F6F0283C38811375C504238115069F3556095C6419
3,032,190 UART: [art] SIG.S = C4850EE096B184BFFA9A644EEA9750B11BF3A5C63AD2A32214E7B8071F8DDB87368779970F31C18FB0435F0E2231873A
3,055,888 UART: Caliptra RT
3,056,231 UART: [state] CFI Enabled
3,175,807 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,455 UART: [rt]cmd =0x464d4352, len=4
3,216,200 >>> mbox cmd response data (780 bytes)
3,216,201 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,245,560 UART: [rt]cmd =0x43455252, len=4
3,256,306 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,718 UART: [kat] SHA2-256
893,368 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,493 UART: [kat] ++
897,645 UART: [kat] sha1
901,661 UART: [kat] SHA2-256
903,601 UART: [kat] SHA2-384
906,398 UART: [kat] SHA2-512-ACC
908,299 UART: [kat] ECC-384
917,690 UART: [kat] HMAC-384Kdf
922,234 UART: [kat] LMS
1,170,562 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,171,935 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 ready_for_fw is high
1,175,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,420 UART: [idev] Erasing UDS.KEYID = 0
1,200,587 UART: [idev] Sha1 KeyId Algorithm
1,209,057 UART: [idev] --
1,210,041 UART: [ldev] ++
1,210,209 UART: [ldev] CDI.KEYID = 6
1,210,572 UART: [ldev] SUBJECT.KEYID = 5
1,210,998 UART: [ldev] AUTHORITY.KEYID = 7
1,211,461 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,809 UART: [ldev] --
1,282,220 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,672 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,191 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,941 >>> mbox cmd response: success
2,826,941 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,828,079 UART: [afmc] ++
2,828,247 UART: [afmc] CDI.KEYID = 6
2,828,609 UART: [afmc] SUBJECT.KEYID = 7
2,829,034 UART: [afmc] AUTHORITY.KEYID = 5
2,864,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,686 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,026 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,727 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,385 UART: [afmc] --
2,907,289 UART: [cold-reset] --
2,908,107 UART: [state] Locking Datavault
2,909,046 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,650 UART: [state] Locking ICCM
2,910,142 UART: [exit] Launching FMC @ 0x40000130
2,915,472 UART:
2,915,488 UART: Running Caliptra FMC ...
2,915,896 UART:
2,915,950 UART: [state] CFI Enabled
2,926,112 UART: [fht] FMC Alias Private Key: 7
3,045,304 UART: [art] Extend RT PCRs Done
3,045,732 UART: [art] Lock RT PCRs Done
3,047,142 UART: [art] Populate DV Done
3,055,175 UART: [fht] FMC Alias Private Key: 7
3,056,339 UART: [art] Derive CDI
3,056,619 UART: [art] Store in slot 0x4
3,142,292 UART: [art] Derive Key Pair
3,142,652 UART: [art] Store priv key in slot 0x5
3,155,988 UART: [art] Derive Key Pair - Done
3,170,791 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,357 UART: [art] PUB.X = A152196933ED0FE1D30C499D6224F662958F56AC68BFC0979FBDE1902F88A9944CF9C7F544AA02939AF3F7D947C60EB2
3,194,121 UART: [art] PUB.Y = 2A04981AF3E407C78686928111801C3369AD46FAB248576B51A9C70A31F12B97440B82167C4CA000EE031ECE1CF955C7
3,201,030 UART: [art] SIG.R = 8D92B5D200D984C1400C59C17F0763E73A023BF51991C4E0F7225591C67D300D0201FE529EB9C7F414535D7B7B289C13
3,207,754 UART: [art] SIG.S = FE50A2A1967D7CA1D6415EA1341EF278359F2C54DF64523C2306C3B1CA766C1B2C914942B93A7932FA498D0189F430DE
3,231,812 UART: Caliptra RT
3,232,063 UART: [state] CFI Enabled
3,351,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,301 UART: [rt]cmd =0x464d4352, len=4
3,392,196 >>> mbox cmd response data (780 bytes)
3,392,197 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,618 UART: [rt]cmd =0x43455252, len=4
3,432,416 >>> mbox cmd response data (784 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,035 ready_for_fw is high
1,060,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,332 >>> mbox cmd response: success
2,679,332 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,741,585 UART:
2,741,601 UART: Running Caliptra FMC ...
2,742,009 UART:
2,742,063 UART: [state] CFI Enabled
2,752,137 UART: [fht] FMC Alias Private Key: 7
2,871,097 UART: [art] Extend RT PCRs Done
2,871,525 UART: [art] Lock RT PCRs Done
2,873,143 UART: [art] Populate DV Done
2,881,414 UART: [fht] FMC Alias Private Key: 7
2,882,580 UART: [art] Derive CDI
2,882,860 UART: [art] Store in slot 0x4
2,968,621 UART: [art] Derive Key Pair
2,968,981 UART: [art] Store priv key in slot 0x5
2,982,173 UART: [art] Derive Key Pair - Done
2,997,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,802 UART: [art] PUB.X = 40C0738B8E8DD4770F0AFD2FEE3C5A323C91F7672DD56EF4D57D1F890D80FAB089ED12DA290299DEB57272740348EEF9
3,020,569 UART: [art] PUB.Y = B19FE64E10137B8A3B75270B0EE45E0A7A32DE75AB191CE2701AA7E315CECD443447D69B362AF1CDD609C1B8A321116C
3,027,519 UART: [art] SIG.R = A39AEC5127D20462FED765E9130B38DD38D528D7D77F622C109985776E930BDB66F008FF72C07F199AD3CE5F63095123
3,034,274 UART: [art] SIG.S = 537BD04896A748820ACBC26024E5DD8CFF9EBA1E7852FBA814EAFAF4E67AB89DA055DD5A68A1AF760A008DCC5CC4B945
3,058,038 UART: Caliptra RT
3,058,289 UART: [state] CFI Enabled
3,177,694 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,084 UART: [rt]cmd =0x464d4352, len=4
3,217,755 >>> mbox cmd response data (780 bytes)
3,217,756 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,247,375 UART: [rt]cmd =0x43455252, len=4
3,258,184 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,361 UART: [state] LifecycleState = Unprovisioned
86,016 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
902,024 UART: [kat] SHA2-256
903,964 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,138 UART: [cold-reset] ++
1,172,536 UART: [fht] FHT @ 0x50003400
1,175,257 UART: [idev] ++
1,175,425 UART: [idev] CDI.KEYID = 6
1,175,785 UART: [idev] SUBJECT.KEYID = 7
1,176,209 UART: [idev] UDS.KEYID = 0
1,176,554 ready_for_fw is high
1,176,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,239 UART: [idev] Erasing UDS.KEYID = 0
1,201,302 UART: [idev] Sha1 KeyId Algorithm
1,209,770 UART: [idev] --
1,210,848 UART: [ldev] ++
1,211,016 UART: [ldev] CDI.KEYID = 6
1,211,379 UART: [ldev] SUBJECT.KEYID = 5
1,211,805 UART: [ldev] AUTHORITY.KEYID = 7
1,212,268 UART: [ldev] FE.KEYID = 1
1,217,518 UART: [ldev] Erasing FE.KEYID = 1
1,244,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,910 UART: [ldev] --
1,283,353 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,424 >>> mbox cmd response: success
2,827,424 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,828,478 UART: [afmc] ++
2,828,646 UART: [afmc] CDI.KEYID = 6
2,829,008 UART: [afmc] SUBJECT.KEYID = 7
2,829,433 UART: [afmc] AUTHORITY.KEYID = 5
2,864,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,857 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,150 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,966 UART: [afmc] --
2,907,930 UART: [cold-reset] --
2,908,682 UART: [state] Locking Datavault
2,909,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,307 UART: [state] Locking ICCM
2,910,895 UART: [exit] Launching FMC @ 0x40000130
2,916,225 UART:
2,916,241 UART: Running Caliptra FMC ...
2,916,649 UART:
2,916,792 UART: [state] CFI Enabled
2,927,336 UART: [fht] FMC Alias Private Key: 7
3,046,314 UART: [art] Extend RT PCRs Done
3,046,742 UART: [art] Lock RT PCRs Done
3,048,204 UART: [art] Populate DV Done
3,056,523 UART: [fht] FMC Alias Private Key: 7
3,057,473 UART: [art] Derive CDI
3,057,753 UART: [art] Store in slot 0x4
3,143,458 UART: [art] Derive Key Pair
3,143,818 UART: [art] Store priv key in slot 0x5
3,157,022 UART: [art] Derive Key Pair - Done
3,171,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,626 UART: [art] PUB.X = 6F8C85F1BFD84E571087035FA38CB46F806E9011E0CAD551DFB221530D5C366658C051D42ABCD00542C5E46084A7DCB3
3,194,393 UART: [art] PUB.Y = 23C6F6FC16197B520D6E6A67C16A18165AC2CA52CB446DC8CDD158648265AFF328E2E6B56A3FC1A8BA68877447EF26B2
3,201,350 UART: [art] SIG.R = DC138D8D8EFB6595F859CC5CAC13E930546DAFDBBACA3EA6D3DCB40EE469868F1372A94796632F8CBE73024104241222
3,208,123 UART: [art] SIG.S = 0E457273D65951BF51FB8E70318147CC93C76432FEFB92B3A055ED46E20F2609759BDA06442D191795ED814931BD7F86
3,231,955 UART: Caliptra RT
3,232,298 UART: [state] CFI Enabled
3,352,871 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,297 UART: [rt]cmd =0x464d4352, len=4
3,393,208 >>> mbox cmd response data (780 bytes)
3,393,209 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,422,532 UART: [rt]cmd =0x43455252, len=4
3,433,521 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,990 ready_for_fw is high
1,060,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,551 >>> mbox cmd response: success
2,679,551 <<< Executing mbox cmd 0x464d4352 (4 bytes) from SoC
2,742,620 UART:
2,742,636 UART: Running Caliptra FMC ...
2,743,044 UART:
2,743,187 UART: [state] CFI Enabled
2,753,635 UART: [fht] FMC Alias Private Key: 7
2,873,123 UART: [art] Extend RT PCRs Done
2,873,551 UART: [art] Lock RT PCRs Done
2,875,111 UART: [art] Populate DV Done
2,883,134 UART: [fht] FMC Alias Private Key: 7
2,884,066 UART: [art] Derive CDI
2,884,346 UART: [art] Store in slot 0x4
2,970,459 UART: [art] Derive Key Pair
2,970,819 UART: [art] Store priv key in slot 0x5
2,984,003 UART: [art] Derive Key Pair - Done
2,998,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,557 UART: [art] PUB.X = F9FAB7CC1B9197DD01716E554B4C0E7F4A4D7255DD7C9D7A1989A1AB7DE18AFE5EB1A3369D732978C4EA68E8CE3E2A7F
3,022,343 UART: [art] PUB.Y = 65ED4C3444656FBB6D63AFCF04ABAE5E240A212CEB119DE19AFE2D28289DF528D449ADC235037C3FCC302FB08175135D
3,029,300 UART: [art] SIG.R = C285711FBA8C35AAC8564B70B4882096710C038AC093FEF8C5BA0644F7D4E6AF2CB8268BC409322738CF34BC23A64E62
3,036,064 UART: [art] SIG.S = 1A7488E18894F1A676A5A097C5017631DC2E473A924BE4B8A7ADF35F606768F2A1F6430F42E3B8D3FC9BE0193A24E8BB
3,060,328 UART: Caliptra RT
3,060,671 UART: [state] CFI Enabled
3,180,858 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,038 UART: [rt]cmd =0x464d4352, len=4
3,220,739 >>> mbox cmd response data (780 bytes)
3,220,740 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,250,107 UART: [rt]cmd =0x43455252, len=4
3,260,902 >>> mbox cmd response data (783 bytes)
test test_get_fmc_alias_csr::test_get_fmc_alias_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
192,199 UART:
192,551 UART: Running Caliptra ROM ...
193,734 UART:
193,884 UART: [state] CFI Enabled
262,760 UART: [state] LifecycleState = Unprovisioned
264,749 UART: [state] DebugLocked = No
266,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,788 UART: [kat] SHA2-256
441,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,029 UART: [kat] ++
452,485 UART: [kat] sha1
462,767 UART: [kat] SHA2-256
465,464 UART: [kat] SHA2-384
471,247 UART: [kat] SHA2-512-ACC
473,633 UART: [kat] ECC-384
2,769,046 UART: [kat] HMAC-384Kdf
2,800,135 UART: [kat] LMS
3,990,402 UART: [kat] --
3,996,028 UART: [cold-reset] ++
3,998,255 UART: [fht] Storing FHT @ 0x50003400
4,008,742 UART: [idev] ++
4,009,312 UART: [idev] CDI.KEYID = 6
4,010,231 UART: [idev] SUBJECT.KEYID = 7
4,011,480 UART: [idev] UDS.KEYID = 0
4,036,133 UART: [idev] Erasing UDS.KEYID = 0
7,347,302 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,559 UART: [idev] CSR upload requested
7,373,702 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,680,418 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,695,033 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,709,672 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,724,003 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
9,746,918 UART: [idev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
9,870,886 UART: [idev] CSR uploaded
9,884,125 ready_for_fw is high
9,884,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,033,766 UART: [idev] --
10,034,453 UART: [ldev] ++
10,034,952 UART: [ldev] CDI.KEYID = 6
10,035,828 UART: [ldev] SUBJECT.KEYID = 5
10,036,936 UART: [ldev] AUTHORITY.KEYID = 7
10,038,115 UART: [ldev] FE.KEYID = 1
10,038,986 UART: [ldev] Erasing FE.KEYID = 1
13,255,108 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,545,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,560,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,575,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,589,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,608,374 UART: [ldev] --
15,612,939 UART: [fwproc] Waiting for Commands...
15,615,411 UART: [fwproc] Received command 0x46574c44
15,617,647 UART: [fwproc] Received Image of size 118548 bytes
19,717,732 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,798,976 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,872,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,201,384 >>> mbox cmd response: success
20,202,427 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,205,426 UART: [afmc] ++
20,206,003 UART: [afmc] CDI.KEYID = 6
20,206,975 UART: [afmc] SUBJECT.KEYID = 7
20,208,188 UART: [afmc] AUTHORITY.KEYID = 5
23,567,706 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,866,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,868,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,883,175 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,897,930 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,912,337 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,933,963 UART: [afmc] --
25,938,579 UART: [cold-reset] --
25,942,171 UART: [state] Locking Datavault
25,947,092 UART: [state] Locking PCR0, PCR1 and PCR31
25,948,855 UART: [state] Locking ICCM
25,951,275 UART: [exit] Launching FMC @ 0x40000130
25,959,674 UART:
25,959,907 UART: Running Caliptra FMC ...
25,961,010 UART:
25,961,178 UART: [state] CFI Enabled
26,026,423 UART: [fht] FMC Alias Private Key: 7
28,367,113 UART: [art] Extend RT PCRs Done
28,368,334 UART: [art] Lock RT PCRs Done
28,369,689 UART: [art] Populate DV Done
28,374,996 UART: [fht] FMC Alias Private Key: 7
28,376,464 UART: [art] Derive CDI
28,377,232 UART: [art] Store in slot 0x4
28,434,778 UART: [art] Derive Key Pair
28,435,781 UART: [art] Store priv key in slot 0x5
31,728,505 UART: [art] Derive Key Pair - Done
31,741,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,029,741 UART: [art] Erasing AUTHORITY.KEYID = 7
34,031,290 UART: [art] PUB.X = 3826F012FC4E82832B570841C9AAB4BF5FC5BC530627E28039BB910A8E729E9D87F12A186F7D3D19AEB24870038524FF
34,038,537 UART: [art] PUB.Y = 76EDF7A2BD3064BE22D7C3FCB94D41920F9A9DBEA80EE1D944E93125E27E28A76A34BEF8191F298F8737531A263B9806
34,045,768 UART: [art] SIG.R = DBBB2745DAC39B3D4919ED31BBEDE7B0185EC8438CFFB8ED469BED83BB2E45D994723F5B3AEC3D0986A56FD2B94E7A74
34,053,212 UART: [art] SIG.S = 44A37040A49B7E9316E1D0AF01E50B84A3C9F164AF4EA3D4094A0EC378F9FE1482E11E62A5496F92DF203F70A1824967
35,358,364 UART: Caliptra RT
35,359,085 UART: [state] CFI Enabled
35,535,093 UART: [rt] RT listening for mailbox commands...
35,566,565 UART: [rt]cmd =0x49444352, len=4
35,568,448 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
9,499,895 ready_for_fw is high
9,500,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,288,475 >>> mbox cmd response: success
20,289,646 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,976,749 UART:
25,977,199 UART: Running Caliptra FMC ...
25,978,336 UART:
25,978,495 UART: [state] CFI Enabled
26,046,855 UART: [fht] FMC Alias Private Key: 7
28,387,187 UART: [art] Extend RT PCRs Done
28,388,414 UART: [art] Lock RT PCRs Done
28,389,935 UART: [art] Populate DV Done
28,395,418 UART: [fht] FMC Alias Private Key: 7
28,396,963 UART: [art] Derive CDI
28,397,782 UART: [art] Store in slot 0x4
28,455,559 UART: [art] Derive Key Pair
28,456,601 UART: [art] Store priv key in slot 0x5
31,749,198 UART: [art] Derive Key Pair - Done
31,762,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,051,664 UART: [art] Erasing AUTHORITY.KEYID = 7
34,053,172 UART: [art] PUB.X = CD683892052FDD0A2894D30E700388BB778776C4A215FC67262C1743A5B3D26330800B86CA1F45FFA70673C88C62A282
34,060,445 UART: [art] PUB.Y = CBF45D0BFA80E3D156E28D04156218073913077DDB09DE8EABE77CF9CB7A4B4F9FFAC4D89F4FFEE386476F83EC885775
34,067,719 UART: [art] SIG.R = 9245BF7FCBA4E56C5EE82A3B1DF4DBA1CB2B3E592FA43039135449FBFB0BC404864806959B1ABBE901BEB8FA0AA39A32
34,075,128 UART: [art] SIG.S = 9EDB404A0CE83877A47BCA4804256D301B53324E10600D433C8A63CB74DD249FA67C5774CCA6A4CF5A09A4867C459C2D
35,380,827 UART: Caliptra RT
35,381,534 UART: [state] CFI Enabled
35,558,341 UART: [rt] RT listening for mailbox commands...
35,589,997 UART: [rt]cmd =0x49444352, len=4
35,591,811 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,498 UART:
192,871 UART: Running Caliptra ROM ...
193,987 UART:
603,902 UART: [state] CFI Enabled
618,000 UART: [state] LifecycleState = Unprovisioned
619,956 UART: [state] DebugLocked = No
622,829 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,970 UART: [kat] SHA2-256
797,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,262 UART: [kat] ++
808,752 UART: [kat] sha1
819,079 UART: [kat] SHA2-256
821,776 UART: [kat] SHA2-384
828,135 UART: [kat] SHA2-512-ACC
830,501 UART: [kat] ECC-384
3,113,855 UART: [kat] HMAC-384Kdf
3,125,940 UART: [kat] LMS
4,316,065 UART: [kat] --
4,321,268 UART: [cold-reset] ++
4,323,616 UART: [fht] Storing FHT @ 0x50003400
4,335,604 UART: [idev] ++
4,336,202 UART: [idev] CDI.KEYID = 6
4,337,109 UART: [idev] SUBJECT.KEYID = 7
4,338,350 UART: [idev] UDS.KEYID = 0
4,355,131 UART: [idev] Erasing UDS.KEYID = 0
7,627,320 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,505 UART: [idev] CSR upload requested
7,654,653 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,945,744 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
9,960,366 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
9,974,994 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
9,989,318 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
10,012,256 UART: [idev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
10,136,223 UART: [idev] CSR uploaded
10,149,457 ready_for_fw is high
10,149,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,298,692 UART: [idev] --
10,299,360 UART: [ldev] ++
10,299,852 UART: [ldev] CDI.KEYID = 6
10,300,724 UART: [ldev] SUBJECT.KEYID = 5
10,301,819 UART: [ldev] AUTHORITY.KEYID = 7
10,302,986 UART: [ldev] FE.KEYID = 1
10,303,869 UART: [ldev] Erasing FE.KEYID = 1
13,459,971 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,753,168 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,767,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,782,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,797,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,814,926 UART: [ldev] --
15,818,993 UART: [fwproc] Waiting for Commands...
15,820,701 UART: [fwproc] Received command 0x46574c44
15,822,878 UART: [fwproc] Received Image of size 118548 bytes
19,933,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,007,523 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,080,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,408,676 >>> mbox cmd response: success
20,409,718 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,413,801 UART: [afmc] ++
20,414,398 UART: [afmc] CDI.KEYID = 6
20,415,305 UART: [afmc] SUBJECT.KEYID = 7
20,416,637 UART: [afmc] AUTHORITY.KEYID = 5
23,730,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
26,025,482 UART: [afmc] Erasing AUTHORITY.KEYID = 5
26,027,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
26,042,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
26,056,978 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
26,071,281 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
26,094,095 UART: [afmc] --
26,097,691 UART: [cold-reset] --
26,100,935 UART: [state] Locking Datavault
26,107,263 UART: [state] Locking PCR0, PCR1 and PCR31
26,108,956 UART: [state] Locking ICCM
26,110,342 UART: [exit] Launching FMC @ 0x40000130
26,118,730 UART:
26,118,977 UART: Running Caliptra FMC ...
26,120,074 UART:
26,120,228 UART: [state] CFI Enabled
26,128,053 UART: [fht] FMC Alias Private Key: 7
28,468,699 UART: [art] Extend RT PCRs Done
28,469,930 UART: [art] Lock RT PCRs Done
28,471,550 UART: [art] Populate DV Done
28,477,282 UART: [fht] FMC Alias Private Key: 7
28,478,812 UART: [art] Derive CDI
28,479,569 UART: [art] Store in slot 0x4
28,522,373 UART: [art] Derive Key Pair
28,523,412 UART: [art] Store priv key in slot 0x5
31,765,026 UART: [art] Derive Key Pair - Done
31,778,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,058,396 UART: [art] Erasing AUTHORITY.KEYID = 7
34,059,936 UART: [art] PUB.X = FED3B3E433B215BD74153F7678E9A11A3FCE4238292FDAF68482DC90F1CD49FC4F75BD0417BAC1D26814EC3290AD2E2A
34,067,142 UART: [art] PUB.Y = F22554C9AF43D01CB2C4C911CE6D21FE791B4A3F6824A5DF20261C8086CEFE321F574957EDE40A05F46C98071CFA4CF0
34,074,422 UART: [art] SIG.R = 9BB713BA4B64120B14EA7EBCA97E082E8C8C9E744A57EF653F2CED96DCADA9EF7866F72105CA828978AFFB99EDFEF206
34,081,856 UART: [art] SIG.S = AC8D93D09A71831D85872263D8E5678214EAC024431FDFF07A39DCA1B549F5FFCEC51DBE3A474E714ED79B6B57551F88
35,387,227 UART: Caliptra RT
35,387,916 UART: [state] CFI Enabled
35,522,466 UART: [rt] RT listening for mailbox commands...
35,553,921 UART: [rt]cmd =0x49444352, len=4
35,555,563 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
9,741,138 ready_for_fw is high
9,741,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,464,691 >>> mbox cmd response: success
20,465,898 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,102,365 UART:
26,102,755 UART: Running Caliptra FMC ...
26,103,909 UART:
26,104,068 UART: [state] CFI Enabled
26,112,027 UART: [fht] FMC Alias Private Key: 7
28,452,217 UART: [art] Extend RT PCRs Done
28,453,441 UART: [art] Lock RT PCRs Done
28,455,251 UART: [art] Populate DV Done
28,460,623 UART: [fht] FMC Alias Private Key: 7
28,462,268 UART: [art] Derive CDI
28,463,079 UART: [art] Store in slot 0x4
28,505,780 UART: [art] Derive Key Pair
28,506,776 UART: [art] Store priv key in slot 0x5
31,748,916 UART: [art] Derive Key Pair - Done
31,761,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,041,763 UART: [art] Erasing AUTHORITY.KEYID = 7
34,043,277 UART: [art] PUB.X = A8EE98B9EA6C367A07CEAD07B6812900D1417AB4D2C4AE8DC9D9076FC3C34B63A5CAEF9A7D8589BFF87B52EF1727AE41
34,050,582 UART: [art] PUB.Y = FDC03F6261F4C91496523C4F2FCC823DCD12AB60C3E123416032EEEA3B7088E81A0633EB8DAFB31F048F45F56C3AEE67
34,057,825 UART: [art] SIG.R = AA772EA09E814DFB5BC17F03B28C68E947544B41F99F477EAE3CB8B3E63B9EE1236EBA4101EABF6D979147753BEBC629
34,065,272 UART: [art] SIG.S = 7391A4BDE0F27052C95D09C5CEA6DC5DA13F8FDA5C9FEB12F1F0A6606D87A28416569C2D19EB8D36E416BF479C9FBC18
35,370,229 UART: Caliptra RT
35,370,942 UART: [state] CFI Enabled
35,504,396 UART: [rt] RT listening for mailbox commands...
35,535,456 UART: [rt]cmd =0x49444352, len=4
35,537,128 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,211 UART:
192,595 UART: Running Caliptra ROM ...
193,778 UART:
193,928 UART: [state] CFI Enabled
259,347 UART: [state] LifecycleState = Unprovisioned
261,339 UART: [state] DebugLocked = No
262,599 UART: [state] WD Timer not started. Device not locked for debugging
265,853 UART: [kat] SHA2-256
445,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,266 UART: [kat] ++
456,862 UART: [kat] sha1
467,809 UART: [kat] SHA2-256
470,530 UART: [kat] SHA2-384
475,805 UART: [kat] SHA2-512-ACC
478,166 UART: [kat] ECC-384
2,939,580 UART: [kat] HMAC-384Kdf
2,963,271 UART: [kat] LMS
3,439,749 UART: [kat] --
3,444,696 UART: [cold-reset] ++
3,445,844 UART: [fht] FHT @ 0x50003400
3,456,414 UART: [idev] ++
3,457,016 UART: [idev] CDI.KEYID = 6
3,457,936 UART: [idev] SUBJECT.KEYID = 7
3,459,183 UART: [idev] UDS.KEYID = 0
3,493,659 UART: [idev] Erasing UDS.KEYID = 0
5,978,772 UART: [idev] Sha1 KeyId Algorithm
6,002,596 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,732,912 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,748,752 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,764,734 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,780,402 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,806,398 UART: [idev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
7,958,234 ready_for_fw is high
7,958,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,107,753 UART: [idev] --
8,108,390 UART: [ldev] ++
8,108,881 UART: [ldev] CDI.KEYID = 6
8,109,797 UART: [ldev] SUBJECT.KEYID = 5
8,110,821 UART: [ldev] AUTHORITY.KEYID = 7
8,111,906 UART: [ldev] FE.KEYID = 1
8,112,874 UART: [ldev] Erasing FE.KEYID = 1
10,520,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,254,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,270,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,286,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,302,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,323,378 UART: [ldev] --
12,329,227 UART: [fwproc] Wait for Commands...
12,331,660 UART: [fwproc] Recv command 0x46574c44
12,333,639 UART: [fwproc] Recv'd Img size: 118548 bytes
15,816,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,895,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,968,635 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,296,976 >>> mbox cmd response: success
16,298,080 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,301,802 UART: [afmc] ++
16,302,446 UART: [afmc] CDI.KEYID = 6
16,303,326 UART: [afmc] SUBJECT.KEYID = 7
16,304,595 UART: [afmc] AUTHORITY.KEYID = 5
18,846,714 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,570,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,573,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,588,958 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,605,021 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,620,596 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,646,355 UART: [afmc] --
20,650,751 UART: [cold-reset] --
20,654,823 UART: [state] Locking Datavault
20,659,210 UART: [state] Locking PCR0, PCR1 and PCR31
20,660,999 UART: [state] Locking ICCM
20,662,802 UART: [exit] Launching FMC @ 0x40000130
20,671,247 UART:
20,671,479 UART: Running Caliptra FMC ...
20,672,499 UART:
20,672,642 UART: [state] CFI Enabled
20,727,881 UART: [fht] FMC Alias Private Key: 7
22,495,124 UART: [art] Extend RT PCRs Done
22,496,346 UART: [art] Lock RT PCRs Done
22,498,054 UART: [art] Populate DV Done
22,503,313 UART: [fht] FMC Alias Private Key: 7
22,504,875 UART: [art] Derive CDI
22,505,692 UART: [art] Store in slot 0x4
22,560,867 UART: [art] Derive Key Pair
22,561,865 UART: [art] Store priv key in slot 0x5
25,024,680 UART: [art] Derive Key Pair - Done
25,037,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,750,695 UART: [art] Erasing AUTHORITY.KEYID = 7
26,752,212 UART: [art] PUB.X = 598D3504E76BC55B070630A421AFB2F6A4532F2FB0FF438954A8DC4A00C14522B4D26DC65359666FE58C0092C2132888
26,759,418 UART: [art] PUB.Y = B29CAE448B2B136027CA63E39F4366FBAEAB0F8B0017B243FFB13647F7B13ED13C1DE61B8C8C7C2EDD28F05ECFBA1161
26,766,702 UART: [art] SIG.R = 52B0840A352D3CD1745A997EAD375C8D7A3C23DFD41E17AEB65CC0A747F75AA16521E39E1E7F2BF1ECA38B65750C2BBD
26,774,092 UART: [art] SIG.S = F1FB2BA2F942DA59A0DD651F00026788CCFBB06C24B2C90470D1A5B7319A79D11E8FEBB517E3EC1806C89926C259A9CF
27,753,169 UART: Caliptra RT
27,753,891 UART: [state] CFI Enabled
27,933,458 UART: [rt] RT listening for mailbox commands...
27,964,970 UART: [rt]cmd =0x49444352, len=4
27,972,438 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
7,738,291 ready_for_fw is high
7,738,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,992,277 >>> mbox cmd response: success
15,993,534 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,280,006 UART:
20,280,392 UART: Running Caliptra FMC ...
20,281,539 UART:
20,281,697 UART: [state] CFI Enabled
20,350,642 UART: [fht] FMC Alias Private Key: 7
22,117,493 UART: [art] Extend RT PCRs Done
22,118,723 UART: [art] Lock RT PCRs Done
22,120,314 UART: [art] Populate DV Done
22,125,631 UART: [fht] FMC Alias Private Key: 7
22,127,328 UART: [art] Derive CDI
22,128,140 UART: [art] Store in slot 0x4
22,183,721 UART: [art] Derive Key Pair
22,184,778 UART: [art] Store priv key in slot 0x5
24,647,745 UART: [art] Derive Key Pair - Done
24,660,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,373,733 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,428 UART: [art] PUB.X = 8931ADB2847A0B517797070435EC0E2ECE69F0CB4B1AB92B9A5A6E998148D0287D21ED708DB0469C19EFD47D87721F96
26,382,528 UART: [art] PUB.Y = 96C5FB249F2B26A2394B7B5DAE1C2B1195DF2129924B37439B9BA8F188940F3BD26D1BCBD4136EF32DFDFA148EE81BA7
26,389,783 UART: [art] SIG.R = B6AD39E3ADA6A037D11608C334A3C25B0FB9FBBADB15323103FFDE8929EE5456FB8192C58714BDC700D176D48A61B9C1
26,397,175 UART: [art] SIG.S = E7E542689CA167414E620596A76351D6D7A527904F4498E20F304D7BEB0995C691CADB7ED824D7D217D1A68CC3A12F21
27,375,863 UART: Caliptra RT
27,376,555 UART: [state] CFI Enabled
27,557,898 UART: [rt] RT listening for mailbox commands...
27,589,067 UART: [rt]cmd =0x49444352, len=4
27,596,789 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,581 UART:
192,928 UART: Running Caliptra ROM ...
194,109 UART:
603,688 UART: [state] CFI Enabled
618,922 UART: [state] LifecycleState = Unprovisioned
620,813 UART: [state] DebugLocked = No
622,553 UART: [state] WD Timer not started. Device not locked for debugging
627,231 UART: [kat] SHA2-256
806,839 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,648 UART: [kat] ++
818,099 UART: [kat] sha1
829,762 UART: [kat] SHA2-256
832,416 UART: [kat] SHA2-384
838,843 UART: [kat] SHA2-512-ACC
841,215 UART: [kat] ECC-384
3,284,740 UART: [kat] HMAC-384Kdf
3,296,774 UART: [kat] LMS
3,773,308 UART: [kat] --
3,778,940 UART: [cold-reset] ++
3,781,588 UART: [fht] FHT @ 0x50003400
3,791,642 UART: [idev] ++
3,792,237 UART: [idev] CDI.KEYID = 6
3,793,275 UART: [idev] SUBJECT.KEYID = 7
3,794,449 UART: [idev] UDS.KEYID = 0
3,811,146 UART: [idev] Erasing UDS.KEYID = 0
6,270,734 UART: [idev] Sha1 KeyId Algorithm
6,295,830 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,013,575 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,029,458 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,045,458 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,061,086 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,087,085 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,238,914 ready_for_fw is high
8,239,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,388,149 UART: [idev] --
8,388,788 UART: [ldev] ++
8,389,287 UART: [ldev] CDI.KEYID = 6
8,390,186 UART: [ldev] SUBJECT.KEYID = 5
8,391,295 UART: [ldev] AUTHORITY.KEYID = 7
8,392,474 UART: [ldev] FE.KEYID = 1
8,393,392 UART: [ldev] Erasing FE.KEYID = 1
10,739,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,458,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,474,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,490,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,506,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,526,733 UART: [ldev] --
12,531,932 UART: [fwproc] Wait for Commands...
12,534,469 UART: [fwproc] Recv command 0x46574c44
12,536,464 UART: [fwproc] Recv'd Img size: 118548 bytes
16,024,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,098,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,869 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,499,786 >>> mbox cmd response: success
16,500,867 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,503,375 UART: [afmc] ++
16,504,011 UART: [afmc] CDI.KEYID = 6
16,504,927 UART: [afmc] SUBJECT.KEYID = 7
16,506,141 UART: [afmc] AUTHORITY.KEYID = 5
19,006,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,729,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,731,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,747,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,763,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,779,155 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,803,022 UART: [afmc] --
20,806,509 UART: [cold-reset] --
20,811,356 UART: [state] Locking Datavault
20,815,529 UART: [state] Locking PCR0, PCR1 and PCR31
20,817,246 UART: [state] Locking ICCM
20,818,996 UART: [exit] Launching FMC @ 0x40000130
20,827,406 UART:
20,827,645 UART: Running Caliptra FMC ...
20,828,748 UART:
20,828,914 UART: [state] CFI Enabled
20,837,505 UART: [fht] FMC Alias Private Key: 7
22,603,472 UART: [art] Extend RT PCRs Done
22,605,160 UART: [art] Lock RT PCRs Done
22,606,468 UART: [art] Populate DV Done
22,611,830 UART: [fht] FMC Alias Private Key: 7
22,613,319 UART: [art] Derive CDI
22,614,085 UART: [art] Store in slot 0x4
22,657,059 UART: [art] Derive Key Pair
22,658,066 UART: [art] Store priv key in slot 0x5
25,085,093 UART: [art] Derive Key Pair - Done
25,098,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,804,999 UART: [art] Erasing AUTHORITY.KEYID = 7
26,806,493 UART: [art] PUB.X = 7614FF8E9FBD29F1E3737938E60C9F49C3A852932CB820737883A7F4161155F0BB7F087B2F488BD5C5E33A14EB35745E
26,813,789 UART: [art] PUB.Y = 6F5C115A743187C79A7718F850E5FB1B826B242E8A2252E89D8058CE598859EB90AEC353FE4401E8F2416A015FE4D7B0
26,821,014 UART: [art] SIG.R = ABA8B2FA6519B5D56D000AF95892F8E043594D6C3A7883AACF5906EB7E1E9AE3E9AD05A0F8E435DAC29409E0C4C1C8AE
26,828,415 UART: [art] SIG.S = FDD3AB44F1FB3A7BFEF582A10C22F92C96A5D51BE500FA1EF05F4EBEE74568C13850E58BB11B53B960FD4BEBD8B11543
27,807,102 UART: Caliptra RT
27,807,805 UART: [state] CFI Enabled
27,939,396 UART: [rt] RT listening for mailbox commands...
27,970,633 UART: [rt]cmd =0x49444352, len=4
27,978,397 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
8,008,550 ready_for_fw is high
8,009,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,182,814 >>> mbox cmd response: success
16,183,948 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,432,485 UART:
20,432,860 UART: Running Caliptra FMC ...
20,434,055 UART:
20,434,257 UART: [state] CFI Enabled
20,441,715 UART: [fht] FMC Alias Private Key: 7
22,207,696 UART: [art] Extend RT PCRs Done
22,208,910 UART: [art] Lock RT PCRs Done
22,210,761 UART: [art] Populate DV Done
22,216,065 UART: [fht] FMC Alias Private Key: 7
22,217,717 UART: [art] Derive CDI
22,218,535 UART: [art] Store in slot 0x4
22,261,083 UART: [art] Derive Key Pair
22,262,288 UART: [art] Store priv key in slot 0x5
24,689,300 UART: [art] Derive Key Pair - Done
24,702,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,408,998 UART: [art] Erasing AUTHORITY.KEYID = 7
26,410,513 UART: [art] PUB.X = 42308FFF85EA7AF6B1D051CDA92CC92EB3E1CAB33CB62D4CEBBF69AD499DC0C0FCE1288AA72ACE4E96153510CDEE2F2A
26,417,833 UART: [art] PUB.Y = DEDFDE4CBC77D8C347E326A34B1AE86257EEFBDA65E03D6E856E02C925F997B6847DB3FE52A6F97F9324708031A29883
26,425,125 UART: [art] SIG.R = E51B43462ED4048A8F94CA5EB674B1F7002DDAD8F2BBB3CCC1BE3122D3A7A3EF9934CD57332B13AA8A63854643A21D9A
26,432,507 UART: [art] SIG.S = 1A9A9C5CDB961DF461F8F1CDE6B865A5A6AE5C8623BDAD81C2A1644452B732A5B3EE11C84360EC99BDC5986BF5281A02
27,411,300 UART: Caliptra RT
27,412,003 UART: [state] CFI Enabled
27,545,835 UART: [rt] RT listening for mailbox commands...
27,577,036 UART: [rt]cmd =0x49444352, len=4
27,584,668 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,960 UART:
192,339 UART: Running Caliptra ROM ...
193,482 UART:
193,632 UART: [state] CFI Enabled
262,455 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
266,900 UART: [state] WD Timer not started. Device not locked for debugging
271,148 UART: [kat] SHA2-256
461,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,786 UART: [kat] ++
472,264 UART: [kat] sha1
483,420 UART: [kat] SHA2-256
486,427 UART: [kat] SHA2-384
493,974 UART: [kat] SHA2-512-ACC
496,583 UART: [kat] ECC-384
2,950,469 UART: [kat] HMAC-384Kdf
2,972,225 UART: [kat] LMS
3,503,970 UART: [kat] --
3,508,461 UART: [cold-reset] ++
3,510,666 UART: [fht] FHT @ 0x50003400
3,521,992 UART: [idev] ++
3,522,631 UART: [idev] CDI.KEYID = 6
3,523,658 UART: [idev] SUBJECT.KEYID = 7
3,524,831 UART: [idev] UDS.KEYID = 0
3,544,069 UART: [idev] Erasing UDS.KEYID = 0
6,028,603 UART: [idev] Sha1 KeyId Algorithm
6,050,559 UART: [idev] CSR upload begun
6,055,342 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,781,868 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
7,797,129 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
7,812,177 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
7,827,161 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
7,852,333 UART: [idev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
7,982,047 UART: [idev] CSR uploaded
7,990,107 ready_for_fw is high
7,990,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,139,531 UART: [idev] --
8,140,165 UART: [ldev] ++
8,140,657 UART: [ldev] CDI.KEYID = 6
8,141,561 UART: [ldev] SUBJECT.KEYID = 5
8,142,609 UART: [ldev] AUTHORITY.KEYID = 7
8,143,789 UART: [ldev] FE.KEYID = 1
8,144,659 UART: [ldev] Erasing FE.KEYID = 1
10,547,580 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,283,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,298,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,313,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,328,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,349,692 UART: [ldev] --
12,354,699 UART: [fwproc] Wait for Commands...
12,357,492 UART: [fwproc] Recv command 0x46574c44
12,359,738 UART: [fwproc] Recv'd Img size: 118548 bytes
15,858,085 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,935,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,668 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,619,681 >>> mbox cmd response: success
16,620,678 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,624,433 UART: [afmc] ++
16,625,133 UART: [afmc] CDI.KEYID = 6
16,626,233 UART: [afmc] SUBJECT.KEYID = 7
16,627,761 UART: [afmc] AUTHORITY.KEYID = 5
19,152,348 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,877,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,879,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,894,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
20,909,260 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
20,924,165 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
20,947,377 UART: [afmc] --
20,951,130 UART: [cold-reset] --
20,955,150 UART: [state] Locking Datavault
20,960,883 UART: [state] Locking PCR0, PCR1 and PCR31
20,963,066 UART: [state] Locking ICCM
20,965,546 UART: [exit] Launching FMC @ 0x40000130
20,974,219 UART:
20,974,461 UART: Running Caliptra FMC ...
20,975,561 UART:
20,975,716 UART: [state] CFI Enabled
21,037,262 UART: [fht] FMC Alias Private Key: 7
22,803,464 UART: [art] Extend RT PCRs Done
22,804,703 UART: [art] Lock RT PCRs Done
22,806,706 UART: [art] Populate DV Done
22,812,116 UART: [fht] FMC Alias Private Key: 7
22,813,597 UART: [art] Derive CDI
22,814,332 UART: [art] Store in slot 0x4
22,870,261 UART: [art] Derive Key Pair
22,871,298 UART: [art] Store priv key in slot 0x5
25,333,873 UART: [art] Derive Key Pair - Done
25,346,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,060,532 UART: [art] Erasing AUTHORITY.KEYID = 7
27,062,024 UART: [art] PUB.X = A567AD66B29E470E9388AE625D10723ECCD51FDB2252003B72826B110B39F1D035B0D80389641B850962D616B736C316
27,069,290 UART: [art] PUB.Y = 496FCF47E9E5FB07EF106109F2181A135B45BB513AD3EC01C7F7815CE7298C11FFD73F80CE0FC1FE674312A70CDEDA8E
27,076,527 UART: [art] SIG.R = 6F73ED1B14EC99544A91DB0775D1F027AAAEF9C2CCEF977FFC8B5DAF72CF71C4DD7E043E5882E1CC902A0512F0AB3820
27,083,968 UART: [art] SIG.S = 9618C62AC90D003069938CC1E84C1148260C43DDBF0AA267E0237908F82EF8054C627AA07B9611614DB7911E86D3AA06
28,063,384 UART: Caliptra RT
28,064,103 UART: [state] CFI Enabled
28,242,717 UART: [rt] RT listening for mailbox commands...
28,274,277 UART: [rt]cmd =0x49444352, len=4
28,276,185 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
7,712,570 ready_for_fw is high
7,713,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,594,910 >>> mbox cmd response: success
16,596,081 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
20,881,775 UART:
20,882,164 UART: Running Caliptra FMC ...
20,883,271 UART:
20,883,424 UART: [state] CFI Enabled
20,948,132 UART: [fht] FMC Alias Private Key: 7
22,714,893 UART: [art] Extend RT PCRs Done
22,716,124 UART: [art] Lock RT PCRs Done
22,717,592 UART: [art] Populate DV Done
22,723,165 UART: [fht] FMC Alias Private Key: 7
22,724,757 UART: [art] Derive CDI
22,725,572 UART: [art] Store in slot 0x4
22,780,646 UART: [art] Derive Key Pair
22,781,682 UART: [art] Store priv key in slot 0x5
25,244,348 UART: [art] Derive Key Pair - Done
25,257,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,969,878 UART: [art] Erasing AUTHORITY.KEYID = 7
26,971,381 UART: [art] PUB.X = 48540FCE82ADAA7572E415A239006867D20D5C267680E1BABCBE9CB236851CCB36897F1AEF9F890D4F431F178A382E0B
26,978,674 UART: [art] PUB.Y = C44C1050C76F1B67E4B1F9401B3C14086DF6F01C18CCB0557EF02CDFE6CE506B3303F3F93D49C7407DD67B776D615C2F
26,985,911 UART: [art] SIG.R = 8B23CC504E0097D9CF7277A854A222FCEBB3C0A0292AE9EEEBD4DC50D8E3963A5C0DA52BB2BF1B0F4CC8C67B76B79518
26,993,304 UART: [art] SIG.S = B578EA9DD78ECFDE6A5E5E724BC463B797764CEC5B9AE60BF9E3F7630014CB8F0D402274E323484E63F6A7A6950CC71C
27,971,939 UART: Caliptra RT
27,972,638 UART: [state] CFI Enabled
28,153,936 UART: [rt] RT listening for mailbox commands...
28,185,414 UART: [rt]cmd =0x49444352, len=4
28,186,921 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,424 UART:
192,788 UART: Running Caliptra ROM ...
193,988 UART:
603,418 UART: [state] CFI Enabled
617,395 UART: [state] LifecycleState = Unprovisioned
619,717 UART: [state] DebugLocked = No
622,036 UART: [state] WD Timer not started. Device not locked for debugging
625,810 UART: [kat] SHA2-256
815,518 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,266 UART: [kat] ++
826,896 UART: [kat] sha1
837,787 UART: [kat] SHA2-256
840,798 UART: [kat] SHA2-384
847,584 UART: [kat] SHA2-512-ACC
850,175 UART: [kat] ECC-384
3,291,956 UART: [kat] HMAC-384Kdf
3,305,211 UART: [kat] LMS
3,837,070 UART: [kat] --
3,841,141 UART: [cold-reset] ++
3,842,082 UART: [fht] FHT @ 0x50003400
3,853,847 UART: [idev] ++
3,854,554 UART: [idev] CDI.KEYID = 6
3,855,469 UART: [idev] SUBJECT.KEYID = 7
3,856,718 UART: [idev] UDS.KEYID = 0
3,876,001 UART: [idev] Erasing UDS.KEYID = 0
6,334,332 UART: [idev] Sha1 KeyId Algorithm
6,355,614 UART: [idev] CSR upload begun
6,360,417 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,077,309 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
8,092,523 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
8,107,521 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
8,122,569 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
8,147,725 UART: [idev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
8,277,374 UART: [idev] CSR uploaded
8,285,436 ready_for_fw is high
8,285,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,434,731 UART: [idev] --
8,435,380 UART: [ldev] ++
8,435,881 UART: [ldev] CDI.KEYID = 6
8,436,781 UART: [ldev] SUBJECT.KEYID = 5
8,437,838 UART: [ldev] AUTHORITY.KEYID = 7
8,438,934 UART: [ldev] FE.KEYID = 1
8,439,892 UART: [ldev] Erasing FE.KEYID = 1
10,788,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,510,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,525,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,540,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,555,840 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,576,690 UART: [ldev] --
12,582,341 UART: [fwproc] Wait for Commands...
12,584,811 UART: [fwproc] Recv command 0x46574c44
12,587,127 UART: [fwproc] Recv'd Img size: 118548 bytes
16,082,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,164,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,288,168 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,847,755 >>> mbox cmd response: success
16,848,813 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
16,852,518 UART: [afmc] ++
16,853,241 UART: [afmc] CDI.KEYID = 6
16,854,443 UART: [afmc] SUBJECT.KEYID = 7
16,855,889 UART: [afmc] AUTHORITY.KEYID = 5
19,359,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,080,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,082,317 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,097,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,112,533 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,127,460 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,149,941 UART: [afmc] --
21,153,154 UART: [cold-reset] --
21,158,154 UART: [state] Locking Datavault
21,163,626 UART: [state] Locking PCR0, PCR1 and PCR31
21,165,782 UART: [state] Locking ICCM
21,168,696 UART: [exit] Launching FMC @ 0x40000130
21,177,378 UART:
21,177,635 UART: Running Caliptra FMC ...
21,178,741 UART:
21,178,905 UART: [state] CFI Enabled
21,186,900 UART: [fht] FMC Alias Private Key: 7
22,952,781 UART: [art] Extend RT PCRs Done
22,954,012 UART: [art] Lock RT PCRs Done
22,955,567 UART: [art] Populate DV Done
22,960,716 UART: [fht] FMC Alias Private Key: 7
22,962,204 UART: [art] Derive CDI
22,962,941 UART: [art] Store in slot 0x4
23,005,377 UART: [art] Derive Key Pair
23,006,390 UART: [art] Store priv key in slot 0x5
25,433,319 UART: [art] Derive Key Pair - Done
25,446,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,152,712 UART: [art] Erasing AUTHORITY.KEYID = 7
27,154,225 UART: [art] PUB.X = 11E77E95F0F55A913FDA1581FEC34F9776E8B3DE109F0F23D23B82A97445E1236B1B08A588A994E8AE2F44BA99B1E522
27,161,499 UART: [art] PUB.Y = D091C89582DC992716A1E4AED95126F8D4A3F226E0BDD7866BBBB3ED4CBAA2530D56168026095EF23ACDDF46D78C55D6
27,168,755 UART: [art] SIG.R = 300051D9DEA9D04BCDF42340144677527074C7B0E25229B108998668D91BDD232277309555B0516189E6DFA740E89399
27,176,062 UART: [art] SIG.S = 84890FF128F62932B21AAC5A95E759978B1487A6BC80C8F869E29837E1420F7B5A3A86BF13C2E3461B5312D419B124ED
28,155,331 UART: Caliptra RT
28,156,045 UART: [state] CFI Enabled
28,287,421 UART: [rt] RT listening for mailbox commands...
28,318,719 UART: [rt]cmd =0x49444352, len=4
28,320,580 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
7,982,882 ready_for_fw is high
7,983,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,780,532 >>> mbox cmd response: success
16,781,742 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
21,035,356 UART:
21,035,780 UART: Running Caliptra FMC ...
21,036,904 UART:
21,037,078 UART: [state] CFI Enabled
21,045,054 UART: [fht] FMC Alias Private Key: 7
22,811,214 UART: [art] Extend RT PCRs Done
22,812,439 UART: [art] Lock RT PCRs Done
22,813,911 UART: [art] Populate DV Done
22,819,392 UART: [fht] FMC Alias Private Key: 7
22,820,935 UART: [art] Derive CDI
22,821,751 UART: [art] Store in slot 0x4
22,864,100 UART: [art] Derive Key Pair
22,865,099 UART: [art] Store priv key in slot 0x5
25,292,175 UART: [art] Derive Key Pair - Done
25,305,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,011,442 UART: [art] Erasing AUTHORITY.KEYID = 7
27,012,950 UART: [art] PUB.X = 6EF3D98527BE7E685CC35802E61490B6F416EB1D895720A2BC766B84408D597727E029EFD862C05DCBC37758BDF4D5D9
27,020,170 UART: [art] PUB.Y = 49306E23131A26263285F6A9C650B156C57B5B43E3B0803A448291B815F0299348F7C726CC63BA0FD9A1C7472569E31E
27,027,443 UART: [art] SIG.R = CDBE3661795FA5D55097628F1F36CA072ECF0ABDE0D0191046CDA5FE735DC4D4E079D357001B5A9DA1C8F54A49BAA517
27,034,804 UART: [art] SIG.S = 265C2ADC5FBF883A5B8BA7384016E31DEEEFEDDAA97186434AFD14630FA48C0DC15DDDA7CDDFE5C9A2C01120B86FC597
28,013,804 UART: Caliptra RT
28,014,510 UART: [state] CFI Enabled
28,147,698 UART: [rt] RT listening for mailbox commands...
28,179,387 UART: [rt]cmd =0x49444352, len=4
28,180,930 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,479 UART: [kat] SHA2-256
882,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,525 UART: [kat] ++
886,677 UART: [kat] sha1
890,739 UART: [kat] SHA2-256
892,677 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,492 UART: [kat] LMS
1,475,688 UART: [kat] --
1,476,781 UART: [cold-reset] ++
1,477,309 UART: [fht] Storing FHT @ 0x50003400
1,480,276 UART: [idev] ++
1,480,444 UART: [idev] CDI.KEYID = 6
1,480,804 UART: [idev] SUBJECT.KEYID = 7
1,481,228 UART: [idev] UDS.KEYID = 0
1,489,104 UART: [idev] Erasing UDS.KEYID = 0
1,505,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] CSR upload requested
1,515,943 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,646 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,532,353 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,538,235 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,543,940 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,552,360 UART: [idev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
1,602,508 UART: [idev] CSR uploaded
1,604,889 ready_for_fw is high
1,604,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,605,060 UART: [idev] --
1,606,127 UART: [ldev] ++
1,606,295 UART: [ldev] CDI.KEYID = 6
1,606,658 UART: [ldev] SUBJECT.KEYID = 5
1,607,084 UART: [ldev] AUTHORITY.KEYID = 7
1,607,547 UART: [ldev] FE.KEYID = 1
1,613,059 UART: [ldev] Erasing FE.KEYID = 1
1,639,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,653,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,658,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,664,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,670,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,677,456 UART: [ldev] --
1,678,749 UART: [fwproc] Waiting for Commands...
1,679,602 UART: [fwproc] Received command 0x46574c44
1,680,393 UART: [fwproc] Received Image of size 118548 bytes
3,024,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,051,937 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,083,155 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,223,370 >>> mbox cmd response: success
3,223,370 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,224,534 UART: [afmc] ++
3,224,702 UART: [afmc] CDI.KEYID = 6
3,225,064 UART: [afmc] SUBJECT.KEYID = 7
3,225,489 UART: [afmc] AUTHORITY.KEYID = 5
3,260,652 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,277,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,278,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,283,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,289,682 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,295,365 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,303,239 UART: [afmc] --
3,304,127 UART: [cold-reset] --
3,304,835 UART: [state] Locking Datavault
3,305,918 UART: [state] Locking PCR0, PCR1 and PCR31
3,306,522 UART: [state] Locking ICCM
3,307,032 UART: [exit] Launching FMC @ 0x40000130
3,312,362 UART:
3,312,378 UART: Running Caliptra FMC ...
3,312,786 UART:
3,312,840 UART: [state] CFI Enabled
3,323,550 UART: [fht] FMC Alias Private Key: 7
3,442,404 UART: [art] Extend RT PCRs Done
3,442,832 UART: [art] Lock RT PCRs Done
3,444,124 UART: [art] Populate DV Done
3,452,363 UART: [fht] FMC Alias Private Key: 7
3,453,417 UART: [art] Derive CDI
3,453,697 UART: [art] Store in slot 0x4
3,539,143 UART: [art] Derive Key Pair
3,539,503 UART: [art] Store priv key in slot 0x5
3,552,970 UART: [art] Derive Key Pair - Done
3,567,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,583,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,584,103 UART: [art] PUB.X = 58E015F7542C3C993E64A253CF4DA06FEF5D622DC2AE751EE10E5D58D8069426C7DD3E2C34F66AEB9F4449BFC7009742
3,590,855 UART: [art] PUB.Y = 82BFCAE33F8401965A537E7503438CEC88D47F9280B971DF33D73812C020E8377188256745D5F3F4B64A5742A94B2289
3,597,789 UART: [art] SIG.R = 106815C83BAEB48664623FBD75E78F97E7F64DBA319D07E227163AD5B4E9B989DD99ED3E227C69C7AD08874E38B1F2FF
3,604,563 UART: [art] SIG.S = 54DFBE52B4960730AE11E22E76EEB425AF5E8D7BC78116955A9F6A322A0BCE131DB2A240380FC3AB60DF1981C4039D0E
3,628,204 UART: Caliptra RT
3,628,455 UART: [state] CFI Enabled
3,748,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,136 UART: [rt]cmd =0x49444352, len=4
3,780,541 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,411,160 ready_for_fw is high
1,411,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,601 >>> mbox cmd response: success
2,997,601 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,059,384 UART:
3,059,400 UART: Running Caliptra FMC ...
3,059,808 UART:
3,059,862 UART: [state] CFI Enabled
3,070,550 UART: [fht] FMC Alias Private Key: 7
3,190,032 UART: [art] Extend RT PCRs Done
3,190,460 UART: [art] Lock RT PCRs Done
3,192,220 UART: [art] Populate DV Done
3,200,483 UART: [fht] FMC Alias Private Key: 7
3,201,503 UART: [art] Derive CDI
3,201,783 UART: [art] Store in slot 0x4
3,286,963 UART: [art] Derive Key Pair
3,287,323 UART: [art] Store priv key in slot 0x5
3,300,538 UART: [art] Derive Key Pair - Done
3,315,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,330,748 UART: [art] Erasing AUTHORITY.KEYID = 7
3,331,513 UART: [art] PUB.X = EA4B14AE14654979E0AE2099DB9FD929255AA9D8CBE279181492A57A58D337FB00917126AD8B1DF19557434D765C48CF
3,338,263 UART: [art] PUB.Y = 97BB04A150A07F21DFD76BDE110A6FFDA7D65265475596D4AB4220BA32685700C98206066C0B37C782700CCFC58A31EB
3,345,177 UART: [art] SIG.R = E004005805142D73CCDBE280A0292C51891F017C918397E292123EEC3D7B1CED7E40E86FD4E9D0DD4914D6012A8644DA
3,351,915 UART: [art] SIG.S = 36749DD35EF573512755B8BAB9B636A0532096C66831FFF250CB8AF2316BBE643FF21B1BA455F158A78A4CF6083E7266
3,375,438 UART: Caliptra RT
3,375,689 UART: [state] CFI Enabled
3,494,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,601 UART: [rt]cmd =0x49444352, len=4
3,527,176 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,865 UART: [state] LifecycleState = Unprovisioned
85,520 UART: [state] DebugLocked = No
86,216 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,796 UART: [kat] SHA2-256
881,727 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,842 UART: [kat] ++
885,994 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
902,893 UART: [kat] HMAC-384Kdf
907,423 UART: [kat] LMS
1,475,619 UART: [kat] --
1,476,454 UART: [cold-reset] ++
1,476,970 UART: [fht] Storing FHT @ 0x50003400
1,479,577 UART: [idev] ++
1,479,745 UART: [idev] CDI.KEYID = 6
1,480,105 UART: [idev] SUBJECT.KEYID = 7
1,480,529 UART: [idev] UDS.KEYID = 0
1,487,965 UART: [idev] Erasing UDS.KEYID = 0
1,504,519 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,102 UART: [idev] CSR upload requested
1,514,948 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,525,579 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,531,286 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,537,168 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,542,873 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,551,293 UART: [idev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
1,601,441 UART: [idev] CSR uploaded
1,603,822 ready_for_fw is high
1,603,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,603,993 UART: [idev] --
1,605,144 UART: [ldev] ++
1,605,312 UART: [ldev] CDI.KEYID = 6
1,605,675 UART: [ldev] SUBJECT.KEYID = 5
1,606,101 UART: [ldev] AUTHORITY.KEYID = 7
1,606,564 UART: [ldev] FE.KEYID = 1
1,611,506 UART: [ldev] Erasing FE.KEYID = 1
1,636,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,650,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,656,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,662,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,667,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,674,867 UART: [ldev] --
1,676,222 UART: [fwproc] Waiting for Commands...
1,677,057 UART: [fwproc] Received command 0x46574c44
1,677,848 UART: [fwproc] Received Image of size 118548 bytes
3,023,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
3,050,188 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,081,406 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,221,623 >>> mbox cmd response: success
3,221,623 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,222,855 UART: [afmc] ++
3,223,023 UART: [afmc] CDI.KEYID = 6
3,223,385 UART: [afmc] SUBJECT.KEYID = 7
3,223,810 UART: [afmc] AUTHORITY.KEYID = 5
3,259,177 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,275,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,275,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,281,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,287,539 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,293,222 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,300,946 UART: [afmc] --
3,302,016 UART: [cold-reset] --
3,302,934 UART: [state] Locking Datavault
3,304,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,304,841 UART: [state] Locking ICCM
3,305,433 UART: [exit] Launching FMC @ 0x40000130
3,310,763 UART:
3,310,779 UART: Running Caliptra FMC ...
3,311,187 UART:
3,311,330 UART: [state] CFI Enabled
3,322,246 UART: [fht] FMC Alias Private Key: 7
3,440,760 UART: [art] Extend RT PCRs Done
3,441,188 UART: [art] Lock RT PCRs Done
3,442,904 UART: [art] Populate DV Done
3,451,011 UART: [fht] FMC Alias Private Key: 7
3,452,061 UART: [art] Derive CDI
3,452,341 UART: [art] Store in slot 0x4
3,537,821 UART: [art] Derive Key Pair
3,538,181 UART: [art] Store priv key in slot 0x5
3,551,280 UART: [art] Derive Key Pair - Done
3,565,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,581,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,582,498 UART: [art] PUB.X = EB26416F87C5224B8F4E638558FE1CB5CEE6C717D50D1BE77EF20CFDCE93EB5E2CF9520002EEFE62E9EE8FF3D5589FAD
3,589,263 UART: [art] PUB.Y = B79AB7F1DA236519F4082AEE5D3952B7BF534B78A6353B810B9EEAE20736634D679EC01351B5E294BAF4E494298161CE
3,596,208 UART: [art] SIG.R = 742B2072D594E70F701778F64D67BC932C703FDDAF416BB0E1DDC9E9C063F785769C817ACF19719A315395EDB0029060
3,602,972 UART: [art] SIG.S = 5EE94EDE45178D227FE945F7B2327F744DBD22E4C409EF6D13423064F83A1E036B1CC0F7D7F0C71DFF9FBCE75993B72A
3,627,186 UART: Caliptra RT
3,627,529 UART: [state] CFI Enabled
3,748,396 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,866 UART: [rt]cmd =0x49444352, len=4
3,780,145 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,410,675 ready_for_fw is high
1,410,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,266 >>> mbox cmd response: success
2,997,266 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
3,058,457 UART:
3,058,473 UART: Running Caliptra FMC ...
3,058,881 UART:
3,059,024 UART: [state] CFI Enabled
3,069,758 UART: [fht] FMC Alias Private Key: 7
3,189,018 UART: [art] Extend RT PCRs Done
3,189,446 UART: [art] Lock RT PCRs Done
3,190,686 UART: [art] Populate DV Done
3,198,911 UART: [fht] FMC Alias Private Key: 7
3,199,869 UART: [art] Derive CDI
3,200,149 UART: [art] Store in slot 0x4
3,285,473 UART: [art] Derive Key Pair
3,285,833 UART: [art] Store priv key in slot 0x5
3,299,454 UART: [art] Derive Key Pair - Done
3,314,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,330,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,330,899 UART: [art] PUB.X = 693625B0816326264DBB9C21F2A0A02329312B82A9286A095D2DBE98E3DFA23AB48C48EC22345C8A4EC40A66408C66A4
3,337,663 UART: [art] PUB.Y = 89DC000AF71D028368DC22CFE21FFDFF2AB05BD42B579DBE1DF43F27866651090B26E8529FC888CA8F1AC287F55D5ADF
3,344,597 UART: [art] SIG.R = 595724172E7C4953D6F1D3E8837870BD38B37031EDB79EF2862F0E2AA941F89B488DBC292C9F53B69B377BB80EC61023
3,351,361 UART: [art] SIG.S = E20B3892BF99869A68EFE9DA8F36E52B1E8E61E51C30620D5FA53F1315A11982026D5502AFD0D33BF18B0E89B89D4175
3,375,414 UART: Caliptra RT
3,375,757 UART: [state] CFI Enabled
3,497,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,705 UART: [rt]cmd =0x49444352, len=4
3,528,940 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,283 UART: [kat] SHA2-512-ACC
906,184 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,609 UART: [kat] LMS
1,168,921 UART: [kat] --
1,169,978 UART: [cold-reset] ++
1,170,310 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,093 UART: [idev] Erasing UDS.KEYID = 0
1,198,649 UART: [idev] Sha1 KeyId Algorithm
1,208,289 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,239 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,224,947 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,230,832 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,538 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,244,967 UART: [idev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
1,299,173 ready_for_fw is high
1,299,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,342 UART: [idev] --
1,300,319 UART: [ldev] ++
1,300,487 UART: [ldev] CDI.KEYID = 6
1,300,851 UART: [ldev] SUBJECT.KEYID = 5
1,301,278 UART: [ldev] AUTHORITY.KEYID = 7
1,301,741 UART: [ldev] FE.KEYID = 1
1,307,177 UART: [ldev] Erasing FE.KEYID = 1
1,333,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,346,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,352,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,358,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,363,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,371,191 UART: [ldev] --
1,372,574 UART: [fwproc] Wait for Commands...
1,373,223 UART: [fwproc] Recv command 0x46574c44
1,373,956 UART: [fwproc] Recv'd Img size: 118548 bytes
2,718,443 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,745,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,776,499 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,916,868 >>> mbox cmd response: success
2,916,868 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,918,108 UART: [afmc] ++
2,918,276 UART: [afmc] CDI.KEYID = 6
2,918,639 UART: [afmc] SUBJECT.KEYID = 7
2,919,065 UART: [afmc] AUTHORITY.KEYID = 5
2,954,548 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,971,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,972,164 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,977,874 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,983,755 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,989,456 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,997,283 UART: [afmc] --
2,998,312 UART: [cold-reset] --
2,999,138 UART: [state] Locking Datavault
3,000,453 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,057 UART: [state] Locking ICCM
3,001,495 UART: [exit] Launching FMC @ 0x40000130
3,006,825 UART:
3,006,841 UART: Running Caliptra FMC ...
3,007,249 UART:
3,007,303 UART: [state] CFI Enabled
3,017,227 UART: [fht] FMC Alias Private Key: 7
3,135,825 UART: [art] Extend RT PCRs Done
3,136,253 UART: [art] Lock RT PCRs Done
3,138,067 UART: [art] Populate DV Done
3,146,236 UART: [fht] FMC Alias Private Key: 7
3,147,322 UART: [art] Derive CDI
3,147,602 UART: [art] Store in slot 0x4
3,233,813 UART: [art] Derive Key Pair
3,234,173 UART: [art] Store priv key in slot 0x5
3,247,087 UART: [art] Derive Key Pair - Done
3,261,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,277,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,277,773 UART: [art] PUB.X = ADE19E1C10A0500BB692C7B822CB47F3F26A73A3C25642BA6B34F3B0203C8DAC54B00876228781D90D974253812B4B20
3,284,534 UART: [art] PUB.Y = 6EB9F8BFD1D18878D58B9A3F2584A8480A7F41F21EAEFC6719DA2F9F77D81F86C7216D8CE2A2A2F4C796C94BBEA88A07
3,291,496 UART: [art] SIG.R = 30D327F55CFECBADBFA3136D1AB89F785803303712B759000B1CF6BE9C8BB717C59385A840F659F204944707773A59C0
3,298,232 UART: [art] SIG.S = 42597EF988F1AE2DE0AFDF1BCDF058FD8F667AF4F4650CE7FC2E1DC3F644C45B3DF3E7880B7EA53FEF1590F217856DF5
3,322,168 UART: Caliptra RT
3,322,419 UART: [state] CFI Enabled
3,442,263 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,777 UART: [rt]cmd =0x49444352, len=4
3,479,853 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,476 ready_for_fw is high
1,109,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,741 >>> mbox cmd response: success
2,695,741 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,757,644 UART:
2,757,660 UART: Running Caliptra FMC ...
2,758,068 UART:
2,758,122 UART: [state] CFI Enabled
2,768,710 UART: [fht] FMC Alias Private Key: 7
2,888,158 UART: [art] Extend RT PCRs Done
2,888,586 UART: [art] Lock RT PCRs Done
2,890,270 UART: [art] Populate DV Done
2,898,331 UART: [fht] FMC Alias Private Key: 7
2,899,307 UART: [art] Derive CDI
2,899,587 UART: [art] Store in slot 0x4
2,985,540 UART: [art] Derive Key Pair
2,985,900 UART: [art] Store priv key in slot 0x5
2,998,982 UART: [art] Derive Key Pair - Done
3,013,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,109 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,874 UART: [art] PUB.X = AC9014AA67D54B540B6EDA3C71E6552EFD2830F8CD6A27A1C576DA56C480AD342F96BD198716041A0C5BB0CBD62B805F
3,036,649 UART: [art] PUB.Y = 8E2A5579EEE9748234D9B75E3B9FAB35AFFCED943E6FB50433F7FAA31C91AE078E7F5D2B811599A99556085567A03C67
3,043,598 UART: [art] SIG.R = 905809FB74767455A9C39CC7B5FF35C5B613F12CD55444E89F54908E6BB80831CE004C5157C049B277A6EAA4EA177BD5
3,050,342 UART: [art] SIG.S = 3764A698610F072AB8E49EEDCA179E58E6B6088DA8F8A0AEF3993113BEE01EE41A96A21014FBCCA7E4640106DFCC4201
3,073,988 UART: Caliptra RT
3,074,239 UART: [state] CFI Enabled
3,193,766 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,198 UART: [rt]cmd =0x49444352, len=4
3,231,330 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,915 UART: [kat] SHA2-256
901,855 UART: [kat] SHA2-384
904,618 UART: [kat] SHA2-512-ACC
906,519 UART: [kat] ECC-384
916,322 UART: [kat] HMAC-384Kdf
920,816 UART: [kat] LMS
1,169,128 UART: [kat] --
1,170,069 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,075 UART: [idev] ++
1,173,243 UART: [idev] CDI.KEYID = 6
1,173,604 UART: [idev] SUBJECT.KEYID = 7
1,174,029 UART: [idev] UDS.KEYID = 0
1,182,008 UART: [idev] Erasing UDS.KEYID = 0
1,199,316 UART: [idev] Sha1 KeyId Algorithm
1,209,134 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,686 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,225,394 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,231,279 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,236,985 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,245,414 UART: [idev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
1,299,620 ready_for_fw is high
1,299,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,299,789 UART: [idev] --
1,300,958 UART: [ldev] ++
1,301,126 UART: [ldev] CDI.KEYID = 6
1,301,490 UART: [ldev] SUBJECT.KEYID = 5
1,301,917 UART: [ldev] AUTHORITY.KEYID = 7
1,302,380 UART: [ldev] FE.KEYID = 1
1,307,536 UART: [ldev] Erasing FE.KEYID = 1
1,334,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,359,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,365,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,372,768 UART: [ldev] --
1,374,175 UART: [fwproc] Wait for Commands...
1,374,832 UART: [fwproc] Recv command 0x46574c44
1,375,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,748,167 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,779,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,589 >>> mbox cmd response: success
2,919,589 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,920,839 UART: [afmc] ++
2,921,007 UART: [afmc] CDI.KEYID = 6
2,921,370 UART: [afmc] SUBJECT.KEYID = 7
2,921,796 UART: [afmc] AUTHORITY.KEYID = 5
2,957,653 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,974,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,975,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,980,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,986,646 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,992,347 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
3,000,076 UART: [afmc] --
3,000,975 UART: [cold-reset] --
3,001,947 UART: [state] Locking Datavault
3,003,214 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,818 UART: [state] Locking ICCM
3,004,350 UART: [exit] Launching FMC @ 0x40000130
3,009,680 UART:
3,009,696 UART: Running Caliptra FMC ...
3,010,104 UART:
3,010,247 UART: [state] CFI Enabled
3,020,539 UART: [fht] FMC Alias Private Key: 7
3,139,819 UART: [art] Extend RT PCRs Done
3,140,247 UART: [art] Lock RT PCRs Done
3,141,593 UART: [art] Populate DV Done
3,149,824 UART: [fht] FMC Alias Private Key: 7
3,151,006 UART: [art] Derive CDI
3,151,286 UART: [art] Store in slot 0x4
3,237,141 UART: [art] Derive Key Pair
3,237,501 UART: [art] Store priv key in slot 0x5
3,250,703 UART: [art] Derive Key Pair - Done
3,265,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,280,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,281,209 UART: [art] PUB.X = 3081B789A96D495D52E32AA362ACECB2E2DD5C7324CF87164C08F931EB78FD209E9F06EE9D2ED0A3035C995EBD08278A
3,287,979 UART: [art] PUB.Y = EFD75FB08107DA3F118C280B85810CC144B8256A78D68EA3115B01C93C9399574FA23C20BDF0E2C22A6E45051D6C0268
3,294,913 UART: [art] SIG.R = C11F8EE154606B08AA2EC2994ED39263327ABDA24F46C0026BD735C21A6F74FB69C313A3F26D8151C21E1D3DC3779843
3,301,681 UART: [art] SIG.S = 2F9E68CA8CA9B782EC84B44838F64D0DA2577400243FF36DAB8F119FA33FDF4F2465E73016FA26A8789FE5BB9FCABD05
3,326,179 UART: Caliptra RT
3,326,522 UART: [state] CFI Enabled
3,446,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,137 UART: [rt]cmd =0x49444352, len=4
3,484,103 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,917 ready_for_fw is high
1,110,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,698,116 >>> mbox cmd response: success
2,698,116 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,787 UART:
2,759,803 UART: Running Caliptra FMC ...
2,760,211 UART:
2,760,354 UART: [state] CFI Enabled
2,770,646 UART: [fht] FMC Alias Private Key: 7
2,889,406 UART: [art] Extend RT PCRs Done
2,889,834 UART: [art] Lock RT PCRs Done
2,891,442 UART: [art] Populate DV Done
2,899,941 UART: [fht] FMC Alias Private Key: 7
2,901,055 UART: [art] Derive CDI
2,901,335 UART: [art] Store in slot 0x4
2,987,356 UART: [art] Derive Key Pair
2,987,716 UART: [art] Store priv key in slot 0x5
3,000,586 UART: [art] Derive Key Pair - Done
3,015,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,613 UART: [art] PUB.X = ABB93E1F428A9AFC4AD75E09E7357C250A71E3BB918B5F4B6A4874CF8B6498F643F3AA4FACFDEB0BD332FB69435404A1
3,038,391 UART: [art] PUB.Y = 45C6786FA2B23BD1720749719D3D9974E7ABEC42463F949621A2297D58702F27CDD9CD18F191BE8C3591A64220932DD4
3,045,334 UART: [art] SIG.R = 61647C0EC67A78A88716C410AF8A223C1F38E23A75BF2F722E76EC4A3276BFF5C2B8F09A13AC32F40C79AAC5DD19D6A3
3,052,112 UART: [art] SIG.S = 57DD0142D37934093E4C6B9A82DD7E6FE50F0A8FFF4B8C2814322376781F22368F2DBBD9FB50D8F6FE6F4AE2E710E09F
3,075,806 UART: Caliptra RT
3,076,149 UART: [state] CFI Enabled
3,196,467 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,607 UART: [rt]cmd =0x49444352, len=4
3,233,573 >>> mbox cmd response data (524 bytes)
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,456 UART: [kat] SHA2-256
893,106 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,231 UART: [kat] ++
897,383 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,380 UART: [kat] SHA2-512-ACC
908,281 UART: [kat] ECC-384
918,220 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,355 UART: [cold-reset] ++
1,172,733 UART: [fht] FHT @ 0x50003400
1,175,568 UART: [idev] ++
1,175,736 UART: [idev] CDI.KEYID = 6
1,176,096 UART: [idev] SUBJECT.KEYID = 7
1,176,520 UART: [idev] UDS.KEYID = 0
1,184,600 UART: [idev] Erasing UDS.KEYID = 0
1,201,951 UART: [idev] Sha1 KeyId Algorithm
1,210,225 UART: [idev] CSR upload begun
1,212,006 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,464 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,171 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,053 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,239,758 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,178 UART: [idev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
1,298,326 UART: [idev] CSR uploaded
1,300,705 ready_for_fw is high
1,300,705 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,300,876 UART: [idev] --
1,301,832 UART: [ldev] ++
1,302,000 UART: [ldev] CDI.KEYID = 6
1,302,363 UART: [ldev] SUBJECT.KEYID = 5
1,302,789 UART: [ldev] AUTHORITY.KEYID = 7
1,303,252 UART: [ldev] FE.KEYID = 1
1,308,426 UART: [ldev] Erasing FE.KEYID = 1
1,335,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,090 UART: [ldev] --
1,374,391 UART: [fwproc] Wait for Commands...
1,374,983 UART: [fwproc] Recv command 0x46574c44
1,375,711 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,157 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,327 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,918,496 >>> mbox cmd response: success
2,918,496 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,919,538 UART: [afmc] ++
2,919,706 UART: [afmc] CDI.KEYID = 6
2,920,068 UART: [afmc] SUBJECT.KEYID = 7
2,920,493 UART: [afmc] AUTHORITY.KEYID = 5
2,955,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,972,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,973,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,978,814 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,984,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,990,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,998,146 UART: [afmc] --
2,999,170 UART: [cold-reset] --
2,999,982 UART: [state] Locking Datavault
3,001,055 UART: [state] Locking PCR0, PCR1 and PCR31
3,001,659 UART: [state] Locking ICCM
3,002,159 UART: [exit] Launching FMC @ 0x40000130
3,007,489 UART:
3,007,505 UART: Running Caliptra FMC ...
3,007,913 UART:
3,007,967 UART: [state] CFI Enabled
3,018,901 UART: [fht] FMC Alias Private Key: 7
3,137,807 UART: [art] Extend RT PCRs Done
3,138,235 UART: [art] Lock RT PCRs Done
3,139,693 UART: [art] Populate DV Done
3,148,006 UART: [fht] FMC Alias Private Key: 7
3,149,162 UART: [art] Derive CDI
3,149,442 UART: [art] Store in slot 0x4
3,235,273 UART: [art] Derive Key Pair
3,235,633 UART: [art] Store priv key in slot 0x5
3,248,935 UART: [art] Derive Key Pair - Done
3,263,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,279,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,280,113 UART: [art] PUB.X = F3806C3A07ED3EE6D4592B3B4684E07E8D3D8B8876D4DEDDBE45B3E6B77690063BFE38660921F84A4CD3873BE6BA7697
3,286,884 UART: [art] PUB.Y = 73BE7784FFC50A11418738D7CAD63FE6717A8BC323A9865A5D3BD475D5DA47578136BFEF644140B7151E3B860FDA2D02
3,293,831 UART: [art] SIG.R = 57BB9248390391C30120064E173A772B027112ED38ED59B1AA940544B96BF3A764FDCAD6FB5A8765C38BE8910B3D5590
3,300,581 UART: [art] SIG.S = F0AE4419EBC48051A26E6AFC0F43CAA18CED2468260F7C4F5F585140EB8006C8862729231DCF474F96B475389DF80B3C
3,324,205 UART: Caliptra RT
3,324,456 UART: [state] CFI Enabled
3,444,111 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,607 UART: [rt]cmd =0x49444352, len=4
3,476,106 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,109,582 ready_for_fw is high
1,109,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,695,054 >>> mbox cmd response: success
2,695,054 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,757,867 UART:
2,757,883 UART: Running Caliptra FMC ...
2,758,291 UART:
2,758,345 UART: [state] CFI Enabled
2,768,523 UART: [fht] FMC Alias Private Key: 7
2,887,701 UART: [art] Extend RT PCRs Done
2,888,129 UART: [art] Lock RT PCRs Done
2,889,459 UART: [art] Populate DV Done
2,897,646 UART: [fht] FMC Alias Private Key: 7
2,898,758 UART: [art] Derive CDI
2,899,038 UART: [art] Store in slot 0x4
2,984,861 UART: [art] Derive Key Pair
2,985,221 UART: [art] Store priv key in slot 0x5
2,998,105 UART: [art] Derive Key Pair - Done
3,012,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,070 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,835 UART: [art] PUB.X = 780E6AD81B7D1F0EC87EC43EDDB4B1B2A65F12D19E0E104A71D87AC7DACEC38E5680850F282CF93B244EA0CA1589A17F
3,035,613 UART: [art] PUB.Y = 1F7EA47FC07C5D592C7BC202B1DF2CA294735E65A706CC1AD91806AD1B0EEF7EC844B3955B41ECD4CFC906C9C436E605
3,042,563 UART: [art] SIG.R = 33418E9AC51080A6ABC72AAE94AC24898CEF2DB1F85DC0C928CFD7909D808F173C56547167F410F06C668977884C9BCF
3,049,339 UART: [art] SIG.S = DAB85AC7D7CBABE0FE65971AA9DCCF21E39DFA0933D009A6D868D2ED4A5836653EFD30CA5B53BBA4524D5CA71703C024
3,073,158 UART: Caliptra RT
3,073,409 UART: [state] CFI Enabled
3,193,452 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,024 UART: [rt]cmd =0x49444352, len=4
3,225,427 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,273 UART: [state] LifecycleState = Unprovisioned
85,928 UART: [state] DebugLocked = No
86,442 UART: [state] WD Timer not started. Device not locked for debugging
87,687 UART: [kat] SHA2-256
893,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,462 UART: [kat] ++
897,614 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,671 UART: [kat] SHA2-512-ACC
908,572 UART: [kat] ECC-384
918,617 UART: [kat] HMAC-384Kdf
923,149 UART: [kat] LMS
1,171,477 UART: [kat] --
1,172,456 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,553 UART: [idev] ++
1,175,721 UART: [idev] CDI.KEYID = 6
1,176,081 UART: [idev] SUBJECT.KEYID = 7
1,176,505 UART: [idev] UDS.KEYID = 0
1,184,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,722 UART: [idev] Sha1 KeyId Algorithm
1,210,016 UART: [idev] CSR upload begun
1,211,797 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,801 UART: [idev] PUB.X = 91AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C9
1,228,508 UART: [idev] PUB.Y = 4BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607
1,234,390 UART: [idev] SIG.R = DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D
1,240,095 UART: [idev] SIG.S = 1670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,248,515 UART: [idev] CSR = 308201B83082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340323742383841414346343237344241344136353039304632433931343338323044464330363034343130344246304236433931353433443242353842343046373076301006072A8648CE3D020106052B810400220362000491AB08476490591E788E54F9D99379A514B64E98CE11873C0CE0898FAF3CA2A24D50DB397B4D9B8683AE0944FBF2B4C94BD5A6D06C46E6C40CCBA36792D30E9718E5BFA309F81A934BA22A60D26C114F51B752DF396512CAB514B7B4A5983607A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D0403030368003065023100DECDB5FEDBE99A8D3CFD35BD0426A966460CD3C465A0C578D0239F81058182605AE6CEDA7377697A7309259B50D2E31D02301670E86DC5002F6B7FD3C17BB100740FE07570436D7AD40260987A829A8AFA8754B910BAA46DC674EDD514A22A262A8F
1,298,663 UART: [idev] CSR uploaded
1,301,042 ready_for_fw is high
1,301,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,301,213 UART: [idev] --
1,302,225 UART: [ldev] ++
1,302,393 UART: [ldev] CDI.KEYID = 6
1,302,756 UART: [ldev] SUBJECT.KEYID = 5
1,303,182 UART: [ldev] AUTHORITY.KEYID = 7
1,303,645 UART: [ldev] FE.KEYID = 1
1,308,711 UART: [ldev] Erasing FE.KEYID = 1
1,335,532 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,348,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,354,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,360,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,366,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,373,231 UART: [ldev] --
1,374,632 UART: [fwproc] Wait for Commands...
1,375,382 UART: [fwproc] Recv command 0x46574c44
1,376,110 UART: [fwproc] Recv'd Img size: 118548 bytes
2,720,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,747,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,778,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,919,087 >>> mbox cmd response: success
2,919,087 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,920,311 UART: [afmc] ++
2,920,479 UART: [afmc] CDI.KEYID = 6
2,920,841 UART: [afmc] SUBJECT.KEYID = 7
2,921,266 UART: [afmc] AUTHORITY.KEYID = 5
2,957,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,973,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,974,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,979,945 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,985,828 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,991,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,999,551 UART: [afmc] --
3,000,609 UART: [cold-reset] --
3,001,653 UART: [state] Locking Datavault
3,003,002 UART: [state] Locking PCR0, PCR1 and PCR31
3,003,606 UART: [state] Locking ICCM
3,004,056 UART: [exit] Launching FMC @ 0x40000130
3,009,386 UART:
3,009,402 UART: Running Caliptra FMC ...
3,009,810 UART:
3,009,953 UART: [state] CFI Enabled
3,020,869 UART: [fht] FMC Alias Private Key: 7
3,139,887 UART: [art] Extend RT PCRs Done
3,140,315 UART: [art] Lock RT PCRs Done
3,141,731 UART: [art] Populate DV Done
3,150,020 UART: [fht] FMC Alias Private Key: 7
3,150,978 UART: [art] Derive CDI
3,151,258 UART: [art] Store in slot 0x4
3,237,465 UART: [art] Derive Key Pair
3,237,825 UART: [art] Store priv key in slot 0x5
3,251,235 UART: [art] Derive Key Pair - Done
3,266,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,281,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,282,546 UART: [art] PUB.X = 5BC89BF96FC7A7AF1FBCE69034E8EF0F722EDE452F5A9E2C826DBED0209760B64F71DF39BDAAA2992A3EF37EF27FB3F9
3,289,341 UART: [art] PUB.Y = 1826339012B89477D1C68DD3AF02BDC7D0D699BFD9198F21802761E876C691F48F7C9BE00708066555B47FF5969272B3
3,296,271 UART: [art] SIG.R = A80135D18315163651801914E3196E3C68569FCDEC3644F22A15EABEDD22D071B29BDD2367EB4E7A8463196166F58AC7
3,303,036 UART: [art] SIG.S = 8DF34ABC90513E4B2C6AF1D4274D9E7289EA5DB55E105D78B19C24B3A9BA9DB5BAEBF64C7D22AD8C24B0338B0625DEDB
3,327,041 UART: Caliptra RT
3,327,384 UART: [state] CFI Enabled
3,446,588 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,926 UART: [rt]cmd =0x49444352, len=4
3,478,165 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,110,583 ready_for_fw is high
1,110,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,697,609 >>> mbox cmd response: success
2,697,609 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
2,759,026 UART:
2,759,042 UART: Running Caliptra FMC ...
2,759,450 UART:
2,759,593 UART: [state] CFI Enabled
2,770,301 UART: [fht] FMC Alias Private Key: 7
2,889,189 UART: [art] Extend RT PCRs Done
2,889,617 UART: [art] Lock RT PCRs Done
2,891,117 UART: [art] Populate DV Done
2,899,428 UART: [fht] FMC Alias Private Key: 7
2,900,416 UART: [art] Derive CDI
2,900,696 UART: [art] Store in slot 0x4
2,986,401 UART: [art] Derive Key Pair
2,986,761 UART: [art] Store priv key in slot 0x5
3,000,109 UART: [art] Derive Key Pair - Done
3,014,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,696 UART: [art] PUB.X = 6F315A0CD465F7ED5C4EAC423EB8A2D9F9C147856C32376C5A74FB351703243A76B6290E62BCD8EECD65D66C29B03309
3,038,462 UART: [art] PUB.Y = 0FF73A9655DE86B2A06C90CC4AC0A6F57013AC43C888949D4C87B86F81583792483D3119410FD1B4DDC8B8DDDAE10EA1
3,045,413 UART: [art] SIG.R = 89541817035A0AEF7B93A6E94D8132A472C60514778F99A897B7C04E235D810284FBD3E59F6AA310A85A5A82739B95D6
3,052,165 UART: [art] SIG.S = 087791BD422531950F4756B5BB2F1957A5A1199539AAC6834769A606F5C0A343E6FC6B6E3172154E33E7E61C73241E16
3,076,500 UART: Caliptra RT
3,076,843 UART: [state] CFI Enabled
3,196,490 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,226,970 UART: [rt]cmd =0x49444352, len=4
3,228,487 >>> mbox cmd response: failed
test test_get_idev_csr::test_get_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,233 UART:
192,603 UART: Running Caliptra ROM ...
193,788 UART:
193,956 UART: [state] CFI Enabled
267,063 UART: [state] LifecycleState = Unprovisioned
268,981 UART: [state] DebugLocked = No
270,731 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,538 UART: [kat] SHA2-256
445,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,779 UART: [kat] ++
456,317 UART: [kat] sha1
468,332 UART: [kat] SHA2-256
471,049 UART: [kat] SHA2-384
476,541 UART: [kat] SHA2-512-ACC
478,927 UART: [kat] ECC-384
2,769,098 UART: [kat] HMAC-384Kdf
2,800,675 UART: [kat] LMS
3,991,035 UART: [kat] --
3,994,979 UART: [cold-reset] ++
3,996,344 UART: [fht] Storing FHT @ 0x50003400
4,008,033 UART: [idev] ++
4,008,611 UART: [idev] CDI.KEYID = 6
4,009,652 UART: [idev] SUBJECT.KEYID = 7
4,010,830 UART: [idev] UDS.KEYID = 0
4,011,834 ready_for_fw is high
4,012,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,160 UART: [idev] Erasing UDS.KEYID = 0
7,344,827 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,437 UART: [idev] --
7,372,894 UART: [ldev] ++
7,373,544 UART: [ldev] CDI.KEYID = 6
7,374,457 UART: [ldev] SUBJECT.KEYID = 5
7,375,674 UART: [ldev] AUTHORITY.KEYID = 7
7,376,902 UART: [ldev] FE.KEYID = 1
7,422,455 UART: [ldev] Erasing FE.KEYID = 1
10,757,428 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,766 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,377 UART: [ldev] --
13,137,611 UART: [fwproc] Waiting for Commands...
13,139,740 UART: [fwproc] Received command 0x46574c44
13,141,927 UART: [fwproc] Received Image of size 118548 bytes
17,249,642 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,430 >>> mbox cmd response: success
17,732,617 UART: [afmc] ++
17,733,234 UART: [afmc] CDI.KEYID = 6
17,734,148 UART: [afmc] SUBJECT.KEYID = 7
17,735,366 UART: [afmc] AUTHORITY.KEYID = 5
21,092,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,481 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,211 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,891 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,342 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,586 UART: [afmc] --
23,464,845 UART: [cold-reset] --
23,468,453 UART: [state] Locking Datavault
23,474,085 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,803 UART: [state] Locking ICCM
23,478,063 UART: [exit] Launching FMC @ 0x40000130
23,486,468 UART:
23,486,711 UART: Running Caliptra FMC ...
23,487,812 UART:
23,487,974 UART: [state] CFI Enabled
23,555,321 UART: [fht] FMC Alias Private Key: 7
25,895,125 UART: [art] Extend RT PCRs Done
25,896,360 UART: [art] Lock RT PCRs Done
25,898,178 UART: [art] Populate DV Done
25,903,855 UART: [fht] FMC Alias Private Key: 7
25,905,391 UART: [art] Derive CDI
25,906,121 UART: [art] Store in slot 0x4
25,963,976 UART: [art] Derive Key Pair
25,965,014 UART: [art] Store priv key in slot 0x5
29,257,377 UART: [art] Derive Key Pair - Done
29,270,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,426 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,935 UART: [art] PUB.X = 1158AECB3A117B7D8861E310E10A447512DF9F90EF078225217E285D07993DDAE51C2254CE0B8E351CF7A6F4DC9AB2F9
31,569,238 UART: [art] PUB.Y = 4107C4337873C25B5D5D6C138D11719CAEEE180698DFC5C67772E0A855B1A21846D786697FF2B030CC65B01A26C68525
31,576,462 UART: [art] SIG.R = DA9D19406476FEBB21E52207F828A928DD91E7CC02D5C82F6308E2C01A03D20D02E625CCDE1F4EA5C22B35DEF899337B
31,583,848 UART: [art] SIG.S = 60CB65C04CD85AC561FEC70A799154DF5F4D0B9154E8375BADBC659B33241FC2AAC965C0B084F2B0D6CCB49077612472
32,888,910 UART: Caliptra RT
32,889,609 UART: [state] CFI Enabled
33,066,606 UART: [rt] RT listening for mailbox commands...
33,068,475 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,098,465 UART: [rt]cmd =0x49444352, len=4
33,100,349 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
3,801,185 ready_for_fw is high
3,801,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,979,796 >>> mbox cmd response: success
23,670,573 UART:
23,670,970 UART: Running Caliptra FMC ...
23,672,111 UART:
23,672,274 UART: [state] CFI Enabled
23,739,981 UART: [fht] FMC Alias Private Key: 7
26,080,198 UART: [art] Extend RT PCRs Done
26,081,421 UART: [art] Lock RT PCRs Done
26,082,914 UART: [art] Populate DV Done
26,088,334 UART: [fht] FMC Alias Private Key: 7
26,089,929 UART: [art] Derive CDI
26,090,747 UART: [art] Store in slot 0x4
26,148,607 UART: [art] Derive Key Pair
26,149,604 UART: [art] Store priv key in slot 0x5
29,442,195 UART: [art] Derive Key Pair - Done
29,455,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,357 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,869 UART: [art] PUB.X = 2BFDB3A48866D975E15D1DBDAEF3D4B0A6EDB4200143B1C9B56815A7E4303D415218FFA5DBA4C2EE3CB3208FDAC54CA3
31,753,118 UART: [art] PUB.Y = 2855387BD5531F2DD87FD5599BBD3A68D47FA64E8A2EE9F3824A23171E68B78931498BE1446056F8AB07B9B34460D7B9
31,760,400 UART: [art] SIG.R = 4C31D1667D5D4F451CB0E81E8C998D156701B5307F6D49D276F1053A470D714B3507FB3DBC8D670A59882C2DC2E3AB9D
31,767,753 UART: [art] SIG.S = 90BD64A791FBA7E1EF42FDE7CD86F01DBD2B8B9E3AF49685589D6D9A5DDEE9481B08CCD9AC2FFA4EFB004AD6FDAFAA86
33,073,169 UART: Caliptra RT
33,073,892 UART: [state] CFI Enabled
33,250,979 UART: [rt] RT listening for mailbox commands...
33,252,854 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,282,787 UART: [rt]cmd =0x49444352, len=4
33,284,606 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,405 UART:
192,757 UART: Running Caliptra ROM ...
193,936 UART:
603,598 UART: [state] CFI Enabled
615,804 UART: [state] LifecycleState = Unprovisioned
617,671 UART: [state] DebugLocked = No
619,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,023 UART: [kat] SHA2-256
794,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,296 UART: [kat] ++
805,740 UART: [kat] sha1
817,747 UART: [kat] SHA2-256
820,465 UART: [kat] SHA2-384
827,587 UART: [kat] SHA2-512-ACC
829,945 UART: [kat] ECC-384
3,116,576 UART: [kat] HMAC-384Kdf
3,126,835 UART: [kat] LMS
4,316,964 UART: [kat] --
4,322,398 UART: [cold-reset] ++
4,325,032 UART: [fht] Storing FHT @ 0x50003400
4,336,433 UART: [idev] ++
4,337,067 UART: [idev] CDI.KEYID = 6
4,337,971 UART: [idev] SUBJECT.KEYID = 7
4,339,209 UART: [idev] UDS.KEYID = 0
4,340,239 ready_for_fw is high
4,340,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,263 UART: [idev] Erasing UDS.KEYID = 0
7,624,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,481 UART: [idev] --
7,650,611 UART: [ldev] ++
7,651,180 UART: [ldev] CDI.KEYID = 6
7,652,139 UART: [ldev] SUBJECT.KEYID = 5
7,653,366 UART: [ldev] AUTHORITY.KEYID = 7
7,654,594 UART: [ldev] FE.KEYID = 1
7,665,149 UART: [ldev] Erasing FE.KEYID = 1
10,955,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,499 UART: [ldev] --
13,319,056 UART: [fwproc] Waiting for Commands...
13,322,014 UART: [fwproc] Received command 0x46574c44
13,324,191 UART: [fwproc] Received Image of size 118548 bytes
17,423,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,116 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,689 >>> mbox cmd response: success
17,906,689 UART: [afmc] ++
17,907,278 UART: [afmc] CDI.KEYID = 6
17,908,213 UART: [afmc] SUBJECT.KEYID = 7
17,909,421 UART: [afmc] AUTHORITY.KEYID = 5
21,222,296 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,132 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,318 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,702 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,410 UART: [afmc] --
23,590,094 UART: [cold-reset] --
23,594,775 UART: [state] Locking Datavault
23,598,235 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,929 UART: [state] Locking ICCM
23,601,371 UART: [exit] Launching FMC @ 0x40000130
23,609,784 UART:
23,610,022 UART: Running Caliptra FMC ...
23,611,121 UART:
23,611,274 UART: [state] CFI Enabled
23,618,857 UART: [fht] FMC Alias Private Key: 7
25,958,876 UART: [art] Extend RT PCRs Done
25,960,094 UART: [art] Lock RT PCRs Done
25,961,802 UART: [art] Populate DV Done
25,967,155 UART: [fht] FMC Alias Private Key: 7
25,968,684 UART: [art] Derive CDI
25,969,412 UART: [art] Store in slot 0x4
26,012,210 UART: [art] Derive Key Pair
26,013,248 UART: [art] Store priv key in slot 0x5
29,255,512 UART: [art] Derive Key Pair - Done
29,268,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,024 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,555 UART: [art] PUB.X = 8022DF7675987C700A86F147D8A894733CE93BE9E35AC224F693E1285C94D06ACF49D353F7EF805D59BC06759C93A9C5
31,557,815 UART: [art] PUB.Y = 5AB6B42183E7A6FEBC9FADC487EC012F56509B23F8A48AB4BAFC64F0C9540163D99B297AB9F0AA442A6584F06ADECDFF
31,565,093 UART: [art] SIG.R = AB2D40DD08E79FE987EB1F576642F805B15A8E3847D9C28D28C553B31FBA063473D14833BBA8C93C854ABD83DA42D679
31,572,476 UART: [art] SIG.S = AEF3C8CB0C24D7D2FB39F7C9A6177C9A8B32E140D9C7B82CC6FAB154AFB921A963FABD2A819D8C213527F959A68C0553
32,877,745 UART: Caliptra RT
32,878,458 UART: [state] CFI Enabled
33,010,914 UART: [rt] RT listening for mailbox commands...
33,012,761 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,042,596 UART: [rt]cmd =0x49444352, len=4
33,044,462 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
4,132,185 ready_for_fw is high
4,132,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,448 >>> mbox cmd response: success
23,802,137 UART:
23,802,550 UART: Running Caliptra FMC ...
23,803,695 UART:
23,803,856 UART: [state] CFI Enabled
23,811,854 UART: [fht] FMC Alias Private Key: 7
26,152,236 UART: [art] Extend RT PCRs Done
26,153,462 UART: [art] Lock RT PCRs Done
26,155,302 UART: [art] Populate DV Done
26,160,721 UART: [fht] FMC Alias Private Key: 7
26,162,255 UART: [art] Derive CDI
26,163,065 UART: [art] Store in slot 0x4
26,205,457 UART: [art] Derive Key Pair
26,206,501 UART: [art] Store priv key in slot 0x5
29,448,903 UART: [art] Derive Key Pair - Done
29,462,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,301 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,807 UART: [art] PUB.X = ED4FD05DF41C80A942AECB8AEFA5FE6045828B41815EDA3EFB3C1D5FB490C4E83839B69F78755B0D6E07808902EFCF57
31,751,063 UART: [art] PUB.Y = A20A240A501782C45DB62A2084B793D5E0680CD199ED9B1F7A37258DEBCB8B401E4E4EB737C052DE50366F2600AAF55F
31,758,307 UART: [art] SIG.R = 1B38D4B8FB8CA7914E847CD173B95637884396DC7C004530A23D484F02D534C968A318CA594ABA80181A965899E779F6
31,765,712 UART: [art] SIG.S = AA8C8EA49260B7F698F04DFA291509502B44CABE44CA899308D7236A6D45F57378ABD083456401648364A6AA637456CA
33,070,594 UART: Caliptra RT
33,071,318 UART: [state] CFI Enabled
33,204,212 UART: [rt] RT listening for mailbox commands...
33,206,061 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
33,235,788 UART: [rt]cmd =0x49444352, len=4
33,237,761 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,118 UART:
192,476 UART: Running Caliptra ROM ...
193,676 UART:
193,827 UART: [state] CFI Enabled
264,014 UART: [state] LifecycleState = Unprovisioned
265,951 UART: [state] DebugLocked = No
268,265 UART: [state] WD Timer not started. Device not locked for debugging
272,887 UART: [kat] SHA2-256
452,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,346 UART: [kat] ++
463,823 UART: [kat] sha1
475,136 UART: [kat] SHA2-256
477,831 UART: [kat] SHA2-384
483,473 UART: [kat] SHA2-512-ACC
485,835 UART: [kat] ECC-384
2,948,197 UART: [kat] HMAC-384Kdf
2,971,694 UART: [kat] LMS
3,448,197 UART: [kat] --
3,452,828 UART: [cold-reset] ++
3,454,758 UART: [fht] FHT @ 0x50003400
3,465,945 UART: [idev] ++
3,466,502 UART: [idev] CDI.KEYID = 6
3,467,529 UART: [idev] SUBJECT.KEYID = 7
3,468,717 UART: [idev] UDS.KEYID = 0
3,469,639 ready_for_fw is high
3,469,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,883 UART: [idev] Erasing UDS.KEYID = 0
5,987,684 UART: [idev] Sha1 KeyId Algorithm
6,011,019 UART: [idev] --
6,015,068 UART: [ldev] ++
6,015,649 UART: [ldev] CDI.KEYID = 6
6,016,591 UART: [ldev] SUBJECT.KEYID = 5
6,017,805 UART: [ldev] AUTHORITY.KEYID = 7
6,019,036 UART: [ldev] FE.KEYID = 1
6,056,205 UART: [ldev] Erasing FE.KEYID = 1
8,564,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,243 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,149 UART: [ldev] --
10,375,301 UART: [fwproc] Wait for Commands...
10,377,007 UART: [fwproc] Recv command 0x46574c44
10,379,047 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,359 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,604 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,130 >>> mbox cmd response: success
14,340,889 UART: [afmc] ++
14,341,505 UART: [afmc] CDI.KEYID = 6
14,342,583 UART: [afmc] SUBJECT.KEYID = 7
14,343,684 UART: [afmc] AUTHORITY.KEYID = 5
16,872,896 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,841 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,428 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,667,933 UART: [afmc] --
18,672,225 UART: [cold-reset] --
18,675,597 UART: [state] Locking Datavault
18,681,486 UART: [state] Locking PCR0, PCR1 and PCR31
18,683,235 UART: [state] Locking ICCM
18,685,705 UART: [exit] Launching FMC @ 0x40000130
18,694,150 UART:
18,694,384 UART: Running Caliptra FMC ...
18,695,480 UART:
18,695,643 UART: [state] CFI Enabled
18,750,378 UART: [fht] FMC Alias Private Key: 7
20,516,324 UART: [art] Extend RT PCRs Done
20,517,532 UART: [art] Lock RT PCRs Done
20,518,795 UART: [art] Populate DV Done
20,524,263 UART: [fht] FMC Alias Private Key: 7
20,525,802 UART: [art] Derive CDI
20,526,557 UART: [art] Store in slot 0x4
20,582,792 UART: [art] Derive Key Pair
20,583,862 UART: [art] Store priv key in slot 0x5
23,046,642 UART: [art] Derive Key Pair - Done
23,059,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,772,012 UART: [art] Erasing AUTHORITY.KEYID = 7
24,773,524 UART: [art] PUB.X = B18176C3384C8FC388FE091D51E2C3F20BAA967AA122C43D040A45400797951F8CA1C81816E4410211FAA4AE11E064A5
24,780,784 UART: [art] PUB.Y = 9F6E5DBA2C241337D85C1EE7407F34C65066707D23641880951EED2CEA2A9E89537D8DD9B17CD9C89FADDC16120F3B1F
24,788,016 UART: [art] SIG.R = 6D04C9E9CA15364496A7318E0E4112B474B1FE332B95D8EB24B7C68BB83E534FA5F4E249FA49F9553EAA1046FB7FAE64
24,795,454 UART: [art] SIG.S = 749B3AEC472A2EBF5CE59E513A18BB21D6207E3CBF173D8208AB73CC2B7C909BF7929389B0D8A1B16485D051FFCE2994
25,774,242 UART: Caliptra RT
25,774,946 UART: [state] CFI Enabled
25,956,078 UART: [rt] RT listening for mailbox commands...
25,957,942 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,987,559 UART: [rt]cmd =0x49444352, len=4
25,989,172 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,463,481 ready_for_fw is high
3,464,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,246,083 >>> mbox cmd response: success
18,529,807 UART:
18,530,213 UART: Running Caliptra FMC ...
18,531,517 UART:
18,531,688 UART: [state] CFI Enabled
18,601,957 UART: [fht] FMC Alias Private Key: 7
20,368,712 UART: [art] Extend RT PCRs Done
20,369,943 UART: [art] Lock RT PCRs Done
20,371,674 UART: [art] Populate DV Done
20,377,149 UART: [fht] FMC Alias Private Key: 7
20,378,690 UART: [art] Derive CDI
20,379,520 UART: [art] Store in slot 0x4
20,435,810 UART: [art] Derive Key Pair
20,436,887 UART: [art] Store priv key in slot 0x5
22,901,627 UART: [art] Derive Key Pair - Done
22,914,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,056 UART: [art] PUB.X = 7B153CF029A03D28DF8D62514E0C5B876011FA6ECC4089708D32E182627BA90730C46A27C41E71CE0B227372192C7DBE
24,636,264 UART: [art] PUB.Y = 3CC0DECA3BA9ADAAC6CEBDFC3A6B028976C20C2CB1B18A6A2430AA601C1754E3BAC80064837C0411965480F81573DFFB
24,643,571 UART: [art] SIG.R = 5807BEC3F8B0FB75E4B09A366F8D1F0D4AEE9438B306790C0DB39110DF51815CD7B97E40A9CB477B3B2090A483A89A60
24,650,913 UART: [art] SIG.S = 4C42923748EA88ABE4C33A968849FD414DDAD44F72385289517FA3E98C4B20F60A13A2C3BB9FEF6C5676B8E7790DBCFA
25,629,795 UART: Caliptra RT
25,630,501 UART: [state] CFI Enabled
25,811,252 UART: [rt] RT listening for mailbox commands...
25,813,102 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,842,995 UART: [rt]cmd =0x49444352, len=4
25,844,666 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,382 UART:
192,759 UART: Running Caliptra ROM ...
193,885 UART:
603,432 UART: [state] CFI Enabled
619,942 UART: [state] LifecycleState = Unprovisioned
621,905 UART: [state] DebugLocked = No
623,459 UART: [state] WD Timer not started. Device not locked for debugging
626,653 UART: [kat] SHA2-256
806,286 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,079 UART: [kat] ++
817,574 UART: [kat] sha1
827,882 UART: [kat] SHA2-256
830,541 UART: [kat] SHA2-384
836,391 UART: [kat] SHA2-512-ACC
838,779 UART: [kat] ECC-384
3,280,046 UART: [kat] HMAC-384Kdf
3,292,295 UART: [kat] LMS
3,768,769 UART: [kat] --
3,771,274 UART: [cold-reset] ++
3,772,567 UART: [fht] FHT @ 0x50003400
3,784,020 UART: [idev] ++
3,784,608 UART: [idev] CDI.KEYID = 6
3,785,521 UART: [idev] SUBJECT.KEYID = 7
3,786,770 UART: [idev] UDS.KEYID = 0
3,787,698 ready_for_fw is high
3,787,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,835 UART: [idev] Erasing UDS.KEYID = 0
6,267,173 UART: [idev] Sha1 KeyId Algorithm
6,291,643 UART: [idev] --
6,296,938 UART: [ldev] ++
6,297,593 UART: [ldev] CDI.KEYID = 6
6,298,510 UART: [ldev] SUBJECT.KEYID = 5
6,299,675 UART: [ldev] AUTHORITY.KEYID = 7
6,300,909 UART: [ldev] FE.KEYID = 1
6,311,341 UART: [ldev] Erasing FE.KEYID = 1
8,787,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,392 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,738 UART: [ldev] --
10,580,913 UART: [fwproc] Wait for Commands...
10,583,078 UART: [fwproc] Recv command 0x46574c44
10,585,066 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,561 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,553 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,256 >>> mbox cmd response: success
14,547,879 UART: [afmc] ++
14,548,488 UART: [afmc] CDI.KEYID = 6
14,549,404 UART: [afmc] SUBJECT.KEYID = 7
14,550,623 UART: [afmc] AUTHORITY.KEYID = 5
17,056,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,872 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,533 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,757 UART: [afmc] --
18,855,571 UART: [cold-reset] --
18,858,732 UART: [state] Locking Datavault
18,864,097 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,877 UART: [state] Locking ICCM
18,867,921 UART: [exit] Launching FMC @ 0x40000130
18,876,319 UART:
18,876,556 UART: Running Caliptra FMC ...
18,877,661 UART:
18,877,817 UART: [state] CFI Enabled
18,886,026 UART: [fht] FMC Alias Private Key: 7
20,652,198 UART: [art] Extend RT PCRs Done
20,653,417 UART: [art] Lock RT PCRs Done
20,655,171 UART: [art] Populate DV Done
20,660,437 UART: [fht] FMC Alias Private Key: 7
20,662,036 UART: [art] Derive CDI
20,662,856 UART: [art] Store in slot 0x4
20,705,508 UART: [art] Derive Key Pair
20,706,509 UART: [art] Store priv key in slot 0x5
23,133,405 UART: [art] Derive Key Pair - Done
23,146,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,865 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,367 UART: [art] PUB.X = CE31E629995F6FBC7C4B1EAE9C7CB9B2C0AAB91BE1F4DEFB98A08683A8D4807970C74C16548B1CC5EE2A80687853C46E
24,861,667 UART: [art] PUB.Y = BEE3189DBCECC0671BB89F602E0E0CE2D57116E71185DDD3AE42B2AA24D60670B76BBD63615CC600C870301284E9A70D
24,868,950 UART: [art] SIG.R = 2C894A6D47EA26276C102781CB07226E3F662618B5A9F23F151E84223F2DC653727446A8410CBBFA54B65F9FB2E0A8A6
24,876,289 UART: [art] SIG.S = 24C31B5B7B13AA034A403E306B2F63CA789BDAF5927F98D1A1163852561270E2F3132BA8EBE85B1C99D9F5F5809CA637
25,854,804 UART: Caliptra RT
25,855,511 UART: [state] CFI Enabled
25,988,292 UART: [rt] RT listening for mailbox commands...
25,990,138 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,019,852 UART: [rt]cmd =0x49444352, len=4
26,021,719 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,784,170 ready_for_fw is high
3,784,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,603 >>> mbox cmd response: success
18,699,541 UART:
18,699,928 UART: Running Caliptra FMC ...
18,701,127 UART:
18,701,301 UART: [state] CFI Enabled
18,709,520 UART: [fht] FMC Alias Private Key: 7
20,475,734 UART: [art] Extend RT PCRs Done
20,476,947 UART: [art] Lock RT PCRs Done
20,478,576 UART: [art] Populate DV Done
20,483,996 UART: [fht] FMC Alias Private Key: 7
20,485,650 UART: [art] Derive CDI
20,486,471 UART: [art] Store in slot 0x4
20,529,120 UART: [art] Derive Key Pair
20,530,129 UART: [art] Store priv key in slot 0x5
22,956,629 UART: [art] Derive Key Pair - Done
22,969,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,887 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,418 UART: [art] PUB.X = A289DA5DAF2B48F3F770F9951D43183C21C887B1DE533748844F3DAEAEC943A9F804AC140D622F72C6394319BE9CA4D1
24,684,687 UART: [art] PUB.Y = F67171D503D8F7E669EA29429DAB5B4D073B2EB1971C2757D756A3ADE70237352DA01A0938CAFF2A1048A30992CC7B92
24,691,952 UART: [art] SIG.R = 4FD2643BD4D40BB0C665E7580D1F085B407E83A273044C8563F2F61C4BAAA3574C1E8788C08875000BD0F3B9A97E8855
24,699,313 UART: [art] SIG.S = F0A462EB3BD473EB19063DAD46C9F46505A3A453DB4920F70FC1BA265196845F57E1E91AF58B0F32B0B9F5C443407511
25,678,724 UART: Caliptra RT
25,679,429 UART: [state] CFI Enabled
25,813,220 UART: [rt] RT listening for mailbox commands...
25,815,065 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
25,844,784 UART: [rt]cmd =0x49444352, len=4
25,846,535 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,136 UART:
192,496 UART: Running Caliptra ROM ...
193,685 UART:
193,841 UART: [state] CFI Enabled
266,759 UART: [state] LifecycleState = Unprovisioned
269,177 UART: [state] DebugLocked = No
271,639 UART: [state] WD Timer not started. Device not locked for debugging
275,815 UART: [kat] SHA2-256
465,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,447 UART: [kat] ++
476,976 UART: [kat] sha1
489,165 UART: [kat] SHA2-256
492,139 UART: [kat] SHA2-384
497,706 UART: [kat] SHA2-512-ACC
500,283 UART: [kat] ECC-384
2,947,930 UART: [kat] HMAC-384Kdf
2,969,712 UART: [kat] LMS
3,501,478 UART: [kat] --
3,506,178 UART: [cold-reset] ++
3,508,318 UART: [fht] FHT @ 0x50003400
3,519,871 UART: [idev] ++
3,520,617 UART: [idev] CDI.KEYID = 6
3,521,530 UART: [idev] SUBJECT.KEYID = 7
3,522,774 UART: [idev] UDS.KEYID = 0
3,523,693 ready_for_fw is high
3,523,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,813 UART: [idev] Erasing UDS.KEYID = 0
6,024,440 UART: [idev] Sha1 KeyId Algorithm
6,046,704 UART: [idev] --
6,051,402 UART: [ldev] ++
6,052,083 UART: [ldev] CDI.KEYID = 6
6,053,049 UART: [ldev] SUBJECT.KEYID = 5
6,054,205 UART: [ldev] AUTHORITY.KEYID = 7
6,055,431 UART: [ldev] FE.KEYID = 1
6,097,514 UART: [ldev] Erasing FE.KEYID = 1
8,606,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,892 UART: [ldev] --
10,412,342 UART: [fwproc] Wait for Commands...
10,415,089 UART: [fwproc] Recv command 0x46574c44
10,417,396 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,986 >>> mbox cmd response: success
14,683,570 UART: [afmc] ++
14,684,293 UART: [afmc] CDI.KEYID = 6
14,685,408 UART: [afmc] SUBJECT.KEYID = 7
14,686,953 UART: [afmc] AUTHORITY.KEYID = 5
17,230,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,648 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,745 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,184 UART: [afmc] --
19,030,586 UART: [cold-reset] --
19,032,991 UART: [state] Locking Datavault
19,039,817 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,062 UART: [state] Locking ICCM
19,045,037 UART: [exit] Launching FMC @ 0x40000130
19,053,715 UART:
19,053,955 UART: Running Caliptra FMC ...
19,055,054 UART:
19,055,219 UART: [state] CFI Enabled
19,110,656 UART: [fht] FMC Alias Private Key: 7
20,877,084 UART: [art] Extend RT PCRs Done
20,878,438 UART: [art] Lock RT PCRs Done
20,880,251 UART: [art] Populate DV Done
20,885,604 UART: [fht] FMC Alias Private Key: 7
20,887,102 UART: [art] Derive CDI
20,887,913 UART: [art] Store in slot 0x4
20,943,214 UART: [art] Derive Key Pair
20,944,208 UART: [art] Store priv key in slot 0x5
23,407,317 UART: [art] Derive Key Pair - Done
23,420,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,814 UART: [art] Erasing AUTHORITY.KEYID = 7
25,134,320 UART: [art] PUB.X = 940AF4A82C97E548242C258D81D95029DAF9F1962D945D7D97C476DDED262DDB9C6E4DEBB3306CB47ADE1D9218352D45
25,141,582 UART: [art] PUB.Y = DCC6437553A11022A6B2FA16A0181F5C77CF06AECE7E9F3E48D20367CF35000DB496C115D8C49997DB58CAD79E512016
25,148,822 UART: [art] SIG.R = B080B8FEEE69CA69473CF9142CE1C968B945739F72BB20D4225DAB599F1CEBA141B6F4CA55E9533E307DEB696EA89E40
25,156,219 UART: [art] SIG.S = D45A5F82162F5EC22433E09E4EED81331CE92D4EB64EFF372EA1449EDDC1CF72B08F4242A328EC1606DB4CDBD9305CEB
26,135,085 UART: Caliptra RT
26,135,800 UART: [state] CFI Enabled
26,316,946 UART: [rt] RT listening for mailbox commands...
26,318,973 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,348,806 UART: [rt]cmd =0x49444352, len=4
26,350,598 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,440,105 ready_for_fw is high
3,440,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,829,260 >>> mbox cmd response: success
19,114,599 UART:
19,114,992 UART: Running Caliptra FMC ...
19,116,198 UART:
19,116,370 UART: [state] CFI Enabled
19,183,138 UART: [fht] FMC Alias Private Key: 7
20,949,571 UART: [art] Extend RT PCRs Done
20,950,803 UART: [art] Lock RT PCRs Done
20,952,491 UART: [art] Populate DV Done
20,958,012 UART: [fht] FMC Alias Private Key: 7
20,959,553 UART: [art] Derive CDI
20,960,367 UART: [art] Store in slot 0x4
21,016,008 UART: [art] Derive Key Pair
21,017,061 UART: [art] Store priv key in slot 0x5
23,478,753 UART: [art] Derive Key Pair - Done
23,491,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,339 UART: [art] PUB.X = C6E2B5B9BC514BB8282D390E1C651D7D0765ED1A3B293241595F51A53D4B7C3792813A9F96D3170BE4DA8EC46D8B3039
25,213,570 UART: [art] PUB.Y = A5E07B40D83E87E8FD0E39FDB8B2531989E65B4428983219414BF81CA21D61095BC869B1BA08444FEC91C27D45F76EDE
25,220,843 UART: [art] SIG.R = C1ECCD090E3E11F7FEF94AFEDD3F293E6075F5FBD4F7A3D3C05C9F00BE260875B875473AEC5C3DBB700D1644F5A0C3E5
25,228,250 UART: [art] SIG.S = B0AB7E16BB918EB1566DA5AD3C8741BE51776DCC01A18B10353BB8C8FA2ED2B40E93430266AD719447B537ABC0E73048
26,207,528 UART: Caliptra RT
26,208,237 UART: [state] CFI Enabled
26,388,987 UART: [rt] RT listening for mailbox commands...
26,390,845 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,420,626 UART: [rt]cmd =0x49444352, len=4
26,422,242 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,476 UART:
192,840 UART: Running Caliptra ROM ...
194,032 UART:
603,809 UART: [state] CFI Enabled
618,994 UART: [state] LifecycleState = Unprovisioned
621,379 UART: [state] DebugLocked = No
624,193 UART: [state] WD Timer not started. Device not locked for debugging
629,599 UART: [kat] SHA2-256
819,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,275 UART: [kat] ++
830,786 UART: [kat] sha1
843,798 UART: [kat] SHA2-256
846,815 UART: [kat] SHA2-384
852,315 UART: [kat] SHA2-512-ACC
854,907 UART: [kat] ECC-384
3,297,448 UART: [kat] HMAC-384Kdf
3,310,965 UART: [kat] LMS
3,842,843 UART: [kat] --
3,846,543 UART: [cold-reset] ++
3,847,417 UART: [fht] FHT @ 0x50003400
3,858,046 UART: [idev] ++
3,858,768 UART: [idev] CDI.KEYID = 6
3,859,764 UART: [idev] SUBJECT.KEYID = 7
3,860,883 UART: [idev] UDS.KEYID = 0
3,861,870 ready_for_fw is high
3,862,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,030 UART: [idev] Erasing UDS.KEYID = 0
6,339,316 UART: [idev] Sha1 KeyId Algorithm
6,361,241 UART: [idev] --
6,366,046 UART: [ldev] ++
6,366,730 UART: [ldev] CDI.KEYID = 6
6,367,617 UART: [ldev] SUBJECT.KEYID = 5
6,368,781 UART: [ldev] AUTHORITY.KEYID = 7
6,370,067 UART: [ldev] FE.KEYID = 1
6,381,667 UART: [ldev] Erasing FE.KEYID = 1
8,854,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,722 UART: [ldev] --
10,647,538 UART: [fwproc] Wait for Commands...
10,650,249 UART: [fwproc] Recv command 0x46574c44
10,652,564 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,839 >>> mbox cmd response: success
14,924,576 UART: [afmc] ++
14,925,314 UART: [afmc] CDI.KEYID = 6
14,926,515 UART: [afmc] SUBJECT.KEYID = 7
14,927,962 UART: [afmc] AUTHORITY.KEYID = 5
17,435,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,802 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,735 UART: [afmc] --
19,229,636 UART: [cold-reset] --
19,233,515 UART: [state] Locking Datavault
19,239,485 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,705 UART: [state] Locking ICCM
19,242,998 UART: [exit] Launching FMC @ 0x40000130
19,251,690 UART:
19,251,938 UART: Running Caliptra FMC ...
19,253,042 UART:
19,253,206 UART: [state] CFI Enabled
19,261,202 UART: [fht] FMC Alias Private Key: 7
21,027,606 UART: [art] Extend RT PCRs Done
21,028,846 UART: [art] Lock RT PCRs Done
21,030,592 UART: [art] Populate DV Done
21,036,281 UART: [fht] FMC Alias Private Key: 7
21,037,817 UART: [art] Derive CDI
21,038,612 UART: [art] Store in slot 0x4
21,081,322 UART: [art] Derive Key Pair
21,082,332 UART: [art] Store priv key in slot 0x5
23,509,718 UART: [art] Derive Key Pair - Done
23,522,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,150 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,652 UART: [art] PUB.X = FFBD73E141A044DD374E78A50D4EAFA7986BC825C4AD603EB2FFAE000A08B67743963CF29C60CF03748E59BBE0C0FA27
25,237,925 UART: [art] PUB.Y = 891E26C5E9D75C0358F383E2F66FCF9CDD52DD4094E87B5706FA4BAE3FDB1DEFD9008D96E8840EA66FCF9282ABD9A328
25,245,181 UART: [art] SIG.R = D86C2F1D732765879DF5D26CF31E67C240468341137EB4CD3CB9750E08D7C5753031D603D1EDC23D9B350CFC54B8DE4C
25,252,567 UART: [art] SIG.S = 0C9D1C1C91BC3D5C8959F1AD74487DFB72579E02A441A1A1334836CB15F2D9F43EEF5B3C136E056960DCFD3201395FFB
26,231,006 UART: Caliptra RT
26,231,698 UART: [state] CFI Enabled
26,365,087 UART: [rt] RT listening for mailbox commands...
26,366,935 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,396,763 UART: [rt]cmd =0x49444352, len=4
26,398,692 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,755,141 ready_for_fw is high
3,755,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,196 >>> mbox cmd response: success
19,301,729 UART:
19,302,123 UART: Running Caliptra FMC ...
19,303,267 UART:
19,303,436 UART: [state] CFI Enabled
19,311,120 UART: [fht] FMC Alias Private Key: 7
21,077,167 UART: [art] Extend RT PCRs Done
21,078,402 UART: [art] Lock RT PCRs Done
21,079,877 UART: [art] Populate DV Done
21,085,288 UART: [fht] FMC Alias Private Key: 7
21,086,954 UART: [art] Derive CDI
21,087,786 UART: [art] Store in slot 0x4
21,130,725 UART: [art] Derive Key Pair
21,131,766 UART: [art] Store priv key in slot 0x5
23,558,857 UART: [art] Derive Key Pair - Done
23,571,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,955 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,467 UART: [art] PUB.X = 6BE5CC3234E6526A09D86D0D37AD89C9F7BE9E7E1127574501B33E5B87F5E0E53E9C80FCFEE6B128F802DB1CEFD99445
25,286,741 UART: [art] PUB.Y = 20C1D5BAE99A537E1FA6012E5BB24025223E213034E80CBF11ED26CA4DE8DB8FC3E9DA702705FEF1D4DF7ED4528FEA3F
25,294,022 UART: [art] SIG.R = EC23E90BF511307DF7CB0E9D6959065285873B6C1B4C34EE1BE5458F122749DB11070DA9C033E517618F8045248E6110
25,301,402 UART: [art] SIG.S = 45F595700FD1292F7285911D6E65554D88CBBD1C20892BF40205366FEA65F2EDA88B847EC072E86DCF3E44EDE269966A
26,280,174 UART: Caliptra RT
26,280,866 UART: [state] CFI Enabled
26,413,883 UART: [rt] RT listening for mailbox commands...
26,415,753 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
26,445,560 UART: [rt]cmd =0x49444352, len=4
26,447,561 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,114 UART: [kat] SHA2-512-ACC
897,015 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
907,058 UART: [kat] LMS
1,475,254 UART: [kat] --
1,476,199 UART: [cold-reset] ++
1,476,621 UART: [fht] Storing FHT @ 0x50003400
1,479,384 UART: [idev] ++
1,479,552 UART: [idev] CDI.KEYID = 6
1,479,912 UART: [idev] SUBJECT.KEYID = 7
1,480,336 UART: [idev] UDS.KEYID = 0
1,480,681 ready_for_fw is high
1,480,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,266 UART: [idev] --
1,514,409 UART: [ldev] ++
1,514,577 UART: [ldev] CDI.KEYID = 6
1,514,940 UART: [ldev] SUBJECT.KEYID = 5
1,515,366 UART: [ldev] AUTHORITY.KEYID = 7
1,515,829 UART: [ldev] FE.KEYID = 1
1,521,091 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,403 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,010 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,802 UART: [ldev] --
1,586,301 UART: [fwproc] Waiting for Commands...
1,586,934 UART: [fwproc] Received command 0x46574c44
1,587,725 UART: [fwproc] Received Image of size 118548 bytes
2,932,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,867 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,316 >>> mbox cmd response: success
3,131,386 UART: [afmc] ++
3,131,554 UART: [afmc] CDI.KEYID = 6
3,131,916 UART: [afmc] SUBJECT.KEYID = 7
3,132,341 UART: [afmc] AUTHORITY.KEYID = 5
3,167,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,226 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,935 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,818 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,501 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,385 UART: [afmc] --
3,210,507 UART: [cold-reset] --
3,211,303 UART: [state] Locking Datavault
3,212,476 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,080 UART: [state] Locking ICCM
3,213,634 UART: [exit] Launching FMC @ 0x40000130
3,218,964 UART:
3,218,980 UART: Running Caliptra FMC ...
3,219,388 UART:
3,219,442 UART: [state] CFI Enabled
3,229,590 UART: [fht] FMC Alias Private Key: 7
3,348,782 UART: [art] Extend RT PCRs Done
3,349,210 UART: [art] Lock RT PCRs Done
3,350,774 UART: [art] Populate DV Done
3,359,013 UART: [fht] FMC Alias Private Key: 7
3,360,001 UART: [art] Derive CDI
3,360,281 UART: [art] Store in slot 0x4
3,446,187 UART: [art] Derive Key Pair
3,446,547 UART: [art] Store priv key in slot 0x5
3,459,888 UART: [art] Derive Key Pair - Done
3,474,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,912 UART: [art] PUB.X = C51759E4EC65AB7F8129AF91917A5C8B6B3C1763F6458E1E64837A35CBB6602CED70B0B3ABB9E4692DFDC4432091D877
3,497,690 UART: [art] PUB.Y = 747B0DA41F0249238F4F7BFA82045EB6707146BF926D0962A0D78C72ED3D308E85ACF0C75ED065488AE8B4382F9995A6
3,504,630 UART: [art] SIG.R = 73A8533ABE50B89E113A2C706110E2F208CD231C2873E55FD29396C8CC2656D936595D9238CCEB26FAA1B932302E7420
3,511,395 UART: [art] SIG.S = B0E01307587C3A7B20002AC72C4585D8CCACD356CECA05D201B49E7F23F61A212C527A3D09ABCAD5B14AB5D386506557
3,535,481 UART: Caliptra RT
3,535,732 UART: [state] CFI Enabled
3,655,912 UART: [rt] RT listening for mailbox commands...
3,656,582 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,422 UART: [rt]cmd =0x49444352, len=4
3,687,563 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,907 ready_for_fw is high
1,362,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,418 >>> mbox cmd response: success
3,043,099 UART:
3,043,115 UART: Running Caliptra FMC ...
3,043,523 UART:
3,043,577 UART: [state] CFI Enabled
3,053,677 UART: [fht] FMC Alias Private Key: 7
3,173,197 UART: [art] Extend RT PCRs Done
3,173,625 UART: [art] Lock RT PCRs Done
3,174,651 UART: [art] Populate DV Done
3,183,000 UART: [fht] FMC Alias Private Key: 7
3,184,044 UART: [art] Derive CDI
3,184,324 UART: [art] Store in slot 0x4
3,269,998 UART: [art] Derive Key Pair
3,270,358 UART: [art] Store priv key in slot 0x5
3,283,585 UART: [art] Derive Key Pair - Done
3,298,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,286 UART: [art] PUB.X = C26FC5DB59DE31DB0DF478A928D3718FA6A9263E600408A0256F35B0BFBA34430F32EC088F29147600BEAB65F09B5F71
3,321,027 UART: [art] PUB.Y = 900CB9FDAF9ECFB7ACDD8910E3373B953184E6BBC2B68A4959CE6AFF407A504219331FEC3B8659349360F56DBB3199FD
3,327,988 UART: [art] SIG.R = 4D9D3A88A1C2FE4FD9C87E47252B156A24061BBBFB0B70755D4342CC94A5F84B38F1A0F2B2BB0381BA6E13813C0FAD92
3,334,760 UART: [art] SIG.S = B1398FBA1DF26BE536BCB5CAC8708ACDE260200911656A581D9E7CF2C16446BB71F36A7E8A0900CE63F9812183665772
3,358,512 UART: Caliptra RT
3,358,763 UART: [state] CFI Enabled
3,479,261 UART: [rt] RT listening for mailbox commands...
3,479,931 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,801 UART: [rt]cmd =0x49444352, len=4
3,511,036 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,006 UART: [kat] SHA2-256
881,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,052 UART: [kat] ++
886,204 UART: [kat] sha1
890,372 UART: [kat] SHA2-256
892,310 UART: [kat] SHA2-384
894,935 UART: [kat] SHA2-512-ACC
896,836 UART: [kat] ECC-384
902,337 UART: [kat] HMAC-384Kdf
906,945 UART: [kat] LMS
1,475,141 UART: [kat] --
1,476,028 UART: [cold-reset] ++
1,476,444 UART: [fht] Storing FHT @ 0x50003400
1,479,263 UART: [idev] ++
1,479,431 UART: [idev] CDI.KEYID = 6
1,479,791 UART: [idev] SUBJECT.KEYID = 7
1,480,215 UART: [idev] UDS.KEYID = 0
1,480,560 ready_for_fw is high
1,480,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,209 UART: [idev] Erasing UDS.KEYID = 0
1,504,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,435 UART: [idev] --
1,514,460 UART: [ldev] ++
1,514,628 UART: [ldev] CDI.KEYID = 6
1,514,991 UART: [ldev] SUBJECT.KEYID = 5
1,515,417 UART: [ldev] AUTHORITY.KEYID = 7
1,515,880 UART: [ldev] FE.KEYID = 1
1,521,410 UART: [ldev] Erasing FE.KEYID = 1
1,546,721 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,645 UART: [ldev] --
1,585,950 UART: [fwproc] Waiting for Commands...
1,586,609 UART: [fwproc] Received command 0x46574c44
1,587,400 UART: [fwproc] Received Image of size 118548 bytes
2,931,296 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,450 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,981 >>> mbox cmd response: success
3,131,155 UART: [afmc] ++
3,131,323 UART: [afmc] CDI.KEYID = 6
3,131,685 UART: [afmc] SUBJECT.KEYID = 7
3,132,110 UART: [afmc] AUTHORITY.KEYID = 5
3,167,597 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,556 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,439 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,122 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,192 UART: [afmc] --
3,211,232 UART: [cold-reset] --
3,211,972 UART: [state] Locking Datavault
3,212,809 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,413 UART: [state] Locking ICCM
3,214,073 UART: [exit] Launching FMC @ 0x40000130
3,219,403 UART:
3,219,419 UART: Running Caliptra FMC ...
3,219,827 UART:
3,219,970 UART: [state] CFI Enabled
3,230,512 UART: [fht] FMC Alias Private Key: 7
3,349,786 UART: [art] Extend RT PCRs Done
3,350,214 UART: [art] Lock RT PCRs Done
3,351,708 UART: [art] Populate DV Done
3,359,851 UART: [fht] FMC Alias Private Key: 7
3,360,847 UART: [art] Derive CDI
3,361,127 UART: [art] Store in slot 0x4
3,446,621 UART: [art] Derive Key Pair
3,446,981 UART: [art] Store priv key in slot 0x5
3,460,656 UART: [art] Derive Key Pair - Done
3,475,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,014 UART: [art] PUB.X = 4E472F706EEF04E8396BD9B94AEA13817F6BA98395978871D2360BCB44B68B394012B7A2F001DC142C34AAC0D8171A4A
3,498,779 UART: [art] PUB.Y = F1BA0E1E1B79E9A6FDEBD8B78AA896255E2FCF020DECE27B1703F8C0F4640ED6DE17EB2C4F48EEF14645CEFB530B69CB
3,505,741 UART: [art] SIG.R = 9EAAFA3007A2ED5B4BC64FDE5693AAB4D2E6F54EDEA87272720D6A3621430C3CBD6AF79C77EA8B440980988D2A728FAA
3,512,519 UART: [art] SIG.S = BF107C84F26FB6DBEF63AA2AA273E2EDE0085EC67A7011DE62A3202797E770090D4692B4DA096FB07B3CDF9A2D17D975
3,536,701 UART: Caliptra RT
3,537,044 UART: [state] CFI Enabled
3,657,643 UART: [rt] RT listening for mailbox commands...
3,658,313 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,293 UART: [rt]cmd =0x49444352, len=4
3,689,914 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,694 ready_for_fw is high
1,363,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,349 >>> mbox cmd response: success
3,041,570 UART:
3,041,586 UART: Running Caliptra FMC ...
3,041,994 UART:
3,042,137 UART: [state] CFI Enabled
3,052,921 UART: [fht] FMC Alias Private Key: 7
3,171,675 UART: [art] Extend RT PCRs Done
3,172,103 UART: [art] Lock RT PCRs Done
3,173,597 UART: [art] Populate DV Done
3,181,894 UART: [fht] FMC Alias Private Key: 7
3,182,900 UART: [art] Derive CDI
3,183,180 UART: [art] Store in slot 0x4
3,268,594 UART: [art] Derive Key Pair
3,268,954 UART: [art] Store priv key in slot 0x5
3,282,325 UART: [art] Derive Key Pair - Done
3,296,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,690 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,455 UART: [art] PUB.X = D4612C99B94B4A64253AC0D925BE3C2193B0F304F07C85C795BA0DFFED8C16EC70C7DDE59636B2DE9D03286B53D55BF8
3,320,230 UART: [art] PUB.Y = 4E72F562C3045C57AEB0F14C4068273F60C66EAD9D0CE9C46CFEA51A6BAB97835C8DFC459C69DEC58CD6BC38D14E3C91
3,327,194 UART: [art] SIG.R = FAD56184604C27FBFE70F9507C4372C2A7F1196C945E35580EDCC96DE39770BD45F3015523B89FFA1C084B7567F76E91
3,333,957 UART: [art] SIG.S = 593E6D1EB2348522E7B9ED4CB8F935A5B5107F6921E2693C28C5453D9108F0F6F766D1A2D66D769A33C9B77E2A50CCF4
3,357,354 UART: Caliptra RT
3,357,697 UART: [state] CFI Enabled
3,478,085 UART: [rt] RT listening for mailbox commands...
3,478,755 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,591 UART: [rt]cmd =0x49444352, len=4
3,509,940 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
87,978 UART: [kat] SHA2-256
891,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,632 UART: [kat] ++
895,784 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,661 UART: [kat] SHA2-512-ACC
906,562 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,615 UART: [kat] LMS
1,168,927 UART: [kat] --
1,169,866 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,857 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,710 UART: [ldev] ++
1,208,878 UART: [ldev] CDI.KEYID = 6
1,209,242 UART: [ldev] SUBJECT.KEYID = 5
1,209,669 UART: [ldev] AUTHORITY.KEYID = 7
1,210,132 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,679 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,639 UART: [fwproc] Wait for Commands...
1,281,372 UART: [fwproc] Recv command 0x46574c44
1,282,105 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,709 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,291 >>> mbox cmd response: success
2,824,539 UART: [afmc] ++
2,824,707 UART: [afmc] CDI.KEYID = 6
2,825,070 UART: [afmc] SUBJECT.KEYID = 7
2,825,496 UART: [afmc] AUTHORITY.KEYID = 5
2,861,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,245 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,126 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,827 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,660 UART: [afmc] --
2,904,563 UART: [cold-reset] --
2,905,213 UART: [state] Locking Datavault
2,906,312 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,916 UART: [state] Locking ICCM
2,907,478 UART: [exit] Launching FMC @ 0x40000130
2,912,808 UART:
2,912,824 UART: Running Caliptra FMC ...
2,913,232 UART:
2,913,286 UART: [state] CFI Enabled
2,923,500 UART: [fht] FMC Alias Private Key: 7
3,042,310 UART: [art] Extend RT PCRs Done
3,042,738 UART: [art] Lock RT PCRs Done
3,044,290 UART: [art] Populate DV Done
3,052,465 UART: [fht] FMC Alias Private Key: 7
3,053,547 UART: [art] Derive CDI
3,053,827 UART: [art] Store in slot 0x4
3,139,882 UART: [art] Derive Key Pair
3,140,242 UART: [art] Store priv key in slot 0x5
3,153,536 UART: [art] Derive Key Pair - Done
3,167,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,234 UART: [art] PUB.X = AB4C59F4A47038FBE8378DA3048709E4A47A1230F88F2B7BD11FFF3B0CBC8EB5C2B2E3B015D1E988253AEB6A6A047E6E
3,191,010 UART: [art] PUB.Y = 981364D9491EB3F6D08AE1A484C07A663D5FB6CFC047C61998EF3393A9AD41F5633BA0F0E87F8F54D925615D8E697E82
3,197,964 UART: [art] SIG.R = 5EFBC2A8581DF193AA2A9B2FF583924F257295610B3CBBBDAD793470DB046A7A4C0144140B9E273EEE0556C6AA1D8F10
3,204,731 UART: [art] SIG.S = A44F99EB79FCBACB0849AB6577EF7840BA37CD639A3A9D0B82AF027F6C4B4BE7B9B9714E76098EE8B19B20C2B7D7509F
3,228,727 UART: Caliptra RT
3,228,978 UART: [state] CFI Enabled
3,347,919 UART: [rt] RT listening for mailbox commands...
3,348,589 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,407 UART: [rt]cmd =0x49444352, len=4
3,379,600 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,696 ready_for_fw is high
1,058,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,002 >>> mbox cmd response: success
2,740,703 UART:
2,740,719 UART: Running Caliptra FMC ...
2,741,127 UART:
2,741,181 UART: [state] CFI Enabled
2,751,525 UART: [fht] FMC Alias Private Key: 7
2,871,007 UART: [art] Extend RT PCRs Done
2,871,435 UART: [art] Lock RT PCRs Done
2,872,921 UART: [art] Populate DV Done
2,881,376 UART: [fht] FMC Alias Private Key: 7
2,882,368 UART: [art] Derive CDI
2,882,648 UART: [art] Store in slot 0x4
2,968,373 UART: [art] Derive Key Pair
2,968,733 UART: [art] Store priv key in slot 0x5
2,982,233 UART: [art] Derive Key Pair - Done
2,997,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,644 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,409 UART: [art] PUB.X = 49D3E067507B822BC67C0A68374ABEBD5174714F4844B58DCCF64800587922B8B837BAB896B8B283D961AE6BA68B44C6
3,020,156 UART: [art] PUB.Y = 820331B60C37C0D531BDBD6140BC10C3FEECED1F1F1D85EB2192CE8157A715DB66733B7C07E41D593A2CD62B1B1E34CC
3,027,113 UART: [art] SIG.R = 80CFF0DFB7756F245626315D7366F643F12111FA14D11C7506D6F34CC690F684AA7AAF57ACD89205110061961FF19A2E
3,033,855 UART: [art] SIG.S = 8850420BF0DDE8ECE28D6AF0AA92A9F2871EBEC66352E9B8F6BB2E823465C22E871C2196CCD92EE72C74FC29672BE2CA
3,057,886 UART: Caliptra RT
3,058,137 UART: [state] CFI Enabled
3,178,599 UART: [rt] RT listening for mailbox commands...
3,179,269 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,009 UART: [rt]cmd =0x49444352, len=4
3,210,458 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,914 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
891,651 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,755 UART: [kat] ++
895,907 UART: [kat] sha1
900,169 UART: [kat] SHA2-256
902,109 UART: [kat] SHA2-384
904,874 UART: [kat] SHA2-512-ACC
906,775 UART: [kat] ECC-384
916,824 UART: [kat] HMAC-384Kdf
921,502 UART: [kat] LMS
1,169,814 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,957 UART: [fht] FHT @ 0x50003400
1,173,655 UART: [idev] ++
1,173,823 UART: [idev] CDI.KEYID = 6
1,174,184 UART: [idev] SUBJECT.KEYID = 7
1,174,609 UART: [idev] UDS.KEYID = 0
1,174,955 ready_for_fw is high
1,174,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,882 UART: [idev] Erasing UDS.KEYID = 0
1,200,556 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,307 UART: [ldev] ++
1,210,475 UART: [ldev] CDI.KEYID = 6
1,210,839 UART: [ldev] SUBJECT.KEYID = 5
1,211,266 UART: [ldev] AUTHORITY.KEYID = 7
1,211,729 UART: [ldev] FE.KEYID = 1
1,217,149 UART: [ldev] Erasing FE.KEYID = 1
1,243,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,449 UART: [ldev] --
1,282,824 UART: [fwproc] Wait for Commands...
1,283,403 UART: [fwproc] Recv command 0x46574c44
1,284,136 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,903 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,875 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,212 >>> mbox cmd response: success
2,828,470 UART: [afmc] ++
2,828,638 UART: [afmc] CDI.KEYID = 6
2,829,001 UART: [afmc] SUBJECT.KEYID = 7
2,829,427 UART: [afmc] AUTHORITY.KEYID = 5
2,865,078 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,675 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,134 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,015 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,716 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,515 UART: [afmc] --
2,908,488 UART: [cold-reset] --
2,909,220 UART: [state] Locking Datavault
2,910,475 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,079 UART: [state] Locking ICCM
2,911,701 UART: [exit] Launching FMC @ 0x40000130
2,917,031 UART:
2,917,047 UART: Running Caliptra FMC ...
2,917,455 UART:
2,917,598 UART: [state] CFI Enabled
2,928,410 UART: [fht] FMC Alias Private Key: 7
3,046,626 UART: [art] Extend RT PCRs Done
3,047,054 UART: [art] Lock RT PCRs Done
3,048,422 UART: [art] Populate DV Done
3,056,657 UART: [fht] FMC Alias Private Key: 7
3,057,617 UART: [art] Derive CDI
3,057,897 UART: [art] Store in slot 0x4
3,144,088 UART: [art] Derive Key Pair
3,144,448 UART: [art] Store priv key in slot 0x5
3,157,920 UART: [art] Derive Key Pair - Done
3,172,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,143 UART: [art] PUB.X = B88F3F45F6C73CC5FC46BDA89C3E387EBF3610BB96A652C8B1B62F3E37233965463E7609BC1C56AA89700A907AEC229F
3,195,917 UART: [art] PUB.Y = 252EB6F981B0AC8B5A65F4ABFBC847B91B1094B814F14B6D56990E32DF14AAE43BC7CFAA26C73F0C3434D3BA9524FE4A
3,202,881 UART: [art] SIG.R = 0431C950C98EF4173FAC8D47BC12EB99342EB8CFD37F2B4575C5CCF25C6ECDC0A4E500ED720F0D129E7B23E2AFDFF0EE
3,209,646 UART: [art] SIG.S = A13CE56CB60C39741CA452599F970A4713FF78F0571B84286C9E420A4626274D519A39154B605BCC4CC0C11C542DB40B
3,233,484 UART: Caliptra RT
3,233,827 UART: [state] CFI Enabled
3,353,476 UART: [rt] RT listening for mailbox commands...
3,354,146 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,892 UART: [rt]cmd =0x49444352, len=4
3,385,079 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,559 ready_for_fw is high
1,060,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,241 >>> mbox cmd response: success
2,742,200 UART:
2,742,216 UART: Running Caliptra FMC ...
2,742,624 UART:
2,742,767 UART: [state] CFI Enabled
2,753,495 UART: [fht] FMC Alias Private Key: 7
2,872,213 UART: [art] Extend RT PCRs Done
2,872,641 UART: [art] Lock RT PCRs Done
2,874,231 UART: [art] Populate DV Done
2,882,482 UART: [fht] FMC Alias Private Key: 7
2,883,586 UART: [art] Derive CDI
2,883,866 UART: [art] Store in slot 0x4
2,969,819 UART: [art] Derive Key Pair
2,970,179 UART: [art] Store priv key in slot 0x5
2,983,247 UART: [art] Derive Key Pair - Done
2,998,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,645 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,410 UART: [art] PUB.X = 353402EB139BC6C2223C13798976192B8A71AA853152454E8042F79B866ECA58798519E49E16300961C91573AEC73EB1
3,021,160 UART: [art] PUB.Y = BDDBF5BD953867498A027C516BA56A114130A986DA9452FC6272B53E87EC603D1D77DDFFD089DDE258092A7B5B41F6F9
3,028,114 UART: [art] SIG.R = B7EDA139F3481DB8A85B4126FEAE5E509575EFA8B7AFB8C18F4174BBDB630ECB26373879C8131C3B393918CA1BE9BE9F
3,034,899 UART: [art] SIG.S = 0F4DBF72A589060D3A60729D2D7CD4DEAADB9205F126B173D4972382AED042CAF3B1EC8E68FF4CF49C4DB7F40DF9ED9C
3,058,746 UART: Caliptra RT
3,059,089 UART: [state] CFI Enabled
3,179,508 UART: [rt] RT listening for mailbox commands...
3,180,178 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,742 UART: [rt]cmd =0x49444352, len=4
3,211,433 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
893,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,633 UART: [kat] ++
897,785 UART: [kat] sha1
902,269 UART: [kat] SHA2-256
904,209 UART: [kat] SHA2-384
906,876 UART: [kat] SHA2-512-ACC
908,777 UART: [kat] ECC-384
918,726 UART: [kat] HMAC-384Kdf
923,226 UART: [kat] LMS
1,171,554 UART: [kat] --
1,172,523 UART: [cold-reset] ++
1,172,901 UART: [fht] FHT @ 0x50003400
1,175,542 UART: [idev] ++
1,175,710 UART: [idev] CDI.KEYID = 6
1,176,070 UART: [idev] SUBJECT.KEYID = 7
1,176,494 UART: [idev] UDS.KEYID = 0
1,176,839 ready_for_fw is high
1,176,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,640 UART: [idev] Erasing UDS.KEYID = 0
1,201,393 UART: [idev] Sha1 KeyId Algorithm
1,209,797 UART: [idev] --
1,210,751 UART: [ldev] ++
1,210,919 UART: [ldev] CDI.KEYID = 6
1,211,282 UART: [ldev] SUBJECT.KEYID = 5
1,211,708 UART: [ldev] AUTHORITY.KEYID = 7
1,212,171 UART: [ldev] FE.KEYID = 1
1,217,477 UART: [ldev] Erasing FE.KEYID = 1
1,244,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,665 UART: [ldev] --
1,283,094 UART: [fwproc] Wait for Commands...
1,283,800 UART: [fwproc] Recv command 0x46574c44
1,284,528 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,605 >>> mbox cmd response: success
2,827,805 UART: [afmc] ++
2,827,973 UART: [afmc] CDI.KEYID = 6
2,828,335 UART: [afmc] SUBJECT.KEYID = 7
2,828,760 UART: [afmc] AUTHORITY.KEYID = 5
2,864,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,794 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,542 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,251 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,134 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,745 UART: [afmc] --
2,907,831 UART: [cold-reset] --
2,908,673 UART: [state] Locking Datavault
2,910,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,610 UART: [state] Locking ICCM
2,911,044 UART: [exit] Launching FMC @ 0x40000130
2,916,374 UART:
2,916,390 UART: Running Caliptra FMC ...
2,916,798 UART:
2,916,852 UART: [state] CFI Enabled
2,927,298 UART: [fht] FMC Alias Private Key: 7
3,046,220 UART: [art] Extend RT PCRs Done
3,046,648 UART: [art] Lock RT PCRs Done
3,048,170 UART: [art] Populate DV Done
3,056,303 UART: [fht] FMC Alias Private Key: 7
3,057,435 UART: [art] Derive CDI
3,057,715 UART: [art] Store in slot 0x4
3,143,660 UART: [art] Derive Key Pair
3,144,020 UART: [art] Store priv key in slot 0x5
3,157,244 UART: [art] Derive Key Pair - Done
3,171,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,696 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,461 UART: [art] PUB.X = FF86867FB58389670D9C920B821261B4EE13B64E491CDEF29C801CDC2C6DB1BD4527E802D43631B45F4D578EBC122BB6
3,195,230 UART: [art] PUB.Y = 5F1AA848411400B2C2E730F24B157AC5340EEDDFB96B57498A9FE7B132548FFC872C2D70296F2216FAB1DE2E2D58A6A0
3,202,165 UART: [art] SIG.R = C3E3E44562072ECA0E5AD0891FD9DE25BACFC2A100DC4F69908015AEC2DBFDBA99C26875A76FEF6A012D99C70678E7C6
3,208,921 UART: [art] SIG.S = 55E31CE631BB1CA835BDE79A84ACF1104B13E7203C32C7CC65E15A05063E6D2884BEF43DF28F8870E844655D51A56780
3,232,849 UART: Caliptra RT
3,233,100 UART: [state] CFI Enabled
3,352,187 UART: [rt] RT listening for mailbox commands...
3,352,857 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,863 UART: [rt]cmd =0x49444352, len=4
3,383,958 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 ready_for_fw is high
1,060,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,402 >>> mbox cmd response: success
2,741,643 UART:
2,741,659 UART: Running Caliptra FMC ...
2,742,067 UART:
2,742,121 UART: [state] CFI Enabled
2,752,821 UART: [fht] FMC Alias Private Key: 7
2,871,751 UART: [art] Extend RT PCRs Done
2,872,179 UART: [art] Lock RT PCRs Done
2,873,735 UART: [art] Populate DV Done
2,881,812 UART: [fht] FMC Alias Private Key: 7
2,882,994 UART: [art] Derive CDI
2,883,274 UART: [art] Store in slot 0x4
2,969,225 UART: [art] Derive Key Pair
2,969,585 UART: [art] Store priv key in slot 0x5
2,983,141 UART: [art] Derive Key Pair - Done
2,998,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,782 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,547 UART: [art] PUB.X = FEBB0F3552FA2D94303EA141A6C1541D6F840EE013739ACBA02B08D6058DB5AE0C4E6E98A106948FE4E5BBAD44828819
3,021,311 UART: [art] PUB.Y = 7FE0DBEB485D867BA8DEA48F49C5EA237CA7DE0BE3490AF2483D7B10743131ACEB431F806918343A5DB8D93518ED5859
3,028,267 UART: [art] SIG.R = 3FE9B3B3621D950800D88D236A387EB5826C2F13FC317CD032EFC12C0B541A8F33F0E7AB983888DED7BB90EA8A855B1C
3,035,021 UART: [art] SIG.S = 0CB1B49A061D6F387EAFAFBEA3E0517FC493E571E6C8C6FB564EEF0FDB65F5AA962A062472C02CC5290BBDEC25B7D31A
3,059,160 UART: Caliptra RT
3,059,411 UART: [state] CFI Enabled
3,178,367 UART: [rt] RT listening for mailbox commands...
3,179,037 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,633 UART: [rt]cmd =0x49444352, len=4
3,209,834 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,274 UART: [kat] SHA2-256
904,214 UART: [kat] SHA2-384
907,091 UART: [kat] SHA2-512-ACC
908,992 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,467 UART: [kat] LMS
1,171,795 UART: [kat] --
1,172,532 UART: [cold-reset] ++
1,172,966 UART: [fht] FHT @ 0x50003400
1,175,645 UART: [idev] ++
1,175,813 UART: [idev] CDI.KEYID = 6
1,176,173 UART: [idev] SUBJECT.KEYID = 7
1,176,597 UART: [idev] UDS.KEYID = 0
1,176,942 ready_for_fw is high
1,176,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,556 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,211,078 UART: [ldev] ++
1,211,246 UART: [ldev] CDI.KEYID = 6
1,211,609 UART: [ldev] SUBJECT.KEYID = 5
1,212,035 UART: [ldev] AUTHORITY.KEYID = 7
1,212,498 UART: [ldev] FE.KEYID = 1
1,217,998 UART: [ldev] Erasing FE.KEYID = 1
1,244,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,642 UART: [ldev] --
1,283,127 UART: [fwproc] Wait for Commands...
1,283,941 UART: [fwproc] Recv command 0x46574c44
1,284,669 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,372 >>> mbox cmd response: success
2,829,620 UART: [afmc] ++
2,829,788 UART: [afmc] CDI.KEYID = 6
2,830,150 UART: [afmc] SUBJECT.KEYID = 7
2,830,575 UART: [afmc] AUTHORITY.KEYID = 5
2,865,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,485 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,194 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,077 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,778 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,686 UART: [afmc] --
2,908,788 UART: [cold-reset] --
2,909,672 UART: [state] Locking Datavault
2,911,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,693 UART: [state] Locking ICCM
2,912,323 UART: [exit] Launching FMC @ 0x40000130
2,917,653 UART:
2,917,669 UART: Running Caliptra FMC ...
2,918,077 UART:
2,918,220 UART: [state] CFI Enabled
2,928,848 UART: [fht] FMC Alias Private Key: 7
3,047,608 UART: [art] Extend RT PCRs Done
3,048,036 UART: [art] Lock RT PCRs Done
3,049,502 UART: [art] Populate DV Done
3,057,979 UART: [fht] FMC Alias Private Key: 7
3,059,137 UART: [art] Derive CDI
3,059,417 UART: [art] Store in slot 0x4
3,145,278 UART: [art] Derive Key Pair
3,145,638 UART: [art] Store priv key in slot 0x5
3,158,704 UART: [art] Derive Key Pair - Done
3,173,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,373 UART: [art] PUB.X = F4DB94E2F28699AFCAFBE5FEFDF2FE4DAA8CE075FCAA5E02B98FD59702A171A4D44388A347ADCCC559D7D4D87C990E0D
3,196,163 UART: [art] PUB.Y = 8F95003F22AB1B1ED430C15AFED8E585A79673DFA6DF57F00BABC764DCA30CFE872413A46FA7C25D94808A06A33CB833
3,203,098 UART: [art] SIG.R = 1BF39F4788B4AABE133924F9ADA8E75DDD8C786D116FC309CB6EBA2A4B81D95873ADDA2C556DBCCFF92F87AACEAEB7FB
3,209,901 UART: [art] SIG.S = 5F3D5EBF1E27A2550FA9D37A8C2A8E58283CA7151A432CCECE0A80CF32EC060C2DC5C4AADE541125FC41CCA5B7FBD2DB
3,233,647 UART: Caliptra RT
3,233,990 UART: [state] CFI Enabled
3,354,042 UART: [rt] RT listening for mailbox commands...
3,354,712 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,812 UART: [rt]cmd =0x49444352, len=4
3,386,309 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,050 ready_for_fw is high
1,061,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,473 >>> mbox cmd response: success
2,742,096 UART:
2,742,112 UART: Running Caliptra FMC ...
2,742,520 UART:
2,742,663 UART: [state] CFI Enabled
2,753,157 UART: [fht] FMC Alias Private Key: 7
2,872,715 UART: [art] Extend RT PCRs Done
2,873,143 UART: [art] Lock RT PCRs Done
2,874,945 UART: [art] Populate DV Done
2,883,016 UART: [fht] FMC Alias Private Key: 7
2,884,096 UART: [art] Derive CDI
2,884,376 UART: [art] Store in slot 0x4
2,970,195 UART: [art] Derive Key Pair
2,970,555 UART: [art] Store priv key in slot 0x5
2,984,113 UART: [art] Derive Key Pair - Done
2,999,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,417 UART: [art] PUB.X = 907B45DFD81E79A0298A32B5009C8EEB13713410E3FD1ACCEDB39BE20292E67343B16D2CB39BFBE11DF74B9B91B3F2AF
3,022,180 UART: [art] PUB.Y = CB89A9180080F359FEA3C6BF865EB670694826BE4050A45A54F17E3E62E8D780FAF8CDB660193BAC8562A8AB391694FC
3,029,116 UART: [art] SIG.R = 0E85D1E9704078A73ED9B44FEAD4543B1016652FEF87B814405FC3C8C55951BFA6E974A63B293B5D8AB3F760401DB6F3
3,035,889 UART: [art] SIG.S = 1D52A2A43BFF10A055575416CDA96C269AC4F5E7D50506585BDE497ABBA8248282794A662779391C888C8A89DEDAE102
3,059,498 UART: Caliptra RT
3,059,841 UART: [state] CFI Enabled
3,179,537 UART: [rt] RT listening for mailbox commands...
3,180,207 <<< Executing mbox cmd 0x49444352 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,025 UART: [rt]cmd =0x49444352, len=4
3,211,364 >>> mbox cmd response: failed
test test_get_idev_csr::test_missing_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
192,113 UART:
192,562 UART: Running Caliptra ROM ...
193,695 UART:
193,849 UART: [state] CFI Enabled
267,522 UART: [state] LifecycleState = Unprovisioned
269,517 UART: [state] DebugLocked = No
270,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,791 UART: [kat] SHA2-256
444,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,009 UART: [kat] ++
455,499 UART: [kat] sha1
466,608 UART: [kat] SHA2-256
469,271 UART: [kat] SHA2-384
474,763 UART: [kat] SHA2-512-ACC
477,125 UART: [kat] ECC-384
2,769,239 UART: [kat] HMAC-384Kdf
2,800,526 UART: [kat] LMS
3,990,768 UART: [kat] --
3,995,898 UART: [cold-reset] ++
3,997,831 UART: [fht] Storing FHT @ 0x50003400
4,009,238 UART: [idev] ++
4,009,819 UART: [idev] CDI.KEYID = 6
4,010,735 UART: [idev] SUBJECT.KEYID = 7
4,011,985 UART: [idev] UDS.KEYID = 0
4,012,974 ready_for_fw is high
4,013,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,319 UART: [idev] Erasing UDS.KEYID = 0
7,346,025 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,410 UART: [idev] --
7,371,513 UART: [ldev] ++
7,372,086 UART: [ldev] CDI.KEYID = 6
7,373,108 UART: [ldev] SUBJECT.KEYID = 5
7,374,268 UART: [ldev] AUTHORITY.KEYID = 7
7,375,502 UART: [ldev] FE.KEYID = 1
7,424,225 UART: [ldev] Erasing FE.KEYID = 1
10,752,875 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,003 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,165 UART: [ldev] --
13,116,524 UART: [fwproc] Waiting for Commands...
13,118,399 UART: [fwproc] Received command 0x46574c44
13,120,599 UART: [fwproc] Received Image of size 118548 bytes
17,227,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,730 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,137 >>> mbox cmd response: success
17,704,173 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,706,738 UART: [afmc] ++
17,707,375 UART: [afmc] CDI.KEYID = 6
17,708,280 UART: [afmc] SUBJECT.KEYID = 7
17,709,553 UART: [afmc] AUTHORITY.KEYID = 5
21,071,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,008 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,411 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,895 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,805 UART: [afmc] --
23,440,803 UART: [cold-reset] --
23,445,200 UART: [state] Locking Datavault
23,450,170 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,928 UART: [state] Locking ICCM
23,453,374 UART: [exit] Launching FMC @ 0x40000130
23,461,771 UART:
23,462,008 UART: Running Caliptra FMC ...
23,463,118 UART:
23,463,277 UART: [state] CFI Enabled
23,529,977 UART: [fht] FMC Alias Private Key: 7
25,869,774 UART: [art] Extend RT PCRs Done
25,870,990 UART: [art] Lock RT PCRs Done
25,872,723 UART: [art] Populate DV Done
25,878,140 UART: [fht] FMC Alias Private Key: 7
25,879,689 UART: [art] Derive CDI
25,880,470 UART: [art] Store in slot 0x4
25,937,969 UART: [art] Derive Key Pair
25,939,011 UART: [art] Store priv key in slot 0x5
29,231,889 UART: [art] Derive Key Pair - Done
29,244,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,302 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,821 UART: [art] PUB.X = F76E0581249DE83B8FA39BCFE07A90CAFF30EA24479E3BCD1E9A112B83A0F33A93D0E90DD7E14D8C79CF6FAA96278597
31,542,059 UART: [art] PUB.Y = 18FB097F68FD7FA3C3D038D0D9425BCDF04349822F9CFB3BD75803496FAAFCC727A008E527656261529EC63F98FA4C87
31,549,345 UART: [art] SIG.R = B85D4876C5CB8F3BB974A089CA9A2636D9E9DAA1BACD6413782B63BDAC13002C614A63813A192BB19217CFD35831B7E6
31,556,734 UART: [art] SIG.S = 87C05EA39823E008ECC9985A19A7E460A930FDD8826611C24642DDE3AF2145CFD1809F682F812AFE9436941D35B931EE
32,862,341 UART: Caliptra RT
32,863,060 UART: [state] CFI Enabled
33,037,209 UART: [rt] RT listening for mailbox commands...
33,068,574 UART: [rt]cmd =0x43415053, len=4
33,070,205 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,807,194 ready_for_fw is high
3,807,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,986,470 >>> mbox cmd response: success
17,987,700 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,675,560 UART:
23,675,954 UART: Running Caliptra FMC ...
23,677,067 UART:
23,677,226 UART: [state] CFI Enabled
23,742,779 UART: [fht] FMC Alias Private Key: 7
26,083,687 UART: [art] Extend RT PCRs Done
26,084,905 UART: [art] Lock RT PCRs Done
26,086,590 UART: [art] Populate DV Done
26,092,166 UART: [fht] FMC Alias Private Key: 7
26,093,833 UART: [art] Derive CDI
26,094,574 UART: [art] Store in slot 0x4
26,151,759 UART: [art] Derive Key Pair
26,152,762 UART: [art] Store priv key in slot 0x5
29,445,179 UART: [art] Derive Key Pair - Done
29,457,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,107 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,615 UART: [art] PUB.X = 5DD0CA3D52ACFA9AEA96B7567CF6308970AF3ABD6A7219E393B59493F958279C185D6E623974AB83E4A70F4943138987
31,755,870 UART: [art] PUB.Y = F25D6076D8B74498D245825D58DAE8200C247684324B42509E8A0643A7C7B5F318B4788A7D085E61E8D4BD96F53E469A
31,763,060 UART: [art] SIG.R = 046037376BFAF735B30DCA15C2D9E8EEFBAAF1799E0922A8F8EC24BB840C43A7637D869C0BA7F16C2DF6C688AE7CBEC8
31,770,548 UART: [art] SIG.S = 1E35AE1126A65FB80AF4A26359FB74EA3016E579FE6C589C2DD4FE2C205C20EC626D3BF0F3C11291CB5DCE0436D5B811
33,075,894 UART: Caliptra RT
33,076,614 UART: [state] CFI Enabled
33,252,309 UART: [rt] RT listening for mailbox commands...
33,283,513 UART: [rt]cmd =0x43415053, len=4
33,285,260 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,520 UART:
192,871 UART: Running Caliptra ROM ...
194,039 UART:
603,832 UART: [state] CFI Enabled
617,240 UART: [state] LifecycleState = Unprovisioned
619,143 UART: [state] DebugLocked = No
621,174 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,454 UART: [kat] SHA2-256
796,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,712 UART: [kat] ++
807,186 UART: [kat] sha1
818,197 UART: [kat] SHA2-256
820,915 UART: [kat] SHA2-384
827,963 UART: [kat] SHA2-512-ACC
830,329 UART: [kat] ECC-384
3,116,305 UART: [kat] HMAC-384Kdf
3,127,669 UART: [kat] LMS
4,317,754 UART: [kat] --
4,323,828 UART: [cold-reset] ++
4,326,279 UART: [fht] Storing FHT @ 0x50003400
4,337,406 UART: [idev] ++
4,337,961 UART: [idev] CDI.KEYID = 6
4,338,911 UART: [idev] SUBJECT.KEYID = 7
4,340,143 UART: [idev] UDS.KEYID = 0
4,341,119 ready_for_fw is high
4,341,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,218 UART: [idev] Erasing UDS.KEYID = 0
7,630,525 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,038 UART: [idev] --
7,657,637 UART: [ldev] ++
7,658,242 UART: [ldev] CDI.KEYID = 6
7,659,179 UART: [ldev] SUBJECT.KEYID = 5
7,660,388 UART: [ldev] AUTHORITY.KEYID = 7
7,661,666 UART: [ldev] FE.KEYID = 1
7,672,783 UART: [ldev] Erasing FE.KEYID = 1
10,961,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,255,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,299,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,811 UART: [ldev] --
13,323,066 UART: [fwproc] Waiting for Commands...
13,325,322 UART: [fwproc] Received command 0x46574c44
13,327,552 UART: [fwproc] Received Image of size 118548 bytes
17,434,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,420 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,559 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,269 >>> mbox cmd response: success
17,914,281 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,917,597 UART: [afmc] ++
17,918,245 UART: [afmc] CDI.KEYID = 6
17,919,144 UART: [afmc] SUBJECT.KEYID = 7
17,920,412 UART: [afmc] AUTHORITY.KEYID = 5
21,233,848 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,428 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,144 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,578 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,337 UART: [afmc] --
23,600,693 UART: [cold-reset] --
23,604,930 UART: [state] Locking Datavault
23,609,790 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,535 UART: [state] Locking ICCM
23,612,949 UART: [exit] Launching FMC @ 0x40000130
23,621,331 UART:
23,621,572 UART: Running Caliptra FMC ...
23,622,685 UART:
23,622,843 UART: [state] CFI Enabled
23,630,559 UART: [fht] FMC Alias Private Key: 7
25,970,597 UART: [art] Extend RT PCRs Done
25,971,815 UART: [art] Lock RT PCRs Done
25,973,508 UART: [art] Populate DV Done
25,978,849 UART: [fht] FMC Alias Private Key: 7
25,980,364 UART: [art] Derive CDI
25,981,284 UART: [art] Store in slot 0x4
26,023,985 UART: [art] Derive Key Pair
26,024,981 UART: [art] Store priv key in slot 0x5
29,267,754 UART: [art] Derive Key Pair - Done
29,280,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,576 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,080 UART: [art] PUB.X = 1DDD7EB2A85D0D83EE6E0CE39C6B4190E0C8B449E45E720944C2A4B81D6F4B5957B6D4BCA66DA1D4F9749E21517EDE09
31,569,388 UART: [art] PUB.Y = 17FE255471918ABCC9F1E0DC8CFE40971F810CA729B8F818B0450AF320E7FDC261298564F5C6DFC64FEAEB5327FDD2E8
31,576,827 UART: [art] SIG.R = C759F1027E1075644B13FC540EFF95038225B2F6DB122785A93930DD40C14DA22CB6AF957B44B867F58C31C9D7161341
31,584,065 UART: [art] SIG.S = 4655FBF962369FD4A7332401A6DA358FE963A3D5191B0FC7CE66AA45E7E816B5C68C7BD945CB9DBF0E4B6518532ECEB7
32,889,017 UART: Caliptra RT
32,889,725 UART: [state] CFI Enabled
33,022,600 UART: [rt] RT listening for mailbox commands...
33,053,807 UART: [rt]cmd =0x43415053, len=4
33,055,432 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
4,130,796 ready_for_fw is high
4,131,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,272 >>> mbox cmd response: success
18,160,441 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
23,803,767 UART:
23,804,158 UART: Running Caliptra FMC ...
23,805,353 UART:
23,805,515 UART: [state] CFI Enabled
23,813,415 UART: [fht] FMC Alias Private Key: 7
26,153,282 UART: [art] Extend RT PCRs Done
26,154,512 UART: [art] Lock RT PCRs Done
26,156,032 UART: [art] Populate DV Done
26,161,613 UART: [fht] FMC Alias Private Key: 7
26,163,157 UART: [art] Derive CDI
26,163,937 UART: [art] Store in slot 0x4
26,206,436 UART: [art] Derive Key Pair
26,207,477 UART: [art] Store priv key in slot 0x5
29,449,645 UART: [art] Derive Key Pair - Done
29,462,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,830 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,332 UART: [art] PUB.X = F637DBE5E4BBA73139E6902E04DBE8503644E28882AECDDEC0A2B48219F0C8B8B7E9D2ECC48C6023F91E9A2E51997506
31,751,630 UART: [art] PUB.Y = C2C5980B2A0702A30C356FB05DC6E911A4D411470B38DB574E6353B4A46CDAA1BAF71577F0CE27E1903D32C605C82FF2
31,758,875 UART: [art] SIG.R = 0A86525D7610D1261E41D5C00AFFC441E3FC0B4ADB4FB7B65700425596ADC6C0F64A5BB63ACF21B0DD7C8C1C1CFE43FD
31,766,264 UART: [art] SIG.S = A03CFEE63C950EE2D23931C7BDE23FD2ACA72864FC29586F7B72BDC38B98E9C6AFEAFC4E891C10EA80A1483C30337C15
33,071,308 UART: Caliptra RT
33,072,032 UART: [state] CFI Enabled
33,204,803 UART: [rt] RT listening for mailbox commands...
33,236,234 UART: [rt]cmd =0x43415053, len=4
33,238,040 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
192,031 UART:
192,392 UART: Running Caliptra ROM ...
193,476 UART:
193,615 UART: [state] CFI Enabled
264,417 UART: [state] LifecycleState = Unprovisioned
266,402 UART: [state] DebugLocked = No
268,417 UART: [state] WD Timer not started. Device not locked for debugging
272,164 UART: [kat] SHA2-256
451,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,637 UART: [kat] ++
463,084 UART: [kat] sha1
474,004 UART: [kat] SHA2-256
476,711 UART: [kat] SHA2-384
483,640 UART: [kat] SHA2-512-ACC
486,010 UART: [kat] ECC-384
2,949,026 UART: [kat] HMAC-384Kdf
2,971,635 UART: [kat] LMS
3,448,104 UART: [kat] --
3,451,739 UART: [cold-reset] ++
3,453,880 UART: [fht] FHT @ 0x50003400
3,466,493 UART: [idev] ++
3,467,054 UART: [idev] CDI.KEYID = 6
3,468,079 UART: [idev] SUBJECT.KEYID = 7
3,469,248 UART: [idev] UDS.KEYID = 0
3,470,312 ready_for_fw is high
3,470,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,567 UART: [idev] Erasing UDS.KEYID = 0
5,989,426 UART: [idev] Sha1 KeyId Algorithm
6,013,082 UART: [idev] --
6,018,868 UART: [ldev] ++
6,019,441 UART: [ldev] CDI.KEYID = 6
6,020,461 UART: [ldev] SUBJECT.KEYID = 5
6,021,565 UART: [ldev] AUTHORITY.KEYID = 7
6,022,849 UART: [ldev] FE.KEYID = 1
6,059,391 UART: [ldev] Erasing FE.KEYID = 1
8,565,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,644 UART: [ldev] --
10,378,012 UART: [fwproc] Wait for Commands...
10,380,760 UART: [fwproc] Recv command 0x46574c44
10,382,795 UART: [fwproc] Recv'd Img size: 118548 bytes
13,875,737 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,989 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,353,206 >>> mbox cmd response: success
14,354,344 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,357,953 UART: [afmc] ++
14,358,542 UART: [afmc] CDI.KEYID = 6
14,359,421 UART: [afmc] SUBJECT.KEYID = 7
14,360,689 UART: [afmc] AUTHORITY.KEYID = 5
16,901,145 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,641,389 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,643,566 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,659,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,675,409 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,012 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,486 UART: [afmc] --
18,719,624 UART: [cold-reset] --
18,722,779 UART: [state] Locking Datavault
18,729,535 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,228 UART: [state] Locking ICCM
18,733,027 UART: [exit] Launching FMC @ 0x40000130
18,741,474 UART:
18,741,704 UART: Running Caliptra FMC ...
18,742,801 UART:
18,742,957 UART: [state] CFI Enabled
18,799,654 UART: [fht] FMC Alias Private Key: 7
20,566,005 UART: [art] Extend RT PCRs Done
20,567,226 UART: [art] Lock RT PCRs Done
20,569,000 UART: [art] Populate DV Done
20,574,625 UART: [fht] FMC Alias Private Key: 7
20,576,156 UART: [art] Derive CDI
20,576,887 UART: [art] Store in slot 0x4
20,632,090 UART: [art] Derive Key Pair
20,633,128 UART: [art] Store priv key in slot 0x5
23,095,605 UART: [art] Derive Key Pair - Done
23,108,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,823,584 UART: [art] PUB.X = 52529E19EAF5CD13C51DFA208BB2B099B92BA12201B9D20FBD67ACBEE54DB2A619E175DBAD9BCE2ADB55494CBF36F896
24,830,843 UART: [art] PUB.Y = 032F6C0F063CDA8954749DC3DC3FF1CF35B35DD1E0D7B6D079D1EFC3BBEA7ABD6A6452FC325E2B9A09A0D197D6E4AA91
24,838,099 UART: [art] SIG.R = 929CF8274CECA5C0B7FCA6C4FFA3A8794721536AE23FE422E50DB4FEB249D748DCA3E08BD17C56D611DBFF372F0130FF
24,845,559 UART: [art] SIG.S = 2994834A4D080444DEF9DB08A423BD9D819C5ACA5A373C2623EA1D6B19FD6D1032B909F4A88FEADE543105F7E7A20F46
25,824,482 UART: Caliptra RT
25,825,217 UART: [state] CFI Enabled
26,006,491 UART: [rt] RT listening for mailbox commands...
26,037,987 UART: [rt]cmd =0x43415053, len=4
26,039,778 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,462,502 ready_for_fw is high
3,463,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,195,358 >>> mbox cmd response: success
14,196,610 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,472,000 UART:
18,472,386 UART: Running Caliptra FMC ...
18,473,588 UART:
18,473,759 UART: [state] CFI Enabled
18,540,617 UART: [fht] FMC Alias Private Key: 7
20,307,086 UART: [art] Extend RT PCRs Done
20,308,307 UART: [art] Lock RT PCRs Done
20,309,774 UART: [art] Populate DV Done
20,315,349 UART: [fht] FMC Alias Private Key: 7
20,316,948 UART: [art] Derive CDI
20,317,772 UART: [art] Store in slot 0x4
20,374,139 UART: [art] Derive Key Pair
20,375,139 UART: [art] Store priv key in slot 0x5
22,838,238 UART: [art] Derive Key Pair - Done
22,851,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,356 UART: [art] Erasing AUTHORITY.KEYID = 7
24,566,836 UART: [art] PUB.X = D42C8E05F6892CF919F725516A6CAD15107C8F183785DB6173C90B53AEB7A7C7853FA325E8ABBCCE5DE72C1205382844
24,574,135 UART: [art] PUB.Y = CB117459DD8045812202E235E61944A8F6375DC28BD3AEC78517D4471C8B8281539145716308776CDE2EECDABF755EB1
24,581,328 UART: [art] SIG.R = 4830799D7595603887AEB78048F8B92D28456DDF935188444163ED76817652F30B8E06D8DDF9A6E8D0EBA6C4084FB248
24,588,720 UART: [art] SIG.S = 548EE2500B2A00518D81B7E02919FE99909AC4998FF0055AF117889C385E293BAD07A2A47E1870C5FBA422BFD9E1CCAC
25,567,736 UART: Caliptra RT
25,568,450 UART: [state] CFI Enabled
25,748,072 UART: [rt] RT listening for mailbox commands...
25,779,531 UART: [rt]cmd =0x43415053, len=4
25,781,076 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,386 writing to cptra_bootfsm_go
192,518 UART:
192,879 UART: Running Caliptra ROM ...
194,020 UART:
603,569 UART: [state] CFI Enabled
616,413 UART: [state] LifecycleState = Unprovisioned
618,319 UART: [state] DebugLocked = No
620,017 UART: [state] WD Timer not started. Device not locked for debugging
623,850 UART: [kat] SHA2-256
803,507 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,332 UART: [kat] ++
814,812 UART: [kat] sha1
825,902 UART: [kat] SHA2-256
828,626 UART: [kat] SHA2-384
834,757 UART: [kat] SHA2-512-ACC
837,136 UART: [kat] ECC-384
3,276,604 UART: [kat] HMAC-384Kdf
3,288,383 UART: [kat] LMS
3,764,852 UART: [kat] --
3,770,501 UART: [cold-reset] ++
3,771,520 UART: [fht] FHT @ 0x50003400
3,782,778 UART: [idev] ++
3,783,336 UART: [idev] CDI.KEYID = 6
3,784,311 UART: [idev] SUBJECT.KEYID = 7
3,785,563 UART: [idev] UDS.KEYID = 0
3,786,462 ready_for_fw is high
3,786,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,601 UART: [idev] Erasing UDS.KEYID = 0
6,265,512 UART: [idev] Sha1 KeyId Algorithm
6,289,290 UART: [idev] --
6,294,635 UART: [ldev] ++
6,295,243 UART: [ldev] CDI.KEYID = 6
6,296,129 UART: [ldev] SUBJECT.KEYID = 5
6,297,346 UART: [ldev] AUTHORITY.KEYID = 7
6,298,636 UART: [ldev] FE.KEYID = 1
6,310,014 UART: [ldev] Erasing FE.KEYID = 1
8,792,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,407 UART: [ldev] --
10,588,461 UART: [fwproc] Wait for Commands...
10,591,587 UART: [fwproc] Recv command 0x46574c44
10,593,576 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,239,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,567,394 >>> mbox cmd response: success
14,568,503 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,571,294 UART: [afmc] ++
14,571,882 UART: [afmc] CDI.KEYID = 6
14,572,821 UART: [afmc] SUBJECT.KEYID = 7
14,574,036 UART: [afmc] AUTHORITY.KEYID = 5
17,080,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,805,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,920 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,852,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,876,656 UART: [afmc] --
18,880,419 UART: [cold-reset] --
18,885,149 UART: [state] Locking Datavault
18,890,451 UART: [state] Locking PCR0, PCR1 and PCR31
18,892,214 UART: [state] Locking ICCM
18,894,913 UART: [exit] Launching FMC @ 0x40000130
18,903,366 UART:
18,903,604 UART: Running Caliptra FMC ...
18,904,710 UART:
18,904,867 UART: [state] CFI Enabled
18,912,806 UART: [fht] FMC Alias Private Key: 7
20,678,943 UART: [art] Extend RT PCRs Done
20,680,166 UART: [art] Lock RT PCRs Done
20,681,381 UART: [art] Populate DV Done
20,686,799 UART: [fht] FMC Alias Private Key: 7
20,688,499 UART: [art] Derive CDI
20,689,319 UART: [art] Store in slot 0x4
20,732,393 UART: [art] Derive Key Pair
20,733,434 UART: [art] Store priv key in slot 0x5
23,160,344 UART: [art] Derive Key Pair - Done
23,173,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,879,147 UART: [art] Erasing AUTHORITY.KEYID = 7
24,880,655 UART: [art] PUB.X = A189FE0D5F849E24BA9569FFDEF282F0A0E5E2CE313C980EC145925F4D3729701953F142CD201B1FF72238372064DCEE
24,887,909 UART: [art] PUB.Y = D46E53361F82C3CC02FEB06784C7E7ECF71BD1182656354B4CF61280347551A867D0E75D34FB7D63A4F36F1C3D428E49
24,895,179 UART: [art] SIG.R = FC6A5C18968D6DE826E613D4A08EE625842795F984C32170B13F5B84B148FED9C5BE6F379DE7B051CC840362DC992514
24,902,532 UART: [art] SIG.S = 7EC1C84713B862F6394B9DA3DF9958D58658F4BC4D4757F2A90995B6E28CD8299191B58A7B8980379D7B4216456E1496
25,881,848 UART: Caliptra RT
25,882,558 UART: [state] CFI Enabled
26,015,622 UART: [rt] RT listening for mailbox commands...
26,046,713 UART: [rt]cmd =0x43415053, len=4
26,048,349 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,778,727 ready_for_fw is high
3,779,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,461 >>> mbox cmd response: success
14,443,806 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
18,693,856 UART:
18,694,245 UART: Running Caliptra FMC ...
18,695,392 UART:
18,695,553 UART: [state] CFI Enabled
18,703,616 UART: [fht] FMC Alias Private Key: 7
20,469,642 UART: [art] Extend RT PCRs Done
20,470,863 UART: [art] Lock RT PCRs Done
20,472,407 UART: [art] Populate DV Done
20,477,670 UART: [fht] FMC Alias Private Key: 7
20,479,233 UART: [art] Derive CDI
20,479,967 UART: [art] Store in slot 0x4
20,522,727 UART: [art] Derive Key Pair
20,523,765 UART: [art] Store priv key in slot 0x5
22,950,926 UART: [art] Derive Key Pair - Done
22,963,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,206 UART: [art] Erasing AUTHORITY.KEYID = 7
24,671,711 UART: [art] PUB.X = CFDDBFADD4D4CE24D1A1D2CA4D2278B2347F8345319A3D6BC53EAA8DA68FD50BFC1DB1815E05F00E81EFDE9C9450CF42
24,679,028 UART: [art] PUB.Y = 18CDEAB4C83EE4F6AB0055E676E764F6A6064232A80FF97FF4DA5041AFF27A02D70068E7715E19D7AA127BA8DA114B6A
24,686,242 UART: [art] SIG.R = 0A8ECB11BEAF59F4DD9BF0FD79271AEDB8652100D319E0895D6B6429771EFB6B7FC36607F650B845AC3CBD0199326FF9
24,693,642 UART: [art] SIG.S = 238B0E411E9C75CDC0A2DD5AA9690F9BD15B60C1028B45FC52DF10B061E2D56927CCD78E04003CC7E7400B477D035021
25,672,517 UART: Caliptra RT
25,673,221 UART: [state] CFI Enabled
25,806,874 UART: [rt] RT listening for mailbox commands...
25,838,181 UART: [rt]cmd =0x43415053, len=4
25,840,025 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,196 UART:
192,562 UART: Running Caliptra ROM ...
193,754 UART:
193,929 UART: [state] CFI Enabled
267,090 UART: [state] LifecycleState = Unprovisioned
269,516 UART: [state] DebugLocked = No
270,910 UART: [state] WD Timer not started. Device not locked for debugging
274,950 UART: [kat] SHA2-256
464,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,604 UART: [kat] ++
476,145 UART: [kat] sha1
486,882 UART: [kat] SHA2-256
489,890 UART: [kat] SHA2-384
494,666 UART: [kat] SHA2-512-ACC
497,243 UART: [kat] ECC-384
2,948,257 UART: [kat] HMAC-384Kdf
2,970,164 UART: [kat] LMS
3,501,926 UART: [kat] --
3,506,915 UART: [cold-reset] ++
3,508,290 UART: [fht] FHT @ 0x50003400
3,519,761 UART: [idev] ++
3,520,470 UART: [idev] CDI.KEYID = 6
3,521,374 UART: [idev] SUBJECT.KEYID = 7
3,522,617 UART: [idev] UDS.KEYID = 0
3,523,534 ready_for_fw is high
3,523,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,768 UART: [idev] Erasing UDS.KEYID = 0
6,027,442 UART: [idev] Sha1 KeyId Algorithm
6,051,219 UART: [idev] --
6,057,756 UART: [ldev] ++
6,058,444 UART: [ldev] CDI.KEYID = 6
6,059,354 UART: [ldev] SUBJECT.KEYID = 5
6,060,512 UART: [ldev] AUTHORITY.KEYID = 7
6,061,895 UART: [ldev] FE.KEYID = 1
6,099,778 UART: [ldev] Erasing FE.KEYID = 1
8,605,605 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,670 UART: [ldev] --
10,414,522 UART: [fwproc] Wait for Commands...
10,416,233 UART: [fwproc] Recv command 0x46574c44
10,418,545 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,378 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,944 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,242 >>> mbox cmd response: success
14,684,232 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,688,131 UART: [afmc] ++
14,688,823 UART: [afmc] CDI.KEYID = 6
14,690,017 UART: [afmc] SUBJECT.KEYID = 7
14,691,507 UART: [afmc] AUTHORITY.KEYID = 5
17,226,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,500 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,570 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,637 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,304 UART: [afmc] --
19,029,665 UART: [cold-reset] --
19,034,450 UART: [state] Locking Datavault
19,040,395 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,525 UART: [state] Locking ICCM
19,044,244 UART: [exit] Launching FMC @ 0x40000130
19,052,913 UART:
19,053,147 UART: Running Caliptra FMC ...
19,054,268 UART:
19,054,427 UART: [state] CFI Enabled
19,111,458 UART: [fht] FMC Alias Private Key: 7
20,877,839 UART: [art] Extend RT PCRs Done
20,879,060 UART: [art] Lock RT PCRs Done
20,880,711 UART: [art] Populate DV Done
20,885,954 UART: [fht] FMC Alias Private Key: 7
20,887,644 UART: [art] Derive CDI
20,888,376 UART: [art] Store in slot 0x4
20,943,762 UART: [art] Derive Key Pair
20,944,798 UART: [art] Store priv key in slot 0x5
23,407,922 UART: [art] Derive Key Pair - Done
23,420,536 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,132,470 UART: [art] Erasing AUTHORITY.KEYID = 7
25,133,981 UART: [art] PUB.X = ACC76A0B363502CB773E48992447889540D08C881D2BE65210CADA32DDA11BAE481AFD1B20E3179AA89DE8D0499ACFB3
25,141,237 UART: [art] PUB.Y = AA4C5E6C30C6A37EA098DD487BEFE697427AA1EB942DD05CE8B02F54279F525C7987E05F891650329C0123E4B9D0F0A8
25,148,481 UART: [art] SIG.R = 721D3B026A097DA56B0E9212C83AFBFAD727372373A311758AFD1FCE5EA2F759AF96A58C49E7AE52B438BC8637466ECB
25,155,867 UART: [art] SIG.S = 0A51CF36D0FAB89883C3E311B3C7DBE7A767AD97212E0ACB083008D6FCA071E7768F5E5C95A4C0D4647C7ADBEFBEAD47
26,135,431 UART: Caliptra RT
26,136,140 UART: [state] CFI Enabled
26,316,926 UART: [rt] RT listening for mailbox commands...
26,347,961 UART: [rt]cmd =0x43415053, len=4
26,349,749 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
3,438,745 ready_for_fw is high
3,439,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,299 >>> mbox cmd response: success
14,821,699 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,135,115 UART:
19,135,505 UART: Running Caliptra FMC ...
19,136,667 UART:
19,136,829 UART: [state] CFI Enabled
19,201,800 UART: [fht] FMC Alias Private Key: 7
20,967,949 UART: [art] Extend RT PCRs Done
20,969,170 UART: [art] Lock RT PCRs Done
20,970,906 UART: [art] Populate DV Done
20,976,386 UART: [fht] FMC Alias Private Key: 7
20,977,938 UART: [art] Derive CDI
20,978,756 UART: [art] Store in slot 0x4
21,035,098 UART: [art] Derive Key Pair
21,036,145 UART: [art] Store priv key in slot 0x5
23,498,898 UART: [art] Derive Key Pair - Done
23,511,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,897 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,393 UART: [art] PUB.X = 8314B91BBB0D7DBCC25DF5E0DB6FBD8DA9092999FE3555E2822CED5065979039D8040061D6663967556E5D131BD83C4C
25,233,637 UART: [art] PUB.Y = AE959AB98CD7BDDCE21AD3F6DC2F9F95E264BE5C6BCB99E8117E9A3B8DE491BD7598F1C089E854E9C9035A809BA8A437
25,240,940 UART: [art] SIG.R = 7B20849C0DEDC4072AEE76708382FC49BB83A639E6A6BAC1AAF82063D57A70614A7D65B27896D04CBB23EC4AFE5DB4C8
25,248,386 UART: [art] SIG.S = D1C68063D4C476E6DAC32A5BDB8D3971ECA08191A872D83D8A3361392515EAF8ACE420C5B6E8F00DE06B7FD58E1F5D81
26,227,422 UART: Caliptra RT
26,228,131 UART: [state] CFI Enabled
26,408,440 UART: [rt] RT listening for mailbox commands...
26,439,856 UART: [rt]cmd =0x43415053, len=4
26,441,710 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,526 UART:
192,892 UART: Running Caliptra ROM ...
194,091 UART:
603,819 UART: [state] CFI Enabled
618,332 UART: [state] LifecycleState = Unprovisioned
620,711 UART: [state] DebugLocked = No
622,100 UART: [state] WD Timer not started. Device not locked for debugging
626,371 UART: [kat] SHA2-256
816,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,092 UART: [kat] ++
827,705 UART: [kat] sha1
839,018 UART: [kat] SHA2-256
842,035 UART: [kat] SHA2-384
849,667 UART: [kat] SHA2-512-ACC
852,262 UART: [kat] ECC-384
3,296,411 UART: [kat] HMAC-384Kdf
3,309,014 UART: [kat] LMS
3,840,822 UART: [kat] --
3,845,459 UART: [cold-reset] ++
3,847,322 UART: [fht] FHT @ 0x50003400
3,858,942 UART: [idev] ++
3,859,653 UART: [idev] CDI.KEYID = 6
3,860,610 UART: [idev] SUBJECT.KEYID = 7
3,861,787 UART: [idev] UDS.KEYID = 0
3,862,716 ready_for_fw is high
3,862,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,779 UART: [idev] Erasing UDS.KEYID = 0
6,337,628 UART: [idev] Sha1 KeyId Algorithm
6,360,210 UART: [idev] --
6,365,286 UART: [ldev] ++
6,365,970 UART: [ldev] CDI.KEYID = 6
6,366,887 UART: [ldev] SUBJECT.KEYID = 5
6,368,052 UART: [ldev] AUTHORITY.KEYID = 7
6,369,292 UART: [ldev] FE.KEYID = 1
6,381,292 UART: [ldev] Erasing FE.KEYID = 1
8,858,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,498 UART: [ldev] --
10,651,618 UART: [fwproc] Wait for Commands...
10,653,122 UART: [fwproc] Recv command 0x46574c44
10,655,437 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,118 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,914 >>> mbox cmd response: success
14,921,985 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
14,925,798 UART: [afmc] ++
14,926,502 UART: [afmc] CDI.KEYID = 6
14,927,614 UART: [afmc] SUBJECT.KEYID = 7
14,929,166 UART: [afmc] AUTHORITY.KEYID = 5
17,433,727 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,360 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,327 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,437 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,578 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,517 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,016 UART: [afmc] --
19,230,782 UART: [cold-reset] --
19,233,192 UART: [state] Locking Datavault
19,239,908 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,118 UART: [state] Locking ICCM
19,243,520 UART: [exit] Launching FMC @ 0x40000130
19,252,201 UART:
19,252,437 UART: Running Caliptra FMC ...
19,253,542 UART:
19,253,703 UART: [state] CFI Enabled
19,261,970 UART: [fht] FMC Alias Private Key: 7
21,028,629 UART: [art] Extend RT PCRs Done
21,029,853 UART: [art] Lock RT PCRs Done
21,031,346 UART: [art] Populate DV Done
21,036,766 UART: [fht] FMC Alias Private Key: 7
21,038,290 UART: [art] Derive CDI
21,039,041 UART: [art] Store in slot 0x4
21,082,076 UART: [art] Derive Key Pair
21,083,088 UART: [art] Store priv key in slot 0x5
23,510,317 UART: [art] Derive Key Pair - Done
23,523,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,763 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,265 UART: [art] PUB.X = 65C064A859A480F5B4EA2729A816BC0A8E3A2449E069DB8316EABA08395E410A1F51B7EDB415E2FB030C8207B35A4822
25,238,535 UART: [art] PUB.Y = 5E2132D58CCF0486AD9829B85D9995DA5D38FDF721A7FDACA49101C11948F73DB40482C7CA6FE79F70E76156A3C18046
25,245,793 UART: [art] SIG.R = 98827DA5EFF1F9EE292291310A16A8AECBABE238D3D07DC8581B9CFE54B99F247041C5CD4AD86201BE716AD5B58A93E7
25,253,202 UART: [art] SIG.S = 3B1E2B438F8C8BE40DC8A4E81274327C84B20D079D261D3C8D4EA910F17016F0D29808F7D31868742701A16CB552049A
26,231,524 UART: Caliptra RT
26,232,243 UART: [state] CFI Enabled
26,364,559 UART: [rt] RT listening for mailbox commands...
26,395,886 UART: [rt]cmd =0x43415053, len=4
26,397,726 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,753,304 ready_for_fw is high
3,753,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,885 >>> mbox cmd response: success
15,052,359 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
19,310,228 UART:
19,310,627 UART: Running Caliptra FMC ...
19,311,751 UART:
19,311,909 UART: [state] CFI Enabled
19,320,157 UART: [fht] FMC Alias Private Key: 7
21,086,319 UART: [art] Extend RT PCRs Done
21,087,550 UART: [art] Lock RT PCRs Done
21,089,157 UART: [art] Populate DV Done
21,094,585 UART: [fht] FMC Alias Private Key: 7
21,096,082 UART: [art] Derive CDI
21,096,855 UART: [art] Store in slot 0x4
21,139,453 UART: [art] Derive Key Pair
21,140,458 UART: [art] Store priv key in slot 0x5
23,567,315 UART: [art] Derive Key Pair - Done
23,580,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,553 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,147 UART: [art] PUB.X = 98695E5707D9061D158179FA38EC82CC0212F3B28AA8B4C800017FDF9BF0C75C7DC3FD41A31CAB06A6EBDEB3076243E4
25,295,329 UART: [art] PUB.Y = 8935C3EF96D8AFDA5A19452889567CBD5AA19F52BEBC0BB58B63E9F36827722202B7234A2C0FBA60D842827B2B0ADF29
25,302,558 UART: [art] SIG.R = F282D794FD2FE3ECBB111A028EA13184A0344BC8489E99322EF6AE8F93D197E9BA89FDB67ECAC2A95BB1E23BD65AE3EF
25,309,982 UART: [art] SIG.S = EE0F6CAFF91721177FD94BD2DBC69628350E872796B4BDE0668C60E491A4DEC11A7A380333CD905A9637F2E4C8ABC9FC
26,289,105 UART: Caliptra RT
26,289,809 UART: [state] CFI Enabled
26,422,241 UART: [rt] RT listening for mailbox commands...
26,454,021 UART: [rt]cmd =0x43415053, len=4
26,455,534 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,099 UART: [kat] SHA2-256
892,037 UART: [kat] SHA2-384
894,862 UART: [kat] SHA2-512-ACC
896,763 UART: [kat] ECC-384
902,356 UART: [kat] HMAC-384Kdf
907,058 UART: [kat] LMS
1,475,254 UART: [kat] --
1,476,121 UART: [cold-reset] ++
1,476,669 UART: [fht] Storing FHT @ 0x50003400
1,479,490 UART: [idev] ++
1,479,658 UART: [idev] CDI.KEYID = 6
1,480,018 UART: [idev] SUBJECT.KEYID = 7
1,480,442 UART: [idev] UDS.KEYID = 0
1,480,787 ready_for_fw is high
1,480,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,674 UART: [idev] Erasing UDS.KEYID = 0
1,505,716 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,438 UART: [idev] --
1,515,563 UART: [ldev] ++
1,515,731 UART: [ldev] CDI.KEYID = 6
1,516,094 UART: [ldev] SUBJECT.KEYID = 5
1,516,520 UART: [ldev] AUTHORITY.KEYID = 7
1,516,983 UART: [ldev] FE.KEYID = 1
1,522,107 UART: [ldev] Erasing FE.KEYID = 1
1,547,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,854 UART: [ldev] --
1,586,311 UART: [fwproc] Waiting for Commands...
1,587,138 UART: [fwproc] Received command 0x46574c44
1,587,929 UART: [fwproc] Received Image of size 118548 bytes
2,933,705 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,513 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,086 >>> mbox cmd response: success
3,132,086 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,133,262 UART: [afmc] ++
3,133,430 UART: [afmc] CDI.KEYID = 6
3,133,792 UART: [afmc] SUBJECT.KEYID = 7
3,134,217 UART: [afmc] AUTHORITY.KEYID = 5
3,168,742 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,848 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,531 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,381 UART: [afmc] --
3,212,475 UART: [cold-reset] --
3,213,073 UART: [state] Locking Datavault
3,214,074 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,678 UART: [state] Locking ICCM
3,215,294 UART: [exit] Launching FMC @ 0x40000130
3,220,624 UART:
3,220,640 UART: Running Caliptra FMC ...
3,221,048 UART:
3,221,102 UART: [state] CFI Enabled
3,231,620 UART: [fht] FMC Alias Private Key: 7
3,351,018 UART: [art] Extend RT PCRs Done
3,351,446 UART: [art] Lock RT PCRs Done
3,353,106 UART: [art] Populate DV Done
3,361,179 UART: [fht] FMC Alias Private Key: 7
3,362,235 UART: [art] Derive CDI
3,362,515 UART: [art] Store in slot 0x4
3,448,363 UART: [art] Derive Key Pair
3,448,723 UART: [art] Store priv key in slot 0x5
3,461,690 UART: [art] Derive Key Pair - Done
3,476,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,895 UART: [art] PUB.X = 7C6631F4587A22AFB1449A04F1A9D9BCC3F79C3F6E8172D3031AE408087923DF83BCE12C156EC7C20AFB98E9890292C6
3,499,653 UART: [art] PUB.Y = 08376EBA42A45EF112DC82ADE8548FE1E3F3FBC369E970DF37212A71BF9C6969D39F9CF4F676C53AD2902CB9E7239BDC
3,506,616 UART: [art] SIG.R = 24C806EC6A67FBE94F7AB2B4554499BE05D9F520A315293DCA4AE34E790B9E555D9C5A7DEA0CD320AF15958F1D7F7747
3,513,386 UART: [art] SIG.S = 0C793D37F96CB8BC3DE80E78C84EDDB13DC2BF44BAC7053FFB326C4A30F3DB0907DC561EC86087CC51CF6FCA2FBDF977
3,537,443 UART: Caliptra RT
3,537,694 UART: [state] CFI Enabled
3,657,967 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,747 UART: [rt]cmd =0x43415053, len=4
3,689,932 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,087 ready_for_fw is high
1,362,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,304 >>> mbox cmd response: success
2,981,304 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,042,343 UART:
3,042,359 UART: Running Caliptra FMC ...
3,042,767 UART:
3,042,821 UART: [state] CFI Enabled
3,053,507 UART: [fht] FMC Alias Private Key: 7
3,173,185 UART: [art] Extend RT PCRs Done
3,173,613 UART: [art] Lock RT PCRs Done
3,175,121 UART: [art] Populate DV Done
3,183,374 UART: [fht] FMC Alias Private Key: 7
3,184,328 UART: [art] Derive CDI
3,184,608 UART: [art] Store in slot 0x4
3,270,436 UART: [art] Derive Key Pair
3,270,796 UART: [art] Store priv key in slot 0x5
3,283,697 UART: [art] Derive Key Pair - Done
3,298,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,000 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,765 UART: [art] PUB.X = 31986DEB9A9C0B0CFE248250B45CD0A598344DE1A8A2468BA8B8B7A5659B5C9362F07939050C416D1C8D1A5AD1D5555D
3,321,529 UART: [art] PUB.Y = 9E9DFD1CF99E98CEF5DA9F1FD00CE48DE74ACBEAE554DA4EA4FB33F26AF40BF0958B93EC6F712C1F13DA893E14941446
3,328,501 UART: [art] SIG.R = 6FA37105B73EB277BBB66DBA17BA1316E215D383BF763B59A2FD68182C309F42DAC09B3CC230D90ACF1FD046CFE8C89D
3,335,283 UART: [art] SIG.S = DBDEEEAA0B23439D6562C34F1B29648FC1F7D5A9F93DD61DBA8E3DA0B5E8E2101183B52D73BC4EA8514D16BA5D7D2976
3,359,172 UART: Caliptra RT
3,359,423 UART: [state] CFI Enabled
3,479,983 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,809 UART: [rt]cmd =0x43415053, len=4
3,512,106 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,819 UART: [state] LifecycleState = Unprovisioned
86,474 UART: [state] DebugLocked = No
87,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,169 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,476,652 UART: [cold-reset] ++
1,476,992 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 ready_for_fw is high
1,480,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,001 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,281 UART: [idev] --
1,515,294 UART: [ldev] ++
1,515,462 UART: [ldev] CDI.KEYID = 6
1,515,825 UART: [ldev] SUBJECT.KEYID = 5
1,516,251 UART: [ldev] AUTHORITY.KEYID = 7
1,516,714 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,970 UART: [fwproc] Waiting for Commands...
1,587,729 UART: [fwproc] Received command 0x46574c44
1,588,520 UART: [fwproc] Received Image of size 118548 bytes
2,932,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,660 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,161 >>> mbox cmd response: success
3,130,161 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,131,297 UART: [afmc] ++
3,131,465 UART: [afmc] CDI.KEYID = 6
3,131,827 UART: [afmc] SUBJECT.KEYID = 7
3,132,252 UART: [afmc] AUTHORITY.KEYID = 5
3,167,431 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,411 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,120 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,003 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,686 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,386 UART: [afmc] --
3,210,468 UART: [cold-reset] --
3,211,544 UART: [state] Locking Datavault
3,212,841 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,445 UART: [state] Locking ICCM
3,213,893 UART: [exit] Launching FMC @ 0x40000130
3,219,223 UART:
3,219,239 UART: Running Caliptra FMC ...
3,219,647 UART:
3,219,790 UART: [state] CFI Enabled
3,230,534 UART: [fht] FMC Alias Private Key: 7
3,349,824 UART: [art] Extend RT PCRs Done
3,350,252 UART: [art] Lock RT PCRs Done
3,351,620 UART: [art] Populate DV Done
3,360,015 UART: [fht] FMC Alias Private Key: 7
3,361,027 UART: [art] Derive CDI
3,361,307 UART: [art] Store in slot 0x4
3,446,917 UART: [art] Derive Key Pair
3,447,277 UART: [art] Store priv key in slot 0x5
3,461,090 UART: [art] Derive Key Pair - Done
3,476,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,689 UART: [art] PUB.X = 401B62B70C76984B4443DFDF68CBCC1E4CF1DD8D251DD84283FEA9FA46803EED40A38C57EF61C9F9F1A83D95F63637E3
3,499,472 UART: [art] PUB.Y = 2B62BE57A1AC07CA2E84F92D6AC1D03EA6BE5CB28753E967907B9C87A76AA890F14FB3CE11802FCDE0666E8E3778A4CF
3,506,437 UART: [art] SIG.R = F5FECB9FCD4D19E9AB82F7A52E4D4A141F027091DE492D6E3C9DDE8359212C0B2FBC1C43D556FC9593DEB68CB676CDCE
3,513,227 UART: [art] SIG.S = 5BFE98D533FC0873865DDEDB5D45B7AE3066E930895DC45B702848C3DD2C79D2E2B4201291615BAE588369B4B2DFC403
3,537,351 UART: Caliptra RT
3,537,694 UART: [state] CFI Enabled
3,657,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,960 UART: [rt]cmd =0x43415053, len=4
3,689,431 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,580 ready_for_fw is high
1,362,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,799 >>> mbox cmd response: success
2,980,799 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
3,042,330 UART:
3,042,346 UART: Running Caliptra FMC ...
3,042,754 UART:
3,042,897 UART: [state] CFI Enabled
3,053,527 UART: [fht] FMC Alias Private Key: 7
3,172,699 UART: [art] Extend RT PCRs Done
3,173,127 UART: [art] Lock RT PCRs Done
3,174,391 UART: [art] Populate DV Done
3,182,574 UART: [fht] FMC Alias Private Key: 7
3,183,524 UART: [art] Derive CDI
3,183,804 UART: [art] Store in slot 0x4
3,269,576 UART: [art] Derive Key Pair
3,269,936 UART: [art] Store priv key in slot 0x5
3,282,821 UART: [art] Derive Key Pair - Done
3,297,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,034 UART: [art] PUB.X = 59E7656B7417881211B50A0BC385F9700E091D385E4785DF860DC87BD987F624EF605B3193D81F9F38177C0B9CEB9EB9
3,320,784 UART: [art] PUB.Y = D454F53F96FCFE516438804284A13E47C6230C443D67F23F8088959A9592D30ABDD9A357EB97AFD7F5AF2A7AD8421D5C
3,327,734 UART: [art] SIG.R = 2F3AE0059114677F6312B0B63EF620087DD123B0B104C7008DA8AC7A6A32333BF546182F0A0996E1A182336D8D875DC0
3,334,463 UART: [art] SIG.S = 5BD2549702551E04FBE50616A3A81BFFA4409E9475B8D6D00A6B59F882BC71DB08D4D80EDBB6735732B5AB46D9347478
3,358,265 UART: Caliptra RT
3,358,608 UART: [state] CFI Enabled
3,478,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,759 UART: [rt]cmd =0x43415053, len=4
3,509,944 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,599 UART: [state] WD Timer not started. Device not locked for debugging
87,924 UART: [kat] SHA2-256
891,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,578 UART: [kat] ++
895,730 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,035 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,176 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,174,200 ready_for_fw is high
1,174,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,815 UART: [idev] Erasing UDS.KEYID = 0
1,198,423 UART: [idev] Sha1 KeyId Algorithm
1,207,363 UART: [idev] --
1,208,232 UART: [ldev] ++
1,208,400 UART: [ldev] CDI.KEYID = 6
1,208,764 UART: [ldev] SUBJECT.KEYID = 5
1,209,191 UART: [ldev] AUTHORITY.KEYID = 7
1,209,654 UART: [ldev] FE.KEYID = 1
1,214,888 UART: [ldev] Erasing FE.KEYID = 1
1,241,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,910 UART: [ldev] --
1,280,117 UART: [fwproc] Wait for Commands...
1,280,724 UART: [fwproc] Recv command 0x46574c44
1,281,457 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,884 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,879 >>> mbox cmd response: success
2,823,879 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,825,095 UART: [afmc] ++
2,825,263 UART: [afmc] CDI.KEYID = 6
2,825,626 UART: [afmc] SUBJECT.KEYID = 7
2,826,052 UART: [afmc] AUTHORITY.KEYID = 5
2,861,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,139 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,020 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,721 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,374 UART: [afmc] --
2,904,407 UART: [cold-reset] --
2,905,429 UART: [state] Locking Datavault
2,906,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,352 UART: [state] Locking ICCM
2,907,876 UART: [exit] Launching FMC @ 0x40000130
2,913,206 UART:
2,913,222 UART: Running Caliptra FMC ...
2,913,630 UART:
2,913,684 UART: [state] CFI Enabled
2,924,580 UART: [fht] FMC Alias Private Key: 7
3,043,602 UART: [art] Extend RT PCRs Done
3,044,030 UART: [art] Lock RT PCRs Done
3,045,790 UART: [art] Populate DV Done
3,053,915 UART: [fht] FMC Alias Private Key: 7
3,054,947 UART: [art] Derive CDI
3,055,227 UART: [art] Store in slot 0x4
3,141,150 UART: [art] Derive Key Pair
3,141,510 UART: [art] Store priv key in slot 0x5
3,154,448 UART: [art] Derive Key Pair - Done
3,169,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,065 UART: [art] PUB.X = E7EF5FE13A3ED4891EC6799A859B3E73B999D8F24844705BF46D80638795B23C7ED7980C57A2F6953AD71CA5727553DA
3,191,834 UART: [art] PUB.Y = 4571445A0DA3113E4DAD90E8F8D53A6A2E3518675FCFE43E493A46B4648040BE02CA8F00A884BAD5E2714A2076D22193
3,198,758 UART: [art] SIG.R = D0056C4C2E58267FE1771CDC886A1EBFF23D5914E9091E8D5A078A50472E2F67829028F68BD7B854B32B98C1B2DC3864
3,205,521 UART: [art] SIG.S = 504235F18CB5B3C69404E18A8C89B2607CE62F5D44952272603343A66B91E518119A434F1EAB5D5A9C4E9CB8D54DDD19
3,229,614 UART: Caliptra RT
3,229,865 UART: [state] CFI Enabled
3,349,724 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,244 UART: [rt]cmd =0x43415053, len=4
3,381,297 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,240 ready_for_fw is high
1,059,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,488 >>> mbox cmd response: success
2,678,488 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,740,555 UART:
2,740,571 UART: Running Caliptra FMC ...
2,740,979 UART:
2,741,033 UART: [state] CFI Enabled
2,751,305 UART: [fht] FMC Alias Private Key: 7
2,869,773 UART: [art] Extend RT PCRs Done
2,870,201 UART: [art] Lock RT PCRs Done
2,871,739 UART: [art] Populate DV Done
2,879,900 UART: [fht] FMC Alias Private Key: 7
2,880,880 UART: [art] Derive CDI
2,881,160 UART: [art] Store in slot 0x4
2,967,023 UART: [art] Derive Key Pair
2,967,383 UART: [art] Store priv key in slot 0x5
2,980,363 UART: [art] Derive Key Pair - Done
2,995,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,737 UART: [art] PUB.X = 9715F06D1F8551BEDB14720336085D764F1EC5FBEF8AA46F91037229094D352614BB8CBF808EFED03FAE3EEE0EE4F612
3,018,504 UART: [art] PUB.Y = B72ED6ADE2473F3C61072B171B0D73057F9A9DFF8118BC2C1C120B79FDAB5DDD85F395E3010D31B00E73B22A62A05490
3,025,443 UART: [art] SIG.R = 451CBBBA1C6C93C1A82F29CD3E8DD670B3AA7EE7B692DD0A14D1A1249DFC5FD399AB96AAEEA292B37242777DB236B1CF
3,032,236 UART: [art] SIG.S = 28D9FEF728693BA4AF35AD1960999D10CC0CCBD862DDBC58E6C50EB74284B8536E21584023526285CDF186D353627A96
3,056,190 UART: Caliptra RT
3,056,441 UART: [state] CFI Enabled
3,176,347 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,041 UART: [rt]cmd =0x43415053, len=4
3,208,320 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,883 UART: [kat] SHA2-256
891,433 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,537 UART: [kat] ++
895,689 UART: [kat] sha1
899,877 UART: [kat] SHA2-256
901,817 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,538 UART: [kat] LMS
1,168,850 UART: [kat] --
1,169,645 UART: [cold-reset] ++
1,170,079 UART: [fht] FHT @ 0x50003400
1,172,851 UART: [idev] ++
1,173,019 UART: [idev] CDI.KEYID = 6
1,173,380 UART: [idev] SUBJECT.KEYID = 7
1,173,805 UART: [idev] UDS.KEYID = 0
1,174,151 ready_for_fw is high
1,174,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,494 UART: [idev] Erasing UDS.KEYID = 0
1,198,564 UART: [idev] Sha1 KeyId Algorithm
1,207,420 UART: [idev] --
1,208,351 UART: [ldev] ++
1,208,519 UART: [ldev] CDI.KEYID = 6
1,208,883 UART: [ldev] SUBJECT.KEYID = 5
1,209,310 UART: [ldev] AUTHORITY.KEYID = 7
1,209,773 UART: [ldev] FE.KEYID = 1
1,215,171 UART: [ldev] Erasing FE.KEYID = 1
1,241,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,571 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,595 UART: [fwproc] Recv command 0x46574c44
1,282,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,079 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,152 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,327 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,504 >>> mbox cmd response: success
2,826,504 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,827,552 UART: [afmc] ++
2,827,720 UART: [afmc] CDI.KEYID = 6
2,828,083 UART: [afmc] SUBJECT.KEYID = 7
2,828,509 UART: [afmc] AUTHORITY.KEYID = 5
2,863,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,764 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,346 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,135 UART: [afmc] --
2,906,150 UART: [cold-reset] --
2,907,174 UART: [state] Locking Datavault
2,908,337 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,941 UART: [state] Locking ICCM
2,909,579 UART: [exit] Launching FMC @ 0x40000130
2,914,909 UART:
2,914,925 UART: Running Caliptra FMC ...
2,915,333 UART:
2,915,476 UART: [state] CFI Enabled
2,926,332 UART: [fht] FMC Alias Private Key: 7
3,044,446 UART: [art] Extend RT PCRs Done
3,044,874 UART: [art] Lock RT PCRs Done
3,046,042 UART: [art] Populate DV Done
3,054,235 UART: [fht] FMC Alias Private Key: 7
3,055,245 UART: [art] Derive CDI
3,055,525 UART: [art] Store in slot 0x4
3,141,202 UART: [art] Derive Key Pair
3,141,562 UART: [art] Store priv key in slot 0x5
3,154,684 UART: [art] Derive Key Pair - Done
3,169,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,969 UART: [art] PUB.X = A8E44C24B9D2B7CA9D297AA78CED1C180E45BC7537399A6847E94B45BD472A176A4A3DDC59A04E61D9667C5B4A569FAE
3,192,750 UART: [art] PUB.Y = 74EA1336F46B9EAE2A7311DB283E939DC0D034053D6E59CD10B2E412E7FE7C6416F8DF31220DD8FF21DE80AA58DACD78
3,199,710 UART: [art] SIG.R = 0088E0E654F3522608BDD693DB4C5D3E20162E9E9B5A0F4DA19B7382CA08169E5EEA26EC62C8769C42C8326ED7E98181
3,206,453 UART: [art] SIG.S = 697B23E45311CBE71115F6201E2EE9F542772F3F47BB2738A48CA7AD8E622901B87EDC19201D72716053095DCB3F6B97
3,229,975 UART: Caliptra RT
3,230,318 UART: [state] CFI Enabled
3,350,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,917 UART: [rt]cmd =0x43415053, len=4
3,382,126 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,561 ready_for_fw is high
1,060,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,265 >>> mbox cmd response: success
2,681,265 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,742,606 UART:
2,742,622 UART: Running Caliptra FMC ...
2,743,030 UART:
2,743,173 UART: [state] CFI Enabled
2,753,737 UART: [fht] FMC Alias Private Key: 7
2,872,301 UART: [art] Extend RT PCRs Done
2,872,729 UART: [art] Lock RT PCRs Done
2,874,487 UART: [art] Populate DV Done
2,882,760 UART: [fht] FMC Alias Private Key: 7
2,883,810 UART: [art] Derive CDI
2,884,090 UART: [art] Store in slot 0x4
2,970,235 UART: [art] Derive Key Pair
2,970,595 UART: [art] Store priv key in slot 0x5
2,983,985 UART: [art] Derive Key Pair - Done
2,998,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,692 UART: [art] PUB.X = F4C988A85A8016E2D90B06002B94F2AE21DB22ADDE31B75BED2787EED821DB31B016D73FDCDC1DAAA6757F76020A4FB4
3,021,448 UART: [art] PUB.Y = B17C51A41EE9F1EE2173642CC0166ED8E60758BC65714DF135EABC3EDB2964B7958F635168CDA51AA01B792938CA2C9A
3,028,405 UART: [art] SIG.R = 09716AB749236E0092F4F392D9BBB99002820263B349BE0F4F73844BE9DDCFF1B66F7D758EA4D75FE7DEA563D1856C8F
3,035,149 UART: [art] SIG.S = CB3F3C889E83EBBE682BF29590C772B49EEC3F4C4F8C5696D1767B6F19EBE82333223F9756D27FDD5516CB02B8412DC4
3,059,092 UART: Caliptra RT
3,059,435 UART: [state] CFI Enabled
3,180,006 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,826 UART: [rt]cmd =0x43415053, len=4
3,212,083 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,200 UART: [kat] SHA2-512-ACC
908,101 UART: [kat] ECC-384
917,784 UART: [kat] HMAC-384Kdf
922,300 UART: [kat] LMS
1,170,628 UART: [kat] --
1,171,255 UART: [cold-reset] ++
1,171,723 UART: [fht] FHT @ 0x50003400
1,174,380 UART: [idev] ++
1,174,548 UART: [idev] CDI.KEYID = 6
1,174,908 UART: [idev] SUBJECT.KEYID = 7
1,175,332 UART: [idev] UDS.KEYID = 0
1,175,677 ready_for_fw is high
1,175,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,040 UART: [idev] Erasing UDS.KEYID = 0
1,200,373 UART: [idev] Sha1 KeyId Algorithm
1,208,949 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,540 UART: [ldev] SUBJECT.KEYID = 5
1,210,966 UART: [ldev] AUTHORITY.KEYID = 7
1,211,429 UART: [ldev] FE.KEYID = 1
1,216,581 UART: [ldev] Erasing FE.KEYID = 1
1,243,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,390 UART: [fwproc] Wait for Commands...
1,282,974 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,030 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,335 >>> mbox cmd response: success
2,827,335 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,828,557 UART: [afmc] ++
2,828,725 UART: [afmc] CDI.KEYID = 6
2,829,087 UART: [afmc] SUBJECT.KEYID = 7
2,829,512 UART: [afmc] AUTHORITY.KEYID = 5
2,865,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,857 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,223 UART: [afmc] --
2,908,153 UART: [cold-reset] --
2,909,017 UART: [state] Locking Datavault
2,910,048 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,652 UART: [state] Locking ICCM
2,911,098 UART: [exit] Launching FMC @ 0x40000130
2,916,428 UART:
2,916,444 UART: Running Caliptra FMC ...
2,916,852 UART:
2,916,906 UART: [state] CFI Enabled
2,927,076 UART: [fht] FMC Alias Private Key: 7
3,046,302 UART: [art] Extend RT PCRs Done
3,046,730 UART: [art] Lock RT PCRs Done
3,047,994 UART: [art] Populate DV Done
3,056,171 UART: [fht] FMC Alias Private Key: 7
3,057,151 UART: [art] Derive CDI
3,057,431 UART: [art] Store in slot 0x4
3,143,242 UART: [art] Derive Key Pair
3,143,602 UART: [art] Store priv key in slot 0x5
3,156,510 UART: [art] Derive Key Pair - Done
3,171,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,811 UART: [art] PUB.X = C825CE768781C8C46F36F7E5DE22645B10DD5014A948EECBD8B5BA19F7FAD3BEB57770E771451412A9F232B1A4ABB43D
3,194,595 UART: [art] PUB.Y = FC6902FE8C52F74674E8F0106A676B34794EEE97C69677B67DADE4AB3DDF98A57F8ABCC68E83A8D6284BFBA29D20D3C8
3,201,560 UART: [art] SIG.R = CA11B4740E4B7D10EC7948E26A38FFA106C3A19C5D97AAE8B72C8BBCF8AAEEF2BC3EB6D63B659C287247727B17CB5269
3,208,344 UART: [art] SIG.S = B599C0C55AD97616E51D623A55DC0024361032D4E3EFCA9F8F82CC1D47A7CE6B7BEE03C9AABF96C8FD42C17031605F74
3,231,871 UART: Caliptra RT
3,232,122 UART: [state] CFI Enabled
3,351,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,640 UART: [rt]cmd =0x43415053, len=4
3,382,933 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 ready_for_fw is high
1,060,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,754 >>> mbox cmd response: success
2,679,754 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,740,867 UART:
2,740,883 UART: Running Caliptra FMC ...
2,741,291 UART:
2,741,345 UART: [state] CFI Enabled
2,751,641 UART: [fht] FMC Alias Private Key: 7
2,870,015 UART: [art] Extend RT PCRs Done
2,870,443 UART: [art] Lock RT PCRs Done
2,871,827 UART: [art] Populate DV Done
2,880,068 UART: [fht] FMC Alias Private Key: 7
2,881,206 UART: [art] Derive CDI
2,881,486 UART: [art] Store in slot 0x4
2,967,203 UART: [art] Derive Key Pair
2,967,563 UART: [art] Store priv key in slot 0x5
2,980,899 UART: [art] Derive Key Pair - Done
2,995,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,054 UART: [art] PUB.X = 1FFDABA67B7579677166CD4942E44D81A5AF81E7FD8A273C91E05E76CB5AD9A66F021C5F972F82C6F49E23232FDFDCA3
3,018,837 UART: [art] PUB.Y = D814BAAFA5560B25E8E1BFC7668421EE0ADE28F6CAFA700E816D20B0DDF53283789E539A8DC3B4ABB9E40981F8F68BCA
3,025,797 UART: [art] SIG.R = 21DC13744BB6B1D193334481BA9F4E720B8F770616860FA3ACE6740332124D05A3F5DC7A1AABDAFF5901193EBB5D0D42
3,032,554 UART: [art] SIG.S = B4C7864929D0B0F0DB68FFE8EF83E832A6A861AE42427AA92EB3CE96441CF11895D581D54125AA5AA4F5698C51743642
3,056,448 UART: Caliptra RT
3,056,699 UART: [state] CFI Enabled
3,175,226 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,978 UART: [rt]cmd =0x43415053, len=4
3,207,131 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,892 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
893,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,920 UART: [kat] ++
898,072 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
906,935 UART: [kat] SHA2-512-ACC
908,836 UART: [kat] ECC-384
919,265 UART: [kat] HMAC-384Kdf
923,927 UART: [kat] LMS
1,172,255 UART: [kat] --
1,172,984 UART: [cold-reset] ++
1,173,556 UART: [fht] FHT @ 0x50003400
1,176,269 UART: [idev] ++
1,176,437 UART: [idev] CDI.KEYID = 6
1,176,797 UART: [idev] SUBJECT.KEYID = 7
1,177,221 UART: [idev] UDS.KEYID = 0
1,177,566 ready_for_fw is high
1,177,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,381 UART: [idev] Erasing UDS.KEYID = 0
1,202,164 UART: [idev] Sha1 KeyId Algorithm
1,210,790 UART: [idev] --
1,211,778 UART: [ldev] ++
1,211,946 UART: [ldev] CDI.KEYID = 6
1,212,309 UART: [ldev] SUBJECT.KEYID = 5
1,212,735 UART: [ldev] AUTHORITY.KEYID = 7
1,213,198 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,245,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,790 UART: [ldev] --
1,285,127 UART: [fwproc] Wait for Commands...
1,285,795 UART: [fwproc] Recv command 0x46574c44
1,286,523 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,884 >>> mbox cmd response: success
2,828,884 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,829,928 UART: [afmc] ++
2,830,096 UART: [afmc] CDI.KEYID = 6
2,830,458 UART: [afmc] SUBJECT.KEYID = 7
2,830,883 UART: [afmc] AUTHORITY.KEYID = 5
2,866,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,708 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,591 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,050 UART: [afmc] --
2,909,932 UART: [cold-reset] --
2,910,842 UART: [state] Locking Datavault
2,911,971 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,575 UART: [state] Locking ICCM
2,913,105 UART: [exit] Launching FMC @ 0x40000130
2,918,435 UART:
2,918,451 UART: Running Caliptra FMC ...
2,918,859 UART:
2,919,002 UART: [state] CFI Enabled
2,929,992 UART: [fht] FMC Alias Private Key: 7
3,048,668 UART: [art] Extend RT PCRs Done
3,049,096 UART: [art] Lock RT PCRs Done
3,050,604 UART: [art] Populate DV Done
3,058,893 UART: [fht] FMC Alias Private Key: 7
3,059,953 UART: [art] Derive CDI
3,060,233 UART: [art] Store in slot 0x4
3,145,980 UART: [art] Derive Key Pair
3,146,340 UART: [art] Store priv key in slot 0x5
3,159,858 UART: [art] Derive Key Pair - Done
3,174,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,628 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,393 UART: [art] PUB.X = 3789ECB9D7754837D756FA41F4727385654403D19BA2B2DF5D7823DC2D13A30FFDBF817A2852725B6CC52E8EC10A2C02
3,197,155 UART: [art] PUB.Y = DF56B237D6111DDEF089D146D457A96C40E1E3F56C8B5F4BAAD9BBBCA26E0B80EA136F2D663106B35EACE5CB6C2518E0
3,204,121 UART: [art] SIG.R = 578A2A929545CAC41287A91CD2D42DCCD0C066F611545F4BED5E10329484CD2F3E3207CCD4CB04C195AC9B8DC0202660
3,210,893 UART: [art] SIG.S = 24CAFE4E4137677D748AC4DCE124C825C7FD82AFDDE06F14A16582CAB1298C0923A9CFC3DD1DBABDA2285E678A5E0850
3,235,085 UART: Caliptra RT
3,235,428 UART: [state] CFI Enabled
3,354,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,926 UART: [rt]cmd =0x43415053, len=4
3,386,033 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,590 ready_for_fw is high
1,060,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,399 >>> mbox cmd response: success
2,679,399 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,741,590 UART:
2,741,606 UART: Running Caliptra FMC ...
2,742,014 UART:
2,742,157 UART: [state] CFI Enabled
2,752,833 UART: [fht] FMC Alias Private Key: 7
2,872,003 UART: [art] Extend RT PCRs Done
2,872,431 UART: [art] Lock RT PCRs Done
2,873,945 UART: [art] Populate DV Done
2,882,322 UART: [fht] FMC Alias Private Key: 7
2,883,296 UART: [art] Derive CDI
2,883,576 UART: [art] Store in slot 0x4
2,969,137 UART: [art] Derive Key Pair
2,969,497 UART: [art] Store priv key in slot 0x5
2,983,237 UART: [art] Derive Key Pair - Done
2,997,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,812 UART: [art] PUB.X = C8422AFDCBD0149858197003E8D216A999CC18273E0C3DB3E7C7C33C3ACCBA4D6FAF135432294CF43C350108963B7F2A
3,020,578 UART: [art] PUB.Y = 42C86FB581AE0A834FB76E56C5547F3C885EAB43F4D916A05655D82E1359305A60E2C210E4194038B4D54B7A3B537EA0
3,027,525 UART: [art] SIG.R = AD6CD4053F40979DB2B9E7B2B773AF68EB2839CBA3480BFD5F6011BC81DEBB86BEFAC2BEB76F5EC04C0D47DA784B2093
3,034,312 UART: [art] SIG.S = 61F29AD6E043199BB57C2D4D03C472E709DFBBEE3FB04F769BE820E406179D0B3330B797F894E055C8263863FB33639E
3,057,784 UART: Caliptra RT
3,058,127 UART: [state] CFI Enabled
3,177,708 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,018 UART: [rt]cmd =0x43415053, len=4
3,209,101 >>> mbox cmd response data (24 bytes)
test test_info::test_capabilities ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
Truncated 1664 bytes from beginning
7,348,022 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,287 UART: [idev] --
7,373,117 UART: [ldev] ++
7,373,685 UART: [ldev] CDI.KEYID = 6
7,374,666 UART: [ldev] SUBJECT.KEYID = 5
7,375,899 UART: [ldev] AUTHORITY.KEYID = 7
7,377,128 UART: [ldev] FE.KEYID = 1
7,424,072 UART: [ldev] Erasing FE.KEYID = 1
10,753,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,959 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,051 UART: [ldev] --
13,119,295 UART: [fwproc] Waiting for Commands...
13,122,471 UART: [fwproc] Received command 0x46574c44
13,124,661 UART: [fwproc] Received Image of size 118548 bytes
17,229,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,892 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,096 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,316 >>> mbox cmd response: success
17,707,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,710,807 UART: [afmc] ++
17,711,388 UART: [afmc] CDI.KEYID = 6
17,712,408 UART: [afmc] SUBJECT.KEYID = 7
17,713,558 UART: [afmc] AUTHORITY.KEYID = 5
21,074,670 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,226 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,489 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,388,094 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,402,889 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,417,285 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,438,899 UART: [afmc] --
23,443,314 UART: [cold-reset] --
23,448,855 UART: [state] Locking Datavault
23,453,125 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,876 UART: [state] Locking ICCM
23,456,131 UART: [exit] Launching FMC @ 0x40000130
23,464,526 UART:
23,464,766 UART: Running Caliptra FMC ...
23,465,868 UART:
23,466,034 UART: [state] CFI Enabled
23,533,531 UART: [fht] FMC Alias Private Key: 7
25,874,500 UART: [art] Extend RT PCRs Done
25,875,740 UART: [art] Lock RT PCRs Done
25,877,797 UART: [art] Populate DV Done
25,883,212 UART: [fht] FMC Alias Private Key: 7
25,884,859 UART: [art] Derive CDI
25,885,668 UART: [art] Store in slot 0x4
25,942,088 UART: [art] Derive Key Pair
25,943,090 UART: [art] Store priv key in slot 0x5
29,236,218 UART: [art] Derive Key Pair - Done
29,249,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,291 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,798 UART: [art] PUB.X = AAC948C035C4FDD53D366CD53D54CB7EC13E26181CD5CE7F5D0C6F1E511557A6453DE97AD372FF371B041DA1172D9535
31,547,181 UART: [art] PUB.Y = CB56251DB803F62BDC67384D2DB4EC10C351F69A9EDCBDCDF501C7AF035EC156B9A2E0602CC0E0B9E76AE08F718FB39E
31,554,311 UART: [art] SIG.R = 29CF81B01E011107FDEDD806B9EF5B94C264FD4962612BB9A03DAA4F3B5DF32F2700039FEEB6509276A3FE32E02F0AEA
31,561,704 UART: [art] SIG.S = A8E56093086564AB880531696413E7587B2191E7F06B4C708CEADE54BF29830BD5C798EB2039DA92A5CCC6E1AE5BC0D8
32,866,319 UART: Caliptra RT
32,867,030 UART: [state] CFI Enabled
33,043,681 UART: [rt] RT listening for mailbox commands...
33,074,959 UART: [rt]cmd =0x494e464f, len=4
33,079,278 >>> mbox cmd response data (312 bytes)
35,155,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,306,046 UART:
35,306,412 UART: Running Caliptra ROM ...
35,307,667 UART:
35,307,832 UART: [state] CFI Enabled
35,381,907 UART: [state] LifecycleState = Unprovisioned
35,383,817 UART: [state] DebugLocked = No
35,386,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,390,514 UART: [kat] SHA2-256
35,560,262 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,570,728 UART: [kat] ++
35,571,188 UART: [kat] sha1
35,582,270 UART: [kat] SHA2-256
35,584,959 UART: [kat] SHA2-384
35,591,815 UART: [kat] SHA2-512-ACC
35,594,179 UART: [kat] ECC-384
37,880,917 UART: [kat] HMAC-384Kdf
37,892,447 UART: [kat] LMS
39,082,790 UART: [kat] --
39,087,826 UART: [update-reset] ++
43,275,048 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,278,885 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,676,652 >>> mbox cmd response: success
43,677,145 UART: [update-reset] Copying MAN_2 To MAN_1
43,699,587 UART: [update-reset Success] --
43,703,485 UART: [state] Locking Datavault
43,707,167 UART: [state] Locking PCR0, PCR1 and PCR31
43,708,963 UART: [state] Locking ICCM
43,711,440 UART: [exit] Launching FMC @ 0x40000130
43,719,895 UART:
43,720,127 UART: Running Caliptra FMC ...
43,721,250 UART:
43,721,420 UART: [state] CFI Enabled
43,815,043 UART: [art] Extend RT PCRs Done
43,816,221 UART: [art] Lock RT PCRs Done
43,817,730 UART: [art] Populate DV Done
43,823,243 UART: [fht] FMC Alias Private Key: 7
43,824,936 UART: [art] Derive CDI
43,825,812 UART: [art] Store in slot 0x4
43,884,129 UART: [art] Derive Key Pair
43,885,164 UART: [art] Store priv key in slot 0x5
47,178,123 UART: [art] Derive Key Pair - Done
47,191,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,479,417 UART: [art] Erasing AUTHORITY.KEYID = 7
49,480,924 UART: [art] PUB.X = F1EC9C7D4F418C5EC10A2BE1051BEDD68063BD5F874CE123886F7328BB14A50FB3432E9C67B1B45C219F632E9E247AF4
49,488,224 UART: [art] PUB.Y = 13A017934019D0B7BBFB2EE0EF84C5B5269EB97000642F3E433BF89D49BFE121CD6A51199D618098081877D5C7015334
49,495,457 UART: [art] SIG.R = 0B8D658C5A422555291D70893EE4F25DC260B2C3CD5B156DC773FF4A5FD5591F24A91D94AF7CFBD5FD664EFEAC35A246
49,502,863 UART: [art] SIG.S = 98E1302331CF389D7CB4CEAAA3E7E60680A31DBFCA1070BE530740DAF97971EB0A40F9A3366A21CC6C0D97BB34DFA355
50,807,787 UART: Caliptra RT
50,808,493 UART: [state] CFI Enabled
51,225,903 UART: [rt] RT listening for mailbox commands...
51,227,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,257,704 UART: [rt]cmd =0x494e464f, len=4
51,261,869 >>> mbox cmd response data (312 bytes)
53,337,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,488,675 UART:
53,489,111 UART: Running Caliptra ROM ...
53,490,166 UART:
53,490,320 UART: [state] CFI Enabled
53,556,659 UART: [state] LifecycleState = Unprovisioned
53,558,597 UART: [state] DebugLocked = No
53,559,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,564,043 UART: [kat] SHA2-256
53,733,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,744,229 UART: [kat] ++
53,744,687 UART: [kat] sha1
53,755,625 UART: [kat] SHA2-256
53,758,324 UART: [kat] SHA2-384
53,763,069 UART: [kat] SHA2-512-ACC
53,765,472 UART: [kat] ECC-384
56,058,011 UART: [kat] HMAC-384Kdf
56,090,818 UART: [kat] LMS
57,281,120 UART: [kat] --
57,286,848 UART: [update-reset] ++
61,477,821 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,481,892 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,879,638 >>> mbox cmd response: success
61,881,606 UART: [update-reset] Copying MAN_2 To MAN_1
61,904,011 UART: [update-reset Success] --
61,907,281 UART: [state] Locking Datavault
61,909,884 UART: [state] Locking PCR0, PCR1 and PCR31
61,911,585 UART: [state] Locking ICCM
61,914,336 UART: [exit] Launching FMC @ 0x40000130
61,922,787 UART:
61,923,023 UART: Running Caliptra FMC ...
61,924,077 UART:
61,924,234 UART: [state] CFI Enabled
62,011,619 UART: [art] Extend RT PCRs Done
62,012,807 UART: [art] Lock RT PCRs Done
62,014,209 UART: [art] Populate DV Done
62,020,103 UART: [fht] FMC Alias Private Key: 7
62,021,604 UART: [art] Derive CDI
62,022,424 UART: [art] Store in slot 0x4
62,081,087 UART: [art] Derive Key Pair
62,082,126 UART: [art] Store priv key in slot 0x5
65,374,364 UART: [art] Derive Key Pair - Done
65,387,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,676,960 UART: [art] Erasing AUTHORITY.KEYID = 7
67,678,470 UART: [art] PUB.X = F15CB8ED518905CABB2237C13343DFE6BF474B0DDF2311F82EBA412F110B0206EA0D83DB6938C09CDBE673798B1E0943
67,685,814 UART: [art] PUB.Y = BCDF320A6F1C65CA63EEEB9400911E2E35CD324D1B92C1497B38644826F725E3A213FF9765663745E3DD69AE5A849FEA
67,693,004 UART: [art] SIG.R = E544163C401DD2904794CFFEA0150D8271F0C3688E8AF57E4FC0D30C050EA2C56F275605D4E0DC87D4366833AF5C4A28
67,700,399 UART: [art] SIG.S = DFDFCEC4B1099AEF979B7DDDD29861AE3E3E31F7FD7C438B3FAAC80D2C8927A4F5BCB49FD75E7F546D406A6360932207
69,006,110 UART: Caliptra RT
69,006,827 UART: [state] CFI Enabled
69,419,326 UART: [rt] RT listening for mailbox commands...
69,421,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,451,020 UART: [rt]cmd =0x494e464f, len=4
69,455,263 >>> mbox cmd response data (312 bytes)
69,457,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,607,098 UART:
69,607,422 UART: Running Caliptra ROM ...
69,608,545 UART:
69,608,704 UART: [state] CFI Enabled
69,682,272 UART: [state] LifecycleState = Unprovisioned
69,684,203 UART: [state] DebugLocked = No
69,686,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,691,510 UART: [kat] SHA2-256
69,861,191 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,871,702 UART: [kat] ++
69,872,161 UART: [kat] sha1
69,882,664 UART: [kat] SHA2-256
69,885,349 UART: [kat] SHA2-384
69,891,057 UART: [kat] SHA2-512-ACC
69,893,419 UART: [kat] ECC-384
72,185,491 UART: [kat] HMAC-384Kdf
72,217,328 UART: [kat] LMS
73,407,653 UART: [kat] --
73,413,011 UART: [update-reset] ++
77,603,240 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,607,721 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
78,005,426 >>> mbox cmd response: success
78,005,804 UART: [update-reset] Copying MAN_2 To MAN_1
78,028,193 UART: [update-reset Success] --
78,031,872 UART: [state] Locking Datavault
78,035,088 UART: [state] Locking PCR0, PCR1 and PCR31
78,036,851 UART: [state] Locking ICCM
78,039,143 UART: [exit] Launching FMC @ 0x40000130
78,047,595 UART:
78,047,830 UART: Running Caliptra FMC ...
78,048,953 UART:
78,049,115 UART: [state] CFI Enabled
78,139,866 UART: [art] Extend RT PCRs Done
78,141,051 UART: [art] Lock RT PCRs Done
78,142,561 UART: [art] Populate DV Done
78,147,750 UART: [fht] FMC Alias Private Key: 7
78,149,397 UART: [art] Derive CDI
78,150,208 UART: [art] Store in slot 0x4
78,208,977 UART: [art] Derive Key Pair
78,210,016 UART: [art] Store priv key in slot 0x5
81,502,771 UART: [art] Derive Key Pair - Done
81,515,924 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,804,643 UART: [art] Erasing AUTHORITY.KEYID = 7
83,806,154 UART: [art] PUB.X = F1EC9C7D4F418C5EC10A2BE1051BEDD68063BD5F874CE123886F7328BB14A50FB3432E9C67B1B45C219F632E9E247AF4
83,813,447 UART: [art] PUB.Y = 13A017934019D0B7BBFB2EE0EF84C5B5269EB97000642F3E433BF89D49BFE121CD6A51199D618098081877D5C7015334
83,820,682 UART: [art] SIG.R = 0B8D658C5A422555291D70893EE4F25DC260B2C3CD5B156DC773FF4A5FD5591F24A91D94AF7CFBD5FD664EFEAC35A246
83,828,088 UART: [art] SIG.S = 98E1302331CF389D7CB4CEAAA3E7E60680A31DBFCA1070BE530740DAF97971EB0A40F9A3366A21CC6C0D97BB34DFA355
85,133,647 UART: Caliptra RT
85,134,360 UART: [state] CFI Enabled
85,549,959 UART: [rt] RT listening for mailbox commands...
85,551,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,581,566 UART: [rt]cmd =0x494e464f, len=4
85,585,837 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,806,704 ready_for_fw is high
3,807,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,951,290 >>> mbox cmd response: success
17,953,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,643,576 UART:
23,643,975 UART: Running Caliptra FMC ...
23,645,180 UART:
23,645,356 UART: [state] CFI Enabled
23,712,486 UART: [fht] FMC Alias Private Key: 7
26,052,993 UART: [art] Extend RT PCRs Done
26,054,238 UART: [art] Lock RT PCRs Done
26,056,070 UART: [art] Populate DV Done
26,061,572 UART: [fht] FMC Alias Private Key: 7
26,063,275 UART: [art] Derive CDI
26,064,013 UART: [art] Store in slot 0x4
26,120,654 UART: [art] Derive Key Pair
26,121,694 UART: [art] Store priv key in slot 0x5
29,414,377 UART: [art] Derive Key Pair - Done
29,427,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,715,753 UART: [art] Erasing AUTHORITY.KEYID = 7
31,717,275 UART: [art] PUB.X = 78F49F09FEC03B36EA91457298ADE7DE40381912A8BDE550EAA566E612E0DFE67DF6BAC213DF5DED5AA9DC1433776E6A
31,724,580 UART: [art] PUB.Y = B9FDB32C62618C11BB05A03234F1A6896A1F9B16BB54CDBBBFAA8C88C8FFFB455673B1C5B30D40A0608C9CBA6980E372
31,731,876 UART: [art] SIG.R = E52CF5382097B8EB4FD4A26FBDAC59A3F4F5BFDB7244EFED764E6325DF7D56C51F795D77C01DFE696B22D966BF3BEDE1
31,739,260 UART: [art] SIG.S = 1DF4CF1544FF2C7DA18B9F9CDDBE445D76A529C510B29B7DE0F57AF14DEEA7FCCCA447EA108BD84AB9F26F48053A696C
33,044,551 UART: Caliptra RT
33,045,271 UART: [state] CFI Enabled
33,240,409 UART: [rt] RT listening for mailbox commands...
33,271,937 UART: [rt]cmd =0x494e464f, len=4
33,276,273 >>> mbox cmd response data (312 bytes)
35,353,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,181,391 >>> mbox cmd response: success
44,218,553 UART:
44,218,849 UART: Running Caliptra FMC ...
44,219,896 UART:
44,220,046 UART: [state] CFI Enabled
44,326,944 UART: [art] Extend RT PCRs Done
44,328,133 UART: [art] Lock RT PCRs Done
44,329,459 UART: [art] Populate DV Done
44,335,156 UART: [fht] FMC Alias Private Key: 7
44,336,848 UART: [art] Derive CDI
44,337,593 UART: [art] Store in slot 0x4
44,396,144 UART: [art] Derive Key Pair
44,397,163 UART: [art] Store priv key in slot 0x5
47,690,068 UART: [art] Derive Key Pair - Done
47,703,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,990,922 UART: [art] Erasing AUTHORITY.KEYID = 7
49,992,479 UART: [art] PUB.X = F0DE321C9DB1D9A8FC511EAE9BC9A7BDE9AE4EF546CAD9104530A50AC2907F0B109557DA42642D3E967E1D2A504A4C54
49,999,675 UART: [art] PUB.Y = 550346FECF3C2B34477461C3DBDC307DA22ADE17D270F2099D6B6C8B9A864FD29C178849D4A5FABB6A821B9868C951BA
50,006,953 UART: [art] SIG.R = 9E71340CE1975D6BA866158D786A1C49467CA46E1A6876003BF5DCDA3D23A255E911BC4E24517F6835F9DB54DE96769E
50,014,393 UART: [art] SIG.S = 60A07472F7917F6CF9B52B98B056181A4A79E9EF6D2476E6A55DB9510B9790FBF458981B3D515675E5D131BD2768BFBF
51,319,621 UART: Caliptra RT
51,320,313 UART: [state] CFI Enabled
51,740,271 UART: [rt] RT listening for mailbox commands...
51,742,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,771,690 UART: [rt]cmd =0x494e464f, len=4
51,775,973 >>> mbox cmd response data (312 bytes)
53,850,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,676,680 >>> mbox cmd response: success
62,711,027 UART:
62,711,336 UART: Running Caliptra FMC ...
62,712,451 UART:
62,712,617 UART: [state] CFI Enabled
62,816,287 UART: [art] Extend RT PCRs Done
62,817,482 UART: [art] Lock RT PCRs Done
62,818,940 UART: [art] Populate DV Done
62,824,564 UART: [fht] FMC Alias Private Key: 7
62,826,153 UART: [art] Derive CDI
62,826,917 UART: [art] Store in slot 0x4
62,886,115 UART: [art] Derive Key Pair
62,887,117 UART: [art] Store priv key in slot 0x5
66,179,836 UART: [art] Derive Key Pair - Done
66,192,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,481,018 UART: [art] Erasing AUTHORITY.KEYID = 7
68,482,527 UART: [art] PUB.X = E144BAFEF3B90BE7B3BBB97618CC8C9FAB0C1EDA2C56115F1ED9D45D3A43E27C876CAF3A25033206147FCBA97C7BFC3D
68,489,778 UART: [art] PUB.Y = 851EB66D32B6190F87B3A498BA5176C3EDFF5F609E5B5FD6C804181E2F56161441B4EE6F0E338A94B28B4061CF7C0DDF
68,497,045 UART: [art] SIG.R = 1F1A11A52EF00AFDA169031F356807F1E9E7D8A3D96E77F1EF595FB7953FEBE27A4E477BA67795F35F73DA1AF6B60585
68,504,458 UART: [art] SIG.S = 893C8AB2710C08073D16A51B54C825E0BB6C970EBC5F1CF88599E9AE2BCC39777E9B956D719D710FD002A283FED6F1B6
69,810,240 UART: Caliptra RT
69,810,942 UART: [state] CFI Enabled
70,248,283 UART: [rt] RT listening for mailbox commands...
70,250,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,279,973 UART: [rt]cmd =0x494e464f, len=4
70,284,251 >>> mbox cmd response data (312 bytes)
70,286,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
79,097,932 >>> mbox cmd response: success
79,131,675 UART:
79,131,946 UART: Running Caliptra FMC ...
79,133,080 UART:
79,133,247 UART: [state] CFI Enabled
79,236,704 UART: [art] Extend RT PCRs Done
79,237,891 UART: [art] Lock RT PCRs Done
79,239,378 UART: [art] Populate DV Done
79,244,947 UART: [fht] FMC Alias Private Key: 7
79,246,589 UART: [art] Derive CDI
79,247,325 UART: [art] Store in slot 0x4
79,305,498 UART: [art] Derive Key Pair
79,306,539 UART: [art] Store priv key in slot 0x5
82,599,265 UART: [art] Derive Key Pair - Done
82,612,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,900,319 UART: [art] Erasing AUTHORITY.KEYID = 7
84,901,837 UART: [art] PUB.X = F0DE321C9DB1D9A8FC511EAE9BC9A7BDE9AE4EF546CAD9104530A50AC2907F0B109557DA42642D3E967E1D2A504A4C54
84,909,092 UART: [art] PUB.Y = 550346FECF3C2B34477461C3DBDC307DA22ADE17D270F2099D6B6C8B9A864FD29C178849D4A5FABB6A821B9868C951BA
84,916,384 UART: [art] SIG.R = 9E71340CE1975D6BA866158D786A1C49467CA46E1A6876003BF5DCDA3D23A255E911BC4E24517F6835F9DB54DE96769E
84,923,792 UART: [art] SIG.S = 60A07472F7917F6CF9B52B98B056181A4A79E9EF6D2476E6A55DB9510B9790FBF458981B3D515675E5D131BD2768BFBF
86,229,196 UART: Caliptra RT
86,229,916 UART: [state] CFI Enabled
86,663,154 UART: [rt] RT listening for mailbox commands...
86,664,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
86,694,715 UART: [rt]cmd =0x494e464f, len=4
86,699,049 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.45s
Truncated 1664 bytes from beginning
7,633,210 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,443 UART: [idev] --
7,658,413 UART: [ldev] ++
7,658,986 UART: [ldev] CDI.KEYID = 6
7,659,955 UART: [ldev] SUBJECT.KEYID = 5
7,661,154 UART: [ldev] AUTHORITY.KEYID = 7
7,662,429 UART: [ldev] FE.KEYID = 1
7,674,420 UART: [ldev] Erasing FE.KEYID = 1
10,962,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,611 UART: [ldev] --
13,326,975 UART: [fwproc] Waiting for Commands...
13,329,119 UART: [fwproc] Received command 0x46574c44
13,331,352 UART: [fwproc] Received Image of size 118548 bytes
17,435,877 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,064 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,616 >>> mbox cmd response: success
17,910,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,914,294 UART: [afmc] ++
17,914,877 UART: [afmc] CDI.KEYID = 6
17,915,760 UART: [afmc] SUBJECT.KEYID = 7
17,917,015 UART: [afmc] AUTHORITY.KEYID = 5
21,231,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,920 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
23,543,487 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
23,558,309 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
23,572,702 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
23,593,817 UART: [afmc] --
23,597,459 UART: [cold-reset] --
23,600,390 UART: [state] Locking Datavault
23,605,570 UART: [state] Locking PCR0, PCR1 and PCR31
23,607,325 UART: [state] Locking ICCM
23,609,014 UART: [exit] Launching FMC @ 0x40000130
23,617,399 UART:
23,617,623 UART: Running Caliptra FMC ...
23,618,713 UART:
23,618,870 UART: [state] CFI Enabled
23,626,799 UART: [fht] FMC Alias Private Key: 7
25,966,919 UART: [art] Extend RT PCRs Done
25,968,161 UART: [art] Lock RT PCRs Done
25,969,411 UART: [art] Populate DV Done
25,974,657 UART: [fht] FMC Alias Private Key: 7
25,976,119 UART: [art] Derive CDI
25,977,054 UART: [art] Store in slot 0x4
26,020,133 UART: [art] Derive Key Pair
26,021,131 UART: [art] Store priv key in slot 0x5
29,263,512 UART: [art] Derive Key Pair - Done
29,276,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,003 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,515 UART: [art] PUB.X = 086AD794C1959D37F0F5B966F6C8A2FC7448B5AB4CB01FB70CF1A6DEA2F764077BD080ECCB7B07640A1261319718244E
31,565,750 UART: [art] PUB.Y = C29A808536336C7CCD2F9C1CDB3A192E671EBF0E0C0EC086E96006A9E64293DE87DB282029D6147EB3753EEDBD03B566
31,573,004 UART: [art] SIG.R = C2E06EED562AC951B06EBD1CAB0EB631A29A80BD8EB1B57017951748AE8DEADDE5BE3C3E2F613858220EEA9F7DABD6AF
31,580,463 UART: [art] SIG.S = F659FC8615C58FD464E9E9C469113FDA93BC5E741469944C0DCF1A0556157FDAD4F7C7DE39EEC6B789E9842CAEC4730E
32,885,347 UART: Caliptra RT
32,886,055 UART: [state] CFI Enabled
33,018,429 UART: [rt] RT listening for mailbox commands...
33,050,057 UART: [rt]cmd =0x494e464f, len=4
33,054,226 >>> mbox cmd response data (312 bytes)
35,128,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,278,591 UART:
35,278,974 UART: Running Caliptra ROM ...
35,280,064 UART:
35,280,220 UART: [state] CFI Enabled
35,295,413 UART: [state] LifecycleState = Unprovisioned
35,297,326 UART: [state] DebugLocked = No
35,298,814 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,303,163 UART: [kat] SHA2-256
35,472,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,483,360 UART: [kat] ++
35,483,809 UART: [kat] sha1
35,496,582 UART: [kat] SHA2-256
35,499,314 UART: [kat] SHA2-384
35,505,299 UART: [kat] SHA2-512-ACC
35,507,639 UART: [kat] ECC-384
37,792,943 UART: [kat] HMAC-384Kdf
37,805,298 UART: [kat] LMS
38,995,343 UART: [kat] --
39,000,275 UART: [update-reset] ++
43,187,361 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,191,465 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,589,202 >>> mbox cmd response: success
43,590,841 UART: [update-reset] Copying MAN_2 To MAN_1
43,613,223 UART: [update-reset Success] --
43,617,231 UART: [state] Locking Datavault
43,620,308 UART: [state] Locking PCR0, PCR1 and PCR31
43,622,054 UART: [state] Locking ICCM
43,624,200 UART: [exit] Launching FMC @ 0x40000130
43,632,642 UART:
43,632,868 UART: Running Caliptra FMC ...
43,633,958 UART:
43,634,110 UART: [state] CFI Enabled
43,678,229 UART: [art] Extend RT PCRs Done
43,679,412 UART: [art] Lock RT PCRs Done
43,680,644 UART: [art] Populate DV Done
43,686,043 UART: [fht] FMC Alias Private Key: 7
43,687,787 UART: [art] Derive CDI
43,688,663 UART: [art] Store in slot 0x4
43,730,826 UART: [art] Derive Key Pair
43,731,867 UART: [art] Store priv key in slot 0x5
46,973,982 UART: [art] Derive Key Pair - Done
46,986,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,266,783 UART: [art] Erasing AUTHORITY.KEYID = 7
49,268,287 UART: [art] PUB.X = 894B709B0E7F2788B7D8EDD07C0790B6FE02C101C3BA1F06023DDCE866B2670FDA3074FB290A3DF2B935A7381A1BF615
49,275,575 UART: [art] PUB.Y = 3C31E8E9E25AA1D91318B5D4CB5FF38A4F8E4B76DE773BF54947E024BC9DACEB039160F12947CBA93735C9DC69F9F067
49,282,845 UART: [art] SIG.R = 044C980C88BFE390776DCCA86468217921778CAF949C47B6214F1586A142B26367F6B1CC265DE085EEE9DD73A7F4E4E3
49,290,221 UART: [art] SIG.S = 0D8DDDD25D19F879AD9E8D0C8FC62E6FC3FEEB336EA48D5C3377F765503091229C8E25F030F920D6BA1381A15DEB813C
50,595,970 UART: Caliptra RT
50,596,667 UART: [state] CFI Enabled
50,967,160 UART: [rt] RT listening for mailbox commands...
50,969,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,998,589 UART: [rt]cmd =0x494e464f, len=4
51,002,918 >>> mbox cmd response data (312 bytes)
53,072,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
53,223,293 UART:
53,223,698 UART: Running Caliptra ROM ...
53,224,743 UART:
53,224,961 UART: [state] CFI Enabled
53,238,478 UART: [state] LifecycleState = Unprovisioned
53,240,371 UART: [state] DebugLocked = No
53,243,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
53,247,734 UART: [kat] SHA2-256
53,417,487 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,428,017 UART: [kat] ++
53,428,472 UART: [kat] sha1
53,439,102 UART: [kat] SHA2-256
53,441,796 UART: [kat] SHA2-384
53,446,963 UART: [kat] SHA2-512-ACC
53,449,303 UART: [kat] ECC-384
55,735,030 UART: [kat] HMAC-384Kdf
55,745,763 UART: [kat] LMS
56,935,868 UART: [kat] --
56,939,610 UART: [update-reset] ++
61,128,910 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,131,878 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,529,636 >>> mbox cmd response: success
61,531,366 UART: [update-reset] Copying MAN_2 To MAN_1
61,553,808 UART: [update-reset Success] --
61,558,735 UART: [state] Locking Datavault
61,562,623 UART: [state] Locking PCR0, PCR1 and PCR31
61,564,312 UART: [state] Locking ICCM
61,566,904 UART: [exit] Launching FMC @ 0x40000130
61,575,309 UART:
61,575,580 UART: Running Caliptra FMC ...
61,576,680 UART:
61,576,833 UART: [state] CFI Enabled
61,621,106 UART: [art] Extend RT PCRs Done
61,622,247 UART: [art] Lock RT PCRs Done
61,623,479 UART: [art] Populate DV Done
61,629,142 UART: [fht] FMC Alias Private Key: 7
61,630,840 UART: [art] Derive CDI
61,631,645 UART: [art] Store in slot 0x4
61,674,177 UART: [art] Derive Key Pair
61,675,212 UART: [art] Store priv key in slot 0x5
64,916,501 UART: [art] Derive Key Pair - Done
64,929,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,210,405 UART: [art] Erasing AUTHORITY.KEYID = 7
67,211,928 UART: [art] PUB.X = D744CACE2A48D1178CAE1992489592C8E787D96244CC8A6141E8D98688BBA5FE084EDE694AF52F4576914C9F99C45FEA
67,219,170 UART: [art] PUB.Y = 789BCFDEF3B6ABF6DD54CA5C60E769FF2EE4208174A3D26A2AE6749D98EFFBFC77AE384002B4DDFAC83C838EAB445A40
67,226,498 UART: [art] SIG.R = ABFCAC509E522D383DEEEBFD1AC21B82367A8B2CB22FD22A070201EF7B24FF52404EB7BD206456D0B0BE8D5BC3D40AB0
67,233,938 UART: [art] SIG.S = F7427F763DEE1EDA9FBA2E7902D15AC63707CA41749889D9AE066BA3ADEDB968B4CE5157BC9261025DE77F7EA8ECDF9E
68,538,855 UART: Caliptra RT
68,539,566 UART: [state] CFI Enabled
68,911,274 UART: [rt] RT listening for mailbox commands...
68,913,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,942,750 UART: [rt]cmd =0x494e464f, len=4
68,947,006 >>> mbox cmd response data (312 bytes)
68,948,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
69,098,874 UART:
69,099,183 UART: Running Caliptra ROM ...
69,100,216 UART:
69,100,523 UART: [state] CFI Enabled
69,116,627 UART: [state] LifecycleState = Unprovisioned
69,118,584 UART: [state] DebugLocked = No
69,119,878 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
69,124,438 UART: [kat] SHA2-256
69,294,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
69,304,717 UART: [kat] ++
69,305,166 UART: [kat] sha1
69,316,098 UART: [kat] SHA2-256
69,318,779 UART: [kat] SHA2-384
69,323,679 UART: [kat] SHA2-512-ACC
69,326,067 UART: [kat] ECC-384
71,611,180 UART: [kat] HMAC-384Kdf
71,623,082 UART: [kat] LMS
72,813,126 UART: [kat] --
72,818,979 UART: [update-reset] ++
77,007,185 UART: [update-reset] Image verified using Vendor ECC Key Index 0
77,010,202 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
77,407,963 >>> mbox cmd response: success
77,408,724 UART: [update-reset] Copying MAN_2 To MAN_1
77,431,171 UART: [update-reset Success] --
77,433,715 UART: [state] Locking Datavault
77,438,271 UART: [state] Locking PCR0, PCR1 and PCR31
77,440,020 UART: [state] Locking ICCM
77,441,332 UART: [exit] Launching FMC @ 0x40000130
77,449,753 UART:
77,449,976 UART: Running Caliptra FMC ...
77,451,000 UART:
77,451,150 UART: [state] CFI Enabled
77,495,264 UART: [art] Extend RT PCRs Done
77,496,443 UART: [art] Lock RT PCRs Done
77,497,816 UART: [art] Populate DV Done
77,503,385 UART: [fht] FMC Alias Private Key: 7
77,504,977 UART: [art] Derive CDI
77,505,731 UART: [art] Store in slot 0x4
77,548,367 UART: [art] Derive Key Pair
77,549,361 UART: [art] Store priv key in slot 0x5
80,791,426 UART: [art] Derive Key Pair - Done
80,804,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
83,084,494 UART: [art] Erasing AUTHORITY.KEYID = 7
83,086,007 UART: [art] PUB.X = 894B709B0E7F2788B7D8EDD07C0790B6FE02C101C3BA1F06023DDCE866B2670FDA3074FB290A3DF2B935A7381A1BF615
83,093,280 UART: [art] PUB.Y = 3C31E8E9E25AA1D91318B5D4CB5FF38A4F8E4B76DE773BF54947E024BC9DACEB039160F12947CBA93735C9DC69F9F067
83,100,515 UART: [art] SIG.R = 044C980C88BFE390776DCCA86468217921778CAF949C47B6214F1586A142B26367F6B1CC265DE085EEE9DD73A7F4E4E3
83,107,914 UART: [art] SIG.S = 0D8DDDD25D19F879AD9E8D0C8FC62E6FC3FEEB336EA48D5C3377F765503091229C8E25F030F920D6BA1381A15DEB813C
84,413,006 UART: Caliptra RT
84,413,721 UART: [state] CFI Enabled
84,782,684 UART: [rt] RT listening for mailbox commands...
84,784,525 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
84,814,401 UART: [rt]cmd =0x494e464f, len=4
84,818,681 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
4,123,363 ready_for_fw is high
4,123,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,382 >>> mbox cmd response: success
18,151,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
23,791,700 UART:
23,792,090 UART: Running Caliptra FMC ...
23,793,242 UART:
23,793,398 UART: [state] CFI Enabled
23,801,653 UART: [fht] FMC Alias Private Key: 7
26,141,369 UART: [art] Extend RT PCRs Done
26,142,603 UART: [art] Lock RT PCRs Done
26,144,256 UART: [art] Populate DV Done
26,149,973 UART: [fht] FMC Alias Private Key: 7
26,151,561 UART: [art] Derive CDI
26,152,390 UART: [art] Store in slot 0x4
26,195,086 UART: [art] Derive Key Pair
26,196,088 UART: [art] Store priv key in slot 0x5
29,438,196 UART: [art] Derive Key Pair - Done
29,450,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,554 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,065 UART: [art] PUB.X = A003483F41FCC7E6B73B22CDA6078E38109E6D4F0E6B89D6C20EDF924F1F7CF82971B8F50BF28582B94E45E97837957E
31,740,325 UART: [art] PUB.Y = DDD911216019DB49A2F8D934F7F65EA33B465CF382142A0E5DA617C32123224D01758E999223B86FE94A084EB484DE43
31,747,511 UART: [art] SIG.R = BB98D3A4F931C3B51FD4A2BA1714A01892C2C91AD379D745DD8B0CF738EF3E02B5C518D4849146FBF2665E7ADC0411CC
31,754,900 UART: [art] SIG.S = 51C9BD40A446BEE65D230B040822C8A80CCF0D7F159B260E6213028612D56383EDD611E9A27C55727B2AA3C46FDD5FC5
33,060,076 UART: Caliptra RT
33,060,789 UART: [state] CFI Enabled
33,193,947 UART: [rt] RT listening for mailbox commands...
33,225,092 UART: [rt]cmd =0x494e464f, len=4
33,229,429 >>> mbox cmd response data (312 bytes)
35,302,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,038,838 >>> mbox cmd response: success
44,073,789 UART:
44,074,105 UART: Running Caliptra FMC ...
44,075,235 UART:
44,075,419 UART: [state] CFI Enabled
44,119,929 UART: [art] Extend RT PCRs Done
44,121,235 UART: [art] Lock RT PCRs Done
44,122,414 UART: [art] Populate DV Done
44,127,846 UART: [fht] FMC Alias Private Key: 7
44,129,387 UART: [art] Derive CDI
44,130,143 UART: [art] Store in slot 0x4
44,172,786 UART: [art] Derive Key Pair
44,173,771 UART: [art] Store priv key in slot 0x5
47,416,203 UART: [art] Derive Key Pair - Done
47,428,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,708,687 UART: [art] Erasing AUTHORITY.KEYID = 7
49,710,201 UART: [art] PUB.X = D87B4FD91A5F79A73C0541AB76585C64BDA347AAFB1336CCF66F1C1B72F98AC28584035B6BC7B0334652C0E067DC155A
49,717,507 UART: [art] PUB.Y = 2E3BC7987B12AB5FFB85D3F3AB079C0EEE02F572627F0BBAF89E89C1093A7B5B00BFDCBB9F3935B4364D97B9BA8DC5E0
49,724,758 UART: [art] SIG.R = B738FC20AA0E0B1EB14AAA79F73A975F83B136D0662914200D2F06C7B654ACB7E9B36999A4242AF47E25C7AB50864C0A
49,732,176 UART: [art] SIG.S = FB3D4C161D787EBBCDB62EE0BB3879D2B1B30E84766FB701FC81A6002CEEDE84543799D6A8177B99668DB20830686ECB
51,036,463 UART: Caliptra RT
51,037,175 UART: [state] CFI Enabled
51,410,360 UART: [rt] RT listening for mailbox commands...
51,412,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
51,442,230 UART: [rt]cmd =0x494e464f, len=4
51,446,509 >>> mbox cmd response data (312 bytes)
53,520,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
62,274,440 >>> mbox cmd response: success
62,308,924 UART:
62,309,247 UART: Running Caliptra FMC ...
62,310,364 UART:
62,310,532 UART: [state] CFI Enabled
62,354,923 UART: [art] Extend RT PCRs Done
62,356,065 UART: [art] Lock RT PCRs Done
62,357,572 UART: [art] Populate DV Done
62,362,987 UART: [fht] FMC Alias Private Key: 7
62,364,645 UART: [art] Derive CDI
62,365,414 UART: [art] Store in slot 0x4
62,408,183 UART: [art] Derive Key Pair
62,409,195 UART: [art] Store priv key in slot 0x5
65,651,224 UART: [art] Derive Key Pair - Done
65,664,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,945,171 UART: [art] Erasing AUTHORITY.KEYID = 7
67,946,686 UART: [art] PUB.X = 547A643E7193007FDE6C0C89FECABFFD1DE68DA6801E09A212B16D7B4B24B3900347130F977B683378D6DDD367859420
67,953,954 UART: [art] PUB.Y = 317CA83F775AF032A77D02358EAE7E7DC7DAD6F0D2FFBF2702852D1CF45DCC8AC64C68FB889F89F25E3063E61011ED66
67,961,185 UART: [art] SIG.R = 4B11B6C18F341E64DA8DF93B70C6D806845535AE6109BB9785C4BEA2E4FD29EFCD2ED274DE3F1442F7BB70276A998C01
67,968,617 UART: [art] SIG.S = 2F138A329F5E81D5B1F2174656EB296C0B3CAF05A77B1C00A0AEDDC072C8FC1A999868742BDA8A93BABEA817A8169687
69,273,373 UART: Caliptra RT
69,274,085 UART: [state] CFI Enabled
69,643,530 UART: [rt] RT listening for mailbox commands...
69,645,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,675,232 UART: [rt]cmd =0x494e464f, len=4
69,679,463 >>> mbox cmd response data (312 bytes)
69,681,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
78,426,116 >>> mbox cmd response: success
78,457,587 UART:
78,457,886 UART: Running Caliptra FMC ...
78,459,008 UART:
78,459,175 UART: [state] CFI Enabled
78,503,356 UART: [art] Extend RT PCRs Done
78,504,495 UART: [art] Lock RT PCRs Done
78,506,018 UART: [art] Populate DV Done
78,511,791 UART: [fht] FMC Alias Private Key: 7
78,513,421 UART: [art] Derive CDI
78,514,152 UART: [art] Store in slot 0x4
78,556,685 UART: [art] Derive Key Pair
78,557,720 UART: [art] Store priv key in slot 0x5
81,799,797 UART: [art] Derive Key Pair - Done
81,812,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
84,093,725 UART: [art] Erasing AUTHORITY.KEYID = 7
84,095,237 UART: [art] PUB.X = D87B4FD91A5F79A73C0541AB76585C64BDA347AAFB1336CCF66F1C1B72F98AC28584035B6BC7B0334652C0E067DC155A
84,102,486 UART: [art] PUB.Y = 2E3BC7987B12AB5FFB85D3F3AB079C0EEE02F572627F0BBAF89E89C1093A7B5B00BFDCBB9F3935B4364D97B9BA8DC5E0
84,109,768 UART: [art] SIG.R = B738FC20AA0E0B1EB14AAA79F73A975F83B136D0662914200D2F06C7B654ACB7E9B36999A4242AF47E25C7AB50864C0A
84,117,148 UART: [art] SIG.S = FB3D4C161D787EBBCDB62EE0BB3879D2B1B30E84766FB701FC81A6002CEEDE84543799D6A8177B99668DB20830686ECB
85,422,158 UART: Caliptra RT
85,422,864 UART: [state] CFI Enabled
85,798,730 UART: [rt] RT listening for mailbox commands...
85,800,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
85,830,363 UART: [rt]cmd =0x494e464f, len=4
85,834,722 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.41s
Truncated 1498 bytes from beginning
_for_fw is high
3,469,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,285 UART: [idev] Erasing UDS.KEYID = 0
5,982,594 UART: [idev] Sha1 KeyId Algorithm
6,004,581 UART: [idev] --
6,009,389 UART: [ldev] ++
6,009,966 UART: [ldev] CDI.KEYID = 6
6,010,883 UART: [ldev] SUBJECT.KEYID = 5
6,012,111 UART: [ldev] AUTHORITY.KEYID = 7
6,013,370 UART: [ldev] FE.KEYID = 1
6,059,541 UART: [ldev] Erasing FE.KEYID = 1
8,566,917 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,348 UART: [ldev] --
10,374,525 UART: [fwproc] Wait for Commands...
10,376,778 UART: [fwproc] Recv command 0x46574c44
10,378,813 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,433 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,167 >>> mbox cmd response: success
14,342,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,345,743 UART: [afmc] ++
14,346,334 UART: [afmc] CDI.KEYID = 6
14,347,247 UART: [afmc] SUBJECT.KEYID = 7
14,348,395 UART: [afmc] AUTHORITY.KEYID = 5
16,899,684 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,525 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,656,177 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,672,245 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,687,855 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,711,193 UART: [afmc] --
18,714,724 UART: [cold-reset] --
18,718,957 UART: [state] Locking Datavault
18,725,597 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,341 UART: [state] Locking ICCM
18,729,787 UART: [exit] Launching FMC @ 0x40000130
18,738,220 UART:
18,738,474 UART: Running Caliptra FMC ...
18,739,500 UART:
18,739,643 UART: [state] CFI Enabled
18,797,620 UART: [fht] FMC Alias Private Key: 7
20,563,744 UART: [art] Extend RT PCRs Done
20,564,965 UART: [art] Lock RT PCRs Done
20,566,779 UART: [art] Populate DV Done
20,572,264 UART: [fht] FMC Alias Private Key: 7
20,573,735 UART: [art] Derive CDI
20,574,471 UART: [art] Store in slot 0x4
20,630,586 UART: [art] Derive Key Pair
20,631,582 UART: [art] Store priv key in slot 0x5
23,094,429 UART: [art] Derive Key Pair - Done
23,107,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,692 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,209 UART: [art] PUB.X = 9EF111941C93269CA4ACE97CAFB104777362D25FA1490BCF9CCA2FD88EC720D08AFD78FC07A8D9525BD0D0027ADBE4AC
24,829,466 UART: [art] PUB.Y = 2758312D00AEC3C8E802A129BC49AA26678FB052D5A0AAA01AC9D49965E1600997B9D13F4D9D9E6BB5E04EE8E915899F
24,836,695 UART: [art] SIG.R = F3AE3E169EBF79C6D6E1BD8CF7ADB2B9C6E6BA90E6266758B09234D817B39D5FE020C14CC9682CB440466CCD88305344
24,844,144 UART: [art] SIG.S = D00DF92613A33679C9A5C7ABD24E6EAE4A7A3680D4B46EAD4808706E4943F60AECE2A374209D1B37F33C1DD0EA544DED
25,823,569 UART: Caliptra RT
25,824,270 UART: [state] CFI Enabled
26,003,501 UART: [rt] RT listening for mailbox commands...
26,034,727 UART: [rt]cmd =0x494e464f, len=4
26,039,181 >>> mbox cmd response data (312 bytes)
28,106,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,256,880 UART:
28,257,280 UART: Running Caliptra ROM ...
28,258,369 UART:
28,258,530 UART: [state] CFI Enabled
28,314,590 UART: [state] LifecycleState = Unprovisioned
28,316,528 UART: [state] DebugLocked = No
28,319,314 UART: [state] WD Timer not started. Device not locked for debugging
28,322,807 UART: [kat] SHA2-256
28,502,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,513,292 UART: [kat] ++
28,513,829 UART: [kat] sha1
28,525,207 UART: [kat] SHA2-256
28,527,940 UART: [kat] SHA2-384
28,534,844 UART: [kat] SHA2-512-ACC
28,537,196 UART: [kat] ECC-384
31,001,354 UART: [kat] HMAC-384Kdf
31,024,070 UART: [kat] LMS
31,500,516 UART: [kat] --
31,505,210 UART: [update-reset] ++
34,996,749 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,000,886 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,398,487 >>> mbox cmd response: success
35,399,182 UART: [update-reset] Copying MAN_2 To MAN_1
35,436,278 UART: [update-reset Success] --
35,441,966 UART: [state] Locking Datavault
35,445,587 UART: [state] Locking PCR0, PCR1 and PCR31
35,447,333 UART: [state] Locking ICCM
35,449,751 UART: [exit] Launching FMC @ 0x40000130
35,458,134 UART:
35,458,381 UART: Running Caliptra FMC ...
35,459,482 UART:
35,459,640 UART: [state] CFI Enabled
35,555,909 UART: [art] Extend RT PCRs Done
35,557,091 UART: [art] Lock RT PCRs Done
35,558,384 UART: [art] Populate DV Done
35,564,167 UART: [fht] FMC Alias Private Key: 7
35,565,856 UART: [art] Derive CDI
35,566,662 UART: [art] Store in slot 0x4
35,625,317 UART: [art] Derive Key Pair
35,626,372 UART: [art] Store priv key in slot 0x5
38,088,622 UART: [art] Derive Key Pair - Done
38,101,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,813,880 UART: [art] Erasing AUTHORITY.KEYID = 7
39,815,389 UART: [art] PUB.X = 43F8830736AA2C13848661968731222C578906B23B495B480FFA592761D9CEDE491140511856C0A45F895BC9C1BB4BD2
39,822,637 UART: [art] PUB.Y = 9D8F881CD0401D67B7F580B605BEC99B85264E91CF2966EE61DE4495CE960CD3C6E62DC74B1A5802596F5DFE2A27B27D
39,829,923 UART: [art] SIG.R = 0CAF619FF1378527020E4507C14922968ACB7DA98A9167E351E6B59BA2D05FF35D3AEEE003D4D25125585997AE97DDAE
39,837,266 UART: [art] SIG.S = A891DE5E22283C389B39B1107C0423F40B785D26C9445C099F9EA12E218CBCF04824192256A04931FEC03995C2EBE241
40,815,325 UART: Caliptra RT
40,816,037 UART: [state] CFI Enabled
41,238,313 UART: [rt] RT listening for mailbox commands...
41,240,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,269,839 UART: [rt]cmd =0x494e464f, len=4
41,274,280 >>> mbox cmd response data (312 bytes)
43,338,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,488,949 UART:
43,489,332 UART: Running Caliptra ROM ...
43,490,390 UART:
43,490,541 UART: [state] CFI Enabled
43,566,015 UART: [state] LifecycleState = Unprovisioned
43,567,967 UART: [state] DebugLocked = No
43,570,115 UART: [state] WD Timer not started. Device not locked for debugging
43,574,557 UART: [kat] SHA2-256
43,754,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,765,000 UART: [kat] ++
43,765,543 UART: [kat] sha1
43,777,298 UART: [kat] SHA2-256
43,779,979 UART: [kat] SHA2-384
43,786,853 UART: [kat] SHA2-512-ACC
43,789,201 UART: [kat] ECC-384
46,247,763 UART: [kat] HMAC-384Kdf
46,272,061 UART: [kat] LMS
46,748,541 UART: [kat] --
46,751,910 UART: [update-reset] ++
50,254,449 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,257,770 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,655,351 >>> mbox cmd response: success
50,656,671 UART: [update-reset] Copying MAN_2 To MAN_1
50,693,799 UART: [update-reset Success] --
50,697,165 UART: [state] Locking Datavault
50,700,525 UART: [state] Locking PCR0, PCR1 and PCR31
50,702,275 UART: [state] Locking ICCM
50,704,424 UART: [exit] Launching FMC @ 0x40000130
50,712,816 UART:
50,713,068 UART: Running Caliptra FMC ...
50,714,173 UART:
50,714,336 UART: [state] CFI Enabled
50,806,991 UART: [art] Extend RT PCRs Done
50,808,175 UART: [art] Lock RT PCRs Done
50,809,466 UART: [art] Populate DV Done
50,814,857 UART: [fht] FMC Alias Private Key: 7
50,816,452 UART: [art] Derive CDI
50,817,221 UART: [art] Store in slot 0x4
50,875,717 UART: [art] Derive Key Pair
50,876,716 UART: [art] Store priv key in slot 0x5
53,339,476 UART: [art] Derive Key Pair - Done
53,352,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,065,213 UART: [art] Erasing AUTHORITY.KEYID = 7
55,066,725 UART: [art] PUB.X = 3658F196C071BAD3AAFBB14D4D4647C178D271A070014D19C055974D47CFF2B5C52739D672B197DC086918A756A9DC56
55,073,984 UART: [art] PUB.Y = DB56F04D1DA46ACC6C4EAB81485235AC44DD1757125B70B2BF0C738F471F00FB5F88E28146D661CF8F6002F60CAFE754
55,081,251 UART: [art] SIG.R = 17E37F99FADE935B833F2A669B656285D421FD13F174BE1A9B1DD974B122B94973AD2EEE83094BF4B906E57C0D0BD1D6
55,088,649 UART: [art] SIG.S = FABEE3D6579F60300A06644689D41508DCD443D6F7405E596ED2FAB040BECB2678837EEE2F391A825ADF6B58D5999C29
56,067,592 UART: Caliptra RT
56,068,288 UART: [state] CFI Enabled
56,488,145 UART: [rt] RT listening for mailbox commands...
56,489,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,519,785 UART: [rt]cmd =0x494e464f, len=4
56,524,092 >>> mbox cmd response data (312 bytes)
56,526,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,676,151 UART:
56,676,457 UART: Running Caliptra ROM ...
56,677,489 UART:
56,677,637 UART: [state] CFI Enabled
56,750,057 UART: [state] LifecycleState = Unprovisioned
56,751,983 UART: [state] DebugLocked = No
56,753,828 UART: [state] WD Timer not started. Device not locked for debugging
56,756,983 UART: [kat] SHA2-256
56,936,681 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,947,445 UART: [kat] ++
56,947,910 UART: [kat] sha1
56,957,871 UART: [kat] SHA2-256
56,960,553 UART: [kat] SHA2-384
56,966,421 UART: [kat] SHA2-512-ACC
56,968,761 UART: [kat] ECC-384
59,432,965 UART: [kat] HMAC-384Kdf
59,454,780 UART: [kat] LMS
59,931,254 UART: [kat] --
59,936,950 UART: [update-reset] ++
63,421,485 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,425,189 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,822,808 >>> mbox cmd response: success
63,824,273 UART: [update-reset] Copying MAN_2 To MAN_1
63,861,373 UART: [update-reset Success] --
63,866,509 UART: [state] Locking Datavault
63,870,359 UART: [state] Locking PCR0, PCR1 and PCR31
63,872,057 UART: [state] Locking ICCM
63,873,617 UART: [exit] Launching FMC @ 0x40000130
63,882,009 UART:
63,882,245 UART: Running Caliptra FMC ...
63,883,290 UART:
63,883,441 UART: [state] CFI Enabled
63,989,102 UART: [art] Extend RT PCRs Done
63,990,302 UART: [art] Lock RT PCRs Done
63,991,811 UART: [art] Populate DV Done
63,996,999 UART: [fht] FMC Alias Private Key: 7
63,998,690 UART: [art] Derive CDI
63,999,491 UART: [art] Store in slot 0x4
64,058,108 UART: [art] Derive Key Pair
64,059,171 UART: [art] Store priv key in slot 0x5
66,522,349 UART: [art] Derive Key Pair - Done
66,535,070 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,247,974 UART: [art] Erasing AUTHORITY.KEYID = 7
68,249,484 UART: [art] PUB.X = 43F8830736AA2C13848661968731222C578906B23B495B480FFA592761D9CEDE491140511856C0A45F895BC9C1BB4BD2
68,256,773 UART: [art] PUB.Y = 9D8F881CD0401D67B7F580B605BEC99B85264E91CF2966EE61DE4495CE960CD3C6E62DC74B1A5802596F5DFE2A27B27D
68,264,027 UART: [art] SIG.R = 0CAF619FF1378527020E4507C14922968ACB7DA98A9167E351E6B59BA2D05FF35D3AEEE003D4D25125585997AE97DDAE
68,271,370 UART: [art] SIG.S = A891DE5E22283C389B39B1107C0423F40B785D26C9445C099F9EA12E218CBCF04824192256A04931FEC03995C2EBE241
69,250,560 UART: Caliptra RT
69,251,248 UART: [state] CFI Enabled
69,671,466 UART: [rt] RT listening for mailbox commands...
69,673,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,703,181 UART: [rt]cmd =0x494e464f, len=4
69,707,550 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,465,171 ready_for_fw is high
3,465,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,194,741 >>> mbox cmd response: success
14,196,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,473,549 UART:
18,473,945 UART: Running Caliptra FMC ...
18,475,061 UART:
18,475,221 UART: [state] CFI Enabled
18,543,273 UART: [fht] FMC Alias Private Key: 7
20,310,230 UART: [art] Extend RT PCRs Done
20,311,456 UART: [art] Lock RT PCRs Done
20,313,082 UART: [art] Populate DV Done
20,318,469 UART: [fht] FMC Alias Private Key: 7
20,320,066 UART: [art] Derive CDI
20,320,883 UART: [art] Store in slot 0x4
20,376,179 UART: [art] Derive Key Pair
20,377,218 UART: [art] Store priv key in slot 0x5
22,839,947 UART: [art] Derive Key Pair - Done
22,852,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,565,924 UART: [art] Erasing AUTHORITY.KEYID = 7
24,567,426 UART: [art] PUB.X = 30DDCD834106739C8CD48453018A8A1C30A3470D310AEDDF5A5A65D3F3FD04AAB76B55F1B3251FC3ADC095E7B63010D0
24,574,730 UART: [art] PUB.Y = 69C9008D25D3B18783925C476D8EBC263336CBF459A3AF2F248259AEC91957EAD186C451A71FCAA8859159CED6F15E41
24,581,967 UART: [art] SIG.R = F31F2BAFE3AAE20DC83FA1C1A7535207A7259BE3E2EC2F346ADD1E1E2ACB200289087301A97B2B6CE363E9A41DFD271B
24,589,354 UART: [art] SIG.S = 8776D9E0E3435DA3635CD9E738C76EE60E839E669B572277131040C82928059F767ADD460D6878B8FCF8275EE883ABB4
25,568,169 UART: Caliptra RT
25,568,883 UART: [state] CFI Enabled
25,749,906 UART: [rt] RT listening for mailbox commands...
25,781,277 UART: [rt]cmd =0x494e464f, len=4
25,785,608 >>> mbox cmd response data (312 bytes)
27,852,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,163,301 >>> mbox cmd response: success
35,198,032 UART:
35,198,335 UART: Running Caliptra FMC ...
35,199,454 UART:
35,199,638 UART: [state] CFI Enabled
35,303,729 UART: [art] Extend RT PCRs Done
35,304,914 UART: [art] Lock RT PCRs Done
35,306,251 UART: [art] Populate DV Done
35,311,667 UART: [fht] FMC Alias Private Key: 7
35,313,199 UART: [art] Derive CDI
35,314,007 UART: [art] Store in slot 0x4
35,373,112 UART: [art] Derive Key Pair
35,374,155 UART: [art] Store priv key in slot 0x5
37,837,426 UART: [art] Derive Key Pair - Done
37,850,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,562,541 UART: [art] Erasing AUTHORITY.KEYID = 7
39,564,037 UART: [art] PUB.X = 5F2295A97B45F240BB4E31F3887AD27DCBB06D602A400E280980FD6DC2052E3C7B4C539082B02B7414E7FC18CC8BD5CE
39,571,361 UART: [art] PUB.Y = CFBD9BF71C95CE8DBAB6ABAD4FEF867C74D9C26E28DAF1AF06CBD8D7301D3B500B88FED7B2ADA6313CDD9F52E0E833B5
39,578,670 UART: [art] SIG.R = B2902ED35E7A334E4481E68C73F130FF993F2915510F72C690F49DCA4E6F2AF009BED3714CB7DDE02AF284F204792E36
39,586,040 UART: [art] SIG.S = 7603D639FFFA7FF6E6DF6B1F5F06E69F48509BF98620FB5EF51AB09924DFCF82BFB1F4064BFCF703DBA30553587F8155
40,564,603 UART: Caliptra RT
40,565,335 UART: [state] CFI Enabled
40,988,511 UART: [rt] RT listening for mailbox commands...
40,990,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,019,920 UART: [rt]cmd =0x494e464f, len=4
41,024,197 >>> mbox cmd response data (312 bytes)
43,088,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,386,579 >>> mbox cmd response: success
50,422,564 UART:
50,422,866 UART: Running Caliptra FMC ...
50,423,985 UART:
50,424,148 UART: [state] CFI Enabled
50,516,150 UART: [art] Extend RT PCRs Done
50,517,331 UART: [art] Lock RT PCRs Done
50,519,056 UART: [art] Populate DV Done
50,524,669 UART: [fht] FMC Alias Private Key: 7
50,526,264 UART: [art] Derive CDI
50,526,993 UART: [art] Store in slot 0x4
50,585,375 UART: [art] Derive Key Pair
50,586,371 UART: [art] Store priv key in slot 0x5
53,048,712 UART: [art] Derive Key Pair - Done
53,061,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,774,575 UART: [art] Erasing AUTHORITY.KEYID = 7
54,776,090 UART: [art] PUB.X = 1B308E915C3911909C6A03F3DD16E53AD0C0FA39241152E23B8D3A53D2704C0690D160BB2B49B794BBD2B0EACF981F6E
54,783,369 UART: [art] PUB.Y = 3D66A813356E6ACEBF6590857FD5233EE1F66B87812176D5A2CF81508EE89F1524FF44BD17C079BCD19A35065815B5E9
54,790,619 UART: [art] SIG.R = 2C61AB76C373CE4E89624B9CC9A9354BBAFE3E0856F427811883B9E810D5727B95C2F117DDDC8A5B537D4BAA03819ECD
54,797,971 UART: [art] SIG.S = D78E7773E061DAF3C903A12700490A0BBB07B24053676024A05D6F12B95AB06882CD6C0657472991A6090C8EDDE62B03
55,776,636 UART: Caliptra RT
55,777,326 UART: [state] CFI Enabled
56,200,965 UART: [rt] RT listening for mailbox commands...
56,202,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,232,466 UART: [rt]cmd =0x494e464f, len=4
56,236,634 >>> mbox cmd response data (312 bytes)
56,238,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,553,961 >>> mbox cmd response: success
63,586,381 UART:
63,586,687 UART: Running Caliptra FMC ...
63,587,808 UART:
63,587,974 UART: [state] CFI Enabled
63,677,044 UART: [art] Extend RT PCRs Done
63,678,229 UART: [art] Lock RT PCRs Done
63,679,576 UART: [art] Populate DV Done
63,684,925 UART: [fht] FMC Alias Private Key: 7
63,686,520 UART: [art] Derive CDI
63,687,329 UART: [art] Store in slot 0x4
63,745,648 UART: [art] Derive Key Pair
63,746,693 UART: [art] Store priv key in slot 0x5
66,210,119 UART: [art] Derive Key Pair - Done
66,223,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,935,723 UART: [art] Erasing AUTHORITY.KEYID = 7
67,937,226 UART: [art] PUB.X = 5F2295A97B45F240BB4E31F3887AD27DCBB06D602A400E280980FD6DC2052E3C7B4C539082B02B7414E7FC18CC8BD5CE
67,944,502 UART: [art] PUB.Y = CFBD9BF71C95CE8DBAB6ABAD4FEF867C74D9C26E28DAF1AF06CBD8D7301D3B500B88FED7B2ADA6313CDD9F52E0E833B5
67,951,811 UART: [art] SIG.R = B2902ED35E7A334E4481E68C73F130FF993F2915510F72C690F49DCA4E6F2AF009BED3714CB7DDE02AF284F204792E36
67,959,264 UART: [art] SIG.S = 7603D639FFFA7FF6E6DF6B1F5F06E69F48509BF98620FB5EF51AB09924DFCF82BFB1F4064BFCF703DBA30553587F8155
68,938,444 UART: Caliptra RT
68,939,156 UART: [state] CFI Enabled
69,365,808 UART: [rt] RT listening for mailbox commands...
69,367,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
69,397,390 UART: [rt]cmd =0x494e464f, len=4
69,401,738 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
Truncated 1498 bytes from beginning
_for_fw is high
3,790,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,408 UART: [idev] Erasing UDS.KEYID = 0
6,264,012 UART: [idev] Sha1 KeyId Algorithm
6,288,972 UART: [idev] --
6,292,540 UART: [ldev] ++
6,293,111 UART: [ldev] CDI.KEYID = 6
6,293,993 UART: [ldev] SUBJECT.KEYID = 5
6,295,262 UART: [ldev] AUTHORITY.KEYID = 7
6,296,495 UART: [ldev] FE.KEYID = 1
6,307,292 UART: [ldev] Erasing FE.KEYID = 1
8,783,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,898 UART: [ldev] --
10,578,027 UART: [fwproc] Wait for Commands...
10,581,117 UART: [fwproc] Recv command 0x46574c44
10,583,157 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,590 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,347 >>> mbox cmd response: success
14,549,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,552,627 UART: [afmc] ++
14,553,217 UART: [afmc] CDI.KEYID = 6
14,554,102 UART: [afmc] SUBJECT.KEYID = 7
14,555,375 UART: [afmc] AUTHORITY.KEYID = 5
17,061,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,705 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,944 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,800,602 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,816,688 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,832,346 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
18,856,357 UART: [afmc] --
18,860,756 UART: [cold-reset] --
18,863,718 UART: [state] Locking Datavault
18,871,008 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,726 UART: [state] Locking ICCM
18,875,122 UART: [exit] Launching FMC @ 0x40000130
18,883,523 UART:
18,883,757 UART: Running Caliptra FMC ...
18,884,785 UART:
18,884,935 UART: [state] CFI Enabled
18,893,603 UART: [fht] FMC Alias Private Key: 7
20,659,022 UART: [art] Extend RT PCRs Done
20,660,230 UART: [art] Lock RT PCRs Done
20,661,667 UART: [art] Populate DV Done
20,666,972 UART: [fht] FMC Alias Private Key: 7
20,668,476 UART: [art] Derive CDI
20,669,214 UART: [art] Store in slot 0x4
20,711,694 UART: [art] Derive Key Pair
20,712,732 UART: [art] Store priv key in slot 0x5
23,139,806 UART: [art] Derive Key Pair - Done
23,152,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,084 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,583 UART: [art] PUB.X = 610839EFF57367A3CB1C1659999E95CF387A064D461D16F3271821388188A372BB67FB8E142E278F802EF2928A677887
24,867,850 UART: [art] PUB.Y = 09B84BEEBBBE40FCAE74AEA34DD47F9EDC7476A3745119781E23E8A79FB37327988A8D470991AF3A8DC1F1E962ADEEA6
24,875,091 UART: [art] SIG.R = AF044BD3B90EC048FD78299B1AF793BD9B472E319540D0F7C4BA635A4A700ABF50051D817755F41932E60C34C6715BE6
24,882,485 UART: [art] SIG.S = 59FF4D90245D6785D31CE155A05512B2470EBBA20742D96C91361C4E0B6334434D5EF7B16483C730FA136D68557A87DE
25,861,269 UART: Caliptra RT
25,861,972 UART: [state] CFI Enabled
25,994,924 UART: [rt] RT listening for mailbox commands...
26,026,497 UART: [rt]cmd =0x494e464f, len=4
26,030,673 >>> mbox cmd response data (312 bytes)
28,096,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,247,414 UART:
28,247,786 UART: Running Caliptra ROM ...
28,248,841 UART:
28,249,051 UART: [state] CFI Enabled
28,265,226 UART: [state] LifecycleState = Unprovisioned
28,267,131 UART: [state] DebugLocked = No
28,268,952 UART: [state] WD Timer not started. Device not locked for debugging
28,273,567 UART: [kat] SHA2-256
28,453,298 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,464,080 UART: [kat] ++
28,464,751 UART: [kat] sha1
28,475,430 UART: [kat] SHA2-256
28,478,076 UART: [kat] SHA2-384
28,485,314 UART: [kat] SHA2-512-ACC
28,487,661 UART: [kat] ECC-384
30,930,009 UART: [kat] HMAC-384Kdf
30,941,595 UART: [kat] LMS
31,418,090 UART: [kat] --
31,422,642 UART: [update-reset] ++
34,922,053 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,925,275 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,322,865 >>> mbox cmd response: success
35,324,405 UART: [update-reset] Copying MAN_2 To MAN_1
35,361,485 UART: [update-reset Success] --
35,365,042 UART: [state] Locking Datavault
35,368,532 UART: [state] Locking PCR0, PCR1 and PCR31
35,370,295 UART: [state] Locking ICCM
35,373,072 UART: [exit] Launching FMC @ 0x40000130
35,381,474 UART:
35,381,714 UART: Running Caliptra FMC ...
35,382,740 UART:
35,382,887 UART: [state] CFI Enabled
35,427,072 UART: [art] Extend RT PCRs Done
35,428,260 UART: [art] Lock RT PCRs Done
35,429,749 UART: [art] Populate DV Done
35,435,428 UART: [fht] FMC Alias Private Key: 7
35,437,028 UART: [art] Derive CDI
35,437,772 UART: [art] Store in slot 0x4
35,480,203 UART: [art] Derive Key Pair
35,481,205 UART: [art] Store priv key in slot 0x5
37,908,000 UART: [art] Derive Key Pair - Done
37,921,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,628,245 UART: [art] Erasing AUTHORITY.KEYID = 7
39,629,746 UART: [art] PUB.X = 7C22397D144348F6BF51F6492A63B5BEEE3DE0495653A31CF5B15695BABE43CA943DAC68A553F3D296DE4753B682D9DD
39,636,998 UART: [art] PUB.Y = C020871CFEB8D96507F64C4475CA5D6F0305D4F4272A371918AECEE1E63363B9D6DA7623A781F60A4509E4387D264261
39,644,284 UART: [art] SIG.R = 4CA9CDD5F364DA87BA52AE768B04D4815E8A4DC044B18C11DD3DE498F48F1D2C68AB0DACCE0B37F42BDDD2A685AC23B5
39,651,685 UART: [art] SIG.S = 277038B415224CE76B42A110A3653B67EB256F8EF0DF65F6191FB88F9F87986444992C5246A5C5BE351C8909CB6DE53C
40,631,118 UART: Caliptra RT
40,631,818 UART: [state] CFI Enabled
41,010,312 UART: [rt] RT listening for mailbox commands...
41,012,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,041,898 UART: [rt]cmd =0x494e464f, len=4
41,046,214 >>> mbox cmd response data (312 bytes)
43,104,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,255,296 UART:
43,255,668 UART: Running Caliptra ROM ...
43,256,759 UART:
43,256,929 UART: [state] CFI Enabled
43,269,758 UART: [state] LifecycleState = Unprovisioned
43,271,687 UART: [state] DebugLocked = No
43,273,401 UART: [state] WD Timer not started. Device not locked for debugging
43,277,473 UART: [kat] SHA2-256
43,457,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,467,999 UART: [kat] ++
43,468,542 UART: [kat] sha1
43,479,652 UART: [kat] SHA2-256
43,482,341 UART: [kat] SHA2-384
43,488,271 UART: [kat] SHA2-512-ACC
43,490,596 UART: [kat] ECC-384
45,930,394 UART: [kat] HMAC-384Kdf
45,943,654 UART: [kat] LMS
46,420,081 UART: [kat] --
46,425,586 UART: [update-reset] ++
49,930,277 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,934,082 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
50,331,750 >>> mbox cmd response: success
50,332,780 UART: [update-reset] Copying MAN_2 To MAN_1
50,369,910 UART: [update-reset Success] --
50,374,194 UART: [state] Locking Datavault
50,377,283 UART: [state] Locking PCR0, PCR1 and PCR31
50,378,994 UART: [state] Locking ICCM
50,380,959 UART: [exit] Launching FMC @ 0x40000130
50,389,351 UART:
50,389,638 UART: Running Caliptra FMC ...
50,390,785 UART:
50,390,951 UART: [state] CFI Enabled
50,434,708 UART: [art] Extend RT PCRs Done
50,435,857 UART: [art] Lock RT PCRs Done
50,437,146 UART: [art] Populate DV Done
50,442,664 UART: [fht] FMC Alias Private Key: 7
50,444,310 UART: [art] Derive CDI
50,445,128 UART: [art] Store in slot 0x4
50,487,859 UART: [art] Derive Key Pair
50,488,900 UART: [art] Store priv key in slot 0x5
52,915,925 UART: [art] Derive Key Pair - Done
52,928,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,635,602 UART: [art] Erasing AUTHORITY.KEYID = 7
54,637,113 UART: [art] PUB.X = F42944BE69CC8A4DCB22BE9DF1AC2385F1674CEE38E574CE099C2EC588D775262E37B8FADC3C0FD67C7CBCFDA1FD942B
54,644,426 UART: [art] PUB.Y = 50D4E81A59D512A62905235748C1E43818DCF7009EB21776E8E9F1281FC68D45B8F485C53F481E27C544F2C3A8458236
54,651,659 UART: [art] SIG.R = EC07925EE0AA83C27916DC78970BB2273A406C9897C43E95140FF96C6CB5A3FC86BC18615F241E50E2B4FEDF28760A1F
54,659,024 UART: [art] SIG.S = 94FA518AB1AED26F4FD2FBC246A35F1B81E863407031CED7CFC02A1D810F5D9AC2DD7C6DB286449A997ADB48CC3985F1
55,637,574 UART: Caliptra RT
55,638,264 UART: [state] CFI Enabled
56,011,012 UART: [rt] RT listening for mailbox commands...
56,012,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
56,042,587 UART: [rt]cmd =0x494e464f, len=4
56,046,814 >>> mbox cmd response data (312 bytes)
56,048,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,199,107 UART:
56,199,434 UART: Running Caliptra ROM ...
56,200,561 UART:
56,200,779 UART: [state] CFI Enabled
56,211,916 UART: [state] LifecycleState = Unprovisioned
56,213,858 UART: [state] DebugLocked = No
56,216,158 UART: [state] WD Timer not started. Device not locked for debugging
56,220,555 UART: [kat] SHA2-256
56,400,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
56,411,089 UART: [kat] ++
56,411,562 UART: [kat] sha1
56,422,510 UART: [kat] SHA2-256
56,425,256 UART: [kat] SHA2-384
56,432,054 UART: [kat] SHA2-512-ACC
56,434,409 UART: [kat] ECC-384
58,881,345 UART: [kat] HMAC-384Kdf
58,893,118 UART: [kat] LMS
59,369,578 UART: [kat] --
59,373,838 UART: [update-reset] ++
62,872,797 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,876,811 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
63,274,404 >>> mbox cmd response: success
63,275,643 UART: [update-reset] Copying MAN_2 To MAN_1
63,312,770 UART: [update-reset Success] --
63,317,723 UART: [state] Locking Datavault
63,321,086 UART: [state] Locking PCR0, PCR1 and PCR31
63,322,791 UART: [state] Locking ICCM
63,325,353 UART: [exit] Launching FMC @ 0x40000130
63,333,764 UART:
63,334,009 UART: Running Caliptra FMC ...
63,335,120 UART:
63,335,282 UART: [state] CFI Enabled
63,379,866 UART: [art] Extend RT PCRs Done
63,381,053 UART: [art] Lock RT PCRs Done
63,382,573 UART: [art] Populate DV Done
63,387,924 UART: [fht] FMC Alias Private Key: 7
63,389,462 UART: [art] Derive CDI
63,390,278 UART: [art] Store in slot 0x4
63,433,253 UART: [art] Derive Key Pair
63,434,292 UART: [art] Store priv key in slot 0x5
65,862,167 UART: [art] Derive Key Pair - Done
65,875,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,581,792 UART: [art] Erasing AUTHORITY.KEYID = 7
67,583,301 UART: [art] PUB.X = 7C22397D144348F6BF51F6492A63B5BEEE3DE0495653A31CF5B15695BABE43CA943DAC68A553F3D296DE4753B682D9DD
67,590,620 UART: [art] PUB.Y = C020871CFEB8D96507F64C4475CA5D6F0305D4F4272A371918AECEE1E63363B9D6DA7623A781F60A4509E4387D264261
67,597,865 UART: [art] SIG.R = 4CA9CDD5F364DA87BA52AE768B04D4815E8A4DC044B18C11DD3DE498F48F1D2C68AB0DACCE0B37F42BDDD2A685AC23B5
67,605,267 UART: [art] SIG.S = 277038B415224CE76B42A110A3653B67EB256F8EF0DF65F6191FB88F9F87986444992C5246A5C5BE351C8909CB6DE53C
68,584,284 UART: Caliptra RT
68,584,971 UART: [state] CFI Enabled
68,958,877 UART: [rt] RT listening for mailbox commands...
68,960,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,990,515 UART: [rt]cmd =0x494e464f, len=4
68,994,956 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
3,779,772 ready_for_fw is high
3,780,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,158 >>> mbox cmd response: success
14,451,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
18,694,986 UART:
18,695,370 UART: Running Caliptra FMC ...
18,696,566 UART:
18,696,737 UART: [state] CFI Enabled
18,704,712 UART: [fht] FMC Alias Private Key: 7
20,470,352 UART: [art] Extend RT PCRs Done
20,471,568 UART: [art] Lock RT PCRs Done
20,473,254 UART: [art] Populate DV Done
20,478,629 UART: [fht] FMC Alias Private Key: 7
20,480,170 UART: [art] Derive CDI
20,480,984 UART: [art] Store in slot 0x4
20,523,634 UART: [art] Derive Key Pair
20,524,679 UART: [art] Store priv key in slot 0x5
22,951,291 UART: [art] Derive Key Pair - Done
22,964,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,015 UART: [art] PUB.X = FC81126019A8A3206B5579CD967DD5DCBC7E7A7E3480A0691FDAEB7B186EFC74D58732299CBAF857755D70F3CB981F00
24,679,284 UART: [art] PUB.Y = D05DC9340BDBEFEFAD5E1587F98121EA971D08285E832C53729926DBAFCA5D5B9FCF4B069E526B0C6C96CBDBB218183F
24,686,537 UART: [art] SIG.R = 46E1085CAE7F8B910241BE5C7E778CC596AB9537AE57FBCCDF3CBB31A1C180931A3565826B364B08C250311049AB0936
24,693,930 UART: [art] SIG.S = 1E600FEDA67AFF18337C20D6F17B175492A82BCA4931A9A51ACBB931AC33812B3D22F97DF3B8DDCE2BC190DC6987E317
25,672,478 UART: Caliptra RT
25,673,211 UART: [state] CFI Enabled
25,805,550 UART: [rt] RT listening for mailbox commands...
25,837,022 UART: [rt]cmd =0x494e464f, len=4
25,841,303 >>> mbox cmd response data (312 bytes)
27,902,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,132,203 >>> mbox cmd response: success
35,167,425 UART:
35,167,757 UART: Running Caliptra FMC ...
35,168,902 UART:
35,169,080 UART: [state] CFI Enabled
35,213,107 UART: [art] Extend RT PCRs Done
35,214,260 UART: [art] Lock RT PCRs Done
35,215,650 UART: [art] Populate DV Done
35,221,117 UART: [fht] FMC Alias Private Key: 7
35,222,658 UART: [art] Derive CDI
35,223,476 UART: [art] Store in slot 0x4
35,266,412 UART: [art] Derive Key Pair
35,267,457 UART: [art] Store priv key in slot 0x5
37,694,567 UART: [art] Derive Key Pair - Done
37,707,621 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,413,934 UART: [art] Erasing AUTHORITY.KEYID = 7
39,415,445 UART: [art] PUB.X = CDDB6C04BB126F3B87DDFCE9FE610DB8AEB0AC7320E6D7F19C2EFB261615FE63B4EFD761E473EFCBDC3ED72EEB5B6423
39,422,770 UART: [art] PUB.Y = 71D6272C7658C096E15AB7BF824590F29F5C33E12BA735ADAF041BB81A5C6E6702D4C4FF4F456E5B96A6BD0DFE824EA2
39,430,020 UART: [art] SIG.R = FBF0671BB903EAE4CD90EA9979A1FB95EE449D5C38FAA3A40B97E614D8D4886D088BF3645C29A31950BE47148EA040AE
39,437,445 UART: [art] SIG.S = 193390DCA6B851A7A107B00BF3A91C23D68BC7211E94BB87681B3EB3D21DAC492EE95CBCDD8ADB3E0361824A1D793307
40,415,996 UART: Caliptra RT
40,416,712 UART: [state] CFI Enabled
40,786,495 UART: [rt] RT listening for mailbox commands...
40,788,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,818,351 UART: [rt]cmd =0x494e464f, len=4
40,822,520 >>> mbox cmd response data (312 bytes)
42,896,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
50,120,998 >>> mbox cmd response: success
50,155,385 UART:
50,155,680 UART: Running Caliptra FMC ...
50,156,791 UART:
50,156,958 UART: [state] CFI Enabled
50,201,154 UART: [art] Extend RT PCRs Done
50,202,347 UART: [art] Lock RT PCRs Done
50,203,865 UART: [art] Populate DV Done
50,209,545 UART: [fht] FMC Alias Private Key: 7
50,211,188 UART: [art] Derive CDI
50,212,004 UART: [art] Store in slot 0x4
50,254,606 UART: [art] Derive Key Pair
50,255,604 UART: [art] Store priv key in slot 0x5
52,682,992 UART: [art] Derive Key Pair - Done
52,696,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,402,330 UART: [art] Erasing AUTHORITY.KEYID = 7
54,403,828 UART: [art] PUB.X = 53E7FCA304B699E85E8DE842A121F4D7CACE3A348376037FE4F455DDBA661F518B4A4523EEC4B7DAB07F1BD149119730
54,411,140 UART: [art] PUB.Y = BC0E057993E1B236FCD12B556B25EAD9C67F933195FD78156BC896933044D69CFC1BF75AD882F25C5C25DE5F9D6E0D62
54,418,382 UART: [art] SIG.R = 6817648C6CC9BAB901684297F729029C0AF5D3A0918E60E981CE4D26C7ECCD9B2DB48ADC23E2173CDC810DB8C3A55F86
54,425,787 UART: [art] SIG.S = AF8B40D577B9B83F109E1D0A26258CFCB3B202FD6EB4C3D83C2A09881E665823DF323037DC85DEF9165191CB7B88443F
55,404,664 UART: Caliptra RT
55,405,378 UART: [state] CFI Enabled
55,775,004 UART: [rt] RT listening for mailbox commands...
55,776,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
55,806,410 UART: [rt]cmd =0x494e464f, len=4
55,810,874 >>> mbox cmd response data (312 bytes)
55,812,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
63,032,678 >>> mbox cmd response: success
63,066,431 UART:
63,066,711 UART: Running Caliptra FMC ...
63,067,827 UART:
63,067,993 UART: [state] CFI Enabled
63,111,788 UART: [art] Extend RT PCRs Done
63,112,941 UART: [art] Lock RT PCRs Done
63,114,289 UART: [art] Populate DV Done
63,119,749 UART: [fht] FMC Alias Private Key: 7
63,121,351 UART: [art] Derive CDI
63,122,142 UART: [art] Store in slot 0x4
63,164,639 UART: [art] Derive Key Pair
63,165,683 UART: [art] Store priv key in slot 0x5
65,592,426 UART: [art] Derive Key Pair - Done
65,605,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,312,158 UART: [art] Erasing AUTHORITY.KEYID = 7
67,313,670 UART: [art] PUB.X = CDDB6C04BB126F3B87DDFCE9FE610DB8AEB0AC7320E6D7F19C2EFB261615FE63B4EFD761E473EFCBDC3ED72EEB5B6423
67,320,977 UART: [art] PUB.Y = 71D6272C7658C096E15AB7BF824590F29F5C33E12BA735ADAF041BB81A5C6E6702D4C4FF4F456E5B96A6BD0DFE824EA2
67,328,272 UART: [art] SIG.R = FBF0671BB903EAE4CD90EA9979A1FB95EE449D5C38FAA3A40B97E614D8D4886D088BF3645C29A31950BE47148EA040AE
67,335,635 UART: [art] SIG.S = 193390DCA6B851A7A107B00BF3A91C23D68BC7211E94BB87681B3EB3D21DAC492EE95CBCDD8ADB3E0361824A1D793307
68,314,081 UART: Caliptra RT
68,314,773 UART: [state] CFI Enabled
68,688,787 UART: [rt] RT listening for mailbox commands...
68,690,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
68,720,127 UART: [rt]cmd =0x494e464f, len=4
68,724,296 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
Truncated 1498 bytes from beginning
_for_fw is high
3,525,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,904 UART: [idev] Erasing UDS.KEYID = 0
6,029,499 UART: [idev] Sha1 KeyId Algorithm
6,051,809 UART: [idev] --
6,056,644 UART: [ldev] ++
6,057,327 UART: [ldev] CDI.KEYID = 6
6,058,236 UART: [ldev] SUBJECT.KEYID = 5
6,059,446 UART: [ldev] AUTHORITY.KEYID = 7
6,060,683 UART: [ldev] FE.KEYID = 1
6,102,373 UART: [ldev] Erasing FE.KEYID = 1
8,607,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,859 UART: [ldev] --
10,417,128 UART: [fwproc] Wait for Commands...
10,419,166 UART: [fwproc] Recv command 0x46574c44
10,421,470 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,980 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,018 >>> mbox cmd response: success
14,672,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,676,466 UART: [afmc] ++
14,677,168 UART: [afmc] CDI.KEYID = 6
14,678,409 UART: [afmc] SUBJECT.KEYID = 7
14,679,841 UART: [afmc] AUTHORITY.KEYID = 5
17,216,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,339 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
18,956,531 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
18,971,710 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
18,986,550 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
19,009,218 UART: [afmc] --
19,013,043 UART: [cold-reset] --
19,016,526 UART: [state] Locking Datavault
19,021,831 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,961 UART: [state] Locking ICCM
19,026,542 UART: [exit] Launching FMC @ 0x40000130
19,035,205 UART:
19,035,447 UART: Running Caliptra FMC ...
19,036,548 UART:
19,036,703 UART: [state] CFI Enabled
19,096,348 UART: [fht] FMC Alias Private Key: 7
20,863,589 UART: [art] Extend RT PCRs Done
20,864,819 UART: [art] Lock RT PCRs Done
20,866,389 UART: [art] Populate DV Done
20,871,911 UART: [fht] FMC Alias Private Key: 7
20,873,609 UART: [art] Derive CDI
20,874,417 UART: [art] Store in slot 0x4
20,929,162 UART: [art] Derive Key Pair
20,930,161 UART: [art] Store priv key in slot 0x5
23,392,856 UART: [art] Derive Key Pair - Done
23,405,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,839 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,342 UART: [art] PUB.X = 8C1EC816502B3ADBFB3ADBE07C6EB2C60605A063569775BF4CD050186E7449858C3D1FE9923EF30D68DFF2AD5AF06BEA
25,127,639 UART: [art] PUB.Y = 2EBF408F2C8C2E4637368367EFA08B641F30632E59EF38C4C26D7C06E0621D62E13D4F723665DA627BE3818A43CBA677
25,134,877 UART: [art] SIG.R = 029796046DCA8D1968E2AD9D22A257D2FE2D7BC992DCC3948C58DCC9EB431689BA6E2A4C41FDCFDB4CE14AEAD32D3601
25,142,263 UART: [art] SIG.S = A3C06270F443D9A3F755F1E536307CE768F4E090F40BA0041C63361A2D1A11DD468F632171AF9F497E81E7123BE78129
26,120,775 UART: Caliptra RT
26,121,483 UART: [state] CFI Enabled
26,299,706 UART: [rt] RT listening for mailbox commands...
26,331,503 UART: [rt]cmd =0x494e464f, len=4
26,335,892 >>> mbox cmd response data (312 bytes)
28,401,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,552,460 UART:
28,552,829 UART: Running Caliptra ROM ...
28,553,958 UART:
28,554,148 UART: [state] CFI Enabled
28,613,420 UART: [state] LifecycleState = Unprovisioned
28,615,510 UART: [state] DebugLocked = No
28,617,540 UART: [state] WD Timer not started. Device not locked for debugging
28,621,992 UART: [kat] SHA2-256
28,811,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,822,641 UART: [kat] ++
28,823,099 UART: [kat] sha1
28,835,930 UART: [kat] SHA2-256
28,838,946 UART: [kat] SHA2-384
28,845,309 UART: [kat] SHA2-512-ACC
28,847,931 UART: [kat] ECC-384
31,296,178 UART: [kat] HMAC-384Kdf
31,321,472 UART: [kat] LMS
31,853,041 UART: [kat] --
31,857,253 UART: [update-reset] ++
35,377,041 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,379,883 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,009,669 >>> mbox cmd response: success
36,011,248 UART: [update-reset] Copying MAN_2 To MAN_1
36,048,813 UART: [update-reset Success] --
36,053,468 UART: [state] Locking Datavault
36,056,217 UART: [state] Locking PCR0, PCR1 and PCR31
36,058,354 UART: [state] Locking ICCM
36,060,776 UART: [exit] Launching FMC @ 0x40000130
36,069,440 UART:
36,069,675 UART: Running Caliptra FMC ...
36,070,775 UART:
36,070,932 UART: [state] CFI Enabled
36,172,622 UART: [art] Extend RT PCRs Done
36,173,810 UART: [art] Lock RT PCRs Done
36,175,158 UART: [art] Populate DV Done
36,180,853 UART: [fht] FMC Alias Private Key: 7
36,182,383 UART: [art] Derive CDI
36,183,191 UART: [art] Store in slot 0x4
36,242,499 UART: [art] Derive Key Pair
36,243,582 UART: [art] Store priv key in slot 0x5
38,706,150 UART: [art] Derive Key Pair - Done
38,719,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,431,858 UART: [art] Erasing AUTHORITY.KEYID = 7
40,433,354 UART: [art] PUB.X = 633DFD554E216DDA0ECACFF3D6DA26D200A86E23E487D9722853D2F526BCAEFCFC6AFD2EE0A23CC5903990F8DF26F1EF
40,440,629 UART: [art] PUB.Y = 10466EE315DC59D6BA61E8F199E26D2C2A1775EF30A6E2494AD2AD58FE20796F79D2BC75DCC3A06615837434BCF24E8D
40,447,946 UART: [art] SIG.R = B6AF0CD89167EE8AAF9615D1CB3B800E76242C6E04BE50BD7257CE6D03F6471EBE8966389AC264DF655038711F5B7E2E
40,455,371 UART: [art] SIG.S = 91453636FB3DBF73E60A5CCB5B07D7A7E7CF902B97451776F815B2B4E05EC37FA5244FC9AE95EC76F847498867E6623F
41,434,431 UART: Caliptra RT
41,435,140 UART: [state] CFI Enabled
41,856,023 UART: [rt] RT listening for mailbox commands...
41,857,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,887,462 UART: [rt]cmd =0x494e464f, len=4
41,891,959 >>> mbox cmd response data (312 bytes)
43,955,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,106,014 UART:
44,106,389 UART: Running Caliptra ROM ...
44,107,443 UART:
44,107,591 UART: [state] CFI Enabled
44,186,313 UART: [state] LifecycleState = Unprovisioned
44,188,357 UART: [state] DebugLocked = No
44,189,714 UART: [state] WD Timer not started. Device not locked for debugging
44,194,255 UART: [kat] SHA2-256
44,384,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,394,864 UART: [kat] ++
44,395,320 UART: [kat] sha1
44,407,551 UART: [kat] SHA2-256
44,410,510 UART: [kat] SHA2-384
44,416,548 UART: [kat] SHA2-512-ACC
44,419,110 UART: [kat] ECC-384
46,869,898 UART: [kat] HMAC-384Kdf
46,890,448 UART: [kat] LMS
47,422,038 UART: [kat] --
47,424,255 UART: [update-reset] ++
50,934,772 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,937,619 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,567,355 >>> mbox cmd response: success
51,569,038 UART: [update-reset] Copying MAN_2 To MAN_1
51,606,603 UART: [update-reset Success] --
51,612,702 UART: [state] Locking Datavault
51,616,090 UART: [state] Locking PCR0, PCR1 and PCR31
51,618,226 UART: [state] Locking ICCM
51,619,778 UART: [exit] Launching FMC @ 0x40000130
51,628,439 UART:
51,628,670 UART: Running Caliptra FMC ...
51,629,768 UART:
51,629,922 UART: [state] CFI Enabled
51,721,742 UART: [art] Extend RT PCRs Done
51,722,920 UART: [art] Lock RT PCRs Done
51,724,264 UART: [art] Populate DV Done
51,729,775 UART: [fht] FMC Alias Private Key: 7
51,731,413 UART: [art] Derive CDI
51,732,824 UART: [art] Store in slot 0x4
51,790,907 UART: [art] Derive Key Pair
51,791,919 UART: [art] Store priv key in slot 0x5
54,254,550 UART: [art] Derive Key Pair - Done
54,267,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,980,922 UART: [art] Erasing AUTHORITY.KEYID = 7
55,982,433 UART: [art] PUB.X = 5FAFA5648E5997A635AC5303177C4BA4BB6334353EFDACC6C54A5C714AA1642269E847E2D6CBFA53CAEF4C795C98BB08
55,989,715 UART: [art] PUB.Y = 28ECE6685970152FBF0C5B692A51FFFB6DB20BC14D6B3AB5B489311A47C66F2DC24B8C45E93938F359CFA173596919D7
55,996,976 UART: [art] SIG.R = 7265329D5E8E0A351E60F62BB999A89957E85C9BA03A8D3CBEFF4F08E18E474100FC4847C9148C300AC7815C1AB35E06
56,004,338 UART: [art] SIG.S = 9A1E2C93F6087C0AD90FB79A1A0B1D2407D22E6AC355D146330F9C7D6DBECF56263F8F4A543B0CFD6B9F9F5C271BC9DB
56,984,020 UART: Caliptra RT
56,984,715 UART: [state] CFI Enabled
57,404,450 UART: [rt] RT listening for mailbox commands...
57,406,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,435,998 UART: [rt]cmd =0x494e464f, len=4
57,440,419 >>> mbox cmd response data (312 bytes)
57,442,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,592,313 UART:
57,592,622 UART: Running Caliptra ROM ...
57,593,738 UART:
57,593,917 UART: [state] CFI Enabled
57,666,299 UART: [state] LifecycleState = Unprovisioned
57,668,334 UART: [state] DebugLocked = No
57,670,090 UART: [state] WD Timer not started. Device not locked for debugging
57,675,069 UART: [kat] SHA2-256
57,864,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,875,709 UART: [kat] ++
57,876,245 UART: [kat] sha1
57,887,244 UART: [kat] SHA2-256
57,890,255 UART: [kat] SHA2-384
57,897,374 UART: [kat] SHA2-512-ACC
57,899,972 UART: [kat] ECC-384
60,347,310 UART: [kat] HMAC-384Kdf
60,371,996 UART: [kat] LMS
60,903,396 UART: [kat] --
60,906,248 UART: [update-reset] ++
64,408,126 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
64,411,663 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
65,041,422 >>> mbox cmd response: success
65,042,830 UART: [update-reset] Copying MAN_2 To MAN_1
65,080,386 UART: [update-reset Success] --
65,084,991 UART: [state] Locking Datavault
65,087,814 UART: [state] Locking PCR0, PCR1 and PCR31
65,090,001 UART: [state] Locking ICCM
65,091,264 UART: [exit] Launching FMC @ 0x40000130
65,099,923 UART:
65,100,169 UART: Running Caliptra FMC ...
65,101,271 UART:
65,101,429 UART: [state] CFI Enabled
65,202,531 UART: [art] Extend RT PCRs Done
65,203,712 UART: [art] Lock RT PCRs Done
65,204,897 UART: [art] Populate DV Done
65,210,318 UART: [fht] FMC Alias Private Key: 7
65,211,912 UART: [art] Derive CDI
65,212,719 UART: [art] Store in slot 0x4
65,272,127 UART: [art] Derive Key Pair
65,273,163 UART: [art] Store priv key in slot 0x5
67,735,654 UART: [art] Derive Key Pair - Done
67,748,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,460,891 UART: [art] Erasing AUTHORITY.KEYID = 7
69,462,395 UART: [art] PUB.X = 633DFD554E216DDA0ECACFF3D6DA26D200A86E23E487D9722853D2F526BCAEFCFC6AFD2EE0A23CC5903990F8DF26F1EF
69,469,652 UART: [art] PUB.Y = 10466EE315DC59D6BA61E8F199E26D2C2A1775EF30A6E2494AD2AD58FE20796F79D2BC75DCC3A06615837434BCF24E8D
69,476,926 UART: [art] SIG.R = B6AF0CD89167EE8AAF9615D1CB3B800E76242C6E04BE50BD7257CE6D03F6471EBE8966389AC264DF655038711F5B7E2E
69,484,338 UART: [art] SIG.S = 91453636FB3DBF73E60A5CCB5B07D7A7E7CF902B97451776F815B2B4E05EC37FA5244FC9AE95EC76F847498867E6623F
70,463,034 UART: Caliptra RT
70,463,750 UART: [state] CFI Enabled
70,887,759 UART: [rt] RT listening for mailbox commands...
70,889,598 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,919,441 UART: [rt]cmd =0x494e464f, len=4
70,923,664 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,440,040 ready_for_fw is high
3,440,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,832,418 >>> mbox cmd response: success
14,833,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,131,856 UART:
19,132,245 UART: Running Caliptra FMC ...
19,133,381 UART:
19,133,538 UART: [state] CFI Enabled
19,199,530 UART: [fht] FMC Alias Private Key: 7
20,966,321 UART: [art] Extend RT PCRs Done
20,967,534 UART: [art] Lock RT PCRs Done
20,969,374 UART: [art] Populate DV Done
20,974,965 UART: [fht] FMC Alias Private Key: 7
20,976,506 UART: [art] Derive CDI
20,977,324 UART: [art] Store in slot 0x4
21,031,863 UART: [art] Derive Key Pair
21,032,914 UART: [art] Store priv key in slot 0x5
23,495,667 UART: [art] Derive Key Pair - Done
23,508,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,909 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,405 UART: [art] PUB.X = 1DF3A9113C307309D1D558B5D59DB688F25BD941EC8E86DF271908E60F389924C2144E86133C63059E285E4E007A00E4
25,230,658 UART: [art] PUB.Y = D361F403D3C88AF14F631B54E0FE8D60495F433A4FA611E989A19D75C398CE157555DADDC95F8144B55F3BD589E1A19C
25,237,900 UART: [art] SIG.R = 9AD8AF764FE5C9DD31AF86658EF022280715C312323D2158CBB16A4FC5F414B71F7AFDE9DE7AA73CE16AA80954C04162
25,245,286 UART: [art] SIG.S = 4481CE180ECE3099E7A8E1AC12106BF4B17ADDCBEDF2B026436F839D19FD391AA626EFAF61026D2FAFC8A9865F4D01D8
26,224,856 UART: Caliptra RT
26,225,569 UART: [state] CFI Enabled
26,406,542 UART: [rt] RT listening for mailbox commands...
26,437,947 UART: [rt]cmd =0x494e464f, len=4
26,442,261 >>> mbox cmd response data (312 bytes)
28,508,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,419,191 >>> mbox cmd response: success
36,454,772 UART:
36,455,089 UART: Running Caliptra FMC ...
36,456,217 UART:
36,456,387 UART: [state] CFI Enabled
36,556,288 UART: [art] Extend RT PCRs Done
36,557,475 UART: [art] Lock RT PCRs Done
36,559,130 UART: [art] Populate DV Done
36,564,437 UART: [fht] FMC Alias Private Key: 7
36,566,088 UART: [art] Derive CDI
36,566,832 UART: [art] Store in slot 0x4
36,625,603 UART: [art] Derive Key Pair
36,626,644 UART: [art] Store priv key in slot 0x5
39,088,790 UART: [art] Derive Key Pair - Done
39,102,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,814,608 UART: [art] Erasing AUTHORITY.KEYID = 7
40,816,119 UART: [art] PUB.X = 6E638AB1CB6C5C1687A82B4B02B609D0804FABAB0715B929A2C279B5EE1C170A87961FED7385881614397E3A547436F9
40,823,379 UART: [art] PUB.Y = F60059D112B354A7EC3673016875C5A153623B7AE689AC87FBA5727B391BAE92F9A8FC5FC6CA1285957D6665C53B5D0B
40,830,641 UART: [art] SIG.R = BEFF59ACDCF6EFD3403FF4C9507DD7DDDB398FF986DCEDD5A7059A37E6073E2999EE0C073BA0BFFA554B44C0C1857A8E
40,838,062 UART: [art] SIG.S = 72B68D49CDAFF1979E8A38D89D17FA90CB991BBB78BE39FC38EAA352AFA51CF6C09BD59110DC8ABB710D97F242DC4354
41,816,746 UART: Caliptra RT
41,817,436 UART: [state] CFI Enabled
42,233,226 UART: [rt] RT listening for mailbox commands...
42,235,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,264,882 UART: [rt]cmd =0x494e464f, len=4
42,269,328 >>> mbox cmd response data (312 bytes)
44,334,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
52,236,688 >>> mbox cmd response: success
52,273,150 UART:
52,273,487 UART: Running Caliptra FMC ...
52,274,532 UART:
52,274,680 UART: [state] CFI Enabled
52,368,557 UART: [art] Extend RT PCRs Done
52,369,768 UART: [art] Lock RT PCRs Done
52,371,412 UART: [art] Populate DV Done
52,376,663 UART: [fht] FMC Alias Private Key: 7
52,378,317 UART: [art] Derive CDI
52,379,129 UART: [art] Store in slot 0x4
52,437,260 UART: [art] Derive Key Pair
52,438,308 UART: [art] Store priv key in slot 0x5
54,900,544 UART: [art] Derive Key Pair - Done
54,913,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,626,076 UART: [art] Erasing AUTHORITY.KEYID = 7
56,627,588 UART: [art] PUB.X = 779BDC3AFAA78F6B9C36C2FD76855771B997661DFFBE563DD001A3E6D7F436897DAF3E642EEAEAB0C91C0CC3B539A41F
56,634,849 UART: [art] PUB.Y = B1DDE3DBED22820A3D21B4BFC5BB5846FD17E89D9C4D40CB24ACA26BFC182CCF884F8AB9ABE2F9CD68F2596B8EE6A078
56,642,148 UART: [art] SIG.R = 78DD465D43A3E48C69FF98BD965D0D90BAD9BCC76988391B051A6D4CC8991AECDF9AE53CA64D0A2EA1A88F0BE6F5EDCA
56,649,598 UART: [art] SIG.S = F4A28A79695A59B161012059E200E9BE703DBE1B7E29A817ACD5C22298DFF8EA5379DFAF57DEB456E2E5773812CB415E
57,628,569 UART: Caliptra RT
57,629,405 UART: [state] CFI Enabled
58,049,315 UART: [rt] RT listening for mailbox commands...
58,051,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
58,081,066 UART: [rt]cmd =0x494e464f, len=4
58,085,455 >>> mbox cmd response data (312 bytes)
58,087,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
66,011,341 >>> mbox cmd response: success
66,045,746 UART:
66,046,050 UART: Running Caliptra FMC ...
66,047,089 UART:
66,047,260 UART: [state] CFI Enabled
66,145,713 UART: [art] Extend RT PCRs Done
66,146,899 UART: [art] Lock RT PCRs Done
66,148,168 UART: [art] Populate DV Done
66,153,685 UART: [fht] FMC Alias Private Key: 7
66,155,388 UART: [art] Derive CDI
66,156,121 UART: [art] Store in slot 0x4
66,214,878 UART: [art] Derive Key Pair
66,215,915 UART: [art] Store priv key in slot 0x5
68,678,353 UART: [art] Derive Key Pair - Done
68,691,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
70,403,973 UART: [art] Erasing AUTHORITY.KEYID = 7
70,405,483 UART: [art] PUB.X = 6E638AB1CB6C5C1687A82B4B02B609D0804FABAB0715B929A2C279B5EE1C170A87961FED7385881614397E3A547436F9
70,412,752 UART: [art] PUB.Y = F60059D112B354A7EC3673016875C5A153623B7AE689AC87FBA5727B391BAE92F9A8FC5FC6CA1285957D6665C53B5D0B
70,419,995 UART: [art] SIG.R = BEFF59ACDCF6EFD3403FF4C9507DD7DDDB398FF986DCEDD5A7059A37E6073E2999EE0C073BA0BFFA554B44C0C1857A8E
70,427,449 UART: [art] SIG.S = 72B68D49CDAFF1979E8A38D89D17FA90CB991BBB78BE39FC38EAA352AFA51CF6C09BD59110DC8ABB710D97F242DC4354
71,406,555 UART: Caliptra RT
71,407,265 UART: [state] CFI Enabled
71,823,482 UART: [rt] RT listening for mailbox commands...
71,825,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,854,976 UART: [rt]cmd =0x494e464f, len=4
71,859,189 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.71s
Truncated 1498 bytes from beginning
_for_fw is high
3,860,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,322 UART: [idev] Erasing UDS.KEYID = 0
6,336,376 UART: [idev] Sha1 KeyId Algorithm
6,358,965 UART: [idev] --
6,364,047 UART: [ldev] ++
6,364,731 UART: [ldev] CDI.KEYID = 6
6,365,707 UART: [ldev] SUBJECT.KEYID = 5
6,366,862 UART: [ldev] AUTHORITY.KEYID = 7
6,368,043 UART: [ldev] FE.KEYID = 1
6,379,400 UART: [ldev] Erasing FE.KEYID = 1
8,860,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,773 UART: [ldev] --
10,653,560 UART: [fwproc] Wait for Commands...
10,655,954 UART: [fwproc] Recv command 0x46574c44
10,658,216 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,612 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,711 >>> mbox cmd response: success
14,921,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,925,504 UART: [afmc] ++
14,926,212 UART: [afmc] CDI.KEYID = 6
14,927,404 UART: [afmc] SUBJECT.KEYID = 7
14,928,899 UART: [afmc] AUTHORITY.KEYID = 5
17,433,274 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,293 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,212 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
19,174,428 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
19,189,555 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
19,204,490 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
19,228,010 UART: [afmc] --
19,231,189 UART: [cold-reset] --
19,233,766 UART: [state] Locking Datavault
19,239,565 UART: [state] Locking PCR0, PCR1 and PCR31
19,241,766 UART: [state] Locking ICCM
19,244,689 UART: [exit] Launching FMC @ 0x40000130
19,253,314 UART:
19,253,551 UART: Running Caliptra FMC ...
19,254,658 UART:
19,254,821 UART: [state] CFI Enabled
19,262,899 UART: [fht] FMC Alias Private Key: 7
21,029,197 UART: [art] Extend RT PCRs Done
21,030,425 UART: [art] Lock RT PCRs Done
21,032,062 UART: [art] Populate DV Done
21,037,487 UART: [fht] FMC Alias Private Key: 7
21,039,002 UART: [art] Derive CDI
21,039,778 UART: [art] Store in slot 0x4
21,082,380 UART: [art] Derive Key Pair
21,083,427 UART: [art] Store priv key in slot 0x5
23,510,541 UART: [art] Derive Key Pair - Done
23,523,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,112 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,625 UART: [art] PUB.X = 6878DA4228208488B35D9609F2953FB3FE102C75185C48F18A49D9AED33113B35D8A3334118B27D3FA92D5389F8AE610
25,238,890 UART: [art] PUB.Y = A213A83C34AD63EE888236CDEE8433C04B6D1E4F8CD1B9AC4AA81A3842BD062E1B25D0E4F03FACA8619B6F33C972C715
25,246,142 UART: [art] SIG.R = 2D6BFCA21459551BEE93024C412134EF4E8F878AB4F14F5E9EAD4B56BC0BDACFE096B8B1E897FD78132586C3AC50B7FE
25,253,563 UART: [art] SIG.S = 097BFDB981D70B7A2EAF3C520EA32165DC12A9C0C9477D59A737EF859B906D7FD1086DDD0021CF764DABAF3C501CF7AA
26,233,018 UART: Caliptra RT
26,233,743 UART: [state] CFI Enabled
26,366,383 UART: [rt] RT listening for mailbox commands...
26,397,698 UART: [rt]cmd =0x494e464f, len=4
26,402,258 >>> mbox cmd response data (312 bytes)
28,472,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,623,016 UART:
28,623,399 UART: Running Caliptra ROM ...
28,624,460 UART:
28,624,669 UART: [state] CFI Enabled
28,640,572 UART: [state] LifecycleState = Unprovisioned
28,642,412 UART: [state] DebugLocked = No
28,644,418 UART: [state] WD Timer not started. Device not locked for debugging
28,648,234 UART: [kat] SHA2-256
28,838,118 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,848,871 UART: [kat] ++
28,849,384 UART: [kat] sha1
28,860,433 UART: [kat] SHA2-256
28,863,401 UART: [kat] SHA2-384
28,869,665 UART: [kat] SHA2-512-ACC
28,872,235 UART: [kat] ECC-384
31,316,127 UART: [kat] HMAC-384Kdf
31,329,988 UART: [kat] LMS
31,861,604 UART: [kat] --
31,865,650 UART: [update-reset] ++
35,370,403 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,373,087 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,002,810 >>> mbox cmd response: success
36,003,270 UART: [update-reset] Copying MAN_2 To MAN_1
36,040,809 UART: [update-reset Success] --
36,044,950 UART: [state] Locking Datavault
36,047,089 UART: [state] Locking PCR0, PCR1 and PCR31
36,049,304 UART: [state] Locking ICCM
36,051,196 UART: [exit] Launching FMC @ 0x40000130
36,059,888 UART:
36,060,128 UART: Running Caliptra FMC ...
36,061,238 UART:
36,061,402 UART: [state] CFI Enabled
36,105,530 UART: [art] Extend RT PCRs Done
36,106,708 UART: [art] Lock RT PCRs Done
36,108,270 UART: [art] Populate DV Done
36,113,894 UART: [fht] FMC Alias Private Key: 7
36,115,601 UART: [art] Derive CDI
36,116,422 UART: [art] Store in slot 0x4
36,159,251 UART: [art] Derive Key Pair
36,160,257 UART: [art] Store priv key in slot 0x5
38,586,944 UART: [art] Derive Key Pair - Done
38,599,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,306,020 UART: [art] Erasing AUTHORITY.KEYID = 7
40,307,527 UART: [art] PUB.X = 8BA8A08BD61F95D690BA36CE23FD9513900566354298C1BF6A417E32CD8BBCCFFA3B26E3435248850FE03056451ECD4E
40,314,802 UART: [art] PUB.Y = E807A1F9D85AD2ABD2A04A46F139BE5149C3B3383B232CA0A0D787CEC5BCB09281A6A9E0FDCC8F1457D926B8B66A20BC
40,322,050 UART: [art] SIG.R = 5F858B4BF9FFB1324F0E0905FD68E5EF00515D50AD4C3419ADE68D75CF1A75C3006ECD0CBF92AA7D7A6B4D9A915F4165
40,329,449 UART: [art] SIG.S = 08D5A9C226CA4E1139EECB6FDB5E941DA6B3E77D4BD35114C9FE02ED122CB2282D8DA21CC9B4AA3D06F2FB5D6FF106B0
41,308,403 UART: Caliptra RT
41,309,120 UART: [state] CFI Enabled
41,681,740 UART: [rt] RT listening for mailbox commands...
41,683,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
41,713,487 UART: [rt]cmd =0x494e464f, len=4
41,717,913 >>> mbox cmd response data (312 bytes)
43,786,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,936,836 UART:
43,937,190 UART: Running Caliptra ROM ...
43,938,244 UART:
43,938,456 UART: [state] CFI Enabled
43,953,226 UART: [state] LifecycleState = Unprovisioned
43,955,117 UART: [state] DebugLocked = No
43,956,688 UART: [state] WD Timer not started. Device not locked for debugging
43,960,453 UART: [kat] SHA2-256
44,150,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
44,161,141 UART: [kat] ++
44,161,602 UART: [kat] sha1
44,172,329 UART: [kat] SHA2-256
44,175,334 UART: [kat] SHA2-384
44,181,445 UART: [kat] SHA2-512-ACC
44,184,037 UART: [kat] ECC-384
46,624,236 UART: [kat] HMAC-384Kdf
46,638,319 UART: [kat] LMS
47,169,920 UART: [kat] --
47,172,696 UART: [update-reset] ++
50,683,236 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
50,687,165 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
51,316,927 >>> mbox cmd response: success
51,317,676 UART: [update-reset] Copying MAN_2 To MAN_1
51,355,269 UART: [update-reset Success] --
51,360,485 UART: [state] Locking Datavault
51,364,241 UART: [state] Locking PCR0, PCR1 and PCR31
51,366,390 UART: [state] Locking ICCM
51,369,427 UART: [exit] Launching FMC @ 0x40000130
51,378,072 UART:
51,378,319 UART: Running Caliptra FMC ...
51,379,442 UART:
51,379,602 UART: [state] CFI Enabled
51,423,886 UART: [art] Extend RT PCRs Done
51,425,031 UART: [art] Lock RT PCRs Done
51,426,644 UART: [art] Populate DV Done
51,432,268 UART: [fht] FMC Alias Private Key: 7
51,433,922 UART: [art] Derive CDI
51,434,695 UART: [art] Store in slot 0x4
51,477,513 UART: [art] Derive Key Pair
51,478,559 UART: [art] Store priv key in slot 0x5
53,905,516 UART: [art] Derive Key Pair - Done
53,918,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,624,776 UART: [art] Erasing AUTHORITY.KEYID = 7
55,626,304 UART: [art] PUB.X = 9E1A06C9611A4AD4C694143991188CCD561FFD499C68147635A868D15A2F0A7EF4BEB097DEC883F9EAD0E3BC6B5E5FA8
55,633,584 UART: [art] PUB.Y = 4D900EEB3E7B3A440D155E7C1AC42F6F7481C7C14C9E3B380793AE23F87E71B39E125ECA958244D7A4B35E0E982B7B5C
55,640,845 UART: [art] SIG.R = ABD7D47C5962205F03A66B8F8A406F2DC5A5408258F7EEB90F122FF76CF1591A6C878FB64A847A06A5DEE35DD4C661C3
55,648,227 UART: [art] SIG.S = 7A4C92D1CE5ECCF6E0603D4381CBFF82A4354C12A0A64321819FEB66954AB54550E2FBB5E153AC758E6B8FD705F7D43E
56,627,455 UART: Caliptra RT
56,628,151 UART: [state] CFI Enabled
57,002,824 UART: [rt] RT listening for mailbox commands...
57,004,678 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,034,526 UART: [rt]cmd =0x494e464f, len=4
57,038,976 >>> mbox cmd response data (312 bytes)
57,040,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
57,190,799 UART:
57,191,112 UART: Running Caliptra ROM ...
57,192,178 UART:
57,192,442 UART: [state] CFI Enabled
57,203,528 UART: [state] LifecycleState = Unprovisioned
57,205,365 UART: [state] DebugLocked = No
57,206,908 UART: [state] WD Timer not started. Device not locked for debugging
57,211,435 UART: [kat] SHA2-256
57,401,290 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
57,412,056 UART: [kat] ++
57,412,655 UART: [kat] sha1
57,424,636 UART: [kat] SHA2-256
57,427,606 UART: [kat] SHA2-384
57,433,000 UART: [kat] SHA2-512-ACC
57,435,577 UART: [kat] ECC-384
59,875,881 UART: [kat] HMAC-384Kdf
59,889,464 UART: [kat] LMS
60,421,090 UART: [kat] --
60,426,215 UART: [update-reset] ++
63,938,775 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
63,942,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
64,572,407 >>> mbox cmd response: success
64,573,329 UART: [update-reset] Copying MAN_2 To MAN_1
64,610,903 UART: [update-reset Success] --
64,615,329 UART: [state] Locking Datavault
64,618,489 UART: [state] Locking PCR0, PCR1 and PCR31
64,620,695 UART: [state] Locking ICCM
64,622,128 UART: [exit] Launching FMC @ 0x40000130
64,630,750 UART:
64,630,986 UART: Running Caliptra FMC ...
64,632,091 UART:
64,632,256 UART: [state] CFI Enabled
64,676,566 UART: [art] Extend RT PCRs Done
64,677,763 UART: [art] Lock RT PCRs Done
64,679,041 UART: [art] Populate DV Done
64,684,402 UART: [fht] FMC Alias Private Key: 7
64,685,893 UART: [art] Derive CDI
64,686,660 UART: [art] Store in slot 0x4
64,729,592 UART: [art] Derive Key Pair
64,730,637 UART: [art] Store priv key in slot 0x5
67,157,042 UART: [art] Derive Key Pair - Done
67,169,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
68,876,214 UART: [art] Erasing AUTHORITY.KEYID = 7
68,877,722 UART: [art] PUB.X = 8BA8A08BD61F95D690BA36CE23FD9513900566354298C1BF6A417E32CD8BBCCFFA3B26E3435248850FE03056451ECD4E
68,884,988 UART: [art] PUB.Y = E807A1F9D85AD2ABD2A04A46F139BE5149C3B3383B232CA0A0D787CEC5BCB09281A6A9E0FDCC8F1457D926B8B66A20BC
68,892,278 UART: [art] SIG.R = 5F858B4BF9FFB1324F0E0905FD68E5EF00515D50AD4C3419ADE68D75CF1A75C3006ECD0CBF92AA7D7A6B4D9A915F4165
68,899,617 UART: [art] SIG.S = 08D5A9C226CA4E1139EECB6FDB5E941DA6B3E77D4BD35114C9FE02ED122CB2282D8DA21CC9B4AA3D06F2FB5D6FF106B0
69,878,162 UART: Caliptra RT
69,878,874 UART: [state] CFI Enabled
70,248,196 UART: [rt] RT listening for mailbox commands...
70,250,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
70,279,963 UART: [rt]cmd =0x494e464f, len=4
70,284,401 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,755,388 ready_for_fw is high
3,755,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,441 >>> mbox cmd response: success
15,042,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,295,970 UART:
19,296,354 UART: Running Caliptra FMC ...
19,297,470 UART:
19,297,627 UART: [state] CFI Enabled
19,305,398 UART: [fht] FMC Alias Private Key: 7
21,071,188 UART: [art] Extend RT PCRs Done
21,072,409 UART: [art] Lock RT PCRs Done
21,074,469 UART: [art] Populate DV Done
21,079,801 UART: [fht] FMC Alias Private Key: 7
21,081,406 UART: [art] Derive CDI
21,082,226 UART: [art] Store in slot 0x4
21,124,994 UART: [art] Derive Key Pair
21,126,040 UART: [art] Store priv key in slot 0x5
23,553,121 UART: [art] Derive Key Pair - Done
23,566,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,270 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,779 UART: [art] PUB.X = 8D34C640F04A336ADC39DD87AC53AE5356EF5DD5CBF45C5D2446BEB1D183742E99750F15B8E425484BC83C23D851C12B
25,281,101 UART: [art] PUB.Y = 01F3364CA9524E9C1ABB42BB2F68BEC480BF40055E31CC8A7870900FE1B526E26FDDA901A9E6F6B16DEFB1C1F45964D0
25,288,325 UART: [art] SIG.R = E1DB9633809AF94CA39A31E4705288FEED9A1165889E8EB287AA62FD6587C767AB9A3B8D3064981C5C4D711C0CC6724F
25,295,691 UART: [art] SIG.S = BF07DEFDC41A350D66E050F506470518BC6729AABE8F0A0D048804964693C9936375CA31CC66D909BA553679E36A1DCB
26,274,034 UART: Caliptra RT
26,274,733 UART: [state] CFI Enabled
26,406,761 UART: [rt] RT listening for mailbox commands...
26,437,894 UART: [rt]cmd =0x494e464f, len=4
26,442,233 >>> mbox cmd response data (312 bytes)
28,511,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,332,833 >>> mbox cmd response: success
36,365,291 UART:
36,365,606 UART: Running Caliptra FMC ...
36,366,647 UART:
36,366,798 UART: [state] CFI Enabled
36,411,131 UART: [art] Extend RT PCRs Done
36,412,329 UART: [art] Lock RT PCRs Done
36,413,723 UART: [art] Populate DV Done
36,419,098 UART: [fht] FMC Alias Private Key: 7
36,420,809 UART: [art] Derive CDI
36,421,550 UART: [art] Store in slot 0x4
36,464,415 UART: [art] Derive Key Pair
36,465,421 UART: [art] Store priv key in slot 0x5
38,891,783 UART: [art] Derive Key Pair - Done
38,904,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,610,695 UART: [art] Erasing AUTHORITY.KEYID = 7
40,612,423 UART: [art] PUB.X = 6B0FC30C1AF2F3FE7877FB7FA983996B34A7E995462843987684C3A32FFEC3A7ECF2B864D196FA61643FA4963E6C4CE7
40,619,508 UART: [art] PUB.Y = 63C09D9EB8F64E42B2A4067A7223514227F9ADE4D39F7A4B1E26332DE7A5258F11603C7C4E0C9318078E5EE7A632E3B9
40,626,769 UART: [art] SIG.R = 420E26A2ABC64EBCC132D8E3DF6A7081DCAFC49C91F514C8C8DD04C54F97A123D9F4ECCE12CF08B685AB3FA6EBAD593B
40,634,217 UART: [art] SIG.S = 96A3AEFE7A34DA88F218BB2EEC8B72F8970A8B316A377C4D7C6A44B288BA737810D9E185535C819CE3C2FB357EB65A44
41,613,145 UART: Caliptra RT
41,613,885 UART: [state] CFI Enabled
41,985,689 UART: [rt] RT listening for mailbox commands...
41,987,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,017,313 UART: [rt]cmd =0x494e464f, len=4
42,021,579 >>> mbox cmd response data (312 bytes)
44,085,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
51,904,030 >>> mbox cmd response: success
51,941,667 UART:
51,941,999 UART: Running Caliptra FMC ...
51,943,242 UART:
51,943,419 UART: [state] CFI Enabled
51,987,233 UART: [art] Extend RT PCRs Done
51,988,390 UART: [art] Lock RT PCRs Done
51,989,865 UART: [art] Populate DV Done
51,995,120 UART: [fht] FMC Alias Private Key: 7
51,996,766 UART: [art] Derive CDI
51,997,533 UART: [art] Store in slot 0x4
52,040,357 UART: [art] Derive Key Pair
52,041,393 UART: [art] Store priv key in slot 0x5
54,467,837 UART: [art] Derive Key Pair - Done
54,481,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
56,188,008 UART: [art] Erasing AUTHORITY.KEYID = 7
56,189,524 UART: [art] PUB.X = 6F5E217E58FA6DA06A7CF0B1047C49F77D2D43A2505E5FDB998DD413794574F297ADCAA86E4D84E0BDC26C00EBE54B53
56,196,800 UART: [art] PUB.Y = 922BF0CD4F793BE02BB73B7517D25B2E90DCD5972BEE537C106B0451B12430D13305E11828CE6D0DC635F3F495B48EC1
56,204,064 UART: [art] SIG.R = 7FF65AE0F1AB9E35916179AB3651C9795C06F502C533D73454427ABD41994FE3B4E6E3325651C2A5EA6ABC7BB2E7252A
56,211,453 UART: [art] SIG.S = 8C95AD9FD390B7B4703D68F6642986000330EFDDB9925E12666843826F6174B94915DBE13DF058903BB954D10943409D
57,190,453 UART: Caliptra RT
57,191,202 UART: [state] CFI Enabled
57,567,595 UART: [rt] RT listening for mailbox commands...
57,569,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
57,599,145 UART: [rt]cmd =0x494e464f, len=4
57,603,370 >>> mbox cmd response data (312 bytes)
57,605,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
65,418,997 >>> mbox cmd response: success
65,453,972 UART:
65,454,271 UART: Running Caliptra FMC ...
65,455,399 UART:
65,455,561 UART: [state] CFI Enabled
65,499,360 UART: [art] Extend RT PCRs Done
65,500,513 UART: [art] Lock RT PCRs Done
65,501,750 UART: [art] Populate DV Done
65,507,483 UART: [fht] FMC Alias Private Key: 7
65,509,019 UART: [art] Derive CDI
65,509,839 UART: [art] Store in slot 0x4
65,552,652 UART: [art] Derive Key Pair
65,553,713 UART: [art] Store priv key in slot 0x5
67,980,694 UART: [art] Derive Key Pair - Done
67,993,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
69,699,646 UART: [art] Erasing AUTHORITY.KEYID = 7
69,701,166 UART: [art] PUB.X = 6B0FC30C1AF2F3FE7877FB7FA983996B34A7E995462843987684C3A32FFEC3A7ECF2B864D196FA61643FA4963E6C4CE7
69,708,436 UART: [art] PUB.Y = 63C09D9EB8F64E42B2A4067A7223514227F9ADE4D39F7A4B1E26332DE7A5258F11603C7C4E0C9318078E5EE7A632E3B9
69,715,694 UART: [art] SIG.R = 420E26A2ABC64EBCC132D8E3DF6A7081DCAFC49C91F514C8C8DD04C54F97A123D9F4ECCE12CF08B685AB3FA6EBAD593B
69,723,171 UART: [art] SIG.S = 96A3AEFE7A34DA88F218BB2EEC8B72F8970A8B316A377C4D7C6A44B288BA737810D9E185535C819CE3C2FB357EB65A44
70,702,690 UART: Caliptra RT
70,703,397 UART: [state] CFI Enabled
71,074,747 UART: [rt] RT listening for mailbox commands...
71,076,591 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
71,106,420 UART: [rt]cmd =0x494e464f, len=4
71,110,814 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.67s
Truncated 1984 bytes from beginning
1,560,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,942 UART: [ldev] --
1,586,403 UART: [fwproc] Waiting for Commands...
1,587,104 UART: [fwproc] Received command 0x46574c44
1,587,895 UART: [fwproc] Received Image of size 118548 bytes
2,932,722 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,530 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,037 >>> mbox cmd response: success
3,131,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,132,269 UART: [afmc] ++
3,132,437 UART: [afmc] CDI.KEYID = 6
3,132,799 UART: [afmc] SUBJECT.KEYID = 7
3,133,224 UART: [afmc] AUTHORITY.KEYID = 5
3,168,164 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,722 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,502 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,191,229 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,197,128 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,202,835 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,210,902 UART: [afmc] --
3,211,888 UART: [cold-reset] --
3,212,688 UART: [state] Locking Datavault
3,213,843 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,447 UART: [state] Locking ICCM
3,215,073 UART: [exit] Launching FMC @ 0x40000130
3,220,403 UART:
3,220,419 UART: Running Caliptra FMC ...
3,220,827 UART:
3,220,881 UART: [state] CFI Enabled
3,231,676 UART: [fht] FMC Alias Private Key: 7
3,349,975 UART: [art] Extend RT PCRs Done
3,350,403 UART: [art] Lock RT PCRs Done
3,351,925 UART: [art] Populate DV Done
3,360,033 UART: [fht] FMC Alias Private Key: 7
3,361,127 UART: [art] Derive CDI
3,361,407 UART: [art] Store in slot 0x4
3,447,077 UART: [art] Derive Key Pair
3,447,437 UART: [art] Store priv key in slot 0x5
3,460,532 UART: [art] Derive Key Pair - Done
3,475,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,242 UART: [art] PUB.X = 0CAC9EBBC7A77850631BDDC4CAB1654031146F4E7DBBCE3AD285B61EF695ED4783AEF3AD588A41B05C1707E6A492151F
3,498,024 UART: [art] PUB.Y = D9498A3933AE4298758BC5512D42CB7D1962E9E7F21058152BEAEC66B0FA31CA4299008FFD20278630043D47AA024D55
3,504,944 UART: [art] SIG.R = 3511FADD40E1C71C99A75B27FBB0A55945D9FB7D2DAC2C58C6921C25323E700642959913013980A3AFA11983B8FA36D7
3,511,710 UART: [art] SIG.S = 502584AA4DB5B4C42096A5D3103E2FFF3F09D557A4F8C1E29B81F3B5653C50029BEB5BBB1A4F4FA3A23FD0FBCA632064
3,535,980 UART: Caliptra RT
3,536,231 UART: [state] CFI Enabled
3,654,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,571 UART: [rt]cmd =0x494e464f, len=4
3,689,075 >>> mbox cmd response data (312 bytes)
3,689,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,696 UART:
3,689,712 UART: Running Caliptra ROM ...
3,690,120 UART:
3,690,174 UART: [state] CFI Enabled
3,692,946 UART: [state] LifecycleState = Unprovisioned
3,693,601 UART: [state] DebugLocked = No
3,694,319 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,695,816 UART: [kat] SHA2-256
4,489,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,493,862 UART: [kat] ++
4,494,014 UART: [kat] sha1
4,498,248 UART: [kat] SHA2-256
4,500,186 UART: [kat] SHA2-384
4,502,937 UART: [kat] SHA2-512-ACC
4,504,837 UART: [kat] ECC-384
4,510,540 UART: [kat] HMAC-384Kdf
4,515,262 UART: [kat] LMS
5,083,458 UART: [kat] --
5,084,353 UART: [update-reset] ++
6,464,506 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,465,678 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,620,945 >>> mbox cmd response: success
6,621,212 UART: [update-reset] Copying MAN_2 To MAN_1
6,629,226 UART: [update-reset Success] --
6,630,387 UART: [state] Locking Datavault
6,631,241 UART: [state] Locking PCR0, PCR1 and PCR31
6,631,845 UART: [state] Locking ICCM
6,632,507 UART: [exit] Launching FMC @ 0x40000130
6,637,837 UART:
6,637,853 UART: Running Caliptra FMC ...
6,638,261 UART:
6,638,315 UART: [state] CFI Enabled
6,727,554 UART: [art] Extend RT PCRs Done
6,727,982 UART: [art] Lock RT PCRs Done
6,729,255 UART: [art] Populate DV Done
6,737,717 UART: [fht] FMC Alias Private Key: 7
6,738,755 UART: [art] Derive CDI
6,739,035 UART: [art] Store in slot 0x4
6,824,765 UART: [art] Derive Key Pair
6,825,125 UART: [art] Store priv key in slot 0x5
6,838,458 UART: [art] Derive Key Pair - Done
6,853,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,869,054 UART: [art] Erasing AUTHORITY.KEYID = 7
6,869,819 UART: [art] PUB.X = 6DA097991166B379E3CE1B58FD08E3483B7BD0B99E07F84382BCFA489D2A907D70B5D88BA5DE4C72272C7E82CDB51CAB
6,876,597 UART: [art] PUB.Y = E927B263EF0804DA356DCA19C25E4E35B1B667846738FDE34953F113E4874F2A39D53BC5764B45553E73C4B6841CEEE3
6,883,543 UART: [art] SIG.R = 66F60F0148EF4701B94CD73D1EE709633F6D7A99330FF322CE94A72D99BECD00F2AC4A6AD46D204CB4BE9DA9803EE853
6,890,290 UART: [art] SIG.S = EA34EF1613608EA482573A033925F463B7C3EBCA464E85943E8C95C385DFBB4915D367EA59515262A5F7B6C8BFBC8B07
6,913,740 UART: Caliptra RT
6,913,991 UART: [state] CFI Enabled
7,278,735 UART: [rt] RT listening for mailbox commands...
7,279,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,308,912 UART: [rt]cmd =0x494e464f, len=4
7,312,636 >>> mbox cmd response data (312 bytes)
7,312,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,313,419 UART:
7,313,435 UART: Running Caliptra ROM ...
7,313,843 UART:
7,313,897 UART: [state] CFI Enabled
7,316,319 UART: [state] LifecycleState = Unprovisioned
7,316,974 UART: [state] DebugLocked = No
7,317,456 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,319,115 UART: [kat] SHA2-256
8,113,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,117,161 UART: [kat] ++
8,117,313 UART: [kat] sha1
8,121,651 UART: [kat] SHA2-256
8,123,589 UART: [kat] SHA2-384
8,126,248 UART: [kat] SHA2-512-ACC
8,128,148 UART: [kat] ECC-384
8,133,333 UART: [kat] HMAC-384Kdf
8,137,949 UART: [kat] LMS
8,706,145 UART: [kat] --
8,707,394 UART: [update-reset] ++
10,088,211 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,089,291 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,244,558 >>> mbox cmd response: success
10,244,783 UART: [update-reset] Copying MAN_2 To MAN_1
10,252,797 UART: [update-reset Success] --
10,253,702 UART: [state] Locking Datavault
10,254,558 UART: [state] Locking PCR0, PCR1 and PCR31
10,255,162 UART: [state] Locking ICCM
10,255,782 UART: [exit] Launching FMC @ 0x40000130
10,261,112 UART:
10,261,128 UART: Running Caliptra FMC ...
10,261,536 UART:
10,261,590 UART: [state] CFI Enabled
10,351,149 UART: [art] Extend RT PCRs Done
10,351,577 UART: [art] Lock RT PCRs Done
10,352,734 UART: [art] Populate DV Done
10,361,120 UART: [fht] FMC Alias Private Key: 7
10,362,140 UART: [art] Derive CDI
10,362,420 UART: [art] Store in slot 0x4
10,448,110 UART: [art] Derive Key Pair
10,448,470 UART: [art] Store priv key in slot 0x5
10,461,867 UART: [art] Derive Key Pair - Done
10,476,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,491,970 UART: [art] Erasing AUTHORITY.KEYID = 7
10,492,735 UART: [art] PUB.X = D0230D4AD5A3AF89A1FC8D2CACABC1694D484D0386BD8CD93A757B9EF417DC829C45A184F6B2CE37E092E9B12539E208
10,499,512 UART: [art] PUB.Y = 91423A9DA0EA352B6025997E1491A4A690C9675022775033476248C2319CDC5A2A9CA5961FB4343D82416CA59B81051C
10,506,447 UART: [art] SIG.R = 8A913ABF2123D50290180B163C6E09556854D0CB1B406BF06C48ADD7A3116534E26075D60400CEA3FA649F32D1EBA289
10,513,183 UART: [art] SIG.S = C3666E55C73DF8F7DBEFB90178A0CFD9A040442AAFFA249D9E45F8AFE004D6DD455C408DB787859C240F02F6E7826D49
10,536,587 UART: Caliptra RT
10,536,838 UART: [state] CFI Enabled
10,898,095 UART: [rt] RT listening for mailbox commands...
10,898,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,928,442 UART: [rt]cmd =0x494e464f, len=4
10,931,990 >>> mbox cmd response data (312 bytes)
10,931,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,932,871 UART:
10,932,887 UART: Running Caliptra ROM ...
10,933,295 UART:
10,933,349 UART: [state] CFI Enabled
10,936,137 UART: [state] LifecycleState = Unprovisioned
10,936,792 UART: [state] DebugLocked = No
10,937,418 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,939,057 UART: [kat] SHA2-256
11,732,988 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,737,103 UART: [kat] ++
11,737,255 UART: [kat] sha1
11,741,619 UART: [kat] SHA2-256
11,743,557 UART: [kat] SHA2-384
11,746,552 UART: [kat] SHA2-512-ACC
11,748,452 UART: [kat] ECC-384
11,754,343 UART: [kat] HMAC-384Kdf
11,758,851 UART: [kat] LMS
12,327,047 UART: [kat] --
12,327,924 UART: [update-reset] ++
13,709,323 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,710,439 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,865,706 >>> mbox cmd response: success
13,865,939 UART: [update-reset] Copying MAN_2 To MAN_1
13,873,953 UART: [update-reset Success] --
13,874,940 UART: [state] Locking Datavault
13,875,954 UART: [state] Locking PCR0, PCR1 and PCR31
13,876,558 UART: [state] Locking ICCM
13,877,184 UART: [exit] Launching FMC @ 0x40000130
13,882,514 UART:
13,882,530 UART: Running Caliptra FMC ...
13,882,938 UART:
13,882,992 UART: [state] CFI Enabled
13,971,843 UART: [art] Extend RT PCRs Done
13,972,271 UART: [art] Lock RT PCRs Done
13,973,762 UART: [art] Populate DV Done
13,981,868 UART: [fht] FMC Alias Private Key: 7
13,982,932 UART: [art] Derive CDI
13,983,212 UART: [art] Store in slot 0x4
14,068,652 UART: [art] Derive Key Pair
14,069,012 UART: [art] Store priv key in slot 0x5
14,082,251 UART: [art] Derive Key Pair - Done
14,096,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,112,043 UART: [art] Erasing AUTHORITY.KEYID = 7
14,112,808 UART: [art] PUB.X = 6DA097991166B379E3CE1B58FD08E3483B7BD0B99E07F84382BCFA489D2A907D70B5D88BA5DE4C72272C7E82CDB51CAB
14,119,586 UART: [art] PUB.Y = E927B263EF0804DA356DCA19C25E4E35B1B667846738FDE34953F113E4874F2A39D53BC5764B45553E73C4B6841CEEE3
14,126,532 UART: [art] SIG.R = 66F60F0148EF4701B94CD73D1EE709633F6D7A99330FF322CE94A72D99BECD00F2AC4A6AD46D204CB4BE9DA9803EE853
14,133,279 UART: [art] SIG.S = EA34EF1613608EA482573A033925F463B7C3EBCA464E85943E8C95C385DFBB4915D367EA59515262A5F7B6C8BFBC8B07
14,157,709 UART: Caliptra RT
14,157,960 UART: [state] CFI Enabled
14,524,774 UART: [rt] RT listening for mailbox commands...
14,525,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,554,997 UART: [rt]cmd =0x494e464f, len=4
14,558,771 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,287 ready_for_fw is high
1,362,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,975 >>> mbox cmd response: success
2,978,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,039,951 UART:
3,039,967 UART: Running Caliptra FMC ...
3,040,375 UART:
3,040,429 UART: [state] CFI Enabled
3,051,026 UART: [fht] FMC Alias Private Key: 7
3,169,521 UART: [art] Extend RT PCRs Done
3,169,949 UART: [art] Lock RT PCRs Done
3,171,583 UART: [art] Populate DV Done
3,179,455 UART: [fht] FMC Alias Private Key: 7
3,180,501 UART: [art] Derive CDI
3,180,781 UART: [art] Store in slot 0x4
3,266,543 UART: [art] Derive Key Pair
3,266,903 UART: [art] Store priv key in slot 0x5
3,280,296 UART: [art] Derive Key Pair - Done
3,294,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,000 UART: [art] PUB.X = 05FC7343E30D4A529979A1937A87D2399FF6B2DE6CD09046112D6974407ECAAD4EFD1129FEA9FF55B89D7329F8133B05
3,317,765 UART: [art] PUB.Y = 09D60B77112A815A267AACF953CFF1426C535F09DB156954D6B1A7993DBF501F1DE016DB873F895D0E76472E596301C8
3,324,700 UART: [art] SIG.R = 6F05805258E7DFF7F556649B0DE9921CD707496374822D516BD563F1D578DBE512B514936F36E44668B4D187B5D55BAB
3,331,457 UART: [art] SIG.S = AE72B97CF809420B004E75DAF1A29C6CF8FE5A337D7DA8C7DB9E37967B4A49AC30D39F7FDD0DC8D2BF65BC9CF9AB19EC
3,354,680 UART: Caliptra RT
3,354,931 UART: [state] CFI Enabled
3,474,062 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,504,496 UART: [rt]cmd =0x494e464f, len=4
3,508,080 >>> mbox cmd response data (312 bytes)
3,508,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,321,954 >>> mbox cmd response: success
6,335,234 UART:
6,335,250 UART: Running Caliptra FMC ...
6,335,658 UART:
6,335,712 UART: [state] CFI Enabled
6,424,265 UART: [art] Extend RT PCRs Done
6,424,693 UART: [art] Lock RT PCRs Done
6,426,020 UART: [art] Populate DV Done
6,434,050 UART: [fht] FMC Alias Private Key: 7
6,435,052 UART: [art] Derive CDI
6,435,332 UART: [art] Store in slot 0x4
6,521,190 UART: [art] Derive Key Pair
6,521,550 UART: [art] Store priv key in slot 0x5
6,534,689 UART: [art] Derive Key Pair - Done
6,549,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,564,304 UART: [art] Erasing AUTHORITY.KEYID = 7
6,565,069 UART: [art] PUB.X = 44164801D7D89DFE9D29695D600A22F364A7261C2A368BF58C34E272AD66FBFE35E844A5B120AF4C0F8890BBC450BC81
6,571,836 UART: [art] PUB.Y = 41FACAA3FE0291E5034DC1632C16FD7A69C367DD6F2429941A2D407E4DD593667C1E659C9892978D4436249937E4DC84
6,578,778 UART: [art] SIG.R = 9F0DCEA28ADD4E0F1B77321B76DC8E3D010D1DA3302EE0AE71F67E13EF718C6BD00CBA0E3939667E82654A80508E85CA
6,585,546 UART: [art] SIG.S = AF2F09DFD15407D0093B7D04159F2875EAA4AA87A9DFB4BE654FA9C98A528C1EE7E8F86A3F23F3792315A061F1155DBC
6,609,706 UART: Caliptra RT
6,609,957 UART: [state] CFI Enabled
6,976,996 UART: [rt] RT listening for mailbox commands...
6,977,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,006,913 UART: [rt]cmd =0x494e464f, len=4
7,010,699 >>> mbox cmd response data (312 bytes)
7,010,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,822,929 >>> mbox cmd response: success
9,836,281 UART:
9,836,297 UART: Running Caliptra FMC ...
9,836,705 UART:
9,836,759 UART: [state] CFI Enabled
9,925,828 UART: [art] Extend RT PCRs Done
9,926,256 UART: [art] Lock RT PCRs Done
9,927,339 UART: [art] Populate DV Done
9,935,797 UART: [fht] FMC Alias Private Key: 7
9,936,871 UART: [art] Derive CDI
9,937,151 UART: [art] Store in slot 0x4
10,022,579 UART: [art] Derive Key Pair
10,022,939 UART: [art] Store priv key in slot 0x5
10,035,942 UART: [art] Derive Key Pair - Done
10,050,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,066,333 UART: [art] Erasing AUTHORITY.KEYID = 7
10,067,098 UART: [art] PUB.X = EC27050286AE4148CC93512D755AA74E0402A47434DECA84A0C433DA9E74E1479934FDC23CD0226ABA25E2FCC849021A
10,073,859 UART: [art] PUB.Y = 34445C670E42E10DA65DAC35B2693ED012180CE80D0715B254B9301C405B74E0DE4E204F6A55B78D7D57344BDF7AB3DB
10,080,800 UART: [art] SIG.R = 41362D8554E42A4B1B0501FD434A024EA6E6CA6D2DB7AE36489EA33ED60C597B802A97313F39EE3C2AE775638990C851
10,087,560 UART: [art] SIG.S = 3433CFF660C2D07AC3C699C7D97F8FE61A1BAAE213B4A2B9359D481CFA0A2CBD7145006E94ED48DFD2DFF28751152A35
10,111,245 UART: Caliptra RT
10,111,496 UART: [state] CFI Enabled
10,483,917 UART: [rt] RT listening for mailbox commands...
10,484,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,514,086 UART: [rt]cmd =0x494e464f, len=4
10,517,924 >>> mbox cmd response data (312 bytes)
10,517,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,331,350 >>> mbox cmd response: success
13,344,734 UART:
13,344,750 UART: Running Caliptra FMC ...
13,345,158 UART:
13,345,212 UART: [state] CFI Enabled
13,434,271 UART: [art] Extend RT PCRs Done
13,434,699 UART: [art] Lock RT PCRs Done
13,435,892 UART: [art] Populate DV Done
13,443,822 UART: [fht] FMC Alias Private Key: 7
13,444,778 UART: [art] Derive CDI
13,445,058 UART: [art] Store in slot 0x4
13,530,886 UART: [art] Derive Key Pair
13,531,246 UART: [art] Store priv key in slot 0x5
13,543,873 UART: [art] Derive Key Pair - Done
13,558,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,574,152 UART: [art] Erasing AUTHORITY.KEYID = 7
13,574,917 UART: [art] PUB.X = 44164801D7D89DFE9D29695D600A22F364A7261C2A368BF58C34E272AD66FBFE35E844A5B120AF4C0F8890BBC450BC81
13,581,684 UART: [art] PUB.Y = 41FACAA3FE0291E5034DC1632C16FD7A69C367DD6F2429941A2D407E4DD593667C1E659C9892978D4436249937E4DC84
13,588,626 UART: [art] SIG.R = 9F0DCEA28ADD4E0F1B77321B76DC8E3D010D1DA3302EE0AE71F67E13EF718C6BD00CBA0E3939667E82654A80508E85CA
13,595,394 UART: [art] SIG.S = AF2F09DFD15407D0093B7D04159F2875EAA4AA87A9DFB4BE654FA9C98A528C1EE7E8F86A3F23F3792315A061F1155DBC
13,619,576 UART: Caliptra RT
13,619,827 UART: [state] CFI Enabled
13,985,686 UART: [rt] RT listening for mailbox commands...
13,986,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,015,951 UART: [rt]cmd =0x494e464f, len=4
14,019,451 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.13s
Truncated 1984 bytes from beginning
1,559,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,331 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,113 UART: [ldev] --
1,585,406 UART: [fwproc] Waiting for Commands...
1,586,075 UART: [fwproc] Received command 0x46574c44
1,586,866 UART: [fwproc] Received Image of size 118548 bytes
2,931,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,609 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,827 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,246 >>> mbox cmd response: success
3,130,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,131,506 UART: [afmc] ++
3,131,674 UART: [afmc] CDI.KEYID = 6
3,132,036 UART: [afmc] SUBJECT.KEYID = 7
3,132,461 UART: [afmc] AUTHORITY.KEYID = 5
3,168,431 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,709 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,489 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
3,191,216 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
3,197,115 UART: [afmc] SIG.R = E21B3E2F88872E28E080554D658AD7E626F9FEED98F63A03BBD7CF380CFE29BD7402877A3E435E89E93AD42D1668D374
3,202,822 UART: [afmc] SIG.S = C260A0FF06FACF46D92E1C7E317797ECC51DB2B0AC539D860ED47B7266E741A3AE4C5F92187DEFE45611AD41FCFCF319
3,210,705 UART: [afmc] --
3,211,687 UART: [cold-reset] --
3,212,689 UART: [state] Locking Datavault
3,213,696 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,300 UART: [state] Locking ICCM
3,214,852 UART: [exit] Launching FMC @ 0x40000130
3,220,182 UART:
3,220,198 UART: Running Caliptra FMC ...
3,220,606 UART:
3,220,749 UART: [state] CFI Enabled
3,231,138 UART: [fht] FMC Alias Private Key: 7
3,349,523 UART: [art] Extend RT PCRs Done
3,349,951 UART: [art] Lock RT PCRs Done
3,351,307 UART: [art] Populate DV Done
3,359,579 UART: [fht] FMC Alias Private Key: 7
3,360,623 UART: [art] Derive CDI
3,360,903 UART: [art] Store in slot 0x4
3,446,545 UART: [art] Derive Key Pair
3,446,905 UART: [art] Store priv key in slot 0x5
3,460,024 UART: [art] Derive Key Pair - Done
3,474,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,973 UART: [art] PUB.X = A6AAC745D9E7D4B459762569355DE64B2A4865782B7B234F9D75DB84B5B0EBB562988BF4099766AB53E557698B7E7FF3
3,497,742 UART: [art] PUB.Y = 40CEF8C66D2AD39E12E15E7DD1C9DE9871ECBAAFE430340F5591B92BEE38089B024B9C560026F681A2F00FFD3F97DC10
3,504,674 UART: [art] SIG.R = 58B39F5B69A70E89D39EC4D1AC83C33CE46A869E871F789850CD737BAEBF1FB2E0DF1D0794DF79AA17A2F1D0AD6AE64E
3,511,460 UART: [art] SIG.S = C0A8C778DABEEB3EDB601A205AC3A6B674DB385FC8F7BB0E6FA7E798DEEC0D1D15AFC5B95D0FD80BE3623732CEEA2CAB
3,535,424 UART: Caliptra RT
3,535,767 UART: [state] CFI Enabled
3,655,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,624 UART: [rt]cmd =0x494e464f, len=4
3,689,538 >>> mbox cmd response data (312 bytes)
3,689,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,455 UART:
3,690,471 UART: Running Caliptra ROM ...
3,690,879 UART:
3,691,020 UART: [state] CFI Enabled
3,693,604 UART: [state] LifecycleState = Unprovisioned
3,694,259 UART: [state] DebugLocked = No
3,694,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,548 UART: [kat] SHA2-256
4,490,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,594 UART: [kat] ++
4,494,746 UART: [kat] sha1
4,498,984 UART: [kat] SHA2-256
4,500,922 UART: [kat] SHA2-384
4,503,701 UART: [kat] SHA2-512-ACC
4,505,601 UART: [kat] ECC-384
4,511,098 UART: [kat] HMAC-384Kdf
4,515,736 UART: [kat] LMS
5,083,932 UART: [kat] --
5,084,473 UART: [update-reset] ++
6,466,020 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,467,216 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,622,483 >>> mbox cmd response: success
6,622,706 UART: [update-reset] Copying MAN_2 To MAN_1
6,630,720 UART: [update-reset Success] --
6,631,673 UART: [state] Locking Datavault
6,632,541 UART: [state] Locking PCR0, PCR1 and PCR31
6,633,145 UART: [state] Locking ICCM
6,633,795 UART: [exit] Launching FMC @ 0x40000130
6,639,125 UART:
6,639,141 UART: Running Caliptra FMC ...
6,639,549 UART:
6,639,692 UART: [state] CFI Enabled
6,728,465 UART: [art] Extend RT PCRs Done
6,728,893 UART: [art] Lock RT PCRs Done
6,730,200 UART: [art] Populate DV Done
6,738,680 UART: [fht] FMC Alias Private Key: 7
6,739,654 UART: [art] Derive CDI
6,739,934 UART: [art] Store in slot 0x4
6,825,834 UART: [art] Derive Key Pair
6,826,194 UART: [art] Store priv key in slot 0x5
6,839,733 UART: [art] Derive Key Pair - Done
6,854,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,870,556 UART: [art] Erasing AUTHORITY.KEYID = 7
6,871,321 UART: [art] PUB.X = C4DBFCC279017292E015155A67F619CF389D2CF82ADCA61E27E32AC0FA6CDC421334A38A6E14AD2E5F7AD0A7F8CA64E5
6,878,108 UART: [art] PUB.Y = 209AA8EF052200B3C2EB6D413445D43CFF891AEE3C3337E57489F509C333BE64C8173DF83E2615362890FE03A87B94ED
6,885,029 UART: [art] SIG.R = BBD4E4A39DC8833AF7C430025ABF7C6A28CA1F9218D9739827006F02F9AC16465B498BD3D2F574BDB5848A4D5485A86D
6,891,779 UART: [art] SIG.S = 853A1BCE484DF84D897A1B59BBB427E9EB95BC77E330B0771596F6E72B649D01E9AF2C1BDC33C6B06ED4A85D469DDBF3
6,915,524 UART: Caliptra RT
6,915,867 UART: [state] CFI Enabled
7,282,634 UART: [rt] RT listening for mailbox commands...
7,283,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,312,813 UART: [rt]cmd =0x494e464f, len=4
7,316,447 >>> mbox cmd response data (312 bytes)
7,316,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,317,300 UART:
7,317,316 UART: Running Caliptra ROM ...
7,317,724 UART:
7,317,865 UART: [state] CFI Enabled
7,320,949 UART: [state] LifecycleState = Unprovisioned
7,321,604 UART: [state] DebugLocked = No
7,322,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,323,833 UART: [kat] SHA2-256
8,117,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,121,879 UART: [kat] ++
8,122,031 UART: [kat] sha1
8,126,181 UART: [kat] SHA2-256
8,128,119 UART: [kat] SHA2-384
8,130,862 UART: [kat] SHA2-512-ACC
8,132,762 UART: [kat] ECC-384
8,138,537 UART: [kat] HMAC-384Kdf
8,143,149 UART: [kat] LMS
8,711,345 UART: [kat] --
8,712,102 UART: [update-reset] ++
10,093,011 UART: [update-reset] Image verified using Vendor ECC Key Index 0
10,094,217 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
10,249,484 >>> mbox cmd response: success
10,249,637 UART: [update-reset] Copying MAN_2 To MAN_1
10,257,651 UART: [update-reset Success] --
10,258,544 UART: [state] Locking Datavault
10,259,152 UART: [state] Locking PCR0, PCR1 and PCR31
10,259,756 UART: [state] Locking ICCM
10,260,214 UART: [exit] Launching FMC @ 0x40000130
10,265,544 UART:
10,265,560 UART: Running Caliptra FMC ...
10,265,968 UART:
10,266,111 UART: [state] CFI Enabled
10,355,320 UART: [art] Extend RT PCRs Done
10,355,748 UART: [art] Lock RT PCRs Done
10,357,003 UART: [art] Populate DV Done
10,365,165 UART: [fht] FMC Alias Private Key: 7
10,366,115 UART: [art] Derive CDI
10,366,395 UART: [art] Store in slot 0x4
10,452,407 UART: [art] Derive Key Pair
10,452,767 UART: [art] Store priv key in slot 0x5
10,466,102 UART: [art] Derive Key Pair - Done
10,480,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,496,402 UART: [art] Erasing AUTHORITY.KEYID = 7
10,497,167 UART: [art] PUB.X = A09C95A03C8CE1CA1245CC80220BE947886D6DE369877AD432979CBDF525139F4236E9E5C9DD9464CD7E4007A6A85941
10,503,933 UART: [art] PUB.Y = CFE229B3A13288C9D1E2CE43FFBA956A354091EE5A8E2BF8EE4270BFB174D30CA4E22E6C738EF48C52B0A2C984614E75
10,510,896 UART: [art] SIG.R = 1F2D053D46FE9EB1A9C6A80E02004FE5DDD9DA862592C9F93570102736F1BB6439CAC32628DA24C5CB3672BDCC073D26
10,517,642 UART: [art] SIG.S = 66CDFD6F562622CF5C7493E55537F4C916BA61029ED391098D0598F6B271B8FA600EB94877638045DA33CEDE059C8FCC
10,541,073 UART: Caliptra RT
10,541,416 UART: [state] CFI Enabled
10,907,777 UART: [rt] RT listening for mailbox commands...
10,908,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,938,084 UART: [rt]cmd =0x494e464f, len=4
10,941,860 >>> mbox cmd response data (312 bytes)
10,941,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,942,291 UART:
10,942,307 UART: Running Caliptra ROM ...
10,942,715 UART:
10,942,856 UART: [state] CFI Enabled
10,945,720 UART: [state] LifecycleState = Unprovisioned
10,946,375 UART: [state] DebugLocked = No
10,947,017 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
10,948,662 UART: [kat] SHA2-256
11,742,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
11,746,708 UART: [kat] ++
11,746,860 UART: [kat] sha1
11,750,944 UART: [kat] SHA2-256
11,752,882 UART: [kat] SHA2-384
11,755,669 UART: [kat] SHA2-512-ACC
11,757,569 UART: [kat] ECC-384
11,763,334 UART: [kat] HMAC-384Kdf
11,767,986 UART: [kat] LMS
12,336,182 UART: [kat] --
12,337,035 UART: [update-reset] ++
13,718,666 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,719,716 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,874,983 >>> mbox cmd response: success
13,875,140 UART: [update-reset] Copying MAN_2 To MAN_1
13,883,154 UART: [update-reset Success] --
13,884,059 UART: [state] Locking Datavault
13,885,019 UART: [state] Locking PCR0, PCR1 and PCR31
13,885,623 UART: [state] Locking ICCM
13,886,141 UART: [exit] Launching FMC @ 0x40000130
13,891,471 UART:
13,891,487 UART: Running Caliptra FMC ...
13,891,895 UART:
13,892,038 UART: [state] CFI Enabled
13,980,831 UART: [art] Extend RT PCRs Done
13,981,259 UART: [art] Lock RT PCRs Done
13,982,486 UART: [art] Populate DV Done
13,990,530 UART: [fht] FMC Alias Private Key: 7
13,991,470 UART: [art] Derive CDI
13,991,750 UART: [art] Store in slot 0x4
14,077,248 UART: [art] Derive Key Pair
14,077,608 UART: [art] Store priv key in slot 0x5
14,090,501 UART: [art] Derive Key Pair - Done
14,105,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
14,120,982 UART: [art] Erasing AUTHORITY.KEYID = 7
14,121,747 UART: [art] PUB.X = C4DBFCC279017292E015155A67F619CF389D2CF82ADCA61E27E32AC0FA6CDC421334A38A6E14AD2E5F7AD0A7F8CA64E5
14,128,534 UART: [art] PUB.Y = 209AA8EF052200B3C2EB6D413445D43CFF891AEE3C3337E57489F509C333BE64C8173DF83E2615362890FE03A87B94ED
14,135,455 UART: [art] SIG.R = BBD4E4A39DC8833AF7C430025ABF7C6A28CA1F9218D9739827006F02F9AC16465B498BD3D2F574BDB5848A4D5485A86D
14,142,205 UART: [art] SIG.S = 853A1BCE484DF84D897A1B59BBB427E9EB95BC77E330B0771596F6E72B649D01E9AF2C1BDC33C6B06ED4A85D469DDBF3
14,165,348 UART: Caliptra RT
14,165,691 UART: [state] CFI Enabled
14,531,298 UART: [rt] RT listening for mailbox commands...
14,531,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,561,323 UART: [rt]cmd =0x494e464f, len=4
14,565,003 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,872 ready_for_fw is high
1,361,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,208 >>> mbox cmd response: success
2,979,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,040,464 UART:
3,040,480 UART: Running Caliptra FMC ...
3,040,888 UART:
3,041,031 UART: [state] CFI Enabled
3,051,772 UART: [fht] FMC Alias Private Key: 7
3,170,683 UART: [art] Extend RT PCRs Done
3,171,111 UART: [art] Lock RT PCRs Done
3,172,447 UART: [art] Populate DV Done
3,180,785 UART: [fht] FMC Alias Private Key: 7
3,181,837 UART: [art] Derive CDI
3,182,117 UART: [art] Store in slot 0x4
3,268,261 UART: [art] Derive Key Pair
3,268,621 UART: [art] Store priv key in slot 0x5
3,282,122 UART: [art] Derive Key Pair - Done
3,296,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,022 UART: [art] PUB.X = F93D22F1EE938544F31AF0C2D32E6200A7C4FD2816604F3D8E33ACCEC417E9F8A5F79BB25E163E607F56910E1AD96D08
3,319,774 UART: [art] PUB.Y = 4227537D5865191A958CA8B5E73D8A38C8FF4D9CC2A27E75FC9EE171C5937CEF51F24CE51F507CED547049DCDAA0CD2C
3,326,740 UART: [art] SIG.R = 42C1E9D674C5CCEB7606DDE280E6120C09C42949F806E61FC20A31006C9E9BA4E93587DD8035D4C020CA263725FD2FE1
3,333,479 UART: [art] SIG.S = 2A57C85E77F70DE8B9B8AC1FA5464C372BE9D850755E93AE1DC05FD4FAD11C7107C9F57ACB7F7BA012C5006C15BB735A
3,357,119 UART: Caliptra RT
3,357,462 UART: [state] CFI Enabled
3,477,098 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,500 UART: [rt]cmd =0x494e464f, len=4
3,511,272 >>> mbox cmd response data (312 bytes)
3,511,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,325,185 >>> mbox cmd response: success
6,339,067 UART:
6,339,083 UART: Running Caliptra FMC ...
6,339,491 UART:
6,339,634 UART: [state] CFI Enabled
6,429,603 UART: [art] Extend RT PCRs Done
6,430,031 UART: [art] Lock RT PCRs Done
6,431,228 UART: [art] Populate DV Done
6,439,738 UART: [fht] FMC Alias Private Key: 7
6,440,866 UART: [art] Derive CDI
6,441,146 UART: [art] Store in slot 0x4
6,526,782 UART: [art] Derive Key Pair
6,527,142 UART: [art] Store priv key in slot 0x5
6,541,159 UART: [art] Derive Key Pair - Done
6,555,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,571,347 UART: [art] Erasing AUTHORITY.KEYID = 7
6,572,112 UART: [art] PUB.X = 84D7D6C7D206D7561DE42F2C8C119CC8AE7329E7C4946C0F299A62D9ECEB1250B407300FF5B0EA8C9151B07313F2EE66
6,578,878 UART: [art] PUB.Y = 8D44B9A898F7BAF520F3809A5F9A53A2AE9290981A091F7F9645E6D37428EAE9BD172D9F5930E5EF9989617B62D058ED
6,585,829 UART: [art] SIG.R = 039CDD4DBE55933C1323986FE3994580A1C4EA27A5FC6EDF263BBD3371DE9C0DA19E553CE1F6F71200798CF12F0BD606
6,592,577 UART: [art] SIG.S = 3BB5EDF9288D563C42EB2225AD777B2D17F3D6E8CF3D4FD5C204EBD5985E7C9C26D709338E2D638E7AE6DA430E297757
6,615,916 UART: Caliptra RT
6,616,259 UART: [state] CFI Enabled
6,977,902 UART: [rt] RT listening for mailbox commands...
6,978,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,008,101 UART: [rt]cmd =0x494e464f, len=4
7,011,879 >>> mbox cmd response data (312 bytes)
7,011,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,825,076 >>> mbox cmd response: success
9,838,280 UART:
9,838,296 UART: Running Caliptra FMC ...
9,838,704 UART:
9,838,847 UART: [state] CFI Enabled
9,927,786 UART: [art] Extend RT PCRs Done
9,928,214 UART: [art] Lock RT PCRs Done
9,929,357 UART: [art] Populate DV Done
9,937,679 UART: [fht] FMC Alias Private Key: 7
9,938,705 UART: [art] Derive CDI
9,938,985 UART: [art] Store in slot 0x4
10,024,923 UART: [art] Derive Key Pair
10,025,283 UART: [art] Store priv key in slot 0x5
10,038,140 UART: [art] Derive Key Pair - Done
10,052,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,068,311 UART: [art] Erasing AUTHORITY.KEYID = 7
10,069,076 UART: [art] PUB.X = 661DDD07EE6A91F712D784232F11F0143EDC2608C06343547EDA3D8A9AC1D14DDA941A1653CD09F83E9279138570CFD5
10,075,841 UART: [art] PUB.Y = 9CA692476BF25FE623D7FA1BECE1D16C862411B7BEC569332B3C326DB8C85959259283CAA976A6B7A04F782BDE9FD531
10,082,801 UART: [art] SIG.R = DCDECF0CD175261564B576EDD8D78B6D039B61EE3AD83608D30AAE60411EBB00009B730A43C2C13F89111ED2179BD927
10,089,522 UART: [art] SIG.S = D2425CC4A193A551E22CBED82DDF5BBED2B687F5A9094F76B585C1537FC77BAB7E6E45DDA1122EFBF157C560047B75AA
10,112,726 UART: Caliptra RT
10,113,069 UART: [state] CFI Enabled
10,477,624 UART: [rt] RT listening for mailbox commands...
10,478,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,507,873 UART: [rt]cmd =0x494e464f, len=4
10,511,761 >>> mbox cmd response data (312 bytes)
10,511,762 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,325,870 >>> mbox cmd response: success
13,339,004 UART:
13,339,020 UART: Running Caliptra FMC ...
13,339,428 UART:
13,339,571 UART: [state] CFI Enabled
13,429,104 UART: [art] Extend RT PCRs Done
13,429,532 UART: [art] Lock RT PCRs Done
13,430,815 UART: [art] Populate DV Done
13,439,215 UART: [fht] FMC Alias Private Key: 7
13,440,211 UART: [art] Derive CDI
13,440,491 UART: [art] Store in slot 0x4
13,525,913 UART: [art] Derive Key Pair
13,526,273 UART: [art] Store priv key in slot 0x5
13,539,048 UART: [art] Derive Key Pair - Done
13,553,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
13,569,406 UART: [art] Erasing AUTHORITY.KEYID = 7
13,570,171 UART: [art] PUB.X = 84D7D6C7D206D7561DE42F2C8C119CC8AE7329E7C4946C0F299A62D9ECEB1250B407300FF5B0EA8C9151B07313F2EE66
13,576,937 UART: [art] PUB.Y = 8D44B9A898F7BAF520F3809A5F9A53A2AE9290981A091F7F9645E6D37428EAE9BD172D9F5930E5EF9989617B62D058ED
13,583,888 UART: [art] SIG.R = 039CDD4DBE55933C1323986FE3994580A1C4EA27A5FC6EDF263BBD3371DE9C0DA19E553CE1F6F71200798CF12F0BD606
13,590,636 UART: [art] SIG.S = 3BB5EDF9288D563C42EB2225AD777B2D17F3D6E8CF3D4FD5C204EBD5985E7C9C26D709338E2D638E7AE6DA430E297757
13,614,499 UART: Caliptra RT
13,614,842 UART: [state] CFI Enabled
13,977,599 UART: [rt] RT listening for mailbox commands...
13,978,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
14,007,834 UART: [rt]cmd =0x494e464f, len=4
14,011,652 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.18s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,215,200 UART: [ldev] Erasing FE.KEYID = 1
1,241,339 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,120 UART: [ldev] --
1,280,481 UART: [fwproc] Wait for Commands...
1,281,126 UART: [fwproc] Recv command 0x46574c44
1,281,859 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,766 >>> mbox cmd response: success
2,824,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,825,808 UART: [afmc] ++
2,825,976 UART: [afmc] CDI.KEYID = 6
2,826,339 UART: [afmc] SUBJECT.KEYID = 7
2,826,765 UART: [afmc] AUTHORITY.KEYID = 5
2,862,277 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,923 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,885,651 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,891,548 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,897,250 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,905,104 UART: [afmc] --
2,906,041 UART: [cold-reset] --
2,906,949 UART: [state] Locking Datavault
2,908,400 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,004 UART: [state] Locking ICCM
2,909,438 UART: [exit] Launching FMC @ 0x40000130
2,914,768 UART:
2,914,784 UART: Running Caliptra FMC ...
2,915,192 UART:
2,915,246 UART: [state] CFI Enabled
2,925,781 UART: [fht] FMC Alias Private Key: 7
3,043,798 UART: [art] Extend RT PCRs Done
3,044,226 UART: [art] Lock RT PCRs Done
3,045,494 UART: [art] Populate DV Done
3,053,892 UART: [fht] FMC Alias Private Key: 7
3,054,960 UART: [art] Derive CDI
3,055,240 UART: [art] Store in slot 0x4
3,141,405 UART: [art] Derive Key Pair
3,141,765 UART: [art] Store priv key in slot 0x5
3,154,955 UART: [art] Derive Key Pair - Done
3,169,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,516 UART: [art] PUB.X = 85A7A13E1C51186F4009E1A1939B0EE228DD3E65B381F33CDDB5D4D09BE34332842C00A39A2F2445D18C8C6F5179297E
3,192,260 UART: [art] PUB.Y = 942DA04CF8DA5E1033AE7903C211D87E5808720EB51BEA478BF6AB8FE56D6A1DF3E4F49B50F8018432BB5E5B88301855
3,199,206 UART: [art] SIG.R = D75C40380DDAE3002B2EB9246B5299AE7675069CACBE7437D9A9D6313F164AB9926C976EB2D77DB60AC94BE1C1491663
3,205,951 UART: [art] SIG.S = AA922F88C0571C0BCFA93114ACB9889BF490DB5DCD57CCAB560516A469BF0742792001603126377A1B553763606BDD3A
3,229,507 UART: Caliptra RT
3,229,758 UART: [state] CFI Enabled
3,349,620 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,828 UART: [rt]cmd =0x494e464f, len=4
3,383,490 >>> mbox cmd response data (312 bytes)
3,383,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,394 UART:
3,384,410 UART: Running Caliptra ROM ...
3,384,818 UART:
3,384,873 UART: [state] CFI Enabled
3,387,221 UART: [state] LifecycleState = Unprovisioned
3,387,876 UART: [state] DebugLocked = No
3,388,574 UART: [state] WD Timer not started. Device not locked for debugging
3,389,768 UART: [kat] SHA2-256
4,193,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,197,422 UART: [kat] ++
4,197,574 UART: [kat] sha1
4,201,690 UART: [kat] SHA2-256
4,203,630 UART: [kat] SHA2-384
4,206,363 UART: [kat] SHA2-512-ACC
4,208,263 UART: [kat] ECC-384
4,217,750 UART: [kat] HMAC-384Kdf
4,222,294 UART: [kat] LMS
4,470,606 UART: [kat] --
4,471,386 UART: [update-reset] ++
5,830,630 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,831,755 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,986,970 >>> mbox cmd response: success
5,987,315 UART: [update-reset] Copying MAN_2 To MAN_1
5,995,329 UART: [update-reset Success] --
5,996,020 UART: [state] Locking Datavault
5,996,840 UART: [state] Locking PCR0, PCR1 and PCR31
5,997,444 UART: [state] Locking ICCM
5,997,896 UART: [exit] Launching FMC @ 0x40000130
6,003,226 UART:
6,003,242 UART: Running Caliptra FMC ...
6,003,650 UART:
6,003,704 UART: [state] CFI Enabled
6,093,079 UART: [art] Extend RT PCRs Done
6,093,507 UART: [art] Lock RT PCRs Done
6,094,952 UART: [art] Populate DV Done
6,103,182 UART: [fht] FMC Alias Private Key: 7
6,104,164 UART: [art] Derive CDI
6,104,444 UART: [art] Store in slot 0x4
6,190,083 UART: [art] Derive Key Pair
6,190,443 UART: [art] Store priv key in slot 0x5
6,203,363 UART: [art] Derive Key Pair - Done
6,218,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,233,583 UART: [art] Erasing AUTHORITY.KEYID = 7
6,234,348 UART: [art] PUB.X = A6B8FB887413E86156F9E88239700C75776FD25AEA13D3AC6EE2A94264BC6D149252A600E16740AA00764EA78BBBDA12
6,241,075 UART: [art] PUB.Y = F24EDED4EE05FE9AF551232649DA3356594C674FEEF5E3641F1B3CD4C3D55CA8B6D227C6BF90E5993F838C356863DC14
6,248,034 UART: [art] SIG.R = F7FDA7EF247E108A4CBAF727255BE0757390145A33F6B643F6FF3EE28F96F96664FDAF6EF027D118A7E5E278DFDD288C
6,254,820 UART: [art] SIG.S = 7B1893BC3A78DA5105AE97F218C8E9713FDDC885CE854E24E2562A0490B2A612D1529453E51A6387AAE83D4BF90355A7
6,278,415 UART: Caliptra RT
6,278,666 UART: [state] CFI Enabled
6,644,092 UART: [rt] RT listening for mailbox commands...
6,644,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,674,567 UART: [rt]cmd =0x494e464f, len=4
6,678,405 >>> mbox cmd response data (312 bytes)
6,678,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,679,103 UART:
6,679,119 UART: Running Caliptra ROM ...
6,679,527 UART:
6,679,582 UART: [state] CFI Enabled
6,682,318 UART: [state] LifecycleState = Unprovisioned
6,682,973 UART: [state] DebugLocked = No
6,683,571 UART: [state] WD Timer not started. Device not locked for debugging
6,684,889 UART: [kat] SHA2-256
7,488,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,492,543 UART: [kat] ++
7,492,695 UART: [kat] sha1
7,496,835 UART: [kat] SHA2-256
7,498,775 UART: [kat] SHA2-384
7,501,518 UART: [kat] SHA2-512-ACC
7,503,418 UART: [kat] ECC-384
7,513,113 UART: [kat] HMAC-384Kdf
7,517,645 UART: [kat] LMS
7,765,957 UART: [kat] --
7,766,791 UART: [update-reset] ++
9,126,833 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,127,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,283,157 >>> mbox cmd response: success
9,283,358 UART: [update-reset] Copying MAN_2 To MAN_1
9,291,372 UART: [update-reset Success] --
9,292,379 UART: [state] Locking Datavault
9,293,215 UART: [state] Locking PCR0, PCR1 and PCR31
9,293,819 UART: [state] Locking ICCM
9,294,487 UART: [exit] Launching FMC @ 0x40000130
9,299,817 UART:
9,299,833 UART: Running Caliptra FMC ...
9,300,241 UART:
9,300,295 UART: [state] CFI Enabled
9,389,594 UART: [art] Extend RT PCRs Done
9,390,022 UART: [art] Lock RT PCRs Done
9,391,363 UART: [art] Populate DV Done
9,399,605 UART: [fht] FMC Alias Private Key: 7
9,400,581 UART: [art] Derive CDI
9,400,861 UART: [art] Store in slot 0x4
9,486,758 UART: [art] Derive Key Pair
9,487,118 UART: [art] Store priv key in slot 0x5
9,500,238 UART: [art] Derive Key Pair - Done
9,514,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,530,388 UART: [art] Erasing AUTHORITY.KEYID = 7
9,531,153 UART: [art] PUB.X = 12D08E9BE5BB614688B1FD61E29221BD2D7CF8329075BA1699274B055A8597605AA51A1047454B7EFDB3358B5EEEA51F
9,537,924 UART: [art] PUB.Y = A6647FA3D5EE8C907CD6B1EC5B614D2D5879EDBF5B6D0AEC6182C29CA7A60A64E5F897213C3B9176B0762577DAFEE6C8
9,544,886 UART: [art] SIG.R = 730D045ACA1C7DAA5A2A6400D56EB9BEBA40553B014E257458E341673247D6DAD9AD9A29E7A64BEBEDD21DFF64A1B83F
9,551,645 UART: [art] SIG.S = FBBE68620776C1E5189BC825FE07118DA3F40C9230EA318597EE559FF30510D48B4B89F8E4228B15A5862E060965611B
9,575,485 UART: Caliptra RT
9,575,736 UART: [state] CFI Enabled
9,940,466 UART: [rt] RT listening for mailbox commands...
9,941,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,970,587 UART: [rt]cmd =0x494e464f, len=4
9,974,335 >>> mbox cmd response data (312 bytes)
9,974,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,975,175 UART:
9,975,191 UART: Running Caliptra ROM ...
9,975,599 UART:
9,975,654 UART: [state] CFI Enabled
9,977,776 UART: [state] LifecycleState = Unprovisioned
9,978,431 UART: [state] DebugLocked = No
9,979,127 UART: [state] WD Timer not started. Device not locked for debugging
9,980,333 UART: [kat] SHA2-256
10,783,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,787,987 UART: [kat] ++
10,788,139 UART: [kat] sha1
10,792,375 UART: [kat] SHA2-256
10,794,315 UART: [kat] SHA2-384
10,797,072 UART: [kat] SHA2-512-ACC
10,798,972 UART: [kat] ECC-384
10,809,115 UART: [kat] HMAC-384Kdf
10,813,803 UART: [kat] LMS
11,062,115 UART: [kat] --
11,062,685 UART: [update-reset] ++
12,421,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,422,450 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,577,665 >>> mbox cmd response: success
12,577,982 UART: [update-reset] Copying MAN_2 To MAN_1
12,585,996 UART: [update-reset Success] --
12,586,981 UART: [state] Locking Datavault
12,587,785 UART: [state] Locking PCR0, PCR1 and PCR31
12,588,389 UART: [state] Locking ICCM
12,589,037 UART: [exit] Launching FMC @ 0x40000130
12,594,367 UART:
12,594,383 UART: Running Caliptra FMC ...
12,594,791 UART:
12,594,845 UART: [state] CFI Enabled
12,684,244 UART: [art] Extend RT PCRs Done
12,684,672 UART: [art] Lock RT PCRs Done
12,685,993 UART: [art] Populate DV Done
12,693,995 UART: [fht] FMC Alias Private Key: 7
12,695,101 UART: [art] Derive CDI
12,695,381 UART: [art] Store in slot 0x4
12,781,218 UART: [art] Derive Key Pair
12,781,578 UART: [art] Store priv key in slot 0x5
12,795,080 UART: [art] Derive Key Pair - Done
12,809,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,824,986 UART: [art] Erasing AUTHORITY.KEYID = 7
12,825,751 UART: [art] PUB.X = A6B8FB887413E86156F9E88239700C75776FD25AEA13D3AC6EE2A94264BC6D149252A600E16740AA00764EA78BBBDA12
12,832,478 UART: [art] PUB.Y = F24EDED4EE05FE9AF551232649DA3356594C674FEEF5E3641F1B3CD4C3D55CA8B6D227C6BF90E5993F838C356863DC14
12,839,437 UART: [art] SIG.R = F7FDA7EF247E108A4CBAF727255BE0757390145A33F6B643F6FF3EE28F96F96664FDAF6EF027D118A7E5E278DFDD288C
12,846,223 UART: [art] SIG.S = 7B1893BC3A78DA5105AE97F218C8E9713FDDC885CE854E24E2562A0490B2A612D1529453E51A6387AAE83D4BF90355A7
12,869,994 UART: Caliptra RT
12,870,245 UART: [state] CFI Enabled
13,233,031 UART: [rt] RT listening for mailbox commands...
13,233,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,263,234 UART: [rt]cmd =0x494e464f, len=4
13,266,990 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,740 ready_for_fw is high
1,058,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,529 >>> mbox cmd response: success
2,679,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,447 UART:
2,741,463 UART: Running Caliptra FMC ...
2,741,871 UART:
2,741,925 UART: [state] CFI Enabled
2,752,312 UART: [fht] FMC Alias Private Key: 7
2,870,649 UART: [art] Extend RT PCRs Done
2,871,077 UART: [art] Lock RT PCRs Done
2,872,757 UART: [art] Populate DV Done
2,881,081 UART: [fht] FMC Alias Private Key: 7
2,882,147 UART: [art] Derive CDI
2,882,427 UART: [art] Store in slot 0x4
2,967,882 UART: [art] Derive Key Pair
2,968,242 UART: [art] Store priv key in slot 0x5
2,981,556 UART: [art] Derive Key Pair - Done
2,996,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,845 UART: [art] PUB.X = 6A2C76DE71E49596DE6F1D0456CAD4A9C849CD29E1C1992A07F7B0BD2491AE25E0AD2F39A001CAF617E5CB514D7C9D7C
3,019,624 UART: [art] PUB.Y = BB361CCA32F8700DC1431A1635E20D59D351B7D9383535146A08A26CD4007EDA70490E78845DB8651D0E6D2F6AA711DF
3,026,539 UART: [art] SIG.R = 0C6D863E0943F39AFD144370B1FFA5CF40227CA9B5F685F4431923A55D44FFEC5D426075D9B4F0E387BE8EC721FEF95E
3,033,315 UART: [art] SIG.S = 1090974A28625DBF7EFA4643CF6510AA452A1033E2C728DA110E36CE8FE2871D3DF42B9273415A11164B36265F02F565
3,056,745 UART: Caliptra RT
3,056,996 UART: [state] CFI Enabled
3,177,158 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,516 UART: [rt]cmd =0x494e464f, len=4
3,211,388 >>> mbox cmd response data (312 bytes)
3,211,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,698,968 >>> mbox cmd response: success
5,712,119 UART:
5,712,135 UART: Running Caliptra FMC ...
5,712,543 UART:
5,712,597 UART: [state] CFI Enabled
5,801,752 UART: [art] Extend RT PCRs Done
5,802,180 UART: [art] Lock RT PCRs Done
5,803,647 UART: [art] Populate DV Done
5,811,945 UART: [fht] FMC Alias Private Key: 7
5,812,963 UART: [art] Derive CDI
5,813,243 UART: [art] Store in slot 0x4
5,898,854 UART: [art] Derive Key Pair
5,899,214 UART: [art] Store priv key in slot 0x5
5,913,158 UART: [art] Derive Key Pair - Done
5,927,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,943,143 UART: [art] Erasing AUTHORITY.KEYID = 7
5,943,908 UART: [art] PUB.X = 7F4B9B012C72A20EF04ABC7BC1B8037D696904A4F76A51EEC0A5699AB45677445079C21990D1EC916ED767B890209DDE
5,950,670 UART: [art] PUB.Y = 7A80D0A7D55DFBE261AD120BD8F85143234B44E2451FFB920D92BA0BA5D11EAA4D337F1A2689B29E6A3AEBA386AC8381
5,957,627 UART: [art] SIG.R = 8D1BD17CFE8989EB59BF02BBE60AB066AE43DDEF7A61FDBC5D83E3104EF8A4D9056FFD8C8C2BE22840B9C8C7196A795F
5,964,414 UART: [art] SIG.S = B7BA2F986FA8655B0857B0035268D4D41AF779B327333FB3AB8D5AFEE4D78CCB916D7CC1206795B059B66D1AE1014819
5,988,735 UART: Caliptra RT
5,988,986 UART: [state] CFI Enabled
6,357,019 UART: [rt] RT listening for mailbox commands...
6,357,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,387,220 UART: [rt]cmd =0x494e464f, len=4
6,390,976 >>> mbox cmd response data (312 bytes)
6,390,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,880,594 >>> mbox cmd response: success
8,894,325 UART:
8,894,341 UART: Running Caliptra FMC ...
8,894,749 UART:
8,894,803 UART: [state] CFI Enabled
8,984,242 UART: [art] Extend RT PCRs Done
8,984,670 UART: [art] Lock RT PCRs Done
8,985,751 UART: [art] Populate DV Done
8,993,973 UART: [fht] FMC Alias Private Key: 7
8,995,089 UART: [art] Derive CDI
8,995,369 UART: [art] Store in slot 0x4
9,081,026 UART: [art] Derive Key Pair
9,081,386 UART: [art] Store priv key in slot 0x5
9,094,752 UART: [art] Derive Key Pair - Done
9,109,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,124,776 UART: [art] Erasing AUTHORITY.KEYID = 7
9,125,541 UART: [art] PUB.X = 895220B884386163347671BEDCC87F7578D2BCEC9D7C41BDACE28EFBF3ED53F310548E5F4109566DEC0662D224EDF0C1
9,132,315 UART: [art] PUB.Y = D689F05E4A5DD4F094101E12168AE4C07D5432AA42BA41D1C4A7BCEFA5671CC7F9853139DEB2C406820B9EC4430A5DBE
9,139,270 UART: [art] SIG.R = A6760C83B669E45026FEEDDE3342BDF61E85A08F8363F00FA7C48F73FD1457576474DF1B2C015572584BDADE3C3066D4
9,146,037 UART: [art] SIG.S = F3E57AD45C9EE8EA76C15A5D5DF2EEAD30D913C9926A3E804595B34A82FC47BE839B483C33755E75F3B080FE2EA398E9
9,170,167 UART: Caliptra RT
9,170,418 UART: [state] CFI Enabled
9,535,637 UART: [rt] RT listening for mailbox commands...
9,536,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,565,814 UART: [rt]cmd =0x494e464f, len=4
9,569,352 >>> mbox cmd response data (312 bytes)
9,569,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,058,006 >>> mbox cmd response: success
12,071,649 UART:
12,071,665 UART: Running Caliptra FMC ...
12,072,073 UART:
12,072,127 UART: [state] CFI Enabled
12,161,248 UART: [art] Extend RT PCRs Done
12,161,676 UART: [art] Lock RT PCRs Done
12,162,909 UART: [art] Populate DV Done
12,171,139 UART: [fht] FMC Alias Private Key: 7
12,172,233 UART: [art] Derive CDI
12,172,513 UART: [art] Store in slot 0x4
12,258,328 UART: [art] Derive Key Pair
12,258,688 UART: [art] Store priv key in slot 0x5
12,271,432 UART: [art] Derive Key Pair - Done
12,286,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,301,713 UART: [art] Erasing AUTHORITY.KEYID = 7
12,302,478 UART: [art] PUB.X = 7F4B9B012C72A20EF04ABC7BC1B8037D696904A4F76A51EEC0A5699AB45677445079C21990D1EC916ED767B890209DDE
12,309,240 UART: [art] PUB.Y = 7A80D0A7D55DFBE261AD120BD8F85143234B44E2451FFB920D92BA0BA5D11EAA4D337F1A2689B29E6A3AEBA386AC8381
12,316,197 UART: [art] SIG.R = 8D1BD17CFE8989EB59BF02BBE60AB066AE43DDEF7A61FDBC5D83E3104EF8A4D9056FFD8C8C2BE22840B9C8C7196A795F
12,322,984 UART: [art] SIG.S = B7BA2F986FA8655B0857B0035268D4D41AF779B327333FB3AB8D5AFEE4D78CCB916D7CC1206795B059B66D1AE1014819
12,346,411 UART: Caliptra RT
12,346,662 UART: [state] CFI Enabled
12,714,127 UART: [rt] RT listening for mailbox commands...
12,714,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,744,136 UART: [rt]cmd =0x494e464f, len=4
12,747,686 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.76s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,241,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,049 UART: [ldev] --
1,281,412 UART: [fwproc] Wait for Commands...
1,282,175 UART: [fwproc] Recv command 0x46574c44
1,282,908 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,601 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,776 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,007 >>> mbox cmd response: success
2,827,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,828,075 UART: [afmc] ++
2,828,243 UART: [afmc] CDI.KEYID = 6
2,828,606 UART: [afmc] SUBJECT.KEYID = 7
2,829,032 UART: [afmc] AUTHORITY.KEYID = 5
2,864,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,261 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,010 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,887,738 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,893,635 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,899,337 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,907,221 UART: [afmc] --
2,908,254 UART: [cold-reset] --
2,909,110 UART: [state] Locking Datavault
2,910,239 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,843 UART: [state] Locking ICCM
2,911,389 UART: [exit] Launching FMC @ 0x40000130
2,916,719 UART:
2,916,735 UART: Running Caliptra FMC ...
2,917,143 UART:
2,917,286 UART: [state] CFI Enabled
2,927,799 UART: [fht] FMC Alias Private Key: 7
3,046,854 UART: [art] Extend RT PCRs Done
3,047,282 UART: [art] Lock RT PCRs Done
3,048,700 UART: [art] Populate DV Done
3,057,244 UART: [fht] FMC Alias Private Key: 7
3,058,268 UART: [art] Derive CDI
3,058,548 UART: [art] Store in slot 0x4
3,144,221 UART: [art] Derive Key Pair
3,144,581 UART: [art] Store priv key in slot 0x5
3,158,565 UART: [art] Derive Key Pair - Done
3,173,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,592 UART: [art] PUB.X = 3327B0552DCF7552932E03698A5BF32281C4F97F2F7A6228B886848BB57D012C78FFDF2B010084146401BA7504C6D138
3,196,317 UART: [art] PUB.Y = 0D606A1F36C13F9E0B172F269067EE31EF69DECAA8647A3E73FA3075729B992147CAC55051E654069EB560B269253C02
3,203,253 UART: [art] SIG.R = 4CCA1CF2B175EE1C5D6BBEC65886E731DB0E4AC4FFF136D1B2A392CFD1A285B09C9A7F267D2C4507CA854BB1DF97D572
3,210,041 UART: [art] SIG.S = 168F7583985D48DE5C4ABF625596ED0C1D4BDC6ED4031B4741A89A5B77CF74D133A86A2679A3D8DD887F0A6D112DC043
3,233,374 UART: Caliptra RT
3,233,717 UART: [state] CFI Enabled
3,353,387 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,083 UART: [rt]cmd =0x494e464f, len=4
3,387,747 >>> mbox cmd response data (312 bytes)
3,387,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,407 UART:
3,388,423 UART: Running Caliptra ROM ...
3,388,831 UART:
3,388,973 UART: [state] CFI Enabled
3,391,729 UART: [state] LifecycleState = Unprovisioned
3,392,384 UART: [state] DebugLocked = No
3,392,988 UART: [state] WD Timer not started. Device not locked for debugging
3,394,188 UART: [kat] SHA2-256
4,197,738 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,201,842 UART: [kat] ++
4,201,994 UART: [kat] sha1
4,206,276 UART: [kat] SHA2-256
4,208,216 UART: [kat] SHA2-384
4,211,137 UART: [kat] SHA2-512-ACC
4,213,037 UART: [kat] ECC-384
4,222,510 UART: [kat] HMAC-384Kdf
4,227,018 UART: [kat] LMS
4,475,330 UART: [kat] --
4,476,356 UART: [update-reset] ++
5,835,764 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,836,927 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,992,142 >>> mbox cmd response: success
5,992,399 UART: [update-reset] Copying MAN_2 To MAN_1
6,000,413 UART: [update-reset Success] --
6,001,258 UART: [state] Locking Datavault
6,002,084 UART: [state] Locking PCR0, PCR1 and PCR31
6,002,688 UART: [state] Locking ICCM
6,003,216 UART: [exit] Launching FMC @ 0x40000130
6,008,546 UART:
6,008,562 UART: Running Caliptra FMC ...
6,008,970 UART:
6,009,113 UART: [state] CFI Enabled
6,098,394 UART: [art] Extend RT PCRs Done
6,098,822 UART: [art] Lock RT PCRs Done
6,100,003 UART: [art] Populate DV Done
6,108,555 UART: [fht] FMC Alias Private Key: 7
6,109,549 UART: [art] Derive CDI
6,109,829 UART: [art] Store in slot 0x4
6,195,656 UART: [art] Derive Key Pair
6,196,016 UART: [art] Store priv key in slot 0x5
6,209,280 UART: [art] Derive Key Pair - Done
6,223,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,239,941 UART: [art] Erasing AUTHORITY.KEYID = 7
6,240,706 UART: [art] PUB.X = 524B7F83B5BDC81A14BD70EA25F5FC213CE073CF77BA8B6688137A4CDFF311EF2DBF7D1D87126EADE887F25FF20C246A
6,247,495 UART: [art] PUB.Y = BFC443B841F52ED1DDDF154A2CB0CB7AA293FC6C5923BCE56C559AAF9FB4F25160740C0EC2CE6638949903DEFF7D3A87
6,254,458 UART: [art] SIG.R = 29728A49DB7482D100B42D3E793011CA2AA1CC851180BD7D8E0CCC68F96371847F940A48D8524FBE5EB35E5A5E024B1F
6,261,203 UART: [art] SIG.S = E8580910B58A900AAD1DA3659ED1F4146ECD10F31AC76FAD37570C2F0E8B601E350832839FE9807E979F751326C943A0
6,285,352 UART: Caliptra RT
6,285,695 UART: [state] CFI Enabled
6,649,697 UART: [rt] RT listening for mailbox commands...
6,650,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,679,958 UART: [rt]cmd =0x494e464f, len=4
6,683,682 >>> mbox cmd response data (312 bytes)
6,683,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,684,242 UART:
6,684,258 UART: Running Caliptra ROM ...
6,684,666 UART:
6,684,808 UART: [state] CFI Enabled
6,687,640 UART: [state] LifecycleState = Unprovisioned
6,688,295 UART: [state] DebugLocked = No
6,688,875 UART: [state] WD Timer not started. Device not locked for debugging
6,690,063 UART: [kat] SHA2-256
7,493,613 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,497,717 UART: [kat] ++
7,497,869 UART: [kat] sha1
7,502,293 UART: [kat] SHA2-256
7,504,233 UART: [kat] SHA2-384
7,506,786 UART: [kat] SHA2-512-ACC
7,508,686 UART: [kat] ECC-384
7,518,395 UART: [kat] HMAC-384Kdf
7,522,867 UART: [kat] LMS
7,771,179 UART: [kat] --
7,772,143 UART: [update-reset] ++
9,131,595 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,132,678 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,287,893 >>> mbox cmd response: success
9,288,132 UART: [update-reset] Copying MAN_2 To MAN_1
9,296,146 UART: [update-reset Success] --
9,297,023 UART: [state] Locking Datavault
9,297,823 UART: [state] Locking PCR0, PCR1 and PCR31
9,298,427 UART: [state] Locking ICCM
9,298,963 UART: [exit] Launching FMC @ 0x40000130
9,304,293 UART:
9,304,309 UART: Running Caliptra FMC ...
9,304,717 UART:
9,304,860 UART: [state] CFI Enabled
9,394,005 UART: [art] Extend RT PCRs Done
9,394,433 UART: [art] Lock RT PCRs Done
9,395,526 UART: [art] Populate DV Done
9,403,934 UART: [fht] FMC Alias Private Key: 7
9,404,892 UART: [art] Derive CDI
9,405,172 UART: [art] Store in slot 0x4
9,490,885 UART: [art] Derive Key Pair
9,491,245 UART: [art] Store priv key in slot 0x5
9,505,235 UART: [art] Derive Key Pair - Done
9,520,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,535,667 UART: [art] Erasing AUTHORITY.KEYID = 7
9,536,432 UART: [art] PUB.X = 5468B144D922E6E727B9FE6C2DD880FF1D6A3505DE3C612F5BE5FE14601BE1F83CA855996B8F9564A2C578E55FA6F3CA
9,543,211 UART: [art] PUB.Y = 661DDE6643167FC2A4B4164D8AD2D37511A9779D9AE37B5578D4147BC42E0BCBC6F82A1D4510B5A734739657A7AD3AC1
9,550,164 UART: [art] SIG.R = 37AC26A8BDCE4DA9D6DEA2130388212B5D1AE25298768C5143A2A1BEDB30638962770D366F62A7D02E1B16B799AC0C05
9,556,928 UART: [art] SIG.S = 0AEFC93F36D7466A1F572E7FC123FF003DFE180200AB5433A97C94A6E5FEFAF442AE3C9ADD67A6D6F1B32F03BCC0E103
9,580,918 UART: Caliptra RT
9,581,261 UART: [state] CFI Enabled
9,947,036 UART: [rt] RT listening for mailbox commands...
9,947,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,977,279 UART: [rt]cmd =0x494e464f, len=4
9,981,051 >>> mbox cmd response data (312 bytes)
9,981,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,981,907 UART:
9,981,923 UART: Running Caliptra ROM ...
9,982,331 UART:
9,982,473 UART: [state] CFI Enabled
9,985,125 UART: [state] LifecycleState = Unprovisioned
9,985,780 UART: [state] DebugLocked = No
9,986,328 UART: [state] WD Timer not started. Device not locked for debugging
9,987,554 UART: [kat] SHA2-256
10,791,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,795,208 UART: [kat] ++
10,795,360 UART: [kat] sha1
10,799,378 UART: [kat] SHA2-256
10,801,318 UART: [kat] SHA2-384
10,804,103 UART: [kat] SHA2-512-ACC
10,806,003 UART: [kat] ECC-384
10,815,918 UART: [kat] HMAC-384Kdf
10,820,530 UART: [kat] LMS
11,068,842 UART: [kat] --
11,069,660 UART: [update-reset] ++
12,428,010 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,429,133 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,584,348 >>> mbox cmd response: success
12,584,601 UART: [update-reset] Copying MAN_2 To MAN_1
12,592,615 UART: [update-reset Success] --
12,593,448 UART: [state] Locking Datavault
12,594,356 UART: [state] Locking PCR0, PCR1 and PCR31
12,594,960 UART: [state] Locking ICCM
12,595,464 UART: [exit] Launching FMC @ 0x40000130
12,600,794 UART:
12,600,810 UART: Running Caliptra FMC ...
12,601,218 UART:
12,601,361 UART: [state] CFI Enabled
12,690,824 UART: [art] Extend RT PCRs Done
12,691,252 UART: [art] Lock RT PCRs Done
12,692,265 UART: [art] Populate DV Done
12,700,263 UART: [fht] FMC Alias Private Key: 7
12,701,349 UART: [art] Derive CDI
12,701,629 UART: [art] Store in slot 0x4
12,787,692 UART: [art] Derive Key Pair
12,788,052 UART: [art] Store priv key in slot 0x5
12,802,278 UART: [art] Derive Key Pair - Done
12,816,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,832,043 UART: [art] Erasing AUTHORITY.KEYID = 7
12,832,808 UART: [art] PUB.X = 524B7F83B5BDC81A14BD70EA25F5FC213CE073CF77BA8B6688137A4CDFF311EF2DBF7D1D87126EADE887F25FF20C246A
12,839,597 UART: [art] PUB.Y = BFC443B841F52ED1DDDF154A2CB0CB7AA293FC6C5923BCE56C559AAF9FB4F25160740C0EC2CE6638949903DEFF7D3A87
12,846,560 UART: [art] SIG.R = 29728A49DB7482D100B42D3E793011CA2AA1CC851180BD7D8E0CCC68F96371847F940A48D8524FBE5EB35E5A5E024B1F
12,853,305 UART: [art] SIG.S = E8580910B58A900AAD1DA3659ED1F4146ECD10F31AC76FAD37570C2F0E8B601E350832839FE9807E979F751326C943A0
12,876,756 UART: Caliptra RT
12,877,099 UART: [state] CFI Enabled
13,244,441 UART: [rt] RT listening for mailbox commands...
13,245,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,274,772 UART: [rt]cmd =0x494e464f, len=4
13,278,474 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,713 ready_for_fw is high
1,059,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,946 >>> mbox cmd response: success
2,679,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,742,314 UART:
2,742,330 UART: Running Caliptra FMC ...
2,742,738 UART:
2,742,881 UART: [state] CFI Enabled
2,753,454 UART: [fht] FMC Alias Private Key: 7
2,872,289 UART: [art] Extend RT PCRs Done
2,872,717 UART: [art] Lock RT PCRs Done
2,874,397 UART: [art] Populate DV Done
2,882,761 UART: [fht] FMC Alias Private Key: 7
2,883,723 UART: [art] Derive CDI
2,884,003 UART: [art] Store in slot 0x4
2,969,884 UART: [art] Derive Key Pair
2,970,244 UART: [art] Store priv key in slot 0x5
2,983,718 UART: [art] Derive Key Pair - Done
2,998,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,735 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,500 UART: [art] PUB.X = 1C69C3830AA9D8461BFCDB0F8F15E643C6E594C85CD29FEF3042CCE286DA9CAB82EA7E67273322765BDF2B562F0BCE7F
3,021,281 UART: [art] PUB.Y = 0F284E08BD88814AC51FE027219456045BDE33C4B2280700D57C6423961C158338594CED17C388E7F945851A6563C71F
3,028,185 UART: [art] SIG.R = 779DF4EED6179A0B8D037D8D7508245EE0700E7DB145AA3EF074B0DE96EEC0DF7CA099EC9D2363125798ADD4FDE5A5FC
3,034,963 UART: [art] SIG.S = 0CAD7331451F26E5ACD9A330CFAD4D11163A233CD993B0A8E3FA222725546BB0FFC160860BF552DCC8A2AA0308329262
3,058,377 UART: Caliptra RT
3,058,720 UART: [state] CFI Enabled
3,179,332 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,762 UART: [rt]cmd =0x494e464f, len=4
3,213,396 >>> mbox cmd response data (312 bytes)
3,213,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,701,671 >>> mbox cmd response: success
5,715,216 UART:
5,715,232 UART: Running Caliptra FMC ...
5,715,640 UART:
5,715,783 UART: [state] CFI Enabled
5,804,734 UART: [art] Extend RT PCRs Done
5,805,162 UART: [art] Lock RT PCRs Done
5,806,335 UART: [art] Populate DV Done
5,814,715 UART: [fht] FMC Alias Private Key: 7
5,815,777 UART: [art] Derive CDI
5,816,057 UART: [art] Store in slot 0x4
5,901,656 UART: [art] Derive Key Pair
5,902,016 UART: [art] Store priv key in slot 0x5
5,915,598 UART: [art] Derive Key Pair - Done
5,930,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,946,540 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,305 UART: [art] PUB.X = 456889D61AC020B64F797A0FD1DEA3E8222EAD95594725668D4CD23A1EE202C7CD9E4BD33E439EA584F0DD5E81595594
5,954,075 UART: [art] PUB.Y = 08D6F6D3B6254F09EEAE1F4FDE358EF40841A2B5F9C97A6AC7C9213DE24703F167016322F4129C214FA8781D0C6208D9
5,961,008 UART: [art] SIG.R = 3BC40D771F68B901C5B71F98DA686C4CF7C9524CC16FBE4770E373A080D12C733BF51354A29464A3BACE462533080F3B
5,967,770 UART: [art] SIG.S = 683D1F30F7710C1C734E066236278ED1BCF41ACB054569FE6D41C960425B59557699DB3AE4885F0A1A99170665A14AF7
5,991,207 UART: Caliptra RT
5,991,550 UART: [state] CFI Enabled
6,355,895 UART: [rt] RT listening for mailbox commands...
6,356,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,385,878 UART: [rt]cmd =0x494e464f, len=4
6,389,626 >>> mbox cmd response data (312 bytes)
6,389,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,879,119 >>> mbox cmd response: success
8,892,266 UART:
8,892,282 UART: Running Caliptra FMC ...
8,892,690 UART:
8,892,833 UART: [state] CFI Enabled
8,982,234 UART: [art] Extend RT PCRs Done
8,982,662 UART: [art] Lock RT PCRs Done
8,983,915 UART: [art] Populate DV Done
8,992,121 UART: [fht] FMC Alias Private Key: 7
8,993,197 UART: [art] Derive CDI
8,993,477 UART: [art] Store in slot 0x4
9,079,306 UART: [art] Derive Key Pair
9,079,666 UART: [art] Store priv key in slot 0x5
9,092,398 UART: [art] Derive Key Pair - Done
9,107,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,123,012 UART: [art] Erasing AUTHORITY.KEYID = 7
9,123,777 UART: [art] PUB.X = 4315B0BB38056D9CE566B562D94FD25F3C5A39E2AF776904C9E9AFC03FCCD56F68BED4637E0B8E6BF4409409AC398A6C
9,130,549 UART: [art] PUB.Y = 3195AE8220ECCE8D2B9B3FE20F9191C5E61540F8784F2E3581CC58D2B2C6E2266745CA4495AF1DC017B428209259A199
9,137,496 UART: [art] SIG.R = 2FADD482CEEB2ECC8887FBD7D06908BDCF746F6725FC08C334DD753617BD52C6486B642C49A1B6C1FBB4B56641C16F55
9,144,276 UART: [art] SIG.S = 5B1D4A05D7B2B8BD4D21F1733BB06CAB9DF35E6B39676E3DECB1D6A229E88F41A9E969831D856D115FB58CD0AC4A4067
9,167,531 UART: Caliptra RT
9,167,874 UART: [state] CFI Enabled
9,534,067 UART: [rt] RT listening for mailbox commands...
9,534,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,564,288 UART: [rt]cmd =0x494e464f, len=4
9,567,968 >>> mbox cmd response data (312 bytes)
9,567,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,054,839 >>> mbox cmd response: success
12,068,154 UART:
12,068,170 UART: Running Caliptra FMC ...
12,068,578 UART:
12,068,721 UART: [state] CFI Enabled
12,158,338 UART: [art] Extend RT PCRs Done
12,158,766 UART: [art] Lock RT PCRs Done
12,159,769 UART: [art] Populate DV Done
12,167,917 UART: [fht] FMC Alias Private Key: 7
12,168,973 UART: [art] Derive CDI
12,169,253 UART: [art] Store in slot 0x4
12,255,152 UART: [art] Derive Key Pair
12,255,512 UART: [art] Store priv key in slot 0x5
12,269,056 UART: [art] Derive Key Pair - Done
12,283,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,299,400 UART: [art] Erasing AUTHORITY.KEYID = 7
12,300,165 UART: [art] PUB.X = 456889D61AC020B64F797A0FD1DEA3E8222EAD95594725668D4CD23A1EE202C7CD9E4BD33E439EA584F0DD5E81595594
12,306,935 UART: [art] PUB.Y = 08D6F6D3B6254F09EEAE1F4FDE358EF40841A2B5F9C97A6AC7C9213DE24703F167016322F4129C214FA8781D0C6208D9
12,313,868 UART: [art] SIG.R = 3BC40D771F68B901C5B71F98DA686C4CF7C9524CC16FBE4770E373A080D12C733BF51354A29464A3BACE462533080F3B
12,320,630 UART: [art] SIG.S = 683D1F30F7710C1C734E066236278ED1BCF41ACB054569FE6D41C960425B59557699DB3AE4885F0A1A99170665A14AF7
12,344,197 UART: Caliptra RT
12,344,540 UART: [state] CFI Enabled
12,712,719 UART: [rt] RT listening for mailbox commands...
12,713,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,742,866 UART: [rt]cmd =0x494e464f, len=4
12,746,556 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.04s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,216,623 UART: [ldev] Erasing FE.KEYID = 1
1,243,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,502 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,415 UART: [ldev] --
1,282,848 UART: [fwproc] Wait for Commands...
1,283,576 UART: [fwproc] Recv command 0x46574c44
1,284,304 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,915 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,248 >>> mbox cmd response: success
2,826,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,827,348 UART: [afmc] ++
2,827,516 UART: [afmc] CDI.KEYID = 6
2,827,878 UART: [afmc] SUBJECT.KEYID = 7
2,828,303 UART: [afmc] AUTHORITY.KEYID = 5
2,863,887 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,284 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,887,011 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,892,910 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,898,612 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,906,487 UART: [afmc] --
2,907,543 UART: [cold-reset] --
2,908,325 UART: [state] Locking Datavault
2,909,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,914 UART: [state] Locking ICCM
2,910,368 UART: [exit] Launching FMC @ 0x40000130
2,915,698 UART:
2,915,714 UART: Running Caliptra FMC ...
2,916,122 UART:
2,916,176 UART: [state] CFI Enabled
2,926,889 UART: [fht] FMC Alias Private Key: 7
3,045,304 UART: [art] Extend RT PCRs Done
3,045,732 UART: [art] Lock RT PCRs Done
3,047,476 UART: [art] Populate DV Done
3,055,432 UART: [fht] FMC Alias Private Key: 7
3,056,534 UART: [art] Derive CDI
3,056,814 UART: [art] Store in slot 0x4
3,142,485 UART: [art] Derive Key Pair
3,142,845 UART: [art] Store priv key in slot 0x5
3,156,151 UART: [art] Derive Key Pair - Done
3,170,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,062 UART: [art] PUB.X = 76BE3469C115C6E0B9CFA26F79E84E34F2CF67BE1E12560A340B367A90EB55E17F378CBBCD0CFCB84AF5D1CEEA0504AC
3,193,841 UART: [art] PUB.Y = 2C6D40645B1548E86E653E78C25232A28CA66624B148A8E7C5F74F736171ADDF045CF9A1E6FCD3C4DFC4938201D18DA2
3,200,791 UART: [art] SIG.R = BD1A9BB33A336C23194E8F30CF69E35031D7D531A20ECF3ACEE2AA82B10E1C836CDBC7856DBD6086BF150EC09C8796A6
3,207,570 UART: [art] SIG.S = 831A9509E0BE66D346B570A6EA40FEF6CA3F72048E034B826C5C51A425B198E6D161EDB7E38FE7B4E7997C04D5FBF1CC
3,231,612 UART: Caliptra RT
3,231,863 UART: [state] CFI Enabled
3,351,899 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,541 UART: [rt]cmd =0x494e464f, len=4
3,386,299 >>> mbox cmd response data (312 bytes)
3,386,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,051 UART:
3,387,067 UART: Running Caliptra ROM ...
3,387,475 UART:
3,387,530 UART: [state] CFI Enabled
3,390,144 UART: [state] LifecycleState = Unprovisioned
3,390,799 UART: [state] DebugLocked = No
3,391,445 UART: [state] WD Timer not started. Device not locked for debugging
3,392,651 UART: [kat] SHA2-256
4,198,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,426 UART: [kat] ++
4,202,578 UART: [kat] sha1
4,207,032 UART: [kat] SHA2-256
4,208,972 UART: [kat] SHA2-384
4,211,673 UART: [kat] SHA2-512-ACC
4,213,573 UART: [kat] ECC-384
4,223,214 UART: [kat] HMAC-384Kdf
4,227,786 UART: [kat] LMS
4,476,114 UART: [kat] --
4,476,804 UART: [update-reset] ++
5,835,033 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,836,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,991,443 >>> mbox cmd response: success
5,991,702 UART: [update-reset] Copying MAN_2 To MAN_1
5,999,716 UART: [update-reset Success] --
6,000,675 UART: [state] Locking Datavault
6,001,485 UART: [state] Locking PCR0, PCR1 and PCR31
6,002,089 UART: [state] Locking ICCM
6,002,695 UART: [exit] Launching FMC @ 0x40000130
6,008,025 UART:
6,008,041 UART: Running Caliptra FMC ...
6,008,449 UART:
6,008,503 UART: [state] CFI Enabled
6,097,112 UART: [art] Extend RT PCRs Done
6,097,540 UART: [art] Lock RT PCRs Done
6,098,535 UART: [art] Populate DV Done
6,106,661 UART: [fht] FMC Alias Private Key: 7
6,107,743 UART: [art] Derive CDI
6,108,023 UART: [art] Store in slot 0x4
6,193,774 UART: [art] Derive Key Pair
6,194,134 UART: [art] Store priv key in slot 0x5
6,207,216 UART: [art] Derive Key Pair - Done
6,221,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,237,042 UART: [art] Erasing AUTHORITY.KEYID = 7
6,237,807 UART: [art] PUB.X = 250D0A147237CFD457998410A5736E0F012F18DD68B218ABB538EAF687B4FDAEEC1630BA6CAE3E6D66E1CE03E1E6ED95
6,244,578 UART: [art] PUB.Y = 1D122BD27DBEBA458FDADE2ABBCB0D39444E9A2C5F7E4C3A3ABB41CD5378D5E92CDF3A683D8FE56F9413A95AAEBAC828
6,251,559 UART: [art] SIG.R = 84BD7D2BBD440D6DD65562553708AFEDF011ADD791EC939813FE5AFF9BFBAAD29371FA517C38BEC627BEAB64A4092EF8
6,258,344 UART: [art] SIG.S = 9930584DF89DDF9E506E754397F3BA0E6EDBC43E93E66C116644F26A8E82AD0421B941F84BC675BE335A13CDF4FD2AE7
6,282,130 UART: Caliptra RT
6,282,381 UART: [state] CFI Enabled
6,644,056 UART: [rt] RT listening for mailbox commands...
6,644,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,674,045 UART: [rt]cmd =0x494e464f, len=4
6,677,783 >>> mbox cmd response data (312 bytes)
6,677,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,678,527 UART:
6,678,543 UART: Running Caliptra ROM ...
6,678,951 UART:
6,679,006 UART: [state] CFI Enabled
6,681,568 UART: [state] LifecycleState = Unprovisioned
6,682,223 UART: [state] DebugLocked = No
6,682,829 UART: [state] WD Timer not started. Device not locked for debugging
6,684,141 UART: [kat] SHA2-256
7,489,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,493,916 UART: [kat] ++
7,494,068 UART: [kat] sha1
7,498,214 UART: [kat] SHA2-256
7,500,154 UART: [kat] SHA2-384
7,502,879 UART: [kat] SHA2-512-ACC
7,504,779 UART: [kat] ECC-384
7,514,370 UART: [kat] HMAC-384Kdf
7,519,036 UART: [kat] LMS
7,767,364 UART: [kat] --
7,768,384 UART: [update-reset] ++
9,126,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,127,160 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,282,375 >>> mbox cmd response: success
9,282,712 UART: [update-reset] Copying MAN_2 To MAN_1
9,290,726 UART: [update-reset Success] --
9,291,577 UART: [state] Locking Datavault
9,292,429 UART: [state] Locking PCR0, PCR1 and PCR31
9,293,033 UART: [state] Locking ICCM
9,293,567 UART: [exit] Launching FMC @ 0x40000130
9,298,897 UART:
9,298,913 UART: Running Caliptra FMC ...
9,299,321 UART:
9,299,375 UART: [state] CFI Enabled
9,388,866 UART: [art] Extend RT PCRs Done
9,389,294 UART: [art] Lock RT PCRs Done
9,390,583 UART: [art] Populate DV Done
9,398,989 UART: [fht] FMC Alias Private Key: 7
9,399,921 UART: [art] Derive CDI
9,400,201 UART: [art] Store in slot 0x4
9,485,888 UART: [art] Derive Key Pair
9,486,248 UART: [art] Store priv key in slot 0x5
9,499,020 UART: [art] Derive Key Pair - Done
9,513,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,528,978 UART: [art] Erasing AUTHORITY.KEYID = 7
9,529,743 UART: [art] PUB.X = 006C47B6E734ABEB9EB42C27D2ECC5A94E4B23DD734DD8EF191EB9CD7333097CA276E5199A66CF15D6C749F176529EFC
9,536,504 UART: [art] PUB.Y = 0C26A6ABB75E1971223AEDCE9968930A945240491F51EA45CBB430755177A213BC5D86A34D15A41EBD91709F95A9B1E4
9,543,450 UART: [art] SIG.R = 06F39150E5EBC19CF5EBEA3EBD47D61D5FFBB56D88F0F5CCF36304B83535CB160F19D80B480195C23CFE6E9FA1752279
9,550,221 UART: [art] SIG.S = 77C31E9D81C9BF4C3CA9745042544DCA2F299FC69091C3E959CF1EBE3246246735C6CCD1CABF1E92C28B909AA23AD3F5
9,574,109 UART: Caliptra RT
9,574,360 UART: [state] CFI Enabled
9,939,555 UART: [rt] RT listening for mailbox commands...
9,940,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,969,852 UART: [rt]cmd =0x494e464f, len=4
9,973,530 >>> mbox cmd response data (312 bytes)
9,973,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,974,232 UART:
9,974,248 UART: Running Caliptra ROM ...
9,974,656 UART:
9,974,711 UART: [state] CFI Enabled
9,977,407 UART: [state] LifecycleState = Unprovisioned
9,978,062 UART: [state] DebugLocked = No
9,978,546 UART: [state] WD Timer not started. Device not locked for debugging
9,979,890 UART: [kat] SHA2-256
10,785,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,789,665 UART: [kat] ++
10,789,817 UART: [kat] sha1
10,794,077 UART: [kat] SHA2-256
10,796,017 UART: [kat] SHA2-384
10,798,656 UART: [kat] SHA2-512-ACC
10,800,556 UART: [kat] ECC-384
10,810,419 UART: [kat] HMAC-384Kdf
10,815,111 UART: [kat] LMS
11,063,439 UART: [kat] --
11,064,301 UART: [update-reset] ++
12,423,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,424,065 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,579,280 >>> mbox cmd response: success
12,579,635 UART: [update-reset] Copying MAN_2 To MAN_1
12,587,649 UART: [update-reset Success] --
12,588,770 UART: [state] Locking Datavault
12,589,568 UART: [state] Locking PCR0, PCR1 and PCR31
12,590,172 UART: [state] Locking ICCM
12,590,802 UART: [exit] Launching FMC @ 0x40000130
12,596,132 UART:
12,596,148 UART: Running Caliptra FMC ...
12,596,556 UART:
12,596,610 UART: [state] CFI Enabled
12,685,909 UART: [art] Extend RT PCRs Done
12,686,337 UART: [art] Lock RT PCRs Done
12,687,432 UART: [art] Populate DV Done
12,695,298 UART: [fht] FMC Alias Private Key: 7
12,696,348 UART: [art] Derive CDI
12,696,628 UART: [art] Store in slot 0x4
12,782,549 UART: [art] Derive Key Pair
12,782,909 UART: [art] Store priv key in slot 0x5
12,796,157 UART: [art] Derive Key Pair - Done
12,811,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,826,941 UART: [art] Erasing AUTHORITY.KEYID = 7
12,827,706 UART: [art] PUB.X = 250D0A147237CFD457998410A5736E0F012F18DD68B218ABB538EAF687B4FDAEEC1630BA6CAE3E6D66E1CE03E1E6ED95
12,834,477 UART: [art] PUB.Y = 1D122BD27DBEBA458FDADE2ABBCB0D39444E9A2C5F7E4C3A3ABB41CD5378D5E92CDF3A683D8FE56F9413A95AAEBAC828
12,841,458 UART: [art] SIG.R = 84BD7D2BBD440D6DD65562553708AFEDF011ADD791EC939813FE5AFF9BFBAAD29371FA517C38BEC627BEAB64A4092EF8
12,848,243 UART: [art] SIG.S = 9930584DF89DDF9E506E754397F3BA0E6EDBC43E93E66C116644F26A8E82AD0421B941F84BC675BE335A13CDF4FD2AE7
12,872,053 UART: Caliptra RT
12,872,304 UART: [state] CFI Enabled
13,229,257 UART: [rt] RT listening for mailbox commands...
13,229,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,259,392 UART: [rt]cmd =0x494e464f, len=4
13,263,014 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,675 ready_for_fw is high
1,060,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,155 >>> mbox cmd response: success
2,679,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,297 UART:
2,741,313 UART: Running Caliptra FMC ...
2,741,721 UART:
2,741,775 UART: [state] CFI Enabled
2,752,398 UART: [fht] FMC Alias Private Key: 7
2,871,415 UART: [art] Extend RT PCRs Done
2,871,843 UART: [art] Lock RT PCRs Done
2,873,607 UART: [art] Populate DV Done
2,881,961 UART: [fht] FMC Alias Private Key: 7
2,882,989 UART: [art] Derive CDI
2,883,269 UART: [art] Store in slot 0x4
2,968,992 UART: [art] Derive Key Pair
2,969,352 UART: [art] Store priv key in slot 0x5
2,982,902 UART: [art] Derive Key Pair - Done
2,997,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,094 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,859 UART: [art] PUB.X = 769D4A06D59B54E29E8A9ECBBCBBEAAC179750A3E98EFA25699F79CBD1528A6E3AAD3FE271CA5D3416A7708D735FF261
3,020,646 UART: [art] PUB.Y = 3E75E93320FE50C3C963CCC9377A40ECD5287EA0ADD66401526623DF800041C3C18324C2C7046CE3C322ABC986F5145F
3,027,570 UART: [art] SIG.R = DC5020852F63FD43E4E0DA15C3453178D1A12F5AC90551B4457E4393D534936E67B992B60B91871DB6CB936078D0CD46
3,034,330 UART: [art] SIG.S = CD6AA4B5AE2A1444E6D21869BDD6EAFF9D2EB77305D6342330ACEC5AEC44CD3B8345FF5A45B78A713AA6A065A6DBA504
3,058,256 UART: Caliptra RT
3,058,507 UART: [state] CFI Enabled
3,176,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,955 UART: [rt]cmd =0x494e464f, len=4
3,210,523 >>> mbox cmd response data (312 bytes)
3,210,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,700,652 >>> mbox cmd response: success
5,713,827 UART:
5,713,843 UART: Running Caliptra FMC ...
5,714,251 UART:
5,714,305 UART: [state] CFI Enabled
5,803,132 UART: [art] Extend RT PCRs Done
5,803,560 UART: [art] Lock RT PCRs Done
5,804,805 UART: [art] Populate DV Done
5,813,009 UART: [fht] FMC Alias Private Key: 7
5,814,135 UART: [art] Derive CDI
5,814,415 UART: [art] Store in slot 0x4
5,900,258 UART: [art] Derive Key Pair
5,900,618 UART: [art] Store priv key in slot 0x5
5,913,810 UART: [art] Derive Key Pair - Done
5,928,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,943,961 UART: [art] Erasing AUTHORITY.KEYID = 7
5,944,726 UART: [art] PUB.X = 7DC1A4CAE12CD079D7D472A42E6CA86CDE51A5A7FE53176C0AE876289E0BB31C45582DDEFAC0ACF497B849C9B6210038
5,951,486 UART: [art] PUB.Y = AB448A07152D28B12E9945CB97A54DC449F2DC4EBE6D3D4F2CD80753D959572314C570452837576CE70BC235E019154D
5,958,425 UART: [art] SIG.R = 6884DD78E2AE0C8758BACEB29BB7C18B8A1E64A5A954907457942F850896D3EBB34AAEDEB967DCD5847454DB44E95A25
5,965,201 UART: [art] SIG.S = BA110AA8D8FEB24821E9317B4F383638F296E4ABCB4ABD25CD75FF4333932891F69FA8596B3586EE1542FCC3BBCC3AFB
5,989,706 UART: Caliptra RT
5,989,957 UART: [state] CFI Enabled
6,351,359 UART: [rt] RT listening for mailbox commands...
6,352,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,381,696 UART: [rt]cmd =0x494e464f, len=4
6,385,488 >>> mbox cmd response data (312 bytes)
6,385,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,875,185 >>> mbox cmd response: success
8,888,670 UART:
8,888,686 UART: Running Caliptra FMC ...
8,889,094 UART:
8,889,148 UART: [state] CFI Enabled
8,978,291 UART: [art] Extend RT PCRs Done
8,978,719 UART: [art] Lock RT PCRs Done
8,979,994 UART: [art] Populate DV Done
8,988,072 UART: [fht] FMC Alias Private Key: 7
8,989,244 UART: [art] Derive CDI
8,989,524 UART: [art] Store in slot 0x4
9,075,401 UART: [art] Derive Key Pair
9,075,761 UART: [art] Store priv key in slot 0x5
9,089,225 UART: [art] Derive Key Pair - Done
9,104,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,119,651 UART: [art] Erasing AUTHORITY.KEYID = 7
9,120,416 UART: [art] PUB.X = D5E7B06682CA0C10B0730DB77D0DCC99995A1B5FB03C2874B2471D74498DE987AFA56E736D59C20B192A3793F761986A
9,127,176 UART: [art] PUB.Y = 1D308A7972322ACC70CE7D3A879DDD924A9302C1A6D6900464BCEBB73CBC72578F6708EA0E36E5C7CB22C262C60EC385
9,134,121 UART: [art] SIG.R = CC12DF42F0ED626D7C89F83A5E25FA88FE4A3679613EBD63A8318F49873D8C1AC44E24B0C7AC081247248CE577D41C96
9,140,896 UART: [art] SIG.S = 35A58BEB5963F57E19F9F9CEAF5720AC147959E9E7B7FA19273DBD15888EF8ABB2784DBB0C086E16145FBB37726D4C76
9,164,888 UART: Caliptra RT
9,165,139 UART: [state] CFI Enabled
9,528,153 UART: [rt] RT listening for mailbox commands...
9,528,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,558,512 UART: [rt]cmd =0x494e464f, len=4
9,562,292 >>> mbox cmd response data (312 bytes)
9,562,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,051,119 >>> mbox cmd response: success
12,064,912 UART:
12,064,928 UART: Running Caliptra FMC ...
12,065,336 UART:
12,065,390 UART: [state] CFI Enabled
12,154,537 UART: [art] Extend RT PCRs Done
12,154,965 UART: [art] Lock RT PCRs Done
12,156,400 UART: [art] Populate DV Done
12,164,588 UART: [fht] FMC Alias Private Key: 7
12,165,550 UART: [art] Derive CDI
12,165,830 UART: [art] Store in slot 0x4
12,251,239 UART: [art] Derive Key Pair
12,251,599 UART: [art] Store priv key in slot 0x5
12,264,795 UART: [art] Derive Key Pair - Done
12,279,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,294,952 UART: [art] Erasing AUTHORITY.KEYID = 7
12,295,717 UART: [art] PUB.X = 7DC1A4CAE12CD079D7D472A42E6CA86CDE51A5A7FE53176C0AE876289E0BB31C45582DDEFAC0ACF497B849C9B6210038
12,302,477 UART: [art] PUB.Y = AB448A07152D28B12E9945CB97A54DC449F2DC4EBE6D3D4F2CD80753D959572314C570452837576CE70BC235E019154D
12,309,416 UART: [art] SIG.R = 6884DD78E2AE0C8758BACEB29BB7C18B8A1E64A5A954907457942F850896D3EBB34AAEDEB967DCD5847454DB44E95A25
12,316,192 UART: [art] SIG.S = BA110AA8D8FEB24821E9317B4F383638F296E4ABCB4ABD25CD75FF4333932891F69FA8596B3586EE1542FCC3BBCC3AFB
12,340,535 UART: Caliptra RT
12,340,786 UART: [state] CFI Enabled
12,711,140 UART: [rt] RT listening for mailbox commands...
12,711,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,741,489 UART: [rt]cmd =0x494e464f, len=4
12,745,001 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.96s
Truncated 1818 bytes from beginning
] FE.KEYID = 1
1,217,408 UART: [ldev] Erasing FE.KEYID = 1
1,243,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,792 UART: [ldev] --
1,283,297 UART: [fwproc] Wait for Commands...
1,284,009 UART: [fwproc] Recv command 0x46574c44
1,284,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,960 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,130 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,401 >>> mbox cmd response: success
2,828,401 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,829,509 UART: [afmc] ++
2,829,677 UART: [afmc] CDI.KEYID = 6
2,830,039 UART: [afmc] SUBJECT.KEYID = 7
2,830,464 UART: [afmc] AUTHORITY.KEYID = 5
2,866,452 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,215 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,963 UART: [afmc] PUB.X = B51EDFEFAB897EAE804C9DA842FFBE9458C9FB4CACBF0D942F542BD3BBD9AD96997050E3DAFB7490EE5A44595A18BBB3
2,889,690 UART: [afmc] PUB.Y = C6C0C23D88B99B7B7C755929B256371E73ECE324626F69E2EF08ACAECDB271BC9BCC76E56E491C66C783638EE1B6ECCC
2,895,589 UART: [afmc] SIG.R = 931966C771B906DB87D23A7D0331CF49B9BADF738F47459330DF282245BFA2F68D51459318A10FEA3B4036101216D2FD
2,901,291 UART: [afmc] SIG.S = AA4A1CA471B4D76C0B5C484442DBD4F8B43732FCF852331344A8A23FCDF31CEA55E48690B064274B176C20B9D2B7D7CE
2,909,134 UART: [afmc] --
2,910,078 UART: [cold-reset] --
2,911,042 UART: [state] Locking Datavault
2,912,405 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,009 UART: [state] Locking ICCM
2,913,531 UART: [exit] Launching FMC @ 0x40000130
2,918,861 UART:
2,918,877 UART: Running Caliptra FMC ...
2,919,285 UART:
2,919,428 UART: [state] CFI Enabled
2,930,141 UART: [fht] FMC Alias Private Key: 7
3,048,640 UART: [art] Extend RT PCRs Done
3,049,068 UART: [art] Lock RT PCRs Done
3,050,240 UART: [art] Populate DV Done
3,058,386 UART: [fht] FMC Alias Private Key: 7
3,059,388 UART: [art] Derive CDI
3,059,668 UART: [art] Store in slot 0x4
3,145,659 UART: [art] Derive Key Pair
3,146,019 UART: [art] Store priv key in slot 0x5
3,158,801 UART: [art] Derive Key Pair - Done
3,173,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,093 UART: [art] PUB.X = 436101B7AEB9C16609BC64CC1EF1DEC20F8F5A63F567C61FED8277EC69E20CFCC3B961922443E255434EAA939D7826FA
3,196,863 UART: [art] PUB.Y = 5C34E88085672B29016372AF7A956217EB52B4773EE0C47ED49B30F5BA6E93FAA9FBF6414277CADC4C3868D46BF17B66
3,203,816 UART: [art] SIG.R = A9D92F35CBC6A330A83D804D964FB213352AEC266A42D6D52B547206767CCE28BF9A4FE4664973FFC2B0E68FA8A2F0BE
3,210,597 UART: [art] SIG.S = 8A5140DEB59659165B906074264951C98664B9DACC20FCC61B1D951FE1B2035C84F30F5A3EC187EC3541D72D1B7CC318
3,234,779 UART: Caliptra RT
3,235,122 UART: [state] CFI Enabled
3,355,408 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,718 UART: [rt]cmd =0x494e464f, len=4
3,389,436 >>> mbox cmd response data (312 bytes)
3,389,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,088 UART:
3,390,104 UART: Running Caliptra ROM ...
3,390,512 UART:
3,390,654 UART: [state] CFI Enabled
3,393,730 UART: [state] LifecycleState = Unprovisioned
3,394,385 UART: [state] DebugLocked = No
3,394,933 UART: [state] WD Timer not started. Device not locked for debugging
3,396,123 UART: [kat] SHA2-256
4,201,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,205,898 UART: [kat] ++
4,206,050 UART: [kat] sha1
4,210,438 UART: [kat] SHA2-256
4,212,378 UART: [kat] SHA2-384
4,215,273 UART: [kat] SHA2-512-ACC
4,217,173 UART: [kat] ECC-384
4,227,092 UART: [kat] HMAC-384Kdf
4,231,910 UART: [kat] LMS
4,480,238 UART: [kat] --
4,480,748 UART: [update-reset] ++
5,840,143 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,841,112 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,996,327 >>> mbox cmd response: success
5,996,570 UART: [update-reset] Copying MAN_2 To MAN_1
6,004,584 UART: [update-reset Success] --
6,005,581 UART: [state] Locking Datavault
6,006,613 UART: [state] Locking PCR0, PCR1 and PCR31
6,007,217 UART: [state] Locking ICCM
6,007,857 UART: [exit] Launching FMC @ 0x40000130
6,013,187 UART:
6,013,203 UART: Running Caliptra FMC ...
6,013,611 UART:
6,013,754 UART: [state] CFI Enabled
6,103,335 UART: [art] Extend RT PCRs Done
6,103,763 UART: [art] Lock RT PCRs Done
6,104,926 UART: [art] Populate DV Done
6,113,062 UART: [fht] FMC Alias Private Key: 7
6,114,208 UART: [art] Derive CDI
6,114,488 UART: [art] Store in slot 0x4
6,200,367 UART: [art] Derive Key Pair
6,200,727 UART: [art] Store priv key in slot 0x5
6,214,285 UART: [art] Derive Key Pair - Done
6,228,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,244,434 UART: [art] Erasing AUTHORITY.KEYID = 7
6,245,199 UART: [art] PUB.X = 98BB7A8F81C1F3D3BF7CFA11375C06671D9E2810420E1890C572A2EDB5A6DEA86A46C1622C541495F515DB3387594720
6,251,963 UART: [art] PUB.Y = 32B88F954B15203C7D31537842DCA1A39378CBFAEF7524FE6F284C0F49BF48D5F36D93B32940F270F12079B4841E0600
6,258,883 UART: [art] SIG.R = 65BE77BCC1DD9BF3F05266E7968D5CAFE62B93D0AA7474A9D6D261A8E34ACCA180CC6A7CFD07ED9BE4EB12FD3419C975
6,265,676 UART: [art] SIG.S = C8DB7AD8F53B835CFDD826AF7D6B28BDABACA1D9A6242F2D9311AFA14FAA01A5327CE69C557851EC881E0FB3FBD717B8
6,289,734 UART: Caliptra RT
6,290,077 UART: [state] CFI Enabled
6,656,033 UART: [rt] RT listening for mailbox commands...
6,656,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,686,444 UART: [rt]cmd =0x494e464f, len=4
6,690,040 >>> mbox cmd response data (312 bytes)
6,690,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,691,044 UART:
6,691,060 UART: Running Caliptra ROM ...
6,691,468 UART:
6,691,610 UART: [state] CFI Enabled
6,694,092 UART: [state] LifecycleState = Unprovisioned
6,694,747 UART: [state] DebugLocked = No
6,695,455 UART: [state] WD Timer not started. Device not locked for debugging
6,696,645 UART: [kat] SHA2-256
7,502,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,506,420 UART: [kat] ++
7,506,572 UART: [kat] sha1
7,510,988 UART: [kat] SHA2-256
7,512,928 UART: [kat] SHA2-384
7,515,651 UART: [kat] SHA2-512-ACC
7,517,551 UART: [kat] ECC-384
7,527,224 UART: [kat] HMAC-384Kdf
7,531,752 UART: [kat] LMS
7,780,080 UART: [kat] --
7,780,752 UART: [update-reset] ++
9,140,633 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
9,141,674 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
9,296,889 >>> mbox cmd response: success
9,297,078 UART: [update-reset] Copying MAN_2 To MAN_1
9,305,092 UART: [update-reset Success] --
9,305,799 UART: [state] Locking Datavault
9,306,421 UART: [state] Locking PCR0, PCR1 and PCR31
9,307,025 UART: [state] Locking ICCM
9,307,677 UART: [exit] Launching FMC @ 0x40000130
9,313,007 UART:
9,313,023 UART: Running Caliptra FMC ...
9,313,431 UART:
9,313,574 UART: [state] CFI Enabled
9,403,229 UART: [art] Extend RT PCRs Done
9,403,657 UART: [art] Lock RT PCRs Done
9,404,904 UART: [art] Populate DV Done
9,412,864 UART: [fht] FMC Alias Private Key: 7
9,413,812 UART: [art] Derive CDI
9,414,092 UART: [art] Store in slot 0x4
9,500,035 UART: [art] Derive Key Pair
9,500,395 UART: [art] Store priv key in slot 0x5
9,514,155 UART: [art] Derive Key Pair - Done
9,529,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,544,813 UART: [art] Erasing AUTHORITY.KEYID = 7
9,545,578 UART: [art] PUB.X = DA098228B700A6DE71ACA70CA236D16A9ABE21D1E08CF34ECD5FDBE6BBFA10A5333FA9E7C2928F4616D9F0E72BDE6D75
9,552,346 UART: [art] PUB.Y = 36A82CC35F4CC1BBA59688428BA1DF00BE1E4D28EDAD5EB646FD2EFA06BCD125BD0F99224F3A1C426A0E0401923385F3
9,559,277 UART: [art] SIG.R = 8D7FD58EF3863F06FF53925414AB5354E35267C745ECF1592EC5F630D21906498633FDA6B989F53680491E262317C150
9,566,031 UART: [art] SIG.S = D9D2671D1ED4CE946CAB026CC83C774902751C5E0D19594AFC9073095C3F0B8934CCA683F9C4B3352A5F7091213DE8FC
9,589,880 UART: Caliptra RT
9,590,223 UART: [state] CFI Enabled
9,956,506 UART: [rt] RT listening for mailbox commands...
9,957,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,986,697 UART: [rt]cmd =0x494e464f, len=4
9,990,323 >>> mbox cmd response data (312 bytes)
9,990,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,991,109 UART:
9,991,125 UART: Running Caliptra ROM ...
9,991,533 UART:
9,991,675 UART: [state] CFI Enabled
9,994,827 UART: [state] LifecycleState = Unprovisioned
9,995,482 UART: [state] DebugLocked = No
9,996,034 UART: [state] WD Timer not started. Device not locked for debugging
9,997,334 UART: [kat] SHA2-256
10,802,984 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,807,109 UART: [kat] ++
10,807,261 UART: [kat] sha1
10,811,559 UART: [kat] SHA2-256
10,813,499 UART: [kat] SHA2-384
10,816,336 UART: [kat] SHA2-512-ACC
10,818,236 UART: [kat] ECC-384
10,828,207 UART: [kat] HMAC-384Kdf
10,832,633 UART: [kat] LMS
11,080,961 UART: [kat] --
11,081,731 UART: [update-reset] ++
12,439,596 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
12,440,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
12,595,822 >>> mbox cmd response: success
12,596,153 UART: [update-reset] Copying MAN_2 To MAN_1
12,604,167 UART: [update-reset Success] --
12,605,332 UART: [state] Locking Datavault
12,606,240 UART: [state] Locking PCR0, PCR1 and PCR31
12,606,844 UART: [state] Locking ICCM
12,607,294 UART: [exit] Launching FMC @ 0x40000130
12,612,624 UART:
12,612,640 UART: Running Caliptra FMC ...
12,613,048 UART:
12,613,191 UART: [state] CFI Enabled
12,702,754 UART: [art] Extend RT PCRs Done
12,703,182 UART: [art] Lock RT PCRs Done
12,704,365 UART: [art] Populate DV Done
12,712,599 UART: [fht] FMC Alias Private Key: 7
12,713,647 UART: [art] Derive CDI
12,713,927 UART: [art] Store in slot 0x4
12,799,674 UART: [art] Derive Key Pair
12,800,034 UART: [art] Store priv key in slot 0x5
12,813,834 UART: [art] Derive Key Pair - Done
12,828,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,844,335 UART: [art] Erasing AUTHORITY.KEYID = 7
12,845,100 UART: [art] PUB.X = 98BB7A8F81C1F3D3BF7CFA11375C06671D9E2810420E1890C572A2EDB5A6DEA86A46C1622C541495F515DB3387594720
12,851,864 UART: [art] PUB.Y = 32B88F954B15203C7D31537842DCA1A39378CBFAEF7524FE6F284C0F49BF48D5F36D93B32940F270F12079B4841E0600
12,858,784 UART: [art] SIG.R = 65BE77BCC1DD9BF3F05266E7968D5CAFE62B93D0AA7474A9D6D261A8E34ACCA180CC6A7CFD07ED9BE4EB12FD3419C975
12,865,577 UART: [art] SIG.S = C8DB7AD8F53B835CFDD826AF7D6B28BDABACA1D9A6242F2D9311AFA14FAA01A5327CE69C557851EC881E0FB3FBD717B8
12,889,379 UART: Caliptra RT
12,889,722 UART: [state] CFI Enabled
13,255,298 UART: [rt] RT listening for mailbox commands...
13,255,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,285,473 UART: [rt]cmd =0x494e464f, len=4
13,289,185 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,486 ready_for_fw is high
1,060,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,398 >>> mbox cmd response: success
2,678,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,741,686 UART:
2,741,702 UART: Running Caliptra FMC ...
2,742,110 UART:
2,742,253 UART: [state] CFI Enabled
2,752,770 UART: [fht] FMC Alias Private Key: 7
2,871,363 UART: [art] Extend RT PCRs Done
2,871,791 UART: [art] Lock RT PCRs Done
2,873,179 UART: [art] Populate DV Done
2,881,315 UART: [fht] FMC Alias Private Key: 7
2,882,387 UART: [art] Derive CDI
2,882,667 UART: [art] Store in slot 0x4
2,969,072 UART: [art] Derive Key Pair
2,969,432 UART: [art] Store priv key in slot 0x5
2,983,022 UART: [art] Derive Key Pair - Done
2,997,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,279 UART: [art] PUB.X = 2CE63637066B4B0692FC18FF001CB3BCCC22D1FD50A680E370673907AC25C58FF6D00B9A0C9BC42167A61903BF2C2D19
3,021,017 UART: [art] PUB.Y = DE100FECBAFEDD577882307E41E1316915EB5DC15C68847D14E5D084DEF2E71DCE13B5AD0C24A71A08673672AB707EB1
3,027,972 UART: [art] SIG.R = D5508952FA1C29ED3BD2C46DC075F144A52BF9B3668B8C2A4632A72445B0021594EB71DF2DC06784E45BC3095304A48B
3,034,735 UART: [art] SIG.S = 69DA6F641AC3EBDA18DA8A59CBE6D00C11A0FCEF4150D7A7322B73FE3476D97FC5FB7D4920AB905B29A2FFAC296CB648
3,059,226 UART: Caliptra RT
3,059,569 UART: [state] CFI Enabled
3,178,418 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,964 UART: [rt]cmd =0x494e464f, len=4
3,212,752 >>> mbox cmd response data (312 bytes)
3,212,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,702,906 >>> mbox cmd response: success
5,716,295 UART:
5,716,311 UART: Running Caliptra FMC ...
5,716,719 UART:
5,716,862 UART: [state] CFI Enabled
5,806,221 UART: [art] Extend RT PCRs Done
5,806,649 UART: [art] Lock RT PCRs Done
5,807,828 UART: [art] Populate DV Done
5,816,050 UART: [fht] FMC Alias Private Key: 7
5,817,184 UART: [art] Derive CDI
5,817,464 UART: [art] Store in slot 0x4
5,903,657 UART: [art] Derive Key Pair
5,904,017 UART: [art] Store priv key in slot 0x5
5,917,291 UART: [art] Derive Key Pair - Done
5,931,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,947,133 UART: [art] Erasing AUTHORITY.KEYID = 7
5,947,898 UART: [art] PUB.X = 474CFF0B51F58935DC7EA1427CBCAC191935B36334F05B4AF47DF2CFA32B0BF2863FD239969CDFB293A2D205AFF1A874
5,954,675 UART: [art] PUB.Y = 9D25839567EDA0B09EDCA103DA99334740135CD52A18EE89EBC6E33E242D28455BBA98272A62BF7BA04816D74D2CAE55
5,961,630 UART: [art] SIG.R = 7BB54E65AE5AC5B6384A63FE190D32F2FB444A8752CE93484C3D2C80EC96130060F07AF899457A37B56AFBC8AF0310B2
5,968,380 UART: [art] SIG.S = 329AA3737010D6146F2FE39BE3431F79F04B86EE84633D4EC5BF9980BF6526887A6F2C22B896FF1D91E0DC35DD77E406
5,992,467 UART: Caliptra RT
5,992,810 UART: [state] CFI Enabled
6,355,399 UART: [rt] RT listening for mailbox commands...
6,356,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,385,526 UART: [rt]cmd =0x494e464f, len=4
6,389,246 >>> mbox cmd response data (312 bytes)
6,389,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,879,112 >>> mbox cmd response: success
8,892,329 UART:
8,892,345 UART: Running Caliptra FMC ...
8,892,753 UART:
8,892,896 UART: [state] CFI Enabled
8,981,957 UART: [art] Extend RT PCRs Done
8,982,385 UART: [art] Lock RT PCRs Done
8,983,678 UART: [art] Populate DV Done
8,991,758 UART: [fht] FMC Alias Private Key: 7
8,992,854 UART: [art] Derive CDI
8,993,134 UART: [art] Store in slot 0x4
9,079,035 UART: [art] Derive Key Pair
9,079,395 UART: [art] Store priv key in slot 0x5
9,092,167 UART: [art] Derive Key Pair - Done
9,106,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,122,362 UART: [art] Erasing AUTHORITY.KEYID = 7
9,123,127 UART: [art] PUB.X = A15225064B0C118A89905D378E990E5B4BBE0BCA74BC5CF431ADB56A1308EABD07D31E1500053886B47631E6B719EC5A
9,129,860 UART: [art] PUB.Y = 20371E36674D52B647244578A74AC8EA6FF309EFF3E8B3FB20FD03C864B068A94EE463065ABF0F46B989326D3FF1B092
9,136,802 UART: [art] SIG.R = 9DCE3A3E0B5AE6B748D740F7060A2988F48BFB2923F8A8F90E0050C35AFB2F3043F39BD8ABE4429BD34A7064E0860F30
9,143,545 UART: [art] SIG.S = 1787FEEBE53FBA905953F7FFF19494E84E7D4F2631E9EE0E32C57B132083A24C789F0935C13AFF20B0A07BF8F9664BD6
9,167,041 UART: Caliptra RT
9,167,384 UART: [state] CFI Enabled
9,535,150 UART: [rt] RT listening for mailbox commands...
9,535,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,565,191 UART: [rt]cmd =0x494e464f, len=4
9,568,765 >>> mbox cmd response data (312 bytes)
9,568,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,058,741 >>> mbox cmd response: success
12,071,968 UART:
12,071,984 UART: Running Caliptra FMC ...
12,072,392 UART:
12,072,535 UART: [state] CFI Enabled
12,161,664 UART: [art] Extend RT PCRs Done
12,162,092 UART: [art] Lock RT PCRs Done
12,163,263 UART: [art] Populate DV Done
12,171,463 UART: [fht] FMC Alias Private Key: 7
12,172,627 UART: [art] Derive CDI
12,172,907 UART: [art] Store in slot 0x4
12,258,706 UART: [art] Derive Key Pair
12,259,066 UART: [art] Store priv key in slot 0x5
12,272,026 UART: [art] Derive Key Pair - Done
12,287,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,302,158 UART: [art] Erasing AUTHORITY.KEYID = 7
12,302,923 UART: [art] PUB.X = 474CFF0B51F58935DC7EA1427CBCAC191935B36334F05B4AF47DF2CFA32B0BF2863FD239969CDFB293A2D205AFF1A874
12,309,700 UART: [art] PUB.Y = 9D25839567EDA0B09EDCA103DA99334740135CD52A18EE89EBC6E33E242D28455BBA98272A62BF7BA04816D74D2CAE55
12,316,655 UART: [art] SIG.R = 7BB54E65AE5AC5B6384A63FE190D32F2FB444A8752CE93484C3D2C80EC96130060F07AF899457A37B56AFBC8AF0310B2
12,323,405 UART: [art] SIG.S = 329AA3737010D6146F2FE39BE3431F79F04B86EE84633D4EC5BF9980BF6526887A6F2C22B896FF1D91E0DC35DD77E406
12,346,912 UART: Caliptra RT
12,347,255 UART: [state] CFI Enabled
12,707,992 UART: [rt] RT listening for mailbox commands...
12,708,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,738,349 UART: [rt]cmd =0x494e464f, len=4
12,742,155 >>> mbox cmd response data (312 bytes)
test test_info::test_fw_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,146 UART:
192,504 UART: Running Caliptra ROM ...
193,690 UART:
193,844 UART: [state] CFI Enabled
265,952 UART: [state] LifecycleState = Unprovisioned
267,936 UART: [state] DebugLocked = No
270,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,119 UART: [kat] SHA2-256
444,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,330 UART: [kat] ++
455,816 UART: [kat] sha1
466,949 UART: [kat] SHA2-256
469,674 UART: [kat] SHA2-384
476,300 UART: [kat] SHA2-512-ACC
478,675 UART: [kat] ECC-384
2,766,638 UART: [kat] HMAC-384Kdf
2,778,029 UART: [kat] LMS
3,968,335 UART: [kat] --
3,973,892 UART: [cold-reset] ++
3,974,970 UART: [fht] Storing FHT @ 0x50003400
3,986,369 UART: [idev] ++
3,986,938 UART: [idev] CDI.KEYID = 6
3,987,894 UART: [idev] SUBJECT.KEYID = 7
3,989,139 UART: [idev] UDS.KEYID = 0
3,990,101 ready_for_fw is high
3,990,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,369 UART: [idev] Erasing UDS.KEYID = 0
7,320,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,341,122 UART: [idev] --
7,345,279 UART: [ldev] ++
7,345,850 UART: [ldev] CDI.KEYID = 6
7,346,807 UART: [ldev] SUBJECT.KEYID = 5
7,348,017 UART: [ldev] AUTHORITY.KEYID = 7
7,349,309 UART: [ldev] FE.KEYID = 1
7,378,137 UART: [ldev] Erasing FE.KEYID = 1
10,710,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,556 UART: [ldev] --
13,092,030 UART: [fwproc] Waiting for Commands...
13,094,994 UART: [fwproc] Received command 0x46574c44
13,097,176 UART: [fwproc] Received Image of size 118548 bytes
17,211,175 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,732 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,905 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,076 >>> mbox cmd response: success
17,687,189 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,689,969 UART: [afmc] ++
17,690,551 UART: [afmc] CDI.KEYID = 6
17,691,531 UART: [afmc] SUBJECT.KEYID = 7
17,692,754 UART: [afmc] AUTHORITY.KEYID = 5
21,050,100 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,346,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,348,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,362,949 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,377,670 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,392,059 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,414,368 UART: [afmc] --
23,418,619 UART: [cold-reset] --
23,423,944 UART: [state] Locking Datavault
23,428,918 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,688 UART: [state] Locking ICCM
23,432,405 UART: [exit] Launching FMC @ 0x40000130
23,440,804 UART:
23,441,043 UART: Running Caliptra FMC ...
23,442,148 UART:
23,442,307 UART: [state] CFI Enabled
23,506,418 UART: [fht] FMC Alias Private Key: 7
25,868,331 UART: [art] Extend RT PCRs Done
25,869,548 UART: [art] Lock RT PCRs Done
25,871,120 UART: [art] Populate DV Done
25,876,534 UART: [fht] FMC Alias Private Key: 7
25,878,223 UART: [art] Derive CDI
25,878,970 UART: [art] Store in slot 0x4
25,936,769 UART: [art] Derive Key Pair
25,937,771 UART: [art] Store priv key in slot 0x5
29,230,620 UART: [art] Derive Key Pair - Done
29,243,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,793 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,305 UART: [art] PUB.X = 1FB2A1A4C33D6E51ED7D5CADC89EF6679CA5ED224181AB843336C9216EEE1A1D72A2245A353E47DBC329B214D73A5DE2
31,540,610 UART: [art] PUB.Y = F1B4B4ECC69ED97619C0A8019DD9EC5ED27EF16AE506D19A5149CF09AE2CA4BC700BF59CA83CF712F70D93AE1403AFC6
31,547,890 UART: [art] SIG.R = 8CD7FBA898670430922FA2E5E0E2B36049B335E4E702BD4E088C866C6F26AFF36E8979380640D290F4E9CE9730EB8E0A
31,555,274 UART: [art] SIG.S = 0B7618D9F71EB768796C86D258310170F6039E1F83FE2EEEB1880994604B16457F513213A1814813C8E70E6C18D1F329
32,859,887 UART: Caliptra RT
32,860,594 UART: [state] CFI Enabled
33,037,026 UART: [rt] RT listening for mailbox commands...
33,068,506 UART: [rt]cmd =0x49444549, len=4
33,071,382 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,784,377 ready_for_fw is high
3,784,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,821 >>> mbox cmd response: success
17,964,148 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,657,091 UART:
23,657,546 UART: Running Caliptra FMC ...
23,658,658 UART:
23,658,817 UART: [state] CFI Enabled
23,726,374 UART: [fht] FMC Alias Private Key: 7
26,066,492 UART: [art] Extend RT PCRs Done
26,067,720 UART: [art] Lock RT PCRs Done
26,069,730 UART: [art] Populate DV Done
26,075,101 UART: [fht] FMC Alias Private Key: 7
26,076,647 UART: [art] Derive CDI
26,077,464 UART: [art] Store in slot 0x4
26,135,460 UART: [art] Derive Key Pair
26,136,508 UART: [art] Store priv key in slot 0x5
29,428,951 UART: [art] Derive Key Pair - Done
29,442,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,156 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,681 UART: [art] PUB.X = 1A21D8BA082BB4D0A46B9944027784CFA026503B7FC38DC84E8C5D8EAE023E569CEF5BFC383A69F148DB76F20540AFBE
31,739,983 UART: [art] PUB.Y = F29116346F62D1386704E452F15B06F8C32E1DC40421C364C17601871573B31191F82F712399C1B88D0D45F36B481A88
31,747,168 UART: [art] SIG.R = 629E1C9C4F52E46EC06A3D4339F90F812C2C6531FDAA11201190AE811E913C25B243F56D6061CE75F53EE678DC44715A
31,754,563 UART: [art] SIG.S = 72B4B8B377F5AFF73C99056F890594C7C07FFCD939614261BADB90AFD7F6F8151061F489B90276A63144FA2C03313CD9
33,059,684 UART: Caliptra RT
33,060,405 UART: [state] CFI Enabled
33,237,350 UART: [rt] RT listening for mailbox commands...
33,268,720 UART: [rt]cmd =0x49444549, len=4
33,271,444 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,447 UART:
192,806 UART: Running Caliptra ROM ...
193,933 UART:
603,437 UART: [state] CFI Enabled
619,800 UART: [state] LifecycleState = Unprovisioned
621,739 UART: [state] DebugLocked = No
623,962 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,893 UART: [kat] SHA2-256
798,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,173 UART: [kat] ++
809,614 UART: [kat] sha1
821,475 UART: [kat] SHA2-256
824,189 UART: [kat] SHA2-384
831,235 UART: [kat] SHA2-512-ACC
833,623 UART: [kat] ECC-384
3,116,177 UART: [kat] HMAC-384Kdf
3,127,774 UART: [kat] LMS
4,317,887 UART: [kat] --
4,324,030 UART: [cold-reset] ++
4,326,627 UART: [fht] Storing FHT @ 0x50003400
4,338,034 UART: [idev] ++
4,338,611 UART: [idev] CDI.KEYID = 6
4,339,529 UART: [idev] SUBJECT.KEYID = 7
4,340,769 UART: [idev] UDS.KEYID = 0
4,341,854 ready_for_fw is high
4,342,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,364 UART: [idev] Erasing UDS.KEYID = 0
7,629,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,527 UART: [idev] --
7,654,184 UART: [ldev] ++
7,654,782 UART: [ldev] CDI.KEYID = 6
7,655,750 UART: [ldev] SUBJECT.KEYID = 5
7,656,955 UART: [ldev] AUTHORITY.KEYID = 7
7,658,181 UART: [ldev] FE.KEYID = 1
7,669,175 UART: [ldev] Erasing FE.KEYID = 1
10,958,055 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,804 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,105 UART: [ldev] --
13,320,670 UART: [fwproc] Waiting for Commands...
13,323,720 UART: [fwproc] Received command 0x46574c44
13,325,907 UART: [fwproc] Received Image of size 118548 bytes
17,422,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,143 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,299 >>> mbox cmd response: success
17,902,821 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
17,905,730 UART: [afmc] ++
17,906,308 UART: [afmc] CDI.KEYID = 6
17,907,244 UART: [afmc] SUBJECT.KEYID = 7
17,908,507 UART: [afmc] AUTHORITY.KEYID = 5
21,222,439 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,373 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,050 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,775 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,196 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,986 UART: [afmc] --
23,585,982 UART: [cold-reset] --
23,590,806 UART: [state] Locking Datavault
23,593,902 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,595 UART: [state] Locking ICCM
23,597,821 UART: [exit] Launching FMC @ 0x40000130
23,606,206 UART:
23,606,444 UART: Running Caliptra FMC ...
23,607,466 UART:
23,607,609 UART: [state] CFI Enabled
23,615,917 UART: [fht] FMC Alias Private Key: 7
25,956,398 UART: [art] Extend RT PCRs Done
25,957,624 UART: [art] Lock RT PCRs Done
25,959,357 UART: [art] Populate DV Done
25,964,940 UART: [fht] FMC Alias Private Key: 7
25,966,472 UART: [art] Derive CDI
25,967,203 UART: [art] Store in slot 0x4
26,010,055 UART: [art] Derive Key Pair
26,011,052 UART: [art] Store priv key in slot 0x5
29,253,356 UART: [art] Derive Key Pair - Done
29,266,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,527 UART: [art] PUB.X = 8D15830E3A828DEF52743F591F371184F920FD2003A06C4E48B9A7763D571811BD8505002AEA5CA85E9A0005A7956E0F
31,555,719 UART: [art] PUB.Y = 464698FA2F1D16946A85D5981B346AAA36BA8C05BC1D569A591A1E5963AB52C9B5304439FAB86F865730B3C5DC7E9EA5
31,562,976 UART: [art] SIG.R = 4C0F30F76387A40A5C1FAB064E0DE1043E37AC6800A86A685C12318EC265E9F46DE91317458439EE084CB9118E87846D
31,570,367 UART: [art] SIG.S = 9798A1588A35AD290767E8F6BAB4B18F96A4AC46562BA0530FE3556E428668367565A790B489A599B39035D87C9F0EA1
32,875,955 UART: Caliptra RT
32,876,672 UART: [state] CFI Enabled
33,010,278 UART: [rt] RT listening for mailbox commands...
33,041,539 UART: [rt]cmd =0x49444549, len=4
33,044,356 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
4,126,239 ready_for_fw is high
4,126,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,419 >>> mbox cmd response: success
18,152,272 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
23,792,934 UART:
23,793,334 UART: Running Caliptra FMC ...
23,794,481 UART:
23,794,639 UART: [state] CFI Enabled
23,802,627 UART: [fht] FMC Alias Private Key: 7
26,142,332 UART: [art] Extend RT PCRs Done
26,143,580 UART: [art] Lock RT PCRs Done
26,145,102 UART: [art] Populate DV Done
26,150,355 UART: [fht] FMC Alias Private Key: 7
26,152,003 UART: [art] Derive CDI
26,152,822 UART: [art] Store in slot 0x4
26,195,094 UART: [art] Derive Key Pair
26,196,093 UART: [art] Store priv key in slot 0x5
29,438,721 UART: [art] Derive Key Pair - Done
29,451,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,377 UART: [art] PUB.X = F1DAD3F0B6B2A3026C65CA08BFAAE8013736B06AE9A568B458471996267C173DBEFB462630425A8E5739ED42FD5556A4
31,740,628 UART: [art] PUB.Y = 9A1C1AEB21A78131652A600E423FC4C8A59E3CDC9C9C82291613962770DEFB520C0975847EEAFF0AFED9BED68986C16A
31,747,871 UART: [art] SIG.R = 39FE2F24EC8EB6B94F941A77D3F4BECF7229CF8758CADF2AEBF63590B018EDF62835750138C7FA84D145AE888C197FF3
31,755,312 UART: [art] SIG.S = 6C490F9C923BC3A86A85489C0B4F40A99CC1570463763B0C54DA02654747B6F9B29E360DB80132341AA91C6D7C224EF9
33,060,436 UART: Caliptra RT
33,061,150 UART: [state] CFI Enabled
33,194,824 UART: [rt] RT listening for mailbox commands...
33,226,296 UART: [rt]cmd =0x49444549, len=4
33,229,008 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,143 UART:
192,515 UART: Running Caliptra ROM ...
193,692 UART:
193,839 UART: [state] CFI Enabled
265,022 UART: [state] LifecycleState = Unprovisioned
267,024 UART: [state] DebugLocked = No
268,206 UART: [state] WD Timer not started. Device not locked for debugging
272,589 UART: [kat] SHA2-256
452,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,006 UART: [kat] ++
463,496 UART: [kat] sha1
473,874 UART: [kat] SHA2-256
476,597 UART: [kat] SHA2-384
481,444 UART: [kat] SHA2-512-ACC
483,802 UART: [kat] ECC-384
2,945,265 UART: [kat] HMAC-384Kdf
2,970,335 UART: [kat] LMS
3,446,796 UART: [kat] --
3,451,383 UART: [cold-reset] ++
3,453,746 UART: [fht] FHT @ 0x50003400
3,463,884 UART: [idev] ++
3,464,445 UART: [idev] CDI.KEYID = 6
3,465,475 UART: [idev] SUBJECT.KEYID = 7
3,466,645 UART: [idev] UDS.KEYID = 0
3,467,686 ready_for_fw is high
3,467,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,031 UART: [idev] Erasing UDS.KEYID = 0
5,986,961 UART: [idev] Sha1 KeyId Algorithm
6,010,326 UART: [idev] --
6,015,423 UART: [ldev] ++
6,016,000 UART: [ldev] CDI.KEYID = 6
6,016,927 UART: [ldev] SUBJECT.KEYID = 5
6,018,086 UART: [ldev] AUTHORITY.KEYID = 7
6,019,373 UART: [ldev] FE.KEYID = 1
6,056,765 UART: [ldev] Erasing FE.KEYID = 1
8,566,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,012 UART: [ldev] --
10,371,753 UART: [fwproc] Wait for Commands...
10,374,930 UART: [fwproc] Recv command 0x46574c44
10,376,911 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,979 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,019 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,515 >>> mbox cmd response: success
14,337,702 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,340,717 UART: [afmc] ++
14,341,303 UART: [afmc] CDI.KEYID = 6
14,342,241 UART: [afmc] SUBJECT.KEYID = 7
14,343,474 UART: [afmc] AUTHORITY.KEYID = 5
16,870,720 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,596,162 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,999 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,618 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,667,870 UART: [afmc] --
18,672,325 UART: [cold-reset] --
18,676,366 UART: [state] Locking Datavault
18,682,405 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,158 UART: [state] Locking ICCM
18,685,631 UART: [exit] Launching FMC @ 0x40000130
18,694,071 UART:
18,694,316 UART: Running Caliptra FMC ...
18,695,414 UART:
18,695,595 UART: [state] CFI Enabled
18,752,468 UART: [fht] FMC Alias Private Key: 7
20,518,521 UART: [art] Extend RT PCRs Done
20,519,739 UART: [art] Lock RT PCRs Done
20,521,499 UART: [art] Populate DV Done
20,526,960 UART: [fht] FMC Alias Private Key: 7
20,528,601 UART: [art] Derive CDI
20,529,331 UART: [art] Store in slot 0x4
20,585,197 UART: [art] Derive Key Pair
20,586,194 UART: [art] Store priv key in slot 0x5
23,048,825 UART: [art] Derive Key Pair - Done
23,061,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,774,697 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,204 UART: [art] PUB.X = B67B4DED23CD2C1C02914B880B78BECB660D8AD18228F171F4103FDB4D88FC2203BD4BCEC4C862700455515F16551E33
24,783,513 UART: [art] PUB.Y = 97584A5F37ECB34BE01ADD70F3EB5B08820E242C64D202C627DF666FE0F1555FA1FB31C2C873191DABF674F12C7C6D6D
24,790,795 UART: [art] SIG.R = 2C9EB98D8542098CAFD0105BEC67F2E6C269B64300626B629A5C813E73DE644921B79E25B447481C00192EBE0233F256
24,798,154 UART: [art] SIG.S = DE431756484428D9E347D699617621141BE3EA95ED391DC4EFDE37D7DE0705EA8D9A1EE7DC64F9DEDD0023F279F8F584
25,777,302 UART: Caliptra RT
25,778,043 UART: [state] CFI Enabled
25,956,704 UART: [rt] RT listening for mailbox commands...
25,988,074 UART: [rt]cmd =0x49444549, len=4
25,991,098 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,460,539 ready_for_fw is high
3,461,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,933 >>> mbox cmd response: success
14,221,146 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,508,437 UART:
18,508,827 UART: Running Caliptra FMC ...
18,510,028 UART:
18,510,204 UART: [state] CFI Enabled
18,560,610 UART: [fht] FMC Alias Private Key: 7
20,326,877 UART: [art] Extend RT PCRs Done
20,328,121 UART: [art] Lock RT PCRs Done
20,330,021 UART: [art] Populate DV Done
20,335,339 UART: [fht] FMC Alias Private Key: 7
20,336,931 UART: [art] Derive CDI
20,337,745 UART: [art] Store in slot 0x4
20,392,765 UART: [art] Derive Key Pair
20,393,814 UART: [art] Store priv key in slot 0x5
22,856,611 UART: [art] Derive Key Pair - Done
22,869,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,581,858 UART: [art] Erasing AUTHORITY.KEYID = 7
24,583,361 UART: [art] PUB.X = D32F618DC20EE771CEC40CE1B7391CBAFD59E3D8191F661AC48A8E277EC9E6390FB13486B90035C11D095C4667DF51B5
24,590,624 UART: [art] PUB.Y = A56049A81457734D81B3EFC112822374B5D8B5F2EEE9E48DD2DF475968018B4EE32FD7DAF14DB4B3758268CE07D43FDA
24,597,881 UART: [art] SIG.R = BE83525E76C8BFC840DD845AC941B4A574086A6882EAF30885DA47D594A66EC42A2E80C67BFA31645D6DC0B722607824
24,605,278 UART: [art] SIG.S = 0280B626288248482128B9957343C919BD574DF980FD952B39F6A7862F3CC5998EC8602A220330E20BF2E6D12CFF09D2
25,584,250 UART: Caliptra RT
25,584,955 UART: [state] CFI Enabled
25,764,218 UART: [rt] RT listening for mailbox commands...
25,795,531 UART: [rt]cmd =0x49444549, len=4
25,798,189 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,419 UART:
192,799 UART: Running Caliptra ROM ...
193,901 UART:
603,612 UART: [state] CFI Enabled
620,283 UART: [state] LifecycleState = Unprovisioned
622,172 UART: [state] DebugLocked = No
624,348 UART: [state] WD Timer not started. Device not locked for debugging
627,683 UART: [kat] SHA2-256
807,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,135 UART: [kat] ++
818,617 UART: [kat] sha1
830,701 UART: [kat] SHA2-256
833,357 UART: [kat] SHA2-384
838,636 UART: [kat] SHA2-512-ACC
841,003 UART: [kat] ECC-384
3,281,193 UART: [kat] HMAC-384Kdf
3,293,958 UART: [kat] LMS
3,770,443 UART: [kat] --
3,773,872 UART: [cold-reset] ++
3,775,093 UART: [fht] FHT @ 0x50003400
3,786,567 UART: [idev] ++
3,787,151 UART: [idev] CDI.KEYID = 6
3,788,188 UART: [idev] SUBJECT.KEYID = 7
3,789,375 UART: [idev] UDS.KEYID = 0
3,790,310 ready_for_fw is high
3,790,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,475 UART: [idev] Erasing UDS.KEYID = 0
6,265,997 UART: [idev] Sha1 KeyId Algorithm
6,290,894 UART: [idev] --
6,296,726 UART: [ldev] ++
6,297,295 UART: [ldev] CDI.KEYID = 6
6,298,205 UART: [ldev] SUBJECT.KEYID = 5
6,299,421 UART: [ldev] AUTHORITY.KEYID = 7
6,300,655 UART: [ldev] FE.KEYID = 1
6,312,325 UART: [ldev] Erasing FE.KEYID = 1
8,787,343 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,088 UART: [ldev] --
10,581,471 UART: [fwproc] Wait for Commands...
10,583,082 UART: [fwproc] Recv command 0x46574c44
10,585,136 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,235 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,503 >>> mbox cmd response: success
14,547,603 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,550,335 UART: [afmc] ++
14,550,940 UART: [afmc] CDI.KEYID = 6
14,551,854 UART: [afmc] SUBJECT.KEYID = 7
14,553,138 UART: [afmc] AUTHORITY.KEYID = 5
17,056,695 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,606 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,309 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,129 UART: [afmc] --
18,856,346 UART: [cold-reset] --
18,858,209 UART: [state] Locking Datavault
18,864,052 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,809 UART: [state] Locking ICCM
18,867,472 UART: [exit] Launching FMC @ 0x40000130
18,875,920 UART:
18,876,154 UART: Running Caliptra FMC ...
18,877,254 UART:
18,877,412 UART: [state] CFI Enabled
18,885,436 UART: [fht] FMC Alias Private Key: 7
20,651,834 UART: [art] Extend RT PCRs Done
20,653,051 UART: [art] Lock RT PCRs Done
20,654,872 UART: [art] Populate DV Done
20,660,341 UART: [fht] FMC Alias Private Key: 7
20,661,823 UART: [art] Derive CDI
20,662,557 UART: [art] Store in slot 0x4
20,705,310 UART: [art] Derive Key Pair
20,706,311 UART: [art] Store priv key in slot 0x5
23,133,852 UART: [art] Derive Key Pair - Done
23,146,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,895 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,395 UART: [art] PUB.X = 2F68C0022F5E6FCA5063914DB14CF07E2E4883819F7AA4AF190BB253BC4778E97DC8F2724C31BADD2517716C3E4FD752
24,861,698 UART: [art] PUB.Y = F8E49DDD5629775CA3F82C06B3B91767EC37777721B403F36A266AE2FF9139BB4E00170DB3C26C0BA6BFA6BA6248E836
24,868,930 UART: [art] SIG.R = 10EA25F4CB462EE89087D158C805D8CBBD313B2AED853D9059F855D63F14CE20842023A1453A4D9EC7655A870B780BDF
24,876,324 UART: [art] SIG.S = 7D93A195E99035DE14650BB784E1FF6D446071676A43FE59FAF7002C291A792B54F825606E35A69C479E88374BDC005B
25,855,351 UART: Caliptra RT
25,856,052 UART: [state] CFI Enabled
25,989,204 UART: [rt] RT listening for mailbox commands...
26,020,710 UART: [rt]cmd =0x49444549, len=4
26,023,513 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
3,775,154 ready_for_fw is high
3,775,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,625 >>> mbox cmd response: success
14,442,806 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
18,691,869 UART:
18,692,246 UART: Running Caliptra FMC ...
18,693,355 UART:
18,693,511 UART: [state] CFI Enabled
18,701,468 UART: [fht] FMC Alias Private Key: 7
20,467,581 UART: [art] Extend RT PCRs Done
20,468,803 UART: [art] Lock RT PCRs Done
20,470,413 UART: [art] Populate DV Done
20,475,782 UART: [fht] FMC Alias Private Key: 7
20,477,487 UART: [art] Derive CDI
20,478,228 UART: [art] Store in slot 0x4
20,520,935 UART: [art] Derive Key Pair
20,522,008 UART: [art] Store priv key in slot 0x5
22,949,155 UART: [art] Derive Key Pair - Done
22,962,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,555 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,048 UART: [art] PUB.X = E7B690F41E2014192BDB8E11BEDDC100C31147E3CFCEDDB92E92E632A9BAABB083A3D69856535F7063B07845AFC4584C
24,677,301 UART: [art] PUB.Y = 7A99653ED640ECDEC3D5B757E65DFFD89A83D0623FE24C0AFF57AE4599635726569C0B75A9C077387EC8F894277BBDF4
24,684,561 UART: [art] SIG.R = A2BFB0CD8BB900EDA88373CE2386211B0CBB226187FB365A5C190EC6C3B51B47B482D7F30F30EB03F53178961049F27F
24,691,965 UART: [art] SIG.S = 420F831113B5A552FD5707900361141B19E99ECED8585424F1B1A5578B20B5F9EE565F173DCB613D522B506AB9DCA104
25,670,153 UART: Caliptra RT
25,670,865 UART: [state] CFI Enabled
25,803,992 UART: [rt] RT listening for mailbox commands...
25,835,355 UART: [rt]cmd =0x49444549, len=4
25,838,289 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,959 UART:
192,311 UART: Running Caliptra ROM ...
193,497 UART:
193,648 UART: [state] CFI Enabled
267,084 UART: [state] LifecycleState = Unprovisioned
269,517 UART: [state] DebugLocked = No
271,226 UART: [state] WD Timer not started. Device not locked for debugging
275,553 UART: [kat] SHA2-256
465,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,182 UART: [kat] ++
476,628 UART: [kat] sha1
488,135 UART: [kat] SHA2-256
491,132 UART: [kat] SHA2-384
497,755 UART: [kat] SHA2-512-ACC
500,329 UART: [kat] ECC-384
2,949,954 UART: [kat] HMAC-384Kdf
2,971,221 UART: [kat] LMS
3,502,981 UART: [kat] --
3,507,465 UART: [cold-reset] ++
3,509,174 UART: [fht] FHT @ 0x50003400
3,520,499 UART: [idev] ++
3,521,217 UART: [idev] CDI.KEYID = 6
3,522,248 UART: [idev] SUBJECT.KEYID = 7
3,523,348 UART: [idev] UDS.KEYID = 0
3,524,266 ready_for_fw is high
3,524,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,524 UART: [idev] Erasing UDS.KEYID = 0
6,028,766 UART: [idev] Sha1 KeyId Algorithm
6,052,430 UART: [idev] --
6,057,291 UART: [ldev] ++
6,058,020 UART: [ldev] CDI.KEYID = 6
6,058,938 UART: [ldev] SUBJECT.KEYID = 5
6,060,092 UART: [ldev] AUTHORITY.KEYID = 7
6,061,323 UART: [ldev] FE.KEYID = 1
6,101,180 UART: [ldev] Erasing FE.KEYID = 1
8,606,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,183 UART: [ldev] --
10,415,471 UART: [fwproc] Wait for Commands...
10,417,076 UART: [fwproc] Recv command 0x46574c44
10,419,382 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,154 >>> mbox cmd response: success
14,682,229 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,684,733 UART: [afmc] ++
14,685,475 UART: [afmc] CDI.KEYID = 6
14,686,654 UART: [afmc] SUBJECT.KEYID = 7
14,688,132 UART: [afmc] AUTHORITY.KEYID = 5
17,218,845 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,563 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,659 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,407 UART: [afmc] --
19,036,326 UART: [cold-reset] --
19,040,184 UART: [state] Locking Datavault
19,044,183 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,364 UART: [state] Locking ICCM
19,048,781 UART: [exit] Launching FMC @ 0x40000130
19,057,447 UART:
19,057,684 UART: Running Caliptra FMC ...
19,058,784 UART:
19,058,940 UART: [state] CFI Enabled
19,118,672 UART: [fht] FMC Alias Private Key: 7
20,905,731 UART: [art] Extend RT PCRs Done
20,906,956 UART: [art] Lock RT PCRs Done
20,908,371 UART: [art] Populate DV Done
20,913,776 UART: [fht] FMC Alias Private Key: 7
20,915,364 UART: [art] Derive CDI
20,916,175 UART: [art] Store in slot 0x4
20,972,863 UART: [art] Derive Key Pair
20,973,859 UART: [art] Store priv key in slot 0x5
23,436,876 UART: [art] Derive Key Pair - Done
23,449,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,163,140 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,649 UART: [art] PUB.X = 51A2508F038F50059505AB2F5D8FB5BC927BB762A2D6FEF715C4A2F5758E6C455899DAEDC5D96D5E50724AC343CA758E
25,171,901 UART: [art] PUB.Y = 173AC2ECD4BB9A67EE6E758FB64FF271143BBE986AE26A1BDD0E91303097374A73F9BAC76F0A12E27F4737C31BC47473
25,179,177 UART: [art] SIG.R = B1FBB9C0CEBBB183CD54E6D99C36472EE27E943B3AAC2B5D718EF4C44A558739011F909183E45E03061146A632EA1586
25,186,557 UART: [art] SIG.S = 2B7D98C1A307C57BD8A3044682F3C078214B0FCF3E178C7E7D458F1E8927ECDAE28C7D38609E36EA2EE0E7AED9AEED89
26,165,323 UART: Caliptra RT
26,166,034 UART: [state] CFI Enabled
26,345,795 UART: [rt] RT listening for mailbox commands...
26,377,316 UART: [rt]cmd =0x49444549, len=4
26,380,241 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,440,684 ready_for_fw is high
3,441,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,681 >>> mbox cmd response: success
14,832,126 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,109,604 UART:
19,110,008 UART: Running Caliptra FMC ...
19,111,146 UART:
19,111,308 UART: [state] CFI Enabled
19,179,599 UART: [fht] FMC Alias Private Key: 7
20,945,420 UART: [art] Extend RT PCRs Done
20,946,651 UART: [art] Lock RT PCRs Done
20,948,437 UART: [art] Populate DV Done
20,953,805 UART: [fht] FMC Alias Private Key: 7
20,955,409 UART: [art] Derive CDI
20,956,246 UART: [art] Store in slot 0x4
21,012,030 UART: [art] Derive Key Pair
21,013,082 UART: [art] Store priv key in slot 0x5
23,476,414 UART: [art] Derive Key Pair - Done
23,489,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,198 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,707 UART: [art] PUB.X = E8F3A522CE9CE0457B27C47EF3FD6098DBAD532F38C92B979016283CAA77572EA3792E81CE6CCBA93F28CE5E28301DB0
25,211,009 UART: [art] PUB.Y = 68ADCF2A62F0AD87C6CAC79A1CFD2AB51054899E84FA5063F59F1B121F8637086DE9AB8AA51467B543A561E539B34AA5
25,218,260 UART: [art] SIG.R = E38D7BB440782C7CBB2D707F0F698D37DD02EDE255480EDC87CA1912BE09F2AD04391C05DEEAF8D1E256CB016F64C76B
25,225,647 UART: [art] SIG.S = 2B1078D7E2A37B4C740D9AC1CDD561E3AF75B7B7550E85373BA78088C37793463D25D92D01B776B3F953475354B006C6
26,204,231 UART: Caliptra RT
26,204,925 UART: [state] CFI Enabled
26,386,046 UART: [rt] RT listening for mailbox commands...
26,417,452 UART: [rt]cmd =0x49444549, len=4
26,420,352 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,496 UART:
192,859 UART: Running Caliptra ROM ...
194,014 UART:
603,736 UART: [state] CFI Enabled
617,645 UART: [state] LifecycleState = Unprovisioned
620,051 UART: [state] DebugLocked = No
622,005 UART: [state] WD Timer not started. Device not locked for debugging
626,637 UART: [kat] SHA2-256
816,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,287 UART: [kat] ++
827,759 UART: [kat] sha1
839,562 UART: [kat] SHA2-256
842,580 UART: [kat] SHA2-384
848,736 UART: [kat] SHA2-512-ACC
851,366 UART: [kat] ECC-384
3,293,654 UART: [kat] HMAC-384Kdf
3,306,973 UART: [kat] LMS
3,838,836 UART: [kat] --
3,843,356 UART: [cold-reset] ++
3,845,080 UART: [fht] FHT @ 0x50003400
3,855,995 UART: [idev] ++
3,856,700 UART: [idev] CDI.KEYID = 6
3,857,585 UART: [idev] SUBJECT.KEYID = 7
3,858,832 UART: [idev] UDS.KEYID = 0
3,859,737 ready_for_fw is high
3,859,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,892 UART: [idev] Erasing UDS.KEYID = 0
6,337,151 UART: [idev] Sha1 KeyId Algorithm
6,358,928 UART: [idev] --
6,364,276 UART: [ldev] ++
6,365,010 UART: [ldev] CDI.KEYID = 6
6,365,931 UART: [ldev] SUBJECT.KEYID = 5
6,367,094 UART: [ldev] AUTHORITY.KEYID = 7
6,368,489 UART: [ldev] FE.KEYID = 1
6,379,128 UART: [ldev] Erasing FE.KEYID = 1
8,858,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,844 UART: [ldev] --
10,649,218 UART: [fwproc] Wait for Commands...
10,651,980 UART: [fwproc] Recv command 0x46574c44
10,654,294 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,089 >>> mbox cmd response: success
14,913,589 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
14,916,306 UART: [afmc] ++
14,917,000 UART: [afmc] CDI.KEYID = 6
14,918,170 UART: [afmc] SUBJECT.KEYID = 7
14,919,664 UART: [afmc] AUTHORITY.KEYID = 5
17,424,318 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,613 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,850 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,089 UART: [afmc] --
19,219,160 UART: [cold-reset] --
19,224,329 UART: [state] Locking Datavault
19,230,400 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,556 UART: [state] Locking ICCM
19,234,442 UART: [exit] Launching FMC @ 0x40000130
19,243,071 UART:
19,243,313 UART: Running Caliptra FMC ...
19,244,420 UART:
19,244,579 UART: [state] CFI Enabled
19,252,907 UART: [fht] FMC Alias Private Key: 7
21,020,320 UART: [art] Extend RT PCRs Done
21,021,543 UART: [art] Lock RT PCRs Done
21,023,235 UART: [art] Populate DV Done
21,028,767 UART: [fht] FMC Alias Private Key: 7
21,030,492 UART: [art] Derive CDI
21,031,321 UART: [art] Store in slot 0x4
21,073,828 UART: [art] Derive Key Pair
21,074,839 UART: [art] Store priv key in slot 0x5
23,501,901 UART: [art] Derive Key Pair - Done
23,514,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,567 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,081 UART: [art] PUB.X = D7C9A72610BFFD76A0F590D5854C2A3C4FDBD2856A078DFC476112FC05DA1990C4FD9D5FEA12A9A0099E2836A383C3CF
25,230,368 UART: [art] PUB.Y = 18BA03CD8EA40B19F9FE45761F2A442111865F81A4CCB9E743C70058837975818D614397FE44F76ED281EE45FC498DFB
25,237,564 UART: [art] SIG.R = 6E050246F44FD0CCFF130E7DBA604D975D4E5BFF869025310C31D9183EA65DB498AE97E6826493FF33FD39E0B3CBDAF9
25,244,977 UART: [art] SIG.S = D0DF57A7C9727AD0BA80FF583A6CBE3B4EB4257E4E6FF8F2117C6F58CEEE3CF7F58F39A3B45D77C8AE83DCC320842CBC
26,223,596 UART: Caliptra RT
26,224,287 UART: [state] CFI Enabled
26,356,139 UART: [rt] RT listening for mailbox commands...
26,387,536 UART: [rt]cmd =0x49444549, len=4
26,390,180 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,751,687 ready_for_fw is high
3,752,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,035,320 >>> mbox cmd response: success
15,035,988 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
19,287,480 UART:
19,287,863 UART: Running Caliptra FMC ...
19,289,012 UART:
19,289,178 UART: [state] CFI Enabled
19,297,169 UART: [fht] FMC Alias Private Key: 7
21,063,327 UART: [art] Extend RT PCRs Done
21,064,542 UART: [art] Lock RT PCRs Done
21,066,116 UART: [art] Populate DV Done
21,071,657 UART: [fht] FMC Alias Private Key: 7
21,073,310 UART: [art] Derive CDI
21,074,134 UART: [art] Store in slot 0x4
21,117,005 UART: [art] Derive Key Pair
21,118,013 UART: [art] Store priv key in slot 0x5
23,544,778 UART: [art] Derive Key Pair - Done
23,557,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,048 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,552 UART: [art] PUB.X = A1ED97424E8E17A46F2C66529C3ECB3E7C22B8779C4FCA47467B4AD310F9FC9AED5B207153E804022BDE2EFAB50A1E15
25,272,827 UART: [art] PUB.Y = E0ED38CE3FB2482265EBA96E198C11A3C0501B68FB160C07B7A4F0DA2C123D0F6D5D4DA2CE49B3A84C16A54F62616B5D
25,280,090 UART: [art] SIG.R = 5B59FCFA5ECBF178C41D5599866B8AE9EF55040A890A20CF54C33F1BF8F167C0B4E50B7700FC97083CE318469045B005
25,287,487 UART: [art] SIG.S = A37A04491286E5A9A02A9E98853BDFF3C171089D4C46EDB4F0AA1D78E945F86DCF8CEE299C9709CEB0509A5133DF9C6F
26,267,000 UART: Caliptra RT
26,267,714 UART: [state] CFI Enabled
26,400,385 UART: [rt] RT listening for mailbox commands...
26,431,780 UART: [rt]cmd =0x49444549, len=4
26,434,636 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,533 UART: [kat] SHA2-256
892,471 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,156 UART: [kat] HMAC-384Kdf
906,690 UART: [kat] LMS
1,474,886 UART: [kat] --
1,475,533 UART: [cold-reset] ++
1,475,877 UART: [fht] Storing FHT @ 0x50003400
1,478,504 UART: [idev] ++
1,478,672 UART: [idev] CDI.KEYID = 6
1,479,032 UART: [idev] SUBJECT.KEYID = 7
1,479,456 UART: [idev] UDS.KEYID = 0
1,479,801 ready_for_fw is high
1,479,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,350 UART: [idev] Erasing UDS.KEYID = 0
1,503,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,512 UART: [idev] --
1,513,795 UART: [ldev] ++
1,513,963 UART: [ldev] CDI.KEYID = 6
1,514,326 UART: [ldev] SUBJECT.KEYID = 5
1,514,752 UART: [ldev] AUTHORITY.KEYID = 7
1,515,215 UART: [ldev] FE.KEYID = 1
1,520,465 UART: [ldev] Erasing FE.KEYID = 1
1,545,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,158 UART: [ldev] --
1,585,537 UART: [fwproc] Waiting for Commands...
1,586,284 UART: [fwproc] Received command 0x46574c44
1,587,075 UART: [fwproc] Received Image of size 118548 bytes
2,930,939 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,873 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,292 >>> mbox cmd response: success
3,129,292 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,130,372 UART: [afmc] ++
3,130,540 UART: [afmc] CDI.KEYID = 6
3,130,902 UART: [afmc] SUBJECT.KEYID = 7
3,131,327 UART: [afmc] AUTHORITY.KEYID = 5
3,167,286 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,558 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,338 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,930 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,613 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,629 UART: [afmc] --
3,210,735 UART: [cold-reset] --
3,211,489 UART: [state] Locking Datavault
3,212,506 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,110 UART: [state] Locking ICCM
3,213,650 UART: [exit] Launching FMC @ 0x40000130
3,218,980 UART:
3,218,996 UART: Running Caliptra FMC ...
3,219,404 UART:
3,219,458 UART: [state] CFI Enabled
3,229,858 UART: [fht] FMC Alias Private Key: 7
3,348,728 UART: [art] Extend RT PCRs Done
3,349,156 UART: [art] Lock RT PCRs Done
3,350,706 UART: [art] Populate DV Done
3,358,815 UART: [fht] FMC Alias Private Key: 7
3,359,747 UART: [art] Derive CDI
3,360,027 UART: [art] Store in slot 0x4
3,445,551 UART: [art] Derive Key Pair
3,445,911 UART: [art] Store priv key in slot 0x5
3,459,186 UART: [art] Derive Key Pair - Done
3,473,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,140 UART: [art] PUB.X = D3B43F844FDEBCAC8D9B7CE572F012CE6655A5596184F09CEFDCA0A9786A4C26FEED47FF0F2474A41556514F334542B6
3,496,921 UART: [art] PUB.Y = 9B6C8BA1022330D3FF10BB1255C61BE23B4E591D4040E8F56F69F14B78BEE78A5F1B9F9FF51C1BA2D4B318F6601CC0C6
3,503,882 UART: [art] SIG.R = F44AF0D0656516A8BDC4CF8B4ECDF093A01823D574676F9FDEE26089AF89E98FAA7B8CB9B17C36991DCB655211182667
3,510,662 UART: [art] SIG.S = 9909A05F7F3BE64B5A52C5A87CD4DD3337E742D01EF6833A89661DBB94201CC9BBEFCD48B0247FE5AE5118E3C079EC0F
3,534,894 UART: Caliptra RT
3,535,145 UART: [state] CFI Enabled
3,655,556 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,238 UART: [rt]cmd =0x49444549, len=4
3,688,639 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,033 ready_for_fw is high
1,363,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,434 >>> mbox cmd response: success
2,980,434 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,042,095 UART:
3,042,111 UART: Running Caliptra FMC ...
3,042,519 UART:
3,042,573 UART: [state] CFI Enabled
3,052,783 UART: [fht] FMC Alias Private Key: 7
3,171,905 UART: [art] Extend RT PCRs Done
3,172,333 UART: [art] Lock RT PCRs Done
3,174,033 UART: [art] Populate DV Done
3,182,214 UART: [fht] FMC Alias Private Key: 7
3,183,210 UART: [art] Derive CDI
3,183,490 UART: [art] Store in slot 0x4
3,269,108 UART: [art] Derive Key Pair
3,269,468 UART: [art] Store priv key in slot 0x5
3,282,959 UART: [art] Derive Key Pair - Done
3,297,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,263 UART: [art] PUB.X = 1A614FBC305FE77DE370D870282755A655EBA5DCD7C3ED5DA617E2F4C5793E382039D5BDBDCC60F262AE563FCDD38D49
3,321,051 UART: [art] PUB.Y = 097FFCA9813715C337CF877F60B1A6CB3EDD444ECA4D009C37DF74B3B5F24B0101DDF4F42547171936B2F27522171F3A
3,327,976 UART: [art] SIG.R = 42921AAC1A03A8CCE13F7E234C2110FFC3F731204D9C390FA42A352F112C08369DE3631B995060B9E94D2129D85EB281
3,334,737 UART: [art] SIG.S = 71F628D26F2BF6CFA42CA6B10C3CB2A1017BB808007EBF2E6F17FCD6EE1A32F982E45156C4EB1FD8FD456A19F77EB3AF
3,358,726 UART: Caliptra RT
3,358,977 UART: [state] CFI Enabled
3,479,040 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,310 UART: [rt]cmd =0x49444549, len=4
3,511,563 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,272 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,912 UART: [kat] SHA2-256
881,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,958 UART: [kat] ++
886,110 UART: [kat] sha1
890,310 UART: [kat] SHA2-256
892,248 UART: [kat] SHA2-384
895,113 UART: [kat] SHA2-512-ACC
897,014 UART: [kat] ECC-384
902,613 UART: [kat] HMAC-384Kdf
907,271 UART: [kat] LMS
1,475,467 UART: [kat] --
1,476,422 UART: [cold-reset] ++
1,476,804 UART: [fht] Storing FHT @ 0x50003400
1,479,589 UART: [idev] ++
1,479,757 UART: [idev] CDI.KEYID = 6
1,480,117 UART: [idev] SUBJECT.KEYID = 7
1,480,541 UART: [idev] UDS.KEYID = 0
1,480,886 ready_for_fw is high
1,480,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,865 UART: [idev] Erasing UDS.KEYID = 0
1,505,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,560 UART: [ldev] ++
1,515,728 UART: [ldev] CDI.KEYID = 6
1,516,091 UART: [ldev] SUBJECT.KEYID = 5
1,516,517 UART: [ldev] AUTHORITY.KEYID = 7
1,516,980 UART: [ldev] FE.KEYID = 1
1,522,244 UART: [ldev] Erasing FE.KEYID = 1
1,547,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,937 UART: [ldev] --
1,586,334 UART: [fwproc] Waiting for Commands...
1,586,989 UART: [fwproc] Received command 0x46574c44
1,587,780 UART: [fwproc] Received Image of size 118548 bytes
2,932,344 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,446 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,013 >>> mbox cmd response: success
3,131,013 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,132,247 UART: [afmc] ++
3,132,415 UART: [afmc] CDI.KEYID = 6
3,132,777 UART: [afmc] SUBJECT.KEYID = 7
3,133,202 UART: [afmc] AUTHORITY.KEYID = 5
3,168,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,569 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,349 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,941 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,624 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,486 UART: [afmc] --
3,211,546 UART: [cold-reset] --
3,212,566 UART: [state] Locking Datavault
3,213,649 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,253 UART: [state] Locking ICCM
3,214,759 UART: [exit] Launching FMC @ 0x40000130
3,220,089 UART:
3,220,105 UART: Running Caliptra FMC ...
3,220,513 UART:
3,220,656 UART: [state] CFI Enabled
3,231,098 UART: [fht] FMC Alias Private Key: 7
3,349,896 UART: [art] Extend RT PCRs Done
3,350,324 UART: [art] Lock RT PCRs Done
3,352,272 UART: [art] Populate DV Done
3,360,393 UART: [fht] FMC Alias Private Key: 7
3,361,441 UART: [art] Derive CDI
3,361,721 UART: [art] Store in slot 0x4
3,447,439 UART: [art] Derive Key Pair
3,447,799 UART: [art] Store priv key in slot 0x5
3,461,296 UART: [art] Derive Key Pair - Done
3,476,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,731 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,496 UART: [art] PUB.X = E5E5EF32E0273120D07538A1F4419ABCF33098514257E2926CDE2663FA009867A6D7918C1F6F934106CE49A207F22ED2
3,499,234 UART: [art] PUB.Y = 2F0C109A536A546709A04F28FCDDFE292174D663C7CC8624B306798731F5EB7506D5AAE8793F93EA100C01B71AF4F52E
3,506,170 UART: [art] SIG.R = 8C230CACAD2E390A27CA1D6C2BB256E8E39252D96E077FCFFA06E66127AC7AC1E27FB62DCC3EDA5E0C943F9311C16FB4
3,512,949 UART: [art] SIG.S = E9D9259AB7C6B3241D51EEB9F23E9BB5BE879CA04155B34F31AF84D91A8E471EFA0C19E15A8985E60233CC9400F7F798
3,536,787 UART: Caliptra RT
3,537,130 UART: [state] CFI Enabled
3,657,193 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,775 UART: [rt]cmd =0x49444549, len=4
3,690,196 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 ready_for_fw is high
1,363,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,523 >>> mbox cmd response: success
2,981,523 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
3,043,964 UART:
3,043,980 UART: Running Caliptra FMC ...
3,044,388 UART:
3,044,531 UART: [state] CFI Enabled
3,055,319 UART: [fht] FMC Alias Private Key: 7
3,174,867 UART: [art] Extend RT PCRs Done
3,175,295 UART: [art] Lock RT PCRs Done
3,176,879 UART: [art] Populate DV Done
3,185,102 UART: [fht] FMC Alias Private Key: 7
3,186,284 UART: [art] Derive CDI
3,186,564 UART: [art] Store in slot 0x4
3,272,772 UART: [art] Derive Key Pair
3,273,132 UART: [art] Store priv key in slot 0x5
3,286,627 UART: [art] Derive Key Pair - Done
3,301,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,785 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,550 UART: [art] PUB.X = 4E3AB2A131282021E536A5F6F0D459938CEEDFF99A4B1FE459861EB4269EA16AC5DDE02A130AF11947328A362C9652DE
3,324,325 UART: [art] PUB.Y = A39D6451BFF4C076949F02003C01EA9D76A903DE5E3DA34AA4BFEB03A40F4E78730A03E3AC8452F8B6235CC61971C1B1
3,331,242 UART: [art] SIG.R = 087CEA4786A03DB17C2966A8522CC23313B4DDF4ACA307418D41A45791210AC4ADBBBA9D63FEC75C78966AE0869A2F83
3,338,013 UART: [art] SIG.S = 63D3B4AE6E4967BC950CC5F285E9121EF06CD3899C2F0330F1AE68D57E1DDFDE396CBE3DF69B47A0B08DAACA17E504EE
3,361,732 UART: Caliptra RT
3,362,075 UART: [state] CFI Enabled
3,481,414 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,962 UART: [rt]cmd =0x49444549, len=4
3,514,275 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,291 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
891,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,118 UART: [kat] ++
895,270 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,173 UART: [kat] SHA2-512-ACC
906,074 UART: [kat] ECC-384
916,067 UART: [kat] HMAC-384Kdf
920,679 UART: [kat] LMS
1,168,991 UART: [kat] --
1,169,944 UART: [cold-reset] ++
1,170,280 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,174,260 ready_for_fw is high
1,174,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,225 UART: [idev] Erasing UDS.KEYID = 0
1,199,353 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,192 UART: [ldev] ++
1,209,360 UART: [ldev] CDI.KEYID = 6
1,209,724 UART: [ldev] SUBJECT.KEYID = 5
1,210,151 UART: [ldev] AUTHORITY.KEYID = 7
1,210,614 UART: [ldev] FE.KEYID = 1
1,215,802 UART: [ldev] Erasing FE.KEYID = 1
1,242,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,844 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,476 UART: [ldev] --
1,281,747 UART: [fwproc] Wait for Commands...
1,282,438 UART: [fwproc] Recv command 0x46574c44
1,283,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,212 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,659 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,047 >>> mbox cmd response: success
2,826,047 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,827,113 UART: [afmc] ++
2,827,281 UART: [afmc] CDI.KEYID = 6
2,827,644 UART: [afmc] SUBJECT.KEYID = 7
2,828,070 UART: [afmc] AUTHORITY.KEYID = 5
2,862,767 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,491 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,201 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,082 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,783 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,440 UART: [afmc] --
2,905,349 UART: [cold-reset] --
2,906,327 UART: [state] Locking Datavault
2,907,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,252 UART: [state] Locking ICCM
2,908,724 UART: [exit] Launching FMC @ 0x40000130
2,914,054 UART:
2,914,070 UART: Running Caliptra FMC ...
2,914,478 UART:
2,914,532 UART: [state] CFI Enabled
2,924,788 UART: [fht] FMC Alias Private Key: 7
3,042,804 UART: [art] Extend RT PCRs Done
3,043,232 UART: [art] Lock RT PCRs Done
3,044,470 UART: [art] Populate DV Done
3,052,483 UART: [fht] FMC Alias Private Key: 7
3,053,543 UART: [art] Derive CDI
3,053,823 UART: [art] Store in slot 0x4
3,139,762 UART: [art] Derive Key Pair
3,140,122 UART: [art] Store priv key in slot 0x5
3,153,632 UART: [art] Derive Key Pair - Done
3,168,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,325 UART: [art] PUB.X = 95C2FA618EFB0E674BEF986752EF85783FC42E013A9B5B6D1C7DAF2EDA81E8CCFA4BBD2BF4BC51AE1B1F59E75A990C30
3,191,114 UART: [art] PUB.Y = A9FA0E619FFE53C6C4351FFE94AF3E9AF40509926C47E1E547CDA38600084B5278E4A3690170215C159B53CCE56E2A22
3,198,031 UART: [art] SIG.R = 84826E7105A62F0187DD6577AD89A0C55D58D30B416754E1896B66B0EA8E10E3C2931762D16260A4DD5A4DFA5E89D06D
3,204,792 UART: [art] SIG.S = 25CC1EC9D84ECCB6BE104CE52BED4784FA7C793BFDAAEA8D15C9C12CFD50C02939CA25E0FC70AE1A737D6378E50AB9C4
3,228,909 UART: Caliptra RT
3,229,160 UART: [state] CFI Enabled
3,349,177 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,629 UART: [rt]cmd =0x49444549, len=4
3,381,828 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,454 ready_for_fw is high
1,059,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,694 >>> mbox cmd response: success
2,678,694 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,740,807 UART:
2,740,823 UART: Running Caliptra FMC ...
2,741,231 UART:
2,741,285 UART: [state] CFI Enabled
2,751,497 UART: [fht] FMC Alias Private Key: 7
2,870,385 UART: [art] Extend RT PCRs Done
2,870,813 UART: [art] Lock RT PCRs Done
2,872,383 UART: [art] Populate DV Done
2,880,556 UART: [fht] FMC Alias Private Key: 7
2,881,704 UART: [art] Derive CDI
2,881,984 UART: [art] Store in slot 0x4
2,968,267 UART: [art] Derive Key Pair
2,968,627 UART: [art] Store priv key in slot 0x5
2,981,659 UART: [art] Derive Key Pair - Done
2,996,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,604 UART: [art] PUB.X = 84C3D590927E1832F857261EB2CC7E73392FA507C9694EB72D5A51FA32B99E67770F209BA72CB5AD719888A44ECF0B3D
3,019,369 UART: [art] PUB.Y = C3FE07F28404B6462ECE1AA9D83CC1731856116602F6E4EB01B8F554A068F92C890439C58F952357C3B2FB4B49748BE6
3,026,304 UART: [art] SIG.R = BEDE9E4EA84F741DCD7D8D1DD74C675CD4E16D374D9BA5F8F08725CE4BB8EEEC488244C8FF48CDD5B02A28C5CFCBE294
3,033,106 UART: [art] SIG.S = C3119ECF1A3D65496CF0334C77F8DA7D0280E0F06AF1E1CC3DCE477E3EC332142F4D62429D20289F65D084715A3CB501
3,056,986 UART: Caliptra RT
3,057,237 UART: [state] CFI Enabled
3,176,821 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,171 UART: [rt]cmd =0x49444549, len=4
3,209,458 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,771 UART: [state] LifecycleState = Unprovisioned
86,426 UART: [state] DebugLocked = No
87,006 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
891,695 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,799 UART: [kat] ++
895,951 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,710 UART: [kat] HMAC-384Kdf
921,388 UART: [kat] LMS
1,169,700 UART: [kat] --
1,170,551 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 ready_for_fw is high
1,174,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,284 UART: [idev] Erasing UDS.KEYID = 0
1,199,564 UART: [idev] Sha1 KeyId Algorithm
1,208,474 UART: [idev] --
1,209,605 UART: [ldev] ++
1,209,773 UART: [ldev] CDI.KEYID = 6
1,210,137 UART: [ldev] SUBJECT.KEYID = 5
1,210,564 UART: [ldev] AUTHORITY.KEYID = 7
1,211,027 UART: [ldev] FE.KEYID = 1
1,216,305 UART: [ldev] Erasing FE.KEYID = 1
1,243,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,129 UART: [ldev] --
1,282,538 UART: [fwproc] Wait for Commands...
1,283,189 UART: [fwproc] Recv command 0x46574c44
1,283,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,501 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,794 >>> mbox cmd response: success
2,826,794 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,827,960 UART: [afmc] ++
2,828,128 UART: [afmc] CDI.KEYID = 6
2,828,491 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,864,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,605 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,354 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,064 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,945 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,646 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,497 UART: [afmc] --
2,908,384 UART: [cold-reset] --
2,909,174 UART: [state] Locking Datavault
2,910,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,679 UART: [state] Locking ICCM
2,911,299 UART: [exit] Launching FMC @ 0x40000130
2,916,629 UART:
2,916,645 UART: Running Caliptra FMC ...
2,917,053 UART:
2,917,196 UART: [state] CFI Enabled
2,927,634 UART: [fht] FMC Alias Private Key: 7
3,047,138 UART: [art] Extend RT PCRs Done
3,047,566 UART: [art] Lock RT PCRs Done
3,049,240 UART: [art] Populate DV Done
3,057,437 UART: [fht] FMC Alias Private Key: 7
3,058,603 UART: [art] Derive CDI
3,058,883 UART: [art] Store in slot 0x4
3,144,380 UART: [art] Derive Key Pair
3,144,740 UART: [art] Store priv key in slot 0x5
3,158,284 UART: [art] Derive Key Pair - Done
3,172,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,841 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,606 UART: [art] PUB.X = F4EFB83EF59D13DFF2609027D16DE6CF8006098FF0F4B25D91E086FB5F77BFB83042B78CDF3B0EA143DD0A3513107F04
3,196,375 UART: [art] PUB.Y = FB19945260A64F5B9DB0D9EDEB0CBF67AF84928F65FEFA93CA59EFD0D363F0130E5D4CF36D872E007BE01AB6394939F3
3,203,315 UART: [art] SIG.R = 74A85488D0E2D7A55CAA66257B927E5709475317946834FEE4782FC9E22790215A45C92B46CC62A5BADEE19EC8CEC1AF
3,210,088 UART: [art] SIG.S = 11EBBE120BAF27E97790C2A5FFF3E4637451D9C998E7B32FDDA2A249B46A8EB4A56E8E7BD15A2534F510E7B2FC5A46FD
3,234,011 UART: Caliptra RT
3,234,354 UART: [state] CFI Enabled
3,354,148 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,786 UART: [rt]cmd =0x49444549, len=4
3,387,257 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,079 ready_for_fw is high
1,059,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,961 >>> mbox cmd response: success
2,678,961 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,741,100 UART:
2,741,116 UART: Running Caliptra FMC ...
2,741,524 UART:
2,741,667 UART: [state] CFI Enabled
2,752,687 UART: [fht] FMC Alias Private Key: 7
2,871,495 UART: [art] Extend RT PCRs Done
2,871,923 UART: [art] Lock RT PCRs Done
2,873,657 UART: [art] Populate DV Done
2,881,862 UART: [fht] FMC Alias Private Key: 7
2,882,800 UART: [art] Derive CDI
2,883,080 UART: [art] Store in slot 0x4
2,969,107 UART: [art] Derive Key Pair
2,969,467 UART: [art] Store priv key in slot 0x5
2,982,893 UART: [art] Derive Key Pair - Done
2,997,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,459 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,224 UART: [art] PUB.X = 69735C65285C217FB2C9ADBC5A1CFCA9D55CA8C9B490DB30283776A5A6B0550546DDB959AEBF7CC51D17B6CC7D28C229
3,021,007 UART: [art] PUB.Y = 1C14851C0D769D2BDE28EF558B8B355AC5BE499B7B23B48BE2531953E96F5521EA4A51ED05977076659F1C4BEC2F14B1
3,027,957 UART: [art] SIG.R = 72A7D81BE21FD6102FB56C8B9C5D358A716D865D764C4B86B45FF9F1E2C5A4D28EC4A57892800CA50E651A7A6099AB0D
3,034,728 UART: [art] SIG.S = D3CAEC560270DBFB4F5FE9C12C19E5A7BA325F5838E6B7A2630908E861FE6F2FBC497C638F638CD4A8E012024D7410CD
3,058,280 UART: Caliptra RT
3,058,623 UART: [state] CFI Enabled
3,178,064 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,426 UART: [rt]cmd =0x49444549, len=4
3,210,849 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
893,314 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,439 UART: [kat] ++
897,591 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,258 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,172,141 UART: [cold-reset] ++
1,172,533 UART: [fht] FHT @ 0x50003400
1,175,090 UART: [idev] ++
1,175,258 UART: [idev] CDI.KEYID = 6
1,175,618 UART: [idev] SUBJECT.KEYID = 7
1,176,042 UART: [idev] UDS.KEYID = 0
1,176,387 ready_for_fw is high
1,176,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,201,673 UART: [idev] Sha1 KeyId Algorithm
1,210,047 UART: [idev] --
1,211,077 UART: [ldev] ++
1,211,245 UART: [ldev] CDI.KEYID = 6
1,211,608 UART: [ldev] SUBJECT.KEYID = 5
1,212,034 UART: [ldev] AUTHORITY.KEYID = 7
1,212,497 UART: [ldev] FE.KEYID = 1
1,217,803 UART: [ldev] Erasing FE.KEYID = 1
1,243,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,499 UART: [ldev] --
1,282,990 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,494 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,344 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,615 >>> mbox cmd response: success
2,828,615 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,829,725 UART: [afmc] ++
2,829,893 UART: [afmc] CDI.KEYID = 6
2,830,255 UART: [afmc] SUBJECT.KEYID = 7
2,830,680 UART: [afmc] AUTHORITY.KEYID = 5
2,866,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,073 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,723 UART: [afmc] --
2,909,631 UART: [cold-reset] --
2,910,683 UART: [state] Locking Datavault
2,911,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,318 UART: [state] Locking ICCM
2,912,806 UART: [exit] Launching FMC @ 0x40000130
2,918,136 UART:
2,918,152 UART: Running Caliptra FMC ...
2,918,560 UART:
2,918,614 UART: [state] CFI Enabled
2,929,290 UART: [fht] FMC Alias Private Key: 7
3,048,190 UART: [art] Extend RT PCRs Done
3,048,618 UART: [art] Lock RT PCRs Done
3,050,182 UART: [art] Populate DV Done
3,058,717 UART: [fht] FMC Alias Private Key: 7
3,059,649 UART: [art] Derive CDI
3,059,929 UART: [art] Store in slot 0x4
3,146,260 UART: [art] Derive Key Pair
3,146,620 UART: [art] Store priv key in slot 0x5
3,160,378 UART: [art] Derive Key Pair - Done
3,175,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,685 UART: [art] PUB.X = 35595E0B44496491A495987F54A72CCE9D49DE6EFD3B72633CE68A80C7E77550FA16068F23E9C14AA4E914C235ACEB5F
3,198,455 UART: [art] PUB.Y = B9C38264C5F7AC365CA63A14E6931190F3DB305A1D3CD0A8AB73ACFB1A0183A3778BCDC9263B862740AD0F5C69FE6324
3,205,411 UART: [art] SIG.R = 297193A19C994E90CFA49E232ACF49FD7B83F7AAB9DD7EAAAB6D0BF7B78EEB991BABFA102EF81D5D4D9D8A5330A285DC
3,212,208 UART: [art] SIG.S = 4F22766BAF860469CDBFCD69D88F0D237435C58FE069B61BF170F87B9A4695B723D7EE1CACD060CA3875DE7443B94BE6
3,236,118 UART: Caliptra RT
3,236,369 UART: [state] CFI Enabled
3,355,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,185 UART: [rt]cmd =0x49444549, len=4
3,388,432 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,541 ready_for_fw is high
1,059,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,032 >>> mbox cmd response: success
2,679,032 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,740,833 UART:
2,740,849 UART: Running Caliptra FMC ...
2,741,257 UART:
2,741,311 UART: [state] CFI Enabled
2,752,113 UART: [fht] FMC Alias Private Key: 7
2,871,303 UART: [art] Extend RT PCRs Done
2,871,731 UART: [art] Lock RT PCRs Done
2,873,313 UART: [art] Populate DV Done
2,881,284 UART: [fht] FMC Alias Private Key: 7
2,882,290 UART: [art] Derive CDI
2,882,570 UART: [art] Store in slot 0x4
2,967,975 UART: [art] Derive Key Pair
2,968,335 UART: [art] Store priv key in slot 0x5
2,981,411 UART: [art] Derive Key Pair - Done
2,996,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,082 UART: [art] PUB.X = 7D0892BB6A21DD809217285E8342DDFFD147C1065DDEE87B8594CB6FC4FEB772388824C42C4CC786A0C3C900420CFACF
3,019,833 UART: [art] PUB.Y = CF9431EAC7A9FAC08AE87665C5DA00CC4C35C6103A4F4E494D47EAB6B39D373C5BB892D624F296AD64BA26D202BCF32D
3,026,778 UART: [art] SIG.R = 0B81CA4F7C8AEB1FD52F6958120A96E7FB98FEF1C012D4B1C22F199F01C08897E7E3F7F5FD99358547FFC006E791F19C
3,033,548 UART: [art] SIG.S = DB3763DE924286A66551963803C9ACBD4F595BB89C19BE95D944E53E0D89D7B4E2C4E3E5C2018D64A87B6E79B4069253
3,057,462 UART: Caliptra RT
3,057,713 UART: [state] CFI Enabled
3,177,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,502 UART: [rt]cmd =0x49444549, len=4
3,210,669 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
901,896 UART: [kat] SHA2-256
903,836 UART: [kat] SHA2-384
906,641 UART: [kat] SHA2-512-ACC
908,542 UART: [kat] ECC-384
918,299 UART: [kat] HMAC-384Kdf
923,029 UART: [kat] LMS
1,171,357 UART: [kat] --
1,172,348 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,395 UART: [idev] ++
1,175,563 UART: [idev] CDI.KEYID = 6
1,175,923 UART: [idev] SUBJECT.KEYID = 7
1,176,347 UART: [idev] UDS.KEYID = 0
1,176,692 ready_for_fw is high
1,176,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,157 UART: [idev] Erasing UDS.KEYID = 0
1,201,284 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,930 UART: [ldev] ++
1,211,098 UART: [ldev] CDI.KEYID = 6
1,211,461 UART: [ldev] SUBJECT.KEYID = 5
1,211,887 UART: [ldev] AUTHORITY.KEYID = 7
1,212,350 UART: [ldev] FE.KEYID = 1
1,217,888 UART: [ldev] Erasing FE.KEYID = 1
1,244,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,992 UART: [ldev] --
1,283,475 UART: [fwproc] Wait for Commands...
1,284,145 UART: [fwproc] Recv command 0x46574c44
1,284,873 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,971 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,470 >>> mbox cmd response: success
2,828,470 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,829,696 UART: [afmc] ++
2,829,864 UART: [afmc] CDI.KEYID = 6
2,830,226 UART: [afmc] SUBJECT.KEYID = 7
2,830,651 UART: [afmc] AUTHORITY.KEYID = 5
2,865,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,995 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,587 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,288 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,022 UART: [afmc] --
2,909,064 UART: [cold-reset] --
2,909,878 UART: [state] Locking Datavault
2,911,145 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,749 UART: [state] Locking ICCM
2,912,313 UART: [exit] Launching FMC @ 0x40000130
2,917,643 UART:
2,917,659 UART: Running Caliptra FMC ...
2,918,067 UART:
2,918,210 UART: [state] CFI Enabled
2,929,148 UART: [fht] FMC Alias Private Key: 7
3,047,418 UART: [art] Extend RT PCRs Done
3,047,846 UART: [art] Lock RT PCRs Done
3,049,292 UART: [art] Populate DV Done
3,057,571 UART: [fht] FMC Alias Private Key: 7
3,058,629 UART: [art] Derive CDI
3,058,909 UART: [art] Store in slot 0x4
3,144,516 UART: [art] Derive Key Pair
3,144,876 UART: [art] Store priv key in slot 0x5
3,158,106 UART: [art] Derive Key Pair - Done
3,172,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,254 UART: [art] PUB.X = 176FC2E3F0C905D68C611C2F341CB22709E2EF8577C4E5DEAD262607BE82F6499748BE67BFED70268B5E398F22FB2C71
3,196,023 UART: [art] PUB.Y = BAADE4B8C0BB95FFD402281717A5E0684583F5938B63611194EDB72B9138E64A911B88BADA753463470522B312BBE108
3,202,964 UART: [art] SIG.R = 470C6D09C1A2EB62A4E2FA58A2D0BC48C2C3C9CF2553003BF57A4C2847022C474DF750A92584EC4BDA3752B5CB86849B
3,209,713 UART: [art] SIG.S = C7E5EEF3093654D32743825023E3D9489D98A18F552D9E32C16F261B5F75EEB2448D5F4D18983AEEFC494D75F03FA3D7
3,233,588 UART: Caliptra RT
3,233,931 UART: [state] CFI Enabled
3,353,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,064 UART: [rt]cmd =0x49444549, len=4
3,386,199 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,310 ready_for_fw is high
1,060,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,413 >>> mbox cmd response: success
2,679,413 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
2,741,204 UART:
2,741,220 UART: Running Caliptra FMC ...
2,741,628 UART:
2,741,771 UART: [state] CFI Enabled
2,752,423 UART: [fht] FMC Alias Private Key: 7
2,871,363 UART: [art] Extend RT PCRs Done
2,871,791 UART: [art] Lock RT PCRs Done
2,873,293 UART: [art] Populate DV Done
2,881,640 UART: [fht] FMC Alias Private Key: 7
2,882,592 UART: [art] Derive CDI
2,882,872 UART: [art] Store in slot 0x4
2,968,655 UART: [art] Derive Key Pair
2,969,015 UART: [art] Store priv key in slot 0x5
2,982,617 UART: [art] Derive Key Pair - Done
2,997,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,799 UART: [art] PUB.X = 0338D65C20C5789378DF4748FE4E17F8B66F5A071871E7370377116B4ED9634E0BD61A01231C99702931680EFAECD31D
3,020,545 UART: [art] PUB.Y = AE1741145FC9CECFA56008260A66AF9436C1493E445F86193F4DCA21B81EE4E3081623ED84C2DAD848BEC81A861A3B3A
3,027,496 UART: [art] SIG.R = 0F96FD77EC267E89D6516F756030E871C406D678B92E9A095346DA17672B6DD8AD2AE5716AD233FE3A84E907E97170F3
3,034,254 UART: [art] SIG.S = B7EF91BF7DDFE5EB9CB86AFE71EBEBF6B627D2AC0622E6213EBCCCB63F7C93EBFB219DF06446794D3BA0FDE7771D4BB5
3,057,717 UART: Caliptra RT
3,058,060 UART: [state] CFI Enabled
3,177,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,301 UART: [rt]cmd =0x49444549, len=4
3,210,642 >>> mbox cmd response data (104 bytes)
test test_info::test_idev_id_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,087 UART:
192,459 UART: Running Caliptra ROM ...
193,681 UART:
193,839 UART: [state] CFI Enabled
263,823 UART: [state] LifecycleState = Unprovisioned
265,803 UART: [state] DebugLocked = No
268,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,051 UART: [kat] SHA2-256
442,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,265 UART: [kat] ++
453,745 UART: [kat] sha1
465,405 UART: [kat] SHA2-256
468,055 UART: [kat] SHA2-384
473,269 UART: [kat] SHA2-512-ACC
475,638 UART: [kat] ECC-384
2,768,881 UART: [kat] HMAC-384Kdf
2,800,791 UART: [kat] LMS
3,991,046 UART: [kat] --
3,995,700 UART: [cold-reset] ++
3,997,917 UART: [fht] Storing FHT @ 0x50003400
4,010,620 UART: [idev] ++
4,011,228 UART: [idev] CDI.KEYID = 6
4,012,148 UART: [idev] SUBJECT.KEYID = 7
4,013,397 UART: [idev] UDS.KEYID = 0
4,014,402 ready_for_fw is high
4,014,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,520 UART: [idev] Erasing UDS.KEYID = 0
7,343,004 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,252 UART: [idev] --
7,369,074 UART: [ldev] ++
7,369,690 UART: [ldev] CDI.KEYID = 6
7,370,769 UART: [ldev] SUBJECT.KEYID = 5
7,371,879 UART: [ldev] AUTHORITY.KEYID = 7
7,373,055 UART: [ldev] FE.KEYID = 1
7,401,552 UART: [ldev] Erasing FE.KEYID = 1
10,732,754 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,039,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,054,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,498 UART: [ldev] --
13,092,227 UART: [fwproc] Waiting for Commands...
13,094,244 UART: [fwproc] Received command 0x46574c44
13,096,438 UART: [fwproc] Received Image of size 118548 bytes
17,206,300 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,157 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,281 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,688,309 >>> mbox cmd response: success
17,688,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,691,964 UART: [afmc] ++
17,692,570 UART: [afmc] CDI.KEYID = 6
17,693,456 UART: [afmc] SUBJECT.KEYID = 7
17,694,725 UART: [afmc] AUTHORITY.KEYID = 5
21,052,264 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,889 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,353,168 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,382,291 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,741 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,315 UART: [afmc] --
23,423,720 UART: [cold-reset] --
23,428,768 UART: [state] Locking Datavault
23,433,632 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,382 UART: [state] Locking ICCM
23,436,826 UART: [exit] Launching FMC @ 0x40000130
23,445,220 UART:
23,445,672 UART: Running Caliptra FMC ...
23,446,810 UART:
23,446,976 UART: [state] CFI Enabled
23,508,976 UART: [fht] FMC Alias Private Key: 7
25,849,249 UART: [art] Extend RT PCRs Done
25,850,467 UART: [art] Lock RT PCRs Done
25,852,216 UART: [art] Populate DV Done
25,857,841 UART: [fht] FMC Alias Private Key: 7
25,859,482 UART: [art] Derive CDI
25,860,295 UART: [art] Store in slot 0x4
25,917,794 UART: [art] Derive Key Pair
25,918,793 UART: [art] Store priv key in slot 0x5
29,211,473 UART: [art] Derive Key Pair - Done
29,224,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,675 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,184 UART: [art] PUB.X = 282B0421F874255AF6754C494EBEDBFC1A5724EFE5FD9DF624DAD15722F50F9EA09163BD1355649525054A72989F6310
31,522,440 UART: [art] PUB.Y = 9C02A333E915C164ED46501ABFDA5DBCB40C1E742865399002C208C1F2CF3D8D4AA5DAD6DDB57B17EF986EE1EBBEDD50
31,529,689 UART: [art] SIG.R = 3105C94D65B1A214237D360C203A3C5AC3E847995EBFA4138E34C3E8505D20B99D9240D47F906E751846C972BBB58B18
31,537,090 UART: [art] SIG.S = 36B633DC1F5AFD5200B80F334E65A6D1700F2D5C1047DFD6C5F23B7D53B22948B5F700B1B35C4F885B84BD4C9544BD58
32,842,232 UART: Caliptra RT
32,842,930 UART: [state] CFI Enabled
33,019,677 UART: [rt] RT listening for mailbox commands...
33,051,687 UART: [rt]cmd =0x44504543, len=96
38,821,735 >>> mbox cmd response data (6236 bytes)
40,925,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,076,438 UART:
41,076,829 UART: Running Caliptra ROM ...
41,077,907 UART:
41,078,066 UART: [state] CFI Enabled
41,135,451 UART: [state] LifecycleState = Unprovisioned
41,137,398 UART: [state] DebugLocked = No
41,139,353 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,143,712 UART: [kat] SHA2-256
41,313,426 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,323,902 UART: [kat] ++
41,324,395 UART: [kat] sha1
41,335,433 UART: [kat] SHA2-256
41,338,139 UART: [kat] SHA2-384
41,345,581 UART: [kat] SHA2-512-ACC
41,347,928 UART: [kat] ECC-384
43,638,984 UART: [kat] HMAC-384Kdf
43,670,656 UART: [kat] LMS
44,861,019 UART: [kat] --
44,866,730 UART: [update-reset] ++
49,058,158 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,061,279 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,459,075 >>> mbox cmd response: success
49,459,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,460,277 UART: [update-reset] Copying MAN_2 To MAN_1
49,482,715 UART: [update-reset Success] --
49,487,539 UART: [state] Locking Datavault
49,491,287 UART: [state] Locking PCR0, PCR1 and PCR31
49,493,038 UART: [state] Locking ICCM
49,495,463 UART: [exit] Launching FMC @ 0x40000130
49,503,856 UART:
49,504,090 UART: Running Caliptra FMC ...
49,505,143 UART:
49,505,297 UART: [state] CFI Enabled
49,613,037 UART: [art] Extend RT PCRs Done
49,614,248 UART: [art] Lock RT PCRs Done
49,615,463 UART: [art] Populate DV Done
49,620,762 UART: [fht] FMC Alias Private Key: 7
49,622,456 UART: [art] Derive CDI
49,623,328 UART: [art] Store in slot 0x4
49,681,800 UART: [art] Derive Key Pair
49,682,802 UART: [art] Store priv key in slot 0x5
52,976,706 UART: [art] Derive Key Pair - Done
52,989,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,278,320 UART: [art] Erasing AUTHORITY.KEYID = 7
55,279,841 UART: [art] PUB.X = 9F623F1A8D556A04931C6A858065ED50662D4D44DA8118F3033FFDA6EDD181BAA24427A27795C332CEAF87DC8AD2CADD
55,287,104 UART: [art] PUB.Y = 5C809466EBDA012F5E69663683A3F8483CFEEEB715C82E08DBDEA1439464DF7EF0522B9D19DFA7F862415EA4D83F20E0
55,294,390 UART: [art] SIG.R = DE9847FD38C29EE654EC47A94D3E1F680BBCF4DAD68722E2C1658711E1FFBA1ED849A57AD52C28DD4DE3D9BA901BACC6
55,301,775 UART: [art] SIG.S = 0970C7ECC1F0370EDDB70A2C732024D272C91CDFE567460D50041BFCD09A55430D3BEFB16578E7E6E567377BF7F7677A
56,606,345 UART: Caliptra RT
56,607,052 UART: [state] CFI Enabled
57,024,752 UART: [rt] RT listening for mailbox commands...
57,055,785 UART: [rt]cmd =0x494e464f, len=4
57,060,098 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,783,489 ready_for_fw is high
3,784,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,028 >>> mbox cmd response: success
17,936,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,625,937 UART:
23,626,362 UART: Running Caliptra FMC ...
23,627,688 UART:
23,627,858 UART: [state] CFI Enabled
23,697,570 UART: [fht] FMC Alias Private Key: 7
26,037,906 UART: [art] Extend RT PCRs Done
26,039,145 UART: [art] Lock RT PCRs Done
26,040,559 UART: [art] Populate DV Done
26,046,098 UART: [fht] FMC Alias Private Key: 7
26,047,697 UART: [art] Derive CDI
26,048,518 UART: [art] Store in slot 0x4
26,106,736 UART: [art] Derive Key Pair
26,107,783 UART: [art] Store priv key in slot 0x5
29,400,162 UART: [art] Derive Key Pair - Done
29,412,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,591 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,115 UART: [art] PUB.X = D4CE9860010F9C7A4B43B98FB48BB67144B8A3625F78F4E237056D20F45287606FD67691C154EB6831CEB736ADBAB185
31,711,354 UART: [art] PUB.Y = 310EB6A1D8317CEF73C09A7766579973BE28B884DE81B9E19C30A7C9E3B610E40C4C95C002D12EC7C9FE48BE64D95046
31,718,602 UART: [art] SIG.R = B51214BAEAE9E0C46DE84677606FE1DEF4504B674231E6A8DB22AC499F84DAAA7A7292DD230563C867AD1756073C286C
31,725,990 UART: [art] SIG.S = 0EC31DF41D378923A9FAEAB834EF5037BEA5853FD86C836CD087A202BE3A7E9126D9D79FC1C389ECA190E1656B219CD9
33,030,948 UART: Caliptra RT
33,031,690 UART: [state] CFI Enabled
33,210,912 UART: [rt] RT listening for mailbox commands...
33,242,922 UART: [rt]cmd =0x44504543, len=96
39,012,467 >>> mbox cmd response data (6236 bytes)
41,113,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,919,030 >>> mbox cmd response: success
49,919,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,954,821 UART:
49,955,148 UART: Running Caliptra FMC ...
49,956,189 UART:
49,956,342 UART: [state] CFI Enabled
50,054,198 UART: [art] Extend RT PCRs Done
50,055,398 UART: [art] Lock RT PCRs Done
50,057,022 UART: [art] Populate DV Done
50,062,332 UART: [fht] FMC Alias Private Key: 7
50,064,033 UART: [art] Derive CDI
50,064,776 UART: [art] Store in slot 0x4
50,123,587 UART: [art] Derive Key Pair
50,124,626 UART: [art] Store priv key in slot 0x5
53,417,522 UART: [art] Derive Key Pair - Done
53,430,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,718,885 UART: [art] Erasing AUTHORITY.KEYID = 7
55,720,402 UART: [art] PUB.X = ED006ED49EE69727AAD1AB95790C836EAD0D666DBD77DE4A472D6A5E1BEC13E2C4FD3D24AD0F27853A20D60071246319
55,727,655 UART: [art] PUB.Y = D3B8BDCA4A686596B6F89F95E3622C0B566651DAB1FBECAF143AE668A1B35E519E9D7F50DE31772C165D74095C7B3522
55,734,895 UART: [art] SIG.R = 2EE7A2B387EA88E8C5EA5F06523F474752BB87B59C09558704A36E26C92A533BD4BE691849BBCCC9CFF2B3A621061CD1
55,742,285 UART: [art] SIG.S = 4731250E40160333E3FCDAF98847180F811A8EE9744955FE308AD9B1BBF283D3FACEB1693109CFCC4E7967244157CEB0
57,047,495 UART: Caliptra RT
57,048,206 UART: [state] CFI Enabled
57,467,308 UART: [rt] RT listening for mailbox commands...
57,498,329 UART: [rt]cmd =0x494e464f, len=4
57,502,509 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,403 UART:
192,752 UART: Running Caliptra ROM ...
193,874 UART:
603,458 UART: [state] CFI Enabled
615,211 UART: [state] LifecycleState = Unprovisioned
617,144 UART: [state] DebugLocked = No
619,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,390 UART: [kat] SHA2-256
793,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,715 UART: [kat] ++
804,251 UART: [kat] sha1
816,262 UART: [kat] SHA2-256
818,992 UART: [kat] SHA2-384
825,192 UART: [kat] SHA2-512-ACC
827,551 UART: [kat] ECC-384
3,111,606 UART: [kat] HMAC-384Kdf
3,122,636 UART: [kat] LMS
4,312,775 UART: [kat] --
4,317,324 UART: [cold-reset] ++
4,318,533 UART: [fht] Storing FHT @ 0x50003400
4,329,788 UART: [idev] ++
4,330,343 UART: [idev] CDI.KEYID = 6
4,331,366 UART: [idev] SUBJECT.KEYID = 7
4,332,533 UART: [idev] UDS.KEYID = 0
4,333,498 ready_for_fw is high
4,333,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,569 UART: [idev] Erasing UDS.KEYID = 0
7,620,278 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,562 UART: [idev] --
7,645,823 UART: [ldev] ++
7,646,391 UART: [ldev] CDI.KEYID = 6
7,647,322 UART: [ldev] SUBJECT.KEYID = 5
7,648,593 UART: [ldev] AUTHORITY.KEYID = 7
7,649,859 UART: [ldev] FE.KEYID = 1
7,663,745 UART: [ldev] Erasing FE.KEYID = 1
10,949,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,276 UART: [ldev] --
13,308,045 UART: [fwproc] Waiting for Commands...
13,309,869 UART: [fwproc] Received command 0x46574c44
13,312,264 UART: [fwproc] Received Image of size 118548 bytes
17,410,867 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,483,588 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,556,763 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,885,252 >>> mbox cmd response: success
17,886,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,888,759 UART: [afmc] ++
17,889,334 UART: [afmc] CDI.KEYID = 6
17,890,293 UART: [afmc] SUBJECT.KEYID = 7
17,891,497 UART: [afmc] AUTHORITY.KEYID = 5
21,206,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,413 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,532,852 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,241 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,569,797 UART: [afmc] --
23,573,665 UART: [cold-reset] --
23,578,007 UART: [state] Locking Datavault
23,581,853 UART: [state] Locking PCR0, PCR1 and PCR31
23,583,606 UART: [state] Locking ICCM
23,584,677 UART: [exit] Launching FMC @ 0x40000130
23,593,076 UART:
23,593,310 UART: Running Caliptra FMC ...
23,594,403 UART:
23,594,551 UART: [state] CFI Enabled
23,602,643 UART: [fht] FMC Alias Private Key: 7
25,942,979 UART: [art] Extend RT PCRs Done
25,944,201 UART: [art] Lock RT PCRs Done
25,945,554 UART: [art] Populate DV Done
25,950,744 UART: [fht] FMC Alias Private Key: 7
25,952,299 UART: [art] Derive CDI
25,953,045 UART: [art] Store in slot 0x4
25,995,474 UART: [art] Derive Key Pair
25,996,468 UART: [art] Store priv key in slot 0x5
29,238,507 UART: [art] Derive Key Pair - Done
29,251,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,819 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,322 UART: [art] PUB.X = ACED7DCB933DB0402C39314089C7C8A23CBD42617F6581736ABD477DD401E4251B0FEC0303EB7BE952A539C58472C843
31,540,561 UART: [art] PUB.Y = C8497EF2ECCB6771A3A8B7B3280E3F6BD3A75A624E38D828F9D7A8D9A6D4FBF06AE802852C232C00DDB426FA40B1DA0B
31,547,834 UART: [art] SIG.R = 29B24C9C08B06AA3BFD2052C7B39BCA566276D8A499AF478EDE738E70734E54AC48E83FE9FF7E3595006AE7380D5542E
31,555,254 UART: [art] SIG.S = EEF7E0EA9384DA81AC581C4E77F3E7956DB485B21848EFAB74C2C1DF5A45EA2E31338D15F5A42750B6DFF4D7C0928495
32,860,617 UART: Caliptra RT
32,861,324 UART: [state] CFI Enabled
32,994,040 UART: [rt] RT listening for mailbox commands...
33,025,987 UART: [rt]cmd =0x44504543, len=96
38,700,204 >>> mbox cmd response data (6236 bytes)
40,800,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,951,034 UART:
40,951,417 UART: Running Caliptra ROM ...
40,952,551 UART:
40,952,723 UART: [state] CFI Enabled
40,964,673 UART: [state] LifecycleState = Unprovisioned
40,966,557 UART: [state] DebugLocked = No
40,968,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
40,974,069 UART: [kat] SHA2-256
41,143,766 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,154,319 UART: [kat] ++
41,154,859 UART: [kat] sha1
41,164,713 UART: [kat] SHA2-256
41,167,407 UART: [kat] SHA2-384
41,172,956 UART: [kat] SHA2-512-ACC
41,175,352 UART: [kat] ECC-384
43,461,474 UART: [kat] HMAC-384Kdf
43,473,617 UART: [kat] LMS
44,663,691 UART: [kat] --
44,669,597 UART: [update-reset] ++
48,861,158 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,864,387 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,262,148 >>> mbox cmd response: success
49,262,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,263,392 UART: [update-reset] Copying MAN_2 To MAN_1
49,285,816 UART: [update-reset Success] --
49,291,175 UART: [state] Locking Datavault
49,294,580 UART: [state] Locking PCR0, PCR1 and PCR31
49,296,336 UART: [state] Locking ICCM
49,298,748 UART: [exit] Launching FMC @ 0x40000130
49,307,187 UART:
49,307,414 UART: Running Caliptra FMC ...
49,308,506 UART:
49,308,683 UART: [state] CFI Enabled
49,352,640 UART: [art] Extend RT PCRs Done
49,353,820 UART: [art] Lock RT PCRs Done
49,355,270 UART: [art] Populate DV Done
49,360,454 UART: [fht] FMC Alias Private Key: 7
49,362,207 UART: [art] Derive CDI
49,363,079 UART: [art] Store in slot 0x4
49,405,397 UART: [art] Derive Key Pair
49,406,431 UART: [art] Store priv key in slot 0x5
52,648,984 UART: [art] Derive Key Pair - Done
52,662,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,942,521 UART: [art] Erasing AUTHORITY.KEYID = 7
54,944,025 UART: [art] PUB.X = B8353ABE4D3D60AA90FF03FC22EB037A6C624271D52401A95C34B7E8CF3F032452C83DAEB13A9475583794E539EF195D
54,951,319 UART: [art] PUB.Y = B75837A374F3349A99ECB8C3B342BE67A946453CC458A4F9FBD2CB80C607BD73F5E5F43225B9FEBC0D5725E615C9AD25
54,958,546 UART: [art] SIG.R = BBF84B11BF32AE166776918DD58146A8617A7D9E99CE0793A072F11766A5F3BDAE0569DE1E1AB3DA47718BC892EDDD6C
54,965,975 UART: [art] SIG.S = 3337D723F3851522F61F5B9408151A058D282DA773CC8DFD455377F4921D587F97B86B92B250853D2AFC8D776DB356A4
56,271,536 UART: Caliptra RT
56,272,354 UART: [state] CFI Enabled
56,644,262 UART: [rt] RT listening for mailbox commands...
56,675,391 UART: [rt]cmd =0x494e464f, len=4
56,679,698 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,124,563 ready_for_fw is high
4,124,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,880 >>> mbox cmd response: success
18,162,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,799,083 UART:
23,799,482 UART: Running Caliptra FMC ...
23,800,623 UART:
23,800,785 UART: [state] CFI Enabled
23,808,573 UART: [fht] FMC Alias Private Key: 7
26,148,123 UART: [art] Extend RT PCRs Done
26,149,356 UART: [art] Lock RT PCRs Done
26,151,193 UART: [art] Populate DV Done
26,156,721 UART: [fht] FMC Alias Private Key: 7
26,158,279 UART: [art] Derive CDI
26,159,092 UART: [art] Store in slot 0x4
26,201,479 UART: [art] Derive Key Pair
26,202,525 UART: [art] Store priv key in slot 0x5
29,445,166 UART: [art] Derive Key Pair - Done
29,458,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,942 UART: [art] PUB.X = 4485A4462199329B8A9E042E26A5D9A301A912AEF9AFFC8A5E97C55EBF9F1A974C5A7CE43DAC2D05D452305EF2C31DAC
31,747,201 UART: [art] PUB.Y = F8058FA5D07DF777808C565563F1C84F0AF76A163DE0CD83AE03D4B6C7C7EBF2CD066DEC914FFDA9BD1C3A568ACDC7F9
31,754,458 UART: [art] SIG.R = CBA2178665F7A5DBA860950E95E1A16418A8053C0A85945F6DAA4A8AEBE996A59365D7CFC13E85E24B77F4E4E13F4234
31,761,848 UART: [art] SIG.S = 239F8045C91484184B977F4788EF93F049400F8A467A71E6F6D281ADEF6AC8BC175925AA5CBB62F33E7D8FBFC9E3D342
33,066,948 UART: Caliptra RT
33,067,653 UART: [state] CFI Enabled
33,201,082 UART: [rt] RT listening for mailbox commands...
33,233,295 UART: [rt]cmd =0x44504543, len=96
38,907,908 >>> mbox cmd response data (6236 bytes)
41,008,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,771,071 >>> mbox cmd response: success
49,771,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,807,037 UART:
49,807,321 UART: Running Caliptra FMC ...
49,808,439 UART:
49,808,598 UART: [state] CFI Enabled
49,852,789 UART: [art] Extend RT PCRs Done
49,853,976 UART: [art] Lock RT PCRs Done
49,855,405 UART: [art] Populate DV Done
49,861,035 UART: [fht] FMC Alias Private Key: 7
49,862,698 UART: [art] Derive CDI
49,863,510 UART: [art] Store in slot 0x4
49,906,257 UART: [art] Derive Key Pair
49,907,253 UART: [art] Store priv key in slot 0x5
53,149,384 UART: [art] Derive Key Pair - Done
53,162,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,442,944 UART: [art] Erasing AUTHORITY.KEYID = 7
55,444,459 UART: [art] PUB.X = 74C573C91800995EBEE22539F654D195A6482BC60D3FE32325425376A7AF4AFA3600555D2216232D596F57BBCD441EAE
55,451,670 UART: [art] PUB.Y = 506C864D44653863C9D64D624ADCEF17442861A97E82090191C8CE6E6D6AD53B226D988851A84C37146BE56FE45EA16F
55,458,909 UART: [art] SIG.R = 0772E08E80D640C9922E9D796A0DE224E897C828017C4E87C66C4D46150A0D5835BA9A81914D40829EC8D388E0616C2E
55,466,301 UART: [art] SIG.S = 5459668497A33E14BDFE5CB79BADFF46E460768C0A63AA13C4503ADF81D032BF6CE5E593267575750F118A47E4C56201
56,772,097 UART: Caliptra RT
56,772,815 UART: [state] CFI Enabled
57,139,143 UART: [rt] RT listening for mailbox commands...
57,170,050 UART: [rt]cmd =0x494e464f, len=4
57,174,494 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,186 UART:
192,571 UART: Running Caliptra ROM ...
193,666 UART:
193,808 UART: [state] CFI Enabled
265,374 UART: [state] LifecycleState = Unprovisioned
267,403 UART: [state] DebugLocked = No
269,707 UART: [state] WD Timer not started. Device not locked for debugging
274,378 UART: [kat] SHA2-256
454,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,818 UART: [kat] ++
465,271 UART: [kat] sha1
475,006 UART: [kat] SHA2-256
477,734 UART: [kat] SHA2-384
483,006 UART: [kat] SHA2-512-ACC
485,376 UART: [kat] ECC-384
2,946,748 UART: [kat] HMAC-384Kdf
2,971,638 UART: [kat] LMS
3,448,178 UART: [kat] --
3,451,176 UART: [cold-reset] ++
3,452,142 UART: [fht] FHT @ 0x50003400
3,463,124 UART: [idev] ++
3,463,710 UART: [idev] CDI.KEYID = 6
3,464,591 UART: [idev] SUBJECT.KEYID = 7
3,465,833 UART: [idev] UDS.KEYID = 0
3,466,804 ready_for_fw is high
3,466,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,056 UART: [idev] Erasing UDS.KEYID = 0
5,985,351 UART: [idev] Sha1 KeyId Algorithm
6,008,597 UART: [idev] --
6,013,569 UART: [ldev] ++
6,014,138 UART: [ldev] CDI.KEYID = 6
6,015,104 UART: [ldev] SUBJECT.KEYID = 5
6,016,264 UART: [ldev] AUTHORITY.KEYID = 7
6,017,550 UART: [ldev] FE.KEYID = 1
6,056,983 UART: [ldev] Erasing FE.KEYID = 1
8,567,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,793 UART: [ldev] --
10,372,822 UART: [fwproc] Wait for Commands...
10,375,841 UART: [fwproc] Recv command 0x46574c44
10,377,825 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,426 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,182 >>> mbox cmd response: success
14,345,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,348,142 UART: [afmc] ++
14,348,728 UART: [afmc] CDI.KEYID = 6
14,349,669 UART: [afmc] SUBJECT.KEYID = 7
14,350,879 UART: [afmc] AUTHORITY.KEYID = 5
16,894,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,168 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,340 UART: [afmc] --
18,696,462 UART: [cold-reset] --
18,702,224 UART: [state] Locking Datavault
18,708,010 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,759 UART: [state] Locking ICCM
18,711,414 UART: [exit] Launching FMC @ 0x40000130
18,719,802 UART:
18,720,039 UART: Running Caliptra FMC ...
18,721,142 UART:
18,721,299 UART: [state] CFI Enabled
18,777,926 UART: [fht] FMC Alias Private Key: 7
20,544,060 UART: [art] Extend RT PCRs Done
20,545,287 UART: [art] Lock RT PCRs Done
20,547,151 UART: [art] Populate DV Done
20,552,558 UART: [fht] FMC Alias Private Key: 7
20,554,304 UART: [art] Derive CDI
20,555,037 UART: [art] Store in slot 0x4
20,610,106 UART: [art] Derive Key Pair
20,611,146 UART: [art] Store priv key in slot 0x5
23,073,567 UART: [art] Derive Key Pair - Done
23,086,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,422 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,907 UART: [art] PUB.X = BDA73A399BD06273C6EECC3A2300D824447F565F74930D71FC72860EB39A1EDA491399D342F4C4B66EBD09D9F7F2590D
24,808,203 UART: [art] PUB.Y = 3BFC8752CCB1C8F94CE349DDC7BA43F21E4243CD714F71D6204A39222F14604AC569284A44F9A992739D084025C047AE
24,815,428 UART: [art] SIG.R = 00CECB7F4FDDA926EDBAD903F3D1BE534D9F28FC015BC60A22A39F76F11B6FE4727FA8EF0AAB010909A021729DBF8F8E
24,822,825 UART: [art] SIG.S = B7CD5A0BC52F3AE4FCBBCFAEB0B46937FB1D07AFE414114B4AF2D8F2D408ED835EFC7FDB8013EFAB1287A136E0FF0509
25,801,821 UART: Caliptra RT
25,802,530 UART: [state] CFI Enabled
25,983,137 UART: [rt] RT listening for mailbox commands...
26,015,205 UART: [rt]cmd =0x44504543, len=96
30,381,317 >>> mbox cmd response data (6236 bytes)
32,467,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,618,311 UART:
32,618,691 UART: Running Caliptra ROM ...
32,619,825 UART:
32,619,993 UART: [state] CFI Enabled
32,689,794 UART: [state] LifecycleState = Unprovisioned
32,691,722 UART: [state] DebugLocked = No
32,694,260 UART: [state] WD Timer not started. Device not locked for debugging
32,698,861 UART: [kat] SHA2-256
32,878,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,889,293 UART: [kat] ++
32,889,826 UART: [kat] sha1
32,900,985 UART: [kat] SHA2-256
32,903,727 UART: [kat] SHA2-384
32,909,378 UART: [kat] SHA2-512-ACC
32,911,718 UART: [kat] ECC-384
35,376,123 UART: [kat] HMAC-384Kdf
35,398,897 UART: [kat] LMS
35,875,361 UART: [kat] --
35,878,776 UART: [update-reset] ++
39,381,257 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,384,968 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,782,546 >>> mbox cmd response: success
39,782,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,783,374 UART: [update-reset] Copying MAN_2 To MAN_1
39,820,491 UART: [update-reset Success] --
39,824,074 UART: [state] Locking Datavault
39,828,200 UART: [state] Locking PCR0, PCR1 and PCR31
39,829,946 UART: [state] Locking ICCM
39,831,984 UART: [exit] Launching FMC @ 0x40000130
39,840,375 UART:
39,840,612 UART: Running Caliptra FMC ...
39,841,709 UART:
39,841,867 UART: [state] CFI Enabled
39,931,142 UART: [art] Extend RT PCRs Done
39,932,323 UART: [art] Lock RT PCRs Done
39,933,612 UART: [art] Populate DV Done
39,938,961 UART: [fht] FMC Alias Private Key: 7
39,940,553 UART: [art] Derive CDI
39,941,381 UART: [art] Store in slot 0x4
40,000,445 UART: [art] Derive Key Pair
40,001,490 UART: [art] Store priv key in slot 0x5
42,463,968 UART: [art] Derive Key Pair - Done
42,476,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,188,509 UART: [art] Erasing AUTHORITY.KEYID = 7
44,190,012 UART: [art] PUB.X = 4780651B5D92019D4E37CDAADF63CC14AA7E486854F517B35477A06FD3389EC65215F45D362934F73D61445BFBDC2D7D
44,197,319 UART: [art] PUB.Y = C49B7D267926F39ED729B75275EE05C0B090CE5633561984F72F131F7FF76CD45A9035BEBCB585F9E6AAE134424CD698
44,204,584 UART: [art] SIG.R = 093B367F0B0F3F6E2C881CE0B0D2A10E2759B21A17847681AFB7206714FD3D9FF39702E65480A6D9FEB0439552208288
44,211,936 UART: [art] SIG.S = A57092281543FFBD5E01297F6D69F07654FC02B9A20AE36CFCBC6EAABEB4F2118AF960565CC1DAFB98652DAEB6E66CA6
45,190,447 UART: Caliptra RT
45,191,146 UART: [state] CFI Enabled
45,613,464 UART: [rt] RT listening for mailbox commands...
45,644,379 UART: [rt]cmd =0x494e464f, len=4
45,648,686 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,461,138 ready_for_fw is high
3,461,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,241 >>> mbox cmd response: success
14,226,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,514,812 UART:
18,515,196 UART: Running Caliptra FMC ...
18,516,307 UART:
18,516,460 UART: [state] CFI Enabled
18,580,395 UART: [fht] FMC Alias Private Key: 7
20,367,408 UART: [art] Extend RT PCRs Done
20,368,641 UART: [art] Lock RT PCRs Done
20,370,461 UART: [art] Populate DV Done
20,376,049 UART: [fht] FMC Alias Private Key: 7
20,377,539 UART: [art] Derive CDI
20,378,481 UART: [art] Store in slot 0x4
20,432,011 UART: [art] Derive Key Pair
20,433,021 UART: [art] Store priv key in slot 0x5
22,895,568 UART: [art] Derive Key Pair - Done
22,908,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,583 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,103 UART: [art] PUB.X = 75953736CC25A7F7B7BD7270AED8F6DF619A8CF09334A9A03AA2C87DA18ABEAD832609045F10DF567CEDA3CBF3BF412F
24,630,373 UART: [art] PUB.Y = 5AA0200D3816AA312F29823424FEEB90859EAB50A517DB7D112C97E2C9544EDA5019A9B7F5B3CD9AA824FBD356C04AF7
24,637,626 UART: [art] SIG.R = 6143DE590832E0CA1664D06A0F8C3F08774D430B69DD9B46F84483DA52D2679FC81FE66DCBB4F27A9FA1C841321FC98A
24,645,030 UART: [art] SIG.S = 344C83763BEAF216A110ECB14996D5D9698B1A0A5F2F9481211210259F93458EF682F4E63441CF283DD070BAC8C7AB46
25,624,057 UART: Caliptra RT
25,624,776 UART: [state] CFI Enabled
25,805,759 UART: [rt] RT listening for mailbox commands...
25,838,037 UART: [rt]cmd =0x44504543, len=96
30,203,179 >>> mbox cmd response data (6236 bytes)
32,288,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,599,115 >>> mbox cmd response: success
39,599,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,634,022 UART:
39,634,314 UART: Running Caliptra FMC ...
39,635,394 UART:
39,635,546 UART: [state] CFI Enabled
39,729,469 UART: [art] Extend RT PCRs Done
39,730,663 UART: [art] Lock RT PCRs Done
39,731,986 UART: [art] Populate DV Done
39,737,457 UART: [fht] FMC Alias Private Key: 7
39,739,096 UART: [art] Derive CDI
39,739,849 UART: [art] Store in slot 0x4
39,799,405 UART: [art] Derive Key Pair
39,800,408 UART: [art] Store priv key in slot 0x5
42,263,066 UART: [art] Derive Key Pair - Done
42,276,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,988,784 UART: [art] Erasing AUTHORITY.KEYID = 7
43,990,299 UART: [art] PUB.X = D110A5EB2C48CD345F0933A4AF1BAF081CD3B6982ECAE9652F4D076BB81BD894854590A340FE71E33033259C2C8EE5F8
43,997,560 UART: [art] PUB.Y = A2204B5E0E43D536FDE7C1C4E76AAEC6AF7249DB5CFA39C5F3B1C8B87E1625F2847132A4335CDFF3E1332799B5F84707
44,004,854 UART: [art] SIG.R = 0D60197CCA408203B3BE411B6D6515F83B4791C4074A2AF7D6830C53E834C35DF9D6EA1F1786D27C9763A3001720431E
44,012,204 UART: [art] SIG.S = BAEFB6A3DAEA4D68B7B7F6C0ABACFCD8E208640137858416993D33940796E2E55795D640E0349BF9449BD0A7815CF96B
44,990,497 UART: Caliptra RT
44,991,217 UART: [state] CFI Enabled
45,411,054 UART: [rt] RT listening for mailbox commands...
45,442,100 UART: [rt]cmd =0x494e464f, len=4
45,446,462 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,513 UART:
192,873 UART: Running Caliptra ROM ...
194,086 UART:
603,846 UART: [state] CFI Enabled
615,397 UART: [state] LifecycleState = Unprovisioned
617,343 UART: [state] DebugLocked = No
618,872 UART: [state] WD Timer not started. Device not locked for debugging
622,275 UART: [kat] SHA2-256
801,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,681 UART: [kat] ++
813,199 UART: [kat] sha1
824,354 UART: [kat] SHA2-256
827,071 UART: [kat] SHA2-384
832,498 UART: [kat] SHA2-512-ACC
834,886 UART: [kat] ECC-384
3,277,324 UART: [kat] HMAC-384Kdf
3,289,278 UART: [kat] LMS
3,765,775 UART: [kat] --
3,771,280 UART: [cold-reset] ++
3,772,359 UART: [fht] FHT @ 0x50003400
3,784,048 UART: [idev] ++
3,784,626 UART: [idev] CDI.KEYID = 6
3,785,628 UART: [idev] SUBJECT.KEYID = 7
3,786,746 UART: [idev] UDS.KEYID = 0
3,787,731 ready_for_fw is high
3,787,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,777 UART: [idev] Erasing UDS.KEYID = 0
6,267,786 UART: [idev] Sha1 KeyId Algorithm
6,290,149 UART: [idev] --
6,293,580 UART: [ldev] ++
6,294,230 UART: [ldev] CDI.KEYID = 6
6,295,115 UART: [ldev] SUBJECT.KEYID = 5
6,296,330 UART: [ldev] AUTHORITY.KEYID = 7
6,297,568 UART: [ldev] FE.KEYID = 1
6,307,106 UART: [ldev] Erasing FE.KEYID = 1
8,789,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,407 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,391 UART: [ldev] --
10,584,630 UART: [fwproc] Wait for Commands...
10,586,292 UART: [fwproc] Recv command 0x46574c44
10,588,284 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,939 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,578 >>> mbox cmd response: success
14,549,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,551,825 UART: [afmc] ++
14,552,417 UART: [afmc] CDI.KEYID = 6
14,553,355 UART: [afmc] SUBJECT.KEYID = 7
14,554,574 UART: [afmc] AUTHORITY.KEYID = 5
17,057,957 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,883 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,550 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,743 UART: [afmc] --
18,857,563 UART: [cold-reset] --
18,860,566 UART: [state] Locking Datavault
18,866,050 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,812 UART: [state] Locking ICCM
18,870,346 UART: [exit] Launching FMC @ 0x40000130
18,878,745 UART:
18,878,985 UART: Running Caliptra FMC ...
18,880,091 UART:
18,880,257 UART: [state] CFI Enabled
18,888,088 UART: [fht] FMC Alias Private Key: 7
20,654,293 UART: [art] Extend RT PCRs Done
20,655,512 UART: [art] Lock RT PCRs Done
20,657,004 UART: [art] Populate DV Done
20,662,368 UART: [fht] FMC Alias Private Key: 7
20,664,120 UART: [art] Derive CDI
20,664,863 UART: [art] Store in slot 0x4
20,707,789 UART: [art] Derive Key Pair
20,708,832 UART: [art] Store priv key in slot 0x5
23,136,392 UART: [art] Derive Key Pair - Done
23,149,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,589 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,087 UART: [art] PUB.X = A035A4807A28B59F0C76E79F287A8F99CBBBD7982F3450DD99051BACCDB93A5316D04BFD6943CBA1A7433CA91F8D461E
24,864,399 UART: [art] PUB.Y = D84B27EA7D3C55D3595297E6205FE0CA7F70F6307D45A5A1C41D03B41A3657DF2F68C5BBA5556B45C5F34ADCD5DA358C
24,871,693 UART: [art] SIG.R = DFD165AF2E8A4037887BBB1A2A326F472B6BC27009000F0AE29E4214122CC8EF34694E57CB2B435445A51246F1468B06
24,879,028 UART: [art] SIG.S = 9A190AE5CF73F463D17561D21E525CCBDDED1031A799235A813E41884459856085FEF109CC6A12B5A0B38013509A9D48
25,857,300 UART: Caliptra RT
25,857,992 UART: [state] CFI Enabled
25,991,650 UART: [rt] RT listening for mailbox commands...
26,023,872 UART: [rt]cmd =0x44504543, len=96
30,309,372 >>> mbox cmd response data (6236 bytes)
32,396,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,547,077 UART:
32,547,450 UART: Running Caliptra ROM ...
32,548,586 UART:
32,548,758 UART: [state] CFI Enabled
32,561,679 UART: [state] LifecycleState = Unprovisioned
32,563,632 UART: [state] DebugLocked = No
32,565,180 UART: [state] WD Timer not started. Device not locked for debugging
32,568,703 UART: [kat] SHA2-256
32,748,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,759,193 UART: [kat] ++
32,759,648 UART: [kat] sha1
32,771,507 UART: [kat] SHA2-256
32,774,168 UART: [kat] SHA2-384
32,780,609 UART: [kat] SHA2-512-ACC
32,783,016 UART: [kat] ECC-384
35,227,606 UART: [kat] HMAC-384Kdf
35,239,300 UART: [kat] LMS
35,715,776 UART: [kat] --
35,720,198 UART: [update-reset] ++
39,225,651 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,229,239 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,626,830 >>> mbox cmd response: success
39,627,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,628,345 UART: [update-reset] Copying MAN_2 To MAN_1
39,665,471 UART: [update-reset Success] --
39,668,012 UART: [state] Locking Datavault
39,672,366 UART: [state] Locking PCR0, PCR1 and PCR31
39,674,066 UART: [state] Locking ICCM
39,675,873 UART: [exit] Launching FMC @ 0x40000130
39,684,273 UART:
39,684,508 UART: Running Caliptra FMC ...
39,685,555 UART:
39,685,706 UART: [state] CFI Enabled
39,729,664 UART: [art] Extend RT PCRs Done
39,730,852 UART: [art] Lock RT PCRs Done
39,732,174 UART: [art] Populate DV Done
39,737,589 UART: [fht] FMC Alias Private Key: 7
39,739,072 UART: [art] Derive CDI
39,739,838 UART: [art] Store in slot 0x4
39,782,434 UART: [art] Derive Key Pair
39,783,438 UART: [art] Store priv key in slot 0x5
42,209,872 UART: [art] Derive Key Pair - Done
42,223,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,929,637 UART: [art] Erasing AUTHORITY.KEYID = 7
43,931,157 UART: [art] PUB.X = E54E861F379875949F927E39EDC55831C0A1A9ED5CEA0E9BE1A5F5596279734B85A44789CEF4CAC23F545053AAB631E9
43,938,408 UART: [art] PUB.Y = 010B7E8C04E53D52F412BC94A3977DF800F9BFC96D6E4AF01EBD7FA3A3220219BFC291F33848359CEC3E51EA2F366761
43,945,703 UART: [art] SIG.R = 313A2F3F557760DED4898FFA68955042BE03AADF445D523D8E1C25650672E945B5133D885E17A6F9149CDEE13978605D
43,953,061 UART: [art] SIG.S = F43C6888DE1FD5F4B7D951CEA624D06FF1AFBFD97CFC059DEBF37223A23DA69DC67F88674FC72C21432DC1F9B6A94343
44,932,007 UART: Caliptra RT
44,932,709 UART: [state] CFI Enabled
45,310,059 UART: [rt] RT listening for mailbox commands...
45,341,285 UART: [rt]cmd =0x494e464f, len=4
45,345,651 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
3,779,103 ready_for_fw is high
3,779,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,806 >>> mbox cmd response: success
14,452,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,695,326 UART:
18,695,717 UART: Running Caliptra FMC ...
18,696,831 UART:
18,696,993 UART: [state] CFI Enabled
18,705,047 UART: [fht] FMC Alias Private Key: 7
20,471,430 UART: [art] Extend RT PCRs Done
20,472,653 UART: [art] Lock RT PCRs Done
20,474,040 UART: [art] Populate DV Done
20,479,152 UART: [fht] FMC Alias Private Key: 7
20,480,831 UART: [art] Derive CDI
20,481,575 UART: [art] Store in slot 0x4
20,524,709 UART: [art] Derive Key Pair
20,525,714 UART: [art] Store priv key in slot 0x5
22,952,792 UART: [art] Derive Key Pair - Done
22,965,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,130 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,633 UART: [art] PUB.X = 6C843A88198A84FB3A5728BBAECE1D5FBB57834F19E301B3B09010298A2E049E5A098700DA60BEB3DC490E61C9E08365
24,680,893 UART: [art] PUB.Y = 603C152224575FFBCEE7898E81A35453205C8D93475F14C0411C9BB5E509B4D7930E07267E1B23E02944D310F4CB5EE8
24,688,149 UART: [art] SIG.R = 83B1F0F06C19E854CA53ADFB3A412952D93DC1A5C0F2288E60AE15094CF78D90F0B6CE097C5BB0340BD6D25CC0EA66B5
24,695,585 UART: [art] SIG.S = D7F0468E1545381199BE896F3C974B8C69BFAB50C7CB74A3E8F3BF1C011B561BB3E0F199A9B11093B57FC89DACF7BF1F
25,675,060 UART: Caliptra RT
25,675,757 UART: [state] CFI Enabled
25,809,027 UART: [rt] RT listening for mailbox commands...
25,841,227 UART: [rt]cmd =0x44504543, len=96
30,127,111 >>> mbox cmd response data (6236 bytes)
32,220,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,448,816 >>> mbox cmd response: success
39,449,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,484,870 UART:
39,485,159 UART: Running Caliptra FMC ...
39,486,198 UART:
39,486,350 UART: [state] CFI Enabled
39,529,746 UART: [art] Extend RT PCRs Done
39,530,945 UART: [art] Lock RT PCRs Done
39,532,435 UART: [art] Populate DV Done
39,537,962 UART: [fht] FMC Alias Private Key: 7
39,539,620 UART: [art] Derive CDI
39,540,380 UART: [art] Store in slot 0x4
39,583,094 UART: [art] Derive Key Pair
39,584,142 UART: [art] Store priv key in slot 0x5
42,011,004 UART: [art] Derive Key Pair - Done
42,023,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,730,160 UART: [art] Erasing AUTHORITY.KEYID = 7
43,731,669 UART: [art] PUB.X = A08AE81963D0849ABA562DEC670767A22815B2191AF85053A4039ABD9C72E390846C5354D4E568E5BB2BB70171FDB8F4
43,738,946 UART: [art] PUB.Y = D06CC38BB46FD6997D22048A23E224DC31B21C66B86C8A72B5343803E5075E72825B7F4FC6D3B66CCE4B1BA65F07FCB1
43,746,201 UART: [art] SIG.R = 873943FD94ADF442586F6A5E68D3C0AA15B012B57193897CC0C815EFCAA3E213A903F373792CE147A64A43D764411A4D
43,753,608 UART: [art] SIG.S = 6B2FE9884C5D18CD499F6A1644A9EBDE5EEAECDB31CB0F98B06F3D681DC978EE793FA04CD19EE3CCD3E256FF8CB947BE
44,732,411 UART: Caliptra RT
44,733,120 UART: [state] CFI Enabled
45,109,842 UART: [rt] RT listening for mailbox commands...
45,141,043 UART: [rt]cmd =0x494e464f, len=4
45,145,272 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,129 UART:
192,493 UART: Running Caliptra ROM ...
193,661 UART:
193,836 UART: [state] CFI Enabled
264,149 UART: [state] LifecycleState = Unprovisioned
266,571 UART: [state] DebugLocked = No
268,677 UART: [state] WD Timer not started. Device not locked for debugging
273,571 UART: [kat] SHA2-256
463,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,187 UART: [kat] ++
474,657 UART: [kat] sha1
484,961 UART: [kat] SHA2-256
487,967 UART: [kat] SHA2-384
493,671 UART: [kat] SHA2-512-ACC
496,246 UART: [kat] ECC-384
2,948,212 UART: [kat] HMAC-384Kdf
2,971,889 UART: [kat] LMS
3,503,656 UART: [kat] --
3,508,743 UART: [cold-reset] ++
3,510,698 UART: [fht] FHT @ 0x50003400
3,521,957 UART: [idev] ++
3,522,657 UART: [idev] CDI.KEYID = 6
3,523,605 UART: [idev] SUBJECT.KEYID = 7
3,524,841 UART: [idev] UDS.KEYID = 0
3,525,732 ready_for_fw is high
3,525,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,969 UART: [idev] Erasing UDS.KEYID = 0
6,027,931 UART: [idev] Sha1 KeyId Algorithm
6,048,782 UART: [idev] --
6,053,774 UART: [ldev] ++
6,054,469 UART: [ldev] CDI.KEYID = 6
6,055,358 UART: [ldev] SUBJECT.KEYID = 5
6,056,599 UART: [ldev] AUTHORITY.KEYID = 7
6,057,732 UART: [ldev] FE.KEYID = 1
6,102,587 UART: [ldev] Erasing FE.KEYID = 1
8,608,082 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,844 UART: [ldev] --
10,417,055 UART: [fwproc] Wait for Commands...
10,420,283 UART: [fwproc] Recv command 0x46574c44
10,422,586 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,941 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,699 >>> mbox cmd response: success
14,680,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,684,611 UART: [afmc] ++
14,685,302 UART: [afmc] CDI.KEYID = 6
14,686,561 UART: [afmc] SUBJECT.KEYID = 7
14,687,995 UART: [afmc] AUTHORITY.KEYID = 5
17,216,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,994 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,208 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,144 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,592 UART: [afmc] --
19,033,868 UART: [cold-reset] --
19,037,402 UART: [state] Locking Datavault
19,043,945 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,127 UART: [state] Locking ICCM
19,048,543 UART: [exit] Launching FMC @ 0x40000130
19,057,210 UART:
19,057,445 UART: Running Caliptra FMC ...
19,058,567 UART:
19,058,727 UART: [state] CFI Enabled
19,116,626 UART: [fht] FMC Alias Private Key: 7
20,882,960 UART: [art] Extend RT PCRs Done
20,884,184 UART: [art] Lock RT PCRs Done
20,885,352 UART: [art] Populate DV Done
20,890,703 UART: [fht] FMC Alias Private Key: 7
20,892,346 UART: [art] Derive CDI
20,893,155 UART: [art] Store in slot 0x4
20,949,627 UART: [art] Derive Key Pair
20,950,665 UART: [art] Store priv key in slot 0x5
23,413,189 UART: [art] Derive Key Pair - Done
23,425,916 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,301 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,807 UART: [art] PUB.X = D6BE11A4177030541544B2117A7A8A81B9CBA2BEF0EA412D9FC89525E026A33429FDC96340C633AF1F2F3AA34675B1C6
25,148,111 UART: [art] PUB.Y = 1AB2761746B28582FD282492ACB2D82B0BF7604869FAF52CB390C707A1C1E288DB066E5C220ECB0605C9132B2FE7C703
25,155,318 UART: [art] SIG.R = 9171748CAC30EE8ED1E1A5FD697680D4FB258C123FA67819029DDA796B505423BBD42732598189730DE1AE48B1E2379C
25,162,745 UART: [art] SIG.S = BEFB4B5313B2E4061E6F89F47521852937CF6D0C2D1A983A6268642F9E4BE28E3B346B3B993D6592D300B90337DA67ED
26,141,585 UART: Caliptra RT
26,142,275 UART: [state] CFI Enabled
26,324,033 UART: [rt] RT listening for mailbox commands...
26,356,165 UART: [rt]cmd =0x44504543, len=96
30,720,974 >>> mbox cmd response data (6236 bytes)
32,813,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,964,298 UART:
32,964,673 UART: Running Caliptra ROM ...
32,965,723 UART:
32,965,903 UART: [state] CFI Enabled
33,030,635 UART: [state] LifecycleState = Unprovisioned
33,032,739 UART: [state] DebugLocked = No
33,034,126 UART: [state] WD Timer not started. Device not locked for debugging
33,039,063 UART: [kat] SHA2-256
33,228,952 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,239,694 UART: [kat] ++
33,240,241 UART: [kat] sha1
33,251,673 UART: [kat] SHA2-256
33,254,689 UART: [kat] SHA2-384
33,262,293 UART: [kat] SHA2-512-ACC
33,264,908 UART: [kat] ECC-384
35,713,063 UART: [kat] HMAC-384Kdf
35,738,629 UART: [kat] LMS
36,270,195 UART: [kat] --
36,276,068 UART: [update-reset] ++
39,790,289 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,793,081 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,422,873 >>> mbox cmd response: success
40,423,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,424,663 UART: [update-reset] Copying MAN_2 To MAN_1
40,462,213 UART: [update-reset Success] --
40,466,863 UART: [state] Locking Datavault
40,470,015 UART: [state] Locking PCR0, PCR1 and PCR31
40,472,154 UART: [state] Locking ICCM
40,473,600 UART: [exit] Launching FMC @ 0x40000130
40,482,261 UART:
40,482,505 UART: Running Caliptra FMC ...
40,483,607 UART:
40,483,760 UART: [state] CFI Enabled
40,569,514 UART: [art] Extend RT PCRs Done
40,570,698 UART: [art] Lock RT PCRs Done
40,572,064 UART: [art] Populate DV Done
40,577,743 UART: [fht] FMC Alias Private Key: 7
40,579,221 UART: [art] Derive CDI
40,579,984 UART: [art] Store in slot 0x4
40,638,982 UART: [art] Derive Key Pair
40,640,023 UART: [art] Store priv key in slot 0x5
43,102,675 UART: [art] Derive Key Pair - Done
43,115,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,828,141 UART: [art] Erasing AUTHORITY.KEYID = 7
44,829,632 UART: [art] PUB.X = F29B6084FC29DE295E54B4BCCFE6CD17D531ED41B5DC2E4599A6C56311E0867E45B4B9B716EC94D93E231784018C2DE6
44,836,881 UART: [art] PUB.Y = 7A053CAE253EF8F548E5A9D341EDFBF3E5CD7EABCF664C82E3CA8587112C06A9EAE236E60298E942D03A6A3B11557AD1
44,844,163 UART: [art] SIG.R = 417FC7B4909ADA2B6EAC28B7E761D33F3A8BBB95D7C3C3E2ADC156020871A48617B46409A81FFC5709866A6818B4EFAD
44,851,563 UART: [art] SIG.S = 7B53563D67F9EA7E840AEF2DC9FC06F17C6F8485D0ECD3729CB96D55655AAF003D45FCCE10C5F6E04C15612039F43E1B
45,830,645 UART: Caliptra RT
45,831,353 UART: [state] CFI Enabled
46,255,246 UART: [rt] RT listening for mailbox commands...
46,286,183 UART: [rt]cmd =0x494e464f, len=4
46,290,650 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,417,094 ready_for_fw is high
3,417,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,802,120 >>> mbox cmd response: success
14,803,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,089,799 UART:
19,090,194 UART: Running Caliptra FMC ...
19,091,401 UART:
19,091,576 UART: [state] CFI Enabled
19,158,306 UART: [fht] FMC Alias Private Key: 7
20,924,396 UART: [art] Extend RT PCRs Done
20,925,614 UART: [art] Lock RT PCRs Done
20,927,359 UART: [art] Populate DV Done
20,932,558 UART: [fht] FMC Alias Private Key: 7
20,934,094 UART: [art] Derive CDI
20,934,833 UART: [art] Store in slot 0x4
20,990,708 UART: [art] Derive Key Pair
20,991,719 UART: [art] Store priv key in slot 0x5
23,454,405 UART: [art] Derive Key Pair - Done
23,467,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,262 UART: [art] PUB.X = 3FD3ACF53B5FE63F21877FBBFB8EE9B2BBFEE1A9DA7DA3EA3E85A4A60E2FBB6BE16C035D4CB6005A910371596C97AF13
25,188,564 UART: [art] PUB.Y = E535A23369922E8059B382C67BDC8D5A1505A800C054605F2F3A3065B2E81776FF1725C75FD4166C6E4742EB21FDDB36
25,195,758 UART: [art] SIG.R = 93C3513BC0487751F60C99AF2B03B80D4070C5FCA6C9DC89AA506176A787958DBF18F0E957A546433C63A53F4A6C0F8E
25,203,148 UART: [art] SIG.S = 2BEABE6F7D53240CCA7413EF55F006322A4755F847E8CD6F377478083BED630ECC24B09542ABC7BF18878599D4F34A2E
26,182,288 UART: Caliptra RT
26,182,985 UART: [state] CFI Enabled
26,362,056 UART: [rt] RT listening for mailbox commands...
26,394,354 UART: [rt]cmd =0x44504543, len=96
30,759,079 >>> mbox cmd response data (6236 bytes)
32,850,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,764,474 >>> mbox cmd response: success
40,765,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,800,674 UART:
40,800,961 UART: Running Caliptra FMC ...
40,802,089 UART:
40,802,253 UART: [state] CFI Enabled
40,903,320 UART: [art] Extend RT PCRs Done
40,904,514 UART: [art] Lock RT PCRs Done
40,905,721 UART: [art] Populate DV Done
40,911,139 UART: [fht] FMC Alias Private Key: 7
40,912,731 UART: [art] Derive CDI
40,913,540 UART: [art] Store in slot 0x4
40,972,946 UART: [art] Derive Key Pair
40,974,012 UART: [art] Store priv key in slot 0x5
43,435,976 UART: [art] Derive Key Pair - Done
43,448,994 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,162,588 UART: [art] Erasing AUTHORITY.KEYID = 7
45,164,291 UART: [art] PUB.X = 1E089AAFE28391B50FC068F78A68E88FE490399799A4FC1A2E214833A5E4E58E17A5E7A2EAC25CE33E0B0AEE72B7D499
45,171,395 UART: [art] PUB.Y = 8808AB6EB78FBA09297540DB86E1638A05C89D17CE54016B3074B0C247D0F2076DFF96B079CAF79222EEAD40C6C0A21E
45,178,627 UART: [art] SIG.R = 698B860B57D71EAEFB21A37B9ABF53B546C34E51314F1244456344D8ECB9B7100D485D9EB0E59B080DF4CB21F630AD00
45,185,979 UART: [art] SIG.S = 16310C7EB20F4474B180D8EC9F3C9180CD548F068373A7F533920F8EEDF7659F21BA4B0CED231CCA345E93B8EB349956
46,165,427 UART: Caliptra RT
46,166,122 UART: [state] CFI Enabled
46,587,013 UART: [rt] RT listening for mailbox commands...
46,617,939 UART: [rt]cmd =0x494e464f, len=4
46,622,303 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,478 UART:
192,836 UART: Running Caliptra ROM ...
193,938 UART:
603,777 UART: [state] CFI Enabled
618,748 UART: [state] LifecycleState = Unprovisioned
621,194 UART: [state] DebugLocked = No
623,736 UART: [state] WD Timer not started. Device not locked for debugging
628,718 UART: [kat] SHA2-256
818,613 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,421 UART: [kat] ++
829,943 UART: [kat] sha1
841,598 UART: [kat] SHA2-256
844,613 UART: [kat] SHA2-384
849,260 UART: [kat] SHA2-512-ACC
851,846 UART: [kat] ECC-384
3,294,752 UART: [kat] HMAC-384Kdf
3,308,977 UART: [kat] LMS
3,840,754 UART: [kat] --
3,845,458 UART: [cold-reset] ++
3,846,606 UART: [fht] FHT @ 0x50003400
3,858,180 UART: [idev] ++
3,858,844 UART: [idev] CDI.KEYID = 6
3,859,733 UART: [idev] SUBJECT.KEYID = 7
3,860,977 UART: [idev] UDS.KEYID = 0
3,861,884 ready_for_fw is high
3,862,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,304 UART: [idev] Erasing UDS.KEYID = 0
6,336,789 UART: [idev] Sha1 KeyId Algorithm
6,359,480 UART: [idev] --
6,363,856 UART: [ldev] ++
6,364,533 UART: [ldev] CDI.KEYID = 6
6,365,420 UART: [ldev] SUBJECT.KEYID = 5
6,366,635 UART: [ldev] AUTHORITY.KEYID = 7
6,367,872 UART: [ldev] FE.KEYID = 1
6,378,601 UART: [ldev] Erasing FE.KEYID = 1
8,855,589 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,468 UART: [ldev] --
10,644,681 UART: [fwproc] Wait for Commands...
10,647,696 UART: [fwproc] Recv command 0x46574c44
10,650,004 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,881 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,947 >>> mbox cmd response: success
14,910,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,914,113 UART: [afmc] ++
14,914,815 UART: [afmc] CDI.KEYID = 6
14,916,060 UART: [afmc] SUBJECT.KEYID = 7
14,917,514 UART: [afmc] AUTHORITY.KEYID = 5
17,425,459 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,792 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,713 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,839 UART: [afmc] --
19,217,763 UART: [cold-reset] --
19,222,489 UART: [state] Locking Datavault
19,228,119 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,274 UART: [state] Locking ICCM
19,231,947 UART: [exit] Launching FMC @ 0x40000130
19,240,623 UART:
19,240,858 UART: Running Caliptra FMC ...
19,241,965 UART:
19,242,124 UART: [state] CFI Enabled
19,250,307 UART: [fht] FMC Alias Private Key: 7
21,015,801 UART: [art] Extend RT PCRs Done
21,017,161 UART: [art] Lock RT PCRs Done
21,018,717 UART: [art] Populate DV Done
21,024,198 UART: [fht] FMC Alias Private Key: 7
21,025,853 UART: [art] Derive CDI
21,026,678 UART: [art] Store in slot 0x4
21,069,441 UART: [art] Derive Key Pair
21,070,446 UART: [art] Store priv key in slot 0x5
23,497,179 UART: [art] Derive Key Pair - Done
23,510,423 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,090 UART: [art] PUB.X = 38DA3A2505577C99726DE042A6F0251167989B682C70E12CAEAEEB236D1AE17C9021EEEF604F0D4A441B1D0743423B7E
25,225,316 UART: [art] PUB.Y = CE786B1305B8A10FB09955680F627AA5C10E4416BDAD20A79EF761BF397061479F5966D93619D82C8CA761A9897BCA56
25,232,584 UART: [art] SIG.R = DE3206CE1C3CC35522E2561924427AA73BAD1B48EB24D020ECE91663774D59F4AD93D783D3BA72B24B8EA6A946DA3B40
25,239,944 UART: [art] SIG.S = 097636B18779DDAC6798AA0A6F7A3344A20CFFC96765C499B9AF1AF5A8854168C74EEABDA5D179DFC8E6B061F9F82104
26,219,170 UART: Caliptra RT
26,219,865 UART: [state] CFI Enabled
26,351,841 UART: [rt] RT listening for mailbox commands...
26,384,396 UART: [rt]cmd =0x44504543, len=96
30,669,987 >>> mbox cmd response data (6236 bytes)
32,769,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,919,624 UART:
32,919,983 UART: Running Caliptra ROM ...
32,921,075 UART:
32,921,242 UART: [state] CFI Enabled
32,936,010 UART: [state] LifecycleState = Unprovisioned
32,937,919 UART: [state] DebugLocked = No
32,940,771 UART: [state] WD Timer not started. Device not locked for debugging
32,945,733 UART: [kat] SHA2-256
33,135,663 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,146,385 UART: [kat] ++
33,146,930 UART: [kat] sha1
33,159,069 UART: [kat] SHA2-256
33,162,111 UART: [kat] SHA2-384
33,168,108 UART: [kat] SHA2-512-ACC
33,170,733 UART: [kat] ECC-384
35,610,164 UART: [kat] HMAC-384Kdf
35,622,621 UART: [kat] LMS
36,154,235 UART: [kat] --
36,158,497 UART: [update-reset] ++
39,676,958 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,680,397 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,310,129 >>> mbox cmd response: success
40,310,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,311,045 UART: [update-reset] Copying MAN_2 To MAN_1
40,348,619 UART: [update-reset Success] --
40,353,132 UART: [state] Locking Datavault
40,356,501 UART: [state] Locking PCR0, PCR1 and PCR31
40,358,649 UART: [state] Locking ICCM
40,361,127 UART: [exit] Launching FMC @ 0x40000130
40,369,808 UART:
40,370,051 UART: Running Caliptra FMC ...
40,371,164 UART:
40,371,327 UART: [state] CFI Enabled
40,416,046 UART: [art] Extend RT PCRs Done
40,417,243 UART: [art] Lock RT PCRs Done
40,418,487 UART: [art] Populate DV Done
40,423,737 UART: [fht] FMC Alias Private Key: 7
40,425,240 UART: [art] Derive CDI
40,426,008 UART: [art] Store in slot 0x4
40,469,257 UART: [art] Derive Key Pair
40,470,301 UART: [art] Store priv key in slot 0x5
42,897,394 UART: [art] Derive Key Pair - Done
42,910,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,616,779 UART: [art] Erasing AUTHORITY.KEYID = 7
44,618,285 UART: [art] PUB.X = 7E4062F9C31F4886D75778E0B8A9B534D83BC81F0FB26F7B38A3F1A3A7B3B9DB0E7A5F0098EAC77FB7CF521B1948BE37
44,625,501 UART: [art] PUB.Y = 6F9E97A7FA0CA339F93C4D84CA7BB614A87BCFB9CCE83444D2AEEE6C4A960B1E7306C3F99A393386562F530827E88721
44,632,810 UART: [art] SIG.R = A043A4C473808D03F0AD20BCAB266C3953358E39E52E40C1C9607D2E68251E00C0556D1449DC121403CC015C44A1A5AA
44,640,170 UART: [art] SIG.S = AE84F11981ABDAB3F99DA4C3FE3847EE3D422C029B63D3153F718DA96ABC5C3C4F78D9B2248F06E39F8B33E1CE7F58E7
45,618,815 UART: Caliptra RT
45,619,516 UART: [state] CFI Enabled
45,988,845 UART: [rt] RT listening for mailbox commands...
46,019,793 UART: [rt]cmd =0x494e464f, len=4
46,024,193 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,756,643 ready_for_fw is high
3,757,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,090 >>> mbox cmd response: success
15,050,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,304,185 UART:
19,304,570 UART: Running Caliptra FMC ...
19,305,783 UART:
19,305,955 UART: [state] CFI Enabled
19,313,851 UART: [fht] FMC Alias Private Key: 7
21,080,014 UART: [art] Extend RT PCRs Done
21,081,275 UART: [art] Lock RT PCRs Done
21,082,598 UART: [art] Populate DV Done
21,088,034 UART: [fht] FMC Alias Private Key: 7
21,089,581 UART: [art] Derive CDI
21,090,404 UART: [art] Store in slot 0x4
21,133,119 UART: [art] Derive Key Pair
21,134,155 UART: [art] Store priv key in slot 0x5
23,561,342 UART: [art] Derive Key Pair - Done
23,574,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,744 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,257 UART: [art] PUB.X = CF3CB0E2F1D70B08B3CC284955F1308066CCC6DFFBB4BD344E2B186945D2B7DC58082AD7ABC70DEABC2322475F750972
25,289,527 UART: [art] PUB.Y = 82727AD96684B18CA5DF7A2D11FA0C73C354ADB8B32AA50D71FC86B2A9C27B60FEB3F6CC06A4AE6CD38F242C50B58551
25,296,794 UART: [art] SIG.R = EE051699B8D94F7AACCA00F60431AF081C3604CDC322C9FF2E2E6F80578ABADA731F5560F3373E1E74396CD3217A9456
25,304,210 UART: [art] SIG.S = 84173A4A2CA6B6459C470A55818F1A3684C7F775C40A689C80A313F501D3BB92AD79B6AF4D6124CED0AF484C850AF30F
26,283,555 UART: Caliptra RT
26,284,267 UART: [state] CFI Enabled
26,417,736 UART: [rt] RT listening for mailbox commands...
26,449,580 UART: [rt]cmd =0x44504543, len=96
30,734,507 >>> mbox cmd response data (6236 bytes)
32,828,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,649,656 >>> mbox cmd response: success
40,650,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,684,836 UART:
40,685,129 UART: Running Caliptra FMC ...
40,686,250 UART:
40,686,410 UART: [state] CFI Enabled
40,730,514 UART: [art] Extend RT PCRs Done
40,731,731 UART: [art] Lock RT PCRs Done
40,733,157 UART: [art] Populate DV Done
40,738,685 UART: [fht] FMC Alias Private Key: 7
40,740,392 UART: [art] Derive CDI
40,741,211 UART: [art] Store in slot 0x4
40,783,814 UART: [art] Derive Key Pair
40,784,818 UART: [art] Store priv key in slot 0x5
43,211,873 UART: [art] Derive Key Pair - Done
43,224,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,930,838 UART: [art] Erasing AUTHORITY.KEYID = 7
44,932,350 UART: [art] PUB.X = 80784DE2365A51C82E1B3F752D03E621A2A3FDE8446DD96D444B139EDF8FA6A04695A2910197F0C03F637586874610AF
44,939,629 UART: [art] PUB.Y = 5577D47D006B0AA97EDE2856D0707F4B9ADD12FA3EE58CC02D3A7663E094FB1702526D31A958AF0E969E5423AD748BD4
44,946,884 UART: [art] SIG.R = 7451ECED109CA940AEF7BF9350E6D94864E748F92550A50823C46B32F69815D7912DEFBCF3F520C7B17E227E6F5481EE
44,954,241 UART: [art] SIG.S = 89D31472C0B82A13632F1EBFF3A6D11212FE85014958393E51B6E60881F121E9DCD10AC876B11CC55050652FC9E3F6C8
45,932,972 UART: Caliptra RT
45,933,663 UART: [state] CFI Enabled
46,307,051 UART: [rt] RT listening for mailbox commands...
46,337,876 UART: [rt]cmd =0x494e464f, len=4
46,342,019 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,146 UART: [state] LifecycleState = Unprovisioned
85,801 UART: [state] DebugLocked = No
86,477 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,031 UART: [kat] SHA2-256
881,962 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,077 UART: [kat] ++
886,229 UART: [kat] sha1
890,527 UART: [kat] SHA2-256
892,465 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,592 UART: [kat] LMS
1,475,788 UART: [kat] --
1,476,719 UART: [cold-reset] ++
1,477,125 UART: [fht] Storing FHT @ 0x50003400
1,480,128 UART: [idev] ++
1,480,296 UART: [idev] CDI.KEYID = 6
1,480,656 UART: [idev] SUBJECT.KEYID = 7
1,481,080 UART: [idev] UDS.KEYID = 0
1,481,425 ready_for_fw is high
1,481,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,412 UART: [idev] Erasing UDS.KEYID = 0
1,506,182 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,916 UART: [idev] --
1,516,127 UART: [ldev] ++
1,516,295 UART: [ldev] CDI.KEYID = 6
1,516,658 UART: [ldev] SUBJECT.KEYID = 5
1,517,084 UART: [ldev] AUTHORITY.KEYID = 7
1,517,547 UART: [ldev] FE.KEYID = 1
1,522,759 UART: [ldev] Erasing FE.KEYID = 1
1,547,682 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,418 UART: [ldev] --
1,586,789 UART: [fwproc] Waiting for Commands...
1,587,642 UART: [fwproc] Received command 0x46574c44
1,588,433 UART: [fwproc] Received Image of size 118548 bytes
2,933,661 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,315 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,896 >>> mbox cmd response: success
3,131,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,926 UART: [afmc] ++
3,133,094 UART: [afmc] CDI.KEYID = 6
3,133,456 UART: [afmc] SUBJECT.KEYID = 7
3,133,881 UART: [afmc] AUTHORITY.KEYID = 5
3,168,620 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,694 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,066 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,749 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,629 UART: [afmc] --
3,211,623 UART: [cold-reset] --
3,212,551 UART: [state] Locking Datavault
3,213,898 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,502 UART: [state] Locking ICCM
3,215,154 UART: [exit] Launching FMC @ 0x40000130
3,220,484 UART:
3,220,500 UART: Running Caliptra FMC ...
3,220,908 UART:
3,220,962 UART: [state] CFI Enabled
3,231,674 UART: [fht] FMC Alias Private Key: 7
3,351,868 UART: [art] Extend RT PCRs Done
3,352,296 UART: [art] Lock RT PCRs Done
3,353,960 UART: [art] Populate DV Done
3,362,355 UART: [fht] FMC Alias Private Key: 7
3,363,343 UART: [art] Derive CDI
3,363,623 UART: [art] Store in slot 0x4
3,449,521 UART: [art] Derive Key Pair
3,449,881 UART: [art] Store priv key in slot 0x5
3,462,906 UART: [art] Derive Key Pair - Done
3,477,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,405 UART: [art] PUB.X = 601EDA8B63A870999E1C104DEF3294314DA69BCDE179C0E582AED0F2C67FC9FBFCA36665DABE34F66C1E8B506183A902
3,500,188 UART: [art] PUB.Y = 8377D7E46C7ECA056106E7F7E4B578FFE24195352D8F47AEA5EEF18F9EDFBBB8246D054D13F453CEA7204197B2562BE8
3,507,141 UART: [art] SIG.R = 87655A4CA99BA40355D234D9534F725DDEE992EBF8187C9A6E31D2366D7EEF0818638C4A45D4D5791AC24CED6DA94A32
3,513,913 UART: [art] SIG.S = A18BBEEF40128A898D3096C5037A953A734EE3E9AFEC33AEE7B958FA10956B5741F948549025AA1EFF9AD91C9A7CB1BC
3,537,136 UART: Caliptra RT
3,537,387 UART: [state] CFI Enabled
3,658,010 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,098 UART: [rt]cmd =0x44504543, len=96
3,871,362 >>> mbox cmd response data (6236 bytes)
3,871,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,117 UART:
3,872,133 UART: Running Caliptra ROM ...
3,872,541 UART:
3,872,595 UART: [state] CFI Enabled
3,875,107 UART: [state] LifecycleState = Unprovisioned
3,875,762 UART: [state] DebugLocked = No
3,876,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,878,007 UART: [kat] SHA2-256
4,671,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,676,053 UART: [kat] ++
4,676,205 UART: [kat] sha1
4,680,499 UART: [kat] SHA2-256
4,682,437 UART: [kat] SHA2-384
4,685,092 UART: [kat] SHA2-512-ACC
4,686,992 UART: [kat] ECC-384
4,692,347 UART: [kat] HMAC-384Kdf
4,696,761 UART: [kat] LMS
5,264,957 UART: [kat] --
5,265,824 UART: [update-reset] ++
6,648,028 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,649,080 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,804,347 >>> mbox cmd response: success
6,804,347 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,804,654 UART: [update-reset] Copying MAN_2 To MAN_1
6,812,668 UART: [update-reset Success] --
6,813,655 UART: [state] Locking Datavault
6,814,389 UART: [state] Locking PCR0, PCR1 and PCR31
6,814,993 UART: [state] Locking ICCM
6,815,619 UART: [exit] Launching FMC @ 0x40000130
6,820,949 UART:
6,820,965 UART: Running Caliptra FMC ...
6,821,373 UART:
6,821,427 UART: [state] CFI Enabled
6,910,856 UART: [art] Extend RT PCRs Done
6,911,284 UART: [art] Lock RT PCRs Done
6,912,515 UART: [art] Populate DV Done
6,920,694 UART: [fht] FMC Alias Private Key: 7
6,921,828 UART: [art] Derive CDI
6,922,108 UART: [art] Store in slot 0x4
7,008,216 UART: [art] Derive Key Pair
7,008,576 UART: [art] Store priv key in slot 0x5
7,021,851 UART: [art] Derive Key Pair - Done
7,036,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,051,599 UART: [art] Erasing AUTHORITY.KEYID = 7
7,052,364 UART: [art] PUB.X = 658A631DBCFB1691A788F237461C9DA2CB77B41EEE67D8940AB4FA01C6A23C56CA0E481FDD3EE343786A10D538354EE6
7,059,137 UART: [art] PUB.Y = B9FB7A640AC75140634DECE94DB937CF831A4186553F4230D88C6C3E2312D030BD0D55E35F7F01D2DD04177752EFB47F
7,066,081 UART: [art] SIG.R = A493CE929EA3DB713A9AAD55205CB73B057C5887D2BB74FB1A6DCDDF2FD1D08A3C5B7503C974E807FDE344C887BA1152
7,072,860 UART: [art] SIG.S = E3618E5E2E1BDCAC7B9DBFC59C76BF2312117E70782F01D2BF241633A3332E6AB0FEE44EF15DE5DC0CC0FDECBE7B899B
7,096,512 UART: Caliptra RT
7,096,763 UART: [state] CFI Enabled
7,466,037 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,496,130 UART: [rt]cmd =0x494e464f, len=4
7,499,804 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,051 ready_for_fw is high
1,362,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,212 >>> mbox cmd response: success
2,980,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,065 UART:
3,041,081 UART: Running Caliptra FMC ...
3,041,489 UART:
3,041,543 UART: [state] CFI Enabled
3,052,327 UART: [fht] FMC Alias Private Key: 7
3,172,159 UART: [art] Extend RT PCRs Done
3,172,587 UART: [art] Lock RT PCRs Done
3,174,033 UART: [art] Populate DV Done
3,182,192 UART: [fht] FMC Alias Private Key: 7
3,183,164 UART: [art] Derive CDI
3,183,444 UART: [art] Store in slot 0x4
3,268,878 UART: [art] Derive Key Pair
3,269,238 UART: [art] Store priv key in slot 0x5
3,282,379 UART: [art] Derive Key Pair - Done
3,297,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,133 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,898 UART: [art] PUB.X = 7792850332C6A9D6D90988B23C11063EEB0EF8B95BA154F4D87781DC7CDBC12BB090E612795657F412BF16F191D72B89
3,320,656 UART: [art] PUB.Y = FF048BFE8CE02E368CEAD40D7120108AB699A1660ED9A7716FBB271F1A83D0B5E8FA1587BB0B5FE24ACF93E0E22FD528
3,327,614 UART: [art] SIG.R = 26C17CEBF66374F9527C31F133F945F9B0DFB0D91691F1117E52DFD53303A1BC33B64F57E4652D08C4EC3FE3B1CF6BED
3,334,392 UART: [art] SIG.S = B20BCFF4225D31560C3E6E6C273693D993E708A878B1DE0137D1E27DC8863ADE6D00AB019023B56E2334F049808055BB
3,358,173 UART: Caliptra RT
3,358,424 UART: [state] CFI Enabled
3,477,906 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,132 UART: [rt]cmd =0x44504543, len=96
3,690,264 >>> mbox cmd response data (6236 bytes)
3,690,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,504,069 >>> mbox cmd response: success
6,504,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,517,633 UART:
6,517,649 UART: Running Caliptra FMC ...
6,518,057 UART:
6,518,111 UART: [state] CFI Enabled
6,606,594 UART: [art] Extend RT PCRs Done
6,607,022 UART: [art] Lock RT PCRs Done
6,608,259 UART: [art] Populate DV Done
6,616,384 UART: [fht] FMC Alias Private Key: 7
6,617,422 UART: [art] Derive CDI
6,617,702 UART: [art] Store in slot 0x4
6,703,204 UART: [art] Derive Key Pair
6,703,564 UART: [art] Store priv key in slot 0x5
6,717,113 UART: [art] Derive Key Pair - Done
6,731,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,747,344 UART: [art] Erasing AUTHORITY.KEYID = 7
6,748,109 UART: [art] PUB.X = 1F60EEC85A232F510403DEB9819D5C9DCA9CF6CBEF9A37AB3984AEC55C4577B89ADD6E8FFFE60DD4116EC3178BE2C1BF
6,754,898 UART: [art] PUB.Y = B447B1F2CC427CE6EDFCC401E0944309AC53F89C16B97AC97B39E7DC01A0F8A987BE4C5F5CF6DB52310E6A587133FF45
6,761,852 UART: [art] SIG.R = 62F706F48610D8284BA35202515CF7647304053CEB8F88EC239DF9DEF098B751AEBE18B4EF793A88E316F05E14C8F008
6,768,609 UART: [art] SIG.S = 805A9B9EB22CAAD421BC3CB6AE17BE4AC21ADC9F26765C5614228AF413C7A9F98D101BCBBE1C3259E2B4038D95EA519A
6,792,366 UART: Caliptra RT
6,792,617 UART: [state] CFI Enabled
7,157,350 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,187,541 UART: [rt]cmd =0x494e464f, len=4
7,191,165 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,770 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,372 UART: [kat] SHA2-256
882,303 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,418 UART: [kat] ++
886,570 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,377 UART: [kat] SHA2-512-ACC
897,278 UART: [kat] ECC-384
902,777 UART: [kat] HMAC-384Kdf
907,537 UART: [kat] LMS
1,475,733 UART: [kat] --
1,476,628 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,689 UART: [idev] ++
1,479,857 UART: [idev] CDI.KEYID = 6
1,480,217 UART: [idev] SUBJECT.KEYID = 7
1,480,641 UART: [idev] UDS.KEYID = 0
1,480,986 ready_for_fw is high
1,480,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,743 UART: [idev] Erasing UDS.KEYID = 0
1,505,141 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,659 UART: [idev] --
1,514,626 UART: [ldev] ++
1,514,794 UART: [ldev] CDI.KEYID = 6
1,515,157 UART: [ldev] SUBJECT.KEYID = 5
1,515,583 UART: [ldev] AUTHORITY.KEYID = 7
1,516,046 UART: [ldev] FE.KEYID = 1
1,520,808 UART: [ldev] Erasing FE.KEYID = 1
1,546,247 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,199 UART: [ldev] --
1,585,626 UART: [fwproc] Waiting for Commands...
1,586,385 UART: [fwproc] Received command 0x46574c44
1,587,176 UART: [fwproc] Received Image of size 118548 bytes
2,932,464 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,990 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,595 >>> mbox cmd response: success
3,131,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,759 UART: [afmc] ++
3,132,927 UART: [afmc] CDI.KEYID = 6
3,133,289 UART: [afmc] SUBJECT.KEYID = 7
3,133,714 UART: [afmc] AUTHORITY.KEYID = 5
3,168,355 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,859 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,231 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,914 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,770 UART: [afmc] --
3,211,882 UART: [cold-reset] --
3,212,782 UART: [state] Locking Datavault
3,213,837 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,441 UART: [state] Locking ICCM
3,215,093 UART: [exit] Launching FMC @ 0x40000130
3,220,423 UART:
3,220,439 UART: Running Caliptra FMC ...
3,220,847 UART:
3,220,990 UART: [state] CFI Enabled
3,231,398 UART: [fht] FMC Alias Private Key: 7
3,350,958 UART: [art] Extend RT PCRs Done
3,351,386 UART: [art] Lock RT PCRs Done
3,353,028 UART: [art] Populate DV Done
3,361,309 UART: [fht] FMC Alias Private Key: 7
3,362,345 UART: [art] Derive CDI
3,362,625 UART: [art] Store in slot 0x4
3,448,525 UART: [art] Derive Key Pair
3,448,885 UART: [art] Store priv key in slot 0x5
3,462,472 UART: [art] Derive Key Pair - Done
3,477,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,315 UART: [art] PUB.X = D164B362842BB46763F36D18EA54767795B1F4EA5AAA208770FCEED8AC46CE703BF5F6E27D653CE667F97E3D0C6EFF75
3,500,096 UART: [art] PUB.Y = 271B63B02774A57FD4DE8E15DA1F19AF625EE836796F8644E65B97A2DEFD59919B4815B39F477138773BBB4C2D9EE298
3,507,050 UART: [art] SIG.R = 94CA34173D4778A2D09185F691E59B0D88074A2C1CC25DC37D2FDE2C089413EE337932E2EF04E11AEB607B2FC36B67F0
3,513,814 UART: [art] SIG.S = 2D694B63882C149EC71E02591D2B4B5472A11539528A42AE2A3BC797BA316A9561AF205AE19ABC933DDFCBF7D7146737
3,537,525 UART: Caliptra RT
3,537,868 UART: [state] CFI Enabled
3,658,648 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,892 UART: [rt]cmd =0x44504543, len=96
3,871,186 >>> mbox cmd response data (6236 bytes)
3,871,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,839 UART:
3,871,855 UART: Running Caliptra ROM ...
3,872,263 UART:
3,872,404 UART: [state] CFI Enabled
3,875,254 UART: [state] LifecycleState = Unprovisioned
3,875,909 UART: [state] DebugLocked = No
3,876,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,878,174 UART: [kat] SHA2-256
4,672,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,676,220 UART: [kat] ++
4,676,372 UART: [kat] sha1
4,680,670 UART: [kat] SHA2-256
4,682,608 UART: [kat] SHA2-384
4,685,419 UART: [kat] SHA2-512-ACC
4,687,319 UART: [kat] ECC-384
4,693,052 UART: [kat] HMAC-384Kdf
4,697,668 UART: [kat] LMS
5,265,864 UART: [kat] --
5,266,779 UART: [update-reset] ++
6,648,059 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,649,209 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,804,476 >>> mbox cmd response: success
6,804,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,804,633 UART: [update-reset] Copying MAN_2 To MAN_1
6,812,647 UART: [update-reset Success] --
6,813,660 UART: [state] Locking Datavault
6,814,540 UART: [state] Locking PCR0, PCR1 and PCR31
6,815,144 UART: [state] Locking ICCM
6,815,808 UART: [exit] Launching FMC @ 0x40000130
6,821,138 UART:
6,821,154 UART: Running Caliptra FMC ...
6,821,562 UART:
6,821,705 UART: [state] CFI Enabled
6,911,000 UART: [art] Extend RT PCRs Done
6,911,428 UART: [art] Lock RT PCRs Done
6,912,495 UART: [art] Populate DV Done
6,920,842 UART: [fht] FMC Alias Private Key: 7
6,922,012 UART: [art] Derive CDI
6,922,292 UART: [art] Store in slot 0x4
7,008,238 UART: [art] Derive Key Pair
7,008,598 UART: [art] Store priv key in slot 0x5
7,022,121 UART: [art] Derive Key Pair - Done
7,037,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,052,853 UART: [art] Erasing AUTHORITY.KEYID = 7
7,053,618 UART: [art] PUB.X = AC016B5B131183BC309E52D429768AFE251CFB87A6731E0D9C793C850E6789EB6AB9138F6A9E733F215FB096A97C7BA6
7,060,385 UART: [art] PUB.Y = 5B023C9BDE07CE66340154502E6F0CFF391BFF721F3B06EBB6E3560A0F876470F0CE476C9A77432FCEE922D66C12C5B2
7,067,324 UART: [art] SIG.R = BD6766A46BA1CB70F8E942F3D448EBDEEF4652BB3ACA92A95AEA652C5FD422AFF301249A1D16125EAEC3A34CD2880A12
7,074,110 UART: [art] SIG.S = 4F17B7F3F252F9CC69EAF9870AA063F5ADD08EC42A4CE8B54AC7009FB859107A7246DE9C6B39A6117F67716B04E04000
7,097,650 UART: Caliptra RT
7,097,993 UART: [state] CFI Enabled
7,466,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,496,247 UART: [rt]cmd =0x494e464f, len=4
7,499,887 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 ready_for_fw is high
1,363,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,159 >>> mbox cmd response: success
2,981,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,378 UART:
3,042,394 UART: Running Caliptra FMC ...
3,042,802 UART:
3,042,945 UART: [state] CFI Enabled
3,053,479 UART: [fht] FMC Alias Private Key: 7
3,172,685 UART: [art] Extend RT PCRs Done
3,173,113 UART: [art] Lock RT PCRs Done
3,174,537 UART: [art] Populate DV Done
3,182,698 UART: [fht] FMC Alias Private Key: 7
3,183,876 UART: [art] Derive CDI
3,184,156 UART: [art] Store in slot 0x4
3,269,934 UART: [art] Derive Key Pair
3,270,294 UART: [art] Store priv key in slot 0x5
3,283,845 UART: [art] Derive Key Pair - Done
3,298,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,590 UART: [art] PUB.X = 388A00AD4AFD9001D2E553329734BC4C2A2018836979CD4143C30A2EE38A0E68BBC57C4EBFF00A8F37DDD1E884055B5F
3,322,333 UART: [art] PUB.Y = F1C885018F6F95BDC15AC373B1198BDA8AC225A7C01EB4CC37D294B64F02352E5DB61DA3DA0A739E59129C9FB0A6B03C
3,329,290 UART: [art] SIG.R = 65D0A3079D235DEF813E764FAAE0F7B23CDBD1CBF804CA7AF9329F01EA2B13A4A0EB133A8D60F943DFE1B0235EDD7B95
3,336,075 UART: [art] SIG.S = 7EC1A6396A777BD73D34230C9887F1C4D797CB4813A07E75D8AECF81DB25FACCFAAC535BB470B5E41318BCF39EF30BC8
3,359,825 UART: Caliptra RT
3,360,168 UART: [state] CFI Enabled
3,481,407 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,817 UART: [rt]cmd =0x44504543, len=96
3,695,118 >>> mbox cmd response data (6236 bytes)
3,695,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,509,514 >>> mbox cmd response: success
6,509,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,522,824 UART:
6,522,840 UART: Running Caliptra FMC ...
6,523,248 UART:
6,523,391 UART: [state] CFI Enabled
6,612,388 UART: [art] Extend RT PCRs Done
6,612,816 UART: [art] Lock RT PCRs Done
6,613,983 UART: [art] Populate DV Done
6,622,142 UART: [fht] FMC Alias Private Key: 7
6,623,134 UART: [art] Derive CDI
6,623,414 UART: [art] Store in slot 0x4
6,709,010 UART: [art] Derive Key Pair
6,709,370 UART: [art] Store priv key in slot 0x5
6,723,555 UART: [art] Derive Key Pair - Done
6,738,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,753,657 UART: [art] Erasing AUTHORITY.KEYID = 7
6,754,422 UART: [art] PUB.X = DF87CB7015EA6FF80E2142F5174BFCD9B7CDFB107DC3833C00542116AB08EADDF3B31815E49DE9A87E18802BF828E61C
6,761,180 UART: [art] PUB.Y = 77DFD4AB44319B7A6280D698BA540F4DEB86414AEB0FB73408FE2B4031D7BF0118C06F41BAC628B647A0F139A1096A83
6,768,123 UART: [art] SIG.R = 07971D9E9E4043DCE3A4237ADE7D284DF1686705B0141EE764C7AB79DE4D441A1F1D374CCF12D4449E139D950602992B
6,774,883 UART: [art] SIG.S = 88A0C7C078B79273F887C350BEBE425969F33EE6BAB8A244471917D140C0D40D3E88644BDFB96264CA7BD1E7FD9A5919
6,797,768 UART: Caliptra RT
6,798,111 UART: [state] CFI Enabled
7,164,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,194,891 UART: [rt]cmd =0x494e464f, len=4
7,198,697 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,790 UART: [kat] SHA2-256
901,730 UART: [kat] SHA2-384
904,509 UART: [kat] SHA2-512-ACC
906,410 UART: [kat] ECC-384
916,409 UART: [kat] HMAC-384Kdf
920,999 UART: [kat] LMS
1,169,311 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,736 UART: [fht] FHT @ 0x50003400
1,173,308 UART: [idev] ++
1,173,476 UART: [idev] CDI.KEYID = 6
1,173,837 UART: [idev] SUBJECT.KEYID = 7
1,174,262 UART: [idev] UDS.KEYID = 0
1,174,608 ready_for_fw is high
1,174,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,043 UART: [idev] Erasing UDS.KEYID = 0
1,199,065 UART: [idev] Sha1 KeyId Algorithm
1,207,975 UART: [idev] --
1,208,936 UART: [ldev] ++
1,209,104 UART: [ldev] CDI.KEYID = 6
1,209,468 UART: [ldev] SUBJECT.KEYID = 5
1,209,895 UART: [ldev] AUTHORITY.KEYID = 7
1,210,358 UART: [ldev] FE.KEYID = 1
1,215,562 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,820 UART: [ldev] --
1,281,145 UART: [fwproc] Wait for Commands...
1,281,946 UART: [fwproc] Recv command 0x46574c44
1,282,679 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,669 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,047 >>> mbox cmd response: success
2,825,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,111 UART: [afmc] ++
2,826,279 UART: [afmc] CDI.KEYID = 6
2,826,642 UART: [afmc] SUBJECT.KEYID = 7
2,827,068 UART: [afmc] AUTHORITY.KEYID = 5
2,862,747 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,556 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,257 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,174 UART: [afmc] --
2,906,071 UART: [cold-reset] --
2,907,079 UART: [state] Locking Datavault
2,908,370 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,974 UART: [state] Locking ICCM
2,909,642 UART: [exit] Launching FMC @ 0x40000130
2,914,972 UART:
2,914,988 UART: Running Caliptra FMC ...
2,915,396 UART:
2,915,450 UART: [state] CFI Enabled
2,925,978 UART: [fht] FMC Alias Private Key: 7
3,044,762 UART: [art] Extend RT PCRs Done
3,045,190 UART: [art] Lock RT PCRs Done
3,046,600 UART: [art] Populate DV Done
3,054,709 UART: [fht] FMC Alias Private Key: 7
3,055,863 UART: [art] Derive CDI
3,056,143 UART: [art] Store in slot 0x4
3,141,818 UART: [art] Derive Key Pair
3,142,178 UART: [art] Store priv key in slot 0x5
3,155,120 UART: [art] Derive Key Pair - Done
3,169,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,259 UART: [art] PUB.X = 024C409001833BCA6AA99EEE96D8107B4AE2BB3E51306DF205BBAD6C578A30F3470F5D3D2D29EDD540D87158864C686B
3,193,025 UART: [art] PUB.Y = 490E241C9175A63B78345240BB17157D3816804ADA7267A32643F3430736B2E3AC4D39F836FEFE35ECFC398A5D346D9D
3,199,967 UART: [art] SIG.R = 212AA46A1979861CF008F5FDE358AFF3DE6106E8BEA2718CBA84B60BE12A1EB9ADD7189FD9942A0BD9436694FFF2E903
3,206,738 UART: [art] SIG.S = 8491A969800302751823F6A74043C2792F6EA752DE800EC91FDB4F1380FB3071C8F7D41E26B59B253A70E6E41DA9AAF6
3,230,479 UART: Caliptra RT
3,230,730 UART: [state] CFI Enabled
3,351,637 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,747 UART: [rt]cmd =0x44504543, len=96
3,564,437 >>> mbox cmd response data (6236 bytes)
3,564,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,265 UART:
3,565,281 UART: Running Caliptra ROM ...
3,565,689 UART:
3,565,744 UART: [state] CFI Enabled
3,568,218 UART: [state] LifecycleState = Unprovisioned
3,568,873 UART: [state] DebugLocked = No
3,569,509 UART: [state] WD Timer not started. Device not locked for debugging
3,570,837 UART: [kat] SHA2-256
4,374,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,378,491 UART: [kat] ++
4,378,643 UART: [kat] sha1
4,383,007 UART: [kat] SHA2-256
4,384,947 UART: [kat] SHA2-384
4,387,826 UART: [kat] SHA2-512-ACC
4,389,726 UART: [kat] ECC-384
4,399,371 UART: [kat] HMAC-384Kdf
4,404,069 UART: [kat] LMS
4,652,381 UART: [kat] --
4,653,191 UART: [update-reset] ++
6,012,514 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,013,673 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,168,888 >>> mbox cmd response: success
6,168,888 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,169,063 UART: [update-reset] Copying MAN_2 To MAN_1
6,177,077 UART: [update-reset Success] --
6,178,068 UART: [state] Locking Datavault
6,178,736 UART: [state] Locking PCR0, PCR1 and PCR31
6,179,340 UART: [state] Locking ICCM
6,179,772 UART: [exit] Launching FMC @ 0x40000130
6,185,102 UART:
6,185,118 UART: Running Caliptra FMC ...
6,185,526 UART:
6,185,580 UART: [state] CFI Enabled
6,275,257 UART: [art] Extend RT PCRs Done
6,275,685 UART: [art] Lock RT PCRs Done
6,276,880 UART: [art] Populate DV Done
6,285,477 UART: [fht] FMC Alias Private Key: 7
6,286,573 UART: [art] Derive CDI
6,286,853 UART: [art] Store in slot 0x4
6,372,334 UART: [art] Derive Key Pair
6,372,694 UART: [art] Store priv key in slot 0x5
6,385,824 UART: [art] Derive Key Pair - Done
6,400,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,415,781 UART: [art] Erasing AUTHORITY.KEYID = 7
6,416,546 UART: [art] PUB.X = 026DB562FAFD95C0B031691094F0251D4FA99B63596BC4FDCAB7EC02382E0E411EBDB899F484D2A7700AABE08B38F5EC
6,423,320 UART: [art] PUB.Y = C70D3A67750B19A547CAAED4724D6D2CECD78111E0D444774D304DE5DCB01C1703F0D0D3F9E3D9657EDA6C942B0D803B
6,430,272 UART: [art] SIG.R = B08C017DC0DD3A1B066279AE6AD69FBF55F675D96A236D629C1C32D779A6A719B2EE57EF6108FE0C0CFFEBBA9EDBEA2E
6,437,055 UART: [art] SIG.S = A6F19D99E68CBC0FA5AE6D1ADDA188FE20CEC62027A35C64DB11D5EC8245077EA27149C052F07115456A161258726C97
6,460,787 UART: Caliptra RT
6,461,038 UART: [state] CFI Enabled
6,824,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,854,708 UART: [rt]cmd =0x494e464f, len=4
6,858,354 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,910 ready_for_fw is high
1,059,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,526 >>> mbox cmd response: success
2,679,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,795 UART:
2,741,811 UART: Running Caliptra FMC ...
2,742,219 UART:
2,742,273 UART: [state] CFI Enabled
2,753,011 UART: [fht] FMC Alias Private Key: 7
2,872,425 UART: [art] Extend RT PCRs Done
2,872,853 UART: [art] Lock RT PCRs Done
2,874,305 UART: [art] Populate DV Done
2,882,488 UART: [fht] FMC Alias Private Key: 7
2,883,588 UART: [art] Derive CDI
2,883,868 UART: [art] Store in slot 0x4
2,969,491 UART: [art] Derive Key Pair
2,969,851 UART: [art] Store priv key in slot 0x5
2,983,137 UART: [art] Derive Key Pair - Done
2,998,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,126 UART: [art] PUB.X = E03D0BD0D8B1341716D2D87B9953FD7EE85227E5856F9C062150B199E669242051BFBA499087530CEAD6B9093376D769
3,020,878 UART: [art] PUB.Y = 1C5A916C7B35772E0B4297DA14E27435918AF70B9F008347E0E9771F21E0C1FDE70447356C1D8BF1288555F678B51A53
3,027,791 UART: [art] SIG.R = 179C073CA05B62C46915EEED0109EE49CB02BF52CACC23044A42ACC3270A30830AED3C136A8E17B288DDB24946A721C7
3,034,550 UART: [art] SIG.S = 75B856F4C9124A0429BFA269C5CDE81AC8CD5EC664991ABE1DFE200D7E380188B5CF075D3184B89C7C6656AD404C3631
3,058,702 UART: Caliptra RT
3,058,953 UART: [state] CFI Enabled
3,177,191 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,461 UART: [rt]cmd =0x44504543, len=96
3,391,042 >>> mbox cmd response data (6236 bytes)
3,391,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,880,485 >>> mbox cmd response: success
5,880,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,893,644 UART:
5,893,660 UART: Running Caliptra FMC ...
5,894,068 UART:
5,894,122 UART: [state] CFI Enabled
5,983,753 UART: [art] Extend RT PCRs Done
5,984,181 UART: [art] Lock RT PCRs Done
5,985,560 UART: [art] Populate DV Done
5,993,745 UART: [fht] FMC Alias Private Key: 7
5,994,715 UART: [art] Derive CDI
5,994,995 UART: [art] Store in slot 0x4
6,080,984 UART: [art] Derive Key Pair
6,081,344 UART: [art] Store priv key in slot 0x5
6,094,588 UART: [art] Derive Key Pair - Done
6,109,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,124,832 UART: [art] Erasing AUTHORITY.KEYID = 7
6,125,597 UART: [art] PUB.X = E9F74DB1BB053B9FD5CD6B9820BD3DD7CB35564860C6CDD8BC78192043F3C68C324B5773AD4157A98FE0E93327FF3528
6,132,374 UART: [art] PUB.Y = C1F496F62F1B891D3A4718E8261180C61E5832E489619562988C073E6821271F71EDCD54F3516E8CA664445D0EDD1BC9
6,139,312 UART: [art] SIG.R = D1F03CB745F1BF8F7A3345F9C7F00999D60538F0CEFD97DF08EEA6A84B526C71B926A5268C55389E4B5E207DA25AC135
6,146,083 UART: [art] SIG.S = 0DDB13F9E56BD9DB45B6AE0BEF64A87AB7D306BED9CDDA5533DADA7CC1A71DEB7CBC374AADFAB992F5F76E77948B6F51
6,169,916 UART: Caliptra RT
6,170,167 UART: [state] CFI Enabled
6,536,629 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,860 UART: [rt]cmd =0x494e464f, len=4
6,570,684 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,109 UART: [kat] SHA2-256
902,049 UART: [kat] SHA2-384
904,654 UART: [kat] SHA2-512-ACC
906,555 UART: [kat] ECC-384
916,508 UART: [kat] HMAC-384Kdf
921,096 UART: [kat] LMS
1,169,408 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,713 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,174,731 ready_for_fw is high
1,174,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,222 UART: [idev] Erasing UDS.KEYID = 0
1,199,786 UART: [idev] Sha1 KeyId Algorithm
1,208,754 UART: [idev] --
1,209,863 UART: [ldev] ++
1,210,031 UART: [ldev] CDI.KEYID = 6
1,210,395 UART: [ldev] SUBJECT.KEYID = 5
1,210,822 UART: [ldev] AUTHORITY.KEYID = 7
1,211,285 UART: [ldev] FE.KEYID = 1
1,216,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,549 UART: [ldev] --
1,281,948 UART: [fwproc] Wait for Commands...
1,282,733 UART: [fwproc] Recv command 0x46574c44
1,283,466 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,542 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,717 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,066 >>> mbox cmd response: success
2,827,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,206 UART: [afmc] ++
2,828,374 UART: [afmc] CDI.KEYID = 6
2,828,737 UART: [afmc] SUBJECT.KEYID = 7
2,829,163 UART: [afmc] AUTHORITY.KEYID = 5
2,864,840 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,565 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,885 UART: [afmc] --
2,907,866 UART: [cold-reset] --
2,908,550 UART: [state] Locking Datavault
2,909,531 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,135 UART: [state] Locking ICCM
2,910,775 UART: [exit] Launching FMC @ 0x40000130
2,916,105 UART:
2,916,121 UART: Running Caliptra FMC ...
2,916,529 UART:
2,916,672 UART: [state] CFI Enabled
2,926,964 UART: [fht] FMC Alias Private Key: 7
3,046,062 UART: [art] Extend RT PCRs Done
3,046,490 UART: [art] Lock RT PCRs Done
3,048,034 UART: [art] Populate DV Done
3,056,155 UART: [fht] FMC Alias Private Key: 7
3,057,321 UART: [art] Derive CDI
3,057,601 UART: [art] Store in slot 0x4
3,143,548 UART: [art] Derive Key Pair
3,143,908 UART: [art] Store priv key in slot 0x5
3,157,186 UART: [art] Derive Key Pair - Done
3,171,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,252 UART: [art] PUB.X = 4E71FBB940C83D4E80283786A250321920CDB7DC03E473CE5DE7E4E6DA52A26E133214767AE1F7D4B89B5285EBDC8043
3,195,025 UART: [art] PUB.Y = D344267F1F5AB734F223D52059A2C7EA04917C3B0B8F9AFC61F9B1B1C6BDC32BF7B021F932053B8C0B4A79E1B8EE6918
3,201,975 UART: [art] SIG.R = 300FBB8823B84DBB6EEF300A38E5EBEA3DF3DCCAECA642239FA06F97EEB071CFFA37C39F795143A739F18C956127DC2E
3,208,763 UART: [art] SIG.S = F5BC9180D726E828C5D280423B5D473F20A8A327121D8F84AA562ABEF52D0C2EE02FCA1D70A767076D1688CB52EF172B
3,232,733 UART: Caliptra RT
3,233,076 UART: [state] CFI Enabled
3,353,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,435 UART: [rt]cmd =0x44504543, len=96
3,566,934 >>> mbox cmd response data (6236 bytes)
3,566,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,682 UART:
3,567,698 UART: Running Caliptra ROM ...
3,568,106 UART:
3,568,248 UART: [state] CFI Enabled
3,570,726 UART: [state] LifecycleState = Unprovisioned
3,571,381 UART: [state] DebugLocked = No
3,571,903 UART: [state] WD Timer not started. Device not locked for debugging
3,573,229 UART: [kat] SHA2-256
4,376,779 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,380,883 UART: [kat] ++
4,381,035 UART: [kat] sha1
4,385,313 UART: [kat] SHA2-256
4,387,253 UART: [kat] SHA2-384
4,389,948 UART: [kat] SHA2-512-ACC
4,391,848 UART: [kat] ECC-384
4,401,899 UART: [kat] HMAC-384Kdf
4,406,561 UART: [kat] LMS
4,654,873 UART: [kat] --
4,655,933 UART: [update-reset] ++
6,014,536 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,015,741 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,170,956 >>> mbox cmd response: success
6,170,956 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,171,149 UART: [update-reset] Copying MAN_2 To MAN_1
6,179,163 UART: [update-reset Success] --
6,180,090 UART: [state] Locking Datavault
6,180,954 UART: [state] Locking PCR0, PCR1 and PCR31
6,181,558 UART: [state] Locking ICCM
6,182,214 UART: [exit] Launching FMC @ 0x40000130
6,187,544 UART:
6,187,560 UART: Running Caliptra FMC ...
6,187,968 UART:
6,188,111 UART: [state] CFI Enabled
6,277,584 UART: [art] Extend RT PCRs Done
6,278,012 UART: [art] Lock RT PCRs Done
6,279,209 UART: [art] Populate DV Done
6,287,496 UART: [fht] FMC Alias Private Key: 7
6,288,588 UART: [art] Derive CDI
6,288,868 UART: [art] Store in slot 0x4
6,374,917 UART: [art] Derive Key Pair
6,375,277 UART: [art] Store priv key in slot 0x5
6,389,165 UART: [art] Derive Key Pair - Done
6,404,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,419,328 UART: [art] Erasing AUTHORITY.KEYID = 7
6,420,093 UART: [art] PUB.X = B771BCCA113BB77074B7D3C98B5E94EB7C052F1434C7A33009C44AC97F3A16F4C646DDBDE5B9FD26E5BB16EBB64F405F
6,426,877 UART: [art] PUB.Y = 334C804AFA688B66B1BAEC976EA74A7524BB5902FBD7973E7EA2978DFD5BF55C5543EFBFE14234C2A03615AA39D8FFC6
6,433,842 UART: [art] SIG.R = 9C8B0BE5C3A172ADBAD65562C8F7EB78B3582954B039F39AB9587BCE9600598FC55550600E637B872F48C1146EEAADCE
6,440,594 UART: [art] SIG.S = EAC2E1EB897EF9D1618A23F3A5C51E3C543CE6B91767076ED82698EC449D620C1702D820111BE567DFA9564944807C0C
6,465,004 UART: Caliptra RT
6,465,347 UART: [state] CFI Enabled
6,828,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,858,345 UART: [rt]cmd =0x494e464f, len=4
6,861,953 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 ready_for_fw is high
1,059,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,853 >>> mbox cmd response: success
2,678,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,424 UART:
2,741,440 UART: Running Caliptra FMC ...
2,741,848 UART:
2,741,991 UART: [state] CFI Enabled
2,752,267 UART: [fht] FMC Alias Private Key: 7
2,871,147 UART: [art] Extend RT PCRs Done
2,871,575 UART: [art] Lock RT PCRs Done
2,872,787 UART: [art] Populate DV Done
2,881,090 UART: [fht] FMC Alias Private Key: 7
2,882,120 UART: [art] Derive CDI
2,882,400 UART: [art] Store in slot 0x4
2,967,833 UART: [art] Derive Key Pair
2,968,193 UART: [art] Store priv key in slot 0x5
2,981,163 UART: [art] Derive Key Pair - Done
2,995,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,733 UART: [art] PUB.X = D49136CC26A84D2163A4C658C434B7A1739A7405D45D5C23C493C60C41EC3D1BA2C1762EADBE7DC0724D6737EF7FD2E3
3,018,507 UART: [art] PUB.Y = E4D4EB8633458DEA271E94441F01363B3B2C942638B3608EC6673317134B1688542670222BECA1B08B75CDAECE91CF46
3,025,452 UART: [art] SIG.R = CB2C8CEB3991E26C3F246248C01E5093205FDE6EAC188F8C503904C1AAD271D7793F7F0BFCEC4777887504BDBC7619D8
3,032,223 UART: [art] SIG.S = DF534EB6426F6B6C18D4EE1DD128F02F605BC13D3B0F4CAA18C0C0B08F77B7C410FB4F51805860C4791731D32AF5BD84
3,055,570 UART: Caliptra RT
3,055,913 UART: [state] CFI Enabled
3,176,081 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,155 UART: [rt]cmd =0x44504543, len=96
3,389,298 >>> mbox cmd response data (6236 bytes)
3,389,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,616 >>> mbox cmd response: success
5,877,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,890,851 UART:
5,890,867 UART: Running Caliptra FMC ...
5,891,275 UART:
5,891,418 UART: [state] CFI Enabled
5,980,295 UART: [art] Extend RT PCRs Done
5,980,723 UART: [art] Lock RT PCRs Done
5,981,760 UART: [art] Populate DV Done
5,989,755 UART: [fht] FMC Alias Private Key: 7
5,990,893 UART: [art] Derive CDI
5,991,173 UART: [art] Store in slot 0x4
6,076,514 UART: [art] Derive Key Pair
6,076,874 UART: [art] Store priv key in slot 0x5
6,090,060 UART: [art] Derive Key Pair - Done
6,104,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,120,829 UART: [art] Erasing AUTHORITY.KEYID = 7
6,121,594 UART: [art] PUB.X = A967C8EB57BA1DFA4FFEDF4E38698506559564EBEEAA0B4BC2A43C4779814E1D929E02205E375BB1F8EB4D97F5B153F9
6,128,371 UART: [art] PUB.Y = C84415062978450576136AEA07A23A7F3F0210A00DD69C8796BCE55B4108A12B33893A1CC9229A0700A34BE1080BE996
6,135,264 UART: [art] SIG.R = 799EA660D17B8B9840231ACE86FCE608F6B3D64AD4EE8C39C523FD521E2D002C0D55B2F6DD810D09237392C602B799F4
6,142,003 UART: [art] SIG.S = D4E76F2F9E46EA0E48B2FA779D59502613105D9D8A98CD80416F46741C8835765819611BAE824DFB06613162AC476FD8
6,165,689 UART: Caliptra RT
6,166,032 UART: [state] CFI Enabled
6,532,912 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,563,125 UART: [rt]cmd =0x494e464f, len=4
6,566,697 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,558 UART: [kat] SHA2-256
893,208 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,333 UART: [kat] ++
897,485 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,582 UART: [kat] SHA2-512-ACC
908,483 UART: [kat] ECC-384
917,926 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,835 UART: [cold-reset] ++
1,172,357 UART: [fht] FHT @ 0x50003400
1,175,150 UART: [idev] ++
1,175,318 UART: [idev] CDI.KEYID = 6
1,175,678 UART: [idev] SUBJECT.KEYID = 7
1,176,102 UART: [idev] UDS.KEYID = 0
1,176,447 ready_for_fw is high
1,176,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,431 UART: [idev] Sha1 KeyId Algorithm
1,208,815 UART: [idev] --
1,209,741 UART: [ldev] ++
1,209,909 UART: [ldev] CDI.KEYID = 6
1,210,272 UART: [ldev] SUBJECT.KEYID = 5
1,210,698 UART: [ldev] AUTHORITY.KEYID = 7
1,211,161 UART: [ldev] FE.KEYID = 1
1,216,345 UART: [ldev] Erasing FE.KEYID = 1
1,242,654 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,999 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,168 UART: [fwproc] Recv command 0x46574c44
1,283,896 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,993 >>> mbox cmd response: success
2,827,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,037 UART: [afmc] ++
2,829,205 UART: [afmc] CDI.KEYID = 6
2,829,567 UART: [afmc] SUBJECT.KEYID = 7
2,829,992 UART: [afmc] AUTHORITY.KEYID = 5
2,865,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,014 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,723 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,973 UART: [afmc] --
2,908,977 UART: [cold-reset] --
2,910,099 UART: [state] Locking Datavault
2,911,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,820 UART: [state] Locking ICCM
2,912,484 UART: [exit] Launching FMC @ 0x40000130
2,917,814 UART:
2,917,830 UART: Running Caliptra FMC ...
2,918,238 UART:
2,918,292 UART: [state] CFI Enabled
2,928,748 UART: [fht] FMC Alias Private Key: 7
3,047,454 UART: [art] Extend RT PCRs Done
3,047,882 UART: [art] Lock RT PCRs Done
3,049,184 UART: [art] Populate DV Done
3,057,435 UART: [fht] FMC Alias Private Key: 7
3,058,545 UART: [art] Derive CDI
3,058,825 UART: [art] Store in slot 0x4
3,144,712 UART: [art] Derive Key Pair
3,145,072 UART: [art] Store priv key in slot 0x5
3,157,936 UART: [art] Derive Key Pair - Done
3,172,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,525 UART: [art] PUB.X = 3A7D0F01243B5BDBF27517F2C39F0BFF151029A40029B1FAF1B4BFCA5BF7D875FD28C20D0AD9253D2C54D8D093CD97FD
3,195,278 UART: [art] PUB.Y = 7553020716DC7D3C19E8DD21F64CD015C1D0E6B2B1408E227198DF15764DC43E1BF54B57D0B48B19B5F919A66AAB7E2B
3,202,230 UART: [art] SIG.R = 74DA021BB4926C54D3D647176300714B47D22B9AFF29D207023CBE130BFE2F2B6FF71E52E488547BED5A22B9EDC2A48C
3,208,976 UART: [art] SIG.S = F82C075CA6850FF24C1CC303711398B3EA5BD89B03A7AFC8028840006B013292A177072EF22EC4C3E6F5CF4AF45E7B88
3,233,453 UART: Caliptra RT
3,233,704 UART: [state] CFI Enabled
3,353,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,823 UART: [rt]cmd =0x44504543, len=96
3,566,336 >>> mbox cmd response data (6236 bytes)
3,566,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,956 UART:
3,566,972 UART: Running Caliptra ROM ...
3,567,380 UART:
3,567,435 UART: [state] CFI Enabled
3,569,849 UART: [state] LifecycleState = Unprovisioned
3,570,504 UART: [state] DebugLocked = No
3,571,100 UART: [state] WD Timer not started. Device not locked for debugging
3,572,254 UART: [kat] SHA2-256
4,377,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,382,029 UART: [kat] ++
4,382,181 UART: [kat] sha1
4,386,425 UART: [kat] SHA2-256
4,388,365 UART: [kat] SHA2-384
4,390,998 UART: [kat] SHA2-512-ACC
4,392,898 UART: [kat] ECC-384
4,402,463 UART: [kat] HMAC-384Kdf
4,407,141 UART: [kat] LMS
4,655,469 UART: [kat] --
4,656,085 UART: [update-reset] ++
6,013,921 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,015,054 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,170,269 >>> mbox cmd response: success
6,170,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,170,424 UART: [update-reset] Copying MAN_2 To MAN_1
6,178,438 UART: [update-reset Success] --
6,179,463 UART: [state] Locking Datavault
6,180,167 UART: [state] Locking PCR0, PCR1 and PCR31
6,180,771 UART: [state] Locking ICCM
6,181,231 UART: [exit] Launching FMC @ 0x40000130
6,186,561 UART:
6,186,577 UART: Running Caliptra FMC ...
6,186,985 UART:
6,187,039 UART: [state] CFI Enabled
6,276,550 UART: [art] Extend RT PCRs Done
6,276,978 UART: [art] Lock RT PCRs Done
6,278,055 UART: [art] Populate DV Done
6,286,480 UART: [fht] FMC Alias Private Key: 7
6,287,556 UART: [art] Derive CDI
6,287,836 UART: [art] Store in slot 0x4
6,373,529 UART: [art] Derive Key Pair
6,373,889 UART: [art] Store priv key in slot 0x5
6,387,193 UART: [art] Derive Key Pair - Done
6,401,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,416,835 UART: [art] Erasing AUTHORITY.KEYID = 7
6,417,600 UART: [art] PUB.X = 45EC02EEC9441139C0EDE7F5BC5CE8A58DAC90D2EE3BA35884D0612F5B906611B111ED88429C9216F80351820B308512
6,424,363 UART: [art] PUB.Y = 2352017849E2AA878F5AE17CCEAC196232457DC8FC66E1809D3B6E243F8E4C18F524AB8676F0C01ACB918D14885D2092
6,431,312 UART: [art] SIG.R = 65390ECA6B7F63F2F974CADA43129500C390DE460E93F4445402EB0FF7FF290C559400D1794C63C18D61194CBACD7633
6,438,025 UART: [art] SIG.S = C82FF9090BE1EBD63449470180DA47A6B7000EC386228052F163D5BB430BEADDA366810FCB3CD5D0553559769EFCA218
6,462,239 UART: Caliptra RT
6,462,490 UART: [state] CFI Enabled
6,834,158 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,864,245 UART: [rt]cmd =0x494e464f, len=4
6,867,977 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,099 ready_for_fw is high
1,060,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,694 >>> mbox cmd response: success
2,678,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,317 UART:
2,740,333 UART: Running Caliptra FMC ...
2,740,741 UART:
2,740,795 UART: [state] CFI Enabled
2,751,263 UART: [fht] FMC Alias Private Key: 7
2,870,737 UART: [art] Extend RT PCRs Done
2,871,165 UART: [art] Lock RT PCRs Done
2,872,771 UART: [art] Populate DV Done
2,880,756 UART: [fht] FMC Alias Private Key: 7
2,881,882 UART: [art] Derive CDI
2,882,162 UART: [art] Store in slot 0x4
2,968,083 UART: [art] Derive Key Pair
2,968,443 UART: [art] Store priv key in slot 0x5
2,982,097 UART: [art] Derive Key Pair - Done
2,996,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,666 UART: [art] PUB.X = 1142363CD44FC39574538CCEB5271476221E22AE68D21AD437590B4030DBDEFDEC168A288C9223087B7F25282A4B9EC0
3,019,430 UART: [art] PUB.Y = DB1A32BD9D870B1BEEA1A44C09B8F64FB499FE3049CD2FCB479F3D6C5AF24BBDB962F8DE68BC5CBF3A4093264B414439
3,026,398 UART: [art] SIG.R = F57998D603C818B5050B00E00FB6FFC40C08E88CE5CC63A62A67C2E9657468A3C6043BE8F4A564C85DA15C618402B75F
3,033,126 UART: [art] SIG.S = 7478186FE431863962A7E0B93BC99D8E786DFA1CEE4670328DF506F550654DB4CC1C4D20B2A369812AB63DEA5FA80ED6
3,057,050 UART: Caliptra RT
3,057,301 UART: [state] CFI Enabled
3,176,810 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,864 UART: [rt]cmd =0x44504543, len=96
3,389,506 >>> mbox cmd response data (6236 bytes)
3,389,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,880,140 >>> mbox cmd response: success
5,880,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,893,049 UART:
5,893,065 UART: Running Caliptra FMC ...
5,893,473 UART:
5,893,527 UART: [state] CFI Enabled
5,982,640 UART: [art] Extend RT PCRs Done
5,983,068 UART: [art] Lock RT PCRs Done
5,984,445 UART: [art] Populate DV Done
5,992,496 UART: [fht] FMC Alias Private Key: 7
5,993,582 UART: [art] Derive CDI
5,993,862 UART: [art] Store in slot 0x4
6,079,657 UART: [art] Derive Key Pair
6,080,017 UART: [art] Store priv key in slot 0x5
6,093,333 UART: [art] Derive Key Pair - Done
6,108,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,123,150 UART: [art] Erasing AUTHORITY.KEYID = 7
6,123,915 UART: [art] PUB.X = 237E2ECDCD75B3B22DDE882CFFE066EB5EA7912780356500E90D60D06F5401EEB96B4854ED8B0C3E548223E5A350D210
6,130,662 UART: [art] PUB.Y = 2246E2478671BD87A637468D35432D1F0AD0A5CD01C4F16E2B88060E686A4235E92EBEDAED06865EBD83DD0F8D406740
6,137,598 UART: [art] SIG.R = C988168AA6771AD4B9158BB3B382B05B69B136778353548FBFBBE23CF59A63F4CB94F296C6D9534C5B5F6CA9A8770FD9
6,144,373 UART: [art] SIG.S = C10C2670BA0E0599E5730F811F50AD21CFF813575B79E978F7F6B4E8679B0C60ADAA285977446D699F809482C928DCB3
6,168,038 UART: Caliptra RT
6,168,289 UART: [state] CFI Enabled
6,533,768 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,563,949 UART: [rt]cmd =0x494e464f, len=4
6,567,605 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,685 UART: [state] LifecycleState = Unprovisioned
86,340 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,043 UART: [kat] SHA2-256
893,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,818 UART: [kat] ++
897,970 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,933 UART: [kat] SHA2-512-ACC
908,834 UART: [kat] ECC-384
918,823 UART: [kat] HMAC-384Kdf
923,591 UART: [kat] LMS
1,171,919 UART: [kat] --
1,172,772 UART: [cold-reset] ++
1,173,350 UART: [fht] FHT @ 0x50003400
1,176,101 UART: [idev] ++
1,176,269 UART: [idev] CDI.KEYID = 6
1,176,629 UART: [idev] SUBJECT.KEYID = 7
1,177,053 UART: [idev] UDS.KEYID = 0
1,177,398 ready_for_fw is high
1,177,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,109 UART: [idev] Erasing UDS.KEYID = 0
1,202,370 UART: [idev] Sha1 KeyId Algorithm
1,210,648 UART: [idev] --
1,211,734 UART: [ldev] ++
1,211,902 UART: [ldev] CDI.KEYID = 6
1,212,265 UART: [ldev] SUBJECT.KEYID = 5
1,212,691 UART: [ldev] AUTHORITY.KEYID = 7
1,213,154 UART: [ldev] FE.KEYID = 1
1,218,460 UART: [ldev] Erasing FE.KEYID = 1
1,244,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,906 UART: [ldev] --
1,284,177 UART: [fwproc] Wait for Commands...
1,284,999 UART: [fwproc] Recv command 0x46574c44
1,285,727 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,319 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,618 >>> mbox cmd response: success
2,829,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,830,728 UART: [afmc] ++
2,830,896 UART: [afmc] CDI.KEYID = 6
2,831,258 UART: [afmc] SUBJECT.KEYID = 7
2,831,683 UART: [afmc] AUTHORITY.KEYID = 5
2,867,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,159 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,332 UART: [afmc] --
2,910,294 UART: [cold-reset] --
2,911,340 UART: [state] Locking Datavault
2,912,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,333 UART: [state] Locking ICCM
2,913,763 UART: [exit] Launching FMC @ 0x40000130
2,919,093 UART:
2,919,109 UART: Running Caliptra FMC ...
2,919,517 UART:
2,919,660 UART: [state] CFI Enabled
2,930,128 UART: [fht] FMC Alias Private Key: 7
3,048,500 UART: [art] Extend RT PCRs Done
3,048,928 UART: [art] Lock RT PCRs Done
3,050,252 UART: [art] Populate DV Done
3,058,431 UART: [fht] FMC Alias Private Key: 7
3,059,425 UART: [art] Derive CDI
3,059,705 UART: [art] Store in slot 0x4
3,145,538 UART: [art] Derive Key Pair
3,145,898 UART: [art] Store priv key in slot 0x5
3,159,518 UART: [art] Derive Key Pair - Done
3,174,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,943 UART: [art] PUB.X = 98BCADAA6F4C74F94E019575F7EFC49BDE3D43D55C7F70F31224EC96469A1E42B032CA584C0A11B18023349D8E6D78D9
3,197,717 UART: [art] PUB.Y = 0BFD43BDBDB4B0030CCE1E8AF336E6D418D4A6C75A1804B9596610486DE100FAECE8D62B6FE9E10083E46D567C36D84C
3,204,627 UART: [art] SIG.R = DDC8F7FF4EB3BDCB8837CAFB669A4A2CF5CDA9C6DACF011162349ADE021EDF5712CD2DC33AE9985D3E90CC679BCD0856
3,211,420 UART: [art] SIG.S = 005A5C2F25D6BB1BAE39F35AF2DEC7C002B9A66423DB3DEF779761B580B413AEDF3A5F5BB3928F8FCECBDD5C03C1AD88
3,235,558 UART: Caliptra RT
3,235,901 UART: [state] CFI Enabled
3,356,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,768 UART: [rt]cmd =0x44504543, len=96
3,569,059 >>> mbox cmd response data (6236 bytes)
3,569,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,867 UART:
3,569,883 UART: Running Caliptra ROM ...
3,570,291 UART:
3,570,433 UART: [state] CFI Enabled
3,573,117 UART: [state] LifecycleState = Unprovisioned
3,573,772 UART: [state] DebugLocked = No
3,574,392 UART: [state] WD Timer not started. Device not locked for debugging
3,575,642 UART: [kat] SHA2-256
4,381,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,385,417 UART: [kat] ++
4,385,569 UART: [kat] sha1
4,389,855 UART: [kat] SHA2-256
4,391,795 UART: [kat] SHA2-384
4,394,412 UART: [kat] SHA2-512-ACC
4,396,312 UART: [kat] ECC-384
4,406,023 UART: [kat] HMAC-384Kdf
4,410,773 UART: [kat] LMS
4,659,101 UART: [kat] --
4,660,007 UART: [update-reset] ++
6,019,799 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,020,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,176,057 >>> mbox cmd response: success
6,176,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,176,208 UART: [update-reset] Copying MAN_2 To MAN_1
6,184,222 UART: [update-reset Success] --
6,185,343 UART: [state] Locking Datavault
6,186,299 UART: [state] Locking PCR0, PCR1 and PCR31
6,186,903 UART: [state] Locking ICCM
6,187,463 UART: [exit] Launching FMC @ 0x40000130
6,192,793 UART:
6,192,809 UART: Running Caliptra FMC ...
6,193,217 UART:
6,193,360 UART: [state] CFI Enabled
6,282,387 UART: [art] Extend RT PCRs Done
6,282,815 UART: [art] Lock RT PCRs Done
6,283,986 UART: [art] Populate DV Done
6,292,163 UART: [fht] FMC Alias Private Key: 7
6,293,233 UART: [art] Derive CDI
6,293,513 UART: [art] Store in slot 0x4
6,378,988 UART: [art] Derive Key Pair
6,379,348 UART: [art] Store priv key in slot 0x5
6,392,724 UART: [art] Derive Key Pair - Done
6,407,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,423,296 UART: [art] Erasing AUTHORITY.KEYID = 7
6,424,061 UART: [art] PUB.X = 7A1F6D9C098C94359C14BF62EB1A5A9DF8D982B2B553A935B5B089E28D1A8A32EDF0C5A62BC475F6C2365600A2912779
6,430,812 UART: [art] PUB.Y = C665FD7B3F581A8FFF8F63788BA55EBFCF097D36A7797436870800A850D77EF74593883CD2ECE563E696CED20DC05C69
6,437,739 UART: [art] SIG.R = 2D11CEE84835195931BC20E605B8779B4B3CCECB18DD5E47B838F986C602171F0B0065FBDA38430E08C1E482EF431690
6,444,474 UART: [art] SIG.S = 877303E7458B951117958CD73918054294276A3543D048E267B7B4C6F9BAB1D392702D3BC7D623132D131A8EB8140348
6,468,307 UART: Caliptra RT
6,468,650 UART: [state] CFI Enabled
6,832,912 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,863,095 UART: [rt]cmd =0x494e464f, len=4
6,866,871 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 ready_for_fw is high
1,060,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,651 >>> mbox cmd response: success
2,679,651 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,464 UART:
2,742,480 UART: Running Caliptra FMC ...
2,742,888 UART:
2,743,031 UART: [state] CFI Enabled
2,753,431 UART: [fht] FMC Alias Private Key: 7
2,872,587 UART: [art] Extend RT PCRs Done
2,873,015 UART: [art] Lock RT PCRs Done
2,874,765 UART: [art] Populate DV Done
2,883,000 UART: [fht] FMC Alias Private Key: 7
2,884,148 UART: [art] Derive CDI
2,884,428 UART: [art] Store in slot 0x4
2,969,967 UART: [art] Derive Key Pair
2,970,327 UART: [art] Store priv key in slot 0x5
2,983,631 UART: [art] Derive Key Pair - Done
2,998,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,447 UART: [art] PUB.X = 2737129F1885819954AFE226037E7470C98B40C44F93294B94D325B5F1B827D4A06474332AEFD62B823F70D8337F513C
3,021,202 UART: [art] PUB.Y = 7A2BAFEB793B5BBE51EA0AEB52F2CC2658514CB204E14ACB41EC2EE2D3F65F0D92064AD0C7B168FEEAA009E391DB2D11
3,028,165 UART: [art] SIG.R = 12224BBD90835ADBB9C16A7B6BA262710A3CA48679B312B48EBFD9EA0650E907E0B117825E2F16757D08909516EC3100
3,034,901 UART: [art] SIG.S = 507BAC4DADA0D34D4857CDFDDEB3DE2F2ACD4084165E9B2201EA3B8A34D7922E670E4BC2B8B5586FF387DB3D3556990D
3,058,678 UART: Caliptra RT
3,059,021 UART: [state] CFI Enabled
3,179,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,917 UART: [rt]cmd =0x44504543, len=96
3,392,031 >>> mbox cmd response data (6236 bytes)
3,392,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,881,992 >>> mbox cmd response: success
5,881,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,895,427 UART:
5,895,443 UART: Running Caliptra FMC ...
5,895,851 UART:
5,895,994 UART: [state] CFI Enabled
5,985,361 UART: [art] Extend RT PCRs Done
5,985,789 UART: [art] Lock RT PCRs Done
5,986,952 UART: [art] Populate DV Done
5,995,105 UART: [fht] FMC Alias Private Key: 7
5,996,087 UART: [art] Derive CDI
5,996,367 UART: [art] Store in slot 0x4
6,082,202 UART: [art] Derive Key Pair
6,082,562 UART: [art] Store priv key in slot 0x5
6,095,624 UART: [art] Derive Key Pair - Done
6,110,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,125,977 UART: [art] Erasing AUTHORITY.KEYID = 7
6,126,742 UART: [art] PUB.X = C97C0C7AC932FC8831E65617517B74E4BE260FCC903FCD8D2B19E9DB4C124AC1B3A7A2F813F6FDC9A7FCA933FEF54D67
6,133,528 UART: [art] PUB.Y = 800BAAFEA9FC53D0531E0B45C012BA2D547D6760DE0580FE3CD3CE7E9C3727A84D22DE8F65692D78ACFFF80F0967F25F
6,140,481 UART: [art] SIG.R = 4A636830300EEE796ECF1539AEBD98BF9B1FDDA9F8B0CCBE3EBEF74A151D51E2A97810A3E037F8AD2A97F2A94245CEE1
6,147,272 UART: [art] SIG.S = 73508D0736BE80C0BC7FFFE1C4F48842090572DCEE2978344F319F83CAAE5986794D7C8CC27DA909DC3E87E7BE6720F9
6,171,104 UART: Caliptra RT
6,171,447 UART: [state] CFI Enabled
6,536,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,789 UART: [rt]cmd =0x494e464f, len=4
6,570,503 >>> mbox cmd response data (312 bytes)
test test_invoke_dpe::test_export_cdi_attestation_not_disabled_after_update_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,128 UART:
192,485 UART: Running Caliptra ROM ...
193,673 UART:
193,827 UART: [state] CFI Enabled
264,215 UART: [state] LifecycleState = Unprovisioned
266,228 UART: [state] DebugLocked = No
268,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,861 UART: [kat] SHA2-256
443,555 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,080 UART: [kat] ++
454,621 UART: [kat] sha1
465,744 UART: [kat] SHA2-256
468,447 UART: [kat] SHA2-384
474,942 UART: [kat] SHA2-512-ACC
477,316 UART: [kat] ECC-384
2,766,015 UART: [kat] HMAC-384Kdf
2,798,748 UART: [kat] LMS
3,989,047 UART: [kat] --
3,992,283 UART: [cold-reset] ++
3,993,225 UART: [fht] Storing FHT @ 0x50003400
4,004,488 UART: [idev] ++
4,005,089 UART: [idev] CDI.KEYID = 6
4,006,028 UART: [idev] SUBJECT.KEYID = 7
4,007,245 UART: [idev] UDS.KEYID = 0
4,008,380 ready_for_fw is high
4,008,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,737 UART: [idev] Erasing UDS.KEYID = 0
7,347,328 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,099 UART: [idev] --
7,373,531 UART: [ldev] ++
7,374,154 UART: [ldev] CDI.KEYID = 6
7,375,067 UART: [ldev] SUBJECT.KEYID = 5
7,376,288 UART: [ldev] AUTHORITY.KEYID = 7
7,377,576 UART: [ldev] FE.KEYID = 1
7,422,519 UART: [ldev] Erasing FE.KEYID = 1
10,758,290 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,030 UART: [ldev] --
13,137,622 UART: [fwproc] Waiting for Commands...
13,140,903 UART: [fwproc] Received command 0x46574c44
13,143,083 UART: [fwproc] Received Image of size 118548 bytes
17,242,743 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,069 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,612 >>> mbox cmd response: success
17,718,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,721,364 UART: [afmc] ++
17,721,944 UART: [afmc] CDI.KEYID = 6
17,722,906 UART: [afmc] SUBJECT.KEYID = 7
17,724,062 UART: [afmc] AUTHORITY.KEYID = 5
21,093,704 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,871 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,127 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,597 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,273 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,726 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,713 UART: [afmc] --
23,464,922 UART: [cold-reset] --
23,468,732 UART: [state] Locking Datavault
23,474,033 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,792 UART: [state] Locking ICCM
23,478,366 UART: [exit] Launching FMC @ 0x40000130
23,486,758 UART:
23,487,005 UART: Running Caliptra FMC ...
23,488,060 UART:
23,488,219 UART: [state] CFI Enabled
23,555,699 UART: [fht] FMC Alias Private Key: 7
25,895,819 UART: [art] Extend RT PCRs Done
25,897,038 UART: [art] Lock RT PCRs Done
25,898,992 UART: [art] Populate DV Done
25,904,405 UART: [fht] FMC Alias Private Key: 7
25,905,975 UART: [art] Derive CDI
25,906,725 UART: [art] Store in slot 0x4
25,964,435 UART: [art] Derive Key Pair
25,965,440 UART: [art] Store priv key in slot 0x5
29,258,255 UART: [art] Derive Key Pair - Done
29,271,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,780 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,286 UART: [art] PUB.X = 1298FBA2CFE7D096F86DBC254C1DAD862F4ACBFCEE37AB5B50598D3CE4999550D70B72D6B77B951E24642A911ECB32D9
31,568,575 UART: [art] PUB.Y = E2F5F99F941D942F6EC135848018297DCF0741AD730DB2B9A673C2741C79ACA2DA379EB7C4A6DC5CF5EFB62557748EC3
31,575,853 UART: [art] SIG.R = 44F90578238BB8430E2F555EEB147B1DEB1E6AE1FA99C3471C665BB9D4ED425E72B5276E0BC88DBCD673262E31DFF073
31,583,241 UART: [art] SIG.S = CA55F108CEE541DF522CD7076D3C192D24BD17A4A578813027729C9E0A19D25A7EC675B3B448079FCC47FCCB1EB4C686
32,888,230 UART: Caliptra RT
32,888,943 UART: [state] CFI Enabled
33,065,971 UART: [rt] RT listening for mailbox commands...
33,097,984 UART: [rt]cmd =0x44504543, len=96
38,881,108 >>> mbox cmd response data (6236 bytes)
40,985,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,136,001 UART:
41,136,374 UART: Running Caliptra ROM ...
41,137,424 UART:
41,137,574 UART: [state] CFI Enabled
41,203,274 UART: [state] LifecycleState = Unprovisioned
41,205,294 UART: [state] DebugLocked = No
41,206,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,212,049 UART: [kat] SHA2-256
41,381,743 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,392,270 UART: [kat] ++
41,392,728 UART: [kat] sha1
41,403,934 UART: [kat] SHA2-256
41,406,679 UART: [kat] SHA2-384
41,411,369 UART: [kat] SHA2-512-ACC
41,413,712 UART: [kat] ECC-384
43,705,124 UART: [kat] HMAC-384Kdf
43,739,178 UART: [kat] LMS
44,929,497 UART: [kat] --
44,934,007 UART: [update-reset] ++
49,124,655 UART: [update-reset] Image verified using Vendor ECC Key Index 0
49,127,891 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,525,627 >>> mbox cmd response: success
49,526,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,527,343 UART: [update-reset] Copying MAN_2 To MAN_1
49,549,774 UART: [update-reset Success] --
49,552,764 UART: [state] Locking Datavault
49,557,265 UART: [state] Locking PCR0, PCR1 and PCR31
49,559,015 UART: [state] Locking ICCM
49,561,385 UART: [exit] Launching FMC @ 0x40000130
49,569,832 UART:
49,570,063 UART: Running Caliptra FMC ...
49,571,168 UART:
49,571,327 UART: [state] CFI Enabled
49,658,934 UART: [art] Extend RT PCRs Done
49,660,123 UART: [art] Lock RT PCRs Done
49,661,197 UART: [art] Populate DV Done
49,666,821 UART: [fht] FMC Alias Private Key: 7
49,668,469 UART: [art] Derive CDI
49,669,352 UART: [art] Store in slot 0x4
49,727,564 UART: [art] Derive Key Pair
49,728,566 UART: [art] Store priv key in slot 0x5
53,021,990 UART: [art] Derive Key Pair - Done
53,034,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,324,207 UART: [art] Erasing AUTHORITY.KEYID = 7
55,326,494 UART: [art] PUB.X = 86EA9DD7CE374015E15A7A5E3C690DFB45E19D8A61A4DB0DBCAB72055492FF43820D2FABD1F7F5EB2169CB5C18B6CCD8
55,333,012 UART: [art] PUB.Y = CCA356FD3A3431B74923AE631EE6376F0A2CB1D993D68834C40471CE2DFF6B07E44B7629696299DE1B21AC0A3D0F0DA6
55,340,247 UART: [art] SIG.R = 5A070C8CAD38ACF3C54EC54E31AD9A957E2A2D6BFD94664D32152F8B1DE67963E006F4FEF8520E502441AE6328D12FFF
55,347,757 UART: [art] SIG.S = E280F0BE5E795FEE41391180C1E3F87347670F1CFD599B3F7D1130EF98FC0E32E38C55E41FF4272A02297FF53B1CBF72
56,653,053 UART: Caliptra RT
56,654,407 UART: [state] CFI Enabled
57,084,086 UART: [rt] RT failed reset flow
57,085,945 UART: Fatal Error: 0x000E0035
57,087,016 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
3,808,068 ready_for_fw is high
3,808,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,991,624 >>> mbox cmd response: success
17,992,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,677,625 UART:
23,678,009 UART: Running Caliptra FMC ...
23,679,219 UART:
23,679,388 UART: [state] CFI Enabled
23,746,986 UART: [fht] FMC Alias Private Key: 7
26,086,951 UART: [art] Extend RT PCRs Done
26,088,178 UART: [art] Lock RT PCRs Done
26,089,868 UART: [art] Populate DV Done
26,095,400 UART: [fht] FMC Alias Private Key: 7
26,097,055 UART: [art] Derive CDI
26,097,873 UART: [art] Store in slot 0x4
26,155,676 UART: [art] Derive Key Pair
26,156,711 UART: [art] Store priv key in slot 0x5
29,449,390 UART: [art] Derive Key Pair - Done
29,462,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,921 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,427 UART: [art] PUB.X = 4C5CC34C22EA227EB72823A8698A4351345A806BBEDCE491494DB73EC6C0A5D7DEF93D251480DF81CB233B19CA83E127
31,760,677 UART: [art] PUB.Y = 5C7F2E836FC13E3873D95FF5A8B5217962ACDFB2BCEEAEE087545909A4BA41E6BA3F939FFEA90B16944EBEAD02CB7EA4
31,767,986 UART: [art] SIG.R = BAE040BCBCB8E9A468D4C5EA8771C7CBF21F1D72E171CEF2C21451387015D683C98C28BE09DB1F0263D66EABD392E74B
31,775,376 UART: [art] SIG.S = 5829F3501F9F727EB5CC7290AC2D45492B2F0D67B13CC57E6DEF8A6250EEF6E6A5A46ECA753AE6FD5C6353811A22EA5E
33,080,942 UART: Caliptra RT
33,081,656 UART: [state] CFI Enabled
33,258,334 UART: [rt] RT listening for mailbox commands...
33,290,345 UART: [rt]cmd =0x44504543, len=96
39,071,761 >>> mbox cmd response data (6236 bytes)
41,175,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,991,973 >>> mbox cmd response: success
49,992,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,027,201 UART:
50,027,524 UART: Running Caliptra FMC ...
50,028,656 UART:
50,028,823 UART: [state] CFI Enabled
50,128,099 UART: [art] Extend RT PCRs Done
50,129,289 UART: [art] Lock RT PCRs Done
50,130,707 UART: [art] Populate DV Done
50,136,440 UART: [fht] FMC Alias Private Key: 7
50,138,040 UART: [art] Derive CDI
50,138,859 UART: [art] Store in slot 0x4
50,197,738 UART: [art] Derive Key Pair
50,198,781 UART: [art] Store priv key in slot 0x5
53,492,354 UART: [art] Derive Key Pair - Done
53,505,195 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,794,431 UART: [art] Erasing AUTHORITY.KEYID = 7
55,795,932 UART: [art] PUB.X = 8EB26F9E60121239D0B2D535705E1BA9366F72EFAEEA98C0A9C9BA65A83D44637D98FA7E5E32F9628983E4DDEA872E96
55,803,227 UART: [art] PUB.Y = F10A5F09BE4A8A870F807F918EE9F49C85B3AEDCF68D09F2AFB3FA1BF5156AFB0264F90A103CAFFD995D6742D4488976
55,810,507 UART: [art] SIG.R = 1F28F2F9966A54991249CF4D68C86EA2109DD9EEB29CD0B8427A625B0BF15273BED38145A15465BD9D5B24F06E731282
55,817,886 UART: [art] SIG.S = EEB5F8F5BD4EB54C94F39592959C424C9EBACB5621298180CEC7EFF7A56EBCEDC75802B29D8D5B5625833A56B407B782
57,122,678 UART: Caliptra RT
57,123,396 UART: [state] CFI Enabled
57,545,341 UART: [rt] RT failed reset flow
57,546,539 UART: Fatal Error: 0x000E0035
57,548,148 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.99s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,470 writing to cptra_bootfsm_go
192,650 UART:
193,016 UART: Running Caliptra ROM ...
194,114 UART:
603,875 UART: [state] CFI Enabled
619,603 UART: [state] LifecycleState = Unprovisioned
621,534 UART: [state] DebugLocked = No
623,049 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,894 UART: [kat] SHA2-256
797,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,181 UART: [kat] ++
808,624 UART: [kat] sha1
820,151 UART: [kat] SHA2-256
822,804 UART: [kat] SHA2-384
829,142 UART: [kat] SHA2-512-ACC
831,525 UART: [kat] ECC-384
3,116,664 UART: [kat] HMAC-384Kdf
3,127,492 UART: [kat] LMS
4,317,578 UART: [kat] --
4,321,428 UART: [cold-reset] ++
4,322,360 UART: [fht] Storing FHT @ 0x50003400
4,334,537 UART: [idev] ++
4,335,102 UART: [idev] CDI.KEYID = 6
4,336,131 UART: [idev] SUBJECT.KEYID = 7
4,337,300 UART: [idev] UDS.KEYID = 0
4,338,349 ready_for_fw is high
4,338,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,426 UART: [idev] Erasing UDS.KEYID = 0
7,625,328 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,570 UART: [idev] --
7,648,584 UART: [ldev] ++
7,649,175 UART: [ldev] CDI.KEYID = 6
7,650,088 UART: [ldev] SUBJECT.KEYID = 5
7,651,300 UART: [ldev] AUTHORITY.KEYID = 7
7,652,583 UART: [ldev] FE.KEYID = 1
7,662,681 UART: [ldev] Erasing FE.KEYID = 1
10,950,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,507 UART: [ldev] --
13,309,332 UART: [fwproc] Waiting for Commands...
13,312,019 UART: [fwproc] Received command 0x46574c44
13,314,198 UART: [fwproc] Received Image of size 118548 bytes
17,413,516 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,141 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,312 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,003 >>> mbox cmd response: success
17,893,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,897,879 UART: [afmc] ++
17,898,454 UART: [afmc] CDI.KEYID = 6
17,899,469 UART: [afmc] SUBJECT.KEYID = 7
17,900,616 UART: [afmc] AUTHORITY.KEYID = 5
21,217,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,997 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,436 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,823 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,019 UART: [afmc] --
23,583,422 UART: [cold-reset] --
23,586,145 UART: [state] Locking Datavault
23,591,557 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,317 UART: [state] Locking ICCM
23,594,977 UART: [exit] Launching FMC @ 0x40000130
23,603,365 UART:
23,603,595 UART: Running Caliptra FMC ...
23,604,686 UART:
23,604,836 UART: [state] CFI Enabled
23,612,929 UART: [fht] FMC Alias Private Key: 7
25,954,009 UART: [art] Extend RT PCRs Done
25,955,236 UART: [art] Lock RT PCRs Done
25,956,887 UART: [art] Populate DV Done
25,962,191 UART: [fht] FMC Alias Private Key: 7
25,963,725 UART: [art] Derive CDI
25,964,482 UART: [art] Store in slot 0x4
26,006,536 UART: [art] Derive Key Pair
26,007,580 UART: [art] Store priv key in slot 0x5
29,249,359 UART: [art] Derive Key Pair - Done
29,262,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,465 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,973 UART: [art] PUB.X = 73E2CFF938930ED608DC099339D61200526C32D2144D993C53663B8C05FBC3EF28C8ADA440E29B6F08D7A1B89849D819
31,551,208 UART: [art] PUB.Y = 864CEB5FD1750D50D7FD2ADE8103015A89E0E94B1F71BAC4CA6B4B6EFD7DAD74589ADADC109FAC2A036268E7035882EB
31,558,490 UART: [art] SIG.R = 11BE477E5B8A2C826DD96154C1F9DA9701CFB2583CFE68C07098A59E24AFC70D784D6C56115978B12373DD3F7781B75E
31,565,867 UART: [art] SIG.S = 7173918ACB0D300F52EA9EF77C85EF3D31230C66D12E002BD842870CE0E0EEC8CB9874EF01EF8EE1962DF73FEED8D24C
32,871,410 UART: Caliptra RT
32,872,123 UART: [state] CFI Enabled
33,005,334 UART: [rt] RT listening for mailbox commands...
33,037,282 UART: [rt]cmd =0x44504543, len=96
38,722,370 >>> mbox cmd response data (6236 bytes)
40,826,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,977,561 UART:
40,977,928 UART: Running Caliptra ROM ...
40,978,997 UART:
40,979,209 UART: [state] CFI Enabled
40,991,682 UART: [state] LifecycleState = Unprovisioned
40,993,634 UART: [state] DebugLocked = No
40,995,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
41,000,352 UART: [kat] SHA2-256
41,170,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,180,575 UART: [kat] ++
41,181,055 UART: [kat] sha1
41,192,640 UART: [kat] SHA2-256
41,195,373 UART: [kat] SHA2-384
41,199,523 UART: [kat] SHA2-512-ACC
41,201,886 UART: [kat] ECC-384
43,484,911 UART: [kat] HMAC-384Kdf
43,497,632 UART: [kat] LMS
44,687,663 UART: [kat] --
44,690,307 UART: [update-reset] ++
48,882,151 UART: [update-reset] Image verified using Vendor ECC Key Index 0
48,885,430 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
49,283,208 >>> mbox cmd response: success
49,283,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,284,010 UART: [update-reset] Copying MAN_2 To MAN_1
49,306,400 UART: [update-reset Success] --
49,310,261 UART: [state] Locking Datavault
49,314,643 UART: [state] Locking PCR0, PCR1 and PCR31
49,316,393 UART: [state] Locking ICCM
49,318,700 UART: [exit] Launching FMC @ 0x40000130
49,327,138 UART:
49,327,389 UART: Running Caliptra FMC ...
49,328,487 UART:
49,328,643 UART: [state] CFI Enabled
49,372,981 UART: [art] Extend RT PCRs Done
49,374,168 UART: [art] Lock RT PCRs Done
49,375,510 UART: [art] Populate DV Done
49,380,858 UART: [fht] FMC Alias Private Key: 7
49,382,610 UART: [art] Derive CDI
49,383,488 UART: [art] Store in slot 0x4
49,426,185 UART: [art] Derive Key Pair
49,427,217 UART: [art] Store priv key in slot 0x5
52,669,314 UART: [art] Derive Key Pair - Done
52,682,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,962,577 UART: [art] Erasing AUTHORITY.KEYID = 7
54,964,086 UART: [art] PUB.X = 120BA9D8CB2141D1222295EB163B76D7E6304545D4D13693E77B6DCACC997855FAC85A633CF5155A16302147014A9649
54,971,326 UART: [art] PUB.Y = 4BBB15391D0DB749CC77828B457D061FE12716D9E025229A844AA1A69171E772E6F04474CCC90CC40163AFA79A02AFB4
54,978,612 UART: [art] SIG.R = AB39BE68CF298EFA8C146BA60488F925EF58B177C3085EB33A2F3AB10952C608B7513CE5E516CF94E0AF5F68F4D574DF
54,985,998 UART: [art] SIG.S = B6ABDCD4F4593BF21CE398F257E0D83ED3CBCDCD2ACE6B32EF147DB49B0DF4F46CFA0800444EE518961F53D11C8A8A0C
56,290,780 UART: Caliptra RT
56,291,495 UART: [state] CFI Enabled
56,665,361 UART: [rt] RT failed reset flow
56,666,558 UART: Fatal Error: 0x000E0035
56,668,189 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,127,734 ready_for_fw is high
4,128,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,688 >>> mbox cmd response: success
18,169,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,805,790 UART:
23,806,183 UART: Running Caliptra FMC ...
23,807,316 UART:
23,807,475 UART: [state] CFI Enabled
23,815,428 UART: [fht] FMC Alias Private Key: 7
26,155,012 UART: [art] Extend RT PCRs Done
26,156,245 UART: [art] Lock RT PCRs Done
26,157,917 UART: [art] Populate DV Done
26,163,451 UART: [fht] FMC Alias Private Key: 7
26,165,151 UART: [art] Derive CDI
26,165,885 UART: [art] Store in slot 0x4
26,208,486 UART: [art] Derive Key Pair
26,209,523 UART: [art] Store priv key in slot 0x5
29,452,033 UART: [art] Derive Key Pair - Done
29,465,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,470 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,976 UART: [art] PUB.X = A06F2FD01470DB48A7A4D8AD19FF66AE4FB5FAF4AD20486A88725CEB284CC81944706EFA03A37AABA681B509DDFB3A1D
31,754,273 UART: [art] PUB.Y = 271FF5CFBCCE8C0667D5C72C234BD61F821604A1347F0D06C8F16567F254D0F5305555A903D0D231995DAAA02A1F9B4B
31,761,514 UART: [art] SIG.R = 9330A20EB8A05A06B4C986B685F3A9A38AB389A2C31CB5553F255308368669165D91D8AD99D655188048AF5553E014E7
31,768,915 UART: [art] SIG.S = E9DE44A7381E05AE1C75E96D4D43D714D90EBFD90C5629B7F80C5D8A7F268B1262D9AEF7AA9BF2D4EC2A160E2814FA3C
33,073,804 UART: Caliptra RT
33,074,530 UART: [state] CFI Enabled
33,207,855 UART: [rt] RT listening for mailbox commands...
33,239,773 UART: [rt]cmd =0x44504543, len=96
38,923,951 >>> mbox cmd response data (6236 bytes)
41,024,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
49,778,721 >>> mbox cmd response: success
49,779,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,813,957 UART:
49,814,283 UART: Running Caliptra FMC ...
49,815,315 UART:
49,815,460 UART: [state] CFI Enabled
49,860,397 UART: [art] Extend RT PCRs Done
49,861,545 UART: [art] Lock RT PCRs Done
49,862,861 UART: [art] Populate DV Done
49,868,392 UART: [fht] FMC Alias Private Key: 7
49,870,083 UART: [art] Derive CDI
49,870,822 UART: [art] Store in slot 0x4
49,913,906 UART: [art] Derive Key Pair
49,914,948 UART: [art] Store priv key in slot 0x5
53,156,796 UART: [art] Derive Key Pair - Done
53,169,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
55,450,077 UART: [art] Erasing AUTHORITY.KEYID = 7
55,452,249 UART: [art] PUB.X = 0D1B139E42933784A7D72ED6325709571016E46329730D1F85EDAE3D7C0DA4F98DC3C6E3F28210F42415DD0218929ACD
55,458,889 UART: [art] PUB.Y = BC03AEE3E5CB2121ACE413FD810F91FF3F1A2959A84CC3ED660E1B37EC081CBB12D9CA6A0B9ED7217BF5D467CF8C5777
55,466,133 UART: [art] SIG.R = 8860A3BF746C86D275420A14882793F4E447E6D3557E266F8210D5A5FFE6BECB58D8E2E33C8A6E21FCB6A9268952FD9E
55,473,530 UART: [art] SIG.S = C27F72308659E197F5BEF7F26A2ED01647C1AB8DB26FC903ED0714FCD0977B0D1B7ACA91803B2A888BE775809A01980B
56,778,251 UART: Caliptra RT
56,779,514 UART: [state] CFI Enabled
57,154,578 UART: [rt] RT failed reset flow
57,156,459 UART: Fatal Error: 0x000E0035
57,157,521 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,070 UART:
192,451 UART: Running Caliptra ROM ...
193,637 UART:
193,792 UART: [state] CFI Enabled
265,281 UART: [state] LifecycleState = Unprovisioned
267,259 UART: [state] DebugLocked = No
269,779 UART: [state] WD Timer not started. Device not locked for debugging
272,881 UART: [kat] SHA2-256
452,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,316 UART: [kat] ++
463,848 UART: [kat] sha1
473,516 UART: [kat] SHA2-256
476,238 UART: [kat] SHA2-384
482,999 UART: [kat] SHA2-512-ACC
485,356 UART: [kat] ECC-384
2,952,778 UART: [kat] HMAC-384Kdf
2,973,469 UART: [kat] LMS
3,449,962 UART: [kat] --
3,454,533 UART: [cold-reset] ++
3,456,958 UART: [fht] FHT @ 0x50003400
3,468,493 UART: [idev] ++
3,469,128 UART: [idev] CDI.KEYID = 6
3,470,037 UART: [idev] SUBJECT.KEYID = 7
3,471,285 UART: [idev] UDS.KEYID = 0
3,472,275 ready_for_fw is high
3,472,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,720 UART: [idev] Erasing UDS.KEYID = 0
5,990,153 UART: [idev] Sha1 KeyId Algorithm
6,013,931 UART: [idev] --
6,018,525 UART: [ldev] ++
6,019,099 UART: [ldev] CDI.KEYID = 6
6,020,015 UART: [ldev] SUBJECT.KEYID = 5
6,021,230 UART: [ldev] AUTHORITY.KEYID = 7
6,022,479 UART: [ldev] FE.KEYID = 1
6,059,976 UART: [ldev] Erasing FE.KEYID = 1
8,567,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,311 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,052 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,623 UART: [ldev] --
10,375,650 UART: [fwproc] Wait for Commands...
10,378,983 UART: [fwproc] Recv command 0x46574c44
10,380,958 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,934,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,377 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,335,891 >>> mbox cmd response: success
14,337,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,340,825 UART: [afmc] ++
14,341,414 UART: [afmc] CDI.KEYID = 6
14,342,382 UART: [afmc] SUBJECT.KEYID = 7
14,343,596 UART: [afmc] AUTHORITY.KEYID = 5
16,878,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,449 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,465 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,498 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,051 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,585 UART: [afmc] --
18,698,735 UART: [cold-reset] --
18,702,650 UART: [state] Locking Datavault
18,706,923 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,672 UART: [state] Locking ICCM
18,711,250 UART: [exit] Launching FMC @ 0x40000130
18,719,670 UART:
18,719,907 UART: Running Caliptra FMC ...
18,721,006 UART:
18,721,169 UART: [state] CFI Enabled
18,777,024 UART: [fht] FMC Alias Private Key: 7
20,544,004 UART: [art] Extend RT PCRs Done
20,545,234 UART: [art] Lock RT PCRs Done
20,546,748 UART: [art] Populate DV Done
20,552,316 UART: [fht] FMC Alias Private Key: 7
20,553,795 UART: [art] Derive CDI
20,554,551 UART: [art] Store in slot 0x4
20,610,115 UART: [art] Derive Key Pair
20,611,151 UART: [art] Store priv key in slot 0x5
23,073,663 UART: [art] Derive Key Pair - Done
23,086,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,717 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,234 UART: [art] PUB.X = 4DCDF7BAE9A1940101D8A07BD3530D8808C0CC3B85B151F4233FAF1E1921C6B3D1002305DD989508FDB60EBDDF796F44
24,808,481 UART: [art] PUB.Y = C6F087B0B65265038414E5E027E505C1E4244F37D4114648EE40088CDB6452823F0DA0A1FBC5E72EE9C7BE1F62B2DE39
24,815,770 UART: [art] SIG.R = 09084BA9B3C341884C120E589F7E4F83F16F4C523A4E7E3819E24350ECF9880ED17CDCB32FCD28264E7313EC05C01534
24,823,158 UART: [art] SIG.S = 5923BC0551E0AA8460A3254DF62BBAF4FA7D70287D3D0590573211CDBA86F2094EFDD8805CA04A1266ED34B61C82F04E
25,802,535 UART: Caliptra RT
25,803,237 UART: [state] CFI Enabled
25,981,889 UART: [rt] RT listening for mailbox commands...
26,013,892 UART: [rt]cmd =0x44504543, len=96
30,389,984 >>> mbox cmd response data (6236 bytes)
32,482,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,633,167 UART:
32,633,558 UART: Running Caliptra ROM ...
32,634,672 UART:
32,634,837 UART: [state] CFI Enabled
32,708,533 UART: [state] LifecycleState = Unprovisioned
32,710,472 UART: [state] DebugLocked = No
32,712,507 UART: [state] WD Timer not started. Device not locked for debugging
32,716,190 UART: [kat] SHA2-256
32,895,857 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,906,657 UART: [kat] ++
32,907,204 UART: [kat] sha1
32,918,255 UART: [kat] SHA2-256
32,920,953 UART: [kat] SHA2-384
32,926,192 UART: [kat] SHA2-512-ACC
32,928,523 UART: [kat] ECC-384
35,372,089 UART: [kat] HMAC-384Kdf
35,392,975 UART: [kat] LMS
35,869,404 UART: [kat] --
35,873,683 UART: [update-reset] ++
39,373,207 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,376,474 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,774,071 >>> mbox cmd response: success
39,774,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,775,102 UART: [update-reset] Copying MAN_2 To MAN_1
39,812,204 UART: [update-reset Success] --
39,818,374 UART: [state] Locking Datavault
39,821,202 UART: [state] Locking PCR0, PCR1 and PCR31
39,822,952 UART: [state] Locking ICCM
39,825,180 UART: [exit] Launching FMC @ 0x40000130
39,833,571 UART:
39,833,810 UART: Running Caliptra FMC ...
39,834,834 UART:
39,834,978 UART: [state] CFI Enabled
39,926,126 UART: [art] Extend RT PCRs Done
39,927,330 UART: [art] Lock RT PCRs Done
39,928,842 UART: [art] Populate DV Done
39,934,529 UART: [fht] FMC Alias Private Key: 7
39,936,017 UART: [art] Derive CDI
39,936,785 UART: [art] Store in slot 0x4
39,995,640 UART: [art] Derive Key Pair
39,996,680 UART: [art] Store priv key in slot 0x5
42,458,998 UART: [art] Derive Key Pair - Done
42,472,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,184,845 UART: [art] Erasing AUTHORITY.KEYID = 7
44,186,348 UART: [art] PUB.X = 59F1DBEC6737EF3991FFE5DED8001BF64C6394D7F0A3E8C23DF2F55A03C9591048C2802103BC54CEB05D0E65F50C1142
44,193,609 UART: [art] PUB.Y = F50B9F62B7FFF704077984A79F2D23AAB4A11001B50AE596AFD169D11AC9E36D8DB621D79919F4CAE01A738666DE48A6
44,200,892 UART: [art] SIG.R = CA92E8186C3F6520FE570D8C84ED24C26E863A17C17DAC5D4F16AEE40C5CD20EAFC725314A7FC685B55297BC894797AB
44,208,271 UART: [art] SIG.S = 02A4082E0D86404B17C128A95BECB3628FEEC0DF671C8CA7EFF35A933E2DF09150ABA681BFC8A935D353615247FC15E3
45,187,194 UART: Caliptra RT
45,187,899 UART: [state] CFI Enabled
45,606,976 UART: [rt] RT failed reset flow
45,608,193 UART: Fatal Error: 0x000E0035
45,609,743 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,460,661 ready_for_fw is high
3,461,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,136 >>> mbox cmd response: success
14,219,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,514,943 UART:
18,515,328 UART: Running Caliptra FMC ...
18,516,486 UART:
18,516,643 UART: [state] CFI Enabled
18,582,481 UART: [fht] FMC Alias Private Key: 7
20,348,822 UART: [art] Extend RT PCRs Done
20,350,060 UART: [art] Lock RT PCRs Done
20,351,804 UART: [art] Populate DV Done
20,357,456 UART: [fht] FMC Alias Private Key: 7
20,359,052 UART: [art] Derive CDI
20,359,866 UART: [art] Store in slot 0x4
20,415,475 UART: [art] Derive Key Pair
20,416,476 UART: [art] Store priv key in slot 0x5
22,879,202 UART: [art] Derive Key Pair - Done
22,892,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,305 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,806 UART: [art] PUB.X = 24F9432CA01A7FAEAEC6064E6D25214E9E315E9B346A676FD6BD568EAE5C2FC74DE76BA92450FB5CDE0193BAF4BAA45A
24,614,109 UART: [art] PUB.Y = 5A32A63D5C18A78E95C1E053DAB3C0EE17D3B44A6C1FDE1B71C581DBFC7C7DE4CE979D423AB781E43FBC98FEC5922E26
24,621,402 UART: [art] SIG.R = 7C063183908C0EB3665CD7D57A7CBF132BBF37AEE9170E905F12F3F8E9FA416250FA06A8AD5472E3D7FAA2C499FD48F4
24,628,802 UART: [art] SIG.S = 1ADE3148C86589AC83B7F4BE3D3237CCA81A4C9759B6991112548576E57225D108350011D69C2C720A2277860408697C
25,607,092 UART: Caliptra RT
25,607,811 UART: [state] CFI Enabled
25,788,480 UART: [rt] RT listening for mailbox commands...
25,820,635 UART: [rt]cmd =0x44504543, len=96
30,199,865 >>> mbox cmd response data (6236 bytes)
32,288,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,592,066 >>> mbox cmd response: success
39,592,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,626,226 UART:
39,626,516 UART: Running Caliptra FMC ...
39,627,631 UART:
39,627,791 UART: [state] CFI Enabled
39,716,517 UART: [art] Extend RT PCRs Done
39,717,714 UART: [art] Lock RT PCRs Done
39,719,094 UART: [art] Populate DV Done
39,724,459 UART: [fht] FMC Alias Private Key: 7
39,726,156 UART: [art] Derive CDI
39,726,964 UART: [art] Store in slot 0x4
39,785,327 UART: [art] Derive Key Pair
39,786,314 UART: [art] Store priv key in slot 0x5
42,249,749 UART: [art] Derive Key Pair - Done
42,262,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,975,297 UART: [art] Erasing AUTHORITY.KEYID = 7
43,976,806 UART: [art] PUB.X = 5291DB1FEC5B3B7EEDF778CFA8CCD81DFE0BDAE12D57F9E15222A9DD823140534CC6D1BF409F72FAB2C55CAD0393BCFA
43,984,059 UART: [art] PUB.Y = 2EFC216D81F85FD754E2290302CE250C086CEC1A3C228F61132A051294E926D4F780C2D523458A6CC50635F53B819A95
43,991,361 UART: [art] SIG.R = 0ACC5DE9EBEFC127801E50132A7E1C69421A6BFAB750F186B6387D8A7DED991C56244E4493A4A6F3E3E7B8CE138ED5CC
43,998,756 UART: [art] SIG.S = E9556650D30F841A25BE794D05958465168CFE67DF74DC64A2499237E9CEB11B4189431C1F31CA91B9F32B9E41D3B5AE
44,977,940 UART: Caliptra RT
44,978,662 UART: [state] CFI Enabled
45,406,050 UART: [rt] RT failed reset flow
45,407,266 UART: Fatal Error: 0x000E0035
45,408,870 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,473 UART:
192,826 UART: Running Caliptra ROM ...
193,962 UART:
603,676 UART: [state] CFI Enabled
615,073 UART: [state] LifecycleState = Unprovisioned
616,947 UART: [state] DebugLocked = No
619,261 UART: [state] WD Timer not started. Device not locked for debugging
623,681 UART: [kat] SHA2-256
803,303 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,107 UART: [kat] ++
814,753 UART: [kat] sha1
825,664 UART: [kat] SHA2-256
828,355 UART: [kat] SHA2-384
835,346 UART: [kat] SHA2-512-ACC
837,725 UART: [kat] ECC-384
3,281,030 UART: [kat] HMAC-384Kdf
3,292,205 UART: [kat] LMS
3,768,674 UART: [kat] --
3,771,468 UART: [cold-reset] ++
3,772,336 UART: [fht] FHT @ 0x50003400
3,783,334 UART: [idev] ++
3,783,937 UART: [idev] CDI.KEYID = 6
3,784,854 UART: [idev] SUBJECT.KEYID = 7
3,786,126 UART: [idev] UDS.KEYID = 0
3,787,058 ready_for_fw is high
3,787,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,970 UART: [idev] Erasing UDS.KEYID = 0
6,264,600 UART: [idev] Sha1 KeyId Algorithm
6,288,133 UART: [idev] --
6,291,916 UART: [ldev] ++
6,292,489 UART: [ldev] CDI.KEYID = 6
6,293,404 UART: [ldev] SUBJECT.KEYID = 5
6,294,625 UART: [ldev] AUTHORITY.KEYID = 7
6,295,862 UART: [ldev] FE.KEYID = 1
6,305,215 UART: [ldev] Erasing FE.KEYID = 1
8,782,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,984 UART: [ldev] --
10,576,731 UART: [fwproc] Wait for Commands...
10,579,204 UART: [fwproc] Recv command 0x46574c44
10,581,192 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,166 >>> mbox cmd response: success
14,557,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,560,456 UART: [afmc] ++
14,561,040 UART: [afmc] CDI.KEYID = 6
14,561,932 UART: [afmc] SUBJECT.KEYID = 7
14,563,204 UART: [afmc] AUTHORITY.KEYID = 5
17,067,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,721 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,705 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,811 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,711 UART: [afmc] --
18,865,815 UART: [cold-reset] --
18,868,648 UART: [state] Locking Datavault
18,874,815 UART: [state] Locking PCR0, PCR1 and PCR31
18,876,567 UART: [state] Locking ICCM
18,878,428 UART: [exit] Launching FMC @ 0x40000130
18,886,829 UART:
18,887,063 UART: Running Caliptra FMC ...
18,888,094 UART:
18,888,246 UART: [state] CFI Enabled
18,896,643 UART: [fht] FMC Alias Private Key: 7
20,662,835 UART: [art] Extend RT PCRs Done
20,664,078 UART: [art] Lock RT PCRs Done
20,665,605 UART: [art] Populate DV Done
20,670,966 UART: [fht] FMC Alias Private Key: 7
20,672,672 UART: [art] Derive CDI
20,673,491 UART: [art] Store in slot 0x4
20,716,200 UART: [art] Derive Key Pair
20,717,202 UART: [art] Store priv key in slot 0x5
23,143,913 UART: [art] Derive Key Pair - Done
23,156,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,337 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,836 UART: [art] PUB.X = 35BA68DD6A27DF187AEAB6BA463157F44E3D108199B66DDFC3D02A3497B90720A2FD725615882D7DC76071EC2BC0CFE6
24,872,150 UART: [art] PUB.Y = F152F70483B4233D41BB5553CBF7BB0AD31969D1884887A19B5FE3138AC1C8F95ABADD5A2D27D7213C46B0E5A4D84333
24,879,440 UART: [art] SIG.R = CD2771F9175691D94FBEF819A7164242D6C91BC5B5B6EE79F1F2622AA64901EA3F042F40E23729F50920AF702E0741EC
24,886,777 UART: [art] SIG.S = E8D6EBBF83FACCC03E8DBED9AC3122448C8B3BC46D838C7FC3902A0D168E995A48FCCF798C5E69F6B8063A33D5A2678A
25,866,006 UART: Caliptra RT
25,866,707 UART: [state] CFI Enabled
25,999,726 UART: [rt] RT listening for mailbox commands...
26,031,658 UART: [rt]cmd =0x44504543, len=96
30,328,113 >>> mbox cmd response data (6236 bytes)
32,413,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,564,338 UART:
32,564,761 UART: Running Caliptra ROM ...
32,565,820 UART:
32,565,985 UART: [state] CFI Enabled
32,580,366 UART: [state] LifecycleState = Unprovisioned
32,582,258 UART: [state] DebugLocked = No
32,584,851 UART: [state] WD Timer not started. Device not locked for debugging
32,588,064 UART: [kat] SHA2-256
32,767,795 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
32,778,537 UART: [kat] ++
32,778,989 UART: [kat] sha1
32,789,336 UART: [kat] SHA2-256
32,792,022 UART: [kat] SHA2-384
32,797,305 UART: [kat] SHA2-512-ACC
32,799,652 UART: [kat] ECC-384
35,242,462 UART: [kat] HMAC-384Kdf
35,254,761 UART: [kat] LMS
35,731,275 UART: [kat] --
35,734,841 UART: [update-reset] ++
39,227,154 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,230,530 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
39,628,119 >>> mbox cmd response: success
39,628,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,629,620 UART: [update-reset] Copying MAN_2 To MAN_1
39,666,724 UART: [update-reset Success] --
39,669,557 UART: [state] Locking Datavault
39,673,838 UART: [state] Locking PCR0, PCR1 and PCR31
39,675,545 UART: [state] Locking ICCM
39,678,190 UART: [exit] Launching FMC @ 0x40000130
39,686,590 UART:
39,686,830 UART: Running Caliptra FMC ...
39,687,933 UART:
39,688,094 UART: [state] CFI Enabled
39,731,861 UART: [art] Extend RT PCRs Done
39,733,048 UART: [art] Lock RT PCRs Done
39,734,454 UART: [art] Populate DV Done
39,739,979 UART: [fht] FMC Alias Private Key: 7
39,741,626 UART: [art] Derive CDI
39,742,446 UART: [art] Store in slot 0x4
39,785,523 UART: [art] Derive Key Pair
39,786,593 UART: [art] Store priv key in slot 0x5
42,213,101 UART: [art] Derive Key Pair - Done
42,225,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,932,256 UART: [art] Erasing AUTHORITY.KEYID = 7
43,933,760 UART: [art] PUB.X = E21B828D8C751C9C664E62A5AC4249EBBB008259C1C81059F2AED737CFA114405753F863660DD28AC9C94EC7A0DF9641
43,941,007 UART: [art] PUB.Y = DC895FA18871FB0822CE5235CC742690D4EFBA1FC45EFCDC53688874F77B556D8D6038466DF2D81B227FBB15EF04E6C1
43,948,273 UART: [art] SIG.R = C284A531715BD5D3EF2113ED686608A0CBA9AC6F073BE9156360C2C692A0D851D4D8CE14287ECF79EBEA1DE82760E323
43,955,684 UART: [art] SIG.S = 702323A8DB9E89EB4B5C5F5CC0F874D6739BCAEFFB7EE7CA45BB89937AF5C09FF6291FB312593B7E0D0EB992772D8F7C
44,934,333 UART: Caliptra RT
44,935,048 UART: [state] CFI Enabled
45,314,993 UART: [rt] RT failed reset flow
45,316,188 UART: Fatal Error: 0x000E0035
45,317,790 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,780,819 ready_for_fw is high
3,781,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,354 >>> mbox cmd response: success
14,446,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,697,215 UART:
18,697,642 UART: Running Caliptra FMC ...
18,698,865 UART:
18,699,047 UART: [state] CFI Enabled
18,706,400 UART: [fht] FMC Alias Private Key: 7
20,472,123 UART: [art] Extend RT PCRs Done
20,473,353 UART: [art] Lock RT PCRs Done
20,474,881 UART: [art] Populate DV Done
20,480,250 UART: [fht] FMC Alias Private Key: 7
20,481,791 UART: [art] Derive CDI
20,482,609 UART: [art] Store in slot 0x4
20,525,169 UART: [art] Derive Key Pair
20,526,217 UART: [art] Store priv key in slot 0x5
22,953,255 UART: [art] Derive Key Pair - Done
22,966,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,393 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,895 UART: [art] PUB.X = 553D1B18CB7E24C87638FDDEDAF01FC55C9ADDF90C08459FD83A5246A8EBEED91108B3B9793CA842DAB744B26817AC15
24,681,221 UART: [art] PUB.Y = 9E88F2FA5327EE14DFBC500FBBEB869C9722235CE9736527AB556409BB28ACEB6EBC65D8465B33360D6130AE3A45849F
24,688,487 UART: [art] SIG.R = B2EC80D9E69828A6E05CF623D51877239522B7FFAFE951BC268B2241B032E6DF8D7EB1150C6F320EE5C45937DBAE07AA
24,695,886 UART: [art] SIG.S = 6F7B8BF57396523AF4E4901118FD2734E39E83D16FB4DD3F41711A9BAA57D9E653405AB1D84FF34270F16E22F34BC5E1
25,674,321 UART: Caliptra RT
25,675,026 UART: [state] CFI Enabled
25,808,115 UART: [rt] RT listening for mailbox commands...
25,840,285 UART: [rt]cmd =0x44504543, len=96
30,137,144 >>> mbox cmd response data (6236 bytes)
32,230,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,454,317 >>> mbox cmd response: success
39,455,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
39,490,827 UART:
39,491,149 UART: Running Caliptra FMC ...
39,492,277 UART:
39,492,442 UART: [state] CFI Enabled
39,536,372 UART: [art] Extend RT PCRs Done
39,537,569 UART: [art] Lock RT PCRs Done
39,538,770 UART: [art] Populate DV Done
39,544,244 UART: [fht] FMC Alias Private Key: 7
39,545,840 UART: [art] Derive CDI
39,546,657 UART: [art] Store in slot 0x4
39,589,362 UART: [art] Derive Key Pair
39,590,364 UART: [art] Store priv key in slot 0x5
42,017,117 UART: [art] Derive Key Pair - Done
42,030,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,736,546 UART: [art] Erasing AUTHORITY.KEYID = 7
43,738,073 UART: [art] PUB.X = 7C4C0FE57514AAE90E509A909EC5382119B82A1811F24D66B431A6A796DAAB7B199F27511AB912318E5263D839E50DB2
43,745,345 UART: [art] PUB.Y = E0E40FED514C814A684C3BA39ED3F0C744537F976EC54494C4D9B736467162CE671AD7726420478FAB873ADB93035765
43,752,552 UART: [art] SIG.R = 32ED490473FFEAC4E455CC91AA21876D799016C7785B770FD4A7184954F42468FF883B85F59EC4DA25493FE9E9C627EA
43,759,954 UART: [art] SIG.S = CDA9CAFBFBFEBE87527F3E32314EB7B42F38BC1F0687EB215EBA6BCB9E36EB25D06125A7EFA3CB263CAEA7A5A95C0F66
44,738,948 UART: Caliptra RT
44,739,661 UART: [state] CFI Enabled
45,112,111 UART: [rt] RT failed reset flow
45,113,322 UART: Fatal Error: 0x000E0035
45,114,880 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,096 UART:
192,465 UART: Running Caliptra ROM ...
193,647 UART:
193,800 UART: [state] CFI Enabled
264,435 UART: [state] LifecycleState = Unprovisioned
266,836 UART: [state] DebugLocked = No
269,147 UART: [state] WD Timer not started. Device not locked for debugging
272,962 UART: [kat] SHA2-256
462,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,574 UART: [kat] ++
474,026 UART: [kat] sha1
485,377 UART: [kat] SHA2-256
488,431 UART: [kat] SHA2-384
495,349 UART: [kat] SHA2-512-ACC
497,936 UART: [kat] ECC-384
2,947,484 UART: [kat] HMAC-384Kdf
2,973,503 UART: [kat] LMS
3,505,248 UART: [kat] --
3,510,856 UART: [cold-reset] ++
3,511,694 UART: [fht] FHT @ 0x50003400
3,522,561 UART: [idev] ++
3,523,265 UART: [idev] CDI.KEYID = 6
3,524,154 UART: [idev] SUBJECT.KEYID = 7
3,525,402 UART: [idev] UDS.KEYID = 0
3,526,307 ready_for_fw is high
3,526,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,976 UART: [idev] Erasing UDS.KEYID = 0
6,033,258 UART: [idev] Sha1 KeyId Algorithm
6,057,328 UART: [idev] --
6,062,673 UART: [ldev] ++
6,063,405 UART: [ldev] CDI.KEYID = 6
6,064,464 UART: [ldev] SUBJECT.KEYID = 5
6,065,568 UART: [ldev] AUTHORITY.KEYID = 7
6,066,746 UART: [ldev] FE.KEYID = 1
6,104,828 UART: [ldev] Erasing FE.KEYID = 1
8,613,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,805 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,577 UART: [ldev] --
10,418,172 UART: [fwproc] Wait for Commands...
10,420,978 UART: [fwproc] Recv command 0x46574c44
10,423,286 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,893 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,028 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,382 >>> mbox cmd response: success
14,676,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,679,493 UART: [afmc] ++
14,680,193 UART: [afmc] CDI.KEYID = 6
14,681,431 UART: [afmc] SUBJECT.KEYID = 7
14,682,878 UART: [afmc] AUTHORITY.KEYID = 5
17,218,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,941,376 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,943,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,958,440 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,574 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,423 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,520 UART: [afmc] --
19,014,732 UART: [cold-reset] --
19,019,239 UART: [state] Locking Datavault
19,025,024 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,157 UART: [state] Locking ICCM
19,030,094 UART: [exit] Launching FMC @ 0x40000130
19,038,810 UART:
19,039,098 UART: Running Caliptra FMC ...
19,040,134 UART:
19,040,303 UART: [state] CFI Enabled
19,098,063 UART: [fht] FMC Alias Private Key: 7
20,864,624 UART: [art] Extend RT PCRs Done
20,865,843 UART: [art] Lock RT PCRs Done
20,867,286 UART: [art] Populate DV Done
20,872,857 UART: [fht] FMC Alias Private Key: 7
20,874,500 UART: [art] Derive CDI
20,875,313 UART: [art] Store in slot 0x4
20,930,997 UART: [art] Derive Key Pair
20,932,042 UART: [art] Store priv key in slot 0x5
23,395,381 UART: [art] Derive Key Pair - Done
23,408,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,751 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,263 UART: [art] PUB.X = EB9D17CD3E79E24AFC94EB4C5063BBEF88F5633C80E9E47ACF2AD22D41DC91461B4D258A7D652391C826D103508A0FF5
25,129,572 UART: [art] PUB.Y = B4A8E4CEA35D9EF366E59FC2A8957739747978D6A85FF5F47A794A55FB8C7D99F65F7E7AD7A4108B81B0309FCA234715
25,136,803 UART: [art] SIG.R = 0ADB3890CC1D13082F23FEE10256277E441B2A2AFFAA1F4C486BC203C02B04A9B10B9053E006DA4C2EE8BD62890D8053
25,144,216 UART: [art] SIG.S = BC5BCAC534F613033BC97C0CF3F188C2020431E561DCD4A0DCD3F6D9E998ED158C9F52FF31DD1D203A58AF24A3B4C68C
26,122,871 UART: Caliptra RT
26,123,566 UART: [state] CFI Enabled
26,303,991 UART: [rt] RT listening for mailbox commands...
26,336,313 UART: [rt]cmd =0x44504543, len=96
30,712,571 >>> mbox cmd response data (6236 bytes)
32,806,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,956,729 UART:
32,957,271 UART: Running Caliptra ROM ...
32,958,335 UART:
32,958,486 UART: [state] CFI Enabled
33,033,327 UART: [state] LifecycleState = Unprovisioned
33,035,399 UART: [state] DebugLocked = No
33,037,604 UART: [state] WD Timer not started. Device not locked for debugging
33,042,490 UART: [kat] SHA2-256
33,232,347 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,243,123 UART: [kat] ++
33,243,662 UART: [kat] sha1
33,254,066 UART: [kat] SHA2-256
33,257,090 UART: [kat] SHA2-384
33,262,859 UART: [kat] SHA2-512-ACC
33,265,428 UART: [kat] ECC-384
35,716,475 UART: [kat] HMAC-384Kdf
35,739,884 UART: [kat] LMS
36,271,447 UART: [kat] --
36,275,218 UART: [update-reset] ++
39,785,232 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,787,822 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,417,512 >>> mbox cmd response: success
40,417,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,418,651 UART: [update-reset] Copying MAN_2 To MAN_1
40,456,257 UART: [update-reset Success] --
40,462,103 UART: [state] Locking Datavault
40,465,837 UART: [state] Locking PCR0, PCR1 and PCR31
40,468,022 UART: [state] Locking ICCM
40,470,281 UART: [exit] Launching FMC @ 0x40000130
40,478,947 UART:
40,479,219 UART: Running Caliptra FMC ...
40,480,327 UART:
40,480,485 UART: [state] CFI Enabled
40,569,973 UART: [art] Extend RT PCRs Done
40,571,150 UART: [art] Lock RT PCRs Done
40,572,492 UART: [art] Populate DV Done
40,578,128 UART: [fht] FMC Alias Private Key: 7
40,579,611 UART: [art] Derive CDI
40,580,345 UART: [art] Store in slot 0x4
40,639,726 UART: [art] Derive Key Pair
40,640,766 UART: [art] Store priv key in slot 0x5
43,103,367 UART: [art] Derive Key Pair - Done
43,116,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,828,786 UART: [art] Erasing AUTHORITY.KEYID = 7
44,830,294 UART: [art] PUB.X = 1B30DB7DA5DDBDB685FBC791FA32F48536608F5AD7D0CD7F1F240B452F7D098ABF84998EECB6F38677D411626A39AA57
44,837,601 UART: [art] PUB.Y = AEF72EA57941E4B75D1FF9E45081C9A6FCFC34ED8BAE24B198DF4424728C2EF4DAC7FD1299187387AD2CBD0FA5C9C33C
44,844,886 UART: [art] SIG.R = 5D1AB9D3357C6CBF327CBFFC3823BA8C3D03D254B1F149988E90E29BD0412657C80BD45E0F8835DE4A8EE60CC538ED0A
44,852,280 UART: [art] SIG.S = D39A616792062383D37F266207BAD4683948471421D45EA126CDEE2C6794E126AFAA45A9A7C4842B1B25BB788536ED61
45,831,068 UART: Caliptra RT
45,831,789 UART: [state] CFI Enabled
46,258,950 UART: [rt] RT failed reset flow
46,260,144 UART: Fatal Error: 0x000E0035
46,261,798 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,416,587 ready_for_fw is high
3,416,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,798,954 >>> mbox cmd response: success
14,800,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,088,254 UART:
19,088,654 UART: Running Caliptra FMC ...
19,089,769 UART:
19,089,953 UART: [state] CFI Enabled
19,156,644 UART: [fht] FMC Alias Private Key: 7
20,922,448 UART: [art] Extend RT PCRs Done
20,923,655 UART: [art] Lock RT PCRs Done
20,924,956 UART: [art] Populate DV Done
20,930,165 UART: [fht] FMC Alias Private Key: 7
20,931,653 UART: [art] Derive CDI
20,932,385 UART: [art] Store in slot 0x4
20,989,341 UART: [art] Derive Key Pair
20,990,384 UART: [art] Store priv key in slot 0x5
23,453,487 UART: [art] Derive Key Pair - Done
23,466,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,179,258 UART: [art] Erasing AUTHORITY.KEYID = 7
25,180,757 UART: [art] PUB.X = 45BB798E3DA04B16396994E8112A60E1E410BEA42BCCFB150A941DEDBB1FC07DCE861690CA2D9E6585173CA0875D42CF
25,188,049 UART: [art] PUB.Y = 11DF1E0D54694D669407207A34BC1A45D772721A725A35A7AA8E4EDCAD45648E543FB98C583187B0806F47A8B79EA797
25,195,272 UART: [art] SIG.R = EDB45D71AD9831EE6D24DFB87BCBCAAF486784B3DA1A4D9865E8F2FDC4682701BACB03BC56E4FD275C0E47E1B276992D
25,202,761 UART: [art] SIG.S = E303F642A2DE060CBC42F9555892B8302C58983EE35153A3C203B8DAFCCC3D7A116CCE56055803A2037EE2D059CC9F19
26,181,995 UART: Caliptra RT
26,182,712 UART: [state] CFI Enabled
26,362,667 UART: [rt] RT listening for mailbox commands...
26,394,454 UART: [rt]cmd =0x44504543, len=96
30,771,638 >>> mbox cmd response data (6236 bytes)
32,863,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,764,508 >>> mbox cmd response: success
40,765,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,799,497 UART:
40,799,825 UART: Running Caliptra FMC ...
40,800,889 UART:
40,801,046 UART: [state] CFI Enabled
40,906,592 UART: [art] Extend RT PCRs Done
40,907,783 UART: [art] Lock RT PCRs Done
40,909,088 UART: [art] Populate DV Done
40,914,517 UART: [fht] FMC Alias Private Key: 7
40,916,111 UART: [art] Derive CDI
40,916,925 UART: [art] Store in slot 0x4
40,975,934 UART: [art] Derive Key Pair
40,976,990 UART: [art] Store priv key in slot 0x5
43,439,801 UART: [art] Derive Key Pair - Done
43,452,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,165,911 UART: [art] Erasing AUTHORITY.KEYID = 7
45,167,424 UART: [art] PUB.X = 9B8847E7983D63BFB5D5445C1C066894C5EB358CCD4B8421B4613836806185617349BDC9CD9B5D31AE8EF678B1CE676C
45,174,672 UART: [art] PUB.Y = DFD2CDA2B022451C09DFB3577C3A840604025014AA2BD2C7A269382A992A43EC973356795B26E7BFB01493A3ECF931CF
45,181,950 UART: [art] SIG.R = 2F3E0C90D88F5D17F30140FEAD92DBBD2E0E48A57B2DF277A7027E450A8DD7DE3D32061AAE26153F38DDE01B36560FD9
45,189,389 UART: [art] SIG.S = A33FD06C3D4D81E0612F5EB1B74CC7566AC8E3D076DAF6DBE9FD2C8845FFA934D6F8B7B78A9E335130EFAA7612872022
46,168,016 UART: Caliptra RT
46,168,732 UART: [state] CFI Enabled
46,596,843 UART: [rt] RT failed reset flow
46,598,051 UART: Fatal Error: 0x000E0035
46,599,663 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,528 UART:
192,892 UART: Running Caliptra ROM ...
194,031 UART:
603,813 UART: [state] CFI Enabled
619,766 UART: [state] LifecycleState = Unprovisioned
622,153 UART: [state] DebugLocked = No
625,036 UART: [state] WD Timer not started. Device not locked for debugging
630,243 UART: [kat] SHA2-256
820,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,892 UART: [kat] ++
831,499 UART: [kat] sha1
842,218 UART: [kat] SHA2-256
845,198 UART: [kat] SHA2-384
850,702 UART: [kat] SHA2-512-ACC
853,289 UART: [kat] ECC-384
3,294,602 UART: [kat] HMAC-384Kdf
3,308,621 UART: [kat] LMS
3,840,417 UART: [kat] --
3,845,548 UART: [cold-reset] ++
3,847,836 UART: [fht] FHT @ 0x50003400
3,858,605 UART: [idev] ++
3,859,249 UART: [idev] CDI.KEYID = 6
3,860,285 UART: [idev] SUBJECT.KEYID = 7
3,861,467 UART: [idev] UDS.KEYID = 0
3,862,398 ready_for_fw is high
3,862,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,453 UART: [idev] Erasing UDS.KEYID = 0
6,338,018 UART: [idev] Sha1 KeyId Algorithm
6,360,982 UART: [idev] --
6,366,521 UART: [ldev] ++
6,367,209 UART: [ldev] CDI.KEYID = 6
6,368,128 UART: [ldev] SUBJECT.KEYID = 5
6,369,287 UART: [ldev] AUTHORITY.KEYID = 7
6,370,528 UART: [ldev] FE.KEYID = 1
6,379,993 UART: [ldev] Erasing FE.KEYID = 1
8,860,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,814 UART: [ldev] --
10,650,568 UART: [fwproc] Wait for Commands...
10,653,484 UART: [fwproc] Recv command 0x46574c44
10,655,816 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,600 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,254 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,066 >>> mbox cmd response: success
14,916,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,919,719 UART: [afmc] ++
14,920,609 UART: [afmc] CDI.KEYID = 6
14,921,655 UART: [afmc] SUBJECT.KEYID = 7
14,923,097 UART: [afmc] AUTHORITY.KEYID = 5
17,427,554 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,980 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,188 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,099 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,796 UART: [afmc] --
19,222,773 UART: [cold-reset] --
19,227,289 UART: [state] Locking Datavault
19,230,769 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,915 UART: [state] Locking ICCM
19,235,728 UART: [exit] Launching FMC @ 0x40000130
19,244,387 UART:
19,244,654 UART: Running Caliptra FMC ...
19,245,698 UART:
19,245,851 UART: [state] CFI Enabled
19,253,659 UART: [fht] FMC Alias Private Key: 7
21,019,870 UART: [art] Extend RT PCRs Done
21,021,080 UART: [art] Lock RT PCRs Done
21,022,802 UART: [art] Populate DV Done
21,028,379 UART: [fht] FMC Alias Private Key: 7
21,029,920 UART: [art] Derive CDI
21,030,683 UART: [art] Store in slot 0x4
21,073,335 UART: [art] Derive Key Pair
21,074,336 UART: [art] Store priv key in slot 0x5
23,501,238 UART: [art] Derive Key Pair - Done
23,514,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,382 UART: [art] PUB.X = 54D8BE7E24750EB4F47BAEFFCB54B73C19A75ECE797F12D27BFE9C109AA231806E07B1B58B8A13621CBA01CE997A519D
25,229,714 UART: [art] PUB.Y = 0843EF4F4D950293EF699519999AA388C17B4105CD9AFDD7E350E141F9EB08F46CF0C4D384D1C0B1593B6369A8740F56
25,236,907 UART: [art] SIG.R = 3BA5A10379A697E2BF9DD153E8598871C22F0517D97CDBCBFBEDB104DC8C2764AD7B423C93B7747FD849506EAA31E924
25,244,362 UART: [art] SIG.S = A5C5A3C176A1C02FCE2DA0278792E56EA23FB6A794CD8FDDF21454C387F3B1DA02AE0F4BB0348DC840B47F864F76D20B
26,223,668 UART: Caliptra RT
26,224,365 UART: [state] CFI Enabled
26,358,165 UART: [rt] RT listening for mailbox commands...
26,390,153 UART: [rt]cmd =0x44504543, len=96
30,684,340 >>> mbox cmd response data (6236 bytes)
32,779,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
32,930,190 UART:
32,930,563 UART: Running Caliptra ROM ...
32,931,616 UART:
32,931,827 UART: [state] CFI Enabled
32,943,250 UART: [state] LifecycleState = Unprovisioned
32,945,149 UART: [state] DebugLocked = No
32,946,451 UART: [state] WD Timer not started. Device not locked for debugging
32,950,591 UART: [kat] SHA2-256
33,140,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
33,151,225 UART: [kat] ++
33,151,756 UART: [kat] sha1
33,164,500 UART: [kat] SHA2-256
33,167,455 UART: [kat] SHA2-384
33,173,675 UART: [kat] SHA2-512-ACC
33,176,260 UART: [kat] ECC-384
35,618,429 UART: [kat] HMAC-384Kdf
35,631,799 UART: [kat] LMS
36,163,404 UART: [kat] --
36,168,658 UART: [update-reset] ++
39,682,147 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,686,187 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
40,315,934 >>> mbox cmd response: success
40,316,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,317,967 UART: [update-reset] Copying MAN_2 To MAN_1
40,355,538 UART: [update-reset Success] --
40,359,890 UART: [state] Locking Datavault
40,362,757 UART: [state] Locking PCR0, PCR1 and PCR31
40,364,936 UART: [state] Locking ICCM
40,367,915 UART: [exit] Launching FMC @ 0x40000130
40,376,560 UART:
40,376,800 UART: Running Caliptra FMC ...
40,377,908 UART:
40,378,067 UART: [state] CFI Enabled
40,422,139 UART: [art] Extend RT PCRs Done
40,423,288 UART: [art] Lock RT PCRs Done
40,424,848 UART: [art] Populate DV Done
40,430,359 UART: [fht] FMC Alias Private Key: 7
40,431,849 UART: [art] Derive CDI
40,432,617 UART: [art] Store in slot 0x4
40,475,272 UART: [art] Derive Key Pair
40,476,317 UART: [art] Store priv key in slot 0x5
42,903,430 UART: [art] Derive Key Pair - Done
42,916,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,623,173 UART: [art] Erasing AUTHORITY.KEYID = 7
44,624,685 UART: [art] PUB.X = 3ED712B68220FE8D790BAD519994881C9CB86FFB61A1A698867C6F3CB11C8430A03C28601734B038A65ADC45E922AF8B
44,631,953 UART: [art] PUB.Y = B319BEEC4D113D9C65D0A87978E3D727D5E28FB72C2E9B0A15AD835576A6021557B85523DE6733A4530C4441384E9CB4
44,639,203 UART: [art] SIG.R = 361AE913A4B7CA914F52816E772F7200735E5BE543752D922A4D8DA16C1A73F07F8E6DA4B198CF0C57F95B52B7A7939F
44,646,565 UART: [art] SIG.S = 701D301D20672E3F7DEE113E9C9AB8AD4F28D64863CFF02110EAF63788EE2AC40BFD13D91BCD02D6696D7FC11039EE4E
45,625,670 UART: Caliptra RT
45,626,362 UART: [state] CFI Enabled
46,005,142 UART: [rt] RT failed reset flow
46,006,341 UART: Fatal Error: 0x000E0035
46,007,937 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,757,710 ready_for_fw is high
3,758,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,815 >>> mbox cmd response: success
15,056,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,306,001 UART:
19,306,403 UART: Running Caliptra FMC ...
19,307,537 UART:
19,307,695 UART: [state] CFI Enabled
19,315,559 UART: [fht] FMC Alias Private Key: 7
21,081,882 UART: [art] Extend RT PCRs Done
21,083,110 UART: [art] Lock RT PCRs Done
21,084,661 UART: [art] Populate DV Done
21,090,256 UART: [fht] FMC Alias Private Key: 7
21,091,753 UART: [art] Derive CDI
21,092,494 UART: [art] Store in slot 0x4
21,135,469 UART: [art] Derive Key Pair
21,136,516 UART: [art] Store priv key in slot 0x5
23,563,363 UART: [art] Derive Key Pair - Done
23,576,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,653 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,165 UART: [art] PUB.X = 2DFC8FD75FB19B86A1A0D4D734723E103E03CF66156C9BC95173A2C2687DDD33CBEEAA2D2F9C9503EC99C584AF7CEC70
25,291,441 UART: [art] PUB.Y = C0CB5CA158D6C34C71C3A599394662A6E5E430D9B1E2B44F84A711B760FD2558A0723141E990B755B9C17CECB486B062
25,298,666 UART: [art] SIG.R = B0022DC9DA4511E418C0FE01EB120711F64057F943A538D3F46A99789BA62A980010160E16FCC981B8FED41A07AA72D1
25,306,094 UART: [art] SIG.S = FA415E48649E653DDD735D92FDAE880F52DF68C700149D77A333F16FB989CDBCA5D5623650CA8F5A229C33E52E214169
26,284,900 UART: Caliptra RT
26,285,591 UART: [state] CFI Enabled
26,417,837 UART: [rt] RT listening for mailbox commands...
26,450,167 UART: [rt]cmd =0x44504543, len=96
30,745,876 >>> mbox cmd response data (6236 bytes)
32,842,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
40,667,034 >>> mbox cmd response: success
40,667,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
40,701,159 UART:
40,701,483 UART: Running Caliptra FMC ...
40,702,529 UART:
40,702,680 UART: [state] CFI Enabled
40,747,093 UART: [art] Extend RT PCRs Done
40,748,296 UART: [art] Lock RT PCRs Done
40,749,580 UART: [art] Populate DV Done
40,754,962 UART: [fht] FMC Alias Private Key: 7
40,756,612 UART: [art] Derive CDI
40,757,352 UART: [art] Store in slot 0x4
40,800,061 UART: [art] Derive Key Pair
40,801,107 UART: [art] Store priv key in slot 0x5
43,227,975 UART: [art] Derive Key Pair - Done
43,241,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,947,265 UART: [art] Erasing AUTHORITY.KEYID = 7
44,948,772 UART: [art] PUB.X = C7A5227592AF6C518776EAE746A784E75C02A2E39947FC927C9E04C158621995E2042C5551385FE274A8D8AEDF703A2D
44,956,049 UART: [art] PUB.Y = C7378112E632B3FF8D85642763044DEE65F70DC28C0CA5184CA3B1CCBA1E2C49B9C41498FD460A157BF8E7C5194EF4AD
44,963,276 UART: [art] SIG.R = 2AED2352689F3069EA11ADD9091637995F268282E02EAF575C1712E827A90C3E39C18348B014AEF090883390DAB8ABAE
44,970,633 UART: [art] SIG.S = 339F4AB6940C7DABF51FBA9244B1E6119A2C26694824677864B65E165F088EDDF5CCED0C1E6C2C89BF05E4D9B15C7014
45,949,806 UART: Caliptra RT
45,950,515 UART: [state] CFI Enabled
46,324,730 UART: [rt] RT failed reset flow
46,325,926 UART: Fatal Error: 0x000E0035
46,327,521 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,345 UART: [kat] SHA2-256
882,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,391 UART: [kat] ++
886,543 UART: [kat] sha1
890,847 UART: [kat] SHA2-256
892,785 UART: [kat] SHA2-384
895,642 UART: [kat] SHA2-512-ACC
897,543 UART: [kat] ECC-384
902,932 UART: [kat] HMAC-384Kdf
907,486 UART: [kat] LMS
1,475,682 UART: [kat] --
1,476,697 UART: [cold-reset] ++
1,477,063 UART: [fht] Storing FHT @ 0x50003400
1,479,868 UART: [idev] ++
1,480,036 UART: [idev] CDI.KEYID = 6
1,480,396 UART: [idev] SUBJECT.KEYID = 7
1,480,820 UART: [idev] UDS.KEYID = 0
1,481,165 ready_for_fw is high
1,481,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,968 UART: [idev] Erasing UDS.KEYID = 0
1,505,836 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,422 UART: [idev] --
1,515,461 UART: [ldev] ++
1,515,629 UART: [ldev] CDI.KEYID = 6
1,515,992 UART: [ldev] SUBJECT.KEYID = 5
1,516,418 UART: [ldev] AUTHORITY.KEYID = 7
1,516,881 UART: [ldev] FE.KEYID = 1
1,521,941 UART: [ldev] Erasing FE.KEYID = 1
1,547,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,068 UART: [ldev] --
1,586,377 UART: [fwproc] Waiting for Commands...
1,587,210 UART: [fwproc] Received command 0x46574c44
1,588,001 UART: [fwproc] Received Image of size 118548 bytes
2,931,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,129 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,347 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,608 >>> mbox cmd response: success
3,130,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,714 UART: [afmc] ++
3,131,882 UART: [afmc] CDI.KEYID = 6
3,132,244 UART: [afmc] SUBJECT.KEYID = 7
3,132,669 UART: [afmc] AUTHORITY.KEYID = 5
3,167,682 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,404 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,996 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,679 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,491 UART: [afmc] --
3,210,385 UART: [cold-reset] --
3,211,189 UART: [state] Locking Datavault
3,212,280 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,884 UART: [state] Locking ICCM
3,213,428 UART: [exit] Launching FMC @ 0x40000130
3,218,758 UART:
3,218,774 UART: Running Caliptra FMC ...
3,219,182 UART:
3,219,236 UART: [state] CFI Enabled
3,229,634 UART: [fht] FMC Alias Private Key: 7
3,348,424 UART: [art] Extend RT PCRs Done
3,348,852 UART: [art] Lock RT PCRs Done
3,350,208 UART: [art] Populate DV Done
3,358,457 UART: [fht] FMC Alias Private Key: 7
3,359,587 UART: [art] Derive CDI
3,359,867 UART: [art] Store in slot 0x4
3,445,599 UART: [art] Derive Key Pair
3,445,959 UART: [art] Store priv key in slot 0x5
3,459,208 UART: [art] Derive Key Pair - Done
3,474,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,432 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,197 UART: [art] PUB.X = 6DA6C25F3C07DF07E9402C3C895DEC42BA038E960D9DDAE525E9BA28E107B79DFAE777D0D9EAAC67AE83BA9B2AFA3A8A
3,496,982 UART: [art] PUB.Y = F1AC8068B7B46C1A59F3F33604ABA2E8FA18405099ED4D098C2BF2AE58916A6A345B0775262548AC2A37FA942E448A67
3,503,927 UART: [art] SIG.R = CC8342880B7EB6495E926B175B374D1AB5E4C4C60EBA07534BFF3507738129A736AE0F5ED4D52745FE75B5C66BBA53F9
3,510,690 UART: [art] SIG.S = 66A873865723DBDBE9D83EBBB6059921160C7C6B19C74BA6412497A342CAD6CD906D490ADB27CC7623CBE98C242AC6EB
3,534,215 UART: Caliptra RT
3,534,466 UART: [state] CFI Enabled
3,655,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,228 UART: [rt]cmd =0x44504543, len=96
3,878,231 >>> mbox cmd response data (6236 bytes)
3,878,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,879,202 UART:
3,879,218 UART: Running Caliptra ROM ...
3,879,626 UART:
3,879,680 UART: [state] CFI Enabled
3,882,570 UART: [state] LifecycleState = Unprovisioned
3,883,225 UART: [state] DebugLocked = No
3,883,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,885,488 UART: [kat] SHA2-256
4,679,419 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,683,534 UART: [kat] ++
4,683,686 UART: [kat] sha1
4,687,988 UART: [kat] SHA2-256
4,689,926 UART: [kat] SHA2-384
4,692,739 UART: [kat] SHA2-512-ACC
4,694,639 UART: [kat] ECC-384
4,700,304 UART: [kat] HMAC-384Kdf
4,704,820 UART: [kat] LMS
5,273,016 UART: [kat] --
5,273,893 UART: [update-reset] ++
6,655,575 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,656,691 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,811,958 >>> mbox cmd response: success
6,811,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,812,229 UART: [update-reset] Copying MAN_2 To MAN_1
6,820,243 UART: [update-reset Success] --
6,821,358 UART: [state] Locking Datavault
6,822,084 UART: [state] Locking PCR0, PCR1 and PCR31
6,822,688 UART: [state] Locking ICCM
6,823,234 UART: [exit] Launching FMC @ 0x40000130
6,828,564 UART:
6,828,580 UART: Running Caliptra FMC ...
6,828,988 UART:
6,829,042 UART: [state] CFI Enabled
6,918,395 UART: [art] Extend RT PCRs Done
6,918,823 UART: [art] Lock RT PCRs Done
6,920,144 UART: [art] Populate DV Done
6,928,449 UART: [fht] FMC Alias Private Key: 7
6,929,517 UART: [art] Derive CDI
6,929,797 UART: [art] Store in slot 0x4
7,015,319 UART: [art] Derive Key Pair
7,015,679 UART: [art] Store priv key in slot 0x5
7,028,550 UART: [art] Derive Key Pair - Done
7,043,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,059,193 UART: [art] Erasing AUTHORITY.KEYID = 7
7,059,958 UART: [art] PUB.X = C81E5F9329D13B7D44C97C258BA15713023B0426EF130441A7333FB869F7E06F851247425C594F285BF8F07E85C04D53
7,066,711 UART: [art] PUB.Y = 051991051A876534839E7D0467F0F4726007B8E9B4009B1BE2119276E478A2AB8B45F8FBAE5518719763B514FB4D6BF5
7,073,619 UART: [art] SIG.R = 004E056EFB8024C8216227657157305F7ABE9523CBB506A335CF50B11F281F2D3C980A33941567FEF89BC0E82F8D78E1
7,080,356 UART: [art] SIG.S = EDC88DD6E727242A5B704745892D46C3FC02C40092C29DA7D33BADA91E19DC4F333DE9250F9CC0E565AF72B72DCBA451
7,103,752 UART: Caliptra RT
7,104,003 UART: [state] CFI Enabled
7,471,882 UART: [rt] RT failed reset flow
7,472,313 UART: Fatal Error: 0x000E0035
7,473,433 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,271 ready_for_fw is high
1,362,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,884 >>> mbox cmd response: success
2,980,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,589 UART:
3,042,605 UART: Running Caliptra FMC ...
3,043,013 UART:
3,043,067 UART: [state] CFI Enabled
3,053,507 UART: [fht] FMC Alias Private Key: 7
3,173,173 UART: [art] Extend RT PCRs Done
3,173,601 UART: [art] Lock RT PCRs Done
3,175,469 UART: [art] Populate DV Done
3,183,446 UART: [fht] FMC Alias Private Key: 7
3,184,390 UART: [art] Derive CDI
3,184,670 UART: [art] Store in slot 0x4
3,270,206 UART: [art] Derive Key Pair
3,270,566 UART: [art] Store priv key in slot 0x5
3,283,789 UART: [art] Derive Key Pair - Done
3,298,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,483 UART: [art] PUB.X = A38E5588F941455BF233C96308A8B013B95E431C11B9E197AC14CFB7ED2CCCCC8D488385E40DA41990B607744C2B25F4
3,321,248 UART: [art] PUB.Y = F831C6A29836895332917CBBB26A373099052AEA890F3897424D788E83A26ED012DD3ABE4965EB232CE5CBF5BA067076
3,328,189 UART: [art] SIG.R = F9E3A7E980AF3265D7B2925EC1E8D44F32B2B597A0A3D0159018EC9233B88CE8B426F1440323464A7060D9C2F221CA50
3,334,956 UART: [art] SIG.S = F9DED0C2F1047DC17E404565920C5A367082C6605A3E79208CD251E6FE3E690760B21E171A3D30663BBDD8B79EB25A01
3,359,068 UART: Caliptra RT
3,359,319 UART: [state] CFI Enabled
3,478,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,570 UART: [rt]cmd =0x44504543, len=96
3,700,627 >>> mbox cmd response data (6236 bytes)
3,700,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,515,868 >>> mbox cmd response: success
6,515,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,104 UART:
6,529,120 UART: Running Caliptra FMC ...
6,529,528 UART:
6,529,582 UART: [state] CFI Enabled
6,618,577 UART: [art] Extend RT PCRs Done
6,619,005 UART: [art] Lock RT PCRs Done
6,620,348 UART: [art] Populate DV Done
6,628,393 UART: [fht] FMC Alias Private Key: 7
6,629,431 UART: [art] Derive CDI
6,629,711 UART: [art] Store in slot 0x4
6,715,463 UART: [art] Derive Key Pair
6,715,823 UART: [art] Store priv key in slot 0x5
6,728,440 UART: [art] Derive Key Pair - Done
6,743,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,758,977 UART: [art] Erasing AUTHORITY.KEYID = 7
6,759,742 UART: [art] PUB.X = 854178327014B3C9CA71BA7A68A0547AAA8DEB89AA814C4C23A4A61D4D07BD3A48817BB9519FD021BEC5628AD046F5CD
6,766,521 UART: [art] PUB.Y = D71F3E8CD206B8F97A6C8354B8A5DF75286C119EDD2329C60627C3C796348D1C5BD8E6BF3C4A0214FA73DF526C289362
6,773,468 UART: [art] SIG.R = 0039FBE8DC6DD1EE290BA133B9204DDA9DD5CDFE6A5A6DAB08EE4589F8F43144DA30B66FED1E555BA2467E3BE0318B18
6,780,234 UART: [art] SIG.S = D31F252950B2AF9028879A5F3EE4F8D4710A9084C1D1AA3EE69B7D9CF2243375A6A90EE3123A88818884B14F630C0CDC
6,804,278 UART: Caliptra RT
6,804,529 UART: [state] CFI Enabled
7,169,546 UART: [rt] RT failed reset flow
7,169,977 UART: Fatal Error: 0x000E0035
7,171,097 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,074 UART: [kat] SHA2-256
882,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,120 UART: [kat] ++
886,272 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,001 UART: [kat] SHA2-512-ACC
896,902 UART: [kat] ECC-384
902,459 UART: [kat] HMAC-384Kdf
907,157 UART: [kat] LMS
1,475,353 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,822 UART: [fht] Storing FHT @ 0x50003400
1,479,551 UART: [idev] ++
1,479,719 UART: [idev] CDI.KEYID = 6
1,480,079 UART: [idev] SUBJECT.KEYID = 7
1,480,503 UART: [idev] UDS.KEYID = 0
1,480,848 ready_for_fw is high
1,480,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,917 UART: [idev] Erasing UDS.KEYID = 0
1,505,533 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,247 UART: [idev] --
1,515,296 UART: [ldev] ++
1,515,464 UART: [ldev] CDI.KEYID = 6
1,515,827 UART: [ldev] SUBJECT.KEYID = 5
1,516,253 UART: [ldev] AUTHORITY.KEYID = 7
1,516,716 UART: [ldev] FE.KEYID = 1
1,521,852 UART: [ldev] Erasing FE.KEYID = 1
1,547,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,213 UART: [ldev] --
1,586,644 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 118548 bytes
2,932,928 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,336 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,977 >>> mbox cmd response: success
3,131,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,047 UART: [afmc] ++
3,133,215 UART: [afmc] CDI.KEYID = 6
3,133,577 UART: [afmc] SUBJECT.KEYID = 7
3,134,002 UART: [afmc] AUTHORITY.KEYID = 5
3,168,727 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,247 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,619 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,302 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,046 UART: [afmc] --
3,212,002 UART: [cold-reset] --
3,213,038 UART: [state] Locking Datavault
3,214,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,869 UART: [state] Locking ICCM
3,215,533 UART: [exit] Launching FMC @ 0x40000130
3,220,863 UART:
3,220,879 UART: Running Caliptra FMC ...
3,221,287 UART:
3,221,430 UART: [state] CFI Enabled
3,232,266 UART: [fht] FMC Alias Private Key: 7
3,351,384 UART: [art] Extend RT PCRs Done
3,351,812 UART: [art] Lock RT PCRs Done
3,353,414 UART: [art] Populate DV Done
3,361,649 UART: [fht] FMC Alias Private Key: 7
3,362,653 UART: [art] Derive CDI
3,362,933 UART: [art] Store in slot 0x4
3,449,081 UART: [art] Derive Key Pair
3,449,441 UART: [art] Store priv key in slot 0x5
3,462,128 UART: [art] Derive Key Pair - Done
3,476,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,072 UART: [art] PUB.X = C0BB37E442C9939C75F472108DA8B36F9626C1327DBAC0C30E005887779A6C27B657A430F0C19EFE78CEBA0A1FF23DDB
3,499,826 UART: [art] PUB.Y = 8F9F3CF20AA94DF44D3CC0E883CA0669690D81C292E0196C533E82B154746D0E28E3CBBF856F614354FD0EA184AAF306
3,506,766 UART: [art] SIG.R = A28EC30716113129F0C615318EA18FB9414E62117B8418C42B62515B033A51F74B5E018013348B48127665315B8F9755
3,513,507 UART: [art] SIG.S = 288E4C6D930FECB166E072977E77DE3BD77300ABD65CF67882C607D15760EEC4B3E3B1ECB91C889E3A51A1999F55781A
3,537,651 UART: Caliptra RT
3,537,994 UART: [state] CFI Enabled
3,658,262 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,418 UART: [rt]cmd =0x44504543, len=96
3,881,375 >>> mbox cmd response data (6236 bytes)
3,881,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,418 UART:
3,882,434 UART: Running Caliptra ROM ...
3,882,842 UART:
3,882,983 UART: [state] CFI Enabled
3,885,687 UART: [state] LifecycleState = Unprovisioned
3,886,342 UART: [state] DebugLocked = No
3,886,938 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,888,647 UART: [kat] SHA2-256
4,682,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,686,693 UART: [kat] ++
4,686,845 UART: [kat] sha1
4,690,985 UART: [kat] SHA2-256
4,692,923 UART: [kat] SHA2-384
4,695,582 UART: [kat] SHA2-512-ACC
4,697,482 UART: [kat] ECC-384
4,703,181 UART: [kat] HMAC-384Kdf
4,707,707 UART: [kat] LMS
5,275,903 UART: [kat] --
5,276,524 UART: [update-reset] ++
6,658,908 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,660,022 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,815,289 >>> mbox cmd response: success
6,815,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,815,424 UART: [update-reset] Copying MAN_2 To MAN_1
6,823,438 UART: [update-reset Success] --
6,824,321 UART: [state] Locking Datavault
6,824,945 UART: [state] Locking PCR0, PCR1 and PCR31
6,825,549 UART: [state] Locking ICCM
6,826,025 UART: [exit] Launching FMC @ 0x40000130
6,831,355 UART:
6,831,371 UART: Running Caliptra FMC ...
6,831,779 UART:
6,831,922 UART: [state] CFI Enabled
6,921,901 UART: [art] Extend RT PCRs Done
6,922,329 UART: [art] Lock RT PCRs Done
6,923,728 UART: [art] Populate DV Done
6,932,069 UART: [fht] FMC Alias Private Key: 7
6,932,999 UART: [art] Derive CDI
6,933,279 UART: [art] Store in slot 0x4
7,019,041 UART: [art] Derive Key Pair
7,019,401 UART: [art] Store priv key in slot 0x5
7,033,046 UART: [art] Derive Key Pair - Done
7,047,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,063,523 UART: [art] Erasing AUTHORITY.KEYID = 7
7,064,288 UART: [art] PUB.X = 253A85CE9C31226F740215A0630A5B5C9AD83C7CCC176B5CF4D962461B30F29DB32B95BDDEF2DD6BD30150D975FFE5AB
7,071,065 UART: [art] PUB.Y = A54ECCB04DB505223BD2BBC3F0FA259B480AC1D37A7905A80CF2D4D2BE81CD3BC08BE1AC1ED86966DAAE460E848C794E
7,078,026 UART: [art] SIG.R = 05807550BFA8843AB609263D1D13E9D2AFFA26B3D70D935B1D01F03BC043C654F78A1C617D423B321C2E5BF29F30947C
7,084,788 UART: [art] SIG.S = A05977D26E7AE4DE94918019D5D62C2AF62CA5DAE80061CC0F738543C55F86462864DD4BC9B4843961F64B2BD069CA3A
7,108,121 UART: Caliptra RT
7,108,464 UART: [state] CFI Enabled
7,478,915 UART: [rt] RT failed reset flow
7,479,346 UART: Fatal Error: 0x000E0035
7,480,466 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,880 ready_for_fw is high
1,362,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,079 >>> mbox cmd response: success
2,981,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,856 UART:
3,042,872 UART: Running Caliptra FMC ...
3,043,280 UART:
3,043,423 UART: [state] CFI Enabled
3,053,731 UART: [fht] FMC Alias Private Key: 7
3,172,407 UART: [art] Extend RT PCRs Done
3,172,835 UART: [art] Lock RT PCRs Done
3,174,083 UART: [art] Populate DV Done
3,182,326 UART: [fht] FMC Alias Private Key: 7
3,183,436 UART: [art] Derive CDI
3,183,716 UART: [art] Store in slot 0x4
3,269,322 UART: [art] Derive Key Pair
3,269,682 UART: [art] Store priv key in slot 0x5
3,283,329 UART: [art] Derive Key Pair - Done
3,297,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,342 UART: [art] PUB.X = DDD95ADF8F11937673A3CF6ABD008F0D5F35D406346ACA66D3D24C591EA670409E96ADC41B5D12F323E2B51F503D2276
3,321,094 UART: [art] PUB.Y = F7CACEED5A2F46D1BDF6134DD38497FD990ACABE8F118E07BB9F8FE8D287926102163B7D3668E9144B3F4A5C4BBC0494
3,328,050 UART: [art] SIG.R = 1CE396D02F6AD18760A6B7E8A55BE36D8685E69A551F1289F485D6B6B9F9E82ED8A57CD637011A27031C5F397BE6AEBE
3,334,824 UART: [art] SIG.S = BBBC9F30F3F8C7F12C053A458A761939639CEFD2F51CA28191A43648011919820D15FC0F7B205B412CF994E1BE315F74
3,359,062 UART: Caliptra RT
3,359,405 UART: [state] CFI Enabled
3,478,765 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,697 UART: [rt]cmd =0x44504543, len=96
3,701,452 >>> mbox cmd response data (6236 bytes)
3,701,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,516,280 >>> mbox cmd response: success
6,516,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,562 UART:
6,529,578 UART: Running Caliptra FMC ...
6,529,986 UART:
6,530,129 UART: [state] CFI Enabled
6,619,298 UART: [art] Extend RT PCRs Done
6,619,726 UART: [art] Lock RT PCRs Done
6,621,115 UART: [art] Populate DV Done
6,629,412 UART: [fht] FMC Alias Private Key: 7
6,630,554 UART: [art] Derive CDI
6,630,834 UART: [art] Store in slot 0x4
6,716,514 UART: [art] Derive Key Pair
6,716,874 UART: [art] Store priv key in slot 0x5
6,729,757 UART: [art] Derive Key Pair - Done
6,744,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,759,878 UART: [art] Erasing AUTHORITY.KEYID = 7
6,760,643 UART: [art] PUB.X = 9AD87AB8390D539BD8FDFA4E53A8BE6F0617ACF5ADF5692478546AA31C605FA3ECD4595F9863FC41AE0ABFC5EDF6F562
6,767,428 UART: [art] PUB.Y = D0540EDB3F9BDF2DC2C542373C2191312C588304E6309A52A1D2D739E97BF516594EBBA95024DF8DB35EDE967CCF5E1C
6,774,384 UART: [art] SIG.R = 9B8C5B8D6FEA6218528F24186B33C28F0FEEE1CEE051124F370240317685D11D99AB29A8E78C72FCF00C47BEAA2E12BB
6,781,157 UART: [art] SIG.S = DB96691B5E6DFACD3B518E04556D57A83F7D8799BF5D5F5A6F941857E6FEBD9E5B6135F8A3340D8A303827CD5271F3F3
6,804,739 UART: Caliptra RT
6,805,082 UART: [state] CFI Enabled
7,176,392 UART: [rt] RT failed reset flow
7,176,823 UART: Fatal Error: 0x000E0035
7,177,943 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,196 UART: [state] LifecycleState = Unprovisioned
85,851 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
891,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,504 UART: [kat] ++
895,656 UART: [kat] sha1
899,936 UART: [kat] SHA2-256
901,876 UART: [kat] SHA2-384
904,575 UART: [kat] SHA2-512-ACC
906,476 UART: [kat] ECC-384
916,271 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,169,652 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,868 UART: [idev] ++
1,173,036 UART: [idev] CDI.KEYID = 6
1,173,397 UART: [idev] SUBJECT.KEYID = 7
1,173,822 UART: [idev] UDS.KEYID = 0
1,174,168 ready_for_fw is high
1,174,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,647 UART: [idev] Erasing UDS.KEYID = 0
1,199,153 UART: [idev] Sha1 KeyId Algorithm
1,208,071 UART: [idev] --
1,209,058 UART: [ldev] ++
1,209,226 UART: [ldev] CDI.KEYID = 6
1,209,590 UART: [ldev] SUBJECT.KEYID = 5
1,210,017 UART: [ldev] AUTHORITY.KEYID = 7
1,210,480 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,242,311 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,118 UART: [ldev] --
1,281,537 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,075 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,928 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,105 >>> mbox cmd response: success
2,827,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,189 UART: [afmc] ++
2,828,357 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,146 UART: [afmc] AUTHORITY.KEYID = 5
2,864,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,363 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,073 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,954 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,655 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,458 UART: [afmc] --
2,907,321 UART: [cold-reset] --
2,908,077 UART: [state] Locking Datavault
2,909,484 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,088 UART: [state] Locking ICCM
2,910,560 UART: [exit] Launching FMC @ 0x40000130
2,915,890 UART:
2,915,906 UART: Running Caliptra FMC ...
2,916,314 UART:
2,916,368 UART: [state] CFI Enabled
2,926,618 UART: [fht] FMC Alias Private Key: 7
3,046,054 UART: [art] Extend RT PCRs Done
3,046,482 UART: [art] Lock RT PCRs Done
3,048,020 UART: [art] Populate DV Done
3,056,369 UART: [fht] FMC Alias Private Key: 7
3,057,533 UART: [art] Derive CDI
3,057,813 UART: [art] Store in slot 0x4
3,143,810 UART: [art] Derive Key Pair
3,144,170 UART: [art] Store priv key in slot 0x5
3,157,588 UART: [art] Derive Key Pair - Done
3,172,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,821 UART: [art] PUB.X = 8F033D03FC99512D807909C29579C33F71B3A3D3852E2BFE379695A1C5DC66D521805720B2E995C44D056B90B1E1BED4
3,195,577 UART: [art] PUB.Y = 89BB88EF3338C8020985B2595F5ADA0E97E2272947523F649DD676AAB994776DCEA9E023D20F551EB54E4D2A4A903134
3,202,515 UART: [art] SIG.R = 8898E8B25AFCDD8112045C033C237556614E59F262A95B765811259B32DAF8743702FA2F06D88CE4FEB2F85D658B229E
3,209,271 UART: [art] SIG.S = 2D36CB7AB6EF4BB34DF06C973D5ABEE4E7507CE61C67813FB18D1B5276E6785AB981BF1156E20D2E637C6085A0D8B663
3,233,472 UART: Caliptra RT
3,233,723 UART: [state] CFI Enabled
3,352,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,160 UART: [rt]cmd =0x44504543, len=96
3,575,014 >>> mbox cmd response data (6236 bytes)
3,575,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,838 UART:
3,575,854 UART: Running Caliptra ROM ...
3,576,262 UART:
3,576,317 UART: [state] CFI Enabled
3,578,483 UART: [state] LifecycleState = Unprovisioned
3,579,138 UART: [state] DebugLocked = No
3,579,752 UART: [state] WD Timer not started. Device not locked for debugging
3,580,926 UART: [kat] SHA2-256
4,384,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,388,580 UART: [kat] ++
4,388,732 UART: [kat] sha1
4,392,886 UART: [kat] SHA2-256
4,394,826 UART: [kat] SHA2-384
4,397,469 UART: [kat] SHA2-512-ACC
4,399,369 UART: [kat] ECC-384
4,408,872 UART: [kat] HMAC-384Kdf
4,413,374 UART: [kat] LMS
4,661,686 UART: [kat] --
4,662,320 UART: [update-reset] ++
6,021,141 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,022,222 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,177,437 >>> mbox cmd response: success
6,177,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,177,652 UART: [update-reset] Copying MAN_2 To MAN_1
6,185,666 UART: [update-reset Success] --
6,186,499 UART: [state] Locking Datavault
6,187,415 UART: [state] Locking PCR0, PCR1 and PCR31
6,188,019 UART: [state] Locking ICCM
6,188,593 UART: [exit] Launching FMC @ 0x40000130
6,193,923 UART:
6,193,939 UART: Running Caliptra FMC ...
6,194,347 UART:
6,194,401 UART: [state] CFI Enabled
6,283,748 UART: [art] Extend RT PCRs Done
6,284,176 UART: [art] Lock RT PCRs Done
6,285,415 UART: [art] Populate DV Done
6,293,484 UART: [fht] FMC Alias Private Key: 7
6,294,466 UART: [art] Derive CDI
6,294,746 UART: [art] Store in slot 0x4
6,380,635 UART: [art] Derive Key Pair
6,380,995 UART: [art] Store priv key in slot 0x5
6,394,235 UART: [art] Derive Key Pair - Done
6,408,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,424,549 UART: [art] Erasing AUTHORITY.KEYID = 7
6,425,314 UART: [art] PUB.X = 7E1BEA3D23C57BA593705CC14D7D121D9AD588E4EB6C249A2CC1B43F05D2441F1BE04D1F9F6FAFF82CB506433B3EBFBB
6,432,102 UART: [art] PUB.Y = A1EF2C2F56C7C294F7EBC1EDB99656D5CE662EBBA9D9F8AC9F81FFF75513FD78A76EAB9B185813BC50E6E3F7E39BDE53
6,439,080 UART: [art] SIG.R = BAFD63ADABFF2B533924DC81B85DCE552C59979B203D3186E14FC122E64DC375884F3B0D4F69CD2727B897DED21E7A5B
6,445,863 UART: [art] SIG.S = 464617DCB44DF26E055A0F557F8CB4F7695AD194CC6519CB3E8D445B8659F3D45CD58C8F7710277AEC622C170C4684C3
6,469,898 UART: Caliptra RT
6,470,149 UART: [state] CFI Enabled
6,836,777 UART: [rt] RT failed reset flow
6,837,208 UART: Fatal Error: 0x000E0035
6,838,328 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,544 ready_for_fw is high
1,058,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,046 >>> mbox cmd response: success
2,677,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,325 UART:
2,739,341 UART: Running Caliptra FMC ...
2,739,749 UART:
2,739,803 UART: [state] CFI Enabled
2,750,219 UART: [fht] FMC Alias Private Key: 7
2,869,047 UART: [art] Extend RT PCRs Done
2,869,475 UART: [art] Lock RT PCRs Done
2,871,391 UART: [art] Populate DV Done
2,879,744 UART: [fht] FMC Alias Private Key: 7
2,880,706 UART: [art] Derive CDI
2,880,986 UART: [art] Store in slot 0x4
2,967,041 UART: [art] Derive Key Pair
2,967,401 UART: [art] Store priv key in slot 0x5
2,981,145 UART: [art] Derive Key Pair - Done
2,995,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,879 UART: [art] PUB.X = 56A4D75445B79DAEB46E4E07C7734D686C2013B4BBAD73EFE71A854E1A8A6D71A58C25DE24A386917F51F5A557A7A4EC
3,018,658 UART: [art] PUB.Y = D226B4D1EECABC68132A1636C32DD6B46F6387FF09015A953A4E4919D4C5D38AEF63951AA76E8002B7B3A9867423D553
3,025,603 UART: [art] SIG.R = 5986C19588FF8E149C123027566F9841317E5A78F1F6E36D24CCD9AB481A57EF36BA9B867CA707DFC0C56523D57B7941
3,032,370 UART: [art] SIG.S = 6DF7435EA13154F6B772F28EF691E842E4E76541C1BF79DB9E6B2321BC678EC6C95A7CF999F5F3659F02EBCF5D6EA669
3,055,863 UART: Caliptra RT
3,056,114 UART: [state] CFI Enabled
3,176,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,356 UART: [rt]cmd =0x44504543, len=96
3,399,753 >>> mbox cmd response data (6236 bytes)
3,399,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,886,524 >>> mbox cmd response: success
5,886,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,899,841 UART:
5,899,857 UART: Running Caliptra FMC ...
5,900,265 UART:
5,900,319 UART: [state] CFI Enabled
5,989,386 UART: [art] Extend RT PCRs Done
5,989,814 UART: [art] Lock RT PCRs Done
5,990,977 UART: [art] Populate DV Done
5,999,416 UART: [fht] FMC Alias Private Key: 7
6,000,444 UART: [art] Derive CDI
6,000,724 UART: [art] Store in slot 0x4
6,086,133 UART: [art] Derive Key Pair
6,086,493 UART: [art] Store priv key in slot 0x5
6,100,001 UART: [art] Derive Key Pair - Done
6,114,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,130,418 UART: [art] Erasing AUTHORITY.KEYID = 7
6,131,183 UART: [art] PUB.X = B76BDDC0DCEB6A324D21098D94FD233616F7F952522F071E59C0BCD581A609D255CCB6F9C006B39BD3D8B3F81E3F1275
6,137,953 UART: [art] PUB.Y = 8517069710B45BC3C7DDB7E28BF37AD4F70E53BA0AE5371AFA8DBEDCAD1D0FC6FEB8C14DA5A1368BC79B6CF686165043
6,144,915 UART: [art] SIG.R = 4DE5AEDEC8BE3BD1AAF3C00C180988EA036051F5BADA2839194A0631F3B25176F09C2F5187877FC0FB6CB01B12F4FBFD
6,151,693 UART: [art] SIG.S = 99CEDED6FAC19BFD1A993576774333AD597BE255B02449FA7936AD0DDC094A0420AF0CF6DB7E14E8769F41C6A22200B6
6,175,447 UART: Caliptra RT
6,175,698 UART: [state] CFI Enabled
6,546,442 UART: [rt] RT failed reset flow
6,546,873 UART: Fatal Error: 0x000E0035
6,547,993 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,913 UART: [state] LifecycleState = Unprovisioned
86,568 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,281 UART: [kat] SHA2-256
891,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,935 UART: [kat] ++
896,087 UART: [kat] sha1
900,555 UART: [kat] SHA2-256
902,495 UART: [kat] SHA2-384
905,376 UART: [kat] SHA2-512-ACC
907,277 UART: [kat] ECC-384
916,952 UART: [kat] HMAC-384Kdf
921,810 UART: [kat] LMS
1,170,122 UART: [kat] --
1,171,017 UART: [cold-reset] ++
1,171,471 UART: [fht] FHT @ 0x50003400
1,174,065 UART: [idev] ++
1,174,233 UART: [idev] CDI.KEYID = 6
1,174,594 UART: [idev] SUBJECT.KEYID = 7
1,175,019 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,192 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,225 UART: [ldev] ++
1,210,393 UART: [ldev] CDI.KEYID = 6
1,210,757 UART: [ldev] SUBJECT.KEYID = 5
1,211,184 UART: [ldev] AUTHORITY.KEYID = 7
1,211,647 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,720 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,043 UART: [ldev] --
1,282,266 UART: [fwproc] Wait for Commands...
1,282,931 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,000 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,175 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,432 >>> mbox cmd response: success
2,828,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,666 UART: [afmc] ++
2,829,834 UART: [afmc] CDI.KEYID = 6
2,830,197 UART: [afmc] SUBJECT.KEYID = 7
2,830,623 UART: [afmc] AUTHORITY.KEYID = 5
2,866,250 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,825 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,284 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,165 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,866 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,751 UART: [afmc] --
2,909,770 UART: [cold-reset] --
2,910,784 UART: [state] Locking Datavault
2,912,027 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,631 UART: [state] Locking ICCM
2,913,267 UART: [exit] Launching FMC @ 0x40000130
2,918,597 UART:
2,918,613 UART: Running Caliptra FMC ...
2,919,021 UART:
2,919,164 UART: [state] CFI Enabled
2,929,812 UART: [fht] FMC Alias Private Key: 7
3,048,728 UART: [art] Extend RT PCRs Done
3,049,156 UART: [art] Lock RT PCRs Done
3,051,074 UART: [art] Populate DV Done
3,059,285 UART: [fht] FMC Alias Private Key: 7
3,060,317 UART: [art] Derive CDI
3,060,597 UART: [art] Store in slot 0x4
3,146,740 UART: [art] Derive Key Pair
3,147,100 UART: [art] Store priv key in slot 0x5
3,160,930 UART: [art] Derive Key Pair - Done
3,175,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,469 UART: [art] PUB.X = 02433C6DA746A522545D79EFB97E87DEB79A9A31E676EDCE863598428EF25569DFA7C565203EBD7DC9EBE72F19A44082
3,198,244 UART: [art] PUB.Y = 635F1FF39BEB0AC401ECAA5AFE2BCE8FD857C266792E99B2C44599DFB1C463294F64E0E324F8EE744E9C5FDA6A7E44CF
3,205,212 UART: [art] SIG.R = D287A121610ADEF978476AE52D3602C8E5D5EDB6BA3463EE0C1306B7048E779DA4E55EF398AF8D70FB0056F1F07B9538
3,211,953 UART: [art] SIG.S = D87CCA9DC248E9F3FAB41A5C8EFE8E7C6FCDA31E4A557C709CDB8ED62C07C08CB0BFE63F735BCD0E54D0CF28DC7748A2
3,236,355 UART: Caliptra RT
3,236,698 UART: [state] CFI Enabled
3,356,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,490 UART: [rt]cmd =0x44504543, len=96
3,579,478 >>> mbox cmd response data (6236 bytes)
3,579,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,036 UART:
3,580,052 UART: Running Caliptra ROM ...
3,580,460 UART:
3,580,602 UART: [state] CFI Enabled
3,583,794 UART: [state] LifecycleState = Unprovisioned
3,584,449 UART: [state] DebugLocked = No
3,585,085 UART: [state] WD Timer not started. Device not locked for debugging
3,586,215 UART: [kat] SHA2-256
4,389,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,393,869 UART: [kat] ++
4,394,021 UART: [kat] sha1
4,398,337 UART: [kat] SHA2-256
4,400,277 UART: [kat] SHA2-384
4,403,170 UART: [kat] SHA2-512-ACC
4,405,070 UART: [kat] ECC-384
4,414,967 UART: [kat] HMAC-384Kdf
4,419,495 UART: [kat] LMS
4,667,807 UART: [kat] --
4,668,393 UART: [update-reset] ++
6,027,684 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,028,723 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,183,938 >>> mbox cmd response: success
6,183,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,184,111 UART: [update-reset] Copying MAN_2 To MAN_1
6,192,125 UART: [update-reset Success] --
6,193,046 UART: [state] Locking Datavault
6,193,822 UART: [state] Locking PCR0, PCR1 and PCR31
6,194,426 UART: [state] Locking ICCM
6,194,996 UART: [exit] Launching FMC @ 0x40000130
6,200,326 UART:
6,200,342 UART: Running Caliptra FMC ...
6,200,750 UART:
6,200,893 UART: [state] CFI Enabled
6,290,300 UART: [art] Extend RT PCRs Done
6,290,728 UART: [art] Lock RT PCRs Done
6,291,913 UART: [art] Populate DV Done
6,299,980 UART: [fht] FMC Alias Private Key: 7
6,301,078 UART: [art] Derive CDI
6,301,358 UART: [art] Store in slot 0x4
6,387,289 UART: [art] Derive Key Pair
6,387,649 UART: [art] Store priv key in slot 0x5
6,400,615 UART: [art] Derive Key Pair - Done
6,415,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,510 UART: [art] Erasing AUTHORITY.KEYID = 7
6,431,275 UART: [art] PUB.X = 360ABB4AB0C4195B673F227A969203209F85778A94EEA51E61C159D25C299C1B8C4349CCAFFE0114F1A79597619323FB
6,438,036 UART: [art] PUB.Y = 50C8AE99255DC4B17861B50537B81E3E40BB932434641D30C6581C9C7D737A5FDE4E51B310788B1F540C26CEF6FA2736
6,444,980 UART: [art] SIG.R = 5C279C35988E98FE43002A8A8D18D67FB33BC8FFBA2CFFE11B2442D088C43C81803BBF5F55FCA858C0184E80ED5BDD59
6,451,744 UART: [art] SIG.S = B74F96F77AF610D1D0DCE23441919A0A3032B29477513C7E553FBCA4471E9A0C3AF130B0944E5CAC47213DC8F41E7864
6,475,364 UART: Caliptra RT
6,475,707 UART: [state] CFI Enabled
6,838,597 UART: [rt] RT failed reset flow
6,839,028 UART: Fatal Error: 0x000E0035
6,840,148 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,391 ready_for_fw is high
1,059,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,265 >>> mbox cmd response: success
2,680,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,784 UART:
2,741,800 UART: Running Caliptra FMC ...
2,742,208 UART:
2,742,351 UART: [state] CFI Enabled
2,752,957 UART: [fht] FMC Alias Private Key: 7
2,872,841 UART: [art] Extend RT PCRs Done
2,873,269 UART: [art] Lock RT PCRs Done
2,874,899 UART: [art] Populate DV Done
2,883,256 UART: [fht] FMC Alias Private Key: 7
2,884,406 UART: [art] Derive CDI
2,884,686 UART: [art] Store in slot 0x4
2,970,437 UART: [art] Derive Key Pair
2,970,797 UART: [art] Store priv key in slot 0x5
2,984,337 UART: [art] Derive Key Pair - Done
2,999,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,454 UART: [art] PUB.X = 8008B26A3FFE0A6998741792C73AB6A7D68D2CDE22607049939C52F6CB66CEC8D958226C6F5FCB72D30279BEE3409BB7
3,022,221 UART: [art] PUB.Y = 31E65B26925EBBAD8ACC5F38035A214420605A137DA1B3C271F04F3081F51560862A7915C95AE834EA7CAD042132E17F
3,029,165 UART: [art] SIG.R = 0420B36968E9192578B5A957546A876891CA3CE03E80FC473721AACBFE7529C59222C7BD057A53E063F7DCD81013AAA1
3,035,929 UART: [art] SIG.S = 50F45DE2C85E8B515C92B4BDFD26C83B30464C1F0AF7C9869DD6C493260AEF718B8AC67A32612FF88B38A09F6A359A22
3,059,937 UART: Caliptra RT
3,060,280 UART: [state] CFI Enabled
3,179,598 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,656 UART: [rt]cmd =0x44504543, len=96
3,402,851 >>> mbox cmd response data (6236 bytes)
3,402,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,891,679 >>> mbox cmd response: success
5,891,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,905,292 UART:
5,905,308 UART: Running Caliptra FMC ...
5,905,716 UART:
5,905,859 UART: [state] CFI Enabled
5,994,844 UART: [art] Extend RT PCRs Done
5,995,272 UART: [art] Lock RT PCRs Done
5,996,469 UART: [art] Populate DV Done
6,004,738 UART: [fht] FMC Alias Private Key: 7
6,005,768 UART: [art] Derive CDI
6,006,048 UART: [art] Store in slot 0x4
6,091,805 UART: [art] Derive Key Pair
6,092,165 UART: [art] Store priv key in slot 0x5
6,106,125 UART: [art] Derive Key Pair - Done
6,121,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,136,705 UART: [art] Erasing AUTHORITY.KEYID = 7
6,137,470 UART: [art] PUB.X = B8E6AE4083025D620FD18658522AE390F3D6571DB00E95EEA74FB59A0115C391EF44C5BC8A726166DAEAE172017F0C7E
6,144,230 UART: [art] PUB.Y = E98E3978DF49EB431F05B9FD73499730E61BA5560F0CEF42228E728BD682CC4BA4D223149F63993CBC3A06AE19DC746F
6,151,176 UART: [art] SIG.R = A709480ACC6021633F101A02643AE1C07B597B1049897B7D6E373B63C309872A988C07A72E0E651E73ABC7C6EBBA95EA
6,157,930 UART: [art] SIG.S = 9575AE383C9A95320234B6090E2915234501B84F8D25C7AB36DCA4CDC90C9071A201549BDB0932C1E72A605A190F9905
6,181,059 UART: Caliptra RT
6,181,402 UART: [state] CFI Enabled
6,546,011 UART: [rt] RT failed reset flow
6,546,442 UART: Fatal Error: 0x000E0035
6,547,562 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,729 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
893,620 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,745 UART: [kat] ++
897,897 UART: [kat] sha1
901,925 UART: [kat] SHA2-256
903,865 UART: [kat] SHA2-384
906,760 UART: [kat] SHA2-512-ACC
908,661 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,561 UART: [fht] FHT @ 0x50003400
1,175,206 UART: [idev] ++
1,175,374 UART: [idev] CDI.KEYID = 6
1,175,734 UART: [idev] SUBJECT.KEYID = 7
1,176,158 UART: [idev] UDS.KEYID = 0
1,176,503 ready_for_fw is high
1,176,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,808 UART: [idev] Erasing UDS.KEYID = 0
1,202,085 UART: [idev] Sha1 KeyId Algorithm
1,210,523 UART: [idev] --
1,211,713 UART: [ldev] ++
1,211,881 UART: [ldev] CDI.KEYID = 6
1,212,244 UART: [ldev] SUBJECT.KEYID = 5
1,212,670 UART: [ldev] AUTHORITY.KEYID = 7
1,213,133 UART: [ldev] FE.KEYID = 1
1,218,185 UART: [ldev] Erasing FE.KEYID = 1
1,244,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,027 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,579 UART: [ldev] --
1,283,860 UART: [fwproc] Wait for Commands...
1,284,480 UART: [fwproc] Recv command 0x46574c44
1,285,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,385 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,631 >>> mbox cmd response: success
2,827,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,677 UART: [afmc] ++
2,828,845 UART: [afmc] CDI.KEYID = 6
2,829,207 UART: [afmc] SUBJECT.KEYID = 7
2,829,632 UART: [afmc] AUTHORITY.KEYID = 5
2,865,195 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,261 UART: [afmc] --
2,908,143 UART: [cold-reset] --
2,908,955 UART: [state] Locking Datavault
2,909,868 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,472 UART: [state] Locking ICCM
2,911,030 UART: [exit] Launching FMC @ 0x40000130
2,916,360 UART:
2,916,376 UART: Running Caliptra FMC ...
2,916,784 UART:
2,916,838 UART: [state] CFI Enabled
2,927,206 UART: [fht] FMC Alias Private Key: 7
3,045,638 UART: [art] Extend RT PCRs Done
3,046,066 UART: [art] Lock RT PCRs Done
3,047,744 UART: [art] Populate DV Done
3,055,877 UART: [fht] FMC Alias Private Key: 7
3,057,015 UART: [art] Derive CDI
3,057,295 UART: [art] Store in slot 0x4
3,143,128 UART: [art] Derive Key Pair
3,143,488 UART: [art] Store priv key in slot 0x5
3,156,544 UART: [art] Derive Key Pair - Done
3,171,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,829 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,594 UART: [art] PUB.X = 5B5722DD386F7F19EA0CEEDA831B08E0B0BF5AD548F8471624A51227381694E382ED5C1534411C5735A4957CEF6A0336
3,194,355 UART: [art] PUB.Y = 5993B48ABF1C0B837B9AA6C3E694E02637AB20D4E612DA26A2A7FBA51217BEC89DE36E9A06DDCBB79FA1EA89F9BD2EB7
3,201,325 UART: [art] SIG.R = 824E40EAFB17AB2C63BFC309A672C0C231F28EDF9D745AC42E1F35AF5DD03589DC741F591B0C3FC90094C20ACE7B292F
3,208,082 UART: [art] SIG.S = 7D2738C644B7C6E41525EF4581A4993C49B3CCF0DFE1D65AC12039053D4EC3B48E4554EAB758D1F498B10A1F7B6317E9
3,231,974 UART: Caliptra RT
3,232,225 UART: [state] CFI Enabled
3,352,538 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,780 UART: [rt]cmd =0x44504543, len=96
3,576,553 >>> mbox cmd response data (6236 bytes)
3,576,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,205 UART:
3,577,221 UART: Running Caliptra ROM ...
3,577,629 UART:
3,577,684 UART: [state] CFI Enabled
3,580,792 UART: [state] LifecycleState = Unprovisioned
3,581,447 UART: [state] DebugLocked = No
3,582,097 UART: [state] WD Timer not started. Device not locked for debugging
3,583,307 UART: [kat] SHA2-256
4,388,957 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,393,082 UART: [kat] ++
4,393,234 UART: [kat] sha1
4,397,508 UART: [kat] SHA2-256
4,399,448 UART: [kat] SHA2-384
4,402,245 UART: [kat] SHA2-512-ACC
4,404,145 UART: [kat] ECC-384
4,414,142 UART: [kat] HMAC-384Kdf
4,418,662 UART: [kat] LMS
4,666,990 UART: [kat] --
4,667,614 UART: [update-reset] ++
6,026,890 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,027,867 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,183,082 >>> mbox cmd response: success
6,183,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,183,275 UART: [update-reset] Copying MAN_2 To MAN_1
6,191,289 UART: [update-reset Success] --
6,192,392 UART: [state] Locking Datavault
6,193,138 UART: [state] Locking PCR0, PCR1 and PCR31
6,193,742 UART: [state] Locking ICCM
6,194,318 UART: [exit] Launching FMC @ 0x40000130
6,199,648 UART:
6,199,664 UART: Running Caliptra FMC ...
6,200,072 UART:
6,200,126 UART: [state] CFI Enabled
6,289,245 UART: [art] Extend RT PCRs Done
6,289,673 UART: [art] Lock RT PCRs Done
6,291,148 UART: [art] Populate DV Done
6,299,527 UART: [fht] FMC Alias Private Key: 7
6,300,651 UART: [art] Derive CDI
6,300,931 UART: [art] Store in slot 0x4
6,386,494 UART: [art] Derive Key Pair
6,386,854 UART: [art] Store priv key in slot 0x5
6,399,998 UART: [art] Derive Key Pair - Done
6,414,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,430,146 UART: [art] Erasing AUTHORITY.KEYID = 7
6,430,911 UART: [art] PUB.X = 316BD16012A1C17B09248C12F23DBC80A1E94943F6286159DF1F823F415C3E317EC0926201F420A1F98BFEF2E523EC5A
6,437,677 UART: [art] PUB.Y = 2FB680FAD2588FE99AFC91E18251D772281C56CDBC46F7ABF751A784DC350198D72CDBE82A44761159090A9B191BE562
6,444,624 UART: [art] SIG.R = 3710F0245C4236BF2A983B412FEDBC464C537CFDCDC30B57924A79C67457DBAAB34DF745792276331E59C82D6FB7E14B
6,451,399 UART: [art] SIG.S = 720494D2B69C751F2C76001F5B5A855AF24EFE94E5B4DD4FACD7140468863EE4ED0937FA1370DF313F37B2D9B645B87D
6,474,656 UART: Caliptra RT
6,474,907 UART: [state] CFI Enabled
6,840,916 UART: [rt] RT failed reset flow
6,841,347 UART: Fatal Error: 0x000E0035
6,842,467 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,753 ready_for_fw is high
1,060,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,100 >>> mbox cmd response: success
2,679,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,535 UART:
2,740,551 UART: Running Caliptra FMC ...
2,740,959 UART:
2,741,013 UART: [state] CFI Enabled
2,751,463 UART: [fht] FMC Alias Private Key: 7
2,870,039 UART: [art] Extend RT PCRs Done
2,870,467 UART: [art] Lock RT PCRs Done
2,872,019 UART: [art] Populate DV Done
2,880,326 UART: [fht] FMC Alias Private Key: 7
2,881,474 UART: [art] Derive CDI
2,881,754 UART: [art] Store in slot 0x4
2,967,589 UART: [art] Derive Key Pair
2,967,949 UART: [art] Store priv key in slot 0x5
2,981,197 UART: [art] Derive Key Pair - Done
2,996,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,083 UART: [art] PUB.X = 1CF15F035A4E21D3114FB5C33241E5D5DF2268E551CBACF05BEB2CA44889A8D2A3103FED375693D2863403B35623548B
3,018,851 UART: [art] PUB.Y = 978BE3FDC536B03254A1BC3EF9D7BCFE8ECA45B8D71DFDEC23EC52534B0CD00CFBE196BA3F86D2F6905F868367D6AD8A
3,025,823 UART: [art] SIG.R = 586B5201D31B3EB6B2B5204FF99F7B04845FAEEC947C7849075E207C76D97364F8648752002CEC1290E202C14BFC56D8
3,032,557 UART: [art] SIG.S = A04E7A71FE5E2D429D46031A2621666EA83BB6B1FA8EC26C0F11245A23E54745B346FAF6D21E3FFD4276CC7E07C23CEF
3,056,592 UART: Caliptra RT
3,056,843 UART: [state] CFI Enabled
3,176,068 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,910 UART: [rt]cmd =0x44504543, len=96
3,399,993 >>> mbox cmd response data (6236 bytes)
3,399,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,888,659 >>> mbox cmd response: success
5,888,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,901,766 UART:
5,901,782 UART: Running Caliptra FMC ...
5,902,190 UART:
5,902,244 UART: [state] CFI Enabled
5,991,633 UART: [art] Extend RT PCRs Done
5,992,061 UART: [art] Lock RT PCRs Done
5,993,316 UART: [art] Populate DV Done
6,001,375 UART: [fht] FMC Alias Private Key: 7
6,002,449 UART: [art] Derive CDI
6,002,729 UART: [art] Store in slot 0x4
6,088,510 UART: [art] Derive Key Pair
6,088,870 UART: [art] Store priv key in slot 0x5
6,102,200 UART: [art] Derive Key Pair - Done
6,116,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,132,349 UART: [art] Erasing AUTHORITY.KEYID = 7
6,133,114 UART: [art] PUB.X = 72F8CE6246096CD53000D53D24A7829C0C14082405DD81CF7775464AFA242F4DF9BEF32B46CCA51D1E0AE54345E7041E
6,139,848 UART: [art] PUB.Y = 3DEA368A068C1AEB0841A350DC42A5367BE0F6EABC9D4AF5C2DD476D0A8183DB0A434BCF429652097C50064DDFC8134D
6,146,796 UART: [art] SIG.R = BE44322EDABEB1FC91C8D379A78690D58FAFE8931F406FAD5BE824445980EE132FFE94481D611720C646330EE5A3C384
6,153,571 UART: [art] SIG.S = 5EC15BE06D842D4DF20479D6E87006BE695A08D980485AAEBDC10B3C2A741C5BCF065D94863FFDDECD31B402D58A7E06
6,177,024 UART: Caliptra RT
6,177,275 UART: [state] CFI Enabled
6,550,851 UART: [rt] RT failed reset flow
6,551,282 UART: Fatal Error: 0x000E0035
6,552,402 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
918,719 UART: [kat] HMAC-384Kdf
923,275 UART: [kat] LMS
1,171,603 UART: [kat] --
1,172,642 UART: [cold-reset] ++
1,173,032 UART: [fht] FHT @ 0x50003400
1,175,729 UART: [idev] ++
1,175,897 UART: [idev] CDI.KEYID = 6
1,176,257 UART: [idev] SUBJECT.KEYID = 7
1,176,681 UART: [idev] UDS.KEYID = 0
1,177,026 ready_for_fw is high
1,177,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,202,322 UART: [idev] Sha1 KeyId Algorithm
1,210,922 UART: [idev] --
1,212,152 UART: [ldev] ++
1,212,320 UART: [ldev] CDI.KEYID = 6
1,212,683 UART: [ldev] SUBJECT.KEYID = 5
1,213,109 UART: [ldev] AUTHORITY.KEYID = 7
1,213,572 UART: [ldev] FE.KEYID = 1
1,218,830 UART: [ldev] Erasing FE.KEYID = 1
1,245,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,178 UART: [ldev] --
1,284,533 UART: [fwproc] Wait for Commands...
1,285,143 UART: [fwproc] Recv command 0x46574c44
1,285,871 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,356 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,419 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,589 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,962 >>> mbox cmd response: success
2,829,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,831,218 UART: [afmc] ++
2,831,386 UART: [afmc] CDI.KEYID = 6
2,831,748 UART: [afmc] SUBJECT.KEYID = 7
2,832,173 UART: [afmc] AUTHORITY.KEYID = 5
2,867,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,502 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,086 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,836 UART: [afmc] --
2,910,810 UART: [cold-reset] --
2,911,724 UART: [state] Locking Datavault
2,912,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,373 UART: [state] Locking ICCM
2,913,803 UART: [exit] Launching FMC @ 0x40000130
2,919,133 UART:
2,919,149 UART: Running Caliptra FMC ...
2,919,557 UART:
2,919,700 UART: [state] CFI Enabled
2,930,500 UART: [fht] FMC Alias Private Key: 7
3,050,024 UART: [art] Extend RT PCRs Done
3,050,452 UART: [art] Lock RT PCRs Done
3,051,840 UART: [art] Populate DV Done
3,060,067 UART: [fht] FMC Alias Private Key: 7
3,061,003 UART: [art] Derive CDI
3,061,283 UART: [art] Store in slot 0x4
3,147,156 UART: [art] Derive Key Pair
3,147,516 UART: [art] Store priv key in slot 0x5
3,161,066 UART: [art] Derive Key Pair - Done
3,176,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,418 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,183 UART: [art] PUB.X = 9E2A8ECCCB6A00585E96E2DEA633470899AA33EB9F4DFF7B92209884B4232D3F6C0B6A0598C30F7899B62D5FE65BDDB6
3,198,933 UART: [art] PUB.Y = 0F392FD8FC4FC035758CAB8FB81D51166B886B0955F3AC0E452E412A97B51AC5286456B095554E727E54E80A5AF86A3F
3,205,875 UART: [art] SIG.R = 797BD998437ABA957736CA687F773B273B4BC710AA59B526071F69B0AF8003A817ED858E950C0CDBBFE79B64D27648DA
3,212,639 UART: [art] SIG.S = B1CCC666CA36ED2131A475EC35D7A598057F006D6755AE4813B99E8CA02458C11995457A5BA1847DBDFB02B1CCB3343A
3,235,863 UART: Caliptra RT
3,236,206 UART: [state] CFI Enabled
3,355,957 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,103 UART: [rt]cmd =0x44504543, len=96
3,580,147 >>> mbox cmd response data (6236 bytes)
3,580,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,913 UART:
3,580,929 UART: Running Caliptra ROM ...
3,581,337 UART:
3,581,479 UART: [state] CFI Enabled
3,584,281 UART: [state] LifecycleState = Unprovisioned
3,584,936 UART: [state] DebugLocked = No
3,585,650 UART: [state] WD Timer not started. Device not locked for debugging
3,586,916 UART: [kat] SHA2-256
4,392,566 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,396,691 UART: [kat] ++
4,396,843 UART: [kat] sha1
4,401,219 UART: [kat] SHA2-256
4,403,159 UART: [kat] SHA2-384
4,406,014 UART: [kat] SHA2-512-ACC
4,407,914 UART: [kat] ECC-384
4,417,657 UART: [kat] HMAC-384Kdf
4,422,367 UART: [kat] LMS
4,670,695 UART: [kat] --
4,671,503 UART: [update-reset] ++
6,030,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,031,864 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,187,079 >>> mbox cmd response: success
6,187,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,187,240 UART: [update-reset] Copying MAN_2 To MAN_1
6,195,254 UART: [update-reset Success] --
6,196,237 UART: [state] Locking Datavault
6,197,099 UART: [state] Locking PCR0, PCR1 and PCR31
6,197,703 UART: [state] Locking ICCM
6,198,271 UART: [exit] Launching FMC @ 0x40000130
6,203,601 UART:
6,203,617 UART: Running Caliptra FMC ...
6,204,025 UART:
6,204,168 UART: [state] CFI Enabled
6,292,961 UART: [art] Extend RT PCRs Done
6,293,389 UART: [art] Lock RT PCRs Done
6,294,704 UART: [art] Populate DV Done
6,302,937 UART: [fht] FMC Alias Private Key: 7
6,303,951 UART: [art] Derive CDI
6,304,231 UART: [art] Store in slot 0x4
6,389,780 UART: [art] Derive Key Pair
6,390,140 UART: [art] Store priv key in slot 0x5
6,403,426 UART: [art] Derive Key Pair - Done
6,418,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,433,721 UART: [art] Erasing AUTHORITY.KEYID = 7
6,434,486 UART: [art] PUB.X = BA84B9AF8E576FE6093FFD730E21072017601AF99609CBFC42975A69063FA6AD5B2355DF2CE92209F9CE5310D1F29524
6,441,242 UART: [art] PUB.Y = BD448F01D5D3E037CC6C485E1E91D1841C0A8AAC1816AC35F8C86EDC3875C79D4C9F622691D105123E1BA95DE5C1E265
6,448,193 UART: [art] SIG.R = 9B07C87DD1A8007FA711A9E6511846E327F09BDB1B6B024577895EBAE63C3F5ED559ED7681E58736A9B8604153320735
6,454,928 UART: [art] SIG.S = D17F47E46D4A0CEC4229B24D41AF65A88A0D57F5912F403CACDECC480EA8BC0BEF0193A20E4E4F89FF4FE69831693605
6,477,921 UART: Caliptra RT
6,478,264 UART: [state] CFI Enabled
6,852,203 UART: [rt] RT failed reset flow
6,852,634 UART: Fatal Error: 0x000E0035
6,853,754 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 ready_for_fw is high
1,060,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,557 >>> mbox cmd response: success
2,682,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,743,592 UART:
2,743,608 UART: Running Caliptra FMC ...
2,744,016 UART:
2,744,159 UART: [state] CFI Enabled
2,754,737 UART: [fht] FMC Alias Private Key: 7
2,873,157 UART: [art] Extend RT PCRs Done
2,873,585 UART: [art] Lock RT PCRs Done
2,874,987 UART: [art] Populate DV Done
2,883,176 UART: [fht] FMC Alias Private Key: 7
2,884,228 UART: [art] Derive CDI
2,884,508 UART: [art] Store in slot 0x4
2,970,139 UART: [art] Derive Key Pair
2,970,499 UART: [art] Store priv key in slot 0x5
2,983,735 UART: [art] Derive Key Pair - Done
2,998,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,586 UART: [art] PUB.X = B0D6DD7F2376DA9F2C2838219AC61D8B0605E9B4AA45EB84D91F5761C1ECB8F45FC08598577EABF6705331B732CB2902
3,021,355 UART: [art] PUB.Y = 2172ACC831914DA75B9A80E9906A43445E0001B56B1EA0BCC1237785C9A38CA91CA35A936A4DD02ED0BA8AC86030F116
3,028,286 UART: [art] SIG.R = 22F58351A8E330B5DB0A664B49A86880DF561170F4D6D1FC7853CC344E35EF0571837C6F4BDA4686DEFC68D08BE63CC3
3,035,058 UART: [art] SIG.S = 238CE8D26B47B9116A713F9E1D4F33C7F4C7F2D7D1D02A4192DD6148DFF24118CF0FE0FA3D9E7FCE695850B1BB6D73B0
3,059,003 UART: Caliptra RT
3,059,346 UART: [state] CFI Enabled
3,179,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,048 UART: [rt]cmd =0x44504543, len=96
3,402,592 >>> mbox cmd response data (6236 bytes)
3,402,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,891,469 >>> mbox cmd response: success
5,891,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,904,572 UART:
5,904,588 UART: Running Caliptra FMC ...
5,904,996 UART:
5,905,139 UART: [state] CFI Enabled
5,994,440 UART: [art] Extend RT PCRs Done
5,994,868 UART: [art] Lock RT PCRs Done
5,996,433 UART: [art] Populate DV Done
6,004,812 UART: [fht] FMC Alias Private Key: 7
6,005,772 UART: [art] Derive CDI
6,006,052 UART: [art] Store in slot 0x4
6,091,731 UART: [art] Derive Key Pair
6,092,091 UART: [art] Store priv key in slot 0x5
6,105,621 UART: [art] Derive Key Pair - Done
6,120,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,135,395 UART: [art] Erasing AUTHORITY.KEYID = 7
6,136,160 UART: [art] PUB.X = 6290BA677AF7AD0D403DD268A42741209D573D0984507F6D220961F68A78D69833E53E90117E89031F65BD53FA49A25A
6,142,910 UART: [art] PUB.Y = FACEA0E81F24B355961B4B91BCE6BD6D0AEC4FA5CD2D645CF7CE3879D5B1B2F43F077A09F7893F17F3DA2A8952232852
6,149,869 UART: [art] SIG.R = 50AF6F3DB479BBA0AB41A0695C41CD27A66DAE0C9B0050EE931C7D00A9BA7F2747652B23C873E15FA373349835A0DF84
6,156,602 UART: [art] SIG.S = 91F21888678C8082A6DDD5AB8D7D9B77705BAE5B04CDE34AF7B308C1B613EF1D3CB1DE89F309EA0A77403054A30A70D0
6,180,193 UART: Caliptra RT
6,180,536 UART: [state] CFI Enabled
6,553,462 UART: [rt] RT failed reset flow
6,553,893 UART: Fatal Error: 0x000E0035
6,555,013 >>> mbox cmd response: failed
test test_invoke_dpe::test_export_cdi_destroyed_root_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,883 writing to cptra_bootfsm_go
191,945 UART:
192,298 UART: Running Caliptra ROM ...
193,450 UART:
193,600 UART: [state] CFI Enabled
265,061 UART: [state] LifecycleState = Unprovisioned
266,996 UART: [state] DebugLocked = No
269,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,751 UART: [kat] SHA2-256
444,459 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,996 UART: [kat] ++
455,451 UART: [kat] sha1
466,253 UART: [kat] SHA2-256
468,972 UART: [kat] SHA2-384
474,677 UART: [kat] SHA2-512-ACC
477,053 UART: [kat] ECC-384
2,765,367 UART: [kat] HMAC-384Kdf
2,799,000 UART: [kat] LMS
3,989,354 UART: [kat] --
3,992,187 UART: [cold-reset] ++
3,993,700 UART: [fht] Storing FHT @ 0x50003400
4,006,387 UART: [idev] ++
4,007,024 UART: [idev] CDI.KEYID = 6
4,007,943 UART: [idev] SUBJECT.KEYID = 7
4,009,192 UART: [idev] UDS.KEYID = 0
4,010,239 ready_for_fw is high
4,010,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,534 UART: [idev] Erasing UDS.KEYID = 0
7,345,453 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,343 UART: [idev] --
7,371,452 UART: [ldev] ++
7,372,069 UART: [ldev] CDI.KEYID = 6
7,373,010 UART: [ldev] SUBJECT.KEYID = 5
7,374,224 UART: [ldev] AUTHORITY.KEYID = 7
7,375,507 UART: [ldev] FE.KEYID = 1
7,402,625 UART: [ldev] Erasing FE.KEYID = 1
10,736,095 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,738 UART: [ldev] --
13,115,918 UART: [fwproc] Waiting for Commands...
13,119,036 UART: [fwproc] Received command 0x46574c44
13,121,219 UART: [fwproc] Received Image of size 118548 bytes
17,228,002 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,595 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,106 >>> mbox cmd response: success
17,712,639 UART: [afmc] ++
17,713,262 UART: [afmc] CDI.KEYID = 6
17,714,193 UART: [afmc] SUBJECT.KEYID = 7
17,715,412 UART: [afmc] AUTHORITY.KEYID = 5
21,073,464 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,449 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,122 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,399,856 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,273 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,434,211 UART: [afmc] --
23,437,966 UART: [cold-reset] --
23,441,126 UART: [state] Locking Datavault
23,447,343 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,096 UART: [state] Locking ICCM
23,451,465 UART: [exit] Launching FMC @ 0x40000130
23,459,861 UART:
23,460,105 UART: Running Caliptra FMC ...
23,461,226 UART:
23,461,383 UART: [state] CFI Enabled
23,527,510 UART: [fht] FMC Alias Private Key: 7
25,867,738 UART: [art] Extend RT PCRs Done
25,868,960 UART: [art] Lock RT PCRs Done
25,870,395 UART: [art] Populate DV Done
25,875,749 UART: [fht] FMC Alias Private Key: 7
25,877,340 UART: [art] Derive CDI
25,878,148 UART: [art] Store in slot 0x4
25,936,160 UART: [art] Derive Key Pair
25,937,201 UART: [art] Store priv key in slot 0x5
29,230,271 UART: [art] Derive Key Pair - Done
29,243,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,963 UART: [art] PUB.X = 14DAA5312FA14EA2AE10744AC5BA85208E27C30DB4AC481C1FD64E231B77F5B656237513B7BCA72353255FEDBC18634D
31,540,261 UART: [art] PUB.Y = CA7D669506396085BBBBB6FC314E0767B8383D837F3238C06C4F246693AC4C0C5EF3DA97EB9641D30E48C91C188013AF
31,547,506 UART: [art] SIG.R = E4B7FDF5102DC8AB2CFCFEDEFCD49A18D03FA02C316E44E525EFD9310F16B4BEC4FF41A3239F68A159B0D3606EB1822C
31,554,952 UART: [art] SIG.S = 285B25266F59F6CC71730948925E49CA7FF3139A75C32659F46B1C1DCBA60BFF54E72347F1FA41CD6B2286AD3D7080CF
32,860,563 UART: Caliptra RT
32,861,280 UART: [state] CFI Enabled
33,057,516 UART: [rt] RT listening for mailbox commands...
33,059,455 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,090,530 UART: [rt]cmd =0x44504543, len=136
38,717,687 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,805,866 ready_for_fw is high
3,806,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,992,645 >>> mbox cmd response: success
23,695,951 UART:
23,696,357 UART: Running Caliptra FMC ...
23,697,501 UART:
23,697,687 UART: [state] CFI Enabled
23,761,700 UART: [fht] FMC Alias Private Key: 7
26,122,936 UART: [art] Extend RT PCRs Done
26,124,170 UART: [art] Lock RT PCRs Done
26,126,129 UART: [art] Populate DV Done
26,131,771 UART: [fht] FMC Alias Private Key: 7
26,133,372 UART: [art] Derive CDI
26,134,191 UART: [art] Store in slot 0x4
26,190,809 UART: [art] Derive Key Pair
26,191,857 UART: [art] Store priv key in slot 0x5
29,484,944 UART: [art] Derive Key Pair - Done
29,497,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,786,761 UART: [art] Erasing AUTHORITY.KEYID = 7
31,788,324 UART: [art] PUB.X = F7CD6BEE8BFB8453DE384D2AEC202388D6E374501A365FCFC9EDDFE6C2EA8C78E430B2CD7670252727153AC2E160AC07
31,795,567 UART: [art] PUB.Y = 9C8BC5687FDAA7F2E08AB08D8249CC4E2FD441F778E5097C13F77F9461F46A9EBAABD666D4F8D3C2CAF2BFAAA72DBCC8
31,802,830 UART: [art] SIG.R = FAD51CC691CB59C72631834325573A1A0ECF57A2333963808DD103634CEC544077D5F397BA3E58784235F076003E5170
31,810,190 UART: [art] SIG.S = FFCA7661CCFADD765ED57070507882D446DDBCBF4D0FB81D9E4D40033815EB69BA39C0D1F0FF55B2056B4BD857C1B4B6
33,115,617 UART: Caliptra RT
33,116,336 UART: [state] CFI Enabled
33,294,050 UART: [rt] RT listening for mailbox commands...
33,295,996 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,326,819 UART: [rt]cmd =0x44504543, len=136
38,954,913 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,375 UART:
192,735 UART: Running Caliptra ROM ...
193,846 UART:
603,428 UART: [state] CFI Enabled
619,177 UART: [state] LifecycleState = Unprovisioned
621,062 UART: [state] DebugLocked = No
622,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,359 UART: [kat] SHA2-256
798,087 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,675 UART: [kat] ++
809,135 UART: [kat] sha1
819,151 UART: [kat] SHA2-256
821,868 UART: [kat] SHA2-384
827,353 UART: [kat] SHA2-512-ACC
829,711 UART: [kat] ECC-384
3,114,032 UART: [kat] HMAC-384Kdf
3,126,069 UART: [kat] LMS
4,316,170 UART: [kat] --
4,321,586 UART: [cold-reset] ++
4,323,945 UART: [fht] Storing FHT @ 0x50003400
4,335,699 UART: [idev] ++
4,336,284 UART: [idev] CDI.KEYID = 6
4,337,188 UART: [idev] SUBJECT.KEYID = 7
4,338,426 UART: [idev] UDS.KEYID = 0
4,339,413 ready_for_fw is high
4,339,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,508 UART: [idev] Erasing UDS.KEYID = 0
7,624,091 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,547 UART: [idev] --
7,652,134 UART: [ldev] ++
7,652,707 UART: [ldev] CDI.KEYID = 6
7,653,722 UART: [ldev] SUBJECT.KEYID = 5
7,654,873 UART: [ldev] AUTHORITY.KEYID = 7
7,656,098 UART: [ldev] FE.KEYID = 1
7,665,066 UART: [ldev] Erasing FE.KEYID = 1
10,951,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,509 UART: [ldev] --
13,311,007 UART: [fwproc] Waiting for Commands...
13,313,696 UART: [fwproc] Received command 0x46574c44
13,315,871 UART: [fwproc] Received Image of size 118548 bytes
17,417,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,297 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,232 >>> mbox cmd response: success
17,897,107 UART: [afmc] ++
17,897,716 UART: [afmc] CDI.KEYID = 6
17,898,597 UART: [afmc] SUBJECT.KEYID = 7
17,899,861 UART: [afmc] AUTHORITY.KEYID = 5
21,212,938 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,508,260 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,523 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,940 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,707 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,097 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,349 UART: [afmc] --
23,577,303 UART: [cold-reset] --
23,582,939 UART: [state] Locking Datavault
23,589,584 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,270 UART: [state] Locking ICCM
23,593,062 UART: [exit] Launching FMC @ 0x40000130
23,601,456 UART:
23,601,681 UART: Running Caliptra FMC ...
23,602,699 UART:
23,602,844 UART: [state] CFI Enabled
23,610,827 UART: [fht] FMC Alias Private Key: 7
25,951,484 UART: [art] Extend RT PCRs Done
25,952,703 UART: [art] Lock RT PCRs Done
25,954,495 UART: [art] Populate DV Done
25,960,033 UART: [fht] FMC Alias Private Key: 7
25,961,666 UART: [art] Derive CDI
25,962,488 UART: [art] Store in slot 0x4
26,005,401 UART: [art] Derive Key Pair
26,006,399 UART: [art] Store priv key in slot 0x5
29,248,149 UART: [art] Derive Key Pair - Done
29,261,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,103 UART: [art] PUB.X = 46E3F2AFCCDE2B9F32482F788CE0416F7A87EB41E4E95C47B10F6B9120519654C807E580602D87364A052439BE72D4D1
31,550,340 UART: [art] PUB.Y = EDC5B0EA42C2C853FDA19FFB0B8EAA285B9497179F97AED450859F46C6BDF69F0A5E9ACD0D0EA39CCD811A80B20680B8
31,557,621 UART: [art] SIG.R = 44698F90EB30C2C7662E6176BD13D86A53BB9663F97A8629F3C48C1496441723C040CE6A15254D95F1DC9B29DA289457
31,565,036 UART: [art] SIG.S = 1FBEDC96D782E285B3B4746CF6BEFB4BAC835A4AACEB29EE9AC7D4599B60E4B98B5C515765914EEA59EAD90BF6138B6F
32,869,977 UART: Caliptra RT
32,870,709 UART: [state] CFI Enabled
33,004,805 UART: [rt] RT listening for mailbox commands...
33,006,732 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,037,538 UART: [rt]cmd =0x44504543, len=136
38,597,184 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,134,310 ready_for_fw is high
4,134,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,242 >>> mbox cmd response: success
23,803,155 UART:
23,803,541 UART: Running Caliptra FMC ...
23,804,672 UART:
23,804,830 UART: [state] CFI Enabled
23,813,202 UART: [fht] FMC Alias Private Key: 7
26,153,088 UART: [art] Extend RT PCRs Done
26,154,320 UART: [art] Lock RT PCRs Done
26,155,893 UART: [art] Populate DV Done
26,161,528 UART: [fht] FMC Alias Private Key: 7
26,163,118 UART: [art] Derive CDI
26,163,953 UART: [art] Store in slot 0x4
26,206,605 UART: [art] Derive Key Pair
26,207,658 UART: [art] Store priv key in slot 0x5
29,449,780 UART: [art] Derive Key Pair - Done
29,462,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,778 UART: [art] PUB.X = 0DA2BE4DE80D8550229E27CE5FCD0268443867C91EF77AC3A92D8963CE8500962CD1C6687B957F9255D7C492870FCBB6
31,752,027 UART: [art] PUB.Y = 8AE5E03DBABA9EA53692F293D965FCD5287394EACBB75936868936837AB42B628CAFD051248480BF75E640F669D54714
31,759,282 UART: [art] SIG.R = A2C32DD086EF49D56E41A1ED7A469DE914836FCC59B7A28A3582012417D96851932773C31EB6833506557791DD2802D8
31,766,616 UART: [art] SIG.S = 4574FE19B8DF64B1BF37EEDD1055595EF7321769414EF26E894501A4C4E08FFC5485980953E6B37B98D83A05CBC7B1B4
33,071,318 UART: Caliptra RT
33,072,037 UART: [state] CFI Enabled
33,205,703 UART: [rt] RT listening for mailbox commands...
33,207,637 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
33,238,548 UART: [rt]cmd =0x44504543, len=136
38,796,831 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,401 UART:
192,761 UART: Running Caliptra ROM ...
193,927 UART:
194,075 UART: [state] CFI Enabled
265,412 UART: [state] LifecycleState = Unprovisioned
267,333 UART: [state] DebugLocked = No
268,933 UART: [state] WD Timer not started. Device not locked for debugging
273,684 UART: [kat] SHA2-256
453,324 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,134 UART: [kat] ++
464,622 UART: [kat] sha1
476,022 UART: [kat] SHA2-256
478,716 UART: [kat] SHA2-384
483,960 UART: [kat] SHA2-512-ACC
486,332 UART: [kat] ECC-384
2,949,170 UART: [kat] HMAC-384Kdf
2,970,694 UART: [kat] LMS
3,447,166 UART: [kat] --
3,451,366 UART: [cold-reset] ++
3,453,623 UART: [fht] FHT @ 0x50003400
3,465,881 UART: [idev] ++
3,466,450 UART: [idev] CDI.KEYID = 6
3,467,407 UART: [idev] SUBJECT.KEYID = 7
3,468,646 UART: [idev] UDS.KEYID = 0
3,469,615 ready_for_fw is high
3,469,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,367 UART: [idev] Erasing UDS.KEYID = 0
5,988,331 UART: [idev] Sha1 KeyId Algorithm
6,011,018 UART: [idev] --
6,015,381 UART: [ldev] ++
6,015,963 UART: [ldev] CDI.KEYID = 6
6,016,933 UART: [ldev] SUBJECT.KEYID = 5
6,018,095 UART: [ldev] AUTHORITY.KEYID = 7
6,019,383 UART: [ldev] FE.KEYID = 1
6,057,897 UART: [ldev] Erasing FE.KEYID = 1
8,564,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,128 UART: [ldev] --
10,372,495 UART: [fwproc] Wait for Commands...
10,375,013 UART: [fwproc] Recv command 0x46574c44
10,377,069 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,623 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,005 >>> mbox cmd response: success
14,342,101 UART: [afmc] ++
14,342,715 UART: [afmc] CDI.KEYID = 6
14,343,604 UART: [afmc] SUBJECT.KEYID = 7
14,344,873 UART: [afmc] AUTHORITY.KEYID = 5
16,894,170 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,634,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,636,986 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,652,847 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,668,847 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,684,445 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,707,591 UART: [afmc] --
18,710,986 UART: [cold-reset] --
18,716,357 UART: [state] Locking Datavault
18,721,116 UART: [state] Locking PCR0, PCR1 and PCR31
18,722,906 UART: [state] Locking ICCM
18,725,414 UART: [exit] Launching FMC @ 0x40000130
18,733,816 UART:
18,734,047 UART: Running Caliptra FMC ...
18,735,073 UART:
18,735,221 UART: [state] CFI Enabled
18,793,033 UART: [fht] FMC Alias Private Key: 7
20,559,110 UART: [art] Extend RT PCRs Done
20,560,329 UART: [art] Lock RT PCRs Done
20,561,905 UART: [art] Populate DV Done
20,567,255 UART: [fht] FMC Alias Private Key: 7
20,568,838 UART: [art] Derive CDI
20,569,649 UART: [art] Store in slot 0x4
20,625,259 UART: [art] Derive Key Pair
20,626,261 UART: [art] Store priv key in slot 0x5
23,089,349 UART: [art] Derive Key Pair - Done
23,102,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,961 UART: [art] PUB.X = 1B2F477AB0294C53CC36D4BD3C307947719F1D2818D5097A8254DE8E1269AF56CABE99F462EB1D4F46C0D3FF5AAC8F27
24,823,264 UART: [art] PUB.Y = 5F1E16D5DEB835E945443450A7A037E9CB1A941C29096F74BFFE7F5837503811ADF92E235DBEC9B127B9AE58576A083F
24,830,507 UART: [art] SIG.R = 5C6AA9848C8C335F0249EDDB2444B9334028094A9742046E411A85D3695BC3B1E742BDF58A3DEB7F13A644C025E3A193
24,837,895 UART: [art] SIG.S = DBA725424F89D28044ED2269E5ACA9118A4A859F08713D08B2EB2AB327B3FC4475FE88ED182F9872D7A628593643E8E2
25,817,163 UART: Caliptra RT
25,817,894 UART: [state] CFI Enabled
25,996,574 UART: [rt] RT listening for mailbox commands...
25,998,629 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,029,653 UART: [rt]cmd =0x44504543, len=136
30,252,713 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,461,490 ready_for_fw is high
3,461,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,616 >>> mbox cmd response: success
18,514,052 UART:
18,514,757 UART: Running Caliptra FMC ...
18,515,879 UART:
18,516,043 UART: [state] CFI Enabled
18,581,953 UART: [fht] FMC Alias Private Key: 7
20,348,365 UART: [art] Extend RT PCRs Done
20,349,599 UART: [art] Lock RT PCRs Done
20,351,031 UART: [art] Populate DV Done
20,356,293 UART: [fht] FMC Alias Private Key: 7
20,358,000 UART: [art] Derive CDI
20,358,821 UART: [art] Store in slot 0x4
20,414,957 UART: [art] Derive Key Pair
20,416,001 UART: [art] Store priv key in slot 0x5
22,878,647 UART: [art] Derive Key Pair - Done
22,891,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,803 UART: [art] PUB.X = 15C47788EEBFB1CCE4B158508AD15A24D098F28A684ADF728FCEEC0865A7A1496A17B2206DEDA92FF9508249CAFC3A14
24,613,083 UART: [art] PUB.Y = 8C3717F001C4635964750C6369FB9C06BCBEE7A9FFBE7D86F8017167C94A833C6E383FC1BE76C7A026EE7F2D7A370F2E
24,620,350 UART: [art] SIG.R = 4BB26AE7F9F56865C4C0C7062720828F4C530E1ABA839896FEF0E8B54DDA712AFEDBD3699312DB55D6DDC988BB85BCB5
24,627,747 UART: [art] SIG.S = 40899CE885D8564665C846CEBE7AB5F35BAB5295541F2CBBA6A59BF2BE7AA817D1DF8CCD854C6F83C1479A964EB06BB9
25,607,044 UART: Caliptra RT
25,607,760 UART: [state] CFI Enabled
25,787,893 UART: [rt] RT listening for mailbox commands...
25,789,830 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,820,915 UART: [rt]cmd =0x44504543, len=136
30,042,374 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,342 UART:
192,706 UART: Running Caliptra ROM ...
193,798 UART:
603,418 UART: [state] CFI Enabled
615,866 UART: [state] LifecycleState = Unprovisioned
617,805 UART: [state] DebugLocked = No
619,123 UART: [state] WD Timer not started. Device not locked for debugging
623,091 UART: [kat] SHA2-256
802,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,492 UART: [kat] ++
813,978 UART: [kat] sha1
825,995 UART: [kat] SHA2-256
828,699 UART: [kat] SHA2-384
834,694 UART: [kat] SHA2-512-ACC
837,064 UART: [kat] ECC-384
3,279,231 UART: [kat] HMAC-384Kdf
3,291,887 UART: [kat] LMS
3,768,392 UART: [kat] --
3,773,760 UART: [cold-reset] ++
3,775,136 UART: [fht] FHT @ 0x50003400
3,787,354 UART: [idev] ++
3,787,962 UART: [idev] CDI.KEYID = 6
3,788,876 UART: [idev] SUBJECT.KEYID = 7
3,790,128 UART: [idev] UDS.KEYID = 0
3,791,050 ready_for_fw is high
3,791,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,956 UART: [idev] Erasing UDS.KEYID = 0
6,268,745 UART: [idev] Sha1 KeyId Algorithm
6,292,099 UART: [idev] --
6,295,615 UART: [ldev] ++
6,296,186 UART: [ldev] CDI.KEYID = 6
6,297,205 UART: [ldev] SUBJECT.KEYID = 5
6,298,303 UART: [ldev] AUTHORITY.KEYID = 7
6,299,592 UART: [ldev] FE.KEYID = 1
6,310,079 UART: [ldev] Erasing FE.KEYID = 1
8,786,648 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,192 UART: [ldev] --
10,579,951 UART: [fwproc] Wait for Commands...
10,581,561 UART: [fwproc] Recv command 0x46574c44
10,583,547 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,023 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,140,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,213,206 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,541,021 >>> mbox cmd response: success
14,546,002 UART: [afmc] ++
14,546,670 UART: [afmc] CDI.KEYID = 6
14,547,563 UART: [afmc] SUBJECT.KEYID = 7
14,548,688 UART: [afmc] AUTHORITY.KEYID = 5
17,057,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,067 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,181 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,754 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,093 UART: [afmc] --
18,857,052 UART: [cold-reset] --
18,861,212 UART: [state] Locking Datavault
18,866,410 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,166 UART: [state] Locking ICCM
18,870,620 UART: [exit] Launching FMC @ 0x40000130
18,879,072 UART:
18,879,317 UART: Running Caliptra FMC ...
18,880,424 UART:
18,880,584 UART: [state] CFI Enabled
18,888,635 UART: [fht] FMC Alias Private Key: 7
20,654,986 UART: [art] Extend RT PCRs Done
20,656,209 UART: [art] Lock RT PCRs Done
20,657,971 UART: [art] Populate DV Done
20,663,279 UART: [fht] FMC Alias Private Key: 7
20,664,816 UART: [art] Derive CDI
20,665,745 UART: [art] Store in slot 0x4
20,708,575 UART: [art] Derive Key Pair
20,709,599 UART: [art] Store priv key in slot 0x5
23,136,276 UART: [art] Derive Key Pair - Done
23,148,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,186 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,693 UART: [art] PUB.X = 28B6F39E9BA748D3A2EC2EF93EA8C49AC3852E582709A4CBCDC271E511F8BF9443699D3D40D7B713DD418A02737157EC
24,863,997 UART: [art] PUB.Y = E873004D9D669B8EC0A15BE41328DA556AB72F7FE85E655D3EBD83CB4C1B056DD1A22AE71E98C98017F249F734C500E2
24,871,235 UART: [art] SIG.R = 91275D64532136459DB2232E2A67EB9683D36B56555B450E018D5FB08AE3B2E2D03DB9DA8DE6FC15E604647D7A0BA151
24,878,635 UART: [art] SIG.S = EDD8BAB03D45E7A5837A448D2E65831414581AC9D0F4A0ACBD9EAEFD6665F87BD54D9B331396DE66F559A13379CBEECC
25,857,446 UART: Caliptra RT
25,858,138 UART: [state] CFI Enabled
25,991,471 UART: [rt] RT listening for mailbox commands...
25,993,397 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,024,306 UART: [rt]cmd =0x44504543, len=136
30,194,199 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,840 writing to cptra_bootfsm_go
3,783,475 ready_for_fw is high
3,783,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,469,213 >>> mbox cmd response: success
18,721,470 UART:
18,721,856 UART: Running Caliptra FMC ...
18,723,151 UART:
18,723,372 UART: [state] CFI Enabled
18,731,118 UART: [fht] FMC Alias Private Key: 7
20,496,748 UART: [art] Extend RT PCRs Done
20,497,975 UART: [art] Lock RT PCRs Done
20,499,444 UART: [art] Populate DV Done
20,504,813 UART: [fht] FMC Alias Private Key: 7
20,506,361 UART: [art] Derive CDI
20,507,182 UART: [art] Store in slot 0x4
20,549,346 UART: [art] Derive Key Pair
20,550,349 UART: [art] Store priv key in slot 0x5
22,978,064 UART: [art] Derive Key Pair - Done
22,991,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,697,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,934 UART: [art] PUB.X = FCF305DE17983ACF2E780104ECB72DC36DEAEA1F56F551070F6E6908DE74DF10039139938D998FDD7587AFD7352351DC
24,706,203 UART: [art] PUB.Y = D60764DACDA55DC4A04D30D5D5E3BDBB9F1FC49A488BBB6BA7CA4FB0996BAC45DB362E711CA3FC9D580FADC1D308BFFE
24,713,508 UART: [art] SIG.R = 2153A594EB4F61947A7D583BF58AE39880173949D2DA40207A5481EBD77F8600695CA0B22D898D7DC56C15FB7F47D7B8
24,720,934 UART: [art] SIG.S = 699C2C90621A763DD362505D71B0A986EB9B1F12FA1C9C4B564DA5E0E2FE05A336733CB036916E12ED72F8BF2C955E45
25,699,981 UART: Caliptra RT
25,700,683 UART: [state] CFI Enabled
25,832,552 UART: [rt] RT listening for mailbox commands...
25,834,471 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
25,865,335 UART: [rt]cmd =0x44504543, len=136
30,035,814 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,059 UART:
192,447 UART: Running Caliptra ROM ...
193,536 UART:
193,677 UART: [state] CFI Enabled
268,254 UART: [state] LifecycleState = Unprovisioned
270,601 UART: [state] DebugLocked = No
272,972 UART: [state] WD Timer not started. Device not locked for debugging
277,432 UART: [kat] SHA2-256
467,344 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,082 UART: [kat] ++
478,620 UART: [kat] sha1
490,492 UART: [kat] SHA2-256
493,558 UART: [kat] SHA2-384
498,474 UART: [kat] SHA2-512-ACC
501,120 UART: [kat] ECC-384
2,947,279 UART: [kat] HMAC-384Kdf
2,972,250 UART: [kat] LMS
3,504,082 UART: [kat] --
3,509,857 UART: [cold-reset] ++
3,510,857 UART: [fht] FHT @ 0x50003400
3,523,600 UART: [idev] ++
3,524,301 UART: [idev] CDI.KEYID = 6
3,525,251 UART: [idev] SUBJECT.KEYID = 7
3,526,493 UART: [idev] UDS.KEYID = 0
3,527,388 ready_for_fw is high
3,527,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,634 UART: [idev] Erasing UDS.KEYID = 0
6,029,718 UART: [idev] Sha1 KeyId Algorithm
6,052,730 UART: [idev] --
6,057,291 UART: [ldev] ++
6,057,982 UART: [ldev] CDI.KEYID = 6
6,058,865 UART: [ldev] SUBJECT.KEYID = 5
6,060,029 UART: [ldev] AUTHORITY.KEYID = 7
6,061,338 UART: [ldev] FE.KEYID = 1
6,100,373 UART: [ldev] Erasing FE.KEYID = 1
8,609,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,501 UART: [ldev] --
10,413,109 UART: [fwproc] Wait for Commands...
10,414,709 UART: [fwproc] Recv command 0x46574c44
10,417,014 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,579 >>> mbox cmd response: success
14,677,450 UART: [afmc] ++
14,678,190 UART: [afmc] CDI.KEYID = 6
14,679,246 UART: [afmc] SUBJECT.KEYID = 7
14,680,794 UART: [afmc] AUTHORITY.KEYID = 5
17,209,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,526 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,645 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,650 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,951 UART: [afmc] --
19,009,543 UART: [cold-reset] --
19,013,373 UART: [state] Locking Datavault
19,018,571 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,787 UART: [state] Locking ICCM
19,022,079 UART: [exit] Launching FMC @ 0x40000130
19,030,760 UART:
19,031,015 UART: Running Caliptra FMC ...
19,032,122 UART:
19,032,280 UART: [state] CFI Enabled
19,090,857 UART: [fht] FMC Alias Private Key: 7
20,857,024 UART: [art] Extend RT PCRs Done
20,858,249 UART: [art] Lock RT PCRs Done
20,860,058 UART: [art] Populate DV Done
20,865,523 UART: [fht] FMC Alias Private Key: 7
20,867,214 UART: [art] Derive CDI
20,867,949 UART: [art] Store in slot 0x4
20,923,086 UART: [art] Derive Key Pair
20,924,082 UART: [art] Store priv key in slot 0x5
23,386,712 UART: [art] Derive Key Pair - Done
23,399,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,111,937 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,439 UART: [art] PUB.X = 14AE13426BFAEA25017352D7C53A53CB5F2E7FA29F6229A53EAC763AFEDB89CC496EFAAFA06CEFF1785E971D4565D3CF
25,120,790 UART: [art] PUB.Y = 6339ABD1123AED59516CDAEB71CC5238ADD301F4BA6C6AC2303BEBD7334708586942F86FE77642594A38E26DF1765514
25,128,050 UART: [art] SIG.R = 73C7096884E2E2057B2EC41547861310A9B76FDD7773AB04054165C1FC271EB0BE71BA4994D60ECF3DC5D083E3F87B82
25,135,395 UART: [art] SIG.S = 9102BB862217B31DCEB8F52FF3231B09D0657ECD5628FC0C2530E1D1A5BC2BAF41D094DE95AA77561544E9F016373EB0
26,115,035 UART: Caliptra RT
26,115,745 UART: [state] CFI Enabled
26,294,684 UART: [rt] RT listening for mailbox commands...
26,296,613 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,327,633 UART: [rt]cmd =0x44504543, len=136
30,551,123 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,439,082 ready_for_fw is high
3,439,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,810,108 >>> mbox cmd response: success
19,091,513 UART:
19,091,904 UART: Running Caliptra FMC ...
19,093,103 UART:
19,093,280 UART: [state] CFI Enabled
19,157,785 UART: [fht] FMC Alias Private Key: 7
20,923,829 UART: [art] Extend RT PCRs Done
20,925,040 UART: [art] Lock RT PCRs Done
20,926,551 UART: [art] Populate DV Done
20,931,930 UART: [fht] FMC Alias Private Key: 7
20,933,476 UART: [art] Derive CDI
20,934,237 UART: [art] Store in slot 0x4
20,991,599 UART: [art] Derive Key Pair
20,992,592 UART: [art] Store priv key in slot 0x5
23,455,359 UART: [art] Derive Key Pair - Done
23,468,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,322 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,817 UART: [art] PUB.X = 0421CC56138069BBD4E5DCF2E62F66F7D159E2D8B3807CC41CB3627829E5D36634DDB88608B4E3C422F49E1FC176ABC7
25,190,053 UART: [art] PUB.Y = 1952B7D1603E423D63E080EBA868A09AB1F4A6901CCAE6BE0EE77368BD230B97824669B00E88F5C538891EA9A5FA667F
25,197,307 UART: [art] SIG.R = 74AB0096F58D7B1F082F10E4B20B5A30EC56F4EE8573878F6F694BCB3BFE29750F38353E6EB94DC50557340581465A05
25,204,691 UART: [art] SIG.S = 7E4B763002EEC89BFF840ADF15B93DF8DA6F935368B1D0E7C8AC674406661C38EE60351EACB1537F6964677F011E5B66
26,183,865 UART: Caliptra RT
26,184,571 UART: [state] CFI Enabled
26,365,788 UART: [rt] RT listening for mailbox commands...
26,367,708 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,398,779 UART: [rt]cmd =0x44504543, len=136
30,620,565 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,367 UART:
192,739 UART: Running Caliptra ROM ...
193,887 UART:
603,338 UART: [state] CFI Enabled
614,908 UART: [state] LifecycleState = Unprovisioned
617,297 UART: [state] DebugLocked = No
619,047 UART: [state] WD Timer not started. Device not locked for debugging
623,972 UART: [kat] SHA2-256
813,862 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,606 UART: [kat] ++
825,146 UART: [kat] sha1
835,951 UART: [kat] SHA2-256
838,970 UART: [kat] SHA2-384
844,561 UART: [kat] SHA2-512-ACC
847,189 UART: [kat] ECC-384
3,288,196 UART: [kat] HMAC-384Kdf
3,300,645 UART: [kat] LMS
3,832,428 UART: [kat] --
3,836,563 UART: [cold-reset] ++
3,837,430 UART: [fht] FHT @ 0x50003400
3,848,624 UART: [idev] ++
3,849,334 UART: [idev] CDI.KEYID = 6
3,850,369 UART: [idev] SUBJECT.KEYID = 7
3,851,477 UART: [idev] UDS.KEYID = 0
3,852,408 ready_for_fw is high
3,852,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,468 UART: [idev] Erasing UDS.KEYID = 0
6,327,732 UART: [idev] Sha1 KeyId Algorithm
6,350,426 UART: [idev] --
6,356,475 UART: [ldev] ++
6,357,161 UART: [ldev] CDI.KEYID = 6
6,358,082 UART: [ldev] SUBJECT.KEYID = 5
6,359,246 UART: [ldev] AUTHORITY.KEYID = 7
6,360,426 UART: [ldev] FE.KEYID = 1
6,369,079 UART: [ldev] Erasing FE.KEYID = 1
8,848,833 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,121 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,046 UART: [ldev] --
10,640,480 UART: [fwproc] Wait for Commands...
10,642,916 UART: [fwproc] Recv command 0x46574c44
10,645,175 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,990 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,731 >>> mbox cmd response: success
14,910,477 UART: [afmc] ++
14,911,185 UART: [afmc] CDI.KEYID = 6
14,912,299 UART: [afmc] SUBJECT.KEYID = 7
14,913,853 UART: [afmc] AUTHORITY.KEYID = 5
17,422,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,221 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,444 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,396 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,667 UART: [afmc] --
19,219,863 UART: [cold-reset] --
19,223,787 UART: [state] Locking Datavault
19,229,598 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,759 UART: [state] Locking ICCM
19,233,306 UART: [exit] Launching FMC @ 0x40000130
19,241,939 UART:
19,242,175 UART: Running Caliptra FMC ...
19,243,207 UART:
19,243,359 UART: [state] CFI Enabled
19,251,776 UART: [fht] FMC Alias Private Key: 7
21,018,294 UART: [art] Extend RT PCRs Done
21,019,509 UART: [art] Lock RT PCRs Done
21,021,003 UART: [art] Populate DV Done
21,026,269 UART: [fht] FMC Alias Private Key: 7
21,027,985 UART: [art] Derive CDI
21,028,827 UART: [art] Store in slot 0x4
21,071,432 UART: [art] Derive Key Pair
21,072,435 UART: [art] Store priv key in slot 0x5
23,499,721 UART: [art] Derive Key Pair - Done
23,512,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,440 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,933 UART: [art] PUB.X = 3D754B6A14DD48FD96129B84EA1B64A569F7BE5034652E94DC83ED91A682140E3C02C7CDAE051726BE0BD30AECC28D96
25,227,205 UART: [art] PUB.Y = 5A0372E71CAF28901753A30E0C5A570759BF31769AB5A92079647F7526E543FF8540A9B6A7D5A11601DA18344AD57A8E
25,234,466 UART: [art] SIG.R = C18A667C831BDE14750E5724D109788DA8682D7A0DE012FEFFF6A285B497DDF4B97BBDBB06C8F04A8777415822219DFC
25,241,843 UART: [art] SIG.S = 39F18C2E70BD880E8035392B6520D29758FE8286F4B8ADC5E89FDC173555D3290439B25E66A383689664E6B9F7235687
26,220,902 UART: Caliptra RT
26,221,603 UART: [state] CFI Enabled
26,353,949 UART: [rt] RT listening for mailbox commands...
26,355,862 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,386,835 UART: [rt]cmd =0x44504543, len=136
30,557,014 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
3,750,779 ready_for_fw is high
3,751,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,973 >>> mbox cmd response: success
19,299,953 UART:
19,300,342 UART: Running Caliptra FMC ...
19,301,549 UART:
19,301,722 UART: [state] CFI Enabled
19,309,567 UART: [fht] FMC Alias Private Key: 7
21,075,679 UART: [art] Extend RT PCRs Done
21,076,906 UART: [art] Lock RT PCRs Done
21,078,650 UART: [art] Populate DV Done
21,084,238 UART: [fht] FMC Alias Private Key: 7
21,085,745 UART: [art] Derive CDI
21,086,517 UART: [art] Store in slot 0x4
21,129,016 UART: [art] Derive Key Pair
21,130,062 UART: [art] Store priv key in slot 0x5
23,556,970 UART: [art] Derive Key Pair - Done
23,569,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,382 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,893 UART: [art] PUB.X = C29EB7AC0C489180E62F471E234EA33022005D03C59642C1DD4B973052D157779B62784C8F475B523257C9017F237179
25,285,054 UART: [art] PUB.Y = 746CA799F9C7500E09A6D1E490AB0725B88623B0CE0EB8411E518EE21E79A126AA35D934CC2EDA4CFEC8563AF31998EA
25,292,344 UART: [art] SIG.R = 69ABEDD15277B75957F664640A59740CA0B9F240D465A4F3F3E0E2073E32750841FF4AE31C8D84C8A8CF338996B120A1
25,299,719 UART: [art] SIG.S = 78C8CBC8A0DE16BCF1EFAC0B5B92880158549C6CED40B629FA2784174D95CDDDC0748ADA79F5315C10D855E410F3E566
26,279,134 UART: Caliptra RT
26,279,838 UART: [state] CFI Enabled
26,412,994 UART: [rt] RT listening for mailbox commands...
26,414,933 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
26,445,851 UART: [rt]cmd =0x44504543, len=136
30,615,095 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,569 UART: [kat] SHA2-256
892,507 UART: [kat] SHA2-384
895,218 UART: [kat] SHA2-512-ACC
897,119 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,426 UART: [kat] LMS
1,475,622 UART: [kat] --
1,476,285 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,494 UART: [idev] ++
1,479,662 UART: [idev] CDI.KEYID = 6
1,480,022 UART: [idev] SUBJECT.KEYID = 7
1,480,446 UART: [idev] UDS.KEYID = 0
1,480,791 ready_for_fw is high
1,480,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,505,456 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,060 UART: [idev] --
1,514,981 UART: [ldev] ++
1,515,149 UART: [ldev] CDI.KEYID = 6
1,515,512 UART: [ldev] SUBJECT.KEYID = 5
1,515,938 UART: [ldev] AUTHORITY.KEYID = 7
1,516,401 UART: [ldev] FE.KEYID = 1
1,521,979 UART: [ldev] Erasing FE.KEYID = 1
1,547,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,034 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,138 UART: [ldev] --
1,586,647 UART: [fwproc] Waiting for Commands...
1,587,440 UART: [fwproc] Received command 0x46574c44
1,588,231 UART: [fwproc] Received Image of size 118548 bytes
2,933,447 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,200 >>> mbox cmd response: success
3,134,432 UART: [afmc] ++
3,134,600 UART: [afmc] CDI.KEYID = 6
3,134,962 UART: [afmc] SUBJECT.KEYID = 7
3,135,387 UART: [afmc] AUTHORITY.KEYID = 5
3,170,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,038 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,410 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,093 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,087 UART: [afmc] --
3,214,209 UART: [cold-reset] --
3,215,141 UART: [state] Locking Datavault
3,216,342 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,946 UART: [state] Locking ICCM
3,217,584 UART: [exit] Launching FMC @ 0x40000130
3,222,914 UART:
3,222,930 UART: Running Caliptra FMC ...
3,223,338 UART:
3,223,392 UART: [state] CFI Enabled
3,233,976 UART: [fht] FMC Alias Private Key: 7
3,353,462 UART: [art] Extend RT PCRs Done
3,353,890 UART: [art] Lock RT PCRs Done
3,355,158 UART: [art] Populate DV Done
3,363,543 UART: [fht] FMC Alias Private Key: 7
3,364,707 UART: [art] Derive CDI
3,364,987 UART: [art] Store in slot 0x4
3,450,751 UART: [art] Derive Key Pair
3,451,111 UART: [art] Store priv key in slot 0x5
3,464,496 UART: [art] Derive Key Pair - Done
3,479,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,495,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,496,143 UART: [art] PUB.X = 6C84B8B755B19A4DD9368BB0E237B7DC9C59C57E508572AFEAA9E1623A4B89C2B4B6286BFB21715CD45443A646CB3CCE
3,502,927 UART: [art] PUB.Y = F85D7ED0C77A25EEE6E3593B25C7BF8D1528B2C685244258296B46C51356E860E00FE2D5FC2F1B6DB0DDB9353C6711EE
3,509,884 UART: [art] SIG.R = 6219C27473F2B12C8C29746BF762086A7E176310E3F24437DB801075671553539452C7286C379A14AB5F304892EA0ABE
3,516,634 UART: [art] SIG.S = E2C156DC5FD1DA8CCF89BADE471C0F7A3DCB3B2C32AC4C761065E78E4AA51A18897DA4528AAAD2FE9D9DEA5EE67A3492
3,541,015 UART: Caliptra RT
3,541,266 UART: [state] CFI Enabled
3,660,706 UART: [rt] RT listening for mailbox commands...
3,661,376 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,158 UART: [rt]cmd =0x44504543, len=136
3,755,430 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,429 ready_for_fw is high
1,362,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,912 >>> mbox cmd response: success
3,042,133 UART:
3,042,149 UART: Running Caliptra FMC ...
3,042,557 UART:
3,042,611 UART: [state] CFI Enabled
3,053,325 UART: [fht] FMC Alias Private Key: 7
3,172,421 UART: [art] Extend RT PCRs Done
3,172,849 UART: [art] Lock RT PCRs Done
3,174,239 UART: [art] Populate DV Done
3,182,360 UART: [fht] FMC Alias Private Key: 7
3,183,350 UART: [art] Derive CDI
3,183,630 UART: [art] Store in slot 0x4
3,269,346 UART: [art] Derive Key Pair
3,269,706 UART: [art] Store priv key in slot 0x5
3,283,109 UART: [art] Derive Key Pair - Done
3,297,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,265 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,030 UART: [art] PUB.X = 2EBB4A931A323093882C79564E04B514A195558B88BFC62995E09D7020CFD080122DBA1D17B5AC6DA5A5E26595F56264
3,320,795 UART: [art] PUB.Y = 61015BE179E0EAF1D020062FC46F8B630084BB5FBE312988E9B766C1A9808A3B6E440E517BA32269DFBB7071C58D4BD0
3,327,720 UART: [art] SIG.R = 3322B8801D904339F4E8150B04FBD5E4D72C79DE3E3484FA35200D0B507A80A10882A5195B7AC34B0CC569B15CA82AC1
3,334,474 UART: [art] SIG.S = ACAC3B785C4CF9A4DA12EF00348FC54B4FF04CDDD5F59E235FC58D6DDFF41E98201883D464671E9196D3FE638DA05841
3,358,540 UART: Caliptra RT
3,358,791 UART: [state] CFI Enabled
3,478,953 UART: [rt] RT listening for mailbox commands...
3,479,623 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,873 UART: [rt]cmd =0x44504543, len=136
3,573,893 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,734 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,454 UART: [kat] SHA2-256
882,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,500 UART: [kat] ++
886,652 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,613 UART: [kat] SHA2-512-ACC
897,514 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,476,856 UART: [cold-reset] ++
1,477,196 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,685 UART: [idev] Erasing UDS.KEYID = 0
1,504,731 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,405 UART: [idev] --
1,514,480 UART: [ldev] ++
1,514,648 UART: [ldev] CDI.KEYID = 6
1,515,011 UART: [ldev] SUBJECT.KEYID = 5
1,515,437 UART: [ldev] AUTHORITY.KEYID = 7
1,515,900 UART: [ldev] FE.KEYID = 1
1,521,396 UART: [ldev] Erasing FE.KEYID = 1
1,547,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,081 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,173 UART: [fwproc] Received command 0x46574c44
1,587,964 UART: [fwproc] Received Image of size 118548 bytes
2,932,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,907 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,125 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,374 >>> mbox cmd response: success
3,133,406 UART: [afmc] ++
3,133,574 UART: [afmc] CDI.KEYID = 6
3,133,936 UART: [afmc] SUBJECT.KEYID = 7
3,134,361 UART: [afmc] AUTHORITY.KEYID = 5
3,169,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,476 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,068 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,751 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,691 UART: [afmc] --
3,212,621 UART: [cold-reset] --
3,213,581 UART: [state] Locking Datavault
3,214,868 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,472 UART: [state] Locking ICCM
3,216,048 UART: [exit] Launching FMC @ 0x40000130
3,221,378 UART:
3,221,394 UART: Running Caliptra FMC ...
3,221,802 UART:
3,221,945 UART: [state] CFI Enabled
3,232,509 UART: [fht] FMC Alias Private Key: 7
3,351,391 UART: [art] Extend RT PCRs Done
3,351,819 UART: [art] Lock RT PCRs Done
3,352,955 UART: [art] Populate DV Done
3,361,048 UART: [fht] FMC Alias Private Key: 7
3,362,110 UART: [art] Derive CDI
3,362,390 UART: [art] Store in slot 0x4
3,447,834 UART: [art] Derive Key Pair
3,448,194 UART: [art] Store priv key in slot 0x5
3,461,649 UART: [art] Derive Key Pair - Done
3,476,679 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,041 UART: [art] PUB.X = 66C663948E7C0912A70FFE8BCFD69E65B220945E1CCB834A135EA55566E2DE14AD9540E09123B94D4A8BB7ACE997AB5E
3,499,817 UART: [art] PUB.Y = 2305A83C4174F630F8A9EBDFA7C1E6DF63B57257B9E06A612ABB1FE3CC42AE26B31644FCF703D65B45C836A854ED19A2
3,506,775 UART: [art] SIG.R = 66CF06241F98DE66F88A1C7D5AEDC6CA171C6086BDBA1CF185D973E4BC3609DE0ACA6037862064ECEE173A9A4F1CF069
3,513,554 UART: [art] SIG.S = 1CDA2E59503F818E95E54045858736EC629F2E22B17870B72D39DB2ED55ACFF39EB32798E2B2A68F27DE7922AFFBAC95
3,537,170 UART: Caliptra RT
3,537,513 UART: [state] CFI Enabled
3,658,070 UART: [rt] RT listening for mailbox commands...
3,658,740 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,226 UART: [rt]cmd =0x44504543, len=136
3,752,746 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 ready_for_fw is high
1,362,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,901 >>> mbox cmd response: success
3,043,722 UART:
3,043,738 UART: Running Caliptra FMC ...
3,044,146 UART:
3,044,289 UART: [state] CFI Enabled
3,055,051 UART: [fht] FMC Alias Private Key: 7
3,174,137 UART: [art] Extend RT PCRs Done
3,174,565 UART: [art] Lock RT PCRs Done
3,175,813 UART: [art] Populate DV Done
3,183,922 UART: [fht] FMC Alias Private Key: 7
3,184,954 UART: [art] Derive CDI
3,185,234 UART: [art] Store in slot 0x4
3,270,818 UART: [art] Derive Key Pair
3,271,178 UART: [art] Store priv key in slot 0x5
3,284,493 UART: [art] Derive Key Pair - Done
3,299,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,222 UART: [art] PUB.X = 032CCAA5DED2414AECD567A10942F64B852A5373544AC7D45ED02C010A513A11FD0049E50ECBFD992777843DCE544749
3,321,961 UART: [art] PUB.Y = 0F8530DB55A539A88A438513315DF9DA34ADE3FD4C3302FBAAFD346B1BC6007AB1A23F19DF94406A6ADCD88DCA352FD2
3,328,903 UART: [art] SIG.R = E46F4A3DE4B8B23DDBBBC704C88FC34FD22E254F6B6BBE9DF9C548E0C565E5936BEE364C873FFA0E1B3258E20E646B8E
3,335,688 UART: [art] SIG.S = 15FDBD5235B9E750126FA7ACA5EEDF4564C29D52E946532BF85CE47C5B3F87A13B388EAE0395807A2833469B79085E37
3,359,720 UART: Caliptra RT
3,360,063 UART: [state] CFI Enabled
3,479,433 UART: [rt] RT listening for mailbox commands...
3,480,103 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,415 UART: [rt]cmd =0x44504543, len=136
3,574,125 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,896 UART: [kat] SHA2-256
891,446 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,550 UART: [kat] ++
895,702 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,811 UART: [kat] SHA2-512-ACC
906,712 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,364 UART: [fht] FHT @ 0x50003400
1,173,104 UART: [idev] ++
1,173,272 UART: [idev] CDI.KEYID = 6
1,173,633 UART: [idev] SUBJECT.KEYID = 7
1,174,058 UART: [idev] UDS.KEYID = 0
1,174,404 ready_for_fw is high
1,174,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,027 UART: [idev] Erasing UDS.KEYID = 0
1,199,061 UART: [idev] Sha1 KeyId Algorithm
1,207,781 UART: [idev] --
1,208,700 UART: [ldev] ++
1,208,868 UART: [ldev] CDI.KEYID = 6
1,209,232 UART: [ldev] SUBJECT.KEYID = 5
1,209,659 UART: [ldev] AUTHORITY.KEYID = 7
1,210,122 UART: [ldev] FE.KEYID = 1
1,215,492 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,776 UART: [ldev] --
1,281,133 UART: [fwproc] Wait for Commands...
1,281,714 UART: [fwproc] Recv command 0x46574c44
1,282,447 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,511 >>> mbox cmd response: success
2,825,531 UART: [afmc] ++
2,825,699 UART: [afmc] CDI.KEYID = 6
2,826,062 UART: [afmc] SUBJECT.KEYID = 7
2,826,488 UART: [afmc] AUTHORITY.KEYID = 5
2,862,235 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,748 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,088 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,789 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,438 UART: [afmc] --
2,905,441 UART: [cold-reset] --
2,906,301 UART: [state] Locking Datavault
2,907,308 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,912 UART: [state] Locking ICCM
2,908,528 UART: [exit] Launching FMC @ 0x40000130
2,913,858 UART:
2,913,874 UART: Running Caliptra FMC ...
2,914,282 UART:
2,914,336 UART: [state] CFI Enabled
2,924,634 UART: [fht] FMC Alias Private Key: 7
3,043,490 UART: [art] Extend RT PCRs Done
3,043,918 UART: [art] Lock RT PCRs Done
3,045,632 UART: [art] Populate DV Done
3,053,851 UART: [fht] FMC Alias Private Key: 7
3,054,843 UART: [art] Derive CDI
3,055,123 UART: [art] Store in slot 0x4
3,140,870 UART: [art] Derive Key Pair
3,141,230 UART: [art] Store priv key in slot 0x5
3,154,748 UART: [art] Derive Key Pair - Done
3,169,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,612 UART: [art] PUB.X = 3E9697810E5229EE6106B3CBA9CBC78C2B2CC1C6CDE190E5FCA0FB0ABC114D67A4727F6A16E48B68321BA8A536C51D08
3,192,386 UART: [art] PUB.Y = 3A1FD214F3C2D1407D7DA29ACE446E73CCB9D221B04BB5457E8BF9C2344B743C9BCE6DA209187D50108A67129B2462C4
3,199,341 UART: [art] SIG.R = F710DA5B5EBDD2361BCF4B200E5C17E3AE171B22F426D662BCAF4811804418C7A1631E039445EB9EBB49CE6C409459B4
3,206,115 UART: [art] SIG.S = F7D2BA4062BF89B60C10AA6D58CC38CD1436DF97FD0D982D08D7EA977E4DBD8BB7E4B14886A6A66472DEEBC1FC8C0515
3,229,445 UART: Caliptra RT
3,229,696 UART: [state] CFI Enabled
3,349,642 UART: [rt] RT listening for mailbox commands...
3,350,312 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,854 UART: [rt]cmd =0x44504543, len=136
3,444,934 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,848 ready_for_fw is high
1,058,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,962 >>> mbox cmd response: success
2,740,091 UART:
2,740,107 UART: Running Caliptra FMC ...
2,740,515 UART:
2,740,569 UART: [state] CFI Enabled
2,751,075 UART: [fht] FMC Alias Private Key: 7
2,869,973 UART: [art] Extend RT PCRs Done
2,870,401 UART: [art] Lock RT PCRs Done
2,871,661 UART: [art] Populate DV Done
2,879,794 UART: [fht] FMC Alias Private Key: 7
2,880,766 UART: [art] Derive CDI
2,881,046 UART: [art] Store in slot 0x4
2,966,603 UART: [art] Derive Key Pair
2,966,963 UART: [art] Store priv key in slot 0x5
2,979,819 UART: [art] Derive Key Pair - Done
2,994,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,131 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,896 UART: [art] PUB.X = AAA37A53FF544EC51C8E2B8B05588C2E6E8EC1648C1DB4EA975250AC48F7B116C09B578883A33C76C9245312A2F39DBD
3,017,673 UART: [art] PUB.Y = FF1E7C8EAF3B1F86A6AE134F5A90AF1CD59527FFB663F6EBCE1BE5D5D2FBD5829562EC50E91806573E36FAAA99BC9AE8
3,024,648 UART: [art] SIG.R = BA9656C8E041BDBD380BD9DDF2928176E6938B54BE2066E6FDBAA301488E4E8C91A16BCC9C6574B4234F3049EC1D68C8
3,031,424 UART: [art] SIG.S = F3C8000855FEBA7AF17FC9A725989D5500EFECF9731C9CEC7F7B37FEFAC6A965518D2889E24B9D49B0B3EC9036A2D691
3,055,207 UART: Caliptra RT
3,055,458 UART: [state] CFI Enabled
3,175,756 UART: [rt] RT listening for mailbox commands...
3,176,426 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,008 UART: [rt]cmd =0x44504543, len=136
3,270,616 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
86,924 UART: [state] WD Timer not started. Device not locked for debugging
88,253 UART: [kat] SHA2-256
891,803 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,907 UART: [kat] ++
896,059 UART: [kat] sha1
900,313 UART: [kat] SHA2-256
902,253 UART: [kat] SHA2-384
905,180 UART: [kat] SHA2-512-ACC
907,081 UART: [kat] ECC-384
916,792 UART: [kat] HMAC-384Kdf
921,544 UART: [kat] LMS
1,169,856 UART: [kat] --
1,170,781 UART: [cold-reset] ++
1,171,323 UART: [fht] FHT @ 0x50003400
1,174,147 UART: [idev] ++
1,174,315 UART: [idev] CDI.KEYID = 6
1,174,676 UART: [idev] SUBJECT.KEYID = 7
1,175,101 UART: [idev] UDS.KEYID = 0
1,175,447 ready_for_fw is high
1,175,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,972 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,209,937 UART: [ldev] ++
1,210,105 UART: [ldev] CDI.KEYID = 6
1,210,469 UART: [ldev] SUBJECT.KEYID = 5
1,210,896 UART: [ldev] AUTHORITY.KEYID = 7
1,211,359 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,134 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,056 UART: [fwproc] Wait for Commands...
1,282,839 UART: [fwproc] Recv command 0x46574c44
1,283,572 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,753 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,963 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,366 >>> mbox cmd response: success
2,828,438 UART: [afmc] ++
2,828,606 UART: [afmc] CDI.KEYID = 6
2,828,969 UART: [afmc] SUBJECT.KEYID = 7
2,829,395 UART: [afmc] AUTHORITY.KEYID = 5
2,864,818 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,637 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,977 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,678 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,551 UART: [afmc] --
2,908,480 UART: [cold-reset] --
2,909,414 UART: [state] Locking Datavault
2,910,549 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,153 UART: [state] Locking ICCM
2,911,699 UART: [exit] Launching FMC @ 0x40000130
2,917,029 UART:
2,917,045 UART: Running Caliptra FMC ...
2,917,453 UART:
2,917,596 UART: [state] CFI Enabled
2,928,176 UART: [fht] FMC Alias Private Key: 7
3,046,626 UART: [art] Extend RT PCRs Done
3,047,054 UART: [art] Lock RT PCRs Done
3,048,600 UART: [art] Populate DV Done
3,057,005 UART: [fht] FMC Alias Private Key: 7
3,058,031 UART: [art] Derive CDI
3,058,311 UART: [art] Store in slot 0x4
3,143,970 UART: [art] Derive Key Pair
3,144,330 UART: [art] Store priv key in slot 0x5
3,157,522 UART: [art] Derive Key Pair - Done
3,172,478 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,770 UART: [art] PUB.X = 7564CB3DB851B88AC4C19FD7247EE8AF25B493E22B48FD1BD431C078866870757F71AA2472392824EED6BA835FDA36E0
3,195,546 UART: [art] PUB.Y = 12D1C747072F25A057D759430A7D14C9D16F82F68EA7E1E6684B25418BCD54288D6DB1CABBD909A4B4A6792E96F65EE7
3,202,493 UART: [art] SIG.R = 8723324F20B10B145F491FE5F1BE6A61418227885B1C762991923533FE2E541B75875C2ADA2CF51337D206B6FBB29BEE
3,209,255 UART: [art] SIG.S = 1D232931933A36F2B3D8AE63B2748C09822FAC1D155DCCE250CA897363F48095AEFF0C23B0C79BE944C397AB225D4585
3,233,123 UART: Caliptra RT
3,233,466 UART: [state] CFI Enabled
3,353,353 UART: [rt] RT listening for mailbox commands...
3,354,023 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,521 UART: [rt]cmd =0x44504543, len=136
3,448,471 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,533 ready_for_fw is high
1,059,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,959 >>> mbox cmd response: success
2,739,502 UART:
2,739,518 UART: Running Caliptra FMC ...
2,739,926 UART:
2,740,069 UART: [state] CFI Enabled
2,750,823 UART: [fht] FMC Alias Private Key: 7
2,869,623 UART: [art] Extend RT PCRs Done
2,870,051 UART: [art] Lock RT PCRs Done
2,871,845 UART: [art] Populate DV Done
2,879,722 UART: [fht] FMC Alias Private Key: 7
2,880,732 UART: [art] Derive CDI
2,881,012 UART: [art] Store in slot 0x4
2,966,729 UART: [art] Derive Key Pair
2,967,089 UART: [art] Store priv key in slot 0x5
2,980,717 UART: [art] Derive Key Pair - Done
2,995,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,694 UART: [art] PUB.X = C89B0D09E644B0B50D69D65E3862DD26CE833BD82F3E10B781359F4F2665CDB41F7EA59BE3D6040392DCC76F45E8F382
3,019,457 UART: [art] PUB.Y = 0481253CD04CBD0225E03C01DE5F3464F6638187660696CC54BD0BD82FB6EFA0D3B8B7F16185D8FED019C5365F1D433E
3,026,398 UART: [art] SIG.R = 79A754C5A850EF3CB7087D7FF762B5918A7D50F0BCBB490FA9D43955B08FA444D46EB02ECBEC7C043CAA2EC61DB542D8
3,033,179 UART: [art] SIG.S = 5DA773D3AF67D6AEFBD37DAEC558D9320F1BE3E30A3133C2D9B5E2DAE80EFDBB66D6099C1ADAAB8DB4D5C348FC20A2B5
3,057,067 UART: Caliptra RT
3,057,410 UART: [state] CFI Enabled
3,177,528 UART: [rt] RT listening for mailbox commands...
3,178,198 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,828 UART: [rt]cmd =0x44504543, len=136
3,272,328 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
902,107 UART: [kat] SHA2-256
904,047 UART: [kat] SHA2-384
906,772 UART: [kat] SHA2-512-ACC
908,673 UART: [kat] ECC-384
918,352 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,179 UART: [cold-reset] ++
1,172,523 UART: [fht] FHT @ 0x50003400
1,175,170 UART: [idev] ++
1,175,338 UART: [idev] CDI.KEYID = 6
1,175,698 UART: [idev] SUBJECT.KEYID = 7
1,176,122 UART: [idev] UDS.KEYID = 0
1,176,467 ready_for_fw is high
1,176,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,201,341 UART: [idev] Sha1 KeyId Algorithm
1,209,891 UART: [idev] --
1,211,021 UART: [ldev] ++
1,211,189 UART: [ldev] CDI.KEYID = 6
1,211,552 UART: [ldev] SUBJECT.KEYID = 5
1,211,978 UART: [ldev] AUTHORITY.KEYID = 7
1,212,441 UART: [ldev] FE.KEYID = 1
1,217,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,118 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,780 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,131 >>> mbox cmd response: success
2,827,221 UART: [afmc] ++
2,827,389 UART: [afmc] CDI.KEYID = 6
2,827,751 UART: [afmc] SUBJECT.KEYID = 7
2,828,176 UART: [afmc] AUTHORITY.KEYID = 5
2,863,799 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,904 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,613 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,496 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,197 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,095 UART: [afmc] --
2,907,013 UART: [cold-reset] --
2,907,925 UART: [state] Locking Datavault
2,909,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,988 UART: [state] Locking ICCM
2,910,564 UART: [exit] Launching FMC @ 0x40000130
2,915,894 UART:
2,915,910 UART: Running Caliptra FMC ...
2,916,318 UART:
2,916,372 UART: [state] CFI Enabled
2,926,496 UART: [fht] FMC Alias Private Key: 7
3,046,282 UART: [art] Extend RT PCRs Done
3,046,710 UART: [art] Lock RT PCRs Done
3,048,130 UART: [art] Populate DV Done
3,056,419 UART: [fht] FMC Alias Private Key: 7
3,057,395 UART: [art] Derive CDI
3,057,675 UART: [art] Store in slot 0x4
3,143,244 UART: [art] Derive Key Pair
3,143,604 UART: [art] Store priv key in slot 0x5
3,156,754 UART: [art] Derive Key Pair - Done
3,171,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,505 UART: [art] PUB.X = AF544842E4746CD8AFC1BED51B4561A75BE3579F48415E4D1E0F18EFA2589519855871326D454326CACBEA5AC6386534
3,194,274 UART: [art] PUB.Y = 1E6F9023BAAA853F3B14E2EA5EFA5F814D83B0EF7BC714A062EC38C1338E9E1EDBB6945A33DB3D6F54F06743417E4F1F
3,201,242 UART: [art] SIG.R = 103EB1E5BBF5A9C64C4B86102F56877AC9F09A694EBA0F0814FFB57EE89520DEF5C839AC73482ECB7B8394543F868B16
3,208,016 UART: [art] SIG.S = 7510E315459B630588FA7B1E4CD67F9AE1865037FEA37A150D8FE5535D615DC0F7539306DB68F628B2F26431E2AB214C
3,232,289 UART: Caliptra RT
3,232,540 UART: [state] CFI Enabled
3,353,094 UART: [rt] RT listening for mailbox commands...
3,353,764 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,338 UART: [rt]cmd =0x44504543, len=136
3,447,670 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,553 ready_for_fw is high
1,060,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,034 >>> mbox cmd response: success
2,740,005 UART:
2,740,021 UART: Running Caliptra FMC ...
2,740,429 UART:
2,740,483 UART: [state] CFI Enabled
2,750,773 UART: [fht] FMC Alias Private Key: 7
2,869,829 UART: [art] Extend RT PCRs Done
2,870,257 UART: [art] Lock RT PCRs Done
2,871,929 UART: [art] Populate DV Done
2,880,234 UART: [fht] FMC Alias Private Key: 7
2,881,238 UART: [art] Derive CDI
2,881,518 UART: [art] Store in slot 0x4
2,967,511 UART: [art] Derive Key Pair
2,967,871 UART: [art] Store priv key in slot 0x5
2,981,269 UART: [art] Derive Key Pair - Done
2,996,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,632 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,397 UART: [art] PUB.X = 507698529A083924F324DA7BE42A6DB811E19DB5831E74800275BD75DD18EBD5E1221DA956C92D9A0A3CE3294B27F2B6
3,019,160 UART: [art] PUB.Y = AFEAC617A1F0BE601E363AC5A33ED652440957B61FA7A3CDCF3BB8046A2A06AC7D14E65C10DA21109E944DF5BB688BB4
3,026,121 UART: [art] SIG.R = 428D1FFD98ED1242713FF774CF828BA280ACD4DB720CB5DEC7690C7B74D4940EB1C4F5082B8416F4136E1E5D930C7D5D
3,032,888 UART: [art] SIG.S = 3B67BC51B82D3C0F6BCC0A3B6E801572A5A23A6B8097D5D91B6383889B715B4B5BCB641980C536DD9032924A3CE150FA
3,056,508 UART: Caliptra RT
3,056,759 UART: [state] CFI Enabled
3,175,669 UART: [rt] RT listening for mailbox commands...
3,176,339 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,937 UART: [rt]cmd =0x44504543, len=136
3,269,969 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,258 UART: [kat] SHA2-256
904,198 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,389 UART: [kat] LMS
1,171,717 UART: [kat] --
1,172,830 UART: [cold-reset] ++
1,173,240 UART: [fht] FHT @ 0x50003400
1,176,057 UART: [idev] ++
1,176,225 UART: [idev] CDI.KEYID = 6
1,176,585 UART: [idev] SUBJECT.KEYID = 7
1,177,009 UART: [idev] UDS.KEYID = 0
1,177,354 ready_for_fw is high
1,177,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,971 UART: [idev] Erasing UDS.KEYID = 0
1,201,862 UART: [idev] Sha1 KeyId Algorithm
1,210,366 UART: [idev] --
1,211,428 UART: [ldev] ++
1,211,596 UART: [ldev] CDI.KEYID = 6
1,211,959 UART: [ldev] SUBJECT.KEYID = 5
1,212,385 UART: [ldev] AUTHORITY.KEYID = 7
1,212,848 UART: [ldev] FE.KEYID = 1
1,217,846 UART: [ldev] Erasing FE.KEYID = 1
1,243,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,077 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,806 UART: [ldev] --
1,283,315 UART: [fwproc] Wait for Commands...
1,284,053 UART: [fwproc] Recv command 0x46574c44
1,284,781 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,263 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,462 >>> mbox cmd response: success
2,829,692 UART: [afmc] ++
2,829,860 UART: [afmc] CDI.KEYID = 6
2,830,222 UART: [afmc] SUBJECT.KEYID = 7
2,830,647 UART: [afmc] AUTHORITY.KEYID = 5
2,866,042 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,467 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,176 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,760 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,722 UART: [afmc] --
2,909,780 UART: [cold-reset] --
2,910,368 UART: [state] Locking Datavault
2,911,503 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,107 UART: [state] Locking ICCM
2,912,661 UART: [exit] Launching FMC @ 0x40000130
2,917,991 UART:
2,918,007 UART: Running Caliptra FMC ...
2,918,415 UART:
2,918,558 UART: [state] CFI Enabled
2,929,406 UART: [fht] FMC Alias Private Key: 7
3,049,002 UART: [art] Extend RT PCRs Done
3,049,430 UART: [art] Lock RT PCRs Done
3,051,008 UART: [art] Populate DV Done
3,059,463 UART: [fht] FMC Alias Private Key: 7
3,060,613 UART: [art] Derive CDI
3,060,893 UART: [art] Store in slot 0x4
3,146,430 UART: [art] Derive Key Pair
3,146,790 UART: [art] Store priv key in slot 0x5
3,159,614 UART: [art] Derive Key Pair - Done
3,174,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,289 UART: [art] PUB.X = 7204B670CEC92FC351EEF3153DD25579ECDE79FD2BD328FD0AE54A7978F9DE784CFC8B3FADDB0D298D172BEB54626333
3,197,070 UART: [art] PUB.Y = 69FC20DA3CC39904C8795FA26067AEDE96C0245E44BE4183398D24EA2431DAB4CC6BB4A59B9A555C4AA9A946D26DB398
3,204,029 UART: [art] SIG.R = B1F633FC1D06DCD11E82C9EFC70B65E4230B793EA5172687AB36193929C87952C4292272B90244A3E049B7C2C1F065E3
3,210,785 UART: [art] SIG.S = 941B432D96B4A713FB7668BCFC58147FD666E10AA8776A50FDF3E8040E2DA4A0D5075145DA2DCAB51E71D0064CC1F029
3,234,894 UART: Caliptra RT
3,235,237 UART: [state] CFI Enabled
3,354,285 UART: [rt] RT listening for mailbox commands...
3,354,955 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,701 UART: [rt]cmd =0x44504543, len=136
3,450,593 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,750 ready_for_fw is high
1,060,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,565 >>> mbox cmd response: success
2,745,212 UART:
2,745,228 UART: Running Caliptra FMC ...
2,745,636 UART:
2,745,779 UART: [state] CFI Enabled
2,756,341 UART: [fht] FMC Alias Private Key: 7
2,874,889 UART: [art] Extend RT PCRs Done
2,875,317 UART: [art] Lock RT PCRs Done
2,877,099 UART: [art] Populate DV Done
2,885,040 UART: [fht] FMC Alias Private Key: 7
2,886,112 UART: [art] Derive CDI
2,886,392 UART: [art] Store in slot 0x4
2,972,251 UART: [art] Derive Key Pair
2,972,611 UART: [art] Store priv key in slot 0x5
2,985,679 UART: [art] Derive Key Pair - Done
3,000,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,526 UART: [art] PUB.X = 9CF7D4DC514A08766CCD103C48A14D3B57CC4B7AAE0B9C93A454C895B000951797C316B54E8202DD5A1E91D54F042D38
3,023,268 UART: [art] PUB.Y = 995158E3CB790C2DC73A49FDCA048CC70B88E7AF11498C2F46F8FFF5B969E0F0EDCA69366F173890249027E344A5ED23
3,030,217 UART: [art] SIG.R = 4405ED9CCAFA7DF038A6F4F1E03D34C4A80691D336D714538F3E9EBE1458DFF526D7C4DC55E7E9FE7A1BAA980E9039E1
3,036,996 UART: [art] SIG.S = 8CAF1B2F48D4172F947333A89A041AEB1BDDC6FA18C630FA3D83CB3FB1333DC4B2DC02F08B41260AC45727FD125B697E
3,061,101 UART: Caliptra RT
3,061,444 UART: [state] CFI Enabled
3,181,419 UART: [rt] RT listening for mailbox commands...
3,182,089 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,509 UART: [rt]cmd =0x44504543, len=136
3,277,145 >>> mbox cmd response data (136 bytes)
test test_invoke_dpe::test_invoke_dpe_asymmetric_sign ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,136 UART:
192,503 UART: Running Caliptra ROM ...
193,606 UART:
193,749 UART: [state] CFI Enabled
264,389 UART: [state] LifecycleState = Unprovisioned
266,307 UART: [state] DebugLocked = No
268,470 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,204 UART: [kat] SHA2-256
443,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,373 UART: [kat] ++
454,826 UART: [kat] sha1
465,309 UART: [kat] SHA2-256
468,012 UART: [kat] SHA2-384
473,802 UART: [kat] SHA2-512-ACC
476,171 UART: [kat] ECC-384
2,766,752 UART: [kat] HMAC-384Kdf
2,780,070 UART: [kat] LMS
3,970,350 UART: [kat] --
3,973,971 UART: [cold-reset] ++
3,975,340 UART: [fht] Storing FHT @ 0x50003400
3,987,368 UART: [idev] ++
3,987,982 UART: [idev] CDI.KEYID = 6
3,988,904 UART: [idev] SUBJECT.KEYID = 7
3,990,155 UART: [idev] UDS.KEYID = 0
3,991,173 ready_for_fw is high
3,991,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,509 UART: [idev] Erasing UDS.KEYID = 0
7,327,255 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,040 UART: [idev] --
7,354,721 UART: [ldev] ++
7,355,301 UART: [ldev] CDI.KEYID = 6
7,356,216 UART: [ldev] SUBJECT.KEYID = 5
7,357,435 UART: [ldev] AUTHORITY.KEYID = 7
7,358,722 UART: [ldev] FE.KEYID = 1
7,401,049 UART: [ldev] Erasing FE.KEYID = 1
10,733,808 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,271 UART: [ldev] --
13,095,778 UART: [fwproc] Waiting for Commands...
13,097,491 UART: [fwproc] Received command 0x46574c44
13,099,922 UART: [fwproc] Received Image of size 118548 bytes
17,207,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,280,416 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,353,587 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,682,660 >>> mbox cmd response: success
17,686,430 UART: [afmc] ++
17,687,051 UART: [afmc] CDI.KEYID = 6
17,687,966 UART: [afmc] SUBJECT.KEYID = 7
17,689,181 UART: [afmc] AUTHORITY.KEYID = 5
21,051,445 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,738 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,126 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,417,744 UART: [afmc] --
23,421,178 UART: [cold-reset] --
23,424,909 UART: [state] Locking Datavault
23,428,220 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,922 UART: [state] Locking ICCM
23,432,177 UART: [exit] Launching FMC @ 0x40000130
23,440,567 UART:
23,440,800 UART: Running Caliptra FMC ...
23,441,900 UART:
23,442,066 UART: [state] CFI Enabled
23,512,550 UART: [fht] FMC Alias Private Key: 7
25,852,623 UART: [art] Extend RT PCRs Done
25,853,849 UART: [art] Lock RT PCRs Done
25,855,928 UART: [art] Populate DV Done
25,861,563 UART: [fht] FMC Alias Private Key: 7
25,863,203 UART: [art] Derive CDI
25,863,936 UART: [art] Store in slot 0x4
25,920,392 UART: [art] Derive Key Pair
25,921,432 UART: [art] Store priv key in slot 0x5
29,213,844 UART: [art] Derive Key Pair - Done
29,226,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,367 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,868 UART: [art] PUB.X = 582E2448AD626D28B8F8796A3D4CA547D9A914C9EFD23C8320F6AEFA9D1E086318CEBA9FFA8413A8E6E0A90C61AB3F00
31,524,162 UART: [art] PUB.Y = 5E9811B6CE386884720647516F7D701011417E4B326B20FDB2DDC49506CA572E5A8A9198A3B5D67A863C45F3B2ECD957
31,531,382 UART: [art] SIG.R = 8EAFFB7258AA6F1F2709E5132FC309607BFF6B09B56F4A0278F563292A36500FBE34B7E926B217EED4286D204739038B
31,538,769 UART: [art] SIG.S = 5C45F95362ECA302495DD2B60B29C7A84B32B410E811BB68CEF28612461359FA0BB5D7AA5561FD2C2E7E7BEF98A4977A
32,843,187 UART: Caliptra RT
32,844,059 UART: [state] CFI Enabled
33,029,620 UART: [rt] RT listening for mailbox commands...
33,032,135 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,063,028 UART: [rt]cmd =0x44504543, len=92
41,100,129 >>> mbox cmd response data (6284 bytes)
41,129,516 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,159,446 UART: [rt]cmd =0x43455252, len=4
41,170,759 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,807,860 ready_for_fw is high
3,808,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,507 >>> mbox cmd response: success
23,650,669 UART:
23,651,052 UART: Running Caliptra FMC ...
23,652,204 UART:
23,652,366 UART: [state] CFI Enabled
23,721,010 UART: [fht] FMC Alias Private Key: 7
26,061,449 UART: [art] Extend RT PCRs Done
26,062,673 UART: [art] Lock RT PCRs Done
26,064,137 UART: [art] Populate DV Done
26,069,831 UART: [fht] FMC Alias Private Key: 7
26,071,390 UART: [art] Derive CDI
26,072,209 UART: [art] Store in slot 0x4
26,129,314 UART: [art] Derive Key Pair
26,130,359 UART: [art] Store priv key in slot 0x5
29,423,363 UART: [art] Derive Key Pair - Done
29,436,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,376 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,911 UART: [art] PUB.X = 19BF293EF21E678AF51D8A1734DAC3067BEACF553DD62D8B1893F3AE98007F67453EF6B26B8FC2A6D6ECDBB2D2D86D24
31,733,163 UART: [art] PUB.Y = 73CE182D6197F9045AAB1D247E142D02BBCC08E64594BE45E31D8E0D7D9882F8E90FA3D8818D92C1F2D8044F3CD91DCE
31,740,365 UART: [art] SIG.R = 79E9FE9FEF1054DE7AD5A76AF9836209233B39E1CCBD20B3989FE380C7C026585EF590DA174477E604F837A0A0A7F76E
31,747,757 UART: [art] SIG.S = 8CD43A89C45025AFD6E0C81D70D5702CAC12E127A47E53DA86D771CA02BBE5F67C04F698AFB2A890BD5EFC5CA45A6FA0
33,052,571 UART: Caliptra RT
33,053,289 UART: [state] CFI Enabled
33,230,063 UART: [rt] RT listening for mailbox commands...
33,232,364 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,263,066 UART: [rt]cmd =0x44504543, len=92
41,302,180 >>> mbox cmd response data (6284 bytes)
41,332,671 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,362,602 UART: [rt]cmd =0x43455252, len=4
41,374,671 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,483 UART:
192,840 UART: Running Caliptra ROM ...
194,019 UART:
603,814 UART: [state] CFI Enabled
619,116 UART: [state] LifecycleState = Unprovisioned
620,981 UART: [state] DebugLocked = No
623,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,862 UART: [kat] SHA2-256
797,659 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,175 UART: [kat] ++
808,643 UART: [kat] sha1
818,803 UART: [kat] SHA2-256
821,516 UART: [kat] SHA2-384
827,218 UART: [kat] SHA2-512-ACC
829,583 UART: [kat] ECC-384
3,114,495 UART: [kat] HMAC-384Kdf
3,127,883 UART: [kat] LMS
4,318,029 UART: [kat] --
4,321,399 UART: [cold-reset] ++
4,323,256 UART: [fht] Storing FHT @ 0x50003400
4,334,598 UART: [idev] ++
4,335,189 UART: [idev] CDI.KEYID = 6
4,336,220 UART: [idev] SUBJECT.KEYID = 7
4,337,391 UART: [idev] UDS.KEYID = 0
4,338,441 ready_for_fw is high
4,338,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,516 UART: [idev] Erasing UDS.KEYID = 0
7,624,641 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,423 UART: [idev] --
7,649,624 UART: [ldev] ++
7,650,187 UART: [ldev] CDI.KEYID = 6
7,651,144 UART: [ldev] SUBJECT.KEYID = 5
7,652,351 UART: [ldev] AUTHORITY.KEYID = 7
7,653,624 UART: [ldev] FE.KEYID = 1
7,664,909 UART: [ldev] Erasing FE.KEYID = 1
10,952,435 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,448 UART: [ldev] --
13,311,956 UART: [fwproc] Waiting for Commands...
13,314,819 UART: [fwproc] Received command 0x46574c44
13,316,997 UART: [fwproc] Received Image of size 118548 bytes
17,419,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,901,302 >>> mbox cmd response: success
17,905,648 UART: [afmc] ++
17,906,240 UART: [afmc] CDI.KEYID = 6
17,907,202 UART: [afmc] SUBJECT.KEYID = 7
17,908,404 UART: [afmc] AUTHORITY.KEYID = 5
21,222,834 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,613 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,988 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,441 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,461 UART: [afmc] --
23,589,598 UART: [cold-reset] --
23,593,668 UART: [state] Locking Datavault
23,598,262 UART: [state] Locking PCR0, PCR1 and PCR31
23,599,957 UART: [state] Locking ICCM
23,602,269 UART: [exit] Launching FMC @ 0x40000130
23,610,674 UART:
23,610,947 UART: Running Caliptra FMC ...
23,612,054 UART:
23,612,216 UART: [state] CFI Enabled
23,620,213 UART: [fht] FMC Alias Private Key: 7
25,959,974 UART: [art] Extend RT PCRs Done
25,961,194 UART: [art] Lock RT PCRs Done
25,962,412 UART: [art] Populate DV Done
25,967,818 UART: [fht] FMC Alias Private Key: 7
25,969,456 UART: [art] Derive CDI
25,970,210 UART: [art] Store in slot 0x4
26,013,019 UART: [art] Derive Key Pair
26,014,056 UART: [art] Store priv key in slot 0x5
29,255,667 UART: [art] Derive Key Pair - Done
29,268,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,545 UART: [art] PUB.X = D59BF5DD93306A8630CF5D3387B8639C1E9AE733990A931C7D1D2FCD1254397F2D8B8CC593CA6156688504CD4BDCDBDD
31,557,776 UART: [art] PUB.Y = C528E315793453A7B881249D46D9FBD7AE6B5AFD077E5FF55E81EBFD308E00687B6F4C1AC6055AE33D8DD0754D7E2443
31,565,100 UART: [art] SIG.R = 7FD117E194A41B0854538EF73576B6C28D72EEDF1F7A309E97C15F4E89A3C871059C12637EC37B7A497F0751AABC771D
31,572,488 UART: [art] SIG.S = 1128279C11971CF3BE8224CCF66EC36335A59BA38F532299572FD3FF7EED6C4CA354184D559B9ECB5BE719A8DD98B20C
32,877,556 UART: Caliptra RT
32,878,264 UART: [state] CFI Enabled
33,012,454 UART: [rt] RT listening for mailbox commands...
33,014,802 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,045,479 UART: [rt]cmd =0x44504543, len=92
41,018,862 >>> mbox cmd response data (6284 bytes)
41,048,514 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,078,176 UART: [rt]cmd =0x43455252, len=4
41,089,598 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
4,136,148 ready_for_fw is high
4,136,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,031 >>> mbox cmd response: success
23,804,930 UART:
23,805,340 UART: Running Caliptra FMC ...
23,806,472 UART:
23,806,624 UART: [state] CFI Enabled
23,814,386 UART: [fht] FMC Alias Private Key: 7
26,155,253 UART: [art] Extend RT PCRs Done
26,156,486 UART: [art] Lock RT PCRs Done
26,158,222 UART: [art] Populate DV Done
26,163,907 UART: [fht] FMC Alias Private Key: 7
26,165,551 UART: [art] Derive CDI
26,166,372 UART: [art] Store in slot 0x4
26,208,704 UART: [art] Derive Key Pair
26,209,745 UART: [art] Store priv key in slot 0x5
29,451,566 UART: [art] Derive Key Pair - Done
29,464,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,190 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,701 UART: [art] PUB.X = 3F95876D1F708ACE05F7BD088D87B099CA0ED7BB6A46D37345D9FC2E47AC7B39C59A7A2D5B74908325149AB37C28D41E
31,753,946 UART: [art] PUB.Y = 5B85C1D04B3C8536CD64B1AF8B7EE0A5546EE981D95DA4AFD542875ABF6EF396E9D86FE24D02C97F463C68D2C2D2F568
31,761,244 UART: [art] SIG.R = 1F65161361F4BBC0913ED544C17EE2CB20E11A0C9B26F5DC1C9F5B75CF902FFB9124164701561BF4BD4F0C698C82D68B
31,768,642 UART: [art] SIG.S = 5AA836126A11B49D0633020F15DE0DF42BB702AC11DF6D536E924EB84FDE74E96AA10995ADC71CCDA46C12122D60C195
33,073,981 UART: Caliptra RT
33,074,725 UART: [state] CFI Enabled
33,208,449 UART: [rt] RT listening for mailbox commands...
33,210,840 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,241,439 UART: [rt]cmd =0x44504543, len=92
41,215,015 >>> mbox cmd response data (6284 bytes)
41,244,441 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,274,274 UART: [rt]cmd =0x43455252, len=4
41,285,688 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,126 UART:
192,487 UART: Running Caliptra ROM ...
193,661 UART:
193,809 UART: [state] CFI Enabled
266,226 UART: [state] LifecycleState = Unprovisioned
268,154 UART: [state] DebugLocked = No
269,480 UART: [state] WD Timer not started. Device not locked for debugging
273,309 UART: [kat] SHA2-256
452,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,780 UART: [kat] ++
464,226 UART: [kat] sha1
475,309 UART: [kat] SHA2-256
478,029 UART: [kat] SHA2-384
483,665 UART: [kat] SHA2-512-ACC
486,026 UART: [kat] ECC-384
2,950,348 UART: [kat] HMAC-384Kdf
2,973,020 UART: [kat] LMS
3,449,498 UART: [kat] --
3,453,845 UART: [cold-reset] ++
3,455,841 UART: [fht] FHT @ 0x50003400
3,468,159 UART: [idev] ++
3,468,734 UART: [idev] CDI.KEYID = 6
3,469,716 UART: [idev] SUBJECT.KEYID = 7
3,470,955 UART: [idev] UDS.KEYID = 0
3,471,852 ready_for_fw is high
3,472,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,072 UART: [idev] Erasing UDS.KEYID = 0
5,988,171 UART: [idev] Sha1 KeyId Algorithm
6,011,962 UART: [idev] --
6,016,017 UART: [ldev] ++
6,016,587 UART: [ldev] CDI.KEYID = 6
6,017,469 UART: [ldev] SUBJECT.KEYID = 5
6,018,677 UART: [ldev] AUTHORITY.KEYID = 7
6,019,959 UART: [ldev] FE.KEYID = 1
6,059,379 UART: [ldev] Erasing FE.KEYID = 1
8,564,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,809 UART: [ldev] --
10,377,380 UART: [fwproc] Wait for Commands...
10,379,430 UART: [fwproc] Recv command 0x46574c44
10,381,464 UART: [fwproc] Recv'd Img size: 118548 bytes
13,874,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,954,536 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,027,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,356,131 >>> mbox cmd response: success
14,360,735 UART: [afmc] ++
14,361,351 UART: [afmc] CDI.KEYID = 6
14,362,245 UART: [afmc] SUBJECT.KEYID = 7
14,363,457 UART: [afmc] AUTHORITY.KEYID = 5
16,898,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,657 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,067 UART: [afmc] --
18,716,234 UART: [cold-reset] --
18,721,927 UART: [state] Locking Datavault
18,725,882 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,579 UART: [state] Locking ICCM
18,729,290 UART: [exit] Launching FMC @ 0x40000130
18,737,684 UART:
18,737,917 UART: Running Caliptra FMC ...
18,739,014 UART:
18,739,174 UART: [state] CFI Enabled
18,796,731 UART: [fht] FMC Alias Private Key: 7
20,563,410 UART: [art] Extend RT PCRs Done
20,564,629 UART: [art] Lock RT PCRs Done
20,566,576 UART: [art] Populate DV Done
20,572,099 UART: [fht] FMC Alias Private Key: 7
20,573,588 UART: [art] Derive CDI
20,574,320 UART: [art] Store in slot 0x4
20,629,148 UART: [art] Derive Key Pair
20,630,187 UART: [art] Store priv key in slot 0x5
23,094,060 UART: [art] Derive Key Pair - Done
23,107,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,738 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,239 UART: [art] PUB.X = AA10A468A7A5A95691A64C0C852B28C4AC7AA834A5196FD94C88D214852DF9866870837A1BC3CC25641AA470B182B896
24,828,495 UART: [art] PUB.Y = DCA2B4C57DD5D4F7CB5613FFBD9B091AA6FA1CAAAB831595E5A556B38E5AD3DF568D0D5C90BBA495B5B4644B9F828950
24,835,830 UART: [art] SIG.R = 113BACDC3A594478E45C8106CFF24579D004C88248B89F2A384D8B4364E5750764ACC1ECC7A347421EFA439B89488588
24,843,216 UART: [art] SIG.S = EE776CAF5D67839CCA6F55F4C2497C7C24C7C03B9203BFDA0FD0BE6E5C0F1747A06AA354A027211E2A95A1D400865579
25,821,975 UART: Caliptra RT
25,822,716 UART: [state] CFI Enabled
26,002,738 UART: [rt] RT listening for mailbox commands...
26,005,032 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,035,802 UART: [rt]cmd =0x44504543, len=92
32,091,253 >>> mbox cmd response data (6284 bytes)
32,120,660 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,150,635 UART: [rt]cmd =0x43455252, len=4
32,162,248 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,462,789 ready_for_fw is high
3,463,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,349 >>> mbox cmd response: success
18,518,458 UART:
18,518,864 UART: Running Caliptra FMC ...
18,519,976 UART:
18,520,134 UART: [state] CFI Enabled
18,585,854 UART: [fht] FMC Alias Private Key: 7
20,351,842 UART: [art] Extend RT PCRs Done
20,353,082 UART: [art] Lock RT PCRs Done
20,354,576 UART: [art] Populate DV Done
20,360,101 UART: [fht] FMC Alias Private Key: 7
20,361,690 UART: [art] Derive CDI
20,362,424 UART: [art] Store in slot 0x4
20,419,151 UART: [art] Derive Key Pair
20,420,238 UART: [art] Store priv key in slot 0x5
22,883,318 UART: [art] Derive Key Pair - Done
22,896,445 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,303 UART: [art] PUB.X = CE05BFCD4405A4C5D0402389ABA89233DCC122AA4B06123359054797C6A2092958C3863BB4C79969354A130AE1B77F83
24,617,567 UART: [art] PUB.Y = 8D21482A40593D8E13896FE2CEB2117064B4DD370E388E7E930A8809515C9CE165168D6F1619F9B8E80516A919CBC7B0
24,624,824 UART: [art] SIG.R = 7013DC664122251D10AEE0234E098E1880A4D8A29CB9D940AB44D5E009FAEE1FB1A7584D89D9532130B7918FAC1D6E2B
24,632,382 UART: [art] SIG.S = 6E1924434BBDF81825635E6B2EAE9262C7BE0E863E68BEA4770C250BB9B019DFFD0C60F5F5E147B49A25B113238A34A5
25,610,558 UART: Caliptra RT
25,611,296 UART: [state] CFI Enabled
25,794,069 UART: [rt] RT listening for mailbox commands...
25,796,435 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,826,985 UART: [rt]cmd =0x44504543, len=92
31,882,774 >>> mbox cmd response data (6284 bytes)
31,912,301 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,942,112 UART: [rt]cmd =0x43455252, len=4
31,953,676 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,462 UART:
192,814 UART: Running Caliptra ROM ...
193,948 UART:
603,494 UART: [state] CFI Enabled
616,924 UART: [state] LifecycleState = Unprovisioned
618,922 UART: [state] DebugLocked = No
620,945 UART: [state] WD Timer not started. Device not locked for debugging
624,981 UART: [kat] SHA2-256
804,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,391 UART: [kat] ++
815,842 UART: [kat] sha1
827,144 UART: [kat] SHA2-256
829,871 UART: [kat] SHA2-384
836,149 UART: [kat] SHA2-512-ACC
838,517 UART: [kat] ECC-384
3,282,838 UART: [kat] HMAC-384Kdf
3,295,439 UART: [kat] LMS
3,771,904 UART: [kat] --
3,776,252 UART: [cold-reset] ++
3,777,683 UART: [fht] FHT @ 0x50003400
3,790,368 UART: [idev] ++
3,790,960 UART: [idev] CDI.KEYID = 6
3,791,873 UART: [idev] SUBJECT.KEYID = 7
3,793,122 UART: [idev] UDS.KEYID = 0
3,794,050 ready_for_fw is high
3,794,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,516 UART: [idev] Erasing UDS.KEYID = 0
6,269,953 UART: [idev] Sha1 KeyId Algorithm
6,293,941 UART: [idev] --
6,299,313 UART: [ldev] ++
6,299,890 UART: [ldev] CDI.KEYID = 6
6,300,807 UART: [ldev] SUBJECT.KEYID = 5
6,302,022 UART: [ldev] AUTHORITY.KEYID = 7
6,303,258 UART: [ldev] FE.KEYID = 1
6,314,394 UART: [ldev] Erasing FE.KEYID = 1
8,796,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,144 UART: [ldev] --
10,590,433 UART: [fwproc] Wait for Commands...
10,592,363 UART: [fwproc] Recv command 0x46574c44
10,594,343 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,878 >>> mbox cmd response: success
14,561,412 UART: [afmc] ++
14,562,085 UART: [afmc] CDI.KEYID = 6
14,563,008 UART: [afmc] SUBJECT.KEYID = 7
14,564,180 UART: [afmc] AUTHORITY.KEYID = 5
17,073,249 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,404 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,226 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,260 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,850 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,677 UART: [afmc] --
18,871,935 UART: [cold-reset] --
18,877,363 UART: [state] Locking Datavault
18,884,124 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,844 UART: [state] Locking ICCM
18,887,598 UART: [exit] Launching FMC @ 0x40000130
18,896,051 UART:
18,896,291 UART: Running Caliptra FMC ...
18,897,399 UART:
18,897,567 UART: [state] CFI Enabled
18,905,835 UART: [fht] FMC Alias Private Key: 7
20,671,847 UART: [art] Extend RT PCRs Done
20,673,078 UART: [art] Lock RT PCRs Done
20,674,595 UART: [art] Populate DV Done
20,679,792 UART: [fht] FMC Alias Private Key: 7
20,681,443 UART: [art] Derive CDI
20,682,263 UART: [art] Store in slot 0x4
20,725,035 UART: [art] Derive Key Pair
20,726,075 UART: [art] Store priv key in slot 0x5
23,152,335 UART: [art] Derive Key Pair - Done
23,165,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,947 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,442 UART: [art] PUB.X = C8A7705F4D5E9404CDADB60A02A547FE4DD6E96ACA86B10CE5290A414FF3B99046B8836577F1FEFDE8307C3E6C1F729A
24,880,744 UART: [art] PUB.Y = 309C7256BEC80968785FEA71F6BF951CC62A7002F9638F0D0EDB2D8EB023ED19CD2D9726606BA20F9CC13D1D53F15595
24,887,975 UART: [art] SIG.R = 360367A19C406D02B588B9489E66F846FE498EDF9E3AB34A3B4C33A609D6B479F1E468BA48157BA8C490B819A39C593C
24,895,372 UART: [art] SIG.S = C074DC109F6DFEE67F3178C0E61640791E7EB8741988EC16D5AC345757DB852F59826746093951B0389B845B3FAA26EC
25,874,304 UART: Caliptra RT
25,875,022 UART: [state] CFI Enabled
26,008,196 UART: [rt] RT listening for mailbox commands...
26,010,337 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,040,937 UART: [rt]cmd =0x44504543, len=92
32,051,456 >>> mbox cmd response data (6284 bytes)
32,080,728 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,110,529 UART: [rt]cmd =0x43455252, len=4
32,121,899 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,783,143 ready_for_fw is high
3,783,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,141 >>> mbox cmd response: success
18,699,017 UART:
18,699,402 UART: Running Caliptra FMC ...
18,700,625 UART:
18,700,798 UART: [state] CFI Enabled
18,708,520 UART: [fht] FMC Alias Private Key: 7
20,474,782 UART: [art] Extend RT PCRs Done
20,476,007 UART: [art] Lock RT PCRs Done
20,477,830 UART: [art] Populate DV Done
20,483,258 UART: [fht] FMC Alias Private Key: 7
20,484,966 UART: [art] Derive CDI
20,485,787 UART: [art] Store in slot 0x4
20,528,699 UART: [art] Derive Key Pair
20,529,732 UART: [art] Store priv key in slot 0x5
22,957,129 UART: [art] Derive Key Pair - Done
22,970,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,990 UART: [art] PUB.X = 16B9437D306086D9B10DDD0DAB00E72944E88C2B0FA5BC8C2F6457E03BE56D9A790BB76A940A3C0A85AC06C5F59E7246
24,685,262 UART: [art] PUB.Y = 644B0F015A852653786041C7DA7D67E62B4803B2F85CC44C7BABBE82F0BE4E0E94556FA29538A979F9220545B24E1117
24,692,518 UART: [art] SIG.R = 892CD8E81E100BAE82AE269A38BD3541131B3AFBC6114F5746C9A79558345184E942756493147566E2C670094CFC2A95
24,699,828 UART: [art] SIG.S = 26AC93D104EDFF8EBC1B565D02ABABE224A19FA37BE3D12F5F18C14E61D2EBC2C859998F206B6F010A83FB15E6DCCC48
25,679,392 UART: Caliptra RT
25,680,095 UART: [state] CFI Enabled
25,813,251 UART: [rt] RT listening for mailbox commands...
25,815,596 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,846,250 UART: [rt]cmd =0x44504543, len=92
31,856,561 >>> mbox cmd response data (6284 bytes)
31,885,812 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
31,915,775 UART: [rt]cmd =0x43455252, len=4
31,927,322 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,069 UART:
192,447 UART: Running Caliptra ROM ...
193,605 UART:
193,752 UART: [state] CFI Enabled
264,219 UART: [state] LifecycleState = Unprovisioned
266,636 UART: [state] DebugLocked = No
269,449 UART: [state] WD Timer not started. Device not locked for debugging
273,908 UART: [kat] SHA2-256
463,774 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,511 UART: [kat] ++
474,982 UART: [kat] sha1
485,803 UART: [kat] SHA2-256
488,872 UART: [kat] SHA2-384
495,939 UART: [kat] SHA2-512-ACC
498,519 UART: [kat] ECC-384
2,948,568 UART: [kat] HMAC-384Kdf
2,970,750 UART: [kat] LMS
3,502,530 UART: [kat] --
3,507,140 UART: [cold-reset] ++
3,509,358 UART: [fht] FHT @ 0x50003400
3,521,916 UART: [idev] ++
3,522,598 UART: [idev] CDI.KEYID = 6
3,523,515 UART: [idev] SUBJECT.KEYID = 7
3,524,762 UART: [idev] UDS.KEYID = 0
3,525,662 ready_for_fw is high
3,525,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,754 UART: [idev] Erasing UDS.KEYID = 0
6,027,751 UART: [idev] Sha1 KeyId Algorithm
6,050,664 UART: [idev] --
6,054,714 UART: [ldev] ++
6,055,394 UART: [ldev] CDI.KEYID = 6
6,056,358 UART: [ldev] SUBJECT.KEYID = 5
6,057,512 UART: [ldev] AUTHORITY.KEYID = 7
6,058,741 UART: [ldev] FE.KEYID = 1
6,098,583 UART: [ldev] Erasing FE.KEYID = 1
8,603,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,872 UART: [ldev] --
10,412,682 UART: [fwproc] Wait for Commands...
10,415,098 UART: [fwproc] Recv command 0x46574c44
10,417,405 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,301 >>> mbox cmd response: success
14,673,835 UART: [afmc] ++
14,674,556 UART: [afmc] CDI.KEYID = 6
14,675,761 UART: [afmc] SUBJECT.KEYID = 7
14,677,203 UART: [afmc] AUTHORITY.KEYID = 5
17,212,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,488 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,502 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,551 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,399 UART: [afmc] --
19,008,209 UART: [cold-reset] --
19,012,343 UART: [state] Locking Datavault
19,018,948 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,103 UART: [state] Locking ICCM
19,023,851 UART: [exit] Launching FMC @ 0x40000130
19,032,528 UART:
19,032,761 UART: Running Caliptra FMC ...
19,033,882 UART:
19,034,048 UART: [state] CFI Enabled
19,093,063 UART: [fht] FMC Alias Private Key: 7
20,859,599 UART: [art] Extend RT PCRs Done
20,860,821 UART: [art] Lock RT PCRs Done
20,862,527 UART: [art] Populate DV Done
20,867,933 UART: [fht] FMC Alias Private Key: 7
20,869,624 UART: [art] Derive CDI
20,870,356 UART: [art] Store in slot 0x4
20,925,547 UART: [art] Derive Key Pair
20,926,588 UART: [art] Store priv key in slot 0x5
23,389,594 UART: [art] Derive Key Pair - Done
23,402,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,777 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,464 UART: [art] PUB.X = 5F7930BCB42CA27A234CC2D91D138581D56C66BD594C142EA917F6BBCE29DFFB0BD261CA535E556958C83E60A7B549D8
25,124,581 UART: [art] PUB.Y = FBA377D57835FC92460E3616AB9AFCE7B2428EEEA5E42093BF8ACA24C83AEC336AAE8C88151B2DDEFB12362E6D2CD413
25,131,857 UART: [art] SIG.R = 56F8B01D144992CC3EFFA9964A4DCAC77C145F8191E01A55BFC704F3891C2B465126749F10495B583A18FA7E5B5DE85E
25,139,210 UART: [art] SIG.S = 037C2747B8C7DEFFFD94E9B0F2728A35A53B249668B4E477694FF41E1A2869544C56B5D7BCC2BCD00700E39ACB9F4291
26,117,780 UART: Caliptra RT
26,118,490 UART: [state] CFI Enabled
26,300,620 UART: [rt] RT listening for mailbox commands...
26,302,942 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,333,614 UART: [rt]cmd =0x44504543, len=92
32,389,288 >>> mbox cmd response data (6284 bytes)
32,418,863 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,448,792 UART: [rt]cmd =0x43455252, len=4
32,460,323 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
3,436,409 ready_for_fw is high
3,436,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,826 >>> mbox cmd response: success
19,133,325 UART:
19,133,716 UART: Running Caliptra FMC ...
19,134,877 UART:
19,135,040 UART: [state] CFI Enabled
19,201,910 UART: [fht] FMC Alias Private Key: 7
20,967,730 UART: [art] Extend RT PCRs Done
20,969,089 UART: [art] Lock RT PCRs Done
20,970,612 UART: [art] Populate DV Done
20,976,136 UART: [fht] FMC Alias Private Key: 7
20,977,782 UART: [art] Derive CDI
20,978,596 UART: [art] Store in slot 0x4
21,034,340 UART: [art] Derive Key Pair
21,035,363 UART: [art] Store priv key in slot 0x5
23,497,954 UART: [art] Derive Key Pair - Done
23,510,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,020 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,531 UART: [art] PUB.X = A744C923D406D521CA34A632FC54D8CF8953043D0D92B5F56AF971327E0ED55F723FE8030DD58E2EF3EFBC56E90B5233
25,231,765 UART: [art] PUB.Y = 41F62AC340D93A48804162AD1B1BBE59469455A47A0D30B681948A110C00E8FF93B9875ECC9B920D788A277CD4924091
25,238,983 UART: [art] SIG.R = CAFBE396BEB1BD9813660BC4C173C8D81909073F616AF346345A49DFA603B04364A6BE735AD9F43A4B9B1468507AF327
25,246,377 UART: [art] SIG.S = E7C8F2EA4177F8CA40BD691606C0C02E9CA746850620913C8C31087016C10969B7D82F8916BEA0132C665776F9F28220
26,225,084 UART: Caliptra RT
26,225,810 UART: [state] CFI Enabled
26,406,655 UART: [rt] RT listening for mailbox commands...
26,409,126 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,439,737 UART: [rt]cmd =0x44504543, len=92
32,496,497 >>> mbox cmd response data (6284 bytes)
32,525,737 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,555,695 UART: [rt]cmd =0x43455252, len=4
32,566,967 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,396 UART:
192,760 UART: Running Caliptra ROM ...
193,963 UART:
603,481 UART: [state] CFI Enabled
618,850 UART: [state] LifecycleState = Unprovisioned
621,225 UART: [state] DebugLocked = No
622,777 UART: [state] WD Timer not started. Device not locked for debugging
627,339 UART: [kat] SHA2-256
817,211 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,023 UART: [kat] ++
828,500 UART: [kat] sha1
840,228 UART: [kat] SHA2-256
843,247 UART: [kat] SHA2-384
848,252 UART: [kat] SHA2-512-ACC
850,839 UART: [kat] ECC-384
3,293,620 UART: [kat] HMAC-384Kdf
3,308,057 UART: [kat] LMS
3,839,842 UART: [kat] --
3,843,618 UART: [cold-reset] ++
3,844,669 UART: [fht] FHT @ 0x50003400
3,856,082 UART: [idev] ++
3,856,726 UART: [idev] CDI.KEYID = 6
3,857,763 UART: [idev] SUBJECT.KEYID = 7
3,858,867 UART: [idev] UDS.KEYID = 0
3,859,813 ready_for_fw is high
3,860,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,988 UART: [idev] Erasing UDS.KEYID = 0
6,335,173 UART: [idev] Sha1 KeyId Algorithm
6,357,492 UART: [idev] --
6,362,517 UART: [ldev] ++
6,363,199 UART: [ldev] CDI.KEYID = 6
6,364,120 UART: [ldev] SUBJECT.KEYID = 5
6,365,280 UART: [ldev] AUTHORITY.KEYID = 7
6,366,514 UART: [ldev] FE.KEYID = 1
6,377,224 UART: [ldev] Erasing FE.KEYID = 1
8,858,158 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,124 UART: [ldev] --
10,650,390 UART: [fwproc] Wait for Commands...
10,652,348 UART: [fwproc] Recv command 0x46574c44
10,654,668 UART: [fwproc] Recv'd Img size: 118548 bytes
14,163,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,310 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,927,264 >>> mbox cmd response: success
14,932,030 UART: [afmc] ++
14,932,750 UART: [afmc] CDI.KEYID = 6
14,933,898 UART: [afmc] SUBJECT.KEYID = 7
14,935,429 UART: [afmc] AUTHORITY.KEYID = 5
17,434,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,479 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,661 UART: [afmc] --
19,229,349 UART: [cold-reset] --
19,235,596 UART: [state] Locking Datavault
19,240,537 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,697 UART: [state] Locking ICCM
19,245,187 UART: [exit] Launching FMC @ 0x40000130
19,253,879 UART:
19,254,160 UART: Running Caliptra FMC ...
19,255,271 UART:
19,255,434 UART: [state] CFI Enabled
19,263,433 UART: [fht] FMC Alias Private Key: 7
21,029,549 UART: [art] Extend RT PCRs Done
21,030,781 UART: [art] Lock RT PCRs Done
21,032,519 UART: [art] Populate DV Done
21,037,936 UART: [fht] FMC Alias Private Key: 7
21,039,436 UART: [art] Derive CDI
21,040,226 UART: [art] Store in slot 0x4
21,083,260 UART: [art] Derive Key Pair
21,084,266 UART: [art] Store priv key in slot 0x5
23,510,916 UART: [art] Derive Key Pair - Done
23,523,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,611 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,124 UART: [art] PUB.X = D114DBFEDD950A7BFC1F81676453A8AFDA87C103A130367262DEAB7FD36AB80EC5C17F4FE91EA4552F195F996B0A9F90
25,239,395 UART: [art] PUB.Y = B45FE37FCBE021131233281CA40D70DA40F1BE27FA1277D6D295BCD06ABC1822437B6F27F1315E6ABF121A90AA19438A
25,246,654 UART: [art] SIG.R = 0DDD9FD36632BC1C831D58C8EB7E531CCF1A6A51198F8264DF7D1F02F8D4F230779B9568B6E70BC9B2CE95EB01A5A668
25,254,110 UART: [art] SIG.S = 93DECAA45092201535C3AA4EA089BCA941779B8A757BD5C334F0547A42AFFFE0D81C544B5335C0B13F219DD0304B9FE7
26,232,781 UART: Caliptra RT
26,233,497 UART: [state] CFI Enabled
26,366,390 UART: [rt] RT listening for mailbox commands...
26,368,792 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,399,657 UART: [rt]cmd =0x44504543, len=92
32,410,081 >>> mbox cmd response data (6284 bytes)
32,439,398 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,469,225 UART: [rt]cmd =0x43455252, len=4
32,480,795 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,753,532 ready_for_fw is high
3,754,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,658 >>> mbox cmd response: success
19,299,304 UART:
19,299,687 UART: Running Caliptra FMC ...
19,300,905 UART:
19,301,076 UART: [state] CFI Enabled
19,309,248 UART: [fht] FMC Alias Private Key: 7
21,075,843 UART: [art] Extend RT PCRs Done
21,077,069 UART: [art] Lock RT PCRs Done
21,078,817 UART: [art] Populate DV Done
21,084,041 UART: [fht] FMC Alias Private Key: 7
21,085,699 UART: [art] Derive CDI
21,086,521 UART: [art] Store in slot 0x4
21,129,014 UART: [art] Derive Key Pair
21,130,034 UART: [art] Store priv key in slot 0x5
23,556,468 UART: [art] Derive Key Pair - Done
23,569,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,242 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,745 UART: [art] PUB.X = A9F8218C93F3209C0843E99C46E24D841EE466CF142108A91D53ED8362223118A93276F11FFD708FDAD2C622966F73B2
25,284,968 UART: [art] PUB.Y = E7A1D5B4F0B737A1484B1E9653CD48DC25B56242B7DB3BEAFBEB700BA999C682FF6880B32B1C346914F5822816AAA587
25,292,186 UART: [art] SIG.R = 419F9886371F5368338157FAD199AF00A421D3BFD101319770BB5D2C4CA6D7BA5533A4C59C56AE559678D5773CD4A6E6
25,299,593 UART: [art] SIG.S = 5EAA712AF5FBEFC63F676EE333A9725E3FD2DBFEB0FF7A108CE42AB57C70BBC849AFF0418EF14CF4DAE372E8D922B36E
26,278,485 UART: Caliptra RT
26,279,197 UART: [state] CFI Enabled
26,412,138 UART: [rt] RT listening for mailbox commands...
26,414,562 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,445,291 UART: [rt]cmd =0x44504543, len=92
32,456,205 >>> mbox cmd response data (6284 bytes)
32,485,513 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,515,498 UART: [rt]cmd =0x43455252, len=4
32,526,973 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,496 UART: [kat] LMS
1,475,692 UART: [kat] --
1,476,687 UART: [cold-reset] ++
1,477,123 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 ready_for_fw is high
1,481,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,908 UART: [idev] Erasing UDS.KEYID = 0
1,505,548 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,154 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,917 UART: [ldev] Erasing FE.KEYID = 1
1,547,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,998 UART: [ldev] --
1,586,455 UART: [fwproc] Waiting for Commands...
1,587,324 UART: [fwproc] Received command 0x46574c44
1,588,115 UART: [fwproc] Received Image of size 118548 bytes
2,931,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,213 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,724 >>> mbox cmd response: success
3,131,912 UART: [afmc] ++
3,132,080 UART: [afmc] CDI.KEYID = 6
3,132,442 UART: [afmc] SUBJECT.KEYID = 7
3,132,867 UART: [afmc] AUTHORITY.KEYID = 5
3,167,912 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,828 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,420 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,103 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,961 UART: [afmc] --
3,210,875 UART: [cold-reset] --
3,211,647 UART: [state] Locking Datavault
3,212,718 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,322 UART: [state] Locking ICCM
3,213,870 UART: [exit] Launching FMC @ 0x40000130
3,219,200 UART:
3,219,216 UART: Running Caliptra FMC ...
3,219,624 UART:
3,219,678 UART: [state] CFI Enabled
3,230,132 UART: [fht] FMC Alias Private Key: 7
3,349,682 UART: [art] Extend RT PCRs Done
3,350,110 UART: [art] Lock RT PCRs Done
3,351,544 UART: [art] Populate DV Done
3,359,785 UART: [fht] FMC Alias Private Key: 7
3,360,831 UART: [art] Derive CDI
3,361,111 UART: [art] Store in slot 0x4
3,446,699 UART: [art] Derive Key Pair
3,447,059 UART: [art] Store priv key in slot 0x5
3,460,312 UART: [art] Derive Key Pair - Done
3,474,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,408 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,173 UART: [art] PUB.X = ABEC553F5C1DEFFA4D9AB801C0FEE76370685279F46FDB561DE1DAAFBE9F1F6FDCBEA2CD70048A63448B4E3A0E095431
3,497,959 UART: [art] PUB.Y = 30F8E037FE2C98B9C4707348FE18FB775678A83720DDB0E34B64A69FEB3F8973E827989900A02B2016D0E264B90D5909
3,504,877 UART: [art] SIG.R = 5FCDF6792A48BF160C9B848E57B310DD5572FFF2ACBECEACEF95B068BA212C175F8F68E9F764BD02734A5414DA68BB26
3,511,661 UART: [art] SIG.S = 352FCC14F33F2683B3A6AD9B4BEBAF6B3FFAB651C4E09CC94C96070F0B67FCBECFAFC275627A3FAAF8BFE9CF74E82AA9
3,535,426 UART: Caliptra RT
3,535,677 UART: [state] CFI Enabled
3,656,550 UART: [rt] RT listening for mailbox commands...
3,657,220 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,670 UART: [rt]cmd =0x44504543, len=92
3,905,156 >>> mbox cmd response data (6284 bytes)
3,905,157 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,764 UART: [rt]cmd =0x43455252, len=4
3,945,549 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,379 ready_for_fw is high
1,363,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,278 >>> mbox cmd response: success
3,044,409 UART:
3,044,425 UART: Running Caliptra FMC ...
3,044,833 UART:
3,044,887 UART: [state] CFI Enabled
3,055,721 UART: [fht] FMC Alias Private Key: 7
3,174,247 UART: [art] Extend RT PCRs Done
3,174,675 UART: [art] Lock RT PCRs Done
3,176,063 UART: [art] Populate DV Done
3,184,376 UART: [fht] FMC Alias Private Key: 7
3,185,472 UART: [art] Derive CDI
3,185,752 UART: [art] Store in slot 0x4
3,271,788 UART: [art] Derive Key Pair
3,272,148 UART: [art] Store priv key in slot 0x5
3,285,017 UART: [art] Derive Key Pair - Done
3,299,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,262 UART: [art] PUB.X = 5883673F762C05A16594F65C189A856F0F985C0E79DA372A22BDBF2B574F4B38F5DF5820D6ABBFA0A41F255A90214D18
3,323,027 UART: [art] PUB.Y = 3549CFB1D793FFB86710ED3290ACBBEE387C5C2B23604A95482B668CCE69662B6C5C22128468FE4E767A0A0BEF32CA8D
3,329,983 UART: [art] SIG.R = 4ADD170EFE4832BC11EEDA16785A457C24025E71F52FA5CD49F27A349DE73A79E788D010EB5A5E3A6479A675B7BA72DD
3,336,761 UART: [art] SIG.S = BCB36EF35BBDAA0CEB93615E0314FCFF4A6E5540CE60482C15DFF4AB1EA683D77C6919936FA4FADE160EB79EF89F6A5D
3,360,462 UART: Caliptra RT
3,360,713 UART: [state] CFI Enabled
3,479,931 UART: [rt] RT listening for mailbox commands...
3,480,601 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,085 UART: [rt]cmd =0x44504543, len=92
3,728,059 >>> mbox cmd response data (6284 bytes)
3,728,060 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,091 UART: [rt]cmd =0x43455252, len=4
3,768,084 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,939 UART: [state] LifecycleState = Unprovisioned
86,594 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,752 UART: [kat] SHA2-256
882,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,798 UART: [kat] ++
886,950 UART: [kat] sha1
891,204 UART: [kat] SHA2-256
893,142 UART: [kat] SHA2-384
895,943 UART: [kat] SHA2-512-ACC
897,844 UART: [kat] ECC-384
903,453 UART: [kat] HMAC-384Kdf
908,083 UART: [kat] LMS
1,476,279 UART: [kat] --
1,477,274 UART: [cold-reset] ++
1,477,766 UART: [fht] Storing FHT @ 0x50003400
1,480,597 UART: [idev] ++
1,480,765 UART: [idev] CDI.KEYID = 6
1,481,125 UART: [idev] SUBJECT.KEYID = 7
1,481,549 UART: [idev] UDS.KEYID = 0
1,481,894 ready_for_fw is high
1,481,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,379 UART: [idev] Erasing UDS.KEYID = 0
1,505,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,297 UART: [idev] --
1,515,144 UART: [ldev] ++
1,515,312 UART: [ldev] CDI.KEYID = 6
1,515,675 UART: [ldev] SUBJECT.KEYID = 5
1,516,101 UART: [ldev] AUTHORITY.KEYID = 7
1,516,564 UART: [ldev] FE.KEYID = 1
1,521,758 UART: [ldev] Erasing FE.KEYID = 1
1,547,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,579 UART: [ldev] --
1,586,882 UART: [fwproc] Waiting for Commands...
1,587,641 UART: [fwproc] Received command 0x46574c44
1,588,432 UART: [fwproc] Received Image of size 118548 bytes
2,933,314 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,052 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,677 >>> mbox cmd response: success
3,132,725 UART: [afmc] ++
3,132,893 UART: [afmc] CDI.KEYID = 6
3,133,255 UART: [afmc] SUBJECT.KEYID = 7
3,133,680 UART: [afmc] AUTHORITY.KEYID = 5
3,168,971 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,375 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,864 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,747 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,430 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,086 UART: [afmc] --
3,212,132 UART: [cold-reset] --
3,212,780 UART: [state] Locking Datavault
3,213,715 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,319 UART: [state] Locking ICCM
3,214,925 UART: [exit] Launching FMC @ 0x40000130
3,220,255 UART:
3,220,271 UART: Running Caliptra FMC ...
3,220,679 UART:
3,220,822 UART: [state] CFI Enabled
3,231,660 UART: [fht] FMC Alias Private Key: 7
3,349,996 UART: [art] Extend RT PCRs Done
3,350,424 UART: [art] Lock RT PCRs Done
3,351,746 UART: [art] Populate DV Done
3,359,839 UART: [fht] FMC Alias Private Key: 7
3,360,909 UART: [art] Derive CDI
3,361,189 UART: [art] Store in slot 0x4
3,446,945 UART: [art] Derive Key Pair
3,447,305 UART: [art] Store priv key in slot 0x5
3,460,152 UART: [art] Derive Key Pair - Done
3,475,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,474 UART: [art] PUB.X = 742D8C6C792D197F4009F260548CE7D0F618C8DEBAA44BA0315B546DDD4B3A97659BB7DA2E49C0DCF5C7032A70A35E68
3,498,250 UART: [art] PUB.Y = 535718B71FA57D66A0A9BB82F038E542E5A27065DB0BB927124F432A7142A9DC7F464493966868B9C2DDFD02FD4556FE
3,505,196 UART: [art] SIG.R = 7238DA0311851943B8D209575A5C5A776A0FE9302862790FB9409B40E0A40054C121ADF29279875D59520BB752C1AA2D
3,511,919 UART: [art] SIG.S = 608BE31EE9F0023FB98AC3D29BC42D19DD83ED8852F2633E6D7C8C4F162B9BB58B62E6E6A8C3AE7312291023BBCCD051
3,535,488 UART: Caliptra RT
3,535,831 UART: [state] CFI Enabled
3,655,712 UART: [rt] RT listening for mailbox commands...
3,656,382 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,706 UART: [rt]cmd =0x44504543, len=92
3,903,215 >>> mbox cmd response data (6284 bytes)
3,903,216 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,635 UART: [rt]cmd =0x43455252, len=4
3,943,604 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,610 ready_for_fw is high
1,362,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,493 >>> mbox cmd response: success
3,042,436 UART:
3,042,452 UART: Running Caliptra FMC ...
3,042,860 UART:
3,043,003 UART: [state] CFI Enabled
3,053,539 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,183 UART: [art] Populate DV Done
3,182,472 UART: [fht] FMC Alias Private Key: 7
3,183,404 UART: [art] Derive CDI
3,183,684 UART: [art] Store in slot 0x4
3,269,342 UART: [art] Derive Key Pair
3,269,702 UART: [art] Store priv key in slot 0x5
3,282,893 UART: [art] Derive Key Pair - Done
3,297,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,847 UART: [art] PUB.X = 3C27749BFACAA29F518E45565C311F7BBDC95F33C723A83278ABF691C4E0A9EBC95B61597EDAD16502A5BFEA758A29DE
3,320,632 UART: [art] PUB.Y = 78FB40367D66FBDD39DFC5E389595C430A6558E850483CAD994DAEF103C5A28B1C51C7F72120198197A017D4DF7707FB
3,327,577 UART: [art] SIG.R = 028E92394969A09455944411FC3B925DA869AF130C3E0D621E7FE912A234A332AF8FE42731948D07582F8874F4EC6334
3,334,325 UART: [art] SIG.S = 8F9950966AAC1BDE6012E4A44F5EDDE71553B3EC39178CDE064FB66E1C4CC4B146409BAC3214B9C369C5F3FBBF38482E
3,357,900 UART: Caliptra RT
3,358,243 UART: [state] CFI Enabled
3,478,823 UART: [rt] RT listening for mailbox commands...
3,479,493 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,005 UART: [rt]cmd =0x44504543, len=92
3,726,333 >>> mbox cmd response data (6284 bytes)
3,726,334 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,517 UART: [rt]cmd =0x43455252, len=4
3,766,430 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
890,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,038 UART: [kat] ++
895,190 UART: [kat] sha1
899,268 UART: [kat] SHA2-256
901,208 UART: [kat] SHA2-384
904,007 UART: [kat] SHA2-512-ACC
905,908 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,746 UART: [cold-reset] ++
1,170,264 UART: [fht] FHT @ 0x50003400
1,172,908 UART: [idev] ++
1,173,076 UART: [idev] CDI.KEYID = 6
1,173,437 UART: [idev] SUBJECT.KEYID = 7
1,173,862 UART: [idev] UDS.KEYID = 0
1,174,208 ready_for_fw is high
1,174,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,667 UART: [idev] Erasing UDS.KEYID = 0
1,198,467 UART: [idev] Sha1 KeyId Algorithm
1,207,245 UART: [idev] --
1,208,260 UART: [ldev] ++
1,208,428 UART: [ldev] CDI.KEYID = 6
1,208,792 UART: [ldev] SUBJECT.KEYID = 5
1,209,219 UART: [ldev] AUTHORITY.KEYID = 7
1,209,682 UART: [ldev] FE.KEYID = 1
1,214,810 UART: [ldev] Erasing FE.KEYID = 1
1,241,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,048 UART: [ldev] --
1,280,453 UART: [fwproc] Wait for Commands...
1,281,186 UART: [fwproc] Recv command 0x46574c44
1,281,919 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,421 >>> mbox cmd response: success
2,828,479 UART: [afmc] ++
2,828,647 UART: [afmc] CDI.KEYID = 6
2,829,010 UART: [afmc] SUBJECT.KEYID = 7
2,829,436 UART: [afmc] AUTHORITY.KEYID = 5
2,864,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,775 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,485 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,067 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,740 UART: [afmc] --
2,907,625 UART: [cold-reset] --
2,908,385 UART: [state] Locking Datavault
2,909,502 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,106 UART: [state] Locking ICCM
2,910,652 UART: [exit] Launching FMC @ 0x40000130
2,915,982 UART:
2,915,998 UART: Running Caliptra FMC ...
2,916,406 UART:
2,916,460 UART: [state] CFI Enabled
2,927,062 UART: [fht] FMC Alias Private Key: 7
3,046,224 UART: [art] Extend RT PCRs Done
3,046,652 UART: [art] Lock RT PCRs Done
3,048,160 UART: [art] Populate DV Done
3,056,221 UART: [fht] FMC Alias Private Key: 7
3,057,213 UART: [art] Derive CDI
3,057,493 UART: [art] Store in slot 0x4
3,143,080 UART: [art] Derive Key Pair
3,143,440 UART: [art] Store priv key in slot 0x5
3,156,292 UART: [art] Derive Key Pair - Done
3,170,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,804 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,569 UART: [art] PUB.X = BB83AB0C00D49C04509A4502FCBCA5157AFB9BE6AFBCF8B7D42654B0022F18177B7FF0938C3EC84261DD08B7C53A0CE1
3,194,317 UART: [art] PUB.Y = 94A1302742B2617F2A5ACC24DD1D7D8BE31FC71530755EE15C54160EB3F1D629D2FFCB4E098AB6D5CC0839EDCDFA5862
3,201,274 UART: [art] SIG.R = EB18A43364528475862D953D2DE1D23E380F9C133CAC0C9951C62F3BF66382553E5F93403550F0114FF37EEE759AB498
3,208,034 UART: [art] SIG.S = 03DACE50709814CCA14FD39AC81D8087722E9E6ED1B88E66C27BEBE668C896C1EF7586608430E508FAE144A5CB1DF7B3
3,231,802 UART: Caliptra RT
3,232,053 UART: [state] CFI Enabled
3,351,782 UART: [rt] RT listening for mailbox commands...
3,352,452 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,854 UART: [rt]cmd =0x44504543, len=92
3,600,208 >>> mbox cmd response data (6284 bytes)
3,600,209 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,322 UART: [rt]cmd =0x43455252, len=4
3,640,281 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,080 ready_for_fw is high
1,059,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,566 >>> mbox cmd response: success
2,740,327 UART:
2,740,343 UART: Running Caliptra FMC ...
2,740,751 UART:
2,740,805 UART: [state] CFI Enabled
2,751,777 UART: [fht] FMC Alias Private Key: 7
2,870,603 UART: [art] Extend RT PCRs Done
2,871,031 UART: [art] Lock RT PCRs Done
2,872,659 UART: [art] Populate DV Done
2,881,120 UART: [fht] FMC Alias Private Key: 7
2,882,072 UART: [art] Derive CDI
2,882,352 UART: [art] Store in slot 0x4
2,968,103 UART: [art] Derive Key Pair
2,968,463 UART: [art] Store priv key in slot 0x5
2,981,303 UART: [art] Derive Key Pair - Done
2,996,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,831 UART: [art] PUB.X = 25C75DD901A079EB9E81C44ECA12E3B709428FD5D1DA547168AAD19D09610DC65F6732ACB1F53056608AC095D7CFA2A6
3,019,599 UART: [art] PUB.Y = E8FE10052619E12955E28FA7684D852943B21657AD96AA906E0220C7A7630ED31D276BC70531EDE90AEAE7980EA620AA
3,026,533 UART: [art] SIG.R = F7A671DCDDE76BF8FED4828915B73097CCA9E4044A832DC75397E37406A70469D723E034C859997B3C62386FA02A88B7
3,033,294 UART: [art] SIG.S = 3D92A5DD2D1D6E47EFC4E218ABE514DF3E7E29BC48C96BC3594E2AC029C400E3EEF357FFAB43AD00C5D7FB39D138ACD4
3,057,118 UART: Caliptra RT
3,057,369 UART: [state] CFI Enabled
3,176,666 UART: [rt] RT listening for mailbox commands...
3,177,336 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,664 UART: [rt]cmd =0x44504543, len=92
3,425,423 >>> mbox cmd response data (6284 bytes)
3,425,424 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,925 UART: [rt]cmd =0x43455252, len=4
3,465,790 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,891 UART: [kat] SHA2-256
891,441 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,545 UART: [kat] ++
895,697 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,484 UART: [kat] HMAC-384Kdf
921,310 UART: [kat] LMS
1,169,622 UART: [kat] --
1,170,687 UART: [cold-reset] ++
1,171,161 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,175,171 ready_for_fw is high
1,175,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,176 UART: [idev] Erasing UDS.KEYID = 0
1,200,408 UART: [idev] Sha1 KeyId Algorithm
1,209,278 UART: [idev] --
1,210,309 UART: [ldev] ++
1,210,477 UART: [ldev] CDI.KEYID = 6
1,210,841 UART: [ldev] SUBJECT.KEYID = 5
1,211,268 UART: [ldev] AUTHORITY.KEYID = 7
1,211,731 UART: [ldev] FE.KEYID = 1
1,216,939 UART: [ldev] Erasing FE.KEYID = 1
1,243,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,995 UART: [ldev] --
1,283,438 UART: [fwproc] Wait for Commands...
1,284,123 UART: [fwproc] Recv command 0x46574c44
1,284,856 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,304 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,764 >>> mbox cmd response: success
2,829,898 UART: [afmc] ++
2,830,066 UART: [afmc] CDI.KEYID = 6
2,830,429 UART: [afmc] SUBJECT.KEYID = 7
2,830,855 UART: [afmc] AUTHORITY.KEYID = 5
2,867,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,981 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,682 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,493 UART: [afmc] --
2,910,510 UART: [cold-reset] --
2,911,462 UART: [state] Locking Datavault
2,912,715 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,319 UART: [state] Locking ICCM
2,913,885 UART: [exit] Launching FMC @ 0x40000130
2,919,215 UART:
2,919,231 UART: Running Caliptra FMC ...
2,919,639 UART:
2,919,782 UART: [state] CFI Enabled
2,930,560 UART: [fht] FMC Alias Private Key: 7
3,049,264 UART: [art] Extend RT PCRs Done
3,049,692 UART: [art] Lock RT PCRs Done
3,051,426 UART: [art] Populate DV Done
3,059,703 UART: [fht] FMC Alias Private Key: 7
3,060,709 UART: [art] Derive CDI
3,060,989 UART: [art] Store in slot 0x4
3,146,922 UART: [art] Derive Key Pair
3,147,282 UART: [art] Store priv key in slot 0x5
3,160,818 UART: [art] Derive Key Pair - Done
3,175,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,639 UART: [art] PUB.X = 089AC42DB1F7111003499C9AD6BA56409EEEDF9213EE5047E15329796CCD246E7216E1EB423E7FBDB380DEC7B9007461
3,198,387 UART: [art] PUB.Y = 2824B9554CEBCA5FDEB11DE1BF5C64D81C92801599B1933B0F6722EF77812C433C20D7A3E91DF5AA9D1C0D2B6CB18D9C
3,205,347 UART: [art] SIG.R = C70B7CEFA7E78F0FDFE873A168A8CECB01D0424112E919AE1332989BF2F00FE56324258A4A50DB96A5F81275EABF26C7
3,212,119 UART: [art] SIG.S = D6D76436E83D5CC603187C5FC89B573E8C1059DC1B944C69EAB13A8A4DE14CBFB7B261AD9B1251C0F2E9F20F2B934A99
3,235,437 UART: Caliptra RT
3,235,780 UART: [state] CFI Enabled
3,354,358 UART: [rt] RT listening for mailbox commands...
3,355,028 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,576 UART: [rt]cmd =0x44504543, len=92
3,602,529 >>> mbox cmd response data (6284 bytes)
3,602,530 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,731 UART: [rt]cmd =0x43455252, len=4
3,642,441 >>> mbox cmd response data (784 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,689 ready_for_fw is high
1,059,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,375 >>> mbox cmd response: success
2,741,004 UART:
2,741,020 UART: Running Caliptra FMC ...
2,741,428 UART:
2,741,571 UART: [state] CFI Enabled
2,752,061 UART: [fht] FMC Alias Private Key: 7
2,871,401 UART: [art] Extend RT PCRs Done
2,871,829 UART: [art] Lock RT PCRs Done
2,873,075 UART: [art] Populate DV Done
2,881,250 UART: [fht] FMC Alias Private Key: 7
2,882,428 UART: [art] Derive CDI
2,882,708 UART: [art] Store in slot 0x4
2,968,453 UART: [art] Derive Key Pair
2,968,813 UART: [art] Store priv key in slot 0x5
2,982,241 UART: [art] Derive Key Pair - Done
2,997,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,315 UART: [art] PUB.X = 49D7E92A6372F2030287F71D6CBA920916EFDCFD1FFB919344A4043505D3392A83C952F619C8FC51A67EB06B8906EB1E
3,020,071 UART: [art] PUB.Y = 487CADEBA012DC5607C5CFC31CB405EA778DA737DD53BD1BC80C49EEEE92F4840A7F62CC575ABA7697B770972070F822
3,027,025 UART: [art] SIG.R = 19E7E1E7259B2FCD060F5C79E997A9402687EA81232CA3F5733B6BB011ABF55464D37805FB814D812435E6D25F41396A
3,033,784 UART: [art] SIG.S = 8C23ED861531105B9E1B174033970CE2F1102F5DADF3AC44A27BDFD4D161CFE342B12F58BFA71A42C3793397C5EBED4B
3,057,161 UART: Caliptra RT
3,057,504 UART: [state] CFI Enabled
3,177,221 UART: [rt] RT listening for mailbox commands...
3,177,891 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,185 UART: [rt]cmd =0x44504543, len=92
3,425,833 >>> mbox cmd response data (6284 bytes)
3,425,834 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,223 UART: [rt]cmd =0x43455252, len=4
3,466,054 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,371 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,694 UART: [kat] SHA2-512-ACC
908,595 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,574 UART: [kat] LMS
1,170,902 UART: [kat] --
1,171,417 UART: [cold-reset] ++
1,171,983 UART: [fht] FHT @ 0x50003400
1,174,518 UART: [idev] ++
1,174,686 UART: [idev] CDI.KEYID = 6
1,175,046 UART: [idev] SUBJECT.KEYID = 7
1,175,470 UART: [idev] UDS.KEYID = 0
1,175,815 ready_for_fw is high
1,175,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,481 UART: [idev] Sha1 KeyId Algorithm
1,207,783 UART: [idev] --
1,208,927 UART: [ldev] ++
1,209,095 UART: [ldev] CDI.KEYID = 6
1,209,458 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,705 UART: [ldev] Erasing FE.KEYID = 1
1,241,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,645 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,536 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,453 UART: [ldev] --
1,280,842 UART: [fwproc] Wait for Commands...
1,281,560 UART: [fwproc] Recv command 0x46574c44
1,282,288 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,437 >>> mbox cmd response: success
2,826,501 UART: [afmc] ++
2,826,669 UART: [afmc] CDI.KEYID = 6
2,827,031 UART: [afmc] SUBJECT.KEYID = 7
2,827,456 UART: [afmc] AUTHORITY.KEYID = 5
2,862,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,976 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,685 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,568 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,269 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,027 UART: [afmc] --
2,905,127 UART: [cold-reset] --
2,905,853 UART: [state] Locking Datavault
2,907,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,740 UART: [state] Locking ICCM
2,908,258 UART: [exit] Launching FMC @ 0x40000130
2,913,588 UART:
2,913,604 UART: Running Caliptra FMC ...
2,914,012 UART:
2,914,066 UART: [state] CFI Enabled
2,924,224 UART: [fht] FMC Alias Private Key: 7
3,042,948 UART: [art] Extend RT PCRs Done
3,043,376 UART: [art] Lock RT PCRs Done
3,044,992 UART: [art] Populate DV Done
3,053,209 UART: [fht] FMC Alias Private Key: 7
3,054,157 UART: [art] Derive CDI
3,054,437 UART: [art] Store in slot 0x4
3,140,344 UART: [art] Derive Key Pair
3,140,704 UART: [art] Store priv key in slot 0x5
3,154,622 UART: [art] Derive Key Pair - Done
3,169,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,271 UART: [art] PUB.X = 482D23D7FBE8988B38C681E3C2944474FBC570AF691D26ADDBA11A9654B46CC148D663678B4736559788C059EC07C665
3,193,036 UART: [art] PUB.Y = 272583756E996C81FB6E4ABA4A079A6EB2A48556AC7288B9B6DB582CD7607E8D6B6B797E37AA274BD7A8F3C75A77C62E
3,199,993 UART: [art] SIG.R = 4745CCC20C6549B8B9244ADCEA92969FC5DD39001B849578CC545EF1143B2B067A85E0F2DAD08119FCC5D3B816DFB4C4
3,206,747 UART: [art] SIG.S = F182E11DB58DDEAB359FEC095426EB3422AEB6081357D9B2C6820C8DC49C890460B361719FC07E1EBB893FD1931E9B28
3,230,537 UART: Caliptra RT
3,230,788 UART: [state] CFI Enabled
3,349,725 UART: [rt] RT listening for mailbox commands...
3,350,395 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,759 UART: [rt]cmd =0x44504543, len=92
3,598,232 >>> mbox cmd response data (6284 bytes)
3,598,233 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,576 UART: [rt]cmd =0x43455252, len=4
3,638,661 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,675 ready_for_fw is high
1,060,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,736 >>> mbox cmd response: success
2,741,077 UART:
2,741,093 UART: Running Caliptra FMC ...
2,741,501 UART:
2,741,555 UART: [state] CFI Enabled
2,751,859 UART: [fht] FMC Alias Private Key: 7
2,871,379 UART: [art] Extend RT PCRs Done
2,871,807 UART: [art] Lock RT PCRs Done
2,873,081 UART: [art] Populate DV Done
2,881,440 UART: [fht] FMC Alias Private Key: 7
2,882,606 UART: [art] Derive CDI
2,882,886 UART: [art] Store in slot 0x4
2,968,567 UART: [art] Derive Key Pair
2,968,927 UART: [art] Store priv key in slot 0x5
2,982,343 UART: [art] Derive Key Pair - Done
2,997,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,434 UART: [art] PUB.X = 5F5ED5FEE8A51EDA3B9590B26CE25471AD3FA1670992B0E75191F2437DD6CC744915F6C2D28B6FC8CCA7182B57B64091
3,020,211 UART: [art] PUB.Y = 2D4C1451F040B50171F05024EA16FC69505A00FBF1482C05AF903A0882D7929548BD6375386D02FD687AFB741C4EE265
3,027,123 UART: [art] SIG.R = 5034C5E0F5EDD5223FF4277AAB14427003BFC8E307D313C3F697E30D12EA63B6A4FC883413093772CB4984ABBFCF9D45
3,033,889 UART: [art] SIG.S = 81E69A6E2AF77C735773F83A57E9C0126149C8F7491AC59CCE96E7BCEFE23B02607BA517953323CE49E295B4B748BC1D
3,057,576 UART: Caliptra RT
3,057,827 UART: [state] CFI Enabled
3,178,046 UART: [rt] RT listening for mailbox commands...
3,178,716 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,316 UART: [rt]cmd =0x44504543, len=92
3,426,210 >>> mbox cmd response data (6284 bytes)
3,426,211 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,498 UART: [rt]cmd =0x43455252, len=4
3,466,573 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
902,126 UART: [kat] SHA2-256
904,066 UART: [kat] SHA2-384
906,703 UART: [kat] SHA2-512-ACC
908,604 UART: [kat] ECC-384
918,523 UART: [kat] HMAC-384Kdf
923,381 UART: [kat] LMS
1,171,709 UART: [kat] --
1,172,594 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,473 UART: [idev] ++
1,175,641 UART: [idev] CDI.KEYID = 6
1,176,001 UART: [idev] SUBJECT.KEYID = 7
1,176,425 UART: [idev] UDS.KEYID = 0
1,176,770 ready_for_fw is high
1,176,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,871 UART: [idev] Erasing UDS.KEYID = 0
1,202,472 UART: [idev] Sha1 KeyId Algorithm
1,210,852 UART: [idev] --
1,212,010 UART: [ldev] ++
1,212,178 UART: [ldev] CDI.KEYID = 6
1,212,541 UART: [ldev] SUBJECT.KEYID = 5
1,212,967 UART: [ldev] AUTHORITY.KEYID = 7
1,213,430 UART: [ldev] FE.KEYID = 1
1,218,978 UART: [ldev] Erasing FE.KEYID = 1
1,245,483 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,420 UART: [ldev] --
1,284,809 UART: [fwproc] Wait for Commands...
1,285,621 UART: [fwproc] Recv command 0x46574c44
1,286,349 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,414 >>> mbox cmd response: success
2,830,536 UART: [afmc] ++
2,830,704 UART: [afmc] CDI.KEYID = 6
2,831,066 UART: [afmc] SUBJECT.KEYID = 7
2,831,491 UART: [afmc] AUTHORITY.KEYID = 5
2,867,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,100 UART: [afmc] --
2,910,020 UART: [cold-reset] --
2,911,012 UART: [state] Locking Datavault
2,912,107 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,711 UART: [state] Locking ICCM
2,913,237 UART: [exit] Launching FMC @ 0x40000130
2,918,567 UART:
2,918,583 UART: Running Caliptra FMC ...
2,918,991 UART:
2,919,134 UART: [state] CFI Enabled
2,929,798 UART: [fht] FMC Alias Private Key: 7
3,048,214 UART: [art] Extend RT PCRs Done
3,048,642 UART: [art] Lock RT PCRs Done
3,050,250 UART: [art] Populate DV Done
3,058,317 UART: [fht] FMC Alias Private Key: 7
3,059,399 UART: [art] Derive CDI
3,059,679 UART: [art] Store in slot 0x4
3,145,632 UART: [art] Derive Key Pair
3,145,992 UART: [art] Store priv key in slot 0x5
3,159,168 UART: [art] Derive Key Pair - Done
3,173,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,866 UART: [art] PUB.X = B34B5CA7FCED1B2C8AC93722D671E69E1AB2CDF62E2820B49E6EA2E9DA85F6BAC9C343D6770E86FA1FF29E104D55C2C2
3,196,657 UART: [art] PUB.Y = 3F0FEB76D2B30913593F983EC418174B9C60D4B51FD482CCB5A18E68CA9A18D3A742CD4876CD8462655619EE4846E056
3,203,603 UART: [art] SIG.R = 77A85D0757791A69CC3134AD2D614DF6CF26DB8FF3D7F9A646EA6ACFD9EC328B71D0D03558E61944E50CA533526BB104
3,210,374 UART: [art] SIG.S = C9E373F72130F973CF86140D5461CA6818673394B3696D86019366828DF11ED3CBAAA9F49CB261821CB45208B8098EC0
3,234,402 UART: Caliptra RT
3,234,745 UART: [state] CFI Enabled
3,354,460 UART: [rt] RT listening for mailbox commands...
3,355,130 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,554 UART: [rt]cmd =0x44504543, len=92
3,602,649 >>> mbox cmd response data (6284 bytes)
3,602,650 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,953 UART: [rt]cmd =0x43455252, len=4
3,642,812 >>> mbox cmd response data (783 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,194 ready_for_fw is high
1,060,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,921 >>> mbox cmd response: success
2,742,578 UART:
2,742,594 UART: Running Caliptra FMC ...
2,743,002 UART:
2,743,145 UART: [state] CFI Enabled
2,753,669 UART: [fht] FMC Alias Private Key: 7
2,872,737 UART: [art] Extend RT PCRs Done
2,873,165 UART: [art] Lock RT PCRs Done
2,874,709 UART: [art] Populate DV Done
2,882,778 UART: [fht] FMC Alias Private Key: 7
2,883,736 UART: [art] Derive CDI
2,884,016 UART: [art] Store in slot 0x4
2,969,861 UART: [art] Derive Key Pair
2,970,221 UART: [art] Store priv key in slot 0x5
2,983,899 UART: [art] Derive Key Pair - Done
2,998,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,656 UART: [art] PUB.X = 3BEBEDDE937595A03B602BCC388D2BD7514FDFD9D025030AB088DEF224DDA3EDE1CCAA391070FF8538BED2705A78830C
3,021,439 UART: [art] PUB.Y = 08907D3DB971670D3C88BFDCE06D64D9DBFB2C9034E36B3397A5E4F231A5F4375A1D80908724B9B11399B3A6333CAD05
3,028,384 UART: [art] SIG.R = 5DDFB890B559BBCCECB766CBFBB23D9237BBA0BC5AAB7305B0819556FBFE035FABECC6408250E61CEF3C6FE2AC2FD5C3
3,035,184 UART: [art] SIG.S = 2A366D840F05F4E90B5FC440AEF3188FBC56B5D000823B255E620E8A3A9D6F3D77FE635DFAF7B24CB0F3DE759DA3D2E3
3,059,068 UART: Caliptra RT
3,059,411 UART: [state] CFI Enabled
3,179,715 UART: [rt] RT listening for mailbox commands...
3,180,385 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,801 UART: [rt]cmd =0x44504543, len=92
3,428,150 >>> mbox cmd response data (6284 bytes)
3,428,151 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,457,450 UART: [rt]cmd =0x43455252, len=4
3,468,351 >>> mbox cmd response data (782 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_csr ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,169 UART:
192,527 UART: Running Caliptra ROM ...
193,655 UART:
193,802 UART: [state] CFI Enabled
259,093 UART: [state] LifecycleState = Unprovisioned
261,072 UART: [state] DebugLocked = No
263,094 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,454 UART: [kat] SHA2-256
438,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,711 UART: [kat] ++
449,158 UART: [kat] sha1
460,313 UART: [kat] SHA2-256
463,034 UART: [kat] SHA2-384
469,407 UART: [kat] SHA2-512-ACC
471,760 UART: [kat] ECC-384
2,765,476 UART: [kat] HMAC-384Kdf
2,798,762 UART: [kat] LMS
3,989,053 UART: [kat] --
3,994,582 UART: [cold-reset] ++
3,995,949 UART: [fht] Storing FHT @ 0x50003400
4,007,363 UART: [idev] ++
4,008,003 UART: [idev] CDI.KEYID = 6
4,008,894 UART: [idev] SUBJECT.KEYID = 7
4,010,140 UART: [idev] UDS.KEYID = 0
4,011,103 ready_for_fw is high
4,011,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,347 UART: [idev] Erasing UDS.KEYID = 0
7,345,532 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,946 UART: [idev] --
7,372,424 UART: [ldev] ++
7,372,997 UART: [ldev] CDI.KEYID = 6
7,373,966 UART: [ldev] SUBJECT.KEYID = 5
7,375,128 UART: [ldev] AUTHORITY.KEYID = 7
7,376,420 UART: [ldev] FE.KEYID = 1
7,421,433 UART: [ldev] Erasing FE.KEYID = 1
10,753,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,816 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,350 UART: [ldev] --
13,114,406 UART: [fwproc] Waiting for Commands...
13,117,585 UART: [fwproc] Received command 0x46574c44
13,119,769 UART: [fwproc] Received Image of size 118548 bytes
17,225,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,568 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,372,745 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,700,489 >>> mbox cmd response: success
17,701,569 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,705,485 UART: [afmc] ++
17,706,094 UART: [afmc] CDI.KEYID = 6
17,707,007 UART: [afmc] SUBJECT.KEYID = 7
17,708,278 UART: [afmc] AUTHORITY.KEYID = 5
21,069,131 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,573 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,370,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,286 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,012 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,409 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,560 UART: [afmc] --
23,442,074 UART: [cold-reset] --
23,447,016 UART: [state] Locking Datavault
23,453,178 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,882 UART: [state] Locking ICCM
23,456,814 UART: [exit] Launching FMC @ 0x40000130
23,465,207 UART:
23,465,460 UART: Running Caliptra FMC ...
23,466,558 UART:
23,466,717 UART: [state] CFI Enabled
23,528,618 UART: [fht] FMC Alias Private Key: 7
25,869,206 UART: [art] Extend RT PCRs Done
25,870,430 UART: [art] Lock RT PCRs Done
25,871,810 UART: [art] Populate DV Done
25,876,901 UART: [fht] FMC Alias Private Key: 7
25,878,546 UART: [art] Derive CDI
25,879,357 UART: [art] Store in slot 0x4
25,936,163 UART: [art] Derive Key Pair
25,937,203 UART: [art] Store priv key in slot 0x5
29,229,716 UART: [art] Derive Key Pair - Done
29,242,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,532,042 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,555 UART: [art] PUB.X = AF4555F932C506D5A3A80F18702FE05EAC03EC4E9C58D4880D74FC734B4B8586AC0C363EA66A6190B133B5179A378F81
31,540,813 UART: [art] PUB.Y = 722D3F06E72FB875B280E7DCC889436531E23D1AB807C023A148DAD0D134DB42963E11987C722324A4EA05C3249DAB22
31,548,096 UART: [art] SIG.R = 12C127AF33B3CEC007233EF57A3608EB81C7A8BC70317BBD3333134B665CEDE837C82F32E5CA92E7BD0C9FB0408EC913
31,555,481 UART: [art] SIG.S = 3FB18099DAB3A19009DA1AA69A81876546EE6CB179259CCDE15CA3AB80EAD6F03931F5B9F23F6CEA35138050BE4F605A
32,860,629 UART: Caliptra RT
32,861,343 UART: [state] CFI Enabled
33,036,503 UART: [rt] RT listening for mailbox commands...
33,068,583 UART: [rt]cmd =0x44504543, len=92
38,819,436 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,783,846 ready_for_fw is high
3,784,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,937,728 >>> mbox cmd response: success
17,939,391 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,629,008 UART:
23,629,399 UART: Running Caliptra FMC ...
23,630,505 UART:
23,630,658 UART: [state] CFI Enabled
23,698,900 UART: [fht] FMC Alias Private Key: 7
26,039,072 UART: [art] Extend RT PCRs Done
26,040,312 UART: [art] Lock RT PCRs Done
26,041,892 UART: [art] Populate DV Done
26,047,158 UART: [fht] FMC Alias Private Key: 7
26,048,760 UART: [art] Derive CDI
26,049,580 UART: [art] Store in slot 0x4
26,107,252 UART: [art] Derive Key Pair
26,108,299 UART: [art] Store priv key in slot 0x5
29,400,994 UART: [art] Derive Key Pair - Done
29,414,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,450 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,959 UART: [art] PUB.X = 585F04181336229FB4F90EBED8D2155ECEF2028C96458C6A1D9F1C6C52AB0D7B17F626D4B5D2CBFD2450DD7840B58F07
31,711,207 UART: [art] PUB.Y = 92B0EDA8F6977894BAC108EE466DCE6FDA0BC71110D5DF9A6E95CF5FF827A5E90706D2BD51C98D95196B91D1682E37A1
31,718,500 UART: [art] SIG.R = 7B573434ABF73E49514637F9EEE8B07406AE2BF63874E7729A6C1D12C5C8D39F73AFDC1E497899AB96D666D03F4D07BC
31,725,897 UART: [art] SIG.S = DF28ECB00D789277AB05843B5BF6C64C6AE51F73C1B47D9BB6224E74AE91BEB54016D3FFC4D91CE7CF3FF8744B43553B
33,031,078 UART: Caliptra RT
33,031,800 UART: [state] CFI Enabled
33,228,983 UART: [rt] RT listening for mailbox commands...
33,260,937 UART: [rt]cmd =0x44504543, len=92
39,011,754 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,330 UART:
192,699 UART: Running Caliptra ROM ...
193,785 UART:
603,493 UART: [state] CFI Enabled
618,100 UART: [state] LifecycleState = Unprovisioned
619,981 UART: [state] DebugLocked = No
622,859 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,865 UART: [kat] SHA2-256
796,618 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,152 UART: [kat] ++
807,755 UART: [kat] sha1
819,126 UART: [kat] SHA2-256
821,837 UART: [kat] SHA2-384
827,348 UART: [kat] SHA2-512-ACC
829,751 UART: [kat] ECC-384
3,115,322 UART: [kat] HMAC-384Kdf
3,126,697 UART: [kat] LMS
4,316,827 UART: [kat] --
4,321,080 UART: [cold-reset] ++
4,323,369 UART: [fht] Storing FHT @ 0x50003400
4,334,349 UART: [idev] ++
4,334,975 UART: [idev] CDI.KEYID = 6
4,335,850 UART: [idev] SUBJECT.KEYID = 7
4,337,154 UART: [idev] UDS.KEYID = 0
4,338,137 ready_for_fw is high
4,338,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,297 UART: [idev] Erasing UDS.KEYID = 0
7,626,433 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,325 UART: [idev] --
7,652,024 UART: [ldev] ++
7,652,593 UART: [ldev] CDI.KEYID = 6
7,653,604 UART: [ldev] SUBJECT.KEYID = 5
7,654,758 UART: [ldev] AUTHORITY.KEYID = 7
7,655,978 UART: [ldev] FE.KEYID = 1
7,666,462 UART: [ldev] Erasing FE.KEYID = 1
10,954,426 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,415 UART: [ldev] --
13,317,543 UART: [fwproc] Waiting for Commands...
13,320,336 UART: [fwproc] Received command 0x46574c44
13,322,522 UART: [fwproc] Received Image of size 118548 bytes
17,419,838 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,487,327 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,560,494 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,308 >>> mbox cmd response: success
17,889,460 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
17,893,391 UART: [afmc] ++
17,893,980 UART: [afmc] CDI.KEYID = 6
17,894,923 UART: [afmc] SUBJECT.KEYID = 7
17,896,133 UART: [afmc] AUTHORITY.KEYID = 5
21,213,601 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,386 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,531 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,849 UART: [afmc] --
23,581,523 UART: [cold-reset] --
23,585,590 UART: [state] Locking Datavault
23,590,829 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,574 UART: [state] Locking ICCM
23,594,716 UART: [exit] Launching FMC @ 0x40000130
23,603,107 UART:
23,603,337 UART: Running Caliptra FMC ...
23,604,431 UART:
23,604,587 UART: [state] CFI Enabled
23,612,405 UART: [fht] FMC Alias Private Key: 7
25,952,696 UART: [art] Extend RT PCRs Done
25,953,908 UART: [art] Lock RT PCRs Done
25,955,796 UART: [art] Populate DV Done
25,961,055 UART: [fht] FMC Alias Private Key: 7
25,962,699 UART: [art] Derive CDI
25,963,502 UART: [art] Store in slot 0x4
26,006,141 UART: [art] Derive Key Pair
26,007,132 UART: [art] Store priv key in slot 0x5
29,249,586 UART: [art] Derive Key Pair - Done
29,262,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,560 UART: [art] PUB.X = 69FB37C7E6DD72C07B50026404DE2086CE91774C0095CC8595974B720F99360DD91695DE7DCCD2CB6AE6ED16A429C1DA
31,551,866 UART: [art] PUB.Y = F4D1AA53E76046C5F0368F18BCFF1FD95492C0AF90FC267846EEA255036BB670091F47C2B009C62DD44FEF861073A0F0
31,559,095 UART: [art] SIG.R = 9E2A2F8F322760F007D394C1994101CCF4A36BBCE512380023B430CCD42D36EFBF9398DB97100276F50C35890DDC6853
31,566,486 UART: [art] SIG.S = 1D4E97F422B32F3AD616CD7FD8F38DA65A49D622F856DC59BA88CED8F8CB37983897D7F53302617FF524BED7C869D986
32,871,557 UART: Caliptra RT
32,872,253 UART: [state] CFI Enabled
33,004,824 UART: [rt] RT listening for mailbox commands...
33,036,946 UART: [rt]cmd =0x44504543, len=92
38,712,840 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,127,291 ready_for_fw is high
4,127,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,824 >>> mbox cmd response: success
18,166,029 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
23,806,150 UART:
23,806,530 UART: Running Caliptra FMC ...
23,807,673 UART:
23,807,830 UART: [state] CFI Enabled
23,815,732 UART: [fht] FMC Alias Private Key: 7
26,155,173 UART: [art] Extend RT PCRs Done
26,156,401 UART: [art] Lock RT PCRs Done
26,157,865 UART: [art] Populate DV Done
26,163,281 UART: [fht] FMC Alias Private Key: 7
26,164,927 UART: [art] Derive CDI
26,165,737 UART: [art] Store in slot 0x4
26,208,610 UART: [art] Derive Key Pair
26,209,679 UART: [art] Store priv key in slot 0x5
29,451,696 UART: [art] Derive Key Pair - Done
29,465,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,218 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,731 UART: [art] PUB.X = B57CD61B5F6D87FC005D604CE43C3F666EF1F095D53AA292886A4789A954EC6A56CFA9787D7E5F75D4442A3995CB1C95
31,753,983 UART: [art] PUB.Y = C8DC50184C20B19064D673A2CFC1F159F09EC6C1D0D855E21F0BED5321C821E2899B24A09CDAB6F1326670073F212FCB
31,761,224 UART: [art] SIG.R = F62F13F128D172A60110D4A07CE80938471650557C2043BF7672A069AF2B05616FC14742035C3B94788A965F997F7F98
31,768,558 UART: [art] SIG.S = 77DB49C02E1E58D28E795EF3570B699A6004FB0D714B62FE26D0C576F53C2CE3898AEB7F245BF0E839992B97B2D4A6A5
33,074,476 UART: Caliptra RT
33,075,197 UART: [state] CFI Enabled
33,208,568 UART: [rt] RT listening for mailbox commands...
33,240,360 UART: [rt]cmd =0x44504543, len=92
38,916,107 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
191,997 UART:
192,377 UART: Running Caliptra ROM ...
193,483 UART:
193,641 UART: [state] CFI Enabled
261,907 UART: [state] LifecycleState = Unprovisioned
263,817 UART: [state] DebugLocked = No
265,422 UART: [state] WD Timer not started. Device not locked for debugging
268,886 UART: [kat] SHA2-256
448,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,309 UART: [kat] ++
459,836 UART: [kat] sha1
472,131 UART: [kat] SHA2-256
474,845 UART: [kat] SHA2-384
481,465 UART: [kat] SHA2-512-ACC
483,893 UART: [kat] ECC-384
2,946,866 UART: [kat] HMAC-384Kdf
2,972,479 UART: [kat] LMS
3,448,959 UART: [kat] --
3,452,167 UART: [cold-reset] ++
3,454,690 UART: [fht] FHT @ 0x50003400
3,465,447 UART: [idev] ++
3,466,072 UART: [idev] CDI.KEYID = 6
3,466,957 UART: [idev] SUBJECT.KEYID = 7
3,468,267 UART: [idev] UDS.KEYID = 0
3,469,160 ready_for_fw is high
3,469,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,500 UART: [idev] Erasing UDS.KEYID = 0
5,984,641 UART: [idev] Sha1 KeyId Algorithm
6,009,690 UART: [idev] --
6,013,723 UART: [ldev] ++
6,014,304 UART: [ldev] CDI.KEYID = 6
6,015,186 UART: [ldev] SUBJECT.KEYID = 5
6,016,447 UART: [ldev] AUTHORITY.KEYID = 7
6,017,675 UART: [ldev] FE.KEYID = 1
6,058,687 UART: [ldev] Erasing FE.KEYID = 1
8,568,458 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,237 UART: [ldev] --
10,376,245 UART: [fwproc] Wait for Commands...
10,378,712 UART: [fwproc] Recv command 0x46574c44
10,380,689 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,753 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,501 >>> mbox cmd response: success
14,344,697 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,348,298 UART: [afmc] ++
14,348,879 UART: [afmc] CDI.KEYID = 6
14,349,871 UART: [afmc] SUBJECT.KEYID = 7
14,351,028 UART: [afmc] AUTHORITY.KEYID = 5
16,902,362 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,340 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,938 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,957 UART: [afmc] --
18,719,325 UART: [cold-reset] --
18,723,781 UART: [state] Locking Datavault
18,729,015 UART: [state] Locking PCR0, PCR1 and PCR31
18,730,810 UART: [state] Locking ICCM
18,732,100 UART: [exit] Launching FMC @ 0x40000130
18,740,544 UART:
18,740,786 UART: Running Caliptra FMC ...
18,741,905 UART:
18,742,069 UART: [state] CFI Enabled
18,798,138 UART: [fht] FMC Alias Private Key: 7
20,564,763 UART: [art] Extend RT PCRs Done
20,566,124 UART: [art] Lock RT PCRs Done
20,567,639 UART: [art] Populate DV Done
20,572,828 UART: [fht] FMC Alias Private Key: 7
20,574,469 UART: [art] Derive CDI
20,575,275 UART: [art] Store in slot 0x4
20,630,773 UART: [art] Derive Key Pair
20,631,770 UART: [art] Store priv key in slot 0x5
23,094,421 UART: [art] Derive Key Pair - Done
23,107,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,907 UART: [art] PUB.X = 64067BF939A2E94A26BBAE209BA4D8F5EEDF12F8DAEB43FECC7C4E7841443ED0B21AB30CA39D3BA587458169D3AD9F3B
24,829,209 UART: [art] PUB.Y = 4787614DD19B5DEEC74F5EDF65CAA5D15268E1CA292B7395BAEB7E65ECA9FD3816A832ECDE7821639C027D22329F624E
24,836,511 UART: [art] SIG.R = BCFDC116411CCC5CD435338FA267D83F99B040A1A7B789F7C6791D404007529F7529A5D295E66DDD7E4DC0D7121D20A3
24,843,856 UART: [art] SIG.S = B06019E810050DAFCD7E0FAF5B5DF2E5AE0469A701698CB2622FE5F689E719D9B946D6D6A5B53DA911E899FC70563DE5
25,823,766 UART: Caliptra RT
25,824,469 UART: [state] CFI Enabled
26,004,449 UART: [rt] RT listening for mailbox commands...
26,036,433 UART: [rt]cmd =0x44504543, len=92
30,381,949 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,462,180 ready_for_fw is high
3,462,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,193 >>> mbox cmd response: success
14,263,706 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,555,309 UART:
18,555,737 UART: Running Caliptra FMC ...
18,556,849 UART:
18,556,999 UART: [state] CFI Enabled
18,624,868 UART: [fht] FMC Alias Private Key: 7
20,390,931 UART: [art] Extend RT PCRs Done
20,392,154 UART: [art] Lock RT PCRs Done
20,394,004 UART: [art] Populate DV Done
20,399,352 UART: [fht] FMC Alias Private Key: 7
20,401,061 UART: [art] Derive CDI
20,401,799 UART: [art] Store in slot 0x4
20,458,120 UART: [art] Derive Key Pair
20,459,166 UART: [art] Store priv key in slot 0x5
22,922,008 UART: [art] Derive Key Pair - Done
22,934,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,443 UART: [art] PUB.X = C68D8B909B351D319FE2158D44BE34E9AC79B88E0D760CFCC0715E0E1296C728000C35B6D1FE91E6474A9CAB1E09BF0A
24,656,693 UART: [art] PUB.Y = 926D68214689D519736128DD6C52D141AF1E4FD94BEA79F0E403DE3F6B120922A3E4524BF4D0B3FCBF4AED978AB37F53
24,663,950 UART: [art] SIG.R = AA8125AF2F8C8658AD8F7ECD2FD975CE51DD2A66F98E39E2383175F0C7FF49334A7A403D933125B2F37F05BD374CE8B6
24,671,347 UART: [art] SIG.S = 73134260EA30496102A7D8B482E8B2E6E4E847AFF87B2F1548CB6E7BB513860DC188CC446D7EAE990B221EDB2B64C388
25,650,204 UART: Caliptra RT
25,650,920 UART: [state] CFI Enabled
25,832,161 UART: [rt] RT listening for mailbox commands...
25,864,221 UART: [rt]cmd =0x44504543, len=92
30,210,214 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,478 UART:
192,838 UART: Running Caliptra ROM ...
194,043 UART:
603,589 UART: [state] CFI Enabled
616,169 UART: [state] LifecycleState = Unprovisioned
618,075 UART: [state] DebugLocked = No
619,894 UART: [state] WD Timer not started. Device not locked for debugging
624,302 UART: [kat] SHA2-256
803,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,784 UART: [kat] ++
815,232 UART: [kat] sha1
826,322 UART: [kat] SHA2-256
828,973 UART: [kat] SHA2-384
834,822 UART: [kat] SHA2-512-ACC
837,199 UART: [kat] ECC-384
3,280,571 UART: [kat] HMAC-384Kdf
3,293,724 UART: [kat] LMS
3,770,204 UART: [kat] --
3,773,512 UART: [cold-reset] ++
3,775,446 UART: [fht] FHT @ 0x50003400
3,787,561 UART: [idev] ++
3,788,131 UART: [idev] CDI.KEYID = 6
3,789,015 UART: [idev] SUBJECT.KEYID = 7
3,790,333 UART: [idev] UDS.KEYID = 0
3,791,235 ready_for_fw is high
3,791,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,750 UART: [idev] Erasing UDS.KEYID = 0
6,263,384 UART: [idev] Sha1 KeyId Algorithm
6,287,635 UART: [idev] --
6,292,981 UART: [ldev] ++
6,293,556 UART: [ldev] CDI.KEYID = 6
6,294,470 UART: [ldev] SUBJECT.KEYID = 5
6,295,831 UART: [ldev] AUTHORITY.KEYID = 7
6,297,018 UART: [ldev] FE.KEYID = 1
6,307,755 UART: [ldev] Erasing FE.KEYID = 1
8,786,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,420 UART: [ldev] --
10,582,922 UART: [fwproc] Wait for Commands...
10,584,696 UART: [fwproc] Recv command 0x46574c44
10,586,740 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,167 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,240 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,305 >>> mbox cmd response: success
14,544,473 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,547,101 UART: [afmc] ++
14,547,706 UART: [afmc] CDI.KEYID = 6
14,548,620 UART: [afmc] SUBJECT.KEYID = 7
14,549,833 UART: [afmc] AUTHORITY.KEYID = 5
17,056,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,089 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,909 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,004 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,545 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,912 UART: [afmc] --
18,859,867 UART: [cold-reset] --
18,864,383 UART: [state] Locking Datavault
18,869,417 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,169 UART: [state] Locking ICCM
18,872,401 UART: [exit] Launching FMC @ 0x40000130
18,880,798 UART:
18,881,032 UART: Running Caliptra FMC ...
18,882,135 UART:
18,882,294 UART: [state] CFI Enabled
18,890,208 UART: [fht] FMC Alias Private Key: 7
20,656,681 UART: [art] Extend RT PCRs Done
20,657,912 UART: [art] Lock RT PCRs Done
20,659,515 UART: [art] Populate DV Done
20,665,328 UART: [fht] FMC Alias Private Key: 7
20,666,816 UART: [art] Derive CDI
20,667,580 UART: [art] Store in slot 0x4
20,710,127 UART: [art] Derive Key Pair
20,711,161 UART: [art] Store priv key in slot 0x5
23,137,613 UART: [art] Derive Key Pair - Done
23,150,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,050 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,552 UART: [art] PUB.X = EDE981C997FEA3FCCF19122538C918347F8BB487F61930E3B6FE4BF6E44E7F5485DE2556ABF6226E270D97FA80D0BA6C
24,865,803 UART: [art] PUB.Y = 058A95A9D8738BC4A411B5A0BE37D330DE77DCAF4D1908BC1C6338DD2C55DD4F86ACA3A7B82C5C6430483C215B0896F5
24,873,086 UART: [art] SIG.R = 9C36B7E8B6EE9C8586A0C89DE53E43C99C467DAA031466E5870B8645AE1B6906854B94D8594687C0FE30EA183FA903AF
24,880,481 UART: [art] SIG.S = 7D2716DC056050B761780714EBC6DE8E92BD1BB82975FA1EC9C66297729F3E0872A91F58ADCF90A41FED3A57D7FF5762
25,858,913 UART: Caliptra RT
25,859,612 UART: [state] CFI Enabled
25,992,187 UART: [rt] RT listening for mailbox commands...
26,024,193 UART: [rt]cmd =0x44504543, len=92
30,310,551 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,780,082 ready_for_fw is high
3,780,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,233 >>> mbox cmd response: success
14,443,569 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
18,697,297 UART:
18,697,682 UART: Running Caliptra FMC ...
18,698,915 UART:
18,699,088 UART: [state] CFI Enabled
18,706,774 UART: [fht] FMC Alias Private Key: 7
20,473,196 UART: [art] Extend RT PCRs Done
20,474,416 UART: [art] Lock RT PCRs Done
20,475,773 UART: [art] Populate DV Done
20,481,137 UART: [fht] FMC Alias Private Key: 7
20,482,840 UART: [art] Derive CDI
20,483,656 UART: [art] Store in slot 0x4
20,526,369 UART: [art] Derive Key Pair
20,527,409 UART: [art] Store priv key in slot 0x5
22,954,799 UART: [art] Derive Key Pair - Done
22,967,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,417 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,916 UART: [art] PUB.X = 794FB3A3F680F62F23D4542C7659BC01A897B6ED8EF72231BE425DC77E757118D93DDB5506E051F824FF4E1DC6F6E131
24,683,175 UART: [art] PUB.Y = F22972F01BF9855E5A30FF7B76C55576DD2D922FE09F5C985B9A031DA90E1E03F41B055447980676F32D49BF09BE0AAF
24,690,454 UART: [art] SIG.R = 06520A3C0D134E8B94FBD10C16CC8EF472B00983C5581256CC403C22A57F6306794FC25E0A83861593E8A08C8DC66AAA
24,697,802 UART: [art] SIG.S = CB9191FDE23EBA459BE51CDC1547434D3CDF9149FD899B69EC998658F8BD9C2314102BE261AEE084751016B1FB1A5957
25,677,036 UART: Caliptra RT
25,677,749 UART: [state] CFI Enabled
25,810,636 UART: [rt] RT listening for mailbox commands...
25,842,538 UART: [rt]cmd =0x44504543, len=92
30,128,184 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
191,987 UART:
192,364 UART: Running Caliptra ROM ...
193,456 UART:
193,598 UART: [state] CFI Enabled
266,117 UART: [state] LifecycleState = Unprovisioned
268,536 UART: [state] DebugLocked = No
271,409 UART: [state] WD Timer not started. Device not locked for debugging
276,296 UART: [kat] SHA2-256
466,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,938 UART: [kat] ++
477,406 UART: [kat] sha1
488,565 UART: [kat] SHA2-256
491,556 UART: [kat] SHA2-384
497,464 UART: [kat] SHA2-512-ACC
499,983 UART: [kat] ECC-384
2,948,077 UART: [kat] HMAC-384Kdf
2,974,900 UART: [kat] LMS
3,506,673 UART: [kat] --
3,510,951 UART: [cold-reset] ++
3,513,091 UART: [fht] FHT @ 0x50003400
3,525,131 UART: [idev] ++
3,525,841 UART: [idev] CDI.KEYID = 6
3,526,821 UART: [idev] SUBJECT.KEYID = 7
3,527,990 UART: [idev] UDS.KEYID = 0
3,528,913 ready_for_fw is high
3,529,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,230 UART: [idev] Erasing UDS.KEYID = 0
6,032,294 UART: [idev] Sha1 KeyId Algorithm
6,053,908 UART: [idev] --
6,059,326 UART: [ldev] ++
6,060,005 UART: [ldev] CDI.KEYID = 6
6,060,915 UART: [ldev] SUBJECT.KEYID = 5
6,062,120 UART: [ldev] AUTHORITY.KEYID = 7
6,063,350 UART: [ldev] FE.KEYID = 1
6,103,327 UART: [ldev] Erasing FE.KEYID = 1
8,613,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,217 UART: [ldev] --
10,418,524 UART: [fwproc] Wait for Commands...
10,421,487 UART: [fwproc] Recv command 0x46574c44
10,423,793 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,640 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,085 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,344 >>> mbox cmd response: success
14,683,938 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,686,720 UART: [afmc] ++
14,687,409 UART: [afmc] CDI.KEYID = 6
14,688,643 UART: [afmc] SUBJECT.KEYID = 7
14,690,066 UART: [afmc] AUTHORITY.KEYID = 5
17,219,008 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,944,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,945,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,961,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,976,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,991,063 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,015,195 UART: [afmc] --
19,018,410 UART: [cold-reset] --
19,022,615 UART: [state] Locking Datavault
19,030,624 UART: [state] Locking PCR0, PCR1 and PCR31
19,032,802 UART: [state] Locking ICCM
19,035,004 UART: [exit] Launching FMC @ 0x40000130
19,043,671 UART:
19,043,910 UART: Running Caliptra FMC ...
19,045,009 UART:
19,045,171 UART: [state] CFI Enabled
19,100,529 UART: [fht] FMC Alias Private Key: 7
20,887,815 UART: [art] Extend RT PCRs Done
20,889,030 UART: [art] Lock RT PCRs Done
20,890,784 UART: [art] Populate DV Done
20,896,157 UART: [fht] FMC Alias Private Key: 7
20,897,905 UART: [art] Derive CDI
20,898,719 UART: [art] Store in slot 0x4
20,954,656 UART: [art] Derive Key Pair
20,955,672 UART: [art] Store priv key in slot 0x5
23,418,765 UART: [art] Derive Key Pair - Done
23,431,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,144,631 UART: [art] Erasing AUTHORITY.KEYID = 7
25,146,128 UART: [art] PUB.X = F4BE23D7316BBDB370B6DBCFD448B6189B9D9D38B318CAF7EF4387C0F47240ECA23ED96A80100AE09384BDE2C3E96255
25,153,371 UART: [art] PUB.Y = 444FD7F96A55614FD537DCA6CB7951B3A0688061747BBB5BA86499AB3EDCF3496F8B8B5E1B4EA992C7C58C040A7488E8
25,160,703 UART: [art] SIG.R = C5B32B6C69FA72957253DFF8978DED4DBF11059D4544BE48FAB190350089F5D7344951F65DFC5D78D61837635C86D59E
25,168,040 UART: [art] SIG.S = 90CCE9EECC0F55E1513996B54FB4BF9CCCA861496449545A0603610451306803CDC7BC8C8468924522EC2FA6F01BA213
26,147,419 UART: Caliptra RT
26,148,109 UART: [state] CFI Enabled
26,328,665 UART: [rt] RT listening for mailbox commands...
26,360,587 UART: [rt]cmd =0x44504543, len=92
30,706,397 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,436,645 ready_for_fw is high
3,437,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,596 >>> mbox cmd response: success
14,823,237 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,109,537 UART:
19,109,910 UART: Running Caliptra FMC ...
19,111,047 UART:
19,111,229 UART: [state] CFI Enabled
19,176,682 UART: [fht] FMC Alias Private Key: 7
20,943,892 UART: [art] Extend RT PCRs Done
20,945,111 UART: [art] Lock RT PCRs Done
20,946,790 UART: [art] Populate DV Done
20,952,136 UART: [fht] FMC Alias Private Key: 7
20,953,736 UART: [art] Derive CDI
20,954,552 UART: [art] Store in slot 0x4
21,010,489 UART: [art] Derive Key Pair
21,011,481 UART: [art] Store priv key in slot 0x5
23,474,940 UART: [art] Derive Key Pair - Done
23,487,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,337 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,833 UART: [art] PUB.X = 2583EE0DE18B84C47A611A26E4B1B9CE63D7A096C100142AE8E3A61A0D83242B17E35ABC425A42E27DF689CFDB43EBEB
25,210,128 UART: [art] PUB.Y = D06B460A13E506BF9F31578237C101EEA82977D047BADD67221F2599D2CAC924624F0BF0C169221A985CC1049C1FCF56
25,217,369 UART: [art] SIG.R = 9D8C69DFB83E3966E5529F2CD22E9FFFF5CB5018249AB38B8F3628AE46E8B71F4E21930873D80ABFBD4BBBF1B2DD8E08
25,224,777 UART: [art] SIG.S = DC60910559DF02C4E9B60AF60732548ACA4C9CC019BAB1EA0B690D4CA9BC5A6A9A573B16D538C4AD6FBD181535D1DD05
26,204,005 UART: Caliptra RT
26,204,723 UART: [state] CFI Enabled
26,385,196 UART: [rt] RT listening for mailbox commands...
26,417,555 UART: [rt]cmd =0x44504543, len=92
30,762,745 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,474 UART:
192,840 UART: Running Caliptra ROM ...
194,028 UART:
603,660 UART: [state] CFI Enabled
617,728 UART: [state] LifecycleState = Unprovisioned
620,158 UART: [state] DebugLocked = No
622,043 UART: [state] WD Timer not started. Device not locked for debugging
627,171 UART: [kat] SHA2-256
817,071 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,809 UART: [kat] ++
828,331 UART: [kat] sha1
839,201 UART: [kat] SHA2-256
842,220 UART: [kat] SHA2-384
847,503 UART: [kat] SHA2-512-ACC
850,088 UART: [kat] ECC-384
3,293,679 UART: [kat] HMAC-384Kdf
3,307,824 UART: [kat] LMS
3,839,683 UART: [kat] --
3,844,032 UART: [cold-reset] ++
3,845,968 UART: [fht] FHT @ 0x50003400
3,858,083 UART: [idev] ++
3,858,824 UART: [idev] CDI.KEYID = 6
3,859,742 UART: [idev] SUBJECT.KEYID = 7
3,860,990 UART: [idev] UDS.KEYID = 0
3,861,920 ready_for_fw is high
3,862,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,997 UART: [idev] Erasing UDS.KEYID = 0
6,345,777 UART: [idev] Sha1 KeyId Algorithm
6,368,688 UART: [idev] --
6,373,607 UART: [ldev] ++
6,374,331 UART: [ldev] CDI.KEYID = 6
6,375,256 UART: [ldev] SUBJECT.KEYID = 5
6,376,371 UART: [ldev] AUTHORITY.KEYID = 7
6,377,606 UART: [ldev] FE.KEYID = 1
6,386,958 UART: [ldev] Erasing FE.KEYID = 1
8,866,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,589,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,604,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,619,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,634,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,655,797 UART: [ldev] --
10,660,846 UART: [fwproc] Wait for Commands...
10,663,060 UART: [fwproc] Recv command 0x46574c44
10,665,323 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,921,407 >>> mbox cmd response: success
14,921,970 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
14,925,246 UART: [afmc] ++
14,925,949 UART: [afmc] CDI.KEYID = 6
14,927,142 UART: [afmc] SUBJECT.KEYID = 7
14,928,580 UART: [afmc] AUTHORITY.KEYID = 5
17,435,044 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,048 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,173,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,188,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,203,225 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,226,928 UART: [afmc] --
19,229,778 UART: [cold-reset] --
19,233,216 UART: [state] Locking Datavault
19,238,531 UART: [state] Locking PCR0, PCR1 and PCR31
19,240,677 UART: [state] Locking ICCM
19,243,299 UART: [exit] Launching FMC @ 0x40000130
19,251,922 UART:
19,252,158 UART: Running Caliptra FMC ...
19,253,405 UART:
19,253,570 UART: [state] CFI Enabled
19,261,725 UART: [fht] FMC Alias Private Key: 7
21,027,891 UART: [art] Extend RT PCRs Done
21,029,107 UART: [art] Lock RT PCRs Done
21,030,525 UART: [art] Populate DV Done
21,036,112 UART: [fht] FMC Alias Private Key: 7
21,037,764 UART: [art] Derive CDI
21,038,586 UART: [art] Store in slot 0x4
21,080,924 UART: [art] Derive Key Pair
21,081,925 UART: [art] Store priv key in slot 0x5
23,509,060 UART: [art] Derive Key Pair - Done
23,522,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,626 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,139 UART: [art] PUB.X = 1A4BB66FE9A48EF2FC9D8A22C0E8B990E84580FEB6DCF872940C284E626923507C854D72367CDB75B456CDC73B55F2CA
25,237,357 UART: [art] PUB.Y = 58EC9E5AC5269F94CF0331E943C09FABDCAFA0D5AF42DA733295E1BADA2BA4E5F5430FDA8882CD17D1A235A6AB753BB3
25,244,674 UART: [art] SIG.R = 6A33A1B4DFDA0E3EEC6E32A811439E336583BEC71E830C4D296EC62E43E10634A72A140BD2D1FFFFA0A2363B78790D3D
25,252,089 UART: [art] SIG.S = F953673C205753A7F01C50C1481DE6B95EFC4901CDA2BB0200A352F3F3EA600C25F67087E0EDDAB6B81BEE6363196830
26,231,206 UART: Caliptra RT
26,231,924 UART: [state] CFI Enabled
26,364,972 UART: [rt] RT listening for mailbox commands...
26,397,020 UART: [rt]cmd =0x44504543, len=92
30,682,709 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
3,756,328 ready_for_fw is high
3,756,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,416 >>> mbox cmd response: success
15,049,078 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
19,307,939 UART:
19,308,326 UART: Running Caliptra FMC ...
19,309,552 UART:
19,309,723 UART: [state] CFI Enabled
19,317,570 UART: [fht] FMC Alias Private Key: 7
21,083,544 UART: [art] Extend RT PCRs Done
21,084,774 UART: [art] Lock RT PCRs Done
21,086,651 UART: [art] Populate DV Done
21,092,138 UART: [fht] FMC Alias Private Key: 7
21,093,761 UART: [art] Derive CDI
21,094,511 UART: [art] Store in slot 0x4
21,137,818 UART: [art] Derive Key Pair
21,138,823 UART: [art] Store priv key in slot 0x5
23,565,313 UART: [art] Derive Key Pair - Done
23,578,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,284,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,337 UART: [art] PUB.X = 3F4756C665725B497731DA34FB3126C4FB1297EE2ED4C87DA248EC6E51DC4A02DA351DD1664748E6CB06D696AA4A15C7
25,293,612 UART: [art] PUB.Y = 890C2C83715C983A8B6A67106FD9E3B8AFB81BD33E619174D0DF3981748D47DC6FE425632DE211E350A27B4D0C9DF491
25,300,884 UART: [art] SIG.R = 9F957D7B42A00A8A792C234CF333F4AFA08D953689326B7C54C551C20A57DA4AE752DFA0FE81EDE5F382A68C6A8DB290
25,308,245 UART: [art] SIG.S = 7B9DB1A4E940702EA3A591AF0C4ADA882AE1F2DCA3CEB886220D0A4E9911BC6B08555CAD63B04A4E2170BACFAABF5D53
26,287,161 UART: Caliptra RT
26,288,006 UART: [state] CFI Enabled
26,420,574 UART: [rt] RT listening for mailbox commands...
26,452,618 UART: [rt]cmd =0x44504543, len=92
30,738,639 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
902,828 UART: [kat] HMAC-384Kdf
907,336 UART: [kat] LMS
1,475,532 UART: [kat] --
1,476,145 UART: [cold-reset] ++
1,476,601 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 ready_for_fw is high
1,480,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,490 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,002 UART: [idev] --
1,515,041 UART: [ldev] ++
1,515,209 UART: [ldev] CDI.KEYID = 6
1,515,572 UART: [ldev] SUBJECT.KEYID = 5
1,515,998 UART: [ldev] AUTHORITY.KEYID = 7
1,516,461 UART: [ldev] FE.KEYID = 1
1,521,711 UART: [ldev] Erasing FE.KEYID = 1
1,547,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,864 UART: [ldev] --
1,586,291 UART: [fwproc] Waiting for Commands...
1,587,152 UART: [fwproc] Received command 0x46574c44
1,587,943 UART: [fwproc] Received Image of size 118548 bytes
2,931,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,523 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,741 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,142 >>> mbox cmd response: success
3,131,142 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,132,196 UART: [afmc] ++
3,132,364 UART: [afmc] CDI.KEYID = 6
3,132,726 UART: [afmc] SUBJECT.KEYID = 7
3,133,151 UART: [afmc] AUTHORITY.KEYID = 5
3,167,570 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,892 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,672 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,264 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,947 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,895 UART: [afmc] --
3,211,001 UART: [cold-reset] --
3,211,843 UART: [state] Locking Datavault
3,213,092 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,696 UART: [state] Locking ICCM
3,214,116 UART: [exit] Launching FMC @ 0x40000130
3,219,446 UART:
3,219,462 UART: Running Caliptra FMC ...
3,219,870 UART:
3,219,924 UART: [state] CFI Enabled
3,230,354 UART: [fht] FMC Alias Private Key: 7
3,349,078 UART: [art] Extend RT PCRs Done
3,349,506 UART: [art] Lock RT PCRs Done
3,351,096 UART: [art] Populate DV Done
3,359,241 UART: [fht] FMC Alias Private Key: 7
3,360,271 UART: [art] Derive CDI
3,360,551 UART: [art] Store in slot 0x4
3,445,931 UART: [art] Derive Key Pair
3,446,291 UART: [art] Store priv key in slot 0x5
3,459,008 UART: [art] Derive Key Pair - Done
3,473,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,600 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,365 UART: [art] PUB.X = C246965ADCEEC2785F1404268A01F5A56638C45177E0BFD8C54BA7D3AA14A42FE538FFFA9E79B5F3E5509D54539F0612
3,497,134 UART: [art] PUB.Y = A34F8BD7B09A9AE37B890CC75C2C7D1CCDA5A0864DDF54D1E7316FFD01D8D7AF59888860EDEE9B8EC4C2DA8A1FA86A15
3,504,106 UART: [art] SIG.R = 2BA0D7124DB073D219BC3AC30EC45E2C1FF7A65353AC638DC6124F7463013005E3D2979419E4631BE498464EC24BCD84
3,510,869 UART: [art] SIG.S = 6AF583BFC2F39E8E073DB6B8EE0D320897EF55518C28EA9AE24BE58FC767C30570A30FEA2AE8FF29720E99688E782A25
3,534,715 UART: Caliptra RT
3,534,966 UART: [state] CFI Enabled
3,655,065 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,119 UART: [rt]cmd =0x44504543, len=92
3,870,490 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,279 ready_for_fw is high
1,362,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,920 >>> mbox cmd response: success
2,979,920 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,041,271 UART:
3,041,287 UART: Running Caliptra FMC ...
3,041,695 UART:
3,041,749 UART: [state] CFI Enabled
3,052,409 UART: [fht] FMC Alias Private Key: 7
3,171,557 UART: [art] Extend RT PCRs Done
3,171,985 UART: [art] Lock RT PCRs Done
3,173,343 UART: [art] Populate DV Done
3,181,814 UART: [fht] FMC Alias Private Key: 7
3,182,862 UART: [art] Derive CDI
3,183,142 UART: [art] Store in slot 0x4
3,268,668 UART: [art] Derive Key Pair
3,269,028 UART: [art] Store priv key in slot 0x5
3,282,739 UART: [art] Derive Key Pair - Done
3,297,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,159 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,924 UART: [art] PUB.X = 6D595823C11F5B110F8CB8282A6340F961DD858F3A7CDA572B9B5CCFCCF8EC823745B98E6C44DCAE463E41CFEFE0D68F
3,320,711 UART: [art] PUB.Y = 3BD3B91A16901234C3B518355F4160DEB3C1BAD4C82468D46F020E5991EFB99BF3ED115D2350B43BC90ABC2554F09209
3,327,653 UART: [art] SIG.R = CDAA46E284CAF8870045356648DC8D16E7F4BDA4ACAF0B1D98E1EAE5ABC7D499746A3D6968F3ED526085374A53168E32
3,334,410 UART: [art] SIG.S = FE9237EFD818B7ADAD9CA0D6245D2B2B77CC1905B91C32812812879D1BB51D286CFDE42FAE28BAABECC6C160AEBD039B
3,358,456 UART: Caliptra RT
3,358,707 UART: [state] CFI Enabled
3,478,748 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,724 UART: [rt]cmd =0x44504543, len=92
3,694,040 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,207 UART: [state] LifecycleState = Unprovisioned
85,862 UART: [state] DebugLocked = No
86,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,731 UART: [kat] HMAC-384Kdf
907,327 UART: [kat] LMS
1,475,523 UART: [kat] --
1,476,300 UART: [cold-reset] ++
1,476,718 UART: [fht] Storing FHT @ 0x50003400
1,479,527 UART: [idev] ++
1,479,695 UART: [idev] CDI.KEYID = 6
1,480,055 UART: [idev] SUBJECT.KEYID = 7
1,480,479 UART: [idev] UDS.KEYID = 0
1,480,824 ready_for_fw is high
1,480,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,577 UART: [idev] Erasing UDS.KEYID = 0
1,505,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,901 UART: [idev] --
1,515,154 UART: [ldev] ++
1,515,322 UART: [ldev] CDI.KEYID = 6
1,515,685 UART: [ldev] SUBJECT.KEYID = 5
1,516,111 UART: [ldev] AUTHORITY.KEYID = 7
1,516,574 UART: [ldev] FE.KEYID = 1
1,521,916 UART: [ldev] Erasing FE.KEYID = 1
1,547,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,985 UART: [ldev] --
1,587,386 UART: [fwproc] Waiting for Commands...
1,588,155 UART: [fwproc] Received command 0x46574c44
1,588,946 UART: [fwproc] Received Image of size 118548 bytes
2,933,708 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,284 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,839 >>> mbox cmd response: success
3,132,839 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,134,027 UART: [afmc] ++
3,134,195 UART: [afmc] CDI.KEYID = 6
3,134,557 UART: [afmc] SUBJECT.KEYID = 7
3,134,982 UART: [afmc] AUTHORITY.KEYID = 5
3,169,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,331 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,111 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,820 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,703 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,386 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,212 UART: [afmc] --
3,213,296 UART: [cold-reset] --
3,214,090 UART: [state] Locking Datavault
3,215,483 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,087 UART: [state] Locking ICCM
3,216,565 UART: [exit] Launching FMC @ 0x40000130
3,221,895 UART:
3,221,911 UART: Running Caliptra FMC ...
3,222,319 UART:
3,222,462 UART: [state] CFI Enabled
3,232,898 UART: [fht] FMC Alias Private Key: 7
3,352,940 UART: [art] Extend RT PCRs Done
3,353,368 UART: [art] Lock RT PCRs Done
3,354,984 UART: [art] Populate DV Done
3,363,463 UART: [fht] FMC Alias Private Key: 7
3,364,477 UART: [art] Derive CDI
3,364,757 UART: [art] Store in slot 0x4
3,450,353 UART: [art] Derive Key Pair
3,450,713 UART: [art] Store priv key in slot 0x5
3,464,280 UART: [art] Derive Key Pair - Done
3,479,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,437 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,202 UART: [art] PUB.X = 40F053D4DC7D5E4505C612EBE402F67DE991616305BB46538B44BCA9F45623D5C584FFD31D13069FA83554E24EDD769A
3,501,964 UART: [art] PUB.Y = A110D96C505293F34F5B1F35AD46A75CD97C4A83CD514240284313F1D6E1BB21189D300E4A6D3918BB451345B4C6C622
3,508,909 UART: [art] SIG.R = A4E1E1C3436F1C3384B63B3D03DD18C5C1B193C8F0955A6BA65B202BB8D3973C6227EB639B7798EFCE95B12FFF4348F4
3,515,686 UART: [art] SIG.S = 0488AC7118E9AF668C32F84996AEBCD38BB54D08A5C9FEE5AB4C723414CFB8312C3F933F083D41309DEF4DAEA206B224
3,539,890 UART: Caliptra RT
3,540,233 UART: [state] CFI Enabled
3,660,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,517 UART: [rt]cmd =0x44504543, len=92
3,876,179 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,504 ready_for_fw is high
1,362,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,049 >>> mbox cmd response: success
2,982,049 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
3,044,024 UART:
3,044,040 UART: Running Caliptra FMC ...
3,044,448 UART:
3,044,591 UART: [state] CFI Enabled
3,054,965 UART: [fht] FMC Alias Private Key: 7
3,174,135 UART: [art] Extend RT PCRs Done
3,174,563 UART: [art] Lock RT PCRs Done
3,176,151 UART: [art] Populate DV Done
3,184,674 UART: [fht] FMC Alias Private Key: 7
3,185,640 UART: [art] Derive CDI
3,185,920 UART: [art] Store in slot 0x4
3,271,670 UART: [art] Derive Key Pair
3,272,030 UART: [art] Store priv key in slot 0x5
3,284,997 UART: [art] Derive Key Pair - Done
3,299,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,769 UART: [art] PUB.X = 13FB14CE85365296EFB60092EBE6F25182B05A188CB1A6AC2897A114A098B5C22F2E019BDDE210E2FA2B63B22F493500
3,322,498 UART: [art] PUB.Y = ADB44742487E370F0F642A7F0B1870B9C578C3FAF46207ED66C96BF3BFA4E8C53D3005C61A7D9B97820A6E4E2D8C618F
3,329,440 UART: [art] SIG.R = 0670E982F13096A21F7255933EE15DE5FBB802DEFE76D6A9CC6178F7E61E9A7ED1FBFCD705E52105A738C43BA3CEB1C7
3,336,214 UART: [art] SIG.S = 08AF45D7555574142617CD5663B423DC429050D2273DAE96E6ECB45EC306B63453AEC8C436F42A916C354EA3D9C57036
3,360,032 UART: Caliptra RT
3,360,375 UART: [state] CFI Enabled
3,480,520 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,504 UART: [rt]cmd =0x44504543, len=92
3,696,275 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,691 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
891,368 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,472 UART: [kat] ++
895,624 UART: [kat] sha1
899,786 UART: [kat] SHA2-256
901,726 UART: [kat] SHA2-384
904,305 UART: [kat] SHA2-512-ACC
906,206 UART: [kat] ECC-384
915,955 UART: [kat] HMAC-384Kdf
920,517 UART: [kat] LMS
1,168,829 UART: [kat] --
1,169,850 UART: [cold-reset] ++
1,170,330 UART: [fht] FHT @ 0x50003400
1,173,028 UART: [idev] ++
1,173,196 UART: [idev] CDI.KEYID = 6
1,173,557 UART: [idev] SUBJECT.KEYID = 7
1,173,982 UART: [idev] UDS.KEYID = 0
1,174,328 ready_for_fw is high
1,174,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,691 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,585 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,226 UART: [ldev] --
1,280,659 UART: [fwproc] Wait for Commands...
1,281,428 UART: [fwproc] Recv command 0x46574c44
1,282,161 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,096 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,943 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,513 >>> mbox cmd response: success
2,825,513 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,826,531 UART: [afmc] ++
2,826,699 UART: [afmc] CDI.KEYID = 6
2,827,062 UART: [afmc] SUBJECT.KEYID = 7
2,827,488 UART: [afmc] AUTHORITY.KEYID = 5
2,863,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,266 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,606 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,122 UART: [afmc] --
2,906,055 UART: [cold-reset] --
2,906,955 UART: [state] Locking Datavault
2,908,246 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,850 UART: [state] Locking ICCM
2,909,470 UART: [exit] Launching FMC @ 0x40000130
2,914,800 UART:
2,914,816 UART: Running Caliptra FMC ...
2,915,224 UART:
2,915,278 UART: [state] CFI Enabled
2,925,646 UART: [fht] FMC Alias Private Key: 7
3,044,784 UART: [art] Extend RT PCRs Done
3,045,212 UART: [art] Lock RT PCRs Done
3,046,928 UART: [art] Populate DV Done
3,055,129 UART: [fht] FMC Alias Private Key: 7
3,056,141 UART: [art] Derive CDI
3,056,421 UART: [art] Store in slot 0x4
3,142,194 UART: [art] Derive Key Pair
3,142,554 UART: [art] Store priv key in slot 0x5
3,155,502 UART: [art] Derive Key Pair - Done
3,170,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,445 UART: [art] PUB.X = 28006F9BEB508DE9EE9FBC44A14F9BFBB255E2389A7AAFC29A7DA723DA0F9ED7D93E58175793E5066D973298CEE5C7B9
3,193,205 UART: [art] PUB.Y = 83BD1715A513339A1C827630B940927EC3DD50BC248E9B91507C5573037F1F45B35327D166E30F77AC6450E12A44271B
3,200,139 UART: [art] SIG.R = CD9717DC58ED965AFCD8E5CBB0241D27954681D0DF786EB3F9825129783B84930AED8BC59E57460CF7BB4C79AC7B6514
3,206,913 UART: [art] SIG.S = 99A0BDDE65B4E30D8F51387DD0E53CA2E2A4A604157248FAAC0E370CFEAC45DB66C99031244D0207AFE531CED82599B4
3,230,375 UART: Caliptra RT
3,230,626 UART: [state] CFI Enabled
3,351,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,414 UART: [rt]cmd =0x44504543, len=92
3,567,325 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,834 ready_for_fw is high
1,058,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,176 >>> mbox cmd response: success
2,677,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,738,317 UART:
2,738,333 UART: Running Caliptra FMC ...
2,738,741 UART:
2,738,795 UART: [state] CFI Enabled
2,749,355 UART: [fht] FMC Alias Private Key: 7
2,867,509 UART: [art] Extend RT PCRs Done
2,867,937 UART: [art] Lock RT PCRs Done
2,869,247 UART: [art] Populate DV Done
2,877,390 UART: [fht] FMC Alias Private Key: 7
2,878,390 UART: [art] Derive CDI
2,878,670 UART: [art] Store in slot 0x4
2,964,463 UART: [art] Derive Key Pair
2,964,823 UART: [art] Store priv key in slot 0x5
2,978,001 UART: [art] Derive Key Pair - Done
2,993,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,058 UART: [art] PUB.X = 52506481C242C0957215B6B55EA3F0A094A22FCD4E7AA32A34C89B3784FE32079307344A0FC09FDE1037A11B79AF8BEC
3,015,823 UART: [art] PUB.Y = 769AA68A91D452DB12D1F03C3CC1F066B420378D4B597733B71CD44A50FB8D4F592A17768E8F37F35CF66908AB05C3DE
3,022,773 UART: [art] SIG.R = A5B3BE141F0A2EFE91036229FE3B22128A8F8626B4BEF05E32351AF33D1B9FFA663263218CDD5E08EB385491B5F3A845
3,029,542 UART: [art] SIG.S = 9BFC0D4483FA9899CD94BA114970274814A219EE4224B2E2E12CFB24C904C5F616596FD26114FBF3FFFE90994B107917
3,053,616 UART: Caliptra RT
3,053,867 UART: [state] CFI Enabled
3,173,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,233 UART: [rt]cmd =0x44504543, len=92
3,388,099 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,329 UART: [kat] SHA2-256
902,269 UART: [kat] SHA2-384
904,958 UART: [kat] SHA2-512-ACC
906,859 UART: [kat] ECC-384
916,872 UART: [kat] HMAC-384Kdf
921,436 UART: [kat] LMS
1,169,748 UART: [kat] --
1,170,443 UART: [cold-reset] ++
1,170,903 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 ready_for_fw is high
1,174,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,056 UART: [idev] Erasing UDS.KEYID = 0
1,199,032 UART: [idev] Sha1 KeyId Algorithm
1,207,738 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,965 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,451 UART: [ldev] --
1,282,880 UART: [fwproc] Wait for Commands...
1,283,479 UART: [fwproc] Recv command 0x46574c44
1,284,212 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,382 >>> mbox cmd response: success
2,827,382 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,828,622 UART: [afmc] ++
2,828,790 UART: [afmc] CDI.KEYID = 6
2,829,153 UART: [afmc] SUBJECT.KEYID = 7
2,829,579 UART: [afmc] AUTHORITY.KEYID = 5
2,865,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,706 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,297 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,765 UART: [afmc] --
2,908,712 UART: [cold-reset] --
2,909,652 UART: [state] Locking Datavault
2,910,993 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,597 UART: [state] Locking ICCM
2,912,261 UART: [exit] Launching FMC @ 0x40000130
2,917,591 UART:
2,917,607 UART: Running Caliptra FMC ...
2,918,015 UART:
2,918,158 UART: [state] CFI Enabled
2,928,706 UART: [fht] FMC Alias Private Key: 7
3,047,974 UART: [art] Extend RT PCRs Done
3,048,402 UART: [art] Lock RT PCRs Done
3,050,050 UART: [art] Populate DV Done
3,058,113 UART: [fht] FMC Alias Private Key: 7
3,059,149 UART: [art] Derive CDI
3,059,429 UART: [art] Store in slot 0x4
3,145,284 UART: [art] Derive Key Pair
3,145,644 UART: [art] Store priv key in slot 0x5
3,158,740 UART: [art] Derive Key Pair - Done
3,173,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,039 UART: [art] PUB.X = CEC7F1AB336EB4D166E3CFC22D7C920B83067BA95323786F372FB062B9763058981C759595CEF59792509E7964D11073
3,196,797 UART: [art] PUB.Y = CB085F69DFAF07FE289598DF022C653025BDD2E9A77AB62EE3519D3DB64D7EAE4AB92008EE4D72C2ECA51C23554084E6
3,203,751 UART: [art] SIG.R = BFD49101C27C0FD6DB1C23A11AD6C542547E35D3C7574D73A6BF4E708D5EE289CAC79C0EC1A045278EEF490F16711E6F
3,210,523 UART: [art] SIG.S = 760BCCE96F4D84F5732AEFC309695B13C8B92EAF2CF650C3B8A7FC469E0F0407720C34C59AA71413E593B2A454476D09
3,234,388 UART: Caliptra RT
3,234,731 UART: [state] CFI Enabled
3,354,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,806 UART: [rt]cmd =0x44504543, len=92
3,570,337 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,907 ready_for_fw is high
1,059,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,423 >>> mbox cmd response: success
2,680,423 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,742,286 UART:
2,742,302 UART: Running Caliptra FMC ...
2,742,710 UART:
2,742,853 UART: [state] CFI Enabled
2,753,503 UART: [fht] FMC Alias Private Key: 7
2,872,499 UART: [art] Extend RT PCRs Done
2,872,927 UART: [art] Lock RT PCRs Done
2,874,691 UART: [art] Populate DV Done
2,882,874 UART: [fht] FMC Alias Private Key: 7
2,884,000 UART: [art] Derive CDI
2,884,280 UART: [art] Store in slot 0x4
2,970,209 UART: [art] Derive Key Pair
2,970,569 UART: [art] Store priv key in slot 0x5
2,983,857 UART: [art] Derive Key Pair - Done
2,998,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,638 UART: [art] PUB.X = 83775DCDEC66E1559BD49A1AC016078BF79D6DF4FFADA205C7B120F253E83DA06B3D91F9B5661E1D0CAD62E3E59B58D7
3,021,417 UART: [art] PUB.Y = DF1E27B988137A5192E44B6DD0C0FBFC2F007F0DDFD0BD3FA9945086380ACDE42C57EA1ACE4B23CAC02B8B4A971B3307
3,028,358 UART: [art] SIG.R = 0E9AB2F14D94A4D4DD52C08A3BB8B85DC4D5F3C4111DDC0862676C2F302B5784C649FF69CA271CBB4F01EE854D919FCA
3,035,137 UART: [art] SIG.S = 8898B3D92BA30D8EEE58629BF22DDEC7F66A83BBB44E0DE62DBEFFDFD8C1DC752A41B34A92AB0735BFB98EBD897382C1
3,059,306 UART: Caliptra RT
3,059,649 UART: [state] CFI Enabled
3,179,392 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,814 UART: [rt]cmd =0x44504543, len=92
3,394,994 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,761 UART: [state] WD Timer not started. Device not locked for debugging
88,050 UART: [kat] SHA2-256
893,700 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,825 UART: [kat] ++
897,977 UART: [kat] sha1
902,295 UART: [kat] SHA2-256
904,235 UART: [kat] SHA2-384
906,826 UART: [kat] SHA2-512-ACC
908,727 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,539 UART: [fht] FHT @ 0x50003400
1,175,180 UART: [idev] ++
1,175,348 UART: [idev] CDI.KEYID = 6
1,175,708 UART: [idev] SUBJECT.KEYID = 7
1,176,132 UART: [idev] UDS.KEYID = 0
1,176,477 ready_for_fw is high
1,176,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,680 UART: [idev] Erasing UDS.KEYID = 0
1,201,963 UART: [idev] Sha1 KeyId Algorithm
1,210,295 UART: [idev] --
1,211,245 UART: [ldev] ++
1,211,413 UART: [ldev] CDI.KEYID = 6
1,211,776 UART: [ldev] SUBJECT.KEYID = 5
1,212,202 UART: [ldev] AUTHORITY.KEYID = 7
1,212,665 UART: [ldev] FE.KEYID = 1
1,217,799 UART: [ldev] Erasing FE.KEYID = 1
1,244,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,181 UART: [ldev] --
1,283,514 UART: [fwproc] Wait for Commands...
1,284,138 UART: [fwproc] Recv command 0x46574c44
1,284,866 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,073 >>> mbox cmd response: success
2,828,073 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,829,299 UART: [afmc] ++
2,829,467 UART: [afmc] CDI.KEYID = 6
2,829,829 UART: [afmc] SUBJECT.KEYID = 7
2,830,254 UART: [afmc] AUTHORITY.KEYID = 5
2,866,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,466 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,214 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,806 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,487 UART: [afmc] --
2,909,557 UART: [cold-reset] --
2,910,383 UART: [state] Locking Datavault
2,911,524 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,128 UART: [state] Locking ICCM
2,912,550 UART: [exit] Launching FMC @ 0x40000130
2,917,880 UART:
2,917,896 UART: Running Caliptra FMC ...
2,918,304 UART:
2,918,358 UART: [state] CFI Enabled
2,928,692 UART: [fht] FMC Alias Private Key: 7
3,047,768 UART: [art] Extend RT PCRs Done
3,048,196 UART: [art] Lock RT PCRs Done
3,049,910 UART: [art] Populate DV Done
3,058,099 UART: [fht] FMC Alias Private Key: 7
3,059,089 UART: [art] Derive CDI
3,059,369 UART: [art] Store in slot 0x4
3,144,960 UART: [art] Derive Key Pair
3,145,320 UART: [art] Store priv key in slot 0x5
3,159,186 UART: [art] Derive Key Pair - Done
3,173,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,065 UART: [art] PUB.X = 4AE4C88D009440BB560886A0CAECB5C6133891C0C4A31BA55C7B60E51F2062B02E227E48AB622D030F0DDF06EA029726
3,196,801 UART: [art] PUB.Y = A4EF829BC9756FBAAE5137F80B6EB25C83DDD161E3CED2BDABD2D677A0366984E70F50A0F804F9638B0162768A14DACF
3,203,757 UART: [art] SIG.R = BEC56407638564C2DA962C9338E8BCE3D5C58C32F540DFC7BAE81586D9D16FE067AF288044E5094553C7DCF075949F83
3,210,525 UART: [art] SIG.S = CBF32223F8A86CF68A4379B55AFFC813C8D30E8EAE3DD21DC5A264AD07A1C28F17BA9B2A262883CB89A22DBC0CDCAF74
3,234,754 UART: Caliptra RT
3,235,005 UART: [state] CFI Enabled
3,354,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,493 UART: [rt]cmd =0x44504543, len=92
3,570,280 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,413 ready_for_fw is high
1,060,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,828 >>> mbox cmd response: success
2,678,828 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,740,659 UART:
2,740,675 UART: Running Caliptra FMC ...
2,741,083 UART:
2,741,137 UART: [state] CFI Enabled
2,751,431 UART: [fht] FMC Alias Private Key: 7
2,870,157 UART: [art] Extend RT PCRs Done
2,870,585 UART: [art] Lock RT PCRs Done
2,872,039 UART: [art] Populate DV Done
2,880,138 UART: [fht] FMC Alias Private Key: 7
2,881,316 UART: [art] Derive CDI
2,881,596 UART: [art] Store in slot 0x4
2,967,621 UART: [art] Derive Key Pair
2,967,981 UART: [art] Store priv key in slot 0x5
2,981,269 UART: [art] Derive Key Pair - Done
2,995,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,088 UART: [art] PUB.X = C235C513FFE84ED36497AE07DAFA438BB34CC16D3A140234B2E73A78562B47E9070B3B22D4D3813793645C747A5851E7
3,018,846 UART: [art] PUB.Y = 5A7BC92655AF9ED7C706B6D89D3DF1A4ED019BD83317E92B10CB82476F4E733C0C1641E6CFE7085331F676E647019831
3,025,783 UART: [art] SIG.R = 06F76C469F7BADD968ACCC23F7DC51C24BF9506E2D5C4F4F371774867D92466902B975877654C46D94B129A9B548BBD7
3,032,549 UART: [art] SIG.S = 25E491C79B14E6F55C88FE838F14CA9681FB14F9E8187733F9D1B855095506A5CD9A371ACC6D3EF9D23453336D73499B
3,056,193 UART: Caliptra RT
3,056,444 UART: [state] CFI Enabled
3,175,722 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,778 UART: [rt]cmd =0x44504543, len=92
3,391,054 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
906,931 UART: [kat] SHA2-512-ACC
908,832 UART: [kat] ECC-384
918,657 UART: [kat] HMAC-384Kdf
923,121 UART: [kat] LMS
1,171,449 UART: [kat] --
1,172,296 UART: [cold-reset] ++
1,172,706 UART: [fht] FHT @ 0x50003400
1,175,369 UART: [idev] ++
1,175,537 UART: [idev] CDI.KEYID = 6
1,175,897 UART: [idev] SUBJECT.KEYID = 7
1,176,321 UART: [idev] UDS.KEYID = 0
1,176,666 ready_for_fw is high
1,176,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,938 UART: [idev] Sha1 KeyId Algorithm
1,210,194 UART: [idev] --
1,211,392 UART: [ldev] ++
1,211,560 UART: [ldev] CDI.KEYID = 6
1,211,923 UART: [ldev] SUBJECT.KEYID = 5
1,212,349 UART: [ldev] AUTHORITY.KEYID = 7
1,212,812 UART: [ldev] FE.KEYID = 1
1,217,978 UART: [ldev] Erasing FE.KEYID = 1
1,244,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,070 UART: [ldev] --
1,283,433 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,773 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,181 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,351 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,630 >>> mbox cmd response: success
2,827,630 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,828,764 UART: [afmc] ++
2,828,932 UART: [afmc] CDI.KEYID = 6
2,829,294 UART: [afmc] SUBJECT.KEYID = 7
2,829,719 UART: [afmc] AUTHORITY.KEYID = 5
2,865,306 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,841 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,181 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,882 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,558 UART: [afmc] --
2,908,608 UART: [cold-reset] --
2,909,348 UART: [state] Locking Datavault
2,910,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,333 UART: [state] Locking ICCM
2,911,941 UART: [exit] Launching FMC @ 0x40000130
2,917,271 UART:
2,917,287 UART: Running Caliptra FMC ...
2,917,695 UART:
2,917,838 UART: [state] CFI Enabled
2,928,550 UART: [fht] FMC Alias Private Key: 7
3,047,874 UART: [art] Extend RT PCRs Done
3,048,302 UART: [art] Lock RT PCRs Done
3,049,720 UART: [art] Populate DV Done
3,058,193 UART: [fht] FMC Alias Private Key: 7
3,059,239 UART: [art] Derive CDI
3,059,519 UART: [art] Store in slot 0x4
3,145,598 UART: [art] Derive Key Pair
3,145,958 UART: [art] Store priv key in slot 0x5
3,159,274 UART: [art] Derive Key Pair - Done
3,173,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,459 UART: [art] PUB.X = 3729F08DC2C37168C36E5DF135771AAC375E70EE2E0E4217FE3259D6F427F7BC787034410FADE1C3AC358E3A3041A088
3,197,227 UART: [art] PUB.Y = 6758BC71EAE6C81386FAD9A19EB258AFBFDD4D82099A7557F949B38719ADA91B17FBBC6E16E9CABC1230BF8BC8285F99
3,204,194 UART: [art] SIG.R = 8F94B3E3AA14629D5059341C7560098DFCC9A398EE542740B92FEFD7B732F466A1B9032D15262EC1E1837C01E4CA1163
3,210,955 UART: [art] SIG.S = 58D7286EA1294E9D8BAC90F11C521A8C59C0562E914B849D8FA0BE569E8346C65F9A20AFFBEC1EE70D0321F5A5D17BF3
3,234,909 UART: Caliptra RT
3,235,252 UART: [state] CFI Enabled
3,355,927 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,937 UART: [rt]cmd =0x44504543, len=92
3,572,056 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,508 ready_for_fw is high
1,060,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,419 >>> mbox cmd response: success
2,679,419 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
2,741,778 UART:
2,741,794 UART: Running Caliptra FMC ...
2,742,202 UART:
2,742,345 UART: [state] CFI Enabled
2,752,793 UART: [fht] FMC Alias Private Key: 7
2,871,743 UART: [art] Extend RT PCRs Done
2,872,171 UART: [art] Lock RT PCRs Done
2,873,563 UART: [art] Populate DV Done
2,881,798 UART: [fht] FMC Alias Private Key: 7
2,882,836 UART: [art] Derive CDI
2,883,116 UART: [art] Store in slot 0x4
2,969,271 UART: [art] Derive Key Pair
2,969,631 UART: [art] Store priv key in slot 0x5
2,982,729 UART: [art] Derive Key Pair - Done
2,997,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,987 UART: [art] PUB.X = BFD6266BE5E1B1893CD82D332FD026E9D68BD04433E365E5328834F454E0046A99DFDFD6358750CAC1673BB57E5BFDDC
3,020,766 UART: [art] PUB.Y = 45A50925F34DC48601376FAC2D2AD01B514BD2524196B9D5604584577F910649E33CE96F7A5E161BB652377C699CB8EC
3,027,703 UART: [art] SIG.R = 65DF046F7721E609C611DA0194A410AA2E2F5CEF707F8BF4146B0649A6EDF40F554B1ACAB13D81A2FC93ED38B71BF190
3,034,472 UART: [art] SIG.S = 3AF162B2561B46F9E29B94CB01A390883E04DF67DFBCC37825AEC87633EABBF2992869532BED349ECBAAB3E3FE3FA74F
3,058,228 UART: Caliptra RT
3,058,571 UART: [state] CFI Enabled
3,178,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,531 UART: [rt]cmd =0x44504543, len=92
3,394,285 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_certify_key_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
192,056 UART:
192,443 UART: Running Caliptra ROM ...
193,624 UART:
193,785 UART: [state] CFI Enabled
265,700 UART: [state] LifecycleState = Unprovisioned
267,685 UART: [state] DebugLocked = No
269,632 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,071 UART: [kat] SHA2-256
444,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,225 UART: [kat] ++
455,746 UART: [kat] sha1
467,254 UART: [kat] SHA2-256
469,906 UART: [kat] SHA2-384
475,756 UART: [kat] SHA2-512-ACC
478,123 UART: [kat] ECC-384
2,767,413 UART: [kat] HMAC-384Kdf
2,779,872 UART: [kat] LMS
3,970,208 UART: [kat] --
3,976,426 UART: [cold-reset] ++
3,978,006 UART: [fht] Storing FHT @ 0x50003400
3,988,785 UART: [idev] ++
3,989,361 UART: [idev] CDI.KEYID = 6
3,990,342 UART: [idev] SUBJECT.KEYID = 7
3,991,515 UART: [idev] UDS.KEYID = 0
3,992,519 ready_for_fw is high
3,992,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,773 UART: [idev] Erasing UDS.KEYID = 0
7,327,897 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,780 UART: [idev] --
7,355,744 UART: [ldev] ++
7,356,314 UART: [ldev] CDI.KEYID = 6
7,357,280 UART: [ldev] SUBJECT.KEYID = 5
7,358,490 UART: [ldev] AUTHORITY.KEYID = 7
7,359,720 UART: [ldev] FE.KEYID = 1
7,404,232 UART: [ldev] Erasing FE.KEYID = 1
10,738,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,950 UART: [ldev] --
13,097,033 UART: [fwproc] Waiting for Commands...
13,099,410 UART: [fwproc] Received command 0x46574c44
13,101,595 UART: [fwproc] Received Image of size 118548 bytes
17,199,137 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,274,232 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,347,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,676,594 >>> mbox cmd response: success
17,681,382 UART: [afmc] ++
17,682,006 UART: [afmc] CDI.KEYID = 6
17,682,930 UART: [afmc] SUBJECT.KEYID = 7
17,684,148 UART: [afmc] AUTHORITY.KEYID = 5
21,056,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,353,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,369,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,384,485 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,896 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,420,197 UART: [afmc] --
23,424,273 UART: [cold-reset] --
23,427,494 UART: [state] Locking Datavault
23,432,039 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,744 UART: [state] Locking ICCM
23,434,866 UART: [exit] Launching FMC @ 0x40000130
23,443,259 UART:
23,443,495 UART: Running Caliptra FMC ...
23,444,591 UART:
23,444,758 UART: [state] CFI Enabled
23,513,886 UART: [fht] FMC Alias Private Key: 7
25,854,313 UART: [art] Extend RT PCRs Done
25,855,526 UART: [art] Lock RT PCRs Done
25,857,365 UART: [art] Populate DV Done
25,862,686 UART: [fht] FMC Alias Private Key: 7
25,864,153 UART: [art] Derive CDI
25,864,921 UART: [art] Store in slot 0x4
25,922,285 UART: [art] Derive Key Pair
25,923,281 UART: [art] Store priv key in slot 0x5
29,215,812 UART: [art] Derive Key Pair - Done
29,228,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,517,148 UART: [art] Erasing AUTHORITY.KEYID = 7
31,518,660 UART: [art] PUB.X = 69F9CE78EA30E2821D14BBB2D329A5C198CCDE120BD5A1B4BCAD84049C412C82BD4951B7FEDE8AC08B0A9F6FEF1BED5F
31,525,957 UART: [art] PUB.Y = C791ADAE5D02CAB9DCD7C9E00118274B94F4D13367FA35430738C87BFCC194AA63C54311F5EAAB5B87F2F4FBDC0749CE
31,533,243 UART: [art] SIG.R = AE4D97FD69ED9076C2BD32F2BFB8158FD69B308B1848AED1515E050FCD00BC34F8C13F164EB6182799343DC8217DCA76
31,540,589 UART: [art] SIG.S = C0A42CB3A645E85AE45B43CB43D24C5FAA833E0D8DC997E696189A65EEC06FCAFDBA904F3D48EBDC3B30E1454B88D09D
32,845,629 UART: Caliptra RT
32,846,344 UART: [state] CFI Enabled
33,022,529 UART: [rt] RT listening for mailbox commands...
33,024,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,055,232 UART: [rt]cmd =0x44504543, len=96
38,835,794 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,786,320 ready_for_fw is high
3,786,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,691 >>> mbox cmd response: success
23,628,151 UART:
23,628,534 UART: Running Caliptra FMC ...
23,629,658 UART:
23,629,809 UART: [state] CFI Enabled
23,698,802 UART: [fht] FMC Alias Private Key: 7
26,038,825 UART: [art] Extend RT PCRs Done
26,040,055 UART: [art] Lock RT PCRs Done
26,041,711 UART: [art] Populate DV Done
26,047,132 UART: [fht] FMC Alias Private Key: 7
26,048,680 UART: [art] Derive CDI
26,049,497 UART: [art] Store in slot 0x4
26,107,191 UART: [art] Derive Key Pair
26,108,230 UART: [art] Store priv key in slot 0x5
29,400,471 UART: [art] Derive Key Pair - Done
29,413,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,362 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,860 UART: [art] PUB.X = 62557382FF333A22D595BE1E73C83C55185050B9620C1FCD5AD917A7F6273DFDB2C8C7A6C70172521FFB26F479DE76AF
31,711,105 UART: [art] PUB.Y = 43C7922EDBDD4F30603AC96E271AF458D56373853A626FE25D1B01A14C59CDCC7FC4EB05C6FE94583421460EB16ADCFE
31,718,355 UART: [art] SIG.R = 36A49C70A6E20F52C10DA3C444A03AC60A395E83009E3F63B4DBEE30E7313150274A8061D174BF17DC182437415BB346
31,725,754 UART: [art] SIG.S = B86DEFBEB84305324A95427C416455C8698A6DE61C8AE2ACBA9C46D20123E61BC67050A4E97719B1619CA5412F4ADBE4
33,031,059 UART: Caliptra RT
33,031,782 UART: [state] CFI Enabled
33,210,138 UART: [rt] RT listening for mailbox commands...
33,212,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,826 UART: [rt]cmd =0x44504543, len=96
39,021,174 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,413 writing to cptra_bootfsm_go
193,516 UART:
193,872 UART: Running Caliptra ROM ...
195,063 UART:
604,567 UART: [state] CFI Enabled
621,578 UART: [state] LifecycleState = Unprovisioned
623,535 UART: [state] DebugLocked = No
625,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,721 UART: [kat] SHA2-256
799,517 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,021 UART: [kat] ++
810,559 UART: [kat] sha1
820,725 UART: [kat] SHA2-256
823,442 UART: [kat] SHA2-384
828,429 UART: [kat] SHA2-512-ACC
830,791 UART: [kat] ECC-384
3,115,218 UART: [kat] HMAC-384Kdf
3,127,966 UART: [kat] LMS
4,318,028 UART: [kat] --
4,322,915 UART: [cold-reset] ++
4,324,024 UART: [fht] Storing FHT @ 0x50003400
4,337,146 UART: [idev] ++
4,337,803 UART: [idev] CDI.KEYID = 6
4,338,725 UART: [idev] SUBJECT.KEYID = 7
4,339,965 UART: [idev] UDS.KEYID = 0
4,341,030 ready_for_fw is high
4,341,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,184 UART: [idev] Erasing UDS.KEYID = 0
7,626,317 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,121 UART: [idev] --
7,653,248 UART: [ldev] ++
7,653,863 UART: [ldev] CDI.KEYID = 6
7,654,794 UART: [ldev] SUBJECT.KEYID = 5
7,655,999 UART: [ldev] AUTHORITY.KEYID = 7
7,657,274 UART: [ldev] FE.KEYID = 1
7,670,805 UART: [ldev] Erasing FE.KEYID = 1
10,955,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,868 UART: [ldev] --
13,317,995 UART: [fwproc] Waiting for Commands...
13,320,080 UART: [fwproc] Received command 0x46574c44
13,322,261 UART: [fwproc] Received Image of size 118548 bytes
17,430,120 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,126 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,036 >>> mbox cmd response: success
17,915,330 UART: [afmc] ++
17,915,945 UART: [afmc] CDI.KEYID = 6
17,916,859 UART: [afmc] SUBJECT.KEYID = 7
17,918,070 UART: [afmc] AUTHORITY.KEYID = 5
21,230,960 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,572 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,972 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,693 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,138 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,473 UART: [afmc] --
23,597,982 UART: [cold-reset] --
23,600,810 UART: [state] Locking Datavault
23,604,585 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,349 UART: [state] Locking ICCM
23,607,631 UART: [exit] Launching FMC @ 0x40000130
23,616,021 UART:
23,616,256 UART: Running Caliptra FMC ...
23,617,351 UART:
23,617,506 UART: [state] CFI Enabled
23,625,580 UART: [fht] FMC Alias Private Key: 7
25,965,147 UART: [art] Extend RT PCRs Done
25,966,355 UART: [art] Lock RT PCRs Done
25,968,106 UART: [art] Populate DV Done
25,973,831 UART: [fht] FMC Alias Private Key: 7
25,975,474 UART: [art] Derive CDI
25,976,281 UART: [art] Store in slot 0x4
26,019,140 UART: [art] Derive Key Pair
26,020,171 UART: [art] Store priv key in slot 0x5
29,262,154 UART: [art] Derive Key Pair - Done
29,275,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,624 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,124 UART: [art] PUB.X = 05BA5D600F364C6ACDD40E259205204A4B1996D892276FF6B4BA15C14AAEC425AB33F6C51CB86610FCF50DDE431DCFA3
31,564,359 UART: [art] PUB.Y = 271AD412DC7D0F818C1512778858E9A7F8C7E878770C411EF43E48C611467F5021EDB00B5AAA4C42211739239C04E36A
31,571,633 UART: [art] SIG.R = 3D3E6E873E7133312CD29FB58C35D2E656E6DADDB45884E9E3CD3D533DF91DF13FC3F48DFF04DC553DE5D1A28FC42C1D
31,579,022 UART: [art] SIG.S = 45FF6FF161802DEAD4E9076A5E2E15974F53D81D1D1DC349DC3DB2A30779D93CEFEA46952722733807D4B032A3067E6D
32,884,679 UART: Caliptra RT
32,885,407 UART: [state] CFI Enabled
33,019,746 UART: [rt] RT listening for mailbox commands...
33,021,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,052,156 UART: [rt]cmd =0x44504543, len=96
38,736,689 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
4,126,457 ready_for_fw is high
4,126,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,769 >>> mbox cmd response: success
23,785,693 UART:
23,786,145 UART: Running Caliptra FMC ...
23,787,260 UART:
23,787,423 UART: [state] CFI Enabled
23,795,153 UART: [fht] FMC Alias Private Key: 7
26,135,731 UART: [art] Extend RT PCRs Done
26,136,958 UART: [art] Lock RT PCRs Done
26,138,588 UART: [art] Populate DV Done
26,144,137 UART: [fht] FMC Alias Private Key: 7
26,145,740 UART: [art] Derive CDI
26,146,552 UART: [art] Store in slot 0x4
26,189,199 UART: [art] Derive Key Pair
26,190,194 UART: [art] Store priv key in slot 0x5
29,431,791 UART: [art] Derive Key Pair - Done
29,444,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,238 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,739 UART: [art] PUB.X = 87C55FB1A91A0E1ACE7BE61F905B2C7BB2242F84612D7522FC8F81C4E03E86E57DC480F9C19847501DAE7EF5EC1BC895
31,733,049 UART: [art] PUB.Y = 675BA0DD15052B11896843D9F10570D654A1BAA0A067261DF636D39BDE016D89C1C0BC3C5B3502316E89CEE58188D2DD
31,740,340 UART: [art] SIG.R = F52087F593EC93941C9BC5900A7AF45DA996A7AB0FB0CC3E855D0669207A0528ABFAF20C26313521D531B5954D56B94F
31,747,692 UART: [art] SIG.S = 50E1515FF1DFD412F7D3FDDA1A1B323785A8C63105D2E987677C8F5CD512D29E6B21FF8B92593B0DB24CD29C3D95D88D
33,052,663 UART: Caliptra RT
33,053,381 UART: [state] CFI Enabled
33,186,277 UART: [rt] RT listening for mailbox commands...
33,188,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,218,874 UART: [rt]cmd =0x44504543, len=96
38,902,951 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,138 UART:
192,513 UART: Running Caliptra ROM ...
193,683 UART:
193,835 UART: [state] CFI Enabled
267,012 UART: [state] LifecycleState = Unprovisioned
269,028 UART: [state] DebugLocked = No
270,636 UART: [state] WD Timer not started. Device not locked for debugging
275,024 UART: [kat] SHA2-256
454,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,421 UART: [kat] ++
465,938 UART: [kat] sha1
478,017 UART: [kat] SHA2-256
480,678 UART: [kat] SHA2-384
486,521 UART: [kat] SHA2-512-ACC
488,886 UART: [kat] ECC-384
2,952,184 UART: [kat] HMAC-384Kdf
2,972,301 UART: [kat] LMS
3,448,813 UART: [kat] --
3,453,369 UART: [cold-reset] ++
3,455,647 UART: [fht] FHT @ 0x50003400
3,466,831 UART: [idev] ++
3,467,479 UART: [idev] CDI.KEYID = 6
3,468,388 UART: [idev] SUBJECT.KEYID = 7
3,469,634 UART: [idev] UDS.KEYID = 0
3,470,532 ready_for_fw is high
3,470,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,770 UART: [idev] Erasing UDS.KEYID = 0
5,991,328 UART: [idev] Sha1 KeyId Algorithm
6,014,987 UART: [idev] --
6,020,223 UART: [ldev] ++
6,020,850 UART: [ldev] CDI.KEYID = 6
6,021,761 UART: [ldev] SUBJECT.KEYID = 5
6,022,971 UART: [ldev] AUTHORITY.KEYID = 7
6,024,200 UART: [ldev] FE.KEYID = 1
6,057,824 UART: [ldev] Erasing FE.KEYID = 1
8,565,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,012 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,374 UART: [ldev] --
10,374,111 UART: [fwproc] Wait for Commands...
10,377,056 UART: [fwproc] Recv command 0x46574c44
10,379,103 UART: [fwproc] Recv'd Img size: 118548 bytes
13,871,728 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,835 >>> mbox cmd response: success
14,353,646 UART: [afmc] ++
14,354,273 UART: [afmc] CDI.KEYID = 6
14,355,188 UART: [afmc] SUBJECT.KEYID = 7
14,356,404 UART: [afmc] AUTHORITY.KEYID = 5
16,894,107 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,242 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,428 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,217 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,853 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,951 UART: [afmc] --
18,698,591 UART: [cold-reset] --
18,703,807 UART: [state] Locking Datavault
18,708,672 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,419 UART: [state] Locking ICCM
18,712,670 UART: [exit] Launching FMC @ 0x40000130
18,721,129 UART:
18,721,359 UART: Running Caliptra FMC ...
18,722,453 UART:
18,722,611 UART: [state] CFI Enabled
18,775,776 UART: [fht] FMC Alias Private Key: 7
20,542,286 UART: [art] Extend RT PCRs Done
20,543,505 UART: [art] Lock RT PCRs Done
20,544,778 UART: [art] Populate DV Done
20,550,019 UART: [fht] FMC Alias Private Key: 7
20,551,718 UART: [art] Derive CDI
20,552,531 UART: [art] Store in slot 0x4
20,609,843 UART: [art] Derive Key Pair
20,611,038 UART: [art] Store priv key in slot 0x5
23,073,224 UART: [art] Derive Key Pair - Done
23,086,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,430 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,919 UART: [art] PUB.X = 5A4FC588B3DF5E7E10A25200F847A5C4F930190F79C214BA175FE69CE53FC0C6AB9FC2296D47D47133E1AB3B1A89DB1D
24,808,160 UART: [art] PUB.Y = B58BEF854BC5FAB340224F82D05F1208782B7688EE109EF642E012A72F6A086A47B08E23EADFBB2E1B776BBE48DAB0B4
24,815,443 UART: [art] SIG.R = EACAB53831828E7DFF94B0F2D543AD42AB0B1CFA6889E15169F52B493F8022C09EFA94605BC2351CD1447A2591CD236B
24,822,836 UART: [art] SIG.S = 5FB862185044F249FF01E435BB025CFB36EDC7297AB691FDF11C8AC5FA077B5C9A354AA9E59141DF480A3402904D771C
25,801,571 UART: Caliptra RT
25,802,302 UART: [state] CFI Enabled
25,982,411 UART: [rt] RT listening for mailbox commands...
25,984,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,897 UART: [rt]cmd =0x44504543, len=96
30,389,660 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
3,460,619 ready_for_fw is high
3,461,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,967 >>> mbox cmd response: success
18,496,784 UART:
18,497,174 UART: Running Caliptra FMC ...
18,498,277 UART:
18,498,427 UART: [state] CFI Enabled
18,561,930 UART: [fht] FMC Alias Private Key: 7
20,328,680 UART: [art] Extend RT PCRs Done
20,329,904 UART: [art] Lock RT PCRs Done
20,331,395 UART: [art] Populate DV Done
20,336,809 UART: [fht] FMC Alias Private Key: 7
20,338,511 UART: [art] Derive CDI
20,339,262 UART: [art] Store in slot 0x4
20,395,124 UART: [art] Derive Key Pair
20,396,161 UART: [art] Store priv key in slot 0x5
22,858,976 UART: [art] Derive Key Pair - Done
22,871,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,585,131 UART: [art] Erasing AUTHORITY.KEYID = 7
24,586,639 UART: [art] PUB.X = BBAB14A327ABCCAF72F64970D5F8A5E461F59DDB074BAEC05E915597826CB1AFA513757E1FC3A8A350363F5C0C9F1C21
24,593,950 UART: [art] PUB.Y = CEEF80B8E6203E77BDAA054707C198D87767028658A888B264AC994BBF08D4E2B77055667725C633F310024BA5BAD0BB
24,601,156 UART: [art] SIG.R = E30DA8A5797D623E70A9AEA2538E575F9E58736CDA2D26E68EEE3DF2A9FF2038AE9909157A4C9A6D02BBFD7AE7CA9207
24,608,606 UART: [art] SIG.S = C475EF7986A61D1B34412166B0EF11A9E8D51395FFED48CD6DDAC20F9EF064ADD564F40187D2BC9AAE958639466DB6F6
25,587,548 UART: Caliptra RT
25,588,250 UART: [state] CFI Enabled
25,769,296 UART: [rt] RT listening for mailbox commands...
25,771,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,801,693 UART: [rt]cmd =0x44504543, len=96
30,176,911 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,377 UART:
192,759 UART: Running Caliptra ROM ...
193,886 UART:
603,449 UART: [state] CFI Enabled
620,318 UART: [state] LifecycleState = Unprovisioned
622,266 UART: [state] DebugLocked = No
623,444 UART: [state] WD Timer not started. Device not locked for debugging
627,917 UART: [kat] SHA2-256
807,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,385 UART: [kat] ++
818,839 UART: [kat] sha1
830,565 UART: [kat] SHA2-256
833,294 UART: [kat] SHA2-384
838,581 UART: [kat] SHA2-512-ACC
840,951 UART: [kat] ECC-384
3,282,790 UART: [kat] HMAC-384Kdf
3,295,968 UART: [kat] LMS
3,772,467 UART: [kat] --
3,777,384 UART: [cold-reset] ++
3,778,961 UART: [fht] FHT @ 0x50003400
3,790,720 UART: [idev] ++
3,791,294 UART: [idev] CDI.KEYID = 6
3,792,206 UART: [idev] SUBJECT.KEYID = 7
3,793,454 UART: [idev] UDS.KEYID = 0
3,794,382 ready_for_fw is high
3,794,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,439 UART: [idev] Erasing UDS.KEYID = 0
6,270,323 UART: [idev] Sha1 KeyId Algorithm
6,294,379 UART: [idev] --
6,298,379 UART: [ldev] ++
6,298,950 UART: [ldev] CDI.KEYID = 6
6,299,862 UART: [ldev] SUBJECT.KEYID = 5
6,301,075 UART: [ldev] AUTHORITY.KEYID = 7
6,302,330 UART: [ldev] FE.KEYID = 1
6,313,894 UART: [ldev] Erasing FE.KEYID = 1
8,795,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,208 UART: [ldev] --
10,591,379 UART: [fwproc] Wait for Commands...
10,594,015 UART: [fwproc] Recv command 0x46574c44
10,596,061 UART: [fwproc] Recv'd Img size: 118548 bytes
14,084,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,232 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,253 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,991 >>> mbox cmd response: success
14,570,755 UART: [afmc] ++
14,571,392 UART: [afmc] CDI.KEYID = 6
14,572,312 UART: [afmc] SUBJECT.KEYID = 7
14,573,474 UART: [afmc] AUTHORITY.KEYID = 5
17,078,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,852,347 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,876,936 UART: [afmc] --
18,880,801 UART: [cold-reset] --
18,882,613 UART: [state] Locking Datavault
18,887,434 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,231 UART: [state] Locking ICCM
18,890,313 UART: [exit] Launching FMC @ 0x40000130
18,898,721 UART:
18,898,979 UART: Running Caliptra FMC ...
18,900,088 UART:
18,900,257 UART: [state] CFI Enabled
18,908,093 UART: [fht] FMC Alias Private Key: 7
20,673,958 UART: [art] Extend RT PCRs Done
20,675,182 UART: [art] Lock RT PCRs Done
20,676,730 UART: [art] Populate DV Done
20,682,198 UART: [fht] FMC Alias Private Key: 7
20,683,686 UART: [art] Derive CDI
20,684,449 UART: [art] Store in slot 0x4
20,727,146 UART: [art] Derive Key Pair
20,728,182 UART: [art] Store priv key in slot 0x5
23,155,512 UART: [art] Derive Key Pair - Done
23,168,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,700 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,203 UART: [art] PUB.X = 04B78927DEC465ABE4F66ABE5577C766010BC42707AF817051F8C1AA2492ACF2035A3A3C59F5AC1FCABF92C65B183C4F
24,883,522 UART: [art] PUB.Y = EEEE2B7A864B7E8AAF5161EF4F60A6BA685061B491763557376D23AF9EDCA0304243041B263A4D1F6886449B1F8111D2
24,890,732 UART: [art] SIG.R = 4CC7DF63FAA8BF9681BC4B9B390FC95802B82BFCA34E64284ABE8633A80CCBE7C8EE2176E4C51F29B693BC8349254BF2
24,898,139 UART: [art] SIG.S = A35600A4D4DA420EDB408BD54092D18F3D9ED9785DACB32CB115345B381399C6F50B8346DAB7FCF66434DB80D349A6A6
25,876,729 UART: Caliptra RT
25,877,433 UART: [state] CFI Enabled
26,009,751 UART: [rt] RT listening for mailbox commands...
26,011,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,042,590 UART: [rt]cmd =0x44504543, len=96
30,337,989 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,784,337 ready_for_fw is high
3,784,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,464,982 >>> mbox cmd response: success
18,720,132 UART:
18,720,520 UART: Running Caliptra FMC ...
18,721,725 UART:
18,721,912 UART: [state] CFI Enabled
18,729,690 UART: [fht] FMC Alias Private Key: 7
20,496,051 UART: [art] Extend RT PCRs Done
20,497,272 UART: [art] Lock RT PCRs Done
20,499,278 UART: [art] Populate DV Done
20,504,705 UART: [fht] FMC Alias Private Key: 7
20,506,307 UART: [art] Derive CDI
20,507,127 UART: [art] Store in slot 0x4
20,549,783 UART: [art] Derive Key Pair
20,550,827 UART: [art] Store priv key in slot 0x5
22,978,017 UART: [art] Derive Key Pair - Done
22,991,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,697,369 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,866 UART: [art] PUB.X = 9B2027EAE94629C938AE63551EEC727D1CC6367645AD5B886E22787AB0FBB4AAA5F600EA57A12FCD36AE88B59DEE2002
24,706,179 UART: [art] PUB.Y = A5CCA05F4106513739C15F30C1E46933C09B5B76D6EC27F5CA99711BBF95E33B7C8866742C4B4C2E83C08C41A5C84188
24,713,422 UART: [art] SIG.R = A0A7FC127B098838C8496D9AF423CD75947843A0525F9D2D295CEAEB3BBB93DB264616005F8ADF765818A9A818F5A6F1
24,720,789 UART: [art] SIG.S = 3C5822C3330EC2BD83D5CE782AD1B617D9F14EE016F5563641EEC8B2F268E02B85A00262D04714FF6B169367285AA870
25,699,894 UART: Caliptra RT
25,700,593 UART: [state] CFI Enabled
25,833,643 UART: [rt] RT listening for mailbox commands...
25,835,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,865,899 UART: [rt]cmd =0x44504543, len=96
30,161,502 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
191,984 UART:
192,355 UART: Running Caliptra ROM ...
193,570 UART:
193,741 UART: [state] CFI Enabled
264,744 UART: [state] LifecycleState = Unprovisioned
267,191 UART: [state] DebugLocked = No
269,303 UART: [state] WD Timer not started. Device not locked for debugging
274,419 UART: [kat] SHA2-256
464,283 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,101 UART: [kat] ++
475,552 UART: [kat] sha1
488,343 UART: [kat] SHA2-256
491,394 UART: [kat] SHA2-384
498,316 UART: [kat] SHA2-512-ACC
500,914 UART: [kat] ECC-384
2,947,589 UART: [kat] HMAC-384Kdf
2,971,142 UART: [kat] LMS
3,502,918 UART: [kat] --
3,507,481 UART: [cold-reset] ++
3,510,117 UART: [fht] FHT @ 0x50003400
3,520,804 UART: [idev] ++
3,521,503 UART: [idev] CDI.KEYID = 6
3,522,454 UART: [idev] SUBJECT.KEYID = 7
3,523,692 UART: [idev] UDS.KEYID = 0
3,524,587 ready_for_fw is high
3,524,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,839 UART: [idev] Erasing UDS.KEYID = 0
6,026,280 UART: [idev] Sha1 KeyId Algorithm
6,047,460 UART: [idev] --
6,051,453 UART: [ldev] ++
6,052,150 UART: [ldev] CDI.KEYID = 6
6,053,032 UART: [ldev] SUBJECT.KEYID = 5
6,054,249 UART: [ldev] AUTHORITY.KEYID = 7
6,055,485 UART: [ldev] FE.KEYID = 1
6,098,665 UART: [ldev] Erasing FE.KEYID = 1
8,602,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,483 UART: [ldev] --
10,413,117 UART: [fwproc] Wait for Commands...
10,415,053 UART: [fwproc] Recv command 0x46574c44
10,417,362 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,598 >>> mbox cmd response: success
14,687,891 UART: [afmc] ++
14,688,589 UART: [afmc] CDI.KEYID = 6
14,689,770 UART: [afmc] SUBJECT.KEYID = 7
14,691,258 UART: [afmc] AUTHORITY.KEYID = 5
17,227,868 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,189 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,146 UART: [afmc] --
19,030,687 UART: [cold-reset] --
19,033,850 UART: [state] Locking Datavault
19,040,459 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,630 UART: [state] Locking ICCM
19,044,848 UART: [exit] Launching FMC @ 0x40000130
19,053,526 UART:
19,053,775 UART: Running Caliptra FMC ...
19,054,880 UART:
19,055,037 UART: [state] CFI Enabled
19,111,989 UART: [fht] FMC Alias Private Key: 7
20,878,038 UART: [art] Extend RT PCRs Done
20,879,265 UART: [art] Lock RT PCRs Done
20,880,865 UART: [art] Populate DV Done
20,886,319 UART: [fht] FMC Alias Private Key: 7
20,887,946 UART: [art] Derive CDI
20,888,763 UART: [art] Store in slot 0x4
20,944,115 UART: [art] Derive Key Pair
20,945,113 UART: [art] Store priv key in slot 0x5
23,408,521 UART: [art] Derive Key Pair - Done
23,421,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,134,284 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,793 UART: [art] PUB.X = 9A6170067BF48D6346869AB8AF95A1800E2BC7CB7FE3A2C75396992A133D898B21358E0C406149C4CBE5083F10280BFD
25,142,999 UART: [art] PUB.Y = 0BA06826E1ED6B6EC7B7A83AB8126B9527391003ABE43CCD66CDFF73FDA92B04E6FFA9DF92250CCC40EFB1C9082CD2DB
25,150,309 UART: [art] SIG.R = D914E4D9CEF449C1B63BD89D36776F46E4ACA50BAA38DF619155FF793DCF289AC6618B579110535AF75535B43B09E617
25,157,662 UART: [art] SIG.S = 23541000053FAF92169DC8C34DD640042F3D30FB78BF575CDA45A9B4B962739FC08247B7E82F727EA86A385F9137A00C
26,136,540 UART: Caliptra RT
26,137,256 UART: [state] CFI Enabled
26,318,833 UART: [rt] RT listening for mailbox commands...
26,320,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,351,514 UART: [rt]cmd =0x44504543, len=96
30,725,617 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,439,270 ready_for_fw is high
3,439,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,836 >>> mbox cmd response: success
19,129,865 UART:
19,130,251 UART: Running Caliptra FMC ...
19,131,387 UART:
19,131,555 UART: [state] CFI Enabled
19,200,420 UART: [fht] FMC Alias Private Key: 7
20,966,733 UART: [art] Extend RT PCRs Done
20,967,958 UART: [art] Lock RT PCRs Done
20,969,632 UART: [art] Populate DV Done
20,975,015 UART: [fht] FMC Alias Private Key: 7
20,976,685 UART: [art] Derive CDI
20,977,498 UART: [art] Store in slot 0x4
21,033,612 UART: [art] Derive Key Pair
21,034,614 UART: [art] Store priv key in slot 0x5
23,497,639 UART: [art] Derive Key Pair - Done
23,510,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,208 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,713 UART: [art] PUB.X = 8D00B5B1E0D6D646BF298991AE99B2861D557DB57E18B253A317553E012F661CD71751A2AD72E9D461DF3298C8D2876D
25,231,960 UART: [art] PUB.Y = 1FC5624A04379B723C196D924E50F913BE48BB99D5AC2D4612D36FFE19143F89C5345E22FC5ED61DFC580C9BE83FFB55
25,239,174 UART: [art] SIG.R = 0150FD31B473577EA01CE444267214594B59A2D87543F4E6040F69099C28D5626ABD798A0157CE12217CE1DDF1899ACC
25,246,557 UART: [art] SIG.S = 036F87E309B9C62A63C43E4E2912532B1484E47B2DCA17C5E71B4E88D23E9D0E78BE8300CF245DCB586BDDFDA1670BB2
26,225,509 UART: Caliptra RT
26,226,227 UART: [state] CFI Enabled
26,408,314 UART: [rt] RT listening for mailbox commands...
26,410,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,039 UART: [rt]cmd =0x44504543, len=96
30,816,522 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,629 UART:
192,993 UART: Running Caliptra ROM ...
194,130 UART:
603,786 UART: [state] CFI Enabled
616,827 UART: [state] LifecycleState = Unprovisioned
619,203 UART: [state] DebugLocked = No
622,158 UART: [state] WD Timer not started. Device not locked for debugging
626,792 UART: [kat] SHA2-256
816,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,527 UART: [kat] ++
827,980 UART: [kat] sha1
839,282 UART: [kat] SHA2-256
842,295 UART: [kat] SHA2-384
848,361 UART: [kat] SHA2-512-ACC
850,948 UART: [kat] ECC-384
3,293,402 UART: [kat] HMAC-384Kdf
3,306,707 UART: [kat] LMS
3,838,566 UART: [kat] --
3,841,312 UART: [cold-reset] ++
3,842,897 UART: [fht] FHT @ 0x50003400
3,854,313 UART: [idev] ++
3,855,034 UART: [idev] CDI.KEYID = 6
3,855,951 UART: [idev] SUBJECT.KEYID = 7
3,857,133 UART: [idev] UDS.KEYID = 0
3,858,080 ready_for_fw is high
3,858,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,148 UART: [idev] Erasing UDS.KEYID = 0
6,331,974 UART: [idev] Sha1 KeyId Algorithm
6,353,213 UART: [idev] --
6,358,833 UART: [ldev] ++
6,359,568 UART: [ldev] CDI.KEYID = 6
6,360,488 UART: [ldev] SUBJECT.KEYID = 5
6,361,651 UART: [ldev] AUTHORITY.KEYID = 7
6,362,830 UART: [ldev] FE.KEYID = 1
6,373,266 UART: [ldev] Erasing FE.KEYID = 1
8,852,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,576 UART: [ldev] --
10,645,827 UART: [fwproc] Wait for Commands...
10,647,763 UART: [fwproc] Recv command 0x46574c44
10,650,027 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,724 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,019 >>> mbox cmd response: success
14,910,696 UART: [afmc] ++
14,911,425 UART: [afmc] CDI.KEYID = 6
14,912,624 UART: [afmc] SUBJECT.KEYID = 7
14,914,075 UART: [afmc] AUTHORITY.KEYID = 5
17,417,750 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,281 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,480 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,368 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,162 UART: [afmc] --
19,214,532 UART: [cold-reset] --
19,218,841 UART: [state] Locking Datavault
19,224,271 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,437 UART: [state] Locking ICCM
19,229,145 UART: [exit] Launching FMC @ 0x40000130
19,237,786 UART:
19,238,024 UART: Running Caliptra FMC ...
19,239,133 UART:
19,239,305 UART: [state] CFI Enabled
19,247,250 UART: [fht] FMC Alias Private Key: 7
21,013,092 UART: [art] Extend RT PCRs Done
21,014,320 UART: [art] Lock RT PCRs Done
21,015,845 UART: [art] Populate DV Done
21,021,228 UART: [fht] FMC Alias Private Key: 7
21,022,939 UART: [art] Derive CDI
21,023,762 UART: [art] Store in slot 0x4
21,066,583 UART: [art] Derive Key Pair
21,067,631 UART: [art] Store priv key in slot 0x5
23,494,958 UART: [art] Derive Key Pair - Done
23,507,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,148 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,208 UART: [art] PUB.X = 7DDFA83B697B6B510B2163D140BBAB3AFFA6BB4CC9E17338B8E30A057A3827C362ACBF849F979BD811F6F2CD017EE339
25,222,942 UART: [art] PUB.Y = 9671C6133A9E00E60A78FE5E879D002A94B4F73ACC5F3F03EC9B914B2B4C98C7F30BD4D74089B00E6E169C7E799D653D
25,230,154 UART: [art] SIG.R = 4609E06BD8EE68485837BBAD83AF6EE1DF90BEA11A4BA842B0CBF78E401B273E3A0AA2672F6F3D21367F75603CEC9381
25,237,577 UART: [art] SIG.S = C35733327416BF7B2274BEB77378F88DC7C719B04ACAB731A87301836DB8062AB7E99A86AB8FED0DCF37B26D8FE23C76
26,216,342 UART: Caliptra RT
26,217,067 UART: [state] CFI Enabled
26,350,136 UART: [rt] RT listening for mailbox commands...
26,352,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,382,659 UART: [rt]cmd =0x44504543, len=96
30,678,738 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,529 writing to cptra_bootfsm_go
3,758,122 ready_for_fw is high
3,758,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,885 >>> mbox cmd response: success
19,306,588 UART:
19,306,988 UART: Running Caliptra FMC ...
19,308,203 UART:
19,308,370 UART: [state] CFI Enabled
19,316,059 UART: [fht] FMC Alias Private Key: 7
21,081,963 UART: [art] Extend RT PCRs Done
21,083,225 UART: [art] Lock RT PCRs Done
21,084,438 UART: [art] Populate DV Done
21,089,705 UART: [fht] FMC Alias Private Key: 7
21,091,359 UART: [art] Derive CDI
21,092,181 UART: [art] Store in slot 0x4
21,134,521 UART: [art] Derive Key Pair
21,135,561 UART: [art] Store priv key in slot 0x5
23,562,660 UART: [art] Derive Key Pair - Done
23,575,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,282,188 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,695 UART: [art] PUB.X = BE757D07164CF0570DC1DF05642735B3B9CB910A1A93045542C690FB436C28678B40B12A2C4217ABA7105C05DF56E3BE
25,290,965 UART: [art] PUB.Y = A5891F69377187532C628E3A107FA12088042D723AB37D3C1FFDF11FB5AD674A51F9CE99E244AEE09781C29913A991A9
25,298,185 UART: [art] SIG.R = D62B30E479AC4985E95331E6B5714A3D1051D2F23FBB1AC2ED8B7322C6C81F23D637C15693584417A820F8F32B100F91
25,305,606 UART: [art] SIG.S = 0118AEC9E8A69A19D9844CD1BE90289373638BE2D2064A5123794427681C1432FECD8652F03BBC76597DAFC1D3F53F69
26,284,444 UART: Caliptra RT
26,285,133 UART: [state] CFI Enabled
26,418,592 UART: [rt] RT listening for mailbox commands...
26,420,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,041 UART: [rt]cmd =0x44504543, len=96
30,746,689 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,207 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,825 UART: [kat] SHA2-256
881,756 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,871 UART: [kat] ++
886,023 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
895,118 UART: [kat] SHA2-512-ACC
897,019 UART: [kat] ECC-384
902,924 UART: [kat] HMAC-384Kdf
907,382 UART: [kat] LMS
1,475,578 UART: [kat] --
1,476,605 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,838 UART: [idev] ++
1,480,006 UART: [idev] CDI.KEYID = 6
1,480,366 UART: [idev] SUBJECT.KEYID = 7
1,480,790 UART: [idev] UDS.KEYID = 0
1,481,135 ready_for_fw is high
1,481,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,096 UART: [idev] Erasing UDS.KEYID = 0
1,505,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,146 UART: [idev] --
1,515,201 UART: [ldev] ++
1,515,369 UART: [ldev] CDI.KEYID = 6
1,515,732 UART: [ldev] SUBJECT.KEYID = 5
1,516,158 UART: [ldev] AUTHORITY.KEYID = 7
1,516,621 UART: [ldev] FE.KEYID = 1
1,522,055 UART: [ldev] Erasing FE.KEYID = 1
1,546,990 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,582 UART: [ldev] --
1,586,091 UART: [fwproc] Waiting for Commands...
1,586,926 UART: [fwproc] Received command 0x46574c44
1,587,717 UART: [fwproc] Received Image of size 118548 bytes
2,932,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,267 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,485 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,830 >>> mbox cmd response: success
3,131,930 UART: [afmc] ++
3,132,098 UART: [afmc] CDI.KEYID = 6
3,132,460 UART: [afmc] SUBJECT.KEYID = 7
3,132,885 UART: [afmc] AUTHORITY.KEYID = 5
3,167,860 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,150 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,930 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,522 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,205 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,075 UART: [afmc] --
3,211,001 UART: [cold-reset] --
3,211,915 UART: [state] Locking Datavault
3,213,310 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,914 UART: [state] Locking ICCM
3,214,342 UART: [exit] Launching FMC @ 0x40000130
3,219,672 UART:
3,219,688 UART: Running Caliptra FMC ...
3,220,096 UART:
3,220,150 UART: [state] CFI Enabled
3,230,420 UART: [fht] FMC Alias Private Key: 7
3,349,602 UART: [art] Extend RT PCRs Done
3,350,030 UART: [art] Lock RT PCRs Done
3,351,740 UART: [art] Populate DV Done
3,359,773 UART: [fht] FMC Alias Private Key: 7
3,360,951 UART: [art] Derive CDI
3,361,231 UART: [art] Store in slot 0x4
3,446,919 UART: [art] Derive Key Pair
3,447,279 UART: [art] Store priv key in slot 0x5
3,459,740 UART: [art] Derive Key Pair - Done
3,474,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,596 UART: [art] PUB.X = 7E07284CE8B4E8D5D4B3983120889FF14EAF8F6A8D5DA3EBF9397976AB59FBF814A6469BFD0A1BBB7291160AA68911ED
3,497,371 UART: [art] PUB.Y = 605E3D4D9F84460D852B6A299F0AF9494A9603218E092B82FBD54642ADEB44AA9DF375282A3EFB7C9A81CDACE9B07EC4
3,504,323 UART: [art] SIG.R = F8E1330536966AB784E519D52897F67531E60AD4DA8DC9B71FD1C43B862B09106F5B7E8AD7F39180751158CA69A61D5D
3,511,084 UART: [art] SIG.S = B12E87474CEDBFCF90A8D2F39B58EC2DAFC15BD1755EBC992BAA4C05F61CE12FFD7E878AAD99FE40C357B0D34C07B95E
3,534,820 UART: Caliptra RT
3,535,071 UART: [state] CFI Enabled
3,655,536 UART: [rt] RT listening for mailbox commands...
3,656,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,728 UART: [rt]cmd =0x44504543, len=96
3,878,908 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,095 ready_for_fw is high
1,362,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,874 >>> mbox cmd response: success
3,041,015 UART:
3,041,031 UART: Running Caliptra FMC ...
3,041,439 UART:
3,041,493 UART: [state] CFI Enabled
3,052,119 UART: [fht] FMC Alias Private Key: 7
3,171,023 UART: [art] Extend RT PCRs Done
3,171,451 UART: [art] Lock RT PCRs Done
3,172,979 UART: [art] Populate DV Done
3,181,152 UART: [fht] FMC Alias Private Key: 7
3,182,094 UART: [art] Derive CDI
3,182,374 UART: [art] Store in slot 0x4
3,268,142 UART: [art] Derive Key Pair
3,268,502 UART: [art] Store priv key in slot 0x5
3,281,577 UART: [art] Derive Key Pair - Done
3,296,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,665 UART: [art] PUB.X = C184775178A0BB4B8C478401352E56E71623799485758B1BFCC42DEA6FA614C1CF4A2BB7E641335BC231ABC1A4B55F6D
3,319,438 UART: [art] PUB.Y = 881AED5119027982517C1B71167053BB94740F11E5C50C2C6A1B2C5E5A618CFAC1D1EA30DF2E9679D40858DBB38B7F16
3,326,380 UART: [art] SIG.R = FAC7A6C5F086CF23EFD44FB755F30FD6196E770007B66AF168FB4ACF16886C00313894B9236062355EE64C7718AD738B
3,333,104 UART: [art] SIG.S = 9E1DBDC55158CE7461D951AE93AB38A49323632F821E03D1EBDC2387F1DE0569565B2BB33A401CD8896CD8CFEFC5DEE0
3,356,524 UART: Caliptra RT
3,356,775 UART: [state] CFI Enabled
3,477,068 UART: [rt] RT listening for mailbox commands...
3,477,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,992 UART: [rt]cmd =0x44504543, len=96
3,698,396 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,362 UART: [kat] SHA2-256
882,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,408 UART: [kat] ++
886,560 UART: [kat] sha1
890,740 UART: [kat] SHA2-256
892,678 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
902,811 UART: [kat] HMAC-384Kdf
907,303 UART: [kat] LMS
1,475,499 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,173 UART: [idev] ++
1,479,341 UART: [idev] CDI.KEYID = 6
1,479,701 UART: [idev] SUBJECT.KEYID = 7
1,480,125 UART: [idev] UDS.KEYID = 0
1,480,470 ready_for_fw is high
1,480,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,871 UART: [idev] Erasing UDS.KEYID = 0
1,504,853 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,281 UART: [idev] --
1,514,284 UART: [ldev] ++
1,514,452 UART: [ldev] CDI.KEYID = 6
1,514,815 UART: [ldev] SUBJECT.KEYID = 5
1,515,241 UART: [ldev] AUTHORITY.KEYID = 7
1,515,704 UART: [ldev] FE.KEYID = 1
1,521,092 UART: [ldev] Erasing FE.KEYID = 1
1,546,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,257 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,351 UART: [ldev] --
1,585,662 UART: [fwproc] Waiting for Commands...
1,586,399 UART: [fwproc] Received command 0x46574c44
1,587,190 UART: [fwproc] Received Image of size 118548 bytes
2,931,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,257 >>> mbox cmd response: success
3,131,353 UART: [afmc] ++
3,131,521 UART: [afmc] CDI.KEYID = 6
3,131,883 UART: [afmc] SUBJECT.KEYID = 7
3,132,308 UART: [afmc] AUTHORITY.KEYID = 5
3,167,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,267 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,976 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,859 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,274 UART: [afmc] --
3,210,374 UART: [cold-reset] --
3,211,178 UART: [state] Locking Datavault
3,212,501 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,105 UART: [state] Locking ICCM
3,213,675 UART: [exit] Launching FMC @ 0x40000130
3,219,005 UART:
3,219,021 UART: Running Caliptra FMC ...
3,219,429 UART:
3,219,572 UART: [state] CFI Enabled
3,230,330 UART: [fht] FMC Alias Private Key: 7
3,349,178 UART: [art] Extend RT PCRs Done
3,349,606 UART: [art] Lock RT PCRs Done
3,351,268 UART: [art] Populate DV Done
3,359,675 UART: [fht] FMC Alias Private Key: 7
3,360,647 UART: [art] Derive CDI
3,360,927 UART: [art] Store in slot 0x4
3,447,017 UART: [art] Derive Key Pair
3,447,377 UART: [art] Store priv key in slot 0x5
3,460,214 UART: [art] Derive Key Pair - Done
3,475,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,265 UART: [art] PUB.X = 7577A094DF9CF442160BEA556B0FE398379E3EE063F9E038F5D49B8B3D0EC69C39954DD776DA673A712903CAC85C217C
3,498,029 UART: [art] PUB.Y = D893A6F25E14D7480C2AF5A3A420135E8D3F208ED6B7D3EC1E8AFA7180096AB81B0975D73254F766EE154225A3C381A7
3,504,974 UART: [art] SIG.R = 5C623C26DFE4717F0E16C4EFA81D7A69734C8E7BCCC38902469FE69DD76B1CE44E0C040821AD456D6DBBF437A3E5D362
3,511,743 UART: [art] SIG.S = E03967F69CC150B4ED875F5B99A675F7E9C680E463CCF69102248553605A1FF4B3FDEABBC24E3C6937A51DC732F14DA8
3,535,698 UART: Caliptra RT
3,536,041 UART: [state] CFI Enabled
3,657,065 UART: [rt] RT listening for mailbox commands...
3,657,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,469 UART: [rt]cmd =0x44504543, len=96
3,881,447 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,046 ready_for_fw is high
1,362,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,327 >>> mbox cmd response: success
3,041,340 UART:
3,041,356 UART: Running Caliptra FMC ...
3,041,764 UART:
3,041,907 UART: [state] CFI Enabled
3,052,753 UART: [fht] FMC Alias Private Key: 7
3,172,149 UART: [art] Extend RT PCRs Done
3,172,577 UART: [art] Lock RT PCRs Done
3,174,205 UART: [art] Populate DV Done
3,182,460 UART: [fht] FMC Alias Private Key: 7
3,183,604 UART: [art] Derive CDI
3,183,884 UART: [art] Store in slot 0x4
3,269,488 UART: [art] Derive Key Pair
3,269,848 UART: [art] Store priv key in slot 0x5
3,283,221 UART: [art] Derive Key Pair - Done
3,297,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,938 UART: [art] PUB.X = B07519EC834D8D6EEEDA445623F4500FA7E0694061FA08BB1E812E92BBB4DA2A20F0D001E1A56DBEAE96DBF3178E57E7
3,320,717 UART: [art] PUB.Y = 2ED13E0F2C3E25C05360E92E9FAFF908EDC54E6A70503B44BC179A82EB2244317C483E2DEC94706C856FBDDE8302D6A0
3,327,670 UART: [art] SIG.R = 147F6FDB31FD4C1812708409CE56C327185191E34A42C8F392DDD56505B9697D5786F02EC56C3144B4BA5CC3C53EF9D3
3,334,436 UART: [art] SIG.S = B05ED3D33FB94BB62517090E964CBC10D18385A442B0A62922026C07FD00BA8AD8F63C4818640FE72FE3A539CF5D86C4
3,358,055 UART: Caliptra RT
3,358,398 UART: [state] CFI Enabled
3,479,010 UART: [rt] RT listening for mailbox commands...
3,479,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,116 UART: [rt]cmd =0x44504543, len=96
3,701,971 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,694 UART: [kat] SHA2-256
891,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,348 UART: [kat] ++
895,500 UART: [kat] sha1
899,604 UART: [kat] SHA2-256
901,544 UART: [kat] SHA2-384
904,325 UART: [kat] SHA2-512-ACC
906,226 UART: [kat] ECC-384
915,871 UART: [kat] HMAC-384Kdf
920,515 UART: [kat] LMS
1,168,827 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,688 UART: [idev] ++
1,172,856 UART: [idev] CDI.KEYID = 6
1,173,217 UART: [idev] SUBJECT.KEYID = 7
1,173,642 UART: [idev] UDS.KEYID = 0
1,173,988 ready_for_fw is high
1,173,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,187 UART: [idev] Erasing UDS.KEYID = 0
1,198,069 UART: [idev] Sha1 KeyId Algorithm
1,206,981 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,806 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,511 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,834 UART: [ldev] --
1,280,099 UART: [fwproc] Wait for Commands...
1,280,798 UART: [fwproc] Recv command 0x46574c44
1,281,531 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,540 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,612 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,961 >>> mbox cmd response: success
2,825,207 UART: [afmc] ++
2,825,375 UART: [afmc] CDI.KEYID = 6
2,825,738 UART: [afmc] SUBJECT.KEYID = 7
2,826,164 UART: [afmc] AUTHORITY.KEYID = 5
2,861,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,228 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,568 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,269 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,020 UART: [afmc] --
2,905,081 UART: [cold-reset] --
2,906,025 UART: [state] Locking Datavault
2,907,304 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,908 UART: [state] Locking ICCM
2,908,406 UART: [exit] Launching FMC @ 0x40000130
2,913,736 UART:
2,913,752 UART: Running Caliptra FMC ...
2,914,160 UART:
2,914,214 UART: [state] CFI Enabled
2,924,958 UART: [fht] FMC Alias Private Key: 7
3,043,814 UART: [art] Extend RT PCRs Done
3,044,242 UART: [art] Lock RT PCRs Done
3,046,124 UART: [art] Populate DV Done
3,054,405 UART: [fht] FMC Alias Private Key: 7
3,055,399 UART: [art] Derive CDI
3,055,679 UART: [art] Store in slot 0x4
3,141,550 UART: [art] Derive Key Pair
3,141,910 UART: [art] Store priv key in slot 0x5
3,154,694 UART: [art] Derive Key Pair - Done
3,169,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,422 UART: [art] PUB.X = 46DC4E95F864D09FED0407CA8BD273FED30B0B49F04ECBD339B836CCBB1C8233F74137D7CECF4CB35C5467C6DBB9CA35
3,192,204 UART: [art] PUB.Y = 11D5CBB36E8EADB351646F98D11900DC9F5DE1119EE8DB9D7E95F13DF07878902EAF0BBC0CA94846593EAFC8479D1115
3,199,140 UART: [art] SIG.R = 58F80D1CD87FEADB802291DC9F58F03565743B88036B3C26CB5CE03BAC67405671A1038EEF9BCA6B0C6A9800DCB68CD2
3,205,890 UART: [art] SIG.S = DBDF5E5F381AA21D9B8FA8CDB67C267EB2A53D462606749E236FDA726E0AD340024858FE9221F5099375B6CB85A756B6
3,229,028 UART: Caliptra RT
3,229,279 UART: [state] CFI Enabled
3,348,420 UART: [rt] RT listening for mailbox commands...
3,349,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,502 UART: [rt]cmd =0x44504543, len=96
3,571,847 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,948 ready_for_fw is high
1,058,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,506 >>> mbox cmd response: success
2,738,915 UART:
2,738,931 UART: Running Caliptra FMC ...
2,739,339 UART:
2,739,393 UART: [state] CFI Enabled
2,750,079 UART: [fht] FMC Alias Private Key: 7
2,869,171 UART: [art] Extend RT PCRs Done
2,869,599 UART: [art] Lock RT PCRs Done
2,870,897 UART: [art] Populate DV Done
2,879,446 UART: [fht] FMC Alias Private Key: 7
2,880,414 UART: [art] Derive CDI
2,880,694 UART: [art] Store in slot 0x4
2,966,267 UART: [art] Derive Key Pair
2,966,627 UART: [art] Store priv key in slot 0x5
2,979,755 UART: [art] Derive Key Pair - Done
2,994,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,669 UART: [art] PUB.X = 78E16A5ABC013E23BBD9DAAE7FC72255588FEFC4ED6BA32129DF71EC19918A8A8E2B37007375A6AA672486B28517007A
3,017,402 UART: [art] PUB.Y = 64E07382F8D127B09CD5D6C569FA456B1EA5F30DBBF05FA61FAA858EBDC87BB8B823D50F17B851682F78A77450592C91
3,024,356 UART: [art] SIG.R = D3573C0DB05B162F0E0DBAECE969F3D7A64367970364CE2CEB30B3B98F90F8E67268F72FBBDF8AD91B3A3180784DB53F
3,031,130 UART: [art] SIG.S = 43BF78D319CA733D03D8A3EF78808862709992B9AAAD8EB3A98F92D7A2218FBED97FE7A7ACB35B90295365C74BDA6D38
3,054,151 UART: Caliptra RT
3,054,402 UART: [state] CFI Enabled
3,173,349 UART: [rt] RT listening for mailbox commands...
3,174,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,567 UART: [rt]cmd =0x44504543, len=96
3,396,973 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,029 UART: [kat] SHA2-256
891,579 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,683 UART: [kat] ++
895,835 UART: [kat] sha1
900,119 UART: [kat] SHA2-256
902,059 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,564 UART: [kat] HMAC-384Kdf
921,266 UART: [kat] LMS
1,169,578 UART: [kat] --
1,170,295 UART: [cold-reset] ++
1,170,761 UART: [fht] FHT @ 0x50003400
1,173,357 UART: [idev] ++
1,173,525 UART: [idev] CDI.KEYID = 6
1,173,886 UART: [idev] SUBJECT.KEYID = 7
1,174,311 UART: [idev] UDS.KEYID = 0
1,174,657 ready_for_fw is high
1,174,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,310 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,591 UART: [ldev] ++
1,209,759 UART: [ldev] CDI.KEYID = 6
1,210,123 UART: [ldev] SUBJECT.KEYID = 5
1,210,550 UART: [ldev] AUTHORITY.KEYID = 7
1,211,013 UART: [ldev] FE.KEYID = 1
1,216,317 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,570 UART: [fwproc] Wait for Commands...
1,282,313 UART: [fwproc] Recv command 0x46574c44
1,283,046 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,176 >>> mbox cmd response: success
2,827,378 UART: [afmc] ++
2,827,546 UART: [afmc] CDI.KEYID = 6
2,827,909 UART: [afmc] SUBJECT.KEYID = 7
2,828,335 UART: [afmc] AUTHORITY.KEYID = 5
2,864,466 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,728 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,319 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,020 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,705 UART: [afmc] --
2,907,716 UART: [cold-reset] --
2,908,552 UART: [state] Locking Datavault
2,909,549 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,153 UART: [state] Locking ICCM
2,910,639 UART: [exit] Launching FMC @ 0x40000130
2,915,969 UART:
2,915,985 UART: Running Caliptra FMC ...
2,916,393 UART:
2,916,536 UART: [state] CFI Enabled
2,927,160 UART: [fht] FMC Alias Private Key: 7
3,046,030 UART: [art] Extend RT PCRs Done
3,046,458 UART: [art] Lock RT PCRs Done
3,048,126 UART: [art] Populate DV Done
3,056,459 UART: [fht] FMC Alias Private Key: 7
3,057,455 UART: [art] Derive CDI
3,057,735 UART: [art] Store in slot 0x4
3,143,824 UART: [art] Derive Key Pair
3,144,184 UART: [art] Store priv key in slot 0x5
3,157,888 UART: [art] Derive Key Pair - Done
3,172,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,885 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,650 UART: [art] PUB.X = 29C752A581F07E75404DE8DD4C472A90E833C56BB1A423AAF9CF0DDB01D514637532DFC3FC59D869E3249F9E6FF0FCE5
3,195,428 UART: [art] PUB.Y = 8BC085C308D35DE94A0DDD8DFFA214596157D2FD42148FCBB590615FE4DB1959921550643B68CADAC771CEFFBABE26A9
3,202,390 UART: [art] SIG.R = 65FBA3B55D493FE8F9E06C3A1C370CF63F40BED22CBEFEB38341B1E262847E08BE24167F3716E0B070504647B39A5054
3,209,160 UART: [art] SIG.S = C40963AABA33CBCFE5F04F0D362E76C608C7085E1A037FC5AA9C42087C4120F77EA66C4DD6828642365081646EC3DD4C
3,232,778 UART: Caliptra RT
3,233,121 UART: [state] CFI Enabled
3,353,442 UART: [rt] RT listening for mailbox commands...
3,354,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,590 UART: [rt]cmd =0x44504543, len=96
3,576,978 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,267 ready_for_fw is high
1,060,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,159 >>> mbox cmd response: success
2,742,678 UART:
2,742,694 UART: Running Caliptra FMC ...
2,743,102 UART:
2,743,245 UART: [state] CFI Enabled
2,753,899 UART: [fht] FMC Alias Private Key: 7
2,873,713 UART: [art] Extend RT PCRs Done
2,874,141 UART: [art] Lock RT PCRs Done
2,875,935 UART: [art] Populate DV Done
2,884,208 UART: [fht] FMC Alias Private Key: 7
2,885,390 UART: [art] Derive CDI
2,885,670 UART: [art] Store in slot 0x4
2,971,235 UART: [art] Derive Key Pair
2,971,595 UART: [art] Store priv key in slot 0x5
2,985,375 UART: [art] Derive Key Pair - Done
2,999,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,784 UART: [art] PUB.X = 328A2E89B856CE61AA93911665AEC6B2421D7BFC0D0DAAA3A309888BED859AF4252A92A45B6667F4976F156796FDA6C1
3,022,553 UART: [art] PUB.Y = C93CB2D483C648B2400286CDD1A282B058CE67F7FBAB066E9F63EECE090CEB8B28A816ABA475E77A1CE265965F28D276
3,029,505 UART: [art] SIG.R = CB3FCFE7AA104D712526FD6CE697ED32AEA47C50E8BEF1B68266FE12E2F3CCC666D210E8E97F2C8066AD04BAE2109B46
3,036,294 UART: [art] SIG.S = E047715A4B7FC9C6662288DEF3FC6EE064C21F96BAC3A0BE8E64F8E109EBA7F05EA586186543530D4EFECE8ADF6834DA
3,060,236 UART: Caliptra RT
3,060,579 UART: [state] CFI Enabled
3,180,095 UART: [rt] RT listening for mailbox commands...
3,180,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,821 UART: [rt]cmd =0x44504543, len=96
3,402,437 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,930 UART: [state] LifecycleState = Unprovisioned
85,585 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,799 UART: [kat] SHA2-256
903,739 UART: [kat] SHA2-384
906,436 UART: [kat] SHA2-512-ACC
908,337 UART: [kat] ECC-384
918,340 UART: [kat] HMAC-384Kdf
922,774 UART: [kat] LMS
1,171,102 UART: [kat] --
1,171,675 UART: [cold-reset] ++
1,172,181 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 ready_for_fw is high
1,176,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,468 UART: [idev] Erasing UDS.KEYID = 0
1,200,441 UART: [idev] Sha1 KeyId Algorithm
1,208,761 UART: [idev] --
1,209,861 UART: [ldev] ++
1,210,029 UART: [ldev] CDI.KEYID = 6
1,210,392 UART: [ldev] SUBJECT.KEYID = 5
1,210,818 UART: [ldev] AUTHORITY.KEYID = 7
1,211,281 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,491 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,549 >>> mbox cmd response: success
2,827,663 UART: [afmc] ++
2,827,831 UART: [afmc] CDI.KEYID = 6
2,828,193 UART: [afmc] SUBJECT.KEYID = 7
2,828,618 UART: [afmc] AUTHORITY.KEYID = 5
2,863,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,854 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,602 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,194 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,895 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,703 UART: [afmc] --
2,907,749 UART: [cold-reset] --
2,908,655 UART: [state] Locking Datavault
2,909,710 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,314 UART: [state] Locking ICCM
2,910,986 UART: [exit] Launching FMC @ 0x40000130
2,916,316 UART:
2,916,332 UART: Running Caliptra FMC ...
2,916,740 UART:
2,916,794 UART: [state] CFI Enabled
2,927,314 UART: [fht] FMC Alias Private Key: 7
3,045,982 UART: [art] Extend RT PCRs Done
3,046,410 UART: [art] Lock RT PCRs Done
3,048,086 UART: [art] Populate DV Done
3,056,401 UART: [fht] FMC Alias Private Key: 7
3,057,555 UART: [art] Derive CDI
3,057,835 UART: [art] Store in slot 0x4
3,143,556 UART: [art] Derive Key Pair
3,143,916 UART: [art] Store priv key in slot 0x5
3,157,428 UART: [art] Derive Key Pair - Done
3,172,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,617 UART: [art] PUB.X = DDCB423F229626CC427F952560488AA03626F87460FDCD6A911E9F1032DC7E3E690ECC181F6455CC8925975CAA850EBC
3,195,387 UART: [art] PUB.Y = 37A42EA4D74CB5DF803F3DF183123B90C8E62699BC5CF221442934E2B803F3B52860BED945157A82A41E1E5CC725AFE0
3,202,340 UART: [art] SIG.R = 73ED0E043E23F21C2EBF4482AD1DB573A23395FEF392305EA111C08DA6732AB3E8051FB556BB0B29AEB004BF622953F9
3,209,105 UART: [art] SIG.S = 60B1F06198236D1FF089CC7A1ABB83DAC9EE508A91A1945FAAC27E3B955FD89FF10F35C05C20AFA6BDC8B5E4D9E3AF32
3,232,884 UART: Caliptra RT
3,233,135 UART: [state] CFI Enabled
3,352,031 UART: [rt] RT listening for mailbox commands...
3,352,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,043 UART: [rt]cmd =0x44504543, len=96
3,575,532 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,941 ready_for_fw is high
1,058,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,062 >>> mbox cmd response: success
2,739,615 UART:
2,739,631 UART: Running Caliptra FMC ...
2,740,039 UART:
2,740,093 UART: [state] CFI Enabled
2,750,461 UART: [fht] FMC Alias Private Key: 7
2,869,639 UART: [art] Extend RT PCRs Done
2,870,067 UART: [art] Lock RT PCRs Done
2,871,637 UART: [art] Populate DV Done
2,879,798 UART: [fht] FMC Alias Private Key: 7
2,880,812 UART: [art] Derive CDI
2,881,092 UART: [art] Store in slot 0x4
2,967,157 UART: [art] Derive Key Pair
2,967,517 UART: [art] Store priv key in slot 0x5
2,980,059 UART: [art] Derive Key Pair - Done
2,994,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,438 UART: [art] PUB.X = E98379A665ED44FA890D75C6DCB4AD315E7B832786BED548B67F7637FFB3E6CDD63CFFA4206A0D76AF43A8709A28951D
3,018,216 UART: [art] PUB.Y = 32CDA465BECC84A7787235B2FAF36D4A4A4034514FA41450BBBAF5C494A34D8770069CB28E91B47979277864E47C8906
3,025,160 UART: [art] SIG.R = 2FB5584A002A9C6A8D460EC52038B03AE685B1F1C0D2676A16AEB7590225FEF61E1A4CBEE7AFB11511417B37F7CE0CEB
3,031,915 UART: [art] SIG.S = 413BE41F31BD1E4083B3B13B20F8897CA22089E25952BFDF93A77C93B974B834BE48CB06AC93F86DA0CA8F303F2394E5
3,055,770 UART: Caliptra RT
3,056,021 UART: [state] CFI Enabled
3,175,505 UART: [rt] RT listening for mailbox commands...
3,176,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,443 UART: [rt]cmd =0x44504543, len=96
3,398,500 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,713 UART: [state] LifecycleState = Unprovisioned
86,368 UART: [state] DebugLocked = No
87,100 UART: [state] WD Timer not started. Device not locked for debugging
88,437 UART: [kat] SHA2-256
894,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,212 UART: [kat] ++
898,364 UART: [kat] sha1
902,546 UART: [kat] SHA2-256
904,486 UART: [kat] SHA2-384
907,295 UART: [kat] SHA2-512-ACC
909,196 UART: [kat] ECC-384
919,111 UART: [kat] HMAC-384Kdf
923,719 UART: [kat] LMS
1,172,047 UART: [kat] --
1,172,818 UART: [cold-reset] ++
1,173,206 UART: [fht] FHT @ 0x50003400
1,175,907 UART: [idev] ++
1,176,075 UART: [idev] CDI.KEYID = 6
1,176,435 UART: [idev] SUBJECT.KEYID = 7
1,176,859 UART: [idev] UDS.KEYID = 0
1,177,204 ready_for_fw is high
1,177,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,397 UART: [idev] Erasing UDS.KEYID = 0
1,202,612 UART: [idev] Sha1 KeyId Algorithm
1,210,966 UART: [idev] --
1,211,976 UART: [ldev] ++
1,212,144 UART: [ldev] CDI.KEYID = 6
1,212,507 UART: [ldev] SUBJECT.KEYID = 5
1,212,933 UART: [ldev] AUTHORITY.KEYID = 7
1,213,396 UART: [ldev] FE.KEYID = 1
1,218,622 UART: [ldev] Erasing FE.KEYID = 1
1,244,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,160 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,776 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,831 UART: [fwproc] Recv command 0x46574c44
1,285,559 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,525 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,695 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,020 >>> mbox cmd response: success
2,830,216 UART: [afmc] ++
2,830,384 UART: [afmc] CDI.KEYID = 6
2,830,746 UART: [afmc] SUBJECT.KEYID = 7
2,831,171 UART: [afmc] AUTHORITY.KEYID = 5
2,867,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,897 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,489 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,190 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,038 UART: [afmc] --
2,910,978 UART: [cold-reset] --
2,911,994 UART: [state] Locking Datavault
2,913,161 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,765 UART: [state] Locking ICCM
2,914,321 UART: [exit] Launching FMC @ 0x40000130
2,919,651 UART:
2,919,667 UART: Running Caliptra FMC ...
2,920,075 UART:
2,920,218 UART: [state] CFI Enabled
2,930,768 UART: [fht] FMC Alias Private Key: 7
3,049,814 UART: [art] Extend RT PCRs Done
3,050,242 UART: [art] Lock RT PCRs Done
3,051,570 UART: [art] Populate DV Done
3,059,567 UART: [fht] FMC Alias Private Key: 7
3,060,593 UART: [art] Derive CDI
3,060,873 UART: [art] Store in slot 0x4
3,146,556 UART: [art] Derive Key Pair
3,146,916 UART: [art] Store priv key in slot 0x5
3,160,426 UART: [art] Derive Key Pair - Done
3,175,193 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,505 UART: [art] PUB.X = D58CCE4FCCF03D4ACDFBF6E530A2C5B3A916421653811B763FB2B48375818B2EA7AA370DEB649A805F9446BFC2F5C9B4
3,198,290 UART: [art] PUB.Y = E11B6C69E4B2DC569F70B18D07D4B1CFFBD57CCEA4BC801E0603E735EBED13F10EADEF70160907BC31B19129F806D092
3,205,237 UART: [art] SIG.R = 3BAAB0B0113481AE97B65CD739B455D3D80914A9617A2F6A1CD86C99850216953200A363A04246AA5F4AFE3A837162E4
3,211,977 UART: [art] SIG.S = D0027B9D8CCD8B8B6DE08E2FC2A5B63AF62E44181FE3CA0147DE91325CC623A8B68CB61D4ED941BB051C2E9907AC47A7
3,235,683 UART: Caliptra RT
3,236,026 UART: [state] CFI Enabled
3,356,057 UART: [rt] RT listening for mailbox commands...
3,356,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,093 UART: [rt]cmd =0x44504543, len=96
3,578,738 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,528 ready_for_fw is high
1,060,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,649 >>> mbox cmd response: success
2,743,776 UART:
2,743,792 UART: Running Caliptra FMC ...
2,744,200 UART:
2,744,343 UART: [state] CFI Enabled
2,754,823 UART: [fht] FMC Alias Private Key: 7
2,873,653 UART: [art] Extend RT PCRs Done
2,874,081 UART: [art] Lock RT PCRs Done
2,875,855 UART: [art] Populate DV Done
2,884,308 UART: [fht] FMC Alias Private Key: 7
2,885,384 UART: [art] Derive CDI
2,885,664 UART: [art] Store in slot 0x4
2,971,773 UART: [art] Derive Key Pair
2,972,133 UART: [art] Store priv key in slot 0x5
2,985,527 UART: [art] Derive Key Pair - Done
3,000,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,634 UART: [art] PUB.X = 73376C4AE92A42415DB222B241786F060C83C8C8EA6CF45B1CE7A103382A9A8AFFF45D68D69697701BB8C5CADDABB909
3,023,404 UART: [art] PUB.Y = E7CAF2DF3BE38B436F5E052D539F4754D2292715427900D466AC9BF950F16CE56B030C81D02EB2523CEF2AF0FEE080C3
3,030,333 UART: [art] SIG.R = 4F4B90EC25CD6D3FFFAC5811E18AA6F74ED1761A2EDECF145FEF6649819148D76EF4AD03A53764F5268A771FB7613CE9
3,037,116 UART: [art] SIG.S = A06355E3FC58169EA87F90F010FDA151EF42C948E019D0E68468563378CDBA7D63A7DA385316624F9E1C1DB9994C1ABF
3,061,036 UART: Caliptra RT
3,061,379 UART: [state] CFI Enabled
3,181,124 UART: [rt] RT listening for mailbox commands...
3,181,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,886 UART: [rt]cmd =0x44504543, len=96
3,403,733 >>> mbox cmd response data (6236 bytes)
test test_invoke_dpe::test_invoke_dpe_export_cdi_with_non_critical_dice_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,008 UART:
192,374 UART: Running Caliptra ROM ...
193,511 UART:
193,667 UART: [state] CFI Enabled
265,884 UART: [state] LifecycleState = Unprovisioned
267,820 UART: [state] DebugLocked = No
270,468 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,747 UART: [kat] SHA2-256
445,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,906 UART: [kat] ++
456,430 UART: [kat] sha1
467,657 UART: [kat] SHA2-256
470,307 UART: [kat] SHA2-384
475,442 UART: [kat] SHA2-512-ACC
477,811 UART: [kat] ECC-384
2,766,894 UART: [kat] HMAC-384Kdf
2,780,343 UART: [kat] LMS
3,970,652 UART: [kat] --
3,974,947 UART: [cold-reset] ++
3,976,813 UART: [fht] Storing FHT @ 0x50003400
3,988,792 UART: [idev] ++
3,989,353 UART: [idev] CDI.KEYID = 6
3,990,334 UART: [idev] SUBJECT.KEYID = 7
3,991,577 UART: [idev] UDS.KEYID = 0
3,992,575 ready_for_fw is high
3,992,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,886 UART: [idev] Erasing UDS.KEYID = 0
7,328,483 UART: [idev] Using Sha1 for KeyId Algorithm
7,351,639 UART: [idev] --
7,355,579 UART: [ldev] ++
7,356,147 UART: [ldev] CDI.KEYID = 6
7,357,166 UART: [ldev] SUBJECT.KEYID = 5
7,358,325 UART: [ldev] AUTHORITY.KEYID = 7
7,359,608 UART: [ldev] FE.KEYID = 1
7,402,939 UART: [ldev] Erasing FE.KEYID = 1
10,735,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,935 UART: [ldev] --
13,097,716 UART: [fwproc] Waiting for Commands...
13,100,896 UART: [fwproc] Received command 0x46574c44
13,103,076 UART: [fwproc] Received Image of size 118548 bytes
17,209,584 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,942 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,114 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,684,048 >>> mbox cmd response: success
17,687,447 UART: [afmc] ++
17,688,069 UART: [afmc] CDI.KEYID = 6
17,688,988 UART: [afmc] SUBJECT.KEYID = 7
17,690,208 UART: [afmc] AUTHORITY.KEYID = 5
21,047,630 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,343,720 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,345,978 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,360,452 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,375,144 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,389,582 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,411,155 UART: [afmc] --
23,414,427 UART: [cold-reset] --
23,419,097 UART: [state] Locking Datavault
23,423,965 UART: [state] Locking PCR0, PCR1 and PCR31
23,425,658 UART: [state] Locking ICCM
23,427,083 UART: [exit] Launching FMC @ 0x40000130
23,435,481 UART:
23,435,714 UART: Running Caliptra FMC ...
23,436,739 UART:
23,436,888 UART: [state] CFI Enabled
23,503,768 UART: [fht] FMC Alias Private Key: 7
25,844,810 UART: [art] Extend RT PCRs Done
25,846,044 UART: [art] Lock RT PCRs Done
25,847,674 UART: [art] Populate DV Done
25,853,279 UART: [fht] FMC Alias Private Key: 7
25,854,820 UART: [art] Derive CDI
25,855,580 UART: [art] Store in slot 0x4
25,912,200 UART: [art] Derive Key Pair
25,913,245 UART: [art] Store priv key in slot 0x5
29,206,313 UART: [art] Derive Key Pair - Done
29,219,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,509,812 UART: [art] Erasing AUTHORITY.KEYID = 7
31,511,589 UART: [art] PUB.X = B1913EA6E1982489B3F6C775DFF75311BB1297E7F085540688B58EF423BC7D75662E002FDAADC659B48793FD1B50FFD2
31,518,624 UART: [art] PUB.Y = E83FAB13CC774120702ABDBBDC46B875E11D29A307571CE1BF1E2617E2C4BC176C8A5BCD4AF0DED80634908F03A0E298
31,525,907 UART: [art] SIG.R = D26A8431D45A2EB78D93D2A7CBE7879FB3BB98D24C2EFD3B644AC61D8434289D0CBF23A2416D52A374DFDDB5D0A78642
31,533,309 UART: [art] SIG.S = C0DFAE3D5F86EF8F53F1776D84F100ADF9B22266CC0758C849D5A2C1E173C3F0D969EA1C76737EDC92F8645F1455DEC7
32,838,649 UART: Caliptra RT
32,840,008 UART: [state] CFI Enabled
33,020,865 UART: [rt] RT listening for mailbox commands...
33,023,024 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,053,071 UART: [rt]cmd =0x44504543, len=28
33,095,952 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,784,327 ready_for_fw is high
3,784,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,075 >>> mbox cmd response: success
23,629,488 UART:
23,629,893 UART: Running Caliptra FMC ...
23,631,034 UART:
23,631,202 UART: [state] CFI Enabled
23,699,241 UART: [fht] FMC Alias Private Key: 7
26,039,265 UART: [art] Extend RT PCRs Done
26,040,487 UART: [art] Lock RT PCRs Done
26,042,300 UART: [art] Populate DV Done
26,047,451 UART: [fht] FMC Alias Private Key: 7
26,049,046 UART: [art] Derive CDI
26,049,865 UART: [art] Store in slot 0x4
26,107,837 UART: [art] Derive Key Pair
26,108,874 UART: [art] Store priv key in slot 0x5
29,401,454 UART: [art] Derive Key Pair - Done
29,414,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,476 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,991 UART: [art] PUB.X = 07A0EDF81F53D5CA54FADEDDE3B46C872A5FB798BD6DC25B050BDBC5D27F512CAF76A67F340E4AE321EC04A1BC690F94
31,711,296 UART: [art] PUB.Y = 5B9A590472A9E7BE85439B01C63924AD9859B22681B80FE5212EC8CAAA445378BBD36FDB81B8851DF1639C0B7A5C5A82
31,718,543 UART: [art] SIG.R = BE2718D71C771E56379427A2CD7DDDD873724C46BCC1DF2D7B16AEE5F82669C944F2F30F4CF1AD97C1F03C8DFE613FFC
31,725,940 UART: [art] SIG.S = 5259FB3C5F17876AA8058BE5E51AE78FA4AEB3B8DD92320D0CCCC7EF68267C1E0F038D94292A6EA40C7B7D4DBB39323C
33,031,356 UART: Caliptra RT
33,032,078 UART: [state] CFI Enabled
33,209,568 UART: [rt] RT listening for mailbox commands...
33,211,504 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,241,366 UART: [rt]cmd =0x44504543, len=28
33,284,158 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
192,429 UART:
192,797 UART: Running Caliptra ROM ...
193,887 UART:
603,486 UART: [state] CFI Enabled
617,216 UART: [state] LifecycleState = Unprovisioned
619,161 UART: [state] DebugLocked = No
620,823 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,032 UART: [kat] SHA2-256
795,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,380 UART: [kat] ++
806,830 UART: [kat] sha1
817,129 UART: [kat] SHA2-256
819,847 UART: [kat] SHA2-384
825,350 UART: [kat] SHA2-512-ACC
827,726 UART: [kat] ECC-384
3,114,298 UART: [kat] HMAC-384Kdf
3,125,945 UART: [kat] LMS
4,316,032 UART: [kat] --
4,320,632 UART: [cold-reset] ++
4,323,135 UART: [fht] Storing FHT @ 0x50003400
4,334,906 UART: [idev] ++
4,335,470 UART: [idev] CDI.KEYID = 6
4,336,457 UART: [idev] SUBJECT.KEYID = 7
4,337,694 UART: [idev] UDS.KEYID = 0
4,338,714 ready_for_fw is high
4,338,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,842 UART: [idev] Erasing UDS.KEYID = 0
7,625,477 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,425 UART: [idev] --
7,649,603 UART: [ldev] ++
7,650,180 UART: [ldev] CDI.KEYID = 6
7,651,059 UART: [ldev] SUBJECT.KEYID = 5
7,652,320 UART: [ldev] AUTHORITY.KEYID = 7
7,653,597 UART: [ldev] FE.KEYID = 1
7,662,968 UART: [ldev] Erasing FE.KEYID = 1
10,954,565 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,386 UART: [ldev] --
13,318,741 UART: [fwproc] Waiting for Commands...
13,320,725 UART: [fwproc] Received command 0x46574c44
13,322,898 UART: [fwproc] Received Image of size 118548 bytes
17,431,916 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,396 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,581,566 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,522 >>> mbox cmd response: success
17,914,203 UART: [afmc] ++
17,914,833 UART: [afmc] CDI.KEYID = 6
17,915,746 UART: [afmc] SUBJECT.KEYID = 7
17,916,957 UART: [afmc] AUTHORITY.KEYID = 5
21,233,981 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,719 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,438 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,167 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,572 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,714 UART: [afmc] --
23,597,816 UART: [cold-reset] --
23,602,753 UART: [state] Locking Datavault
23,609,151 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,898 UART: [state] Locking ICCM
23,613,453 UART: [exit] Launching FMC @ 0x40000130
23,621,840 UART:
23,622,077 UART: Running Caliptra FMC ...
23,623,101 UART:
23,623,242 UART: [state] CFI Enabled
23,631,554 UART: [fht] FMC Alias Private Key: 7
25,971,980 UART: [art] Extend RT PCRs Done
25,973,200 UART: [art] Lock RT PCRs Done
25,974,906 UART: [art] Populate DV Done
25,980,370 UART: [fht] FMC Alias Private Key: 7
25,981,847 UART: [art] Derive CDI
25,982,574 UART: [art] Store in slot 0x4
26,025,215 UART: [art] Derive Key Pair
26,026,209 UART: [art] Store priv key in slot 0x5
29,268,165 UART: [art] Derive Key Pair - Done
29,280,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,328 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,834 UART: [art] PUB.X = E37DF862D8C548B3D666B889FF16AF321F2AA02C0C792D150EEC456F4EEEEB97F1D3F5FFCBDA4FF68C54D8FE90F28ECC
31,570,139 UART: [art] PUB.Y = CC0980134E7770E31BE75BF859B43EB5EAC2738140A8C2333BE5FB6307956FC5CFCBA0365EB6C7234B33313B468544F8
31,577,411 UART: [art] SIG.R = 8B8E7B57E39419152B8BD4E1695944058DDF871D860D7ACC6CB7773A9BAB98A921D6B59D608C88AC75A7CF238A4D7DDF
31,584,787 UART: [art] SIG.S = BEE4C65B541E8C714BFE7AB3921BAB095CE027B14CDB1E1E03B2CAFF257E023D6D87834DEF1A473F204518E74A8EF9D1
32,890,067 UART: Caliptra RT
32,890,794 UART: [state] CFI Enabled
33,023,802 UART: [rt] RT listening for mailbox commands...
33,025,725 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,055,522 UART: [rt]cmd =0x44504543, len=28
33,098,672 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
4,129,093 ready_for_fw is high
4,129,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,349 >>> mbox cmd response: success
23,797,843 UART:
23,798,851 UART: Running Caliptra FMC ...
23,799,980 UART:
23,800,140 UART: [state] CFI Enabled
23,807,662 UART: [fht] FMC Alias Private Key: 7
26,147,536 UART: [art] Extend RT PCRs Done
26,149,029 UART: [art] Lock RT PCRs Done
26,150,043 UART: [art] Populate DV Done
26,155,505 UART: [fht] FMC Alias Private Key: 7
26,157,065 UART: [art] Derive CDI
26,157,787 UART: [art] Store in slot 0x4
26,200,450 UART: [art] Derive Key Pair
26,201,855 UART: [art] Store priv key in slot 0x5
29,443,319 UART: [art] Derive Key Pair - Done
29,456,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,304 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,820 UART: [art] PUB.X = 86882E4B976E1469C7F1170E1D52395C8201C455114064EA6742D6F0DFBCD19EA29BACBB84CC83D8E1A9F4454B755B91
31,745,072 UART: [art] PUB.Y = 6528590D3D3293C49BC1B6A25DA5B61BD09E68AB3F12CD7FCB5A6BABCFA9C070C239191883F508C0865329FBA836AD56
31,752,325 UART: [art] SIG.R = 02E5F61FC75CAB5FE9BB418031FE1F542563E524D7688F9211AA8BCC2479DEC3FF93DE997A403673C4418E74C3A40D62
31,759,727 UART: [art] SIG.S = 613F5B1789448EF34BBF229B051DD9413539A7A27603078D5FEEB5A369C1FC4F1D091CF88D4C4E10D499145C9A48217B
33,065,137 UART: Caliptra RT
33,065,869 UART: [state] CFI Enabled
33,198,438 UART: [rt] RT listening for mailbox commands...
33,200,360 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,230,569 UART: [rt]cmd =0x44504543, len=28
33,273,532 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,212 UART:
192,568 UART: Running Caliptra ROM ...
193,735 UART:
193,885 UART: [state] CFI Enabled
264,745 UART: [state] LifecycleState = Unprovisioned
266,728 UART: [state] DebugLocked = No
269,182 UART: [state] WD Timer not started. Device not locked for debugging
273,142 UART: [kat] SHA2-256
452,837 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,601 UART: [kat] ++
464,075 UART: [kat] sha1
474,827 UART: [kat] SHA2-256
477,788 UART: [kat] SHA2-384
484,482 UART: [kat] SHA2-512-ACC
486,860 UART: [kat] ECC-384
2,950,004 UART: [kat] HMAC-384Kdf
2,971,991 UART: [kat] LMS
3,448,476 UART: [kat] --
3,452,896 UART: [cold-reset] ++
3,454,399 UART: [fht] FHT @ 0x50003400
3,466,719 UART: [idev] ++
3,467,277 UART: [idev] CDI.KEYID = 6
3,468,253 UART: [idev] SUBJECT.KEYID = 7
3,469,493 UART: [idev] UDS.KEYID = 0
3,470,418 ready_for_fw is high
3,470,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,680 UART: [idev] Erasing UDS.KEYID = 0
5,991,810 UART: [idev] Sha1 KeyId Algorithm
6,015,070 UART: [idev] --
6,020,558 UART: [ldev] ++
6,021,140 UART: [ldev] CDI.KEYID = 6
6,022,054 UART: [ldev] SUBJECT.KEYID = 5
6,023,271 UART: [ldev] AUTHORITY.KEYID = 7
6,024,499 UART: [ldev] FE.KEYID = 1
6,059,444 UART: [ldev] Erasing FE.KEYID = 1
8,567,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,654 UART: [ldev] --
10,375,504 UART: [fwproc] Wait for Commands...
10,377,519 UART: [fwproc] Recv command 0x46574c44
10,379,559 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,154 >>> mbox cmd response: success
14,350,154 UART: [afmc] ++
14,350,766 UART: [afmc] CDI.KEYID = 6
14,351,681 UART: [afmc] SUBJECT.KEYID = 7
14,352,897 UART: [afmc] AUTHORITY.KEYID = 5
16,895,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,864 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,909 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,478 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,495 UART: [afmc] --
18,717,751 UART: [cold-reset] --
18,722,413 UART: [state] Locking Datavault
18,727,771 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,470 UART: [state] Locking ICCM
18,730,859 UART: [exit] Launching FMC @ 0x40000130
18,739,252 UART:
18,739,495 UART: Running Caliptra FMC ...
18,740,600 UART:
18,740,761 UART: [state] CFI Enabled
18,798,043 UART: [fht] FMC Alias Private Key: 7
20,564,506 UART: [art] Extend RT PCRs Done
20,565,720 UART: [art] Lock RT PCRs Done
20,567,500 UART: [art] Populate DV Done
20,572,914 UART: [fht] FMC Alias Private Key: 7
20,574,573 UART: [art] Derive CDI
20,575,385 UART: [art] Store in slot 0x4
20,630,373 UART: [art] Derive Key Pair
20,631,364 UART: [art] Store priv key in slot 0x5
23,094,633 UART: [art] Derive Key Pair - Done
23,107,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,574 UART: [art] Erasing AUTHORITY.KEYID = 7
24,822,106 UART: [art] PUB.X = 2C4478E2E2BADF11C3F52EE357339F88E9182A7977617E312BE11E44A14D87832690EB9847B47C9BF3D9BBA5A4419F9F
24,829,357 UART: [art] PUB.Y = 3E31D31A7E00C80008B3B1F0700471F532B1DFD2AAD0999C471B58E5F877D5EEA842F262E83EE1F84775D4774AA2251B
24,836,588 UART: [art] SIG.R = A071A5864EEF5B30BD5FABA793C11D66CDEB03E294AC8A3B512447DA231FAEBC6B613F76596ED8AF98392AEE08B88F2F
24,843,985 UART: [art] SIG.S = 03B28D8AE166F64AEC98680112500AD85C51283301C62E1C20EDDBF2260B1EA53863F34FEA724D4481AC062D345BE0B7
25,822,843 UART: Caliptra RT
25,823,563 UART: [state] CFI Enabled
26,002,592 UART: [rt] RT listening for mailbox commands...
26,004,542 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,034,789 UART: [rt]cmd =0x44504543, len=28
26,077,844 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
3,461,530 ready_for_fw is high
3,461,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,141 >>> mbox cmd response: success
18,517,485 UART:
18,517,891 UART: Running Caliptra FMC ...
18,519,083 UART:
18,519,258 UART: [state] CFI Enabled
18,585,823 UART: [fht] FMC Alias Private Key: 7
20,351,763 UART: [art] Extend RT PCRs Done
20,352,970 UART: [art] Lock RT PCRs Done
20,354,755 UART: [art] Populate DV Done
20,359,999 UART: [fht] FMC Alias Private Key: 7
20,361,493 UART: [art] Derive CDI
20,362,258 UART: [art] Store in slot 0x4
20,418,819 UART: [art] Derive Key Pair
20,419,856 UART: [art] Store priv key in slot 0x5
22,882,686 UART: [art] Derive Key Pair - Done
22,895,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,608,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,954 UART: [art] PUB.X = 9FC7BA8D7E8C5383C5DE6009869817B51E091E0F8C51A4828527054BE00214E703C44F1192EC602AB112474E6F94FAE1
24,617,206 UART: [art] PUB.Y = 0845E6D638B4F5EC2D2817A70D5071ED1324AB48584E9C5A2A563F8E8EC3AEB6E92C22D04A9283974490FAEFFC891A0A
24,624,453 UART: [art] SIG.R = 5E2C6ED82D6425871DB8D6B867B53386989A9711166C1EDEB72D044F273C999ABCB444F245F584E54B5B840BFC3C67BD
24,631,846 UART: [art] SIG.S = 95D1D1C5BE2B58660EA894EE1D1B0BECAAFEFEFF714FE7B13045BB09AD5A0430D8F811406C4641DDD4BB4BB99604DC18
25,611,410 UART: Caliptra RT
25,612,119 UART: [state] CFI Enabled
25,791,711 UART: [rt] RT listening for mailbox commands...
25,793,630 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,823,658 UART: [rt]cmd =0x44504543, len=28
25,866,598 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,433 UART:
192,792 UART: Running Caliptra ROM ...
193,985 UART:
603,584 UART: [state] CFI Enabled
617,822 UART: [state] LifecycleState = Unprovisioned
619,769 UART: [state] DebugLocked = No
621,442 UART: [state] WD Timer not started. Device not locked for debugging
624,909 UART: [kat] SHA2-256
804,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,372 UART: [kat] ++
815,918 UART: [kat] sha1
825,945 UART: [kat] SHA2-256
828,670 UART: [kat] SHA2-384
834,733 UART: [kat] SHA2-512-ACC
837,103 UART: [kat] ECC-384
3,278,326 UART: [kat] HMAC-384Kdf
3,291,340 UART: [kat] LMS
3,767,903 UART: [kat] --
3,773,395 UART: [cold-reset] ++
3,774,309 UART: [fht] FHT @ 0x50003400
3,787,143 UART: [idev] ++
3,787,789 UART: [idev] CDI.KEYID = 6
3,788,703 UART: [idev] SUBJECT.KEYID = 7
3,789,953 UART: [idev] UDS.KEYID = 0
3,790,885 ready_for_fw is high
3,791,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,171 UART: [idev] Erasing UDS.KEYID = 0
6,264,678 UART: [idev] Sha1 KeyId Algorithm
6,289,314 UART: [idev] --
6,293,528 UART: [ldev] ++
6,294,095 UART: [ldev] CDI.KEYID = 6
6,295,021 UART: [ldev] SUBJECT.KEYID = 5
6,296,239 UART: [ldev] AUTHORITY.KEYID = 7
6,297,471 UART: [ldev] FE.KEYID = 1
6,307,901 UART: [ldev] Erasing FE.KEYID = 1
8,784,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,420 UART: [ldev] --
10,576,664 UART: [fwproc] Wait for Commands...
10,579,908 UART: [fwproc] Recv command 0x46574c44
10,581,949 UART: [fwproc] Recv'd Img size: 118548 bytes
14,061,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,329 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,330 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,270 >>> mbox cmd response: success
14,547,140 UART: [afmc] ++
14,547,731 UART: [afmc] CDI.KEYID = 6
14,548,622 UART: [afmc] SUBJECT.KEYID = 7
14,549,910 UART: [afmc] AUTHORITY.KEYID = 5
17,057,483 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,528 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,719 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,555 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,613 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,160 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,882 UART: [afmc] --
18,859,559 UART: [cold-reset] --
18,864,400 UART: [state] Locking Datavault
18,868,787 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,488 UART: [state] Locking ICCM
18,873,022 UART: [exit] Launching FMC @ 0x40000130
18,881,477 UART:
18,881,720 UART: Running Caliptra FMC ...
18,882,826 UART:
18,883,009 UART: [state] CFI Enabled
18,891,448 UART: [fht] FMC Alias Private Key: 7
20,657,680 UART: [art] Extend RT PCRs Done
20,658,896 UART: [art] Lock RT PCRs Done
20,660,416 UART: [art] Populate DV Done
20,666,155 UART: [fht] FMC Alias Private Key: 7
20,667,655 UART: [art] Derive CDI
20,668,395 UART: [art] Store in slot 0x4
20,711,070 UART: [art] Derive Key Pair
20,712,077 UART: [art] Store priv key in slot 0x5
23,139,480 UART: [art] Derive Key Pair - Done
23,152,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,515 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,018 UART: [art] PUB.X = C734441C0146AE685F414B322FB076B51BA3F336D6A6BA64AEADEFDF76DAB3B1B4ABA924B4C6CD122700333881226C4C
24,867,268 UART: [art] PUB.Y = F07EA1E2ACDB8DFD8E1CF4634D5AAADE524B442F6BB881482CCFC9D0B0CC0777EEBCDD9762DC485D6EE0968304EE685C
24,874,563 UART: [art] SIG.R = F638CCAEC747C380A54389C7D6C4457A5D11FF8B7E99A06A20C99F8FA74A98132EF0130898FC218CA74E9C3E72F55748
24,881,982 UART: [art] SIG.S = 8EBF797AF0745BD50E35E0D54F53C100276875E6F6A4E38A7B74C42786FB560604502A8FFE7F43E5533CF66CE18F30D4
25,860,709 UART: Caliptra RT
25,861,415 UART: [state] CFI Enabled
25,993,758 UART: [rt] RT listening for mailbox commands...
25,995,668 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,025,691 UART: [rt]cmd =0x44504543, len=28
26,068,672 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,775,063 ready_for_fw is high
3,775,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,431,880 >>> mbox cmd response: success
18,675,991 UART:
18,676,417 UART: Running Caliptra FMC ...
18,677,533 UART:
18,677,694 UART: [state] CFI Enabled
18,685,933 UART: [fht] FMC Alias Private Key: 7
20,451,614 UART: [art] Extend RT PCRs Done
20,452,841 UART: [art] Lock RT PCRs Done
20,454,240 UART: [art] Populate DV Done
20,459,570 UART: [fht] FMC Alias Private Key: 7
20,461,277 UART: [art] Derive CDI
20,462,018 UART: [art] Store in slot 0x4
20,504,896 UART: [art] Derive Key Pair
20,505,945 UART: [art] Store priv key in slot 0x5
22,932,774 UART: [art] Derive Key Pair - Done
22,945,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,652,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,653,777 UART: [art] PUB.X = 86E972A5CAE06F5FB6C2FA2A6A3A0DAB7AD4220F27E34291793E08EEE42100F7B8920DB06AFB72068E847343D00D7298
24,660,995 UART: [art] PUB.Y = E77954F26C8D79BC1962A635127E8A386A267F348BED55E5C4B04CA556D33D1F5CCCFBEEFC4EA4B947BA0AD8B1C3879F
24,668,256 UART: [art] SIG.R = 5F83A207468BB9AF03E22C870B5ED4DA3E497FFBB57B92ED966099BBE00AB9EC989A12B18920A7984C6689C0E23EA719
24,675,664 UART: [art] SIG.S = 0B0CF9F07D274EEB7E3231E529BA6FBF4D9C312F0DA1B73203E6C83885AD9F0EFEF56A2C05CAD2E9BC1BD806B3DBB24F
25,654,589 UART: Caliptra RT
25,655,291 UART: [state] CFI Enabled
25,788,725 UART: [rt] RT listening for mailbox commands...
25,790,645 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,820,404 UART: [rt]cmd =0x44504543, len=28
25,863,497 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,109 UART:
192,462 UART: Running Caliptra ROM ...
193,646 UART:
193,804 UART: [state] CFI Enabled
265,968 UART: [state] LifecycleState = Unprovisioned
268,396 UART: [state] DebugLocked = No
269,644 UART: [state] WD Timer not started. Device not locked for debugging
274,532 UART: [kat] SHA2-256
464,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,214 UART: [kat] ++
475,689 UART: [kat] sha1
486,986 UART: [kat] SHA2-256
489,997 UART: [kat] SHA2-384
495,557 UART: [kat] SHA2-512-ACC
498,134 UART: [kat] ECC-384
2,948,281 UART: [kat] HMAC-384Kdf
2,973,232 UART: [kat] LMS
3,504,981 UART: [kat] --
3,510,493 UART: [cold-reset] ++
3,511,506 UART: [fht] FHT @ 0x50003400
3,523,194 UART: [idev] ++
3,523,924 UART: [idev] CDI.KEYID = 6
3,524,829 UART: [idev] SUBJECT.KEYID = 7
3,526,069 UART: [idev] UDS.KEYID = 0
3,527,000 ready_for_fw is high
3,527,193 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,245 UART: [idev] Erasing UDS.KEYID = 0
6,031,631 UART: [idev] Sha1 KeyId Algorithm
6,054,024 UART: [idev] --
6,059,026 UART: [ldev] ++
6,059,727 UART: [ldev] CDI.KEYID = 6
6,060,645 UART: [ldev] SUBJECT.KEYID = 5
6,061,806 UART: [ldev] AUTHORITY.KEYID = 7
6,063,038 UART: [ldev] FE.KEYID = 1
6,101,611 UART: [ldev] Erasing FE.KEYID = 1
8,609,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,891 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,753 UART: [ldev] --
10,414,362 UART: [fwproc] Wait for Commands...
10,416,073 UART: [fwproc] Recv command 0x46574c44
10,418,377 UART: [fwproc] Recv'd Img size: 118548 bytes
13,925,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,816 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,127,416 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,687,908 >>> mbox cmd response: success
14,692,559 UART: [afmc] ++
14,693,268 UART: [afmc] CDI.KEYID = 6
14,694,459 UART: [afmc] SUBJECT.KEYID = 7
14,695,972 UART: [afmc] AUTHORITY.KEYID = 5
17,234,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,962,166 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,964,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,979,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,347 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,009,212 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,915 UART: [afmc] --
19,035,709 UART: [cold-reset] --
19,040,384 UART: [state] Locking Datavault
19,046,240 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,444 UART: [state] Locking ICCM
19,050,597 UART: [exit] Launching FMC @ 0x40000130
19,059,275 UART:
19,059,509 UART: Running Caliptra FMC ...
19,060,616 UART:
19,060,786 UART: [state] CFI Enabled
19,121,994 UART: [fht] FMC Alias Private Key: 7
20,888,492 UART: [art] Extend RT PCRs Done
20,889,711 UART: [art] Lock RT PCRs Done
20,891,280 UART: [art] Populate DV Done
20,896,679 UART: [fht] FMC Alias Private Key: 7
20,898,207 UART: [art] Derive CDI
20,898,966 UART: [art] Store in slot 0x4
20,954,584 UART: [art] Derive Key Pair
20,955,622 UART: [art] Store priv key in slot 0x5
23,418,515 UART: [art] Derive Key Pair - Done
23,431,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,144,007 UART: [art] Erasing AUTHORITY.KEYID = 7
25,145,528 UART: [art] PUB.X = 4CEDAC4D3C98D7DEBE13D97E76B74541A091BB1AB30A34C17C5FE872A983CC7F73F7974C9CDA441EA6376D8633827AEA
25,152,766 UART: [art] PUB.Y = B7D1E6239082BCFEAB70B7B94F8213393EC2C0B18B18A88FFFEC28885CB6A9C9DD2A7A87D388F8AA57AEE44B99200D76
25,160,067 UART: [art] SIG.R = 452B4FDA1C96B5A1EB8C8D2161C9685887AA3FF322988DCB09F67B410D334B2AF9327300F46CF675EBF05FB7C484FD0D
25,167,478 UART: [art] SIG.S = 426AC417BD5C348983D99815FE296222D8CF4CFA65465FDB3F4392C174EE82DB98B279667B49195C7FF2D569DB7749B9
26,146,411 UART: Caliptra RT
26,147,122 UART: [state] CFI Enabled
26,326,378 UART: [rt] RT listening for mailbox commands...
26,328,306 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,358,519 UART: [rt]cmd =0x44504543, len=28
26,401,446 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,440,225 ready_for_fw is high
3,440,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,066 >>> mbox cmd response: success
19,112,056 UART:
19,112,457 UART: Running Caliptra FMC ...
19,113,578 UART:
19,113,732 UART: [state] CFI Enabled
19,182,015 UART: [fht] FMC Alias Private Key: 7
20,948,230 UART: [art] Extend RT PCRs Done
20,949,441 UART: [art] Lock RT PCRs Done
20,951,175 UART: [art] Populate DV Done
20,956,650 UART: [fht] FMC Alias Private Key: 7
20,958,238 UART: [art] Derive CDI
20,959,072 UART: [art] Store in slot 0x4
21,014,285 UART: [art] Derive Key Pair
21,015,324 UART: [art] Store priv key in slot 0x5
23,478,232 UART: [art] Derive Key Pair - Done
23,491,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,740 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,238 UART: [art] PUB.X = 415FBE100722AF4EF8B71C8DB3DDC4FE105B4E365723372C751CC81D6CFC8459792527A3D45C937C2290566876E87745
25,212,520 UART: [art] PUB.Y = 9DBBFE5D20704E9789F523994047A430B5B34B18283027E43791647705D0D3CA7BFE7540576036B6CA5A8FF714E829EB
25,219,729 UART: [art] SIG.R = 3E7789B4761CE02389A6A4AB8AAB9C719AEAA10332E7B70F8CCCE88435C71D7510033FF8F2F5E0338295AF800BA8E162
25,227,124 UART: [art] SIG.S = 8E034E93C8099D2A5F7FB7241DA0AB89AF2FC13B548C669358286012F5BDF6F91FEE6EBDF5E45108EC82CBFE9C3B56EF
26,206,369 UART: Caliptra RT
26,207,091 UART: [state] CFI Enabled
26,387,016 UART: [rt] RT listening for mailbox commands...
26,388,946 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,418,778 UART: [rt]cmd =0x44504543, len=28
26,461,450 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,436 UART:
192,824 UART: Running Caliptra ROM ...
193,961 UART:
603,756 UART: [state] CFI Enabled
617,799 UART: [state] LifecycleState = Unprovisioned
620,190 UART: [state] DebugLocked = No
621,798 UART: [state] WD Timer not started. Device not locked for debugging
626,640 UART: [kat] SHA2-256
816,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,288 UART: [kat] ++
827,898 UART: [kat] sha1
839,353 UART: [kat] SHA2-256
842,369 UART: [kat] SHA2-384
849,286 UART: [kat] SHA2-512-ACC
851,873 UART: [kat] ECC-384
3,294,498 UART: [kat] HMAC-384Kdf
3,307,828 UART: [kat] LMS
3,839,649 UART: [kat] --
3,845,774 UART: [cold-reset] ++
3,848,131 UART: [fht] FHT @ 0x50003400
3,859,173 UART: [idev] ++
3,859,902 UART: [idev] CDI.KEYID = 6
3,860,828 UART: [idev] SUBJECT.KEYID = 7
3,862,077 UART: [idev] UDS.KEYID = 0
3,863,032 ready_for_fw is high
3,863,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,191 UART: [idev] Erasing UDS.KEYID = 0
6,340,173 UART: [idev] Sha1 KeyId Algorithm
6,361,242 UART: [idev] --
6,364,482 UART: [ldev] ++
6,365,161 UART: [ldev] CDI.KEYID = 6
6,366,046 UART: [ldev] SUBJECT.KEYID = 5
6,367,259 UART: [ldev] AUTHORITY.KEYID = 7
6,368,490 UART: [ldev] FE.KEYID = 1
6,380,299 UART: [ldev] Erasing FE.KEYID = 1
8,862,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,908 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,070 UART: [ldev] --
10,653,056 UART: [fwproc] Wait for Commands...
10,655,009 UART: [fwproc] Recv command 0x46574c44
10,657,277 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,996 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,613 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,507 >>> mbox cmd response: success
14,925,444 UART: [afmc] ++
14,926,179 UART: [afmc] CDI.KEYID = 6
14,927,379 UART: [afmc] SUBJECT.KEYID = 7
14,928,830 UART: [afmc] AUTHORITY.KEYID = 5
17,433,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,730 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,950 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,868 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,685 UART: [afmc] --
19,233,358 UART: [cold-reset] --
19,235,992 UART: [state] Locking Datavault
19,242,722 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,886 UART: [state] Locking ICCM
19,247,075 UART: [exit] Launching FMC @ 0x40000130
19,255,777 UART:
19,256,019 UART: Running Caliptra FMC ...
19,257,130 UART:
19,257,291 UART: [state] CFI Enabled
19,265,452 UART: [fht] FMC Alias Private Key: 7
21,031,902 UART: [art] Extend RT PCRs Done
21,033,116 UART: [art] Lock RT PCRs Done
21,034,532 UART: [art] Populate DV Done
21,039,809 UART: [fht] FMC Alias Private Key: 7
21,041,464 UART: [art] Derive CDI
21,042,286 UART: [art] Store in slot 0x4
21,085,096 UART: [art] Derive Key Pair
21,086,143 UART: [art] Store priv key in slot 0x5
23,513,187 UART: [art] Derive Key Pair - Done
23,526,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,233,260 UART: [art] Erasing AUTHORITY.KEYID = 7
25,234,758 UART: [art] PUB.X = 747949393C55E34EBB08E2B40B2FBF87F0FDAFDC4FD281EAB165AA15ADF4A0843F4113C87CB2B78CCC92BEA0E18F7108
25,242,073 UART: [art] PUB.Y = D606D51FF13A9D22C600F9392B6AD4819BF3A30F6C929AF45B6EF2585291D0D4259AF5D24B30C2BA0CC452246B4E148A
25,249,340 UART: [art] SIG.R = 7DB54A0A01125A03B7E7F37D8A6634AAD975E6A36215051DD0EE622B5322796AEAB6E66C2E46B73488CF83AFBF078F2A
25,256,720 UART: [art] SIG.S = 23D33BE560A6FEC6686BDD2FC2533A55AD28E500DE2FCF5F92BA8D04F98EFBE7D8FF0702745215D1D295A0D8A81B1FAC
26,236,272 UART: Caliptra RT
26,236,985 UART: [state] CFI Enabled
26,369,718 UART: [rt] RT listening for mailbox commands...
26,371,646 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,401,904 UART: [rt]cmd =0x44504543, len=28
26,444,797 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
3,758,157 ready_for_fw is high
3,758,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,849 >>> mbox cmd response: success
19,294,995 UART:
19,295,384 UART: Running Caliptra FMC ...
19,296,605 UART:
19,296,781 UART: [state] CFI Enabled
19,304,304 UART: [fht] FMC Alias Private Key: 7
21,070,820 UART: [art] Extend RT PCRs Done
21,072,049 UART: [art] Lock RT PCRs Done
21,073,796 UART: [art] Populate DV Done
21,079,119 UART: [fht] FMC Alias Private Key: 7
21,080,648 UART: [art] Derive CDI
21,081,405 UART: [art] Store in slot 0x4
21,124,342 UART: [art] Derive Key Pair
21,125,345 UART: [art] Store priv key in slot 0x5
23,552,291 UART: [art] Derive Key Pair - Done
23,565,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,468 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,980 UART: [art] PUB.X = 498B8B5840CDFECE8DCB1F21DE0A93F40E5AA49D9F888936CA359F68249D0AAA0CEF288FAB480FA59CF7B934B8ABD3A6
25,280,261 UART: [art] PUB.Y = B3AB188604352812526A028618F23BC1E4DBED6682DA6159D2C83980109DD50E1BB85F37D0910FB9B451BB20BCF3DF37
25,287,480 UART: [art] SIG.R = F8E88D538BD2B9EA3FDB5BDB3E4900DD0530F362FE445F9C69F832BE07E4D3DD063333F589B97242DD015372D36740DE
25,294,852 UART: [art] SIG.S = 1876D28F73EC211CDA96B4D3D4C90DCF74BB783C31204F820A7222CEA9A074C035AED618EA069734AFD1E3307B604D01
26,273,804 UART: Caliptra RT
26,274,518 UART: [state] CFI Enabled
26,407,693 UART: [rt] RT listening for mailbox commands...
26,409,610 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,439,639 UART: [rt]cmd =0x44504543, len=28
26,482,494 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,786 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,481 UART: [cold-reset] ++
1,477,011 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 ready_for_fw is high
1,481,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,678 UART: [idev] Erasing UDS.KEYID = 0
1,505,254 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,832 UART: [idev] --
1,514,967 UART: [ldev] ++
1,515,135 UART: [ldev] CDI.KEYID = 6
1,515,498 UART: [ldev] SUBJECT.KEYID = 5
1,515,924 UART: [ldev] AUTHORITY.KEYID = 7
1,516,387 UART: [ldev] FE.KEYID = 1
1,521,645 UART: [ldev] Erasing FE.KEYID = 1
1,546,626 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,422 UART: [ldev] --
1,585,923 UART: [fwproc] Waiting for Commands...
1,586,650 UART: [fwproc] Received command 0x46574c44
1,587,441 UART: [fwproc] Received Image of size 118548 bytes
2,931,955 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,887 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,426 >>> mbox cmd response: success
3,132,506 UART: [afmc] ++
3,132,674 UART: [afmc] CDI.KEYID = 6
3,133,036 UART: [afmc] SUBJECT.KEYID = 7
3,133,461 UART: [afmc] AUTHORITY.KEYID = 5
3,169,140 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,258 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,038 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,747 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,630 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,313 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,181 UART: [afmc] --
3,212,103 UART: [cold-reset] --
3,212,921 UART: [state] Locking Datavault
3,214,078 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,682 UART: [state] Locking ICCM
3,215,348 UART: [exit] Launching FMC @ 0x40000130
3,220,678 UART:
3,220,694 UART: Running Caliptra FMC ...
3,221,102 UART:
3,221,156 UART: [state] CFI Enabled
3,231,944 UART: [fht] FMC Alias Private Key: 7
3,351,348 UART: [art] Extend RT PCRs Done
3,351,776 UART: [art] Lock RT PCRs Done
3,353,012 UART: [art] Populate DV Done
3,361,473 UART: [fht] FMC Alias Private Key: 7
3,362,517 UART: [art] Derive CDI
3,362,797 UART: [art] Store in slot 0x4
3,448,521 UART: [art] Derive Key Pair
3,448,881 UART: [art] Store priv key in slot 0x5
3,462,510 UART: [art] Derive Key Pair - Done
3,477,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,867 UART: [art] PUB.X = C71010852B1CAB42CCED1BCE0FECF8B8FD2C487E95E13621FEA20F95E8B9AA5293310CCF4984C5130D02B7BAF5CF7E03
3,500,641 UART: [art] PUB.Y = E89DCA18F74D59D2AE3D475B02A8238A7FBA4E41F097FB30623F7096AE9A8BEA59AE62E6E776009C61F87BBEB36F6F18
3,507,582 UART: [art] SIG.R = 7A61A73DFB3112CA286C98B4F93C8960ADE05CFE2799461232DAD2D62440C65CD000469F21D06AE7ADE64E9206BDD859
3,514,335 UART: [art] SIG.S = BA6DDA5067166387B55B310E3C9ACAADD3829EB05940DDD0821FD3E2F1B47CF1F5990B324B9AE75B247C888E77B3DFFA
3,538,049 UART: Caliptra RT
3,538,300 UART: [state] CFI Enabled
3,658,506 UART: [rt] RT listening for mailbox commands...
3,659,176 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,226 UART: [rt]cmd =0x44504543, len=28
3,732,595 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,887 ready_for_fw is high
1,361,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,152 >>> mbox cmd response: success
3,042,037 UART:
3,042,053 UART: Running Caliptra FMC ...
3,042,461 UART:
3,042,515 UART: [state] CFI Enabled
3,052,831 UART: [fht] FMC Alias Private Key: 7
3,172,127 UART: [art] Extend RT PCRs Done
3,172,555 UART: [art] Lock RT PCRs Done
3,174,009 UART: [art] Populate DV Done
3,181,956 UART: [fht] FMC Alias Private Key: 7
3,182,934 UART: [art] Derive CDI
3,183,214 UART: [art] Store in slot 0x4
3,268,948 UART: [art] Derive Key Pair
3,269,308 UART: [art] Store priv key in slot 0x5
3,282,581 UART: [art] Derive Key Pair - Done
3,297,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,218 UART: [art] PUB.X = 14842F3019B099BFF85FC70634821D9186D9D6AD497E63B7C86311A78604EA56C0AB7B4397EED3D16FB05F4FD7B87A39
3,319,986 UART: [art] PUB.Y = 485269635EEB2A6642C864EA93406CDA7396F890071F69EF7FF29EDBC954A2EB4ABCC186C23CBA7E0A043E70131649F6
3,326,935 UART: [art] SIG.R = C1A713A7E9AF1922131C1A1D4F58E22D894127853964E0B04A579B97C87694F501C7BE6B741F29FA42A1E6328741FF11
3,333,698 UART: [art] SIG.S = 523F49105C52925ADF431D73C3F898F29DCB37C68876C0EF6DD7B77C92953E0BA75D80143796A5EE5CB27129F4FFB33D
3,357,555 UART: Caliptra RT
3,357,806 UART: [state] CFI Enabled
3,478,230 UART: [rt] RT listening for mailbox commands...
3,478,900 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,244 UART: [rt]cmd =0x44504543, len=28
3,552,479 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,528 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,218 UART: [kat] SHA2-256
882,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,264 UART: [kat] ++
886,416 UART: [kat] sha1
890,558 UART: [kat] SHA2-256
892,496 UART: [kat] SHA2-384
895,201 UART: [kat] SHA2-512-ACC
897,102 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,513 UART: [kat] LMS
1,475,709 UART: [kat] --
1,476,554 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 ready_for_fw is high
1,481,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,765 UART: [idev] Erasing UDS.KEYID = 0
1,505,175 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,575 UART: [idev] --
1,514,616 UART: [ldev] ++
1,514,784 UART: [ldev] CDI.KEYID = 6
1,515,147 UART: [ldev] SUBJECT.KEYID = 5
1,515,573 UART: [ldev] AUTHORITY.KEYID = 7
1,516,036 UART: [ldev] FE.KEYID = 1
1,521,296 UART: [ldev] Erasing FE.KEYID = 1
1,546,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,775 UART: [ldev] --
1,586,140 UART: [fwproc] Waiting for Commands...
1,586,811 UART: [fwproc] Received command 0x46574c44
1,587,602 UART: [fwproc] Received Image of size 118548 bytes
2,932,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,948 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,166 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,457 >>> mbox cmd response: success
3,132,639 UART: [afmc] ++
3,132,807 UART: [afmc] CDI.KEYID = 6
3,133,169 UART: [afmc] SUBJECT.KEYID = 7
3,133,594 UART: [afmc] AUTHORITY.KEYID = 5
3,167,823 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,177 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,957 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,549 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,232 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,212 UART: [afmc] --
3,211,090 UART: [cold-reset] --
3,211,928 UART: [state] Locking Datavault
3,213,123 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,727 UART: [state] Locking ICCM
3,214,185 UART: [exit] Launching FMC @ 0x40000130
3,219,515 UART:
3,219,531 UART: Running Caliptra FMC ...
3,219,939 UART:
3,220,082 UART: [state] CFI Enabled
3,230,864 UART: [fht] FMC Alias Private Key: 7
3,350,366 UART: [art] Extend RT PCRs Done
3,350,794 UART: [art] Lock RT PCRs Done
3,352,550 UART: [art] Populate DV Done
3,360,837 UART: [fht] FMC Alias Private Key: 7
3,361,805 UART: [art] Derive CDI
3,362,085 UART: [art] Store in slot 0x4
3,447,865 UART: [art] Derive Key Pair
3,448,225 UART: [art] Store priv key in slot 0x5
3,461,324 UART: [art] Derive Key Pair - Done
3,476,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,689 UART: [art] PUB.X = 93802C980DC087A97FF5023FB425C4D7C44DDB03B7A912547D4D1349147FCC78CB32C52B4281043050F57CA22B3C479F
3,499,447 UART: [art] PUB.Y = A9C845EB2140D97DE271181D42EDA19FA05E48F9858317D207AF32D04D4FCC739F9EBADB7B0BB11DD9C528A5E27A8DC7
3,506,409 UART: [art] SIG.R = 4BE6D160E12B9F7442D48C028C588C3B4D1009DC0A9680C40B861326B633BFA14C915DAC6D648C378A08B49302327FE9
3,513,161 UART: [art] SIG.S = 45F5B53010C6738FCE7C3E537BDF4BFA456EB5B6300409C56E15FB80A517CA695D635936CB3A805503C97893D039BFE8
3,537,240 UART: Caliptra RT
3,537,583 UART: [state] CFI Enabled
3,658,022 UART: [rt] RT listening for mailbox commands...
3,658,692 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,546 UART: [rt]cmd =0x44504543, len=28
3,731,581 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,744 ready_for_fw is high
1,362,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,599 >>> mbox cmd response: success
3,042,338 UART:
3,042,354 UART: Running Caliptra FMC ...
3,042,762 UART:
3,042,905 UART: [state] CFI Enabled
3,053,599 UART: [fht] FMC Alias Private Key: 7
3,172,831 UART: [art] Extend RT PCRs Done
3,173,259 UART: [art] Lock RT PCRs Done
3,174,923 UART: [art] Populate DV Done
3,183,026 UART: [fht] FMC Alias Private Key: 7
3,184,098 UART: [art] Derive CDI
3,184,378 UART: [art] Store in slot 0x4
3,270,524 UART: [art] Derive Key Pair
3,270,884 UART: [art] Store priv key in slot 0x5
3,283,771 UART: [art] Derive Key Pair - Done
3,298,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,215 UART: [art] PUB.X = 8CFD1C1237D8089A9482DE8FB95274F7E146587F4C079F69C266DE096746A1F7A622CC9755D399486F9D017C3B85328C
3,321,969 UART: [art] PUB.Y = 3962C4F31F374C9C7C151F0A41C1E032F197EC2B948F5765D645D6E11070D39388D20C34109A50D67B5DDD893B05D895
3,328,906 UART: [art] SIG.R = A5FB805DA2CC6058FD62FC6D848F8AB9909CC435B70AA740F8CF01174CFDEED1B08EF6DF31A4D66D61CF6C0E0AFA6602
3,335,687 UART: [art] SIG.S = 1CFC5F9031A2974DBC2719336E31FA145419F7F2F67276863F2A15211D54FF87F6CBCF1DE6E92EF6BCB71BCB78399551
3,360,017 UART: Caliptra RT
3,360,360 UART: [state] CFI Enabled
3,480,138 UART: [rt] RT listening for mailbox commands...
3,480,808 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,164 UART: [rt]cmd =0x44504543, len=28
3,554,725 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,443 UART: [kat] SHA2-512-ACC
906,344 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,194 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 ready_for_fw is high
1,174,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,519 UART: [idev] Erasing UDS.KEYID = 0
1,198,791 UART: [idev] Sha1 KeyId Algorithm
1,207,709 UART: [idev] --
1,208,746 UART: [ldev] ++
1,208,914 UART: [ldev] CDI.KEYID = 6
1,209,278 UART: [ldev] SUBJECT.KEYID = 5
1,209,705 UART: [ldev] AUTHORITY.KEYID = 7
1,210,168 UART: [ldev] FE.KEYID = 1
1,215,430 UART: [ldev] Erasing FE.KEYID = 1
1,240,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,634 UART: [ldev] --
1,279,999 UART: [fwproc] Wait for Commands...
1,280,762 UART: [fwproc] Recv command 0x46574c44
1,281,495 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,923 >>> mbox cmd response: success
2,825,181 UART: [afmc] ++
2,825,349 UART: [afmc] CDI.KEYID = 6
2,825,712 UART: [afmc] SUBJECT.KEYID = 7
2,826,138 UART: [afmc] AUTHORITY.KEYID = 5
2,861,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,005 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,715 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,596 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,297 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,206 UART: [afmc] --
2,905,239 UART: [cold-reset] --
2,906,043 UART: [state] Locking Datavault
2,907,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,932 UART: [state] Locking ICCM
2,908,362 UART: [exit] Launching FMC @ 0x40000130
2,913,692 UART:
2,913,708 UART: Running Caliptra FMC ...
2,914,116 UART:
2,914,170 UART: [state] CFI Enabled
2,924,626 UART: [fht] FMC Alias Private Key: 7
3,043,512 UART: [art] Extend RT PCRs Done
3,043,940 UART: [art] Lock RT PCRs Done
3,045,384 UART: [art] Populate DV Done
3,053,533 UART: [fht] FMC Alias Private Key: 7
3,054,647 UART: [art] Derive CDI
3,054,927 UART: [art] Store in slot 0x4
3,140,468 UART: [art] Derive Key Pair
3,140,828 UART: [art] Store priv key in slot 0x5
3,154,550 UART: [art] Derive Key Pair - Done
3,169,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,307 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,072 UART: [art] PUB.X = B4C0DE45BC6648ED5C8EFCE6091B351CA9FC2BEE003E688B3FE3C778AB27568EE6504B411B8205FBB1582099546F11BD
3,191,828 UART: [art] PUB.Y = C2DDDEA670BE0FBE93D30F2EF3A5EA706353992E46AFF5765B277640561D88B4381690413E17329A46A7FD51A7E361B3
3,198,776 UART: [art] SIG.R = E1BE5DC59CFB20E3AB145FA0CAC07811F143143457C76BE9F77B32AAB87566A8D0356D8FB98F0010784243E01319E942
3,205,528 UART: [art] SIG.S = 9A0B37038D742DA1C14DBB9F53D74BE2559FF1E925DECC96A77900629318F2C5553918438EC714CD099A4C6E577D27AE
3,229,635 UART: Caliptra RT
3,229,886 UART: [state] CFI Enabled
3,349,034 UART: [rt] RT listening for mailbox commands...
3,349,704 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,818 UART: [rt]cmd =0x44504543, len=28
3,423,093 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,570 ready_for_fw is high
1,059,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,122 >>> mbox cmd response: success
2,742,619 UART:
2,742,635 UART: Running Caliptra FMC ...
2,743,043 UART:
2,743,097 UART: [state] CFI Enabled
2,753,851 UART: [fht] FMC Alias Private Key: 7
2,872,533 UART: [art] Extend RT PCRs Done
2,872,961 UART: [art] Lock RT PCRs Done
2,874,625 UART: [art] Populate DV Done
2,883,026 UART: [fht] FMC Alias Private Key: 7
2,884,034 UART: [art] Derive CDI
2,884,314 UART: [art] Store in slot 0x4
2,970,019 UART: [art] Derive Key Pair
2,970,379 UART: [art] Store priv key in slot 0x5
2,983,557 UART: [art] Derive Key Pair - Done
2,998,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,325 UART: [art] PUB.X = AA8E34145005D76848AA7F00AAC2BD8FA963C68E4D8CAC2DBBCD4AABF4285B31ADCDC31BC9275151AADD6F50D4A8CBE4
3,021,102 UART: [art] PUB.Y = B3266C7A07AA311CD527445F7ACBFC6EBD5BA58B6D8CE5FA44DEBFE780BD55C4E15F81047F8122CECF8078F17C49766F
3,028,068 UART: [art] SIG.R = C8B2C34D1786D2A3FE9D7993A885BE8C0537D15992EA94E3AB2A5B5BEA91DA8037F74DBBAE9F1D8DA3E10738BAC6D144
3,034,852 UART: [art] SIG.S = 5214BF83F04DC0D98E85EE5BC3D5CCC199DE42BEDD79364D19D7CC10A7A0CF00191A0C7446C9F25F4B7186B0EDF62F4B
3,058,599 UART: Caliptra RT
3,058,850 UART: [state] CFI Enabled
3,177,499 UART: [rt] RT listening for mailbox commands...
3,178,169 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,295 UART: [rt]cmd =0x44504543, len=28
3,251,394 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,544 UART: [state] WD Timer not started. Device not locked for debugging
87,873 UART: [kat] SHA2-256
891,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,527 UART: [kat] ++
895,679 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,554 UART: [kat] SHA2-512-ACC
906,455 UART: [kat] ECC-384
916,284 UART: [kat] HMAC-384Kdf
920,886 UART: [kat] LMS
1,169,198 UART: [kat] --
1,170,175 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,279 UART: [idev] ++
1,173,447 UART: [idev] CDI.KEYID = 6
1,173,808 UART: [idev] SUBJECT.KEYID = 7
1,174,233 UART: [idev] UDS.KEYID = 0
1,174,579 ready_for_fw is high
1,174,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,199,574 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,345 UART: [ldev] ++
1,209,513 UART: [ldev] CDI.KEYID = 6
1,209,877 UART: [ldev] SUBJECT.KEYID = 5
1,210,304 UART: [ldev] AUTHORITY.KEYID = 7
1,210,767 UART: [ldev] FE.KEYID = 1
1,216,031 UART: [ldev] Erasing FE.KEYID = 1
1,242,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,680 UART: [fwproc] Wait for Commands...
1,282,393 UART: [fwproc] Recv command 0x46574c44
1,283,126 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,857 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,164 >>> mbox cmd response: success
2,827,180 UART: [afmc] ++
2,827,348 UART: [afmc] CDI.KEYID = 6
2,827,711 UART: [afmc] SUBJECT.KEYID = 7
2,828,137 UART: [afmc] AUTHORITY.KEYID = 5
2,864,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,315 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,774 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,655 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,356 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,169 UART: [afmc] --
2,907,994 UART: [cold-reset] --
2,908,930 UART: [state] Locking Datavault
2,910,197 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,801 UART: [state] Locking ICCM
2,911,471 UART: [exit] Launching FMC @ 0x40000130
2,916,801 UART:
2,916,817 UART: Running Caliptra FMC ...
2,917,225 UART:
2,917,368 UART: [state] CFI Enabled
2,928,136 UART: [fht] FMC Alias Private Key: 7
3,046,664 UART: [art] Extend RT PCRs Done
3,047,092 UART: [art] Lock RT PCRs Done
3,048,610 UART: [art] Populate DV Done
3,056,675 UART: [fht] FMC Alias Private Key: 7
3,057,663 UART: [art] Derive CDI
3,057,943 UART: [art] Store in slot 0x4
3,143,830 UART: [art] Derive Key Pair
3,144,190 UART: [art] Store priv key in slot 0x5
3,157,638 UART: [art] Derive Key Pair - Done
3,172,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,574 UART: [art] PUB.X = 7F596A36B585CD4ADD638BAA558954158560D25515F26F7371EA2DDAC4B31DEF4E6FC9A8237F2D88E7836B139D6C2C62
3,195,352 UART: [art] PUB.Y = 7A932F446008ACC2632F1770D1BEDE4D2159375323753E927EB8643EDDEA539D77B113AEFFFACC15B284EFA164AD76E7
3,202,311 UART: [art] SIG.R = 90F800830D8F0A2DFA4121D950387958AE10866BA3594343E15DD1B1EB7031E6CCDA36BE06CF396119F787C99221863E
3,209,048 UART: [art] SIG.S = 97D5001F8D348109F5BC186C36648B68639924927ABD2DB490D7D8A8CBC50963C56B7CFC66A4B76D3229ED551A6F7CCD
3,233,422 UART: Caliptra RT
3,233,765 UART: [state] CFI Enabled
3,353,467 UART: [rt] RT listening for mailbox commands...
3,354,137 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,215 UART: [rt]cmd =0x44504543, len=28
3,427,462 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,389 ready_for_fw is high
1,059,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,531 >>> mbox cmd response: success
2,741,092 UART:
2,741,108 UART: Running Caliptra FMC ...
2,741,516 UART:
2,741,659 UART: [state] CFI Enabled
2,752,453 UART: [fht] FMC Alias Private Key: 7
2,871,417 UART: [art] Extend RT PCRs Done
2,871,845 UART: [art] Lock RT PCRs Done
2,873,315 UART: [art] Populate DV Done
2,881,368 UART: [fht] FMC Alias Private Key: 7
2,882,356 UART: [art] Derive CDI
2,882,636 UART: [art] Store in slot 0x4
2,968,585 UART: [art] Derive Key Pair
2,968,945 UART: [art] Store priv key in slot 0x5
2,981,979 UART: [art] Derive Key Pair - Done
2,996,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,149 UART: [art] PUB.X = 96A21788931DB10DD99FF925797098851229A0346F8E946ABB27510385470340817BF6E1907C14882299118ED5DD0B55
3,019,889 UART: [art] PUB.Y = F863B8BDB3ED7176618253EC2AAB4D916F590EE514206CF3D3A30DFA68E6339A12EF79F9D9D71BB119A10C7511A07D2B
3,026,842 UART: [art] SIG.R = 835BE5701C7457D9385EDCAB727EA672B413C038A1ED110E50090920BD07D527679510D5D7FE7B185C8AA6517E288372
3,033,596 UART: [art] SIG.S = CE416F8BEDB52ED9C72E1DB5CA38261DE07E2FD9489EACE40A302096C88AD80C602656BB5CD0D3BC016A03FD91E056A2
3,057,580 UART: Caliptra RT
3,057,923 UART: [state] CFI Enabled
3,177,365 UART: [rt] RT listening for mailbox commands...
3,178,035 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,987 UART: [rt]cmd =0x44504543, len=28
3,251,450 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,976 UART: [state] LifecycleState = Unprovisioned
85,631 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,484 UART: [kat] SHA2-256
893,134 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,259 UART: [kat] ++
897,411 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,244 UART: [kat] HMAC-384Kdf
922,822 UART: [kat] LMS
1,171,150 UART: [kat] --
1,172,291 UART: [cold-reset] ++
1,172,651 UART: [fht] FHT @ 0x50003400
1,175,202 UART: [idev] ++
1,175,370 UART: [idev] CDI.KEYID = 6
1,175,730 UART: [idev] SUBJECT.KEYID = 7
1,176,154 UART: [idev] UDS.KEYID = 0
1,176,499 ready_for_fw is high
1,176,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,174 UART: [idev] Erasing UDS.KEYID = 0
1,200,825 UART: [idev] Sha1 KeyId Algorithm
1,209,189 UART: [idev] --
1,210,435 UART: [ldev] ++
1,210,603 UART: [ldev] CDI.KEYID = 6
1,210,966 UART: [ldev] SUBJECT.KEYID = 5
1,211,392 UART: [ldev] AUTHORITY.KEYID = 7
1,211,855 UART: [ldev] FE.KEYID = 1
1,217,069 UART: [ldev] Erasing FE.KEYID = 1
1,242,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,853 UART: [ldev] --
1,282,294 UART: [fwproc] Wait for Commands...
1,283,012 UART: [fwproc] Recv command 0x46574c44
1,283,740 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,708 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,945 >>> mbox cmd response: success
2,828,031 UART: [afmc] ++
2,828,199 UART: [afmc] CDI.KEYID = 6
2,828,561 UART: [afmc] SUBJECT.KEYID = 7
2,828,986 UART: [afmc] AUTHORITY.KEYID = 5
2,864,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,616 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,364 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,073 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,956 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,657 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,305 UART: [afmc] --
2,907,279 UART: [cold-reset] --
2,908,107 UART: [state] Locking Datavault
2,909,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,782 UART: [state] Locking ICCM
2,910,240 UART: [exit] Launching FMC @ 0x40000130
2,915,570 UART:
2,915,586 UART: Running Caliptra FMC ...
2,915,994 UART:
2,916,048 UART: [state] CFI Enabled
2,926,494 UART: [fht] FMC Alias Private Key: 7
3,045,744 UART: [art] Extend RT PCRs Done
3,046,172 UART: [art] Lock RT PCRs Done
3,047,832 UART: [art] Populate DV Done
3,055,887 UART: [fht] FMC Alias Private Key: 7
3,056,825 UART: [art] Derive CDI
3,057,105 UART: [art] Store in slot 0x4
3,142,576 UART: [art] Derive Key Pair
3,142,936 UART: [art] Store priv key in slot 0x5
3,156,130 UART: [art] Derive Key Pair - Done
3,171,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,611 UART: [art] PUB.X = 1EF9AC6FCA5304C6487F4F302815165639CDA95FE7B5D24A7B3E0342BA36630188CB205275307EDE732C1B77D1706DD1
3,194,374 UART: [art] PUB.Y = 6E9E48189E73C3CA2E86A0CA4902EBF7CBBE98D8A8548A6679780486C5A71FA48E35A605FF11DCFFEAB6CAD523399A34
3,201,331 UART: [art] SIG.R = 56033E758E908F35FD6234A9351EB554BE306D2E10C961FFA8DCFA4EF2A684A255AA15CE55163983D9AF35491664DBAC
3,208,106 UART: [art] SIG.S = 38C89950BE396CDB4D67DD5BD7117A91CC1F4AD68E1822FA0B3BC384EE22A0E0E59DE90A9F675840FEB62A3AC02ECAA2
3,231,846 UART: Caliptra RT
3,232,097 UART: [state] CFI Enabled
3,352,247 UART: [rt] RT listening for mailbox commands...
3,352,917 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,091 UART: [rt]cmd =0x44504543, len=28
3,426,594 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,569 ready_for_fw is high
1,060,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,152 >>> mbox cmd response: success
2,741,707 UART:
2,741,723 UART: Running Caliptra FMC ...
2,742,131 UART:
2,742,185 UART: [state] CFI Enabled
2,752,559 UART: [fht] FMC Alias Private Key: 7
2,871,275 UART: [art] Extend RT PCRs Done
2,871,703 UART: [art] Lock RT PCRs Done
2,873,461 UART: [art] Populate DV Done
2,881,576 UART: [fht] FMC Alias Private Key: 7
2,882,748 UART: [art] Derive CDI
2,883,028 UART: [art] Store in slot 0x4
2,968,831 UART: [art] Derive Key Pair
2,969,191 UART: [art] Store priv key in slot 0x5
2,982,395 UART: [art] Derive Key Pair - Done
2,997,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,891 UART: [art] PUB.X = 9BAD83DE02C621B9A2027211948F9B6FBE59CFEE69FD17B1A9A4E48034995429DA3031FFF9DFF69D34550B4BE5D7F260
3,019,664 UART: [art] PUB.Y = ACBD9F3118CED9DD6BCD2CEA46BCDAAE275CF011FA6CFA9254CD31F832A0B2EB222E057E04ED08F5D5CB45E824662267
3,026,633 UART: [art] SIG.R = C506106BDDD28B50BF5B0F2432B26A2213F914F5411E94CF249AFBC50D99C407522B31A178CDB63C49A81A588231CBFC
3,033,399 UART: [art] SIG.S = 3B12FD4D6E8FCB4671CEBDE47DDB1E2B982FCB7FFEA4B97FF04DA835550FFEC540767EA389191635F77FF4758CE3EA30
3,057,636 UART: Caliptra RT
3,057,887 UART: [state] CFI Enabled
3,177,522 UART: [rt] RT listening for mailbox commands...
3,178,192 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,042 UART: [rt]cmd =0x44504543, len=28
3,251,521 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,097 UART: [state] LifecycleState = Unprovisioned
86,752 UART: [state] DebugLocked = No
87,338 UART: [state] WD Timer not started. Device not locked for debugging
88,539 UART: [kat] SHA2-256
894,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,314 UART: [kat] ++
898,466 UART: [kat] sha1
902,722 UART: [kat] SHA2-256
904,662 UART: [kat] SHA2-384
907,257 UART: [kat] SHA2-512-ACC
909,158 UART: [kat] ECC-384
919,225 UART: [kat] HMAC-384Kdf
923,783 UART: [kat] LMS
1,172,111 UART: [kat] --
1,172,720 UART: [cold-reset] ++
1,173,298 UART: [fht] FHT @ 0x50003400
1,175,973 UART: [idev] ++
1,176,141 UART: [idev] CDI.KEYID = 6
1,176,501 UART: [idev] SUBJECT.KEYID = 7
1,176,925 UART: [idev] UDS.KEYID = 0
1,177,270 ready_for_fw is high
1,177,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,201,890 UART: [idev] Sha1 KeyId Algorithm
1,210,234 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,546 UART: [ldev] Erasing FE.KEYID = 1
1,243,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,878 UART: [ldev] --
1,282,389 UART: [fwproc] Wait for Commands...
1,283,149 UART: [fwproc] Recv command 0x46574c44
1,283,877 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,464 >>> mbox cmd response: success
2,828,576 UART: [afmc] ++
2,828,744 UART: [afmc] CDI.KEYID = 6
2,829,106 UART: [afmc] SUBJECT.KEYID = 7
2,829,531 UART: [afmc] AUTHORITY.KEYID = 5
2,865,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,883 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,475 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,044 UART: [afmc] --
2,908,164 UART: [cold-reset] --
2,908,874 UART: [state] Locking Datavault
2,909,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,505 UART: [state] Locking ICCM
2,910,929 UART: [exit] Launching FMC @ 0x40000130
2,916,259 UART:
2,916,275 UART: Running Caliptra FMC ...
2,916,683 UART:
2,916,826 UART: [state] CFI Enabled
2,927,186 UART: [fht] FMC Alias Private Key: 7
3,046,498 UART: [art] Extend RT PCRs Done
3,046,926 UART: [art] Lock RT PCRs Done
3,048,748 UART: [art] Populate DV Done
3,057,021 UART: [fht] FMC Alias Private Key: 7
3,057,969 UART: [art] Derive CDI
3,058,249 UART: [art] Store in slot 0x4
3,143,994 UART: [art] Derive Key Pair
3,144,354 UART: [art] Store priv key in slot 0x5
3,157,372 UART: [art] Derive Key Pair - Done
3,172,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,578 UART: [art] PUB.X = 7669CE5F253F18427DD84E3F020F54D61ECFAAD26BA37F6960DFF9346C4330C3C2BE77768AB62A59F0A9B582B6BE0927
3,195,349 UART: [art] PUB.Y = 1B0A28DCE9A7E10597A89AF6A39F221138E9870212237D8059C8C266031915BB5CC91D5E47A73DDF23CA843B0E88F183
3,202,284 UART: [art] SIG.R = E21F452BB9362AEABA161BF98B634F894A28394F8A826DA3367594407E316164E1BEB8270638A0474A2594793462EDB2
3,209,045 UART: [art] SIG.S = 07E517AD90A96B14936E0ED5B69BF6D58F5DDA525E2C280CF92E442610BF45F87A6F9C384EE125736F63E4A1DD19D193
3,232,714 UART: Caliptra RT
3,233,057 UART: [state] CFI Enabled
3,351,174 UART: [rt] RT listening for mailbox commands...
3,351,844 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,604 UART: [rt]cmd =0x44504543, len=28
3,425,027 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,512 ready_for_fw is high
1,060,512 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,225 >>> mbox cmd response: success
2,742,534 UART:
2,742,550 UART: Running Caliptra FMC ...
2,742,958 UART:
2,743,101 UART: [state] CFI Enabled
2,753,455 UART: [fht] FMC Alias Private Key: 7
2,873,029 UART: [art] Extend RT PCRs Done
2,873,457 UART: [art] Lock RT PCRs Done
2,875,021 UART: [art] Populate DV Done
2,883,252 UART: [fht] FMC Alias Private Key: 7
2,884,196 UART: [art] Derive CDI
2,884,476 UART: [art] Store in slot 0x4
2,970,043 UART: [art] Derive Key Pair
2,970,403 UART: [art] Store priv key in slot 0x5
2,983,671 UART: [art] Derive Key Pair - Done
2,998,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,620 UART: [art] PUB.X = F554C29A58800B0F85E6346F8EB6933F2B13B7F20BBBDFBBE7F1D3A8B61671784B6388EE63F99E07301E6C2890BA7916
3,021,384 UART: [art] PUB.Y = 6BBD672D31CC8B6C6896ACC046F09204EA2D07AE59678153CD5D133A1944BF47E137A233BBEF6CC7EF5ECAD8688FC2B9
3,028,346 UART: [art] SIG.R = 243369E346A48509CD5E04214F113D0CC1FA4491C247673B83B997112AA05E0F31C19B01388D73EBC22550308CE5F086
3,035,093 UART: [art] SIG.S = B8847C2AB726CCE1EC5E6F9AB92E182C9C85468C6DB649627A6405C132CCCDA2DA0221A051C7D4425FAC7C7966C3248B
3,059,309 UART: Caliptra RT
3,059,652 UART: [state] CFI Enabled
3,179,509 UART: [rt] RT listening for mailbox commands...
3,180,179 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,213 UART: [rt]cmd =0x44504543, len=28
3,253,912 >>> mbox cmd response data (2076 bytes)
test test_invoke_dpe::test_invoke_dpe_get_certificate_chain_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,247 UART:
192,626 UART: Running Caliptra ROM ...
193,774 UART:
193,926 UART: [state] CFI Enabled
266,892 UART: [state] LifecycleState = Unprovisioned
268,883 UART: [state] DebugLocked = No
270,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,227 UART: [kat] SHA2-256
444,963 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,484 UART: [kat] ++
455,932 UART: [kat] sha1
465,806 UART: [kat] SHA2-256
468,520 UART: [kat] SHA2-384
473,375 UART: [kat] SHA2-512-ACC
475,690 UART: [kat] ECC-384
2,768,813 UART: [kat] HMAC-384Kdf
2,781,543 UART: [kat] LMS
3,971,861 UART: [kat] --
3,974,805 UART: [cold-reset] ++
3,975,747 UART: [fht] Storing FHT @ 0x50003400
3,986,372 UART: [idev] ++
3,986,931 UART: [idev] CDI.KEYID = 6
3,987,813 UART: [idev] SUBJECT.KEYID = 7
3,989,119 UART: [idev] UDS.KEYID = 0
3,990,110 ready_for_fw is high
3,990,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,487 UART: [idev] Erasing UDS.KEYID = 0
7,328,098 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,038 UART: [idev] --
7,354,601 UART: [ldev] ++
7,355,191 UART: [ldev] CDI.KEYID = 6
7,356,206 UART: [ldev] SUBJECT.KEYID = 5
7,357,364 UART: [ldev] AUTHORITY.KEYID = 7
7,358,594 UART: [ldev] FE.KEYID = 1
7,402,720 UART: [ldev] Erasing FE.KEYID = 1
10,734,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,239 UART: [ldev] --
13,095,263 UART: [fwproc] Waiting for Commands...
13,097,521 UART: [fwproc] Received command 0x46574c44
13,099,706 UART: [fwproc] Received Image of size 118548 bytes
17,201,207 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,681,354 >>> mbox cmd response: success
17,685,347 UART: [afmc] ++
17,685,978 UART: [afmc] CDI.KEYID = 6
17,687,077 UART: [afmc] SUBJECT.KEYID = 7
17,688,203 UART: [afmc] AUTHORITY.KEYID = 5
21,052,472 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,353,261 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,370,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,384,693 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,399,098 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,420,285 UART: [afmc] --
23,423,713 UART: [cold-reset] --
23,426,815 UART: [state] Locking Datavault
23,431,249 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,024 UART: [state] Locking ICCM
23,435,669 UART: [exit] Launching FMC @ 0x40000130
23,444,065 UART:
23,444,303 UART: Running Caliptra FMC ...
23,445,400 UART:
23,445,562 UART: [state] CFI Enabled
23,510,785 UART: [fht] FMC Alias Private Key: 7
25,851,813 UART: [art] Extend RT PCRs Done
25,853,034 UART: [art] Lock RT PCRs Done
25,855,014 UART: [art] Populate DV Done
25,860,749 UART: [fht] FMC Alias Private Key: 7
25,862,232 UART: [art] Derive CDI
25,862,996 UART: [art] Store in slot 0x4
25,919,549 UART: [art] Derive Key Pair
25,920,552 UART: [art] Store priv key in slot 0x5
29,213,040 UART: [art] Derive Key Pair - Done
29,226,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,355 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,872 UART: [art] PUB.X = 4D8F342B1B6FA7DA5618B14947A2300A35B7798A4A4D2B93D6FBD4B76CC1F417E81AD97084E43BD0D8EDC6D564E178F9
31,524,118 UART: [art] PUB.Y = 66F177D15C43203EECDACD3A8057950936118D4A48995F6F53E0A4E9D2C3985544FEDA3272500EB8EB98A2492EFECD15
31,531,385 UART: [art] SIG.R = 57204A4A42F1F71189DB71F667480F8BEEC0ABF9A047A60F984B3A74D103EFED2E8F21FB061291CBD06396949EC072B4
31,538,785 UART: [art] SIG.S = ED9A0A7F40D6BB8B6FA053010CCEC9EF2E919F5967366DA3581B862FDD2829BE2CFA39C341E626E68C50D03B442819EB
32,844,265 UART: Caliptra RT
32,844,982 UART: [state] CFI Enabled
33,020,631 UART: [rt] RT listening for mailbox commands...
33,022,557 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,052,399 UART: [rt]cmd =0x44504543, len=20
33,072,733 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
3,783,412 ready_for_fw is high
3,783,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,961,540 >>> mbox cmd response: success
23,651,064 UART:
23,651,458 UART: Running Caliptra FMC ...
23,652,659 UART:
23,652,843 UART: [state] CFI Enabled
23,719,882 UART: [fht] FMC Alias Private Key: 7
26,060,835 UART: [art] Extend RT PCRs Done
26,062,103 UART: [art] Lock RT PCRs Done
26,063,758 UART: [art] Populate DV Done
26,069,153 UART: [fht] FMC Alias Private Key: 7
26,070,646 UART: [art] Derive CDI
26,071,417 UART: [art] Store in slot 0x4
26,128,683 UART: [art] Derive Key Pair
26,129,687 UART: [art] Store priv key in slot 0x5
29,422,815 UART: [art] Derive Key Pair - Done
29,435,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,172 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,681 UART: [art] PUB.X = ED98F32815DC8D95229ED72B2C1B9F169490E3AFDE9396ABAD6B77F82B9125B360E48EABA392071522B83251732CEE26
31,732,934 UART: [art] PUB.Y = 263F70DB06096375F6844F24B2A72A4C3172335319B4A9484E59E663E9C15838DC17223D002633076915E4346ACB1AA0
31,740,158 UART: [art] SIG.R = 76A12E96A5FADCAF596CA88FD6BA4875C63B7E499E9A61D8F1D46F7074C03CFA15DF263A084AEAB28738ED012F7FE159
31,747,571 UART: [art] SIG.S = BCECFED490A03F8E4DD38E8CF97E09AA826CB2DCF2C9F6229F963A7F1611A094C024495617CEB56347CFE23B4F9B0F9E
33,052,774 UART: Caliptra RT
33,053,517 UART: [state] CFI Enabled
33,229,271 UART: [rt] RT listening for mailbox commands...
33,231,181 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,261,240 UART: [rt]cmd =0x44504543, len=20
33,281,739 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,192 writing to cptra_bootfsm_go
192,421 UART:
192,774 UART: Running Caliptra ROM ...
193,906 UART:
603,779 UART: [state] CFI Enabled
617,198 UART: [state] LifecycleState = Unprovisioned
619,168 UART: [state] DebugLocked = No
621,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,853 UART: [kat] SHA2-256
795,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,162 UART: [kat] ++
806,608 UART: [kat] sha1
817,261 UART: [kat] SHA2-256
819,979 UART: [kat] SHA2-384
825,820 UART: [kat] SHA2-512-ACC
828,178 UART: [kat] ECC-384
3,111,007 UART: [kat] HMAC-384Kdf
3,122,454 UART: [kat] LMS
4,312,576 UART: [kat] --
4,314,814 UART: [cold-reset] ++
4,316,814 UART: [fht] Storing FHT @ 0x50003400
4,327,644 UART: [idev] ++
4,328,198 UART: [idev] CDI.KEYID = 6
4,329,223 UART: [idev] SUBJECT.KEYID = 7
4,330,409 UART: [idev] UDS.KEYID = 0
4,331,439 ready_for_fw is high
4,331,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,525 UART: [idev] Erasing UDS.KEYID = 0
7,616,804 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,923 UART: [idev] --
7,643,647 UART: [ldev] ++
7,644,210 UART: [ldev] CDI.KEYID = 6
7,645,141 UART: [ldev] SUBJECT.KEYID = 5
7,646,398 UART: [ldev] AUTHORITY.KEYID = 7
7,647,620 UART: [ldev] FE.KEYID = 1
7,660,433 UART: [ldev] Erasing FE.KEYID = 1
10,951,016 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,334 UART: [ldev] --
13,309,994 UART: [fwproc] Waiting for Commands...
13,312,454 UART: [fwproc] Received command 0x46574c44
13,314,626 UART: [fwproc] Received Image of size 118548 bytes
17,441,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,520,929 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,594,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,923,149 >>> mbox cmd response: success
17,928,164 UART: [afmc] ++
17,928,790 UART: [afmc] CDI.KEYID = 6
17,929,671 UART: [afmc] SUBJECT.KEYID = 7
17,930,883 UART: [afmc] AUTHORITY.KEYID = 5
21,244,959 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,538,192 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,540,445 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,554,874 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,569,584 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,584,045 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,605,664 UART: [afmc] --
23,609,030 UART: [cold-reset] --
23,613,477 UART: [state] Locking Datavault
23,618,769 UART: [state] Locking PCR0, PCR1 and PCR31
23,620,513 UART: [state] Locking ICCM
23,623,040 UART: [exit] Launching FMC @ 0x40000130
23,631,427 UART:
23,631,662 UART: Running Caliptra FMC ...
23,632,755 UART:
23,632,906 UART: [state] CFI Enabled
23,640,704 UART: [fht] FMC Alias Private Key: 7
25,980,679 UART: [art] Extend RT PCRs Done
25,981,897 UART: [art] Lock RT PCRs Done
25,983,650 UART: [art] Populate DV Done
25,989,270 UART: [fht] FMC Alias Private Key: 7
25,990,747 UART: [art] Derive CDI
25,991,500 UART: [art] Store in slot 0x4
26,034,300 UART: [art] Derive Key Pair
26,035,297 UART: [art] Store priv key in slot 0x5
29,276,593 UART: [art] Derive Key Pair - Done
29,289,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,569,839 UART: [art] Erasing AUTHORITY.KEYID = 7
31,571,346 UART: [art] PUB.X = 0C75AEB081355E103377716376C82230328BAE0FEB817ADC12F47B172505ACB081CEC1FE7A7D6058A52D081A1278FAF7
31,578,633 UART: [art] PUB.Y = E86BB5B2DB66591A776E98CC6211B106C70FD3EDAEE8D2FD7D0A19859688909B81084E6CAE83766236546FAC53F9EA18
31,585,854 UART: [art] SIG.R = 70B12379F647A63F907D68566D21AB036968DBA28EC5CC5A5F4FD8A4C60025A3DF4B13BF3671C46EA017EEF80154D3EF
31,593,229 UART: [art] SIG.S = CEDBAA86708B59F3BF1B51CD3360E4CF065573011850D8FD29E94E2AD79491E8DF4C8FA058D2CA04F8995ADCBB9B6FBB
32,898,611 UART: Caliptra RT
32,899,316 UART: [state] CFI Enabled
33,032,486 UART: [rt] RT listening for mailbox commands...
33,034,411 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,064,317 UART: [rt]cmd =0x44504543, len=20
33,084,723 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
4,123,479 ready_for_fw is high
4,123,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,155,045 >>> mbox cmd response: success
23,802,587 UART:
23,802,993 UART: Running Caliptra FMC ...
23,804,143 UART:
23,804,323 UART: [state] CFI Enabled
23,811,906 UART: [fht] FMC Alias Private Key: 7
26,151,621 UART: [art] Extend RT PCRs Done
26,152,855 UART: [art] Lock RT PCRs Done
26,154,400 UART: [art] Populate DV Done
26,159,773 UART: [fht] FMC Alias Private Key: 7
26,161,471 UART: [art] Derive CDI
26,162,284 UART: [art] Store in slot 0x4
26,204,458 UART: [art] Derive Key Pair
26,205,503 UART: [art] Store priv key in slot 0x5
29,447,212 UART: [art] Derive Key Pair - Done
29,459,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,392 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,894 UART: [art] PUB.X = AD27B0EF8EF3B8DC5A459D48A3A88514922C7AE786A51BDFE1920574EECE53C594526457F0BA50E371DC8716BB30B0FB
31,749,189 UART: [art] PUB.Y = 19366492047FFBEBEF8E0314D819278663D38F32748C1FCA2CE73C6BEF7C7D6B6583E556B6E7217F7707884CF9DFDC76
31,756,431 UART: [art] SIG.R = CB80B0E4920D6EBAC22E636A984EDE6970093802CE0BE3DF9E20DCF81211324A80785E6FE6E9CD86D1C102025B71D205
31,763,840 UART: [art] SIG.S = 8779B67F7E5E32AADB80AC7121D3AC1BF6DF79C052A1D1043C97BDB011618BE557F30C8A6DFBD2013830E26AA837140B
33,068,746 UART: Caliptra RT
33,069,458 UART: [state] CFI Enabled
33,201,969 UART: [rt] RT listening for mailbox commands...
33,203,880 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
33,233,776 UART: [rt]cmd =0x44504543, len=20
33,254,064 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
192,003 UART:
192,368 UART: Running Caliptra ROM ...
193,497 UART:
193,645 UART: [state] CFI Enabled
265,768 UART: [state] LifecycleState = Unprovisioned
267,741 UART: [state] DebugLocked = No
269,825 UART: [state] WD Timer not started. Device not locked for debugging
274,219 UART: [kat] SHA2-256
453,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,714 UART: [kat] ++
465,163 UART: [kat] sha1
475,674 UART: [kat] SHA2-256
478,340 UART: [kat] SHA2-384
484,821 UART: [kat] SHA2-512-ACC
487,191 UART: [kat] ECC-384
2,949,902 UART: [kat] HMAC-384Kdf
2,973,428 UART: [kat] LMS
3,449,922 UART: [kat] --
3,456,340 UART: [cold-reset] ++
3,457,980 UART: [fht] FHT @ 0x50003400
3,469,734 UART: [idev] ++
3,470,288 UART: [idev] CDI.KEYID = 6
3,471,235 UART: [idev] SUBJECT.KEYID = 7
3,472,472 UART: [idev] UDS.KEYID = 0
3,473,438 ready_for_fw is high
3,473,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,028 UART: [idev] Erasing UDS.KEYID = 0
5,989,102 UART: [idev] Sha1 KeyId Algorithm
6,011,815 UART: [idev] --
6,017,812 UART: [ldev] ++
6,018,393 UART: [ldev] CDI.KEYID = 6
6,019,305 UART: [ldev] SUBJECT.KEYID = 5
6,020,518 UART: [ldev] AUTHORITY.KEYID = 7
6,021,747 UART: [ldev] FE.KEYID = 1
6,060,965 UART: [ldev] Erasing FE.KEYID = 1
8,564,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,707 UART: [ldev] --
10,378,383 UART: [fwproc] Wait for Commands...
10,381,136 UART: [fwproc] Recv command 0x46574c44
10,383,169 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,849 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,860 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,807 >>> mbox cmd response: success
14,353,313 UART: [afmc] ++
14,353,928 UART: [afmc] CDI.KEYID = 6
14,354,852 UART: [afmc] SUBJECT.KEYID = 7
14,356,070 UART: [afmc] AUTHORITY.KEYID = 5
16,897,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,738 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,419 UART: [afmc] --
18,719,411 UART: [cold-reset] --
18,722,210 UART: [state] Locking Datavault
18,727,348 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,102 UART: [state] Locking ICCM
18,731,194 UART: [exit] Launching FMC @ 0x40000130
18,739,582 UART:
18,739,811 UART: Running Caliptra FMC ...
18,740,904 UART:
18,741,064 UART: [state] CFI Enabled
18,797,796 UART: [fht] FMC Alias Private Key: 7
20,564,411 UART: [art] Extend RT PCRs Done
20,565,630 UART: [art] Lock RT PCRs Done
20,567,172 UART: [art] Populate DV Done
20,572,475 UART: [fht] FMC Alias Private Key: 7
20,574,013 UART: [art] Derive CDI
20,574,775 UART: [art] Store in slot 0x4
20,630,567 UART: [art] Derive Key Pair
20,631,620 UART: [art] Store priv key in slot 0x5
23,094,664 UART: [art] Derive Key Pair - Done
23,107,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,296 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,805 UART: [art] PUB.X = 7D49B90D24E28F51388AEF08C37F77F280B4FF249D3AC6B38DA6835F992ED67A424A5CA1C44E287462D82D60C22A36BD
24,829,113 UART: [art] PUB.Y = 719CB238B6FAC823241EFFFFDFF37C7D56F453DD81A4C57E775360FFF26F8AB540DF4F98C320B62938A5F85A02A69596
24,836,341 UART: [art] SIG.R = 9457FB26073CCF095859CEA5B1C9F056602E2931C192E6AF1DA9FB722ACAA7643B05C24871652769817D3974D78EE86C
24,843,792 UART: [art] SIG.S = F5C189A30959AF3CF47DC14C511788F5A137618EAD159806E8522A3D9007E693E7DD565B82CAA918E2071E0369EE0889
25,823,421 UART: Caliptra RT
25,824,122 UART: [state] CFI Enabled
26,004,092 UART: [rt] RT listening for mailbox commands...
26,006,007 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,035,979 UART: [rt]cmd =0x44504543, len=20
26,056,576 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,461,984 ready_for_fw is high
3,462,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,701 >>> mbox cmd response: success
18,527,630 UART:
18,528,036 UART: Running Caliptra FMC ...
18,529,149 UART:
18,529,310 UART: [state] CFI Enabled
18,593,719 UART: [fht] FMC Alias Private Key: 7
20,360,030 UART: [art] Extend RT PCRs Done
20,361,263 UART: [art] Lock RT PCRs Done
20,362,941 UART: [art] Populate DV Done
20,368,361 UART: [fht] FMC Alias Private Key: 7
20,369,954 UART: [art] Derive CDI
20,370,787 UART: [art] Store in slot 0x4
20,426,013 UART: [art] Derive Key Pair
20,427,084 UART: [art] Store priv key in slot 0x5
22,890,158 UART: [art] Derive Key Pair - Done
22,903,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,614,948 UART: [art] Erasing AUTHORITY.KEYID = 7
24,616,462 UART: [art] PUB.X = 8DFD7A64AB01B3A391EEB9D666273A8A49176F869D77E0E74E26F6D37E56D937692FF14E56F85EE5F85D86AF7FC52111
24,623,715 UART: [art] PUB.Y = 6B26F7F2098787D207F8C5D64FE8343043F5657A98ADECA642CABDFC2B7133B7DF00B0C0A4B646CDDA29E115E84A7D9F
24,630,967 UART: [art] SIG.R = 64A8ECE5A1CD2C9FD1CFAAED2FA19FF9B5035948D45BC9786F168C6940687F582F2AD280D6F86E0EC49802C1E3A80252
24,638,368 UART: [art] SIG.S = 430006CC75EC1585A110EFCA8EB44EA312E1BF29D0419633CD143A3D6D8A5B2484FB8AF1F3890F0DD8CAAA35382E8CC7
25,616,629 UART: Caliptra RT
25,617,329 UART: [state] CFI Enabled
25,797,887 UART: [rt] RT listening for mailbox commands...
25,799,794 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,829,860 UART: [rt]cmd =0x44504543, len=20
25,850,434 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
192,567 UART:
192,925 UART: Running Caliptra ROM ...
194,112 UART:
603,810 UART: [state] CFI Enabled
621,108 UART: [state] LifecycleState = Unprovisioned
623,029 UART: [state] DebugLocked = No
625,725 UART: [state] WD Timer not started. Device not locked for debugging
630,049 UART: [kat] SHA2-256
809,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,448 UART: [kat] ++
820,924 UART: [kat] sha1
832,319 UART: [kat] SHA2-256
835,050 UART: [kat] SHA2-384
840,618 UART: [kat] SHA2-512-ACC
842,988 UART: [kat] ECC-384
3,283,061 UART: [kat] HMAC-384Kdf
3,296,997 UART: [kat] LMS
3,773,484 UART: [kat] --
3,775,864 UART: [cold-reset] ++
3,777,942 UART: [fht] FHT @ 0x50003400
3,789,628 UART: [idev] ++
3,790,270 UART: [idev] CDI.KEYID = 6
3,791,174 UART: [idev] SUBJECT.KEYID = 7
3,792,421 UART: [idev] UDS.KEYID = 0
3,793,325 ready_for_fw is high
3,793,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,372 UART: [idev] Erasing UDS.KEYID = 0
6,267,216 UART: [idev] Sha1 KeyId Algorithm
6,291,609 UART: [idev] --
6,295,830 UART: [ldev] ++
6,296,403 UART: [ldev] CDI.KEYID = 6
6,297,332 UART: [ldev] SUBJECT.KEYID = 5
6,298,552 UART: [ldev] AUTHORITY.KEYID = 7
6,299,785 UART: [ldev] FE.KEYID = 1
6,311,572 UART: [ldev] Erasing FE.KEYID = 1
8,790,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,726 UART: [ldev] --
10,584,508 UART: [fwproc] Wait for Commands...
10,587,631 UART: [fwproc] Recv command 0x46574c44
10,589,669 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,712 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,166,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,239,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,567,087 >>> mbox cmd response: success
14,571,758 UART: [afmc] ++
14,572,373 UART: [afmc] CDI.KEYID = 6
14,573,262 UART: [afmc] SUBJECT.KEYID = 7
14,574,531 UART: [afmc] AUTHORITY.KEYID = 5
17,073,930 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,543 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,412 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,168 UART: [afmc] --
18,876,473 UART: [cold-reset] --
18,880,716 UART: [state] Locking Datavault
18,885,261 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,971 UART: [state] Locking ICCM
18,889,017 UART: [exit] Launching FMC @ 0x40000130
18,897,420 UART:
18,897,655 UART: Running Caliptra FMC ...
18,898,760 UART:
18,898,930 UART: [state] CFI Enabled
18,907,194 UART: [fht] FMC Alias Private Key: 7
20,673,714 UART: [art] Extend RT PCRs Done
20,674,946 UART: [art] Lock RT PCRs Done
20,676,494 UART: [art] Populate DV Done
20,681,861 UART: [fht] FMC Alias Private Key: 7
20,683,503 UART: [art] Derive CDI
20,684,243 UART: [art] Store in slot 0x4
20,726,998 UART: [art] Derive Key Pair
20,728,035 UART: [art] Store priv key in slot 0x5
23,155,254 UART: [art] Derive Key Pair - Done
23,168,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,349 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,857 UART: [art] PUB.X = 99A489197AB6B6F964E70B6C18161881C19E9E8FB88796D8167DF03A7F5F7301FF850E89BF8FE98D1F724E55A3633BCA
24,883,166 UART: [art] PUB.Y = 14E4DFE130C4F2DECF5A55806AFD26B6CEC4C04B7B2769C159BBDD7D37153EBBAA94BE32B769BDD6172533542E3262CC
24,890,455 UART: [art] SIG.R = C81FD239BE0069C18562375769D8CB75806102A93BCA08DD5789CA2640BCB8DD7EFDBBD69870A2FFF51E7C42CFF0BEFD
24,897,845 UART: [art] SIG.S = 98B9FFE917A7353C7FAB42291AA866D43205223AFB60C50EC48E35D8FD7FE439FA5B0B88CAAA50E1D4246322B4E17CF0
25,876,912 UART: Caliptra RT
25,877,626 UART: [state] CFI Enabled
26,009,847 UART: [rt] RT listening for mailbox commands...
26,011,772 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,041,517 UART: [rt]cmd =0x44504543, len=20
26,061,984 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,782,162 ready_for_fw is high
3,782,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,294 >>> mbox cmd response: success
18,702,401 UART:
18,702,799 UART: Running Caliptra FMC ...
18,703,948 UART:
18,704,136 UART: [state] CFI Enabled
18,712,092 UART: [fht] FMC Alias Private Key: 7
20,478,225 UART: [art] Extend RT PCRs Done
20,479,489 UART: [art] Lock RT PCRs Done
20,480,964 UART: [art] Populate DV Done
20,486,340 UART: [fht] FMC Alias Private Key: 7
20,488,050 UART: [art] Derive CDI
20,488,877 UART: [art] Store in slot 0x4
20,531,577 UART: [art] Derive Key Pair
20,532,608 UART: [art] Store priv key in slot 0x5
22,959,779 UART: [art] Derive Key Pair - Done
22,972,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,865 UART: [art] PUB.X = F61C2B2FF8B9354D37F0E283734939F8A2568AC23CABB2A240A41424256568FEB0B1109146B713AF1C4CBD3BB2F24F73
24,688,135 UART: [art] PUB.Y = 997DA079F2E865E530911DD47B8689826AD6ED2EFF21000158B9E09BF6966F8262DD5551C4D14218995755F4D9C43548
24,695,356 UART: [art] SIG.R = 4328143E826E762175720087B60B1DC3C7AEB0CC28E625534878364E669FCE66372C817C9244C2209E5D63EC3AF5524C
24,702,727 UART: [art] SIG.S = F34A6535C78BB8D7D167E61ABA71FCD754084AAC99A8BDB6714341ACB796792C30DFD9D2469CDFE7F42366EB786E1987
25,681,125 UART: Caliptra RT
25,681,828 UART: [state] CFI Enabled
25,815,114 UART: [rt] RT listening for mailbox commands...
25,817,026 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
25,846,885 UART: [rt]cmd =0x44504543, len=20
25,867,354 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,035 UART:
192,411 UART: Running Caliptra ROM ...
193,504 UART:
193,648 UART: [state] CFI Enabled
265,332 UART: [state] LifecycleState = Unprovisioned
267,735 UART: [state] DebugLocked = No
269,165 UART: [state] WD Timer not started. Device not locked for debugging
273,561 UART: [kat] SHA2-256
463,431 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,185 UART: [kat] ++
474,632 UART: [kat] sha1
487,347 UART: [kat] SHA2-256
490,354 UART: [kat] SHA2-384
495,704 UART: [kat] SHA2-512-ACC
498,279 UART: [kat] ECC-384
2,947,382 UART: [kat] HMAC-384Kdf
2,972,349 UART: [kat] LMS
3,504,090 UART: [kat] --
3,510,651 UART: [cold-reset] ++
3,513,006 UART: [fht] FHT @ 0x50003400
3,524,125 UART: [idev] ++
3,524,761 UART: [idev] CDI.KEYID = 6
3,525,734 UART: [idev] SUBJECT.KEYID = 7
3,526,976 UART: [idev] UDS.KEYID = 0
3,527,871 ready_for_fw is high
3,528,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,120 UART: [idev] Erasing UDS.KEYID = 0
6,027,605 UART: [idev] Sha1 KeyId Algorithm
6,049,950 UART: [idev] --
6,054,902 UART: [ldev] ++
6,055,588 UART: [ldev] CDI.KEYID = 6
6,056,477 UART: [ldev] SUBJECT.KEYID = 5
6,057,682 UART: [ldev] AUTHORITY.KEYID = 7
6,058,858 UART: [ldev] FE.KEYID = 1
6,101,330 UART: [ldev] Erasing FE.KEYID = 1
8,605,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,862 UART: [ldev] --
10,414,745 UART: [fwproc] Wait for Commands...
10,416,942 UART: [fwproc] Recv command 0x46574c44
10,419,244 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,812 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,319 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,923 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,054 >>> mbox cmd response: success
14,684,017 UART: [afmc] ++
14,684,747 UART: [afmc] CDI.KEYID = 6
14,685,945 UART: [afmc] SUBJECT.KEYID = 7
14,687,385 UART: [afmc] AUTHORITY.KEYID = 5
17,212,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,366 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,245 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,348 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,544 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,410 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,553 UART: [afmc] --
19,010,723 UART: [cold-reset] --
19,013,330 UART: [state] Locking Datavault
19,017,186 UART: [state] Locking PCR0, PCR1 and PCR31
19,019,399 UART: [state] Locking ICCM
19,021,583 UART: [exit] Launching FMC @ 0x40000130
19,030,253 UART:
19,030,487 UART: Running Caliptra FMC ...
19,031,586 UART:
19,031,741 UART: [state] CFI Enabled
19,096,813 UART: [fht] FMC Alias Private Key: 7
20,863,582 UART: [art] Extend RT PCRs Done
20,864,820 UART: [art] Lock RT PCRs Done
20,866,469 UART: [art] Populate DV Done
20,871,930 UART: [fht] FMC Alias Private Key: 7
20,873,458 UART: [art] Derive CDI
20,874,189 UART: [art] Store in slot 0x4
20,929,436 UART: [art] Derive Key Pair
20,930,474 UART: [art] Store priv key in slot 0x5
23,393,573 UART: [art] Derive Key Pair - Done
23,406,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,905 UART: [art] PUB.X = BC9A4E70635F524DBDC6754B5E9DECE9E743F83A0EC76FDB1B0F6CFA3076F80B7CA6E3AF93F4DEB1985FFE79164A7DB8
25,128,211 UART: [art] PUB.Y = C4123E240EAA012ACE12CF87CDD9BD0440FD61A5ED269F008A3B03574CF8A72E8E63FE674CB4B0B4EF1FF32A5B39960C
25,135,506 UART: [art] SIG.R = D422B8E97B28486A9D6514191594AAA4A60ECE8B9A1710C0B1AF9782AD9A0F507875951FD6ABC0AFBE129C44EFEBEC2C
25,142,912 UART: [art] SIG.S = 0EB55483CAA0EEBB8F426E00B4631ED23723936BC83997B8326BD8457743DB68C38FBCC859F62504BA17E4B8235B35BA
26,122,340 UART: Caliptra RT
26,123,048 UART: [state] CFI Enabled
26,303,856 UART: [rt] RT listening for mailbox commands...
26,305,780 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,335,748 UART: [rt]cmd =0x44504543, len=20
26,356,092 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,438,975 ready_for_fw is high
3,439,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,306 >>> mbox cmd response: success
19,107,477 UART:
19,107,877 UART: Running Caliptra FMC ...
19,109,031 UART:
19,109,199 UART: [state] CFI Enabled
19,177,844 UART: [fht] FMC Alias Private Key: 7
20,944,266 UART: [art] Extend RT PCRs Done
20,945,493 UART: [art] Lock RT PCRs Done
20,947,121 UART: [art] Populate DV Done
20,952,436 UART: [fht] FMC Alias Private Key: 7
20,954,184 UART: [art] Derive CDI
20,955,011 UART: [art] Store in slot 0x4
21,010,626 UART: [art] Derive Key Pair
21,011,624 UART: [art] Store priv key in slot 0x5
23,474,605 UART: [art] Derive Key Pair - Done
23,487,391 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,817 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,337 UART: [art] PUB.X = 3D54F23A10DAA4FD2B9E1BE986255D7734930CE4B36BDC12ED714D6B04226A938781DC3820A33CE282593005665F3446
25,208,585 UART: [art] PUB.Y = E51E236D7683D7C9EC6A13EA9AA24F88618D8AA96582F626E96862E95603BA211AC272E1428C281E81A350AA2857B7D6
25,215,835 UART: [art] SIG.R = CABFDEC533ABDA95A3F4AD3CEF7C95A212CE96D476D395918EB2A7C615228670A2577DAE1FC2868BD65AC0C8583F0CDE
25,223,245 UART: [art] SIG.S = 12E8EC09C77CC35D6B6355B9FBF8A23ED4A7B836124D34581533F40DEB0B503D79FC1F7000A40E89DE802E6012A57C89
26,202,519 UART: Caliptra RT
26,203,234 UART: [state] CFI Enabled
26,384,116 UART: [rt] RT listening for mailbox commands...
26,386,043 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,415,956 UART: [rt]cmd =0x44504543, len=20
26,436,351 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,478 UART:
192,849 UART: Running Caliptra ROM ...
194,021 UART:
603,768 UART: [state] CFI Enabled
616,678 UART: [state] LifecycleState = Unprovisioned
619,087 UART: [state] DebugLocked = No
620,496 UART: [state] WD Timer not started. Device not locked for debugging
624,412 UART: [kat] SHA2-256
814,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,062 UART: [kat] ++
825,590 UART: [kat] sha1
837,029 UART: [kat] SHA2-256
840,039 UART: [kat] SHA2-384
846,106 UART: [kat] SHA2-512-ACC
848,658 UART: [kat] ECC-384
3,288,027 UART: [kat] HMAC-384Kdf
3,301,985 UART: [kat] LMS
3,833,856 UART: [kat] --
3,839,078 UART: [cold-reset] ++
3,841,230 UART: [fht] FHT @ 0x50003400
3,852,566 UART: [idev] ++
3,853,204 UART: [idev] CDI.KEYID = 6
3,854,191 UART: [idev] SUBJECT.KEYID = 7
3,855,363 UART: [idev] UDS.KEYID = 0
3,856,292 ready_for_fw is high
3,856,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,676 UART: [idev] Erasing UDS.KEYID = 0
6,333,674 UART: [idev] Sha1 KeyId Algorithm
6,354,841 UART: [idev] --
6,358,677 UART: [ldev] ++
6,359,359 UART: [ldev] CDI.KEYID = 6
6,360,276 UART: [ldev] SUBJECT.KEYID = 5
6,361,438 UART: [ldev] AUTHORITY.KEYID = 7
6,362,669 UART: [ldev] FE.KEYID = 1
6,373,799 UART: [ldev] Erasing FE.KEYID = 1
8,851,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,788 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,651 UART: [ldev] --
10,642,298 UART: [fwproc] Wait for Commands...
10,645,155 UART: [fwproc] Recv command 0x46574c44
10,647,467 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,560 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,201 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,804 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,215 >>> mbox cmd response: success
14,920,023 UART: [afmc] ++
14,920,759 UART: [afmc] CDI.KEYID = 6
14,921,980 UART: [afmc] SUBJECT.KEYID = 7
14,923,380 UART: [afmc] AUTHORITY.KEYID = 5
17,425,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,043 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,076 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,258 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,136 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,140 UART: [afmc] --
19,220,451 UART: [cold-reset] --
19,225,568 UART: [state] Locking Datavault
19,230,948 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,108 UART: [state] Locking ICCM
19,235,385 UART: [exit] Launching FMC @ 0x40000130
19,244,092 UART:
19,244,331 UART: Running Caliptra FMC ...
19,245,383 UART:
19,245,536 UART: [state] CFI Enabled
19,253,704 UART: [fht] FMC Alias Private Key: 7
21,020,029 UART: [art] Extend RT PCRs Done
21,021,259 UART: [art] Lock RT PCRs Done
21,022,754 UART: [art] Populate DV Done
21,028,121 UART: [fht] FMC Alias Private Key: 7
21,029,773 UART: [art] Derive CDI
21,030,516 UART: [art] Store in slot 0x4
21,073,113 UART: [art] Derive Key Pair
21,074,117 UART: [art] Store priv key in slot 0x5
23,501,275 UART: [art] Derive Key Pair - Done
23,514,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,664 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,168 UART: [art] PUB.X = E396831C29A96D3A8B1FB45A5AC28226E70AFC0CF000B926FBCA734CB9B6326778F638B3EBA7503DB4298CAA6ED617B4
25,229,428 UART: [art] PUB.Y = 8D75B2B14010724A379E098E714E2335A23AF8BAC1AD1B65D9172B5263A7DB127F12436E6651231BE10801C28A421C1D
25,236,659 UART: [art] SIG.R = 52EED3275C685916423FCB9DAF8B819C20C6AE05D5D34BE83E3E5CCCFD497138B68639FE38BBB164BA5E519E90FB4F50
25,244,084 UART: [art] SIG.S = 59FC96E23619019089A4CC81CA72C83B6FD6F391DAD70B1C4EC1BC89385144F3C66482D33D48B6536BC8CBEC44AE69FA
26,222,855 UART: Caliptra RT
26,223,543 UART: [state] CFI Enabled
26,356,425 UART: [rt] RT listening for mailbox commands...
26,358,339 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,388,314 UART: [rt]cmd =0x44504543, len=20
26,408,707 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,753,834 ready_for_fw is high
3,754,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,893 >>> mbox cmd response: success
19,296,570 UART:
19,296,955 UART: Running Caliptra FMC ...
19,298,156 UART:
19,298,340 UART: [state] CFI Enabled
19,305,973 UART: [fht] FMC Alias Private Key: 7
21,072,150 UART: [art] Extend RT PCRs Done
21,073,382 UART: [art] Lock RT PCRs Done
21,074,968 UART: [art] Populate DV Done
21,080,449 UART: [fht] FMC Alias Private Key: 7
21,081,946 UART: [art] Derive CDI
21,082,946 UART: [art] Store in slot 0x4
21,125,720 UART: [art] Derive Key Pair
21,126,739 UART: [art] Store priv key in slot 0x5
23,553,397 UART: [art] Derive Key Pair - Done
23,566,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,321 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,831 UART: [art] PUB.X = 5CED753A1394A63DDEDFE49D8B56B9ADABB79DD56BFC632AE59C6B7ED8CA23D72D024D6FE4266A98D4D038343A6185CF
25,282,155 UART: [art] PUB.Y = C966A093BC8213DC4E3E6E18A6350CD4452DDC7AB9FB131AABD73A22BE538223C23D7E8ABD831F00B7CDB050DE620660
25,289,379 UART: [art] SIG.R = 72E25FF5EF004550A7885E34937C44D765A31BB0558387655B12CB7D9EE750B3B00E37B7B971D7107D6B9BEC9B0C0859
25,296,748 UART: [art] SIG.S = 1C123D2B01101BB6352A9C18DBC2D23818AFEB96C729A5030A5E153E1D8FC899707172A62CAB0D10C8AA1961C295B3CB
26,275,572 UART: Caliptra RT
26,276,265 UART: [state] CFI Enabled
26,409,054 UART: [rt] RT listening for mailbox commands...
26,410,973 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
26,440,933 UART: [rt]cmd =0x44504543, len=20
26,461,676 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,545 UART: [kat] SHA2-256
892,483 UART: [kat] SHA2-384
895,224 UART: [kat] SHA2-512-ACC
897,125 UART: [kat] ECC-384
902,778 UART: [kat] HMAC-384Kdf
907,448 UART: [kat] LMS
1,475,644 UART: [kat] --
1,476,455 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,684 UART: [idev] ++
1,479,852 UART: [idev] CDI.KEYID = 6
1,480,212 UART: [idev] SUBJECT.KEYID = 7
1,480,636 UART: [idev] UDS.KEYID = 0
1,480,981 ready_for_fw is high
1,480,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,452 UART: [idev] Erasing UDS.KEYID = 0
1,505,218 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,664 UART: [idev] --
1,514,785 UART: [ldev] ++
1,514,953 UART: [ldev] CDI.KEYID = 6
1,515,316 UART: [ldev] SUBJECT.KEYID = 5
1,515,742 UART: [ldev] AUTHORITY.KEYID = 7
1,516,205 UART: [ldev] FE.KEYID = 1
1,521,507 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,163 UART: [fwproc] Waiting for Commands...
1,586,920 UART: [fwproc] Received command 0x46574c44
1,587,711 UART: [fwproc] Received Image of size 118548 bytes
2,932,905 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,815 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,033 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,268 >>> mbox cmd response: success
3,132,526 UART: [afmc] ++
3,132,694 UART: [afmc] CDI.KEYID = 6
3,133,056 UART: [afmc] SUBJECT.KEYID = 7
3,133,481 UART: [afmc] AUTHORITY.KEYID = 5
3,168,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,658 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,341 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,219 UART: [afmc] --
3,212,243 UART: [cold-reset] --
3,213,113 UART: [state] Locking Datavault
3,214,046 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,650 UART: [state] Locking ICCM
3,215,192 UART: [exit] Launching FMC @ 0x40000130
3,220,522 UART:
3,220,538 UART: Running Caliptra FMC ...
3,220,946 UART:
3,221,000 UART: [state] CFI Enabled
3,231,692 UART: [fht] FMC Alias Private Key: 7
3,351,154 UART: [art] Extend RT PCRs Done
3,351,582 UART: [art] Lock RT PCRs Done
3,353,412 UART: [art] Populate DV Done
3,361,581 UART: [fht] FMC Alias Private Key: 7
3,362,655 UART: [art] Derive CDI
3,362,935 UART: [art] Store in slot 0x4
3,448,485 UART: [art] Derive Key Pair
3,448,845 UART: [art] Store priv key in slot 0x5
3,462,092 UART: [art] Derive Key Pair - Done
3,476,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,806 UART: [art] PUB.X = 6EEF3682449BEE4F8914AFA3B44EF6EC089F7D7C4684A91ACFB0BFB16330DFA89CC7A5FCE6D2B9DA53E91B821F6B2E5D
3,499,601 UART: [art] PUB.Y = CDC955D8575BA5ED5ACAF5FEE88D97A2BFA180656E13FC56C082788E399161DC26D5F54FE3A519DEED04ED38BC0695AB
3,506,567 UART: [art] SIG.R = 4482AA9241422C80C2AD262F4B579C628241B6DAE461DC8FABBCB772EE2CB7ED04BBAE74494A86F6F33FFFF713B17454
3,513,350 UART: [art] SIG.S = 2704797821862D7D6A668E52D00C7C0E6EB677A5468CC6193675A2A3DB8FDFEE24DC1F70BDC3577B755D230F172DE7B4
3,536,384 UART: Caliptra RT
3,536,635 UART: [state] CFI Enabled
3,656,668 UART: [rt] RT listening for mailbox commands...
3,657,338 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,954 UART: [rt]cmd =0x44504543, len=20
3,708,044 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,207 ready_for_fw is high
1,363,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,348 >>> mbox cmd response: success
3,041,901 UART:
3,041,917 UART: Running Caliptra FMC ...
3,042,325 UART:
3,042,379 UART: [state] CFI Enabled
3,052,661 UART: [fht] FMC Alias Private Key: 7
3,171,385 UART: [art] Extend RT PCRs Done
3,171,813 UART: [art] Lock RT PCRs Done
3,173,447 UART: [art] Populate DV Done
3,181,592 UART: [fht] FMC Alias Private Key: 7
3,182,564 UART: [art] Derive CDI
3,182,844 UART: [art] Store in slot 0x4
3,268,540 UART: [art] Derive Key Pair
3,268,900 UART: [art] Store priv key in slot 0x5
3,281,271 UART: [art] Derive Key Pair - Done
3,296,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,412 UART: [art] PUB.X = 9148374D781BDDEC5B29C9B79BCE872FB5506363790E3BE061DA7DA110705BD2B4C6374DE904A7985A3049677157B3AA
3,319,178 UART: [art] PUB.Y = E72FFEB6A1A870E449BC8677AC5CB6627E972339EBBE310B9F9DEB9E20F37EB16567F8560A471CB6E5F1BCC91F3EE611
3,326,140 UART: [art] SIG.R = 96F48868D2C5C953F7E0F28FCB1CE911BC6A910EBEC21BDF9F209BBE682CB2C852C26B5D497A115796C01CC552495BFD
3,332,923 UART: [art] SIG.S = D65E1B1C0270B96C43966BEF4B9DC5E809683B018B2794265165A2376610F02D8744A8B7BB4EF83F1A8271CEAD6514D4
3,356,656 UART: Caliptra RT
3,356,907 UART: [state] CFI Enabled
3,476,680 UART: [rt] RT listening for mailbox commands...
3,477,350 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,418 UART: [rt]cmd =0x44504543, len=20
3,528,120 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,612 UART: [kat] SHA2-256
882,543 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,658 UART: [kat] ++
886,810 UART: [kat] sha1
890,992 UART: [kat] SHA2-256
892,930 UART: [kat] SHA2-384
895,729 UART: [kat] SHA2-512-ACC
897,630 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,803 UART: [kat] LMS
1,475,999 UART: [kat] --
1,476,772 UART: [cold-reset] ++
1,477,272 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 ready_for_fw is high
1,481,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,789 UART: [idev] Erasing UDS.KEYID = 0
1,505,321 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,514,838 UART: [ldev] ++
1,515,006 UART: [ldev] CDI.KEYID = 6
1,515,369 UART: [ldev] SUBJECT.KEYID = 5
1,515,795 UART: [ldev] AUTHORITY.KEYID = 7
1,516,258 UART: [ldev] FE.KEYID = 1
1,521,720 UART: [ldev] Erasing FE.KEYID = 1
1,547,537 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,821 UART: [ldev] --
1,586,096 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 118548 bytes
2,932,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,634 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,852 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,301 >>> mbox cmd response: success
3,132,323 UART: [afmc] ++
3,132,491 UART: [afmc] CDI.KEYID = 6
3,132,853 UART: [afmc] SUBJECT.KEYID = 7
3,133,278 UART: [afmc] AUTHORITY.KEYID = 5
3,168,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,495 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,178 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,154 UART: [afmc] --
3,212,194 UART: [cold-reset] --
3,213,070 UART: [state] Locking Datavault
3,214,139 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,743 UART: [state] Locking ICCM
3,215,195 UART: [exit] Launching FMC @ 0x40000130
3,220,525 UART:
3,220,541 UART: Running Caliptra FMC ...
3,220,949 UART:
3,221,092 UART: [state] CFI Enabled
3,231,510 UART: [fht] FMC Alias Private Key: 7
3,351,086 UART: [art] Extend RT PCRs Done
3,351,514 UART: [art] Lock RT PCRs Done
3,353,180 UART: [art] Populate DV Done
3,361,517 UART: [fht] FMC Alias Private Key: 7
3,362,645 UART: [art] Derive CDI
3,362,925 UART: [art] Store in slot 0x4
3,448,755 UART: [art] Derive Key Pair
3,449,115 UART: [art] Store priv key in slot 0x5
3,462,246 UART: [art] Derive Key Pair - Done
3,477,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,685 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,450 UART: [art] PUB.X = AD04A8E1FDF6E7518EAB6BC90F63BE4E4449E9A6F2B8BE6B8355D158C5399033B7067BFC584D11E3AC59A66729AD72DE
3,500,227 UART: [art] PUB.Y = 2337AE145BDAF5C7A93243DCA64B0F027610B9689A44BF4B0F2DB8A306876AC7920BCE0477BFFF4F8FB92A0EB9C1A83F
3,507,174 UART: [art] SIG.R = B6EC2398D56516A327A56F0F2E17BB94B1121FE0A87490B984FC956BE7D49E5CF6BBA74D3F8EB10DD624D6C3918FE1B4
3,513,952 UART: [art] SIG.S = EF40F83EDE0A9BB0C052D215FAC0A034071F861CC4F2E45125A1D27E9301FC1FBC0A0D165A98080D8C56567A6F981326
3,537,409 UART: Caliptra RT
3,537,752 UART: [state] CFI Enabled
3,658,037 UART: [rt] RT listening for mailbox commands...
3,658,707 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,547 UART: [rt]cmd =0x44504543, len=20
3,709,465 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,442 ready_for_fw is high
1,362,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,557 >>> mbox cmd response: success
3,043,798 UART:
3,043,814 UART: Running Caliptra FMC ...
3,044,222 UART:
3,044,365 UART: [state] CFI Enabled
3,055,043 UART: [fht] FMC Alias Private Key: 7
3,174,503 UART: [art] Extend RT PCRs Done
3,174,931 UART: [art] Lock RT PCRs Done
3,176,415 UART: [art] Populate DV Done
3,184,792 UART: [fht] FMC Alias Private Key: 7
3,185,854 UART: [art] Derive CDI
3,186,134 UART: [art] Store in slot 0x4
3,271,816 UART: [art] Derive Key Pair
3,272,176 UART: [art] Store priv key in slot 0x5
3,286,155 UART: [art] Derive Key Pair - Done
3,300,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,444 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,209 UART: [art] PUB.X = 3DFFFB002E03A0715D9991B62974462E9C9530818355C5F386993678E44AAA05DD069033061A63A50510E6E1324B3589
3,323,928 UART: [art] PUB.Y = C2885CCC37B854CAB5B21D9E9E71E4E909C27662E7F6BD556C859B062361D412992344BD20364BC410BFB9B73E3F88B2
3,330,876 UART: [art] SIG.R = 5F1F30251F0F262F4ADC0F6ADD1F6E9AB35E9EFEFCCFEE3B5F286B5308F875B59F72D3607C6C2D4E2C4A33F1DE969B94
3,337,661 UART: [art] SIG.S = B1B1BE545345E6F8C8B73A649B93CF4A4A6567335E2FA4C167F8E9CD6AB165F11F3D2498A65053DEB1926E1D5A46E0AD
3,360,895 UART: Caliptra RT
3,361,238 UART: [state] CFI Enabled
3,481,870 UART: [rt] RT listening for mailbox commands...
3,482,540 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,506 UART: [rt]cmd =0x44504543, len=20
3,533,384 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,047 UART: [kat] SHA2-512-ACC
905,948 UART: [kat] ECC-384
915,073 UART: [kat] HMAC-384Kdf
919,719 UART: [kat] LMS
1,168,031 UART: [kat] --
1,169,136 UART: [cold-reset] ++
1,169,688 UART: [fht] FHT @ 0x50003400
1,172,368 UART: [idev] ++
1,172,536 UART: [idev] CDI.KEYID = 6
1,172,897 UART: [idev] SUBJECT.KEYID = 7
1,173,322 UART: [idev] UDS.KEYID = 0
1,173,668 ready_for_fw is high
1,173,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,013 UART: [idev] Erasing UDS.KEYID = 0
1,198,163 UART: [idev] Sha1 KeyId Algorithm
1,207,117 UART: [idev] --
1,208,138 UART: [ldev] ++
1,208,306 UART: [ldev] CDI.KEYID = 6
1,208,670 UART: [ldev] SUBJECT.KEYID = 5
1,209,097 UART: [ldev] AUTHORITY.KEYID = 7
1,209,560 UART: [ldev] FE.KEYID = 1
1,214,604 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,738 UART: [ldev] --
1,279,949 UART: [fwproc] Wait for Commands...
1,280,694 UART: [fwproc] Recv command 0x46574c44
1,281,427 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,433 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,608 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,915 >>> mbox cmd response: success
2,826,085 UART: [afmc] ++
2,826,253 UART: [afmc] CDI.KEYID = 6
2,826,616 UART: [afmc] SUBJECT.KEYID = 7
2,827,042 UART: [afmc] AUTHORITY.KEYID = 5
2,863,121 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,579 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,170 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,871 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,662 UART: [afmc] --
2,906,703 UART: [cold-reset] --
2,907,755 UART: [state] Locking Datavault
2,908,978 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,582 UART: [state] Locking ICCM
2,910,074 UART: [exit] Launching FMC @ 0x40000130
2,915,404 UART:
2,915,420 UART: Running Caliptra FMC ...
2,915,828 UART:
2,915,882 UART: [state] CFI Enabled
2,925,992 UART: [fht] FMC Alias Private Key: 7
3,044,392 UART: [art] Extend RT PCRs Done
3,044,820 UART: [art] Lock RT PCRs Done
3,046,080 UART: [art] Populate DV Done
3,054,209 UART: [fht] FMC Alias Private Key: 7
3,055,329 UART: [art] Derive CDI
3,055,609 UART: [art] Store in slot 0x4
3,141,376 UART: [art] Derive Key Pair
3,141,736 UART: [art] Store priv key in slot 0x5
3,154,940 UART: [art] Derive Key Pair - Done
3,169,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,973 UART: [art] PUB.X = 3743F6A979D9B6185ED722AEEDF4CE32C4E88B4E47DA94FB4CE30850F80EA78F845AF17867C2987EFDC9898EA6371E6C
3,192,751 UART: [art] PUB.Y = 5FD399B5C84BEA9A909AD0536D0BE0905208E0E7999B8A21A12B4A96120E5A566A741E906184C1244649A4E111808CF2
3,199,688 UART: [art] SIG.R = CDB7B2FF42ECA0693F243E822AA48AF39DC1407F8F8845C0AE6B90258E8BA6E4B25BC0C5B1738D4FADF1A0465FDE3F08
3,206,477 UART: [art] SIG.S = C9D0703C005A276D6592F0070D516FAE2129EFEEDE2398CE8E55386166DB0697807C3D73F1100DBEE2675A8266D4A563
3,230,627 UART: Caliptra RT
3,230,878 UART: [state] CFI Enabled
3,350,138 UART: [rt] RT listening for mailbox commands...
3,350,808 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,720 UART: [rt]cmd =0x44504543, len=20
3,401,930 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,384 ready_for_fw is high
1,059,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,710 >>> mbox cmd response: success
2,739,223 UART:
2,739,239 UART: Running Caliptra FMC ...
2,739,647 UART:
2,739,701 UART: [state] CFI Enabled
2,750,145 UART: [fht] FMC Alias Private Key: 7
2,869,297 UART: [art] Extend RT PCRs Done
2,869,725 UART: [art] Lock RT PCRs Done
2,871,405 UART: [art] Populate DV Done
2,879,726 UART: [fht] FMC Alias Private Key: 7
2,880,716 UART: [art] Derive CDI
2,880,996 UART: [art] Store in slot 0x4
2,966,807 UART: [art] Derive Key Pair
2,967,167 UART: [art] Store priv key in slot 0x5
2,980,201 UART: [art] Derive Key Pair - Done
2,994,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,018 UART: [art] PUB.X = E935CC13B19D852762557684283FD851CF68C3573B982825C692C68C1F9634A9DC71E279C3673EF4D85F00096CCD6C70
3,017,757 UART: [art] PUB.Y = FFA16740656F1188D0663DCBFFA3C8AC71CE129A2D1FFEFF6463F38383A19D456FE825E2C4421031569FF1F64F4FFAAD
3,024,723 UART: [art] SIG.R = 39291E644C3BB023E404566C03FD1927240E42DEF06D5DABD450EE3B575C1D2889687D81B257EC75FAFF37BDD2F7281A
3,031,492 UART: [art] SIG.S = BA8E46C4B7154767AA9A1EC3709B30B30976C6A2EB4B456247083AB979AC8C8BDFFB6BB352C2908833C6832B1118540C
3,055,493 UART: Caliptra RT
3,055,744 UART: [state] CFI Enabled
3,175,271 UART: [rt] RT listening for mailbox commands...
3,175,941 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,779 UART: [rt]cmd =0x44504543, len=20
3,226,699 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,822 UART: [state] WD Timer not started. Device not locked for debugging
88,153 UART: [kat] SHA2-256
891,703 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,807 UART: [kat] ++
895,959 UART: [kat] sha1
900,291 UART: [kat] SHA2-256
902,231 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,164 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,627 UART: [cold-reset] ++
1,169,983 UART: [fht] FHT @ 0x50003400
1,172,753 UART: [idev] ++
1,172,921 UART: [idev] CDI.KEYID = 6
1,173,282 UART: [idev] SUBJECT.KEYID = 7
1,173,707 UART: [idev] UDS.KEYID = 0
1,174,053 ready_for_fw is high
1,174,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,484 UART: [idev] Erasing UDS.KEYID = 0
1,198,648 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,543 UART: [ldev] ++
1,208,711 UART: [ldev] CDI.KEYID = 6
1,209,075 UART: [ldev] SUBJECT.KEYID = 5
1,209,502 UART: [ldev] AUTHORITY.KEYID = 7
1,209,965 UART: [ldev] FE.KEYID = 1
1,215,359 UART: [ldev] Erasing FE.KEYID = 1
1,241,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,755 UART: [ldev] --
1,281,202 UART: [fwproc] Wait for Commands...
1,281,883 UART: [fwproc] Recv command 0x46574c44
1,282,616 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,606 >>> mbox cmd response: success
2,826,860 UART: [afmc] ++
2,827,028 UART: [afmc] CDI.KEYID = 6
2,827,391 UART: [afmc] SUBJECT.KEYID = 7
2,827,817 UART: [afmc] AUTHORITY.KEYID = 5
2,863,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,469 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,928 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,809 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,510 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,363 UART: [afmc] --
2,907,332 UART: [cold-reset] --
2,908,304 UART: [state] Locking Datavault
2,909,301 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,905 UART: [state] Locking ICCM
2,910,451 UART: [exit] Launching FMC @ 0x40000130
2,915,781 UART:
2,915,797 UART: Running Caliptra FMC ...
2,916,205 UART:
2,916,348 UART: [state] CFI Enabled
2,926,966 UART: [fht] FMC Alias Private Key: 7
3,046,270 UART: [art] Extend RT PCRs Done
3,046,698 UART: [art] Lock RT PCRs Done
3,048,116 UART: [art] Populate DV Done
3,056,299 UART: [fht] FMC Alias Private Key: 7
3,057,275 UART: [art] Derive CDI
3,057,555 UART: [art] Store in slot 0x4
3,143,294 UART: [art] Derive Key Pair
3,143,654 UART: [art] Store priv key in slot 0x5
3,156,928 UART: [art] Derive Key Pair - Done
3,171,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,876 UART: [art] PUB.X = 3F585863D4B95625E8B6FB322CDFD6F4F30D83D8E345EB53CE2C7E282C40EDDFB3D56627454E50929E1EE7DC299217D1
3,194,653 UART: [art] PUB.Y = B088AC1550C5F18CCE245C440F31FDAB7616CC88448E50125DB9B787FDFF6B2AFFD33710F2B700AAB13C01691D29C7F3
3,201,589 UART: [art] SIG.R = A4A43802470F51F4E372CE7DFC04C10960AB7CD1DDA23057DE6FCD883DA616FFE4394C69255F4FF733D8C2ADEA6BD6FE
3,208,369 UART: [art] SIG.S = 7B31F37B2BBAA0D5D8868F4E1C897460F5970C7BAE07100854A14D1B3AD7989B2DE5C5F456F015A5653FB42515420D77
3,232,215 UART: Caliptra RT
3,232,558 UART: [state] CFI Enabled
3,352,105 UART: [rt] RT listening for mailbox commands...
3,352,775 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,749 UART: [rt]cmd =0x44504543, len=20
3,403,793 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,591 ready_for_fw is high
1,059,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,341 >>> mbox cmd response: success
2,740,930 UART:
2,740,946 UART: Running Caliptra FMC ...
2,741,354 UART:
2,741,497 UART: [state] CFI Enabled
2,751,761 UART: [fht] FMC Alias Private Key: 7
2,871,047 UART: [art] Extend RT PCRs Done
2,871,475 UART: [art] Lock RT PCRs Done
2,872,935 UART: [art] Populate DV Done
2,881,442 UART: [fht] FMC Alias Private Key: 7
2,882,514 UART: [art] Derive CDI
2,882,794 UART: [art] Store in slot 0x4
2,968,419 UART: [art] Derive Key Pair
2,968,779 UART: [art] Store priv key in slot 0x5
2,981,895 UART: [art] Derive Key Pair - Done
2,996,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,947 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,712 UART: [art] PUB.X = B2902A96F06CC7573E4F15E3585B588FB50EDA1EDD607C2074C6FFA2C7679D6EAEC13EAF7EB82C60FBD397953FD1521F
3,019,497 UART: [art] PUB.Y = 432918D373BEC924640E8FFED169CE8A75271C316158CEA3B64BC1169965C0E9DBA5DDC8BC9A4A213361585CAC9D7E27
3,026,454 UART: [art] SIG.R = 65374D5C88B515AD15D745E57D2121BBCF49B9779066557FC0811A95655787E8A3076CABCE66545E654B358E5A9F3904
3,033,212 UART: [art] SIG.S = B2F1545B62F0C2FF4B3E0AE212FA825E0EE2E22C5F16596419708EEFBE73A96FD17BFC2E7715AB37ACC7A39985543553
3,056,678 UART: Caliptra RT
3,057,021 UART: [state] CFI Enabled
3,177,038 UART: [rt] RT listening for mailbox commands...
3,177,708 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,512 UART: [rt]cmd =0x44504543, len=20
3,228,832 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,350 UART: [kat] SHA2-256
893,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,125 UART: [kat] ++
897,277 UART: [kat] sha1
901,473 UART: [kat] SHA2-256
903,413 UART: [kat] SHA2-384
906,178 UART: [kat] SHA2-512-ACC
908,079 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,172,009 UART: [cold-reset] ++
1,172,589 UART: [fht] FHT @ 0x50003400
1,175,240 UART: [idev] ++
1,175,408 UART: [idev] CDI.KEYID = 6
1,175,768 UART: [idev] SUBJECT.KEYID = 7
1,176,192 UART: [idev] UDS.KEYID = 0
1,176,537 ready_for_fw is high
1,176,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,428 UART: [idev] Erasing UDS.KEYID = 0
1,202,095 UART: [idev] Sha1 KeyId Algorithm
1,210,601 UART: [idev] --
1,211,845 UART: [ldev] ++
1,212,013 UART: [ldev] CDI.KEYID = 6
1,212,376 UART: [ldev] SUBJECT.KEYID = 5
1,212,802 UART: [ldev] AUTHORITY.KEYID = 7
1,213,265 UART: [ldev] FE.KEYID = 1
1,218,351 UART: [ldev] Erasing FE.KEYID = 1
1,244,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,423 UART: [ldev] --
1,283,910 UART: [fwproc] Wait for Commands...
1,284,526 UART: [fwproc] Recv command 0x46574c44
1,285,254 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,638 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,899 >>> mbox cmd response: success
2,828,953 UART: [afmc] ++
2,829,121 UART: [afmc] CDI.KEYID = 6
2,829,483 UART: [afmc] SUBJECT.KEYID = 7
2,829,908 UART: [afmc] AUTHORITY.KEYID = 5
2,865,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,074 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,822 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,414 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,115 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,077 UART: [afmc] --
2,909,105 UART: [cold-reset] --
2,910,087 UART: [state] Locking Datavault
2,911,464 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,068 UART: [state] Locking ICCM
2,912,610 UART: [exit] Launching FMC @ 0x40000130
2,917,940 UART:
2,917,956 UART: Running Caliptra FMC ...
2,918,364 UART:
2,918,418 UART: [state] CFI Enabled
2,928,526 UART: [fht] FMC Alias Private Key: 7
3,047,076 UART: [art] Extend RT PCRs Done
3,047,504 UART: [art] Lock RT PCRs Done
3,048,990 UART: [art] Populate DV Done
3,057,147 UART: [fht] FMC Alias Private Key: 7
3,058,255 UART: [art] Derive CDI
3,058,535 UART: [art] Store in slot 0x4
3,144,324 UART: [art] Derive Key Pair
3,144,684 UART: [art] Store priv key in slot 0x5
3,157,828 UART: [art] Derive Key Pair - Done
3,172,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,411 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,176 UART: [art] PUB.X = D6E222BAA7A7AA9DEA76210B0AF4EC6F71B7BBE9F2736524C8CDFEDB791AB19F734C8B94269C3E6859C26D74D120C801
3,195,955 UART: [art] PUB.Y = 4E9F4C98632E8B21BB2E8EA1EB53465B3610DC315D664904266D88D0F5DC8C0AD9DA9315ADCCA4D803113332072C727C
3,202,899 UART: [art] SIG.R = 775510162EC511D2538351228C22740563D40D9C349F3DD24F8EB50CA5A6EB75AE436002B45D12904BE2932C135AB6DA
3,209,653 UART: [art] SIG.S = 1715E8CB204FE6D5D31219B0751606251D1BDBF3959F84CB4A33649231E0C4005EF6B1DC5E10702FFD86E766FF91EBEE
3,233,638 UART: Caliptra RT
3,233,889 UART: [state] CFI Enabled
3,354,237 UART: [rt] RT listening for mailbox commands...
3,354,907 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,071 UART: [rt]cmd =0x44504543, len=20
3,406,259 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,901 ready_for_fw is high
1,060,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,584 >>> mbox cmd response: success
2,740,739 UART:
2,740,755 UART: Running Caliptra FMC ...
2,741,163 UART:
2,741,217 UART: [state] CFI Enabled
2,751,891 UART: [fht] FMC Alias Private Key: 7
2,871,451 UART: [art] Extend RT PCRs Done
2,871,879 UART: [art] Lock RT PCRs Done
2,873,307 UART: [art] Populate DV Done
2,881,758 UART: [fht] FMC Alias Private Key: 7
2,882,746 UART: [art] Derive CDI
2,883,026 UART: [art] Store in slot 0x4
2,968,839 UART: [art] Derive Key Pair
2,969,199 UART: [art] Store priv key in slot 0x5
2,982,733 UART: [art] Derive Key Pair - Done
2,997,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,113 UART: [art] PUB.X = 9CF4F9B903CF24DDEE0FD7351C334AB2D2176D0222C21FFF5C214C11D7226E566029EDBD6BD5AD2FCFC17A340EEB9687
3,020,891 UART: [art] PUB.Y = 2C06ABF3E8D818907E608DDA1359BC9C7B7253DC0F9A9D8EB80099A48E3087A4D10033DA0000E20C896C3F4998BE6EF2
3,027,752 UART: [art] SIG.R = A573733BE6D37F95830E5B85C3346AED03E022F6F2BF1788DE0FF8BC2921AA5B849C43D19CCC18BDBB4C053565548C6D
3,034,522 UART: [art] SIG.S = 6156A408562C66D102B3F46797D473A33502554E21AA8442421F73746FFA0E011B5A35309772D5741ACAC221A74CCCA4
3,058,263 UART: Caliptra RT
3,058,514 UART: [state] CFI Enabled
3,177,809 UART: [rt] RT listening for mailbox commands...
3,178,479 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,101 UART: [rt]cmd =0x44504543, len=20
3,228,881 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
918,017 UART: [kat] HMAC-384Kdf
922,655 UART: [kat] LMS
1,170,983 UART: [kat] --
1,171,812 UART: [cold-reset] ++
1,172,182 UART: [fht] FHT @ 0x50003400
1,175,035 UART: [idev] ++
1,175,203 UART: [idev] CDI.KEYID = 6
1,175,563 UART: [idev] SUBJECT.KEYID = 7
1,175,987 UART: [idev] UDS.KEYID = 0
1,176,332 ready_for_fw is high
1,176,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,037 UART: [idev] Erasing UDS.KEYID = 0
1,201,392 UART: [idev] Sha1 KeyId Algorithm
1,209,874 UART: [idev] --
1,210,954 UART: [ldev] ++
1,211,122 UART: [ldev] CDI.KEYID = 6
1,211,485 UART: [ldev] SUBJECT.KEYID = 5
1,211,911 UART: [ldev] AUTHORITY.KEYID = 7
1,212,374 UART: [ldev] FE.KEYID = 1
1,217,836 UART: [ldev] Erasing FE.KEYID = 1
1,245,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,230 UART: [ldev] --
1,284,589 UART: [fwproc] Wait for Commands...
1,285,219 UART: [fwproc] Recv command 0x46574c44
1,285,947 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,713 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,236 >>> mbox cmd response: success
2,830,368 UART: [afmc] ++
2,830,536 UART: [afmc] CDI.KEYID = 6
2,830,898 UART: [afmc] SUBJECT.KEYID = 7
2,831,323 UART: [afmc] AUTHORITY.KEYID = 5
2,867,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,716 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,599 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,300 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,198 UART: [afmc] --
2,911,198 UART: [cold-reset] --
2,912,196 UART: [state] Locking Datavault
2,913,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,171 UART: [state] Locking ICCM
2,914,673 UART: [exit] Launching FMC @ 0x40000130
2,920,003 UART:
2,920,019 UART: Running Caliptra FMC ...
2,920,427 UART:
2,920,570 UART: [state] CFI Enabled
2,931,238 UART: [fht] FMC Alias Private Key: 7
3,049,532 UART: [art] Extend RT PCRs Done
3,049,960 UART: [art] Lock RT PCRs Done
3,051,298 UART: [art] Populate DV Done
3,059,571 UART: [fht] FMC Alias Private Key: 7
3,060,631 UART: [art] Derive CDI
3,060,911 UART: [art] Store in slot 0x4
3,146,674 UART: [art] Derive Key Pair
3,147,034 UART: [art] Store priv key in slot 0x5
3,160,332 UART: [art] Derive Key Pair - Done
3,175,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,241 UART: [art] PUB.X = F46207533B69EC8FF9659E70DC8A94F58B093BE5B6D413DC25A5A8F0AFD62D019BA9FC0BA4F0D11C6CBB91FFDB7C2BE5
3,198,025 UART: [art] PUB.Y = CE60316CBC3768CD6DB834E090ACA50EC1C02642451C4E50831994C733F140D0CC69C740CDE4A780C11019E1F23F056B
3,204,973 UART: [art] SIG.R = 95EFC8DC5CE9092FB0EC14A922847E658BE28AA886BE60F7D6EEC1EF93C08F11BE72488B363704ED74600E2CEA104634
3,211,746 UART: [art] SIG.S = 0EAE535FE818234F25EE837E62BF02C54BB0D89205DA46400CA9D040DBADEB1EA6A391639B4F3E94C5614F6DFA92E694
3,235,642 UART: Caliptra RT
3,235,985 UART: [state] CFI Enabled
3,356,322 UART: [rt] RT listening for mailbox commands...
3,356,992 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,964 UART: [rt]cmd =0x44504543, len=20
3,407,622 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 ready_for_fw is high
1,061,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,135 >>> mbox cmd response: success
2,742,880 UART:
2,742,896 UART: Running Caliptra FMC ...
2,743,304 UART:
2,743,447 UART: [state] CFI Enabled
2,754,191 UART: [fht] FMC Alias Private Key: 7
2,873,239 UART: [art] Extend RT PCRs Done
2,873,667 UART: [art] Lock RT PCRs Done
2,875,025 UART: [art] Populate DV Done
2,883,434 UART: [fht] FMC Alias Private Key: 7
2,884,438 UART: [art] Derive CDI
2,884,718 UART: [art] Store in slot 0x4
2,970,401 UART: [art] Derive Key Pair
2,970,761 UART: [art] Store priv key in slot 0x5
2,984,159 UART: [art] Derive Key Pair - Done
2,998,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,165 UART: [art] PUB.X = CFE92095D640D5596D13F45D2549B9AB5BDDEC7F4312DFA005A284B1139ECA31E6433ACD4E230599E82311DB0A454EFE
3,021,938 UART: [art] PUB.Y = 8E96D63CD4B3455BDD6BBF4306989F8519D4AED5FC2C445AA0AD302D00E01E534422B4C4C96A4627E08CB7423A1B31DD
3,028,875 UART: [art] SIG.R = F4EA86024F703040873A676720E11CD501C324360D33D901F620348782EE6676D615F5DA7C6D1F7AFE8F81CF8D53DCDF
3,035,635 UART: [art] SIG.S = 16D11C7FEA104510746CDA226AC6483E6BEF8BD2EFCA7BA7101B34287EB11486C57B7E51C9FE67BEF2319698D5B5FBFC
3,058,829 UART: Caliptra RT
3,059,172 UART: [state] CFI Enabled
3,179,169 UART: [rt] RT listening for mailbox commands...
3,179,839 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,773 UART: [rt]cmd =0x44504543, len=20
3,230,883 >>> mbox cmd response data (44 bytes)
test test_invoke_dpe::test_invoke_dpe_get_profile_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,121 UART:
192,477 UART: Running Caliptra ROM ...
193,664 UART:
193,840 UART: [state] CFI Enabled
266,643 UART: [state] LifecycleState = Unprovisioned
268,631 UART: [state] DebugLocked = No
270,166 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,957 UART: [kat] SHA2-256
445,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,166 UART: [kat] ++
456,655 UART: [kat] sha1
467,848 UART: [kat] SHA2-256
470,549 UART: [kat] SHA2-384
477,685 UART: [kat] SHA2-512-ACC
480,067 UART: [kat] ECC-384
2,768,469 UART: [kat] HMAC-384Kdf
2,799,651 UART: [kat] LMS
3,989,942 UART: [kat] --
3,994,606 UART: [cold-reset] ++
3,995,635 UART: [fht] Storing FHT @ 0x50003400
4,007,422 UART: [idev] ++
4,007,989 UART: [idev] CDI.KEYID = 6
4,008,877 UART: [idev] SUBJECT.KEYID = 7
4,010,127 UART: [idev] UDS.KEYID = 0
4,011,099 ready_for_fw is high
4,011,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,367 UART: [idev] Erasing UDS.KEYID = 0
7,345,404 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,010 UART: [idev] --
7,371,062 UART: [ldev] ++
7,371,641 UART: [ldev] CDI.KEYID = 6
7,372,623 UART: [ldev] SUBJECT.KEYID = 5
7,373,848 UART: [ldev] AUTHORITY.KEYID = 7
7,375,087 UART: [ldev] FE.KEYID = 1
7,421,658 UART: [ldev] Erasing FE.KEYID = 1
10,755,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,323 UART: [ldev] --
13,133,720 UART: [fwproc] Waiting for Commands...
13,136,513 UART: [fwproc] Received command 0x46574c44
13,138,695 UART: [fwproc] Received Image of size 118548 bytes
17,250,822 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,671 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,727,869 >>> mbox cmd response: success
17,732,710 UART: [afmc] ++
17,733,302 UART: [afmc] CDI.KEYID = 6
17,734,247 UART: [afmc] SUBJECT.KEYID = 7
17,735,538 UART: [afmc] AUTHORITY.KEYID = 5
21,090,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,136 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,809 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,575 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,988 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,710 UART: [afmc] --
23,464,038 UART: [cold-reset] --
23,468,010 UART: [state] Locking Datavault
23,473,691 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,441 UART: [state] Locking ICCM
23,478,239 UART: [exit] Launching FMC @ 0x40000130
23,486,637 UART:
23,486,875 UART: Running Caliptra FMC ...
23,487,974 UART:
23,488,151 UART: [state] CFI Enabled
23,553,929 UART: [fht] FMC Alias Private Key: 7
25,894,322 UART: [art] Extend RT PCRs Done
25,895,550 UART: [art] Lock RT PCRs Done
25,897,200 UART: [art] Populate DV Done
25,902,500 UART: [fht] FMC Alias Private Key: 7
25,904,180 UART: [art] Derive CDI
25,904,919 UART: [art] Store in slot 0x4
25,962,550 UART: [art] Derive Key Pair
25,963,549 UART: [art] Store priv key in slot 0x5
29,256,161 UART: [art] Derive Key Pair - Done
29,269,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,065 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,578 UART: [art] PUB.X = 035B20A7F37655C9078767AEF520E6D6163B82DCA04870002C37D43AF7BF3A254918DE42E8238CACA210B84AF9950971
31,567,822 UART: [art] PUB.Y = DB7391A870EDBBEE18CD5D12D23294FF8ABB663C97627925265113E0CA0C44E0E3FA30935FC788402AB3A3616F14767A
31,575,058 UART: [art] SIG.R = 720FF544165F340D5C4AFDAB731E8C82AA561E60649CDE15A3869DC4A747CA4D7EF3D243314108399817E44CA5B4E995
31,582,507 UART: [art] SIG.S = 26C47497AE2FD61EB960F6A9378D72E352E9BBD7B3D0936BD1C99E32C8B8AF42C01658BEC03C02DFA01B00EF9CE332FC
32,887,976 UART: Caliptra RT
32,888,691 UART: [state] CFI Enabled
33,065,793 UART: [rt] RT listening for mailbox commands...
33,067,718 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,097,863 UART: [rt]cmd =0x44504543, len=40
33,146,184 >>> mbox cmd response data (40 bytes)
33,147,541 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,177,800 UART: [rt]cmd =0x44504543, len=40
33,200,212 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,803,598 ready_for_fw is high
3,804,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,396 >>> mbox cmd response: success
23,643,999 UART:
23,644,400 UART: Running Caliptra FMC ...
23,645,608 UART:
23,645,775 UART: [state] CFI Enabled
23,716,023 UART: [fht] FMC Alias Private Key: 7
26,077,384 UART: [art] Extend RT PCRs Done
26,078,612 UART: [art] Lock RT PCRs Done
26,080,247 UART: [art] Populate DV Done
26,085,725 UART: [fht] FMC Alias Private Key: 7
26,087,377 UART: [art] Derive CDI
26,088,195 UART: [art] Store in slot 0x4
26,145,010 UART: [art] Derive Key Pair
26,146,063 UART: [art] Store priv key in slot 0x5
29,438,852 UART: [art] Derive Key Pair - Done
29,451,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,187 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,706 UART: [art] PUB.X = EBE2ECB13C60F8C10D20142149AFE02DCE2C8E00AE306A337B9C0C5C55F8C0B14CE4E9805774439A326C08FBF35502AE
31,748,857 UART: [art] PUB.Y = 8C6BABBAC79A7B648777E3997D573BD412A96AE6CBDA9821D53DE1CD2334B04CE17ADC64A37964739627D32D0CC0EFCE
31,756,101 UART: [art] SIG.R = 2D6E245E23C79C6E60FC9CB996DFEC4380DC2E656DBD98961135CE6760B7C55394CF3E0D696A51B43A83A7AB4C5A277A
31,763,492 UART: [art] SIG.S = 2B6045E6E2ED1BF1FA1F7BBFD8B20CDFB615F3C8A4AD7EFE6DE3A821F40E2436B25B9AC3345CA9884F4FEC44BE7FAE20
33,068,802 UART: Caliptra RT
33,069,520 UART: [state] CFI Enabled
33,265,627 UART: [rt] RT listening for mailbox commands...
33,267,549 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,297,854 UART: [rt]cmd =0x44504543, len=40
33,346,548 >>> mbox cmd response data (40 bytes)
33,347,822 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,378,017 UART: [rt]cmd =0x44504543, len=40
33,401,147 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
192,368 UART:
192,750 UART: Running Caliptra ROM ...
193,935 UART:
603,669 UART: [state] CFI Enabled
616,492 UART: [state] LifecycleState = Unprovisioned
618,424 UART: [state] DebugLocked = No
620,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,883 UART: [kat] SHA2-256
794,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,160 UART: [kat] ++
805,611 UART: [kat] sha1
815,556 UART: [kat] SHA2-256
818,272 UART: [kat] SHA2-384
823,771 UART: [kat] SHA2-512-ACC
826,134 UART: [kat] ECC-384
3,109,941 UART: [kat] HMAC-384Kdf
3,120,927 UART: [kat] LMS
4,311,036 UART: [kat] --
4,315,104 UART: [cold-reset] ++
4,316,372 UART: [fht] Storing FHT @ 0x50003400
4,326,869 UART: [idev] ++
4,327,455 UART: [idev] CDI.KEYID = 6
4,328,367 UART: [idev] SUBJECT.KEYID = 7
4,329,614 UART: [idev] UDS.KEYID = 0
4,330,612 ready_for_fw is high
4,330,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,670 UART: [idev] Erasing UDS.KEYID = 0
7,612,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,633,886 UART: [idev] --
7,638,249 UART: [ldev] ++
7,638,810 UART: [ldev] CDI.KEYID = 6
7,639,771 UART: [ldev] SUBJECT.KEYID = 5
7,640,975 UART: [ldev] AUTHORITY.KEYID = 7
7,642,270 UART: [ldev] FE.KEYID = 1
7,651,451 UART: [ldev] Erasing FE.KEYID = 1
10,939,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,233,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,247,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,262,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,277,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,294,665 UART: [ldev] --
13,298,695 UART: [fwproc] Waiting for Commands...
13,300,790 UART: [fwproc] Received command 0x46574c44
13,302,967 UART: [fwproc] Received Image of size 118548 bytes
17,411,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,685 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,849 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,608 >>> mbox cmd response: success
17,896,394 UART: [afmc] ++
17,897,004 UART: [afmc] CDI.KEYID = 6
17,897,921 UART: [afmc] SUBJECT.KEYID = 7
17,899,132 UART: [afmc] AUTHORITY.KEYID = 5
21,212,836 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,509,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,511,397 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,525,817 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,540,561 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,554,957 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,576,181 UART: [afmc] --
23,580,258 UART: [cold-reset] --
23,584,651 UART: [state] Locking Datavault
23,590,102 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,793 UART: [state] Locking ICCM
23,594,639 UART: [exit] Launching FMC @ 0x40000130
23,603,047 UART:
23,603,345 UART: Running Caliptra FMC ...
23,604,452 UART:
23,604,612 UART: [state] CFI Enabled
23,612,652 UART: [fht] FMC Alias Private Key: 7
25,952,227 UART: [art] Extend RT PCRs Done
25,953,450 UART: [art] Lock RT PCRs Done
25,954,961 UART: [art] Populate DV Done
25,960,527 UART: [fht] FMC Alias Private Key: 7
25,962,220 UART: [art] Derive CDI
25,963,026 UART: [art] Store in slot 0x4
26,005,342 UART: [art] Derive Key Pair
26,006,396 UART: [art] Store priv key in slot 0x5
29,248,513 UART: [art] Derive Key Pair - Done
29,261,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,541,905 UART: [art] Erasing AUTHORITY.KEYID = 7
31,543,408 UART: [art] PUB.X = 9BA0A71C84210CFAE8B9C622652629C572BE0853DC99FDCB632CE4B5D2DCD66F593A624583EB7895CAD91010559F73B7
31,550,663 UART: [art] PUB.Y = A32A29833A209D314D5790BDFF39E32C8643A9660F473BC7C178B9C203E3EA238B5619C14718F6D0F5CBC31908EFBEEC
31,557,887 UART: [art] SIG.R = DE6F5FD9DB8A9E13CDC55E07C287B280C2D434EF79892CA6930D421457995674AF41819D2ED3AA5AC44762F94AE2916D
31,565,331 UART: [art] SIG.S = 50F205A5D4BF6359541906DEFA61B724036D42A6AE179A45DE0F9D67A7A9E75B916D81917F1630652D902408FDD4DE84
32,870,527 UART: Caliptra RT
32,871,215 UART: [state] CFI Enabled
33,004,867 UART: [rt] RT listening for mailbox commands...
33,006,793 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,036,880 UART: [rt]cmd =0x44504543, len=40
33,064,451 >>> mbox cmd response data (40 bytes)
33,065,747 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,096,060 UART: [rt]cmd =0x44504543, len=40
33,118,888 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
4,127,580 ready_for_fw is high
4,128,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,083 >>> mbox cmd response: success
23,789,061 UART:
23,789,494 UART: Running Caliptra FMC ...
23,790,607 UART:
23,790,763 UART: [state] CFI Enabled
23,798,760 UART: [fht] FMC Alias Private Key: 7
26,139,416 UART: [art] Extend RT PCRs Done
26,140,647 UART: [art] Lock RT PCRs Done
26,141,867 UART: [art] Populate DV Done
26,147,346 UART: [fht] FMC Alias Private Key: 7
26,148,882 UART: [art] Derive CDI
26,149,616 UART: [art] Store in slot 0x4
26,192,145 UART: [art] Derive Key Pair
26,193,138 UART: [art] Store priv key in slot 0x5
29,434,979 UART: [art] Derive Key Pair - Done
29,447,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,311 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,811 UART: [art] PUB.X = B381D970406830835F85B367112757EA033112FCAB171DA09A3F5987C6B067539864E5626E5178921A101EEFADF482FA
31,737,060 UART: [art] PUB.Y = FB226E5900D38E1FFBEC6E47CEF13BDCCB7524FD5933F920BF6D9C4781259065FEE787B745A164F531F1422DC966FF19
31,744,312 UART: [art] SIG.R = E760847CAA75F32D0DB88A529B268A59E00BE8EDCF466239EA75573AED0E4A64AA106D3B9BD0BCB14F46E05D672A75A1
31,751,761 UART: [art] SIG.S = DE5E6583BF7C246FFD526B568C2B44F9D93F85D17633EDF7FACF8E18AED32EEC6C453B38D23B6578C47FB6590F2B8874
33,057,093 UART: Caliptra RT
33,057,792 UART: [state] CFI Enabled
33,191,940 UART: [rt] RT listening for mailbox commands...
33,193,873 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,224,073 UART: [rt]cmd =0x44504543, len=40
33,251,455 >>> mbox cmd response data (40 bytes)
33,252,697 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,283,060 UART: [rt]cmd =0x44504543, len=40
33,305,788 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
191,946 UART:
192,301 UART: Running Caliptra ROM ...
193,474 UART:
193,624 UART: [state] CFI Enabled
263,138 UART: [state] LifecycleState = Unprovisioned
265,114 UART: [state] DebugLocked = No
267,924 UART: [state] WD Timer not started. Device not locked for debugging
272,309 UART: [kat] SHA2-256
451,983 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,728 UART: [kat] ++
463,213 UART: [kat] sha1
474,935 UART: [kat] SHA2-256
477,587 UART: [kat] SHA2-384
483,423 UART: [kat] SHA2-512-ACC
485,800 UART: [kat] ECC-384
2,948,165 UART: [kat] HMAC-384Kdf
2,973,267 UART: [kat] LMS
3,449,786 UART: [kat] --
3,453,026 UART: [cold-reset] ++
3,455,607 UART: [fht] FHT @ 0x50003400
3,466,723 UART: [idev] ++
3,467,281 UART: [idev] CDI.KEYID = 6
3,468,257 UART: [idev] SUBJECT.KEYID = 7
3,469,506 UART: [idev] UDS.KEYID = 0
3,470,425 ready_for_fw is high
3,470,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,672 UART: [idev] Erasing UDS.KEYID = 0
5,987,643 UART: [idev] Sha1 KeyId Algorithm
6,011,752 UART: [idev] --
6,017,696 UART: [ldev] ++
6,018,345 UART: [ldev] CDI.KEYID = 6
6,019,258 UART: [ldev] SUBJECT.KEYID = 5
6,020,417 UART: [ldev] AUTHORITY.KEYID = 7
6,021,700 UART: [ldev] FE.KEYID = 1
6,059,552 UART: [ldev] Erasing FE.KEYID = 1
8,569,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,716 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,339 UART: [ldev] --
10,378,995 UART: [fwproc] Wait for Commands...
10,381,464 UART: [fwproc] Recv command 0x46574c44
10,383,442 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,511 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,817 >>> mbox cmd response: success
14,344,935 UART: [afmc] ++
14,345,552 UART: [afmc] CDI.KEYID = 6
14,346,462 UART: [afmc] SUBJECT.KEYID = 7
14,347,672 UART: [afmc] AUTHORITY.KEYID = 5
16,879,201 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,935 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,355 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,220 UART: [afmc] --
18,698,121 UART: [cold-reset] --
18,701,811 UART: [state] Locking Datavault
18,705,433 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,197 UART: [state] Locking ICCM
18,709,431 UART: [exit] Launching FMC @ 0x40000130
18,717,819 UART:
18,718,055 UART: Running Caliptra FMC ...
18,719,083 UART:
18,719,234 UART: [state] CFI Enabled
18,776,568 UART: [fht] FMC Alias Private Key: 7
20,543,110 UART: [art] Extend RT PCRs Done
20,544,354 UART: [art] Lock RT PCRs Done
20,545,789 UART: [art] Populate DV Done
20,551,249 UART: [fht] FMC Alias Private Key: 7
20,552,999 UART: [art] Derive CDI
20,553,805 UART: [art] Store in slot 0x4
20,609,196 UART: [art] Derive Key Pair
20,610,231 UART: [art] Store priv key in slot 0x5
23,073,106 UART: [art] Derive Key Pair - Done
23,086,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,184 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,708 UART: [art] PUB.X = B61AA799A9E5AD3EBC18052C1B69637A3C11ECFE5FECF22B6C87B2AE8EE44C6544DB54B17F35C6BBF5FCFD9BCA1ABDE0
24,808,015 UART: [art] PUB.Y = 4E938BAE3788CC9760E76996C50BBC196B9248EABA61144C874589990410879CCCE7B0F0586E5CC403592F22AF91CB5E
24,815,252 UART: [art] SIG.R = 653877A240ADB2946A8C4495CB5DAD00366B17052AD956398B0B0E19FDE6AF90A570E0D7BB74ADFCA88F59E697676EDE
24,822,651 UART: [art] SIG.S = 5C7D99627CBC746A9B79CA8480E252456EC44E7D306196B27C8022C953AE85DEDA13A15983379630F0882E4DB1C52AFD
25,801,445 UART: Caliptra RT
25,802,170 UART: [state] CFI Enabled
25,983,194 UART: [rt] RT listening for mailbox commands...
25,985,092 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,015,186 UART: [rt]cmd =0x44504543, len=40
26,042,252 >>> mbox cmd response data (40 bytes)
26,043,561 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,073,443 UART: [rt]cmd =0x44504543, len=40
26,095,756 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,457,085 ready_for_fw is high
3,457,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,219,190 >>> mbox cmd response: success
18,511,358 UART:
18,511,750 UART: Running Caliptra FMC ...
18,512,851 UART:
18,513,000 UART: [state] CFI Enabled
18,579,379 UART: [fht] FMC Alias Private Key: 7
20,346,098 UART: [art] Extend RT PCRs Done
20,347,334 UART: [art] Lock RT PCRs Done
20,348,987 UART: [art] Populate DV Done
20,354,406 UART: [fht] FMC Alias Private Key: 7
20,355,890 UART: [art] Derive CDI
20,356,638 UART: [art] Store in slot 0x4
20,412,651 UART: [art] Derive Key Pair
20,413,688 UART: [art] Store priv key in slot 0x5
22,876,388 UART: [art] Derive Key Pair - Done
22,889,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,137 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,642 UART: [art] PUB.X = FFB193B1A428A5E8FA676C858A55757F06094B5D45CE514ADBB736BFEE47C823DDFACB28D1B9926E8D43FF11B5A32826
24,610,892 UART: [art] PUB.Y = 68A3F9E8C2EF5D4FCDDBED28F01CDC6FB6A5D46429A5BD61793674E1CF99222D681CF33B3D7CA22500102CFA4674EEE9
24,618,192 UART: [art] SIG.R = 497E6F1AD2A2454233B24D5873B51D4E91B58B13A09640B2BF20F8EF30C9C213136335E5D3414F400CFD28E46B1B0C38
24,625,592 UART: [art] SIG.S = 1F4D8679D4E6AF45D9B1160EE24AB667457EC1C45EA8C433F2A48202F49B3F91775A9405435582367B4797F549AD76E9
25,603,866 UART: Caliptra RT
25,604,562 UART: [state] CFI Enabled
25,785,338 UART: [rt] RT listening for mailbox commands...
25,787,233 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,817,541 UART: [rt]cmd =0x44504543, len=40
25,865,769 >>> mbox cmd response data (40 bytes)
25,866,896 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,896,776 UART: [rt]cmd =0x44504543, len=40
25,919,484 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,323 UART:
192,685 UART: Running Caliptra ROM ...
193,813 UART:
603,567 UART: [state] CFI Enabled
619,922 UART: [state] LifecycleState = Unprovisioned
621,902 UART: [state] DebugLocked = No
624,846 UART: [state] WD Timer not started. Device not locked for debugging
628,319 UART: [kat] SHA2-256
807,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,787 UART: [kat] ++
819,235 UART: [kat] sha1
830,607 UART: [kat] SHA2-256
833,268 UART: [kat] SHA2-384
840,251 UART: [kat] SHA2-512-ACC
842,620 UART: [kat] ECC-384
3,285,011 UART: [kat] HMAC-384Kdf
3,297,176 UART: [kat] LMS
3,773,681 UART: [kat] --
3,777,676 UART: [cold-reset] ++
3,778,897 UART: [fht] FHT @ 0x50003400
3,789,840 UART: [idev] ++
3,790,488 UART: [idev] CDI.KEYID = 6
3,791,373 UART: [idev] SUBJECT.KEYID = 7
3,792,619 UART: [idev] UDS.KEYID = 0
3,793,617 ready_for_fw is high
3,793,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,661 UART: [idev] Erasing UDS.KEYID = 0
6,267,294 UART: [idev] Sha1 KeyId Algorithm
6,290,573 UART: [idev] --
6,296,279 UART: [ldev] ++
6,296,879 UART: [ldev] CDI.KEYID = 6
6,297,768 UART: [ldev] SUBJECT.KEYID = 5
6,298,987 UART: [ldev] AUTHORITY.KEYID = 7
6,300,273 UART: [ldev] FE.KEYID = 1
6,311,033 UART: [ldev] Erasing FE.KEYID = 1
8,792,545 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,626 UART: [ldev] --
10,585,209 UART: [fwproc] Wait for Commands...
10,587,898 UART: [fwproc] Recv command 0x46574c44
10,589,887 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,782 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,382 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,804 >>> mbox cmd response: success
14,554,391 UART: [afmc] ++
14,555,006 UART: [afmc] CDI.KEYID = 6
14,555,903 UART: [afmc] SUBJECT.KEYID = 7
14,557,176 UART: [afmc] AUTHORITY.KEYID = 5
17,064,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,457 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,533 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,062 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,528 UART: [afmc] --
18,865,100 UART: [cold-reset] --
18,868,329 UART: [state] Locking Datavault
18,873,798 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,552 UART: [state] Locking ICCM
18,878,054 UART: [exit] Launching FMC @ 0x40000130
18,886,455 UART:
18,886,702 UART: Running Caliptra FMC ...
18,887,807 UART:
18,887,966 UART: [state] CFI Enabled
18,896,196 UART: [fht] FMC Alias Private Key: 7
20,662,370 UART: [art] Extend RT PCRs Done
20,663,580 UART: [art] Lock RT PCRs Done
20,665,072 UART: [art] Populate DV Done
20,670,325 UART: [fht] FMC Alias Private Key: 7
20,671,924 UART: [art] Derive CDI
20,672,664 UART: [art] Store in slot 0x4
20,715,646 UART: [art] Derive Key Pair
20,716,689 UART: [art] Store priv key in slot 0x5
23,143,290 UART: [art] Derive Key Pair - Done
23,156,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,590 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,088 UART: [art] PUB.X = 720451AFA8C77D9C206EED8309C6F12D5D18EFBF3711CF1C4AE30ED2F146817AA02D7CE43BBE76F93F9948450953F2B6
24,871,341 UART: [art] PUB.Y = DB18D2D464ABD7B4739A474EC9796F3A741634268E6BED0604044E6435BC49B2939759E12F714B4DB3107FBC80C633C8
24,878,626 UART: [art] SIG.R = 19AC4946D1C5436D5F245440BB3570F2E50AD4944B660E58E5DBD0FFE1C67D7E84DC96619BBA17955C27801DD6CEAD2D
24,886,025 UART: [art] SIG.S = DB2FF87AC17362C04693448BABFF367662B17FFD219DDD015A625A446A76F2531CD0A3B4704944D49FD5CC83CD217BF6
25,864,830 UART: Caliptra RT
25,865,531 UART: [state] CFI Enabled
25,998,803 UART: [rt] RT listening for mailbox commands...
26,000,704 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,030,857 UART: [rt]cmd =0x44504543, len=40
26,058,297 >>> mbox cmd response data (40 bytes)
26,059,528 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,089,797 UART: [rt]cmd =0x44504543, len=40
26,112,541 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,469 writing to cptra_bootfsm_go
3,782,974 ready_for_fw is high
3,783,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,341 >>> mbox cmd response: success
18,697,257 UART:
18,697,644 UART: Running Caliptra FMC ...
18,698,793 UART:
18,698,956 UART: [state] CFI Enabled
18,707,218 UART: [fht] FMC Alias Private Key: 7
20,472,488 UART: [art] Extend RT PCRs Done
20,473,716 UART: [art] Lock RT PCRs Done
20,475,122 UART: [art] Populate DV Done
20,480,551 UART: [fht] FMC Alias Private Key: 7
20,482,257 UART: [art] Derive CDI
20,482,998 UART: [art] Store in slot 0x4
20,525,930 UART: [art] Derive Key Pair
20,526,975 UART: [art] Store priv key in slot 0x5
22,953,407 UART: [art] Derive Key Pair - Done
22,966,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,644 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,158 UART: [art] PUB.X = BD48AEBA84213F557A6B85B792EDAC44FE1CDC9EA7DD7E9D4FE41917184FF8C21886A5B477D3545E8CD696A4722FE344
24,681,479 UART: [art] PUB.Y = 8FBF543AE85F7C213B983EA6BAF8045226ED958116DFED15346702B9C51B026AE10955096C4702D35AD1B5E610113642
24,688,695 UART: [art] SIG.R = 1868B9676211F613037573BDA7E2C451568586EE37820B850CC4E3D748F400344BF94BFEB44D8B5CC8569ED9B51CFB1F
24,696,047 UART: [art] SIG.S = B7FED8C89475E5421B119FA6887401307B8DE88E8378FDE5590A704FED5E8CFA483E3A4D91CFDB889705D052E36ED322
25,675,316 UART: Caliptra RT
25,676,024 UART: [state] CFI Enabled
25,809,467 UART: [rt] RT listening for mailbox commands...
25,811,397 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,841,601 UART: [rt]cmd =0x44504543, len=40
25,869,025 >>> mbox cmd response data (40 bytes)
25,870,244 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,900,399 UART: [rt]cmd =0x44504543, len=40
25,922,931 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,827 writing to cptra_bootfsm_go
191,875 UART:
192,674 UART: Running Caliptra ROM ...
193,818 UART:
193,971 UART: [state] CFI Enabled
264,471 UART: [state] LifecycleState = Unprovisioned
266,947 UART: [state] DebugLocked = No
268,361 UART: [state] WD Timer not started. Device not locked for debugging
272,994 UART: [kat] SHA2-256
462,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,614 UART: [kat] ++
474,093 UART: [kat] sha1
486,466 UART: [kat] SHA2-256
489,480 UART: [kat] SHA2-384
494,624 UART: [kat] SHA2-512-ACC
497,203 UART: [kat] ECC-384
2,952,385 UART: [kat] HMAC-384Kdf
2,974,334 UART: [kat] LMS
3,506,147 UART: [kat] --
3,512,750 UART: [cold-reset] ++
3,514,749 UART: [fht] FHT @ 0x50003400
3,525,296 UART: [idev] ++
3,526,000 UART: [idev] CDI.KEYID = 6
3,526,894 UART: [idev] SUBJECT.KEYID = 7
3,528,133 UART: [idev] UDS.KEYID = 0
3,529,075 ready_for_fw is high
3,529,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,416 UART: [idev] Erasing UDS.KEYID = 0
6,034,055 UART: [idev] Sha1 KeyId Algorithm
6,056,483 UART: [idev] --
6,061,611 UART: [ldev] ++
6,062,292 UART: [ldev] CDI.KEYID = 6
6,063,174 UART: [ldev] SUBJECT.KEYID = 5
6,064,382 UART: [ldev] AUTHORITY.KEYID = 7
6,065,631 UART: [ldev] FE.KEYID = 1
6,103,901 UART: [ldev] Erasing FE.KEYID = 1
8,612,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,343 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,182 UART: [ldev] --
10,419,657 UART: [fwproc] Wait for Commands...
10,421,205 UART: [fwproc] Recv command 0x46574c44
10,423,455 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,107 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,642 >>> mbox cmd response: success
14,682,534 UART: [afmc] ++
14,683,286 UART: [afmc] CDI.KEYID = 6
14,684,428 UART: [afmc] SUBJECT.KEYID = 7
14,685,863 UART: [afmc] AUTHORITY.KEYID = 5
17,213,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,767 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,811 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,011 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,885 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,266 UART: [afmc] --
19,014,515 UART: [cold-reset] --
19,019,622 UART: [state] Locking Datavault
19,023,419 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,577 UART: [state] Locking ICCM
19,027,571 UART: [exit] Launching FMC @ 0x40000130
19,036,196 UART:
19,036,449 UART: Running Caliptra FMC ...
19,037,552 UART:
19,037,715 UART: [state] CFI Enabled
19,094,453 UART: [fht] FMC Alias Private Key: 7
20,860,688 UART: [art] Extend RT PCRs Done
20,861,909 UART: [art] Lock RT PCRs Done
20,863,263 UART: [art] Populate DV Done
20,868,448 UART: [fht] FMC Alias Private Key: 7
20,870,150 UART: [art] Derive CDI
20,870,959 UART: [art] Store in slot 0x4
20,926,218 UART: [art] Derive Key Pair
20,927,250 UART: [art] Store priv key in slot 0x5
23,390,118 UART: [art] Derive Key Pair - Done
23,402,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,318 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,827 UART: [art] PUB.X = A9632CA46982241331B26EBF275DB618F4D6C3CFCD2FC3F9D11B7F30EE1285DDC318F56342D03F3611E3830CF272CE7A
25,125,097 UART: [art] PUB.Y = 7DE555E86F9BEB3E3AD009C6C02BBF2247F9C19C27E1CECB302E2D07E1F149397321C59A5F95DE56E6B93A8CEC31FFF6
25,132,346 UART: [art] SIG.R = 1BEA3B9F4454221D8768020F8A8FD3ADEBEA2A53C92D24BC43A65AF7ADE6E35852356D8FD5756AB17C6D2CC36F8C2F90
25,139,752 UART: [art] SIG.S = 7ED8ED5D848C42036C88823620B96B2DDD266EAD6592B5BD679B21E882977A006AF8ECC99957E2A99446471EA1F39771
26,118,960 UART: Caliptra RT
26,119,671 UART: [state] CFI Enabled
26,299,056 UART: [rt] RT listening for mailbox commands...
26,300,994 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,331,084 UART: [rt]cmd =0x44504543, len=40
26,358,841 >>> mbox cmd response data (40 bytes)
26,359,937 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,390,036 UART: [rt]cmd =0x44504543, len=40
26,412,780 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,438,805 ready_for_fw is high
3,439,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,850,274 >>> mbox cmd response: success
19,157,820 UART:
19,158,202 UART: Running Caliptra FMC ...
19,159,360 UART:
19,159,525 UART: [state] CFI Enabled
19,221,959 UART: [fht] FMC Alias Private Key: 7
20,989,065 UART: [art] Extend RT PCRs Done
20,990,306 UART: [art] Lock RT PCRs Done
20,991,908 UART: [art] Populate DV Done
20,997,169 UART: [fht] FMC Alias Private Key: 7
20,998,817 UART: [art] Derive CDI
20,999,629 UART: [art] Store in slot 0x4
21,055,006 UART: [art] Derive Key Pair
21,056,053 UART: [art] Store priv key in slot 0x5
23,518,855 UART: [art] Derive Key Pair - Done
23,531,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,298 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,817 UART: [art] PUB.X = 6BBA776FC744551DEAC2CA90E842D94E6059D52E9C5FC3F6DD28670261D0623CC59F5476443C2709677EE79519A58520
25,255,088 UART: [art] PUB.Y = 4DFA02B9AFA83382B08E7E3D4C22E77AED1D84806FA913EC930BB7A7FECC3552D400D8928A2B0E57C1765D628EE3B57D
25,262,301 UART: [art] SIG.R = EAA4C89FBE3F6EFC9EC563D20A37DD2AD030DF74C03230DE0A567A8172F2525CC7EF7946D9EB239EFCCA4ECBFD362BD5
25,269,748 UART: [art] SIG.S = DE7A20C153160709D55C342EAA0CEE28362D25098D15F574382D50F7B58FAA87707FF27B9F6247AB4832DC343BCFE06A
26,249,045 UART: Caliptra RT
26,249,756 UART: [state] CFI Enabled
26,429,232 UART: [rt] RT listening for mailbox commands...
26,431,170 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,461,279 UART: [rt]cmd =0x44504543, len=40
26,489,288 >>> mbox cmd response data (40 bytes)
26,490,465 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,520,722 UART: [rt]cmd =0x44504543, len=40
26,543,637 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,510 UART:
192,872 UART: Running Caliptra ROM ...
194,059 UART:
603,696 UART: [state] CFI Enabled
615,394 UART: [state] LifecycleState = Unprovisioned
617,774 UART: [state] DebugLocked = No
619,679 UART: [state] WD Timer not started. Device not locked for debugging
624,927 UART: [kat] SHA2-256
814,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,571 UART: [kat] ++
826,098 UART: [kat] sha1
836,839 UART: [kat] SHA2-256
839,850 UART: [kat] SHA2-384
845,074 UART: [kat] SHA2-512-ACC
847,598 UART: [kat] ECC-384
3,290,238 UART: [kat] HMAC-384Kdf
3,303,622 UART: [kat] LMS
3,835,481 UART: [kat] --
3,840,428 UART: [cold-reset] ++
3,842,011 UART: [fht] FHT @ 0x50003400
3,852,434 UART: [idev] ++
3,853,141 UART: [idev] CDI.KEYID = 6
3,854,071 UART: [idev] SUBJECT.KEYID = 7
3,855,252 UART: [idev] UDS.KEYID = 0
3,856,183 ready_for_fw is high
3,856,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,338 UART: [idev] Erasing UDS.KEYID = 0
6,332,234 UART: [idev] Sha1 KeyId Algorithm
6,355,796 UART: [idev] --
6,359,575 UART: [ldev] ++
6,360,253 UART: [ldev] CDI.KEYID = 6
6,361,135 UART: [ldev] SUBJECT.KEYID = 5
6,362,364 UART: [ldev] AUTHORITY.KEYID = 7
6,363,599 UART: [ldev] FE.KEYID = 1
6,373,519 UART: [ldev] Erasing FE.KEYID = 1
8,849,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,368 UART: [ldev] --
10,640,510 UART: [fwproc] Wait for Commands...
10,642,765 UART: [fwproc] Recv command 0x46574c44
10,645,016 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,218,656 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,342,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,207 >>> mbox cmd response: success
14,906,533 UART: [afmc] ++
14,907,266 UART: [afmc] CDI.KEYID = 6
14,908,466 UART: [afmc] SUBJECT.KEYID = 7
14,909,911 UART: [afmc] AUTHORITY.KEYID = 5
17,417,304 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,509 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,575 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,722 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,272 UART: [afmc] --
19,213,301 UART: [cold-reset] --
19,218,146 UART: [state] Locking Datavault
19,224,226 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,443 UART: [state] Locking ICCM
19,228,549 UART: [exit] Launching FMC @ 0x40000130
19,237,208 UART:
19,237,448 UART: Running Caliptra FMC ...
19,238,551 UART:
19,238,709 UART: [state] CFI Enabled
19,247,083 UART: [fht] FMC Alias Private Key: 7
21,014,028 UART: [art] Extend RT PCRs Done
21,015,267 UART: [art] Lock RT PCRs Done
21,016,896 UART: [art] Populate DV Done
21,022,208 UART: [fht] FMC Alias Private Key: 7
21,023,953 UART: [art] Derive CDI
21,024,783 UART: [art] Store in slot 0x4
21,066,956 UART: [art] Derive Key Pair
21,067,969 UART: [art] Store priv key in slot 0x5
23,494,698 UART: [art] Derive Key Pair - Done
23,507,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,119 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,647 UART: [art] PUB.X = F93F6A828F40F28493074830C071D835DC54CA7CDC9F99A6D50C05D1CDDBA34764D5C316B06B305947E03129CF6516D8
25,222,861 UART: [art] PUB.Y = EF11FEB2456B2F703A8E1A6BD99E97639DF4899508C3A8B3BE6B754C352B3FED99EDC121BD9FDDB282CFD63A15FA7A3A
25,230,129 UART: [art] SIG.R = D20311BCB4707CF94D36F44F9466630B71AB65FE6CF4C884C38E9F556008C7FA0D6F3DA6DEEED626F0C05B464BB3747F
25,237,554 UART: [art] SIG.S = 893A684ED3F8377CFFAE39C873A560257B183454B6B73EC20915BA711D312278420552304E80AFD3E650535B1D0120EE
26,216,426 UART: Caliptra RT
26,217,138 UART: [state] CFI Enabled
26,350,473 UART: [rt] RT listening for mailbox commands...
26,352,395 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,382,443 UART: [rt]cmd =0x44504543, len=40
26,409,637 >>> mbox cmd response data (40 bytes)
26,410,862 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,441,174 UART: [rt]cmd =0x44504543, len=40
26,463,773 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,752,323 ready_for_fw is high
3,752,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,623 >>> mbox cmd response: success
19,302,756 UART:
19,303,140 UART: Running Caliptra FMC ...
19,304,351 UART:
19,304,532 UART: [state] CFI Enabled
19,312,586 UART: [fht] FMC Alias Private Key: 7
21,078,843 UART: [art] Extend RT PCRs Done
21,080,069 UART: [art] Lock RT PCRs Done
21,081,619 UART: [art] Populate DV Done
21,087,211 UART: [fht] FMC Alias Private Key: 7
21,088,759 UART: [art] Derive CDI
21,089,530 UART: [art] Store in slot 0x4
21,132,396 UART: [art] Derive Key Pair
21,133,431 UART: [art] Store priv key in slot 0x5
23,560,805 UART: [art] Derive Key Pair - Done
23,573,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,582 UART: [art] PUB.X = 7B62440313EFF52C55BAE7A7652D837C50EB52A89A917E94052559769943CEFC64947EB16DBC342537E71E8DCEE2E397
25,288,798 UART: [art] PUB.Y = 4A301680BB7B17D2323315771874E054FF755094F3034649F2050B1DA7718C6844C246AC2D9F6B8762C428BFEECDCFEE
25,296,060 UART: [art] SIG.R = 64EEF1B5EC132E97959A3DD7D4957201EF0A6C5B7C355F6DFFDF2F427F42052FA128D780F8CDF03C7CAF08AC4F9927DD
25,303,485 UART: [art] SIG.S = 9237BEFEF36838649D746E40035208DFDC72AB48B5D00640DE1744737E02807C64BE3C692C27846D979BDDF133499368
26,281,890 UART: Caliptra RT
26,282,604 UART: [state] CFI Enabled
26,415,657 UART: [rt] RT listening for mailbox commands...
26,417,615 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,447,717 UART: [rt]cmd =0x44504543, len=40
26,475,322 >>> mbox cmd response data (40 bytes)
26,476,483 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,506,411 UART: [rt]cmd =0x44504543, len=40
26,529,148 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,219 UART: [kat] SHA2-256
882,150 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,265 UART: [kat] ++
886,417 UART: [kat] sha1
890,675 UART: [kat] SHA2-256
892,613 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,398 UART: [kat] HMAC-384Kdf
906,960 UART: [kat] LMS
1,475,156 UART: [kat] --
1,475,889 UART: [cold-reset] ++
1,476,435 UART: [fht] Storing FHT @ 0x50003400
1,479,330 UART: [idev] ++
1,479,498 UART: [idev] CDI.KEYID = 6
1,479,858 UART: [idev] SUBJECT.KEYID = 7
1,480,282 UART: [idev] UDS.KEYID = 0
1,480,627 ready_for_fw is high
1,480,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,066 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,802 UART: [idev] --
1,514,819 UART: [ldev] ++
1,514,987 UART: [ldev] CDI.KEYID = 6
1,515,350 UART: [ldev] SUBJECT.KEYID = 5
1,515,776 UART: [ldev] AUTHORITY.KEYID = 7
1,516,239 UART: [ldev] FE.KEYID = 1
1,521,051 UART: [ldev] Erasing FE.KEYID = 1
1,546,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,964 UART: [ldev] --
1,585,313 UART: [fwproc] Waiting for Commands...
1,585,952 UART: [fwproc] Received command 0x46574c44
1,586,743 UART: [fwproc] Received Image of size 118548 bytes
2,932,445 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,083 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,730 >>> mbox cmd response: success
3,132,830 UART: [afmc] ++
3,132,998 UART: [afmc] CDI.KEYID = 6
3,133,360 UART: [afmc] SUBJECT.KEYID = 7
3,133,785 UART: [afmc] AUTHORITY.KEYID = 5
3,168,926 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,808 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,400 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,083 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,929 UART: [afmc] --
3,212,029 UART: [cold-reset] --
3,212,915 UART: [state] Locking Datavault
3,214,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,654 UART: [state] Locking ICCM
3,215,256 UART: [exit] Launching FMC @ 0x40000130
3,220,586 UART:
3,220,602 UART: Running Caliptra FMC ...
3,221,010 UART:
3,221,064 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,536 UART: [art] Extend RT PCRs Done
3,350,964 UART: [art] Lock RT PCRs Done
3,352,460 UART: [art] Populate DV Done
3,360,759 UART: [fht] FMC Alias Private Key: 7
3,361,699 UART: [art] Derive CDI
3,361,979 UART: [art] Store in slot 0x4
3,447,777 UART: [art] Derive Key Pair
3,448,137 UART: [art] Store priv key in slot 0x5
3,460,780 UART: [art] Derive Key Pair - Done
3,475,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,753 UART: [art] PUB.X = ECCEB939F1C9022D0EAF9D8D65F0B0E4EA8A6821BA1587772F85F849E8B91C3E96DAC0C995DE54D15B94D19B6F5FB519
3,498,535 UART: [art] PUB.Y = DF079B2006024578218CFC891E44C248966D4050F8B46B92DB0E9D089D03003EE50DBEDAF198031CE7116B2AAE1EAF09
3,505,442 UART: [art] SIG.R = DB5A2B4C68B2015A38C2A58F43DCD7D2B21D53ABDF93A91E6078C5A71AF61E61305EF937ABFE0799F78D046B27DDAB51
3,512,221 UART: [art] SIG.S = 128C94FD3CBF4CABF6301AC804DE87213D4AA716057C3238A06525068B68E6B345E83B25D1FBBB0DA1277D4D9446D683
3,535,753 UART: Caliptra RT
3,536,004 UART: [state] CFI Enabled
3,656,444 UART: [rt] RT listening for mailbox commands...
3,657,114 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,216 UART: [rt]cmd =0x44504543, len=40
3,714,502 >>> mbox cmd response data (40 bytes)
3,714,503 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,252 UART: [rt]cmd =0x44504543, len=40
3,767,004 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,179 ready_for_fw is high
1,362,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,388 >>> mbox cmd response: success
3,040,841 UART:
3,040,857 UART: Running Caliptra FMC ...
3,041,265 UART:
3,041,319 UART: [state] CFI Enabled
3,051,675 UART: [fht] FMC Alias Private Key: 7
3,170,793 UART: [art] Extend RT PCRs Done
3,171,221 UART: [art] Lock RT PCRs Done
3,172,665 UART: [art] Populate DV Done
3,181,080 UART: [fht] FMC Alias Private Key: 7
3,182,036 UART: [art] Derive CDI
3,182,316 UART: [art] Store in slot 0x4
3,267,824 UART: [art] Derive Key Pair
3,268,184 UART: [art] Store priv key in slot 0x5
3,281,055 UART: [art] Derive Key Pair - Done
3,296,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,973 UART: [art] PUB.X = 5D08EC76A8E2FE9E7983DC74B8C100E30A3598A13139629B2581A304E5939D3CE5CAC93B8EE9E84617D21C47E4E26C6B
3,318,718 UART: [art] PUB.Y = 17C97C814811FCA02267DC73E0F31DC3029CDD709F7277D94CFE063C3F3298F0F5354883425A2726D251AAA1017474E2
3,325,655 UART: [art] SIG.R = 0473EB59ABDE835FCC35C22E2073CE14B335508B24563DA9D005DCAA4C72A920FCBC72E6296841C04F5EA451E3357456
3,332,425 UART: [art] SIG.S = 944B0DB2E04C63E07D7FAA88F0167D24BE039509908E3F1717F7E6DF5D2EB31D38300778696C0DC758CDF1EB12C05A0D
3,355,809 UART: Caliptra RT
3,356,060 UART: [state] CFI Enabled
3,475,840 UART: [rt] RT listening for mailbox commands...
3,476,510 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,764 UART: [rt]cmd =0x44504543, len=40
3,534,136 >>> mbox cmd response data (40 bytes)
3,534,137 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,484 UART: [rt]cmd =0x44504543, len=40
3,586,662 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,292 UART: [kat] SHA2-256
882,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,338 UART: [kat] ++
886,490 UART: [kat] sha1
890,684 UART: [kat] SHA2-256
892,622 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
902,629 UART: [kat] HMAC-384Kdf
907,181 UART: [kat] LMS
1,475,377 UART: [kat] --
1,476,200 UART: [cold-reset] ++
1,476,688 UART: [fht] Storing FHT @ 0x50003400
1,479,405 UART: [idev] ++
1,479,573 UART: [idev] CDI.KEYID = 6
1,479,933 UART: [idev] SUBJECT.KEYID = 7
1,480,357 UART: [idev] UDS.KEYID = 0
1,480,702 ready_for_fw is high
1,480,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,501 UART: [idev] Erasing UDS.KEYID = 0
1,504,891 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,511 UART: [idev] --
1,514,582 UART: [ldev] ++
1,514,750 UART: [ldev] CDI.KEYID = 6
1,515,113 UART: [ldev] SUBJECT.KEYID = 5
1,515,539 UART: [ldev] AUTHORITY.KEYID = 7
1,516,002 UART: [ldev] FE.KEYID = 1
1,520,900 UART: [ldev] Erasing FE.KEYID = 1
1,546,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,011 UART: [ldev] --
1,585,302 UART: [fwproc] Waiting for Commands...
1,586,117 UART: [fwproc] Received command 0x46574c44
1,586,908 UART: [fwproc] Received Image of size 118548 bytes
2,931,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,892 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,110 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,319 >>> mbox cmd response: success
3,131,419 UART: [afmc] ++
3,131,587 UART: [afmc] CDI.KEYID = 6
3,131,949 UART: [afmc] SUBJECT.KEYID = 7
3,132,374 UART: [afmc] AUTHORITY.KEYID = 5
3,167,513 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,941 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,313 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,996 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,866 UART: [afmc] --
3,210,758 UART: [cold-reset] --
3,211,588 UART: [state] Locking Datavault
3,212,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,483 UART: [state] Locking ICCM
3,214,131 UART: [exit] Launching FMC @ 0x40000130
3,219,461 UART:
3,219,477 UART: Running Caliptra FMC ...
3,219,885 UART:
3,220,028 UART: [state] CFI Enabled
3,230,436 UART: [fht] FMC Alias Private Key: 7
3,349,090 UART: [art] Extend RT PCRs Done
3,349,518 UART: [art] Lock RT PCRs Done
3,350,898 UART: [art] Populate DV Done
3,359,139 UART: [fht] FMC Alias Private Key: 7
3,360,101 UART: [art] Derive CDI
3,360,381 UART: [art] Store in slot 0x4
3,446,171 UART: [art] Derive Key Pair
3,446,531 UART: [art] Store priv key in slot 0x5
3,459,894 UART: [art] Derive Key Pair - Done
3,474,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,914 UART: [art] PUB.X = 496550651078788F2E26C9CC171EBF87946B3DE1D83DC808B6B7A065729BABAE194542EBE06ED9119BA9DC6359A40702
3,497,677 UART: [art] PUB.Y = 62EA16FC645B93C0B98481EC58AAAF0D4406E452CD0A92FE5BB9863B55A7C3D0F2583FCC1C7697988D02FB53CB335BA2
3,504,629 UART: [art] SIG.R = 0CCFCADEC3B2714EF7E456AF42DAE8C467791413B3E5E8092B0AC64F1B920173672961919788CCA27D1029668944DDB9
3,511,391 UART: [art] SIG.S = DB018FF564F68DCA4AB8578A43BF30DD602112B464FD9A7DC1BBFF5326AFC5721B494BD89B92507B44487ABBDED82FF2
3,535,802 UART: Caliptra RT
3,536,145 UART: [state] CFI Enabled
3,657,003 UART: [rt] RT listening for mailbox commands...
3,657,673 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,955 UART: [rt]cmd =0x44504543, len=40
3,715,405 >>> mbox cmd response data (40 bytes)
3,715,406 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,061 UART: [rt]cmd =0x44504543, len=40
3,768,261 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,216 ready_for_fw is high
1,363,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,603 >>> mbox cmd response: success
3,041,622 UART:
3,041,638 UART: Running Caliptra FMC ...
3,042,046 UART:
3,042,189 UART: [state] CFI Enabled
3,052,575 UART: [fht] FMC Alias Private Key: 7
3,171,269 UART: [art] Extend RT PCRs Done
3,171,697 UART: [art] Lock RT PCRs Done
3,173,059 UART: [art] Populate DV Done
3,181,414 UART: [fht] FMC Alias Private Key: 7
3,182,430 UART: [art] Derive CDI
3,182,710 UART: [art] Store in slot 0x4
3,268,086 UART: [art] Derive Key Pair
3,268,446 UART: [art] Store priv key in slot 0x5
3,281,791 UART: [art] Derive Key Pair - Done
3,296,578 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,576 UART: [art] PUB.X = 385E7C45893F6E55EC75633D7C72C1BFE0D7574F4EC1D3FEC6E987A8F3D5BBE652C2413AFD15EF606F77FCA7A83FA595
3,319,364 UART: [art] PUB.Y = BD3E906069D22F070D1CC0BD0C02310CD1B55AC2CA54F0B503439522BD6D1DF188647F2BA50E1F9C2209D01A94843353
3,326,294 UART: [art] SIG.R = E2B0A1C63140059160C153CDEE41B162498BF3D0F7FD38BCD924E647A7DCF9E6E9923B8DC846D24D4642726D6D8B90DD
3,333,071 UART: [art] SIG.S = 0731407943C9DE40D9504DCB364293A69F0197D1BC81B19ABE5A6C1F1D91D1596CE8C0856FA3DD74E62C0B9A0111E74D
3,356,611 UART: Caliptra RT
3,356,954 UART: [state] CFI Enabled
3,477,094 UART: [rt] RT listening for mailbox commands...
3,477,764 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,894 UART: [rt]cmd =0x44504543, len=40
3,535,138 >>> mbox cmd response data (40 bytes)
3,535,139 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,870 UART: [rt]cmd =0x44504543, len=40
3,587,528 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,326 UART: [kat] SHA2-256
890,876 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,980 UART: [kat] ++
895,132 UART: [kat] sha1
899,430 UART: [kat] SHA2-256
901,370 UART: [kat] SHA2-384
904,181 UART: [kat] SHA2-512-ACC
906,082 UART: [kat] ECC-384
915,373 UART: [kat] HMAC-384Kdf
919,997 UART: [kat] LMS
1,168,309 UART: [kat] --
1,169,282 UART: [cold-reset] ++
1,169,848 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 ready_for_fw is high
1,173,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,473 UART: [idev] Erasing UDS.KEYID = 0
1,198,021 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,207,976 UART: [ldev] ++
1,208,144 UART: [ldev] CDI.KEYID = 6
1,208,508 UART: [ldev] SUBJECT.KEYID = 5
1,208,935 UART: [ldev] AUTHORITY.KEYID = 7
1,209,398 UART: [ldev] FE.KEYID = 1
1,214,704 UART: [ldev] Erasing FE.KEYID = 1
1,240,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,696 UART: [fwproc] Recv command 0x46574c44
1,281,429 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,711 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,143 >>> mbox cmd response: success
2,825,403 UART: [afmc] ++
2,825,571 UART: [afmc] CDI.KEYID = 6
2,825,934 UART: [afmc] SUBJECT.KEYID = 7
2,826,360 UART: [afmc] AUTHORITY.KEYID = 5
2,861,373 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,958 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,298 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,999 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,600 UART: [afmc] --
2,904,583 UART: [cold-reset] --
2,905,337 UART: [state] Locking Datavault
2,906,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,306 UART: [state] Locking ICCM
2,907,914 UART: [exit] Launching FMC @ 0x40000130
2,913,244 UART:
2,913,260 UART: Running Caliptra FMC ...
2,913,668 UART:
2,913,722 UART: [state] CFI Enabled
2,923,960 UART: [fht] FMC Alias Private Key: 7
3,042,778 UART: [art] Extend RT PCRs Done
3,043,206 UART: [art] Lock RT PCRs Done
3,044,692 UART: [art] Populate DV Done
3,053,107 UART: [fht] FMC Alias Private Key: 7
3,054,041 UART: [art] Derive CDI
3,054,321 UART: [art] Store in slot 0x4
3,140,394 UART: [art] Derive Key Pair
3,140,754 UART: [art] Store priv key in slot 0x5
3,153,654 UART: [art] Derive Key Pair - Done
3,168,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,400 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,165 UART: [art] PUB.X = 25AE2ECDE78831D9415DB52AC4F9D42658CC5A0AAEBB240C2C5D69686ED0409533A1AEAF3B5542F086B3CA407F711512
3,190,941 UART: [art] PUB.Y = 4D6E491FBEC4AEAA9102B5029CC13CABD439526F9330A36460D313D86607EAA676B6E602958036D9E6B5F7B9207F0033
3,197,859 UART: [art] SIG.R = 8D258DDECE02D2A3C8D52D7E823C90A8C4E5704D21EF437909F467D4A71C018C5039663C4BD88B6920FB62DF5DB6AAAF
3,204,634 UART: [art] SIG.S = 31AB48F32F94A0B79A43A02FC42DBC31FA26567CCBA9FB4BEBC4842B1F2D07620067070B3ABC7458EE854583140B550F
3,228,305 UART: Caliptra RT
3,228,556 UART: [state] CFI Enabled
3,348,373 UART: [rt] RT listening for mailbox commands...
3,349,043 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,045 UART: [rt]cmd =0x44504543, len=40
3,406,145 >>> mbox cmd response data (40 bytes)
3,406,146 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,717 UART: [rt]cmd =0x44504543, len=40
3,459,003 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,462 ready_for_fw is high
1,059,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,214 >>> mbox cmd response: success
2,742,911 UART:
2,742,927 UART: Running Caliptra FMC ...
2,743,335 UART:
2,743,389 UART: [state] CFI Enabled
2,753,961 UART: [fht] FMC Alias Private Key: 7
2,872,787 UART: [art] Extend RT PCRs Done
2,873,215 UART: [art] Lock RT PCRs Done
2,874,585 UART: [art] Populate DV Done
2,882,848 UART: [fht] FMC Alias Private Key: 7
2,883,866 UART: [art] Derive CDI
2,884,146 UART: [art] Store in slot 0x4
2,970,065 UART: [art] Derive Key Pair
2,970,425 UART: [art] Store priv key in slot 0x5
2,983,971 UART: [art] Derive Key Pair - Done
2,998,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,749 UART: [art] PUB.X = 4D1A90C034EBFB82FF282A55439D54CBD3C5D6B41A90AD07B0BEDE5075DDFB8F4D627F63504410C4C2DE3001287921C6
3,021,525 UART: [art] PUB.Y = 0C9701DA3CD8BA2C43C73B1C9F2E981C2874389E98A4D563E2E185B12EF31F557D4F55DE12C26B912EE14C6C2D430296
3,028,472 UART: [art] SIG.R = 9CF17E6A92516A26FAB7346EE5E5509AC86C7597B35556225CA3C057D70EA3B4DE300EB9A9A79BDE5441BEA35162EA89
3,035,246 UART: [art] SIG.S = 42ECA50C6D2056363D652C57A99527B0409D578A19BFD8397F9211B8CB2401BF15BCAE99E44BBBED7591DF7DFAEF2A6F
3,058,994 UART: Caliptra RT
3,059,245 UART: [state] CFI Enabled
3,179,546 UART: [rt] RT listening for mailbox commands...
3,180,216 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,336 UART: [rt]cmd =0x44504543, len=40
3,237,976 >>> mbox cmd response data (40 bytes)
3,237,977 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,616 UART: [rt]cmd =0x44504543, len=40
3,290,866 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,119 UART: [kat] SHA2-256
891,669 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,773 UART: [kat] ++
895,925 UART: [kat] sha1
900,401 UART: [kat] SHA2-256
902,341 UART: [kat] SHA2-384
905,178 UART: [kat] SHA2-512-ACC
907,079 UART: [kat] ECC-384
916,506 UART: [kat] HMAC-384Kdf
921,082 UART: [kat] LMS
1,169,394 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,643 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,064 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,775 UART: [ldev] ++
1,209,943 UART: [ldev] CDI.KEYID = 6
1,210,307 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,819 UART: [ldev] --
1,282,124 UART: [fwproc] Wait for Commands...
1,282,765 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,533 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,808 >>> mbox cmd response: success
2,827,918 UART: [afmc] ++
2,828,086 UART: [afmc] CDI.KEYID = 6
2,828,449 UART: [afmc] SUBJECT.KEYID = 7
2,828,875 UART: [afmc] AUTHORITY.KEYID = 5
2,864,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,838 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,429 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,749 UART: [afmc] --
2,907,626 UART: [cold-reset] --
2,908,490 UART: [state] Locking Datavault
2,909,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,101 UART: [state] Locking ICCM
2,910,545 UART: [exit] Launching FMC @ 0x40000130
2,915,875 UART:
2,915,891 UART: Running Caliptra FMC ...
2,916,299 UART:
2,916,442 UART: [state] CFI Enabled
2,927,138 UART: [fht] FMC Alias Private Key: 7
3,046,596 UART: [art] Extend RT PCRs Done
3,047,024 UART: [art] Lock RT PCRs Done
3,048,316 UART: [art] Populate DV Done
3,056,547 UART: [fht] FMC Alias Private Key: 7
3,057,641 UART: [art] Derive CDI
3,057,921 UART: [art] Store in slot 0x4
3,143,390 UART: [art] Derive Key Pair
3,143,750 UART: [art] Store priv key in slot 0x5
3,157,360 UART: [art] Derive Key Pair - Done
3,172,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,892 UART: [art] PUB.X = B5715CBBF757D877B1AA06C8C9FA64A30381A53FD03BB09211DB415B44AFBAA5A6AB5AEE68A778542F6F3CED6064DBD3
3,194,678 UART: [art] PUB.Y = E7B54375BE133D919FE5959A6D37279FE0C82AFA41115092087958290FA64CC6691186319B4799A34BCBC52BBA12EEE9
3,201,622 UART: [art] SIG.R = 99C9F26ABA0F5492AE195FEC3CA0A0CDCA958309EBF6B5DC0D0D315CC4DA9F027DA0B1561468AB4FDFC91007D7E27A6B
3,208,400 UART: [art] SIG.S = B319AAF338A0276F10244DB509E1A0C9C159AA82099D113704AB599C62BB2150ED47E6288B0E2F32B7CA5639C1D2C0A6
3,231,438 UART: Caliptra RT
3,231,781 UART: [state] CFI Enabled
3,351,979 UART: [rt] RT listening for mailbox commands...
3,352,649 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,691 UART: [rt]cmd =0x44504543, len=40
3,410,009 >>> mbox cmd response data (40 bytes)
3,410,010 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,481 UART: [rt]cmd =0x44504543, len=40
3,462,117 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,295 >>> mbox cmd response: success
2,742,624 UART:
2,742,640 UART: Running Caliptra FMC ...
2,743,048 UART:
2,743,191 UART: [state] CFI Enabled
2,753,641 UART: [fht] FMC Alias Private Key: 7
2,872,037 UART: [art] Extend RT PCRs Done
2,872,465 UART: [art] Lock RT PCRs Done
2,874,041 UART: [art] Populate DV Done
2,882,132 UART: [fht] FMC Alias Private Key: 7
2,883,138 UART: [art] Derive CDI
2,883,418 UART: [art] Store in slot 0x4
2,968,941 UART: [art] Derive Key Pair
2,969,301 UART: [art] Store priv key in slot 0x5
2,982,769 UART: [art] Derive Key Pair - Done
2,997,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,620 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,385 UART: [art] PUB.X = 34C1B11F71BC8EDE2D2D2C95328F76129AB3F9530E93716A01C1818425F4F638C836315C40C4526B222BC9289D8FC88F
3,020,147 UART: [art] PUB.Y = 8495F59873D15EC6341A01DD33C5316AEB9ADA929BDF259E01938AE6AB5273D61149DB51C8A0EF5948D089D5AEC0AF18
3,027,101 UART: [art] SIG.R = 31E27F05904798008795947A09A5A3B72FA3E8048AF1C1BC04DC2A3719E509CBE043DA3C8E459ACEAD8A8985F3B0362E
3,033,840 UART: [art] SIG.S = 91DF19A7D7065F18680BED2C3EC62717AADDACAC7FE3739A79CAC8ABF87BAFB77D3520F8798463A0A8D935FFD31EBD72
3,057,518 UART: Caliptra RT
3,057,861 UART: [state] CFI Enabled
3,177,992 UART: [rt] RT listening for mailbox commands...
3,178,662 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,702 UART: [rt]cmd =0x44504543, len=40
3,236,066 >>> mbox cmd response data (40 bytes)
3,236,067 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,628 UART: [rt]cmd =0x44504543, len=40
3,288,738 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,818 UART: [state] LifecycleState = Unprovisioned
85,473 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
893,104 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,229 UART: [kat] ++
897,381 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,274 UART: [kat] SHA2-512-ACC
908,175 UART: [kat] ECC-384
917,906 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,865 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,712 UART: [idev] ++
1,174,880 UART: [idev] CDI.KEYID = 6
1,175,240 UART: [idev] SUBJECT.KEYID = 7
1,175,664 UART: [idev] UDS.KEYID = 0
1,176,009 ready_for_fw is high
1,176,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,550 UART: [idev] Erasing UDS.KEYID = 0
1,201,239 UART: [idev] Sha1 KeyId Algorithm
1,209,863 UART: [idev] --
1,210,759 UART: [ldev] ++
1,210,927 UART: [ldev] CDI.KEYID = 6
1,211,290 UART: [ldev] SUBJECT.KEYID = 5
1,211,716 UART: [ldev] AUTHORITY.KEYID = 7
1,212,179 UART: [ldev] FE.KEYID = 1
1,217,579 UART: [ldev] Erasing FE.KEYID = 1
1,243,974 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,305 UART: [ldev] --
1,283,700 UART: [fwproc] Wait for Commands...
1,284,396 UART: [fwproc] Recv command 0x46574c44
1,285,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,223 >>> mbox cmd response: success
2,830,285 UART: [afmc] ++
2,830,453 UART: [afmc] CDI.KEYID = 6
2,830,815 UART: [afmc] SUBJECT.KEYID = 7
2,831,240 UART: [afmc] AUTHORITY.KEYID = 5
2,866,899 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,715 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,598 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,309 UART: [afmc] --
2,910,283 UART: [cold-reset] --
2,911,317 UART: [state] Locking Datavault
2,912,570 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,174 UART: [state] Locking ICCM
2,913,680 UART: [exit] Launching FMC @ 0x40000130
2,919,010 UART:
2,919,026 UART: Running Caliptra FMC ...
2,919,434 UART:
2,919,488 UART: [state] CFI Enabled
2,929,984 UART: [fht] FMC Alias Private Key: 7
3,049,186 UART: [art] Extend RT PCRs Done
3,049,614 UART: [art] Lock RT PCRs Done
3,050,760 UART: [art] Populate DV Done
3,059,037 UART: [fht] FMC Alias Private Key: 7
3,060,145 UART: [art] Derive CDI
3,060,425 UART: [art] Store in slot 0x4
3,146,294 UART: [art] Derive Key Pair
3,146,654 UART: [art] Store priv key in slot 0x5
3,160,300 UART: [art] Derive Key Pair - Done
3,174,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,041 UART: [art] PUB.X = AB0D0BAB724C21B7DA37045F829D2763AB8948EA84AA4F738930A85FAAB0E596482655C22B76443D471B3E93AAB254FB
3,197,810 UART: [art] PUB.Y = 6E1FA66C01A11E0D5BD643A67E9857E5D2E26E69E38E5DCD82880B6ED44E4236184B9DCD4F757E099F81D37AD23C1DA9
3,204,760 UART: [art] SIG.R = 09F217C1C12E23E1222AF9E680D1745E7D76FDCA7E38DE279A8A0517B57F961E634F4EC38B1D5D6F6DDCF19DA73EF461
3,211,538 UART: [art] SIG.S = 48A2FC5D65C538E37DB1BAB88CE94B07033ECA113E4AE3644E06D6DDAB28D62FC5E6C9F48D811389AF8E025513A0072F
3,235,343 UART: Caliptra RT
3,235,594 UART: [state] CFI Enabled
3,355,622 UART: [rt] RT listening for mailbox commands...
3,356,292 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,634 UART: [rt]cmd =0x44504543, len=40
3,413,720 >>> mbox cmd response data (40 bytes)
3,413,721 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,370 UART: [rt]cmd =0x44504543, len=40
3,466,246 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,395 ready_for_fw is high
1,059,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,362 >>> mbox cmd response: success
2,740,595 UART:
2,740,611 UART: Running Caliptra FMC ...
2,741,019 UART:
2,741,073 UART: [state] CFI Enabled
2,751,185 UART: [fht] FMC Alias Private Key: 7
2,870,165 UART: [art] Extend RT PCRs Done
2,870,593 UART: [art] Lock RT PCRs Done
2,871,963 UART: [art] Populate DV Done
2,880,352 UART: [fht] FMC Alias Private Key: 7
2,881,504 UART: [art] Derive CDI
2,881,784 UART: [art] Store in slot 0x4
2,967,345 UART: [art] Derive Key Pair
2,967,705 UART: [art] Store priv key in slot 0x5
2,980,723 UART: [art] Derive Key Pair - Done
2,995,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,775 UART: [art] PUB.X = 8A62A044361E6CAD0EC9C46F9901D1EBFA7EEAB39469E792619CD526F3EA95CBF5E07F6B7E303153199CED3D04138CBF
3,018,552 UART: [art] PUB.Y = 97DBBDBE77942B19D17F123E000420C13B01BE27210DF59905CA7DC1F78E1698EB953EC95F1F628BDDAA3A5A446029DE
3,025,480 UART: [art] SIG.R = 2CFB2D1262BD7741C4291FA3098D6511D5ED1FC03950FEA8B58D32ACE8A060C19CAD8F8EB25BD6BF029983D35D6BB73A
3,032,262 UART: [art] SIG.S = E3EE724984587F3F2F7A547041B4E82BB12D83AC5821BA5C4E37D47CA7E19C95DE4D7402ADC65E136DDB0D8856AA7CC8
3,056,176 UART: Caliptra RT
3,056,427 UART: [state] CFI Enabled
3,176,244 UART: [rt] RT listening for mailbox commands...
3,176,914 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,394 UART: [rt]cmd =0x44504543, len=40
3,235,090 >>> mbox cmd response data (40 bytes)
3,235,091 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,936 UART: [rt]cmd =0x44504543, len=40
3,288,418 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
893,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,862 UART: [kat] ++
898,014 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,957 UART: [kat] SHA2-512-ACC
908,858 UART: [kat] ECC-384
918,853 UART: [kat] HMAC-384Kdf
923,481 UART: [kat] LMS
1,171,809 UART: [kat] --
1,172,780 UART: [cold-reset] ++
1,173,324 UART: [fht] FHT @ 0x50003400
1,176,177 UART: [idev] ++
1,176,345 UART: [idev] CDI.KEYID = 6
1,176,705 UART: [idev] SUBJECT.KEYID = 7
1,177,129 UART: [idev] UDS.KEYID = 0
1,177,474 ready_for_fw is high
1,177,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,189 UART: [idev] Erasing UDS.KEYID = 0
1,202,358 UART: [idev] Sha1 KeyId Algorithm
1,210,964 UART: [idev] --
1,212,084 UART: [ldev] ++
1,212,252 UART: [ldev] CDI.KEYID = 6
1,212,615 UART: [ldev] SUBJECT.KEYID = 5
1,213,041 UART: [ldev] AUTHORITY.KEYID = 7
1,213,504 UART: [ldev] FE.KEYID = 1
1,218,642 UART: [ldev] Erasing FE.KEYID = 1
1,244,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,284,065 UART: [fwproc] Wait for Commands...
1,284,749 UART: [fwproc] Recv command 0x46574c44
1,285,477 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,552 >>> mbox cmd response: success
2,829,680 UART: [afmc] ++
2,829,848 UART: [afmc] CDI.KEYID = 6
2,830,210 UART: [afmc] SUBJECT.KEYID = 7
2,830,635 UART: [afmc] AUTHORITY.KEYID = 5
2,865,736 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,861 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,570 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,453 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,154 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,916 UART: [afmc] --
2,908,850 UART: [cold-reset] --
2,909,624 UART: [state] Locking Datavault
2,910,821 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,425 UART: [state] Locking ICCM
2,912,079 UART: [exit] Launching FMC @ 0x40000130
2,917,409 UART:
2,917,425 UART: Running Caliptra FMC ...
2,917,833 UART:
2,917,976 UART: [state] CFI Enabled
2,928,656 UART: [fht] FMC Alias Private Key: 7
3,047,696 UART: [art] Extend RT PCRs Done
3,048,124 UART: [art] Lock RT PCRs Done
3,049,686 UART: [art] Populate DV Done
3,057,979 UART: [fht] FMC Alias Private Key: 7
3,059,127 UART: [art] Derive CDI
3,059,407 UART: [art] Store in slot 0x4
3,145,114 UART: [art] Derive Key Pair
3,145,474 UART: [art] Store priv key in slot 0x5
3,158,404 UART: [art] Derive Key Pair - Done
3,173,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,630 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,395 UART: [art] PUB.X = 3BF0485B379CFA72DC0D13E60F1169BDDA9CFC490452E5F075B9FAE9EF9289D2E66EFE2F0613718B67B6E55C35D7A854
3,196,167 UART: [art] PUB.Y = BB56BD9CB49248B4A0C05ACDD2AC6F4FDB11701EF3C93D8A7BA7F0A49225F038C318024B36428EEB8D0954A1A8928D92
3,203,125 UART: [art] SIG.R = 21E4D03A056E538F7D2B448A3244346CC00E384E4CDB6C2C747E7D16F9E60432766CC654A1EDFFF2D27BA625EEB2FB44
3,209,898 UART: [art] SIG.S = FDB651709ADE9434036CB3BBC4184F51697E0C8BF8CBDDEBF30A5D4764ABB9D2885AB72099100C81A43EA3895346750D
3,233,689 UART: Caliptra RT
3,234,032 UART: [state] CFI Enabled
3,353,639 UART: [rt] RT listening for mailbox commands...
3,354,309 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,373 UART: [rt]cmd =0x44504543, len=40
3,411,553 >>> mbox cmd response data (40 bytes)
3,411,554 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,225 UART: [rt]cmd =0x44504543, len=40
3,464,507 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,090 ready_for_fw is high
1,061,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,805 >>> mbox cmd response: success
2,742,488 UART:
2,742,504 UART: Running Caliptra FMC ...
2,742,912 UART:
2,743,055 UART: [state] CFI Enabled
2,753,689 UART: [fht] FMC Alias Private Key: 7
2,872,071 UART: [art] Extend RT PCRs Done
2,872,499 UART: [art] Lock RT PCRs Done
2,874,061 UART: [art] Populate DV Done
2,882,260 UART: [fht] FMC Alias Private Key: 7
2,883,268 UART: [art] Derive CDI
2,883,548 UART: [art] Store in slot 0x4
2,969,185 UART: [art] Derive Key Pair
2,969,545 UART: [art] Store priv key in slot 0x5
2,982,773 UART: [art] Derive Key Pair - Done
2,997,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,034 UART: [art] PUB.X = F53152CB57FB4618F5239A6932A618CFCB8805C63ACE2E9BB96B9D34A329D2BD2A7C1E30F2B975BBB9864F6316D78588
3,020,809 UART: [art] PUB.Y = AE977B0ECE10BF34E32423B7D0570EBB9F1F8356B6627FC81BC99F3F4B8B37DA913632B9F9E460E21397D7A80951EB2C
3,027,760 UART: [art] SIG.R = 3C909D568E86FB50E4446D511D6C1A40A820FC12D084E133B48715C1AD180881B5D1CE4051A18AC9D85778D956A85588
3,034,523 UART: [art] SIG.S = 68ACA5C5630D2315A16D817B13E202502CD00BA87F33EE843596B6E5F586CA055D58D2A553DF6E498F0C6A69C197A82D
3,057,788 UART: Caliptra RT
3,058,131 UART: [state] CFI Enabled
3,178,261 UART: [rt] RT listening for mailbox commands...
3,178,931 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,197 UART: [rt]cmd =0x44504543, len=40
3,236,105 >>> mbox cmd response data (40 bytes)
3,236,106 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,689 UART: [rt]cmd =0x44504543, len=40
3,288,451 >>> mbox cmd response data (40 bytes)
test test_invoke_dpe::test_invoke_dpe_rotate_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,090 UART:
192,467 UART: Running Caliptra ROM ...
193,674 UART:
193,829 UART: [state] CFI Enabled
263,368 UART: [state] LifecycleState = Unprovisioned
265,354 UART: [state] DebugLocked = No
266,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,320 UART: [kat] SHA2-256
442,032 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,568 UART: [kat] ++
453,062 UART: [kat] sha1
465,251 UART: [kat] SHA2-256
467,951 UART: [kat] SHA2-384
473,384 UART: [kat] SHA2-512-ACC
475,748 UART: [kat] ECC-384
2,766,789 UART: [kat] HMAC-384Kdf
2,777,896 UART: [kat] LMS
3,968,210 UART: [kat] --
3,970,786 UART: [cold-reset] ++
3,972,859 UART: [fht] Storing FHT @ 0x50003400
3,984,495 UART: [idev] ++
3,985,104 UART: [idev] CDI.KEYID = 6
3,986,024 UART: [idev] SUBJECT.KEYID = 7
3,987,278 UART: [idev] UDS.KEYID = 0
3,988,342 ready_for_fw is high
3,988,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,471 UART: [idev] Erasing UDS.KEYID = 0
7,327,876 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,349 UART: [idev] --
7,353,318 UART: [ldev] ++
7,353,893 UART: [ldev] CDI.KEYID = 6
7,354,829 UART: [ldev] SUBJECT.KEYID = 5
7,356,094 UART: [ldev] AUTHORITY.KEYID = 7
7,357,251 UART: [ldev] FE.KEYID = 1
7,400,214 UART: [ldev] Erasing FE.KEYID = 1
10,734,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,053,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,422 UART: [ldev] --
13,106,843 UART: [fwproc] Waiting for Commands...
13,109,702 UART: [fwproc] Received command 0x46574c44
13,111,885 UART: [fwproc] Received Image of size 118548 bytes
17,210,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,285,010 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,358,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,686,035 >>> mbox cmd response: success
17,687,121 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,689,862 UART: [afmc] ++
17,690,441 UART: [afmc] CDI.KEYID = 6
17,691,409 UART: [afmc] SUBJECT.KEYID = 7
17,692,630 UART: [afmc] AUTHORITY.KEYID = 5
21,060,142 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,361,624 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,363,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,378,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,393,045 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,407,443 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,430,122 UART: [afmc] --
23,433,881 UART: [cold-reset] --
23,435,796 UART: [state] Locking Datavault
23,441,585 UART: [state] Locking PCR0, PCR1 and PCR31
23,443,334 UART: [state] Locking ICCM
23,446,052 UART: [exit] Launching FMC @ 0x40000130
23,454,446 UART:
23,454,693 UART: Running Caliptra FMC ...
23,455,748 UART:
23,455,900 UART: [state] CFI Enabled
23,522,043 UART: [fht] FMC Alias Private Key: 7
25,863,471 UART: [art] Extend RT PCRs Done
25,864,688 UART: [art] Lock RT PCRs Done
25,866,490 UART: [art] Populate DV Done
25,872,012 UART: [fht] FMC Alias Private Key: 7
25,873,563 UART: [art] Derive CDI
25,874,380 UART: [art] Store in slot 0x4
25,931,281 UART: [art] Derive Key Pair
25,932,315 UART: [art] Store priv key in slot 0x5
29,225,192 UART: [art] Derive Key Pair - Done
29,238,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,526,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,528,324 UART: [art] PUB.X = A4450E571326C017192A9C715D75E13FA66A787FAA45BCA2FB5D29DBD1FC6CC416CC74371D790F72DC2B9B45D6B35669
31,535,617 UART: [art] PUB.Y = F126D78627DDEBF137D6AA8646FC517A42D7165CB0EE1854EEDE37BF3B785056526B8906D455797BC72DEB3682F77975
31,542,838 UART: [art] SIG.R = 0D977372D59DCD557D96A6FEC8065F2B7D0B43A790EA9278CF766B30A29A0A185EABC4DDFCF533C44F396BBA0A4559B1
31,550,222 UART: [art] SIG.S = AEA93DE3F9B408BD23E91602FE1982DBD5EA5EBE85E31BB4C452A02BA751CE5A7B9E7BC9EECBBF0043BCD25C9599E218
32,855,811 UART: Caliptra RT
32,856,519 UART: [state] CFI Enabled
33,033,882 UART: [rt] RT listening for mailbox commands...
33,066,298 UART: [rt]cmd =0x44504543, len=136
38,693,902 >>> mbox cmd response data (136 bytes)
38,695,249 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,726,070 UART: [rt]cmd =0x44504543, len=92
44,488,910 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,789,293 ready_for_fw is high
3,790,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,309 >>> mbox cmd response: success
17,967,150 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,658,633 UART:
23,659,019 UART: Running Caliptra FMC ...
23,660,163 UART:
23,660,318 UART: [state] CFI Enabled
23,729,206 UART: [fht] FMC Alias Private Key: 7
26,070,034 UART: [art] Extend RT PCRs Done
26,071,260 UART: [art] Lock RT PCRs Done
26,073,026 UART: [art] Populate DV Done
26,078,609 UART: [fht] FMC Alias Private Key: 7
26,080,149 UART: [art] Derive CDI
26,080,883 UART: [art] Store in slot 0x4
26,138,046 UART: [art] Derive Key Pair
26,139,085 UART: [art] Store priv key in slot 0x5
29,431,236 UART: [art] Derive Key Pair - Done
29,443,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,893 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,404 UART: [art] PUB.X = 5CB4DA698C9D493D37DD1B3D0DF2A7A9E1ED921BEAEBBA7FB3B661FB5C9900A8EC3FF4C6EB8BEA3DA9DBE0EEFC38F436
31,740,701 UART: [art] PUB.Y = 721E10012AD93F61CF8F91AEA00172BAF206269BD29384FA8FDF676523F4763B4EC5FEFA1CD4A9544E1CDA528EC0EBA8
31,747,994 UART: [art] SIG.R = DE5CFA186D3BAAB643C9269E9FF4E7AC5CCB8A7823EBB162F5E42B64BD6639E16544DF210DA14B92572A65C1AEE4A92D
31,755,436 UART: [art] SIG.S = 7B3217E93759876A9A6949A452310F4E3CA9600940EF2EAC00D40CDE84331193326014E75E3E62727315BEE5D7E75999
33,060,718 UART: Caliptra RT
33,061,444 UART: [state] CFI Enabled
33,257,764 UART: [rt] RT listening for mailbox commands...
33,290,269 UART: [rt]cmd =0x44504543, len=136
38,916,555 >>> mbox cmd response data (136 bytes)
38,917,871 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,948,470 UART: [rt]cmd =0x44504543, len=92
44,709,401 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
192,427 UART:
192,800 UART: Running Caliptra ROM ...
193,983 UART:
603,736 UART: [state] CFI Enabled
616,280 UART: [state] LifecycleState = Unprovisioned
618,151 UART: [state] DebugLocked = No
620,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,037 UART: [kat] SHA2-256
795,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,291 UART: [kat] ++
806,888 UART: [kat] sha1
817,550 UART: [kat] SHA2-256
820,261 UART: [kat] SHA2-384
824,962 UART: [kat] SHA2-512-ACC
827,324 UART: [kat] ECC-384
3,109,886 UART: [kat] HMAC-384Kdf
3,120,924 UART: [kat] LMS
4,311,079 UART: [kat] --
4,314,561 UART: [cold-reset] ++
4,316,641 UART: [fht] Storing FHT @ 0x50003400
4,328,210 UART: [idev] ++
4,328,809 UART: [idev] CDI.KEYID = 6
4,329,843 UART: [idev] SUBJECT.KEYID = 7
4,331,034 UART: [idev] UDS.KEYID = 0
4,332,116 ready_for_fw is high
4,332,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,160 UART: [idev] Erasing UDS.KEYID = 0
7,618,952 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,279 UART: [idev] --
7,646,142 UART: [ldev] ++
7,646,709 UART: [ldev] CDI.KEYID = 6
7,647,673 UART: [ldev] SUBJECT.KEYID = 5
7,648,878 UART: [ldev] AUTHORITY.KEYID = 7
7,650,108 UART: [ldev] FE.KEYID = 1
7,660,314 UART: [ldev] Erasing FE.KEYID = 1
10,946,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,820 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,613 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,598 UART: [ldev] --
13,306,454 UART: [fwproc] Waiting for Commands...
13,309,411 UART: [fwproc] Received command 0x46574c44
13,311,584 UART: [fwproc] Received Image of size 118548 bytes
17,411,783 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,710 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,625 >>> mbox cmd response: success
17,889,791 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
17,892,318 UART: [afmc] ++
17,892,920 UART: [afmc] CDI.KEYID = 6
17,893,988 UART: [afmc] SUBJECT.KEYID = 7
17,895,036 UART: [afmc] AUTHORITY.KEYID = 5
21,208,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,501,819 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,504,103 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,518,525 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,533,273 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,547,665 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,569,813 UART: [afmc] --
23,573,667 UART: [cold-reset] --
23,577,895 UART: [state] Locking Datavault
23,582,923 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,669 UART: [state] Locking ICCM
23,587,030 UART: [exit] Launching FMC @ 0x40000130
23,595,422 UART:
23,595,652 UART: Running Caliptra FMC ...
23,596,744 UART:
23,596,898 UART: [state] CFI Enabled
23,605,215 UART: [fht] FMC Alias Private Key: 7
25,944,637 UART: [art] Extend RT PCRs Done
25,945,888 UART: [art] Lock RT PCRs Done
25,947,486 UART: [art] Populate DV Done
25,952,950 UART: [fht] FMC Alias Private Key: 7
25,954,591 UART: [art] Derive CDI
25,955,399 UART: [art] Store in slot 0x4
25,997,716 UART: [art] Derive Key Pair
25,998,707 UART: [art] Store priv key in slot 0x5
29,241,043 UART: [art] Derive Key Pair - Done
29,254,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,732 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,241 UART: [art] PUB.X = E93C24D3EF35E7D70E4BC8AF1A6BE1157D6260E6287B0CE6A4D0488F9BEC746BA9C35DEFFA2C3C04AA25CC1EE6C7E385
31,543,535 UART: [art] PUB.Y = 2DD0EF119D1F8F83D5EA916E48367710B51DF318C8DA4E7FD5EFAFC5E12B5DE5355DCB9F915F190E445C75B1A1A82EB3
31,550,807 UART: [art] SIG.R = 9B86D1F281D552755A1789774BE03E29EA26473A2D1C9CDCA071CD9D457C6F05C2D8ED83A2526E77B678810AC8423B2E
31,558,183 UART: [art] SIG.S = EF7FE3D5B54D6B78A9960DD39782BA1E1A834E15C160D5DA3C116CEE84720DB9654FA6E9193E58602F42CD9E95C4F693
32,863,153 UART: Caliptra RT
32,863,862 UART: [state] CFI Enabled
32,997,173 UART: [rt] RT listening for mailbox commands...
33,029,351 UART: [rt]cmd =0x44504543, len=136
38,588,777 >>> mbox cmd response data (136 bytes)
38,590,785 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,621,312 UART: [rt]cmd =0x44504543, len=92
44,297,001 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,125,969 ready_for_fw is high
4,126,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,019 >>> mbox cmd response: success
18,158,275 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
23,793,700 UART:
23,794,097 UART: Running Caliptra FMC ...
23,795,202 UART:
23,795,350 UART: [state] CFI Enabled
23,803,467 UART: [fht] FMC Alias Private Key: 7
26,143,625 UART: [art] Extend RT PCRs Done
26,144,853 UART: [art] Lock RT PCRs Done
26,146,075 UART: [art] Populate DV Done
26,151,616 UART: [fht] FMC Alias Private Key: 7
26,153,314 UART: [art] Derive CDI
26,154,046 UART: [art] Store in slot 0x4
26,196,637 UART: [art] Derive Key Pair
26,197,680 UART: [art] Store priv key in slot 0x5
29,439,879 UART: [art] Derive Key Pair - Done
29,452,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,246 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,774 UART: [art] PUB.X = 1C848862A8FD2A89F8A706BA7ED4A6AADEA153EFE309E34D6AA081F4450B42C04D7741C962513DBE727CDD5B9CE859BD
31,741,020 UART: [art] PUB.Y = C0B65F0113C2E62A595EAA9227FB901513DE7F096514CD44FE4E9D1ACC1367DB0A07ADD98E30AC87276E0643CA8AF096
31,748,321 UART: [art] SIG.R = 93AB5916495F2EF342234926D1D15C0A4C08FE1CB2CA36C6C6D4D1CE9DBE861D283A8972DFCAEB6D4BE0A1E256EDD0AD
31,755,720 UART: [art] SIG.S = 9D838A1C08FFCAC5743D119D570F2A45B82D204D4C52E24796123B700CE5E8D1A98BFC88B3C81F2D34A8DB65EAB308F8
33,060,559 UART: Caliptra RT
33,061,278 UART: [state] CFI Enabled
33,195,082 UART: [rt] RT listening for mailbox commands...
33,227,402 UART: [rt]cmd =0x44504543, len=136
38,786,657 >>> mbox cmd response data (136 bytes)
38,787,959 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
38,818,600 UART: [rt]cmd =0x44504543, len=92
44,494,143 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,799 writing to cptra_bootfsm_go
192,925 UART:
193,293 UART: Running Caliptra ROM ...
194,467 UART:
194,618 UART: [state] CFI Enabled
266,689 UART: [state] LifecycleState = Unprovisioned
268,616 UART: [state] DebugLocked = No
271,425 UART: [state] WD Timer not started. Device not locked for debugging
275,746 UART: [kat] SHA2-256
455,407 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,203 UART: [kat] ++
466,662 UART: [kat] sha1
478,321 UART: [kat] SHA2-256
481,037 UART: [kat] SHA2-384
488,317 UART: [kat] SHA2-512-ACC
490,726 UART: [kat] ECC-384
2,946,847 UART: [kat] HMAC-384Kdf
2,973,391 UART: [kat] LMS
3,449,877 UART: [kat] --
3,455,219 UART: [cold-reset] ++
3,457,149 UART: [fht] FHT @ 0x50003400
3,467,760 UART: [idev] ++
3,468,322 UART: [idev] CDI.KEYID = 6
3,469,313 UART: [idev] SUBJECT.KEYID = 7
3,470,555 UART: [idev] UDS.KEYID = 0
3,471,474 ready_for_fw is high
3,471,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,804 UART: [idev] Erasing UDS.KEYID = 0
5,991,964 UART: [idev] Sha1 KeyId Algorithm
6,015,263 UART: [idev] --
6,021,017 UART: [ldev] ++
6,021,598 UART: [ldev] CDI.KEYID = 6
6,022,484 UART: [ldev] SUBJECT.KEYID = 5
6,023,766 UART: [ldev] AUTHORITY.KEYID = 7
6,024,994 UART: [ldev] FE.KEYID = 1
6,058,913 UART: [ldev] Erasing FE.KEYID = 1
8,563,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,372 UART: [ldev] --
10,375,423 UART: [fwproc] Wait for Commands...
10,378,646 UART: [fwproc] Recv command 0x46574c44
10,380,676 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,595 >>> mbox cmd response: success
14,348,882 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,351,857 UART: [afmc] ++
14,352,450 UART: [afmc] CDI.KEYID = 6
14,353,387 UART: [afmc] SUBJECT.KEYID = 7
14,354,600 UART: [afmc] AUTHORITY.KEYID = 5
16,894,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,780 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,367 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,251 UART: [afmc] --
18,699,576 UART: [cold-reset] --
18,704,074 UART: [state] Locking Datavault
18,709,694 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,437 UART: [state] Locking ICCM
18,713,845 UART: [exit] Launching FMC @ 0x40000130
18,722,292 UART:
18,722,564 UART: Running Caliptra FMC ...
18,723,588 UART:
18,723,732 UART: [state] CFI Enabled
18,777,173 UART: [fht] FMC Alias Private Key: 7
20,543,798 UART: [art] Extend RT PCRs Done
20,545,018 UART: [art] Lock RT PCRs Done
20,546,778 UART: [art] Populate DV Done
20,551,914 UART: [fht] FMC Alias Private Key: 7
20,553,502 UART: [art] Derive CDI
20,554,314 UART: [art] Store in slot 0x4
20,609,763 UART: [art] Derive Key Pair
20,610,802 UART: [art] Store priv key in slot 0x5
23,073,102 UART: [art] Derive Key Pair - Done
23,086,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,973 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,459 UART: [art] PUB.X = 6B077E7E2ED31DBFD5DCF218A99D47805A84F336435601539FDDDA56445C520DD4ACCD70F187412BE9E75807BFA22632
24,807,781 UART: [art] PUB.Y = C62F1596604D1AECC8C0BF162CFC49A10A9C516CCBD6DF9B1DC19B4D77759E660F762EA37124EE53F7C9B887BA92CD91
24,815,026 UART: [art] SIG.R = B81504B1D2DD4AA259338C11562FFD580494D7C16AA9969F116AA7E723170F9ABBB5BE9DC3865B93F0749A078D82EEC0
24,822,416 UART: [art] SIG.S = 202DCF344F23EDFA992E7A770E7B8D68C89CF691C533E3970C4B6308132A6522696BB781AE0AF72105F3E2F79A867F14
25,801,354 UART: Caliptra RT
25,802,064 UART: [state] CFI Enabled
25,981,395 UART: [rt] RT listening for mailbox commands...
26,014,049 UART: [rt]cmd =0x44504543, len=136
30,236,931 >>> mbox cmd response data (136 bytes)
30,238,316 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,268,809 UART: [rt]cmd =0x44504543, len=92
34,624,479 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,461,845 ready_for_fw is high
3,462,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,665 >>> mbox cmd response: success
14,221,947 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,517,353 UART:
18,517,726 UART: Running Caliptra FMC ...
18,518,925 UART:
18,519,094 UART: [state] CFI Enabled
18,582,819 UART: [fht] FMC Alias Private Key: 7
20,370,244 UART: [art] Extend RT PCRs Done
20,371,450 UART: [art] Lock RT PCRs Done
20,373,204 UART: [art] Populate DV Done
20,378,503 UART: [fht] FMC Alias Private Key: 7
20,380,091 UART: [art] Derive CDI
20,380,910 UART: [art] Store in slot 0x4
20,436,968 UART: [art] Derive Key Pair
20,437,970 UART: [art] Store priv key in slot 0x5
22,901,025 UART: [art] Derive Key Pair - Done
22,913,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,916 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,400 UART: [art] PUB.X = 2A7C71C2C171A6C25E1915A293D1D2213BE44EF0DC93DB556E6FAD2C6EBD63B20D430415B3C14BBC281620961DD8881C
24,635,646 UART: [art] PUB.Y = 023B8E9F3B9082C32B3566A8702CBF12630F4B3D6A339134ACB129C0215E737658900A331A5016E9CBB7EFB7002B46CE
24,642,904 UART: [art] SIG.R = 6FBC4A66C262D52ED35A46EFE45DECF380EEC47314059C6EA1EDD3B2D4E7C74EBC26E843C59E47E203850A8127A9A677
24,650,297 UART: [art] SIG.S = EFC65583E3C9BEA1A65DD879AEF5EE559EFC724FD9B212283468ABC82FFF0E0DB098434A61E10D849308F3C13492705C
25,629,740 UART: Caliptra RT
25,630,446 UART: [state] CFI Enabled
25,812,035 UART: [rt] RT listening for mailbox commands...
25,844,586 UART: [rt]cmd =0x44504543, len=136
30,067,288 >>> mbox cmd response data (136 bytes)
30,068,602 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,099,101 UART: [rt]cmd =0x44504543, len=92
34,455,467 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,484 UART:
192,846 UART: Running Caliptra ROM ...
194,031 UART:
603,645 UART: [state] CFI Enabled
618,560 UART: [state] LifecycleState = Unprovisioned
620,526 UART: [state] DebugLocked = No
622,982 UART: [state] WD Timer not started. Device not locked for debugging
626,093 UART: [kat] SHA2-256
805,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,568 UART: [kat] ++
817,022 UART: [kat] sha1
827,976 UART: [kat] SHA2-256
830,635 UART: [kat] SHA2-384
835,845 UART: [kat] SHA2-512-ACC
838,213 UART: [kat] ECC-384
3,280,198 UART: [kat] HMAC-384Kdf
3,292,358 UART: [kat] LMS
3,768,877 UART: [kat] --
3,773,369 UART: [cold-reset] ++
3,774,446 UART: [fht] FHT @ 0x50003400
3,785,704 UART: [idev] ++
3,786,282 UART: [idev] CDI.KEYID = 6
3,787,194 UART: [idev] SUBJECT.KEYID = 7
3,788,441 UART: [idev] UDS.KEYID = 0
3,789,369 ready_for_fw is high
3,789,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,463 UART: [idev] Erasing UDS.KEYID = 0
6,263,676 UART: [idev] Sha1 KeyId Algorithm
6,288,630 UART: [idev] --
6,294,518 UART: [ldev] ++
6,295,091 UART: [ldev] CDI.KEYID = 6
6,296,007 UART: [ldev] SUBJECT.KEYID = 5
6,297,231 UART: [ldev] AUTHORITY.KEYID = 7
6,298,463 UART: [ldev] FE.KEYID = 1
6,309,488 UART: [ldev] Erasing FE.KEYID = 1
8,784,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,668 UART: [ldev] --
10,578,321 UART: [fwproc] Wait for Commands...
10,580,696 UART: [fwproc] Recv command 0x46574c44
10,582,690 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,597 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,201 >>> mbox cmd response: success
14,549,350 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,551,596 UART: [afmc] ++
14,552,170 UART: [afmc] CDI.KEYID = 6
14,553,140 UART: [afmc] SUBJECT.KEYID = 7
14,554,353 UART: [afmc] AUTHORITY.KEYID = 5
17,061,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,406 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,942 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,508 UART: [afmc] --
18,859,393 UART: [cold-reset] --
18,864,385 UART: [state] Locking Datavault
18,868,931 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,629 UART: [state] Locking ICCM
18,872,593 UART: [exit] Launching FMC @ 0x40000130
18,880,986 UART:
18,881,262 UART: Running Caliptra FMC ...
18,882,293 UART:
18,882,443 UART: [state] CFI Enabled
18,890,677 UART: [fht] FMC Alias Private Key: 7
20,656,729 UART: [art] Extend RT PCRs Done
20,657,940 UART: [art] Lock RT PCRs Done
20,659,647 UART: [art] Populate DV Done
20,665,077 UART: [fht] FMC Alias Private Key: 7
20,666,784 UART: [art] Derive CDI
20,667,520 UART: [art] Store in slot 0x4
20,710,324 UART: [art] Derive Key Pair
20,711,319 UART: [art] Store priv key in slot 0x5
23,138,406 UART: [art] Derive Key Pair - Done
23,151,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,079 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,580 UART: [art] PUB.X = C304B9D03E7F2C6758087CEE6A97E5EFDFCEA7DB5279C1D0A97BDA98DE2BDB61E35CF4B6672C7515F18BCA38F5CA180E
24,866,888 UART: [art] PUB.Y = 75BB8102DDCF14D8C98B7A27D8A899437BF8573A4163E614009B805AF4EDFCF12E47566D4A5995FD60CCF7A511C2FA48
24,874,175 UART: [art] SIG.R = 5B3C5DE66A3F5F36B485314B2ADBC5C344742CD2F41457E3000FBBA8567A2D6E75D2F00388B978004FE32D9AA3879DAA
24,881,558 UART: [art] SIG.S = BA7D3BC726948BC21EC2A5A0ECEA7BBC39560BEE07F9597E76AF009D1EC559EEE9433BC283EA6B5B5F8482ED04094B53
25,860,223 UART: Caliptra RT
25,860,911 UART: [state] CFI Enabled
25,993,498 UART: [rt] RT listening for mailbox commands...
26,025,978 UART: [rt]cmd =0x44504543, len=136
30,196,368 >>> mbox cmd response data (136 bytes)
30,197,758 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,228,194 UART: [rt]cmd =0x44504543, len=92
34,514,033 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,475 writing to cptra_bootfsm_go
3,780,648 ready_for_fw is high
3,781,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,531 >>> mbox cmd response: success
14,446,787 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
18,696,567 UART:
18,696,942 UART: Running Caliptra FMC ...
18,698,133 UART:
18,698,308 UART: [state] CFI Enabled
18,706,031 UART: [fht] FMC Alias Private Key: 7
20,471,295 UART: [art] Extend RT PCRs Done
20,472,520 UART: [art] Lock RT PCRs Done
20,474,340 UART: [art] Populate DV Done
20,479,932 UART: [fht] FMC Alias Private Key: 7
20,481,472 UART: [art] Derive CDI
20,482,210 UART: [art] Store in slot 0x4
20,525,025 UART: [art] Derive Key Pair
20,526,074 UART: [art] Store priv key in slot 0x5
22,953,025 UART: [art] Derive Key Pair - Done
22,966,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,527 UART: [art] Erasing AUTHORITY.KEYID = 7
24,674,032 UART: [art] PUB.X = 2E62FF1CF3904CB52D4BC28E40006B7E8E4A2AB3692B4015B32598B084BA462D3CC0ACFDC287638659FEE07BC1E995AD
24,681,303 UART: [art] PUB.Y = FFD6BC0DBFC831A226A127A63AC7A761B497F0C81A7235AC8EC4202096117EA80049C1EDDC6856BE23BCDC5996966E9D
24,688,557 UART: [art] SIG.R = 7D502FE272CFC8BBDF177D2AF51C89B8659623D65732EC8E49122CCC940F52233093A6169ABF2EBAD09FA85D2DA9E9B3
24,695,963 UART: [art] SIG.S = 2D348E0A6A470846D576992B9CBCEC1B4F69DA7F08B6952B655E9D5A7D55D14C4BB2A042762A0C9222B736090381ECBC
25,674,755 UART: Caliptra RT
25,675,484 UART: [state] CFI Enabled
25,808,052 UART: [rt] RT listening for mailbox commands...
25,840,287 UART: [rt]cmd =0x44504543, len=136
30,010,613 >>> mbox cmd response data (136 bytes)
30,011,919 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,042,681 UART: [rt]cmd =0x44504543, len=92
34,328,207 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,121 UART:
192,503 UART: Running Caliptra ROM ...
193,900 UART:
194,060 UART: [state] CFI Enabled
259,554 UART: [state] LifecycleState = Unprovisioned
261,917 UART: [state] DebugLocked = No
263,374 UART: [state] WD Timer not started. Device not locked for debugging
268,766 UART: [kat] SHA2-256
458,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,399 UART: [kat] ++
469,851 UART: [kat] sha1
480,154 UART: [kat] SHA2-256
483,151 UART: [kat] SHA2-384
488,778 UART: [kat] SHA2-512-ACC
491,350 UART: [kat] ECC-384
2,948,003 UART: [kat] HMAC-384Kdf
2,972,886 UART: [kat] LMS
3,504,633 UART: [kat] --
3,509,153 UART: [cold-reset] ++
3,510,796 UART: [fht] FHT @ 0x50003400
3,522,489 UART: [idev] ++
3,523,189 UART: [idev] CDI.KEYID = 6
3,524,064 UART: [idev] SUBJECT.KEYID = 7
3,525,326 UART: [idev] UDS.KEYID = 0
3,526,225 ready_for_fw is high
3,526,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,470 UART: [idev] Erasing UDS.KEYID = 0
6,029,212 UART: [idev] Sha1 KeyId Algorithm
6,051,897 UART: [idev] --
6,055,112 UART: [ldev] ++
6,055,795 UART: [ldev] CDI.KEYID = 6
6,056,711 UART: [ldev] SUBJECT.KEYID = 5
6,057,919 UART: [ldev] AUTHORITY.KEYID = 7
6,059,147 UART: [ldev] FE.KEYID = 1
6,100,793 UART: [ldev] Erasing FE.KEYID = 1
8,605,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,256 UART: [ldev] --
10,414,463 UART: [fwproc] Wait for Commands...
10,417,156 UART: [fwproc] Recv command 0x46574c44
10,419,461 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,669 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,604 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,347 >>> mbox cmd response: success
14,670,942 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,674,665 UART: [afmc] ++
14,675,384 UART: [afmc] CDI.KEYID = 6
14,676,569 UART: [afmc] SUBJECT.KEYID = 7
14,678,054 UART: [afmc] AUTHORITY.KEYID = 5
17,215,813 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,243 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,042 UART: [afmc] --
19,011,893 UART: [cold-reset] --
19,015,969 UART: [state] Locking Datavault
19,023,265 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,394 UART: [state] Locking ICCM
19,026,890 UART: [exit] Launching FMC @ 0x40000130
19,035,556 UART:
19,035,798 UART: Running Caliptra FMC ...
19,036,902 UART:
19,037,064 UART: [state] CFI Enabled
19,094,297 UART: [fht] FMC Alias Private Key: 7
20,860,981 UART: [art] Extend RT PCRs Done
20,862,219 UART: [art] Lock RT PCRs Done
20,863,791 UART: [art] Populate DV Done
20,869,360 UART: [fht] FMC Alias Private Key: 7
20,870,896 UART: [art] Derive CDI
20,871,704 UART: [art] Store in slot 0x4
20,927,263 UART: [art] Derive Key Pair
20,928,300 UART: [art] Store priv key in slot 0x5
23,391,119 UART: [art] Derive Key Pair - Done
23,404,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,882 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,388 UART: [art] PUB.X = FB99DBD4859C40B03D3C21F662919CFE02B4BD4A37BF376F28A9D3318E36871CEE42330B2051FCC984836A6E55FFED06
25,125,634 UART: [art] PUB.Y = 22E75B8D2CFB6C730770C35422B0F1B696616857632BB64EFC2751ACD04CFB4008E79FF1A2727143F2E12F7C58BBFAB5
25,132,925 UART: [art] SIG.R = 3A8E09FE578FE8EF8FAA7BAB53D00E606AB57EC3F5E498B976A61ADE117706F22424042F1D63652B689A3EBEA53EC538
25,140,308 UART: [art] SIG.S = BE90B63CAA2E1A74E24DEE8B02540787F01B1ED5F412D51A7886D9E10E7CA57685C1AB2AD96092244D206EB563642386
26,118,852 UART: Caliptra RT
26,119,563 UART: [state] CFI Enabled
26,300,660 UART: [rt] RT listening for mailbox commands...
26,333,319 UART: [rt]cmd =0x44504543, len=136
30,555,388 >>> mbox cmd response data (136 bytes)
30,556,739 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,587,591 UART: [rt]cmd =0x44504543, len=92
34,941,923 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,438,239 ready_for_fw is high
3,438,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,720 >>> mbox cmd response: success
14,823,553 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,110,137 UART:
19,110,539 UART: Running Caliptra FMC ...
19,111,651 UART:
19,111,800 UART: [state] CFI Enabled
19,178,566 UART: [fht] FMC Alias Private Key: 7
20,944,951 UART: [art] Extend RT PCRs Done
20,946,157 UART: [art] Lock RT PCRs Done
20,947,758 UART: [art] Populate DV Done
20,953,012 UART: [fht] FMC Alias Private Key: 7
20,954,667 UART: [art] Derive CDI
20,955,402 UART: [art] Store in slot 0x4
21,011,896 UART: [art] Derive Key Pair
21,012,968 UART: [art] Store priv key in slot 0x5
23,475,831 UART: [art] Derive Key Pair - Done
23,488,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,424 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,952 UART: [art] PUB.X = 18AC6FF1AD6071C2383A2903B088422C91351A1D908D19589A672A9FBDD353D027E3DE7818C8C1ED929FC69E41240E93
25,210,184 UART: [art] PUB.Y = EBF11E4AC8ED1B58FE4D5BDB55CD8A3D9DDA07189559B7238A34B4C3C7FE24169358AA696C9528ED4FAEB2BD491A091E
25,217,433 UART: [art] SIG.R = CD496E9C0708BD91A4D4FDD06C87CB5A8B5FC2757D44B8EBB0337F6B772FE62D58CC76E15D60A42082B88F5F768AF46C
25,224,881 UART: [art] SIG.S = A3BA11F2E7561387240F057EEA04CF6D0D501DFE50ACB666C12338B018773289066792736CD41B104BD449E073F75582
26,203,191 UART: Caliptra RT
26,203,881 UART: [state] CFI Enabled
26,384,350 UART: [rt] RT listening for mailbox commands...
26,416,887 UART: [rt]cmd =0x44504543, len=136
30,640,529 >>> mbox cmd response data (136 bytes)
30,641,843 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,672,078 UART: [rt]cmd =0x44504543, len=92
35,026,750 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,431 UART:
192,815 UART: Running Caliptra ROM ...
193,923 UART:
603,772 UART: [state] CFI Enabled
615,695 UART: [state] LifecycleState = Unprovisioned
617,717 UART: [state] DebugLocked = No
619,836 UART: [state] WD Timer not started. Device not locked for debugging
624,952 UART: [kat] SHA2-256
814,825 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,570 UART: [kat] ++
826,179 UART: [kat] sha1
837,133 UART: [kat] SHA2-256
840,147 UART: [kat] SHA2-384
844,999 UART: [kat] SHA2-512-ACC
847,586 UART: [kat] ECC-384
3,291,338 UART: [kat] HMAC-384Kdf
3,303,794 UART: [kat] LMS
3,835,637 UART: [kat] --
3,839,492 UART: [cold-reset] ++
3,840,566 UART: [fht] FHT @ 0x50003400
3,853,908 UART: [idev] ++
3,854,594 UART: [idev] CDI.KEYID = 6
3,855,535 UART: [idev] SUBJECT.KEYID = 7
3,856,721 UART: [idev] UDS.KEYID = 0
3,857,650 ready_for_fw is high
3,857,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,691 UART: [idev] Erasing UDS.KEYID = 0
6,332,362 UART: [idev] Sha1 KeyId Algorithm
6,355,254 UART: [idev] --
6,359,743 UART: [ldev] ++
6,360,425 UART: [ldev] CDI.KEYID = 6
6,361,394 UART: [ldev] SUBJECT.KEYID = 5
6,362,556 UART: [ldev] AUTHORITY.KEYID = 7
6,363,735 UART: [ldev] FE.KEYID = 1
6,375,784 UART: [ldev] Erasing FE.KEYID = 1
8,853,907 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,169 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,324 UART: [ldev] --
10,646,918 UART: [fwproc] Wait for Commands...
10,649,539 UART: [fwproc] Recv command 0x46574c44
10,651,806 UART: [fwproc] Recv'd Img size: 118548 bytes
14,142,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,742 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,086 >>> mbox cmd response: success
14,906,671 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
14,909,300 UART: [afmc] ++
14,909,998 UART: [afmc] CDI.KEYID = 6
14,911,191 UART: [afmc] SUBJECT.KEYID = 7
14,912,627 UART: [afmc] AUTHORITY.KEYID = 5
17,419,147 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,370 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,336 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,435 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,579 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,486 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,913 UART: [afmc] --
19,213,847 UART: [cold-reset] --
19,217,284 UART: [state] Locking Datavault
19,222,110 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,253 UART: [state] Locking ICCM
19,227,199 UART: [exit] Launching FMC @ 0x40000130
19,235,816 UART:
19,236,048 UART: Running Caliptra FMC ...
19,237,081 UART:
19,237,234 UART: [state] CFI Enabled
19,246,118 UART: [fht] FMC Alias Private Key: 7
21,012,435 UART: [art] Extend RT PCRs Done
21,013,651 UART: [art] Lock RT PCRs Done
21,015,200 UART: [art] Populate DV Done
21,020,507 UART: [fht] FMC Alias Private Key: 7
21,022,052 UART: [art] Derive CDI
21,022,795 UART: [art] Store in slot 0x4
21,065,445 UART: [art] Derive Key Pair
21,066,492 UART: [art] Store priv key in slot 0x5
23,493,517 UART: [art] Derive Key Pair - Done
23,506,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,518 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,015 UART: [art] PUB.X = 6B5EF91ADEE7478BC53C8EABA596AFFA97DB9645DC7A436D1399421E63260A56D7AFF50450E84952A0EE8E04780A5C93
25,221,276 UART: [art] PUB.Y = A40269663D4EE7123C5811FC3E0749F8A1A209ADFE7459BC13F81C97134E98D5ED017BDCB13856789766ECAE3C6CF38D
25,228,586 UART: [art] SIG.R = AD6F5AA0A13D11912248C2A1EA673CA591813EA70BE177A900525FE5C1A78975C9F67652404C13132C86614D4544C83F
25,235,890 UART: [art] SIG.S = D1D757F74140AF7D5674F167F7D7E9F3B7D1F3C382415D64F3C4C124775EFCD79F8653B34CE7F90B69B6E7E678E75C07
26,214,768 UART: Caliptra RT
26,215,534 UART: [state] CFI Enabled
26,347,068 UART: [rt] RT listening for mailbox commands...
26,379,521 UART: [rt]cmd =0x44504543, len=136
30,549,782 >>> mbox cmd response data (136 bytes)
30,551,671 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,582,277 UART: [rt]cmd =0x44504543, len=92
34,868,615 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,750,664 ready_for_fw is high
3,751,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,676 >>> mbox cmd response: success
15,039,429 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
19,292,035 UART:
19,292,432 UART: Running Caliptra FMC ...
19,293,582 UART:
19,293,745 UART: [state] CFI Enabled
19,301,589 UART: [fht] FMC Alias Private Key: 7
21,067,712 UART: [art] Extend RT PCRs Done
21,068,961 UART: [art] Lock RT PCRs Done
21,070,437 UART: [art] Populate DV Done
21,075,923 UART: [fht] FMC Alias Private Key: 7
21,077,418 UART: [art] Derive CDI
21,078,184 UART: [art] Store in slot 0x4
21,120,246 UART: [art] Derive Key Pair
21,121,251 UART: [art] Store priv key in slot 0x5
23,547,640 UART: [art] Derive Key Pair - Done
23,560,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,266,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,946 UART: [art] PUB.X = 8C4634DCC83B6D5C4480D55DC9945229A44D260CA21671DBFBC7FED2E683E6CA4115FE31D0626A9D0AA7F3FC1D0D560A
25,275,263 UART: [art] PUB.Y = 19ACF160EB9C1DD96257E10068D56C4525B256D6BAB96B9B644D47DAF7C443BB853ACA3340BC8673B844BBBF5CE67AC5
25,282,531 UART: [art] SIG.R = 6E494BE1E111460C448D494380190705245DEB6D04B4F7F8996D555A0171A1F78320920BA2980F916AACFE6A68FA17C9
25,289,887 UART: [art] SIG.S = CCFC6ED8B4D256EC029FD9141286A65A54B61688F2346F595E23A378348C97AA217C7A9C7A30292CB1C5A615147000AE
26,269,173 UART: Caliptra RT
26,269,880 UART: [state] CFI Enabled
26,402,732 UART: [rt] RT listening for mailbox commands...
26,435,209 UART: [rt]cmd =0x44504543, len=136
30,606,050 >>> mbox cmd response data (136 bytes)
30,607,345 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
30,637,817 UART: [rt]cmd =0x44504543, len=92
34,923,826 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,371 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,975 UART: [kat] SHA2-256
881,906 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,021 UART: [kat] ++
886,173 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
895,036 UART: [kat] SHA2-512-ACC
896,937 UART: [kat] ECC-384
902,628 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,297 UART: [cold-reset] ++
1,476,851 UART: [fht] Storing FHT @ 0x50003400
1,479,508 UART: [idev] ++
1,479,676 UART: [idev] CDI.KEYID = 6
1,480,036 UART: [idev] SUBJECT.KEYID = 7
1,480,460 UART: [idev] UDS.KEYID = 0
1,480,805 ready_for_fw is high
1,480,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,574 UART: [idev] Erasing UDS.KEYID = 0
1,505,240 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,960 UART: [idev] --
1,514,997 UART: [ldev] ++
1,515,165 UART: [ldev] CDI.KEYID = 6
1,515,528 UART: [ldev] SUBJECT.KEYID = 5
1,515,954 UART: [ldev] AUTHORITY.KEYID = 7
1,516,417 UART: [ldev] FE.KEYID = 1
1,521,455 UART: [ldev] Erasing FE.KEYID = 1
1,546,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,060 UART: [ldev] --
1,586,525 UART: [fwproc] Waiting for Commands...
1,587,260 UART: [fwproc] Received command 0x46574c44
1,588,051 UART: [fwproc] Received Image of size 118548 bytes
2,932,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,503 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,721 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,986 >>> mbox cmd response: success
3,130,986 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,132,028 UART: [afmc] ++
3,132,196 UART: [afmc] CDI.KEYID = 6
3,132,558 UART: [afmc] SUBJECT.KEYID = 7
3,132,983 UART: [afmc] AUTHORITY.KEYID = 5
3,168,278 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,226 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,935 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,818 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,501 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,361 UART: [afmc] --
3,211,287 UART: [cold-reset] --
3,211,977 UART: [state] Locking Datavault
3,213,240 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,844 UART: [state] Locking ICCM
3,214,378 UART: [exit] Launching FMC @ 0x40000130
3,219,708 UART:
3,219,724 UART: Running Caliptra FMC ...
3,220,132 UART:
3,220,186 UART: [state] CFI Enabled
3,230,352 UART: [fht] FMC Alias Private Key: 7
3,349,018 UART: [art] Extend RT PCRs Done
3,349,446 UART: [art] Lock RT PCRs Done
3,350,708 UART: [art] Populate DV Done
3,358,923 UART: [fht] FMC Alias Private Key: 7
3,359,869 UART: [art] Derive CDI
3,360,149 UART: [art] Store in slot 0x4
3,445,485 UART: [art] Derive Key Pair
3,445,845 UART: [art] Store priv key in slot 0x5
3,458,824 UART: [art] Derive Key Pair - Done
3,473,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,258 UART: [art] PUB.X = BC054246B1EC14B51818173FFD11CD55D6A19E3E92BAF9DE58A35A934512F49BF6779AD7D4AD32168281AB3C2A3AD274
3,496,035 UART: [art] PUB.Y = BC7E9D631486D6BEA8E3D0FB932532FF3CB5EE716984A5B66D5310AE4109D9E916C5DD26D07B14165F4822DBAD67B7A2
3,502,994 UART: [art] SIG.R = 618BCC432A7D13F3F5A7C8B00A5297C2F42D1F6D350D9B569222784A2A9136989B6F690F343A9B235B98F22397642CE1
3,509,751 UART: [art] SIG.S = B8762179A4A1FC37A176E697C4EF0F2CDABEE12195A9923F5B5B0FF8F559D38C9EE487C5519D9DB74DA48CCDDF906045
3,533,225 UART: Caliptra RT
3,533,476 UART: [state] CFI Enabled
3,653,172 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,738 UART: [rt]cmd =0x44504543, len=136
3,748,620 >>> mbox cmd response data (136 bytes)
3,748,621 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,442 UART: [rt]cmd =0x44504543, len=92
3,963,281 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,693 ready_for_fw is high
1,362,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,808 >>> mbox cmd response: success
2,980,808 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,042,261 UART:
3,042,277 UART: Running Caliptra FMC ...
3,042,685 UART:
3,042,739 UART: [state] CFI Enabled
3,053,155 UART: [fht] FMC Alias Private Key: 7
3,171,823 UART: [art] Extend RT PCRs Done
3,172,251 UART: [art] Lock RT PCRs Done
3,173,843 UART: [art] Populate DV Done
3,182,192 UART: [fht] FMC Alias Private Key: 7
3,183,228 UART: [art] Derive CDI
3,183,508 UART: [art] Store in slot 0x4
3,269,460 UART: [art] Derive Key Pair
3,269,820 UART: [art] Store priv key in slot 0x5
3,282,903 UART: [art] Derive Key Pair - Done
3,297,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,632 UART: [art] PUB.X = B167525E46BDA9FD9C2D561F70865D6D68679421F93DAF23CB899387522A9133EF7BC318585B6C46EF73753BC2DC39DC
3,320,406 UART: [art] PUB.Y = 5BBED1AEAE92E331E44B54BB9A8BE02C457F4DEB84D91F2D5E1278079EB9ECB38B1951B154083DDC4D2E7F711C319942
3,327,366 UART: [art] SIG.R = 1AC9D89B97939F0702C2E774D9CDEA3433EEAF02754BB451076C988B3F8911BD0969B584CFF42B5BE1CAC75F8440EF73
3,334,131 UART: [art] SIG.S = E57D1107B44B0243F542E43E50CC896FE3010C13D27111A3F90FE9D7BFD6C09E48ED2D8E2E8CBEFCE7E6B47B001E9B45
3,357,616 UART: Caliptra RT
3,357,867 UART: [state] CFI Enabled
3,479,041 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,547 UART: [rt]cmd =0x44504543, len=136
3,574,685 >>> mbox cmd response data (136 bytes)
3,574,686 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,585 UART: [rt]cmd =0x44504543, len=92
3,788,835 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,093 UART: [state] LifecycleState = Unprovisioned
85,748 UART: [state] DebugLocked = No
86,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,028 UART: [kat] SHA2-256
881,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,074 UART: [kat] ++
886,226 UART: [kat] sha1
890,390 UART: [kat] SHA2-256
892,328 UART: [kat] SHA2-384
895,029 UART: [kat] SHA2-512-ACC
896,930 UART: [kat] ECC-384
902,785 UART: [kat] HMAC-384Kdf
907,385 UART: [kat] LMS
1,475,581 UART: [kat] --
1,476,270 UART: [cold-reset] ++
1,476,652 UART: [fht] Storing FHT @ 0x50003400
1,479,495 UART: [idev] ++
1,479,663 UART: [idev] CDI.KEYID = 6
1,480,023 UART: [idev] SUBJECT.KEYID = 7
1,480,447 UART: [idev] UDS.KEYID = 0
1,480,792 ready_for_fw is high
1,480,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,419 UART: [idev] Erasing UDS.KEYID = 0
1,505,867 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,625 UART: [idev] --
1,515,816 UART: [ldev] ++
1,515,984 UART: [ldev] CDI.KEYID = 6
1,516,347 UART: [ldev] SUBJECT.KEYID = 5
1,516,773 UART: [ldev] AUTHORITY.KEYID = 7
1,517,236 UART: [ldev] FE.KEYID = 1
1,522,798 UART: [ldev] Erasing FE.KEYID = 1
1,548,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,185 UART: [ldev] --
1,587,540 UART: [fwproc] Waiting for Commands...
1,588,359 UART: [fwproc] Received command 0x46574c44
1,589,150 UART: [fwproc] Received Image of size 118548 bytes
2,933,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,450 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,668 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,923 >>> mbox cmd response: success
3,131,923 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,133,063 UART: [afmc] ++
3,133,231 UART: [afmc] CDI.KEYID = 6
3,133,593 UART: [afmc] SUBJECT.KEYID = 7
3,134,018 UART: [afmc] AUTHORITY.KEYID = 5
3,168,687 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,726 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,609 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,292 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,246 UART: [afmc] --
3,212,278 UART: [cold-reset] --
3,213,092 UART: [state] Locking Datavault
3,214,361 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,965 UART: [state] Locking ICCM
3,215,477 UART: [exit] Launching FMC @ 0x40000130
3,220,807 UART:
3,220,823 UART: Running Caliptra FMC ...
3,221,231 UART:
3,221,374 UART: [state] CFI Enabled
3,232,074 UART: [fht] FMC Alias Private Key: 7
3,351,210 UART: [art] Extend RT PCRs Done
3,351,638 UART: [art] Lock RT PCRs Done
3,353,164 UART: [art] Populate DV Done
3,361,137 UART: [fht] FMC Alias Private Key: 7
3,362,183 UART: [art] Derive CDI
3,362,463 UART: [art] Store in slot 0x4
3,448,303 UART: [art] Derive Key Pair
3,448,663 UART: [art] Store priv key in slot 0x5
3,461,786 UART: [art] Derive Key Pair - Done
3,476,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,256 UART: [art] PUB.X = B2A590223365A12052E3E08C6C9AF13C969E37FD62FABAAB45CBB27524A1E24FADC6E415E9EB75EEA21403A34E0CC92A
3,499,038 UART: [art] PUB.Y = 808D5C962EE978D4EB77113EB566093CD7FD781821DC7AC077368D55DC04023F652994924C14DE077544E1A8D568F654
3,505,970 UART: [art] SIG.R = 55D2D793CE9F9F0F27226B6E3DD24DC3D659DF4D6D708B4B0C62DC85F82AFE821AB23506B32AF90648D5D8AF592F6B2D
3,512,744 UART: [art] SIG.S = D2A0B43F190B00D7B5356EF36C6A4BC9B2A3AFBF18F9E0C0599312C4B0E26E66CDB4332108CD32E375FBB6C16669C68C
3,536,166 UART: Caliptra RT
3,536,509 UART: [state] CFI Enabled
3,656,933 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,487 UART: [rt]cmd =0x44504543, len=136
3,752,027 >>> mbox cmd response data (136 bytes)
3,752,028 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,917 UART: [rt]cmd =0x44504543, len=92
3,966,618 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,740 ready_for_fw is high
1,362,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,335 >>> mbox cmd response: success
2,980,335 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
3,042,376 UART:
3,042,392 UART: Running Caliptra FMC ...
3,042,800 UART:
3,042,943 UART: [state] CFI Enabled
3,053,859 UART: [fht] FMC Alias Private Key: 7
3,172,869 UART: [art] Extend RT PCRs Done
3,173,297 UART: [art] Lock RT PCRs Done
3,175,281 UART: [art] Populate DV Done
3,183,454 UART: [fht] FMC Alias Private Key: 7
3,184,454 UART: [art] Derive CDI
3,184,734 UART: [art] Store in slot 0x4
3,270,522 UART: [art] Derive Key Pair
3,270,882 UART: [art] Store priv key in slot 0x5
3,284,415 UART: [art] Derive Key Pair - Done
3,299,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,828 UART: [art] PUB.X = 1333EACD0A32DC59905B601C0357BF61026946C04F259DAAEFBB0A4823C3A679205CF591357835B9CB0E3EA217FC9732
3,322,587 UART: [art] PUB.Y = AB2BECCF73324B576B0BFAA8801BCC37FAF3931E941ECE0733B8501869BDB81CDC0E141D0A33E0EE5C622ABC4065CD3C
3,329,549 UART: [art] SIG.R = 1B1E372BACA7E7F5627416BC98B549C5BA2AB885C1816CE767B412E1B5C7D1F676034EFB747D63D907136D54312D910C
3,336,314 UART: [art] SIG.S = D70F0D27F6A8984BE66A080D96AB4805DC6E3794B3AA8B100B917D1C71AD86527F5E16899EFA507EE04E022DA6C0DA34
3,360,421 UART: Caliptra RT
3,360,764 UART: [state] CFI Enabled
3,480,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,258 UART: [rt]cmd =0x44504543, len=136
3,576,276 >>> mbox cmd response data (136 bytes)
3,576,277 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,268 UART: [rt]cmd =0x44504543, len=92
3,789,980 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,907 UART: [state] WD Timer not started. Device not locked for debugging
88,094 UART: [kat] SHA2-256
891,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
899,974 UART: [kat] SHA2-256
901,914 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,617 UART: [kat] HMAC-384Kdf
921,169 UART: [kat] LMS
1,169,481 UART: [kat] --
1,170,392 UART: [cold-reset] ++
1,170,904 UART: [fht] FHT @ 0x50003400
1,173,760 UART: [idev] ++
1,173,928 UART: [idev] CDI.KEYID = 6
1,174,289 UART: [idev] SUBJECT.KEYID = 7
1,174,714 UART: [idev] UDS.KEYID = 0
1,175,060 ready_for_fw is high
1,175,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,845 UART: [idev] Erasing UDS.KEYID = 0
1,199,673 UART: [idev] Sha1 KeyId Algorithm
1,208,537 UART: [idev] --
1,209,620 UART: [ldev] ++
1,209,788 UART: [ldev] CDI.KEYID = 6
1,210,152 UART: [ldev] SUBJECT.KEYID = 5
1,210,579 UART: [ldev] AUTHORITY.KEYID = 7
1,211,042 UART: [ldev] FE.KEYID = 1
1,216,020 UART: [ldev] Erasing FE.KEYID = 1
1,242,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,998 UART: [ldev] --
1,281,435 UART: [fwproc] Wait for Commands...
1,282,068 UART: [fwproc] Recv command 0x46574c44
1,282,801 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,883 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,403 >>> mbox cmd response: success
2,826,403 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,479 UART: [afmc] ++
2,827,647 UART: [afmc] CDI.KEYID = 6
2,828,010 UART: [afmc] SUBJECT.KEYID = 7
2,828,436 UART: [afmc] AUTHORITY.KEYID = 5
2,865,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,590 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,049 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,930 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,316 UART: [afmc] --
2,908,321 UART: [cold-reset] --
2,908,995 UART: [state] Locking Datavault
2,910,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,640 UART: [state] Locking ICCM
2,911,144 UART: [exit] Launching FMC @ 0x40000130
2,916,474 UART:
2,916,490 UART: Running Caliptra FMC ...
2,916,898 UART:
2,916,952 UART: [state] CFI Enabled
2,927,324 UART: [fht] FMC Alias Private Key: 7
3,045,878 UART: [art] Extend RT PCRs Done
3,046,306 UART: [art] Lock RT PCRs Done
3,047,950 UART: [art] Populate DV Done
3,056,105 UART: [fht] FMC Alias Private Key: 7
3,057,265 UART: [art] Derive CDI
3,057,545 UART: [art] Store in slot 0x4
3,143,162 UART: [art] Derive Key Pair
3,143,522 UART: [art] Store priv key in slot 0x5
3,156,196 UART: [art] Derive Key Pair - Done
3,170,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,154 UART: [art] PUB.X = 166388B89CF29A007949C50A2545D14050A771C9741C4794CEC5AD689608758932FA537B24179A461BE21A487DFD9495
3,193,884 UART: [art] PUB.Y = CBDFA093839198FFEAE40F0F3D1281D0BBFA7313F76DEEC1108C5A56A80A93B65A073F275561C6C261612228AD4461A4
3,200,830 UART: [art] SIG.R = 05C0BE8D67615C8AF3A589FEEFBF437274C9F75E4C843CA9DA4583D6EDF6542FA06A212EE4771138A055FF344A33B47E
3,207,609 UART: [art] SIG.S = 5353B9E22BEB7EAEE83E6FCFA9781A2F033A2B79B45F6CB593AA0FA2980DEDDCDB6D395413B43558CEA16164CFBDD492
3,231,324 UART: Caliptra RT
3,231,575 UART: [state] CFI Enabled
3,350,745 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,215 UART: [rt]cmd =0x44504543, len=136
3,445,345 >>> mbox cmd response data (136 bytes)
3,445,346 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,501 UART: [rt]cmd =0x44504543, len=92
3,659,923 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,060 ready_for_fw is high
1,059,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,976 >>> mbox cmd response: success
2,677,976 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,740,097 UART:
2,740,113 UART: Running Caliptra FMC ...
2,740,521 UART:
2,740,575 UART: [state] CFI Enabled
2,751,367 UART: [fht] FMC Alias Private Key: 7
2,870,603 UART: [art] Extend RT PCRs Done
2,871,031 UART: [art] Lock RT PCRs Done
2,872,475 UART: [art] Populate DV Done
2,880,824 UART: [fht] FMC Alias Private Key: 7
2,881,866 UART: [art] Derive CDI
2,882,146 UART: [art] Store in slot 0x4
2,967,999 UART: [art] Derive Key Pair
2,968,359 UART: [art] Store priv key in slot 0x5
2,981,783 UART: [art] Derive Key Pair - Done
2,996,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,472 UART: [art] PUB.X = C7309B627E560171ABBD0FF6F6D2CED4AD4E59E0BAB5079FC07BAAF8FE47C47E6BA04D28B10D664D50EAD503B657FDCF
3,019,255 UART: [art] PUB.Y = D62140D73049461AC68F2D1BFD17BFE8B641BF48F0C260BFC5CEDC56A506D297580E199DFAD01D54648AFBA9D28A6755
3,026,213 UART: [art] SIG.R = 6E566CAE954D596FBD15630CF421C05A9BE99DD895F10824BBF64E0D6C260897C8693CBE3DF1A7A6AFD21B5229BF1FAE
3,032,989 UART: [art] SIG.S = F85855D6AA4CD525FBA5813B77C1E6B039BCB1E58A744718D9FABB973B26E0DAC506CA27CADD2D38D71D98D4BFDC872C
3,057,178 UART: Caliptra RT
3,057,429 UART: [state] CFI Enabled
3,177,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,712 UART: [rt]cmd =0x44504543, len=136
3,273,062 >>> mbox cmd response data (136 bytes)
3,273,063 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,026 UART: [rt]cmd =0x44504543, len=92
3,487,582 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
87,907 UART: [kat] SHA2-256
891,457 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,561 UART: [kat] ++
895,713 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,616 UART: [kat] SHA2-512-ACC
906,517 UART: [kat] ECC-384
916,598 UART: [kat] HMAC-384Kdf
921,370 UART: [kat] LMS
1,169,682 UART: [kat] --
1,170,437 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,643 UART: [idev] ++
1,173,811 UART: [idev] CDI.KEYID = 6
1,174,172 UART: [idev] SUBJECT.KEYID = 7
1,174,597 UART: [idev] UDS.KEYID = 0
1,174,943 ready_for_fw is high
1,174,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,084 UART: [idev] Erasing UDS.KEYID = 0
1,200,112 UART: [idev] Sha1 KeyId Algorithm
1,208,858 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,451 UART: [ldev] SUBJECT.KEYID = 5
1,210,878 UART: [ldev] AUTHORITY.KEYID = 7
1,211,341 UART: [ldev] FE.KEYID = 1
1,216,753 UART: [ldev] Erasing FE.KEYID = 1
1,243,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,339 UART: [ldev] --
1,282,620 UART: [fwproc] Wait for Commands...
1,283,205 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,342 >>> mbox cmd response: success
2,826,342 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,827,478 UART: [afmc] ++
2,827,646 UART: [afmc] CDI.KEYID = 6
2,828,009 UART: [afmc] SUBJECT.KEYID = 7
2,828,435 UART: [afmc] AUTHORITY.KEYID = 5
2,864,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,572 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,282 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,163 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,864 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,635 UART: [afmc] --
2,907,592 UART: [cold-reset] --
2,908,474 UART: [state] Locking Datavault
2,909,757 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,361 UART: [state] Locking ICCM
2,910,951 UART: [exit] Launching FMC @ 0x40000130
2,916,281 UART:
2,916,297 UART: Running Caliptra FMC ...
2,916,705 UART:
2,916,848 UART: [state] CFI Enabled
2,927,344 UART: [fht] FMC Alias Private Key: 7
3,046,228 UART: [art] Extend RT PCRs Done
3,046,656 UART: [art] Lock RT PCRs Done
3,048,160 UART: [art] Populate DV Done
3,056,371 UART: [fht] FMC Alias Private Key: 7
3,057,527 UART: [art] Derive CDI
3,057,807 UART: [art] Store in slot 0x4
3,143,404 UART: [art] Derive Key Pair
3,143,764 UART: [art] Store priv key in slot 0x5
3,157,368 UART: [art] Derive Key Pair - Done
3,172,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,161 UART: [art] PUB.X = BC03D283F30916EEDE5103A27926A5FEEEC27DE5617E0F376B0AD621C74ACD214F685138BC73187D003AEB437259A40C
3,194,899 UART: [art] PUB.Y = F050A650AEFD963E4BFD0E692F3F580693EE5A8C5CF82E5AF598F7701E2679371DD4733B3D6CEF9A0A7C60EC64624D81
3,201,852 UART: [art] SIG.R = 4392A636B712EDA754D7C72DF15F195E1D746B603CC35FA47B5023CD1AF8DF1F2330C9091E98DB412AB7E70C3231A7D5
3,208,624 UART: [art] SIG.S = 9E4640D36BFF502A302B6EC4DA58A7A7957996062D10BCF4D82B2FE996881AD703D1AB8CEA22F062A629F3D54F3C95AC
3,232,082 UART: Caliptra RT
3,232,425 UART: [state] CFI Enabled
3,352,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,042 UART: [rt]cmd =0x44504543, len=136
3,448,128 >>> mbox cmd response data (136 bytes)
3,448,129 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,108 UART: [rt]cmd =0x44504543, len=92
3,662,682 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,727 ready_for_fw is high
1,059,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,393 >>> mbox cmd response: success
2,678,393 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,740,264 UART:
2,740,280 UART: Running Caliptra FMC ...
2,740,688 UART:
2,740,831 UART: [state] CFI Enabled
2,751,677 UART: [fht] FMC Alias Private Key: 7
2,871,011 UART: [art] Extend RT PCRs Done
2,871,439 UART: [art] Lock RT PCRs Done
2,872,899 UART: [art] Populate DV Done
2,881,256 UART: [fht] FMC Alias Private Key: 7
2,882,426 UART: [art] Derive CDI
2,882,706 UART: [art] Store in slot 0x4
2,968,615 UART: [art] Derive Key Pair
2,968,975 UART: [art] Store priv key in slot 0x5
2,982,841 UART: [art] Derive Key Pair - Done
2,997,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,125 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,890 UART: [art] PUB.X = DF2F269814ADEF07C359D03F032445439673E3B34791662305312D951B13BAC77A7FB40B17522C0441E2703A6D856E5F
3,020,637 UART: [art] PUB.Y = B00E0B21C605DF7CFA246276420450BBB3DE965C51201CA046A574B38E61D0DA6AB7B6C3B05F0B72CABBCC88B6DB73A5
3,027,590 UART: [art] SIG.R = 3936F6BB8A6D14F55D74B95EA661F76AABED60110FA96B047E1C813AA4AD88FC1CAFFAAF908FE0FB84CB0BF6D6291218
3,034,375 UART: [art] SIG.S = 415A100844D648BA64B8831D4BE16EFFDA69F19C74D53BA1B2AA440AA76DD4BA45DB562CA88C09125F9B803A4511B5C9
3,058,706 UART: Caliptra RT
3,059,049 UART: [state] CFI Enabled
3,178,351 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,689 UART: [rt]cmd =0x44504543, len=136
3,273,533 >>> mbox cmd response data (136 bytes)
3,273,534 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,573 UART: [rt]cmd =0x44504543, len=92
3,488,584 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,536 UART: [state] LifecycleState = Unprovisioned
86,191 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
893,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,799 UART: [kat] ++
897,951 UART: [kat] sha1
902,057 UART: [kat] SHA2-256
903,997 UART: [kat] SHA2-384
906,676 UART: [kat] SHA2-512-ACC
908,577 UART: [kat] ECC-384
918,252 UART: [kat] HMAC-384Kdf
923,038 UART: [kat] LMS
1,171,366 UART: [kat] --
1,172,313 UART: [cold-reset] ++
1,172,855 UART: [fht] FHT @ 0x50003400
1,175,506 UART: [idev] ++
1,175,674 UART: [idev] CDI.KEYID = 6
1,176,034 UART: [idev] SUBJECT.KEYID = 7
1,176,458 UART: [idev] UDS.KEYID = 0
1,176,803 ready_for_fw is high
1,176,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,276 UART: [idev] Erasing UDS.KEYID = 0
1,201,187 UART: [idev] Sha1 KeyId Algorithm
1,209,427 UART: [idev] --
1,210,341 UART: [ldev] ++
1,210,509 UART: [ldev] CDI.KEYID = 6
1,210,872 UART: [ldev] SUBJECT.KEYID = 5
1,211,298 UART: [ldev] AUTHORITY.KEYID = 7
1,211,761 UART: [ldev] FE.KEYID = 1
1,217,201 UART: [ldev] Erasing FE.KEYID = 1
1,243,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,927 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,534 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,277 UART: [ldev] --
1,282,684 UART: [fwproc] Wait for Commands...
1,283,282 UART: [fwproc] Recv command 0x46574c44
1,284,010 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,048 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,301 >>> mbox cmd response: success
2,827,301 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,828,553 UART: [afmc] ++
2,828,721 UART: [afmc] CDI.KEYID = 6
2,829,083 UART: [afmc] SUBJECT.KEYID = 7
2,829,508 UART: [afmc] AUTHORITY.KEYID = 5
2,864,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,744 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,492 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,201 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,084 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,691 UART: [afmc] --
2,907,743 UART: [cold-reset] --
2,908,487 UART: [state] Locking Datavault
2,909,662 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,266 UART: [state] Locking ICCM
2,910,818 UART: [exit] Launching FMC @ 0x40000130
2,916,148 UART:
2,916,164 UART: Running Caliptra FMC ...
2,916,572 UART:
2,916,626 UART: [state] CFI Enabled
2,927,102 UART: [fht] FMC Alias Private Key: 7
3,045,728 UART: [art] Extend RT PCRs Done
3,046,156 UART: [art] Lock RT PCRs Done
3,047,670 UART: [art] Populate DV Done
3,055,993 UART: [fht] FMC Alias Private Key: 7
3,057,117 UART: [art] Derive CDI
3,057,397 UART: [art] Store in slot 0x4
3,143,294 UART: [art] Derive Key Pair
3,143,654 UART: [art] Store priv key in slot 0x5
3,156,846 UART: [art] Derive Key Pair - Done
3,171,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,169 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,934 UART: [art] PUB.X = 6999850C278F3A7550A5435B628961F9783E59BAB0EE40743788E476ABBD56CB1756C27CDD3ED2D79695E59EE7CC6450
3,194,701 UART: [art] PUB.Y = C6E9ADAD70D29287F8C7B6E6852DF254A8996873CED8DB6FC1ACE6D0EAB4B1EEAA1127399582611C88563A1B3C675295
3,201,663 UART: [art] SIG.R = 583CED65B260D6B54AB186D3AFDF0A4956244E27DAF73B7B87E9522214636AB81D1E76E1EA488260C2AAC7419EF8B178
3,208,438 UART: [art] SIG.S = CD38F80582387B930D5BA2B373335E9A8A65966E6E1B5A94ACB0B9D7DF086C046C34B57E2B1F957837F2C9EFD1432178
3,231,912 UART: Caliptra RT
3,232,163 UART: [state] CFI Enabled
3,351,638 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,234 UART: [rt]cmd =0x44504543, len=136
3,446,816 >>> mbox cmd response data (136 bytes)
3,446,817 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,592 UART: [rt]cmd =0x44504543, len=92
3,661,480 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,279 ready_for_fw is high
1,060,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,558 >>> mbox cmd response: success
2,680,558 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,743,465 UART:
2,743,481 UART: Running Caliptra FMC ...
2,743,889 UART:
2,743,943 UART: [state] CFI Enabled
2,754,443 UART: [fht] FMC Alias Private Key: 7
2,873,213 UART: [art] Extend RT PCRs Done
2,873,641 UART: [art] Lock RT PCRs Done
2,875,427 UART: [art] Populate DV Done
2,883,742 UART: [fht] FMC Alias Private Key: 7
2,884,780 UART: [art] Derive CDI
2,885,060 UART: [art] Store in slot 0x4
2,970,335 UART: [art] Derive Key Pair
2,970,695 UART: [art] Store priv key in slot 0x5
2,983,883 UART: [art] Derive Key Pair - Done
2,998,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,562 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,327 UART: [art] PUB.X = 415F6C290C8EA9EA34D71941E1693AA5BF977EFFB9642B500DACA55590D606FC23C5267E46E8296D9F240BC40C98227D
3,022,088 UART: [art] PUB.Y = 918AAAB93A1F9D05F614784AFC91088BFFB81EB321EBE5C18585DB1E0CEFD9DAFF6D3FD1F6A2E7BD1CE9045565C81118
3,029,050 UART: [art] SIG.R = 267C16E6C2975399683A2F97DFCA7CFA25896C51F4E6900574AED6CFE9D467A93187C072BC8F9B673BD9655D768CC6AA
3,035,825 UART: [art] SIG.S = 73A3B556EB0FEAFE9875DD85F2B943BA28A3ABD7C8EA8282425B797176F7C32F5359C415E50CD53CA10B1970D32D2257
3,059,398 UART: Caliptra RT
3,059,649 UART: [state] CFI Enabled
3,178,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,037 UART: [rt]cmd =0x44504543, len=136
3,274,083 >>> mbox cmd response data (136 bytes)
3,274,084 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,995 UART: [rt]cmd =0x44504543, len=92
3,488,264 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,917 UART: [state] LifecycleState = Unprovisioned
86,572 UART: [state] DebugLocked = No
87,308 UART: [state] WD Timer not started. Device not locked for debugging
88,567 UART: [kat] SHA2-256
894,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,342 UART: [kat] ++
898,494 UART: [kat] sha1
902,622 UART: [kat] SHA2-256
904,562 UART: [kat] SHA2-384
907,283 UART: [kat] SHA2-512-ACC
909,184 UART: [kat] ECC-384
918,777 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,172,942 UART: [fht] FHT @ 0x50003400
1,175,603 UART: [idev] ++
1,175,771 UART: [idev] CDI.KEYID = 6
1,176,131 UART: [idev] SUBJECT.KEYID = 7
1,176,555 UART: [idev] UDS.KEYID = 0
1,176,900 ready_for_fw is high
1,176,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,201,994 UART: [idev] Sha1 KeyId Algorithm
1,210,350 UART: [idev] --
1,211,522 UART: [ldev] ++
1,211,690 UART: [ldev] CDI.KEYID = 6
1,212,053 UART: [ldev] SUBJECT.KEYID = 5
1,212,479 UART: [ldev] AUTHORITY.KEYID = 7
1,212,942 UART: [ldev] FE.KEYID = 1
1,218,198 UART: [ldev] Erasing FE.KEYID = 1
1,244,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,700 UART: [ldev] --
1,284,059 UART: [fwproc] Wait for Commands...
1,284,825 UART: [fwproc] Recv command 0x46574c44
1,285,553 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,077 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,478 >>> mbox cmd response: success
2,828,478 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,829,592 UART: [afmc] ++
2,829,760 UART: [afmc] CDI.KEYID = 6
2,830,122 UART: [afmc] SUBJECT.KEYID = 7
2,830,547 UART: [afmc] AUTHORITY.KEYID = 5
2,865,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,349 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,097 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,806 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,689 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,390 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,218 UART: [afmc] --
2,909,242 UART: [cold-reset] --
2,910,184 UART: [state] Locking Datavault
2,911,625 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,229 UART: [state] Locking ICCM
2,912,751 UART: [exit] Launching FMC @ 0x40000130
2,918,081 UART:
2,918,097 UART: Running Caliptra FMC ...
2,918,505 UART:
2,918,648 UART: [state] CFI Enabled
2,929,196 UART: [fht] FMC Alias Private Key: 7
3,048,082 UART: [art] Extend RT PCRs Done
3,048,510 UART: [art] Lock RT PCRs Done
3,050,276 UART: [art] Populate DV Done
3,058,583 UART: [fht] FMC Alias Private Key: 7
3,059,679 UART: [art] Derive CDI
3,059,959 UART: [art] Store in slot 0x4
3,146,154 UART: [art] Derive Key Pair
3,146,514 UART: [art] Store priv key in slot 0x5
3,159,000 UART: [art] Derive Key Pair - Done
3,173,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,747 UART: [art] PUB.X = DCCF1F5DF40A717004B6B936951E525E1025EA9C474C55467B430D1B2D860741CA2114ABD5E98CC60526A970E4B39E7B
3,196,506 UART: [art] PUB.Y = 2BD11BD4AB754271B9D140407493BC20C1401FD4121094096A79CBE541AE997695F7433B47368DBEAE2845009B5842A6
3,203,425 UART: [art] SIG.R = 7A12EE8FAD041CED0A043964D4F4D2DA084AA099EBD8058F9E4B680D77266056C3DECE7536D3A1466FD361A72BFBFA82
3,210,193 UART: [art] SIG.S = 4A361603735A8803373CFFB0929A39862C15D831D0D8902BF816870D4D536B222DA324D9E03C79A118233A3DC9963369
3,233,874 UART: Caliptra RT
3,234,217 UART: [state] CFI Enabled
3,353,375 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,621 UART: [rt]cmd =0x44504543, len=136
3,448,355 >>> mbox cmd response data (136 bytes)
3,448,356 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,229 UART: [rt]cmd =0x44504543, len=92
3,663,803 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,462 ready_for_fw is high
1,060,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,199 >>> mbox cmd response: success
2,679,199 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
2,741,302 UART:
2,741,318 UART: Running Caliptra FMC ...
2,741,726 UART:
2,741,869 UART: [state] CFI Enabled
2,752,739 UART: [fht] FMC Alias Private Key: 7
2,871,843 UART: [art] Extend RT PCRs Done
2,872,271 UART: [art] Lock RT PCRs Done
2,873,971 UART: [art] Populate DV Done
2,882,252 UART: [fht] FMC Alias Private Key: 7
2,883,410 UART: [art] Derive CDI
2,883,690 UART: [art] Store in slot 0x4
2,969,221 UART: [art] Derive Key Pair
2,969,581 UART: [art] Store priv key in slot 0x5
2,982,511 UART: [art] Derive Key Pair - Done
2,996,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,141 UART: [art] PUB.X = 47621408098E0A4909B436A7FAEA0DB8541BDFBA9180629A2E0C66E7D8C41D57B079A311CFAE89DC8D51D7B74175A37B
3,019,901 UART: [art] PUB.Y = 25A516AD8D5B3DD3458D3384CEC405C630899964310A4DDD55346567BE4E196BEBF65442C0031D94DE0AED9A945B95C0
3,026,843 UART: [art] SIG.R = C9487DB7C93A3C490951C6D71060283BE0B57962BE00446F411D5889B6C97AE49E233CE33C6B9BBF9199437784748D57
3,033,582 UART: [art] SIG.S = 799FCC60765F7A8B0D7B453B0F2B42F019777B0D67B857DDF5E7F3E29663F76C2CF36CB33F2AFA13AB03FBB867D75AAA
3,057,254 UART: Caliptra RT
3,057,597 UART: [state] CFI Enabled
3,177,436 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,626 UART: [rt]cmd =0x44504543, len=136
3,272,990 >>> mbox cmd response data (136 bytes)
3,272,991 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,136 UART: [rt]cmd =0x44504543, len=92
3,487,547 >>> mbox cmd response data (6284 bytes)
test test_invoke_dpe::test_invoke_dpe_sign_and_certify_key_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_invoke_dpe::test_invoke_dpe_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,046 UART:
192,416 UART: Running Caliptra ROM ...
193,535 UART:
193,681 UART: [state] CFI Enabled
261,903 UART: [state] LifecycleState = Unprovisioned
263,825 UART: [state] DebugLocked = No
265,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,876 UART: [kat] SHA2-256
440,603 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,067 UART: [kat] ++
451,610 UART: [kat] sha1
462,450 UART: [kat] SHA2-256
465,107 UART: [kat] SHA2-384
471,607 UART: [kat] SHA2-512-ACC
473,980 UART: [kat] ECC-384
2,765,853 UART: [kat] HMAC-384Kdf
2,797,596 UART: [kat] LMS
3,987,889 UART: [kat] --
3,989,634 UART: [cold-reset] ++
3,990,505 UART: [fht] Storing FHT @ 0x50003400
4,001,841 UART: [idev] ++
4,002,413 UART: [idev] CDI.KEYID = 6
4,003,347 UART: [idev] SUBJECT.KEYID = 7
4,004,601 UART: [idev] UDS.KEYID = 0
4,005,684 ready_for_fw is high
4,005,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,155,097 UART: [idev] Erasing UDS.KEYID = 0
7,342,489 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,034 UART: [idev] --
7,368,038 UART: [ldev] ++
7,368,611 UART: [ldev] CDI.KEYID = 6
7,369,582 UART: [ldev] SUBJECT.KEYID = 5
7,370,802 UART: [ldev] AUTHORITY.KEYID = 7
7,372,034 UART: [ldev] FE.KEYID = 1
7,400,205 UART: [ldev] Erasing FE.KEYID = 1
10,735,251 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,615 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,087,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,529 UART: [ldev] --
13,111,021 UART: [fwproc] Waiting for Commands...
13,114,308 UART: [fwproc] Received command 0x46574c44
13,116,491 UART: [fwproc] Received Image of size 118548 bytes
17,217,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,686 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,700,781 >>> mbox cmd response: success
17,705,379 UART: [afmc] ++
17,705,992 UART: [afmc] CDI.KEYID = 6
17,706,924 UART: [afmc] SUBJECT.KEYID = 7
17,708,147 UART: [afmc] AUTHORITY.KEYID = 5
21,070,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,238 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,696 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,097 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,156 UART: [afmc] --
23,440,977 UART: [cold-reset] --
23,444,030 UART: [state] Locking Datavault
23,447,985 UART: [state] Locking PCR0, PCR1 and PCR31
23,449,740 UART: [state] Locking ICCM
23,452,384 UART: [exit] Launching FMC @ 0x40000130
23,460,774 UART:
23,461,010 UART: Running Caliptra FMC ...
23,462,135 UART:
23,462,304 UART: [state] CFI Enabled
23,527,587 UART: [fht] FMC Alias Private Key: 7
25,867,690 UART: [art] Extend RT PCRs Done
25,868,912 UART: [art] Lock RT PCRs Done
25,870,541 UART: [art] Populate DV Done
25,876,011 UART: [fht] FMC Alias Private Key: 7
25,877,502 UART: [art] Derive CDI
25,878,264 UART: [art] Store in slot 0x4
25,935,898 UART: [art] Derive Key Pair
25,936,942 UART: [art] Store priv key in slot 0x5
29,229,475 UART: [art] Derive Key Pair - Done
29,242,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,895 UART: [art] Erasing AUTHORITY.KEYID = 7
31,532,409 UART: [art] PUB.X = 12F86A750C08DE75261B66D7B0E8696F94ED3910A096DE9C7B01BA7C81CC32F0195679D252F94FF38C6427FE9EEC4C9D
31,539,707 UART: [art] PUB.Y = F3A0740BDCBDC9838DB63328413CB9EBF41623391D68B2152912A5807C2C4D9B19F614125F0241C0AB30D64BFEA469A9
31,546,952 UART: [art] SIG.R = 57BB6B6B82589D4B496F309C96C9F06B967F57B91A389DD2E1DC72D826F6C929B8D934FF534352D84BAEAE3AD8B89547
31,554,337 UART: [art] SIG.S = 790A0347F63A4F35F02FAB89DFA79C42520103565678360F530C1D57112EAE01EAE13B7E5923BC64E185F384D71FA220
32,859,174 UART: Caliptra RT
32,859,887 UART: [state] CFI Enabled
33,034,872 UART: [rt] RT listening for mailbox commands...
33,038,862 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,083,523 UART: [rt]cmd =0x4c4d5356, len=1672
34,295,357 >>> mbox cmd response data (8 bytes)
34,298,029 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,342,484 UART: [rt]cmd =0x4c4d5356, len=1672
35,113,144 >>> mbox cmd response data (8 bytes)
35,146,700 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,191,550 UART: [rt]cmd =0x4c4d5356, len=1672
35,936,286 >>> mbox cmd response data (8 bytes)
35,938,823 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,983,011 UART: [rt]cmd =0x4c4d5356, len=1672
36,753,766 >>> mbox cmd response data (8 bytes)
36,755,029 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,799,461 UART: [rt]cmd =0x4c4d5356, len=1672
37,647,767 >>> mbox cmd response data (8 bytes)
37,649,041 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,693,398 UART: [rt]cmd =0x4c4d5356, len=1672
38,438,152 >>> mbox cmd response data (8 bytes)
38,439,438 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,484,088 UART: [rt]cmd =0x4c4d5356, len=1672
39,280,983 >>> mbox cmd response data (8 bytes)
39,282,244 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,326,667 UART: [rt]cmd =0x4c4d5356, len=1672
40,149,133 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,788,862 ready_for_fw is high
3,789,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,866 >>> mbox cmd response: success
23,655,538 UART:
23,655,940 UART: Running Caliptra FMC ...
23,657,134 UART:
23,657,297 UART: [state] CFI Enabled
23,724,422 UART: [fht] FMC Alias Private Key: 7
26,064,350 UART: [art] Extend RT PCRs Done
26,065,601 UART: [art] Lock RT PCRs Done
26,067,157 UART: [art] Populate DV Done
26,072,309 UART: [fht] FMC Alias Private Key: 7
26,073,853 UART: [art] Derive CDI
26,074,669 UART: [art] Store in slot 0x4
26,132,786 UART: [art] Derive Key Pair
26,133,824 UART: [art] Store priv key in slot 0x5
29,426,604 UART: [art] Derive Key Pair - Done
29,439,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,730,255 UART: [art] PUB.X = F4087193D1B5D22C8F44F2253CFEA8B8B8A131F454BB4C96F18043E3323B7D41F8138D290746DE7A63E32E42A9D57905
31,737,524 UART: [art] PUB.Y = EC2B669160FBE7A3A2D9BA839D2BB3F6BEF54A3FAD219B23E39B42EC27E04DB1B78C6CC4DD20223600B556E7F45A0CED
31,744,779 UART: [art] SIG.R = D6017FD623084EEF4B8C53257FFA16ECD45CBFCA2FA761A0F1FF87E1BEE957791862EF95C145ED1C62DABCEE6A4C5AA5
31,752,224 UART: [art] SIG.S = F09CD06D9CB92AD905C2303E9DE3011274B1A95B218F8DEDD7367FFB9E8856D0D8A50C88B9D4FAEAB6623B48B51AC79E
33,057,562 UART: Caliptra RT
33,058,279 UART: [state] CFI Enabled
33,233,983 UART: [rt] RT listening for mailbox commands...
33,238,098 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,282,595 UART: [rt]cmd =0x4c4d5356, len=1672
34,494,779 >>> mbox cmd response data (8 bytes)
34,497,237 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,541,732 UART: [rt]cmd =0x4c4d5356, len=1672
35,312,390 >>> mbox cmd response data (8 bytes)
35,346,411 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,391,351 UART: [rt]cmd =0x4c4d5356, len=1672
36,136,249 >>> mbox cmd response data (8 bytes)
36,138,802 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,182,973 UART: [rt]cmd =0x4c4d5356, len=1672
36,953,674 >>> mbox cmd response data (8 bytes)
36,954,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,999,410 UART: [rt]cmd =0x4c4d5356, len=1672
37,847,739 >>> mbox cmd response data (8 bytes)
37,849,049 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,893,276 UART: [rt]cmd =0x4c4d5356, len=1672
38,638,268 >>> mbox cmd response data (8 bytes)
38,639,555 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,684,038 UART: [rt]cmd =0x4c4d5356, len=1672
39,480,745 >>> mbox cmd response data (8 bytes)
39,482,026 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,526,514 UART: [rt]cmd =0x4c4d5356, len=1672
40,348,984 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,498 UART:
192,864 UART: Running Caliptra ROM ...
193,966 UART:
603,764 UART: [state] CFI Enabled
616,450 UART: [state] LifecycleState = Unprovisioned
618,399 UART: [state] DebugLocked = No
620,706 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,849 UART: [kat] SHA2-256
795,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,168 UART: [kat] ++
806,613 UART: [kat] sha1
817,951 UART: [kat] SHA2-256
820,676 UART: [kat] SHA2-384
826,662 UART: [kat] SHA2-512-ACC
829,020 UART: [kat] ECC-384
3,114,731 UART: [kat] HMAC-384Kdf
3,127,269 UART: [kat] LMS
4,317,389 UART: [kat] --
4,321,742 UART: [cold-reset] ++
4,323,523 UART: [fht] Storing FHT @ 0x50003400
4,335,703 UART: [idev] ++
4,336,257 UART: [idev] CDI.KEYID = 6
4,337,201 UART: [idev] SUBJECT.KEYID = 7
4,338,439 UART: [idev] UDS.KEYID = 0
4,339,395 ready_for_fw is high
4,339,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,437 UART: [idev] Erasing UDS.KEYID = 0
7,625,084 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,003 UART: [idev] --
7,652,782 UART: [ldev] ++
7,653,355 UART: [ldev] CDI.KEYID = 6
7,654,333 UART: [ldev] SUBJECT.KEYID = 5
7,655,542 UART: [ldev] AUTHORITY.KEYID = 7
7,656,763 UART: [ldev] FE.KEYID = 1
7,667,616 UART: [ldev] Erasing FE.KEYID = 1
10,956,560 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,412 UART: [ldev] --
13,317,488 UART: [fwproc] Waiting for Commands...
13,319,838 UART: [fwproc] Received command 0x46574c44
13,322,020 UART: [fwproc] Received Image of size 118548 bytes
17,430,231 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,044 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,229 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,910,083 >>> mbox cmd response: success
17,913,741 UART: [afmc] ++
17,914,356 UART: [afmc] CDI.KEYID = 6
17,915,265 UART: [afmc] SUBJECT.KEYID = 7
17,916,474 UART: [afmc] AUTHORITY.KEYID = 5
21,229,714 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,971 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,690 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,126 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,152 UART: [afmc] --
23,594,735 UART: [cold-reset] --
23,597,614 UART: [state] Locking Datavault
23,602,312 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,004 UART: [state] Locking ICCM
23,606,257 UART: [exit] Launching FMC @ 0x40000130
23,614,653 UART:
23,614,888 UART: Running Caliptra FMC ...
23,615,914 UART:
23,616,054 UART: [state] CFI Enabled
23,624,317 UART: [fht] FMC Alias Private Key: 7
25,964,851 UART: [art] Extend RT PCRs Done
25,966,070 UART: [art] Lock RT PCRs Done
25,967,345 UART: [art] Populate DV Done
25,972,808 UART: [fht] FMC Alias Private Key: 7
25,974,449 UART: [art] Derive CDI
25,975,182 UART: [art] Store in slot 0x4
26,017,985 UART: [art] Derive Key Pair
26,018,983 UART: [art] Store priv key in slot 0x5
29,260,362 UART: [art] Derive Key Pair - Done
29,273,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,168 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,674 UART: [art] PUB.X = 88691AB871EBD64F065221374940F8AB8E44178B9DBE2779E091ECE0DE76EC5F1487206856EF63EF04C0E34128B3F13E
31,562,942 UART: [art] PUB.Y = 19B078AB0EFCEAEBFE37A3CF577DA37E5F33B3A50D576DC9CC6315725259DE9092E8705F20466D970A71C3CB1E557AD5
31,570,229 UART: [art] SIG.R = 1D722064F2A62A14362A10DADC308AFDA6C0AB23DC12277FC12C9206AF87798DBABB207D7F9A4EBD0BB017598294E81C
31,577,615 UART: [art] SIG.S = C6EB5EB6A6DA21547CAD8786CCDDD2690883342C6319207946F9D308958DD1EA257240C1E3DF89FACCD7D5494496D5B5
32,882,420 UART: Caliptra RT
32,883,135 UART: [state] CFI Enabled
33,017,322 UART: [rt] RT listening for mailbox commands...
33,021,250 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,065,963 UART: [rt]cmd =0x4c4d5356, len=1672
34,277,621 >>> mbox cmd response data (8 bytes)
34,280,119 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,324,338 UART: [rt]cmd =0x4c4d5356, len=1672
35,094,867 >>> mbox cmd response data (8 bytes)
35,127,748 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,172,390 UART: [rt]cmd =0x4c4d5356, len=1672
35,916,987 >>> mbox cmd response data (8 bytes)
35,919,446 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,963,936 UART: [rt]cmd =0x4c4d5356, len=1672
36,734,577 >>> mbox cmd response data (8 bytes)
36,735,865 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,780,294 UART: [rt]cmd =0x4c4d5356, len=1672
37,628,940 >>> mbox cmd response data (8 bytes)
37,630,253 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,674,475 UART: [rt]cmd =0x4c4d5356, len=1672
38,419,227 >>> mbox cmd response data (8 bytes)
38,420,508 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,464,826 UART: [rt]cmd =0x4c4d5356, len=1672
39,261,314 >>> mbox cmd response data (8 bytes)
39,262,564 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,306,923 UART: [rt]cmd =0x4c4d5356, len=1672
40,129,418 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,404 writing to cptra_bootfsm_go
4,131,542 ready_for_fw is high
4,132,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,175,898 >>> mbox cmd response: success
23,815,580 UART:
23,816,005 UART: Running Caliptra FMC ...
23,817,140 UART:
23,817,290 UART: [state] CFI Enabled
23,825,134 UART: [fht] FMC Alias Private Key: 7
26,165,139 UART: [art] Extend RT PCRs Done
26,166,367 UART: [art] Lock RT PCRs Done
26,168,236 UART: [art] Populate DV Done
26,173,597 UART: [fht] FMC Alias Private Key: 7
26,175,253 UART: [art] Derive CDI
26,176,065 UART: [art] Store in slot 0x4
26,218,771 UART: [art] Derive Key Pair
26,219,785 UART: [art] Store priv key in slot 0x5
29,461,995 UART: [art] Derive Key Pair - Done
29,474,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,979 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,482 UART: [art] PUB.X = 70784E076D3493489E33067291B3ADA62EBC7AE00794F98F5FB7B7DCEDFEA481663EBE3F36892E66872D9194078D11B5
31,763,752 UART: [art] PUB.Y = 4B368BD938D55C644AAF394B521DEB9E346DE9DFA870018962F108D1F4C20A7283F21A9F6A947DB9BC94B8627AFB2732
31,771,016 UART: [art] SIG.R = 293436D9178F23CA2F2A450C1FDA99D8BCAA577094A42BFC5BC99CDFA5C14621F1E07033F29731B3570622933D6DE940
31,778,367 UART: [art] SIG.S = 0258EC43529D567D49A182BF7FE35F981411CA106981E73292C3062E2FF8C199D097C85E381CCB578B05348D12DFAEC6
33,083,933 UART: Caliptra RT
33,084,660 UART: [state] CFI Enabled
33,218,051 UART: [rt] RT listening for mailbox commands...
33,222,000 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,266,507 UART: [rt]cmd =0x4c4d5356, len=1672
34,478,447 >>> mbox cmd response data (8 bytes)
34,480,903 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
34,525,101 UART: [rt]cmd =0x4c4d5356, len=1672
35,295,540 >>> mbox cmd response data (8 bytes)
35,328,484 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
35,373,351 UART: [rt]cmd =0x4c4d5356, len=1672
36,118,254 >>> mbox cmd response data (8 bytes)
36,120,726 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,164,955 UART: [rt]cmd =0x4c4d5356, len=1672
36,935,658 >>> mbox cmd response data (8 bytes)
36,936,927 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
36,981,273 UART: [rt]cmd =0x4c4d5356, len=1672
37,829,514 >>> mbox cmd response data (8 bytes)
37,830,817 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
37,875,101 UART: [rt]cmd =0x4c4d5356, len=1672
38,620,009 >>> mbox cmd response data (8 bytes)
38,621,282 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
38,665,723 UART: [rt]cmd =0x4c4d5356, len=1672
39,462,519 >>> mbox cmd response data (8 bytes)
39,463,825 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
39,508,078 UART: [rt]cmd =0x4c4d5356, len=1672
40,330,617 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,132 UART:
192,488 UART: Running Caliptra ROM ...
193,676 UART:
193,827 UART: [state] CFI Enabled
266,341 UART: [state] LifecycleState = Unprovisioned
268,336 UART: [state] DebugLocked = No
269,588 UART: [state] WD Timer not started. Device not locked for debugging
273,268 UART: [kat] SHA2-256
452,910 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,661 UART: [kat] ++
464,108 UART: [kat] sha1
475,974 UART: [kat] SHA2-256
478,790 UART: [kat] SHA2-384
484,329 UART: [kat] SHA2-512-ACC
486,702 UART: [kat] ECC-384
2,946,025 UART: [kat] HMAC-384Kdf
2,972,326 UART: [kat] LMS
3,448,855 UART: [kat] --
3,454,434 UART: [cold-reset] ++
3,455,804 UART: [fht] FHT @ 0x50003400
3,467,063 UART: [idev] ++
3,467,626 UART: [idev] CDI.KEYID = 6
3,468,654 UART: [idev] SUBJECT.KEYID = 7
3,469,821 UART: [idev] UDS.KEYID = 0
3,470,744 ready_for_fw is high
3,470,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,085 UART: [idev] Erasing UDS.KEYID = 0
5,986,841 UART: [idev] Sha1 KeyId Algorithm
6,010,814 UART: [idev] --
6,015,433 UART: [ldev] ++
6,016,019 UART: [ldev] CDI.KEYID = 6
6,016,933 UART: [ldev] SUBJECT.KEYID = 5
6,018,114 UART: [ldev] AUTHORITY.KEYID = 7
6,019,346 UART: [ldev] FE.KEYID = 1
6,056,831 UART: [ldev] Erasing FE.KEYID = 1
8,567,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,754 UART: [ldev] --
10,372,550 UART: [fwproc] Wait for Commands...
10,374,100 UART: [fwproc] Recv command 0x46574c44
10,376,146 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,625 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,201 >>> mbox cmd response: success
14,345,930 UART: [afmc] ++
14,346,547 UART: [afmc] CDI.KEYID = 6
14,347,439 UART: [afmc] SUBJECT.KEYID = 7
14,348,705 UART: [afmc] AUTHORITY.KEYID = 5
16,896,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,343 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,892 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,631 UART: [afmc] --
18,720,029 UART: [cold-reset] --
18,724,795 UART: [state] Locking Datavault
18,730,314 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,062 UART: [state] Locking ICCM
18,733,373 UART: [exit] Launching FMC @ 0x40000130
18,741,780 UART:
18,742,013 UART: Running Caliptra FMC ...
18,743,036 UART:
18,743,184 UART: [state] CFI Enabled
18,795,650 UART: [fht] FMC Alias Private Key: 7
20,562,400 UART: [art] Extend RT PCRs Done
20,563,630 UART: [art] Lock RT PCRs Done
20,565,275 UART: [art] Populate DV Done
20,570,792 UART: [fht] FMC Alias Private Key: 7
20,572,429 UART: [art] Derive CDI
20,573,159 UART: [art] Store in slot 0x4
20,629,162 UART: [art] Derive Key Pair
20,630,156 UART: [art] Store priv key in slot 0x5
23,093,026 UART: [art] Derive Key Pair - Done
23,106,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,830 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,350 UART: [art] PUB.X = 7210102B1C27A910D58F53F3346BFD3E47440E3FE83D1C773FBB625CE7129A88090B8695F617740B3CD4C167BC2A9FA3
24,826,606 UART: [art] PUB.Y = 8C2095C77729F5C208D3ADAA93C07F735F3C150FB7C3230E0DB7A7DB12B64D73F329830568B9943CC49834908026D404
24,833,841 UART: [art] SIG.R = D360119E56FE12AD3BD5B886E9EE22788D6FCD5B238B17B6A8A69CD05CD0DE3656116A0F8893A042EB2F2DC7D4A87D1D
24,841,230 UART: [art] SIG.S = 4FEA17BC36EA38188EE93EE07373EF0719A523FBF86D879F4896F4212F44562A05A8EF47EEBEC2660AA714010AAA759D
25,820,080 UART: Caliptra RT
25,820,786 UART: [state] CFI Enabled
25,999,849 UART: [rt] RT listening for mailbox commands...
26,003,789 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,048,369 UART: [rt]cmd =0x4c4d5356, len=1672
26,486,099 >>> mbox cmd response data (8 bytes)
26,488,610 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,533,057 UART: [rt]cmd =0x4c4d5356, len=1672
26,764,768 >>> mbox cmd response data (8 bytes)
26,767,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,811,637 UART: [rt]cmd =0x4c4d5356, len=1672
27,041,690 >>> mbox cmd response data (8 bytes)
27,044,094 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,088,519 UART: [rt]cmd =0x4c4d5356, len=1672
27,316,393 >>> mbox cmd response data (8 bytes)
27,317,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,362,276 UART: [rt]cmd =0x4c4d5356, len=1672
27,593,357 >>> mbox cmd response data (8 bytes)
27,594,603 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,639,075 UART: [rt]cmd =0x4c4d5356, len=1672
27,867,676 >>> mbox cmd response data (8 bytes)
27,868,937 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,913,298 UART: [rt]cmd =0x4c4d5356, len=1672
28,142,275 >>> mbox cmd response data (8 bytes)
28,143,546 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,187,775 UART: [rt]cmd =0x4c4d5356, len=1672
28,419,543 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,460,414 ready_for_fw is high
3,460,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,820 >>> mbox cmd response: success
18,512,066 UART:
18,512,478 UART: Running Caliptra FMC ...
18,513,591 UART:
18,513,744 UART: [state] CFI Enabled
18,580,512 UART: [fht] FMC Alias Private Key: 7
20,346,775 UART: [art] Extend RT PCRs Done
20,348,014 UART: [art] Lock RT PCRs Done
20,349,802 UART: [art] Populate DV Done
20,355,278 UART: [fht] FMC Alias Private Key: 7
20,356,878 UART: [art] Derive CDI
20,357,617 UART: [art] Store in slot 0x4
20,413,359 UART: [art] Derive Key Pair
20,414,394 UART: [art] Store priv key in slot 0x5
22,877,583 UART: [art] Derive Key Pair - Done
22,890,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,801 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,309 UART: [art] PUB.X = 118CE856E2D5D9868F69B8906D3CF49CEC869A4CE64D28A577616F02EC0DCEF66EA925B8C66F91434D68DD6A6D852782
24,612,562 UART: [art] PUB.Y = 757FA1E1EAC47DBCF06DD06CDA2EC35C48914E514E001D004975BBAAA1861409C3F5858BC088DFB4FB1B9327FE8F834A
24,619,849 UART: [art] SIG.R = 1F59F52B86265FFC66AD6EC1E1AD49F1C9CCA736F993DF0A9625531B0E49B429D9FF6A6320B098407106B74F7C83828A
24,627,290 UART: [art] SIG.S = 4F88485BBB07FA391CE961097780882D24BB13E04E3ED8654F4A8D01B8F240FD69D80CEB5DA1D179FE84176BC5C857E2
25,605,532 UART: Caliptra RT
25,606,245 UART: [state] CFI Enabled
25,787,745 UART: [rt] RT listening for mailbox commands...
25,791,733 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,836,372 UART: [rt]cmd =0x4c4d5356, len=1672
26,274,137 >>> mbox cmd response data (8 bytes)
26,276,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,320,674 UART: [rt]cmd =0x4c4d5356, len=1672
26,551,922 >>> mbox cmd response data (8 bytes)
26,554,360 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,598,474 UART: [rt]cmd =0x4c4d5356, len=1672
26,829,058 >>> mbox cmd response data (8 bytes)
26,831,460 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,875,779 UART: [rt]cmd =0x4c4d5356, len=1672
27,103,714 >>> mbox cmd response data (8 bytes)
27,104,976 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,149,130 UART: [rt]cmd =0x4c4d5356, len=1672
27,380,168 >>> mbox cmd response data (8 bytes)
27,381,447 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,426,028 UART: [rt]cmd =0x4c4d5356, len=1672
27,654,509 >>> mbox cmd response data (8 bytes)
27,655,765 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,699,980 UART: [rt]cmd =0x4c4d5356, len=1672
27,928,891 >>> mbox cmd response data (8 bytes)
27,930,154 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,974,481 UART: [rt]cmd =0x4c4d5356, len=1672
28,206,144 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,485 UART:
192,852 UART: Running Caliptra ROM ...
193,981 UART:
603,578 UART: [state] CFI Enabled
615,787 UART: [state] LifecycleState = Unprovisioned
617,753 UART: [state] DebugLocked = No
620,634 UART: [state] WD Timer not started. Device not locked for debugging
624,529 UART: [kat] SHA2-256
804,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,943 UART: [kat] ++
815,542 UART: [kat] sha1
826,994 UART: [kat] SHA2-256
829,741 UART: [kat] SHA2-384
836,837 UART: [kat] SHA2-512-ACC
839,216 UART: [kat] ECC-384
3,282,419 UART: [kat] HMAC-384Kdf
3,294,596 UART: [kat] LMS
3,771,127 UART: [kat] --
3,776,915 UART: [cold-reset] ++
3,778,561 UART: [fht] FHT @ 0x50003400
3,789,507 UART: [idev] ++
3,790,113 UART: [idev] CDI.KEYID = 6
3,791,034 UART: [idev] SUBJECT.KEYID = 7
3,792,287 UART: [idev] UDS.KEYID = 0
3,793,214 ready_for_fw is high
3,793,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,204 UART: [idev] Erasing UDS.KEYID = 0
6,266,034 UART: [idev] Sha1 KeyId Algorithm
6,289,628 UART: [idev] --
6,294,571 UART: [ldev] ++
6,295,151 UART: [ldev] CDI.KEYID = 6
6,296,082 UART: [ldev] SUBJECT.KEYID = 5
6,297,306 UART: [ldev] AUTHORITY.KEYID = 7
6,298,542 UART: [ldev] FE.KEYID = 1
6,312,106 UART: [ldev] Erasing FE.KEYID = 1
8,792,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,005 UART: [ldev] --
10,588,708 UART: [fwproc] Wait for Commands...
10,591,272 UART: [fwproc] Recv command 0x46574c44
10,593,318 UART: [fwproc] Recv'd Img size: 118548 bytes
14,089,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,165,324 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,238,355 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,566,237 >>> mbox cmd response: success
14,569,736 UART: [afmc] ++
14,570,349 UART: [afmc] CDI.KEYID = 6
14,571,266 UART: [afmc] SUBJECT.KEYID = 7
14,572,485 UART: [afmc] AUTHORITY.KEYID = 5
17,071,481 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,794 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,427 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,083 UART: [afmc] --
18,875,385 UART: [cold-reset] --
18,881,733 UART: [state] Locking Datavault
18,886,721 UART: [state] Locking PCR0, PCR1 and PCR31
18,888,426 UART: [state] Locking ICCM
18,889,657 UART: [exit] Launching FMC @ 0x40000130
18,898,059 UART:
18,898,300 UART: Running Caliptra FMC ...
18,899,405 UART:
18,899,566 UART: [state] CFI Enabled
18,907,562 UART: [fht] FMC Alias Private Key: 7
20,674,560 UART: [art] Extend RT PCRs Done
20,675,769 UART: [art] Lock RT PCRs Done
20,677,393 UART: [art] Populate DV Done
20,683,243 UART: [fht] FMC Alias Private Key: 7
20,684,727 UART: [art] Derive CDI
20,685,465 UART: [art] Store in slot 0x4
20,727,853 UART: [art] Derive Key Pair
20,728,859 UART: [art] Store priv key in slot 0x5
23,156,301 UART: [art] Derive Key Pair - Done
23,169,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,127 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,631 UART: [art] PUB.X = 6E837C002B1AD3C41259719E6421003643B28CD4DE1AAC0AA73635173805DA86795F0BB3113F4174AC6626E620445C3B
24,883,828 UART: [art] PUB.Y = 7BEA13AE3F3ABB710DC265A461DC1595D22D0C2460463F280F56F4822EC4B51A47CF6EECDC85A5A3BE7F050004509BD0
24,891,117 UART: [art] SIG.R = 192C3AC94911074206D04DF03FDEB88FD48C36C0410A3FB962092CA0C6238AC71E468F6AEFE8E2ED04C945D4FDFBF650
24,898,510 UART: [art] SIG.S = F89429ACF02776B4640927258D73928FC90602A0512A7E9AB7618BEF5E6CCB93A3893A134925D6F1B5E8A443E567A7BC
25,877,590 UART: Caliptra RT
25,878,279 UART: [state] CFI Enabled
26,011,646 UART: [rt] RT listening for mailbox commands...
26,015,545 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,059,796 UART: [rt]cmd =0x4c4d5356, len=1672
26,497,551 >>> mbox cmd response data (8 bytes)
26,500,028 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,544,110 UART: [rt]cmd =0x4c4d5356, len=1672
26,775,296 >>> mbox cmd response data (8 bytes)
26,808,322 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,852,988 UART: [rt]cmd =0x4c4d5356, len=1672
27,083,203 >>> mbox cmd response data (8 bytes)
27,085,677 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,130,005 UART: [rt]cmd =0x4c4d5356, len=1672
27,357,618 >>> mbox cmd response data (8 bytes)
27,358,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,403,374 UART: [rt]cmd =0x4c4d5356, len=1672
27,634,510 >>> mbox cmd response data (8 bytes)
27,635,773 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,680,147 UART: [rt]cmd =0x4c4d5356, len=1672
27,908,788 >>> mbox cmd response data (8 bytes)
27,910,039 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,954,409 UART: [rt]cmd =0x4c4d5356, len=1672
28,183,298 >>> mbox cmd response data (8 bytes)
28,184,548 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,228,815 UART: [rt]cmd =0x4c4d5356, len=1672
28,460,273 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
3,780,009 ready_for_fw is high
3,780,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,276 >>> mbox cmd response: success
18,692,773 UART:
18,693,150 UART: Running Caliptra FMC ...
18,694,353 UART:
18,694,527 UART: [state] CFI Enabled
18,702,319 UART: [fht] FMC Alias Private Key: 7
20,468,907 UART: [art] Extend RT PCRs Done
20,470,109 UART: [art] Lock RT PCRs Done
20,471,789 UART: [art] Populate DV Done
20,477,111 UART: [fht] FMC Alias Private Key: 7
20,478,773 UART: [art] Derive CDI
20,479,595 UART: [art] Store in slot 0x4
20,521,925 UART: [art] Derive Key Pair
20,522,950 UART: [art] Store priv key in slot 0x5
22,950,124 UART: [art] Derive Key Pair - Done
22,963,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,879 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,358 UART: [art] PUB.X = B4105750914B87445B4761E3C52E866E2552C2D58F54C3AAFD89348030B5C0E7F694ED2835EAC194187534C7E7A77F01
24,677,621 UART: [art] PUB.Y = 8F18AD490F73D6AF09A2BC1BFC06D2ABAAB73101221D3934BEB99281E919BC2FA752F1214800BA3B7DC1DE9FC9C623C2
24,684,836 UART: [art] SIG.R = 68CE4AB58068A5800CF2AEEFC8901592825B8AC25871C63CEEEB0281CADE884B314AD1221B7441F3EE86522B62EBA09E
24,692,241 UART: [art] SIG.S = 3C53E81EC6B556ADCE4DBC2BDCFE5085E73F8C78157A49FD98FFCC1C4FA3B76AF3BAC1801D8AAA4EA9DFDE747C997BC5
25,671,227 UART: Caliptra RT
25,671,937 UART: [state] CFI Enabled
25,805,421 UART: [rt] RT listening for mailbox commands...
25,809,364 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,854,084 UART: [rt]cmd =0x4c4d5356, len=1672
26,291,964 >>> mbox cmd response data (8 bytes)
26,294,423 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,338,942 UART: [rt]cmd =0x4c4d5356, len=1672
26,570,474 >>> mbox cmd response data (8 bytes)
26,603,619 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,648,346 UART: [rt]cmd =0x4c4d5356, len=1672
26,878,912 >>> mbox cmd response data (8 bytes)
26,881,363 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,925,593 UART: [rt]cmd =0x4c4d5356, len=1672
27,153,624 >>> mbox cmd response data (8 bytes)
27,154,909 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,199,101 UART: [rt]cmd =0x4c4d5356, len=1672
27,430,008 >>> mbox cmd response data (8 bytes)
27,431,336 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,475,620 UART: [rt]cmd =0x4c4d5356, len=1672
27,704,285 >>> mbox cmd response data (8 bytes)
27,705,555 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,749,834 UART: [rt]cmd =0x4c4d5356, len=1672
27,978,961 >>> mbox cmd response data (8 bytes)
27,980,241 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,025,296 UART: [rt]cmd =0x4c4d5356, len=1672
28,256,751 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,153 UART:
192,508 UART: Running Caliptra ROM ...
193,690 UART:
193,841 UART: [state] CFI Enabled
264,868 UART: [state] LifecycleState = Unprovisioned
267,287 UART: [state] DebugLocked = No
269,390 UART: [state] WD Timer not started. Device not locked for debugging
273,926 UART: [kat] SHA2-256
463,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,564 UART: [kat] ++
475,046 UART: [kat] sha1
486,000 UART: [kat] SHA2-256
488,955 UART: [kat] SHA2-384
495,364 UART: [kat] SHA2-512-ACC
497,951 UART: [kat] ECC-384
2,945,061 UART: [kat] HMAC-384Kdf
2,970,029 UART: [kat] LMS
3,501,834 UART: [kat] --
3,507,475 UART: [cold-reset] ++
3,508,653 UART: [fht] FHT @ 0x50003400
3,520,486 UART: [idev] ++
3,521,203 UART: [idev] CDI.KEYID = 6
3,522,234 UART: [idev] SUBJECT.KEYID = 7
3,523,334 UART: [idev] UDS.KEYID = 0
3,524,255 ready_for_fw is high
3,524,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,507 UART: [idev] Erasing UDS.KEYID = 0
6,028,984 UART: [idev] Sha1 KeyId Algorithm
6,049,857 UART: [idev] --
6,054,665 UART: [ldev] ++
6,055,345 UART: [ldev] CDI.KEYID = 6
6,056,257 UART: [ldev] SUBJECT.KEYID = 5
6,057,419 UART: [ldev] AUTHORITY.KEYID = 7
6,058,647 UART: [ldev] FE.KEYID = 1
6,097,699 UART: [ldev] Erasing FE.KEYID = 1
8,604,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,838 UART: [ldev] --
10,411,811 UART: [fwproc] Wait for Commands...
10,414,614 UART: [fwproc] Recv command 0x46574c44
10,416,918 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,071 >>> mbox cmd response: success
14,677,058 UART: [afmc] ++
14,677,786 UART: [afmc] CDI.KEYID = 6
14,678,975 UART: [afmc] SUBJECT.KEYID = 7
14,680,410 UART: [afmc] AUTHORITY.KEYID = 5
17,208,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,271 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,191 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,465 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,333 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,356 UART: [afmc] --
19,008,676 UART: [cold-reset] --
19,014,677 UART: [state] Locking Datavault
19,021,017 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,219 UART: [state] Locking ICCM
19,024,724 UART: [exit] Launching FMC @ 0x40000130
19,033,389 UART:
19,033,654 UART: Running Caliptra FMC ...
19,034,762 UART:
19,034,926 UART: [state] CFI Enabled
19,091,343 UART: [fht] FMC Alias Private Key: 7
20,857,472 UART: [art] Extend RT PCRs Done
20,858,696 UART: [art] Lock RT PCRs Done
20,860,536 UART: [art] Populate DV Done
20,865,887 UART: [fht] FMC Alias Private Key: 7
20,867,509 UART: [art] Derive CDI
20,868,276 UART: [art] Store in slot 0x4
20,924,175 UART: [art] Derive Key Pair
20,925,194 UART: [art] Store priv key in slot 0x5
23,387,649 UART: [art] Derive Key Pair - Done
23,400,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,436 UART: [art] Erasing AUTHORITY.KEYID = 7
25,114,944 UART: [art] PUB.X = 76E7CF510998EFC2FBBB7741D971982791025D861175A404744DB0FFCF74A1578680E3525150AFD5AF50ECD228D02F37
25,122,205 UART: [art] PUB.Y = 3E129930202BDCFF8917B90AB06D6C23000232B46CFD75ECCB17DA860D7D56DCAAD7E570436A5A0299AFA0090F8D4FA7
25,129,444 UART: [art] SIG.R = 4A5E493A6D913B553BDDEF1AD9E79F1CF3E489D05DC52D4655A33E9B04B6572568BD23A214A33E9F79ABE065E5C6CEF1
25,136,856 UART: [art] SIG.S = 0F5AD1C3F365933E3B6ECCF6D518C057B914B993917AC2872ECA530CA498A70FF18B2C35BEFC766587A64644F57BE5B0
26,116,273 UART: Caliptra RT
26,116,983 UART: [state] CFI Enabled
26,297,001 UART: [rt] RT listening for mailbox commands...
26,300,974 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,345,369 UART: [rt]cmd =0x4c4d5356, len=1672
26,783,180 >>> mbox cmd response data (8 bytes)
26,785,659 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,830,161 UART: [rt]cmd =0x4c4d5356, len=1672
27,061,368 >>> mbox cmd response data (8 bytes)
27,095,357 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,140,334 UART: [rt]cmd =0x4c4d5356, len=1672
27,370,742 >>> mbox cmd response data (8 bytes)
27,373,208 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,417,584 UART: [rt]cmd =0x4c4d5356, len=1672
27,645,522 >>> mbox cmd response data (8 bytes)
27,646,790 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,691,147 UART: [rt]cmd =0x4c4d5356, len=1672
27,922,210 >>> mbox cmd response data (8 bytes)
27,923,484 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,968,178 UART: [rt]cmd =0x4c4d5356, len=1672
28,196,976 >>> mbox cmd response data (8 bytes)
28,198,225 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,242,323 UART: [rt]cmd =0x4c4d5356, len=1672
28,471,181 >>> mbox cmd response data (8 bytes)
28,472,451 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,517,034 UART: [rt]cmd =0x4c4d5356, len=1672
28,748,479 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,437,108 ready_for_fw is high
3,437,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,019 >>> mbox cmd response: success
19,135,396 UART:
19,135,825 UART: Running Caliptra FMC ...
19,136,956 UART:
19,137,121 UART: [state] CFI Enabled
19,201,073 UART: [fht] FMC Alias Private Key: 7
20,968,577 UART: [art] Extend RT PCRs Done
20,969,798 UART: [art] Lock RT PCRs Done
20,971,200 UART: [art] Populate DV Done
20,976,844 UART: [fht] FMC Alias Private Key: 7
20,978,342 UART: [art] Derive CDI
20,979,103 UART: [art] Store in slot 0x4
21,034,410 UART: [art] Derive Key Pair
21,035,452 UART: [art] Store priv key in slot 0x5
23,498,042 UART: [art] Derive Key Pair - Done
23,510,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,155 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,667 UART: [art] PUB.X = 4F286A8F7BFDD685E7BD41B1FFBD119FE76C91704DD1B945BB1762062FBF7E6BCFA6E14FA0A5E7054DB679B753D77FB6
25,232,983 UART: [art] PUB.Y = 512BD0AA73C22E557D81EF2D5F3B5A41567C352AEE0B0C35B93BE6994A0304CAFA3FF1EB9433491245CD4DF14DF523C8
25,240,211 UART: [art] SIG.R = 2D2F49AB3FCBD29502B62EB58BC1C914FA5FD3CBA747E72DC53D692F3CD20B2985E7D925C8DCB027CEF63DB0351C9BEB
25,247,622 UART: [art] SIG.S = 3851528DBFD5D3A1824B0475C38B2E31979ADEBFB21189705838E411B3E41FC9D0376A955DAA5C219CE9600986854518
26,227,031 UART: Caliptra RT
26,227,749 UART: [state] CFI Enabled
26,407,937 UART: [rt] RT listening for mailbox commands...
26,411,911 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,456,405 UART: [rt]cmd =0x4c4d5356, len=1672
26,894,461 >>> mbox cmd response data (8 bytes)
26,896,939 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,941,386 UART: [rt]cmd =0x4c4d5356, len=1672
27,172,736 >>> mbox cmd response data (8 bytes)
27,205,653 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,250,734 UART: [rt]cmd =0x4c4d5356, len=1672
27,481,322 >>> mbox cmd response data (8 bytes)
27,483,807 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,528,237 UART: [rt]cmd =0x4c4d5356, len=1672
27,756,336 >>> mbox cmd response data (8 bytes)
27,757,591 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,801,966 UART: [rt]cmd =0x4c4d5356, len=1672
28,032,871 >>> mbox cmd response data (8 bytes)
28,034,151 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,078,475 UART: [rt]cmd =0x4c4d5356, len=1672
28,306,884 >>> mbox cmd response data (8 bytes)
28,308,126 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,352,762 UART: [rt]cmd =0x4c4d5356, len=1672
28,581,454 >>> mbox cmd response data (8 bytes)
28,582,694 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,627,113 UART: [rt]cmd =0x4c4d5356, len=1672
28,858,827 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,491 UART:
192,855 UART: Running Caliptra ROM ...
194,054 UART:
603,669 UART: [state] CFI Enabled
619,157 UART: [state] LifecycleState = Unprovisioned
621,541 UART: [state] DebugLocked = No
622,998 UART: [state] WD Timer not started. Device not locked for debugging
627,761 UART: [kat] SHA2-256
817,693 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,425 UART: [kat] ++
828,954 UART: [kat] sha1
840,041 UART: [kat] SHA2-256
843,069 UART: [kat] SHA2-384
848,359 UART: [kat] SHA2-512-ACC
850,949 UART: [kat] ECC-384
3,291,668 UART: [kat] HMAC-384Kdf
3,303,472 UART: [kat] LMS
3,835,298 UART: [kat] --
3,842,136 UART: [cold-reset] ++
3,844,063 UART: [fht] FHT @ 0x50003400
3,854,999 UART: [idev] ++
3,855,645 UART: [idev] CDI.KEYID = 6
3,856,630 UART: [idev] SUBJECT.KEYID = 7
3,857,805 UART: [idev] UDS.KEYID = 0
3,858,735 ready_for_fw is high
3,858,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,810 UART: [idev] Erasing UDS.KEYID = 0
6,338,784 UART: [idev] Sha1 KeyId Algorithm
6,361,440 UART: [idev] --
6,366,215 UART: [ldev] ++
6,366,903 UART: [ldev] CDI.KEYID = 6
6,367,816 UART: [ldev] SUBJECT.KEYID = 5
6,368,977 UART: [ldev] AUTHORITY.KEYID = 7
6,370,208 UART: [ldev] FE.KEYID = 1
6,381,181 UART: [ldev] Erasing FE.KEYID = 1
8,858,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,050 UART: [ldev] --
10,648,698 UART: [fwproc] Wait for Commands...
10,651,776 UART: [fwproc] Recv command 0x46574c44
10,654,087 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,859 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,087 >>> mbox cmd response: success
14,920,554 UART: [afmc] ++
14,921,284 UART: [afmc] CDI.KEYID = 6
14,922,485 UART: [afmc] SUBJECT.KEYID = 7
14,923,933 UART: [afmc] AUTHORITY.KEYID = 5
17,426,737 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,455 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,633 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,561 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,492 UART: [afmc] --
19,223,684 UART: [cold-reset] --
19,227,812 UART: [state] Locking Datavault
19,233,365 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,532 UART: [state] Locking ICCM
19,238,508 UART: [exit] Launching FMC @ 0x40000130
19,247,202 UART:
19,247,447 UART: Running Caliptra FMC ...
19,248,554 UART:
19,248,723 UART: [state] CFI Enabled
19,256,632 UART: [fht] FMC Alias Private Key: 7
21,022,381 UART: [art] Extend RT PCRs Done
21,023,605 UART: [art] Lock RT PCRs Done
21,025,022 UART: [art] Populate DV Done
21,030,438 UART: [fht] FMC Alias Private Key: 7
21,031,934 UART: [art] Derive CDI
21,032,707 UART: [art] Store in slot 0x4
21,075,523 UART: [art] Derive Key Pair
21,076,566 UART: [art] Store priv key in slot 0x5
23,502,621 UART: [art] Derive Key Pair - Done
23,515,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,407 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,078 UART: [art] PUB.X = 8A1490632EA242C502BD232304E7D9C30FEB6BA999F66EB24D4A639C21B82C0E417911E5C39939553FB662057231DB06
25,231,188 UART: [art] PUB.Y = 372B98AD6849F3B9AAA899C160FF45CD21505BC232887C9C4EDE7CB04E883D4A6515D7F0645256DEC3A7710DDC9D3E4F
25,238,447 UART: [art] SIG.R = 4019665965256577BAE75694DC7E638ACF04434A2EF18A4FD7BD7EC1ACB8031DAC5672D7CAFCAD1082C56B17E2172FDD
25,245,827 UART: [art] SIG.S = CABA2A7C77E787BC306D4F2CA939DCC9C62A956B88220D3942726C602E7D6922AE85CEA796E67F09A602CC10FD238E19
26,225,359 UART: Caliptra RT
26,226,078 UART: [state] CFI Enabled
26,359,562 UART: [rt] RT listening for mailbox commands...
26,363,562 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,408,064 UART: [rt]cmd =0x4c4d5356, len=1672
26,845,624 >>> mbox cmd response data (8 bytes)
26,848,111 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,892,692 UART: [rt]cmd =0x4c4d5356, len=1672
27,123,870 >>> mbox cmd response data (8 bytes)
27,157,389 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,202,000 UART: [rt]cmd =0x4c4d5356, len=1672
27,432,273 >>> mbox cmd response data (8 bytes)
27,434,725 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,478,993 UART: [rt]cmd =0x4c4d5356, len=1672
27,706,857 >>> mbox cmd response data (8 bytes)
27,708,155 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,752,610 UART: [rt]cmd =0x4c4d5356, len=1672
27,983,753 >>> mbox cmd response data (8 bytes)
27,985,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,029,520 UART: [rt]cmd =0x4c4d5356, len=1672
28,258,108 >>> mbox cmd response data (8 bytes)
28,259,358 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,303,840 UART: [rt]cmd =0x4c4d5356, len=1672
28,532,815 >>> mbox cmd response data (8 bytes)
28,534,081 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,578,454 UART: [rt]cmd =0x4c4d5356, len=1672
28,810,148 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,754,595 ready_for_fw is high
3,754,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,197 >>> mbox cmd response: success
19,312,431 UART:
19,312,837 UART: Running Caliptra FMC ...
19,313,992 UART:
19,314,159 UART: [state] CFI Enabled
19,322,057 UART: [fht] FMC Alias Private Key: 7
21,088,427 UART: [art] Extend RT PCRs Done
21,089,662 UART: [art] Lock RT PCRs Done
21,091,230 UART: [art] Populate DV Done
21,096,659 UART: [fht] FMC Alias Private Key: 7
21,098,369 UART: [art] Derive CDI
21,099,112 UART: [art] Store in slot 0x4
21,141,500 UART: [art] Derive Key Pair
21,142,546 UART: [art] Store priv key in slot 0x5
23,569,997 UART: [art] Derive Key Pair - Done
23,583,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,368 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,878 UART: [art] PUB.X = B74943E3D9AF4ED27FB05935F598DBB493D7C3B97207670DCDCA4E46ADF204283BB92BA61569CF6EF1437CC2FC6597CC
25,298,156 UART: [art] PUB.Y = 4810EBEE25F0C9DCDBEB006A8B953AB8216AEB67987F43DE1AD3C509D3B8213E58C0B0F49C033FF4D893D88683F6B50B
25,305,437 UART: [art] SIG.R = 332F29530B63D191263CADBB3762C7BDAC22F10A07862C4B3EF648A6B91269BA04E9A77E47405C2F70A5E7EDA94C8414
25,312,815 UART: [art] SIG.S = F15CE2F3B0E80DEC399A04D63E6ECD185FC26FF582139A9574B1127C38154A8042EE7F7C7DFBFC66422B3AAF68AB2502
26,291,876 UART: Caliptra RT
26,292,611 UART: [state] CFI Enabled
26,425,566 UART: [rt] RT listening for mailbox commands...
26,429,561 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,473,767 UART: [rt]cmd =0x4c4d5356, len=1672
26,911,793 >>> mbox cmd response data (8 bytes)
26,914,255 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,958,443 UART: [rt]cmd =0x4c4d5356, len=1672
27,190,016 >>> mbox cmd response data (8 bytes)
27,223,035 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,267,680 UART: [rt]cmd =0x4c4d5356, len=1672
27,498,284 >>> mbox cmd response data (8 bytes)
27,500,801 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,545,414 UART: [rt]cmd =0x4c4d5356, len=1672
27,773,525 >>> mbox cmd response data (8 bytes)
27,774,826 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
27,819,317 UART: [rt]cmd =0x4c4d5356, len=1672
28,050,437 >>> mbox cmd response data (8 bytes)
28,051,734 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,096,193 UART: [rt]cmd =0x4c4d5356, len=1672
28,324,988 >>> mbox cmd response data (8 bytes)
28,326,252 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,370,418 UART: [rt]cmd =0x4c4d5356, len=1672
28,599,321 >>> mbox cmd response data (8 bytes)
28,600,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
28,644,968 UART: [rt]cmd =0x4c4d5356, len=1672
28,876,791 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,535 UART: [kat] SHA2-256
881,466 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,581 UART: [kat] ++
885,733 UART: [kat] sha1
889,979 UART: [kat] SHA2-256
891,917 UART: [kat] SHA2-384
894,650 UART: [kat] SHA2-512-ACC
896,551 UART: [kat] ECC-384
902,424 UART: [kat] HMAC-384Kdf
907,052 UART: [kat] LMS
1,475,248 UART: [kat] --
1,475,979 UART: [cold-reset] ++
1,476,479 UART: [fht] Storing FHT @ 0x50003400
1,479,288 UART: [idev] ++
1,479,456 UART: [idev] CDI.KEYID = 6
1,479,816 UART: [idev] SUBJECT.KEYID = 7
1,480,240 UART: [idev] UDS.KEYID = 0
1,480,585 ready_for_fw is high
1,480,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,132 UART: [idev] Erasing UDS.KEYID = 0
1,504,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,006 UART: [idev] --
1,514,071 UART: [ldev] ++
1,514,239 UART: [ldev] CDI.KEYID = 6
1,514,602 UART: [ldev] SUBJECT.KEYID = 5
1,515,028 UART: [ldev] AUTHORITY.KEYID = 7
1,515,491 UART: [ldev] FE.KEYID = 1
1,520,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,160 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,562 UART: [ldev] --
1,585,927 UART: [fwproc] Waiting for Commands...
1,586,786 UART: [fwproc] Received command 0x46574c44
1,587,577 UART: [fwproc] Received Image of size 118548 bytes
2,932,031 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,477 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,695 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,026 >>> mbox cmd response: success
3,132,088 UART: [afmc] ++
3,132,256 UART: [afmc] CDI.KEYID = 6
3,132,618 UART: [afmc] SUBJECT.KEYID = 7
3,133,043 UART: [afmc] AUTHORITY.KEYID = 5
3,168,302 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,346 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,126 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,835 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,718 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,401 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,291 UART: [afmc] --
3,211,203 UART: [cold-reset] --
3,211,841 UART: [state] Locking Datavault
3,213,126 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,730 UART: [state] Locking ICCM
3,214,346 UART: [exit] Launching FMC @ 0x40000130
3,219,676 UART:
3,219,692 UART: Running Caliptra FMC ...
3,220,100 UART:
3,220,154 UART: [state] CFI Enabled
3,230,428 UART: [fht] FMC Alias Private Key: 7
3,349,200 UART: [art] Extend RT PCRs Done
3,349,628 UART: [art] Lock RT PCRs Done
3,351,250 UART: [art] Populate DV Done
3,359,287 UART: [fht] FMC Alias Private Key: 7
3,360,267 UART: [art] Derive CDI
3,360,547 UART: [art] Store in slot 0x4
3,446,503 UART: [art] Derive Key Pair
3,446,863 UART: [art] Store priv key in slot 0x5
3,459,810 UART: [art] Derive Key Pair - Done
3,474,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,738 UART: [art] PUB.X = 6BCB2B3161CF3E5FFF203DC866DBAD2721930B51FDEA3BDBB548448E4C623D66BE67B7CEE9122CEC94C492101A72B81C
3,497,525 UART: [art] PUB.Y = FDDAC1D035FE349803EA22B37A3A34298B09D39851822E0009EEF03093BA71D26925602324ECC6813BFB0FAC68F5BBD2
3,504,449 UART: [art] SIG.R = 512EA42AD6F558F12FDD42D226571B8A6E286A3D6671071205552954ACD563D1DEEE2C8DA3247F2A113598CFD8FE08F5
3,511,216 UART: [art] SIG.S = D5DBD019AF312675D653FF7F0C3B7FAFF5966C965FFD5FFF1745E356A2CCDBCEC1EF0B941DF99BEE2915627834E65A53
3,535,300 UART: Caliptra RT
3,535,551 UART: [state] CFI Enabled
3,655,743 UART: [rt] RT listening for mailbox commands...
3,656,413 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,221 UART: [rt]cmd =0x4c4d5356, len=1672
5,421,368 >>> mbox cmd response data (8 bytes)
5,421,369 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,461,554 UART: [rt]cmd =0x4c4d5356, len=1672
6,572,846 >>> mbox cmd response data (8 bytes)
6,572,847 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,612,968 UART: [rt]cmd =0x4c4d5356, len=1672
7,686,316 >>> mbox cmd response data (8 bytes)
7,686,317 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,726,276 UART: [rt]cmd =0x4c4d5356, len=1672
8,837,332 >>> mbox cmd response data (8 bytes)
8,837,333 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,877,678 UART: [rt]cmd =0x4c4d5356, len=1672
10,102,586 >>> mbox cmd response data (8 bytes)
10,102,587 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,142,936 UART: [rt]cmd =0x4c4d5356, len=1672
11,216,537 >>> mbox cmd response data (8 bytes)
11,216,538 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,256,705 UART: [rt]cmd =0x4c4d5356, len=1672
12,406,009 >>> mbox cmd response data (8 bytes)
12,406,010 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,446,063 UART: [rt]cmd =0x4c4d5356, len=1672
13,633,110 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,917 ready_for_fw is high
1,362,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,676 >>> mbox cmd response: success
3,042,051 UART:
3,042,067 UART: Running Caliptra FMC ...
3,042,475 UART:
3,042,529 UART: [state] CFI Enabled
3,053,059 UART: [fht] FMC Alias Private Key: 7
3,171,563 UART: [art] Extend RT PCRs Done
3,171,991 UART: [art] Lock RT PCRs Done
3,173,541 UART: [art] Populate DV Done
3,181,740 UART: [fht] FMC Alias Private Key: 7
3,182,786 UART: [art] Derive CDI
3,183,066 UART: [art] Store in slot 0x4
3,268,418 UART: [art] Derive Key Pair
3,268,778 UART: [art] Store priv key in slot 0x5
3,281,699 UART: [art] Derive Key Pair - Done
3,296,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,648 UART: [art] PUB.X = CE9999A3ECBEB8A130037CD1DD753C97E9A9819937D221849691C583BB172BD71BCEA8BBAE5282655EDD9543F8C06670
3,319,423 UART: [art] PUB.Y = A3F6D09450554B42DBC8DBA12F1216EF46373E8892827EBF56A0093AA5D19B496ACBAC3151C3395F445B4A0369BC8D5F
3,326,375 UART: [art] SIG.R = EB560F304A623D02CD76E41C7BFCCFE941D28185C21DDA3DA03EB93F4DB31E0047262DFBD56E7F85923EB27D9F0F92A6
3,333,132 UART: [art] SIG.S = D2BE5BC239D6CC2F4E73938C925DB46963F998B73108E700C450B2D2F09C988BEA438C6FA834963C81D98A43DCC8F1FF
3,356,919 UART: Caliptra RT
3,357,170 UART: [state] CFI Enabled
3,478,059 UART: [rt] RT listening for mailbox commands...
3,478,729 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,613 UART: [rt]cmd =0x4c4d5356, len=1672
5,243,982 >>> mbox cmd response data (8 bytes)
5,243,983 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,284,012 UART: [rt]cmd =0x4c4d5356, len=1672
6,395,444 >>> mbox cmd response data (8 bytes)
6,395,445 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,435,646 UART: [rt]cmd =0x4c4d5356, len=1672
7,508,748 >>> mbox cmd response data (8 bytes)
7,508,749 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,549,180 UART: [rt]cmd =0x4c4d5356, len=1672
8,660,378 >>> mbox cmd response data (8 bytes)
8,660,379 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,700,490 UART: [rt]cmd =0x4c4d5356, len=1672
9,925,338 >>> mbox cmd response data (8 bytes)
9,925,339 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,965,236 UART: [rt]cmd =0x4c4d5356, len=1672
11,038,615 >>> mbox cmd response data (8 bytes)
11,038,616 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,078,565 UART: [rt]cmd =0x4c4d5356, len=1672
12,227,797 >>> mbox cmd response data (8 bytes)
12,227,798 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,268,109 UART: [rt]cmd =0x4c4d5356, len=1672
13,455,148 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,512 UART: [kat] SHA2-256
882,443 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,558 UART: [kat] ++
886,710 UART: [kat] sha1
890,888 UART: [kat] SHA2-256
892,826 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,481 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,052 UART: [cold-reset] ++
1,476,588 UART: [fht] Storing FHT @ 0x50003400
1,479,537 UART: [idev] ++
1,479,705 UART: [idev] CDI.KEYID = 6
1,480,065 UART: [idev] SUBJECT.KEYID = 7
1,480,489 UART: [idev] UDS.KEYID = 0
1,480,834 ready_for_fw is high
1,480,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,225 UART: [idev] Erasing UDS.KEYID = 0
1,504,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,475 UART: [idev] --
1,514,552 UART: [ldev] ++
1,514,720 UART: [ldev] CDI.KEYID = 6
1,515,083 UART: [ldev] SUBJECT.KEYID = 5
1,515,509 UART: [ldev] AUTHORITY.KEYID = 7
1,515,972 UART: [ldev] FE.KEYID = 1
1,521,376 UART: [ldev] Erasing FE.KEYID = 1
1,546,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,692 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,147 UART: [ldev] --
1,585,484 UART: [fwproc] Waiting for Commands...
1,586,129 UART: [fwproc] Received command 0x46574c44
1,586,920 UART: [fwproc] Received Image of size 118548 bytes
2,930,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,132 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,699 >>> mbox cmd response: success
3,129,957 UART: [afmc] ++
3,130,125 UART: [afmc] CDI.KEYID = 6
3,130,487 UART: [afmc] SUBJECT.KEYID = 7
3,130,912 UART: [afmc] AUTHORITY.KEYID = 5
3,166,095 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,497 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,986 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,869 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,552 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,648 UART: [afmc] --
3,209,660 UART: [cold-reset] --
3,210,372 UART: [state] Locking Datavault
3,211,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,355 UART: [state] Locking ICCM
3,212,825 UART: [exit] Launching FMC @ 0x40000130
3,218,155 UART:
3,218,171 UART: Running Caliptra FMC ...
3,218,579 UART:
3,218,722 UART: [state] CFI Enabled
3,229,412 UART: [fht] FMC Alias Private Key: 7
3,347,672 UART: [art] Extend RT PCRs Done
3,348,100 UART: [art] Lock RT PCRs Done
3,349,754 UART: [art] Populate DV Done
3,357,983 UART: [fht] FMC Alias Private Key: 7
3,359,105 UART: [art] Derive CDI
3,359,385 UART: [art] Store in slot 0x4
3,445,459 UART: [art] Derive Key Pair
3,445,819 UART: [art] Store priv key in slot 0x5
3,458,624 UART: [art] Derive Key Pair - Done
3,473,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,349 UART: [art] PUB.X = 8F3ED06DE8D6F698BED2B06555C7C55AD7E65BD9D42F1A4828FC175E0D408F8CE0EAD249244316D82390E157B3CA2949
3,496,126 UART: [art] PUB.Y = B47D227D53FFC3163D8A9DCFCE9F0A4938BC83D004FB7873A0E9D6909359081305AA498332EA697C273C9937AD8FAB47
3,503,070 UART: [art] SIG.R = 4A0B3BBAF85B45C880EA48237ADA8A98C13D9390196C9FD47F2139BD9FC84B16E4812D96EAB3BA740DD2872217D03BF7
3,509,846 UART: [art] SIG.S = 4A017D6B63DF986D2F55BBA318DD093F35369D000CCC8D98F18CF18D387005D5C4FFAA8C433D625F87C20140FC3AFF11
3,534,137 UART: Caliptra RT
3,534,480 UART: [state] CFI Enabled
3,654,573 UART: [rt] RT listening for mailbox commands...
3,655,243 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,271 UART: [rt]cmd =0x4c4d5356, len=1672
5,420,478 >>> mbox cmd response data (8 bytes)
5,420,479 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,460,666 UART: [rt]cmd =0x4c4d5356, len=1672
6,571,866 >>> mbox cmd response data (8 bytes)
6,571,867 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,612,120 UART: [rt]cmd =0x4c4d5356, len=1672
7,685,726 >>> mbox cmd response data (8 bytes)
7,685,727 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,725,830 UART: [rt]cmd =0x4c4d5356, len=1672
8,837,288 >>> mbox cmd response data (8 bytes)
8,837,289 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,877,498 UART: [rt]cmd =0x4c4d5356, len=1672
10,102,418 >>> mbox cmd response data (8 bytes)
10,102,419 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,142,824 UART: [rt]cmd =0x4c4d5356, len=1672
11,216,321 >>> mbox cmd response data (8 bytes)
11,216,322 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,256,425 UART: [rt]cmd =0x4c4d5356, len=1672
12,405,851 >>> mbox cmd response data (8 bytes)
12,405,852 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,446,199 UART: [rt]cmd =0x4c4d5356, len=1672
13,633,088 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,192 ready_for_fw is high
1,362,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,821 >>> mbox cmd response: success
3,043,292 UART:
3,043,308 UART: Running Caliptra FMC ...
3,043,716 UART:
3,043,859 UART: [state] CFI Enabled
3,054,733 UART: [fht] FMC Alias Private Key: 7
3,173,287 UART: [art] Extend RT PCRs Done
3,173,715 UART: [art] Lock RT PCRs Done
3,175,369 UART: [art] Populate DV Done
3,183,506 UART: [fht] FMC Alias Private Key: 7
3,184,480 UART: [art] Derive CDI
3,184,760 UART: [art] Store in slot 0x4
3,270,172 UART: [art] Derive Key Pair
3,270,532 UART: [art] Store priv key in slot 0x5
3,283,937 UART: [art] Derive Key Pair - Done
3,299,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,234 UART: [art] PUB.X = EFD9B260C8B4CC33FBF6B1E8D580E2523A470F4BA5BFE9FD9C8CD5F0A387E858130D6CCF9376DABFAF44BEE4CF646615
3,322,026 UART: [art] PUB.Y = 1CBF0CE884775969689EE08DE6D3CF688A7FE4D67E9CA517BA9998DE2D1B1BA50F3697EC6811DE91907E33332296C573
3,328,976 UART: [art] SIG.R = 3600B509C69BCFB20B75247589BD321D4149A7049D21622396EEAD91CE5152EAE46AAE8B3DD1D170CD3416B2CB281B94
3,335,721 UART: [art] SIG.S = E523B3E4143E926CAF459B239BFEAA0F6B22CCD5C93889CBD1F9A153BFF509F4C8F3F91DCF7ABB3BEBAFD0B4CE9F9507
3,360,200 UART: Caliptra RT
3,360,543 UART: [state] CFI Enabled
3,480,987 UART: [rt] RT listening for mailbox commands...
3,481,657 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,175 UART: [rt]cmd =0x4c4d5356, len=1672
5,246,296 >>> mbox cmd response data (8 bytes)
5,246,297 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,286,466 UART: [rt]cmd =0x4c4d5356, len=1672
6,397,750 >>> mbox cmd response data (8 bytes)
6,397,751 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,437,878 UART: [rt]cmd =0x4c4d5356, len=1672
7,511,164 >>> mbox cmd response data (8 bytes)
7,511,165 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,551,316 UART: [rt]cmd =0x4c4d5356, len=1672
8,662,352 >>> mbox cmd response data (8 bytes)
8,662,353 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,702,760 UART: [rt]cmd =0x4c4d5356, len=1672
9,927,594 >>> mbox cmd response data (8 bytes)
9,927,595 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
9,967,854 UART: [rt]cmd =0x4c4d5356, len=1672
11,041,089 >>> mbox cmd response data (8 bytes)
11,041,090 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,081,113 UART: [rt]cmd =0x4c4d5356, len=1672
12,230,373 >>> mbox cmd response data (8 bytes)
12,230,374 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,270,479 UART: [rt]cmd =0x4c4d5356, len=1672
13,457,510 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,948 UART: [kat] SHA2-256
901,888 UART: [kat] SHA2-384
904,689 UART: [kat] SHA2-512-ACC
906,590 UART: [kat] ECC-384
916,273 UART: [kat] HMAC-384Kdf
920,853 UART: [kat] LMS
1,169,165 UART: [kat] --
1,170,270 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,296 UART: [idev] ++
1,173,464 UART: [idev] CDI.KEYID = 6
1,173,825 UART: [idev] SUBJECT.KEYID = 7
1,174,250 UART: [idev] UDS.KEYID = 0
1,174,596 ready_for_fw is high
1,174,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,527 UART: [idev] Erasing UDS.KEYID = 0
1,198,623 UART: [idev] Sha1 KeyId Algorithm
1,207,625 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,215,448 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,602 UART: [ldev] --
1,280,987 UART: [fwproc] Wait for Commands...
1,281,672 UART: [fwproc] Recv command 0x46574c44
1,282,405 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,805 >>> mbox cmd response: success
2,826,933 UART: [afmc] ++
2,827,101 UART: [afmc] CDI.KEYID = 6
2,827,464 UART: [afmc] SUBJECT.KEYID = 7
2,827,890 UART: [afmc] AUTHORITY.KEYID = 5
2,863,733 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,334 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,793 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,375 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,014 UART: [afmc] --
2,907,053 UART: [cold-reset] --
2,908,193 UART: [state] Locking Datavault
2,909,588 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,192 UART: [state] Locking ICCM
2,910,770 UART: [exit] Launching FMC @ 0x40000130
2,916,100 UART:
2,916,116 UART: Running Caliptra FMC ...
2,916,524 UART:
2,916,578 UART: [state] CFI Enabled
2,927,286 UART: [fht] FMC Alias Private Key: 7
3,046,324 UART: [art] Extend RT PCRs Done
3,046,752 UART: [art] Lock RT PCRs Done
3,048,036 UART: [art] Populate DV Done
3,056,325 UART: [fht] FMC Alias Private Key: 7
3,057,365 UART: [art] Derive CDI
3,057,645 UART: [art] Store in slot 0x4
3,143,520 UART: [art] Derive Key Pair
3,143,880 UART: [art] Store priv key in slot 0x5
3,156,684 UART: [art] Derive Key Pair - Done
3,171,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,037 UART: [art] PUB.X = 7CBF636D84973257FF1C443FCD2A90D02ADE2049D8611CA0B7B781EC9B452B0840555C26A81F9DC452688052423ECD3E
3,194,808 UART: [art] PUB.Y = D80427E26BC4DDB38064CF06859ACEF3F11D8DE27CB2B7A027025567C8065123424BD4CCC42B6AC1466D2701A4CDC23C
3,201,753 UART: [art] SIG.R = 23DB517A06965546B79DCAE425F6926CC7D78618C1F47FAA73B29029198CED349F0B6CB46397E31E2F4E566354E7FE85
3,208,519 UART: [art] SIG.S = 2E068B86B144197698D8E47B173C43E9ECD1DD0931B5ACBBB40FEA3084EF6C6A3570E0D50E0BC668DD23C8E73EFFB2C2
3,232,674 UART: Caliptra RT
3,232,925 UART: [state] CFI Enabled
3,352,827 UART: [rt] RT listening for mailbox commands...
3,353,497 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,077 UART: [rt]cmd =0x4c4d5356, len=1672
3,937,302 >>> mbox cmd response data (8 bytes)
3,937,303 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,596 UART: [rt]cmd =0x4c4d5356, len=1672
4,266,362 >>> mbox cmd response data (8 bytes)
4,266,363 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,620 UART: [rt]cmd =0x4c4d5356, len=1672
4,595,248 >>> mbox cmd response data (8 bytes)
4,595,249 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,635,326 UART: [rt]cmd =0x4c4d5356, len=1672
4,919,032 >>> mbox cmd response data (8 bytes)
4,919,033 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,959,052 UART: [rt]cmd =0x4c4d5356, len=1672
5,242,368 >>> mbox cmd response data (8 bytes)
5,242,369 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,282,622 UART: [rt]cmd =0x4c4d5356, len=1672
5,568,877 >>> mbox cmd response data (8 bytes)
5,568,878 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,608,991 UART: [rt]cmd =0x4c4d5356, len=1672
5,892,111 >>> mbox cmd response data (8 bytes)
5,892,112 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,932,327 UART: [rt]cmd =0x4c4d5356, len=1672
6,218,306 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,388 ready_for_fw is high
1,058,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,784 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,505 UART: [state] CFI Enabled
2,753,059 UART: [fht] FMC Alias Private Key: 7
2,871,973 UART: [art] Extend RT PCRs Done
2,872,401 UART: [art] Lock RT PCRs Done
2,874,025 UART: [art] Populate DV Done
2,882,270 UART: [fht] FMC Alias Private Key: 7
2,883,272 UART: [art] Derive CDI
2,883,552 UART: [art] Store in slot 0x4
2,969,785 UART: [art] Derive Key Pair
2,970,145 UART: [art] Store priv key in slot 0x5
2,983,607 UART: [art] Derive Key Pair - Done
2,998,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,083 UART: [art] PUB.X = AA493DA083AF1DFC9657226F9B46311237D58C29F0D637A733366060A7B26BBC7BE04F26C404403FC8A179CF1CCCA63C
3,021,858 UART: [art] PUB.Y = 61EAD28A392CF08CBA9732BFA1884251EF523C6CB165584219F3049509C96E9CA11A636B706FC03C35C48F94268C5142
3,028,800 UART: [art] SIG.R = 244F774775DD48E857AFCD4F1DE982242273AD576798F4DDEB32F4FF17B948AABAAB56E5BEF8E5C5E7BC0950184C0BDE
3,035,584 UART: [art] SIG.S = F0EC25D2F7A485025D61823B55869581D64A7B6229CEDFFBEDECB466DEFD3D73E2CDF85493029935765E024AD43F3654
3,059,461 UART: Caliptra RT
3,059,712 UART: [state] CFI Enabled
3,178,725 UART: [rt] RT listening for mailbox commands...
3,179,395 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,307 UART: [rt]cmd =0x4c4d5356, len=1672
3,763,404 >>> mbox cmd response data (8 bytes)
3,763,405 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,803,834 UART: [rt]cmd =0x4c4d5356, len=1672
4,092,370 >>> mbox cmd response data (8 bytes)
4,092,371 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,542 UART: [rt]cmd =0x4c4d5356, len=1672
4,421,198 >>> mbox cmd response data (8 bytes)
4,421,199 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,461,446 UART: [rt]cmd =0x4c4d5356, len=1672
4,744,926 >>> mbox cmd response data (8 bytes)
4,744,927 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,785,132 UART: [rt]cmd =0x4c4d5356, len=1672
5,068,890 >>> mbox cmd response data (8 bytes)
5,068,891 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,109,104 UART: [rt]cmd =0x4c4d5356, len=1672
5,395,147 >>> mbox cmd response data (8 bytes)
5,395,148 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,435,219 UART: [rt]cmd =0x4c4d5356, len=1672
5,718,599 >>> mbox cmd response data (8 bytes)
5,718,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,758,805 UART: [rt]cmd =0x4c4d5356, len=1672
6,044,708 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,829 UART: [state] LifecycleState = Unprovisioned
85,484 UART: [state] DebugLocked = No
86,036 UART: [state] WD Timer not started. Device not locked for debugging
87,199 UART: [kat] SHA2-256
890,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,853 UART: [kat] ++
895,005 UART: [kat] sha1
899,067 UART: [kat] SHA2-256
901,007 UART: [kat] SHA2-384
903,686 UART: [kat] SHA2-512-ACC
905,587 UART: [kat] ECC-384
915,264 UART: [kat] HMAC-384Kdf
919,944 UART: [kat] LMS
1,168,256 UART: [kat] --
1,168,905 UART: [cold-reset] ++
1,169,301 UART: [fht] FHT @ 0x50003400
1,171,827 UART: [idev] ++
1,171,995 UART: [idev] CDI.KEYID = 6
1,172,356 UART: [idev] SUBJECT.KEYID = 7
1,172,781 UART: [idev] UDS.KEYID = 0
1,173,127 ready_for_fw is high
1,173,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,868 UART: [idev] Erasing UDS.KEYID = 0
1,197,874 UART: [idev] Sha1 KeyId Algorithm
1,206,710 UART: [idev] --
1,207,825 UART: [ldev] ++
1,207,993 UART: [ldev] CDI.KEYID = 6
1,208,357 UART: [ldev] SUBJECT.KEYID = 5
1,208,784 UART: [ldev] AUTHORITY.KEYID = 7
1,209,247 UART: [ldev] FE.KEYID = 1
1,214,423 UART: [ldev] Erasing FE.KEYID = 1
1,241,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,888 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,163 UART: [ldev] --
1,280,528 UART: [fwproc] Wait for Commands...
1,281,119 UART: [fwproc] Recv command 0x46574c44
1,281,852 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,625 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,818 >>> mbox cmd response: success
2,825,920 UART: [afmc] ++
2,826,088 UART: [afmc] CDI.KEYID = 6
2,826,451 UART: [afmc] SUBJECT.KEYID = 7
2,826,877 UART: [afmc] AUTHORITY.KEYID = 5
2,862,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,875 UART: [afmc] --
2,905,782 UART: [cold-reset] --
2,906,508 UART: [state] Locking Datavault
2,907,741 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,345 UART: [state] Locking ICCM
2,908,787 UART: [exit] Launching FMC @ 0x40000130
2,914,117 UART:
2,914,133 UART: Running Caliptra FMC ...
2,914,541 UART:
2,914,684 UART: [state] CFI Enabled
2,925,162 UART: [fht] FMC Alias Private Key: 7
3,044,616 UART: [art] Extend RT PCRs Done
3,045,044 UART: [art] Lock RT PCRs Done
3,046,564 UART: [art] Populate DV Done
3,054,945 UART: [fht] FMC Alias Private Key: 7
3,056,021 UART: [art] Derive CDI
3,056,301 UART: [art] Store in slot 0x4
3,142,100 UART: [art] Derive Key Pair
3,142,460 UART: [art] Store priv key in slot 0x5
3,155,944 UART: [art] Derive Key Pair - Done
3,171,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,911 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,676 UART: [art] PUB.X = 3E664D51F918FCD5C54D23515E50F736CD579896DC07E5147D7FF657B95734CDBE08E8DCDD6E460FCB0182BCDE419471
3,194,444 UART: [art] PUB.Y = 808AA56403069AD55B0EA4D6CE76B98FCA370ACC1A09FAC514E81F07865902EDCDE24DEF2FDF4911E520C6E18FC13A87
3,201,391 UART: [art] SIG.R = BC103280179BB58DCFCC8A18AE9D3A595052ED2EB860FC90544F640D1D5FEE4BB390AA08C713AF2A2E9516B735B10753
3,208,164 UART: [art] SIG.S = 3BEADE5458541F937BC80401DD0B1004AE492038622248EC61A814FF5BD470E829FF7D04ABFB7649EBFA81F52E9A8DE1
3,231,789 UART: Caliptra RT
3,232,132 UART: [state] CFI Enabled
3,352,147 UART: [rt] RT listening for mailbox commands...
3,352,817 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,431 UART: [rt]cmd =0x4c4d5356, len=1672
3,936,198 >>> mbox cmd response data (8 bytes)
3,936,199 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,976,472 UART: [rt]cmd =0x4c4d5356, len=1672
4,264,964 >>> mbox cmd response data (8 bytes)
4,264,965 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,305,136 UART: [rt]cmd =0x4c4d5356, len=1672
4,593,882 >>> mbox cmd response data (8 bytes)
4,593,883 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,634,152 UART: [rt]cmd =0x4c4d5356, len=1672
4,917,762 >>> mbox cmd response data (8 bytes)
4,917,763 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,957,950 UART: [rt]cmd =0x4c4d5356, len=1672
5,241,550 >>> mbox cmd response data (8 bytes)
5,241,551 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,281,754 UART: [rt]cmd =0x4c4d5356, len=1672
5,567,779 >>> mbox cmd response data (8 bytes)
5,567,780 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,607,917 UART: [rt]cmd =0x4c4d5356, len=1672
5,891,341 >>> mbox cmd response data (8 bytes)
5,891,342 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,931,237 UART: [rt]cmd =0x4c4d5356, len=1672
6,217,274 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,293 ready_for_fw is high
1,059,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,989 >>> mbox cmd response: success
2,740,990 UART:
2,741,006 UART: Running Caliptra FMC ...
2,741,414 UART:
2,741,557 UART: [state] CFI Enabled
2,752,695 UART: [fht] FMC Alias Private Key: 7
2,871,283 UART: [art] Extend RT PCRs Done
2,871,711 UART: [art] Lock RT PCRs Done
2,873,327 UART: [art] Populate DV Done
2,881,526 UART: [fht] FMC Alias Private Key: 7
2,882,492 UART: [art] Derive CDI
2,882,772 UART: [art] Store in slot 0x4
2,968,619 UART: [art] Derive Key Pair
2,968,979 UART: [art] Store priv key in slot 0x5
2,983,147 UART: [art] Derive Key Pair - Done
2,997,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,078 UART: [art] PUB.X = 25586712B886A66F31AF84A54791B0ADF142DFF938E1C41C13754A20AA8809616888098168F7CA15B67ACC70F0E7A24C
3,020,840 UART: [art] PUB.Y = 76C23340687C032D67E258B9D90C8A17F7408FC59C56D6750386D04D1B427B3E828F329FE3AFC68EFAD34C1EDA563001
3,027,780 UART: [art] SIG.R = F633325CE3704E1D41B2CBA5782945FC41CB191120A3FEB161658E91C948CECCA6A246CD04FDA143EA40AB21628D88B8
3,034,557 UART: [art] SIG.S = 25F6485B67162AA1444C19840CA18E35819F4D457999E295008A2EB79B2FE8FAF2AF38645734CB736977E1224861C4F6
3,058,002 UART: Caliptra RT
3,058,345 UART: [state] CFI Enabled
3,177,048 UART: [rt] RT listening for mailbox commands...
3,177,718 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,652 UART: [rt]cmd =0x4c4d5356, len=1672
3,761,643 >>> mbox cmd response data (8 bytes)
3,761,644 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,801,879 UART: [rt]cmd =0x4c4d5356, len=1672
4,090,473 >>> mbox cmd response data (8 bytes)
4,090,474 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,805 UART: [rt]cmd =0x4c4d5356, len=1672
4,419,549 >>> mbox cmd response data (8 bytes)
4,419,550 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,459,403 UART: [rt]cmd =0x4c4d5356, len=1672
4,742,833 >>> mbox cmd response data (8 bytes)
4,742,834 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,783,167 UART: [rt]cmd =0x4c4d5356, len=1672
5,066,505 >>> mbox cmd response data (8 bytes)
5,066,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,641 UART: [rt]cmd =0x4c4d5356, len=1672
5,392,668 >>> mbox cmd response data (8 bytes)
5,392,669 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,432,914 UART: [rt]cmd =0x4c4d5356, len=1672
5,716,498 >>> mbox cmd response data (8 bytes)
5,716,499 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,756,630 UART: [rt]cmd =0x4c4d5356, len=1672
6,042,801 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,374 UART: [state] LifecycleState = Unprovisioned
85,029 UART: [state] DebugLocked = No
85,669 UART: [state] WD Timer not started. Device not locked for debugging
86,802 UART: [kat] SHA2-256
892,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,577 UART: [kat] ++
896,729 UART: [kat] sha1
900,791 UART: [kat] SHA2-256
902,731 UART: [kat] SHA2-384
905,422 UART: [kat] SHA2-512-ACC
907,323 UART: [kat] ECC-384
916,522 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,707 UART: [fht] FHT @ 0x50003400
1,173,370 UART: [idev] ++
1,173,538 UART: [idev] CDI.KEYID = 6
1,173,898 UART: [idev] SUBJECT.KEYID = 7
1,174,322 UART: [idev] UDS.KEYID = 0
1,174,667 ready_for_fw is high
1,174,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,206 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,207,631 UART: [idev] --
1,208,601 UART: [ldev] ++
1,208,769 UART: [ldev] CDI.KEYID = 6
1,209,132 UART: [ldev] SUBJECT.KEYID = 5
1,209,558 UART: [ldev] AUTHORITY.KEYID = 7
1,210,021 UART: [ldev] FE.KEYID = 1
1,215,199 UART: [ldev] Erasing FE.KEYID = 1
1,241,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,904 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,629 UART: [ldev] --
1,280,930 UART: [fwproc] Wait for Commands...
1,281,504 UART: [fwproc] Recv command 0x46574c44
1,282,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,902 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,235 >>> mbox cmd response: success
2,826,445 UART: [afmc] ++
2,826,613 UART: [afmc] CDI.KEYID = 6
2,826,975 UART: [afmc] SUBJECT.KEYID = 7
2,827,400 UART: [afmc] AUTHORITY.KEYID = 5
2,862,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,801 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,149 UART: [afmc] --
2,906,169 UART: [cold-reset] --
2,906,767 UART: [state] Locking Datavault
2,908,008 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,612 UART: [state] Locking ICCM
2,909,252 UART: [exit] Launching FMC @ 0x40000130
2,914,582 UART:
2,914,598 UART: Running Caliptra FMC ...
2,915,006 UART:
2,915,060 UART: [state] CFI Enabled
2,925,480 UART: [fht] FMC Alias Private Key: 7
3,044,160 UART: [art] Extend RT PCRs Done
3,044,588 UART: [art] Lock RT PCRs Done
3,046,312 UART: [art] Populate DV Done
3,054,237 UART: [fht] FMC Alias Private Key: 7
3,055,179 UART: [art] Derive CDI
3,055,459 UART: [art] Store in slot 0x4
3,141,564 UART: [art] Derive Key Pair
3,141,924 UART: [art] Store priv key in slot 0x5
3,155,808 UART: [art] Derive Key Pair - Done
3,170,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,792 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,557 UART: [art] PUB.X = 47C12834B65C24533B7C6B7E8EF23A1AF043EF1F19EFA6A9BA6C698D78766FF73E742B3741B41D93770367153B13C109
3,193,321 UART: [art] PUB.Y = F2D16A426C52F91282C7D676C3B86C8531560E6059DA9843BB3DE924394DEEBBCDF8DADCC0ADCB6AF8DF5F1D69E2B8BA
3,200,294 UART: [art] SIG.R = 20425DD89DC5839BA583033EAEF15AE47DD9971024F92D798545F1B9C5C32F07366EF0F93C659733319431487E23F64C
3,207,052 UART: [art] SIG.S = A24E1956C627C4DD4E7A8987034552838D85DDED25DFD95E6A2CDB64295F1DD04F2D42D63074EDE4757CD46CB04945CE
3,230,203 UART: Caliptra RT
3,230,454 UART: [state] CFI Enabled
3,350,189 UART: [rt] RT listening for mailbox commands...
3,350,859 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,385 UART: [rt]cmd =0x4c4d5356, len=1672
3,934,682 >>> mbox cmd response data (8 bytes)
3,934,683 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,974,670 UART: [rt]cmd =0x4c4d5356, len=1672
4,263,386 >>> mbox cmd response data (8 bytes)
4,263,387 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,303,638 UART: [rt]cmd =0x4c4d5356, len=1672
4,592,156 >>> mbox cmd response data (8 bytes)
4,592,157 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,632,354 UART: [rt]cmd =0x4c4d5356, len=1672
4,915,836 >>> mbox cmd response data (8 bytes)
4,915,837 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,956,138 UART: [rt]cmd =0x4c4d5356, len=1672
5,239,484 >>> mbox cmd response data (8 bytes)
5,239,485 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,279,696 UART: [rt]cmd =0x4c4d5356, len=1672
5,565,625 >>> mbox cmd response data (8 bytes)
5,565,626 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,605,729 UART: [rt]cmd =0x4c4d5356, len=1672
5,889,263 >>> mbox cmd response data (8 bytes)
5,889,264 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,929,379 UART: [rt]cmd =0x4c4d5356, len=1672
6,215,720 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,655 ready_for_fw is high
1,060,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,500 >>> mbox cmd response: success
2,741,683 UART:
2,741,699 UART: Running Caliptra FMC ...
2,742,107 UART:
2,742,161 UART: [state] CFI Enabled
2,752,543 UART: [fht] FMC Alias Private Key: 7
2,871,801 UART: [art] Extend RT PCRs Done
2,872,229 UART: [art] Lock RT PCRs Done
2,873,783 UART: [art] Populate DV Done
2,882,148 UART: [fht] FMC Alias Private Key: 7
2,883,112 UART: [art] Derive CDI
2,883,392 UART: [art] Store in slot 0x4
2,969,077 UART: [art] Derive Key Pair
2,969,437 UART: [art] Store priv key in slot 0x5
2,982,189 UART: [art] Derive Key Pair - Done
2,997,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,701 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,466 UART: [art] PUB.X = E56044D445D0CA864C204FE975415A19A8E570140C4B43984920CD813EC18591835320C4D48001BD7B4CDF655A327962
3,020,220 UART: [art] PUB.Y = D05CD2742A3F87FA98A42B17A36151B958EB39C22F34685440AEBBD2DF156A23C21904BB5BD94BA308F9542438A84459
3,027,166 UART: [art] SIG.R = 8864771379270CA015E21AB433F63A7FB8DD6B7BCAA3A0FED019E2B944C53D5E585F30E0F48A64FFD978689DAEE14E23
3,033,945 UART: [art] SIG.S = 36D663FB75FE09D9FC8EC673CC1A0BDEE44591F5A05349571386D8F716FBA315982BB0A6BD0BBCE03CF7BC7EC593F01F
3,057,770 UART: Caliptra RT
3,058,021 UART: [state] CFI Enabled
3,176,616 UART: [rt] RT listening for mailbox commands...
3,177,286 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,674 UART: [rt]cmd =0x4c4d5356, len=1672
3,760,485 >>> mbox cmd response data (8 bytes)
3,760,486 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,719 UART: [rt]cmd =0x4c4d5356, len=1672
4,089,647 >>> mbox cmd response data (8 bytes)
4,089,648 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,079 UART: [rt]cmd =0x4c4d5356, len=1672
4,418,527 >>> mbox cmd response data (8 bytes)
4,418,528 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,458,719 UART: [rt]cmd =0x4c4d5356, len=1672
4,742,029 >>> mbox cmd response data (8 bytes)
4,742,030 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,782,341 UART: [rt]cmd =0x4c4d5356, len=1672
5,065,945 >>> mbox cmd response data (8 bytes)
5,065,946 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,111 UART: [rt]cmd =0x4c4d5356, len=1672
5,392,292 >>> mbox cmd response data (8 bytes)
5,392,293 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,432,620 UART: [rt]cmd =0x4c4d5356, len=1672
5,716,298 >>> mbox cmd response data (8 bytes)
5,716,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,756,476 UART: [rt]cmd =0x4c4d5356, len=1672
6,042,727 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,021 UART: [kat] SHA2-256
893,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,796 UART: [kat] ++
897,948 UART: [kat] sha1
902,208 UART: [kat] SHA2-256
904,148 UART: [kat] SHA2-384
906,739 UART: [kat] SHA2-512-ACC
908,640 UART: [kat] ECC-384
918,765 UART: [kat] HMAC-384Kdf
923,457 UART: [kat] LMS
1,171,785 UART: [kat] --
1,172,702 UART: [cold-reset] ++
1,173,276 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 ready_for_fw is high
1,177,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,893 UART: [idev] Erasing UDS.KEYID = 0
1,202,514 UART: [idev] Sha1 KeyId Algorithm
1,211,050 UART: [idev] --
1,212,166 UART: [ldev] ++
1,212,334 UART: [ldev] CDI.KEYID = 6
1,212,697 UART: [ldev] SUBJECT.KEYID = 5
1,213,123 UART: [ldev] AUTHORITY.KEYID = 7
1,213,586 UART: [ldev] FE.KEYID = 1
1,218,894 UART: [ldev] Erasing FE.KEYID = 1
1,245,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,788 UART: [ldev] --
1,285,265 UART: [fwproc] Wait for Commands...
1,285,843 UART: [fwproc] Recv command 0x46574c44
1,286,571 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,552 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,883 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,366 >>> mbox cmd response: success
2,830,522 UART: [afmc] ++
2,830,690 UART: [afmc] CDI.KEYID = 6
2,831,052 UART: [afmc] SUBJECT.KEYID = 7
2,831,477 UART: [afmc] AUTHORITY.KEYID = 5
2,866,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,231 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,979 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,688 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,308 UART: [afmc] --
2,910,380 UART: [cold-reset] --
2,911,204 UART: [state] Locking Datavault
2,912,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,981 UART: [state] Locking ICCM
2,913,571 UART: [exit] Launching FMC @ 0x40000130
2,918,901 UART:
2,918,917 UART: Running Caliptra FMC ...
2,919,325 UART:
2,919,468 UART: [state] CFI Enabled
2,929,994 UART: [fht] FMC Alias Private Key: 7
3,049,370 UART: [art] Extend RT PCRs Done
3,049,798 UART: [art] Lock RT PCRs Done
3,051,320 UART: [art] Populate DV Done
3,059,363 UART: [fht] FMC Alias Private Key: 7
3,060,461 UART: [art] Derive CDI
3,060,741 UART: [art] Store in slot 0x4
3,146,640 UART: [art] Derive Key Pair
3,147,000 UART: [art] Store priv key in slot 0x5
3,160,262 UART: [art] Derive Key Pair - Done
3,175,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,052 UART: [art] PUB.X = 4D3B423FFE7414C873D08E19EADBA2833BB86396CB900E270F9610F95B2917770B9EEF975026F97364B1FCB2B00096A5
3,197,793 UART: [art] PUB.Y = D6517A5334AA163082E3DB5A970200A7645919B6DC86A62164AFA0706C2AD594C32FE83F22B89273B85550CC733BFCE8
3,204,718 UART: [art] SIG.R = 8F8D26F288ACE6BC7E28FF465AB218AC126133A9575B354F642F9199348BEC8BC972CDAC7CA410A96326418171442E56
3,211,490 UART: [art] SIG.S = 60D87C390F38D655395135784F0A2106A41F5D5078F1005A7AFDB9F7660354AB8EE8587DB16989FA72528BD30A77B834
3,234,857 UART: Caliptra RT
3,235,200 UART: [state] CFI Enabled
3,354,853 UART: [rt] RT listening for mailbox commands...
3,355,523 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,243 UART: [rt]cmd =0x4c4d5356, len=1672
3,939,412 >>> mbox cmd response data (8 bytes)
3,939,413 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,618 UART: [rt]cmd =0x4c4d5356, len=1672
4,268,342 >>> mbox cmd response data (8 bytes)
4,268,343 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,400 UART: [rt]cmd =0x4c4d5356, len=1672
4,597,138 >>> mbox cmd response data (8 bytes)
4,597,139 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,637,342 UART: [rt]cmd =0x4c4d5356, len=1672
4,920,778 >>> mbox cmd response data (8 bytes)
4,920,779 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,961,000 UART: [rt]cmd =0x4c4d5356, len=1672
5,244,580 >>> mbox cmd response data (8 bytes)
5,244,581 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,284,660 UART: [rt]cmd =0x4c4d5356, len=1672
5,570,773 >>> mbox cmd response data (8 bytes)
5,570,774 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,610,883 UART: [rt]cmd =0x4c4d5356, len=1672
5,894,317 >>> mbox cmd response data (8 bytes)
5,894,318 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,934,459 UART: [rt]cmd =0x4c4d5356, len=1672
6,220,742 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,060 ready_for_fw is high
1,061,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,163 >>> mbox cmd response: success
2,744,006 UART:
2,744,022 UART: Running Caliptra FMC ...
2,744,430 UART:
2,744,573 UART: [state] CFI Enabled
2,755,269 UART: [fht] FMC Alias Private Key: 7
2,874,251 UART: [art] Extend RT PCRs Done
2,874,679 UART: [art] Lock RT PCRs Done
2,876,421 UART: [art] Populate DV Done
2,884,830 UART: [fht] FMC Alias Private Key: 7
2,885,940 UART: [art] Derive CDI
2,886,220 UART: [art] Store in slot 0x4
2,971,859 UART: [art] Derive Key Pair
2,972,219 UART: [art] Store priv key in slot 0x5
2,985,393 UART: [art] Derive Key Pair - Done
2,999,891 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,425 UART: [art] PUB.X = 01B7A4FD985AAE2E0DCBC5E13E45214B62F1AD94F04D91331EE5AC06BED1E5D42B409B0B9B01A6AEA670B342341D7C6F
3,023,200 UART: [art] PUB.Y = 43E6D19B2C8ECFB89ACC06E450AD59425197CBD404458BD0E1B59EC690A644A637E4B798E6AB7E6B4D5010EBF85107DC
3,030,155 UART: [art] SIG.R = 66FC72D71A0716610A31F77C0F8338756069A90A205974AEDB74AB0B00DCCEE4FDE1C58D0A6AA2F125EA5094F735B8EF
3,036,897 UART: [art] SIG.S = F3EAC4DD52357575860B12A825A91FC4660B3EA625541DD713588ED7B91C02A3BFE7E7B9FDC5AC20BFF2C8C352EAC226
3,060,546 UART: Caliptra RT
3,060,889 UART: [state] CFI Enabled
3,180,434 UART: [rt] RT listening for mailbox commands...
3,181,104 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,734 UART: [rt]cmd =0x4c4d5356, len=1672
3,764,889 >>> mbox cmd response data (8 bytes)
3,764,890 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,925 UART: [rt]cmd =0x4c4d5356, len=1672
4,093,537 >>> mbox cmd response data (8 bytes)
4,093,538 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,075 UART: [rt]cmd =0x4c4d5356, len=1672
4,422,883 >>> mbox cmd response data (8 bytes)
4,422,884 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,462,933 UART: [rt]cmd =0x4c4d5356, len=1672
4,746,375 >>> mbox cmd response data (8 bytes)
4,746,376 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,786,453 UART: [rt]cmd =0x4c4d5356, len=1672
5,070,231 >>> mbox cmd response data (8 bytes)
5,070,232 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,587 UART: [rt]cmd =0x4c4d5356, len=1672
5,396,706 >>> mbox cmd response data (8 bytes)
5,396,707 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,437,122 UART: [rt]cmd =0x4c4d5356, len=1672
5,720,710 >>> mbox cmd response data (8 bytes)
5,720,711 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,760,846 UART: [rt]cmd =0x4c4d5356, len=1672
6,046,999 >>> mbox cmd response data (8 bytes)
test test_lms::test_lms_verify_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,311 UART:
192,649 UART: Running Caliptra ROM ...
193,828 UART:
193,979 UART: [state] CFI Enabled
264,923 UART: [state] LifecycleState = Unprovisioned
266,908 UART: [state] DebugLocked = No
268,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,841 UART: [kat] SHA2-256
443,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,079 UART: [kat] ++
454,580 UART: [kat] sha1
464,530 UART: [kat] SHA2-256
467,193 UART: [kat] SHA2-384
473,324 UART: [kat] SHA2-512-ACC
475,688 UART: [kat] ECC-384
2,768,817 UART: [kat] HMAC-384Kdf
2,799,829 UART: [kat] LMS
3,990,104 UART: [kat] --
3,994,269 UART: [cold-reset] ++
3,995,423 UART: [fht] Storing FHT @ 0x50003400
4,007,730 UART: [idev] ++
4,008,341 UART: [idev] CDI.KEYID = 6
4,009,233 UART: [idev] SUBJECT.KEYID = 7
4,010,504 UART: [idev] UDS.KEYID = 0
4,011,510 ready_for_fw is high
4,011,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,783 UART: [idev] Erasing UDS.KEYID = 0
7,346,185 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,110 UART: [idev] --
7,374,073 UART: [ldev] ++
7,374,658 UART: [ldev] CDI.KEYID = 6
7,375,541 UART: [ldev] SUBJECT.KEYID = 5
7,376,807 UART: [ldev] AUTHORITY.KEYID = 7
7,378,039 UART: [ldev] FE.KEYID = 1
7,423,090 UART: [ldev] Erasing FE.KEYID = 1
10,759,692 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,710 UART: [ldev] --
13,137,022 UART: [fwproc] Waiting for Commands...
13,139,927 UART: [fwproc] Received command 0x46574c44
13,142,106 UART: [fwproc] Received Image of size 118548 bytes
17,244,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,394,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,878 >>> mbox cmd response: success
17,726,592 UART: [afmc] ++
17,727,210 UART: [afmc] CDI.KEYID = 6
17,728,125 UART: [afmc] SUBJECT.KEYID = 7
17,729,347 UART: [afmc] AUTHORITY.KEYID = 5
21,090,849 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,344 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,810 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,209 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,457,910 UART: [afmc] --
23,462,651 UART: [cold-reset] --
23,466,460 UART: [state] Locking Datavault
23,470,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,169 UART: [state] Locking ICCM
23,474,970 UART: [exit] Launching FMC @ 0x40000130
23,483,367 UART:
23,483,601 UART: Running Caliptra FMC ...
23,484,699 UART:
23,484,858 UART: [state] CFI Enabled
23,553,066 UART: [fht] FMC Alias Private Key: 7
25,893,440 UART: [art] Extend RT PCRs Done
25,894,665 UART: [art] Lock RT PCRs Done
25,896,014 UART: [art] Populate DV Done
25,901,277 UART: [fht] FMC Alias Private Key: 7
25,902,971 UART: [art] Derive CDI
25,903,707 UART: [art] Store in slot 0x4
25,961,729 UART: [art] Derive Key Pair
25,962,774 UART: [art] Store priv key in slot 0x5
29,255,276 UART: [art] Derive Key Pair - Done
29,268,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,281 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,790 UART: [art] PUB.X = 58B41DAC2235674076E8E0ED6DF669AD04E8E7DA25A28342EE3288FD493D6C08B3EF0E3C9EABC4A19F4798DDADFF35BD
31,566,100 UART: [art] PUB.Y = B24D5DD0B4A9B1F9AE3C3A499D81B9AA987EA662B1F18B0275F2731EAE84C0441498507AFC0324AD909E8E5F287B7D82
31,573,332 UART: [art] SIG.R = D89E9DA8A6B8FDB368E7C1962AD8BCF5E530846A56524847F7880A1D94D724EB91ED283BD4BF5ED4A31F64B1079850BC
31,580,719 UART: [art] SIG.S = 13F5B6BC8C5C1977D8058DBBD4B46F7EC7950CD10AC93E0DE341E83B9623ADFFB2761526D73C2632D897EAA2C9968342
32,886,005 UART: Caliptra RT
32,886,721 UART: [state] CFI Enabled
33,064,040 UART: [rt] RT listening for mailbox commands...
33,067,999 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,112,595 UART: [rt]cmd =0x4c4d5356, len=1672
34,375,981 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,804,998 ready_for_fw is high
3,805,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,945,135 >>> mbox cmd response: success
23,633,486 UART:
23,633,890 UART: Running Caliptra FMC ...
23,635,092 UART:
23,635,267 UART: [state] CFI Enabled
23,701,549 UART: [fht] FMC Alias Private Key: 7
26,041,324 UART: [art] Extend RT PCRs Done
26,042,544 UART: [art] Lock RT PCRs Done
26,044,503 UART: [art] Populate DV Done
26,049,930 UART: [fht] FMC Alias Private Key: 7
26,051,526 UART: [art] Derive CDI
26,052,293 UART: [art] Store in slot 0x4
26,109,426 UART: [art] Derive Key Pair
26,110,470 UART: [art] Store priv key in slot 0x5
29,402,923 UART: [art] Derive Key Pair - Done
29,416,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,747 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,257 UART: [art] PUB.X = 11411327F0B951F8DB4A0F3B71F4FBE3D302197237976C189F3BC17C23D3CBC919D613818FBDE6B9E132A9B73F1CD262
31,712,579 UART: [art] PUB.Y = 80F3ECF2D6C2E51341D60EF31C9DF235022351E09397B299E21F3D117E904D236C646C0E11904CE6302CCA32E3EAEEDF
31,719,773 UART: [art] SIG.R = 48AB1A39D52CC123B5B847EEA4737037BC45CDEC0ABA76AA3F42BB2C1795CF82F70B9DD994ACE2D8F3B7A7C4407FE380
31,727,221 UART: [art] SIG.S = EEF86281C191AAC877B8D0C25BC9516239544D99A9F8010E22A79E78E9C845F61453C0A7DCACDFF40D2845D0B4D113CE
33,032,514 UART: Caliptra RT
33,033,223 UART: [state] CFI Enabled
33,208,744 UART: [rt] RT listening for mailbox commands...
33,212,678 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,257,351 UART: [rt]cmd =0x4c4d5356, len=1672
34,520,320 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
192,453 UART:
192,809 UART: Running Caliptra ROM ...
193,994 UART:
603,557 UART: [state] CFI Enabled
613,621 UART: [state] LifecycleState = Unprovisioned
615,592 UART: [state] DebugLocked = No
618,046 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,774 UART: [kat] SHA2-256
793,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,039 UART: [kat] ++
804,490 UART: [kat] sha1
815,501 UART: [kat] SHA2-256
818,220 UART: [kat] SHA2-384
823,425 UART: [kat] SHA2-512-ACC
825,784 UART: [kat] ECC-384
3,109,499 UART: [kat] HMAC-384Kdf
3,122,370 UART: [kat] LMS
4,312,433 UART: [kat] --
4,318,101 UART: [cold-reset] ++
4,318,970 UART: [fht] Storing FHT @ 0x50003400
4,330,510 UART: [idev] ++
4,331,123 UART: [idev] CDI.KEYID = 6
4,332,013 UART: [idev] SUBJECT.KEYID = 7
4,333,256 UART: [idev] UDS.KEYID = 0
4,334,272 ready_for_fw is high
4,334,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,436 UART: [idev] Erasing UDS.KEYID = 0
7,619,171 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,928 UART: [idev] --
7,644,327 UART: [ldev] ++
7,644,892 UART: [ldev] CDI.KEYID = 6
7,645,823 UART: [ldev] SUBJECT.KEYID = 5
7,647,301 UART: [ldev] AUTHORITY.KEYID = 7
7,648,415 UART: [ldev] FE.KEYID = 1
7,658,326 UART: [ldev] Erasing FE.KEYID = 1
10,946,289 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,456 UART: [ldev] --
13,305,629 UART: [fwproc] Waiting for Commands...
13,308,311 UART: [fwproc] Received command 0x46574c44
13,310,540 UART: [fwproc] Received Image of size 118548 bytes
17,409,483 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,473 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,634 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,888,367 >>> mbox cmd response: success
17,892,364 UART: [afmc] ++
17,892,971 UART: [afmc] CDI.KEYID = 6
17,893,880 UART: [afmc] SUBJECT.KEYID = 7
17,895,148 UART: [afmc] AUTHORITY.KEYID = 5
21,205,888 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,496,447 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,498,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,513,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,527,872 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,542,297 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,563,002 UART: [afmc] --
23,566,391 UART: [cold-reset] --
23,571,751 UART: [state] Locking Datavault
23,575,503 UART: [state] Locking PCR0, PCR1 and PCR31
23,577,255 UART: [state] Locking ICCM
23,579,051 UART: [exit] Launching FMC @ 0x40000130
23,587,444 UART:
23,587,682 UART: Running Caliptra FMC ...
23,588,776 UART:
23,588,931 UART: [state] CFI Enabled
23,597,115 UART: [fht] FMC Alias Private Key: 7
25,937,744 UART: [art] Extend RT PCRs Done
25,938,966 UART: [art] Lock RT PCRs Done
25,940,682 UART: [art] Populate DV Done
25,945,983 UART: [fht] FMC Alias Private Key: 7
25,947,531 UART: [art] Derive CDI
25,948,342 UART: [art] Store in slot 0x4
25,991,364 UART: [art] Derive Key Pair
25,992,401 UART: [art] Store priv key in slot 0x5
29,234,569 UART: [art] Derive Key Pair - Done
29,247,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,528,113 UART: [art] Erasing AUTHORITY.KEYID = 7
31,529,623 UART: [art] PUB.X = 7D88F54FB15EB9AD81DF1E117028C8A9A45E59A0F74DBBAD981C0026C1F7D992C6DC31B4FF8C0FB3E840CFBE5B842DEA
31,536,926 UART: [art] PUB.Y = 353A8E7BA20D8CCCDB5B06B30BBBAF99EF3BC75CF46D384AFE1310D0804C40FC95C326CAC2C2D9FF582479E38B2A5155
31,544,202 UART: [art] SIG.R = 32F55721563230ADE4EFCE19FA9DA86B9EACA7246CD617F7053769346EA00C8187B583791308B9484523717BB00BAC5C
31,551,532 UART: [art] SIG.S = 8E2149B8631769BA796BB4E55BC46CB62A1A405004ED5527C9BCE15D6EFF2E0CC5D3DABE8C1072FB38E670790D180368
32,856,260 UART: Caliptra RT
32,856,967 UART: [state] CFI Enabled
32,990,489 UART: [rt] RT listening for mailbox commands...
32,994,415 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,038,668 UART: [rt]cmd =0x4c4d5356, len=1672
34,301,807 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,123,788 ready_for_fw is high
4,124,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,882 >>> mbox cmd response: success
23,795,538 UART:
23,795,945 UART: Running Caliptra FMC ...
23,797,087 UART:
23,797,257 UART: [state] CFI Enabled
23,804,992 UART: [fht] FMC Alias Private Key: 7
26,144,706 UART: [art] Extend RT PCRs Done
26,145,927 UART: [art] Lock RT PCRs Done
26,147,738 UART: [art] Populate DV Done
26,153,100 UART: [fht] FMC Alias Private Key: 7
26,154,742 UART: [art] Derive CDI
26,155,552 UART: [art] Store in slot 0x4
26,198,142 UART: [art] Derive Key Pair
26,199,142 UART: [art] Store priv key in slot 0x5
29,441,435 UART: [art] Derive Key Pair - Done
29,454,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,209 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,718 UART: [art] PUB.X = 4E9DC9A77C6B5E717B0E95D9F41CD90181E676F50EF7D8A09EE032FF6D281CA4506433BD6F76E04D96D084FA78DE746D
31,743,094 UART: [art] PUB.Y = BB1428B3768F14C346FB47C981800B8936520169D4C64D4042CC757D7C62A41CDE4CA06C9DBE9EA565EF65A0B52F62C2
31,750,236 UART: [art] SIG.R = 5A7CF05EABB161BCFB72422212B779296838F03F6A00E308859AA3F995426D388A1F35DE5AAF5509682B4B7F9F88D82C
31,757,572 UART: [art] SIG.S = 5A4D210D47032B08C76FF863217CB7A6A4CDBB7D6B6E030C6BFFAB6C519069FABCB7AD810044F0A2D14BA601ECDF2D29
33,063,072 UART: Caliptra RT
33,063,794 UART: [state] CFI Enabled
33,197,373 UART: [rt] RT listening for mailbox commands...
33,201,294 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,245,727 UART: [rt]cmd =0x4c4d5356, len=1672
34,509,108 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,068 UART:
192,441 UART: Running Caliptra ROM ...
193,603 UART:
193,758 UART: [state] CFI Enabled
263,425 UART: [state] LifecycleState = Unprovisioned
265,404 UART: [state] DebugLocked = No
267,286 UART: [state] WD Timer not started. Device not locked for debugging
272,036 UART: [kat] SHA2-256
451,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,479 UART: [kat] ++
463,014 UART: [kat] sha1
473,259 UART: [kat] SHA2-256
475,904 UART: [kat] SHA2-384
482,882 UART: [kat] SHA2-512-ACC
485,250 UART: [kat] ECC-384
2,945,974 UART: [kat] HMAC-384Kdf
2,969,308 UART: [kat] LMS
3,445,764 UART: [kat] --
3,450,492 UART: [cold-reset] ++
3,452,571 UART: [fht] FHT @ 0x50003400
3,463,546 UART: [idev] ++
3,464,113 UART: [idev] CDI.KEYID = 6
3,465,111 UART: [idev] SUBJECT.KEYID = 7
3,466,350 UART: [idev] UDS.KEYID = 0
3,467,269 ready_for_fw is high
3,467,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,628 UART: [idev] Erasing UDS.KEYID = 0
5,989,652 UART: [idev] Sha1 KeyId Algorithm
6,013,471 UART: [idev] --
6,018,112 UART: [ldev] ++
6,018,692 UART: [ldev] CDI.KEYID = 6
6,019,624 UART: [ldev] SUBJECT.KEYID = 5
6,020,837 UART: [ldev] AUTHORITY.KEYID = 7
6,022,075 UART: [ldev] FE.KEYID = 1
6,055,142 UART: [ldev] Erasing FE.KEYID = 1
8,563,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,325 UART: [ldev] --
10,372,951 UART: [fwproc] Wait for Commands...
10,374,615 UART: [fwproc] Recv command 0x46574c44
10,376,648 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,315 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,904 >>> mbox cmd response: success
14,345,552 UART: [afmc] ++
14,346,166 UART: [afmc] CDI.KEYID = 6
14,347,078 UART: [afmc] SUBJECT.KEYID = 7
14,348,295 UART: [afmc] AUTHORITY.KEYID = 5
16,893,605 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,968 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,750 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,786 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,390 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,193 UART: [afmc] --
18,695,162 UART: [cold-reset] --
18,698,377 UART: [state] Locking Datavault
18,702,485 UART: [state] Locking PCR0, PCR1 and PCR31
18,704,240 UART: [state] Locking ICCM
18,706,762 UART: [exit] Launching FMC @ 0x40000130
18,715,208 UART:
18,715,439 UART: Running Caliptra FMC ...
18,716,461 UART:
18,716,607 UART: [state] CFI Enabled
18,773,497 UART: [fht] FMC Alias Private Key: 7
20,540,047 UART: [art] Extend RT PCRs Done
20,541,280 UART: [art] Lock RT PCRs Done
20,542,714 UART: [art] Populate DV Done
20,548,181 UART: [fht] FMC Alias Private Key: 7
20,549,776 UART: [art] Derive CDI
20,550,587 UART: [art] Store in slot 0x4
20,606,331 UART: [art] Derive Key Pair
20,607,360 UART: [art] Store priv key in slot 0x5
23,069,901 UART: [art] Derive Key Pair - Done
23,082,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,368 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,872 UART: [art] PUB.X = 04D697F8897F327F5307F4C9BC4B31318772337E01F9CCABB5794A5111A3E8524CB077D4D1C4496422BFEBAA4335FA5E
24,804,127 UART: [art] PUB.Y = D03B43C6382BCC80F8774DDF072A3AF4C2170EDC2B556BF431A451ABA2AA0EE06DDF070EB04A44E48E50B2282001F089
24,811,423 UART: [art] SIG.R = BDAD804BD56218C9FF4E21CE51C657ECACDC79B9678A04CF39343259A736AE8F7DAB7463E417FC408BD8AB193E562B2F
24,818,813 UART: [art] SIG.S = A5E49B3056F707B7763A556C63277455F169B49FA39B05C863223EAEC578A467AFD816EE60A541AB43934703BE0D8E85
25,798,047 UART: Caliptra RT
25,798,749 UART: [state] CFI Enabled
25,978,349 UART: [rt] RT listening for mailbox commands...
25,982,296 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,026,962 UART: [rt]cmd =0x4c4d5356, len=1672
26,473,428 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,838 writing to cptra_bootfsm_go
3,459,547 ready_for_fw is high
3,460,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,015 >>> mbox cmd response: success
18,514,565 UART:
18,514,976 UART: Running Caliptra FMC ...
18,516,091 UART:
18,516,246 UART: [state] CFI Enabled
18,580,887 UART: [fht] FMC Alias Private Key: 7
20,346,931 UART: [art] Extend RT PCRs Done
20,348,154 UART: [art] Lock RT PCRs Done
20,350,072 UART: [art] Populate DV Done
20,355,715 UART: [fht] FMC Alias Private Key: 7
20,357,196 UART: [art] Derive CDI
20,357,960 UART: [art] Store in slot 0x4
20,412,999 UART: [art] Derive Key Pair
20,414,043 UART: [art] Store priv key in slot 0x5
22,877,197 UART: [art] Derive Key Pair - Done
22,890,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,931 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,449 UART: [art] PUB.X = E1A5B3F1738C9541A2BC1FBA8F96D75ECF5E845EAEF7A04A0445B50994760ACEDCEC14136A489D6D480609FDEEE6D342
24,611,757 UART: [art] PUB.Y = F8C65A7284CF95068E2C4326D8F73A20DF80E0899E676E0A01B4E336F75BF979A0906D933EA4BE6A1D7CAC7DAF7F164F
24,618,972 UART: [art] SIG.R = 0B23C4AFD93B788AF327D751C4C61778B59DE9DF95337FE9B88943C9D48046F72C9EA15D6715AA66A99417914F1670B7
24,626,379 UART: [art] SIG.S = 738F158DDC528056D19D1A0523BB8B4F186BAB28E08C8CBF06F443FF5A86AA36B1C07E25F82ECCD4817B5C33BD567440
25,605,350 UART: Caliptra RT
25,606,054 UART: [state] CFI Enabled
25,785,693 UART: [rt] RT listening for mailbox commands...
25,789,620 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,833,858 UART: [rt]cmd =0x4c4d5356, len=1672
26,279,890 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,331 UART:
192,716 UART: Running Caliptra ROM ...
193,814 UART:
603,663 UART: [state] CFI Enabled
617,196 UART: [state] LifecycleState = Unprovisioned
619,139 UART: [state] DebugLocked = No
620,661 UART: [state] WD Timer not started. Device not locked for debugging
624,698 UART: [kat] SHA2-256
804,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,117 UART: [kat] ++
815,638 UART: [kat] sha1
826,983 UART: [kat] SHA2-256
829,653 UART: [kat] SHA2-384
836,644 UART: [kat] SHA2-512-ACC
839,025 UART: [kat] ECC-384
3,280,038 UART: [kat] HMAC-384Kdf
3,292,132 UART: [kat] LMS
3,768,604 UART: [kat] --
3,772,953 UART: [cold-reset] ++
3,774,393 UART: [fht] FHT @ 0x50003400
3,786,683 UART: [idev] ++
3,787,273 UART: [idev] CDI.KEYID = 6
3,788,317 UART: [idev] SUBJECT.KEYID = 7
3,789,496 UART: [idev] UDS.KEYID = 0
3,790,425 ready_for_fw is high
3,790,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,495 UART: [idev] Erasing UDS.KEYID = 0
6,268,541 UART: [idev] Sha1 KeyId Algorithm
6,292,203 UART: [idev] --
6,296,635 UART: [ldev] ++
6,297,205 UART: [ldev] CDI.KEYID = 6
6,298,171 UART: [ldev] SUBJECT.KEYID = 5
6,299,331 UART: [ldev] AUTHORITY.KEYID = 7
6,300,643 UART: [ldev] FE.KEYID = 1
6,311,132 UART: [ldev] Erasing FE.KEYID = 1
8,787,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,700 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,992 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,225 UART: [ldev] --
10,586,443 UART: [fwproc] Wait for Commands...
10,588,322 UART: [fwproc] Recv command 0x46574c44
10,590,317 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,333 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,227 >>> mbox cmd response: success
14,567,025 UART: [afmc] ++
14,567,659 UART: [afmc] CDI.KEYID = 6
14,568,551 UART: [afmc] SUBJECT.KEYID = 7
14,569,770 UART: [afmc] AUTHORITY.KEYID = 5
17,078,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,806,102 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,837,991 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,531 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,632 UART: [afmc] --
18,881,448 UART: [cold-reset] --
18,884,828 UART: [state] Locking Datavault
18,887,699 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,456 UART: [state] Locking ICCM
18,891,662 UART: [exit] Launching FMC @ 0x40000130
18,900,076 UART:
18,900,378 UART: Running Caliptra FMC ...
18,901,494 UART:
18,901,659 UART: [state] CFI Enabled
18,909,495 UART: [fht] FMC Alias Private Key: 7
20,675,728 UART: [art] Extend RT PCRs Done
20,676,939 UART: [art] Lock RT PCRs Done
20,678,644 UART: [art] Populate DV Done
20,684,108 UART: [fht] FMC Alias Private Key: 7
20,685,699 UART: [art] Derive CDI
20,686,439 UART: [art] Store in slot 0x4
20,728,979 UART: [art] Derive Key Pair
20,729,977 UART: [art] Store priv key in slot 0x5
23,156,870 UART: [art] Derive Key Pair - Done
23,169,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,353 UART: [art] Erasing AUTHORITY.KEYID = 7
24,877,836 UART: [art] PUB.X = 4DEF772625CBDA3380AAC018562B65E7D69D96292C12B73D92512771F7DBDD5E6F71224B14963BC8D0625F99B5A9F37C
24,885,147 UART: [art] PUB.Y = 368EB3E88540DEEB053D85BCD870878DF9E8250F81D573E3668C2DC009C0964BC6D638C0E3CF7A329D4F59BA0A47945D
24,892,385 UART: [art] SIG.R = D4E3D6E4377C6A783D40C7A02E4B9927E5A12C4DA53A68F76A0255172D6DBBE04E43F52D7005FE2D9B4843C6DE48E685
24,899,861 UART: [art] SIG.S = F0E8222B9D70BA7A8741278030FE574390DE053D5F86EED2F555319FDA63F7D05940540ADA9541E87DC03C6D04CC68EC
25,878,781 UART: Caliptra RT
25,879,471 UART: [state] CFI Enabled
26,012,358 UART: [rt] RT listening for mailbox commands...
26,016,439 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,061,041 UART: [rt]cmd =0x4c4d5356, len=1672
26,507,640 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,780,972 ready_for_fw is high
3,781,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,590 >>> mbox cmd response: success
18,702,822 UART:
18,703,214 UART: Running Caliptra FMC ...
18,704,422 UART:
18,704,605 UART: [state] CFI Enabled
18,712,010 UART: [fht] FMC Alias Private Key: 7
20,478,838 UART: [art] Extend RT PCRs Done
20,480,064 UART: [art] Lock RT PCRs Done
20,481,866 UART: [art] Populate DV Done
20,487,203 UART: [fht] FMC Alias Private Key: 7
20,488,856 UART: [art] Derive CDI
20,489,675 UART: [art] Store in slot 0x4
20,532,397 UART: [art] Derive Key Pair
20,533,437 UART: [art] Store priv key in slot 0x5
22,960,173 UART: [art] Derive Key Pair - Done
22,973,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,058 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,567 UART: [art] PUB.X = 5D66B2EAAB4139FAEE5294DF5216DC3DB925DD2FBB8F99C8F6120FAAE34E9CE9F815F54DAF5B21248EC187F96F893358
24,687,878 UART: [art] PUB.Y = 4C50F0D8F0E2CBE3C6ED67B0030B21D46A1AF601786E4991647E99D5822DD334369D883ADE1DEE49EA540A1042ECCA0D
24,695,088 UART: [art] SIG.R = 79BD656E5753E8692EE8D3E857D75CC2A8153D06D421C467EAA0DA0DCCA7A4775D3D902DC80986B67DFB78F575B52533
24,702,500 UART: [art] SIG.S = 86B7E7EA7ACB9DF39AC957B144D6C36611A3087AD3BF2A65CE960BD13758C64BA067277D9A4103E9907220A750977164
25,680,881 UART: Caliptra RT
25,681,595 UART: [state] CFI Enabled
25,814,071 UART: [rt] RT listening for mailbox commands...
25,817,971 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,862,538 UART: [rt]cmd =0x4c4d5356, len=1672
26,308,683 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,353 UART:
192,713 UART: Running Caliptra ROM ...
193,897 UART:
194,047 UART: [state] CFI Enabled
264,301 UART: [state] LifecycleState = Unprovisioned
266,692 UART: [state] DebugLocked = No
269,002 UART: [state] WD Timer not started. Device not locked for debugging
273,342 UART: [kat] SHA2-256
463,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,964 UART: [kat] ++
474,477 UART: [kat] sha1
486,292 UART: [kat] SHA2-256
489,307 UART: [kat] SHA2-384
495,646 UART: [kat] SHA2-512-ACC
498,220 UART: [kat] ECC-384
2,946,867 UART: [kat] HMAC-384Kdf
2,970,610 UART: [kat] LMS
3,502,372 UART: [kat] --
3,508,380 UART: [cold-reset] ++
3,510,460 UART: [fht] FHT @ 0x50003400
3,521,224 UART: [idev] ++
3,521,864 UART: [idev] CDI.KEYID = 6
3,522,894 UART: [idev] SUBJECT.KEYID = 7
3,524,070 UART: [idev] UDS.KEYID = 0
3,524,994 ready_for_fw is high
3,525,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,259 UART: [idev] Erasing UDS.KEYID = 0
6,026,063 UART: [idev] Sha1 KeyId Algorithm
6,048,627 UART: [idev] --
6,053,514 UART: [ldev] ++
6,054,243 UART: [ldev] CDI.KEYID = 6
6,055,136 UART: [ldev] SUBJECT.KEYID = 5
6,056,289 UART: [ldev] AUTHORITY.KEYID = 7
6,057,515 UART: [ldev] FE.KEYID = 1
6,100,162 UART: [ldev] Erasing FE.KEYID = 1
8,608,285 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,300 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,825 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,568 UART: [ldev] --
10,413,636 UART: [fwproc] Wait for Commands...
10,415,900 UART: [fwproc] Recv command 0x46574c44
10,418,202 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,181 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,828 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,035 >>> mbox cmd response: success
14,683,365 UART: [afmc] ++
14,684,100 UART: [afmc] CDI.KEYID = 6
14,685,293 UART: [afmc] SUBJECT.KEYID = 7
14,686,724 UART: [afmc] AUTHORITY.KEYID = 5
17,210,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,144 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,007 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,583 UART: [afmc] --
19,009,681 UART: [cold-reset] --
19,013,070 UART: [state] Locking Datavault
19,018,113 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,267 UART: [state] Locking ICCM
19,022,425 UART: [exit] Launching FMC @ 0x40000130
19,031,116 UART:
19,031,349 UART: Running Caliptra FMC ...
19,032,377 UART:
19,032,523 UART: [state] CFI Enabled
19,092,836 UART: [fht] FMC Alias Private Key: 7
20,859,357 UART: [art] Extend RT PCRs Done
20,860,583 UART: [art] Lock RT PCRs Done
20,861,962 UART: [art] Populate DV Done
20,867,153 UART: [fht] FMC Alias Private Key: 7
20,868,854 UART: [art] Derive CDI
20,869,685 UART: [art] Store in slot 0x4
20,925,405 UART: [art] Derive Key Pair
20,926,426 UART: [art] Store priv key in slot 0x5
23,388,762 UART: [art] Derive Key Pair - Done
23,401,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,270 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,779 UART: [art] PUB.X = 0926A5EBAD2B2A4A6F7F13C635E24EB4A2F1D5C4C638F1CB51BAED5B1B4E99B1142DDE83EFD848FCD3215CA33933E7D5
25,123,102 UART: [art] PUB.Y = 7D35B91254B11677B394F8AAFC2B2ADA30DCABA385320BD154F3A22621DACD85F43B62809814F90E41B2E08496B10EFE
25,130,344 UART: [art] SIG.R = 3BE03CE6CEE1B4699380A9DB2B704942DA7F960EB0DED2078058C6E6452EF99396CE94A091C9184FC026EFA94CC78ECB
25,137,746 UART: [art] SIG.S = 4113C79B7BC6C3371D2D159477ACDC41B566E270DDC34A863A4F4933596C776E85E2190C525D7AEC408F9D3C2CA98EE5
26,116,783 UART: Caliptra RT
26,117,471 UART: [state] CFI Enabled
26,297,636 UART: [rt] RT listening for mailbox commands...
26,301,600 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,346,270 UART: [rt]cmd =0x4c4d5356, len=1672
26,792,963 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,440,682 ready_for_fw is high
3,441,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,611 >>> mbox cmd response: success
19,132,987 UART:
19,133,388 UART: Running Caliptra FMC ...
19,134,582 UART:
19,134,784 UART: [state] CFI Enabled
19,201,704 UART: [fht] FMC Alias Private Key: 7
20,968,223 UART: [art] Extend RT PCRs Done
20,969,441 UART: [art] Lock RT PCRs Done
20,971,173 UART: [art] Populate DV Done
20,976,325 UART: [fht] FMC Alias Private Key: 7
20,977,920 UART: [art] Derive CDI
20,978,734 UART: [art] Store in slot 0x4
21,034,642 UART: [art] Derive Key Pair
21,035,680 UART: [art] Store priv key in slot 0x5
23,498,267 UART: [art] Derive Key Pair - Done
23,510,845 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,883 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,392 UART: [art] PUB.X = 3693EB48F85C47B8CF63FE9543E6B91F31DE4DEC0CE2F03D2EFA7D646D47502ACF0E7D5CD948EA342A4A1119C85714B7
25,233,674 UART: [art] PUB.Y = F186AC544986F25EF01DF464FE63F0D42FC8E361EC56C1ED075F1530C1EEDF49AE3A1DBEBDCE982DDB1C8E9FF8A3CA40
25,240,964 UART: [art] SIG.R = FE697DD5FFB7996BAE7E748697D1C4159B8977064686B5ACDB6947FA69D52B6E70AFA7261D41BE9C23FA5ED80FC43C6E
25,248,426 UART: [art] SIG.S = 19F82BC06D23BD9BE4F09E0ECA8CBD06006A5E4314B9050413C876B83AAE57BF804C5C84DC21176E0E08AAEC2361E1C2
26,227,065 UART: Caliptra RT
26,227,755 UART: [state] CFI Enabled
26,409,611 UART: [rt] RT listening for mailbox commands...
26,413,543 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,457,959 UART: [rt]cmd =0x4c4d5356, len=1672
26,904,288 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,374 UART:
192,745 UART: Running Caliptra ROM ...
193,850 UART:
603,640 UART: [state] CFI Enabled
616,959 UART: [state] LifecycleState = Unprovisioned
619,349 UART: [state] DebugLocked = No
620,512 UART: [state] WD Timer not started. Device not locked for debugging
624,269 UART: [kat] SHA2-256
814,085 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,887 UART: [kat] ++
825,417 UART: [kat] sha1
837,997 UART: [kat] SHA2-256
841,011 UART: [kat] SHA2-384
846,368 UART: [kat] SHA2-512-ACC
848,954 UART: [kat] ECC-384
3,289,177 UART: [kat] HMAC-384Kdf
3,303,086 UART: [kat] LMS
3,834,918 UART: [kat] --
3,839,759 UART: [cold-reset] ++
3,841,408 UART: [fht] FHT @ 0x50003400
3,851,606 UART: [idev] ++
3,852,251 UART: [idev] CDI.KEYID = 6
3,853,288 UART: [idev] SUBJECT.KEYID = 7
3,854,463 UART: [idev] UDS.KEYID = 0
3,855,407 ready_for_fw is high
3,855,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,454 UART: [idev] Erasing UDS.KEYID = 0
6,331,999 UART: [idev] Sha1 KeyId Algorithm
6,354,836 UART: [idev] --
6,360,007 UART: [ldev] ++
6,360,714 UART: [ldev] CDI.KEYID = 6
6,361,634 UART: [ldev] SUBJECT.KEYID = 5
6,362,817 UART: [ldev] AUTHORITY.KEYID = 7
6,364,054 UART: [ldev] FE.KEYID = 1
6,376,110 UART: [ldev] Erasing FE.KEYID = 1
8,856,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,753 UART: [ldev] --
10,648,237 UART: [fwproc] Wait for Commands...
10,649,898 UART: [fwproc] Recv command 0x46574c44
10,652,208 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,236,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,637 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,591 >>> mbox cmd response: success
14,923,638 UART: [afmc] ++
14,924,364 UART: [afmc] CDI.KEYID = 6
14,925,566 UART: [afmc] SUBJECT.KEYID = 7
14,927,029 UART: [afmc] AUTHORITY.KEYID = 5
17,423,350 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,743 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,718 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,825 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,823 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,769 UART: [afmc] --
19,219,477 UART: [cold-reset] --
19,223,281 UART: [state] Locking Datavault
19,227,326 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,488 UART: [state] Locking ICCM
19,231,543 UART: [exit] Launching FMC @ 0x40000130
19,240,208 UART:
19,240,449 UART: Running Caliptra FMC ...
19,241,554 UART:
19,241,722 UART: [state] CFI Enabled
19,249,774 UART: [fht] FMC Alias Private Key: 7
21,015,759 UART: [art] Extend RT PCRs Done
21,016,982 UART: [art] Lock RT PCRs Done
21,018,613 UART: [art] Populate DV Done
21,024,032 UART: [fht] FMC Alias Private Key: 7
21,025,591 UART: [art] Derive CDI
21,026,412 UART: [art] Store in slot 0x4
21,069,173 UART: [art] Derive Key Pair
21,070,216 UART: [art] Store priv key in slot 0x5
23,496,205 UART: [art] Derive Key Pair - Done
23,509,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,168 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,702 UART: [art] PUB.X = 1B9CAB33B2CD039F321D1DF8BF9D2BA832342D9B836EED4549FF21CD1AFD6A4F3C335D42EB36D90AEBE30511C7C8808B
25,223,985 UART: [art] PUB.Y = 0643180DD7C49BB6F456A18F70B247469B3E60670EAF6BF7548B7922D088A20BE60D68EE0EFB16A5E0DF112D7A341F97
25,231,200 UART: [art] SIG.R = 141B9C4E993D35A301DF65F7D11468F4503537539262002239A92A6FBACD3AF833BCFBAED768462BBAEC8328E9DD1E6C
25,238,636 UART: [art] SIG.S = C21BDC7843DFC7E741A7A8551784FCC4FF3228D3179A189666730A9F17F26CD8B5BB02F5929661C0D8D70D1B195C0F5A
26,217,163 UART: Caliptra RT
26,217,858 UART: [state] CFI Enabled
26,350,163 UART: [rt] RT listening for mailbox commands...
26,354,092 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,398,545 UART: [rt]cmd =0x4c4d5356, len=1672
26,844,799 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,755,468 ready_for_fw is high
3,755,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,568 >>> mbox cmd response: success
19,305,645 UART:
19,306,046 UART: Running Caliptra FMC ...
19,307,205 UART:
19,307,368 UART: [state] CFI Enabled
19,315,434 UART: [fht] FMC Alias Private Key: 7
21,081,732 UART: [art] Extend RT PCRs Done
21,082,964 UART: [art] Lock RT PCRs Done
21,084,629 UART: [art] Populate DV Done
21,089,790 UART: [fht] FMC Alias Private Key: 7
21,091,346 UART: [art] Derive CDI
21,092,171 UART: [art] Store in slot 0x4
21,134,934 UART: [art] Derive Key Pair
21,135,980 UART: [art] Store priv key in slot 0x5
23,562,216 UART: [art] Derive Key Pair - Done
23,575,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,465 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,977 UART: [art] PUB.X = 6794136BFFEB68DB82E3376B178207B8D611111566386B57C4598C4A06BC08BE1B241700973FBC39D12BD07D7620A7B9
25,290,249 UART: [art] PUB.Y = 484574DAC4774E2283CF306C3DF283471220B8BF3E7AB0B060305475F9CBACA86A91E561EFEC2A2D2429F412CAE5660F
25,297,463 UART: [art] SIG.R = CEE0B3A3A5E2017568D15C9AD50317B8456E0DBD6678C53B8383923CC77D0484FAC885F8E285A40E743109B84C9F7E64
25,304,868 UART: [art] SIG.S = 31189396C5342D73C4A01D126408F4B8BAC2DB2F02D517ECA3A04649C3B24E5B36F39E2C943263D2B8BF278349CFC8C2
26,283,806 UART: Caliptra RT
26,284,501 UART: [state] CFI Enabled
26,417,288 UART: [rt] RT listening for mailbox commands...
26,421,205 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,465,773 UART: [rt]cmd =0x4c4d5356, len=1672
26,912,212 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,199 UART: [kat] SHA2-256
882,130 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,245 UART: [kat] ++
886,397 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,792 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,037 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,250 UART: [idev] ++
1,479,418 UART: [idev] CDI.KEYID = 6
1,479,778 UART: [idev] SUBJECT.KEYID = 7
1,480,202 UART: [idev] UDS.KEYID = 0
1,480,547 ready_for_fw is high
1,480,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,484 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,526 UART: [idev] --
1,514,565 UART: [ldev] ++
1,514,733 UART: [ldev] CDI.KEYID = 6
1,515,096 UART: [ldev] SUBJECT.KEYID = 5
1,515,522 UART: [ldev] AUTHORITY.KEYID = 7
1,515,985 UART: [ldev] FE.KEYID = 1
1,521,205 UART: [ldev] Erasing FE.KEYID = 1
1,546,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,496 UART: [ldev] --
1,585,957 UART: [fwproc] Waiting for Commands...
1,586,814 UART: [fwproc] Received command 0x46574c44
1,587,605 UART: [fwproc] Received Image of size 118548 bytes
2,932,641 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,295 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,513 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,938 >>> mbox cmd response: success
3,132,006 UART: [afmc] ++
3,132,174 UART: [afmc] CDI.KEYID = 6
3,132,536 UART: [afmc] SUBJECT.KEYID = 7
3,132,961 UART: [afmc] AUTHORITY.KEYID = 5
3,168,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,800 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,580 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,289 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,172 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,855 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,821 UART: [afmc] --
3,211,837 UART: [cold-reset] --
3,212,513 UART: [state] Locking Datavault
3,213,764 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,368 UART: [state] Locking ICCM
3,214,828 UART: [exit] Launching FMC @ 0x40000130
3,220,158 UART:
3,220,174 UART: Running Caliptra FMC ...
3,220,582 UART:
3,220,636 UART: [state] CFI Enabled
3,231,262 UART: [fht] FMC Alias Private Key: 7
3,350,906 UART: [art] Extend RT PCRs Done
3,351,334 UART: [art] Lock RT PCRs Done
3,352,556 UART: [art] Populate DV Done
3,361,063 UART: [fht] FMC Alias Private Key: 7
3,362,029 UART: [art] Derive CDI
3,362,309 UART: [art] Store in slot 0x4
3,448,095 UART: [art] Derive Key Pair
3,448,455 UART: [art] Store priv key in slot 0x5
3,461,614 UART: [art] Derive Key Pair - Done
3,476,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,881 UART: [art] PUB.X = 0861552FC362CF0DBCD622B4CA00B5A2990AA35271F10AB70AB4A276BF48F1B82D5E36F7CC49B6BF4B51C65ACB6BDBEB
3,499,638 UART: [art] PUB.Y = 95AF9D14E582331F55B47D66927B3941FF5EBDF55641667E8E793E9D109C18BF033A147C5DC03AB08BD94C7BFEC33A9F
3,506,595 UART: [art] SIG.R = 2FE0528E498A6181CEB4FB7A53331CAB9275620AB07833AC64418D7E52DB1A31DCF7F6E9218EE0934FB79A4D4BF4D28A
3,513,374 UART: [art] SIG.S = 346D38033A8E40071422597037CEC7DD54EE888C16BFE7A5ADEFD891353EB6910FB7DC356F229F6CECE9411E39F6C0E5
3,537,411 UART: Caliptra RT
3,537,662 UART: [state] CFI Enabled
3,657,983 UART: [rt] RT listening for mailbox commands...
3,658,653 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,449 UART: [rt]cmd =0x4c4d5356, len=1672
5,498,849 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,299 ready_for_fw is high
1,362,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,588 >>> mbox cmd response: success
3,040,423 UART:
3,040,439 UART: Running Caliptra FMC ...
3,040,847 UART:
3,040,901 UART: [state] CFI Enabled
3,050,939 UART: [fht] FMC Alias Private Key: 7
3,169,185 UART: [art] Extend RT PCRs Done
3,169,613 UART: [art] Lock RT PCRs Done
3,171,341 UART: [art] Populate DV Done
3,179,608 UART: [fht] FMC Alias Private Key: 7
3,180,604 UART: [art] Derive CDI
3,180,884 UART: [art] Store in slot 0x4
3,266,428 UART: [art] Derive Key Pair
3,266,788 UART: [art] Store priv key in slot 0x5
3,279,857 UART: [art] Derive Key Pair - Done
3,295,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,153 UART: [art] PUB.X = 206E6A5CD0720F34CA63D558E3C7C7FE0DD24311E230F239ED2F68B6B9C813BE7F7B8458EC40865F09AC31DEB16ED1F7
3,317,928 UART: [art] PUB.Y = 225900F937469F24D477C24E85EBFE8167773B1C41E31D66C8BAAA6A38127E325FC03A30B085A52758D902E3335DA1D4
3,324,851 UART: [art] SIG.R = 4AD22F7A861C97A0BF9C5818D824FF4A1F0E51E7EFA7A3C47E78336CEE8B1B783E54A4246FC4C76FA7D7E50B95A35DC6
3,331,633 UART: [art] SIG.S = 39C9F09FC81D4CFA6E8F0E250F29B4269CE70EC458AF577B9E8187E9789950FCCB26016AFDED790ACE5F85438735D6EB
3,355,282 UART: Caliptra RT
3,355,533 UART: [state] CFI Enabled
3,474,980 UART: [rt] RT listening for mailbox commands...
3,475,650 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,114 UART: [rt]cmd =0x4c4d5356, len=1672
5,315,720 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,332 UART: [kat] SHA2-256
882,263 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,378 UART: [kat] ++
886,530 UART: [kat] sha1
890,882 UART: [kat] SHA2-256
892,820 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,405 UART: [kat] HMAC-384Kdf
908,007 UART: [kat] LMS
1,476,203 UART: [kat] --
1,476,892 UART: [cold-reset] ++
1,477,320 UART: [fht] Storing FHT @ 0x50003400
1,480,073 UART: [idev] ++
1,480,241 UART: [idev] CDI.KEYID = 6
1,480,601 UART: [idev] SUBJECT.KEYID = 7
1,481,025 UART: [idev] UDS.KEYID = 0
1,481,370 ready_for_fw is high
1,481,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,499 UART: [idev] Erasing UDS.KEYID = 0
1,505,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,061 UART: [idev] --
1,515,108 UART: [ldev] ++
1,515,276 UART: [ldev] CDI.KEYID = 6
1,515,639 UART: [ldev] SUBJECT.KEYID = 5
1,516,065 UART: [ldev] AUTHORITY.KEYID = 7
1,516,528 UART: [ldev] FE.KEYID = 1
1,521,942 UART: [ldev] Erasing FE.KEYID = 1
1,547,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,949 UART: [ldev] --
1,587,390 UART: [fwproc] Waiting for Commands...
1,588,025 UART: [fwproc] Received command 0x46574c44
1,588,816 UART: [fwproc] Received Image of size 118548 bytes
2,933,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,192 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,410 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,659 >>> mbox cmd response: success
3,132,891 UART: [afmc] ++
3,133,059 UART: [afmc] CDI.KEYID = 6
3,133,421 UART: [afmc] SUBJECT.KEYID = 7
3,133,846 UART: [afmc] AUTHORITY.KEYID = 5
3,168,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,169 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,658 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,541 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,224 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,058 UART: [afmc] --
3,212,056 UART: [cold-reset] --
3,212,786 UART: [state] Locking Datavault
3,214,177 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,781 UART: [state] Locking ICCM
3,215,279 UART: [exit] Launching FMC @ 0x40000130
3,220,609 UART:
3,220,625 UART: Running Caliptra FMC ...
3,221,033 UART:
3,221,176 UART: [state] CFI Enabled
3,231,784 UART: [fht] FMC Alias Private Key: 7
3,350,728 UART: [art] Extend RT PCRs Done
3,351,156 UART: [art] Lock RT PCRs Done
3,352,412 UART: [art] Populate DV Done
3,360,745 UART: [fht] FMC Alias Private Key: 7
3,361,917 UART: [art] Derive CDI
3,362,197 UART: [art] Store in slot 0x4
3,447,995 UART: [art] Derive Key Pair
3,448,355 UART: [art] Store priv key in slot 0x5
3,461,432 UART: [art] Derive Key Pair - Done
3,476,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,313 UART: [art] PUB.X = C652667AF859A82A75D409442698408B573FB178760374B04CA32C2D7EB20A1CD3A6661FB36C6EF249F51492DB75DEA8
3,499,074 UART: [art] PUB.Y = 62AF1E9B05194AD35ABAD644A70F332CB0A831EA65A116402CC33E89D8F680C8D445888F86C488A7D8391E0DEE05FA42
3,506,020 UART: [art] SIG.R = 0493DD269F97E710AC9649BC17D8B5512A3D72C21A0A5B8FC4DF824B74B0329697462E2D1C11B4035266A893285AD87D
3,512,779 UART: [art] SIG.S = 0EF2AF8B47454908BA35CD7618E9364E8AE94263610C1C079AA4B86539BA78B031C132CA400E7F1555A4B30E051EC561
3,536,438 UART: Caliptra RT
3,536,781 UART: [state] CFI Enabled
3,656,794 UART: [rt] RT listening for mailbox commands...
3,657,464 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,414 UART: [rt]cmd =0x4c4d5356, len=1672
5,497,940 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 ready_for_fw is high
1,362,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,533 >>> mbox cmd response: success
3,043,898 UART:
3,043,914 UART: Running Caliptra FMC ...
3,044,322 UART:
3,044,465 UART: [state] CFI Enabled
3,055,081 UART: [fht] FMC Alias Private Key: 7
3,173,747 UART: [art] Extend RT PCRs Done
3,174,175 UART: [art] Lock RT PCRs Done
3,175,925 UART: [art] Populate DV Done
3,183,944 UART: [fht] FMC Alias Private Key: 7
3,185,070 UART: [art] Derive CDI
3,185,350 UART: [art] Store in slot 0x4
3,271,186 UART: [art] Derive Key Pair
3,271,546 UART: [art] Store priv key in slot 0x5
3,284,343 UART: [art] Derive Key Pair - Done
3,299,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,704 UART: [art] PUB.X = 17249070C2EEB2FB41EC4B6034A047FDEEC648F0EE4487C414D7D9DDCEBE51E277987522A2F6DD94DBB5E33192E086D1
3,322,488 UART: [art] PUB.Y = 88FD9E8488280273667D77A819878450A44E9F3D4AF7D24C58939047D060C91216BD5E8C366AE918CAA0D4152E4BA247
3,329,429 UART: [art] SIG.R = D08458C4417081A9C35BE43762B79FD2FAE00F0553B20184800CF1CC3311AB0AAC525718D163F4ACE36FD15A27663330
3,336,184 UART: [art] SIG.S = CA011AD9A9930189E3796BCE9EA2854DD59723B06ED1806B27F9B9344DAC585B7382D1EC4EF6C554712A61009C1627D0
3,359,742 UART: Caliptra RT
3,360,085 UART: [state] CFI Enabled
3,480,098 UART: [rt] RT listening for mailbox commands...
3,480,768 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,414 UART: [rt]cmd =0x4c4d5356, len=1672
5,320,816 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,780 UART: [kat] SHA2-256
891,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,434 UART: [kat] ++
895,586 UART: [kat] sha1
899,838 UART: [kat] SHA2-256
901,778 UART: [kat] SHA2-384
904,683 UART: [kat] SHA2-512-ACC
906,584 UART: [kat] ECC-384
916,191 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,184 UART: [fht] FHT @ 0x50003400
1,173,046 UART: [idev] ++
1,173,214 UART: [idev] CDI.KEYID = 6
1,173,575 UART: [idev] SUBJECT.KEYID = 7
1,174,000 UART: [idev] UDS.KEYID = 0
1,174,346 ready_for_fw is high
1,174,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,109 UART: [idev] Sha1 KeyId Algorithm
1,208,135 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,704 UART: [ldev] Erasing FE.KEYID = 1
1,241,779 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,937 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,606 UART: [ldev] --
1,280,901 UART: [fwproc] Wait for Commands...
1,281,470 UART: [fwproc] Recv command 0x46574c44
1,282,203 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,300 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,493 >>> mbox cmd response: success
2,825,709 UART: [afmc] ++
2,825,877 UART: [afmc] CDI.KEYID = 6
2,826,240 UART: [afmc] SUBJECT.KEYID = 7
2,826,666 UART: [afmc] AUTHORITY.KEYID = 5
2,862,765 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,774 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,475 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,086 UART: [afmc] --
2,906,083 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,907,842 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,446 UART: [state] Locking ICCM
2,909,008 UART: [exit] Launching FMC @ 0x40000130
2,914,338 UART:
2,914,354 UART: Running Caliptra FMC ...
2,914,762 UART:
2,914,816 UART: [state] CFI Enabled
2,925,298 UART: [fht] FMC Alias Private Key: 7
3,044,728 UART: [art] Extend RT PCRs Done
3,045,156 UART: [art] Lock RT PCRs Done
3,046,978 UART: [art] Populate DV Done
3,055,431 UART: [fht] FMC Alias Private Key: 7
3,056,581 UART: [art] Derive CDI
3,056,861 UART: [art] Store in slot 0x4
3,142,650 UART: [art] Derive Key Pair
3,143,010 UART: [art] Store priv key in slot 0x5
3,156,534 UART: [art] Derive Key Pair - Done
3,171,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,239 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,004 UART: [art] PUB.X = 8E26B29E91423E00D595CB101668CF58D0BCE01F8E36385034D56B713C5531B9254E16E632855344ECF6728A0D11A620
3,193,741 UART: [art] PUB.Y = F3D2C80A09261AD1ED80A47DBFC5466D1BD4DE8B2E490A7E7DA73D55D3CE9DC0DF59EC9E2EB12DF2449A0F851373FBBE
3,200,707 UART: [art] SIG.R = 7D453673CE5D441918539DE957F311F0A253FEB55CD359014BFA4FB0EB7EB4B28545482D654DE9A955EC54B3347A8577
3,207,476 UART: [art] SIG.S = 225E41BBA75C4FD4EC7D4A123DFB96EC3991E7FE4ADB9027A13C06064DBD4A74A6C0687A20FC659C09607E2CE5A97EC7
3,231,191 UART: Caliptra RT
3,231,442 UART: [state] CFI Enabled
3,351,504 UART: [rt] RT listening for mailbox commands...
3,352,174 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,648 UART: [rt]cmd =0x4c4d5356, len=1672
3,945,994 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,096 ready_for_fw is high
1,059,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,584 >>> mbox cmd response: success
2,738,613 UART:
2,738,629 UART: Running Caliptra FMC ...
2,739,037 UART:
2,739,091 UART: [state] CFI Enabled
2,749,757 UART: [fht] FMC Alias Private Key: 7
2,868,603 UART: [art] Extend RT PCRs Done
2,869,031 UART: [art] Lock RT PCRs Done
2,870,503 UART: [art] Populate DV Done
2,878,722 UART: [fht] FMC Alias Private Key: 7
2,879,854 UART: [art] Derive CDI
2,880,134 UART: [art] Store in slot 0x4
2,966,171 UART: [art] Derive Key Pair
2,966,531 UART: [art] Store priv key in slot 0x5
2,980,381 UART: [art] Derive Key Pair - Done
2,995,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,382 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,147 UART: [art] PUB.X = 018F2E3F63977F1E71BD9E2B83086D5C9D8637C366F932A7FF936BF3C30EA1AB40ADF236DC1002BD40ED7037A696A527
3,017,913 UART: [art] PUB.Y = 86BF30033977CB632301BBCBC3E1A12AC8FBD4C6781ED62D21E9CE755FBF8F5E800BC312338BF96C0F362B043F56CD06
3,024,859 UART: [art] SIG.R = 88B678AE6668311A87D8FA37335A82179BF8B59394C6455863DCC9A1EF74109CE89129B4702DA3170DC0961DA02B39D6
3,031,622 UART: [art] SIG.S = 89A6C0374DD46728042ABE3A82AD286D09028EEEC72D8330E00839885F0D53C80E05B53BE9E9AB8B41844A8D54F019F4
3,055,757 UART: Caliptra RT
3,056,008 UART: [state] CFI Enabled
3,176,040 UART: [rt] RT listening for mailbox commands...
3,176,710 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,346 UART: [rt]cmd =0x4c4d5356, len=1672
3,770,654 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
891,313 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,417 UART: [kat] ++
895,569 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,106 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,499 UART: [fht] FHT @ 0x50003400
1,173,129 UART: [idev] ++
1,173,297 UART: [idev] CDI.KEYID = 6
1,173,658 UART: [idev] SUBJECT.KEYID = 7
1,174,083 UART: [idev] UDS.KEYID = 0
1,174,429 ready_for_fw is high
1,174,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,660 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,057 UART: [ldev] --
1,282,428 UART: [fwproc] Wait for Commands...
1,283,017 UART: [fwproc] Recv command 0x46574c44
1,283,750 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,486 >>> mbox cmd response: success
2,827,608 UART: [afmc] ++
2,827,776 UART: [afmc] CDI.KEYID = 6
2,828,139 UART: [afmc] SUBJECT.KEYID = 7
2,828,565 UART: [afmc] AUTHORITY.KEYID = 5
2,864,624 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,370 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,952 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,805 UART: [afmc] --
2,907,642 UART: [cold-reset] --
2,908,454 UART: [state] Locking Datavault
2,909,559 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,163 UART: [state] Locking ICCM
2,910,693 UART: [exit] Launching FMC @ 0x40000130
2,916,023 UART:
2,916,039 UART: Running Caliptra FMC ...
2,916,447 UART:
2,916,590 UART: [state] CFI Enabled
2,927,578 UART: [fht] FMC Alias Private Key: 7
3,046,320 UART: [art] Extend RT PCRs Done
3,046,748 UART: [art] Lock RT PCRs Done
3,048,374 UART: [art] Populate DV Done
3,056,571 UART: [fht] FMC Alias Private Key: 7
3,057,665 UART: [art] Derive CDI
3,057,945 UART: [art] Store in slot 0x4
3,143,414 UART: [art] Derive Key Pair
3,143,774 UART: [art] Store priv key in slot 0x5
3,156,916 UART: [art] Derive Key Pair - Done
3,171,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,137 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,902 UART: [art] PUB.X = 872DD9097F848378BEAD44CF2B0A84460100E87C4ED802E315CB60B7529CBA9701777B7C3A916B15639E03ED7300F28D
3,194,610 UART: [art] PUB.Y = AE8321260ED83FB471E703FADCD641822DC1B5303C50904627892AD8933487EA15FDBEF7B9DED6BC7076FEC1300D142F
3,201,561 UART: [art] SIG.R = 94216EE157F6FAB520BE465778BE3997C8BE3FC96C55688B5076FEEE6BC1556A19CD7128F7DF89673F344ECAD4E145A3
3,208,341 UART: [art] SIG.S = 27C706F0989E78C8F5CDBD9B787CF5A1ACD8972628C5D69193D62453C3DC7B8F0CC608B17CFE20DE6DAF44099A5F76C3
3,232,399 UART: Caliptra RT
3,232,742 UART: [state] CFI Enabled
3,353,207 UART: [rt] RT listening for mailbox commands...
3,353,877 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,493 UART: [rt]cmd =0x4c4d5356, len=1672
3,947,663 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,313 ready_for_fw is high
1,060,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,365 >>> mbox cmd response: success
2,742,218 UART:
2,742,234 UART: Running Caliptra FMC ...
2,742,642 UART:
2,742,785 UART: [state] CFI Enabled
2,753,441 UART: [fht] FMC Alias Private Key: 7
2,872,523 UART: [art] Extend RT PCRs Done
2,872,951 UART: [art] Lock RT PCRs Done
2,874,679 UART: [art] Populate DV Done
2,882,938 UART: [fht] FMC Alias Private Key: 7
2,883,918 UART: [art] Derive CDI
2,884,198 UART: [art] Store in slot 0x4
2,970,339 UART: [art] Derive Key Pair
2,970,699 UART: [art] Store priv key in slot 0x5
2,983,821 UART: [art] Derive Key Pair - Done
2,998,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,193 UART: [art] PUB.X = 383E52760AEE6390AF747C843E94A2FE705750FFC35325C76D563824A6B68F6DF75243138EB82FA1174C8F5C2B22F34F
3,021,960 UART: [art] PUB.Y = C3CD3EC0A3CE4A1484DFCE1FA1D75C3CD0CDEB409A0C845747D660BEF347C1130E5ADAE56F9D61AA990E79D91AE28FF7
3,028,929 UART: [art] SIG.R = CE8FD91CD667C6D58F537011091AC7942D064005D6FAB9872CCFDEF86766BFD5C4325AEB011A670B812D81765F3620C6
3,035,690 UART: [art] SIG.S = E74D4D0DB2F4E824CCBA534FE66438BE23496E5BCA4D7B88BA3F3B7F51FBE7B09E94138F976EE8E6D789B2F15E4674AB
3,059,791 UART: Caliptra RT
3,060,134 UART: [state] CFI Enabled
3,179,474 UART: [rt] RT listening for mailbox commands...
3,180,144 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,572 UART: [rt]cmd =0x4c4d5356, len=1672
3,773,836 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,726 UART: [kat] SHA2-256
893,376 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,501 UART: [kat] ++
897,653 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,508 UART: [kat] SHA2-512-ACC
908,409 UART: [kat] ECC-384
918,106 UART: [kat] HMAC-384Kdf
922,536 UART: [kat] LMS
1,170,864 UART: [kat] --
1,171,623 UART: [cold-reset] ++
1,172,093 UART: [fht] FHT @ 0x50003400
1,174,812 UART: [idev] ++
1,174,980 UART: [idev] CDI.KEYID = 6
1,175,340 UART: [idev] SUBJECT.KEYID = 7
1,175,764 UART: [idev] UDS.KEYID = 0
1,176,109 ready_for_fw is high
1,176,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,160 UART: [idev] Erasing UDS.KEYID = 0
1,201,483 UART: [idev] Sha1 KeyId Algorithm
1,209,933 UART: [idev] --
1,211,055 UART: [ldev] ++
1,211,223 UART: [ldev] CDI.KEYID = 6
1,211,586 UART: [ldev] SUBJECT.KEYID = 5
1,212,012 UART: [ldev] AUTHORITY.KEYID = 7
1,212,475 UART: [ldev] FE.KEYID = 1
1,217,917 UART: [ldev] Erasing FE.KEYID = 1
1,244,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,117 UART: [ldev] --
1,283,436 UART: [fwproc] Wait for Commands...
1,284,054 UART: [fwproc] Recv command 0x46574c44
1,284,782 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,918 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,245 >>> mbox cmd response: success
2,828,423 UART: [afmc] ++
2,828,591 UART: [afmc] CDI.KEYID = 6
2,828,953 UART: [afmc] SUBJECT.KEYID = 7
2,829,378 UART: [afmc] AUTHORITY.KEYID = 5
2,864,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,972 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,564 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,265 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,005 UART: [afmc] --
2,908,045 UART: [cold-reset] --
2,909,129 UART: [state] Locking Datavault
2,910,396 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,000 UART: [state] Locking ICCM
2,911,484 UART: [exit] Launching FMC @ 0x40000130
2,916,814 UART:
2,916,830 UART: Running Caliptra FMC ...
2,917,238 UART:
2,917,292 UART: [state] CFI Enabled
2,927,794 UART: [fht] FMC Alias Private Key: 7
3,046,496 UART: [art] Extend RT PCRs Done
3,046,924 UART: [art] Lock RT PCRs Done
3,048,444 UART: [art] Populate DV Done
3,056,733 UART: [fht] FMC Alias Private Key: 7
3,057,737 UART: [art] Derive CDI
3,058,017 UART: [art] Store in slot 0x4
3,143,454 UART: [art] Derive Key Pair
3,143,814 UART: [art] Store priv key in slot 0x5
3,156,792 UART: [art] Derive Key Pair - Done
3,171,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,987 UART: [art] PUB.X = 3F06849F4F01DB0E2B9645DC7EE28383C35078A833C70191B9947229F05A13F33DBB709A9D3A777A693135C14565365F
3,194,737 UART: [art] PUB.Y = DDB2D5B53238F1F0E327F794C62DA9B57AD64A84F28EDD125F00A27EB9BD4C2937C305A8E88ACD8C7022FF8E0C12FBB5
3,201,679 UART: [art] SIG.R = 84D68F9CE7732EEB737A9B70B32B919C8A0C14E3419C9B3BF721116A14FEEE571200E7B53D138D303C1D68B680E7CEA3
3,208,432 UART: [art] SIG.S = A64723A577E702204FD1C951B220CB61583C1F7689BE38859F7749F0650F543DB2B6C09AEC8EB1D2B8EE50DE8FE24BFE
3,232,468 UART: Caliptra RT
3,232,719 UART: [state] CFI Enabled
3,351,953 UART: [rt] RT listening for mailbox commands...
3,352,623 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,333 UART: [rt]cmd =0x4c4d5356, len=1672
3,946,183 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,311 ready_for_fw is high
1,060,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,434 >>> mbox cmd response: success
2,743,005 UART:
2,743,021 UART: Running Caliptra FMC ...
2,743,429 UART:
2,743,483 UART: [state] CFI Enabled
2,753,825 UART: [fht] FMC Alias Private Key: 7
2,872,895 UART: [art] Extend RT PCRs Done
2,873,323 UART: [art] Lock RT PCRs Done
2,875,313 UART: [art] Populate DV Done
2,883,650 UART: [fht] FMC Alias Private Key: 7
2,884,814 UART: [art] Derive CDI
2,885,094 UART: [art] Store in slot 0x4
2,970,757 UART: [art] Derive Key Pair
2,971,117 UART: [art] Store priv key in slot 0x5
2,984,101 UART: [art] Derive Key Pair - Done
2,998,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,731 UART: [art] PUB.X = 6364E0E8C50E3A3036FAA33F10CD49284C46C8323506D5D0F5EF5CED0F8A71888775BA1A4F82AA502D2FE9E948219A59
3,021,498 UART: [art] PUB.Y = 3CD0AC542C1723BBAB9D28F95DC4B0AE56091EB5DF87B9437A4DABF1454CEFD81227A848BD6E0EB813562C0E6A8B06CF
3,028,458 UART: [art] SIG.R = A1E15EDAF0B49A897BCE477B7A2654332726F108FF994E5821F42501FC431AA6B86B6C1FAAB5004FD78672305A3DA5FA
3,035,210 UART: [art] SIG.S = 7579C75C293718CAB0B74B1E1C8320BCC0AF30EBC93DABE985B46206474C43F66A6B9E7F8C3205D11DA9DAD60453EC41
3,059,021 UART: Caliptra RT
3,059,272 UART: [state] CFI Enabled
3,179,943 UART: [rt] RT listening for mailbox commands...
3,180,613 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,155 UART: [rt]cmd =0x4c4d5356, len=1672
3,774,411 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,880 UART: [state] WD Timer not started. Device not locked for debugging
88,133 UART: [kat] SHA2-256
893,783 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,908 UART: [kat] ++
898,060 UART: [kat] sha1
902,352 UART: [kat] SHA2-256
904,292 UART: [kat] SHA2-384
907,049 UART: [kat] SHA2-512-ACC
908,950 UART: [kat] ECC-384
918,433 UART: [kat] HMAC-384Kdf
922,929 UART: [kat] LMS
1,171,257 UART: [kat] --
1,171,998 UART: [cold-reset] ++
1,172,360 UART: [fht] FHT @ 0x50003400
1,175,073 UART: [idev] ++
1,175,241 UART: [idev] CDI.KEYID = 6
1,175,601 UART: [idev] SUBJECT.KEYID = 7
1,176,025 UART: [idev] UDS.KEYID = 0
1,176,370 ready_for_fw is high
1,176,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,041 UART: [idev] Erasing UDS.KEYID = 0
1,201,218 UART: [idev] Sha1 KeyId Algorithm
1,209,818 UART: [idev] --
1,210,980 UART: [ldev] ++
1,211,148 UART: [ldev] CDI.KEYID = 6
1,211,511 UART: [ldev] SUBJECT.KEYID = 5
1,211,937 UART: [ldev] AUTHORITY.KEYID = 7
1,212,400 UART: [ldev] FE.KEYID = 1
1,217,486 UART: [ldev] Erasing FE.KEYID = 1
1,243,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,772 UART: [ldev] --
1,283,177 UART: [fwproc] Wait for Commands...
1,283,893 UART: [fwproc] Recv command 0x46574c44
1,284,621 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,008 >>> mbox cmd response: success
2,829,132 UART: [afmc] ++
2,829,300 UART: [afmc] CDI.KEYID = 6
2,829,662 UART: [afmc] SUBJECT.KEYID = 7
2,830,087 UART: [afmc] AUTHORITY.KEYID = 5
2,866,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,934 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,518 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,276 UART: [afmc] --
2,909,366 UART: [cold-reset] --
2,910,298 UART: [state] Locking Datavault
2,911,665 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,269 UART: [state] Locking ICCM
2,912,937 UART: [exit] Launching FMC @ 0x40000130
2,918,267 UART:
2,918,283 UART: Running Caliptra FMC ...
2,918,691 UART:
2,918,834 UART: [state] CFI Enabled
2,929,402 UART: [fht] FMC Alias Private Key: 7
3,048,414 UART: [art] Extend RT PCRs Done
3,048,842 UART: [art] Lock RT PCRs Done
3,050,278 UART: [art] Populate DV Done
3,058,711 UART: [fht] FMC Alias Private Key: 7
3,059,689 UART: [art] Derive CDI
3,059,969 UART: [art] Store in slot 0x4
3,145,442 UART: [art] Derive Key Pair
3,145,802 UART: [art] Store priv key in slot 0x5
3,159,292 UART: [art] Derive Key Pair - Done
3,174,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,236 UART: [art] PUB.X = 337D0304FD0425BC3D6B3C263759912A946444C36DF3EF19327E998750535C05DC6056159CB515894BFF448E1C843FEB
3,196,988 UART: [art] PUB.Y = 4E7812121C6AC2F68A54C366CE8BEBBEAE5CB2E4E11982E063625E14D1E418B18E761B883DAE5A65D066C8A3FED6D5F9
3,203,954 UART: [art] SIG.R = 5D57736271862CB67F30E82EAA322FD341E9CE9332D75D8BC5A5EE99928B6111D57FB42CE49ABB5C1486DDA0D04A3E26
3,210,734 UART: [art] SIG.S = C600E53187DDAB6518B589723E8D103245B9788FD43A4A74391DFF4696A2BE5D4321AF65EBA569A07BB696CB0C2F5B82
3,234,311 UART: Caliptra RT
3,234,654 UART: [state] CFI Enabled
3,353,601 UART: [rt] RT listening for mailbox commands...
3,354,271 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,255 UART: [rt]cmd =0x4c4d5356, len=1672
3,948,341 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,676 ready_for_fw is high
1,060,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,355 >>> mbox cmd response: success
2,741,306 UART:
2,741,322 UART: Running Caliptra FMC ...
2,741,730 UART:
2,741,873 UART: [state] CFI Enabled
2,752,919 UART: [fht] FMC Alias Private Key: 7
2,872,055 UART: [art] Extend RT PCRs Done
2,872,483 UART: [art] Lock RT PCRs Done
2,874,197 UART: [art] Populate DV Done
2,882,446 UART: [fht] FMC Alias Private Key: 7
2,883,438 UART: [art] Derive CDI
2,883,718 UART: [art] Store in slot 0x4
2,969,571 UART: [art] Derive Key Pair
2,969,931 UART: [art] Store priv key in slot 0x5
2,983,555 UART: [art] Derive Key Pair - Done
2,998,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,367 UART: [art] PUB.X = 8F3E1E35180F726C4C7D4E3C7A5D1D297AF2487C271799A22DA3F57390CC0FB20307F5A9B2A21F60CAD5591BADB1709F
3,021,135 UART: [art] PUB.Y = 3B6522AC8B0E6FEE9F293D788DCD7B30023EDE99DA36C7F345AD4E74B92914454C75CDB8F2DF4E88013CDE836B25478B
3,028,090 UART: [art] SIG.R = 7EAF738FA5D4E7C9A0DA485453FFB52C19FA09B6DF4545FCABDB322DAB3E0B8444E166EB02DAA57C0933D4B61EDD5742
3,034,872 UART: [art] SIG.S = 0515CE90E5DFB7D06AE9F7F8BA0975955C9E730F2622E62DC6FC9FC448FE7888EDA78DAA87DE9F8DEDC545D6B9ED14FD
3,059,349 UART: Caliptra RT
3,059,692 UART: [state] CFI Enabled
3,179,296 UART: [rt] RT listening for mailbox commands...
3,179,966 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,704 UART: [rt]cmd =0x4c4d5356, len=1672
3,774,098 >>> mbox cmd response: failed
test test_lms::test_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,107 UART:
192,465 UART: Running Caliptra ROM ...
193,666 UART:
193,820 UART: [state] CFI Enabled
264,462 UART: [state] LifecycleState = Unprovisioned
266,366 UART: [state] DebugLocked = No
268,058 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,280 UART: [kat] SHA2-256
443,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,477 UART: [kat] ++
454,031 UART: [kat] sha1
465,125 UART: [kat] SHA2-256
467,786 UART: [kat] SHA2-384
473,777 UART: [kat] SHA2-512-ACC
476,140 UART: [kat] ECC-384
2,768,113 UART: [kat] HMAC-384Kdf
2,781,896 UART: [kat] LMS
3,972,205 UART: [kat] --
3,975,989 UART: [cold-reset] ++
3,978,557 UART: [fht] Storing FHT @ 0x50003400
3,990,680 UART: [idev] ++
3,991,246 UART: [idev] CDI.KEYID = 6
3,992,295 UART: [idev] SUBJECT.KEYID = 7
3,993,469 UART: [idev] UDS.KEYID = 0
3,994,540 ready_for_fw is high
3,994,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,359 UART: [idev] Erasing UDS.KEYID = 0
7,328,431 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,665 UART: [idev] --
7,353,849 UART: [ldev] ++
7,354,419 UART: [ldev] CDI.KEYID = 6
7,355,358 UART: [ldev] SUBJECT.KEYID = 5
7,356,568 UART: [ldev] AUTHORITY.KEYID = 7
7,357,857 UART: [ldev] FE.KEYID = 1
7,404,454 UART: [ldev] Erasing FE.KEYID = 1
10,734,342 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,031,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,075,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,082 UART: [ldev] --
13,098,011 UART: [fwproc] Waiting for Commands...
13,101,027 UART: [fwproc] Received command 0x46574c44
13,103,273 UART: [fwproc] Received Image of size 118548 bytes
17,205,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,736 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,911 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,688,603 >>> mbox cmd response: success
17,693,527 UART: [afmc] ++
17,694,145 UART: [afmc] CDI.KEYID = 6
17,695,063 UART: [afmc] SUBJECT.KEYID = 7
17,696,282 UART: [afmc] AUTHORITY.KEYID = 5
21,065,418 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,365,993 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,368,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,382,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,397,445 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,411,856 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,432,673 UART: [afmc] --
23,435,673 UART: [cold-reset] --
23,439,694 UART: [state] Locking Datavault
23,445,380 UART: [state] Locking PCR0, PCR1 and PCR31
23,447,134 UART: [state] Locking ICCM
23,449,390 UART: [exit] Launching FMC @ 0x40000130
23,457,792 UART:
23,458,028 UART: Running Caliptra FMC ...
23,459,133 UART:
23,459,300 UART: [state] CFI Enabled
23,527,456 UART: [fht] FMC Alias Private Key: 7
25,867,737 UART: [art] Extend RT PCRs Done
25,868,975 UART: [art] Lock RT PCRs Done
25,870,330 UART: [art] Populate DV Done
25,875,900 UART: [fht] FMC Alias Private Key: 7
25,877,474 UART: [art] Derive CDI
25,878,215 UART: [art] Store in slot 0x4
25,935,953 UART: [art] Derive Key Pair
25,936,957 UART: [art] Store priv key in slot 0x5
29,229,807 UART: [art] Derive Key Pair - Done
29,242,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,200 UART: [art] PUB.X = B4F30EA6D158AB6D57F128E7C84C278F3E0D8C0ADFAA9F6A0B1BE7DE9CE8B06E6F48AC7DBC11966FD41E1A08F2DEB56F
31,540,499 UART: [art] PUB.Y = 700ED0B8C09AA5960A3649E10725D7066213C9C5176DD38F6E048C43353A1E9C9B13AC199FB66205467892E80B71BED4
31,547,725 UART: [art] SIG.R = B967653EDAD1E1A2682FDA0C0DD34164D726604052FB49AA96BB8E43C3C6E7F69C506CEBC318AF7610A3C83FD83ADAF0
31,555,102 UART: [art] SIG.S = 4AA44E35E3AD48A6F0F82735CBA0FCD7C6628034A8181E72E6A77679E04F36094B6C1E5F6D8338E305B54CE804152C85
32,860,553 UART: Caliptra RT
32,861,256 UART: [state] CFI Enabled
33,036,548 UART: [rt] RT listening for mailbox commands...
33,040,480 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,085,132 UART: [rt]cmd =0x4c4d5356, len=1672
33,504,722 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
3,795,630 ready_for_fw is high
3,796,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,132 >>> mbox cmd response: success
23,619,507 UART:
23,619,883 UART: Running Caliptra FMC ...
23,621,100 UART:
23,621,270 UART: [state] CFI Enabled
23,687,728 UART: [fht] FMC Alias Private Key: 7
26,028,194 UART: [art] Extend RT PCRs Done
26,029,437 UART: [art] Lock RT PCRs Done
26,031,157 UART: [art] Populate DV Done
26,036,592 UART: [fht] FMC Alias Private Key: 7
26,038,298 UART: [art] Derive CDI
26,039,035 UART: [art] Store in slot 0x4
26,096,252 UART: [art] Derive Key Pair
26,097,297 UART: [art] Store priv key in slot 0x5
29,389,566 UART: [art] Derive Key Pair - Done
29,402,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,690,559 UART: [art] Erasing AUTHORITY.KEYID = 7
31,692,059 UART: [art] PUB.X = A31C27F6A309588B1B17E00BDAB546FD1AC5A7E10E90F599E58ABE8C9E32679D1B28700F50748E547B3400CD769A45B0
31,699,307 UART: [art] PUB.Y = B16D198B1C5EB86EC662A9B83081298C9DA5FB31304B3DC8D27F1DD3219D1B80E4151F96A7AE9377BEEE4D5098088A60
31,706,582 UART: [art] SIG.R = 527A36D278AE989A85D46DCE805E230404D7C31DF30379D49A458C349D3C4FAF8734BF1C2CCE659E38F41B0C233B8434
31,713,975 UART: [art] SIG.S = 381F6F36E51708BDF5EEC29F7C285603A14F08B16D3AC1BEA3B94FF3FA05110C26AFD9CE6364006A1B7A6BB144A6CA94
33,019,318 UART: Caliptra RT
33,020,039 UART: [state] CFI Enabled
33,195,920 UART: [rt] RT listening for mailbox commands...
33,199,868 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,244,373 UART: [rt]cmd =0x4c4d5356, len=1672
33,664,176 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,445 UART:
192,828 UART: Running Caliptra ROM ...
193,937 UART:
603,472 UART: [state] CFI Enabled
619,651 UART: [state] LifecycleState = Unprovisioned
621,595 UART: [state] DebugLocked = No
623,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,812 UART: [kat] SHA2-256
798,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,122 UART: [kat] ++
809,597 UART: [kat] sha1
821,033 UART: [kat] SHA2-256
823,684 UART: [kat] SHA2-384
829,736 UART: [kat] SHA2-512-ACC
832,099 UART: [kat] ECC-384
3,114,460 UART: [kat] HMAC-384Kdf
3,126,691 UART: [kat] LMS
4,316,861 UART: [kat] --
4,321,727 UART: [cold-reset] ++
4,322,734 UART: [fht] Storing FHT @ 0x50003400
4,334,555 UART: [idev] ++
4,335,105 UART: [idev] CDI.KEYID = 6
4,336,057 UART: [idev] SUBJECT.KEYID = 7
4,337,296 UART: [idev] UDS.KEYID = 0
4,338,261 ready_for_fw is high
4,338,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,302 UART: [idev] Erasing UDS.KEYID = 0
7,624,154 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,509 UART: [idev] --
7,649,278 UART: [ldev] ++
7,649,839 UART: [ldev] CDI.KEYID = 6
7,650,796 UART: [ldev] SUBJECT.KEYID = 5
7,652,004 UART: [ldev] AUTHORITY.KEYID = 7
7,653,288 UART: [ldev] FE.KEYID = 1
7,663,486 UART: [ldev] Erasing FE.KEYID = 1
10,945,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,931 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,424 UART: [ldev] --
13,305,758 UART: [fwproc] Waiting for Commands...
13,307,789 UART: [fwproc] Received command 0x46574c44
13,310,015 UART: [fwproc] Received Image of size 118548 bytes
17,417,143 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,388 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,983 >>> mbox cmd response: success
17,895,654 UART: [afmc] ++
17,896,276 UART: [afmc] CDI.KEYID = 6
17,897,187 UART: [afmc] SUBJECT.KEYID = 7
17,898,397 UART: [afmc] AUTHORITY.KEYID = 5
21,214,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,777 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,160 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,602 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,352 UART: [afmc] --
23,578,051 UART: [cold-reset] --
23,582,173 UART: [state] Locking Datavault
23,586,962 UART: [state] Locking PCR0, PCR1 and PCR31
23,588,720 UART: [state] Locking ICCM
23,590,508 UART: [exit] Launching FMC @ 0x40000130
23,598,910 UART:
23,599,141 UART: Running Caliptra FMC ...
23,600,231 UART:
23,600,383 UART: [state] CFI Enabled
23,608,452 UART: [fht] FMC Alias Private Key: 7
25,948,256 UART: [art] Extend RT PCRs Done
25,949,471 UART: [art] Lock RT PCRs Done
25,951,284 UART: [art] Populate DV Done
25,956,530 UART: [fht] FMC Alias Private Key: 7
25,958,004 UART: [art] Derive CDI
25,958,765 UART: [art] Store in slot 0x4
26,001,457 UART: [art] Derive Key Pair
26,002,500 UART: [art] Store priv key in slot 0x5
29,244,329 UART: [art] Derive Key Pair - Done
29,257,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,641 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,145 UART: [art] PUB.X = 3BFC914E724A48042097E45F88E2E1567ABF9B16396CE2688421B0B2F5EBC293B8B46C91145483D63CAC4115AAF73415
31,546,382 UART: [art] PUB.Y = 41EB415C747423D9A1EE55AD6950E37910805D1C83C6F0E3A58C2903A42B0697BA9FC8DD07A15E67C5E9A035D255618D
31,553,659 UART: [art] SIG.R = FBFEC088D8F5948E6D4E1726359826603445D8990890E2CFC5A44E82C8CACB50D88D743A814EF0A3F3A306C38BAC024F
31,561,044 UART: [art] SIG.S = 51C7A528E84D19635ED5B7A47E94C0E1C840FB6AD883DC02BFF53E92604ADBD866243C1C989540012288E9455AA282FD
32,866,273 UART: Caliptra RT
32,866,967 UART: [state] CFI Enabled
33,000,227 UART: [rt] RT listening for mailbox commands...
33,004,189 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,048,697 UART: [rt]cmd =0x4c4d5356, len=1672
33,467,992 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
4,125,274 ready_for_fw is high
4,125,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,294 >>> mbox cmd response: success
23,786,947 UART:
23,787,382 UART: Running Caliptra FMC ...
23,788,583 UART:
23,788,749 UART: [state] CFI Enabled
23,796,337 UART: [fht] FMC Alias Private Key: 7
26,136,542 UART: [art] Extend RT PCRs Done
26,137,768 UART: [art] Lock RT PCRs Done
26,139,204 UART: [art] Populate DV Done
26,144,507 UART: [fht] FMC Alias Private Key: 7
26,146,154 UART: [art] Derive CDI
26,146,962 UART: [art] Store in slot 0x4
26,189,551 UART: [art] Derive Key Pair
26,190,548 UART: [art] Store priv key in slot 0x5
29,432,266 UART: [art] Derive Key Pair - Done
29,445,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,535 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,044 UART: [art] PUB.X = DA0310583E320047329C7A5A7AF8ECCE339F8800C61DAA52D6C8956AB8B96C73D8B900BBE86CD065FBFD0D014D2D48DF
31,734,258 UART: [art] PUB.Y = D365B43D9C3725DA51671D6D5F10BBB61C293B8756BBA6E0CDD0AED5269FE7FA3BC5E038DD6AA0F2FB56B00AD467A399
31,741,511 UART: [art] SIG.R = 5FAF421EB6238305D0F276D85729B390B6CEFF1B8C233C91A1B3AA207C74EF2ED4FF4551FC005FD01658D0B3452E2FDB
31,748,908 UART: [art] SIG.S = 529D0F8DDACE891607AF18FB35BBEC7CBCFF687FA2D098AE59C651DB3B84875BFFEBD998AD2DD62EDC9012AA76E2ADFB
33,054,875 UART: Caliptra RT
33,055,590 UART: [state] CFI Enabled
33,188,546 UART: [rt] RT listening for mailbox commands...
33,192,457 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,237,072 UART: [rt]cmd =0x4c4d5356, len=1672
33,656,944 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
192,016 UART:
192,388 UART: Running Caliptra ROM ...
193,473 UART:
193,618 UART: [state] CFI Enabled
263,928 UART: [state] LifecycleState = Unprovisioned
266,006 UART: [state] DebugLocked = No
268,077 UART: [state] WD Timer not started. Device not locked for debugging
271,684 UART: [kat] SHA2-256
451,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,105 UART: [kat] ++
462,578 UART: [kat] sha1
473,378 UART: [kat] SHA2-256
476,101 UART: [kat] SHA2-384
481,451 UART: [kat] SHA2-512-ACC
483,811 UART: [kat] ECC-384
2,947,653 UART: [kat] HMAC-384Kdf
2,972,016 UART: [kat] LMS
3,448,538 UART: [kat] --
3,453,482 UART: [cold-reset] ++
3,455,833 UART: [fht] FHT @ 0x50003400
3,467,614 UART: [idev] ++
3,468,224 UART: [idev] CDI.KEYID = 6
3,469,264 UART: [idev] SUBJECT.KEYID = 7
3,470,443 UART: [idev] UDS.KEYID = 0
3,471,517 ready_for_fw is high
3,471,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,718 UART: [idev] Erasing UDS.KEYID = 0
5,987,624 UART: [idev] Sha1 KeyId Algorithm
6,011,069 UART: [idev] --
6,015,069 UART: [ldev] ++
6,015,642 UART: [ldev] CDI.KEYID = 6
6,016,548 UART: [ldev] SUBJECT.KEYID = 5
6,017,759 UART: [ldev] AUTHORITY.KEYID = 7
6,019,040 UART: [ldev] FE.KEYID = 1
6,059,402 UART: [ldev] Erasing FE.KEYID = 1
8,566,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,499 UART: [ldev] --
10,378,687 UART: [fwproc] Wait for Commands...
10,381,151 UART: [fwproc] Recv command 0x46574c44
10,383,184 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,344 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,180 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,203 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,644 >>> mbox cmd response: success
14,354,593 UART: [afmc] ++
14,355,217 UART: [afmc] CDI.KEYID = 6
14,356,132 UART: [afmc] SUBJECT.KEYID = 7
14,357,347 UART: [afmc] AUTHORITY.KEYID = 5
16,899,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,642,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,644,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,660,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,676,136 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,691,755 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,716,100 UART: [afmc] --
18,719,644 UART: [cold-reset] --
18,724,475 UART: [state] Locking Datavault
18,729,992 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,744 UART: [state] Locking ICCM
18,734,538 UART: [exit] Launching FMC @ 0x40000130
18,742,930 UART:
18,743,171 UART: Running Caliptra FMC ...
18,744,273 UART:
18,744,431 UART: [state] CFI Enabled
18,797,554 UART: [fht] FMC Alias Private Key: 7
20,564,093 UART: [art] Extend RT PCRs Done
20,565,316 UART: [art] Lock RT PCRs Done
20,567,262 UART: [art] Populate DV Done
20,572,725 UART: [fht] FMC Alias Private Key: 7
20,574,317 UART: [art] Derive CDI
20,575,128 UART: [art] Store in slot 0x4
20,630,247 UART: [art] Derive Key Pair
20,631,310 UART: [art] Store priv key in slot 0x5
23,093,745 UART: [art] Derive Key Pair - Done
23,106,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,304 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,803 UART: [art] PUB.X = 8C539128D9B7F57CB48357510F052446A9ED18AE096F0896ADCADF7F7F349562A817891DA171496EA911174DDA78A0AE
24,828,088 UART: [art] PUB.Y = 450FFC2598BEE820FD342539BB368B41EB9D33EBB454EF8D45E7A2578342E2A64E7BD797C0317C7DF69133784A89A5C7
24,835,334 UART: [art] SIG.R = B811EF93F0DAAB63D5135CD934B7AFCD7C867EAE931984F826D481DD19C2F7F2367CBB48AC4DB558A7EBEE3439B71905
24,842,737 UART: [art] SIG.S = C5EE3922CAB5690B4633F06AA9CBD3F28E283D988D237909A537EC5F02A498DAAD43A31C33AB4CABEBDD65B59E9B7A10
25,822,250 UART: Caliptra RT
25,822,951 UART: [state] CFI Enabled
26,002,334 UART: [rt] RT listening for mailbox commands...
26,006,299 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,050,947 UART: [rt]cmd =0x4c4d5356, len=1672
26,263,620 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,463,432 ready_for_fw is high
3,464,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,681 >>> mbox cmd response: success
18,513,856 UART:
18,514,249 UART: Running Caliptra FMC ...
18,515,440 UART:
18,515,606 UART: [state] CFI Enabled
18,582,340 UART: [fht] FMC Alias Private Key: 7
20,348,337 UART: [art] Extend RT PCRs Done
20,349,549 UART: [art] Lock RT PCRs Done
20,350,743 UART: [art] Populate DV Done
20,356,169 UART: [fht] FMC Alias Private Key: 7
20,357,707 UART: [art] Derive CDI
20,358,538 UART: [art] Store in slot 0x4
20,415,194 UART: [art] Derive Key Pair
20,416,193 UART: [art] Store priv key in slot 0x5
22,878,422 UART: [art] Derive Key Pair - Done
22,891,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,460 UART: [art] PUB.X = D4F96EBCDDB4872054B80DEB989C0DA56925B5EC5D3021D90BC5542DEA68ECE01573FB27BC8FD9AAA7FA03B914D0DD43
24,613,765 UART: [art] PUB.Y = E151B4C0D8C08EAF6BA3E244D12366628A87D4936FF3CF0B7C03FEBA550C4E9F9359E8FC2C91C841DDDCCA9FCA1C7385
24,621,010 UART: [art] SIG.R = 3D7F3EFD472F976A062A0BD0D63F793D657269738D032F41640CC5F08E0DA84AFA027784244558C83FDB81B64494C999
24,628,413 UART: [art] SIG.S = 5991FA16E69AF00808A51BED4BC7D362A40F1FC94C173980DD1805FC3402D993B2D284600BA5D591757CD339C4D13D80
25,606,834 UART: Caliptra RT
25,607,555 UART: [state] CFI Enabled
25,787,217 UART: [rt] RT listening for mailbox commands...
25,791,144 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,835,805 UART: [rt]cmd =0x4c4d5356, len=1672
26,048,936 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,490 UART:
192,849 UART: Running Caliptra ROM ...
194,043 UART:
603,506 UART: [state] CFI Enabled
616,990 UART: [state] LifecycleState = Unprovisioned
618,896 UART: [state] DebugLocked = No
621,556 UART: [state] WD Timer not started. Device not locked for debugging
624,884 UART: [kat] SHA2-256
804,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,283 UART: [kat] ++
815,804 UART: [kat] sha1
827,316 UART: [kat] SHA2-256
830,044 UART: [kat] SHA2-384
835,470 UART: [kat] SHA2-512-ACC
837,842 UART: [kat] ECC-384
3,281,562 UART: [kat] HMAC-384Kdf
3,294,861 UART: [kat] LMS
3,771,411 UART: [kat] --
3,774,504 UART: [cold-reset] ++
3,776,583 UART: [fht] FHT @ 0x50003400
3,788,980 UART: [idev] ++
3,789,542 UART: [idev] CDI.KEYID = 6
3,790,457 UART: [idev] SUBJECT.KEYID = 7
3,791,706 UART: [idev] UDS.KEYID = 0
3,792,756 ready_for_fw is high
3,792,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,819 UART: [idev] Erasing UDS.KEYID = 0
6,270,996 UART: [idev] Sha1 KeyId Algorithm
6,294,156 UART: [idev] --
6,298,712 UART: [ldev] ++
6,299,289 UART: [ldev] CDI.KEYID = 6
6,300,177 UART: [ldev] SUBJECT.KEYID = 5
6,301,446 UART: [ldev] AUTHORITY.KEYID = 7
6,302,679 UART: [ldev] FE.KEYID = 1
6,313,141 UART: [ldev] Erasing FE.KEYID = 1
8,794,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,646 UART: [ldev] --
10,586,337 UART: [fwproc] Wait for Commands...
10,588,866 UART: [fwproc] Recv command 0x46574c44
10,590,850 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,474 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,615 >>> mbox cmd response: success
14,560,856 UART: [afmc] ++
14,561,465 UART: [afmc] CDI.KEYID = 6
14,562,405 UART: [afmc] SUBJECT.KEYID = 7
14,563,623 UART: [afmc] AUTHORITY.KEYID = 5
17,066,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,658 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,121 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,537 UART: [afmc] --
18,864,094 UART: [cold-reset] --
18,868,502 UART: [state] Locking Datavault
18,873,263 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,015 UART: [state] Locking ICCM
18,877,358 UART: [exit] Launching FMC @ 0x40000130
18,885,822 UART:
18,886,061 UART: Running Caliptra FMC ...
18,887,169 UART:
18,887,329 UART: [state] CFI Enabled
18,895,061 UART: [fht] FMC Alias Private Key: 7
20,661,366 UART: [art] Extend RT PCRs Done
20,662,589 UART: [art] Lock RT PCRs Done
20,663,903 UART: [art] Populate DV Done
20,669,158 UART: [fht] FMC Alias Private Key: 7
20,670,821 UART: [art] Derive CDI
20,671,638 UART: [art] Store in slot 0x4
20,714,532 UART: [art] Derive Key Pair
20,715,567 UART: [art] Store priv key in slot 0x5
23,142,740 UART: [art] Derive Key Pair - Done
23,155,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,249 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,757 UART: [art] PUB.X = 7E32966F47E500EAF84CC4D9D069692CB5155CD976E54A684A9D2F2F2E2975AF86126506E2DB596151218E54940F905B
24,870,956 UART: [art] PUB.Y = 3FBE73A7B8D4B55F15A14541614B463305790616824B9E3AE561FFF4BE9FC7B858A98474885F76298BA16B9D3BEBE7EB
24,878,251 UART: [art] SIG.R = 4C747C2BB512747CE6AB949AA9629B44FE85B5AA4260B83827C0398A118163CFBD8B47E2DCC38958B73F604C2CEF2063
24,885,648 UART: [art] SIG.S = 8B7EF2D9C5BA61EE2FFC1E29745B2EF3FE10EEA9D381B076C38420F47CC80CCC6F76054323757EB04DFFF62D7F738FDC
25,864,645 UART: Caliptra RT
25,865,332 UART: [state] CFI Enabled
25,997,656 UART: [rt] RT listening for mailbox commands...
26,001,585 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,046,077 UART: [rt]cmd =0x4c4d5356, len=1672
26,259,281 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
3,783,147 ready_for_fw is high
3,783,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,843 >>> mbox cmd response: success
18,698,007 UART:
18,698,409 UART: Running Caliptra FMC ...
18,699,618 UART:
18,699,794 UART: [state] CFI Enabled
18,707,639 UART: [fht] FMC Alias Private Key: 7
20,474,048 UART: [art] Extend RT PCRs Done
20,475,268 UART: [art] Lock RT PCRs Done
20,476,665 UART: [art] Populate DV Done
20,481,982 UART: [fht] FMC Alias Private Key: 7
20,483,687 UART: [art] Derive CDI
20,484,425 UART: [art] Store in slot 0x4
20,526,880 UART: [art] Derive Key Pair
20,527,924 UART: [art] Store priv key in slot 0x5
22,954,860 UART: [art] Derive Key Pair - Done
22,967,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,436 UART: [art] PUB.X = 31F327C1E85CBA47FA61D73931C2264A6068960BCA69CD8762030C0287018D2B7F89562FC07ABF1A8F0FBBDEFA827DEE
24,682,760 UART: [art] PUB.Y = 2F74C07CA6B02F8DEE326FBA8BFDA6EC435A39FD5C551FD4DA675597F66CCC46C196F50E2768BEADAE3C18A4506C15FA
24,690,029 UART: [art] SIG.R = 97D98CA3C5EDDDAF1F8B15969307EAC8370149B3092067E5402631B3E28FB58637EBD3D565F4DD318730E203137924B6
24,697,439 UART: [art] SIG.S = 51D71BD1D14971D8E18C07AB385BC0F0D8FAF80EEDC3AFB674CC34B110F53F8CA8CDFA3E95C6BB8857E134CF3AA7527C
25,676,584 UART: Caliptra RT
25,677,302 UART: [state] CFI Enabled
25,810,262 UART: [rt] RT listening for mailbox commands...
25,814,161 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,858,831 UART: [rt]cmd =0x4c4d5356, len=1672
26,071,695 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,106 UART:
192,481 UART: Running Caliptra ROM ...
193,660 UART:
193,816 UART: [state] CFI Enabled
264,879 UART: [state] LifecycleState = Unprovisioned
267,298 UART: [state] DebugLocked = No
270,071 UART: [state] WD Timer not started. Device not locked for debugging
273,838 UART: [kat] SHA2-256
463,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,311 UART: [kat] ++
474,757 UART: [kat] sha1
486,747 UART: [kat] SHA2-256
489,831 UART: [kat] SHA2-384
495,820 UART: [kat] SHA2-512-ACC
498,396 UART: [kat] ECC-384
2,950,229 UART: [kat] HMAC-384Kdf
2,973,500 UART: [kat] LMS
3,505,271 UART: [kat] --
3,510,687 UART: [cold-reset] ++
3,513,253 UART: [fht] FHT @ 0x50003400
3,525,101 UART: [idev] ++
3,525,814 UART: [idev] CDI.KEYID = 6
3,526,697 UART: [idev] SUBJECT.KEYID = 7
3,527,932 UART: [idev] UDS.KEYID = 0
3,528,863 ready_for_fw is high
3,529,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,093 UART: [idev] Erasing UDS.KEYID = 0
6,049,134 UART: [idev] Sha1 KeyId Algorithm
6,072,473 UART: [idev] --
6,077,949 UART: [ldev] ++
6,078,635 UART: [ldev] CDI.KEYID = 6
6,079,549 UART: [ldev] SUBJECT.KEYID = 5
6,080,707 UART: [ldev] AUTHORITY.KEYID = 7
6,081,935 UART: [ldev] FE.KEYID = 1
6,121,477 UART: [ldev] Erasing FE.KEYID = 1
8,625,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,362,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,393,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,408,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,428,015 UART: [ldev] --
10,434,139 UART: [fwproc] Wait for Commands...
10,436,012 UART: [fwproc] Recv command 0x46574c44
10,438,319 UART: [fwproc] Recv'd Img size: 118548 bytes
13,935,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,131,156 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,690,663 >>> mbox cmd response: success
14,694,192 UART: [afmc] ++
14,694,916 UART: [afmc] CDI.KEYID = 6
14,696,109 UART: [afmc] SUBJECT.KEYID = 7
14,697,600 UART: [afmc] AUTHORITY.KEYID = 5
17,235,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,652 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,709 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,847 UART: [afmc] --
19,033,049 UART: [cold-reset] --
19,036,004 UART: [state] Locking Datavault
19,040,780 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,935 UART: [state] Locking ICCM
19,045,499 UART: [exit] Launching FMC @ 0x40000130
19,054,174 UART:
19,054,407 UART: Running Caliptra FMC ...
19,055,447 UART:
19,055,595 UART: [state] CFI Enabled
19,113,975 UART: [fht] FMC Alias Private Key: 7
20,880,497 UART: [art] Extend RT PCRs Done
20,881,704 UART: [art] Lock RT PCRs Done
20,883,187 UART: [art] Populate DV Done
20,888,591 UART: [fht] FMC Alias Private Key: 7
20,890,182 UART: [art] Derive CDI
20,890,920 UART: [art] Store in slot 0x4
20,946,862 UART: [art] Derive Key Pair
20,947,922 UART: [art] Store priv key in slot 0x5
23,411,130 UART: [art] Derive Key Pair - Done
23,424,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,331 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,834 UART: [art] PUB.X = 53474E432EA2528347F72407E30C023EBB73C775EE980ABAE62BCD6BE58B7F36FD3AE8E1636994BA858342CBEE5E85D9
25,146,107 UART: [art] PUB.Y = D8D52128ECA4D0F3831310B0E6DB669EE8E1D5D2CEB12305BA94515175189285DB18DF139098DA19931F54D2FB3E4033
25,153,342 UART: [art] SIG.R = A94DCE655B1BB00E82470D6FADC133067544B5B7DCB2DEEC610B2CF899344F7ACD2BEC85CA64EBDC5AD70C07921370A5
25,160,743 UART: [art] SIG.S = 7336C4BB692428CC6C627E9222F80BB9ABA1267A9B1CA28CB7705F55D04D400B13216195EDAD170D3739F9366FB2B6A1
26,140,080 UART: Caliptra RT
26,140,788 UART: [state] CFI Enabled
26,320,010 UART: [rt] RT listening for mailbox commands...
26,323,930 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,368,476 UART: [rt]cmd =0x4c4d5356, len=1672
26,581,167 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,438,759 ready_for_fw is high
3,439,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,826,157 >>> mbox cmd response: success
19,109,976 UART:
19,110,383 UART: Running Caliptra FMC ...
19,111,497 UART:
19,111,648 UART: [state] CFI Enabled
19,180,148 UART: [fht] FMC Alias Private Key: 7
20,967,523 UART: [art] Extend RT PCRs Done
20,968,743 UART: [art] Lock RT PCRs Done
20,970,339 UART: [art] Populate DV Done
20,975,772 UART: [fht] FMC Alias Private Key: 7
20,977,316 UART: [art] Derive CDI
20,978,138 UART: [art] Store in slot 0x4
21,033,295 UART: [art] Derive Key Pair
21,034,341 UART: [art] Store priv key in slot 0x5
23,496,964 UART: [art] Derive Key Pair - Done
23,509,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,112 UART: [art] PUB.X = A47AA713B2FD6816C04504480BA8BD44F7B393325A11481130966E3D1F22D260CEFEE6498DBBB8A29596DE3ECA2E188F
25,231,375 UART: [art] PUB.Y = EB849E574E47674229BE31C55EB97A218E45C747F72F891FDD0173E473147A95B1A37E89DF1D095EEC38905E7B2D5FD3
25,238,627 UART: [art] SIG.R = 4BFBEECBAF553CEA2BA5DF40C523133A9E1D10A59AF84518A4B0933B1AA27C83FD6D34DC90770612EAD185F1DAD0D1C0
25,246,066 UART: [art] SIG.S = 19CEA1BF3810A57AFFCD6BD57530A2ED7C82FA879501B85A4A7FFE4D1D0E1ECD2BBDB35697A848EF3F0B18911039213F
26,225,277 UART: Caliptra RT
26,225,997 UART: [state] CFI Enabled
26,406,832 UART: [rt] RT listening for mailbox commands...
26,410,884 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,455,477 UART: [rt]cmd =0x4c4d5356, len=1672
26,668,430 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,447 UART:
192,841 UART: Running Caliptra ROM ...
194,035 UART:
603,747 UART: [state] CFI Enabled
620,623 UART: [state] LifecycleState = Unprovisioned
623,010 UART: [state] DebugLocked = No
624,770 UART: [state] WD Timer not started. Device not locked for debugging
629,832 UART: [kat] SHA2-256
819,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,497 UART: [kat] ++
830,948 UART: [kat] sha1
843,033 UART: [kat] SHA2-256
846,053 UART: [kat] SHA2-384
850,564 UART: [kat] SHA2-512-ACC
853,150 UART: [kat] ECC-384
3,295,506 UART: [kat] HMAC-384Kdf
3,308,459 UART: [kat] LMS
3,840,296 UART: [kat] --
3,845,714 UART: [cold-reset] ++
3,847,575 UART: [fht] FHT @ 0x50003400
3,858,916 UART: [idev] ++
3,859,560 UART: [idev] CDI.KEYID = 6
3,860,594 UART: [idev] SUBJECT.KEYID = 7
3,861,704 UART: [idev] UDS.KEYID = 0
3,862,650 ready_for_fw is high
3,862,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,706 UART: [idev] Erasing UDS.KEYID = 0
6,339,778 UART: [idev] Sha1 KeyId Algorithm
6,361,676 UART: [idev] --
6,367,347 UART: [ldev] ++
6,368,032 UART: [ldev] CDI.KEYID = 6
6,368,955 UART: [ldev] SUBJECT.KEYID = 5
6,370,112 UART: [ldev] AUTHORITY.KEYID = 7
6,371,370 UART: [ldev] FE.KEYID = 1
6,383,065 UART: [ldev] Erasing FE.KEYID = 1
8,859,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,801 UART: [ldev] --
10,651,012 UART: [fwproc] Wait for Commands...
10,654,087 UART: [fwproc] Recv command 0x46574c44
10,656,395 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,713 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,552 >>> mbox cmd response: success
14,922,199 UART: [afmc] ++
14,922,946 UART: [afmc] CDI.KEYID = 6
14,924,070 UART: [afmc] SUBJECT.KEYID = 7
14,925,572 UART: [afmc] AUTHORITY.KEYID = 5
17,431,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,797 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,912 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,850 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,234 UART: [afmc] --
19,226,621 UART: [cold-reset] --
19,230,172 UART: [state] Locking Datavault
19,235,490 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,648 UART: [state] Locking ICCM
19,239,190 UART: [exit] Launching FMC @ 0x40000130
19,247,880 UART:
19,248,136 UART: Running Caliptra FMC ...
19,249,170 UART:
19,249,321 UART: [state] CFI Enabled
19,257,318 UART: [fht] FMC Alias Private Key: 7
21,023,060 UART: [art] Extend RT PCRs Done
21,024,289 UART: [art] Lock RT PCRs Done
21,025,947 UART: [art] Populate DV Done
21,031,584 UART: [fht] FMC Alias Private Key: 7
21,033,085 UART: [art] Derive CDI
21,033,862 UART: [art] Store in slot 0x4
21,076,778 UART: [art] Derive Key Pair
21,077,782 UART: [art] Store priv key in slot 0x5
23,504,734 UART: [art] Derive Key Pair - Done
23,518,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,571 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,078 UART: [art] PUB.X = 3929F41F93D0B214C9069D0ED9C0E031AC1D2E1A549416AB8CF81C604C3DA772AF54BF0ECA729303BEE7B0D69208CD95
25,233,370 UART: [art] PUB.Y = 18A9925EA238D4DBBE9120DB53ED2C9C310D9A26E0773232950243CD9EF880361F5415A763042501DF997C2AF25DAB53
25,240,569 UART: [art] SIG.R = D701C291B567604188D041F5792B8B97CB31E135D2805502B3F756363C83915D2FAFC46DCFF69641DE5A212511F0992D
25,247,944 UART: [art] SIG.S = AE9F49EB5653FFD764C9998AB7498489D3D6637E0FB3C3D3A21525027896ACAC23F2D2BCB6C7F8065637715D8498C78E
26,226,517 UART: Caliptra RT
26,227,208 UART: [state] CFI Enabled
26,359,933 UART: [rt] RT listening for mailbox commands...
26,363,887 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,408,283 UART: [rt]cmd =0x4c4d5356, len=1672
26,621,256 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,458 writing to cptra_bootfsm_go
3,754,917 ready_for_fw is high
3,755,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,052,423 >>> mbox cmd response: success
19,309,056 UART:
19,309,453 UART: Running Caliptra FMC ...
19,310,656 UART:
19,310,846 UART: [state] CFI Enabled
19,318,665 UART: [fht] FMC Alias Private Key: 7
21,084,848 UART: [art] Extend RT PCRs Done
21,086,116 UART: [art] Lock RT PCRs Done
21,087,833 UART: [art] Populate DV Done
21,093,107 UART: [fht] FMC Alias Private Key: 7
21,094,654 UART: [art] Derive CDI
21,095,396 UART: [art] Store in slot 0x4
21,138,067 UART: [art] Derive Key Pair
21,139,093 UART: [art] Store priv key in slot 0x5
23,566,095 UART: [art] Derive Key Pair - Done
23,579,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,333 UART: [art] PUB.X = 36CCFD9154B4E08E7844546D3F552D526FFAFB546BBF67F2F9B8B994DDEBCBE7384C4B01ED49913DD243A3752F0FF98D
25,294,661 UART: [art] PUB.Y = A6B337CF8ED822D1E1DB8C9CC4A938B7E7C7B6920533812F47B9D54CD366FAB474A66EE311152CBAE302F509545449FC
25,301,866 UART: [art] SIG.R = C1F2845F51D5D0B817B6CA3F682FE606858F7127D9BE951733017491B0094CA62078C3A8CD3958D24ADD5788EB6B4E7B
25,309,290 UART: [art] SIG.S = 0C0ED269E453A28AD6585AFF59BDAFEBD0BB5E32A13A7910DAC6BE543D2F00BD05806D4DAA7454DC48A89B5D7A7DAB27
26,287,520 UART: Caliptra RT
26,288,214 UART: [state] CFI Enabled
26,420,060 UART: [rt] RT listening for mailbox commands...
26,424,000 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,468,413 UART: [rt]cmd =0x4c4d5356, len=1672
26,681,629 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,745 UART: [kat] SHA2-256
881,676 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,791 UART: [kat] ++
885,943 UART: [kat] sha1
890,089 UART: [kat] SHA2-256
892,027 UART: [kat] SHA2-384
894,612 UART: [kat] SHA2-512-ACC
896,513 UART: [kat] ECC-384
902,096 UART: [kat] HMAC-384Kdf
906,612 UART: [kat] LMS
1,474,808 UART: [kat] --
1,475,587 UART: [cold-reset] ++
1,476,055 UART: [fht] Storing FHT @ 0x50003400
1,478,702 UART: [idev] ++
1,478,870 UART: [idev] CDI.KEYID = 6
1,479,230 UART: [idev] SUBJECT.KEYID = 7
1,479,654 UART: [idev] UDS.KEYID = 0
1,479,999 ready_for_fw is high
1,479,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,604 UART: [idev] Erasing UDS.KEYID = 0
1,503,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,372 UART: [idev] --
1,513,459 UART: [ldev] ++
1,513,627 UART: [ldev] CDI.KEYID = 6
1,513,990 UART: [ldev] SUBJECT.KEYID = 5
1,514,416 UART: [ldev] AUTHORITY.KEYID = 7
1,514,879 UART: [ldev] FE.KEYID = 1
1,520,041 UART: [ldev] Erasing FE.KEYID = 1
1,545,004 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,563,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,569,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,604 UART: [ldev] --
1,583,905 UART: [fwproc] Waiting for Commands...
1,584,724 UART: [fwproc] Received command 0x46574c44
1,585,515 UART: [fwproc] Received Image of size 118548 bytes
2,929,293 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,531 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,987,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,127,944 >>> mbox cmd response: success
3,129,194 UART: [afmc] ++
3,129,362 UART: [afmc] CDI.KEYID = 6
3,129,724 UART: [afmc] SUBJECT.KEYID = 7
3,130,149 UART: [afmc] AUTHORITY.KEYID = 5
3,165,304 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,181,550 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,330 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,039 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,193,922 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,199,605 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,487 UART: [afmc] --
3,208,543 UART: [cold-reset] --
3,209,463 UART: [state] Locking Datavault
3,210,586 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,190 UART: [state] Locking ICCM
3,211,796 UART: [exit] Launching FMC @ 0x40000130
3,217,126 UART:
3,217,142 UART: Running Caliptra FMC ...
3,217,550 UART:
3,217,604 UART: [state] CFI Enabled
3,228,036 UART: [fht] FMC Alias Private Key: 7
3,346,484 UART: [art] Extend RT PCRs Done
3,346,912 UART: [art] Lock RT PCRs Done
3,348,520 UART: [art] Populate DV Done
3,356,869 UART: [fht] FMC Alias Private Key: 7
3,357,963 UART: [art] Derive CDI
3,358,243 UART: [art] Store in slot 0x4
3,443,935 UART: [art] Derive Key Pair
3,444,295 UART: [art] Store priv key in slot 0x5
3,457,330 UART: [art] Derive Key Pair - Done
3,472,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,983 UART: [art] PUB.X = 2AA21800FAF2D9AE8F9E953E33F429378B3B08DB11362D0C1CF7AF249F3013E5BCDD87908ACAFA8B8C4AFC52951838B6
3,495,741 UART: [art] PUB.Y = CA540FA0E9B141228DB9BDB2E238947881E790E70439D6C11ABD8EE5D1BBC8C24FA5E3C305983C2ADF1D3637EA6AED6A
3,502,702 UART: [art] SIG.R = 82781CD4D31FD76A390BF6455695FF434324849E8601C7F0A9AA484A8A1DB79825CBE485D7130261492A79A5F510F29D
3,509,459 UART: [art] SIG.S = D327766F4C4793833F7CBE2B52555E95B44ECA84A472A0E6C665EEE439EEF61EB9B7A9B65EB2667920E7D322970BA7E4
3,533,534 UART: Caliptra RT
3,533,785 UART: [state] CFI Enabled
3,653,044 UART: [rt] RT listening for mailbox commands...
3,653,714 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,446 UART: [rt]cmd =0x4c4d5356, len=1672
4,273,231 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,627 ready_for_fw is high
1,362,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,396 >>> mbox cmd response: success
3,041,817 UART:
3,041,833 UART: Running Caliptra FMC ...
3,042,241 UART:
3,042,295 UART: [state] CFI Enabled
3,052,517 UART: [fht] FMC Alias Private Key: 7
3,171,431 UART: [art] Extend RT PCRs Done
3,171,859 UART: [art] Lock RT PCRs Done
3,173,275 UART: [art] Populate DV Done
3,181,654 UART: [fht] FMC Alias Private Key: 7
3,182,630 UART: [art] Derive CDI
3,182,910 UART: [art] Store in slot 0x4
3,268,182 UART: [art] Derive Key Pair
3,268,542 UART: [art] Store priv key in slot 0x5
3,281,535 UART: [art] Derive Key Pair - Done
3,296,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,422 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,187 UART: [art] PUB.X = D4C53F7C7917DA463A1911E679072ECCC30380DC453F676B2E6166B07E718A5F96E7D2C2414FA961A403AD10BB007E1B
3,319,930 UART: [art] PUB.Y = 2C526CA4B0B1212BE1092CAC01F5771C55A2502468F91E18103B89A54A2A9D220530019BBE00964FBFD18C4FA972575D
3,326,846 UART: [art] SIG.R = 4C75528F7C18A1F738887DC33DDC172154BF268C640455BEBA2E8A8FB6C359BDAE51BF627619D9BD568E0CDF77DCEF23
3,333,626 UART: [art] SIG.S = B241331710A954082EA38C2DCE8BBED5E7EC1E4618697F56243D060E41A79D5DA32D8ED89DEC7B5FA6F9D266214F69AC
3,357,161 UART: Caliptra RT
3,357,412 UART: [state] CFI Enabled
3,477,240 UART: [rt] RT listening for mailbox commands...
3,477,910 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,558 UART: [rt]cmd =0x4c4d5356, len=1672
4,097,347 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,809 UART: [state] LifecycleState = Unprovisioned
86,464 UART: [state] DebugLocked = No
86,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,688 UART: [kat] SHA2-256
882,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,734 UART: [kat] ++
886,886 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,703 UART: [kat] SHA2-512-ACC
897,604 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,467 UART: [kat] LMS
1,475,663 UART: [kat] --
1,476,520 UART: [cold-reset] ++
1,476,890 UART: [fht] Storing FHT @ 0x50003400
1,479,649 UART: [idev] ++
1,479,817 UART: [idev] CDI.KEYID = 6
1,480,177 UART: [idev] SUBJECT.KEYID = 7
1,480,601 UART: [idev] UDS.KEYID = 0
1,480,946 ready_for_fw is high
1,480,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,463 UART: [idev] Erasing UDS.KEYID = 0
1,504,847 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,323 UART: [idev] --
1,514,462 UART: [ldev] ++
1,514,630 UART: [ldev] CDI.KEYID = 6
1,514,993 UART: [ldev] SUBJECT.KEYID = 5
1,515,419 UART: [ldev] AUTHORITY.KEYID = 7
1,515,882 UART: [ldev] FE.KEYID = 1
1,521,038 UART: [ldev] Erasing FE.KEYID = 1
1,545,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,757 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,837 UART: [fwproc] Received command 0x46574c44
1,586,628 UART: [fwproc] Received Image of size 118548 bytes
2,930,818 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,664 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,267 >>> mbox cmd response: success
3,131,321 UART: [afmc] ++
3,131,489 UART: [afmc] CDI.KEYID = 6
3,131,851 UART: [afmc] SUBJECT.KEYID = 7
3,132,276 UART: [afmc] AUTHORITY.KEYID = 5
3,167,245 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,733 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,325 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,008 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,904 UART: [afmc] --
3,210,930 UART: [cold-reset] --
3,211,936 UART: [state] Locking Datavault
3,213,227 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,831 UART: [state] Locking ICCM
3,214,369 UART: [exit] Launching FMC @ 0x40000130
3,219,699 UART:
3,219,715 UART: Running Caliptra FMC ...
3,220,123 UART:
3,220,266 UART: [state] CFI Enabled
3,230,888 UART: [fht] FMC Alias Private Key: 7
3,349,270 UART: [art] Extend RT PCRs Done
3,349,698 UART: [art] Lock RT PCRs Done
3,351,396 UART: [art] Populate DV Done
3,359,599 UART: [fht] FMC Alias Private Key: 7
3,360,573 UART: [art] Derive CDI
3,360,853 UART: [art] Store in slot 0x4
3,446,527 UART: [art] Derive Key Pair
3,446,887 UART: [art] Store priv key in slot 0x5
3,460,268 UART: [art] Derive Key Pair - Done
3,474,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,800 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,565 UART: [art] PUB.X = D7FAC7132F1F62E3B67EF457B749F7AEB7BDD9F8D83C661AA52A457623FB88C1EFA81515D9B3FA61FDC4AB2974C4EA44
3,498,357 UART: [art] PUB.Y = 50FD13C79C450097297E8C7691EEAC3F387B98520479927D1AEAB5D2B54A1D82F274ACCD2A8F82563096A99492C3D7C3
3,505,284 UART: [art] SIG.R = EEA1735A3A8AF22911A4056D0A7A27FFF64E8F1C91E6DDAFF7835B4B398FEF6F8CD629E8167C7FECB11E9AE031F5515E
3,512,070 UART: [art] SIG.S = 164046660C6C8A9C8CE34CE2E5FE42117228228151F98D8653CB536984CFC80698845F52E633CBD560D002CC96CF852D
3,536,281 UART: Caliptra RT
3,536,624 UART: [state] CFI Enabled
3,657,062 UART: [rt] RT listening for mailbox commands...
3,657,732 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,572 UART: [rt]cmd =0x4c4d5356, len=1672
4,277,461 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,268 ready_for_fw is high
1,363,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,137 >>> mbox cmd response: success
3,043,938 UART:
3,043,954 UART: Running Caliptra FMC ...
3,044,362 UART:
3,044,505 UART: [state] CFI Enabled
3,055,147 UART: [fht] FMC Alias Private Key: 7
3,174,169 UART: [art] Extend RT PCRs Done
3,174,597 UART: [art] Lock RT PCRs Done
3,176,003 UART: [art] Populate DV Done
3,184,334 UART: [fht] FMC Alias Private Key: 7
3,185,458 UART: [art] Derive CDI
3,185,738 UART: [art] Store in slot 0x4
3,271,738 UART: [art] Derive Key Pair
3,272,098 UART: [art] Store priv key in slot 0x5
3,285,585 UART: [art] Derive Key Pair - Done
3,300,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,576 UART: [art] PUB.X = B0555F5114BF17CEC773FA5F55F29B584F7B625AA865EF2F7D5455501D12FF38D7D5D2CD081FA19B5088163824898BFD
3,323,349 UART: [art] PUB.Y = 97FFF61C8EB893F35F13C9C98471021A8C2C2860152252B0A90A941E4FE4D68A069B9A25B8FD4ED417ADC2C98A50FD3D
3,330,300 UART: [art] SIG.R = 8A19C83EA599F7FE19BDAEDCFB828FEA1B07AEAC757C7754880D50390A0AC4C59D9DDE4085CE6A73B33F4BD5AB6B5585
3,337,082 UART: [art] SIG.S = C43B2486AB4984ECD560051E6592BD1CF0953E29084A5393411C0C97C8324E46575CA158A97C242F1C32DB38CE02340E
3,360,487 UART: Caliptra RT
3,360,830 UART: [state] CFI Enabled
3,480,493 UART: [rt] RT listening for mailbox commands...
3,481,163 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,745 UART: [rt]cmd =0x4c4d5356, len=1672
4,100,468 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,478 UART: [state] LifecycleState = Unprovisioned
86,133 UART: [state] DebugLocked = No
86,695 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
921,003 UART: [kat] LMS
1,169,315 UART: [kat] --
1,170,364 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,512 UART: [idev] ++
1,173,680 UART: [idev] CDI.KEYID = 6
1,174,041 UART: [idev] SUBJECT.KEYID = 7
1,174,466 UART: [idev] UDS.KEYID = 0
1,174,812 ready_for_fw is high
1,174,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,321 UART: [idev] Erasing UDS.KEYID = 0
1,199,531 UART: [idev] Sha1 KeyId Algorithm
1,208,529 UART: [idev] --
1,209,660 UART: [ldev] ++
1,209,828 UART: [ldev] CDI.KEYID = 6
1,210,192 UART: [ldev] SUBJECT.KEYID = 5
1,210,619 UART: [ldev] AUTHORITY.KEYID = 7
1,211,082 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,230 UART: [ldev] --
1,281,643 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,159 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,334 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,729 >>> mbox cmd response: success
2,825,983 UART: [afmc] ++
2,826,151 UART: [afmc] CDI.KEYID = 6
2,826,514 UART: [afmc] SUBJECT.KEYID = 7
2,826,940 UART: [afmc] AUTHORITY.KEYID = 5
2,862,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,980 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,729 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,439 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,320 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,021 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,640 UART: [afmc] --
2,905,461 UART: [cold-reset] --
2,906,035 UART: [state] Locking Datavault
2,907,148 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,752 UART: [state] Locking ICCM
2,908,366 UART: [exit] Launching FMC @ 0x40000130
2,913,696 UART:
2,913,712 UART: Running Caliptra FMC ...
2,914,120 UART:
2,914,174 UART: [state] CFI Enabled
2,924,088 UART: [fht] FMC Alias Private Key: 7
3,042,626 UART: [art] Extend RT PCRs Done
3,043,054 UART: [art] Lock RT PCRs Done
3,044,538 UART: [art] Populate DV Done
3,052,731 UART: [fht] FMC Alias Private Key: 7
3,053,893 UART: [art] Derive CDI
3,054,173 UART: [art] Store in slot 0x4
3,140,092 UART: [art] Derive Key Pair
3,140,452 UART: [art] Store priv key in slot 0x5
3,153,846 UART: [art] Derive Key Pair - Done
3,168,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,758 UART: [art] PUB.X = 0FF5D8F8AB518EBEF01BA00940CE8508AF69FF8D74688BB110CD64BD20AD831FF0284D341E43513BEB6A8FF4F48507C8
3,191,532 UART: [art] PUB.Y = 94EC9B086FEC669EB43680E9281335A763DD8C3E8BD9B487F1535FC86BCEB88F0DBF05CCD31FA7EC3A453516ABC250FC
3,198,493 UART: [art] SIG.R = 0F5393945E23B3034D44A7B37AC961E12E4A074F4EDA4AA450379B76995A31BCFE09872AC675BC564979295E3C8F9E22
3,205,251 UART: [art] SIG.S = 557DC643611EE93E13360A5FCA4210A093EB110C99C136E92BD0B2CF1C487635B39286484083F8CB9D92C8D42D3FA785
3,229,241 UART: Caliptra RT
3,229,492 UART: [state] CFI Enabled
3,349,668 UART: [rt] RT listening for mailbox commands...
3,350,338 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,726 UART: [rt]cmd =0x4c4d5356, len=1672
3,653,915 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,460 ready_for_fw is high
1,058,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,300 >>> mbox cmd response: success
2,740,109 UART:
2,740,125 UART: Running Caliptra FMC ...
2,740,533 UART:
2,740,587 UART: [state] CFI Enabled
2,751,149 UART: [fht] FMC Alias Private Key: 7
2,869,741 UART: [art] Extend RT PCRs Done
2,870,169 UART: [art] Lock RT PCRs Done
2,871,841 UART: [art] Populate DV Done
2,880,066 UART: [fht] FMC Alias Private Key: 7
2,881,006 UART: [art] Derive CDI
2,881,286 UART: [art] Store in slot 0x4
2,967,167 UART: [art] Derive Key Pair
2,967,527 UART: [art] Store priv key in slot 0x5
2,981,181 UART: [art] Derive Key Pair - Done
2,996,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,769 UART: [art] PUB.X = 97D52BEA875BE3E779D1A1DAD52CAD5D44E0B92720DDF17DCC4F8EDAF53354EA4CBC96145BBFFF53011F99898A866865
3,019,556 UART: [art] PUB.Y = 9ECF8D75780999B72C95DAC6D7563397471B4D2D999D7FCD9B2AAD8F717C84538FCADF923BD4EF4FB620046BF2DCBE08
3,026,515 UART: [art] SIG.R = 191D80FCA90109EDCEFF560DF8846617294BFDF71AE1EB3877B679777BDF7F3FC9ED6BBBF32C38098AA551C837F72E9E
3,033,291 UART: [art] SIG.S = 2590F90A9FEBCA4F3CAC4A72B798CD43C2F49CD52890A45FF908AADDBF1CDAB605502013FC552BA67D34F4BA262D9ED8
3,057,336 UART: Caliptra RT
3,057,587 UART: [state] CFI Enabled
3,177,195 UART: [rt] RT listening for mailbox commands...
3,177,865 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,549 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,116 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Unprovisioned
85,956 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
891,469 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,573 UART: [kat] ++
895,725 UART: [kat] sha1
899,945 UART: [kat] SHA2-256
901,885 UART: [kat] SHA2-384
904,530 UART: [kat] SHA2-512-ACC
906,431 UART: [kat] ECC-384
916,520 UART: [kat] HMAC-384Kdf
921,286 UART: [kat] LMS
1,169,598 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,965 UART: [fht] FHT @ 0x50003400
1,173,801 UART: [idev] ++
1,173,969 UART: [idev] CDI.KEYID = 6
1,174,330 UART: [idev] SUBJECT.KEYID = 7
1,174,755 UART: [idev] UDS.KEYID = 0
1,175,101 ready_for_fw is high
1,175,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,436 UART: [idev] Erasing UDS.KEYID = 0
1,199,554 UART: [idev] Sha1 KeyId Algorithm
1,208,416 UART: [idev] --
1,209,267 UART: [ldev] ++
1,209,435 UART: [ldev] CDI.KEYID = 6
1,209,799 UART: [ldev] SUBJECT.KEYID = 5
1,210,226 UART: [ldev] AUTHORITY.KEYID = 7
1,210,689 UART: [ldev] FE.KEYID = 1
1,216,083 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,203 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,137 UART: [fwproc] Recv command 0x46574c44
1,283,870 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,573 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,352 >>> mbox cmd response: success
2,827,402 UART: [afmc] ++
2,827,570 UART: [afmc] CDI.KEYID = 6
2,827,933 UART: [afmc] SUBJECT.KEYID = 7
2,828,359 UART: [afmc] AUTHORITY.KEYID = 5
2,864,310 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,617 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,318 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,185 UART: [afmc] --
2,907,050 UART: [cold-reset] --
2,907,898 UART: [state] Locking Datavault
2,908,909 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,513 UART: [state] Locking ICCM
2,910,137 UART: [exit] Launching FMC @ 0x40000130
2,915,467 UART:
2,915,483 UART: Running Caliptra FMC ...
2,915,891 UART:
2,916,034 UART: [state] CFI Enabled
2,926,714 UART: [fht] FMC Alias Private Key: 7
3,045,544 UART: [art] Extend RT PCRs Done
3,045,972 UART: [art] Lock RT PCRs Done
3,047,744 UART: [art] Populate DV Done
3,056,115 UART: [fht] FMC Alias Private Key: 7
3,057,109 UART: [art] Derive CDI
3,057,389 UART: [art] Store in slot 0x4
3,143,422 UART: [art] Derive Key Pair
3,143,782 UART: [art] Store priv key in slot 0x5
3,157,248 UART: [art] Derive Key Pair - Done
3,172,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,116 UART: [art] PUB.X = 36F838F4C18FCE5467E1DF78BCE4AB82E2130E03B0E11F026B366A444E6255BB577A6E876CD396E1B3F6A80252FDDAC5
3,194,886 UART: [art] PUB.Y = A5D7C1BD5AD394E0810AE6ABBF510DB0668A3E368B3BC61A502375C8F421334F070EA4DAA752A0FB4635691567F1607C
3,201,832 UART: [art] SIG.R = 9467F1B33BC39A60907989F54483CCC207B5BC24288F692801ECDFBB3C28FF70B22D9E99310F5C9EDCC39FF127FAC0B5
3,208,605 UART: [art] SIG.S = BD4C9A2D898BEFA32F5DE9479FE95357A400A5FF9674E9D6C34E478499A8243BC5FE4A763433D4864036DDE11EDCF486
3,232,295 UART: Caliptra RT
3,232,638 UART: [state] CFI Enabled
3,351,886 UART: [rt] RT listening for mailbox commands...
3,352,556 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,218 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,297 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,565 ready_for_fw is high
1,059,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,133 >>> mbox cmd response: success
2,741,322 UART:
2,741,338 UART: Running Caliptra FMC ...
2,741,746 UART:
2,741,889 UART: [state] CFI Enabled
2,752,459 UART: [fht] FMC Alias Private Key: 7
2,871,999 UART: [art] Extend RT PCRs Done
2,872,427 UART: [art] Lock RT PCRs Done
2,873,747 UART: [art] Populate DV Done
2,881,962 UART: [fht] FMC Alias Private Key: 7
2,882,954 UART: [art] Derive CDI
2,883,234 UART: [art] Store in slot 0x4
2,969,019 UART: [art] Derive Key Pair
2,969,379 UART: [art] Store priv key in slot 0x5
2,983,191 UART: [art] Derive Key Pair - Done
2,997,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,875 UART: [art] PUB.X = 296B756CB78B27E0946D83BAACD8E3B9A815A7E983726BC77ACF75C3EF1C8806D883F788D70FF4DEA2A8D687EBAEF504
3,020,654 UART: [art] PUB.Y = CCB0540E5B98D499F97512ECBC41452968358E2C19CEF47BFE462EF28682351D98AEBB2CE9D361A65EC9D4B80030F51A
3,027,589 UART: [art] SIG.R = EBE6E799C6BCB2F9F575ECDC92C6013D7DDAFDAF51085658A6A1851252A5466BF1D4225ED5EB793703C9165E337395BE
3,034,362 UART: [art] SIG.S = 006EBE8BA9E56EA27D161531A5B81544F8A329C2E7AD8252D242D2A9800053E35A3B4043C9141987145A5F7E8B981784
3,058,160 UART: Caliptra RT
3,058,503 UART: [state] CFI Enabled
3,177,352 UART: [rt] RT listening for mailbox commands...
3,178,022 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,802 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,049 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,685 UART: [kat] SHA2-256
903,625 UART: [kat] SHA2-384
906,284 UART: [kat] SHA2-512-ACC
908,185 UART: [kat] ECC-384
917,498 UART: [kat] HMAC-384Kdf
921,904 UART: [kat] LMS
1,170,232 UART: [kat] --
1,170,923 UART: [cold-reset] ++
1,171,355 UART: [fht] FHT @ 0x50003400
1,174,144 UART: [idev] ++
1,174,312 UART: [idev] CDI.KEYID = 6
1,174,672 UART: [idev] SUBJECT.KEYID = 7
1,175,096 UART: [idev] UDS.KEYID = 0
1,175,441 ready_for_fw is high
1,175,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,384 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,208,491 UART: [idev] --
1,209,599 UART: [ldev] ++
1,209,767 UART: [ldev] CDI.KEYID = 6
1,210,130 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,019 UART: [ldev] Erasing FE.KEYID = 1
1,242,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,015 UART: [ldev] --
1,281,484 UART: [fwproc] Wait for Commands...
1,282,094 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,833 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,332 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,829 >>> mbox cmd response: success
2,827,851 UART: [afmc] ++
2,828,019 UART: [afmc] CDI.KEYID = 6
2,828,381 UART: [afmc] SUBJECT.KEYID = 7
2,828,806 UART: [afmc] AUTHORITY.KEYID = 5
2,864,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,111 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,503 UART: [afmc] --
2,907,631 UART: [cold-reset] --
2,908,545 UART: [state] Locking Datavault
2,909,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,264 UART: [state] Locking ICCM
2,910,808 UART: [exit] Launching FMC @ 0x40000130
2,916,138 UART:
2,916,154 UART: Running Caliptra FMC ...
2,916,562 UART:
2,916,616 UART: [state] CFI Enabled
2,927,508 UART: [fht] FMC Alias Private Key: 7
3,046,978 UART: [art] Extend RT PCRs Done
3,047,406 UART: [art] Lock RT PCRs Done
3,049,048 UART: [art] Populate DV Done
3,057,289 UART: [fht] FMC Alias Private Key: 7
3,058,221 UART: [art] Derive CDI
3,058,501 UART: [art] Store in slot 0x4
3,144,138 UART: [art] Derive Key Pair
3,144,498 UART: [art] Store priv key in slot 0x5
3,157,172 UART: [art] Derive Key Pair - Done
3,171,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,307 UART: [art] PUB.X = 0D674AA39F4DAD797B188E94077771B4E824950F74805046825A4BF578D9B632C9BA142B488B8A81AB8B0898A9E5DA2F
3,195,065 UART: [art] PUB.Y = CAB79809544EA86B880B3B0DCFF5E20A469B81FE212BAB172087EEC3050856556488839E8F692AB4F63F2FB8705302DB
3,201,998 UART: [art] SIG.R = B2627B13910345ACA2FB59B40C3091956E85E77C152F3E8ADC3BF2DD78FF1F85F6B0182D08922DF7B66C3CC753AA8F21
3,208,769 UART: [art] SIG.S = 8BF7992FBA06B0ADE3F2EF1F8C98CF9F704DD5861C3D733465EB26A2699E72440EB4302295F4E1BDC2AA87898809C5B8
3,232,302 UART: Caliptra RT
3,232,553 UART: [state] CFI Enabled
3,352,027 UART: [rt] RT listening for mailbox commands...
3,352,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,303 UART: [rt]cmd =0x4c4d5356, len=1672
3,656,736 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 ready_for_fw is high
1,060,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,896 >>> mbox cmd response: success
2,740,545 UART:
2,740,561 UART: Running Caliptra FMC ...
2,740,969 UART:
2,741,023 UART: [state] CFI Enabled
2,751,793 UART: [fht] FMC Alias Private Key: 7
2,871,241 UART: [art] Extend RT PCRs Done
2,871,669 UART: [art] Lock RT PCRs Done
2,873,257 UART: [art] Populate DV Done
2,881,600 UART: [fht] FMC Alias Private Key: 7
2,882,626 UART: [art] Derive CDI
2,882,906 UART: [art] Store in slot 0x4
2,968,775 UART: [art] Derive Key Pair
2,969,135 UART: [art] Store priv key in slot 0x5
2,982,303 UART: [art] Derive Key Pair - Done
2,996,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,085 UART: [art] PUB.X = D1ADC999D5C046F46F636B9531E4A16F1CDC88230BC77D4B34C6124E47C58F119313A7303534FFE33D07EE33AF70593B
3,019,853 UART: [art] PUB.Y = A1533D152716F4F468393A575AE0F31B78EB279F5BFC8CFF4C27F1C445BB60B1E2BA651554421B60F0B07347EA6989E1
3,026,807 UART: [art] SIG.R = 4FEBD596353FA78C878C37934EDEC5DA62F90E4F61F455830D9449563B3BF34E1ACE84611B0947CFCCF47BA8F028C54A
3,033,580 UART: [art] SIG.S = E5F137A16E06C30DBC85A62D366E25C19C85ACF7D419B96490CEB75E372A8DEFAD5A056178592F2D7D2B5B7AFD5BA781
3,056,845 UART: Caliptra RT
3,057,096 UART: [state] CFI Enabled
3,176,237 UART: [rt] RT listening for mailbox commands...
3,176,907 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,857 UART: [rt]cmd =0x4c4d5356, len=1672
3,481,008 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,967 UART: [kat] SHA2-256
893,617 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,742 UART: [kat] ++
897,894 UART: [kat] sha1
902,148 UART: [kat] SHA2-256
904,088 UART: [kat] SHA2-384
906,701 UART: [kat] SHA2-512-ACC
908,602 UART: [kat] ECC-384
918,239 UART: [kat] HMAC-384Kdf
922,839 UART: [kat] LMS
1,171,167 UART: [kat] --
1,172,170 UART: [cold-reset] ++
1,172,592 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 ready_for_fw is high
1,176,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,367 UART: [idev] Erasing UDS.KEYID = 0
1,201,838 UART: [idev] Sha1 KeyId Algorithm
1,210,514 UART: [idev] --
1,211,350 UART: [ldev] ++
1,211,518 UART: [ldev] CDI.KEYID = 6
1,211,881 UART: [ldev] SUBJECT.KEYID = 5
1,212,307 UART: [ldev] AUTHORITY.KEYID = 7
1,212,770 UART: [ldev] FE.KEYID = 1
1,217,924 UART: [ldev] Erasing FE.KEYID = 1
1,244,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,048 UART: [ldev] --
1,283,525 UART: [fwproc] Wait for Commands...
1,284,227 UART: [fwproc] Recv command 0x46574c44
1,284,955 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,275 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,606 >>> mbox cmd response: success
2,828,828 UART: [afmc] ++
2,828,996 UART: [afmc] CDI.KEYID = 6
2,829,358 UART: [afmc] SUBJECT.KEYID = 7
2,829,783 UART: [afmc] AUTHORITY.KEYID = 5
2,864,752 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,699 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,400 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,312 UART: [afmc] --
2,908,306 UART: [cold-reset] --
2,909,016 UART: [state] Locking Datavault
2,910,263 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,867 UART: [state] Locking ICCM
2,911,435 UART: [exit] Launching FMC @ 0x40000130
2,916,765 UART:
2,916,781 UART: Running Caliptra FMC ...
2,917,189 UART:
2,917,332 UART: [state] CFI Enabled
2,927,900 UART: [fht] FMC Alias Private Key: 7
3,046,996 UART: [art] Extend RT PCRs Done
3,047,424 UART: [art] Lock RT PCRs Done
3,048,820 UART: [art] Populate DV Done
3,057,053 UART: [fht] FMC Alias Private Key: 7
3,058,133 UART: [art] Derive CDI
3,058,413 UART: [art] Store in slot 0x4
3,143,580 UART: [art] Derive Key Pair
3,143,940 UART: [art] Store priv key in slot 0x5
3,157,220 UART: [art] Derive Key Pair - Done
3,171,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,346 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,111 UART: [art] PUB.X = C6CACE8CF98E57748DD8EB14684CB9B68E1043A80868E8B84FC21D085C9E0A3F20FEEC4213E375069A50BB8470792900
3,194,853 UART: [art] PUB.Y = AE04B43726FAA236883E4081E18C3B48BFF83DDE50FE56E81F67B8800B415890C17CD507A4DC3C1C749CE190738EBAE2
3,201,804 UART: [art] SIG.R = CC1F0FC80DED8635129C059F98EAD8AFA917FBC478B38E4EF87CDD307C000767281AE99A78FCD0F2A62FBF90E5510701
3,208,550 UART: [art] SIG.S = 1A58283DF0F204BC4A09A0DBFF50D990B70E42C676511A40616452F1C1FB2B79EFE00D69E8AA864CF7379C421790715C
3,232,548 UART: Caliptra RT
3,232,891 UART: [state] CFI Enabled
3,353,376 UART: [rt] RT listening for mailbox commands...
3,354,046 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,928 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,497 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,608 ready_for_fw is high
1,060,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,503 >>> mbox cmd response: success
2,744,354 UART:
2,744,370 UART: Running Caliptra FMC ...
2,744,778 UART:
2,744,921 UART: [state] CFI Enabled
2,755,309 UART: [fht] FMC Alias Private Key: 7
2,873,631 UART: [art] Extend RT PCRs Done
2,874,059 UART: [art] Lock RT PCRs Done
2,875,839 UART: [art] Populate DV Done
2,884,132 UART: [fht] FMC Alias Private Key: 7
2,885,174 UART: [art] Derive CDI
2,885,454 UART: [art] Store in slot 0x4
2,971,099 UART: [art] Derive Key Pair
2,971,459 UART: [art] Store priv key in slot 0x5
2,984,531 UART: [art] Derive Key Pair - Done
2,999,209 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,530 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,295 UART: [art] PUB.X = E2522D489D69FE0619C2C3185C5F2941D337C18AC54393C3D0E076808D619D89C6B3B3CFB28F725814449CCD03909B04
3,022,052 UART: [art] PUB.Y = ECDE0171AEFF79B4CC3D846FB9ED12A0B340FFF3049C781B8200D952645F657A45E7B7CB53B559B46DBDAF0364B6BC96
3,028,989 UART: [art] SIG.R = C5FB7101BE59D7340A57DE0562433D83A21A0C3C4CD3131D8B53477F55E1082E42E5A0CD7EE6CC8029ED953549D6A143
3,035,748 UART: [art] SIG.S = 6EFC5B2F684F4155FED39DD2B12DD7717101C28335ABCEC0AC80A9A06DB63652034C01FC5FECC81AED2EA4C996617306
3,059,254 UART: Caliptra RT
3,059,597 UART: [state] CFI Enabled
3,179,886 UART: [rt] RT listening for mailbox commands...
3,180,556 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,308 UART: [rt]cmd =0x4c4d5356, len=1672
3,484,639 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_key_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,011 UART:
192,373 UART: Running Caliptra ROM ...
193,502 UART:
193,653 UART: [state] CFI Enabled
265,975 UART: [state] LifecycleState = Unprovisioned
267,971 UART: [state] DebugLocked = No
270,218 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,878 UART: [kat] SHA2-256
444,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,079 UART: [kat] ++
455,568 UART: [kat] sha1
467,369 UART: [kat] SHA2-256
470,028 UART: [kat] SHA2-384
475,386 UART: [kat] SHA2-512-ACC
477,754 UART: [kat] ECC-384
2,767,365 UART: [kat] HMAC-384Kdf
2,800,010 UART: [kat] LMS
3,990,352 UART: [kat] --
3,994,370 UART: [cold-reset] ++
3,995,874 UART: [fht] Storing FHT @ 0x50003400
4,008,061 UART: [idev] ++
4,008,639 UART: [idev] CDI.KEYID = 6
4,009,553 UART: [idev] SUBJECT.KEYID = 7
4,010,803 UART: [idev] UDS.KEYID = 0
4,011,787 ready_for_fw is high
4,011,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,067 UART: [idev] Erasing UDS.KEYID = 0
7,347,038 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,996 UART: [idev] --
7,371,594 UART: [ldev] ++
7,372,167 UART: [ldev] CDI.KEYID = 6
7,373,137 UART: [ldev] SUBJECT.KEYID = 5
7,374,257 UART: [ldev] AUTHORITY.KEYID = 7
7,375,595 UART: [ldev] FE.KEYID = 1
7,414,504 UART: [ldev] Erasing FE.KEYID = 1
10,747,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,103 UART: [ldev] --
13,129,827 UART: [fwproc] Waiting for Commands...
13,133,220 UART: [fwproc] Received command 0x46574c44
13,135,400 UART: [fwproc] Received Image of size 118548 bytes
17,229,859 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,749 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,707,126 >>> mbox cmd response: success
17,711,595 UART: [afmc] ++
17,712,216 UART: [afmc] CDI.KEYID = 6
17,713,133 UART: [afmc] SUBJECT.KEYID = 7
17,714,407 UART: [afmc] AUTHORITY.KEYID = 5
21,082,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,380,386 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,382,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,397,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,411,829 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,426,240 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,448,557 UART: [afmc] --
23,452,424 UART: [cold-reset] --
23,455,801 UART: [state] Locking Datavault
23,462,342 UART: [state] Locking PCR0, PCR1 and PCR31
23,464,040 UART: [state] Locking ICCM
23,466,140 UART: [exit] Launching FMC @ 0x40000130
23,474,508 UART:
23,474,752 UART: Running Caliptra FMC ...
23,475,855 UART:
23,476,022 UART: [state] CFI Enabled
23,541,372 UART: [fht] FMC Alias Private Key: 7
25,881,600 UART: [art] Extend RT PCRs Done
25,882,837 UART: [art] Lock RT PCRs Done
25,884,413 UART: [art] Populate DV Done
25,889,943 UART: [fht] FMC Alias Private Key: 7
25,891,463 UART: [art] Derive CDI
25,892,231 UART: [art] Store in slot 0x4
25,949,263 UART: [art] Derive Key Pair
25,950,268 UART: [art] Store priv key in slot 0x5
29,243,031 UART: [art] Derive Key Pair - Done
29,255,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,942 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,468 UART: [art] PUB.X = ED19B120BBB4BE52C2FEB8A701C676CF7D724DEF3B5C066B1FFA10328A946A2A4659C8195BBDA078643106D703AF0924
31,553,716 UART: [art] PUB.Y = E454EDCCC59341C01A6AD6645F2CA8E048DB1BE1E222AB0B5D25A4310B4912DB31B8E1EE1C0332D8C01CF4E0DE7C246D
31,560,996 UART: [art] SIG.R = 73A8DB6B44EC527E947474332B7D4A6E1D84EFCA84F4DEB5507E05DC17844B176201EAFE746C62FC36703FCEB5691FA4
31,568,480 UART: [art] SIG.S = F429F4257E6207833144B27F2A19D77CF1DF985A0BFADB657F3B13D912CBF5CBC71EBC058DE79534B44D76D128E43A53
32,874,363 UART: Caliptra RT
32,875,079 UART: [state] CFI Enabled
33,070,532 UART: [rt] RT listening for mailbox commands...
33,074,506 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,119,331 UART: [rt]cmd =0x4c4d5356, len=1672
33,538,981 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,784,144 ready_for_fw is high
3,784,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,443 >>> mbox cmd response: success
23,633,739 UART:
23,634,165 UART: Running Caliptra FMC ...
23,635,274 UART:
23,635,437 UART: [state] CFI Enabled
23,704,177 UART: [fht] FMC Alias Private Key: 7
26,045,021 UART: [art] Extend RT PCRs Done
26,046,251 UART: [art] Lock RT PCRs Done
26,048,226 UART: [art] Populate DV Done
26,053,598 UART: [fht] FMC Alias Private Key: 7
26,055,086 UART: [art] Derive CDI
26,055,852 UART: [art] Store in slot 0x4
26,112,469 UART: [art] Derive Key Pair
26,113,511 UART: [art] Store priv key in slot 0x5
29,406,262 UART: [art] Derive Key Pair - Done
29,419,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,708,623 UART: [art] Erasing AUTHORITY.KEYID = 7
31,710,136 UART: [art] PUB.X = CCC4F9C9F1B532770B96F611F23CC2B883C11EA22D85E4A269C5D36A0498494DDA583453E24069F9F0821F1B1FD5CFBB
31,717,380 UART: [art] PUB.Y = 11A5DEDD36C0715945758A3431EC1AC5D2DE97571F46047211A332B1F21E2290E83ADF1A561AC85C6F6CE743AEB30CD0
31,724,625 UART: [art] SIG.R = 4651F85E46CEF84239D50C835A89CF338B5C7C688A69055C29C023480E596DA464D7EDC8F5F35E315B946E2C12EC554B
31,732,025 UART: [art] SIG.S = 3088CCD982CCF191E30DDD1A7A9DD7153CAB9778B912F5B4717C786F7DB6AF3E561FFA89526B605A7B35B3C61EDA4386
33,036,820 UART: Caliptra RT
33,037,535 UART: [state] CFI Enabled
33,215,301 UART: [rt] RT listening for mailbox commands...
33,219,275 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,263,924 UART: [rt]cmd =0x4c4d5356, len=1672
33,683,511 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,401 UART:
192,767 UART: Running Caliptra ROM ...
194,141 UART:
603,702 UART: [state] CFI Enabled
619,580 UART: [state] LifecycleState = Unprovisioned
621,539 UART: [state] DebugLocked = No
623,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,519 UART: [kat] SHA2-256
797,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,788 UART: [kat] ++
808,317 UART: [kat] sha1
819,196 UART: [kat] SHA2-256
821,907 UART: [kat] SHA2-384
827,108 UART: [kat] SHA2-512-ACC
829,490 UART: [kat] ECC-384
3,113,383 UART: [kat] HMAC-384Kdf
3,124,985 UART: [kat] LMS
4,315,065 UART: [kat] --
4,319,786 UART: [cold-reset] ++
4,321,503 UART: [fht] Storing FHT @ 0x50003400
4,331,780 UART: [idev] ++
4,332,341 UART: [idev] CDI.KEYID = 6
4,333,315 UART: [idev] SUBJECT.KEYID = 7
4,334,554 UART: [idev] UDS.KEYID = 0
4,335,599 ready_for_fw is high
4,335,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,921 UART: [idev] Erasing UDS.KEYID = 0
7,623,414 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,105 UART: [idev] --
7,648,556 UART: [ldev] ++
7,649,147 UART: [ldev] CDI.KEYID = 6
7,650,050 UART: [ldev] SUBJECT.KEYID = 5
7,651,259 UART: [ldev] AUTHORITY.KEYID = 7
7,652,536 UART: [ldev] FE.KEYID = 1
7,663,445 UART: [ldev] Erasing FE.KEYID = 1
10,951,825 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,809 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,420 UART: [ldev] --
13,311,918 UART: [fwproc] Waiting for Commands...
13,315,209 UART: [fwproc] Received command 0x46574c44
13,317,466 UART: [fwproc] Received Image of size 118548 bytes
17,426,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,717 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,874 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,456 >>> mbox cmd response: success
17,912,631 UART: [afmc] ++
17,913,227 UART: [afmc] CDI.KEYID = 6
17,914,188 UART: [afmc] SUBJECT.KEYID = 7
17,915,398 UART: [afmc] AUTHORITY.KEYID = 5
21,227,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,442 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,576 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,004 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,446 UART: [afmc] --
23,593,462 UART: [cold-reset] --
23,598,288 UART: [state] Locking Datavault
23,602,341 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,105 UART: [state] Locking ICCM
23,606,328 UART: [exit] Launching FMC @ 0x40000130
23,614,712 UART:
23,614,936 UART: Running Caliptra FMC ...
23,615,954 UART:
23,616,098 UART: [state] CFI Enabled
23,624,658 UART: [fht] FMC Alias Private Key: 7
25,964,858 UART: [art] Extend RT PCRs Done
25,966,088 UART: [art] Lock RT PCRs Done
25,967,913 UART: [art] Populate DV Done
25,973,214 UART: [fht] FMC Alias Private Key: 7
25,974,799 UART: [art] Derive CDI
25,975,533 UART: [art] Store in slot 0x4
26,018,277 UART: [art] Derive Key Pair
26,019,270 UART: [art] Store priv key in slot 0x5
29,261,243 UART: [art] Derive Key Pair - Done
29,274,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,642 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,147 UART: [art] PUB.X = 7CF426DD486006190DCAA73954512572BAAA9E0D41A80757827E497E0CD1952DC6896446B3BD2391D5F68060F7218A1E
31,563,387 UART: [art] PUB.Y = B46780F2AA98B7A629C93D528AA61034C5F89EE975CE18A3026941C93BCDA27701F0D4565B119430258982181FEED3DF
31,570,673 UART: [art] SIG.R = 0C809C8E1274E169CC2A075D56EA5B39921F0117F74FC338EECCF5308F3BF1207AA3DF572C450D378784744441FE9B6C
31,578,050 UART: [art] SIG.S = 8F6D8CFA583549BB411903E6AB9D0D5631C12EC11AAC1809847CB7316FF7F87EAF46F5DA118784CD1C0710FF439C94ED
32,882,824 UART: Caliptra RT
32,883,524 UART: [state] CFI Enabled
33,016,707 UART: [rt] RT listening for mailbox commands...
33,020,715 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,065,390 UART: [rt]cmd =0x4c4d5356, len=1672
33,484,773 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,416 writing to cptra_bootfsm_go
4,130,974 ready_for_fw is high
4,131,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,062 >>> mbox cmd response: success
23,798,535 UART:
23,798,963 UART: Running Caliptra FMC ...
23,800,075 UART:
23,800,229 UART: [state] CFI Enabled
23,808,290 UART: [fht] FMC Alias Private Key: 7
26,147,670 UART: [art] Extend RT PCRs Done
26,148,900 UART: [art] Lock RT PCRs Done
26,150,548 UART: [art] Populate DV Done
26,156,128 UART: [fht] FMC Alias Private Key: 7
26,157,776 UART: [art] Derive CDI
26,158,512 UART: [art] Store in slot 0x4
26,200,955 UART: [art] Derive Key Pair
26,201,957 UART: [art] Store priv key in slot 0x5
29,444,294 UART: [art] Derive Key Pair - Done
29,456,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,232 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,747 UART: [art] PUB.X = BDA0454394E684C5E9B734EC6A8210FC363107A41E4352BBD8E0778C2541471F6D3444EC4470A7183CEF4AB53DD9D19F
31,745,998 UART: [art] PUB.Y = 41DDE466A0B38B7A734DAED4CE06FEEAB4AC8C3E0254950CBB9FB1FE47BEE9677730C45B71B83A49F06C4B94A0A81240
31,753,345 UART: [art] SIG.R = 0066E32E7DE6BA904C6FA28E4D1889B6F7BA73EB9A1FB983FD8F30C7A1207C34656D3D8379A22F32C557D6001BCA145B
31,760,698 UART: [art] SIG.S = F8874D066FC0CDC731649E3F6152B0BC7CE3AB16CAFCE17F6BA6CAA261518016DF8AF1EA9DD99AD58C89C488DE2B4A8A
33,065,761 UART: Caliptra RT
33,066,466 UART: [state] CFI Enabled
33,199,616 UART: [rt] RT listening for mailbox commands...
33,203,608 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,248,102 UART: [rt]cmd =0x4c4d5356, len=1672
33,667,570 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,297 UART:
192,657 UART: Running Caliptra ROM ...
193,841 UART:
193,992 UART: [state] CFI Enabled
264,804 UART: [state] LifecycleState = Unprovisioned
266,806 UART: [state] DebugLocked = No
269,483 UART: [state] WD Timer not started. Device not locked for debugging
273,951 UART: [kat] SHA2-256
453,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,433 UART: [kat] ++
464,885 UART: [kat] sha1
476,395 UART: [kat] SHA2-256
479,121 UART: [kat] SHA2-384
485,394 UART: [kat] SHA2-512-ACC
487,758 UART: [kat] ECC-384
2,947,592 UART: [kat] HMAC-384Kdf
2,969,869 UART: [kat] LMS
3,446,339 UART: [kat] --
3,451,139 UART: [cold-reset] ++
3,452,354 UART: [fht] FHT @ 0x50003400
3,463,959 UART: [idev] ++
3,464,513 UART: [idev] CDI.KEYID = 6
3,465,539 UART: [idev] SUBJECT.KEYID = 7
3,466,707 UART: [idev] UDS.KEYID = 0
3,467,633 ready_for_fw is high
3,467,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,973 UART: [idev] Erasing UDS.KEYID = 0
5,984,506 UART: [idev] Sha1 KeyId Algorithm
6,007,798 UART: [idev] --
6,012,445 UART: [ldev] ++
6,013,017 UART: [ldev] CDI.KEYID = 6
6,014,036 UART: [ldev] SUBJECT.KEYID = 5
6,015,158 UART: [ldev] AUTHORITY.KEYID = 7
6,016,388 UART: [ldev] FE.KEYID = 1
6,056,203 UART: [ldev] Erasing FE.KEYID = 1
8,562,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,888 UART: [ldev] --
10,370,720 UART: [fwproc] Wait for Commands...
10,372,807 UART: [fwproc] Recv command 0x46574c44
10,374,784 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,192 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,220 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,596 >>> mbox cmd response: success
14,350,036 UART: [afmc] ++
14,350,655 UART: [afmc] CDI.KEYID = 6
14,351,600 UART: [afmc] SUBJECT.KEYID = 7
14,352,811 UART: [afmc] AUTHORITY.KEYID = 5
16,895,989 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,420 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,649 UART: [afmc] --
18,714,652 UART: [cold-reset] --
18,718,827 UART: [state] Locking Datavault
18,723,094 UART: [state] Locking PCR0, PCR1 and PCR31
18,724,791 UART: [state] Locking ICCM
18,726,235 UART: [exit] Launching FMC @ 0x40000130
18,734,647 UART:
18,734,891 UART: Running Caliptra FMC ...
18,735,986 UART:
18,736,147 UART: [state] CFI Enabled
18,794,886 UART: [fht] FMC Alias Private Key: 7
20,582,733 UART: [art] Extend RT PCRs Done
20,583,953 UART: [art] Lock RT PCRs Done
20,585,601 UART: [art] Populate DV Done
20,591,163 UART: [fht] FMC Alias Private Key: 7
20,592,748 UART: [art] Derive CDI
20,593,555 UART: [art] Store in slot 0x4
20,649,295 UART: [art] Derive Key Pair
20,650,335 UART: [art] Store priv key in slot 0x5
23,112,595 UART: [art] Derive Key Pair - Done
23,125,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,838,812 UART: [art] Erasing AUTHORITY.KEYID = 7
24,840,317 UART: [art] PUB.X = 6C15C6958B9250F884EAEE542B22CAEF81153973031BA221380EF9C101EF80C5DEDAB186757F8E5670AF667F058473B4
24,847,616 UART: [art] PUB.Y = D617ABF9833C69EFF3F4D2D1CD918B279D3A5BECB240A4B5C0DDC33F085EEF6EF298E20DCA212DCCF1BD6542D6D427EF
24,854,894 UART: [art] SIG.R = 8622A06ABB56D24B21F5916B4E42E653A81332D6A863AE013BA7A02572FFA893C27F216279D57A933417F1B9038DE0EC
24,862,424 UART: [art] SIG.S = BE02E8BFDFD5EF76F6CA57C15D69AFBA4729816EA174C3ADA02BEE184156069280AF8BBE3BDD1F5FFC02C3FAF1A68CBE
25,840,829 UART: Caliptra RT
25,841,538 UART: [state] CFI Enabled
26,023,233 UART: [rt] RT listening for mailbox commands...
26,027,164 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,071,747 UART: [rt]cmd =0x4c4d5356, len=1672
26,284,877 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
3,459,565 ready_for_fw is high
3,460,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,368 >>> mbox cmd response: success
18,534,482 UART:
18,534,885 UART: Running Caliptra FMC ...
18,536,077 UART:
18,536,256 UART: [state] CFI Enabled
18,604,204 UART: [fht] FMC Alias Private Key: 7
20,391,468 UART: [art] Extend RT PCRs Done
20,392,692 UART: [art] Lock RT PCRs Done
20,394,392 UART: [art] Populate DV Done
20,399,927 UART: [fht] FMC Alias Private Key: 7
20,401,630 UART: [art] Derive CDI
20,402,441 UART: [art] Store in slot 0x4
20,458,133 UART: [art] Derive Key Pair
20,459,172 UART: [art] Store priv key in slot 0x5
22,922,434 UART: [art] Derive Key Pair - Done
22,935,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,785 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,290 UART: [art] PUB.X = 97243B9FB4DDC09CE72EA003C48D2C7D9CF814B566F4BBE7911CC33BE0ED5B09A6787FFC185581C8F2F5A59C71640FCB
24,656,610 UART: [art] PUB.Y = 224262D25B59F8333A6F3BC93665C93BB6CF89255F23E5B09B358B9FC3D27610824D809E1CD0605158C82BE0E411611F
24,663,804 UART: [art] SIG.R = 639BF18CA8AFBAD05A2FDC73D56469D0FC9690851B9146A734F3DCCA11CE28F9CDA780CDB90EAC0207593064B12143CD
24,671,201 UART: [art] SIG.S = 65DA4DCF4863108E6D28BF33B44DA5499A03FBBD768A560A589AE97A5776DA706C22F6042A9A454FCBFFC0558AD5D1D2
25,649,965 UART: Caliptra RT
25,650,667 UART: [state] CFI Enabled
25,833,142 UART: [rt] RT listening for mailbox commands...
25,837,095 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,881,558 UART: [rt]cmd =0x4c4d5356, len=1672
26,094,792 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,399 UART:
192,754 UART: Running Caliptra ROM ...
193,851 UART:
603,843 UART: [state] CFI Enabled
621,444 UART: [state] LifecycleState = Unprovisioned
623,392 UART: [state] DebugLocked = No
625,982 UART: [state] WD Timer not started. Device not locked for debugging
630,237 UART: [kat] SHA2-256
809,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,644 UART: [kat] ++
821,100 UART: [kat] sha1
832,352 UART: [kat] SHA2-256
835,017 UART: [kat] SHA2-384
839,522 UART: [kat] SHA2-512-ACC
841,892 UART: [kat] ECC-384
3,285,306 UART: [kat] HMAC-384Kdf
3,296,922 UART: [kat] LMS
3,773,404 UART: [kat] --
3,777,148 UART: [cold-reset] ++
3,779,569 UART: [fht] FHT @ 0x50003400
3,791,097 UART: [idev] ++
3,791,688 UART: [idev] CDI.KEYID = 6
3,792,601 UART: [idev] SUBJECT.KEYID = 7
3,793,851 UART: [idev] UDS.KEYID = 0
3,794,778 ready_for_fw is high
3,795,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,940 UART: [idev] Erasing UDS.KEYID = 0
6,268,437 UART: [idev] Sha1 KeyId Algorithm
6,292,364 UART: [idev] --
6,296,904 UART: [ldev] ++
6,297,526 UART: [ldev] CDI.KEYID = 6
6,298,438 UART: [ldev] SUBJECT.KEYID = 5
6,299,670 UART: [ldev] AUTHORITY.KEYID = 7
6,300,907 UART: [ldev] FE.KEYID = 1
6,312,796 UART: [ldev] Erasing FE.KEYID = 1
8,783,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,318 UART: [ldev] --
10,575,987 UART: [fwproc] Wait for Commands...
10,578,673 UART: [fwproc] Recv command 0x46574c44
10,580,678 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,259 >>> mbox cmd response: success
14,552,549 UART: [afmc] ++
14,553,165 UART: [afmc] CDI.KEYID = 6
14,554,198 UART: [afmc] SUBJECT.KEYID = 7
14,555,305 UART: [afmc] AUTHORITY.KEYID = 5
17,057,237 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,112 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,196 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,768 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,772 UART: [afmc] --
18,856,878 UART: [cold-reset] --
18,860,197 UART: [state] Locking Datavault
18,865,390 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,153 UART: [state] Locking ICCM
18,869,335 UART: [exit] Launching FMC @ 0x40000130
18,877,752 UART:
18,877,987 UART: Running Caliptra FMC ...
18,879,015 UART:
18,879,170 UART: [state] CFI Enabled
18,887,546 UART: [fht] FMC Alias Private Key: 7
20,653,289 UART: [art] Extend RT PCRs Done
20,654,489 UART: [art] Lock RT PCRs Done
20,655,883 UART: [art] Populate DV Done
20,661,332 UART: [fht] FMC Alias Private Key: 7
20,663,037 UART: [art] Derive CDI
20,663,788 UART: [art] Store in slot 0x4
20,706,652 UART: [art] Derive Key Pair
20,707,692 UART: [art] Store priv key in slot 0x5
23,134,007 UART: [art] Derive Key Pair - Done
23,146,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,557 UART: [art] Erasing AUTHORITY.KEYID = 7
24,855,071 UART: [art] PUB.X = 97290CBCF129BF5231F656BA56B0BF890F8F98D4A910F2A97B144C9BFD47B5431FA7F886ECCBB575D252979EF9BD8EC5
24,862,386 UART: [art] PUB.Y = A71C51A2EC9BD575A324BB006F450512963AB48BB10C4CEE6F1D5FCB450561E3F57B177A610CFB330F625B0BCD51FEC0
24,869,622 UART: [art] SIG.R = F29D82E7D549CE11D390CE7DD6EF18052A817AAFE19A0F5D63CDCA2B30D161A182E8C23B9075AFEDE3690BA1F655BCF9
24,877,014 UART: [art] SIG.S = ADC6C6E987CD075311049F127A603D75461EBABE3F59BD90F91AD99BDD627475CE1A8C8165AFD3F3EA9C59302B0799A3
25,855,904 UART: Caliptra RT
25,856,592 UART: [state] CFI Enabled
25,989,059 UART: [rt] RT listening for mailbox commands...
25,992,967 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,037,459 UART: [rt]cmd =0x4c4d5356, len=1672
26,250,698 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,772,113 ready_for_fw is high
3,772,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,944 >>> mbox cmd response: success
18,697,461 UART:
18,697,869 UART: Running Caliptra FMC ...
18,699,081 UART:
18,699,262 UART: [state] CFI Enabled
18,707,322 UART: [fht] FMC Alias Private Key: 7
20,473,540 UART: [art] Extend RT PCRs Done
20,474,761 UART: [art] Lock RT PCRs Done
20,476,465 UART: [art] Populate DV Done
20,481,778 UART: [fht] FMC Alias Private Key: 7
20,483,323 UART: [art] Derive CDI
20,484,145 UART: [art] Store in slot 0x4
20,526,803 UART: [art] Derive Key Pair
20,527,846 UART: [art] Store priv key in slot 0x5
22,954,614 UART: [art] Derive Key Pair - Done
22,967,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,715 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,218 UART: [art] PUB.X = 16F6B75CDC17D58CB7CA7879DC0541FE6C1C24ED083BD0CC6A67BE6C501A50FEB513331A20A4C530C871EEA50BC1981A
24,682,495 UART: [art] PUB.Y = 0E47F00205696C601344B6BC3C574A9ADE4DD74E2CB4AE784DF5294D7A0E1F4518E9DA837B1E0C2AFCA26CB65A1650E4
24,689,787 UART: [art] SIG.R = 116EE8967C0FD4FD2CB03C38A030BD27E7C8656078B09F79F7C604267010C40C6B7CF096B0616FE17528C7DB0FF5FA14
24,697,198 UART: [art] SIG.S = B7224E9474DADE959AE78BA8431D39AC3271A14F04CF6D9482BA458AF5389FE60671D3BA04930465D7E07B1F2782BE1B
25,676,129 UART: Caliptra RT
25,676,825 UART: [state] CFI Enabled
25,809,270 UART: [rt] RT listening for mailbox commands...
25,813,275 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,857,829 UART: [rt]cmd =0x4c4d5356, len=1672
26,070,945 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,038 UART:
192,418 UART: Running Caliptra ROM ...
193,519 UART:
193,664 UART: [state] CFI Enabled
266,060 UART: [state] LifecycleState = Unprovisioned
268,468 UART: [state] DebugLocked = No
270,130 UART: [state] WD Timer not started. Device not locked for debugging
274,660 UART: [kat] SHA2-256
464,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,332 UART: [kat] ++
475,777 UART: [kat] sha1
487,290 UART: [kat] SHA2-256
490,288 UART: [kat] SHA2-384
495,634 UART: [kat] SHA2-512-ACC
498,210 UART: [kat] ECC-384
2,949,343 UART: [kat] HMAC-384Kdf
2,971,176 UART: [kat] LMS
3,502,944 UART: [kat] --
3,507,582 UART: [cold-reset] ++
3,509,805 UART: [fht] FHT @ 0x50003400
3,521,067 UART: [idev] ++
3,521,703 UART: [idev] CDI.KEYID = 6
3,522,731 UART: [idev] SUBJECT.KEYID = 7
3,523,898 UART: [idev] UDS.KEYID = 0
3,524,821 ready_for_fw is high
3,525,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,082 UART: [idev] Erasing UDS.KEYID = 0
6,029,620 UART: [idev] Sha1 KeyId Algorithm
6,050,628 UART: [idev] --
6,055,445 UART: [ldev] ++
6,056,168 UART: [ldev] CDI.KEYID = 6
6,057,087 UART: [ldev] SUBJECT.KEYID = 5
6,058,247 UART: [ldev] AUTHORITY.KEYID = 7
6,059,495 UART: [ldev] FE.KEYID = 1
6,099,304 UART: [ldev] Erasing FE.KEYID = 1
8,603,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,411 UART: [ldev] --
10,412,356 UART: [fwproc] Wait for Commands...
10,414,662 UART: [fwproc] Recv command 0x46574c44
10,416,911 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,783 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,287 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,887 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,235 >>> mbox cmd response: success
14,685,385 UART: [afmc] ++
14,686,134 UART: [afmc] CDI.KEYID = 6
14,687,326 UART: [afmc] SUBJECT.KEYID = 7
14,688,760 UART: [afmc] AUTHORITY.KEYID = 5
17,234,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,359 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,614 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,479 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,261 UART: [afmc] --
19,035,463 UART: [cold-reset] --
19,038,467 UART: [state] Locking Datavault
19,044,262 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,466 UART: [state] Locking ICCM
19,049,157 UART: [exit] Launching FMC @ 0x40000130
19,057,832 UART:
19,058,082 UART: Running Caliptra FMC ...
19,059,187 UART:
19,059,346 UART: [state] CFI Enabled
19,117,377 UART: [fht] FMC Alias Private Key: 7
20,905,481 UART: [art] Extend RT PCRs Done
20,906,695 UART: [art] Lock RT PCRs Done
20,908,423 UART: [art] Populate DV Done
20,913,447 UART: [fht] FMC Alias Private Key: 7
20,915,099 UART: [art] Derive CDI
20,915,916 UART: [art] Store in slot 0x4
20,971,148 UART: [art] Derive Key Pair
20,972,174 UART: [art] Store priv key in slot 0x5
23,435,272 UART: [art] Derive Key Pair - Done
23,448,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,135 UART: [art] PUB.X = 8CC76E887924B82F20143D7E479E9ECA58C7C3E1792C253CE1DF67012390891609B0F7B5835148FE8DD5B69CFF414C88
25,169,463 UART: [art] PUB.Y = B115B93D2C84333BEE0EC5361DDCF886B4901C2885DC55AA23B3B4F40C1646E1CF46C90AA20582205577ECCFCBFA84A8
25,176,696 UART: [art] SIG.R = A4CDC368E8F3F2DF35E979A34F090C90B99DA1B643F85A2E0BE0D59C55B95F36E0E00588EEFBACDC5570CD9A0CFAAE58
25,184,114 UART: [art] SIG.S = 5BB3319D6BC498884624B35453E824CD8B768A9CA18DDCCA02049475A17E3DDFC62EEF506E586721D11884AD78823313
26,163,196 UART: Caliptra RT
26,163,901 UART: [state] CFI Enabled
26,343,099 UART: [rt] RT listening for mailbox commands...
26,347,005 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,391,522 UART: [rt]cmd =0x4c4d5356, len=1672
26,604,704 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,438,051 ready_for_fw is high
3,438,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,653 >>> mbox cmd response: success
19,134,014 UART:
19,134,426 UART: Running Caliptra FMC ...
19,135,530 UART:
19,135,681 UART: [state] CFI Enabled
19,200,815 UART: [fht] FMC Alias Private Key: 7
20,967,048 UART: [art] Extend RT PCRs Done
20,968,299 UART: [art] Lock RT PCRs Done
20,970,069 UART: [art] Populate DV Done
20,975,493 UART: [fht] FMC Alias Private Key: 7
20,977,027 UART: [art] Derive CDI
20,977,763 UART: [art] Store in slot 0x4
21,033,571 UART: [art] Derive Key Pair
21,034,615 UART: [art] Store priv key in slot 0x5
23,497,656 UART: [art] Derive Key Pair - Done
23,510,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,451 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,962 UART: [art] PUB.X = 842064E3EB9E2CC86591A523EAE13691850F8AD98168830A793D16417F25564E5E3016F8E02590EAE662DFBACCD3DE31
25,232,229 UART: [art] PUB.Y = 10F7DB903BA6563440D796B2D492B9CBCB65AD83B81749B5A727553642403F2D182651DEFBEBBB0D6B6E133F099D9641
25,239,459 UART: [art] SIG.R = AB77A5CA4897EAF45A342E3D65B99566F9CBDFBC5CE94C0FB00BA710F2F6769D5A60553BFD071AC63B4C4C65FA39ECD3
25,246,901 UART: [art] SIG.S = 50A938CD6E4FD4ECB643FE1CADA314E9290DA0A0C50A4687F26BDC88F0B89FF1479773A64CB41292FF067026F5196EBC
26,225,411 UART: Caliptra RT
26,226,122 UART: [state] CFI Enabled
26,408,928 UART: [rt] RT listening for mailbox commands...
26,412,871 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,457,319 UART: [rt]cmd =0x4c4d5356, len=1672
26,670,339 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,464 UART:
192,829 UART: Running Caliptra ROM ...
194,032 UART:
603,664 UART: [state] CFI Enabled
616,141 UART: [state] LifecycleState = Unprovisioned
618,520 UART: [state] DebugLocked = No
619,837 UART: [state] WD Timer not started. Device not locked for debugging
625,099 UART: [kat] SHA2-256
814,995 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,773 UART: [kat] ++
826,390 UART: [kat] sha1
837,778 UART: [kat] SHA2-256
840,854 UART: [kat] SHA2-384
845,993 UART: [kat] SHA2-512-ACC
848,583 UART: [kat] ECC-384
3,291,836 UART: [kat] HMAC-384Kdf
3,304,393 UART: [kat] LMS
3,836,178 UART: [kat] --
3,840,312 UART: [cold-reset] ++
3,842,315 UART: [fht] FHT @ 0x50003400
3,852,581 UART: [idev] ++
3,853,300 UART: [idev] CDI.KEYID = 6
3,854,336 UART: [idev] SUBJECT.KEYID = 7
3,855,441 UART: [idev] UDS.KEYID = 0
3,856,371 ready_for_fw is high
3,856,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,428 UART: [idev] Erasing UDS.KEYID = 0
6,337,470 UART: [idev] Sha1 KeyId Algorithm
6,359,048 UART: [idev] --
6,363,427 UART: [ldev] ++
6,364,120 UART: [ldev] CDI.KEYID = 6
6,365,033 UART: [ldev] SUBJECT.KEYID = 5
6,366,200 UART: [ldev] AUTHORITY.KEYID = 7
6,367,445 UART: [ldev] FE.KEYID = 1
6,380,343 UART: [ldev] Erasing FE.KEYID = 1
8,857,506 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,169 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,864 UART: [ldev] --
10,647,177 UART: [fwproc] Wait for Commands...
10,649,112 UART: [fwproc] Recv command 0x46574c44
10,651,424 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,885 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,922 >>> mbox cmd response: success
14,911,757 UART: [afmc] ++
14,912,483 UART: [afmc] CDI.KEYID = 6
14,913,681 UART: [afmc] SUBJECT.KEYID = 7
14,915,129 UART: [afmc] AUTHORITY.KEYID = 5
17,419,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,809 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,067 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,777 UART: [afmc] --
19,218,056 UART: [cold-reset] --
19,222,582 UART: [state] Locking Datavault
19,226,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,755 UART: [state] Locking ICCM
19,231,733 UART: [exit] Launching FMC @ 0x40000130
19,240,388 UART:
19,240,632 UART: Running Caliptra FMC ...
19,241,740 UART:
19,241,911 UART: [state] CFI Enabled
19,249,917 UART: [fht] FMC Alias Private Key: 7
21,016,272 UART: [art] Extend RT PCRs Done
21,017,507 UART: [art] Lock RT PCRs Done
21,019,223 UART: [art] Populate DV Done
21,024,750 UART: [fht] FMC Alias Private Key: 7
21,026,476 UART: [art] Derive CDI
21,027,219 UART: [art] Store in slot 0x4
21,070,095 UART: [art] Derive Key Pair
21,071,145 UART: [art] Store priv key in slot 0x5
23,498,153 UART: [art] Derive Key Pair - Done
23,511,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,971 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,500 UART: [art] PUB.X = FF04A83C80DA0CE9A866511BF42AAED4A70C5B72FFFB93C80DF96C8D6548584AA8BF55965870126D00E70DAEF4E1A203
25,225,740 UART: [art] PUB.Y = 5D900FF206BEE88E8B2827684446EFFBCA7AD2E4C4E5AFB292770A8BF195E372BC26940493307F97568219A11EB1262F
25,232,954 UART: [art] SIG.R = C037D5B6B160CD5B3400C78EAAD85D6EB10EA179F81F6D32AE57A292C32AB4404E1B29437E426D28BF961055AB29D37E
25,240,390 UART: [art] SIG.S = B964398AA646EE72F24DA78157A122D2C9282C555B8794E88A384214D723C814AFC7C9E7BD0938C4F301FF5C9403D161
26,219,602 UART: Caliptra RT
26,220,313 UART: [state] CFI Enabled
26,352,873 UART: [rt] RT listening for mailbox commands...
26,356,821 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,401,364 UART: [rt]cmd =0x4c4d5356, len=1672
26,614,757 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,755,058 ready_for_fw is high
3,755,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,908 >>> mbox cmd response: success
19,298,332 UART:
19,298,726 UART: Running Caliptra FMC ...
19,299,934 UART:
19,300,110 UART: [state] CFI Enabled
19,307,742 UART: [fht] FMC Alias Private Key: 7
21,074,268 UART: [art] Extend RT PCRs Done
21,075,499 UART: [art] Lock RT PCRs Done
21,077,053 UART: [art] Populate DV Done
21,082,696 UART: [fht] FMC Alias Private Key: 7
21,084,189 UART: [art] Derive CDI
21,084,926 UART: [art] Store in slot 0x4
21,127,897 UART: [art] Derive Key Pair
21,128,917 UART: [art] Store priv key in slot 0x5
23,555,840 UART: [art] Derive Key Pair - Done
23,568,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,836 UART: [art] PUB.X = 50361A26214A2F38FE7EE38D0B88C80B7A9A75BA68D674CA803861B7297C9E3A006EA148F4158CBA81FB80853AAC0EC4
25,284,098 UART: [art] PUB.Y = 5BE798080870217819D300C44967636F17438C764AF693648D483BBFDDF64DA936B9C9BF629306CD64ED006795B356BE
25,291,271 UART: [art] SIG.R = 0398B2AC6A1B915F12A98AA7B9B4F9E1667234B7E4051913D31D7C866627ECA7FDD1D3242EBA15BD8FCA672237FDCFCD
25,298,692 UART: [art] SIG.S = 8439CE41E8A958BD49B0555A736A4B40833E3B168CF226008FEBDC4FE8A2DC2FB5EBE7648300507C90CEE7998FB3632A
26,277,854 UART: Caliptra RT
26,278,546 UART: [state] CFI Enabled
26,410,993 UART: [rt] RT listening for mailbox commands...
26,414,941 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,459,203 UART: [rt]cmd =0x4c4d5356, len=1672
26,672,179 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,883 UART: [kat] SHA2-256
881,814 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,929 UART: [kat] ++
886,081 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,734 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,269 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,348 UART: [idev] ++
1,479,516 UART: [idev] CDI.KEYID = 6
1,479,876 UART: [idev] SUBJECT.KEYID = 7
1,480,300 UART: [idev] UDS.KEYID = 0
1,480,645 ready_for_fw is high
1,480,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,342 UART: [idev] Erasing UDS.KEYID = 0
1,504,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,390 UART: [idev] --
1,514,505 UART: [ldev] ++
1,514,673 UART: [ldev] CDI.KEYID = 6
1,515,036 UART: [ldev] SUBJECT.KEYID = 5
1,515,462 UART: [ldev] AUTHORITY.KEYID = 7
1,515,925 UART: [ldev] FE.KEYID = 1
1,520,941 UART: [ldev] Erasing FE.KEYID = 1
1,547,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,002 UART: [ldev] --
1,586,353 UART: [fwproc] Waiting for Commands...
1,587,028 UART: [fwproc] Received command 0x46574c44
1,587,819 UART: [fwproc] Received Image of size 118548 bytes
2,931,865 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,049 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,267 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,496 >>> mbox cmd response: success
3,131,740 UART: [afmc] ++
3,131,908 UART: [afmc] CDI.KEYID = 6
3,132,270 UART: [afmc] SUBJECT.KEYID = 7
3,132,695 UART: [afmc] AUTHORITY.KEYID = 5
3,167,660 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,804 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,584 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,293 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,176 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,859 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,707 UART: [afmc] --
3,210,671 UART: [cold-reset] --
3,211,467 UART: [state] Locking Datavault
3,212,304 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,908 UART: [state] Locking ICCM
3,213,332 UART: [exit] Launching FMC @ 0x40000130
3,218,662 UART:
3,218,678 UART: Running Caliptra FMC ...
3,219,086 UART:
3,219,140 UART: [state] CFI Enabled
3,229,520 UART: [fht] FMC Alias Private Key: 7
3,348,808 UART: [art] Extend RT PCRs Done
3,349,236 UART: [art] Lock RT PCRs Done
3,351,126 UART: [art] Populate DV Done
3,359,335 UART: [fht] FMC Alias Private Key: 7
3,360,389 UART: [art] Derive CDI
3,360,669 UART: [art] Store in slot 0x4
3,446,453 UART: [art] Derive Key Pair
3,446,813 UART: [art] Store priv key in slot 0x5
3,460,508 UART: [art] Derive Key Pair - Done
3,474,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,525 UART: [art] PUB.X = C7960089F4B5D8CF94615FFC1609BF2CA43CD0C9EE91E65EA36CFD235B4476819080CC8D8ED82DD760834BCB1B9ACFD7
3,497,288 UART: [art] PUB.Y = 0DE16A0A50778C7CB6EB3199547CBE2355EDD2B54BB9E63403DDAB90018E136BF133C96C489A03002FD63ED867F8947D
3,504,209 UART: [art] SIG.R = 4B014C52E9DCD41524F9C520021C42F83F26FBA588133472B159CAD43067FB03DB88711D1B6BE53F334504234622F9E4
3,510,963 UART: [art] SIG.S = E61D6A74C1CAABF372F7C4FA5A9CD1B3B02BB4E3C99C926063C60FA3E4ED026C832D6FF09D18F945389B5B1552DFADEC
3,535,299 UART: Caliptra RT
3,535,550 UART: [state] CFI Enabled
3,655,176 UART: [rt] RT listening for mailbox commands...
3,655,846 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,512 UART: [rt]cmd =0x4c4d5356, len=1672
4,275,742 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,817 ready_for_fw is high
1,361,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,178 >>> mbox cmd response: success
3,040,703 UART:
3,040,719 UART: Running Caliptra FMC ...
3,041,127 UART:
3,041,181 UART: [state] CFI Enabled
3,051,691 UART: [fht] FMC Alias Private Key: 7
3,170,861 UART: [art] Extend RT PCRs Done
3,171,289 UART: [art] Lock RT PCRs Done
3,172,463 UART: [art] Populate DV Done
3,180,876 UART: [fht] FMC Alias Private Key: 7
3,181,904 UART: [art] Derive CDI
3,182,184 UART: [art] Store in slot 0x4
3,268,276 UART: [art] Derive Key Pair
3,268,636 UART: [art] Store priv key in slot 0x5
3,282,083 UART: [art] Derive Key Pair - Done
3,296,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,143 UART: [art] PUB.X = B749895EEFED6210C169D7F46E69A38327F34CCAC734A824A39BF409D5C63BA076F629AD5ACBEB70C9C698FFACEDA21F
3,319,932 UART: [art] PUB.Y = D999AC02F6EF2F3585FC978E2D0EBF4F766B4B53D93D9C2161FD37C55A532990103069145E9089E3ED50169145CFE6D1
3,326,878 UART: [art] SIG.R = F3650340C7EAAEA04AD3D5EE3A4652FF331D88DA152A517A925C8E4CE0592E729177159F7D1877390D39C3CBDB5F4A72
3,333,650 UART: [art] SIG.S = E928D38AB0C50218E2952FD6BF878F843256C58E6DEB9317C9AF7CBE398AEDE2085732006E2649686881F5610CBF27C5
3,357,443 UART: Caliptra RT
3,357,694 UART: [state] CFI Enabled
3,477,379 UART: [rt] RT listening for mailbox commands...
3,478,049 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,935 UART: [rt]cmd =0x4c4d5356, len=1672
4,097,531 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,736 UART: [kat] SHA2-256
892,674 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,581 UART: [kat] HMAC-384Kdf
907,195 UART: [kat] LMS
1,475,391 UART: [kat] --
1,476,226 UART: [cold-reset] ++
1,476,792 UART: [fht] Storing FHT @ 0x50003400
1,479,565 UART: [idev] ++
1,479,733 UART: [idev] CDI.KEYID = 6
1,480,093 UART: [idev] SUBJECT.KEYID = 7
1,480,517 UART: [idev] UDS.KEYID = 0
1,480,862 ready_for_fw is high
1,480,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,479 UART: [idev] Erasing UDS.KEYID = 0
1,505,357 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,821 UART: [idev] --
1,514,900 UART: [ldev] ++
1,515,068 UART: [ldev] CDI.KEYID = 6
1,515,431 UART: [ldev] SUBJECT.KEYID = 5
1,515,857 UART: [ldev] AUTHORITY.KEYID = 7
1,516,320 UART: [ldev] FE.KEYID = 1
1,521,884 UART: [ldev] Erasing FE.KEYID = 1
1,547,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,091 UART: [ldev] --
1,586,416 UART: [fwproc] Waiting for Commands...
1,587,221 UART: [fwproc] Received command 0x46574c44
1,588,012 UART: [fwproc] Received Image of size 118548 bytes
2,932,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,956 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,174 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,455 >>> mbox cmd response: success
3,132,611 UART: [afmc] ++
3,132,779 UART: [afmc] CDI.KEYID = 6
3,133,141 UART: [afmc] SUBJECT.KEYID = 7
3,133,566 UART: [afmc] AUTHORITY.KEYID = 5
3,168,961 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,017 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,726 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,609 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,292 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,322 UART: [afmc] --
3,212,300 UART: [cold-reset] --
3,213,184 UART: [state] Locking Datavault
3,214,403 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,007 UART: [state] Locking ICCM
3,215,593 UART: [exit] Launching FMC @ 0x40000130
3,220,923 UART:
3,220,939 UART: Running Caliptra FMC ...
3,221,347 UART:
3,221,490 UART: [state] CFI Enabled
3,232,492 UART: [fht] FMC Alias Private Key: 7
3,351,570 UART: [art] Extend RT PCRs Done
3,351,998 UART: [art] Lock RT PCRs Done
3,353,278 UART: [art] Populate DV Done
3,361,825 UART: [fht] FMC Alias Private Key: 7
3,362,785 UART: [art] Derive CDI
3,363,065 UART: [art] Store in slot 0x4
3,449,295 UART: [art] Derive Key Pair
3,449,655 UART: [art] Store priv key in slot 0x5
3,463,470 UART: [art] Derive Key Pair - Done
3,478,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,856 UART: [art] PUB.X = 93069CC7B35E9141B56E0288F13C3E864D662A6AA9E4205C5F4F6EF56C1D648C97166FFC06185600201DED33F7EE049E
3,501,594 UART: [art] PUB.Y = 43AA4FB67876A3D26A313AF25AEC00DC61FA82B044CB5022B66CF09734DC774BB5EA807DBCE61C23FF254D62AE192320
3,508,536 UART: [art] SIG.R = 8CB45FE799E2E827CFE0047DBBC667A844B1530CFD453A3A267F18314FC2547317BE3C8EB4468813A88BCBDB7AD3313A
3,515,312 UART: [art] SIG.S = 9692150376A393F98BF188882111C2AF592487A709D38DACBED9A2EB8F458ACB56F907CBF888E06E91C706E3E5E63322
3,539,116 UART: Caliptra RT
3,539,459 UART: [state] CFI Enabled
3,660,004 UART: [rt] RT listening for mailbox commands...
3,660,674 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,512 UART: [rt]cmd =0x4c4d5356, len=1672
4,280,454 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,850 ready_for_fw is high
1,362,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,139 >>> mbox cmd response: success
3,040,564 UART:
3,040,580 UART: Running Caliptra FMC ...
3,040,988 UART:
3,041,131 UART: [state] CFI Enabled
3,051,745 UART: [fht] FMC Alias Private Key: 7
3,170,589 UART: [art] Extend RT PCRs Done
3,171,017 UART: [art] Lock RT PCRs Done
3,172,573 UART: [art] Populate DV Done
3,181,040 UART: [fht] FMC Alias Private Key: 7
3,182,068 UART: [art] Derive CDI
3,182,348 UART: [art] Store in slot 0x4
3,267,806 UART: [art] Derive Key Pair
3,268,166 UART: [art] Store priv key in slot 0x5
3,281,437 UART: [art] Derive Key Pair - Done
3,296,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,889 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,654 UART: [art] PUB.X = B7268E5D68905AD6A4DB2F05D711AD4306E69AAD2B48424A1D84FD59F5033773D6E0BD1269B865A253BB59BEA6D82274
3,319,421 UART: [art] PUB.Y = E85AF91D78109571125EF75562A90BFC66CED0B27871964F43F98454A631BF40345454ABF3A13EE8A40CC054F7F35385
3,326,363 UART: [art] SIG.R = FFF9021968B51C1572127531EB9828E6E112DFE8392ED12A08EEFD2A3A1751425E773A6E8B1BDCD09D1B46523779E59A
3,333,131 UART: [art] SIG.S = 1B8CC80DCAA6D62C1132571D72FBA4C5096A99F31452CF76BAEC1D8F0C7CC2ECC7AB8942B10A32C84AC8F348F9E42BFC
3,356,959 UART: Caliptra RT
3,357,302 UART: [state] CFI Enabled
3,477,886 UART: [rt] RT listening for mailbox commands...
3,478,556 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,182 UART: [rt]cmd =0x4c4d5356, len=1672
4,097,704 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,849 UART: [state] WD Timer not started. Device not locked for debugging
88,164 UART: [kat] SHA2-256
891,714 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,818 UART: [kat] ++
895,970 UART: [kat] sha1
900,156 UART: [kat] SHA2-256
902,096 UART: [kat] SHA2-384
904,993 UART: [kat] SHA2-512-ACC
906,894 UART: [kat] ECC-384
916,571 UART: [kat] HMAC-384Kdf
921,211 UART: [kat] LMS
1,169,523 UART: [kat] --
1,170,346 UART: [cold-reset] ++
1,170,788 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,174,598 ready_for_fw is high
1,174,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,051 UART: [idev] Erasing UDS.KEYID = 0
1,199,281 UART: [idev] Sha1 KeyId Algorithm
1,208,033 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,360 UART: [ldev] Erasing FE.KEYID = 1
1,241,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,656 UART: [ldev] --
1,281,023 UART: [fwproc] Wait for Commands...
1,281,698 UART: [fwproc] Recv command 0x46574c44
1,282,431 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,183 >>> mbox cmd response: success
2,826,307 UART: [afmc] ++
2,826,475 UART: [afmc] CDI.KEYID = 6
2,826,838 UART: [afmc] SUBJECT.KEYID = 7
2,827,264 UART: [afmc] AUTHORITY.KEYID = 5
2,863,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,281 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,162 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,863 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,686 UART: [afmc] --
2,906,657 UART: [cold-reset] --
2,907,467 UART: [state] Locking Datavault
2,908,536 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,140 UART: [state] Locking ICCM
2,909,724 UART: [exit] Launching FMC @ 0x40000130
2,915,054 UART:
2,915,070 UART: Running Caliptra FMC ...
2,915,478 UART:
2,915,532 UART: [state] CFI Enabled
2,926,142 UART: [fht] FMC Alias Private Key: 7
3,045,408 UART: [art] Extend RT PCRs Done
3,045,836 UART: [art] Lock RT PCRs Done
3,047,194 UART: [art] Populate DV Done
3,055,317 UART: [fht] FMC Alias Private Key: 7
3,056,463 UART: [art] Derive CDI
3,056,743 UART: [art] Store in slot 0x4
3,142,446 UART: [art] Derive Key Pair
3,142,806 UART: [art] Store priv key in slot 0x5
3,155,696 UART: [art] Derive Key Pair - Done
3,170,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,543 UART: [art] PUB.X = 9A734F4985EF38ECB579C7A8676A378E74558FD4A918D654AAE8B7B2F8B2A838259BAC98DE66B94A732FB4E667B93F4E
3,193,323 UART: [art] PUB.Y = 6A3AFFB26DD13880CB71729A32BECD014C5FEF4DD3FD74F96F2D7CDA76A0311C8D13FBB440D7512B2CFA3C2BBACF5AEA
3,200,304 UART: [art] SIG.R = C6D108816B5B89CED5CEDF29EF00D75531E800862651E341B834ACCC0F34897A0AE2813CE7B166A38C0DA8AFABCBCC40
3,207,036 UART: [art] SIG.S = DB4E97D18CE9002B3B80891DE7FFBE08C0A080777FFAC80A32271677E4EDC98DB976A5931D5016284039502D6E21B31F
3,231,270 UART: Caliptra RT
3,231,521 UART: [state] CFI Enabled
3,350,857 UART: [rt] RT listening for mailbox commands...
3,351,527 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,063 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,551 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,848 ready_for_fw is high
1,058,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,244 >>> mbox cmd response: success
2,739,599 UART:
2,739,615 UART: Running Caliptra FMC ...
2,740,023 UART:
2,740,077 UART: [state] CFI Enabled
2,750,619 UART: [fht] FMC Alias Private Key: 7
2,869,461 UART: [art] Extend RT PCRs Done
2,869,889 UART: [art] Lock RT PCRs Done
2,871,293 UART: [art] Populate DV Done
2,879,254 UART: [fht] FMC Alias Private Key: 7
2,880,278 UART: [art] Derive CDI
2,880,558 UART: [art] Store in slot 0x4
2,966,443 UART: [art] Derive Key Pair
2,966,803 UART: [art] Store priv key in slot 0x5
2,980,545 UART: [art] Derive Key Pair - Done
2,995,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,974 UART: [art] PUB.X = 66C8BCE1EDAF975BA4713EAFCA30E7B71CB40FCEBF5EFDE8B67157B17CC0519A23F43C60D1FE6B5396430F8FC06D5AB2
3,018,766 UART: [art] PUB.Y = DCB4B24B876F89D379A01E8C030498A5CDC4B939A3CDB95D3CDBB4FA5AD51B45582FB4B12FD9A4CB98702F0FA2B7D393
3,025,729 UART: [art] SIG.R = 5740CDDC3EC8E7D13CCD65E183DCF8D08BDF733FD021643A30E97863A85E4917AE54E15A3EEEC35AD41A0860082CA91D
3,032,509 UART: [art] SIG.S = 23CF43DEFE7837064378623F6838776F86DE8CFB212A0EB58F10DCF84FA00871B37637E8AA0BA48564C8674443E5AAA8
3,056,743 UART: Caliptra RT
3,056,994 UART: [state] CFI Enabled
3,175,888 UART: [rt] RT listening for mailbox commands...
3,176,558 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,184 UART: [rt]cmd =0x4c4d5356, len=1672
3,480,388 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,884 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,828 UART: [kat] SHA2-512-ACC
906,729 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,523 UART: [fht] FHT @ 0x50003400
1,173,431 UART: [idev] ++
1,173,599 UART: [idev] CDI.KEYID = 6
1,173,960 UART: [idev] SUBJECT.KEYID = 7
1,174,385 UART: [idev] UDS.KEYID = 0
1,174,731 ready_for_fw is high
1,174,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,199,262 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,777 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,577 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,569 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,185 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,091 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,386 >>> mbox cmd response: success
2,828,430 UART: [afmc] ++
2,828,598 UART: [afmc] CDI.KEYID = 6
2,828,961 UART: [afmc] SUBJECT.KEYID = 7
2,829,387 UART: [afmc] AUTHORITY.KEYID = 5
2,865,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,551 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,300 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,891 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,592 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,423 UART: [afmc] --
2,908,346 UART: [cold-reset] --
2,909,342 UART: [state] Locking Datavault
2,910,249 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,853 UART: [state] Locking ICCM
2,911,337 UART: [exit] Launching FMC @ 0x40000130
2,916,667 UART:
2,916,683 UART: Running Caliptra FMC ...
2,917,091 UART:
2,917,234 UART: [state] CFI Enabled
2,928,070 UART: [fht] FMC Alias Private Key: 7
3,046,982 UART: [art] Extend RT PCRs Done
3,047,410 UART: [art] Lock RT PCRs Done
3,048,860 UART: [art] Populate DV Done
3,057,017 UART: [fht] FMC Alias Private Key: 7
3,058,059 UART: [art] Derive CDI
3,058,339 UART: [art] Store in slot 0x4
3,144,378 UART: [art] Derive Key Pair
3,144,738 UART: [art] Store priv key in slot 0x5
3,157,732 UART: [art] Derive Key Pair - Done
3,172,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,816 UART: [art] PUB.X = 91B030C32599CBC1B2B8ABE8F3042C8B895C6775DD7C12850DDF06B2B5A4DCFB5581B2BD9DFCD3E986E921AFDDFF0D4A
3,195,600 UART: [art] PUB.Y = F73A6269CA23E45AF0ABC8CCC9E37B1B3DB620BB1DFF9FA0202006FB9F07BCE21236337BECEF109E7F19925832950AA6
3,202,559 UART: [art] SIG.R = D5A80D3E4C453082C3BF03A84CB233486D76115BB230359774A48AF8D45140D39C95021FD279CFEF8DAF483A221C9196
3,209,320 UART: [art] SIG.S = F12E546C49CDBCF4809A65B74F6A8297577AD280EE7B23A5F3D201246902BCD3BE237A7FEF7F9E850C90D3C8EC6240D2
3,233,297 UART: Caliptra RT
3,233,640 UART: [state] CFI Enabled
3,353,928 UART: [rt] RT listening for mailbox commands...
3,354,598 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,052 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,588 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 ready_for_fw is high
1,059,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,553 >>> mbox cmd response: success
2,741,298 UART:
2,741,314 UART: Running Caliptra FMC ...
2,741,722 UART:
2,741,865 UART: [state] CFI Enabled
2,752,753 UART: [fht] FMC Alias Private Key: 7
2,870,991 UART: [art] Extend RT PCRs Done
2,871,419 UART: [art] Lock RT PCRs Done
2,872,987 UART: [art] Populate DV Done
2,881,084 UART: [fht] FMC Alias Private Key: 7
2,882,028 UART: [art] Derive CDI
2,882,308 UART: [art] Store in slot 0x4
2,968,105 UART: [art] Derive Key Pair
2,968,465 UART: [art] Store priv key in slot 0x5
2,982,443 UART: [art] Derive Key Pair - Done
2,997,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,555 UART: [art] PUB.X = DD8CEAC0979ECA9ED35433399EA52D25FBE1A4D62B48C2FE6B55CB6960AF357EB22172D9EA5E2699BBCBD63CB697CA9B
3,020,351 UART: [art] PUB.Y = A2CE4771B1C9B233C2F42841361400B48B6EB15124D8C7196057BC19B4D1F95685D4CCF8284EAD21E7430EFA2702A904
3,027,270 UART: [art] SIG.R = 11C8DC0106A6356A88A0F846A28F0B614561D7BB8EC1528D3A97B8BAFEA9F741A169831E4F501CAA8C7720A263332A88
3,034,035 UART: [art] SIG.S = 41183AD2163111A77EE8BF21981CCED547D8A6F8460B54D657783D67D7EBA9620C56F4CC57D746C653EA3395FE178D27
3,057,793 UART: Caliptra RT
3,058,136 UART: [state] CFI Enabled
3,178,756 UART: [rt] RT listening for mailbox commands...
3,179,426 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,086 UART: [rt]cmd =0x4c4d5356, len=1672
3,483,612 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,673 UART: [state] WD Timer not started. Device not locked for debugging
87,962 UART: [kat] SHA2-256
893,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,737 UART: [kat] ++
897,889 UART: [kat] sha1
902,195 UART: [kat] SHA2-256
904,135 UART: [kat] SHA2-384
906,752 UART: [kat] SHA2-512-ACC
908,653 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,080 UART: [idev] ++
1,175,248 UART: [idev] CDI.KEYID = 6
1,175,608 UART: [idev] SUBJECT.KEYID = 7
1,176,032 UART: [idev] UDS.KEYID = 0
1,176,377 ready_for_fw is high
1,176,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,082 UART: [idev] Erasing UDS.KEYID = 0
1,200,985 UART: [idev] Sha1 KeyId Algorithm
1,209,475 UART: [idev] --
1,210,423 UART: [ldev] ++
1,210,591 UART: [ldev] CDI.KEYID = 6
1,210,954 UART: [ldev] SUBJECT.KEYID = 5
1,211,380 UART: [ldev] AUTHORITY.KEYID = 7
1,211,843 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,887 UART: [ldev] --
1,282,174 UART: [fwproc] Wait for Commands...
1,282,970 UART: [fwproc] Recv command 0x46574c44
1,283,698 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,180 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,339 >>> mbox cmd response: success
2,828,555 UART: [afmc] ++
2,828,723 UART: [afmc] CDI.KEYID = 6
2,829,085 UART: [afmc] SUBJECT.KEYID = 7
2,829,510 UART: [afmc] AUTHORITY.KEYID = 5
2,864,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,018 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,475 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,358 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,873 UART: [afmc] --
2,907,855 UART: [cold-reset] --
2,908,799 UART: [state] Locking Datavault
2,910,030 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,634 UART: [state] Locking ICCM
2,911,300 UART: [exit] Launching FMC @ 0x40000130
2,916,630 UART:
2,916,646 UART: Running Caliptra FMC ...
2,917,054 UART:
2,917,108 UART: [state] CFI Enabled
2,927,932 UART: [fht] FMC Alias Private Key: 7
3,046,906 UART: [art] Extend RT PCRs Done
3,047,334 UART: [art] Lock RT PCRs Done
3,049,020 UART: [art] Populate DV Done
3,057,105 UART: [fht] FMC Alias Private Key: 7
3,058,173 UART: [art] Derive CDI
3,058,453 UART: [art] Store in slot 0x4
3,144,174 UART: [art] Derive Key Pair
3,144,534 UART: [art] Store priv key in slot 0x5
3,157,312 UART: [art] Derive Key Pair - Done
3,172,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,329 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,094 UART: [art] PUB.X = 7A40E22F0647ABDA6064F219E46460E13973632776775698CFBE6576D45F3F0FB1B77C2C1CFA71779FBCEE4F3463426F
3,194,860 UART: [art] PUB.Y = 6F3CE32DA88701596F78A587CB6F549CCE4646AE631EF0F529C37F160C1B68E4B9262D624AF79B15A8B028D4CC2BA4E2
3,201,814 UART: [art] SIG.R = 3B075D6B8C8756902A81EED33E47544E7ABDC76C66835F196FBA412F802F177A2B11E8186AFA345B44E18A654B3E0040
3,208,561 UART: [art] SIG.S = E309DBF71970FE34D72B97F8831F7FB6222738B8423CBFA0EFA2D76920CEDB5EB70153AF41993130BD7122EA85600CDD
3,232,380 UART: Caliptra RT
3,232,631 UART: [state] CFI Enabled
3,352,746 UART: [rt] RT listening for mailbox commands...
3,353,416 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,114 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,462 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 ready_for_fw is high
1,059,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,950 >>> mbox cmd response: success
2,742,691 UART:
2,742,707 UART: Running Caliptra FMC ...
2,743,115 UART:
2,743,169 UART: [state] CFI Enabled
2,753,709 UART: [fht] FMC Alias Private Key: 7
2,873,367 UART: [art] Extend RT PCRs Done
2,873,795 UART: [art] Lock RT PCRs Done
2,875,451 UART: [art] Populate DV Done
2,883,416 UART: [fht] FMC Alias Private Key: 7
2,884,548 UART: [art] Derive CDI
2,884,828 UART: [art] Store in slot 0x4
2,970,617 UART: [art] Derive Key Pair
2,970,977 UART: [art] Store priv key in slot 0x5
2,983,889 UART: [art] Derive Key Pair - Done
2,998,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,307 UART: [art] PUB.X = B11C7ED7CEC897F6C78B5FE576FE8B648B887CE887BE93A1869CBEA4774F7AFC8961B9325BEFD9793F0D3445469CD314
3,022,088 UART: [art] PUB.Y = 892175C54DC9D6B8BF8617E2D2A55E8BE95D0A0B8D9F334487F4A1AFC22CBE6C651FC8E7C3B2EA042B0FBCF93AAF0B40
3,029,047 UART: [art] SIG.R = 90F53910F38230B997B559023D750348866AC8AD75B5642045FE37C7B525BF6F56EA4634F95D5FCC4ED37D45EC378F5C
3,035,811 UART: [art] SIG.S = E60DB98D2B15E605D4B0860F41BD02B47F52EFAE12488FC252554B22339AED16C258B86100BEDC1B10983ADA3A137D25
3,060,043 UART: Caliptra RT
3,060,294 UART: [state] CFI Enabled
3,180,420 UART: [rt] RT listening for mailbox commands...
3,181,090 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,738 UART: [rt]cmd =0x4c4d5356, len=1672
3,485,076 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,730 UART: [state] WD Timer not started. Device not locked for debugging
87,969 UART: [kat] SHA2-256
893,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,744 UART: [kat] ++
897,896 UART: [kat] sha1
902,350 UART: [kat] SHA2-256
904,290 UART: [kat] SHA2-384
907,065 UART: [kat] SHA2-512-ACC
908,966 UART: [kat] ECC-384
918,647 UART: [kat] HMAC-384Kdf
923,181 UART: [kat] LMS
1,171,509 UART: [kat] --
1,172,322 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 ready_for_fw is high
1,176,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,553 UART: [idev] Erasing UDS.KEYID = 0
1,201,784 UART: [idev] Sha1 KeyId Algorithm
1,210,330 UART: [idev] --
1,211,512 UART: [ldev] ++
1,211,680 UART: [ldev] CDI.KEYID = 6
1,212,043 UART: [ldev] SUBJECT.KEYID = 5
1,212,469 UART: [ldev] AUTHORITY.KEYID = 7
1,212,932 UART: [ldev] FE.KEYID = 1
1,217,894 UART: [ldev] Erasing FE.KEYID = 1
1,244,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,808 UART: [ldev] --
1,284,167 UART: [fwproc] Wait for Commands...
1,284,985 UART: [fwproc] Recv command 0x46574c44
1,285,713 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,578 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,618 >>> mbox cmd response: success
2,829,682 UART: [afmc] ++
2,829,850 UART: [afmc] CDI.KEYID = 6
2,830,212 UART: [afmc] SUBJECT.KEYID = 7
2,830,637 UART: [afmc] AUTHORITY.KEYID = 5
2,866,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,583 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,331 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,040 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,923 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,624 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,442 UART: [afmc] --
2,909,448 UART: [cold-reset] --
2,910,148 UART: [state] Locking Datavault
2,911,255 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,859 UART: [state] Locking ICCM
2,912,395 UART: [exit] Launching FMC @ 0x40000130
2,917,725 UART:
2,917,741 UART: Running Caliptra FMC ...
2,918,149 UART:
2,918,292 UART: [state] CFI Enabled
2,929,146 UART: [fht] FMC Alias Private Key: 7
3,047,606 UART: [art] Extend RT PCRs Done
3,048,034 UART: [art] Lock RT PCRs Done
3,049,444 UART: [art] Populate DV Done
3,057,769 UART: [fht] FMC Alias Private Key: 7
3,058,799 UART: [art] Derive CDI
3,059,079 UART: [art] Store in slot 0x4
3,144,606 UART: [art] Derive Key Pair
3,144,966 UART: [art] Store priv key in slot 0x5
3,158,626 UART: [art] Derive Key Pair - Done
3,173,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,761 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,526 UART: [art] PUB.X = 3A57B5CAEAA7D6A066EBE04FACA83CBF33DD8ACDDF01F40C13D8390AAC816BFB18C378DAAA18271C7F23CBA8CFC20E3F
3,196,322 UART: [art] PUB.Y = 264B332D7EB5F29297C3478AAB2FF850E0B317EA0F7EFFEEDE9721595DEE73D175526222BE03E39A52DCB56C00B8AA3B
3,203,260 UART: [art] SIG.R = 019DC00AEA6DFF0F99B0953A934879A76EE00E8CC04872C3BB856820F3FB2D736B16FC4F176CBD89747E40247F421105
3,210,019 UART: [art] SIG.S = 29A0B50C5889BBB54175DE56E93020E1A9851E3DB738B07632F92F9C329802E2336101ECE86EA964805AA8F9B82F0374
3,233,745 UART: Caliptra RT
3,234,088 UART: [state] CFI Enabled
3,354,354 UART: [rt] RT listening for mailbox commands...
3,355,024 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,450 UART: [rt]cmd =0x4c4d5356, len=1672
3,658,916 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,206 ready_for_fw is high
1,060,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,563 >>> mbox cmd response: success
2,742,604 UART:
2,742,620 UART: Running Caliptra FMC ...
2,743,028 UART:
2,743,171 UART: [state] CFI Enabled
2,753,929 UART: [fht] FMC Alias Private Key: 7
2,872,177 UART: [art] Extend RT PCRs Done
2,872,605 UART: [art] Lock RT PCRs Done
2,873,949 UART: [art] Populate DV Done
2,882,122 UART: [fht] FMC Alias Private Key: 7
2,883,070 UART: [art] Derive CDI
2,883,350 UART: [art] Store in slot 0x4
2,968,897 UART: [art] Derive Key Pair
2,969,257 UART: [art] Store priv key in slot 0x5
2,982,977 UART: [art] Derive Key Pair - Done
2,997,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,404 UART: [art] PUB.X = D38A40C04435DFD08F17E2B9CE5833FED2417EAB907A0B5883866931B74E86B11C949AF687446DD83FF8EBB2959CCBFF
3,020,183 UART: [art] PUB.Y = 2CA96A4D2792AEADC9FDB881DA9DD2998F4861B89E8365B4807EDBA6D334E33F7775EC8249B5163370F5BBE7E6ED6555
3,027,145 UART: [art] SIG.R = CE473A3803601CA8EA7AC055DA08457A6F9CC9D1DD44605186FA9EA1187C98C1AD5F232B7775178D81AD50915EA80BD7
3,033,914 UART: [art] SIG.S = 1388E8FDF4C04EEE6353B1D08232B39D284295A733093B5AF53A571A6EE055417FEC4101B5EE6F5D35F8AD1CCD841F52
3,057,806 UART: Caliptra RT
3,058,149 UART: [state] CFI Enabled
3,178,094 UART: [rt] RT listening for mailbox commands...
3,178,764 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,308 UART: [rt]cmd =0x4c4d5356, len=1672
3,482,650 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_lmots_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,019 UART:
192,379 UART: Running Caliptra ROM ...
193,530 UART:
193,679 UART: [state] CFI Enabled
269,278 UART: [state] LifecycleState = Unprovisioned
271,042 UART: [state] DebugLocked = No
273,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,294 UART: [kat] SHA2-256
447,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
458,509 UART: [kat] ++
459,057 UART: [kat] sha1
470,159 UART: [kat] SHA2-256
472,804 UART: [kat] SHA2-384
477,936 UART: [kat] SHA2-512-ACC
480,298 UART: [kat] ECC-384
2,770,392 UART: [kat] HMAC-384Kdf
2,801,733 UART: [kat] LMS
3,992,043 UART: [kat] --
3,995,616 UART: [cold-reset] ++
3,996,909 UART: [fht] Storing FHT @ 0x50003400
4,007,748 UART: [idev] ++
4,008,324 UART: [idev] CDI.KEYID = 6
4,009,240 UART: [idev] SUBJECT.KEYID = 7
4,010,487 UART: [idev] UDS.KEYID = 0
4,011,472 ready_for_fw is high
4,011,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,756 UART: [idev] Erasing UDS.KEYID = 0
7,349,386 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,415 UART: [idev] --
7,372,324 UART: [ldev] ++
7,372,893 UART: [ldev] CDI.KEYID = 6
7,373,831 UART: [ldev] SUBJECT.KEYID = 5
7,374,987 UART: [ldev] AUTHORITY.KEYID = 7
7,376,331 UART: [ldev] FE.KEYID = 1
7,423,836 UART: [ldev] Erasing FE.KEYID = 1
10,760,269 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,476 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,860 UART: [ldev] --
13,137,576 UART: [fwproc] Waiting for Commands...
13,140,113 UART: [fwproc] Received command 0x46574c44
13,142,344 UART: [fwproc] Received Image of size 118548 bytes
17,243,140 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,071 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,247 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,723,997 >>> mbox cmd response: success
17,728,877 UART: [afmc] ++
17,729,485 UART: [afmc] CDI.KEYID = 6
17,730,368 UART: [afmc] SUBJECT.KEYID = 7
17,731,639 UART: [afmc] AUTHORITY.KEYID = 5
21,089,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,765 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,019 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,441 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,216 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,606 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,234 UART: [afmc] --
23,464,852 UART: [cold-reset] --
23,470,556 UART: [state] Locking Datavault
23,476,980 UART: [state] Locking PCR0, PCR1 and PCR31
23,478,734 UART: [state] Locking ICCM
23,480,642 UART: [exit] Launching FMC @ 0x40000130
23,489,032 UART:
23,489,281 UART: Running Caliptra FMC ...
23,490,381 UART:
23,490,537 UART: [state] CFI Enabled
23,551,228 UART: [fht] FMC Alias Private Key: 7
25,891,127 UART: [art] Extend RT PCRs Done
25,892,342 UART: [art] Lock RT PCRs Done
25,893,990 UART: [art] Populate DV Done
25,899,723 UART: [fht] FMC Alias Private Key: 7
25,901,209 UART: [art] Derive CDI
25,901,990 UART: [art] Store in slot 0x4
25,958,393 UART: [art] Derive Key Pair
25,959,428 UART: [art] Store priv key in slot 0x5
29,251,775 UART: [art] Derive Key Pair - Done
29,264,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,138 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,641 UART: [art] PUB.X = 01B6827A2CC23AB2485967A72C4B0E92F2E436A7F63633506FA97D8FE45B053DC0254FF8D567BDE01F5494B26E2AA7D0
31,560,934 UART: [art] PUB.Y = C0BA7AC3FA144B42C16D344D59C6C55385FF3AF0B057985090E95C9EB27566A4B5853DD4FC26AA06BD2D93CEB442CF7C
31,568,214 UART: [art] SIG.R = FC1BB7A0A76EB834CD86BE86448757B49557F8A3B107D01D0351563FE05E95B4FBADC239333025CCD8C456F15497C15A
31,575,600 UART: [art] SIG.S = 0BADCF846E93B5C6CE5268B53E874AD327A18EA325F5ECED4DEFC4913E2C8F6A7E77338F46D0E074BEB32D3248DB6C2B
32,880,310 UART: Caliptra RT
32,881,027 UART: [state] CFI Enabled
33,056,707 UART: [rt] RT listening for mailbox commands...
33,060,601 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,105,261 UART: [rt]cmd =0x4c4d5356, len=1672
33,524,999 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,804,902 ready_for_fw is high
3,805,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,357 >>> mbox cmd response: success
23,673,737 UART:
23,674,134 UART: Running Caliptra FMC ...
23,675,354 UART:
23,675,531 UART: [state] CFI Enabled
23,742,917 UART: [fht] FMC Alias Private Key: 7
26,082,578 UART: [art] Extend RT PCRs Done
26,083,801 UART: [art] Lock RT PCRs Done
26,085,704 UART: [art] Populate DV Done
26,091,245 UART: [fht] FMC Alias Private Key: 7
26,092,885 UART: [art] Derive CDI
26,093,711 UART: [art] Store in slot 0x4
26,150,809 UART: [art] Derive Key Pair
26,151,810 UART: [art] Store priv key in slot 0x5
29,444,984 UART: [art] Derive Key Pair - Done
29,458,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,240 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,747 UART: [art] PUB.X = 2E98CB93D36F35D46160970CC928C7DA3531D51C30EA875345B3A5F39108199FBA0C6194FD9B8BFD5E967B14C45C7474
31,755,997 UART: [art] PUB.Y = DB34E83B42E2D9EC39126883758A02329F60F8C6CD5E4D95838D8A8A0689C2293C47AAAE632335C14869A0F60F4C08F1
31,763,238 UART: [art] SIG.R = D3803D0A5DAB57A2B29760501E61477141617AEBEDF880A33A512087121CB3111E46BD0906AB554239F57CE3BF51AE0C
31,770,619 UART: [art] SIG.S = 74E3217415F9D688A653EB27B59F84D01F77C6F0B31E41A12560BD4BF8A37EA32B1CECD37E6076AF15778BAC92050A1D
33,076,137 UART: Caliptra RT
33,076,871 UART: [state] CFI Enabled
33,252,246 UART: [rt] RT listening for mailbox commands...
33,256,206 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,300,721 UART: [rt]cmd =0x4c4d5356, len=1672
33,720,279 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,192 writing to cptra_bootfsm_go
193,537 UART:
193,888 UART: Running Caliptra ROM ...
195,067 UART:
604,643 UART: [state] CFI Enabled
621,290 UART: [state] LifecycleState = Unprovisioned
623,229 UART: [state] DebugLocked = No
625,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,313 UART: [kat] SHA2-256
801,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,612 UART: [kat] ++
812,096 UART: [kat] sha1
823,418 UART: [kat] SHA2-256
826,144 UART: [kat] SHA2-384
833,337 UART: [kat] SHA2-512-ACC
835,695 UART: [kat] ECC-384
3,118,964 UART: [kat] HMAC-384Kdf
3,131,149 UART: [kat] LMS
4,321,286 UART: [kat] --
4,325,376 UART: [cold-reset] ++
4,327,769 UART: [fht] Storing FHT @ 0x50003400
4,339,600 UART: [idev] ++
4,340,227 UART: [idev] CDI.KEYID = 6
4,341,129 UART: [idev] SUBJECT.KEYID = 7
4,342,365 UART: [idev] UDS.KEYID = 0
4,343,415 ready_for_fw is high
4,343,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,541 UART: [idev] Erasing UDS.KEYID = 0
7,634,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,657,194 UART: [idev] --
7,661,455 UART: [ldev] ++
7,662,029 UART: [ldev] CDI.KEYID = 6
7,662,998 UART: [ldev] SUBJECT.KEYID = 5
7,664,202 UART: [ldev] AUTHORITY.KEYID = 7
7,665,478 UART: [ldev] FE.KEYID = 1
7,677,145 UART: [ldev] Erasing FE.KEYID = 1
10,964,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,321,742 UART: [ldev] --
13,326,084 UART: [fwproc] Waiting for Commands...
13,328,981 UART: [fwproc] Received command 0x46574c44
13,331,179 UART: [fwproc] Received Image of size 118548 bytes
17,436,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,892 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,720 >>> mbox cmd response: success
17,909,751 UART: [afmc] ++
17,910,370 UART: [afmc] CDI.KEYID = 6
17,911,277 UART: [afmc] SUBJECT.KEYID = 7
17,912,488 UART: [afmc] AUTHORITY.KEYID = 5
21,228,979 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,775 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,455 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,172 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,609 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,066 UART: [afmc] --
23,595,485 UART: [cold-reset] --
23,599,073 UART: [state] Locking Datavault
23,603,900 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,636 UART: [state] Locking ICCM
23,606,977 UART: [exit] Launching FMC @ 0x40000130
23,615,369 UART:
23,615,597 UART: Running Caliptra FMC ...
23,616,686 UART:
23,616,840 UART: [state] CFI Enabled
23,625,097 UART: [fht] FMC Alias Private Key: 7
25,965,438 UART: [art] Extend RT PCRs Done
25,966,664 UART: [art] Lock RT PCRs Done
25,968,069 UART: [art] Populate DV Done
25,973,478 UART: [fht] FMC Alias Private Key: 7
25,975,067 UART: [art] Derive CDI
25,975,877 UART: [art] Store in slot 0x4
26,018,482 UART: [art] Derive Key Pair
26,019,526 UART: [art] Store priv key in slot 0x5
29,261,141 UART: [art] Derive Key Pair - Done
29,273,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,554,284 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,789 UART: [art] PUB.X = EEE7886D7C24D35DA35D7DC4BF6B51071EC1BD10212591B4BF28E088D4D66CE9206E82CD80855EC6EA49F6050116166E
31,563,083 UART: [art] PUB.Y = BC83E0FDB7F80E72B72A5DCC92709321F18661B9DB479BA5B45ED23E50C468B5D52D92004F8229353886C67E8D267295
31,570,317 UART: [art] SIG.R = 76EC832F10E0CC307506187EA909A3FFAB14BDB037E1E1CBABBB5CFAC8644FC09A45BF1E257724604D8F8FCA70E7425E
31,577,700 UART: [art] SIG.S = C9FE32CD94724F0DF0A39B10BEAAE7AB27AF9BE76FE8B2D04F6F48FA5EC0058CFBF10E91B591249A1D7709487F1E191A
32,882,876 UART: Caliptra RT
32,883,691 UART: [state] CFI Enabled
33,016,787 UART: [rt] RT listening for mailbox commands...
33,020,722 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,065,319 UART: [rt]cmd =0x4c4d5356, len=1672
33,484,887 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,126,934 ready_for_fw is high
4,127,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,666 >>> mbox cmd response: success
23,797,789 UART:
23,798,183 UART: Running Caliptra FMC ...
23,799,380 UART:
23,799,538 UART: [state] CFI Enabled
23,807,094 UART: [fht] FMC Alias Private Key: 7
26,146,825 UART: [art] Extend RT PCRs Done
26,148,044 UART: [art] Lock RT PCRs Done
26,149,570 UART: [art] Populate DV Done
26,154,988 UART: [fht] FMC Alias Private Key: 7
26,156,634 UART: [art] Derive CDI
26,157,440 UART: [art] Store in slot 0x4
26,199,552 UART: [art] Derive Key Pair
26,200,594 UART: [art] Store priv key in slot 0x5
29,442,667 UART: [art] Derive Key Pair - Done
29,455,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,128 UART: [art] PUB.X = 788F2141826E4DA4A8CF1D6E8BCAA7C39EFC1AB58A41D542B55BBB3765D95584C3B6FE45E51A5F936DE6B557A88F92AE
31,744,376 UART: [art] PUB.Y = 142BCE9EDE3AE4BA86C4693D919C50D8AFF7BECC5B5D4457B2012999ED05E064E24744B1A7E24750EC7DA57152B36194
31,751,680 UART: [art] SIG.R = 5AA1E28EB0D4B239F984179A1ACE7B5F315E56C852A64E2A8B95D0F9E5EED2EAE0110FAEC33A63848C17E84442FB45C4
31,759,072 UART: [art] SIG.S = 4591B678B5DC38CD3C76555C4C98413CAD5406BFD5A52B09121B170C6998DEEBB2C040B794B197E0C8C6232B281E7519
33,064,186 UART: Caliptra RT
33,064,932 UART: [state] CFI Enabled
33,197,991 UART: [rt] RT listening for mailbox commands...
33,201,889 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
33,246,634 UART: [rt]cmd =0x4c4d5356, len=1672
33,666,069 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,185 UART:
192,532 UART: Running Caliptra ROM ...
193,698 UART:
193,850 UART: [state] CFI Enabled
262,392 UART: [state] LifecycleState = Unprovisioned
264,284 UART: [state] DebugLocked = No
266,113 UART: [state] WD Timer not started. Device not locked for debugging
270,017 UART: [kat] SHA2-256
449,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,474 UART: [kat] ++
460,950 UART: [kat] sha1
471,222 UART: [kat] SHA2-256
473,930 UART: [kat] SHA2-384
479,074 UART: [kat] SHA2-512-ACC
481,448 UART: [kat] ECC-384
2,926,943 UART: [kat] HMAC-384Kdf
2,948,139 UART: [kat] LMS
3,424,683 UART: [kat] --
3,429,601 UART: [cold-reset] ++
3,430,903 UART: [fht] FHT @ 0x50003400
3,440,911 UART: [idev] ++
3,441,562 UART: [idev] CDI.KEYID = 6
3,442,466 UART: [idev] SUBJECT.KEYID = 7
3,443,709 UART: [idev] UDS.KEYID = 0
3,444,634 ready_for_fw is high
3,444,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,867 UART: [idev] Erasing UDS.KEYID = 0
5,962,714 UART: [idev] Sha1 KeyId Algorithm
5,986,808 UART: [idev] --
5,990,960 UART: [ldev] ++
5,991,564 UART: [ldev] CDI.KEYID = 6
5,992,480 UART: [ldev] SUBJECT.KEYID = 5
5,993,586 UART: [ldev] AUTHORITY.KEYID = 7
5,994,761 UART: [ldev] FE.KEYID = 1
6,034,679 UART: [ldev] Erasing FE.KEYID = 1
8,538,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,626 UART: [ldev] --
10,349,883 UART: [fwproc] Wait for Commands...
10,352,081 UART: [fwproc] Recv command 0x46574c44
10,354,120 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,276 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,574 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,630 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,324,624 >>> mbox cmd response: success
14,327,815 UART: [afmc] ++
14,328,432 UART: [afmc] CDI.KEYID = 6
14,329,404 UART: [afmc] SUBJECT.KEYID = 7
14,330,565 UART: [afmc] AUTHORITY.KEYID = 5
16,871,168 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,385 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,058 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,667,683 UART: [afmc] --
18,671,983 UART: [cold-reset] --
18,674,057 UART: [state] Locking Datavault
18,678,761 UART: [state] Locking PCR0, PCR1 and PCR31
18,680,509 UART: [state] Locking ICCM
18,682,274 UART: [exit] Launching FMC @ 0x40000130
18,690,658 UART:
18,690,891 UART: Running Caliptra FMC ...
18,691,984 UART:
18,692,150 UART: [state] CFI Enabled
18,749,100 UART: [fht] FMC Alias Private Key: 7
20,515,231 UART: [art] Extend RT PCRs Done
20,516,496 UART: [art] Lock RT PCRs Done
20,518,448 UART: [art] Populate DV Done
20,524,024 UART: [fht] FMC Alias Private Key: 7
20,525,562 UART: [art] Derive CDI
20,526,374 UART: [art] Store in slot 0x4
20,581,201 UART: [art] Derive Key Pair
20,582,238 UART: [art] Store priv key in slot 0x5
23,045,424 UART: [art] Derive Key Pair - Done
23,058,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,770,455 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,959 UART: [art] PUB.X = 256FBDB7357A807E96B763D3177EC59C7963D0D5914A6DA48B930371C5286F4E0E2979349AF4CE2B82BE0467333FE5F2
24,779,208 UART: [art] PUB.Y = 0505DE3D0A830566585CFBB9B47FB24C5032FC6B5E9E7935F622C6B2800D48CC3FC1C2E28D935F29CC69FD623DB1308A
24,786,446 UART: [art] SIG.R = C4DB0D242A1CDC1335B2CE068BDAC5DA92228713F0E79303B9F933DA1FF9E0B14821606BE9C902090EB4ED7F6E9688A1
24,793,879 UART: [art] SIG.S = C3B969219F358F8761C869931371AE763B4AC930654FB4E6E807A29BB4F5C9B1536EFAC2D620CA97AC3189AE9211C3DE
25,772,483 UART: Caliptra RT
25,773,207 UART: [state] CFI Enabled
25,953,514 UART: [rt] RT listening for mailbox commands...
25,957,488 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,002,019 UART: [rt]cmd =0x4c4d5356, len=1672
26,215,114 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,462,170 ready_for_fw is high
3,462,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,231,431 >>> mbox cmd response: success
18,516,518 UART:
18,517,184 UART: Running Caliptra FMC ...
18,518,303 UART:
18,518,454 UART: [state] CFI Enabled
18,582,212 UART: [fht] FMC Alias Private Key: 7
20,348,090 UART: [art] Extend RT PCRs Done
20,349,331 UART: [art] Lock RT PCRs Done
20,350,961 UART: [art] Populate DV Done
20,356,456 UART: [fht] FMC Alias Private Key: 7
20,357,997 UART: [art] Derive CDI
20,358,810 UART: [art] Store in slot 0x4
20,415,143 UART: [art] Derive Key Pair
20,416,197 UART: [art] Store priv key in slot 0x5
22,879,065 UART: [art] Derive Key Pair - Done
22,891,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,570 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,073 UART: [art] PUB.X = B104C8063934E97DFD2C94C370370796F7AE102EE419156C9CA141324BE0B99C1DEDC500E31F2B470DBFB75839E828F2
24,614,326 UART: [art] PUB.Y = F93238C5BD02D84C7DA87459CA0CC9BCB86A6F96C84AAF07E60FA0BBA2502A655AF4CBA5DCD41F9D248E6229C8A2DBF4
24,621,647 UART: [art] SIG.R = D1730394B5C4A29DD022AA2001E261609BC9E87B7DE0736049078E09FE2F5ECD9289804481857EB8928A61B1231493CF
24,628,991 UART: [art] SIG.S = 6C4391C0609F0AA54CD87FD2C5C6A34660E213EB30F26633080B8627A8ADD6E4EA84B39B8CC3D5FF618FD9FEBA147045
25,607,450 UART: Caliptra RT
25,608,143 UART: [state] CFI Enabled
25,788,866 UART: [rt] RT listening for mailbox commands...
25,792,867 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,837,474 UART: [rt]cmd =0x4c4d5356, len=1672
26,050,611 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,704 writing to cptra_bootfsm_go
193,987 UART:
194,347 UART: Running Caliptra ROM ...
195,445 UART:
605,097 UART: [state] CFI Enabled
618,706 UART: [state] LifecycleState = Unprovisioned
620,654 UART: [state] DebugLocked = No
623,305 UART: [state] WD Timer not started. Device not locked for debugging
627,336 UART: [kat] SHA2-256
807,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,825 UART: [kat] ++
818,366 UART: [kat] sha1
828,256 UART: [kat] SHA2-256
830,977 UART: [kat] SHA2-384
837,825 UART: [kat] SHA2-512-ACC
840,193 UART: [kat] ECC-384
3,282,502 UART: [kat] HMAC-384Kdf
3,294,405 UART: [kat] LMS
3,770,934 UART: [kat] --
3,776,138 UART: [cold-reset] ++
3,777,286 UART: [fht] FHT @ 0x50003400
3,787,482 UART: [idev] ++
3,788,115 UART: [idev] CDI.KEYID = 6
3,789,003 UART: [idev] SUBJECT.KEYID = 7
3,790,255 UART: [idev] UDS.KEYID = 0
3,791,244 ready_for_fw is high
3,791,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,433 UART: [idev] Erasing UDS.KEYID = 0
6,265,466 UART: [idev] Sha1 KeyId Algorithm
6,289,093 UART: [idev] --
6,295,197 UART: [ldev] ++
6,295,768 UART: [ldev] CDI.KEYID = 6
6,296,739 UART: [ldev] SUBJECT.KEYID = 5
6,297,896 UART: [ldev] AUTHORITY.KEYID = 7
6,299,182 UART: [ldev] FE.KEYID = 1
6,311,022 UART: [ldev] Erasing FE.KEYID = 1
8,788,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,499 UART: [ldev] --
10,582,456 UART: [fwproc] Wait for Commands...
10,584,405 UART: [fwproc] Recv command 0x46574c44
10,586,396 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,247 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,274 >>> mbox cmd response: success
14,552,398 UART: [afmc] ++
14,553,015 UART: [afmc] CDI.KEYID = 6
14,553,942 UART: [afmc] SUBJECT.KEYID = 7
14,555,164 UART: [afmc] AUTHORITY.KEYID = 5
17,059,215 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,745 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,200 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,040 UART: [afmc] --
18,858,476 UART: [cold-reset] --
18,862,986 UART: [state] Locking Datavault
18,867,264 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,972 UART: [state] Locking ICCM
18,870,914 UART: [exit] Launching FMC @ 0x40000130
18,879,312 UART:
18,879,551 UART: Running Caliptra FMC ...
18,880,654 UART:
18,880,819 UART: [state] CFI Enabled
18,888,821 UART: [fht] FMC Alias Private Key: 7
20,655,041 UART: [art] Extend RT PCRs Done
20,656,252 UART: [art] Lock RT PCRs Done
20,657,961 UART: [art] Populate DV Done
20,663,018 UART: [fht] FMC Alias Private Key: 7
20,664,515 UART: [art] Derive CDI
20,665,281 UART: [art] Store in slot 0x4
20,707,931 UART: [art] Derive Key Pair
20,708,939 UART: [art] Store priv key in slot 0x5
23,135,571 UART: [art] Derive Key Pair - Done
23,148,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,223 UART: [art] PUB.X = B4CB7299968EF691C57CA4F4C5509969A80FC088CA29130E3B7DA71105ACBCCA8737F246EFF0184051DA7A39EB598753
24,863,520 UART: [art] PUB.Y = 75979CA5FCF4BC0034E5C6E3925155A21EDEAD8057DCC1044A631656F89C4C7B2F646426B587813B736AB2A3A1A00BF7
24,870,753 UART: [art] SIG.R = C49C3F4A761AE68FDE9BD84CAADF3C93312667B83084658347FDA8723DFC3D6A465DF13A6292193616922869BECEE502
24,878,143 UART: [art] SIG.S = 427A58EF3787A4957A3713CD883D939C3F7B3A39FD8B4826C107182D51363DC0B8B5178C7029EA1027A6E417A4FD8308
25,856,772 UART: Caliptra RT
25,857,483 UART: [state] CFI Enabled
25,990,537 UART: [rt] RT listening for mailbox commands...
25,994,451 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,038,696 UART: [rt]cmd =0x4c4d5356, len=1672
26,251,738 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,631 writing to cptra_bootfsm_go
3,779,887 ready_for_fw is high
3,780,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,339 >>> mbox cmd response: success
18,692,388 UART:
18,692,782 UART: Running Caliptra FMC ...
18,693,980 UART:
18,694,160 UART: [state] CFI Enabled
18,701,922 UART: [fht] FMC Alias Private Key: 7
20,468,143 UART: [art] Extend RT PCRs Done
20,469,367 UART: [art] Lock RT PCRs Done
20,471,023 UART: [art] Populate DV Done
20,476,395 UART: [fht] FMC Alias Private Key: 7
20,477,937 UART: [art] Derive CDI
20,478,755 UART: [art] Store in slot 0x4
20,521,406 UART: [art] Derive Key Pair
20,522,436 UART: [art] Store priv key in slot 0x5
22,949,409 UART: [art] Derive Key Pair - Done
22,962,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,825 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,328 UART: [art] PUB.X = 0CCF52F1750E38DB04174B7BA84EE3AA09D7AA84D2635703433C92958B6B5E417927DA7327EB76EABF9C9A368462C027
24,677,536 UART: [art] PUB.Y = 32A4D9067D2573E491CFEEF55BDA1810EEB032AE186B7D5F4784117D2E599C1D641D52EFD3F50D31CB671AADF162A282
24,684,854 UART: [art] SIG.R = DA5AB6BCD466E0AB5E0E2CECFD1F97C04B832F080F29CF37361A364E2788986BDEFE8D4D5E7F2D6E815B3C6C577857B2
24,692,255 UART: [art] SIG.S = 13D451C646F2C9688B842FCBE7D97D51E5E6F8041FECFB34C63BA205C83D9EB42FAB9CFBF488C6B5B5142A5C6A03DAA7
25,671,553 UART: Caliptra RT
25,672,263 UART: [state] CFI Enabled
25,804,624 UART: [rt] RT listening for mailbox commands...
25,808,578 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
25,853,092 UART: [rt]cmd =0x4c4d5356, len=1672
26,066,337 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
191,986 UART:
192,358 UART: Running Caliptra ROM ...
193,516 UART:
193,661 UART: [state] CFI Enabled
263,892 UART: [state] LifecycleState = Unprovisioned
266,303 UART: [state] DebugLocked = No
267,550 UART: [state] WD Timer not started. Device not locked for debugging
271,299 UART: [kat] SHA2-256
460,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,744 UART: [kat] ++
472,219 UART: [kat] sha1
483,162 UART: [kat] SHA2-256
486,167 UART: [kat] SHA2-384
492,436 UART: [kat] SHA2-512-ACC
495,010 UART: [kat] ECC-384
2,948,380 UART: [kat] HMAC-384Kdf
2,971,711 UART: [kat] LMS
3,503,487 UART: [kat] --
3,508,623 UART: [cold-reset] ++
3,509,633 UART: [fht] FHT @ 0x50003400
3,521,316 UART: [idev] ++
3,521,947 UART: [idev] CDI.KEYID = 6
3,522,972 UART: [idev] SUBJECT.KEYID = 7
3,524,141 UART: [idev] UDS.KEYID = 0
3,525,080 ready_for_fw is high
3,525,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,346 UART: [idev] Erasing UDS.KEYID = 0
6,029,489 UART: [idev] Sha1 KeyId Algorithm
6,051,317 UART: [idev] --
6,055,309 UART: [ldev] ++
6,055,982 UART: [ldev] CDI.KEYID = 6
6,056,866 UART: [ldev] SUBJECT.KEYID = 5
6,058,076 UART: [ldev] AUTHORITY.KEYID = 7
6,059,308 UART: [ldev] FE.KEYID = 1
6,100,123 UART: [ldev] Erasing FE.KEYID = 1
8,608,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,433 UART: [ldev] --
10,415,617 UART: [fwproc] Wait for Commands...
10,418,197 UART: [fwproc] Recv command 0x46574c44
10,420,495 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,718 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,657 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,577 >>> mbox cmd response: success
14,680,372 UART: [afmc] ++
14,681,098 UART: [afmc] CDI.KEYID = 6
14,682,299 UART: [afmc] SUBJECT.KEYID = 7
14,683,739 UART: [afmc] AUTHORITY.KEYID = 5
17,211,664 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,279 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,439 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,348 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,446 UART: [afmc] --
19,009,130 UART: [cold-reset] --
19,011,812 UART: [state] Locking Datavault
19,016,852 UART: [state] Locking PCR0, PCR1 and PCR31
19,018,996 UART: [state] Locking ICCM
19,021,959 UART: [exit] Launching FMC @ 0x40000130
19,030,637 UART:
19,030,881 UART: Running Caliptra FMC ...
19,031,987 UART:
19,032,147 UART: [state] CFI Enabled
19,094,192 UART: [fht] FMC Alias Private Key: 7
20,860,678 UART: [art] Extend RT PCRs Done
20,861,897 UART: [art] Lock RT PCRs Done
20,863,410 UART: [art] Populate DV Done
20,868,728 UART: [fht] FMC Alias Private Key: 7
20,870,312 UART: [art] Derive CDI
20,871,067 UART: [art] Store in slot 0x4
20,926,979 UART: [art] Derive Key Pair
20,928,021 UART: [art] Store priv key in slot 0x5
23,390,592 UART: [art] Derive Key Pair - Done
23,403,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,085 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,603 UART: [art] PUB.X = 6DE3CE1A1BE53BFDEC97E309C97BCD2FDD33A8FC84A93417296B2B031B1E339C03DF4613AB3EF341EC5FB6D242E0452C
25,124,913 UART: [art] PUB.Y = FFE213430097C505363CE81A80343A0B75FAA0E9E3C3A52C385A5E0AAA00E97AE4AB34E56FABA663C702F91BC4F93E4B
25,132,151 UART: [art] SIG.R = 69CECA48E20E1E189EBBC6B5D5356C2983ABD3E4ECE66F66C4918224DDF32FF91E0D403197FD23CF5A003B6374E0CA68
25,139,588 UART: [art] SIG.S = 39C3B218DDB565D4E0633AEE8818C17BF45D04A383750BF7FEC4905FE9AF351D06918AD3F9F853623FA570E598D9BFA5
26,118,173 UART: Caliptra RT
26,118,859 UART: [state] CFI Enabled
26,300,506 UART: [rt] RT listening for mailbox commands...
26,304,407 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,348,812 UART: [rt]cmd =0x4c4d5356, len=1672
26,561,946 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,852 writing to cptra_bootfsm_go
3,438,341 ready_for_fw is high
3,438,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,846,986 >>> mbox cmd response: success
19,131,835 UART:
19,132,230 UART: Running Caliptra FMC ...
19,133,374 UART:
19,133,534 UART: [state] CFI Enabled
19,202,862 UART: [fht] FMC Alias Private Key: 7
20,969,340 UART: [art] Extend RT PCRs Done
20,970,558 UART: [art] Lock RT PCRs Done
20,972,019 UART: [art] Populate DV Done
20,977,448 UART: [fht] FMC Alias Private Key: 7
20,979,032 UART: [art] Derive CDI
20,979,861 UART: [art] Store in slot 0x4
21,035,899 UART: [art] Derive Key Pair
21,036,908 UART: [art] Store priv key in slot 0x5
23,499,992 UART: [art] Derive Key Pair - Done
23,513,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,034 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,554 UART: [art] PUB.X = A2AFD636EBE39AA9E38DB736E030FB7D8AF58B26A02663E1F1491E645EFE9416B50DF4E2905044A48E77BDCA513B0426
25,234,812 UART: [art] PUB.Y = 10689D804B241ADC87BCFF466D54E3477AC1E9961995561A54B64977949116A43322ED670F209752272EB9C9F1D30C0D
25,242,042 UART: [art] SIG.R = 6764CDE46800417D6EDD47707041E90E3A5A549CA4A4D1DB73F2E021EF242268BE98C6ACF303FE523CA42AFE4E19D17C
25,249,407 UART: [art] SIG.S = EFA861372679D0657ADB480A37EC6CC10AC9003078899CC81593A031FE7A680BCD651076AABFA2F71AC5872730F62EE7
26,228,390 UART: Caliptra RT
26,229,104 UART: [state] CFI Enabled
26,409,571 UART: [rt] RT listening for mailbox commands...
26,413,489 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,458,004 UART: [rt]cmd =0x4c4d5356, len=1672
26,671,215 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,642 UART:
193,003 UART: Running Caliptra ROM ...
194,194 UART:
603,701 UART: [state] CFI Enabled
620,454 UART: [state] LifecycleState = Unprovisioned
622,806 UART: [state] DebugLocked = No
623,993 UART: [state] WD Timer not started. Device not locked for debugging
628,189 UART: [kat] SHA2-256
818,082 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,890 UART: [kat] ++
829,366 UART: [kat] sha1
841,379 UART: [kat] SHA2-256
844,396 UART: [kat] SHA2-384
849,540 UART: [kat] SHA2-512-ACC
852,124 UART: [kat] ECC-384
3,294,731 UART: [kat] HMAC-384Kdf
3,309,022 UART: [kat] LMS
3,840,853 UART: [kat] --
3,845,151 UART: [cold-reset] ++
3,846,166 UART: [fht] FHT @ 0x50003400
3,858,919 UART: [idev] ++
3,859,583 UART: [idev] CDI.KEYID = 6
3,860,621 UART: [idev] SUBJECT.KEYID = 7
3,861,724 UART: [idev] UDS.KEYID = 0
3,862,986 ready_for_fw is high
3,863,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,997 UART: [idev] Erasing UDS.KEYID = 0
6,342,790 UART: [idev] Sha1 KeyId Algorithm
6,364,719 UART: [idev] --
6,368,879 UART: [ldev] ++
6,369,615 UART: [ldev] CDI.KEYID = 6
6,370,532 UART: [ldev] SUBJECT.KEYID = 5
6,371,694 UART: [ldev] AUTHORITY.KEYID = 7
6,372,878 UART: [ldev] FE.KEYID = 1
6,382,939 UART: [ldev] Erasing FE.KEYID = 1
8,861,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,546 UART: [ldev] --
10,650,797 UART: [fwproc] Wait for Commands...
10,653,597 UART: [fwproc] Recv command 0x46574c44
10,655,851 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,719 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,119 >>> mbox cmd response: success
14,923,352 UART: [afmc] ++
14,924,066 UART: [afmc] CDI.KEYID = 6
14,925,275 UART: [afmc] SUBJECT.KEYID = 7
14,926,730 UART: [afmc] AUTHORITY.KEYID = 5
17,429,858 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,985 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,063 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,186,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,201,129 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,866 UART: [afmc] --
19,226,709 UART: [cold-reset] --
19,230,041 UART: [state] Locking Datavault
19,235,483 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,643 UART: [state] Locking ICCM
19,240,595 UART: [exit] Launching FMC @ 0x40000130
19,249,228 UART:
19,249,466 UART: Running Caliptra FMC ...
19,250,493 UART:
19,250,646 UART: [state] CFI Enabled
19,258,807 UART: [fht] FMC Alias Private Key: 7
21,025,352 UART: [art] Extend RT PCRs Done
21,026,577 UART: [art] Lock RT PCRs Done
21,028,185 UART: [art] Populate DV Done
21,033,626 UART: [fht] FMC Alias Private Key: 7
21,035,291 UART: [art] Derive CDI
21,036,118 UART: [art] Store in slot 0x4
21,078,777 UART: [art] Derive Key Pair
21,079,783 UART: [art] Store priv key in slot 0x5
23,506,294 UART: [art] Derive Key Pair - Done
23,519,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,713 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,222 UART: [art] PUB.X = 7CA7B33CCE128CB22918BED2BED8EB3B6B0F1EE890CEAA5B95C0099D3B9D4ECB311CD393F010F317439EA5F878818506
25,234,497 UART: [art] PUB.Y = B5C1A171CA2A8B148ADF147027C73F27A5C8E490DC741F386151212A2665354BCF41C6502C699766710A649D0221D91E
25,241,755 UART: [art] SIG.R = 952CDAE757F020E8D261A4E580550EE4F61832E1652B60C2D7E8EFD71465A0463B8A01D1D79C5F4CB7478DEC88DD04E5
25,249,138 UART: [art] SIG.S = 14411401DDEB5D6B298A87EC801B1BD1E0BD3173A6602119257932933ED32A2B996F90BDA0F8B610A159823926B59D78
26,227,858 UART: Caliptra RT
26,228,566 UART: [state] CFI Enabled
26,361,502 UART: [rt] RT listening for mailbox commands...
26,365,469 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,410,140 UART: [rt]cmd =0x4c4d5356, len=1672
26,623,230 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,269 writing to cptra_bootfsm_go
3,756,106 ready_for_fw is high
3,756,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,655 >>> mbox cmd response: success
19,286,620 UART:
19,287,012 UART: Running Caliptra FMC ...
19,288,139 UART:
19,288,296 UART: [state] CFI Enabled
19,296,376 UART: [fht] FMC Alias Private Key: 7
21,062,728 UART: [art] Extend RT PCRs Done
21,063,959 UART: [art] Lock RT PCRs Done
21,065,834 UART: [art] Populate DV Done
21,071,533 UART: [fht] FMC Alias Private Key: 7
21,073,137 UART: [art] Derive CDI
21,073,882 UART: [art] Store in slot 0x4
21,116,534 UART: [art] Derive Key Pair
21,117,536 UART: [art] Store priv key in slot 0x5
23,544,495 UART: [art] Derive Key Pair - Done
23,557,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,993 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,507 UART: [art] PUB.X = 5D8FE072D8B6AF0AEA5B2CA2A5B04C7252C44C1BC36D82B65EABA100167AE32049A214906344C08F8591F60C90CB4188
25,272,720 UART: [art] PUB.Y = 1D345F61AFBFEADCFCC4AB774A407C7535F366024C98DF58B9B8BF9023E054AE15A834CE04636B949E8740BBA8A70A4F
25,279,995 UART: [art] SIG.R = 17C3399EEA9BDFECC1DAB86E6564E3BCB3BE633CF20C5C250C676D6B652AB77C0564B8F7F25167E3EB574DB60E7F56D3
25,287,456 UART: [art] SIG.S = D4109CCD1375855E92CBB32CEEB51BFF3B56DD2DA1D9DC696E2AE28252F6654E7FE9D822EF1924D48D426BADCDE3FC85
26,266,485 UART: Caliptra RT
26,267,201 UART: [state] CFI Enabled
26,400,359 UART: [rt] RT listening for mailbox commands...
26,404,556 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
26,448,808 UART: [rt]cmd =0x4c4d5356, len=1672
26,661,859 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,559 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,574 UART: [kat] HMAC-384Kdf
907,278 UART: [kat] LMS
1,475,474 UART: [kat] --
1,476,279 UART: [cold-reset] ++
1,476,809 UART: [fht] Storing FHT @ 0x50003400
1,479,526 UART: [idev] ++
1,479,694 UART: [idev] CDI.KEYID = 6
1,480,054 UART: [idev] SUBJECT.KEYID = 7
1,480,478 UART: [idev] UDS.KEYID = 0
1,480,823 ready_for_fw is high
1,480,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,636 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,276 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,520,827 UART: [ldev] Erasing FE.KEYID = 1
1,546,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,056 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,190 UART: [fwproc] Received command 0x46574c44
1,586,981 UART: [fwproc] Received Image of size 118548 bytes
2,930,657 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,144 >>> mbox cmd response: success
3,131,368 UART: [afmc] ++
3,131,536 UART: [afmc] CDI.KEYID = 6
3,131,898 UART: [afmc] SUBJECT.KEYID = 7
3,132,323 UART: [afmc] AUTHORITY.KEYID = 5
3,167,448 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,342 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,714 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,397 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,045 UART: [afmc] --
3,209,943 UART: [cold-reset] --
3,210,989 UART: [state] Locking Datavault
3,212,050 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,654 UART: [state] Locking ICCM
3,213,176 UART: [exit] Launching FMC @ 0x40000130
3,218,506 UART:
3,218,522 UART: Running Caliptra FMC ...
3,218,930 UART:
3,218,984 UART: [state] CFI Enabled
3,229,220 UART: [fht] FMC Alias Private Key: 7
3,348,088 UART: [art] Extend RT PCRs Done
3,348,516 UART: [art] Lock RT PCRs Done
3,350,008 UART: [art] Populate DV Done
3,358,149 UART: [fht] FMC Alias Private Key: 7
3,359,147 UART: [art] Derive CDI
3,359,427 UART: [art] Store in slot 0x4
3,445,213 UART: [art] Derive Key Pair
3,445,573 UART: [art] Store priv key in slot 0x5
3,458,052 UART: [art] Derive Key Pair - Done
3,472,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,074 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,839 UART: [art] PUB.X = A509D964CC378FC1C4F3AAE0CEA014526CB9AFCCA41E8A09A628472A54DE45B3521D51E9AAA7917B2DD17C2F38EAB90A
3,495,622 UART: [art] PUB.Y = 0BDF285615F891AF101954A7D7B321BC58688246EE891066C2D8873E7DA8309A23FD445BD382691508C078BC7AC30DDF
3,502,563 UART: [art] SIG.R = 088BE323B642C7BD1A5E6E4B912E0BCCC00D273B938F6BFDFACCC03587EE945463FB7DE508DFEC8826A5DE48A0AD413F
3,509,345 UART: [art] SIG.S = AE074034CE5333A18424AE61F25A1D61E32ADFEEDF11BC6D918B557A4C0580B7430636DE9E2CDB72333A16B8965787C0
3,532,908 UART: Caliptra RT
3,533,159 UART: [state] CFI Enabled
3,653,813 UART: [rt] RT listening for mailbox commands...
3,654,483 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,231 UART: [rt]cmd =0x4c4d5356, len=1672
4,274,017 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,661 ready_for_fw is high
1,362,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,714 >>> mbox cmd response: success
3,041,467 UART:
3,041,483 UART: Running Caliptra FMC ...
3,041,891 UART:
3,041,945 UART: [state] CFI Enabled
3,052,455 UART: [fht] FMC Alias Private Key: 7
3,171,241 UART: [art] Extend RT PCRs Done
3,171,669 UART: [art] Lock RT PCRs Done
3,173,073 UART: [art] Populate DV Done
3,181,398 UART: [fht] FMC Alias Private Key: 7
3,182,368 UART: [art] Derive CDI
3,182,648 UART: [art] Store in slot 0x4
3,268,622 UART: [art] Derive Key Pair
3,268,982 UART: [art] Store priv key in slot 0x5
3,282,001 UART: [art] Derive Key Pair - Done
3,296,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,753 UART: [art] PUB.X = 8877BE0CF77DE819D8199E365D7C7163423C236905D64698F97E64DE56DB08661E812BC14016044C33D534E0CCC4ED34
3,319,507 UART: [art] PUB.Y = 468A9EF5153A00F9FB242DB8EA5E10FC8EA0A203CAB44694F76F26CFEE9AC39FE629730B7EE1AF8A3BD7BC3736D062E5
3,326,451 UART: [art] SIG.R = 301CC49F9005EB34EEC092BA55A5ECEB1C35D641B91E2F3900257816ACC2B4DB63A20C4DAB3358EDC23309DA3D4C0451
3,333,201 UART: [art] SIG.S = 39C308277667CF946C0319EE71B04D1272AD737BDFD1899EE4CC71B7C696E4A0843D43554DE2F01E46E157A0768F8ECB
3,357,665 UART: Caliptra RT
3,357,916 UART: [state] CFI Enabled
3,478,203 UART: [rt] RT listening for mailbox commands...
3,478,873 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,595 UART: [rt]cmd =0x4c4d5356, len=1672
4,098,231 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,423 UART: [kat] SHA2-512-ACC
897,324 UART: [kat] ECC-384
902,897 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,698 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,479,761 UART: [idev] ++
1,479,929 UART: [idev] CDI.KEYID = 6
1,480,289 UART: [idev] SUBJECT.KEYID = 7
1,480,713 UART: [idev] UDS.KEYID = 0
1,481,058 ready_for_fw is high
1,481,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,541 UART: [idev] Erasing UDS.KEYID = 0
1,505,019 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,751 UART: [idev] --
1,514,662 UART: [ldev] ++
1,514,830 UART: [ldev] CDI.KEYID = 6
1,515,193 UART: [ldev] SUBJECT.KEYID = 5
1,515,619 UART: [ldev] AUTHORITY.KEYID = 7
1,516,082 UART: [ldev] FE.KEYID = 1
1,521,180 UART: [ldev] Erasing FE.KEYID = 1
1,546,907 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,149 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,007 UART: [ldev] --
1,586,402 UART: [fwproc] Waiting for Commands...
1,587,139 UART: [fwproc] Received command 0x46574c44
1,587,930 UART: [fwproc] Received Image of size 118548 bytes
2,932,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,796 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,014 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,253 >>> mbox cmd response: success
3,132,469 UART: [afmc] ++
3,132,637 UART: [afmc] CDI.KEYID = 6
3,132,999 UART: [afmc] SUBJECT.KEYID = 7
3,133,424 UART: [afmc] AUTHORITY.KEYID = 5
3,168,579 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,095 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,467 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,150 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,102 UART: [afmc] --
3,212,210 UART: [cold-reset] --
3,213,136 UART: [state] Locking Datavault
3,214,005 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,609 UART: [state] Locking ICCM
3,215,229 UART: [exit] Launching FMC @ 0x40000130
3,220,559 UART:
3,220,575 UART: Running Caliptra FMC ...
3,220,983 UART:
3,221,126 UART: [state] CFI Enabled
3,231,870 UART: [fht] FMC Alias Private Key: 7
3,350,956 UART: [art] Extend RT PCRs Done
3,351,384 UART: [art] Lock RT PCRs Done
3,353,234 UART: [art] Populate DV Done
3,361,259 UART: [fht] FMC Alias Private Key: 7
3,362,353 UART: [art] Derive CDI
3,362,633 UART: [art] Store in slot 0x4
3,448,051 UART: [art] Derive Key Pair
3,448,411 UART: [art] Store priv key in slot 0x5
3,461,374 UART: [art] Derive Key Pair - Done
3,476,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,464 UART: [art] PUB.X = 1DD37E42AC16E6DE652677C3D15F3AE0721D78E733ECDDC39620391B8A8424A1535AF0000610BAAF0E1D21068C2657FE
3,499,209 UART: [art] PUB.Y = B14B26F5814556B0CA644F0801F0BDE3E213C21C85780A807C4634EEC42D2E75E8A95C44D7D6CB21B0D2DAFC04192608
3,506,150 UART: [art] SIG.R = 6FE8036A7BCBB994B088942B517A45A8972E314A033A62985DF7C28449C585C38398104E0924BD97D4003C407A54FB8A
3,512,883 UART: [art] SIG.S = B7A44612198937CD31A43294C1FCBE62C077EA8FA6252D9EFF4A9A5E3B3B123EFDEFD8D6410BFF2FFAE148F88EBD43C5
3,536,796 UART: Caliptra RT
3,537,139 UART: [state] CFI Enabled
3,657,687 UART: [rt] RT listening for mailbox commands...
3,658,357 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,609 UART: [rt]cmd =0x4c4d5356, len=1672
4,277,669 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,042 ready_for_fw is high
1,363,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,483 >>> mbox cmd response: success
3,042,978 UART:
3,042,994 UART: Running Caliptra FMC ...
3,043,402 UART:
3,043,545 UART: [state] CFI Enabled
3,053,901 UART: [fht] FMC Alias Private Key: 7
3,172,233 UART: [art] Extend RT PCRs Done
3,172,661 UART: [art] Lock RT PCRs Done
3,174,257 UART: [art] Populate DV Done
3,182,614 UART: [fht] FMC Alias Private Key: 7
3,183,692 UART: [art] Derive CDI
3,183,972 UART: [art] Store in slot 0x4
3,269,650 UART: [art] Derive Key Pair
3,270,010 UART: [art] Store priv key in slot 0x5
3,284,259 UART: [art] Derive Key Pair - Done
3,299,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,938 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,703 UART: [art] PUB.X = 0002A732D5742A675A130FE59688E14D31DEB414225AFE84F602500B84AAC6E8D838EA5D57B9696B89EE776F9D851C79
3,322,439 UART: [art] PUB.Y = 36549F5C8C4B28E8AB423FAC46858DE5E43A3379AC1AA61522C162A90AF3A9FDFA735C101DA8878C922C4DA0CA13455A
3,329,398 UART: [art] SIG.R = C0D75885E0CB4BCC5633F5FB18494FF7A773B9987D03DDFD9048F5D304B9BA26DF1304CBCC98393D5AA8A4CE59F0FDBE
3,336,181 UART: [art] SIG.S = 7F4A74D79DC6A864BDD7DEA980DFF22E30324B3892101AD93B7A20016C036A195A34164E832C36740D54827B8618E0AC
3,359,946 UART: Caliptra RT
3,360,289 UART: [state] CFI Enabled
3,481,027 UART: [rt] RT listening for mailbox commands...
3,481,697 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,431 UART: [rt]cmd =0x4c4d5356, len=1672
4,101,131 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,320 UART: [kat] SHA2-256
901,260 UART: [kat] SHA2-384
903,975 UART: [kat] SHA2-512-ACC
905,876 UART: [kat] ECC-384
915,811 UART: [kat] HMAC-384Kdf
920,447 UART: [kat] LMS
1,168,759 UART: [kat] --
1,169,688 UART: [cold-reset] ++
1,170,114 UART: [fht] FHT @ 0x50003400
1,172,838 UART: [idev] ++
1,173,006 UART: [idev] CDI.KEYID = 6
1,173,367 UART: [idev] SUBJECT.KEYID = 7
1,173,792 UART: [idev] UDS.KEYID = 0
1,174,138 ready_for_fw is high
1,174,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,619 UART: [idev] Erasing UDS.KEYID = 0
1,198,509 UART: [idev] Sha1 KeyId Algorithm
1,207,291 UART: [idev] --
1,208,386 UART: [ldev] ++
1,208,554 UART: [ldev] CDI.KEYID = 6
1,208,918 UART: [ldev] SUBJECT.KEYID = 5
1,209,345 UART: [ldev] AUTHORITY.KEYID = 7
1,209,808 UART: [ldev] FE.KEYID = 1
1,214,758 UART: [ldev] Erasing FE.KEYID = 1
1,240,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,916 UART: [ldev] --
1,280,133 UART: [fwproc] Wait for Commands...
1,280,772 UART: [fwproc] Recv command 0x46574c44
1,281,505 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,927 >>> mbox cmd response: success
2,825,181 UART: [afmc] ++
2,825,349 UART: [afmc] CDI.KEYID = 6
2,825,712 UART: [afmc] SUBJECT.KEYID = 7
2,826,138 UART: [afmc] AUTHORITY.KEYID = 5
2,861,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,067 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,777 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,658 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,359 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,982 UART: [afmc] --
2,903,899 UART: [cold-reset] --
2,904,841 UART: [state] Locking Datavault
2,906,054 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,658 UART: [state] Locking ICCM
2,907,292 UART: [exit] Launching FMC @ 0x40000130
2,912,622 UART:
2,912,638 UART: Running Caliptra FMC ...
2,913,046 UART:
2,913,100 UART: [state] CFI Enabled
2,923,730 UART: [fht] FMC Alias Private Key: 7
3,042,944 UART: [art] Extend RT PCRs Done
3,043,372 UART: [art] Lock RT PCRs Done
3,045,036 UART: [art] Populate DV Done
3,053,413 UART: [fht] FMC Alias Private Key: 7
3,054,555 UART: [art] Derive CDI
3,054,835 UART: [art] Store in slot 0x4
3,140,340 UART: [art] Derive Key Pair
3,140,700 UART: [art] Store priv key in slot 0x5
3,153,614 UART: [art] Derive Key Pair - Done
3,168,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,666 UART: [art] PUB.X = 3756DABDBAA73BE6C7E6BED45801D2B840A7D1E24F61362CA33F882FBD5DF45BD092CAA460B3C980AC02847DD505713F
3,191,445 UART: [art] PUB.Y = FA68489BE9B663993F797DF1106B0FCE6F30F19F1A74CA5B7BAA18DEAA4E9FC4DBAAE9228C881C976BE8DADA87E9177E
3,198,418 UART: [art] SIG.R = 0CB65827E6CDDC6FC09565F394F08DE06DD5E9D6BF1448A9C0FA7CCD261728C9710C1A8CFDE24444C35964906C1A8EB5
3,205,196 UART: [art] SIG.S = 67338E2FFEC0BE593E41E2F337600F987C295EAEF864AB9F058F66FB1681F15812600298FF457297C8E77F9181C83193
3,228,943 UART: Caliptra RT
3,229,194 UART: [state] CFI Enabled
3,350,650 UART: [rt] RT listening for mailbox commands...
3,351,320 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,934 UART: [rt]cmd =0x4c4d5356, len=1672
3,655,544 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,928 ready_for_fw is high
1,058,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,956 >>> mbox cmd response: success
2,737,607 UART:
2,737,623 UART: Running Caliptra FMC ...
2,738,031 UART:
2,738,085 UART: [state] CFI Enabled
2,748,469 UART: [fht] FMC Alias Private Key: 7
2,866,793 UART: [art] Extend RT PCRs Done
2,867,221 UART: [art] Lock RT PCRs Done
2,868,839 UART: [art] Populate DV Done
2,877,136 UART: [fht] FMC Alias Private Key: 7
2,878,188 UART: [art] Derive CDI
2,878,468 UART: [art] Store in slot 0x4
2,964,225 UART: [art] Derive Key Pair
2,964,585 UART: [art] Store priv key in slot 0x5
2,977,681 UART: [art] Derive Key Pair - Done
2,992,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,467 UART: [art] PUB.X = 0F60D1B62E843818AA4CF6D8BC6EBBE6517C47D4FADB321BFDDF50A07AC595ADB57EAF30BCFBA8C6D38DCBCADF1453CD
3,015,274 UART: [art] PUB.Y = 8CFB9203990E3C5F898D3FAA69A771271175BA1C8D0ABF101FA3A084E39587B2D99136C3D3DFEB4D8D777FF04E9C9B0F
3,022,226 UART: [art] SIG.R = E7006380ABF45CFDADD0C7061F3265EDA4B7464280940BA5BA12A1B7A0F053F788E2C8BDBC721232F979A6D47613B0AA
3,028,980 UART: [art] SIG.S = EF70C0151DDC4B606A26C37E8D62B18B36E35B037C347E9CFD63EFFCFDF1D42BBD7AEB8CDFDAA10DB4C951789C8608A6
3,052,409 UART: Caliptra RT
3,052,660 UART: [state] CFI Enabled
3,171,708 UART: [rt] RT listening for mailbox commands...
3,172,378 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,752 UART: [rt]cmd =0x4c4d5356, len=1672
3,475,770 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,813 UART: [state] LifecycleState = Unprovisioned
86,468 UART: [state] DebugLocked = No
87,148 UART: [state] WD Timer not started. Device not locked for debugging
88,393 UART: [kat] SHA2-256
891,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,047 UART: [kat] ++
896,199 UART: [kat] sha1
900,391 UART: [kat] SHA2-256
902,331 UART: [kat] SHA2-384
905,110 UART: [kat] SHA2-512-ACC
907,011 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,312 UART: [kat] LMS
1,169,624 UART: [kat] --
1,170,503 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,643 UART: [idev] ++
1,173,811 UART: [idev] CDI.KEYID = 6
1,174,172 UART: [idev] SUBJECT.KEYID = 7
1,174,597 UART: [idev] UDS.KEYID = 0
1,174,943 ready_for_fw is high
1,174,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,938 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,508 UART: [idev] --
1,209,431 UART: [ldev] ++
1,209,599 UART: [ldev] CDI.KEYID = 6
1,209,963 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,216,367 UART: [ldev] Erasing FE.KEYID = 1
1,242,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,723 UART: [ldev] --
1,282,012 UART: [fwproc] Wait for Commands...
1,282,645 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,621 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,602 >>> mbox cmd response: success
2,827,860 UART: [afmc] ++
2,828,028 UART: [afmc] CDI.KEYID = 6
2,828,391 UART: [afmc] SUBJECT.KEYID = 7
2,828,817 UART: [afmc] AUTHORITY.KEYID = 5
2,864,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,223 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,924 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,849 UART: [afmc] --
2,907,742 UART: [cold-reset] --
2,908,470 UART: [state] Locking Datavault
2,909,523 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,127 UART: [state] Locking ICCM
2,910,757 UART: [exit] Launching FMC @ 0x40000130
2,916,087 UART:
2,916,103 UART: Running Caliptra FMC ...
2,916,511 UART:
2,916,654 UART: [state] CFI Enabled
2,926,974 UART: [fht] FMC Alias Private Key: 7
3,045,788 UART: [art] Extend RT PCRs Done
3,046,216 UART: [art] Lock RT PCRs Done
3,047,922 UART: [art] Populate DV Done
3,055,761 UART: [fht] FMC Alias Private Key: 7
3,056,887 UART: [art] Derive CDI
3,057,167 UART: [art] Store in slot 0x4
3,143,078 UART: [art] Derive Key Pair
3,143,438 UART: [art] Store priv key in slot 0x5
3,157,198 UART: [art] Derive Key Pair - Done
3,171,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,891 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,656 UART: [art] PUB.X = DE41812A618682E2326A3F9DEE7C33D2A030A012127B30558DD844EE625F3A2DCA906E3517FED3893E710CEDEE11E8B6
3,195,431 UART: [art] PUB.Y = 36DCA7DBD20B4CBFC7ED78B0ACD230C32CAA98724B2AABC9A7FD7D5ADCB8CC6D4D9C5F5337A30555A38B921DB326F1B7
3,202,407 UART: [art] SIG.R = 926F0CF651F430ED257434191B6A2E03D0EDB087E7357FC48815C6EE8ADD5D7F261C95C23997F599EEAD65AD37045BF0
3,209,176 UART: [art] SIG.S = 2692F7CF79089428B9BFCC5E7DD7EB2A5FF2E00ECCBD7432F952A9A2EF5006F18AAC9FAF7DCCE9063DBEAE709E4BBB0E
3,233,031 UART: Caliptra RT
3,233,374 UART: [state] CFI Enabled
3,352,927 UART: [rt] RT listening for mailbox commands...
3,353,597 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,225 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,733 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,389 ready_for_fw is high
1,059,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,203 >>> mbox cmd response: success
2,741,718 UART:
2,741,734 UART: Running Caliptra FMC ...
2,742,142 UART:
2,742,285 UART: [state] CFI Enabled
2,752,519 UART: [fht] FMC Alias Private Key: 7
2,871,087 UART: [art] Extend RT PCRs Done
2,871,515 UART: [art] Lock RT PCRs Done
2,873,153 UART: [art] Populate DV Done
2,881,504 UART: [fht] FMC Alias Private Key: 7
2,882,482 UART: [art] Derive CDI
2,882,762 UART: [art] Store in slot 0x4
2,968,633 UART: [art] Derive Key Pair
2,968,993 UART: [art] Store priv key in slot 0x5
2,982,931 UART: [art] Derive Key Pair - Done
2,997,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,802 UART: [art] PUB.X = 358B052429C80663FD9C7C59E1E2E5D0B64AA308476730BE27E61E652F42FBD8279347743C80E9C77FA66E743BCB9D90
3,020,563 UART: [art] PUB.Y = 13CDD33568C2E9149C907A4B824AE9AC0A235CA837A526DA3D9F9447F63C258C0B7F15263FF78F3D4375190CFE20ECC5
3,027,512 UART: [art] SIG.R = 23825365C94A15F0531A7A9F9DAD943CD267CC72892080C1ECF97A8B8248625B4669B0A7CD6C67763ABA69D4BF84800C
3,034,281 UART: [art] SIG.S = 83CC5E26F199C3139973454FC73C15756621CF398187F7E9756CBFA9A90DC7B30CD0E8B31239035C5984A71C56AB1302
3,057,865 UART: Caliptra RT
3,058,208 UART: [state] CFI Enabled
3,177,867 UART: [rt] RT listening for mailbox commands...
3,178,537 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,479 UART: [rt]cmd =0x4c4d5356, len=1672
3,483,087 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,773 UART: [kat] SHA2-256
903,713 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
918,564 UART: [kat] HMAC-384Kdf
923,374 UART: [kat] LMS
1,171,702 UART: [kat] --
1,172,357 UART: [cold-reset] ++
1,172,877 UART: [fht] FHT @ 0x50003400
1,175,740 UART: [idev] ++
1,175,908 UART: [idev] CDI.KEYID = 6
1,176,268 UART: [idev] SUBJECT.KEYID = 7
1,176,692 UART: [idev] UDS.KEYID = 0
1,177,037 ready_for_fw is high
1,177,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,664 UART: [idev] Erasing UDS.KEYID = 0
1,201,433 UART: [idev] Sha1 KeyId Algorithm
1,209,735 UART: [idev] --
1,210,693 UART: [ldev] ++
1,210,861 UART: [ldev] CDI.KEYID = 6
1,211,224 UART: [ldev] SUBJECT.KEYID = 5
1,211,650 UART: [ldev] AUTHORITY.KEYID = 7
1,212,113 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,520 UART: [fwproc] Wait for Commands...
1,283,318 UART: [fwproc] Recv command 0x46574c44
1,284,046 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,233 >>> mbox cmd response: success
2,829,427 UART: [afmc] ++
2,829,595 UART: [afmc] CDI.KEYID = 6
2,829,957 UART: [afmc] SUBJECT.KEYID = 7
2,830,382 UART: [afmc] AUTHORITY.KEYID = 5
2,865,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,516 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,225 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,108 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,809 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,787 UART: [afmc] --
2,908,899 UART: [cold-reset] --
2,909,539 UART: [state] Locking Datavault
2,910,548 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,152 UART: [state] Locking ICCM
2,911,712 UART: [exit] Launching FMC @ 0x40000130
2,917,042 UART:
2,917,058 UART: Running Caliptra FMC ...
2,917,466 UART:
2,917,520 UART: [state] CFI Enabled
2,927,922 UART: [fht] FMC Alias Private Key: 7
3,047,058 UART: [art] Extend RT PCRs Done
3,047,486 UART: [art] Lock RT PCRs Done
3,049,092 UART: [art] Populate DV Done
3,057,293 UART: [fht] FMC Alias Private Key: 7
3,058,461 UART: [art] Derive CDI
3,058,741 UART: [art] Store in slot 0x4
3,144,588 UART: [art] Derive Key Pair
3,144,948 UART: [art] Store priv key in slot 0x5
3,158,378 UART: [art] Derive Key Pair - Done
3,172,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,624 UART: [art] PUB.X = 6E9A2C9CF06C46562A6B1B4F90D2BBD17FB8A10BB3B14349328A099C41D33BB1DA5F491DDD43E93DE212E8C6E48BB5F6
3,195,406 UART: [art] PUB.Y = BCD5621B184F959FEA1C484C1A0A81D79841AB0646021129A47C18D85C889A23FF1BD309620967661278A4D5D327B4E1
3,202,337 UART: [art] SIG.R = 66B9E5E2E41C0639636E34F05298F9AF8A743BB0B514E85863361E185DCE47015AA2CDDBBE5368F0343B2985BE88506C
3,209,103 UART: [art] SIG.S = 3AC5B8331DD673A0124C59A2A0002A38D23342374C4EAA79D19DA9FF0332E9BFD47DA42C1AD169320631E977571ACD8C
3,232,801 UART: Caliptra RT
3,233,052 UART: [state] CFI Enabled
3,352,958 UART: [rt] RT listening for mailbox commands...
3,353,628 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,256 UART: [rt]cmd =0x4c4d5356, len=1672
3,657,510 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,453 ready_for_fw is high
1,060,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,484 >>> mbox cmd response: success
2,740,673 UART:
2,740,689 UART: Running Caliptra FMC ...
2,741,097 UART:
2,741,151 UART: [state] CFI Enabled
2,751,615 UART: [fht] FMC Alias Private Key: 7
2,870,553 UART: [art] Extend RT PCRs Done
2,870,981 UART: [art] Lock RT PCRs Done
2,872,685 UART: [art] Populate DV Done
2,881,082 UART: [fht] FMC Alias Private Key: 7
2,882,106 UART: [art] Derive CDI
2,882,386 UART: [art] Store in slot 0x4
2,967,965 UART: [art] Derive Key Pair
2,968,325 UART: [art] Store priv key in slot 0x5
2,982,001 UART: [art] Derive Key Pair - Done
2,996,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,664 UART: [art] PUB.X = 78EFC590CB85609BBBAEE95EE11604FCB09530BEF10B5CF250034C49954FE17673118DBF79F4E2E6329352AF336EDF05
3,019,432 UART: [art] PUB.Y = 63111AE0E5D60E0DC48AA5717402F7F350BA9A5063664E4D39BE43587BB397E6A400B059CB904237C22EE6E083E3B8D4
3,026,353 UART: [art] SIG.R = 64BD5D95FB09680A526693A341EB70E6C5BA7712339410519DE55E4915A456DAF0407D46840358744137F6E976CEC197
3,033,104 UART: [art] SIG.S = BDD6E6D36ACD63DFBCC3FD8702E02D4CCF1A569FAFF95CAD483726E00D88558E1017E61492FCB797D6D6FC9BA56F7F0E
3,056,841 UART: Caliptra RT
3,057,092 UART: [state] CFI Enabled
3,175,805 UART: [rt] RT listening for mailbox commands...
3,176,475 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,129 UART: [rt]cmd =0x4c4d5356, len=1672
3,480,385 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,969 UART: [state] LifecycleState = Unprovisioned
86,624 UART: [state] DebugLocked = No
87,302 UART: [state] WD Timer not started. Device not locked for debugging
88,541 UART: [kat] SHA2-256
894,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,316 UART: [kat] ++
898,468 UART: [kat] sha1
902,734 UART: [kat] SHA2-256
904,674 UART: [kat] SHA2-384
907,527 UART: [kat] SHA2-512-ACC
909,428 UART: [kat] ECC-384
919,263 UART: [kat] HMAC-384Kdf
923,817 UART: [kat] LMS
1,172,145 UART: [kat] --
1,173,002 UART: [cold-reset] ++
1,173,572 UART: [fht] FHT @ 0x50003400
1,176,469 UART: [idev] ++
1,176,637 UART: [idev] CDI.KEYID = 6
1,176,997 UART: [idev] SUBJECT.KEYID = 7
1,177,421 UART: [idev] UDS.KEYID = 0
1,177,766 ready_for_fw is high
1,177,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,477 UART: [idev] Erasing UDS.KEYID = 0
1,202,708 UART: [idev] Sha1 KeyId Algorithm
1,211,220 UART: [idev] --
1,212,174 UART: [ldev] ++
1,212,342 UART: [ldev] CDI.KEYID = 6
1,212,705 UART: [ldev] SUBJECT.KEYID = 5
1,213,131 UART: [ldev] AUTHORITY.KEYID = 7
1,213,594 UART: [ldev] FE.KEYID = 1
1,218,942 UART: [ldev] Erasing FE.KEYID = 1
1,244,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,908 UART: [ldev] --
1,284,287 UART: [fwproc] Wait for Commands...
1,284,983 UART: [fwproc] Recv command 0x46574c44
1,285,711 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,692 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,437 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,607 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,862 >>> mbox cmd response: success
2,829,920 UART: [afmc] ++
2,830,088 UART: [afmc] CDI.KEYID = 6
2,830,450 UART: [afmc] SUBJECT.KEYID = 7
2,830,875 UART: [afmc] AUTHORITY.KEYID = 5
2,866,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,937 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,685 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,394 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,277 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,660 UART: [afmc] --
2,909,756 UART: [cold-reset] --
2,910,658 UART: [state] Locking Datavault
2,911,645 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,249 UART: [state] Locking ICCM
2,912,773 UART: [exit] Launching FMC @ 0x40000130
2,918,103 UART:
2,918,119 UART: Running Caliptra FMC ...
2,918,527 UART:
2,918,670 UART: [state] CFI Enabled
2,929,430 UART: [fht] FMC Alias Private Key: 7
3,048,170 UART: [art] Extend RT PCRs Done
3,048,598 UART: [art] Lock RT PCRs Done
3,049,884 UART: [art] Populate DV Done
3,058,159 UART: [fht] FMC Alias Private Key: 7
3,059,137 UART: [art] Derive CDI
3,059,417 UART: [art] Store in slot 0x4
3,145,182 UART: [art] Derive Key Pair
3,145,542 UART: [art] Store priv key in slot 0x5
3,158,506 UART: [art] Derive Key Pair - Done
3,173,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,668 UART: [art] PUB.X = 7C960228362B6F4E408205288C4F00F0CFC5DB64DBC551613453D1536945D67A1D81D5DFEB9DD7E17E8DA9405252726C
3,196,410 UART: [art] PUB.Y = 355A9CB3DE1006292E2EE6D79CBDA13A35AC998A8D1E18C7227CB4E38A70AC7E55AB4DED90CA57462C2D9FAB3AA8083F
3,203,376 UART: [art] SIG.R = 2C8530771C1BCD2C3ADB9AF0DCBAB464A1C358DB5C935CAF76FB6926153CAF0DA76E30E7AA0E071E98B12D3D1FB5A8B8
3,210,163 UART: [art] SIG.S = 090B1F64DAFD9347C89F79E8E51F97DB3506E45AB4D905348FF20CAD01FEB505E7A1E4620E302C53976A43E8D376FC96
3,233,643 UART: Caliptra RT
3,233,986 UART: [state] CFI Enabled
3,354,584 UART: [rt] RT listening for mailbox commands...
3,355,254 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,006 UART: [rt]cmd =0x4c4d5356, len=1672
3,659,270 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 ready_for_fw is high
1,060,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,859 >>> mbox cmd response: success
2,740,226 UART:
2,740,242 UART: Running Caliptra FMC ...
2,740,650 UART:
2,740,793 UART: [state] CFI Enabled
2,751,059 UART: [fht] FMC Alias Private Key: 7
2,870,435 UART: [art] Extend RT PCRs Done
2,870,863 UART: [art] Lock RT PCRs Done
2,872,675 UART: [art] Populate DV Done
2,880,680 UART: [fht] FMC Alias Private Key: 7
2,881,796 UART: [art] Derive CDI
2,882,076 UART: [art] Store in slot 0x4
2,967,915 UART: [art] Derive Key Pair
2,968,275 UART: [art] Store priv key in slot 0x5
2,981,673 UART: [art] Derive Key Pair - Done
2,996,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,364 UART: [art] PUB.X = 0BD99D0C6943D82465BA73D024594756E76C58F1BE9EBA4C20DEC98D093A6D51CB3338892880376A55614B2AF3C03346
3,019,123 UART: [art] PUB.Y = 327DF902B46C7F876B659E6E41ECF11EA9F3FB1072AD78C92857356C6800C18A24FEC4DCB8B945CD45EBBB5974EF615E
3,026,062 UART: [art] SIG.R = 23344FBD10C71C02EB2CB82C51C98AD77AED0BF0490E1A27DC5858E207548BB9A04729802CF4770C3737FCEC674C70AB
3,032,827 UART: [art] SIG.S = 54DFB9F6FFB7AC965D2950A78850AAE11C9DF198A1B1C91E63EDC503B6E66077F0381577CF44AE7A300C4B1111819EAD
3,056,317 UART: Caliptra RT
3,056,660 UART: [state] CFI Enabled
3,176,254 UART: [rt] RT listening for mailbox commands...
3,176,924 <<< Executing mbox cmd 0x4c4d5356 (1672 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,532 UART: [rt]cmd =0x4c4d5356, len=1672
3,480,938 >>> mbox cmd response: failed
test test_lms::test_lms_verify_invalid_sig_lms_type ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,274 UART:
192,639 UART: Running Caliptra ROM ...
193,729 UART:
193,873 UART: [state] CFI Enabled
264,283 UART: [state] LifecycleState = Unprovisioned
265,996 UART: [state] DebugLocked = No
268,304 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,247 UART: [kat] SHA2-256
442,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,508 UART: [kat] ++
453,955 UART: [kat] sha1
465,609 UART: [kat] SHA2-256
468,283 UART: [kat] SHA2-384
474,770 UART: [kat] SHA2-512-ACC
477,144 UART: [kat] ECC-384
2,767,676 UART: [kat] HMAC-384Kdf
2,801,064 UART: [kat] LMS
3,991,424 UART: [kat] --
3,996,177 UART: [cold-reset] ++
3,998,544 UART: [fht] Storing FHT @ 0x50003400
4,009,886 UART: [idev] ++
4,010,450 UART: [idev] CDI.KEYID = 6
4,011,336 UART: [idev] SUBJECT.KEYID = 7
4,012,582 UART: [idev] UDS.KEYID = 0
4,013,668 ready_for_fw is high
4,013,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,478 UART: [idev] Erasing UDS.KEYID = 0
7,348,378 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,278 UART: [idev] --
7,373,794 UART: [ldev] ++
7,374,366 UART: [ldev] CDI.KEYID = 6
7,375,384 UART: [ldev] SUBJECT.KEYID = 5
7,376,541 UART: [ldev] AUTHORITY.KEYID = 7
7,377,826 UART: [ldev] FE.KEYID = 1
7,423,373 UART: [ldev] Erasing FE.KEYID = 1
10,758,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,072,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,087,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,116,411 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,770 UART: [ldev] --
13,140,487 UART: [fwproc] Waiting for Commands...
13,142,311 UART: [fwproc] Received command 0x46574c44
13,144,540 UART: [fwproc] Received Image of size 118548 bytes
17,247,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,979 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,307 >>> mbox cmd response: success
17,725,824 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,728,657 UART: [afmc] ++
17,729,286 UART: [afmc] CDI.KEYID = 6
17,730,166 UART: [afmc] SUBJECT.KEYID = 7
17,731,433 UART: [afmc] AUTHORITY.KEYID = 5
21,097,004 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,397,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,399,433 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,413,842 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,428,610 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,443,010 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,465,060 UART: [afmc] --
23,468,287 UART: [cold-reset] --
23,473,349 UART: [state] Locking Datavault
23,479,679 UART: [state] Locking PCR0, PCR1 and PCR31
23,481,436 UART: [state] Locking ICCM
23,483,636 UART: [exit] Launching FMC @ 0x40000130
23,492,030 UART:
23,492,275 UART: Running Caliptra FMC ...
23,493,373 UART:
23,493,531 UART: [state] CFI Enabled
23,555,631 UART: [fht] FMC Alias Private Key: 7
25,896,385 UART: [art] Extend RT PCRs Done
25,897,599 UART: [art] Lock RT PCRs Done
25,899,173 UART: [art] Populate DV Done
25,904,852 UART: [fht] FMC Alias Private Key: 7
25,906,334 UART: [art] Derive CDI
25,907,145 UART: [art] Store in slot 0x4
25,963,857 UART: [art] Derive Key Pair
25,964,897 UART: [art] Store priv key in slot 0x5
29,257,000 UART: [art] Derive Key Pair - Done
29,270,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,548 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,063 UART: [art] PUB.X = 013EA2AA1C19F71F31B2F17BCD82B9232900D2DB87835113D5D822DA173BCFADBE316B281A63EA04E8628834351D4F9F
31,567,310 UART: [art] PUB.Y = 47CFAD276298B54939F43B277188DC301858F0D33170F4836EB090786AD8DF071DAD3E0B38B560C39F22434C8D674293
31,574,539 UART: [art] SIG.R = CE831D8DC9FB63F125752564C627257C49A9B03EF39A294422FD71B4135E78E775C7A72BD62347B651C320EC1510A24E
31,581,927 UART: [art] SIG.S = 709C18AAEB5E7AEA424AF30C01C7E03B6C438A0FE7EC0CE5B1765F4044C7462FFF6E57F86E2A2583064F27A6B3E02BC2
32,887,480 UART: Caliptra RT
32,888,183 UART: [state] CFI Enabled
33,085,828 UART: [rt] RT listening for mailbox commands...
33,099,571 >>> mbox cmd response: failed
33,099,971 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,129,688 UART: [rt]cmd =0x46505652, len=4
33,130,932 UART: [rt] FIPS Version
33,132,276 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,805,111 ready_for_fw is high
3,805,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,983,120 >>> mbox cmd response: success
17,983,791 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,676,190 UART:
23,676,579 UART: Running Caliptra FMC ...
23,677,687 UART:
23,677,843 UART: [state] CFI Enabled
23,746,299 UART: [fht] FMC Alias Private Key: 7
26,085,614 UART: [art] Extend RT PCRs Done
26,086,846 UART: [art] Lock RT PCRs Done
26,088,503 UART: [art] Populate DV Done
26,094,096 UART: [fht] FMC Alias Private Key: 7
26,095,644 UART: [art] Derive CDI
26,096,416 UART: [art] Store in slot 0x4
26,154,527 UART: [art] Derive Key Pair
26,155,579 UART: [art] Store priv key in slot 0x5
29,448,973 UART: [art] Derive Key Pair - Done
29,462,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,681 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,202 UART: [art] PUB.X = 1E25A85045789A89F91FC5E05C3777E24631BEA7A6A45425D50F87B3DCB88B0A1A1C62AC3CC52EB6B2963517C8DFDE53
31,759,449 UART: [art] PUB.Y = 29C06D437A726B8B1B74036B52F1D29779119B6AACA6C71116E037531F5BED79BB7AF8EA30FF4092F368DDA3FDC9306B
31,766,747 UART: [art] SIG.R = E92589B431456005E12C5242BEE819375EA00DD44F708C15B287F04317BA5247B7F0F740C92446512FAC96E96990FE79
31,774,089 UART: [art] SIG.S = 3BBB60FFFE2FC77210FC8AAF056BB7941C39D7BD58F3C9087F5068B3E0BCFF4D75C538CE1D3782B7FD1C09F0963E02C0
33,079,457 UART: Caliptra RT
33,080,181 UART: [state] CFI Enabled
33,257,351 UART: [rt] RT listening for mailbox commands...
33,270,778 >>> mbox cmd response: failed
33,271,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,300,653 UART: [rt]cmd =0x46505652, len=4
33,301,895 UART: [rt] FIPS Version
33,303,054 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,420 UART:
192,779 UART: Running Caliptra ROM ...
193,954 UART:
603,749 UART: [state] CFI Enabled
616,082 UART: [state] LifecycleState = Unprovisioned
617,947 UART: [state] DebugLocked = No
620,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,329 UART: [kat] SHA2-256
796,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,587 UART: [kat] ++
807,030 UART: [kat] sha1
818,824 UART: [kat] SHA2-256
821,474 UART: [kat] SHA2-384
828,167 UART: [kat] SHA2-512-ACC
830,525 UART: [kat] ECC-384
3,114,330 UART: [kat] HMAC-384Kdf
3,126,356 UART: [kat] LMS
4,316,415 UART: [kat] --
4,322,516 UART: [cold-reset] ++
4,324,574 UART: [fht] Storing FHT @ 0x50003400
4,337,631 UART: [idev] ++
4,338,360 UART: [idev] CDI.KEYID = 6
4,339,282 UART: [idev] SUBJECT.KEYID = 7
4,340,340 UART: [idev] UDS.KEYID = 0
4,341,457 ready_for_fw is high
4,341,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,163 UART: [idev] Erasing UDS.KEYID = 0
7,626,224 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,071 UART: [idev] --
7,652,463 UART: [ldev] ++
7,653,039 UART: [ldev] CDI.KEYID = 6
7,654,012 UART: [ldev] SUBJECT.KEYID = 5
7,655,218 UART: [ldev] AUTHORITY.KEYID = 7
7,656,496 UART: [ldev] FE.KEYID = 1
7,668,041 UART: [ldev] Erasing FE.KEYID = 1
10,962,062 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,128 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,397 UART: [ldev] --
13,321,499 UART: [fwproc] Waiting for Commands...
13,323,142 UART: [fwproc] Received command 0x46574c44
13,325,333 UART: [fwproc] Received Image of size 118548 bytes
17,431,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,909,248 >>> mbox cmd response: success
17,910,364 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
17,913,370 UART: [afmc] ++
17,913,953 UART: [afmc] CDI.KEYID = 6
17,914,827 UART: [afmc] SUBJECT.KEYID = 7
17,916,090 UART: [afmc] AUTHORITY.KEYID = 5
21,228,616 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,443 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,119 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,898 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,324 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,191 UART: [afmc] --
23,593,459 UART: [cold-reset] --
23,597,539 UART: [state] Locking Datavault
23,602,187 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,938 UART: [state] Locking ICCM
23,605,383 UART: [exit] Launching FMC @ 0x40000130
23,613,771 UART:
23,614,011 UART: Running Caliptra FMC ...
23,615,108 UART:
23,615,260 UART: [state] CFI Enabled
23,623,571 UART: [fht] FMC Alias Private Key: 7
25,963,695 UART: [art] Extend RT PCRs Done
25,964,943 UART: [art] Lock RT PCRs Done
25,966,191 UART: [art] Populate DV Done
25,971,548 UART: [fht] FMC Alias Private Key: 7
25,973,024 UART: [art] Derive CDI
25,973,783 UART: [art] Store in slot 0x4
26,016,367 UART: [art] Derive Key Pair
26,017,363 UART: [art] Store priv key in slot 0x5
29,259,441 UART: [art] Derive Key Pair - Done
29,272,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,705 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,214 UART: [art] PUB.X = 83C3AA45458FAEA38748F97E5BB4F4D284A2F8335E7304F46834D8A47CD7877F9552B574F4CE5579035FC618AD3B6487
31,561,593 UART: [art] PUB.Y = 1DE3B8FE955F8712634E416C6B921A823397B8A2351B9C5F3B99521B5407FA448EE0136EC49DE2FD29D3AEF19F5D69AD
31,568,716 UART: [art] SIG.R = 89F386F5D2AFF3883E9EE4DDA3DECE9DB4A7F5108B17A0AE806D12D60A3304E6093DD35B6E17483441C8533E9271E978
31,576,092 UART: [art] SIG.S = 5E6FEEABE8449323C5E3EE9846B9A84ADFAE3BA08C8D96068859C78DE52F104EDA43900F89CE56906F668B66EC95E15D
32,881,020 UART: Caliptra RT
32,881,779 UART: [state] CFI Enabled
33,015,246 UART: [rt] RT listening for mailbox commands...
33,028,801 >>> mbox cmd response: failed
33,029,196 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,058,957 UART: [rt]cmd =0x46505652, len=4
33,060,205 UART: [rt] FIPS Version
33,061,579 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,128,099 ready_for_fw is high
4,128,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,091 >>> mbox cmd response: success
18,170,328 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
23,812,972 UART:
23,813,369 UART: Running Caliptra FMC ...
23,814,483 UART:
23,814,632 UART: [state] CFI Enabled
23,822,706 UART: [fht] FMC Alias Private Key: 7
26,162,771 UART: [art] Extend RT PCRs Done
26,164,003 UART: [art] Lock RT PCRs Done
26,165,715 UART: [art] Populate DV Done
26,171,242 UART: [fht] FMC Alias Private Key: 7
26,172,832 UART: [art] Derive CDI
26,173,566 UART: [art] Store in slot 0x4
26,216,158 UART: [art] Derive Key Pair
26,217,203 UART: [art] Store priv key in slot 0x5
29,459,653 UART: [art] Derive Key Pair - Done
29,472,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,752,427 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,953 UART: [art] PUB.X = 00880FD8F31EBF176548CEC9E82B5321E95668A7B858DDC8BD3A2492B99B7136D19445B115ECA28F0058A45D9F894E4A
31,761,149 UART: [art] PUB.Y = F46E1220246B3ED6EBE7B37AEA1F35EA4963E5886CB80017949B408845399E11E39291F9B2246B146CB451CCF8E769CA
31,768,415 UART: [art] SIG.R = 746436912C0F89185266ADF4B2DE5E3F30CE569AD011A96A0219A6BA2DA21737847B0A034DA4E848F3BF6D9B555202B7
31,775,802 UART: [art] SIG.S = 0B6C49C136140C5C87B69A86FE331193B4B310BBCF6F795D34011556044E4C8E3975097384ACAFE356C37D3667A63D35
33,081,106 UART: Caliptra RT
33,081,829 UART: [state] CFI Enabled
33,215,315 UART: [rt] RT listening for mailbox commands...
33,228,993 >>> mbox cmd response: failed
33,229,419 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
33,259,124 UART: [rt]cmd =0x46505652, len=4
33,260,423 UART: [rt] FIPS Version
33,261,639 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
192,073 UART:
192,458 UART: Running Caliptra ROM ...
193,634 UART:
193,782 UART: [state] CFI Enabled
264,614 UART: [state] LifecycleState = Unprovisioned
266,515 UART: [state] DebugLocked = No
268,331 UART: [state] WD Timer not started. Device not locked for debugging
272,004 UART: [kat] SHA2-256
451,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,431 UART: [kat] ++
462,903 UART: [kat] sha1
474,824 UART: [kat] SHA2-256
477,525 UART: [kat] SHA2-384
483,588 UART: [kat] SHA2-512-ACC
485,949 UART: [kat] ECC-384
2,947,172 UART: [kat] HMAC-384Kdf
2,971,144 UART: [kat] LMS
3,447,649 UART: [kat] --
3,450,578 UART: [cold-reset] ++
3,451,584 UART: [fht] FHT @ 0x50003400
3,462,343 UART: [idev] ++
3,462,900 UART: [idev] CDI.KEYID = 6
3,463,926 UART: [idev] SUBJECT.KEYID = 7
3,465,101 UART: [idev] UDS.KEYID = 0
3,466,020 ready_for_fw is high
3,466,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,268 UART: [idev] Erasing UDS.KEYID = 0
5,987,754 UART: [idev] Sha1 KeyId Algorithm
6,012,525 UART: [idev] --
6,018,819 UART: [ldev] ++
6,019,398 UART: [ldev] CDI.KEYID = 6
6,020,421 UART: [ldev] SUBJECT.KEYID = 5
6,021,527 UART: [ldev] AUTHORITY.KEYID = 7
6,022,827 UART: [ldev] FE.KEYID = 1
6,058,161 UART: [ldev] Erasing FE.KEYID = 1
8,562,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,889 UART: [ldev] --
10,372,984 UART: [fwproc] Wait for Commands...
10,375,506 UART: [fwproc] Recv command 0x46574c44
10,377,482 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,731 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,744 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,063 >>> mbox cmd response: success
14,352,223 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,355,942 UART: [afmc] ++
14,356,522 UART: [afmc] CDI.KEYID = 6
14,357,539 UART: [afmc] SUBJECT.KEYID = 7
14,358,690 UART: [afmc] AUTHORITY.KEYID = 5
16,891,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,173 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,994 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,053 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,607 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,851 UART: [afmc] --
18,693,872 UART: [cold-reset] --
18,699,508 UART: [state] Locking Datavault
18,705,241 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,988 UART: [state] Locking ICCM
18,709,135 UART: [exit] Launching FMC @ 0x40000130
18,717,530 UART:
18,717,776 UART: Running Caliptra FMC ...
18,718,874 UART:
18,719,030 UART: [state] CFI Enabled
18,772,859 UART: [fht] FMC Alias Private Key: 7
20,539,209 UART: [art] Extend RT PCRs Done
20,540,428 UART: [art] Lock RT PCRs Done
20,542,130 UART: [art] Populate DV Done
20,547,752 UART: [fht] FMC Alias Private Key: 7
20,549,296 UART: [art] Derive CDI
20,550,110 UART: [art] Store in slot 0x4
20,605,004 UART: [art] Derive Key Pair
20,606,027 UART: [art] Store priv key in slot 0x5
23,068,701 UART: [art] Derive Key Pair - Done
23,081,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,927 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,452 UART: [art] PUB.X = 0086B29507F17961CFF8D3BF24EE46D700E8DBECA61095471EE104D4FD888219081D53E1E8224D49DDEF41B1E9684F75
24,804,654 UART: [art] PUB.Y = 94F7374D3F4C953C134F08BEC5A34379E0E8538A9695AC195E18FA9BC5C6660F9964A65EB277533B939F06F82CBA0D98
24,811,936 UART: [art] SIG.R = 8151099EE2C7236614DAF395BEB0CF51FCEEDA229E413834BD200CF208C6B4F81BEB6BDECD3C5D891D63A478BC7253F9
24,819,322 UART: [art] SIG.S = D84E4AAB5DEEF5694F7AA80F0B096578E0378397D2FB7184FD22B248ADAA4B165558BB3EEF789809988B2D4A6F95066D
25,798,493 UART: Caliptra RT
25,799,217 UART: [state] CFI Enabled
25,987,780 UART: [rt] RT listening for mailbox commands...
26,001,355 >>> mbox cmd response: failed
26,001,803 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,031,533 UART: [rt]cmd =0x46505652, len=4
26,032,779 UART: [rt] FIPS Version
26,034,156 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,460,915 ready_for_fw is high
3,461,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,208,732 >>> mbox cmd response: success
14,210,131 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,498,343 UART:
18,498,739 UART: Running Caliptra FMC ...
18,499,838 UART:
18,500,012 UART: [state] CFI Enabled
18,564,195 UART: [fht] FMC Alias Private Key: 7
20,330,839 UART: [art] Extend RT PCRs Done
20,332,061 UART: [art] Lock RT PCRs Done
20,333,985 UART: [art] Populate DV Done
20,339,411 UART: [fht] FMC Alias Private Key: 7
20,341,120 UART: [art] Derive CDI
20,341,857 UART: [art] Store in slot 0x4
20,397,213 UART: [art] Derive Key Pair
20,398,258 UART: [art] Store priv key in slot 0x5
22,861,504 UART: [art] Derive Key Pair - Done
22,874,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,586,219 UART: [art] Erasing AUTHORITY.KEYID = 7
24,587,726 UART: [art] PUB.X = 4428CF8434C23B1FB059F93B1C3F2E8B9CF4139E26E80E8B2C274F2676D55C1CE584CA4DB6E271AB9A6B91F3C9D57B17
24,595,039 UART: [art] PUB.Y = 66BD7814798E7CFEB614A2A66AC2BC97BF916ED1AB6E1C9CB6B4D60001D294A5A7598A17B0F7A6AAECBFCB2D0415BE25
24,602,288 UART: [art] SIG.R = CB7A47A438A5232994C03553C193FD46F3EEC6509A0E6E7A938B5CD44CA4857E00E420289421B5610C416EBEED7F5545
24,609,696 UART: [art] SIG.S = 855DE64802C0116856A1BB52C883DBA15603D359EF5AE748DC41B725F644928EBC1170C8D621F66B7F873603A86AA7AF
25,588,676 UART: Caliptra RT
25,589,397 UART: [state] CFI Enabled
25,769,507 UART: [rt] RT listening for mailbox commands...
25,782,990 >>> mbox cmd response: failed
25,783,379 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,812,932 UART: [rt]cmd =0x46505652, len=4
25,814,218 UART: [rt] FIPS Version
25,815,434 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,505 UART:
192,862 UART: Running Caliptra ROM ...
194,044 UART:
603,624 UART: [state] CFI Enabled
617,181 UART: [state] LifecycleState = Unprovisioned
619,077 UART: [state] DebugLocked = No
621,455 UART: [state] WD Timer not started. Device not locked for debugging
626,220 UART: [kat] SHA2-256
805,855 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,688 UART: [kat] ++
817,137 UART: [kat] sha1
828,225 UART: [kat] SHA2-256
830,886 UART: [kat] SHA2-384
837,091 UART: [kat] SHA2-512-ACC
839,405 UART: [kat] ECC-384
3,281,100 UART: [kat] HMAC-384Kdf
3,292,669 UART: [kat] LMS
3,769,146 UART: [kat] --
3,775,561 UART: [cold-reset] ++
3,776,644 UART: [fht] FHT @ 0x50003400
3,787,899 UART: [idev] ++
3,788,460 UART: [idev] CDI.KEYID = 6
3,789,419 UART: [idev] SUBJECT.KEYID = 7
3,790,687 UART: [idev] UDS.KEYID = 0
3,791,590 ready_for_fw is high
3,791,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,741 UART: [idev] Erasing UDS.KEYID = 0
6,268,091 UART: [idev] Sha1 KeyId Algorithm
6,292,068 UART: [idev] --
6,296,959 UART: [ldev] ++
6,297,593 UART: [ldev] CDI.KEYID = 6
6,298,524 UART: [ldev] SUBJECT.KEYID = 5
6,299,682 UART: [ldev] AUTHORITY.KEYID = 7
6,300,967 UART: [ldev] FE.KEYID = 1
6,312,591 UART: [ldev] Erasing FE.KEYID = 1
8,788,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,602 UART: [ldev] --
10,584,411 UART: [fwproc] Wait for Commands...
10,586,125 UART: [fwproc] Recv command 0x46574c44
10,588,111 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,773 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,342 >>> mbox cmd response: success
14,560,456 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,564,258 UART: [afmc] ++
14,564,840 UART: [afmc] CDI.KEYID = 6
14,565,858 UART: [afmc] SUBJECT.KEYID = 7
14,567,019 UART: [afmc] AUTHORITY.KEYID = 5
17,068,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,498 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,326 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,946 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,165 UART: [afmc] --
18,867,337 UART: [cold-reset] --
18,869,742 UART: [state] Locking Datavault
18,875,365 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,071 UART: [state] Locking ICCM
18,878,849 UART: [exit] Launching FMC @ 0x40000130
18,887,247 UART:
18,887,485 UART: Running Caliptra FMC ...
18,888,589 UART:
18,888,752 UART: [state] CFI Enabled
18,897,014 UART: [fht] FMC Alias Private Key: 7
20,663,457 UART: [art] Extend RT PCRs Done
20,664,693 UART: [art] Lock RT PCRs Done
20,665,940 UART: [art] Populate DV Done
20,671,678 UART: [fht] FMC Alias Private Key: 7
20,673,375 UART: [art] Derive CDI
20,674,189 UART: [art] Store in slot 0x4
20,716,952 UART: [art] Derive Key Pair
20,717,993 UART: [art] Store priv key in slot 0x5
23,144,730 UART: [art] Derive Key Pair - Done
23,157,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,104 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,612 UART: [art] PUB.X = 82AC83E9688EAD58B7AD436F44C0CEFBFF5FB92119D331110FE45C17AA7CFDCDCE6C06BD7E0AE49E858153A8414603F7
24,872,921 UART: [art] PUB.Y = 5C084AA9557E8E87CFC0AA621BC7EE0497C9C4A43B4F81C3B4EFFEC93FAFA6D505E00DA4F51F8FB7C52B853FE4207191
24,880,206 UART: [art] SIG.R = 38ECE22E39C043FC8DCAB22AFF9D6E32BEDD9561BFD794E8062F40A643B03715E353E704681E80834F79F7862BDD4543
24,887,601 UART: [art] SIG.S = 2AA92A2E811DC9839D242469E6453EAFC7AD77BE1DF60A5EA5F30A8E96C77556369B51627F5BB119B182D445A8787240
25,866,884 UART: Caliptra RT
25,867,596 UART: [state] CFI Enabled
26,000,638 UART: [rt] RT listening for mailbox commands...
26,014,491 >>> mbox cmd response: failed
26,014,882 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,044,546 UART: [rt]cmd =0x46505652, len=4
26,045,789 UART: [rt] FIPS Version
26,047,065 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,779,873 ready_for_fw is high
3,780,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,017 >>> mbox cmd response: success
14,457,503 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
18,713,221 UART:
18,713,620 UART: Running Caliptra FMC ...
18,714,812 UART:
18,715,006 UART: [state] CFI Enabled
18,722,790 UART: [fht] FMC Alias Private Key: 7
20,489,255 UART: [art] Extend RT PCRs Done
20,490,489 UART: [art] Lock RT PCRs Done
20,492,172 UART: [art] Populate DV Done
20,497,710 UART: [fht] FMC Alias Private Key: 7
20,499,370 UART: [art] Derive CDI
20,500,190 UART: [art] Store in slot 0x4
20,543,280 UART: [art] Derive Key Pair
20,544,326 UART: [art] Store priv key in slot 0x5
22,971,552 UART: [art] Derive Key Pair - Done
22,984,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,691,270 UART: [art] Erasing AUTHORITY.KEYID = 7
24,692,769 UART: [art] PUB.X = 6E63BD5B42E291A11B2E36BCA4A8BE91D406C737B8C4EAD0C6FDAC50BEBCD3B453F39B42EC58123D97FE6C8567D12982
24,700,103 UART: [art] PUB.Y = E349A91132CFFD7FF4263BE5452A054C0B0A866880791CCA72102F83D53A7BE8606CF0B3B67ECECEFCF3A336166C087A
24,707,372 UART: [art] SIG.R = F151C94E6ABAF0E8442683DDAC3F8155526E5E114807A29460FB22A8D12EA87E1397BC2CF21CD7A05CC7E8E08DA50630
24,714,800 UART: [art] SIG.S = FCB111B18ACBC341B082270BB2D3DF62DF7D85CA1BCE0E985E4A3B2B701DD02AFB4DAB7FB60E51706F13F83FCF6F253B
25,693,256 UART: Caliptra RT
25,693,968 UART: [state] CFI Enabled
25,826,794 UART: [rt] RT listening for mailbox commands...
25,840,479 >>> mbox cmd response: failed
25,840,865 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
25,870,637 UART: [rt]cmd =0x46505652, len=4
25,871,884 UART: [rt] FIPS Version
25,873,154 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,160 UART:
192,527 UART: Running Caliptra ROM ...
193,719 UART:
193,875 UART: [state] CFI Enabled
265,713 UART: [state] LifecycleState = Unprovisioned
268,134 UART: [state] DebugLocked = No
269,379 UART: [state] WD Timer not started. Device not locked for debugging
273,126 UART: [kat] SHA2-256
462,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,729 UART: [kat] ++
474,217 UART: [kat] sha1
485,462 UART: [kat] SHA2-256
488,473 UART: [kat] SHA2-384
494,812 UART: [kat] SHA2-512-ACC
497,421 UART: [kat] ECC-384
2,946,965 UART: [kat] HMAC-384Kdf
2,971,866 UART: [kat] LMS
3,503,619 UART: [kat] --
3,508,183 UART: [cold-reset] ++
3,509,188 UART: [fht] FHT @ 0x50003400
3,521,957 UART: [idev] ++
3,522,591 UART: [idev] CDI.KEYID = 6
3,523,544 UART: [idev] SUBJECT.KEYID = 7
3,524,780 UART: [idev] UDS.KEYID = 0
3,525,676 ready_for_fw is high
3,525,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,990 UART: [idev] Erasing UDS.KEYID = 0
6,029,659 UART: [idev] Sha1 KeyId Algorithm
6,051,281 UART: [idev] --
6,056,520 UART: [ldev] ++
6,057,202 UART: [ldev] CDI.KEYID = 6
6,058,087 UART: [ldev] SUBJECT.KEYID = 5
6,059,303 UART: [ldev] AUTHORITY.KEYID = 7
6,060,532 UART: [ldev] FE.KEYID = 1
6,101,273 UART: [ldev] Erasing FE.KEYID = 1
8,606,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,165 UART: [ldev] --
10,412,694 UART: [fwproc] Wait for Commands...
10,415,755 UART: [fwproc] Recv command 0x46574c44
10,418,098 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,996 >>> mbox cmd response: success
14,678,042 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,680,451 UART: [afmc] ++
14,681,192 UART: [afmc] CDI.KEYID = 6
14,682,367 UART: [afmc] SUBJECT.KEYID = 7
14,683,845 UART: [afmc] AUTHORITY.KEYID = 5
17,216,524 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,757 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,831 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,002 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,134 UART: [afmc] --
19,011,514 UART: [cold-reset] --
19,014,615 UART: [state] Locking Datavault
19,020,883 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,073 UART: [state] Locking ICCM
19,024,901 UART: [exit] Launching FMC @ 0x40000130
19,033,565 UART:
19,033,800 UART: Running Caliptra FMC ...
19,034,902 UART:
19,035,061 UART: [state] CFI Enabled
19,096,796 UART: [fht] FMC Alias Private Key: 7
20,862,991 UART: [art] Extend RT PCRs Done
20,864,203 UART: [art] Lock RT PCRs Done
20,865,635 UART: [art] Populate DV Done
20,871,207 UART: [fht] FMC Alias Private Key: 7
20,872,685 UART: [art] Derive CDI
20,873,435 UART: [art] Store in slot 0x4
20,929,640 UART: [art] Derive Key Pair
20,930,679 UART: [art] Store priv key in slot 0x5
23,394,280 UART: [art] Derive Key Pair - Done
23,407,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,788 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,282 UART: [art] PUB.X = 83800214B170822D3E0BC71CD0C7A5D88F21F6808E2E2BEF810C5A7E39E7059C1A8D860E8FD55E70FDD24E42E7ADB63B
25,128,586 UART: [art] PUB.Y = 06D623B0DCB88EB8B242EA50CE50C89769EA32AB3CEC21C96CBFF2838B0D3D17119192296AAEE30195224CEEF2C600A0
25,135,813 UART: [art] SIG.R = C809B1B0C317613EDCDDA97614530D306751735CAEFB78D3690C27E117C880B67C3EEC1EA7D5F62863A36451FD814EED
25,143,259 UART: [art] SIG.S = 7CC8135D5811AF010B5B8EF18D4FB9ACA61FAF94451CD3A47AC1B853DDF5FB76C15C57FA6885F38A99681930F5CB6AE6
26,122,325 UART: Caliptra RT
26,123,031 UART: [state] CFI Enabled
26,303,948 UART: [rt] RT listening for mailbox commands...
26,317,588 >>> mbox cmd response: failed
26,317,985 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,347,749 UART: [rt]cmd =0x46505652, len=4
26,349,044 UART: [rt] FIPS Version
26,350,260 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,436,786 ready_for_fw is high
3,437,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,831,844 >>> mbox cmd response: success
14,833,199 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,108,640 UART:
19,109,030 UART: Running Caliptra FMC ...
19,110,180 UART:
19,110,342 UART: [state] CFI Enabled
19,177,990 UART: [fht] FMC Alias Private Key: 7
20,944,502 UART: [art] Extend RT PCRs Done
20,945,711 UART: [art] Lock RT PCRs Done
20,947,582 UART: [art] Populate DV Done
20,952,843 UART: [fht] FMC Alias Private Key: 7
20,954,547 UART: [art] Derive CDI
20,955,283 UART: [art] Store in slot 0x4
21,010,788 UART: [art] Derive Key Pair
21,011,834 UART: [art] Store priv key in slot 0x5
23,474,769 UART: [art] Derive Key Pair - Done
23,487,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,050 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,582 UART: [art] PUB.X = C6149140C8B44E837512766896CE55921D673FC88ABDE93F454D27092C81094B52F5F5713A158881AEC2ABF97FE31A98
25,208,850 UART: [art] PUB.Y = 776C53CAE8825F437466DC14036FC76E5C31E1121C44A4A04B5D613C5A857D48FDFF6CCD1998AF7FFB4142CBD0683587
25,216,105 UART: [art] SIG.R = C6B6D6E7157E070FB78138C9EFB1D242CE9DD7DB08D68CBF3EB23AD0739A2B770CB98B6A125C6EAD62CD78D801129F78
25,223,490 UART: [art] SIG.S = 2B57D4F960CD13AEC0E1BCBEF2B594083D4221CE3E964E25B8CBDFA4113A96C8F1D211C62EB39EFD6D073C6011709D71
26,202,422 UART: Caliptra RT
26,203,135 UART: [state] CFI Enabled
26,382,648 UART: [rt] RT listening for mailbox commands...
26,396,065 >>> mbox cmd response: failed
26,396,457 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,426,280 UART: [rt]cmd =0x46505652, len=4
26,427,560 UART: [rt] FIPS Version
26,428,622 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,450 UART:
192,835 UART: Running Caliptra ROM ...
193,972 UART:
603,401 UART: [state] CFI Enabled
616,193 UART: [state] LifecycleState = Unprovisioned
618,598 UART: [state] DebugLocked = No
620,132 UART: [state] WD Timer not started. Device not locked for debugging
625,395 UART: [kat] SHA2-256
815,272 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,073 UART: [kat] ++
826,616 UART: [kat] sha1
838,991 UART: [kat] SHA2-256
842,064 UART: [kat] SHA2-384
848,626 UART: [kat] SHA2-512-ACC
851,151 UART: [kat] ECC-384
3,292,538 UART: [kat] HMAC-384Kdf
3,305,772 UART: [kat] LMS
3,837,609 UART: [kat] --
3,842,171 UART: [cold-reset] ++
3,843,606 UART: [fht] FHT @ 0x50003400
3,854,746 UART: [idev] ++
3,855,511 UART: [idev] CDI.KEYID = 6
3,856,426 UART: [idev] SUBJECT.KEYID = 7
3,857,604 UART: [idev] UDS.KEYID = 0
3,858,530 ready_for_fw is high
3,858,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,502 UART: [idev] Erasing UDS.KEYID = 0
6,337,914 UART: [idev] Sha1 KeyId Algorithm
6,361,093 UART: [idev] --
6,365,153 UART: [ldev] ++
6,365,839 UART: [ldev] CDI.KEYID = 6
6,366,754 UART: [ldev] SUBJECT.KEYID = 5
6,367,917 UART: [ldev] AUTHORITY.KEYID = 7
6,369,147 UART: [ldev] FE.KEYID = 1
6,379,255 UART: [ldev] Erasing FE.KEYID = 1
8,854,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,365 UART: [ldev] --
10,649,663 UART: [fwproc] Wait for Commands...
10,651,370 UART: [fwproc] Recv command 0x46574c44
10,653,643 UART: [fwproc] Recv'd Img size: 118548 bytes
14,154,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,531 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,141 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,923,936 >>> mbox cmd response: success
14,925,000 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
14,928,767 UART: [afmc] ++
14,929,473 UART: [afmc] CDI.KEYID = 6
14,930,590 UART: [afmc] SUBJECT.KEYID = 7
14,932,138 UART: [afmc] AUTHORITY.KEYID = 5
17,435,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,930 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,228,631 UART: [afmc] --
19,231,970 UART: [cold-reset] --
19,235,192 UART: [state] Locking Datavault
19,240,235 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,500 UART: [state] Locking ICCM
19,244,243 UART: [exit] Launching FMC @ 0x40000130
19,252,877 UART:
19,253,116 UART: Running Caliptra FMC ...
19,254,222 UART:
19,254,383 UART: [state] CFI Enabled
19,262,294 UART: [fht] FMC Alias Private Key: 7
21,028,282 UART: [art] Extend RT PCRs Done
21,029,504 UART: [art] Lock RT PCRs Done
21,031,107 UART: [art] Populate DV Done
21,036,526 UART: [fht] FMC Alias Private Key: 7
21,038,179 UART: [art] Derive CDI
21,038,922 UART: [art] Store in slot 0x4
21,081,790 UART: [art] Derive Key Pair
21,082,834 UART: [art] Store priv key in slot 0x5
23,509,973 UART: [art] Derive Key Pair - Done
23,522,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,233 UART: [art] Erasing AUTHORITY.KEYID = 7
25,230,750 UART: [art] PUB.X = D1177702735F2E6FF739FD26D27ECD928C182DCEBA143BBEA02805639231B5A4FDB03E6739CE159AA973184EB0B02FA6
25,238,023 UART: [art] PUB.Y = D1ED2E22EE02674E1228BEB2FEB279C2EB3C6788937FCB0E5D08FC6B6E1AACC4DF7B40E1D98B7D7FC6C48C35E4C81007
25,245,284 UART: [art] SIG.R = 57C7A5B010262CF5717ED3524242F09AF25D44AD54EDD2B1B84E2A9B8D8079BBF96FEEDAA4C8D3C9BF2392EC534895A5
25,252,694 UART: [art] SIG.S = 3CC8902948799F710817BF5812D8790B83EC80235DCEB46D85102EAE1BB0307A435C362EB39022499F6AE1817D39956A
26,231,747 UART: Caliptra RT
26,232,445 UART: [state] CFI Enabled
26,365,694 UART: [rt] RT listening for mailbox commands...
26,379,216 >>> mbox cmd response: failed
26,379,607 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,409,104 UART: [rt]cmd =0x46505652, len=4
26,410,543 UART: [rt] FIPS Version
26,411,554 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,753,745 ready_for_fw is high
3,754,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,765 >>> mbox cmd response: success
15,048,150 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
19,302,071 UART:
19,302,467 UART: Running Caliptra FMC ...
19,303,585 UART:
19,303,743 UART: [state] CFI Enabled
19,311,711 UART: [fht] FMC Alias Private Key: 7
21,077,743 UART: [art] Extend RT PCRs Done
21,078,998 UART: [art] Lock RT PCRs Done
21,080,822 UART: [art] Populate DV Done
21,086,037 UART: [fht] FMC Alias Private Key: 7
21,087,705 UART: [art] Derive CDI
21,088,450 UART: [art] Store in slot 0x4
21,131,427 UART: [art] Derive Key Pair
21,132,469 UART: [art] Store priv key in slot 0x5
23,559,099 UART: [art] Derive Key Pair - Done
23,571,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,572 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,090 UART: [art] PUB.X = 076D7D6A127A25C6548BF2744D7BDB8B85F29C828230BA5770E5A06199B45C4750B3346F68B92C840136A9BB559B0620
25,286,313 UART: [art] PUB.Y = 22D676FC0EA87E843961E2694ACDD5ED5862A601665AE0F34ED99229B0D90911A02A0D056A36CB013F9EEA321EDA4281
25,293,528 UART: [art] SIG.R = 100F039BC7F6AA25547690F3F9E7C9B866B92C30F7B355C1C380D71B97FDED25362B1DC39DFEF756BD5C534AB3DF6C48
25,300,956 UART: [art] SIG.S = ABF0A45D55709A932D9525B971D19C5A410E8D374395A2BF2D42A6AD3C3AB6F430E8BD63E587C1218848367F4E1B8875
26,280,312 UART: Caliptra RT
26,281,015 UART: [state] CFI Enabled
26,414,318 UART: [rt] RT listening for mailbox commands...
26,428,081 >>> mbox cmd response: failed
26,428,485 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,458,203 UART: [rt]cmd =0x46505652, len=4
26,459,454 UART: [rt] FIPS Version
26,460,668 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,443 UART: [kat] SHA2-256
882,374 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,489 UART: [kat] ++
886,641 UART: [kat] sha1
890,915 UART: [kat] SHA2-256
892,853 UART: [kat] SHA2-384
895,706 UART: [kat] SHA2-512-ACC
897,607 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,247 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,380 UART: [idev] ++
1,479,548 UART: [idev] CDI.KEYID = 6
1,479,908 UART: [idev] SUBJECT.KEYID = 7
1,480,332 UART: [idev] UDS.KEYID = 0
1,480,677 ready_for_fw is high
1,480,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,350 UART: [idev] Erasing UDS.KEYID = 0
1,504,742 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,388 UART: [idev] --
1,514,419 UART: [ldev] ++
1,514,587 UART: [ldev] CDI.KEYID = 6
1,514,950 UART: [ldev] SUBJECT.KEYID = 5
1,515,376 UART: [ldev] AUTHORITY.KEYID = 7
1,515,839 UART: [ldev] FE.KEYID = 1
1,521,031 UART: [ldev] Erasing FE.KEYID = 1
1,546,610 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,184 UART: [ldev] --
1,585,695 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 118548 bytes
2,932,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,773 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,991 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,426 >>> mbox cmd response: success
3,131,426 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,132,584 UART: [afmc] ++
3,132,752 UART: [afmc] CDI.KEYID = 6
3,133,114 UART: [afmc] SUBJECT.KEYID = 7
3,133,539 UART: [afmc] AUTHORITY.KEYID = 5
3,168,908 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,338 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,118 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,827 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,710 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,393 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,041 UART: [afmc] --
3,212,159 UART: [cold-reset] --
3,212,993 UART: [state] Locking Datavault
3,214,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,874 UART: [state] Locking ICCM
3,215,522 UART: [exit] Launching FMC @ 0x40000130
3,220,852 UART:
3,220,868 UART: Running Caliptra FMC ...
3,221,276 UART:
3,221,330 UART: [state] CFI Enabled
3,231,570 UART: [fht] FMC Alias Private Key: 7
3,350,774 UART: [art] Extend RT PCRs Done
3,351,202 UART: [art] Lock RT PCRs Done
3,352,812 UART: [art] Populate DV Done
3,360,937 UART: [fht] FMC Alias Private Key: 7
3,361,985 UART: [art] Derive CDI
3,362,265 UART: [art] Store in slot 0x4
3,448,621 UART: [art] Derive Key Pair
3,448,981 UART: [art] Store priv key in slot 0x5
3,462,516 UART: [art] Derive Key Pair - Done
3,477,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,454 UART: [art] PUB.X = 1776C8A3C65E8DBE78ABA59500F433AEC7F557252DEA543F4BE91BE4AE3A2AAFA41ADD94EC5C254A95001A8296A82BB8
3,500,200 UART: [art] PUB.Y = 366E3DE2B22C2C24B8A08FA6803E1AE165C41D9307369F05925CCEC9C0F2C673A08DE6F31070C36EF8E92184C8BC8E04
3,507,149 UART: [art] SIG.R = 99FE6F70A84F4E236CA2FDB4D3C007C90369F8587A8D11B2E8F077819B85A030CFDDA5F979F543BDA7DFBD44612686A7
3,513,925 UART: [art] SIG.S = 17DC000F89F9E69BD7B0F316ECE3A39B91E0D049F9329AC968CE7564ABD16FE1DD55DE9980CFB287FCCAE67BAD30F1B7
3,537,570 UART: Caliptra RT
3,537,821 UART: [state] CFI Enabled
3,657,969 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,774 >>> mbox cmd response: failed
3,670,774 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,090 UART: [rt]cmd =0x46505652, len=4
3,700,750 UART: [rt] FIPS Version
3,701,893 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,057 ready_for_fw is high
1,362,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,408 >>> mbox cmd response: success
2,981,408 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,043,095 UART:
3,043,111 UART: Running Caliptra FMC ...
3,043,519 UART:
3,043,573 UART: [state] CFI Enabled
3,053,579 UART: [fht] FMC Alias Private Key: 7
3,172,549 UART: [art] Extend RT PCRs Done
3,172,977 UART: [art] Lock RT PCRs Done
3,174,207 UART: [art] Populate DV Done
3,182,654 UART: [fht] FMC Alias Private Key: 7
3,183,714 UART: [art] Derive CDI
3,183,994 UART: [art] Store in slot 0x4
3,269,890 UART: [art] Derive Key Pair
3,270,250 UART: [art] Store priv key in slot 0x5
3,283,397 UART: [art] Derive Key Pair - Done
3,298,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,887 UART: [art] PUB.X = 7D3F3D37DB1D3CCF7FA2DC96788FDDA19B7AB7FAD33B276572B72A45BBA43C4C8B63A187E061ADE922D6EB2B5D027CAD
3,320,682 UART: [art] PUB.Y = 87F07A307DF3DB001C765CB2B689C4E2606EF901BECF8761B8383E6758C6635841A1D05CABEDB63E73669402A5E70DB8
3,327,607 UART: [art] SIG.R = 3DA4571224B6D7B0A11846BA7695503982CC055B4FD1FA3BE8D2C20F0834590F3D9D235389CAA42669DEBE89778D9357
3,334,365 UART: [art] SIG.S = D78AE87454A80CDE05796A1E53B8C3017DB0CA8862CE3629EC94E07568A0E2C7D8DB1532FBEA991BCE50EE94869D2E3C
3,357,864 UART: Caliptra RT
3,358,115 UART: [state] CFI Enabled
3,478,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,052 >>> mbox cmd response: failed
3,491,052 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,400 UART: [rt]cmd =0x46505652, len=4
3,521,060 UART: [rt] FIPS Version
3,522,093 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,914 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
890,848 UART: [kat] SHA2-256
892,786 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
903,011 UART: [kat] HMAC-384Kdf
907,721 UART: [kat] LMS
1,475,917 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,340 UART: [fht] Storing FHT @ 0x50003400
1,480,165 UART: [idev] ++
1,480,333 UART: [idev] CDI.KEYID = 6
1,480,693 UART: [idev] SUBJECT.KEYID = 7
1,481,117 UART: [idev] UDS.KEYID = 0
1,481,462 ready_for_fw is high
1,481,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,795 UART: [idev] Erasing UDS.KEYID = 0
1,505,665 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,535 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,212 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,961 UART: [ldev] --
1,586,394 UART: [fwproc] Waiting for Commands...
1,587,229 UART: [fwproc] Received command 0x46574c44
1,588,020 UART: [fwproc] Received Image of size 118548 bytes
2,933,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,036 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,381 >>> mbox cmd response: success
3,132,381 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,133,423 UART: [afmc] ++
3,133,591 UART: [afmc] CDI.KEYID = 6
3,133,953 UART: [afmc] SUBJECT.KEYID = 7
3,134,378 UART: [afmc] AUTHORITY.KEYID = 5
3,169,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,131 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,911 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,503 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,186 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,190 UART: [afmc] --
3,213,250 UART: [cold-reset] --
3,213,962 UART: [state] Locking Datavault
3,215,283 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,887 UART: [state] Locking ICCM
3,216,457 UART: [exit] Launching FMC @ 0x40000130
3,221,787 UART:
3,221,803 UART: Running Caliptra FMC ...
3,222,211 UART:
3,222,354 UART: [state] CFI Enabled
3,233,306 UART: [fht] FMC Alias Private Key: 7
3,352,032 UART: [art] Extend RT PCRs Done
3,352,460 UART: [art] Lock RT PCRs Done
3,353,854 UART: [art] Populate DV Done
3,361,825 UART: [fht] FMC Alias Private Key: 7
3,362,823 UART: [art] Derive CDI
3,363,103 UART: [art] Store in slot 0x4
3,448,941 UART: [art] Derive Key Pair
3,449,301 UART: [art] Store priv key in slot 0x5
3,463,080 UART: [art] Derive Key Pair - Done
3,477,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,801 UART: [art] PUB.X = 8A04C9C16B2640EE3068C48E194A6D1FF271665AAC92CE795EC47E2D8636C93DC3D38C2F966E6F27DA1D5A277A56B805
3,500,573 UART: [art] PUB.Y = 0D2317D3147B6926D1276B04850B6EC1C0FE0F3EF8C51DBD89465A9478EBF723E97FDC5D43CC17181D061AEF1D8B807F
3,507,518 UART: [art] SIG.R = 7B9F0AD0197BA6544FA6A457DE2566F9D9A4F16F6A362CD74FA7CA8EA74AC9381AAA5BDF315180AB5543F8AB97772503
3,514,296 UART: [art] SIG.S = 41651027DC1D0010443D7C37CB6E22363E92CE4F78E24D8DBAF6EED7137CD8DEFF85001A34C0F4947EFB17FCF95E4A9B
3,538,472 UART: Caliptra RT
3,538,815 UART: [state] CFI Enabled
3,659,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,671,961 >>> mbox cmd response: failed
3,671,961 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,481 UART: [rt]cmd =0x46505652, len=4
3,702,141 UART: [rt] FIPS Version
3,703,250 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,094 ready_for_fw is high
1,363,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,255 >>> mbox cmd response: success
2,983,255 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
3,044,352 UART:
3,044,368 UART: Running Caliptra FMC ...
3,044,776 UART:
3,044,919 UART: [state] CFI Enabled
3,055,875 UART: [fht] FMC Alias Private Key: 7
3,175,215 UART: [art] Extend RT PCRs Done
3,175,643 UART: [art] Lock RT PCRs Done
3,177,271 UART: [art] Populate DV Done
3,185,686 UART: [fht] FMC Alias Private Key: 7
3,186,780 UART: [art] Derive CDI
3,187,060 UART: [art] Store in slot 0x4
3,272,846 UART: [art] Derive Key Pair
3,273,206 UART: [art] Store priv key in slot 0x5
3,286,343 UART: [art] Derive Key Pair - Done
3,301,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,572 UART: [art] PUB.X = 9042B7A8EE97D5164923956C93ACEA97731EB8E9805728539EF420D0C00BF2C71D800EE343DA35F3EC18BC4D7206149F
3,324,335 UART: [art] PUB.Y = 1B646D5DD60EA0C78415A9129CED8E936C022C0BD8349E47C87D3A91F9FD62F14AAF9D4BB458FDCAE1C23E36B4C467B9
3,331,294 UART: [art] SIG.R = 24D44AE02C3E337C6979CDD720DAF0584DED38D336D238C9512805097E8AC257F46FF469CC9DA4EE59BE9B49743574F8
3,338,064 UART: [art] SIG.S = 79D2891CAD25649531CED4FCB765A0C84FBB94C584F287597961C1F47A9BC397A7E99D4D32778E6071CF65A7BDB1CE76
3,361,480 UART: Caliptra RT
3,361,823 UART: [state] CFI Enabled
3,481,714 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,285 >>> mbox cmd response: failed
3,494,285 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,471 UART: [rt]cmd =0x46505652, len=4
3,524,131 UART: [rt] FIPS Version
3,525,104 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,469 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
891,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,246 UART: [kat] ++
895,398 UART: [kat] sha1
899,820 UART: [kat] SHA2-256
901,760 UART: [kat] SHA2-384
904,419 UART: [kat] SHA2-512-ACC
906,320 UART: [kat] ECC-384
915,895 UART: [kat] HMAC-384Kdf
920,453 UART: [kat] LMS
1,168,765 UART: [kat] --
1,169,612 UART: [cold-reset] ++
1,170,134 UART: [fht] FHT @ 0x50003400
1,172,788 UART: [idev] ++
1,172,956 UART: [idev] CDI.KEYID = 6
1,173,317 UART: [idev] SUBJECT.KEYID = 7
1,173,742 UART: [idev] UDS.KEYID = 0
1,174,088 ready_for_fw is high
1,174,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,198,829 UART: [idev] Sha1 KeyId Algorithm
1,207,759 UART: [idev] --
1,208,850 UART: [ldev] ++
1,209,018 UART: [ldev] CDI.KEYID = 6
1,209,382 UART: [ldev] SUBJECT.KEYID = 5
1,209,809 UART: [ldev] AUTHORITY.KEYID = 7
1,210,272 UART: [ldev] FE.KEYID = 1
1,215,490 UART: [ldev] Erasing FE.KEYID = 1
1,241,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,621 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,001 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,385 >>> mbox cmd response: success
2,824,385 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,825,437 UART: [afmc] ++
2,825,605 UART: [afmc] CDI.KEYID = 6
2,825,968 UART: [afmc] SUBJECT.KEYID = 7
2,826,394 UART: [afmc] AUTHORITY.KEYID = 5
2,861,319 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,481 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,191 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,072 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,773 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,396 UART: [afmc] --
2,904,449 UART: [cold-reset] --
2,905,417 UART: [state] Locking Datavault
2,906,340 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,944 UART: [state] Locking ICCM
2,907,572 UART: [exit] Launching FMC @ 0x40000130
2,912,902 UART:
2,912,918 UART: Running Caliptra FMC ...
2,913,326 UART:
2,913,380 UART: [state] CFI Enabled
2,924,102 UART: [fht] FMC Alias Private Key: 7
3,042,794 UART: [art] Extend RT PCRs Done
3,043,222 UART: [art] Lock RT PCRs Done
3,044,942 UART: [art] Populate DV Done
3,053,419 UART: [fht] FMC Alias Private Key: 7
3,054,419 UART: [art] Derive CDI
3,054,699 UART: [art] Store in slot 0x4
3,140,512 UART: [art] Derive Key Pair
3,140,872 UART: [art] Store priv key in slot 0x5
3,154,016 UART: [art] Derive Key Pair - Done
3,168,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,373 UART: [art] PUB.X = 686ACDEC24EA641C5F3F78DC263ADD230CCD38725E25DA9D35BABAF98C5D121B372D16CB370084426975587DADF78998
3,192,130 UART: [art] PUB.Y = 20AED351EBA99279CD7A3DC81A657E49CEF6B956258412C8FF60E2BB8D0191AA74483C8A724209CC64B7DBA0F58387CD
3,199,086 UART: [art] SIG.R = 634E370B023F15AEA0964E629879768D562F05D4B4CBCA9670519290F7BE19F7F08B26418528218C386B84496739CB58
3,205,835 UART: [art] SIG.S = 066697F23EA82FD85F9268FD10A73A583F47EB6A54D3F48DBACF6579D1143525C5F1181348A8D95D8559D8970A6C2994
3,229,749 UART: Caliptra RT
3,230,000 UART: [state] CFI Enabled
3,350,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,165 >>> mbox cmd response: failed
3,363,165 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,527 UART: [rt]cmd =0x46505652, len=4
3,393,187 UART: [rt] FIPS Version
3,394,102 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,248 ready_for_fw is high
1,059,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,568 >>> mbox cmd response: success
2,679,568 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,741,829 UART:
2,741,845 UART: Running Caliptra FMC ...
2,742,253 UART:
2,742,307 UART: [state] CFI Enabled
2,752,739 UART: [fht] FMC Alias Private Key: 7
2,871,687 UART: [art] Extend RT PCRs Done
2,872,115 UART: [art] Lock RT PCRs Done
2,873,649 UART: [art] Populate DV Done
2,882,096 UART: [fht] FMC Alias Private Key: 7
2,883,230 UART: [art] Derive CDI
2,883,510 UART: [art] Store in slot 0x4
2,968,943 UART: [art] Derive Key Pair
2,969,303 UART: [art] Store priv key in slot 0x5
2,981,917 UART: [art] Derive Key Pair - Done
2,996,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,002 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,767 UART: [art] PUB.X = C1E116342B92AEA81BCB4CD117E58B87343DB9D42BA140576C1335BFDFA0B79D0C9B8F877F0CA03C72CFAC1721DDB0B9
3,019,551 UART: [art] PUB.Y = 4258ED035440C6C19000FFD9CE6C997EF9EF42B57CD8105A9AF2B48CFDC13240CBFEA43EC1A0F04E3FF1E178505C5D97
3,026,494 UART: [art] SIG.R = 3EE04F842252F4FDA08DBAC260C0CCB1DC2ECB017FCD901BA68776A0FFD7777750AE7496A91CC526FF3B89E5C13CC8A5
3,033,283 UART: [art] SIG.S = 899A7C12824DEE387313C1E0B205BEABE1A69AC1F9C971B730BA57F52809B53BE6A6C7AB262BB2EC7C6B0BBCB992F521
3,057,126 UART: Caliptra RT
3,057,377 UART: [state] CFI Enabled
3,176,974 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,659 >>> mbox cmd response: failed
3,189,659 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,807 UART: [rt]cmd =0x46505652, len=4
3,219,467 UART: [rt] FIPS Version
3,220,382 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,141 UART: [state] LifecycleState = Unprovisioned
85,796 UART: [state] DebugLocked = No
86,454 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,781 UART: [kat] SHA2-256
901,721 UART: [kat] SHA2-384
904,624 UART: [kat] SHA2-512-ACC
906,525 UART: [kat] ECC-384
916,474 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,170,975 UART: [fht] FHT @ 0x50003400
1,173,627 UART: [idev] ++
1,173,795 UART: [idev] CDI.KEYID = 6
1,174,156 UART: [idev] SUBJECT.KEYID = 7
1,174,581 UART: [idev] UDS.KEYID = 0
1,174,927 ready_for_fw is high
1,174,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,392 UART: [idev] Erasing UDS.KEYID = 0
1,199,944 UART: [idev] Sha1 KeyId Algorithm
1,209,036 UART: [idev] --
1,210,227 UART: [ldev] ++
1,210,395 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,621 UART: [ldev] --
1,282,884 UART: [fwproc] Wait for Commands...
1,283,603 UART: [fwproc] Recv command 0x46574c44
1,284,336 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,898 >>> mbox cmd response: success
2,826,898 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,828,104 UART: [afmc] ++
2,828,272 UART: [afmc] CDI.KEYID = 6
2,828,635 UART: [afmc] SUBJECT.KEYID = 7
2,829,061 UART: [afmc] AUTHORITY.KEYID = 5
2,864,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,719 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,420 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,159 UART: [afmc] --
2,908,214 UART: [cold-reset] --
2,909,142 UART: [state] Locking Datavault
2,910,231 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,835 UART: [state] Locking ICCM
2,911,263 UART: [exit] Launching FMC @ 0x40000130
2,916,593 UART:
2,916,609 UART: Running Caliptra FMC ...
2,917,017 UART:
2,917,160 UART: [state] CFI Enabled
2,927,480 UART: [fht] FMC Alias Private Key: 7
3,046,370 UART: [art] Extend RT PCRs Done
3,046,798 UART: [art] Lock RT PCRs Done
3,048,264 UART: [art] Populate DV Done
3,056,495 UART: [fht] FMC Alias Private Key: 7
3,057,619 UART: [art] Derive CDI
3,057,899 UART: [art] Store in slot 0x4
3,143,562 UART: [art] Derive Key Pair
3,143,922 UART: [art] Store priv key in slot 0x5
3,157,192 UART: [art] Derive Key Pair - Done
3,171,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,733 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,498 UART: [art] PUB.X = 952F03903A968A124633231AAE55F7DD986F07E3C814153CBAB5D42B79F9707F17D105C19D3F09C7882F5466A553B197
3,195,250 UART: [art] PUB.Y = 895590BBADA96BDD091346F2CC32A467E6E930B2859A1E29ED76C8146603E6273A3F50CB883FB3BCCE646F699CB1B9F4
3,202,204 UART: [art] SIG.R = BBB60D18D964603665ED217EB42349B042ED3F6ADC6AD956E5DFEED4D83BE08FD735E787FFC8B40F1F5B4CE2983BF624
3,208,988 UART: [art] SIG.S = 121544F96552B2D4643ED7580E49004AA155F4C6062BFDE7C1A73DAC2F8691BD5799A12EFE5F72211245FEFD6C23C77F
3,232,602 UART: Caliptra RT
3,232,945 UART: [state] CFI Enabled
3,352,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,365,527 >>> mbox cmd response: failed
3,365,527 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,741 UART: [rt]cmd =0x46505652, len=4
3,395,401 UART: [rt] FIPS Version
3,396,318 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,355 ready_for_fw is high
1,059,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,225 >>> mbox cmd response: success
2,678,225 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,740,250 UART:
2,740,266 UART: Running Caliptra FMC ...
2,740,674 UART:
2,740,817 UART: [state] CFI Enabled
2,751,325 UART: [fht] FMC Alias Private Key: 7
2,869,603 UART: [art] Extend RT PCRs Done
2,870,031 UART: [art] Lock RT PCRs Done
2,871,417 UART: [art] Populate DV Done
2,879,604 UART: [fht] FMC Alias Private Key: 7
2,880,760 UART: [art] Derive CDI
2,881,040 UART: [art] Store in slot 0x4
2,967,245 UART: [art] Derive Key Pair
2,967,605 UART: [art] Store priv key in slot 0x5
2,981,167 UART: [art] Derive Key Pair - Done
2,996,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,344 UART: [art] PUB.X = 1FDA179F5A0D6FC3B7320D1BEAB0EED759DCA734958127D89F34D7B9D6D1AADF1BD65DF98FEB2654DFBB393E2D5BE52A
3,019,138 UART: [art] PUB.Y = 1254C11EDEE1ADCE02A37F8EE11D78732CD78CBA232AAC2DB521D24C5D7151984615FFF9BCE4E7FD8838BE5531B7DB91
3,026,105 UART: [art] SIG.R = 05D9D7FC8E26EB72BB4A2539F10A0818D07549BC1F26AB2F9CDF3183CDCC8007FE413E2C2AD10B6F252508FAAE353C75
3,032,873 UART: [art] SIG.S = 5226C7E80EC064274FD2D1ACD001C458EDCBCA9074E4C3A7EDBCFAFE78D3416BB951B29ABD67CEA3DC78AC3B75AD9DED
3,056,693 UART: Caliptra RT
3,057,036 UART: [state] CFI Enabled
3,176,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,188,713 >>> mbox cmd response: failed
3,188,713 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,059 UART: [rt]cmd =0x46505652, len=4
3,218,719 UART: [rt] FIPS Version
3,219,760 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,806 UART: [kat] SHA2-256
893,456 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,581 UART: [kat] ++
897,733 UART: [kat] sha1
901,749 UART: [kat] SHA2-256
903,689 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
918,242 UART: [kat] HMAC-384Kdf
922,688 UART: [kat] LMS
1,171,016 UART: [kat] --
1,171,927 UART: [cold-reset] ++
1,172,471 UART: [fht] FHT @ 0x50003400
1,175,210 UART: [idev] ++
1,175,378 UART: [idev] CDI.KEYID = 6
1,175,738 UART: [idev] SUBJECT.KEYID = 7
1,176,162 UART: [idev] UDS.KEYID = 0
1,176,507 ready_for_fw is high
1,176,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,518 UART: [idev] Erasing UDS.KEYID = 0
1,201,211 UART: [idev] Sha1 KeyId Algorithm
1,209,769 UART: [idev] --
1,210,849 UART: [ldev] ++
1,211,017 UART: [ldev] CDI.KEYID = 6
1,211,380 UART: [ldev] SUBJECT.KEYID = 5
1,211,806 UART: [ldev] AUTHORITY.KEYID = 7
1,212,269 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,762 UART: [fwproc] Wait for Commands...
1,283,334 UART: [fwproc] Recv command 0x46574c44
1,284,062 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,504 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,674 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,953 >>> mbox cmd response: success
2,826,953 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,827,971 UART: [afmc] ++
2,828,139 UART: [afmc] CDI.KEYID = 6
2,828,501 UART: [afmc] SUBJECT.KEYID = 7
2,828,926 UART: [afmc] AUTHORITY.KEYID = 5
2,864,547 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,774 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,483 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,067 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,045 UART: [afmc] --
2,908,077 UART: [cold-reset] --
2,909,029 UART: [state] Locking Datavault
2,910,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,016 UART: [state] Locking ICCM
2,911,638 UART: [exit] Launching FMC @ 0x40000130
2,916,968 UART:
2,916,984 UART: Running Caliptra FMC ...
2,917,392 UART:
2,917,446 UART: [state] CFI Enabled
2,927,366 UART: [fht] FMC Alias Private Key: 7
3,046,822 UART: [art] Extend RT PCRs Done
3,047,250 UART: [art] Lock RT PCRs Done
3,048,812 UART: [art] Populate DV Done
3,057,133 UART: [fht] FMC Alias Private Key: 7
3,058,157 UART: [art] Derive CDI
3,058,437 UART: [art] Store in slot 0x4
3,144,184 UART: [art] Derive Key Pair
3,144,544 UART: [art] Store priv key in slot 0x5
3,158,026 UART: [art] Derive Key Pair - Done
3,172,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,394 UART: [art] PUB.X = E4C4E85CC8C9159A479D3AABCC0A04A28E8E673D5A29D4D2B3FD606F79FCBDB7ADD07124DB9ED100E7FE218F5057180C
3,196,155 UART: [art] PUB.Y = AA50ECFA91A95C07A6F89F21C5683CF8DE812B5BA22E50CD7BC22225F7025DE5ED133933A00972E8946F703332DCBA26
3,203,106 UART: [art] SIG.R = FD0BE6408E168248EDC8DEDFD1A8E9D6C4356645AA58CFFF6ED09E08ACB6D337D1C4729B95A09C8D647E2707DC0BE9E0
3,209,886 UART: [art] SIG.S = 8F5DD2F91ABE83258C0A76F40170E37F788F39DDDF69A8BEBBE8DB386A098CAE97F0F3093182AF846B281E2E93DF4DB7
3,233,554 UART: Caliptra RT
3,233,805 UART: [state] CFI Enabled
3,353,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,200 >>> mbox cmd response: failed
3,366,200 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,638 UART: [rt]cmd =0x46505652, len=4
3,396,298 UART: [rt] FIPS Version
3,397,411 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,085 ready_for_fw is high
1,061,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,256 >>> mbox cmd response: success
2,679,256 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,741,613 UART:
2,741,629 UART: Running Caliptra FMC ...
2,742,037 UART:
2,742,091 UART: [state] CFI Enabled
2,752,483 UART: [fht] FMC Alias Private Key: 7
2,871,429 UART: [art] Extend RT PCRs Done
2,871,857 UART: [art] Lock RT PCRs Done
2,873,451 UART: [art] Populate DV Done
2,881,676 UART: [fht] FMC Alias Private Key: 7
2,882,604 UART: [art] Derive CDI
2,882,884 UART: [art] Store in slot 0x4
2,968,807 UART: [art] Derive Key Pair
2,969,167 UART: [art] Store priv key in slot 0x5
2,982,027 UART: [art] Derive Key Pair - Done
2,996,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,593 UART: [art] PUB.X = E1AE4F63536B7D8A5E538716689858F44C91BD29A67E9E897F9C6EFBDE2C132ED85478FBD7588247BB3D96A2A62502E1
3,020,366 UART: [art] PUB.Y = 4D02E2778A2726E600C30E44AE1910B1747FEEFCFB3ECBC629CB72DF5B4DAD7D9868B0D57E591B58FF9083E7020002A3
3,027,272 UART: [art] SIG.R = 4DD3D4C49B4DDB14D9347904D1A7C15F136A11690B518A0727FD619EAEAFB9EC22D480D194C68CCB623984BD357ED2BA
3,034,047 UART: [art] SIG.S = 4EE0D6DA42FB7EAFFD558D6A8D4D9F8E6101833D33E49E30BA1DF13D21DF95A82F18101913E1F32056AE3510A1840E29
3,057,391 UART: Caliptra RT
3,057,642 UART: [state] CFI Enabled
3,176,740 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,189,465 >>> mbox cmd response: failed
3,189,465 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,031 UART: [rt]cmd =0x46505652, len=4
3,219,691 UART: [rt] FIPS Version
3,220,912 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,242 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
893,121 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,246 UART: [kat] ++
897,398 UART: [kat] sha1
901,684 UART: [kat] SHA2-256
903,624 UART: [kat] SHA2-384
906,379 UART: [kat] SHA2-512-ACC
908,280 UART: [kat] ECC-384
918,199 UART: [kat] HMAC-384Kdf
922,639 UART: [kat] LMS
1,170,967 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,424 UART: [fht] FHT @ 0x50003400
1,175,209 UART: [idev] ++
1,175,377 UART: [idev] CDI.KEYID = 6
1,175,737 UART: [idev] SUBJECT.KEYID = 7
1,176,161 UART: [idev] UDS.KEYID = 0
1,176,506 ready_for_fw is high
1,176,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,225 UART: [idev] Erasing UDS.KEYID = 0
1,201,042 UART: [idev] Sha1 KeyId Algorithm
1,209,652 UART: [idev] --
1,210,528 UART: [ldev] ++
1,210,696 UART: [ldev] CDI.KEYID = 6
1,211,059 UART: [ldev] SUBJECT.KEYID = 5
1,211,485 UART: [ldev] AUTHORITY.KEYID = 7
1,211,948 UART: [ldev] FE.KEYID = 1
1,216,998 UART: [ldev] Erasing FE.KEYID = 1
1,243,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,120 UART: [ldev] --
1,283,621 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,415 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,752 >>> mbox cmd response: success
2,827,752 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,828,900 UART: [afmc] ++
2,829,068 UART: [afmc] CDI.KEYID = 6
2,829,430 UART: [afmc] SUBJECT.KEYID = 7
2,829,855 UART: [afmc] AUTHORITY.KEYID = 5
2,864,848 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,229 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,977 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,569 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,210 UART: [afmc] --
2,908,254 UART: [cold-reset] --
2,908,878 UART: [state] Locking Datavault
2,910,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,781 UART: [state] Locking ICCM
2,911,259 UART: [exit] Launching FMC @ 0x40000130
2,916,589 UART:
2,916,605 UART: Running Caliptra FMC ...
2,917,013 UART:
2,917,156 UART: [state] CFI Enabled
2,927,652 UART: [fht] FMC Alias Private Key: 7
3,045,684 UART: [art] Extend RT PCRs Done
3,046,112 UART: [art] Lock RT PCRs Done
3,047,458 UART: [art] Populate DV Done
3,055,819 UART: [fht] FMC Alias Private Key: 7
3,056,851 UART: [art] Derive CDI
3,057,131 UART: [art] Store in slot 0x4
3,143,156 UART: [art] Derive Key Pair
3,143,516 UART: [art] Store priv key in slot 0x5
3,156,848 UART: [art] Derive Key Pair - Done
3,171,830 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,216 UART: [art] PUB.X = 9BE8BBAE207FBA9547D08AE236B0ED31446118D2AA6F6E7477B6D732D52E93462212A476C42D0452273B07ABD99C9606
3,194,979 UART: [art] PUB.Y = 8102470A79B63EE5CD82DCE05E2E6CF1AC52C80B6CC3B905EA45089A54D1C65DB43F0832C8DF08B836F3AC32FFBA633E
3,201,926 UART: [art] SIG.R = 5EF41A1CE233963D1DA150A742EF1235CD90E34390875E87E1B224A451D98E4CCD8BCFEFED6509B2C4DC257182A88A07
3,208,700 UART: [art] SIG.S = 1B3BC4F29EAB131141B53B741626B15593BB1AF594901A61059DCFF6531FD004F75318EC27E3F86E9466D15CB807927D
3,232,185 UART: Caliptra RT
3,232,528 UART: [state] CFI Enabled
3,351,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,145 >>> mbox cmd response: failed
3,364,145 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,617 UART: [rt]cmd =0x46505652, len=4
3,394,277 UART: [rt] FIPS Version
3,395,100 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,138 ready_for_fw is high
1,061,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,011 >>> mbox cmd response: success
2,680,011 <<< Executing mbox cmd 0xffffffff (0 bytes) from SoC
2,741,160 UART:
2,741,176 UART: Running Caliptra FMC ...
2,741,584 UART:
2,741,727 UART: [state] CFI Enabled
2,751,963 UART: [fht] FMC Alias Private Key: 7
2,871,043 UART: [art] Extend RT PCRs Done
2,871,471 UART: [art] Lock RT PCRs Done
2,873,185 UART: [art] Populate DV Done
2,881,260 UART: [fht] FMC Alias Private Key: 7
2,882,424 UART: [art] Derive CDI
2,882,704 UART: [art] Store in slot 0x4
2,968,949 UART: [art] Derive Key Pair
2,969,309 UART: [art] Store priv key in slot 0x5
2,981,971 UART: [art] Derive Key Pair - Done
2,996,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,411 UART: [art] PUB.X = 1E244CA666D35B0A99E8F79DAE20C4ABADEFD673D9AD81AA79F02994A9389F4A8292E6882229D05BF718AE2572876D8A
3,020,188 UART: [art] PUB.Y = B7926EE9C9A08DB20D2EF236CF14B1DDD3FA36B6F466FB376B84FC1AAB79380C59774A75D3004DD47452EAA8139FBA50
3,027,126 UART: [art] SIG.R = 6B88866339DCA4DA4460BA0E5EF2C51D15408440023617409406D6101F94340B5E044BAF192FB11536DEECDC96EAC549
3,033,881 UART: [art] SIG.S = 04D9410BCFDB744869D8864EBF584024D9B1613C63E4BABECCC22FE6270232A51C9B50E4BBC8822652326D0DAE2C243D
3,057,975 UART: Caliptra RT
3,058,318 UART: [state] CFI Enabled
3,178,080 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,190,651 >>> mbox cmd response: failed
3,190,651 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,041 UART: [rt]cmd =0x46505652, len=4
3,220,701 UART: [rt] FIPS Version
3,221,742 >>> mbox cmd response data (36 bytes)
test test_mailbox::test_error_cleared ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,008 UART:
192,395 UART: Running Caliptra ROM ...
193,489 UART:
193,633 UART: [state] CFI Enabled
262,612 UART: [state] LifecycleState = Unprovisioned
264,634 UART: [state] DebugLocked = No
265,926 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,158 UART: [kat] SHA2-256
439,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,365 UART: [kat] ++
450,844 UART: [kat] sha1
462,713 UART: [kat] SHA2-256
465,439 UART: [kat] SHA2-384
470,646 UART: [kat] SHA2-512-ACC
473,010 UART: [kat] ECC-384
2,769,625 UART: [kat] HMAC-384Kdf
2,800,402 UART: [kat] LMS
3,990,679 UART: [kat] --
3,996,331 UART: [cold-reset] ++
3,997,840 UART: [fht] Storing FHT @ 0x50003400
4,010,530 UART: [idev] ++
4,011,174 UART: [idev] CDI.KEYID = 6
4,012,063 UART: [idev] SUBJECT.KEYID = 7
4,013,310 UART: [idev] UDS.KEYID = 0
4,014,270 ready_for_fw is high
4,014,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,539 UART: [idev] Erasing UDS.KEYID = 0
7,347,008 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,602 UART: [idev] --
7,372,272 UART: [ldev] ++
7,372,848 UART: [ldev] CDI.KEYID = 6
7,373,813 UART: [ldev] SUBJECT.KEYID = 5
7,375,026 UART: [ldev] AUTHORITY.KEYID = 7
7,376,431 UART: [ldev] FE.KEYID = 1
7,422,057 UART: [ldev] Erasing FE.KEYID = 1
10,757,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,355 UART: [ldev] --
13,137,754 UART: [fwproc] Waiting for Commands...
13,141,078 UART: [fwproc] Received command 0x46574c44
13,143,269 UART: [fwproc] Received Image of size 118548 bytes
17,246,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,157 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,375 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,729,457 >>> mbox cmd response: success
17,730,507 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,734,282 UART: [afmc] ++
17,734,875 UART: [afmc] CDI.KEYID = 6
17,735,753 UART: [afmc] SUBJECT.KEYID = 7
17,737,024 UART: [afmc] AUTHORITY.KEYID = 5
21,094,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,935 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,374 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,690 UART: [afmc] --
23,464,270 UART: [cold-reset] --
23,468,839 UART: [state] Locking Datavault
23,473,651 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,401 UART: [state] Locking ICCM
23,478,193 UART: [exit] Launching FMC @ 0x40000130
23,486,603 UART:
23,486,846 UART: Running Caliptra FMC ...
23,487,953 UART:
23,488,107 UART: [state] CFI Enabled
23,553,963 UART: [fht] FMC Alias Private Key: 7
25,893,680 UART: [art] Extend RT PCRs Done
25,894,899 UART: [art] Lock RT PCRs Done
25,896,283 UART: [art] Populate DV Done
25,901,428 UART: [fht] FMC Alias Private Key: 7
25,902,962 UART: [art] Derive CDI
25,903,696 UART: [art] Store in slot 0x4
25,962,740 UART: [art] Derive Key Pair
25,963,773 UART: [art] Store priv key in slot 0x5
29,256,984 UART: [art] Derive Key Pair - Done
29,269,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,698 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,222 UART: [art] PUB.X = 895B58E3BBA0EEE1F94A4081895288464D3E186AF71A794CAFF2B72EFE919F07E11B5529B38B0A360C2A516ADD30BD06
31,567,464 UART: [art] PUB.Y = 5D60EB9978117B826A21B20ED410224E1A0EC692549E9341A667A78E1216E2AD03309D8FE3E0642DD483786D96D9F1B9
31,574,690 UART: [art] SIG.R = 655EE72C65C84A763E2674462388651A8C154CEC8244CF8CB5F69D8A6B249F9A7E37722BA8AF2F1C201B33018C58F94F
31,582,081 UART: [art] SIG.S = 831CF8C92C696718C5D5DC5131D69C61A991C5795FC93B24AA21D8757A8F760DD5E59C4C9D8AC393D494DAD759DA4C13
32,887,046 UART: Caliptra RT
32,887,765 UART: [state] CFI Enabled
33,064,799 UART: [rt] RT listening for mailbox commands...
33,067,478 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,785,505 ready_for_fw is high
3,786,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,927,019 >>> mbox cmd response: success
17,928,275 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,607,305 UART:
23,607,714 UART: Running Caliptra FMC ...
23,608,830 UART:
23,608,983 UART: [state] CFI Enabled
23,678,841 UART: [fht] FMC Alias Private Key: 7
26,019,185 UART: [art] Extend RT PCRs Done
26,020,418 UART: [art] Lock RT PCRs Done
26,022,256 UART: [art] Populate DV Done
26,027,450 UART: [fht] FMC Alias Private Key: 7
26,029,067 UART: [art] Derive CDI
26,029,894 UART: [art] Store in slot 0x4
26,087,454 UART: [art] Derive Key Pair
26,088,455 UART: [art] Store priv key in slot 0x5
29,381,142 UART: [art] Derive Key Pair - Done
29,394,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,683,544 UART: [art] Erasing AUTHORITY.KEYID = 7
31,685,052 UART: [art] PUB.X = 7F81ADC6C107A1C15E373B65E9C287A61ABF02025867D6066FD60021362FB8E03572F8F9F16310BD3128F954D8E7E570
31,692,305 UART: [art] PUB.Y = 60E20969608176402CE2F6B9415666AF6BB0E9567C77866764B037D3D9E655104FFB625703F1F16E5FDEE901461C0575
31,699,494 UART: [art] SIG.R = 01038D760F222F11213CCF8A0DE9BB595A0DE4BB0B6138BB32EEE1989693561A2851C98732BEE5DF603E9D1525F12CBC
31,706,917 UART: [art] SIG.S = D80E3D5A15DAFFEB04FA116AEB8C64EDC13BA9C541B79A97FD0EC3620C494013DB2EB329C0F1C8CBE7E9D21EDB7C2B7B
33,011,810 UART: Caliptra RT
33,012,528 UART: [state] CFI Enabled
33,190,266 UART: [rt] RT listening for mailbox commands...
33,192,693 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,376 UART:
192,724 UART: Running Caliptra ROM ...
194,026 UART:
603,477 UART: [state] CFI Enabled
620,058 UART: [state] LifecycleState = Unprovisioned
622,008 UART: [state] DebugLocked = No
624,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,104 UART: [kat] SHA2-256
798,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,363 UART: [kat] ++
809,892 UART: [kat] sha1
820,193 UART: [kat] SHA2-256
822,909 UART: [kat] SHA2-384
827,575 UART: [kat] SHA2-512-ACC
829,943 UART: [kat] ECC-384
3,114,041 UART: [kat] HMAC-384Kdf
3,126,250 UART: [kat] LMS
4,316,416 UART: [kat] --
4,319,344 UART: [cold-reset] ++
4,321,833 UART: [fht] Storing FHT @ 0x50003400
4,332,447 UART: [idev] ++
4,333,000 UART: [idev] CDI.KEYID = 6
4,334,030 UART: [idev] SUBJECT.KEYID = 7
4,335,197 UART: [idev] UDS.KEYID = 0
4,336,277 ready_for_fw is high
4,336,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,446 UART: [idev] Erasing UDS.KEYID = 0
7,625,463 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,366 UART: [idev] --
7,649,756 UART: [ldev] ++
7,650,316 UART: [ldev] CDI.KEYID = 6
7,651,245 UART: [ldev] SUBJECT.KEYID = 5
7,652,500 UART: [ldev] AUTHORITY.KEYID = 7
7,653,696 UART: [ldev] FE.KEYID = 1
7,666,117 UART: [ldev] Erasing FE.KEYID = 1
10,956,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,422 UART: [ldev] --
13,316,333 UART: [fwproc] Waiting for Commands...
13,318,212 UART: [fwproc] Received command 0x46574c44
13,320,448 UART: [fwproc] Received Image of size 118548 bytes
17,426,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,568 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,825 >>> mbox cmd response: success
17,904,891 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,907,457 UART: [afmc] ++
17,908,039 UART: [afmc] CDI.KEYID = 6
17,908,920 UART: [afmc] SUBJECT.KEYID = 7
17,910,185 UART: [afmc] AUTHORITY.KEYID = 5
21,224,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,492 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,631 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,030 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,067 UART: [afmc] --
23,589,149 UART: [cold-reset] --
23,592,463 UART: [state] Locking Datavault
23,599,642 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,383 UART: [state] Locking ICCM
23,603,337 UART: [exit] Launching FMC @ 0x40000130
23,611,779 UART:
23,612,004 UART: Running Caliptra FMC ...
23,613,025 UART:
23,613,169 UART: [state] CFI Enabled
23,621,587 UART: [fht] FMC Alias Private Key: 7
25,961,232 UART: [art] Extend RT PCRs Done
25,962,454 UART: [art] Lock RT PCRs Done
25,963,965 UART: [art] Populate DV Done
25,969,270 UART: [fht] FMC Alias Private Key: 7
25,970,967 UART: [art] Derive CDI
25,971,702 UART: [art] Store in slot 0x4
26,014,985 UART: [art] Derive Key Pair
26,015,984 UART: [art] Store priv key in slot 0x5
29,258,076 UART: [art] Derive Key Pair - Done
29,271,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,127 UART: [art] PUB.X = 33D0F8605B499F020C4BEAFF4799781F2C908D9F57F49FD07DDCD5A6F132712C51C20EA055514443048EB25D0AE17B91
31,560,426 UART: [art] PUB.Y = 4B93DC89F7166DE978735AE7319FF270101A8E0F05E785492772321B1F53687C463A15F2980864C0246D6047803CA3B6
31,567,645 UART: [art] SIG.R = 4CC3D5D5E42B8B74803913ACCCF5B55B1F07364D4E1A72DC513AC5D8648A7942165040CF2ECE07BD09BA7EEE9CB47CCE
31,575,025 UART: [art] SIG.S = 7530FF2480C5DBFF2B317DC88A9589E2848C55C033BDADD16484445B42FF839E5311109BE6FBF9ED108C06E5D8044C09
32,880,110 UART: Caliptra RT
32,880,822 UART: [state] CFI Enabled
33,014,433 UART: [rt] RT listening for mailbox commands...
33,016,859 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
4,125,575 ready_for_fw is high
4,125,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,622 >>> mbox cmd response: success
18,152,130 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,797,371 UART:
23,797,774 UART: Running Caliptra FMC ...
23,798,985 UART:
23,799,156 UART: [state] CFI Enabled
23,806,941 UART: [fht] FMC Alias Private Key: 7
26,147,288 UART: [art] Extend RT PCRs Done
26,148,514 UART: [art] Lock RT PCRs Done
26,150,138 UART: [art] Populate DV Done
26,155,712 UART: [fht] FMC Alias Private Key: 7
26,157,302 UART: [art] Derive CDI
26,158,108 UART: [art] Store in slot 0x4
26,201,300 UART: [art] Derive Key Pair
26,202,357 UART: [art] Store priv key in slot 0x5
29,443,906 UART: [art] Derive Key Pair - Done
29,456,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,741 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,248 UART: [art] PUB.X = 52794245BF12E438B2F4797F69171622994546CD36BB685B36E42A2EA0C2BC411BD058A7A8C6D60C6A2E88786C112CD8
31,746,504 UART: [art] PUB.Y = 6701FB1A7CA9F781F964F71ACBFAFD7C66C8DA477C21631DE88268EBB4C8905ECE06156740E5D50D02492EA213BA4344
31,753,761 UART: [art] SIG.R = CB84BAAC2830EE9ABF0231F71428D672B533D4035573708B0FF705194BD4E586DB52ED470EC000C6D0CAF308772F43EE
31,761,146 UART: [art] SIG.S = 1383311E14A1E2149382DB708D14DB70400FAB808E955E3C5DCE04124D1CC21B17BB7A29DE383E54677FB1967945FB63
33,066,205 UART: Caliptra RT
33,066,920 UART: [state] CFI Enabled
33,199,888 UART: [rt] RT listening for mailbox commands...
33,202,404 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,919 writing to cptra_bootfsm_go
192,070 UART:
192,443 UART: Running Caliptra ROM ...
193,558 UART:
193,704 UART: [state] CFI Enabled
265,354 UART: [state] LifecycleState = Unprovisioned
267,322 UART: [state] DebugLocked = No
269,212 UART: [state] WD Timer not started. Device not locked for debugging
273,312 UART: [kat] SHA2-256
452,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,713 UART: [kat] ++
464,259 UART: [kat] sha1
475,983 UART: [kat] SHA2-256
478,646 UART: [kat] SHA2-384
483,851 UART: [kat] SHA2-512-ACC
486,216 UART: [kat] ECC-384
2,950,265 UART: [kat] HMAC-384Kdf
2,970,361 UART: [kat] LMS
3,446,802 UART: [kat] --
3,452,373 UART: [cold-reset] ++
3,453,906 UART: [fht] FHT @ 0x50003400
3,465,249 UART: [idev] ++
3,465,814 UART: [idev] CDI.KEYID = 6
3,466,690 UART: [idev] SUBJECT.KEYID = 7
3,468,000 UART: [idev] UDS.KEYID = 0
3,468,904 ready_for_fw is high
3,469,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,181 UART: [idev] Erasing UDS.KEYID = 0
5,987,698 UART: [idev] Sha1 KeyId Algorithm
6,011,655 UART: [idev] --
6,017,949 UART: [ldev] ++
6,018,526 UART: [ldev] CDI.KEYID = 6
6,019,465 UART: [ldev] SUBJECT.KEYID = 5
6,020,671 UART: [ldev] AUTHORITY.KEYID = 7
6,021,955 UART: [ldev] FE.KEYID = 1
6,055,697 UART: [ldev] Erasing FE.KEYID = 1
8,565,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,903 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,514 UART: [ldev] --
10,371,355 UART: [fwproc] Wait for Commands...
10,373,819 UART: [fwproc] Recv command 0x46574c44
10,375,800 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,621 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,692 >>> mbox cmd response: success
14,346,883 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,349,781 UART: [afmc] ++
14,350,365 UART: [afmc] CDI.KEYID = 6
14,351,307 UART: [afmc] SUBJECT.KEYID = 7
14,352,518 UART: [afmc] AUTHORITY.KEYID = 5
16,892,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,096 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,302 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,155 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,713 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,324 UART: [afmc] --
18,715,044 UART: [cold-reset] --
18,719,553 UART: [state] Locking Datavault
18,724,848 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,597 UART: [state] Locking ICCM
18,728,367 UART: [exit] Launching FMC @ 0x40000130
18,736,807 UART:
18,737,057 UART: Running Caliptra FMC ...
18,738,158 UART:
18,738,310 UART: [state] CFI Enabled
18,792,728 UART: [fht] FMC Alias Private Key: 7
20,558,637 UART: [art] Extend RT PCRs Done
20,559,860 UART: [art] Lock RT PCRs Done
20,561,532 UART: [art] Populate DV Done
20,567,106 UART: [fht] FMC Alias Private Key: 7
20,568,800 UART: [art] Derive CDI
20,569,828 UART: [art] Store in slot 0x4
20,624,907 UART: [art] Derive Key Pair
20,625,915 UART: [art] Store priv key in slot 0x5
23,088,557 UART: [art] Derive Key Pair - Done
23,101,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,920 UART: [art] PUB.X = FE75F83A5AB4533470251E77C5172902A8DD56EE66E66DE2A88B40E7086E6AA060B6BA9FF73DE11DA85D93000BA0D499
24,823,169 UART: [art] PUB.Y = 08BD1F4347AFC530C33EFC7047C6DDF7904BE1A1DB9B396BEF858770E88F32166748FAA815EBA0BF1C8C6AECDD17C934
24,830,447 UART: [art] SIG.R = 0CB8FF33589D5EAE035C40B99CB4AE66662B56316F3F01F53E94F272EE372CC936D857E249D4FEF872E080E23A32D34E
24,837,831 UART: [art] SIG.S = 46090C4BA87915033292F1E899B026F06DB7769447169825E255CAA97047023F4AC3ED0277BA136B50A50DA13CD0E55A
25,816,712 UART: Caliptra RT
25,817,426 UART: [state] CFI Enabled
25,996,991 UART: [rt] RT listening for mailbox commands...
25,999,503 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,461,614 ready_for_fw is high
3,462,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,003 >>> mbox cmd response: success
14,225,687 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,516,246 UART:
18,516,655 UART: Running Caliptra FMC ...
18,517,760 UART:
18,517,923 UART: [state] CFI Enabled
18,584,570 UART: [fht] FMC Alias Private Key: 7
20,350,878 UART: [art] Extend RT PCRs Done
20,352,103 UART: [art] Lock RT PCRs Done
20,353,712 UART: [art] Populate DV Done
20,359,039 UART: [fht] FMC Alias Private Key: 7
20,360,533 UART: [art] Derive CDI
20,361,294 UART: [art] Store in slot 0x4
20,417,389 UART: [art] Derive Key Pair
20,418,410 UART: [art] Store priv key in slot 0x5
22,881,163 UART: [art] Derive Key Pair - Done
22,894,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,401 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,936 UART: [art] PUB.X = CFE9842E0B155922A53CC79FD2E53DC2F3BD3CFC0CBFA4B868C21E9A01F118E521D5024B14E19FFA6D236F69E58AAE8B
24,616,143 UART: [art] PUB.Y = 510ED0A60B481E3CF5762902F75779ACEB89D4B50B0A6488B83198C6DCF36E55DC58CF733E73B5C0886BCA0034E2DCA3
24,623,400 UART: [art] SIG.R = 9B3784F6C5171B63545C297055A0E29FCA67C9735BB61CF7FD1603E97A6838B5CEE57F8D5AA60BBB2A967E7D8C356C1A
24,630,804 UART: [art] SIG.S = D88199E0DEB9892247A52781B62A3426C5739342562F4C507C87E2F6C8223D8A0E0842AC65535222ABB7A74232E487DC
25,609,616 UART: Caliptra RT
25,610,325 UART: [state] CFI Enabled
25,791,727 UART: [rt] RT listening for mailbox commands...
25,794,372 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,485 UART:
192,834 UART: Running Caliptra ROM ...
194,019 UART:
603,665 UART: [state] CFI Enabled
620,848 UART: [state] LifecycleState = Unprovisioned
622,829 UART: [state] DebugLocked = No
625,084 UART: [state] WD Timer not started. Device not locked for debugging
629,836 UART: [kat] SHA2-256
809,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,299 UART: [kat] ++
820,781 UART: [kat] sha1
832,223 UART: [kat] SHA2-256
834,955 UART: [kat] SHA2-384
841,520 UART: [kat] SHA2-512-ACC
843,890 UART: [kat] ECC-384
3,284,256 UART: [kat] HMAC-384Kdf
3,297,972 UART: [kat] LMS
3,774,490 UART: [kat] --
3,779,122 UART: [cold-reset] ++
3,780,057 UART: [fht] FHT @ 0x50003400
3,790,898 UART: [idev] ++
3,791,468 UART: [idev] CDI.KEYID = 6
3,792,470 UART: [idev] SUBJECT.KEYID = 7
3,793,651 UART: [idev] UDS.KEYID = 0
3,794,705 ready_for_fw is high
3,794,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,751 UART: [idev] Erasing UDS.KEYID = 0
6,269,261 UART: [idev] Sha1 KeyId Algorithm
6,291,501 UART: [idev] --
6,296,047 UART: [ldev] ++
6,296,659 UART: [ldev] CDI.KEYID = 6
6,297,554 UART: [ldev] SUBJECT.KEYID = 5
6,298,714 UART: [ldev] AUTHORITY.KEYID = 7
6,300,063 UART: [ldev] FE.KEYID = 1
6,311,445 UART: [ldev] Erasing FE.KEYID = 1
8,789,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,210 UART: [ldev] --
10,583,341 UART: [fwproc] Wait for Commands...
10,585,062 UART: [fwproc] Recv command 0x46574c44
10,587,055 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,654 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,413 >>> mbox cmd response: success
14,551,649 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,554,175 UART: [afmc] ++
14,554,764 UART: [afmc] CDI.KEYID = 6
14,555,703 UART: [afmc] SUBJECT.KEYID = 7
14,556,918 UART: [afmc] AUTHORITY.KEYID = 5
17,063,869 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,196 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,410 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,835 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,211 UART: [afmc] --
18,863,734 UART: [cold-reset] --
18,868,892 UART: [state] Locking Datavault
18,876,037 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,794 UART: [state] Locking ICCM
18,879,733 UART: [exit] Launching FMC @ 0x40000130
18,888,184 UART:
18,888,425 UART: Running Caliptra FMC ...
18,889,529 UART:
18,889,690 UART: [state] CFI Enabled
18,897,577 UART: [fht] FMC Alias Private Key: 7
20,663,530 UART: [art] Extend RT PCRs Done
20,664,748 UART: [art] Lock RT PCRs Done
20,666,430 UART: [art] Populate DV Done
20,671,842 UART: [fht] FMC Alias Private Key: 7
20,673,495 UART: [art] Derive CDI
20,674,311 UART: [art] Store in slot 0x4
20,717,008 UART: [art] Derive Key Pair
20,718,052 UART: [art] Store priv key in slot 0x5
23,145,544 UART: [art] Derive Key Pair - Done
23,158,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,614 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,122 UART: [art] PUB.X = 0A4A28D7CE379FF105C3DC7814CD800E7834172EE24307FF6DF53DB7D68C617EAA9926BA1A3E371860C4361C7CCF37AC
24,873,419 UART: [art] PUB.Y = 5819900116C26B2B5EF23DBECCF2B2639CB67EA169524E6386E4CA3798DF37CBC1F6930760033AA951468A518D36C65C
24,880,654 UART: [art] SIG.R = 76ADDC33FB857E811836725C713F6470659EDD7A50CF77528010B4EF2DDF975D5314062489EDDFA9AE7314C599F8DEC4
24,888,052 UART: [art] SIG.S = D98CED437CEBF9B696C14D47E1CB9BBACE1EE6A8E18936E107E6F470BCEBB23396105A51AE381E71CD8DAFE2979B5270
25,866,726 UART: Caliptra RT
25,867,453 UART: [state] CFI Enabled
25,999,363 UART: [rt] RT listening for mailbox commands...
26,001,765 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
3,775,719 ready_for_fw is high
3,776,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,512 >>> mbox cmd response: success
14,457,677 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,707,422 UART:
18,707,804 UART: Running Caliptra FMC ...
18,708,946 UART:
18,709,113 UART: [state] CFI Enabled
18,716,796 UART: [fht] FMC Alias Private Key: 7
20,482,562 UART: [art] Extend RT PCRs Done
20,483,789 UART: [art] Lock RT PCRs Done
20,485,667 UART: [art] Populate DV Done
20,491,127 UART: [fht] FMC Alias Private Key: 7
20,492,836 UART: [art] Derive CDI
20,493,580 UART: [art] Store in slot 0x4
20,536,176 UART: [art] Derive Key Pair
20,537,184 UART: [art] Store priv key in slot 0x5
22,964,179 UART: [art] Derive Key Pair - Done
22,977,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,514 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,023 UART: [art] PUB.X = 23A6BE4B07C2CE9A46355070693D61FD91663AC2C548C16CA0CF76125ECC49D77AB125A45C20916881DE453348114526
24,692,232 UART: [art] PUB.Y = A793ADBC998A34E44E3F4DE37E6D7C5AADA3B99E64BAF83716A886393FCD4BAB89A58FBC4C219E147E469D429D603968
24,699,545 UART: [art] SIG.R = 396CEEA76F1693A4F7032F2784720E06690FC34A4C015051AC3CF1B6C50B8BC009A2A4D8D8924E65AC475D3AA07F88E7
24,706,943 UART: [art] SIG.S = 6683C2F6135C97762E7892B61A54677FC0F823BDDAFF3739BFFA3E36A4F064D338C026533057E22AAD54658AFF076F4C
25,686,252 UART: Caliptra RT
25,686,956 UART: [state] CFI Enabled
25,819,138 UART: [rt] RT listening for mailbox commands...
25,821,752 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,146 UART:
192,507 UART: Running Caliptra ROM ...
193,688 UART:
193,837 UART: [state] CFI Enabled
264,042 UART: [state] LifecycleState = Unprovisioned
266,450 UART: [state] DebugLocked = No
268,333 UART: [state] WD Timer not started. Device not locked for debugging
272,862 UART: [kat] SHA2-256
462,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,516 UART: [kat] ++
474,008 UART: [kat] sha1
486,365 UART: [kat] SHA2-256
489,344 UART: [kat] SHA2-384
496,118 UART: [kat] SHA2-512-ACC
498,696 UART: [kat] ECC-384
2,948,765 UART: [kat] HMAC-384Kdf
2,972,456 UART: [kat] LMS
3,504,267 UART: [kat] --
3,507,906 UART: [cold-reset] ++
3,510,045 UART: [fht] FHT @ 0x50003400
3,522,196 UART: [idev] ++
3,522,872 UART: [idev] CDI.KEYID = 6
3,523,797 UART: [idev] SUBJECT.KEYID = 7
3,525,039 UART: [idev] UDS.KEYID = 0
3,525,967 ready_for_fw is high
3,526,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,128 UART: [idev] Erasing UDS.KEYID = 0
6,029,420 UART: [idev] Sha1 KeyId Algorithm
6,051,967 UART: [idev] --
6,057,749 UART: [ldev] ++
6,058,428 UART: [ldev] CDI.KEYID = 6
6,059,391 UART: [ldev] SUBJECT.KEYID = 5
6,060,544 UART: [ldev] AUTHORITY.KEYID = 7
6,061,772 UART: [ldev] FE.KEYID = 1
6,099,372 UART: [ldev] Erasing FE.KEYID = 1
8,605,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,422 UART: [ldev] --
10,411,992 UART: [fwproc] Wait for Commands...
10,414,246 UART: [fwproc] Recv command 0x46574c44
10,416,555 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,160 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,628 >>> mbox cmd response: success
14,676,731 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,679,950 UART: [afmc] ++
14,680,659 UART: [afmc] CDI.KEYID = 6
14,681,898 UART: [afmc] SUBJECT.KEYID = 7
14,683,352 UART: [afmc] AUTHORITY.KEYID = 5
17,209,878 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,933,855 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,935,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,950,846 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,011 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,980,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,093 UART: [afmc] --
19,008,858 UART: [cold-reset] --
19,013,695 UART: [state] Locking Datavault
19,021,364 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,556 UART: [state] Locking ICCM
19,026,514 UART: [exit] Launching FMC @ 0x40000130
19,035,177 UART:
19,035,409 UART: Running Caliptra FMC ...
19,036,509 UART:
19,036,687 UART: [state] CFI Enabled
19,090,352 UART: [fht] FMC Alias Private Key: 7
20,857,268 UART: [art] Extend RT PCRs Done
20,858,491 UART: [art] Lock RT PCRs Done
20,860,195 UART: [art] Populate DV Done
20,865,766 UART: [fht] FMC Alias Private Key: 7
20,867,306 UART: [art] Derive CDI
20,868,042 UART: [art] Store in slot 0x4
20,923,062 UART: [art] Derive Key Pair
20,924,103 UART: [art] Store priv key in slot 0x5
23,386,494 UART: [art] Derive Key Pair - Done
23,399,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,111,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,113,427 UART: [art] PUB.X = B7FF6EF00251907F40D43190B6743C86028B9C40F821246C61CA35713FB9CC7EB60DB0CC97218149995188B522A0BB00
25,120,671 UART: [art] PUB.Y = 2FFDB6BD1EE156D99501B4D97F603A3FB96A8DB06DA7745FC521F2D171DB7E393FBA89BEBE93253709FA162695828468
25,127,925 UART: [art] SIG.R = E6478D106ACFBD35367EB41B7D24852313A444426FA68E20514C8A3CA1EAD964A561C8516F7D5B3719670C696C17640A
25,135,334 UART: [art] SIG.S = 6D116ADA860CE19E722DA08346BC0C8C469793878A5F199A69F564F13EEFC51453AD56227CF77F60B4C7A75E21720393
26,113,921 UART: Caliptra RT
26,114,607 UART: [state] CFI Enabled
26,294,269 UART: [rt] RT listening for mailbox commands...
26,296,936 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,437,249 ready_for_fw is high
3,437,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,695 >>> mbox cmd response: success
14,820,591 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,131,618 UART:
19,132,009 UART: Running Caliptra FMC ...
19,133,131 UART:
19,133,280 UART: [state] CFI Enabled
19,201,020 UART: [fht] FMC Alias Private Key: 7
20,967,220 UART: [art] Extend RT PCRs Done
20,968,443 UART: [art] Lock RT PCRs Done
20,970,179 UART: [art] Populate DV Done
20,975,606 UART: [fht] FMC Alias Private Key: 7
20,977,311 UART: [art] Derive CDI
20,978,126 UART: [art] Store in slot 0x4
21,034,940 UART: [art] Derive Key Pair
21,036,004 UART: [art] Store priv key in slot 0x5
23,513,229 UART: [art] Derive Key Pair - Done
23,526,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,238,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,240,349 UART: [art] PUB.X = A46B4D09AC0989C0FAC8315D5C0AB22DFDE02D1809DB9DA38E81491B585D280EEFA6F92709034A7EFD19652F3CB9164E
25,247,651 UART: [art] PUB.Y = A1BEFDBF2E6759AD3DDE055B16EF295395A4ED6AA05276CBCDC4EB0C0CA507D03A751799F2E6744A2A98E0C048FE35BE
25,254,931 UART: [art] SIG.R = F40D7AA31CF293FD4E5D4283078C0080627B8B14C4ECE9783BD3E07C04DA11B92E1D2CEA0DF5EF61E20FF62A31DBD2DC
25,262,328 UART: [art] SIG.S = 11E64389CE745913ABE9403AFC988CD1CE02E029064AA687F43E367D3F277D326BF9E96FE35EC7BCAD8CC865657D85AE
26,241,167 UART: Caliptra RT
26,241,873 UART: [state] CFI Enabled
26,423,378 UART: [rt] RT listening for mailbox commands...
26,425,719 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,500 UART:
192,864 UART: Running Caliptra ROM ...
193,994 UART:
603,713 UART: [state] CFI Enabled
614,324 UART: [state] LifecycleState = Unprovisioned
616,635 UART: [state] DebugLocked = No
617,889 UART: [state] WD Timer not started. Device not locked for debugging
622,292 UART: [kat] SHA2-256
812,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
822,937 UART: [kat] ++
823,549 UART: [kat] sha1
834,574 UART: [kat] SHA2-256
837,580 UART: [kat] SHA2-384
843,318 UART: [kat] SHA2-512-ACC
845,910 UART: [kat] ECC-384
3,287,178 UART: [kat] HMAC-384Kdf
3,299,789 UART: [kat] LMS
3,831,634 UART: [kat] --
3,837,259 UART: [cold-reset] ++
3,838,769 UART: [fht] FHT @ 0x50003400
3,850,461 UART: [idev] ++
3,851,168 UART: [idev] CDI.KEYID = 6
3,852,081 UART: [idev] SUBJECT.KEYID = 7
3,853,262 UART: [idev] UDS.KEYID = 0
3,854,193 ready_for_fw is high
3,854,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,248 UART: [idev] Erasing UDS.KEYID = 0
6,329,508 UART: [idev] Sha1 KeyId Algorithm
6,351,764 UART: [idev] --
6,356,613 UART: [ldev] ++
6,357,358 UART: [ldev] CDI.KEYID = 6
6,358,249 UART: [ldev] SUBJECT.KEYID = 5
6,359,522 UART: [ldev] AUTHORITY.KEYID = 7
6,360,705 UART: [ldev] FE.KEYID = 1
6,371,600 UART: [ldev] Erasing FE.KEYID = 1
8,845,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,290 UART: [ldev] --
10,637,130 UART: [fwproc] Wait for Commands...
10,639,878 UART: [fwproc] Recv command 0x46574c44
10,642,191 UART: [fwproc] Recv'd Img size: 118548 bytes
14,138,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,216,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,339,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,900,945 >>> mbox cmd response: success
14,901,987 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,905,623 UART: [afmc] ++
14,906,329 UART: [afmc] CDI.KEYID = 6
14,907,521 UART: [afmc] SUBJECT.KEYID = 7
14,908,973 UART: [afmc] AUTHORITY.KEYID = 5
17,409,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,133,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,135,085 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,150,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,165,326 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,180,234 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,204,140 UART: [afmc] --
19,207,844 UART: [cold-reset] --
19,213,356 UART: [state] Locking Datavault
19,218,001 UART: [state] Locking PCR0, PCR1 and PCR31
19,220,224 UART: [state] Locking ICCM
19,222,922 UART: [exit] Launching FMC @ 0x40000130
19,231,549 UART:
19,231,795 UART: Running Caliptra FMC ...
19,232,900 UART:
19,233,060 UART: [state] CFI Enabled
19,240,935 UART: [fht] FMC Alias Private Key: 7
21,007,144 UART: [art] Extend RT PCRs Done
21,008,367 UART: [art] Lock RT PCRs Done
21,009,988 UART: [art] Populate DV Done
21,015,407 UART: [fht] FMC Alias Private Key: 7
21,017,114 UART: [art] Derive CDI
21,017,934 UART: [art] Store in slot 0x4
21,060,588 UART: [art] Derive Key Pair
21,061,643 UART: [art] Store priv key in slot 0x5
23,488,707 UART: [art] Derive Key Pair - Done
23,501,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,984 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,497 UART: [art] PUB.X = FD054F8F5234E3684C1FEA940A40E90E39B01783A098D0C486F00A66280D7B8EBB3FBE349CF5321524CEC9D21D5A2EA6
25,216,773 UART: [art] PUB.Y = 7D8622AD39D9D3BD6735D56DDE2CFAE6C86D07A977DC3F062609B2825AEAF8105D8DD8C83DC4B336688FF9857E0C92F5
25,224,038 UART: [art] SIG.R = 00CF74B1A824BA07111BD73EE4A39283FFA953A3ADCAE304ABF679BADB4A4C6380F31B27FCC041BB55DCEC2F1C02C695
25,231,465 UART: [art] SIG.S = DA5206496EE186E90914F2187CDC271EC686FF02BA8E108CF8235368EAFEE4D1EC72EEA20BA37CE206857B3E50BBF2C2
26,210,943 UART: Caliptra RT
26,211,626 UART: [state] CFI Enabled
26,344,459 UART: [rt] RT listening for mailbox commands...
26,346,703 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,755,403 ready_for_fw is high
3,755,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,718 >>> mbox cmd response: success
15,049,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,295,765 UART:
19,296,165 UART: Running Caliptra FMC ...
19,297,478 UART:
19,297,653 UART: [state] CFI Enabled
19,305,235 UART: [fht] FMC Alias Private Key: 7
21,072,168 UART: [art] Extend RT PCRs Done
21,073,407 UART: [art] Lock RT PCRs Done
21,075,211 UART: [art] Populate DV Done
21,080,481 UART: [fht] FMC Alias Private Key: 7
21,081,991 UART: [art] Derive CDI
21,082,767 UART: [art] Store in slot 0x4
21,125,803 UART: [art] Derive Key Pair
21,126,813 UART: [art] Store priv key in slot 0x5
23,553,505 UART: [art] Derive Key Pair - Done
23,566,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,200 UART: [art] PUB.X = 50A127B835D063AA98B7A5C33D88ED8205BD5D00CB41ED2E5C2E658FF27FB001740AB24AE4650D83818D9728DE601DB5
25,281,473 UART: [art] PUB.Y = AD342C32328676F71A6E206EB154BBBE6939C7308115E24B3ECC4BEBCA19FC4F00090E47049C4FB5F1340A60ADB0B0DD
25,288,686 UART: [art] SIG.R = 997C8B11E4B1F723D2C7912558F2084126EB235D6A52A8C1D7BBCA21E17991B1DD9003CD71898C5A62F96C5DB286261E
25,296,206 UART: [art] SIG.S = 5219B7BD0BF5A1D1C66685868FC3738453A403BF7062EE4AC718C95B8E4E4316612A794E4AD022A248421B2887F8A08C
26,275,183 UART: Caliptra RT
26,275,880 UART: [state] CFI Enabled
26,407,522 UART: [rt] RT listening for mailbox commands...
26,409,926 >>> mbox cmd response: failed
test test_mailbox::test_reserved_pauser ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,027 UART:
192,388 UART: Running Caliptra ROM ...
193,481 UART:
193,625 UART: [state] CFI Enabled
265,870 UART: [state] LifecycleState = Unprovisioned
267,794 UART: [state] DebugLocked = No
270,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,126 UART: [kat] SHA2-256
444,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,297 UART: [kat] ++
455,745 UART: [kat] sha1
466,713 UART: [kat] SHA2-256
469,420 UART: [kat] SHA2-384
476,077 UART: [kat] SHA2-512-ACC
478,454 UART: [kat] ECC-384
2,767,356 UART: [kat] HMAC-384Kdf
2,799,712 UART: [kat] LMS
3,990,013 UART: [kat] --
3,996,025 UART: [cold-reset] ++
3,996,972 UART: [fht] Storing FHT @ 0x50003400
4,007,312 UART: [idev] ++
4,007,883 UART: [idev] CDI.KEYID = 6
4,008,915 UART: [idev] SUBJECT.KEYID = 7
4,010,099 UART: [idev] UDS.KEYID = 0
4,011,193 ready_for_fw is high
4,011,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,550 UART: [idev] Erasing UDS.KEYID = 0
7,344,453 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,427 UART: [idev] --
7,372,534 UART: [ldev] ++
7,373,161 UART: [ldev] CDI.KEYID = 6
7,374,085 UART: [ldev] SUBJECT.KEYID = 5
7,375,303 UART: [ldev] AUTHORITY.KEYID = 7
7,376,536 UART: [ldev] FE.KEYID = 1
7,424,818 UART: [ldev] Erasing FE.KEYID = 1
10,753,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,228 UART: [ldev] --
13,118,184 UART: [fwproc] Waiting for Commands...
13,121,516 UART: [fwproc] Received command 0x46574c44
13,123,700 UART: [fwproc] Received Image of size 118548 bytes
17,229,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,875 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,977 >>> mbox cmd response: success
17,706,056 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,709,547 UART: [afmc] ++
17,710,124 UART: [afmc] CDI.KEYID = 6
17,711,139 UART: [afmc] SUBJECT.KEYID = 7
17,712,297 UART: [afmc] AUTHORITY.KEYID = 5
21,072,913 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,341 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,774 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,403 UART: [afmc] --
23,444,432 UART: [cold-reset] --
23,448,367 UART: [state] Locking Datavault
23,453,135 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,890 UART: [state] Locking ICCM
23,457,583 UART: [exit] Launching FMC @ 0x40000130
23,465,975 UART:
23,466,209 UART: Running Caliptra FMC ...
23,467,306 UART:
23,467,471 UART: [state] CFI Enabled
23,531,528 UART: [fht] FMC Alias Private Key: 7
25,871,824 UART: [art] Extend RT PCRs Done
25,873,043 UART: [art] Lock RT PCRs Done
25,874,675 UART: [art] Populate DV Done
25,880,243 UART: [fht] FMC Alias Private Key: 7
25,881,829 UART: [art] Derive CDI
25,882,641 UART: [art] Store in slot 0x4
25,939,654 UART: [art] Derive Key Pair
25,940,711 UART: [art] Store priv key in slot 0x5
29,233,035 UART: [art] Derive Key Pair - Done
29,245,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,328 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,844 UART: [art] PUB.X = 8B5A881E07883E4E43F1115544C3EE720A60A103B85743FFFF1B6746D97FB805D807320AC1D10A8C70B3B4DEDB00C682
31,543,083 UART: [art] PUB.Y = 8A817A1791B91F6044342C64DD305EDD1C44045E610ECE1D3D6C277963833AC63765B842384CA5177B3A841A26AF3026
31,550,315 UART: [art] SIG.R = 63F8E9F207E7350BCE8436B1AC8EFBA032F1B0889D06DA14F00DDCBBA30999A1B031AF652DDEF6FB3570C6B8494AB866
31,557,700 UART: [art] SIG.S = 93DC3ECB584F2021314E9A65D97741FAE90166C697DFEED7147B7A71F619957F26534C348E0CA9F371B88D489A02B181
32,862,350 UART: Caliptra RT
32,863,064 UART: [state] CFI Enabled
33,041,006 UART: [rt] RT listening for mailbox commands...
33,072,541 UART: [rt]cmd =0xaabbccdd, len=4
33,073,828 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,783,725 ready_for_fw is high
3,784,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,694 >>> mbox cmd response: success
17,943,082 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,629,922 UART:
23,630,324 UART: Running Caliptra FMC ...
23,631,453 UART:
23,631,619 UART: [state] CFI Enabled
23,700,543 UART: [fht] FMC Alias Private Key: 7
26,041,154 UART: [art] Extend RT PCRs Done
26,042,380 UART: [art] Lock RT PCRs Done
26,043,737 UART: [art] Populate DV Done
26,048,941 UART: [fht] FMC Alias Private Key: 7
26,050,554 UART: [art] Derive CDI
26,051,373 UART: [art] Store in slot 0x4
26,109,261 UART: [art] Derive Key Pair
26,110,256 UART: [art] Store priv key in slot 0x5
29,403,452 UART: [art] Derive Key Pair - Done
29,416,824 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,648 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,150 UART: [art] PUB.X = 1E0EEC066171E5B80BCD9290C7616473DC67BA7B248B25C2148E75BEAB6498824A3CC6DB90EC8F1831668D5C5AB76AE2
31,714,630 UART: [art] PUB.Y = 9A0CC7EEA4B7D33DBE5A67D617BD187A82991003672E31ED3D981387C3EEF72A5EE0F29C1E00C68CF62023B75B93C8F9
31,721,663 UART: [art] SIG.R = 6D9FE315160EB2A25A163EEDC12CAC23B801C11027F655F090F41394A82C22DADEDA51CDF3C5145497A89727DE64F03B
31,729,057 UART: [art] SIG.S = A181151CE60739BE54B68F48A474E75BC676F07C1973EAC94AD06833DF8EE72A8696A0FCA4E4E540F69888D590D60A66
33,034,329 UART: Caliptra RT
33,035,031 UART: [state] CFI Enabled
33,212,989 UART: [rt] RT listening for mailbox commands...
33,244,380 UART: [rt]cmd =0xaabbccdd, len=4
33,245,819 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,515 writing to cptra_bootfsm_go
192,690 UART:
193,050 UART: Running Caliptra ROM ...
194,247 UART:
603,754 UART: [state] CFI Enabled
619,412 UART: [state] LifecycleState = Unprovisioned
621,393 UART: [state] DebugLocked = No
624,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,728 UART: [kat] SHA2-256
798,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,003 UART: [kat] ++
809,459 UART: [kat] sha1
821,323 UART: [kat] SHA2-256
824,039 UART: [kat] SHA2-384
830,235 UART: [kat] SHA2-512-ACC
832,623 UART: [kat] ECC-384
3,116,809 UART: [kat] HMAC-384Kdf
3,128,901 UART: [kat] LMS
4,319,015 UART: [kat] --
4,324,854 UART: [cold-reset] ++
4,326,703 UART: [fht] Storing FHT @ 0x50003400
4,338,031 UART: [idev] ++
4,338,672 UART: [idev] CDI.KEYID = 6
4,339,578 UART: [idev] SUBJECT.KEYID = 7
4,340,816 UART: [idev] UDS.KEYID = 0
4,341,866 ready_for_fw is high
4,342,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,951 UART: [idev] Erasing UDS.KEYID = 0
7,625,336 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,436 UART: [idev] --
7,654,273 UART: [ldev] ++
7,654,898 UART: [ldev] CDI.KEYID = 6
7,655,830 UART: [ldev] SUBJECT.KEYID = 5
7,656,983 UART: [ldev] AUTHORITY.KEYID = 7
7,658,262 UART: [ldev] FE.KEYID = 1
7,670,686 UART: [ldev] Erasing FE.KEYID = 1
10,961,420 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,003 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,065 UART: [ldev] --
13,321,650 UART: [fwproc] Waiting for Commands...
13,324,818 UART: [fwproc] Received command 0x46574c44
13,326,993 UART: [fwproc] Received Image of size 118548 bytes
17,438,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,515,759 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,588,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,917,016 >>> mbox cmd response: success
17,918,148 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
17,921,856 UART: [afmc] ++
17,922,509 UART: [afmc] CDI.KEYID = 6
17,923,388 UART: [afmc] SUBJECT.KEYID = 7
17,924,651 UART: [afmc] AUTHORITY.KEYID = 5
21,239,531 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,535,840 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,274 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,748 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,603,563 UART: [afmc] --
23,607,908 UART: [cold-reset] --
23,612,462 UART: [state] Locking Datavault
23,618,422 UART: [state] Locking PCR0, PCR1 and PCR31
23,620,171 UART: [state] Locking ICCM
23,622,506 UART: [exit] Launching FMC @ 0x40000130
23,630,901 UART:
23,631,130 UART: Running Caliptra FMC ...
23,632,168 UART:
23,632,311 UART: [state] CFI Enabled
23,640,296 UART: [fht] FMC Alias Private Key: 7
25,980,581 UART: [art] Extend RT PCRs Done
25,981,807 UART: [art] Lock RT PCRs Done
25,983,614 UART: [art] Populate DV Done
25,989,132 UART: [fht] FMC Alias Private Key: 7
25,990,721 UART: [art] Derive CDI
25,991,533 UART: [art] Store in slot 0x4
26,034,285 UART: [art] Derive Key Pair
26,035,284 UART: [art] Store priv key in slot 0x5
29,277,513 UART: [art] Derive Key Pair - Done
29,290,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,915 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,422 UART: [art] PUB.X = 202AC86F92A1CD05543053958BAA28BA0FD62B286943A3E784F1547A3C88BA282D7A2769404A082B2EBE2D11BA513231
31,579,689 UART: [art] PUB.Y = A9E69EDB6D6ED6DD04C21A9B1227C6161FB5486A96D4D97D2959260017E2BA14CAB0112D487B81001EEF9FEB89BD8D8C
31,586,923 UART: [art] SIG.R = 9DCA6B38283A5498C379F8C7A88A88068751BA2C7B5CCA4BCA0BAE2688A796C9E7A45012A1327669E65848FCFCE1B4A9
31,594,257 UART: [art] SIG.S = 6BD26396252AEC0FFF8C633104150EBA80B840CEB461ACE3665AF7FE37B17EF6B49BBF72D48042644A4FD3FFB88BC25A
32,899,034 UART: Caliptra RT
32,899,759 UART: [state] CFI Enabled
33,033,562 UART: [rt] RT listening for mailbox commands...
33,064,931 UART: [rt]cmd =0xaabbccdd, len=4
33,066,226 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,124,805 ready_for_fw is high
4,125,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,529 >>> mbox cmd response: success
18,155,613 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
23,796,924 UART:
23,797,311 UART: Running Caliptra FMC ...
23,798,444 UART:
23,798,601 UART: [state] CFI Enabled
23,806,334 UART: [fht] FMC Alias Private Key: 7
26,146,655 UART: [art] Extend RT PCRs Done
26,147,881 UART: [art] Lock RT PCRs Done
26,149,531 UART: [art] Populate DV Done
26,154,727 UART: [fht] FMC Alias Private Key: 7
26,156,372 UART: [art] Derive CDI
26,157,177 UART: [art] Store in slot 0x4
26,200,047 UART: [art] Derive Key Pair
26,201,090 UART: [art] Store priv key in slot 0x5
29,443,131 UART: [art] Derive Key Pair - Done
29,456,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,779 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,289 UART: [art] PUB.X = C93E6F1692EB47CC4D56842A530F66ABD7B5DBE6BDA2A2D5DDA728C336729F9511928673BD6EF337EAD04BDD55F1E3DD
31,745,586 UART: [art] PUB.Y = 6D9731400779D8D716BD504EB99B5AB3A72C35860CB454F02A21C78A2D460F3C7E92F5240A0D2280CD6C451D14227E81
31,752,828 UART: [art] SIG.R = A3F0CB0DBC46C6794229E4413D659D2701DE77CE5BE2A1BA9F36304AF1043965C1EED296D037CAC94C0AA7B849061AC3
31,760,221 UART: [art] SIG.S = 15F713B8BDEA3E4771DC0AA221131AFAD915DACFA9FDF0169AF1945E1735C8096C72901BA1285B98EFA0C2684D8BCA31
33,065,091 UART: Caliptra RT
33,065,832 UART: [state] CFI Enabled
33,198,527 UART: [rt] RT listening for mailbox commands...
33,229,781 UART: [rt]cmd =0xaabbccdd, len=4
33,231,260 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,082 UART:
192,461 UART: Running Caliptra ROM ...
193,631 UART:
193,780 UART: [state] CFI Enabled
261,326 UART: [state] LifecycleState = Unprovisioned
263,244 UART: [state] DebugLocked = No
265,623 UART: [state] WD Timer not started. Device not locked for debugging
269,013 UART: [kat] SHA2-256
448,655 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,453 UART: [kat] ++
459,985 UART: [kat] sha1
470,881 UART: [kat] SHA2-256
473,589 UART: [kat] SHA2-384
480,787 UART: [kat] SHA2-512-ACC
483,149 UART: [kat] ECC-384
2,950,517 UART: [kat] HMAC-384Kdf
2,971,482 UART: [kat] LMS
3,447,996 UART: [kat] --
3,452,425 UART: [cold-reset] ++
3,454,704 UART: [fht] FHT @ 0x50003400
3,465,952 UART: [idev] ++
3,466,515 UART: [idev] CDI.KEYID = 6
3,467,542 UART: [idev] SUBJECT.KEYID = 7
3,468,707 UART: [idev] UDS.KEYID = 0
3,469,628 ready_for_fw is high
3,469,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,252 UART: [idev] Erasing UDS.KEYID = 0
5,991,218 UART: [idev] Sha1 KeyId Algorithm
6,013,745 UART: [idev] --
6,019,255 UART: [ldev] ++
6,019,821 UART: [ldev] CDI.KEYID = 6
6,020,780 UART: [ldev] SUBJECT.KEYID = 5
6,021,988 UART: [ldev] AUTHORITY.KEYID = 7
6,023,239 UART: [ldev] FE.KEYID = 1
6,056,617 UART: [ldev] Erasing FE.KEYID = 1
8,561,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,296 UART: [ldev] --
10,373,550 UART: [fwproc] Wait for Commands...
10,375,150 UART: [fwproc] Recv command 0x46574c44
10,377,124 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,187 >>> mbox cmd response: success
14,347,259 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,350,016 UART: [afmc] ++
14,350,603 UART: [afmc] CDI.KEYID = 6
14,351,511 UART: [afmc] SUBJECT.KEYID = 7
14,352,727 UART: [afmc] AUTHORITY.KEYID = 5
16,891,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,635,343 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,637,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,653,376 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,669,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,684,963 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,709,922 UART: [afmc] --
18,712,799 UART: [cold-reset] --
18,714,829 UART: [state] Locking Datavault
18,721,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,064 UART: [state] Locking ICCM
18,725,589 UART: [exit] Launching FMC @ 0x40000130
18,734,000 UART:
18,734,248 UART: Running Caliptra FMC ...
18,735,349 UART:
18,735,510 UART: [state] CFI Enabled
18,792,975 UART: [fht] FMC Alias Private Key: 7
20,559,774 UART: [art] Extend RT PCRs Done
20,561,009 UART: [art] Lock RT PCRs Done
20,562,611 UART: [art] Populate DV Done
20,568,129 UART: [fht] FMC Alias Private Key: 7
20,569,606 UART: [art] Derive CDI
20,570,336 UART: [art] Store in slot 0x4
20,625,249 UART: [art] Derive Key Pair
20,626,284 UART: [art] Store priv key in slot 0x5
23,089,021 UART: [art] Derive Key Pair - Done
23,101,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,713 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,297 UART: [art] PUB.X = BDEAC7CAEE7A4AE5716724F4E5DE8079C48037977EA06EC805B043428378A384C621B63C7C589CF8B373B7446EDD890C
24,823,502 UART: [art] PUB.Y = D66D9466A96EDB522C25F70A0803912EB50EABEBBBB88D17E74536D864C88FFD3D8BDD94D97C0A1DA102B1068A07C2A9
24,830,784 UART: [art] SIG.R = 6E6C1D86BB3084CE7739C43746B9C4A4A679F03D2879985B275A2A14B741DB8E4E429D793FD45301372B17B32C7ED77A
24,838,125 UART: [art] SIG.S = 3617D22BB7D49C94278DA82BCA22B7A86CCE956B9A62EFF6096F66AF0BDFAC9CE0DAA1E049209A779EB493B47F0A7FD7
25,816,888 UART: Caliptra RT
25,817,585 UART: [state] CFI Enabled
25,997,195 UART: [rt] RT listening for mailbox commands...
26,028,500 UART: [rt]cmd =0xaabbccdd, len=4
26,029,788 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,460,362 ready_for_fw is high
3,460,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,215,142 >>> mbox cmd response: success
14,216,294 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,515,609 UART:
18,516,044 UART: Running Caliptra FMC ...
18,517,153 UART:
18,517,303 UART: [state] CFI Enabled
18,582,429 UART: [fht] FMC Alias Private Key: 7
20,349,320 UART: [art] Extend RT PCRs Done
20,350,554 UART: [art] Lock RT PCRs Done
20,352,205 UART: [art] Populate DV Done
20,357,838 UART: [fht] FMC Alias Private Key: 7
20,359,383 UART: [art] Derive CDI
20,360,198 UART: [art] Store in slot 0x4
20,407,176 UART: [art] Derive Key Pair
20,408,219 UART: [art] Store priv key in slot 0x5
22,870,959 UART: [art] Derive Key Pair - Done
22,883,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,596,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,597,770 UART: [art] PUB.X = 2A2C87B50F747BB92604C275C83EB0A6984C153AF2D6483E115636CC960E39A3D5DADB0E6E6993296DEE0BD69642D14B
24,605,023 UART: [art] PUB.Y = 73115EB73067942D451B793ECD2992D7B10E438838655C1F002E31F5DB12F7249B775E65AFA4BD22023F8B5814CEB2EE
24,612,281 UART: [art] SIG.R = 5D16E42F344418B7F7D21AE1600018F62EBAD04BA1247CD4B09256F74A3877532B40CBC0928D3B8F17E0A7CA4347E277
24,619,626 UART: [art] SIG.S = 77D695D3098816E3EA9E10ACE4CD572C44C159B1BF8729C90B4FE970283FB07789F47CB217491C7E48F0BED4662599F5
25,598,626 UART: Caliptra RT
25,599,343 UART: [state] CFI Enabled
25,779,074 UART: [rt] RT listening for mailbox commands...
25,810,500 UART: [rt]cmd =0xaabbccdd, len=4
25,811,902 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,166 writing to cptra_bootfsm_go
192,426 UART:
192,778 UART: Running Caliptra ROM ...
193,914 UART:
603,583 UART: [state] CFI Enabled
617,112 UART: [state] LifecycleState = Unprovisioned
619,066 UART: [state] DebugLocked = No
621,385 UART: [state] WD Timer not started. Device not locked for debugging
624,361 UART: [kat] SHA2-256
804,049 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,788 UART: [kat] ++
815,392 UART: [kat] sha1
826,070 UART: [kat] SHA2-256
828,732 UART: [kat] SHA2-384
834,655 UART: [kat] SHA2-512-ACC
837,012 UART: [kat] ECC-384
3,277,463 UART: [kat] HMAC-384Kdf
3,289,698 UART: [kat] LMS
3,766,230 UART: [kat] --
3,770,671 UART: [cold-reset] ++
3,773,105 UART: [fht] FHT @ 0x50003400
3,783,943 UART: [idev] ++
3,784,519 UART: [idev] CDI.KEYID = 6
3,785,432 UART: [idev] SUBJECT.KEYID = 7
3,786,684 UART: [idev] UDS.KEYID = 0
3,787,615 ready_for_fw is high
3,787,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,654 UART: [idev] Erasing UDS.KEYID = 0
6,267,242 UART: [idev] Sha1 KeyId Algorithm
6,292,152 UART: [idev] --
6,296,606 UART: [ldev] ++
6,297,248 UART: [ldev] CDI.KEYID = 6
6,298,193 UART: [ldev] SUBJECT.KEYID = 5
6,299,358 UART: [ldev] AUTHORITY.KEYID = 7
6,300,591 UART: [ldev] FE.KEYID = 1
6,311,671 UART: [ldev] Erasing FE.KEYID = 1
8,786,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,091 UART: [ldev] --
10,578,096 UART: [fwproc] Wait for Commands...
10,581,004 UART: [fwproc] Recv command 0x46574c44
10,582,994 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,326 >>> mbox cmd response: success
14,546,883 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,550,468 UART: [afmc] ++
14,551,049 UART: [afmc] CDI.KEYID = 6
14,552,075 UART: [afmc] SUBJECT.KEYID = 7
14,553,243 UART: [afmc] AUTHORITY.KEYID = 5
17,055,665 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,374 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,563 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,396 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,472 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,775 UART: [afmc] --
18,855,974 UART: [cold-reset] --
18,859,576 UART: [state] Locking Datavault
18,865,203 UART: [state] Locking PCR0, PCR1 and PCR31
18,866,980 UART: [state] Locking ICCM
18,868,973 UART: [exit] Launching FMC @ 0x40000130
18,877,368 UART:
18,877,604 UART: Running Caliptra FMC ...
18,878,705 UART:
18,878,871 UART: [state] CFI Enabled
18,886,727 UART: [fht] FMC Alias Private Key: 7
20,652,879 UART: [art] Extend RT PCRs Done
20,654,099 UART: [art] Lock RT PCRs Done
20,655,645 UART: [art] Populate DV Done
20,660,841 UART: [fht] FMC Alias Private Key: 7
20,662,494 UART: [art] Derive CDI
20,663,231 UART: [art] Store in slot 0x4
20,705,983 UART: [art] Derive Key Pair
20,707,019 UART: [art] Store priv key in slot 0x5
23,133,810 UART: [art] Derive Key Pair - Done
23,146,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,853,458 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,964 UART: [art] PUB.X = 580EB800131DD3D115A342C66136B9C64CB46B0702D68DA910F1A1E7CBC6539F9F772718302ED924EDFCCFEDF65EABEA
24,862,213 UART: [art] PUB.Y = 982412DE9A34D8535A6165C6B365390BE2A54EF93036EB801E65B32BC4BDEE63DE8625F4C76ADA5BAD1750E62AB0C93E
24,869,443 UART: [art] SIG.R = 21FBE78E785E2BE06E714C16225AEEB194F6506C889FFBD09C5F4471D10A6377DCB48B66E7D36B1F75BE145994076CA0
24,876,900 UART: [art] SIG.S = 6D95697E335964FED5188FFD036224EED0B146F9B01F2AD2672ECE8D96CC9C2CDDCE67636084B6BBCBD9BFB7B68E86E0
25,856,449 UART: Caliptra RT
25,857,148 UART: [state] CFI Enabled
25,988,643 UART: [rt] RT listening for mailbox commands...
26,019,944 UART: [rt]cmd =0xaabbccdd, len=4
26,021,292 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,774,409 ready_for_fw is high
3,774,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,454 >>> mbox cmd response: success
14,446,110 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
18,691,793 UART:
18,692,163 UART: Running Caliptra FMC ...
18,693,303 UART:
18,693,467 UART: [state] CFI Enabled
18,701,837 UART: [fht] FMC Alias Private Key: 7
20,467,678 UART: [art] Extend RT PCRs Done
20,468,900 UART: [art] Lock RT PCRs Done
20,470,667 UART: [art] Populate DV Done
20,476,306 UART: [fht] FMC Alias Private Key: 7
20,477,849 UART: [art] Derive CDI
20,478,670 UART: [art] Store in slot 0x4
20,521,272 UART: [art] Derive Key Pair
20,522,317 UART: [art] Store priv key in slot 0x5
22,948,912 UART: [art] Derive Key Pair - Done
22,961,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,575 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,070 UART: [art] PUB.X = 85AD3DA55AAF62AD45EE6C6305D07603E11A3934057B584A0CE159A9BA09CB6CB8AFDE11638AE790BED4B6AA74193344
24,676,334 UART: [art] PUB.Y = 546DC3D7CB17D835D06DACFD8E767272FB673F774C2C7ECF682DDC4D4AFE6F38E9F5B43556484C2783F1DC331865B314
24,683,598 UART: [art] SIG.R = 4D326FEDA84EDCD28015E744A6B3AC899DDFA6C16C120487F698B44ED4BF83C0A8D647577E749C8FD82C1B6650AED0B4
24,691,055 UART: [art] SIG.S = 0E2C2E1B0AF2527A0E12E10C627057175230859FFA0D82780972CA764D75CE8296F110B44E67FF3BC9BBC998C5E5D043
25,670,182 UART: Caliptra RT
25,670,894 UART: [state] CFI Enabled
25,803,471 UART: [rt] RT listening for mailbox commands...
25,834,834 UART: [rt]cmd =0xaabbccdd, len=4
25,836,292 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
191,975 UART:
192,348 UART: Running Caliptra ROM ...
193,703 UART:
193,864 UART: [state] CFI Enabled
264,809 UART: [state] LifecycleState = Unprovisioned
267,173 UART: [state] DebugLocked = No
269,411 UART: [state] WD Timer not started. Device not locked for debugging
274,630 UART: [kat] SHA2-256
464,529 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,281 UART: [kat] ++
475,758 UART: [kat] sha1
487,910 UART: [kat] SHA2-256
490,989 UART: [kat] SHA2-384
496,547 UART: [kat] SHA2-512-ACC
499,131 UART: [kat] ECC-384
2,950,994 UART: [kat] HMAC-384Kdf
2,972,613 UART: [kat] LMS
3,504,432 UART: [kat] --
3,509,496 UART: [cold-reset] ++
3,511,494 UART: [fht] FHT @ 0x50003400
3,523,889 UART: [idev] ++
3,524,600 UART: [idev] CDI.KEYID = 6
3,525,628 UART: [idev] SUBJECT.KEYID = 7
3,526,746 UART: [idev] UDS.KEYID = 0
3,527,671 ready_for_fw is high
3,527,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,044 UART: [idev] Erasing UDS.KEYID = 0
6,030,933 UART: [idev] Sha1 KeyId Algorithm
6,052,926 UART: [idev] --
6,058,725 UART: [ldev] ++
6,059,409 UART: [ldev] CDI.KEYID = 6
6,060,289 UART: [ldev] SUBJECT.KEYID = 5
6,061,441 UART: [ldev] AUTHORITY.KEYID = 7
6,062,722 UART: [ldev] FE.KEYID = 1
6,100,591 UART: [ldev] Erasing FE.KEYID = 1
8,604,891 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,986 UART: [ldev] --
10,412,084 UART: [fwproc] Wait for Commands...
10,415,092 UART: [fwproc] Recv command 0x46574c44
10,417,407 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,749 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,970 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,596 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,068 >>> mbox cmd response: success
14,681,171 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,684,186 UART: [afmc] ++
14,684,893 UART: [afmc] CDI.KEYID = 6
14,686,133 UART: [afmc] SUBJECT.KEYID = 7
14,687,566 UART: [afmc] AUTHORITY.KEYID = 5
17,214,652 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,487 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,593 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,680 UART: [afmc] --
19,013,345 UART: [cold-reset] --
19,017,314 UART: [state] Locking Datavault
19,023,104 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,288 UART: [state] Locking ICCM
19,027,279 UART: [exit] Launching FMC @ 0x40000130
19,035,939 UART:
19,036,170 UART: Running Caliptra FMC ...
19,037,197 UART:
19,037,346 UART: [state] CFI Enabled
19,097,690 UART: [fht] FMC Alias Private Key: 7
20,864,255 UART: [art] Extend RT PCRs Done
20,865,501 UART: [art] Lock RT PCRs Done
20,867,124 UART: [art] Populate DV Done
20,872,314 UART: [fht] FMC Alias Private Key: 7
20,873,951 UART: [art] Derive CDI
20,874,759 UART: [art] Store in slot 0x4
20,929,681 UART: [art] Derive Key Pair
20,930,745 UART: [art] Store priv key in slot 0x5
23,393,663 UART: [art] Derive Key Pair - Done
23,406,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,111 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,612 UART: [art] PUB.X = 260012A82309D0BDED559D9CBAF5C8AEBCC1A61E44F774E85FD9813B59130C29A8158B2F1A71CF9D5CDA3372BDD215EB
25,128,865 UART: [art] PUB.Y = 09D9229E54C6DA1525C9EC42E706B797D59F342D7AE046882CD2CB87C48C69A999C9C375BE7DD65D5CF0A51A05968B26
25,136,144 UART: [art] SIG.R = 62DB6811D429E6718ED38A1542D9AF544F1417FE56013F159AF6F362DE8D54A503324158DB5C61E3AA2B5C00B9393488
25,143,481 UART: [art] SIG.S = F4D3CBB48C26F39DD0BC91767C9BA698A820CBE74E97816DEF5133FDBAAFFBDC386C995B372642C552F620CAB882F9ED
26,122,309 UART: Caliptra RT
26,123,000 UART: [state] CFI Enabled
26,303,827 UART: [rt] RT listening for mailbox commands...
26,335,237 UART: [rt]cmd =0xaabbccdd, len=4
26,336,518 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,441,174 ready_for_fw is high
3,441,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,689 >>> mbox cmd response: success
14,823,748 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,113,379 UART:
19,113,758 UART: Running Caliptra FMC ...
19,114,858 UART:
19,115,012 UART: [state] CFI Enabled
19,180,327 UART: [fht] FMC Alias Private Key: 7
20,946,068 UART: [art] Extend RT PCRs Done
20,947,296 UART: [art] Lock RT PCRs Done
20,949,176 UART: [art] Populate DV Done
20,954,605 UART: [fht] FMC Alias Private Key: 7
20,956,316 UART: [art] Derive CDI
20,957,128 UART: [art] Store in slot 0x4
21,013,451 UART: [art] Derive Key Pair
21,014,487 UART: [art] Store priv key in slot 0x5
23,477,066 UART: [art] Derive Key Pair - Done
23,490,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,475 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,975 UART: [art] PUB.X = D97992EE089FF1F2BAACEBCE789D7E832D7CA08E21FB0A23FB5E86D90E91B831A08726A4AFF78363E2C96678D8A9ACC4
25,212,211 UART: [art] PUB.Y = 58CA3A677DA19204AFBA32D9FC787B9217143078F86D093571F4995D173674FF538FF255F123310E97706B031D80CA15
25,219,500 UART: [art] SIG.R = 5B4398088C431A908B399F41D80662B1D45A33F16E5BA12951F23DDD7BF04EAE71EC93EF7E79C73A85B8B95A3F2AF25B
25,226,888 UART: [art] SIG.S = 70F889FDAAC7965F829701E5966B9BDEDA9B9EEFEE366663B3667CE9B5273BF729A32CE65C89E014D02711CFC7401BAC
26,205,822 UART: Caliptra RT
26,206,537 UART: [state] CFI Enabled
26,386,902 UART: [rt] RT listening for mailbox commands...
26,418,160 UART: [rt]cmd =0xaabbccdd, len=4
26,419,519 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,575 writing to cptra_bootfsm_go
193,757 UART:
194,123 UART: Running Caliptra ROM ...
195,350 UART:
604,967 UART: [state] CFI Enabled
620,566 UART: [state] LifecycleState = Unprovisioned
622,960 UART: [state] DebugLocked = No
624,991 UART: [state] WD Timer not started. Device not locked for debugging
629,903 UART: [kat] SHA2-256
819,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,557 UART: [kat] ++
831,162 UART: [kat] sha1
842,965 UART: [kat] SHA2-256
846,040 UART: [kat] SHA2-384
851,970 UART: [kat] SHA2-512-ACC
854,554 UART: [kat] ECC-384
3,300,713 UART: [kat] HMAC-384Kdf
3,312,876 UART: [kat] LMS
3,844,686 UART: [kat] --
3,850,716 UART: [cold-reset] ++
3,851,745 UART: [fht] FHT @ 0x50003400
3,863,230 UART: [idev] ++
3,863,886 UART: [idev] CDI.KEYID = 6
3,864,886 UART: [idev] SUBJECT.KEYID = 7
3,866,066 UART: [idev] UDS.KEYID = 0
3,867,001 ready_for_fw is high
3,867,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,016,150 UART: [idev] Erasing UDS.KEYID = 0
6,344,439 UART: [idev] Sha1 KeyId Algorithm
6,366,100 UART: [idev] --
6,370,959 UART: [ldev] ++
6,371,696 UART: [ldev] CDI.KEYID = 6
6,372,620 UART: [ldev] SUBJECT.KEYID = 5
6,373,779 UART: [ldev] AUTHORITY.KEYID = 7
6,374,960 UART: [ldev] FE.KEYID = 1
6,386,579 UART: [ldev] Erasing FE.KEYID = 1
8,863,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,626 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,784 UART: [ldev] --
10,652,768 UART: [fwproc] Wait for Commands...
10,655,791 UART: [fwproc] Recv command 0x46574c44
10,658,103 UART: [fwproc] Recv'd Img size: 118548 bytes
14,161,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,366,850 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,927,293 >>> mbox cmd response: success
14,927,809 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
14,930,579 UART: [afmc] ++
14,931,329 UART: [afmc] CDI.KEYID = 6
14,932,517 UART: [afmc] SUBJECT.KEYID = 7
14,933,956 UART: [afmc] AUTHORITY.KEYID = 5
17,440,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,163,250 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,168 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,180,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,195,411 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,210,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,404 UART: [afmc] --
19,239,219 UART: [cold-reset] --
19,244,281 UART: [state] Locking Datavault
19,250,296 UART: [state] Locking PCR0, PCR1 and PCR31
19,252,446 UART: [state] Locking ICCM
19,254,118 UART: [exit] Launching FMC @ 0x40000130
19,262,800 UART:
19,263,044 UART: Running Caliptra FMC ...
19,264,154 UART:
19,264,320 UART: [state] CFI Enabled
19,272,368 UART: [fht] FMC Alias Private Key: 7
21,038,735 UART: [art] Extend RT PCRs Done
21,039,965 UART: [art] Lock RT PCRs Done
21,041,526 UART: [art] Populate DV Done
21,046,897 UART: [fht] FMC Alias Private Key: 7
21,048,532 UART: [art] Derive CDI
21,049,283 UART: [art] Store in slot 0x4
21,091,612 UART: [art] Derive Key Pair
21,092,621 UART: [art] Store priv key in slot 0x5
23,519,085 UART: [art] Derive Key Pair - Done
23,531,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,238,041 UART: [art] Erasing AUTHORITY.KEYID = 7
25,239,548 UART: [art] PUB.X = DC99ECB7ED0E820E787975F79686AE83D26C2D3A9B94463A680355BC556183BF0643EC4160EAEDDC8DCC2F5FF188EDAF
25,246,813 UART: [art] PUB.Y = 9C1775E6D46020DF104EE0283A3AFAC50AC7DB9C99DC30A5D492D9B59FD35852C78FADE38F636EAED35641D7F8D536D2
25,254,118 UART: [art] SIG.R = 117D17883047518D7C50430384ECB9ABFE2D969DD340A3D19C7DEF2A00662FE1F6BBD10AA84BBC1A48723E2991E6013D
25,261,486 UART: [art] SIG.S = 89F75D5810C563536F9C23AA6A586FB07186B555D087BAA2CA131985C314AC58894BB9DB1E38B289D8C07109B598D3C5
26,240,763 UART: Caliptra RT
26,241,468 UART: [state] CFI Enabled
26,373,585 UART: [rt] RT listening for mailbox commands...
26,405,024 UART: [rt]cmd =0xaabbccdd, len=4
26,406,348 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,756,619 ready_for_fw is high
3,757,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,205 >>> mbox cmd response: success
15,047,832 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
19,295,127 UART:
19,295,501 UART: Running Caliptra FMC ...
19,296,698 UART:
19,296,862 UART: [state] CFI Enabled
19,305,023 UART: [fht] FMC Alias Private Key: 7
21,070,664 UART: [art] Extend RT PCRs Done
21,071,881 UART: [art] Lock RT PCRs Done
21,073,733 UART: [art] Populate DV Done
21,079,162 UART: [fht] FMC Alias Private Key: 7
21,080,839 UART: [art] Derive CDI
21,081,666 UART: [art] Store in slot 0x4
21,124,537 UART: [art] Derive Key Pair
21,125,534 UART: [art] Store priv key in slot 0x5
23,552,756 UART: [art] Derive Key Pair - Done
23,565,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,038 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,547 UART: [art] PUB.X = D13B45C348344DD95BB1F220BF8523FC893CBE88926ABC320660612F9F780F836882EBF07BC2004D751AFAB3A76D818F
25,280,821 UART: [art] PUB.Y = 78A36433215BEAE585CDA8576306B7D00636A1F128B1B6A0803CAEC8B498A8C86626940EADC0575D3FB00B279F653E9D
25,288,022 UART: [art] SIG.R = F733EE13CA4B0A57D46D3D76199E7ECF18C0CD217A6AB68C72A541CCADE9DA8E94ED2A4048BF12294FDBA5C533258CD7
25,295,497 UART: [art] SIG.S = 8FB5819A05D37EFD57757F8D380A7CFA11B9BB420BB5CC85175B71C74B17D60F116C9E04B48D86E2825C326CA01C4361
26,274,072 UART: Caliptra RT
26,274,762 UART: [state] CFI Enabled
26,407,865 UART: [rt] RT listening for mailbox commands...
26,439,593 UART: [rt]cmd =0xaabbccdd, len=4
26,441,073 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,217 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,923 UART: [kat] SHA2-256
881,854 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,969 UART: [kat] ++
886,121 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,666 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,821 UART: [fht] Storing FHT @ 0x50003400
1,479,812 UART: [idev] ++
1,479,980 UART: [idev] CDI.KEYID = 6
1,480,340 UART: [idev] SUBJECT.KEYID = 7
1,480,764 UART: [idev] UDS.KEYID = 0
1,481,109 ready_for_fw is high
1,481,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,504,608 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,284 UART: [idev] --
1,514,457 UART: [ldev] ++
1,514,625 UART: [ldev] CDI.KEYID = 6
1,514,988 UART: [ldev] SUBJECT.KEYID = 5
1,515,414 UART: [ldev] AUTHORITY.KEYID = 7
1,515,877 UART: [ldev] FE.KEYID = 1
1,521,047 UART: [ldev] Erasing FE.KEYID = 1
1,546,580 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,746 UART: [ldev] --
1,586,247 UART: [fwproc] Waiting for Commands...
1,587,116 UART: [fwproc] Received command 0x46574c44
1,587,907 UART: [fwproc] Received Image of size 118548 bytes
2,931,985 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,931 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,214 >>> mbox cmd response: success
3,131,214 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,132,452 UART: [afmc] ++
3,132,620 UART: [afmc] CDI.KEYID = 6
3,132,982 UART: [afmc] SUBJECT.KEYID = 7
3,133,407 UART: [afmc] AUTHORITY.KEYID = 5
3,168,420 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,258 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,941 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,901 UART: [afmc] --
3,211,939 UART: [cold-reset] --
3,212,965 UART: [state] Locking Datavault
3,214,188 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,792 UART: [state] Locking ICCM
3,215,312 UART: [exit] Launching FMC @ 0x40000130
3,220,642 UART:
3,220,658 UART: Running Caliptra FMC ...
3,221,066 UART:
3,221,120 UART: [state] CFI Enabled
3,231,924 UART: [fht] FMC Alias Private Key: 7
3,350,594 UART: [art] Extend RT PCRs Done
3,351,022 UART: [art] Lock RT PCRs Done
3,352,660 UART: [art] Populate DV Done
3,360,657 UART: [fht] FMC Alias Private Key: 7
3,361,765 UART: [art] Derive CDI
3,362,045 UART: [art] Store in slot 0x4
3,448,071 UART: [art] Derive Key Pair
3,448,431 UART: [art] Store priv key in slot 0x5
3,462,358 UART: [art] Derive Key Pair - Done
3,477,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,525 UART: [art] PUB.X = 3158B0D5144A4FFBD7FEC66B9AE57A1AFAF5C885D857B47D1398165D9AAF159C33BF8F8BB112A9581027795592DF1DE1
3,500,307 UART: [art] PUB.Y = D03AD5377395C77D18011307F6D0A8030B6F64E7E1358B169F778A817F4EC78681C3A5F9E95C0A2A01C2703F21056A6F
3,507,232 UART: [art] SIG.R = 90886E77E0A7B7643DB28496C0B53FCCB94EC6DE281C77EB5D20F0517BE7A10EDBFD5B66B3081CECD2A1185362781E65
3,514,008 UART: [art] SIG.S = 1CB390056496D94C720D4929998AE4ECFB361AC06476DB5A55940AA3DDB3D3E27460A49F79339B8F1F85A899ED4967C5
3,537,877 UART: Caliptra RT
3,538,128 UART: [state] CFI Enabled
3,657,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,660 UART: [rt]cmd =0xaabbccdd, len=4
3,689,642 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,451 ready_for_fw is high
1,362,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,672 >>> mbox cmd response: success
2,979,672 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,040,983 UART:
3,040,999 UART: Running Caliptra FMC ...
3,041,407 UART:
3,041,461 UART: [state] CFI Enabled
3,051,367 UART: [fht] FMC Alias Private Key: 7
3,169,963 UART: [art] Extend RT PCRs Done
3,170,391 UART: [art] Lock RT PCRs Done
3,171,881 UART: [art] Populate DV Done
3,180,032 UART: [fht] FMC Alias Private Key: 7
3,181,128 UART: [art] Derive CDI
3,181,408 UART: [art] Store in slot 0x4
3,266,944 UART: [art] Derive Key Pair
3,267,304 UART: [art] Store priv key in slot 0x5
3,280,581 UART: [art] Derive Key Pair - Done
3,295,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,510 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,275 UART: [art] PUB.X = 510F80297F4818937C00BCFB43B26C05616027F83E32A578ED0291ED34E78D03D7BB4228F5E60B22033DE90ADA6743DA
3,318,002 UART: [art] PUB.Y = E64B616315B3A755C92D495D452753391A319DA235D75AECA9E587F4610087833440776FC9934413F1BAD712FF996D94
3,324,920 UART: [art] SIG.R = B49973F576D2791AC7F78BE98B13E4F3C32C339A67C748C66F094AB4DFBFC9F00A2F303BC570B033BDF8022A2795CE03
3,331,688 UART: [art] SIG.S = 3554AF74D81CE6389F5D683E0161777A7E7BB7D155867C178A767ACA90BCAD49401BAFC498D8B1587FC582F2F25E38F2
3,355,087 UART: Caliptra RT
3,355,338 UART: [state] CFI Enabled
3,476,270 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,814 UART: [rt]cmd =0xaabbccdd, len=4
3,507,840 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,574 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,764 UART: [kat] SHA2-256
892,702 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,545 UART: [kat] LMS
1,475,741 UART: [kat] --
1,476,318 UART: [cold-reset] ++
1,476,898 UART: [fht] Storing FHT @ 0x50003400
1,479,825 UART: [idev] ++
1,479,993 UART: [idev] CDI.KEYID = 6
1,480,353 UART: [idev] SUBJECT.KEYID = 7
1,480,777 UART: [idev] UDS.KEYID = 0
1,481,122 ready_for_fw is high
1,481,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,017 UART: [idev] Erasing UDS.KEYID = 0
1,506,353 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,963 UART: [idev] --
1,516,034 UART: [ldev] ++
1,516,202 UART: [ldev] CDI.KEYID = 6
1,516,565 UART: [ldev] SUBJECT.KEYID = 5
1,516,991 UART: [ldev] AUTHORITY.KEYID = 7
1,517,454 UART: [ldev] FE.KEYID = 1
1,522,752 UART: [ldev] Erasing FE.KEYID = 1
1,548,499 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,881 UART: [ldev] --
1,588,364 UART: [fwproc] Waiting for Commands...
1,589,075 UART: [fwproc] Received command 0x46574c44
1,589,866 UART: [fwproc] Received Image of size 118548 bytes
2,933,160 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,487 >>> mbox cmd response: success
3,131,487 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,132,527 UART: [afmc] ++
3,132,695 UART: [afmc] CDI.KEYID = 6
3,133,057 UART: [afmc] SUBJECT.KEYID = 7
3,133,482 UART: [afmc] AUTHORITY.KEYID = 5
3,168,707 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,973 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,462 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,345 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,028 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,892 UART: [afmc] --
3,211,830 UART: [cold-reset] --
3,212,830 UART: [state] Locking Datavault
3,213,631 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,235 UART: [state] Locking ICCM
3,214,707 UART: [exit] Launching FMC @ 0x40000130
3,220,037 UART:
3,220,053 UART: Running Caliptra FMC ...
3,220,461 UART:
3,220,604 UART: [state] CFI Enabled
3,231,350 UART: [fht] FMC Alias Private Key: 7
3,349,660 UART: [art] Extend RT PCRs Done
3,350,088 UART: [art] Lock RT PCRs Done
3,351,742 UART: [art] Populate DV Done
3,360,047 UART: [fht] FMC Alias Private Key: 7
3,361,095 UART: [art] Derive CDI
3,361,375 UART: [art] Store in slot 0x4
3,447,415 UART: [art] Derive Key Pair
3,447,775 UART: [art] Store priv key in slot 0x5
3,460,914 UART: [art] Derive Key Pair - Done
3,475,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,999 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,764 UART: [art] PUB.X = 6E11EA0999A47E38F2D0A05767E2E28BDCD7AAB55AFDD8FAF452E6A69276A5067C9A15666421253E509E8C3B0F7EB292
3,498,535 UART: [art] PUB.Y = ED9B8691D52021795C850F064463A43445EB58043579FBD3CCB2B290659B18E285B60A0C7182E7971AFE96149584FBD5
3,505,464 UART: [art] SIG.R = 9CD7358AEA0F0ACE7DD4D13273A54679C2AFC89D6E905F0CC9A2622A7E16AAA71FD1B42FD6D76318CD3E1264338E27DC
3,512,243 UART: [art] SIG.S = 94AA8F61B2B2D03656037017C3293AC0F1FEBDC30228A1120243608F07AB132C3ADC7792D7D4D403F26C74316EFE161B
3,536,254 UART: Caliptra RT
3,536,597 UART: [state] CFI Enabled
3,656,672 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,980 UART: [rt]cmd =0xaabbccdd, len=4
3,687,860 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,756 ready_for_fw is high
1,362,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,509 >>> mbox cmd response: success
2,980,509 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
3,042,886 UART:
3,042,902 UART: Running Caliptra FMC ...
3,043,310 UART:
3,043,453 UART: [state] CFI Enabled
3,053,733 UART: [fht] FMC Alias Private Key: 7
3,172,937 UART: [art] Extend RT PCRs Done
3,173,365 UART: [art] Lock RT PCRs Done
3,174,723 UART: [art] Populate DV Done
3,182,938 UART: [fht] FMC Alias Private Key: 7
3,184,046 UART: [art] Derive CDI
3,184,326 UART: [art] Store in slot 0x4
3,269,986 UART: [art] Derive Key Pair
3,270,346 UART: [art] Store priv key in slot 0x5
3,283,599 UART: [art] Derive Key Pair - Done
3,298,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,836 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,601 UART: [art] PUB.X = 1CAE7DE37DF76C3481E1FA94E59A8AF59FED7969912FDD3721CF227A00BE77D38861E757DD505F90772EED80128A96B2
3,321,359 UART: [art] PUB.Y = 58E2AF9D39FECF830590A9840E059C76B8D4A48C1F8281D6AB9514DF48BD9C9D615FE398E9FFBD101C657738903A70A4
3,328,308 UART: [art] SIG.R = C2563572AD6248C29BC195FD2451C94D9477E8A9776C99CE54C144E74559837BB15CF03A02F6B7283B5F436622664989
3,335,065 UART: [art] SIG.S = 495DACB3F5583CEEB3951A466076954DDB2EE283DA689407BAB82759BC76BEDA3837F01549366BE674C6D75AE6256BB4
3,358,966 UART: Caliptra RT
3,359,309 UART: [state] CFI Enabled
3,478,681 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,013 UART: [rt]cmd =0xaabbccdd, len=4
3,509,973 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
916,043 UART: [kat] HMAC-384Kdf
920,603 UART: [kat] LMS
1,168,915 UART: [kat] --
1,169,826 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 ready_for_fw is high
1,174,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,753 UART: [idev] Erasing UDS.KEYID = 0
1,198,473 UART: [idev] Sha1 KeyId Algorithm
1,207,311 UART: [idev] --
1,208,514 UART: [ldev] ++
1,208,682 UART: [ldev] CDI.KEYID = 6
1,209,046 UART: [ldev] SUBJECT.KEYID = 5
1,209,473 UART: [ldev] AUTHORITY.KEYID = 7
1,209,936 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,693 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,166 UART: [ldev] --
1,280,587 UART: [fwproc] Wait for Commands...
1,281,158 UART: [fwproc] Recv command 0x46574c44
1,281,891 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,832 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,711 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,291 >>> mbox cmd response: success
2,823,291 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,824,363 UART: [afmc] ++
2,824,531 UART: [afmc] CDI.KEYID = 6
2,824,894 UART: [afmc] SUBJECT.KEYID = 7
2,825,320 UART: [afmc] AUTHORITY.KEYID = 5
2,860,535 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,140 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,889 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,599 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,480 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,181 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,946 UART: [afmc] --
2,903,847 UART: [cold-reset] --
2,904,745 UART: [state] Locking Datavault
2,906,036 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,640 UART: [state] Locking ICCM
2,907,106 UART: [exit] Launching FMC @ 0x40000130
2,912,436 UART:
2,912,452 UART: Running Caliptra FMC ...
2,912,860 UART:
2,912,914 UART: [state] CFI Enabled
2,923,558 UART: [fht] FMC Alias Private Key: 7
3,042,576 UART: [art] Extend RT PCRs Done
3,043,004 UART: [art] Lock RT PCRs Done
3,044,380 UART: [art] Populate DV Done
3,052,521 UART: [fht] FMC Alias Private Key: 7
3,053,531 UART: [art] Derive CDI
3,053,811 UART: [art] Store in slot 0x4
3,139,788 UART: [art] Derive Key Pair
3,140,148 UART: [art] Store priv key in slot 0x5
3,153,516 UART: [art] Derive Key Pair - Done
3,168,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,655 UART: [art] PUB.X = 36BB360094E81F5B57DDAACAAC6FF2080D7EAFE5D174CBD27403513869104A2C828DB600AA2145A477A6606341B0E36C
3,191,380 UART: [art] PUB.Y = 205505BBA25C9EDCA4F9DD007D5D7C41A389F358ED0DCB206FBFD61E2FE9A040D29A7E454A53ED7D6C74F94736B1A800
3,198,298 UART: [art] SIG.R = 6C7A51294626BBA9ADC79507CF8FE5AE9EE8180EB2716DF2B19E90736B07859EA2C8558066CBC86400BD250BDB2D4A4A
3,205,046 UART: [art] SIG.S = 19F81562821D415990DB9BDD0AF46C567F897480D05972F2A3A0D1D5451E8F942D813E2183FD4D57C7F6D11F1D3284BB
3,229,273 UART: Caliptra RT
3,229,524 UART: [state] CFI Enabled
3,349,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,430 UART: [rt]cmd =0xaabbccdd, len=4
3,380,518 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,976 ready_for_fw is high
1,058,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,936 >>> mbox cmd response: success
2,676,936 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,738,549 UART:
2,738,565 UART: Running Caliptra FMC ...
2,738,973 UART:
2,739,027 UART: [state] CFI Enabled
2,749,407 UART: [fht] FMC Alias Private Key: 7
2,868,489 UART: [art] Extend RT PCRs Done
2,868,917 UART: [art] Lock RT PCRs Done
2,870,589 UART: [art] Populate DV Done
2,878,844 UART: [fht] FMC Alias Private Key: 7
2,879,980 UART: [art] Derive CDI
2,880,260 UART: [art] Store in slot 0x4
2,965,725 UART: [art] Derive Key Pair
2,966,085 UART: [art] Store priv key in slot 0x5
2,979,615 UART: [art] Derive Key Pair - Done
2,994,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,955 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,720 UART: [art] PUB.X = 70034E4AFB1DF37E9B2EF60881433358CEF22CBADE0ACDD50C5871D1B4408D29F76DC34D7F2CE4C9ECCFF6CE8E101155
3,017,500 UART: [art] PUB.Y = 231D2D7FE98322B4CE73A68312B74F6C3A8048CD7367523794B98933F9584967E2F78055C151872410C681A382915734
3,024,430 UART: [art] SIG.R = 50C9CDF78B307F4ACA6F575860C220CC0EF67F398592C640461FEB657EB30F1186B53BCC26FFAE3F2208C48EBBC723F4
3,031,205 UART: [art] SIG.S = AC39F9163F8FACF0592DC07DF69B70AE0AD71F7021B1FF43A4891DF8D5818B86CE703B8C655383CCADD3738FDFBDD46D
3,054,952 UART: Caliptra RT
3,055,203 UART: [state] CFI Enabled
3,175,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,762 UART: [rt]cmd =0xaabbccdd, len=4
3,206,796 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,035 UART: [kat] SHA2-256
901,975 UART: [kat] SHA2-384
904,966 UART: [kat] SHA2-512-ACC
906,867 UART: [kat] ECC-384
916,870 UART: [kat] HMAC-384Kdf
921,552 UART: [kat] LMS
1,169,864 UART: [kat] --
1,170,763 UART: [cold-reset] ++
1,171,215 UART: [fht] FHT @ 0x50003400
1,173,999 UART: [idev] ++
1,174,167 UART: [idev] CDI.KEYID = 6
1,174,528 UART: [idev] SUBJECT.KEYID = 7
1,174,953 UART: [idev] UDS.KEYID = 0
1,175,299 ready_for_fw is high
1,175,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,754 UART: [idev] Erasing UDS.KEYID = 0
1,199,702 UART: [idev] Sha1 KeyId Algorithm
1,208,586 UART: [idev] --
1,209,707 UART: [ldev] ++
1,209,875 UART: [ldev] CDI.KEYID = 6
1,210,239 UART: [ldev] SUBJECT.KEYID = 5
1,210,666 UART: [ldev] AUTHORITY.KEYID = 7
1,211,129 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,242,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,404 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,861 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,819 UART: [fwproc] Recv command 0x46574c44
1,283,552 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,212 >>> mbox cmd response: success
2,826,212 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,827,270 UART: [afmc] ++
2,827,438 UART: [afmc] CDI.KEYID = 6
2,827,801 UART: [afmc] SUBJECT.KEYID = 7
2,828,227 UART: [afmc] AUTHORITY.KEYID = 5
2,864,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,699 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,448 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,039 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,567 UART: [afmc] --
2,907,616 UART: [cold-reset] --
2,908,486 UART: [state] Locking Datavault
2,909,497 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,101 UART: [state] Locking ICCM
2,910,595 UART: [exit] Launching FMC @ 0x40000130
2,915,925 UART:
2,915,941 UART: Running Caliptra FMC ...
2,916,349 UART:
2,916,492 UART: [state] CFI Enabled
2,927,082 UART: [fht] FMC Alias Private Key: 7
3,046,450 UART: [art] Extend RT PCRs Done
3,046,878 UART: [art] Lock RT PCRs Done
3,048,620 UART: [art] Populate DV Done
3,056,985 UART: [fht] FMC Alias Private Key: 7
3,058,135 UART: [art] Derive CDI
3,058,415 UART: [art] Store in slot 0x4
3,144,292 UART: [art] Derive Key Pair
3,144,652 UART: [art] Store priv key in slot 0x5
3,157,968 UART: [art] Derive Key Pair - Done
3,172,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,820 UART: [art] PUB.X = BA523D416171B30C08BB520000C4DAD11A20EBA21A3ADC7AAE72F5F27E8B95F682CAD6BCEDCA0EF61BC9C128FBF89A29
3,195,565 UART: [art] PUB.Y = 30A5FFB3720A43B30C6C74A963510E8D7BBC77B2E306991673A13F6DB3414E9D675C8E28EC886C0D924D1978DC428097
3,202,500 UART: [art] SIG.R = C2287201EC49EC5650ECAA8BC38A826D646C02980D7CD5A7FA3C69987CA25CE299ECDEE634753F9F4E32CE7FF85B9902
3,209,272 UART: [art] SIG.S = 9922FFEB5DF53E8ABB2432A909385C281E03704033AB062BDE8B19F607B630CE0D48CF789FB4D719BA325B1DF36B2BA5
3,233,607 UART: Caliptra RT
3,233,950 UART: [state] CFI Enabled
3,353,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,858 UART: [rt]cmd =0xaabbccdd, len=4
3,384,732 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,281 ready_for_fw is high
1,059,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,467 >>> mbox cmd response: success
2,677,467 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,739,344 UART:
2,739,360 UART: Running Caliptra FMC ...
2,739,768 UART:
2,739,911 UART: [state] CFI Enabled
2,750,841 UART: [fht] FMC Alias Private Key: 7
2,870,011 UART: [art] Extend RT PCRs Done
2,870,439 UART: [art] Lock RT PCRs Done
2,872,081 UART: [art] Populate DV Done
2,880,064 UART: [fht] FMC Alias Private Key: 7
2,881,202 UART: [art] Derive CDI
2,881,482 UART: [art] Store in slot 0x4
2,966,781 UART: [art] Derive Key Pair
2,967,141 UART: [art] Store priv key in slot 0x5
2,980,399 UART: [art] Derive Key Pair - Done
2,995,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,646 UART: [art] PUB.X = BB36B49213CFACC10C9F2632FDFE0CC65580BC5277AF62BAE5AC864C0B15DD9345D1746B3647B81CE3DE3BEF51DF8278
3,018,427 UART: [art] PUB.Y = 0F278EF273D6D7FDEC95E7C86C2C0126F61F7957E17716FCBE58AB49D794273BF0D9E6197441B55F85021CC26B2109E2
3,025,369 UART: [art] SIG.R = 29CC4A91E5EAC0C2495CFFE1EFB50B2BF3EA7D97B0AC5080F0F0BC48E661EF0DB4A25CE32996F9D759435DAB03AE7D90
3,032,156 UART: [art] SIG.S = E42DC7DB0C60EFBB52EF15D4F0A4353DB359A7277056C594B477BD29F0FE8BF8BA66015949086F0B22A215357D5932BC
3,055,326 UART: Caliptra RT
3,055,669 UART: [state] CFI Enabled
3,175,700 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,176 UART: [rt]cmd =0xaabbccdd, len=4
3,207,238 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,402 UART: [kat] SHA2-512-ACC
908,303 UART: [kat] ECC-384
917,878 UART: [kat] HMAC-384Kdf
922,436 UART: [kat] LMS
1,170,764 UART: [kat] --
1,171,805 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 ready_for_fw is high
1,176,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,490 UART: [idev] Erasing UDS.KEYID = 0
1,200,195 UART: [idev] Sha1 KeyId Algorithm
1,208,749 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,242,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,317 UART: [ldev] --
1,281,688 UART: [fwproc] Wait for Commands...
1,282,464 UART: [fwproc] Recv command 0x46574c44
1,283,192 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,269 >>> mbox cmd response: success
2,827,269 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,828,311 UART: [afmc] ++
2,828,479 UART: [afmc] CDI.KEYID = 6
2,828,841 UART: [afmc] SUBJECT.KEYID = 7
2,829,266 UART: [afmc] AUTHORITY.KEYID = 5
2,864,205 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,682 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,139 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,022 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,723 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,521 UART: [afmc] --
2,907,605 UART: [cold-reset] --
2,908,519 UART: [state] Locking Datavault
2,909,512 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,116 UART: [state] Locking ICCM
2,910,786 UART: [exit] Launching FMC @ 0x40000130
2,916,116 UART:
2,916,132 UART: Running Caliptra FMC ...
2,916,540 UART:
2,916,594 UART: [state] CFI Enabled
2,927,082 UART: [fht] FMC Alias Private Key: 7
3,045,772 UART: [art] Extend RT PCRs Done
3,046,200 UART: [art] Lock RT PCRs Done
3,047,854 UART: [art] Populate DV Done
3,056,203 UART: [fht] FMC Alias Private Key: 7
3,057,251 UART: [art] Derive CDI
3,057,531 UART: [art] Store in slot 0x4
3,143,326 UART: [art] Derive Key Pair
3,143,686 UART: [art] Store priv key in slot 0x5
3,156,938 UART: [art] Derive Key Pair - Done
3,171,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,780 UART: [art] PUB.X = C6F132C4D39BA9C6604BF6022DAF8E3F663750A929B94903205B031A2DE12826AB12C554BDE1F0759877D0B6E0757AE7
3,194,543 UART: [art] PUB.Y = AF686FECC05D3749CCA83491B02FEFEADC55A874F765E82B63953A56A43A6F5DA3A93544B529662C7C5B2283CFD1FABB
3,201,511 UART: [art] SIG.R = 17025BE340EC21AB22FE5F5024869B1163F11E6D51F9F83F093DB06059A0521ED39EA3B0C3CA1307A032EEC6A1D19D84
3,208,278 UART: [art] SIG.S = 7BA65552ACD82D35F1EA8B36D933796FD6800457F9A7542828B7139B87064A44706996D92300034F021D78A751DF33C3
3,232,442 UART: Caliptra RT
3,232,693 UART: [state] CFI Enabled
3,351,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,643 UART: [rt]cmd =0xaabbccdd, len=4
3,382,665 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,051 ready_for_fw is high
1,061,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,748 >>> mbox cmd response: success
2,678,748 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,739,849 UART:
2,739,865 UART: Running Caliptra FMC ...
2,740,273 UART:
2,740,327 UART: [state] CFI Enabled
2,751,125 UART: [fht] FMC Alias Private Key: 7
2,869,897 UART: [art] Extend RT PCRs Done
2,870,325 UART: [art] Lock RT PCRs Done
2,871,681 UART: [art] Populate DV Done
2,879,872 UART: [fht] FMC Alias Private Key: 7
2,880,848 UART: [art] Derive CDI
2,881,128 UART: [art] Store in slot 0x4
2,966,995 UART: [art] Derive Key Pair
2,967,355 UART: [art] Store priv key in slot 0x5
2,980,827 UART: [art] Derive Key Pair - Done
2,995,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,914 UART: [art] PUB.X = A809FA9906047C34864E114A2E70E0B6FD7BBAC063AC02680591BED11F5C46406E200DA2A1DFD22DBF57BAE7D22EB2AC
3,018,684 UART: [art] PUB.Y = 3E730A41F6ABEBC84676BEDD094B7A6ED1BC5889D6FFC40E8493BE6E34E129D731EE4F1294BD459BABF69FF3BC30C653
3,025,647 UART: [art] SIG.R = B1E71EB9583C9B344310406F53F29763C587967DC2FF9D6138EA1D3D62DEFE204CFEE6C096A0139D0BD788C2D747DB42
3,032,422 UART: [art] SIG.S = F1C306DE40112F03D4B3E2FE2A12098968910B7483536A9C3DEAD275EC7E1B973110BE8226A835F0AB5024579DFF0175
3,056,439 UART: Caliptra RT
3,056,690 UART: [state] CFI Enabled
3,176,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,650 UART: [rt]cmd =0xaabbccdd, len=4
3,207,790 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,908 UART: [state] WD Timer not started. Device not locked for debugging
88,137 UART: [kat] SHA2-256
893,787 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,912 UART: [kat] ++
898,064 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,819 UART: [kat] SHA2-512-ACC
908,720 UART: [kat] ECC-384
918,105 UART: [kat] HMAC-384Kdf
922,683 UART: [kat] LMS
1,171,011 UART: [kat] --
1,172,006 UART: [cold-reset] ++
1,172,508 UART: [fht] FHT @ 0x50003400
1,175,363 UART: [idev] ++
1,175,531 UART: [idev] CDI.KEYID = 6
1,175,891 UART: [idev] SUBJECT.KEYID = 7
1,176,315 UART: [idev] UDS.KEYID = 0
1,176,660 ready_for_fw is high
1,176,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,626 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,217,890 UART: [ldev] Erasing FE.KEYID = 1
1,244,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,410 UART: [ldev] --
1,283,739 UART: [fwproc] Wait for Commands...
1,284,521 UART: [fwproc] Recv command 0x46574c44
1,285,249 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,957 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,127 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,366 >>> mbox cmd response: success
2,827,366 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,828,534 UART: [afmc] ++
2,828,702 UART: [afmc] CDI.KEYID = 6
2,829,064 UART: [afmc] SUBJECT.KEYID = 7
2,829,489 UART: [afmc] AUTHORITY.KEYID = 5
2,864,068 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,962 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,845 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,546 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,294 UART: [afmc] --
2,907,370 UART: [cold-reset] --
2,908,110 UART: [state] Locking Datavault
2,909,177 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,781 UART: [state] Locking ICCM
2,910,395 UART: [exit] Launching FMC @ 0x40000130
2,915,725 UART:
2,915,741 UART: Running Caliptra FMC ...
2,916,149 UART:
2,916,292 UART: [state] CFI Enabled
2,926,946 UART: [fht] FMC Alias Private Key: 7
3,046,284 UART: [art] Extend RT PCRs Done
3,046,712 UART: [art] Lock RT PCRs Done
3,048,114 UART: [art] Populate DV Done
3,056,199 UART: [fht] FMC Alias Private Key: 7
3,057,145 UART: [art] Derive CDI
3,057,425 UART: [art] Store in slot 0x4
3,143,490 UART: [art] Derive Key Pair
3,143,850 UART: [art] Store priv key in slot 0x5
3,157,162 UART: [art] Derive Key Pair - Done
3,172,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,492 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,257 UART: [art] PUB.X = EA46E4FBF5848482E1795CF84B0295A4FBC4500E6434A19D64D92BAADBB5B03C8EA2D7CC746E3856F337CAB974A3806D
3,195,035 UART: [art] PUB.Y = 5EB41B90E43D65129EB68CAF0D98669155DC8FE90647A479C1FC1A8308B53DBB0B73DC6F364E59FFAD43521F437340CA
3,201,983 UART: [art] SIG.R = E45293BE231746B26DF154D8C8B7B3661A630E38C653EC3C110591375C9F05FFEA0216D00DA442893B8EB34BDE11C3EC
3,208,744 UART: [art] SIG.S = 852BB70CCE70B6145CB92FF06058091389B60E37FCC5A58F758A7D3ABD2CC7EDFD57FF8FFA052F940EBDDEF8C8B56916
3,232,651 UART: Caliptra RT
3,232,994 UART: [state] CFI Enabled
3,352,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,902 UART: [rt]cmd =0xaabbccdd, len=4
3,383,974 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,038 ready_for_fw is high
1,060,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,673 >>> mbox cmd response: success
2,677,673 <<< Executing mbox cmd 0xaabbccdd (4 bytes) from SoC
2,739,694 UART:
2,739,710 UART: Running Caliptra FMC ...
2,740,118 UART:
2,740,261 UART: [state] CFI Enabled
2,751,163 UART: [fht] FMC Alias Private Key: 7
2,869,909 UART: [art] Extend RT PCRs Done
2,870,337 UART: [art] Lock RT PCRs Done
2,871,723 UART: [art] Populate DV Done
2,879,868 UART: [fht] FMC Alias Private Key: 7
2,880,882 UART: [art] Derive CDI
2,881,162 UART: [art] Store in slot 0x4
2,966,797 UART: [art] Derive Key Pair
2,967,157 UART: [art] Store priv key in slot 0x5
2,980,025 UART: [art] Derive Key Pair - Done
2,994,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,551 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,316 UART: [art] PUB.X = EF1A7FC41A97BCC0D39438C958BAA66B00E321D8CA3DBFDC698AA50ADFFCE10A73C8EB6E06704E8036A3FED6CF14707C
3,018,083 UART: [art] PUB.Y = 776D1384B3868C41FF2EB576A244FB8C80308591E729A501B0145014C243389378DB2F9F27A753EE48E6D3468FE49EB1
3,025,024 UART: [art] SIG.R = 00156A5D193C9C0C72371EFECEDD7041C6D91343B808E000C0DC69929F8649C95D9ED9CA9EDF948BEADD8D38755FEE22
3,031,758 UART: [art] SIG.S = 637FA417534952EBB3359B3818841B3FECB3B273306C8233A0D624AE4F7ADF7EFF00BE60938C3620F73EF8BED0B3C2EC
3,055,414 UART: Caliptra RT
3,055,757 UART: [state] CFI Enabled
3,176,336 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,814 UART: [rt]cmd =0xaabbccdd, len=4
3,207,788 >>> mbox cmd response: failed
test test_mailbox::test_unimplemented_cmds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
test test_panic_missing::test_panic_missing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
192,253 UART:
192,599 UART: Running Caliptra ROM ...
193,797 UART:
193,959 UART: [state] CFI Enabled
261,421 UART: [state] LifecycleState = Unprovisioned
263,412 UART: [state] DebugLocked = No
264,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,976 UART: [kat] SHA2-256
438,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,184 UART: [kat] ++
449,674 UART: [kat] sha1
461,615 UART: [kat] SHA2-256
464,273 UART: [kat] SHA2-384
469,935 UART: [kat] SHA2-512-ACC
472,288 UART: [kat] ECC-384
2,766,138 UART: [kat] HMAC-384Kdf
2,797,207 UART: [kat] LMS
3,987,463 UART: [kat] --
3,992,632 UART: [cold-reset] ++
3,994,919 UART: [fht] Storing FHT @ 0x50003400
4,007,745 UART: [idev] ++
4,008,316 UART: [idev] CDI.KEYID = 6
4,009,237 UART: [idev] SUBJECT.KEYID = 7
4,010,487 UART: [idev] UDS.KEYID = 0
4,011,553 ready_for_fw is high
4,011,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,834 UART: [idev] Erasing UDS.KEYID = 0
7,346,300 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,073 UART: [idev] --
7,374,313 UART: [ldev] ++
7,374,882 UART: [ldev] CDI.KEYID = 6
7,375,824 UART: [ldev] SUBJECT.KEYID = 5
7,377,051 UART: [ldev] AUTHORITY.KEYID = 7
7,378,281 UART: [ldev] FE.KEYID = 1
7,422,007 UART: [ldev] Erasing FE.KEYID = 1
10,757,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,176 UART: [ldev] --
13,136,636 UART: [fwproc] Waiting for Commands...
13,139,267 UART: [fwproc] Received command 0x46574c44
13,141,449 UART: [fwproc] Received Image of size 118548 bytes
17,242,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,389,929 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,871 >>> mbox cmd response: success
17,723,693 UART: [afmc] ++
17,724,311 UART: [afmc] CDI.KEYID = 6
17,725,231 UART: [afmc] SUBJECT.KEYID = 7
17,726,444 UART: [afmc] AUTHORITY.KEYID = 5
21,097,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,815 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,237 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,979 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,420 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,734 UART: [afmc] --
23,465,165 UART: [cold-reset] --
23,468,812 UART: [state] Locking Datavault
23,473,084 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,842 UART: [state] Locking ICCM
23,477,347 UART: [exit] Launching FMC @ 0x40000130
23,485,741 UART:
23,485,983 UART: Running Caliptra FMC ...
23,487,085 UART:
23,487,253 UART: [state] CFI Enabled
23,553,898 UART: [fht] FMC Alias Private Key: 7
25,915,866 UART: [art] Extend RT PCRs Done
25,917,091 UART: [art] Lock RT PCRs Done
25,918,775 UART: [art] Populate DV Done
25,924,264 UART: [fht] FMC Alias Private Key: 7
25,925,962 UART: [art] Derive CDI
25,926,774 UART: [art] Store in slot 0x4
25,982,616 UART: [art] Derive Key Pair
25,983,618 UART: [art] Store priv key in slot 0x5
29,276,451 UART: [art] Derive Key Pair - Done
29,289,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,802 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,307 UART: [art] PUB.X = FE362189283A7F98B1A2190E7B55D3DC93801C958429DD1B69A016A7F6278DCF8B1D81B5F9EC10D5705FE72EE0A55CEC
31,587,766 UART: [art] PUB.Y = 90B524E7D0C0CC70AF579A416C1837F671CA89D0CFCC987209D7A94D6C14291A62FF1E14870C7A61E9F402471DA815B9
31,594,854 UART: [art] SIG.R = D91E850623478693D71718DDDA5B463C18C5E3E6A513973E2CA93F32D4EDFDC990367C8D69CBEF2C12C6B1884AE591F0
31,602,254 UART: [art] SIG.S = 95BB86E6D33CE61B08645B4B94373E07728D86F24591B34D0F2033A8CCEE9E91075DE2C0C48E2C21E38BEC6C3271B07D
32,907,288 UART: Caliptra RT
32,907,990 UART: [state] CFI Enabled
33,085,259 UART: [rt] RT listening for mailbox commands...
33,087,171 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,117,940 UART: [rt]cmd =0x434b4558, len=80
33,119,307 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,782,875 ready_for_fw is high
3,783,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,034 >>> mbox cmd response: success
23,630,250 UART:
23,630,811 UART: Running Caliptra FMC ...
23,631,961 UART:
23,632,127 UART: [state] CFI Enabled
23,701,866 UART: [fht] FMC Alias Private Key: 7
26,042,044 UART: [art] Extend RT PCRs Done
26,043,296 UART: [art] Lock RT PCRs Done
26,045,039 UART: [art] Populate DV Done
26,050,578 UART: [fht] FMC Alias Private Key: 7
26,052,176 UART: [art] Derive CDI
26,052,994 UART: [art] Store in slot 0x4
26,110,084 UART: [art] Derive Key Pair
26,111,303 UART: [art] Store priv key in slot 0x5
29,403,192 UART: [art] Derive Key Pair - Done
29,416,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,540 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,046 UART: [art] PUB.X = 3AB31AF63C6A43B2CA4832CB108417A6E0042E32100A1A30ADA7DA1F92A58892C27CE010C2E2377F4F3296F75AAE94AA
31,713,369 UART: [art] PUB.Y = F586AFE4579322B411DD6F8458EFAD298A40C7EB59313A6ACC38CF59927F62172BF387F94899E040A517A07435692934
31,720,573 UART: [art] SIG.R = 50F66F8BFA7F7FDD187FE4C76B5388CA1FC2B1FCEBBD5DAD5C033C27269BF78049244FCB37892D5D6B3FDF82BBABF2E3
31,728,028 UART: [art] SIG.S = 61458C45BCB11CC781EF453AE543C314981F8E9FEDDF218844AA36E36B47FBE09DD7169266E1CD1203704688C7258D49
33,033,879 UART: Caliptra RT
33,034,585 UART: [state] CFI Enabled
33,230,327 UART: [rt] RT listening for mailbox commands...
33,232,340 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,263,081 UART: [rt]cmd =0x434b4558, len=80
33,264,518 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,322 UART:
192,682 UART: Running Caliptra ROM ...
193,774 UART:
603,495 UART: [state] CFI Enabled
617,390 UART: [state] LifecycleState = Unprovisioned
619,389 UART: [state] DebugLocked = No
621,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,737 UART: [kat] SHA2-256
795,456 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,047 UART: [kat] ++
806,507 UART: [kat] sha1
816,807 UART: [kat] SHA2-256
819,451 UART: [kat] SHA2-384
825,026 UART: [kat] SHA2-512-ACC
827,394 UART: [kat] ECC-384
3,111,299 UART: [kat] HMAC-384Kdf
3,123,826 UART: [kat] LMS
4,313,974 UART: [kat] --
4,318,955 UART: [cold-reset] ++
4,321,040 UART: [fht] Storing FHT @ 0x50003400
4,332,525 UART: [idev] ++
4,333,084 UART: [idev] CDI.KEYID = 6
4,334,062 UART: [idev] SUBJECT.KEYID = 7
4,335,230 UART: [idev] UDS.KEYID = 0
4,336,301 ready_for_fw is high
4,336,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,432 UART: [idev] Erasing UDS.KEYID = 0
7,622,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,637 UART: [idev] --
7,648,789 UART: [ldev] ++
7,649,350 UART: [ldev] CDI.KEYID = 6
7,650,278 UART: [ldev] SUBJECT.KEYID = 5
7,651,531 UART: [ldev] AUTHORITY.KEYID = 7
7,652,828 UART: [ldev] FE.KEYID = 1
7,664,763 UART: [ldev] Erasing FE.KEYID = 1
10,953,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,545 UART: [ldev] --
13,315,940 UART: [fwproc] Waiting for Commands...
13,317,646 UART: [fwproc] Received command 0x46574c44
13,319,819 UART: [fwproc] Received Image of size 118548 bytes
17,423,243 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,359 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,775 >>> mbox cmd response: success
17,904,740 UART: [afmc] ++
17,905,356 UART: [afmc] CDI.KEYID = 6
17,906,264 UART: [afmc] SUBJECT.KEYID = 7
17,907,546 UART: [afmc] AUTHORITY.KEYID = 5
21,218,337 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,974 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,394 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,171 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,563 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,685 UART: [afmc] --
23,582,620 UART: [cold-reset] --
23,587,989 UART: [state] Locking Datavault
23,594,956 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,712 UART: [state] Locking ICCM
23,598,321 UART: [exit] Launching FMC @ 0x40000130
23,606,714 UART:
23,606,946 UART: Running Caliptra FMC ...
23,608,039 UART:
23,608,221 UART: [state] CFI Enabled
23,616,190 UART: [fht] FMC Alias Private Key: 7
25,956,001 UART: [art] Extend RT PCRs Done
25,957,229 UART: [art] Lock RT PCRs Done
25,959,195 UART: [art] Populate DV Done
25,964,497 UART: [fht] FMC Alias Private Key: 7
25,966,034 UART: [art] Derive CDI
25,966,792 UART: [art] Store in slot 0x4
26,009,597 UART: [art] Derive Key Pair
26,010,643 UART: [art] Store priv key in slot 0x5
29,252,659 UART: [art] Derive Key Pair - Done
29,265,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,956 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,457 UART: [art] PUB.X = B12A1492D9857323F371938163E635CB98BE7FA5380DF98ED999965B90721FBDD6236CB9143B5F7EE33DCC2E77FA2045
31,554,745 UART: [art] PUB.Y = 55011282B09AFCAD620E0E8AAF0FAAB41488CFDCD6FE720DADCD7C816859AFD35074AD8E8124479EBC43571A4EF9251F
31,562,016 UART: [art] SIG.R = F4CF1A06FF23F5D16B6E0952B6E244D515DBB2E81A169B618184A8A727A6F447E35AA4AB071F8A073E79F856A803F6F5
31,569,420 UART: [art] SIG.S = 69088DCB88A1A3644AEF7B32F69B4258616CE6C9DC46A2082FF32EFADBB7A5C35B2A0CA032BB34E2AB689BEC152F1F17
32,874,479 UART: Caliptra RT
32,875,187 UART: [state] CFI Enabled
33,008,332 UART: [rt] RT listening for mailbox commands...
33,010,229 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,040,884 UART: [rt]cmd =0x434b4558, len=80
33,042,417 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,127,976 ready_for_fw is high
4,128,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,985 >>> mbox cmd response: success
23,811,322 UART:
23,811,714 UART: Running Caliptra FMC ...
23,812,811 UART:
23,812,961 UART: [state] CFI Enabled
23,820,912 UART: [fht] FMC Alias Private Key: 7
26,161,199 UART: [art] Extend RT PCRs Done
26,162,438 UART: [art] Lock RT PCRs Done
26,164,090 UART: [art] Populate DV Done
26,169,570 UART: [fht] FMC Alias Private Key: 7
26,171,184 UART: [art] Derive CDI
26,171,922 UART: [art] Store in slot 0x4
26,214,794 UART: [art] Derive Key Pair
26,215,834 UART: [art] Store priv key in slot 0x5
29,458,147 UART: [art] Derive Key Pair - Done
29,471,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,360 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,869 UART: [art] PUB.X = 1209E545CDB8AAE78D403B7A8BD6DBA8DAD71A354DECC6B0FF589E0398FB52BFB1E0FBCF7ABA35829DEE96C0BF08FD12
31,760,232 UART: [art] PUB.Y = 0D102DE4CBDDB1557745454C9A0BDC2011AA5532B14338644BB76E69FAF72D16615A0A5B22A418ACBB66A61AA583981C
31,767,483 UART: [art] SIG.R = 183C82099073CC0A80AD7D9BA54B52DBFE889BD509F84E89BB4E0C914EBEF421522405EB4FE1B2716BF15BF0FFE5CE0E
31,774,883 UART: [art] SIG.S = 426E06963DD3F43C362C8ECA9D56E120383B5873618F4D4CBAA1AB485D084DC8AA63D4E4E4BC9E0353279EF8438F25A2
33,079,478 UART: Caliptra RT
33,080,182 UART: [state] CFI Enabled
33,213,554 UART: [rt] RT listening for mailbox commands...
33,215,432 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
33,245,987 UART: [rt]cmd =0x434b4558, len=80
33,247,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,100 UART:
192,464 UART: Running Caliptra ROM ...
193,643 UART:
193,800 UART: [state] CFI Enabled
265,351 UART: [state] LifecycleState = Unprovisioned
267,259 UART: [state] DebugLocked = No
268,713 UART: [state] WD Timer not started. Device not locked for debugging
272,462 UART: [kat] SHA2-256
452,116 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,944 UART: [kat] ++
463,475 UART: [kat] sha1
474,430 UART: [kat] SHA2-256
477,174 UART: [kat] SHA2-384
483,233 UART: [kat] SHA2-512-ACC
485,596 UART: [kat] ECC-384
2,949,241 UART: [kat] HMAC-384Kdf
2,972,493 UART: [kat] LMS
3,449,012 UART: [kat] --
3,452,088 UART: [cold-reset] ++
3,454,661 UART: [fht] FHT @ 0x50003400
3,464,992 UART: [idev] ++
3,465,549 UART: [idev] CDI.KEYID = 6
3,466,574 UART: [idev] SUBJECT.KEYID = 7
3,467,744 UART: [idev] UDS.KEYID = 0
3,468,666 ready_for_fw is high
3,468,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,898 UART: [idev] Erasing UDS.KEYID = 0
5,985,897 UART: [idev] Sha1 KeyId Algorithm
6,009,372 UART: [idev] --
6,013,802 UART: [ldev] ++
6,014,375 UART: [ldev] CDI.KEYID = 6
6,015,339 UART: [ldev] SUBJECT.KEYID = 5
6,016,554 UART: [ldev] AUTHORITY.KEYID = 7
6,017,781 UART: [ldev] FE.KEYID = 1
6,058,945 UART: [ldev] Erasing FE.KEYID = 1
8,563,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,208 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,456 UART: [ldev] --
10,374,165 UART: [fwproc] Wait for Commands...
10,375,783 UART: [fwproc] Recv command 0x46574c44
10,377,817 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,400 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,445 >>> mbox cmd response: success
14,345,169 UART: [afmc] ++
14,345,789 UART: [afmc] CDI.KEYID = 6
14,346,704 UART: [afmc] SUBJECT.KEYID = 7
14,347,921 UART: [afmc] AUTHORITY.KEYID = 5
16,881,158 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,620,147 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,638,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,204 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,754 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,418 UART: [afmc] --
18,698,698 UART: [cold-reset] --
18,702,483 UART: [state] Locking Datavault
18,707,998 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,747 UART: [state] Locking ICCM
18,712,380 UART: [exit] Launching FMC @ 0x40000130
18,720,768 UART:
18,721,005 UART: Running Caliptra FMC ...
18,722,106 UART:
18,722,258 UART: [state] CFI Enabled
18,780,025 UART: [fht] FMC Alias Private Key: 7
20,546,235 UART: [art] Extend RT PCRs Done
20,547,443 UART: [art] Lock RT PCRs Done
20,549,336 UART: [art] Populate DV Done
20,554,854 UART: [fht] FMC Alias Private Key: 7
20,556,555 UART: [art] Derive CDI
20,557,298 UART: [art] Store in slot 0x4
20,612,562 UART: [art] Derive Key Pair
20,613,621 UART: [art] Store priv key in slot 0x5
23,076,224 UART: [art] Derive Key Pair - Done
23,089,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,295 UART: [art] PUB.X = B468EBB6CE4B2D3082996034D088DFF8C62B1C7AD5E7E35D9FD36425A282534D76D78BBAFA7E22D1B0A5D7020A128C05
24,810,598 UART: [art] PUB.Y = 6537875B467C1535EA96CE4EDFF973830C99ECF27FE5E8BD8CE2AFA8EDD7EAFA526B83EEC061575475B403B3504AEE0D
24,817,881 UART: [art] SIG.R = 67151B56A931F1B5EE49F0383BD8AF8B72D0E18231578F3CCD7815A2E1C97F75ACD2547A606F597DF744DCE23E09F649
24,825,278 UART: [art] SIG.S = E194985329B9DCDD3E5E5B3C3E1FF82286B14FA7C1C4B33ED5A82A1BB74BF10B67ADE2910F8A8ACA73D15CBE59C6CD08
25,804,252 UART: Caliptra RT
25,804,971 UART: [state] CFI Enabled
25,985,352 UART: [rt] RT listening for mailbox commands...
25,987,235 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,017,687 UART: [rt]cmd =0x434b4558, len=80
26,019,015 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,462,907 ready_for_fw is high
3,463,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,227,562 >>> mbox cmd response: success
18,510,580 UART:
18,510,958 UART: Running Caliptra FMC ...
18,512,108 UART:
18,512,272 UART: [state] CFI Enabled
18,582,623 UART: [fht] FMC Alias Private Key: 7
20,348,669 UART: [art] Extend RT PCRs Done
20,350,009 UART: [art] Lock RT PCRs Done
20,351,322 UART: [art] Populate DV Done
20,357,057 UART: [fht] FMC Alias Private Key: 7
20,358,597 UART: [art] Derive CDI
20,359,412 UART: [art] Store in slot 0x4
20,415,090 UART: [art] Derive Key Pair
20,416,112 UART: [art] Store priv key in slot 0x5
22,878,865 UART: [art] Derive Key Pair - Done
22,891,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,776 UART: [art] PUB.X = ADDF6BDB60693A636FD90ED68111DA53D0FD49B9718238233241C776D9E7C5A8242D2E992BE3A04B87EF1BAA72C4150D
24,613,030 UART: [art] PUB.Y = 1BAA55BCF16948CBBD57F4DC11DFF7605FABE44851CEBF5FED4DED0745B377E7CA6B70942A0D6CDACAD31E0E084D075D
24,620,340 UART: [art] SIG.R = AD5B1BBADFCC1E57F7454604FF26876333D3F902C3C91CB81A7D4033E79F2A0EB42EF52685F7E9CBC53093FD44473149
24,627,735 UART: [art] SIG.S = 612FEFD87B7ECD600DF6DD4AB50AFA15B19C112C4912717ED60BF8887373F7EA6BC54BE1E03BCADE9D9E1768DD8FB483
25,606,901 UART: Caliptra RT
25,607,606 UART: [state] CFI Enabled
25,787,640 UART: [rt] RT listening for mailbox commands...
25,789,668 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,820,238 UART: [rt]cmd =0x434b4558, len=80
25,821,623 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,421 UART:
192,801 UART: Running Caliptra ROM ...
193,953 UART:
603,679 UART: [state] CFI Enabled
618,292 UART: [state] LifecycleState = Unprovisioned
620,237 UART: [state] DebugLocked = No
621,830 UART: [state] WD Timer not started. Device not locked for debugging
624,948 UART: [kat] SHA2-256
804,545 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,346 UART: [kat] ++
815,791 UART: [kat] sha1
825,590 UART: [kat] SHA2-256
828,282 UART: [kat] SHA2-384
834,566 UART: [kat] SHA2-512-ACC
836,943 UART: [kat] ECC-384
3,278,510 UART: [kat] HMAC-384Kdf
3,290,748 UART: [kat] LMS
3,767,284 UART: [kat] --
3,769,470 UART: [cold-reset] ++
3,770,909 UART: [fht] FHT @ 0x50003400
3,782,551 UART: [idev] ++
3,783,152 UART: [idev] CDI.KEYID = 6
3,784,069 UART: [idev] SUBJECT.KEYID = 7
3,785,322 UART: [idev] UDS.KEYID = 0
3,786,250 ready_for_fw is high
3,786,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,165 UART: [idev] Erasing UDS.KEYID = 0
6,262,139 UART: [idev] Sha1 KeyId Algorithm
6,286,011 UART: [idev] --
6,291,036 UART: [ldev] ++
6,291,608 UART: [ldev] CDI.KEYID = 6
6,292,673 UART: [ldev] SUBJECT.KEYID = 5
6,293,783 UART: [ldev] AUTHORITY.KEYID = 7
6,295,015 UART: [ldev] FE.KEYID = 1
6,305,579 UART: [ldev] Erasing FE.KEYID = 1
8,783,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,273 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,048 UART: [ldev] --
10,574,371 UART: [fwproc] Wait for Commands...
10,577,662 UART: [fwproc] Recv command 0x46574c44
10,579,631 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,142,090 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,215,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,543,577 >>> mbox cmd response: success
14,548,114 UART: [afmc] ++
14,548,735 UART: [afmc] CDI.KEYID = 6
14,549,678 UART: [afmc] SUBJECT.KEYID = 7
14,550,852 UART: [afmc] AUTHORITY.KEYID = 5
17,053,245 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,777,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,793,677 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,809,759 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,332 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,368 UART: [afmc] --
18,854,728 UART: [cold-reset] --
18,860,211 UART: [state] Locking Datavault
18,865,405 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,168 UART: [state] Locking ICCM
18,868,941 UART: [exit] Launching FMC @ 0x40000130
18,877,343 UART:
18,877,581 UART: Running Caliptra FMC ...
18,878,701 UART:
18,878,864 UART: [state] CFI Enabled
18,886,914 UART: [fht] FMC Alias Private Key: 7
20,653,021 UART: [art] Extend RT PCRs Done
20,654,248 UART: [art] Lock RT PCRs Done
20,655,816 UART: [art] Populate DV Done
20,661,339 UART: [fht] FMC Alias Private Key: 7
20,662,969 UART: [art] Derive CDI
20,663,795 UART: [art] Store in slot 0x4
20,705,963 UART: [art] Derive Key Pair
20,706,965 UART: [art] Store priv key in slot 0x5
23,133,523 UART: [art] Derive Key Pair - Done
23,146,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,852 UART: [art] Erasing AUTHORITY.KEYID = 7
24,854,357 UART: [art] PUB.X = BF849AFAADE1CA63BBD7DBFBB573C14ECDD9853A3291211BFDCDDF0D5AE58059A1957425D6A0B65D984C862341E9B656
24,861,655 UART: [art] PUB.Y = D3DA0B0AC10CB8ECDB427E124C6C92A7AA901458718E892657A5DE1B17B2E4751EEA3C1557FDBFF9A4F970003A93208D
24,868,903 UART: [art] SIG.R = 26627F06DB1FDC0F997AC70630E581FADABD4148102D8A9604AA16C54C04CA3B9531D5896C8007C65B51C577E20F535D
24,876,302 UART: [art] SIG.S = 9A03A69BBB99132694D27B8D56EA7DA4032D2061417173D8A3D51FB67FEAEE50A307EB71187612B30E3C6153A9D7A9D6
25,855,070 UART: Caliptra RT
25,855,771 UART: [state] CFI Enabled
25,989,117 UART: [rt] RT listening for mailbox commands...
25,991,001 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,021,492 UART: [rt]cmd =0x434b4558, len=80
26,022,856 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,779,496 ready_for_fw is high
3,780,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,793 >>> mbox cmd response: success
18,701,070 UART:
18,701,449 UART: Running Caliptra FMC ...
18,702,649 UART:
18,702,835 UART: [state] CFI Enabled
18,710,671 UART: [fht] FMC Alias Private Key: 7
20,476,729 UART: [art] Extend RT PCRs Done
20,477,950 UART: [art] Lock RT PCRs Done
20,479,694 UART: [art] Populate DV Done
20,485,010 UART: [fht] FMC Alias Private Key: 7
20,486,616 UART: [art] Derive CDI
20,487,362 UART: [art] Store in slot 0x4
20,529,640 UART: [art] Derive Key Pair
20,530,683 UART: [art] Store priv key in slot 0x5
22,957,104 UART: [art] Derive Key Pair - Done
22,970,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,115 UART: [art] PUB.X = 72860B188D6D3D0B7AFB4C1D1432278882C3A809A642017AAF1C11630F53F67815B716A15882456B92885B8738A10256
24,685,114 UART: [art] PUB.Y = 71D0A9E22372719C968EBB9B6D3556FCF096FA0E944894F32A8FD04E6B0E8E0B9B68AA314AAB591B2CE3AF792D14392E
24,692,377 UART: [art] SIG.R = AB40AC749F1B4C83D3260DD8A0DD1068844DFB4E544745D4612C9414860D01C23CE2146BCA29A5F425D3EC1BCC28EBB7
24,699,782 UART: [art] SIG.S = 748C2ABE68FF6981B7231397CD110571EFD8A146858EAFC9395273416511D6DE74341F88C217BFB971AFC2DB98FEB9CD
25,678,212 UART: Caliptra RT
25,678,947 UART: [state] CFI Enabled
25,811,687 UART: [rt] RT listening for mailbox commands...
25,813,580 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
25,843,837 UART: [rt]cmd =0x434b4558, len=80
25,845,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,077 UART:
192,443 UART: Running Caliptra ROM ...
193,647 UART:
193,800 UART: [state] CFI Enabled
266,974 UART: [state] LifecycleState = Unprovisioned
269,303 UART: [state] DebugLocked = No
271,259 UART: [state] WD Timer not started. Device not locked for debugging
275,580 UART: [kat] SHA2-256
465,494 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,235 UART: [kat] ++
476,782 UART: [kat] sha1
487,946 UART: [kat] SHA2-256
490,958 UART: [kat] SHA2-384
496,162 UART: [kat] SHA2-512-ACC
498,803 UART: [kat] ECC-384
2,948,604 UART: [kat] HMAC-384Kdf
2,972,788 UART: [kat] LMS
3,504,559 UART: [kat] --
3,508,829 UART: [cold-reset] ++
3,510,689 UART: [fht] FHT @ 0x50003400
3,521,029 UART: [idev] ++
3,521,661 UART: [idev] CDI.KEYID = 6
3,522,686 UART: [idev] SUBJECT.KEYID = 7
3,523,859 UART: [idev] UDS.KEYID = 0
3,524,785 ready_for_fw is high
3,524,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,157 UART: [idev] Erasing UDS.KEYID = 0
6,029,876 UART: [idev] Sha1 KeyId Algorithm
6,051,237 UART: [idev] --
6,057,338 UART: [ldev] ++
6,058,019 UART: [ldev] CDI.KEYID = 6
6,058,931 UART: [ldev] SUBJECT.KEYID = 5
6,060,316 UART: [ldev] AUTHORITY.KEYID = 7
6,061,511 UART: [ldev] FE.KEYID = 1
6,099,434 UART: [ldev] Erasing FE.KEYID = 1
8,607,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,021 UART: [ldev] --
10,413,285 UART: [fwproc] Wait for Commands...
10,416,529 UART: [fwproc] Recv command 0x46574c44
10,418,777 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,601 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,707 >>> mbox cmd response: success
14,691,315 UART: [afmc] ++
14,692,043 UART: [afmc] CDI.KEYID = 6
14,693,239 UART: [afmc] SUBJECT.KEYID = 7
14,694,672 UART: [afmc] AUTHORITY.KEYID = 5
17,236,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,897 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,992 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,128 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,998 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,153 UART: [afmc] --
19,033,652 UART: [cold-reset] --
19,036,653 UART: [state] Locking Datavault
19,041,906 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,065 UART: [state] Locking ICCM
19,046,266 UART: [exit] Launching FMC @ 0x40000130
19,054,954 UART:
19,055,189 UART: Running Caliptra FMC ...
19,056,291 UART:
19,056,451 UART: [state] CFI Enabled
19,116,273 UART: [fht] FMC Alias Private Key: 7
20,883,462 UART: [art] Extend RT PCRs Done
20,884,676 UART: [art] Lock RT PCRs Done
20,886,321 UART: [art] Populate DV Done
20,891,669 UART: [fht] FMC Alias Private Key: 7
20,893,362 UART: [art] Derive CDI
20,894,188 UART: [art] Store in slot 0x4
20,949,440 UART: [art] Derive Key Pair
20,950,481 UART: [art] Store priv key in slot 0x5
23,412,544 UART: [art] Derive Key Pair - Done
23,425,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,403 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,913 UART: [art] PUB.X = 16E5959F3FA45957AD8611ADCAA8B1630B5415BDA09E5C288EB9C409DBB08E80295DD4AECBA0E6489B303CC7688926AD
25,147,234 UART: [art] PUB.Y = 8DB117D08CF151EF5694C511C4E9BBE9C3A944D569DE961EE72BD9B3E468F1908187C1CCF80F901ABEF06F49F8630844
25,154,477 UART: [art] SIG.R = CCE72302F79F8C223BA0F5A4642DD340FBD94ACE08D78C69BBC30C3F463889A0D32D872D4F6B760E864DA9088C2A49BF
25,161,876 UART: [art] SIG.S = BA13C8FFAECE575FB3BDE135045D06A47AC837A12FA59AB631F987F7C04A7498F1334AA0C0439C2873D2DF8DB75A9E4F
26,140,536 UART: Caliptra RT
26,141,232 UART: [state] CFI Enabled
26,321,743 UART: [rt] RT listening for mailbox commands...
26,323,627 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,354,191 UART: [rt]cmd =0x434b4558, len=80
26,355,516 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
3,440,677 ready_for_fw is high
3,441,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,506 >>> mbox cmd response: success
19,112,973 UART:
19,113,341 UART: Running Caliptra FMC ...
19,114,530 UART:
19,114,697 UART: [state] CFI Enabled
19,181,049 UART: [fht] FMC Alias Private Key: 7
20,947,016 UART: [art] Extend RT PCRs Done
20,948,237 UART: [art] Lock RT PCRs Done
20,950,056 UART: [art] Populate DV Done
20,955,641 UART: [fht] FMC Alias Private Key: 7
20,957,339 UART: [art] Derive CDI
20,958,150 UART: [art] Store in slot 0x4
21,013,956 UART: [art] Derive Key Pair
21,014,997 UART: [art] Store priv key in slot 0x5
23,478,081 UART: [art] Derive Key Pair - Done
23,491,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,220 UART: [art] PUB.X = 5CD70624BE5002026A617CB1027C30D5B1AD1AA08693129A87D30923654B432E89D32B6A2E57A7598C3EC61498DB6E02
25,212,453 UART: [art] PUB.Y = 13E26BC0F969768EC52002E678319AAEF8A72C5A899136EE8053C1B738B95D25BEF8C9D2E739067CA69FA4A269B1D6D0
25,219,703 UART: [art] SIG.R = 9A1A22EC14102B13D5727055AA1CC0D55FBE89DE90852D62B48C7621827DEEBA0487A842BFAB6428CAC0361079BCAB80
25,227,060 UART: [art] SIG.S = 88D787BE5EE5929C0C3F53B3AE44238B6D00E804F56483351228C8FBCB4B2E07E4B1C9A28568308D8499F8C9F6B5EAF4
26,206,120 UART: Caliptra RT
26,206,831 UART: [state] CFI Enabled
26,387,026 UART: [rt] RT listening for mailbox commands...
26,388,945 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,419,463 UART: [rt]cmd =0x434b4558, len=80
26,420,990 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,400 UART:
192,770 UART: Running Caliptra ROM ...
193,887 UART:
603,386 UART: [state] CFI Enabled
615,078 UART: [state] LifecycleState = Unprovisioned
617,414 UART: [state] DebugLocked = No
618,887 UART: [state] WD Timer not started. Device not locked for debugging
623,799 UART: [kat] SHA2-256
813,675 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,423 UART: [kat] ++
824,946 UART: [kat] sha1
837,052 UART: [kat] SHA2-256
840,047 UART: [kat] SHA2-384
845,984 UART: [kat] SHA2-512-ACC
848,572 UART: [kat] ECC-384
3,290,709 UART: [kat] HMAC-384Kdf
3,304,456 UART: [kat] LMS
3,836,273 UART: [kat] --
3,841,836 UART: [cold-reset] ++
3,843,559 UART: [fht] FHT @ 0x50003400
3,854,329 UART: [idev] ++
3,855,039 UART: [idev] CDI.KEYID = 6
3,855,979 UART: [idev] SUBJECT.KEYID = 7
3,857,173 UART: [idev] UDS.KEYID = 0
3,858,106 ready_for_fw is high
3,858,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,257 UART: [idev] Erasing UDS.KEYID = 0
6,330,085 UART: [idev] Sha1 KeyId Algorithm
6,352,783 UART: [idev] --
6,357,079 UART: [ldev] ++
6,357,775 UART: [ldev] CDI.KEYID = 6
6,358,663 UART: [ldev] SUBJECT.KEYID = 5
6,359,880 UART: [ldev] AUTHORITY.KEYID = 7
6,361,117 UART: [ldev] FE.KEYID = 1
6,373,683 UART: [ldev] Erasing FE.KEYID = 1
8,853,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,936 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,101 UART: [ldev] --
10,645,693 UART: [fwproc] Wait for Commands...
10,648,330 UART: [fwproc] Recv command 0x46574c44
10,650,587 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,946 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,070 >>> mbox cmd response: success
14,914,908 UART: [afmc] ++
14,915,635 UART: [afmc] CDI.KEYID = 6
14,916,831 UART: [afmc] SUBJECT.KEYID = 7
14,918,276 UART: [afmc] AUTHORITY.KEYID = 5
17,421,448 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,536 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,821 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,691 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,785 UART: [afmc] --
19,219,337 UART: [cold-reset] --
19,224,723 UART: [state] Locking Datavault
19,230,907 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,137 UART: [state] Locking ICCM
19,235,907 UART: [exit] Launching FMC @ 0x40000130
19,244,606 UART:
19,244,846 UART: Running Caliptra FMC ...
19,245,952 UART:
19,246,115 UART: [state] CFI Enabled
19,254,219 UART: [fht] FMC Alias Private Key: 7
21,021,042 UART: [art] Extend RT PCRs Done
21,022,289 UART: [art] Lock RT PCRs Done
21,023,680 UART: [art] Populate DV Done
21,028,948 UART: [fht] FMC Alias Private Key: 7
21,030,435 UART: [art] Derive CDI
21,031,182 UART: [art] Store in slot 0x4
21,073,835 UART: [art] Derive Key Pair
21,074,879 UART: [art] Store priv key in slot 0x5
23,501,926 UART: [art] Derive Key Pair - Done
23,515,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,505 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,004 UART: [art] PUB.X = 58C801122D3ABD91DBA8BE6ECABF8D587BE22AF8BFA6BAF97B85EA6B181887C293E54E5975B0570A327E5E1EE73498DE
25,230,463 UART: [art] PUB.Y = 055AA03297684656C50F37B499A6977F7030A8569277ED82BDD9DE7A610F633300DAE217E23220F32EB05AA0BDED3150
25,237,514 UART: [art] SIG.R = 41B4D4494CDC2550EA6F5B4971190B9EF7EEF6135190117224B3C64CE903061159FC7074CA81C9600540AF916CEC482B
25,244,892 UART: [art] SIG.S = 1CAFDA020ACCF09D24E661B0BCC4543AF9484296DB9AA57B8E43087047E37E2EA7007E314EEB02344EF9DCC702AE9D16
26,223,292 UART: Caliptra RT
26,224,003 UART: [state] CFI Enabled
26,356,973 UART: [rt] RT listening for mailbox commands...
26,358,869 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,389,169 UART: [rt]cmd =0x434b4558, len=80
26,390,770 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
3,753,189 ready_for_fw is high
3,753,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,573 >>> mbox cmd response: success
19,296,332 UART:
19,296,722 UART: Running Caliptra FMC ...
19,298,059 UART:
19,298,240 UART: [state] CFI Enabled
19,306,094 UART: [fht] FMC Alias Private Key: 7
21,072,444 UART: [art] Extend RT PCRs Done
21,073,673 UART: [art] Lock RT PCRs Done
21,075,152 UART: [art] Populate DV Done
21,080,804 UART: [fht] FMC Alias Private Key: 7
21,082,298 UART: [art] Derive CDI
21,083,069 UART: [art] Store in slot 0x4
21,125,188 UART: [art] Derive Key Pair
21,126,194 UART: [art] Store priv key in slot 0x5
23,553,244 UART: [art] Derive Key Pair - Done
23,566,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,272,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,273,775 UART: [art] PUB.X = FA01C5558411918965C0D081696CE787AC90D9C9D394E83C5031CC7CAFF2A41A9EAC6B533F4DA64A05E4085495E12CD8
25,281,048 UART: [art] PUB.Y = 8FF933EC22920DD60B126FD38CD7A97BBB2D65E879D7CD3FDA9E4E0DCE30CD41E7EE18D8C4327976D1FC047CF3A85711
25,288,326 UART: [art] SIG.R = CEDF852CFBE9519ECEC9A910F20085D4A26E14D463997157C404160A42532D9E19EB3E4F98783C4A47D0CC4C6CC79D7D
25,295,713 UART: [art] SIG.S = B1E1C2708F6E3A6A43274703C72C99B20E2E8E7BB39BC1ED15B026FC1F5C239A90651DE1A22A545EDCB953BCB88E4109
26,274,517 UART: Caliptra RT
26,275,207 UART: [state] CFI Enabled
26,407,873 UART: [rt] RT listening for mailbox commands...
26,409,755 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
26,440,178 UART: [rt]cmd =0x434b4558, len=80
26,441,509 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,994 UART: [state] LifecycleState = Unprovisioned
85,649 UART: [state] DebugLocked = No
86,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,855 UART: [kat] SHA2-256
881,786 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,901 UART: [kat] ++
886,053 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,154 UART: [kat] HMAC-384Kdf
906,796 UART: [kat] LMS
1,474,992 UART: [kat] --
1,476,087 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,316 UART: [idev] ++
1,479,484 UART: [idev] CDI.KEYID = 6
1,479,844 UART: [idev] SUBJECT.KEYID = 7
1,480,268 UART: [idev] UDS.KEYID = 0
1,480,613 ready_for_fw is high
1,480,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,026 UART: [idev] Erasing UDS.KEYID = 0
1,504,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,278 UART: [idev] --
1,514,293 UART: [ldev] ++
1,514,461 UART: [ldev] CDI.KEYID = 6
1,514,824 UART: [ldev] SUBJECT.KEYID = 5
1,515,250 UART: [ldev] AUTHORITY.KEYID = 7
1,515,713 UART: [ldev] FE.KEYID = 1
1,521,035 UART: [ldev] Erasing FE.KEYID = 1
1,545,822 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,051 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,414 UART: [ldev] --
1,584,699 UART: [fwproc] Waiting for Commands...
1,585,366 UART: [fwproc] Received command 0x46574c44
1,586,157 UART: [fwproc] Received Image of size 118548 bytes
2,931,073 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,581 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,162 >>> mbox cmd response: success
3,130,276 UART: [afmc] ++
3,130,444 UART: [afmc] CDI.KEYID = 6
3,130,806 UART: [afmc] SUBJECT.KEYID = 7
3,131,231 UART: [afmc] AUTHORITY.KEYID = 5
3,166,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,958 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,447 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,330 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,013 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,085 UART: [afmc] --
3,209,965 UART: [cold-reset] --
3,210,839 UART: [state] Locking Datavault
3,212,162 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,766 UART: [state] Locking ICCM
3,213,212 UART: [exit] Launching FMC @ 0x40000130
3,218,542 UART:
3,218,558 UART: Running Caliptra FMC ...
3,218,966 UART:
3,219,020 UART: [state] CFI Enabled
3,229,426 UART: [fht] FMC Alias Private Key: 7
3,348,538 UART: [art] Extend RT PCRs Done
3,348,966 UART: [art] Lock RT PCRs Done
3,350,234 UART: [art] Populate DV Done
3,358,603 UART: [fht] FMC Alias Private Key: 7
3,359,699 UART: [art] Derive CDI
3,359,979 UART: [art] Store in slot 0x4
3,445,577 UART: [art] Derive Key Pair
3,445,937 UART: [art] Store priv key in slot 0x5
3,459,544 UART: [art] Derive Key Pair - Done
3,474,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,282 UART: [art] PUB.X = 38A70B98F7EB4D00D4EFBAABA4DB1841BBE946304537F280DE24741FE942531AA9C26055E97E5D800D85F7EBE74C9324
3,497,034 UART: [art] PUB.Y = FE3A85FA669B3B3BBE2D62E03195F98EB7D2CDD5F8927F8BC2CBC2DD070B772C0DBC00FC5BDEBA1432BE06A4029CB7D0
3,503,977 UART: [art] SIG.R = CFFC3A2102345708A44676601321CEE35657CD7DCB7FA6799F828A9E97B500121386CA58FB9C3AF68AE403689BB5B9DC
3,510,722 UART: [art] SIG.S = 97F2E70FE190506C697EE8229A1D5FDCA7873EA49EBB4E2AA0C733BC437FB7B71DA20DC570F9D86FE49A7A276E8FC93C
3,533,856 UART: Caliptra RT
3,534,107 UART: [state] CFI Enabled
3,654,827 UART: [rt] RT listening for mailbox commands...
3,655,497 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,857 UART: [rt]cmd =0x434b4558, len=80
3,686,871 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,467 ready_for_fw is high
1,362,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,404 >>> mbox cmd response: success
3,043,879 UART:
3,043,895 UART: Running Caliptra FMC ...
3,044,303 UART:
3,044,357 UART: [state] CFI Enabled
3,054,711 UART: [fht] FMC Alias Private Key: 7
3,173,839 UART: [art] Extend RT PCRs Done
3,174,267 UART: [art] Lock RT PCRs Done
3,175,639 UART: [art] Populate DV Done
3,183,970 UART: [fht] FMC Alias Private Key: 7
3,185,092 UART: [art] Derive CDI
3,185,372 UART: [art] Store in slot 0x4
3,270,984 UART: [art] Derive Key Pair
3,271,344 UART: [art] Store priv key in slot 0x5
3,284,331 UART: [art] Derive Key Pair - Done
3,299,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,450 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,215 UART: [art] PUB.X = 6193C7009B0EDD3DEBCE94D1B4597B14E2F31137869A4F659A00C6655BE4D9D991AF2CF634D35C53050739535B41984E
3,321,932 UART: [art] PUB.Y = 7D96C86FAAD965F34924794A0C601B2140A8282D68230359C3CC68FEB1DFF6D17222B288AC3E83B25D7BD39A24F0EF2B
3,328,884 UART: [art] SIG.R = B666D4AD3F0E11F970FA0312CC7F3D4984E592ECE0E60D618138B28A8B4314F6E4FBD77834ECCE55FB9C78FA6A3C044F
3,335,658 UART: [art] SIG.S = B10FDAC5AB6ACB395C120A32815332E3FEAB55FEDE3B58D57AE278480DC184F0EFB85DD03007B46B1A72A5CC67CE0D2C
3,359,645 UART: Caliptra RT
3,359,896 UART: [state] CFI Enabled
3,480,148 UART: [rt] RT listening for mailbox commands...
3,480,818 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,432 UART: [rt]cmd =0x434b4558, len=80
3,512,542 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,859 UART: [state] LifecycleState = Unprovisioned
86,514 UART: [state] DebugLocked = No
87,246 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,746 UART: [kat] SHA2-256
882,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,792 UART: [kat] ++
886,944 UART: [kat] sha1
891,280 UART: [kat] SHA2-256
893,218 UART: [kat] SHA2-384
895,963 UART: [kat] SHA2-512-ACC
897,864 UART: [kat] ECC-384
903,257 UART: [kat] HMAC-384Kdf
907,887 UART: [kat] LMS
1,476,083 UART: [kat] --
1,477,004 UART: [cold-reset] ++
1,477,424 UART: [fht] Storing FHT @ 0x50003400
1,480,127 UART: [idev] ++
1,480,295 UART: [idev] CDI.KEYID = 6
1,480,655 UART: [idev] SUBJECT.KEYID = 7
1,481,079 UART: [idev] UDS.KEYID = 0
1,481,424 ready_for_fw is high
1,481,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,849 UART: [idev] Erasing UDS.KEYID = 0
1,505,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,045 UART: [idev] --
1,515,130 UART: [ldev] ++
1,515,298 UART: [ldev] CDI.KEYID = 6
1,515,661 UART: [ldev] SUBJECT.KEYID = 5
1,516,087 UART: [ldev] AUTHORITY.KEYID = 7
1,516,550 UART: [ldev] FE.KEYID = 1
1,521,770 UART: [ldev] Erasing FE.KEYID = 1
1,547,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,225 UART: [ldev] --
1,586,676 UART: [fwproc] Waiting for Commands...
1,587,477 UART: [fwproc] Received command 0x46574c44
1,588,268 UART: [fwproc] Received Image of size 118548 bytes
2,933,806 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,826 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,044 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,263 >>> mbox cmd response: success
3,134,475 UART: [afmc] ++
3,134,643 UART: [afmc] CDI.KEYID = 6
3,135,005 UART: [afmc] SUBJECT.KEYID = 7
3,135,430 UART: [afmc] AUTHORITY.KEYID = 5
3,170,883 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,237 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,829 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,512 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,320 UART: [afmc] --
3,214,234 UART: [cold-reset] --
3,215,160 UART: [state] Locking Datavault
3,216,585 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,189 UART: [state] Locking ICCM
3,217,783 UART: [exit] Launching FMC @ 0x40000130
3,223,113 UART:
3,223,129 UART: Running Caliptra FMC ...
3,223,537 UART:
3,223,680 UART: [state] CFI Enabled
3,234,342 UART: [fht] FMC Alias Private Key: 7
3,353,486 UART: [art] Extend RT PCRs Done
3,353,914 UART: [art] Lock RT PCRs Done
3,355,232 UART: [art] Populate DV Done
3,363,351 UART: [fht] FMC Alias Private Key: 7
3,364,419 UART: [art] Derive CDI
3,364,699 UART: [art] Store in slot 0x4
3,450,707 UART: [art] Derive Key Pair
3,451,067 UART: [art] Store priv key in slot 0x5
3,464,260 UART: [art] Derive Key Pair - Done
3,479,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,478 UART: [art] PUB.X = 3E61A758838E64416F9902C83BB19F8DA12D21716DB58CA42E975EAD86D12331DF99E8F2BCAD8972461E01C98E06435C
3,502,241 UART: [art] PUB.Y = E5A7A147A9DBE47280B2013A2528395ACD3378D6338314E4680D36AE93BC55ED79912AD049BEB8AE0D9C2C6F2F70A9CA
3,509,192 UART: [art] SIG.R = 1BF1027BE9E3F45BE32573BF120B99B7EC731CA9F4446922B0ACC66E64B4739879B4BD99BAADE2CAFFEACD6DABE164EA
3,515,984 UART: [art] SIG.S = C42CCD4CC479101AD9086775A7B45165535BE27F539D2E255EFB3E25753D3E5136F1AC44FDFB33AF9645C8D12C44F8F6
3,539,575 UART: Caliptra RT
3,539,918 UART: [state] CFI Enabled
3,659,389 UART: [rt] RT listening for mailbox commands...
3,660,059 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,417 UART: [rt]cmd =0x434b4558, len=80
3,691,665 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,474 ready_for_fw is high
1,362,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,665 >>> mbox cmd response: success
3,042,272 UART:
3,042,288 UART: Running Caliptra FMC ...
3,042,696 UART:
3,042,839 UART: [state] CFI Enabled
3,053,635 UART: [fht] FMC Alias Private Key: 7
3,172,839 UART: [art] Extend RT PCRs Done
3,173,267 UART: [art] Lock RT PCRs Done
3,174,627 UART: [art] Populate DV Done
3,182,682 UART: [fht] FMC Alias Private Key: 7
3,183,842 UART: [art] Derive CDI
3,184,122 UART: [art] Store in slot 0x4
3,270,338 UART: [art] Derive Key Pair
3,270,698 UART: [art] Store priv key in slot 0x5
3,284,495 UART: [art] Derive Key Pair - Done
3,299,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,008 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,773 UART: [art] PUB.X = C76AA16EF2055A470566A0E75EEF5DA270B17C448A5864D77BCABC3BD925E2C572E7A965D29668621125C54D56351C5C
3,322,541 UART: [art] PUB.Y = 1900B604C3AE04C36D068D0C556CD1BCDCD7653E88897AEEBAB2AD2BA0FACBA38B3FDAD4BEDB66811DE8EBB69D5D2073
3,329,489 UART: [art] SIG.R = 338E5B5045FB6429205E86DB314F08486F21A3F8C16CA3F96F362C06DCD1DD0BD0DD8F2453EB7F858A341E5CED085099
3,336,255 UART: [art] SIG.S = 6D6A40A5180A94DCEF466D3B3CA90517969AE219B7D3A83A5C201356A28C222A3549A81EFC73F9A9611475BAE83B5120
3,360,093 UART: Caliptra RT
3,360,436 UART: [state] CFI Enabled
3,480,722 UART: [rt] RT listening for mailbox commands...
3,481,392 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,686 UART: [rt]cmd =0x434b4558, len=80
3,512,964 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,693 UART: [state] WD Timer not started. Device not locked for debugging
87,946 UART: [kat] SHA2-256
891,496 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,600 UART: [kat] ++
895,752 UART: [kat] sha1
899,872 UART: [kat] SHA2-256
901,812 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,845 UART: [kat] LMS
1,169,157 UART: [kat] --
1,170,258 UART: [cold-reset] ++
1,170,776 UART: [fht] FHT @ 0x50003400
1,173,386 UART: [idev] ++
1,173,554 UART: [idev] CDI.KEYID = 6
1,173,915 UART: [idev] SUBJECT.KEYID = 7
1,174,340 UART: [idev] UDS.KEYID = 0
1,174,686 ready_for_fw is high
1,174,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,141 UART: [idev] Erasing UDS.KEYID = 0
1,199,253 UART: [idev] Sha1 KeyId Algorithm
1,208,239 UART: [idev] --
1,209,248 UART: [ldev] ++
1,209,416 UART: [ldev] CDI.KEYID = 6
1,209,780 UART: [ldev] SUBJECT.KEYID = 5
1,210,207 UART: [ldev] AUTHORITY.KEYID = 7
1,210,670 UART: [ldev] FE.KEYID = 1
1,215,946 UART: [ldev] Erasing FE.KEYID = 1
1,242,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,204 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,966 UART: [ldev] --
1,281,215 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,764 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,015 >>> mbox cmd response: success
2,828,099 UART: [afmc] ++
2,828,267 UART: [afmc] CDI.KEYID = 6
2,828,630 UART: [afmc] SUBJECT.KEYID = 7
2,829,056 UART: [afmc] AUTHORITY.KEYID = 5
2,864,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,438 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,139 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,828 UART: [afmc] --
2,907,683 UART: [cold-reset] --
2,908,425 UART: [state] Locking Datavault
2,909,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,456 UART: [state] Locking ICCM
2,911,040 UART: [exit] Launching FMC @ 0x40000130
2,916,370 UART:
2,916,386 UART: Running Caliptra FMC ...
2,916,794 UART:
2,916,848 UART: [state] CFI Enabled
2,927,236 UART: [fht] FMC Alias Private Key: 7
3,046,100 UART: [art] Extend RT PCRs Done
3,046,528 UART: [art] Lock RT PCRs Done
3,047,996 UART: [art] Populate DV Done
3,056,215 UART: [fht] FMC Alias Private Key: 7
3,057,165 UART: [art] Derive CDI
3,057,445 UART: [art] Store in slot 0x4
3,143,560 UART: [art] Derive Key Pair
3,143,920 UART: [art] Store priv key in slot 0x5
3,156,942 UART: [art] Derive Key Pair - Done
3,171,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,485 UART: [art] PUB.X = D1098CD46AA6D81CFED2E0CA71F5CF5B51A70434145A0387CE9AC05EB60B45B97CF8B7551D71E5041742EB89A72568CA
3,195,252 UART: [art] PUB.Y = 11DB1DED209DB6486BA1F5579DD24FC172D1181E4116822BBB7355F493C460933B98E298E6B76820C0BEFC331F8BF2ED
3,202,210 UART: [art] SIG.R = 88295B827E7659C332E8CF4C57CD6F65426CF230C681DC6727C39674377683AEE6EF4A69D40A5C92B0B9B75602AEFE9C
3,208,978 UART: [art] SIG.S = BAE6BCE1F28148728BACC3928AFADF68B5B938413D19A3716553D466DDE9052CC00479CE493EEF4102CCCB495CF004D7
3,233,012 UART: Caliptra RT
3,233,263 UART: [state] CFI Enabled
3,353,064 UART: [rt] RT listening for mailbox commands...
3,353,734 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,910 UART: [rt]cmd =0x434b4558, len=80
3,385,116 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,960 ready_for_fw is high
1,058,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,674 >>> mbox cmd response: success
2,742,041 UART:
2,742,057 UART: Running Caliptra FMC ...
2,742,465 UART:
2,742,519 UART: [state] CFI Enabled
2,753,159 UART: [fht] FMC Alias Private Key: 7
2,871,733 UART: [art] Extend RT PCRs Done
2,872,161 UART: [art] Lock RT PCRs Done
2,873,591 UART: [art] Populate DV Done
2,881,884 UART: [fht] FMC Alias Private Key: 7
2,882,948 UART: [art] Derive CDI
2,883,228 UART: [art] Store in slot 0x4
2,968,695 UART: [art] Derive Key Pair
2,969,055 UART: [art] Store priv key in slot 0x5
2,982,299 UART: [art] Derive Key Pair - Done
2,997,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,681 UART: [art] PUB.X = 0DBA128008F7A36EEA7284669FBF5620DD5E3C7A064794BEAAA9CFCC7C3170B1A37479D980EDCF415352514B971545E2
3,020,450 UART: [art] PUB.Y = 25BC414C90B888245549860B73F54871DA50E42B4F913DEC9C761D96AD6B8E55BAE2AF92E5343FAD3148ED04855C6044
3,027,396 UART: [art] SIG.R = 1DB47D5867825C57DF9D25823B93BA38EB24EC1151636F542D74C7CE14C65FE9FD88F369BEC48E05E41049C2358E11B0
3,034,167 UART: [art] SIG.S = ABAF1FC5085A9F933F15958511C9C96B30D352E48CB9826ED1F2D1689CB39E8257E13D8769CEAAF2A2A366EAA9A6DB1A
3,057,898 UART: Caliptra RT
3,058,149 UART: [state] CFI Enabled
3,177,963 UART: [rt] RT listening for mailbox commands...
3,178,633 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,929 UART: [rt]cmd =0x434b4558, len=80
3,209,869 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,493 UART: [kat] ++
895,645 UART: [kat] sha1
899,909 UART: [kat] SHA2-256
901,849 UART: [kat] SHA2-384
904,578 UART: [kat] SHA2-512-ACC
906,479 UART: [kat] ECC-384
916,286 UART: [kat] HMAC-384Kdf
920,932 UART: [kat] LMS
1,169,244 UART: [kat] --
1,170,109 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,547 UART: [idev] ++
1,173,715 UART: [idev] CDI.KEYID = 6
1,174,076 UART: [idev] SUBJECT.KEYID = 7
1,174,501 UART: [idev] UDS.KEYID = 0
1,174,847 ready_for_fw is high
1,174,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,522 UART: [idev] Erasing UDS.KEYID = 0
1,199,918 UART: [idev] Sha1 KeyId Algorithm
1,208,722 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,291 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,799 UART: [ldev] --
1,283,206 UART: [fwproc] Wait for Commands...
1,283,801 UART: [fwproc] Recv command 0x46574c44
1,284,534 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,421 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,784 >>> mbox cmd response: success
2,828,848 UART: [afmc] ++
2,829,016 UART: [afmc] CDI.KEYID = 6
2,829,379 UART: [afmc] SUBJECT.KEYID = 7
2,829,805 UART: [afmc] AUTHORITY.KEYID = 5
2,865,550 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,612 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,203 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,904 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,881 UART: [afmc] --
2,908,772 UART: [cold-reset] --
2,909,652 UART: [state] Locking Datavault
2,910,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,573 UART: [state] Locking ICCM
2,912,245 UART: [exit] Launching FMC @ 0x40000130
2,917,575 UART:
2,917,591 UART: Running Caliptra FMC ...
2,917,999 UART:
2,918,142 UART: [state] CFI Enabled
2,928,892 UART: [fht] FMC Alias Private Key: 7
3,047,810 UART: [art] Extend RT PCRs Done
3,048,238 UART: [art] Lock RT PCRs Done
3,049,700 UART: [art] Populate DV Done
3,057,861 UART: [fht] FMC Alias Private Key: 7
3,058,895 UART: [art] Derive CDI
3,059,175 UART: [art] Store in slot 0x4
3,145,162 UART: [art] Derive Key Pair
3,145,522 UART: [art] Store priv key in slot 0x5
3,158,986 UART: [art] Derive Key Pair - Done
3,174,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,098 UART: [art] PUB.X = 80A3EB2863B4524D95595A3E1079CBAE996444A0B1AE635F173DC10E2D09C326A850BCA5007DD63CDE6E7D10D7303098
3,196,844 UART: [art] PUB.Y = 08D1EAEEC1671AA6C1BAC3C0B3FB9A90A3613AF2F49D6520A50802FEB5C3A1D992A6F9F5DFC8695086370F153B95160E
3,203,793 UART: [art] SIG.R = 1CEEA5D9A26D9AE84166D52D49267912FDB7FFE4A083C0ACC16E48A24599E0EE2D7A3EAAD3B20A570089465B601CBC36
3,210,554 UART: [art] SIG.S = 8F6AFAF4F7739BAD809AE92EFDAECF2D65E61D6D4D58788C9BDFB169D98FC2F88DE67B5BD6E9A9494870C8F3B84A10EE
3,234,596 UART: Caliptra RT
3,234,939 UART: [state] CFI Enabled
3,355,145 UART: [rt] RT listening for mailbox commands...
3,355,815 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,193 UART: [rt]cmd =0x434b4558, len=80
3,387,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 ready_for_fw is high
1,060,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,093 >>> mbox cmd response: success
2,742,480 UART:
2,742,496 UART: Running Caliptra FMC ...
2,742,904 UART:
2,743,047 UART: [state] CFI Enabled
2,754,077 UART: [fht] FMC Alias Private Key: 7
2,872,733 UART: [art] Extend RT PCRs Done
2,873,161 UART: [art] Lock RT PCRs Done
2,874,651 UART: [art] Populate DV Done
2,882,694 UART: [fht] FMC Alias Private Key: 7
2,883,662 UART: [art] Derive CDI
2,883,942 UART: [art] Store in slot 0x4
2,969,301 UART: [art] Derive Key Pair
2,969,661 UART: [art] Store priv key in slot 0x5
2,983,531 UART: [art] Derive Key Pair - Done
2,998,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,302 UART: [art] PUB.X = C1D2F248973C388F69B42855133F5DA12517FA1A213EB33AC6921AB66913A29A9494C05E57CCCCF9FD5D6EC2131481E1
3,021,076 UART: [art] PUB.Y = 397C949A567ED94BA751C9B2A969F498811C3F04088386D8AC78DCA4BA217132771B6B728F2EDF2908C21C81E8C5FD44
3,028,019 UART: [art] SIG.R = 46BC08810B6CD815D2D53B3E45CB568F764943C3F1F4CD6BEE2EDDF967E918F0F4D56A1D41AC7433518D01460B75EA95
3,034,787 UART: [art] SIG.S = FE084BDBDFADFEE56710C43E76AD2F250353852068F6F492D7DC2AF5E99BD1D3FBD8F5E4A6773D268D60AB9BA307D3C8
3,058,690 UART: Caliptra RT
3,059,033 UART: [state] CFI Enabled
3,178,195 UART: [rt] RT listening for mailbox commands...
3,178,865 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,471 UART: [rt]cmd =0x434b4558, len=80
3,210,499 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,014 UART: [state] LifecycleState = Unprovisioned
85,669 UART: [state] DebugLocked = No
86,209 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
892,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,103 UART: [kat] ++
897,255 UART: [kat] sha1
901,679 UART: [kat] SHA2-256
903,619 UART: [kat] SHA2-384
906,314 UART: [kat] SHA2-512-ACC
908,215 UART: [kat] ECC-384
917,742 UART: [kat] HMAC-384Kdf
922,348 UART: [kat] LMS
1,170,676 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,761 UART: [fht] FHT @ 0x50003400
1,174,310 UART: [idev] ++
1,174,478 UART: [idev] CDI.KEYID = 6
1,174,838 UART: [idev] SUBJECT.KEYID = 7
1,175,262 UART: [idev] UDS.KEYID = 0
1,175,607 ready_for_fw is high
1,175,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,514 UART: [idev] Erasing UDS.KEYID = 0
1,201,109 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,713 UART: [ldev] ++
1,210,881 UART: [ldev] CDI.KEYID = 6
1,211,244 UART: [ldev] SUBJECT.KEYID = 5
1,211,670 UART: [ldev] AUTHORITY.KEYID = 7
1,212,133 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,516 UART: [fwproc] Wait for Commands...
1,283,294 UART: [fwproc] Recv command 0x46574c44
1,284,022 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,318 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,783 >>> mbox cmd response: success
2,828,823 UART: [afmc] ++
2,828,991 UART: [afmc] CDI.KEYID = 6
2,829,353 UART: [afmc] SUBJECT.KEYID = 7
2,829,778 UART: [afmc] AUTHORITY.KEYID = 5
2,864,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,098 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,807 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,690 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,267 UART: [afmc] --
2,908,331 UART: [cold-reset] --
2,909,321 UART: [state] Locking Datavault
2,910,624 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,228 UART: [state] Locking ICCM
2,911,882 UART: [exit] Launching FMC @ 0x40000130
2,917,212 UART:
2,917,228 UART: Running Caliptra FMC ...
2,917,636 UART:
2,917,690 UART: [state] CFI Enabled
2,928,030 UART: [fht] FMC Alias Private Key: 7
3,047,538 UART: [art] Extend RT PCRs Done
3,047,966 UART: [art] Lock RT PCRs Done
3,049,442 UART: [art] Populate DV Done
3,057,667 UART: [fht] FMC Alias Private Key: 7
3,058,657 UART: [art] Derive CDI
3,058,937 UART: [art] Store in slot 0x4
3,144,400 UART: [art] Derive Key Pair
3,144,760 UART: [art] Store priv key in slot 0x5
3,157,808 UART: [art] Derive Key Pair - Done
3,172,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,881 UART: [art] PUB.X = C23C5FBFB3D5D23BC065995B624FE91E0FA74DE11E6013AED78987150C40A9AFD1504DED9C64CDE5702FFA24251D4677
3,195,659 UART: [art] PUB.Y = CD9564A3AA2080AD83EFB43E984BCCBE38A60BE2F096E0F46C729358AA2A4DA417B43309D15DA821F610020833467D17
3,202,603 UART: [art] SIG.R = 56826984BC95953E878B0C8B4D02A48A0161239E69E00BE6B840ABE4D389ADB844D54D73024404BCD042FE513222E5FD
3,209,355 UART: [art] SIG.S = E7F775B84504A0FF556BE7B586CC69B07198D5D4F1F0E8BC5C8120A0534CCAED11200EDDD61C6654DE0D8CA4461FED72
3,233,526 UART: Caliptra RT
3,233,777 UART: [state] CFI Enabled
3,353,797 UART: [rt] RT listening for mailbox commands...
3,354,467 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,751 UART: [rt]cmd =0x434b4558, len=80
3,385,927 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,631 ready_for_fw is high
1,060,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,842 >>> mbox cmd response: success
2,743,237 UART:
2,743,253 UART: Running Caliptra FMC ...
2,743,661 UART:
2,743,715 UART: [state] CFI Enabled
2,754,043 UART: [fht] FMC Alias Private Key: 7
2,872,987 UART: [art] Extend RT PCRs Done
2,873,415 UART: [art] Lock RT PCRs Done
2,874,601 UART: [art] Populate DV Done
2,882,512 UART: [fht] FMC Alias Private Key: 7
2,883,666 UART: [art] Derive CDI
2,883,946 UART: [art] Store in slot 0x4
2,970,191 UART: [art] Derive Key Pair
2,970,551 UART: [art] Store priv key in slot 0x5
2,984,389 UART: [art] Derive Key Pair - Done
2,998,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,394 UART: [art] PUB.X = D10FC5FE2D0B35C5B9B84D9ABC404D2BD965776BFE20307656365A4F684937B9D64BDCEF34A21FFBACBCB562131F95FB
3,022,178 UART: [art] PUB.Y = 18E846FEF15D2FEFD262A54AB7D44A018C53FDE8473E390CBA9E63FD0FC464CE0D3BCBA5ADD71F542D92C15475A0F721
3,029,138 UART: [art] SIG.R = 3C8FD763F6F6FF9AC31F76AA8B1862C919F06D6125E603505CC72153D8BD4C27CF6E105E7370652B2FFA6AD75AC4041F
3,035,912 UART: [art] SIG.S = 3950B85927F66FCF2CB07F5BD799019FEFC6D7037837EFD2F1786E96C5A9855BAC2C8AB91DC3CA4FDC1BC84A29D867CE
3,060,256 UART: Caliptra RT
3,060,507 UART: [state] CFI Enabled
3,180,272 UART: [rt] RT listening for mailbox commands...
3,180,942 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,036 UART: [rt]cmd =0x434b4558, len=80
3,212,056 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,102 UART: [kat] SHA2-256
904,042 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,785 UART: [kat] HMAC-384Kdf
923,363 UART: [kat] LMS
1,171,691 UART: [kat] --
1,172,342 UART: [cold-reset] ++
1,172,738 UART: [fht] FHT @ 0x50003400
1,175,321 UART: [idev] ++
1,175,489 UART: [idev] CDI.KEYID = 6
1,175,849 UART: [idev] SUBJECT.KEYID = 7
1,176,273 UART: [idev] UDS.KEYID = 0
1,176,618 ready_for_fw is high
1,176,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,575 UART: [idev] Erasing UDS.KEYID = 0
1,201,722 UART: [idev] Sha1 KeyId Algorithm
1,210,180 UART: [idev] --
1,211,094 UART: [ldev] ++
1,211,262 UART: [ldev] CDI.KEYID = 6
1,211,625 UART: [ldev] SUBJECT.KEYID = 5
1,212,051 UART: [ldev] AUTHORITY.KEYID = 7
1,212,514 UART: [ldev] FE.KEYID = 1
1,217,810 UART: [ldev] Erasing FE.KEYID = 1
1,244,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,954 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,592 UART: [ldev] --
1,284,067 UART: [fwproc] Wait for Commands...
1,284,687 UART: [fwproc] Recv command 0x46574c44
1,285,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,827 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,296 >>> mbox cmd response: success
2,829,436 UART: [afmc] ++
2,829,604 UART: [afmc] CDI.KEYID = 6
2,829,966 UART: [afmc] SUBJECT.KEYID = 7
2,830,391 UART: [afmc] AUTHORITY.KEYID = 5
2,865,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,837 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,585 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,294 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,177 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,878 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,866 UART: [afmc] --
2,908,762 UART: [cold-reset] --
2,909,872 UART: [state] Locking Datavault
2,911,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,629 UART: [state] Locking ICCM
2,912,051 UART: [exit] Launching FMC @ 0x40000130
2,917,381 UART:
2,917,397 UART: Running Caliptra FMC ...
2,917,805 UART:
2,917,948 UART: [state] CFI Enabled
2,928,222 UART: [fht] FMC Alias Private Key: 7
3,046,780 UART: [art] Extend RT PCRs Done
3,047,208 UART: [art] Lock RT PCRs Done
3,048,384 UART: [art] Populate DV Done
3,056,597 UART: [fht] FMC Alias Private Key: 7
3,057,547 UART: [art] Derive CDI
3,057,827 UART: [art] Store in slot 0x4
3,143,628 UART: [art] Derive Key Pair
3,143,988 UART: [art] Store priv key in slot 0x5
3,157,228 UART: [art] Derive Key Pair - Done
3,172,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,297 UART: [art] PUB.X = 8950C5B9F1C58EFCE1150F0EDB6DC6C876672BCFE1C0A68F81BF0A4839DAA297C3D725695BDE8D4CE576BC1480F1B96F
3,195,078 UART: [art] PUB.Y = 5E3385A5EB9D17EA9358F08A7D1D04C00B8AB767CC4549B4A4EC6768EFB9A6BC878590EB9D940E8D77C66BE464CC35FD
3,202,035 UART: [art] SIG.R = F76E5C03A47B4A9931D97ABA8600947D36E345374C74E71F18D7AB465C735AEA99BC0B840A7EF88B7518A66EA460B42C
3,208,780 UART: [art] SIG.S = 69A825FCF4CEBF1392F68E7999A24FED7EF59A45AFB9649504F1012ABAAC20A50D56C895AE725B3FB0F08660A8D9D772
3,232,659 UART: Caliptra RT
3,233,002 UART: [state] CFI Enabled
3,352,636 UART: [rt] RT listening for mailbox commands...
3,353,306 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,470 UART: [rt]cmd =0x434b4558, len=80
3,384,748 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,716 ready_for_fw is high
1,059,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,121 >>> mbox cmd response: success
2,741,658 UART:
2,741,674 UART: Running Caliptra FMC ...
2,742,082 UART:
2,742,225 UART: [state] CFI Enabled
2,752,987 UART: [fht] FMC Alias Private Key: 7
2,872,087 UART: [art] Extend RT PCRs Done
2,872,515 UART: [art] Lock RT PCRs Done
2,874,081 UART: [art] Populate DV Done
2,882,156 UART: [fht] FMC Alias Private Key: 7
2,883,130 UART: [art] Derive CDI
2,883,410 UART: [art] Store in slot 0x4
2,969,311 UART: [art] Derive Key Pair
2,969,671 UART: [art] Store priv key in slot 0x5
2,982,921 UART: [art] Derive Key Pair - Done
2,997,690 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,222 UART: [art] PUB.X = 8DBDB37A4320E678FE4F2D104BC37A4A4406A5B4BB3A209732E419B2AAABCB15032C3D0376B88EE6EFD559CF95477E24
3,020,997 UART: [art] PUB.Y = EA97BD1FF223CC7D1D55E1BA0C54A18E1D181E781B4BE12571F67DED4B726C9DF78BC2B89B316A2D26F13E972B5AEBD9
3,027,966 UART: [art] SIG.R = AF7773B3C112750F71981AFC39672403B23E84FFB200A9E7B34A0F766EB7F33C9CFDFED380D7001CFD02E817025558C9
3,034,683 UART: [art] SIG.S = F570CA9D5186074FF016F2A2931CF62A8F6F8B2E9642C7EAB9FBEA2CCB6BD134F33CFA021C8A15DFC877D967F43B0019
3,058,063 UART: Caliptra RT
3,058,406 UART: [state] CFI Enabled
3,178,519 UART: [rt] RT listening for mailbox commands...
3,179,189 <<< Executing mbox cmd 0x434b4558 (80 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,313 UART: [rt]cmd =0x434b4558, len=80
3,210,153 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_extended_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,383 UART:
192,748 UART: Running Caliptra ROM ...
193,946 UART:
194,102 UART: [state] CFI Enabled
266,325 UART: [state] LifecycleState = Unprovisioned
268,307 UART: [state] DebugLocked = No
271,258 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,407 UART: [kat] SHA2-256
446,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,645 UART: [kat] ++
457,098 UART: [kat] sha1
468,920 UART: [kat] SHA2-256
471,640 UART: [kat] SHA2-384
477,022 UART: [kat] SHA2-512-ACC
479,403 UART: [kat] ECC-384
2,767,071 UART: [kat] HMAC-384Kdf
2,777,890 UART: [kat] LMS
3,968,129 UART: [kat] --
3,971,626 UART: [cold-reset] ++
3,973,411 UART: [fht] Storing FHT @ 0x50003400
3,985,670 UART: [idev] ++
3,986,239 UART: [idev] CDI.KEYID = 6
3,987,123 UART: [idev] SUBJECT.KEYID = 7
3,988,436 UART: [idev] UDS.KEYID = 0
3,989,440 ready_for_fw is high
3,989,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,159 UART: [idev] Erasing UDS.KEYID = 0
7,325,729 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,533 UART: [idev] --
7,351,423 UART: [ldev] ++
7,351,994 UART: [ldev] CDI.KEYID = 6
7,353,085 UART: [ldev] SUBJECT.KEYID = 5
7,354,213 UART: [ldev] AUTHORITY.KEYID = 7
7,355,470 UART: [ldev] FE.KEYID = 1
7,399,228 UART: [ldev] Erasing FE.KEYID = 1
10,731,864 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,044 UART: [ldev] --
13,115,144 UART: [fwproc] Waiting for Commands...
13,118,255 UART: [fwproc] Received command 0x46574c44
13,120,442 UART: [fwproc] Received Image of size 118548 bytes
17,217,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,403 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,609 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,881 >>> mbox cmd response: success
17,703,473 UART: [afmc] ++
17,704,111 UART: [afmc] CDI.KEYID = 6
17,705,026 UART: [afmc] SUBJECT.KEYID = 7
17,706,249 UART: [afmc] AUTHORITY.KEYID = 5
21,072,977 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,960 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,221 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,363 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,808 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,036 UART: [afmc] --
23,442,431 UART: [cold-reset] --
23,446,795 UART: [state] Locking Datavault
23,451,398 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,151 UART: [state] Locking ICCM
23,454,760 UART: [exit] Launching FMC @ 0x40000130
23,463,158 UART:
23,463,416 UART: Running Caliptra FMC ...
23,464,519 UART:
23,464,684 UART: [state] CFI Enabled
23,529,976 UART: [fht] FMC Alias Private Key: 7
25,870,738 UART: [art] Extend RT PCRs Done
25,871,957 UART: [art] Lock RT PCRs Done
25,873,776 UART: [art] Populate DV Done
25,879,450 UART: [fht] FMC Alias Private Key: 7
25,881,092 UART: [art] Derive CDI
25,881,830 UART: [art] Store in slot 0x4
25,938,593 UART: [art] Derive Key Pair
25,939,632 UART: [art] Store priv key in slot 0x5
29,232,857 UART: [art] Derive Key Pair - Done
29,246,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,403 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,915 UART: [art] PUB.X = 841B4F2894665278BD70448BE1AE3000BCBDE20EB0A279DA2B3435C799588732DA0172BD79FBCE871E21905FEA831759
31,542,183 UART: [art] PUB.Y = 3C31CB2264B7B41DC21A9664FC9F91A81D6FF189B168C01AD7EDBEF85D20047115BF58ADA3B5318C87734D5312D0E65A
31,549,415 UART: [art] SIG.R = 0C6687F63A85DFD15BADF45EBC70E0DC948E3818B21A56BE1CB63523ECEB41291F13BE76028674E959E418A6A8F2DA6A
31,556,805 UART: [art] SIG.S = 5A1933B4FF40CCCB0DBE9E7333D06C0B5E5A5B791951A3530AF232DF8F215A4F5722517337706521BF39DF1C6C0DAF25
32,861,865 UART: Caliptra RT
32,862,567 UART: [state] CFI Enabled
33,041,663 UART: [rt] RT listening for mailbox commands...
33,043,586 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,074,122 UART: [rt]cmd =0x44504543, len=92
33,080,746 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,783,524 ready_for_fw is high
3,783,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,612 >>> mbox cmd response: success
23,683,360 UART:
23,683,795 UART: Running Caliptra FMC ...
23,684,957 UART:
23,685,127 UART: [state] CFI Enabled
23,752,652 UART: [fht] FMC Alias Private Key: 7
26,092,990 UART: [art] Extend RT PCRs Done
26,094,224 UART: [art] Lock RT PCRs Done
26,095,827 UART: [art] Populate DV Done
26,101,467 UART: [fht] FMC Alias Private Key: 7
26,103,183 UART: [art] Derive CDI
26,104,007 UART: [art] Store in slot 0x4
26,160,055 UART: [art] Derive Key Pair
26,161,106 UART: [art] Store priv key in slot 0x5
29,453,858 UART: [art] Derive Key Pair - Done
29,466,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,679 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,202 UART: [art] PUB.X = F65ACF205794ADB9F55D12D6093F91A241CE2AF69C5417774209787E856038FC5D2DB2D99E1F197A4F8F2B4E897EE55C
31,763,465 UART: [art] PUB.Y = DCA75690EFE92DBC6E445D976CB2FB1C44BD6BD944AFEAC62EBE8297C7537423ADCC69AAA784F0D65E81D78544746ACD
31,770,712 UART: [art] SIG.R = BDA9D733D2DAFEFDCDD74BA829285392DC7E9BCE202BE0D4ECDEB3EE6E125E526B8CB023421B43B71ED15FA5A3DEB8EB
31,778,162 UART: [art] SIG.S = 022C1CF7DD291476C28E58D348D2C70FC7C462ED4F4B5EF261BB1B6E2BB9690622D875620070B3A91EF2FE4A3404963E
33,082,916 UART: Caliptra RT
33,083,649 UART: [state] CFI Enabled
33,262,231 UART: [rt] RT listening for mailbox commands...
33,264,166 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,294,982 UART: [rt]cmd =0x44504543, len=92
33,301,759 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,482 UART:
192,824 UART: Running Caliptra ROM ...
193,993 UART:
603,613 UART: [state] CFI Enabled
616,645 UART: [state] LifecycleState = Unprovisioned
618,566 UART: [state] DebugLocked = No
621,084 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,115 UART: [kat] SHA2-256
794,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,417 UART: [kat] ++
805,861 UART: [kat] sha1
816,801 UART: [kat] SHA2-256
819,514 UART: [kat] SHA2-384
824,997 UART: [kat] SHA2-512-ACC
827,357 UART: [kat] ECC-384
3,111,081 UART: [kat] HMAC-384Kdf
3,122,604 UART: [kat] LMS
4,312,692 UART: [kat] --
4,317,212 UART: [cold-reset] ++
4,318,577 UART: [fht] Storing FHT @ 0x50003400
4,328,428 UART: [idev] ++
4,328,989 UART: [idev] CDI.KEYID = 6
4,330,014 UART: [idev] SUBJECT.KEYID = 7
4,331,204 UART: [idev] UDS.KEYID = 0
4,332,244 ready_for_fw is high
4,332,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,266 UART: [idev] Erasing UDS.KEYID = 0
7,620,285 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,390 UART: [idev] --
7,645,110 UART: [ldev] ++
7,645,726 UART: [ldev] CDI.KEYID = 6
7,646,734 UART: [ldev] SUBJECT.KEYID = 5
7,647,882 UART: [ldev] AUTHORITY.KEYID = 7
7,649,156 UART: [ldev] FE.KEYID = 1
7,659,167 UART: [ldev] Erasing FE.KEYID = 1
10,945,898 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,180 UART: [ldev] --
13,309,059 UART: [fwproc] Waiting for Commands...
13,311,042 UART: [fwproc] Received command 0x46574c44
13,313,219 UART: [fwproc] Received Image of size 118548 bytes
17,417,389 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,945 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,933 >>> mbox cmd response: success
17,901,298 UART: [afmc] ++
17,901,930 UART: [afmc] CDI.KEYID = 6
17,902,844 UART: [afmc] SUBJECT.KEYID = 7
17,904,108 UART: [afmc] AUTHORITY.KEYID = 5
21,217,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,616 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,869 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,022 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,422 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,520 UART: [afmc] --
23,583,505 UART: [cold-reset] --
23,588,290 UART: [state] Locking Datavault
23,594,507 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,265 UART: [state] Locking ICCM
23,597,322 UART: [exit] Launching FMC @ 0x40000130
23,605,660 UART:
23,605,891 UART: Running Caliptra FMC ...
23,606,982 UART:
23,607,135 UART: [state] CFI Enabled
23,615,260 UART: [fht] FMC Alias Private Key: 7
25,955,910 UART: [art] Extend RT PCRs Done
25,957,160 UART: [art] Lock RT PCRs Done
25,958,938 UART: [art] Populate DV Done
25,964,251 UART: [fht] FMC Alias Private Key: 7
25,965,739 UART: [art] Derive CDI
25,966,501 UART: [art] Store in slot 0x4
26,009,045 UART: [art] Derive Key Pair
26,010,092 UART: [art] Store priv key in slot 0x5
29,251,420 UART: [art] Derive Key Pair - Done
29,264,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,792 UART: [art] PUB.X = 0BE3BF9566BE7278A6AED34624298CC4B5EA8A9A14ECFAC0242EC9F728FDF5D686F59D7008002B228419B76C14106802
31,553,034 UART: [art] PUB.Y = D669588E88DCC4DF059941312D2A2BEB97F7C139A560698FF1A40D8CC060C38675CD12B91F9F9CE0C1419051E78549DF
31,560,317 UART: [art] SIG.R = CCC7ECBFF779D4639B0D4FE47C5D8BDBFD717306AAEB94252308314E2D923C26545E25B3F4451078FA908E0B4357ABD4
31,567,712 UART: [art] SIG.S = C70753CC97D3C715A76F1F594E38FC861C4622CE27FAEB758F4B41E7A84A336309C7F3A6F77C65F8AD6E23A18FF4531B
32,873,373 UART: Caliptra RT
32,874,065 UART: [state] CFI Enabled
33,007,921 UART: [rt] RT listening for mailbox commands...
33,009,872 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,040,407 UART: [rt]cmd =0x44504543, len=92
33,047,245 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
4,134,517 ready_for_fw is high
4,134,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,175,022 >>> mbox cmd response: success
23,815,293 UART:
23,815,706 UART: Running Caliptra FMC ...
23,816,907 UART:
23,817,269 UART: [state] CFI Enabled
23,824,914 UART: [fht] FMC Alias Private Key: 7
26,165,111 UART: [art] Extend RT PCRs Done
26,166,339 UART: [art] Lock RT PCRs Done
26,167,963 UART: [art] Populate DV Done
26,173,273 UART: [fht] FMC Alias Private Key: 7
26,174,867 UART: [art] Derive CDI
26,175,697 UART: [art] Store in slot 0x4
26,218,081 UART: [art] Derive Key Pair
26,219,128 UART: [art] Store priv key in slot 0x5
29,461,326 UART: [art] Derive Key Pair - Done
29,474,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,534 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,046 UART: [art] PUB.X = C7745D870C0A66BA522F993CF7278B9FA5E8BA5E6AB3BCCD26301BEE8088934BB786ED0BCD017E45DA52DF0B5EF31F4E
31,763,295 UART: [art] PUB.Y = 1A6FE437B376C7500539EA387098C3D1AD38884F4DD20F76D579B41D0A68EE0CF396CEBCF4DF986479F2F08468C3B704
31,770,549 UART: [art] SIG.R = DE9FD01787AF9B72BC4199EFCADF39EE56CFFFC693FECFCB20316D4D6D9E09F104FD78D316B1A8A924DF839914DA520F
31,777,995 UART: [art] SIG.S = 50C7CBE2B87542D83E79FB6BADBCDB2DC9F7F056CA702535AD837C7098E1B0E4461B936D1D1136AFC92CBFF4F6901FC6
33,083,260 UART: Caliptra RT
33,083,970 UART: [state] CFI Enabled
33,217,610 UART: [rt] RT listening for mailbox commands...
33,219,522 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,249,883 UART: [rt]cmd =0x44504543, len=92
33,256,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
193,046 UART:
193,410 UART: Running Caliptra ROM ...
194,562 UART:
194,708 UART: [state] CFI Enabled
267,001 UART: [state] LifecycleState = Unprovisioned
268,930 UART: [state] DebugLocked = No
270,251 UART: [state] WD Timer not started. Device not locked for debugging
273,357 UART: [kat] SHA2-256
453,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,749 UART: [kat] ++
464,199 UART: [kat] sha1
476,209 UART: [kat] SHA2-256
478,860 UART: [kat] SHA2-384
484,775 UART: [kat] SHA2-512-ACC
487,118 UART: [kat] ECC-384
2,951,821 UART: [kat] HMAC-384Kdf
2,973,886 UART: [kat] LMS
3,450,346 UART: [kat] --
3,455,132 UART: [cold-reset] ++
3,457,485 UART: [fht] FHT @ 0x50003400
3,469,953 UART: [idev] ++
3,470,512 UART: [idev] CDI.KEYID = 6
3,471,538 UART: [idev] SUBJECT.KEYID = 7
3,472,703 UART: [idev] UDS.KEYID = 0
3,473,698 ready_for_fw is high
3,473,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,410 UART: [idev] Erasing UDS.KEYID = 0
5,991,747 UART: [idev] Sha1 KeyId Algorithm
6,016,535 UART: [idev] --
6,020,995 UART: [ldev] ++
6,021,576 UART: [ldev] CDI.KEYID = 6
6,022,488 UART: [ldev] SUBJECT.KEYID = 5
6,023,701 UART: [ldev] AUTHORITY.KEYID = 7
6,024,982 UART: [ldev] FE.KEYID = 1
6,060,437 UART: [ldev] Erasing FE.KEYID = 1
8,568,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,997 UART: [ldev] --
10,377,662 UART: [fwproc] Wait for Commands...
10,379,642 UART: [fwproc] Recv command 0x46574c44
10,381,620 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,721 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,335,905 >>> mbox cmd response: success
14,339,384 UART: [afmc] ++
14,340,001 UART: [afmc] CDI.KEYID = 6
14,340,934 UART: [afmc] SUBJECT.KEYID = 7
14,342,146 UART: [afmc] AUTHORITY.KEYID = 5
16,879,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,623,225 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,625,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,641,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,657,341 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,672,892 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,697,510 UART: [afmc] --
18,701,964 UART: [cold-reset] --
18,705,980 UART: [state] Locking Datavault
18,711,329 UART: [state] Locking PCR0, PCR1 and PCR31
18,713,023 UART: [state] Locking ICCM
18,714,636 UART: [exit] Launching FMC @ 0x40000130
18,723,086 UART:
18,723,320 UART: Running Caliptra FMC ...
18,724,662 UART:
18,724,838 UART: [state] CFI Enabled
18,780,115 UART: [fht] FMC Alias Private Key: 7
20,546,342 UART: [art] Extend RT PCRs Done
20,547,567 UART: [art] Lock RT PCRs Done
20,549,512 UART: [art] Populate DV Done
20,554,816 UART: [fht] FMC Alias Private Key: 7
20,556,563 UART: [art] Derive CDI
20,557,372 UART: [art] Store in slot 0x4
20,612,909 UART: [art] Derive Key Pair
20,613,945 UART: [art] Store priv key in slot 0x5
23,076,640 UART: [art] Derive Key Pair - Done
23,089,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,610 UART: [art] Erasing AUTHORITY.KEYID = 7
24,803,113 UART: [art] PUB.X = 2D11B824AD5CB1B2D37E2C5C065D125D830EE2F7FFE6FE58FE4C6CFD4E0BED4DFA39164ECAE76796CAC69CED226809F5
24,810,439 UART: [art] PUB.Y = C0FE8542B17611C3A01F94C8FB1660BF0C82AB7CFE28CFD5FC1F84284B4FBC2148CE3FEF0F4DF57DE93629B3EA18CE43
24,817,705 UART: [art] SIG.R = E2BBB4E9ADCD0B273973621FCB130CB7F4A49E4CC42294F023623FCE2EA7CAF869F921FD3E0FC6B937CBDB47034C5680
24,825,096 UART: [art] SIG.S = 0FF54A5CCC535D03BD722FBB331375CCFDE0AC7138DD8890F277AB511FA11E5AC2EF06837E0E6BD1F1AF4E543FED187C
25,804,310 UART: Caliptra RT
25,804,997 UART: [state] CFI Enabled
25,984,354 UART: [rt] RT listening for mailbox commands...
25,986,279 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,016,808 UART: [rt]cmd =0x44504543, len=92
26,023,297 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,461,912 ready_for_fw is high
3,462,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,490 >>> mbox cmd response: success
18,537,259 UART:
18,537,660 UART: Running Caliptra FMC ...
18,538,770 UART:
18,538,922 UART: [state] CFI Enabled
18,602,050 UART: [fht] FMC Alias Private Key: 7
20,369,142 UART: [art] Extend RT PCRs Done
20,370,402 UART: [art] Lock RT PCRs Done
20,371,894 UART: [art] Populate DV Done
20,377,262 UART: [fht] FMC Alias Private Key: 7
20,378,966 UART: [art] Derive CDI
20,379,778 UART: [art] Store in slot 0x4
20,434,436 UART: [art] Derive Key Pair
20,435,617 UART: [art] Store priv key in slot 0x5
22,898,583 UART: [art] Derive Key Pair - Done
22,911,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,910 UART: [art] PUB.X = 8CFB3CEAE489A134B60CDBCF82E22694196280427CD36D23CA413AA25D7B9A2CAC4C45A3A1A8ECE0AE8AF77DE05FAF41
24,633,116 UART: [art] PUB.Y = 96DA80BE54F26CDCED464BFA3E156BFE85426913F696482F7874472253AF5A6D6B8DC5E60FA4F7D5EAF84D8A509E2D1A
24,640,380 UART: [art] SIG.R = 2E3DF857BCEEF38ABF853AB79AD7C565750D9899D30A5DC7DB9B3A8C064170BF47E5EE299A526A6C022083895E38C743
24,647,790 UART: [art] SIG.S = 028E3C8373A3A3E4689FD322D8BEF3B1C4643848120787CBF24FB13FEC6B1ED3D64D75F4B4391F27F276966A61D4E9D4
25,626,571 UART: Caliptra RT
25,627,281 UART: [state] CFI Enabled
25,808,680 UART: [rt] RT listening for mailbox commands...
25,810,601 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,841,134 UART: [rt]cmd =0x44504543, len=92
25,847,967 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,552 UART:
192,913 UART: Running Caliptra ROM ...
194,044 UART:
603,742 UART: [state] CFI Enabled
615,026 UART: [state] LifecycleState = Unprovisioned
616,980 UART: [state] DebugLocked = No
618,370 UART: [state] WD Timer not started. Device not locked for debugging
622,700 UART: [kat] SHA2-256
802,317 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,142 UART: [kat] ++
813,593 UART: [kat] sha1
825,674 UART: [kat] SHA2-256
828,402 UART: [kat] SHA2-384
834,035 UART: [kat] SHA2-512-ACC
836,408 UART: [kat] ECC-384
3,277,390 UART: [kat] HMAC-384Kdf
3,290,479 UART: [kat] LMS
3,766,943 UART: [kat] --
3,771,721 UART: [cold-reset] ++
3,772,943 UART: [fht] FHT @ 0x50003400
3,784,061 UART: [idev] ++
3,784,642 UART: [idev] CDI.KEYID = 6
3,785,674 UART: [idev] SUBJECT.KEYID = 7
3,786,848 UART: [idev] UDS.KEYID = 0
3,787,775 ready_for_fw is high
3,787,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,823 UART: [idev] Erasing UDS.KEYID = 0
6,263,436 UART: [idev] Sha1 KeyId Algorithm
6,287,796 UART: [idev] --
6,291,875 UART: [ldev] ++
6,292,455 UART: [ldev] CDI.KEYID = 6
6,293,343 UART: [ldev] SUBJECT.KEYID = 5
6,294,556 UART: [ldev] AUTHORITY.KEYID = 7
6,295,842 UART: [ldev] FE.KEYID = 1
6,308,489 UART: [ldev] Erasing FE.KEYID = 1
8,790,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,025 UART: [ldev] --
10,584,994 UART: [fwproc] Wait for Commands...
10,588,063 UART: [fwproc] Recv command 0x46574c44
10,590,054 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,595 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,801 >>> mbox cmd response: success
14,564,028 UART: [afmc] ++
14,564,631 UART: [afmc] CDI.KEYID = 6
14,565,540 UART: [afmc] SUBJECT.KEYID = 7
14,566,757 UART: [afmc] AUTHORITY.KEYID = 5
17,070,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,957 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,050 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,660 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,819 UART: [afmc] --
18,867,946 UART: [cold-reset] --
18,872,133 UART: [state] Locking Datavault
18,879,923 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,627 UART: [state] Locking ICCM
18,882,973 UART: [exit] Launching FMC @ 0x40000130
18,891,372 UART:
18,891,611 UART: Running Caliptra FMC ...
18,892,710 UART:
18,892,869 UART: [state] CFI Enabled
18,900,759 UART: [fht] FMC Alias Private Key: 7
20,666,698 UART: [art] Extend RT PCRs Done
20,667,924 UART: [art] Lock RT PCRs Done
20,669,717 UART: [art] Populate DV Done
20,675,076 UART: [fht] FMC Alias Private Key: 7
20,676,748 UART: [art] Derive CDI
20,677,566 UART: [art] Store in slot 0x4
20,720,114 UART: [art] Derive Key Pair
20,721,159 UART: [art] Store priv key in slot 0x5
23,147,608 UART: [art] Derive Key Pair - Done
23,160,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,819 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,305 UART: [art] PUB.X = ACC7F2EACA5628318C3344B68F4FB98A2C476602D97B9BE30DB2353548528D722F4BAE7496C0441DAD0826543E3D2A84
24,875,601 UART: [art] PUB.Y = E9DFE277DBCF2283E0D5D130E86B175BFF6703F8733DFDF71D4334484353D7EA1A4FC2E6825E834C4796AB3D402072A3
24,882,897 UART: [art] SIG.R = 504B54B16733F4C6DFD96C20BBA12BEB43AE9C5F7128240297D8B9B8322123C9C89FCB05514D0F830B5D8D5A38B68DDE
24,890,294 UART: [art] SIG.S = 8C0D34D7FB33908E0EB599C791BDCB2CE06175F7DD06C0FC203428C4FD7DDE646284C9E6369A6D2220A1D1991DE5F354
25,868,641 UART: Caliptra RT
25,869,351 UART: [state] CFI Enabled
26,002,398 UART: [rt] RT listening for mailbox commands...
26,004,318 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,034,739 UART: [rt]cmd =0x44504543, len=92
26,041,547 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,775,930 ready_for_fw is high
3,776,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,471 >>> mbox cmd response: success
18,699,516 UART:
18,699,912 UART: Running Caliptra FMC ...
18,701,118 UART:
18,701,298 UART: [state] CFI Enabled
18,708,813 UART: [fht] FMC Alias Private Key: 7
20,475,190 UART: [art] Extend RT PCRs Done
20,476,411 UART: [art] Lock RT PCRs Done
20,477,870 UART: [art] Populate DV Done
20,483,253 UART: [fht] FMC Alias Private Key: 7
20,484,912 UART: [art] Derive CDI
20,485,752 UART: [art] Store in slot 0x4
20,527,921 UART: [art] Derive Key Pair
20,528,926 UART: [art] Store priv key in slot 0x5
22,955,792 UART: [art] Derive Key Pair - Done
22,968,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,548 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,051 UART: [art] PUB.X = DEBB7C1739AC85A06B9031E8C7E992D6483DB850FA4F53ABDDF7EF91794CD614CEFD30D39F8022736E6BE982C5D407FE
24,684,365 UART: [art] PUB.Y = 0FF8380812A1D498293815202E22A453CE696FE476C9768BF53C99B4D5B77EE5A5564F06B32BF81A265C6F3B862161F9
24,691,593 UART: [art] SIG.R = 5110C472C92265B9DA7175F37228D371708E6F798511DFA243DE978894FC6321B115761CE82886FA382D2274569E2929
24,698,939 UART: [art] SIG.S = 5B9063DBCF046876C110F2349D69BEF8034F27CAA18A663FF0792AEB305A992FB01BD6147127D0407EF7A45A24FACFC2
25,677,799 UART: Caliptra RT
25,678,502 UART: [state] CFI Enabled
25,810,035 UART: [rt] RT listening for mailbox commands...
25,811,960 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,842,704 UART: [rt]cmd =0x44504543, len=92
25,849,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
192,089 UART:
192,449 UART: Running Caliptra ROM ...
193,589 UART:
193,737 UART: [state] CFI Enabled
264,182 UART: [state] LifecycleState = Unprovisioned
266,588 UART: [state] DebugLocked = No
268,393 UART: [state] WD Timer not started. Device not locked for debugging
272,925 UART: [kat] SHA2-256
462,812 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,554 UART: [kat] ++
473,999 UART: [kat] sha1
485,599 UART: [kat] SHA2-256
488,614 UART: [kat] SHA2-384
494,041 UART: [kat] SHA2-512-ACC
496,623 UART: [kat] ECC-384
2,946,465 UART: [kat] HMAC-384Kdf
2,971,918 UART: [kat] LMS
3,503,648 UART: [kat] --
3,508,288 UART: [cold-reset] ++
3,510,574 UART: [fht] FHT @ 0x50003400
3,523,040 UART: [idev] ++
3,523,749 UART: [idev] CDI.KEYID = 6
3,524,723 UART: [idev] SUBJECT.KEYID = 7
3,525,892 UART: [idev] UDS.KEYID = 0
3,526,814 ready_for_fw is high
3,526,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,052 UART: [idev] Erasing UDS.KEYID = 0
6,028,184 UART: [idev] Sha1 KeyId Algorithm
6,050,338 UART: [idev] --
6,054,259 UART: [ldev] ++
6,054,947 UART: [ldev] CDI.KEYID = 6
6,055,863 UART: [ldev] SUBJECT.KEYID = 5
6,057,022 UART: [ldev] AUTHORITY.KEYID = 7
6,058,252 UART: [ldev] FE.KEYID = 1
6,102,866 UART: [ldev] Erasing FE.KEYID = 1
8,606,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,882 UART: [ldev] --
10,415,031 UART: [fwproc] Wait for Commands...
10,417,391 UART: [fwproc] Recv command 0x46574c44
10,419,714 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,238 >>> mbox cmd response: success
14,680,699 UART: [afmc] ++
14,681,423 UART: [afmc] CDI.KEYID = 6
14,682,611 UART: [afmc] SUBJECT.KEYID = 7
14,684,095 UART: [afmc] AUTHORITY.KEYID = 5
17,213,884 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,739 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,546 UART: [afmc] --
19,033,507 UART: [cold-reset] --
19,036,780 UART: [state] Locking Datavault
19,043,544 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,693 UART: [state] Locking ICCM
19,047,414 UART: [exit] Launching FMC @ 0x40000130
19,056,090 UART:
19,056,325 UART: Running Caliptra FMC ...
19,057,426 UART:
19,057,585 UART: [state] CFI Enabled
19,114,160 UART: [fht] FMC Alias Private Key: 7
20,901,355 UART: [art] Extend RT PCRs Done
20,902,576 UART: [art] Lock RT PCRs Done
20,904,548 UART: [art] Populate DV Done
20,910,007 UART: [fht] FMC Alias Private Key: 7
20,911,596 UART: [art] Derive CDI
20,912,343 UART: [art] Store in slot 0x4
20,968,478 UART: [art] Derive Key Pair
20,969,516 UART: [art] Store priv key in slot 0x5
23,431,946 UART: [art] Derive Key Pair - Done
23,444,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,429 UART: [art] PUB.X = CFD9CA169BA64682EAC33D36B84892B7A74A0AFEF02B579400003378D8D2629ADB701351F58B8088F5F8886428BB8988
25,166,638 UART: [art] PUB.Y = 872F9CFE4563FD47D2F3F11A1EFD6EB097AD33D22C5BB12693AD9B7619FF0D27EF5EBA1C4D59AB03E65A0A6C0C267DB9
25,173,944 UART: [art] SIG.R = 7C56C0EB1A20998175A9EBEA38E6E72A3A7E3D10FF9F405DD3F590E0FF2BF93114F96F7167FAE40FEED19D000AC99602
25,181,345 UART: [art] SIG.S = 6526F30A9BA476A67AB094FDF9BC73BDD11878579C63A737AAA8A8254E038AD5E30DCA42D36FCA2E6D7C7D826442BE00
26,160,402 UART: Caliptra RT
26,161,114 UART: [state] CFI Enabled
26,342,377 UART: [rt] RT listening for mailbox commands...
26,344,304 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,374,836 UART: [rt]cmd =0x44504543, len=92
26,381,166 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,436,730 ready_for_fw is high
3,437,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,010 >>> mbox cmd response: success
19,103,772 UART:
19,104,160 UART: Running Caliptra FMC ...
19,105,287 UART:
19,105,449 UART: [state] CFI Enabled
19,170,491 UART: [fht] FMC Alias Private Key: 7
20,936,804 UART: [art] Extend RT PCRs Done
20,938,029 UART: [art] Lock RT PCRs Done
20,939,703 UART: [art] Populate DV Done
20,945,230 UART: [fht] FMC Alias Private Key: 7
20,946,873 UART: [art] Derive CDI
20,947,685 UART: [art] Store in slot 0x4
21,003,540 UART: [art] Derive Key Pair
21,004,588 UART: [art] Store priv key in slot 0x5
23,467,513 UART: [art] Derive Key Pair - Done
23,480,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,193,225 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,738 UART: [art] PUB.X = F7A062CE921FF11848E3042ACC8BD954C743833B19CADEE1D9DEDCDDF7477BB839875F2C3F2743A9E9267920EFEB8C17
25,202,021 UART: [art] PUB.Y = 70A240AA51FCA988822D9B3CA1E2242FC329C1E2B7B37FFB496CC0AE527CF68CC9751406B2500EDD6B109E3D51715AE9
25,209,257 UART: [art] SIG.R = CF1CF1D738EC3FBF65F83B35629B04CE38B7998801400FC625BE0CDFECA517C622DC80168F9A38008340598BC34AB005
25,216,638 UART: [art] SIG.S = CD5C3F9C2A69EA696DD0A966AFAA59DF1D6591D6BFC3B2FE94D8724870C7FB1763550DFD95EF53531C9C5B838BC0B44D
26,196,216 UART: Caliptra RT
26,196,927 UART: [state] CFI Enabled
26,376,271 UART: [rt] RT listening for mailbox commands...
26,378,208 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,408,690 UART: [rt]cmd =0x44504543, len=92
26,415,182 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,501 UART:
192,868 UART: Running Caliptra ROM ...
193,967 UART:
603,798 UART: [state] CFI Enabled
621,191 UART: [state] LifecycleState = Unprovisioned
623,604 UART: [state] DebugLocked = No
626,494 UART: [state] WD Timer not started. Device not locked for debugging
631,687 UART: [kat] SHA2-256
821,551 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,365 UART: [kat] ++
832,891 UART: [kat] sha1
843,925 UART: [kat] SHA2-256
846,940 UART: [kat] SHA2-384
852,705 UART: [kat] SHA2-512-ACC
855,300 UART: [kat] ECC-384
3,296,911 UART: [kat] HMAC-384Kdf
3,310,172 UART: [kat] LMS
3,841,975 UART: [kat] --
3,846,331 UART: [cold-reset] ++
3,848,123 UART: [fht] FHT @ 0x50003400
3,858,394 UART: [idev] ++
3,859,113 UART: [idev] CDI.KEYID = 6
3,860,149 UART: [idev] SUBJECT.KEYID = 7
3,861,254 UART: [idev] UDS.KEYID = 0
3,862,207 ready_for_fw is high
3,862,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,393 UART: [idev] Erasing UDS.KEYID = 0
6,338,624 UART: [idev] Sha1 KeyId Algorithm
6,360,933 UART: [idev] --
6,365,526 UART: [ldev] ++
6,366,212 UART: [ldev] CDI.KEYID = 6
6,367,124 UART: [ldev] SUBJECT.KEYID = 5
6,368,331 UART: [ldev] AUTHORITY.KEYID = 7
6,369,525 UART: [ldev] FE.KEYID = 1
6,382,258 UART: [ldev] Erasing FE.KEYID = 1
8,860,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,513 UART: [ldev] --
10,650,076 UART: [fwproc] Wait for Commands...
10,653,147 UART: [fwproc] Recv command 0x46574c44
10,655,485 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,261 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,166 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,913,002 >>> mbox cmd response: success
14,916,850 UART: [afmc] ++
14,917,555 UART: [afmc] CDI.KEYID = 6
14,918,673 UART: [afmc] SUBJECT.KEYID = 7
14,920,230 UART: [afmc] AUTHORITY.KEYID = 5
17,422,530 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,684 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,858 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,803 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,693 UART: [afmc] --
19,218,829 UART: [cold-reset] --
19,224,915 UART: [state] Locking Datavault
19,231,425 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,590 UART: [state] Locking ICCM
19,235,674 UART: [exit] Launching FMC @ 0x40000130
19,244,374 UART:
19,244,614 UART: Running Caliptra FMC ...
19,245,718 UART:
19,245,882 UART: [state] CFI Enabled
19,253,791 UART: [fht] FMC Alias Private Key: 7
21,020,451 UART: [art] Extend RT PCRs Done
21,021,675 UART: [art] Lock RT PCRs Done
21,023,583 UART: [art] Populate DV Done
21,028,950 UART: [fht] FMC Alias Private Key: 7
21,030,546 UART: [art] Derive CDI
21,031,370 UART: [art] Store in slot 0x4
21,073,563 UART: [art] Derive Key Pair
21,074,573 UART: [art] Store priv key in slot 0x5
23,501,233 UART: [art] Derive Key Pair - Done
23,514,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,036 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,547 UART: [art] PUB.X = 374397A1FFF24DF128A673D241E4FE69DF45663D75CA52E2F78E6E6B8F6E67ABBE6B9AD585BDC3B219A1B380943E2B9B
25,229,825 UART: [art] PUB.Y = 2F691096BBD8799FFE07638697E832F5D340635A47A9276D752C37D4C9E489009943D31608D16462E142C4563172BEB6
25,237,027 UART: [art] SIG.R = 3907C64DC47DBFEC53A30514B02C6C2C7DF3D6705DC5BBDD2834309A0938EFFFF64BADF4B5964B5875362831803BB3DE
25,244,400 UART: [art] SIG.S = F387826107E9F3A45378D01DE27CCC0E8AEF624902871BD89F18C2AE331AB5FE0B346BECE089DB859652C8CB3E9C349E
26,223,011 UART: Caliptra RT
26,223,727 UART: [state] CFI Enabled
26,356,604 UART: [rt] RT listening for mailbox commands...
26,358,524 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,389,212 UART: [rt]cmd =0x44504543, len=92
26,395,760 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
3,753,068 ready_for_fw is high
3,753,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,080 >>> mbox cmd response: success
19,291,738 UART:
19,292,142 UART: Running Caliptra FMC ...
19,293,348 UART:
19,293,518 UART: [state] CFI Enabled
19,301,249 UART: [fht] FMC Alias Private Key: 7
21,067,493 UART: [art] Extend RT PCRs Done
21,068,724 UART: [art] Lock RT PCRs Done
21,070,091 UART: [art] Populate DV Done
21,075,472 UART: [fht] FMC Alias Private Key: 7
21,077,127 UART: [art] Derive CDI
21,077,950 UART: [art] Store in slot 0x4
21,120,394 UART: [art] Derive Key Pair
21,121,436 UART: [art] Store priv key in slot 0x5
23,548,363 UART: [art] Derive Key Pair - Done
23,561,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,735 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,250 UART: [art] PUB.X = 9B438E7D40A54220C32499F28AF056B4AEFB52667547E3C17ADC617E14DF51C5E382A5A98FC2FCF3505DB885546C8C47
25,276,532 UART: [art] PUB.Y = D832C1C092140B5D34427A6AAC5412FF57D453F2E3FD10E4040DD07C6EBD731209954336578D57293FB62CB79D672DEB
25,283,764 UART: [art] SIG.R = BEB4864AFDE760D7D5BBF09305797343A13F82866B7C51F36E7200FF3CB65C0F899829CD3CFD16E6C7D28C8E3C1C557A
25,291,125 UART: [art] SIG.S = 49C4E926DC343C7AB756A25AA69D672E6B0C0EA166F0809D88F6E884747CF2F8CF0BDC7FDBA717261E1BA1115A7D5D1E
26,269,842 UART: Caliptra RT
26,270,547 UART: [state] CFI Enabled
26,403,830 UART: [rt] RT listening for mailbox commands...
26,405,762 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,436,244 UART: [rt]cmd =0x44504543, len=92
26,443,191 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,477 UART: [kat] SHA2-256
892,415 UART: [kat] SHA2-384
895,040 UART: [kat] SHA2-512-ACC
896,941 UART: [kat] ECC-384
902,438 UART: [kat] HMAC-384Kdf
907,072 UART: [kat] LMS
1,475,268 UART: [kat] --
1,476,113 UART: [cold-reset] ++
1,476,689 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 ready_for_fw is high
1,480,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,178 UART: [idev] Erasing UDS.KEYID = 0
1,504,252 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,008 UART: [idev] --
1,513,973 UART: [ldev] ++
1,514,141 UART: [ldev] CDI.KEYID = 6
1,514,504 UART: [ldev] SUBJECT.KEYID = 5
1,514,930 UART: [ldev] AUTHORITY.KEYID = 7
1,515,393 UART: [ldev] FE.KEYID = 1
1,520,647 UART: [ldev] Erasing FE.KEYID = 1
1,546,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,668 UART: [ldev] --
1,584,943 UART: [fwproc] Waiting for Commands...
1,585,714 UART: [fwproc] Received command 0x46574c44
1,586,505 UART: [fwproc] Received Image of size 118548 bytes
2,929,883 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,059 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,277 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,604 >>> mbox cmd response: success
3,129,680 UART: [afmc] ++
3,129,848 UART: [afmc] CDI.KEYID = 6
3,130,210 UART: [afmc] SUBJECT.KEYID = 7
3,130,635 UART: [afmc] AUTHORITY.KEYID = 5
3,166,102 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,424 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,204 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,913 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,796 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,479 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,335 UART: [afmc] --
3,209,333 UART: [cold-reset] --
3,209,869 UART: [state] Locking Datavault
3,211,160 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,764 UART: [state] Locking ICCM
3,212,388 UART: [exit] Launching FMC @ 0x40000130
3,217,718 UART:
3,217,734 UART: Running Caliptra FMC ...
3,218,142 UART:
3,218,196 UART: [state] CFI Enabled
3,228,420 UART: [fht] FMC Alias Private Key: 7
3,347,314 UART: [art] Extend RT PCRs Done
3,347,742 UART: [art] Lock RT PCRs Done
3,349,384 UART: [art] Populate DV Done
3,357,425 UART: [fht] FMC Alias Private Key: 7
3,358,557 UART: [art] Derive CDI
3,358,837 UART: [art] Store in slot 0x4
3,444,401 UART: [art] Derive Key Pair
3,444,761 UART: [art] Store priv key in slot 0x5
3,457,458 UART: [art] Derive Key Pair - Done
3,471,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,486,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,487,377 UART: [art] PUB.X = E05CF8C12B9F257CF42ECBC245AA262B90313ED67C37C9BB71EE4291489091FBC6A49DD0644AA9DCB2F75A0833E5D2D2
3,494,160 UART: [art] PUB.Y = 1E1A45F936C34472040E6AAC5F68E55BE05B4E37E0B1B3F9C4BFC6C38F974CF456105674930356DC3ABC8C9DAD4D7089
3,501,111 UART: [art] SIG.R = 3BC7223A88313F5231EFEC83519DD9D21103D7412C5B74852D656C7A68E31AE7925B9180428F0B64A9B344288139624E
3,507,865 UART: [art] SIG.S = CC04006AE18049C9B30C7A44D646C48999986067BB0C578A665A8432C2A9600554B61D096B172A7BEBD8B9449640C11D
3,531,818 UART: Caliptra RT
3,532,069 UART: [state] CFI Enabled
3,651,412 UART: [rt] RT listening for mailbox commands...
3,652,082 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,682,450 UART: [rt]cmd =0x44504543, len=92
3,689,874 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,629 ready_for_fw is high
1,362,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,776 >>> mbox cmd response: success
3,042,259 UART:
3,042,275 UART: Running Caliptra FMC ...
3,042,683 UART:
3,042,737 UART: [state] CFI Enabled
3,053,085 UART: [fht] FMC Alias Private Key: 7
3,171,437 UART: [art] Extend RT PCRs Done
3,171,865 UART: [art] Lock RT PCRs Done
3,173,373 UART: [art] Populate DV Done
3,181,628 UART: [fht] FMC Alias Private Key: 7
3,182,576 UART: [art] Derive CDI
3,182,856 UART: [art] Store in slot 0x4
3,268,770 UART: [art] Derive Key Pair
3,269,130 UART: [art] Store priv key in slot 0x5
3,282,117 UART: [art] Derive Key Pair - Done
3,296,958 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,859 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,624 UART: [art] PUB.X = 4804804E639A46EBBE07F0B707BB72BC9C7C824C970ABC62FE9F17D9FFADE11190B754888D34F99A204F4BDCA26DEC67
3,320,398 UART: [art] PUB.Y = 958A09A408F4DB26413A6B2295E2139025BF9470F93EFA7BC4A1186045E7C765C8A7BBAF45CDBE1EB9F4E26E59BD2905
3,327,349 UART: [art] SIG.R = 871B79FFDD36926CB5F3D7CC952AB65983DB7D078B0453B370E9540BED07A64227798EC9491D45DAFAFF665CC681063E
3,334,112 UART: [art] SIG.S = 2CC4799FCEAE54CF7623246DF41865C0AA3CD3491CC3F0522AB5BCCE671AD4573D30D486587077522FB887D95537632E
3,358,084 UART: Caliptra RT
3,358,335 UART: [state] CFI Enabled
3,478,852 UART: [rt] RT listening for mailbox commands...
3,479,522 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,088 UART: [rt]cmd =0x44504543, len=92
3,517,198 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,346 UART: [kat] SHA2-256
882,277 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,392 UART: [kat] ++
886,544 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,759 UART: [kat] SHA2-512-ACC
897,660 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,477,076 UART: [cold-reset] ++
1,477,530 UART: [fht] Storing FHT @ 0x50003400
1,480,439 UART: [idev] ++
1,480,607 UART: [idev] CDI.KEYID = 6
1,480,967 UART: [idev] SUBJECT.KEYID = 7
1,481,391 UART: [idev] UDS.KEYID = 0
1,481,736 ready_for_fw is high
1,481,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,487 UART: [idev] Erasing UDS.KEYID = 0
1,506,185 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,837 UART: [idev] --
1,515,916 UART: [ldev] ++
1,516,084 UART: [ldev] CDI.KEYID = 6
1,516,447 UART: [ldev] SUBJECT.KEYID = 5
1,516,873 UART: [ldev] AUTHORITY.KEYID = 7
1,517,336 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,905 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,294 UART: [fwproc] Waiting for Commands...
1,588,087 UART: [fwproc] Received command 0x46574c44
1,588,878 UART: [fwproc] Received Image of size 118548 bytes
2,932,396 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,000 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,218 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,445 >>> mbox cmd response: success
3,132,611 UART: [afmc] ++
3,132,779 UART: [afmc] CDI.KEYID = 6
3,133,141 UART: [afmc] SUBJECT.KEYID = 7
3,133,566 UART: [afmc] AUTHORITY.KEYID = 5
3,168,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,187 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,967 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,676 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,559 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,242 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,250 UART: [afmc] --
3,212,164 UART: [cold-reset] --
3,213,024 UART: [state] Locking Datavault
3,214,145 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,749 UART: [state] Locking ICCM
3,215,311 UART: [exit] Launching FMC @ 0x40000130
3,220,641 UART:
3,220,657 UART: Running Caliptra FMC ...
3,221,065 UART:
3,221,208 UART: [state] CFI Enabled
3,231,934 UART: [fht] FMC Alias Private Key: 7
3,350,918 UART: [art] Extend RT PCRs Done
3,351,346 UART: [art] Lock RT PCRs Done
3,352,758 UART: [art] Populate DV Done
3,360,989 UART: [fht] FMC Alias Private Key: 7
3,362,059 UART: [art] Derive CDI
3,362,339 UART: [art] Store in slot 0x4
3,448,479 UART: [art] Derive Key Pair
3,448,839 UART: [art] Store priv key in slot 0x5
3,461,848 UART: [art] Derive Key Pair - Done
3,476,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,116 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,881 UART: [art] PUB.X = AD2B8B5A2B1850DBCF2001F69A277F20DC5C2607DD926DCA63D40CB1AA0FEA649772F203274FF152DB8C00027AD65A20
3,499,625 UART: [art] PUB.Y = 8E1C74FA4AC46D34E287075F4AE824C625FC8568660D7FB2CA217F01A3B8E039EE0099E73EDD1F9DF9EBE325986411E1
3,506,554 UART: [art] SIG.R = AE31101BA77EA582240F9508DAD6C125307FA3DDA9B0D05D305E8378246D8334593C0695D5F82CB22AD9BF0A0D0B7423
3,513,310 UART: [art] SIG.S = B3E3E9E2B7B83695B5DA3550DB5BD3A267075172EA24968AE7E2901F91A444D851233D13FF80AD2E10717925E768C5D2
3,537,137 UART: Caliptra RT
3,537,480 UART: [state] CFI Enabled
3,658,104 UART: [rt] RT listening for mailbox commands...
3,658,774 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,836 UART: [rt]cmd =0x44504543, len=92
3,696,090 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 ready_for_fw is high
1,362,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,899 >>> mbox cmd response: success
3,042,334 UART:
3,042,350 UART: Running Caliptra FMC ...
3,042,758 UART:
3,042,901 UART: [state] CFI Enabled
3,053,691 UART: [fht] FMC Alias Private Key: 7
3,173,035 UART: [art] Extend RT PCRs Done
3,173,463 UART: [art] Lock RT PCRs Done
3,174,773 UART: [art] Populate DV Done
3,183,216 UART: [fht] FMC Alias Private Key: 7
3,184,284 UART: [art] Derive CDI
3,184,564 UART: [art] Store in slot 0x4
3,270,842 UART: [art] Derive Key Pair
3,271,202 UART: [art] Store priv key in slot 0x5
3,284,507 UART: [art] Derive Key Pair - Done
3,299,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,872 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,637 UART: [art] PUB.X = 7E649767A9A01657B941CFFF8E43479473CE5BD0BB8CB4D39A071FF5279D289E27967B6724D743DEA3A904C77FB2F569
3,322,405 UART: [art] PUB.Y = 4D3A5A61FCF9AD5293F4DA23137A41347B9A402CAA49D42A0CC70C86AD6F464D4EF203988DBA9BCFE4CB22AB22DAF9AD
3,329,372 UART: [art] SIG.R = E1FBB85B9BB04CC1417557C226216F5784FC5976C846E9E3C46657EFA50F5A449CD9C0FB7D5504789704A0227580487E
3,336,131 UART: [art] SIG.S = 0E95511C56223D9E8F82B25740ED6F8B68FEE4447CDE737F2FC2D467DCEF70A4DE7A2E2F77E0DBA4D17FA1D6A84E1916
3,359,692 UART: Caliptra RT
3,360,035 UART: [state] CFI Enabled
3,480,500 UART: [rt] RT listening for mailbox commands...
3,481,170 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,554 UART: [rt]cmd =0x44504543, len=92
3,518,886 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
890,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,024 UART: [kat] ++
895,176 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
904,059 UART: [kat] SHA2-512-ACC
905,960 UART: [kat] ECC-384
915,529 UART: [kat] HMAC-384Kdf
920,129 UART: [kat] LMS
1,168,441 UART: [kat] --
1,169,250 UART: [cold-reset] ++
1,169,652 UART: [fht] FHT @ 0x50003400
1,172,534 UART: [idev] ++
1,172,702 UART: [idev] CDI.KEYID = 6
1,173,063 UART: [idev] SUBJECT.KEYID = 7
1,173,488 UART: [idev] UDS.KEYID = 0
1,173,834 ready_for_fw is high
1,173,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,729 UART: [idev] Sha1 KeyId Algorithm
1,207,605 UART: [idev] --
1,208,552 UART: [ldev] ++
1,208,720 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,511 UART: [ldev] AUTHORITY.KEYID = 7
1,209,974 UART: [ldev] FE.KEYID = 1
1,215,406 UART: [ldev] Erasing FE.KEYID = 1
1,241,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,133 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,834 UART: [ldev] --
1,281,111 UART: [fwproc] Wait for Commands...
1,281,768 UART: [fwproc] Recv command 0x46574c44
1,282,501 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,741 >>> mbox cmd response: success
2,827,871 UART: [afmc] ++
2,828,039 UART: [afmc] CDI.KEYID = 6
2,828,402 UART: [afmc] SUBJECT.KEYID = 7
2,828,828 UART: [afmc] AUTHORITY.KEYID = 5
2,864,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,235 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,945 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,422 UART: [afmc] --
2,908,433 UART: [cold-reset] --
2,909,251 UART: [state] Locking Datavault
2,910,302 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,906 UART: [state] Locking ICCM
2,911,366 UART: [exit] Launching FMC @ 0x40000130
2,916,696 UART:
2,916,712 UART: Running Caliptra FMC ...
2,917,120 UART:
2,917,174 UART: [state] CFI Enabled
2,927,594 UART: [fht] FMC Alias Private Key: 7
3,046,168 UART: [art] Extend RT PCRs Done
3,046,596 UART: [art] Lock RT PCRs Done
3,048,028 UART: [art] Populate DV Done
3,056,463 UART: [fht] FMC Alias Private Key: 7
3,057,479 UART: [art] Derive CDI
3,057,759 UART: [art] Store in slot 0x4
3,143,494 UART: [art] Derive Key Pair
3,143,854 UART: [art] Store priv key in slot 0x5
3,156,650 UART: [art] Derive Key Pair - Done
3,171,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,050 UART: [art] PUB.X = 3833F0383D27395BF3BF56B0E5068F996F1B7E9267CBE25D08FFAB2DC6D09BA4F9E09513F2429DB0668975EF5205277F
3,193,815 UART: [art] PUB.Y = ACB51571F34805D554DC72955B46C299D3D08886DCDE0D4A354EEB6F5F5F6D99A1D44ED9BDE1A0DA91C8CEC48EB261CA
3,200,781 UART: [art] SIG.R = A3903113F8FC516B9649851073E90912B8553F1827F2F56344DC5D5A2C0B914351DDE68ED96889328E50A69B3E3F8A2E
3,207,539 UART: [art] SIG.S = 180B63F5E098E0480801D776EBF7F3EE3D0EB507B0E460CF7D1340A996C0B71A51381FDB506DBD27E3EA4307032C3D67
3,230,680 UART: Caliptra RT
3,230,931 UART: [state] CFI Enabled
3,349,905 UART: [rt] RT listening for mailbox commands...
3,350,575 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,817 UART: [rt]cmd =0x44504543, len=92
3,388,263 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,110 ready_for_fw is high
1,059,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,265 >>> mbox cmd response: success
2,740,676 UART:
2,740,692 UART: Running Caliptra FMC ...
2,741,100 UART:
2,741,154 UART: [state] CFI Enabled
2,751,618 UART: [fht] FMC Alias Private Key: 7
2,869,520 UART: [art] Extend RT PCRs Done
2,869,948 UART: [art] Lock RT PCRs Done
2,871,494 UART: [art] Populate DV Done
2,879,777 UART: [fht] FMC Alias Private Key: 7
2,880,747 UART: [art] Derive CDI
2,881,027 UART: [art] Store in slot 0x4
2,966,814 UART: [art] Derive Key Pair
2,967,174 UART: [art] Store priv key in slot 0x5
2,980,542 UART: [art] Derive Key Pair - Done
2,995,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,602 UART: [art] PUB.X = 2DEE49B9E7FF81B480FEEC50A07F9A2A7DA88BB7BB33F5F493C00A33440E5D950D4FAB4C77DE359B1A6E531E80416793
3,018,379 UART: [art] PUB.Y = 676FE4FA62598DB70172BAB083CD4FB59BB52BC038F4DA0AF9CD0203F97ABDEB193F35DF4AA7AF429C15D963F1D7AB1C
3,025,343 UART: [art] SIG.R = 07F96F8E3CF7FC96227666C24B0C5E081FF58C9EF88F381BBE623FA18FA1308118E121EA53AF4665996153FD51B3B447
3,032,108 UART: [art] SIG.S = F6EF06337332C6CC5AE2ACAC0B2DC1BBFC9A17A3EEDE04DE27DFCEA80BFD7F690EA6BB4346209551AF504323988314D7
3,056,375 UART: Caliptra RT
3,056,626 UART: [state] CFI Enabled
3,175,896 UART: [rt] RT listening for mailbox commands...
3,176,566 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,116 UART: [rt]cmd =0x44504543, len=92
3,214,566 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,873 UART: [state] LifecycleState = Unprovisioned
85,528 UART: [state] DebugLocked = No
86,038 UART: [state] WD Timer not started. Device not locked for debugging
87,221 UART: [kat] SHA2-256
890,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,875 UART: [kat] ++
895,027 UART: [kat] sha1
899,187 UART: [kat] SHA2-256
901,127 UART: [kat] SHA2-384
903,696 UART: [kat] SHA2-512-ACC
905,597 UART: [kat] ECC-384
915,292 UART: [kat] HMAC-384Kdf
920,082 UART: [kat] LMS
1,168,394 UART: [kat] --
1,169,005 UART: [cold-reset] ++
1,169,437 UART: [fht] FHT @ 0x50003400
1,172,069 UART: [idev] ++
1,172,237 UART: [idev] CDI.KEYID = 6
1,172,598 UART: [idev] SUBJECT.KEYID = 7
1,173,023 UART: [idev] UDS.KEYID = 0
1,173,369 ready_for_fw is high
1,173,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,314 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,772 UART: [idev] --
1,208,827 UART: [ldev] ++
1,208,995 UART: [ldev] CDI.KEYID = 6
1,209,359 UART: [ldev] SUBJECT.KEYID = 5
1,209,786 UART: [ldev] AUTHORITY.KEYID = 7
1,210,249 UART: [ldev] FE.KEYID = 1
1,215,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,848 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,165 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,151 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,618 >>> mbox cmd response: success
2,827,676 UART: [afmc] ++
2,827,844 UART: [afmc] CDI.KEYID = 6
2,828,207 UART: [afmc] SUBJECT.KEYID = 7
2,828,633 UART: [afmc] AUTHORITY.KEYID = 5
2,864,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,237 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,986 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,696 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,577 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,278 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,087 UART: [afmc] --
2,908,032 UART: [cold-reset] --
2,908,968 UART: [state] Locking Datavault
2,910,075 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,679 UART: [state] Locking ICCM
2,911,143 UART: [exit] Launching FMC @ 0x40000130
2,916,473 UART:
2,916,489 UART: Running Caliptra FMC ...
2,916,897 UART:
2,917,040 UART: [state] CFI Enabled
2,927,712 UART: [fht] FMC Alias Private Key: 7
3,047,402 UART: [art] Extend RT PCRs Done
3,047,830 UART: [art] Lock RT PCRs Done
3,049,594 UART: [art] Populate DV Done
3,057,607 UART: [fht] FMC Alias Private Key: 7
3,058,691 UART: [art] Derive CDI
3,058,971 UART: [art] Store in slot 0x4
3,145,208 UART: [art] Derive Key Pair
3,145,568 UART: [art] Store priv key in slot 0x5
3,159,260 UART: [art] Derive Key Pair - Done
3,174,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,509 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,274 UART: [art] PUB.X = 0231F95A225A2B1423220FB961F6B4A8DC52D3BAA08AF1CF26D06057EB2BEE7D3CD90AF33B3EE45CFB8B22FCDB18A055
3,197,057 UART: [art] PUB.Y = 4DF6AC10F0C1D7EB0B4C4EB8DAD62764B8B25AD7F72606730FC53BAB0C8D5A4232D7DEDC6023486350290F2A4B1DFD6B
3,204,012 UART: [art] SIG.R = 7D7FB9855EAA8623B835275EC8C1E6404977C19A20289FC0BA28D727587B993500FE71D5FF21542C46CF6004896DA517
3,210,753 UART: [art] SIG.S = A9E02C7D475F08E073D60E65CC91C70369B872F7DB1BA258E2F23AB09F04288CAD141339366545B10AD5ED6066353F98
3,233,522 UART: Caliptra RT
3,233,865 UART: [state] CFI Enabled
3,353,359 UART: [rt] RT listening for mailbox commands...
3,354,029 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,487 UART: [rt]cmd =0x44504543, len=92
3,391,607 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 ready_for_fw is high
1,060,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,473 >>> mbox cmd response: success
2,740,344 UART:
2,740,360 UART: Running Caliptra FMC ...
2,740,768 UART:
2,740,911 UART: [state] CFI Enabled
2,751,251 UART: [fht] FMC Alias Private Key: 7
2,870,469 UART: [art] Extend RT PCRs Done
2,870,897 UART: [art] Lock RT PCRs Done
2,872,717 UART: [art] Populate DV Done
2,881,014 UART: [fht] FMC Alias Private Key: 7
2,882,104 UART: [art] Derive CDI
2,882,384 UART: [art] Store in slot 0x4
2,968,335 UART: [art] Derive Key Pair
2,968,695 UART: [art] Store priv key in slot 0x5
2,981,991 UART: [art] Derive Key Pair - Done
2,996,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,320 UART: [art] PUB.X = 032782B6D28D9069F9DCEBD9FDCA19F8BA8CB3B5BD1092B64FDB63682BB80CB669E740E649CC39BC2AF3FEE6019818CA
3,019,103 UART: [art] PUB.Y = 026D209453B99EC5B9CC92D543C57E97F75D4A64A549575470DABC4A0F16FBF57BB2A9E027DC601A85C34C70650CC133
3,026,050 UART: [art] SIG.R = 5E00654D48695CA62585C2BC8818E6B6005F44B9BA76E6FA7BBC07637311C7EEF73215E9D7EEE823DF966A79D507DA77
3,032,776 UART: [art] SIG.S = D92F0486FAB878B754B6DDA8F89F5AEDC166963F531F04DD30CAAF9DC437874591EFBEE0A4CC6FDDBA95F9A77D871499
3,056,658 UART: Caliptra RT
3,057,001 UART: [state] CFI Enabled
3,176,497 UART: [rt] RT listening for mailbox commands...
3,177,167 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,579 UART: [rt]cmd =0x44504543, len=92
3,214,681 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
893,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,539 UART: [kat] ++
897,691 UART: [kat] sha1
901,893 UART: [kat] SHA2-256
903,833 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,128 UART: [kat] HMAC-384Kdf
922,666 UART: [kat] LMS
1,170,994 UART: [kat] --
1,171,729 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,788 UART: [idev] ++
1,174,956 UART: [idev] CDI.KEYID = 6
1,175,316 UART: [idev] SUBJECT.KEYID = 7
1,175,740 UART: [idev] UDS.KEYID = 0
1,176,085 ready_for_fw is high
1,176,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,700 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,391 UART: [idev] --
1,210,511 UART: [ldev] ++
1,210,679 UART: [ldev] CDI.KEYID = 6
1,211,042 UART: [ldev] SUBJECT.KEYID = 5
1,211,468 UART: [ldev] AUTHORITY.KEYID = 7
1,211,931 UART: [ldev] FE.KEYID = 1
1,216,951 UART: [ldev] Erasing FE.KEYID = 1
1,243,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,225 UART: [ldev] --
1,282,606 UART: [fwproc] Wait for Commands...
1,283,364 UART: [fwproc] Recv command 0x46574c44
1,284,092 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,075 >>> mbox cmd response: success
2,828,129 UART: [afmc] ++
2,828,297 UART: [afmc] CDI.KEYID = 6
2,828,659 UART: [afmc] SUBJECT.KEYID = 7
2,829,084 UART: [afmc] AUTHORITY.KEYID = 5
2,864,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,538 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,247 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,130 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,831 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,697 UART: [afmc] --
2,907,743 UART: [cold-reset] --
2,908,695 UART: [state] Locking Datavault
2,909,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,424 UART: [state] Locking ICCM
2,910,866 UART: [exit] Launching FMC @ 0x40000130
2,916,196 UART:
2,916,212 UART: Running Caliptra FMC ...
2,916,620 UART:
2,916,674 UART: [state] CFI Enabled
2,926,716 UART: [fht] FMC Alias Private Key: 7
3,046,018 UART: [art] Extend RT PCRs Done
3,046,446 UART: [art] Lock RT PCRs Done
3,047,740 UART: [art] Populate DV Done
3,056,043 UART: [fht] FMC Alias Private Key: 7
3,056,981 UART: [art] Derive CDI
3,057,261 UART: [art] Store in slot 0x4
3,142,812 UART: [art] Derive Key Pair
3,143,172 UART: [art] Store priv key in slot 0x5
3,157,182 UART: [art] Derive Key Pair - Done
3,171,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,824 UART: [art] PUB.X = 235C7B1E8DE738A7F505C5B9A08D40B9E66D5D179EFCFC58793EDCC6A8C1C1BA37320E6B4BDC877FC91D50CDFF522D72
3,194,610 UART: [art] PUB.Y = AA96723CAF6ED87AC95183026B71B634D05E4F50CB8F5C7E1F4BE25E6DDF0EACB6FBA9149975162ABCF914639E8D9753
3,201,570 UART: [art] SIG.R = CFFF5BFE2A5BFF03DB8A27DC57164842E6A7F69D2D1DC8C3F2D487B260BEE1C5554E89FA72F14231EF0283E55877F5B7
3,208,352 UART: [art] SIG.S = 93F45CC2BF4587BB11A9CE7EA113B28B1F89F60A3453562AE0A9642BCFE0AD4857CA31D6B1A1816CED55A6831313323F
3,232,495 UART: Caliptra RT
3,232,746 UART: [state] CFI Enabled
3,352,995 UART: [rt] RT listening for mailbox commands...
3,353,665 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,223 UART: [rt]cmd =0x44504543, len=92
3,391,557 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,843 ready_for_fw is high
1,060,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,432 >>> mbox cmd response: success
2,740,357 UART:
2,740,373 UART: Running Caliptra FMC ...
2,740,781 UART:
2,740,835 UART: [state] CFI Enabled
2,751,359 UART: [fht] FMC Alias Private Key: 7
2,870,083 UART: [art] Extend RT PCRs Done
2,870,511 UART: [art] Lock RT PCRs Done
2,872,259 UART: [art] Populate DV Done
2,880,442 UART: [fht] FMC Alias Private Key: 7
2,881,506 UART: [art] Derive CDI
2,881,786 UART: [art] Store in slot 0x4
2,967,475 UART: [art] Derive Key Pair
2,967,835 UART: [art] Store priv key in slot 0x5
2,981,289 UART: [art] Derive Key Pair - Done
2,995,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,977 UART: [art] PUB.X = AFC1F0ECAE5213F15E76DA118BCBA17F1DAA98C14C4909F605B2E44745876FE00C656079B7856F42BA98925FC34E4BC7
3,018,750 UART: [art] PUB.Y = D4C58759FE6956F8F411028C44DB9A6666DAF0CC365C132321E9159F372454FEDBB7C11A4FB3AF38AAA7CBEA80D603DE
3,025,710 UART: [art] SIG.R = 9A6690DC0E06776D090A238994BB93AAE2C7D51824C894FD388474091F3ABFDAD0E9062249C23B62543B83F0C495EEDA
3,032,466 UART: [art] SIG.S = EF9E6B0E0D69FDC2093AA86BBAF5BE11CE8FE99F4C99872A5C0DE1BF110543924E8D3314EA463A27A43626F52345E555
3,056,425 UART: Caliptra RT
3,056,676 UART: [state] CFI Enabled
3,176,769 UART: [rt] RT listening for mailbox commands...
3,177,439 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,925 UART: [rt]cmd =0x44504543, len=92
3,215,337 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,635 UART: [kat] SHA2-256
893,285 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,410 UART: [kat] ++
897,562 UART: [kat] sha1
901,878 UART: [kat] SHA2-256
903,818 UART: [kat] SHA2-384
906,627 UART: [kat] SHA2-512-ACC
908,528 UART: [kat] ECC-384
918,465 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,310 UART: [cold-reset] ++
1,172,742 UART: [fht] FHT @ 0x50003400
1,175,193 UART: [idev] ++
1,175,361 UART: [idev] CDI.KEYID = 6
1,175,721 UART: [idev] SUBJECT.KEYID = 7
1,176,145 UART: [idev] UDS.KEYID = 0
1,176,490 ready_for_fw is high
1,176,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,017 UART: [idev] Erasing UDS.KEYID = 0
1,200,776 UART: [idev] Sha1 KeyId Algorithm
1,209,200 UART: [idev] --
1,210,152 UART: [ldev] ++
1,210,320 UART: [ldev] CDI.KEYID = 6
1,210,683 UART: [ldev] SUBJECT.KEYID = 5
1,211,109 UART: [ldev] AUTHORITY.KEYID = 7
1,211,572 UART: [ldev] FE.KEYID = 1
1,216,678 UART: [ldev] Erasing FE.KEYID = 1
1,242,963 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,078 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,323 UART: [fwproc] Recv command 0x46574c44
1,284,051 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,249 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,574 >>> mbox cmd response: success
2,827,672 UART: [afmc] ++
2,827,840 UART: [afmc] CDI.KEYID = 6
2,828,202 UART: [afmc] SUBJECT.KEYID = 7
2,828,627 UART: [afmc] AUTHORITY.KEYID = 5
2,864,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,515 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,972 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,855 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,556 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,296 UART: [afmc] --
2,907,180 UART: [cold-reset] --
2,907,968 UART: [state] Locking Datavault
2,909,329 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,933 UART: [state] Locking ICCM
2,910,601 UART: [exit] Launching FMC @ 0x40000130
2,915,931 UART:
2,915,947 UART: Running Caliptra FMC ...
2,916,355 UART:
2,916,498 UART: [state] CFI Enabled
2,926,952 UART: [fht] FMC Alias Private Key: 7
3,046,636 UART: [art] Extend RT PCRs Done
3,047,064 UART: [art] Lock RT PCRs Done
3,048,632 UART: [art] Populate DV Done
3,057,043 UART: [fht] FMC Alias Private Key: 7
3,057,987 UART: [art] Derive CDI
3,058,267 UART: [art] Store in slot 0x4
3,144,410 UART: [art] Derive Key Pair
3,144,770 UART: [art] Store priv key in slot 0x5
3,158,712 UART: [art] Derive Key Pair - Done
3,173,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,842 UART: [art] PUB.X = 0E57BD0EC9B273174F578D25E14EA05D73B2FB4A6E93577BBFFA7DDE1E61EE2859E3D91F49AEE6D15E2974EB527271DA
3,196,624 UART: [art] PUB.Y = 3A0B5F635B5934D4B85591CE60FDE257F6BBCE3B44AD25A3D5B966ECF1A61BE8A5CE598024866B34823629880843E964
3,203,572 UART: [art] SIG.R = FE50ED66A957D02F54CB4632B3D231AA3BFE6BA20E90BD42C2DD5A2AB3159EB9EF0AA988E8BDF2E90942A4436D9FAA2B
3,210,359 UART: [art] SIG.S = 5EDAA0442EA5FB4EE285BB3FF3CE398FF8A0EEBDA68001F7686BDB0B85A0CD1F353790CE919562AD544D281520247423
3,234,345 UART: Caliptra RT
3,234,688 UART: [state] CFI Enabled
3,354,312 UART: [rt] RT listening for mailbox commands...
3,354,982 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,348 UART: [rt]cmd =0x44504543, len=92
3,392,332 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 ready_for_fw is high
1,060,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,005 >>> mbox cmd response: success
2,742,704 UART:
2,742,720 UART: Running Caliptra FMC ...
2,743,128 UART:
2,743,271 UART: [state] CFI Enabled
2,754,185 UART: [fht] FMC Alias Private Key: 7
2,873,123 UART: [art] Extend RT PCRs Done
2,873,551 UART: [art] Lock RT PCRs Done
2,874,719 UART: [art] Populate DV Done
2,882,766 UART: [fht] FMC Alias Private Key: 7
2,883,792 UART: [art] Derive CDI
2,884,072 UART: [art] Store in slot 0x4
2,969,877 UART: [art] Derive Key Pair
2,970,237 UART: [art] Store priv key in slot 0x5
2,983,757 UART: [art] Derive Key Pair - Done
2,998,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,828 UART: [art] PUB.X = 0A1F2663A2A85B2DC70793046A1505D524B96D8CC56AC15C92BA1AC5674CED7D53E9B3346AADDCA5075703ACA0ACCE73
3,021,596 UART: [art] PUB.Y = B0996A1989B048DB526DD03023135699D198D5974E6497EC37516A64BC3CABF5627B0508A49F22FD7CDC6083EA1D0D3E
3,028,539 UART: [art] SIG.R = 9A6C8BA03FBE4729C0BFD0D9FC2D43CA5FDDEB471EB01810D33E3AF2575D5ACC5226EEE8DA0777CE917AB3DF5582BCE8
3,035,336 UART: [art] SIG.S = D8DFE9A4C82A2059EA45B6D33FF4A1FAEC1D7D00A4244BBF52371EE2AAAD90AA0F2B68E1795482CD4ED7DA737BE79FF3
3,058,481 UART: Caliptra RT
3,058,824 UART: [state] CFI Enabled
3,178,943 UART: [rt] RT listening for mailbox commands...
3,179,613 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,153 UART: [rt]cmd =0x44504543, len=92
3,217,367 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_certify_key_x509_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
192,026 UART:
192,392 UART: Running Caliptra ROM ...
193,516 UART:
193,663 UART: [state] CFI Enabled
261,413 UART: [state] LifecycleState = Unprovisioned
263,353 UART: [state] DebugLocked = No
264,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,801 UART: [kat] SHA2-256
439,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,994 UART: [kat] ++
450,442 UART: [kat] sha1
462,877 UART: [kat] SHA2-256
465,595 UART: [kat] SHA2-384
470,657 UART: [kat] SHA2-512-ACC
473,030 UART: [kat] ECC-384
2,767,628 UART: [kat] HMAC-384Kdf
2,801,247 UART: [kat] LMS
3,991,586 UART: [kat] --
3,996,099 UART: [cold-reset] ++
3,997,605 UART: [fht] Storing FHT @ 0x50003400
4,009,291 UART: [idev] ++
4,009,860 UART: [idev] CDI.KEYID = 6
4,010,778 UART: [idev] SUBJECT.KEYID = 7
4,012,021 UART: [idev] UDS.KEYID = 0
4,013,083 ready_for_fw is high
4,013,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,110 UART: [idev] Erasing UDS.KEYID = 0
7,346,762 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,720 UART: [idev] --
7,371,869 UART: [ldev] ++
7,372,444 UART: [ldev] CDI.KEYID = 6
7,373,410 UART: [ldev] SUBJECT.KEYID = 5
7,374,626 UART: [ldev] AUTHORITY.KEYID = 7
7,375,859 UART: [ldev] FE.KEYID = 1
7,422,039 UART: [ldev] Erasing FE.KEYID = 1
10,755,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,575 UART: [ldev] --
13,117,345 UART: [fwproc] Waiting for Commands...
13,120,257 UART: [fwproc] Received command 0x46574c44
13,122,491 UART: [fwproc] Received Image of size 118548 bytes
17,234,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,314,514 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,387,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,716,357 >>> mbox cmd response: success
17,719,996 UART: [afmc] ++
17,720,608 UART: [afmc] CDI.KEYID = 6
17,721,521 UART: [afmc] SUBJECT.KEYID = 7
17,722,743 UART: [afmc] AUTHORITY.KEYID = 5
21,096,100 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,890 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,340 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,741 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,868 UART: [afmc] --
23,459,570 UART: [cold-reset] --
23,462,674 UART: [state] Locking Datavault
23,466,893 UART: [state] Locking PCR0, PCR1 and PCR31
23,468,743 UART: [state] Locking ICCM
23,470,958 UART: [exit] Launching FMC @ 0x40000130
23,479,356 UART:
23,479,602 UART: Running Caliptra FMC ...
23,480,727 UART:
23,480,888 UART: [state] CFI Enabled
23,551,073 UART: [fht] FMC Alias Private Key: 7
25,891,701 UART: [art] Extend RT PCRs Done
25,892,925 UART: [art] Lock RT PCRs Done
25,894,898 UART: [art] Populate DV Done
25,900,303 UART: [fht] FMC Alias Private Key: 7
25,901,944 UART: [art] Derive CDI
25,902,755 UART: [art] Store in slot 0x4
25,952,212 UART: [art] Derive Key Pair
25,953,254 UART: [art] Store priv key in slot 0x5
29,246,140 UART: [art] Derive Key Pair - Done
29,258,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,704 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,213 UART: [art] PUB.X = 91FC390C3A4588ECE51BCE07D2A780C2BCB44858706746A5DD269FE09A9C40412A145606C73037DF8B4B48CF1F10B0ED
31,562,450 UART: [art] PUB.Y = 4CB22301E9B246DB829A7ACDBDA17FFE2501D48641326D3ED2C31801C515C591AD75A809D00FB5607C32A4018C3C54A1
31,569,745 UART: [art] SIG.R = A4064CB874CDF18B50990E0EEF302B8DAF915E48D13C20D23657ADE83FA9E45A791CD4AC0FB32E3D723F9B01F64ABEC3
31,577,133 UART: [art] SIG.S = 91192AC3A67B132AE8BD008E30F35383592EA4BDC789AFBC30D427D7FDA2C26097E5A33B893D73AFF79FC8B57D8B4E6D
32,881,861 UART: Caliptra RT
32,882,557 UART: [state] CFI Enabled
33,058,897 UART: [rt] RT listening for mailbox commands...
33,060,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,091,473 UART: [rt]cmd =0x44504543, len=96
33,123,595 >>> mbox cmd response data (56 bytes)
33,124,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,155,013 UART: [rt]cmd =0x44504543, len=96
33,187,473 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,784,326 ready_for_fw is high
3,784,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,940,872 >>> mbox cmd response: success
23,631,405 UART:
23,631,787 UART: Running Caliptra FMC ...
23,632,982 UART:
23,633,151 UART: [state] CFI Enabled
23,699,683 UART: [fht] FMC Alias Private Key: 7
26,040,347 UART: [art] Extend RT PCRs Done
26,041,581 UART: [art] Lock RT PCRs Done
26,042,907 UART: [art] Populate DV Done
26,048,272 UART: [fht] FMC Alias Private Key: 7
26,049,919 UART: [art] Derive CDI
26,050,735 UART: [art] Store in slot 0x4
26,107,941 UART: [art] Derive Key Pair
26,108,980 UART: [art] Store priv key in slot 0x5
29,400,749 UART: [art] Derive Key Pair - Done
29,413,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,702,936 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,456 UART: [art] PUB.X = ABF9096CAA9821EB73E3B3FD7CDB099E604E6B1CBD2372CC4E63FF04BFB4502C6DD34367456DF67FFB5A27FAC4415C77
31,711,765 UART: [art] PUB.Y = 57129BE25C50B671FC66EB9CDDE84A88B3CB162DD2AF39F0D778B1E656B2E7A2C267C7ADF7360CF3EF1EFE9657B7C0AB
31,719,023 UART: [art] SIG.R = 2094A31DE256A775A2E11EBF4D18CF1DA305072DFBA9D9CF0C333B0ECC7DB70F4128C3734CD717AB1670FF62D93E7DFB
31,726,436 UART: [art] SIG.S = 22AE054573851078B75077F9763F55066111D52E18BEBE8601578099E6A621E9DD09037A63E34360519809C913614D66
33,031,701 UART: Caliptra RT
33,032,440 UART: [state] CFI Enabled
33,209,580 UART: [rt] RT listening for mailbox commands...
33,211,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,242,015 UART: [rt]cmd =0x44504543, len=96
33,273,485 >>> mbox cmd response data (56 bytes)
33,274,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,304,588 UART: [rt]cmd =0x44504543, len=96
33,337,221 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,435 UART:
192,801 UART: Running Caliptra ROM ...
194,007 UART:
603,661 UART: [state] CFI Enabled
617,517 UART: [state] LifecycleState = Unprovisioned
619,502 UART: [state] DebugLocked = No
620,680 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,250 UART: [kat] SHA2-256
794,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,500 UART: [kat] ++
806,100 UART: [kat] sha1
818,392 UART: [kat] SHA2-256
821,110 UART: [kat] SHA2-384
827,376 UART: [kat] SHA2-512-ACC
829,735 UART: [kat] ECC-384
3,111,200 UART: [kat] HMAC-384Kdf
3,121,940 UART: [kat] LMS
4,312,046 UART: [kat] --
4,315,877 UART: [cold-reset] ++
4,318,527 UART: [fht] Storing FHT @ 0x50003400
4,330,641 UART: [idev] ++
4,331,207 UART: [idev] CDI.KEYID = 6
4,332,116 UART: [idev] SUBJECT.KEYID = 7
4,333,357 UART: [idev] UDS.KEYID = 0
4,334,333 ready_for_fw is high
4,334,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,422 UART: [idev] Erasing UDS.KEYID = 0
7,616,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,233 UART: [idev] --
7,640,955 UART: [ldev] ++
7,641,576 UART: [ldev] CDI.KEYID = 6
7,642,534 UART: [ldev] SUBJECT.KEYID = 5
7,643,734 UART: [ldev] AUTHORITY.KEYID = 7
7,644,957 UART: [ldev] FE.KEYID = 1
7,656,497 UART: [ldev] Erasing FE.KEYID = 1
10,947,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,724 UART: [ldev] --
13,307,437 UART: [fwproc] Waiting for Commands...
13,309,575 UART: [fwproc] Received command 0x46574c44
13,311,750 UART: [fwproc] Received Image of size 118548 bytes
17,411,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,485,736 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,558,700 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,887,534 >>> mbox cmd response: success
17,891,279 UART: [afmc] ++
17,891,897 UART: [afmc] CDI.KEYID = 6
17,892,802 UART: [afmc] SUBJECT.KEYID = 7
17,894,073 UART: [afmc] AUTHORITY.KEYID = 5
21,206,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,500,782 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,087 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,517,503 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,532,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,546,610 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,568,877 UART: [afmc] --
23,572,507 UART: [cold-reset] --
23,577,237 UART: [state] Locking Datavault
23,584,100 UART: [state] Locking PCR0, PCR1 and PCR31
23,585,791 UART: [state] Locking ICCM
23,587,069 UART: [exit] Launching FMC @ 0x40000130
23,595,460 UART:
23,595,697 UART: Running Caliptra FMC ...
23,596,816 UART:
23,596,972 UART: [state] CFI Enabled
23,604,961 UART: [fht] FMC Alias Private Key: 7
25,944,970 UART: [art] Extend RT PCRs Done
25,946,188 UART: [art] Lock RT PCRs Done
25,948,113 UART: [art] Populate DV Done
25,953,735 UART: [fht] FMC Alias Private Key: 7
25,955,323 UART: [art] Derive CDI
25,956,078 UART: [art] Store in slot 0x4
25,998,622 UART: [art] Derive Key Pair
25,999,658 UART: [art] Store priv key in slot 0x5
29,241,833 UART: [art] Derive Key Pair - Done
29,254,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,582 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,094 UART: [art] PUB.X = C27FEEA7F076542B57335CAB89BEB39668297B6AFBDD6B3C08D557A44592196F61CD9995A377F0E1CC71BFF6874C8798
31,544,339 UART: [art] PUB.Y = BE089FD6603C197EBF34C1C9BD99B1ABC1BD4B8FAA35AE7DA648BD2991B3E8234A6562A43F64F6901A34C56D71464933
31,551,634 UART: [art] SIG.R = DED1DF7C56A0F62DB1F16C57BAB4E128F992801C1D4EE6D6DA958AFCACE0949D653D09F8C716F45869DC2F8DA414C680
31,559,020 UART: [art] SIG.S = 384F2E6A1E6E6D2D7DB1E58848372C18406B9E391D49A2092D4F5ED28ECC1559E5E3FD150D4F3B1FEBBD6F94F26FAD6B
32,863,767 UART: Caliptra RT
32,864,466 UART: [state] CFI Enabled
32,998,638 UART: [rt] RT listening for mailbox commands...
33,000,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,031,209 UART: [rt]cmd =0x44504543, len=96
33,062,673 >>> mbox cmd response data (56 bytes)
33,063,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,094,019 UART: [rt]cmd =0x44504543, len=96
33,126,078 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
4,129,858 ready_for_fw is high
4,130,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,189 >>> mbox cmd response: success
23,800,868 UART:
23,801,287 UART: Running Caliptra FMC ...
23,802,395 UART:
23,802,547 UART: [state] CFI Enabled
23,810,619 UART: [fht] FMC Alias Private Key: 7
26,150,472 UART: [art] Extend RT PCRs Done
26,151,700 UART: [art] Lock RT PCRs Done
26,153,190 UART: [art] Populate DV Done
26,158,659 UART: [fht] FMC Alias Private Key: 7
26,160,322 UART: [art] Derive CDI
26,161,057 UART: [art] Store in slot 0x4
26,203,707 UART: [art] Derive Key Pair
26,204,749 UART: [art] Store priv key in slot 0x5
29,446,827 UART: [art] Derive Key Pair - Done
29,459,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,060 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,565 UART: [art] PUB.X = AAF29F41FA1449B55AB7F3E49AD8CDF74C2138C132FFBEBDED3C010D7586BE4B58B704180C971939B61CBEA637308B36
31,748,872 UART: [art] PUB.Y = C4BFDB0984DE47DB424DFF9243D3780B37E18B7D68F21E12179748F6F03E44E48D3F7342FFAA542387AB8025C6C56D1D
31,756,113 UART: [art] SIG.R = EBA8A9A9FF54C89F685FAA1E52AB932658663D69CAB1E971A3CA593652ADD79060C4F2C635F15CBBFA829BDD665EE39B
31,763,560 UART: [art] SIG.S = 613CA77D393A70A59B34DF0C44A8768F8A19A64D4CF58939AE29C903EA26CD5348E4481738DD5FBC3A2941DF0E3CA626
33,068,488 UART: Caliptra RT
33,069,201 UART: [state] CFI Enabled
33,202,085 UART: [rt] RT listening for mailbox commands...
33,204,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,234,709 UART: [rt]cmd =0x44504543, len=96
33,266,946 >>> mbox cmd response data (56 bytes)
33,267,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,298,584 UART: [rt]cmd =0x44504543, len=96
33,330,528 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,055 UART:
192,425 UART: Running Caliptra ROM ...
193,597 UART:
193,750 UART: [state] CFI Enabled
262,429 UART: [state] LifecycleState = Unprovisioned
264,366 UART: [state] DebugLocked = No
266,529 UART: [state] WD Timer not started. Device not locked for debugging
270,219 UART: [kat] SHA2-256
449,870 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,625 UART: [kat] ++
461,072 UART: [kat] sha1
470,531 UART: [kat] SHA2-256
473,249 UART: [kat] SHA2-384
478,877 UART: [kat] SHA2-512-ACC
481,238 UART: [kat] ECC-384
2,925,244 UART: [kat] HMAC-384Kdf
2,949,425 UART: [kat] LMS
3,425,907 UART: [kat] --
3,429,749 UART: [cold-reset] ++
3,431,831 UART: [fht] FHT @ 0x50003400
3,442,963 UART: [idev] ++
3,443,525 UART: [idev] CDI.KEYID = 6
3,444,552 UART: [idev] SUBJECT.KEYID = 7
3,445,720 UART: [idev] UDS.KEYID = 0
3,446,717 ready_for_fw is high
3,446,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,059 UART: [idev] Erasing UDS.KEYID = 0
5,966,334 UART: [idev] Sha1 KeyId Algorithm
5,990,590 UART: [idev] --
5,995,556 UART: [ldev] ++
5,996,122 UART: [ldev] CDI.KEYID = 6
5,997,082 UART: [ldev] SUBJECT.KEYID = 5
5,998,291 UART: [ldev] AUTHORITY.KEYID = 7
5,999,516 UART: [ldev] FE.KEYID = 1
6,038,470 UART: [ldev] Erasing FE.KEYID = 1
8,543,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,138 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,934 UART: [ldev] --
10,349,627 UART: [fwproc] Wait for Commands...
10,351,954 UART: [fwproc] Recv command 0x46574c44
10,353,999 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,887 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,922,120 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,995,127 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,324,223 >>> mbox cmd response: success
14,327,901 UART: [afmc] ++
14,328,571 UART: [afmc] CDI.KEYID = 6
14,329,481 UART: [afmc] SUBJECT.KEYID = 7
14,330,695 UART: [afmc] AUTHORITY.KEYID = 5
16,867,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,795 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,660 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,666,187 UART: [afmc] --
18,669,408 UART: [cold-reset] --
18,673,631 UART: [state] Locking Datavault
18,680,342 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,095 UART: [state] Locking ICCM
18,683,327 UART: [exit] Launching FMC @ 0x40000130
18,691,717 UART:
18,691,946 UART: Running Caliptra FMC ...
18,693,042 UART:
18,693,221 UART: [state] CFI Enabled
18,749,885 UART: [fht] FMC Alias Private Key: 7
20,516,769 UART: [art] Extend RT PCRs Done
20,517,976 UART: [art] Lock RT PCRs Done
20,519,604 UART: [art] Populate DV Done
20,525,172 UART: [fht] FMC Alias Private Key: 7
20,526,758 UART: [art] Derive CDI
20,527,570 UART: [art] Store in slot 0x4
20,582,770 UART: [art] Derive Key Pair
20,583,758 UART: [art] Store priv key in slot 0x5
23,047,674 UART: [art] Derive Key Pair - Done
23,061,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,773,598 UART: [art] Erasing AUTHORITY.KEYID = 7
24,775,113 UART: [art] PUB.X = FEC6EF980B32B94D509DCA037609AC7908806183E45D548D4620883E31DDC4480BA42FCA48A5582B9DD1DD4D92038C4D
24,782,374 UART: [art] PUB.Y = A84DB0EBEBE87F2A1120F9E5C703EA9BC8A1A8D7DB5BF065C611F4305A8C378971B4C772E06E41481F4EC536311F9E41
24,789,661 UART: [art] SIG.R = 27BC4B21C679CB632947B4DD1EA1E9609518A76009578DF0A1BBECAEA3729FADF0E3486DC1183718A89042F843D23808
24,796,998 UART: [art] SIG.S = 58E2FF6A38FB8FB1E939EE40C8A4BD5DF2AF65FDD47676299AF255EFB5F49977F5503391803A09C613EFB9EFDD1D49E0
25,775,712 UART: Caliptra RT
25,776,412 UART: [state] CFI Enabled
25,956,986 UART: [rt] RT listening for mailbox commands...
25,958,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,989,478 UART: [rt]cmd =0x44504543, len=96
26,021,127 >>> mbox cmd response data (56 bytes)
26,022,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,052,587 UART: [rt]cmd =0x44504543, len=96
26,084,164 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,463,516 ready_for_fw is high
3,464,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,240,041 >>> mbox cmd response: success
18,536,812 UART:
18,537,221 UART: Running Caliptra FMC ...
18,538,333 UART:
18,538,486 UART: [state] CFI Enabled
18,604,651 UART: [fht] FMC Alias Private Key: 7
20,370,726 UART: [art] Extend RT PCRs Done
20,371,936 UART: [art] Lock RT PCRs Done
20,373,370 UART: [art] Populate DV Done
20,378,794 UART: [fht] FMC Alias Private Key: 7
20,380,498 UART: [art] Derive CDI
20,381,236 UART: [art] Store in slot 0x4
20,438,118 UART: [art] Derive Key Pair
20,439,160 UART: [art] Store priv key in slot 0x5
22,901,465 UART: [art] Derive Key Pair - Done
22,914,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,422 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,916 UART: [art] PUB.X = F4A2023C273A1C72E7C1216845873ECA38A037B3F0E9F9411CDC2310B8CE7E556B04940892C8F6688F0FB8D95330A1DD
24,637,182 UART: [art] PUB.Y = 85E2F4A09E2FFBDC82132EB8D6B1749ADAA5771FA328E7E718069642883695880336257CA1483D437F382C17BC2915E6
24,644,440 UART: [art] SIG.R = 5BA825DB439947E4EB36EAF007594DAF3A8F72C8FA80BF9E91882F215E1F1A82E493AF2F2572996DE01716A579B5F8CE
24,651,883 UART: [art] SIG.S = 7C5EE7F8CB30573E1B4AF2D4C01A3D29CE79B0520539E495C1E366CC65CD925BBA06681D4D804DC902F92C8B6F23E7A8
25,631,066 UART: Caliptra RT
25,631,806 UART: [state] CFI Enabled
25,811,788 UART: [rt] RT listening for mailbox commands...
25,813,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,844,190 UART: [rt]cmd =0x44504543, len=96
25,876,220 >>> mbox cmd response data (56 bytes)
25,877,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,907,748 UART: [rt]cmd =0x44504543, len=96
25,939,616 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,313 UART:
192,667 UART: Running Caliptra ROM ...
193,875 UART:
603,401 UART: [state] CFI Enabled
616,296 UART: [state] LifecycleState = Unprovisioned
618,225 UART: [state] DebugLocked = No
620,039 UART: [state] WD Timer not started. Device not locked for debugging
624,019 UART: [kat] SHA2-256
803,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,487 UART: [kat] ++
814,934 UART: [kat] sha1
827,373 UART: [kat] SHA2-256
830,025 UART: [kat] SHA2-384
836,658 UART: [kat] SHA2-512-ACC
839,039 UART: [kat] ECC-384
3,281,017 UART: [kat] HMAC-384Kdf
3,293,604 UART: [kat] LMS
3,770,071 UART: [kat] --
3,775,084 UART: [cold-reset] ++
3,777,597 UART: [fht] FHT @ 0x50003400
3,788,929 UART: [idev] ++
3,789,491 UART: [idev] CDI.KEYID = 6
3,790,524 UART: [idev] SUBJECT.KEYID = 7
3,791,703 UART: [idev] UDS.KEYID = 0
3,792,630 ready_for_fw is high
3,792,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,731 UART: [idev] Erasing UDS.KEYID = 0
6,272,285 UART: [idev] Sha1 KeyId Algorithm
6,297,118 UART: [idev] --
6,301,467 UART: [ldev] ++
6,302,050 UART: [ldev] CDI.KEYID = 6
6,302,964 UART: [ldev] SUBJECT.KEYID = 5
6,304,176 UART: [ldev] AUTHORITY.KEYID = 7
6,305,403 UART: [ldev] FE.KEYID = 1
6,315,906 UART: [ldev] Erasing FE.KEYID = 1
8,794,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,513 UART: [ldev] --
10,587,995 UART: [fwproc] Wait for Commands...
10,589,559 UART: [fwproc] Recv command 0x46574c44
10,591,602 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,949 >>> mbox cmd response: success
14,568,264 UART: [afmc] ++
14,568,929 UART: [afmc] CDI.KEYID = 6
14,569,862 UART: [afmc] SUBJECT.KEYID = 7
14,571,034 UART: [afmc] AUTHORITY.KEYID = 5
17,073,393 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,392 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,764 UART: [afmc] --
18,870,697 UART: [cold-reset] --
18,874,181 UART: [state] Locking Datavault
18,879,823 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,577 UART: [state] Locking ICCM
18,884,056 UART: [exit] Launching FMC @ 0x40000130
18,892,459 UART:
18,892,696 UART: Running Caliptra FMC ...
18,893,824 UART:
18,893,992 UART: [state] CFI Enabled
18,902,052 UART: [fht] FMC Alias Private Key: 7
20,668,340 UART: [art] Extend RT PCRs Done
20,669,561 UART: [art] Lock RT PCRs Done
20,670,916 UART: [art] Populate DV Done
20,676,275 UART: [fht] FMC Alias Private Key: 7
20,678,040 UART: [art] Derive CDI
20,678,862 UART: [art] Store in slot 0x4
20,721,411 UART: [art] Derive Key Pair
20,722,454 UART: [art] Store priv key in slot 0x5
23,149,159 UART: [art] Derive Key Pair - Done
23,161,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,472 UART: [art] PUB.X = 38D167DE1E72CC04F47A360EC789C4BD733E2DA3A09E1E52844080DEA566593BDE57450BB228475555F353AF5F6C1315
24,876,729 UART: [art] PUB.Y = A29E296322C63CA0F0C85A489EC63E7DD51CCB233E2B278C25E9C931C3B38CA7E92BCEA377F2CB81F102ECFE302389E5
24,884,036 UART: [art] SIG.R = D22ED7627456AFFD8F982E9D8062B69AE513DD85139E8E84A98CDFA8344D941B9160BA6C09F09E3F7C82DEE84D1841F4
24,891,438 UART: [art] SIG.S = ECD525F5F421054642AC8036D88A07E3518CD94D4AB39D499DB7321EC5C78C9979D4480DC66C31BCF839B9596C2321BC
25,869,894 UART: Caliptra RT
25,870,607 UART: [state] CFI Enabled
26,003,358 UART: [rt] RT listening for mailbox commands...
26,005,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,044 UART: [rt]cmd =0x44504543, len=96
26,067,485 >>> mbox cmd response data (56 bytes)
26,068,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,098,706 UART: [rt]cmd =0x44504543, len=96
26,130,905 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,780,862 ready_for_fw is high
3,781,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,469 >>> mbox cmd response: success
18,700,293 UART:
18,700,681 UART: Running Caliptra FMC ...
18,702,000 UART:
18,702,190 UART: [state] CFI Enabled
18,710,191 UART: [fht] FMC Alias Private Key: 7
20,476,296 UART: [art] Extend RT PCRs Done
20,477,519 UART: [art] Lock RT PCRs Done
20,479,315 UART: [art] Populate DV Done
20,484,961 UART: [fht] FMC Alias Private Key: 7
20,486,478 UART: [art] Derive CDI
20,487,217 UART: [art] Store in slot 0x4
20,530,186 UART: [art] Derive Key Pair
20,531,391 UART: [art] Store priv key in slot 0x5
22,957,682 UART: [art] Derive Key Pair - Done
22,970,571 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,933 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,431 UART: [art] PUB.X = 9B5FD8AAEE970224479E9DC0130E2E1EE6DB46AE790EB2660B661904DF52EF4A682E5AA6677F3ACDB3916354A349EB2F
24,685,694 UART: [art] PUB.Y = 42F9A3640583E26529F41252871BC00E8E9043CE901FD02C67B237DE603D1DB5F30006285303FCA0D44C9E8D03B3A006
24,692,931 UART: [art] SIG.R = 33DBDD8D22FA7A8C94B27979113D57A274D145529C0B1C7D9CE7C318B13912D63EDE1CE2200CCD918EF99C2AF2766E70
24,700,343 UART: [art] SIG.S = B4CF706419388342862CDAD37E003A2786693338DB025A7843BDB94273402D409983488598B9DEED84B28F32BD4E70A2
25,679,120 UART: Caliptra RT
25,679,818 UART: [state] CFI Enabled
25,812,712 UART: [rt] RT listening for mailbox commands...
25,814,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,159 UART: [rt]cmd =0x44504543, len=96
25,876,872 >>> mbox cmd response data (56 bytes)
25,877,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,908,214 UART: [rt]cmd =0x44504543, len=96
25,940,053 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,184 UART:
192,546 UART: Running Caliptra ROM ...
193,725 UART:
193,876 UART: [state] CFI Enabled
262,575 UART: [state] LifecycleState = Unprovisioned
264,942 UART: [state] DebugLocked = No
267,615 UART: [state] WD Timer not started. Device not locked for debugging
272,706 UART: [kat] SHA2-256
462,638 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,382 UART: [kat] ++
473,870 UART: [kat] sha1
485,739 UART: [kat] SHA2-256
488,763 UART: [kat] SHA2-384
495,250 UART: [kat] SHA2-512-ACC
497,828 UART: [kat] ECC-384
2,946,515 UART: [kat] HMAC-384Kdf
2,962,795 UART: [kat] LMS
3,494,562 UART: [kat] --
3,501,836 UART: [cold-reset] ++
3,503,369 UART: [fht] FHT @ 0x50003400
3,514,913 UART: [idev] ++
3,515,620 UART: [idev] CDI.KEYID = 6
3,516,648 UART: [idev] SUBJECT.KEYID = 7
3,517,746 UART: [idev] UDS.KEYID = 0
3,518,667 ready_for_fw is high
3,518,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,667,920 UART: [idev] Erasing UDS.KEYID = 0
6,040,564 UART: [idev] Sha1 KeyId Algorithm
6,061,942 UART: [idev] --
6,067,312 UART: [ldev] ++
6,067,999 UART: [ldev] CDI.KEYID = 6
6,068,909 UART: [ldev] SUBJECT.KEYID = 5
6,070,066 UART: [ldev] AUTHORITY.KEYID = 7
6,071,298 UART: [ldev] FE.KEYID = 1
6,113,105 UART: [ldev] Erasing FE.KEYID = 1
8,620,108 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,371,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,386,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,845 UART: [ldev] --
10,428,104 UART: [fwproc] Wait for Commands...
10,429,824 UART: [fwproc] Recv command 0x46574c44
10,432,130 UART: [fwproc] Recv'd Img size: 118548 bytes
13,936,820 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,010,854 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,134,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,694,350 >>> mbox cmd response: success
14,698,127 UART: [afmc] ++
14,698,810 UART: [afmc] CDI.KEYID = 6
14,699,925 UART: [afmc] SUBJECT.KEYID = 7
14,701,472 UART: [afmc] AUTHORITY.KEYID = 5
17,230,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,975,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,977,100 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,992,154 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,007,330 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,022,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,045,564 UART: [afmc] --
19,048,570 UART: [cold-reset] --
19,053,051 UART: [state] Locking Datavault
19,059,175 UART: [state] Locking PCR0, PCR1 and PCR31
19,061,376 UART: [state] Locking ICCM
19,063,631 UART: [exit] Launching FMC @ 0x40000130
19,072,304 UART:
19,072,545 UART: Running Caliptra FMC ...
19,073,647 UART:
19,073,807 UART: [state] CFI Enabled
19,131,261 UART: [fht] FMC Alias Private Key: 7
20,897,526 UART: [art] Extend RT PCRs Done
20,898,730 UART: [art] Lock RT PCRs Done
20,900,156 UART: [art] Populate DV Done
20,905,720 UART: [fht] FMC Alias Private Key: 7
20,907,305 UART: [art] Derive CDI
20,908,110 UART: [art] Store in slot 0x4
20,964,283 UART: [art] Derive Key Pair
20,965,340 UART: [art] Store priv key in slot 0x5
23,428,108 UART: [art] Derive Key Pair - Done
23,441,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,154,343 UART: [art] Erasing AUTHORITY.KEYID = 7
25,155,855 UART: [art] PUB.X = EB6B3DFD0751008BFD5092709D48AB38938DADAC777EB8FA7F18BCDD05E12015B68F24CF5E1F7AFA3E3932764A498DD7
25,163,116 UART: [art] PUB.Y = 4073025D61A4BC09F240F087EFD1E961850E36EA514DDC142A6D504BF50AE19AA7BF977C5723AC62E1BE308361F188D3
25,170,359 UART: [art] SIG.R = 7241254C9CF253F14A8476CBEA0E4E3E68A66BCD1B89E74630E940DABE45672077F617E52109E02A83CD3EE5ACF9DA94
25,178,147 UART: [art] SIG.S = 7863D8A9E1DB0491A3C77FAC95F37FE9C64AB6FD3E780B06C2217F669BD8D8F9FC3C107CA3DC7A5411C268A656BBC278
26,156,326 UART: Caliptra RT
26,157,024 UART: [state] CFI Enabled
26,339,208 UART: [rt] RT listening for mailbox commands...
26,341,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,371,725 UART: [rt]cmd =0x44504543, len=96
26,402,911 >>> mbox cmd response data (56 bytes)
26,403,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,434,281 UART: [rt]cmd =0x44504543, len=96
26,465,407 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,438,412 ready_for_fw is high
3,438,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,064 >>> mbox cmd response: success
19,135,856 UART:
19,136,257 UART: Running Caliptra FMC ...
19,137,376 UART:
19,137,537 UART: [state] CFI Enabled
19,202,410 UART: [fht] FMC Alias Private Key: 7
20,968,511 UART: [art] Extend RT PCRs Done
20,969,752 UART: [art] Lock RT PCRs Done
20,971,404 UART: [art] Populate DV Done
20,976,982 UART: [fht] FMC Alias Private Key: 7
20,978,633 UART: [art] Derive CDI
20,979,368 UART: [art] Store in slot 0x4
21,035,214 UART: [art] Derive Key Pair
21,036,253 UART: [art] Store priv key in slot 0x5
23,499,119 UART: [art] Derive Key Pair - Done
23,512,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,094 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,614 UART: [art] PUB.X = 5CE88B9D34A91C6D618CF6B223C45A88032C094135F397A92484B4D43DCA57F66014F60DE786A7BAD8E577E046836341
25,233,857 UART: [art] PUB.Y = 80B4631039E5BB244BA737BBD68A8286910213389C27F7E1CD0A0E3305730320CD884E9A92B4478ABE22C9ABCC179D86
25,241,117 UART: [art] SIG.R = 553E9E8BCFD9E3E03870890AC8558EA7A48EC4B4D235DBCB84504E981788132075C5E508C3E491D5802B7D8EBAA801CA
25,248,472 UART: [art] SIG.S = AFB7648D1B644F7E990DEA1ABBE93030C0B9D3911C333918800163682A1BF57BFAC4FDDABDFCA6082B5E9794B0727DC2
26,227,397 UART: Caliptra RT
26,228,108 UART: [state] CFI Enabled
26,407,250 UART: [rt] RT listening for mailbox commands...
26,409,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,880 UART: [rt]cmd =0x44504543, len=96
26,470,870 >>> mbox cmd response data (56 bytes)
26,471,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,502,304 UART: [rt]cmd =0x44504543, len=96
26,533,730 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,589 UART:
192,956 UART: Running Caliptra ROM ...
194,151 UART:
603,562 UART: [state] CFI Enabled
616,056 UART: [state] LifecycleState = Unprovisioned
618,473 UART: [state] DebugLocked = No
621,088 UART: [state] WD Timer not started. Device not locked for debugging
624,864 UART: [kat] SHA2-256
814,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,540 UART: [kat] ++
826,146 UART: [kat] sha1
837,242 UART: [kat] SHA2-256
840,259 UART: [kat] SHA2-384
846,966 UART: [kat] SHA2-512-ACC
849,557 UART: [kat] ECC-384
3,291,592 UART: [kat] HMAC-384Kdf
3,304,178 UART: [kat] LMS
3,836,047 UART: [kat] --
3,840,196 UART: [cold-reset] ++
3,841,434 UART: [fht] FHT @ 0x50003400
3,852,771 UART: [idev] ++
3,853,484 UART: [idev] CDI.KEYID = 6
3,854,377 UART: [idev] SUBJECT.KEYID = 7
3,855,620 UART: [idev] UDS.KEYID = 0
3,856,562 ready_for_fw is high
3,856,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,688 UART: [idev] Erasing UDS.KEYID = 0
6,331,809 UART: [idev] Sha1 KeyId Algorithm
6,354,495 UART: [idev] --
6,359,412 UART: [ldev] ++
6,360,093 UART: [ldev] CDI.KEYID = 6
6,361,013 UART: [ldev] SUBJECT.KEYID = 5
6,362,177 UART: [ldev] AUTHORITY.KEYID = 7
6,363,412 UART: [ldev] FE.KEYID = 1
6,373,803 UART: [ldev] Erasing FE.KEYID = 1
8,857,792 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,834 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,818 UART: [ldev] --
10,649,093 UART: [fwproc] Wait for Commands...
10,650,545 UART: [fwproc] Recv command 0x46574c44
10,652,855 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,720 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,344 >>> mbox cmd response: success
14,908,847 UART: [afmc] ++
14,909,576 UART: [afmc] CDI.KEYID = 6
14,910,774 UART: [afmc] SUBJECT.KEYID = 7
14,912,241 UART: [afmc] AUTHORITY.KEYID = 5
17,413,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,130 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,153 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,357 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,255 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,162 UART: [afmc] --
19,212,603 UART: [cold-reset] --
19,216,863 UART: [state] Locking Datavault
19,222,888 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,111 UART: [state] Locking ICCM
19,226,952 UART: [exit] Launching FMC @ 0x40000130
19,235,596 UART:
19,235,830 UART: Running Caliptra FMC ...
19,236,937 UART:
19,237,119 UART: [state] CFI Enabled
19,245,016 UART: [fht] FMC Alias Private Key: 7
21,011,275 UART: [art] Extend RT PCRs Done
21,012,493 UART: [art] Lock RT PCRs Done
21,014,132 UART: [art] Populate DV Done
21,019,405 UART: [fht] FMC Alias Private Key: 7
21,021,004 UART: [art] Derive CDI
21,021,836 UART: [art] Store in slot 0x4
21,064,175 UART: [art] Derive Key Pair
21,065,186 UART: [art] Store priv key in slot 0x5
23,491,997 UART: [art] Derive Key Pair - Done
23,504,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,129 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,628 UART: [art] PUB.X = 361A675079C3A3F849106C35334783F93A6FFABAC182E6B4B49C41F81BB08ECF40B81058EDF7B163AD6C9B78959556EF
25,219,909 UART: [art] PUB.Y = FAFFEFA2F20BC95BE5D55BF4C6FC359FEAA1A90413FC7C66B26D7E235D39FB0625E7A99F4D682B68530E02DDA5731290
25,227,229 UART: [art] SIG.R = 7DF52E2247A6AFE707C23461C8352689623267D35F2A3765C4162F24A7BDDC6CFBAEFE9AC3870876919577A5D067B94E
25,234,617 UART: [art] SIG.S = 187E861BE0FC01F86969D583FB6FAEA87EA492E97EDFF4D8BAFFD582D10A131EA20F76C2F2A7FE18ACB9A2629166FC0E
26,213,523 UART: Caliptra RT
26,214,214 UART: [state] CFI Enabled
26,347,095 UART: [rt] RT listening for mailbox commands...
26,349,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,379,610 UART: [rt]cmd =0x44504543, len=96
26,410,316 >>> mbox cmd response data (56 bytes)
26,411,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,683 UART: [rt]cmd =0x44504543, len=96
26,472,640 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,755,889 ready_for_fw is high
3,756,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,636 >>> mbox cmd response: success
19,307,649 UART:
19,308,036 UART: Running Caliptra FMC ...
19,309,155 UART:
19,309,310 UART: [state] CFI Enabled
19,317,548 UART: [fht] FMC Alias Private Key: 7
21,083,210 UART: [art] Extend RT PCRs Done
21,084,461 UART: [art] Lock RT PCRs Done
21,086,227 UART: [art] Populate DV Done
21,091,499 UART: [fht] FMC Alias Private Key: 7
21,093,164 UART: [art] Derive CDI
21,093,910 UART: [art] Store in slot 0x4
21,136,351 UART: [art] Derive Key Pair
21,137,393 UART: [art] Store priv key in slot 0x5
23,564,367 UART: [art] Derive Key Pair - Done
23,576,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,086 UART: [art] PUB.X = 0F3F9D99AF1839874717252E4199920ADF76905B76EF2543BB88550150B8D7E73DFF30E341A3270DBD43D36D52F43609
25,292,329 UART: [art] PUB.Y = 5B26A2FA576D5073E292B798DB739F886206AC35A955B32FC3231C24E32F3C0EE1027C64DDA5C5544468BAFD3EFC57FC
25,299,556 UART: [art] SIG.R = BD9E6998DC98B6B17C5FE4CFA39D6924812218EE0191C1FABDD28073C476FD3772F2127A31D828E30FA3676AFE311E40
25,306,980 UART: [art] SIG.S = 8A00045FD82944CF8B3EC38C91A956169D8BB103A2ED461A94C9B3CB807AD96447EF8D300A7672D9C5686378CF166DD0
26,285,791 UART: Caliptra RT
26,286,502 UART: [state] CFI Enabled
26,419,253 UART: [rt] RT listening for mailbox commands...
26,421,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,829 UART: [rt]cmd =0x44504543, len=96
26,482,990 >>> mbox cmd response data (56 bytes)
26,483,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,525 UART: [rt]cmd =0x44504543, len=96
26,546,802 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,222 UART: [state] LifecycleState = Unprovisioned
85,877 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,193 UART: [kat] SHA2-256
882,124 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,239 UART: [kat] ++
886,391 UART: [kat] sha1
890,859 UART: [kat] SHA2-256
892,797 UART: [kat] SHA2-384
895,408 UART: [kat] SHA2-512-ACC
897,309 UART: [kat] ECC-384
902,816 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,809 UART: [fht] Storing FHT @ 0x50003400
1,479,534 UART: [idev] ++
1,479,702 UART: [idev] CDI.KEYID = 6
1,480,062 UART: [idev] SUBJECT.KEYID = 7
1,480,486 UART: [idev] UDS.KEYID = 0
1,480,831 ready_for_fw is high
1,480,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,804 UART: [idev] Erasing UDS.KEYID = 0
1,505,316 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,868 UART: [idev] --
1,514,995 UART: [ldev] ++
1,515,163 UART: [ldev] CDI.KEYID = 6
1,515,526 UART: [ldev] SUBJECT.KEYID = 5
1,515,952 UART: [ldev] AUTHORITY.KEYID = 7
1,516,415 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,664 UART: [ldev] --
1,587,165 UART: [fwproc] Waiting for Commands...
1,587,830 UART: [fwproc] Received command 0x46574c44
1,588,621 UART: [fwproc] Received Image of size 118548 bytes
2,932,698 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,446 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,664 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,971 >>> mbox cmd response: success
3,131,991 UART: [afmc] ++
3,132,159 UART: [afmc] CDI.KEYID = 6
3,132,521 UART: [afmc] SUBJECT.KEYID = 7
3,132,946 UART: [afmc] AUTHORITY.KEYID = 5
3,167,749 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,911 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,691 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,400 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,283 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,966 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,836 UART: [afmc] --
3,210,962 UART: [cold-reset] --
3,211,962 UART: [state] Locking Datavault
3,213,087 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,691 UART: [state] Locking ICCM
3,214,193 UART: [exit] Launching FMC @ 0x40000130
3,219,523 UART:
3,219,539 UART: Running Caliptra FMC ...
3,219,947 UART:
3,220,001 UART: [state] CFI Enabled
3,230,303 UART: [fht] FMC Alias Private Key: 7
3,349,215 UART: [art] Extend RT PCRs Done
3,349,643 UART: [art] Lock RT PCRs Done
3,351,189 UART: [art] Populate DV Done
3,359,476 UART: [fht] FMC Alias Private Key: 7
3,360,594 UART: [art] Derive CDI
3,360,874 UART: [art] Store in slot 0x4
3,447,100 UART: [art] Derive Key Pair
3,447,460 UART: [art] Store priv key in slot 0x5
3,461,327 UART: [art] Derive Key Pair - Done
3,476,027 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,137 UART: [art] PUB.X = DEA037A1720D8BFBDF40F699AC6418253665B3CA041335B3CABCF3C7584A2E98A4478EF552083A2CA7291A6988372342
3,498,900 UART: [art] PUB.Y = 23ED6828E1E0A5DF2FF5CC7BE6B57CE74D3670113522E835E97FA6E6007D63E1D616E76B2D7533D725065E7152904AF5
3,505,827 UART: [art] SIG.R = D1776564A7F4F535B74C939826279568EDBE677B02EA018F42EF7029483448AAB71C6F557EFED748CE006EABD6B4317D
3,512,573 UART: [art] SIG.S = 4E4B59669BBEFC4C689FBB12661FB9FE34C0208CCAA347C18294CCBE90B420BF81D41223DC682B9C0DD13901EA4123B5
3,536,617 UART: Caliptra RT
3,536,868 UART: [state] CFI Enabled
3,657,408 UART: [rt] RT listening for mailbox commands...
3,658,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,330 UART: [rt]cmd =0x44504543, len=96
3,721,652 >>> mbox cmd response data (56 bytes)
3,721,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,620 UART: [rt]cmd =0x44504543, len=96
3,784,614 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,911 ready_for_fw is high
1,361,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,858 >>> mbox cmd response: success
3,041,981 UART:
3,041,997 UART: Running Caliptra FMC ...
3,042,405 UART:
3,042,459 UART: [state] CFI Enabled
3,052,825 UART: [fht] FMC Alias Private Key: 7
3,172,283 UART: [art] Extend RT PCRs Done
3,172,711 UART: [art] Lock RT PCRs Done
3,174,577 UART: [art] Populate DV Done
3,182,840 UART: [fht] FMC Alias Private Key: 7
3,183,772 UART: [art] Derive CDI
3,184,052 UART: [art] Store in slot 0x4
3,269,386 UART: [art] Derive Key Pair
3,269,746 UART: [art] Store priv key in slot 0x5
3,282,403 UART: [art] Derive Key Pair - Done
3,296,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,584 UART: [art] PUB.X = 96A6FB612BB2ED2A5DF7815E9BB00978B7810A87E0AFD1B91739A5196BE2DD6C0BEED2F7C8E7F96990ECFE2813ACF655
3,319,365 UART: [art] PUB.Y = 08435CFE3CECC5742774BAB90F83D0446F72D4323AFB16FE09525E6B9A50B99363A0FBEC97FC43A224936149D719B841
3,326,310 UART: [art] SIG.R = 2AE810D2BFC7E99CD00412738B0C56E36A090D4B2A7819F64F738053CF89DC48C19D6CA6D40837147B462B8529C4906A
3,333,065 UART: [art] SIG.S = 3C43EF51B9298AB96C52F086E94D4260AA68234CF36350DDA3B83F581B5EB02F7E3C9B8C68CE8A7EE39AF35EA26E71E2
3,357,293 UART: Caliptra RT
3,357,544 UART: [state] CFI Enabled
3,478,393 UART: [rt] RT listening for mailbox commands...
3,479,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,477 UART: [rt]cmd =0x44504543, len=96
3,542,099 >>> mbox cmd response data (56 bytes)
3,542,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,987 UART: [rt]cmd =0x44504543, len=96
3,604,843 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,298 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,932 UART: [kat] SHA2-256
881,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,978 UART: [kat] ++
886,130 UART: [kat] sha1
890,334 UART: [kat] SHA2-256
892,272 UART: [kat] SHA2-384
895,053 UART: [kat] SHA2-512-ACC
896,954 UART: [kat] ECC-384
902,439 UART: [kat] HMAC-384Kdf
907,247 UART: [kat] LMS
1,475,443 UART: [kat] --
1,476,202 UART: [cold-reset] ++
1,476,672 UART: [fht] Storing FHT @ 0x50003400
1,479,339 UART: [idev] ++
1,479,507 UART: [idev] CDI.KEYID = 6
1,479,867 UART: [idev] SUBJECT.KEYID = 7
1,480,291 UART: [idev] UDS.KEYID = 0
1,480,636 ready_for_fw is high
1,480,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,393 UART: [idev] Erasing UDS.KEYID = 0
1,504,803 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,459 UART: [idev] --
1,514,500 UART: [ldev] ++
1,514,668 UART: [ldev] CDI.KEYID = 6
1,515,031 UART: [ldev] SUBJECT.KEYID = 5
1,515,457 UART: [ldev] AUTHORITY.KEYID = 7
1,515,920 UART: [ldev] FE.KEYID = 1
1,521,072 UART: [ldev] Erasing FE.KEYID = 1
1,546,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,541 UART: [ldev] --
1,585,994 UART: [fwproc] Waiting for Commands...
1,586,783 UART: [fwproc] Received command 0x46574c44
1,587,574 UART: [fwproc] Received Image of size 118548 bytes
2,933,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,186 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,617 >>> mbox cmd response: success
3,133,863 UART: [afmc] ++
3,134,031 UART: [afmc] CDI.KEYID = 6
3,134,393 UART: [afmc] SUBJECT.KEYID = 7
3,134,818 UART: [afmc] AUTHORITY.KEYID = 5
3,169,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,711 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,303 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,986 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,904 UART: [afmc] --
3,212,788 UART: [cold-reset] --
3,213,610 UART: [state] Locking Datavault
3,214,801 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,405 UART: [state] Locking ICCM
3,215,859 UART: [exit] Launching FMC @ 0x40000130
3,221,189 UART:
3,221,205 UART: Running Caliptra FMC ...
3,221,613 UART:
3,221,756 UART: [state] CFI Enabled
3,232,354 UART: [fht] FMC Alias Private Key: 7
3,350,424 UART: [art] Extend RT PCRs Done
3,350,852 UART: [art] Lock RT PCRs Done
3,352,436 UART: [art] Populate DV Done
3,360,377 UART: [fht] FMC Alias Private Key: 7
3,361,431 UART: [art] Derive CDI
3,361,711 UART: [art] Store in slot 0x4
3,447,443 UART: [art] Derive Key Pair
3,447,803 UART: [art] Store priv key in slot 0x5
3,462,118 UART: [art] Derive Key Pair - Done
3,476,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,907 UART: [art] PUB.X = 1EB89FD5D6FBEF343AA99B2C305DE997952187FFB4773E0E5CFC49E5350A4E4021C11739EFF8D4C0EE09560C0C6CE624
3,499,676 UART: [art] PUB.Y = 75FB4D3235EBA17DEF448E90B92B7C0D49E79445C394E3CF472FE9146B4D2F71F62D6BAF0892695259103A870C8B42E0
3,506,621 UART: [art] SIG.R = 3FB4EE514A2816906133F1447261B92CFF9525B4762366B8CC26D69D6161D93BCB18907DDF618CDF3A35362210A4F991
3,513,387 UART: [art] SIG.S = 4AD1E22D47014006ABFC412BAF480A0017066D36D754837B13EA335D38DB815EACD5E0FC56C0AECA401DA338065B79C3
3,536,978 UART: Caliptra RT
3,537,321 UART: [state] CFI Enabled
3,657,468 UART: [rt] RT listening for mailbox commands...
3,658,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,866 UART: [rt]cmd =0x44504543, len=96
3,721,214 >>> mbox cmd response data (56 bytes)
3,721,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,132 UART: [rt]cmd =0x44504543, len=96
3,784,412 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,214 ready_for_fw is high
1,363,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,201 >>> mbox cmd response: success
3,044,878 UART:
3,044,894 UART: Running Caliptra FMC ...
3,045,302 UART:
3,045,445 UART: [state] CFI Enabled
3,056,175 UART: [fht] FMC Alias Private Key: 7
3,175,249 UART: [art] Extend RT PCRs Done
3,175,677 UART: [art] Lock RT PCRs Done
3,177,555 UART: [art] Populate DV Done
3,185,806 UART: [fht] FMC Alias Private Key: 7
3,186,946 UART: [art] Derive CDI
3,187,226 UART: [art] Store in slot 0x4
3,273,260 UART: [art] Derive Key Pair
3,273,620 UART: [art] Store priv key in slot 0x5
3,286,979 UART: [art] Derive Key Pair - Done
3,301,936 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,423 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,188 UART: [art] PUB.X = 10878E9B3312530A1915453546DE650E00595D47251A1DB1FC41D4473A3E64DABC1D73C436B7FFC55C6D6AE534F71297
3,324,928 UART: [art] PUB.Y = B2A055A4BB9EB7AF06209D5E31F672709445EDDAF25C47E1A990F21CA7B95ACBDAD3AA0DD2BAEB3BECD7FB0F0D4A3D38
3,331,900 UART: [art] SIG.R = BD6934F3E0FB8F4FF786F79694C0133C9D1C965DDC44E559B98C688B4EA3DA1793D83DFB2716F04DBA548D5E8B81148B
3,338,682 UART: [art] SIG.S = B1BABD97F8E437B7082573D9E993D2455CE2400E70804DAFD0A5AA0915D918C1CD1AD73C6B577AFBCE0E089B9D35C739
3,361,895 UART: Caliptra RT
3,362,238 UART: [state] CFI Enabled
3,483,541 UART: [rt] RT listening for mailbox commands...
3,484,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,481 UART: [rt]cmd =0x44504543, len=96
3,547,005 >>> mbox cmd response data (56 bytes)
3,547,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,577,121 UART: [rt]cmd =0x44504543, len=96
3,609,965 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
891,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,422 UART: [kat] ++
895,574 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
916,647 UART: [kat] HMAC-384Kdf
921,109 UART: [kat] LMS
1,169,421 UART: [kat] --
1,170,188 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,444 UART: [idev] ++
1,173,612 UART: [idev] CDI.KEYID = 6
1,173,973 UART: [idev] SUBJECT.KEYID = 7
1,174,398 UART: [idev] UDS.KEYID = 0
1,174,744 ready_for_fw is high
1,174,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,931 UART: [idev] Erasing UDS.KEYID = 0
1,198,589 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,404 UART: [ldev] ++
1,208,572 UART: [ldev] CDI.KEYID = 6
1,208,936 UART: [ldev] SUBJECT.KEYID = 5
1,209,363 UART: [ldev] AUTHORITY.KEYID = 7
1,209,826 UART: [ldev] FE.KEYID = 1
1,215,170 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,706 UART: [ldev] --
1,280,099 UART: [fwproc] Wait for Commands...
1,280,862 UART: [fwproc] Recv command 0x46574c44
1,281,595 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,808 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,193 >>> mbox cmd response: success
2,824,265 UART: [afmc] ++
2,824,433 UART: [afmc] CDI.KEYID = 6
2,824,796 UART: [afmc] SUBJECT.KEYID = 7
2,825,222 UART: [afmc] AUTHORITY.KEYID = 5
2,861,453 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,768 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,286 UART: [afmc] --
2,904,231 UART: [cold-reset] --
2,904,995 UART: [state] Locking Datavault
2,906,150 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,754 UART: [state] Locking ICCM
2,907,300 UART: [exit] Launching FMC @ 0x40000130
2,912,630 UART:
2,912,646 UART: Running Caliptra FMC ...
2,913,054 UART:
2,913,108 UART: [state] CFI Enabled
2,923,754 UART: [fht] FMC Alias Private Key: 7
3,042,680 UART: [art] Extend RT PCRs Done
3,043,108 UART: [art] Lock RT PCRs Done
3,044,940 UART: [art] Populate DV Done
3,053,327 UART: [fht] FMC Alias Private Key: 7
3,054,491 UART: [art] Derive CDI
3,054,771 UART: [art] Store in slot 0x4
3,140,648 UART: [art] Derive Key Pair
3,141,008 UART: [art] Store priv key in slot 0x5
3,154,156 UART: [art] Derive Key Pair - Done
3,168,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,107 UART: [art] PUB.X = 2C42760F5E4F222B77148797AFDCD55BF6F475E4DFCDF026DE0D4EF52D9F4B3EA4F2CA2480F806305D1B0AB44753877F
3,191,879 UART: [art] PUB.Y = 40FC462D53FC1CA67644CC0EC12F3DDBF6D0D950B49A83125B995BE3700F734B50B4EDF27F91EC01CDF7D0CCD29CF69C
3,198,842 UART: [art] SIG.R = D3B25D1FE948B0013A561DE0078EBDAB5EEEECA53D9D343282B45F13C63E2FB34BBDF20F7C967B56498C95A2256A60A6
3,205,619 UART: [art] SIG.S = 476D654F2FD13ACAAEFBFF20C4FFDFD701CCB3544F781EF6C624ECDDEA1D58037686209D92A5237F1F5A372E6DC23963
3,229,619 UART: Caliptra RT
3,229,870 UART: [state] CFI Enabled
3,348,751 UART: [rt] RT listening for mailbox commands...
3,349,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,577 UART: [rt]cmd =0x44504543, len=96
3,412,383 >>> mbox cmd response data (56 bytes)
3,412,384 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,271 UART: [rt]cmd =0x44504543, len=96
3,475,385 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,872 ready_for_fw is high
1,058,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,146 >>> mbox cmd response: success
2,740,043 UART:
2,740,059 UART: Running Caliptra FMC ...
2,740,467 UART:
2,740,521 UART: [state] CFI Enabled
2,750,831 UART: [fht] FMC Alias Private Key: 7
2,869,525 UART: [art] Extend RT PCRs Done
2,869,953 UART: [art] Lock RT PCRs Done
2,871,605 UART: [art] Populate DV Done
2,879,864 UART: [fht] FMC Alias Private Key: 7
2,880,858 UART: [art] Derive CDI
2,881,138 UART: [art] Store in slot 0x4
2,966,961 UART: [art] Derive Key Pair
2,967,321 UART: [art] Store priv key in slot 0x5
2,980,057 UART: [art] Derive Key Pair - Done
2,994,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,290 UART: [art] PUB.X = 2D42A7FCAEEE1982B660DB9DB7E24352122D2B8DE6AECD710812D296BD6C7E6C95E03D76084C0C1F4103B33918CA3108
3,017,055 UART: [art] PUB.Y = ABE1AF743D2DD8A695EAC38BB82FC0A5CD4107C246F2EF64A641C7CCDFAD806E0D46F815934620AB566950EE40093889
3,024,010 UART: [art] SIG.R = 6623E090AF938E7F6604E8EBCC3B49BF995CE3ADAB82649C60E78D0E7C68E94D579425FA63170C84C9104732AFE204C5
3,030,774 UART: [art] SIG.S = 546FBA203B8F4C76FC657EFB16FC3F77E482F5D693B407BC38516957A4FFF9ED8004683CEECBF645590CC7B264471E77
3,054,639 UART: Caliptra RT
3,054,890 UART: [state] CFI Enabled
3,174,452 UART: [rt] RT listening for mailbox commands...
3,175,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,762 UART: [rt]cmd =0x44504543, len=96
3,238,502 >>> mbox cmd response data (56 bytes)
3,238,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,592 UART: [rt]cmd =0x44504543, len=96
3,301,902 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,170 UART: [state] WD Timer not started. Device not locked for debugging
87,383 UART: [kat] SHA2-256
890,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,037 UART: [kat] ++
895,189 UART: [kat] sha1
899,555 UART: [kat] SHA2-256
901,495 UART: [kat] SHA2-384
904,406 UART: [kat] SHA2-512-ACC
906,307 UART: [kat] ECC-384
915,684 UART: [kat] HMAC-384Kdf
920,174 UART: [kat] LMS
1,168,486 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,777 UART: [fht] FHT @ 0x50003400
1,172,281 UART: [idev] ++
1,172,449 UART: [idev] CDI.KEYID = 6
1,172,810 UART: [idev] SUBJECT.KEYID = 7
1,173,235 UART: [idev] UDS.KEYID = 0
1,173,581 ready_for_fw is high
1,173,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,456 UART: [idev] Erasing UDS.KEYID = 0
1,198,638 UART: [idev] Sha1 KeyId Algorithm
1,207,752 UART: [idev] --
1,208,803 UART: [ldev] ++
1,208,971 UART: [ldev] CDI.KEYID = 6
1,209,335 UART: [ldev] SUBJECT.KEYID = 5
1,209,762 UART: [ldev] AUTHORITY.KEYID = 7
1,210,225 UART: [ldev] FE.KEYID = 1
1,215,593 UART: [ldev] Erasing FE.KEYID = 1
1,242,394 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,944 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,409 UART: [fwproc] Recv command 0x46574c44
1,283,142 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,462 >>> mbox cmd response: success
2,827,588 UART: [afmc] ++
2,827,756 UART: [afmc] CDI.KEYID = 6
2,828,119 UART: [afmc] SUBJECT.KEYID = 7
2,828,545 UART: [afmc] AUTHORITY.KEYID = 5
2,863,670 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,314 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,024 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,606 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,439 UART: [afmc] --
2,907,426 UART: [cold-reset] --
2,908,352 UART: [state] Locking Datavault
2,909,555 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,159 UART: [state] Locking ICCM
2,910,803 UART: [exit] Launching FMC @ 0x40000130
2,916,133 UART:
2,916,149 UART: Running Caliptra FMC ...
2,916,557 UART:
2,916,700 UART: [state] CFI Enabled
2,927,324 UART: [fht] FMC Alias Private Key: 7
3,046,504 UART: [art] Extend RT PCRs Done
3,046,932 UART: [art] Lock RT PCRs Done
3,048,402 UART: [art] Populate DV Done
3,056,621 UART: [fht] FMC Alias Private Key: 7
3,057,729 UART: [art] Derive CDI
3,058,009 UART: [art] Store in slot 0x4
3,144,026 UART: [art] Derive Key Pair
3,144,386 UART: [art] Store priv key in slot 0x5
3,157,892 UART: [art] Derive Key Pair - Done
3,172,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,005 UART: [art] PUB.X = E43A68C131FAE631F34932330B73E58B84ECA8B98F0CB2E5E3ADFFCD9298BC01F16C1697D3E3DBBAD86718D20BEDC87D
3,195,785 UART: [art] PUB.Y = 942FAC83A8B5CF3E40D94321E1264606DD9CADA71C31554F9693F9890761CC7FB544C007785B1346A82131BFBDAFFE22
3,202,732 UART: [art] SIG.R = 30046DB8987BF49E4C37C1695A27AC098733AA10A00E8F64DC5485EC0D3D685C3BF6DC17E68CAE81B27CC52C300B5B7F
3,209,499 UART: [art] SIG.S = EBABAED65FC5CD7BE88D4CAAB4F027D3D081E8729AC834C0B509D4E27843DC579CC0CB460883044E29C9F87C6365ED21
3,233,672 UART: Caliptra RT
3,234,015 UART: [state] CFI Enabled
3,354,124 UART: [rt] RT listening for mailbox commands...
3,354,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,060 UART: [rt]cmd =0x44504543, len=96
3,417,284 >>> mbox cmd response data (56 bytes)
3,417,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,244 UART: [rt]cmd =0x44504543, len=96
3,479,834 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,473 ready_for_fw is high
1,059,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,189 >>> mbox cmd response: success
2,740,786 UART:
2,740,802 UART: Running Caliptra FMC ...
2,741,210 UART:
2,741,353 UART: [state] CFI Enabled
2,751,783 UART: [fht] FMC Alias Private Key: 7
2,870,467 UART: [art] Extend RT PCRs Done
2,870,895 UART: [art] Lock RT PCRs Done
2,872,319 UART: [art] Populate DV Done
2,880,310 UART: [fht] FMC Alias Private Key: 7
2,881,244 UART: [art] Derive CDI
2,881,524 UART: [art] Store in slot 0x4
2,967,379 UART: [art] Derive Key Pair
2,967,739 UART: [art] Store priv key in slot 0x5
2,981,485 UART: [art] Derive Key Pair - Done
2,996,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,863 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,628 UART: [art] PUB.X = 349F931C8561A858EE01DB6955EA7699769F7E878C9518AAFE4D5FA04A1A1930EA501B3EE3775058488400345A410915
3,019,362 UART: [art] PUB.Y = 62445429B0F65BAB62C9363CC34458682B84C63D534B49DE6C9E4CC00FC1CCCA890A8FA29F686E0614A54E9C52DAF63F
3,026,313 UART: [art] SIG.R = BB5D0DD14E04DF405AC5C63CE4ACD3092D26C5CB13AA6348BA2427D14BCAAFC8D5E99BBC9F498B049EB6923CD594F6AB
3,033,099 UART: [art] SIG.S = AAE0FC6A26CA537124C7F9240DC7E4DFF1EA32470067D82486AF2283DFC4745EFED0E0B9D76DFFC87C793A9EEE9DFD36
3,056,188 UART: Caliptra RT
3,056,531 UART: [state] CFI Enabled
3,176,909 UART: [rt] RT listening for mailbox commands...
3,177,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,183 UART: [rt]cmd =0x44504543, len=96
3,240,671 >>> mbox cmd response data (56 bytes)
3,240,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,625 UART: [rt]cmd =0x44504543, len=96
3,303,169 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
893,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,647 UART: [kat] ++
897,799 UART: [kat] sha1
902,137 UART: [kat] SHA2-256
904,077 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,534 UART: [kat] LMS
1,170,862 UART: [kat] --
1,171,539 UART: [cold-reset] ++
1,171,921 UART: [fht] FHT @ 0x50003400
1,174,388 UART: [idev] ++
1,174,556 UART: [idev] CDI.KEYID = 6
1,174,916 UART: [idev] SUBJECT.KEYID = 7
1,175,340 UART: [idev] UDS.KEYID = 0
1,175,685 ready_for_fw is high
1,175,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,359 UART: [idev] Sha1 KeyId Algorithm
1,208,843 UART: [idev] --
1,209,917 UART: [ldev] ++
1,210,085 UART: [ldev] CDI.KEYID = 6
1,210,448 UART: [ldev] SUBJECT.KEYID = 5
1,210,874 UART: [ldev] AUTHORITY.KEYID = 7
1,211,337 UART: [ldev] FE.KEYID = 1
1,216,497 UART: [ldev] Erasing FE.KEYID = 1
1,242,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,069 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,190 UART: [fwproc] Recv command 0x46574c44
1,283,918 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,930 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,481 >>> mbox cmd response: success
2,829,723 UART: [afmc] ++
2,829,891 UART: [afmc] CDI.KEYID = 6
2,830,253 UART: [afmc] SUBJECT.KEYID = 7
2,830,678 UART: [afmc] AUTHORITY.KEYID = 5
2,865,981 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,218 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,511 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,415 UART: [afmc] --
2,909,517 UART: [cold-reset] --
2,910,465 UART: [state] Locking Datavault
2,911,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,242 UART: [state] Locking ICCM
2,912,862 UART: [exit] Launching FMC @ 0x40000130
2,918,192 UART:
2,918,208 UART: Running Caliptra FMC ...
2,918,616 UART:
2,918,670 UART: [state] CFI Enabled
2,928,984 UART: [fht] FMC Alias Private Key: 7
3,047,626 UART: [art] Extend RT PCRs Done
3,048,054 UART: [art] Lock RT PCRs Done
3,049,738 UART: [art] Populate DV Done
3,057,981 UART: [fht] FMC Alias Private Key: 7
3,059,009 UART: [art] Derive CDI
3,059,289 UART: [art] Store in slot 0x4
3,145,142 UART: [art] Derive Key Pair
3,145,502 UART: [art] Store priv key in slot 0x5
3,158,522 UART: [art] Derive Key Pair - Done
3,173,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,503 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,268 UART: [art] PUB.X = BF3C75268112C90C83DCCBC210BBDC13302FB9CE417805CFC31592B5A918CCB4F8A26A0DCF5DD1D857211BDD38FFFCE9
3,196,053 UART: [art] PUB.Y = 64DFA59C608D3D66396D529EED34AF12D3625EF0ABCB59D090EAE305C8861D7FDA6DA9BDC045074E0AAC123B6D849BDA
3,203,016 UART: [art] SIG.R = 72DC5252ECE5832C0484BE094539796D65069E63BC2DC08D15210A306F6B78BFCFF312294B32E7297B4F990234E3EB0A
3,209,768 UART: [art] SIG.S = AE166A56A7C2169025ADC0E6FE15E0EC15336F70114E39E6318BA1B8DB6DE6E95ED0AB63131259A37D8543887045B205
3,234,027 UART: Caliptra RT
3,234,278 UART: [state] CFI Enabled
3,353,977 UART: [rt] RT listening for mailbox commands...
3,354,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,721 UART: [rt]cmd =0x44504543, len=96
3,416,995 >>> mbox cmd response data (56 bytes)
3,416,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,739 UART: [rt]cmd =0x44504543, len=96
3,479,411 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,213 ready_for_fw is high
1,060,213 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,394 >>> mbox cmd response: success
2,739,755 UART:
2,739,771 UART: Running Caliptra FMC ...
2,740,179 UART:
2,740,233 UART: [state] CFI Enabled
2,750,431 UART: [fht] FMC Alias Private Key: 7
2,868,515 UART: [art] Extend RT PCRs Done
2,868,943 UART: [art] Lock RT PCRs Done
2,870,567 UART: [art] Populate DV Done
2,878,974 UART: [fht] FMC Alias Private Key: 7
2,880,060 UART: [art] Derive CDI
2,880,340 UART: [art] Store in slot 0x4
2,965,777 UART: [art] Derive Key Pair
2,966,137 UART: [art] Store priv key in slot 0x5
2,979,707 UART: [art] Derive Key Pair - Done
2,994,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,962 UART: [art] PUB.X = 597C24E85FD678351B10F20A39D604AC2C12DA134E4436CA910ABFAB3B3610BF9962013373363DD928808FD0145D5E7F
3,017,720 UART: [art] PUB.Y = AA5A67F28D8B96DF06C3EDC4BB6ADA3AF705A799D5B5B6653AFAA2A1BD2E7A6D25D424122C0B55B36A6457E42A8A2B73
3,024,683 UART: [art] SIG.R = 06ACC5BD544420041AD32A4B407CBDCF42995A8A816FB4D8CE9F87872588B8D0CE3E944173E12544142CEF2B9FB41D64
3,031,455 UART: [art] SIG.S = B06271FF8497B78D727F875012E33021FFE743305FC89A4E9959C3AE6D95BF3B6FADFC2BBBEFFF3E07A452166597B880
3,055,284 UART: Caliptra RT
3,055,535 UART: [state] CFI Enabled
3,174,842 UART: [rt] RT listening for mailbox commands...
3,175,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,026 UART: [rt]cmd =0x44504543, len=96
3,238,282 >>> mbox cmd response data (56 bytes)
3,238,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,322 UART: [rt]cmd =0x44504543, len=96
3,301,020 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,781 UART: [state] LifecycleState = Unprovisioned
85,436 UART: [state] DebugLocked = No
85,964 UART: [state] WD Timer not started. Device not locked for debugging
87,139 UART: [kat] SHA2-256
892,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,914 UART: [kat] ++
897,066 UART: [kat] sha1
901,506 UART: [kat] SHA2-256
903,446 UART: [kat] SHA2-384
906,201 UART: [kat] SHA2-512-ACC
908,102 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,773 UART: [kat] LMS
1,171,101 UART: [kat] --
1,171,744 UART: [cold-reset] ++
1,172,314 UART: [fht] FHT @ 0x50003400
1,174,961 UART: [idev] ++
1,175,129 UART: [idev] CDI.KEYID = 6
1,175,489 UART: [idev] SUBJECT.KEYID = 7
1,175,913 UART: [idev] UDS.KEYID = 0
1,176,258 ready_for_fw is high
1,176,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,003 UART: [idev] Erasing UDS.KEYID = 0
1,201,404 UART: [idev] Sha1 KeyId Algorithm
1,209,970 UART: [idev] --
1,211,208 UART: [ldev] ++
1,211,376 UART: [ldev] CDI.KEYID = 6
1,211,739 UART: [ldev] SUBJECT.KEYID = 5
1,212,165 UART: [ldev] AUTHORITY.KEYID = 7
1,212,628 UART: [ldev] FE.KEYID = 1
1,217,994 UART: [ldev] Erasing FE.KEYID = 1
1,244,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,796 UART: [ldev] --
1,284,067 UART: [fwproc] Wait for Commands...
1,284,659 UART: [fwproc] Recv command 0x46574c44
1,285,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,515 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,664 >>> mbox cmd response: success
2,828,812 UART: [afmc] ++
2,828,980 UART: [afmc] CDI.KEYID = 6
2,829,342 UART: [afmc] SUBJECT.KEYID = 7
2,829,767 UART: [afmc] AUTHORITY.KEYID = 5
2,866,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,509 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,101 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,686 UART: [afmc] --
2,909,652 UART: [cold-reset] --
2,910,620 UART: [state] Locking Datavault
2,911,729 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,333 UART: [state] Locking ICCM
2,912,759 UART: [exit] Launching FMC @ 0x40000130
2,918,089 UART:
2,918,105 UART: Running Caliptra FMC ...
2,918,513 UART:
2,918,656 UART: [state] CFI Enabled
2,929,294 UART: [fht] FMC Alias Private Key: 7
3,048,302 UART: [art] Extend RT PCRs Done
3,048,730 UART: [art] Lock RT PCRs Done
3,050,434 UART: [art] Populate DV Done
3,058,689 UART: [fht] FMC Alias Private Key: 7
3,059,619 UART: [art] Derive CDI
3,059,899 UART: [art] Store in slot 0x4
3,146,148 UART: [art] Derive Key Pair
3,146,508 UART: [art] Store priv key in slot 0x5
3,159,746 UART: [art] Derive Key Pair - Done
3,174,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,350 UART: [art] PUB.X = 92640BC62A5A2183017FC3195BA4E0D97DDC33C5EF907A39D0555594B06EF78C6896EDC59EDF9F6A16F2CEB709FA329D
3,197,123 UART: [art] PUB.Y = 6FEFDF28AACF3C97D17D2E1EAC196679D57FBB5587391B4C61459137377405792E2F6A66E8B618C727A8CA8BCA6C63A3
3,204,080 UART: [art] SIG.R = F4DC1299B86169EF0542E0BAA4079A0E74208930B0E99BD6ED55B25666C8EF7C93E637F99061C9371E978977E85C44FE
3,210,841 UART: [art] SIG.S = ED7F6BAFCF85FD9F6DD186C61A74AEE08031FE610BAF13F906D66271D0F10BAF486C32A8A0CF4FD7B0739BCBCEBE5CC2
3,234,542 UART: Caliptra RT
3,234,885 UART: [state] CFI Enabled
3,354,877 UART: [rt] RT listening for mailbox commands...
3,355,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,983 UART: [rt]cmd =0x44504543, len=96
3,418,531 >>> mbox cmd response data (56 bytes)
3,418,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,448,507 UART: [rt]cmd =0x44504543, len=96
3,481,543 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,954 ready_for_fw is high
1,059,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,985 >>> mbox cmd response: success
2,741,940 UART:
2,741,956 UART: Running Caliptra FMC ...
2,742,364 UART:
2,742,507 UART: [state] CFI Enabled
2,753,033 UART: [fht] FMC Alias Private Key: 7
2,872,481 UART: [art] Extend RT PCRs Done
2,872,909 UART: [art] Lock RT PCRs Done
2,874,341 UART: [art] Populate DV Done
2,882,552 UART: [fht] FMC Alias Private Key: 7
2,883,482 UART: [art] Derive CDI
2,883,762 UART: [art] Store in slot 0x4
2,969,295 UART: [art] Derive Key Pair
2,969,655 UART: [art] Store priv key in slot 0x5
2,983,083 UART: [art] Derive Key Pair - Done
2,998,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,047 UART: [art] PUB.X = E97FD173F73928CD1DA5237133F8E86948A8C49491527AC5662641296B2F1913C1B18D234C5691CE9C48F4F087A23BCA
3,020,813 UART: [art] PUB.Y = 0679870CA18CA4B8DD6DEAC8583DD3CB61A257B15FE8F7198D48C6C574182EF5E93257C0DEE2AC312B6D40B53CF767A1
3,027,771 UART: [art] SIG.R = E8CE4B0AF19F69921AD89341CE66CE9A430387DE0B0B4E5C2360EBF31A61DA415B9B408B33EEF21315EFE058C783E685
3,034,541 UART: [art] SIG.S = 25AF0DA99CB8D697866106732205D1886E0A0AE017EFB1724F86388B2F985DAD7669EAEF4DDC078DE4B7D1FA824343BB
3,058,403 UART: Caliptra RT
3,058,746 UART: [state] CFI Enabled
3,178,835 UART: [rt] RT listening for mailbox commands...
3,179,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,049 UART: [rt]cmd =0x44504543, len=96
3,242,251 >>> mbox cmd response data (56 bytes)
3,242,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,311 UART: [rt]cmd =0x44504543, len=96
3,305,925 >>> mbox cmd response data (56 bytes)
test test_pauser_privilege_levels::test_change_locality ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
192,106 UART:
192,625 UART: Running Caliptra ROM ...
193,753 UART:
193,911 UART: [state] CFI Enabled
264,076 UART: [state] LifecycleState = Unprovisioned
265,941 UART: [state] DebugLocked = No
267,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,690 UART: [kat] SHA2-256
442,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,701 UART: [kat] ++
453,149 UART: [kat] sha1
463,383 UART: [kat] SHA2-256
466,033 UART: [kat] SHA2-384
471,319 UART: [kat] SHA2-512-ACC
473,705 UART: [kat] ECC-384
2,770,015 UART: [kat] HMAC-384Kdf
2,801,294 UART: [kat] LMS
3,991,628 UART: [kat] --
3,998,323 UART: [cold-reset] ++
3,999,340 UART: [fht] Storing FHT @ 0x50003400
4,009,706 UART: [idev] ++
4,010,351 UART: [idev] CDI.KEYID = 6
4,011,263 UART: [idev] SUBJECT.KEYID = 7
4,012,514 UART: [idev] UDS.KEYID = 0
4,013,502 ready_for_fw is high
4,013,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,764 UART: [idev] Erasing UDS.KEYID = 0
7,348,401 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,614 UART: [idev] --
7,373,824 UART: [ldev] ++
7,374,478 UART: [ldev] CDI.KEYID = 6
7,375,393 UART: [ldev] SUBJECT.KEYID = 5
7,376,610 UART: [ldev] AUTHORITY.KEYID = 7
7,377,838 UART: [ldev] FE.KEYID = 1
7,423,039 UART: [ldev] Erasing FE.KEYID = 1
10,758,850 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,268 UART: [ldev] --
13,134,721 UART: [fwproc] Waiting for Commands...
13,137,347 UART: [fwproc] Received command 0x46574c44
13,139,527 UART: [fwproc] Received Image of size 118548 bytes
17,241,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,472 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,684 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,756 >>> mbox cmd response: success
17,723,429 UART: [afmc] ++
17,724,054 UART: [afmc] CDI.KEYID = 6
17,724,972 UART: [afmc] SUBJECT.KEYID = 7
17,726,192 UART: [afmc] AUTHORITY.KEYID = 5
21,094,577 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,530 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,265 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,990 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,386 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,656 UART: [afmc] --
23,463,714 UART: [cold-reset] --
23,467,201 UART: [state] Locking Datavault
23,474,131 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,962 UART: [state] Locking ICCM
23,478,501 UART: [exit] Launching FMC @ 0x40000130
23,486,914 UART:
23,487,155 UART: Running Caliptra FMC ...
23,488,254 UART:
23,488,412 UART: [state] CFI Enabled
23,554,253 UART: [fht] FMC Alias Private Key: 7
25,895,361 UART: [art] Extend RT PCRs Done
25,896,581 UART: [art] Lock RT PCRs Done
25,898,421 UART: [art] Populate DV Done
25,903,938 UART: [fht] FMC Alias Private Key: 7
25,905,581 UART: [art] Derive CDI
25,906,314 UART: [art] Store in slot 0x4
25,963,397 UART: [art] Derive Key Pair
25,964,437 UART: [art] Store priv key in slot 0x5
29,257,849 UART: [art] Derive Key Pair - Done
29,270,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,638 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,146 UART: [art] PUB.X = 822645A061F6E607A4D22D86CFDC57B3CA1D4FB51772A7560A02B089DD196B67214EE5A921221FC079C8B7C091DDF1F5
31,568,387 UART: [art] PUB.Y = 0AB11FB23638057044F61FDCF3EEB78FF389E52E54B9598A74466CC412900A2A1E162BE5FCC8B832E46D4AB181EDAF43
31,575,672 UART: [art] SIG.R = D716A66DC608D47ED54CAA9ABD2FAAF53EF0A3173248449FB238DA97565C11CCD23813F4894E50DF5A00D0D310FD70EA
31,583,060 UART: [art] SIG.S = E90649E571DC36537F947DEA8F52633A917D47B20B8F907FB96D52B53DB288F0EBEBFF5E9AEFF0600FBC57B0C61C7CEB
32,887,954 UART: Caliptra RT
32,888,683 UART: [state] CFI Enabled
33,062,875 UART: [rt] RT listening for mailbox commands...
33,064,808 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,095,001 UART: [rt]cmd =0x44504543, len=24
33,123,184 >>> mbox cmd response data (40 bytes)
33,124,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,155,108 UART: [rt]cmd =0x44504543, len=96
33,161,982 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,804,787 ready_for_fw is high
3,805,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,984,248 >>> mbox cmd response: success
23,674,209 UART:
23,674,603 UART: Running Caliptra FMC ...
23,675,718 UART:
23,675,877 UART: [state] CFI Enabled
23,741,572 UART: [fht] FMC Alias Private Key: 7
26,081,160 UART: [art] Extend RT PCRs Done
26,082,412 UART: [art] Lock RT PCRs Done
26,084,128 UART: [art] Populate DV Done
26,089,433 UART: [fht] FMC Alias Private Key: 7
26,091,136 UART: [art] Derive CDI
26,091,875 UART: [art] Store in slot 0x4
26,150,004 UART: [art] Derive Key Pair
26,151,057 UART: [art] Store priv key in slot 0x5
29,443,087 UART: [art] Derive Key Pair - Done
29,455,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,994 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,505 UART: [art] PUB.X = 886ADDFB14C5D323A531978258496C1707624B1A9175453C3276581FCA1C17FEC6018489E109FD21F6CF6CCEC08C7C5D
31,753,814 UART: [art] PUB.Y = C6775DAAE0F7B1947619BE9AE7712B80871D8445B99A47BA101C6D8114A8473978ACB5D6BCA4204A0A9794DC818A99B3
31,761,055 UART: [art] SIG.R = D21A6B5430E5A9374F4108E119AD0E151CD5F68420C72E7A9C94DACA1E967416027830D0E2F122E09D3C585509097B7B
31,768,408 UART: [art] SIG.S = 73ADC07C73E65BB1ABE0134D18C5955D3B2A02B03A5ED916071FF229DCF80DE180DE4EA1315470EE7E4EB1945005B545
33,073,445 UART: Caliptra RT
33,074,191 UART: [state] CFI Enabled
33,251,746 UART: [rt] RT listening for mailbox commands...
33,253,669 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,283,751 UART: [rt]cmd =0x44504543, len=24
33,311,402 >>> mbox cmd response data (40 bytes)
33,312,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,343,135 UART: [rt]cmd =0x44504543, len=96
33,350,281 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,309 UART:
192,667 UART: Running Caliptra ROM ...
193,857 UART:
603,559 UART: [state] CFI Enabled
620,657 UART: [state] LifecycleState = Unprovisioned
622,602 UART: [state] DebugLocked = No
623,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,633 UART: [kat] SHA2-256
798,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,904 UART: [kat] ++
809,354 UART: [kat] sha1
819,303 UART: [kat] SHA2-256
822,027 UART: [kat] SHA2-384
829,528 UART: [kat] SHA2-512-ACC
831,858 UART: [kat] ECC-384
3,118,020 UART: [kat] HMAC-384Kdf
3,129,535 UART: [kat] LMS
4,319,693 UART: [kat] --
4,325,013 UART: [cold-reset] ++
4,326,224 UART: [fht] Storing FHT @ 0x50003400
4,338,053 UART: [idev] ++
4,338,610 UART: [idev] CDI.KEYID = 6
4,339,591 UART: [idev] SUBJECT.KEYID = 7
4,340,824 UART: [idev] UDS.KEYID = 0
4,341,840 ready_for_fw is high
4,342,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,978 UART: [idev] Erasing UDS.KEYID = 0
7,629,043 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,073 UART: [idev] --
7,655,183 UART: [ldev] ++
7,655,756 UART: [ldev] CDI.KEYID = 6
7,656,716 UART: [ldev] SUBJECT.KEYID = 5
7,657,924 UART: [ldev] AUTHORITY.KEYID = 7
7,659,151 UART: [ldev] FE.KEYID = 1
7,673,246 UART: [ldev] Erasing FE.KEYID = 1
10,964,215 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,256,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,271,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,300,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,318,264 UART: [ldev] --
13,322,731 UART: [fwproc] Waiting for Commands...
13,324,874 UART: [fwproc] Received command 0x46574c44
13,327,105 UART: [fwproc] Received Image of size 118548 bytes
17,431,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,590 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,741 >>> mbox cmd response: success
17,911,817 UART: [afmc] ++
17,912,434 UART: [afmc] CDI.KEYID = 6
17,913,348 UART: [afmc] SUBJECT.KEYID = 7
17,914,558 UART: [afmc] AUTHORITY.KEYID = 5
21,231,882 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,660 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,856 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,268 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,556 UART: [afmc] --
23,598,151 UART: [cold-reset] --
23,601,468 UART: [state] Locking Datavault
23,607,033 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,728 UART: [state] Locking ICCM
23,611,411 UART: [exit] Launching FMC @ 0x40000130
23,619,801 UART:
23,620,029 UART: Running Caliptra FMC ...
23,621,125 UART:
23,621,275 UART: [state] CFI Enabled
23,629,054 UART: [fht] FMC Alias Private Key: 7
25,969,267 UART: [art] Extend RT PCRs Done
25,970,483 UART: [art] Lock RT PCRs Done
25,971,889 UART: [art] Populate DV Done
25,977,263 UART: [fht] FMC Alias Private Key: 7
25,978,848 UART: [art] Derive CDI
25,979,656 UART: [art] Store in slot 0x4
26,022,514 UART: [art] Derive Key Pair
26,023,511 UART: [art] Store priv key in slot 0x5
29,265,099 UART: [art] Derive Key Pair - Done
29,278,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,449 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,955 UART: [art] PUB.X = B5D9AB9F5F7040DE18E63A3BAF03E81DA6EE9043EC70A6EF22CCA21CF3329197B0AE158343A806A474D6F5B2E895A7CD
31,567,199 UART: [art] PUB.Y = 9337EA72640B5AFF11AC16D9C60918267937366961272F17DEB571A86CB989A909F929BF0482AC32902A173844401A39
31,574,422 UART: [art] SIG.R = D220CD1D824DD35DE33D9DC3B9BDDB93C6A631CF03374E63834E23034C012A19A9FB89344C6061D34F22C0ED0945535D
31,581,803 UART: [art] SIG.S = AA8974621A44859A82A3E49BB02124D53FBB09D2AA5EA41855A3C1167951A2AF24F4AB052DC51F34DB4596A0452924BF
32,886,794 UART: Caliptra RT
32,887,507 UART: [state] CFI Enabled
33,020,955 UART: [rt] RT listening for mailbox commands...
33,022,873 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,052,842 UART: [rt]cmd =0x44504543, len=24
33,079,901 >>> mbox cmd response data (40 bytes)
33,081,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,112,005 UART: [rt]cmd =0x44504543, len=96
33,118,531 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,126,643 ready_for_fw is high
4,127,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,148,839 >>> mbox cmd response: success
23,789,641 UART:
23,790,071 UART: Running Caliptra FMC ...
23,791,235 UART:
23,791,400 UART: [state] CFI Enabled
23,799,029 UART: [fht] FMC Alias Private Key: 7
26,138,544 UART: [art] Extend RT PCRs Done
26,139,772 UART: [art] Lock RT PCRs Done
26,141,343 UART: [art] Populate DV Done
26,146,760 UART: [fht] FMC Alias Private Key: 7
26,148,463 UART: [art] Derive CDI
26,149,273 UART: [art] Store in slot 0x4
26,191,865 UART: [art] Derive Key Pair
26,192,864 UART: [art] Store priv key in slot 0x5
29,434,837 UART: [art] Derive Key Pair - Done
29,447,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,565 UART: [art] PUB.X = 8AA6135AB3D5AE77B20A90235729266CB85ED1C12ECE3EFC58151864A2BB9D309110093F35323B3EF4A03BDBD736702C
31,736,867 UART: [art] PUB.Y = 1729982AB3E51D09B55A045BACD5C58746DB380909DD7450AEA39BB583E05ABD6FFD4EAC036148367FFBB6E094FC9A1F
31,744,127 UART: [art] SIG.R = 08163585C7E0C2EFFC306331523367DC205AD815BBD90B60BDF31CEBC8E0FEC6CE305F28F7E00A4F7EBC49E55FB2DB78
31,751,531 UART: [art] SIG.S = 95019B363C300FD296DAE3644BAC7BF4D4A32E83460A2670D0919D4D6C23261F3073EC29E6765F82CC911AC092744D93
33,056,733 UART: Caliptra RT
33,057,452 UART: [state] CFI Enabled
33,191,111 UART: [rt] RT listening for mailbox commands...
33,193,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,223,009 UART: [rt]cmd =0x44504543, len=24
33,250,826 >>> mbox cmd response data (40 bytes)
33,251,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,282,390 UART: [rt]cmd =0x44504543, len=96
33,288,903 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
192,045 UART:
192,408 UART: Running Caliptra ROM ...
193,496 UART:
193,641 UART: [state] CFI Enabled
263,038 UART: [state] LifecycleState = Unprovisioned
265,025 UART: [state] DebugLocked = No
266,990 UART: [state] WD Timer not started. Device not locked for debugging
271,171 UART: [kat] SHA2-256
450,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,610 UART: [kat] ++
462,210 UART: [kat] sha1
473,297 UART: [kat] SHA2-256
475,966 UART: [kat] SHA2-384
482,092 UART: [kat] SHA2-512-ACC
484,457 UART: [kat] ECC-384
2,948,486 UART: [kat] HMAC-384Kdf
2,969,749 UART: [kat] LMS
3,446,225 UART: [kat] --
3,450,249 UART: [cold-reset] ++
3,451,970 UART: [fht] FHT @ 0x50003400
3,463,582 UART: [idev] ++
3,464,137 UART: [idev] CDI.KEYID = 6
3,465,162 UART: [idev] SUBJECT.KEYID = 7
3,466,331 UART: [idev] UDS.KEYID = 0
3,467,369 ready_for_fw is high
3,467,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,702 UART: [idev] Erasing UDS.KEYID = 0
5,985,235 UART: [idev] Sha1 KeyId Algorithm
6,007,999 UART: [idev] --
6,013,563 UART: [ldev] ++
6,014,136 UART: [ldev] CDI.KEYID = 6
6,015,155 UART: [ldev] SUBJECT.KEYID = 5
6,016,257 UART: [ldev] AUTHORITY.KEYID = 7
6,017,540 UART: [ldev] FE.KEYID = 1
6,057,266 UART: [ldev] Erasing FE.KEYID = 1
8,565,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,825 UART: [ldev] --
10,374,243 UART: [fwproc] Wait for Commands...
10,376,931 UART: [fwproc] Recv command 0x46574c44
10,378,844 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,029 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,417 >>> mbox cmd response: success
14,351,941 UART: [afmc] ++
14,352,562 UART: [afmc] CDI.KEYID = 6
14,353,524 UART: [afmc] SUBJECT.KEYID = 7
14,354,735 UART: [afmc] AUTHORITY.KEYID = 5
16,892,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,480 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,576 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,393 UART: [afmc] --
18,694,381 UART: [cold-reset] --
18,698,906 UART: [state] Locking Datavault
18,704,413 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,169 UART: [state] Locking ICCM
18,707,614 UART: [exit] Launching FMC @ 0x40000130
18,716,060 UART:
18,716,294 UART: Running Caliptra FMC ...
18,717,390 UART:
18,717,553 UART: [state] CFI Enabled
18,773,642 UART: [fht] FMC Alias Private Key: 7
20,540,239 UART: [art] Extend RT PCRs Done
20,541,470 UART: [art] Lock RT PCRs Done
20,543,256 UART: [art] Populate DV Done
20,548,566 UART: [fht] FMC Alias Private Key: 7
20,550,154 UART: [art] Derive CDI
20,550,965 UART: [art] Store in slot 0x4
20,606,752 UART: [art] Derive Key Pair
20,607,764 UART: [art] Store priv key in slot 0x5
23,070,855 UART: [art] Derive Key Pair - Done
23,083,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,410 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,903 UART: [art] PUB.X = F38BEEB8895CA0F82D5E41697F013DA3A8CB9DD35152A93E13BF3C28865B12B81666DECF282D727C7C5B60DF44DB6A13
24,805,201 UART: [art] PUB.Y = FE4C8F68456F7D4DE3E6DC958276149DCD881B5408A18E29F2FB905D4073D484C902D0F0D37B52EC50AF625AD08E5D5D
24,812,482 UART: [art] SIG.R = B4FA0612AFF4F58F345C121968780445E20B08B20BD6090E736CC0A0FA06DF4444420F2B64510FFCADD946638188E5D5
24,819,867 UART: [art] SIG.S = 705A2FA6CFA7CDE36CCE9C54029727FC69B5DC7BF98608063CCF49FDFCC8AE3127EAA86694CB35FA055CE4BCC4D99D8D
25,799,400 UART: Caliptra RT
25,800,094 UART: [state] CFI Enabled
25,980,718 UART: [rt] RT listening for mailbox commands...
25,982,636 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,012,925 UART: [rt]cmd =0x44504543, len=24
26,040,682 >>> mbox cmd response data (40 bytes)
26,041,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,072,298 UART: [rt]cmd =0x44504543, len=96
26,078,927 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,461,349 ready_for_fw is high
3,461,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,835 >>> mbox cmd response: success
18,540,892 UART:
18,541,319 UART: Running Caliptra FMC ...
18,542,419 UART:
18,542,574 UART: [state] CFI Enabled
18,605,008 UART: [fht] FMC Alias Private Key: 7
20,371,795 UART: [art] Extend RT PCRs Done
20,373,023 UART: [art] Lock RT PCRs Done
20,374,545 UART: [art] Populate DV Done
20,380,229 UART: [fht] FMC Alias Private Key: 7
20,381,927 UART: [art] Derive CDI
20,382,742 UART: [art] Store in slot 0x4
20,438,067 UART: [art] Derive Key Pair
20,439,114 UART: [art] Store priv key in slot 0x5
22,902,074 UART: [art] Derive Key Pair - Done
22,914,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,909 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,417 UART: [art] PUB.X = 1B1772E08EE82A199428704DB61AB067238AA70067D83ED2A3C0E6D5B33866F652BE6FB3E24A9C21D5C2A7DD16DCA370
24,636,669 UART: [art] PUB.Y = 86F0C5CE4CB62DFB0EAC328A152987C3B38A19B635A31959865E88A6A2A7F76167B586358EBECBF8DF40672A2480C2F1
24,643,917 UART: [art] SIG.R = 5186B84A913E7BC312B35D4028FBCEECF181F82533A40920EF5DB4559B78BBACA367BB9BC340C044A6D1B99A611954FB
24,651,307 UART: [art] SIG.S = 1DD474317122616EE608E9DC1F99CB61327457460AC725FC2E79DF56EE007DF06275D4A03492EA041CECD4D2A0BA5688
25,630,156 UART: Caliptra RT
25,630,877 UART: [state] CFI Enabled
25,810,168 UART: [rt] RT listening for mailbox commands...
25,812,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,842,110 UART: [rt]cmd =0x44504543, len=24
25,870,948 >>> mbox cmd response data (40 bytes)
25,872,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,902,564 UART: [rt]cmd =0x44504543, len=96
25,909,499 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,620 UART:
192,974 UART: Running Caliptra ROM ...
194,093 UART:
603,959 UART: [state] CFI Enabled
615,759 UART: [state] LifecycleState = Unprovisioned
617,743 UART: [state] DebugLocked = No
619,266 UART: [state] WD Timer not started. Device not locked for debugging
623,311 UART: [kat] SHA2-256
802,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,730 UART: [kat] ++
814,181 UART: [kat] sha1
823,636 UART: [kat] SHA2-256
826,300 UART: [kat] SHA2-384
831,158 UART: [kat] SHA2-512-ACC
833,530 UART: [kat] ECC-384
3,275,325 UART: [kat] HMAC-384Kdf
3,288,485 UART: [kat] LMS
3,765,035 UART: [kat] --
3,769,388 UART: [cold-reset] ++
3,771,956 UART: [fht] FHT @ 0x50003400
3,783,004 UART: [idev] ++
3,783,579 UART: [idev] CDI.KEYID = 6
3,784,618 UART: [idev] SUBJECT.KEYID = 7
3,785,788 UART: [idev] UDS.KEYID = 0
3,786,736 ready_for_fw is high
3,786,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,874 UART: [idev] Erasing UDS.KEYID = 0
6,262,601 UART: [idev] Sha1 KeyId Algorithm
6,285,395 UART: [idev] --
6,291,335 UART: [ldev] ++
6,291,914 UART: [ldev] CDI.KEYID = 6
6,292,999 UART: [ldev] SUBJECT.KEYID = 5
6,294,122 UART: [ldev] AUTHORITY.KEYID = 7
6,295,251 UART: [ldev] FE.KEYID = 1
6,307,139 UART: [ldev] Erasing FE.KEYID = 1
8,782,086 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,652 UART: [ldev] --
10,576,925 UART: [fwproc] Wait for Commands...
10,579,132 UART: [fwproc] Recv command 0x46574c44
10,581,119 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,953 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,995 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,920 >>> mbox cmd response: success
14,560,460 UART: [afmc] ++
14,561,072 UART: [afmc] CDI.KEYID = 6
14,561,964 UART: [afmc] SUBJECT.KEYID = 7
14,563,189 UART: [afmc] AUTHORITY.KEYID = 5
17,066,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,568 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,989 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,263 UART: [afmc] --
18,866,971 UART: [cold-reset] --
18,870,619 UART: [state] Locking Datavault
18,874,031 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,742 UART: [state] Locking ICCM
18,877,927 UART: [exit] Launching FMC @ 0x40000130
18,886,379 UART:
18,886,614 UART: Running Caliptra FMC ...
18,887,713 UART:
18,887,871 UART: [state] CFI Enabled
18,896,348 UART: [fht] FMC Alias Private Key: 7
20,662,359 UART: [art] Extend RT PCRs Done
20,663,568 UART: [art] Lock RT PCRs Done
20,665,496 UART: [art] Populate DV Done
20,670,931 UART: [fht] FMC Alias Private Key: 7
20,672,526 UART: [art] Derive CDI
20,673,343 UART: [art] Store in slot 0x4
20,715,838 UART: [art] Derive Key Pair
20,716,880 UART: [art] Store priv key in slot 0x5
23,143,455 UART: [art] Derive Key Pair - Done
23,156,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,396 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,902 UART: [art] PUB.X = EE40DF99DC8B3F57F74186874A007433511BB91587DE843A55B69C799F80F9D5B8D0393077C62D1E44F984C93CCC8A2E
24,871,152 UART: [art] PUB.Y = EABF6888266D29535722E414CAEA115E0CE9742660542C8F7F11264AD4FEEDA161BAFC290461AD3EFEE46FEBC36AA000
24,878,393 UART: [art] SIG.R = C8EF14BDCB8095E2976D89B06BE5AC3D6BF264A1C5B92C566F065B91995E8778CC028A9A5F2712440CD0B0E7C4F9665C
24,885,789 UART: [art] SIG.S = F1BCA43EE2D1A4089920130DA1B39FC32295408E4C7F07B470B079911117E7DD708D3B406DE04FCB136A5B82BEBABB36
25,865,218 UART: Caliptra RT
25,865,929 UART: [state] CFI Enabled
25,998,681 UART: [rt] RT listening for mailbox commands...
26,000,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,030,739 UART: [rt]cmd =0x44504543, len=24
26,058,564 >>> mbox cmd response data (40 bytes)
26,059,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,960 UART: [rt]cmd =0x44504543, len=96
26,096,541 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,780,259 ready_for_fw is high
3,780,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,762 >>> mbox cmd response: success
18,704,554 UART:
18,704,956 UART: Running Caliptra FMC ...
18,706,291 UART:
18,706,467 UART: [state] CFI Enabled
18,714,509 UART: [fht] FMC Alias Private Key: 7
20,480,758 UART: [art] Extend RT PCRs Done
20,481,984 UART: [art] Lock RT PCRs Done
20,483,489 UART: [art] Populate DV Done
20,488,961 UART: [fht] FMC Alias Private Key: 7
20,490,449 UART: [art] Derive CDI
20,491,184 UART: [art] Store in slot 0x4
20,534,265 UART: [art] Derive Key Pair
20,535,307 UART: [art] Store priv key in slot 0x5
22,962,214 UART: [art] Derive Key Pair - Done
22,975,052 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,702 UART: [art] PUB.X = DD1B600C7A28746C152073616D764CD5DDAD90BD0ADCFA723B31DEE2C043D3F0275FBCDE9474A6F9AE8E1F46C494A157
24,690,016 UART: [art] PUB.Y = 2B5A94142B50616CBBE968647DFB3AD1F2A826C4B5BBF66B5B8A509877A3A039DA859426C0F12FFB91BBB914CC607E45
24,697,306 UART: [art] SIG.R = B2A6DA96616F72443B98F64583DE81DB2B459850C89B23FBCC9ECE984671C3860730BCBF64725D6792E9EEB4037BAE14
24,704,713 UART: [art] SIG.S = 431EE40E35DF24E87C454628A5706C07E6D025005D08929F8E2B0651BD7EF77603374F5711914FE9BE2C1C087011143D
25,683,558 UART: Caliptra RT
25,684,277 UART: [state] CFI Enabled
25,817,332 UART: [rt] RT listening for mailbox commands...
25,819,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,849,047 UART: [rt]cmd =0x44504543, len=24
25,876,583 >>> mbox cmd response data (40 bytes)
25,877,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,908,020 UART: [rt]cmd =0x44504543, len=96
25,914,278 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,197 UART:
192,574 UART: Running Caliptra ROM ...
193,751 UART:
193,906 UART: [state] CFI Enabled
265,490 UART: [state] LifecycleState = Unprovisioned
267,889 UART: [state] DebugLocked = No
270,695 UART: [state] WD Timer not started. Device not locked for debugging
275,304 UART: [kat] SHA2-256
465,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,945 UART: [kat] ++
476,419 UART: [kat] sha1
487,004 UART: [kat] SHA2-256
490,019 UART: [kat] SHA2-384
495,158 UART: [kat] SHA2-512-ACC
497,808 UART: [kat] ECC-384
2,949,957 UART: [kat] HMAC-384Kdf
2,972,426 UART: [kat] LMS
3,504,184 UART: [kat] --
3,509,043 UART: [cold-reset] ++
3,511,434 UART: [fht] FHT @ 0x50003400
3,523,193 UART: [idev] ++
3,523,909 UART: [idev] CDI.KEYID = 6
3,524,936 UART: [idev] SUBJECT.KEYID = 7
3,526,033 UART: [idev] UDS.KEYID = 0
3,527,029 ready_for_fw is high
3,527,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,263 UART: [idev] Erasing UDS.KEYID = 0
6,031,950 UART: [idev] Sha1 KeyId Algorithm
6,055,462 UART: [idev] --
6,059,457 UART: [ldev] ++
6,060,132 UART: [ldev] CDI.KEYID = 6
6,061,018 UART: [ldev] SUBJECT.KEYID = 5
6,062,224 UART: [ldev] AUTHORITY.KEYID = 7
6,063,473 UART: [ldev] FE.KEYID = 1
6,101,567 UART: [ldev] Erasing FE.KEYID = 1
8,606,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,413 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,040 UART: [ldev] --
10,413,873 UART: [fwproc] Wait for Commands...
10,415,581 UART: [fwproc] Recv command 0x46574c44
10,417,882 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,606 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,857 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,318 >>> mbox cmd response: success
14,682,780 UART: [afmc] ++
14,683,502 UART: [afmc] CDI.KEYID = 6
14,684,690 UART: [afmc] SUBJECT.KEYID = 7
14,686,127 UART: [afmc] AUTHORITY.KEYID = 5
17,213,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,728 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,853 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,670 UART: [afmc] --
19,011,489 UART: [cold-reset] --
19,015,086 UART: [state] Locking Datavault
19,020,561 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,713 UART: [state] Locking ICCM
19,024,111 UART: [exit] Launching FMC @ 0x40000130
19,032,778 UART:
19,033,050 UART: Running Caliptra FMC ...
19,034,167 UART:
19,034,331 UART: [state] CFI Enabled
19,094,154 UART: [fht] FMC Alias Private Key: 7
20,860,892 UART: [art] Extend RT PCRs Done
20,862,109 UART: [art] Lock RT PCRs Done
20,863,835 UART: [art] Populate DV Done
20,869,142 UART: [fht] FMC Alias Private Key: 7
20,870,833 UART: [art] Derive CDI
20,871,655 UART: [art] Store in slot 0x4
20,927,173 UART: [art] Derive Key Pair
20,928,167 UART: [art] Store priv key in slot 0x5
23,390,842 UART: [art] Derive Key Pair - Done
23,403,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,116,386 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,898 UART: [art] PUB.X = B00563CF2C8C6533F0F0ADB59D959A9655F70489D8FAA3984B7D7A4DF9D675A806F38BFAF7FFBF08014EDD1331B6EB05
25,125,232 UART: [art] PUB.Y = CA525892416FD4E26CE26992718914AF53A0C7AC4D62B979E8E363D90921414F8215898F8A4A7711DE31F338EC87BDCC
25,132,416 UART: [art] SIG.R = F7C161FE0F3C6ED62987EC9DC848C528364B945943C5A767B98E7DB16B69CCFB3FBA4C1B8AA6A07AC425617AED4A9FCE
25,139,870 UART: [art] SIG.S = 7B29DB40D490FCDBDEE097CC84A911BB7C1150E81FB6C4A7EE6A9357EF7BC8A9DA6C5733A04591E301D79A02413A6433
26,118,707 UART: Caliptra RT
26,119,414 UART: [state] CFI Enabled
26,299,389 UART: [rt] RT listening for mailbox commands...
26,301,321 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,331,173 UART: [rt]cmd =0x44504543, len=24
26,359,568 >>> mbox cmd response data (40 bytes)
26,360,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,391,579 UART: [rt]cmd =0x44504543, len=96
26,398,453 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,438,532 ready_for_fw is high
3,439,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,685 >>> mbox cmd response: success
19,111,733 UART:
19,112,115 UART: Running Caliptra FMC ...
19,113,309 UART:
19,113,478 UART: [state] CFI Enabled
19,180,155 UART: [fht] FMC Alias Private Key: 7
20,946,873 UART: [art] Extend RT PCRs Done
20,948,093 UART: [art] Lock RT PCRs Done
20,949,722 UART: [art] Populate DV Done
20,955,190 UART: [fht] FMC Alias Private Key: 7
20,956,671 UART: [art] Derive CDI
20,957,444 UART: [art] Store in slot 0x4
21,013,242 UART: [art] Derive Key Pair
21,014,285 UART: [art] Store priv key in slot 0x5
23,478,191 UART: [art] Derive Key Pair - Done
23,491,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,858 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,354 UART: [art] PUB.X = 821163C0AA46D8E3E87A1E0269EEC98F59695F705A06572F5C83388F46FB83E1CD9B9BD1E299A7F49DA6946216F50B96
25,212,633 UART: [art] PUB.Y = 4E02B0DF11D0DD0808AFF8C909A9E8F25F62E5E1D2CE9469193EB0BCB37393454912571DB452B4355D66ED62C8398F72
25,219,850 UART: [art] SIG.R = F4929F9D6743BED054E41A54C09DB080928013A93B3649E98B43990BFB7EADF7F44E37AE4DB2B84E3227B221C3E133F8
25,227,234 UART: [art] SIG.S = FCA2B6D11EE8AB4E3745BF7A2D18159D3BEC8CEF02217D9716DB1186DB6EDECA208142E6A6169E47FF5FD4E2B76723CC
26,206,147 UART: Caliptra RT
26,206,861 UART: [state] CFI Enabled
26,387,179 UART: [rt] RT listening for mailbox commands...
26,389,105 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,419,006 UART: [rt]cmd =0x44504543, len=24
26,447,503 >>> mbox cmd response data (40 bytes)
26,448,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,479,235 UART: [rt]cmd =0x44504543, len=96
26,485,918 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,585 UART:
192,944 UART: Running Caliptra ROM ...
194,096 UART:
603,955 UART: [state] CFI Enabled
617,638 UART: [state] LifecycleState = Unprovisioned
620,020 UART: [state] DebugLocked = No
622,200 UART: [state] WD Timer not started. Device not locked for debugging
627,305 UART: [kat] SHA2-256
817,187 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,926 UART: [kat] ++
828,552 UART: [kat] sha1
839,510 UART: [kat] SHA2-256
842,517 UART: [kat] SHA2-384
847,448 UART: [kat] SHA2-512-ACC
850,037 UART: [kat] ECC-384
3,292,086 UART: [kat] HMAC-384Kdf
3,306,313 UART: [kat] LMS
3,838,090 UART: [kat] --
3,841,155 UART: [cold-reset] ++
3,843,100 UART: [fht] FHT @ 0x50003400
3,853,512 UART: [idev] ++
3,854,156 UART: [idev] CDI.KEYID = 6
3,855,116 UART: [idev] SUBJECT.KEYID = 7
3,856,365 UART: [idev] UDS.KEYID = 0
3,857,268 ready_for_fw is high
3,857,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,410 UART: [idev] Erasing UDS.KEYID = 0
6,339,010 UART: [idev] Sha1 KeyId Algorithm
6,361,705 UART: [idev] --
6,367,544 UART: [ldev] ++
6,368,229 UART: [ldev] CDI.KEYID = 6
6,369,115 UART: [ldev] SUBJECT.KEYID = 5
6,370,327 UART: [ldev] AUTHORITY.KEYID = 7
6,371,564 UART: [ldev] FE.KEYID = 1
6,383,644 UART: [ldev] Erasing FE.KEYID = 1
8,860,739 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,218 UART: [ldev] --
10,653,058 UART: [fwproc] Wait for Commands...
10,655,123 UART: [fwproc] Recv command 0x46574c44
10,657,382 UART: [fwproc] Recv'd Img size: 118548 bytes
14,156,392 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,918,290 >>> mbox cmd response: success
14,922,306 UART: [afmc] ++
14,923,018 UART: [afmc] CDI.KEYID = 6
14,924,135 UART: [afmc] SUBJECT.KEYID = 7
14,925,695 UART: [afmc] AUTHORITY.KEYID = 5
17,428,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,345 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,605 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,357 UART: [afmc] --
19,224,644 UART: [cold-reset] --
19,229,441 UART: [state] Locking Datavault
19,233,466 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,628 UART: [state] Locking ICCM
19,237,740 UART: [exit] Launching FMC @ 0x40000130
19,246,432 UART:
19,246,677 UART: Running Caliptra FMC ...
19,247,782 UART:
19,247,946 UART: [state] CFI Enabled
19,255,996 UART: [fht] FMC Alias Private Key: 7
21,021,552 UART: [art] Extend RT PCRs Done
21,022,786 UART: [art] Lock RT PCRs Done
21,024,363 UART: [art] Populate DV Done
21,029,850 UART: [fht] FMC Alias Private Key: 7
21,031,376 UART: [art] Derive CDI
21,032,168 UART: [art] Store in slot 0x4
21,075,101 UART: [art] Derive Key Pair
21,076,105 UART: [art] Store priv key in slot 0x5
23,503,039 UART: [art] Derive Key Pair - Done
23,515,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,816 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,323 UART: [art] PUB.X = 7BEF64F9FD7C13A1C8ABF955AAA5AC9B993275591487C775EFA18DA52BE4E70A4DC944CAC2E4BD679AE578662C2CB0FA
25,230,632 UART: [art] PUB.Y = 17A8E001DC1AB22F75649FC1114E74B953F251688221A6CB9148FAB0A9916FE674D80E46F89E14978E10CFB90F08F91C
25,237,892 UART: [art] SIG.R = EFEAE2B072A81AF0F0EF850EFBF51163217062C5B5C6087BBB9BF0CE7A5E85F7F7CBBDC99D3BB9EEBC0D55B4234B6F77
25,245,334 UART: [art] SIG.S = 49D52E7657092779B7EE7F1589EF0F033BBE18403C8C6CDAE3B0135C821856E579FDDC88FA8D2973930ED22C1D0E80DE
26,223,867 UART: Caliptra RT
26,224,562 UART: [state] CFI Enabled
26,356,926 UART: [rt] RT listening for mailbox commands...
26,358,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,388,865 UART: [rt]cmd =0x44504543, len=24
26,416,067 >>> mbox cmd response data (40 bytes)
26,417,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,448,115 UART: [rt]cmd =0x44504543, len=96
26,454,968 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
3,757,194 ready_for_fw is high
3,757,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,777 >>> mbox cmd response: success
19,292,178 UART:
19,292,555 UART: Running Caliptra FMC ...
19,293,706 UART:
19,293,870 UART: [state] CFI Enabled
19,301,607 UART: [fht] FMC Alias Private Key: 7
21,067,990 UART: [art] Extend RT PCRs Done
21,069,209 UART: [art] Lock RT PCRs Done
21,070,841 UART: [art] Populate DV Done
21,076,431 UART: [fht] FMC Alias Private Key: 7
21,078,086 UART: [art] Derive CDI
21,078,915 UART: [art] Store in slot 0x4
21,121,627 UART: [art] Derive Key Pair
21,122,631 UART: [art] Store priv key in slot 0x5
23,549,568 UART: [art] Derive Key Pair - Done
23,562,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,813 UART: [art] Erasing AUTHORITY.KEYID = 7
25,270,323 UART: [art] PUB.X = 5CE5943E7E4435EE9EB25A2627CF9133A32E91ECAFC66D69153AB5333158BC98261A42067B9BD81EFFDFDBBF807626EE
25,277,602 UART: [art] PUB.Y = 0956F2C8F4A99EBB3E1D79E25665DC44155231FDEBAAF98468B6D9C1B6F02B335A2E55472D443BE5A46BD5B45A143111
25,284,811 UART: [art] SIG.R = 1C64E2AE2CEA25B91BD411A71CF709A7199B8B69BA6B8275EE329667F758A7F516557819C5331E21F80D7EFCF1F72735
25,292,231 UART: [art] SIG.S = 1740C6CD975D1E728F523392A38FB2306B786B22892FB20A28944C71C081A73FBF0483D37722D7950FD26F12546F3742
26,271,039 UART: Caliptra RT
26,271,736 UART: [state] CFI Enabled
26,405,047 UART: [rt] RT listening for mailbox commands...
26,406,971 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,436,884 UART: [rt]cmd =0x44504543, len=24
26,464,893 >>> mbox cmd response data (40 bytes)
26,466,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,496,585 UART: [rt]cmd =0x44504543, len=96
26,503,438 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,919 UART: [kat] SHA2-256
881,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,965 UART: [kat] ++
886,117 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,268 UART: [kat] LMS
1,475,464 UART: [kat] --
1,476,235 UART: [cold-reset] ++
1,476,677 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 ready_for_fw is high
1,480,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,336 UART: [idev] Erasing UDS.KEYID = 0
1,504,736 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,436 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,521,225 UART: [ldev] Erasing FE.KEYID = 1
1,546,762 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,146 UART: [ldev] --
1,586,581 UART: [fwproc] Waiting for Commands...
1,587,222 UART: [fwproc] Received command 0x46574c44
1,588,013 UART: [fwproc] Received Image of size 118548 bytes
2,931,979 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,721 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,939 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,234 >>> mbox cmd response: success
3,132,466 UART: [afmc] ++
3,132,634 UART: [afmc] CDI.KEYID = 6
3,132,996 UART: [afmc] SUBJECT.KEYID = 7
3,133,421 UART: [afmc] AUTHORITY.KEYID = 5
3,168,684 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,062 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,842 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,434 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,117 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,869 UART: [afmc] --
3,211,801 UART: [cold-reset] --
3,212,735 UART: [state] Locking Datavault
3,213,936 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,540 UART: [state] Locking ICCM
3,215,136 UART: [exit] Launching FMC @ 0x40000130
3,220,466 UART:
3,220,482 UART: Running Caliptra FMC ...
3,220,890 UART:
3,220,944 UART: [state] CFI Enabled
3,231,622 UART: [fht] FMC Alias Private Key: 7
3,350,040 UART: [art] Extend RT PCRs Done
3,350,468 UART: [art] Lock RT PCRs Done
3,352,480 UART: [art] Populate DV Done
3,360,789 UART: [fht] FMC Alias Private Key: 7
3,361,903 UART: [art] Derive CDI
3,362,183 UART: [art] Store in slot 0x4
3,447,907 UART: [art] Derive Key Pair
3,448,267 UART: [art] Store priv key in slot 0x5
3,461,516 UART: [art] Derive Key Pair - Done
3,476,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,546 UART: [art] PUB.X = F79DE16547AA7C96DF9C4F1281A47049A0BFBE729AFA13A58AEFEAE58DC75C70587494CA1068BCAB8F42EE3EC12800E6
3,499,314 UART: [art] PUB.Y = EF28FEDEA52CAE9C0D1CC045480FD76B01A30A35AD5ECF1FBE00A14A76C150585814C15474C4E801421EB41AF0080FA4
3,506,237 UART: [art] SIG.R = 827D347E7666C7D26F801208990719DB604E8BDAF9FECE26B09E4ACCF95287032CBECFFDD3F35DB267D85D8354D8E92A
3,513,012 UART: [art] SIG.S = 43A6471B9C170056EB633609BCE4EAC0AEB78DA7B4B21ABD8A15BB6624DBE1E026F65C43E89249DB2F7690075A54FE5D
3,537,062 UART: Caliptra RT
3,537,313 UART: [state] CFI Enabled
3,657,556 UART: [rt] RT listening for mailbox commands...
3,658,226 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,112 UART: [rt]cmd =0x44504543, len=24
3,715,660 >>> mbox cmd response data (40 bytes)
3,715,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,696 UART: [rt]cmd =0x44504543, len=96
3,752,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,435 ready_for_fw is high
1,362,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,044 >>> mbox cmd response: success
3,041,069 UART:
3,041,085 UART: Running Caliptra FMC ...
3,041,493 UART:
3,041,547 UART: [state] CFI Enabled
3,051,979 UART: [fht] FMC Alias Private Key: 7
3,171,233 UART: [art] Extend RT PCRs Done
3,171,661 UART: [art] Lock RT PCRs Done
3,173,139 UART: [art] Populate DV Done
3,181,426 UART: [fht] FMC Alias Private Key: 7
3,182,464 UART: [art] Derive CDI
3,182,744 UART: [art] Store in slot 0x4
3,268,608 UART: [art] Derive Key Pair
3,268,968 UART: [art] Store priv key in slot 0x5
3,281,969 UART: [art] Derive Key Pair - Done
3,296,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,317 UART: [art] PUB.X = 88CAE0FFC31C49FDE134E2EA03AEA7C71FA940B887899AE14294CE83D26E2A79FD046037F9A5AA06E706B16F5DFC8DCC
3,320,097 UART: [art] PUB.Y = D7D9CDB673DF20796A9C4BAA2C6532F2F48DEF84466A9B54B9B7016D42A63C4852E892D82BA07B4889267D6F33C02360
3,327,048 UART: [art] SIG.R = E969738102C122A0DD422ECAE4FC6663BACF32BA57FF120EB6E485E1BB1C425CF07FF3DC70D34B69922F255BA663CA3F
3,333,830 UART: [art] SIG.S = B636E33CB5D1E3D6C2134AFFE70BB5E2299899E5B2BE9F0A82EDB71BC736768457A7AC766D46ECB91A5297CDC7293887
3,356,970 UART: Caliptra RT
3,357,221 UART: [state] CFI Enabled
3,476,997 UART: [rt] RT listening for mailbox commands...
3,477,667 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,817 UART: [rt]cmd =0x44504543, len=24
3,535,405 >>> mbox cmd response data (40 bytes)
3,535,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,151 UART: [rt]cmd =0x44504543, len=96
3,572,332 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,613 UART: [state] LifecycleState = Unprovisioned
86,268 UART: [state] DebugLocked = No
86,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,504 UART: [kat] SHA2-256
882,435 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,550 UART: [kat] ++
886,702 UART: [kat] sha1
891,004 UART: [kat] SHA2-256
892,942 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
907,949 UART: [kat] LMS
1,476,145 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,690 UART: [fht] Storing FHT @ 0x50003400
1,480,629 UART: [idev] ++
1,480,797 UART: [idev] CDI.KEYID = 6
1,481,157 UART: [idev] SUBJECT.KEYID = 7
1,481,581 UART: [idev] UDS.KEYID = 0
1,481,926 ready_for_fw is high
1,481,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,345 UART: [idev] Erasing UDS.KEYID = 0
1,505,397 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,119 UART: [idev] --
1,515,300 UART: [ldev] ++
1,515,468 UART: [ldev] CDI.KEYID = 6
1,515,831 UART: [ldev] SUBJECT.KEYID = 5
1,516,257 UART: [ldev] AUTHORITY.KEYID = 7
1,516,720 UART: [ldev] FE.KEYID = 1
1,521,924 UART: [ldev] Erasing FE.KEYID = 1
1,547,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,392 UART: [fwproc] Waiting for Commands...
1,587,183 UART: [fwproc] Received command 0x46574c44
1,587,974 UART: [fwproc] Received Image of size 118548 bytes
2,931,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,236 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,454 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,669 >>> mbox cmd response: success
3,131,863 UART: [afmc] ++
3,132,031 UART: [afmc] CDI.KEYID = 6
3,132,393 UART: [afmc] SUBJECT.KEYID = 7
3,132,818 UART: [afmc] AUTHORITY.KEYID = 5
3,167,395 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,521 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,113 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,796 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,668 UART: [afmc] --
3,210,732 UART: [cold-reset] --
3,211,598 UART: [state] Locking Datavault
3,212,839 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,443 UART: [state] Locking ICCM
3,214,001 UART: [exit] Launching FMC @ 0x40000130
3,219,331 UART:
3,219,347 UART: Running Caliptra FMC ...
3,219,755 UART:
3,219,898 UART: [state] CFI Enabled
3,230,222 UART: [fht] FMC Alias Private Key: 7
3,348,850 UART: [art] Extend RT PCRs Done
3,349,278 UART: [art] Lock RT PCRs Done
3,351,088 UART: [art] Populate DV Done
3,359,235 UART: [fht] FMC Alias Private Key: 7
3,360,327 UART: [art] Derive CDI
3,360,607 UART: [art] Store in slot 0x4
3,446,347 UART: [art] Derive Key Pair
3,446,707 UART: [art] Store priv key in slot 0x5
3,460,298 UART: [art] Derive Key Pair - Done
3,475,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,486 UART: [art] PUB.X = 5E25D3851EFC619BD70D836B32978F0C53FE24E5502E92C1040BC0DE6C9B244AF3FBD307429B348CECC1DA66C65DE0BA
3,498,257 UART: [art] PUB.Y = 8B28C164EE5A59E16C5CC58DC1359472C7ADC64C1941D84F6146078A03933EFB769C793FA11D3DA831B73C7A807D4BA9
3,505,207 UART: [art] SIG.R = 78BBE6A0F41B97C611FDFCEC265B06D0104DD3BAF0D4A6ED8BC58F5BE83D4D3F10D2EABE1077300E4C420235E8705091
3,511,986 UART: [art] SIG.S = 4798DB18B4A9F3608AAA44B22E3B708235899D9FEBA59F1C0D437C1D6AD811BF060A55025130E73C0FBE20515CF44CC1
3,535,381 UART: Caliptra RT
3,535,724 UART: [state] CFI Enabled
3,655,728 UART: [rt] RT listening for mailbox commands...
3,656,398 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,122 UART: [rt]cmd =0x44504543, len=24
3,713,516 >>> mbox cmd response data (40 bytes)
3,713,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,576 UART: [rt]cmd =0x44504543, len=96
3,751,101 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 ready_for_fw is high
1,363,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,561 >>> mbox cmd response: success
3,045,058 UART:
3,045,074 UART: Running Caliptra FMC ...
3,045,482 UART:
3,045,625 UART: [state] CFI Enabled
3,056,467 UART: [fht] FMC Alias Private Key: 7
3,175,191 UART: [art] Extend RT PCRs Done
3,175,619 UART: [art] Lock RT PCRs Done
3,176,935 UART: [art] Populate DV Done
3,185,194 UART: [fht] FMC Alias Private Key: 7
3,186,294 UART: [art] Derive CDI
3,186,574 UART: [art] Store in slot 0x4
3,272,560 UART: [art] Derive Key Pair
3,272,920 UART: [art] Store priv key in slot 0x5
3,286,377 UART: [art] Derive Key Pair - Done
3,301,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,545 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,310 UART: [art] PUB.X = 8C18483971EFAF81F71B7F48D9FF29BE4FC17A93C01ABEFCA77AE2818557EB64F58BD698ABD3F02BD87E3C7BC171FE57
3,324,102 UART: [art] PUB.Y = C6557F2A021FE561F7BA3E79428D8426AE00600DF620FE31B9EB7E458A12A64B05978E7A94B3F1AA2FDC425ABD7F2E22
3,331,033 UART: [art] SIG.R = 537D8AFE691585D566B477006D2DF368901E4B5902176C0CE456A7A5F33ED0B8EB504B33AE0B019B4C10BEF3DBB84EE7
3,337,779 UART: [art] SIG.S = 9E1D91CF32DCD82B5D28E7ECB462D8DEB091A09CC1D56E191ABC3CF61AEA77E1A0EEE9BAF5E5485EE0DD1541BF774B2F
3,361,869 UART: Caliptra RT
3,362,212 UART: [state] CFI Enabled
3,481,909 UART: [rt] RT listening for mailbox commands...
3,482,579 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,453 UART: [rt]cmd =0x44504543, len=24
3,539,857 >>> mbox cmd response data (40 bytes)
3,539,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,719 UART: [rt]cmd =0x44504543, len=96
3,577,224 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
891,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,216 UART: [kat] ++
895,368 UART: [kat] sha1
899,560 UART: [kat] SHA2-256
901,500 UART: [kat] SHA2-384
904,433 UART: [kat] SHA2-512-ACC
906,334 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,274 UART: [cold-reset] ++
1,170,726 UART: [fht] FHT @ 0x50003400
1,173,592 UART: [idev] ++
1,173,760 UART: [idev] CDI.KEYID = 6
1,174,121 UART: [idev] SUBJECT.KEYID = 7
1,174,546 UART: [idev] UDS.KEYID = 0
1,174,892 ready_for_fw is high
1,174,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,875 UART: [idev] Erasing UDS.KEYID = 0
1,199,871 UART: [idev] Sha1 KeyId Algorithm
1,208,733 UART: [idev] --
1,209,666 UART: [ldev] ++
1,209,834 UART: [ldev] CDI.KEYID = 6
1,210,198 UART: [ldev] SUBJECT.KEYID = 5
1,210,625 UART: [ldev] AUTHORITY.KEYID = 7
1,211,088 UART: [ldev] FE.KEYID = 1
1,215,936 UART: [ldev] Erasing FE.KEYID = 1
1,242,621 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,654 UART: [ldev] --
1,282,083 UART: [fwproc] Wait for Commands...
1,282,906 UART: [fwproc] Recv command 0x46574c44
1,283,639 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,926 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,823 >>> mbox cmd response: success
2,827,903 UART: [afmc] ++
2,828,071 UART: [afmc] CDI.KEYID = 6
2,828,434 UART: [afmc] SUBJECT.KEYID = 7
2,828,860 UART: [afmc] AUTHORITY.KEYID = 5
2,864,679 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,222 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,681 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,562 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,263 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,116 UART: [afmc] --
2,908,005 UART: [cold-reset] --
2,908,755 UART: [state] Locking Datavault
2,909,726 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,330 UART: [state] Locking ICCM
2,910,858 UART: [exit] Launching FMC @ 0x40000130
2,916,188 UART:
2,916,204 UART: Running Caliptra FMC ...
2,916,612 UART:
2,916,666 UART: [state] CFI Enabled
2,927,308 UART: [fht] FMC Alias Private Key: 7
3,045,988 UART: [art] Extend RT PCRs Done
3,046,416 UART: [art] Lock RT PCRs Done
3,047,944 UART: [art] Populate DV Done
3,056,233 UART: [fht] FMC Alias Private Key: 7
3,057,277 UART: [art] Derive CDI
3,057,557 UART: [art] Store in slot 0x4
3,143,814 UART: [art] Derive Key Pair
3,144,174 UART: [art] Store priv key in slot 0x5
3,157,384 UART: [art] Derive Key Pair - Done
3,172,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,156 UART: [art] PUB.X = B1649B8633B66F23DB184AB7E228556A8CCB80567C78F69B0CFBBA3A200D677CF30EBBB01116E2F23DE37A1F819049FC
3,194,929 UART: [art] PUB.Y = 211B25C981EE5FA0D1F390587C03475B094CA468712E1C49255814A2281956FA79776BC5F7A2F315662181BCEE3A4711
3,201,865 UART: [art] SIG.R = B9A016DE26989D0632D94042C4EE810FBCB49C56C9383D334D770FD5D342F37FBAB742B693396C1A0BB45B3520805938
3,208,623 UART: [art] SIG.S = 3E3391AB36A50E43C9294AF5E6E5AFD0D5CB958B1827026D90E32E176ABF3FE5C145ACA63DFBE8676B2C90F3F10C1626
3,232,038 UART: Caliptra RT
3,232,289 UART: [state] CFI Enabled
3,352,195 UART: [rt] RT listening for mailbox commands...
3,352,865 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,931 UART: [rt]cmd =0x44504543, len=24
3,410,669 >>> mbox cmd response data (40 bytes)
3,410,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,645 UART: [rt]cmd =0x44504543, len=96
3,448,044 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,840 ready_for_fw is high
1,059,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,474 >>> mbox cmd response: success
2,742,505 UART:
2,742,521 UART: Running Caliptra FMC ...
2,742,929 UART:
2,742,983 UART: [state] CFI Enabled
2,753,643 UART: [fht] FMC Alias Private Key: 7
2,872,471 UART: [art] Extend RT PCRs Done
2,872,899 UART: [art] Lock RT PCRs Done
2,874,425 UART: [art] Populate DV Done
2,882,868 UART: [fht] FMC Alias Private Key: 7
2,883,920 UART: [art] Derive CDI
2,884,200 UART: [art] Store in slot 0x4
2,969,993 UART: [art] Derive Key Pair
2,970,353 UART: [art] Store priv key in slot 0x5
2,983,537 UART: [art] Derive Key Pair - Done
2,998,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,756 UART: [art] PUB.X = 22EAA81027F7A355485ACB9C13EC904A617E2FAECD05DC72CD98D4450BEAC730DDAE35092B0552DA2047206815D4A6D9
3,021,526 UART: [art] PUB.Y = 848165638AEECFD5F7F308CCC61EEEF417FA09BF8530A2D6587C07C9A01425828782FC9CEA3F735D6C38351680F3AA5C
3,028,477 UART: [art] SIG.R = 6F9105A4DBAFCC9EBD0E12D1D66BDB24CDEDD3154186F6669A56AAE7E5B149C9F9C0D548C59138D5394295DFB66B41B7
3,035,259 UART: [art] SIG.S = 0954AB8FC27916C78F7D08880BA212CBB14079E83CD660781C332D802B8458FE4C6142E74F148AA1D48CC5CC20AC135F
3,059,246 UART: Caliptra RT
3,059,497 UART: [state] CFI Enabled
3,179,350 UART: [rt] RT listening for mailbox commands...
3,180,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,242 UART: [rt]cmd =0x44504543, len=24
3,237,470 >>> mbox cmd response data (40 bytes)
3,237,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,404 UART: [rt]cmd =0x44504543, len=96
3,274,709 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,745 UART: [kat] SHA2-256
891,295 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,399 UART: [kat] ++
895,551 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,500 UART: [kat] SHA2-512-ACC
906,401 UART: [kat] ECC-384
916,070 UART: [kat] HMAC-384Kdf
920,868 UART: [kat] LMS
1,169,180 UART: [kat] --
1,170,223 UART: [cold-reset] ++
1,170,635 UART: [fht] FHT @ 0x50003400
1,173,249 UART: [idev] ++
1,173,417 UART: [idev] CDI.KEYID = 6
1,173,778 UART: [idev] SUBJECT.KEYID = 7
1,174,203 UART: [idev] UDS.KEYID = 0
1,174,549 ready_for_fw is high
1,174,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,376 UART: [idev] Erasing UDS.KEYID = 0
1,199,522 UART: [idev] Sha1 KeyId Algorithm
1,208,350 UART: [idev] --
1,209,393 UART: [ldev] ++
1,209,561 UART: [ldev] CDI.KEYID = 6
1,209,925 UART: [ldev] SUBJECT.KEYID = 5
1,210,352 UART: [ldev] AUTHORITY.KEYID = 7
1,210,815 UART: [ldev] FE.KEYID = 1
1,215,955 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,259 UART: [ldev] --
1,282,642 UART: [fwproc] Wait for Commands...
1,283,431 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,630 >>> mbox cmd response: success
2,828,838 UART: [afmc] ++
2,829,006 UART: [afmc] CDI.KEYID = 6
2,829,369 UART: [afmc] SUBJECT.KEYID = 7
2,829,795 UART: [afmc] AUTHORITY.KEYID = 5
2,865,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,634 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,515 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,113 UART: [afmc] --
2,909,162 UART: [cold-reset] --
2,910,210 UART: [state] Locking Datavault
2,911,065 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,669 UART: [state] Locking ICCM
2,912,243 UART: [exit] Launching FMC @ 0x40000130
2,917,573 UART:
2,917,589 UART: Running Caliptra FMC ...
2,917,997 UART:
2,918,140 UART: [state] CFI Enabled
2,928,420 UART: [fht] FMC Alias Private Key: 7
3,047,432 UART: [art] Extend RT PCRs Done
3,047,860 UART: [art] Lock RT PCRs Done
3,049,262 UART: [art] Populate DV Done
3,057,527 UART: [fht] FMC Alias Private Key: 7
3,058,527 UART: [art] Derive CDI
3,058,807 UART: [art] Store in slot 0x4
3,144,644 UART: [art] Derive Key Pair
3,145,004 UART: [art] Store priv key in slot 0x5
3,158,530 UART: [art] Derive Key Pair - Done
3,173,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,698 UART: [art] PUB.X = 649EE64F7DE310A2A6328F965482340B802AFEEAF8E83604789ED849AC85948567930FB9912F5B66CE6CC702F222AEBE
3,196,460 UART: [art] PUB.Y = 397C0C795E50C68CB4BE8B5CCEF821FCF6DDE19DC0EDD2888A4F7E568908A2B943A19BAC878B0EDCB9DF790FC1970E7C
3,203,421 UART: [art] SIG.R = 8109F70EC2165129686EE650E94B1E4F04677E4FE5E684CBE53744C2018410C23370F1C6764C5790CA6EEF68814BBBAE
3,210,179 UART: [art] SIG.S = F5E1C9E3096F1405E08F82F32A825C643A0C1D95A379F0D943C5466CDEBB0D55AB8FEF41B48AE3F9FCEEE877F868E689
3,234,429 UART: Caliptra RT
3,234,772 UART: [state] CFI Enabled
3,354,775 UART: [rt] RT listening for mailbox commands...
3,355,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,265 UART: [rt]cmd =0x44504543, len=24
3,412,481 >>> mbox cmd response data (40 bytes)
3,412,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,229 UART: [rt]cmd =0x44504543, len=96
3,449,482 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,361 ready_for_fw is high
1,060,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,695 >>> mbox cmd response: success
2,744,070 UART:
2,744,086 UART: Running Caliptra FMC ...
2,744,494 UART:
2,744,637 UART: [state] CFI Enabled
2,755,277 UART: [fht] FMC Alias Private Key: 7
2,874,087 UART: [art] Extend RT PCRs Done
2,874,515 UART: [art] Lock RT PCRs Done
2,876,165 UART: [art] Populate DV Done
2,884,390 UART: [fht] FMC Alias Private Key: 7
2,885,552 UART: [art] Derive CDI
2,885,832 UART: [art] Store in slot 0x4
2,971,839 UART: [art] Derive Key Pair
2,972,199 UART: [art] Store priv key in slot 0x5
2,985,525 UART: [art] Derive Key Pair - Done
3,000,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,735 UART: [art] PUB.X = D9866CBA5F0D7650CC778820823E1857B1395028EEE838E4359D9C69964B21308368DFA325F34A6F7A181F623E1271AB
3,023,496 UART: [art] PUB.Y = F59FC45CF0F2056CA34233D479FA700FDA4D6B9300A1EDB7E0405B30AB8F01F5639B65B041DBE0B83E65F2F043FE2D9F
3,030,431 UART: [art] SIG.R = C8391B7DD195EA4182FA4301B02E7A43F26A2350797EDB112967DF0E56C1BFB2AF7BA307015AC7646BCDC97FE3B74FD6
3,037,203 UART: [art] SIG.S = 49D4396DCB1215F0A7AC1D553EAAC0588CC00865BF1B0CCCFF3E35EE40EE4D9886D8FDB81B594E5BFE805E65A2C23333
3,060,963 UART: Caliptra RT
3,061,306 UART: [state] CFI Enabled
3,181,370 UART: [rt] RT listening for mailbox commands...
3,182,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,786 UART: [rt]cmd =0x44504543, len=24
3,239,200 >>> mbox cmd response data (40 bytes)
3,239,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,082 UART: [rt]cmd =0x44504543, len=96
3,276,487 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,583 UART: [state] WD Timer not started. Device not locked for debugging
87,824 UART: [kat] SHA2-256
893,474 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,599 UART: [kat] ++
897,751 UART: [kat] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,720 UART: [kat] SHA2-512-ACC
908,621 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,604 UART: [kat] LMS
1,170,932 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,251 UART: [fht] FHT @ 0x50003400
1,174,812 UART: [idev] ++
1,174,980 UART: [idev] CDI.KEYID = 6
1,175,340 UART: [idev] SUBJECT.KEYID = 7
1,175,764 UART: [idev] UDS.KEYID = 0
1,176,109 ready_for_fw is high
1,176,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,139 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,786 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,314 UART: [fwproc] Recv command 0x46574c44
1,284,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,093 >>> mbox cmd response: success
2,828,347 UART: [afmc] ++
2,828,515 UART: [afmc] CDI.KEYID = 6
2,828,877 UART: [afmc] SUBJECT.KEYID = 7
2,829,302 UART: [afmc] AUTHORITY.KEYID = 5
2,864,671 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,954 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,663 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,247 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,071 UART: [afmc] --
2,908,107 UART: [cold-reset] --
2,908,829 UART: [state] Locking Datavault
2,910,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,774 UART: [state] Locking ICCM
2,911,362 UART: [exit] Launching FMC @ 0x40000130
2,916,692 UART:
2,916,708 UART: Running Caliptra FMC ...
2,917,116 UART:
2,917,170 UART: [state] CFI Enabled
2,927,662 UART: [fht] FMC Alias Private Key: 7
3,047,008 UART: [art] Extend RT PCRs Done
3,047,436 UART: [art] Lock RT PCRs Done
3,048,926 UART: [art] Populate DV Done
3,057,061 UART: [fht] FMC Alias Private Key: 7
3,058,039 UART: [art] Derive CDI
3,058,319 UART: [art] Store in slot 0x4
3,144,052 UART: [art] Derive Key Pair
3,144,412 UART: [art] Store priv key in slot 0x5
3,157,404 UART: [art] Derive Key Pair - Done
3,172,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,411 UART: [art] PUB.X = FC653D2D6C1254154B5BC9FFF64AF2C0389DB3EF27D832D42E9873B77E6941D2256036059CCED65FF067A3F4832F7DC9
3,195,186 UART: [art] PUB.Y = F44C9862DEA675985410D6E7B3D726C77E6A99421D32377D736840C014BEF34A5C445D65800E005E19F7D911A1FAEEF3
3,202,111 UART: [art] SIG.R = C4350E1A006FAB858D437F96A3754CF9D99F9A920A0366F0E949F5F701E7B4DA384B951E612C03806E15DA53F5E07B4A
3,208,848 UART: [art] SIG.S = 8EA36B0B9A20B1A3D31543C0CB489F0983BBB8318D87D06717A82C29F522C3699C779328AA4F9D7509B5ACE709059408
3,232,204 UART: Caliptra RT
3,232,455 UART: [state] CFI Enabled
3,352,342 UART: [rt] RT listening for mailbox commands...
3,353,012 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,038 UART: [rt]cmd =0x44504543, len=24
3,410,344 >>> mbox cmd response data (40 bytes)
3,410,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,328 UART: [rt]cmd =0x44504543, len=96
3,447,653 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,179 ready_for_fw is high
1,060,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,631 >>> mbox cmd response: success
2,741,922 UART:
2,741,938 UART: Running Caliptra FMC ...
2,742,346 UART:
2,742,400 UART: [state] CFI Enabled
2,752,778 UART: [fht] FMC Alias Private Key: 7
2,871,752 UART: [art] Extend RT PCRs Done
2,872,180 UART: [art] Lock RT PCRs Done
2,873,738 UART: [art] Populate DV Done
2,881,701 UART: [fht] FMC Alias Private Key: 7
2,882,773 UART: [art] Derive CDI
2,883,053 UART: [art] Store in slot 0x4
2,968,848 UART: [art] Derive Key Pair
2,969,208 UART: [art] Store priv key in slot 0x5
2,981,940 UART: [art] Derive Key Pair - Done
2,996,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,307 UART: [art] PUB.X = 6914E58DE3C9B9E4B4C3BBB581ABE57371C7A6F5713B8117C1CA2060D0D540F3D29A81D9E4DABD86ED73A4BF34954830
3,019,089 UART: [art] PUB.Y = 48B2DA08783EA72C6814169D6375A98B618AD5ECEFCED2F34670A89CBB63FEF93C3B345B4F2DD8FDD52CB06669B65BED
3,026,056 UART: [art] SIG.R = B938F9AE5FE64A5AF685CBD1C4359D3AA638CDFB32AA1B084163461ED5C0B42409B4A0308E66D42B9D2ED1F67C07C5A6
3,032,833 UART: [art] SIG.S = DA961FB6140D96FA515A2B17569B6045DB7EA7EB212ABB4A7FF3261DBA4B7168F2C9D8B5A2B3F337205EFBA22981CE53
3,057,130 UART: Caliptra RT
3,057,381 UART: [state] CFI Enabled
3,177,636 UART: [rt] RT listening for mailbox commands...
3,178,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,610 UART: [rt]cmd =0x44504543, len=24
3,236,548 >>> mbox cmd response data (40 bytes)
3,236,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,582 UART: [rt]cmd =0x44504543, len=96
3,274,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,688 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
893,451 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,576 UART: [kat] ++
897,728 UART: [kat] sha1
901,906 UART: [kat] SHA2-256
903,846 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
917,979 UART: [kat] HMAC-384Kdf
922,541 UART: [kat] LMS
1,170,869 UART: [kat] --
1,171,652 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,581 UART: [idev] ++
1,174,749 UART: [idev] CDI.KEYID = 6
1,175,109 UART: [idev] SUBJECT.KEYID = 7
1,175,533 UART: [idev] UDS.KEYID = 0
1,175,878 ready_for_fw is high
1,175,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,693 UART: [idev] Erasing UDS.KEYID = 0
1,201,356 UART: [idev] Sha1 KeyId Algorithm
1,209,906 UART: [idev] --
1,210,946 UART: [ldev] ++
1,211,114 UART: [ldev] CDI.KEYID = 6
1,211,477 UART: [ldev] SUBJECT.KEYID = 5
1,211,903 UART: [ldev] AUTHORITY.KEYID = 7
1,212,366 UART: [ldev] FE.KEYID = 1
1,217,448 UART: [ldev] Erasing FE.KEYID = 1
1,244,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,688 UART: [ldev] --
1,284,061 UART: [fwproc] Wait for Commands...
1,284,641 UART: [fwproc] Recv command 0x46574c44
1,285,369 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,240 >>> mbox cmd response: success
2,830,280 UART: [afmc] ++
2,830,448 UART: [afmc] CDI.KEYID = 6
2,830,810 UART: [afmc] SUBJECT.KEYID = 7
2,831,235 UART: [afmc] AUTHORITY.KEYID = 5
2,867,370 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,157 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,905 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,497 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,198 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,142 UART: [afmc] --
2,911,040 UART: [cold-reset] --
2,911,874 UART: [state] Locking Datavault
2,913,185 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,789 UART: [state] Locking ICCM
2,914,309 UART: [exit] Launching FMC @ 0x40000130
2,919,639 UART:
2,919,655 UART: Running Caliptra FMC ...
2,920,063 UART:
2,920,206 UART: [state] CFI Enabled
2,930,662 UART: [fht] FMC Alias Private Key: 7
3,050,244 UART: [art] Extend RT PCRs Done
3,050,672 UART: [art] Lock RT PCRs Done
3,052,518 UART: [art] Populate DV Done
3,060,619 UART: [fht] FMC Alias Private Key: 7
3,061,709 UART: [art] Derive CDI
3,061,989 UART: [art] Store in slot 0x4
3,147,604 UART: [art] Derive Key Pair
3,147,964 UART: [art] Store priv key in slot 0x5
3,161,308 UART: [art] Derive Key Pair - Done
3,176,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,760 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,525 UART: [art] PUB.X = 2CA8DBC3FF430190AEDCCEEF5EB0DACE960D3570D8B00EDD0FA06DB060A5BB853B916A944C8FDADF14D858A6E56E6762
3,199,313 UART: [art] PUB.Y = 267DFCAE8EABB3D263E5E19379723E7F94CEB7D3379DC57C8A0B9FE26B58132C3E83E20F79AB4E192FC3B24798518787
3,206,267 UART: [art] SIG.R = D53EABDE66AFD52D020C9D3548E03513761AF2329E29D4C091C8FE0486D1CDB20EC57B50D94BF9378F6BFD1519B0A6DC
3,213,041 UART: [art] SIG.S = 7AB7F11E70DCC6E8DA74BEA9B73A641EAFB78A9958DF706305E010097F0916FA7E3C5CBE253F03D430D486272A7DC0F4
3,236,531 UART: Caliptra RT
3,236,874 UART: [state] CFI Enabled
3,356,052 UART: [rt] RT listening for mailbox commands...
3,356,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,938 UART: [rt]cmd =0x44504543, len=24
3,414,288 >>> mbox cmd response data (40 bytes)
3,414,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,404 UART: [rt]cmd =0x44504543, len=96
3,451,263 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,872 ready_for_fw is high
1,060,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,517 >>> mbox cmd response: success
2,742,194 UART:
2,742,210 UART: Running Caliptra FMC ...
2,742,618 UART:
2,742,761 UART: [state] CFI Enabled
2,753,175 UART: [fht] FMC Alias Private Key: 7
2,871,737 UART: [art] Extend RT PCRs Done
2,872,165 UART: [art] Lock RT PCRs Done
2,873,595 UART: [art] Populate DV Done
2,882,112 UART: [fht] FMC Alias Private Key: 7
2,883,140 UART: [art] Derive CDI
2,883,420 UART: [art] Store in slot 0x4
2,969,621 UART: [art] Derive Key Pair
2,969,981 UART: [art] Store priv key in slot 0x5
2,983,087 UART: [art] Derive Key Pair - Done
2,997,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,869 UART: [art] PUB.X = F063024DB6A61932B1D4CB06FCE349F93704D6A77CB6ACFE85990280C40365C3F346F978915FB7B0785DB2A6B3C11E21
3,020,628 UART: [art] PUB.Y = EE803502E50B72BD668BC4903A5FB50A10F19B59D6DD4886A1F2F59D25186495F4C35C8E25FED6188C16AB465968025F
3,027,568 UART: [art] SIG.R = 298A46B5380D7A5AEAE93CBE97FCA3476D23E0A59177B4735B93739738F64E0DBC84C7B529B1725CFC52996ACB889E08
3,034,335 UART: [art] SIG.S = 494BADD466C98B12EF581E6135062E6081AD5965733CC535FF04A47C28940591454B9FC42F4BE107D302425AE8EFC0CD
3,057,610 UART: Caliptra RT
3,057,953 UART: [state] CFI Enabled
3,177,888 UART: [rt] RT listening for mailbox commands...
3,178,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,750 UART: [rt]cmd =0x44504543, len=24
3,237,228 >>> mbox cmd response data (40 bytes)
3,237,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,078 UART: [rt]cmd =0x44504543, len=96
3,274,283 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_derive_context_cannot_be_called_from_pl1_if_changes_locality_to_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
193,015 UART:
193,393 UART: Running Caliptra ROM ...
194,496 UART:
194,641 UART: [state] CFI Enabled
267,101 UART: [state] LifecycleState = Unprovisioned
269,023 UART: [state] DebugLocked = No
271,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,512 UART: [kat] SHA2-256
446,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,734 UART: [kat] ++
457,289 UART: [kat] sha1
469,489 UART: [kat] SHA2-256
472,150 UART: [kat] SHA2-384
478,215 UART: [kat] SHA2-512-ACC
480,582 UART: [kat] ECC-384
2,766,463 UART: [kat] HMAC-384Kdf
2,777,561 UART: [kat] LMS
3,967,847 UART: [kat] --
3,973,873 UART: [cold-reset] ++
3,976,017 UART: [fht] Storing FHT @ 0x50003400
3,988,561 UART: [idev] ++
3,989,120 UART: [idev] CDI.KEYID = 6
3,990,114 UART: [idev] SUBJECT.KEYID = 7
3,991,357 UART: [idev] UDS.KEYID = 0
3,992,427 ready_for_fw is high
3,992,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,816 UART: [idev] Erasing UDS.KEYID = 0
7,325,676 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,758 UART: [idev] --
7,351,540 UART: [ldev] ++
7,352,107 UART: [ldev] CDI.KEYID = 6
7,353,125 UART: [ldev] SUBJECT.KEYID = 5
7,354,287 UART: [ldev] AUTHORITY.KEYID = 7
7,355,513 UART: [ldev] FE.KEYID = 1
7,404,182 UART: [ldev] Erasing FE.KEYID = 1
10,736,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,697 UART: [ldev] --
13,119,247 UART: [fwproc] Waiting for Commands...
13,121,882 UART: [fwproc] Received command 0x46574c44
13,124,108 UART: [fwproc] Received Image of size 118548 bytes
17,238,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,622 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,816 >>> mbox cmd response: success
17,717,615 UART: [afmc] ++
17,718,230 UART: [afmc] CDI.KEYID = 6
17,719,142 UART: [afmc] SUBJECT.KEYID = 7
17,720,354 UART: [afmc] AUTHORITY.KEYID = 5
21,074,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,016 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,281 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,704 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,424 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,888 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,961 UART: [afmc] --
23,444,342 UART: [cold-reset] --
23,448,241 UART: [state] Locking Datavault
23,453,553 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,309 UART: [state] Locking ICCM
23,457,189 UART: [exit] Launching FMC @ 0x40000130
23,465,585 UART:
23,465,818 UART: Running Caliptra FMC ...
23,466,915 UART:
23,467,075 UART: [state] CFI Enabled
23,534,643 UART: [fht] FMC Alias Private Key: 7
25,874,560 UART: [art] Extend RT PCRs Done
25,875,781 UART: [art] Lock RT PCRs Done
25,877,512 UART: [art] Populate DV Done
25,882,918 UART: [fht] FMC Alias Private Key: 7
25,884,471 UART: [art] Derive CDI
25,885,285 UART: [art] Store in slot 0x4
25,942,812 UART: [art] Derive Key Pair
25,943,849 UART: [art] Store priv key in slot 0x5
29,235,929 UART: [art] Derive Key Pair - Done
29,249,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,388 UART: [art] PUB.X = EB4660A68F0193E0ED11B8DF6B003AA2A05364B6E421A11C00D238AA69C16B73EFDF153033F5A772F0D424F332D73BE4
31,545,636 UART: [art] PUB.Y = AA98DAFB15AF0246135CF373BD9795C6B630AFC8AF4212741263AECD9FACBE5BC3E9DAA63714F30E14B886629C37CEF6
31,552,921 UART: [art] SIG.R = C87192EF7B4C74C2A318F19F11FA14B4FC2C0D44D0C1B843C3E9E26B4BB0B3BBFDF271EBCD975712C7D6535DEA62C7BF
31,560,360 UART: [art] SIG.S = E4DEDBC1C16A3895892F8F9F1E711CC4DD9BC4C5C1175A03C14B7DF6859D8B161CB37A42D0409E3CE6D4E2EA1C9D43BB
32,865,526 UART: Caliptra RT
32,866,234 UART: [state] CFI Enabled
33,061,843 UART: [rt] RT listening for mailbox commands...
33,063,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,094,627 UART: [rt]cmd =0x44504543, len=96
33,100,997 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,805,609 ready_for_fw is high
3,806,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,968,604 >>> mbox cmd response: success
23,653,034 UART:
23,653,452 UART: Running Caliptra FMC ...
23,654,567 UART:
23,654,719 UART: [state] CFI Enabled
23,721,708 UART: [fht] FMC Alias Private Key: 7
26,061,733 UART: [art] Extend RT PCRs Done
26,063,087 UART: [art] Lock RT PCRs Done
26,064,427 UART: [art] Populate DV Done
26,069,788 UART: [fht] FMC Alias Private Key: 7
26,071,442 UART: [art] Derive CDI
26,072,182 UART: [art] Store in slot 0x4
26,129,491 UART: [art] Derive Key Pair
26,130,493 UART: [art] Store priv key in slot 0x5
29,422,851 UART: [art] Derive Key Pair - Done
29,436,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,093 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,602 UART: [art] PUB.X = 83802C7653C8139F2FD03256A89A1B0235732F0DF5E7A003A92498B2A7D08E7358F81B866ACE2D256E156BF2323BCD65
31,732,870 UART: [art] PUB.Y = 6F370BCCAD45904A4DA8F63DBA32A9DED0DBFD484D0CF20D80EAB7E6DAD79025E5357E4C5E9E53A3251282977CC1A6DF
31,740,158 UART: [art] SIG.R = 4D2707C6D9DE381837E2684F9E12DC4EEE12B6B699E2CA6791121EBECFC74D840869BCBB24AE0C697B0D4D36375798BB
31,747,595 UART: [art] SIG.S = 96B9C77D725389EDC09073982ABBD7E9BD7801514C8587F66081A10E8CF437C82AEE8215AC072C7A061B36D954119D96
33,053,187 UART: Caliptra RT
33,053,902 UART: [state] CFI Enabled
33,227,871 UART: [rt] RT listening for mailbox commands...
33,229,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,260,328 UART: [rt]cmd =0x44504543, len=96
33,267,170 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
192,463 UART:
192,828 UART: Running Caliptra ROM ...
194,009 UART:
603,796 UART: [state] CFI Enabled
618,749 UART: [state] LifecycleState = Unprovisioned
620,695 UART: [state] DebugLocked = No
622,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,844 UART: [kat] SHA2-256
797,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,167 UART: [kat] ++
808,613 UART: [kat] sha1
819,718 UART: [kat] SHA2-256
822,436 UART: [kat] SHA2-384
828,630 UART: [kat] SHA2-512-ACC
830,989 UART: [kat] ECC-384
3,115,514 UART: [kat] HMAC-384Kdf
3,127,824 UART: [kat] LMS
4,317,878 UART: [kat] --
4,321,443 UART: [cold-reset] ++
4,323,648 UART: [fht] Storing FHT @ 0x50003400
4,334,842 UART: [idev] ++
4,335,400 UART: [idev] CDI.KEYID = 6
4,336,307 UART: [idev] SUBJECT.KEYID = 7
4,337,542 UART: [idev] UDS.KEYID = 0
4,338,521 ready_for_fw is high
4,338,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,626 UART: [idev] Erasing UDS.KEYID = 0
7,621,286 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,089 UART: [idev] --
7,646,740 UART: [ldev] ++
7,647,364 UART: [ldev] CDI.KEYID = 6
7,648,241 UART: [ldev] SUBJECT.KEYID = 5
7,649,500 UART: [ldev] AUTHORITY.KEYID = 7
7,650,781 UART: [ldev] FE.KEYID = 1
7,663,126 UART: [ldev] Erasing FE.KEYID = 1
10,955,021 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,958 UART: [ldev] --
13,316,171 UART: [fwproc] Waiting for Commands...
13,319,488 UART: [fwproc] Received command 0x46574c44
13,321,697 UART: [fwproc] Received Image of size 118548 bytes
17,425,899 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,965 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,079 >>> mbox cmd response: success
17,907,782 UART: [afmc] ++
17,908,399 UART: [afmc] CDI.KEYID = 6
17,909,309 UART: [afmc] SUBJECT.KEYID = 7
17,910,575 UART: [afmc] AUTHORITY.KEYID = 5
21,225,268 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,851 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,530 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,301 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,727 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,990 UART: [afmc] --
23,589,168 UART: [cold-reset] --
23,591,892 UART: [state] Locking Datavault
23,596,431 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,133 UART: [state] Locking ICCM
23,599,252 UART: [exit] Launching FMC @ 0x40000130
23,607,696 UART:
23,607,926 UART: Running Caliptra FMC ...
23,609,021 UART:
23,609,176 UART: [state] CFI Enabled
23,617,432 UART: [fht] FMC Alias Private Key: 7
25,957,701 UART: [art] Extend RT PCRs Done
25,958,923 UART: [art] Lock RT PCRs Done
25,960,443 UART: [art] Populate DV Done
25,966,005 UART: [fht] FMC Alias Private Key: 7
25,967,556 UART: [art] Derive CDI
25,968,367 UART: [art] Store in slot 0x4
26,011,030 UART: [art] Derive Key Pair
26,012,032 UART: [art] Store priv key in slot 0x5
29,254,615 UART: [art] Derive Key Pair - Done
29,267,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,184 UART: [art] PUB.X = FB2DE94731D1E4B8E70472CAD11EC15C22AD7513AFCAF59922BBFFEEB13C1F0E8B63898F71306F5FE66838F88806D61C
31,556,494 UART: [art] PUB.Y = A321F7F7A4249ECFDB10BBF7CB2A1389F13AC377EAEC0E48D23C037FA7A11BDD363E270A8D4DA823BF29762751113DF3
31,563,732 UART: [art] SIG.R = 4D59F3737BCC7B7E867B613B99B69E9ECBBC448A0FD0FD79BFED9192AEB6864A6A5A05D25CFB6816C7F013E9CA26EC6A
31,571,179 UART: [art] SIG.S = 9B636F6EB226132CB0C0CFB4EDC67A9EE91B5CA4C8A283334D899C5D6F269D63A5F340B7CF61F78B1137F4AD558A164F
32,876,949 UART: Caliptra RT
32,877,664 UART: [state] CFI Enabled
33,011,850 UART: [rt] RT listening for mailbox commands...
33,013,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,044,149 UART: [rt]cmd =0x44504543, len=96
33,050,830 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,129,376 ready_for_fw is high
4,129,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,789 >>> mbox cmd response: success
23,803,139 UART:
23,803,537 UART: Running Caliptra FMC ...
23,804,730 UART:
23,804,901 UART: [state] CFI Enabled
23,812,885 UART: [fht] FMC Alias Private Key: 7
26,152,668 UART: [art] Extend RT PCRs Done
26,153,900 UART: [art] Lock RT PCRs Done
26,155,582 UART: [art] Populate DV Done
26,161,214 UART: [fht] FMC Alias Private Key: 7
26,162,751 UART: [art] Derive CDI
26,163,562 UART: [art] Store in slot 0x4
26,206,377 UART: [art] Derive Key Pair
26,207,413 UART: [art] Store priv key in slot 0x5
29,449,562 UART: [art] Derive Key Pair - Done
29,462,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,019 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,522 UART: [art] PUB.X = 5014A9A6E3049F246E97E6A1B9321F788AE1102487B99D4E9466A1EC01BDFA91294FE9A0F1EA96E9E1A640C3AEE90D0E
31,750,834 UART: [art] PUB.Y = 13FCDF90C08187D5D7CD1CEAA9B881A9F1DC0C964EADC4F13CD8568A927B2D22A046EDF5E5C29F6F246100214698EE11
31,758,085 UART: [art] SIG.R = 16129652506EF1E467AD57AA6868F75BD5BFD7479023B8864040E2CB73B3476FC284D4619E3EBE970783228410625861
31,765,424 UART: [art] SIG.S = CA30F2FE663FBE17A10381873F9A7CB3B1C6DB9D53336F44FC9E7AF058AB6BAF3F648877ECEC3B2681AD09A4248E3D40
33,069,970 UART: Caliptra RT
33,070,686 UART: [state] CFI Enabled
33,202,820 UART: [rt] RT listening for mailbox commands...
33,204,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,235,339 UART: [rt]cmd =0x44504543, len=96
33,241,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,126 UART:
192,488 UART: Running Caliptra ROM ...
193,584 UART:
193,728 UART: [state] CFI Enabled
265,797 UART: [state] LifecycleState = Unprovisioned
267,780 UART: [state] DebugLocked = No
269,597 UART: [state] WD Timer not started. Device not locked for debugging
272,778 UART: [kat] SHA2-256
452,411 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,231 UART: [kat] ++
463,683 UART: [kat] sha1
474,053 UART: [kat] SHA2-256
476,705 UART: [kat] SHA2-384
483,685 UART: [kat] SHA2-512-ACC
486,043 UART: [kat] ECC-384
2,948,585 UART: [kat] HMAC-384Kdf
2,972,183 UART: [kat] LMS
3,448,649 UART: [kat] --
3,452,712 UART: [cold-reset] ++
3,455,272 UART: [fht] FHT @ 0x50003400
3,465,461 UART: [idev] ++
3,466,026 UART: [idev] CDI.KEYID = 6
3,466,982 UART: [idev] SUBJECT.KEYID = 7
3,468,219 UART: [idev] UDS.KEYID = 0
3,469,136 ready_for_fw is high
3,469,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,379 UART: [idev] Erasing UDS.KEYID = 0
5,988,295 UART: [idev] Sha1 KeyId Algorithm
6,012,256 UART: [idev] --
6,018,526 UART: [ldev] ++
6,019,096 UART: [ldev] CDI.KEYID = 6
6,020,017 UART: [ldev] SUBJECT.KEYID = 5
6,021,233 UART: [ldev] AUTHORITY.KEYID = 7
6,022,522 UART: [ldev] FE.KEYID = 1
6,059,124 UART: [ldev] Erasing FE.KEYID = 1
8,567,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,687 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,169 UART: [ldev] --
10,377,313 UART: [fwproc] Wait for Commands...
10,379,402 UART: [fwproc] Recv command 0x46574c44
10,381,434 UART: [fwproc] Recv'd Img size: 118548 bytes
13,868,765 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,066 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,858 >>> mbox cmd response: success
14,352,528 UART: [afmc] ++
14,353,152 UART: [afmc] CDI.KEYID = 6
14,354,065 UART: [afmc] SUBJECT.KEYID = 7
14,355,282 UART: [afmc] AUTHORITY.KEYID = 5
16,896,676 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,700 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,491 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,552 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,042 UART: [afmc] --
18,715,478 UART: [cold-reset] --
18,718,038 UART: [state] Locking Datavault
18,723,493 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,183 UART: [state] Locking ICCM
18,727,435 UART: [exit] Launching FMC @ 0x40000130
18,735,824 UART:
18,736,059 UART: Running Caliptra FMC ...
18,737,162 UART:
18,737,323 UART: [state] CFI Enabled
18,797,084 UART: [fht] FMC Alias Private Key: 7
20,584,768 UART: [art] Extend RT PCRs Done
20,586,017 UART: [art] Lock RT PCRs Done
20,587,513 UART: [art] Populate DV Done
20,592,953 UART: [fht] FMC Alias Private Key: 7
20,594,434 UART: [art] Derive CDI
20,595,168 UART: [art] Store in slot 0x4
20,650,859 UART: [art] Derive Key Pair
20,651,897 UART: [art] Store priv key in slot 0x5
23,114,591 UART: [art] Derive Key Pair - Done
23,127,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,841,335 UART: [art] Erasing AUTHORITY.KEYID = 7
24,842,852 UART: [art] PUB.X = AED2932AE4D87C2DD753ADDA3A5265D7A64C56FA7867BD2276E138D05DBC05C6F5418C92DF2A5B18CA36947A33F7C0D9
24,850,103 UART: [art] PUB.Y = 976AFABB188BFB037478D5EA85632627CB5093241F1AEAFABCAFF36BD99D32946F2615CF35D6E3865E81A6805023B05A
24,857,396 UART: [art] SIG.R = 84CC33DD6868DCD369F1531BD2B7F36214997B1A1E07A5B5AEFFF0E8C4D1D5AA86D2205B6BA0FB5E26B124A4589DFF68
24,864,785 UART: [art] SIG.S = 6BCC51BCE0640A55E20B14139888312C377738940CDBFB341356B5145AE5978D47098E2F724B5A9BFE45212753D3C1AC
25,843,849 UART: Caliptra RT
25,844,574 UART: [state] CFI Enabled
26,025,199 UART: [rt] RT listening for mailbox commands...
26,027,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,057,811 UART: [rt]cmd =0x44504543, len=96
26,064,536 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,458,775 ready_for_fw is high
3,459,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,162 >>> mbox cmd response: success
18,556,310 UART:
18,556,718 UART: Running Caliptra FMC ...
18,557,846 UART:
18,558,006 UART: [state] CFI Enabled
18,621,464 UART: [fht] FMC Alias Private Key: 7
20,388,565 UART: [art] Extend RT PCRs Done
20,389,786 UART: [art] Lock RT PCRs Done
20,391,523 UART: [art] Populate DV Done
20,397,042 UART: [fht] FMC Alias Private Key: 7
20,398,766 UART: [art] Derive CDI
20,399,582 UART: [art] Store in slot 0x4
20,454,254 UART: [art] Derive Key Pair
20,455,293 UART: [art] Store priv key in slot 0x5
22,917,907 UART: [art] Derive Key Pair - Done
22,931,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,644,216 UART: [art] Erasing AUTHORITY.KEYID = 7
24,645,724 UART: [art] PUB.X = 82DE3850A21F4E022E0F7A101A1BCF9D58A6F3A2E900B0EEF2BCC6F3A856C5003D1A80297B0EAC1A26F45B1255FC1826
24,652,926 UART: [art] PUB.Y = DC4D132A60A97E722995627C3671BFFF8DA2A7065F8A0A2A1927CACC061B3EDB52560C4908A6F60BC9C2BB2DBFA0C5C4
24,660,231 UART: [art] SIG.R = D13806C4B119462565FE2341BE803291455CD059F261B20778F1E59EEAD1D5FF5924C6F58EBB6AC65413996D35AABF37
24,667,572 UART: [art] SIG.S = 2F37E03932DFD2FA96407976DD977C70683C1E8D9A22F024C415AA6A004F36D52862FB64B25DF687E1E9ACDD71FE09A5
25,646,852 UART: Caliptra RT
25,647,571 UART: [state] CFI Enabled
25,827,869 UART: [rt] RT listening for mailbox commands...
25,829,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,860,324 UART: [rt]cmd =0x44504543, len=96
25,866,747 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,428 UART:
192,793 UART: Running Caliptra ROM ...
193,899 UART:
603,798 UART: [state] CFI Enabled
618,765 UART: [state] LifecycleState = Unprovisioned
620,721 UART: [state] DebugLocked = No
621,989 UART: [state] WD Timer not started. Device not locked for debugging
626,592 UART: [kat] SHA2-256
806,265 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,075 UART: [kat] ++
817,561 UART: [kat] sha1
828,462 UART: [kat] SHA2-256
831,152 UART: [kat] SHA2-384
838,284 UART: [kat] SHA2-512-ACC
840,654 UART: [kat] ECC-384
3,283,951 UART: [kat] HMAC-384Kdf
3,297,777 UART: [kat] LMS
3,774,262 UART: [kat] --
3,780,265 UART: [cold-reset] ++
3,782,496 UART: [fht] FHT @ 0x50003400
3,794,074 UART: [idev] ++
3,794,649 UART: [idev] CDI.KEYID = 6
3,795,627 UART: [idev] SUBJECT.KEYID = 7
3,796,888 UART: [idev] UDS.KEYID = 0
3,797,789 ready_for_fw is high
3,798,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,939 UART: [idev] Erasing UDS.KEYID = 0
6,274,925 UART: [idev] Sha1 KeyId Algorithm
6,297,722 UART: [idev] --
6,302,258 UART: [ldev] ++
6,302,830 UART: [ldev] CDI.KEYID = 6
6,303,713 UART: [ldev] SUBJECT.KEYID = 5
6,304,982 UART: [ldev] AUTHORITY.KEYID = 7
6,306,214 UART: [ldev] FE.KEYID = 1
6,319,161 UART: [ldev] Erasing FE.KEYID = 1
8,800,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,536,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,552,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,568,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,939 UART: [ldev] --
10,595,435 UART: [fwproc] Wait for Commands...
10,598,126 UART: [fwproc] Recv command 0x46574c44
10,600,166 UART: [fwproc] Recv'd Img size: 118548 bytes
14,089,610 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,170,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,243,173 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,570,835 >>> mbox cmd response: success
14,574,734 UART: [afmc] ++
14,575,346 UART: [afmc] CDI.KEYID = 6
14,576,230 UART: [afmc] SUBJECT.KEYID = 7
14,577,509 UART: [afmc] AUTHORITY.KEYID = 5
17,078,359 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,803,023 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,867 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,925 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,389 UART: [afmc] --
18,877,465 UART: [cold-reset] --
18,880,191 UART: [state] Locking Datavault
18,883,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,525 UART: [state] Locking ICCM
18,886,654 UART: [exit] Launching FMC @ 0x40000130
18,895,054 UART:
18,895,294 UART: Running Caliptra FMC ...
18,896,406 UART:
18,896,565 UART: [state] CFI Enabled
18,904,780 UART: [fht] FMC Alias Private Key: 7
20,670,267 UART: [art] Extend RT PCRs Done
20,671,509 UART: [art] Lock RT PCRs Done
20,673,541 UART: [art] Populate DV Done
20,678,794 UART: [fht] FMC Alias Private Key: 7
20,680,450 UART: [art] Derive CDI
20,681,191 UART: [art] Store in slot 0x4
20,723,785 UART: [art] Derive Key Pair
20,724,786 UART: [art] Store priv key in slot 0x5
23,151,907 UART: [art] Derive Key Pair - Done
23,164,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,034 UART: [art] Erasing AUTHORITY.KEYID = 7
24,872,542 UART: [art] PUB.X = 95F735D5FFA121220AE19A73EED01410447DDBC35CB60DFCA8634D005DF5ECEFD87BC97649DECB056C2167F9A573B7DC
24,879,850 UART: [art] PUB.Y = E08E3DDFD4FB9C9E0A3A0B310C64A80A80558C54B9099D64AEE571869DF7457BCF720C030E4A6961D184560AE1A360A8
24,887,091 UART: [art] SIG.R = 15A0D8F8F135C67C51B8160B42785C9F07B386EF9BC6C928D6E5F8971F1679D1EFC80953C0E19289BD47CF6C37B228B9
24,894,496 UART: [art] SIG.S = 5E078449E12590D49DF9ABBEA5CF2D7645CE016875A02CEC9F5D5EAC242F7FEA318B722A9B6496E0802AC63CF88C733D
25,873,333 UART: Caliptra RT
25,874,045 UART: [state] CFI Enabled
26,007,118 UART: [rt] RT listening for mailbox commands...
26,009,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,039,639 UART: [rt]cmd =0x44504543, len=96
26,046,464 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,780,750 ready_for_fw is high
3,781,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,640 >>> mbox cmd response: success
18,705,176 UART:
18,705,575 UART: Running Caliptra FMC ...
18,706,730 UART:
18,706,893 UART: [state] CFI Enabled
18,714,517 UART: [fht] FMC Alias Private Key: 7
20,480,155 UART: [art] Extend RT PCRs Done
20,481,381 UART: [art] Lock RT PCRs Done
20,483,068 UART: [art] Populate DV Done
20,488,175 UART: [fht] FMC Alias Private Key: 7
20,489,753 UART: [art] Derive CDI
20,490,601 UART: [art] Store in slot 0x4
20,533,590 UART: [art] Derive Key Pair
20,534,595 UART: [art] Store priv key in slot 0x5
22,961,409 UART: [art] Derive Key Pair - Done
22,974,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,680,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,519 UART: [art] PUB.X = 5EE5AD63243A0CEE7B164263C5BBF10C960541B24D05492938219E92A513B44F6036E0F937735DEB22253C56EA40E9BD
24,688,782 UART: [art] PUB.Y = 9EED0B8A3529F705F6CFC760DB07440CAD9067E2F1160764A61537F7692F8FD2B552E61B17C1B07DE2533B5F7359FB95
24,695,997 UART: [art] SIG.R = 16F08BA1C6290378F7DC374910BE984047FF2A47C92581EA5E67EB2982E2C99C10E4FFBEB8317C08C29F75DDFD8EABF2
24,703,408 UART: [art] SIG.S = 35D59ACA471870F924770005734458F6636D5C4587BDF594A7C012398F00E41706265D84FD1DCC043350DFF0393C9E09
25,682,295 UART: Caliptra RT
25,682,991 UART: [state] CFI Enabled
25,815,936 UART: [rt] RT listening for mailbox commands...
25,817,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,848,393 UART: [rt]cmd =0x44504543, len=96
25,854,998 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
192,064 UART:
192,432 UART: Running Caliptra ROM ...
193,610 UART:
193,762 UART: [state] CFI Enabled
266,103 UART: [state] LifecycleState = Unprovisioned
268,458 UART: [state] DebugLocked = No
269,708 UART: [state] WD Timer not started. Device not locked for debugging
275,095 UART: [kat] SHA2-256
464,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,732 UART: [kat] ++
476,176 UART: [kat] sha1
487,612 UART: [kat] SHA2-256
490,653 UART: [kat] SHA2-384
497,482 UART: [kat] SHA2-512-ACC
500,070 UART: [kat] ECC-384
2,946,083 UART: [kat] HMAC-384Kdf
2,971,625 UART: [kat] LMS
3,503,422 UART: [kat] --
3,506,491 UART: [cold-reset] ++
3,507,566 UART: [fht] FHT @ 0x50003400
3,519,248 UART: [idev] ++
3,519,876 UART: [idev] CDI.KEYID = 6
3,520,855 UART: [idev] SUBJECT.KEYID = 7
3,522,090 UART: [idev] UDS.KEYID = 0
3,523,279 ready_for_fw is high
3,523,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,564 UART: [idev] Erasing UDS.KEYID = 0
6,031,522 UART: [idev] Sha1 KeyId Algorithm
6,055,508 UART: [idev] --
6,059,819 UART: [ldev] ++
6,060,495 UART: [ldev] CDI.KEYID = 6
6,061,426 UART: [ldev] SUBJECT.KEYID = 5
6,062,585 UART: [ldev] AUTHORITY.KEYID = 7
6,063,815 UART: [ldev] FE.KEYID = 1
6,099,806 UART: [ldev] Erasing FE.KEYID = 1
8,604,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,818 UART: [ldev] --
10,411,941 UART: [fwproc] Wait for Commands...
10,414,402 UART: [fwproc] Recv command 0x46574c44
10,416,715 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,729 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,486 >>> mbox cmd response: success
14,684,722 UART: [afmc] ++
14,685,421 UART: [afmc] CDI.KEYID = 6
14,686,659 UART: [afmc] SUBJECT.KEYID = 7
14,688,088 UART: [afmc] AUTHORITY.KEYID = 5
17,211,715 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,449 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,706 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,637 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,455 UART: [afmc] --
19,010,535 UART: [cold-reset] --
19,014,515 UART: [state] Locking Datavault
19,018,855 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,006 UART: [state] Locking ICCM
19,023,081 UART: [exit] Launching FMC @ 0x40000130
19,031,716 UART:
19,031,957 UART: Running Caliptra FMC ...
19,033,058 UART:
19,033,220 UART: [state] CFI Enabled
19,094,457 UART: [fht] FMC Alias Private Key: 7
20,861,312 UART: [art] Extend RT PCRs Done
20,862,535 UART: [art] Lock RT PCRs Done
20,863,832 UART: [art] Populate DV Done
20,869,243 UART: [fht] FMC Alias Private Key: 7
20,870,829 UART: [art] Derive CDI
20,871,640 UART: [art] Store in slot 0x4
20,927,319 UART: [art] Derive Key Pair
20,928,362 UART: [art] Store priv key in slot 0x5
23,391,340 UART: [art] Derive Key Pair - Done
23,404,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,741 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,248 UART: [art] PUB.X = C4E9552E78BCF86950F7FFA53DF658609A14EA3EEFDBE37FA38932B9180A5B56C439C678097D35A5E708996D225A57DD
25,126,507 UART: [art] PUB.Y = E9C99342ECFC4487D1899D871DB433C41FB9EC0E494949675AD677CD54C5060EBE99F520D31FE200877A05F3ACF3CCEC
25,133,779 UART: [art] SIG.R = AA3F628CCE6C58C1BE4C1394A8ED353D18BC5A75D1297A1A231C2D86A9F5415159DC87F490EA5425A843C13E719A2178
25,141,153 UART: [art] SIG.S = D550F1893A9CB40908DE9D356A2C57C936F394607F14A0318F65B074E7007CDD0D73F91D175EF5E9A7BC42D336D47404
26,119,746 UART: Caliptra RT
26,120,465 UART: [state] CFI Enabled
26,300,837 UART: [rt] RT listening for mailbox commands...
26,302,773 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,204 UART: [rt]cmd =0x44504543, len=96
26,340,450 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,436,918 ready_for_fw is high
3,437,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,809 >>> mbox cmd response: success
19,113,452 UART:
19,113,860 UART: Running Caliptra FMC ...
19,115,063 UART:
19,115,240 UART: [state] CFI Enabled
19,182,653 UART: [fht] FMC Alias Private Key: 7
20,948,037 UART: [art] Extend RT PCRs Done
20,949,244 UART: [art] Lock RT PCRs Done
20,950,929 UART: [art] Populate DV Done
20,956,355 UART: [fht] FMC Alias Private Key: 7
20,957,898 UART: [art] Derive CDI
20,958,715 UART: [art] Store in slot 0x4
21,015,542 UART: [art] Derive Key Pair
21,016,590 UART: [art] Store priv key in slot 0x5
23,479,888 UART: [art] Derive Key Pair - Done
23,492,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,312 UART: [art] PUB.X = CFDD59549D5EA4AA1CD12392C1ACFB076724F40E08385217F6A83F931517CEA161E859542F70660AA03C71064E50C3EE
25,214,622 UART: [art] PUB.Y = FC50E3972DCD819922A6698D330AE32D4ED76E8D2CA9D6EA5BCB4B7DEE3CB02F3CB364A25E0F940D3E3D12063B760251
25,221,865 UART: [art] SIG.R = D0C5D3AF569832BA1C36D0BE7AA5F15B4875693DFC7A5159411BE4EC81F6F647AA0ADFF39C255ADF01933C95D5189DA6
25,229,301 UART: [art] SIG.S = 0EB2974DCFA7A81219C96076BFA20AA2FB939DFDC585058689D189BB765CCB69CC1B4A5C10252149AEE440B2FC797E0D
26,208,267 UART: Caliptra RT
26,208,978 UART: [state] CFI Enabled
26,390,413 UART: [rt] RT listening for mailbox commands...
26,392,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,422,978 UART: [rt]cmd =0x44504543, len=96
26,429,645 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
192,492 UART:
192,867 UART: Running Caliptra ROM ...
193,963 UART:
603,684 UART: [state] CFI Enabled
618,014 UART: [state] LifecycleState = Unprovisioned
620,407 UART: [state] DebugLocked = No
622,516 UART: [state] WD Timer not started. Device not locked for debugging
626,993 UART: [kat] SHA2-256
816,892 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,686 UART: [kat] ++
828,144 UART: [kat] sha1
840,230 UART: [kat] SHA2-256
843,257 UART: [kat] SHA2-384
849,892 UART: [kat] SHA2-512-ACC
852,410 UART: [kat] ECC-384
3,292,139 UART: [kat] HMAC-384Kdf
3,304,381 UART: [kat] LMS
3,836,156 UART: [kat] --
3,839,963 UART: [cold-reset] ++
3,841,190 UART: [fht] FHT @ 0x50003400
3,853,026 UART: [idev] ++
3,853,743 UART: [idev] CDI.KEYID = 6
3,854,773 UART: [idev] SUBJECT.KEYID = 7
3,855,876 UART: [idev] UDS.KEYID = 0
3,856,811 ready_for_fw is high
3,857,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,871 UART: [idev] Erasing UDS.KEYID = 0
6,331,051 UART: [idev] Sha1 KeyId Algorithm
6,353,490 UART: [idev] --
6,357,680 UART: [ldev] ++
6,358,370 UART: [ldev] CDI.KEYID = 6
6,359,315 UART: [ldev] SUBJECT.KEYID = 5
6,360,478 UART: [ldev] AUTHORITY.KEYID = 7
6,361,659 UART: [ldev] FE.KEYID = 1
6,374,713 UART: [ldev] Erasing FE.KEYID = 1
8,850,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,158 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,575 UART: [ldev] --
10,642,333 UART: [fwproc] Wait for Commands...
10,645,130 UART: [fwproc] Recv command 0x46574c44
10,647,386 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,406 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,573 >>> mbox cmd response: success
14,913,181 UART: [afmc] ++
14,913,916 UART: [afmc] CDI.KEYID = 6
14,915,114 UART: [afmc] SUBJECT.KEYID = 7
14,916,557 UART: [afmc] AUTHORITY.KEYID = 5
17,417,487 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,210 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,440 UART: [afmc] --
19,214,207 UART: [cold-reset] --
19,217,864 UART: [state] Locking Datavault
19,220,864 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,084 UART: [state] Locking ICCM
19,224,328 UART: [exit] Launching FMC @ 0x40000130
19,233,031 UART:
19,233,316 UART: Running Caliptra FMC ...
19,234,351 UART:
19,234,505 UART: [state] CFI Enabled
19,242,614 UART: [fht] FMC Alias Private Key: 7
21,008,380 UART: [art] Extend RT PCRs Done
21,009,616 UART: [art] Lock RT PCRs Done
21,010,955 UART: [art] Populate DV Done
21,016,381 UART: [fht] FMC Alias Private Key: 7
21,017,990 UART: [art] Derive CDI
21,018,817 UART: [art] Store in slot 0x4
21,062,013 UART: [art] Derive Key Pair
21,063,020 UART: [art] Store priv key in slot 0x5
23,489,437 UART: [art] Derive Key Pair - Done
23,502,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,756 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,263 UART: [art] PUB.X = 015795E765373050A25852FE149BD868AB0FFFE4CEDDA9457E504D341B782C954454309E0CF0F8C8FEB3408EE5AA80D8
25,217,535 UART: [art] PUB.Y = CBF53318912A556796CEF3689C88ECDF21EF5D416A38EBFD1394493556E70BFBFB1941DCEFCC38FB4FD303B2046C54BB
25,224,794 UART: [art] SIG.R = 34FEB464AC4E90C00E6BD6DB519AA5A2BA3F2C8F743F8B89A0D9F3EF7074795A754FD094B4346B1E97BB85789C1B063E
25,232,250 UART: [art] SIG.S = 8ADF7262E783D28ED04C83B7430AB441BB6EDF203B43D378DCB9FB6065DBED7D6BFE15CAC2697765B6DF366ECE2B7550
26,211,595 UART: Caliptra RT
26,212,293 UART: [state] CFI Enabled
26,345,139 UART: [rt] RT listening for mailbox commands...
26,347,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,841 UART: [rt]cmd =0x44504543, len=96
26,384,426 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,750,373 ready_for_fw is high
3,750,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,044 >>> mbox cmd response: success
19,289,997 UART:
19,290,405 UART: Running Caliptra FMC ...
19,291,617 UART:
19,291,794 UART: [state] CFI Enabled
19,299,850 UART: [fht] FMC Alias Private Key: 7
21,065,990 UART: [art] Extend RT PCRs Done
21,067,222 UART: [art] Lock RT PCRs Done
21,069,100 UART: [art] Populate DV Done
21,074,814 UART: [fht] FMC Alias Private Key: 7
21,076,364 UART: [art] Derive CDI
21,077,194 UART: [art] Store in slot 0x4
21,120,122 UART: [art] Derive Key Pair
21,121,130 UART: [art] Store priv key in slot 0x5
23,548,160 UART: [art] Derive Key Pair - Done
23,561,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,267,455 UART: [art] Erasing AUTHORITY.KEYID = 7
25,268,965 UART: [art] PUB.X = 2C4C41E8ACDB08DA103F082C2182B5F76757D05B11AB0AD6CACFF8E82A96D166C02B2C7CC965C103A3437078FFB23AEA
25,276,296 UART: [art] PUB.Y = 4BD9D216E8E3AE31356B7B425E792BFBF69098EFD31B59ED27F5CDB690F376896AD7D1BD11E6153E267E3897B8A294EE
25,283,523 UART: [art] SIG.R = 32C9D11A9B3721B1714061C72EB6A6DF7111E858E3AD4B00EE1F6B2983DFA7AC8446CAE5726A4738289BE4F1FF094B3D
25,290,945 UART: [art] SIG.S = 0347515B7FE1DB2F9755A64A6BBF95AEABAADF04304ACCD4B1F4F83F843433BDC0EB742863A86A48C4FF19796FB1FFEC
26,269,687 UART: Caliptra RT
26,270,396 UART: [state] CFI Enabled
26,403,121 UART: [rt] RT listening for mailbox commands...
26,405,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,435,833 UART: [rt]cmd =0x44504543, len=96
26,442,727 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,803 UART: [kat] SHA2-256
881,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,849 UART: [kat] ++
886,001 UART: [kat] sha1
890,077 UART: [kat] SHA2-256
892,015 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,370 UART: [kat] HMAC-384Kdf
906,926 UART: [kat] LMS
1,475,122 UART: [kat] --
1,476,255 UART: [cold-reset] ++
1,476,667 UART: [fht] Storing FHT @ 0x50003400
1,479,588 UART: [idev] ++
1,479,756 UART: [idev] CDI.KEYID = 6
1,480,116 UART: [idev] SUBJECT.KEYID = 7
1,480,540 UART: [idev] UDS.KEYID = 0
1,480,885 ready_for_fw is high
1,480,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,502 UART: [idev] Erasing UDS.KEYID = 0
1,504,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,576 UART: [idev] --
1,514,715 UART: [ldev] ++
1,514,883 UART: [ldev] CDI.KEYID = 6
1,515,246 UART: [ldev] SUBJECT.KEYID = 5
1,515,672 UART: [ldev] AUTHORITY.KEYID = 7
1,516,135 UART: [ldev] FE.KEYID = 1
1,521,541 UART: [ldev] Erasing FE.KEYID = 1
1,546,596 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,678 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,532 UART: [ldev] --
1,585,875 UART: [fwproc] Waiting for Commands...
1,586,640 UART: [fwproc] Received command 0x46574c44
1,587,431 UART: [fwproc] Received Image of size 118548 bytes
2,932,545 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,719 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,937 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,306 >>> mbox cmd response: success
3,132,450 UART: [afmc] ++
3,132,618 UART: [afmc] CDI.KEYID = 6
3,132,980 UART: [afmc] SUBJECT.KEYID = 7
3,133,405 UART: [afmc] AUTHORITY.KEYID = 5
3,168,344 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,648 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,428 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,137 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,020 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,703 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,747 UART: [afmc] --
3,211,827 UART: [cold-reset] --
3,212,759 UART: [state] Locking Datavault
3,213,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,400 UART: [state] Locking ICCM
3,214,862 UART: [exit] Launching FMC @ 0x40000130
3,220,192 UART:
3,220,208 UART: Running Caliptra FMC ...
3,220,616 UART:
3,220,670 UART: [state] CFI Enabled
3,230,996 UART: [fht] FMC Alias Private Key: 7
3,349,282 UART: [art] Extend RT PCRs Done
3,349,710 UART: [art] Lock RT PCRs Done
3,351,368 UART: [art] Populate DV Done
3,359,501 UART: [fht] FMC Alias Private Key: 7
3,360,513 UART: [art] Derive CDI
3,360,793 UART: [art] Store in slot 0x4
3,446,901 UART: [art] Derive Key Pair
3,447,261 UART: [art] Store priv key in slot 0x5
3,460,208 UART: [art] Derive Key Pair - Done
3,474,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,554 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,319 UART: [art] PUB.X = 0F8EA470787A6ACF744624D2A61A40D0F7004F5150011F951D39607496B6F27F92562AAEAA095110952E371F28142FB9
3,498,050 UART: [art] PUB.Y = 27AF825B2C3EC54F9BB7F1FC3A7A2628F59E7F8C90E954919316B6F476843CA39EF88DA1BD7028BD738C76B37F2181D1
3,505,008 UART: [art] SIG.R = 461CB90D626A70FE8C986857399F89142F56797792149BD284AC5CF4B52AFF8B0E5AE5394385D64F6C2FAE6B6207F4D0
3,511,771 UART: [art] SIG.S = D957861F6CC24006396B071F28FF59250BAF69934422C3A8C1964207239CFB7AC66E23FC70DBA3032749394C7FE1B941
3,535,778 UART: Caliptra RT
3,536,029 UART: [state] CFI Enabled
3,655,414 UART: [rt] RT listening for mailbox commands...
3,656,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,580 UART: [rt]cmd =0x44504543, len=96
3,693,944 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,271 ready_for_fw is high
1,362,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,564 >>> mbox cmd response: success
3,042,139 UART:
3,042,155 UART: Running Caliptra FMC ...
3,042,563 UART:
3,042,617 UART: [state] CFI Enabled
3,052,789 UART: [fht] FMC Alias Private Key: 7
3,171,483 UART: [art] Extend RT PCRs Done
3,171,911 UART: [art] Lock RT PCRs Done
3,173,347 UART: [art] Populate DV Done
3,181,556 UART: [fht] FMC Alias Private Key: 7
3,182,714 UART: [art] Derive CDI
3,182,994 UART: [art] Store in slot 0x4
3,268,898 UART: [art] Derive Key Pair
3,269,258 UART: [art] Store priv key in slot 0x5
3,282,283 UART: [art] Derive Key Pair - Done
3,297,303 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,217 UART: [art] PUB.X = 8EE6C4A8E80545F65C6E1208A6E451BDD6B5F4EE0F0D3A4180894B8BB3AFA1E42BFDBF1022709B9C2181931BB44EE7C4
3,319,991 UART: [art] PUB.Y = CD34753B84E760EF1D78698C7373625349844CDD1D93D7BC21E7735A6E5D93ECE37480CF3690B36364E332CF0EC23405
3,326,933 UART: [art] SIG.R = 729C73A130693A9F6CB36D6ECAAAC2C4099E46A4561C79E92ABFAE974BD677B6DE22899F6A06E7EE9BC2959BFE4B2B5E
3,333,717 UART: [art] SIG.S = D20927E8B737B8721EE2ECE3EBB9C0060768A1037D521CF210AB218FD1DA35D7190F3245D00392F5BADBE9B79CAF0C2A
3,357,240 UART: Caliptra RT
3,357,491 UART: [state] CFI Enabled
3,477,858 UART: [rt] RT listening for mailbox commands...
3,478,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,916 UART: [rt]cmd =0x44504543, len=96
3,516,360 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,066 UART: [kat] SHA2-256
893,004 UART: [kat] SHA2-384
895,719 UART: [kat] SHA2-512-ACC
897,620 UART: [kat] ECC-384
903,481 UART: [kat] HMAC-384Kdf
908,145 UART: [kat] LMS
1,476,341 UART: [kat] --
1,477,234 UART: [cold-reset] ++
1,477,636 UART: [fht] Storing FHT @ 0x50003400
1,480,565 UART: [idev] ++
1,480,733 UART: [idev] CDI.KEYID = 6
1,481,093 UART: [idev] SUBJECT.KEYID = 7
1,481,517 UART: [idev] UDS.KEYID = 0
1,481,862 ready_for_fw is high
1,481,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,325 UART: [idev] Erasing UDS.KEYID = 0
1,506,001 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,745 UART: [idev] --
1,515,894 UART: [ldev] ++
1,516,062 UART: [ldev] CDI.KEYID = 6
1,516,425 UART: [ldev] SUBJECT.KEYID = 5
1,516,851 UART: [ldev] AUTHORITY.KEYID = 7
1,517,314 UART: [ldev] FE.KEYID = 1
1,522,592 UART: [ldev] Erasing FE.KEYID = 1
1,548,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,097 UART: [ldev] --
1,587,496 UART: [fwproc] Waiting for Commands...
1,588,151 UART: [fwproc] Received command 0x46574c44
1,588,942 UART: [fwproc] Received Image of size 118548 bytes
2,933,146 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,362 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,791 >>> mbox cmd response: success
3,133,831 UART: [afmc] ++
3,133,999 UART: [afmc] CDI.KEYID = 6
3,134,361 UART: [afmc] SUBJECT.KEYID = 7
3,134,786 UART: [afmc] AUTHORITY.KEYID = 5
3,170,143 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,499 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,871 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,554 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,506 UART: [afmc] --
3,213,414 UART: [cold-reset] --
3,214,242 UART: [state] Locking Datavault
3,215,265 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,869 UART: [state] Locking ICCM
3,216,511 UART: [exit] Launching FMC @ 0x40000130
3,221,841 UART:
3,221,857 UART: Running Caliptra FMC ...
3,222,265 UART:
3,222,408 UART: [state] CFI Enabled
3,233,262 UART: [fht] FMC Alias Private Key: 7
3,351,860 UART: [art] Extend RT PCRs Done
3,352,288 UART: [art] Lock RT PCRs Done
3,353,968 UART: [art] Populate DV Done
3,362,229 UART: [fht] FMC Alias Private Key: 7
3,363,397 UART: [art] Derive CDI
3,363,677 UART: [art] Store in slot 0x4
3,449,597 UART: [art] Derive Key Pair
3,449,957 UART: [art] Store priv key in slot 0x5
3,463,190 UART: [art] Derive Key Pair - Done
3,477,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,193 UART: [art] PUB.X = 1406C9CDF5259D97A142D7B1C24A2794426277E6955DC5C1D462EFFBD0B14E2369260C2BA99AF1B86C5A69AA8206CEAC
3,500,964 UART: [art] PUB.Y = 9A04CF38A8E3B729F1BEE6B2E09B53F33B5F2C04607260D7377A9EF2558DA25B4FC430DBA4FD8E1BA6A600E66D5C1C23
3,507,902 UART: [art] SIG.R = C603BD4DFA7F953D4EBC5EE71FC22931E4D7B5E212B516587805FF225DB7BDD92642907A345E11CCA7D2AC35CDD202FA
3,514,681 UART: [art] SIG.S = 259639E56BC4DA053063239A071DE5AA4380467E8A3A781A045361C7F12E6E0FA9DB79B5AEEBE8E2BE457EE00304E9C3
3,537,687 UART: Caliptra RT
3,538,030 UART: [state] CFI Enabled
3,657,865 UART: [rt] RT listening for mailbox commands...
3,658,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,141 UART: [rt]cmd =0x44504543, len=96
3,696,353 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,450 ready_for_fw is high
1,362,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,057 >>> mbox cmd response: success
3,041,350 UART:
3,041,366 UART: Running Caliptra FMC ...
3,041,774 UART:
3,041,917 UART: [state] CFI Enabled
3,052,569 UART: [fht] FMC Alias Private Key: 7
3,171,787 UART: [art] Extend RT PCRs Done
3,172,215 UART: [art] Lock RT PCRs Done
3,173,761 UART: [art] Populate DV Done
3,181,896 UART: [fht] FMC Alias Private Key: 7
3,182,970 UART: [art] Derive CDI
3,183,250 UART: [art] Store in slot 0x4
3,269,380 UART: [art] Derive Key Pair
3,269,740 UART: [art] Store priv key in slot 0x5
3,282,701 UART: [art] Derive Key Pair - Done
3,297,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,232 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,997 UART: [art] PUB.X = D0E493737839CB301410A4CA378AFC2859F81DFB78086042FE2D0A73859201960E3BC153323F4C889379D98721A5489D
3,320,745 UART: [art] PUB.Y = AFE6E7EC86EE0433B4AFFD3DCAE281B8E246DAF0CA9C117716B9EF5EF86083984624C5385C9006E776298C4E8AC671C1
3,327,703 UART: [art] SIG.R = E36197A43302F91D3F99919C784CBFC3C67BF7174706FDE5B18D0CF5EEC61859B0EAB05812E299DDF170647F383C264C
3,334,470 UART: [art] SIG.S = 7E3E789B73D8847236515CC42DDC31D4BFEAEC03F265B9B864E92BD13DB2C5978BB2A7BC4C216363745E6EC6CF56723F
3,358,115 UART: Caliptra RT
3,358,458 UART: [state] CFI Enabled
3,479,047 UART: [rt] RT listening for mailbox commands...
3,479,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,263 UART: [rt]cmd =0x44504543, len=96
3,517,697 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
891,332 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,436 UART: [kat] ++
895,588 UART: [kat] sha1
899,984 UART: [kat] SHA2-256
901,924 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,735 UART: [kat] HMAC-384Kdf
921,347 UART: [kat] LMS
1,169,659 UART: [kat] --
1,170,538 UART: [cold-reset] ++
1,170,870 UART: [fht] FHT @ 0x50003400
1,173,442 UART: [idev] ++
1,173,610 UART: [idev] CDI.KEYID = 6
1,173,971 UART: [idev] SUBJECT.KEYID = 7
1,174,396 UART: [idev] UDS.KEYID = 0
1,174,742 ready_for_fw is high
1,174,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,369 UART: [idev] Erasing UDS.KEYID = 0
1,199,339 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,556 UART: [ldev] ++
1,209,724 UART: [ldev] CDI.KEYID = 6
1,210,088 UART: [ldev] SUBJECT.KEYID = 5
1,210,515 UART: [ldev] AUTHORITY.KEYID = 7
1,210,978 UART: [ldev] FE.KEYID = 1
1,216,076 UART: [ldev] Erasing FE.KEYID = 1
1,242,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,604 UART: [ldev] --
1,281,827 UART: [fwproc] Wait for Commands...
1,282,444 UART: [fwproc] Recv command 0x46574c44
1,283,177 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,507 >>> mbox cmd response: success
2,827,631 UART: [afmc] ++
2,827,799 UART: [afmc] CDI.KEYID = 6
2,828,162 UART: [afmc] SUBJECT.KEYID = 7
2,828,588 UART: [afmc] AUTHORITY.KEYID = 5
2,863,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,937 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,647 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,528 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,229 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,014 UART: [afmc] --
2,907,035 UART: [cold-reset] --
2,907,755 UART: [state] Locking Datavault
2,908,836 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,440 UART: [state] Locking ICCM
2,909,896 UART: [exit] Launching FMC @ 0x40000130
2,915,226 UART:
2,915,242 UART: Running Caliptra FMC ...
2,915,650 UART:
2,915,704 UART: [state] CFI Enabled
2,926,044 UART: [fht] FMC Alias Private Key: 7
3,045,034 UART: [art] Extend RT PCRs Done
3,045,462 UART: [art] Lock RT PCRs Done
3,046,888 UART: [art] Populate DV Done
3,055,021 UART: [fht] FMC Alias Private Key: 7
3,056,049 UART: [art] Derive CDI
3,056,329 UART: [art] Store in slot 0x4
3,142,588 UART: [art] Derive Key Pair
3,142,948 UART: [art] Store priv key in slot 0x5
3,156,548 UART: [art] Derive Key Pair - Done
3,171,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,770 UART: [art] PUB.X = D5C0C8FCA39F2C5748DC4CBD38C643D693184ECB594F55865F3B50366719B2FB54AD2F25E3CAFABC878A6E9A7FC77244
3,194,556 UART: [art] PUB.Y = 00D7D86EAF540A9B5CF2AF8A01851F81AE373302DAC830A2152068D5CC69ECB788C715B7D0EDB18D7415A91F001E638B
3,201,463 UART: [art] SIG.R = 3276FCC6F559D7ED5C6245F9FA20F7D2FF0A7C4E9EDBAF6554A22A2F4CE4E7DFBD98992E8795FE0EA66941800A1D4803
3,208,239 UART: [art] SIG.S = C723A9BA36E0C5635B52EC5515D5211D6A00398CF9A7995FAACDEA5F06A2AEB6821FC39FBF0B96768E0097DA0BA401B3
3,232,131 UART: Caliptra RT
3,232,382 UART: [state] CFI Enabled
3,353,108 UART: [rt] RT listening for mailbox commands...
3,353,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,120 UART: [rt]cmd =0x44504543, len=96
3,391,904 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,740 ready_for_fw is high
1,058,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,698 >>> mbox cmd response: success
2,740,023 UART:
2,740,039 UART: Running Caliptra FMC ...
2,740,447 UART:
2,740,501 UART: [state] CFI Enabled
2,751,037 UART: [fht] FMC Alias Private Key: 7
2,870,339 UART: [art] Extend RT PCRs Done
2,870,767 UART: [art] Lock RT PCRs Done
2,872,285 UART: [art] Populate DV Done
2,880,508 UART: [fht] FMC Alias Private Key: 7
2,881,494 UART: [art] Derive CDI
2,881,774 UART: [art] Store in slot 0x4
2,967,487 UART: [art] Derive Key Pair
2,967,847 UART: [art] Store priv key in slot 0x5
2,980,937 UART: [art] Derive Key Pair - Done
2,995,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,568 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,333 UART: [art] PUB.X = 1DCE5B2AEDAEB4CEFA66932936FBF5121F37C35E37CFDDFB90BC94C8D60BE4C235807195E140191F4568EBC858741DF5
3,018,118 UART: [art] PUB.Y = 0E6A0A51FD2BE14CCFA54BD8372EF9B0BB92CADA8DEC6BC8A39F37CFA59FDC40B75650447142F1F9676E384DF3AC9747
3,025,086 UART: [art] SIG.R = D3709CD0AB9D0769381C9D5087673AAC2A6279565CC84897F0637D74CA75AB4A9E467DC4D7859A3CFFA62F78CE0AC2E7
3,031,860 UART: [art] SIG.S = 476F9E4A32E1E18EF9AAC75D17FD6899EF3D295B96217DACC6FFE2052284267ADA5B3714F1F447B630F7B948BEA2F0C8
3,055,167 UART: Caliptra RT
3,055,418 UART: [state] CFI Enabled
3,175,168 UART: [rt] RT listening for mailbox commands...
3,175,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,202 UART: [rt]cmd =0x44504543, len=96
3,213,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,580 UART: [kat] SHA2-512-ACC
906,481 UART: [kat] ECC-384
916,250 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,819 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 ready_for_fw is high
1,174,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,288 UART: [idev] Erasing UDS.KEYID = 0
1,199,634 UART: [idev] Sha1 KeyId Algorithm
1,208,592 UART: [idev] --
1,209,701 UART: [ldev] ++
1,209,869 UART: [ldev] CDI.KEYID = 6
1,210,233 UART: [ldev] SUBJECT.KEYID = 5
1,210,660 UART: [ldev] AUTHORITY.KEYID = 7
1,211,123 UART: [ldev] FE.KEYID = 1
1,216,707 UART: [ldev] Erasing FE.KEYID = 1
1,244,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,853 UART: [ldev] --
1,283,144 UART: [fwproc] Wait for Commands...
1,283,893 UART: [fwproc] Recv command 0x46574c44
1,284,626 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,995 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,840 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,015 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,214 >>> mbox cmd response: success
2,829,396 UART: [afmc] ++
2,829,564 UART: [afmc] CDI.KEYID = 6
2,829,927 UART: [afmc] SUBJECT.KEYID = 7
2,830,353 UART: [afmc] AUTHORITY.KEYID = 5
2,866,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,160 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,551 UART: [afmc] --
2,909,388 UART: [cold-reset] --
2,910,206 UART: [state] Locking Datavault
2,911,551 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,155 UART: [state] Locking ICCM
2,912,611 UART: [exit] Launching FMC @ 0x40000130
2,917,941 UART:
2,917,957 UART: Running Caliptra FMC ...
2,918,365 UART:
2,918,508 UART: [state] CFI Enabled
2,928,898 UART: [fht] FMC Alias Private Key: 7
3,048,034 UART: [art] Extend RT PCRs Done
3,048,462 UART: [art] Lock RT PCRs Done
3,050,232 UART: [art] Populate DV Done
3,058,765 UART: [fht] FMC Alias Private Key: 7
3,059,895 UART: [art] Derive CDI
3,060,175 UART: [art] Store in slot 0x4
3,146,224 UART: [art] Derive Key Pair
3,146,584 UART: [art] Store priv key in slot 0x5
3,159,336 UART: [art] Derive Key Pair - Done
3,174,042 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,569 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,334 UART: [art] PUB.X = AAB5F9640B1710992C792F9D8E6F20C87B5B0EF4D416E6E0617981218C547C4F99BD6FD265CCABE69A68035ADD00BE6A
3,197,085 UART: [art] PUB.Y = 0AD6B740CFB83490C199DACB3925D20375F9AD04F1D1B775E04EEF7B10D7A5B9B3212E463156B629B96EA10E0034B533
3,204,007 UART: [art] SIG.R = 2E057E830B0718EAF61DA7344DAD322AF81E8C2210A6E08F08A1701BB6EA021AF05508D17F287B6348352FE0D7535749
3,210,759 UART: [art] SIG.S = 529C7A1078E337D392A4DF32E212B36CF8D848032AEAC283BC31572D951CF81555B88407D9545CCB46E7C4EC633094F0
3,234,725 UART: Caliptra RT
3,235,068 UART: [state] CFI Enabled
3,355,105 UART: [rt] RT listening for mailbox commands...
3,355,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,257 UART: [rt]cmd =0x44504543, len=96
3,393,699 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,525 ready_for_fw is high
1,059,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,379 >>> mbox cmd response: success
2,740,324 UART:
2,740,340 UART: Running Caliptra FMC ...
2,740,748 UART:
2,740,891 UART: [state] CFI Enabled
2,751,503 UART: [fht] FMC Alias Private Key: 7
2,870,315 UART: [art] Extend RT PCRs Done
2,870,743 UART: [art] Lock RT PCRs Done
2,872,371 UART: [art] Populate DV Done
2,880,532 UART: [fht] FMC Alias Private Key: 7
2,881,584 UART: [art] Derive CDI
2,881,864 UART: [art] Store in slot 0x4
2,968,003 UART: [art] Derive Key Pair
2,968,363 UART: [art] Store priv key in slot 0x5
2,982,221 UART: [art] Derive Key Pair - Done
2,997,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,047 UART: [art] PUB.X = E96F03DF64F1302C5FDAB3F5EBE6611ED350DEC4B309B9DBA874A14A9F84875B3FE850C3C71D224532662E36E4EF2F5C
3,019,827 UART: [art] PUB.Y = 6E52DDA0D917AE74C315CDB85D16FA54393417CB8B8ED12C1F148A66EA04AD2EE8D4870582C9482A30A9C90BC672CF9A
3,026,782 UART: [art] SIG.R = 062D7165393F42741A7E3AA3B29D1C0C5F7DC67601A930B355DB4DA13F8BF3B2C59F071215CB1EC9B5E035004B71093A
3,033,519 UART: [art] SIG.S = F57E877DFE328D87451BC2E788BFB9F156A9FD27AE4EC285F5F69A4C50FF6FE8E234B9053908B7214E68E82460991FF5
3,057,619 UART: Caliptra RT
3,057,962 UART: [state] CFI Enabled
3,177,316 UART: [rt] RT listening for mailbox commands...
3,177,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,490 UART: [rt]cmd =0x44504543, len=96
3,215,958 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,884 UART: [state] LifecycleState = Unprovisioned
85,539 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,188 UART: [kat] SHA2-256
892,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,963 UART: [kat] ++
897,115 UART: [kat] sha1
901,397 UART: [kat] SHA2-256
903,337 UART: [kat] SHA2-384
905,962 UART: [kat] SHA2-512-ACC
907,863 UART: [kat] ECC-384
917,344 UART: [kat] HMAC-384Kdf
921,948 UART: [kat] LMS
1,170,276 UART: [kat] --
1,171,201 UART: [cold-reset] ++
1,171,729 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,912 UART: [idev] SUBJECT.KEYID = 7
1,175,336 UART: [idev] UDS.KEYID = 0
1,175,681 ready_for_fw is high
1,175,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,450 UART: [idev] Erasing UDS.KEYID = 0
1,200,463 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,083 UART: [ldev] ++
1,210,251 UART: [ldev] CDI.KEYID = 6
1,210,614 UART: [ldev] SUBJECT.KEYID = 5
1,211,040 UART: [ldev] AUTHORITY.KEYID = 7
1,211,503 UART: [ldev] FE.KEYID = 1
1,216,919 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,769 UART: [ldev] --
1,282,190 UART: [fwproc] Wait for Commands...
1,282,960 UART: [fwproc] Recv command 0x46574c44
1,283,688 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,046 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,445 >>> mbox cmd response: success
2,826,579 UART: [afmc] ++
2,826,747 UART: [afmc] CDI.KEYID = 6
2,827,109 UART: [afmc] SUBJECT.KEYID = 7
2,827,534 UART: [afmc] AUTHORITY.KEYID = 5
2,863,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,538 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,995 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,878 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,579 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,511 UART: [afmc] --
2,906,563 UART: [cold-reset] --
2,907,387 UART: [state] Locking Datavault
2,908,528 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,132 UART: [state] Locking ICCM
2,909,732 UART: [exit] Launching FMC @ 0x40000130
2,915,062 UART:
2,915,078 UART: Running Caliptra FMC ...
2,915,486 UART:
2,915,540 UART: [state] CFI Enabled
2,925,966 UART: [fht] FMC Alias Private Key: 7
3,044,710 UART: [art] Extend RT PCRs Done
3,045,138 UART: [art] Lock RT PCRs Done
3,047,022 UART: [art] Populate DV Done
3,055,297 UART: [fht] FMC Alias Private Key: 7
3,056,253 UART: [art] Derive CDI
3,056,533 UART: [art] Store in slot 0x4
3,142,182 UART: [art] Derive Key Pair
3,142,542 UART: [art] Store priv key in slot 0x5
3,155,574 UART: [art] Derive Key Pair - Done
3,170,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,589 UART: [art] PUB.X = 5299D3532EEFD2CFCB2A81567174CC9C8B5D5A342A90CC2648D34CF5A24F152DAD9EAE56050EF93990E78ADEF0220F87
3,193,364 UART: [art] PUB.Y = 0203B51BAF50995DAFC8559164F7D1E5BBFE675AF91E2571DCE36CE66AA11CB5322AE6A83601B1DDA17D4D46BB2744F3
3,200,321 UART: [art] SIG.R = EB5DB7648DECD7A6B7FDE6226B4BD8D8FCB810B63BB68CB9610E309905C2563DD9FE1F67783E1DB574B3A98CB93E72AC
3,207,107 UART: [art] SIG.S = C134F650A41B204AF13190410492E8D146D3C4B3D1DC05EB6674E77D574291E8E164CE65C50BA0196DA8EBCDE6CBEBF5
3,230,652 UART: Caliptra RT
3,230,903 UART: [state] CFI Enabled
3,351,272 UART: [rt] RT listening for mailbox commands...
3,351,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,378 UART: [rt]cmd =0x44504543, len=96
3,389,508 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,786 >>> mbox cmd response: success
2,741,323 UART:
2,741,339 UART: Running Caliptra FMC ...
2,741,747 UART:
2,741,801 UART: [state] CFI Enabled
2,752,253 UART: [fht] FMC Alias Private Key: 7
2,870,883 UART: [art] Extend RT PCRs Done
2,871,311 UART: [art] Lock RT PCRs Done
2,873,011 UART: [art] Populate DV Done
2,881,254 UART: [fht] FMC Alias Private Key: 7
2,882,376 UART: [art] Derive CDI
2,882,656 UART: [art] Store in slot 0x4
2,968,305 UART: [art] Derive Key Pair
2,968,665 UART: [art] Store priv key in slot 0x5
2,982,083 UART: [art] Derive Key Pair - Done
2,996,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,968 UART: [art] PUB.X = B48F2D1A795BD41ABC28790C9C0ECFD3299DF48C14A770883B062E4D94634964C1563C64D30B26C24DF59DE8265E8F83
3,019,730 UART: [art] PUB.Y = 154F64CC6AE548852DB9CC22A531367B7136493DBC18CB022AE2920F5EE6D468007A2E9F5E4FA67C2EECF0E30C0CAAE1
3,026,662 UART: [art] SIG.R = E679B2FF24594EC177B59C9F02C9D0FD09D3B37D2F2C5367E2CF9B7A980147D70B5F3D2557707C764CD2FCB767DC9EDC
3,033,434 UART: [art] SIG.S = 7BE50250F71966A742203323785C5C10C16B1C6698938ADD11E4ECD866CAF3BDD83F7D36C49192BDA99443CD80172181
3,058,127 UART: Caliptra RT
3,058,378 UART: [state] CFI Enabled
3,178,342 UART: [rt] RT listening for mailbox commands...
3,179,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,514 UART: [rt]cmd =0x44504543, len=96
3,217,138 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,854 UART: [kat] SHA2-256
903,794 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
917,861 UART: [kat] HMAC-384Kdf
922,539 UART: [kat] LMS
1,170,867 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,712 UART: [fht] FHT @ 0x50003400
1,175,251 UART: [idev] ++
1,175,419 UART: [idev] CDI.KEYID = 6
1,175,779 UART: [idev] SUBJECT.KEYID = 7
1,176,203 UART: [idev] UDS.KEYID = 0
1,176,548 ready_for_fw is high
1,176,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,873 UART: [idev] Erasing UDS.KEYID = 0
1,200,806 UART: [idev] Sha1 KeyId Algorithm
1,209,244 UART: [idev] --
1,210,176 UART: [ldev] ++
1,210,344 UART: [ldev] CDI.KEYID = 6
1,210,707 UART: [ldev] SUBJECT.KEYID = 5
1,211,133 UART: [ldev] AUTHORITY.KEYID = 7
1,211,596 UART: [ldev] FE.KEYID = 1
1,216,826 UART: [ldev] Erasing FE.KEYID = 1
1,243,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,004 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,720 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,302 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,363 UART: [fwproc] Recv command 0x46574c44
1,284,091 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,442 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,195 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,524 >>> mbox cmd response: success
2,828,736 UART: [afmc] ++
2,828,904 UART: [afmc] CDI.KEYID = 6
2,829,266 UART: [afmc] SUBJECT.KEYID = 7
2,829,691 UART: [afmc] AUTHORITY.KEYID = 5
2,864,982 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,751 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,499 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,208 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,091 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,792 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,748 UART: [afmc] --
2,908,818 UART: [cold-reset] --
2,909,830 UART: [state] Locking Datavault
2,910,887 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,491 UART: [state] Locking ICCM
2,912,035 UART: [exit] Launching FMC @ 0x40000130
2,917,365 UART:
2,917,381 UART: Running Caliptra FMC ...
2,917,789 UART:
2,917,932 UART: [state] CFI Enabled
2,928,902 UART: [fht] FMC Alias Private Key: 7
3,048,024 UART: [art] Extend RT PCRs Done
3,048,452 UART: [art] Lock RT PCRs Done
3,050,096 UART: [art] Populate DV Done
3,058,549 UART: [fht] FMC Alias Private Key: 7
3,059,553 UART: [art] Derive CDI
3,059,833 UART: [art] Store in slot 0x4
3,145,972 UART: [art] Derive Key Pair
3,146,332 UART: [art] Store priv key in slot 0x5
3,159,802 UART: [art] Derive Key Pair - Done
3,174,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,092 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,857 UART: [art] PUB.X = C7B64FE2428C0225995333740854AEEFFCFB8AA94F534AFF23D727F2EF1489B56E4AABD4903A21EA421A9FD5847329B2
3,197,631 UART: [art] PUB.Y = 2D3C92C0445A2D2F1EDC92D273803EA499C73B7FE237797894416A0C29F39692C989BF269CDDF7C21091363817D4E076
3,204,574 UART: [art] SIG.R = 948DBCAB55C985F9A4347B68CE73E2895A1F7647F17D600BD984B433690AEFAC055665AEDF3049DD5119DCFCB151FC95
3,211,347 UART: [art] SIG.S = F1991C95B5B8B522961EBEF695570E09855C76E8E24A7D665EFC114983CE4A0CC6EE3353294DA80A9B93BDC6CA2F5345
3,234,637 UART: Caliptra RT
3,234,980 UART: [state] CFI Enabled
3,355,089 UART: [rt] RT listening for mailbox commands...
3,355,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,297 UART: [rt]cmd =0x44504543, len=96
3,393,829 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,068 ready_for_fw is high
1,061,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,711 >>> mbox cmd response: success
2,742,932 UART:
2,742,948 UART: Running Caliptra FMC ...
2,743,356 UART:
2,743,499 UART: [state] CFI Enabled
2,754,151 UART: [fht] FMC Alias Private Key: 7
2,873,031 UART: [art] Extend RT PCRs Done
2,873,459 UART: [art] Lock RT PCRs Done
2,875,109 UART: [art] Populate DV Done
2,883,600 UART: [fht] FMC Alias Private Key: 7
2,884,558 UART: [art] Derive CDI
2,884,838 UART: [art] Store in slot 0x4
2,970,385 UART: [art] Derive Key Pair
2,970,745 UART: [art] Store priv key in slot 0x5
2,984,021 UART: [art] Derive Key Pair - Done
2,998,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,095 UART: [art] PUB.X = E92EAFD0EF98344A3DF7984D05E7789EB47EF87D8F73D6F70C65DC7019ECF649170C93E0DD6B4F912B24E5A47FCA94D3
3,021,872 UART: [art] PUB.Y = 2490EF7FBA9FF0C50A60C31B7C286C00BAC5691316B5950FA8DF9C48A1B776BBD9904D5123250493DD6E73B1CA1ABED9
3,028,805 UART: [art] SIG.R = A4FABDEFBDDEEFE80F36B9A330B62F5546D569B8B8150376919ABF0F0EEEC2D4217FF5E977C41E25CEEB74DBB30A2B07
3,035,585 UART: [art] SIG.S = A0E68E7103AC4B1856CF91BA4F997967825D81EBD8A46303404078D70EE87B6F2674CF73C1F36C0815915789395DD8CB
3,059,721 UART: Caliptra RT
3,060,064 UART: [state] CFI Enabled
3,178,911 UART: [rt] RT listening for mailbox commands...
3,179,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,941 UART: [rt]cmd =0x44504543, len=96
3,217,293 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_export_cdi_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,001 UART:
192,374 UART: Running Caliptra ROM ...
193,476 UART:
193,620 UART: [state] CFI Enabled
267,989 UART: [state] LifecycleState = Unprovisioned
269,988 UART: [state] DebugLocked = No
271,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,674 UART: [kat] SHA2-256
446,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,910 UART: [kat] ++
457,448 UART: [kat] sha1
468,755 UART: [kat] SHA2-256
471,471 UART: [kat] SHA2-384
477,810 UART: [kat] SHA2-512-ACC
480,178 UART: [kat] ECC-384
2,768,202 UART: [kat] HMAC-384Kdf
2,799,365 UART: [kat] LMS
3,989,674 UART: [kat] --
3,993,620 UART: [cold-reset] ++
3,995,131 UART: [fht] Storing FHT @ 0x50003400
4,007,183 UART: [idev] ++
4,007,757 UART: [idev] CDI.KEYID = 6
4,008,799 UART: [idev] SUBJECT.KEYID = 7
4,009,977 UART: [idev] UDS.KEYID = 0
4,010,999 ready_for_fw is high
4,011,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,288 UART: [idev] Erasing UDS.KEYID = 0
7,344,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,520 UART: [idev] --
7,369,378 UART: [ldev] ++
7,369,949 UART: [ldev] CDI.KEYID = 6
7,370,921 UART: [ldev] SUBJECT.KEYID = 5
7,372,080 UART: [ldev] AUTHORITY.KEYID = 7
7,373,371 UART: [ldev] FE.KEYID = 1
7,402,098 UART: [ldev] Erasing FE.KEYID = 1
10,728,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,057 UART: [ldev] --
13,094,102 UART: [fwproc] Waiting for Commands...
13,095,930 UART: [fwproc] Received command 0x46574c44
13,098,126 UART: [fwproc] Received Image of size 118548 bytes
17,202,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,281,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,354,857 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,683,666 >>> mbox cmd response: success
17,688,038 UART: [afmc] ++
17,688,656 UART: [afmc] CDI.KEYID = 6
17,689,546 UART: [afmc] SUBJECT.KEYID = 7
17,690,829 UART: [afmc] AUTHORITY.KEYID = 5
21,049,648 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,626 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,366,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,380,784 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,235 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,499 UART: [afmc] --
23,420,920 UART: [cold-reset] --
23,425,052 UART: [state] Locking Datavault
23,429,817 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,569 UART: [state] Locking ICCM
23,433,717 UART: [exit] Launching FMC @ 0x40000130
23,442,116 UART:
23,442,358 UART: Running Caliptra FMC ...
23,443,462 UART:
23,443,616 UART: [state] CFI Enabled
23,508,828 UART: [fht] FMC Alias Private Key: 7
25,849,466 UART: [art] Extend RT PCRs Done
25,850,688 UART: [art] Lock RT PCRs Done
25,852,286 UART: [art] Populate DV Done
25,857,608 UART: [fht] FMC Alias Private Key: 7
25,859,308 UART: [art] Derive CDI
25,860,129 UART: [art] Store in slot 0x4
25,917,384 UART: [art] Derive Key Pair
25,918,421 UART: [art] Store priv key in slot 0x5
29,212,595 UART: [art] Derive Key Pair - Done
29,225,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,866 UART: [art] Erasing AUTHORITY.KEYID = 7
31,515,370 UART: [art] PUB.X = DB9226F1C10DA472813A317DC0275A2A70E3A3B3AAD69ABE8729E8C4B315D67F5C0D2D59361B1A9220BAC7DC587FF520
31,522,657 UART: [art] PUB.Y = 945F427B07C9A3F4D7702064971B9732857013E7B065363094E5C02936C8A2674B518A433521A904C769114B154564E6
31,529,876 UART: [art] SIG.R = 260BBF81368FA42E98473ED268B6A84A3972E3A74E3A3208363B6DFD7807FD49093B05519F7B1634DD3D21365EC4FFF5
31,537,265 UART: [art] SIG.S = D8673E7EB077793DE5E9925C125087F26D12BEE05F1812047000FECE78EBF210C07AF84B50D58792A94745FE7B4DD975
32,842,436 UART: Caliptra RT
32,843,144 UART: [state] CFI Enabled
33,019,326 UART: [rt] RT listening for mailbox commands...
33,021,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,051,853 UART: [rt]cmd =0x4d454153, len=108
33,070,469 >>> mbox cmd response data (12 bytes)
33,071,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,101,624 UART: [rt]cmd =0x4d454153, len=108
33,120,478 >>> mbox cmd response data (12 bytes)
33,120,916 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,151,779 UART: [rt]cmd =0x4d454153, len=108
33,170,172 >>> mbox cmd response data (12 bytes)
33,170,637 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,201,233 UART: [rt]cmd =0x4d454153, len=108
33,220,377 >>> mbox cmd response data (12 bytes)
33,220,805 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,251,352 UART: [rt]cmd =0x4d454153, len=108
33,270,421 >>> mbox cmd response data (12 bytes)
33,270,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,301,272 UART: [rt]cmd =0x4d454153, len=108
33,320,232 >>> mbox cmd response data (12 bytes)
33,320,695 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,351,400 UART: [rt]cmd =0x4d454153, len=108
33,371,135 >>> mbox cmd response data (12 bytes)
33,371,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,402,006 UART: [rt]cmd =0x4d454153, len=108
33,420,541 >>> mbox cmd response data (12 bytes)
33,420,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,451,623 UART: [rt]cmd =0x4d454153, len=108
33,469,954 >>> mbox cmd response data (12 bytes)
33,470,369 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,501,295 UART: [rt]cmd =0x4d454153, len=108
33,520,309 >>> mbox cmd response data (12 bytes)
33,520,726 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,551,156 UART: [rt]cmd =0x4d454153, len=108
33,570,407 >>> mbox cmd response data (12 bytes)
33,570,890 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,601,483 UART: [rt]cmd =0x4d454153, len=108
33,620,305 >>> mbox cmd response data (12 bytes)
33,620,725 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,651,372 UART: [rt]cmd =0x4d454153, len=108
33,669,846 >>> mbox cmd response data (12 bytes)
33,670,268 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,701,016 UART: [rt]cmd =0x4d454153, len=108
33,720,224 >>> mbox cmd response data (12 bytes)
33,720,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,751,377 UART: [rt]cmd =0x4d454153, len=108
33,753,869 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,808,051 ready_for_fw is high
3,808,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,935 >>> mbox cmd response: success
23,667,212 UART:
23,667,621 UART: Running Caliptra FMC ...
23,668,828 UART:
23,669,000 UART: [state] CFI Enabled
23,737,389 UART: [fht] FMC Alias Private Key: 7
26,077,758 UART: [art] Extend RT PCRs Done
26,078,977 UART: [art] Lock RT PCRs Done
26,080,877 UART: [art] Populate DV Done
26,086,247 UART: [fht] FMC Alias Private Key: 7
26,087,840 UART: [art] Derive CDI
26,088,654 UART: [art] Store in slot 0x4
26,145,631 UART: [art] Derive Key Pair
26,146,647 UART: [art] Store priv key in slot 0x5
29,439,966 UART: [art] Derive Key Pair - Done
29,453,323 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,026 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,546 UART: [art] PUB.X = B24AD519BCBCE4705490F9F950E58549ABC50BE26200BEA5EB8A3A3E9A86ADAAB0D6872AF247D066A9F307235D3B8807
31,749,802 UART: [art] PUB.Y = 69D4DEAFD828465ADED509D1238D3BE0A83D1E3E7025B31B73482EA67FE261E378D415F4E3DD2008279616D2D14FD514
31,757,081 UART: [art] SIG.R = 949706E50461C563D4539118ED63ECDE94D886E0B7186CC1A878CF9559A3227903D87826FF6CF6D00B52249C9D6D808B
31,764,436 UART: [art] SIG.S = 3C8E4AF83E838076E792D284E0C7F6742FBB7C0BCEA6E5A6464783A891E7877C880F0E963FC07BA0262F8EC424D25FAA
33,069,556 UART: Caliptra RT
33,070,263 UART: [state] CFI Enabled
33,247,149 UART: [rt] RT listening for mailbox commands...
33,249,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,279,846 UART: [rt]cmd =0x4d454153, len=108
33,297,965 >>> mbox cmd response data (12 bytes)
33,298,548 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,329,197 UART: [rt]cmd =0x4d454153, len=108
33,348,344 >>> mbox cmd response data (12 bytes)
33,348,788 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,379,495 UART: [rt]cmd =0x4d454153, len=108
33,398,240 >>> mbox cmd response data (12 bytes)
33,398,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,429,317 UART: [rt]cmd =0x4d454153, len=108
33,448,404 >>> mbox cmd response data (12 bytes)
33,448,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,479,319 UART: [rt]cmd =0x4d454153, len=108
33,498,620 >>> mbox cmd response data (12 bytes)
33,499,058 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,529,983 UART: [rt]cmd =0x4d454153, len=108
33,548,777 >>> mbox cmd response data (12 bytes)
33,549,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,579,795 UART: [rt]cmd =0x4d454153, len=108
33,598,713 >>> mbox cmd response data (12 bytes)
33,599,131 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,629,694 UART: [rt]cmd =0x4d454153, len=108
33,648,706 >>> mbox cmd response data (12 bytes)
33,649,128 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,679,874 UART: [rt]cmd =0x4d454153, len=108
33,698,995 >>> mbox cmd response data (12 bytes)
33,699,473 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,730,170 UART: [rt]cmd =0x4d454153, len=108
33,749,045 >>> mbox cmd response data (12 bytes)
33,749,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,780,022 UART: [rt]cmd =0x4d454153, len=108
33,798,875 >>> mbox cmd response data (12 bytes)
33,799,304 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,830,048 UART: [rt]cmd =0x4d454153, len=108
33,849,852 >>> mbox cmd response data (12 bytes)
33,850,312 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,881,117 UART: [rt]cmd =0x4d454153, len=108
33,900,219 >>> mbox cmd response data (12 bytes)
33,900,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,931,552 UART: [rt]cmd =0x4d454153, len=108
33,950,406 >>> mbox cmd response data (12 bytes)
33,950,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,981,414 UART: [rt]cmd =0x4d454153, len=108
33,983,635 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,397 UART:
192,744 UART: Running Caliptra ROM ...
194,211 UART:
603,565 UART: [state] CFI Enabled
616,956 UART: [state] LifecycleState = Unprovisioned
618,891 UART: [state] DebugLocked = No
621,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,750 UART: [kat] SHA2-256
796,552 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,062 UART: [kat] ++
807,515 UART: [kat] sha1
819,023 UART: [kat] SHA2-256
821,677 UART: [kat] SHA2-384
826,973 UART: [kat] SHA2-512-ACC
829,334 UART: [kat] ECC-384
3,113,869 UART: [kat] HMAC-384Kdf
3,125,597 UART: [kat] LMS
4,315,740 UART: [kat] --
4,318,907 UART: [cold-reset] ++
4,321,048 UART: [fht] Storing FHT @ 0x50003400
4,332,101 UART: [idev] ++
4,332,660 UART: [idev] CDI.KEYID = 6
4,333,640 UART: [idev] SUBJECT.KEYID = 7
4,334,877 UART: [idev] UDS.KEYID = 0
4,335,930 ready_for_fw is high
4,336,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,526 UART: [idev] Erasing UDS.KEYID = 0
7,621,763 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,783 UART: [idev] --
7,648,288 UART: [ldev] ++
7,648,917 UART: [ldev] CDI.KEYID = 6
7,649,798 UART: [ldev] SUBJECT.KEYID = 5
7,651,057 UART: [ldev] AUTHORITY.KEYID = 7
7,652,281 UART: [ldev] FE.KEYID = 1
7,662,221 UART: [ldev] Erasing FE.KEYID = 1
10,944,968 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,365 UART: [ldev] --
13,306,783 UART: [fwproc] Waiting for Commands...
13,308,652 UART: [fwproc] Received command 0x46574c44
13,310,826 UART: [fwproc] Received Image of size 118548 bytes
17,419,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,448 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,744 >>> mbox cmd response: success
17,910,664 UART: [afmc] ++
17,911,273 UART: [afmc] CDI.KEYID = 6
17,912,179 UART: [afmc] SUBJECT.KEYID = 7
17,913,392 UART: [afmc] AUTHORITY.KEYID = 5
21,226,269 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,492 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,947 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,367 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,952 UART: [afmc] --
23,590,753 UART: [cold-reset] --
23,595,309 UART: [state] Locking Datavault
23,600,082 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,782 UART: [state] Locking ICCM
23,603,874 UART: [exit] Launching FMC @ 0x40000130
23,612,262 UART:
23,612,503 UART: Running Caliptra FMC ...
23,613,599 UART:
23,613,755 UART: [state] CFI Enabled
23,621,556 UART: [fht] FMC Alias Private Key: 7
25,961,921 UART: [art] Extend RT PCRs Done
25,963,143 UART: [art] Lock RT PCRs Done
25,964,875 UART: [art] Populate DV Done
25,970,393 UART: [fht] FMC Alias Private Key: 7
25,971,871 UART: [art] Derive CDI
25,972,625 UART: [art] Store in slot 0x4
26,015,089 UART: [art] Derive Key Pair
26,016,095 UART: [art] Store priv key in slot 0x5
29,258,492 UART: [art] Derive Key Pair - Done
29,271,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,841 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,499 UART: [art] PUB.X = 51C339A54EB2E42C1F6FE8794A9B9CE1F73DC3CEE8772DB58B2D23822D20B2AC2BFB11603907C3E53165D32CBA0E7FDD
31,560,655 UART: [art] PUB.Y = 6CC13B999BCD81FE2537358E57036AD0326C29004430022DC06DF332C513A6E937BC675A3AFF40D9CBAFAAC6ACB33C9A
31,567,881 UART: [art] SIG.R = 55C1FA408F98B8C59EB9D13BA79D6CD8147E24FE27BC74283E8775C082B68042C859BE17F60627F62055EEE0841E52FF
31,575,264 UART: [art] SIG.S = 036A35BDE52541908A21A94E9548BE8584E2DD357D6BE957F29EB60A9594478A6B34F07BD0E0A51B05B5310BE603B364
32,881,100 UART: Caliptra RT
32,881,793 UART: [state] CFI Enabled
33,015,550 UART: [rt] RT listening for mailbox commands...
33,017,462 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,048,225 UART: [rt]cmd =0x4d454153, len=108
33,067,481 >>> mbox cmd response data (12 bytes)
33,068,011 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,098,786 UART: [rt]cmd =0x4d454153, len=108
33,117,535 >>> mbox cmd response data (12 bytes)
33,117,992 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,148,576 UART: [rt]cmd =0x4d454153, len=108
33,166,763 >>> mbox cmd response data (12 bytes)
33,167,225 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,197,920 UART: [rt]cmd =0x4d454153, len=108
33,216,798 >>> mbox cmd response data (12 bytes)
33,217,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,248,137 UART: [rt]cmd =0x4d454153, len=108
33,266,345 >>> mbox cmd response data (12 bytes)
33,266,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,297,405 UART: [rt]cmd =0x4d454153, len=108
33,316,715 >>> mbox cmd response data (12 bytes)
33,317,168 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,347,643 UART: [rt]cmd =0x4d454153, len=108
33,366,568 >>> mbox cmd response data (12 bytes)
33,366,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,397,861 UART: [rt]cmd =0x4d454153, len=108
33,416,169 >>> mbox cmd response data (12 bytes)
33,416,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,447,069 UART: [rt]cmd =0x4d454153, len=108
33,466,367 >>> mbox cmd response data (12 bytes)
33,466,779 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,497,267 UART: [rt]cmd =0x4d454153, len=108
33,516,177 >>> mbox cmd response data (12 bytes)
33,516,604 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,547,293 UART: [rt]cmd =0x4d454153, len=108
33,566,658 >>> mbox cmd response data (12 bytes)
33,567,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,597,972 UART: [rt]cmd =0x4d454153, len=108
33,616,843 >>> mbox cmd response data (12 bytes)
33,617,259 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,648,118 UART: [rt]cmd =0x4d454153, len=108
33,667,307 >>> mbox cmd response data (12 bytes)
33,667,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,698,372 UART: [rt]cmd =0x4d454153, len=108
33,716,259 >>> mbox cmd response data (12 bytes)
33,716,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,747,231 UART: [rt]cmd =0x4d454153, len=108
33,749,391 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,124,403 ready_for_fw is high
4,124,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,720 >>> mbox cmd response: success
23,809,874 UART:
23,810,275 UART: Running Caliptra FMC ...
23,811,388 UART:
23,811,545 UART: [state] CFI Enabled
23,819,611 UART: [fht] FMC Alias Private Key: 7
26,160,113 UART: [art] Extend RT PCRs Done
26,161,334 UART: [art] Lock RT PCRs Done
26,163,420 UART: [art] Populate DV Done
26,169,054 UART: [fht] FMC Alias Private Key: 7
26,170,646 UART: [art] Derive CDI
26,171,395 UART: [art] Store in slot 0x4
26,213,896 UART: [art] Derive Key Pair
26,214,892 UART: [art] Store priv key in slot 0x5
29,456,750 UART: [art] Derive Key Pair - Done
29,469,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,856 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,495 UART: [art] PUB.X = 6105F5A5A04AC21A22B9DFE07AB5D8CC2F9E081F8A33B6E7E9FC5C821779C7733B19B07879539FC6EAF62AFD136CD049
31,758,640 UART: [art] PUB.Y = E8105900F77583269AA5D687A64FCC944BE86898E377BB477FFB2CE897F88830C20CA3447D90CB33E7E762AD765CB57D
31,765,882 UART: [art] SIG.R = A0553B11EF3CAEF4E45F962A8C96BB8F963BF7FC187526135C99125D8E0FD9DE267ED929A0BF9FD8523496093B5CBDE1
31,773,271 UART: [art] SIG.S = 85A3C51DA4C5051C94205105BF90DA1DE362FDA217C19E40F8173D41844DACC5A26CCF37FB6A57B00C5208D6413351EC
33,078,671 UART: Caliptra RT
33,079,380 UART: [state] CFI Enabled
33,212,978 UART: [rt] RT listening for mailbox commands...
33,214,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,245,542 UART: [rt]cmd =0x4d454153, len=108
33,264,528 >>> mbox cmd response data (12 bytes)
33,265,045 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,295,672 UART: [rt]cmd =0x4d454153, len=108
33,314,961 >>> mbox cmd response data (12 bytes)
33,315,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,346,030 UART: [rt]cmd =0x4d454153, len=108
33,364,237 >>> mbox cmd response data (12 bytes)
33,364,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,395,451 UART: [rt]cmd =0x4d454153, len=108
33,414,647 >>> mbox cmd response data (12 bytes)
33,415,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,445,773 UART: [rt]cmd =0x4d454153, len=108
33,464,534 >>> mbox cmd response data (12 bytes)
33,464,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,495,511 UART: [rt]cmd =0x4d454153, len=108
33,514,281 >>> mbox cmd response data (12 bytes)
33,514,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,545,595 UART: [rt]cmd =0x4d454153, len=108
33,563,565 >>> mbox cmd response data (12 bytes)
33,563,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,594,407 UART: [rt]cmd =0x4d454153, len=108
33,612,829 >>> mbox cmd response data (12 bytes)
33,613,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,643,892 UART: [rt]cmd =0x4d454153, len=108
33,663,457 >>> mbox cmd response data (12 bytes)
33,663,875 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,694,521 UART: [rt]cmd =0x4d454153, len=108
33,713,429 >>> mbox cmd response data (12 bytes)
33,713,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,744,652 UART: [rt]cmd =0x4d454153, len=108
33,762,665 >>> mbox cmd response data (12 bytes)
33,763,121 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,793,975 UART: [rt]cmd =0x4d454153, len=108
33,812,681 >>> mbox cmd response data (12 bytes)
33,813,113 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,843,762 UART: [rt]cmd =0x4d454153, len=108
33,862,892 >>> mbox cmd response data (12 bytes)
33,863,380 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,894,131 UART: [rt]cmd =0x4d454153, len=108
33,913,719 >>> mbox cmd response data (12 bytes)
33,914,179 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,944,822 UART: [rt]cmd =0x4d454153, len=108
33,947,097 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,879 writing to cptra_bootfsm_go
192,110 UART:
192,474 UART: Running Caliptra ROM ...
193,559 UART:
193,701 UART: [state] CFI Enabled
264,824 UART: [state] LifecycleState = Unprovisioned
266,749 UART: [state] DebugLocked = No
268,555 UART: [state] WD Timer not started. Device not locked for debugging
272,458 UART: [kat] SHA2-256
452,136 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,873 UART: [kat] ++
463,392 UART: [kat] sha1
474,048 UART: [kat] SHA2-256
476,771 UART: [kat] SHA2-384
482,123 UART: [kat] SHA2-512-ACC
484,495 UART: [kat] ECC-384
2,949,966 UART: [kat] HMAC-384Kdf
2,970,902 UART: [kat] LMS
3,447,416 UART: [kat] --
3,454,202 UART: [cold-reset] ++
3,456,345 UART: [fht] FHT @ 0x50003400
3,467,054 UART: [idev] ++
3,467,657 UART: [idev] CDI.KEYID = 6
3,468,613 UART: [idev] SUBJECT.KEYID = 7
3,469,854 UART: [idev] UDS.KEYID = 0
3,470,751 ready_for_fw is high
3,470,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,861 UART: [idev] Erasing UDS.KEYID = 0
5,986,900 UART: [idev] Sha1 KeyId Algorithm
6,010,962 UART: [idev] --
6,016,206 UART: [ldev] ++
6,016,829 UART: [ldev] CDI.KEYID = 6
6,017,752 UART: [ldev] SUBJECT.KEYID = 5
6,018,932 UART: [ldev] AUTHORITY.KEYID = 7
6,020,221 UART: [ldev] FE.KEYID = 1
6,056,321 UART: [ldev] Erasing FE.KEYID = 1
8,562,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,700 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,973 UART: [ldev] --
10,371,640 UART: [fwproc] Wait for Commands...
10,373,184 UART: [fwproc] Recv command 0x46574c44
10,375,165 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,923 >>> mbox cmd response: success
14,346,210 UART: [afmc] ++
14,346,822 UART: [afmc] CDI.KEYID = 6
14,347,711 UART: [afmc] SUBJECT.KEYID = 7
14,348,923 UART: [afmc] AUTHORITY.KEYID = 5
16,893,372 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,696 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,287 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,491 UART: [afmc] --
18,694,825 UART: [cold-reset] --
18,698,357 UART: [state] Locking Datavault
18,703,385 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,131 UART: [state] Locking ICCM
18,707,766 UART: [exit] Launching FMC @ 0x40000130
18,716,174 UART:
18,716,412 UART: Running Caliptra FMC ...
18,717,503 UART:
18,717,662 UART: [state] CFI Enabled
18,774,020 UART: [fht] FMC Alias Private Key: 7
20,540,213 UART: [art] Extend RT PCRs Done
20,541,413 UART: [art] Lock RT PCRs Done
20,543,188 UART: [art] Populate DV Done
20,548,588 UART: [fht] FMC Alias Private Key: 7
20,550,276 UART: [art] Derive CDI
20,551,084 UART: [art] Store in slot 0x4
20,606,884 UART: [art] Derive Key Pair
20,607,911 UART: [art] Store priv key in slot 0x5
23,070,265 UART: [art] Derive Key Pair - Done
23,083,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,456 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,957 UART: [art] PUB.X = C012F8FA11E6DBB1F94E628B6593E04ADDF75C4FBAA420C3440FDE1057EC45521B1F396011DD116AA13C5DAB25EC8B5D
24,805,252 UART: [art] PUB.Y = F6ACCD589641EAEE386D7892C0916463AA35FBC59661FDD8E9EF0D5A18A21F3632C9C775942386C21EB9A3D73AB8E8B9
24,812,541 UART: [art] SIG.R = 48A863FF15AC13173B4C201AD5BF624782DDD5855648C1D0F8C655822A2B0DFD1636399BE22812F315542866AC53E1A5
24,819,930 UART: [art] SIG.S = B371AA32628091A0C75E94E4E3BD96420BE16F57D073F3EA71D7E3067A8EFEA91EE110995D934D0C3CB73FD8480CA8DF
25,798,682 UART: Caliptra RT
25,799,396 UART: [state] CFI Enabled
25,979,209 UART: [rt] RT listening for mailbox commands...
25,981,104 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,011,989 UART: [rt]cmd =0x4d454153, len=108
26,030,880 >>> mbox cmd response data (12 bytes)
26,031,490 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,061,928 UART: [rt]cmd =0x4d454153, len=108
26,079,512 >>> mbox cmd response data (12 bytes)
26,079,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,110,630 UART: [rt]cmd =0x4d454153, len=108
26,129,910 >>> mbox cmd response data (12 bytes)
26,130,358 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,161,051 UART: [rt]cmd =0x4d454153, len=108
26,180,144 >>> mbox cmd response data (12 bytes)
26,180,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,211,105 UART: [rt]cmd =0x4d454153, len=108
26,229,421 >>> mbox cmd response data (12 bytes)
26,229,841 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,260,425 UART: [rt]cmd =0x4d454153, len=108
26,279,440 >>> mbox cmd response data (12 bytes)
26,279,873 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,310,462 UART: [rt]cmd =0x4d454153, len=108
26,328,515 >>> mbox cmd response data (12 bytes)
26,328,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,359,524 UART: [rt]cmd =0x4d454153, len=108
26,378,696 >>> mbox cmd response data (12 bytes)
26,379,116 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,410,040 UART: [rt]cmd =0x4d454153, len=108
26,429,566 >>> mbox cmd response data (12 bytes)
26,430,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,460,631 UART: [rt]cmd =0x4d454153, len=108
26,479,188 >>> mbox cmd response data (12 bytes)
26,479,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,510,255 UART: [rt]cmd =0x4d454153, len=108
26,529,265 >>> mbox cmd response data (12 bytes)
26,529,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,560,224 UART: [rt]cmd =0x4d454153, len=108
26,579,249 >>> mbox cmd response data (12 bytes)
26,579,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,610,051 UART: [rt]cmd =0x4d454153, len=108
26,629,439 >>> mbox cmd response data (12 bytes)
26,629,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,660,338 UART: [rt]cmd =0x4d454153, len=108
26,678,436 >>> mbox cmd response data (12 bytes)
26,678,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,709,635 UART: [rt]cmd =0x4d454153, len=108
26,712,072 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,460,623 ready_for_fw is high
3,460,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,101 >>> mbox cmd response: success
18,515,434 UART:
18,515,855 UART: Running Caliptra FMC ...
18,517,163 UART:
18,517,337 UART: [state] CFI Enabled
18,583,656 UART: [fht] FMC Alias Private Key: 7
20,349,932 UART: [art] Extend RT PCRs Done
20,351,165 UART: [art] Lock RT PCRs Done
20,352,630 UART: [art] Populate DV Done
20,358,211 UART: [fht] FMC Alias Private Key: 7
20,359,744 UART: [art] Derive CDI
20,360,556 UART: [art] Store in slot 0x4
20,416,169 UART: [art] Derive Key Pair
20,417,206 UART: [art] Store priv key in slot 0x5
22,880,106 UART: [art] Derive Key Pair - Done
22,892,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,096 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,605 UART: [art] PUB.X = 3B29753CEC3BE8F6D5EC121CF9A900C1418AB4424AF782283D4805B108FAC87676D47979CD9A8483FF2ABB26A6BAE20B
24,614,867 UART: [art] PUB.Y = E9460C265A3F2D478F7956AB0C5230A62C6040959E58B77F54059D82361C1BDCD60AEBF0B33E13284631B4EF922E8820
24,622,114 UART: [art] SIG.R = C8A1CB19DA8351DB98AB4B8EC3BB6D8DF37033FF64D58B0C254E686857C9B1074D72971F8FFF135F2990CDEFBB1B113C
24,629,668 UART: [art] SIG.S = B7E3945DBEDFA924382A0CFA70013162D951F04610A03D19A1DED39B34AC9A723FA844E9969BA02DE1BE8A903EA31551
25,608,972 UART: Caliptra RT
25,609,669 UART: [state] CFI Enabled
25,789,825 UART: [rt] RT listening for mailbox commands...
25,791,738 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,822,187 UART: [rt]cmd =0x4d454153, len=108
25,841,025 >>> mbox cmd response data (12 bytes)
25,841,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,872,284 UART: [rt]cmd =0x4d454153, len=108
25,890,675 >>> mbox cmd response data (12 bytes)
25,891,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,921,839 UART: [rt]cmd =0x4d454153, len=108
25,940,210 >>> mbox cmd response data (12 bytes)
25,940,655 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,971,296 UART: [rt]cmd =0x4d454153, len=108
25,989,800 >>> mbox cmd response data (12 bytes)
25,990,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,020,686 UART: [rt]cmd =0x4d454153, len=108
26,039,429 >>> mbox cmd response data (12 bytes)
26,039,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,070,706 UART: [rt]cmd =0x4d454153, len=108
26,089,133 >>> mbox cmd response data (12 bytes)
26,089,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,120,258 UART: [rt]cmd =0x4d454153, len=108
26,138,425 >>> mbox cmd response data (12 bytes)
26,138,846 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,169,738 UART: [rt]cmd =0x4d454153, len=108
26,187,727 >>> mbox cmd response data (12 bytes)
26,188,160 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,218,639 UART: [rt]cmd =0x4d454153, len=108
26,237,081 >>> mbox cmd response data (12 bytes)
26,237,542 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,268,292 UART: [rt]cmd =0x4d454153, len=108
26,287,539 >>> mbox cmd response data (12 bytes)
26,287,953 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,318,767 UART: [rt]cmd =0x4d454153, len=108
26,336,695 >>> mbox cmd response data (12 bytes)
26,337,124 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,367,709 UART: [rt]cmd =0x4d454153, len=108
26,386,300 >>> mbox cmd response data (12 bytes)
26,386,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,417,360 UART: [rt]cmd =0x4d454153, len=108
26,436,821 >>> mbox cmd response data (12 bytes)
26,437,249 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,467,943 UART: [rt]cmd =0x4d454153, len=108
26,486,410 >>> mbox cmd response data (12 bytes)
26,486,837 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,517,635 UART: [rt]cmd =0x4d454153, len=108
26,520,335 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,366 UART:
192,732 UART: Running Caliptra ROM ...
194,032 UART:
603,765 UART: [state] CFI Enabled
617,999 UART: [state] LifecycleState = Unprovisioned
619,948 UART: [state] DebugLocked = No
621,751 UART: [state] WD Timer not started. Device not locked for debugging
626,283 UART: [kat] SHA2-256
805,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,683 UART: [kat] ++
817,150 UART: [kat] sha1
826,536 UART: [kat] SHA2-256
829,266 UART: [kat] SHA2-384
833,783 UART: [kat] SHA2-512-ACC
836,187 UART: [kat] ECC-384
3,281,048 UART: [kat] HMAC-384Kdf
3,291,921 UART: [kat] LMS
3,768,393 UART: [kat] --
3,771,909 UART: [cold-reset] ++
3,774,124 UART: [fht] FHT @ 0x50003400
3,784,529 UART: [idev] ++
3,785,102 UART: [idev] CDI.KEYID = 6
3,786,016 UART: [idev] SUBJECT.KEYID = 7
3,787,269 UART: [idev] UDS.KEYID = 0
3,788,199 ready_for_fw is high
3,788,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,411 UART: [idev] Erasing UDS.KEYID = 0
6,264,577 UART: [idev] Sha1 KeyId Algorithm
6,288,000 UART: [idev] --
6,294,030 UART: [ldev] ++
6,294,615 UART: [ldev] CDI.KEYID = 6
6,295,582 UART: [ldev] SUBJECT.KEYID = 5
6,296,744 UART: [ldev] AUTHORITY.KEYID = 7
6,298,029 UART: [ldev] FE.KEYID = 1
6,311,110 UART: [ldev] Erasing FE.KEYID = 1
8,788,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,891 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,622 UART: [ldev] --
10,582,113 UART: [fwproc] Wait for Commands...
10,584,874 UART: [fwproc] Recv command 0x46574c44
10,586,916 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,960 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,951 >>> mbox cmd response: success
14,560,960 UART: [afmc] ++
14,561,547 UART: [afmc] CDI.KEYID = 6
14,562,488 UART: [afmc] SUBJECT.KEYID = 7
14,563,706 UART: [afmc] AUTHORITY.KEYID = 5
17,067,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,333 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,228 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,795 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,551 UART: [afmc] --
18,869,041 UART: [cold-reset] --
18,871,338 UART: [state] Locking Datavault
18,878,644 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,350 UART: [state] Locking ICCM
18,882,476 UART: [exit] Launching FMC @ 0x40000130
18,890,877 UART:
18,891,110 UART: Running Caliptra FMC ...
18,892,148 UART:
18,892,296 UART: [state] CFI Enabled
18,900,130 UART: [fht] FMC Alias Private Key: 7
20,666,417 UART: [art] Extend RT PCRs Done
20,667,630 UART: [art] Lock RT PCRs Done
20,669,693 UART: [art] Populate DV Done
20,675,050 UART: [fht] FMC Alias Private Key: 7
20,676,681 UART: [art] Derive CDI
20,677,524 UART: [art] Store in slot 0x4
20,720,287 UART: [art] Derive Key Pair
20,721,290 UART: [art] Store priv key in slot 0x5
23,148,151 UART: [art] Derive Key Pair - Done
23,160,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,106 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,609 UART: [art] PUB.X = 8E864CA4F2701E7F137787E03C24DAFC335F167634BB400311D0A634847BEED6B8C0AFABA1BB2E04275088BE9BD5C775
24,875,862 UART: [art] PUB.Y = 1BCA1D4B8E83738042A9E3997E1B435EBA8232DC89915AF4D24FB13FB76C575F701B5C7DFCB4D8E58F99955DED80447B
24,883,148 UART: [art] SIG.R = D1FD1052907A9470A28A14493ECC00639E008875A45D06F2CE3C85D1AB50F5E680562402677B37898B924F579D883489
24,890,487 UART: [art] SIG.S = 5F201EF96668A0D755B19DFBAC7B84F0486E077B5EF4C961FDFF8E86035EB4CCAEEB3F86F19ACCDC56FCD6B9F917AAED
25,869,411 UART: Caliptra RT
25,870,100 UART: [state] CFI Enabled
26,003,667 UART: [rt] RT listening for mailbox commands...
26,005,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,036,180 UART: [rt]cmd =0x4d454153, len=108
26,055,147 >>> mbox cmd response data (12 bytes)
26,055,724 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,086,376 UART: [rt]cmd =0x4d454153, len=108
26,105,260 >>> mbox cmd response data (12 bytes)
26,105,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,136,188 UART: [rt]cmd =0x4d454153, len=108
26,154,880 >>> mbox cmd response data (12 bytes)
26,155,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,186,067 UART: [rt]cmd =0x4d454153, len=108
26,204,699 >>> mbox cmd response data (12 bytes)
26,205,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,235,837 UART: [rt]cmd =0x4d454153, len=108
26,254,501 >>> mbox cmd response data (12 bytes)
26,254,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,285,475 UART: [rt]cmd =0x4d454153, len=108
26,304,171 >>> mbox cmd response data (12 bytes)
26,304,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,335,325 UART: [rt]cmd =0x4d454153, len=108
26,354,747 >>> mbox cmd response data (12 bytes)
26,355,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,385,801 UART: [rt]cmd =0x4d454153, len=108
26,404,354 >>> mbox cmd response data (12 bytes)
26,404,769 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,435,255 UART: [rt]cmd =0x4d454153, len=108
26,453,787 >>> mbox cmd response data (12 bytes)
26,454,219 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,484,750 UART: [rt]cmd =0x4d454153, len=108
26,503,132 >>> mbox cmd response data (12 bytes)
26,503,550 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,534,038 UART: [rt]cmd =0x4d454153, len=108
26,553,164 >>> mbox cmd response data (12 bytes)
26,553,598 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,584,291 UART: [rt]cmd =0x4d454153, len=108
26,603,236 >>> mbox cmd response data (12 bytes)
26,603,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,634,232 UART: [rt]cmd =0x4d454153, len=108
26,652,887 >>> mbox cmd response data (12 bytes)
26,653,302 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,683,840 UART: [rt]cmd =0x4d454153, len=108
26,701,718 >>> mbox cmd response data (12 bytes)
26,702,151 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,732,738 UART: [rt]cmd =0x4d454153, len=108
26,735,066 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,780,687 ready_for_fw is high
3,781,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,095 >>> mbox cmd response: success
18,687,145 UART:
18,687,520 UART: Running Caliptra FMC ...
18,688,716 UART:
18,688,889 UART: [state] CFI Enabled
18,696,728 UART: [fht] FMC Alias Private Key: 7
20,463,640 UART: [art] Extend RT PCRs Done
20,464,863 UART: [art] Lock RT PCRs Done
20,466,546 UART: [art] Populate DV Done
20,472,017 UART: [fht] FMC Alias Private Key: 7
20,473,561 UART: [art] Derive CDI
20,474,377 UART: [art] Store in slot 0x4
20,517,243 UART: [art] Derive Key Pair
20,518,247 UART: [art] Store priv key in slot 0x5
22,945,057 UART: [art] Derive Key Pair - Done
22,957,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,011 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,517 UART: [art] PUB.X = F3AF43BB83079F70012BA46D30943F32A1699F9ACF53C82867E48C38EA77FE895A3697C71D2F7FBFF6FC157A8A5510AC
24,672,775 UART: [art] PUB.Y = 885ADD72BC652D4573697FDE755E72E7C0B25D7CBA315424562FF2553B315E9EC267E02637584EDEFD6B3EF69D7A968F
24,680,039 UART: [art] SIG.R = C72FC04891B2342F398A2702C260B7E4FAD8DC49E0F0D7B6BA3407F285D945399858745C208B2C75E5057D2AEA084F96
24,687,441 UART: [art] SIG.S = 894A3DA687BDA1CF3C9174C77BD266FA091A4154AD086898C609BFEF1C84116BA05314568835621BC4C550EA1408A2FB
25,666,114 UART: Caliptra RT
25,666,817 UART: [state] CFI Enabled
25,799,758 UART: [rt] RT listening for mailbox commands...
25,801,657 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,832,637 UART: [rt]cmd =0x4d454153, len=108
25,851,389 >>> mbox cmd response data (12 bytes)
25,851,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,882,605 UART: [rt]cmd =0x4d454153, len=108
25,901,972 >>> mbox cmd response data (12 bytes)
25,902,437 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,932,943 UART: [rt]cmd =0x4d454153, len=108
25,951,658 >>> mbox cmd response data (12 bytes)
25,952,094 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,982,694 UART: [rt]cmd =0x4d454153, len=108
26,002,083 >>> mbox cmd response data (12 bytes)
26,002,526 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,033,176 UART: [rt]cmd =0x4d454153, len=108
26,052,021 >>> mbox cmd response data (12 bytes)
26,052,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,083,053 UART: [rt]cmd =0x4d454153, len=108
26,101,596 >>> mbox cmd response data (12 bytes)
26,102,029 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,132,787 UART: [rt]cmd =0x4d454153, len=108
26,151,401 >>> mbox cmd response data (12 bytes)
26,151,868 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,182,625 UART: [rt]cmd =0x4d454153, len=108
26,201,681 >>> mbox cmd response data (12 bytes)
26,202,109 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,232,649 UART: [rt]cmd =0x4d454153, len=108
26,251,714 >>> mbox cmd response data (12 bytes)
26,252,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,282,783 UART: [rt]cmd =0x4d454153, len=108
26,301,387 >>> mbox cmd response data (12 bytes)
26,301,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,332,749 UART: [rt]cmd =0x4d454153, len=108
26,352,104 >>> mbox cmd response data (12 bytes)
26,352,530 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,383,388 UART: [rt]cmd =0x4d454153, len=108
26,402,184 >>> mbox cmd response data (12 bytes)
26,402,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,433,262 UART: [rt]cmd =0x4d454153, len=108
26,452,025 >>> mbox cmd response data (12 bytes)
26,452,469 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,483,228 UART: [rt]cmd =0x4d454153, len=108
26,501,965 >>> mbox cmd response data (12 bytes)
26,502,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,533,087 UART: [rt]cmd =0x4d454153, len=108
26,535,254 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,055 UART:
192,425 UART: Running Caliptra ROM ...
193,512 UART:
193,654 UART: [state] CFI Enabled
261,721 UART: [state] LifecycleState = Unprovisioned
264,131 UART: [state] DebugLocked = No
266,645 UART: [state] WD Timer not started. Device not locked for debugging
271,879 UART: [kat] SHA2-256
461,764 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,533 UART: [kat] ++
472,979 UART: [kat] sha1
485,405 UART: [kat] SHA2-256
488,480 UART: [kat] SHA2-384
493,896 UART: [kat] SHA2-512-ACC
496,476 UART: [kat] ECC-384
2,946,827 UART: [kat] HMAC-384Kdf
2,971,514 UART: [kat] LMS
3,503,278 UART: [kat] --
3,509,268 UART: [cold-reset] ++
3,510,344 UART: [fht] FHT @ 0x50003400
3,523,334 UART: [idev] ++
3,524,077 UART: [idev] CDI.KEYID = 6
3,524,965 UART: [idev] SUBJECT.KEYID = 7
3,526,211 UART: [idev] UDS.KEYID = 0
3,527,132 ready_for_fw is high
3,527,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,388 UART: [idev] Erasing UDS.KEYID = 0
6,030,482 UART: [idev] Sha1 KeyId Algorithm
6,053,222 UART: [idev] --
6,058,464 UART: [ldev] ++
6,059,143 UART: [ldev] CDI.KEYID = 6
6,060,031 UART: [ldev] SUBJECT.KEYID = 5
6,061,244 UART: [ldev] AUTHORITY.KEYID = 7
6,062,479 UART: [ldev] FE.KEYID = 1
6,100,600 UART: [ldev] Erasing FE.KEYID = 1
8,603,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,645 UART: [ldev] --
10,413,754 UART: [fwproc] Wait for Commands...
10,416,285 UART: [fwproc] Recv command 0x46574c44
10,418,594 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,142 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,671,890 >>> mbox cmd response: success
14,675,445 UART: [afmc] ++
14,676,163 UART: [afmc] CDI.KEYID = 6
14,677,325 UART: [afmc] SUBJECT.KEYID = 7
14,678,866 UART: [afmc] AUTHORITY.KEYID = 5
17,214,307 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,178 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,333 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,452 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,322 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,158 UART: [afmc] --
19,014,290 UART: [cold-reset] --
19,017,889 UART: [state] Locking Datavault
19,023,363 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,507 UART: [state] Locking ICCM
19,027,932 UART: [exit] Launching FMC @ 0x40000130
19,036,562 UART:
19,036,843 UART: Running Caliptra FMC ...
19,037,968 UART:
19,038,134 UART: [state] CFI Enabled
19,097,033 UART: [fht] FMC Alias Private Key: 7
20,863,832 UART: [art] Extend RT PCRs Done
20,865,053 UART: [art] Lock RT PCRs Done
20,866,866 UART: [art] Populate DV Done
20,872,237 UART: [fht] FMC Alias Private Key: 7
20,873,869 UART: [art] Derive CDI
20,874,622 UART: [art] Store in slot 0x4
20,930,091 UART: [art] Derive Key Pair
20,931,089 UART: [art] Store priv key in slot 0x5
23,393,480 UART: [art] Derive Key Pair - Done
23,406,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,119,518 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,031 UART: [art] PUB.X = 1F8FB4E8C67AB0AEDDED4BF04FFE43EF668153F3A680A2CAB26077296031F59FBE8EBB633C318E7EDA05A8E20AE58391
25,128,296 UART: [art] PUB.Y = 22C4ED39AD45FE7C4410872E4E8A6AEB61CEFA22C5C6EAECDFAE86770337622DDDED841242FDDC7283F73490C0F11DE4
25,135,588 UART: [art] SIG.R = 52DBDA065D012B9FEFAA98F66C76767499169BD9FF4F70B05A06A41AF136842784B2173CA5B07CC0FD666E266C6CD5B9
25,142,944 UART: [art] SIG.S = AAEE87E3EBB91BC78D4B0D1D2609C41355B3DB06B6B5390F0E8D9F72FBF763F80341C64A79F628446167DD5B651A5E35
26,121,941 UART: Caliptra RT
26,122,628 UART: [state] CFI Enabled
26,304,364 UART: [rt] RT listening for mailbox commands...
26,306,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,337,044 UART: [rt]cmd =0x4d454153, len=108
26,355,846 >>> mbox cmd response data (12 bytes)
26,356,383 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,387,139 UART: [rt]cmd =0x4d454153, len=108
26,405,340 >>> mbox cmd response data (12 bytes)
26,405,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,436,371 UART: [rt]cmd =0x4d454153, len=108
26,455,839 >>> mbox cmd response data (12 bytes)
26,456,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,486,853 UART: [rt]cmd =0x4d454153, len=108
26,505,709 >>> mbox cmd response data (12 bytes)
26,506,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,536,733 UART: [rt]cmd =0x4d454153, len=108
26,554,909 >>> mbox cmd response data (12 bytes)
26,555,372 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,586,120 UART: [rt]cmd =0x4d454153, len=108
26,605,075 >>> mbox cmd response data (12 bytes)
26,605,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,636,111 UART: [rt]cmd =0x4d454153, len=108
26,655,238 >>> mbox cmd response data (12 bytes)
26,655,668 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,686,418 UART: [rt]cmd =0x4d454153, len=108
26,705,496 >>> mbox cmd response data (12 bytes)
26,705,912 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,736,615 UART: [rt]cmd =0x4d454153, len=108
26,756,055 >>> mbox cmd response data (12 bytes)
26,756,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,787,293 UART: [rt]cmd =0x4d454153, len=108
26,805,523 >>> mbox cmd response data (12 bytes)
26,805,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,836,626 UART: [rt]cmd =0x4d454153, len=108
26,855,987 >>> mbox cmd response data (12 bytes)
26,856,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,887,020 UART: [rt]cmd =0x4d454153, len=108
26,906,524 >>> mbox cmd response data (12 bytes)
26,906,954 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,937,861 UART: [rt]cmd =0x4d454153, len=108
26,956,032 >>> mbox cmd response data (12 bytes)
26,956,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,987,236 UART: [rt]cmd =0x4d454153, len=108
27,006,215 >>> mbox cmd response data (12 bytes)
27,006,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,037,191 UART: [rt]cmd =0x4d454153, len=108
27,039,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,416,442 ready_for_fw is high
3,416,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,578 >>> mbox cmd response: success
19,102,438 UART:
19,102,855 UART: Running Caliptra FMC ...
19,103,970 UART:
19,104,121 UART: [state] CFI Enabled
19,171,415 UART: [fht] FMC Alias Private Key: 7
20,937,330 UART: [art] Extend RT PCRs Done
20,938,561 UART: [art] Lock RT PCRs Done
20,940,298 UART: [art] Populate DV Done
20,946,040 UART: [fht] FMC Alias Private Key: 7
20,947,638 UART: [art] Derive CDI
20,948,377 UART: [art] Store in slot 0x4
21,003,639 UART: [art] Derive Key Pair
21,004,689 UART: [art] Store priv key in slot 0x5
23,467,650 UART: [art] Derive Key Pair - Done
23,480,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,192,786 UART: [art] Erasing AUTHORITY.KEYID = 7
25,194,284 UART: [art] PUB.X = 9A7E1625036BBD6A31113DEAE39F8B3DD0C8EC61F0EB61F0B62ED5B94A17813E8E18C321910E28372D81499469E89313
25,201,537 UART: [art] PUB.Y = EF30A0773A291E3C5F0B06B4B2AD5E4DBED3E5BE6E47C79A6DEFF0C41D90625BDD218DB7FAB69D9DDF915DBE1D98A672
25,208,792 UART: [art] SIG.R = C7222768F4A6653A2C23EA9C8A0379CC780256C535EBE24953794ABB5F60D21D316453D622C9AD5BE8A2CA809E910904
25,216,195 UART: [art] SIG.S = ACB0000438D209C3FB94138382E07B36747DDE181D84783B9720019CA1D54A9B76DE45F180BBE904E3D1E7FFDE62953B
26,195,198 UART: Caliptra RT
26,195,907 UART: [state] CFI Enabled
26,375,395 UART: [rt] RT listening for mailbox commands...
26,377,294 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,408,025 UART: [rt]cmd =0x4d454153, len=108
26,427,159 >>> mbox cmd response data (12 bytes)
26,427,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,458,399 UART: [rt]cmd =0x4d454153, len=108
26,477,286 >>> mbox cmd response data (12 bytes)
26,477,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,508,614 UART: [rt]cmd =0x4d454153, len=108
26,527,763 >>> mbox cmd response data (12 bytes)
26,528,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,558,736 UART: [rt]cmd =0x4d454153, len=108
26,577,210 >>> mbox cmd response data (12 bytes)
26,577,653 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,608,318 UART: [rt]cmd =0x4d454153, len=108
26,627,689 >>> mbox cmd response data (12 bytes)
26,628,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,658,793 UART: [rt]cmd =0x4d454153, len=108
26,676,952 >>> mbox cmd response data (12 bytes)
26,677,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,708,028 UART: [rt]cmd =0x4d454153, len=108
26,727,186 >>> mbox cmd response data (12 bytes)
26,727,652 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,758,246 UART: [rt]cmd =0x4d454153, len=108
26,777,115 >>> mbox cmd response data (12 bytes)
26,777,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,808,087 UART: [rt]cmd =0x4d454153, len=108
26,827,103 >>> mbox cmd response data (12 bytes)
26,827,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,858,011 UART: [rt]cmd =0x4d454153, len=108
26,876,413 >>> mbox cmd response data (12 bytes)
26,876,833 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,907,759 UART: [rt]cmd =0x4d454153, len=108
26,926,342 >>> mbox cmd response data (12 bytes)
26,926,772 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,957,590 UART: [rt]cmd =0x4d454153, len=108
26,976,982 >>> mbox cmd response data (12 bytes)
26,977,421 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,008,063 UART: [rt]cmd =0x4d454153, len=108
27,027,262 >>> mbox cmd response data (12 bytes)
27,027,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,058,345 UART: [rt]cmd =0x4d454153, len=108
27,077,746 >>> mbox cmd response data (12 bytes)
27,078,184 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,108,721 UART: [rt]cmd =0x4d454153, len=108
27,111,050 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,437 UART:
192,802 UART: Running Caliptra ROM ...
193,924 UART:
603,476 UART: [state] CFI Enabled
618,518 UART: [state] LifecycleState = Unprovisioned
620,928 UART: [state] DebugLocked = No
622,538 UART: [state] WD Timer not started. Device not locked for debugging
627,163 UART: [kat] SHA2-256
816,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,799 UART: [kat] ++
828,248 UART: [kat] sha1
840,759 UART: [kat] SHA2-256
843,778 UART: [kat] SHA2-384
849,152 UART: [kat] SHA2-512-ACC
851,744 UART: [kat] ECC-384
3,295,334 UART: [kat] HMAC-384Kdf
3,308,566 UART: [kat] LMS
3,840,409 UART: [kat] --
3,844,707 UART: [cold-reset] ++
3,845,860 UART: [fht] FHT @ 0x50003400
3,855,940 UART: [idev] ++
3,856,658 UART: [idev] CDI.KEYID = 6
3,857,543 UART: [idev] SUBJECT.KEYID = 7
3,858,791 UART: [idev] UDS.KEYID = 0
3,859,696 ready_for_fw is high
3,859,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,758 UART: [idev] Erasing UDS.KEYID = 0
6,339,409 UART: [idev] Sha1 KeyId Algorithm
6,361,006 UART: [idev] --
6,365,625 UART: [ldev] ++
6,366,307 UART: [ldev] CDI.KEYID = 6
6,367,278 UART: [ldev] SUBJECT.KEYID = 5
6,368,435 UART: [ldev] AUTHORITY.KEYID = 7
6,369,613 UART: [ldev] FE.KEYID = 1
6,380,426 UART: [ldev] Erasing FE.KEYID = 1
8,857,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,544 UART: [ldev] --
10,649,543 UART: [fwproc] Wait for Commands...
10,651,044 UART: [fwproc] Recv command 0x46574c44
10,653,361 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,463 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,245,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,369,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,928,933 >>> mbox cmd response: success
14,933,520 UART: [afmc] ++
14,934,247 UART: [afmc] CDI.KEYID = 6
14,935,448 UART: [afmc] SUBJECT.KEYID = 7
14,936,952 UART: [afmc] AUTHORITY.KEYID = 5
17,442,585 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,166,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,168,107 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,183,231 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,198,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,213,296 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,822 UART: [afmc] --
19,238,779 UART: [cold-reset] --
19,242,164 UART: [state] Locking Datavault
19,248,906 UART: [state] Locking PCR0, PCR1 and PCR31
19,251,075 UART: [state] Locking ICCM
19,253,819 UART: [exit] Launching FMC @ 0x40000130
19,262,471 UART:
19,262,731 UART: Running Caliptra FMC ...
19,263,764 UART:
19,263,914 UART: [state] CFI Enabled
19,272,183 UART: [fht] FMC Alias Private Key: 7
21,038,923 UART: [art] Extend RT PCRs Done
21,040,150 UART: [art] Lock RT PCRs Done
21,041,943 UART: [art] Populate DV Done
21,047,422 UART: [fht] FMC Alias Private Key: 7
21,048,923 UART: [art] Derive CDI
21,049,690 UART: [art] Store in slot 0x4
21,092,190 UART: [art] Derive Key Pair
21,093,195 UART: [art] Store priv key in slot 0x5
23,520,418 UART: [art] Derive Key Pair - Done
23,533,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,239,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,241,340 UART: [art] PUB.X = 30AFB2083D78AE42CA6644755379E0583A447EEC0E09D13F3D7BD7B0BAD330205209CC0EF0782CA31847387D3E6F727F
25,248,553 UART: [art] PUB.Y = 100E80E0CA351601AEC56B3FF1B28D3E70D658A7CE3A55ECAFF12D6E009105866183FF85841A437F4141A833CD086887
25,255,809 UART: [art] SIG.R = BE7419EBD2849492EE9CCDC63A34E96233E31E4B0BF85BD3C7058D89F72B54FD543D049F95DFB838DDA8DE92209717AF
25,263,210 UART: [art] SIG.S = 976AA1F38F5A076CB3B0CAAF03A75D05EE6094E5163D567C2D0423158358A744FE03164AA35919213C56B9DB89B63EF4
26,242,175 UART: Caliptra RT
26,242,868 UART: [state] CFI Enabled
26,375,575 UART: [rt] RT listening for mailbox commands...
26,377,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,408,357 UART: [rt]cmd =0x4d454153, len=108
26,427,127 >>> mbox cmd response data (12 bytes)
26,427,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,458,386 UART: [rt]cmd =0x4d454153, len=108
26,477,730 >>> mbox cmd response data (12 bytes)
26,478,188 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,509,000 UART: [rt]cmd =0x4d454153, len=108
26,528,209 >>> mbox cmd response data (12 bytes)
26,528,644 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,559,462 UART: [rt]cmd =0x4d454153, len=108
26,577,781 >>> mbox cmd response data (12 bytes)
26,578,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,609,056 UART: [rt]cmd =0x4d454153, len=108
26,626,633 >>> mbox cmd response data (12 bytes)
26,627,357 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,657,981 UART: [rt]cmd =0x4d454153, len=108
26,677,298 >>> mbox cmd response data (12 bytes)
26,677,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,708,290 UART: [rt]cmd =0x4d454153, len=108
26,727,327 >>> mbox cmd response data (12 bytes)
26,727,775 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,758,227 UART: [rt]cmd =0x4d454153, len=108
26,777,555 >>> mbox cmd response data (12 bytes)
26,778,035 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,808,744 UART: [rt]cmd =0x4d454153, len=108
26,827,729 >>> mbox cmd response data (12 bytes)
26,828,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,858,642 UART: [rt]cmd =0x4d454153, len=108
26,876,908 >>> mbox cmd response data (12 bytes)
26,877,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,907,936 UART: [rt]cmd =0x4d454153, len=108
26,926,588 >>> mbox cmd response data (12 bytes)
26,927,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,957,898 UART: [rt]cmd =0x4d454153, len=108
26,976,914 >>> mbox cmd response data (12 bytes)
26,977,346 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,007,724 UART: [rt]cmd =0x4d454153, len=108
27,025,602 >>> mbox cmd response data (12 bytes)
27,026,076 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,056,787 UART: [rt]cmd =0x4d454153, len=108
27,076,519 >>> mbox cmd response data (12 bytes)
27,076,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,107,722 UART: [rt]cmd =0x4d454153, len=108
27,109,931 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,753,866 ready_for_fw is high
3,754,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,729 >>> mbox cmd response: success
19,305,053 UART:
19,305,458 UART: Running Caliptra FMC ...
19,306,670 UART:
19,306,841 UART: [state] CFI Enabled
19,314,463 UART: [fht] FMC Alias Private Key: 7
21,080,292 UART: [art] Extend RT PCRs Done
21,081,527 UART: [art] Lock RT PCRs Done
21,083,169 UART: [art] Populate DV Done
21,088,545 UART: [fht] FMC Alias Private Key: 7
21,090,125 UART: [art] Derive CDI
21,090,903 UART: [art] Store in slot 0x4
21,133,559 UART: [art] Derive Key Pair
21,134,566 UART: [art] Store priv key in slot 0x5
23,561,090 UART: [art] Derive Key Pair - Done
23,573,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,924 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,434 UART: [art] PUB.X = B1F7E66AEC307A66D6B6738796F4F29E928D2F2AA71E154FBBC641EBEFA99299ADC3FB36FF0AD8D6D453AE7418DB2E64
25,288,704 UART: [art] PUB.Y = B45E3C163C3E21ABA653220B94E3F1186782E46DCC7D0FECE0843F986C08EC090CA624BB78092A10D3B42A64333C4934
25,295,940 UART: [art] SIG.R = F09985A2B8A3A5057D5337E1A0E5F20A247A3D1DE8B4C64D979C1C328C6C2FAB106DC195F0FF0B62744707A4F088277D
25,303,362 UART: [art] SIG.S = 4306B06B781D0CDC471ADB384A31DEDB67FC018680D2669C6B5CD46D1BFAF1F493C55C117CDA64C99C00382162E26BE9
26,282,034 UART: Caliptra RT
26,282,759 UART: [state] CFI Enabled
26,415,829 UART: [rt] RT listening for mailbox commands...
26,417,729 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,448,445 UART: [rt]cmd =0x4d454153, len=108
26,467,253 >>> mbox cmd response data (12 bytes)
26,467,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,498,510 UART: [rt]cmd =0x4d454153, len=108
26,517,286 >>> mbox cmd response data (12 bytes)
26,517,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,548,289 UART: [rt]cmd =0x4d454153, len=108
26,567,250 >>> mbox cmd response data (12 bytes)
26,567,704 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,598,245 UART: [rt]cmd =0x4d454153, len=108
26,617,446 >>> mbox cmd response data (12 bytes)
26,617,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,648,680 UART: [rt]cmd =0x4d454153, len=108
26,666,930 >>> mbox cmd response data (12 bytes)
26,667,377 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,698,031 UART: [rt]cmd =0x4d454153, len=108
26,716,784 >>> mbox cmd response data (12 bytes)
26,717,222 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,748,138 UART: [rt]cmd =0x4d454153, len=108
26,766,632 >>> mbox cmd response data (12 bytes)
26,767,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,797,820 UART: [rt]cmd =0x4d454153, len=108
26,816,529 >>> mbox cmd response data (12 bytes)
26,816,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,847,536 UART: [rt]cmd =0x4d454153, len=108
26,866,707 >>> mbox cmd response data (12 bytes)
26,867,145 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,897,737 UART: [rt]cmd =0x4d454153, len=108
26,916,988 >>> mbox cmd response data (12 bytes)
26,917,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,948,062 UART: [rt]cmd =0x4d454153, len=108
26,966,595 >>> mbox cmd response data (12 bytes)
26,967,024 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,997,406 UART: [rt]cmd =0x4d454153, len=108
27,016,491 >>> mbox cmd response data (12 bytes)
27,016,967 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,047,945 UART: [rt]cmd =0x4d454153, len=108
27,066,794 >>> mbox cmd response data (12 bytes)
27,067,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,097,725 UART: [rt]cmd =0x4d454153, len=108
27,116,907 >>> mbox cmd response data (12 bytes)
27,117,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,147,936 UART: [rt]cmd =0x4d454153, len=108
27,150,110 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,941 UART: [kat] SHA2-256
881,872 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,987 UART: [kat] ++
886,139 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,966 UART: [kat] SHA2-512-ACC
896,867 UART: [kat] ECC-384
902,522 UART: [kat] HMAC-384Kdf
906,884 UART: [kat] LMS
1,475,080 UART: [kat] --
1,476,305 UART: [cold-reset] ++
1,476,733 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 ready_for_fw is high
1,480,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,980 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,020 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,853 UART: [ldev] Erasing FE.KEYID = 1
1,547,280 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,568 UART: [ldev] --
1,586,851 UART: [fwproc] Waiting for Commands...
1,587,510 UART: [fwproc] Received command 0x46574c44
1,588,301 UART: [fwproc] Received Image of size 118548 bytes
2,933,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,019 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,532 >>> mbox cmd response: success
3,133,774 UART: [afmc] ++
3,133,942 UART: [afmc] CDI.KEYID = 6
3,134,304 UART: [afmc] SUBJECT.KEYID = 7
3,134,729 UART: [afmc] AUTHORITY.KEYID = 5
3,169,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,894 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,383 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,266 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,949 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,803 UART: [afmc] --
3,212,717 UART: [cold-reset] --
3,213,387 UART: [state] Locking Datavault
3,214,386 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,990 UART: [state] Locking ICCM
3,215,644 UART: [exit] Launching FMC @ 0x40000130
3,220,974 UART:
3,220,990 UART: Running Caliptra FMC ...
3,221,398 UART:
3,221,452 UART: [state] CFI Enabled
3,231,738 UART: [fht] FMC Alias Private Key: 7
3,350,520 UART: [art] Extend RT PCRs Done
3,350,948 UART: [art] Lock RT PCRs Done
3,352,390 UART: [art] Populate DV Done
3,360,751 UART: [fht] FMC Alias Private Key: 7
3,361,847 UART: [art] Derive CDI
3,362,127 UART: [art] Store in slot 0x4
3,447,563 UART: [art] Derive Key Pair
3,447,923 UART: [art] Store priv key in slot 0x5
3,461,002 UART: [art] Derive Key Pair - Done
3,475,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,824 UART: [art] PUB.X = 103DF93CA89100C9BB25D2E16DF3DF7BC5ACCFA7CA625F8B657B288297BD89F0D83042CF5ED31EC5A4EBE2D5C9E73F7E
3,498,598 UART: [art] PUB.Y = BB9BE80137AB753D71B0696BD86F08431AB1F04B16E0D0609010B8D516E6EF5E046B52D86930CAE46CA6B865040D696D
3,505,537 UART: [art] SIG.R = 32E0CA2C3204DF11A80F6B7A07F7A65A58447D4DB33DB2F9D5CCB3D89FDF3818F4840F1EE32C788D774E3D2C64F55962
3,512,307 UART: [art] SIG.S = 6C583E756257DD8A2F79E2D72EC0BBBB4B88E857F10AB4084D8D9818E335161814A38CB0A05715406EC0983FDD4974C5
3,536,145 UART: Caliptra RT
3,536,396 UART: [state] CFI Enabled
3,656,229 UART: [rt] RT listening for mailbox commands...
3,656,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,787 UART: [rt]cmd =0x4d454153, len=108
3,708,639 >>> mbox cmd response data (12 bytes)
3,708,640 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,769 UART: [rt]cmd =0x4d454153, len=108
3,758,738 >>> mbox cmd response data (12 bytes)
3,758,739 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,778 UART: [rt]cmd =0x4d454153, len=108
3,809,232 >>> mbox cmd response data (12 bytes)
3,809,233 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,320 UART: [rt]cmd =0x4d454153, len=108
3,860,485 >>> mbox cmd response data (12 bytes)
3,860,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,589 UART: [rt]cmd =0x4d454153, len=108
3,911,769 >>> mbox cmd response data (12 bytes)
3,911,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,847 UART: [rt]cmd =0x4d454153, len=108
3,962,994 >>> mbox cmd response data (12 bytes)
3,962,995 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,038 UART: [rt]cmd =0x4d454153, len=108
4,014,680 >>> mbox cmd response data (12 bytes)
4,014,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,642 UART: [rt]cmd =0x4d454153, len=108
4,064,909 >>> mbox cmd response data (12 bytes)
4,064,910 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,094,681 UART: [rt]cmd =0x4d454153, len=108
4,115,645 >>> mbox cmd response data (12 bytes)
4,115,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,669 UART: [rt]cmd =0x4d454153, len=108
4,166,942 >>> mbox cmd response data (12 bytes)
4,166,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,072 UART: [rt]cmd =0x4d454153, len=108
4,217,206 >>> mbox cmd response data (12 bytes)
4,217,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,247,452 UART: [rt]cmd =0x4d454153, len=108
4,268,217 >>> mbox cmd response data (12 bytes)
4,268,218 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,279 UART: [rt]cmd =0x4d454153, len=108
4,319,647 >>> mbox cmd response data (12 bytes)
4,319,648 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,349,453 UART: [rt]cmd =0x4d454153, len=108
4,370,116 >>> mbox cmd response data (12 bytes)
4,370,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,400,026 UART: [rt]cmd =0x4d454153, len=108
4,402,067 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,859 ready_for_fw is high
1,362,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,942 >>> mbox cmd response: success
3,042,799 UART:
3,042,815 UART: Running Caliptra FMC ...
3,043,223 UART:
3,043,277 UART: [state] CFI Enabled
3,053,579 UART: [fht] FMC Alias Private Key: 7
3,172,725 UART: [art] Extend RT PCRs Done
3,173,153 UART: [art] Lock RT PCRs Done
3,174,755 UART: [art] Populate DV Done
3,183,090 UART: [fht] FMC Alias Private Key: 7
3,184,144 UART: [art] Derive CDI
3,184,424 UART: [art] Store in slot 0x4
3,270,224 UART: [art] Derive Key Pair
3,270,584 UART: [art] Store priv key in slot 0x5
3,284,013 UART: [art] Derive Key Pair - Done
3,298,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,014 UART: [art] PUB.X = 5B6E93C9FB14F74C5B3DA9943B0CD223F8FF06E57EDA7DF306869B3B2EBC5C26F2AE4233D2BE97A7D942621F80035C04
3,321,783 UART: [art] PUB.Y = 8B693B8DC47E6C93E2B8CA3485B9CC2CC9FA3DECEA0763EC6E1378FEDA69D0F4C2AF9006E8AE63A28C48437BA7A47461
3,328,749 UART: [art] SIG.R = 8E92374C4DC9F5A0C1B7BC6993C46BBE14933552F34F73D6A786250D93A1FCAEDE1B814AE28C7B4FAFAEEFABAE9ED835
3,335,542 UART: [art] SIG.S = 29D60AA5929B446F8457076CF4EF9EE80FEDD3E20923F61919068730E9587DE4C617504CB0147914409E364F7B5F2FA2
3,359,703 UART: Caliptra RT
3,359,954 UART: [state] CFI Enabled
3,479,886 UART: [rt] RT listening for mailbox commands...
3,480,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,334 UART: [rt]cmd =0x4d454153, len=108
3,531,330 >>> mbox cmd response data (12 bytes)
3,531,331 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,302 UART: [rt]cmd =0x4d454153, len=108
3,582,223 >>> mbox cmd response data (12 bytes)
3,582,224 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,295 UART: [rt]cmd =0x4d454153, len=108
3,632,437 >>> mbox cmd response data (12 bytes)
3,632,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,621 UART: [rt]cmd =0x4d454153, len=108
3,683,234 >>> mbox cmd response data (12 bytes)
3,683,235 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,364 UART: [rt]cmd =0x4d454153, len=108
3,734,930 >>> mbox cmd response data (12 bytes)
3,734,931 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,764,900 UART: [rt]cmd =0x4d454153, len=108
3,785,121 >>> mbox cmd response data (12 bytes)
3,785,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,111 UART: [rt]cmd =0x4d454153, len=108
3,836,739 >>> mbox cmd response data (12 bytes)
3,836,740 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,866,453 UART: [rt]cmd =0x4d454153, len=108
3,887,776 >>> mbox cmd response data (12 bytes)
3,887,777 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,917,786 UART: [rt]cmd =0x4d454153, len=108
3,938,386 >>> mbox cmd response data (12 bytes)
3,938,387 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,968,536 UART: [rt]cmd =0x4d454153, len=108
3,989,381 >>> mbox cmd response data (12 bytes)
3,989,382 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,625 UART: [rt]cmd =0x4d454153, len=108
4,040,701 >>> mbox cmd response data (12 bytes)
4,040,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,815 UART: [rt]cmd =0x4d454153, len=108
4,091,616 >>> mbox cmd response data (12 bytes)
4,091,617 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,462 UART: [rt]cmd =0x4d454153, len=108
4,141,658 >>> mbox cmd response data (12 bytes)
4,141,659 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,506 UART: [rt]cmd =0x4d454153, len=108
4,192,193 >>> mbox cmd response data (12 bytes)
4,192,194 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,222,147 UART: [rt]cmd =0x4d454153, len=108
4,224,206 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,130 UART: [kat] SHA2-256
882,061 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,176 UART: [kat] ++
886,328 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,339 UART: [kat] SHA2-512-ACC
897,240 UART: [kat] ECC-384
902,519 UART: [kat] HMAC-384Kdf
907,053 UART: [kat] LMS
1,475,249 UART: [kat] --
1,476,102 UART: [cold-reset] ++
1,476,678 UART: [fht] Storing FHT @ 0x50003400
1,479,459 UART: [idev] ++
1,479,627 UART: [idev] CDI.KEYID = 6
1,479,987 UART: [idev] SUBJECT.KEYID = 7
1,480,411 UART: [idev] UDS.KEYID = 0
1,480,756 ready_for_fw is high
1,480,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,315 UART: [idev] Erasing UDS.KEYID = 0
1,505,039 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,697 UART: [idev] --
1,514,726 UART: [ldev] ++
1,514,894 UART: [ldev] CDI.KEYID = 6
1,515,257 UART: [ldev] SUBJECT.KEYID = 5
1,515,683 UART: [ldev] AUTHORITY.KEYID = 7
1,516,146 UART: [ldev] FE.KEYID = 1
1,521,356 UART: [ldev] Erasing FE.KEYID = 1
1,547,129 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,157 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,223 UART: [fwproc] Received command 0x46574c44
1,588,014 UART: [fwproc] Received Image of size 118548 bytes
2,932,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,852 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,303 >>> mbox cmd response: success
3,132,351 UART: [afmc] ++
3,132,519 UART: [afmc] CDI.KEYID = 6
3,132,881 UART: [afmc] SUBJECT.KEYID = 7
3,133,306 UART: [afmc] AUTHORITY.KEYID = 5
3,167,701 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,556 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,439 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,122 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,084 UART: [afmc] --
3,211,202 UART: [cold-reset] --
3,212,064 UART: [state] Locking Datavault
3,213,097 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,701 UART: [state] Locking ICCM
3,214,329 UART: [exit] Launching FMC @ 0x40000130
3,219,659 UART:
3,219,675 UART: Running Caliptra FMC ...
3,220,083 UART:
3,220,226 UART: [state] CFI Enabled
3,230,552 UART: [fht] FMC Alias Private Key: 7
3,349,196 UART: [art] Extend RT PCRs Done
3,349,624 UART: [art] Lock RT PCRs Done
3,351,078 UART: [art] Populate DV Done
3,359,373 UART: [fht] FMC Alias Private Key: 7
3,360,323 UART: [art] Derive CDI
3,360,603 UART: [art] Store in slot 0x4
3,446,291 UART: [art] Derive Key Pair
3,446,651 UART: [art] Store priv key in slot 0x5
3,459,928 UART: [art] Derive Key Pair - Done
3,474,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,936 UART: [art] PUB.X = EDF377BA341C31230DED903E30E22DAA81DE187FCBE7A1AAFDF5983270CCA00CC7493376A715129525ECBE7CE88BABC9
3,497,722 UART: [art] PUB.Y = 648578F2841E18E48EBAFF689A3DA579FD9254A2BFC44E0784B11978489AF59B57A63C97311EDF5918FEFD735E13E01D
3,504,675 UART: [art] SIG.R = F79CF718617D3CA87C757114E5ED40621E8F245CC300F9A36BF4A6720AA9E7C5E3DE044AF4DF29A73FFC350D1FA0E4DB
3,511,432 UART: [art] SIG.S = 7F5A72F74FB7357FDD9746DD6CB8C1BF5840EF30A5D78961EB35B1FD9747A97175BF1D70C1565246D04793A2DAACBBF7
3,534,764 UART: Caliptra RT
3,535,107 UART: [state] CFI Enabled
3,656,159 UART: [rt] RT listening for mailbox commands...
3,656,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,173 UART: [rt]cmd =0x4d454153, len=108
3,708,875 >>> mbox cmd response data (12 bytes)
3,708,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,835 UART: [rt]cmd =0x4d454153, len=108
3,759,096 >>> mbox cmd response data (12 bytes)
3,759,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,036 UART: [rt]cmd =0x4d454153, len=108
3,809,886 >>> mbox cmd response data (12 bytes)
3,809,887 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,894 UART: [rt]cmd =0x4d454153, len=108
3,860,411 >>> mbox cmd response data (12 bytes)
3,860,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,249 UART: [rt]cmd =0x4d454153, len=108
3,911,283 >>> mbox cmd response data (12 bytes)
3,911,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,343 UART: [rt]cmd =0x4d454153, len=108
3,962,586 >>> mbox cmd response data (12 bytes)
3,962,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,680 UART: [rt]cmd =0x4d454153, len=108
4,013,894 >>> mbox cmd response data (12 bytes)
4,013,895 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,750 UART: [rt]cmd =0x4d454153, len=108
4,065,757 >>> mbox cmd response data (12 bytes)
4,065,758 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,745 UART: [rt]cmd =0x4d454153, len=108
4,116,199 >>> mbox cmd response data (12 bytes)
4,116,200 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,146,289 UART: [rt]cmd =0x4d454153, len=108
4,167,578 >>> mbox cmd response data (12 bytes)
4,167,579 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,404 UART: [rt]cmd =0x4d454153, len=108
4,218,810 >>> mbox cmd response data (12 bytes)
4,218,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,732 UART: [rt]cmd =0x4d454153, len=108
4,269,803 >>> mbox cmd response data (12 bytes)
4,269,804 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,299,791 UART: [rt]cmd =0x4d454153, len=108
4,320,289 >>> mbox cmd response data (12 bytes)
4,320,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,355 UART: [rt]cmd =0x4d454153, len=108
4,371,152 >>> mbox cmd response data (12 bytes)
4,371,153 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,400,950 UART: [rt]cmd =0x4d454153, len=108
4,403,051 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,724 ready_for_fw is high
1,362,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,003 >>> mbox cmd response: success
3,042,940 UART:
3,042,956 UART: Running Caliptra FMC ...
3,043,364 UART:
3,043,507 UART: [state] CFI Enabled
3,054,051 UART: [fht] FMC Alias Private Key: 7
3,173,469 UART: [art] Extend RT PCRs Done
3,173,897 UART: [art] Lock RT PCRs Done
3,175,143 UART: [art] Populate DV Done
3,183,364 UART: [fht] FMC Alias Private Key: 7
3,184,396 UART: [art] Derive CDI
3,184,676 UART: [art] Store in slot 0x4
3,270,810 UART: [art] Derive Key Pair
3,271,170 UART: [art] Store priv key in slot 0x5
3,284,607 UART: [art] Derive Key Pair - Done
3,299,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,848 UART: [art] PUB.X = 98DB7EDF697D9BA4FADF4E83F7553D115298BFECE2752482D0F4D9DBEFFE7EEA60320D0F2341D1C0087DB8004FE1678C
3,322,607 UART: [art] PUB.Y = F8A25D14D76033D741DA4007100E5152268C971A67790B321522ADF9800E46B7AA08BA6EB31541B437163AEC77F1F8D2
3,329,538 UART: [art] SIG.R = F23E1121C2B3F44D33FD94E24FB0A2BB547888615D1143C378A96221911DFD6C11246C59D7DC4BA4C220124328DAC6F7
3,336,310 UART: [art] SIG.S = 697F559D5956A53B64DCD78AA8D2AF60F3DBD0382757E4CD716E1684251E43753CE75BC04A71F50972E54EA07BC702D4
3,360,436 UART: Caliptra RT
3,360,779 UART: [state] CFI Enabled
3,481,391 UART: [rt] RT listening for mailbox commands...
3,482,061 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,403 UART: [rt]cmd =0x4d454153, len=108
3,533,229 >>> mbox cmd response data (12 bytes)
3,533,230 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,377 UART: [rt]cmd =0x4d454153, len=108
3,583,984 >>> mbox cmd response data (12 bytes)
3,583,985 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,614,072 UART: [rt]cmd =0x4d454153, len=108
3,634,604 >>> mbox cmd response data (12 bytes)
3,634,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,710 UART: [rt]cmd =0x4d454153, len=108
3,685,233 >>> mbox cmd response data (12 bytes)
3,685,234 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,065 UART: [rt]cmd =0x4d454153, len=108
3,736,751 >>> mbox cmd response data (12 bytes)
3,736,752 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,766,901 UART: [rt]cmd =0x4d454153, len=108
3,788,154 >>> mbox cmd response data (12 bytes)
3,788,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,358 UART: [rt]cmd =0x4d454153, len=108
3,838,888 >>> mbox cmd response data (12 bytes)
3,838,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,988 UART: [rt]cmd =0x4d454153, len=108
3,890,091 >>> mbox cmd response data (12 bytes)
3,890,092 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,049 UART: [rt]cmd =0x4d454153, len=108
3,941,565 >>> mbox cmd response data (12 bytes)
3,941,566 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,827 UART: [rt]cmd =0x4d454153, len=108
3,992,208 >>> mbox cmd response data (12 bytes)
3,992,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,210 UART: [rt]cmd =0x4d454153, len=108
4,043,326 >>> mbox cmd response data (12 bytes)
4,043,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,454 UART: [rt]cmd =0x4d454153, len=108
4,094,531 >>> mbox cmd response data (12 bytes)
4,094,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,621 UART: [rt]cmd =0x4d454153, len=108
4,144,593 >>> mbox cmd response data (12 bytes)
4,144,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,174,747 UART: [rt]cmd =0x4d454153, len=108
4,196,324 >>> mbox cmd response data (12 bytes)
4,196,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,226,410 UART: [rt]cmd =0x4d454153, len=108
4,228,061 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,070 UART: [state] LifecycleState = Unprovisioned
85,725 UART: [state] DebugLocked = No
86,249 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,474 UART: [kat] SHA2-256
901,414 UART: [kat] SHA2-384
904,131 UART: [kat] SHA2-512-ACC
906,032 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
919,951 UART: [kat] LMS
1,168,263 UART: [kat] --
1,169,462 UART: [cold-reset] ++
1,170,030 UART: [fht] FHT @ 0x50003400
1,172,596 UART: [idev] ++
1,172,764 UART: [idev] CDI.KEYID = 6
1,173,125 UART: [idev] SUBJECT.KEYID = 7
1,173,550 UART: [idev] UDS.KEYID = 0
1,173,896 ready_for_fw is high
1,173,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,199,015 UART: [idev] Sha1 KeyId Algorithm
1,207,899 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,404 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,739 UART: [fwproc] Wait for Commands...
1,281,344 UART: [fwproc] Recv command 0x46574c44
1,282,077 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,052 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,857 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,032 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,427 >>> mbox cmd response: success
2,826,613 UART: [afmc] ++
2,826,781 UART: [afmc] CDI.KEYID = 6
2,827,144 UART: [afmc] SUBJECT.KEYID = 7
2,827,570 UART: [afmc] AUTHORITY.KEYID = 5
2,863,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,142 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,601 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,482 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,183 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,946 UART: [afmc] --
2,906,851 UART: [cold-reset] --
2,907,713 UART: [state] Locking Datavault
2,908,654 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,258 UART: [state] Locking ICCM
2,909,768 UART: [exit] Launching FMC @ 0x40000130
2,915,098 UART:
2,915,114 UART: Running Caliptra FMC ...
2,915,522 UART:
2,915,576 UART: [state] CFI Enabled
2,925,952 UART: [fht] FMC Alias Private Key: 7
3,045,644 UART: [art] Extend RT PCRs Done
3,046,072 UART: [art] Lock RT PCRs Done
3,047,822 UART: [art] Populate DV Done
3,056,227 UART: [fht] FMC Alias Private Key: 7
3,057,165 UART: [art] Derive CDI
3,057,445 UART: [art] Store in slot 0x4
3,142,954 UART: [art] Derive Key Pair
3,143,314 UART: [art] Store priv key in slot 0x5
3,157,270 UART: [art] Derive Key Pair - Done
3,171,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,505 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,270 UART: [art] PUB.X = 46A9EA3DBEAA1EE1DEFF05AB43A43B6D7EAA5B3991B7F0351848C9D86C2978BD7C9A903590033CB09CE79DE59AC2A35D
3,195,056 UART: [art] PUB.Y = BA714611844D48E0822261F672673537CC833183B2813A11F88D3876DB6B9A583D718E2C76C53B9C73632C222111A6F5
3,201,992 UART: [art] SIG.R = 96331404CA894AD34373993E76617B2622A7CDDE831427BF0BCD3C9CAE7B7FB2E16A5145EC99048111247AEBEF76CF6D
3,208,761 UART: [art] SIG.S = FADABC844E0CEA68EA582B873AC5E4CB7CEB743784490AC35EA96C8EF997ADF4474BF85ABF2CC1E82E754CB9617977CE
3,231,683 UART: Caliptra RT
3,231,934 UART: [state] CFI Enabled
3,351,226 UART: [rt] RT listening for mailbox commands...
3,351,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,460 UART: [rt]cmd =0x4d454153, len=108
3,402,796 >>> mbox cmd response data (12 bytes)
3,402,797 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,726 UART: [rt]cmd =0x4d454153, len=108
3,453,875 >>> mbox cmd response data (12 bytes)
3,453,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,919 UART: [rt]cmd =0x4d454153, len=108
3,504,567 >>> mbox cmd response data (12 bytes)
3,504,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,534,479 UART: [rt]cmd =0x4d454153, len=108
3,555,990 >>> mbox cmd response data (12 bytes)
3,555,991 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,902 UART: [rt]cmd =0x4d454153, len=108
3,607,198 >>> mbox cmd response data (12 bytes)
3,607,199 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,518 UART: [rt]cmd =0x4d454153, len=108
3,658,215 >>> mbox cmd response data (12 bytes)
3,658,216 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,583 UART: [rt]cmd =0x4d454153, len=108
3,709,463 >>> mbox cmd response data (12 bytes)
3,709,464 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,451 UART: [rt]cmd =0x4d454153, len=108
3,760,204 >>> mbox cmd response data (12 bytes)
3,760,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,282 UART: [rt]cmd =0x4d454153, len=108
3,811,850 >>> mbox cmd response data (12 bytes)
3,811,851 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,886 UART: [rt]cmd =0x4d454153, len=108
3,863,563 >>> mbox cmd response data (12 bytes)
3,863,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,743 UART: [rt]cmd =0x4d454153, len=108
3,914,947 >>> mbox cmd response data (12 bytes)
3,914,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,873 UART: [rt]cmd =0x4d454153, len=108
3,966,194 >>> mbox cmd response data (12 bytes)
3,966,195 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,996,282 UART: [rt]cmd =0x4d454153, len=108
4,016,324 >>> mbox cmd response data (12 bytes)
4,016,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,298 UART: [rt]cmd =0x4d454153, len=108
4,067,675 >>> mbox cmd response data (12 bytes)
4,067,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,969 UART: [rt]cmd =0x4d454153, len=108
4,100,052 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,484 ready_for_fw is high
1,059,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,184 >>> mbox cmd response: success
2,738,841 UART:
2,738,857 UART: Running Caliptra FMC ...
2,739,265 UART:
2,739,319 UART: [state] CFI Enabled
2,750,211 UART: [fht] FMC Alias Private Key: 7
2,869,199 UART: [art] Extend RT PCRs Done
2,869,627 UART: [art] Lock RT PCRs Done
2,870,997 UART: [art] Populate DV Done
2,879,136 UART: [fht] FMC Alias Private Key: 7
2,880,088 UART: [art] Derive CDI
2,880,368 UART: [art] Store in slot 0x4
2,966,153 UART: [art] Derive Key Pair
2,966,513 UART: [art] Store priv key in slot 0x5
2,980,147 UART: [art] Derive Key Pair - Done
2,995,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,342 UART: [art] PUB.X = EF4A620733F54EEB0B6D1835945B3AAAFD43ABA7D811DCE49B2D170A076F2ABD7A824458D46D787D83FAB3E828C82012
3,018,114 UART: [art] PUB.Y = 17749C712D9C102E071FE912ED0671F17D753D2067EF20861BB0E97D48A1ECF417FF3C5476AFA79BDA0019D26400EEC3
3,025,020 UART: [art] SIG.R = FECF556E175F43CA9D059C4429C47265143D43B622B23B78037119F5406D20CC42AA599C27AD88EA764CBA73E6D209AB
3,031,785 UART: [art] SIG.S = 1A94A370060323662CE50DD9DEEB73B93122F33A156BC9FCA38E5F2820FAC3D0E5EEE82EC3A8F623F4CFC8B855B0AF6F
3,055,096 UART: Caliptra RT
3,055,347 UART: [state] CFI Enabled
3,174,668 UART: [rt] RT listening for mailbox commands...
3,175,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,062 UART: [rt]cmd =0x4d454153, len=108
3,227,068 >>> mbox cmd response data (12 bytes)
3,227,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,257,004 UART: [rt]cmd =0x4d454153, len=108
3,278,129 >>> mbox cmd response data (12 bytes)
3,278,130 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,291 UART: [rt]cmd =0x4d454153, len=108
3,328,957 >>> mbox cmd response data (12 bytes)
3,328,958 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,359,073 UART: [rt]cmd =0x4d454153, len=108
3,380,022 >>> mbox cmd response data (12 bytes)
3,380,023 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,960 UART: [rt]cmd =0x4d454153, len=108
3,430,896 >>> mbox cmd response data (12 bytes)
3,430,897 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,012 UART: [rt]cmd =0x4d454153, len=108
3,481,265 >>> mbox cmd response data (12 bytes)
3,481,266 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,327 UART: [rt]cmd =0x4d454153, len=108
3,532,719 >>> mbox cmd response data (12 bytes)
3,532,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,562,683 UART: [rt]cmd =0x4d454153, len=108
3,583,702 >>> mbox cmd response data (12 bytes)
3,583,703 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,902 UART: [rt]cmd =0x4d454153, len=108
3,634,802 >>> mbox cmd response data (12 bytes)
3,634,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,914 UART: [rt]cmd =0x4d454153, len=108
3,686,413 >>> mbox cmd response data (12 bytes)
3,686,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,281 UART: [rt]cmd =0x4d454153, len=108
3,737,775 >>> mbox cmd response data (12 bytes)
3,737,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,767,915 UART: [rt]cmd =0x4d454153, len=108
3,788,620 >>> mbox cmd response data (12 bytes)
3,788,621 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,438 UART: [rt]cmd =0x4d454153, len=108
3,838,950 >>> mbox cmd response data (12 bytes)
3,838,951 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,990 UART: [rt]cmd =0x4d454153, len=108
3,889,695 >>> mbox cmd response data (12 bytes)
3,889,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,919,783 UART: [rt]cmd =0x4d454153, len=108
3,921,558 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,860 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,003 UART: [kat] SHA2-256
901,943 UART: [kat] SHA2-384
904,726 UART: [kat] SHA2-512-ACC
906,627 UART: [kat] ECC-384
916,344 UART: [kat] HMAC-384Kdf
921,024 UART: [kat] LMS
1,169,336 UART: [kat] --
1,170,573 UART: [cold-reset] ++
1,170,919 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,174,853 ready_for_fw is high
1,174,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,354 UART: [idev] Erasing UDS.KEYID = 0
1,199,054 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,209,097 UART: [ldev] ++
1,209,265 UART: [ldev] CDI.KEYID = 6
1,209,629 UART: [ldev] SUBJECT.KEYID = 5
1,210,056 UART: [ldev] AUTHORITY.KEYID = 7
1,210,519 UART: [ldev] FE.KEYID = 1
1,215,825 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,355 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,163 UART: [fwproc] Recv command 0x46574c44
1,282,896 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,460 >>> mbox cmd response: success
2,828,562 UART: [afmc] ++
2,828,730 UART: [afmc] CDI.KEYID = 6
2,829,093 UART: [afmc] SUBJECT.KEYID = 7
2,829,519 UART: [afmc] AUTHORITY.KEYID = 5
2,864,648 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,965 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,424 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,305 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,006 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,759 UART: [afmc] --
2,907,674 UART: [cold-reset] --
2,908,624 UART: [state] Locking Datavault
2,909,565 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,169 UART: [state] Locking ICCM
2,910,599 UART: [exit] Launching FMC @ 0x40000130
2,915,929 UART:
2,915,945 UART: Running Caliptra FMC ...
2,916,353 UART:
2,916,496 UART: [state] CFI Enabled
2,926,990 UART: [fht] FMC Alias Private Key: 7
3,046,232 UART: [art] Extend RT PCRs Done
3,046,660 UART: [art] Lock RT PCRs Done
3,048,078 UART: [art] Populate DV Done
3,056,247 UART: [fht] FMC Alias Private Key: 7
3,057,247 UART: [art] Derive CDI
3,057,527 UART: [art] Store in slot 0x4
3,143,288 UART: [art] Derive Key Pair
3,143,648 UART: [art] Store priv key in slot 0x5
3,156,764 UART: [art] Derive Key Pair - Done
3,171,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,349 UART: [art] PUB.X = 48ADF8B96490AC7BD5825B3D1A1F5372E46C9D312FFA224E239B091349C772C7E79E03CDF4BDDC31503FC6A2DCA6E3DB
3,195,131 UART: [art] PUB.Y = E8C15413D1C141B01346566421E5CCACB701181F0EC25DCEBFDC9B0FA1C963E5ED8973D2D609983995B9663ED3FFFB8D
3,202,083 UART: [art] SIG.R = 82CC3BDD9E30E4265FFC2D58D156EFB8AE8EBC37469E49E23D8E4827026B8A4839A99D59CC36B6FCED7608258E95F9A0
3,208,861 UART: [art] SIG.S = DEEE867C37403B38BD5521F5195BA131A9FB868B07B282A5D8C73E1CFEF9F063D82C4C7BEF51A04111AB0F71892C0612
3,232,776 UART: Caliptra RT
3,233,119 UART: [state] CFI Enabled
3,352,373 UART: [rt] RT listening for mailbox commands...
3,353,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,497 UART: [rt]cmd =0x4d454153, len=108
3,404,883 >>> mbox cmd response data (12 bytes)
3,404,884 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,033 UART: [rt]cmd =0x4d454153, len=108
3,455,668 >>> mbox cmd response data (12 bytes)
3,455,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,748 UART: [rt]cmd =0x4d454153, len=108
3,506,634 >>> mbox cmd response data (12 bytes)
3,506,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,536,640 UART: [rt]cmd =0x4d454153, len=108
3,557,143 >>> mbox cmd response data (12 bytes)
3,557,144 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,029 UART: [rt]cmd =0x4d454153, len=108
3,607,895 >>> mbox cmd response data (12 bytes)
3,607,896 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,923 UART: [rt]cmd =0x4d454153, len=108
3,659,306 >>> mbox cmd response data (12 bytes)
3,659,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,092 UART: [rt]cmd =0x4d454153, len=108
3,710,474 >>> mbox cmd response data (12 bytes)
3,710,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,470 UART: [rt]cmd =0x4d454153, len=108
3,761,063 >>> mbox cmd response data (12 bytes)
3,761,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,315 UART: [rt]cmd =0x4d454153, len=108
3,812,235 >>> mbox cmd response data (12 bytes)
3,812,236 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,367 UART: [rt]cmd =0x4d454153, len=108
3,862,802 >>> mbox cmd response data (12 bytes)
3,862,803 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,874 UART: [rt]cmd =0x4d454153, len=108
3,913,760 >>> mbox cmd response data (12 bytes)
3,913,761 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,744 UART: [rt]cmd =0x4d454153, len=108
3,964,321 >>> mbox cmd response data (12 bytes)
3,964,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,371 UART: [rt]cmd =0x4d454153, len=108
4,016,147 >>> mbox cmd response data (12 bytes)
4,016,148 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,115 UART: [rt]cmd =0x4d454153, len=108
4,067,364 >>> mbox cmd response data (12 bytes)
4,067,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,570 UART: [rt]cmd =0x4d454153, len=108
4,099,407 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,043 ready_for_fw is high
1,060,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,157 >>> mbox cmd response: success
2,741,730 UART:
2,741,746 UART: Running Caliptra FMC ...
2,742,154 UART:
2,742,297 UART: [state] CFI Enabled
2,752,963 UART: [fht] FMC Alias Private Key: 7
2,872,109 UART: [art] Extend RT PCRs Done
2,872,537 UART: [art] Lock RT PCRs Done
2,873,823 UART: [art] Populate DV Done
2,881,936 UART: [fht] FMC Alias Private Key: 7
2,883,106 UART: [art] Derive CDI
2,883,386 UART: [art] Store in slot 0x4
2,969,089 UART: [art] Derive Key Pair
2,969,449 UART: [art] Store priv key in slot 0x5
2,981,913 UART: [art] Derive Key Pair - Done
2,996,673 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,196 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,961 UART: [art] PUB.X = 1DCE6F28109AB1457AA7D41B00063501D7579B5FFBF3A072429BAFDD9D25E7442AF6C7028FEA810BE9F48A4F2683002B
3,019,685 UART: [art] PUB.Y = EE390A518E70937997DB1166FE6C72C85F04F95421508B17F49424E735C99EBE47C39CBEC5F0647FD8EAB077B2595283
3,026,629 UART: [art] SIG.R = A0AB7DE5E4D4E7683AAE5E385296DC66C6D6D271EC152044B29BCBD41722B87CB488C578A3EB28A3988E3B30ECBA457A
3,033,415 UART: [art] SIG.S = F96086C93C40FF86074F924FF238C2DAA6EC9586D1151DFD5E220E75D0CD312DAEA38C3699F6306AFA441504DE5CB7D2
3,057,376 UART: Caliptra RT
3,057,719 UART: [state] CFI Enabled
3,177,873 UART: [rt] RT listening for mailbox commands...
3,178,543 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,021 UART: [rt]cmd =0x4d454153, len=108
3,230,323 >>> mbox cmd response data (12 bytes)
3,230,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,337 UART: [rt]cmd =0x4d454153, len=108
3,280,934 >>> mbox cmd response data (12 bytes)
3,280,935 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,840 UART: [rt]cmd =0x4d454153, len=108
3,332,510 >>> mbox cmd response data (12 bytes)
3,332,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,542 UART: [rt]cmd =0x4d454153, len=108
3,383,145 >>> mbox cmd response data (12 bytes)
3,383,146 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,229 UART: [rt]cmd =0x4d454153, len=108
3,434,047 >>> mbox cmd response data (12 bytes)
3,434,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,073 UART: [rt]cmd =0x4d454153, len=108
3,484,422 >>> mbox cmd response data (12 bytes)
3,484,423 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,362 UART: [rt]cmd =0x4d454153, len=108
3,536,154 >>> mbox cmd response data (12 bytes)
3,536,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,050 UART: [rt]cmd =0x4d454153, len=108
3,586,645 >>> mbox cmd response data (12 bytes)
3,586,646 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,543 UART: [rt]cmd =0x4d454153, len=108
3,637,601 >>> mbox cmd response data (12 bytes)
3,637,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,837 UART: [rt]cmd =0x4d454153, len=108
3,689,012 >>> mbox cmd response data (12 bytes)
3,689,013 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,038 UART: [rt]cmd =0x4d454153, len=108
3,740,734 >>> mbox cmd response data (12 bytes)
3,740,735 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,762 UART: [rt]cmd =0x4d454153, len=108
3,791,799 >>> mbox cmd response data (12 bytes)
3,791,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,949 UART: [rt]cmd =0x4d454153, len=108
3,843,201 >>> mbox cmd response data (12 bytes)
3,843,202 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,873,393 UART: [rt]cmd =0x4d454153, len=108
3,894,220 >>> mbox cmd response data (12 bytes)
3,894,221 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,924,242 UART: [rt]cmd =0x4d454153, len=108
3,926,355 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,589 UART: [kat] SHA2-256
903,529 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,840 UART: [kat] HMAC-384Kdf
922,508 UART: [kat] LMS
1,170,836 UART: [kat] --
1,171,711 UART: [cold-reset] ++
1,172,237 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,539 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,209,911 UART: [ldev] ++
1,210,079 UART: [ldev] CDI.KEYID = 6
1,210,442 UART: [ldev] SUBJECT.KEYID = 5
1,210,868 UART: [ldev] AUTHORITY.KEYID = 7
1,211,331 UART: [ldev] FE.KEYID = 1
1,216,347 UART: [ldev] Erasing FE.KEYID = 1
1,241,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,477 UART: [ldev] --
1,280,918 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,440 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,594 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,764 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,029 >>> mbox cmd response: success
2,827,089 UART: [afmc] ++
2,827,257 UART: [afmc] CDI.KEYID = 6
2,827,619 UART: [afmc] SUBJECT.KEYID = 7
2,828,044 UART: [afmc] AUTHORITY.KEYID = 5
2,864,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,280 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,028 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,737 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,321 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,145 UART: [afmc] --
2,908,203 UART: [cold-reset] --
2,909,167 UART: [state] Locking Datavault
2,910,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,898 UART: [state] Locking ICCM
2,911,530 UART: [exit] Launching FMC @ 0x40000130
2,916,860 UART:
2,916,876 UART: Running Caliptra FMC ...
2,917,284 UART:
2,917,338 UART: [state] CFI Enabled
2,927,946 UART: [fht] FMC Alias Private Key: 7
3,046,904 UART: [art] Extend RT PCRs Done
3,047,332 UART: [art] Lock RT PCRs Done
3,048,994 UART: [art] Populate DV Done
3,057,193 UART: [fht] FMC Alias Private Key: 7
3,058,123 UART: [art] Derive CDI
3,058,403 UART: [art] Store in slot 0x4
3,144,208 UART: [art] Derive Key Pair
3,144,568 UART: [art] Store priv key in slot 0x5
3,157,826 UART: [art] Derive Key Pair - Done
3,172,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,899 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,664 UART: [art] PUB.X = DD2D0408B921C2EFA5B9E4644A0660B26EBDE6D175B1603F1D6A60F52A9EEFD6BFAF3A407CB9D7043F1AEEB3A64123C9
3,195,444 UART: [art] PUB.Y = 28D440832BF8F19EE6EEC402C5EDF1E90824FF520899D958C64F743943EF1FC696CD19A6C46C2BF66BA03CADB45BD82A
3,202,401 UART: [art] SIG.R = E43FFC9C970E3314C6DE83F0D5466B187FC5B7442EBC1220E540FDF57ECCEE41AEE89F52CD7DFA80399698FA47D7C07D
3,209,188 UART: [art] SIG.S = 52A03AC8DCA1F37458AC49933E5FD7BD2E6D5EB5BABC4D646927094E6DF713C7F2F1F9F13532862BB3813721E64A9D13
3,232,755 UART: Caliptra RT
3,233,006 UART: [state] CFI Enabled
3,353,389 UART: [rt] RT listening for mailbox commands...
3,354,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,409 UART: [rt]cmd =0x4d454153, len=108
3,405,415 >>> mbox cmd response data (12 bytes)
3,405,416 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,395 UART: [rt]cmd =0x4d454153, len=108
3,456,752 >>> mbox cmd response data (12 bytes)
3,456,753 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,487,086 UART: [rt]cmd =0x4d454153, len=108
3,508,116 >>> mbox cmd response data (12 bytes)
3,508,117 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,206 UART: [rt]cmd =0x4d454153, len=108
3,559,503 >>> mbox cmd response data (12 bytes)
3,559,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,523 UART: [rt]cmd =0x4d454153, len=108
3,610,359 >>> mbox cmd response data (12 bytes)
3,610,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,523 UART: [rt]cmd =0x4d454153, len=108
3,661,842 >>> mbox cmd response data (12 bytes)
3,661,843 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,692 UART: [rt]cmd =0x4d454153, len=108
3,712,910 >>> mbox cmd response data (12 bytes)
3,712,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,730 UART: [rt]cmd =0x4d454153, len=108
3,763,337 >>> mbox cmd response data (12 bytes)
3,763,338 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,793,395 UART: [rt]cmd =0x4d454153, len=108
3,814,515 >>> mbox cmd response data (12 bytes)
3,814,516 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,821 UART: [rt]cmd =0x4d454153, len=108
3,865,592 >>> mbox cmd response data (12 bytes)
3,865,593 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,494 UART: [rt]cmd =0x4d454153, len=108
3,916,690 >>> mbox cmd response data (12 bytes)
3,916,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,946,876 UART: [rt]cmd =0x4d454153, len=108
3,967,491 >>> mbox cmd response data (12 bytes)
3,967,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,653 UART: [rt]cmd =0x4d454153, len=108
4,018,155 >>> mbox cmd response data (12 bytes)
4,018,156 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,048,283 UART: [rt]cmd =0x4d454153, len=108
4,069,502 >>> mbox cmd response data (12 bytes)
4,069,503 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,099,524 UART: [rt]cmd =0x4d454153, len=108
4,101,533 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,101 ready_for_fw is high
1,061,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,668 >>> mbox cmd response: success
2,741,623 UART:
2,741,639 UART: Running Caliptra FMC ...
2,742,047 UART:
2,742,101 UART: [state] CFI Enabled
2,752,407 UART: [fht] FMC Alias Private Key: 7
2,871,535 UART: [art] Extend RT PCRs Done
2,871,963 UART: [art] Lock RT PCRs Done
2,873,521 UART: [art] Populate DV Done
2,881,696 UART: [fht] FMC Alias Private Key: 7
2,882,780 UART: [art] Derive CDI
2,883,060 UART: [art] Store in slot 0x4
2,968,831 UART: [art] Derive Key Pair
2,969,191 UART: [art] Store priv key in slot 0x5
2,982,697 UART: [art] Derive Key Pair - Done
2,997,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,116 UART: [art] PUB.X = AAF582819AAA9D53D7A80D8516EFCF1A568B102678FB394ADB923152EB3700F3D42D38D8AAF35CD8AF9EFDF02FB689DC
3,020,883 UART: [art] PUB.Y = 92E704CB3F768D74FB1DD817B5D565391691E9A526C6A3215CAD51EB22BF498D8500CA27A033AA3118B18BA95A151471
3,027,810 UART: [art] SIG.R = EF4F7D8FB54EDBDC34416166DF42E2A6D1577C43C29C58E4AEB3B3CDEC0F2F4E9886F1DB67484C720921042323D5CE70
3,034,585 UART: [art] SIG.S = 302696A00DE16DA0D7C2F8AAB5AC285DB7DE5F8E546876CEFC2FF5A6E265181EBD79C6849365C3AC1B4CD926134FCF76
3,058,396 UART: Caliptra RT
3,058,647 UART: [state] CFI Enabled
3,178,822 UART: [rt] RT listening for mailbox commands...
3,179,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,676 UART: [rt]cmd =0x4d454153, len=108
3,230,688 >>> mbox cmd response data (12 bytes)
3,230,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,668 UART: [rt]cmd =0x4d454153, len=108
3,281,629 >>> mbox cmd response data (12 bytes)
3,281,630 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,539 UART: [rt]cmd =0x4d454153, len=108
3,332,275 >>> mbox cmd response data (12 bytes)
3,332,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,329 UART: [rt]cmd =0x4d454153, len=108
3,381,998 >>> mbox cmd response data (12 bytes)
3,381,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,964 UART: [rt]cmd =0x4d454153, len=108
3,432,682 >>> mbox cmd response data (12 bytes)
3,432,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,680 UART: [rt]cmd =0x4d454153, len=108
3,483,315 >>> mbox cmd response data (12 bytes)
3,483,316 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,257 UART: [rt]cmd =0x4d454153, len=108
3,533,755 >>> mbox cmd response data (12 bytes)
3,533,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,081 UART: [rt]cmd =0x4d454153, len=108
3,585,864 >>> mbox cmd response data (12 bytes)
3,585,865 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,846 UART: [rt]cmd =0x4d454153, len=108
3,636,586 >>> mbox cmd response data (12 bytes)
3,636,587 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,606 UART: [rt]cmd =0x4d454153, len=108
3,687,395 >>> mbox cmd response data (12 bytes)
3,687,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,431 UART: [rt]cmd =0x4d454153, len=108
3,738,905 >>> mbox cmd response data (12 bytes)
3,738,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,795 UART: [rt]cmd =0x4d454153, len=108
3,789,470 >>> mbox cmd response data (12 bytes)
3,789,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,520 UART: [rt]cmd =0x4d454153, len=108
3,840,252 >>> mbox cmd response data (12 bytes)
3,840,253 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,132 UART: [rt]cmd =0x4d454153, len=108
3,891,077 >>> mbox cmd response data (12 bytes)
3,891,078 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,921,127 UART: [rt]cmd =0x4d454153, len=108
3,923,020 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,059 UART: [state] LifecycleState = Unprovisioned
85,714 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
893,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,478 UART: [kat] ++
897,630 UART: [kat] sha1
901,754 UART: [kat] SHA2-256
903,694 UART: [kat] SHA2-384
906,559 UART: [kat] SHA2-512-ACC
908,460 UART: [kat] ECC-384
918,267 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,379 UART: [idev] ++
1,175,547 UART: [idev] CDI.KEYID = 6
1,175,907 UART: [idev] SUBJECT.KEYID = 7
1,176,331 UART: [idev] UDS.KEYID = 0
1,176,676 ready_for_fw is high
1,176,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,391 UART: [idev] Erasing UDS.KEYID = 0
1,201,368 UART: [idev] Sha1 KeyId Algorithm
1,209,726 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,796 UART: [ldev] Erasing FE.KEYID = 1
1,244,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,034 UART: [ldev] --
1,283,391 UART: [fwproc] Wait for Commands...
1,284,049 UART: [fwproc] Recv command 0x46574c44
1,284,777 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,192 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,831 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,001 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,254 >>> mbox cmd response: success
2,829,498 UART: [afmc] ++
2,829,666 UART: [afmc] CDI.KEYID = 6
2,830,028 UART: [afmc] SUBJECT.KEYID = 7
2,830,453 UART: [afmc] AUTHORITY.KEYID = 5
2,865,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,869 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,578 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,461 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,162 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,074 UART: [afmc] --
2,909,184 UART: [cold-reset] --
2,909,844 UART: [state] Locking Datavault
2,911,051 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,655 UART: [state] Locking ICCM
2,912,195 UART: [exit] Launching FMC @ 0x40000130
2,917,525 UART:
2,917,541 UART: Running Caliptra FMC ...
2,917,949 UART:
2,918,092 UART: [state] CFI Enabled
2,928,898 UART: [fht] FMC Alias Private Key: 7
3,047,044 UART: [art] Extend RT PCRs Done
3,047,472 UART: [art] Lock RT PCRs Done
3,048,686 UART: [art] Populate DV Done
3,057,007 UART: [fht] FMC Alias Private Key: 7
3,058,153 UART: [art] Derive CDI
3,058,433 UART: [art] Store in slot 0x4
3,144,364 UART: [art] Derive Key Pair
3,144,724 UART: [art] Store priv key in slot 0x5
3,158,296 UART: [art] Derive Key Pair - Done
3,172,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,086 UART: [art] PUB.X = 139E1684182276C447A0E316299D47418E5635C87B4DF99F6FA1913D97C11F5473ADA342956B836D0C60F5C4E47FC3CC
3,195,849 UART: [art] PUB.Y = E8B2A279454B6B410F86F38C42BAEB196193AF6A867B100439F1FBF823F2065382364212B49E088B3D00B4AC2313ACA6
3,202,765 UART: [art] SIG.R = 5FF8A7D6DAAB759B436BFDDC4FD106CDD27DD1CB114DE00DBCF61CA3DC7534E9FF3296E9349520B663DD6BEDF01BE03A
3,209,561 UART: [art] SIG.S = 82E37B548943DB972CD652EE0BFC6C87D468C4C33FD1932E8E55F821ECBBE29B7D0F95C97BFCEF7D57AEF5A3512A7D88
3,233,747 UART: Caliptra RT
3,234,090 UART: [state] CFI Enabled
3,353,945 UART: [rt] RT listening for mailbox commands...
3,354,615 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,071 UART: [rt]cmd =0x4d454153, len=108
3,405,405 >>> mbox cmd response data (12 bytes)
3,405,406 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,511 UART: [rt]cmd =0x4d454153, len=108
3,456,202 >>> mbox cmd response data (12 bytes)
3,456,203 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,348 UART: [rt]cmd =0x4d454153, len=108
3,506,912 >>> mbox cmd response data (12 bytes)
3,506,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,536,872 UART: [rt]cmd =0x4d454153, len=108
3,557,829 >>> mbox cmd response data (12 bytes)
3,557,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,071 UART: [rt]cmd =0x4d454153, len=108
3,609,037 >>> mbox cmd response data (12 bytes)
3,609,038 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,087 UART: [rt]cmd =0x4d454153, len=108
3,659,588 >>> mbox cmd response data (12 bytes)
3,659,589 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,448 UART: [rt]cmd =0x4d454153, len=108
3,710,692 >>> mbox cmd response data (12 bytes)
3,710,693 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,862 UART: [rt]cmd =0x4d454153, len=108
3,761,775 >>> mbox cmd response data (12 bytes)
3,761,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,787 UART: [rt]cmd =0x4d454153, len=108
3,813,503 >>> mbox cmd response data (12 bytes)
3,813,504 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,559 UART: [rt]cmd =0x4d454153, len=108
3,864,246 >>> mbox cmd response data (12 bytes)
3,864,247 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,390 UART: [rt]cmd =0x4d454153, len=108
3,914,858 >>> mbox cmd response data (12 bytes)
3,914,859 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,812 UART: [rt]cmd =0x4d454153, len=108
3,965,031 >>> mbox cmd response data (12 bytes)
3,965,032 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,127 UART: [rt]cmd =0x4d454153, len=108
4,015,861 >>> mbox cmd response data (12 bytes)
4,015,862 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,131 UART: [rt]cmd =0x4d454153, len=108
4,066,228 >>> mbox cmd response data (12 bytes)
4,066,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,332 UART: [rt]cmd =0x4d454153, len=108
4,098,395 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,896 ready_for_fw is high
1,060,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,283 >>> mbox cmd response: success
2,742,692 UART:
2,742,708 UART: Running Caliptra FMC ...
2,743,116 UART:
2,743,259 UART: [state] CFI Enabled
2,753,801 UART: [fht] FMC Alias Private Key: 7
2,873,651 UART: [art] Extend RT PCRs Done
2,874,079 UART: [art] Lock RT PCRs Done
2,875,665 UART: [art] Populate DV Done
2,883,838 UART: [fht] FMC Alias Private Key: 7
2,884,822 UART: [art] Derive CDI
2,885,102 UART: [art] Store in slot 0x4
2,970,601 UART: [art] Derive Key Pair
2,970,961 UART: [art] Store priv key in slot 0x5
2,984,025 UART: [art] Derive Key Pair - Done
2,999,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,732 UART: [art] PUB.X = 8BCFC64480E13AAC49D13DE52A9F7E121F376AE2AB79049F38C1041B3865630E9796823506DB5E496091253440915C98
3,022,482 UART: [art] PUB.Y = A8D01A2D6C6E7633B2E22D6BB225EFD6C7BDEF6B99EB7CB054E1E14719FE6FBFE92CA7F2BE27A1EE01B284D9404D89A0
3,029,455 UART: [art] SIG.R = 623CEFEBB263E0C1409275C2D000F6D762D1EB004B25962B1E940791129C25256E6B7EFD61A6F3987714C53C5C81DCFC
3,036,182 UART: [art] SIG.S = B264238D96E5C1FE2E1A452670238C69DC18875A78413BBF33C29FF3DE542D135EB9AEA7F36EF44DE8129A234A8DBE6B
3,059,514 UART: Caliptra RT
3,059,857 UART: [state] CFI Enabled
3,180,042 UART: [rt] RT listening for mailbox commands...
3,180,712 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,508 UART: [rt]cmd =0x4d454153, len=108
3,231,602 >>> mbox cmd response data (12 bytes)
3,231,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,538 UART: [rt]cmd =0x4d454153, len=108
3,282,451 >>> mbox cmd response data (12 bytes)
3,282,452 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,479 UART: [rt]cmd =0x4d454153, len=108
3,333,567 >>> mbox cmd response data (12 bytes)
3,333,568 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,797 UART: [rt]cmd =0x4d454153, len=108
3,384,890 >>> mbox cmd response data (12 bytes)
3,384,891 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,974 UART: [rt]cmd =0x4d454153, len=108
3,435,878 >>> mbox cmd response data (12 bytes)
3,435,879 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,818 UART: [rt]cmd =0x4d454153, len=108
3,486,999 >>> mbox cmd response data (12 bytes)
3,487,000 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,021 UART: [rt]cmd =0x4d454153, len=108
3,537,759 >>> mbox cmd response data (12 bytes)
3,537,760 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,567 UART: [rt]cmd =0x4d454153, len=108
3,587,912 >>> mbox cmd response data (12 bytes)
3,587,913 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,750 UART: [rt]cmd =0x4d454153, len=108
3,638,138 >>> mbox cmd response data (12 bytes)
3,638,139 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,054 UART: [rt]cmd =0x4d454153, len=108
3,688,959 >>> mbox cmd response data (12 bytes)
3,688,960 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,171 UART: [rt]cmd =0x4d454153, len=108
3,739,773 >>> mbox cmd response data (12 bytes)
3,739,774 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,975 UART: [rt]cmd =0x4d454153, len=108
3,790,580 >>> mbox cmd response data (12 bytes)
3,790,581 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,544 UART: [rt]cmd =0x4d454153, len=108
3,842,634 >>> mbox cmd response data (12 bytes)
3,842,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,662 UART: [rt]cmd =0x4d454153, len=108
3,894,047 >>> mbox cmd response data (12 bytes)
3,894,048 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,955 UART: [rt]cmd =0x4d454153, len=108
3,925,780 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_measurement_log_pl_context_threshold ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,333 UART:
192,687 UART: Running Caliptra ROM ...
193,789 UART:
193,933 UART: [state] CFI Enabled
262,249 UART: [state] LifecycleState = Unprovisioned
264,260 UART: [state] DebugLocked = No
265,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,154 UART: [kat] SHA2-256
440,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,323 UART: [kat] ++
451,768 UART: [kat] sha1
461,746 UART: [kat] SHA2-256
464,460 UART: [kat] SHA2-384
469,470 UART: [kat] SHA2-512-ACC
471,840 UART: [kat] ECC-384
2,769,400 UART: [kat] HMAC-384Kdf
2,800,320 UART: [kat] LMS
3,990,615 UART: [kat] --
3,992,925 UART: [cold-reset] ++
3,994,930 UART: [fht] Storing FHT @ 0x50003400
4,005,979 UART: [idev] ++
4,006,621 UART: [idev] CDI.KEYID = 6
4,007,550 UART: [idev] SUBJECT.KEYID = 7
4,008,805 UART: [idev] UDS.KEYID = 0
4,009,846 ready_for_fw is high
4,010,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,172 UART: [idev] Erasing UDS.KEYID = 0
7,348,346 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,167 UART: [idev] --
7,374,436 UART: [ldev] ++
7,375,068 UART: [ldev] CDI.KEYID = 6
7,375,988 UART: [ldev] SUBJECT.KEYID = 5
7,377,202 UART: [ldev] AUTHORITY.KEYID = 7
7,378,434 UART: [ldev] FE.KEYID = 1
7,422,900 UART: [ldev] Erasing FE.KEYID = 1
10,753,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,223 UART: [ldev] --
13,116,117 UART: [fwproc] Waiting for Commands...
13,118,591 UART: [fwproc] Received command 0x46574c44
13,120,781 UART: [fwproc] Received Image of size 118548 bytes
17,228,557 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,309,855 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,022 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,752 >>> mbox cmd response: success
17,715,527 UART: [afmc] ++
17,716,150 UART: [afmc] CDI.KEYID = 6
17,717,065 UART: [afmc] SUBJECT.KEYID = 7
17,718,285 UART: [afmc] AUTHORITY.KEYID = 5
21,080,658 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,383,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,385,615 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,400,036 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,414,770 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,429,184 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,449,672 UART: [afmc] --
23,452,670 UART: [cold-reset] --
23,457,825 UART: [state] Locking Datavault
23,463,507 UART: [state] Locking PCR0, PCR1 and PCR31
23,465,258 UART: [state] Locking ICCM
23,466,541 UART: [exit] Launching FMC @ 0x40000130
23,474,934 UART:
23,475,165 UART: Running Caliptra FMC ...
23,476,263 UART:
23,476,419 UART: [state] CFI Enabled
23,542,215 UART: [fht] FMC Alias Private Key: 7
25,882,417 UART: [art] Extend RT PCRs Done
25,883,644 UART: [art] Lock RT PCRs Done
25,885,322 UART: [art] Populate DV Done
25,890,645 UART: [fht] FMC Alias Private Key: 7
25,892,246 UART: [art] Derive CDI
25,893,284 UART: [art] Store in slot 0x4
25,950,641 UART: [art] Derive Key Pair
25,951,639 UART: [art] Store priv key in slot 0x5
29,244,279 UART: [art] Derive Key Pair - Done
29,257,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,219 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,736 UART: [art] PUB.X = 89FBE321656F28623B4095E422BB0B01BD56DD366EBCB03616A87FABAD6596D3DB131EDF1DA1103AEA304C2B39CEAA55
31,554,045 UART: [art] PUB.Y = 9E2F2F01B84E1216F0D6BE97D82E144DB4BE48B047C7AADB80C04863623808C3A06E1142C338FF247891F7F439B63DE8
31,561,280 UART: [art] SIG.R = 23886E8F821016026B63EBBB89F7F26DDF681FF02AD1A80297E2833E21BD2EACD88AF7B80BF7ADFBA218C7EC42BD6B99
31,568,720 UART: [art] SIG.S = 7356371790DE2FCAB95AE26F830B6B9CBBE83A8BA56B34030ACD9C7388BEBE15A31B3959F0577CE3B09103DC2500FC33
32,873,693 UART: Caliptra RT
32,874,399 UART: [state] CFI Enabled
33,050,950 UART: [rt] RT listening for mailbox commands...
33,052,891 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,083,089 UART: [rt]cmd =0x44504543, len=40
33,131,437 >>> mbox cmd response data (40 bytes)
33,132,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,605 UART: [rt]cmd =0x44504543, len=96
33,223,096 >>> mbox cmd response data (56 bytes)
33,223,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,254,351 UART: [rt]cmd =0x44504543, len=96
33,329,829 >>> mbox cmd response data (56 bytes)
33,330,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,361,181 UART: [rt]cmd =0x44504543, len=96
33,436,992 >>> mbox cmd response data (56 bytes)
33,437,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,468,302 UART: [rt]cmd =0x44504543, len=96
33,543,703 >>> mbox cmd response data (56 bytes)
33,544,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,575,080 UART: [rt]cmd =0x44504543, len=96
33,650,359 >>> mbox cmd response data (56 bytes)
33,651,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,681,534 UART: [rt]cmd =0x44504543, len=96
33,757,105 >>> mbox cmd response data (56 bytes)
33,757,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,788,300 UART: [rt]cmd =0x44504543, len=96
33,863,860 >>> mbox cmd response data (56 bytes)
33,864,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,895,337 UART: [rt]cmd =0x44504543, len=96
33,970,924 >>> mbox cmd response data (56 bytes)
33,971,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,002,317 UART: [rt]cmd =0x44504543, len=96
34,077,622 >>> mbox cmd response data (56 bytes)
34,078,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,108,822 UART: [rt]cmd =0x44504543, len=96
34,184,549 >>> mbox cmd response data (56 bytes)
34,185,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,215,707 UART: [rt]cmd =0x44504543, len=96
34,290,809 >>> mbox cmd response data (56 bytes)
34,291,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,321,984 UART: [rt]cmd =0x44504543, len=96
34,397,940 >>> mbox cmd response data (56 bytes)
34,398,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,429,015 UART: [rt]cmd =0x44504543, len=96
34,504,733 >>> mbox cmd response data (56 bytes)
34,505,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,536,105 UART: [rt]cmd =0x44504543, len=96
34,611,632 >>> mbox cmd response data (56 bytes)
34,612,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,642,801 UART: [rt]cmd =0x44504543, len=96
34,649,722 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,786,542 ready_for_fw is high
3,786,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,540 >>> mbox cmd response: success
23,630,684 UART:
23,631,077 UART: Running Caliptra FMC ...
23,632,199 UART:
23,632,376 UART: [state] CFI Enabled
23,701,856 UART: [fht] FMC Alias Private Key: 7
26,042,290 UART: [art] Extend RT PCRs Done
26,043,522 UART: [art] Lock RT PCRs Done
26,045,288 UART: [art] Populate DV Done
26,050,930 UART: [fht] FMC Alias Private Key: 7
26,052,477 UART: [art] Derive CDI
26,053,245 UART: [art] Store in slot 0x4
26,111,099 UART: [art] Derive Key Pair
26,112,107 UART: [art] Store priv key in slot 0x5
29,404,978 UART: [art] Derive Key Pair - Done
29,418,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,713 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,225 UART: [art] PUB.X = E01C20FEB9066EFA7EB26090FB26FA68EFB256DD276866D3340CC129D009B756BB397582114C58C72F61463CCAFD0402
31,715,529 UART: [art] PUB.Y = ECDEBA850D8FD593D674623B16E2AC94798BCA36F0624A39606C361811B9F69B3CAEB91028391067564924316EB43790
31,722,745 UART: [art] SIG.R = B7671DFC25E594E097D6FA32916717A08C156130A4BA1FDC9A8EE76D27E7B78192ECB5455D4DE65C8BB7B786F3384805
31,730,171 UART: [art] SIG.S = B3D58A8D848C3A55B4A93046D84BE60778636B32A0565C9BFC220E7A82820181BB7875D785C94B32991DBF7C5B39FAA6
33,035,499 UART: Caliptra RT
33,036,205 UART: [state] CFI Enabled
33,214,011 UART: [rt] RT listening for mailbox commands...
33,215,922 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,245,918 UART: [rt]cmd =0x44504543, len=40
33,293,915 >>> mbox cmd response data (40 bytes)
33,295,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,325,531 UART: [rt]cmd =0x44504543, len=96
33,385,629 >>> mbox cmd response data (56 bytes)
33,386,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,416,966 UART: [rt]cmd =0x44504543, len=96
33,492,817 >>> mbox cmd response data (56 bytes)
33,493,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,524,296 UART: [rt]cmd =0x44504543, len=96
33,599,330 >>> mbox cmd response data (56 bytes)
33,600,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,630,821 UART: [rt]cmd =0x44504543, len=96
33,706,128 >>> mbox cmd response data (56 bytes)
33,706,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,737,501 UART: [rt]cmd =0x44504543, len=96
33,813,026 >>> mbox cmd response data (56 bytes)
33,813,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,844,228 UART: [rt]cmd =0x44504543, len=96
33,919,787 >>> mbox cmd response data (56 bytes)
33,920,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,950,920 UART: [rt]cmd =0x44504543, len=96
34,025,625 >>> mbox cmd response data (56 bytes)
34,026,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,056,840 UART: [rt]cmd =0x44504543, len=96
34,132,526 >>> mbox cmd response data (56 bytes)
34,133,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,163,683 UART: [rt]cmd =0x44504543, len=96
34,239,570 >>> mbox cmd response data (56 bytes)
34,240,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,270,819 UART: [rt]cmd =0x44504543, len=96
34,346,214 >>> mbox cmd response data (56 bytes)
34,346,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,377,693 UART: [rt]cmd =0x44504543, len=96
34,453,547 >>> mbox cmd response data (56 bytes)
34,454,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,485,111 UART: [rt]cmd =0x44504543, len=96
34,560,070 >>> mbox cmd response data (56 bytes)
34,560,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,591,322 UART: [rt]cmd =0x44504543, len=96
34,667,580 >>> mbox cmd response data (56 bytes)
34,668,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,698,723 UART: [rt]cmd =0x44504543, len=96
34,774,466 >>> mbox cmd response data (56 bytes)
34,775,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,805,868 UART: [rt]cmd =0x44504543, len=96
34,812,381 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,528 UART:
192,882 UART: Running Caliptra ROM ...
193,962 UART:
603,610 UART: [state] CFI Enabled
617,077 UART: [state] LifecycleState = Unprovisioned
619,020 UART: [state] DebugLocked = No
621,424 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,470 UART: [kat] SHA2-256
795,231 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,743 UART: [kat] ++
806,204 UART: [kat] sha1
817,287 UART: [kat] SHA2-256
820,001 UART: [kat] SHA2-384
825,710 UART: [kat] SHA2-512-ACC
828,010 UART: [kat] ECC-384
3,112,322 UART: [kat] HMAC-384Kdf
3,125,842 UART: [kat] LMS
4,315,914 UART: [kat] --
4,320,709 UART: [cold-reset] ++
4,322,287 UART: [fht] Storing FHT @ 0x50003400
4,333,832 UART: [idev] ++
4,334,397 UART: [idev] CDI.KEYID = 6
4,335,371 UART: [idev] SUBJECT.KEYID = 7
4,336,607 UART: [idev] UDS.KEYID = 0
4,337,586 ready_for_fw is high
4,337,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,630 UART: [idev] Erasing UDS.KEYID = 0
7,626,906 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,415 UART: [idev] --
7,653,568 UART: [ldev] ++
7,654,133 UART: [ldev] CDI.KEYID = 6
7,655,068 UART: [ldev] SUBJECT.KEYID = 5
7,656,331 UART: [ldev] AUTHORITY.KEYID = 7
7,657,481 UART: [ldev] FE.KEYID = 1
7,669,339 UART: [ldev] Erasing FE.KEYID = 1
10,957,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,993 UART: [ldev] --
13,319,438 UART: [fwproc] Waiting for Commands...
13,321,273 UART: [fwproc] Received command 0x46574c44
13,323,452 UART: [fwproc] Received Image of size 118548 bytes
17,425,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,276 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,621 >>> mbox cmd response: success
17,903,098 UART: [afmc] ++
17,903,734 UART: [afmc] CDI.KEYID = 6
17,904,651 UART: [afmc] SUBJECT.KEYID = 7
17,905,864 UART: [afmc] AUTHORITY.KEYID = 5
21,219,282 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,062 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,456 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,923 UART: [afmc] --
23,587,203 UART: [cold-reset] --
23,590,693 UART: [state] Locking Datavault
23,595,720 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,411 UART: [state] Locking ICCM
23,600,094 UART: [exit] Launching FMC @ 0x40000130
23,608,497 UART:
23,608,730 UART: Running Caliptra FMC ...
23,609,828 UART:
23,609,985 UART: [state] CFI Enabled
23,618,414 UART: [fht] FMC Alias Private Key: 7
25,957,723 UART: [art] Extend RT PCRs Done
25,958,947 UART: [art] Lock RT PCRs Done
25,960,944 UART: [art] Populate DV Done
25,966,134 UART: [fht] FMC Alias Private Key: 7
25,967,780 UART: [art] Derive CDI
25,968,604 UART: [art] Store in slot 0x4
26,011,415 UART: [art] Derive Key Pair
26,012,456 UART: [art] Store priv key in slot 0x5
29,254,325 UART: [art] Derive Key Pair - Done
29,267,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,267 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,778 UART: [art] PUB.X = FBECF4A052052444D63AD4C3DB8C951484B60849BAB3A3F8354E1FCA47D5E0E3CE79FB776DB32C46DC0AD774A4157F54
31,556,073 UART: [art] PUB.Y = 5185A28B1A9541BA0138E87E04D827626B7BC21C2FBC993C64909492A30505461DF229618E4E5654F2E553A7827C43E3
31,563,294 UART: [art] SIG.R = 71A116724C895DEB612A281F60EA6666246BF9B793C74BE05B2C81B72ED4082C5B6E272712994BD12BEA7477EB7FEC39
31,570,684 UART: [art] SIG.S = B13FB00E9E4ACAEA8F763B02F219810F37AD41B1E5A690B5420C7F7219598A989104D70C68992ED39C96DB15E7CABA33
32,876,394 UART: Caliptra RT
32,877,110 UART: [state] CFI Enabled
33,010,753 UART: [rt] RT listening for mailbox commands...
33,012,664 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,042,865 UART: [rt]cmd =0x44504543, len=40
33,070,167 >>> mbox cmd response data (40 bytes)
33,071,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,101,916 UART: [rt]cmd =0x44504543, len=96
33,144,938 >>> mbox cmd response data (56 bytes)
33,145,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,176,024 UART: [rt]cmd =0x44504543, len=96
33,218,688 >>> mbox cmd response data (56 bytes)
33,219,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,249,895 UART: [rt]cmd =0x44504543, len=96
33,293,143 >>> mbox cmd response data (56 bytes)
33,293,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,324,282 UART: [rt]cmd =0x44504543, len=96
33,368,290 >>> mbox cmd response data (56 bytes)
33,369,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,399,484 UART: [rt]cmd =0x44504543, len=96
33,443,553 >>> mbox cmd response data (56 bytes)
33,444,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,474,986 UART: [rt]cmd =0x44504543, len=96
33,519,325 >>> mbox cmd response data (56 bytes)
33,520,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,550,461 UART: [rt]cmd =0x44504543, len=96
33,594,794 >>> mbox cmd response data (56 bytes)
33,595,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,626,034 UART: [rt]cmd =0x44504543, len=96
33,670,696 >>> mbox cmd response data (56 bytes)
33,671,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,702,097 UART: [rt]cmd =0x44504543, len=96
33,747,628 >>> mbox cmd response data (56 bytes)
33,748,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,778,863 UART: [rt]cmd =0x44504543, len=96
33,824,220 >>> mbox cmd response data (56 bytes)
33,824,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,855,509 UART: [rt]cmd =0x44504543, len=96
33,901,379 >>> mbox cmd response data (56 bytes)
33,902,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,932,684 UART: [rt]cmd =0x44504543, len=96
33,979,225 >>> mbox cmd response data (56 bytes)
33,979,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,010,368 UART: [rt]cmd =0x44504543, len=96
34,057,812 >>> mbox cmd response data (56 bytes)
34,058,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,088,935 UART: [rt]cmd =0x44504543, len=96
34,135,899 >>> mbox cmd response data (56 bytes)
34,136,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,167,238 UART: [rt]cmd =0x44504543, len=96
34,174,004 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
4,123,668 ready_for_fw is high
4,124,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,359 >>> mbox cmd response: success
23,791,256 UART:
23,791,659 UART: Running Caliptra FMC ...
23,792,754 UART:
23,792,909 UART: [state] CFI Enabled
23,800,876 UART: [fht] FMC Alias Private Key: 7
26,141,180 UART: [art] Extend RT PCRs Done
26,142,406 UART: [art] Lock RT PCRs Done
26,144,257 UART: [art] Populate DV Done
26,150,002 UART: [fht] FMC Alias Private Key: 7
26,151,706 UART: [art] Derive CDI
26,152,516 UART: [art] Store in slot 0x4
26,194,839 UART: [art] Derive Key Pair
26,195,827 UART: [art] Store priv key in slot 0x5
29,438,096 UART: [art] Derive Key Pair - Done
29,450,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,369 UART: [art] PUB.X = 0906A46FAACF1441EFFB8D80AE3C21B27300E69EA61F6E38CCF0201BAF926C58F069961FC51E9F92EF309C432F0CFDE5
31,739,670 UART: [art] PUB.Y = D66957E9ED32BC1136DC471A8FECCB4B43A4CA7A3EE702F92028BAC9DAC4D34994043C914E79478EDA99B107E721E58C
31,746,884 UART: [art] SIG.R = 229FB17905AF2330CB1B7F9B91AAE90B6135456019E2D5C9A693021FF124C0155D606A6807E0FB8CC7C1C71D72D2233E
31,754,288 UART: [art] SIG.S = AA45D193AECF37C1E1FAE501A0263C9C0514B0B709FE2D3E64250E91AFEA396458C82FA3E4EDD39A7BC3C3F629E841C9
33,059,276 UART: Caliptra RT
33,059,995 UART: [state] CFI Enabled
33,193,972 UART: [rt] RT listening for mailbox commands...
33,195,890 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,226,099 UART: [rt]cmd =0x44504543, len=40
33,253,478 >>> mbox cmd response data (40 bytes)
33,254,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,285,372 UART: [rt]cmd =0x44504543, len=96
33,327,803 >>> mbox cmd response data (56 bytes)
33,328,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,358,971 UART: [rt]cmd =0x44504543, len=96
33,401,776 >>> mbox cmd response data (56 bytes)
33,402,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,432,893 UART: [rt]cmd =0x44504543, len=96
33,476,557 >>> mbox cmd response data (56 bytes)
33,477,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,507,654 UART: [rt]cmd =0x44504543, len=96
33,551,399 >>> mbox cmd response data (56 bytes)
33,552,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,582,599 UART: [rt]cmd =0x44504543, len=96
33,626,608 >>> mbox cmd response data (56 bytes)
33,627,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,657,745 UART: [rt]cmd =0x44504543, len=96
33,702,106 >>> mbox cmd response data (56 bytes)
33,702,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,733,263 UART: [rt]cmd =0x44504543, len=96
33,777,388 >>> mbox cmd response data (56 bytes)
33,778,110 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,808,637 UART: [rt]cmd =0x44504543, len=96
33,853,948 >>> mbox cmd response data (56 bytes)
33,854,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,885,354 UART: [rt]cmd =0x44504543, len=96
33,930,898 >>> mbox cmd response data (56 bytes)
33,931,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,962,144 UART: [rt]cmd =0x44504543, len=96
34,007,779 >>> mbox cmd response data (56 bytes)
34,008,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,039,142 UART: [rt]cmd =0x44504543, len=96
34,085,430 >>> mbox cmd response data (56 bytes)
34,086,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,116,733 UART: [rt]cmd =0x44504543, len=96
34,163,191 >>> mbox cmd response data (56 bytes)
34,163,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,194,763 UART: [rt]cmd =0x44504543, len=96
34,242,127 >>> mbox cmd response data (56 bytes)
34,242,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,273,636 UART: [rt]cmd =0x44504543, len=96
34,320,311 >>> mbox cmd response data (56 bytes)
34,321,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,351,423 UART: [rt]cmd =0x44504543, len=96
34,358,205 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,197 UART:
192,565 UART: Running Caliptra ROM ...
193,763 UART:
193,916 UART: [state] CFI Enabled
267,075 UART: [state] LifecycleState = Unprovisioned
268,994 UART: [state] DebugLocked = No
271,875 UART: [state] WD Timer not started. Device not locked for debugging
275,191 UART: [kat] SHA2-256
454,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,586 UART: [kat] ++
466,032 UART: [kat] sha1
477,687 UART: [kat] SHA2-256
480,342 UART: [kat] SHA2-384
486,186 UART: [kat] SHA2-512-ACC
488,545 UART: [kat] ECC-384
2,949,569 UART: [kat] HMAC-384Kdf
2,973,411 UART: [kat] LMS
3,449,904 UART: [kat] --
3,452,104 UART: [cold-reset] ++
3,453,055 UART: [fht] FHT @ 0x50003400
3,464,171 UART: [idev] ++
3,464,731 UART: [idev] CDI.KEYID = 6
3,465,680 UART: [idev] SUBJECT.KEYID = 7
3,466,918 UART: [idev] UDS.KEYID = 0
3,467,808 ready_for_fw is high
3,467,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,076 UART: [idev] Erasing UDS.KEYID = 0
5,992,734 UART: [idev] Sha1 KeyId Algorithm
6,016,662 UART: [idev] --
6,022,476 UART: [ldev] ++
6,023,107 UART: [ldev] CDI.KEYID = 6
6,024,022 UART: [ldev] SUBJECT.KEYID = 5
6,025,185 UART: [ldev] AUTHORITY.KEYID = 7
6,026,474 UART: [ldev] FE.KEYID = 1
6,060,306 UART: [ldev] Erasing FE.KEYID = 1
8,566,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,753 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,366 UART: [ldev] --
10,378,838 UART: [fwproc] Wait for Commands...
10,382,008 UART: [fwproc] Recv command 0x46574c44
10,383,990 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,733 >>> mbox cmd response: success
14,354,089 UART: [afmc] ++
14,354,709 UART: [afmc] CDI.KEYID = 6
14,355,616 UART: [afmc] SUBJECT.KEYID = 7
14,356,839 UART: [afmc] AUTHORITY.KEYID = 5
16,897,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,623,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,625,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,641,767 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,657,785 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,673,392 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,698,650 UART: [afmc] --
18,701,864 UART: [cold-reset] --
18,705,342 UART: [state] Locking Datavault
18,710,474 UART: [state] Locking PCR0, PCR1 and PCR31
18,712,168 UART: [state] Locking ICCM
18,714,913 UART: [exit] Launching FMC @ 0x40000130
18,723,311 UART:
18,723,543 UART: Running Caliptra FMC ...
18,724,657 UART:
18,724,817 UART: [state] CFI Enabled
18,780,414 UART: [fht] FMC Alias Private Key: 7
20,546,834 UART: [art] Extend RT PCRs Done
20,548,072 UART: [art] Lock RT PCRs Done
20,549,396 UART: [art] Populate DV Done
20,554,591 UART: [fht] FMC Alias Private Key: 7
20,556,176 UART: [art] Derive CDI
20,556,984 UART: [art] Store in slot 0x4
20,612,615 UART: [art] Derive Key Pair
20,613,656 UART: [art] Store priv key in slot 0x5
23,077,226 UART: [art] Derive Key Pair - Done
23,089,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,802,940 UART: [art] Erasing AUTHORITY.KEYID = 7
24,804,458 UART: [art] PUB.X = 58AAB00BDBDF9480D0EAE7E9D73610A8033F00906384BBC3B494FFFE6009881C5DACBEE4B3631A10977BCF2D557D7B0B
24,811,738 UART: [art] PUB.Y = D8FF6DEFF8D2BADD5B33AECBC63AC977AEFE4603E78954F48484C9414C62783975259FDD6AAF59722598F0566D9AB1DC
24,819,013 UART: [art] SIG.R = 491F6A04DB2B77D2C2165049A04E7D6062EA0CF4F28288D755060BFA9B1250ACD78CAEEB0BCF545BCA8FC440E1712620
24,826,413 UART: [art] SIG.S = 83C03B593ED7D6E65AEA9A4315E5D2C2C89E96E67E85560239475817FBF998D45C05D40A70D68EDCBBD9F7903DD4737F
25,805,200 UART: Caliptra RT
25,805,898 UART: [state] CFI Enabled
25,987,089 UART: [rt] RT listening for mailbox commands...
25,989,025 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,019,249 UART: [rt]cmd =0x44504543, len=40
26,046,662 >>> mbox cmd response data (40 bytes)
26,047,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,078,504 UART: [rt]cmd =0x44504543, len=96
26,141,130 >>> mbox cmd response data (56 bytes)
26,141,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,172,508 UART: [rt]cmd =0x44504543, len=96
26,248,204 >>> mbox cmd response data (56 bytes)
26,248,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,279,494 UART: [rt]cmd =0x44504543, len=96
26,355,623 >>> mbox cmd response data (56 bytes)
26,356,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,978 UART: [rt]cmd =0x44504543, len=96
26,462,083 >>> mbox cmd response data (56 bytes)
26,462,808 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,493,336 UART: [rt]cmd =0x44504543, len=96
26,569,074 >>> mbox cmd response data (56 bytes)
26,569,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,600,588 UART: [rt]cmd =0x44504543, len=96
26,676,086 >>> mbox cmd response data (56 bytes)
26,676,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,707,278 UART: [rt]cmd =0x44504543, len=96
26,783,097 >>> mbox cmd response data (56 bytes)
26,783,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,814,282 UART: [rt]cmd =0x44504543, len=96
26,890,017 >>> mbox cmd response data (56 bytes)
26,890,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,921,497 UART: [rt]cmd =0x44504543, len=96
26,997,154 >>> mbox cmd response data (56 bytes)
26,997,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,028,445 UART: [rt]cmd =0x44504543, len=96
27,103,409 >>> mbox cmd response data (56 bytes)
27,104,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,134,825 UART: [rt]cmd =0x44504543, len=96
27,210,676 >>> mbox cmd response data (56 bytes)
27,211,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,241,921 UART: [rt]cmd =0x44504543, len=96
27,317,086 >>> mbox cmd response data (56 bytes)
27,317,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,348,330 UART: [rt]cmd =0x44504543, len=96
27,424,507 >>> mbox cmd response data (56 bytes)
27,425,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,456,073 UART: [rt]cmd =0x44504543, len=96
27,531,164 >>> mbox cmd response data (56 bytes)
27,531,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,562,465 UART: [rt]cmd =0x44504543, len=96
27,569,081 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,462,241 ready_for_fw is high
3,462,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,229,341 >>> mbox cmd response: success
18,513,831 UART:
18,514,316 UART: Running Caliptra FMC ...
18,515,428 UART:
18,515,578 UART: [state] CFI Enabled
18,586,626 UART: [fht] FMC Alias Private Key: 7
20,352,634 UART: [art] Extend RT PCRs Done
20,353,861 UART: [art] Lock RT PCRs Done
20,355,353 UART: [art] Populate DV Done
20,360,775 UART: [fht] FMC Alias Private Key: 7
20,362,475 UART: [art] Derive CDI
20,363,210 UART: [art] Store in slot 0x4
20,419,594 UART: [art] Derive Key Pair
20,420,650 UART: [art] Store priv key in slot 0x5
22,883,589 UART: [art] Derive Key Pair - Done
22,896,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,610,869 UART: [art] PUB.X = 894CEE204A0206FF691825B299E7BEB772E792EC54F4032557D4CA13B1E9F238191A3C3BB3D09C991039B086CFE97AD7
24,618,126 UART: [art] PUB.Y = CA6DF9EE079952A84F8D1EA0309277785830F209117DAE40AFF8CB9DFFBF952C6820CFA9E68547D90CA9AD0F2FBC330A
24,625,401 UART: [art] SIG.R = 9B2968E71124D6B4C21E7C52239A5B17E90D8A4DE14FDCAC40402B5A86FF6BBC27BF24E27DFB716BA11980B9652FF1EE
24,632,793 UART: [art] SIG.S = C89742C569A1F2C7B0F5F2E70766FF140C313FAF4916EC89B2A36E64A1A2B311DD95ED1F61ED4D853DD31D1607ACF03E
25,611,599 UART: Caliptra RT
25,612,298 UART: [state] CFI Enabled
25,792,579 UART: [rt] RT listening for mailbox commands...
25,794,485 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,824,742 UART: [rt]cmd =0x44504543, len=40
25,852,546 >>> mbox cmd response data (40 bytes)
25,853,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,884,376 UART: [rt]cmd =0x44504543, len=96
25,944,176 >>> mbox cmd response data (56 bytes)
25,944,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,975,324 UART: [rt]cmd =0x44504543, len=96
26,051,024 >>> mbox cmd response data (56 bytes)
26,051,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,082,574 UART: [rt]cmd =0x44504543, len=96
26,158,130 >>> mbox cmd response data (56 bytes)
26,158,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,189,422 UART: [rt]cmd =0x44504543, len=96
26,265,100 >>> mbox cmd response data (56 bytes)
26,265,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,296,532 UART: [rt]cmd =0x44504543, len=96
26,372,185 >>> mbox cmd response data (56 bytes)
26,372,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,484 UART: [rt]cmd =0x44504543, len=96
26,478,382 >>> mbox cmd response data (56 bytes)
26,479,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,509,639 UART: [rt]cmd =0x44504543, len=96
26,586,169 >>> mbox cmd response data (56 bytes)
26,586,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,617,334 UART: [rt]cmd =0x44504543, len=96
26,693,158 >>> mbox cmd response data (56 bytes)
26,693,876 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,724,400 UART: [rt]cmd =0x44504543, len=96
26,799,638 >>> mbox cmd response data (56 bytes)
26,800,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,830,670 UART: [rt]cmd =0x44504543, len=96
26,906,512 >>> mbox cmd response data (56 bytes)
26,907,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,937,600 UART: [rt]cmd =0x44504543, len=96
27,013,631 >>> mbox cmd response data (56 bytes)
27,014,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,044,793 UART: [rt]cmd =0x44504543, len=96
27,120,027 >>> mbox cmd response data (56 bytes)
27,120,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,151,223 UART: [rt]cmd =0x44504543, len=96
27,227,771 >>> mbox cmd response data (56 bytes)
27,228,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,259,131 UART: [rt]cmd =0x44504543, len=96
27,334,200 >>> mbox cmd response data (56 bytes)
27,334,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,365,554 UART: [rt]cmd =0x44504543, len=96
27,372,334 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,383 UART:
192,745 UART: Running Caliptra ROM ...
193,835 UART:
603,389 UART: [state] CFI Enabled
619,055 UART: [state] LifecycleState = Unprovisioned
621,010 UART: [state] DebugLocked = No
623,258 UART: [state] WD Timer not started. Device not locked for debugging
627,884 UART: [kat] SHA2-256
807,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,313 UART: [kat] ++
818,793 UART: [kat] sha1
829,597 UART: [kat] SHA2-256
832,272 UART: [kat] SHA2-384
838,479 UART: [kat] SHA2-512-ACC
840,856 UART: [kat] ECC-384
3,283,780 UART: [kat] HMAC-384Kdf
3,297,253 UART: [kat] LMS
3,773,779 UART: [kat] --
3,777,508 UART: [cold-reset] ++
3,779,277 UART: [fht] FHT @ 0x50003400
3,790,764 UART: [idev] ++
3,791,405 UART: [idev] CDI.KEYID = 6
3,792,292 UART: [idev] SUBJECT.KEYID = 7
3,793,542 UART: [idev] UDS.KEYID = 0
3,794,547 ready_for_fw is high
3,794,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,748 UART: [idev] Erasing UDS.KEYID = 0
6,274,332 UART: [idev] Sha1 KeyId Algorithm
6,297,891 UART: [idev] --
6,302,154 UART: [ldev] ++
6,302,781 UART: [ldev] CDI.KEYID = 6
6,303,691 UART: [ldev] SUBJECT.KEYID = 5
6,304,904 UART: [ldev] AUTHORITY.KEYID = 7
6,306,134 UART: [ldev] FE.KEYID = 1
6,317,116 UART: [ldev] Erasing FE.KEYID = 1
8,795,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,797 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,713 UART: [ldev] --
10,587,328 UART: [fwproc] Wait for Commands...
10,590,609 UART: [fwproc] Recv command 0x46574c44
10,592,649 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,403 >>> mbox cmd response: success
14,558,560 UART: [afmc] ++
14,559,168 UART: [afmc] CDI.KEYID = 6
14,560,058 UART: [afmc] SUBJECT.KEYID = 7
14,561,332 UART: [afmc] AUTHORITY.KEYID = 5
17,067,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,501 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,934 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,363 UART: [afmc] --
18,868,289 UART: [cold-reset] --
18,873,339 UART: [state] Locking Datavault
18,876,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,692 UART: [state] Locking ICCM
18,880,119 UART: [exit] Launching FMC @ 0x40000130
18,888,570 UART:
18,888,805 UART: Running Caliptra FMC ...
18,889,912 UART:
18,890,073 UART: [state] CFI Enabled
18,898,345 UART: [fht] FMC Alias Private Key: 7
20,664,526 UART: [art] Extend RT PCRs Done
20,665,748 UART: [art] Lock RT PCRs Done
20,667,142 UART: [art] Populate DV Done
20,672,617 UART: [fht] FMC Alias Private Key: 7
20,674,371 UART: [art] Derive CDI
20,675,109 UART: [art] Store in slot 0x4
20,717,980 UART: [art] Derive Key Pair
20,719,039 UART: [art] Store priv key in slot 0x5
23,145,561 UART: [art] Derive Key Pair - Done
23,158,275 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,024 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,523 UART: [art] PUB.X = D2149880036A0B9F2DBF8368C6A3D7492189D5417C172DCE48D314EDA8593E892F201429FEF2FDD35CAA9FF4964FC0AB
24,873,855 UART: [art] PUB.Y = 71456530C3C24C0D8109C6E3F833BA4B41AAFFEB05504524EF4C51824161763523F392024EF198444222FBB4C1F8FFEE
24,881,041 UART: [art] SIG.R = EB71358C430F82A8ACE2780DE5CA159B613A510317B546CA4311EA4CD9BDD679337B4A14D134B004DB0373B45D3E1B78
24,888,442 UART: [art] SIG.S = F6F7C6F6C07890FEF2B857EE7167219191B9C578BB2411DF88671AB42EAF9DA94AD184CD1F6FDCBEF110A4B89890912E
25,866,997 UART: Caliptra RT
25,867,697 UART: [state] CFI Enabled
26,000,712 UART: [rt] RT listening for mailbox commands...
26,002,627 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,032,881 UART: [rt]cmd =0x44504543, len=40
26,060,694 >>> mbox cmd response data (40 bytes)
26,061,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,092,257 UART: [rt]cmd =0x44504543, len=96
26,135,033 >>> mbox cmd response data (56 bytes)
26,135,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,166,479 UART: [rt]cmd =0x44504543, len=96
26,209,382 >>> mbox cmd response data (56 bytes)
26,210,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,240,308 UART: [rt]cmd =0x44504543, len=96
26,284,289 >>> mbox cmd response data (56 bytes)
26,284,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,315,673 UART: [rt]cmd =0x44504543, len=96
26,359,066 >>> mbox cmd response data (56 bytes)
26,359,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,390,519 UART: [rt]cmd =0x44504543, len=96
26,435,255 >>> mbox cmd response data (56 bytes)
26,435,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,466,630 UART: [rt]cmd =0x44504543, len=96
26,510,619 >>> mbox cmd response data (56 bytes)
26,511,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,541,824 UART: [rt]cmd =0x44504543, len=96
26,586,661 >>> mbox cmd response data (56 bytes)
26,587,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,617,920 UART: [rt]cmd =0x44504543, len=96
26,662,807 >>> mbox cmd response data (56 bytes)
26,663,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,694,113 UART: [rt]cmd =0x44504543, len=96
26,739,424 >>> mbox cmd response data (56 bytes)
26,740,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,770,672 UART: [rt]cmd =0x44504543, len=96
26,816,309 >>> mbox cmd response data (56 bytes)
26,817,028 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,847,670 UART: [rt]cmd =0x44504543, len=96
26,893,576 >>> mbox cmd response data (56 bytes)
26,894,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,924,633 UART: [rt]cmd =0x44504543, len=96
26,970,643 >>> mbox cmd response data (56 bytes)
26,971,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,001,840 UART: [rt]cmd =0x44504543, len=96
27,048,503 >>> mbox cmd response data (56 bytes)
27,049,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,079,660 UART: [rt]cmd =0x44504543, len=96
27,126,434 >>> mbox cmd response data (56 bytes)
27,127,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,157,527 UART: [rt]cmd =0x44504543, len=96
27,164,361 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,775,783 ready_for_fw is high
3,776,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,424,715 >>> mbox cmd response: success
18,677,767 UART:
18,678,199 UART: Running Caliptra FMC ...
18,679,352 UART:
18,679,518 UART: [state] CFI Enabled
18,687,577 UART: [fht] FMC Alias Private Key: 7
20,453,566 UART: [art] Extend RT PCRs Done
20,454,801 UART: [art] Lock RT PCRs Done
20,456,380 UART: [art] Populate DV Done
20,461,582 UART: [fht] FMC Alias Private Key: 7
20,463,179 UART: [art] Derive CDI
20,463,921 UART: [art] Store in slot 0x4
20,506,577 UART: [art] Derive Key Pair
20,507,620 UART: [art] Store priv key in slot 0x5
22,934,466 UART: [art] Derive Key Pair - Done
22,947,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,654,074 UART: [art] Erasing AUTHORITY.KEYID = 7
24,655,582 UART: [art] PUB.X = D746B94C039990C91763EFFC73FAB5AC5354D1763DD0C2F8305B1C3890830DC89B59068802A739E5188015B0738A0910
24,662,812 UART: [art] PUB.Y = 31A69D5045892143D04506AE8F9981E6C8195F5F26E947FE9115BB299B3CC4789DA3D0DD13B5E00A81D57BE43722A9AD
24,670,067 UART: [art] SIG.R = 3B5482DB79EFE84825D83DEF8A7557AD1588F45670C8326018F45557A091344CFB76F95216306E52817379E072077420
24,677,368 UART: [art] SIG.S = 9D898AD43A785308B42C28D68CC9D043DF2CC15EE85936018EE83660AA093C44D9A53F6F3DEF75D1740A83A5A05A8545
25,656,491 UART: Caliptra RT
25,657,192 UART: [state] CFI Enabled
25,790,898 UART: [rt] RT listening for mailbox commands...
25,792,806 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,822,783 UART: [rt]cmd =0x44504543, len=40
25,850,374 >>> mbox cmd response data (40 bytes)
25,851,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,882,007 UART: [rt]cmd =0x44504543, len=96
25,924,855 >>> mbox cmd response data (56 bytes)
25,925,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,956,321 UART: [rt]cmd =0x44504543, len=96
25,998,914 >>> mbox cmd response data (56 bytes)
25,999,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,030,183 UART: [rt]cmd =0x44504543, len=96
26,072,912 >>> mbox cmd response data (56 bytes)
26,073,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,104,187 UART: [rt]cmd =0x44504543, len=96
26,147,783 >>> mbox cmd response data (56 bytes)
26,148,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,178,805 UART: [rt]cmd =0x44504543, len=96
26,223,222 >>> mbox cmd response data (56 bytes)
26,223,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,254,516 UART: [rt]cmd =0x44504543, len=96
26,298,391 >>> mbox cmd response data (56 bytes)
26,299,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,329,482 UART: [rt]cmd =0x44504543, len=96
26,373,950 >>> mbox cmd response data (56 bytes)
26,374,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,404,931 UART: [rt]cmd =0x44504543, len=96
26,450,356 >>> mbox cmd response data (56 bytes)
26,451,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,565 UART: [rt]cmd =0x44504543, len=96
26,526,793 >>> mbox cmd response data (56 bytes)
26,527,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,558,086 UART: [rt]cmd =0x44504543, len=96
26,603,576 >>> mbox cmd response data (56 bytes)
26,604,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,817 UART: [rt]cmd =0x44504543, len=96
26,679,612 >>> mbox cmd response data (56 bytes)
26,680,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,682 UART: [rt]cmd =0x44504543, len=96
26,757,018 >>> mbox cmd response data (56 bytes)
26,757,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,788,387 UART: [rt]cmd =0x44504543, len=96
26,834,223 >>> mbox cmd response data (56 bytes)
26,834,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,865,658 UART: [rt]cmd =0x44504543, len=96
26,912,270 >>> mbox cmd response data (56 bytes)
26,913,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,943,647 UART: [rt]cmd =0x44504543, len=96
26,950,319 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,144 UART:
192,508 UART: Running Caliptra ROM ...
193,635 UART:
193,777 UART: [state] CFI Enabled
268,591 UART: [state] LifecycleState = Unprovisioned
270,993 UART: [state] DebugLocked = No
272,665 UART: [state] WD Timer not started. Device not locked for debugging
276,909 UART: [kat] SHA2-256
466,838 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,588 UART: [kat] ++
478,059 UART: [kat] sha1
490,295 UART: [kat] SHA2-256
493,308 UART: [kat] SHA2-384
498,312 UART: [kat] SHA2-512-ACC
500,960 UART: [kat] ECC-384
2,948,828 UART: [kat] HMAC-384Kdf
2,971,354 UART: [kat] LMS
3,503,146 UART: [kat] --
3,508,770 UART: [cold-reset] ++
3,510,914 UART: [fht] FHT @ 0x50003400
3,521,318 UART: [idev] ++
3,522,016 UART: [idev] CDI.KEYID = 6
3,523,043 UART: [idev] SUBJECT.KEYID = 7
3,524,147 UART: [idev] UDS.KEYID = 0
3,525,085 ready_for_fw is high
3,525,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,347 UART: [idev] Erasing UDS.KEYID = 0
6,027,039 UART: [idev] Sha1 KeyId Algorithm
6,049,941 UART: [idev] --
6,053,775 UART: [ldev] ++
6,054,451 UART: [ldev] CDI.KEYID = 6
6,055,464 UART: [ldev] SUBJECT.KEYID = 5
6,056,564 UART: [ldev] AUTHORITY.KEYID = 7
6,057,794 UART: [ldev] FE.KEYID = 1
6,099,818 UART: [ldev] Erasing FE.KEYID = 1
8,605,353 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,334 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,078 UART: [ldev] --
10,412,794 UART: [fwproc] Wait for Commands...
10,415,677 UART: [fwproc] Recv command 0x46574c44
10,417,934 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,844 >>> mbox cmd response: success
14,673,700 UART: [afmc] ++
14,674,422 UART: [afmc] CDI.KEYID = 6
14,675,612 UART: [afmc] SUBJECT.KEYID = 7
14,677,107 UART: [afmc] AUTHORITY.KEYID = 5
17,211,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,393 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,492 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,650 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,538 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,713 UART: [afmc] --
19,010,316 UART: [cold-reset] --
19,013,319 UART: [state] Locking Datavault
19,019,439 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,585 UART: [state] Locking ICCM
19,023,414 UART: [exit] Launching FMC @ 0x40000130
19,032,089 UART:
19,032,323 UART: Running Caliptra FMC ...
19,033,424 UART:
19,033,583 UART: [state] CFI Enabled
19,093,619 UART: [fht] FMC Alias Private Key: 7
20,859,854 UART: [art] Extend RT PCRs Done
20,861,074 UART: [art] Lock RT PCRs Done
20,862,888 UART: [art] Populate DV Done
20,868,369 UART: [fht] FMC Alias Private Key: 7
20,869,848 UART: [art] Derive CDI
20,870,578 UART: [art] Store in slot 0x4
20,926,161 UART: [art] Derive Key Pair
20,927,197 UART: [art] Store priv key in slot 0x5
23,389,672 UART: [art] Derive Key Pair - Done
23,402,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,688 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,178 UART: [art] PUB.X = 82E28762877B4AEEE165AB61B23EAC098E974E341A576CCC0052F0AA5C3F5792B7328A85BEA1BC07EBADD23103408EA5
25,124,481 UART: [art] PUB.Y = 6B743DAA9922BA5A8B57B2152B00253BFBC0C908B430CCDFF174EDFED63BFA94B68A00653B819A46978AEFCF5CCC28FC
25,131,769 UART: [art] SIG.R = 40A2ACC17565792FEF925C9EB2F74BDDA27101294209C46F2D91544838152B2E88B9D0747750FDD1B8583C0F87BC9E57
25,139,140 UART: [art] SIG.S = EEC459D23880687345543190C3E7A40B1959F3D7A5E18278DD8C8B0FE843D4D06EF284A41D6EB09E31C124B4BDCF48FC
26,117,905 UART: Caliptra RT
26,118,617 UART: [state] CFI Enabled
26,298,366 UART: [rt] RT listening for mailbox commands...
26,300,280 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,330,710 UART: [rt]cmd =0x44504543, len=40
26,358,511 >>> mbox cmd response data (40 bytes)
26,359,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,390,234 UART: [rt]cmd =0x44504543, len=96
26,450,099 >>> mbox cmd response data (56 bytes)
26,450,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,457 UART: [rt]cmd =0x44504543, len=96
26,556,522 >>> mbox cmd response data (56 bytes)
26,557,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,587,793 UART: [rt]cmd =0x44504543, len=96
26,663,480 >>> mbox cmd response data (56 bytes)
26,664,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,694,633 UART: [rt]cmd =0x44504543, len=96
26,770,031 >>> mbox cmd response data (56 bytes)
26,770,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,801,511 UART: [rt]cmd =0x44504543, len=96
26,877,089 >>> mbox cmd response data (56 bytes)
26,877,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,908,304 UART: [rt]cmd =0x44504543, len=96
26,984,045 >>> mbox cmd response data (56 bytes)
26,984,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,015,467 UART: [rt]cmd =0x44504543, len=96
27,090,157 >>> mbox cmd response data (56 bytes)
27,090,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,121,679 UART: [rt]cmd =0x44504543, len=96
27,197,352 >>> mbox cmd response data (56 bytes)
27,198,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,228,523 UART: [rt]cmd =0x44504543, len=96
27,304,265 >>> mbox cmd response data (56 bytes)
27,304,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,335,569 UART: [rt]cmd =0x44504543, len=96
27,411,580 >>> mbox cmd response data (56 bytes)
27,412,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,442,691 UART: [rt]cmd =0x44504543, len=96
27,518,364 >>> mbox cmd response data (56 bytes)
27,519,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,549,715 UART: [rt]cmd =0x44504543, len=96
27,625,279 >>> mbox cmd response data (56 bytes)
27,626,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,656,437 UART: [rt]cmd =0x44504543, len=96
27,731,294 >>> mbox cmd response data (56 bytes)
27,732,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,762,604 UART: [rt]cmd =0x44504543, len=96
27,838,580 >>> mbox cmd response data (56 bytes)
27,839,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,869,901 UART: [rt]cmd =0x44504543, len=96
27,876,719 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,439,488 ready_for_fw is high
3,439,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,798,845 >>> mbox cmd response: success
19,085,062 UART:
19,085,470 UART: Running Caliptra FMC ...
19,086,675 UART:
19,086,844 UART: [state] CFI Enabled
19,139,164 UART: [fht] FMC Alias Private Key: 7
20,905,261 UART: [art] Extend RT PCRs Done
20,906,620 UART: [art] Lock RT PCRs Done
20,908,036 UART: [art] Populate DV Done
20,913,506 UART: [fht] FMC Alias Private Key: 7
20,915,099 UART: [art] Derive CDI
20,915,862 UART: [art] Store in slot 0x4
20,971,387 UART: [art] Derive Key Pair
20,972,390 UART: [art] Store priv key in slot 0x5
23,435,660 UART: [art] Derive Key Pair - Done
23,448,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,162,341 UART: [art] PUB.X = E37B85A208A852D496E9ECDB12FFAC1DB7509B67B33E35F65B482F23F9D059131CC299B5679FB3828597C7D89EBB3B8F
25,169,631 UART: [art] PUB.Y = 6468C56BE5D3B2053F0FE89F2B3251437D7BA5D5DBBEA074A6D41ABAC26F8C10A967D826487181CBE16D12BAF29B8E28
25,176,921 UART: [art] SIG.R = E59638EF8095F95DAB125B317D854639C317DD879DBB3C0D4E0D663EACB6A80051803CA81C42777BD6DC20726E3BFFD5
25,184,308 UART: [art] SIG.S = B2F294DB67AE59BC0900E0AB1BB56C7D2D294982615993AFCD96083FFC18BF8109BE9F6E944CF13F5FB150B70E18CEE8
26,163,094 UART: Caliptra RT
26,163,825 UART: [state] CFI Enabled
26,344,900 UART: [rt] RT listening for mailbox commands...
26,346,961 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,376,863 UART: [rt]cmd =0x44504543, len=40
26,404,786 >>> mbox cmd response data (40 bytes)
26,405,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,436,636 UART: [rt]cmd =0x44504543, len=96
26,496,399 >>> mbox cmd response data (56 bytes)
26,497,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,527,675 UART: [rt]cmd =0x44504543, len=96
26,603,209 >>> mbox cmd response data (56 bytes)
26,603,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,634,575 UART: [rt]cmd =0x44504543, len=96
26,710,504 >>> mbox cmd response data (56 bytes)
26,711,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,741,758 UART: [rt]cmd =0x44504543, len=96
26,816,972 >>> mbox cmd response data (56 bytes)
26,817,693 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,848,234 UART: [rt]cmd =0x44504543, len=96
26,923,540 >>> mbox cmd response data (56 bytes)
26,924,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,954,595 UART: [rt]cmd =0x44504543, len=96
27,031,002 >>> mbox cmd response data (56 bytes)
27,031,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,062,206 UART: [rt]cmd =0x44504543, len=96
27,137,813 >>> mbox cmd response data (56 bytes)
27,138,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,168,961 UART: [rt]cmd =0x44504543, len=96
27,244,807 >>> mbox cmd response data (56 bytes)
27,245,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,276,164 UART: [rt]cmd =0x44504543, len=96
27,352,024 >>> mbox cmd response data (56 bytes)
27,352,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,383,247 UART: [rt]cmd =0x44504543, len=96
27,458,866 >>> mbox cmd response data (56 bytes)
27,459,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,490,028 UART: [rt]cmd =0x44504543, len=96
27,564,908 >>> mbox cmd response data (56 bytes)
27,565,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,596,196 UART: [rt]cmd =0x44504543, len=96
27,672,096 >>> mbox cmd response data (56 bytes)
27,672,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,703,357 UART: [rt]cmd =0x44504543, len=96
27,779,070 >>> mbox cmd response data (56 bytes)
27,779,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,810,169 UART: [rt]cmd =0x44504543, len=96
27,886,296 >>> mbox cmd response data (56 bytes)
27,887,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,917,551 UART: [rt]cmd =0x44504543, len=96
27,924,433 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,368 UART:
192,736 UART: Running Caliptra ROM ...
193,834 UART:
603,720 UART: [state] CFI Enabled
618,318 UART: [state] LifecycleState = Unprovisioned
620,706 UART: [state] DebugLocked = No
622,385 UART: [state] WD Timer not started. Device not locked for debugging
626,159 UART: [kat] SHA2-256
815,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,584 UART: [kat] ++
827,211 UART: [kat] sha1
838,736 UART: [kat] SHA2-256
841,745 UART: [kat] SHA2-384
846,530 UART: [kat] SHA2-512-ACC
849,115 UART: [kat] ECC-384
3,292,902 UART: [kat] HMAC-384Kdf
3,306,214 UART: [kat] LMS
3,838,032 UART: [kat] --
3,844,234 UART: [cold-reset] ++
3,846,096 UART: [fht] FHT @ 0x50003400
3,857,080 UART: [idev] ++
3,857,716 UART: [idev] CDI.KEYID = 6
3,858,676 UART: [idev] SUBJECT.KEYID = 7
3,859,925 UART: [idev] UDS.KEYID = 0
3,860,827 ready_for_fw is high
3,861,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,889 UART: [idev] Erasing UDS.KEYID = 0
6,335,267 UART: [idev] Sha1 KeyId Algorithm
6,357,940 UART: [idev] --
6,363,398 UART: [ldev] ++
6,364,083 UART: [ldev] CDI.KEYID = 6
6,364,977 UART: [ldev] SUBJECT.KEYID = 5
6,366,186 UART: [ldev] AUTHORITY.KEYID = 7
6,367,367 UART: [ldev] FE.KEYID = 1
6,377,666 UART: [ldev] Erasing FE.KEYID = 1
8,856,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,730 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,323 UART: [ldev] --
10,645,901 UART: [fwproc] Wait for Commands...
10,647,369 UART: [fwproc] Recv command 0x46574c44
10,649,627 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,222,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,560 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,163 >>> mbox cmd response: success
14,909,889 UART: [afmc] ++
14,910,627 UART: [afmc] CDI.KEYID = 6
14,911,748 UART: [afmc] SUBJECT.KEYID = 7
14,913,254 UART: [afmc] AUTHORITY.KEYID = 5
17,421,622 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,852 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,961 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,097 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,504 UART: [afmc] --
19,217,799 UART: [cold-reset] --
19,221,843 UART: [state] Locking Datavault
19,227,815 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,974 UART: [state] Locking ICCM
19,232,568 UART: [exit] Launching FMC @ 0x40000130
19,241,263 UART:
19,241,508 UART: Running Caliptra FMC ...
19,242,616 UART:
19,242,778 UART: [state] CFI Enabled
19,251,152 UART: [fht] FMC Alias Private Key: 7
21,016,906 UART: [art] Extend RT PCRs Done
21,018,128 UART: [art] Lock RT PCRs Done
21,019,964 UART: [art] Populate DV Done
21,025,546 UART: [fht] FMC Alias Private Key: 7
21,027,142 UART: [art] Derive CDI
21,027,906 UART: [art] Store in slot 0x4
21,070,895 UART: [art] Derive Key Pair
21,071,943 UART: [art] Store priv key in slot 0x5
23,498,902 UART: [art] Derive Key Pair - Done
23,511,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,291 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,798 UART: [art] PUB.X = C7FE3B8EEFAB7EB12C321BA8A1D6D33EC9DF650074C4F6362D5157096AC933316752CE3F8067324C00B1923ABABE2859
25,227,017 UART: [art] PUB.Y = 448C1FAB915E85CB3C72F493D69EA040AFA0D090411B292FAA66302D75B6F39695D28B7EDF9782396356C75BA1FCB04E
25,234,279 UART: [art] SIG.R = 577F3E6EAC7A57F78AF01B17BE5E5E64937FDBCB08A67CCF7A5BF8380F8728EB15C01F74BCED4E0C86B45EFD344F1DD1
25,241,701 UART: [art] SIG.S = C56AF912E8599655DBF7239D472220042E70FEF55AE15976D5CA31ADAFD8164E2DA79AC109BF83F113BCACEF3BC2B5B6
26,221,468 UART: Caliptra RT
26,222,161 UART: [state] CFI Enabled
26,354,942 UART: [rt] RT listening for mailbox commands...
26,356,869 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,387,024 UART: [rt]cmd =0x44504543, len=40
26,414,144 >>> mbox cmd response data (40 bytes)
26,415,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,446,039 UART: [rt]cmd =0x44504543, len=96
26,489,272 >>> mbox cmd response data (56 bytes)
26,490,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,520,574 UART: [rt]cmd =0x44504543, len=96
26,564,324 >>> mbox cmd response data (56 bytes)
26,565,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,595,653 UART: [rt]cmd =0x44504543, len=96
26,639,157 >>> mbox cmd response data (56 bytes)
26,639,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,670,315 UART: [rt]cmd =0x44504543, len=96
26,713,513 >>> mbox cmd response data (56 bytes)
26,714,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,744,938 UART: [rt]cmd =0x44504543, len=96
26,788,543 >>> mbox cmd response data (56 bytes)
26,789,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,556 UART: [rt]cmd =0x44504543, len=96
26,864,036 >>> mbox cmd response data (56 bytes)
26,864,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,895,502 UART: [rt]cmd =0x44504543, len=96
26,941,007 >>> mbox cmd response data (56 bytes)
26,941,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,972,145 UART: [rt]cmd =0x44504543, len=96
27,017,002 >>> mbox cmd response data (56 bytes)
27,017,717 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,048,480 UART: [rt]cmd =0x44504543, len=96
27,093,659 >>> mbox cmd response data (56 bytes)
27,094,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,125,011 UART: [rt]cmd =0x44504543, len=96
27,171,000 >>> mbox cmd response data (56 bytes)
27,171,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,201,957 UART: [rt]cmd =0x44504543, len=96
27,248,575 >>> mbox cmd response data (56 bytes)
27,249,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,279,898 UART: [rt]cmd =0x44504543, len=96
27,326,107 >>> mbox cmd response data (56 bytes)
27,326,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,357,310 UART: [rt]cmd =0x44504543, len=96
27,403,889 >>> mbox cmd response data (56 bytes)
27,404,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,435,122 UART: [rt]cmd =0x44504543, len=96
27,481,281 >>> mbox cmd response data (56 bytes)
27,481,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,512,513 UART: [rt]cmd =0x44504543, len=96
27,519,482 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,746,752 ready_for_fw is high
3,747,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,801 >>> mbox cmd response: success
19,294,083 UART:
19,294,486 UART: Running Caliptra FMC ...
19,295,598 UART:
19,295,758 UART: [state] CFI Enabled
19,304,020 UART: [fht] FMC Alias Private Key: 7
21,070,059 UART: [art] Extend RT PCRs Done
21,071,290 UART: [art] Lock RT PCRs Done
21,073,036 UART: [art] Populate DV Done
21,078,473 UART: [fht] FMC Alias Private Key: 7
21,080,127 UART: [art] Derive CDI
21,080,870 UART: [art] Store in slot 0x4
21,123,846 UART: [art] Derive Key Pair
21,124,848 UART: [art] Store priv key in slot 0x5
23,551,554 UART: [art] Derive Key Pair - Done
23,564,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,590 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,096 UART: [art] PUB.X = F6D3C0172DDEFE38583C4B9665F8A71C4F2285CDD9986C0C49573CAD960D53EB747E1195F8DB80E5FBD6099523FB91B7
25,279,375 UART: [art] PUB.Y = AFB6A6C148B1AFAE8795CDFA15C0911644E79353D3473487C387E5062FEDBC0A0BCF0D82B97F222EE9D0EA3A4BF7912D
25,286,636 UART: [art] SIG.R = 2072A3BEBA798B6CAD2341DADF9EA066B041B3562716E7158E79C495AF35B00AFFF1FD49E714AC65F92C730BD6A1DFFB
25,294,067 UART: [art] SIG.S = 416F1A4CB33DB1F5FC77CA1C2076210010A5BE54BB63480DDF93664E70DC3BB3171472CBEB03B40731CAE12C0C385934
26,273,011 UART: Caliptra RT
26,273,709 UART: [state] CFI Enabled
26,405,940 UART: [rt] RT listening for mailbox commands...
26,407,846 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,438,000 UART: [rt]cmd =0x44504543, len=40
26,465,638 >>> mbox cmd response data (40 bytes)
26,466,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,497,319 UART: [rt]cmd =0x44504543, len=96
26,540,166 >>> mbox cmd response data (56 bytes)
26,540,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,571,628 UART: [rt]cmd =0x44504543, len=96
26,614,945 >>> mbox cmd response data (56 bytes)
26,615,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,646,433 UART: [rt]cmd =0x44504543, len=96
26,690,071 >>> mbox cmd response data (56 bytes)
26,690,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,721,414 UART: [rt]cmd =0x44504543, len=96
26,765,177 >>> mbox cmd response data (56 bytes)
26,765,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,796,385 UART: [rt]cmd =0x44504543, len=96
26,840,563 >>> mbox cmd response data (56 bytes)
26,841,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,871,722 UART: [rt]cmd =0x44504543, len=96
26,916,976 >>> mbox cmd response data (56 bytes)
26,917,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,948,408 UART: [rt]cmd =0x44504543, len=96
26,993,198 >>> mbox cmd response data (56 bytes)
26,993,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,024,609 UART: [rt]cmd =0x44504543, len=96
27,070,101 >>> mbox cmd response data (56 bytes)
27,070,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,101,428 UART: [rt]cmd =0x44504543, len=96
27,146,071 >>> mbox cmd response data (56 bytes)
27,146,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,177,441 UART: [rt]cmd =0x44504543, len=96
27,222,760 >>> mbox cmd response data (56 bytes)
27,223,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,254,215 UART: [rt]cmd =0x44504543, len=96
27,299,369 >>> mbox cmd response data (56 bytes)
27,300,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,330,395 UART: [rt]cmd =0x44504543, len=96
27,376,332 >>> mbox cmd response data (56 bytes)
27,377,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,407,618 UART: [rt]cmd =0x44504543, len=96
27,454,034 >>> mbox cmd response data (56 bytes)
27,454,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,485,263 UART: [rt]cmd =0x44504543, len=96
27,532,235 >>> mbox cmd response data (56 bytes)
27,532,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,563,287 UART: [rt]cmd =0x44504543, len=96
27,569,943 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,509 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,187 UART: [kat] SHA2-256
882,118 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,233 UART: [kat] ++
886,385 UART: [kat] sha1
890,571 UART: [kat] SHA2-256
892,509 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,548 UART: [kat] LMS
1,475,744 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,943 UART: [fht] Storing FHT @ 0x50003400
1,479,638 UART: [idev] ++
1,479,806 UART: [idev] CDI.KEYID = 6
1,480,166 UART: [idev] SUBJECT.KEYID = 7
1,480,590 UART: [idev] UDS.KEYID = 0
1,480,935 ready_for_fw is high
1,480,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,146 UART: [idev] Erasing UDS.KEYID = 0
1,505,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,524 UART: [idev] --
1,515,545 UART: [ldev] ++
1,515,713 UART: [ldev] CDI.KEYID = 6
1,516,076 UART: [ldev] SUBJECT.KEYID = 5
1,516,502 UART: [ldev] AUTHORITY.KEYID = 7
1,516,965 UART: [ldev] FE.KEYID = 1
1,522,133 UART: [ldev] Erasing FE.KEYID = 1
1,547,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,988 UART: [ldev] --
1,586,335 UART: [fwproc] Waiting for Commands...
1,586,996 UART: [fwproc] Received command 0x46574c44
1,587,787 UART: [fwproc] Received Image of size 118548 bytes
2,933,611 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,025 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,544 >>> mbox cmd response: success
3,133,722 UART: [afmc] ++
3,133,890 UART: [afmc] CDI.KEYID = 6
3,134,252 UART: [afmc] SUBJECT.KEYID = 7
3,134,677 UART: [afmc] AUTHORITY.KEYID = 5
3,170,138 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,092 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,464 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,147 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,999 UART: [afmc] --
3,213,107 UART: [cold-reset] --
3,214,139 UART: [state] Locking Datavault
3,215,270 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,874 UART: [state] Locking ICCM
3,216,340 UART: [exit] Launching FMC @ 0x40000130
3,221,670 UART:
3,221,686 UART: Running Caliptra FMC ...
3,222,094 UART:
3,222,148 UART: [state] CFI Enabled
3,232,264 UART: [fht] FMC Alias Private Key: 7
3,351,656 UART: [art] Extend RT PCRs Done
3,352,084 UART: [art] Lock RT PCRs Done
3,353,362 UART: [art] Populate DV Done
3,361,415 UART: [fht] FMC Alias Private Key: 7
3,362,593 UART: [art] Derive CDI
3,362,873 UART: [art] Store in slot 0x4
3,448,679 UART: [art] Derive Key Pair
3,449,039 UART: [art] Store priv key in slot 0x5
3,462,370 UART: [art] Derive Key Pair - Done
3,477,610 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,166 UART: [art] PUB.X = B51258965C03837DD875A4E1E2369FA7CCF5C0504500686011E14E57067FD3C8080B45047A87AF3F602910BA377FFB4D
3,500,895 UART: [art] PUB.Y = DE0CABBAC6D5FBB56FA7DF5E9E634818A9BFF0645004A642101E2DDC7DF07FE5810DD0B5F73BEB575A165BFD5D3457F2
3,507,862 UART: [art] SIG.R = D7BA6DFB44D837B2441D814542230D50E40F4BF774489D3CE09F9C7525AA6C9C95AA7422EE8F974843219DB72AF6093B
3,514,627 UART: [art] SIG.S = 9CDB90A655A22562179217ED3EF1FC8E380BD0CFEA2BDA271BD213AB4E7842DA1015D238E9FACAD9D43D776D23445A24
3,538,380 UART: Caliptra RT
3,538,631 UART: [state] CFI Enabled
3,659,538 UART: [rt] RT listening for mailbox commands...
3,660,208 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,214 UART: [rt]cmd =0x44504543, len=40
3,717,208 >>> mbox cmd response data (40 bytes)
3,717,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,324 UART: [rt]cmd =0x44504543, len=96
3,790,202 >>> mbox cmd response data (56 bytes)
3,790,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,164 UART: [rt]cmd =0x44504543, len=96
3,863,556 >>> mbox cmd response data (56 bytes)
3,863,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,484 UART: [rt]cmd =0x44504543, len=96
3,937,229 >>> mbox cmd response data (56 bytes)
3,937,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,963 UART: [rt]cmd =0x44504543, len=96
4,010,773 >>> mbox cmd response data (56 bytes)
4,010,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,633 UART: [rt]cmd =0x44504543, len=96
4,084,392 >>> mbox cmd response data (56 bytes)
4,084,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,114,358 UART: [rt]cmd =0x44504543, len=96
4,158,832 >>> mbox cmd response data (56 bytes)
4,158,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,188,788 UART: [rt]cmd =0x44504543, len=96
4,233,185 >>> mbox cmd response data (56 bytes)
4,233,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,037 UART: [rt]cmd =0x44504543, len=96
4,308,597 >>> mbox cmd response data (56 bytes)
4,308,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,338,385 UART: [rt]cmd =0x44504543, len=96
4,383,140 >>> mbox cmd response data (56 bytes)
4,383,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,413,046 UART: [rt]cmd =0x44504543, len=96
4,458,890 >>> mbox cmd response data (56 bytes)
4,458,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,920 UART: [rt]cmd =0x44504543, len=96
4,534,593 >>> mbox cmd response data (56 bytes)
4,534,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,789 UART: [rt]cmd =0x44504543, len=96
4,610,911 >>> mbox cmd response data (56 bytes)
4,610,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,640,845 UART: [rt]cmd =0x44504543, len=96
4,687,156 >>> mbox cmd response data (56 bytes)
4,687,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,717,034 UART: [rt]cmd =0x44504543, len=96
4,763,428 >>> mbox cmd response data (56 bytes)
4,763,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,270 UART: [rt]cmd =0x44504543, len=96
4,800,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,085 ready_for_fw is high
1,362,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,084 >>> mbox cmd response: success
3,042,445 UART:
3,042,461 UART: Running Caliptra FMC ...
3,042,869 UART:
3,042,923 UART: [state] CFI Enabled
3,053,821 UART: [fht] FMC Alias Private Key: 7
3,172,335 UART: [art] Extend RT PCRs Done
3,172,763 UART: [art] Lock RT PCRs Done
3,174,073 UART: [art] Populate DV Done
3,182,224 UART: [fht] FMC Alias Private Key: 7
3,183,322 UART: [art] Derive CDI
3,183,602 UART: [art] Store in slot 0x4
3,269,316 UART: [art] Derive Key Pair
3,269,676 UART: [art] Store priv key in slot 0x5
3,283,235 UART: [art] Derive Key Pair - Done
3,298,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,988 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,753 UART: [art] PUB.X = E0C2A0331CD089423ADBE344CAD6C9C1EEA15910B405A7C080C65CAE7B9987D4D08DE2B41E589F3727F635CB3FC11444
3,321,532 UART: [art] PUB.Y = AF1AB906A3C49F08B2E374E206134B4B6B4F9879DA8ED9586CA3733F91650DD567212F5331AD0D78E2BE19D1140558DB
3,328,468 UART: [art] SIG.R = DA939A1D8C080EEE1F0AB5D7FB53637A7F01B150B25E79E4D5DA960A6DD90BBB599F734B6D7B3469FE27984E4376EF20
3,335,234 UART: [art] SIG.S = 563344FA1C47E562A30D1882F92DEBABF6783E802E01E5C3D2E3DE2783A37D7604F6CF6A32E7C3391AE7BAFC28305C40
3,358,397 UART: Caliptra RT
3,358,648 UART: [state] CFI Enabled
3,478,382 UART: [rt] RT listening for mailbox commands...
3,479,052 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,950 UART: [rt]cmd =0x44504543, len=40
3,536,132 >>> mbox cmd response data (40 bytes)
3,536,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,226 UART: [rt]cmd =0x44504543, len=96
3,608,200 >>> mbox cmd response data (56 bytes)
3,608,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,180 UART: [rt]cmd =0x44504543, len=96
3,680,500 >>> mbox cmd response data (56 bytes)
3,680,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,726 UART: [rt]cmd =0x44504543, len=96
3,753,595 >>> mbox cmd response data (56 bytes)
3,753,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,669 UART: [rt]cmd =0x44504543, len=96
3,826,847 >>> mbox cmd response data (56 bytes)
3,826,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,677 UART: [rt]cmd =0x44504543, len=96
3,900,394 >>> mbox cmd response data (56 bytes)
3,900,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,930,318 UART: [rt]cmd =0x44504543, len=96
3,975,134 >>> mbox cmd response data (56 bytes)
3,975,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,180 UART: [rt]cmd =0x44504543, len=96
4,049,821 >>> mbox cmd response data (56 bytes)
4,049,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,839 UART: [rt]cmd =0x44504543, len=96
4,124,863 >>> mbox cmd response data (56 bytes)
4,124,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,154,977 UART: [rt]cmd =0x44504543, len=96
4,200,014 >>> mbox cmd response data (56 bytes)
4,200,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,000 UART: [rt]cmd =0x44504543, len=96
4,275,476 >>> mbox cmd response data (56 bytes)
4,275,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,305,228 UART: [rt]cmd =0x44504543, len=96
4,350,805 >>> mbox cmd response data (56 bytes)
4,350,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,380,679 UART: [rt]cmd =0x44504543, len=96
4,426,223 >>> mbox cmd response data (56 bytes)
4,426,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,456,379 UART: [rt]cmd =0x44504543, len=96
4,502,160 >>> mbox cmd response data (56 bytes)
4,502,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,532,128 UART: [rt]cmd =0x44504543, len=96
4,579,134 >>> mbox cmd response data (56 bytes)
4,579,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,609,032 UART: [rt]cmd =0x44504543, len=96
4,616,423 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,540 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,382 UART: [kat] SHA2-256
892,320 UART: [kat] SHA2-384
895,097 UART: [kat] SHA2-512-ACC
896,998 UART: [kat] ECC-384
902,683 UART: [kat] HMAC-384Kdf
907,159 UART: [kat] LMS
1,475,355 UART: [kat] --
1,476,374 UART: [cold-reset] ++
1,476,784 UART: [fht] Storing FHT @ 0x50003400
1,479,673 UART: [idev] ++
1,479,841 UART: [idev] CDI.KEYID = 6
1,480,201 UART: [idev] SUBJECT.KEYID = 7
1,480,625 UART: [idev] UDS.KEYID = 0
1,480,970 ready_for_fw is high
1,480,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,729 UART: [idev] Erasing UDS.KEYID = 0
1,505,801 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,573 UART: [idev] --
1,515,564 UART: [ldev] ++
1,515,732 UART: [ldev] CDI.KEYID = 6
1,516,095 UART: [ldev] SUBJECT.KEYID = 5
1,516,521 UART: [ldev] AUTHORITY.KEYID = 7
1,516,984 UART: [ldev] FE.KEYID = 1
1,522,274 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,460 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,011 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,151 UART: [fwproc] Received command 0x46574c44
1,588,942 UART: [fwproc] Received Image of size 118548 bytes
2,933,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,158 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,376 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,721 >>> mbox cmd response: success
3,132,897 UART: [afmc] ++
3,133,065 UART: [afmc] CDI.KEYID = 6
3,133,427 UART: [afmc] SUBJECT.KEYID = 7
3,133,852 UART: [afmc] AUTHORITY.KEYID = 5
3,169,353 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,332 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,215 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,898 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,936 UART: [afmc] --
3,212,994 UART: [cold-reset] --
3,213,680 UART: [state] Locking Datavault
3,215,029 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,633 UART: [state] Locking ICCM
3,216,109 UART: [exit] Launching FMC @ 0x40000130
3,221,439 UART:
3,221,455 UART: Running Caliptra FMC ...
3,221,863 UART:
3,222,006 UART: [state] CFI Enabled
3,232,524 UART: [fht] FMC Alias Private Key: 7
3,351,554 UART: [art] Extend RT PCRs Done
3,351,982 UART: [art] Lock RT PCRs Done
3,353,720 UART: [art] Populate DV Done
3,361,747 UART: [fht] FMC Alias Private Key: 7
3,362,865 UART: [art] Derive CDI
3,363,145 UART: [art] Store in slot 0x4
3,448,813 UART: [art] Derive Key Pair
3,449,173 UART: [art] Store priv key in slot 0x5
3,462,370 UART: [art] Derive Key Pair - Done
3,477,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,729 UART: [art] PUB.X = D4B2F821568A23BA482E830C6C103AAA71CEB684B2BF82A9E54E6D3E8733167A20A359385E3FB49D6A07ED155CF48488
3,500,499 UART: [art] PUB.Y = ECB1EC228C75309B57D2EB487A4F20AE58E663B5CC78C244E9AEA3A23AD3735FE1241F9702B69696BBFB914151F9DEC2
3,507,460 UART: [art] SIG.R = 5734168E365A16A06EB0ACD7C614A1358D2EC0D46D45A4202672A168FB322C387B70069DBF24AC5D1ED3ACFDDBD6C21D
3,514,241 UART: [art] SIG.S = 32C9DB2BB2B9BE40B77F6D411BA691ACDA84262BE658034B66A7288F15F6DE134FB83F8622C88F259534BE86F0C53858
3,538,250 UART: Caliptra RT
3,538,593 UART: [state] CFI Enabled
3,658,054 UART: [rt] RT listening for mailbox commands...
3,658,724 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,640 UART: [rt]cmd =0x44504543, len=40
3,716,150 >>> mbox cmd response data (40 bytes)
3,716,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,164 UART: [rt]cmd =0x44504543, len=96
3,789,526 >>> mbox cmd response data (56 bytes)
3,789,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,526 UART: [rt]cmd =0x44504543, len=96
3,863,198 >>> mbox cmd response data (56 bytes)
3,863,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,124 UART: [rt]cmd =0x44504543, len=96
3,936,519 >>> mbox cmd response data (56 bytes)
3,936,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,389 UART: [rt]cmd =0x44504543, len=96
4,010,143 >>> mbox cmd response data (56 bytes)
4,010,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,153 UART: [rt]cmd =0x44504543, len=96
4,084,474 >>> mbox cmd response data (56 bytes)
4,084,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,114,528 UART: [rt]cmd =0x44504543, len=96
4,158,412 >>> mbox cmd response data (56 bytes)
4,158,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,188,398 UART: [rt]cmd =0x44504543, len=96
4,233,339 >>> mbox cmd response data (56 bytes)
4,233,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,263,217 UART: [rt]cmd =0x44504543, len=96
4,307,857 >>> mbox cmd response data (56 bytes)
4,307,858 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,337,889 UART: [rt]cmd =0x44504543, len=96
4,383,124 >>> mbox cmd response data (56 bytes)
4,383,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,413,026 UART: [rt]cmd =0x44504543, len=96
4,458,130 >>> mbox cmd response data (56 bytes)
4,458,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,794 UART: [rt]cmd =0x44504543, len=96
4,533,209 >>> mbox cmd response data (56 bytes)
4,533,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,563,387 UART: [rt]cmd =0x44504543, len=96
4,609,501 >>> mbox cmd response data (56 bytes)
4,609,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,639,507 UART: [rt]cmd =0x44504543, len=96
4,685,726 >>> mbox cmd response data (56 bytes)
4,685,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,715,676 UART: [rt]cmd =0x44504543, len=96
4,762,750 >>> mbox cmd response data (56 bytes)
4,762,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,792,732 UART: [rt]cmd =0x44504543, len=96
4,800,089 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,786 ready_for_fw is high
1,362,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,173 >>> mbox cmd response: success
3,044,200 UART:
3,044,216 UART: Running Caliptra FMC ...
3,044,624 UART:
3,044,767 UART: [state] CFI Enabled
3,055,451 UART: [fht] FMC Alias Private Key: 7
3,173,631 UART: [art] Extend RT PCRs Done
3,174,059 UART: [art] Lock RT PCRs Done
3,175,747 UART: [art] Populate DV Done
3,184,294 UART: [fht] FMC Alias Private Key: 7
3,185,458 UART: [art] Derive CDI
3,185,738 UART: [art] Store in slot 0x4
3,271,370 UART: [art] Derive Key Pair
3,271,730 UART: [art] Store priv key in slot 0x5
3,285,501 UART: [art] Derive Key Pair - Done
3,300,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,468 UART: [art] PUB.X = 44EA581F5E3117BF5EF96CFAB62FD54D65DFC3C8442E5FA1A7E9126BBBCC4E42713C4CCBED130D5A214700A147742E88
3,323,231 UART: [art] PUB.Y = 11FBB8595B4A898B72AF792F4D1214A940EBAD0696976B8B3E48AD165CF7BA5179CCA527839A79B2FBE9D3056C7746DF
3,330,185 UART: [art] SIG.R = DED9F0555BCC39B858B1A015F4430DE837602FEF67B259198B88AF2A9D7353E6BCC01E8B3D871CF9400A75021EB49C57
3,336,954 UART: [art] SIG.S = EA56219DE629C0379FE2028164C8A1AF4C03E888A26FE2A755C46BFACB5A82F1A343AF151A5061FBBB17A0870BBEE384
3,360,131 UART: Caliptra RT
3,360,474 UART: [state] CFI Enabled
3,481,647 UART: [rt] RT listening for mailbox commands...
3,482,317 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,581 UART: [rt]cmd =0x44504543, len=40
3,540,063 >>> mbox cmd response data (40 bytes)
3,540,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,007 UART: [rt]cmd =0x44504543, len=96
3,613,181 >>> mbox cmd response data (56 bytes)
3,613,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,009 UART: [rt]cmd =0x44504543, len=96
3,685,961 >>> mbox cmd response data (56 bytes)
3,685,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,013 UART: [rt]cmd =0x44504543, len=96
3,759,428 >>> mbox cmd response data (56 bytes)
3,759,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,560 UART: [rt]cmd =0x44504543, len=96
3,833,374 >>> mbox cmd response data (56 bytes)
3,833,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,863,328 UART: [rt]cmd =0x44504543, len=96
3,906,225 >>> mbox cmd response data (56 bytes)
3,906,226 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,936,189 UART: [rt]cmd =0x44504543, len=96
3,980,243 >>> mbox cmd response data (56 bytes)
3,980,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,351 UART: [rt]cmd =0x44504543, len=96
4,054,238 >>> mbox cmd response data (56 bytes)
4,054,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,084,134 UART: [rt]cmd =0x44504543, len=96
4,128,300 >>> mbox cmd response data (56 bytes)
4,128,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,562 UART: [rt]cmd =0x44504543, len=96
4,203,325 >>> mbox cmd response data (56 bytes)
4,203,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,233,357 UART: [rt]cmd =0x44504543, len=96
4,278,057 >>> mbox cmd response data (56 bytes)
4,278,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,971 UART: [rt]cmd =0x44504543, len=96
4,353,866 >>> mbox cmd response data (56 bytes)
4,353,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,383,716 UART: [rt]cmd =0x44504543, len=96
4,429,570 >>> mbox cmd response data (56 bytes)
4,429,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,459,390 UART: [rt]cmd =0x44504543, len=96
4,504,989 >>> mbox cmd response data (56 bytes)
4,504,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,534,841 UART: [rt]cmd =0x44504543, len=96
4,581,255 >>> mbox cmd response data (56 bytes)
4,581,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,611,097 UART: [rt]cmd =0x44504543, len=96
4,618,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,529 UART: [state] WD Timer not started. Device not locked for debugging
87,812 UART: [kat] SHA2-256
891,362 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,466 UART: [kat] ++
895,618 UART: [kat] sha1
899,852 UART: [kat] SHA2-256
901,792 UART: [kat] SHA2-384
904,389 UART: [kat] SHA2-512-ACC
906,290 UART: [kat] ECC-384
915,979 UART: [kat] HMAC-384Kdf
920,591 UART: [kat] LMS
1,168,903 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,172,832 UART: [idev] ++
1,173,000 UART: [idev] CDI.KEYID = 6
1,173,361 UART: [idev] SUBJECT.KEYID = 7
1,173,786 UART: [idev] UDS.KEYID = 0
1,174,132 ready_for_fw is high
1,174,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,859 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,207,887 UART: [idev] --
1,208,882 UART: [ldev] ++
1,209,050 UART: [ldev] CDI.KEYID = 6
1,209,414 UART: [ldev] SUBJECT.KEYID = 5
1,209,841 UART: [ldev] AUTHORITY.KEYID = 7
1,210,304 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,293 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,042 UART: [ldev] --
1,280,481 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,935 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,110 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,451 >>> mbox cmd response: success
2,825,473 UART: [afmc] ++
2,825,641 UART: [afmc] CDI.KEYID = 6
2,826,004 UART: [afmc] SUBJECT.KEYID = 7
2,826,430 UART: [afmc] AUTHORITY.KEYID = 5
2,861,753 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,640 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,099 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,980 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,681 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,256 UART: [afmc] --
2,905,153 UART: [cold-reset] --
2,906,017 UART: [state] Locking Datavault
2,906,986 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,590 UART: [state] Locking ICCM
2,908,046 UART: [exit] Launching FMC @ 0x40000130
2,913,376 UART:
2,913,392 UART: Running Caliptra FMC ...
2,913,800 UART:
2,913,854 UART: [state] CFI Enabled
2,924,650 UART: [fht] FMC Alias Private Key: 7
3,043,840 UART: [art] Extend RT PCRs Done
3,044,268 UART: [art] Lock RT PCRs Done
3,045,680 UART: [art] Populate DV Done
3,053,969 UART: [fht] FMC Alias Private Key: 7
3,054,923 UART: [art] Derive CDI
3,055,203 UART: [art] Store in slot 0x4
3,141,062 UART: [art] Derive Key Pair
3,141,422 UART: [art] Store priv key in slot 0x5
3,154,904 UART: [art] Derive Key Pair - Done
3,169,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,988 UART: [art] PUB.X = 5EBCD417F4B902469D53E3EF4DEE8D9CAAAE5DAD9756FCD7CF67A740A18F72297E17E29779F198687576AB189AEC25DD
3,192,773 UART: [art] PUB.Y = 895768BD780369BCA6445B0C5964BEFC98ED6757404E54A84E3046EBF4806293A6E59986CD6D32390D183C8D53BB86C0
3,199,712 UART: [art] SIG.R = 85CCA6FB75A8B40E743AB51C13851F52D189EF2E2E8FC481CC5F9CA861CCC99234DC0C17D9F638B10D2CE0573BFD3CED
3,206,495 UART: [art] SIG.S = 950852855649A160D960DAF5422AED07BA725DA41CFFF9C7A17B788FF90E58F7160DD8F0D95B6165D5163B54C45AA0BA
3,230,131 UART: Caliptra RT
3,230,382 UART: [state] CFI Enabled
3,349,960 UART: [rt] RT listening for mailbox commands...
3,350,630 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,554 UART: [rt]cmd =0x44504543, len=40
3,408,156 >>> mbox cmd response data (40 bytes)
3,408,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,108 UART: [rt]cmd =0x44504543, len=96
3,481,078 >>> mbox cmd response data (56 bytes)
3,481,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,146 UART: [rt]cmd =0x44504543, len=96
3,554,116 >>> mbox cmd response data (56 bytes)
3,554,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,280 UART: [rt]cmd =0x44504543, len=96
3,627,299 >>> mbox cmd response data (56 bytes)
3,627,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,081 UART: [rt]cmd =0x44504543, len=96
3,700,553 >>> mbox cmd response data (56 bytes)
3,700,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,517 UART: [rt]cmd =0x44504543, len=96
3,774,486 >>> mbox cmd response data (56 bytes)
3,774,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,564 UART: [rt]cmd =0x44504543, len=96
3,848,090 >>> mbox cmd response data (56 bytes)
3,848,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,098 UART: [rt]cmd =0x44504543, len=96
3,922,703 >>> mbox cmd response data (56 bytes)
3,922,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,751 UART: [rt]cmd =0x44504543, len=96
3,997,597 >>> mbox cmd response data (56 bytes)
3,997,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,373 UART: [rt]cmd =0x44504543, len=96
4,071,708 >>> mbox cmd response data (56 bytes)
4,071,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,101,708 UART: [rt]cmd =0x44504543, len=96
4,147,080 >>> mbox cmd response data (56 bytes)
4,147,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,176,882 UART: [rt]cmd =0x44504543, len=96
4,222,787 >>> mbox cmd response data (56 bytes)
4,222,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,252,709 UART: [rt]cmd =0x44504543, len=96
4,298,755 >>> mbox cmd response data (56 bytes)
4,298,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,328,587 UART: [rt]cmd =0x44504543, len=96
4,375,364 >>> mbox cmd response data (56 bytes)
4,375,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,405,222 UART: [rt]cmd =0x44504543, len=96
4,451,118 >>> mbox cmd response data (56 bytes)
4,451,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,481,184 UART: [rt]cmd =0x44504543, len=96
4,488,473 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,646 ready_for_fw is high
1,058,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,494 >>> mbox cmd response: success
2,740,609 UART:
2,740,625 UART: Running Caliptra FMC ...
2,741,033 UART:
2,741,087 UART: [state] CFI Enabled
2,751,507 UART: [fht] FMC Alias Private Key: 7
2,870,531 UART: [art] Extend RT PCRs Done
2,870,959 UART: [art] Lock RT PCRs Done
2,872,333 UART: [art] Populate DV Done
2,880,354 UART: [fht] FMC Alias Private Key: 7
2,881,478 UART: [art] Derive CDI
2,881,758 UART: [art] Store in slot 0x4
2,967,625 UART: [art] Derive Key Pair
2,967,985 UART: [art] Store priv key in slot 0x5
2,981,415 UART: [art] Derive Key Pair - Done
2,996,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,750 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,515 UART: [art] PUB.X = 57B73D2D8EE5D3F27BD2477178D448046EBCC5782C4296F677E088991D24BD5411E1407470C80BBA09C0D9C81B88BF4A
3,019,278 UART: [art] PUB.Y = 1770FBA0AA8281A74E967883DDF89F264E170D43033070E52ED254A87685212ABCF56E886A1FF4AD2D0C737CA5392F3F
3,026,223 UART: [art] SIG.R = F1B5077D2BEF1F6AB9BCF55DD9AEF8E9B42D931755CE09C40EF794FF97FB9B61A8F7086E07D018E834895D46DF1F61A0
3,032,996 UART: [art] SIG.S = 1E4FF7960416A47F70A50C8F0D51242AAC83442B2A481E971E4F704CF5BDC76D87DF001D5D1A1C3FE6A98FA65B2830E4
3,057,119 UART: Caliptra RT
3,057,370 UART: [state] CFI Enabled
3,176,921 UART: [rt] RT listening for mailbox commands...
3,177,591 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,007 UART: [rt]cmd =0x44504543, len=40
3,235,357 >>> mbox cmd response data (40 bytes)
3,235,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,539 UART: [rt]cmd =0x44504543, len=96
3,308,043 >>> mbox cmd response data (56 bytes)
3,308,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,035 UART: [rt]cmd =0x44504543, len=96
3,380,859 >>> mbox cmd response data (56 bytes)
3,380,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,791 UART: [rt]cmd =0x44504543, len=96
3,454,272 >>> mbox cmd response data (56 bytes)
3,454,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,168 UART: [rt]cmd =0x44504543, len=96
3,527,282 >>> mbox cmd response data (56 bytes)
3,527,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,080 UART: [rt]cmd =0x44504543, len=96
3,600,425 >>> mbox cmd response data (56 bytes)
3,600,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,523 UART: [rt]cmd =0x44504543, len=96
3,674,745 >>> mbox cmd response data (56 bytes)
3,674,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,704,637 UART: [rt]cmd =0x44504543, len=96
3,748,840 >>> mbox cmd response data (56 bytes)
3,748,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,044 UART: [rt]cmd =0x44504543, len=96
3,823,432 >>> mbox cmd response data (56 bytes)
3,823,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,474 UART: [rt]cmd =0x44504543, len=96
3,897,847 >>> mbox cmd response data (56 bytes)
3,897,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,927,729 UART: [rt]cmd =0x44504543, len=96
3,973,143 >>> mbox cmd response data (56 bytes)
3,973,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,155 UART: [rt]cmd =0x44504543, len=96
4,049,156 >>> mbox cmd response data (56 bytes)
4,049,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,184 UART: [rt]cmd =0x44504543, len=96
4,125,306 >>> mbox cmd response data (56 bytes)
4,125,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,270 UART: [rt]cmd =0x44504543, len=96
4,201,337 >>> mbox cmd response data (56 bytes)
4,201,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,295 UART: [rt]cmd =0x44504543, len=96
4,277,557 >>> mbox cmd response data (56 bytes)
4,277,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,575 UART: [rt]cmd =0x44504543, len=96
4,315,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
891,617 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,721 UART: [kat] ++
895,873 UART: [kat] sha1
900,103 UART: [kat] SHA2-256
902,043 UART: [kat] SHA2-384
904,756 UART: [kat] SHA2-512-ACC
906,657 UART: [kat] ECC-384
916,684 UART: [kat] HMAC-384Kdf
921,488 UART: [kat] LMS
1,169,800 UART: [kat] --
1,170,849 UART: [cold-reset] ++
1,171,221 UART: [fht] FHT @ 0x50003400
1,173,959 UART: [idev] ++
1,174,127 UART: [idev] CDI.KEYID = 6
1,174,488 UART: [idev] SUBJECT.KEYID = 7
1,174,913 UART: [idev] UDS.KEYID = 0
1,175,259 ready_for_fw is high
1,175,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,904 UART: [idev] Erasing UDS.KEYID = 0
1,200,672 UART: [idev] Sha1 KeyId Algorithm
1,209,528 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,059 UART: [ldev] SUBJECT.KEYID = 5
1,211,486 UART: [ldev] AUTHORITY.KEYID = 7
1,211,949 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,921 UART: [ldev] --
1,283,304 UART: [fwproc] Wait for Commands...
1,283,897 UART: [fwproc] Recv command 0x46574c44
1,284,630 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,364 >>> mbox cmd response: success
2,829,546 UART: [afmc] ++
2,829,714 UART: [afmc] CDI.KEYID = 6
2,830,077 UART: [afmc] SUBJECT.KEYID = 7
2,830,503 UART: [afmc] AUTHORITY.KEYID = 5
2,865,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,895 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,644 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,354 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,235 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,936 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,727 UART: [afmc] --
2,909,596 UART: [cold-reset] --
2,910,462 UART: [state] Locking Datavault
2,911,815 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,419 UART: [state] Locking ICCM
2,912,891 UART: [exit] Launching FMC @ 0x40000130
2,918,221 UART:
2,918,237 UART: Running Caliptra FMC ...
2,918,645 UART:
2,918,788 UART: [state] CFI Enabled
2,928,872 UART: [fht] FMC Alias Private Key: 7
3,047,484 UART: [art] Extend RT PCRs Done
3,047,912 UART: [art] Lock RT PCRs Done
3,049,626 UART: [art] Populate DV Done
3,057,973 UART: [fht] FMC Alias Private Key: 7
3,058,927 UART: [art] Derive CDI
3,059,207 UART: [art] Store in slot 0x4
3,145,032 UART: [art] Derive Key Pair
3,145,392 UART: [art] Store priv key in slot 0x5
3,158,252 UART: [art] Derive Key Pair - Done
3,173,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,502 UART: [art] PUB.X = 6D10B9AAA43728AD78109CA3F681DEA650EEC5AD53DBF9EE2AF5DF519EE6B16B7A2BA17DF58A9FE4FB55CF74CEECC934
3,196,306 UART: [art] PUB.Y = EF8B58C4A84139A86DCDFAC73C5FB76B527854BD8ADCE0D8E8642DFD503AD1ECAD5C07784B808DDFBB3D37A0EF469877
3,203,279 UART: [art] SIG.R = DCA4D04C9C329758250EB6F99B38FFE02E119167F85E5AD4719CBEB8A7DDCB6A55057F3EF751D76F4310EBF87595CD5B
3,210,059 UART: [art] SIG.S = DAB9E5F7DFE19AE28D9E614CA70BDD04480F7CC5A35F5C8F4E82B01BB0BC5B7D2A888AEB5EE187854505632C47C466E4
3,234,055 UART: Caliptra RT
3,234,398 UART: [state] CFI Enabled
3,353,820 UART: [rt] RT listening for mailbox commands...
3,354,490 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,580 UART: [rt]cmd =0x44504543, len=40
3,411,810 >>> mbox cmd response data (40 bytes)
3,411,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,624 UART: [rt]cmd =0x44504543, len=96
3,484,148 >>> mbox cmd response data (56 bytes)
3,484,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,124 UART: [rt]cmd =0x44504543, len=96
3,556,810 >>> mbox cmd response data (56 bytes)
3,556,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,660 UART: [rt]cmd =0x44504543, len=96
3,630,407 >>> mbox cmd response data (56 bytes)
3,630,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,627 UART: [rt]cmd =0x44504543, len=96
3,704,273 >>> mbox cmd response data (56 bytes)
3,704,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,139 UART: [rt]cmd =0x44504543, len=96
3,777,880 >>> mbox cmd response data (56 bytes)
3,777,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,954 UART: [rt]cmd =0x44504543, len=96
3,852,312 >>> mbox cmd response data (56 bytes)
3,852,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,312 UART: [rt]cmd =0x44504543, len=96
3,926,935 >>> mbox cmd response data (56 bytes)
3,926,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,956,993 UART: [rt]cmd =0x44504543, len=96
4,001,155 >>> mbox cmd response data (56 bytes)
4,001,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,083 UART: [rt]cmd =0x44504543, len=96
4,075,970 >>> mbox cmd response data (56 bytes)
4,075,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,968 UART: [rt]cmd =0x44504543, len=96
4,151,988 >>> mbox cmd response data (56 bytes)
4,151,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,918 UART: [rt]cmd =0x44504543, len=96
4,227,517 >>> mbox cmd response data (56 bytes)
4,227,518 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,257,829 UART: [rt]cmd =0x44504543, len=96
4,304,311 >>> mbox cmd response data (56 bytes)
4,304,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,323 UART: [rt]cmd =0x44504543, len=96
4,380,222 >>> mbox cmd response data (56 bytes)
4,380,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,410,366 UART: [rt]cmd =0x44504543, len=96
4,457,310 >>> mbox cmd response data (56 bytes)
4,457,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,124 UART: [rt]cmd =0x44504543, len=96
4,494,339 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,771 ready_for_fw is high
1,059,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,699 >>> mbox cmd response: success
2,741,726 UART:
2,741,742 UART: Running Caliptra FMC ...
2,742,150 UART:
2,742,293 UART: [state] CFI Enabled
2,752,587 UART: [fht] FMC Alias Private Key: 7
2,871,685 UART: [art] Extend RT PCRs Done
2,872,113 UART: [art] Lock RT PCRs Done
2,873,823 UART: [art] Populate DV Done
2,882,114 UART: [fht] FMC Alias Private Key: 7
2,883,244 UART: [art] Derive CDI
2,883,524 UART: [art] Store in slot 0x4
2,969,277 UART: [art] Derive Key Pair
2,969,637 UART: [art] Store priv key in slot 0x5
2,983,183 UART: [art] Derive Key Pair - Done
2,998,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,006 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,771 UART: [art] PUB.X = 9DC5B12F70A0A3DF69227C363FB0ADA2E4B21C113A3A8899564B5BA4903E25C17C029AEE64FDCD348CFBBE0D7F69D851
3,021,553 UART: [art] PUB.Y = 0C55973B026CA3622D1B61A06E976A98747E1748998BD9975C54EDFE003C7C2C4B757BD92519FD6C61FDF4B521A889A0
3,028,477 UART: [art] SIG.R = B26211212305FFA42FF4E36B5EB86C76A2EDED1E4BA11944A92F4DE47CE6815E9078822B47D64CF01D04F4C03A9250E5
3,035,249 UART: [art] SIG.S = 25FDB9114A4007F52BEE15176871B3C25E4F99C276E1ECF751D6DDA169393A315548970446AAF50CCBC18D9BC637123E
3,059,128 UART: Caliptra RT
3,059,471 UART: [state] CFI Enabled
3,178,172 UART: [rt] RT listening for mailbox commands...
3,178,842 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,998 UART: [rt]cmd =0x44504543, len=40
3,236,330 >>> mbox cmd response data (40 bytes)
3,236,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,050 UART: [rt]cmd =0x44504543, len=96
3,307,898 >>> mbox cmd response data (56 bytes)
3,307,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,876 UART: [rt]cmd =0x44504543, len=96
3,380,952 >>> mbox cmd response data (56 bytes)
3,380,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,858 UART: [rt]cmd =0x44504543, len=96
3,454,229 >>> mbox cmd response data (56 bytes)
3,454,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,247 UART: [rt]cmd =0x44504543, len=96
3,527,485 >>> mbox cmd response data (56 bytes)
3,527,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,557,297 UART: [rt]cmd =0x44504543, len=96
3,601,304 >>> mbox cmd response data (56 bytes)
3,601,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,212 UART: [rt]cmd =0x44504543, len=96
3,675,482 >>> mbox cmd response data (56 bytes)
3,675,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,366 UART: [rt]cmd =0x44504543, len=96
3,749,765 >>> mbox cmd response data (56 bytes)
3,749,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,663 UART: [rt]cmd =0x44504543, len=96
3,823,457 >>> mbox cmd response data (56 bytes)
3,823,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,605 UART: [rt]cmd =0x44504543, len=96
3,898,906 >>> mbox cmd response data (56 bytes)
3,898,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,928,682 UART: [rt]cmd =0x44504543, len=96
3,973,216 >>> mbox cmd response data (56 bytes)
3,973,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,106 UART: [rt]cmd =0x44504543, len=96
4,048,373 >>> mbox cmd response data (56 bytes)
4,048,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,291 UART: [rt]cmd =0x44504543, len=96
4,124,277 >>> mbox cmd response data (56 bytes)
4,124,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,154,349 UART: [rt]cmd =0x44504543, len=96
4,200,994 >>> mbox cmd response data (56 bytes)
4,200,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,900 UART: [rt]cmd =0x44504543, len=96
4,277,738 >>> mbox cmd response data (56 bytes)
4,277,739 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,307,692 UART: [rt]cmd =0x44504543, len=96
4,315,477 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,426 UART: [kat] SHA2-512-ACC
908,327 UART: [kat] ECC-384
917,802 UART: [kat] HMAC-384Kdf
922,264 UART: [kat] LMS
1,170,592 UART: [kat] --
1,171,403 UART: [cold-reset] ++
1,171,851 UART: [fht] FHT @ 0x50003400
1,174,546 UART: [idev] ++
1,174,714 UART: [idev] CDI.KEYID = 6
1,175,074 UART: [idev] SUBJECT.KEYID = 7
1,175,498 UART: [idev] UDS.KEYID = 0
1,175,843 ready_for_fw is high
1,175,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,282 UART: [idev] Erasing UDS.KEYID = 0
1,200,775 UART: [idev] Sha1 KeyId Algorithm
1,209,351 UART: [idev] --
1,210,453 UART: [ldev] ++
1,210,621 UART: [ldev] CDI.KEYID = 6
1,210,984 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,243,264 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,631 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,907 UART: [ldev] --
1,282,218 UART: [fwproc] Wait for Commands...
1,282,846 UART: [fwproc] Recv command 0x46574c44
1,283,574 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,768 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,071 >>> mbox cmd response: success
2,828,301 UART: [afmc] ++
2,828,469 UART: [afmc] CDI.KEYID = 6
2,828,831 UART: [afmc] SUBJECT.KEYID = 7
2,829,256 UART: [afmc] AUTHORITY.KEYID = 5
2,864,705 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,244 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,836 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,537 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,251 UART: [afmc] --
2,908,143 UART: [cold-reset] --
2,909,187 UART: [state] Locking Datavault
2,910,236 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,840 UART: [state] Locking ICCM
2,911,494 UART: [exit] Launching FMC @ 0x40000130
2,916,824 UART:
2,916,840 UART: Running Caliptra FMC ...
2,917,248 UART:
2,917,302 UART: [state] CFI Enabled
2,927,766 UART: [fht] FMC Alias Private Key: 7
3,046,306 UART: [art] Extend RT PCRs Done
3,046,734 UART: [art] Lock RT PCRs Done
3,048,154 UART: [art] Populate DV Done
3,056,401 UART: [fht] FMC Alias Private Key: 7
3,057,453 UART: [art] Derive CDI
3,057,733 UART: [art] Store in slot 0x4
3,143,850 UART: [art] Derive Key Pair
3,144,210 UART: [art] Store priv key in slot 0x5
3,157,832 UART: [art] Derive Key Pair - Done
3,172,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,432 UART: [art] PUB.X = 5FF1897A337C522FD890006FDD6D9BFFA78284E4BCB977AF765D4B301DE9F59CFE2232A37A4852C059F5DDCC5768C4A2
3,196,194 UART: [art] PUB.Y = 9857C5E9245EFF971745CF1A9DF24B16DE2C0884FD04219D77836BAC8FAE9D8AF3D8086C4EBF64B13EFB52345F174D4E
3,203,149 UART: [art] SIG.R = DD8EB1D66C4E5B97CF6EA3554EB152F1205DE5B33D5F9F16AD085AD4D0A658C26E59C7758C6E00489D15684B0EAD31D4
3,209,905 UART: [art] SIG.S = 4893E2FDA269EB9427E5DC1A766E83E6E5AF17FBCB302F56DEFBBA4C09A6FC0C5384070480F2A46B7A3F76E5D13AAFBF
3,233,923 UART: Caliptra RT
3,234,174 UART: [state] CFI Enabled
3,353,847 UART: [rt] RT listening for mailbox commands...
3,354,517 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,905 UART: [rt]cmd =0x44504543, len=40
3,412,317 >>> mbox cmd response data (40 bytes)
3,412,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,281 UART: [rt]cmd =0x44504543, len=96
3,485,673 >>> mbox cmd response data (56 bytes)
3,485,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,889 UART: [rt]cmd =0x44504543, len=96
3,559,025 >>> mbox cmd response data (56 bytes)
3,559,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,589,067 UART: [rt]cmd =0x44504543, len=96
3,632,454 >>> mbox cmd response data (56 bytes)
3,632,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,544 UART: [rt]cmd =0x44504543, len=96
3,706,322 >>> mbox cmd response data (56 bytes)
3,706,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,170 UART: [rt]cmd =0x44504543, len=96
3,779,935 >>> mbox cmd response data (56 bytes)
3,779,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,019 UART: [rt]cmd =0x44504543, len=96
3,854,797 >>> mbox cmd response data (56 bytes)
3,854,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,951 UART: [rt]cmd =0x44504543, len=96
3,929,486 >>> mbox cmd response data (56 bytes)
3,929,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,959,358 UART: [rt]cmd =0x44504543, len=96
4,004,288 >>> mbox cmd response data (56 bytes)
4,004,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,450 UART: [rt]cmd =0x44504543, len=96
4,079,809 >>> mbox cmd response data (56 bytes)
4,079,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,109,863 UART: [rt]cmd =0x44504543, len=96
4,155,321 >>> mbox cmd response data (56 bytes)
4,155,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,185,429 UART: [rt]cmd =0x44504543, len=96
4,230,576 >>> mbox cmd response data (56 bytes)
4,230,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,542 UART: [rt]cmd =0x44504543, len=96
4,306,242 >>> mbox cmd response data (56 bytes)
4,306,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,336,316 UART: [rt]cmd =0x44504543, len=96
4,381,919 >>> mbox cmd response data (56 bytes)
4,381,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,985 UART: [rt]cmd =0x44504543, len=96
4,458,101 >>> mbox cmd response data (56 bytes)
4,458,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,199 UART: [rt]cmd =0x44504543, len=96
4,495,118 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,539 ready_for_fw is high
1,059,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,074 >>> mbox cmd response: success
2,740,599 UART:
2,740,615 UART: Running Caliptra FMC ...
2,741,023 UART:
2,741,077 UART: [state] CFI Enabled
2,751,715 UART: [fht] FMC Alias Private Key: 7
2,870,609 UART: [art] Extend RT PCRs Done
2,871,037 UART: [art] Lock RT PCRs Done
2,872,443 UART: [art] Populate DV Done
2,880,742 UART: [fht] FMC Alias Private Key: 7
2,881,682 UART: [art] Derive CDI
2,881,962 UART: [art] Store in slot 0x4
2,967,823 UART: [art] Derive Key Pair
2,968,183 UART: [art] Store priv key in slot 0x5
2,981,159 UART: [art] Derive Key Pair - Done
2,996,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,222 UART: [art] PUB.X = C9203344FFB5D4790FB10B13D81E584C64F1821FBFC4DD2697FAAEF2EEE86EBB7141F43FF74E05EE0845E09DE7A5E006
3,018,995 UART: [art] PUB.Y = 4BE072D619A6B84E0E157D74B1A8787AD24E2651E9B626D54DE0952BEEA0B1401426C123A245F3822B229328A0A523D0
3,025,940 UART: [art] SIG.R = A8FA9F88D5DB0FC5BE21C623A6EB75FD56187E9763B4B75CE058DD39C86DBC0A0D87FAEBC84111920A096043F922DEC1
3,032,713 UART: [art] SIG.S = 843655A6EBD56B3F7253A10E505B811B6B1B1E5F3EECF86406ACDCB2D43ABC98E1664A7D150191F01C91ED2382F5109D
3,056,592 UART: Caliptra RT
3,056,843 UART: [state] CFI Enabled
3,176,837 UART: [rt] RT listening for mailbox commands...
3,177,507 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,367 UART: [rt]cmd =0x44504543, len=40
3,234,625 >>> mbox cmd response data (40 bytes)
3,234,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,655 UART: [rt]cmd =0x44504543, len=96
3,307,467 >>> mbox cmd response data (56 bytes)
3,307,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,325 UART: [rt]cmd =0x44504543, len=96
3,379,743 >>> mbox cmd response data (56 bytes)
3,379,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,721 UART: [rt]cmd =0x44504543, len=96
3,452,922 >>> mbox cmd response data (56 bytes)
3,452,923 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,092 UART: [rt]cmd =0x44504543, len=96
3,526,488 >>> mbox cmd response data (56 bytes)
3,526,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,438 UART: [rt]cmd =0x44504543, len=96
3,600,311 >>> mbox cmd response data (56 bytes)
3,600,312 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,281 UART: [rt]cmd =0x44504543, len=96
3,674,423 >>> mbox cmd response data (56 bytes)
3,674,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,704,387 UART: [rt]cmd =0x44504543, len=96
3,748,190 >>> mbox cmd response data (56 bytes)
3,748,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,076 UART: [rt]cmd =0x44504543, len=96
3,822,918 >>> mbox cmd response data (56 bytes)
3,822,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,822 UART: [rt]cmd =0x44504543, len=96
3,897,861 >>> mbox cmd response data (56 bytes)
3,897,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,927,703 UART: [rt]cmd =0x44504543, len=96
3,973,069 >>> mbox cmd response data (56 bytes)
3,973,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,079 UART: [rt]cmd =0x44504543, len=96
4,048,166 >>> mbox cmd response data (56 bytes)
4,048,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,082 UART: [rt]cmd =0x44504543, len=96
4,124,096 >>> mbox cmd response data (56 bytes)
4,124,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,154,046 UART: [rt]cmd =0x44504543, len=96
4,200,605 >>> mbox cmd response data (56 bytes)
4,200,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,521 UART: [rt]cmd =0x44504543, len=96
4,276,835 >>> mbox cmd response data (56 bytes)
4,276,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,725 UART: [rt]cmd =0x44504543, len=96
4,314,074 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,985 UART: [kat] HMAC-384Kdf
923,539 UART: [kat] LMS
1,171,867 UART: [kat] --
1,172,688 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,175,857 UART: [idev] ++
1,176,025 UART: [idev] CDI.KEYID = 6
1,176,385 UART: [idev] SUBJECT.KEYID = 7
1,176,809 UART: [idev] UDS.KEYID = 0
1,177,154 ready_for_fw is high
1,177,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,810 UART: [idev] Sha1 KeyId Algorithm
1,210,360 UART: [idev] --
1,211,446 UART: [ldev] ++
1,211,614 UART: [ldev] CDI.KEYID = 6
1,211,977 UART: [ldev] SUBJECT.KEYID = 5
1,212,403 UART: [ldev] AUTHORITY.KEYID = 7
1,212,866 UART: [ldev] FE.KEYID = 1
1,218,120 UART: [ldev] Erasing FE.KEYID = 1
1,244,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,428 UART: [ldev] --
1,283,707 UART: [fwproc] Wait for Commands...
1,284,323 UART: [fwproc] Recv command 0x46574c44
1,285,051 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,396 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,311 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,481 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,796 >>> mbox cmd response: success
2,829,844 UART: [afmc] ++
2,830,012 UART: [afmc] CDI.KEYID = 6
2,830,374 UART: [afmc] SUBJECT.KEYID = 7
2,830,799 UART: [afmc] AUTHORITY.KEYID = 5
2,866,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,863 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,611 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,203 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,904 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,710 UART: [afmc] --
2,909,740 UART: [cold-reset] --
2,910,488 UART: [state] Locking Datavault
2,911,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,191 UART: [state] Locking ICCM
2,912,635 UART: [exit] Launching FMC @ 0x40000130
2,917,965 UART:
2,917,981 UART: Running Caliptra FMC ...
2,918,389 UART:
2,918,532 UART: [state] CFI Enabled
2,928,950 UART: [fht] FMC Alias Private Key: 7
3,047,818 UART: [art] Extend RT PCRs Done
3,048,246 UART: [art] Lock RT PCRs Done
3,049,884 UART: [art] Populate DV Done
3,057,877 UART: [fht] FMC Alias Private Key: 7
3,059,001 UART: [art] Derive CDI
3,059,281 UART: [art] Store in slot 0x4
3,145,004 UART: [art] Derive Key Pair
3,145,364 UART: [art] Store priv key in slot 0x5
3,159,522 UART: [art] Derive Key Pair - Done
3,174,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,353 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,118 UART: [art] PUB.X = 029925E42393137CE4691B4DAC08850B523FA8FDD11E60E3BE6BC1CC4631648C9828CDC4C1DA97154D14CFCC9C537D4E
3,196,889 UART: [art] PUB.Y = 4D8D2290CAB11740FA579323A2167F7A28E941D7D18301CADCD61831C7C9E7CECDC1C59EA801D769BAF3198A235F0F67
3,203,840 UART: [art] SIG.R = 0204C957489A846DE5EBCF7605DD22E329F1C3EE9BA5FE9125C1D6A0D458941623AFB90859B3B6666F9B8F8E28E6CBA0
3,210,608 UART: [art] SIG.S = 351E4BAC86317322C445898895F2227B58096242E6E7E47CFD11B45A06CD8D298A8F5FBDB2A12AB2688F5C206518D3D2
3,234,610 UART: Caliptra RT
3,234,953 UART: [state] CFI Enabled
3,353,901 UART: [rt] RT listening for mailbox commands...
3,354,571 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,625 UART: [rt]cmd =0x44504543, len=40
3,411,795 >>> mbox cmd response data (40 bytes)
3,411,796 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,793 UART: [rt]cmd =0x44504543, len=96
3,484,393 >>> mbox cmd response data (56 bytes)
3,484,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,409 UART: [rt]cmd =0x44504543, len=96
3,557,571 >>> mbox cmd response data (56 bytes)
3,557,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,595 UART: [rt]cmd =0x44504543, len=96
3,631,296 >>> mbox cmd response data (56 bytes)
3,631,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,214 UART: [rt]cmd =0x44504543, len=96
3,704,538 >>> mbox cmd response data (56 bytes)
3,704,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,734,688 UART: [rt]cmd =0x44504543, len=96
3,778,821 >>> mbox cmd response data (56 bytes)
3,778,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,808,795 UART: [rt]cmd =0x44504543, len=96
3,853,031 >>> mbox cmd response data (56 bytes)
3,853,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,123 UART: [rt]cmd =0x44504543, len=96
3,927,700 >>> mbox cmd response data (56 bytes)
3,927,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,860 UART: [rt]cmd =0x44504543, len=96
4,002,290 >>> mbox cmd response data (56 bytes)
4,002,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,384 UART: [rt]cmd =0x44504543, len=96
4,077,239 >>> mbox cmd response data (56 bytes)
4,077,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,107,141 UART: [rt]cmd =0x44504543, len=96
4,152,911 >>> mbox cmd response data (56 bytes)
4,152,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,182,687 UART: [rt]cmd =0x44504543, len=96
4,228,842 >>> mbox cmd response data (56 bytes)
4,228,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,850 UART: [rt]cmd =0x44504543, len=96
4,304,842 >>> mbox cmd response data (56 bytes)
4,304,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,334,896 UART: [rt]cmd =0x44504543, len=96
4,381,537 >>> mbox cmd response data (56 bytes)
4,381,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,411,503 UART: [rt]cmd =0x44504543, len=96
4,457,855 >>> mbox cmd response data (56 bytes)
4,457,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,799 UART: [rt]cmd =0x44504543, len=96
4,495,308 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 ready_for_fw is high
1,060,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,939 >>> mbox cmd response: success
2,742,866 UART:
2,742,882 UART: Running Caliptra FMC ...
2,743,290 UART:
2,743,433 UART: [state] CFI Enabled
2,754,229 UART: [fht] FMC Alias Private Key: 7
2,872,787 UART: [art] Extend RT PCRs Done
2,873,215 UART: [art] Lock RT PCRs Done
2,874,613 UART: [art] Populate DV Done
2,882,812 UART: [fht] FMC Alias Private Key: 7
2,883,764 UART: [art] Derive CDI
2,884,044 UART: [art] Store in slot 0x4
2,969,887 UART: [art] Derive Key Pair
2,970,247 UART: [art] Store priv key in slot 0x5
2,984,061 UART: [art] Derive Key Pair - Done
2,999,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,012 UART: [art] PUB.X = 66C5602EFD41FCB9261946D466AC754A78FC982591A4025815D8F95FAEB01BC2C1BCDCFD2DF18EADCBAA3B2CE68520F3
3,021,801 UART: [art] PUB.Y = B5CA86BC8234F9A4F49E6583B86356A59ED8C7A2F7D40016BAD149FD6CF93B36C1A70B3A88B7C884F260F82749CA5CD4
3,028,738 UART: [art] SIG.R = E23B9D71EB5281B6EF7CF60B728D38E2C33634C836FC92E7283D61828BCBEB76CEF53E06482A2753B70C7750B2A9C423
3,035,505 UART: [art] SIG.S = F111B3F0AD6EC2D47BE0C6A95E40D3E97A07E4CE04E9D43F8BB2FBABAB98AAF21C2EC4EBC0EFEC86F971E002F92B51E5
3,059,524 UART: Caliptra RT
3,059,867 UART: [state] CFI Enabled
3,179,923 UART: [rt] RT listening for mailbox commands...
3,180,593 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,675 UART: [rt]cmd =0x44504543, len=40
3,238,191 >>> mbox cmd response data (40 bytes)
3,238,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,039 UART: [rt]cmd =0x44504543, len=96
3,310,891 >>> mbox cmd response data (56 bytes)
3,310,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,340,867 UART: [rt]cmd =0x44504543, len=96
3,384,167 >>> mbox cmd response data (56 bytes)
3,384,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,347 UART: [rt]cmd =0x44504543, len=96
3,457,700 >>> mbox cmd response data (56 bytes)
3,457,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,487,768 UART: [rt]cmd =0x44504543, len=96
3,531,600 >>> mbox cmd response data (56 bytes)
3,531,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,561,806 UART: [rt]cmd =0x44504543, len=96
3,605,101 >>> mbox cmd response data (56 bytes)
3,605,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,947 UART: [rt]cmd =0x44504543, len=96
3,679,297 >>> mbox cmd response data (56 bytes)
3,679,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,267 UART: [rt]cmd =0x44504543, len=96
3,754,102 >>> mbox cmd response data (56 bytes)
3,754,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,848 UART: [rt]cmd =0x44504543, len=96
3,828,094 >>> mbox cmd response data (56 bytes)
3,828,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,132 UART: [rt]cmd =0x44504543, len=96
3,903,451 >>> mbox cmd response data (56 bytes)
3,903,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,933,195 UART: [rt]cmd =0x44504543, len=96
3,978,091 >>> mbox cmd response data (56 bytes)
3,978,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,151 UART: [rt]cmd =0x44504543, len=96
4,053,822 >>> mbox cmd response data (56 bytes)
4,053,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,706 UART: [rt]cmd =0x44504543, len=96
4,129,262 >>> mbox cmd response data (56 bytes)
4,129,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,960 UART: [rt]cmd =0x44504543, len=96
4,205,309 >>> mbox cmd response data (56 bytes)
4,205,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,427 UART: [rt]cmd =0x44504543, len=96
4,281,355 >>> mbox cmd response data (56 bytes)
4,281,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,311,267 UART: [rt]cmd =0x44504543, len=96
4,318,632 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
192,021 UART:
192,428 UART: Running Caliptra ROM ...
193,591 UART:
193,742 UART: [state] CFI Enabled
265,471 UART: [state] LifecycleState = Unprovisioned
267,455 UART: [state] DebugLocked = No
269,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,633 UART: [kat] SHA2-256
445,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,839 UART: [kat] ++
456,321 UART: [kat] sha1
467,409 UART: [kat] SHA2-256
470,141 UART: [kat] SHA2-384
477,266 UART: [kat] SHA2-512-ACC
479,633 UART: [kat] ECC-384
2,767,724 UART: [kat] HMAC-384Kdf
2,779,968 UART: [kat] LMS
3,970,259 UART: [kat] --
3,974,035 UART: [cold-reset] ++
3,976,187 UART: [fht] Storing FHT @ 0x50003400
3,987,593 UART: [idev] ++
3,988,222 UART: [idev] CDI.KEYID = 6
3,989,108 UART: [idev] SUBJECT.KEYID = 7
3,990,347 UART: [idev] UDS.KEYID = 0
3,991,357 ready_for_fw is high
3,991,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,716 UART: [idev] Erasing UDS.KEYID = 0
7,322,448 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,760 UART: [idev] --
7,349,138 UART: [ldev] ++
7,349,707 UART: [ldev] CDI.KEYID = 6
7,350,684 UART: [ldev] SUBJECT.KEYID = 5
7,351,845 UART: [ldev] AUTHORITY.KEYID = 7
7,353,146 UART: [ldev] FE.KEYID = 1
7,380,755 UART: [ldev] Erasing FE.KEYID = 1
10,711,976 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,006,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,021,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,036,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,050,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,069,613 UART: [ldev] --
13,074,178 UART: [fwproc] Waiting for Commands...
13,076,220 UART: [fwproc] Received command 0x46574c44
13,078,455 UART: [fwproc] Received Image of size 118548 bytes
17,185,835 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,263,295 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,336,438 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,664,545 >>> mbox cmd response: success
17,669,402 UART: [afmc] ++
17,670,034 UART: [afmc] CDI.KEYID = 6
17,670,955 UART: [afmc] SUBJECT.KEYID = 7
17,672,175 UART: [afmc] AUTHORITY.KEYID = 5
21,029,522 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,329,553 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,331,817 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,346,232 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,360,954 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,375,400 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,396,416 UART: [afmc] --
23,400,656 UART: [cold-reset] --
23,404,043 UART: [state] Locking Datavault
23,409,131 UART: [state] Locking PCR0, PCR1 and PCR31
23,410,895 UART: [state] Locking ICCM
23,412,127 UART: [exit] Launching FMC @ 0x40000130
23,420,521 UART:
23,420,777 UART: Running Caliptra FMC ...
23,421,880 UART:
23,422,037 UART: [state] CFI Enabled
23,489,383 UART: [fht] FMC Alias Private Key: 7
25,829,339 UART: [art] Extend RT PCRs Done
25,830,558 UART: [art] Lock RT PCRs Done
25,832,230 UART: [art] Populate DV Done
25,837,749 UART: [fht] FMC Alias Private Key: 7
25,839,289 UART: [art] Derive CDI
25,840,102 UART: [art] Store in slot 0x4
25,898,449 UART: [art] Derive Key Pair
25,899,488 UART: [art] Store priv key in slot 0x5
29,192,251 UART: [art] Derive Key Pair - Done
29,205,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,494,303 UART: [art] Erasing AUTHORITY.KEYID = 7
31,495,811 UART: [art] PUB.X = 63E8EF880220A105585766D3A50D2B285755B2B4BDB767F17CD56AFB36807B568837CE0D99746E7367DE118C069DF1B2
31,503,070 UART: [art] PUB.Y = 260BA117AA6407EC20B9578A3418427BA50AFEE54208799CA480A88A9CBBE84ECBB14909DB1F070CA6B6BC6EA754A5A1
31,510,352 UART: [art] SIG.R = 376C05BA852CB8BEC0FEDDE9B9561F9290E9C0DFCB97527D6F537813D6BB78D285C5D4D8F71638011BBFC75B7678E076
31,517,741 UART: [art] SIG.S = 0309C5D32985E40AC3004E3DDB291892AFCD86A0207F9296E525348704E88A623195BF35CCA26BC3455D35DFCD053EB3
32,822,693 UART: Caliptra RT
32,823,409 UART: [state] CFI Enabled
33,001,460 UART: [rt] RT listening for mailbox commands...
33,003,377 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,033,445 UART: [rt]cmd =0x44504543, len=24
33,081,682 >>> mbox cmd response data (40 bytes)
33,082,504 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,112,465 UART: [rt]cmd =0x44504543, len=24
33,145,409 >>> mbox cmd response data (40 bytes)
33,146,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,175,827 UART: [rt]cmd =0x44504543, len=24
33,209,939 >>> mbox cmd response data (40 bytes)
33,210,576 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,240,613 UART: [rt]cmd =0x44504543, len=24
33,274,019 >>> mbox cmd response data (40 bytes)
33,274,645 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,304,541 UART: [rt]cmd =0x44504543, len=24
33,337,814 >>> mbox cmd response data (40 bytes)
33,338,466 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,368,468 UART: [rt]cmd =0x44504543, len=24
33,401,840 >>> mbox cmd response data (40 bytes)
33,402,490 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,432,498 UART: [rt]cmd =0x44504543, len=24
33,465,915 >>> mbox cmd response data (40 bytes)
33,466,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,496,096 UART: [rt]cmd =0x44504543, len=24
33,529,823 >>> mbox cmd response data (40 bytes)
33,530,445 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,560,245 UART: [rt]cmd =0x44504543, len=24
33,593,776 >>> mbox cmd response data (40 bytes)
33,594,452 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,624,084 UART: [rt]cmd =0x44504543, len=24
33,658,870 >>> mbox cmd response data (40 bytes)
33,659,521 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,689,636 UART: [rt]cmd =0x44504543, len=24
33,724,157 >>> mbox cmd response data (40 bytes)
33,724,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,754,470 UART: [rt]cmd =0x44504543, len=24
33,788,057 >>> mbox cmd response data (40 bytes)
33,788,665 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,818,477 UART: [rt]cmd =0x44504543, len=24
33,852,266 >>> mbox cmd response data (40 bytes)
33,852,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,882,783 UART: [rt]cmd =0x44504543, len=24
33,916,683 >>> mbox cmd response data (40 bytes)
33,917,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,946,890 UART: [rt]cmd =0x44504543, len=24
33,953,774 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,806,472 ready_for_fw is high
3,806,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,131 >>> mbox cmd response: success
23,631,363 UART:
23,631,761 UART: Running Caliptra FMC ...
23,632,973 UART:
23,633,147 UART: [state] CFI Enabled
23,700,553 UART: [fht] FMC Alias Private Key: 7
26,041,053 UART: [art] Extend RT PCRs Done
26,042,287 UART: [art] Lock RT PCRs Done
26,044,083 UART: [art] Populate DV Done
26,049,476 UART: [fht] FMC Alias Private Key: 7
26,051,022 UART: [art] Derive CDI
26,051,840 UART: [art] Store in slot 0x4
26,109,588 UART: [art] Derive Key Pair
26,110,635 UART: [art] Store priv key in slot 0x5
29,403,646 UART: [art] Derive Key Pair - Done
29,416,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,387 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,896 UART: [art] PUB.X = 52C7E99D2E3312D5C83B9A64682F925106CCCC820B3A3DCC5E160010E03C06FC8F2382DE6D769CEF5B9C0074F3E5966A
31,714,149 UART: [art] PUB.Y = 3D021D816AE7200870D7EE94BE107BE5359D20609B06CA6C2A204AC6F0379A71A219A7D7FBEF335E35E4FB639888279D
31,721,349 UART: [art] SIG.R = EEFADB8CF70617AA9FB84E558C2A9C4A0629F0EC09A1DF0653107FA9305BC679E0BEA7B42A238B7D7001F8D76D70654C
31,728,803 UART: [art] SIG.S = 2DC748DD5A83C95FDD4615EBBECA4550D16B0277CC0D4280D11A847650C21E2C56ADFD4F84D672CF2B80175D6F0FAB9F
33,034,154 UART: Caliptra RT
33,034,872 UART: [state] CFI Enabled
33,213,005 UART: [rt] RT listening for mailbox commands...
33,214,932 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,245,024 UART: [rt]cmd =0x44504543, len=24
33,293,237 >>> mbox cmd response data (40 bytes)
33,293,989 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,324,013 UART: [rt]cmd =0x44504543, len=24
33,357,265 >>> mbox cmd response data (40 bytes)
33,357,897 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,387,917 UART: [rt]cmd =0x44504543, len=24
33,421,047 >>> mbox cmd response data (40 bytes)
33,421,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,451,576 UART: [rt]cmd =0x44504543, len=24
33,485,170 >>> mbox cmd response data (40 bytes)
33,485,827 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,515,728 UART: [rt]cmd =0x44504543, len=24
33,549,292 >>> mbox cmd response data (40 bytes)
33,549,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,579,846 UART: [rt]cmd =0x44504543, len=24
33,613,344 >>> mbox cmd response data (40 bytes)
33,613,954 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,643,648 UART: [rt]cmd =0x44504543, len=24
33,677,589 >>> mbox cmd response data (40 bytes)
33,678,207 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,708,004 UART: [rt]cmd =0x44504543, len=24
33,741,902 >>> mbox cmd response data (40 bytes)
33,742,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,772,521 UART: [rt]cmd =0x44504543, len=24
33,805,788 >>> mbox cmd response data (40 bytes)
33,806,433 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,836,219 UART: [rt]cmd =0x44504543, len=24
33,869,807 >>> mbox cmd response data (40 bytes)
33,870,453 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,900,415 UART: [rt]cmd =0x44504543, len=24
33,934,050 >>> mbox cmd response data (40 bytes)
33,934,670 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,964,553 UART: [rt]cmd =0x44504543, len=24
33,998,141 >>> mbox cmd response data (40 bytes)
33,998,765 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,028,635 UART: [rt]cmd =0x44504543, len=24
34,062,104 >>> mbox cmd response data (40 bytes)
34,062,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,092,732 UART: [rt]cmd =0x44504543, len=24
34,126,226 >>> mbox cmd response data (40 bytes)
34,126,877 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,156,827 UART: [rt]cmd =0x44504543, len=24
34,163,390 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,385 UART:
192,741 UART: Running Caliptra ROM ...
193,955 UART:
603,583 UART: [state] CFI Enabled
618,971 UART: [state] LifecycleState = Unprovisioned
620,848 UART: [state] DebugLocked = No
622,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,363 UART: [kat] SHA2-256
796,156 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,698 UART: [kat] ++
807,146 UART: [kat] sha1
819,792 UART: [kat] SHA2-256
822,509 UART: [kat] SHA2-384
828,423 UART: [kat] SHA2-512-ACC
830,790 UART: [kat] ECC-384
3,113,914 UART: [kat] HMAC-384Kdf
3,125,928 UART: [kat] LMS
4,316,030 UART: [kat] --
4,321,532 UART: [cold-reset] ++
4,322,675 UART: [fht] Storing FHT @ 0x50003400
4,334,082 UART: [idev] ++
4,334,651 UART: [idev] CDI.KEYID = 6
4,335,599 UART: [idev] SUBJECT.KEYID = 7
4,336,835 UART: [idev] UDS.KEYID = 0
4,337,782 ready_for_fw is high
4,337,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,818 UART: [idev] Erasing UDS.KEYID = 0
7,627,076 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,563 UART: [idev] --
7,652,046 UART: [ldev] ++
7,652,623 UART: [ldev] CDI.KEYID = 6
7,653,585 UART: [ldev] SUBJECT.KEYID = 5
7,654,795 UART: [ldev] AUTHORITY.KEYID = 7
7,656,021 UART: [ldev] FE.KEYID = 1
7,666,355 UART: [ldev] Erasing FE.KEYID = 1
10,951,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,229 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,762 UART: [ldev] --
13,309,997 UART: [fwproc] Waiting for Commands...
13,312,084 UART: [fwproc] Received command 0x46574c44
13,314,272 UART: [fwproc] Received Image of size 118548 bytes
17,421,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,967 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,135 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,919 >>> mbox cmd response: success
17,901,488 UART: [afmc] ++
17,902,099 UART: [afmc] CDI.KEYID = 6
17,903,027 UART: [afmc] SUBJECT.KEYID = 7
17,904,243 UART: [afmc] AUTHORITY.KEYID = 5
21,222,944 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,310 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,707 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,171 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,131 UART: [afmc] --
23,588,649 UART: [cold-reset] --
23,592,504 UART: [state] Locking Datavault
23,597,148 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,895 UART: [state] Locking ICCM
23,599,959 UART: [exit] Launching FMC @ 0x40000130
23,608,349 UART:
23,608,579 UART: Running Caliptra FMC ...
23,609,690 UART:
23,609,860 UART: [state] CFI Enabled
23,617,769 UART: [fht] FMC Alias Private Key: 7
25,958,178 UART: [art] Extend RT PCRs Done
25,959,396 UART: [art] Lock RT PCRs Done
25,961,126 UART: [art] Populate DV Done
25,966,480 UART: [fht] FMC Alias Private Key: 7
25,968,010 UART: [art] Derive CDI
25,968,821 UART: [art] Store in slot 0x4
26,011,139 UART: [art] Derive Key Pair
26,012,137 UART: [art] Store priv key in slot 0x5
29,254,076 UART: [art] Derive Key Pair - Done
29,266,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,275 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,778 UART: [art] PUB.X = 2C39B1248A1973A69E52470DA26048AEF9EA624AEEDA57DF0A2DDE0B1C10638D8F948CFED6A629E90B68B8D18DF1830A
31,556,021 UART: [art] PUB.Y = 919EEC52DCC45752DE2544D1D09A553E972F9B82BCBBE7EEDD552114B2F0CAFC46E02F7A629216005656CAE39589DFDA
31,563,308 UART: [art] SIG.R = 34B126AC4CA788B23AE187757B5D3DFB52D91A47F8AA7B49D6E1DC01FCB9F8C6BD362DAAE44465D8BC1C4B130F850BB9
31,570,704 UART: [art] SIG.S = A204A1DB7FCCA88DB375E68A88C88E6E5BC0732F5B83FB94C671878A73A24B96F5C0576E84FC98007B31D3DBA2C6D4CF
32,875,662 UART: Caliptra RT
32,876,375 UART: [state] CFI Enabled
33,008,793 UART: [rt] RT listening for mailbox commands...
33,010,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,040,745 UART: [rt]cmd =0x44504543, len=24
33,068,600 >>> mbox cmd response data (40 bytes)
33,069,379 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,099,283 UART: [rt]cmd =0x44504543, len=24
33,126,522 >>> mbox cmd response data (40 bytes)
33,127,145 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,156,786 UART: [rt]cmd =0x44504543, len=24
33,184,622 >>> mbox cmd response data (40 bytes)
33,185,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,214,874 UART: [rt]cmd =0x44504543, len=24
33,242,109 >>> mbox cmd response data (40 bytes)
33,242,763 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,272,554 UART: [rt]cmd =0x44504543, len=24
33,299,820 >>> mbox cmd response data (40 bytes)
33,300,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,330,499 UART: [rt]cmd =0x44504543, len=24
33,357,902 >>> mbox cmd response data (40 bytes)
33,358,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,388,301 UART: [rt]cmd =0x44504543, len=24
33,415,946 >>> mbox cmd response data (40 bytes)
33,416,589 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,446,377 UART: [rt]cmd =0x44504543, len=24
33,473,908 >>> mbox cmd response data (40 bytes)
33,474,506 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,504,353 UART: [rt]cmd =0x44504543, len=24
33,532,619 >>> mbox cmd response data (40 bytes)
33,533,262 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,563,225 UART: [rt]cmd =0x44504543, len=24
33,590,907 >>> mbox cmd response data (40 bytes)
33,591,525 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,621,420 UART: [rt]cmd =0x44504543, len=24
33,649,660 >>> mbox cmd response data (40 bytes)
33,650,320 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,680,213 UART: [rt]cmd =0x44504543, len=24
33,707,613 >>> mbox cmd response data (40 bytes)
33,708,236 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,738,213 UART: [rt]cmd =0x44504543, len=24
33,765,892 >>> mbox cmd response data (40 bytes)
33,766,497 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,796,121 UART: [rt]cmd =0x44504543, len=24
33,823,528 >>> mbox cmd response data (40 bytes)
33,824,141 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,853,946 UART: [rt]cmd =0x44504543, len=24
33,860,715 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
4,130,099 ready_for_fw is high
4,130,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,158,737 >>> mbox cmd response: success
23,795,889 UART:
23,796,296 UART: Running Caliptra FMC ...
23,797,496 UART:
23,797,661 UART: [state] CFI Enabled
23,805,669 UART: [fht] FMC Alias Private Key: 7
26,145,909 UART: [art] Extend RT PCRs Done
26,147,165 UART: [art] Lock RT PCRs Done
26,148,688 UART: [art] Populate DV Done
26,154,482 UART: [fht] FMC Alias Private Key: 7
26,155,974 UART: [art] Derive CDI
26,156,785 UART: [art] Store in slot 0x4
26,199,552 UART: [art] Derive Key Pair
26,200,589 UART: [art] Store priv key in slot 0x5
29,442,978 UART: [art] Derive Key Pair - Done
29,456,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,101 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,609 UART: [art] PUB.X = 0AD987FC00F044E032D514D6FF7C762B6F0C04612F7186D1C0996A092441691AC4E088ABF6E2143354F19FCB9E91D4C5
31,744,852 UART: [art] PUB.Y = 342791CEF8F1047FA9E361B81063E17C242FC4C91A642A88590F36FC9864FD68715E0505BC48A1D631DEFAE1BB98DCA2
31,752,096 UART: [art] SIG.R = EC4BF2C88ECC7226AB2751C80FAAFF4942CFE3FF423C7586D7A3F48CFC40F35D038D1BC767B3337A8F047317E562EC15
31,759,500 UART: [art] SIG.S = 2CF13E4F99F2E4E17F41C46C4AC260C1CDA9A5B764C221145EFAE45B3E39BD810D5551A95867223694149D01EC66E264
33,064,727 UART: Caliptra RT
33,065,449 UART: [state] CFI Enabled
33,198,718 UART: [rt] RT listening for mailbox commands...
33,200,638 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,230,435 UART: [rt]cmd =0x44504543, len=24
33,258,160 >>> mbox cmd response data (40 bytes)
33,258,900 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,288,635 UART: [rt]cmd =0x44504543, len=24
33,316,733 >>> mbox cmd response data (40 bytes)
33,317,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,347,408 UART: [rt]cmd =0x44504543, len=24
33,375,101 >>> mbox cmd response data (40 bytes)
33,375,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,405,796 UART: [rt]cmd =0x44504543, len=24
33,433,253 >>> mbox cmd response data (40 bytes)
33,433,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,463,886 UART: [rt]cmd =0x44504543, len=24
33,491,809 >>> mbox cmd response data (40 bytes)
33,492,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,522,347 UART: [rt]cmd =0x44504543, len=24
33,550,271 >>> mbox cmd response data (40 bytes)
33,550,923 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,580,931 UART: [rt]cmd =0x44504543, len=24
33,608,676 >>> mbox cmd response data (40 bytes)
33,609,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,639,346 UART: [rt]cmd =0x44504543, len=24
33,667,022 >>> mbox cmd response data (40 bytes)
33,667,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,697,800 UART: [rt]cmd =0x44504543, len=24
33,725,336 >>> mbox cmd response data (40 bytes)
33,726,029 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,755,875 UART: [rt]cmd =0x44504543, len=24
33,783,239 >>> mbox cmd response data (40 bytes)
33,784,014 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,814,172 UART: [rt]cmd =0x44504543, len=24
33,841,664 >>> mbox cmd response data (40 bytes)
33,842,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,872,073 UART: [rt]cmd =0x44504543, len=24
33,899,651 >>> mbox cmd response data (40 bytes)
33,900,269 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,930,212 UART: [rt]cmd =0x44504543, len=24
33,957,973 >>> mbox cmd response data (40 bytes)
33,958,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,988,367 UART: [rt]cmd =0x44504543, len=24
34,016,280 >>> mbox cmd response data (40 bytes)
34,016,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,046,908 UART: [rt]cmd =0x44504543, len=24
34,053,182 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
192,164 UART:
192,544 UART: Running Caliptra ROM ...
193,732 UART:
193,887 UART: [state] CFI Enabled
266,478 UART: [state] LifecycleState = Unprovisioned
268,451 UART: [state] DebugLocked = No
270,625 UART: [state] WD Timer not started. Device not locked for debugging
275,157 UART: [kat] SHA2-256
454,843 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,586 UART: [kat] ++
466,039 UART: [kat] sha1
476,985 UART: [kat] SHA2-256
479,703 UART: [kat] SHA2-384
484,924 UART: [kat] SHA2-512-ACC
487,271 UART: [kat] ECC-384
2,949,856 UART: [kat] HMAC-384Kdf
2,971,353 UART: [kat] LMS
3,447,845 UART: [kat] --
3,451,623 UART: [cold-reset] ++
3,453,410 UART: [fht] FHT @ 0x50003400
3,466,015 UART: [idev] ++
3,466,586 UART: [idev] CDI.KEYID = 6
3,467,614 UART: [idev] SUBJECT.KEYID = 7
3,468,781 UART: [idev] UDS.KEYID = 0
3,469,821 ready_for_fw is high
3,470,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,055 UART: [idev] Erasing UDS.KEYID = 0
5,990,931 UART: [idev] Sha1 KeyId Algorithm
6,013,332 UART: [idev] --
6,017,331 UART: [ldev] ++
6,017,912 UART: [ldev] CDI.KEYID = 6
6,018,803 UART: [ldev] SUBJECT.KEYID = 5
6,020,014 UART: [ldev] AUTHORITY.KEYID = 7
6,021,302 UART: [ldev] FE.KEYID = 1
6,059,523 UART: [ldev] Erasing FE.KEYID = 1
8,566,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,982 UART: [ldev] --
10,373,644 UART: [fwproc] Wait for Commands...
10,376,918 UART: [fwproc] Recv command 0x46574c44
10,378,892 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,581 >>> mbox cmd response: success
14,346,348 UART: [afmc] ++
14,346,958 UART: [afmc] CDI.KEYID = 6
14,347,903 UART: [afmc] SUBJECT.KEYID = 7
14,349,125 UART: [afmc] AUTHORITY.KEYID = 5
16,875,692 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,045 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,113 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,665 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,839 UART: [afmc] --
18,693,890 UART: [cold-reset] --
18,696,070 UART: [state] Locking Datavault
18,701,554 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,249 UART: [state] Locking ICCM
18,704,882 UART: [exit] Launching FMC @ 0x40000130
18,713,270 UART:
18,713,510 UART: Running Caliptra FMC ...
18,714,536 UART:
18,714,679 UART: [state] CFI Enabled
18,774,873 UART: [fht] FMC Alias Private Key: 7
20,541,315 UART: [art] Extend RT PCRs Done
20,542,529 UART: [art] Lock RT PCRs Done
20,544,234 UART: [art] Populate DV Done
20,549,804 UART: [fht] FMC Alias Private Key: 7
20,551,443 UART: [art] Derive CDI
20,552,177 UART: [art] Store in slot 0x4
20,606,884 UART: [art] Derive Key Pair
20,607,918 UART: [art] Store priv key in slot 0x5
23,070,281 UART: [art] Derive Key Pair - Done
23,083,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,560 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,070 UART: [art] PUB.X = DDA99854E8BF3B58C114336F625B00A93004725536F64A5F5354A47799243FB4BC0BC644B5E01A802B9B07586D9AFEE2
24,804,322 UART: [art] PUB.Y = 10337E8F4D60384E561A8A0203A7E9E550CC5CAE364479AA7280B47C8462D97E61DDE77DD070535FAB060D93D66206C6
24,811,565 UART: [art] SIG.R = 53B1E8A46F833361205B33B580AC2EF96B174EEEB5F48F93B7DB9226CBDC6F0B395CA4A533F437EBB43A300F5DDB86B4
24,819,021 UART: [art] SIG.S = 2377EC1F63103BD8DB600BCCEC5897A72142AEDF3578281A3E5B7245FC93EBBDF9224491F7370D450CA9636A33481D3D
25,798,388 UART: Caliptra RT
25,799,090 UART: [state] CFI Enabled
25,978,372 UART: [rt] RT listening for mailbox commands...
25,980,309 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,010,014 UART: [rt]cmd =0x44504543, len=24
26,039,861 >>> mbox cmd response data (40 bytes)
26,040,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,070,376 UART: [rt]cmd =0x44504543, len=24
26,103,824 >>> mbox cmd response data (40 bytes)
26,104,507 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,134,417 UART: [rt]cmd =0x44504543, len=24
26,167,907 >>> mbox cmd response data (40 bytes)
26,168,562 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,198,463 UART: [rt]cmd =0x44504543, len=24
26,232,264 >>> mbox cmd response data (40 bytes)
26,232,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,262,735 UART: [rt]cmd =0x44504543, len=24
26,296,034 >>> mbox cmd response data (40 bytes)
26,296,657 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,326,572 UART: [rt]cmd =0x44504543, len=24
26,360,300 >>> mbox cmd response data (40 bytes)
26,360,920 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,390,980 UART: [rt]cmd =0x44504543, len=24
26,424,035 >>> mbox cmd response data (40 bytes)
26,424,692 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,454,557 UART: [rt]cmd =0x44504543, len=24
26,488,204 >>> mbox cmd response data (40 bytes)
26,488,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,518,646 UART: [rt]cmd =0x44504543, len=24
26,552,011 >>> mbox cmd response data (40 bytes)
26,552,627 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,582,322 UART: [rt]cmd =0x44504543, len=24
26,616,377 >>> mbox cmd response data (40 bytes)
26,616,999 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,646,626 UART: [rt]cmd =0x44504543, len=24
26,680,450 >>> mbox cmd response data (40 bytes)
26,681,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,710,918 UART: [rt]cmd =0x44504543, len=24
26,744,402 >>> mbox cmd response data (40 bytes)
26,745,054 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,775,011 UART: [rt]cmd =0x44504543, len=24
26,808,569 >>> mbox cmd response data (40 bytes)
26,809,219 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,839,114 UART: [rt]cmd =0x44504543, len=24
26,872,859 >>> mbox cmd response data (40 bytes)
26,873,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,903,431 UART: [rt]cmd =0x44504543, len=24
26,910,301 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,462,084 ready_for_fw is high
3,462,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,612 >>> mbox cmd response: success
18,533,242 UART:
18,533,641 UART: Running Caliptra FMC ...
18,534,839 UART:
18,535,028 UART: [state] CFI Enabled
18,601,407 UART: [fht] FMC Alias Private Key: 7
20,367,949 UART: [art] Extend RT PCRs Done
20,369,172 UART: [art] Lock RT PCRs Done
20,371,012 UART: [art] Populate DV Done
20,376,383 UART: [fht] FMC Alias Private Key: 7
20,377,859 UART: [art] Derive CDI
20,378,617 UART: [art] Store in slot 0x4
20,433,920 UART: [art] Derive Key Pair
20,434,911 UART: [art] Store priv key in slot 0x5
22,897,348 UART: [art] Derive Key Pair - Done
22,910,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,388 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,866 UART: [art] PUB.X = DD76C07325CDFD0F59DB545EE29EBB64A395AF8528F16B4C31C2A8F70756F06FA2E0C038468B93DDDAA2380E939080D1
24,632,170 UART: [art] PUB.Y = 3AC37031BB561A2D0A598D7E7167AF448FCCC1C0B2F82AF8021946D8E766B6F55843EB87B0A31BE28C7E45C8CCB37D52
24,639,467 UART: [art] SIG.R = 7CD5CAFC14CC4E254A8D18F7486AD0F92921208E7349E6901EA601C5D6672367C77D57DA9F5299AB7184AA6CB2592A2E
24,646,829 UART: [art] SIG.S = 4197C3229310A7FA0B817129C71F0292B85A161B2FAAABAB19B6E83BC88AA0EA982AE1C36F7E37EEC5D7E80F933E65AF
25,625,885 UART: Caliptra RT
25,626,601 UART: [state] CFI Enabled
25,806,506 UART: [rt] RT listening for mailbox commands...
25,808,414 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,838,538 UART: [rt]cmd =0x44504543, len=24
25,887,676 >>> mbox cmd response data (40 bytes)
25,888,460 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,918,473 UART: [rt]cmd =0x44504543, len=24
25,952,006 >>> mbox cmd response data (40 bytes)
25,952,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,982,431 UART: [rt]cmd =0x44504543, len=24
26,015,251 >>> mbox cmd response data (40 bytes)
26,015,879 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,046,009 UART: [rt]cmd =0x44504543, len=24
26,079,748 >>> mbox cmd response data (40 bytes)
26,080,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,110,352 UART: [rt]cmd =0x44504543, len=24
26,144,192 >>> mbox cmd response data (40 bytes)
26,144,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,174,749 UART: [rt]cmd =0x44504543, len=24
26,207,697 >>> mbox cmd response data (40 bytes)
26,208,349 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,238,249 UART: [rt]cmd =0x44504543, len=24
26,271,727 >>> mbox cmd response data (40 bytes)
26,272,334 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,302,139 UART: [rt]cmd =0x44504543, len=24
26,335,971 >>> mbox cmd response data (40 bytes)
26,336,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,366,271 UART: [rt]cmd =0x44504543, len=24
26,399,782 >>> mbox cmd response data (40 bytes)
26,400,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,430,577 UART: [rt]cmd =0x44504543, len=24
26,464,274 >>> mbox cmd response data (40 bytes)
26,464,917 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,495,034 UART: [rt]cmd =0x44504543, len=24
26,528,033 >>> mbox cmd response data (40 bytes)
26,528,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,558,687 UART: [rt]cmd =0x44504543, len=24
26,591,945 >>> mbox cmd response data (40 bytes)
26,592,545 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,622,400 UART: [rt]cmd =0x44504543, len=24
26,656,174 >>> mbox cmd response data (40 bytes)
26,656,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,686,797 UART: [rt]cmd =0x44504543, len=24
26,720,254 >>> mbox cmd response data (40 bytes)
26,720,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,750,665 UART: [rt]cmd =0x44504543, len=24
26,757,365 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
192,804 UART:
193,160 UART: Running Caliptra ROM ...
194,263 UART:
603,957 UART: [state] CFI Enabled
615,076 UART: [state] LifecycleState = Unprovisioned
616,962 UART: [state] DebugLocked = No
619,063 UART: [state] WD Timer not started. Device not locked for debugging
623,389 UART: [kat] SHA2-256
802,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,785 UART: [kat] ++
814,258 UART: [kat] sha1
824,282 UART: [kat] SHA2-256
826,947 UART: [kat] SHA2-384
832,730 UART: [kat] SHA2-512-ACC
835,101 UART: [kat] ECC-384
3,275,748 UART: [kat] HMAC-384Kdf
3,288,335 UART: [kat] LMS
3,764,799 UART: [kat] --
3,769,363 UART: [cold-reset] ++
3,771,009 UART: [fht] FHT @ 0x50003400
3,781,422 UART: [idev] ++
3,781,995 UART: [idev] CDI.KEYID = 6
3,782,982 UART: [idev] SUBJECT.KEYID = 7
3,784,229 UART: [idev] UDS.KEYID = 0
3,785,159 ready_for_fw is high
3,785,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,223 UART: [idev] Erasing UDS.KEYID = 0
6,261,962 UART: [idev] Sha1 KeyId Algorithm
6,285,521 UART: [idev] --
6,291,138 UART: [ldev] ++
6,291,765 UART: [ldev] CDI.KEYID = 6
6,292,679 UART: [ldev] SUBJECT.KEYID = 5
6,293,892 UART: [ldev] AUTHORITY.KEYID = 7
6,295,123 UART: [ldev] FE.KEYID = 1
6,305,396 UART: [ldev] Erasing FE.KEYID = 1
8,783,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,871 UART: [ldev] --
10,577,714 UART: [fwproc] Wait for Commands...
10,581,019 UART: [fwproc] Recv command 0x46574c44
10,583,012 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,128 >>> mbox cmd response: success
14,549,442 UART: [afmc] ++
14,550,072 UART: [afmc] CDI.KEYID = 6
14,551,161 UART: [afmc] SUBJECT.KEYID = 7
14,552,266 UART: [afmc] AUTHORITY.KEYID = 5
17,059,072 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,290 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,143 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,769 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,516 UART: [afmc] --
18,860,715 UART: [cold-reset] --
18,864,792 UART: [state] Locking Datavault
18,871,235 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,973 UART: [state] Locking ICCM
18,875,509 UART: [exit] Launching FMC @ 0x40000130
18,883,918 UART:
18,884,153 UART: Running Caliptra FMC ...
18,885,254 UART:
18,885,431 UART: [state] CFI Enabled
18,893,374 UART: [fht] FMC Alias Private Key: 7
20,659,786 UART: [art] Extend RT PCRs Done
20,661,004 UART: [art] Lock RT PCRs Done
20,662,666 UART: [art] Populate DV Done
20,668,135 UART: [fht] FMC Alias Private Key: 7
20,669,730 UART: [art] Derive CDI
20,670,566 UART: [art] Store in slot 0x4
20,713,443 UART: [art] Derive Key Pair
20,714,477 UART: [art] Store priv key in slot 0x5
23,141,627 UART: [art] Derive Key Pair - Done
23,155,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,584 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,084 UART: [art] PUB.X = D8DBC4C649793D52C7C21AC60F67E936C54D4B92F1B0986F7790588262924B205558D0DFF15F8F2F4A22867F7B34AE70
24,870,400 UART: [art] PUB.Y = E1F56D3030B396B241213412146B140E77514CC1E2569E872D08F895521447A676731BFDEB375FA658DE6B3BFF4E214B
24,877,601 UART: [art] SIG.R = 13CBD8DC029BCF4717D47482FCE30B658C917AB012833AAAABF9E44188ECE1A31F1E66A4CB16CDB9FE7B26741717CF15
24,885,001 UART: [art] SIG.S = ED516DF576487A92D030CD443DE0704ABCCD093029DCAB28FCA4C3722400D9ABC73CBAB6D0CCF1CF7A6272957456D542
25,863,890 UART: Caliptra RT
25,864,591 UART: [state] CFI Enabled
25,997,946 UART: [rt] RT listening for mailbox commands...
25,999,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,029,873 UART: [rt]cmd =0x44504543, len=24
26,057,256 >>> mbox cmd response data (40 bytes)
26,058,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,087,833 UART: [rt]cmd =0x44504543, len=24
26,115,413 >>> mbox cmd response data (40 bytes)
26,116,053 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,145,744 UART: [rt]cmd =0x44504543, len=24
26,173,185 >>> mbox cmd response data (40 bytes)
26,173,847 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,203,699 UART: [rt]cmd =0x44504543, len=24
26,231,249 >>> mbox cmd response data (40 bytes)
26,231,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,261,752 UART: [rt]cmd =0x44504543, len=24
26,288,960 >>> mbox cmd response data (40 bytes)
26,289,580 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,319,282 UART: [rt]cmd =0x44504543, len=24
26,346,470 >>> mbox cmd response data (40 bytes)
26,347,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,376,913 UART: [rt]cmd =0x44504543, len=24
26,404,406 >>> mbox cmd response data (40 bytes)
26,405,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,435,021 UART: [rt]cmd =0x44504543, len=24
26,462,664 >>> mbox cmd response data (40 bytes)
26,463,273 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,492,967 UART: [rt]cmd =0x44504543, len=24
26,520,483 >>> mbox cmd response data (40 bytes)
26,521,107 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,550,749 UART: [rt]cmd =0x44504543, len=24
26,578,640 >>> mbox cmd response data (40 bytes)
26,579,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,609,157 UART: [rt]cmd =0x44504543, len=24
26,636,809 >>> mbox cmd response data (40 bytes)
26,637,463 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,667,365 UART: [rt]cmd =0x44504543, len=24
26,695,080 >>> mbox cmd response data (40 bytes)
26,695,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,725,553 UART: [rt]cmd =0x44504543, len=24
26,753,393 >>> mbox cmd response data (40 bytes)
26,754,017 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,783,969 UART: [rt]cmd =0x44504543, len=24
26,811,343 >>> mbox cmd response data (40 bytes)
26,811,993 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,842,167 UART: [rt]cmd =0x44504543, len=24
26,848,952 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,782,169 ready_for_fw is high
3,782,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,458,500 >>> mbox cmd response: success
18,702,103 UART:
18,702,490 UART: Running Caliptra FMC ...
18,703,634 UART:
18,703,796 UART: [state] CFI Enabled
18,711,905 UART: [fht] FMC Alias Private Key: 7
20,477,585 UART: [art] Extend RT PCRs Done
20,478,807 UART: [art] Lock RT PCRs Done
20,480,078 UART: [art] Populate DV Done
20,485,459 UART: [fht] FMC Alias Private Key: 7
20,487,056 UART: [art] Derive CDI
20,487,879 UART: [art] Store in slot 0x4
20,530,585 UART: [art] Derive Key Pair
20,531,588 UART: [art] Store priv key in slot 0x5
22,958,807 UART: [art] Derive Key Pair - Done
22,971,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,790 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,288 UART: [art] PUB.X = 2B1598AD1F3C91AA6C3F5212A2AC127E982AF2F01058325E63F6D59BA9A5D964216DE70136E385D2CD9ACB25574933E4
24,686,596 UART: [art] PUB.Y = 9F1E1F9B6ECE97C9A8DA968E5516F4A98006EBA6C851D859E92A6FDE21575E56D441CD587144D77A2D7E44EA0EDBD641
24,693,869 UART: [art] SIG.R = 3E41A16F7738B67B5BC4D1890BF19F2A6559A06DC071CB6AB4149EAA2E680B07FF9B9A1780BD719F3E0452E830EF05F1
24,701,222 UART: [art] SIG.S = DB68F3D29952C47597F90622AE95173D770E207B025F0C7622A22CE0731881CC32759550C0683DFDD3F8C199E44B883A
25,680,374 UART: Caliptra RT
25,681,093 UART: [state] CFI Enabled
25,814,042 UART: [rt] RT listening for mailbox commands...
25,815,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,846,057 UART: [rt]cmd =0x44504543, len=24
25,873,904 >>> mbox cmd response data (40 bytes)
25,874,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,904,703 UART: [rt]cmd =0x44504543, len=24
25,932,252 >>> mbox cmd response data (40 bytes)
25,932,915 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,962,817 UART: [rt]cmd =0x44504543, len=24
25,990,091 >>> mbox cmd response data (40 bytes)
25,990,761 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,020,611 UART: [rt]cmd =0x44504543, len=24
26,047,885 >>> mbox cmd response data (40 bytes)
26,048,505 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,078,258 UART: [rt]cmd =0x44504543, len=24
26,106,019 >>> mbox cmd response data (40 bytes)
26,106,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,136,681 UART: [rt]cmd =0x44504543, len=24
26,164,227 >>> mbox cmd response data (40 bytes)
26,164,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,194,838 UART: [rt]cmd =0x44504543, len=24
26,222,157 >>> mbox cmd response data (40 bytes)
26,222,769 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,252,622 UART: [rt]cmd =0x44504543, len=24
26,280,243 >>> mbox cmd response data (40 bytes)
26,280,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,310,698 UART: [rt]cmd =0x44504543, len=24
26,338,201 >>> mbox cmd response data (40 bytes)
26,338,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,368,722 UART: [rt]cmd =0x44504543, len=24
26,396,265 >>> mbox cmd response data (40 bytes)
26,396,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,426,756 UART: [rt]cmd =0x44504543, len=24
26,454,201 >>> mbox cmd response data (40 bytes)
26,454,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,484,512 UART: [rt]cmd =0x44504543, len=24
26,511,969 >>> mbox cmd response data (40 bytes)
26,512,592 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,542,326 UART: [rt]cmd =0x44504543, len=24
26,570,157 >>> mbox cmd response data (40 bytes)
26,570,836 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,600,739 UART: [rt]cmd =0x44504543, len=24
26,628,999 >>> mbox cmd response data (40 bytes)
26,629,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,659,500 UART: [rt]cmd =0x44504543, len=24
26,665,792 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,983 UART:
192,371 UART: Running Caliptra ROM ...
193,576 UART:
193,734 UART: [state] CFI Enabled
266,629 UART: [state] LifecycleState = Unprovisioned
269,034 UART: [state] DebugLocked = No
270,925 UART: [state] WD Timer not started. Device not locked for debugging
276,115 UART: [kat] SHA2-256
466,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,809 UART: [kat] ++
477,290 UART: [kat] sha1
489,439 UART: [kat] SHA2-256
492,450 UART: [kat] SHA2-384
498,364 UART: [kat] SHA2-512-ACC
500,940 UART: [kat] ECC-384
2,948,787 UART: [kat] HMAC-384Kdf
2,971,900 UART: [kat] LMS
3,503,643 UART: [kat] --
3,509,131 UART: [cold-reset] ++
3,510,850 UART: [fht] FHT @ 0x50003400
3,523,454 UART: [idev] ++
3,524,163 UART: [idev] CDI.KEYID = 6
3,525,136 UART: [idev] SUBJECT.KEYID = 7
3,526,301 UART: [idev] UDS.KEYID = 0
3,527,220 ready_for_fw is high
3,527,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,844 UART: [idev] Erasing UDS.KEYID = 0
6,031,060 UART: [idev] Sha1 KeyId Algorithm
6,052,990 UART: [idev] --
6,057,287 UART: [ldev] ++
6,057,974 UART: [ldev] CDI.KEYID = 6
6,058,937 UART: [ldev] SUBJECT.KEYID = 5
6,060,094 UART: [ldev] AUTHORITY.KEYID = 7
6,061,329 UART: [ldev] FE.KEYID = 1
6,101,304 UART: [ldev] Erasing FE.KEYID = 1
8,605,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,517 UART: [ldev] --
10,413,849 UART: [fwproc] Wait for Commands...
10,416,748 UART: [fwproc] Recv command 0x46574c44
10,418,999 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,395 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,999 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,167 >>> mbox cmd response: success
14,685,273 UART: [afmc] ++
14,685,966 UART: [afmc] CDI.KEYID = 6
14,687,152 UART: [afmc] SUBJECT.KEYID = 7
14,688,641 UART: [afmc] AUTHORITY.KEYID = 5
17,212,776 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,324 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,593 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,477 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,456 UART: [afmc] --
19,014,249 UART: [cold-reset] --
19,019,524 UART: [state] Locking Datavault
19,026,893 UART: [state] Locking PCR0, PCR1 and PCR31
19,029,041 UART: [state] Locking ICCM
19,031,628 UART: [exit] Launching FMC @ 0x40000130
19,040,307 UART:
19,040,540 UART: Running Caliptra FMC ...
19,041,637 UART:
19,041,793 UART: [state] CFI Enabled
19,097,512 UART: [fht] FMC Alias Private Key: 7
20,885,029 UART: [art] Extend RT PCRs Done
20,886,252 UART: [art] Lock RT PCRs Done
20,887,848 UART: [art] Populate DV Done
20,893,251 UART: [fht] FMC Alias Private Key: 7
20,894,855 UART: [art] Derive CDI
20,895,591 UART: [art] Store in slot 0x4
20,951,176 UART: [art] Derive Key Pair
20,952,213 UART: [art] Store priv key in slot 0x5
23,415,318 UART: [art] Derive Key Pair - Done
23,428,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,212 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,713 UART: [art] PUB.X = E74F7CC1CDDA815C375B02031078282FD0293F568B0676746C61AEE4550E83DE0119B2965BDE4A92D2FAA800B06A6295
25,149,963 UART: [art] PUB.Y = 7C67B36A96848F5EBEB05FC508ABBBF0D07BFCA3C33184038F9C84EFE83D376C1D5CFDC7729A9FDBCC9769D73EB2B6E3
25,157,263 UART: [art] SIG.R = 60A440FC1EA7226F407CB9224FC192D2DB15308D99C449184D1862F79020D749DCD270C77E12781DD7F8C2A7B642B5DC
25,164,616 UART: [art] SIG.S = EAB0EBE71EC390342FDD5066AE31869FA52CBB26F64BB99D56A4A454184E24790E7CC472D3C1D88D3BCCDAE9F500DD1F
26,143,269 UART: Caliptra RT
26,143,951 UART: [state] CFI Enabled
26,325,297 UART: [rt] RT listening for mailbox commands...
26,327,226 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,357,299 UART: [rt]cmd =0x44504543, len=24
26,385,842 >>> mbox cmd response data (40 bytes)
26,386,672 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,416,367 UART: [rt]cmd =0x44504543, len=24
26,450,132 >>> mbox cmd response data (40 bytes)
26,450,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,480,695 UART: [rt]cmd =0x44504543, len=24
26,514,061 >>> mbox cmd response data (40 bytes)
26,514,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,544,778 UART: [rt]cmd =0x44504543, len=24
26,578,096 >>> mbox cmd response data (40 bytes)
26,578,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,608,684 UART: [rt]cmd =0x44504543, len=24
26,642,097 >>> mbox cmd response data (40 bytes)
26,642,731 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,672,737 UART: [rt]cmd =0x44504543, len=24
26,706,012 >>> mbox cmd response data (40 bytes)
26,706,684 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,736,583 UART: [rt]cmd =0x44504543, len=24
26,770,291 >>> mbox cmd response data (40 bytes)
26,770,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,800,779 UART: [rt]cmd =0x44504543, len=24
26,834,795 >>> mbox cmd response data (40 bytes)
26,835,410 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,865,432 UART: [rt]cmd =0x44504543, len=24
26,898,514 >>> mbox cmd response data (40 bytes)
26,899,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,929,082 UART: [rt]cmd =0x44504543, len=24
26,962,710 >>> mbox cmd response data (40 bytes)
26,963,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,993,178 UART: [rt]cmd =0x44504543, len=24
27,026,613 >>> mbox cmd response data (40 bytes)
27,027,272 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,057,085 UART: [rt]cmd =0x44504543, len=24
27,090,732 >>> mbox cmd response data (40 bytes)
27,091,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,121,114 UART: [rt]cmd =0x44504543, len=24
27,154,748 >>> mbox cmd response data (40 bytes)
27,155,356 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,185,046 UART: [rt]cmd =0x44504543, len=24
27,218,718 >>> mbox cmd response data (40 bytes)
27,219,328 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,249,329 UART: [rt]cmd =0x44504543, len=24
27,255,973 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,440,621 ready_for_fw is high
3,441,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,178 >>> mbox cmd response: success
19,112,898 UART:
19,113,283 UART: Running Caliptra FMC ...
19,114,421 UART:
19,114,579 UART: [state] CFI Enabled
19,179,021 UART: [fht] FMC Alias Private Key: 7
20,945,201 UART: [art] Extend RT PCRs Done
20,946,424 UART: [art] Lock RT PCRs Done
20,947,945 UART: [art] Populate DV Done
20,953,043 UART: [fht] FMC Alias Private Key: 7
20,954,746 UART: [art] Derive CDI
20,955,559 UART: [art] Store in slot 0x4
21,011,795 UART: [art] Derive Key Pair
21,012,832 UART: [art] Store priv key in slot 0x5
23,475,866 UART: [art] Derive Key Pair - Done
23,488,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,596 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,091 UART: [art] PUB.X = 971ACF07CCB507E5FCADBFAEED23B07F89A7D91BD3C5BB52D0C0778353492AE378D92745B99E9535B8AA3AD1BDAE2BF6
25,210,391 UART: [art] PUB.Y = BD5D8C71BC0DD9F65EC9CA5559E07DCAFF44D01D4BA2B45DAA5EA1E14EC8FD7A337703CE4837314A23A53F800AABDA45
25,217,659 UART: [art] SIG.R = FAA8E53FD69E0F9CB3B3F285E0B14D3420E3E457C1E48D2D4628F3CA9E5F07C6BB31971ADC1AD2AE7A96DDD528FD3566
25,225,126 UART: [art] SIG.S = 40A0CE30A29FA7D47031CBB0DB08A257E1872C2C73B901516E7A8D670B31505CBFB590A232FE2D1460C11480D312E0CA
26,203,466 UART: Caliptra RT
26,204,181 UART: [state] CFI Enabled
26,385,905 UART: [rt] RT listening for mailbox commands...
26,387,835 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,417,851 UART: [rt]cmd =0x44504543, len=24
26,445,712 >>> mbox cmd response data (40 bytes)
26,446,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,476,467 UART: [rt]cmd =0x44504543, len=24
26,511,168 >>> mbox cmd response data (40 bytes)
26,511,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,541,726 UART: [rt]cmd =0x44504543, len=24
26,575,638 >>> mbox cmd response data (40 bytes)
26,576,259 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,606,172 UART: [rt]cmd =0x44504543, len=24
26,639,520 >>> mbox cmd response data (40 bytes)
26,640,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,118 UART: [rt]cmd =0x44504543, len=24
26,703,485 >>> mbox cmd response data (40 bytes)
26,704,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,734,085 UART: [rt]cmd =0x44504543, len=24
26,768,220 >>> mbox cmd response data (40 bytes)
26,768,874 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,798,882 UART: [rt]cmd =0x44504543, len=24
26,831,880 >>> mbox cmd response data (40 bytes)
26,832,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,862,440 UART: [rt]cmd =0x44504543, len=24
26,896,189 >>> mbox cmd response data (40 bytes)
26,896,796 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,926,646 UART: [rt]cmd =0x44504543, len=24
26,960,319 >>> mbox cmd response data (40 bytes)
26,960,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,990,959 UART: [rt]cmd =0x44504543, len=24
27,024,302 >>> mbox cmd response data (40 bytes)
27,024,931 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,054,903 UART: [rt]cmd =0x44504543, len=24
27,088,664 >>> mbox cmd response data (40 bytes)
27,089,316 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,119,107 UART: [rt]cmd =0x44504543, len=24
27,152,537 >>> mbox cmd response data (40 bytes)
27,153,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,182,926 UART: [rt]cmd =0x44504543, len=24
27,217,373 >>> mbox cmd response data (40 bytes)
27,217,980 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,247,837 UART: [rt]cmd =0x44504543, len=24
27,282,045 >>> mbox cmd response data (40 bytes)
27,282,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,312,685 UART: [rt]cmd =0x44504543, len=24
27,319,389 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,326 UART:
192,720 UART: Running Caliptra ROM ...
193,922 UART:
603,598 UART: [state] CFI Enabled
619,263 UART: [state] LifecycleState = Unprovisioned
621,641 UART: [state] DebugLocked = No
622,890 UART: [state] WD Timer not started. Device not locked for debugging
627,302 UART: [kat] SHA2-256
817,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,909 UART: [kat] ++
828,517 UART: [kat] sha1
840,752 UART: [kat] SHA2-256
843,768 UART: [kat] SHA2-384
849,971 UART: [kat] SHA2-512-ACC
852,555 UART: [kat] ECC-384
3,295,254 UART: [kat] HMAC-384Kdf
3,309,687 UART: [kat] LMS
3,841,528 UART: [kat] --
3,843,889 UART: [cold-reset] ++
3,845,900 UART: [fht] FHT @ 0x50003400
3,857,058 UART: [idev] ++
3,857,720 UART: [idev] CDI.KEYID = 6
3,858,679 UART: [idev] SUBJECT.KEYID = 7
3,859,852 UART: [idev] UDS.KEYID = 0
3,860,753 ready_for_fw is high
3,860,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,805 UART: [idev] Erasing UDS.KEYID = 0
6,343,791 UART: [idev] Sha1 KeyId Algorithm
6,365,933 UART: [idev] --
6,370,257 UART: [ldev] ++
6,370,944 UART: [ldev] CDI.KEYID = 6
6,371,832 UART: [ldev] SUBJECT.KEYID = 5
6,373,049 UART: [ldev] AUTHORITY.KEYID = 7
6,374,307 UART: [ldev] FE.KEYID = 1
6,385,313 UART: [ldev] Erasing FE.KEYID = 1
8,863,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,172 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,631 UART: [ldev] --
10,652,095 UART: [fwproc] Wait for Commands...
10,654,154 UART: [fwproc] Recv command 0x46574c44
10,656,467 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,614 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,454 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,562 >>> mbox cmd response: success
14,922,502 UART: [afmc] ++
14,923,248 UART: [afmc] CDI.KEYID = 6
14,924,371 UART: [afmc] SUBJECT.KEYID = 7
14,925,875 UART: [afmc] AUTHORITY.KEYID = 5
17,427,926 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,152,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,097 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,169,166 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,184,363 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,199,210 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,576 UART: [afmc] --
19,225,396 UART: [cold-reset] --
19,229,980 UART: [state] Locking Datavault
19,234,869 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,033 UART: [state] Locking ICCM
19,238,769 UART: [exit] Launching FMC @ 0x40000130
19,247,415 UART:
19,247,678 UART: Running Caliptra FMC ...
19,248,789 UART:
19,248,951 UART: [state] CFI Enabled
19,257,105 UART: [fht] FMC Alias Private Key: 7
21,023,083 UART: [art] Extend RT PCRs Done
21,024,309 UART: [art] Lock RT PCRs Done
21,025,939 UART: [art] Populate DV Done
21,031,308 UART: [fht] FMC Alias Private Key: 7
21,032,860 UART: [art] Derive CDI
21,033,631 UART: [art] Store in slot 0x4
21,076,339 UART: [art] Derive Key Pair
21,077,379 UART: [art] Store priv key in slot 0x5
23,504,385 UART: [art] Derive Key Pair - Done
23,517,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,189 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,699 UART: [art] PUB.X = 88A2CB569C6D02D7DC0032B16163E756839E7868FC7406E5CD54733FCBB0783757C263E67BBFF8F6D2B9C74D8181960A
25,232,989 UART: [art] PUB.Y = 48C8BC201C3CA9EAD7197F4ED4316C58A2626BA022F1168CB0C0413FA0D070CCB6FC3656A05542E9BF9DF6B3D38A8FAE
25,240,243 UART: [art] SIG.R = EFB3839291E05E4F43AFCD6C53C720E3A7EA6FEAD177E8A4A18BB55BC12CC5F035379D781386C43F781CA8CB2DCDD333
25,247,625 UART: [art] SIG.S = DF574B2ACBBD26D04A0D6E30DA660DF80C31AC37B4681D7480CD6C9DC1F7BA08ED1C5E9C72C8B5A4F9FC6DB93E21E26B
26,226,725 UART: Caliptra RT
26,227,416 UART: [state] CFI Enabled
26,359,778 UART: [rt] RT listening for mailbox commands...
26,361,701 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,391,607 UART: [rt]cmd =0x44504543, len=24
26,419,203 >>> mbox cmd response data (40 bytes)
26,420,049 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,449,960 UART: [rt]cmd =0x44504543, len=24
26,477,883 >>> mbox cmd response data (40 bytes)
26,478,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,508,378 UART: [rt]cmd =0x44504543, len=24
26,536,221 >>> mbox cmd response data (40 bytes)
26,536,866 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,566,796 UART: [rt]cmd =0x44504543, len=24
26,594,366 >>> mbox cmd response data (40 bytes)
26,595,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,624,966 UART: [rt]cmd =0x44504543, len=24
26,652,183 >>> mbox cmd response data (40 bytes)
26,652,842 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,682,587 UART: [rt]cmd =0x44504543, len=24
26,710,340 >>> mbox cmd response data (40 bytes)
26,710,955 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,740,755 UART: [rt]cmd =0x44504543, len=24
26,768,108 >>> mbox cmd response data (40 bytes)
26,768,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,798,633 UART: [rt]cmd =0x44504543, len=24
26,826,067 >>> mbox cmd response data (40 bytes)
26,826,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,856,956 UART: [rt]cmd =0x44504543, len=24
26,884,623 >>> mbox cmd response data (40 bytes)
26,885,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,915,293 UART: [rt]cmd =0x44504543, len=24
26,942,832 >>> mbox cmd response data (40 bytes)
26,943,447 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,973,307 UART: [rt]cmd =0x44504543, len=24
27,001,142 >>> mbox cmd response data (40 bytes)
27,001,785 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,031,806 UART: [rt]cmd =0x44504543, len=24
27,059,673 >>> mbox cmd response data (40 bytes)
27,060,339 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,090,195 UART: [rt]cmd =0x44504543, len=24
27,117,569 >>> mbox cmd response data (40 bytes)
27,118,176 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,148,010 UART: [rt]cmd =0x44504543, len=24
27,175,765 >>> mbox cmd response data (40 bytes)
27,176,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,206,234 UART: [rt]cmd =0x44504543, len=24
27,213,325 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,753,389 ready_for_fw is high
3,753,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,040,895 >>> mbox cmd response: success
19,294,388 UART:
19,294,791 UART: Running Caliptra FMC ...
19,295,951 UART:
19,296,113 UART: [state] CFI Enabled
19,304,042 UART: [fht] FMC Alias Private Key: 7
21,070,159 UART: [art] Extend RT PCRs Done
21,071,384 UART: [art] Lock RT PCRs Done
21,072,742 UART: [art] Populate DV Done
21,078,125 UART: [fht] FMC Alias Private Key: 7
21,079,725 UART: [art] Derive CDI
21,080,549 UART: [art] Store in slot 0x4
21,122,927 UART: [art] Derive Key Pair
21,123,965 UART: [art] Store priv key in slot 0x5
23,550,919 UART: [art] Derive Key Pair - Done
23,564,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,799 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,302 UART: [art] PUB.X = 0925AC0C7D8325BC5D23F0A6BD9E00C301947F3D0F60BEDEB61B9EFF032CA7AE58878A2699D44A4ACD8CBA4605487702
25,278,564 UART: [art] PUB.Y = D53300E1D78CA044C03C3AE5653C1BFAB0C1CBD24B3CA99FE0033F9B8D5655CA976BC682401C3FC96A04105A9D3D2A54
25,285,776 UART: [art] SIG.R = 72D493ED4C99B6633B74C6CF4EBC5015827AD2B952EC6CDA98D3D757E62273BCBDD517FCB8FF79F0CBEA9BC4A86DD593
25,293,201 UART: [art] SIG.S = 85F8AD37C890F7C82FF7E02B2EF0C2783E6386BA679DB50417B0D47256D6D5303B45616C81DD8881B593745D49825EC2
26,272,391 UART: Caliptra RT
26,273,081 UART: [state] CFI Enabled
26,406,355 UART: [rt] RT listening for mailbox commands...
26,408,278 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,438,462 UART: [rt]cmd =0x44504543, len=24
26,466,325 >>> mbox cmd response data (40 bytes)
26,467,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,496,915 UART: [rt]cmd =0x44504543, len=24
26,524,130 >>> mbox cmd response data (40 bytes)
26,524,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,554,586 UART: [rt]cmd =0x44504543, len=24
26,582,373 >>> mbox cmd response data (40 bytes)
26,583,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,612,809 UART: [rt]cmd =0x44504543, len=24
26,640,681 >>> mbox cmd response data (40 bytes)
26,641,344 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,671,156 UART: [rt]cmd =0x44504543, len=24
26,698,887 >>> mbox cmd response data (40 bytes)
26,699,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,729,370 UART: [rt]cmd =0x44504543, len=24
26,757,043 >>> mbox cmd response data (40 bytes)
26,757,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,787,696 UART: [rt]cmd =0x44504543, len=24
26,815,267 >>> mbox cmd response data (40 bytes)
26,815,895 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,845,850 UART: [rt]cmd =0x44504543, len=24
26,873,989 >>> mbox cmd response data (40 bytes)
26,874,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,904,435 UART: [rt]cmd =0x44504543, len=24
26,932,189 >>> mbox cmd response data (40 bytes)
26,932,801 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,962,744 UART: [rt]cmd =0x44504543, len=24
26,990,706 >>> mbox cmd response data (40 bytes)
26,991,332 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,021,339 UART: [rt]cmd =0x44504543, len=24
27,049,054 >>> mbox cmd response data (40 bytes)
27,049,707 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,079,672 UART: [rt]cmd =0x44504543, len=24
27,107,169 >>> mbox cmd response data (40 bytes)
27,107,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,137,881 UART: [rt]cmd =0x44504543, len=24
27,165,579 >>> mbox cmd response data (40 bytes)
27,166,197 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,196,195 UART: [rt]cmd =0x44504543, len=24
27,224,207 >>> mbox cmd response data (40 bytes)
27,224,846 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,254,965 UART: [rt]cmd =0x44504543, len=24
27,261,642 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,795 UART: [kat] SHA2-256
881,726 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,841 UART: [kat] ++
885,993 UART: [kat] sha1
890,135 UART: [kat] SHA2-256
892,073 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,130 UART: [kat] HMAC-384Kdf
906,758 UART: [kat] LMS
1,474,954 UART: [kat] --
1,475,973 UART: [cold-reset] ++
1,476,525 UART: [fht] Storing FHT @ 0x50003400
1,479,234 UART: [idev] ++
1,479,402 UART: [idev] CDI.KEYID = 6
1,479,762 UART: [idev] SUBJECT.KEYID = 7
1,480,186 UART: [idev] UDS.KEYID = 0
1,480,531 ready_for_fw is high
1,480,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,224 UART: [idev] Erasing UDS.KEYID = 0
1,504,436 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,122 UART: [idev] --
1,514,185 UART: [ldev] ++
1,514,353 UART: [ldev] CDI.KEYID = 6
1,514,716 UART: [ldev] SUBJECT.KEYID = 5
1,515,142 UART: [ldev] AUTHORITY.KEYID = 7
1,515,605 UART: [ldev] FE.KEYID = 1
1,520,849 UART: [ldev] Erasing FE.KEYID = 1
1,546,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,974 UART: [ldev] --
1,585,459 UART: [fwproc] Waiting for Commands...
1,586,096 UART: [fwproc] Received command 0x46574c44
1,586,887 UART: [fwproc] Received Image of size 118548 bytes
2,931,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,821 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,262 >>> mbox cmd response: success
3,130,520 UART: [afmc] ++
3,130,688 UART: [afmc] CDI.KEYID = 6
3,131,050 UART: [afmc] SUBJECT.KEYID = 7
3,131,475 UART: [afmc] AUTHORITY.KEYID = 5
3,166,786 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,118 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,607 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,490 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,173 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,115 UART: [afmc] --
3,210,073 UART: [cold-reset] --
3,210,979 UART: [state] Locking Datavault
3,212,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,790 UART: [state] Locking ICCM
3,213,210 UART: [exit] Launching FMC @ 0x40000130
3,218,540 UART:
3,218,556 UART: Running Caliptra FMC ...
3,218,964 UART:
3,219,018 UART: [state] CFI Enabled
3,229,496 UART: [fht] FMC Alias Private Key: 7
3,348,630 UART: [art] Extend RT PCRs Done
3,349,058 UART: [art] Lock RT PCRs Done
3,350,772 UART: [art] Populate DV Done
3,359,145 UART: [fht] FMC Alias Private Key: 7
3,360,235 UART: [art] Derive CDI
3,360,515 UART: [art] Store in slot 0x4
3,446,299 UART: [art] Derive Key Pair
3,446,659 UART: [art] Store priv key in slot 0x5
3,459,660 UART: [art] Derive Key Pair - Done
3,474,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,428 UART: [art] PUB.X = 9F9ECBFD59809E17651E36A9F36B03EAFB87FF5CC78803D31019EB39CB02B26CEA43D5BFAD3672867BCBE6D88EF167D2
3,497,209 UART: [art] PUB.Y = CAC86027F4AB3873EC33844D2DC1A2289320DCD5969D9A42D6BC623608020834FD72A29938163E714339E6AF4AEB1326
3,504,148 UART: [art] SIG.R = EA868EE9C2C2CE64FFBF6808F83DE06DA7038A65D3AFFDDB053D11851C562E4D38D08453E604D398E46977CB81B624EB
3,510,920 UART: [art] SIG.S = F444C6AE53D5D0BB8C167C4DE97625F7A09EFEA58CFC3AC49E3F83F16F3FC589B18D2504BBA1A8AFB510ECE700D63C03
3,534,262 UART: Caliptra RT
3,534,513 UART: [state] CFI Enabled
3,654,316 UART: [rt] RT listening for mailbox commands...
3,654,986 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,036 UART: [rt]cmd =0x44504543, len=24
3,712,560 >>> mbox cmd response data (40 bytes)
3,712,561 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,922 UART: [rt]cmd =0x44504543, len=24
3,769,887 >>> mbox cmd response data (40 bytes)
3,769,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,799,281 UART: [rt]cmd =0x44504543, len=24
3,826,945 >>> mbox cmd response data (40 bytes)
3,826,946 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,413 UART: [rt]cmd =0x44504543, len=24
3,883,904 >>> mbox cmd response data (40 bytes)
3,883,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,913,434 UART: [rt]cmd =0x44504543, len=24
3,940,718 >>> mbox cmd response data (40 bytes)
3,940,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,970,120 UART: [rt]cmd =0x44504543, len=24
3,997,473 >>> mbox cmd response data (40 bytes)
3,997,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,221 UART: [rt]cmd =0x44504543, len=24
4,054,933 >>> mbox cmd response data (40 bytes)
4,054,934 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,084,359 UART: [rt]cmd =0x44504543, len=24
4,112,124 >>> mbox cmd response data (40 bytes)
4,112,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,672 UART: [rt]cmd =0x44504543, len=24
4,169,220 >>> mbox cmd response data (40 bytes)
4,169,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,198,578 UART: [rt]cmd =0x44504543, len=24
4,226,449 >>> mbox cmd response data (40 bytes)
4,226,450 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,255,925 UART: [rt]cmd =0x44504543, len=24
4,283,463 >>> mbox cmd response data (40 bytes)
4,283,464 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,045 UART: [rt]cmd =0x44504543, len=24
4,341,042 >>> mbox cmd response data (40 bytes)
4,341,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,370,432 UART: [rt]cmd =0x44504543, len=24
4,398,100 >>> mbox cmd response data (40 bytes)
4,398,101 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,427,500 UART: [rt]cmd =0x44504543, len=24
4,455,233 >>> mbox cmd response data (40 bytes)
4,455,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,531 UART: [rt]cmd =0x44504543, len=24
4,491,909 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,577 ready_for_fw is high
1,361,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,658 >>> mbox cmd response: success
3,041,523 UART:
3,041,539 UART: Running Caliptra FMC ...
3,041,947 UART:
3,042,001 UART: [state] CFI Enabled
3,053,063 UART: [fht] FMC Alias Private Key: 7
3,172,125 UART: [art] Extend RT PCRs Done
3,172,553 UART: [art] Lock RT PCRs Done
3,173,935 UART: [art] Populate DV Done
3,182,456 UART: [fht] FMC Alias Private Key: 7
3,183,394 UART: [art] Derive CDI
3,183,674 UART: [art] Store in slot 0x4
3,269,766 UART: [art] Derive Key Pair
3,270,126 UART: [art] Store priv key in slot 0x5
3,282,827 UART: [art] Derive Key Pair - Done
3,297,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,446 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,211 UART: [art] PUB.X = 9DD8B6FADE9598851A9210850BA840F64AB50F3F1DD7CED985B37EB822D1F07CFB5074DCA7097FE006C52CA17F12A797
3,319,983 UART: [art] PUB.Y = A9B5712A37E668F28FDBE6FB9887F32D3897EC0877FA184F5F856BB08747CBF87EC5D97CEE6FBEBCB89C054BA83363A0
3,326,945 UART: [art] SIG.R = 8FDC2D8DDC06C9355FA0EC270323BD9ADD2E636784FF2F33978D4F2E346885FEE527A4328CD93F12C5F17CBDE6263E1F
3,333,725 UART: [art] SIG.S = 50967F355F8A1A1A6783FAD2EA669B74854C3FF159F08212D393D3326B7724A0254C333DF67064EE4260FE500802B9DF
3,358,269 UART: Caliptra RT
3,358,520 UART: [state] CFI Enabled
3,479,638 UART: [rt] RT listening for mailbox commands...
3,480,308 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,260 UART: [rt]cmd =0x44504543, len=24
3,537,856 >>> mbox cmd response data (40 bytes)
3,537,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,508 UART: [rt]cmd =0x44504543, len=24
3,595,247 >>> mbox cmd response data (40 bytes)
3,595,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,695 UART: [rt]cmd =0x44504543, len=24
3,652,377 >>> mbox cmd response data (40 bytes)
3,652,378 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,681,769 UART: [rt]cmd =0x44504543, len=24
3,709,512 >>> mbox cmd response data (40 bytes)
3,709,513 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,756 UART: [rt]cmd =0x44504543, len=24
3,766,088 >>> mbox cmd response data (40 bytes)
3,766,089 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,554 UART: [rt]cmd =0x44504543, len=24
3,823,407 >>> mbox cmd response data (40 bytes)
3,823,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,787 UART: [rt]cmd =0x44504543, len=24
3,880,569 >>> mbox cmd response data (40 bytes)
3,880,570 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,879 UART: [rt]cmd =0x44504543, len=24
3,937,680 >>> mbox cmd response data (40 bytes)
3,937,681 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,222 UART: [rt]cmd =0x44504543, len=24
3,994,692 >>> mbox cmd response data (40 bytes)
3,994,693 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,170 UART: [rt]cmd =0x44504543, len=24
4,051,875 >>> mbox cmd response data (40 bytes)
4,051,876 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,493 UART: [rt]cmd =0x44504543, len=24
4,109,227 >>> mbox cmd response data (40 bytes)
4,109,228 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,617 UART: [rt]cmd =0x44504543, len=24
4,166,264 >>> mbox cmd response data (40 bytes)
4,166,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,680 UART: [rt]cmd =0x44504543, len=24
4,223,050 >>> mbox cmd response data (40 bytes)
4,223,051 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,252,700 UART: [rt]cmd =0x44504543, len=24
4,280,707 >>> mbox cmd response data (40 bytes)
4,280,708 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,417 UART: [rt]cmd =0x44504543, len=24
4,317,715 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,287 UART: [kat] LMS
1,475,483 UART: [kat] --
1,476,376 UART: [cold-reset] ++
1,476,762 UART: [fht] Storing FHT @ 0x50003400
1,479,415 UART: [idev] ++
1,479,583 UART: [idev] CDI.KEYID = 6
1,479,943 UART: [idev] SUBJECT.KEYID = 7
1,480,367 UART: [idev] UDS.KEYID = 0
1,480,712 ready_for_fw is high
1,480,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,249 UART: [idev] Erasing UDS.KEYID = 0
1,504,403 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,073 UART: [idev] --
1,514,010 UART: [ldev] ++
1,514,178 UART: [ldev] CDI.KEYID = 6
1,514,541 UART: [ldev] SUBJECT.KEYID = 5
1,514,967 UART: [ldev] AUTHORITY.KEYID = 7
1,515,430 UART: [ldev] FE.KEYID = 1
1,520,712 UART: [ldev] Erasing FE.KEYID = 1
1,546,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,127 UART: [ldev] --
1,585,632 UART: [fwproc] Waiting for Commands...
1,586,433 UART: [fwproc] Received command 0x46574c44
1,587,224 UART: [fwproc] Received Image of size 118548 bytes
2,931,664 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,358 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,576 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,961 >>> mbox cmd response: success
3,131,105 UART: [afmc] ++
3,131,273 UART: [afmc] CDI.KEYID = 6
3,131,635 UART: [afmc] SUBJECT.KEYID = 7
3,132,060 UART: [afmc] AUTHORITY.KEYID = 5
3,167,853 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,755 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,535 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,244 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,127 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,810 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,736 UART: [afmc] --
3,210,770 UART: [cold-reset] --
3,211,478 UART: [state] Locking Datavault
3,212,585 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,189 UART: [state] Locking ICCM
3,213,785 UART: [exit] Launching FMC @ 0x40000130
3,219,115 UART:
3,219,131 UART: Running Caliptra FMC ...
3,219,539 UART:
3,219,682 UART: [state] CFI Enabled
3,230,154 UART: [fht] FMC Alias Private Key: 7
3,348,820 UART: [art] Extend RT PCRs Done
3,349,248 UART: [art] Lock RT PCRs Done
3,350,914 UART: [art] Populate DV Done
3,359,091 UART: [fht] FMC Alias Private Key: 7
3,360,029 UART: [art] Derive CDI
3,360,309 UART: [art] Store in slot 0x4
3,446,475 UART: [art] Derive Key Pair
3,446,835 UART: [art] Store priv key in slot 0x5
3,459,802 UART: [art] Derive Key Pair - Done
3,474,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,801 UART: [art] PUB.X = 523D308B519F6C8FBA0BD0E63523090E8A15E514DC03EE84D0D25661722D02AB0CB10A312AA6992C7DFF0D7DDCE62796
3,497,557 UART: [art] PUB.Y = 48C7EDD38D668E88867635342E332F75AAF94ECA9FEBF88309F62C5F231222CAC90B26493B40183FDFD12CB8DB10CB55
3,504,511 UART: [art] SIG.R = 07BC117D58579AC83343973362F1A9685D6CC22CEAF6BE02AC1DF16115A8EE9E37AE29584EF36C9E3D70609E0F320030
3,511,254 UART: [art] SIG.S = 665D5DA606B073A05E9A19DFE6E7E174CB1C81C977C5D198A7CDB99D8E0582248600D749FD98F731899BCFCA8E98DE98
3,535,562 UART: Caliptra RT
3,535,905 UART: [state] CFI Enabled
3,655,394 UART: [rt] RT listening for mailbox commands...
3,656,064 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,066 UART: [rt]cmd =0x44504543, len=24
3,713,494 >>> mbox cmd response data (40 bytes)
3,713,495 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,862 UART: [rt]cmd =0x44504543, len=24
3,770,429 >>> mbox cmd response data (40 bytes)
3,770,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,799,939 UART: [rt]cmd =0x44504543, len=24
3,827,585 >>> mbox cmd response data (40 bytes)
3,827,586 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,181 UART: [rt]cmd =0x44504543, len=24
3,884,522 >>> mbox cmd response data (40 bytes)
3,884,523 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,913,912 UART: [rt]cmd =0x44504543, len=24
3,941,724 >>> mbox cmd response data (40 bytes)
3,941,725 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,262 UART: [rt]cmd =0x44504543, len=24
3,998,587 >>> mbox cmd response data (40 bytes)
3,998,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,035 UART: [rt]cmd =0x44504543, len=24
4,055,389 >>> mbox cmd response data (40 bytes)
4,055,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,084,871 UART: [rt]cmd =0x44504543, len=24
4,112,816 >>> mbox cmd response data (40 bytes)
4,112,817 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,306 UART: [rt]cmd =0x44504543, len=24
4,169,586 >>> mbox cmd response data (40 bytes)
4,169,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,034 UART: [rt]cmd =0x44504543, len=24
4,226,945 >>> mbox cmd response data (40 bytes)
4,226,946 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,497 UART: [rt]cmd =0x44504543, len=24
4,284,429 >>> mbox cmd response data (40 bytes)
4,284,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,087 UART: [rt]cmd =0x44504543, len=24
4,341,600 >>> mbox cmd response data (40 bytes)
4,341,601 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,370,912 UART: [rt]cmd =0x44504543, len=24
4,398,254 >>> mbox cmd response data (40 bytes)
4,398,255 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,427,796 UART: [rt]cmd =0x44504543, len=24
4,455,091 >>> mbox cmd response data (40 bytes)
4,455,092 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,505 UART: [rt]cmd =0x44504543, len=24
4,491,853 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 ready_for_fw is high
1,363,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,489 >>> mbox cmd response: success
3,044,370 UART:
3,044,386 UART: Running Caliptra FMC ...
3,044,794 UART:
3,044,937 UART: [state] CFI Enabled
3,055,631 UART: [fht] FMC Alias Private Key: 7
3,174,803 UART: [art] Extend RT PCRs Done
3,175,231 UART: [art] Lock RT PCRs Done
3,176,693 UART: [art] Populate DV Done
3,184,952 UART: [fht] FMC Alias Private Key: 7
3,186,040 UART: [art] Derive CDI
3,186,320 UART: [art] Store in slot 0x4
3,272,038 UART: [art] Derive Key Pair
3,272,398 UART: [art] Store priv key in slot 0x5
3,285,441 UART: [art] Derive Key Pair - Done
3,300,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,269 UART: [art] PUB.X = FFB3EFB11FBCF4F853625FA076B9C39E60026FD0B1814AFD66A98B7AC5CB61AA010A0EFFED112C36947ECD495FB5C9D8
3,323,053 UART: [art] PUB.Y = 862FA757A7FB9D3116E18A72A59B3F4D860BB7A59262A0D7493E8B35424B987CBFA2921BCB909273A7F334941192B47E
3,330,000 UART: [art] SIG.R = 85457B3CF511E30B1245187C027C302EB41140876D21CD441B8B01CC49F4CCCA02477AEE0EB2B330418D1EC44995B4D6
3,336,757 UART: [art] SIG.S = 7EC955AA99FB454DE6F2F719C8A1E80200E6D70CD0B8C4C1849166325CAD62319B24FCC88D4441AF3EF4F9ED75F9275F
3,360,629 UART: Caliptra RT
3,360,972 UART: [state] CFI Enabled
3,480,296 UART: [rt] RT listening for mailbox commands...
3,480,966 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,614 UART: [rt]cmd =0x44504543, len=24
3,538,192 >>> mbox cmd response data (40 bytes)
3,538,193 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,790 UART: [rt]cmd =0x44504543, len=24
3,595,211 >>> mbox cmd response data (40 bytes)
3,595,212 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,619 UART: [rt]cmd =0x44504543, len=24
3,652,259 >>> mbox cmd response data (40 bytes)
3,652,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,681,607 UART: [rt]cmd =0x44504543, len=24
3,709,124 >>> mbox cmd response data (40 bytes)
3,709,125 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,592 UART: [rt]cmd =0x44504543, len=24
3,766,474 >>> mbox cmd response data (40 bytes)
3,766,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,796,166 UART: [rt]cmd =0x44504543, len=24
3,823,735 >>> mbox cmd response data (40 bytes)
3,823,736 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,165 UART: [rt]cmd =0x44504543, len=24
3,880,159 >>> mbox cmd response data (40 bytes)
3,880,160 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,739 UART: [rt]cmd =0x44504543, len=24
3,937,400 >>> mbox cmd response data (40 bytes)
3,937,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,036 UART: [rt]cmd =0x44504543, len=24
3,994,410 >>> mbox cmd response data (40 bytes)
3,994,411 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,782 UART: [rt]cmd =0x44504543, len=24
4,051,715 >>> mbox cmd response data (40 bytes)
4,051,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,207 UART: [rt]cmd =0x44504543, len=24
4,108,553 >>> mbox cmd response data (40 bytes)
4,108,554 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,273 UART: [rt]cmd =0x44504543, len=24
4,166,258 >>> mbox cmd response data (40 bytes)
4,166,259 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,690 UART: [rt]cmd =0x44504543, len=24
4,223,820 >>> mbox cmd response data (40 bytes)
4,223,821 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,350 UART: [rt]cmd =0x44504543, len=24
4,280,971 >>> mbox cmd response data (40 bytes)
4,280,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,745 UART: [rt]cmd =0x44504543, len=24
4,318,145 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,409 UART: [state] WD Timer not started. Device not locked for debugging
87,556 UART: [kat] SHA2-256
891,106 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,210 UART: [kat] ++
895,362 UART: [kat] sha1
899,672 UART: [kat] SHA2-256
901,612 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
915,987 UART: [kat] HMAC-384Kdf
920,585 UART: [kat] LMS
1,168,897 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,242 UART: [fht] FHT @ 0x50003400
1,172,958 UART: [idev] ++
1,173,126 UART: [idev] CDI.KEYID = 6
1,173,487 UART: [idev] SUBJECT.KEYID = 7
1,173,912 UART: [idev] UDS.KEYID = 0
1,174,258 ready_for_fw is high
1,174,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,199,187 UART: [idev] Sha1 KeyId Algorithm
1,208,033 UART: [idev] --
1,209,094 UART: [ldev] ++
1,209,262 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,053 UART: [ldev] AUTHORITY.KEYID = 7
1,210,516 UART: [ldev] FE.KEYID = 1
1,215,730 UART: [ldev] Erasing FE.KEYID = 1
1,242,065 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,020 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,762 UART: [ldev] --
1,281,167 UART: [fwproc] Wait for Commands...
1,281,856 UART: [fwproc] Recv command 0x46574c44
1,282,589 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,311 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,486 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,823 >>> mbox cmd response: success
2,826,879 UART: [afmc] ++
2,827,047 UART: [afmc] CDI.KEYID = 6
2,827,410 UART: [afmc] SUBJECT.KEYID = 7
2,827,836 UART: [afmc] AUTHORITY.KEYID = 5
2,862,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,570 UART: [afmc] --
2,906,435 UART: [cold-reset] --
2,907,345 UART: [state] Locking Datavault
2,908,258 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,862 UART: [state] Locking ICCM
2,909,534 UART: [exit] Launching FMC @ 0x40000130
2,914,864 UART:
2,914,880 UART: Running Caliptra FMC ...
2,915,288 UART:
2,915,342 UART: [state] CFI Enabled
2,926,356 UART: [fht] FMC Alias Private Key: 7
3,045,834 UART: [art] Extend RT PCRs Done
3,046,262 UART: [art] Lock RT PCRs Done
3,048,166 UART: [art] Populate DV Done
3,056,557 UART: [fht] FMC Alias Private Key: 7
3,057,557 UART: [art] Derive CDI
3,057,837 UART: [art] Store in slot 0x4
3,143,496 UART: [art] Derive Key Pair
3,143,856 UART: [art] Store priv key in slot 0x5
3,156,830 UART: [art] Derive Key Pair - Done
3,171,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,491 UART: [art] PUB.X = 9B971081259628A4F82E23177BC9FC45DFDA7617921D2C14091DA40BFDB39A109B0E0C3BAB3BC5DB918464A5704B152B
3,194,255 UART: [art] PUB.Y = DED2CB5C0950D8C78C532AF9BA9E1A4565698DBBE0F3975F28AB2AACA363F07EE9FCC5DD9964B8CFEDF7E123BB93DB2C
3,201,234 UART: [art] SIG.R = 8F27B5D3D175AAB186EA1F40C6DB5A5A370F983102659E91EDB553752558624CA685FDD9FA28071D9685B75113D4478A
3,207,995 UART: [art] SIG.S = 67A14CBC1B56B4448161F3B08E12656318CF5B5F0C1390A24C957F030BA5338FDFD15CD379310DBFF48DDA0963F7A9D7
3,232,136 UART: Caliptra RT
3,232,387 UART: [state] CFI Enabled
3,351,364 UART: [rt] RT listening for mailbox commands...
3,352,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,934 UART: [rt]cmd =0x44504543, len=24
3,409,234 >>> mbox cmd response data (40 bytes)
3,409,235 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,682 UART: [rt]cmd =0x44504543, len=24
3,466,169 >>> mbox cmd response data (40 bytes)
3,466,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,655 UART: [rt]cmd =0x44504543, len=24
3,523,305 >>> mbox cmd response data (40 bytes)
3,523,306 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,859 UART: [rt]cmd =0x44504543, len=24
3,580,862 >>> mbox cmd response data (40 bytes)
3,580,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,230 UART: [rt]cmd =0x44504543, len=24
3,638,058 >>> mbox cmd response data (40 bytes)
3,638,059 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,582 UART: [rt]cmd =0x44504543, len=24
3,695,607 >>> mbox cmd response data (40 bytes)
3,695,608 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,275 UART: [rt]cmd =0x44504543, len=24
3,752,403 >>> mbox cmd response data (40 bytes)
3,752,404 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,033 UART: [rt]cmd =0x44504543, len=24
3,809,518 >>> mbox cmd response data (40 bytes)
3,809,519 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,094 UART: [rt]cmd =0x44504543, len=24
3,866,580 >>> mbox cmd response data (40 bytes)
3,866,581 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,966 UART: [rt]cmd =0x44504543, len=24
3,923,511 >>> mbox cmd response data (40 bytes)
3,923,512 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,013 UART: [rt]cmd =0x44504543, len=24
3,980,663 >>> mbox cmd response data (40 bytes)
3,980,664 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,135 UART: [rt]cmd =0x44504543, len=24
4,037,790 >>> mbox cmd response data (40 bytes)
4,037,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,482 UART: [rt]cmd =0x44504543, len=24
4,095,454 >>> mbox cmd response data (40 bytes)
4,095,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,124,988 UART: [rt]cmd =0x44504543, len=24
4,152,967 >>> mbox cmd response data (40 bytes)
4,152,968 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,182,515 UART: [rt]cmd =0x44504543, len=24
4,189,917 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,528 ready_for_fw is high
1,059,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,920 >>> mbox cmd response: success
2,741,715 UART:
2,741,731 UART: Running Caliptra FMC ...
2,742,139 UART:
2,742,193 UART: [state] CFI Enabled
2,752,479 UART: [fht] FMC Alias Private Key: 7
2,871,743 UART: [art] Extend RT PCRs Done
2,872,171 UART: [art] Lock RT PCRs Done
2,873,911 UART: [art] Populate DV Done
2,882,286 UART: [fht] FMC Alias Private Key: 7
2,883,216 UART: [art] Derive CDI
2,883,496 UART: [art] Store in slot 0x4
2,969,437 UART: [art] Derive Key Pair
2,969,797 UART: [art] Store priv key in slot 0x5
2,983,213 UART: [art] Derive Key Pair - Done
2,997,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,374 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,139 UART: [art] PUB.X = C69898FB4D8F2059AC28D8115874C75BF03B34D31CE0FB33931605C562FA52C497DA522B5C1494180F8E767DBA6D9773
3,020,903 UART: [art] PUB.Y = 0ECD8E3409DA3A8E3583BD05FC882AFCC5FCD4686C7FD4D064D1BFD49D76A9FCDD2287D3761D621EFE621C2019DD6C7A
3,027,868 UART: [art] SIG.R = DB4AA0F70BA278462DBC1A9E17975959F277D4F8D061D844099A810ECCB87C2C12EC22A49FE4D60B647A512D463A8B5D
3,034,636 UART: [art] SIG.S = 4FF566B5B4D4AF4344D70C29C6766163FA358AE216FBF120A3E1A974A4505291574B55535F09FEE2963EF67F5D205514
3,058,092 UART: Caliptra RT
3,058,343 UART: [state] CFI Enabled
3,178,236 UART: [rt] RT listening for mailbox commands...
3,178,906 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,784 UART: [rt]cmd =0x44504543, len=24
3,236,250 >>> mbox cmd response data (40 bytes)
3,236,251 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,770 UART: [rt]cmd =0x44504543, len=24
3,293,147 >>> mbox cmd response data (40 bytes)
3,293,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,322,663 UART: [rt]cmd =0x44504543, len=24
3,349,989 >>> mbox cmd response data (40 bytes)
3,349,990 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,489 UART: [rt]cmd =0x44504543, len=24
3,407,276 >>> mbox cmd response data (40 bytes)
3,407,277 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,894 UART: [rt]cmd =0x44504543, len=24
3,464,464 >>> mbox cmd response data (40 bytes)
3,464,465 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,956 UART: [rt]cmd =0x44504543, len=24
3,521,167 >>> mbox cmd response data (40 bytes)
3,521,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,727 UART: [rt]cmd =0x44504543, len=24
3,578,407 >>> mbox cmd response data (40 bytes)
3,578,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,749 UART: [rt]cmd =0x44504543, len=24
3,635,858 >>> mbox cmd response data (40 bytes)
3,635,859 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,098 UART: [rt]cmd =0x44504543, len=24
3,692,788 >>> mbox cmd response data (40 bytes)
3,692,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,040 UART: [rt]cmd =0x44504543, len=24
3,749,595 >>> mbox cmd response data (40 bytes)
3,749,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,167 UART: [rt]cmd =0x44504543, len=24
3,806,715 >>> mbox cmd response data (40 bytes)
3,806,716 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,201 UART: [rt]cmd =0x44504543, len=24
3,863,582 >>> mbox cmd response data (40 bytes)
3,863,583 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,164 UART: [rt]cmd =0x44504543, len=24
3,920,660 >>> mbox cmd response data (40 bytes)
3,920,661 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,046 UART: [rt]cmd =0x44504543, len=24
3,977,661 >>> mbox cmd response data (40 bytes)
3,977,662 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,965 UART: [rt]cmd =0x44504543, len=24
4,014,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,524 UART: [kat] HMAC-384Kdf
921,018 UART: [kat] LMS
1,169,330 UART: [kat] --
1,169,871 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,172,971 UART: [idev] ++
1,173,139 UART: [idev] CDI.KEYID = 6
1,173,500 UART: [idev] SUBJECT.KEYID = 7
1,173,925 UART: [idev] UDS.KEYID = 0
1,174,271 ready_for_fw is high
1,174,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,864 UART: [idev] Erasing UDS.KEYID = 0
1,199,480 UART: [idev] Sha1 KeyId Algorithm
1,208,158 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,323 UART: [ldev] --
1,281,670 UART: [fwproc] Wait for Commands...
1,282,267 UART: [fwproc] Recv command 0x46574c44
1,283,000 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,823 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,158 >>> mbox cmd response: success
2,826,192 UART: [afmc] ++
2,826,360 UART: [afmc] CDI.KEYID = 6
2,826,723 UART: [afmc] SUBJECT.KEYID = 7
2,827,149 UART: [afmc] AUTHORITY.KEYID = 5
2,863,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,739 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,488 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,198 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,079 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,535 UART: [afmc] --
2,906,450 UART: [cold-reset] --
2,907,262 UART: [state] Locking Datavault
2,908,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,047 UART: [state] Locking ICCM
2,909,589 UART: [exit] Launching FMC @ 0x40000130
2,914,919 UART:
2,914,935 UART: Running Caliptra FMC ...
2,915,343 UART:
2,915,486 UART: [state] CFI Enabled
2,926,104 UART: [fht] FMC Alias Private Key: 7
3,044,950 UART: [art] Extend RT PCRs Done
3,045,378 UART: [art] Lock RT PCRs Done
3,046,486 UART: [art] Populate DV Done
3,054,615 UART: [fht] FMC Alias Private Key: 7
3,055,675 UART: [art] Derive CDI
3,055,955 UART: [art] Store in slot 0x4
3,142,262 UART: [art] Derive Key Pair
3,142,622 UART: [art] Store priv key in slot 0x5
3,156,010 UART: [art] Derive Key Pair - Done
3,170,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,744 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,509 UART: [art] PUB.X = 94E892AACAC6ECA9A58E11F509E47A64EE1C8AC348304B8A30AABAA834FED2232C67CE029E5E759261119C4622522BFE
3,193,287 UART: [art] PUB.Y = 6C465035F9CCF166767510820D5320C62D7387467161C2998487490EFC25D4BA98AEDEC232779DC3017634A823FBAE00
3,200,198 UART: [art] SIG.R = 3B9F10832EFC612450E95CDD11B80DC413D20210B4E063352EF76D294F4D1777A4B17A3BA0DE412759A2ECEF8E9396A6
3,206,968 UART: [art] SIG.S = 74AAD0272FFCF1A69FF260410DF4E22FEFD335747C02C81904CFB3A53818442D182CE36CB96E735A27F4D32A6AADE0F1
3,230,653 UART: Caliptra RT
3,230,996 UART: [state] CFI Enabled
3,350,744 UART: [rt] RT listening for mailbox commands...
3,351,414 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,202 UART: [rt]cmd =0x44504543, len=24
3,408,720 >>> mbox cmd response data (40 bytes)
3,408,721 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,420 UART: [rt]cmd =0x44504543, len=24
3,465,811 >>> mbox cmd response data (40 bytes)
3,465,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,455 UART: [rt]cmd =0x44504543, len=24
3,523,517 >>> mbox cmd response data (40 bytes)
3,523,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,995 UART: [rt]cmd =0x44504543, len=24
3,580,626 >>> mbox cmd response data (40 bytes)
3,580,627 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,198 UART: [rt]cmd =0x44504543, len=24
3,637,474 >>> mbox cmd response data (40 bytes)
3,637,475 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,834 UART: [rt]cmd =0x44504543, len=24
3,694,427 >>> mbox cmd response data (40 bytes)
3,694,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,579 UART: [rt]cmd =0x44504543, len=24
3,751,711 >>> mbox cmd response data (40 bytes)
3,751,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,267 UART: [rt]cmd =0x44504543, len=24
3,809,602 >>> mbox cmd response data (40 bytes)
3,809,603 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,918 UART: [rt]cmd =0x44504543, len=24
3,866,084 >>> mbox cmd response data (40 bytes)
3,866,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,622 UART: [rt]cmd =0x44504543, len=24
3,922,957 >>> mbox cmd response data (40 bytes)
3,922,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,475 UART: [rt]cmd =0x44504543, len=24
3,980,077 >>> mbox cmd response data (40 bytes)
3,980,078 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,377 UART: [rt]cmd =0x44504543, len=24
4,036,358 >>> mbox cmd response data (40 bytes)
4,036,359 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,784 UART: [rt]cmd =0x44504543, len=24
4,093,166 >>> mbox cmd response data (40 bytes)
4,093,167 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,598 UART: [rt]cmd =0x44504543, len=24
4,149,959 >>> mbox cmd response data (40 bytes)
4,149,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,383 UART: [rt]cmd =0x44504543, len=24
4,186,613 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,217 ready_for_fw is high
1,060,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,131 >>> mbox cmd response: success
2,740,884 UART:
2,740,900 UART: Running Caliptra FMC ...
2,741,308 UART:
2,741,451 UART: [state] CFI Enabled
2,752,085 UART: [fht] FMC Alias Private Key: 7
2,871,483 UART: [art] Extend RT PCRs Done
2,871,911 UART: [art] Lock RT PCRs Done
2,873,437 UART: [art] Populate DV Done
2,881,788 UART: [fht] FMC Alias Private Key: 7
2,882,836 UART: [art] Derive CDI
2,883,116 UART: [art] Store in slot 0x4
2,968,783 UART: [art] Derive Key Pair
2,969,143 UART: [art] Store priv key in slot 0x5
2,982,333 UART: [art] Derive Key Pair - Done
2,997,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,559 UART: [art] PUB.X = 073EAC5B856DA46966717C4E68DAAB8DAD228763B9B42DC3E2C95E93D3E8AAC882F007287A85E07B6E56CB8D0969D351
3,020,330 UART: [art] PUB.Y = 3E962AF6E2856009FC9FBA6B60F35CE64940EAB99CE4F4EFCF50047744A8D8C0B699F93E607E46EB94D65CF0856A578E
3,027,286 UART: [art] SIG.R = 449769CA4241969D2BD91119B7F641F5D3EDBBC90693BBA0CE229C2513663FEBA8EC936F36B6AAD7F7A456317A85FEDE
3,034,067 UART: [art] SIG.S = 56F00F224F796A16521AFD40951BC5B84D2F9D342D3A2F00204407C25BE9D3CC1A126EC7C1442FE0565D9A8BB7F5E5E7
3,057,691 UART: Caliptra RT
3,058,034 UART: [state] CFI Enabled
3,177,424 UART: [rt] RT listening for mailbox commands...
3,178,094 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,278 UART: [rt]cmd =0x44504543, len=24
3,235,722 >>> mbox cmd response data (40 bytes)
3,235,723 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,174 UART: [rt]cmd =0x44504543, len=24
3,292,581 >>> mbox cmd response data (40 bytes)
3,292,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,957 UART: [rt]cmd =0x44504543, len=24
3,349,639 >>> mbox cmd response data (40 bytes)
3,349,640 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,155 UART: [rt]cmd =0x44504543, len=24
3,406,984 >>> mbox cmd response data (40 bytes)
3,406,985 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,766 UART: [rt]cmd =0x44504543, len=24
3,464,304 >>> mbox cmd response data (40 bytes)
3,464,305 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,493,864 UART: [rt]cmd =0x44504543, len=24
3,520,987 >>> mbox cmd response data (40 bytes)
3,520,988 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,331 UART: [rt]cmd =0x44504543, len=24
3,578,113 >>> mbox cmd response data (40 bytes)
3,578,114 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,473 UART: [rt]cmd =0x44504543, len=24
3,634,952 >>> mbox cmd response data (40 bytes)
3,634,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,490 UART: [rt]cmd =0x44504543, len=24
3,692,548 >>> mbox cmd response data (40 bytes)
3,692,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,848 UART: [rt]cmd =0x44504543, len=24
3,749,633 >>> mbox cmd response data (40 bytes)
3,749,634 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,993 UART: [rt]cmd =0x44504543, len=24
3,806,167 >>> mbox cmd response data (40 bytes)
3,806,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,465 UART: [rt]cmd =0x44504543, len=24
3,863,126 >>> mbox cmd response data (40 bytes)
3,863,127 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,646 UART: [rt]cmd =0x44504543, len=24
3,920,172 >>> mbox cmd response data (40 bytes)
3,920,173 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,632 UART: [rt]cmd =0x44504543, len=24
3,977,135 >>> mbox cmd response data (40 bytes)
3,977,136 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,453 UART: [rt]cmd =0x44504543, len=24
4,013,795 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,708 UART: [kat] SHA2-512-ACC
908,609 UART: [kat] ECC-384
918,208 UART: [kat] HMAC-384Kdf
922,932 UART: [kat] LMS
1,171,260 UART: [kat] --
1,171,965 UART: [cold-reset] ++
1,172,291 UART: [fht] FHT @ 0x50003400
1,175,072 UART: [idev] ++
1,175,240 UART: [idev] CDI.KEYID = 6
1,175,600 UART: [idev] SUBJECT.KEYID = 7
1,176,024 UART: [idev] UDS.KEYID = 0
1,176,369 ready_for_fw is high
1,176,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,952 UART: [idev] Erasing UDS.KEYID = 0
1,200,973 UART: [idev] Sha1 KeyId Algorithm
1,209,333 UART: [idev] --
1,210,193 UART: [ldev] ++
1,210,361 UART: [ldev] CDI.KEYID = 6
1,210,724 UART: [ldev] SUBJECT.KEYID = 5
1,211,150 UART: [ldev] AUTHORITY.KEYID = 7
1,211,613 UART: [ldev] FE.KEYID = 1
1,216,655 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,055 UART: [ldev] --
1,282,426 UART: [fwproc] Wait for Commands...
1,283,106 UART: [fwproc] Recv command 0x46574c44
1,283,834 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,855 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,498 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,847 >>> mbox cmd response: success
2,829,043 UART: [afmc] ++
2,829,211 UART: [afmc] CDI.KEYID = 6
2,829,573 UART: [afmc] SUBJECT.KEYID = 7
2,829,998 UART: [afmc] AUTHORITY.KEYID = 5
2,865,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,433 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,316 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,017 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,783 UART: [afmc] --
2,908,779 UART: [cold-reset] --
2,909,593 UART: [state] Locking Datavault
2,910,914 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,518 UART: [state] Locking ICCM
2,911,944 UART: [exit] Launching FMC @ 0x40000130
2,917,274 UART:
2,917,290 UART: Running Caliptra FMC ...
2,917,698 UART:
2,917,752 UART: [state] CFI Enabled
2,928,020 UART: [fht] FMC Alias Private Key: 7
3,047,078 UART: [art] Extend RT PCRs Done
3,047,506 UART: [art] Lock RT PCRs Done
3,048,776 UART: [art] Populate DV Done
3,057,029 UART: [fht] FMC Alias Private Key: 7
3,058,165 UART: [art] Derive CDI
3,058,445 UART: [art] Store in slot 0x4
3,144,272 UART: [art] Derive Key Pair
3,144,632 UART: [art] Store priv key in slot 0x5
3,157,794 UART: [art] Derive Key Pair - Done
3,172,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,792 UART: [art] PUB.X = ED5FD0FC97164FC1BCF1744289082B6E9A9AAB5AFCD8768533FD55ECEE037712755E1D45E1373A8C9CF18D70BFF2F908
3,195,569 UART: [art] PUB.Y = E61B8EE26F242F449BC83F00DD338CE532EDE707C36AFB56012520AF29E434DA6E88FC9E740C21D972BC9ABB0A8883F9
3,202,499 UART: [art] SIG.R = 1777943E7317D572D9502A0873FA076B5D5875A2EEE079EB184E66919794AF51C4DFFA538BE148D86D6CC8B30FF1E1EB
3,209,266 UART: [art] SIG.S = E15F161F60CC408967D2EE7B704E4442162FBC013074A91D9E97057DE4ACEB693635A918022BD542E747D51E1B949C5D
3,232,613 UART: Caliptra RT
3,232,864 UART: [state] CFI Enabled
3,351,801 UART: [rt] RT listening for mailbox commands...
3,352,471 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,435 UART: [rt]cmd =0x44504543, len=24
3,409,697 >>> mbox cmd response data (40 bytes)
3,409,698 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,319 UART: [rt]cmd =0x44504543, len=24
3,466,430 >>> mbox cmd response data (40 bytes)
3,466,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,970 UART: [rt]cmd =0x44504543, len=24
3,523,406 >>> mbox cmd response data (40 bytes)
3,523,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,842 UART: [rt]cmd =0x44504543, len=24
3,579,803 >>> mbox cmd response data (40 bytes)
3,579,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,215 UART: [rt]cmd =0x44504543, len=24
3,636,729 >>> mbox cmd response data (40 bytes)
3,636,730 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,385 UART: [rt]cmd =0x44504543, len=24
3,693,550 >>> mbox cmd response data (40 bytes)
3,693,551 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,036 UART: [rt]cmd =0x44504543, len=24
3,750,870 >>> mbox cmd response data (40 bytes)
3,750,871 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,312 UART: [rt]cmd =0x44504543, len=24
3,807,701 >>> mbox cmd response data (40 bytes)
3,807,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,315 UART: [rt]cmd =0x44504543, len=24
3,864,667 >>> mbox cmd response data (40 bytes)
3,864,668 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,081 UART: [rt]cmd =0x44504543, len=24
3,921,912 >>> mbox cmd response data (40 bytes)
3,921,913 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,428 UART: [rt]cmd =0x44504543, len=24
3,979,366 >>> mbox cmd response data (40 bytes)
3,979,367 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,726 UART: [rt]cmd =0x44504543, len=24
4,035,837 >>> mbox cmd response data (40 bytes)
4,035,838 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,361 UART: [rt]cmd =0x44504543, len=24
4,092,521 >>> mbox cmd response data (40 bytes)
4,092,522 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,019 UART: [rt]cmd =0x44504543, len=24
4,149,904 >>> mbox cmd response data (40 bytes)
4,149,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,476 UART: [rt]cmd =0x44504543, len=24
4,186,520 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,027 ready_for_fw is high
1,061,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,122 >>> mbox cmd response: success
2,742,305 UART:
2,742,321 UART: Running Caliptra FMC ...
2,742,729 UART:
2,742,783 UART: [state] CFI Enabled
2,753,327 UART: [fht] FMC Alias Private Key: 7
2,872,237 UART: [art] Extend RT PCRs Done
2,872,665 UART: [art] Lock RT PCRs Done
2,873,991 UART: [art] Populate DV Done
2,882,248 UART: [fht] FMC Alias Private Key: 7
2,883,320 UART: [art] Derive CDI
2,883,600 UART: [art] Store in slot 0x4
2,969,649 UART: [art] Derive Key Pair
2,970,009 UART: [art] Store priv key in slot 0x5
2,982,857 UART: [art] Derive Key Pair - Done
2,997,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,065 UART: [art] PUB.X = A1F9E0E72ADEA96893B9B6E8E440A76BFFC696934B6EFD088701A03071CBAB157907B7FDF143CB269C0653E3CB8AEF40
3,020,839 UART: [art] PUB.Y = 1B220A3527C66AC563A1B0ED970816772FD70B2974A3923DCBC89930A695DBAAC7B98FEFB9FF9074B9E1565C9C8B12B7
3,027,790 UART: [art] SIG.R = CE0A2112B1FC00AD4A857BF3E8535332913E8044ED9ED5D5D94C59F6EA04522BA4FE6BE3A40EE53306C59C387E359867
3,034,534 UART: [art] SIG.S = 634538342E42CF3B4FF383512D4E7F25D283BC03C6B06ADBDB7E95A24071D42F12F31BA2C8B59082E4D49D376E89999A
3,058,419 UART: Caliptra RT
3,058,670 UART: [state] CFI Enabled
3,177,885 UART: [rt] RT listening for mailbox commands...
3,178,555 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,531 UART: [rt]cmd =0x44504543, len=24
3,235,721 >>> mbox cmd response data (40 bytes)
3,235,722 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,369 UART: [rt]cmd =0x44504543, len=24
3,292,654 >>> mbox cmd response data (40 bytes)
3,292,655 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,778 UART: [rt]cmd =0x44504543, len=24
3,349,232 >>> mbox cmd response data (40 bytes)
3,349,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,704 UART: [rt]cmd =0x44504543, len=24
3,406,223 >>> mbox cmd response data (40 bytes)
3,406,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,669 UART: [rt]cmd =0x44504543, len=24
3,463,337 >>> mbox cmd response data (40 bytes)
3,463,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,687 UART: [rt]cmd =0x44504543, len=24
3,519,774 >>> mbox cmd response data (40 bytes)
3,519,775 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,254 UART: [rt]cmd =0x44504543, len=24
3,576,862 >>> mbox cmd response data (40 bytes)
3,576,863 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,322 UART: [rt]cmd =0x44504543, len=24
3,633,771 >>> mbox cmd response data (40 bytes)
3,633,772 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,151 UART: [rt]cmd =0x44504543, len=24
3,691,003 >>> mbox cmd response data (40 bytes)
3,691,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,321 UART: [rt]cmd =0x44504543, len=24
3,748,116 >>> mbox cmd response data (40 bytes)
3,748,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,806 UART: [rt]cmd =0x44504543, len=24
3,805,416 >>> mbox cmd response data (40 bytes)
3,805,417 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,848 UART: [rt]cmd =0x44504543, len=24
3,862,745 >>> mbox cmd response data (40 bytes)
3,862,746 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,243 UART: [rt]cmd =0x44504543, len=24
3,920,075 >>> mbox cmd response data (40 bytes)
3,920,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,625 UART: [rt]cmd =0x44504543, len=24
3,977,682 >>> mbox cmd response data (40 bytes)
3,977,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,992 UART: [rt]cmd =0x44504543, len=24
4,014,230 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,625 UART: [state] LifecycleState = Unprovisioned
86,280 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [kat] SHA2-256
893,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,104 UART: [kat] ++
898,256 UART: [kat] sha1
902,348 UART: [kat] SHA2-256
904,288 UART: [kat] SHA2-384
906,981 UART: [kat] SHA2-512-ACC
908,882 UART: [kat] ECC-384
919,093 UART: [kat] HMAC-384Kdf
923,739 UART: [kat] LMS
1,172,067 UART: [kat] --
1,172,960 UART: [cold-reset] ++
1,173,490 UART: [fht] FHT @ 0x50003400
1,176,153 UART: [idev] ++
1,176,321 UART: [idev] CDI.KEYID = 6
1,176,681 UART: [idev] SUBJECT.KEYID = 7
1,177,105 UART: [idev] UDS.KEYID = 0
1,177,450 ready_for_fw is high
1,177,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,127 UART: [idev] Erasing UDS.KEYID = 0
1,202,252 UART: [idev] Sha1 KeyId Algorithm
1,210,844 UART: [idev] --
1,211,906 UART: [ldev] ++
1,212,074 UART: [ldev] CDI.KEYID = 6
1,212,437 UART: [ldev] SUBJECT.KEYID = 5
1,212,863 UART: [ldev] AUTHORITY.KEYID = 7
1,213,326 UART: [ldev] FE.KEYID = 1
1,218,630 UART: [ldev] Erasing FE.KEYID = 1
1,244,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,458 UART: [ldev] --
1,283,919 UART: [fwproc] Wait for Commands...
1,284,505 UART: [fwproc] Recv command 0x46574c44
1,285,233 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,211 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,538 >>> mbox cmd response: success
2,829,744 UART: [afmc] ++
2,829,912 UART: [afmc] CDI.KEYID = 6
2,830,274 UART: [afmc] SUBJECT.KEYID = 7
2,830,699 UART: [afmc] AUTHORITY.KEYID = 5
2,866,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,631 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,971 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,672 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,308 UART: [afmc] --
2,909,220 UART: [cold-reset] --
2,910,038 UART: [state] Locking Datavault
2,911,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,831 UART: [state] Locking ICCM
2,912,487 UART: [exit] Launching FMC @ 0x40000130
2,917,817 UART:
2,917,833 UART: Running Caliptra FMC ...
2,918,241 UART:
2,918,384 UART: [state] CFI Enabled
2,929,236 UART: [fht] FMC Alias Private Key: 7
3,048,166 UART: [art] Extend RT PCRs Done
3,048,594 UART: [art] Lock RT PCRs Done
3,050,224 UART: [art] Populate DV Done
3,058,709 UART: [fht] FMC Alias Private Key: 7
3,059,887 UART: [art] Derive CDI
3,060,167 UART: [art] Store in slot 0x4
3,145,848 UART: [art] Derive Key Pair
3,146,208 UART: [art] Store priv key in slot 0x5
3,159,142 UART: [art] Derive Key Pair - Done
3,173,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,377 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,142 UART: [art] PUB.X = D674CFE1A898F028D711F00BEDC556C607B521A2355B137C5BCB334E529D06A76CA6B633EA1A8738353CD512BE2AC0AB
3,196,915 UART: [art] PUB.Y = 347DD10BAF99C46A3082FC02ED2C69BEFB5743901A2090C80182E360F97A0D4F104E379B9A8EA6D87D3E23B5D450B140
3,203,859 UART: [art] SIG.R = 3AEC462B6BFE677D55C84C238A86117D4626B3FF306A0595DED8944E960F4DEF5882DD172D0CD0A37F76B9D1A4E68716
3,210,628 UART: [art] SIG.S = 5F07D6C1EF0768D55CC05A3C1A8878BD409EB3D89C38DFA8F48D92CEB3A4BE69BAA12037D9126C9177E5D673B75CDDA6
3,234,164 UART: Caliptra RT
3,234,507 UART: [state] CFI Enabled
3,353,705 UART: [rt] RT listening for mailbox commands...
3,354,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,463 UART: [rt]cmd =0x44504543, len=24
3,412,423 >>> mbox cmd response data (40 bytes)
3,412,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,937 UART: [rt]cmd =0x44504543, len=24
3,469,734 >>> mbox cmd response data (40 bytes)
3,469,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,499,276 UART: [rt]cmd =0x44504543, len=24
3,526,360 >>> mbox cmd response data (40 bytes)
3,526,361 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,555,706 UART: [rt]cmd =0x44504543, len=24
3,582,971 >>> mbox cmd response data (40 bytes)
3,582,972 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,417 UART: [rt]cmd =0x44504543, len=24
3,639,627 >>> mbox cmd response data (40 bytes)
3,639,628 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,305 UART: [rt]cmd =0x44504543, len=24
3,697,042 >>> mbox cmd response data (40 bytes)
3,697,043 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,634 UART: [rt]cmd =0x44504543, len=24
3,754,356 >>> mbox cmd response data (40 bytes)
3,754,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,158 UART: [rt]cmd =0x44504543, len=24
3,811,925 >>> mbox cmd response data (40 bytes)
3,811,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,367 UART: [rt]cmd =0x44504543, len=24
3,868,955 >>> mbox cmd response data (40 bytes)
3,868,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,485 UART: [rt]cmd =0x44504543, len=24
3,925,958 >>> mbox cmd response data (40 bytes)
3,925,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,432 UART: [rt]cmd =0x44504543, len=24
3,982,850 >>> mbox cmd response data (40 bytes)
3,982,851 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,260 UART: [rt]cmd =0x44504543, len=24
4,039,625 >>> mbox cmd response data (40 bytes)
4,039,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,293 UART: [rt]cmd =0x44504543, len=24
4,096,881 >>> mbox cmd response data (40 bytes)
4,096,882 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,445 UART: [rt]cmd =0x44504543, len=24
4,154,084 >>> mbox cmd response data (40 bytes)
4,154,085 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,674 UART: [rt]cmd =0x44504543, len=24
4,190,982 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,480 ready_for_fw is high
1,060,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,851 >>> mbox cmd response: success
2,742,422 UART:
2,742,438 UART: Running Caliptra FMC ...
2,742,846 UART:
2,742,989 UART: [state] CFI Enabled
2,753,795 UART: [fht] FMC Alias Private Key: 7
2,872,443 UART: [art] Extend RT PCRs Done
2,872,871 UART: [art] Lock RT PCRs Done
2,874,447 UART: [art] Populate DV Done
2,882,662 UART: [fht] FMC Alias Private Key: 7
2,883,658 UART: [art] Derive CDI
2,883,938 UART: [art] Store in slot 0x4
2,969,791 UART: [art] Derive Key Pair
2,970,151 UART: [art] Store priv key in slot 0x5
2,983,501 UART: [art] Derive Key Pair - Done
2,998,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,152 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,917 UART: [art] PUB.X = 34FD337D1BBFD7848E6A660779F700BC14E01E4B340B62C2D636400E7AC0306CF0F67D15C7EE61B33197B1BF6ABF848C
3,021,666 UART: [art] PUB.Y = 0BB50724393363410E753E0F823F19C516343F7BF44193CA82F087975A99696FA0B8868357D68AED647D73ECB6B47ABC
3,028,600 UART: [art] SIG.R = 3909A6E99DCA125329B9EBDB21C0A961752A6376096D08BB691278FF61694674903FABB5D66ED8CA305BCE9280C82BB7
3,035,365 UART: [art] SIG.S = 773F7E177A2DE7EB978C907676CF2721AC840586C41BC74236BC070B697B4C2AB2D33479D017A99B5E1029C4ED3AD106
3,059,735 UART: Caliptra RT
3,060,078 UART: [state] CFI Enabled
3,179,088 UART: [rt] RT listening for mailbox commands...
3,179,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,632 UART: [rt]cmd =0x44504543, len=24
3,237,180 >>> mbox cmd response data (40 bytes)
3,237,181 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,566 UART: [rt]cmd =0x44504543, len=24
3,294,559 >>> mbox cmd response data (40 bytes)
3,294,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,324,137 UART: [rt]cmd =0x44504543, len=24
3,351,907 >>> mbox cmd response data (40 bytes)
3,351,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,303 UART: [rt]cmd =0x44504543, len=24
3,409,208 >>> mbox cmd response data (40 bytes)
3,409,209 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,770 UART: [rt]cmd =0x44504543, len=24
3,466,412 >>> mbox cmd response data (40 bytes)
3,466,413 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,722 UART: [rt]cmd =0x44504543, len=24
3,523,035 >>> mbox cmd response data (40 bytes)
3,523,036 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,535 UART: [rt]cmd =0x44504543, len=24
3,579,959 >>> mbox cmd response data (40 bytes)
3,579,960 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,637 UART: [rt]cmd =0x44504543, len=24
3,636,976 >>> mbox cmd response data (40 bytes)
3,636,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,372 UART: [rt]cmd =0x44504543, len=24
3,693,880 >>> mbox cmd response data (40 bytes)
3,693,881 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,344 UART: [rt]cmd =0x44504543, len=24
3,751,027 >>> mbox cmd response data (40 bytes)
3,751,028 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,347 UART: [rt]cmd =0x44504543, len=24
3,807,815 >>> mbox cmd response data (40 bytes)
3,807,816 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,193 UART: [rt]cmd =0x44504543, len=24
3,864,854 >>> mbox cmd response data (40 bytes)
3,864,855 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,142 UART: [rt]cmd =0x44504543, len=24
3,921,686 >>> mbox cmd response data (40 bytes)
3,921,687 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,420 UART: [rt]cmd =0x44504543, len=24
3,979,249 >>> mbox cmd response data (40 bytes)
3,979,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,855 UART: [rt]cmd =0x44504543, len=24
4,016,605 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl0_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,878 writing to cptra_bootfsm_go
192,060 UART:
192,414 UART: Running Caliptra ROM ...
193,606 UART:
193,763 UART: [state] CFI Enabled
265,899 UART: [state] LifecycleState = Unprovisioned
267,877 UART: [state] DebugLocked = No
270,479 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,779 UART: [kat] SHA2-256
444,454 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,990 UART: [kat] ++
455,442 UART: [kat] sha1
466,430 UART: [kat] SHA2-256
469,094 UART: [kat] SHA2-384
473,598 UART: [kat] SHA2-512-ACC
475,967 UART: [kat] ECC-384
2,768,465 UART: [kat] HMAC-384Kdf
2,798,697 UART: [kat] LMS
3,988,976 UART: [kat] --
3,992,522 UART: [cold-reset] ++
3,993,814 UART: [fht] Storing FHT @ 0x50003400
4,004,439 UART: [idev] ++
4,005,011 UART: [idev] CDI.KEYID = 6
4,005,910 UART: [idev] SUBJECT.KEYID = 7
4,007,158 UART: [idev] UDS.KEYID = 0
4,008,224 ready_for_fw is high
4,008,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,625 UART: [idev] Erasing UDS.KEYID = 0
7,345,093 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,966 UART: [idev] --
7,370,203 UART: [ldev] ++
7,370,826 UART: [ldev] CDI.KEYID = 6
7,371,753 UART: [ldev] SUBJECT.KEYID = 5
7,372,989 UART: [ldev] AUTHORITY.KEYID = 7
7,374,220 UART: [ldev] FE.KEYID = 1
7,421,061 UART: [ldev] Erasing FE.KEYID = 1
10,754,711 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,836 UART: [ldev] --
13,112,938 UART: [fwproc] Waiting for Commands...
13,114,923 UART: [fwproc] Received command 0x46574c44
13,117,100 UART: [fwproc] Received Image of size 118548 bytes
17,221,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,957 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,133 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,133 >>> mbox cmd response: success
17,702,925 UART: [afmc] ++
17,703,541 UART: [afmc] CDI.KEYID = 6
17,704,456 UART: [afmc] SUBJECT.KEYID = 7
17,705,682 UART: [afmc] AUTHORITY.KEYID = 5
21,070,772 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,294 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,543 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,695 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,141 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,904 UART: [afmc] --
23,444,305 UART: [cold-reset] --
23,449,144 UART: [state] Locking Datavault
23,453,095 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,849 UART: [state] Locking ICCM
23,455,917 UART: [exit] Launching FMC @ 0x40000130
23,464,329 UART:
23,464,571 UART: Running Caliptra FMC ...
23,465,675 UART:
23,465,840 UART: [state] CFI Enabled
23,532,280 UART: [fht] FMC Alias Private Key: 7
25,872,867 UART: [art] Extend RT PCRs Done
25,874,081 UART: [art] Lock RT PCRs Done
25,875,487 UART: [art] Populate DV Done
25,881,006 UART: [fht] FMC Alias Private Key: 7
25,882,685 UART: [art] Derive CDI
25,883,462 UART: [art] Store in slot 0x4
25,941,160 UART: [art] Derive Key Pair
25,942,162 UART: [art] Store priv key in slot 0x5
29,235,001 UART: [art] Derive Key Pair - Done
29,248,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,136 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,659 UART: [art] PUB.X = FF4DD9001F09666FE64F70E6B8C8DD9FC19E83F614088A726F309DD4CF645F26FA6BD26B6C726A93B001C77D8F6CCCDE
31,545,897 UART: [art] PUB.Y = 7E737FE0F903BC59324AF74DA2175BF6DD53597CABABCAC6D37607DB466A6BA37CDE6DA8A62FF91CD8B1347030F1D217
31,553,175 UART: [art] SIG.R = 0397603A91C25CB0CF6FC5441F435A6B85329F23853FAD3A07D82DAA85F2268FBD67EFDBB25B6ED4D23777583D135858
31,560,569 UART: [art] SIG.S = 716E563D7D5130F444F9A999B2B3F5288D8FF79000B846C337119FE3E5FCFDF6A179F99248791FB1612FF0C4177AB21F
32,865,979 UART: Caliptra RT
32,866,709 UART: [state] CFI Enabled
33,044,836 UART: [rt] RT listening for mailbox commands...
33,046,758 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,076,773 UART: [rt]cmd =0x44504543, len=24
33,124,673 >>> mbox cmd response data (40 bytes)
33,125,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,156,847 UART: [rt]cmd =0x44504543, len=96
33,216,545 >>> mbox cmd response data (56 bytes)
33,217,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,950 UART: [rt]cmd =0x44504543, len=96
33,322,786 >>> mbox cmd response data (56 bytes)
33,323,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,354,174 UART: [rt]cmd =0x44504543, len=96
33,429,787 >>> mbox cmd response data (56 bytes)
33,430,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,460,980 UART: [rt]cmd =0x44504543, len=96
33,537,564 >>> mbox cmd response data (56 bytes)
33,538,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,568,817 UART: [rt]cmd =0x44504543, len=96
33,643,954 >>> mbox cmd response data (56 bytes)
33,644,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,675,196 UART: [rt]cmd =0x44504543, len=96
33,750,536 >>> mbox cmd response data (56 bytes)
33,751,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,781,669 UART: [rt]cmd =0x44504543, len=96
33,857,651 >>> mbox cmd response data (56 bytes)
33,858,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,888,863 UART: [rt]cmd =0x44504543, len=96
33,964,058 >>> mbox cmd response data (56 bytes)
33,964,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,995,310 UART: [rt]cmd =0x44504543, len=96
34,071,361 >>> mbox cmd response data (56 bytes)
34,072,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,102,723 UART: [rt]cmd =0x44504543, len=96
34,177,955 >>> mbox cmd response data (56 bytes)
34,178,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,209,211 UART: [rt]cmd =0x44504543, len=96
34,284,839 >>> mbox cmd response data (56 bytes)
34,285,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,316,140 UART: [rt]cmd =0x44504543, len=96
34,391,948 >>> mbox cmd response data (56 bytes)
34,392,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,423,130 UART: [rt]cmd =0x44504543, len=96
34,499,138 >>> mbox cmd response data (56 bytes)
34,499,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,530,561 UART: [rt]cmd =0x44504543, len=96
34,605,479 >>> mbox cmd response data (56 bytes)
34,606,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,636,828 UART: [rt]cmd =0x44504543, len=96
34,712,798 >>> mbox cmd response data (56 bytes)
34,713,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,744,039 UART: [rt]cmd =0x44504543, len=96
34,750,867 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,806,270 ready_for_fw is high
3,807,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,801 >>> mbox cmd response: success
23,653,598 UART:
23,654,018 UART: Running Caliptra FMC ...
23,655,191 UART:
23,655,357 UART: [state] CFI Enabled
23,720,120 UART: [fht] FMC Alias Private Key: 7
26,060,528 UART: [art] Extend RT PCRs Done
26,061,762 UART: [art] Lock RT PCRs Done
26,062,880 UART: [art] Populate DV Done
26,068,036 UART: [fht] FMC Alias Private Key: 7
26,069,529 UART: [art] Derive CDI
26,070,268 UART: [art] Store in slot 0x4
26,128,452 UART: [art] Derive Key Pair
26,129,494 UART: [art] Store priv key in slot 0x5
29,421,967 UART: [art] Derive Key Pair - Done
29,434,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,166 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,683 UART: [art] PUB.X = 2A5A1041BD389DD9A0BB7B59415F3CA2C8C864B4E04643419C8081567C808A93ECCCBDBEC90AC86F20E55D46C0B0F7D2
31,732,934 UART: [art] PUB.Y = B440219A2AC43DD51AE685E1ABD8BA85532B849E75A596EB4958419600A974944C3F0A2E1049E5AE0FE1ABA3E3CBE040
31,740,184 UART: [art] SIG.R = 3A6798E15A9B0314B9402983A8C366FBFEC94E5AAE2E2EF83AED0A188AA01D20DAFAE2034404537D7E4BE8DFB0B65CE5
31,747,635 UART: [art] SIG.S = BF695E8483A92F0881C826E234DE85A813BB0C6E85727E4B871DF5E8A55A1E6A3F93F9ECB3D98F92775AF4CE8A3A1C46
33,052,425 UART: Caliptra RT
33,053,144 UART: [state] CFI Enabled
33,228,204 UART: [rt] RT listening for mailbox commands...
33,230,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,260,268 UART: [rt]cmd =0x44504543, len=24
33,288,678 >>> mbox cmd response data (40 bytes)
33,289,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,320,566 UART: [rt]cmd =0x44504543, len=96
33,380,332 >>> mbox cmd response data (56 bytes)
33,381,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,411,702 UART: [rt]cmd =0x44504543, len=96
33,487,357 >>> mbox cmd response data (56 bytes)
33,488,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,518,501 UART: [rt]cmd =0x44504543, len=96
33,593,515 >>> mbox cmd response data (56 bytes)
33,594,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,624,816 UART: [rt]cmd =0x44504543, len=96
33,701,191 >>> mbox cmd response data (56 bytes)
33,701,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,732,399 UART: [rt]cmd =0x44504543, len=96
33,807,108 >>> mbox cmd response data (56 bytes)
33,807,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,838,406 UART: [rt]cmd =0x44504543, len=96
33,914,122 >>> mbox cmd response data (56 bytes)
33,914,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,945,530 UART: [rt]cmd =0x44504543, len=96
34,021,404 >>> mbox cmd response data (56 bytes)
34,022,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,052,583 UART: [rt]cmd =0x44504543, len=96
34,127,623 >>> mbox cmd response data (56 bytes)
34,128,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,158,971 UART: [rt]cmd =0x44504543, len=96
34,234,414 >>> mbox cmd response data (56 bytes)
34,235,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,265,614 UART: [rt]cmd =0x44504543, len=96
34,341,228 >>> mbox cmd response data (56 bytes)
34,341,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,372,595 UART: [rt]cmd =0x44504543, len=96
34,447,744 >>> mbox cmd response data (56 bytes)
34,448,467 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,479,053 UART: [rt]cmd =0x44504543, len=96
34,554,885 >>> mbox cmd response data (56 bytes)
34,555,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,585,939 UART: [rt]cmd =0x44504543, len=96
34,661,492 >>> mbox cmd response data (56 bytes)
34,662,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,692,760 UART: [rt]cmd =0x44504543, len=96
34,767,969 >>> mbox cmd response data (56 bytes)
34,768,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,799,484 UART: [rt]cmd =0x44504543, len=96
34,875,327 >>> mbox cmd response data (56 bytes)
34,876,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,906,561 UART: [rt]cmd =0x44504543, len=96
34,913,320 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,582 UART:
192,952 UART: Running Caliptra ROM ...
194,080 UART:
603,809 UART: [state] CFI Enabled
620,558 UART: [state] LifecycleState = Unprovisioned
622,502 UART: [state] DebugLocked = No
624,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,754 UART: [kat] SHA2-256
799,484 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,065 UART: [kat] ++
810,542 UART: [kat] sha1
820,987 UART: [kat] SHA2-256
823,710 UART: [kat] SHA2-384
829,910 UART: [kat] SHA2-512-ACC
832,269 UART: [kat] ECC-384
3,117,508 UART: [kat] HMAC-384Kdf
3,128,892 UART: [kat] LMS
4,319,010 UART: [kat] --
4,323,030 UART: [cold-reset] ++
4,324,539 UART: [fht] Storing FHT @ 0x50003400
4,336,456 UART: [idev] ++
4,337,055 UART: [idev] CDI.KEYID = 6
4,337,986 UART: [idev] SUBJECT.KEYID = 7
4,339,227 UART: [idev] UDS.KEYID = 0
4,340,218 ready_for_fw is high
4,340,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,275 UART: [idev] Erasing UDS.KEYID = 0
7,621,995 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,062 UART: [idev] --
7,648,373 UART: [ldev] ++
7,648,932 UART: [ldev] CDI.KEYID = 6
7,649,886 UART: [ldev] SUBJECT.KEYID = 5
7,651,086 UART: [ldev] AUTHORITY.KEYID = 7
7,652,368 UART: [ldev] FE.KEYID = 1
7,662,415 UART: [ldev] Erasing FE.KEYID = 1
10,952,701 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,177 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,824 UART: [ldev] --
13,310,660 UART: [fwproc] Waiting for Commands...
13,312,963 UART: [fwproc] Received command 0x46574c44
13,315,136 UART: [fwproc] Received Image of size 118548 bytes
17,418,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,490,656 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,563,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,911 >>> mbox cmd response: success
17,895,522 UART: [afmc] ++
17,896,133 UART: [afmc] CDI.KEYID = 6
17,897,040 UART: [afmc] SUBJECT.KEYID = 7
17,898,252 UART: [afmc] AUTHORITY.KEYID = 5
21,213,815 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,532 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,509,754 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,538,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,350 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,906 UART: [afmc] --
23,578,178 UART: [cold-reset] --
23,582,408 UART: [state] Locking Datavault
23,588,242 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,984 UART: [state] Locking ICCM
23,591,691 UART: [exit] Launching FMC @ 0x40000130
23,600,089 UART:
23,600,322 UART: Running Caliptra FMC ...
23,601,415 UART:
23,601,566 UART: [state] CFI Enabled
23,609,668 UART: [fht] FMC Alias Private Key: 7
25,949,261 UART: [art] Extend RT PCRs Done
25,950,495 UART: [art] Lock RT PCRs Done
25,952,114 UART: [art] Populate DV Done
25,957,411 UART: [fht] FMC Alias Private Key: 7
25,958,994 UART: [art] Derive CDI
25,959,798 UART: [art] Store in slot 0x4
26,002,388 UART: [art] Derive Key Pair
26,003,388 UART: [art] Store priv key in slot 0x5
29,245,234 UART: [art] Derive Key Pair - Done
29,258,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,939 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,440 UART: [art] PUB.X = 65327011D82EF6203E0D265F38999D205130E250CCC080D0D091B912358B55EAE6A228900664A7B4D0754D2BDA524B71
31,547,676 UART: [art] PUB.Y = 58F6E57FF62DD03B7830ED65238A07C7B2733DF1CA3A2B8B80A49F595C23A858A2F07347C152DBCE75D012BB639E70CE
31,554,950 UART: [art] SIG.R = F570760087E5DEC5857B5465F9BE9A6413A68C6B47097AAC86356D5196D4974E9537C36EB28C3563A482F347ABEEAFB9
31,562,338 UART: [art] SIG.S = DDC01148ADB3A2F957BA5E198B3EE0912ED39EDCFF82968EFCB09155F5D6B9EB7E7A721D83570DFD48CA2C64CD805DC4
32,867,278 UART: Caliptra RT
32,867,990 UART: [state] CFI Enabled
33,000,643 UART: [rt] RT listening for mailbox commands...
33,002,564 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,032,311 UART: [rt]cmd =0x44504543, len=24
33,059,644 >>> mbox cmd response data (40 bytes)
33,060,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,091,227 UART: [rt]cmd =0x44504543, len=96
33,133,921 >>> mbox cmd response data (56 bytes)
33,134,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,165,264 UART: [rt]cmd =0x44504543, len=96
33,208,684 >>> mbox cmd response data (56 bytes)
33,209,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,240,149 UART: [rt]cmd =0x44504543, len=96
33,284,315 >>> mbox cmd response data (56 bytes)
33,284,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,315,425 UART: [rt]cmd =0x44504543, len=96
33,359,572 >>> mbox cmd response data (56 bytes)
33,360,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,390,641 UART: [rt]cmd =0x44504543, len=96
33,433,927 >>> mbox cmd response data (56 bytes)
33,434,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,465,255 UART: [rt]cmd =0x44504543, len=96
33,509,399 >>> mbox cmd response data (56 bytes)
33,510,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,540,728 UART: [rt]cmd =0x44504543, len=96
33,585,251 >>> mbox cmd response data (56 bytes)
33,585,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,616,401 UART: [rt]cmd =0x44504543, len=96
33,661,625 >>> mbox cmd response data (56 bytes)
33,662,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,692,731 UART: [rt]cmd =0x44504543, len=96
33,738,608 >>> mbox cmd response data (56 bytes)
33,739,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,770,169 UART: [rt]cmd =0x44504543, len=96
33,815,883 >>> mbox cmd response data (56 bytes)
33,816,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,847,090 UART: [rt]cmd =0x44504543, len=96
33,893,184 >>> mbox cmd response data (56 bytes)
33,893,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,924,605 UART: [rt]cmd =0x44504543, len=96
33,970,890 >>> mbox cmd response data (56 bytes)
33,971,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,002,140 UART: [rt]cmd =0x44504543, len=96
34,048,420 >>> mbox cmd response data (56 bytes)
34,049,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,079,514 UART: [rt]cmd =0x44504543, len=96
34,126,337 >>> mbox cmd response data (56 bytes)
34,127,054 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,157,690 UART: [rt]cmd =0x44504543, len=96
34,204,471 >>> mbox cmd response data (56 bytes)
34,205,187 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,235,766 UART: [rt]cmd =0x44504543, len=96
34,242,545 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,525 writing to cptra_bootfsm_go
4,129,509 ready_for_fw is high
4,129,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,146,967 >>> mbox cmd response: success
23,784,914 UART:
23,785,315 UART: Running Caliptra FMC ...
23,786,427 UART:
23,786,578 UART: [state] CFI Enabled
23,794,322 UART: [fht] FMC Alias Private Key: 7
26,134,449 UART: [art] Extend RT PCRs Done
26,135,682 UART: [art] Lock RT PCRs Done
26,137,128 UART: [art] Populate DV Done
26,142,443 UART: [fht] FMC Alias Private Key: 7
26,144,032 UART: [art] Derive CDI
26,144,845 UART: [art] Store in slot 0x4
26,187,498 UART: [art] Derive Key Pair
26,188,539 UART: [art] Store priv key in slot 0x5
29,431,002 UART: [art] Derive Key Pair - Done
29,444,223 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,348 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,859 UART: [art] PUB.X = A139CD2529DC7D32676A08431577B6632FBF122A47B10A6FF2575D611A47073B3B949F13A4DD94FAADB6B27DA6F37902
31,733,111 UART: [art] PUB.Y = 12F26F960F0B5C94A7D9A0100827F55EC9EC5B3920533AD0EF01F2B5B828308BC5FA6FCA609EDA44F97CF341CE8AD3A7
31,740,404 UART: [art] SIG.R = CE328119FD5064D4C7C1C0DD5077E4CBC67FA839DB7C8C54A27890EACEE8190A415AA207C71B28A0E910AB511F6BE4BA
31,747,805 UART: [art] SIG.S = CD25397A32F330EB429237378922E648D0C04C82D7B41C30AE0D38D7C4A6A68D66F6117914A4F5000700CE8849A54092
33,053,272 UART: Caliptra RT
33,053,985 UART: [state] CFI Enabled
33,187,626 UART: [rt] RT listening for mailbox commands...
33,189,571 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,219,700 UART: [rt]cmd =0x44504543, len=24
33,247,702 >>> mbox cmd response data (40 bytes)
33,248,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,279,513 UART: [rt]cmd =0x44504543, len=96
33,321,743 >>> mbox cmd response data (56 bytes)
33,322,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,353,142 UART: [rt]cmd =0x44504543, len=96
33,396,776 >>> mbox cmd response data (56 bytes)
33,397,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,428,186 UART: [rt]cmd =0x44504543, len=96
33,472,202 >>> mbox cmd response data (56 bytes)
33,472,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,503,519 UART: [rt]cmd =0x44504543, len=96
33,546,532 >>> mbox cmd response data (56 bytes)
33,547,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,577,968 UART: [rt]cmd =0x44504543, len=96
33,622,251 >>> mbox cmd response data (56 bytes)
33,622,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,653,603 UART: [rt]cmd =0x44504543, len=96
33,698,310 >>> mbox cmd response data (56 bytes)
33,699,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,729,734 UART: [rt]cmd =0x44504543, len=96
33,774,331 >>> mbox cmd response data (56 bytes)
33,775,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,805,284 UART: [rt]cmd =0x44504543, len=96
33,850,245 >>> mbox cmd response data (56 bytes)
33,850,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,881,510 UART: [rt]cmd =0x44504543, len=96
33,927,065 >>> mbox cmd response data (56 bytes)
33,927,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,958,409 UART: [rt]cmd =0x44504543, len=96
34,004,409 >>> mbox cmd response data (56 bytes)
34,005,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,035,592 UART: [rt]cmd =0x44504543, len=96
34,081,310 >>> mbox cmd response data (56 bytes)
34,082,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,112,545 UART: [rt]cmd =0x44504543, len=96
34,158,738 >>> mbox cmd response data (56 bytes)
34,159,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,189,903 UART: [rt]cmd =0x44504543, len=96
34,236,154 >>> mbox cmd response data (56 bytes)
34,236,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,267,324 UART: [rt]cmd =0x44504543, len=96
34,313,528 >>> mbox cmd response data (56 bytes)
34,314,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,344,595 UART: [rt]cmd =0x44504543, len=96
34,391,606 >>> mbox cmd response data (56 bytes)
34,392,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,422,791 UART: [rt]cmd =0x44504543, len=96
34,429,490 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,108 UART:
192,472 UART: Running Caliptra ROM ...
193,616 UART:
193,762 UART: [state] CFI Enabled
263,057 UART: [state] LifecycleState = Unprovisioned
265,091 UART: [state] DebugLocked = No
266,277 UART: [state] WD Timer not started. Device not locked for debugging
269,891 UART: [kat] SHA2-256
449,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,373 UART: [kat] ++
460,896 UART: [kat] sha1
471,656 UART: [kat] SHA2-256
474,367 UART: [kat] SHA2-384
479,710 UART: [kat] SHA2-512-ACC
482,077 UART: [kat] ECC-384
2,947,959 UART: [kat] HMAC-384Kdf
2,971,698 UART: [kat] LMS
3,448,180 UART: [kat] --
3,453,691 UART: [cold-reset] ++
3,455,622 UART: [fht] FHT @ 0x50003400
3,467,465 UART: [idev] ++
3,468,074 UART: [idev] CDI.KEYID = 6
3,468,994 UART: [idev] SUBJECT.KEYID = 7
3,470,237 UART: [idev] UDS.KEYID = 0
3,471,280 ready_for_fw is high
3,471,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,434 UART: [idev] Erasing UDS.KEYID = 0
5,986,375 UART: [idev] Sha1 KeyId Algorithm
6,009,555 UART: [idev] --
6,015,648 UART: [ldev] ++
6,016,216 UART: [ldev] CDI.KEYID = 6
6,017,180 UART: [ldev] SUBJECT.KEYID = 5
6,018,337 UART: [ldev] AUTHORITY.KEYID = 7
6,019,617 UART: [ldev] FE.KEYID = 1
6,058,790 UART: [ldev] Erasing FE.KEYID = 1
8,568,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,716 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,660 UART: [ldev] --
10,375,357 UART: [fwproc] Wait for Commands...
10,377,550 UART: [fwproc] Recv command 0x46574c44
10,379,610 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,352,782 >>> mbox cmd response: success
14,357,729 UART: [afmc] ++
14,358,338 UART: [afmc] CDI.KEYID = 6
14,359,221 UART: [afmc] SUBJECT.KEYID = 7
14,360,488 UART: [afmc] AUTHORITY.KEYID = 5
16,901,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,040 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,219 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,047 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,090 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,660 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,714,650 UART: [afmc] --
18,718,149 UART: [cold-reset] --
18,721,520 UART: [state] Locking Datavault
18,726,003 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,762 UART: [state] Locking ICCM
18,729,858 UART: [exit] Launching FMC @ 0x40000130
18,738,248 UART:
18,738,475 UART: Running Caliptra FMC ...
18,739,570 UART:
18,739,727 UART: [state] CFI Enabled
18,798,836 UART: [fht] FMC Alias Private Key: 7
20,564,634 UART: [art] Extend RT PCRs Done
20,565,856 UART: [art] Lock RT PCRs Done
20,567,505 UART: [art] Populate DV Done
20,573,075 UART: [fht] FMC Alias Private Key: 7
20,574,729 UART: [art] Derive CDI
20,575,542 UART: [art] Store in slot 0x4
20,632,116 UART: [art] Derive Key Pair
20,633,156 UART: [art] Store priv key in slot 0x5
23,095,660 UART: [art] Derive Key Pair - Done
23,108,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,489 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,119 UART: [art] PUB.X = 6CEF2B8DF71999D7E7C2F058C164364C7670849DD9C828B297C917432A5B5D6F20A9515E2155F8E97E58C1E3710F29E6
24,831,276 UART: [art] PUB.Y = 91C7A3D02FDEF79D9F57F842CCD78055428E1C450935976454689BEAE9CA51BFF1D6EAA27155DD94A49082FDBBFDB47B
24,838,562 UART: [art] SIG.R = 0EF64BBE9CB2F1525B55B4CA11743EBB86A937DFCDF63F6F90E654FE9E0845B0267974CBE819E0ED0E24B661F7ECE75E
24,845,945 UART: [art] SIG.S = 6F2A8E2FE0A78C93FB2E94E6BFDB515A91C93E6B5D7CFF107F54CB72BCF16BD2C8D5258D90A1FC9406767AC992755B26
25,824,821 UART: Caliptra RT
25,825,539 UART: [state] CFI Enabled
26,005,560 UART: [rt] RT listening for mailbox commands...
26,007,502 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,037,274 UART: [rt]cmd =0x44504543, len=24
26,066,254 >>> mbox cmd response data (40 bytes)
26,067,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,098,001 UART: [rt]cmd =0x44504543, len=96
26,157,956 >>> mbox cmd response data (56 bytes)
26,158,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,189,054 UART: [rt]cmd =0x44504543, len=96
26,264,359 >>> mbox cmd response data (56 bytes)
26,265,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,295,596 UART: [rt]cmd =0x44504543, len=96
26,371,437 >>> mbox cmd response data (56 bytes)
26,372,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,402,810 UART: [rt]cmd =0x44504543, len=96
26,478,099 >>> mbox cmd response data (56 bytes)
26,478,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,509,371 UART: [rt]cmd =0x44504543, len=96
26,585,169 >>> mbox cmd response data (56 bytes)
26,585,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,616,254 UART: [rt]cmd =0x44504543, len=96
26,691,290 >>> mbox cmd response data (56 bytes)
26,692,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,722,381 UART: [rt]cmd =0x44504543, len=96
26,798,200 >>> mbox cmd response data (56 bytes)
26,798,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,829,511 UART: [rt]cmd =0x44504543, len=96
26,904,972 >>> mbox cmd response data (56 bytes)
26,905,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,936,109 UART: [rt]cmd =0x44504543, len=96
27,012,039 >>> mbox cmd response data (56 bytes)
27,012,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,043,408 UART: [rt]cmd =0x44504543, len=96
27,118,288 >>> mbox cmd response data (56 bytes)
27,119,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,149,553 UART: [rt]cmd =0x44504543, len=96
27,225,664 >>> mbox cmd response data (56 bytes)
27,226,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,256,661 UART: [rt]cmd =0x44504543, len=96
27,332,369 >>> mbox cmd response data (56 bytes)
27,333,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,363,731 UART: [rt]cmd =0x44504543, len=96
27,439,445 >>> mbox cmd response data (56 bytes)
27,440,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,470,726 UART: [rt]cmd =0x44504543, len=96
27,546,144 >>> mbox cmd response data (56 bytes)
27,546,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,577,499 UART: [rt]cmd =0x44504543, len=96
27,652,416 >>> mbox cmd response data (56 bytes)
27,653,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,683,770 UART: [rt]cmd =0x44504543, len=96
27,690,602 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,460,700 ready_for_fw is high
3,461,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,487 >>> mbox cmd response: success
18,538,286 UART:
18,538,680 UART: Running Caliptra FMC ...
18,539,811 UART:
18,539,971 UART: [state] CFI Enabled
18,604,246 UART: [fht] FMC Alias Private Key: 7
20,370,897 UART: [art] Extend RT PCRs Done
20,372,127 UART: [art] Lock RT PCRs Done
20,373,534 UART: [art] Populate DV Done
20,378,738 UART: [fht] FMC Alias Private Key: 7
20,380,438 UART: [art] Derive CDI
20,381,250 UART: [art] Store in slot 0x4
20,438,018 UART: [art] Derive Key Pair
20,439,025 UART: [art] Store priv key in slot 0x5
22,902,481 UART: [art] Derive Key Pair - Done
22,915,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,120 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,626 UART: [art] PUB.X = 0A5E4B7175DEE225C26FA3084FD2CBB599DAB5069ABE808F8C8C0918D26813CC9640C701E05F6541C92D74CD969B0C8A
24,636,883 UART: [art] PUB.Y = CB069E5E83F292B24E0D0A9CC7CC6C4154A0DEE98D8024359D3FDF3D6D9A16DAB8812EB63D83CAF3B53BCCCFADD41FFC
24,644,193 UART: [art] SIG.R = FB8CFD727D066DEF4F539333B8343A88766992AF3CE7AAB2CF0BBD9DBD70B866E18B199C7BC5C954746117C1DCEA756E
24,651,597 UART: [art] SIG.S = DCE819A3F0325FFECE9C2877299A29E7A0B664290E12B7C41D2CC6931B49884219B88A27C72E83D846B9BA1CEAC335D1
25,630,762 UART: Caliptra RT
25,631,480 UART: [state] CFI Enabled
25,812,499 UART: [rt] RT listening for mailbox commands...
25,814,419 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,844,170 UART: [rt]cmd =0x44504543, len=24
25,872,196 >>> mbox cmd response data (40 bytes)
25,873,296 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,903,821 UART: [rt]cmd =0x44504543, len=96
25,964,500 >>> mbox cmd response data (56 bytes)
25,965,281 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,995,866 UART: [rt]cmd =0x44504543, len=96
26,071,082 >>> mbox cmd response data (56 bytes)
26,071,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,102,289 UART: [rt]cmd =0x44504543, len=96
26,178,164 >>> mbox cmd response data (56 bytes)
26,178,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,209,321 UART: [rt]cmd =0x44504543, len=96
26,285,045 >>> mbox cmd response data (56 bytes)
26,285,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,316,166 UART: [rt]cmd =0x44504543, len=96
26,391,959 >>> mbox cmd response data (56 bytes)
26,392,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,423,111 UART: [rt]cmd =0x44504543, len=96
26,498,644 >>> mbox cmd response data (56 bytes)
26,499,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,011 UART: [rt]cmd =0x44504543, len=96
26,605,397 >>> mbox cmd response data (56 bytes)
26,606,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,636,717 UART: [rt]cmd =0x44504543, len=96
26,711,839 >>> mbox cmd response data (56 bytes)
26,712,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,743,261 UART: [rt]cmd =0x44504543, len=96
26,819,255 >>> mbox cmd response data (56 bytes)
26,819,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,850,772 UART: [rt]cmd =0x44504543, len=96
26,926,237 >>> mbox cmd response data (56 bytes)
26,926,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,957,695 UART: [rt]cmd =0x44504543, len=96
27,032,545 >>> mbox cmd response data (56 bytes)
27,033,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,063,645 UART: [rt]cmd =0x44504543, len=96
27,139,392 >>> mbox cmd response data (56 bytes)
27,140,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,170,661 UART: [rt]cmd =0x44504543, len=96
27,245,698 >>> mbox cmd response data (56 bytes)
27,246,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,276,824 UART: [rt]cmd =0x44504543, len=96
27,352,275 >>> mbox cmd response data (56 bytes)
27,352,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,383,563 UART: [rt]cmd =0x44504543, len=96
27,459,025 >>> mbox cmd response data (56 bytes)
27,459,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,490,067 UART: [rt]cmd =0x44504543, len=96
27,496,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,342 UART:
192,697 UART: Running Caliptra ROM ...
193,788 UART:
603,502 UART: [state] CFI Enabled
620,108 UART: [state] LifecycleState = Unprovisioned
622,000 UART: [state] DebugLocked = No
623,682 UART: [state] WD Timer not started. Device not locked for debugging
627,508 UART: [kat] SHA2-256
807,196 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,008 UART: [kat] ++
818,497 UART: [kat] sha1
830,342 UART: [kat] SHA2-256
833,079 UART: [kat] SHA2-384
839,929 UART: [kat] SHA2-512-ACC
842,251 UART: [kat] ECC-384
3,282,747 UART: [kat] HMAC-384Kdf
3,294,993 UART: [kat] LMS
3,771,473 UART: [kat] --
3,776,672 UART: [cold-reset] ++
3,778,461 UART: [fht] FHT @ 0x50003400
3,790,081 UART: [idev] ++
3,790,658 UART: [idev] CDI.KEYID = 6
3,791,691 UART: [idev] SUBJECT.KEYID = 7
3,792,873 UART: [idev] UDS.KEYID = 0
3,793,796 ready_for_fw is high
3,793,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,849 UART: [idev] Erasing UDS.KEYID = 0
6,271,077 UART: [idev] Sha1 KeyId Algorithm
6,294,358 UART: [idev] --
6,299,865 UART: [ldev] ++
6,300,457 UART: [ldev] CDI.KEYID = 6
6,301,371 UART: [ldev] SUBJECT.KEYID = 5
6,302,532 UART: [ldev] AUTHORITY.KEYID = 7
6,303,819 UART: [ldev] FE.KEYID = 1
6,315,109 UART: [ldev] Erasing FE.KEYID = 1
8,795,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,353 UART: [ldev] --
10,588,630 UART: [fwproc] Wait for Commands...
10,590,993 UART: [fwproc] Recv command 0x46574c44
10,592,979 UART: [fwproc] Recv'd Img size: 118548 bytes
14,075,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,750 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,780 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,165 >>> mbox cmd response: success
14,556,704 UART: [afmc] ++
14,557,312 UART: [afmc] CDI.KEYID = 6
14,558,283 UART: [afmc] SUBJECT.KEYID = 7
14,559,444 UART: [afmc] AUTHORITY.KEYID = 5
17,067,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,791,015 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,822 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,452 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,614 UART: [afmc] --
18,867,180 UART: [cold-reset] --
18,871,910 UART: [state] Locking Datavault
18,878,343 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,117 UART: [state] Locking ICCM
18,881,920 UART: [exit] Launching FMC @ 0x40000130
18,890,323 UART:
18,890,609 UART: Running Caliptra FMC ...
18,891,724 UART:
18,891,885 UART: [state] CFI Enabled
18,900,104 UART: [fht] FMC Alias Private Key: 7
20,666,322 UART: [art] Extend RT PCRs Done
20,667,547 UART: [art] Lock RT PCRs Done
20,669,335 UART: [art] Populate DV Done
20,674,809 UART: [fht] FMC Alias Private Key: 7
20,676,563 UART: [art] Derive CDI
20,677,387 UART: [art] Store in slot 0x4
20,720,069 UART: [art] Derive Key Pair
20,721,071 UART: [art] Store priv key in slot 0x5
23,148,249 UART: [art] Derive Key Pair - Done
23,161,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,832 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,338 UART: [art] PUB.X = 54C79643DF6DA2F404ED214308F4367DA856257E71E8CE69366BAC54B4322DD3195BA5CB29A804374FE792CC445A8188
24,876,580 UART: [art] PUB.Y = A394DA53AB663F12ECEA18D19E83680E273924661D1C6DF8816F094A7AEA39872660224E44611C7A86FBD7867EEC14AA
24,883,865 UART: [art] SIG.R = 428001F9BAAAF076D9BDD6CB150573281DC684672922379A908DE933A06C67B0D577CE4BAC477C578016BFBC45F8741D
24,891,255 UART: [art] SIG.S = 5CCBF2C944FF85F8A56E5CD797B7D772B41D9678BC6699D6F41A781411D9951B573F8912648EBE5FC962E4F6EB1851D4
25,869,873 UART: Caliptra RT
25,870,580 UART: [state] CFI Enabled
26,004,326 UART: [rt] RT listening for mailbox commands...
26,006,355 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,036,315 UART: [rt]cmd =0x44504543, len=24
26,063,647 >>> mbox cmd response data (40 bytes)
26,064,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,095,086 UART: [rt]cmd =0x44504543, len=96
26,138,495 >>> mbox cmd response data (56 bytes)
26,139,221 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,169,841 UART: [rt]cmd =0x44504543, len=96
26,213,179 >>> mbox cmd response data (56 bytes)
26,213,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,244,427 UART: [rt]cmd =0x44504543, len=96
26,288,195 >>> mbox cmd response data (56 bytes)
26,288,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,319,585 UART: [rt]cmd =0x44504543, len=96
26,363,589 >>> mbox cmd response data (56 bytes)
26,364,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,394,852 UART: [rt]cmd =0x44504543, len=96
26,438,918 >>> mbox cmd response data (56 bytes)
26,439,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,470,400 UART: [rt]cmd =0x44504543, len=96
26,515,221 >>> mbox cmd response data (56 bytes)
26,515,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,546,493 UART: [rt]cmd =0x44504543, len=96
26,592,412 >>> mbox cmd response data (56 bytes)
26,593,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,623,410 UART: [rt]cmd =0x44504543, len=96
26,668,426 >>> mbox cmd response data (56 bytes)
26,669,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,699,832 UART: [rt]cmd =0x44504543, len=96
26,744,927 >>> mbox cmd response data (56 bytes)
26,745,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,776,130 UART: [rt]cmd =0x44504543, len=96
26,821,170 >>> mbox cmd response data (56 bytes)
26,821,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,852,372 UART: [rt]cmd =0x44504543, len=96
26,898,984 >>> mbox cmd response data (56 bytes)
26,899,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,930,292 UART: [rt]cmd =0x44504543, len=96
26,976,907 >>> mbox cmd response data (56 bytes)
26,977,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,008,177 UART: [rt]cmd =0x44504543, len=96
27,054,740 >>> mbox cmd response data (56 bytes)
27,055,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,085,947 UART: [rt]cmd =0x44504543, len=96
27,133,421 >>> mbox cmd response data (56 bytes)
27,134,140 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,164,725 UART: [rt]cmd =0x44504543, len=96
27,211,377 >>> mbox cmd response data (56 bytes)
27,212,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,242,309 UART: [rt]cmd =0x44504543, len=96
27,249,040 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,824 writing to cptra_bootfsm_go
3,778,772 ready_for_fw is high
3,779,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,194 >>> mbox cmd response: success
18,690,440 UART:
18,690,822 UART: Running Caliptra FMC ...
18,691,946 UART:
18,692,103 UART: [state] CFI Enabled
18,700,163 UART: [fht] FMC Alias Private Key: 7
20,466,739 UART: [art] Extend RT PCRs Done
20,467,959 UART: [art] Lock RT PCRs Done
20,469,668 UART: [art] Populate DV Done
20,475,136 UART: [fht] FMC Alias Private Key: 7
20,476,622 UART: [art] Derive CDI
20,477,388 UART: [art] Store in slot 0x4
20,520,361 UART: [art] Derive Key Pair
20,521,406 UART: [art] Store priv key in slot 0x5
22,947,748 UART: [art] Derive Key Pair - Done
22,960,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,259 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,752 UART: [art] PUB.X = 9C02879316E31FD4FECB8D9E232B9B6C1B771284FFC1AF751A1AB39E12A8773D467CEDF2E165095C5A8A8B008881E5EF
24,676,013 UART: [art] PUB.Y = 35EFF5FDAA9724FD5EE34EC86943E77DAD41635BEE34FA729B84149FB122006B86F27C06E93092E20BB0D312D17144F2
24,683,287 UART: [art] SIG.R = 580C0656663C0EB714A77DC65FD0C8200F79EC26CE9594E234D8F278CDB9C0D5762D95338C7C1B4BD854DB3DCBE87A54
24,690,682 UART: [art] SIG.S = C48B8886F84973309A7035C759ECF9CBF99A1077AAD89F699E2C8EFDB14AA4FA81194338615715BEE31A386018BF5BD9
25,669,810 UART: Caliptra RT
25,670,532 UART: [state] CFI Enabled
25,803,324 UART: [rt] RT listening for mailbox commands...
25,805,246 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,835,163 UART: [rt]cmd =0x44504543, len=24
25,862,972 >>> mbox cmd response data (40 bytes)
25,864,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,894,700 UART: [rt]cmd =0x44504543, len=96
25,937,660 >>> mbox cmd response data (56 bytes)
25,938,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,968,902 UART: [rt]cmd =0x44504543, len=96
26,012,322 >>> mbox cmd response data (56 bytes)
26,013,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,043,644 UART: [rt]cmd =0x44504543, len=96
26,087,504 >>> mbox cmd response data (56 bytes)
26,088,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,118,805 UART: [rt]cmd =0x44504543, len=96
26,163,247 >>> mbox cmd response data (56 bytes)
26,163,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,194,508 UART: [rt]cmd =0x44504543, len=96
26,238,999 >>> mbox cmd response data (56 bytes)
26,239,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,270,211 UART: [rt]cmd =0x44504543, len=96
26,314,269 >>> mbox cmd response data (56 bytes)
26,314,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,345,525 UART: [rt]cmd =0x44504543, len=96
26,390,161 >>> mbox cmd response data (56 bytes)
26,390,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,421,182 UART: [rt]cmd =0x44504543, len=96
26,466,034 >>> mbox cmd response data (56 bytes)
26,466,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,497,224 UART: [rt]cmd =0x44504543, len=96
26,543,314 >>> mbox cmd response data (56 bytes)
26,544,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,574,364 UART: [rt]cmd =0x44504543, len=96
26,619,857 >>> mbox cmd response data (56 bytes)
26,620,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,651,088 UART: [rt]cmd =0x44504543, len=96
26,697,347 >>> mbox cmd response data (56 bytes)
26,698,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,728,805 UART: [rt]cmd =0x44504543, len=96
26,775,699 >>> mbox cmd response data (56 bytes)
26,776,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,806,821 UART: [rt]cmd =0x44504543, len=96
26,853,181 >>> mbox cmd response data (56 bytes)
26,853,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,884,571 UART: [rt]cmd =0x44504543, len=96
26,931,201 >>> mbox cmd response data (56 bytes)
26,931,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,962,338 UART: [rt]cmd =0x44504543, len=96
27,009,078 >>> mbox cmd response data (56 bytes)
27,009,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,040,315 UART: [rt]cmd =0x44504543, len=96
27,047,465 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,047 UART:
192,439 UART: Running Caliptra ROM ...
193,641 UART:
193,796 UART: [state] CFI Enabled
264,288 UART: [state] LifecycleState = Unprovisioned
266,685 UART: [state] DebugLocked = No
268,497 UART: [state] WD Timer not started. Device not locked for debugging
273,675 UART: [kat] SHA2-256
463,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,259 UART: [kat] ++
474,738 UART: [kat] sha1
486,671 UART: [kat] SHA2-256
489,683 UART: [kat] SHA2-384
496,520 UART: [kat] SHA2-512-ACC
499,099 UART: [kat] ECC-384
2,951,346 UART: [kat] HMAC-384Kdf
2,973,532 UART: [kat] LMS
3,505,301 UART: [kat] --
3,510,513 UART: [cold-reset] ++
3,512,019 UART: [fht] FHT @ 0x50003400
3,523,359 UART: [idev] ++
3,524,068 UART: [idev] CDI.KEYID = 6
3,524,949 UART: [idev] SUBJECT.KEYID = 7
3,526,188 UART: [idev] UDS.KEYID = 0
3,527,088 ready_for_fw is high
3,527,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,415 UART: [idev] Erasing UDS.KEYID = 0
6,026,093 UART: [idev] Sha1 KeyId Algorithm
6,048,904 UART: [idev] --
6,054,580 UART: [ldev] ++
6,055,323 UART: [ldev] CDI.KEYID = 6
6,056,215 UART: [ldev] SUBJECT.KEYID = 5
6,057,376 UART: [ldev] AUTHORITY.KEYID = 7
6,058,623 UART: [ldev] FE.KEYID = 1
6,100,659 UART: [ldev] Erasing FE.KEYID = 1
8,607,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,784 UART: [ldev] --
10,412,612 UART: [fwproc] Wait for Commands...
10,415,832 UART: [fwproc] Recv command 0x46574c44
10,418,135 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,947 >>> mbox cmd response: success
14,687,031 UART: [afmc] ++
14,687,773 UART: [afmc] CDI.KEYID = 6
14,688,887 UART: [afmc] SUBJECT.KEYID = 7
14,690,436 UART: [afmc] AUTHORITY.KEYID = 5
17,235,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,157 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,421 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,306 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,691 UART: [afmc] --
19,033,657 UART: [cold-reset] --
19,039,140 UART: [state] Locking Datavault
19,044,176 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,323 UART: [state] Locking ICCM
19,049,285 UART: [exit] Launching FMC @ 0x40000130
19,057,954 UART:
19,058,205 UART: Running Caliptra FMC ...
19,059,305 UART:
19,059,464 UART: [state] CFI Enabled
19,115,622 UART: [fht] FMC Alias Private Key: 7
20,881,647 UART: [art] Extend RT PCRs Done
20,882,873 UART: [art] Lock RT PCRs Done
20,884,366 UART: [art] Populate DV Done
20,889,771 UART: [fht] FMC Alias Private Key: 7
20,891,473 UART: [art] Derive CDI
20,892,283 UART: [art] Store in slot 0x4
20,948,793 UART: [art] Derive Key Pair
20,949,830 UART: [art] Store priv key in slot 0x5
23,412,930 UART: [art] Derive Key Pair - Done
23,425,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,745 UART: [art] PUB.X = FC40F632E028F93C81FABD6CDFEB79ED54211A8B5A50FD9E19BD8CDEC19EEB3E6749D81D6EBFDEA27923926072EF933B
25,147,050 UART: [art] PUB.Y = 1796B585D6D33FA3B1517393C1331218012B9E47DDBFA527ACBAECDB6ABBD5B225C0AC658E83737F2189DFA14F568707
25,154,265 UART: [art] SIG.R = ADAD315C016491B6D7899390CEA434C0908706E68C9C832799CCDD063AE9CB2B1972A135BD4C5EF4F0C31F33C95C8AEB
25,161,671 UART: [art] SIG.S = 8A034ADB5039AF4616F9BBBC039B76B1B17A6CB9DC9FE0C7B12BEADDF1E5A3513F8E14D72A9DD00B8F93D4732DE9308A
26,140,422 UART: Caliptra RT
26,141,128 UART: [state] CFI Enabled
26,322,236 UART: [rt] RT listening for mailbox commands...
26,324,162 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,354,124 UART: [rt]cmd =0x44504543, len=24
26,382,767 >>> mbox cmd response data (40 bytes)
26,384,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,414,665 UART: [rt]cmd =0x44504543, len=96
26,474,247 >>> mbox cmd response data (56 bytes)
26,475,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,505,716 UART: [rt]cmd =0x44504543, len=96
26,581,024 >>> mbox cmd response data (56 bytes)
26,581,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,611,994 UART: [rt]cmd =0x44504543, len=96
26,688,208 >>> mbox cmd response data (56 bytes)
26,688,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,719,350 UART: [rt]cmd =0x44504543, len=96
26,795,053 >>> mbox cmd response data (56 bytes)
26,795,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,826,246 UART: [rt]cmd =0x44504543, len=96
26,901,767 >>> mbox cmd response data (56 bytes)
26,902,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,932,993 UART: [rt]cmd =0x44504543, len=96
27,008,458 >>> mbox cmd response data (56 bytes)
27,009,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,039,772 UART: [rt]cmd =0x44504543, len=96
27,115,546 >>> mbox cmd response data (56 bytes)
27,116,268 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,146,862 UART: [rt]cmd =0x44504543, len=96
27,222,294 >>> mbox cmd response data (56 bytes)
27,222,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,253,468 UART: [rt]cmd =0x44504543, len=96
27,329,358 >>> mbox cmd response data (56 bytes)
27,330,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,360,665 UART: [rt]cmd =0x44504543, len=96
27,436,702 >>> mbox cmd response data (56 bytes)
27,437,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,467,941 UART: [rt]cmd =0x44504543, len=96
27,543,414 >>> mbox cmd response data (56 bytes)
27,544,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,574,779 UART: [rt]cmd =0x44504543, len=96
27,650,165 >>> mbox cmd response data (56 bytes)
27,650,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,681,419 UART: [rt]cmd =0x44504543, len=96
27,757,450 >>> mbox cmd response data (56 bytes)
27,758,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,788,713 UART: [rt]cmd =0x44504543, len=96
27,863,908 >>> mbox cmd response data (56 bytes)
27,864,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,895,019 UART: [rt]cmd =0x44504543, len=96
27,971,293 >>> mbox cmd response data (56 bytes)
27,972,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,002,591 UART: [rt]cmd =0x44504543, len=96
28,009,649 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,436,436 ready_for_fw is high
3,437,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,817,600 >>> mbox cmd response: success
19,112,385 UART:
19,112,771 UART: Running Caliptra FMC ...
19,113,966 UART:
19,114,136 UART: [state] CFI Enabled
19,178,407 UART: [fht] FMC Alias Private Key: 7
20,944,322 UART: [art] Extend RT PCRs Done
20,945,559 UART: [art] Lock RT PCRs Done
20,947,069 UART: [art] Populate DV Done
20,952,390 UART: [fht] FMC Alias Private Key: 7
20,953,931 UART: [art] Derive CDI
20,954,671 UART: [art] Store in slot 0x4
21,011,068 UART: [art] Derive Key Pair
21,012,119 UART: [art] Store priv key in slot 0x5
23,474,506 UART: [art] Derive Key Pair - Done
23,487,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,244 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,745 UART: [art] PUB.X = 406D303845A0FE49855C95280ECFBF9ADD1D608055F24F5D1CD9F85049680A3C889F6F9C84C9A939E9F90A23A040BBE9
25,209,032 UART: [art] PUB.Y = 7D1ED4CACB70AF00F633F311B45F5594AFCEC002A06BF03465DBF45EE01BB35691334CFB36B709C5AFA7630211E271C7
25,216,256 UART: [art] SIG.R = ADF17BE8662D3FC64C5C36989B5632B5769C20B8FE7119A1886FFFD11A0CAE2E7FC04E3C59D305F3F6FF8FC903C859AE
25,223,635 UART: [art] SIG.S = F9B3753B1BF4097C8F55A8FA5A0A96DCECD0018EED644BDF576BCACBFE03BC61F47B48BEFF0C503344C731CE24D50788
26,202,133 UART: Caliptra RT
26,202,822 UART: [state] CFI Enabled
26,382,470 UART: [rt] RT listening for mailbox commands...
26,384,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,414,593 UART: [rt]cmd =0x44504543, len=24
26,443,098 >>> mbox cmd response data (40 bytes)
26,444,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,475,093 UART: [rt]cmd =0x44504543, len=96
26,535,892 >>> mbox cmd response data (56 bytes)
26,536,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,567,352 UART: [rt]cmd =0x44504543, len=96
26,642,421 >>> mbox cmd response data (56 bytes)
26,643,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,673,749 UART: [rt]cmd =0x44504543, len=96
26,749,584 >>> mbox cmd response data (56 bytes)
26,750,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,780,959 UART: [rt]cmd =0x44504543, len=96
26,855,771 >>> mbox cmd response data (56 bytes)
26,856,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,887,248 UART: [rt]cmd =0x44504543, len=96
26,963,138 >>> mbox cmd response data (56 bytes)
26,963,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,994,347 UART: [rt]cmd =0x44504543, len=96
27,070,175 >>> mbox cmd response data (56 bytes)
27,070,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,101,608 UART: [rt]cmd =0x44504543, len=96
27,176,759 >>> mbox cmd response data (56 bytes)
27,177,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,207,962 UART: [rt]cmd =0x44504543, len=96
27,283,574 >>> mbox cmd response data (56 bytes)
27,284,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,315,048 UART: [rt]cmd =0x44504543, len=96
27,390,726 >>> mbox cmd response data (56 bytes)
27,391,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,422,246 UART: [rt]cmd =0x44504543, len=96
27,497,160 >>> mbox cmd response data (56 bytes)
27,497,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,528,599 UART: [rt]cmd =0x44504543, len=96
27,604,215 >>> mbox cmd response data (56 bytes)
27,604,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,635,408 UART: [rt]cmd =0x44504543, len=96
27,710,798 >>> mbox cmd response data (56 bytes)
27,711,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,742,023 UART: [rt]cmd =0x44504543, len=96
27,817,595 >>> mbox cmd response data (56 bytes)
27,818,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,848,688 UART: [rt]cmd =0x44504543, len=96
27,924,574 >>> mbox cmd response data (56 bytes)
27,925,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,955,988 UART: [rt]cmd =0x44504543, len=96
28,031,176 >>> mbox cmd response data (56 bytes)
28,031,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,062,375 UART: [rt]cmd =0x44504543, len=96
28,069,084 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
192,388 UART:
192,743 UART: Running Caliptra ROM ...
193,932 UART:
603,525 UART: [state] CFI Enabled
616,204 UART: [state] LifecycleState = Unprovisioned
618,593 UART: [state] DebugLocked = No
620,269 UART: [state] WD Timer not started. Device not locked for debugging
625,309 UART: [kat] SHA2-256
815,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,984 UART: [kat] ++
826,592 UART: [kat] sha1
837,970 UART: [kat] SHA2-256
841,046 UART: [kat] SHA2-384
847,399 UART: [kat] SHA2-512-ACC
849,939 UART: [kat] ECC-384
3,296,184 UART: [kat] HMAC-384Kdf
3,308,846 UART: [kat] LMS
3,840,658 UART: [kat] --
3,846,740 UART: [cold-reset] ++
3,848,757 UART: [fht] FHT @ 0x50003400
3,861,303 UART: [idev] ++
3,861,942 UART: [idev] CDI.KEYID = 6
3,862,927 UART: [idev] SUBJECT.KEYID = 7
3,864,107 UART: [idev] UDS.KEYID = 0
3,865,035 ready_for_fw is high
3,865,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,089 UART: [idev] Erasing UDS.KEYID = 0
6,339,078 UART: [idev] Sha1 KeyId Algorithm
6,362,311 UART: [idev] --
6,366,094 UART: [ldev] ++
6,366,799 UART: [ldev] CDI.KEYID = 6
6,367,715 UART: [ldev] SUBJECT.KEYID = 5
6,368,877 UART: [ldev] AUTHORITY.KEYID = 7
6,370,110 UART: [ldev] FE.KEYID = 1
6,381,565 UART: [ldev] Erasing FE.KEYID = 1
8,856,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,224 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,397 UART: [ldev] --
10,649,360 UART: [fwproc] Wait for Commands...
10,651,994 UART: [fwproc] Recv command 0x46574c44
10,654,301 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,460 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,925,135 >>> mbox cmd response: success
14,928,878 UART: [afmc] ++
14,929,612 UART: [afmc] CDI.KEYID = 6
14,930,810 UART: [afmc] SUBJECT.KEYID = 7
14,932,260 UART: [afmc] AUTHORITY.KEYID = 5
17,436,785 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,160,235 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,162,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,177,273 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,192,458 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,207,341 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,230,133 UART: [afmc] --
19,233,622 UART: [cold-reset] --
19,235,442 UART: [state] Locking Datavault
19,241,145 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,326 UART: [state] Locking ICCM
19,245,199 UART: [exit] Launching FMC @ 0x40000130
19,253,841 UART:
19,254,082 UART: Running Caliptra FMC ...
19,255,191 UART:
19,255,352 UART: [state] CFI Enabled
19,263,570 UART: [fht] FMC Alias Private Key: 7
21,029,932 UART: [art] Extend RT PCRs Done
21,031,157 UART: [art] Lock RT PCRs Done
21,032,977 UART: [art] Populate DV Done
21,038,192 UART: [fht] FMC Alias Private Key: 7
21,039,901 UART: [art] Derive CDI
21,040,718 UART: [art] Store in slot 0x4
21,083,319 UART: [art] Derive Key Pair
21,084,327 UART: [art] Store priv key in slot 0x5
23,511,302 UART: [art] Derive Key Pair - Done
23,524,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,230,829 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,346 UART: [art] PUB.X = E8C96F97F66ED4C52D9AAB802E924CCCCD97FD8B2E504C2EC7BF970943501999B61CCC19DFEFB611DBE09F55A9C0298B
25,239,623 UART: [art] PUB.Y = 8B6B8A2316F583D38C274305264CD4167689837DD4923A283DCC1639DB3FFAC28768EA3DC7E75F92FDE90868B7642C73
25,246,886 UART: [art] SIG.R = 00ED2CE3071D5AB92EC707AC5C1866711B726F80FB48400E06EA4648CBD359013C876D10F06F9CC3F05479B4240CA5EB
25,254,258 UART: [art] SIG.S = 471DF335CD10B92D5DBA05451C28488DB32E77237EF8CFF0EBFDD6FA293865C077BA4B220E12796C9A40EF8E73888C89
26,233,451 UART: Caliptra RT
26,234,147 UART: [state] CFI Enabled
26,367,267 UART: [rt] RT listening for mailbox commands...
26,369,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,399,359 UART: [rt]cmd =0x44504543, len=24
26,427,045 >>> mbox cmd response data (40 bytes)
26,428,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,727 UART: [rt]cmd =0x44504543, len=96
26,501,256 >>> mbox cmd response data (56 bytes)
26,502,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,703 UART: [rt]cmd =0x44504543, len=96
26,575,858 >>> mbox cmd response data (56 bytes)
26,576,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,607,024 UART: [rt]cmd =0x44504543, len=96
26,649,895 >>> mbox cmd response data (56 bytes)
26,650,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,681,086 UART: [rt]cmd =0x44504543, len=96
26,725,608 >>> mbox cmd response data (56 bytes)
26,726,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,756,973 UART: [rt]cmd =0x44504543, len=96
26,800,138 >>> mbox cmd response data (56 bytes)
26,800,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,831,520 UART: [rt]cmd =0x44504543, len=96
26,876,011 >>> mbox cmd response data (56 bytes)
26,876,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,907,176 UART: [rt]cmd =0x44504543, len=96
26,951,471 >>> mbox cmd response data (56 bytes)
26,952,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,982,849 UART: [rt]cmd =0x44504543, len=96
27,027,893 >>> mbox cmd response data (56 bytes)
27,028,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,058,812 UART: [rt]cmd =0x44504543, len=96
27,103,514 >>> mbox cmd response data (56 bytes)
27,104,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,134,651 UART: [rt]cmd =0x44504543, len=96
27,180,094 >>> mbox cmd response data (56 bytes)
27,180,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,211,346 UART: [rt]cmd =0x44504543, len=96
27,257,549 >>> mbox cmd response data (56 bytes)
27,258,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,288,461 UART: [rt]cmd =0x44504543, len=96
27,334,823 >>> mbox cmd response data (56 bytes)
27,335,534 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,366,168 UART: [rt]cmd =0x44504543, len=96
27,412,924 >>> mbox cmd response data (56 bytes)
27,413,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,444,003 UART: [rt]cmd =0x44504543, len=96
27,491,505 >>> mbox cmd response data (56 bytes)
27,492,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,522,956 UART: [rt]cmd =0x44504543, len=96
27,570,704 >>> mbox cmd response data (56 bytes)
27,571,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,602,071 UART: [rt]cmd =0x44504543, len=96
27,608,673 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,754,117 ready_for_fw is high
3,754,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,673 >>> mbox cmd response: success
19,285,924 UART:
19,286,326 UART: Running Caliptra FMC ...
19,287,475 UART:
19,287,645 UART: [state] CFI Enabled
19,295,619 UART: [fht] FMC Alias Private Key: 7
21,061,678 UART: [art] Extend RT PCRs Done
21,062,918 UART: [art] Lock RT PCRs Done
21,064,663 UART: [art] Populate DV Done
21,070,154 UART: [fht] FMC Alias Private Key: 7
21,071,797 UART: [art] Derive CDI
21,072,550 UART: [art] Store in slot 0x4
21,115,234 UART: [art] Derive Key Pair
21,116,243 UART: [art] Store priv key in slot 0x5
23,543,065 UART: [art] Derive Key Pair - Done
23,556,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,340 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,850 UART: [art] PUB.X = 003B7003B9E93242606CA4701A7C1C5098C54A3781303CF30766E6032F6083D80EB65BDD0F9DBE051A7F01856D2C0468
25,271,015 UART: [art] PUB.Y = 48DFA95B078C05F2CBF01CD8CD8AA157D1D3CBD1AA732D45F101A504DF35579D546B0E2CC24839CBDBEC451ED26B8198
25,278,280 UART: [art] SIG.R = BD9816A3EDA4E48CEFD1F0FFDBF4ABC3AFD7F8464F9AA8CF61EC8A0AE4BFE6D0154AF0294D2A735222284AF821FB0D18
25,285,764 UART: [art] SIG.S = BA641900355B5FCD8FFA66345F1F610B3682B1E5B805D7D82767984DCE6B927F5AA375F8536A311A0CF71A275853E6EE
26,265,296 UART: Caliptra RT
26,266,090 UART: [state] CFI Enabled
26,399,211 UART: [rt] RT listening for mailbox commands...
26,401,140 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,431,119 UART: [rt]cmd =0x44504543, len=24
26,459,023 >>> mbox cmd response data (40 bytes)
26,460,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,491,118 UART: [rt]cmd =0x44504543, len=96
26,534,118 >>> mbox cmd response data (56 bytes)
26,534,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,565,638 UART: [rt]cmd =0x44504543, len=96
26,609,415 >>> mbox cmd response data (56 bytes)
26,610,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,640,450 UART: [rt]cmd =0x44504543, len=96
26,683,441 >>> mbox cmd response data (56 bytes)
26,684,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,714,752 UART: [rt]cmd =0x44504543, len=96
26,758,487 >>> mbox cmd response data (56 bytes)
26,759,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,789,858 UART: [rt]cmd =0x44504543, len=96
26,834,033 >>> mbox cmd response data (56 bytes)
26,834,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,865,283 UART: [rt]cmd =0x44504543, len=96
26,909,885 >>> mbox cmd response data (56 bytes)
26,910,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,941,361 UART: [rt]cmd =0x44504543, len=96
26,986,293 >>> mbox cmd response data (56 bytes)
26,986,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,017,523 UART: [rt]cmd =0x44504543, len=96
27,062,859 >>> mbox cmd response data (56 bytes)
27,063,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,094,110 UART: [rt]cmd =0x44504543, len=96
27,139,880 >>> mbox cmd response data (56 bytes)
27,140,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,171,127 UART: [rt]cmd =0x44504543, len=96
27,217,122 >>> mbox cmd response data (56 bytes)
27,217,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,248,215 UART: [rt]cmd =0x44504543, len=96
27,294,207 >>> mbox cmd response data (56 bytes)
27,294,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,325,498 UART: [rt]cmd =0x44504543, len=96
27,371,752 >>> mbox cmd response data (56 bytes)
27,372,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,402,931 UART: [rt]cmd =0x44504543, len=96
27,449,619 >>> mbox cmd response data (56 bytes)
27,450,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,480,854 UART: [rt]cmd =0x44504543, len=96
27,528,348 >>> mbox cmd response data (56 bytes)
27,529,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,559,555 UART: [rt]cmd =0x44504543, len=96
27,606,728 >>> mbox cmd response data (56 bytes)
27,607,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,638,013 UART: [rt]cmd =0x44504543, len=96
27,645,048 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,273 UART: [kat] SHA2-256
882,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,319 UART: [kat] ++
886,471 UART: [kat] sha1
890,811 UART: [kat] SHA2-256
892,749 UART: [kat] SHA2-384
895,354 UART: [kat] SHA2-512-ACC
897,255 UART: [kat] ECC-384
903,098 UART: [kat] HMAC-384Kdf
907,738 UART: [kat] LMS
1,475,934 UART: [kat] --
1,476,853 UART: [cold-reset] ++
1,477,373 UART: [fht] Storing FHT @ 0x50003400
1,480,358 UART: [idev] ++
1,480,526 UART: [idev] CDI.KEYID = 6
1,480,886 UART: [idev] SUBJECT.KEYID = 7
1,481,310 UART: [idev] UDS.KEYID = 0
1,481,655 ready_for_fw is high
1,481,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,190 UART: [idev] Erasing UDS.KEYID = 0
1,505,840 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,338 UART: [idev] --
1,515,319 UART: [ldev] ++
1,515,487 UART: [ldev] CDI.KEYID = 6
1,515,850 UART: [ldev] SUBJECT.KEYID = 5
1,516,276 UART: [ldev] AUTHORITY.KEYID = 7
1,516,739 UART: [ldev] FE.KEYID = 1
1,521,921 UART: [ldev] Erasing FE.KEYID = 1
1,546,700 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,632 UART: [ldev] --
1,586,143 UART: [fwproc] Waiting for Commands...
1,586,792 UART: [fwproc] Received command 0x46574c44
1,587,583 UART: [fwproc] Received Image of size 118548 bytes
2,931,809 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,607 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,076 >>> mbox cmd response: success
3,132,250 UART: [afmc] ++
3,132,418 UART: [afmc] CDI.KEYID = 6
3,132,780 UART: [afmc] SUBJECT.KEYID = 7
3,133,205 UART: [afmc] AUTHORITY.KEYID = 5
3,167,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,828 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,420 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,103 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,103 UART: [afmc] --
3,211,117 UART: [cold-reset] --
3,211,943 UART: [state] Locking Datavault
3,213,102 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,706 UART: [state] Locking ICCM
3,214,362 UART: [exit] Launching FMC @ 0x40000130
3,219,692 UART:
3,219,708 UART: Running Caliptra FMC ...
3,220,116 UART:
3,220,170 UART: [state] CFI Enabled
3,230,662 UART: [fht] FMC Alias Private Key: 7
3,349,578 UART: [art] Extend RT PCRs Done
3,350,006 UART: [art] Lock RT PCRs Done
3,351,592 UART: [art] Populate DV Done
3,360,055 UART: [fht] FMC Alias Private Key: 7
3,361,153 UART: [art] Derive CDI
3,361,433 UART: [art] Store in slot 0x4
3,446,767 UART: [art] Derive Key Pair
3,447,127 UART: [art] Store priv key in slot 0x5
3,460,772 UART: [art] Derive Key Pair - Done
3,475,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,133 UART: [art] PUB.X = CEBF4EEF0D60E055A0D5ADFF2C0DA21561E0C7BB51ADC558F2477BAD97527F6D6C5AFCE5BBDEE7FF6CB7F55D78CCCFAE
3,498,941 UART: [art] PUB.Y = F7FA397CE477304E45830CBB86D73A495D925A8D1DFDE0C168D6DBA87A3465017DE2D884E9CE2521F933A89FB9266F4C
3,505,895 UART: [art] SIG.R = 80941631C65919AC316D3BAB693DBD19A929BAE06759D25AE3ED3F4B4563D682FB451263E32BEBD4B9145D5E01654632
3,512,664 UART: [art] SIG.S = 0DB899410FFE576496841FB8B341BDF2AA4E4C4F4CB990A7E91F13ECE627E3D79FD1A13A3F7DA6593CDD5FF593E70686
3,536,395 UART: Caliptra RT
3,536,646 UART: [state] CFI Enabled
3,655,859 UART: [rt] RT listening for mailbox commands...
3,656,529 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,469 UART: [rt]cmd =0x44504543, len=24
3,713,963 >>> mbox cmd response data (40 bytes)
3,713,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,743,825 UART: [rt]cmd =0x44504543, len=96
3,786,868 >>> mbox cmd response data (56 bytes)
3,786,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,732 UART: [rt]cmd =0x44504543, len=96
3,859,623 >>> mbox cmd response data (56 bytes)
3,859,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,739 UART: [rt]cmd =0x44504543, len=96
3,932,791 >>> mbox cmd response data (56 bytes)
3,932,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,831 UART: [rt]cmd =0x44504543, len=96
4,006,178 >>> mbox cmd response data (56 bytes)
4,006,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,036,098 UART: [rt]cmd =0x44504543, len=96
4,080,396 >>> mbox cmd response data (56 bytes)
4,080,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,110,374 UART: [rt]cmd =0x44504543, len=96
4,154,467 >>> mbox cmd response data (56 bytes)
4,154,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,469 UART: [rt]cmd =0x44504543, len=96
4,228,969 >>> mbox cmd response data (56 bytes)
4,228,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,258,997 UART: [rt]cmd =0x44504543, len=96
4,303,414 >>> mbox cmd response data (56 bytes)
4,303,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,333,386 UART: [rt]cmd =0x44504543, len=96
4,378,152 >>> mbox cmd response data (56 bytes)
4,378,153 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,044 UART: [rt]cmd =0x44504543, len=96
4,453,625 >>> mbox cmd response data (56 bytes)
4,453,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,483,497 UART: [rt]cmd =0x44504543, len=96
4,529,249 >>> mbox cmd response data (56 bytes)
4,529,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,559,223 UART: [rt]cmd =0x44504543, len=96
4,604,618 >>> mbox cmd response data (56 bytes)
4,604,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,634,570 UART: [rt]cmd =0x44504543, len=96
4,680,478 >>> mbox cmd response data (56 bytes)
4,680,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,710,492 UART: [rt]cmd =0x44504543, len=96
4,756,539 >>> mbox cmd response data (56 bytes)
4,756,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,786,625 UART: [rt]cmd =0x44504543, len=96
4,834,113 >>> mbox cmd response data (56 bytes)
4,834,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,863,917 UART: [rt]cmd =0x44504543, len=96
4,871,563 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,799 ready_for_fw is high
1,362,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,788 >>> mbox cmd response: success
3,042,247 UART:
3,042,263 UART: Running Caliptra FMC ...
3,042,671 UART:
3,042,725 UART: [state] CFI Enabled
3,053,273 UART: [fht] FMC Alias Private Key: 7
3,172,719 UART: [art] Extend RT PCRs Done
3,173,147 UART: [art] Lock RT PCRs Done
3,174,743 UART: [art] Populate DV Done
3,182,954 UART: [fht] FMC Alias Private Key: 7
3,183,918 UART: [art] Derive CDI
3,184,198 UART: [art] Store in slot 0x4
3,270,082 UART: [art] Derive Key Pair
3,270,442 UART: [art] Store priv key in slot 0x5
3,283,591 UART: [art] Derive Key Pair - Done
3,298,344 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,013 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,778 UART: [art] PUB.X = 74C2BD13C990E4ADE4325E6E9EDB8DD7505618842D092754A4F2A9F164652A3C327E611C7C6162BD7E486326DCD01515
3,321,545 UART: [art] PUB.Y = D8EB774CD84F123D7DF59A5C12B574D1F8B6CF72BEAA8E6B2995275D7EF1C6B6CDD195F60A50B3E675F353B6B012B7AE
3,328,512 UART: [art] SIG.R = 23F9BE9D002253DCEE4EB4E1B026FAB4F3A0A26131CAC720FA27A608D80F9B074D02EF85C13BA5065BE2F944CD81A555
3,335,261 UART: [art] SIG.S = 099E132C58BA0E5CE8DC7C0B151F86BC90D943879C67699C0B7CE175DB14A67221963FA84E06ACDEE0E5336300EB6201
3,358,855 UART: Caliptra RT
3,359,106 UART: [state] CFI Enabled
3,479,156 UART: [rt] RT listening for mailbox commands...
3,479,826 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,602 UART: [rt]cmd =0x44504543, len=24
3,537,238 >>> mbox cmd response data (40 bytes)
3,537,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,178 UART: [rt]cmd =0x44504543, len=96
3,609,505 >>> mbox cmd response data (56 bytes)
3,609,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,519 UART: [rt]cmd =0x44504543, len=96
3,683,042 >>> mbox cmd response data (56 bytes)
3,683,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,942 UART: [rt]cmd =0x44504543, len=96
3,756,080 >>> mbox cmd response data (56 bytes)
3,756,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,950 UART: [rt]cmd =0x44504543, len=96
3,829,529 >>> mbox cmd response data (56 bytes)
3,829,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,393 UART: [rt]cmd =0x44504543, len=96
3,902,955 >>> mbox cmd response data (56 bytes)
3,902,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,759 UART: [rt]cmd =0x44504543, len=96
3,977,226 >>> mbox cmd response data (56 bytes)
3,977,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,272 UART: [rt]cmd =0x44504543, len=96
4,051,680 >>> mbox cmd response data (56 bytes)
4,051,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,806 UART: [rt]cmd =0x44504543, len=96
4,126,397 >>> mbox cmd response data (56 bytes)
4,126,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,387 UART: [rt]cmd =0x44504543, len=96
4,200,983 >>> mbox cmd response data (56 bytes)
4,200,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,230,835 UART: [rt]cmd =0x44504543, len=96
4,276,430 >>> mbox cmd response data (56 bytes)
4,276,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,670 UART: [rt]cmd =0x44504543, len=96
4,352,388 >>> mbox cmd response data (56 bytes)
4,352,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,388 UART: [rt]cmd =0x44504543, len=96
4,428,677 >>> mbox cmd response data (56 bytes)
4,428,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,458,419 UART: [rt]cmd =0x44504543, len=96
4,504,881 >>> mbox cmd response data (56 bytes)
4,504,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,534,617 UART: [rt]cmd =0x44504543, len=96
4,580,946 >>> mbox cmd response data (56 bytes)
4,580,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,610,982 UART: [rt]cmd =0x44504543, len=96
4,657,768 >>> mbox cmd response data (56 bytes)
4,657,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,687,870 UART: [rt]cmd =0x44504543, len=96
4,695,150 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,468 UART: [kat] SHA2-256
882,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,514 UART: [kat] ++
886,666 UART: [kat] sha1
890,878 UART: [kat] SHA2-256
892,816 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,831 UART: [kat] LMS
1,476,027 UART: [kat] --
1,477,092 UART: [cold-reset] ++
1,477,592 UART: [fht] Storing FHT @ 0x50003400
1,480,493 UART: [idev] ++
1,480,661 UART: [idev] CDI.KEYID = 6
1,481,021 UART: [idev] SUBJECT.KEYID = 7
1,481,445 UART: [idev] UDS.KEYID = 0
1,481,790 ready_for_fw is high
1,481,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,675 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,345 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,076 UART: [ldev] Erasing FE.KEYID = 1
1,547,575 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,764 UART: [fwproc] Waiting for Commands...
1,587,551 UART: [fwproc] Received command 0x46574c44
1,588,342 UART: [fwproc] Received Image of size 118548 bytes
2,933,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,327 >>> mbox cmd response: success
3,133,385 UART: [afmc] ++
3,133,553 UART: [afmc] CDI.KEYID = 6
3,133,915 UART: [afmc] SUBJECT.KEYID = 7
3,134,340 UART: [afmc] AUTHORITY.KEYID = 5
3,169,187 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,405 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,777 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,190 UART: [afmc] --
3,212,270 UART: [cold-reset] --
3,213,156 UART: [state] Locking Datavault
3,214,137 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,741 UART: [state] Locking ICCM
3,215,239 UART: [exit] Launching FMC @ 0x40000130
3,220,569 UART:
3,220,585 UART: Running Caliptra FMC ...
3,220,993 UART:
3,221,136 UART: [state] CFI Enabled
3,231,512 UART: [fht] FMC Alias Private Key: 7
3,350,294 UART: [art] Extend RT PCRs Done
3,350,722 UART: [art] Lock RT PCRs Done
3,352,112 UART: [art] Populate DV Done
3,360,315 UART: [fht] FMC Alias Private Key: 7
3,361,367 UART: [art] Derive CDI
3,361,647 UART: [art] Store in slot 0x4
3,447,577 UART: [art] Derive Key Pair
3,447,937 UART: [art] Store priv key in slot 0x5
3,461,234 UART: [art] Derive Key Pair - Done
3,475,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,501 UART: [art] PUB.X = 8D90936E29119707D64DFE5FBDBBE50EA29CCDE9D1BBF7579C6F96B9E79FA57B518713BF800637C9613D00E9F7DC9A81
3,499,254 UART: [art] PUB.Y = 958B43589CFE6804BE996EF9D9DE4418A2F197EE647D09298BA6869EB6A7BFBB867ED3F2CFEAB9A28B27E4B3194EDC77
3,506,216 UART: [art] SIG.R = 38F6B620D66027A7F15EEBDAEADD55A56D53EBDD84F36997BB7FA4D067B48A9D0B4D2EDFA6171D8F426B7B56A9A583BA
3,513,007 UART: [art] SIG.S = 40A7197D5F77F279B8B88D94F747427B3453E7339583B62293E82A0822794A443CB70BD4CAB4C54E87BA8032F134D7E4
3,536,425 UART: Caliptra RT
3,536,768 UART: [state] CFI Enabled
3,657,378 UART: [rt] RT listening for mailbox commands...
3,658,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,156 UART: [rt]cmd =0x44504543, len=24
3,715,554 >>> mbox cmd response data (40 bytes)
3,715,555 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,612 UART: [rt]cmd =0x44504543, len=96
3,788,591 >>> mbox cmd response data (56 bytes)
3,788,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,461 UART: [rt]cmd =0x44504543, len=96
3,861,088 >>> mbox cmd response data (56 bytes)
3,861,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,328 UART: [rt]cmd =0x44504543, len=96
3,934,822 >>> mbox cmd response data (56 bytes)
3,934,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,830 UART: [rt]cmd =0x44504543, len=96
4,008,603 >>> mbox cmd response data (56 bytes)
4,008,604 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,038,757 UART: [rt]cmd =0x44504543, len=96
4,083,399 >>> mbox cmd response data (56 bytes)
4,083,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,113,389 UART: [rt]cmd =0x44504543, len=96
4,157,870 >>> mbox cmd response data (56 bytes)
4,157,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,187,608 UART: [rt]cmd =0x44504543, len=96
4,231,986 >>> mbox cmd response data (56 bytes)
4,231,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,261,880 UART: [rt]cmd =0x44504543, len=96
4,306,557 >>> mbox cmd response data (56 bytes)
4,306,558 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,336,645 UART: [rt]cmd =0x44504543, len=96
4,382,057 >>> mbox cmd response data (56 bytes)
4,382,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,412,027 UART: [rt]cmd =0x44504543, len=96
4,457,586 >>> mbox cmd response data (56 bytes)
4,457,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,660 UART: [rt]cmd =0x44504543, len=96
4,533,254 >>> mbox cmd response data (56 bytes)
4,533,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,563,232 UART: [rt]cmd =0x44504543, len=96
4,609,941 >>> mbox cmd response data (56 bytes)
4,609,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,639,897 UART: [rt]cmd =0x44504543, len=96
4,686,485 >>> mbox cmd response data (56 bytes)
4,686,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,716,591 UART: [rt]cmd =0x44504543, len=96
4,763,142 >>> mbox cmd response data (56 bytes)
4,763,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,020 UART: [rt]cmd =0x44504543, len=96
4,840,098 >>> mbox cmd response data (56 bytes)
4,840,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,870,176 UART: [rt]cmd =0x44504543, len=96
4,877,752 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,412 ready_for_fw is high
1,362,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,145 >>> mbox cmd response: success
3,044,560 UART:
3,044,576 UART: Running Caliptra FMC ...
3,044,984 UART:
3,045,127 UART: [state] CFI Enabled
3,056,027 UART: [fht] FMC Alias Private Key: 7
3,174,859 UART: [art] Extend RT PCRs Done
3,175,287 UART: [art] Lock RT PCRs Done
3,176,751 UART: [art] Populate DV Done
3,185,122 UART: [fht] FMC Alias Private Key: 7
3,186,162 UART: [art] Derive CDI
3,186,442 UART: [art] Store in slot 0x4
3,272,392 UART: [art] Derive Key Pair
3,272,752 UART: [art] Store priv key in slot 0x5
3,286,263 UART: [art] Derive Key Pair - Done
3,300,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,310 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,075 UART: [art] PUB.X = EC094AACE88CF3CA782AA76D3C36F68890B5256D0528F8F21C9A5563ED8A0BE3380F74A52E89A89CBA1A1F320DA44965
3,323,842 UART: [art] PUB.Y = 5ECBCAD4C811A57B75B7953FE8640E0BBA424B770A69EBA3342B5015D438B080C0C6BE65495DB2D57C8E7EF0DC958AB8
3,330,799 UART: [art] SIG.R = 455E43383F2A5F4AC61EE61D3210720C3955A29DB75AFC2B1EE40E0D7747534C9EFC42882464E09532BB2D9D476509E0
3,337,557 UART: [art] SIG.S = 70DDA09A77E8D80EEDD585EFC602AA66A6C49075E995868A490AB5F08B3562EEB77FD450F5327B7631A937469AF37EF7
3,361,478 UART: Caliptra RT
3,361,821 UART: [state] CFI Enabled
3,483,351 UART: [rt] RT listening for mailbox commands...
3,484,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,791 UART: [rt]cmd =0x44504543, len=24
3,541,289 >>> mbox cmd response data (40 bytes)
3,541,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,009 UART: [rt]cmd =0x44504543, len=96
3,614,618 >>> mbox cmd response data (56 bytes)
3,614,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,430 UART: [rt]cmd =0x44504543, len=96
3,688,021 >>> mbox cmd response data (56 bytes)
3,688,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,835 UART: [rt]cmd =0x44504543, len=96
3,761,547 >>> mbox cmd response data (56 bytes)
3,761,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,313 UART: [rt]cmd =0x44504543, len=96
3,835,660 >>> mbox cmd response data (56 bytes)
3,835,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,666 UART: [rt]cmd =0x44504543, len=96
3,909,864 >>> mbox cmd response data (56 bytes)
3,909,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,828 UART: [rt]cmd =0x44504543, len=96
3,984,559 >>> mbox cmd response data (56 bytes)
3,984,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,555 UART: [rt]cmd =0x44504543, len=96
4,059,033 >>> mbox cmd response data (56 bytes)
4,059,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,089,131 UART: [rt]cmd =0x44504543, len=96
4,133,770 >>> mbox cmd response data (56 bytes)
4,133,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,163,590 UART: [rt]cmd =0x44504543, len=96
4,208,714 >>> mbox cmd response data (56 bytes)
4,208,715 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,238,812 UART: [rt]cmd =0x44504543, len=96
4,284,497 >>> mbox cmd response data (56 bytes)
4,284,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,587 UART: [rt]cmd =0x44504543, len=96
4,360,077 >>> mbox cmd response data (56 bytes)
4,360,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,390,203 UART: [rt]cmd =0x44504543, len=96
4,436,966 >>> mbox cmd response data (56 bytes)
4,436,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,467,064 UART: [rt]cmd =0x44504543, len=96
4,512,914 >>> mbox cmd response data (56 bytes)
4,512,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,542,826 UART: [rt]cmd =0x44504543, len=96
4,589,897 >>> mbox cmd response data (56 bytes)
4,589,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,619,727 UART: [rt]cmd =0x44504543, len=96
4,666,581 >>> mbox cmd response data (56 bytes)
4,666,582 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,696,271 UART: [rt]cmd =0x44504543, len=96
4,703,551 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
890,896 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,000 UART: [kat] ++
895,152 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
904,113 UART: [kat] SHA2-512-ACC
906,014 UART: [kat] ECC-384
915,179 UART: [kat] HMAC-384Kdf
919,661 UART: [kat] LMS
1,167,973 UART: [kat] --
1,168,792 UART: [cold-reset] ++
1,169,190 UART: [fht] FHT @ 0x50003400
1,171,756 UART: [idev] ++
1,171,924 UART: [idev] CDI.KEYID = 6
1,172,285 UART: [idev] SUBJECT.KEYID = 7
1,172,710 UART: [idev] UDS.KEYID = 0
1,173,056 ready_for_fw is high
1,173,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,649 UART: [idev] Erasing UDS.KEYID = 0
1,197,813 UART: [idev] Sha1 KeyId Algorithm
1,206,837 UART: [idev] --
1,207,986 UART: [ldev] ++
1,208,154 UART: [ldev] CDI.KEYID = 6
1,208,518 UART: [ldev] SUBJECT.KEYID = 5
1,208,945 UART: [ldev] AUTHORITY.KEYID = 7
1,209,408 UART: [ldev] FE.KEYID = 1
1,214,936 UART: [ldev] Erasing FE.KEYID = 1
1,240,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,078 UART: [fwproc] Recv command 0x46574c44
1,281,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,383 >>> mbox cmd response: success
2,826,405 UART: [afmc] ++
2,826,573 UART: [afmc] CDI.KEYID = 6
2,826,936 UART: [afmc] SUBJECT.KEYID = 7
2,827,362 UART: [afmc] AUTHORITY.KEYID = 5
2,862,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,892 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,593 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,316 UART: [afmc] --
2,906,347 UART: [cold-reset] --
2,907,371 UART: [state] Locking Datavault
2,908,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,010 UART: [state] Locking ICCM
2,909,458 UART: [exit] Launching FMC @ 0x40000130
2,914,788 UART:
2,914,804 UART: Running Caliptra FMC ...
2,915,212 UART:
2,915,266 UART: [state] CFI Enabled
2,925,550 UART: [fht] FMC Alias Private Key: 7
3,044,128 UART: [art] Extend RT PCRs Done
3,044,556 UART: [art] Lock RT PCRs Done
3,045,856 UART: [art] Populate DV Done
3,054,161 UART: [fht] FMC Alias Private Key: 7
3,055,263 UART: [art] Derive CDI
3,055,543 UART: [art] Store in slot 0x4
3,141,240 UART: [art] Derive Key Pair
3,141,600 UART: [art] Store priv key in slot 0x5
3,154,196 UART: [art] Derive Key Pair - Done
3,168,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,329 UART: [art] PUB.X = 16027676E5BF2AAF6322545559F67AE14E91F4625CAFB8BAAB0A7D9F56D67E66A4EFDD8A5892EE420A3468BDFC11F21B
3,192,106 UART: [art] PUB.Y = 1AF0E6AEE219A928DE001F0744D1088D0463A465647B7FCC7C660A61D63B499FE8FF6A59AB1B85BE58BD0C724DFEB67F
3,199,035 UART: [art] SIG.R = 6A614A9F0E320747405B2BE4E7749A40C185DB46CCDF2331E9C1937E48DE1EB55C304E4F49866FC56A738DCD21C6671B
3,205,805 UART: [art] SIG.S = 90642C41951A77325F3484302FF5B9C2C23309E005C4221CF1DFD2935A85428B9827734169C961806AD210E81519DF68
3,229,245 UART: Caliptra RT
3,229,496 UART: [state] CFI Enabled
3,349,754 UART: [rt] RT listening for mailbox commands...
3,350,424 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,308 UART: [rt]cmd =0x44504543, len=24
3,408,018 >>> mbox cmd response data (40 bytes)
3,408,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,780 UART: [rt]cmd =0x44504543, len=96
3,479,843 >>> mbox cmd response data (56 bytes)
3,479,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,891 UART: [rt]cmd =0x44504543, len=96
3,553,334 >>> mbox cmd response data (56 bytes)
3,553,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,254 UART: [rt]cmd =0x44504543, len=96
3,627,304 >>> mbox cmd response data (56 bytes)
3,627,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,224 UART: [rt]cmd =0x44504543, len=96
3,700,847 >>> mbox cmd response data (56 bytes)
3,700,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,059 UART: [rt]cmd =0x44504543, len=96
3,775,525 >>> mbox cmd response data (56 bytes)
3,775,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,603 UART: [rt]cmd =0x44504543, len=96
3,850,050 >>> mbox cmd response data (56 bytes)
3,850,051 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,880,002 UART: [rt]cmd =0x44504543, len=96
3,924,234 >>> mbox cmd response data (56 bytes)
3,924,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,336 UART: [rt]cmd =0x44504543, len=96
3,999,577 >>> mbox cmd response data (56 bytes)
3,999,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,597 UART: [rt]cmd =0x44504543, len=96
4,074,531 >>> mbox cmd response data (56 bytes)
4,074,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,104,369 UART: [rt]cmd =0x44504543, len=96
4,149,634 >>> mbox cmd response data (56 bytes)
4,149,635 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,179,550 UART: [rt]cmd =0x44504543, len=96
4,224,968 >>> mbox cmd response data (56 bytes)
4,224,969 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,724 UART: [rt]cmd =0x44504543, len=96
4,300,247 >>> mbox cmd response data (56 bytes)
4,300,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,330,095 UART: [rt]cmd =0x44504543, len=96
4,376,441 >>> mbox cmd response data (56 bytes)
4,376,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,406,285 UART: [rt]cmd =0x44504543, len=96
4,453,046 >>> mbox cmd response data (56 bytes)
4,453,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,482,950 UART: [rt]cmd =0x44504543, len=96
4,531,150 >>> mbox cmd response data (56 bytes)
4,531,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,244 UART: [rt]cmd =0x44504543, len=96
4,568,836 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,430 ready_for_fw is high
1,058,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,288 >>> mbox cmd response: success
2,739,993 UART:
2,740,009 UART: Running Caliptra FMC ...
2,740,417 UART:
2,740,471 UART: [state] CFI Enabled
2,750,579 UART: [fht] FMC Alias Private Key: 7
2,869,855 UART: [art] Extend RT PCRs Done
2,870,283 UART: [art] Lock RT PCRs Done
2,871,645 UART: [art] Populate DV Done
2,879,716 UART: [fht] FMC Alias Private Key: 7
2,880,740 UART: [art] Derive CDI
2,881,020 UART: [art] Store in slot 0x4
2,966,491 UART: [art] Derive Key Pair
2,966,851 UART: [art] Store priv key in slot 0x5
2,980,379 UART: [art] Derive Key Pair - Done
2,995,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,702 UART: [art] PUB.X = 926ED7BB6FB3B2A51A192E7B719C17151FBF09601CE9137C15FDC04253072B7CFA53F17E2EB21277FBD5A039E51B3DB9
3,018,478 UART: [art] PUB.Y = 0715AB972D94701EA64CF8CB27D69FE0E08A6A9A43A5091489959F42B8AD600FD9C56198270D4DDD8AEF98247652BCA0
3,025,422 UART: [art] SIG.R = EEEEB97F63A291C9E7ED29A40515DFC55143220D2CD6F46E8CC70CA70376E1CA096AD48511AB60054B4F1077414CB2D8
3,032,184 UART: [art] SIG.S = AD6A6B4EBEDE391E540BF48CA59E4BE7F1F1EE913AA9A1CF89DA51C83AEE26052F9FFFB2D9A4F45E721E902C704574E7
3,057,300 UART: Caliptra RT
3,057,551 UART: [state] CFI Enabled
3,177,784 UART: [rt] RT listening for mailbox commands...
3,178,454 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,466 UART: [rt]cmd =0x44504543, len=24
3,236,080 >>> mbox cmd response data (40 bytes)
3,236,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,830 UART: [rt]cmd =0x44504543, len=96
3,308,377 >>> mbox cmd response data (56 bytes)
3,308,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,338,365 UART: [rt]cmd =0x44504543, len=96
3,382,222 >>> mbox cmd response data (56 bytes)
3,382,223 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,262 UART: [rt]cmd =0x44504543, len=96
3,454,864 >>> mbox cmd response data (56 bytes)
3,454,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,726 UART: [rt]cmd =0x44504543, len=96
3,528,343 >>> mbox cmd response data (56 bytes)
3,528,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,333 UART: [rt]cmd =0x44504543, len=96
3,601,431 >>> mbox cmd response data (56 bytes)
3,601,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,273 UART: [rt]cmd =0x44504543, len=96
3,674,936 >>> mbox cmd response data (56 bytes)
3,674,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,704,912 UART: [rt]cmd =0x44504543, len=96
3,749,734 >>> mbox cmd response data (56 bytes)
3,749,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,824 UART: [rt]cmd =0x44504543, len=96
3,824,773 >>> mbox cmd response data (56 bytes)
3,824,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,721 UART: [rt]cmd =0x44504543, len=96
3,899,615 >>> mbox cmd response data (56 bytes)
3,899,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,603 UART: [rt]cmd =0x44504543, len=96
3,974,570 >>> mbox cmd response data (56 bytes)
3,974,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,542 UART: [rt]cmd =0x44504543, len=96
4,049,444 >>> mbox cmd response data (56 bytes)
4,049,445 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,382 UART: [rt]cmd =0x44504543, len=96
4,125,379 >>> mbox cmd response data (56 bytes)
4,125,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,519 UART: [rt]cmd =0x44504543, len=96
4,201,375 >>> mbox cmd response data (56 bytes)
4,201,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,429 UART: [rt]cmd =0x44504543, len=96
4,278,116 >>> mbox cmd response data (56 bytes)
4,278,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,118 UART: [rt]cmd =0x44504543, len=96
4,354,512 >>> mbox cmd response data (56 bytes)
4,354,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,384,608 UART: [rt]cmd =0x44504543, len=96
4,392,254 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,253 UART: [kat] SHA2-256
902,193 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,438 UART: [kat] LMS
1,169,750 UART: [kat] --
1,170,427 UART: [cold-reset] ++
1,170,889 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,174,875 ready_for_fw is high
1,174,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,864 UART: [idev] Sha1 KeyId Algorithm
1,208,676 UART: [idev] --
1,209,699 UART: [ldev] ++
1,209,867 UART: [ldev] CDI.KEYID = 6
1,210,231 UART: [ldev] SUBJECT.KEYID = 5
1,210,658 UART: [ldev] AUTHORITY.KEYID = 7
1,211,121 UART: [ldev] FE.KEYID = 1
1,216,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,742 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,599 UART: [ldev] --
1,281,962 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,640 >>> mbox cmd response: success
2,827,888 UART: [afmc] ++
2,828,056 UART: [afmc] CDI.KEYID = 6
2,828,419 UART: [afmc] SUBJECT.KEYID = 7
2,828,845 UART: [afmc] AUTHORITY.KEYID = 5
2,864,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,703 UART: [afmc] --
2,907,754 UART: [cold-reset] --
2,908,652 UART: [state] Locking Datavault
2,909,973 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,577 UART: [state] Locking ICCM
2,911,079 UART: [exit] Launching FMC @ 0x40000130
2,916,409 UART:
2,916,425 UART: Running Caliptra FMC ...
2,916,833 UART:
2,916,976 UART: [state] CFI Enabled
2,927,554 UART: [fht] FMC Alias Private Key: 7
3,046,150 UART: [art] Extend RT PCRs Done
3,046,578 UART: [art] Lock RT PCRs Done
3,048,142 UART: [art] Populate DV Done
3,056,295 UART: [fht] FMC Alias Private Key: 7
3,057,465 UART: [art] Derive CDI
3,057,745 UART: [art] Store in slot 0x4
3,143,512 UART: [art] Derive Key Pair
3,143,872 UART: [art] Store priv key in slot 0x5
3,157,058 UART: [art] Derive Key Pair - Done
3,171,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,738 UART: [art] PUB.X = 77D77A9BBC27CF14E35DB800F5BA8642BF5E2E77978723CD3D0FD358AE1A708CCA63A91DF0BE44E04FAAEE86141CB3F2
3,194,505 UART: [art] PUB.Y = 4A34BE24CFB65C3091334ACA4C106F08B2CF2A2474834F48413DE336B3A91413CF25EF280B8CB73C9FC009D217299E0E
3,201,449 UART: [art] SIG.R = A194F5D99D830E4D6DDE517DD444832EE54335E3BAC0D483EF706FEB7CB1814F63B21F09D55EE915A593C9C3F7CFBABA
3,208,233 UART: [art] SIG.S = 25A8C11008091E5ED7A592F8CE2AF17F83068636576E46849B46CEFB5B4E596337122CBFAFBDEE75C50310D727EDEEA4
3,231,625 UART: Caliptra RT
3,231,968 UART: [state] CFI Enabled
3,351,040 UART: [rt] RT listening for mailbox commands...
3,351,710 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,670 UART: [rt]cmd =0x44504543, len=24
3,409,382 >>> mbox cmd response data (40 bytes)
3,409,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,442 UART: [rt]cmd =0x44504543, len=96
3,481,591 >>> mbox cmd response data (56 bytes)
3,481,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,559 UART: [rt]cmd =0x44504543, len=96
3,553,940 >>> mbox cmd response data (56 bytes)
3,553,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,002 UART: [rt]cmd =0x44504543, len=96
3,627,694 >>> mbox cmd response data (56 bytes)
3,627,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,384 UART: [rt]cmd =0x44504543, len=96
3,701,615 >>> mbox cmd response data (56 bytes)
3,701,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,531 UART: [rt]cmd =0x44504543, len=96
3,775,791 >>> mbox cmd response data (56 bytes)
3,775,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,723 UART: [rt]cmd =0x44504543, len=96
3,850,788 >>> mbox cmd response data (56 bytes)
3,850,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,880,704 UART: [rt]cmd =0x44504543, len=96
3,924,620 >>> mbox cmd response data (56 bytes)
3,924,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,734 UART: [rt]cmd =0x44504543, len=96
3,999,435 >>> mbox cmd response data (56 bytes)
3,999,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,163 UART: [rt]cmd =0x44504543, len=96
4,074,751 >>> mbox cmd response data (56 bytes)
4,074,752 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,104,801 UART: [rt]cmd =0x44504543, len=96
4,150,382 >>> mbox cmd response data (56 bytes)
4,150,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,292 UART: [rt]cmd =0x44504543, len=96
4,225,672 >>> mbox cmd response data (56 bytes)
4,225,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,255,654 UART: [rt]cmd =0x44504543, len=96
4,301,937 >>> mbox cmd response data (56 bytes)
4,301,938 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,331,775 UART: [rt]cmd =0x44504543, len=96
4,378,245 >>> mbox cmd response data (56 bytes)
4,378,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,327 UART: [rt]cmd =0x44504543, len=96
4,454,784 >>> mbox cmd response data (56 bytes)
4,454,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,500 UART: [rt]cmd =0x44504543, len=96
4,531,320 >>> mbox cmd response data (56 bytes)
4,531,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,508 UART: [rt]cmd =0x44504543, len=96
4,568,496 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,411 ready_for_fw is high
1,058,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,362 >>> mbox cmd response: success
2,741,305 UART:
2,741,321 UART: Running Caliptra FMC ...
2,741,729 UART:
2,741,872 UART: [state] CFI Enabled
2,752,528 UART: [fht] FMC Alias Private Key: 7
2,871,520 UART: [art] Extend RT PCRs Done
2,871,948 UART: [art] Lock RT PCRs Done
2,873,218 UART: [art] Populate DV Done
2,881,713 UART: [fht] FMC Alias Private Key: 7
2,882,839 UART: [art] Derive CDI
2,883,119 UART: [art] Store in slot 0x4
2,968,988 UART: [art] Derive Key Pair
2,969,348 UART: [art] Store priv key in slot 0x5
2,982,964 UART: [art] Derive Key Pair - Done
2,997,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,328 UART: [art] PUB.X = 02B5033924731777A8F3EF6D45788F79B1A8EF6CF0F6FC156B3F048E046DA5BC7E4462DFD934A6DB0D699955DB73470A
3,021,086 UART: [art] PUB.Y = A443A233E970917D8E4E5D26CBCAF075C459D6F0B35B2FDA207512A9C292D4375640347513E5A7EEF17D4549588B2683
3,028,034 UART: [art] SIG.R = 1E9D4F203454DE4D1EFBC775B0C4C8AF72EF5FDBCBB8214BD6DDE40EE48A430E51D08540442FB4B7066B73DD654E41F8
3,034,815 UART: [art] SIG.S = F1F8E1EBE599631851C3ED3D6F31DD5241B3D23BD42912B5EF6CEF9881217C060C8BA37277934592FEBB21AE1C1D15C2
3,058,171 UART: Caliptra RT
3,058,514 UART: [state] CFI Enabled
3,178,926 UART: [rt] RT listening for mailbox commands...
3,179,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,480 UART: [rt]cmd =0x44504543, len=24
3,236,724 >>> mbox cmd response data (40 bytes)
3,236,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,582 UART: [rt]cmd =0x44504543, len=96
3,309,403 >>> mbox cmd response data (56 bytes)
3,309,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,443 UART: [rt]cmd =0x44504543, len=96
3,382,928 >>> mbox cmd response data (56 bytes)
3,382,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,972 UART: [rt]cmd =0x44504543, len=96
3,456,432 >>> mbox cmd response data (56 bytes)
3,456,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,454 UART: [rt]cmd =0x44504543, len=96
3,530,701 >>> mbox cmd response data (56 bytes)
3,530,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,729 UART: [rt]cmd =0x44504543, len=96
3,604,945 >>> mbox cmd response data (56 bytes)
3,604,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,909 UART: [rt]cmd =0x44504543, len=96
3,679,566 >>> mbox cmd response data (56 bytes)
3,679,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,500 UART: [rt]cmd =0x44504543, len=96
3,754,576 >>> mbox cmd response data (56 bytes)
3,754,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,684 UART: [rt]cmd =0x44504543, len=96
3,828,621 >>> mbox cmd response data (56 bytes)
3,828,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,771 UART: [rt]cmd =0x44504543, len=96
3,904,367 >>> mbox cmd response data (56 bytes)
3,904,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,271 UART: [rt]cmd =0x44504543, len=96
3,980,026 >>> mbox cmd response data (56 bytes)
3,980,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,984 UART: [rt]cmd =0x44504543, len=96
4,055,656 >>> mbox cmd response data (56 bytes)
4,055,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,830 UART: [rt]cmd =0x44504543, len=96
4,131,153 >>> mbox cmd response data (56 bytes)
4,131,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,161,029 UART: [rt]cmd =0x44504543, len=96
4,207,185 >>> mbox cmd response data (56 bytes)
4,207,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,049 UART: [rt]cmd =0x44504543, len=96
4,283,872 >>> mbox cmd response data (56 bytes)
4,283,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,313,848 UART: [rt]cmd =0x44504543, len=96
4,361,122 >>> mbox cmd response data (56 bytes)
4,361,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,390,994 UART: [rt]cmd =0x44504543, len=96
4,398,612 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,938 UART: [state] LifecycleState = Unprovisioned
85,593 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,399 UART: [kat] SHA2-256
903,339 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,184 UART: [kat] HMAC-384Kdf
921,788 UART: [kat] LMS
1,170,116 UART: [kat] --
1,171,035 UART: [cold-reset] ++
1,171,573 UART: [fht] FHT @ 0x50003400
1,174,384 UART: [idev] ++
1,174,552 UART: [idev] CDI.KEYID = 6
1,174,912 UART: [idev] SUBJECT.KEYID = 7
1,175,336 UART: [idev] UDS.KEYID = 0
1,175,681 ready_for_fw is high
1,175,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,242 UART: [idev] Erasing UDS.KEYID = 0
1,200,877 UART: [idev] Sha1 KeyId Algorithm
1,209,265 UART: [idev] --
1,210,259 UART: [ldev] ++
1,210,427 UART: [ldev] CDI.KEYID = 6
1,210,790 UART: [ldev] SUBJECT.KEYID = 5
1,211,216 UART: [ldev] AUTHORITY.KEYID = 7
1,211,679 UART: [ldev] FE.KEYID = 1
1,217,047 UART: [ldev] Erasing FE.KEYID = 1
1,243,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,477 UART: [ldev] --
1,282,862 UART: [fwproc] Wait for Commands...
1,283,518 UART: [fwproc] Recv command 0x46574c44
1,284,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,032 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,202 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,571 >>> mbox cmd response: success
2,828,651 UART: [afmc] ++
2,828,819 UART: [afmc] CDI.KEYID = 6
2,829,181 UART: [afmc] SUBJECT.KEYID = 7
2,829,606 UART: [afmc] AUTHORITY.KEYID = 5
2,864,787 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,713 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,596 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,297 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,161 UART: [afmc] --
2,908,245 UART: [cold-reset] --
2,908,997 UART: [state] Locking Datavault
2,909,850 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,454 UART: [state] Locking ICCM
2,911,038 UART: [exit] Launching FMC @ 0x40000130
2,916,368 UART:
2,916,384 UART: Running Caliptra FMC ...
2,916,792 UART:
2,916,846 UART: [state] CFI Enabled
2,927,276 UART: [fht] FMC Alias Private Key: 7
3,046,646 UART: [art] Extend RT PCRs Done
3,047,074 UART: [art] Lock RT PCRs Done
3,048,398 UART: [art] Populate DV Done
3,056,687 UART: [fht] FMC Alias Private Key: 7
3,057,833 UART: [art] Derive CDI
3,058,113 UART: [art] Store in slot 0x4
3,144,322 UART: [art] Derive Key Pair
3,144,682 UART: [art] Store priv key in slot 0x5
3,157,610 UART: [art] Derive Key Pair - Done
3,172,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,082 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,847 UART: [art] PUB.X = B4614A6AF0659D054C54E682ADEE27566AC8CF68EDC4322887500D052507B48B2FFF1BFE5EA671E3C25BA9757E9E8FDC
3,195,619 UART: [art] PUB.Y = E599A55C36F19144F04E2AA32F49D71C86F797F87210AD3A968D498401D20E176D5CDD73522A57692DE486EB90EBD647
3,202,563 UART: [art] SIG.R = 53D240269776DD5B36B78864AF477638A8499FAFF3ABBAD7A8BC66D34933004DB6DD2039EF3E4717165B281674A85104
3,209,306 UART: [art] SIG.S = 4DB066041CFD5F528FBEC4092DCC4B4817F58CF433925FE131CAC24C057DF13681DC63F400B1FF83CB684B7744F2D884
3,233,301 UART: Caliptra RT
3,233,552 UART: [state] CFI Enabled
3,353,009 UART: [rt] RT listening for mailbox commands...
3,353,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,729 UART: [rt]cmd =0x44504543, len=24
3,410,905 >>> mbox cmd response data (40 bytes)
3,410,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,095 UART: [rt]cmd =0x44504543, len=96
3,483,460 >>> mbox cmd response data (56 bytes)
3,483,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,442 UART: [rt]cmd =0x44504543, len=96
3,556,239 >>> mbox cmd response data (56 bytes)
3,556,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,183 UART: [rt]cmd =0x44504543, len=96
3,629,133 >>> mbox cmd response data (56 bytes)
3,629,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,983 UART: [rt]cmd =0x44504543, len=96
3,702,508 >>> mbox cmd response data (56 bytes)
3,702,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,732,566 UART: [rt]cmd =0x44504543, len=96
3,776,696 >>> mbox cmd response data (56 bytes)
3,776,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,806,792 UART: [rt]cmd =0x44504543, len=96
3,851,423 >>> mbox cmd response data (56 bytes)
3,851,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,269 UART: [rt]cmd =0x44504543, len=96
3,925,697 >>> mbox cmd response data (56 bytes)
3,925,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,955,745 UART: [rt]cmd =0x44504543, len=96
4,000,338 >>> mbox cmd response data (56 bytes)
4,000,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,160 UART: [rt]cmd =0x44504543, len=96
4,075,142 >>> mbox cmd response data (56 bytes)
4,075,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,174 UART: [rt]cmd =0x44504543, len=96
4,150,213 >>> mbox cmd response data (56 bytes)
4,150,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,171 UART: [rt]cmd =0x44504543, len=96
4,225,667 >>> mbox cmd response data (56 bytes)
4,225,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,255,817 UART: [rt]cmd =0x44504543, len=96
4,302,274 >>> mbox cmd response data (56 bytes)
4,302,275 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,332,356 UART: [rt]cmd =0x44504543, len=96
4,378,430 >>> mbox cmd response data (56 bytes)
4,378,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,408,312 UART: [rt]cmd =0x44504543, len=96
4,454,559 >>> mbox cmd response data (56 bytes)
4,454,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,755 UART: [rt]cmd =0x44504543, len=96
4,531,479 >>> mbox cmd response data (56 bytes)
4,531,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,169 UART: [rt]cmd =0x44504543, len=96
4,568,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,477 ready_for_fw is high
1,059,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,796 >>> mbox cmd response: success
2,740,471 UART:
2,740,487 UART: Running Caliptra FMC ...
2,740,895 UART:
2,740,949 UART: [state] CFI Enabled
2,751,631 UART: [fht] FMC Alias Private Key: 7
2,870,577 UART: [art] Extend RT PCRs Done
2,871,005 UART: [art] Lock RT PCRs Done
2,872,401 UART: [art] Populate DV Done
2,880,922 UART: [fht] FMC Alias Private Key: 7
2,882,026 UART: [art] Derive CDI
2,882,306 UART: [art] Store in slot 0x4
2,967,817 UART: [art] Derive Key Pair
2,968,177 UART: [art] Store priv key in slot 0x5
2,980,983 UART: [art] Derive Key Pair - Done
2,995,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,139 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,904 UART: [art] PUB.X = 91320BD8381EDBA8054B8F296E527E2E415622BF32E1799FAF7E05319B0B40A42B4E62ABAAC0D8E838C14FDD5AEDF2F8
3,018,678 UART: [art] PUB.Y = 5FA1D6A81FA04D45C3177E655A9E6693FE6F10812DF105C095CCAABE8489C3718901341DA52DBA013C4C232A3A8C2E97
3,025,627 UART: [art] SIG.R = 0C990333B7580CD0E6542BF114C73F4EC962AB26B8FF41A6939B7538AD021720F75D3CD7687C83086FBC0CC9C92E360F
3,032,380 UART: [art] SIG.S = 350586BA4B4B7E7FAEB0C83DEE0AD67DCAF24D7ABDA652EAE82325E3FCFFBCAA4718E400C4442369D852DBD287288FED
3,056,268 UART: Caliptra RT
3,056,519 UART: [state] CFI Enabled
3,176,446 UART: [rt] RT listening for mailbox commands...
3,177,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,096 UART: [rt]cmd =0x44504543, len=24
3,234,836 >>> mbox cmd response data (40 bytes)
3,234,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,264,810 UART: [rt]cmd =0x44504543, len=96
3,308,025 >>> mbox cmd response data (56 bytes)
3,308,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,977 UART: [rt]cmd =0x44504543, len=96
3,380,808 >>> mbox cmd response data (56 bytes)
3,380,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,762 UART: [rt]cmd =0x44504543, len=96
3,455,008 >>> mbox cmd response data (56 bytes)
3,455,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,138 UART: [rt]cmd =0x44504543, len=96
3,528,641 >>> mbox cmd response data (56 bytes)
3,528,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,837 UART: [rt]cmd =0x44504543, len=96
3,602,105 >>> mbox cmd response data (56 bytes)
3,602,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,065 UART: [rt]cmd =0x44504543, len=96
3,675,936 >>> mbox cmd response data (56 bytes)
3,675,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,705,854 UART: [rt]cmd =0x44504543, len=96
3,750,704 >>> mbox cmd response data (56 bytes)
3,750,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,514 UART: [rt]cmd =0x44504543, len=96
3,825,025 >>> mbox cmd response data (56 bytes)
3,825,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,007 UART: [rt]cmd =0x44504543, len=96
3,899,505 >>> mbox cmd response data (56 bytes)
3,899,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,583 UART: [rt]cmd =0x44504543, len=96
3,974,192 >>> mbox cmd response data (56 bytes)
3,974,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,244 UART: [rt]cmd =0x44504543, len=96
4,050,570 >>> mbox cmd response data (56 bytes)
4,050,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,586 UART: [rt]cmd =0x44504543, len=96
4,126,371 >>> mbox cmd response data (56 bytes)
4,126,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,156,159 UART: [rt]cmd =0x44504543, len=96
4,201,707 >>> mbox cmd response data (56 bytes)
4,201,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,575 UART: [rt]cmd =0x44504543, len=96
4,278,588 >>> mbox cmd response data (56 bytes)
4,278,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,376 UART: [rt]cmd =0x44504543, len=96
4,355,404 >>> mbox cmd response data (56 bytes)
4,355,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,385,360 UART: [rt]cmd =0x44504543, len=96
4,392,840 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,265 UART: [state] LifecycleState = Unprovisioned
85,920 UART: [state] DebugLocked = No
86,508 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
893,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,634 UART: [kat] ++
897,786 UART: [kat] sha1
901,978 UART: [kat] SHA2-256
903,918 UART: [kat] SHA2-384
906,773 UART: [kat] SHA2-512-ACC
908,674 UART: [kat] ECC-384
918,555 UART: [kat] HMAC-384Kdf
923,341 UART: [kat] LMS
1,171,669 UART: [kat] --
1,172,664 UART: [cold-reset] ++
1,173,044 UART: [fht] FHT @ 0x50003400
1,175,747 UART: [idev] ++
1,175,915 UART: [idev] CDI.KEYID = 6
1,176,275 UART: [idev] SUBJECT.KEYID = 7
1,176,699 UART: [idev] UDS.KEYID = 0
1,177,044 ready_for_fw is high
1,177,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,703 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,210,076 UART: [idev] --
1,211,210 UART: [ldev] ++
1,211,378 UART: [ldev] CDI.KEYID = 6
1,211,741 UART: [ldev] SUBJECT.KEYID = 5
1,212,167 UART: [ldev] AUTHORITY.KEYID = 7
1,212,630 UART: [ldev] FE.KEYID = 1
1,217,888 UART: [ldev] Erasing FE.KEYID = 1
1,244,541 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,190 UART: [ldev] --
1,283,503 UART: [fwproc] Wait for Commands...
1,284,159 UART: [fwproc] Recv command 0x46574c44
1,284,887 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,166 >>> mbox cmd response: success
2,829,182 UART: [afmc] ++
2,829,350 UART: [afmc] CDI.KEYID = 6
2,829,712 UART: [afmc] SUBJECT.KEYID = 7
2,830,137 UART: [afmc] AUTHORITY.KEYID = 5
2,865,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,031 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,779 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,488 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,371 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,072 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,098 UART: [afmc] --
2,909,112 UART: [cold-reset] --
2,910,200 UART: [state] Locking Datavault
2,911,227 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,831 UART: [state] Locking ICCM
2,912,329 UART: [exit] Launching FMC @ 0x40000130
2,917,659 UART:
2,917,675 UART: Running Caliptra FMC ...
2,918,083 UART:
2,918,226 UART: [state] CFI Enabled
2,928,752 UART: [fht] FMC Alias Private Key: 7
3,047,392 UART: [art] Extend RT PCRs Done
3,047,820 UART: [art] Lock RT PCRs Done
3,049,226 UART: [art] Populate DV Done
3,057,553 UART: [fht] FMC Alias Private Key: 7
3,058,699 UART: [art] Derive CDI
3,058,979 UART: [art] Store in slot 0x4
3,144,634 UART: [art] Derive Key Pair
3,144,994 UART: [art] Store priv key in slot 0x5
3,158,452 UART: [art] Derive Key Pair - Done
3,172,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,135 UART: [art] PUB.X = 770FD92F4D47E0011D55186B0AAE104E06E4BC9C0C1EECFA25CCB74F232A8CDAE98360B69D5E31036EB3FE83620294A3
3,195,898 UART: [art] PUB.Y = 61AD68A891BAD06EE5ED20E099D0B47840C38436180C8EFFB4A71FF3FA41D601FE53EA460B943658C9FF46BBCB2D448F
3,202,855 UART: [art] SIG.R = 9E1B7A5A4B2E8B1DA5B30C9C5B995937E52C3AAC10F217155CEF69097D5B0BFC7DD6A1CEC65ED6802683808F1F2B676B
3,209,632 UART: [art] SIG.S = F49C0274790ACF2B238407B6A0B01E844640E8D557A3F8A0124290E391C01D48133567174BC21977F6C8F727A978B035
3,233,241 UART: Caliptra RT
3,233,584 UART: [state] CFI Enabled
3,353,231 UART: [rt] RT listening for mailbox commands...
3,353,901 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,011 UART: [rt]cmd =0x44504543, len=24
3,411,657 >>> mbox cmd response data (40 bytes)
3,411,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,667 UART: [rt]cmd =0x44504543, len=96
3,484,230 >>> mbox cmd response data (56 bytes)
3,484,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,230 UART: [rt]cmd =0x44504543, len=96
3,557,191 >>> mbox cmd response data (56 bytes)
3,557,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,029 UART: [rt]cmd =0x44504543, len=96
3,630,691 >>> mbox cmd response data (56 bytes)
3,630,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,725 UART: [rt]cmd =0x44504543, len=96
3,703,952 >>> mbox cmd response data (56 bytes)
3,703,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,964 UART: [rt]cmd =0x44504543, len=96
3,777,548 >>> mbox cmd response data (56 bytes)
3,777,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,807,320 UART: [rt]cmd =0x44504543, len=96
3,851,851 >>> mbox cmd response data (56 bytes)
3,851,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,882,023 UART: [rt]cmd =0x44504543, len=96
3,926,133 >>> mbox cmd response data (56 bytes)
3,926,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,956,187 UART: [rt]cmd =0x44504543, len=96
4,001,092 >>> mbox cmd response data (56 bytes)
4,001,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,126 UART: [rt]cmd =0x44504543, len=96
4,076,104 >>> mbox cmd response data (56 bytes)
4,076,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,106,020 UART: [rt]cmd =0x44504543, len=96
4,151,883 >>> mbox cmd response data (56 bytes)
4,151,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,181,963 UART: [rt]cmd =0x44504543, len=96
4,227,651 >>> mbox cmd response data (56 bytes)
4,227,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,257,577 UART: [rt]cmd =0x44504543, len=96
4,303,100 >>> mbox cmd response data (56 bytes)
4,303,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,333,156 UART: [rt]cmd =0x44504543, len=96
4,379,604 >>> mbox cmd response data (56 bytes)
4,379,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,409,544 UART: [rt]cmd =0x44504543, len=96
4,456,605 >>> mbox cmd response data (56 bytes)
4,456,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,486,735 UART: [rt]cmd =0x44504543, len=96
4,533,895 >>> mbox cmd response data (56 bytes)
4,533,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,563,849 UART: [rt]cmd =0x44504543, len=96
4,571,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,626 ready_for_fw is high
1,059,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,305 >>> mbox cmd response: success
2,741,654 UART:
2,741,670 UART: Running Caliptra FMC ...
2,742,078 UART:
2,742,221 UART: [state] CFI Enabled
2,752,495 UART: [fht] FMC Alias Private Key: 7
2,871,233 UART: [art] Extend RT PCRs Done
2,871,661 UART: [art] Lock RT PCRs Done
2,873,343 UART: [art] Populate DV Done
2,881,218 UART: [fht] FMC Alias Private Key: 7
2,882,204 UART: [art] Derive CDI
2,882,484 UART: [art] Store in slot 0x4
2,968,405 UART: [art] Derive Key Pair
2,968,765 UART: [art] Store priv key in slot 0x5
2,981,819 UART: [art] Derive Key Pair - Done
2,996,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,910 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,675 UART: [art] PUB.X = 3D02C3DEFF751D24512FC8FA06CAB40BB7AABAFA733E03B90D81619CD6E7A91858B273BAE578F09411B97806F9582AB3
3,019,441 UART: [art] PUB.Y = A0ECBFFC2B8C0C2362FF8D7DFD6EF670FAEB4A075EF0D335BCE50CC1FB30D3A304F02F280919A54587475A4E6AFF17AB
3,026,404 UART: [art] SIG.R = DF9603EC7F4A15C14A307D32FF858F12FB71AB47019F68F0CC82EF6231EB004C6F31F53673DEBAA821771D83E3926DDC
3,033,158 UART: [art] SIG.S = 40C990176F8A9B4AE3D47802DEFBCCE032C1009C39F18DFCE05B4C56A085F79ABFAF8FA873095CD701B2B6D7C1B6958E
3,056,997 UART: Caliptra RT
3,057,340 UART: [state] CFI Enabled
3,175,848 UART: [rt] RT listening for mailbox commands...
3,176,518 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,578 UART: [rt]cmd =0x44504543, len=24
3,233,678 >>> mbox cmd response data (40 bytes)
3,233,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,700 UART: [rt]cmd =0x44504543, len=96
3,306,025 >>> mbox cmd response data (56 bytes)
3,306,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,999 UART: [rt]cmd =0x44504543, len=96
3,379,156 >>> mbox cmd response data (56 bytes)
3,379,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,140 UART: [rt]cmd =0x44504543, len=96
3,453,246 >>> mbox cmd response data (56 bytes)
3,453,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,256 UART: [rt]cmd =0x44504543, len=96
3,526,657 >>> mbox cmd response data (56 bytes)
3,526,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,463 UART: [rt]cmd =0x44504543, len=96
3,599,707 >>> mbox cmd response data (56 bytes)
3,599,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,687 UART: [rt]cmd =0x44504543, len=96
3,674,516 >>> mbox cmd response data (56 bytes)
3,674,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,704,424 UART: [rt]cmd =0x44504543, len=96
3,748,720 >>> mbox cmd response data (56 bytes)
3,748,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,774 UART: [rt]cmd =0x44504543, len=96
3,823,527 >>> mbox cmd response data (56 bytes)
3,823,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,661 UART: [rt]cmd =0x44504543, len=96
3,898,189 >>> mbox cmd response data (56 bytes)
3,898,190 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,927,947 UART: [rt]cmd =0x44504543, len=96
3,973,158 >>> mbox cmd response data (56 bytes)
3,973,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,002 UART: [rt]cmd =0x44504543, len=96
4,049,092 >>> mbox cmd response data (56 bytes)
4,049,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,330 UART: [rt]cmd =0x44504543, len=96
4,125,591 >>> mbox cmd response data (56 bytes)
4,125,592 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,155,581 UART: [rt]cmd =0x44504543, len=96
4,202,279 >>> mbox cmd response data (56 bytes)
4,202,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,232,225 UART: [rt]cmd =0x44504543, len=96
4,278,910 >>> mbox cmd response data (56 bytes)
4,278,911 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,308,780 UART: [rt]cmd =0x44504543, len=96
4,355,522 >>> mbox cmd response data (56 bytes)
4,355,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,385,382 UART: [rt]cmd =0x44504543, len=96
4,392,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_derive_context_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
192,070 UART:
192,432 UART: Running Caliptra ROM ...
193,630 UART:
193,790 UART: [state] CFI Enabled
267,500 UART: [state] LifecycleState = Unprovisioned
269,425 UART: [state] DebugLocked = No
270,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,039 UART: [kat] SHA2-256
445,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,229 UART: [kat] ++
456,762 UART: [kat] sha1
468,066 UART: [kat] SHA2-256
470,795 UART: [kat] SHA2-384
475,716 UART: [kat] SHA2-512-ACC
478,082 UART: [kat] ECC-384
2,769,356 UART: [kat] HMAC-384Kdf
2,782,368 UART: [kat] LMS
3,972,668 UART: [kat] --
3,976,101 UART: [cold-reset] ++
3,978,319 UART: [fht] Storing FHT @ 0x50003400
3,989,032 UART: [idev] ++
3,989,680 UART: [idev] CDI.KEYID = 6
3,990,592 UART: [idev] SUBJECT.KEYID = 7
3,991,839 UART: [idev] UDS.KEYID = 0
3,992,871 ready_for_fw is high
3,993,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,138 UART: [idev] Erasing UDS.KEYID = 0
7,329,046 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,565 UART: [idev] --
7,353,535 UART: [ldev] ++
7,354,104 UART: [ldev] CDI.KEYID = 6
7,355,085 UART: [ldev] SUBJECT.KEYID = 5
7,356,251 UART: [ldev] AUTHORITY.KEYID = 7
7,357,536 UART: [ldev] FE.KEYID = 1
7,404,076 UART: [ldev] Erasing FE.KEYID = 1
10,737,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,523 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,081,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,250 UART: [ldev] --
13,119,753 UART: [fwproc] Waiting for Commands...
13,122,112 UART: [fwproc] Received command 0x46574c44
13,124,287 UART: [fwproc] Received Image of size 118548 bytes
17,227,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,300,959 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,702,133 >>> mbox cmd response: success
17,707,124 UART: [afmc] ++
17,707,789 UART: [afmc] CDI.KEYID = 6
17,708,678 UART: [afmc] SUBJECT.KEYID = 7
17,709,950 UART: [afmc] AUTHORITY.KEYID = 5
21,064,716 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,138 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,566 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,296 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,692 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,178 UART: [afmc] --
23,445,365 UART: [cold-reset] --
23,450,526 UART: [state] Locking Datavault
23,455,513 UART: [state] Locking PCR0, PCR1 and PCR31
23,457,251 UART: [state] Locking ICCM
23,458,762 UART: [exit] Launching FMC @ 0x40000130
23,467,161 UART:
23,467,402 UART: Running Caliptra FMC ...
23,468,502 UART:
23,468,662 UART: [state] CFI Enabled
23,531,643 UART: [fht] FMC Alias Private Key: 7
25,871,785 UART: [art] Extend RT PCRs Done
25,873,007 UART: [art] Lock RT PCRs Done
25,874,529 UART: [art] Populate DV Done
25,879,882 UART: [fht] FMC Alias Private Key: 7
25,881,478 UART: [art] Derive CDI
25,882,288 UART: [art] Store in slot 0x4
25,941,377 UART: [art] Derive Key Pair
25,942,416 UART: [art] Store priv key in slot 0x5
29,235,574 UART: [art] Derive Key Pair - Done
29,248,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,342 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,845 UART: [art] PUB.X = B79BAF8BE396CA2589B8010DE751FC8E8CF8A084E8FDF6ECEF7512828108E8E55B06D0622102978201E0B893AF4A7323
31,546,142 UART: [art] PUB.Y = AA4FF9821DCB50586715D925ADFE7ECD4A425FFDD56AE3DFC12D3ECD1CA4BC412CE342F4740E92A4494DD72F9B17D664
31,553,420 UART: [art] SIG.R = B1476828350778F8E98E796F6A7ACEE82BF2686CBC25F26AE541485CA902FCB6E37DBBE644D03F51AFCFB99430D901EC
31,560,808 UART: [art] SIG.S = A06FABC6207347EF56A5FA63F3B3E8A676B54A09833D2EE1A01BFF3864FDA779ECF5E4056EDD4B689514A8B7C8D424DE
32,865,866 UART: Caliptra RT
32,866,584 UART: [state] CFI Enabled
33,042,877 UART: [rt] RT listening for mailbox commands...
33,044,809 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,074,788 UART: [rt]cmd =0x44504543, len=24
33,123,593 >>> mbox cmd response data (40 bytes)
33,124,428 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,154,455 UART: [rt]cmd =0x44504543, len=24
33,187,978 >>> mbox cmd response data (40 bytes)
33,188,606 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,218,578 UART: [rt]cmd =0x44504543, len=24
33,252,138 >>> mbox cmd response data (40 bytes)
33,252,768 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,282,665 UART: [rt]cmd =0x44504543, len=24
33,316,055 >>> mbox cmd response data (40 bytes)
33,316,714 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,346,469 UART: [rt]cmd =0x44504543, len=24
33,380,141 >>> mbox cmd response data (40 bytes)
33,380,791 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,410,691 UART: [rt]cmd =0x44504543, len=24
33,444,274 >>> mbox cmd response data (40 bytes)
33,444,880 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,474,743 UART: [rt]cmd =0x44504543, len=24
33,508,682 >>> mbox cmd response data (40 bytes)
33,509,301 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,539,374 UART: [rt]cmd =0x44504543, len=24
33,572,402 >>> mbox cmd response data (40 bytes)
33,573,015 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,603,075 UART: [rt]cmd =0x44504543, len=24
33,636,505 >>> mbox cmd response data (40 bytes)
33,637,161 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,667,110 UART: [rt]cmd =0x44504543, len=24
33,700,563 >>> mbox cmd response data (40 bytes)
33,701,211 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,731,217 UART: [rt]cmd =0x44504543, len=24
33,764,362 >>> mbox cmd response data (40 bytes)
33,764,975 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,795,103 UART: [rt]cmd =0x44504543, len=24
33,828,502 >>> mbox cmd response data (40 bytes)
33,829,117 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,859,029 UART: [rt]cmd =0x44504543, len=24
33,892,760 >>> mbox cmd response data (40 bytes)
33,893,370 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,923,152 UART: [rt]cmd =0x44504543, len=24
33,956,932 >>> mbox cmd response data (40 bytes)
33,957,600 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,987,389 UART: [rt]cmd =0x44504543, len=24
34,020,931 >>> mbox cmd response data (40 bytes)
34,021,598 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,051,391 UART: [rt]cmd =0x44504543, len=24
34,085,134 >>> mbox cmd response data (40 bytes)
34,085,738 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,115,699 UART: [rt]cmd =0x44504543, len=24
34,122,463 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,806,923 ready_for_fw is high
3,807,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,926 >>> mbox cmd response: success
23,652,596 UART:
23,652,992 UART: Running Caliptra FMC ...
23,654,123 UART:
23,654,287 UART: [state] CFI Enabled
23,720,459 UART: [fht] FMC Alias Private Key: 7
26,060,712 UART: [art] Extend RT PCRs Done
26,061,944 UART: [art] Lock RT PCRs Done
26,063,626 UART: [art] Populate DV Done
26,068,943 UART: [fht] FMC Alias Private Key: 7
26,070,538 UART: [art] Derive CDI
26,071,574 UART: [art] Store in slot 0x4
26,127,769 UART: [art] Derive Key Pair
26,128,776 UART: [art] Store priv key in slot 0x5
29,421,830 UART: [art] Derive Key Pair - Done
29,434,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,722,239 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,755 UART: [art] PUB.X = 82F6C707388683230C8D0E8628D1F392AFE5867FD9E98FCF3B61313BA9F4AC0995C08E811A2352C8CE0C4AC729B63F61
31,731,010 UART: [art] PUB.Y = 13F1DEF9146A35D5C370E427567B6A68055F1CF7C244B834FD4DC2F1FF3E558F41C0F7D9D64AF2FB8F4AE2D6752E8639
31,738,250 UART: [art] SIG.R = D285355115B8BB9A0BBB5B80CADA930AB092E693C34232AAF61EA3E4656BAD8D5180F4B452E4BF5C42C9F29FC7D07AEF
31,745,700 UART: [art] SIG.S = 49E373F5A930068855D7001CD9938677198190C87A2A427B45B0EA82CC49657257B84FD002F75D491685E7A645C6BBF1
33,050,846 UART: Caliptra RT
33,051,558 UART: [state] CFI Enabled
33,226,889 UART: [rt] RT listening for mailbox commands...
33,228,807 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,258,827 UART: [rt]cmd =0x44504543, len=24
33,307,435 >>> mbox cmd response data (40 bytes)
33,308,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,338,327 UART: [rt]cmd =0x44504543, len=24
33,371,817 >>> mbox cmd response data (40 bytes)
33,372,488 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,402,356 UART: [rt]cmd =0x44504543, len=24
33,435,696 >>> mbox cmd response data (40 bytes)
33,436,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,466,323 UART: [rt]cmd =0x44504543, len=24
33,499,432 >>> mbox cmd response data (40 bytes)
33,500,044 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,529,974 UART: [rt]cmd =0x44504543, len=24
33,563,513 >>> mbox cmd response data (40 bytes)
33,564,137 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,594,059 UART: [rt]cmd =0x44504543, len=24
33,627,573 >>> mbox cmd response data (40 bytes)
33,628,195 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,657,876 UART: [rt]cmd =0x44504543, len=24
33,692,284 >>> mbox cmd response data (40 bytes)
33,692,933 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,722,834 UART: [rt]cmd =0x44504543, len=24
33,755,801 >>> mbox cmd response data (40 bytes)
33,756,442 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,786,236 UART: [rt]cmd =0x44504543, len=24
33,819,981 >>> mbox cmd response data (40 bytes)
33,820,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,850,444 UART: [rt]cmd =0x44504543, len=24
33,884,440 >>> mbox cmd response data (40 bytes)
33,885,057 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,914,753 UART: [rt]cmd =0x44504543, len=24
33,948,643 >>> mbox cmd response data (40 bytes)
33,949,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,979,154 UART: [rt]cmd =0x44504543, len=24
34,012,371 >>> mbox cmd response data (40 bytes)
34,013,035 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,042,935 UART: [rt]cmd =0x44504543, len=24
34,076,544 >>> mbox cmd response data (40 bytes)
34,077,221 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,107,120 UART: [rt]cmd =0x44504543, len=24
34,140,708 >>> mbox cmd response data (40 bytes)
34,141,318 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,171,174 UART: [rt]cmd =0x44504543, len=24
34,204,524 >>> mbox cmd response data (40 bytes)
34,205,144 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,235,163 UART: [rt]cmd =0x44504543, len=24
34,268,195 >>> mbox cmd response data (40 bytes)
34,268,805 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,298,644 UART: [rt]cmd =0x44504543, len=24
34,305,528 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,343 UART:
192,724 UART: Running Caliptra ROM ...
193,815 UART:
603,667 UART: [state] CFI Enabled
613,933 UART: [state] LifecycleState = Unprovisioned
615,803 UART: [state] DebugLocked = No
618,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,882 UART: [kat] SHA2-256
793,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,138 UART: [kat] ++
804,652 UART: [kat] sha1
815,363 UART: [kat] SHA2-256
818,030 UART: [kat] SHA2-384
824,450 UART: [kat] SHA2-512-ACC
826,822 UART: [kat] ECC-384
3,112,959 UART: [kat] HMAC-384Kdf
3,125,871 UART: [kat] LMS
4,316,022 UART: [kat] --
4,320,094 UART: [cold-reset] ++
4,321,174 UART: [fht] Storing FHT @ 0x50003400
4,332,538 UART: [idev] ++
4,333,145 UART: [idev] CDI.KEYID = 6
4,334,030 UART: [idev] SUBJECT.KEYID = 7
4,335,218 UART: [idev] UDS.KEYID = 0
4,336,352 ready_for_fw is high
4,336,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,481 UART: [idev] Erasing UDS.KEYID = 0
7,621,615 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,434 UART: [idev] --
7,647,643 UART: [ldev] ++
7,648,206 UART: [ldev] CDI.KEYID = 6
7,649,166 UART: [ldev] SUBJECT.KEYID = 5
7,650,371 UART: [ldev] AUTHORITY.KEYID = 7
7,651,668 UART: [ldev] FE.KEYID = 1
7,663,606 UART: [ldev] Erasing FE.KEYID = 1
10,952,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,818 UART: [ldev] --
13,313,132 UART: [fwproc] Waiting for Commands...
13,315,325 UART: [fwproc] Received command 0x46574c44
13,317,497 UART: [fwproc] Received Image of size 118548 bytes
17,425,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,971 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,140 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,922 >>> mbox cmd response: success
17,907,764 UART: [afmc] ++
17,908,405 UART: [afmc] CDI.KEYID = 6
17,909,316 UART: [afmc] SUBJECT.KEYID = 7
17,910,522 UART: [afmc] AUTHORITY.KEYID = 5
21,221,108 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,882 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,267 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,664 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,852 UART: [afmc] --
23,584,393 UART: [cold-reset] --
23,587,870 UART: [state] Locking Datavault
23,591,813 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,501 UART: [state] Locking ICCM
23,596,292 UART: [exit] Launching FMC @ 0x40000130
23,604,680 UART:
23,604,937 UART: Running Caliptra FMC ...
23,606,157 UART:
23,606,319 UART: [state] CFI Enabled
23,613,743 UART: [fht] FMC Alias Private Key: 7
25,954,243 UART: [art] Extend RT PCRs Done
25,955,466 UART: [art] Lock RT PCRs Done
25,957,198 UART: [art] Populate DV Done
25,962,661 UART: [fht] FMC Alias Private Key: 7
25,964,248 UART: [art] Derive CDI
25,965,055 UART: [art] Store in slot 0x4
26,007,492 UART: [art] Derive Key Pair
26,008,536 UART: [art] Store priv key in slot 0x5
29,250,308 UART: [art] Derive Key Pair - Done
29,263,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,363 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,863 UART: [art] PUB.X = 6DE3F1126DD6C97628817455E591B3E18BBCD8CA505E98BE878292C2F3364A51EEDB48F97A56AC7FB63A99474BF7550E
31,552,174 UART: [art] PUB.Y = E1328119BE1B2C9F316D421EA13883F677EBBF9FB7C3142750DFA58451D752DBE23E73778CB2B3D7FE8330AFF63D4671
31,559,394 UART: [art] SIG.R = 5C8E173E72C0C83FF03C1AEBB80A02E6C304958B42726EAC3B2140F349BFCCC8D1BB4119D3EE49D9DA7D244D10D57494
31,566,828 UART: [art] SIG.S = FE83C1DC104F94FB92EC977344DBF38F649499CE75F70C237C560264D2CBA58C3170A0A40B49B2A63559B98422C5E09E
32,872,376 UART: Caliptra RT
32,873,088 UART: [state] CFI Enabled
33,006,747 UART: [rt] RT listening for mailbox commands...
33,008,678 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,038,750 UART: [rt]cmd =0x44504543, len=24
33,066,239 >>> mbox cmd response data (40 bytes)
33,067,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,097,089 UART: [rt]cmd =0x44504543, len=24
33,124,634 >>> mbox cmd response data (40 bytes)
33,125,438 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,155,418 UART: [rt]cmd =0x44504543, len=24
33,183,008 >>> mbox cmd response data (40 bytes)
33,183,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,213,453 UART: [rt]cmd =0x44504543, len=24
33,241,296 >>> mbox cmd response data (40 bytes)
33,241,926 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,271,711 UART: [rt]cmd =0x44504543, len=24
33,299,411 >>> mbox cmd response data (40 bytes)
33,300,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,329,802 UART: [rt]cmd =0x44504543, len=24
33,357,767 >>> mbox cmd response data (40 bytes)
33,358,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,388,278 UART: [rt]cmd =0x44504543, len=24
33,416,117 >>> mbox cmd response data (40 bytes)
33,416,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,446,684 UART: [rt]cmd =0x44504543, len=24
33,473,924 >>> mbox cmd response data (40 bytes)
33,474,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,504,638 UART: [rt]cmd =0x44504543, len=24
33,532,468 >>> mbox cmd response data (40 bytes)
33,533,132 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,563,079 UART: [rt]cmd =0x44504543, len=24
33,590,938 >>> mbox cmd response data (40 bytes)
33,591,538 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,621,494 UART: [rt]cmd =0x44504543, len=24
33,649,544 >>> mbox cmd response data (40 bytes)
33,650,170 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,680,004 UART: [rt]cmd =0x44504543, len=24
33,707,500 >>> mbox cmd response data (40 bytes)
33,708,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,738,255 UART: [rt]cmd =0x44504543, len=24
33,765,848 >>> mbox cmd response data (40 bytes)
33,766,489 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,796,328 UART: [rt]cmd =0x44504543, len=24
33,824,022 >>> mbox cmd response data (40 bytes)
33,824,639 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,854,599 UART: [rt]cmd =0x44504543, len=24
33,882,385 >>> mbox cmd response data (40 bytes)
33,882,994 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,913,044 UART: [rt]cmd =0x44504543, len=24
33,940,916 >>> mbox cmd response data (40 bytes)
33,941,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,971,395 UART: [rt]cmd =0x44504543, len=24
33,978,222 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,031 writing to cptra_bootfsm_go
4,141,592 ready_for_fw is high
4,142,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,178,444 >>> mbox cmd response: success
23,815,324 UART:
23,816,188 UART: Running Caliptra FMC ...
23,817,322 UART:
23,817,539 UART: [state] CFI Enabled
23,824,902 UART: [fht] FMC Alias Private Key: 7
26,164,597 UART: [art] Extend RT PCRs Done
26,165,832 UART: [art] Lock RT PCRs Done
26,167,358 UART: [art] Populate DV Done
26,172,569 UART: [fht] FMC Alias Private Key: 7
26,174,056 UART: [art] Derive CDI
26,174,819 UART: [art] Store in slot 0x4
26,217,566 UART: [art] Derive Key Pair
26,218,561 UART: [art] Store priv key in slot 0x5
29,460,876 UART: [art] Derive Key Pair - Done
29,473,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,012 UART: [art] Erasing AUTHORITY.KEYID = 7
31,755,517 UART: [art] PUB.X = 521808C38004AA10532533C20A8CDFE38AB3293C5E8B941495DBCA85A3C492FF606BB5086BB3A01C0E38B68844872F6A
31,762,762 UART: [art] PUB.Y = 2284B7890A42141F8AC6A6FA89B679CB93DF1A067ACAF6E490CC59FF9A3CC5087E3AB3BE3959B902D2E4C2E97884D391
31,770,044 UART: [art] SIG.R = 8EDA2B2A1D81B24CF819AEA9C75C1574D11511B25EB520EAEC46504C3798C318AF2C6900257EEB7A2702F834B4D69C80
31,777,449 UART: [art] SIG.S = EAE554E60DF3A9A3CC6CABDBBCF2A0BBAF4555E5A7D4221734837D75AA7781C37D604A4E2E63797441E2AEA67AFA22A9
33,082,773 UART: Caliptra RT
33,083,472 UART: [state] CFI Enabled
33,216,941 UART: [rt] RT listening for mailbox commands...
33,218,875 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,249,121 UART: [rt]cmd =0x44504543, len=24
33,276,439 >>> mbox cmd response data (40 bytes)
33,277,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,307,226 UART: [rt]cmd =0x44504543, len=24
33,335,397 >>> mbox cmd response data (40 bytes)
33,336,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,365,992 UART: [rt]cmd =0x44504543, len=24
33,394,122 >>> mbox cmd response data (40 bytes)
33,394,756 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,424,812 UART: [rt]cmd =0x44504543, len=24
33,452,193 >>> mbox cmd response data (40 bytes)
33,452,843 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,482,741 UART: [rt]cmd =0x44504543, len=24
33,510,572 >>> mbox cmd response data (40 bytes)
33,511,184 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,541,056 UART: [rt]cmd =0x44504543, len=24
33,568,323 >>> mbox cmd response data (40 bytes)
33,568,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,598,896 UART: [rt]cmd =0x44504543, len=24
33,626,342 >>> mbox cmd response data (40 bytes)
33,626,987 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,657,046 UART: [rt]cmd =0x44504543, len=24
33,685,136 >>> mbox cmd response data (40 bytes)
33,685,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,715,768 UART: [rt]cmd =0x44504543, len=24
33,743,300 >>> mbox cmd response data (40 bytes)
33,743,907 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,773,973 UART: [rt]cmd =0x44504543, len=24
33,801,539 >>> mbox cmd response data (40 bytes)
33,802,150 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,832,206 UART: [rt]cmd =0x44504543, len=24
33,860,068 >>> mbox cmd response data (40 bytes)
33,860,712 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,890,552 UART: [rt]cmd =0x44504543, len=24
33,918,076 >>> mbox cmd response data (40 bytes)
33,918,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
33,948,538 UART: [rt]cmd =0x44504543, len=24
33,975,995 >>> mbox cmd response data (40 bytes)
33,976,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,006,640 UART: [rt]cmd =0x44504543, len=24
34,034,423 >>> mbox cmd response data (40 bytes)
34,035,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,064,886 UART: [rt]cmd =0x44504543, len=24
34,092,431 >>> mbox cmd response data (40 bytes)
34,093,071 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,123,023 UART: [rt]cmd =0x44504543, len=24
34,151,203 >>> mbox cmd response data (40 bytes)
34,151,793 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,181,698 UART: [rt]cmd =0x44504543, len=24
34,188,454 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,160 UART:
192,523 UART: Running Caliptra ROM ...
193,696 UART:
193,849 UART: [state] CFI Enabled
266,083 UART: [state] LifecycleState = Unprovisioned
268,079 UART: [state] DebugLocked = No
269,406 UART: [state] WD Timer not started. Device not locked for debugging
272,381 UART: [kat] SHA2-256
452,062 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,835 UART: [kat] ++
463,367 UART: [kat] sha1
474,883 UART: [kat] SHA2-256
477,590 UART: [kat] SHA2-384
482,574 UART: [kat] SHA2-512-ACC
484,928 UART: [kat] ECC-384
2,947,806 UART: [kat] HMAC-384Kdf
2,972,117 UART: [kat] LMS
3,448,640 UART: [kat] --
3,452,698 UART: [cold-reset] ++
3,454,908 UART: [fht] FHT @ 0x50003400
3,467,587 UART: [idev] ++
3,468,143 UART: [idev] CDI.KEYID = 6
3,469,169 UART: [idev] SUBJECT.KEYID = 7
3,470,332 UART: [idev] UDS.KEYID = 0
3,471,270 ready_for_fw is high
3,471,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,474 UART: [idev] Erasing UDS.KEYID = 0
5,989,642 UART: [idev] Sha1 KeyId Algorithm
6,012,765 UART: [idev] --
6,018,279 UART: [ldev] ++
6,018,855 UART: [ldev] CDI.KEYID = 6
6,019,919 UART: [ldev] SUBJECT.KEYID = 5
6,021,023 UART: [ldev] AUTHORITY.KEYID = 7
6,022,198 UART: [ldev] FE.KEYID = 1
6,057,367 UART: [ldev] Erasing FE.KEYID = 1
8,566,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,168 UART: [ldev] --
10,374,453 UART: [fwproc] Wait for Commands...
10,377,070 UART: [fwproc] Recv command 0x46574c44
10,379,074 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,055 >>> mbox cmd response: success
14,350,383 UART: [afmc] ++
14,350,994 UART: [afmc] CDI.KEYID = 6
14,351,907 UART: [afmc] SUBJECT.KEYID = 7
14,353,119 UART: [afmc] AUTHORITY.KEYID = 5
16,896,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,348 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,530 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,314 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,968 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,645 UART: [afmc] --
18,700,384 UART: [cold-reset] --
18,705,269 UART: [state] Locking Datavault
18,712,732 UART: [state] Locking PCR0, PCR1 and PCR31
18,714,424 UART: [state] Locking ICCM
18,716,134 UART: [exit] Launching FMC @ 0x40000130
18,724,578 UART:
18,724,820 UART: Running Caliptra FMC ...
18,725,869 UART:
18,726,019 UART: [state] CFI Enabled
18,777,056 UART: [fht] FMC Alias Private Key: 7
20,564,524 UART: [art] Extend RT PCRs Done
20,565,748 UART: [art] Lock RT PCRs Done
20,567,456 UART: [art] Populate DV Done
20,572,889 UART: [fht] FMC Alias Private Key: 7
20,574,586 UART: [art] Derive CDI
20,575,399 UART: [art] Store in slot 0x4
20,630,664 UART: [art] Derive Key Pair
20,631,702 UART: [art] Store priv key in slot 0x5
23,094,604 UART: [art] Derive Key Pair - Done
23,107,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,820,234 UART: [art] Erasing AUTHORITY.KEYID = 7
24,821,732 UART: [art] PUB.X = C7C992D2503D8104368F1E5E153C4B9BFAE4E34ECD0DBEDDB848C2E0A36A9B3DF07418886815A6741AFFD3E14E6B62C1
24,829,039 UART: [art] PUB.Y = 6B016989F4B2C2A335F4C0B0C1BD1F7F99E83C058E0A642E1BC3CC531C5991FA8F6675BDACED0A7C072B6BC07D28BED7
24,836,325 UART: [art] SIG.R = 0E9F8817B3F1298642148E684FD30E615D3DFD7EA460DA61F5869FD93BC96E80ADEA623A474CBA62F0397C832AC11B58
24,843,707 UART: [art] SIG.S = 2DA8940C49D919C25617779B5F7C29A6397A529E449560ADC94A331D32527B680B10BB74149D66EDB594E22F21BBA846
25,822,252 UART: Caliptra RT
25,822,942 UART: [state] CFI Enabled
26,002,626 UART: [rt] RT listening for mailbox commands...
26,004,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,034,597 UART: [rt]cmd =0x44504543, len=24
26,063,063 >>> mbox cmd response data (40 bytes)
26,063,902 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,093,595 UART: [rt]cmd =0x44504543, len=24
26,127,296 >>> mbox cmd response data (40 bytes)
26,127,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,157,931 UART: [rt]cmd =0x44504543, len=24
26,191,229 >>> mbox cmd response data (40 bytes)
26,191,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,221,758 UART: [rt]cmd =0x44504543, len=24
26,255,430 >>> mbox cmd response data (40 bytes)
26,256,047 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,286,001 UART: [rt]cmd =0x44504543, len=24
26,319,279 >>> mbox cmd response data (40 bytes)
26,319,938 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,349,565 UART: [rt]cmd =0x44504543, len=24
26,383,118 >>> mbox cmd response data (40 bytes)
26,383,767 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,413,661 UART: [rt]cmd =0x44504543, len=24
26,447,463 >>> mbox cmd response data (40 bytes)
26,448,074 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,478,149 UART: [rt]cmd =0x44504543, len=24
26,511,388 >>> mbox cmd response data (40 bytes)
26,512,005 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,542,030 UART: [rt]cmd =0x44504543, len=24
26,575,379 >>> mbox cmd response data (40 bytes)
26,576,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,605,797 UART: [rt]cmd =0x44504543, len=24
26,639,596 >>> mbox cmd response data (40 bytes)
26,640,245 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,093 UART: [rt]cmd =0x44504543, len=24
26,703,660 >>> mbox cmd response data (40 bytes)
26,704,354 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,734,205 UART: [rt]cmd =0x44504543, len=24
26,768,007 >>> mbox cmd response data (40 bytes)
26,768,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,798,435 UART: [rt]cmd =0x44504543, len=24
26,831,731 >>> mbox cmd response data (40 bytes)
26,832,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,862,418 UART: [rt]cmd =0x44504543, len=24
26,895,930 >>> mbox cmd response data (40 bytes)
26,896,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,926,431 UART: [rt]cmd =0x44504543, len=24
26,960,125 >>> mbox cmd response data (40 bytes)
26,960,774 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,990,724 UART: [rt]cmd =0x44504543, len=24
27,024,151 >>> mbox cmd response data (40 bytes)
27,024,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,054,602 UART: [rt]cmd =0x44504543, len=24
27,061,383 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,464,746 ready_for_fw is high
3,465,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,655 >>> mbox cmd response: success
18,557,359 UART:
18,557,768 UART: Running Caliptra FMC ...
18,558,879 UART:
18,559,029 UART: [state] CFI Enabled
18,625,675 UART: [fht] FMC Alias Private Key: 7
20,413,279 UART: [art] Extend RT PCRs Done
20,414,500 UART: [art] Lock RT PCRs Done
20,416,334 UART: [art] Populate DV Done
20,421,807 UART: [fht] FMC Alias Private Key: 7
20,423,293 UART: [art] Derive CDI
20,424,025 UART: [art] Store in slot 0x4
20,479,230 UART: [art] Derive Key Pair
20,480,273 UART: [art] Store priv key in slot 0x5
22,943,157 UART: [art] Derive Key Pair - Done
22,956,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,451 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,935 UART: [art] PUB.X = 5C535EFA71B7C50F29EEB3DCD15B9AFA3FBA305AF5538C2D0BFE59A24526024084308FA5BF152F35FAA2BB7382770EC2
24,677,187 UART: [art] PUB.Y = E4BB82F57A823BA12E5F228F5F128EBD1E563AE3C3C21C762C81920533DD89C032F3953F15D694BEA4C2EEF727F1686C
24,684,450 UART: [art] SIG.R = FE5F7D2551B2717443DDF02D1406C3F83F3C12F406E113DC7D5AD0DB8E21B67F222C227CF8E70CDB1CD358C6A254977D
24,691,896 UART: [art] SIG.S = C33348B455641D945D5A641A8A9410A841CCFDDED713EA4DB280A81E1E90D5C95990BFFE5D403418AC65D2B40144853D
25,670,483 UART: Caliptra RT
25,671,198 UART: [state] CFI Enabled
25,850,523 UART: [rt] RT listening for mailbox commands...
25,852,469 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,882,601 UART: [rt]cmd =0x44504543, len=24
25,911,445 >>> mbox cmd response data (40 bytes)
25,912,234 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,942,136 UART: [rt]cmd =0x44504543, len=24
25,975,425 >>> mbox cmd response data (40 bytes)
25,976,102 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,006,003 UART: [rt]cmd =0x44504543, len=24
26,039,387 >>> mbox cmd response data (40 bytes)
26,040,027 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,069,954 UART: [rt]cmd =0x44504543, len=24
26,103,632 >>> mbox cmd response data (40 bytes)
26,104,261 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,134,328 UART: [rt]cmd =0x44504543, len=24
26,167,489 >>> mbox cmd response data (40 bytes)
26,168,131 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,197,886 UART: [rt]cmd =0x44504543, len=24
26,231,546 >>> mbox cmd response data (40 bytes)
26,232,206 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,262,212 UART: [rt]cmd =0x44504543, len=24
26,295,535 >>> mbox cmd response data (40 bytes)
26,296,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,326,201 UART: [rt]cmd =0x44504543, len=24
26,359,524 >>> mbox cmd response data (40 bytes)
26,360,133 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,389,987 UART: [rt]cmd =0x44504543, len=24
26,423,603 >>> mbox cmd response data (40 bytes)
26,424,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,454,074 UART: [rt]cmd =0x44504543, len=24
26,487,912 >>> mbox cmd response data (40 bytes)
26,488,527 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,518,310 UART: [rt]cmd =0x44504543, len=24
26,552,037 >>> mbox cmd response data (40 bytes)
26,552,695 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,582,430 UART: [rt]cmd =0x44504543, len=24
26,616,080 >>> mbox cmd response data (40 bytes)
26,616,742 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,646,480 UART: [rt]cmd =0x44504543, len=24
26,680,122 >>> mbox cmd response data (40 bytes)
26,680,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,710,868 UART: [rt]cmd =0x44504543, len=24
26,744,380 >>> mbox cmd response data (40 bytes)
26,745,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,775,082 UART: [rt]cmd =0x44504543, len=24
26,808,163 >>> mbox cmd response data (40 bytes)
26,808,790 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,838,792 UART: [rt]cmd =0x44504543, len=24
26,872,231 >>> mbox cmd response data (40 bytes)
26,872,898 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,902,905 UART: [rt]cmd =0x44504543, len=24
26,909,902 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,467 UART:
192,833 UART: Running Caliptra ROM ...
193,969 UART:
603,457 UART: [state] CFI Enabled
618,354 UART: [state] LifecycleState = Unprovisioned
620,300 UART: [state] DebugLocked = No
623,261 UART: [state] WD Timer not started. Device not locked for debugging
627,646 UART: [kat] SHA2-256
807,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,108 UART: [kat] ++
818,559 UART: [kat] sha1
828,367 UART: [kat] SHA2-256
831,094 UART: [kat] SHA2-384
836,732 UART: [kat] SHA2-512-ACC
839,102 UART: [kat] ECC-384
3,284,239 UART: [kat] HMAC-384Kdf
3,297,675 UART: [kat] LMS
3,774,233 UART: [kat] --
3,778,585 UART: [cold-reset] ++
3,780,333 UART: [fht] FHT @ 0x50003400
3,791,674 UART: [idev] ++
3,792,250 UART: [idev] CDI.KEYID = 6
3,793,301 UART: [idev] SUBJECT.KEYID = 7
3,794,480 UART: [idev] UDS.KEYID = 0
3,795,407 ready_for_fw is high
3,795,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,450 UART: [idev] Erasing UDS.KEYID = 0
6,273,162 UART: [idev] Sha1 KeyId Algorithm
6,297,036 UART: [idev] --
6,302,014 UART: [ldev] ++
6,302,589 UART: [ldev] CDI.KEYID = 6
6,303,662 UART: [ldev] SUBJECT.KEYID = 5
6,304,772 UART: [ldev] AUTHORITY.KEYID = 7
6,306,003 UART: [ldev] FE.KEYID = 1
6,318,328 UART: [ldev] Erasing FE.KEYID = 1
8,798,005 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,680 UART: [ldev] --
10,594,849 UART: [fwproc] Wait for Commands...
10,597,112 UART: [fwproc] Recv command 0x46574c44
10,599,156 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,835 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,846 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,845 >>> mbox cmd response: success
14,567,694 UART: [afmc] ++
14,568,309 UART: [afmc] CDI.KEYID = 6
14,569,228 UART: [afmc] SUBJECT.KEYID = 7
14,570,446 UART: [afmc] AUTHORITY.KEYID = 5
17,073,835 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,694 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,783 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,384 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,409 UART: [afmc] --
18,869,466 UART: [cold-reset] --
18,871,766 UART: [state] Locking Datavault
18,877,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,931 UART: [state] Locking ICCM
18,881,512 UART: [exit] Launching FMC @ 0x40000130
18,889,919 UART:
18,890,156 UART: Running Caliptra FMC ...
18,891,255 UART:
18,891,412 UART: [state] CFI Enabled
18,899,838 UART: [fht] FMC Alias Private Key: 7
20,665,575 UART: [art] Extend RT PCRs Done
20,666,810 UART: [art] Lock RT PCRs Done
20,668,385 UART: [art] Populate DV Done
20,673,803 UART: [fht] FMC Alias Private Key: 7
20,675,288 UART: [art] Derive CDI
20,676,102 UART: [art] Store in slot 0x4
20,718,588 UART: [art] Derive Key Pair
20,719,587 UART: [art] Store priv key in slot 0x5
23,146,035 UART: [art] Derive Key Pair - Done
23,158,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,331 UART: [art] PUB.X = A7B5DB93DCC0B53BF5B21302CC9471102800224F6CFC109BBE8DF26138B6E1548889AD33A1F89C38BB17B3B9EBE8147B
24,873,576 UART: [art] PUB.Y = 7B743E3C986B1C1D2D826B2CD4A8CD6407347388A06299E101114D2235199E7DAECAE0E277299A884E8B4BEEFB4A0276
24,880,865 UART: [art] SIG.R = 7894FFD6F74BAB74FE7C2638BA8E5B5BDCB6E84165C82A433F3799F3CA01EF1034ACE08DB57C84A536A46CC47BE3C43A
24,888,263 UART: [art] SIG.S = 39CD28E7A9F3103F1A6DDAB34DC5953DFC01A27C0FAA89039283552B5FD9CD58F36693616C1E1462B5DC107ECEB80B26
25,867,309 UART: Caliptra RT
25,868,014 UART: [state] CFI Enabled
26,001,295 UART: [rt] RT listening for mailbox commands...
26,003,217 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,033,189 UART: [rt]cmd =0x44504543, len=24
26,060,988 >>> mbox cmd response data (40 bytes)
26,061,789 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,091,528 UART: [rt]cmd =0x44504543, len=24
26,119,297 >>> mbox cmd response data (40 bytes)
26,119,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,149,806 UART: [rt]cmd =0x44504543, len=24
26,176,969 >>> mbox cmd response data (40 bytes)
26,177,632 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,207,701 UART: [rt]cmd =0x44504543, len=24
26,234,750 >>> mbox cmd response data (40 bytes)
26,235,371 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,265,011 UART: [rt]cmd =0x44504543, len=24
26,292,963 >>> mbox cmd response data (40 bytes)
26,293,609 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,323,185 UART: [rt]cmd =0x44504543, len=24
26,351,046 >>> mbox cmd response data (40 bytes)
26,351,702 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,381,713 UART: [rt]cmd =0x44504543, len=24
26,408,865 >>> mbox cmd response data (40 bytes)
26,409,467 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,439,323 UART: [rt]cmd =0x44504543, len=24
26,466,949 >>> mbox cmd response data (40 bytes)
26,467,568 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,497,595 UART: [rt]cmd =0x44504543, len=24
26,525,108 >>> mbox cmd response data (40 bytes)
26,525,737 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,555,688 UART: [rt]cmd =0x44504543, len=24
26,583,016 >>> mbox cmd response data (40 bytes)
26,583,675 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,613,542 UART: [rt]cmd =0x44504543, len=24
26,640,651 >>> mbox cmd response data (40 bytes)
26,641,265 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,899 UART: [rt]cmd =0x44504543, len=24
26,698,578 >>> mbox cmd response data (40 bytes)
26,699,204 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,728,993 UART: [rt]cmd =0x44504543, len=24
26,756,638 >>> mbox cmd response data (40 bytes)
26,757,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,787,402 UART: [rt]cmd =0x44504543, len=24
26,815,428 >>> mbox cmd response data (40 bytes)
26,816,139 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,846,152 UART: [rt]cmd =0x44504543, len=24
26,874,120 >>> mbox cmd response data (40 bytes)
26,874,728 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,904,793 UART: [rt]cmd =0x44504543, len=24
26,932,216 >>> mbox cmd response data (40 bytes)
26,932,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,962,612 UART: [rt]cmd =0x44504543, len=24
26,969,445 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
3,774,164 ready_for_fw is high
3,774,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,433,364 >>> mbox cmd response: success
18,680,374 UART:
18,680,762 UART: Running Caliptra FMC ...
18,681,882 UART:
18,682,039 UART: [state] CFI Enabled
18,690,016 UART: [fht] FMC Alias Private Key: 7
20,455,749 UART: [art] Extend RT PCRs Done
20,456,981 UART: [art] Lock RT PCRs Done
20,458,533 UART: [art] Populate DV Done
20,463,953 UART: [fht] FMC Alias Private Key: 7
20,465,536 UART: [art] Derive CDI
20,466,283 UART: [art] Store in slot 0x4
20,509,069 UART: [art] Derive Key Pair
20,510,073 UART: [art] Store priv key in slot 0x5
22,936,981 UART: [art] Derive Key Pair - Done
22,949,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,655,481 UART: [art] Erasing AUTHORITY.KEYID = 7
24,656,993 UART: [art] PUB.X = FD85C077539A642C9DEDB41329AD438543B5D9AA650CF4722E4F292AB1389763A35BDE6107DBDC2B5DE6ABD1ADF99167
24,664,250 UART: [art] PUB.Y = AD0E6DC9D1D2DED843A5291371AE9A1E03869BD121B4C4B4F53019971FA2D50664B34796DB7D1B10F57A5A128EF79EE2
24,671,500 UART: [art] SIG.R = AF591AA7D17DE8F1FB481D20B2822BFFEACF44C7EB9DAEF78C79B9C18AC27CDF736CFF42ADD67F3F074998DFA53BF2EE
24,678,971 UART: [art] SIG.S = 9D871D4723A8F03AE97273892DD4DA01379C8534A90DC3A74740F13D3980A758954E93B94B6188804CA16F2109537360
25,658,334 UART: Caliptra RT
25,659,034 UART: [state] CFI Enabled
25,790,589 UART: [rt] RT listening for mailbox commands...
25,792,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,822,599 UART: [rt]cmd =0x44504543, len=24
25,850,027 >>> mbox cmd response data (40 bytes)
25,850,820 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,880,723 UART: [rt]cmd =0x44504543, len=24
25,908,318 >>> mbox cmd response data (40 bytes)
25,909,034 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,938,945 UART: [rt]cmd =0x44504543, len=24
25,966,373 >>> mbox cmd response data (40 bytes)
25,967,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
25,997,036 UART: [rt]cmd =0x44504543, len=24
26,024,610 >>> mbox cmd response data (40 bytes)
26,025,248 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,055,223 UART: [rt]cmd =0x44504543, len=24
26,082,421 >>> mbox cmd response data (40 bytes)
26,083,095 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,113,002 UART: [rt]cmd =0x44504543, len=24
26,140,381 >>> mbox cmd response data (40 bytes)
26,141,001 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,170,976 UART: [rt]cmd =0x44504543, len=24
26,198,544 >>> mbox cmd response data (40 bytes)
26,199,168 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,229,032 UART: [rt]cmd =0x44504543, len=24
26,256,702 >>> mbox cmd response data (40 bytes)
26,257,326 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,287,282 UART: [rt]cmd =0x44504543, len=24
26,314,879 >>> mbox cmd response data (40 bytes)
26,315,537 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,345,496 UART: [rt]cmd =0x44504543, len=24
26,373,479 >>> mbox cmd response data (40 bytes)
26,374,096 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,403,903 UART: [rt]cmd =0x44504543, len=24
26,431,688 >>> mbox cmd response data (40 bytes)
26,432,312 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,462,055 UART: [rt]cmd =0x44504543, len=24
26,490,033 >>> mbox cmd response data (40 bytes)
26,490,697 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,520,659 UART: [rt]cmd =0x44504543, len=24
26,548,546 >>> mbox cmd response data (40 bytes)
26,549,233 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,579,083 UART: [rt]cmd =0x44504543, len=24
26,606,460 >>> mbox cmd response data (40 bytes)
26,607,086 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,636,797 UART: [rt]cmd =0x44504543, len=24
26,664,471 >>> mbox cmd response data (40 bytes)
26,665,113 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,694,960 UART: [rt]cmd =0x44504543, len=24
26,722,296 >>> mbox cmd response data (40 bytes)
26,722,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,752,846 UART: [rt]cmd =0x44504543, len=24
26,759,569 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,141 UART:
192,496 UART: Running Caliptra ROM ...
193,794 UART:
193,949 UART: [state] CFI Enabled
265,842 UART: [state] LifecycleState = Unprovisioned
268,269 UART: [state] DebugLocked = No
269,589 UART: [state] WD Timer not started. Device not locked for debugging
274,907 UART: [kat] SHA2-256
464,818 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,578 UART: [kat] ++
476,066 UART: [kat] sha1
486,162 UART: [kat] SHA2-256
489,175 UART: [kat] SHA2-384
495,658 UART: [kat] SHA2-512-ACC
498,245 UART: [kat] ECC-384
2,961,542 UART: [kat] HMAC-384Kdf
2,985,102 UART: [kat] LMS
3,516,887 UART: [kat] --
3,521,665 UART: [cold-reset] ++
3,523,517 UART: [fht] FHT @ 0x50003400
3,534,908 UART: [idev] ++
3,535,604 UART: [idev] CDI.KEYID = 6
3,536,483 UART: [idev] SUBJECT.KEYID = 7
3,537,717 UART: [idev] UDS.KEYID = 0
3,538,642 ready_for_fw is high
3,538,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,688,951 UART: [idev] Erasing UDS.KEYID = 0
6,042,503 UART: [idev] Sha1 KeyId Algorithm
6,064,817 UART: [idev] --
6,070,224 UART: [ldev] ++
6,070,902 UART: [ldev] CDI.KEYID = 6
6,071,806 UART: [ldev] SUBJECT.KEYID = 5
6,073,018 UART: [ldev] AUTHORITY.KEYID = 7
6,074,202 UART: [ldev] FE.KEYID = 1
6,113,268 UART: [ldev] Erasing FE.KEYID = 1
8,619,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,768 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,401,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,422,154 UART: [ldev] --
10,428,364 UART: [fwproc] Wait for Commands...
10,430,562 UART: [fwproc] Recv command 0x46574c44
10,432,808 UART: [fwproc] Recv'd Img size: 118548 bytes
13,929,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,004,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,237 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,688,968 >>> mbox cmd response: success
14,692,223 UART: [afmc] ++
14,692,940 UART: [afmc] CDI.KEYID = 6
14,694,047 UART: [afmc] SUBJECT.KEYID = 7
14,695,595 UART: [afmc] AUTHORITY.KEYID = 5
17,229,778 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,100 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,065 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,136 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,294 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,042,767 UART: [afmc] --
19,046,305 UART: [cold-reset] --
19,050,278 UART: [state] Locking Datavault
19,055,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,057,634 UART: [state] Locking ICCM
19,060,570 UART: [exit] Launching FMC @ 0x40000130
19,069,238 UART:
19,069,479 UART: Running Caliptra FMC ...
19,070,584 UART:
19,070,741 UART: [state] CFI Enabled
19,129,158 UART: [fht] FMC Alias Private Key: 7
20,895,752 UART: [art] Extend RT PCRs Done
20,896,980 UART: [art] Lock RT PCRs Done
20,898,388 UART: [art] Populate DV Done
20,904,042 UART: [fht] FMC Alias Private Key: 7
20,905,653 UART: [art] Derive CDI
20,906,466 UART: [art] Store in slot 0x4
20,962,359 UART: [art] Derive Key Pair
20,963,350 UART: [art] Store priv key in slot 0x5
23,426,504 UART: [art] Derive Key Pair - Done
23,439,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,159 UART: [art] Erasing AUTHORITY.KEYID = 7
25,153,668 UART: [art] PUB.X = 5C52A844AF8D774B1B02DA31369E793F0745058F91F5A8E3337678C297D15F024CDA3DACAE2F2EEECDEBE176FED62D0D
25,160,983 UART: [art] PUB.Y = 15615FFC13C088159C6CF8E658DCC69D0C0187F91BBAD166309E96D4A721D554405A8F241AEC3E29FDBFF3CCD4E7E2AE
25,168,216 UART: [art] SIG.R = 85BF5164C244897FFE87933C6EB56401F2EE1105B13CAC34D5ACC33D81BBF8BECFA8FD0ADEA8289FE4B5D06E6F671D54
25,175,670 UART: [art] SIG.S = 98A3289C302A226233B5188E28083870CC41E8EEE9C6CEF7D6635C9873AF2D91E79D6FD031DA23933AA9B1165F2587D6
26,154,597 UART: Caliptra RT
26,155,286 UART: [state] CFI Enabled
26,335,733 UART: [rt] RT listening for mailbox commands...
26,337,660 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,367,684 UART: [rt]cmd =0x44504543, len=24
26,416,587 >>> mbox cmd response data (40 bytes)
26,417,401 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,447,367 UART: [rt]cmd =0x44504543, len=24
26,480,634 >>> mbox cmd response data (40 bytes)
26,481,274 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,511,144 UART: [rt]cmd =0x44504543, len=24
26,544,571 >>> mbox cmd response data (40 bytes)
26,545,210 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,575,003 UART: [rt]cmd =0x44504543, len=24
26,608,442 >>> mbox cmd response data (40 bytes)
26,609,097 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,638,999 UART: [rt]cmd =0x44504543, len=24
26,672,642 >>> mbox cmd response data (40 bytes)
26,673,299 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,703,037 UART: [rt]cmd =0x44504543, len=24
26,736,786 >>> mbox cmd response data (40 bytes)
26,737,399 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,767,192 UART: [rt]cmd =0x44504543, len=24
26,801,134 >>> mbox cmd response data (40 bytes)
26,801,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,831,707 UART: [rt]cmd =0x44504543, len=24
26,864,787 >>> mbox cmd response data (40 bytes)
26,865,423 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,895,375 UART: [rt]cmd =0x44504543, len=24
26,929,401 >>> mbox cmd response data (40 bytes)
26,930,066 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,959,970 UART: [rt]cmd =0x44504543, len=24
26,993,129 >>> mbox cmd response data (40 bytes)
26,993,782 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,023,575 UART: [rt]cmd =0x44504543, len=24
27,057,320 >>> mbox cmd response data (40 bytes)
27,057,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,087,861 UART: [rt]cmd =0x44504543, len=24
27,121,208 >>> mbox cmd response data (40 bytes)
27,121,823 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,151,623 UART: [rt]cmd =0x44504543, len=24
27,185,293 >>> mbox cmd response data (40 bytes)
27,185,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,215,872 UART: [rt]cmd =0x44504543, len=24
27,249,623 >>> mbox cmd response data (40 bytes)
27,250,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,280,333 UART: [rt]cmd =0x44504543, len=24
27,313,591 >>> mbox cmd response data (40 bytes)
27,314,250 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,343,989 UART: [rt]cmd =0x44504543, len=24
27,377,843 >>> mbox cmd response data (40 bytes)
27,378,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,408,203 UART: [rt]cmd =0x44504543, len=24
27,415,067 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,438,928 ready_for_fw is high
3,439,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,326 >>> mbox cmd response: success
19,113,749 UART:
19,114,170 UART: Running Caliptra FMC ...
19,115,326 UART:
19,115,486 UART: [state] CFI Enabled
19,180,394 UART: [fht] FMC Alias Private Key: 7
20,947,051 UART: [art] Extend RT PCRs Done
20,948,411 UART: [art] Lock RT PCRs Done
20,949,776 UART: [art] Populate DV Done
20,955,301 UART: [fht] FMC Alias Private Key: 7
20,956,843 UART: [art] Derive CDI
20,957,655 UART: [art] Store in slot 0x4
21,013,332 UART: [art] Derive Key Pair
21,014,337 UART: [art] Store priv key in slot 0x5
23,476,482 UART: [art] Derive Key Pair - Done
23,489,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,413 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,946 UART: [art] PUB.X = CCA1E0B1B3796421887EACFC22C6BD22CB629B581CF4E44D331F7D46E781D1D8E79DE17535AC0929ED6E7E11629F3FD9
25,211,247 UART: [art] PUB.Y = F532DA4354E6911FF08DF24FD8AA320B02DF7EBED059107AFF06EAEC6B39DEF7AF998758E755FE682B43F6B570F8A2E5
25,218,500 UART: [art] SIG.R = 3591410BD96A5202D12A7F91C95A2674B6E4D80377A0B7B2345371E0C0D9E9C93BD83DA364722F1DEA3F87C1965AE646
25,225,857 UART: [art] SIG.S = 332E3B07453BE5368CAB18FE438FB6D890DC0E0B9A043B359C1B5E46C16EF0FA16B1ADA753D9A5BDA8B04EE36C22DF6B
26,205,406 UART: Caliptra RT
26,206,284 UART: [state] CFI Enabled
26,386,820 UART: [rt] RT listening for mailbox commands...
26,388,910 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,419,009 UART: [rt]cmd =0x44504543, len=24
26,446,930 >>> mbox cmd response data (40 bytes)
26,447,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,477,726 UART: [rt]cmd =0x44504543, len=24
26,512,376 >>> mbox cmd response data (40 bytes)
26,513,025 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,542,879 UART: [rt]cmd =0x44504543, len=24
26,576,624 >>> mbox cmd response data (40 bytes)
26,577,307 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,607,204 UART: [rt]cmd =0x44504543, len=24
26,640,740 >>> mbox cmd response data (40 bytes)
26,641,400 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,671,248 UART: [rt]cmd =0x44504543, len=24
26,705,062 >>> mbox cmd response data (40 bytes)
26,705,689 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,735,546 UART: [rt]cmd =0x44504543, len=24
26,769,011 >>> mbox cmd response data (40 bytes)
26,769,642 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,799,490 UART: [rt]cmd =0x44504543, len=24
26,833,056 >>> mbox cmd response data (40 bytes)
26,833,682 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,863,682 UART: [rt]cmd =0x44504543, len=24
26,896,949 >>> mbox cmd response data (40 bytes)
26,897,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,927,626 UART: [rt]cmd =0x44504543, len=24
26,961,320 >>> mbox cmd response data (40 bytes)
26,961,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,991,926 UART: [rt]cmd =0x44504543, len=24
27,025,133 >>> mbox cmd response data (40 bytes)
27,025,748 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,055,601 UART: [rt]cmd =0x44504543, len=24
27,089,274 >>> mbox cmd response data (40 bytes)
27,089,890 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,119,853 UART: [rt]cmd =0x44504543, len=24
27,153,519 >>> mbox cmd response data (40 bytes)
27,154,142 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,184,256 UART: [rt]cmd =0x44504543, len=24
27,217,359 >>> mbox cmd response data (40 bytes)
27,218,020 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,247,926 UART: [rt]cmd =0x44504543, len=24
27,281,533 >>> mbox cmd response data (40 bytes)
27,282,207 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,312,222 UART: [rt]cmd =0x44504543, len=24
27,345,806 >>> mbox cmd response data (40 bytes)
27,346,416 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,376,498 UART: [rt]cmd =0x44504543, len=24
27,409,950 >>> mbox cmd response data (40 bytes)
27,410,563 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,440,576 UART: [rt]cmd =0x44504543, len=24
27,447,170 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,408 UART:
192,788 UART: Running Caliptra ROM ...
193,982 UART:
603,635 UART: [state] CFI Enabled
616,099 UART: [state] LifecycleState = Unprovisioned
618,478 UART: [state] DebugLocked = No
620,714 UART: [state] WD Timer not started. Device not locked for debugging
626,179 UART: [kat] SHA2-256
816,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,805 UART: [kat] ++
827,359 UART: [kat] sha1
838,474 UART: [kat] SHA2-256
841,490 UART: [kat] SHA2-384
847,706 UART: [kat] SHA2-512-ACC
850,293 UART: [kat] ECC-384
3,294,746 UART: [kat] HMAC-384Kdf
3,306,359 UART: [kat] LMS
3,838,196 UART: [kat] --
3,843,331 UART: [cold-reset] ++
3,844,629 UART: [fht] FHT @ 0x50003400
3,856,263 UART: [idev] ++
3,857,007 UART: [idev] CDI.KEYID = 6
3,857,936 UART: [idev] SUBJECT.KEYID = 7
3,859,118 UART: [idev] UDS.KEYID = 0
3,860,044 ready_for_fw is high
3,860,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,149 UART: [idev] Erasing UDS.KEYID = 0
6,334,132 UART: [idev] Sha1 KeyId Algorithm
6,357,053 UART: [idev] --
6,363,268 UART: [ldev] ++
6,363,951 UART: [ldev] CDI.KEYID = 6
6,364,864 UART: [ldev] SUBJECT.KEYID = 5
6,366,079 UART: [ldev] AUTHORITY.KEYID = 7
6,367,261 UART: [ldev] FE.KEYID = 1
6,380,824 UART: [ldev] Erasing FE.KEYID = 1
8,851,230 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,602 UART: [ldev] --
10,642,980 UART: [fwproc] Wait for Commands...
10,645,400 UART: [fwproc] Recv command 0x46574c44
10,647,676 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,601 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,511 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,154 >>> mbox cmd response: success
14,905,993 UART: [afmc] ++
14,906,699 UART: [afmc] CDI.KEYID = 6
14,907,894 UART: [afmc] SUBJECT.KEYID = 7
14,909,341 UART: [afmc] AUTHORITY.KEYID = 5
17,410,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,132,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,134,594 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,149,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,164,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,179,748 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,202,756 UART: [afmc] --
19,205,673 UART: [cold-reset] --
19,210,097 UART: [state] Locking Datavault
19,214,543 UART: [state] Locking PCR0, PCR1 and PCR31
19,216,769 UART: [state] Locking ICCM
19,218,258 UART: [exit] Launching FMC @ 0x40000130
19,226,942 UART:
19,227,178 UART: Running Caliptra FMC ...
19,228,207 UART:
19,228,362 UART: [state] CFI Enabled
19,236,307 UART: [fht] FMC Alias Private Key: 7
21,002,934 UART: [art] Extend RT PCRs Done
21,004,160 UART: [art] Lock RT PCRs Done
21,005,629 UART: [art] Populate DV Done
21,010,835 UART: [fht] FMC Alias Private Key: 7
21,012,432 UART: [art] Derive CDI
21,013,250 UART: [art] Store in slot 0x4
21,055,869 UART: [art] Derive Key Pair
21,056,916 UART: [art] Store priv key in slot 0x5
23,483,799 UART: [art] Derive Key Pair - Done
23,496,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,867 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,379 UART: [art] PUB.X = C3D9341CA6C73E40BBBC173213D55C7776E9CA01E40A3A6063EE8AB5BBC572A0AC5E73A0932D3149C6D55CB5688F2269
25,211,667 UART: [art] PUB.Y = 4E9DE36B7D3C7A7ED4C208BEA78396B5450D8D8D8F7412C70DD4F62D5E0E01B69A1CD7897FED0074E791D2BB3B1CF833
25,218,937 UART: [art] SIG.R = 5F8FEF1A01F562B4D46B33BF729C582B3ECE5BCACF033DED92511418D7DD31781C1F84945A95FCE2D9D74E0C0E5F9D36
25,226,312 UART: [art] SIG.S = 8EC52B1BF2BA2572B6E1C022FC667C39D4E5A19A4D39F92B246EE6CA22A75B5C5A37680D7A07F3735CFAB1A7D28AA072
26,205,443 UART: Caliptra RT
26,206,162 UART: [state] CFI Enabled
26,338,689 UART: [rt] RT listening for mailbox commands...
26,340,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,370,631 UART: [rt]cmd =0x44504543, len=24
26,398,337 >>> mbox cmd response data (40 bytes)
26,399,116 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,429,003 UART: [rt]cmd =0x44504543, len=24
26,457,019 >>> mbox cmd response data (40 bytes)
26,457,654 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,487,506 UART: [rt]cmd =0x44504543, len=24
26,515,143 >>> mbox cmd response data (40 bytes)
26,515,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,545,688 UART: [rt]cmd =0x44504543, len=24
26,572,532 >>> mbox cmd response data (40 bytes)
26,573,187 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,603,042 UART: [rt]cmd =0x44504543, len=24
26,630,310 >>> mbox cmd response data (40 bytes)
26,630,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,660,980 UART: [rt]cmd =0x44504543, len=24
26,688,600 >>> mbox cmd response data (40 bytes)
26,689,224 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,719,235 UART: [rt]cmd =0x44504543, len=24
26,746,913 >>> mbox cmd response data (40 bytes)
26,747,565 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,777,576 UART: [rt]cmd =0x44504543, len=24
26,805,116 >>> mbox cmd response data (40 bytes)
26,805,729 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,835,481 UART: [rt]cmd =0x44504543, len=24
26,863,318 >>> mbox cmd response data (40 bytes)
26,863,942 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,893,908 UART: [rt]cmd =0x44504543, len=24
26,921,747 >>> mbox cmd response data (40 bytes)
26,922,376 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,952,274 UART: [rt]cmd =0x44504543, len=24
26,980,198 >>> mbox cmd response data (40 bytes)
26,980,857 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,010,705 UART: [rt]cmd =0x44504543, len=24
27,038,402 >>> mbox cmd response data (40 bytes)
27,039,041 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,068,898 UART: [rt]cmd =0x44504543, len=24
27,096,444 >>> mbox cmd response data (40 bytes)
27,097,076 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,126,875 UART: [rt]cmd =0x44504543, len=24
27,154,429 >>> mbox cmd response data (40 bytes)
27,155,084 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,184,936 UART: [rt]cmd =0x44504543, len=24
27,212,762 >>> mbox cmd response data (40 bytes)
27,213,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,243,581 UART: [rt]cmd =0x44504543, len=24
27,271,337 >>> mbox cmd response data (40 bytes)
27,271,949 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,301,969 UART: [rt]cmd =0x44504543, len=24
27,308,409 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,038 writing to cptra_bootfsm_go
3,759,838 ready_for_fw is high
3,760,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,349 >>> mbox cmd response: success
19,292,369 UART:
19,292,762 UART: Running Caliptra FMC ...
19,293,907 UART:
19,294,072 UART: [state] CFI Enabled
19,301,978 UART: [fht] FMC Alias Private Key: 7
21,069,045 UART: [art] Extend RT PCRs Done
21,070,266 UART: [art] Lock RT PCRs Done
21,071,653 UART: [art] Populate DV Done
21,076,973 UART: [fht] FMC Alias Private Key: 7
21,078,468 UART: [art] Derive CDI
21,079,210 UART: [art] Store in slot 0x4
21,121,889 UART: [art] Derive Key Pair
21,123,089 UART: [art] Store priv key in slot 0x5
23,550,110 UART: [art] Derive Key Pair - Done
23,562,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,622 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,365 UART: [art] PUB.X = 77A22D9F613BDFBA6992B45DAA56D4AE9333FFFD370367139AA930A735EB6DCE7F8360E0E57B490E523A86F4BE704C0E
25,278,425 UART: [art] PUB.Y = 23658EC9F43375151E8D6C40B36E01933BE8A128FB73E9541116AA4B8024F8D41D0BAF11DED1478069EE4610BAB4B451
25,285,665 UART: [art] SIG.R = 0589B8F38EC3124C9B5DF90075B1CA3287F510C3AEB2E68F5D1AF7B6A2DCB54742E5646C83F19892CECE5B864FB401BD
25,293,041 UART: [art] SIG.S = 481966697E6BB145F2B975450636E4ECED2DCD1F18CF2B69A319AB67BDD67E2F3214FCFCA6ED9F713F30F51C6FF3B19A
26,272,419 UART: Caliptra RT
26,273,132 UART: [state] CFI Enabled
26,405,650 UART: [rt] RT listening for mailbox commands...
26,407,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,437,575 UART: [rt]cmd =0x44504543, len=24
26,464,905 >>> mbox cmd response data (40 bytes)
26,465,673 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,495,699 UART: [rt]cmd =0x44504543, len=24
26,523,277 >>> mbox cmd response data (40 bytes)
26,523,924 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,553,900 UART: [rt]cmd =0x44504543, len=24
26,581,616 >>> mbox cmd response data (40 bytes)
26,582,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,612,252 UART: [rt]cmd =0x44504543, len=24
26,640,387 >>> mbox cmd response data (40 bytes)
26,641,006 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,670,820 UART: [rt]cmd =0x44504543, len=24
26,697,950 >>> mbox cmd response data (40 bytes)
26,698,587 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,728,445 UART: [rt]cmd =0x44504543, len=24
26,756,072 >>> mbox cmd response data (40 bytes)
26,756,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,786,604 UART: [rt]cmd =0x44504543, len=24
26,814,852 >>> mbox cmd response data (40 bytes)
26,815,508 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,845,356 UART: [rt]cmd =0x44504543, len=24
26,872,968 >>> mbox cmd response data (40 bytes)
26,873,586 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,903,439 UART: [rt]cmd =0x44504543, len=24
26,931,227 >>> mbox cmd response data (40 bytes)
26,931,850 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
26,961,692 UART: [rt]cmd =0x44504543, len=24
26,989,498 >>> mbox cmd response data (40 bytes)
26,990,130 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,020,136 UART: [rt]cmd =0x44504543, len=24
27,047,956 >>> mbox cmd response data (40 bytes)
27,048,604 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,078,563 UART: [rt]cmd =0x44504543, len=24
27,106,054 >>> mbox cmd response data (40 bytes)
27,106,679 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,136,486 UART: [rt]cmd =0x44504543, len=24
27,164,436 >>> mbox cmd response data (40 bytes)
27,165,082 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,195,039 UART: [rt]cmd =0x44504543, len=24
27,222,645 >>> mbox cmd response data (40 bytes)
27,223,310 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,253,373 UART: [rt]cmd =0x44504543, len=24
27,280,749 >>> mbox cmd response data (40 bytes)
27,281,363 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,311,480 UART: [rt]cmd =0x44504543, len=24
27,339,172 >>> mbox cmd response data (40 bytes)
27,339,799 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
27,369,824 UART: [rt]cmd =0x44504543, len=24
27,376,474 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,539 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,153 UART: [kat] SHA2-256
882,084 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,199 UART: [kat] ++
886,351 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,288 UART: [kat] SHA2-512-ACC
897,189 UART: [kat] ECC-384
902,626 UART: [kat] HMAC-384Kdf
907,324 UART: [kat] LMS
1,475,520 UART: [kat] --
1,476,439 UART: [cold-reset] ++
1,476,841 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 ready_for_fw is high
1,480,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,294 UART: [idev] Erasing UDS.KEYID = 0
1,504,894 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,670 UART: [idev] --
1,514,603 UART: [ldev] ++
1,514,771 UART: [ldev] CDI.KEYID = 6
1,515,134 UART: [ldev] SUBJECT.KEYID = 5
1,515,560 UART: [ldev] AUTHORITY.KEYID = 7
1,516,023 UART: [ldev] FE.KEYID = 1
1,520,847 UART: [ldev] Erasing FE.KEYID = 1
1,546,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,300 UART: [ldev] --
1,585,753 UART: [fwproc] Waiting for Commands...
1,586,588 UART: [fwproc] Received command 0x46574c44
1,587,379 UART: [fwproc] Received Image of size 118548 bytes
2,931,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,908 >>> mbox cmd response: success
3,133,098 UART: [afmc] ++
3,133,266 UART: [afmc] CDI.KEYID = 6
3,133,628 UART: [afmc] SUBJECT.KEYID = 7
3,134,053 UART: [afmc] AUTHORITY.KEYID = 5
3,168,466 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,818 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,598 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,307 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,190 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,873 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,773 UART: [afmc] --
3,211,719 UART: [cold-reset] --
3,212,563 UART: [state] Locking Datavault
3,213,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,452 UART: [state] Locking ICCM
3,215,076 UART: [exit] Launching FMC @ 0x40000130
3,220,406 UART:
3,220,422 UART: Running Caliptra FMC ...
3,220,830 UART:
3,220,884 UART: [state] CFI Enabled
3,231,790 UART: [fht] FMC Alias Private Key: 7
3,350,800 UART: [art] Extend RT PCRs Done
3,351,228 UART: [art] Lock RT PCRs Done
3,352,678 UART: [art] Populate DV Done
3,360,845 UART: [fht] FMC Alias Private Key: 7
3,361,909 UART: [art] Derive CDI
3,362,189 UART: [art] Store in slot 0x4
3,448,025 UART: [art] Derive Key Pair
3,448,385 UART: [art] Store priv key in slot 0x5
3,461,654 UART: [art] Derive Key Pair - Done
3,476,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,269 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,034 UART: [art] PUB.X = 77E69354CCA97089BB65EC85D289F2E7919019E2014768ECE69AE5046259769053DDF5536B8162F04F813744C9CF0F0D
3,498,786 UART: [art] PUB.Y = 67005583CAB456E5240182A522B5E6F5F791ECF71EB8C104D1DAC026F0B046BBDD92347B2E00977467B24661549884B6
3,505,682 UART: [art] SIG.R = 60671A6B193FA627AEEF4D50909F39BD419C05B4079D53F431A495BEDBA0E6AC2E79EC69909E3DE9942EFF27377DF606
3,512,453 UART: [art] SIG.S = 37A4F38D482C2E4017E713DAED5A1893F336759219D93D8943F0824049D64CC45444C1BF9CE3A313621E0070EE86F770
3,536,657 UART: Caliptra RT
3,536,908 UART: [state] CFI Enabled
3,656,824 UART: [rt] RT listening for mailbox commands...
3,657,494 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,486 UART: [rt]cmd =0x44504543, len=24
3,714,852 >>> mbox cmd response data (40 bytes)
3,714,853 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,240 UART: [rt]cmd =0x44504543, len=24
3,771,287 >>> mbox cmd response data (40 bytes)
3,771,288 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,800,765 UART: [rt]cmd =0x44504543, len=24
3,828,547 >>> mbox cmd response data (40 bytes)
3,828,548 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,089 UART: [rt]cmd =0x44504543, len=24
3,886,154 >>> mbox cmd response data (40 bytes)
3,886,155 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,944 UART: [rt]cmd =0x44504543, len=24
3,943,726 >>> mbox cmd response data (40 bytes)
3,943,727 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,382 UART: [rt]cmd =0x44504543, len=24
4,000,839 >>> mbox cmd response data (40 bytes)
4,000,840 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,471 UART: [rt]cmd =0x44504543, len=24
4,058,137 >>> mbox cmd response data (40 bytes)
4,058,138 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,087,685 UART: [rt]cmd =0x44504543, len=24
4,115,596 >>> mbox cmd response data (40 bytes)
4,115,597 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,348 UART: [rt]cmd =0x44504543, len=24
4,172,772 >>> mbox cmd response data (40 bytes)
4,172,773 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,140 UART: [rt]cmd =0x44504543, len=24
4,229,963 >>> mbox cmd response data (40 bytes)
4,229,964 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,259,175 UART: [rt]cmd =0x44504543, len=24
4,286,595 >>> mbox cmd response data (40 bytes)
4,286,596 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,993 UART: [rt]cmd =0x44504543, len=24
4,343,486 >>> mbox cmd response data (40 bytes)
4,343,487 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,372,996 UART: [rt]cmd =0x44504543, len=24
4,400,640 >>> mbox cmd response data (40 bytes)
4,400,641 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,430,110 UART: [rt]cmd =0x44504543, len=24
4,457,621 >>> mbox cmd response data (40 bytes)
4,457,622 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,095 UART: [rt]cmd =0x44504543, len=24
4,514,943 >>> mbox cmd response data (40 bytes)
4,514,944 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,544,609 UART: [rt]cmd =0x44504543, len=24
4,572,390 >>> mbox cmd response data (40 bytes)
4,572,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,601,882 UART: [rt]cmd =0x44504543, len=24
4,609,497 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,421 ready_for_fw is high
1,362,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,848 >>> mbox cmd response: success
3,041,157 UART:
3,041,173 UART: Running Caliptra FMC ...
3,041,581 UART:
3,041,635 UART: [state] CFI Enabled
3,052,023 UART: [fht] FMC Alias Private Key: 7
3,171,203 UART: [art] Extend RT PCRs Done
3,171,631 UART: [art] Lock RT PCRs Done
3,173,347 UART: [art] Populate DV Done
3,181,830 UART: [fht] FMC Alias Private Key: 7
3,182,948 UART: [art] Derive CDI
3,183,228 UART: [art] Store in slot 0x4
3,268,936 UART: [art] Derive Key Pair
3,269,296 UART: [art] Store priv key in slot 0x5
3,282,765 UART: [art] Derive Key Pair - Done
3,298,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,278 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,043 UART: [art] PUB.X = 26C0DFA791B9A67E8FAC9916715F169D01FAA24FE0580C7FF467AE2BD3AFA0C6DE1F196C049679B3DF55B8E08258C790
3,320,818 UART: [art] PUB.Y = C56E720158A563060E421852E9E6506FCB48F458514E5192BDC3C170ABA464D4B9A22BBCED8B7184BEAA769D97B2EA3F
3,327,769 UART: [art] SIG.R = 496A6C68BDFFA24C7AEFB1060F12851410B8C73DA7DAEC0B7ABE7EAF080AA3ECEC2ED8A27A2B32835207B83347AB3253
3,334,543 UART: [art] SIG.S = EC9803309A24ED8018E5653DCE5168CF2690FC236CFE08966F1CC73A0F13ED70AAE08C2ABD09B96FDE4129A10DF2A1D3
3,358,256 UART: Caliptra RT
3,358,507 UART: [state] CFI Enabled
3,479,584 UART: [rt] RT listening for mailbox commands...
3,480,254 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,092 UART: [rt]cmd =0x44504543, len=24
3,537,684 >>> mbox cmd response data (40 bytes)
3,537,685 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,314 UART: [rt]cmd =0x44504543, len=24
3,594,947 >>> mbox cmd response data (40 bytes)
3,594,948 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,503 UART: [rt]cmd =0x44504543, len=24
3,651,977 >>> mbox cmd response data (40 bytes)
3,651,978 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,681,295 UART: [rt]cmd =0x44504543, len=24
3,708,888 >>> mbox cmd response data (40 bytes)
3,708,889 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,452 UART: [rt]cmd =0x44504543, len=24
3,766,292 >>> mbox cmd response data (40 bytes)
3,766,293 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,918 UART: [rt]cmd =0x44504543, len=24
3,823,473 >>> mbox cmd response data (40 bytes)
3,823,474 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,029 UART: [rt]cmd =0x44504543, len=24
3,880,843 >>> mbox cmd response data (40 bytes)
3,880,844 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,375 UART: [rt]cmd =0x44504543, len=24
3,937,598 >>> mbox cmd response data (40 bytes)
3,937,599 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,134 UART: [rt]cmd =0x44504543, len=24
3,995,256 >>> mbox cmd response data (40 bytes)
3,995,257 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,904 UART: [rt]cmd =0x44504543, len=24
4,052,425 >>> mbox cmd response data (40 bytes)
4,052,426 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,081,963 UART: [rt]cmd =0x44504543, len=24
4,109,231 >>> mbox cmd response data (40 bytes)
4,109,232 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,841 UART: [rt]cmd =0x44504543, len=24
4,166,324 >>> mbox cmd response data (40 bytes)
4,166,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,758 UART: [rt]cmd =0x44504543, len=24
4,223,500 >>> mbox cmd response data (40 bytes)
4,223,501 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,162 UART: [rt]cmd =0x44504543, len=24
4,280,719 >>> mbox cmd response data (40 bytes)
4,280,720 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,085 UART: [rt]cmd =0x44504543, len=24
4,337,433 >>> mbox cmd response data (40 bytes)
4,337,434 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,366,821 UART: [rt]cmd =0x44504543, len=24
4,394,374 >>> mbox cmd response data (40 bytes)
4,394,375 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,423,786 UART: [rt]cmd =0x44504543, len=24
4,431,151 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,894 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,507 UART: [kat] SHA2-512-ACC
897,408 UART: [kat] ECC-384
903,125 UART: [kat] HMAC-384Kdf
907,759 UART: [kat] LMS
1,475,955 UART: [kat] --
1,476,632 UART: [cold-reset] ++
1,477,086 UART: [fht] Storing FHT @ 0x50003400
1,479,841 UART: [idev] ++
1,480,009 UART: [idev] CDI.KEYID = 6
1,480,369 UART: [idev] SUBJECT.KEYID = 7
1,480,793 UART: [idev] UDS.KEYID = 0
1,481,138 ready_for_fw is high
1,481,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,009 UART: [idev] Erasing UDS.KEYID = 0
1,505,627 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,077 UART: [idev] --
1,515,024 UART: [ldev] ++
1,515,192 UART: [ldev] CDI.KEYID = 6
1,515,555 UART: [ldev] SUBJECT.KEYID = 5
1,515,981 UART: [ldev] AUTHORITY.KEYID = 7
1,516,444 UART: [ldev] FE.KEYID = 1
1,521,640 UART: [ldev] Erasing FE.KEYID = 1
1,546,883 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,585 UART: [ldev] --
1,585,852 UART: [fwproc] Waiting for Commands...
1,586,491 UART: [fwproc] Received command 0x46574c44
1,587,282 UART: [fwproc] Received Image of size 118548 bytes
2,932,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,074 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,292 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,503 >>> mbox cmd response: success
3,133,585 UART: [afmc] ++
3,133,753 UART: [afmc] CDI.KEYID = 6
3,134,115 UART: [afmc] SUBJECT.KEYID = 7
3,134,540 UART: [afmc] AUTHORITY.KEYID = 5
3,170,005 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,183 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,555 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,238 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,118 UART: [afmc] --
3,213,086 UART: [cold-reset] --
3,213,742 UART: [state] Locking Datavault
3,214,701 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,305 UART: [state] Locking ICCM
3,215,725 UART: [exit] Launching FMC @ 0x40000130
3,221,055 UART:
3,221,071 UART: Running Caliptra FMC ...
3,221,479 UART:
3,221,622 UART: [state] CFI Enabled
3,232,292 UART: [fht] FMC Alias Private Key: 7
3,350,534 UART: [art] Extend RT PCRs Done
3,350,962 UART: [art] Lock RT PCRs Done
3,352,746 UART: [art] Populate DV Done
3,361,111 UART: [fht] FMC Alias Private Key: 7
3,362,265 UART: [art] Derive CDI
3,362,545 UART: [art] Store in slot 0x4
3,448,237 UART: [art] Derive Key Pair
3,448,597 UART: [art] Store priv key in slot 0x5
3,462,340 UART: [art] Derive Key Pair - Done
3,477,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,919 UART: [art] PUB.X = B396517C525B3B6ACEEAA1100804277294D90E5473E2D900BA593908181FCA5018B9CD0104F576A1E8EFA538D37B4F6C
3,500,651 UART: [art] PUB.Y = F4B1377A6624ED071A141FB38C9ACF60BA6CA5A6E7BB27FAFB0E8DEFC79DD9F60AA347DAF8E812D41B991B949C33AD9D
3,507,620 UART: [art] SIG.R = AD4465072276CEAA9947409415B5C737FAE47B388FA1B82F6562AC6AB8415525092B98C71264528216C5BC056BBE987A
3,514,377 UART: [art] SIG.S = F8A90793FEAC8BA7AFBF592761296697D4D0316A564DA8A3A9E599E1522FB2E73904DEF3B32201CA267272D3942BF34D
3,537,790 UART: Caliptra RT
3,538,133 UART: [state] CFI Enabled
3,657,887 UART: [rt] RT listening for mailbox commands...
3,658,557 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,389 UART: [rt]cmd =0x44504543, len=24
3,716,193 >>> mbox cmd response data (40 bytes)
3,716,194 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,733 UART: [rt]cmd =0x44504543, len=24
3,773,460 >>> mbox cmd response data (40 bytes)
3,773,461 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,802,944 UART: [rt]cmd =0x44504543, len=24
3,830,228 >>> mbox cmd response data (40 bytes)
3,830,229 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,859,778 UART: [rt]cmd =0x44504543, len=24
3,887,123 >>> mbox cmd response data (40 bytes)
3,887,124 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,607 UART: [rt]cmd =0x44504543, len=24
3,944,285 >>> mbox cmd response data (40 bytes)
3,944,286 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,887 UART: [rt]cmd =0x44504543, len=24
4,001,448 >>> mbox cmd response data (40 bytes)
4,001,449 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,990 UART: [rt]cmd =0x44504543, len=24
4,058,890 >>> mbox cmd response data (40 bytes)
4,058,891 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,088,266 UART: [rt]cmd =0x44504543, len=24
4,115,863 >>> mbox cmd response data (40 bytes)
4,115,864 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,473 UART: [rt]cmd =0x44504543, len=24
4,172,907 >>> mbox cmd response data (40 bytes)
4,172,908 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,423 UART: [rt]cmd =0x44504543, len=24
4,230,636 >>> mbox cmd response data (40 bytes)
4,230,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,260,130 UART: [rt]cmd =0x44504543, len=24
4,287,632 >>> mbox cmd response data (40 bytes)
4,287,633 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,317,220 UART: [rt]cmd =0x44504543, len=24
4,344,939 >>> mbox cmd response data (40 bytes)
4,344,940 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,374,485 UART: [rt]cmd =0x44504543, len=24
4,402,195 >>> mbox cmd response data (40 bytes)
4,402,196 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,431,529 UART: [rt]cmd =0x44504543, len=24
4,459,450 >>> mbox cmd response data (40 bytes)
4,459,451 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,488,884 UART: [rt]cmd =0x44504543, len=24
4,516,382 >>> mbox cmd response data (40 bytes)
4,516,383 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,545,916 UART: [rt]cmd =0x44504543, len=24
4,573,559 >>> mbox cmd response data (40 bytes)
4,573,560 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,602,973 UART: [rt]cmd =0x44504543, len=24
4,610,262 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,888 ready_for_fw is high
1,362,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,959 >>> mbox cmd response: success
3,045,026 UART:
3,045,042 UART: Running Caliptra FMC ...
3,045,450 UART:
3,045,593 UART: [state] CFI Enabled
3,056,495 UART: [fht] FMC Alias Private Key: 7
3,175,937 UART: [art] Extend RT PCRs Done
3,176,365 UART: [art] Lock RT PCRs Done
3,177,793 UART: [art] Populate DV Done
3,186,182 UART: [fht] FMC Alias Private Key: 7
3,187,246 UART: [art] Derive CDI
3,187,526 UART: [art] Store in slot 0x4
3,273,664 UART: [art] Derive Key Pair
3,274,024 UART: [art] Store priv key in slot 0x5
3,287,149 UART: [art] Derive Key Pair - Done
3,301,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,096 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,861 UART: [art] PUB.X = AA7470F63412B3C570FF6404C926E71515D95DA7CC1CE0E34EAC1FF215ACF4F9A1DCAFE3FC7FD01840AAC5B606988A5C
3,324,647 UART: [art] PUB.Y = 0D6C02297DCDF4B6973A5C1879D2CBC16B733D11923E6630B3449AA3A204F44556AC95D4665F23A5FE8E75D28B852A4D
3,331,592 UART: [art] SIG.R = 778BF54BB6A272B8BE2D74798ABEE5124F36E3FD99C0BA034BC8632EF800ED58317419C50543435EBD1FCC38BD8EA2D4
3,338,348 UART: [art] SIG.S = A0B268F5338BEEAF484071DBA8D01262AC0FE9213B8D3178C79AE99876FB5E1270DAF435DDD9D949522971BB0D734429
3,362,528 UART: Caliptra RT
3,362,871 UART: [state] CFI Enabled
3,482,560 UART: [rt] RT listening for mailbox commands...
3,483,230 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,374 UART: [rt]cmd =0x44504543, len=24
3,540,836 >>> mbox cmd response data (40 bytes)
3,540,837 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,570,228 UART: [rt]cmd =0x44504543, len=24
3,597,739 >>> mbox cmd response data (40 bytes)
3,597,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,459 UART: [rt]cmd =0x44504543, len=24
3,655,099 >>> mbox cmd response data (40 bytes)
3,655,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,737 UART: [rt]cmd =0x44504543, len=24
3,711,818 >>> mbox cmd response data (40 bytes)
3,711,819 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,378 UART: [rt]cmd =0x44504543, len=24
3,768,754 >>> mbox cmd response data (40 bytes)
3,768,755 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,798,290 UART: [rt]cmd =0x44504543, len=24
3,825,593 >>> mbox cmd response data (40 bytes)
3,825,594 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,037 UART: [rt]cmd =0x44504543, len=24
3,882,861 >>> mbox cmd response data (40 bytes)
3,882,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,283 UART: [rt]cmd =0x44504543, len=24
3,940,248 >>> mbox cmd response data (40 bytes)
3,940,249 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,850 UART: [rt]cmd =0x44504543, len=24
3,997,170 >>> mbox cmd response data (40 bytes)
3,997,171 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,648 UART: [rt]cmd =0x44504543, len=24
4,054,003 >>> mbox cmd response data (40 bytes)
4,054,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,083,557 UART: [rt]cmd =0x44504543, len=24
4,110,871 >>> mbox cmd response data (40 bytes)
4,110,872 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,193 UART: [rt]cmd =0x44504543, len=24
4,167,168 >>> mbox cmd response data (40 bytes)
4,167,169 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,196,564 UART: [rt]cmd =0x44504543, len=24
4,224,094 >>> mbox cmd response data (40 bytes)
4,224,095 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,644 UART: [rt]cmd =0x44504543, len=24
4,281,573 >>> mbox cmd response data (40 bytes)
4,281,574 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,941 UART: [rt]cmd =0x44504543, len=24
4,338,421 >>> mbox cmd response data (40 bytes)
4,338,422 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,368,089 UART: [rt]cmd =0x44504543, len=24
4,395,592 >>> mbox cmd response data (40 bytes)
4,395,593 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,424,914 UART: [rt]cmd =0x44504543, len=24
4,432,499 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,402 UART: [state] LifecycleState = Unprovisioned
86,057 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,904 UART: [kat] SHA2-256
901,844 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,293 UART: [kat] LMS
1,168,605 UART: [kat] --
1,169,470 UART: [cold-reset] ++
1,169,934 UART: [fht] FHT @ 0x50003400
1,172,504 UART: [idev] ++
1,172,672 UART: [idev] CDI.KEYID = 6
1,173,033 UART: [idev] SUBJECT.KEYID = 7
1,173,458 UART: [idev] UDS.KEYID = 0
1,173,804 ready_for_fw is high
1,173,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,645 UART: [idev] Erasing UDS.KEYID = 0
1,198,179 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,148 UART: [ldev] ++
1,208,316 UART: [ldev] CDI.KEYID = 6
1,208,680 UART: [ldev] SUBJECT.KEYID = 5
1,209,107 UART: [ldev] AUTHORITY.KEYID = 7
1,209,570 UART: [ldev] FE.KEYID = 1
1,214,836 UART: [ldev] Erasing FE.KEYID = 1
1,241,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,298 UART: [ldev] --
1,280,659 UART: [fwproc] Wait for Commands...
1,281,452 UART: [fwproc] Recv command 0x46574c44
1,282,185 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,602 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,045 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,220 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,513 >>> mbox cmd response: success
2,825,741 UART: [afmc] ++
2,825,909 UART: [afmc] CDI.KEYID = 6
2,826,272 UART: [afmc] SUBJECT.KEYID = 7
2,826,698 UART: [afmc] AUTHORITY.KEYID = 5
2,862,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,401 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,111 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,992 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,693 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,588 UART: [afmc] --
2,905,405 UART: [cold-reset] --
2,906,363 UART: [state] Locking Datavault
2,907,446 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,050 UART: [state] Locking ICCM
2,908,608 UART: [exit] Launching FMC @ 0x40000130
2,913,938 UART:
2,913,954 UART: Running Caliptra FMC ...
2,914,362 UART:
2,914,416 UART: [state] CFI Enabled
2,925,114 UART: [fht] FMC Alias Private Key: 7
3,043,588 UART: [art] Extend RT PCRs Done
3,044,016 UART: [art] Lock RT PCRs Done
3,045,584 UART: [art] Populate DV Done
3,053,785 UART: [fht] FMC Alias Private Key: 7
3,054,755 UART: [art] Derive CDI
3,055,035 UART: [art] Store in slot 0x4
3,140,874 UART: [art] Derive Key Pair
3,141,234 UART: [art] Store priv key in slot 0x5
3,154,510 UART: [art] Derive Key Pair - Done
3,169,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,823 UART: [art] PUB.X = 10A606BBB348A4C995732FA797721DBB8BE17E575973403A40D22329E1AF84502069CE1578B8BF7AD090CCFFC4CF9896
3,192,594 UART: [art] PUB.Y = 1AF6C4F89B07DB9021E5F4D4B6C251775E087C3B032A71354F57267E35EAFA40E9FD5C9DB87B781DD28E1DF6B8E67E72
3,199,547 UART: [art] SIG.R = 314D3D2A1E7965C9237190A6A9AD4878E863006F3C639A6738D708368C183D2D84EA72C4189925825FA11B24A5D1EC08
3,206,281 UART: [art] SIG.S = A4E25C8BF4028513CBAFD8FD6957350F589B222C2E0371CEDE05CF0AE6F2DF93EFFEB4BD00ED4CD615BAA874C7A36EAC
3,230,524 UART: Caliptra RT
3,230,775 UART: [state] CFI Enabled
3,349,823 UART: [rt] RT listening for mailbox commands...
3,350,493 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,477 UART: [rt]cmd =0x44504543, len=24
3,408,389 >>> mbox cmd response data (40 bytes)
3,408,390 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,855 UART: [rt]cmd =0x44504543, len=24
3,464,844 >>> mbox cmd response data (40 bytes)
3,464,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,250 UART: [rt]cmd =0x44504543, len=24
3,521,534 >>> mbox cmd response data (40 bytes)
3,521,535 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,550,994 UART: [rt]cmd =0x44504543, len=24
3,577,929 >>> mbox cmd response data (40 bytes)
3,577,930 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,373 UART: [rt]cmd =0x44504543, len=24
3,635,165 >>> mbox cmd response data (40 bytes)
3,635,166 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,711 UART: [rt]cmd =0x44504543, len=24
3,692,312 >>> mbox cmd response data (40 bytes)
3,692,313 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,596 UART: [rt]cmd =0x44504543, len=24
3,749,250 >>> mbox cmd response data (40 bytes)
3,749,251 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,778 UART: [rt]cmd =0x44504543, len=24
3,806,557 >>> mbox cmd response data (40 bytes)
3,806,558 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,965 UART: [rt]cmd =0x44504543, len=24
3,863,243 >>> mbox cmd response data (40 bytes)
3,863,244 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,667 UART: [rt]cmd =0x44504543, len=24
3,919,990 >>> mbox cmd response data (40 bytes)
3,919,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,432 UART: [rt]cmd =0x44504543, len=24
3,976,844 >>> mbox cmd response data (40 bytes)
3,976,845 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,312 UART: [rt]cmd =0x44504543, len=24
4,034,111 >>> mbox cmd response data (40 bytes)
4,034,112 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,797 UART: [rt]cmd =0x44504543, len=24
4,091,581 >>> mbox cmd response data (40 bytes)
4,091,582 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,037 UART: [rt]cmd =0x44504543, len=24
4,148,758 >>> mbox cmd response data (40 bytes)
4,148,759 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,178,320 UART: [rt]cmd =0x44504543, len=24
4,205,976 >>> mbox cmd response data (40 bytes)
4,205,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,235,654 UART: [rt]cmd =0x44504543, len=24
4,263,705 >>> mbox cmd response data (40 bytes)
4,263,706 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,292,977 UART: [rt]cmd =0x44504543, len=24
4,300,540 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,870 ready_for_fw is high
1,059,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,662 >>> mbox cmd response: success
2,741,051 UART:
2,741,067 UART: Running Caliptra FMC ...
2,741,475 UART:
2,741,529 UART: [state] CFI Enabled
2,752,265 UART: [fht] FMC Alias Private Key: 7
2,870,493 UART: [art] Extend RT PCRs Done
2,870,921 UART: [art] Lock RT PCRs Done
2,872,291 UART: [art] Populate DV Done
2,880,606 UART: [fht] FMC Alias Private Key: 7
2,881,608 UART: [art] Derive CDI
2,881,888 UART: [art] Store in slot 0x4
2,968,157 UART: [art] Derive Key Pair
2,968,517 UART: [art] Store priv key in slot 0x5
2,981,743 UART: [art] Derive Key Pair - Done
2,996,453 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,230 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,995 UART: [art] PUB.X = F24941EC40030283D4A5B55B98435EB9F459968D4F240CF10081601C3E193A5DFC32D5F12AD84D23FA03F6CF8DD7B443
3,019,735 UART: [art] PUB.Y = D9C912F1600F29041144302E34FBEFCD867C299BC3EA2F978F8D1D03787414EC25424AB5BA55E3E4FC461BFF8DDCFFB3
3,026,692 UART: [art] SIG.R = A4543BEF52255D81A107FAC3C2145E4F6F22A20E6743FD2B6383B6D98723151B882F7CA42FD714F9A9FE87C6228777F6
3,033,458 UART: [art] SIG.S = 32D328694ABE2CADAFA50B65030FEB3B9BCD73FCC918CEC163A78E0CF87BB674F9C2702897C22910A21BE4651A49BE2E
3,057,044 UART: Caliptra RT
3,057,295 UART: [state] CFI Enabled
3,176,495 UART: [rt] RT listening for mailbox commands...
3,177,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,981 UART: [rt]cmd =0x44504543, len=24
3,233,679 >>> mbox cmd response data (40 bytes)
3,233,680 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,283 UART: [rt]cmd =0x44504543, len=24
3,290,390 >>> mbox cmd response data (40 bytes)
3,290,391 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,319,904 UART: [rt]cmd =0x44504543, len=24
3,347,316 >>> mbox cmd response data (40 bytes)
3,347,317 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,376,984 UART: [rt]cmd =0x44504543, len=24
3,404,497 >>> mbox cmd response data (40 bytes)
3,404,498 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,093 UART: [rt]cmd =0x44504543, len=24
3,461,973 >>> mbox cmd response data (40 bytes)
3,461,974 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,491,417 UART: [rt]cmd =0x44504543, len=24
3,519,004 >>> mbox cmd response data (40 bytes)
3,519,005 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,708 UART: [rt]cmd =0x44504543, len=24
3,575,710 >>> mbox cmd response data (40 bytes)
3,575,711 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,330 UART: [rt]cmd =0x44504543, len=24
3,633,041 >>> mbox cmd response data (40 bytes)
3,633,042 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,537 UART: [rt]cmd =0x44504543, len=24
3,690,643 >>> mbox cmd response data (40 bytes)
3,690,644 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,001 UART: [rt]cmd =0x44504543, len=24
3,747,682 >>> mbox cmd response data (40 bytes)
3,747,683 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,216 UART: [rt]cmd =0x44504543, len=24
3,804,910 >>> mbox cmd response data (40 bytes)
3,804,911 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,322 UART: [rt]cmd =0x44504543, len=24
3,862,337 >>> mbox cmd response data (40 bytes)
3,862,338 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,665 UART: [rt]cmd =0x44504543, len=24
3,919,393 >>> mbox cmd response data (40 bytes)
3,919,394 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,991 UART: [rt]cmd =0x44504543, len=24
3,976,840 >>> mbox cmd response data (40 bytes)
3,976,841 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,006,346 UART: [rt]cmd =0x44504543, len=24
4,034,020 >>> mbox cmd response data (40 bytes)
4,034,021 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,546 UART: [rt]cmd =0x44504543, len=24
4,090,777 >>> mbox cmd response data (40 bytes)
4,090,778 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,131 UART: [rt]cmd =0x44504543, len=24
4,127,558 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,558 UART: [state] WD Timer not started. Device not locked for debugging
87,781 UART: [kat] SHA2-256
891,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,435 UART: [kat] ++
895,587 UART: [kat] sha1
899,715 UART: [kat] SHA2-256
901,655 UART: [kat] SHA2-384
904,508 UART: [kat] SHA2-512-ACC
906,409 UART: [kat] ECC-384
915,678 UART: [kat] HMAC-384Kdf
920,116 UART: [kat] LMS
1,168,428 UART: [kat] --
1,169,225 UART: [cold-reset] ++
1,169,709 UART: [fht] FHT @ 0x50003400
1,172,327 UART: [idev] ++
1,172,495 UART: [idev] CDI.KEYID = 6
1,172,856 UART: [idev] SUBJECT.KEYID = 7
1,173,281 UART: [idev] UDS.KEYID = 0
1,173,627 ready_for_fw is high
1,173,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,130 UART: [idev] Erasing UDS.KEYID = 0
1,197,860 UART: [idev] Sha1 KeyId Algorithm
1,206,824 UART: [idev] --
1,207,735 UART: [ldev] ++
1,207,903 UART: [ldev] CDI.KEYID = 6
1,208,267 UART: [ldev] SUBJECT.KEYID = 5
1,208,694 UART: [ldev] AUTHORITY.KEYID = 7
1,209,157 UART: [ldev] FE.KEYID = 1
1,214,385 UART: [ldev] Erasing FE.KEYID = 1
1,241,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,191 UART: [ldev] --
1,280,620 UART: [fwproc] Wait for Commands...
1,281,297 UART: [fwproc] Recv command 0x46574c44
1,282,030 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,495 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,732 >>> mbox cmd response: success
2,825,856 UART: [afmc] ++
2,826,024 UART: [afmc] CDI.KEYID = 6
2,826,387 UART: [afmc] SUBJECT.KEYID = 7
2,826,813 UART: [afmc] AUTHORITY.KEYID = 5
2,862,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,177 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,636 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,517 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,218 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,993 UART: [afmc] --
2,906,002 UART: [cold-reset] --
2,906,798 UART: [state] Locking Datavault
2,907,931 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,535 UART: [state] Locking ICCM
2,909,147 UART: [exit] Launching FMC @ 0x40000130
2,914,477 UART:
2,914,493 UART: Running Caliptra FMC ...
2,914,901 UART:
2,915,044 UART: [state] CFI Enabled
2,926,008 UART: [fht] FMC Alias Private Key: 7
3,045,252 UART: [art] Extend RT PCRs Done
3,045,680 UART: [art] Lock RT PCRs Done
3,047,288 UART: [art] Populate DV Done
3,055,523 UART: [fht] FMC Alias Private Key: 7
3,056,479 UART: [art] Derive CDI
3,056,759 UART: [art] Store in slot 0x4
3,142,874 UART: [art] Derive Key Pair
3,143,234 UART: [art] Store priv key in slot 0x5
3,156,626 UART: [art] Derive Key Pair - Done
3,171,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,420 UART: [art] PUB.X = 44265EB87D791E701B8179D833B35316DB9ED5E7DCBB4DA434227A9AEAABC64C93095EE5262B24D5D6676E772F9C6894
3,194,193 UART: [art] PUB.Y = B55537024466E9F18B49A2E2C9B9EF09E3198853908149087E459ACDF023BA0E0A6C44FA2CCAD7156598F42F2CBF0E3D
3,201,131 UART: [art] SIG.R = 1702060B35118F3D5CFE4A9713078A3948916D3076E3582F9B529685C3715745A7559EB78907A10A451DA83BBB18BA71
3,207,871 UART: [art] SIG.S = 24CF85A76193DC31824725A75A2807356F7ABCA65FE2E9CEF4F8FCADFBC4DF9BDD4ECBFECA1EF5F2E6CB360F7A87D1E6
3,231,713 UART: Caliptra RT
3,232,056 UART: [state] CFI Enabled
3,351,613 UART: [rt] RT listening for mailbox commands...
3,352,283 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,233 UART: [rt]cmd =0x44504543, len=24
3,409,515 >>> mbox cmd response data (40 bytes)
3,409,516 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,195 UART: [rt]cmd =0x44504543, len=24
3,466,454 >>> mbox cmd response data (40 bytes)
3,466,455 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,836 UART: [rt]cmd =0x44504543, len=24
3,523,532 >>> mbox cmd response data (40 bytes)
3,523,533 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,960 UART: [rt]cmd =0x44504543, len=24
3,580,331 >>> mbox cmd response data (40 bytes)
3,580,332 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,799 UART: [rt]cmd =0x44504543, len=24
3,636,957 >>> mbox cmd response data (40 bytes)
3,636,958 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,615 UART: [rt]cmd =0x44504543, len=24
3,693,976 >>> mbox cmd response data (40 bytes)
3,693,977 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,290 UART: [rt]cmd =0x44504543, len=24
3,750,548 >>> mbox cmd response data (40 bytes)
3,750,549 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,192 UART: [rt]cmd =0x44504543, len=24
3,807,803 >>> mbox cmd response data (40 bytes)
3,807,804 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,375 UART: [rt]cmd =0x44504543, len=24
3,865,291 >>> mbox cmd response data (40 bytes)
3,865,292 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,695 UART: [rt]cmd =0x44504543, len=24
3,922,438 >>> mbox cmd response data (40 bytes)
3,922,439 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,160 UART: [rt]cmd =0x44504543, len=24
3,979,732 >>> mbox cmd response data (40 bytes)
3,979,733 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,278 UART: [rt]cmd =0x44504543, len=24
4,036,509 >>> mbox cmd response data (40 bytes)
4,036,510 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,091 UART: [rt]cmd =0x44504543, len=24
4,093,811 >>> mbox cmd response data (40 bytes)
4,093,812 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,349 UART: [rt]cmd =0x44504543, len=24
4,150,742 >>> mbox cmd response data (40 bytes)
4,150,743 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,426 UART: [rt]cmd =0x44504543, len=24
4,207,996 >>> mbox cmd response data (40 bytes)
4,207,997 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,530 UART: [rt]cmd =0x44504543, len=24
4,265,187 >>> mbox cmd response data (40 bytes)
4,265,188 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,294,713 UART: [rt]cmd =0x44504543, len=24
4,301,928 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,595 ready_for_fw is high
1,060,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,863 >>> mbox cmd response: success
2,741,166 UART:
2,741,182 UART: Running Caliptra FMC ...
2,741,590 UART:
2,741,733 UART: [state] CFI Enabled
2,752,515 UART: [fht] FMC Alias Private Key: 7
2,871,129 UART: [art] Extend RT PCRs Done
2,871,557 UART: [art] Lock RT PCRs Done
2,873,191 UART: [art] Populate DV Done
2,881,594 UART: [fht] FMC Alias Private Key: 7
2,882,668 UART: [art] Derive CDI
2,882,948 UART: [art] Store in slot 0x4
2,968,495 UART: [art] Derive Key Pair
2,968,855 UART: [art] Store priv key in slot 0x5
2,982,205 UART: [art] Derive Key Pair - Done
2,997,022 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,794 UART: [art] PUB.X = 056758C4F1F13137B0B7774CEF02D2F730A283D0A73F4FDF2196FBA38C1658386F781F7A49FDA5D5C01C4D18DF52A4AF
3,020,568 UART: [art] PUB.Y = 3C230934ADB64DC612B8BA8CAB5DEB9367D7A8FD513FC1DA4E1EF128D0780FF40D922A1E8DE459F555CD2A8E92F5074A
3,027,526 UART: [art] SIG.R = 2400F8975A22CDFD2F506669164398AE6E43CCB640CD36286B847E535D6B9786314B23CFA5B97A1AAB7025225FB543D5
3,034,274 UART: [art] SIG.S = 2FF014837675FC77AF35DEE651C85D5C9500A589044E42882B459F3B28B0A456CEC2CB01EE5D6709BD0E9FB9CA26041F
3,058,413 UART: Caliptra RT
3,058,756 UART: [state] CFI Enabled
3,178,733 UART: [rt] RT listening for mailbox commands...
3,179,403 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,335 UART: [rt]cmd =0x44504543, len=24
3,237,001 >>> mbox cmd response data (40 bytes)
3,237,002 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,266,739 UART: [rt]cmd =0x44504543, len=24
3,294,614 >>> mbox cmd response data (40 bytes)
3,294,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,324,296 UART: [rt]cmd =0x44504543, len=24
3,351,958 >>> mbox cmd response data (40 bytes)
3,351,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,684 UART: [rt]cmd =0x44504543, len=24
3,408,955 >>> mbox cmd response data (40 bytes)
3,408,956 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,438,599 UART: [rt]cmd =0x44504543, len=24
3,466,039 >>> mbox cmd response data (40 bytes)
3,466,040 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,353 UART: [rt]cmd =0x44504543, len=24
3,523,340 >>> mbox cmd response data (40 bytes)
3,523,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,938 UART: [rt]cmd =0x44504543, len=24
3,579,968 >>> mbox cmd response data (40 bytes)
3,579,969 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,374 UART: [rt]cmd =0x44504543, len=24
3,636,657 >>> mbox cmd response data (40 bytes)
3,636,658 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,165 UART: [rt]cmd =0x44504543, len=24
3,693,821 >>> mbox cmd response data (40 bytes)
3,693,822 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,247 UART: [rt]cmd =0x44504543, len=24
3,750,924 >>> mbox cmd response data (40 bytes)
3,750,925 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,446 UART: [rt]cmd =0x44504543, len=24
3,808,546 >>> mbox cmd response data (40 bytes)
3,808,547 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,014 UART: [rt]cmd =0x44504543, len=24
3,865,047 >>> mbox cmd response data (40 bytes)
3,865,048 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,277 UART: [rt]cmd =0x44504543, len=24
3,922,255 >>> mbox cmd response data (40 bytes)
3,922,256 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,611 UART: [rt]cmd =0x44504543, len=24
3,978,994 >>> mbox cmd response data (40 bytes)
3,978,995 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,540 UART: [rt]cmd =0x44504543, len=24
4,036,262 >>> mbox cmd response data (40 bytes)
4,036,263 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,558 UART: [rt]cmd =0x44504543, len=24
4,093,183 >>> mbox cmd response data (40 bytes)
4,093,184 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,122,553 UART: [rt]cmd =0x44504543, len=24
4,130,100 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,259 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
893,152 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,277 UART: [kat] ++
897,429 UART: [kat] sha1
901,709 UART: [kat] SHA2-256
903,649 UART: [kat] SHA2-384
906,474 UART: [kat] SHA2-512-ACC
908,375 UART: [kat] ECC-384
917,978 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,445 UART: [cold-reset] ++
1,171,785 UART: [fht] FHT @ 0x50003400
1,174,598 UART: [idev] ++
1,174,766 UART: [idev] CDI.KEYID = 6
1,175,126 UART: [idev] SUBJECT.KEYID = 7
1,175,550 UART: [idev] UDS.KEYID = 0
1,175,895 ready_for_fw is high
1,175,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,440 UART: [idev] Erasing UDS.KEYID = 0
1,200,199 UART: [idev] Sha1 KeyId Algorithm
1,208,737 UART: [idev] --
1,209,647 UART: [ldev] ++
1,209,815 UART: [ldev] CDI.KEYID = 6
1,210,178 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,637 UART: [ldev] --
1,281,946 UART: [fwproc] Wait for Commands...
1,282,624 UART: [fwproc] Recv command 0x46574c44
1,283,352 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,547 >>> mbox cmd response: success
2,827,679 UART: [afmc] ++
2,827,847 UART: [afmc] CDI.KEYID = 6
2,828,209 UART: [afmc] SUBJECT.KEYID = 7
2,828,634 UART: [afmc] AUTHORITY.KEYID = 5
2,864,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,876 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,577 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,295 UART: [afmc] --
2,907,329 UART: [cold-reset] --
2,908,065 UART: [state] Locking Datavault
2,909,310 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,914 UART: [state] Locking ICCM
2,910,378 UART: [exit] Launching FMC @ 0x40000130
2,915,708 UART:
2,915,724 UART: Running Caliptra FMC ...
2,916,132 UART:
2,916,186 UART: [state] CFI Enabled
2,926,468 UART: [fht] FMC Alias Private Key: 7
3,045,444 UART: [art] Extend RT PCRs Done
3,045,872 UART: [art] Lock RT PCRs Done
3,047,540 UART: [art] Populate DV Done
3,055,479 UART: [fht] FMC Alias Private Key: 7
3,056,639 UART: [art] Derive CDI
3,056,919 UART: [art] Store in slot 0x4
3,142,300 UART: [art] Derive Key Pair
3,142,660 UART: [art] Store priv key in slot 0x5
3,155,474 UART: [art] Derive Key Pair - Done
3,170,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,110 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,875 UART: [art] PUB.X = 8E584FF00ED7769CE06733922FB48DA8921948351E0FB33C7E9E612CE5646FD642C7E87663EE0C81AD9B7E049FE592E8
3,193,637 UART: [art] PUB.Y = 120E92F4F42C28CB076BB61C2A2156C37B333C5C3F421091881CC3AAB381A3ECDD87DB87EE4BFC5102424CA6201CC572
3,200,588 UART: [art] SIG.R = 4A8E30D574B2F40F9020BA93D29957A878533FAC3C8F33453A73B8C09DC8085604C1BA0EAAE59E5517B21274600B972C
3,207,343 UART: [art] SIG.S = E227770DE5E4D1B0A26A08778075918CA29E36BE0D892D38C4F6FDE803433ABDE6120A69C3164441174ADC5C1C2AC3BD
3,230,930 UART: Caliptra RT
3,231,181 UART: [state] CFI Enabled
3,351,573 UART: [rt] RT listening for mailbox commands...
3,352,243 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,205 UART: [rt]cmd =0x44504543, len=24
3,409,887 >>> mbox cmd response data (40 bytes)
3,409,888 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,313 UART: [rt]cmd =0x44504543, len=24
3,466,634 >>> mbox cmd response data (40 bytes)
3,466,635 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,920 UART: [rt]cmd =0x44504543, len=24
3,523,164 >>> mbox cmd response data (40 bytes)
3,523,165 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,552,568 UART: [rt]cmd =0x44504543, len=24
3,580,241 >>> mbox cmd response data (40 bytes)
3,580,242 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,765 UART: [rt]cmd =0x44504543, len=24
3,637,407 >>> mbox cmd response data (40 bytes)
3,637,408 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,841 UART: [rt]cmd =0x44504543, len=24
3,694,314 >>> mbox cmd response data (40 bytes)
3,694,315 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,724 UART: [rt]cmd =0x44504543, len=24
3,751,340 >>> mbox cmd response data (40 bytes)
3,751,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,894 UART: [rt]cmd =0x44504543, len=24
3,808,623 >>> mbox cmd response data (40 bytes)
3,808,624 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,273 UART: [rt]cmd =0x44504543, len=24
3,865,629 >>> mbox cmd response data (40 bytes)
3,865,630 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,041 UART: [rt]cmd =0x44504543, len=24
3,922,430 >>> mbox cmd response data (40 bytes)
3,922,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,942 UART: [rt]cmd =0x44504543, len=24
3,979,952 >>> mbox cmd response data (40 bytes)
3,979,953 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,456 UART: [rt]cmd =0x44504543, len=24
4,036,823 >>> mbox cmd response data (40 bytes)
4,036,824 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,379 UART: [rt]cmd =0x44504543, len=24
4,094,069 >>> mbox cmd response data (40 bytes)
4,094,070 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,433 UART: [rt]cmd =0x44504543, len=24
4,151,090 >>> mbox cmd response data (40 bytes)
4,151,091 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,448 UART: [rt]cmd =0x44504543, len=24
4,208,072 >>> mbox cmd response data (40 bytes)
4,208,073 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,237,432 UART: [rt]cmd =0x44504543, len=24
4,264,817 >>> mbox cmd response data (40 bytes)
4,264,818 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,294,095 UART: [rt]cmd =0x44504543, len=24
4,301,314 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,057 ready_for_fw is high
1,060,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,164 >>> mbox cmd response: success
2,741,839 UART:
2,741,855 UART: Running Caliptra FMC ...
2,742,263 UART:
2,742,317 UART: [state] CFI Enabled
2,753,271 UART: [fht] FMC Alias Private Key: 7
2,872,003 UART: [art] Extend RT PCRs Done
2,872,431 UART: [art] Lock RT PCRs Done
2,873,965 UART: [art] Populate DV Done
2,882,174 UART: [fht] FMC Alias Private Key: 7
2,883,172 UART: [art] Derive CDI
2,883,452 UART: [art] Store in slot 0x4
2,969,097 UART: [art] Derive Key Pair
2,969,457 UART: [art] Store priv key in slot 0x5
2,983,189 UART: [art] Derive Key Pair - Done
2,997,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,984 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,749 UART: [art] PUB.X = 1486B159FBCC2E4C6B302B97A786E9B8EC6A733CBDD6763F743CC26D13BBB0643CDA6611FB9083EBE5BE81944B196D7D
3,020,535 UART: [art] PUB.Y = 2D37C2D313F80D62C56B70F3947B9A1DFC3FAB7BEA869C59817237E59794705ED60C34C7E08298977E154CB4895CC7FA
3,027,483 UART: [art] SIG.R = 57DC0547B6228AF6FDCB6D9015A762C870661AA574C4DCAF3D7A5DC9F423F2075C1E770CB3AA138EE6105BED49E6E4E1
3,034,260 UART: [art] SIG.S = 65B357D0238A1C0A8E66EBDBFCBD4686B353C3E3518122F657C296D4E4EF694B521E01A2091995EE43C16CA7EEF7F8E3
3,058,013 UART: Caliptra RT
3,058,264 UART: [state] CFI Enabled
3,178,143 UART: [rt] RT listening for mailbox commands...
3,178,813 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,589 UART: [rt]cmd =0x44504543, len=24
3,235,763 >>> mbox cmd response data (40 bytes)
3,235,764 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,265,197 UART: [rt]cmd =0x44504543, len=24
3,292,326 >>> mbox cmd response data (40 bytes)
3,292,327 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,321,744 UART: [rt]cmd =0x44504543, len=24
3,348,904 >>> mbox cmd response data (40 bytes)
3,348,905 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,518 UART: [rt]cmd =0x44504543, len=24
3,405,861 >>> mbox cmd response data (40 bytes)
3,405,862 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,435,109 UART: [rt]cmd =0x44504543, len=24
3,463,099 >>> mbox cmd response data (40 bytes)
3,463,100 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,492,551 UART: [rt]cmd =0x44504543, len=24
3,519,780 >>> mbox cmd response data (40 bytes)
3,519,781 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,549,078 UART: [rt]cmd =0x44504543, len=24
3,576,616 >>> mbox cmd response data (40 bytes)
3,576,617 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,190 UART: [rt]cmd =0x44504543, len=24
3,633,615 >>> mbox cmd response data (40 bytes)
3,633,616 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,097 UART: [rt]cmd =0x44504543, len=24
3,690,739 >>> mbox cmd response data (40 bytes)
3,690,740 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,115 UART: [rt]cmd =0x44504543, len=24
3,747,184 >>> mbox cmd response data (40 bytes)
3,747,185 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,944 UART: [rt]cmd =0x44504543, len=24
3,804,356 >>> mbox cmd response data (40 bytes)
3,804,357 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,110 UART: [rt]cmd =0x44504543, len=24
3,861,911 >>> mbox cmd response data (40 bytes)
3,861,912 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,513 UART: [rt]cmd =0x44504543, len=24
3,918,883 >>> mbox cmd response data (40 bytes)
3,918,884 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,589 UART: [rt]cmd =0x44504543, len=24
3,976,430 >>> mbox cmd response data (40 bytes)
3,976,431 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,794 UART: [rt]cmd =0x44504543, len=24
4,033,572 >>> mbox cmd response data (40 bytes)
4,033,573 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,136 UART: [rt]cmd =0x44504543, len=24
4,091,007 >>> mbox cmd response data (40 bytes)
4,091,008 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,645 UART: [rt]cmd =0x44504543, len=24
4,127,994 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,717 UART: [state] LifecycleState = Unprovisioned
86,372 UART: [state] DebugLocked = No
86,932 UART: [state] WD Timer not started. Device not locked for debugging
88,139 UART: [kat] SHA2-256
893,789 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,914 UART: [kat] ++
898,066 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
907,139 UART: [kat] SHA2-512-ACC
909,040 UART: [kat] ECC-384
919,077 UART: [kat] HMAC-384Kdf
923,671 UART: [kat] LMS
1,171,999 UART: [kat] --
1,172,942 UART: [cold-reset] ++
1,173,420 UART: [fht] FHT @ 0x50003400
1,176,049 UART: [idev] ++
1,176,217 UART: [idev] CDI.KEYID = 6
1,176,577 UART: [idev] SUBJECT.KEYID = 7
1,177,001 UART: [idev] UDS.KEYID = 0
1,177,346 ready_for_fw is high
1,177,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,213 UART: [idev] Erasing UDS.KEYID = 0
1,202,378 UART: [idev] Sha1 KeyId Algorithm
1,210,702 UART: [idev] --
1,211,652 UART: [ldev] ++
1,211,820 UART: [ldev] CDI.KEYID = 6
1,212,183 UART: [ldev] SUBJECT.KEYID = 5
1,212,609 UART: [ldev] AUTHORITY.KEYID = 7
1,213,072 UART: [ldev] FE.KEYID = 1
1,218,358 UART: [ldev] Erasing FE.KEYID = 1
1,244,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,516 UART: [ldev] --
1,283,879 UART: [fwproc] Wait for Commands...
1,284,583 UART: [fwproc] Recv command 0x46574c44
1,285,311 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,226 >>> mbox cmd response: success
2,828,360 UART: [afmc] ++
2,828,528 UART: [afmc] CDI.KEYID = 6
2,828,890 UART: [afmc] SUBJECT.KEYID = 7
2,829,315 UART: [afmc] AUTHORITY.KEYID = 5
2,864,650 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,486 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,070 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,828 UART: [afmc] --
2,907,912 UART: [cold-reset] --
2,908,670 UART: [state] Locking Datavault
2,909,895 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,499 UART: [state] Locking ICCM
2,911,073 UART: [exit] Launching FMC @ 0x40000130
2,916,403 UART:
2,916,419 UART: Running Caliptra FMC ...
2,916,827 UART:
2,916,970 UART: [state] CFI Enabled
2,927,406 UART: [fht] FMC Alias Private Key: 7
3,046,170 UART: [art] Extend RT PCRs Done
3,046,598 UART: [art] Lock RT PCRs Done
3,048,038 UART: [art] Populate DV Done
3,056,273 UART: [fht] FMC Alias Private Key: 7
3,057,373 UART: [art] Derive CDI
3,057,653 UART: [art] Store in slot 0x4
3,143,686 UART: [art] Derive Key Pair
3,144,046 UART: [art] Store priv key in slot 0x5
3,157,308 UART: [art] Derive Key Pair - Done
3,172,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,356 UART: [art] PUB.X = 6EC07C5246F2331C1725141290490DD4687948E9A907919015F5C4544C8BF29B5848AAFA611FD7A31305A133E7B076B1
3,195,107 UART: [art] PUB.Y = BE5CAF1A35CF03B9B0A7D1DE59DF3159E4999F5555ACB93C47EEC4BA097F61FE06967A5972747C4E6733ED3662363A2D
3,202,060 UART: [art] SIG.R = 1BBCF9F4B252A89CFE9F9A9057BE227486058CFB0A8FA6DBB74E9978EF1F6D944510FE35579A918905FAD0D91C2C3E15
3,208,835 UART: [art] SIG.S = EF082D5064F685EEBA72A701BD03C91CE771ACF2F65D5085C7DABAA6EC9538E7A9AFF5316AF206FB89F661514A7A99A7
3,232,883 UART: Caliptra RT
3,233,226 UART: [state] CFI Enabled
3,354,092 UART: [rt] RT listening for mailbox commands...
3,354,762 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,402 UART: [rt]cmd =0x44504543, len=24
3,411,902 >>> mbox cmd response data (40 bytes)
3,411,903 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,412 UART: [rt]cmd =0x44504543, len=24
3,469,147 >>> mbox cmd response data (40 bytes)
3,469,148 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,498,435 UART: [rt]cmd =0x44504543, len=24
3,525,625 >>> mbox cmd response data (40 bytes)
3,525,626 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,915 UART: [rt]cmd =0x44504543, len=24
3,582,636 >>> mbox cmd response data (40 bytes)
3,582,637 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,120 UART: [rt]cmd =0x44504543, len=24
3,639,350 >>> mbox cmd response data (40 bytes)
3,639,351 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,974 UART: [rt]cmd =0x44504543, len=24
3,696,647 >>> mbox cmd response data (40 bytes)
3,696,648 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,071 UART: [rt]cmd =0x44504543, len=24
3,754,003 >>> mbox cmd response data (40 bytes)
3,754,004 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,467 UART: [rt]cmd =0x44504543, len=24
3,811,108 >>> mbox cmd response data (40 bytes)
3,811,109 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,550 UART: [rt]cmd =0x44504543, len=24
3,867,964 >>> mbox cmd response data (40 bytes)
3,867,965 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,658 UART: [rt]cmd =0x44504543, len=24
3,925,191 >>> mbox cmd response data (40 bytes)
3,925,192 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,711 UART: [rt]cmd =0x44504543, len=24
3,982,481 >>> mbox cmd response data (40 bytes)
3,982,482 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,035 UART: [rt]cmd =0x44504543, len=24
4,039,752 >>> mbox cmd response data (40 bytes)
4,039,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,242 UART: [rt]cmd =0x44504543, len=24
4,097,214 >>> mbox cmd response data (40 bytes)
4,097,215 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,786 UART: [rt]cmd =0x44504543, len=24
4,154,257 >>> mbox cmd response data (40 bytes)
4,154,258 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,183,937 UART: [rt]cmd =0x44504543, len=24
4,211,791 >>> mbox cmd response data (40 bytes)
4,211,792 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,241,375 UART: [rt]cmd =0x44504543, len=24
4,269,372 >>> mbox cmd response data (40 bytes)
4,269,373 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,876 UART: [rt]cmd =0x44504543, len=24
4,306,141 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,976 ready_for_fw is high
1,059,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,593 >>> mbox cmd response: success
2,743,762 UART:
2,743,778 UART: Running Caliptra FMC ...
2,744,186 UART:
2,744,329 UART: [state] CFI Enabled
2,755,075 UART: [fht] FMC Alias Private Key: 7
2,874,167 UART: [art] Extend RT PCRs Done
2,874,595 UART: [art] Lock RT PCRs Done
2,876,509 UART: [art] Populate DV Done
2,884,778 UART: [fht] FMC Alias Private Key: 7
2,885,912 UART: [art] Derive CDI
2,886,192 UART: [art] Store in slot 0x4
2,971,831 UART: [art] Derive Key Pair
2,972,191 UART: [art] Store priv key in slot 0x5
2,985,329 UART: [art] Derive Key Pair - Done
3,000,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,200 UART: [art] PUB.X = F029722527477F1B0412150CD78E9CDF549FF35BFF731BD5DF8BE4C2A98B1D761C4F5921920248A8823697D708E6FC8A
3,022,960 UART: [art] PUB.Y = CCB2B83694076E5398D199418AFF45E5BFC48CF688016287211716E6C7FC061279CC1DCCF9DE8D09CDDBE2270037024A
3,029,879 UART: [art] SIG.R = 8685B6063B4A667ADC687F39EE27F2F38891CF311ACC69F453F8D381661A46E91C928E04798B26307FD0876860606D9C
3,036,637 UART: [art] SIG.S = 37323F0D3B0A8BE7CB71EF19122AA356D2787D98718A764593C3CB0288C3B684CCA0EB454D2A2A3376A4A0C24A645DA2
3,060,498 UART: Caliptra RT
3,060,841 UART: [state] CFI Enabled
3,180,655 UART: [rt] RT listening for mailbox commands...
3,181,325 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,357 UART: [rt]cmd =0x44504543, len=24
3,238,885 >>> mbox cmd response data (40 bytes)
3,238,886 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,268,363 UART: [rt]cmd =0x44504543, len=24
3,295,484 >>> mbox cmd response data (40 bytes)
3,295,485 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,324,848 UART: [rt]cmd =0x44504543, len=24
3,352,406 >>> mbox cmd response data (40 bytes)
3,352,407 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,994 UART: [rt]cmd =0x44504543, len=24
3,409,699 >>> mbox cmd response data (40 bytes)
3,409,700 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,125 UART: [rt]cmd =0x44504543, len=24
3,466,549 >>> mbox cmd response data (40 bytes)
3,466,550 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,495,963 UART: [rt]cmd =0x44504543, len=24
3,524,054 >>> mbox cmd response data (40 bytes)
3,524,055 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,338 UART: [rt]cmd =0x44504543, len=24
3,581,146 >>> mbox cmd response data (40 bytes)
3,581,147 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,598 UART: [rt]cmd =0x44504543, len=24
3,638,445 >>> mbox cmd response data (40 bytes)
3,638,446 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,857 UART: [rt]cmd =0x44504543, len=24
3,695,021 >>> mbox cmd response data (40 bytes)
3,695,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,545 UART: [rt]cmd =0x44504543, len=24
3,752,286 >>> mbox cmd response data (40 bytes)
3,752,287 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,810 UART: [rt]cmd =0x44504543, len=24
3,809,340 >>> mbox cmd response data (40 bytes)
3,809,341 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,700 UART: [rt]cmd =0x44504543, len=24
3,866,031 >>> mbox cmd response data (40 bytes)
3,866,032 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,603 UART: [rt]cmd =0x44504543, len=24
3,922,587 >>> mbox cmd response data (40 bytes)
3,922,588 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,205 UART: [rt]cmd =0x44504543, len=24
3,979,990 >>> mbox cmd response data (40 bytes)
3,979,991 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,009,406 UART: [rt]cmd =0x44504543, len=24
4,037,230 >>> mbox cmd response data (40 bytes)
4,037,231 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,796 UART: [rt]cmd =0x44504543, len=24
4,094,429 >>> mbox cmd response data (40 bytes)
4,094,430 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,973 UART: [rt]cmd =0x44504543, len=24
4,131,462 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_pl1_init_ctx_dpe_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,118 UART:
192,497 UART: Running Caliptra ROM ...
193,590 UART:
193,735 UART: [state] CFI Enabled
262,578 UART: [state] LifecycleState = Unprovisioned
264,569 UART: [state] DebugLocked = No
266,179 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,834 UART: [kat] SHA2-256
441,532 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,065 UART: [kat] ++
452,605 UART: [kat] sha1
464,080 UART: [kat] SHA2-256
466,777 UART: [kat] SHA2-384
471,918 UART: [kat] SHA2-512-ACC
474,301 UART: [kat] ECC-384
2,766,514 UART: [kat] HMAC-384Kdf
2,799,100 UART: [kat] LMS
3,989,411 UART: [kat] --
3,992,150 UART: [cold-reset] ++
3,993,381 UART: [fht] Storing FHT @ 0x50003400
4,004,439 UART: [idev] ++
4,005,010 UART: [idev] CDI.KEYID = 6
4,005,902 UART: [idev] SUBJECT.KEYID = 7
4,007,149 UART: [idev] UDS.KEYID = 0
4,008,204 ready_for_fw is high
4,008,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,484 UART: [idev] Erasing UDS.KEYID = 0
7,345,161 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,966 UART: [idev] --
7,370,678 UART: [ldev] ++
7,371,250 UART: [ldev] CDI.KEYID = 6
7,372,189 UART: [ldev] SUBJECT.KEYID = 5
7,373,398 UART: [ldev] AUTHORITY.KEYID = 7
7,374,703 UART: [ldev] FE.KEYID = 1
7,421,354 UART: [ldev] Erasing FE.KEYID = 1
10,755,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,500 UART: [ldev] --
13,117,419 UART: [fwproc] Waiting for Commands...
13,120,482 UART: [fwproc] Received command 0x46574c44
13,122,664 UART: [fwproc] Received Image of size 118548 bytes
17,229,499 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,052 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,223 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,069 >>> mbox cmd response: success
17,707,433 UART: [afmc] ++
17,708,077 UART: [afmc] CDI.KEYID = 6
17,709,002 UART: [afmc] SUBJECT.KEYID = 7
17,710,176 UART: [afmc] AUTHORITY.KEYID = 5
21,074,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,791 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,528 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,252 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,751 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,679 UART: [afmc] --
23,442,618 UART: [cold-reset] --
23,445,075 UART: [state] Locking Datavault
23,451,509 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,263 UART: [state] Locking ICCM
23,454,657 UART: [exit] Launching FMC @ 0x40000130
23,463,051 UART:
23,463,308 UART: Running Caliptra FMC ...
23,464,407 UART:
23,464,565 UART: [state] CFI Enabled
23,534,068 UART: [fht] FMC Alias Private Key: 7
25,895,749 UART: [art] Extend RT PCRs Done
25,896,975 UART: [art] Lock RT PCRs Done
25,898,387 UART: [art] Populate DV Done
25,903,626 UART: [fht] FMC Alias Private Key: 7
25,905,329 UART: [art] Derive CDI
25,906,066 UART: [art] Store in slot 0x4
25,963,698 UART: [art] Derive Key Pair
25,964,697 UART: [art] Store priv key in slot 0x5
29,258,121 UART: [art] Derive Key Pair - Done
29,270,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,149 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,654 UART: [art] PUB.X = 371D664BAA61E044B9D5CD7FBD4A3CDE67B9B971349476628974EC06F24ACCB91F956FD2DA493C2A95445E2F4582EB8C
31,568,003 UART: [art] PUB.Y = 7A2B3CBD187130C6C5A756DEF333099D643D47E6EC34F4D654423C0DE41ABD68E8519A563CC246B1FFDD2EFD5FE16F0A
31,575,194 UART: [art] SIG.R = 296C0D20FE3C96EAC7CEBBD0CEE96CDA9DB1F9ADC7362487C1DF1589CFB83E207905E381213EE516ECA1D3A31C15EB22
31,582,661 UART: [art] SIG.S = 9C4FC407B59EC086248CBAFFA4EF7704DB66EA67C9857214826C3EE03A62A0796A0E5F57E57295EDE7900326D8F06A46
32,888,211 UART: Caliptra RT
32,888,912 UART: [state] CFI Enabled
33,065,300 UART: [rt] RT listening for mailbox commands...
33,067,632 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,097,642 UART: [rt]cmd =0x49444550, len=8
33,099,968 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,807,101 ready_for_fw is high
3,807,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,971,224 >>> mbox cmd response: success
23,673,505 UART:
23,673,908 UART: Running Caliptra FMC ...
23,675,233 UART:
23,675,435 UART: [state] CFI Enabled
23,744,476 UART: [fht] FMC Alias Private Key: 7
26,084,892 UART: [art] Extend RT PCRs Done
26,086,132 UART: [art] Lock RT PCRs Done
26,087,763 UART: [art] Populate DV Done
26,093,295 UART: [fht] FMC Alias Private Key: 7
26,094,837 UART: [art] Derive CDI
26,095,691 UART: [art] Store in slot 0x4
26,153,290 UART: [art] Derive Key Pair
26,154,334 UART: [art] Store priv key in slot 0x5
29,447,316 UART: [art] Derive Key Pair - Done
29,460,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,425 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,933 UART: [art] PUB.X = EEF24330681FF0AC435422634A3D8C0C507D179EF43EA5DE7AEAEE4BB00BBA5A28386389FFA10F465702C38B4B032EB6
31,758,187 UART: [art] PUB.Y = B13C02C260EEA2B0BCDE509588F6C3FB90D6ECD7178994C0CCBE3E87CF6D0688CDD0A04779CC589418376BD810BF6AFC
31,765,436 UART: [art] SIG.R = 5E327E39EDBC93C380ACAEE7EFF4907C6E99CE842E1FF40999377BB724D506BC26E7FEF303B127CC3EE77179ED74D021
31,772,889 UART: [art] SIG.S = 99E061FEBA7F94641DF80CE8497E6D861271831AF06AED7C2208F2976C21891B035D909B86DF102867486553A8194DE1
33,077,746 UART: Caliptra RT
33,078,474 UART: [state] CFI Enabled
33,255,529 UART: [rt] RT listening for mailbox commands...
33,257,838 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,287,906 UART: [rt]cmd =0x49444550, len=8
33,290,346 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,443 UART:
192,806 UART: Running Caliptra ROM ...
193,940 UART:
603,563 UART: [state] CFI Enabled
619,213 UART: [state] LifecycleState = Unprovisioned
621,152 UART: [state] DebugLocked = No
624,026 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,463 UART: [kat] SHA2-256
798,240 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,782 UART: [kat] ++
809,251 UART: [kat] sha1
820,405 UART: [kat] SHA2-256
823,127 UART: [kat] SHA2-384
828,472 UART: [kat] SHA2-512-ACC
830,831 UART: [kat] ECC-384
3,116,332 UART: [kat] HMAC-384Kdf
3,128,777 UART: [kat] LMS
4,318,914 UART: [kat] --
4,323,968 UART: [cold-reset] ++
4,325,043 UART: [fht] Storing FHT @ 0x50003400
4,337,795 UART: [idev] ++
4,338,421 UART: [idev] CDI.KEYID = 6
4,339,322 UART: [idev] SUBJECT.KEYID = 7
4,340,557 UART: [idev] UDS.KEYID = 0
4,341,541 ready_for_fw is high
4,341,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,618 UART: [idev] Erasing UDS.KEYID = 0
7,623,366 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,848 UART: [idev] --
7,651,381 UART: [ldev] ++
7,651,955 UART: [ldev] CDI.KEYID = 6
7,652,970 UART: [ldev] SUBJECT.KEYID = 5
7,654,117 UART: [ldev] AUTHORITY.KEYID = 7
7,655,397 UART: [ldev] FE.KEYID = 1
7,665,228 UART: [ldev] Erasing FE.KEYID = 1
10,956,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,513 UART: [ldev] --
13,313,580 UART: [fwproc] Waiting for Commands...
13,316,765 UART: [fwproc] Received command 0x46574c44
13,318,950 UART: [fwproc] Received Image of size 118548 bytes
17,424,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,783 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,952 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,896,678 >>> mbox cmd response: success
17,900,466 UART: [afmc] ++
17,901,094 UART: [afmc] CDI.KEYID = 6
17,902,006 UART: [afmc] SUBJECT.KEYID = 7
17,903,221 UART: [afmc] AUTHORITY.KEYID = 5
21,219,885 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,747 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,175 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,566 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,317 UART: [afmc] --
23,587,403 UART: [cold-reset] --
23,590,665 UART: [state] Locking Datavault
23,595,849 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,595 UART: [state] Locking ICCM
23,598,876 UART: [exit] Launching FMC @ 0x40000130
23,607,267 UART:
23,607,498 UART: Running Caliptra FMC ...
23,608,593 UART:
23,608,750 UART: [state] CFI Enabled
23,616,792 UART: [fht] FMC Alias Private Key: 7
25,957,078 UART: [art] Extend RT PCRs Done
25,958,304 UART: [art] Lock RT PCRs Done
25,959,902 UART: [art] Populate DV Done
25,965,266 UART: [fht] FMC Alias Private Key: 7
25,966,811 UART: [art] Derive CDI
25,967,572 UART: [art] Store in slot 0x4
26,010,110 UART: [art] Derive Key Pair
26,011,109 UART: [art] Store priv key in slot 0x5
29,253,485 UART: [art] Derive Key Pair - Done
29,266,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,899 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,401 UART: [art] PUB.X = DE4A32BF994094FDCEC4983ECE38A66BEE12D39DA3622A98F485534DA85E9C4CD2713ACA3C7E35EB8DE1E6FFE57A0780
31,555,688 UART: [art] PUB.Y = 84CEF404916EFAF7F4A573841EC557400A6D349DF01C574227B508CCD9120AE8EED7CB841EEB471A4573E60F0B14E9FB
31,562,974 UART: [art] SIG.R = 1406F50BA20C2BD8A870A9132C3FB2C831597AC6B70CF024570AF5FAD52DB4EDCCEC338C21DD4329815F21EB2A7AD14C
31,570,391 UART: [art] SIG.S = EA8E70C15E8D0E21430B7323B1758218938F0546D1C660D7E996324D26D5B064E0F48009CC1C75E1669F9573BD5FC230
32,875,448 UART: Caliptra RT
32,876,155 UART: [state] CFI Enabled
33,009,964 UART: [rt] RT listening for mailbox commands...
33,012,255 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,042,165 UART: [rt]cmd =0x49444550, len=8
33,044,375 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
4,131,425 ready_for_fw is high
4,132,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,965 >>> mbox cmd response: success
23,806,152 UART:
23,806,559 UART: Running Caliptra FMC ...
23,807,672 UART:
23,807,828 UART: [state] CFI Enabled
23,815,919 UART: [fht] FMC Alias Private Key: 7
26,155,589 UART: [art] Extend RT PCRs Done
26,156,813 UART: [art] Lock RT PCRs Done
26,158,411 UART: [art] Populate DV Done
26,163,800 UART: [fht] FMC Alias Private Key: 7
26,165,351 UART: [art] Derive CDI
26,166,115 UART: [art] Store in slot 0x4
26,208,946 UART: [art] Derive Key Pair
26,209,937 UART: [art] Store priv key in slot 0x5
29,452,285 UART: [art] Derive Key Pair - Done
29,465,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,728 UART: [art] PUB.X = DDFAA12260D397B39007CD2259CEF82064BD29BF5313878857B905E9D78E967BF0D9E1A1A642046756549E67D42A388D
31,753,922 UART: [art] PUB.Y = C8FCE26F08E317765E678467EB736E84D74D434009234D0ED9EE07E9CA9554773D25C0DF2E82863332BD321823DF3DF9
31,761,165 UART: [art] SIG.R = C07BE23C3866F469A3E70AE01DC5B6EF591C6BBEA2A3013882CCF8F070889669BDB09DF9348F9396824F9A9A0C299775
31,768,557 UART: [art] SIG.S = B1B5C2B30DE1C669FE8D3055357D8C50E2AD94BF398154E7D98D6D016F2B299676BBBC5C74B7AEB432F8BD8056E07216
33,073,687 UART: Caliptra RT
33,074,408 UART: [state] CFI Enabled
33,208,070 UART: [rt] RT listening for mailbox commands...
33,210,383 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
33,240,412 UART: [rt]cmd =0x49444550, len=8
33,242,744 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,024 UART:
192,387 UART: Running Caliptra ROM ...
193,563 UART:
193,715 UART: [state] CFI Enabled
253,207 UART: [state] LifecycleState = Unprovisioned
255,136 UART: [state] DebugLocked = No
256,803 UART: [state] WD Timer not started. Device not locked for debugging
260,858 UART: [kat] SHA2-256
440,490 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
451,291 UART: [kat] ++
451,821 UART: [kat] sha1
462,768 UART: [kat] SHA2-256
465,418 UART: [kat] SHA2-384
470,903 UART: [kat] SHA2-512-ACC
473,335 UART: [kat] ECC-384
2,935,936 UART: [kat] HMAC-384Kdf
2,959,257 UART: [kat] LMS
3,435,748 UART: [kat] --
3,440,053 UART: [cold-reset] ++
3,441,074 UART: [fht] FHT @ 0x50003400
3,451,626 UART: [idev] ++
3,452,188 UART: [idev] CDI.KEYID = 6
3,453,173 UART: [idev] SUBJECT.KEYID = 7
3,454,361 UART: [idev] UDS.KEYID = 0
3,455,285 ready_for_fw is high
3,455,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,604,529 UART: [idev] Erasing UDS.KEYID = 0
5,978,887 UART: [idev] Sha1 KeyId Algorithm
6,002,228 UART: [idev] --
6,008,280 UART: [ldev] ++
6,008,908 UART: [ldev] CDI.KEYID = 6
6,009,819 UART: [ldev] SUBJECT.KEYID = 5
6,011,030 UART: [ldev] AUTHORITY.KEYID = 7
6,012,263 UART: [ldev] FE.KEYID = 1
6,045,752 UART: [ldev] Erasing FE.KEYID = 1
8,551,690 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,287,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,303,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,319,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,335,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,356,867 UART: [ldev] --
10,362,320 UART: [fwproc] Wait for Commands...
10,364,955 UART: [fwproc] Recv command 0x46574c44
10,366,989 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,341,436 >>> mbox cmd response: success
14,345,655 UART: [afmc] ++
14,346,272 UART: [afmc] CDI.KEYID = 6
14,347,186 UART: [afmc] SUBJECT.KEYID = 7
14,348,397 UART: [afmc] AUTHORITY.KEYID = 5
16,879,182 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,603,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,606,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,621,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,637,909 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,653,516 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,678,123 UART: [afmc] --
18,681,615 UART: [cold-reset] --
18,686,347 UART: [state] Locking Datavault
18,692,396 UART: [state] Locking PCR0, PCR1 and PCR31
18,694,137 UART: [state] Locking ICCM
18,696,873 UART: [exit] Launching FMC @ 0x40000130
18,705,261 UART:
18,705,500 UART: Running Caliptra FMC ...
18,706,598 UART:
18,706,760 UART: [state] CFI Enabled
18,761,271 UART: [fht] FMC Alias Private Key: 7
20,528,263 UART: [art] Extend RT PCRs Done
20,529,484 UART: [art] Lock RT PCRs Done
20,531,015 UART: [art] Populate DV Done
20,536,428 UART: [fht] FMC Alias Private Key: 7
20,538,123 UART: [art] Derive CDI
20,538,931 UART: [art] Store in slot 0x4
20,594,181 UART: [art] Derive Key Pair
20,595,214 UART: [art] Store priv key in slot 0x5
23,058,208 UART: [art] Derive Key Pair - Done
23,071,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,784,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,786,115 UART: [art] PUB.X = 0E5C3C0FB110442AF03CB1FC65DF9048612A020B69FFF1883AD6AB0C60D3CBA1CEFA1CBF028191141FCB391D67F502CD
24,793,359 UART: [art] PUB.Y = 9D064FECD3D21A3F6A469D601D9880DA1E5D0A6333321756EE8FBC94B4F5CE218E9873AB7B40AB5DA7E96B72633CE379
24,800,640 UART: [art] SIG.R = BE132F8FC8AFE19725C0D8FC395FEEEF0E9F4CDE7D3623365640490688372211F184266767BD46B560A21FC873EF5C54
24,808,039 UART: [art] SIG.S = 6615D921A4E9159C774D44BB4A65C71384FC6554FB16389398B2A57F405C6704A3F113F36E7F5B33F941AF210FF6BAD1
25,787,083 UART: Caliptra RT
25,787,786 UART: [state] CFI Enabled
25,968,137 UART: [rt] RT listening for mailbox commands...
25,970,532 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,000,388 UART: [rt]cmd =0x49444550, len=8
26,002,570 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
3,461,338 ready_for_fw is high
3,461,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,779 >>> mbox cmd response: success
18,534,411 UART:
18,534,805 UART: Running Caliptra FMC ...
18,536,003 UART:
18,536,179 UART: [state] CFI Enabled
18,601,856 UART: [fht] FMC Alias Private Key: 7
20,367,716 UART: [art] Extend RT PCRs Done
20,368,928 UART: [art] Lock RT PCRs Done
20,370,441 UART: [art] Populate DV Done
20,375,801 UART: [fht] FMC Alias Private Key: 7
20,377,335 UART: [art] Derive CDI
20,378,147 UART: [art] Store in slot 0x4
20,434,688 UART: [art] Derive Key Pair
20,435,727 UART: [art] Store priv key in slot 0x5
22,898,924 UART: [art] Derive Key Pair - Done
22,912,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,442 UART: [art] PUB.X = EA23978F49BCD1931FE1B28D9778D2494A68DA23F9D2F7681CA1DD0074408D5745E60545B188162319D3A0FA391002D4
24,633,691 UART: [art] PUB.Y = C0A50D6F760568E54742EBD5E2FAF219A097B1B3706ABA624EDBE46E257A731110EDFD8D6179E412AA7C9A03D6A6785C
24,641,000 UART: [art] SIG.R = FF5E6C8A87BFE8D4F076387F3C753EBE4DB5C554E543E885A0B118F13AD327C9FC979487CAB1F197C5163BF2C90D76A9
24,648,677 UART: [art] SIG.S = 8581E9048C0D228D449B3B14E4984493F8720DBCFD49343FFFF5B38B1C027A99ABFDAEF9A8BFABA7F9E509B1B6A290BF
25,627,663 UART: Caliptra RT
25,628,363 UART: [state] CFI Enabled
25,808,646 UART: [rt] RT listening for mailbox commands...
25,810,854 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,840,964 UART: [rt]cmd =0x49444550, len=8
25,843,243 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,501 UART:
192,859 UART: Running Caliptra ROM ...
193,962 UART:
603,593 UART: [state] CFI Enabled
617,979 UART: [state] LifecycleState = Unprovisioned
619,856 UART: [state] DebugLocked = No
621,091 UART: [state] WD Timer not started. Device not locked for debugging
625,701 UART: [kat] SHA2-256
805,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,147 UART: [kat] ++
816,593 UART: [kat] sha1
828,604 UART: [kat] SHA2-256
831,322 UART: [kat] SHA2-384
836,743 UART: [kat] SHA2-512-ACC
839,120 UART: [kat] ECC-384
3,281,034 UART: [kat] HMAC-384Kdf
3,293,630 UART: [kat] LMS
3,770,199 UART: [kat] --
3,773,650 UART: [cold-reset] ++
3,775,610 UART: [fht] FHT @ 0x50003400
3,786,593 UART: [idev] ++
3,787,158 UART: [idev] CDI.KEYID = 6
3,788,145 UART: [idev] SUBJECT.KEYID = 7
3,789,319 UART: [idev] UDS.KEYID = 0
3,790,368 ready_for_fw is high
3,790,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,389 UART: [idev] Erasing UDS.KEYID = 0
6,270,241 UART: [idev] Sha1 KeyId Algorithm
6,292,437 UART: [idev] --
6,296,376 UART: [ldev] ++
6,296,947 UART: [ldev] CDI.KEYID = 6
6,297,860 UART: [ldev] SUBJECT.KEYID = 5
6,299,079 UART: [ldev] AUTHORITY.KEYID = 7
6,300,317 UART: [ldev] FE.KEYID = 1
6,311,433 UART: [ldev] Erasing FE.KEYID = 1
8,793,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,371 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,256 UART: [ldev] --
10,585,358 UART: [fwproc] Wait for Commands...
10,588,377 UART: [fwproc] Recv command 0x46574c44
10,590,363 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,467 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,964 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,954 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,686 >>> mbox cmd response: success
14,553,634 UART: [afmc] ++
14,554,264 UART: [afmc] CDI.KEYID = 6
14,555,159 UART: [afmc] SUBJECT.KEYID = 7
14,556,393 UART: [afmc] AUTHORITY.KEYID = 5
17,063,807 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,783,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,785,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,801,274 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,817,316 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,909 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,501 UART: [afmc] --
18,861,309 UART: [cold-reset] --
18,864,576 UART: [state] Locking Datavault
18,869,830 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,735 UART: [state] Locking ICCM
18,873,896 UART: [exit] Launching FMC @ 0x40000130
18,882,302 UART:
18,882,538 UART: Running Caliptra FMC ...
18,883,638 UART:
18,883,819 UART: [state] CFI Enabled
18,892,093 UART: [fht] FMC Alias Private Key: 7
20,658,360 UART: [art] Extend RT PCRs Done
20,659,575 UART: [art] Lock RT PCRs Done
20,661,122 UART: [art] Populate DV Done
20,666,644 UART: [fht] FMC Alias Private Key: 7
20,668,232 UART: [art] Derive CDI
20,668,972 UART: [art] Store in slot 0x4
20,711,866 UART: [art] Derive Key Pair
20,712,895 UART: [art] Store priv key in slot 0x5
23,140,020 UART: [art] Derive Key Pair - Done
23,153,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,443 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,944 UART: [art] PUB.X = DD8B8573468F708C77C056A09A6797B6F7FE40C05B46DE9331EF44FFCFEDCBB9957949367ADFC28669AAAA29510C073A
24,868,190 UART: [art] PUB.Y = 27307DFED7580FA837B1039027F1AAB855F263FF88D1CFE08E0D66F87448FAC78EF37F6B398D878E104E1595F1D0885B
24,875,480 UART: [art] SIG.R = 338D9BE4A90E13D54C9DC53FCC5F65E409F4FBB410AE881E7643F93B84AD6D50378392C819CECAB905FDA7A764138918
24,882,907 UART: [art] SIG.S = 953D7D7F3DCA0AED28430DC84D9ECDAD87974D8ED8C4A4BE992D42A710384C82E5CFFCF18C68894621ADE24A899DD069
25,861,851 UART: Caliptra RT
25,862,551 UART: [state] CFI Enabled
25,996,130 UART: [rt] RT listening for mailbox commands...
25,998,319 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,028,261 UART: [rt]cmd =0x49444550, len=8
26,030,597 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,781,756 ready_for_fw is high
3,782,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,323 >>> mbox cmd response: success
18,700,546 UART:
18,700,956 UART: Running Caliptra FMC ...
18,702,067 UART:
18,702,230 UART: [state] CFI Enabled
18,710,393 UART: [fht] FMC Alias Private Key: 7
20,476,712 UART: [art] Extend RT PCRs Done
20,477,935 UART: [art] Lock RT PCRs Done
20,479,534 UART: [art] Populate DV Done
20,485,142 UART: [fht] FMC Alias Private Key: 7
20,486,807 UART: [art] Derive CDI
20,487,551 UART: [art] Store in slot 0x4
20,530,042 UART: [art] Derive Key Pair
20,531,084 UART: [art] Store priv key in slot 0x5
22,957,411 UART: [art] Derive Key Pair - Done
22,970,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,241 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,732 UART: [art] PUB.X = 282E96FFE0DB737AE8E3BD749B94DD2EAA291BBFE4DA7A22A2F4597678A7CD3EC007110187DAA703992A8BFAB47C8306
24,685,031 UART: [art] PUB.Y = 16455705A33617A49D733FA09FCFCA152D2675983AB670D7823D4816E7263A6F9F4C3ED594AF03140B25D765AB995105
24,692,237 UART: [art] SIG.R = 84B4E476CD8D4B70779F422724FF6EA283786A5D54423D6D7F13CF06837747BFF0C0B569540AFDBA24E31FE663FD7F97
24,699,646 UART: [art] SIG.S = 75352E350FF7FBEA966C6B13A476F76FB456842889EA2900A8053828139A4DACC49E7759CF2C8EC25AB461917E2F1482
25,678,751 UART: Caliptra RT
25,679,459 UART: [state] CFI Enabled
25,812,637 UART: [rt] RT listening for mailbox commands...
25,814,933 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
25,844,590 UART: [rt]cmd =0x49444550, len=8
25,846,811 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,164 UART:
192,540 UART: Running Caliptra ROM ...
193,725 UART:
193,900 UART: [state] CFI Enabled
264,187 UART: [state] LifecycleState = Unprovisioned
266,532 UART: [state] DebugLocked = No
269,129 UART: [state] WD Timer not started. Device not locked for debugging
274,162 UART: [kat] SHA2-256
464,076 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,818 UART: [kat] ++
475,300 UART: [kat] sha1
487,593 UART: [kat] SHA2-256
490,662 UART: [kat] SHA2-384
496,159 UART: [kat] SHA2-512-ACC
498,737 UART: [kat] ECC-384
2,945,312 UART: [kat] HMAC-384Kdf
2,969,890 UART: [kat] LMS
3,501,633 UART: [kat] --
3,505,689 UART: [cold-reset] ++
3,507,442 UART: [fht] FHT @ 0x50003400
3,519,579 UART: [idev] ++
3,520,289 UART: [idev] CDI.KEYID = 6
3,521,194 UART: [idev] SUBJECT.KEYID = 7
3,522,434 UART: [idev] UDS.KEYID = 0
3,523,363 ready_for_fw is high
3,523,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,662 UART: [idev] Erasing UDS.KEYID = 0
6,027,861 UART: [idev] Sha1 KeyId Algorithm
6,050,013 UART: [idev] --
6,056,278 UART: [ldev] ++
6,056,954 UART: [ldev] CDI.KEYID = 6
6,057,839 UART: [ldev] SUBJECT.KEYID = 5
6,059,047 UART: [ldev] AUTHORITY.KEYID = 7
6,060,227 UART: [ldev] FE.KEYID = 1
6,098,069 UART: [ldev] Erasing FE.KEYID = 1
8,603,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,274 UART: [ldev] --
10,413,371 UART: [fwproc] Wait for Commands...
10,416,273 UART: [fwproc] Recv command 0x46574c44
10,418,574 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,780 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,117 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,721 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,211 >>> mbox cmd response: success
14,684,863 UART: [afmc] ++
14,685,590 UART: [afmc] CDI.KEYID = 6
14,686,776 UART: [afmc] SUBJECT.KEYID = 7
14,688,211 UART: [afmc] AUTHORITY.KEYID = 5
17,229,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,769 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,002 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,923 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,145 UART: [afmc] --
19,030,066 UART: [cold-reset] --
19,034,853 UART: [state] Locking Datavault
19,042,482 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,677 UART: [state] Locking ICCM
19,047,402 UART: [exit] Launching FMC @ 0x40000130
19,056,076 UART:
19,056,312 UART: Running Caliptra FMC ...
19,057,351 UART:
19,057,498 UART: [state] CFI Enabled
19,111,442 UART: [fht] FMC Alias Private Key: 7
20,877,639 UART: [art] Extend RT PCRs Done
20,878,867 UART: [art] Lock RT PCRs Done
20,880,522 UART: [art] Populate DV Done
20,885,926 UART: [fht] FMC Alias Private Key: 7
20,887,565 UART: [art] Derive CDI
20,888,375 UART: [art] Store in slot 0x4
20,943,697 UART: [art] Derive Key Pair
20,944,764 UART: [art] Store priv key in slot 0x5
23,407,611 UART: [art] Derive Key Pair - Done
23,420,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,133,608 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,113 UART: [art] PUB.X = 11293F5CD9F571D33FBB41FFFF899F8658E732E3D53792E4E3EBF9542A32DF939DDA05E60CE2859E5949B2725A950C9F
25,142,424 UART: [art] PUB.Y = B64EDE6A96530AFA655D3215F5E8866641DACFFB62BE1A0B8C81F080C2AFE15A1B833450F53426FEAEA560DC0E5E8B42
25,149,665 UART: [art] SIG.R = 25142C85DFA5DE170F710C29645B6FD24B06FF1E57C4B98FC68827A3492BE86F1C46B87FD7353CFE2ADFEC4ADF1458CB
25,157,129 UART: [art] SIG.S = F8B234AACDD820850212FE6500B5B963239D5DDD461FA5B85F538970A79C7C7CF9475011BDC7FADECF70EE2228D57CD0
26,135,852 UART: Caliptra RT
26,136,548 UART: [state] CFI Enabled
26,317,760 UART: [rt] RT listening for mailbox commands...
26,320,046 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,350,154 UART: [rt]cmd =0x49444550, len=8
26,352,369 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
3,439,443 ready_for_fw is high
3,439,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,350 >>> mbox cmd response: success
19,108,753 UART:
19,109,156 UART: Running Caliptra FMC ...
19,110,293 UART:
19,110,454 UART: [state] CFI Enabled
19,179,432 UART: [fht] FMC Alias Private Key: 7
20,945,844 UART: [art] Extend RT PCRs Done
20,947,080 UART: [art] Lock RT PCRs Done
20,948,870 UART: [art] Populate DV Done
20,954,203 UART: [fht] FMC Alias Private Key: 7
20,955,727 UART: [art] Derive CDI
20,956,493 UART: [art] Store in slot 0x4
21,012,833 UART: [art] Derive Key Pair
21,013,838 UART: [art] Store priv key in slot 0x5
23,476,267 UART: [art] Derive Key Pair - Done
23,488,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,116 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,624 UART: [art] PUB.X = 9DDA9B8BEF1EA207B9013B6BF5EB007C42BA873CE692E6B9B1449D5441A75402184E28F691B2FA0DD4AC33195D6403B0
25,210,860 UART: [art] PUB.Y = 9E18DF05F30DBCD45935E402D27A979BB0BAB83A0948BCFEA84C738A580F61B0588A979C77A393E1F7F6422DFEE3E6FF
25,218,119 UART: [art] SIG.R = 2D0B54A7497A64F043EA36F0D76FFAD0A5437EEDE2AF7861925AD24E9D144F8C19F1262DE48B5BB77C472C2119E24F70
25,225,569 UART: [art] SIG.S = 31E6DF7AF06DF207321CA8D1AB440353972AB8746CDA20BCF2CE07B3261FC729182863B69F01F5B3DFC47D449B2D78AF
26,204,532 UART: Caliptra RT
26,205,214 UART: [state] CFI Enabled
26,385,071 UART: [rt] RT listening for mailbox commands...
26,387,371 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,417,256 UART: [rt]cmd =0x49444550, len=8
26,419,427 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,357 writing to cptra_bootfsm_go
193,524 UART:
193,880 UART: Running Caliptra ROM ...
194,980 UART:
604,626 UART: [state] CFI Enabled
619,361 UART: [state] LifecycleState = Unprovisioned
621,748 UART: [state] DebugLocked = No
623,556 UART: [state] WD Timer not started. Device not locked for debugging
628,025 UART: [kat] SHA2-256
817,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,705 UART: [kat] ++
829,227 UART: [kat] sha1
839,603 UART: [kat] SHA2-256
842,611 UART: [kat] SHA2-384
850,259 UART: [kat] SHA2-512-ACC
852,850 UART: [kat] ECC-384
3,294,054 UART: [kat] HMAC-384Kdf
3,305,751 UART: [kat] LMS
3,837,587 UART: [kat] --
3,842,534 UART: [cold-reset] ++
3,843,925 UART: [fht] FHT @ 0x50003400
3,854,841 UART: [idev] ++
3,855,551 UART: [idev] CDI.KEYID = 6
3,856,584 UART: [idev] SUBJECT.KEYID = 7
3,857,691 UART: [idev] UDS.KEYID = 0
3,858,596 ready_for_fw is high
3,858,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,664 UART: [idev] Erasing UDS.KEYID = 0
6,335,459 UART: [idev] Sha1 KeyId Algorithm
6,357,551 UART: [idev] --
6,363,121 UART: [ldev] ++
6,363,805 UART: [ldev] CDI.KEYID = 6
6,364,690 UART: [ldev] SUBJECT.KEYID = 5
6,365,900 UART: [ldev] AUTHORITY.KEYID = 7
6,367,080 UART: [ldev] FE.KEYID = 1
6,378,141 UART: [ldev] Erasing FE.KEYID = 1
8,854,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,437 UART: [ldev] --
10,642,769 UART: [fwproc] Wait for Commands...
10,645,173 UART: [fwproc] Recv command 0x46574c44
10,647,492 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,984 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,506 >>> mbox cmd response: success
14,918,511 UART: [afmc] ++
14,919,241 UART: [afmc] CDI.KEYID = 6
14,920,444 UART: [afmc] SUBJECT.KEYID = 7
14,921,897 UART: [afmc] AUTHORITY.KEYID = 5
17,424,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,410 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,332 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,443 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,592 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,474 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,597 UART: [afmc] --
19,222,099 UART: [cold-reset] --
19,225,227 UART: [state] Locking Datavault
19,230,083 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,254 UART: [state] Locking ICCM
19,234,526 UART: [exit] Launching FMC @ 0x40000130
19,243,175 UART:
19,243,415 UART: Running Caliptra FMC ...
19,244,520 UART:
19,244,683 UART: [state] CFI Enabled
19,252,571 UART: [fht] FMC Alias Private Key: 7
21,019,061 UART: [art] Extend RT PCRs Done
21,020,288 UART: [art] Lock RT PCRs Done
21,022,069 UART: [art] Populate DV Done
21,027,547 UART: [fht] FMC Alias Private Key: 7
21,029,310 UART: [art] Derive CDI
21,030,053 UART: [art] Store in slot 0x4
21,073,086 UART: [art] Derive Key Pair
21,074,130 UART: [art] Store priv key in slot 0x5
23,500,893 UART: [art] Derive Key Pair - Done
23,513,675 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,652 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,156 UART: [art] PUB.X = 525497AC97A949CA0945B49D292D24EB5821BEF0638FA5BE0659A067C53802D40FD319E0B85CBF6ED80D77A257D84DC5
25,228,432 UART: [art] PUB.Y = 846ED7ED4E330EFBC14C374435B0E8A3AB80D515B658A7F1BED6E66F593657919B8365E8290B5921ABDD8289D788F888
25,235,647 UART: [art] SIG.R = 55CB673BEA29B58B6896A322809218B0E8563F6AB02AA8A918908DA2E8982500581BF8E70EB9D65424B714C3FD9B07F2
25,243,019 UART: [art] SIG.S = 1F68BCB9B13C715CAFA55BB07E1F08B837897DEEAD1D6D9DC7939CF845169B1CBAE45091ACD1F41FC9F41AB724A73F07
26,221,698 UART: Caliptra RT
26,222,388 UART: [state] CFI Enabled
26,355,727 UART: [rt] RT listening for mailbox commands...
26,357,998 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,388,011 UART: [rt]cmd =0x49444550, len=8
26,390,247 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
3,757,651 ready_for_fw is high
3,758,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,057,706 >>> mbox cmd response: success
19,317,435 UART:
19,317,855 UART: Running Caliptra FMC ...
19,319,001 UART:
19,319,173 UART: [state] CFI Enabled
19,326,967 UART: [fht] FMC Alias Private Key: 7
21,093,078 UART: [art] Extend RT PCRs Done
21,094,309 UART: [art] Lock RT PCRs Done
21,095,564 UART: [art] Populate DV Done
21,101,164 UART: [fht] FMC Alias Private Key: 7
21,102,670 UART: [art] Derive CDI
21,103,435 UART: [art] Store in slot 0x4
21,145,876 UART: [art] Derive Key Pair
21,146,924 UART: [art] Store priv key in slot 0x5
23,573,694 UART: [art] Derive Key Pair - Done
23,586,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,293,221 UART: [art] Erasing AUTHORITY.KEYID = 7
25,294,732 UART: [art] PUB.X = F64B7D4470F84269BB024A1BAEA093802D91809EB7CA831833C0213222693B27ED1A5E51F900E79633F081C8EB54786B
25,301,973 UART: [art] PUB.Y = 36DFCF8843E1D42359482120A2A71BB4BA9DED900EDA309AB116A70E330320DF895B63EFD244E64741840A4D0969296E
25,309,237 UART: [art] SIG.R = 8401D0DEF06C13F897E5D6855B34B88364ABAFFECDE70DF3BD2DB84115C2473C42277A5DBDFE5DD1831E1F124EE66532
25,316,623 UART: [art] SIG.S = 69EBDB526896E19230F0D332EB2E22DED68E2F16FDE54DC752E6FE5108E8C0651DCD6AD84DFD663BDB9D332D16BCC499
26,295,284 UART: Caliptra RT
26,295,977 UART: [state] CFI Enabled
26,429,092 UART: [rt] RT listening for mailbox commands...
26,431,431 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
26,461,334 UART: [rt]cmd =0x49444550, len=8
26,463,658 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,151 UART: [kat] SHA2-256
882,082 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,197 UART: [kat] ++
886,349 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,384 UART: [kat] SHA2-512-ACC
897,285 UART: [kat] ECC-384
902,418 UART: [kat] HMAC-384Kdf
906,804 UART: [kat] LMS
1,475,000 UART: [kat] --
1,476,079 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 ready_for_fw is high
1,480,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,138 UART: [idev] Erasing UDS.KEYID = 0
1,505,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,190 UART: [idev] --
1,515,273 UART: [ldev] ++
1,515,441 UART: [ldev] CDI.KEYID = 6
1,515,804 UART: [ldev] SUBJECT.KEYID = 5
1,516,230 UART: [ldev] AUTHORITY.KEYID = 7
1,516,693 UART: [ldev] FE.KEYID = 1
1,521,845 UART: [ldev] Erasing FE.KEYID = 1
1,547,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,585,981 UART: [fwproc] Waiting for Commands...
1,586,718 UART: [fwproc] Received command 0x46574c44
1,587,509 UART: [fwproc] Received Image of size 118548 bytes
2,932,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,359 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,577 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,930 >>> mbox cmd response: success
3,131,122 UART: [afmc] ++
3,131,290 UART: [afmc] CDI.KEYID = 6
3,131,652 UART: [afmc] SUBJECT.KEYID = 7
3,132,077 UART: [afmc] AUTHORITY.KEYID = 5
3,167,696 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,740 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,229 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,112 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,795 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,691 UART: [afmc] --
3,210,745 UART: [cold-reset] --
3,211,635 UART: [state] Locking Datavault
3,213,150 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,754 UART: [state] Locking ICCM
3,214,424 UART: [exit] Launching FMC @ 0x40000130
3,219,754 UART:
3,219,770 UART: Running Caliptra FMC ...
3,220,178 UART:
3,220,232 UART: [state] CFI Enabled
3,231,134 UART: [fht] FMC Alias Private Key: 7
3,350,020 UART: [art] Extend RT PCRs Done
3,350,448 UART: [art] Lock RT PCRs Done
3,351,784 UART: [art] Populate DV Done
3,359,867 UART: [fht] FMC Alias Private Key: 7
3,360,913 UART: [art] Derive CDI
3,361,193 UART: [art] Store in slot 0x4
3,446,849 UART: [art] Derive Key Pair
3,447,209 UART: [art] Store priv key in slot 0x5
3,460,598 UART: [art] Derive Key Pair - Done
3,475,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,497 UART: [art] PUB.X = C00085E25425B7A7CDA83DA945F39FFC5DE7D7F17F933C364BB440CE6B1F0106E807F188DFE8E5D1073BA4549EBF9AF3
3,498,249 UART: [art] PUB.Y = 9F70E9F85187C6AA44F581E7899F3B9C0907752E144C28E0C867C3D64203DCF3A7D77A2D2F57F0F2A8CBF5F985A48425
3,505,194 UART: [art] SIG.R = 9407F73037A0240DC02011F1A39CEA6A0BF98211F96D133B08DDF0BEAAD5E9E751152312B18C3988C83CB3CD3F056343
3,511,953 UART: [art] SIG.S = D4E029DA285492A9AA1EB0296AECE0EFCA20AD5A7F337BA1E40C28E2D33551851553F583551BA889B93BFCEE14F19A7F
3,535,270 UART: Caliptra RT
3,535,521 UART: [state] CFI Enabled
3,655,473 UART: [rt] RT listening for mailbox commands...
3,656,143 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,147 UART: [rt]cmd =0x49444550, len=8
3,688,006 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,531 ready_for_fw is high
1,362,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,274 >>> mbox cmd response: success
3,043,729 UART:
3,043,745 UART: Running Caliptra FMC ...
3,044,153 UART:
3,044,207 UART: [state] CFI Enabled
3,055,019 UART: [fht] FMC Alias Private Key: 7
3,173,837 UART: [art] Extend RT PCRs Done
3,174,265 UART: [art] Lock RT PCRs Done
3,175,793 UART: [art] Populate DV Done
3,184,186 UART: [fht] FMC Alias Private Key: 7
3,185,306 UART: [art] Derive CDI
3,185,586 UART: [art] Store in slot 0x4
3,271,660 UART: [art] Derive Key Pair
3,272,020 UART: [art] Store priv key in slot 0x5
3,285,099 UART: [art] Derive Key Pair - Done
3,299,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,532 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,297 UART: [art] PUB.X = E9DE1D40C01279B4B5260EE1D666764A33230A62A39AB9BD9B3B6F1A941DB18F96860796E12CCCA7ED1988234640C3C6
3,323,062 UART: [art] PUB.Y = DD616465771EF75998F76151F9A8D84F14CB101C14D92738381F62978D6465C107EC1C00220A3212B9C77D9250EBA02C
3,329,976 UART: [art] SIG.R = 0ED351E071D6745D026434FE0AC55128CD5CFBBE742A5D4471A49F418EDD8C2CAE4DC4A27B61B88BAA3FC7E8813AC68F
3,336,757 UART: [art] SIG.S = 8D82B83602C93291D4E9EF92A010E14B8A57DA4D301B1DF5792F7B3A8F946A73C1ECC9FD5508F7C4352EF3779BC898E1
3,359,887 UART: Caliptra RT
3,360,138 UART: [state] CFI Enabled
3,480,639 UART: [rt] RT listening for mailbox commands...
3,481,309 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,027 UART: [rt]cmd =0x49444550, len=8
3,512,928 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,666 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,268 UART: [kat] SHA2-256
882,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,314 UART: [kat] ++
886,466 UART: [kat] sha1
890,644 UART: [kat] SHA2-256
892,582 UART: [kat] SHA2-384
895,131 UART: [kat] SHA2-512-ACC
897,032 UART: [kat] ECC-384
902,883 UART: [kat] HMAC-384Kdf
907,463 UART: [kat] LMS
1,475,659 UART: [kat] --
1,476,528 UART: [cold-reset] ++
1,476,908 UART: [fht] Storing FHT @ 0x50003400
1,479,641 UART: [idev] ++
1,479,809 UART: [idev] CDI.KEYID = 6
1,480,169 UART: [idev] SUBJECT.KEYID = 7
1,480,593 UART: [idev] UDS.KEYID = 0
1,480,938 ready_for_fw is high
1,480,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,506,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,597 UART: [idev] --
1,515,522 UART: [ldev] ++
1,515,690 UART: [ldev] CDI.KEYID = 6
1,516,053 UART: [ldev] SUBJECT.KEYID = 5
1,516,479 UART: [ldev] AUTHORITY.KEYID = 7
1,516,942 UART: [ldev] FE.KEYID = 1
1,522,048 UART: [ldev] Erasing FE.KEYID = 1
1,547,167 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,239 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,525 UART: [fwproc] Received command 0x46574c44
1,588,316 UART: [fwproc] Received Image of size 118548 bytes
2,932,570 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,922 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,140 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,479 >>> mbox cmd response: success
3,131,679 UART: [afmc] ++
3,131,847 UART: [afmc] CDI.KEYID = 6
3,132,209 UART: [afmc] SUBJECT.KEYID = 7
3,132,634 UART: [afmc] AUTHORITY.KEYID = 5
3,167,881 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,708 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,591 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,274 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,964 UART: [afmc] --
3,211,038 UART: [cold-reset] --
3,211,716 UART: [state] Locking Datavault
3,213,067 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,671 UART: [state] Locking ICCM
3,214,257 UART: [exit] Launching FMC @ 0x40000130
3,219,587 UART:
3,219,603 UART: Running Caliptra FMC ...
3,220,011 UART:
3,220,154 UART: [state] CFI Enabled
3,231,066 UART: [fht] FMC Alias Private Key: 7
3,349,466 UART: [art] Extend RT PCRs Done
3,349,894 UART: [art] Lock RT PCRs Done
3,351,400 UART: [art] Populate DV Done
3,359,621 UART: [fht] FMC Alias Private Key: 7
3,360,705 UART: [art] Derive CDI
3,360,985 UART: [art] Store in slot 0x4
3,446,397 UART: [art] Derive Key Pair
3,446,757 UART: [art] Store priv key in slot 0x5
3,460,106 UART: [art] Derive Key Pair - Done
3,474,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,868 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,633 UART: [art] PUB.X = 7998460F12733800BC6EBDE5C840B320877B124B35D1158853E4CA18384ABD2C94A515322D0C5F5AB6A1728BE7B62396
3,498,371 UART: [art] PUB.Y = 43B0545B30014BE51BDDC49CE9B736F89365C6D98A9C9BDA79421CC23AA81A023B75A70B638B19D309EF85189301C094
3,505,308 UART: [art] SIG.R = 2F2644BEF09B03B5E189F4C8E63DB9DB567962FF230C4FF053B4A04455FE9065917DF54B34DDA45A03FA9F0C353A8BF8
3,512,078 UART: [art] SIG.S = D1C171E531A0EBA0AC19CB47F6B0EE270069A034A6B42E2E9BAD812CC5291A35234A5CDC0D9BE01FE0B69952C65EB595
3,535,895 UART: Caliptra RT
3,536,238 UART: [state] CFI Enabled
3,657,745 UART: [rt] RT listening for mailbox commands...
3,658,415 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,395 UART: [rt]cmd =0x49444550, len=8
3,690,080 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 ready_for_fw is high
1,363,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,851 >>> mbox cmd response: success
3,044,818 UART:
3,044,834 UART: Running Caliptra FMC ...
3,045,242 UART:
3,045,385 UART: [state] CFI Enabled
3,056,347 UART: [fht] FMC Alias Private Key: 7
3,174,623 UART: [art] Extend RT PCRs Done
3,175,051 UART: [art] Lock RT PCRs Done
3,176,557 UART: [art] Populate DV Done
3,185,034 UART: [fht] FMC Alias Private Key: 7
3,186,150 UART: [art] Derive CDI
3,186,430 UART: [art] Store in slot 0x4
3,271,998 UART: [art] Derive Key Pair
3,272,358 UART: [art] Store priv key in slot 0x5
3,286,059 UART: [art] Derive Key Pair - Done
3,300,452 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,602 UART: [art] PUB.X = D9E2A9EC5B43B86EBADEF95E47F7CEDF22416E65960E611D5D2B79D174F2454335D7DE00FBBD69AF96750C5CE2A30993
3,323,357 UART: [art] PUB.Y = DC10934EBE8BB86BA4829571929C4FB8C3CB1A41668861DA086469C17B1535D9FBC1EB8D8D6EAD973D590FC05922B599
3,330,309 UART: [art] SIG.R = 5CF65AEC6B3312055A596459858D83C43EC0E7DDA91731EF3851B0A2C4A0EF0D2A5278755D51895C9CD4ED06067FC38F
3,337,073 UART: [art] SIG.S = 63B1A02EBBFBD84D0078AFB8BA5E2DEBFC9FD59A9080CF1737E18FC405D645AA31DA1877B129DB61870A95B64D224F7A
3,360,483 UART: Caliptra RT
3,360,826 UART: [state] CFI Enabled
3,482,270 UART: [rt] RT listening for mailbox commands...
3,482,940 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,792 UART: [rt]cmd =0x49444550, len=8
3,514,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,265 UART: [kat] SHA2-512-ACC
906,166 UART: [kat] ECC-384
916,053 UART: [kat] HMAC-384Kdf
920,577 UART: [kat] LMS
1,168,889 UART: [kat] --
1,169,872 UART: [cold-reset] ++
1,170,370 UART: [fht] FHT @ 0x50003400
1,173,108 UART: [idev] ++
1,173,276 UART: [idev] CDI.KEYID = 6
1,173,637 UART: [idev] SUBJECT.KEYID = 7
1,174,062 UART: [idev] UDS.KEYID = 0
1,174,408 ready_for_fw is high
1,174,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,345 UART: [idev] --
1,208,556 UART: [ldev] ++
1,208,724 UART: [ldev] CDI.KEYID = 6
1,209,088 UART: [ldev] SUBJECT.KEYID = 5
1,209,515 UART: [ldev] AUTHORITY.KEYID = 7
1,209,978 UART: [ldev] FE.KEYID = 1
1,214,904 UART: [ldev] Erasing FE.KEYID = 1
1,241,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,150 UART: [ldev] --
1,280,545 UART: [fwproc] Wait for Commands...
1,281,312 UART: [fwproc] Recv command 0x46574c44
1,282,045 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,089 >>> mbox cmd response: success
2,825,355 UART: [afmc] ++
2,825,523 UART: [afmc] CDI.KEYID = 6
2,825,886 UART: [afmc] SUBJECT.KEYID = 7
2,826,312 UART: [afmc] AUTHORITY.KEYID = 5
2,862,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,400 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,149 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,859 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,740 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,441 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,132 UART: [afmc] --
2,904,981 UART: [cold-reset] --
2,906,121 UART: [state] Locking Datavault
2,907,352 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,956 UART: [state] Locking ICCM
2,908,420 UART: [exit] Launching FMC @ 0x40000130
2,913,750 UART:
2,913,766 UART: Running Caliptra FMC ...
2,914,174 UART:
2,914,228 UART: [state] CFI Enabled
2,924,192 UART: [fht] FMC Alias Private Key: 7
3,043,092 UART: [art] Extend RT PCRs Done
3,043,520 UART: [art] Lock RT PCRs Done
3,044,872 UART: [art] Populate DV Done
3,053,137 UART: [fht] FMC Alias Private Key: 7
3,054,259 UART: [art] Derive CDI
3,054,539 UART: [art] Store in slot 0x4
3,140,382 UART: [art] Derive Key Pair
3,140,742 UART: [art] Store priv key in slot 0x5
3,153,896 UART: [art] Derive Key Pair - Done
3,168,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,826 UART: [art] PUB.X = 5A4697D728484A39FB36C331E154DE4E59EED0A9331C494BA8751D57F7A8CD514FC4E16760CA2739C0F0B2011FF2617B
3,192,597 UART: [art] PUB.Y = 7040D91A30435B32D63252200736322C525EAA66BF3FAB6C628487E55409FF8986FDA09D86B924D97F930938F0A46A67
3,199,530 UART: [art] SIG.R = 51BE532572D340A51D3A7260A9527BB7D605833FB929F78AC553F079887A1322A4A407E10F52C41928334635AE5AEACE
3,206,287 UART: [art] SIG.S = 53380AB86CD1F9790A9E9AF27723C68670EB56DE187B1DE81E064D968DA840F01E355F4892AECE63DB163340C3F84E94
3,230,248 UART: Caliptra RT
3,230,499 UART: [state] CFI Enabled
3,350,302 UART: [rt] RT listening for mailbox commands...
3,350,972 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,026 UART: [rt]cmd =0x49444550, len=8
3,382,779 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,562 ready_for_fw is high
1,059,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,843 >>> mbox cmd response: success
2,742,290 UART:
2,742,306 UART: Running Caliptra FMC ...
2,742,714 UART:
2,742,768 UART: [state] CFI Enabled
2,753,680 UART: [fht] FMC Alias Private Key: 7
2,872,602 UART: [art] Extend RT PCRs Done
2,873,030 UART: [art] Lock RT PCRs Done
2,874,814 UART: [art] Populate DV Done
2,883,215 UART: [fht] FMC Alias Private Key: 7
2,884,311 UART: [art] Derive CDI
2,884,591 UART: [art] Store in slot 0x4
2,970,854 UART: [art] Derive Key Pair
2,971,214 UART: [art] Store priv key in slot 0x5
2,984,666 UART: [art] Derive Key Pair - Done
2,999,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,844 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,609 UART: [art] PUB.X = 3895193F7F69D3198C9D9817B48C0428BDEF4C83B89092BFA4186A89DDA78A0A01D9E1C608A7A953C31685C82683017F
3,022,362 UART: [art] PUB.Y = 16B4DC9FF94C1B9154BF3E0759B413FB2AE8010F8665FC5D62933936AA654A6D21A22A862E570079214D41DAE110E7E3
3,029,283 UART: [art] SIG.R = 0C0B6AB08F6D2F97738FCA7596F1EBA37D5F505103494F26D181712AAFD3BAA027BCDA85828CB49E6F3D6B75256A4321
3,036,054 UART: [art] SIG.S = 7D2A3D2536292036CC9DD9C9EE5AA2763561B134D0BB76D1E5AFBDED6F38F32C53C37813A313C2057C2D0C2685F7AE1D
3,060,354 UART: Caliptra RT
3,060,605 UART: [state] CFI Enabled
3,180,000 UART: [rt] RT listening for mailbox commands...
3,180,670 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,548 UART: [rt]cmd =0x49444550, len=8
3,212,493 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,937 UART: [state] LifecycleState = Unprovisioned
86,592 UART: [state] DebugLocked = No
87,094 UART: [state] WD Timer not started. Device not locked for debugging
88,241 UART: [kat] SHA2-256
891,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,895 UART: [kat] ++
896,047 UART: [kat] sha1
900,271 UART: [kat] SHA2-256
902,211 UART: [kat] SHA2-384
904,954 UART: [kat] SHA2-512-ACC
906,855 UART: [kat] ECC-384
916,904 UART: [kat] HMAC-384Kdf
921,580 UART: [kat] LMS
1,169,892 UART: [kat] --
1,170,877 UART: [cold-reset] ++
1,171,451 UART: [fht] FHT @ 0x50003400
1,174,063 UART: [idev] ++
1,174,231 UART: [idev] CDI.KEYID = 6
1,174,592 UART: [idev] SUBJECT.KEYID = 7
1,175,017 UART: [idev] UDS.KEYID = 0
1,175,363 ready_for_fw is high
1,175,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,026 UART: [idev] Erasing UDS.KEYID = 0
1,199,868 UART: [idev] Sha1 KeyId Algorithm
1,208,906 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,579 UART: [ldev] SUBJECT.KEYID = 5
1,211,006 UART: [ldev] AUTHORITY.KEYID = 7
1,211,469 UART: [ldev] FE.KEYID = 1
1,216,975 UART: [ldev] Erasing FE.KEYID = 1
1,242,970 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,931 UART: [ldev] --
1,282,238 UART: [fwproc] Wait for Commands...
1,282,811 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,098 >>> mbox cmd response: success
2,826,286 UART: [afmc] ++
2,826,454 UART: [afmc] CDI.KEYID = 6
2,826,817 UART: [afmc] SUBJECT.KEYID = 7
2,827,243 UART: [afmc] AUTHORITY.KEYID = 5
2,862,802 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,345 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,094 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,804 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,685 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,386 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,075 UART: [afmc] --
2,906,058 UART: [cold-reset] --
2,907,170 UART: [state] Locking Datavault
2,908,339 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,943 UART: [state] Locking ICCM
2,909,483 UART: [exit] Launching FMC @ 0x40000130
2,914,813 UART:
2,914,829 UART: Running Caliptra FMC ...
2,915,237 UART:
2,915,380 UART: [state] CFI Enabled
2,926,214 UART: [fht] FMC Alias Private Key: 7
3,044,988 UART: [art] Extend RT PCRs Done
3,045,416 UART: [art] Lock RT PCRs Done
3,046,914 UART: [art] Populate DV Done
3,055,113 UART: [fht] FMC Alias Private Key: 7
3,056,047 UART: [art] Derive CDI
3,056,327 UART: [art] Store in slot 0x4
3,142,110 UART: [art] Derive Key Pair
3,142,470 UART: [art] Store priv key in slot 0x5
3,156,184 UART: [art] Derive Key Pair - Done
3,170,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,383 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,148 UART: [art] PUB.X = D8D1631CE7A89A2FB68C574F69A25398635C6656379553EE299E872C78829AFF55BE04166E381DBA5AFE229D44656F90
3,193,913 UART: [art] PUB.Y = 73F8DC61D81EC6A0896597AFBE185A49EEA13514CE5ADAB66B3B07E80BF5C52174C28E77E9FE83A8AD8F9801387A8063
3,200,866 UART: [art] SIG.R = 3B7785BAE65A52362DA6597208840B9B4B12F89ABD836235B0ED1ACA9723F21A9B4903654D115D5745EDB27456872A70
3,207,623 UART: [art] SIG.S = 4B78E83EAE3E0F026C8500E9C620F30D0938F75731FA89D751E3EA6EF91D555D0148F14E021B2B683DE2A5273060D2CC
3,231,747 UART: Caliptra RT
3,232,090 UART: [state] CFI Enabled
3,351,725 UART: [rt] RT listening for mailbox commands...
3,352,395 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,485 UART: [rt]cmd =0x49444550, len=8
3,384,322 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 ready_for_fw is high
1,059,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,361 >>> mbox cmd response: success
2,739,844 UART:
2,739,860 UART: Running Caliptra FMC ...
2,740,268 UART:
2,740,411 UART: [state] CFI Enabled
2,750,883 UART: [fht] FMC Alias Private Key: 7
2,870,135 UART: [art] Extend RT PCRs Done
2,870,563 UART: [art] Lock RT PCRs Done
2,871,997 UART: [art] Populate DV Done
2,880,560 UART: [fht] FMC Alias Private Key: 7
2,881,694 UART: [art] Derive CDI
2,881,974 UART: [art] Store in slot 0x4
2,967,557 UART: [art] Derive Key Pair
2,967,917 UART: [art] Store priv key in slot 0x5
2,980,793 UART: [art] Derive Key Pair - Done
2,995,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,590 UART: [art] PUB.X = E0E98E59260A4590D67B75B674DD4DEF59182BB772EC69C0341A492673773749301F65C6E885161D74E22A7E0B04B528
3,018,343 UART: [art] PUB.Y = 954F2489234705A51BA74FCD2F3CDC57CD34EF95FC1AE15DB5DC7ECCF719C073DAFAAE003CFA41334A17AD922628DBF0
3,025,292 UART: [art] SIG.R = B5B63CB4054ECEEEF189FE72FA03A12663ADA73C13661FEE8766E0E5B79F60FF19133BB3E88503B316F66B376EC11524
3,032,063 UART: [art] SIG.S = 87D9A2624D63FE988F55F416B54844EC0A36AB1EF0555FE06BD41BE7047B8281EB459087783F0C065C35322E153AF4D7
3,055,579 UART: Caliptra RT
3,055,922 UART: [state] CFI Enabled
3,175,525 UART: [rt] RT listening for mailbox commands...
3,176,195 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,945 UART: [rt]cmd =0x49444550, len=8
3,207,734 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,470 UART: [kat] SHA2-256
893,120 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,245 UART: [kat] ++
897,397 UART: [kat] sha1
901,715 UART: [kat] SHA2-256
903,655 UART: [kat] SHA2-384
906,216 UART: [kat] SHA2-512-ACC
908,117 UART: [kat] ECC-384
917,726 UART: [kat] HMAC-384Kdf
922,466 UART: [kat] LMS
1,170,794 UART: [kat] --
1,171,561 UART: [cold-reset] ++
1,172,133 UART: [fht] FHT @ 0x50003400
1,174,674 UART: [idev] ++
1,174,842 UART: [idev] CDI.KEYID = 6
1,175,202 UART: [idev] SUBJECT.KEYID = 7
1,175,626 UART: [idev] UDS.KEYID = 0
1,175,971 ready_for_fw is high
1,175,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,562 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,208,673 UART: [idev] --
1,209,767 UART: [ldev] ++
1,209,935 UART: [ldev] CDI.KEYID = 6
1,210,298 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,959 UART: [ldev] --
1,281,432 UART: [fwproc] Wait for Commands...
1,282,198 UART: [fwproc] Recv command 0x46574c44
1,282,926 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,403 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,577 >>> mbox cmd response: success
2,826,671 UART: [afmc] ++
2,826,839 UART: [afmc] CDI.KEYID = 6
2,827,201 UART: [afmc] SUBJECT.KEYID = 7
2,827,626 UART: [afmc] AUTHORITY.KEYID = 5
2,862,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,071 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,954 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,655 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,309 UART: [afmc] --
2,906,257 UART: [cold-reset] --
2,906,891 UART: [state] Locking Datavault
2,908,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,642 UART: [state] Locking ICCM
2,909,226 UART: [exit] Launching FMC @ 0x40000130
2,914,556 UART:
2,914,572 UART: Running Caliptra FMC ...
2,914,980 UART:
2,915,034 UART: [state] CFI Enabled
2,925,558 UART: [fht] FMC Alias Private Key: 7
3,045,026 UART: [art] Extend RT PCRs Done
3,045,454 UART: [art] Lock RT PCRs Done
3,046,788 UART: [art] Populate DV Done
3,055,199 UART: [fht] FMC Alias Private Key: 7
3,056,361 UART: [art] Derive CDI
3,056,641 UART: [art] Store in slot 0x4
3,142,130 UART: [art] Derive Key Pair
3,142,490 UART: [art] Store priv key in slot 0x5
3,156,116 UART: [art] Derive Key Pair - Done
3,170,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,371 UART: [art] PUB.X = DA5396BB40300962ACF154C4B5F9A674CE420ECB262D84D7B4C404A72D4C0CC97AB509D04F2A9A711A791886BEF2C46C
3,193,138 UART: [art] PUB.Y = 637706AA6EBC02738623B597215ABC2262C25231E9F8A8092F7CFECAA2B2E89893ABCFD9F707387292014048576EF53A
3,200,073 UART: [art] SIG.R = B55E7FCDC26A43E6F5E34134B7C37F7FECBC1F5E3274B0C7A957B8B53AD5FEB3D86EE5F68FF2A32DAE086D38DCF7508F
3,206,868 UART: [art] SIG.S = FC7D0DA9747D19414ABC2ADE4FD9D7EC2D28170FB2FD4EEE599E1EF3DBA3DC63254DC9053A22FF9B0260A8E8CCEDBEF4
3,230,922 UART: Caliptra RT
3,231,173 UART: [state] CFI Enabled
3,350,456 UART: [rt] RT listening for mailbox commands...
3,351,126 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,902 UART: [rt]cmd =0x49444550, len=8
3,382,839 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,789 ready_for_fw is high
1,060,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,890 >>> mbox cmd response: success
2,740,483 UART:
2,740,499 UART: Running Caliptra FMC ...
2,740,907 UART:
2,740,961 UART: [state] CFI Enabled
2,751,715 UART: [fht] FMC Alias Private Key: 7
2,870,629 UART: [art] Extend RT PCRs Done
2,871,057 UART: [art] Lock RT PCRs Done
2,872,737 UART: [art] Populate DV Done
2,881,102 UART: [fht] FMC Alias Private Key: 7
2,882,280 UART: [art] Derive CDI
2,882,560 UART: [art] Store in slot 0x4
2,968,259 UART: [art] Derive Key Pair
2,968,619 UART: [art] Store priv key in slot 0x5
2,982,559 UART: [art] Derive Key Pair - Done
2,997,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,323 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,088 UART: [art] PUB.X = FA9437D09A23017E6A5B1D8644D973A823928999D6E8A18ABC8482D44D2A153CF03B5262E6C5A40E42F210726E08704C
3,019,845 UART: [art] PUB.Y = 9A0067C147435D4A3ABCCD56EB6876A29BC7C4C906F8D079551C2A0B19FA4F440A6C62BDF88DBE4E757E220AD89E88E7
3,026,775 UART: [art] SIG.R = CC0CF0654BAC03B7366ADCA6AC199788CCB88DB93E38005672C8A8A362DBF0ABE0D5A305BA87CD6EFE00356D2174E9FD
3,033,514 UART: [art] SIG.S = AF1E791B2E05010F496DBD2062E25C77C2E15CFF29FE79CE99F5E7B41A38798613A74AF4C1EE91B4F11C653B8F81BFA7
3,057,593 UART: Caliptra RT
3,057,844 UART: [state] CFI Enabled
3,177,343 UART: [rt] RT listening for mailbox commands...
3,178,013 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,881 UART: [rt]cmd =0x49444550, len=8
3,209,956 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
88,081 UART: [kat] SHA2-256
893,731 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,856 UART: [kat] ++
898,008 UART: [kat] sha1
902,262 UART: [kat] SHA2-256
904,202 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,825 UART: [kat] LMS
1,171,153 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,478 UART: [fht] FHT @ 0x50003400
1,175,125 UART: [idev] ++
1,175,293 UART: [idev] CDI.KEYID = 6
1,175,653 UART: [idev] SUBJECT.KEYID = 7
1,176,077 UART: [idev] UDS.KEYID = 0
1,176,422 ready_for_fw is high
1,176,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,839 UART: [idev] Erasing UDS.KEYID = 0
1,200,822 UART: [idev] Sha1 KeyId Algorithm
1,209,268 UART: [idev] --
1,210,324 UART: [ldev] ++
1,210,492 UART: [ldev] CDI.KEYID = 6
1,210,855 UART: [ldev] SUBJECT.KEYID = 5
1,211,281 UART: [ldev] AUTHORITY.KEYID = 7
1,211,744 UART: [ldev] FE.KEYID = 1
1,217,030 UART: [ldev] Erasing FE.KEYID = 1
1,243,419 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,833 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,545 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,604 UART: [ldev] --
1,282,875 UART: [fwproc] Wait for Commands...
1,283,565 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,836 >>> mbox cmd response: success
2,828,084 UART: [afmc] ++
2,828,252 UART: [afmc] CDI.KEYID = 6
2,828,614 UART: [afmc] SUBJECT.KEYID = 7
2,829,039 UART: [afmc] AUTHORITY.KEYID = 5
2,865,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,376 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,230 UART: [afmc] --
2,908,240 UART: [cold-reset] --
2,909,184 UART: [state] Locking Datavault
2,910,205 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,809 UART: [state] Locking ICCM
2,911,477 UART: [exit] Launching FMC @ 0x40000130
2,916,807 UART:
2,916,823 UART: Running Caliptra FMC ...
2,917,231 UART:
2,917,374 UART: [state] CFI Enabled
2,928,076 UART: [fht] FMC Alias Private Key: 7
3,047,400 UART: [art] Extend RT PCRs Done
3,047,828 UART: [art] Lock RT PCRs Done
3,049,606 UART: [art] Populate DV Done
3,057,775 UART: [fht] FMC Alias Private Key: 7
3,058,857 UART: [art] Derive CDI
3,059,137 UART: [art] Store in slot 0x4
3,145,110 UART: [art] Derive Key Pair
3,145,470 UART: [art] Store priv key in slot 0x5
3,159,020 UART: [art] Derive Key Pair - Done
3,173,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,187 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,952 UART: [art] PUB.X = 1E0DC65DA224B21E86228A26CBDF4707DC79DA2CEA0D33D143C5F4FE03F7F006E75389B260191170C3B0BACA74AAFD84
3,196,723 UART: [art] PUB.Y = C21F310752D7A78AEB8228CC2C22D8F4194552F8041782C8CDAAA85B810F046A43EE506017213B99A1CC9B2EFCDF063F
3,203,666 UART: [art] SIG.R = 563D6459285DE165EE07880D1E8C6007A64FE457AF9E53132C04FAF1449642A2D7138DDB8007CC57FC116725819535C6
3,210,415 UART: [art] SIG.S = 33872A39A554092B5B1F1AFDB4AC7F2090080BCFE046F67B6F2572FF08E11C41C4A70B35C447B529575DC84D77F9CA9F
3,233,936 UART: Caliptra RT
3,234,279 UART: [state] CFI Enabled
3,354,056 UART: [rt] RT listening for mailbox commands...
3,354,726 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,614 UART: [rt]cmd =0x49444550, len=8
3,386,637 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,958 ready_for_fw is high
1,059,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,231 >>> mbox cmd response: success
2,742,072 UART:
2,742,088 UART: Running Caliptra FMC ...
2,742,496 UART:
2,742,639 UART: [state] CFI Enabled
2,752,769 UART: [fht] FMC Alias Private Key: 7
2,871,695 UART: [art] Extend RT PCRs Done
2,872,123 UART: [art] Lock RT PCRs Done
2,873,685 UART: [art] Populate DV Done
2,881,856 UART: [fht] FMC Alias Private Key: 7
2,882,852 UART: [art] Derive CDI
2,883,132 UART: [art] Store in slot 0x4
2,969,301 UART: [art] Derive Key Pair
2,969,661 UART: [art] Store priv key in slot 0x5
2,982,671 UART: [art] Derive Key Pair - Done
2,997,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,044 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,809 UART: [art] PUB.X = EB5EFD30ADBDF998AB3EAC6C5A07140922D4073AA7106FCBDA5625233193D81B41D297DD6623E2FDC0CBD7D1E8101069
3,020,586 UART: [art] PUB.Y = C65107EF7441DFC2FFB089F8F4D9C8CE890FF3B2CFFDC153358B659D54C9B280F987782A72E692598D4D838C333D7177
3,027,536 UART: [art] SIG.R = 5CE891AE458DA075A5F11C97E68335062F72EB77244434825A6C920AD35C384037A7C3ED5F5BFB7F3E7457C45D0A2CE3
3,034,301 UART: [art] SIG.S = C74CF7D15EAFF2196489D462BA7095CA8759F3ACC367D0F63751A2E8923555FE462E99F9A0FF9E87C999EBF7117FAAC0
3,057,695 UART: Caliptra RT
3,058,038 UART: [state] CFI Enabled
3,177,840 UART: [rt] RT listening for mailbox commands...
3,178,510 <<< Executing mbox cmd 0x49444550 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,682 UART: [rt]cmd =0x49444550, len=8
3,210,561 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_populate_idev_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,055 UART:
192,420 UART: Running Caliptra ROM ...
193,559 UART:
193,708 UART: [state] CFI Enabled
262,175 UART: [state] LifecycleState = Unprovisioned
264,190 UART: [state] DebugLocked = No
266,370 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,751 UART: [kat] SHA2-256
441,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,957 UART: [kat] ++
452,451 UART: [kat] sha1
463,547 UART: [kat] SHA2-256
466,211 UART: [kat] SHA2-384
472,768 UART: [kat] SHA2-512-ACC
475,135 UART: [kat] ECC-384
2,766,967 UART: [kat] HMAC-384Kdf
2,781,055 UART: [kat] LMS
3,971,336 UART: [kat] --
3,975,211 UART: [cold-reset] ++
3,976,927 UART: [fht] Storing FHT @ 0x50003400
3,989,180 UART: [idev] ++
3,989,741 UART: [idev] CDI.KEYID = 6
3,990,696 UART: [idev] SUBJECT.KEYID = 7
3,991,937 UART: [idev] UDS.KEYID = 0
3,993,133 ready_for_fw is high
3,993,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,524 UART: [idev] Erasing UDS.KEYID = 0
7,325,774 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,575 UART: [idev] --
7,350,088 UART: [ldev] ++
7,350,666 UART: [ldev] CDI.KEYID = 6
7,351,646 UART: [ldev] SUBJECT.KEYID = 5
7,352,863 UART: [ldev] AUTHORITY.KEYID = 7
7,354,091 UART: [ldev] FE.KEYID = 1
7,383,276 UART: [ldev] Erasing FE.KEYID = 1
10,714,789 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,011,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,026,163 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,041,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,055,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,074,344 UART: [ldev] --
13,078,209 UART: [fwproc] Waiting for Commands...
13,080,863 UART: [fwproc] Received command 0x46574c44
13,083,118 UART: [fwproc] Received Image of size 118548 bytes
17,194,332 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,264,449 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,337,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,666,166 >>> mbox cmd response: success
17,670,867 UART: [afmc] ++
17,671,486 UART: [afmc] CDI.KEYID = 6
17,672,398 UART: [afmc] SUBJECT.KEYID = 7
17,673,669 UART: [afmc] AUTHORITY.KEYID = 5
21,035,538 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,337,964 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,340,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,354,637 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,369,370 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,383,812 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,405,734 UART: [afmc] --
23,409,281 UART: [cold-reset] --
23,413,307 UART: [state] Locking Datavault
23,419,797 UART: [state] Locking PCR0, PCR1 and PCR31
23,421,559 UART: [state] Locking ICCM
23,424,303 UART: [exit] Launching FMC @ 0x40000130
23,432,700 UART:
23,432,937 UART: Running Caliptra FMC ...
23,434,040 UART:
23,434,201 UART: [state] CFI Enabled
23,496,946 UART: [fht] FMC Alias Private Key: 7
25,836,690 UART: [art] Extend RT PCRs Done
25,837,909 UART: [art] Lock RT PCRs Done
25,839,478 UART: [art] Populate DV Done
25,844,838 UART: [fht] FMC Alias Private Key: 7
25,846,429 UART: [art] Derive CDI
25,847,258 UART: [art] Store in slot 0x4
25,905,597 UART: [art] Derive Key Pair
25,906,639 UART: [art] Store priv key in slot 0x5
29,199,233 UART: [art] Derive Key Pair - Done
29,211,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,501,650 UART: [art] Erasing AUTHORITY.KEYID = 7
31,503,158 UART: [art] PUB.X = DE5A1045AE34148639676BF6054C835ACFC46BB25A327659C386E92A7AA910B3112F66F4BE62F3D3F98D1C78341AC89D
31,510,400 UART: [art] PUB.Y = D9EF1EBD3417E5820C5DD47E043313E18FCF21201396C78B7A23E9B43950B9F6CA3AEE1D7673D8D3DEF0131F1A4A165B
31,517,686 UART: [art] SIG.R = 7BDB7126536BBCE71E8A93AA4F96585A2FD388E6A908C9799CDAC916ACD37E67BC283B0ED62D2C91D4ACE9C859003DBE
31,525,070 UART: [art] SIG.S = 0CD0CBB6DC3190A16407F8E85038D7B6481908C8102305DC25B1D506F4B0ABC3F842FBF73A43EF7468D49D4F7084BE66
32,830,501 UART: Caliptra RT
32,831,212 UART: [state] CFI Enabled
33,008,044 UART: [rt] RT listening for mailbox commands...
33,009,943 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,039,977 UART: [rt]cmd =0x52564348, len=36
33,042,064 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,805,399 ready_for_fw is high
3,805,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,939,967 >>> mbox cmd response: success
23,631,879 UART:
23,632,283 UART: Running Caliptra FMC ...
23,633,389 UART:
23,633,541 UART: [state] CFI Enabled
23,701,717 UART: [fht] FMC Alias Private Key: 7
26,041,034 UART: [art] Extend RT PCRs Done
26,042,933 UART: [art] Lock RT PCRs Done
26,043,952 UART: [art] Populate DV Done
26,049,200 UART: [fht] FMC Alias Private Key: 7
26,050,699 UART: [art] Derive CDI
26,051,486 UART: [art] Store in slot 0x4
26,095,715 UART: [art] Derive Key Pair
26,096,913 UART: [art] Store priv key in slot 0x5
29,371,322 UART: [art] Derive Key Pair - Done
29,384,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,680,196 UART: [art] Erasing AUTHORITY.KEYID = 7
31,681,743 UART: [art] PUB.X = DB17D0EAF5FF0C979003757A65D0C20BDAB630D8A8DBA7CD59EC0622A01EA1933A5D2B15C9C6A43A69D95B2F03E5444D
31,689,004 UART: [art] PUB.Y = C2CE93593455EA9368C94927342FA9C4534476C5CAFDBA11D759C152551AC51A58E62D9E3807D20292D919FA2AA89DA4
31,696,215 UART: [art] SIG.R = F85A39E817B5DB05232D936659D0E2DF0DB6C9315C5B26A844E91A82CAD0541177032F56084BA70EBD12DA18363D7B18
31,703,649 UART: [art] SIG.S = 1EC109E1ECBE9C05BD4F8297E73EABA713D35A45BDF7C4E987254A6ED261091AFDC446E150EB7026F15FD4B596533858
33,009,483 UART: Caliptra RT
33,010,192 UART: [state] CFI Enabled
33,186,155 UART: [rt] RT listening for mailbox commands...
33,188,049 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,218,217 UART: [rt]cmd =0x52564348, len=36
33,220,030 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,444 UART:
192,809 UART: Running Caliptra ROM ...
193,946 UART:
603,721 UART: [state] CFI Enabled
620,801 UART: [state] LifecycleState = Unprovisioned
622,743 UART: [state] DebugLocked = No
624,266 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,772 UART: [kat] SHA2-256
799,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,081 UART: [kat] ++
810,534 UART: [kat] sha1
821,749 UART: [kat] SHA2-256
824,471 UART: [kat] SHA2-384
831,589 UART: [kat] SHA2-512-ACC
833,949 UART: [kat] ECC-384
3,119,073 UART: [kat] HMAC-384Kdf
3,130,816 UART: [kat] LMS
4,320,909 UART: [kat] --
4,325,561 UART: [cold-reset] ++
4,327,852 UART: [fht] Storing FHT @ 0x50003400
4,338,686 UART: [idev] ++
4,339,243 UART: [idev] CDI.KEYID = 6
4,340,146 UART: [idev] SUBJECT.KEYID = 7
4,341,381 UART: [idev] UDS.KEYID = 0
4,342,413 ready_for_fw is high
4,342,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,462 UART: [idev] Erasing UDS.KEYID = 0
7,630,801 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,173 UART: [idev] --
7,656,303 UART: [ldev] ++
7,656,930 UART: [ldev] CDI.KEYID = 6
7,657,832 UART: [ldev] SUBJECT.KEYID = 5
7,659,089 UART: [ldev] AUTHORITY.KEYID = 7
7,660,316 UART: [ldev] FE.KEYID = 1
7,670,955 UART: [ldev] Erasing FE.KEYID = 1
10,963,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,736 UART: [ldev] --
13,322,929 UART: [fwproc] Waiting for Commands...
13,326,112 UART: [fwproc] Received command 0x46574c44
13,328,314 UART: [fwproc] Received Image of size 118548 bytes
17,436,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,434 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,583 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,705 >>> mbox cmd response: success
17,918,085 UART: [afmc] ++
17,918,680 UART: [afmc] CDI.KEYID = 6
17,919,562 UART: [afmc] SUBJECT.KEYID = 7
17,920,826 UART: [afmc] AUTHORITY.KEYID = 5
21,236,071 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,456 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,759 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,547,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,866 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,264 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,560 UART: [afmc] --
23,600,431 UART: [cold-reset] --
23,603,421 UART: [state] Locking Datavault
23,608,340 UART: [state] Locking PCR0, PCR1 and PCR31
23,610,084 UART: [state] Locking ICCM
23,612,749 UART: [exit] Launching FMC @ 0x40000130
23,621,136 UART:
23,621,374 UART: Running Caliptra FMC ...
23,622,471 UART:
23,622,623 UART: [state] CFI Enabled
23,630,721 UART: [fht] FMC Alias Private Key: 7
25,970,768 UART: [art] Extend RT PCRs Done
25,971,989 UART: [art] Lock RT PCRs Done
25,974,076 UART: [art] Populate DV Done
25,979,322 UART: [fht] FMC Alias Private Key: 7
25,981,070 UART: [art] Derive CDI
25,981,800 UART: [art] Store in slot 0x4
26,024,841 UART: [art] Derive Key Pair
26,025,843 UART: [art] Store priv key in slot 0x5
29,267,781 UART: [art] Derive Key Pair - Done
29,280,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,157 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,676 UART: [art] PUB.X = 391FB22BBABF08F74694834269909793F8A5A084BBB3BEB4284BC9DA54C1D09A44F80284C8554727F9DF577A2C85F755
31,569,923 UART: [art] PUB.Y = D7C5C11775BDC1CB1CC755F1B687AE8CEBA791CD8F982CD3E71FFD97F937BB2847BD66B6EE51C048864473176320A985
31,577,203 UART: [art] SIG.R = 1A135DCFCCC705816C27C2577B0381C638FC5215856DCFE6183771E5B4DAEA76BA4C1414B7F6744964E17FBE6B6E3BB5
31,584,580 UART: [art] SIG.S = 3B1581ECF3D99E363BFFFED6198C37F6C52CDA4EA4E4BFB1F6759A864F7C5A9F79C1154517C3DA3E634EB93F96715353
32,889,794 UART: Caliptra RT
32,890,504 UART: [state] CFI Enabled
33,024,080 UART: [rt] RT listening for mailbox commands...
33,025,971 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,056,070 UART: [rt]cmd =0x52564348, len=36
33,057,829 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
4,125,422 ready_for_fw is high
4,126,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,668 >>> mbox cmd response: success
23,801,259 UART:
23,801,667 UART: Running Caliptra FMC ...
23,802,867 UART:
23,803,038 UART: [state] CFI Enabled
23,810,771 UART: [fht] FMC Alias Private Key: 7
26,150,617 UART: [art] Extend RT PCRs Done
26,151,847 UART: [art] Lock RT PCRs Done
26,153,368 UART: [art] Populate DV Done
26,158,883 UART: [fht] FMC Alias Private Key: 7
26,160,363 UART: [art] Derive CDI
26,161,121 UART: [art] Store in slot 0x4
26,204,091 UART: [art] Derive Key Pair
26,205,128 UART: [art] Store priv key in slot 0x5
29,446,830 UART: [art] Derive Key Pair - Done
29,459,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,769 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,275 UART: [art] PUB.X = 3F9B8BDD335351078F29C551B9DE9321E5B8C55D14899AEA593146B87A5C881CFB04E65B1A9D8D995CC56B33AA35CC91
31,748,523 UART: [art] PUB.Y = 05C5932AACB968F23E6C80D404A7D6005A688E7695AC2886F6D9D27D8E3E14EB536ACAFC6CFF7873596B2DB5A5C9BE12
31,755,785 UART: [art] SIG.R = 9B120FB9FF6ACF484A900D879AFAF76AAFE4B691AB237EF66B52609610AF993F941F0FC63D008292C196213C298C232A
31,763,184 UART: [art] SIG.S = 5DD3A14509D065FD07F504C6BFDEB69086DE3686F6B4069834BAA9886C3DDA7DAF224A561A5B3864277D8CC38CCF21FE
33,068,700 UART: Caliptra RT
33,069,421 UART: [state] CFI Enabled
33,203,018 UART: [rt] RT listening for mailbox commands...
33,204,903 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,234,935 UART: [rt]cmd =0x52564348, len=36
33,236,889 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,082 UART:
192,470 UART: Running Caliptra ROM ...
193,663 UART:
193,811 UART: [state] CFI Enabled
263,136 UART: [state] LifecycleState = Unprovisioned
265,128 UART: [state] DebugLocked = No
267,659 UART: [state] WD Timer not started. Device not locked for debugging
271,695 UART: [kat] SHA2-256
451,325 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,134 UART: [kat] ++
462,608 UART: [kat] sha1
474,471 UART: [kat] SHA2-256
477,185 UART: [kat] SHA2-384
483,119 UART: [kat] SHA2-512-ACC
485,524 UART: [kat] ECC-384
2,949,823 UART: [kat] HMAC-384Kdf
2,970,955 UART: [kat] LMS
3,447,438 UART: [kat] --
3,451,571 UART: [cold-reset] ++
3,453,541 UART: [fht] FHT @ 0x50003400
3,464,592 UART: [idev] ++
3,465,157 UART: [idev] CDI.KEYID = 6
3,466,040 UART: [idev] SUBJECT.KEYID = 7
3,467,349 UART: [idev] UDS.KEYID = 0
3,468,246 ready_for_fw is high
3,468,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,568 UART: [idev] Erasing UDS.KEYID = 0
5,989,554 UART: [idev] Sha1 KeyId Algorithm
6,013,049 UART: [idev] --
6,019,348 UART: [ldev] ++
6,019,926 UART: [ldev] CDI.KEYID = 6
6,020,847 UART: [ldev] SUBJECT.KEYID = 5
6,022,057 UART: [ldev] AUTHORITY.KEYID = 7
6,023,305 UART: [ldev] FE.KEYID = 1
6,057,881 UART: [ldev] Erasing FE.KEYID = 1
8,566,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,537 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,134 UART: [ldev] --
10,374,878 UART: [fwproc] Wait for Commands...
10,377,178 UART: [fwproc] Recv command 0x46574c44
10,379,207 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,176 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,710 >>> mbox cmd response: success
14,343,192 UART: [afmc] ++
14,343,832 UART: [afmc] CDI.KEYID = 6
14,344,747 UART: [afmc] SUBJECT.KEYID = 7
14,345,908 UART: [afmc] AUTHORITY.KEYID = 5
16,877,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,559 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,195 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,792 UART: [afmc] --
18,697,088 UART: [cold-reset] --
18,702,564 UART: [state] Locking Datavault
18,709,208 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,960 UART: [state] Locking ICCM
18,712,131 UART: [exit] Launching FMC @ 0x40000130
18,720,577 UART:
18,720,867 UART: Running Caliptra FMC ...
18,721,977 UART:
18,722,139 UART: [state] CFI Enabled
18,774,868 UART: [fht] FMC Alias Private Key: 7
20,541,206 UART: [art] Extend RT PCRs Done
20,542,429 UART: [art] Lock RT PCRs Done
20,544,316 UART: [art] Populate DV Done
20,549,718 UART: [fht] FMC Alias Private Key: 7
20,551,194 UART: [art] Derive CDI
20,551,927 UART: [art] Store in slot 0x4
20,607,340 UART: [art] Derive Key Pair
20,608,375 UART: [art] Store priv key in slot 0x5
23,071,110 UART: [art] Derive Key Pair - Done
23,084,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,722 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,346 UART: [art] PUB.X = D42E93328548235A1679D5D6A26462BE46FC341F411C390E1479176E84A297A86A45D4321BFE242D2A0BC5D5CFD4A257
24,806,455 UART: [art] PUB.Y = 9252110AEF19B1DFAA070BECFB7A16A04EEEA8788741DDD08F6C6988D68C3E18C97722B2357844CC7274670D02DC09E4
24,813,745 UART: [art] SIG.R = 09B85C2E13E9CC7953DD29BB194EEE876D9CA55964175171F13352ACFD111B07F9998E94C7D535F736A376C53036123B
24,821,081 UART: [art] SIG.S = D14C8D42F62FF240092FD4634E5E9BAD979A22E31DDCAD7C8350EE7652878BE06FFEFD12ECB760E3128FE46251074BF3
25,799,511 UART: Caliptra RT
25,800,210 UART: [state] CFI Enabled
25,981,632 UART: [rt] RT listening for mailbox commands...
25,983,512 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,013,581 UART: [rt]cmd =0x52564348, len=36
26,015,802 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,481 writing to cptra_bootfsm_go
3,460,866 ready_for_fw is high
3,461,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,236,554 >>> mbox cmd response: success
18,516,569 UART:
18,516,980 UART: Running Caliptra FMC ...
18,518,097 UART:
18,518,258 UART: [state] CFI Enabled
18,585,505 UART: [fht] FMC Alias Private Key: 7
20,351,817 UART: [art] Extend RT PCRs Done
20,353,039 UART: [art] Lock RT PCRs Done
20,354,751 UART: [art] Populate DV Done
20,360,381 UART: [fht] FMC Alias Private Key: 7
20,361,918 UART: [art] Derive CDI
20,362,732 UART: [art] Store in slot 0x4
20,418,008 UART: [art] Derive Key Pair
20,419,055 UART: [art] Store priv key in slot 0x5
22,882,274 UART: [art] Derive Key Pair - Done
22,895,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,616 UART: [art] Erasing AUTHORITY.KEYID = 7
24,609,117 UART: [art] PUB.X = B8288D913AFA8A175F76A81419B624BC7531BB6BBD6F082CDBDCEBBDB7CA8A21818300E4D0FE073E14F8B33D733AB2C4
24,616,367 UART: [art] PUB.Y = 5A996219CE6FA6F5840851B478898521016C22189A39AEDBEE1A745FB8960A081DD08FF2AC16AAD8DD3AD3C7B498A93B
24,623,623 UART: [art] SIG.R = 7CA51330BCC16951E5EE599EA4490FE644C6D5B97612D38F37730627084596C54AE115BCAC72538643577E3933C4462C
24,631,033 UART: [art] SIG.S = A399083D443FDFCE5DA766A1F05122E799A669DA587B9364758FABDEBC886BD3C6A7D0641DFEDD7AEF63F61C2C67EC83
25,610,526 UART: Caliptra RT
25,611,241 UART: [state] CFI Enabled
25,790,411 UART: [rt] RT listening for mailbox commands...
25,792,306 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,822,119 UART: [rt]cmd =0x52564348, len=36
25,824,097 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,297 UART:
192,655 UART: Running Caliptra ROM ...
193,787 UART:
603,323 UART: [state] CFI Enabled
617,306 UART: [state] LifecycleState = Unprovisioned
619,192 UART: [state] DebugLocked = No
622,149 UART: [state] WD Timer not started. Device not locked for debugging
626,270 UART: [kat] SHA2-256
805,943 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,740 UART: [kat] ++
817,188 UART: [kat] sha1
828,000 UART: [kat] SHA2-256
830,667 UART: [kat] SHA2-384
837,011 UART: [kat] SHA2-512-ACC
839,384 UART: [kat] ECC-384
3,282,979 UART: [kat] HMAC-384Kdf
3,295,429 UART: [kat] LMS
3,772,040 UART: [kat] --
3,776,116 UART: [cold-reset] ++
3,778,124 UART: [fht] FHT @ 0x50003400
3,789,670 UART: [idev] ++
3,790,248 UART: [idev] CDI.KEYID = 6
3,791,242 UART: [idev] SUBJECT.KEYID = 7
3,792,419 UART: [idev] UDS.KEYID = 0
3,793,473 ready_for_fw is high
3,793,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,560 UART: [idev] Erasing UDS.KEYID = 0
6,271,345 UART: [idev] Sha1 KeyId Algorithm
6,295,432 UART: [idev] --
6,299,215 UART: [ldev] ++
6,299,847 UART: [ldev] CDI.KEYID = 6
6,300,751 UART: [ldev] SUBJECT.KEYID = 5
6,301,972 UART: [ldev] AUTHORITY.KEYID = 7
6,303,205 UART: [ldev] FE.KEYID = 1
6,313,127 UART: [ldev] Erasing FE.KEYID = 1
8,790,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,407 UART: [ldev] --
10,585,073 UART: [fwproc] Wait for Commands...
10,587,663 UART: [fwproc] Recv command 0x46574c44
10,589,650 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,858 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,706 >>> mbox cmd response: success
14,557,323 UART: [afmc] ++
14,557,935 UART: [afmc] CDI.KEYID = 6
14,558,823 UART: [afmc] SUBJECT.KEYID = 7
14,560,095 UART: [afmc] AUTHORITY.KEYID = 5
17,062,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,237 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,063 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,586 UART: [afmc] --
18,863,511 UART: [cold-reset] --
18,868,076 UART: [state] Locking Datavault
18,873,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,456 UART: [state] Locking ICCM
18,878,303 UART: [exit] Launching FMC @ 0x40000130
18,886,705 UART:
18,886,939 UART: Running Caliptra FMC ...
18,888,039 UART:
18,888,203 UART: [state] CFI Enabled
18,896,640 UART: [fht] FMC Alias Private Key: 7
20,663,272 UART: [art] Extend RT PCRs Done
20,664,490 UART: [art] Lock RT PCRs Done
20,666,389 UART: [art] Populate DV Done
20,671,695 UART: [fht] FMC Alias Private Key: 7
20,673,394 UART: [art] Derive CDI
20,674,212 UART: [art] Store in slot 0x4
20,716,920 UART: [art] Derive Key Pair
20,717,915 UART: [art] Store priv key in slot 0x5
23,144,928 UART: [art] Derive Key Pair - Done
23,157,488 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,719 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,218 UART: [art] PUB.X = 6CA08BDBBB4DAEF650CAEF116A997573B3F2654C9BB2E94B5CF8691C9C3DB24B0C0822337A46816DCB398EBD4357EFE0
24,872,520 UART: [art] PUB.Y = F7B53CA03A013870D1D7AA1FC5D2DA3ABFEDCC44EE0BF0A10565CB3D4E53E73C6213A200A0D44EB946EE96D531D569D7
24,879,810 UART: [art] SIG.R = 7273E65FDB81A95D506DB1B9F7ACCB18D276D8ECB3DF3456443E25251AE47AF273ED3B842C2AF5EDF20595741F25EA09
24,887,207 UART: [art] SIG.S = AFB15E0F8EB6507342AB7E2EF4CDAA82DD891150B223FB0DF254801D61496990AC85500E9D9293AF5EF1797932895AAF
25,866,210 UART: Caliptra RT
25,866,915 UART: [state] CFI Enabled
25,999,312 UART: [rt] RT listening for mailbox commands...
26,001,191 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,031,384 UART: [rt]cmd =0x52564348, len=36
26,033,022 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,782,112 ready_for_fw is high
3,782,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,109 >>> mbox cmd response: success
18,691,102 UART:
18,691,494 UART: Running Caliptra FMC ...
18,692,650 UART:
18,692,813 UART: [state] CFI Enabled
18,700,875 UART: [fht] FMC Alias Private Key: 7
20,466,825 UART: [art] Extend RT PCRs Done
20,468,051 UART: [art] Lock RT PCRs Done
20,469,858 UART: [art] Populate DV Done
20,475,086 UART: [fht] FMC Alias Private Key: 7
20,476,580 UART: [art] Derive CDI
20,477,348 UART: [art] Store in slot 0x4
20,520,150 UART: [art] Derive Key Pair
20,521,175 UART: [art] Store priv key in slot 0x5
22,948,844 UART: [art] Derive Key Pair - Done
22,961,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,617 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,120 UART: [art] PUB.X = 77DBC936E4F2002F58B910155E6C623A0945DA7CAEAEFCCD2235465FAAC451CD099F94A2A9A548461158AF349888AD63
24,676,388 UART: [art] PUB.Y = D370745A4237283F2EC11C4E9E13F90339D58C7A25938BC113BCB2A0E42CC711404DD4C92256B0B926BFA07FA207CD18
24,683,597 UART: [art] SIG.R = 145A55247426E70E3DE12C86AEB6EB375D17EE0FD1240A28427C79793DFB192F4D1CAD5CE4F6BB8D2B5190554B5ACEF3
24,691,058 UART: [art] SIG.S = CA107FE2E7426A4D29AFFC26E309A192D601E1FD3964AE45A32BBD777A864548B96A7C8DEDF0A5157F6ED8FAF74B07A0
25,669,975 UART: Caliptra RT
25,670,680 UART: [state] CFI Enabled
25,803,378 UART: [rt] RT listening for mailbox commands...
25,805,258 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,835,433 UART: [rt]cmd =0x52564348, len=36
25,837,248 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,052 UART:
192,420 UART: Running Caliptra ROM ...
193,602 UART:
193,757 UART: [state] CFI Enabled
269,836 UART: [state] LifecycleState = Unprovisioned
272,259 UART: [state] DebugLocked = No
274,504 UART: [state] WD Timer not started. Device not locked for debugging
279,109 UART: [kat] SHA2-256
468,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,782 UART: [kat] ++
480,277 UART: [kat] sha1
493,018 UART: [kat] SHA2-256
496,028 UART: [kat] SHA2-384
501,596 UART: [kat] SHA2-512-ACC
504,184 UART: [kat] ECC-384
2,949,545 UART: [kat] HMAC-384Kdf
2,973,852 UART: [kat] LMS
3,505,596 UART: [kat] --
3,510,386 UART: [cold-reset] ++
3,511,529 UART: [fht] FHT @ 0x50003400
3,523,246 UART: [idev] ++
3,523,952 UART: [idev] CDI.KEYID = 6
3,524,899 UART: [idev] SUBJECT.KEYID = 7
3,526,068 UART: [idev] UDS.KEYID = 0
3,526,986 ready_for_fw is high
3,527,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,323 UART: [idev] Erasing UDS.KEYID = 0
6,032,056 UART: [idev] Sha1 KeyId Algorithm
6,054,263 UART: [idev] --
6,059,581 UART: [ldev] ++
6,060,263 UART: [ldev] CDI.KEYID = 6
6,061,198 UART: [ldev] SUBJECT.KEYID = 5
6,062,349 UART: [ldev] AUTHORITY.KEYID = 7
6,063,580 UART: [ldev] FE.KEYID = 1
6,102,345 UART: [ldev] Erasing FE.KEYID = 1
8,607,019 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,396 UART: [ldev] --
10,414,413 UART: [fwproc] Wait for Commands...
10,416,447 UART: [fwproc] Recv command 0x46574c44
10,418,720 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,876 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,808 >>> mbox cmd response: success
14,687,262 UART: [afmc] ++
14,687,985 UART: [afmc] CDI.KEYID = 6
14,689,890 UART: [afmc] SUBJECT.KEYID = 7
14,691,015 UART: [afmc] AUTHORITY.KEYID = 5
17,238,924 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,434 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,425 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,618 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,511 UART: [afmc] --
19,034,974 UART: [cold-reset] --
19,038,302 UART: [state] Locking Datavault
19,043,678 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,831 UART: [state] Locking ICCM
19,047,663 UART: [exit] Launching FMC @ 0x40000130
19,056,338 UART:
19,056,573 UART: Running Caliptra FMC ...
19,057,672 UART:
19,057,831 UART: [state] CFI Enabled
19,118,047 UART: [fht] FMC Alias Private Key: 7
20,905,301 UART: [art] Extend RT PCRs Done
20,906,524 UART: [art] Lock RT PCRs Done
20,908,227 UART: [art] Populate DV Done
20,913,697 UART: [fht] FMC Alias Private Key: 7
20,915,178 UART: [art] Derive CDI
20,916,093 UART: [art] Store in slot 0x4
20,972,191 UART: [art] Derive Key Pair
20,973,231 UART: [art] Store priv key in slot 0x5
23,435,951 UART: [art] Derive Key Pair - Done
23,448,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,556 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,050 UART: [art] PUB.X = 426D1D6068C8E85B9E3153D2249E06B2C8D23C67D3EB5196DC337204149D188C4EE47F0BFF09C2091DD8719E5D1E0186
25,171,329 UART: [art] PUB.Y = E4DE7FEF4D796003CCBB633C6664D0860C2C8E72663CCECA009CBEF367B6725C1B89EDD29DC6946628C6DEA8B3CA270D
25,178,579 UART: [art] SIG.R = F94B5F43A0CBB770F4F226ADEF534D8CA38060457E402EB31585132DBA205406B57CB18CCC8B69EFFCF32B0D54F827CA
25,185,993 UART: [art] SIG.S = A5035954F27F6AB72666AF8E61F22C45599EF8D32283975FF18DCD915F95232AB4C8C17812009F1DF0EBE6B18036CC70
26,164,665 UART: Caliptra RT
26,165,377 UART: [state] CFI Enabled
26,347,229 UART: [rt] RT listening for mailbox commands...
26,349,102 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,378,907 UART: [rt]cmd =0x52564348, len=36
26,380,909 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,437,362 ready_for_fw is high
3,437,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,823,481 >>> mbox cmd response: success
19,122,686 UART:
19,123,093 UART: Running Caliptra FMC ...
19,124,203 UART:
19,124,356 UART: [state] CFI Enabled
19,190,251 UART: [fht] FMC Alias Private Key: 7
20,956,745 UART: [art] Extend RT PCRs Done
20,957,985 UART: [art] Lock RT PCRs Done
20,959,698 UART: [art] Populate DV Done
20,965,291 UART: [fht] FMC Alias Private Key: 7
20,966,957 UART: [art] Derive CDI
20,967,695 UART: [art] Store in slot 0x4
21,023,324 UART: [art] Derive Key Pair
21,024,327 UART: [art] Store priv key in slot 0x5
23,487,212 UART: [art] Derive Key Pair - Done
23,500,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,862 UART: [art] PUB.X = FB9E19061560045C1BD9BCE55611054807A3972DE10C5A42E9ACCE09A7EA0A3EDB303EAF5F0651238447CD0AF6869C06
25,222,105 UART: [art] PUB.Y = CF2D32C53F5D5E23EF70C038F2B0DD800B829CC45703AD01E357ABD3E2AC4A8C0A55F8079AFF9A7AB9520BF6DE14F2FE
25,229,406 UART: [art] SIG.R = 3CCD3E66B118D27095B144CED5177311CF4B0E617E132A352626F1CDF2FDAFFD345E98A6E0D4DAD61F911F821C6FCB5D
25,236,789 UART: [art] SIG.S = 1840321E13F7AB83F2D77FB8A21BBFB9CB0EDB0F004139C2A7EBD51ED80E977548D585397D0670AE4ACC0921D14B2AFD
26,215,356 UART: Caliptra RT
26,216,072 UART: [state] CFI Enabled
26,396,555 UART: [rt] RT listening for mailbox commands...
26,398,460 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,428,504 UART: [rt]cmd =0x52564348, len=36
26,430,446 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,424 UART:
192,819 UART: Running Caliptra ROM ...
193,921 UART:
603,748 UART: [state] CFI Enabled
617,931 UART: [state] LifecycleState = Unprovisioned
620,301 UART: [state] DebugLocked = No
622,614 UART: [state] WD Timer not started. Device not locked for debugging
627,254 UART: [kat] SHA2-256
817,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,894 UART: [kat] ++
828,501 UART: [kat] sha1
839,551 UART: [kat] SHA2-256
842,541 UART: [kat] SHA2-384
848,190 UART: [kat] SHA2-512-ACC
850,781 UART: [kat] ECC-384
3,294,696 UART: [kat] HMAC-384Kdf
3,308,786 UART: [kat] LMS
3,840,636 UART: [kat] --
3,847,051 UART: [cold-reset] ++
3,847,945 UART: [fht] FHT @ 0x50003400
3,858,635 UART: [idev] ++
3,859,351 UART: [idev] CDI.KEYID = 6
3,860,308 UART: [idev] SUBJECT.KEYID = 7
3,861,486 UART: [idev] UDS.KEYID = 0
3,862,419 ready_for_fw is high
3,862,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,482 UART: [idev] Erasing UDS.KEYID = 0
6,335,392 UART: [idev] Sha1 KeyId Algorithm
6,358,840 UART: [idev] --
6,363,744 UART: [ldev] ++
6,364,439 UART: [ldev] CDI.KEYID = 6
6,365,374 UART: [ldev] SUBJECT.KEYID = 5
6,366,532 UART: [ldev] AUTHORITY.KEYID = 7
6,367,767 UART: [ldev] FE.KEYID = 1
6,379,876 UART: [ldev] Erasing FE.KEYID = 1
8,855,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,706 UART: [ldev] --
10,647,562 UART: [fwproc] Wait for Commands...
10,650,467 UART: [fwproc] Recv command 0x46574c44
10,652,774 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,933 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,226,689 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,299 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,342 >>> mbox cmd response: success
14,915,408 UART: [afmc] ++
14,916,136 UART: [afmc] CDI.KEYID = 6
14,917,340 UART: [afmc] SUBJECT.KEYID = 7
14,918,816 UART: [afmc] AUTHORITY.KEYID = 5
17,421,970 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,484 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,751 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,619 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,022 UART: [afmc] --
19,218,005 UART: [cold-reset] --
19,222,263 UART: [state] Locking Datavault
19,227,801 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,971 UART: [state] Locking ICCM
19,231,665 UART: [exit] Launching FMC @ 0x40000130
19,240,285 UART:
19,240,528 UART: Running Caliptra FMC ...
19,241,555 UART:
19,241,727 UART: [state] CFI Enabled
19,250,163 UART: [fht] FMC Alias Private Key: 7
21,016,693 UART: [art] Extend RT PCRs Done
21,017,919 UART: [art] Lock RT PCRs Done
21,019,472 UART: [art] Populate DV Done
21,024,942 UART: [fht] FMC Alias Private Key: 7
21,026,647 UART: [art] Derive CDI
21,027,392 UART: [art] Store in slot 0x4
21,069,827 UART: [art] Derive Key Pair
21,070,829 UART: [art] Store priv key in slot 0x5
23,497,169 UART: [art] Derive Key Pair - Done
23,509,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,941 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,450 UART: [art] PUB.X = BA2BD7FB450F52551E079A146C6A28DA248E3EEDA4FD49D97B1B78C22F4A4F313F4673AED8D459C9F478A6042CFF37CB
25,224,773 UART: [art] PUB.Y = C9ABA610531DC72032927AF7D8D90D9031213A9EF3DBFB67FE5F49C56E303EE964486C69331A42F266D4404435EA36E8
25,232,002 UART: [art] SIG.R = 09F283CEBDB35B068098C53B88F464ABF9B31CF62ECFB2CAB49C787F905CB4469291DA7B8962657763765E51EADA3788
25,239,458 UART: [art] SIG.S = CF955742BAAD6F0EF06EB0E72F1222DE6D4A8B189AB02B10A8C03CEF36EDAB49908784E9706F5F70AD2A5D684A03D74F
26,218,038 UART: Caliptra RT
26,218,760 UART: [state] CFI Enabled
26,350,565 UART: [rt] RT listening for mailbox commands...
26,352,579 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,382,609 UART: [rt]cmd =0x52564348, len=36
26,384,539 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
3,756,223 ready_for_fw is high
3,756,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,059,267 >>> mbox cmd response: success
19,310,958 UART:
19,311,375 UART: Running Caliptra FMC ...
19,312,534 UART:
19,312,705 UART: [state] CFI Enabled
19,320,353 UART: [fht] FMC Alias Private Key: 7
21,086,480 UART: [art] Extend RT PCRs Done
21,087,713 UART: [art] Lock RT PCRs Done
21,089,076 UART: [art] Populate DV Done
21,094,523 UART: [fht] FMC Alias Private Key: 7
21,096,081 UART: [art] Derive CDI
21,096,910 UART: [art] Store in slot 0x4
21,139,623 UART: [art] Derive Key Pair
21,140,646 UART: [art] Store priv key in slot 0x5
23,567,526 UART: [art] Derive Key Pair - Done
23,580,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,287,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,288,532 UART: [art] PUB.X = 025E72D6D513719825536EC92243A36F7E4C353752FED5BB18B512680A93423BAB20EF730FEB18B8C453144F9EADDE05
25,295,811 UART: [art] PUB.Y = 65EB04D862660E28C1C6FF53C3C9C4771432D4085FF6A88C3987E02E9F246359A57B63FAC642DB5D889BF88D98443994
25,303,027 UART: [art] SIG.R = 76A2AAB820E012CE35513307C8D73B525839700BF19395A8CF7361B83EB8118294509745248764D96292CD4516C46E81
25,310,411 UART: [art] SIG.S = AFB138BCD2030B0189B50662931994CB00E3095684C46BBBFB9CE9CE2366C2F3A3CE612C0B9536D4B7890CCC028134B5
26,289,309 UART: Caliptra RT
26,290,002 UART: [state] CFI Enabled
26,422,729 UART: [rt] RT listening for mailbox commands...
26,424,607 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,454,699 UART: [rt]cmd =0x52564348, len=36
26,456,447 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,977 UART: [kat] SHA2-256
881,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,023 UART: [kat] ++
886,175 UART: [kat] sha1
890,445 UART: [kat] SHA2-256
892,383 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,544 UART: [kat] HMAC-384Kdf
907,220 UART: [kat] LMS
1,475,416 UART: [kat] --
1,476,127 UART: [cold-reset] ++
1,476,617 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 ready_for_fw is high
1,480,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,424 UART: [idev] Erasing UDS.KEYID = 0
1,505,286 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,796 UART: [idev] --
1,514,915 UART: [ldev] ++
1,515,083 UART: [ldev] CDI.KEYID = 6
1,515,446 UART: [ldev] SUBJECT.KEYID = 5
1,515,872 UART: [ldev] AUTHORITY.KEYID = 7
1,516,335 UART: [ldev] FE.KEYID = 1
1,521,497 UART: [ldev] Erasing FE.KEYID = 1
1,547,528 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,744 UART: [ldev] --
1,587,135 UART: [fwproc] Waiting for Commands...
1,587,868 UART: [fwproc] Received command 0x46574c44
1,588,659 UART: [fwproc] Received Image of size 118548 bytes
2,933,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,215 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,660 >>> mbox cmd response: success
3,133,690 UART: [afmc] ++
3,133,858 UART: [afmc] CDI.KEYID = 6
3,134,220 UART: [afmc] SUBJECT.KEYID = 7
3,134,645 UART: [afmc] AUTHORITY.KEYID = 5
3,169,148 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,772 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,552 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,144 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,827 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,917 UART: [afmc] --
3,212,983 UART: [cold-reset] --
3,213,889 UART: [state] Locking Datavault
3,214,876 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,480 UART: [state] Locking ICCM
3,215,926 UART: [exit] Launching FMC @ 0x40000130
3,221,256 UART:
3,221,272 UART: Running Caliptra FMC ...
3,221,680 UART:
3,221,734 UART: [state] CFI Enabled
3,232,428 UART: [fht] FMC Alias Private Key: 7
3,351,840 UART: [art] Extend RT PCRs Done
3,352,268 UART: [art] Lock RT PCRs Done
3,353,736 UART: [art] Populate DV Done
3,361,963 UART: [fht] FMC Alias Private Key: 7
3,363,117 UART: [art] Derive CDI
3,363,397 UART: [art] Store in slot 0x4
3,449,359 UART: [art] Derive Key Pair
3,449,719 UART: [art] Store priv key in slot 0x5
3,462,572 UART: [art] Derive Key Pair - Done
3,477,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,935 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,700 UART: [art] PUB.X = 1F5BD439C2F060364916673D82170A7EF55808B6D767114A82EFF230AFF1F1AA3C505D8F3EA362F167BA1D24F8578ACA
3,500,470 UART: [art] PUB.Y = B8284BDE6F54A2671D4F49310B55D99F6927F8EB54766180A98CEEE157963010C2A01E3B1F47F6777F9DDDD21CAE13A4
3,507,423 UART: [art] SIG.R = 9BF0B17375DC709315149FE1AB0FAA4C0F7EBA510745594AD0DFB67435BF1383BCA5CDCBDF2FF178B8DFF5C6C8375AB1
3,514,208 UART: [art] SIG.S = 06660A800953710B707A953811A1D3373C3C7FDF95F2C4104319AA80E1B7F5B25B19F21A8001C14A907AD559450D7BAB
3,537,942 UART: Caliptra RT
3,538,193 UART: [state] CFI Enabled
3,659,266 UART: [rt] RT listening for mailbox commands...
3,659,936 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,856 UART: [rt]cmd =0x52564348, len=36
3,691,090 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,689 ready_for_fw is high
1,362,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,754 >>> mbox cmd response: success
3,041,573 UART:
3,041,589 UART: Running Caliptra FMC ...
3,041,997 UART:
3,042,051 UART: [state] CFI Enabled
3,052,371 UART: [fht] FMC Alias Private Key: 7
3,171,141 UART: [art] Extend RT PCRs Done
3,171,569 UART: [art] Lock RT PCRs Done
3,173,059 UART: [art] Populate DV Done
3,181,558 UART: [fht] FMC Alias Private Key: 7
3,182,492 UART: [art] Derive CDI
3,182,772 UART: [art] Store in slot 0x4
3,268,650 UART: [art] Derive Key Pair
3,269,010 UART: [art] Store priv key in slot 0x5
3,282,313 UART: [art] Derive Key Pair - Done
3,296,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,854 UART: [art] PUB.X = F92DAA24A18F8F5712C3F3EF9F52631BCF143A8B3E3881A03086B1CD163542248EB5A424A7491E879F2957AD1FC9B516
3,319,628 UART: [art] PUB.Y = EAE6738EAB640D30A45D649A6C33C854F2584E41F07D2BD6F1E7129C453B5115EAA834D7F3DC774EA83FCDA6F6A48802
3,326,584 UART: [art] SIG.R = B89D2F0AED8044A3C8532DA6AF00DBB09540094EADD6F5522867E57459F40EA7262CC423C33DF465AF5859702E5A653E
3,333,329 UART: [art] SIG.S = 913D1839CAEC64CCD20B0BD9B374A845974DC4FC8D57A1E6B9A870BFC7B06E27ECD538966BADC9074A18929A0F33A4F4
3,356,293 UART: Caliptra RT
3,356,544 UART: [state] CFI Enabled
3,476,680 UART: [rt] RT listening for mailbox commands...
3,477,350 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,296 UART: [rt]cmd =0x52564348, len=36
3,508,640 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,146 UART: [kat] SHA2-256
882,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,192 UART: [kat] ++
886,344 UART: [kat] sha1
890,404 UART: [kat] SHA2-256
892,342 UART: [kat] SHA2-384
895,211 UART: [kat] SHA2-512-ACC
897,112 UART: [kat] ECC-384
903,053 UART: [kat] HMAC-384Kdf
907,651 UART: [kat] LMS
1,475,847 UART: [kat] --
1,476,594 UART: [cold-reset] ++
1,477,166 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 ready_for_fw is high
1,481,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,819 UART: [idev] Erasing UDS.KEYID = 0
1,505,811 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,441 UART: [idev] --
1,515,486 UART: [ldev] ++
1,515,654 UART: [ldev] CDI.KEYID = 6
1,516,017 UART: [ldev] SUBJECT.KEYID = 5
1,516,443 UART: [ldev] AUTHORITY.KEYID = 7
1,516,906 UART: [ldev] FE.KEYID = 1
1,522,160 UART: [ldev] Erasing FE.KEYID = 1
1,547,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,960 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,676 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,255 UART: [ldev] --
1,586,672 UART: [fwproc] Waiting for Commands...
1,587,307 UART: [fwproc] Received command 0x46574c44
1,588,098 UART: [fwproc] Received Image of size 118548 bytes
2,931,766 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,274 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,743 >>> mbox cmd response: success
3,131,973 UART: [afmc] ++
3,132,141 UART: [afmc] CDI.KEYID = 6
3,132,503 UART: [afmc] SUBJECT.KEYID = 7
3,132,928 UART: [afmc] AUTHORITY.KEYID = 5
3,167,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,447 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,227 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,936 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,819 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,502 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,290 UART: [afmc] --
3,211,348 UART: [cold-reset] --
3,212,004 UART: [state] Locking Datavault
3,213,211 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,815 UART: [state] Locking ICCM
3,214,459 UART: [exit] Launching FMC @ 0x40000130
3,219,789 UART:
3,219,805 UART: Running Caliptra FMC ...
3,220,213 UART:
3,220,356 UART: [state] CFI Enabled
3,230,744 UART: [fht] FMC Alias Private Key: 7
3,349,642 UART: [art] Extend RT PCRs Done
3,350,070 UART: [art] Lock RT PCRs Done
3,351,738 UART: [art] Populate DV Done
3,360,111 UART: [fht] FMC Alias Private Key: 7
3,361,091 UART: [art] Derive CDI
3,361,371 UART: [art] Store in slot 0x4
3,447,379 UART: [art] Derive Key Pair
3,447,739 UART: [art] Store priv key in slot 0x5
3,461,158 UART: [art] Derive Key Pair - Done
3,476,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,803 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,568 UART: [art] PUB.X = AE928945B262C7AB0E1BDBBEC7004DA1F771FACDFA597CB0F75AE9E17068F3C3D939997304252C1A8369E2FDC9E2FDDF
3,499,332 UART: [art] PUB.Y = 247146A931D2F6629856C2F3FF7E2C9FC739B32C113D0BC1F9C3C50D445ACAB5C10E4DAAFB6CEFB88C5708195C52AD3E
3,506,288 UART: [art] SIG.R = 1F0035C67C060C0737EBCC062E79D6D3C5983729B2E856D851B7C1FA893C05B8B6FC103AB324DC3EB13765DBF20E6D9A
3,513,028 UART: [art] SIG.S = C6DD6EBAA0F1FE2CADD9A8DFCCE3353C6728CB53254168CB2D5F4E71EAF2C1330AD537644EE6C322C380E99C73AF1589
3,537,039 UART: Caliptra RT
3,537,382 UART: [state] CFI Enabled
3,657,251 UART: [rt] RT listening for mailbox commands...
3,657,921 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,239 UART: [rt]cmd =0x52564348, len=36
3,689,785 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,262 ready_for_fw is high
1,363,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,703 >>> mbox cmd response: success
3,042,958 UART:
3,042,974 UART: Running Caliptra FMC ...
3,043,382 UART:
3,043,525 UART: [state] CFI Enabled
3,054,123 UART: [fht] FMC Alias Private Key: 7
3,173,541 UART: [art] Extend RT PCRs Done
3,173,969 UART: [art] Lock RT PCRs Done
3,175,469 UART: [art] Populate DV Done
3,183,830 UART: [fht] FMC Alias Private Key: 7
3,184,930 UART: [art] Derive CDI
3,185,210 UART: [art] Store in slot 0x4
3,271,142 UART: [art] Derive Key Pair
3,271,502 UART: [art] Store priv key in slot 0x5
3,284,863 UART: [art] Derive Key Pair - Done
3,299,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,658 UART: [art] PUB.X = 34B8D79D1CEBBA77C7B3039C16C971979F146E56B47A434268A744CA9764871CFD1503F5026699DCA4C25FECE3A6C992
3,322,423 UART: [art] PUB.Y = 5DD6BBDB054D6CC3F6B1FD293AA494EC12DC0203CDDDF4EC0D50784FCA5933C5056DCC86EEAA6264732250DFC8829BD9
3,329,382 UART: [art] SIG.R = 1FC17D6BB463A1998673A1D983664A17385DDBF0990BC48D3C9DBC1FF1436B607401D959C0BA24C693B3D6D1A6D2BBE8
3,336,156 UART: [art] SIG.S = B5E60D41A9491B6DCFA7DE79A4436929C3B8874BAC74159067667B8B38766DE96DDC1F30AAF77BB5EDF6B3B64D2CBA1F
3,359,507 UART: Caliptra RT
3,359,850 UART: [state] CFI Enabled
3,479,737 UART: [rt] RT listening for mailbox commands...
3,480,407 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,549 UART: [rt]cmd =0x52564348, len=36
3,512,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
891,174 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,278 UART: [kat] ++
895,430 UART: [kat] sha1
899,552 UART: [kat] SHA2-256
901,492 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,863 UART: [kat] HMAC-384Kdf
920,573 UART: [kat] LMS
1,168,885 UART: [kat] --
1,169,912 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,974 UART: [idev] ++
1,173,142 UART: [idev] CDI.KEYID = 6
1,173,503 UART: [idev] SUBJECT.KEYID = 7
1,173,928 UART: [idev] UDS.KEYID = 0
1,174,274 ready_for_fw is high
1,174,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,913 UART: [idev] Erasing UDS.KEYID = 0
1,198,967 UART: [idev] Sha1 KeyId Algorithm
1,207,745 UART: [idev] --
1,208,906 UART: [ldev] ++
1,209,074 UART: [ldev] CDI.KEYID = 6
1,209,438 UART: [ldev] SUBJECT.KEYID = 5
1,209,865 UART: [ldev] AUTHORITY.KEYID = 7
1,210,328 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,242,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,992 UART: [fwproc] Recv command 0x46574c44
1,282,725 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,989 >>> mbox cmd response: success
2,828,167 UART: [afmc] ++
2,828,335 UART: [afmc] CDI.KEYID = 6
2,828,698 UART: [afmc] SUBJECT.KEYID = 7
2,829,124 UART: [afmc] AUTHORITY.KEYID = 5
2,864,441 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,193 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,775 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,566 UART: [afmc] --
2,907,551 UART: [cold-reset] --
2,908,271 UART: [state] Locking Datavault
2,909,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,076 UART: [state] Locking ICCM
2,910,580 UART: [exit] Launching FMC @ 0x40000130
2,915,910 UART:
2,915,926 UART: Running Caliptra FMC ...
2,916,334 UART:
2,916,388 UART: [state] CFI Enabled
2,927,092 UART: [fht] FMC Alias Private Key: 7
3,046,116 UART: [art] Extend RT PCRs Done
3,046,544 UART: [art] Lock RT PCRs Done
3,047,984 UART: [art] Populate DV Done
3,056,269 UART: [fht] FMC Alias Private Key: 7
3,057,201 UART: [art] Derive CDI
3,057,481 UART: [art] Store in slot 0x4
3,143,020 UART: [art] Derive Key Pair
3,143,380 UART: [art] Store priv key in slot 0x5
3,156,876 UART: [art] Derive Key Pair - Done
3,171,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,011 UART: [art] PUB.X = C87312A8393F3636D56383D24187C78489D9EDB8C89171C8194148031135B43EB4FB36DFA05D646F499881CB1DD18FBE
3,194,774 UART: [art] PUB.Y = 4AD80A0001CD7F6B4B541D02BCD52823FF064ABD29032E33657FC65027AAB6017F62FA0CD810F437D8C326119AFDED54
3,201,691 UART: [art] SIG.R = 9DF0E1AFB5D0C2D312BCD9910BA2BF68DDBF83B26EB275C0C12809166728499CB4996407831A0302CE30F2D4B382F77E
3,208,454 UART: [art] SIG.S = 9044C275DFB5A9AC814D07F558BA28E8F47C2FF28061F74976F6B9098297173FD74E6E09B1D6E84264F3AF95E397840C
3,231,938 UART: Caliptra RT
3,232,189 UART: [state] CFI Enabled
3,351,922 UART: [rt] RT listening for mailbox commands...
3,352,592 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,670 UART: [rt]cmd =0x52564348, len=36
3,384,064 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,550 ready_for_fw is high
1,059,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,072 >>> mbox cmd response: success
2,740,325 UART:
2,740,341 UART: Running Caliptra FMC ...
2,740,749 UART:
2,740,803 UART: [state] CFI Enabled
2,751,199 UART: [fht] FMC Alias Private Key: 7
2,869,927 UART: [art] Extend RT PCRs Done
2,870,355 UART: [art] Lock RT PCRs Done
2,871,843 UART: [art] Populate DV Done
2,879,942 UART: [fht] FMC Alias Private Key: 7
2,881,092 UART: [art] Derive CDI
2,881,372 UART: [art] Store in slot 0x4
2,967,833 UART: [art] Derive Key Pair
2,968,193 UART: [art] Store priv key in slot 0x5
2,981,205 UART: [art] Derive Key Pair - Done
2,995,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,261 UART: [art] PUB.X = 6E1BBD6B10D98CF9D9CAD1312D62F2C0BBA20A1154CCD784C61BB9FBF00C3798A713555867BA7DF27BDECC87F607C6A1
3,019,044 UART: [art] PUB.Y = 8D5FD1629DFD231BB61979EC640823B8EDAB6563E023F09F34EF0654B4ACF39F836CB94AD1A04717A7C171EB8578E178
3,025,996 UART: [art] SIG.R = 5C02B94224FD5607C807B3A69AEB6DCE72EAEF0CDCC151E6FD1EEEC85D86D4C039E935C16D43428DFAB03B04139E68BD
3,032,773 UART: [art] SIG.S = ED3531EB7CCAA2D56D2082C20B585EE9DFA9E147B2E768FB61112CD4A0DEF2D78F52A6CFAA848B1130E41D2BE271D85C
3,057,066 UART: Caliptra RT
3,057,317 UART: [state] CFI Enabled
3,176,491 UART: [rt] RT listening for mailbox commands...
3,177,161 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,129 UART: [rt]cmd =0x52564348, len=36
3,208,479 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,119 UART: [state] LifecycleState = Unprovisioned
85,774 UART: [state] DebugLocked = No
86,280 UART: [state] WD Timer not started. Device not locked for debugging
87,553 UART: [kat] SHA2-256
891,103 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,207 UART: [kat] ++
895,359 UART: [kat] sha1
899,435 UART: [kat] SHA2-256
901,375 UART: [kat] SHA2-384
904,244 UART: [kat] SHA2-512-ACC
906,145 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,649 UART: [cold-reset] ++
1,170,053 UART: [fht] FHT @ 0x50003400
1,172,719 UART: [idev] ++
1,172,887 UART: [idev] CDI.KEYID = 6
1,173,248 UART: [idev] SUBJECT.KEYID = 7
1,173,673 UART: [idev] UDS.KEYID = 0
1,174,019 ready_for_fw is high
1,174,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,470 UART: [idev] Erasing UDS.KEYID = 0
1,198,008 UART: [idev] Sha1 KeyId Algorithm
1,207,042 UART: [idev] --
1,208,137 UART: [ldev] ++
1,208,305 UART: [ldev] CDI.KEYID = 6
1,208,669 UART: [ldev] SUBJECT.KEYID = 5
1,209,096 UART: [ldev] AUTHORITY.KEYID = 7
1,209,559 UART: [ldev] FE.KEYID = 1
1,214,907 UART: [ldev] Erasing FE.KEYID = 1
1,241,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,631 UART: [ldev] --
1,280,880 UART: [fwproc] Wait for Commands...
1,281,477 UART: [fwproc] Recv command 0x46574c44
1,282,210 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,260 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,796 >>> mbox cmd response: success
2,825,872 UART: [afmc] ++
2,826,040 UART: [afmc] CDI.KEYID = 6
2,826,403 UART: [afmc] SUBJECT.KEYID = 7
2,826,829 UART: [afmc] AUTHORITY.KEYID = 5
2,861,846 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,928 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,519 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,220 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,925 UART: [afmc] --
2,904,788 UART: [cold-reset] --
2,905,716 UART: [state] Locking Datavault
2,906,987 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,591 UART: [state] Locking ICCM
2,908,021 UART: [exit] Launching FMC @ 0x40000130
2,913,351 UART:
2,913,367 UART: Running Caliptra FMC ...
2,913,775 UART:
2,913,918 UART: [state] CFI Enabled
2,924,510 UART: [fht] FMC Alias Private Key: 7
3,043,304 UART: [art] Extend RT PCRs Done
3,043,732 UART: [art] Lock RT PCRs Done
3,045,274 UART: [art] Populate DV Done
3,053,579 UART: [fht] FMC Alias Private Key: 7
3,054,553 UART: [art] Derive CDI
3,054,833 UART: [art] Store in slot 0x4
3,140,516 UART: [art] Derive Key Pair
3,140,876 UART: [art] Store priv key in slot 0x5
3,154,540 UART: [art] Derive Key Pair - Done
3,169,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,837 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,602 UART: [art] PUB.X = EDA5E8A64A06294E23BF7EF30B17F243221C553065EDFF1A207E93E322B2270B7E5449A6CFED677D32C7FCD367709175
3,192,369 UART: [art] PUB.Y = BFDFEB85CD9621103149A17DAF877013EF03DB133779FBBD64DD12CF843C1705EE9393CCDD0100AD8F3C83DCC298684D
3,199,304 UART: [art] SIG.R = 849FFFBFA3F970FF35B1835264F8362173B59D137F4368BF62D8AC149D005DC6B04D1AF5E8FFB96A04F8858AE3859BC6
3,206,059 UART: [art] SIG.S = 107044BFA006A04DB5488326E8EB30D5EBC1CE280D835F79B5501396D3BE927A0BA73F0DA0B3E0F753882717AB05834B
3,230,076 UART: Caliptra RT
3,230,419 UART: [state] CFI Enabled
3,349,547 UART: [rt] RT listening for mailbox commands...
3,350,217 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,993 UART: [rt]cmd =0x52564348, len=36
3,381,601 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,369 ready_for_fw is high
1,060,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,283 >>> mbox cmd response: success
2,743,950 UART:
2,743,966 UART: Running Caliptra FMC ...
2,744,374 UART:
2,744,517 UART: [state] CFI Enabled
2,754,757 UART: [fht] FMC Alias Private Key: 7
2,873,421 UART: [art] Extend RT PCRs Done
2,873,849 UART: [art] Lock RT PCRs Done
2,875,543 UART: [art] Populate DV Done
2,883,532 UART: [fht] FMC Alias Private Key: 7
2,884,468 UART: [art] Derive CDI
2,884,748 UART: [art] Store in slot 0x4
2,970,655 UART: [art] Derive Key Pair
2,971,015 UART: [art] Store priv key in slot 0x5
2,985,197 UART: [art] Derive Key Pair - Done
2,999,713 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,697 UART: [art] PUB.X = 3B76FFD863D6E810D835004E815A8986075DD56D06648D434A3DFB823E3B6700E6BBB64967A97D5209B2EE0C754E8409
3,022,406 UART: [art] PUB.Y = 2F4286FBAEC5ABC360D1DAD1D7A1A8FF28E9522002BF8EC71331056D518724508CA59F496D672A21ADEC064975F66125
3,029,353 UART: [art] SIG.R = 27B4D6D62239FF799E046C67AC662AEF0B31161A4FE2EE2ED04DFDC0B77FC386C9CB1F18E0E57AC6AE31D681D1EBDB77
3,036,141 UART: [art] SIG.S = E2BBC1EBB9322191BF1D66ABDDCB42B71098032AE7A03A05232AB53144482923D46007B11ADBDCB05E2A804288A9707A
3,059,922 UART: Caliptra RT
3,060,265 UART: [state] CFI Enabled
3,179,695 UART: [rt] RT listening for mailbox commands...
3,180,365 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,403 UART: [rt]cmd =0x52564348, len=36
3,211,903 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,467 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,636 UART: [kat] SHA2-512-ACC
908,537 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
922,812 UART: [kat] LMS
1,171,140 UART: [kat] --
1,172,185 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,298 UART: [idev] ++
1,175,466 UART: [idev] CDI.KEYID = 6
1,175,826 UART: [idev] SUBJECT.KEYID = 7
1,176,250 UART: [idev] UDS.KEYID = 0
1,176,595 ready_for_fw is high
1,176,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,978 UART: [idev] Erasing UDS.KEYID = 0
1,200,715 UART: [idev] Sha1 KeyId Algorithm
1,209,011 UART: [idev] --
1,210,081 UART: [ldev] ++
1,210,249 UART: [ldev] CDI.KEYID = 6
1,210,612 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,540 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,359 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,456 UART: [fwproc] Recv command 0x46574c44
1,284,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,655 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,713 >>> mbox cmd response: success
2,828,731 UART: [afmc] ++
2,828,899 UART: [afmc] CDI.KEYID = 6
2,829,261 UART: [afmc] SUBJECT.KEYID = 7
2,829,686 UART: [afmc] AUTHORITY.KEYID = 5
2,865,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,486 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,943 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,826 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,527 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,373 UART: [afmc] --
2,908,485 UART: [cold-reset] --
2,909,449 UART: [state] Locking Datavault
2,910,596 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,200 UART: [state] Locking ICCM
2,911,846 UART: [exit] Launching FMC @ 0x40000130
2,917,176 UART:
2,917,192 UART: Running Caliptra FMC ...
2,917,600 UART:
2,917,654 UART: [state] CFI Enabled
2,927,936 UART: [fht] FMC Alias Private Key: 7
3,046,232 UART: [art] Extend RT PCRs Done
3,046,660 UART: [art] Lock RT PCRs Done
3,048,084 UART: [art] Populate DV Done
3,056,385 UART: [fht] FMC Alias Private Key: 7
3,057,553 UART: [art] Derive CDI
3,057,833 UART: [art] Store in slot 0x4
3,143,750 UART: [art] Derive Key Pair
3,144,110 UART: [art] Store priv key in slot 0x5
3,157,268 UART: [art] Derive Key Pair - Done
3,171,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,757 UART: [art] PUB.X = 0FFC7CD3ABD6AE8FB729CCEC1DA40143F946EC4C5B31549BEE4A6A50C75B43E2C2C58C622C927AA58E5442B2194C550C
3,194,538 UART: [art] PUB.Y = B68B302F9F40F0EB34816285C1FE1AE45D1DB7FC923688912A2FF7F4433244CFAC04E93DFB0E8166FB45C9D44F763667
3,201,490 UART: [art] SIG.R = 560379DA801AD0FCC0E94CC2E99FEC78C052ED8F685AE909EABBA5C754ED2055253605E9CEB6AD6EF9971CA66188D77E
3,208,269 UART: [art] SIG.S = 3D41D33CA838DBECE8CB6A707AD7B5A9916278821CBD86EA243C7919C4834F7E09E334E5E8F8F0B34334F79A9172F876
3,231,360 UART: Caliptra RT
3,231,611 UART: [state] CFI Enabled
3,350,656 UART: [rt] RT listening for mailbox commands...
3,351,326 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,364 UART: [rt]cmd =0x52564348, len=36
3,382,844 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,416 >>> mbox cmd response: success
2,740,479 UART:
2,740,495 UART: Running Caliptra FMC ...
2,740,903 UART:
2,740,957 UART: [state] CFI Enabled
2,751,439 UART: [fht] FMC Alias Private Key: 7
2,871,601 UART: [art] Extend RT PCRs Done
2,872,029 UART: [art] Lock RT PCRs Done
2,873,843 UART: [art] Populate DV Done
2,881,966 UART: [fht] FMC Alias Private Key: 7
2,882,902 UART: [art] Derive CDI
2,883,182 UART: [art] Store in slot 0x4
2,969,103 UART: [art] Derive Key Pair
2,969,463 UART: [art] Store priv key in slot 0x5
2,982,303 UART: [art] Derive Key Pair - Done
2,996,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,745 UART: [art] PUB.X = C0452C30E24529F16AE89060A4B0A41B2A096A51F0770D4A4AD93F2A9CEFC5A9986C3EDFC9A661010ED7EF0E51743729
3,019,508 UART: [art] PUB.Y = 8AF5FFCE25167F898C336014AA06B63D882CE8DF87129FAFB30B2C28305F5EF36B6B122358E565BC2A2DD4FE64E9BDF2
3,026,468 UART: [art] SIG.R = 055A5E7D4A6748D9C6620BD7299AA08B577EE63C80040A624F0712C30DDEED5C25FFFD5CB8EC0A95DCA7CB4A207FCD7E
3,033,239 UART: [art] SIG.S = 9411F36761B14E9130DBA8F1F49D4D1096F0DBFB536E4F44E09BD6D70AFB9075947D674AAC1522707FEF3C7D1F3246B9
3,056,804 UART: Caliptra RT
3,057,055 UART: [state] CFI Enabled
3,176,923 UART: [rt] RT listening for mailbox commands...
3,177,593 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,427 UART: [rt]cmd =0x52564348, len=36
3,208,791 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,716 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
893,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,762 UART: [kat] ++
897,914 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
906,987 UART: [kat] SHA2-512-ACC
908,888 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,099 UART: [kat] LMS
1,171,427 UART: [kat] --
1,172,304 UART: [cold-reset] ++
1,172,818 UART: [fht] FHT @ 0x50003400
1,175,469 UART: [idev] ++
1,175,637 UART: [idev] CDI.KEYID = 6
1,175,997 UART: [idev] SUBJECT.KEYID = 7
1,176,421 UART: [idev] UDS.KEYID = 0
1,176,766 ready_for_fw is high
1,176,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,533 UART: [idev] Erasing UDS.KEYID = 0
1,202,120 UART: [idev] Sha1 KeyId Algorithm
1,210,580 UART: [idev] --
1,211,686 UART: [ldev] ++
1,211,854 UART: [ldev] CDI.KEYID = 6
1,212,217 UART: [ldev] SUBJECT.KEYID = 5
1,212,643 UART: [ldev] AUTHORITY.KEYID = 7
1,213,106 UART: [ldev] FE.KEYID = 1
1,218,252 UART: [ldev] Erasing FE.KEYID = 1
1,244,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,088 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,804 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,407 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,544 UART: [ldev] --
1,283,937 UART: [fwproc] Wait for Commands...
1,284,729 UART: [fwproc] Recv command 0x46574c44
1,285,457 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,270 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,134 >>> mbox cmd response: success
2,829,334 UART: [afmc] ++
2,829,502 UART: [afmc] CDI.KEYID = 6
2,829,864 UART: [afmc] SUBJECT.KEYID = 7
2,830,289 UART: [afmc] AUTHORITY.KEYID = 5
2,865,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,287 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,744 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,627 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,214 UART: [afmc] --
2,909,332 UART: [cold-reset] --
2,910,064 UART: [state] Locking Datavault
2,911,265 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,869 UART: [state] Locking ICCM
2,912,469 UART: [exit] Launching FMC @ 0x40000130
2,917,799 UART:
2,917,815 UART: Running Caliptra FMC ...
2,918,223 UART:
2,918,366 UART: [state] CFI Enabled
2,928,530 UART: [fht] FMC Alias Private Key: 7
3,046,602 UART: [art] Extend RT PCRs Done
3,047,030 UART: [art] Lock RT PCRs Done
3,048,680 UART: [art] Populate DV Done
3,057,041 UART: [fht] FMC Alias Private Key: 7
3,058,129 UART: [art] Derive CDI
3,058,409 UART: [art] Store in slot 0x4
3,144,284 UART: [art] Derive Key Pair
3,144,644 UART: [art] Store priv key in slot 0x5
3,157,864 UART: [art] Derive Key Pair - Done
3,172,766 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,335 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,100 UART: [art] PUB.X = 158B13AD9A4F2BB35C55E4394135AF3AE727E85922AB30F63C6B2CF7F6FA083942DF7705E190108AFC2AB064403E8E58
3,195,870 UART: [art] PUB.Y = C4CC06078F195258F88457C5E3690F68ABDAD01F2677F81FA251C0ACE901558C6CEFA2125855A90790B9A86E9908ECC8
3,202,806 UART: [art] SIG.R = 3D1FD33A1477E74A6C1AA105F948FB26244A6232CC4603045E9ADE742B995890A0AFAE3521D62F2619A444C29A32F3C1
3,209,569 UART: [art] SIG.S = 8DD2E327B51A518D43B195232C9EAB9F106365467F136DE73D88756A57F09CFF6E0D6404143FF700F6136A94B51072F7
3,233,185 UART: Caliptra RT
3,233,528 UART: [state] CFI Enabled
3,353,148 UART: [rt] RT listening for mailbox commands...
3,353,818 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,964 UART: [rt]cmd =0x52564348, len=36
3,385,426 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,810 ready_for_fw is high
1,060,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,847 >>> mbox cmd response: success
2,742,206 UART:
2,742,222 UART: Running Caliptra FMC ...
2,742,630 UART:
2,742,773 UART: [state] CFI Enabled
2,753,363 UART: [fht] FMC Alias Private Key: 7
2,872,305 UART: [art] Extend RT PCRs Done
2,872,733 UART: [art] Lock RT PCRs Done
2,874,335 UART: [art] Populate DV Done
2,882,636 UART: [fht] FMC Alias Private Key: 7
2,883,800 UART: [art] Derive CDI
2,884,080 UART: [art] Store in slot 0x4
2,970,065 UART: [art] Derive Key Pair
2,970,425 UART: [art] Store priv key in slot 0x5
2,983,405 UART: [art] Derive Key Pair - Done
2,998,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,639 UART: [art] PUB.X = EFAFBF67F75F1353998A723C9F110D9C400D978743E75AF2C87BACB148C325A615BD2FE8C72779950385184CA70FA000
3,021,379 UART: [art] PUB.Y = 0F0A17FBC6AA6AA066E1109709A8AE134E1C202DD5BD3FCAA81A94527B5DC8E9CD26B0440676AA8A9AC8C5888230EA04
3,028,330 UART: [art] SIG.R = 9E2C9B2B04E25122103F17B774594045FCCA2E58C5EB4366ACBDCFD4A2C7A59CF9951CD9EE46113D50E5ACF7DD6A1F52
3,035,115 UART: [art] SIG.S = 14A45E8A44E88E16DA076E6BC70D21209300E22664CEC2C95A30998BFEF35DFF03AFE9EE117E1F6DBA20A1971D622504
3,058,789 UART: Caliptra RT
3,059,132 UART: [state] CFI Enabled
3,179,128 UART: [rt] RT listening for mailbox commands...
3,179,798 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,142 UART: [rt]cmd =0x52564348, len=36
3,211,438 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_revoke_export_cdi_handle_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,877 writing to cptra_bootfsm_go
192,013 UART:
192,388 UART: Running Caliptra ROM ...
193,595 UART:
193,758 UART: [state] CFI Enabled
268,634 UART: [state] LifecycleState = Unprovisioned
270,550 UART: [state] DebugLocked = No
272,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,961 UART: [kat] SHA2-256
446,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,166 UART: [kat] ++
457,660 UART: [kat] sha1
469,034 UART: [kat] SHA2-256
471,690 UART: [kat] SHA2-384
477,035 UART: [kat] SHA2-512-ACC
479,413 UART: [kat] ECC-384
2,770,246 UART: [kat] HMAC-384Kdf
2,801,817 UART: [kat] LMS
3,992,107 UART: [kat] --
3,997,671 UART: [cold-reset] ++
3,999,330 UART: [fht] Storing FHT @ 0x50003400
4,010,098 UART: [idev] ++
4,010,670 UART: [idev] CDI.KEYID = 6
4,011,656 UART: [idev] SUBJECT.KEYID = 7
4,012,907 UART: [idev] UDS.KEYID = 0
4,013,947 ready_for_fw is high
4,014,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,303 UART: [idev] Erasing UDS.KEYID = 0
7,349,738 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,293 UART: [idev] --
7,375,746 UART: [ldev] ++
7,376,841 UART: [ldev] CDI.KEYID = 6
7,377,758 UART: [ldev] SUBJECT.KEYID = 5
7,378,910 UART: [ldev] AUTHORITY.KEYID = 7
7,380,100 UART: [ldev] FE.KEYID = 1
7,422,858 UART: [ldev] Erasing FE.KEYID = 1
10,755,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,511 UART: [ldev] --
13,136,541 UART: [fwproc] Waiting for Commands...
13,139,594 UART: [fwproc] Received command 0x46574c44
13,141,793 UART: [fwproc] Received Image of size 118548 bytes
17,247,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,323,270 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,396,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,425 >>> mbox cmd response: success
17,729,438 UART: [afmc] ++
17,730,053 UART: [afmc] CDI.KEYID = 6
17,730,971 UART: [afmc] SUBJECT.KEYID = 7
17,732,249 UART: [afmc] AUTHORITY.KEYID = 5
21,089,403 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,388,742 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,390,991 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,536 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,454,687 UART: [afmc] --
23,458,265 UART: [cold-reset] --
23,460,905 UART: [state] Locking Datavault
23,465,829 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,582 UART: [state] Locking ICCM
23,468,758 UART: [exit] Launching FMC @ 0x40000130
23,477,176 UART:
23,477,412 UART: Running Caliptra FMC ...
23,478,511 UART:
23,478,673 UART: [state] CFI Enabled
23,548,342 UART: [fht] FMC Alias Private Key: 7
25,888,326 UART: [art] Extend RT PCRs Done
25,889,542 UART: [art] Lock RT PCRs Done
25,891,302 UART: [art] Populate DV Done
25,896,668 UART: [fht] FMC Alias Private Key: 7
25,898,202 UART: [art] Derive CDI
25,899,017 UART: [art] Store in slot 0x4
25,956,874 UART: [art] Derive Key Pair
25,957,915 UART: [art] Store priv key in slot 0x5
29,250,974 UART: [art] Derive Key Pair - Done
29,263,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,138 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,666 UART: [art] PUB.X = A927C9718828244EAC5BE81C93D2E0ADE84A5C399CD3E091BFDE5AD85BEA587D6B568B1AA2C2343288DB30F16133A990
31,561,914 UART: [art] PUB.Y = FC6DC02A023B4875E65A87DA33096E15CF990098713215048E6508DECE4ED1132303F36C6BB36F4413395DE1B56A2B9D
31,569,138 UART: [art] SIG.R = 46B375ADA93A473DF87D24F40F1F49AF0899DCA0D8F7A2DF217DEE1502F61AC408D97F5E93E69E2450538A933C279E6C
31,576,531 UART: [art] SIG.S = D2810F106841BD31AF0A6F09A89DD5A9920D42B2A62F90FA65CE6819249FAC0AA13FDD30D234652CA47B7433ECEA4DA9
32,881,725 UART: Caliptra RT
32,882,422 UART: [state] CFI Enabled
33,058,807 UART: [rt] RT listening for mailbox commands...
33,060,708 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,091,168 UART: [rt]cmd =0x53574545, len=84
33,093,036 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,786,983 ready_for_fw is high
3,787,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,920 >>> mbox cmd response: success
23,658,660 UART:
23,659,055 UART: Running Caliptra FMC ...
23,660,171 UART:
23,660,326 UART: [state] CFI Enabled
23,726,339 UART: [fht] FMC Alias Private Key: 7
26,066,718 UART: [art] Extend RT PCRs Done
26,067,942 UART: [art] Lock RT PCRs Done
26,069,761 UART: [art] Populate DV Done
26,075,296 UART: [fht] FMC Alias Private Key: 7
26,076,888 UART: [art] Derive CDI
26,077,627 UART: [art] Store in slot 0x4
26,135,103 UART: [art] Derive Key Pair
26,136,149 UART: [art] Store priv key in slot 0x5
29,429,609 UART: [art] Derive Key Pair - Done
29,442,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,730,643 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,153 UART: [art] PUB.X = 49D0B0295274FFD25D62C03C065148B4B4101A0944C6E6F772B200C0AD79CBC03AD7E47CE6F3B902366DCF96C6C9EEC6
31,739,395 UART: [art] PUB.Y = 0547B24227F6D21DC1EF125E517C255EDE17FEF5953A10E5F74D993CD817C4F0EC3089B62D20FE5663689D41F3BF26DE
31,746,690 UART: [art] SIG.R = A3164305FFB4F6158BCC707B1859B412A25DD112C904B24690E065F803CB9E6C8FB20C807C6D8E07CFD9170CD916C88B
31,754,032 UART: [art] SIG.S = 8E2134CAA61DF9F8533AA8DC78558C34DBD8C88A6494BA8341885DC11B8392C707CEFA0495B1205A8DE36358ED66DBC7
33,059,575 UART: Caliptra RT
33,060,292 UART: [state] CFI Enabled
33,235,991 UART: [rt] RT listening for mailbox commands...
33,237,872 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,268,486 UART: [rt]cmd =0x53574545, len=84
33,270,025 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,457 UART:
192,823 UART: Running Caliptra ROM ...
194,122 UART:
603,653 UART: [state] CFI Enabled
618,604 UART: [state] LifecycleState = Unprovisioned
620,475 UART: [state] DebugLocked = No
622,282 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,130 UART: [kat] SHA2-256
796,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,380 UART: [kat] ++
807,978 UART: [kat] sha1
819,088 UART: [kat] SHA2-256
821,785 UART: [kat] SHA2-384
828,203 UART: [kat] SHA2-512-ACC
830,566 UART: [kat] ECC-384
3,115,687 UART: [kat] HMAC-384Kdf
3,128,645 UART: [kat] LMS
4,318,767 UART: [kat] --
4,322,243 UART: [cold-reset] ++
4,323,596 UART: [fht] Storing FHT @ 0x50003400
4,335,910 UART: [idev] ++
4,336,537 UART: [idev] CDI.KEYID = 6
4,337,469 UART: [idev] SUBJECT.KEYID = 7
4,338,487 UART: [idev] UDS.KEYID = 0
4,339,565 ready_for_fw is high
4,339,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,581 UART: [idev] Erasing UDS.KEYID = 0
7,624,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,306 UART: [idev] --
7,649,922 UART: [ldev] ++
7,650,535 UART: [ldev] CDI.KEYID = 6
7,651,546 UART: [ldev] SUBJECT.KEYID = 5
7,652,718 UART: [ldev] AUTHORITY.KEYID = 7
7,653,940 UART: [ldev] FE.KEYID = 1
7,664,908 UART: [ldev] Erasing FE.KEYID = 1
10,950,734 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,433 UART: [ldev] --
13,311,489 UART: [fwproc] Waiting for Commands...
13,313,955 UART: [fwproc] Received command 0x46574c44
13,316,138 UART: [fwproc] Received Image of size 118548 bytes
17,418,240 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,439 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,641 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,311 >>> mbox cmd response: success
17,897,183 UART: [afmc] ++
17,897,805 UART: [afmc] CDI.KEYID = 6
17,898,715 UART: [afmc] SUBJECT.KEYID = 7
17,899,983 UART: [afmc] AUTHORITY.KEYID = 5
21,217,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,394 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,648 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,065 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,827 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,228 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,631 UART: [afmc] --
23,583,674 UART: [cold-reset] --
23,589,265 UART: [state] Locking Datavault
23,593,912 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,604 UART: [state] Locking ICCM
23,597,857 UART: [exit] Launching FMC @ 0x40000130
23,606,265 UART:
23,606,498 UART: Running Caliptra FMC ...
23,607,592 UART:
23,607,746 UART: [state] CFI Enabled
23,615,902 UART: [fht] FMC Alias Private Key: 7
25,955,959 UART: [art] Extend RT PCRs Done
25,957,165 UART: [art] Lock RT PCRs Done
25,958,782 UART: [art] Populate DV Done
25,964,022 UART: [fht] FMC Alias Private Key: 7
25,965,621 UART: [art] Derive CDI
25,966,431 UART: [art] Store in slot 0x4
26,008,856 UART: [art] Derive Key Pair
26,009,857 UART: [art] Store priv key in slot 0x5
29,252,051 UART: [art] Derive Key Pair - Done
29,265,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,057 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,582 UART: [art] PUB.X = FEA8B4539DCF7444E45DF7A3BEE03F69BAB142586184AB1AB9A2CC25F12603B65611D57B8D86DC7C36CADC274D6F3B8F
31,553,825 UART: [art] PUB.Y = A7A8ADA1DFD263E96F902E9451F8CA65588C6BBB146CEDDA03167F42B697124816E3838C95295305E12EB12801180314
31,561,113 UART: [art] SIG.R = 6CB098602261707149D6946908300A96CCB521165E02CCFEC50E3F7FD0D55201E24222D35C0ACD6DD663620F3AE3D390
31,568,440 UART: [art] SIG.S = CE405D425160BABCFA6615BA9817824AD06497FA2F57A1DAF79D1F2E33F1AC3CA6A52485BCB090CD3E2CE13DBC176FAE
32,874,013 UART: Caliptra RT
32,874,745 UART: [state] CFI Enabled
33,008,300 UART: [rt] RT listening for mailbox commands...
33,010,199 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,040,554 UART: [rt]cmd =0x53574545, len=84
33,042,202 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
4,131,156 ready_for_fw is high
4,131,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,313 >>> mbox cmd response: success
23,800,271 UART:
23,800,689 UART: Running Caliptra FMC ...
23,802,005 UART:
23,802,187 UART: [state] CFI Enabled
23,809,397 UART: [fht] FMC Alias Private Key: 7
26,149,953 UART: [art] Extend RT PCRs Done
26,151,181 UART: [art] Lock RT PCRs Done
26,152,722 UART: [art] Populate DV Done
26,158,030 UART: [fht] FMC Alias Private Key: 7
26,159,686 UART: [art] Derive CDI
26,160,418 UART: [art] Store in slot 0x4
26,203,058 UART: [art] Derive Key Pair
26,204,055 UART: [art] Store priv key in slot 0x5
29,446,461 UART: [art] Derive Key Pair - Done
29,459,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,398 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,931 UART: [art] PUB.X = D6A738F73545227750826C3C9862A50080D3FE3C8F5FD7F89085E3584CAB3D7FD7EBCE54E6448108FAD052E5AE12B3A7
31,748,178 UART: [art] PUB.Y = B1585F6E9110ADBF14AB0EDF29A01E38BC710579434B911CE2A52A1C6230AA9F0DE8AC5A02EF9C2A15BEFD80F48C6EF4
31,755,425 UART: [art] SIG.R = BDBD108B08C4008F9C86FA725C477522118B61028B831AFC9264A8399388D2097CFA3D76D97E1BFB439D2D0C3A71CB0A
31,762,825 UART: [art] SIG.S = 49A369D6EDD0B8F58F43A24F841F5FFF0DA8DA74F88DF5F5938A6596CADF5329884C5212BFCDABEF525F9A0CEB2250A4
33,067,578 UART: Caliptra RT
33,068,296 UART: [state] CFI Enabled
33,201,482 UART: [rt] RT listening for mailbox commands...
33,203,355 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,233,695 UART: [rt]cmd =0x53574545, len=84
33,235,664 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,050 UART:
192,436 UART: Running Caliptra ROM ...
193,570 UART:
193,713 UART: [state] CFI Enabled
261,889 UART: [state] LifecycleState = Unprovisioned
263,814 UART: [state] DebugLocked = No
266,398 UART: [state] WD Timer not started. Device not locked for debugging
270,792 UART: [kat] SHA2-256
450,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,239 UART: [kat] ++
461,842 UART: [kat] sha1
472,576 UART: [kat] SHA2-256
475,308 UART: [kat] SHA2-384
480,933 UART: [kat] SHA2-512-ACC
483,292 UART: [kat] ECC-384
2,928,487 UART: [kat] HMAC-384Kdf
2,951,220 UART: [kat] LMS
3,427,669 UART: [kat] --
3,431,833 UART: [cold-reset] ++
3,432,769 UART: [fht] FHT @ 0x50003400
3,443,666 UART: [idev] ++
3,444,220 UART: [idev] CDI.KEYID = 6
3,445,175 UART: [idev] SUBJECT.KEYID = 7
3,446,411 UART: [idev] UDS.KEYID = 0
3,447,370 ready_for_fw is high
3,447,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,711 UART: [idev] Erasing UDS.KEYID = 0
5,966,225 UART: [idev] Sha1 KeyId Algorithm
5,989,432 UART: [idev] --
5,994,617 UART: [ldev] ++
5,995,191 UART: [ldev] CDI.KEYID = 6
5,996,070 UART: [ldev] SUBJECT.KEYID = 5
5,997,335 UART: [ldev] AUTHORITY.KEYID = 7
5,998,564 UART: [ldev] FE.KEYID = 1
6,038,386 UART: [ldev] Erasing FE.KEYID = 1
8,540,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,259,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,275,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,291,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,307,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,328,543 UART: [ldev] --
10,333,804 UART: [fwproc] Wait for Commands...
10,335,414 UART: [fwproc] Recv command 0x46574c44
10,337,394 UART: [fwproc] Recv'd Img size: 118548 bytes
13,823,018 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,902,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,975,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,303,463 >>> mbox cmd response: success
14,306,943 UART: [afmc] ++
14,307,569 UART: [afmc] CDI.KEYID = 6
14,308,646 UART: [afmc] SUBJECT.KEYID = 7
14,309,746 UART: [afmc] AUTHORITY.KEYID = 5
16,858,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,286 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,095 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,769 UART: [afmc] --
18,673,413 UART: [cold-reset] --
18,676,689 UART: [state] Locking Datavault
18,685,282 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,018 UART: [state] Locking ICCM
18,688,635 UART: [exit] Launching FMC @ 0x40000130
18,697,080 UART:
18,697,316 UART: Running Caliptra FMC ...
18,698,411 UART:
18,698,567 UART: [state] CFI Enabled
18,753,022 UART: [fht] FMC Alias Private Key: 7
20,519,079 UART: [art] Extend RT PCRs Done
20,520,299 UART: [art] Lock RT PCRs Done
20,521,970 UART: [art] Populate DV Done
20,527,420 UART: [fht] FMC Alias Private Key: 7
20,529,020 UART: [art] Derive CDI
20,529,837 UART: [art] Store in slot 0x4
20,585,842 UART: [art] Derive Key Pair
20,586,857 UART: [art] Store priv key in slot 0x5
23,049,885 UART: [art] Derive Key Pair - Done
23,063,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,309 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,804 UART: [art] PUB.X = 74FACF876E8BB72F89AF804C5A4C2DFEF4CB8B41750E2FD975EE07028D769A7D95268E358FE8092CC2188D49A21A101B
24,785,103 UART: [art] PUB.Y = E74F306E9738DB8348D9B1FAA327D7513F35768B24B25DA99349B91108A1DDCFF3169CC28F9B0041E28F3FDBE39426E7
24,792,331 UART: [art] SIG.R = 0C932A80B0E78D739E85D8824738F3F2ADC005BF35A9F3D7D40AD8778809F676CE56C44167564ED2B00D81FC7AF48FDB
24,799,711 UART: [art] SIG.S = 376488148E85153F34E8A5505D6D60D3622A22FC3B120838E1A311777D9E04179EE32E9D3DAE730D555D69AC050C6744
25,779,090 UART: Caliptra RT
25,779,791 UART: [state] CFI Enabled
25,960,355 UART: [rt] RT listening for mailbox commands...
25,962,388 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,992,920 UART: [rt]cmd =0x53574545, len=84
25,994,833 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,565 writing to cptra_bootfsm_go
3,460,338 ready_for_fw is high
3,460,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,815 >>> mbox cmd response: success
18,514,798 UART:
18,515,285 UART: Running Caliptra FMC ...
18,516,410 UART:
18,516,572 UART: [state] CFI Enabled
18,582,976 UART: [fht] FMC Alias Private Key: 7
20,371,314 UART: [art] Extend RT PCRs Done
20,372,533 UART: [art] Lock RT PCRs Done
20,374,324 UART: [art] Populate DV Done
20,379,629 UART: [fht] FMC Alias Private Key: 7
20,381,277 UART: [art] Derive CDI
20,382,091 UART: [art] Store in slot 0x4
20,437,061 UART: [art] Derive Key Pair
20,438,134 UART: [art] Store priv key in slot 0x5
22,900,519 UART: [art] Derive Key Pair - Done
22,913,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,089 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,611 UART: [art] PUB.X = 6F1950C6114E91506A49368B0B42D7EE0B657B6B28C862E94A6B6F04DA937C2005E9F5895D4F1B5989BD2793EEED0516
24,634,870 UART: [art] PUB.Y = AD3F7C769EB7E5D43E866D08065A560654B9E15DF0A77A128D7128EC001D16E8ECAB054BAB202E44CCBC360B79EDDB6D
24,642,131 UART: [art] SIG.R = FE56B3426B476F3588B9988AFA427CAB4E3B02708681AE784EA33BD5E5BFE8C8C011C41E541A8C259695789C4B4C4F54
24,649,489 UART: [art] SIG.S = 382A9AB0998960EA82D8F1DC68DFD0FB668E8E6306074975F35C91BF0F20297E570C913CFC4FC1DC0A77C222AB8C6C27
25,628,145 UART: Caliptra RT
25,628,872 UART: [state] CFI Enabled
25,809,341 UART: [rt] RT listening for mailbox commands...
25,811,229 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,841,704 UART: [rt]cmd =0x53574545, len=84
25,843,750 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,435 UART:
192,815 UART: Running Caliptra ROM ...
193,908 UART:
603,663 UART: [state] CFI Enabled
615,919 UART: [state] LifecycleState = Unprovisioned
617,836 UART: [state] DebugLocked = No
619,467 UART: [state] WD Timer not started. Device not locked for debugging
624,127 UART: [kat] SHA2-256
803,739 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,501 UART: [kat] ++
815,023 UART: [kat] sha1
825,551 UART: [kat] SHA2-256
828,279 UART: [kat] SHA2-384
833,353 UART: [kat] SHA2-512-ACC
835,752 UART: [kat] ECC-384
3,278,260 UART: [kat] HMAC-384Kdf
3,290,570 UART: [kat] LMS
3,767,077 UART: [kat] --
3,770,361 UART: [cold-reset] ++
3,772,465 UART: [fht] FHT @ 0x50003400
3,783,590 UART: [idev] ++
3,784,153 UART: [idev] CDI.KEYID = 6
3,785,140 UART: [idev] SUBJECT.KEYID = 7
3,786,314 UART: [idev] UDS.KEYID = 0
3,787,363 ready_for_fw is high
3,787,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,528 UART: [idev] Erasing UDS.KEYID = 0
6,261,619 UART: [idev] Sha1 KeyId Algorithm
6,283,981 UART: [idev] --
6,288,620 UART: [ldev] ++
6,289,206 UART: [ldev] CDI.KEYID = 6
6,290,096 UART: [ldev] SUBJECT.KEYID = 5
6,291,313 UART: [ldev] AUTHORITY.KEYID = 7
6,292,604 UART: [ldev] FE.KEYID = 1
6,302,442 UART: [ldev] Erasing FE.KEYID = 1
8,787,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,011 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,075 UART: [ldev] --
10,578,539 UART: [fwproc] Wait for Commands...
10,581,787 UART: [fwproc] Recv command 0x46574c44
10,583,876 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,260 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,282 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,859 >>> mbox cmd response: success
14,549,299 UART: [afmc] ++
14,549,890 UART: [afmc] CDI.KEYID = 6
14,550,778 UART: [afmc] SUBJECT.KEYID = 7
14,552,045 UART: [afmc] AUTHORITY.KEYID = 5
17,061,712 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,802,201 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,818,273 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,833,830 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,892 UART: [afmc] --
18,860,841 UART: [cold-reset] --
18,864,003 UART: [state] Locking Datavault
18,869,096 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,880 UART: [state] Locking ICCM
18,873,358 UART: [exit] Launching FMC @ 0x40000130
18,881,758 UART:
18,881,992 UART: Running Caliptra FMC ...
18,883,093 UART:
18,883,267 UART: [state] CFI Enabled
18,891,059 UART: [fht] FMC Alias Private Key: 7
20,657,259 UART: [art] Extend RT PCRs Done
20,658,481 UART: [art] Lock RT PCRs Done
20,660,117 UART: [art] Populate DV Done
20,665,854 UART: [fht] FMC Alias Private Key: 7
20,667,394 UART: [art] Derive CDI
20,668,207 UART: [art] Store in slot 0x4
20,711,019 UART: [art] Derive Key Pair
20,712,025 UART: [art] Store priv key in slot 0x5
23,139,094 UART: [art] Derive Key Pair - Done
23,151,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,271 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,756 UART: [art] PUB.X = 64D2111B27B162D7CC1333E48F609FBF3922F379DA7F5730B398E97C55399A57A25E5F76D2240692480CEF4B2BF3DB74
24,867,006 UART: [art] PUB.Y = 5B162D88C6FF6118553B9B86E5F7F3DCD94A91AE39F04F2069FBA49C1A60014226E52776BF8F067283482B0337B1CB68
24,874,245 UART: [art] SIG.R = 2ADA8F7FA1C2F5FFAFA3CA06DA5A8DC1D107CC5C71B0727DAEF01D89E138DAD96156399F4ADAA2C107E604A5E368BFC0
24,881,695 UART: [art] SIG.S = 6130248DACAE2C611ABD0D2F596F19956E243AEE844486D155571AF3CC2FEF9657174C77C003552181A151994F8DCCD3
25,860,086 UART: Caliptra RT
25,860,801 UART: [state] CFI Enabled
25,994,287 UART: [rt] RT listening for mailbox commands...
25,996,164 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,026,414 UART: [rt]cmd =0x53574545, len=84
26,028,210 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
3,782,771 ready_for_fw is high
3,783,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,441,956 >>> mbox cmd response: success
18,697,803 UART:
18,698,187 UART: Running Caliptra FMC ...
18,699,323 UART:
18,699,479 UART: [state] CFI Enabled
18,707,156 UART: [fht] FMC Alias Private Key: 7
20,473,791 UART: [art] Extend RT PCRs Done
20,475,018 UART: [art] Lock RT PCRs Done
20,476,463 UART: [art] Populate DV Done
20,482,001 UART: [fht] FMC Alias Private Key: 7
20,483,505 UART: [art] Derive CDI
20,484,248 UART: [art] Store in slot 0x4
20,527,276 UART: [art] Derive Key Pair
20,528,275 UART: [art] Store priv key in slot 0x5
22,955,178 UART: [art] Derive Key Pair - Done
22,967,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,102 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,606 UART: [art] PUB.X = D6CFE04B94C00771AC2E4587D4CBB27B84C61A898E95D2E16F4857CF3E5B918D11F9826CC97EBB67535E48F23440CFB8
24,682,868 UART: [art] PUB.Y = C8AD25D96BDD3547B72EEE966D92F999578DCE5EBF735FFFEBE1038B843C750985BA29E1160D13E4DB0019071BB1D0A6
24,690,150 UART: [art] SIG.R = 8DC54218118E2E137C347D3A5A9E48DAD196E8839914C863FF7A70D92DCC779082DABF0F9CDCDA95A91253FED846204C
24,697,572 UART: [art] SIG.S = A701AA5AE566408548FE812FE57A0F4D93418DD417D45B99993969CD5B5A2E24D6043B09DC0D70AC09B0545AFCCC4F26
25,676,754 UART: Caliptra RT
25,677,464 UART: [state] CFI Enabled
25,810,834 UART: [rt] RT listening for mailbox commands...
25,812,723 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,843,197 UART: [rt]cmd =0x53574545, len=84
25,844,768 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
192,098 UART:
192,472 UART: Running Caliptra ROM ...
193,605 UART:
193,751 UART: [state] CFI Enabled
265,530 UART: [state] LifecycleState = Unprovisioned
267,881 UART: [state] DebugLocked = No
270,625 UART: [state] WD Timer not started. Device not locked for debugging
274,724 UART: [kat] SHA2-256
464,627 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,363 UART: [kat] ++
475,834 UART: [kat] sha1
488,219 UART: [kat] SHA2-256
491,197 UART: [kat] SHA2-384
497,261 UART: [kat] SHA2-512-ACC
499,847 UART: [kat] ECC-384
2,948,287 UART: [kat] HMAC-384Kdf
2,971,693 UART: [kat] LMS
3,503,482 UART: [kat] --
3,508,684 UART: [cold-reset] ++
3,510,540 UART: [fht] FHT @ 0x50003400
3,522,099 UART: [idev] ++
3,522,818 UART: [idev] CDI.KEYID = 6
3,523,702 UART: [idev] SUBJECT.KEYID = 7
3,524,998 UART: [idev] UDS.KEYID = 0
3,525,995 ready_for_fw is high
3,526,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,180 UART: [idev] Erasing UDS.KEYID = 0
6,029,277 UART: [idev] Sha1 KeyId Algorithm
6,051,017 UART: [idev] --
6,054,535 UART: [ldev] ++
6,055,224 UART: [ldev] CDI.KEYID = 6
6,056,107 UART: [ldev] SUBJECT.KEYID = 5
6,057,321 UART: [ldev] AUTHORITY.KEYID = 7
6,058,451 UART: [ldev] FE.KEYID = 1
6,100,376 UART: [ldev] Erasing FE.KEYID = 1
8,607,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,042 UART: [ldev] --
10,414,132 UART: [fwproc] Wait for Commands...
10,415,851 UART: [fwproc] Recv command 0x46574c44
10,418,105 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,871 >>> mbox cmd response: success
14,680,644 UART: [afmc] ++
14,681,365 UART: [afmc] CDI.KEYID = 6
14,682,534 UART: [afmc] SUBJECT.KEYID = 7
14,684,022 UART: [afmc] AUTHORITY.KEYID = 5
17,215,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,405 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,313 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,413 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,568 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,436 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,773 UART: [afmc] --
19,031,906 UART: [cold-reset] --
19,035,933 UART: [state] Locking Datavault
19,042,272 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,622 UART: [state] Locking ICCM
19,046,412 UART: [exit] Launching FMC @ 0x40000130
19,055,045 UART:
19,055,285 UART: Running Caliptra FMC ...
19,056,386 UART:
19,056,545 UART: [state] CFI Enabled
19,116,001 UART: [fht] FMC Alias Private Key: 7
20,904,097 UART: [art] Extend RT PCRs Done
20,905,320 UART: [art] Lock RT PCRs Done
20,906,966 UART: [art] Populate DV Done
20,912,427 UART: [fht] FMC Alias Private Key: 7
20,913,957 UART: [art] Derive CDI
20,914,764 UART: [art] Store in slot 0x4
20,969,916 UART: [art] Derive Key Pair
20,970,950 UART: [art] Store priv key in slot 0x5
23,433,889 UART: [art] Derive Key Pair - Done
23,446,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,019 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,528 UART: [art] PUB.X = C3D7D0196B61564EED82BC1769948515846CFB0ED7CF827ED235DC51BAC0BA4618677339170192469C508FB1AAA18F57
25,168,792 UART: [art] PUB.Y = 4A67D454AC57DB00269B875751C23ECE67B4B45FB2A533DBFBF6D348439F75009A9D68640851E9E3FF7E7A2BEA4CD3C2
25,176,028 UART: [art] SIG.R = 1634FD2A9B80EF4036CE2C98129992C32C4BC1478D7AAF44A54EB10B280EDAC48E7E420960B97C4B7A0DF42ED1A1357C
25,183,430 UART: [art] SIG.S = E827B6FD948E623A197329378B3066AEBD151377CA01CD24D460D749A4FAA2B3E96A6BB3DCD6A0E0B3274A18088AD529
26,162,167 UART: Caliptra RT
26,162,876 UART: [state] CFI Enabled
26,344,062 UART: [rt] RT listening for mailbox commands...
26,345,957 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,376,524 UART: [rt]cmd =0x53574545, len=84
26,378,448 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,437,754 ready_for_fw is high
3,438,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,684 >>> mbox cmd response: success
19,133,480 UART:
19,133,873 UART: Running Caliptra FMC ...
19,135,067 UART:
19,135,238 UART: [state] CFI Enabled
19,202,134 UART: [fht] FMC Alias Private Key: 7
20,968,588 UART: [art] Extend RT PCRs Done
20,969,816 UART: [art] Lock RT PCRs Done
20,971,178 UART: [art] Populate DV Done
20,976,441 UART: [fht] FMC Alias Private Key: 7
20,978,056 UART: [art] Derive CDI
20,978,892 UART: [art] Store in slot 0x4
21,035,130 UART: [art] Derive Key Pair
21,036,171 UART: [art] Store priv key in slot 0x5
23,499,022 UART: [art] Derive Key Pair - Done
23,511,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,015 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,525 UART: [art] PUB.X = F4EAC77A65D6B61307BB6DB4F5B576C9284B39183FFAE08C608E4D3AAF81BC40A7398078CF65866DF7440E2E074F84E5
25,233,789 UART: [art] PUB.Y = A1D18F333ACEE56ACA81F496DC16520597D1AB34D7B3239BAE5723DD7AF8BCF820BD1B360823DC1319D773E86D2EF31D
25,241,062 UART: [art] SIG.R = 7A9FF99F1E244CFC59E73D391966B4A88C8F5E3BB58B5656919B6D842CF089E899282B59D0786FCADF438901491723C7
25,248,451 UART: [art] SIG.S = 195D01BC779D55ABCF0AC1F4C0C0F1DE19A0F847B6B691B7E82CE2FA55C22E561CDEC4FE4B79D8FDA99CDE43F69658E9
26,227,100 UART: Caliptra RT
26,227,813 UART: [state] CFI Enabled
26,409,518 UART: [rt] RT listening for mailbox commands...
26,411,409 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,442,199 UART: [rt]cmd =0x53574545, len=84
26,444,033 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
192,586 UART:
192,946 UART: Running Caliptra ROM ...
194,150 UART:
603,660 UART: [state] CFI Enabled
616,347 UART: [state] LifecycleState = Unprovisioned
618,715 UART: [state] DebugLocked = No
620,987 UART: [state] WD Timer not started. Device not locked for debugging
626,261 UART: [kat] SHA2-256
816,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,972 UART: [kat] ++
827,418 UART: [kat] sha1
839,357 UART: [kat] SHA2-256
842,366 UART: [kat] SHA2-384
849,635 UART: [kat] SHA2-512-ACC
852,220 UART: [kat] ECC-384
3,291,863 UART: [kat] HMAC-384Kdf
3,304,390 UART: [kat] LMS
3,836,210 UART: [kat] --
3,839,563 UART: [cold-reset] ++
3,841,221 UART: [fht] FHT @ 0x50003400
3,853,626 UART: [idev] ++
3,854,339 UART: [idev] CDI.KEYID = 6
3,855,281 UART: [idev] SUBJECT.KEYID = 7
3,856,461 UART: [idev] UDS.KEYID = 0
3,857,397 ready_for_fw is high
3,857,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,538 UART: [idev] Erasing UDS.KEYID = 0
6,333,133 UART: [idev] Sha1 KeyId Algorithm
6,356,204 UART: [idev] --
6,360,581 UART: [ldev] ++
6,361,265 UART: [ldev] CDI.KEYID = 6
6,362,231 UART: [ldev] SUBJECT.KEYID = 5
6,363,390 UART: [ldev] AUTHORITY.KEYID = 7
6,364,626 UART: [ldev] FE.KEYID = 1
6,376,247 UART: [ldev] Erasing FE.KEYID = 1
8,855,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,849 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,509 UART: [ldev] --
10,644,881 UART: [fwproc] Wait for Commands...
10,647,297 UART: [fwproc] Recv command 0x46574c44
10,649,606 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,092 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,911,730 >>> mbox cmd response: success
14,916,253 UART: [afmc] ++
14,916,980 UART: [afmc] CDI.KEYID = 6
14,918,178 UART: [afmc] SUBJECT.KEYID = 7
14,919,626 UART: [afmc] AUTHORITY.KEYID = 5
17,425,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,467 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,220,328 UART: [afmc] --
19,224,250 UART: [cold-reset] --
19,228,505 UART: [state] Locking Datavault
19,232,536 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,706 UART: [state] Locking ICCM
19,237,415 UART: [exit] Launching FMC @ 0x40000130
19,246,054 UART:
19,246,291 UART: Running Caliptra FMC ...
19,247,400 UART:
19,247,559 UART: [state] CFI Enabled
19,255,772 UART: [fht] FMC Alias Private Key: 7
21,022,271 UART: [art] Extend RT PCRs Done
21,023,518 UART: [art] Lock RT PCRs Done
21,025,210 UART: [art] Populate DV Done
21,030,686 UART: [fht] FMC Alias Private Key: 7
21,032,287 UART: [art] Derive CDI
21,033,110 UART: [art] Store in slot 0x4
21,076,085 UART: [art] Derive Key Pair
21,077,097 UART: [art] Store priv key in slot 0x5
23,503,979 UART: [art] Derive Key Pair - Done
23,516,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,780 UART: [art] PUB.X = E7AB1929AAA2C0F67F295E1197FA6B24E608988FDFCA8083F55E092F8FFC5573867A2519DDB3E31AFCADC4739FC4D282
25,232,063 UART: [art] PUB.Y = F4D22855E95D14E6D386717BEED184A7784F103883EFDDF87ADF11C8A7096E6EB48985824B07780766BAF9D10ECE8AE1
25,239,323 UART: [art] SIG.R = A9E6EDB7822D32D5251694E868A0DD9092A7187C054F27D9B78FF62B1D9CF7BC051065D9ABBF506315A5D33D1947D5A9
25,246,748 UART: [art] SIG.S = 2B6C73A6E348E914D341E92E2122E9A78A6B50E9352E9EB2AC7DE6F8D1C3430F85B9AA943D572C235D3C6E3262F38E7D
26,225,581 UART: Caliptra RT
26,226,286 UART: [state] CFI Enabled
26,359,302 UART: [rt] RT listening for mailbox commands...
26,361,196 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,391,724 UART: [rt]cmd =0x53574545, len=84
26,393,463 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,759,811 ready_for_fw is high
3,760,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,946 >>> mbox cmd response: success
19,315,427 UART:
19,315,820 UART: Running Caliptra FMC ...
19,316,963 UART:
19,317,126 UART: [state] CFI Enabled
19,324,909 UART: [fht] FMC Alias Private Key: 7
21,091,284 UART: [art] Extend RT PCRs Done
21,092,525 UART: [art] Lock RT PCRs Done
21,094,137 UART: [art] Populate DV Done
21,099,194 UART: [fht] FMC Alias Private Key: 7
21,100,854 UART: [art] Derive CDI
21,101,679 UART: [art] Store in slot 0x4
21,144,340 UART: [art] Derive Key Pair
21,145,386 UART: [art] Store priv key in slot 0x5
23,572,394 UART: [art] Derive Key Pair - Done
23,585,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,719 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,243 UART: [art] PUB.X = B78C1FD6D021AE086428DD878E4007E224F3969BF4499EC88EA4AC87379037CAFD20BE469B9DF2515C9BD10A433D6A65
25,300,520 UART: [art] PUB.Y = AA974ECD9DA08245AB194B81591595F4B33CA75EB1A1215840D75AC635374C7B892F5317A42792482447DF3E5D2A86D6
25,307,743 UART: [art] SIG.R = A8558446983126A794A65D28771461A7727B30983E303AE6802B86234D7FE8061659DE2232FBE38CAADE73E316C5B9BD
25,315,125 UART: [art] SIG.S = B276F7D7D9EFD264FAD27FBF1C99BABAE4B4552B52D43CFD91E059776C7B9B7989F420F81611A5C83436D0FF155E16F8
26,293,973 UART: Caliptra RT
26,294,668 UART: [state] CFI Enabled
26,427,515 UART: [rt] RT listening for mailbox commands...
26,429,426 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,459,956 UART: [rt]cmd =0x53574545, len=84
26,461,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,931 UART: [kat] SHA2-256
881,862 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,977 UART: [kat] ++
886,129 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
894,876 UART: [kat] SHA2-512-ACC
896,777 UART: [kat] ECC-384
902,298 UART: [kat] HMAC-384Kdf
906,934 UART: [kat] LMS
1,475,130 UART: [kat] --
1,475,985 UART: [cold-reset] ++
1,476,451 UART: [fht] Storing FHT @ 0x50003400
1,479,230 UART: [idev] ++
1,479,398 UART: [idev] CDI.KEYID = 6
1,479,758 UART: [idev] SUBJECT.KEYID = 7
1,480,182 UART: [idev] UDS.KEYID = 0
1,480,527 ready_for_fw is high
1,480,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,200 UART: [idev] Erasing UDS.KEYID = 0
1,504,560 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,186 UART: [idev] --
1,514,083 UART: [ldev] ++
1,514,251 UART: [ldev] CDI.KEYID = 6
1,514,614 UART: [ldev] SUBJECT.KEYID = 5
1,515,040 UART: [ldev] AUTHORITY.KEYID = 7
1,515,503 UART: [ldev] FE.KEYID = 1
1,520,381 UART: [ldev] Erasing FE.KEYID = 1
1,545,412 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,300 UART: [ldev] --
1,584,803 UART: [fwproc] Waiting for Commands...
1,585,526 UART: [fwproc] Received command 0x46574c44
1,586,317 UART: [fwproc] Received Image of size 118548 bytes
2,931,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,593 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,806 >>> mbox cmd response: success
3,131,958 UART: [afmc] ++
3,132,126 UART: [afmc] CDI.KEYID = 6
3,132,488 UART: [afmc] SUBJECT.KEYID = 7
3,132,913 UART: [afmc] AUTHORITY.KEYID = 5
3,167,406 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,516 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,005 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,888 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,571 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,531 UART: [afmc] --
3,210,577 UART: [cold-reset] --
3,211,577 UART: [state] Locking Datavault
3,212,798 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,402 UART: [state] Locking ICCM
3,213,942 UART: [exit] Launching FMC @ 0x40000130
3,219,272 UART:
3,219,288 UART: Running Caliptra FMC ...
3,219,696 UART:
3,219,750 UART: [state] CFI Enabled
3,230,276 UART: [fht] FMC Alias Private Key: 7
3,349,416 UART: [art] Extend RT PCRs Done
3,349,844 UART: [art] Lock RT PCRs Done
3,351,546 UART: [art] Populate DV Done
3,359,603 UART: [fht] FMC Alias Private Key: 7
3,360,651 UART: [art] Derive CDI
3,360,931 UART: [art] Store in slot 0x4
3,446,737 UART: [art] Derive Key Pair
3,447,097 UART: [art] Store priv key in slot 0x5
3,460,552 UART: [art] Derive Key Pair - Done
3,475,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,379 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,144 UART: [art] PUB.X = 535C88987460FAD153667937B01C7637DC4D0C1FDA33B506DF975B0A6D45A0B7941F417A744361AAB2652CAE01B4800C
3,497,899 UART: [art] PUB.Y = E391DE394F75DED78FFE6BBD6DB18375ED2872A6A8D32B97ADA628F54DC2E242D1C00CE1666597FE86D0BE0E455CF2E0
3,504,863 UART: [art] SIG.R = 7AF7AF716A03B1D075B62ACBFC2D46C42770F2D72F49F8B69C159A6EF1B7136B4D0DA64DC59134F8CB54B86B4D7C4945
3,511,641 UART: [art] SIG.S = 29696B93190ACF1E64576BB5462CADA5AEFFEE78AB10D93055F5F79CE10AF6C452769BA31341FDFADD3B1DC41F0DCE1A
3,536,158 UART: Caliptra RT
3,536,409 UART: [state] CFI Enabled
3,656,833 UART: [rt] RT listening for mailbox commands...
3,657,503 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,153 UART: [rt]cmd =0x53574545, len=84
3,689,338 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 ready_for_fw is high
1,362,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,444 >>> mbox cmd response: success
3,042,415 UART:
3,042,431 UART: Running Caliptra FMC ...
3,042,839 UART:
3,042,893 UART: [state] CFI Enabled
3,053,365 UART: [fht] FMC Alias Private Key: 7
3,172,111 UART: [art] Extend RT PCRs Done
3,172,539 UART: [art] Lock RT PCRs Done
3,174,035 UART: [art] Populate DV Done
3,182,474 UART: [fht] FMC Alias Private Key: 7
3,183,600 UART: [art] Derive CDI
3,183,880 UART: [art] Store in slot 0x4
3,269,788 UART: [art] Derive Key Pair
3,270,148 UART: [art] Store priv key in slot 0x5
3,282,943 UART: [art] Derive Key Pair - Done
3,297,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,682 UART: [art] PUB.X = 5F6B5F48BCD4BFDE6EA654E0BD96CCA31280055058443C2D68C636F3258CE7E869D8C4220B866F45E377DA0D9138D3F1
3,320,451 UART: [art] PUB.Y = F63998B5B313E2041D077E23D81B4E358E6C89C04D2AA8F42D86D508F0C9E3E01601FA5C2E0111C6CDA459DCFCC99F25
3,327,396 UART: [art] SIG.R = 49E11060DFF14099F81DA66AE26983F233E2CADF544E082650A0901DC91C5BF8EC1380BB7C87B43F4DE46E4DF745E8F5
3,334,173 UART: [art] SIG.S = 080F2F6DE0986EC6F24CE8C7E634047BD5E7D2C903DE7BC3CF3CA45078B64237BE686C453BF2764479201292E0747529
3,357,969 UART: Caliptra RT
3,358,220 UART: [state] CFI Enabled
3,477,736 UART: [rt] RT listening for mailbox commands...
3,478,406 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,666 UART: [rt]cmd =0x53574545, len=84
3,510,127 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,428 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,134 UART: [kat] SHA2-256
882,065 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,180 UART: [kat] ++
886,332 UART: [kat] sha1
890,608 UART: [kat] SHA2-256
892,546 UART: [kat] SHA2-384
895,413 UART: [kat] SHA2-512-ACC
897,314 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,731 UART: [kat] LMS
1,475,927 UART: [kat] --
1,476,526 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,693 UART: [idev] ++
1,479,861 UART: [idev] CDI.KEYID = 6
1,480,221 UART: [idev] SUBJECT.KEYID = 7
1,480,645 UART: [idev] UDS.KEYID = 0
1,480,990 ready_for_fw is high
1,480,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,959 UART: [idev] Erasing UDS.KEYID = 0
1,506,071 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,523 UART: [idev] --
1,515,724 UART: [ldev] ++
1,515,892 UART: [ldev] CDI.KEYID = 6
1,516,255 UART: [ldev] SUBJECT.KEYID = 5
1,516,681 UART: [ldev] AUTHORITY.KEYID = 7
1,517,144 UART: [ldev] FE.KEYID = 1
1,522,572 UART: [ldev] Erasing FE.KEYID = 1
1,547,839 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,437 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,655 UART: [ldev] --
1,586,982 UART: [fwproc] Waiting for Commands...
1,587,777 UART: [fwproc] Received command 0x46574c44
1,588,568 UART: [fwproc] Received Image of size 118548 bytes
2,933,360 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,618 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,095 >>> mbox cmd response: success
3,133,271 UART: [afmc] ++
3,133,439 UART: [afmc] CDI.KEYID = 6
3,133,801 UART: [afmc] SUBJECT.KEYID = 7
3,134,226 UART: [afmc] AUTHORITY.KEYID = 5
3,170,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,994 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,877 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,560 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,448 UART: [afmc] --
3,213,410 UART: [cold-reset] --
3,214,114 UART: [state] Locking Datavault
3,215,241 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,845 UART: [state] Locking ICCM
3,216,477 UART: [exit] Launching FMC @ 0x40000130
3,221,807 UART:
3,221,823 UART: Running Caliptra FMC ...
3,222,231 UART:
3,222,374 UART: [state] CFI Enabled
3,232,950 UART: [fht] FMC Alias Private Key: 7
3,352,464 UART: [art] Extend RT PCRs Done
3,352,892 UART: [art] Lock RT PCRs Done
3,354,148 UART: [art] Populate DV Done
3,362,453 UART: [fht] FMC Alias Private Key: 7
3,363,535 UART: [art] Derive CDI
3,363,815 UART: [art] Store in slot 0x4
3,449,515 UART: [art] Derive Key Pair
3,449,875 UART: [art] Store priv key in slot 0x5
3,463,660 UART: [art] Derive Key Pair - Done
3,478,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,374 UART: [art] PUB.X = F8BA05D952A5C211550D202DCF9A45B373299004B0B35EC2E32BDBA0A2D1434495AA4DC0D024AEFA436789F4EE93DC8D
3,501,149 UART: [art] PUB.Y = 94F20E2C0612E834E6E23174226728059B205105E821A8DD1225397060274E86673E5C1E8E5E1E4B1107D245339E5FDF
3,508,070 UART: [art] SIG.R = 41EBE86BDF8621FD10520991E3012AD1DFCB99D2EB69EB523FB87DBC1662959079E959C58164DACCC45732F9E84D3EFB
3,514,848 UART: [art] SIG.S = F8027A36C2EE651D6D9F37318F80F3099A9A2977EF35D250FDA333FCDF87C22F36DA7F529741A67D2A429EF893CF006B
3,539,084 UART: Caliptra RT
3,539,427 UART: [state] CFI Enabled
3,658,268 UART: [rt] RT listening for mailbox commands...
3,658,938 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,464 UART: [rt]cmd =0x53574545, len=84
3,690,889 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 ready_for_fw is high
1,363,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,687 >>> mbox cmd response: success
3,043,102 UART:
3,043,118 UART: Running Caliptra FMC ...
3,043,526 UART:
3,043,669 UART: [state] CFI Enabled
3,054,389 UART: [fht] FMC Alias Private Key: 7
3,173,819 UART: [art] Extend RT PCRs Done
3,174,247 UART: [art] Lock RT PCRs Done
3,175,979 UART: [art] Populate DV Done
3,184,160 UART: [fht] FMC Alias Private Key: 7
3,185,294 UART: [art] Derive CDI
3,185,574 UART: [art] Store in slot 0x4
3,271,058 UART: [art] Derive Key Pair
3,271,418 UART: [art] Store priv key in slot 0x5
3,284,561 UART: [art] Derive Key Pair - Done
3,299,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,499 UART: [art] PUB.X = 65D6FD6A6D4823AAB77FB20A50C942B59EC797677BB0928A9B6A4D423C9D26CDD9A1230B586E93E8390E3B1BE282EADA
3,322,274 UART: [art] PUB.Y = 6CBD4A46275545A5565432C63A1A3ECD5DCA00B069B2A3E0711638666E77748FFEFAFE8FDDA538337C0A1C18CB75A0C5
3,329,211 UART: [art] SIG.R = EC8FF35A8D8228D1269F13A1D85B37F204AC8F80ED802B28321C4865D4B6AE66A2BF3CDD87858EB4FDD3270A43CF858B
3,335,989 UART: [art] SIG.S = 2A6C0B9FD4BCB0835C0724C3DE207252AC69A8FC9B130D8E74AD841BC8F6FC3BA70BDAE09CBA8A1FFAFCCCBD97F630C4
3,359,771 UART: Caliptra RT
3,360,114 UART: [state] CFI Enabled
3,479,673 UART: [rt] RT listening for mailbox commands...
3,480,343 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,639 UART: [rt]cmd =0x53574545, len=84
3,512,070 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,439 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
916,047 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,140 UART: [cold-reset] ++
1,170,494 UART: [fht] FHT @ 0x50003400
1,173,006 UART: [idev] ++
1,173,174 UART: [idev] CDI.KEYID = 6
1,173,535 UART: [idev] SUBJECT.KEYID = 7
1,173,960 UART: [idev] UDS.KEYID = 0
1,174,306 ready_for_fw is high
1,174,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,119 UART: [idev] Erasing UDS.KEYID = 0
1,198,691 UART: [idev] Sha1 KeyId Algorithm
1,207,607 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,226 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,078 UART: [ldev] --
1,281,447 UART: [fwproc] Wait for Commands...
1,282,226 UART: [fwproc] Recv command 0x46574c44
1,282,959 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,301 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,813 >>> mbox cmd response: success
2,826,975 UART: [afmc] ++
2,827,143 UART: [afmc] CDI.KEYID = 6
2,827,506 UART: [afmc] SUBJECT.KEYID = 7
2,827,932 UART: [afmc] AUTHORITY.KEYID = 5
2,863,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,712 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,461 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,171 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,052 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,753 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,520 UART: [afmc] --
2,906,451 UART: [cold-reset] --
2,907,359 UART: [state] Locking Datavault
2,908,266 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,870 UART: [state] Locking ICCM
2,909,518 UART: [exit] Launching FMC @ 0x40000130
2,914,848 UART:
2,914,864 UART: Running Caliptra FMC ...
2,915,272 UART:
2,915,326 UART: [state] CFI Enabled
2,925,834 UART: [fht] FMC Alias Private Key: 7
3,044,556 UART: [art] Extend RT PCRs Done
3,044,984 UART: [art] Lock RT PCRs Done
3,046,448 UART: [art] Populate DV Done
3,054,547 UART: [fht] FMC Alias Private Key: 7
3,055,681 UART: [art] Derive CDI
3,055,961 UART: [art] Store in slot 0x4
3,141,706 UART: [art] Derive Key Pair
3,142,066 UART: [art] Store priv key in slot 0x5
3,154,964 UART: [art] Derive Key Pair - Done
3,169,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,856 UART: [art] PUB.X = AF45DAFF64CBC1DEA67C66A7AC08400BA4C8424ACA6BB6322B8878128EA2FDA30EA396C10F7EEA7CA38A34355F062DE9
3,192,635 UART: [art] PUB.Y = FB16435EC6B5326F68C18EB15FF5EBB11143B9D7939B153C6A1FEB1F2729F99115FB461C628E4DAB3201A662F6B95AE3
3,199,592 UART: [art] SIG.R = E87E2101A195825784382E3A68366643A6E12EB4B6BB034F95BB18572FADEFA45D491ADBC8EF5A1F1C60D7E70EDB990A
3,206,362 UART: [art] SIG.S = 9A12AFA179564701D8F786FE1E889D0ECC56D6130CF351EF0BC5305BA944C8BAF3D62084548556905F017FBE51ED434A
3,229,879 UART: Caliptra RT
3,230,130 UART: [state] CFI Enabled
3,348,981 UART: [rt] RT listening for mailbox commands...
3,349,651 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,209 UART: [rt]cmd =0x53574545, len=84
3,381,710 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,848 ready_for_fw is high
1,059,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,270 >>> mbox cmd response: success
2,741,567 UART:
2,741,583 UART: Running Caliptra FMC ...
2,741,991 UART:
2,742,045 UART: [state] CFI Enabled
2,752,521 UART: [fht] FMC Alias Private Key: 7
2,871,369 UART: [art] Extend RT PCRs Done
2,871,797 UART: [art] Lock RT PCRs Done
2,873,445 UART: [art] Populate DV Done
2,881,972 UART: [fht] FMC Alias Private Key: 7
2,882,974 UART: [art] Derive CDI
2,883,254 UART: [art] Store in slot 0x4
2,968,957 UART: [art] Derive Key Pair
2,969,317 UART: [art] Store priv key in slot 0x5
2,982,529 UART: [art] Derive Key Pair - Done
2,997,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,035 UART: [art] PUB.X = D452638A1B98604D3C48755FEDFCBD203ED20E731A4873A76CA2C1682FCFA24CA1CB679B05D83FC10AC977B77124D2D5
3,019,808 UART: [art] PUB.Y = 8E5C55A420BA57919A8822EC7B361BF0B7B86B052223D90E16FC1B92E0762BBADD7C2A617438868573E2985EECBCFC9D
3,026,762 UART: [art] SIG.R = 7B4508750738BFD578D05BC034D71D969D476A510C422E3BC18B334834A1F1C47C12947804EFFFB0C6314F627C0F5C29
3,033,515 UART: [art] SIG.S = 8F9F487625B35DA75F2C6E706A01A3D300D5C34BAD6A778F63A65FD4B958772F4493AD6267EA00621632DE70076B45C1
3,056,779 UART: Caliptra RT
3,057,030 UART: [state] CFI Enabled
3,176,738 UART: [rt] RT listening for mailbox commands...
3,177,408 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,648 UART: [rt]cmd =0x53574545, len=84
3,208,873 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,728 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,021 UART: [kat] SHA2-256
901,961 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,092 UART: [kat] HMAC-384Kdf
920,798 UART: [kat] LMS
1,169,110 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,247 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 ready_for_fw is high
1,174,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,016 UART: [idev] Sha1 KeyId Algorithm
1,207,734 UART: [idev] --
1,208,839 UART: [ldev] ++
1,209,007 UART: [ldev] CDI.KEYID = 6
1,209,371 UART: [ldev] SUBJECT.KEYID = 5
1,209,798 UART: [ldev] AUTHORITY.KEYID = 7
1,210,261 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,937 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,087 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,410 >>> mbox cmd response: success
2,826,540 UART: [afmc] ++
2,826,708 UART: [afmc] CDI.KEYID = 6
2,827,071 UART: [afmc] SUBJECT.KEYID = 7
2,827,497 UART: [afmc] AUTHORITY.KEYID = 5
2,863,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,869 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,328 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,209 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,910 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,637 UART: [afmc] --
2,906,622 UART: [cold-reset] --
2,907,166 UART: [state] Locking Datavault
2,908,399 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,003 UART: [state] Locking ICCM
2,909,533 UART: [exit] Launching FMC @ 0x40000130
2,914,863 UART:
2,914,879 UART: Running Caliptra FMC ...
2,915,287 UART:
2,915,430 UART: [state] CFI Enabled
2,925,760 UART: [fht] FMC Alias Private Key: 7
3,044,888 UART: [art] Extend RT PCRs Done
3,045,316 UART: [art] Lock RT PCRs Done
3,046,930 UART: [art] Populate DV Done
3,055,069 UART: [fht] FMC Alias Private Key: 7
3,056,139 UART: [art] Derive CDI
3,056,419 UART: [art] Store in slot 0x4
3,142,440 UART: [art] Derive Key Pair
3,142,800 UART: [art] Store priv key in slot 0x5
3,155,740 UART: [art] Derive Key Pair - Done
3,170,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,098 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,863 UART: [art] PUB.X = EBF5B7AD26618CE227D9AEA099A58CDC7FA4F7CA5817406EFB73EE3A6D66E2E2AAF7112BC48D8D6F64C16685D68BA238
3,193,655 UART: [art] PUB.Y = 07031E6C9A229A4F5167CA50F8675F3AB05DA2759A8879CAE4E6E408562264C4DA0879DC67C36787E2FFB65103CAF3E7
3,200,594 UART: [art] SIG.R = AB4C61A84155CA021D13219C7332FADB3A87EF42579D60D67ECDC9467797E1CBA4BE27A00914562C4C281AAC2A6B7256
3,207,366 UART: [art] SIG.S = 322C50C0B8EECEDCCA4F3E31BE896C8C76DFA4C0FF61270963B36F03A1BB64708C99C59854628631A111387E785AF706
3,231,051 UART: Caliptra RT
3,231,394 UART: [state] CFI Enabled
3,351,352 UART: [rt] RT listening for mailbox commands...
3,352,022 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,434 UART: [rt]cmd =0x53574545, len=84
3,384,103 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,581 ready_for_fw is high
1,059,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,269 >>> mbox cmd response: success
2,742,282 UART:
2,742,298 UART: Running Caliptra FMC ...
2,742,706 UART:
2,742,849 UART: [state] CFI Enabled
2,753,601 UART: [fht] FMC Alias Private Key: 7
2,872,199 UART: [art] Extend RT PCRs Done
2,872,627 UART: [art] Lock RT PCRs Done
2,874,203 UART: [art] Populate DV Done
2,882,308 UART: [fht] FMC Alias Private Key: 7
2,883,320 UART: [art] Derive CDI
2,883,600 UART: [art] Store in slot 0x4
2,969,315 UART: [art] Derive Key Pair
2,969,675 UART: [art] Store priv key in slot 0x5
2,983,289 UART: [art] Derive Key Pair - Done
2,997,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,259 UART: [art] PUB.X = 0B1CA630F2828117891BE3A33D72A50C8FEC90A01C28A386B6CA24F50EF9018759245F8E3EAD0CFBAAD0987BA45D4856
3,021,024 UART: [art] PUB.Y = ACF25760F9E4BCE9039CA7DBCAB0E8FFC4D15E265F685C4DA53253FB519B6DD7B975ABB6F855BEE1A3BE1DB250C3BE51
3,028,001 UART: [art] SIG.R = 79AB8D5226F301385EAC7DFAD56CE170CA02743C6FA456158BF57D5716BDA8432752A4D89512FC237FBB118E06CC2CB6
3,034,772 UART: [art] SIG.S = DDDB55832AD0B7E57F2E3AB12F4D656EE3FD81D78C3956DCFD9BC4008F5B7BED614C4373DA5ACAA15EDDC4DA693BE055
3,058,784 UART: Caliptra RT
3,059,127 UART: [state] CFI Enabled
3,178,373 UART: [rt] RT listening for mailbox commands...
3,179,043 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,431 UART: [rt]cmd =0x53574545, len=84
3,210,682 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
893,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,735 UART: [kat] ++
897,887 UART: [kat] sha1
902,123 UART: [kat] SHA2-256
904,063 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,608 UART: [kat] HMAC-384Kdf
923,130 UART: [kat] LMS
1,171,458 UART: [kat] --
1,172,279 UART: [cold-reset] ++
1,172,797 UART: [fht] FHT @ 0x50003400
1,175,392 UART: [idev] ++
1,175,560 UART: [idev] CDI.KEYID = 6
1,175,920 UART: [idev] SUBJECT.KEYID = 7
1,176,344 UART: [idev] UDS.KEYID = 0
1,176,689 ready_for_fw is high
1,176,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,134 UART: [idev] Erasing UDS.KEYID = 0
1,201,697 UART: [idev] Sha1 KeyId Algorithm
1,210,081 UART: [idev] --
1,211,095 UART: [ldev] ++
1,211,263 UART: [ldev] CDI.KEYID = 6
1,211,626 UART: [ldev] SUBJECT.KEYID = 5
1,212,052 UART: [ldev] AUTHORITY.KEYID = 7
1,212,515 UART: [ldev] FE.KEYID = 1
1,217,761 UART: [ldev] Erasing FE.KEYID = 1
1,244,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,625 UART: [ldev] --
1,283,982 UART: [fwproc] Wait for Commands...
1,284,562 UART: [fwproc] Recv command 0x46574c44
1,285,290 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,955 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,632 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,789 >>> mbox cmd response: success
2,829,903 UART: [afmc] ++
2,830,071 UART: [afmc] CDI.KEYID = 6
2,830,433 UART: [afmc] SUBJECT.KEYID = 7
2,830,858 UART: [afmc] AUTHORITY.KEYID = 5
2,866,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,452 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,161 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,044 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,745 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,481 UART: [afmc] --
2,909,505 UART: [cold-reset] --
2,910,173 UART: [state] Locking Datavault
2,911,320 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,924 UART: [state] Locking ICCM
2,912,486 UART: [exit] Launching FMC @ 0x40000130
2,917,816 UART:
2,917,832 UART: Running Caliptra FMC ...
2,918,240 UART:
2,918,294 UART: [state] CFI Enabled
2,928,662 UART: [fht] FMC Alias Private Key: 7
3,048,246 UART: [art] Extend RT PCRs Done
3,048,674 UART: [art] Lock RT PCRs Done
3,050,222 UART: [art] Populate DV Done
3,058,383 UART: [fht] FMC Alias Private Key: 7
3,059,409 UART: [art] Derive CDI
3,059,689 UART: [art] Store in slot 0x4
3,145,604 UART: [art] Derive Key Pair
3,145,964 UART: [art] Store priv key in slot 0x5
3,158,538 UART: [art] Derive Key Pair - Done
3,173,510 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,058 UART: [art] PUB.X = E4E5947F408C9B5B8840B3F49B68DF5F5151EE0C8E490913549764D16E3E7EDB4F16BC35287966637730BDE058E2C4FB
3,196,824 UART: [art] PUB.Y = 4C4EEE3472ED7BDE7FF1C428769D3EBC6D02F20A03A8F8DC5989833A3BFD19A971F106F2D76273DC811F567BB7204A30
3,203,774 UART: [art] SIG.R = 5D0BD4E2B086227BF221B5786293DA438290C0FB1257C823EC06463D71785374ED4E236506FF922A66064E4147548A16
3,210,520 UART: [art] SIG.S = 9BFF0126D86B000DBE4D7B39C8B914A6F29B88B2937ACF56FA3013213371961B43C3D01F846485297251BC10877723FE
3,234,818 UART: Caliptra RT
3,235,069 UART: [state] CFI Enabled
3,354,569 UART: [rt] RT listening for mailbox commands...
3,355,239 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,759 UART: [rt]cmd =0x53574545, len=84
3,387,046 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 ready_for_fw is high
1,060,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,620 >>> mbox cmd response: success
2,740,749 UART:
2,740,765 UART: Running Caliptra FMC ...
2,741,173 UART:
2,741,227 UART: [state] CFI Enabled
2,751,631 UART: [fht] FMC Alias Private Key: 7
2,870,655 UART: [art] Extend RT PCRs Done
2,871,083 UART: [art] Lock RT PCRs Done
2,872,663 UART: [art] Populate DV Done
2,880,964 UART: [fht] FMC Alias Private Key: 7
2,882,010 UART: [art] Derive CDI
2,882,290 UART: [art] Store in slot 0x4
2,968,025 UART: [art] Derive Key Pair
2,968,385 UART: [art] Store priv key in slot 0x5
2,981,313 UART: [art] Derive Key Pair - Done
2,995,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,480 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,245 UART: [art] PUB.X = 43D66C86B8C818669CD5F40C725E1212B02403058913071F275BD28538FE282A2851EE0CD87533BDDA599E5BB5D370FF
3,018,998 UART: [art] PUB.Y = F6B2394B97978B336EA827DBE2C3B5F6D92A30AC752765E7FA3484F8EA262814362427AEF27F56612EDBA4427D861C85
3,025,950 UART: [art] SIG.R = 2E29E8BF2A4EF4609FD1944A778389FE4234CB39953B5BFE42B8DCCCCD0B82A5796D5EA202FF3512359BD3DC99043723
3,032,721 UART: [art] SIG.S = FA0F74E06BC975DD6EF4A23270355637C5F0E3BB5639FA5A8A59090D96DF2BBAE4CDDBB357F1DAC039603FC9B72D8EAD
3,056,478 UART: Caliptra RT
3,056,729 UART: [state] CFI Enabled
3,176,555 UART: [rt] RT listening for mailbox commands...
3,177,225 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,667 UART: [rt]cmd =0x53574545, len=84
3,209,182 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,125 UART: [kat] SHA2-256
893,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,900 UART: [kat] ++
898,052 UART: [kat] sha1
902,304 UART: [kat] SHA2-256
904,244 UART: [kat] SHA2-384
907,081 UART: [kat] SHA2-512-ACC
908,982 UART: [kat] ECC-384
919,263 UART: [kat] HMAC-384Kdf
924,043 UART: [kat] LMS
1,172,371 UART: [kat] --
1,173,178 UART: [cold-reset] ++
1,173,706 UART: [fht] FHT @ 0x50003400
1,176,425 UART: [idev] ++
1,176,593 UART: [idev] CDI.KEYID = 6
1,176,953 UART: [idev] SUBJECT.KEYID = 7
1,177,377 UART: [idev] UDS.KEYID = 0
1,177,722 ready_for_fw is high
1,177,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,247 UART: [idev] Erasing UDS.KEYID = 0
1,202,494 UART: [idev] Sha1 KeyId Algorithm
1,210,968 UART: [idev] --
1,211,960 UART: [ldev] ++
1,212,128 UART: [ldev] CDI.KEYID = 6
1,212,491 UART: [ldev] SUBJECT.KEYID = 5
1,212,917 UART: [ldev] AUTHORITY.KEYID = 7
1,213,380 UART: [ldev] FE.KEYID = 1
1,218,486 UART: [ldev] Erasing FE.KEYID = 1
1,244,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,217 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,950 UART: [ldev] --
1,283,237 UART: [fwproc] Wait for Commands...
1,283,981 UART: [fwproc] Recv command 0x46574c44
1,284,709 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,067 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,422 >>> mbox cmd response: success
2,829,460 UART: [afmc] ++
2,829,628 UART: [afmc] CDI.KEYID = 6
2,829,990 UART: [afmc] SUBJECT.KEYID = 7
2,830,415 UART: [afmc] AUTHORITY.KEYID = 5
2,866,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,045 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,637 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,114 UART: [afmc] --
2,910,022 UART: [cold-reset] --
2,911,124 UART: [state] Locking Datavault
2,912,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,059 UART: [state] Locking ICCM
2,913,615 UART: [exit] Launching FMC @ 0x40000130
2,918,945 UART:
2,918,961 UART: Running Caliptra FMC ...
2,919,369 UART:
2,919,512 UART: [state] CFI Enabled
2,930,208 UART: [fht] FMC Alias Private Key: 7
3,049,322 UART: [art] Extend RT PCRs Done
3,049,750 UART: [art] Lock RT PCRs Done
3,051,356 UART: [art] Populate DV Done
3,059,801 UART: [fht] FMC Alias Private Key: 7
3,060,977 UART: [art] Derive CDI
3,061,257 UART: [art] Store in slot 0x4
3,146,840 UART: [art] Derive Key Pair
3,147,200 UART: [art] Store priv key in slot 0x5
3,160,118 UART: [art] Derive Key Pair - Done
3,174,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,091 UART: [art] PUB.X = 96F7CF53D911381264799BA657A22EC8099F403F1681190D8F24DC9C3692E41363B21FAB47336405AED16BD26D68CDF5
3,197,850 UART: [art] PUB.Y = 465583D701D193201D3F6B37CD9307BB719D83815FB73FB3D7B5E1081AC2FC23457FD088684DBA40C67AE548DADFA5F0
3,204,799 UART: [art] SIG.R = 602EF5ECA2D468E690171BBC04AA187C66FEC699D9610D14D6B4C18DACE2FBFED7E2661715CF38D319E20A7EFEB67E39
3,211,580 UART: [art] SIG.S = 243F1A43E38A3B9083049B4CEF657EF1C79F7F4C3140A61CD69276F9B8FABD5F0B74FA4606534F8497F5081E12639850
3,235,060 UART: Caliptra RT
3,235,403 UART: [state] CFI Enabled
3,354,850 UART: [rt] RT listening for mailbox commands...
3,355,520 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,674 UART: [rt]cmd =0x53574545, len=84
3,387,313 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,370 ready_for_fw is high
1,060,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,019 >>> mbox cmd response: success
2,741,152 UART:
2,741,168 UART: Running Caliptra FMC ...
2,741,576 UART:
2,741,719 UART: [state] CFI Enabled
2,752,483 UART: [fht] FMC Alias Private Key: 7
2,871,101 UART: [art] Extend RT PCRs Done
2,871,529 UART: [art] Lock RT PCRs Done
2,873,341 UART: [art] Populate DV Done
2,881,668 UART: [fht] FMC Alias Private Key: 7
2,882,732 UART: [art] Derive CDI
2,883,012 UART: [art] Store in slot 0x4
2,968,427 UART: [art] Derive Key Pair
2,968,787 UART: [art] Store priv key in slot 0x5
2,981,937 UART: [art] Derive Key Pair - Done
2,997,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,974 UART: [art] PUB.X = E0F1DD8C7C934D1158D563DFD79A8AFFD12E1F0AD97A827D0B68BCCE36B75CB56CFDA81064F0ABF9C832BAB3E9B0096C
3,020,763 UART: [art] PUB.Y = 38D02ADA5DD181EC197C5A6F27C59334525993C5375A057CCCA6729BCAADD76FC8F96638F22FA5B6239C8BBE416B24A6
3,027,722 UART: [art] SIG.R = B7DDAA227A1E2FBF77ECC51A697C2FBE48133FAB499A893D0D0242EEDD09E243987480BC3F73B48EA866DB3660DE0786
3,034,496 UART: [art] SIG.S = A83079F90EE6AD2A8BD324F8D1540AEF19FA3DDF3166624DB0C600688F277453110B4A6C4CF2AD2C428A63BE574BBA25
3,058,577 UART: Caliptra RT
3,058,920 UART: [state] CFI Enabled
3,179,657 UART: [rt] RT listening for mailbox commands...
3,180,327 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,641 UART: [rt]cmd =0x53574545, len=84
3,211,930 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_sign_with_exported_ecdsa_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,086 UART:
192,443 UART: Running Caliptra ROM ...
193,545 UART:
193,690 UART: [state] CFI Enabled
261,400 UART: [state] LifecycleState = Unprovisioned
263,305 UART: [state] DebugLocked = No
264,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,263 UART: [kat] SHA2-256
439,998 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,491 UART: [kat] ++
450,967 UART: [kat] sha1
460,638 UART: [kat] SHA2-256
463,293 UART: [kat] SHA2-384
470,280 UART: [kat] SHA2-512-ACC
472,647 UART: [kat] ECC-384
2,765,907 UART: [kat] HMAC-384Kdf
2,779,228 UART: [kat] LMS
3,969,566 UART: [kat] --
3,974,497 UART: [cold-reset] ++
3,977,136 UART: [fht] Storing FHT @ 0x50003400
3,988,044 UART: [idev] ++
3,988,627 UART: [idev] CDI.KEYID = 6
3,989,582 UART: [idev] SUBJECT.KEYID = 7
3,990,823 UART: [idev] UDS.KEYID = 0
3,991,862 ready_for_fw is high
3,992,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,241 UART: [idev] Erasing UDS.KEYID = 0
7,321,670 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,437 UART: [idev] --
7,346,733 UART: [ldev] ++
7,347,310 UART: [ldev] CDI.KEYID = 6
7,348,330 UART: [ldev] SUBJECT.KEYID = 5
7,349,491 UART: [ldev] AUTHORITY.KEYID = 7
7,350,717 UART: [ldev] FE.KEYID = 1
7,379,077 UART: [ldev] Erasing FE.KEYID = 1
10,710,861 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,005,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,019,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,034,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,049,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,068,484 UART: [ldev] --
13,073,590 UART: [fwproc] Waiting for Commands...
13,075,922 UART: [fwproc] Received command 0x46574c44
13,078,107 UART: [fwproc] Received Image of size 118548 bytes
17,179,490 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,256,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,329,730 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,658,556 >>> mbox cmd response: success
17,663,304 UART: [afmc] ++
17,663,921 UART: [afmc] CDI.KEYID = 6
17,664,832 UART: [afmc] SUBJECT.KEYID = 7
17,666,042 UART: [afmc] AUTHORITY.KEYID = 5
21,023,101 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,323,520 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,325,776 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,340,215 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,354,958 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,369,353 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,391,807 UART: [afmc] --
23,395,511 UART: [cold-reset] --
23,399,855 UART: [state] Locking Datavault
23,406,289 UART: [state] Locking PCR0, PCR1 and PCR31
23,407,995 UART: [state] Locking ICCM
23,409,162 UART: [exit] Launching FMC @ 0x40000130
23,417,586 UART:
23,417,824 UART: Running Caliptra FMC ...
23,418,928 UART:
23,419,090 UART: [state] CFI Enabled
23,483,467 UART: [fht] FMC Alias Private Key: 7
25,823,444 UART: [art] Extend RT PCRs Done
25,824,664 UART: [art] Lock RT PCRs Done
25,826,318 UART: [art] Populate DV Done
25,831,782 UART: [fht] FMC Alias Private Key: 7
25,833,429 UART: [art] Derive CDI
25,834,260 UART: [art] Store in slot 0x4
25,891,414 UART: [art] Derive Key Pair
25,892,451 UART: [art] Store priv key in slot 0x5
29,185,223 UART: [art] Derive Key Pair - Done
29,198,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,489,554 UART: [art] Erasing AUTHORITY.KEYID = 7
31,491,465 UART: [art] PUB.X = 2263E593F29A4FD4CE9BDC2A3B71383C623FCE63AA76E14A94C7A8B7CBE62FC978832B28F1CFD7567557EAFE58AB6109
31,498,385 UART: [art] PUB.Y = A2B4BDA06D15942D638B09FFBCCE4E2B8F3576D24E0354A1AEA50191A63FE3BBF6F6689A6D53DA4F4A7DF874E980F317
31,505,622 UART: [art] SIG.R = DBE11AB7194162E84A8D4A45F551B3F8DCFBF4AB941C4C90FF4304800FFEA060CB3FC081E20283167568B18C24362148
31,513,018 UART: [art] SIG.S = D4818C28EDD3B004176936BB91D5D3D2A4EFEE9D6DE552CB9F1E6383AB51BA51D55D4191605139A5457F1D83FEAFD16E
32,818,191 UART: Caliptra RT
32,818,900 UART: [state] CFI Enabled
32,995,574 UART: [rt] RT listening for mailbox commands...
32,997,479 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,028,170 UART: [rt]cmd =0x4d454153, len=108
33,030,215 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,809,161 ready_for_fw is high
3,809,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,981,669 >>> mbox cmd response: success
23,676,907 UART:
23,677,307 UART: Running Caliptra FMC ...
23,678,433 UART:
23,678,587 UART: [state] CFI Enabled
23,745,744 UART: [fht] FMC Alias Private Key: 7
26,086,019 UART: [art] Extend RT PCRs Done
26,087,263 UART: [art] Lock RT PCRs Done
26,088,927 UART: [art] Populate DV Done
26,094,302 UART: [fht] FMC Alias Private Key: 7
26,095,739 UART: [art] Derive CDI
26,096,476 UART: [art] Store in slot 0x4
26,153,875 UART: [art] Derive Key Pair
26,154,916 UART: [art] Store priv key in slot 0x5
29,447,552 UART: [art] Derive Key Pair - Done
29,460,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,197 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,712 UART: [art] PUB.X = D47EFFCBD0A688FDA14C35E4CEB79D7A558FFBCEF26341373B068496BE866C9260282AF990415052CB9877EB9590EEF1
31,758,016 UART: [art] PUB.Y = 9B750C32E69835A2804F3E3C49C93B374DBEC705EF7F36F9853CB6F255F04152F68A58352A7B3C3C2DC9B11B668317FA
31,765,262 UART: [art] SIG.R = B6EE909B86794F3C4DB3946F21B73654937FC1CF5D0E490B0C22596E2B4DD9366D707A123A16FE081CC49A6512CED644
31,772,661 UART: [art] SIG.S = D5D8C75156EDEB64EC968DF7D1544B4AC88FF43F86469BD81A1324ECC88425A9AE7B6F363481AAEE18C4D81D1A16A160
33,077,722 UART: Caliptra RT
33,078,427 UART: [state] CFI Enabled
33,275,790 UART: [rt] RT listening for mailbox commands...
33,277,690 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,308,568 UART: [rt]cmd =0x4d454153, len=108
33,310,340 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,171 writing to cptra_bootfsm_go
192,457 UART:
192,853 UART: Running Caliptra ROM ...
193,982 UART:
603,606 UART: [state] CFI Enabled
615,643 UART: [state] LifecycleState = Unprovisioned
617,578 UART: [state] DebugLocked = No
620,099 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,681 UART: [kat] SHA2-256
794,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,992 UART: [kat] ++
805,436 UART: [kat] sha1
817,226 UART: [kat] SHA2-256
819,948 UART: [kat] SHA2-384
824,677 UART: [kat] SHA2-512-ACC
827,013 UART: [kat] ECC-384
3,110,247 UART: [kat] HMAC-384Kdf
3,122,259 UART: [kat] LMS
4,312,373 UART: [kat] --
4,316,363 UART: [cold-reset] ++
4,318,079 UART: [fht] Storing FHT @ 0x50003400
4,329,845 UART: [idev] ++
4,330,404 UART: [idev] CDI.KEYID = 6
4,331,429 UART: [idev] SUBJECT.KEYID = 7
4,332,549 UART: [idev] UDS.KEYID = 0
4,333,695 ready_for_fw is high
4,333,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,780 UART: [idev] Erasing UDS.KEYID = 0
7,621,209 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,578 UART: [idev] --
7,647,973 UART: [ldev] ++
7,648,591 UART: [ldev] CDI.KEYID = 6
7,649,547 UART: [ldev] SUBJECT.KEYID = 5
7,650,754 UART: [ldev] AUTHORITY.KEYID = 7
7,651,995 UART: [ldev] FE.KEYID = 1
7,662,745 UART: [ldev] Erasing FE.KEYID = 1
10,952,297 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,131 UART: [ldev] --
13,314,566 UART: [fwproc] Waiting for Commands...
13,317,469 UART: [fwproc] Received command 0x46574c44
13,319,649 UART: [fwproc] Received Image of size 118548 bytes
17,421,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,427 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,620 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,765 >>> mbox cmd response: success
17,904,408 UART: [afmc] ++
17,905,016 UART: [afmc] CDI.KEYID = 6
17,905,923 UART: [afmc] SUBJECT.KEYID = 7
17,907,129 UART: [afmc] AUTHORITY.KEYID = 5
21,224,290 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,055 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,407 UART: [afmc] --
23,587,456 UART: [cold-reset] --
23,591,254 UART: [state] Locking Datavault
23,596,768 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,513 UART: [state] Locking ICCM
23,600,444 UART: [exit] Launching FMC @ 0x40000130
23,608,831 UART:
23,609,078 UART: Running Caliptra FMC ...
23,610,178 UART:
23,610,331 UART: [state] CFI Enabled
23,618,240 UART: [fht] FMC Alias Private Key: 7
25,957,963 UART: [art] Extend RT PCRs Done
25,959,182 UART: [art] Lock RT PCRs Done
25,960,777 UART: [art] Populate DV Done
25,965,964 UART: [fht] FMC Alias Private Key: 7
25,967,549 UART: [art] Derive CDI
25,968,353 UART: [art] Store in slot 0x4
26,011,265 UART: [art] Derive Key Pair
26,012,265 UART: [art] Store priv key in slot 0x5
29,254,271 UART: [art] Derive Key Pair - Done
29,267,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,577 UART: [art] PUB.X = DA7C4883381D0F70A86E46E6FE62E89C8B2A93089C342147FBCE011B745C9774745F15F73F263BD837CF38450B9C015C
31,556,832 UART: [art] PUB.Y = CDD004296DA9C843BF45DCC79D17D6328E54994A44C155111ADB730C48EC9347F4579F66DC45BDC54E19CA04452DDA55
31,564,108 UART: [art] SIG.R = C512651671894625E99936E8367495946AE46E65F65BCB6B46317DFA0B8F2804FE08EABFF620D38F8996ACE76CDF999B
31,571,487 UART: [art] SIG.S = 55A0557590F0A8E22173FC760AE9C472286652319965B8E3B9E57CB60453576F6FFE2E192FCA000BFFD0983ACE8D49EC
32,876,997 UART: Caliptra RT
32,877,708 UART: [state] CFI Enabled
33,010,924 UART: [rt] RT listening for mailbox commands...
33,012,820 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,043,689 UART: [rt]cmd =0x4d454153, len=108
33,045,378 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
4,130,398 ready_for_fw is high
4,130,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,453 >>> mbox cmd response: success
23,807,828 UART:
23,808,237 UART: Running Caliptra FMC ...
23,809,384 UART:
23,809,546 UART: [state] CFI Enabled
23,817,655 UART: [fht] FMC Alias Private Key: 7
26,157,796 UART: [art] Extend RT PCRs Done
26,159,035 UART: [art] Lock RT PCRs Done
26,160,672 UART: [art] Populate DV Done
26,166,095 UART: [fht] FMC Alias Private Key: 7
26,167,794 UART: [art] Derive CDI
26,168,618 UART: [art] Store in slot 0x4
26,211,452 UART: [art] Derive Key Pair
26,212,516 UART: [art] Store priv key in slot 0x5
29,454,370 UART: [art] Derive Key Pair - Done
29,467,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,340 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,847 UART: [art] PUB.X = D7040773A0E854505DA99A283F6FCFA7C63500DCE2C452AE0422E907DED135E978DC2FAA1E09BBEA9F4E631F83FE69F0
31,756,094 UART: [art] PUB.Y = 0C4221C54C661A29BC4FC7DB5170694FD69450FFE4EABE42F83A0267699097B97C9C9DC36633E02431557103ECE17C08
31,763,340 UART: [art] SIG.R = 58CBB46DFFE9208B669B8F6C915F8D3BD47A3688AEF579A6D5318B1840F4AF231A92707360373CCFDBD1C248737EB86C
31,770,741 UART: [art] SIG.S = ADF7B0DE9EFB4DBFBCDFAF859D81E4F78C08388470DFE8040DF9DB7C3834F50A9B80E36FC4DD1FB7FD2BA82297E3384C
33,075,834 UART: Caliptra RT
33,076,553 UART: [state] CFI Enabled
33,210,806 UART: [rt] RT listening for mailbox commands...
33,212,696 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,243,627 UART: [rt]cmd =0x4d454153, len=108
33,245,567 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,149 UART:
192,526 UART: Running Caliptra ROM ...
193,662 UART:
193,808 UART: [state] CFI Enabled
264,206 UART: [state] LifecycleState = Unprovisioned
266,114 UART: [state] DebugLocked = No
267,773 UART: [state] WD Timer not started. Device not locked for debugging
271,743 UART: [kat] SHA2-256
451,434 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,184 UART: [kat] ++
462,629 UART: [kat] sha1
474,211 UART: [kat] SHA2-256
476,925 UART: [kat] SHA2-384
482,978 UART: [kat] SHA2-512-ACC
485,340 UART: [kat] ECC-384
2,950,064 UART: [kat] HMAC-384Kdf
2,971,077 UART: [kat] LMS
3,447,548 UART: [kat] --
3,451,972 UART: [cold-reset] ++
3,452,905 UART: [fht] FHT @ 0x50003400
3,462,838 UART: [idev] ++
3,463,446 UART: [idev] CDI.KEYID = 6
3,464,489 UART: [idev] SUBJECT.KEYID = 7
3,465,663 UART: [idev] UDS.KEYID = 0
3,466,586 ready_for_fw is high
3,466,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,715 UART: [idev] Erasing UDS.KEYID = 0
5,986,478 UART: [idev] Sha1 KeyId Algorithm
6,009,636 UART: [idev] --
6,013,749 UART: [ldev] ++
6,014,326 UART: [ldev] CDI.KEYID = 6
6,015,245 UART: [ldev] SUBJECT.KEYID = 5
6,016,460 UART: [ldev] AUTHORITY.KEYID = 7
6,017,862 UART: [ldev] FE.KEYID = 1
6,056,767 UART: [ldev] Erasing FE.KEYID = 1
8,565,073 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,109 UART: [ldev] --
10,374,851 UART: [fwproc] Wait for Commands...
10,376,999 UART: [fwproc] Recv command 0x46574c44
10,379,044 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,975 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,377 >>> mbox cmd response: success
14,352,598 UART: [afmc] ++
14,353,219 UART: [afmc] CDI.KEYID = 6
14,354,165 UART: [afmc] SUBJECT.KEYID = 7
14,355,380 UART: [afmc] AUTHORITY.KEYID = 5
16,894,722 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,596 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,692 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,614 UART: [afmc] --
18,697,155 UART: [cold-reset] --
18,701,878 UART: [state] Locking Datavault
18,707,221 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,976 UART: [state] Locking ICCM
18,710,472 UART: [exit] Launching FMC @ 0x40000130
18,718,859 UART:
18,719,092 UART: Running Caliptra FMC ...
18,720,192 UART:
18,720,349 UART: [state] CFI Enabled
18,776,608 UART: [fht] FMC Alias Private Key: 7
20,542,959 UART: [art] Extend RT PCRs Done
20,544,195 UART: [art] Lock RT PCRs Done
20,545,493 UART: [art] Populate DV Done
20,550,962 UART: [fht] FMC Alias Private Key: 7
20,552,527 UART: [art] Derive CDI
20,553,344 UART: [art] Store in slot 0x4
20,610,068 UART: [art] Derive Key Pair
20,611,107 UART: [art] Store priv key in slot 0x5
23,074,161 UART: [art] Derive Key Pair - Done
23,087,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,581 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,115 UART: [art] PUB.X = BCFB92DBC3BF269C87E8F349C5831A784A1B0F1F3681EDAF2782E29226D852E8A46AD0685B41F80A25B8F3B66E1AF989
24,808,372 UART: [art] PUB.Y = EDEDF2D055B7D7CE9945954913463F60AE8655E0FFBBB1B710061993067D6021111D983A08BE3ADD1237A0630677E79E
24,815,604 UART: [art] SIG.R = 808EC6814112E293458820FF83554E71055A5B078450A65CEC7ACF935D86198F4ACC3E1ED17553D48F693064DEDB9313
24,822,989 UART: [art] SIG.S = A63A5CA84562B993CEF0178CE45DB705D69E7AF1EBBC4172CF5FEE60A8FAEAD9D3EBA2C3A1945A8FC3000CF4D57F3DE0
25,801,964 UART: Caliptra RT
25,802,682 UART: [state] CFI Enabled
25,984,220 UART: [rt] RT listening for mailbox commands...
25,986,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,016,882 UART: [rt]cmd =0x4d454153, len=108
26,018,728 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,459,000 ready_for_fw is high
3,459,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,406 >>> mbox cmd response: success
18,528,889 UART:
18,529,308 UART: Running Caliptra FMC ...
18,530,445 UART:
18,530,603 UART: [state] CFI Enabled
18,599,951 UART: [fht] FMC Alias Private Key: 7
20,366,055 UART: [art] Extend RT PCRs Done
20,367,278 UART: [art] Lock RT PCRs Done
20,369,118 UART: [art] Populate DV Done
20,374,532 UART: [fht] FMC Alias Private Key: 7
20,376,028 UART: [art] Derive CDI
20,376,794 UART: [art] Store in slot 0x4
20,432,435 UART: [art] Derive Key Pair
20,433,475 UART: [art] Store priv key in slot 0x5
22,896,630 UART: [art] Derive Key Pair - Done
22,910,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,164 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,683 UART: [art] PUB.X = 314370E1A7E0501EDF9ABF22E34324477D069FD3BC80425D36EF2C42325DAB273069B8176566A9B8FA2F0C580D0D4432
24,630,894 UART: [art] PUB.Y = 69B787FA4C28203C11DEF6780C31CB4E78A63E23E4FDCAE123A496B81029EE23E6ABF38317A968C8CD13AC325927A554
24,638,156 UART: [art] SIG.R = 2B01D31DFFDF4AF664648AC657D593AC64FEC8F8200C64AD93F37B202E36CEC2F6A392EB58132B505BE6C5F3CC12448D
24,645,550 UART: [art] SIG.S = BF06030ED8BED9FA2293C1C1A424424A916E7C27C11F4B556F4AD9BAB5DF5FAB7F2E465E247F8DA05D1F4DF8390EAC33
25,624,025 UART: Caliptra RT
25,624,727 UART: [state] CFI Enabled
25,806,960 UART: [rt] RT listening for mailbox commands...
25,808,845 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,839,778 UART: [rt]cmd =0x4d454153, len=108
25,841,500 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,402 UART:
192,761 UART: Running Caliptra ROM ...
193,861 UART:
603,434 UART: [state] CFI Enabled
619,160 UART: [state] LifecycleState = Unprovisioned
621,111 UART: [state] DebugLocked = No
623,840 UART: [state] WD Timer not started. Device not locked for debugging
627,451 UART: [kat] SHA2-256
807,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,939 UART: [kat] ++
818,476 UART: [kat] sha1
829,500 UART: [kat] SHA2-256
832,235 UART: [kat] SHA2-384
837,109 UART: [kat] SHA2-512-ACC
839,301 UART: [kat] ECC-384
3,282,215 UART: [kat] HMAC-384Kdf
3,294,461 UART: [kat] LMS
3,770,959 UART: [kat] --
3,773,565 UART: [cold-reset] ++
3,774,726 UART: [fht] FHT @ 0x50003400
3,786,279 UART: [idev] ++
3,786,852 UART: [idev] CDI.KEYID = 6
3,787,774 UART: [idev] SUBJECT.KEYID = 7
3,789,023 UART: [idev] UDS.KEYID = 0
3,789,960 ready_for_fw is high
3,790,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,195 UART: [idev] Erasing UDS.KEYID = 0
6,269,236 UART: [idev] Sha1 KeyId Algorithm
6,292,879 UART: [idev] --
6,297,495 UART: [ldev] ++
6,298,071 UART: [ldev] CDI.KEYID = 6
6,298,957 UART: [ldev] SUBJECT.KEYID = 5
6,300,117 UART: [ldev] AUTHORITY.KEYID = 7
6,301,463 UART: [ldev] FE.KEYID = 1
6,312,948 UART: [ldev] Erasing FE.KEYID = 1
8,794,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,417 UART: [ldev] --
10,589,246 UART: [fwproc] Wait for Commands...
10,592,099 UART: [fwproc] Recv command 0x46574c44
10,594,085 UART: [fwproc] Recv'd Img size: 118548 bytes
14,071,916 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,221 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,578 >>> mbox cmd response: success
14,559,874 UART: [afmc] ++
14,560,474 UART: [afmc] CDI.KEYID = 6
14,561,387 UART: [afmc] SUBJECT.KEYID = 7
14,562,602 UART: [afmc] AUTHORITY.KEYID = 5
17,068,828 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,881 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,893 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,976 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,556 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,220 UART: [afmc] --
18,867,385 UART: [cold-reset] --
18,872,170 UART: [state] Locking Datavault
18,876,393 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,098 UART: [state] Locking ICCM
18,880,821 UART: [exit] Launching FMC @ 0x40000130
18,889,222 UART:
18,889,465 UART: Running Caliptra FMC ...
18,890,569 UART:
18,890,729 UART: [state] CFI Enabled
18,898,726 UART: [fht] FMC Alias Private Key: 7
20,664,546 UART: [art] Extend RT PCRs Done
20,665,772 UART: [art] Lock RT PCRs Done
20,667,483 UART: [art] Populate DV Done
20,673,073 UART: [fht] FMC Alias Private Key: 7
20,674,696 UART: [art] Derive CDI
20,675,521 UART: [art] Store in slot 0x4
20,718,291 UART: [art] Derive Key Pair
20,719,335 UART: [art] Store priv key in slot 0x5
23,145,923 UART: [art] Derive Key Pair - Done
23,159,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,690 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,194 UART: [art] PUB.X = 1BCE4962CE2A251C4B1FA2123A7E3886E5B52DC2A1B0C58104264736B61502F93CEF4A617CA0D95BF859679AC847A330
24,874,444 UART: [art] PUB.Y = 2F370C008BAE8383286B107BCB8BC2425EBB0274055A8F9232C2F1F901C5C7EC467A968FBB47E9AF7F5F121CFC405DA6
24,881,730 UART: [art] SIG.R = 247FB6741BB663C7C57435D4095430D4F6BCFBBB22AC0485F4C153DD2F58E35680F448E550B34F0962C40840E10E342F
24,889,078 UART: [art] SIG.S = C6FDC1F80F25631A239C9EB205D0FF528FE126C80DBA8D9C95DC6A34E662CE5893246BD49806463B64448DFD682A8594
25,867,224 UART: Caliptra RT
25,867,922 UART: [state] CFI Enabled
26,001,274 UART: [rt] RT listening for mailbox commands...
26,003,163 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,033,986 UART: [rt]cmd =0x4d454153, len=108
26,035,914 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,780,427 ready_for_fw is high
3,780,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,890 >>> mbox cmd response: success
18,696,461 UART:
18,696,832 UART: Running Caliptra FMC ...
18,698,025 UART:
18,698,198 UART: [state] CFI Enabled
18,706,369 UART: [fht] FMC Alias Private Key: 7
20,472,973 UART: [art] Extend RT PCRs Done
20,474,190 UART: [art] Lock RT PCRs Done
20,476,411 UART: [art] Populate DV Done
20,482,207 UART: [fht] FMC Alias Private Key: 7
20,483,818 UART: [art] Derive CDI
20,484,586 UART: [art] Store in slot 0x4
20,527,027 UART: [art] Derive Key Pair
20,528,072 UART: [art] Store priv key in slot 0x5
22,954,389 UART: [art] Derive Key Pair - Done
22,967,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,709 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,202 UART: [art] PUB.X = F44BB58C44994540D994C7C2D4A447C1431EAFACE4D860C21FF746FECC8CCCA7AD42C0C525FFEA189ED674A72957E3F4
24,682,528 UART: [art] PUB.Y = 9239EBFD9230C021CDB7C351D0422BCF1984562C5D8B5BF28CF4DD51D302B6A854689B5AB20B0C0E73CEEDA466D5385E
24,689,795 UART: [art] SIG.R = C78016EB20B11B78AB306AB69F6D9404F6DFF12A50D788EFC478969EC38FD5DA874521FAE5813F9A9B44127312ABCDD2
24,697,207 UART: [art] SIG.S = 8556F603FFF97213933F21F1B29C7680A3F0490EFFBED095C6C34D99129053B9AE1E6FB380F022B0D59DE3831C9E845E
25,675,798 UART: Caliptra RT
25,676,509 UART: [state] CFI Enabled
25,808,984 UART: [rt] RT listening for mailbox commands...
25,810,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,841,432 UART: [rt]cmd =0x4d454153, len=108
25,843,230 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
191,987 UART:
192,353 UART: Running Caliptra ROM ...
193,449 UART:
193,591 UART: [state] CFI Enabled
266,091 UART: [state] LifecycleState = Unprovisioned
268,500 UART: [state] DebugLocked = No
269,807 UART: [state] WD Timer not started. Device not locked for debugging
274,835 UART: [kat] SHA2-256
464,737 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,477 UART: [kat] ++
475,924 UART: [kat] sha1
488,149 UART: [kat] SHA2-256
491,219 UART: [kat] SHA2-384
496,773 UART: [kat] SHA2-512-ACC
499,371 UART: [kat] ECC-384
2,948,241 UART: [kat] HMAC-384Kdf
2,971,953 UART: [kat] LMS
3,503,739 UART: [kat] --
3,508,043 UART: [cold-reset] ++
3,510,193 UART: [fht] FHT @ 0x50003400
3,521,663 UART: [idev] ++
3,522,303 UART: [idev] CDI.KEYID = 6
3,523,335 UART: [idev] SUBJECT.KEYID = 7
3,524,506 UART: [idev] UDS.KEYID = 0
3,525,448 ready_for_fw is high
3,525,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,758 UART: [idev] Erasing UDS.KEYID = 0
6,027,603 UART: [idev] Sha1 KeyId Algorithm
6,051,382 UART: [idev] --
6,057,248 UART: [ldev] ++
6,057,943 UART: [ldev] CDI.KEYID = 6
6,058,867 UART: [ldev] SUBJECT.KEYID = 5
6,060,039 UART: [ldev] AUTHORITY.KEYID = 7
6,061,276 UART: [ldev] FE.KEYID = 1
6,100,168 UART: [ldev] Erasing FE.KEYID = 1
8,605,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,785 UART: [ldev] --
10,412,263 UART: [fwproc] Wait for Commands...
10,413,918 UART: [fwproc] Recv command 0x46574c44
10,416,220 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,992,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,590 >>> mbox cmd response: success
14,681,622 UART: [afmc] ++
14,682,251 UART: [afmc] CDI.KEYID = 6
14,683,366 UART: [afmc] SUBJECT.KEYID = 7
14,684,857 UART: [afmc] AUTHORITY.KEYID = 5
17,214,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,131 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,273 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,145 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,216 UART: [afmc] --
19,011,501 UART: [cold-reset] --
19,015,213 UART: [state] Locking Datavault
19,020,148 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,348 UART: [state] Locking ICCM
19,024,011 UART: [exit] Launching FMC @ 0x40000130
19,032,655 UART:
19,032,887 UART: Running Caliptra FMC ...
19,033,985 UART:
19,034,145 UART: [state] CFI Enabled
19,094,379 UART: [fht] FMC Alias Private Key: 7
20,861,110 UART: [art] Extend RT PCRs Done
20,862,334 UART: [art] Lock RT PCRs Done
20,863,821 UART: [art] Populate DV Done
20,869,445 UART: [fht] FMC Alias Private Key: 7
20,871,031 UART: [art] Derive CDI
20,871,769 UART: [art] Store in slot 0x4
20,926,694 UART: [art] Derive Key Pair
20,927,735 UART: [art] Store priv key in slot 0x5
23,390,642 UART: [art] Derive Key Pair - Done
23,403,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,930 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,452 UART: [art] PUB.X = 4043CF93C7BA1F84F26B6BB6DBACDC636DE29A3E38A9EA26767F3957A8844C4B2A77FDB6E60B13A46F56F3ED2BA65979
25,124,733 UART: [art] PUB.Y = 49B86CDC7CA833BDD82A629BD87802A984A480FC757C2AE688C8781A305D5FD61834C09FB594F3960A33B568C3577B6B
25,132,021 UART: [art] SIG.R = 79166602E2F9310944F6B302F9AC8D10A1B7FFFA6857EDD5EE789FF050073E56EE9425425014538EFAA4D58FAB5C13EE
25,139,367 UART: [art] SIG.S = 7330905F32441B7CF4D4358027D2BBBA9D03D23F5BE71AA54CEAB7EEE8F9CFF4950BC264B5FFD616ADC77D54C5A92512
26,117,994 UART: Caliptra RT
26,118,705 UART: [state] CFI Enabled
26,298,145 UART: [rt] RT listening for mailbox commands...
26,300,030 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,330,579 UART: [rt]cmd =0x4d454153, len=108
26,332,477 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,859 writing to cptra_bootfsm_go
3,418,895 ready_for_fw is high
3,419,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,367 >>> mbox cmd response: success
19,109,738 UART:
19,110,118 UART: Running Caliptra FMC ...
19,111,244 UART:
19,111,402 UART: [state] CFI Enabled
19,178,634 UART: [fht] FMC Alias Private Key: 7
20,944,724 UART: [art] Extend RT PCRs Done
20,945,952 UART: [art] Lock RT PCRs Done
20,947,576 UART: [art] Populate DV Done
20,953,205 UART: [fht] FMC Alias Private Key: 7
20,954,689 UART: [art] Derive CDI
20,955,450 UART: [art] Store in slot 0x4
21,011,160 UART: [art] Derive Key Pair
21,012,210 UART: [art] Store priv key in slot 0x5
23,474,916 UART: [art] Derive Key Pair - Done
23,487,540 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,201,049 UART: [art] Erasing AUTHORITY.KEYID = 7
25,202,567 UART: [art] PUB.X = 2CBAC37932FF107AB2198D843E37CF1FE9BB62DF4F2E2A2524179D40865BED2B788C60F93CF4F3594DB35BB3F987570F
25,209,811 UART: [art] PUB.Y = FFEEB6B1F7571AA5A32B3465A6AC9E9A69997B1F5B939D616CE3721D467EE22084746DC24512F414B5491469529218E1
25,217,087 UART: [art] SIG.R = 8A1D031219DBD111D7A97A1864668514F8243CEFC9D7F5E295940CBD4129F4B5BD0B24F8C3FF78A1AC2BF7B1D678F57D
25,224,602 UART: [art] SIG.S = CA38BA2FB76AD5472438CCC7E71542D7A678459FD5F2634B74B27351331187587DEC68C524736C6179ABFAF29517EC23
26,202,718 UART: Caliptra RT
26,203,432 UART: [state] CFI Enabled
26,385,291 UART: [rt] RT listening for mailbox commands...
26,387,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,417,939 UART: [rt]cmd =0x4d454153, len=108
26,419,624 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,331 UART:
192,696 UART: Running Caliptra ROM ...
193,883 UART:
603,560 UART: [state] CFI Enabled
616,000 UART: [state] LifecycleState = Unprovisioned
618,352 UART: [state] DebugLocked = No
619,542 UART: [state] WD Timer not started. Device not locked for debugging
624,809 UART: [kat] SHA2-256
814,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,438 UART: [kat] ++
826,048 UART: [kat] sha1
835,948 UART: [kat] SHA2-256
838,964 UART: [kat] SHA2-384
844,245 UART: [kat] SHA2-512-ACC
846,850 UART: [kat] ECC-384
3,288,072 UART: [kat] HMAC-384Kdf
3,300,291 UART: [kat] LMS
3,832,152 UART: [kat] --
3,836,929 UART: [cold-reset] ++
3,838,155 UART: [fht] FHT @ 0x50003400
3,849,488 UART: [idev] ++
3,850,136 UART: [idev] CDI.KEYID = 6
3,851,173 UART: [idev] SUBJECT.KEYID = 7
3,852,349 UART: [idev] UDS.KEYID = 0
3,853,544 ready_for_fw is high
3,853,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,673 UART: [idev] Erasing UDS.KEYID = 0
6,329,840 UART: [idev] Sha1 KeyId Algorithm
6,353,021 UART: [idev] --
6,358,746 UART: [ldev] ++
6,359,500 UART: [ldev] CDI.KEYID = 6
6,360,565 UART: [ldev] SUBJECT.KEYID = 5
6,361,671 UART: [ldev] AUTHORITY.KEYID = 7
6,362,846 UART: [ldev] FE.KEYID = 1
6,373,604 UART: [ldev] Erasing FE.KEYID = 1
8,854,039 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,160 UART: [ldev] --
10,644,210 UART: [fwproc] Wait for Commands...
10,646,419 UART: [fwproc] Recv command 0x46574c44
10,648,728 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,173 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,128 >>> mbox cmd response: success
14,904,867 UART: [afmc] ++
14,905,594 UART: [afmc] CDI.KEYID = 6
14,906,796 UART: [afmc] SUBJECT.KEYID = 7
14,908,242 UART: [afmc] AUTHORITY.KEYID = 5
17,412,678 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,134,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,136,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,151,785 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,166,922 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,181,834 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,205,769 UART: [afmc] --
19,209,328 UART: [cold-reset] --
19,213,344 UART: [state] Locking Datavault
19,219,484 UART: [state] Locking PCR0, PCR1 and PCR31
19,221,673 UART: [state] Locking ICCM
19,223,326 UART: [exit] Launching FMC @ 0x40000130
19,231,965 UART:
19,232,199 UART: Running Caliptra FMC ...
19,233,230 UART:
19,233,381 UART: [state] CFI Enabled
19,241,596 UART: [fht] FMC Alias Private Key: 7
21,007,775 UART: [art] Extend RT PCRs Done
21,008,997 UART: [art] Lock RT PCRs Done
21,010,557 UART: [art] Populate DV Done
21,015,704 UART: [fht] FMC Alias Private Key: 7
21,017,340 UART: [art] Derive CDI
21,018,090 UART: [art] Store in slot 0x4
21,060,967 UART: [art] Derive Key Pair
21,061,977 UART: [art] Store priv key in slot 0x5
23,488,653 UART: [art] Derive Key Pair - Done
23,501,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,308 UART: [art] Erasing AUTHORITY.KEYID = 7
25,209,809 UART: [art] PUB.X = 351F102B1895D28E2B0B58AA4A1C506EC64B5F526D7D76033959FE36212EC60F7AE14824D2EE7E9A03437514F8CBE159
25,217,074 UART: [art] PUB.Y = 38A7104D69846BD2EE2FF7FE4A31CBDBABDF37A9174877173E3043E57A590853CB8D87B0A572DF9E3F2FD810F25B2EF0
25,224,333 UART: [art] SIG.R = FF7E8A29F2B3F858CA11B6BB315A482773945DD9D220D1706ED74B5A023807E59D3BCFD6B4F6E5943DAFC56E12439A32
25,231,712 UART: [art] SIG.S = AB07F8EBE5116324A7065A191331604BE284E51A9DDFA23AB70975D01EF8450EF6D85585AE5B2809EC56F72C33AF2837
26,210,437 UART: Caliptra RT
26,211,148 UART: [state] CFI Enabled
26,344,270 UART: [rt] RT listening for mailbox commands...
26,346,166 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,376,661 UART: [rt]cmd =0x4d454153, len=108
26,378,654 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,751,594 ready_for_fw is high
3,751,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,422 >>> mbox cmd response: success
19,301,303 UART:
19,301,685 UART: Running Caliptra FMC ...
19,302,796 UART:
19,302,951 UART: [state] CFI Enabled
19,310,424 UART: [fht] FMC Alias Private Key: 7
21,077,020 UART: [art] Extend RT PCRs Done
21,078,252 UART: [art] Lock RT PCRs Done
21,080,130 UART: [art] Populate DV Done
21,085,453 UART: [fht] FMC Alias Private Key: 7
21,087,020 UART: [art] Derive CDI
21,087,766 UART: [art] Store in slot 0x4
21,130,529 UART: [art] Derive Key Pair
21,131,532 UART: [art] Store priv key in slot 0x5
23,558,072 UART: [art] Derive Key Pair - Done
23,571,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,641 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,147 UART: [art] PUB.X = 37E074A68A9009EFC0E7BAF82D5E71CD4AF2BE3300495069B33373D1957EB69553F445F80DEBD4C6BD57C1E6D57855AA
25,286,420 UART: [art] PUB.Y = 1380E05D45A62034CE7735557ED9A1A4EEDDA1FD51F0DB7E34D214E2317D66EB94C36D53BC9BAB3AFDA6321D02E74044
25,293,675 UART: [art] SIG.R = F153F7B702C01C4C09A6DA70575EEBCB950B09BAFBB8929A76944A96ADCF65D84CAFC6DC1F4BB97D59AA1B82F3DE18D7
25,301,128 UART: [art] SIG.S = F452DEBFFC1C248F4F8973101D2EABA0C26C29CE603F12F9B4CC8DFEAB7A288395D7D7108F29F4E16518C704FCDEDF04
26,279,135 UART: Caliptra RT
26,279,826 UART: [state] CFI Enabled
26,412,272 UART: [rt] RT listening for mailbox commands...
26,414,152 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,444,868 UART: [rt]cmd =0x4d454153, len=108
26,446,338 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,750 UART: [state] LifecycleState = Unprovisioned
85,405 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,569 UART: [kat] SHA2-256
881,500 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,615 UART: [kat] ++
885,767 UART: [kat] sha1
890,019 UART: [kat] SHA2-256
891,957 UART: [kat] SHA2-384
894,696 UART: [kat] SHA2-512-ACC
896,597 UART: [kat] ECC-384
902,220 UART: [kat] HMAC-384Kdf
906,772 UART: [kat] LMS
1,474,968 UART: [kat] --
1,475,661 UART: [cold-reset] ++
1,476,221 UART: [fht] Storing FHT @ 0x50003400
1,479,090 UART: [idev] ++
1,479,258 UART: [idev] CDI.KEYID = 6
1,479,618 UART: [idev] SUBJECT.KEYID = 7
1,480,042 UART: [idev] UDS.KEYID = 0
1,480,387 ready_for_fw is high
1,480,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,418 UART: [idev] Erasing UDS.KEYID = 0
1,505,108 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,600 UART: [idev] --
1,514,577 UART: [ldev] ++
1,514,745 UART: [ldev] CDI.KEYID = 6
1,515,108 UART: [ldev] SUBJECT.KEYID = 5
1,515,534 UART: [ldev] AUTHORITY.KEYID = 7
1,515,997 UART: [ldev] FE.KEYID = 1
1,521,473 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,206 UART: [ldev] --
1,585,561 UART: [fwproc] Waiting for Commands...
1,586,210 UART: [fwproc] Received command 0x46574c44
1,587,001 UART: [fwproc] Received Image of size 118548 bytes
2,932,095 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,213 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,836 >>> mbox cmd response: success
3,132,012 UART: [afmc] ++
3,132,180 UART: [afmc] CDI.KEYID = 6
3,132,542 UART: [afmc] SUBJECT.KEYID = 7
3,132,967 UART: [afmc] AUTHORITY.KEYID = 5
3,168,294 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,102 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,882 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,591 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,474 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,157 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,113 UART: [afmc] --
3,211,245 UART: [cold-reset] --
3,212,223 UART: [state] Locking Datavault
3,213,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,930 UART: [state] Locking ICCM
3,214,522 UART: [exit] Launching FMC @ 0x40000130
3,219,852 UART:
3,219,868 UART: Running Caliptra FMC ...
3,220,276 UART:
3,220,330 UART: [state] CFI Enabled
3,230,800 UART: [fht] FMC Alias Private Key: 7
3,350,030 UART: [art] Extend RT PCRs Done
3,350,458 UART: [art] Lock RT PCRs Done
3,351,968 UART: [art] Populate DV Done
3,360,097 UART: [fht] FMC Alias Private Key: 7
3,361,203 UART: [art] Derive CDI
3,361,483 UART: [art] Store in slot 0x4
3,447,215 UART: [art] Derive Key Pair
3,447,575 UART: [art] Store priv key in slot 0x5
3,460,058 UART: [art] Derive Key Pair - Done
3,475,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,173 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,938 UART: [art] PUB.X = 2B6981FE67D369A1F01F7C69F099281DB5D3099194C0213E47ADD4509BABE06BC3DAF66182F298283FA4A9A12CAFB4A8
3,497,715 UART: [art] PUB.Y = 257B1203D40B5725577852587F2D0E050F562B503772D86E93FADE242C215E678C6D2F0D90900E0D7E5442CBE66F7F34
3,504,635 UART: [art] SIG.R = 998F36A401151C39F1F2DF713D83F6C87BC0BD5B98546C3BAC0DF7457AC575D5613D6C198EC06655B0791678F1471DCD
3,511,403 UART: [art] SIG.S = 8D42867DCDD65681952FADF098F315633AC3741CA92A1281CB2B07FEE540D5372473FE0A4D20087900A30C7D3FA29A40
3,534,923 UART: Caliptra RT
3,535,174 UART: [state] CFI Enabled
3,654,640 UART: [rt] RT listening for mailbox commands...
3,655,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,756 UART: [rt]cmd =0x4d454153, len=108
3,687,519 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 ready_for_fw is high
1,362,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,340 >>> mbox cmd response: success
3,041,551 UART:
3,041,567 UART: Running Caliptra FMC ...
3,041,975 UART:
3,042,029 UART: [state] CFI Enabled
3,052,663 UART: [fht] FMC Alias Private Key: 7
3,171,495 UART: [art] Extend RT PCRs Done
3,171,923 UART: [art] Lock RT PCRs Done
3,173,493 UART: [art] Populate DV Done
3,182,006 UART: [fht] FMC Alias Private Key: 7
3,182,986 UART: [art] Derive CDI
3,183,266 UART: [art] Store in slot 0x4
3,268,970 UART: [art] Derive Key Pair
3,269,330 UART: [art] Store priv key in slot 0x5
3,282,483 UART: [art] Derive Key Pair - Done
3,297,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,721 UART: [art] PUB.X = 916EE3E66FD4E6173ACE64AB4CB14E99DEA7D9AF3D0559A68CB5B9A7B5F1727F8E776DA985432E2C7E8019D213D2700E
3,320,499 UART: [art] PUB.Y = A089F63583CC64E7A9C8CEFCBCD3766F58C45D9892265B7E13969D2A7D60E86F279DE32184B9943A1328CB57CDAD96BB
3,327,459 UART: [art] SIG.R = 41E00104A862568D9D0FC4B730F9F5BC468D42E02AD4AE9E95A8D2786E12079214B21394CA59C92F9ACD754D3B046776
3,334,214 UART: [art] SIG.S = 3EB98071570755BE8635883A81693BEB9B7DCB0D8CB7DD02FD969866AE28864626B1AE846237F92210DF24A2E79703EF
3,357,300 UART: Caliptra RT
3,357,551 UART: [state] CFI Enabled
3,477,697 UART: [rt] RT listening for mailbox commands...
3,478,367 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,059 UART: [rt]cmd =0x4d454153, len=108
3,510,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,319 UART: [state] LifecycleState = Unprovisioned
85,974 UART: [state] DebugLocked = No
86,580 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,780 UART: [kat] SHA2-256
892,718 UART: [kat] SHA2-384
895,459 UART: [kat] SHA2-512-ACC
897,360 UART: [kat] ECC-384
902,739 UART: [kat] HMAC-384Kdf
907,331 UART: [kat] LMS
1,475,527 UART: [kat] --
1,476,556 UART: [cold-reset] ++
1,476,940 UART: [fht] Storing FHT @ 0x50003400
1,479,803 UART: [idev] ++
1,479,971 UART: [idev] CDI.KEYID = 6
1,480,331 UART: [idev] SUBJECT.KEYID = 7
1,480,755 UART: [idev] UDS.KEYID = 0
1,481,100 ready_for_fw is high
1,481,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,873 UART: [idev] Erasing UDS.KEYID = 0
1,505,269 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,753 UART: [idev] --
1,514,924 UART: [ldev] ++
1,515,092 UART: [ldev] CDI.KEYID = 6
1,515,455 UART: [ldev] SUBJECT.KEYID = 5
1,515,881 UART: [ldev] AUTHORITY.KEYID = 7
1,516,344 UART: [ldev] FE.KEYID = 1
1,521,650 UART: [ldev] Erasing FE.KEYID = 1
1,547,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,841 UART: [ldev] --
1,587,150 UART: [fwproc] Waiting for Commands...
1,587,885 UART: [fwproc] Received command 0x46574c44
1,588,676 UART: [fwproc] Received Image of size 118548 bytes
2,933,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,676 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,894 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,151 >>> mbox cmd response: success
3,133,375 UART: [afmc] ++
3,133,543 UART: [afmc] CDI.KEYID = 6
3,133,905 UART: [afmc] SUBJECT.KEYID = 7
3,134,330 UART: [afmc] AUTHORITY.KEYID = 5
3,169,241 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,432 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,315 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,998 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,822 UART: [afmc] --
3,212,780 UART: [cold-reset] --
3,213,612 UART: [state] Locking Datavault
3,214,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,203 UART: [state] Locking ICCM
3,215,753 UART: [exit] Launching FMC @ 0x40000130
3,221,083 UART:
3,221,099 UART: Running Caliptra FMC ...
3,221,507 UART:
3,221,650 UART: [state] CFI Enabled
3,232,290 UART: [fht] FMC Alias Private Key: 7
3,351,014 UART: [art] Extend RT PCRs Done
3,351,442 UART: [art] Lock RT PCRs Done
3,352,908 UART: [art] Populate DV Done
3,360,869 UART: [fht] FMC Alias Private Key: 7
3,361,829 UART: [art] Derive CDI
3,362,109 UART: [art] Store in slot 0x4
3,448,155 UART: [art] Derive Key Pair
3,448,515 UART: [art] Store priv key in slot 0x5
3,461,572 UART: [art] Derive Key Pair - Done
3,476,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,758 UART: [art] PUB.X = 3A8959B4D684E23101BC2EAF61D62B9574C0BEBA11EF8A2A5A41731A64FA4173082DAF27B5A120EE1AC114C575347398
3,499,528 UART: [art] PUB.Y = 2AD583645E93303559C0C8D90C546E5C9527E92D9B4C5CED4CC01D0451F605C4A1E68E3EA86719F9B66EF9C1F09605AC
3,506,472 UART: [art] SIG.R = 9AB21C63EAE884864832020E6548BAFD1397C3FDA5925446B949FC5D04A15D86F91A9D2426CFBD07B8BDDCA25EC5B10F
3,513,241 UART: [art] SIG.S = EAFAF0922457FED6D0F3E1EF5066DA7A0BDC0DC09B0832B127182120006BA8197D4D0B3BF86B10FEEBDFEEAB7F7C0012
3,537,017 UART: Caliptra RT
3,537,360 UART: [state] CFI Enabled
3,658,900 UART: [rt] RT listening for mailbox commands...
3,659,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,846 UART: [rt]cmd =0x4d454153, len=108
3,691,331 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 ready_for_fw is high
1,362,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,533 >>> mbox cmd response: success
3,042,326 UART:
3,042,342 UART: Running Caliptra FMC ...
3,042,750 UART:
3,042,893 UART: [state] CFI Enabled
3,053,419 UART: [fht] FMC Alias Private Key: 7
3,172,505 UART: [art] Extend RT PCRs Done
3,172,933 UART: [art] Lock RT PCRs Done
3,174,341 UART: [art] Populate DV Done
3,182,326 UART: [fht] FMC Alias Private Key: 7
3,183,480 UART: [art] Derive CDI
3,183,760 UART: [art] Store in slot 0x4
3,269,612 UART: [art] Derive Key Pair
3,269,972 UART: [art] Store priv key in slot 0x5
3,283,691 UART: [art] Derive Key Pair - Done
3,298,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,657 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,422 UART: [art] PUB.X = D766B1A6FB9260F7ADC909A56087B5BBCE551354D3960DFA252B9E514F7AC324C9426E53A5F34922AB42AC33847A4B02
3,321,189 UART: [art] PUB.Y = A8A10BA2F5BAB49B0FCCDBB3103DB6F58E5C3193757D30E4BED80D8A054482389B734EDA28655450432C9D98D2A652A7
3,328,137 UART: [art] SIG.R = 0B42D8EF5E10627C26FA811F3521E911C4690C954F7A28ADD66A05EF6E76481B9B61F986F10663AF95014168D9F91265
3,334,888 UART: [art] SIG.S = 1DFF46578B6B4554D8715B5DB91FA1E4E5638D7757A9C2A3D640E658F27C26B47D012DEE0B08AA89B00F1185FA9CD0FE
3,358,522 UART: Caliptra RT
3,358,865 UART: [state] CFI Enabled
3,479,001 UART: [rt] RT listening for mailbox commands...
3,479,671 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,111 UART: [rt]cmd =0x4d454153, len=108
3,511,656 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,390 UART: [kat] SHA2-256
901,330 UART: [kat] SHA2-384
904,189 UART: [kat] SHA2-512-ACC
906,090 UART: [kat] ECC-384
915,487 UART: [kat] HMAC-384Kdf
919,859 UART: [kat] LMS
1,168,171 UART: [kat] --
1,169,242 UART: [cold-reset] ++
1,169,596 UART: [fht] FHT @ 0x50003400
1,172,106 UART: [idev] ++
1,172,274 UART: [idev] CDI.KEYID = 6
1,172,635 UART: [idev] SUBJECT.KEYID = 7
1,173,060 UART: [idev] UDS.KEYID = 0
1,173,406 ready_for_fw is high
1,173,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,465 UART: [idev] Sha1 KeyId Algorithm
1,207,387 UART: [idev] --
1,208,522 UART: [ldev] ++
1,208,690 UART: [ldev] CDI.KEYID = 6
1,209,054 UART: [ldev] SUBJECT.KEYID = 5
1,209,481 UART: [ldev] AUTHORITY.KEYID = 7
1,209,944 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,238 UART: [ldev] --
1,280,521 UART: [fwproc] Wait for Commands...
1,281,282 UART: [fwproc] Recv command 0x46574c44
1,282,015 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,131 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,306 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,613 >>> mbox cmd response: success
2,826,683 UART: [afmc] ++
2,826,851 UART: [afmc] CDI.KEYID = 6
2,827,214 UART: [afmc] SUBJECT.KEYID = 7
2,827,640 UART: [afmc] AUTHORITY.KEYID = 5
2,863,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,804 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,553 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,263 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,144 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,845 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,680 UART: [afmc] --
2,906,567 UART: [cold-reset] --
2,907,387 UART: [state] Locking Datavault
2,908,642 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,246 UART: [state] Locking ICCM
2,909,794 UART: [exit] Launching FMC @ 0x40000130
2,915,124 UART:
2,915,140 UART: Running Caliptra FMC ...
2,915,548 UART:
2,915,602 UART: [state] CFI Enabled
2,926,110 UART: [fht] FMC Alias Private Key: 7
3,045,072 UART: [art] Extend RT PCRs Done
3,045,500 UART: [art] Lock RT PCRs Done
3,047,088 UART: [art] Populate DV Done
3,055,219 UART: [fht] FMC Alias Private Key: 7
3,056,223 UART: [art] Derive CDI
3,056,503 UART: [art] Store in slot 0x4
3,142,198 UART: [art] Derive Key Pair
3,142,558 UART: [art] Store priv key in slot 0x5
3,155,796 UART: [art] Derive Key Pair - Done
3,170,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,792 UART: [art] PUB.X = 9E7611DC28BE9AB9728B95EB5B6F5C9A0012A3CD91FA1CE9389EBB34549A068B3765BD79C7FE2849412E2BB75C315126
3,193,545 UART: [art] PUB.Y = B12B450350138F79B9E53627CE66D6FE1F0B24AF6B2925F4ABD07E8AB6E2C22E67A8BE2428D4966AF077C5EAD140CF71
3,200,501 UART: [art] SIG.R = 2AAD813076D7A6EDC50FEBF7AD6E410E9CDF859B2654F4C6D3A4F64F137FF60B1BDC5B936DD2E9732933A250B647C74A
3,207,280 UART: [art] SIG.S = EEAE11DBBF48133245F4FF2D952C816EDAE32521B46C723A3786CC564FE91A33C5E76CC1885F61C212E3D5B4D9E6752F
3,231,584 UART: Caliptra RT
3,231,835 UART: [state] CFI Enabled
3,351,513 UART: [rt] RT listening for mailbox commands...
3,352,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,795 UART: [rt]cmd =0x4d454153, len=108
3,384,366 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,630 ready_for_fw is high
1,058,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,526 >>> mbox cmd response: success
2,738,565 UART:
2,738,581 UART: Running Caliptra FMC ...
2,738,989 UART:
2,739,043 UART: [state] CFI Enabled
2,749,527 UART: [fht] FMC Alias Private Key: 7
2,868,449 UART: [art] Extend RT PCRs Done
2,868,877 UART: [art] Lock RT PCRs Done
2,870,769 UART: [art] Populate DV Done
2,878,966 UART: [fht] FMC Alias Private Key: 7
2,880,138 UART: [art] Derive CDI
2,880,418 UART: [art] Store in slot 0x4
2,966,133 UART: [art] Derive Key Pair
2,966,493 UART: [art] Store priv key in slot 0x5
2,980,087 UART: [art] Derive Key Pair - Done
2,994,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,931 UART: [art] PUB.X = 5496E3675547E3C45B959D82EA389405D293329E9DF6ACEC7054E5C8D23416EC664E25FAEB44A570120C03C364DBE97E
3,017,694 UART: [art] PUB.Y = 9091864F663C4E96A4619699CBBBD4859A2604BF7DB23DC489EFA915EBE4E869CB88375CA1A48EB8CC81102F697DA8CE
3,024,653 UART: [art] SIG.R = A837B51D1F330414EAEE5F9579CBB42087DCA3C7805681C5393AA3A9D35FE006726247AEA3F5EF303F1AA95ED46DB9AE
3,031,431 UART: [art] SIG.S = 2F9F4C78D86388B25F8E392D2A170636A7284A0DB46DC15F12D9444B4CA3374B3F7FAE6864FB9708A4F7339660EA8FB4
3,055,596 UART: Caliptra RT
3,055,847 UART: [state] CFI Enabled
3,176,145 UART: [rt] RT listening for mailbox commands...
3,176,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,833 UART: [rt]cmd =0x4d454153, len=108
3,208,122 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,871 UART: [kat] SHA2-256
891,421 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,525 UART: [kat] ++
895,677 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,656 UART: [kat] HMAC-384Kdf
921,356 UART: [kat] LMS
1,169,668 UART: [kat] --
1,170,367 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,451 UART: [idev] ++
1,173,619 UART: [idev] CDI.KEYID = 6
1,173,980 UART: [idev] SUBJECT.KEYID = 7
1,174,405 UART: [idev] UDS.KEYID = 0
1,174,751 ready_for_fw is high
1,174,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,358 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,076 UART: [idev] --
1,209,321 UART: [ldev] ++
1,209,489 UART: [ldev] CDI.KEYID = 6
1,209,853 UART: [ldev] SUBJECT.KEYID = 5
1,210,280 UART: [ldev] AUTHORITY.KEYID = 7
1,210,743 UART: [ldev] FE.KEYID = 1
1,216,153 UART: [ldev] Erasing FE.KEYID = 1
1,242,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,497 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,387 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,594 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,769 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,990 >>> mbox cmd response: success
2,827,182 UART: [afmc] ++
2,827,350 UART: [afmc] CDI.KEYID = 6
2,827,713 UART: [afmc] SUBJECT.KEYID = 7
2,828,139 UART: [afmc] AUTHORITY.KEYID = 5
2,863,954 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,279 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,028 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,738 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,619 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,320 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,015 UART: [afmc] --
2,907,034 UART: [cold-reset] --
2,907,944 UART: [state] Locking Datavault
2,909,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,727 UART: [state] Locking ICCM
2,910,303 UART: [exit] Launching FMC @ 0x40000130
2,915,633 UART:
2,915,649 UART: Running Caliptra FMC ...
2,916,057 UART:
2,916,200 UART: [state] CFI Enabled
2,926,866 UART: [fht] FMC Alias Private Key: 7
3,045,636 UART: [art] Extend RT PCRs Done
3,046,064 UART: [art] Lock RT PCRs Done
3,047,558 UART: [art] Populate DV Done
3,055,669 UART: [fht] FMC Alias Private Key: 7
3,056,841 UART: [art] Derive CDI
3,057,121 UART: [art] Store in slot 0x4
3,142,762 UART: [art] Derive Key Pair
3,143,122 UART: [art] Store priv key in slot 0x5
3,156,612 UART: [art] Derive Key Pair - Done
3,171,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,145 UART: [art] PUB.X = FD2C450C3D3DAF11E71EEC951305A8053BE40115CE0C8BF87F8A9D4B92260DEC6A89EB4005A9AE8ABD66422D47C8DFE3
3,194,914 UART: [art] PUB.Y = 8E36274BB26A69D04D0D0FB4AFE9723C9DE0CD243F4ABF0A011695A52FEE6DF9B20E369BA88DD806DD25AA4BCF4C1677
3,201,868 UART: [art] SIG.R = CC5A289562884519C5D7820E16D2E5446D5564055AB9851806BF1801626D9341C60AD7E1FC3B1791160249DB4789DDB1
3,208,610 UART: [art] SIG.S = 275EED5D7B7F649B9DF40FC9FC810775C25BD692578459D2090BC28DED2D32FA6ECBA460A01D2BF399F51407B0FE9023
3,232,125 UART: Caliptra RT
3,232,468 UART: [state] CFI Enabled
3,352,572 UART: [rt] RT listening for mailbox commands...
3,353,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,584 UART: [rt]cmd =0x4d454153, len=108
3,385,007 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,853 ready_for_fw is high
1,058,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,881 >>> mbox cmd response: success
2,742,230 UART:
2,742,246 UART: Running Caliptra FMC ...
2,742,654 UART:
2,742,797 UART: [state] CFI Enabled
2,753,627 UART: [fht] FMC Alias Private Key: 7
2,872,607 UART: [art] Extend RT PCRs Done
2,873,035 UART: [art] Lock RT PCRs Done
2,874,509 UART: [art] Populate DV Done
2,882,914 UART: [fht] FMC Alias Private Key: 7
2,883,946 UART: [art] Derive CDI
2,884,226 UART: [art] Store in slot 0x4
2,969,847 UART: [art] Derive Key Pair
2,970,207 UART: [art] Store priv key in slot 0x5
2,983,487 UART: [art] Derive Key Pair - Done
2,998,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,921 UART: [art] PUB.X = 1788F37CF3E6B4341974E0A46AFCDC98F53E041EE151BF39FC8C2C44F00A7BB4910786F681039948092718C2E73E2F3A
3,021,678 UART: [art] PUB.Y = DC50F066CE3020FF4989810BA7FBB0F5837EE390E59ECF7216E3D487B76F7B307885974C5BBA98E8B8BB1D9BB7CE78D4
3,028,639 UART: [art] SIG.R = E9509102FFA366748AB945822AF111A8390D828AA73917716AF5E32C3462109D6DE5FCC0CA6A5FA401E95B3B22C88484
3,035,400 UART: [art] SIG.S = A9962A95ED4A5119E1AF77299673F065C89F3E82EA8752243B9AB2CA97E062A017E1E26AD1C278418359AE6DCFE1A8C0
3,059,102 UART: Caliptra RT
3,059,445 UART: [state] CFI Enabled
3,179,720 UART: [rt] RT listening for mailbox commands...
3,180,390 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,860 UART: [rt]cmd =0x4d454153, len=108
3,212,647 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,569 UART: [kat] SHA2-256
903,509 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,603 UART: [cold-reset] ++
1,172,005 UART: [fht] FHT @ 0x50003400
1,174,736 UART: [idev] ++
1,174,904 UART: [idev] CDI.KEYID = 6
1,175,264 UART: [idev] SUBJECT.KEYID = 7
1,175,688 UART: [idev] UDS.KEYID = 0
1,176,033 ready_for_fw is high
1,176,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,061 UART: [idev] Sha1 KeyId Algorithm
1,208,497 UART: [idev] --
1,209,491 UART: [ldev] ++
1,209,659 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,448 UART: [ldev] AUTHORITY.KEYID = 7
1,210,911 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,613 UART: [ldev] --
1,281,890 UART: [fwproc] Wait for Commands...
1,282,572 UART: [fwproc] Recv command 0x46574c44
1,283,300 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,671 >>> mbox cmd response: success
2,827,733 UART: [afmc] ++
2,827,901 UART: [afmc] CDI.KEYID = 6
2,828,263 UART: [afmc] SUBJECT.KEYID = 7
2,828,688 UART: [afmc] AUTHORITY.KEYID = 5
2,864,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,912 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,613 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,313 UART: [afmc] --
2,907,409 UART: [cold-reset] --
2,908,217 UART: [state] Locking Datavault
2,909,382 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,986 UART: [state] Locking ICCM
2,910,592 UART: [exit] Launching FMC @ 0x40000130
2,915,922 UART:
2,915,938 UART: Running Caliptra FMC ...
2,916,346 UART:
2,916,400 UART: [state] CFI Enabled
2,926,876 UART: [fht] FMC Alias Private Key: 7
3,045,938 UART: [art] Extend RT PCRs Done
3,046,366 UART: [art] Lock RT PCRs Done
3,047,750 UART: [art] Populate DV Done
3,056,075 UART: [fht] FMC Alias Private Key: 7
3,057,253 UART: [art] Derive CDI
3,057,533 UART: [art] Store in slot 0x4
3,143,402 UART: [art] Derive Key Pair
3,143,762 UART: [art] Store priv key in slot 0x5
3,157,138 UART: [art] Derive Key Pair - Done
3,171,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,814 UART: [art] PUB.X = 28A84F78D040AFFF697F78392DC3880F192D14390EE5F95998BEDCBF49DA95D6C74BDC31847F29B62A72D27089466813
3,194,580 UART: [art] PUB.Y = 0BDF27C7084ADDFA3D7FAFCEE05852CD7CEBB5341985BBB31282B8526874D0D89129EC13F14DDF90D3316DECB4E1BB1B
3,201,548 UART: [art] SIG.R = E0AEB009E937451D09A22A1BFC702A3F8647172B514F981A7F27AE477CF5B8D01D4D75F3E3520DFD79D3ED8468D07698
3,208,315 UART: [art] SIG.S = A6FBEEC3C973F344AC0F49D5152A2895E447F8859595E7B25D8E62D5ECF3747A4D4329137E61C826E763579F27D8A781
3,232,150 UART: Caliptra RT
3,232,401 UART: [state] CFI Enabled
3,352,754 UART: [rt] RT listening for mailbox commands...
3,353,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,772 UART: [rt]cmd =0x4d454153, len=108
3,385,537 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,083 ready_for_fw is high
1,060,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,154 >>> mbox cmd response: success
2,743,727 UART:
2,743,743 UART: Running Caliptra FMC ...
2,744,151 UART:
2,744,205 UART: [state] CFI Enabled
2,754,473 UART: [fht] FMC Alias Private Key: 7
2,873,429 UART: [art] Extend RT PCRs Done
2,873,857 UART: [art] Lock RT PCRs Done
2,875,569 UART: [art] Populate DV Done
2,883,542 UART: [fht] FMC Alias Private Key: 7
2,884,532 UART: [art] Derive CDI
2,884,812 UART: [art] Store in slot 0x4
2,970,453 UART: [art] Derive Key Pair
2,970,813 UART: [art] Store priv key in slot 0x5
2,983,803 UART: [art] Derive Key Pair - Done
2,998,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,647 UART: [art] PUB.X = A23432175331F0098F5EC039078943321E7FABC92246629CD8AF06DB873169ECC5A1AFE81F5C389E6914E64046DD3FEE
3,021,410 UART: [art] PUB.Y = 765A095F82BAFF0BA1726B44C6505D3157365C4777E740907D93D30855884411F37E365BD1CE1E2DE40E451C7047C23B
3,028,342 UART: [art] SIG.R = 3DC85CCD41F5597F6D959D0C592181760B4744823451B5113B2733F36DEE7693100424B2894C83DCB5F3CA43D1A2803F
3,035,097 UART: [art] SIG.S = 485C2776D452BC7A91E1136946B6C513DFB77F3E192986A1FDF6DA13A9C1AABEB8D9B2CF53CF185ED18208A459A7F2C9
3,058,884 UART: Caliptra RT
3,059,135 UART: [state] CFI Enabled
3,179,734 UART: [rt] RT listening for mailbox commands...
3,180,404 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,894 UART: [rt]cmd =0x4d454153, len=108
3,212,223 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,145 UART: [state] LifecycleState = Unprovisioned
85,800 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,715 UART: [kat] SHA2-256
893,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,490 UART: [kat] ++
897,642 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,699 UART: [kat] SHA2-512-ACC
908,600 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,146 UART: [cold-reset] ++
1,172,570 UART: [fht] FHT @ 0x50003400
1,175,151 UART: [idev] ++
1,175,319 UART: [idev] CDI.KEYID = 6
1,175,679 UART: [idev] SUBJECT.KEYID = 7
1,176,103 UART: [idev] UDS.KEYID = 0
1,176,448 ready_for_fw is high
1,176,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,931 UART: [idev] Erasing UDS.KEYID = 0
1,201,190 UART: [idev] Sha1 KeyId Algorithm
1,209,624 UART: [idev] --
1,210,558 UART: [ldev] ++
1,210,726 UART: [ldev] CDI.KEYID = 6
1,211,089 UART: [ldev] SUBJECT.KEYID = 5
1,211,515 UART: [ldev] AUTHORITY.KEYID = 7
1,211,978 UART: [ldev] FE.KEYID = 1
1,217,076 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,509 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,734 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,859 UART: [fwproc] Recv command 0x46574c44
1,284,587 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,570 >>> mbox cmd response: success
2,829,768 UART: [afmc] ++
2,829,936 UART: [afmc] CDI.KEYID = 6
2,830,298 UART: [afmc] SUBJECT.KEYID = 7
2,830,723 UART: [afmc] AUTHORITY.KEYID = 5
2,865,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,183 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,931 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,523 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,224 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,932 UART: [afmc] --
2,908,856 UART: [cold-reset] --
2,909,504 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,835 UART: [exit] Launching FMC @ 0x40000130
2,917,165 UART:
2,917,181 UART: Running Caliptra FMC ...
2,917,589 UART:
2,917,732 UART: [state] CFI Enabled
2,928,006 UART: [fht] FMC Alias Private Key: 7
3,046,716 UART: [art] Extend RT PCRs Done
3,047,144 UART: [art] Lock RT PCRs Done
3,048,640 UART: [art] Populate DV Done
3,057,063 UART: [fht] FMC Alias Private Key: 7
3,058,029 UART: [art] Derive CDI
3,058,309 UART: [art] Store in slot 0x4
3,144,146 UART: [art] Derive Key Pair
3,144,506 UART: [art] Store priv key in slot 0x5
3,157,308 UART: [art] Derive Key Pair - Done
3,171,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,968 UART: [art] PUB.X = 918E4B161385275F63F608BFB71ED6809D7D36D30C007E159EE1D8EF69774C9A9E7BDA413A1FA6F80E5ABB0141CD2449
3,194,712 UART: [art] PUB.Y = FF051F5536DD315578BD9FB941D44A074FBF3FD49556569A6CB13F02A1FFC8169B4910973B0E30D4B9CE8F04633C7016
3,201,651 UART: [art] SIG.R = 73BF6CF1B804C38E8312C45BC80EDEF28F9697CFE059110D991800A76415A30DC634567EB4A6D51EB9FC8D03BE96821B
3,208,392 UART: [art] SIG.S = 1AE63C9942CA37254E7221C441650BD4D1C4D4A84A7EEAFB6F1F2F3DFD8974B207BDECF05D64169340FB845DD5E2A0FF
3,232,178 UART: Caliptra RT
3,232,521 UART: [state] CFI Enabled
3,352,638 UART: [rt] RT listening for mailbox commands...
3,353,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,722 UART: [rt]cmd =0x4d454153, len=108
3,385,065 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,678 ready_for_fw is high
1,060,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,237 >>> mbox cmd response: success
2,742,208 UART:
2,742,224 UART: Running Caliptra FMC ...
2,742,632 UART:
2,742,775 UART: [state] CFI Enabled
2,753,687 UART: [fht] FMC Alias Private Key: 7
2,871,855 UART: [art] Extend RT PCRs Done
2,872,283 UART: [art] Lock RT PCRs Done
2,874,167 UART: [art] Populate DV Done
2,882,396 UART: [fht] FMC Alias Private Key: 7
2,883,330 UART: [art] Derive CDI
2,883,610 UART: [art] Store in slot 0x4
2,969,331 UART: [art] Derive Key Pair
2,969,691 UART: [art] Store priv key in slot 0x5
2,983,159 UART: [art] Derive Key Pair - Done
2,997,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,270 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,035 UART: [art] PUB.X = EB7C87EC911EF1F0004D1EB1EB08C09C98B3CBD897BF50D98CDDDB770865305424B6F7F27EEA95ABCDC51F35BBEEB7A0
3,020,805 UART: [art] PUB.Y = F8F743EF47AB60F83C2BA6C6763A489179D2A11F48E78C15DAFFF8B5F2D8874959172EB1764B7564E82B67641D7AAB4F
3,027,763 UART: [art] SIG.R = DDCB455E674027524289A2E01B642144396B0175CD309F0A47A915C3E94D7F8520D29FB15BB5E7FB7EFF9D0FD648092A
3,034,525 UART: [art] SIG.S = D6721152707EF1317F929DCF14ABE5C2EE7903824E5AD242148D954600897282CC6DAAB35FB25C8BB1C21B4DE005755B
3,057,865 UART: Caliptra RT
3,058,208 UART: [state] CFI Enabled
3,177,935 UART: [rt] RT listening for mailbox commands...
3,178,605 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,239 UART: [rt]cmd =0x4d454153, len=108
3,210,690 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_cannot_be_called_from_pl1 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,217 UART:
192,575 UART: Running Caliptra ROM ...
193,758 UART:
193,913 UART: [state] CFI Enabled
262,882 UART: [state] LifecycleState = Unprovisioned
264,871 UART: [state] DebugLocked = No
266,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,521 UART: [kat] SHA2-256
442,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,681 UART: [kat] ++
453,242 UART: [kat] sha1
463,268 UART: [kat] SHA2-256
465,934 UART: [kat] SHA2-384
471,602 UART: [kat] SHA2-512-ACC
474,011 UART: [kat] ECC-384
2,767,267 UART: [kat] HMAC-384Kdf
2,799,406 UART: [kat] LMS
3,989,715 UART: [kat] --
3,993,319 UART: [cold-reset] ++
3,995,497 UART: [fht] Storing FHT @ 0x50003400
4,006,906 UART: [idev] ++
4,007,486 UART: [idev] CDI.KEYID = 6
4,008,421 UART: [idev] SUBJECT.KEYID = 7
4,009,676 UART: [idev] UDS.KEYID = 0
4,010,721 ready_for_fw is high
4,010,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,018 UART: [idev] Erasing UDS.KEYID = 0
7,343,726 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,574 UART: [idev] --
7,368,820 UART: [ldev] ++
7,369,448 UART: [ldev] CDI.KEYID = 6
7,370,331 UART: [ldev] SUBJECT.KEYID = 5
7,371,598 UART: [ldev] AUTHORITY.KEYID = 7
7,372,835 UART: [ldev] FE.KEYID = 1
7,411,859 UART: [ldev] Erasing FE.KEYID = 1
10,746,830 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,135 UART: [ldev] --
13,131,199 UART: [fwproc] Waiting for Commands...
13,133,510 UART: [fwproc] Received command 0x46574c44
13,135,688 UART: [fwproc] Received Image of size 118548 bytes
17,239,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,313,208 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,386,385 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,714,381 >>> mbox cmd response: success
17,718,317 UART: [afmc] ++
17,718,941 UART: [afmc] CDI.KEYID = 6
17,719,859 UART: [afmc] SUBJECT.KEYID = 7
17,721,080 UART: [afmc] AUTHORITY.KEYID = 5
21,078,583 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,377,883 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,380,155 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,394,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,409,298 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,423,700 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,446,533 UART: [afmc] --
23,450,253 UART: [cold-reset] --
23,453,578 UART: [state] Locking Datavault
23,459,633 UART: [state] Locking PCR0, PCR1 and PCR31
23,461,329 UART: [state] Locking ICCM
23,463,698 UART: [exit] Launching FMC @ 0x40000130
23,472,091 UART:
23,472,328 UART: Running Caliptra FMC ...
23,473,426 UART:
23,473,585 UART: [state] CFI Enabled
23,539,985 UART: [fht] FMC Alias Private Key: 7
25,901,815 UART: [art] Extend RT PCRs Done
25,903,062 UART: [art] Lock RT PCRs Done
25,904,884 UART: [art] Populate DV Done
25,910,138 UART: [fht] FMC Alias Private Key: 7
25,911,717 UART: [art] Derive CDI
25,912,463 UART: [art] Store in slot 0x4
25,970,584 UART: [art] Derive Key Pair
25,971,589 UART: [art] Store priv key in slot 0x5
29,264,244 UART: [art] Derive Key Pair - Done
29,276,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,412 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,922 UART: [art] PUB.X = 45E30A370E32553F85185E960BF31C90A4C58A3F05A790AF843BD751350A8EC9BEC86E4CA0B00CC3AA73BABF20833759
31,575,217 UART: [art] PUB.Y = 10CB3A66E8CB371D6EAC7954844D3B67E871CE7D9CDD655F560D0B3B4662BEEDFDE3A721F4EC3E027242BDE5E113C351
31,582,505 UART: [art] SIG.R = A298075ADCD4C60755881037B5A14057D9F81BCEC060B94CA67F9FBFF92D30E6A393F8A8BA2E51A333055879FF6CE52E
31,589,893 UART: [art] SIG.S = 291E24882D862B6B6496929924701DF60DC9A6A47940C894134F042BA49D2B7AAE8B9EDC04B6EA3F65E14345CFE700D4
32,895,293 UART: Caliptra RT
32,896,010 UART: [state] CFI Enabled
33,092,290 UART: [rt] RT listening for mailbox commands...
33,094,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,124,970 UART: [rt]cmd =0x4d454153, len=108
33,144,152 >>> mbox cmd response data (12 bytes)
33,144,669 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,175,478 UART: [rt]cmd =0x4d454153, len=108
33,194,195 >>> mbox cmd response data (12 bytes)
33,194,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,225,377 UART: [rt]cmd =0x4d454153, len=108
33,243,332 >>> mbox cmd response data (12 bytes)
33,243,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,274,243 UART: [rt]cmd =0x4d454153, len=108
33,293,792 >>> mbox cmd response data (12 bytes)
33,294,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,325,012 UART: [rt]cmd =0x4d454153, len=108
33,343,456 >>> mbox cmd response data (12 bytes)
33,343,894 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,374,662 UART: [rt]cmd =0x4d454153, len=108
33,393,621 >>> mbox cmd response data (12 bytes)
33,394,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,424,806 UART: [rt]cmd =0x4d454153, len=108
33,444,117 >>> mbox cmd response data (12 bytes)
33,444,577 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,475,276 UART: [rt]cmd =0x4d454153, len=108
33,494,145 >>> mbox cmd response data (12 bytes)
33,494,563 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,525,213 UART: [rt]cmd =0x4d454153, len=108
33,544,055 >>> mbox cmd response data (12 bytes)
33,544,487 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,575,395 UART: [rt]cmd =0x4d454153, len=108
33,594,328 >>> mbox cmd response data (12 bytes)
33,594,786 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,625,577 UART: [rt]cmd =0x4d454153, len=108
33,645,153 >>> mbox cmd response data (12 bytes)
33,645,573 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,676,115 UART: [rt]cmd =0x4d454153, len=108
33,695,182 >>> mbox cmd response data (12 bytes)
33,695,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,726,080 UART: [rt]cmd =0x4d454153, len=108
33,744,791 >>> mbox cmd response data (12 bytes)
33,745,211 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,776,020 UART: [rt]cmd =0x4d454153, len=108
33,794,659 >>> mbox cmd response data (12 bytes)
33,795,084 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,825,673 UART: [rt]cmd =0x4d454153, len=108
33,828,049 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,739 writing to cptra_bootfsm_go
3,786,185 ready_for_fw is high
3,786,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,955,164 >>> mbox cmd response: success
23,641,536 UART:
23,641,927 UART: Running Caliptra FMC ...
23,643,125 UART:
23,643,299 UART: [state] CFI Enabled
23,713,363 UART: [fht] FMC Alias Private Key: 7
26,053,421 UART: [art] Extend RT PCRs Done
26,054,651 UART: [art] Lock RT PCRs Done
26,056,335 UART: [art] Populate DV Done
26,061,806 UART: [fht] FMC Alias Private Key: 7
26,063,510 UART: [art] Derive CDI
26,064,327 UART: [art] Store in slot 0x4
26,121,374 UART: [art] Derive Key Pair
26,122,419 UART: [art] Store priv key in slot 0x5
29,415,171 UART: [art] Derive Key Pair - Done
29,428,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,716,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,717,558 UART: [art] PUB.X = 1BA6E8904C9AA0F9A5F51CD82944B6DBAA4147447BCD0CE3B388EE0F80D98235839BE3D60E3901ACEB7CA0EE9A362405
31,724,866 UART: [art] PUB.Y = 3AB588F785A430C639450B35781BE19C3201226DAA1EE7E53A8627CE2297136042747F023D38B84AC87A5D28E11B674A
31,732,060 UART: [art] SIG.R = 012951634171742F5B251CA55538CF794D519540B4B31D2BCCECC2ED2EF07C373DB32056AAABEA24BDBBD2179997C122
31,739,454 UART: [art] SIG.S = F4D41B2D3A8E9CA51658CD95DE7FB08B5B312DB4C988C1AB041013FE6F3FFD05ACFCE7DC564794B39DB9CB00D384128D
33,044,701 UART: Caliptra RT
33,045,406 UART: [state] CFI Enabled
33,222,413 UART: [rt] RT listening for mailbox commands...
33,224,308 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,255,298 UART: [rt]cmd =0x4d454153, len=108
33,274,070 >>> mbox cmd response data (12 bytes)
33,274,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,305,073 UART: [rt]cmd =0x4d454153, len=108
33,323,450 >>> mbox cmd response data (12 bytes)
33,323,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,354,734 UART: [rt]cmd =0x4d454153, len=108
33,374,062 >>> mbox cmd response data (12 bytes)
33,374,537 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,405,129 UART: [rt]cmd =0x4d454153, len=108
33,424,535 >>> mbox cmd response data (12 bytes)
33,424,944 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,455,705 UART: [rt]cmd =0x4d454153, len=108
33,475,105 >>> mbox cmd response data (12 bytes)
33,475,545 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,506,511 UART: [rt]cmd =0x4d454153, len=108
33,524,946 >>> mbox cmd response data (12 bytes)
33,525,399 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,556,099 UART: [rt]cmd =0x4d454153, len=108
33,574,007 >>> mbox cmd response data (12 bytes)
33,574,426 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,605,184 UART: [rt]cmd =0x4d454153, len=108
33,624,625 >>> mbox cmd response data (12 bytes)
33,625,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,655,472 UART: [rt]cmd =0x4d454153, len=108
33,673,966 >>> mbox cmd response data (12 bytes)
33,674,379 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,704,926 UART: [rt]cmd =0x4d454153, len=108
33,724,264 >>> mbox cmd response data (12 bytes)
33,724,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,755,554 UART: [rt]cmd =0x4d454153, len=108
33,774,376 >>> mbox cmd response data (12 bytes)
33,774,830 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,805,368 UART: [rt]cmd =0x4d454153, len=108
33,824,017 >>> mbox cmd response data (12 bytes)
33,824,438 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,855,140 UART: [rt]cmd =0x4d454153, len=108
33,874,100 >>> mbox cmd response data (12 bytes)
33,874,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,905,026 UART: [rt]cmd =0x4d454153, len=108
33,923,957 >>> mbox cmd response data (12 bytes)
33,924,405 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,954,937 UART: [rt]cmd =0x4d454153, len=108
33,957,207 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,369 UART:
192,725 UART: Running Caliptra ROM ...
193,860 UART:
603,611 UART: [state] CFI Enabled
617,494 UART: [state] LifecycleState = Unprovisioned
619,439 UART: [state] DebugLocked = No
621,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,310 UART: [kat] SHA2-256
796,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,612 UART: [kat] ++
807,086 UART: [kat] sha1
818,526 UART: [kat] SHA2-256
821,178 UART: [kat] SHA2-384
826,671 UART: [kat] SHA2-512-ACC
829,034 UART: [kat] ECC-384
3,114,192 UART: [kat] HMAC-384Kdf
3,126,987 UART: [kat] LMS
4,317,142 UART: [kat] --
4,322,506 UART: [cold-reset] ++
4,324,596 UART: [fht] Storing FHT @ 0x50003400
4,335,007 UART: [idev] ++
4,335,573 UART: [idev] CDI.KEYID = 6
4,336,601 UART: [idev] SUBJECT.KEYID = 7
4,337,770 UART: [idev] UDS.KEYID = 0
4,338,839 ready_for_fw is high
4,339,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,541 UART: [idev] Erasing UDS.KEYID = 0
7,628,977 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,762 UART: [idev] --
7,654,049 UART: [ldev] ++
7,654,627 UART: [ldev] CDI.KEYID = 6
7,655,586 UART: [ldev] SUBJECT.KEYID = 5
7,656,795 UART: [ldev] AUTHORITY.KEYID = 7
7,658,019 UART: [ldev] FE.KEYID = 1
7,668,656 UART: [ldev] Erasing FE.KEYID = 1
10,954,858 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,034 UART: [ldev] --
13,316,418 UART: [fwproc] Waiting for Commands...
13,319,222 UART: [fwproc] Received command 0x46574c44
13,321,399 UART: [fwproc] Received Image of size 118548 bytes
17,428,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,064 >>> mbox cmd response: success
17,909,102 UART: [afmc] ++
17,909,692 UART: [afmc] CDI.KEYID = 6
17,910,599 UART: [afmc] SUBJECT.KEYID = 7
17,911,830 UART: [afmc] AUTHORITY.KEYID = 5
21,228,590 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,857 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,266 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,086 UART: [afmc] --
23,595,689 UART: [cold-reset] --
23,598,360 UART: [state] Locking Datavault
23,604,416 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,162 UART: [state] Locking ICCM
23,608,252 UART: [exit] Launching FMC @ 0x40000130
23,616,646 UART:
23,616,883 UART: Running Caliptra FMC ...
23,617,978 UART:
23,618,150 UART: [state] CFI Enabled
23,626,254 UART: [fht] FMC Alias Private Key: 7
25,966,261 UART: [art] Extend RT PCRs Done
25,967,483 UART: [art] Lock RT PCRs Done
25,969,025 UART: [art] Populate DV Done
25,974,434 UART: [fht] FMC Alias Private Key: 7
25,975,912 UART: [art] Derive CDI
25,976,640 UART: [art] Store in slot 0x4
26,019,602 UART: [art] Derive Key Pair
26,020,596 UART: [art] Store priv key in slot 0x5
29,262,878 UART: [art] Derive Key Pair - Done
29,275,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,117 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,628 UART: [art] PUB.X = 6B7E9A4044331980EA22C352BCEE3E959FC5051375195547C9A058DA405B61A47E61F4038CACFE707915DFA85C383287
31,564,880 UART: [art] PUB.Y = 94A1F75A4958B5F60E44248C4D9469BEBD415768B9C8CF8FA157B25FBE877BD3EA7FCA6186096CC90B21FA677004D3CF
31,572,158 UART: [art] SIG.R = 1B32888359D1415B0AD2EE94BB153069846336A00D147AA1CE22B39C7381921999FC2BB3693E375FD0CF405BBD928A6F
31,579,563 UART: [art] SIG.S = FB4C02AEE260AF9E0BAE52B6417B97E7DE640DBA8CB80F4620246705DC3ED512DAE90868FB57052B1FF17D445454124C
32,884,951 UART: Caliptra RT
32,885,664 UART: [state] CFI Enabled
33,018,509 UART: [rt] RT listening for mailbox commands...
33,020,409 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,051,172 UART: [rt]cmd =0x4d454153, len=108
33,069,942 >>> mbox cmd response data (12 bytes)
33,070,678 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,101,602 UART: [rt]cmd =0x4d454153, len=108
33,120,159 >>> mbox cmd response data (12 bytes)
33,120,582 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,151,390 UART: [rt]cmd =0x4d454153, len=108
33,169,481 >>> mbox cmd response data (12 bytes)
33,169,898 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,200,423 UART: [rt]cmd =0x4d454153, len=108
33,219,126 >>> mbox cmd response data (12 bytes)
33,219,559 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,250,266 UART: [rt]cmd =0x4d454153, len=108
33,269,277 >>> mbox cmd response data (12 bytes)
33,269,702 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,300,175 UART: [rt]cmd =0x4d454153, len=108
33,318,348 >>> mbox cmd response data (12 bytes)
33,318,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,349,436 UART: [rt]cmd =0x4d454153, len=108
33,367,712 >>> mbox cmd response data (12 bytes)
33,368,126 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,398,773 UART: [rt]cmd =0x4d454153, len=108
33,417,507 >>> mbox cmd response data (12 bytes)
33,417,932 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,448,513 UART: [rt]cmd =0x4d454153, len=108
33,466,832 >>> mbox cmd response data (12 bytes)
33,467,237 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,497,737 UART: [rt]cmd =0x4d454153, len=108
33,515,778 >>> mbox cmd response data (12 bytes)
33,516,206 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,546,790 UART: [rt]cmd =0x4d454153, len=108
33,565,450 >>> mbox cmd response data (12 bytes)
33,565,906 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,596,382 UART: [rt]cmd =0x4d454153, len=108
33,614,928 >>> mbox cmd response data (12 bytes)
33,615,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,646,099 UART: [rt]cmd =0x4d454153, len=108
33,664,135 >>> mbox cmd response data (12 bytes)
33,664,606 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,695,195 UART: [rt]cmd =0x4d454153, len=108
33,714,669 >>> mbox cmd response data (12 bytes)
33,715,119 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,745,809 UART: [rt]cmd =0x4d454153, len=108
33,748,153 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
4,132,348 ready_for_fw is high
4,132,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,116 >>> mbox cmd response: success
23,794,828 UART:
23,795,238 UART: Running Caliptra FMC ...
23,796,342 UART:
23,796,493 UART: [state] CFI Enabled
23,804,616 UART: [fht] FMC Alias Private Key: 7
26,144,786 UART: [art] Extend RT PCRs Done
26,146,031 UART: [art] Lock RT PCRs Done
26,147,722 UART: [art] Populate DV Done
26,153,304 UART: [fht] FMC Alias Private Key: 7
26,154,842 UART: [art] Derive CDI
26,155,651 UART: [art] Store in slot 0x4
26,198,349 UART: [art] Derive Key Pair
26,199,344 UART: [art] Store priv key in slot 0x5
29,440,915 UART: [art] Derive Key Pair - Done
29,453,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,990 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,486 UART: [art] PUB.X = 55637668A0BA7B5FA722261AA3D8284E63B5F2951B7856D69ACF1051E7FDBA5EEFAFA4E701D41EB6F3B3B35E1A9FF713
31,742,789 UART: [art] PUB.Y = E39D106DE0C116E9B9815B39A251D67303EDB22918F20089DCD0932CB65B11F40F50CEFCF8E87DAD27FF810BF8A2A3F1
31,750,027 UART: [art] SIG.R = D9869A0010E242DC9B54D9B90D144922D8B02071AFA612CF8870F1F89606B50F386AF3066E942B24C93A0067999A7647
31,757,367 UART: [art] SIG.S = 1F1894AC5A894784E42AB22B871999AD21B07481A1180423F09D98F3530E8A7DE6019E5F95BE97834F65729CDA80B367
33,062,713 UART: Caliptra RT
33,063,412 UART: [state] CFI Enabled
33,197,017 UART: [rt] RT listening for mailbox commands...
33,198,914 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,229,508 UART: [rt]cmd =0x4d454153, len=108
33,248,492 >>> mbox cmd response data (12 bytes)
33,249,003 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,279,399 UART: [rt]cmd =0x4d454153, len=108
33,298,316 >>> mbox cmd response data (12 bytes)
33,298,765 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,329,396 UART: [rt]cmd =0x4d454153, len=108
33,348,096 >>> mbox cmd response data (12 bytes)
33,348,547 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,379,077 UART: [rt]cmd =0x4d454153, len=108
33,397,196 >>> mbox cmd response data (12 bytes)
33,397,616 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,428,319 UART: [rt]cmd =0x4d454153, len=108
33,447,457 >>> mbox cmd response data (12 bytes)
33,447,902 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,478,828 UART: [rt]cmd =0x4d454153, len=108
33,497,708 >>> mbox cmd response data (12 bytes)
33,498,164 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,528,804 UART: [rt]cmd =0x4d454153, len=108
33,547,029 >>> mbox cmd response data (12 bytes)
33,547,446 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,578,164 UART: [rt]cmd =0x4d454153, len=108
33,597,018 >>> mbox cmd response data (12 bytes)
33,597,447 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,627,919 UART: [rt]cmd =0x4d454153, len=108
33,646,452 >>> mbox cmd response data (12 bytes)
33,646,867 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,677,457 UART: [rt]cmd =0x4d454153, len=108
33,696,144 >>> mbox cmd response data (12 bytes)
33,696,567 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,727,154 UART: [rt]cmd =0x4d454153, len=108
33,745,862 >>> mbox cmd response data (12 bytes)
33,746,322 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,777,068 UART: [rt]cmd =0x4d454153, len=108
33,795,443 >>> mbox cmd response data (12 bytes)
33,795,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,826,518 UART: [rt]cmd =0x4d454153, len=108
33,846,053 >>> mbox cmd response data (12 bytes)
33,846,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,877,080 UART: [rt]cmd =0x4d454153, len=108
33,894,987 >>> mbox cmd response data (12 bytes)
33,895,442 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,926,241 UART: [rt]cmd =0x4d454153, len=108
33,928,837 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,179 UART:
192,536 UART: Running Caliptra ROM ...
193,716 UART:
193,871 UART: [state] CFI Enabled
265,847 UART: [state] LifecycleState = Unprovisioned
267,828 UART: [state] DebugLocked = No
269,925 UART: [state] WD Timer not started. Device not locked for debugging
273,390 UART: [kat] SHA2-256
452,993 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,807 UART: [kat] ++
464,285 UART: [kat] sha1
475,375 UART: [kat] SHA2-256
478,044 UART: [kat] SHA2-384
484,602 UART: [kat] SHA2-512-ACC
486,964 UART: [kat] ECC-384
2,947,935 UART: [kat] HMAC-384Kdf
2,969,844 UART: [kat] LMS
3,446,379 UART: [kat] --
3,449,806 UART: [cold-reset] ++
3,451,588 UART: [fht] FHT @ 0x50003400
3,463,363 UART: [idev] ++
3,463,931 UART: [idev] CDI.KEYID = 6
3,464,838 UART: [idev] SUBJECT.KEYID = 7
3,466,076 UART: [idev] UDS.KEYID = 0
3,467,121 ready_for_fw is high
3,467,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,368 UART: [idev] Erasing UDS.KEYID = 0
5,987,315 UART: [idev] Sha1 KeyId Algorithm
6,011,065 UART: [idev] --
6,015,121 UART: [ldev] ++
6,015,691 UART: [ldev] CDI.KEYID = 6
6,016,635 UART: [ldev] SUBJECT.KEYID = 5
6,017,845 UART: [ldev] AUTHORITY.KEYID = 7
6,019,074 UART: [ldev] FE.KEYID = 1
6,057,913 UART: [ldev] Erasing FE.KEYID = 1
8,564,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,941 UART: [ldev] --
10,372,255 UART: [fwproc] Wait for Commands...
10,374,513 UART: [fwproc] Recv command 0x46574c44
10,376,495 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,583 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,487 >>> mbox cmd response: success
14,347,786 UART: [afmc] ++
14,348,408 UART: [afmc] CDI.KEYID = 6
14,349,316 UART: [afmc] SUBJECT.KEYID = 7
14,350,532 UART: [afmc] AUTHORITY.KEYID = 5
16,896,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,691 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,866 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,760 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,307 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,142 UART: [afmc] --
18,715,904 UART: [cold-reset] --
18,719,980 UART: [state] Locking Datavault
18,725,934 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,680 UART: [state] Locking ICCM
18,730,475 UART: [exit] Launching FMC @ 0x40000130
18,738,920 UART:
18,739,152 UART: Running Caliptra FMC ...
18,740,248 UART:
18,740,406 UART: [state] CFI Enabled
18,796,026 UART: [fht] FMC Alias Private Key: 7
20,562,645 UART: [art] Extend RT PCRs Done
20,563,856 UART: [art] Lock RT PCRs Done
20,565,432 UART: [art] Populate DV Done
20,570,570 UART: [fht] FMC Alias Private Key: 7
20,572,263 UART: [art] Derive CDI
20,573,073 UART: [art] Store in slot 0x4
20,628,860 UART: [art] Derive Key Pair
20,629,900 UART: [art] Store priv key in slot 0x5
23,092,334 UART: [art] Derive Key Pair - Done
23,105,381 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,492 UART: [art] PUB.X = 5A1FD0DDBF6EDD3F81DE97824936B2AFA58CA651C867CF82FABFDEB639C2CEA45B4494034D7A4DB227433995D7099681
24,826,798 UART: [art] PUB.Y = D6109CD82B84EFCF22F75FF02D50FA371DA42ADA0F3AA616A59F64D058B19DCE1560820D9068B8D05AFDB8BD62AFDEBC
24,834,087 UART: [art] SIG.R = B13E3C3680FD260223F4FE368E6518F97745DE8B929FF22C6792E2C99E7CE8E11C07132C64CCAFD686F3025A5F99791F
24,841,474 UART: [art] SIG.S = 916C51FDDFFA7491CD41557BB3C9465370F27AF1003CB9983431174A2BFD7236C9B258BB70A9B81E278683D8A45DB41F
25,820,290 UART: Caliptra RT
25,820,988 UART: [state] CFI Enabled
26,000,796 UART: [rt] RT listening for mailbox commands...
26,002,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,033,338 UART: [rt]cmd =0x4d454153, len=108
26,052,318 >>> mbox cmd response data (12 bytes)
26,052,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,083,641 UART: [rt]cmd =0x4d454153, len=108
26,101,691 >>> mbox cmd response data (12 bytes)
26,102,127 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,132,717 UART: [rt]cmd =0x4d454153, len=108
26,150,834 >>> mbox cmd response data (12 bytes)
26,151,290 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,181,990 UART: [rt]cmd =0x4d454153, len=108
26,200,046 >>> mbox cmd response data (12 bytes)
26,200,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,230,923 UART: [rt]cmd =0x4d454153, len=108
26,250,209 >>> mbox cmd response data (12 bytes)
26,250,636 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,281,282 UART: [rt]cmd =0x4d454153, len=108
26,300,420 >>> mbox cmd response data (12 bytes)
26,300,838 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,331,700 UART: [rt]cmd =0x4d454153, len=108
26,350,553 >>> mbox cmd response data (12 bytes)
26,350,973 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,381,507 UART: [rt]cmd =0x4d454153, len=108
26,400,272 >>> mbox cmd response data (12 bytes)
26,400,734 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,431,267 UART: [rt]cmd =0x4d454153, len=108
26,450,349 >>> mbox cmd response data (12 bytes)
26,450,771 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,481,310 UART: [rt]cmd =0x4d454153, len=108
26,500,062 >>> mbox cmd response data (12 bytes)
26,500,498 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,531,248 UART: [rt]cmd =0x4d454153, len=108
26,549,740 >>> mbox cmd response data (12 bytes)
26,550,192 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,580,835 UART: [rt]cmd =0x4d454153, len=108
26,599,816 >>> mbox cmd response data (12 bytes)
26,600,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,630,765 UART: [rt]cmd =0x4d454153, len=108
26,649,394 >>> mbox cmd response data (12 bytes)
26,649,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,680,449 UART: [rt]cmd =0x4d454153, len=108
26,700,286 >>> mbox cmd response data (12 bytes)
26,700,697 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,731,179 UART: [rt]cmd =0x4d454153, len=108
26,733,835 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,460,924 ready_for_fw is high
3,461,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,271 >>> mbox cmd response: success
18,537,692 UART:
18,538,089 UART: Running Caliptra FMC ...
18,539,231 UART:
18,539,395 UART: [state] CFI Enabled
18,603,768 UART: [fht] FMC Alias Private Key: 7
20,370,268 UART: [art] Extend RT PCRs Done
20,371,486 UART: [art] Lock RT PCRs Done
20,373,356 UART: [art] Populate DV Done
20,378,788 UART: [fht] FMC Alias Private Key: 7
20,380,328 UART: [art] Derive CDI
20,381,141 UART: [art] Store in slot 0x4
20,436,551 UART: [art] Derive Key Pair
20,437,541 UART: [art] Store priv key in slot 0x5
22,900,973 UART: [art] Derive Key Pair - Done
22,913,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,881 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,382 UART: [art] PUB.X = 1800B0D3DD2DECC65FC48D3DED9AB17CB40C1197B8E0C8E17C3FCE791B760845326FE9FB2D2B71F4C339B88282BF61E0
24,635,641 UART: [art] PUB.Y = EBEB3C14636CC3F939F3B51FC259C0453A85797D7C2E1424ED54AFE49C43DD3FE4CB2E13B200D8C5B076AC0A22100E85
24,642,901 UART: [art] SIG.R = 5D81B3201269322B39AC215564763C7EA15C9F738E69E1A41F865E6AF9DE735D0A1E803666A680EC833030C99FB90C47
24,650,246 UART: [art] SIG.S = BF35D47C582935436C43185B6F450458DBF0F1E9B86B3138C1BAE8CBD9342F7A97F3B5AC65998F03332C4A5F9840417A
25,628,822 UART: Caliptra RT
25,629,536 UART: [state] CFI Enabled
25,811,242 UART: [rt] RT listening for mailbox commands...
25,813,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,844,196 UART: [rt]cmd =0x4d454153, len=108
25,862,598 >>> mbox cmd response data (12 bytes)
25,863,102 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,893,647 UART: [rt]cmd =0x4d454153, len=108
25,912,548 >>> mbox cmd response data (12 bytes)
25,912,979 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,943,622 UART: [rt]cmd =0x4d454153, len=108
25,961,031 >>> mbox cmd response data (12 bytes)
25,961,467 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,991,856 UART: [rt]cmd =0x4d454153, len=108
26,010,493 >>> mbox cmd response data (12 bytes)
26,010,928 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,041,785 UART: [rt]cmd =0x4d454153, len=108
26,060,262 >>> mbox cmd response data (12 bytes)
26,060,751 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,091,476 UART: [rt]cmd =0x4d454153, len=108
26,110,630 >>> mbox cmd response data (12 bytes)
26,111,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,141,660 UART: [rt]cmd =0x4d454153, len=108
26,159,805 >>> mbox cmd response data (12 bytes)
26,160,232 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,190,986 UART: [rt]cmd =0x4d454153, len=108
26,209,632 >>> mbox cmd response data (12 bytes)
26,210,055 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,240,759 UART: [rt]cmd =0x4d454153, len=108
26,260,041 >>> mbox cmd response data (12 bytes)
26,260,470 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,291,220 UART: [rt]cmd =0x4d454153, len=108
26,309,962 >>> mbox cmd response data (12 bytes)
26,310,395 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,341,034 UART: [rt]cmd =0x4d454153, len=108
26,360,032 >>> mbox cmd response data (12 bytes)
26,360,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,390,930 UART: [rt]cmd =0x4d454153, len=108
26,409,026 >>> mbox cmd response data (12 bytes)
26,409,455 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,440,151 UART: [rt]cmd =0x4d454153, len=108
26,460,043 >>> mbox cmd response data (12 bytes)
26,460,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,490,931 UART: [rt]cmd =0x4d454153, len=108
26,509,904 >>> mbox cmd response data (12 bytes)
26,510,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,541,020 UART: [rt]cmd =0x4d454153, len=108
26,543,268 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,417 UART:
192,777 UART: Running Caliptra ROM ...
193,968 UART:
603,715 UART: [state] CFI Enabled
617,667 UART: [state] LifecycleState = Unprovisioned
619,608 UART: [state] DebugLocked = No
621,339 UART: [state] WD Timer not started. Device not locked for debugging
624,533 UART: [kat] SHA2-256
804,179 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,983 UART: [kat] ++
815,429 UART: [kat] sha1
826,374 UART: [kat] SHA2-256
829,095 UART: [kat] SHA2-384
834,525 UART: [kat] SHA2-512-ACC
836,905 UART: [kat] ECC-384
3,275,491 UART: [kat] HMAC-384Kdf
3,287,394 UART: [kat] LMS
3,763,862 UART: [kat] --
3,768,456 UART: [cold-reset] ++
3,769,949 UART: [fht] FHT @ 0x50003400
3,781,293 UART: [idev] ++
3,781,860 UART: [idev] CDI.KEYID = 6
3,782,750 UART: [idev] SUBJECT.KEYID = 7
3,784,070 UART: [idev] UDS.KEYID = 0
3,784,978 ready_for_fw is high
3,785,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,738 UART: [idev] Erasing UDS.KEYID = 0
6,263,159 UART: [idev] Sha1 KeyId Algorithm
6,286,226 UART: [idev] --
6,291,567 UART: [ldev] ++
6,292,135 UART: [ldev] CDI.KEYID = 6
6,293,039 UART: [ldev] SUBJECT.KEYID = 5
6,294,262 UART: [ldev] AUTHORITY.KEYID = 7
6,295,495 UART: [ldev] FE.KEYID = 1
6,307,334 UART: [ldev] Erasing FE.KEYID = 1
8,788,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,705 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,573 UART: [ldev] --
10,581,676 UART: [fwproc] Wait for Commands...
10,583,826 UART: [fwproc] Recv command 0x46574c44
10,585,820 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,775 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,636 >>> mbox cmd response: success
14,553,757 UART: [afmc] ++
14,554,413 UART: [afmc] CDI.KEYID = 6
14,555,301 UART: [afmc] SUBJECT.KEYID = 7
14,556,522 UART: [afmc] AUTHORITY.KEYID = 5
17,056,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,113 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,992 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,584 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,852,548 UART: [afmc] --
18,855,985 UART: [cold-reset] --
18,860,063 UART: [state] Locking Datavault
18,865,801 UART: [state] Locking PCR0, PCR1 and PCR31
18,867,554 UART: [state] Locking ICCM
18,868,619 UART: [exit] Launching FMC @ 0x40000130
18,877,020 UART:
18,877,295 UART: Running Caliptra FMC ...
18,878,329 UART:
18,878,478 UART: [state] CFI Enabled
18,886,852 UART: [fht] FMC Alias Private Key: 7
20,653,032 UART: [art] Extend RT PCRs Done
20,654,251 UART: [art] Lock RT PCRs Done
20,655,852 UART: [art] Populate DV Done
20,661,319 UART: [fht] FMC Alias Private Key: 7
20,662,914 UART: [art] Derive CDI
20,663,654 UART: [art] Store in slot 0x4
20,706,679 UART: [art] Derive Key Pair
20,707,680 UART: [art] Store priv key in slot 0x5
23,135,183 UART: [art] Derive Key Pair - Done
23,148,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,855 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,355 UART: [art] PUB.X = 4C253E1C937ABB3221DD24F1DAD757280CA2FC74C00BFDE6B5D11F669A1B417C5BFDE37B3CD6516BDB9451DFC40A1772
24,863,653 UART: [art] PUB.Y = F3573DD8A5941DD8670B541512F2D29763057AB3495F5B35AD1139C67D64EB05E2F74985459304C7BE1B1FF0701C66C6
24,870,891 UART: [art] SIG.R = ACA6401FAD9206C7C9065FBF828F51027268D862013EFBBF7C11D328C341BCE4BDA0E55D0A1B45934FE79F795A820F63
24,878,319 UART: [art] SIG.S = BA6B9FBB4D892AB3F03A2F08DFF9282220DDF06455940A9853AB18CDAA5E00C5345706E7DE8A4E5C5D4989BFE1212779
25,857,223 UART: Caliptra RT
25,857,912 UART: [state] CFI Enabled
25,990,718 UART: [rt] RT listening for mailbox commands...
25,992,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,023,489 UART: [rt]cmd =0x4d454153, len=108
26,041,992 >>> mbox cmd response data (12 bytes)
26,042,511 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,073,118 UART: [rt]cmd =0x4d454153, len=108
26,091,386 >>> mbox cmd response data (12 bytes)
26,091,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,122,320 UART: [rt]cmd =0x4d454153, len=108
26,141,053 >>> mbox cmd response data (12 bytes)
26,141,481 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,172,191 UART: [rt]cmd =0x4d454153, len=108
26,190,825 >>> mbox cmd response data (12 bytes)
26,191,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,221,743 UART: [rt]cmd =0x4d454153, len=108
26,240,946 >>> mbox cmd response data (12 bytes)
26,241,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,272,102 UART: [rt]cmd =0x4d454153, len=108
26,290,705 >>> mbox cmd response data (12 bytes)
26,291,123 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,321,716 UART: [rt]cmd =0x4d454153, len=108
26,340,250 >>> mbox cmd response data (12 bytes)
26,340,687 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,371,382 UART: [rt]cmd =0x4d454153, len=108
26,389,984 >>> mbox cmd response data (12 bytes)
26,390,424 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,421,182 UART: [rt]cmd =0x4d454153, len=108
26,439,227 >>> mbox cmd response data (12 bytes)
26,439,658 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,470,191 UART: [rt]cmd =0x4d454153, len=108
26,489,389 >>> mbox cmd response data (12 bytes)
26,489,831 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,520,475 UART: [rt]cmd =0x4d454153, len=108
26,539,347 >>> mbox cmd response data (12 bytes)
26,539,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,570,376 UART: [rt]cmd =0x4d454153, len=108
26,588,636 >>> mbox cmd response data (12 bytes)
26,589,067 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,619,663 UART: [rt]cmd =0x4d454153, len=108
26,638,808 >>> mbox cmd response data (12 bytes)
26,639,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,669,772 UART: [rt]cmd =0x4d454153, len=108
26,688,643 >>> mbox cmd response data (12 bytes)
26,689,057 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,719,714 UART: [rt]cmd =0x4d454153, len=108
26,721,943 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,780,257 ready_for_fw is high
3,780,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,064 >>> mbox cmd response: success
18,688,613 UART:
18,689,007 UART: Running Caliptra FMC ...
18,690,210 UART:
18,690,382 UART: [state] CFI Enabled
18,698,211 UART: [fht] FMC Alias Private Key: 7
20,464,441 UART: [art] Extend RT PCRs Done
20,465,704 UART: [art] Lock RT PCRs Done
20,467,310 UART: [art] Populate DV Done
20,472,873 UART: [fht] FMC Alias Private Key: 7
20,474,420 UART: [art] Derive CDI
20,475,235 UART: [art] Store in slot 0x4
20,517,717 UART: [art] Derive Key Pair
20,518,776 UART: [art] Store priv key in slot 0x5
22,945,284 UART: [art] Derive Key Pair - Done
22,958,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,737 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,235 UART: [art] PUB.X = 19639CBD81055A4950FA060F3542D3A0F6A2494079A0FF8B971B577E29397586578347A95BB5F449694C4F6D8B35678D
24,673,503 UART: [art] PUB.Y = FDF0EBE5F032FA5424D678E85C48199EF191BACC7BE30DE4C505AF4A2D1BDCD16DDD62A281AF68190B4E1FA212CEDC32
24,680,820 UART: [art] SIG.R = 390001F929172A01652B2CD357EAB1FEBF81731BFB73BE434156AEE63C48FB5F1B28FB5B46D2C8FED12929896B0C6245
24,688,167 UART: [art] SIG.S = 5FA36260D7C6B826F94625B8794644BF281ED34AAC9237822CC9367D4900E3BEEE449B27DA86ED8ABC3087F58DD0DEA0
25,666,846 UART: Caliptra RT
25,667,546 UART: [state] CFI Enabled
25,800,390 UART: [rt] RT listening for mailbox commands...
25,802,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,832,928 UART: [rt]cmd =0x4d454153, len=108
25,851,430 >>> mbox cmd response data (12 bytes)
25,851,941 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,882,435 UART: [rt]cmd =0x4d454153, len=108
25,900,892 >>> mbox cmd response data (12 bytes)
25,901,334 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,931,981 UART: [rt]cmd =0x4d454153, len=108
25,950,489 >>> mbox cmd response data (12 bytes)
25,950,959 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,981,929 UART: [rt]cmd =0x4d454153, len=108
26,001,235 >>> mbox cmd response data (12 bytes)
26,001,677 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,032,388 UART: [rt]cmd =0x4d454153, len=108
26,050,848 >>> mbox cmd response data (12 bytes)
26,051,303 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,081,952 UART: [rt]cmd =0x4d454153, len=108
26,100,997 >>> mbox cmd response data (12 bytes)
26,101,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,132,209 UART: [rt]cmd =0x4d454153, len=108
26,150,918 >>> mbox cmd response data (12 bytes)
26,151,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,181,957 UART: [rt]cmd =0x4d454153, len=108
26,201,409 >>> mbox cmd response data (12 bytes)
26,201,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,232,263 UART: [rt]cmd =0x4d454153, len=108
26,250,322 >>> mbox cmd response data (12 bytes)
26,250,743 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,281,285 UART: [rt]cmd =0x4d454153, len=108
26,299,703 >>> mbox cmd response data (12 bytes)
26,300,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,330,777 UART: [rt]cmd =0x4d454153, len=108
26,350,132 >>> mbox cmd response data (12 bytes)
26,350,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,381,134 UART: [rt]cmd =0x4d454153, len=108
26,400,108 >>> mbox cmd response data (12 bytes)
26,400,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,431,032 UART: [rt]cmd =0x4d454153, len=108
26,450,044 >>> mbox cmd response data (12 bytes)
26,450,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,481,066 UART: [rt]cmd =0x4d454153, len=108
26,499,510 >>> mbox cmd response data (12 bytes)
26,499,968 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,530,503 UART: [rt]cmd =0x4d454153, len=108
26,533,049 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
191,958 UART:
192,338 UART: Running Caliptra ROM ...
193,518 UART:
193,677 UART: [state] CFI Enabled
264,562 UART: [state] LifecycleState = Unprovisioned
266,981 UART: [state] DebugLocked = No
269,020 UART: [state] WD Timer not started. Device not locked for debugging
272,843 UART: [kat] SHA2-256
462,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,531 UART: [kat] ++
473,978 UART: [kat] sha1
484,281 UART: [kat] SHA2-256
487,351 UART: [kat] SHA2-384
493,547 UART: [kat] SHA2-512-ACC
496,195 UART: [kat] ECC-384
2,948,544 UART: [kat] HMAC-384Kdf
2,971,357 UART: [kat] LMS
3,503,143 UART: [kat] --
3,507,300 UART: [cold-reset] ++
3,508,529 UART: [fht] FHT @ 0x50003400
3,519,950 UART: [idev] ++
3,520,652 UART: [idev] CDI.KEYID = 6
3,521,603 UART: [idev] SUBJECT.KEYID = 7
3,522,844 UART: [idev] UDS.KEYID = 0
3,523,744 ready_for_fw is high
3,523,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,995 UART: [idev] Erasing UDS.KEYID = 0
6,030,463 UART: [idev] Sha1 KeyId Algorithm
6,052,970 UART: [idev] --
6,058,403 UART: [ldev] ++
6,059,088 UART: [ldev] CDI.KEYID = 6
6,059,977 UART: [ldev] SUBJECT.KEYID = 5
6,061,188 UART: [ldev] AUTHORITY.KEYID = 7
6,062,359 UART: [ldev] FE.KEYID = 1
6,099,090 UART: [ldev] Erasing FE.KEYID = 1
8,605,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,271 UART: [ldev] --
10,412,697 UART: [fwproc] Wait for Commands...
10,414,892 UART: [fwproc] Recv command 0x46574c44
10,417,192 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,985,861 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,109,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,143 >>> mbox cmd response: success
14,673,108 UART: [afmc] ++
14,673,851 UART: [afmc] CDI.KEYID = 6
14,674,960 UART: [afmc] SUBJECT.KEYID = 7
14,676,505 UART: [afmc] AUTHORITY.KEYID = 5
17,216,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,953,544 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,955,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,970,558 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,000,603 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,025,595 UART: [afmc] --
19,029,047 UART: [cold-reset] --
19,033,237 UART: [state] Locking Datavault
19,038,767 UART: [state] Locking PCR0, PCR1 and PCR31
19,040,971 UART: [state] Locking ICCM
19,043,876 UART: [exit] Launching FMC @ 0x40000130
19,052,563 UART:
19,052,818 UART: Running Caliptra FMC ...
19,053,921 UART:
19,054,081 UART: [state] CFI Enabled
19,112,022 UART: [fht] FMC Alias Private Key: 7
20,879,298 UART: [art] Extend RT PCRs Done
20,880,520 UART: [art] Lock RT PCRs Done
20,882,332 UART: [art] Populate DV Done
20,887,795 UART: [fht] FMC Alias Private Key: 7
20,889,271 UART: [art] Derive CDI
20,890,003 UART: [art] Store in slot 0x4
20,944,985 UART: [art] Derive Key Pair
20,946,020 UART: [art] Store priv key in slot 0x5
23,408,784 UART: [art] Derive Key Pair - Done
23,421,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,146 UART: [art] Erasing AUTHORITY.KEYID = 7
25,136,661 UART: [art] PUB.X = CBB1DDE76F9C68E816BD528DEDBCC21F47C4DB2DDE4F59759F214EB7F25E16720441C0E0E6816F4212B675D21B49F5B0
25,143,991 UART: [art] PUB.Y = 6DCEE4B8E0F3628A6D867B3BDA8895FA9E7F43BA460890686F8A941D1C9258B0F9955C4F232D9742D579BD429DCDF839
25,151,196 UART: [art] SIG.R = 013A9EB36EEA066FB2C9326CA14BBFD1CF383E749B11C5724ADEE6030F765BD83F483F485CDC310AABC67D78BE42A413
25,158,656 UART: [art] SIG.S = 35005C24370E258B210C6188F1DD55CC2FF9A4965380E932BC2A1C456F3A5E8AEB7054F8B3B6D44E21EBF3BFF650EDF6
26,138,123 UART: Caliptra RT
26,138,836 UART: [state] CFI Enabled
26,318,761 UART: [rt] RT listening for mailbox commands...
26,320,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,351,154 UART: [rt]cmd =0x4d454153, len=108
26,369,868 >>> mbox cmd response data (12 bytes)
26,370,448 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,400,883 UART: [rt]cmd =0x4d454153, len=108
26,419,543 >>> mbox cmd response data (12 bytes)
26,419,977 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,450,732 UART: [rt]cmd =0x4d454153, len=108
26,470,394 >>> mbox cmd response data (12 bytes)
26,470,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,501,493 UART: [rt]cmd =0x4d454153, len=108
26,519,611 >>> mbox cmd response data (12 bytes)
26,520,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,550,643 UART: [rt]cmd =0x4d454153, len=108
26,569,173 >>> mbox cmd response data (12 bytes)
26,569,603 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,600,193 UART: [rt]cmd =0x4d454153, len=108
26,619,394 >>> mbox cmd response data (12 bytes)
26,619,850 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,650,383 UART: [rt]cmd =0x4d454153, len=108
26,668,771 >>> mbox cmd response data (12 bytes)
26,669,191 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,699,948 UART: [rt]cmd =0x4d454153, len=108
26,718,688 >>> mbox cmd response data (12 bytes)
26,719,108 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,749,745 UART: [rt]cmd =0x4d454153, len=108
26,768,803 >>> mbox cmd response data (12 bytes)
26,769,274 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,800,135 UART: [rt]cmd =0x4d454153, len=108
26,819,966 >>> mbox cmd response data (12 bytes)
26,820,389 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,851,262 UART: [rt]cmd =0x4d454153, len=108
26,870,211 >>> mbox cmd response data (12 bytes)
26,870,642 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,901,229 UART: [rt]cmd =0x4d454153, len=108
26,919,825 >>> mbox cmd response data (12 bytes)
26,920,242 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,950,947 UART: [rt]cmd =0x4d454153, len=108
26,969,789 >>> mbox cmd response data (12 bytes)
26,970,213 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,000,852 UART: [rt]cmd =0x4d454153, len=108
27,020,378 >>> mbox cmd response data (12 bytes)
27,020,854 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,051,552 UART: [rt]cmd =0x4d454153, len=108
27,053,940 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,415,943 ready_for_fw is high
3,416,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,807,210 >>> mbox cmd response: success
19,091,699 UART:
19,092,083 UART: Running Caliptra FMC ...
19,093,279 UART:
19,093,453 UART: [state] CFI Enabled
19,157,979 UART: [fht] FMC Alias Private Key: 7
20,945,844 UART: [art] Extend RT PCRs Done
20,947,079 UART: [art] Lock RT PCRs Done
20,948,614 UART: [art] Populate DV Done
20,954,040 UART: [fht] FMC Alias Private Key: 7
20,955,694 UART: [art] Derive CDI
20,956,526 UART: [art] Store in slot 0x4
21,011,788 UART: [art] Derive Key Pair
21,012,837 UART: [art] Store priv key in slot 0x5
23,475,667 UART: [art] Derive Key Pair - Done
23,488,293 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,142 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,167 UART: [art] PUB.X = 3D6460433A5D2D21DFB2865CBC318D8DF27B7E89E2C142EE76FFC025F2170438DE35F1ED87A56DF9FE1DB45198D0CE64
25,210,906 UART: [art] PUB.Y = E3C4AD5508F587E9442AA28CB04AAE635AA297512588BFBF6E58C7B39E601FFE5E5DFC525266B105CC1F6BBDAC26A204
25,218,189 UART: [art] SIG.R = 6390A055FA0E089166541FE2D9200A491FA5787615990C45A40C37601F62388FA36BB6A0E8C86BF7C3A22BBEEAEC7B38
25,225,545 UART: [art] SIG.S = 309EA0259818247A697C941CC115709E608CCFF798A4B8D9B6E6220F069E78BA5768385347E5A371CD494C8A2093F950
26,204,191 UART: Caliptra RT
26,204,911 UART: [state] CFI Enabled
26,389,289 UART: [rt] RT listening for mailbox commands...
26,391,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,422,080 UART: [rt]cmd =0x4d454153, len=108
26,441,015 >>> mbox cmd response data (12 bytes)
26,441,602 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,421 UART: [rt]cmd =0x4d454153, len=108
26,491,029 >>> mbox cmd response data (12 bytes)
26,491,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,522,121 UART: [rt]cmd =0x4d454153, len=108
26,540,694 >>> mbox cmd response data (12 bytes)
26,541,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,571,878 UART: [rt]cmd =0x4d454153, len=108
26,590,540 >>> mbox cmd response data (12 bytes)
26,591,005 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,621,432 UART: [rt]cmd =0x4d454153, len=108
26,639,691 >>> mbox cmd response data (12 bytes)
26,640,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,670,896 UART: [rt]cmd =0x4d454153, len=108
26,689,804 >>> mbox cmd response data (12 bytes)
26,690,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,721,003 UART: [rt]cmd =0x4d454153, len=108
26,739,717 >>> mbox cmd response data (12 bytes)
26,740,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,770,923 UART: [rt]cmd =0x4d454153, len=108
26,789,877 >>> mbox cmd response data (12 bytes)
26,790,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,820,901 UART: [rt]cmd =0x4d454153, len=108
26,839,940 >>> mbox cmd response data (12 bytes)
26,840,402 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,870,831 UART: [rt]cmd =0x4d454153, len=108
26,889,487 >>> mbox cmd response data (12 bytes)
26,889,911 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,920,451 UART: [rt]cmd =0x4d454153, len=108
26,939,406 >>> mbox cmd response data (12 bytes)
26,939,829 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,970,584 UART: [rt]cmd =0x4d454153, len=108
26,990,340 >>> mbox cmd response data (12 bytes)
26,990,800 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,021,495 UART: [rt]cmd =0x4d454153, len=108
27,039,881 >>> mbox cmd response data (12 bytes)
27,040,307 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,070,902 UART: [rt]cmd =0x4d454153, len=108
27,089,643 >>> mbox cmd response data (12 bytes)
27,090,073 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,120,722 UART: [rt]cmd =0x4d454153, len=108
27,123,370 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,435 UART:
192,790 UART: Running Caliptra ROM ...
193,980 UART:
603,667 UART: [state] CFI Enabled
617,352 UART: [state] LifecycleState = Unprovisioned
619,725 UART: [state] DebugLocked = No
621,173 UART: [state] WD Timer not started. Device not locked for debugging
625,646 UART: [kat] SHA2-256
815,586 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,324 UART: [kat] ++
826,849 UART: [kat] sha1
838,716 UART: [kat] SHA2-256
841,731 UART: [kat] SHA2-384
848,858 UART: [kat] SHA2-512-ACC
851,446 UART: [kat] ECC-384
3,292,621 UART: [kat] HMAC-384Kdf
3,304,087 UART: [kat] LMS
3,835,947 UART: [kat] --
3,840,684 UART: [cold-reset] ++
3,843,310 UART: [fht] FHT @ 0x50003400
3,855,014 UART: [idev] ++
3,855,739 UART: [idev] CDI.KEYID = 6
3,856,626 UART: [idev] SUBJECT.KEYID = 7
3,857,875 UART: [idev] UDS.KEYID = 0
3,858,782 ready_for_fw is high
3,858,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,912 UART: [idev] Erasing UDS.KEYID = 0
6,333,220 UART: [idev] Sha1 KeyId Algorithm
6,355,395 UART: [idev] --
6,359,881 UART: [ldev] ++
6,360,620 UART: [ldev] CDI.KEYID = 6
6,361,507 UART: [ldev] SUBJECT.KEYID = 5
6,362,691 UART: [ldev] AUTHORITY.KEYID = 7
6,363,926 UART: [ldev] FE.KEYID = 1
6,376,173 UART: [ldev] Erasing FE.KEYID = 1
8,850,495 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,309 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,720 UART: [ldev] --
10,642,905 UART: [fwproc] Wait for Commands...
10,645,420 UART: [fwproc] Recv command 0x46574c44
10,647,689 UART: [fwproc] Recv'd Img size: 118548 bytes
14,136,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,215,331 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,338,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,900,087 >>> mbox cmd response: success
14,904,695 UART: [afmc] ++
14,905,428 UART: [afmc] CDI.KEYID = 6
14,906,629 UART: [afmc] SUBJECT.KEYID = 7
14,908,072 UART: [afmc] AUTHORITY.KEYID = 5
17,408,655 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,130,332 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,147,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,162,563 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,177,489 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,668 UART: [afmc] --
19,204,434 UART: [cold-reset] --
19,208,912 UART: [state] Locking Datavault
19,213,704 UART: [state] Locking PCR0, PCR1 and PCR31
19,215,864 UART: [state] Locking ICCM
19,218,729 UART: [exit] Launching FMC @ 0x40000130
19,227,387 UART:
19,227,633 UART: Running Caliptra FMC ...
19,228,743 UART:
19,228,905 UART: [state] CFI Enabled
19,236,795 UART: [fht] FMC Alias Private Key: 7
21,003,087 UART: [art] Extend RT PCRs Done
21,004,323 UART: [art] Lock RT PCRs Done
21,005,856 UART: [art] Populate DV Done
21,011,219 UART: [fht] FMC Alias Private Key: 7
21,012,931 UART: [art] Derive CDI
21,013,753 UART: [art] Store in slot 0x4
21,056,786 UART: [art] Derive Key Pair
21,057,833 UART: [art] Store priv key in slot 0x5
23,484,496 UART: [art] Derive Key Pair - Done
23,497,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,144 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,666 UART: [art] PUB.X = FAAFA7A643FDE306E57741FD666DCBB54B425F433242C86B667FAE7A7CAC51BECEB23295A84613EDFC86E0383A291EF4
25,212,939 UART: [art] PUB.Y = 6A32ECAA999310F767B92EC837077F053E614EF0E541F45C7894B06FD599443D41BD064D885E0CB101962F99A91EB4EB
25,220,197 UART: [art] SIG.R = 6FFF44F81206C3E55260F58CC5C2EC947F2FBAEADD553A010AA72E4239F3266D3B07770DBEFDC806448A943A23FC5F0E
25,227,582 UART: [art] SIG.S = E51C0B7DDECA36F6EAFF77CB1E62A8561B29B030C4602E080936A0AD2B148FEE58B2AD47E7C7FB6BB68B18A35625CB91
26,206,897 UART: Caliptra RT
26,207,595 UART: [state] CFI Enabled
26,340,703 UART: [rt] RT listening for mailbox commands...
26,342,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,373,533 UART: [rt]cmd =0x4d454153, len=108
26,392,200 >>> mbox cmd response data (12 bytes)
26,392,742 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,423,228 UART: [rt]cmd =0x4d454153, len=108
26,441,540 >>> mbox cmd response data (12 bytes)
26,441,987 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,739 UART: [rt]cmd =0x4d454153, len=108
26,492,485 >>> mbox cmd response data (12 bytes)
26,492,970 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,523,618 UART: [rt]cmd =0x4d454153, len=108
26,542,552 >>> mbox cmd response data (12 bytes)
26,542,974 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,573,684 UART: [rt]cmd =0x4d454153, len=108
26,593,183 >>> mbox cmd response data (12 bytes)
26,593,619 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,624,313 UART: [rt]cmd =0x4d454153, len=108
26,643,085 >>> mbox cmd response data (12 bytes)
26,643,551 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,674,199 UART: [rt]cmd =0x4d454153, len=108
26,693,615 >>> mbox cmd response data (12 bytes)
26,694,043 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,724,609 UART: [rt]cmd =0x4d454153, len=108
26,742,880 >>> mbox cmd response data (12 bytes)
26,743,330 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,774,106 UART: [rt]cmd =0x4d454153, len=108
26,792,985 >>> mbox cmd response data (12 bytes)
26,793,414 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,824,243 UART: [rt]cmd =0x4d454153, len=108
26,842,881 >>> mbox cmd response data (12 bytes)
26,843,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,873,800 UART: [rt]cmd =0x4d454153, len=108
26,892,464 >>> mbox cmd response data (12 bytes)
26,892,926 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,923,519 UART: [rt]cmd =0x4d454153, len=108
26,942,832 >>> mbox cmd response data (12 bytes)
26,943,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,973,904 UART: [rt]cmd =0x4d454153, len=108
26,992,707 >>> mbox cmd response data (12 bytes)
26,993,141 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,023,680 UART: [rt]cmd =0x4d454153, len=108
27,043,389 >>> mbox cmd response data (12 bytes)
27,043,855 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,074,561 UART: [rt]cmd =0x4d454153, len=108
27,077,220 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,364 writing to cptra_bootfsm_go
3,750,372 ready_for_fw is high
3,750,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,022,772 >>> mbox cmd response: success
19,277,949 UART:
19,278,331 UART: Running Caliptra FMC ...
19,279,551 UART:
19,279,725 UART: [state] CFI Enabled
19,287,505 UART: [fht] FMC Alias Private Key: 7
21,053,484 UART: [art] Extend RT PCRs Done
21,054,708 UART: [art] Lock RT PCRs Done
21,056,347 UART: [art] Populate DV Done
21,061,934 UART: [fht] FMC Alias Private Key: 7
21,063,532 UART: [art] Derive CDI
21,064,354 UART: [art] Store in slot 0x4
21,106,907 UART: [art] Derive Key Pair
21,107,943 UART: [art] Store priv key in slot 0x5
23,534,618 UART: [art] Derive Key Pair - Done
23,547,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,254,011 UART: [art] Erasing AUTHORITY.KEYID = 7
25,255,521 UART: [art] PUB.X = 01A8A757CF6F52730486ADCD6B76B218867EF8F92370D6078E5D22BD8A9FA3F9D55CDC26404DAFADF4E501F046376C07
25,262,832 UART: [art] PUB.Y = 0D05BC9147C5B5D26C9FEF67C0E9087A2AADF47D0C5D410F3F5C81C91BF32DE708373C8C4491E3A123C620CC79ACF13F
25,270,041 UART: [art] SIG.R = 087577C26E77D70B9F72D812DDF152541ECCF06E2EBC62B31EBEE63774C805FE06F6F01E5AE24B603F3382175B85AAEB
25,277,483 UART: [art] SIG.S = ABAF7404B1DC32F89C3ECE49FBF717879B077A713BF23F7AD8B7412E41B4AEF5F8AC310371565DAB988541F8B531FCB0
26,256,134 UART: Caliptra RT
26,256,819 UART: [state] CFI Enabled
26,389,534 UART: [rt] RT listening for mailbox commands...
26,391,412 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,422,081 UART: [rt]cmd =0x4d454153, len=108
26,440,909 >>> mbox cmd response data (12 bytes)
26,441,408 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,472,017 UART: [rt]cmd =0x4d454153, len=108
26,490,763 >>> mbox cmd response data (12 bytes)
26,491,205 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,521,773 UART: [rt]cmd =0x4d454153, len=108
26,541,083 >>> mbox cmd response data (12 bytes)
26,541,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,572,425 UART: [rt]cmd =0x4d454153, len=108
26,591,576 >>> mbox cmd response data (12 bytes)
26,592,006 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,622,867 UART: [rt]cmd =0x4d454153, len=108
26,642,163 >>> mbox cmd response data (12 bytes)
26,642,609 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,673,313 UART: [rt]cmd =0x4d454153, len=108
26,692,836 >>> mbox cmd response data (12 bytes)
26,693,263 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,723,868 UART: [rt]cmd =0x4d454153, len=108
26,742,725 >>> mbox cmd response data (12 bytes)
26,743,165 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,773,783 UART: [rt]cmd =0x4d454153, len=108
26,792,573 >>> mbox cmd response data (12 bytes)
26,793,040 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,823,533 UART: [rt]cmd =0x4d454153, len=108
26,842,948 >>> mbox cmd response data (12 bytes)
26,843,375 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,874,160 UART: [rt]cmd =0x4d454153, len=108
26,893,687 >>> mbox cmd response data (12 bytes)
26,894,136 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,924,623 UART: [rt]cmd =0x4d454153, len=108
26,943,074 >>> mbox cmd response data (12 bytes)
26,943,541 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,974,030 UART: [rt]cmd =0x4d454153, len=108
26,993,127 >>> mbox cmd response data (12 bytes)
26,993,556 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,024,423 UART: [rt]cmd =0x4d454153, len=108
27,043,655 >>> mbox cmd response data (12 bytes)
27,044,114 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,074,715 UART: [rt]cmd =0x4d454153, len=108
27,094,081 >>> mbox cmd response data (12 bytes)
27,094,510 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
27,125,167 UART: [rt]cmd =0x4d454153, len=108
27,127,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,553 UART: [kat] SHA2-256
892,491 UART: [kat] SHA2-384
895,330 UART: [kat] SHA2-512-ACC
897,231 UART: [kat] ECC-384
902,538 UART: [kat] HMAC-384Kdf
906,928 UART: [kat] LMS
1,475,124 UART: [kat] --
1,475,811 UART: [cold-reset] ++
1,476,275 UART: [fht] Storing FHT @ 0x50003400
1,478,994 UART: [idev] ++
1,479,162 UART: [idev] CDI.KEYID = 6
1,479,522 UART: [idev] SUBJECT.KEYID = 7
1,479,946 UART: [idev] UDS.KEYID = 0
1,480,291 ready_for_fw is high
1,480,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,084 UART: [idev] Erasing UDS.KEYID = 0
1,504,754 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,604 UART: [idev] --
1,514,767 UART: [ldev] ++
1,514,935 UART: [ldev] CDI.KEYID = 6
1,515,298 UART: [ldev] SUBJECT.KEYID = 5
1,515,724 UART: [ldev] AUTHORITY.KEYID = 7
1,516,187 UART: [ldev] FE.KEYID = 1
1,521,723 UART: [ldev] Erasing FE.KEYID = 1
1,547,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,336 UART: [ldev] --
1,586,831 UART: [fwproc] Waiting for Commands...
1,587,700 UART: [fwproc] Received command 0x46574c44
1,588,491 UART: [fwproc] Received Image of size 118548 bytes
2,933,313 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,863 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,081 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,352 >>> mbox cmd response: success
3,133,418 UART: [afmc] ++
3,133,586 UART: [afmc] CDI.KEYID = 6
3,133,948 UART: [afmc] SUBJECT.KEYID = 7
3,134,373 UART: [afmc] AUTHORITY.KEYID = 5
3,168,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,710 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,490 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,199 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,082 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,765 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,505 UART: [afmc] --
3,211,549 UART: [cold-reset] --
3,212,431 UART: [state] Locking Datavault
3,213,690 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,294 UART: [state] Locking ICCM
3,214,954 UART: [exit] Launching FMC @ 0x40000130
3,220,284 UART:
3,220,300 UART: Running Caliptra FMC ...
3,220,708 UART:
3,220,762 UART: [state] CFI Enabled
3,231,274 UART: [fht] FMC Alias Private Key: 7
3,349,798 UART: [art] Extend RT PCRs Done
3,350,226 UART: [art] Lock RT PCRs Done
3,351,692 UART: [art] Populate DV Done
3,360,143 UART: [fht] FMC Alias Private Key: 7
3,361,325 UART: [art] Derive CDI
3,361,605 UART: [art] Store in slot 0x4
3,447,283 UART: [art] Derive Key Pair
3,447,643 UART: [art] Store priv key in slot 0x5
3,460,984 UART: [art] Derive Key Pair - Done
3,475,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,578 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,343 UART: [art] PUB.X = 1FE30C148530B332D19E891A90D013843588F7F34B098BBF491E8592EE8594E933A052DB04BC50EC7768DA75BD2BDA5D
3,499,108 UART: [art] PUB.Y = 6EA502D412034BFC084FF41A2BA6C97A25A5A00954FE945A17A28AE86A771DD29284715B86CBEE734D5770B7757113A4
3,506,048 UART: [art] SIG.R = 35DBF4ECB7FDB5D16C5EDA5C3B8B19654F429ADC0ECDF98D72A00384E038D652696B45B2599417DCF9CAB58BBF15245A
3,512,832 UART: [art] SIG.S = 2ED095395CFDBF64198BE70D1203BA7AF22F16B03C04100BA95952ED98C55F9B0EE0A3BEC4F0D83BB3A3F20F581172FF
3,537,078 UART: Caliptra RT
3,537,329 UART: [state] CFI Enabled
3,657,594 UART: [rt] RT listening for mailbox commands...
3,658,264 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,710 UART: [rt]cmd =0x4d454153, len=108
3,708,906 >>> mbox cmd response data (12 bytes)
3,708,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,022 UART: [rt]cmd =0x4d454153, len=108
3,759,933 >>> mbox cmd response data (12 bytes)
3,759,934 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,895 UART: [rt]cmd =0x4d454153, len=108
3,810,719 >>> mbox cmd response data (12 bytes)
3,810,720 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,661 UART: [rt]cmd =0x4d454153, len=108
3,861,438 >>> mbox cmd response data (12 bytes)
3,861,439 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,396 UART: [rt]cmd =0x4d454153, len=108
3,912,228 >>> mbox cmd response data (12 bytes)
3,912,229 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,288 UART: [rt]cmd =0x4d454153, len=108
3,963,067 >>> mbox cmd response data (12 bytes)
3,963,068 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,919 UART: [rt]cmd =0x4d454153, len=108
4,013,121 >>> mbox cmd response data (12 bytes)
4,013,122 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,043,275 UART: [rt]cmd =0x4d454153, len=108
4,064,050 >>> mbox cmd response data (12 bytes)
4,064,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,093,970 UART: [rt]cmd =0x4d454153, len=108
4,115,110 >>> mbox cmd response data (12 bytes)
4,115,111 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,145,098 UART: [rt]cmd =0x4d454153, len=108
4,165,593 >>> mbox cmd response data (12 bytes)
4,165,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,195,819 UART: [rt]cmd =0x4d454153, len=108
4,216,821 >>> mbox cmd response data (12 bytes)
4,216,822 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,811 UART: [rt]cmd =0x4d454153, len=108
4,268,598 >>> mbox cmd response data (12 bytes)
4,268,599 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,692 UART: [rt]cmd =0x4d454153, len=108
4,320,316 >>> mbox cmd response data (12 bytes)
4,320,317 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,140 UART: [rt]cmd =0x4d454153, len=108
4,370,827 >>> mbox cmd response data (12 bytes)
4,370,828 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,400,887 UART: [rt]cmd =0x4d454153, len=108
4,402,894 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,499 ready_for_fw is high
1,362,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,704 >>> mbox cmd response: success
3,041,885 UART:
3,041,901 UART: Running Caliptra FMC ...
3,042,309 UART:
3,042,363 UART: [state] CFI Enabled
3,052,841 UART: [fht] FMC Alias Private Key: 7
3,171,835 UART: [art] Extend RT PCRs Done
3,172,263 UART: [art] Lock RT PCRs Done
3,173,835 UART: [art] Populate DV Done
3,181,860 UART: [fht] FMC Alias Private Key: 7
3,182,890 UART: [art] Derive CDI
3,183,170 UART: [art] Store in slot 0x4
3,268,458 UART: [art] Derive Key Pair
3,268,818 UART: [art] Store priv key in slot 0x5
3,282,223 UART: [art] Derive Key Pair - Done
3,297,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,452 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,217 UART: [art] PUB.X = 43E7DAF931DA9C07A9DBB92C8FB8D0D85F5B1B0EF796F46DA18DD87ECC60323256442DEB2FC49A71C175C755AEBC1D5D
3,320,005 UART: [art] PUB.Y = B593408613F779075B69665049D0A8D2F6FB8FFEB97D3FCE75BB1339B918F8DFA0908528CD60A6037CF1C281ED3A1A38
3,326,955 UART: [art] SIG.R = 1C0C26F3B0CA7DC871422F41FFE849CC8833F52A62310ED56D000E7EDBFCF27BAB1D025E97D3EE9F2876DF1E2C15E413
3,333,709 UART: [art] SIG.S = A82164CA73CA87FE67E64BE3D2057A70BD21E6E8EB22E3ADA635CA0612353B9D86DBB7F220C9D9C989A24E5131FD5A4D
3,357,667 UART: Caliptra RT
3,357,918 UART: [state] CFI Enabled
3,478,576 UART: [rt] RT listening for mailbox commands...
3,479,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,648 UART: [rt]cmd =0x4d454153, len=108
3,530,814 >>> mbox cmd response data (12 bytes)
3,530,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,644 UART: [rt]cmd =0x4d454153, len=108
3,581,527 >>> mbox cmd response data (12 bytes)
3,581,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,273 UART: [rt]cmd =0x4d454153, len=108
3,631,863 >>> mbox cmd response data (12 bytes)
3,631,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,917 UART: [rt]cmd =0x4d454153, len=108
3,682,826 >>> mbox cmd response data (12 bytes)
3,682,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,058 UART: [rt]cmd =0x4d454153, len=108
3,733,712 >>> mbox cmd response data (12 bytes)
3,733,713 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,932 UART: [rt]cmd =0x4d454153, len=108
3,784,291 >>> mbox cmd response data (12 bytes)
3,784,292 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,431 UART: [rt]cmd =0x4d454153, len=108
3,835,257 >>> mbox cmd response data (12 bytes)
3,835,258 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,865,329 UART: [rt]cmd =0x4d454153, len=108
3,886,364 >>> mbox cmd response data (12 bytes)
3,886,365 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,612 UART: [rt]cmd =0x4d454153, len=108
3,937,322 >>> mbox cmd response data (12 bytes)
3,937,323 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,506 UART: [rt]cmd =0x4d454153, len=108
3,987,937 >>> mbox cmd response data (12 bytes)
3,987,938 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,873 UART: [rt]cmd =0x4d454153, len=108
4,039,133 >>> mbox cmd response data (12 bytes)
4,039,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,315 UART: [rt]cmd =0x4d454153, len=108
4,091,410 >>> mbox cmd response data (12 bytes)
4,091,411 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,121,404 UART: [rt]cmd =0x4d454153, len=108
4,142,504 >>> mbox cmd response data (12 bytes)
4,142,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,408 UART: [rt]cmd =0x4d454153, len=108
4,193,521 >>> mbox cmd response data (12 bytes)
4,193,522 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,223,673 UART: [rt]cmd =0x4d454153, len=108
4,225,720 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Unprovisioned
86,424 UART: [state] DebugLocked = No
87,102 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,828 UART: [kat] SHA2-256
882,759 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,874 UART: [kat] ++
887,026 UART: [kat] sha1
891,190 UART: [kat] SHA2-256
893,128 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,209 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,746 UART: [cold-reset] ++
1,477,174 UART: [fht] Storing FHT @ 0x50003400
1,479,797 UART: [idev] ++
1,479,965 UART: [idev] CDI.KEYID = 6
1,480,325 UART: [idev] SUBJECT.KEYID = 7
1,480,749 UART: [idev] UDS.KEYID = 0
1,481,094 ready_for_fw is high
1,481,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,479 UART: [idev] Erasing UDS.KEYID = 0
1,504,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,543 UART: [idev] --
1,514,520 UART: [ldev] ++
1,514,688 UART: [ldev] CDI.KEYID = 6
1,515,051 UART: [ldev] SUBJECT.KEYID = 5
1,515,477 UART: [ldev] AUTHORITY.KEYID = 7
1,515,940 UART: [ldev] FE.KEYID = 1
1,521,084 UART: [ldev] Erasing FE.KEYID = 1
1,546,869 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,847 UART: [ldev] --
1,586,296 UART: [fwproc] Waiting for Commands...
1,587,021 UART: [fwproc] Received command 0x46574c44
1,587,812 UART: [fwproc] Received Image of size 118548 bytes
2,932,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,670 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,297 >>> mbox cmd response: success
3,132,547 UART: [afmc] ++
3,132,715 UART: [afmc] CDI.KEYID = 6
3,133,077 UART: [afmc] SUBJECT.KEYID = 7
3,133,502 UART: [afmc] AUTHORITY.KEYID = 5
3,168,905 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,117 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,897 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,606 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,489 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,172 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,214 UART: [afmc] --
3,212,160 UART: [cold-reset] --
3,213,202 UART: [state] Locking Datavault
3,214,513 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,117 UART: [state] Locking ICCM
3,215,709 UART: [exit] Launching FMC @ 0x40000130
3,221,039 UART:
3,221,055 UART: Running Caliptra FMC ...
3,221,463 UART:
3,221,606 UART: [state] CFI Enabled
3,232,292 UART: [fht] FMC Alias Private Key: 7
3,352,298 UART: [art] Extend RT PCRs Done
3,352,726 UART: [art] Lock RT PCRs Done
3,354,076 UART: [art] Populate DV Done
3,362,073 UART: [fht] FMC Alias Private Key: 7
3,363,251 UART: [art] Derive CDI
3,363,531 UART: [art] Store in slot 0x4
3,449,669 UART: [art] Derive Key Pair
3,450,029 UART: [art] Store priv key in slot 0x5
3,463,220 UART: [art] Derive Key Pair - Done
3,478,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,645 UART: [art] PUB.X = D44632BCDF1B38DBDB10203F658291C4C14B059121E80AA4144E9FCCA4F66A5C9046AF66A6D53077C6D1FF853634D3F0
3,501,417 UART: [art] PUB.Y = 32581D47BCBD0D489C6BBDA94D78A2F2E774142418848FAD8640CF4333571FA0700288E1552E5BFB07D32CAC9DFBD0D8
3,508,368 UART: [art] SIG.R = BDE6BF76448CC3C2290AA1FB73064358DFCA25ACDB5CA3275A4E0FC225FEEFD9AEF6E51D4FE532E28C59DFCCEB6A81A8
3,515,163 UART: [art] SIG.S = 0DFC77B6AF39D3D699939B4ACB6CDB283C32BA8E2002FF20F1D292F9515285A46C0FBA2DF269F20B4C1D61E5A3DDB49A
3,538,747 UART: Caliptra RT
3,539,090 UART: [state] CFI Enabled
3,659,462 UART: [rt] RT listening for mailbox commands...
3,660,132 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,802 UART: [rt]cmd =0x4d454153, len=108
3,711,208 >>> mbox cmd response data (12 bytes)
3,711,209 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,246 UART: [rt]cmd =0x4d454153, len=108
3,762,255 >>> mbox cmd response data (12 bytes)
3,762,256 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,792,237 UART: [rt]cmd =0x4d454153, len=108
3,813,109 >>> mbox cmd response data (12 bytes)
3,813,110 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,043 UART: [rt]cmd =0x4d454153, len=108
3,863,946 >>> mbox cmd response data (12 bytes)
3,863,947 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,893,902 UART: [rt]cmd =0x4d454153, len=108
3,913,974 >>> mbox cmd response data (12 bytes)
3,913,975 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,904 UART: [rt]cmd =0x4d454153, len=108
3,964,507 >>> mbox cmd response data (12 bytes)
3,964,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,577 UART: [rt]cmd =0x4d454153, len=108
4,014,917 >>> mbox cmd response data (12 bytes)
4,014,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,005 UART: [rt]cmd =0x4d454153, len=108
4,066,250 >>> mbox cmd response data (12 bytes)
4,066,251 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,556 UART: [rt]cmd =0x4d454153, len=108
4,117,564 >>> mbox cmd response data (12 bytes)
4,117,565 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,147,580 UART: [rt]cmd =0x4d454153, len=108
4,167,903 >>> mbox cmd response data (12 bytes)
4,167,904 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,197,983 UART: [rt]cmd =0x4d454153, len=108
4,218,391 >>> mbox cmd response data (12 bytes)
4,218,392 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,248,409 UART: [rt]cmd =0x4d454153, len=108
4,269,128 >>> mbox cmd response data (12 bytes)
4,269,129 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,298,940 UART: [rt]cmd =0x4d454153, len=108
4,320,470 >>> mbox cmd response data (12 bytes)
4,320,471 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,396 UART: [rt]cmd =0x4d454153, len=108
4,371,017 >>> mbox cmd response data (12 bytes)
4,371,018 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,401,289 UART: [rt]cmd =0x4d454153, len=108
4,403,398 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,530 ready_for_fw is high
1,362,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,901 >>> mbox cmd response: success
3,042,768 UART:
3,042,784 UART: Running Caliptra FMC ...
3,043,192 UART:
3,043,335 UART: [state] CFI Enabled
3,054,039 UART: [fht] FMC Alias Private Key: 7
3,172,783 UART: [art] Extend RT PCRs Done
3,173,211 UART: [art] Lock RT PCRs Done
3,174,443 UART: [art] Populate DV Done
3,182,710 UART: [fht] FMC Alias Private Key: 7
3,183,828 UART: [art] Derive CDI
3,184,108 UART: [art] Store in slot 0x4
3,269,596 UART: [art] Derive Key Pair
3,269,956 UART: [art] Store priv key in slot 0x5
3,283,373 UART: [art] Derive Key Pair - Done
3,297,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,294 UART: [art] PUB.X = 2C495E5162C0DE563ECBCD2F135D699078CDCE3C0C11FE9F2A72DB9D363DB4DFAE65F8D9A6AAD038A4F4D0C2F3BC5721
3,321,087 UART: [art] PUB.Y = A06F9A8C2552AD2815809ABBD205563894161D08126E37627F9EA11D2CBD81CC74C17103E99C0B60DD8002B9CA41017E
3,328,019 UART: [art] SIG.R = 97152141B9F4470931C31DB8E83BCBBDEB2350040D966CB222F7B37FDF9CA86D80EC75BEF73C978B8BEEE12324223C32
3,334,790 UART: [art] SIG.S = 2897BBECE88746216834358C31C9ED355DEFACEA43065FD6286818CF98DF6F901C3AD8E3CB7B1989135EA85E39EC0D07
3,358,375 UART: Caliptra RT
3,358,718 UART: [state] CFI Enabled
3,478,890 UART: [rt] RT listening for mailbox commands...
3,479,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,114 UART: [rt]cmd =0x4d454153, len=108
3,530,094 >>> mbox cmd response data (12 bytes)
3,530,095 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,560,212 UART: [rt]cmd =0x4d454153, len=108
3,580,985 >>> mbox cmd response data (12 bytes)
3,580,986 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,239 UART: [rt]cmd =0x4d454153, len=108
3,632,443 >>> mbox cmd response data (12 bytes)
3,632,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,519 UART: [rt]cmd =0x4d454153, len=108
3,683,174 >>> mbox cmd response data (12 bytes)
3,683,175 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,010 UART: [rt]cmd =0x4d454153, len=108
3,733,058 >>> mbox cmd response data (12 bytes)
3,733,059 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,918 UART: [rt]cmd =0x4d454153, len=108
3,783,661 >>> mbox cmd response data (12 bytes)
3,783,662 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,685 UART: [rt]cmd =0x4d454153, len=108
3,834,753 >>> mbox cmd response data (12 bytes)
3,834,754 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,864,909 UART: [rt]cmd =0x4d454153, len=108
3,885,568 >>> mbox cmd response data (12 bytes)
3,885,569 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,816 UART: [rt]cmd =0x4d454153, len=108
3,936,284 >>> mbox cmd response data (12 bytes)
3,936,285 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,436 UART: [rt]cmd =0x4d454153, len=108
3,987,523 >>> mbox cmd response data (12 bytes)
3,987,524 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,803 UART: [rt]cmd =0x4d454153, len=108
4,038,617 >>> mbox cmd response data (12 bytes)
4,038,618 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,068,827 UART: [rt]cmd =0x4d454153, len=108
4,089,688 >>> mbox cmd response data (12 bytes)
4,089,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,594 UART: [rt]cmd =0x4d454153, len=108
4,140,328 >>> mbox cmd response data (12 bytes)
4,140,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,262 UART: [rt]cmd =0x4d454153, len=108
4,191,669 >>> mbox cmd response data (12 bytes)
4,191,670 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,221,803 UART: [rt]cmd =0x4d454153, len=108
4,223,646 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,590 UART: [kat] SHA2-256
891,140 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,244 UART: [kat] ++
895,396 UART: [kat] sha1
899,666 UART: [kat] SHA2-256
901,606 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,525 UART: [kat] HMAC-384Kdf
920,111 UART: [kat] LMS
1,168,423 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,650 UART: [fht] FHT @ 0x50003400
1,172,170 UART: [idev] ++
1,172,338 UART: [idev] CDI.KEYID = 6
1,172,699 UART: [idev] SUBJECT.KEYID = 7
1,173,124 UART: [idev] UDS.KEYID = 0
1,173,470 ready_for_fw is high
1,173,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,033 UART: [idev] Erasing UDS.KEYID = 0
1,198,241 UART: [idev] Sha1 KeyId Algorithm
1,207,103 UART: [idev] --
1,208,238 UART: [ldev] ++
1,208,406 UART: [ldev] CDI.KEYID = 6
1,208,770 UART: [ldev] SUBJECT.KEYID = 5
1,209,197 UART: [ldev] AUTHORITY.KEYID = 7
1,209,660 UART: [ldev] FE.KEYID = 1
1,215,146 UART: [ldev] Erasing FE.KEYID = 1
1,241,623 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,864 UART: [ldev] --
1,281,165 UART: [fwproc] Wait for Commands...
1,281,782 UART: [fwproc] Recv command 0x46574c44
1,282,515 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,452 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,425 >>> mbox cmd response: success
2,826,623 UART: [afmc] ++
2,826,791 UART: [afmc] CDI.KEYID = 6
2,827,154 UART: [afmc] SUBJECT.KEYID = 7
2,827,580 UART: [afmc] AUTHORITY.KEYID = 5
2,863,381 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,035 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,916 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,617 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,324 UART: [afmc] --
2,906,261 UART: [cold-reset] --
2,907,221 UART: [state] Locking Datavault
2,908,448 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,052 UART: [state] Locking ICCM
2,909,534 UART: [exit] Launching FMC @ 0x40000130
2,914,864 UART:
2,914,880 UART: Running Caliptra FMC ...
2,915,288 UART:
2,915,342 UART: [state] CFI Enabled
2,925,924 UART: [fht] FMC Alias Private Key: 7
3,044,906 UART: [art] Extend RT PCRs Done
3,045,334 UART: [art] Lock RT PCRs Done
3,046,886 UART: [art] Populate DV Done
3,055,399 UART: [fht] FMC Alias Private Key: 7
3,056,551 UART: [art] Derive CDI
3,056,831 UART: [art] Store in slot 0x4
3,142,516 UART: [art] Derive Key Pair
3,142,876 UART: [art] Store priv key in slot 0x5
3,155,940 UART: [art] Derive Key Pair - Done
3,170,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,935 UART: [art] PUB.X = 5B315E0AA0893A3167BD426CD3BE1C4AD6C5027A857509A7B944B174AE27D63A84C0E77F2AA1FC350B3B43EC58B0EB3B
3,193,707 UART: [art] PUB.Y = 28C2B2BFA47F16962946E238CAFCBD714B13490DB3700CD10449D9CB2C6D3209CD725246E75F0783D58BE8494201CDB1
3,200,643 UART: [art] SIG.R = 6C05CAAA9ECCA343F5E42F01E13D04FF0CAB22C625005135766C68D4F077CB3296D11651716DF3D8EE66B47D1A07261C
3,207,384 UART: [art] SIG.S = 540681B45A36110E0D2F8169311B1B6094BD11F22B18E7B14C1C70CDAD6A23C7DC2C3E7563FD3645389A0FFFAFB87646
3,231,244 UART: Caliptra RT
3,231,495 UART: [state] CFI Enabled
3,350,831 UART: [rt] RT listening for mailbox commands...
3,351,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,093 UART: [rt]cmd =0x4d454153, len=108
3,403,653 >>> mbox cmd response data (12 bytes)
3,403,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,487 UART: [rt]cmd =0x4d454153, len=108
3,454,730 >>> mbox cmd response data (12 bytes)
3,454,731 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,902 UART: [rt]cmd =0x4d454153, len=108
3,506,046 >>> mbox cmd response data (12 bytes)
3,506,047 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,904 UART: [rt]cmd =0x4d454153, len=108
3,556,559 >>> mbox cmd response data (12 bytes)
3,556,560 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,585 UART: [rt]cmd =0x4d454153, len=108
3,606,981 >>> mbox cmd response data (12 bytes)
3,606,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,063 UART: [rt]cmd =0x4d454153, len=108
3,657,722 >>> mbox cmd response data (12 bytes)
3,657,723 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,014 UART: [rt]cmd =0x4d454153, len=108
3,708,338 >>> mbox cmd response data (12 bytes)
3,708,339 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,272 UART: [rt]cmd =0x4d454153, len=108
3,759,507 >>> mbox cmd response data (12 bytes)
3,759,508 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,601 UART: [rt]cmd =0x4d454153, len=108
3,810,551 >>> mbox cmd response data (12 bytes)
3,810,552 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,797 UART: [rt]cmd =0x4d454153, len=108
3,861,530 >>> mbox cmd response data (12 bytes)
3,861,531 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,592 UART: [rt]cmd =0x4d454153, len=108
3,912,030 >>> mbox cmd response data (12 bytes)
3,912,031 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,100 UART: [rt]cmd =0x4d454153, len=108
3,963,309 >>> mbox cmd response data (12 bytes)
3,963,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,061 UART: [rt]cmd =0x4d454153, len=108
4,014,471 >>> mbox cmd response data (12 bytes)
4,014,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,044,511 UART: [rt]cmd =0x4d454153, len=108
4,065,988 >>> mbox cmd response data (12 bytes)
4,065,989 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,056 UART: [rt]cmd =0x4d454153, len=108
4,097,839 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,612 ready_for_fw is high
1,059,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,356 >>> mbox cmd response: success
2,741,581 UART:
2,741,597 UART: Running Caliptra FMC ...
2,742,005 UART:
2,742,059 UART: [state] CFI Enabled
2,752,589 UART: [fht] FMC Alias Private Key: 7
2,872,025 UART: [art] Extend RT PCRs Done
2,872,453 UART: [art] Lock RT PCRs Done
2,874,139 UART: [art] Populate DV Done
2,882,382 UART: [fht] FMC Alias Private Key: 7
2,883,332 UART: [art] Derive CDI
2,883,612 UART: [art] Store in slot 0x4
2,969,665 UART: [art] Derive Key Pair
2,970,025 UART: [art] Store priv key in slot 0x5
2,982,763 UART: [art] Derive Key Pair - Done
2,997,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,491 UART: [art] PUB.X = ACE4EBEE50E08C791F0B39284F2C93088300968BBDA46BC069ACB26FE5183BD755259A6F5AD4B61C8841D899FEE744A9
3,021,245 UART: [art] PUB.Y = DD7CE612FFE426202EAE987A9B833282B02ABD61EEE222C15D07C81AF2EBB1BDBF4F39241E4321E926B3364B2057FED2
3,028,208 UART: [art] SIG.R = 04DC956A0F1DF5EBE7778461987ADDE803224605E3BA2C319D34B2035C5AAFF5D40E8B069E7602B3203DAADB406A8B7F
3,034,966 UART: [art] SIG.S = E720EC2113B4247541123BA22F75F1034392BC531D0217DAE1A9B986EC4DF3DBD5774640FFB1CFDC80FD1D3855BAFC19
3,058,062 UART: Caliptra RT
3,058,313 UART: [state] CFI Enabled
3,177,060 UART: [rt] RT listening for mailbox commands...
3,177,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,350 UART: [rt]cmd =0x4d454153, len=108
3,230,038 >>> mbox cmd response data (12 bytes)
3,230,039 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,332 UART: [rt]cmd =0x4d454153, len=108
3,280,907 >>> mbox cmd response data (12 bytes)
3,280,908 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,037 UART: [rt]cmd =0x4d454153, len=108
3,331,769 >>> mbox cmd response data (12 bytes)
3,331,770 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,361,881 UART: [rt]cmd =0x4d454153, len=108
3,382,616 >>> mbox cmd response data (12 bytes)
3,382,617 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,598 UART: [rt]cmd =0x4d454153, len=108
3,433,314 >>> mbox cmd response data (12 bytes)
3,433,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,488 UART: [rt]cmd =0x4d454153, len=108
3,484,473 >>> mbox cmd response data (12 bytes)
3,484,474 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,435 UART: [rt]cmd =0x4d454153, len=108
3,535,569 >>> mbox cmd response data (12 bytes)
3,535,570 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,565,655 UART: [rt]cmd =0x4d454153, len=108
3,586,998 >>> mbox cmd response data (12 bytes)
3,586,999 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,116 UART: [rt]cmd =0x4d454153, len=108
3,638,278 >>> mbox cmd response data (12 bytes)
3,638,279 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,996 UART: [rt]cmd =0x4d454153, len=108
3,688,587 >>> mbox cmd response data (12 bytes)
3,688,588 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,565 UART: [rt]cmd =0x4d454153, len=108
3,738,891 >>> mbox cmd response data (12 bytes)
3,738,892 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,011 UART: [rt]cmd =0x4d454153, len=108
3,789,706 >>> mbox cmd response data (12 bytes)
3,789,707 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,534 UART: [rt]cmd =0x4d454153, len=108
3,840,266 >>> mbox cmd response data (12 bytes)
3,840,267 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,194 UART: [rt]cmd =0x4d454153, len=108
3,891,729 >>> mbox cmd response data (12 bytes)
3,891,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,921,667 UART: [rt]cmd =0x4d454153, len=108
3,923,714 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,163 UART: [state] LifecycleState = Unprovisioned
85,818 UART: [state] DebugLocked = No
86,376 UART: [state] WD Timer not started. Device not locked for debugging
87,731 UART: [kat] SHA2-256
891,281 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,385 UART: [kat] ++
895,537 UART: [kat] sha1
899,875 UART: [kat] SHA2-256
901,815 UART: [kat] SHA2-384
904,614 UART: [kat] SHA2-512-ACC
906,515 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,934 UART: [kat] LMS
1,169,246 UART: [kat] --
1,170,119 UART: [cold-reset] ++
1,170,569 UART: [fht] FHT @ 0x50003400
1,173,411 UART: [idev] ++
1,173,579 UART: [idev] CDI.KEYID = 6
1,173,940 UART: [idev] SUBJECT.KEYID = 7
1,174,365 UART: [idev] UDS.KEYID = 0
1,174,711 ready_for_fw is high
1,174,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,504 UART: [idev] Erasing UDS.KEYID = 0
1,199,336 UART: [idev] Sha1 KeyId Algorithm
1,208,266 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,215,921 UART: [ldev] Erasing FE.KEYID = 1
1,243,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,135 UART: [ldev] --
1,282,582 UART: [fwproc] Wait for Commands...
1,283,161 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,328 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,884 >>> mbox cmd response: success
2,826,060 UART: [afmc] ++
2,826,228 UART: [afmc] CDI.KEYID = 6
2,826,591 UART: [afmc] SUBJECT.KEYID = 7
2,827,017 UART: [afmc] AUTHORITY.KEYID = 5
2,863,048 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,525 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,274 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,566 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,277 UART: [afmc] --
2,906,324 UART: [cold-reset] --
2,907,272 UART: [state] Locking Datavault
2,908,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,067 UART: [state] Locking ICCM
2,909,721 UART: [exit] Launching FMC @ 0x40000130
2,915,051 UART:
2,915,067 UART: Running Caliptra FMC ...
2,915,475 UART:
2,915,618 UART: [state] CFI Enabled
2,926,392 UART: [fht] FMC Alias Private Key: 7
3,045,544 UART: [art] Extend RT PCRs Done
3,045,972 UART: [art] Lock RT PCRs Done
3,047,770 UART: [art] Populate DV Done
3,056,019 UART: [fht] FMC Alias Private Key: 7
3,056,963 UART: [art] Derive CDI
3,057,243 UART: [art] Store in slot 0x4
3,143,614 UART: [art] Derive Key Pair
3,143,974 UART: [art] Store priv key in slot 0x5
3,157,502 UART: [art] Derive Key Pair - Done
3,172,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,518 UART: [art] PUB.X = 4EE2E974DE5E11654D3E59DAD5D2FCF2CF3DE71C6EDD6531C058064A598D2D31F9EFB3FBBC38EB18F936CBF6F5D98F85
3,195,311 UART: [art] PUB.Y = A7A556641C310E75A696E9D24A9574BF5B1E82725F7C7FCE6819D9927B15A286B004B05DD1EA3883800B3072376A416A
3,202,248 UART: [art] SIG.R = AC6F86DE7F7394B48E5499A955DF3316EF3F2DF6975F366BE00B9F16917A07B830E4B048ACEACF7CA51813F76B1DE742
3,209,024 UART: [art] SIG.S = EE3CFEF115625983190591650E42C16B6C44731363C737417C6504C0B57CF001874030B7EA8D8C7EF55BB7FE6657D131
3,232,716 UART: Caliptra RT
3,233,059 UART: [state] CFI Enabled
3,352,021 UART: [rt] RT listening for mailbox commands...
3,352,691 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,103 UART: [rt]cmd =0x4d454153, len=108
3,403,261 >>> mbox cmd response data (12 bytes)
3,403,262 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,325 UART: [rt]cmd =0x4d454153, len=108
3,453,906 >>> mbox cmd response data (12 bytes)
3,453,907 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,004 UART: [rt]cmd =0x4d454153, len=108
3,505,206 >>> mbox cmd response data (12 bytes)
3,505,207 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,382 UART: [rt]cmd =0x4d454153, len=108
3,556,309 >>> mbox cmd response data (12 bytes)
3,556,310 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,325 UART: [rt]cmd =0x4d454153, len=108
3,607,157 >>> mbox cmd response data (12 bytes)
3,607,158 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,141 UART: [rt]cmd =0x4d454153, len=108
3,657,834 >>> mbox cmd response data (12 bytes)
3,657,835 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,862 UART: [rt]cmd =0x4d454153, len=108
3,709,570 >>> mbox cmd response data (12 bytes)
3,709,571 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,739,608 UART: [rt]cmd =0x4d454153, len=108
3,761,245 >>> mbox cmd response data (12 bytes)
3,761,246 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,243 UART: [rt]cmd =0x4d454153, len=108
3,812,685 >>> mbox cmd response data (12 bytes)
3,812,686 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,669 UART: [rt]cmd =0x4d454153, len=108
3,863,970 >>> mbox cmd response data (12 bytes)
3,863,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,894,244 UART: [rt]cmd =0x4d454153, len=108
3,914,324 >>> mbox cmd response data (12 bytes)
3,914,325 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,512 UART: [rt]cmd =0x4d454153, len=108
3,965,141 >>> mbox cmd response data (12 bytes)
3,965,142 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,135 UART: [rt]cmd =0x4d454153, len=108
4,015,323 >>> mbox cmd response data (12 bytes)
4,015,324 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,313 UART: [rt]cmd =0x4d454153, len=108
4,066,634 >>> mbox cmd response data (12 bytes)
4,066,635 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,544 UART: [rt]cmd =0x4d454153, len=108
4,098,397 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,855 ready_for_fw is high
1,058,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,849 >>> mbox cmd response: success
2,741,102 UART:
2,741,118 UART: Running Caliptra FMC ...
2,741,526 UART:
2,741,669 UART: [state] CFI Enabled
2,752,147 UART: [fht] FMC Alias Private Key: 7
2,871,055 UART: [art] Extend RT PCRs Done
2,871,483 UART: [art] Lock RT PCRs Done
2,873,285 UART: [art] Populate DV Done
2,881,136 UART: [fht] FMC Alias Private Key: 7
2,882,190 UART: [art] Derive CDI
2,882,470 UART: [art] Store in slot 0x4
2,968,189 UART: [art] Derive Key Pair
2,968,549 UART: [art] Store priv key in slot 0x5
2,982,167 UART: [art] Derive Key Pair - Done
2,996,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,701 UART: [art] PUB.X = 5CC4A9D2C90F966BE5B669007EEF161A9514E0D9DFBF11805AC6B022BB59162590E5B97C2A9BE716C48327AEC6DED798
3,019,458 UART: [art] PUB.Y = A89D25E64FBBD45F96899F5B71756C589E5492603CBC2134813EACA1B55F148ECD3F28ECFC88DC408BFF92FBF5296B4A
3,026,424 UART: [art] SIG.R = F012C684E5273A7CF1AA2ED751CA46E588862790D56368E62EA002D6E5BD5564A5683FFCBDAAED3B2E550EDAAFB1EF45
3,033,208 UART: [art] SIG.S = 8FA57B1CA7BE26FB16D59AB2632FD06E0008AFEA8EF0527CC5D8F6B51C9F54DF23425F55562CDCC6DA92121F30F1E587
3,056,999 UART: Caliptra RT
3,057,342 UART: [state] CFI Enabled
3,176,866 UART: [rt] RT listening for mailbox commands...
3,177,536 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,010 UART: [rt]cmd =0x4d454153, len=108
3,228,982 >>> mbox cmd response data (12 bytes)
3,228,983 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,259,042 UART: [rt]cmd =0x4d454153, len=108
3,279,961 >>> mbox cmd response data (12 bytes)
3,279,962 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,203 UART: [rt]cmd =0x4d454153, len=108
3,330,259 >>> mbox cmd response data (12 bytes)
3,330,260 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,360,251 UART: [rt]cmd =0x4d454153, len=108
3,380,810 >>> mbox cmd response data (12 bytes)
3,380,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,024 UART: [rt]cmd =0x4d454153, len=108
3,431,688 >>> mbox cmd response data (12 bytes)
3,431,689 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,786 UART: [rt]cmd =0x4d454153, len=108
3,482,653 >>> mbox cmd response data (12 bytes)
3,482,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,753 UART: [rt]cmd =0x4d454153, len=108
3,533,851 >>> mbox cmd response data (12 bytes)
3,533,852 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,563,645 UART: [rt]cmd =0x4d454153, len=108
3,583,700 >>> mbox cmd response data (12 bytes)
3,583,701 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,932 UART: [rt]cmd =0x4d454153, len=108
3,634,838 >>> mbox cmd response data (12 bytes)
3,634,839 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,664,888 UART: [rt]cmd =0x4d454153, len=108
3,687,287 >>> mbox cmd response data (12 bytes)
3,687,288 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,441 UART: [rt]cmd =0x4d454153, len=108
3,738,443 >>> mbox cmd response data (12 bytes)
3,738,444 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,499 UART: [rt]cmd =0x4d454153, len=108
3,788,678 >>> mbox cmd response data (12 bytes)
3,788,679 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,588 UART: [rt]cmd =0x4d454153, len=108
3,840,136 >>> mbox cmd response data (12 bytes)
3,840,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,870,076 UART: [rt]cmd =0x4d454153, len=108
3,891,055 >>> mbox cmd response data (12 bytes)
3,891,056 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,889 UART: [rt]cmd =0x4d454153, len=108
3,922,782 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,655 UART: [kat] SHA2-256
903,595 UART: [kat] SHA2-384
906,286 UART: [kat] SHA2-512-ACC
908,187 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,718 UART: [kat] LMS
1,171,046 UART: [kat] --
1,172,009 UART: [cold-reset] ++
1,172,423 UART: [fht] FHT @ 0x50003400
1,175,222 UART: [idev] ++
1,175,390 UART: [idev] CDI.KEYID = 6
1,175,750 UART: [idev] SUBJECT.KEYID = 7
1,176,174 UART: [idev] UDS.KEYID = 0
1,176,519 ready_for_fw is high
1,176,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,350 UART: [idev] Erasing UDS.KEYID = 0
1,201,693 UART: [idev] Sha1 KeyId Algorithm
1,210,193 UART: [idev] --
1,211,059 UART: [ldev] ++
1,211,227 UART: [ldev] CDI.KEYID = 6
1,211,590 UART: [ldev] SUBJECT.KEYID = 5
1,212,016 UART: [ldev] AUTHORITY.KEYID = 7
1,212,479 UART: [ldev] FE.KEYID = 1
1,217,751 UART: [ldev] Erasing FE.KEYID = 1
1,243,954 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,282,936 UART: [fwproc] Wait for Commands...
1,283,562 UART: [fwproc] Recv command 0x46574c44
1,284,290 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,761 >>> mbox cmd response: success
2,828,835 UART: [afmc] ++
2,829,003 UART: [afmc] CDI.KEYID = 6
2,829,365 UART: [afmc] SUBJECT.KEYID = 7
2,829,790 UART: [afmc] AUTHORITY.KEYID = 5
2,864,977 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,306 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,054 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,646 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,347 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,997 UART: [afmc] --
2,907,949 UART: [cold-reset] --
2,908,605 UART: [state] Locking Datavault
2,909,670 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,274 UART: [state] Locking ICCM
2,910,704 UART: [exit] Launching FMC @ 0x40000130
2,916,034 UART:
2,916,050 UART: Running Caliptra FMC ...
2,916,458 UART:
2,916,512 UART: [state] CFI Enabled
2,927,198 UART: [fht] FMC Alias Private Key: 7
3,045,622 UART: [art] Extend RT PCRs Done
3,046,050 UART: [art] Lock RT PCRs Done
3,047,524 UART: [art] Populate DV Done
3,055,621 UART: [fht] FMC Alias Private Key: 7
3,056,649 UART: [art] Derive CDI
3,056,929 UART: [art] Store in slot 0x4
3,142,982 UART: [art] Derive Key Pair
3,143,342 UART: [art] Store priv key in slot 0x5
3,156,488 UART: [art] Derive Key Pair - Done
3,170,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,852 UART: [art] PUB.X = AB97041DD4BADC244A8A77FB1E6CF0B05B8A5FE926C8BD547A484595A39FA37B7A7DAC153BB025807275BA2B7A9B66A4
3,193,637 UART: [art] PUB.Y = C10551AAAEC6284E5A8699B3B81703005ACDB56B25F737AEF4645B7390C9603AB014B38F2044CC08FA47430B2556DBC2
3,200,557 UART: [art] SIG.R = 1EF89BDCFD652031365DCF12E09A3115EA90DEA68CA1597705B038995E11DDF7D2CBA38A8C6CADD485FAC6F0C2AEC48E
3,207,348 UART: [art] SIG.S = AE0C905AE451D00DB6747747BB04079B5EA0C4857F763BA25529699D008CDFFDFF70362E9501AF2DFD7A6C310326FE26
3,230,904 UART: Caliptra RT
3,231,155 UART: [state] CFI Enabled
3,351,674 UART: [rt] RT listening for mailbox commands...
3,352,344 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,900 UART: [rt]cmd =0x4d454153, len=108
3,403,928 >>> mbox cmd response data (12 bytes)
3,403,929 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,433,818 UART: [rt]cmd =0x4d454153, len=108
3,454,059 >>> mbox cmd response data (12 bytes)
3,454,060 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,327 UART: [rt]cmd =0x4d454153, len=108
3,505,697 >>> mbox cmd response data (12 bytes)
3,505,698 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,649 UART: [rt]cmd =0x4d454153, len=108
3,557,154 >>> mbox cmd response data (12 bytes)
3,557,155 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,587,128 UART: [rt]cmd =0x4d454153, len=108
3,608,504 >>> mbox cmd response data (12 bytes)
3,608,505 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,490 UART: [rt]cmd =0x4d454153, len=108
3,659,593 >>> mbox cmd response data (12 bytes)
3,659,594 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,495 UART: [rt]cmd =0x4d454153, len=108
3,710,097 >>> mbox cmd response data (12 bytes)
3,710,098 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,091 UART: [rt]cmd =0x4d454153, len=108
3,761,332 >>> mbox cmd response data (12 bytes)
3,761,333 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,208 UART: [rt]cmd =0x4d454153, len=108
3,811,968 >>> mbox cmd response data (12 bytes)
3,811,969 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,022 UART: [rt]cmd =0x4d454153, len=108
3,862,859 >>> mbox cmd response data (12 bytes)
3,862,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,892,637 UART: [rt]cmd =0x4d454153, len=108
3,913,269 >>> mbox cmd response data (12 bytes)
3,913,270 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,943,487 UART: [rt]cmd =0x4d454153, len=108
3,964,354 >>> mbox cmd response data (12 bytes)
3,964,355 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,580 UART: [rt]cmd =0x4d454153, len=108
4,015,860 >>> mbox cmd response data (12 bytes)
4,015,861 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,894 UART: [rt]cmd =0x4d454153, len=108
4,066,863 >>> mbox cmd response data (12 bytes)
4,066,864 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,096,873 UART: [rt]cmd =0x4d454153, len=108
4,099,094 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,975 ready_for_fw is high
1,060,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,229 >>> mbox cmd response: success
2,740,756 UART:
2,740,772 UART: Running Caliptra FMC ...
2,741,180 UART:
2,741,234 UART: [state] CFI Enabled
2,751,984 UART: [fht] FMC Alias Private Key: 7
2,871,468 UART: [art] Extend RT PCRs Done
2,871,896 UART: [art] Lock RT PCRs Done
2,873,576 UART: [art] Populate DV Done
2,881,693 UART: [fht] FMC Alias Private Key: 7
2,882,869 UART: [art] Derive CDI
2,883,149 UART: [art] Store in slot 0x4
2,968,996 UART: [art] Derive Key Pair
2,969,356 UART: [art] Store priv key in slot 0x5
2,983,070 UART: [art] Derive Key Pair - Done
2,997,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,965 UART: [art] PUB.X = CC2EC2434AC1D37BB8A9BBE429FABD6582FF8782134940705A6FECB8C3C5F55B92160DE4CD0F5FFFCF55BF51AAAD7684
3,020,755 UART: [art] PUB.Y = 930220BD7CE369C0F7EA9B768439110B52B7E84B3EA254BF6571ED2680380FE60940EC53E023CFFB42807703CC1DED62
3,027,694 UART: [art] SIG.R = C404AE341CCF1BD29BB1C6B1C4A36C965B14C1ED5AEC51D4954C2E8783A6FEC1BBF6EBD5149070CF0FF10E72D93EB0E4
3,034,481 UART: [art] SIG.S = B13AEA4A2F0AA940090A26CF3F1F52CBF3FF22D5ED3D8E08A2894D7AF000F262777AB57D61EC23A6B53A51F1AA2C9C55
3,058,611 UART: Caliptra RT
3,058,862 UART: [state] CFI Enabled
3,179,060 UART: [rt] RT listening for mailbox commands...
3,179,730 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,376 UART: [rt]cmd =0x4d454153, len=108
3,231,100 >>> mbox cmd response data (12 bytes)
3,231,101 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,260,956 UART: [rt]cmd =0x4d454153, len=108
3,281,681 >>> mbox cmd response data (12 bytes)
3,281,682 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,311,815 UART: [rt]cmd =0x4d454153, len=108
3,332,063 >>> mbox cmd response data (12 bytes)
3,332,064 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,361,771 UART: [rt]cmd =0x4d454153, len=108
3,382,090 >>> mbox cmd response data (12 bytes)
3,382,091 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,054 UART: [rt]cmd =0x4d454153, len=108
3,432,848 >>> mbox cmd response data (12 bytes)
3,432,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,802 UART: [rt]cmd =0x4d454153, len=108
3,483,365 >>> mbox cmd response data (12 bytes)
3,483,366 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,551 UART: [rt]cmd =0x4d454153, len=108
3,534,621 >>> mbox cmd response data (12 bytes)
3,534,622 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,521 UART: [rt]cmd =0x4d454153, len=108
3,585,188 >>> mbox cmd response data (12 bytes)
3,585,189 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,306 UART: [rt]cmd =0x4d454153, len=108
3,636,626 >>> mbox cmd response data (12 bytes)
3,636,627 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,666,558 UART: [rt]cmd =0x4d454153, len=108
3,688,111 >>> mbox cmd response data (12 bytes)
3,688,112 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,133 UART: [rt]cmd =0x4d454153, len=108
3,739,175 >>> mbox cmd response data (12 bytes)
3,739,176 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,769,193 UART: [rt]cmd =0x4d454153, len=108
3,790,784 >>> mbox cmd response data (12 bytes)
3,790,785 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,740 UART: [rt]cmd =0x4d454153, len=108
3,841,884 >>> mbox cmd response data (12 bytes)
3,841,885 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,984 UART: [rt]cmd =0x4d454153, len=108
3,893,209 >>> mbox cmd response data (12 bytes)
3,893,210 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,299 UART: [rt]cmd =0x4d454153, len=108
3,925,628 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,298 UART: [state] WD Timer not started. Device not locked for debugging
87,419 UART: [kat] SHA2-256
893,069 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,194 UART: [kat] ++
897,346 UART: [kat] sha1
901,574 UART: [kat] SHA2-256
903,514 UART: [kat] SHA2-384
906,371 UART: [kat] SHA2-512-ACC
908,272 UART: [kat] ECC-384
918,111 UART: [kat] HMAC-384Kdf
922,585 UART: [kat] LMS
1,170,913 UART: [kat] --
1,171,620 UART: [cold-reset] ++
1,172,074 UART: [fht] FHT @ 0x50003400
1,174,815 UART: [idev] ++
1,174,983 UART: [idev] CDI.KEYID = 6
1,175,343 UART: [idev] SUBJECT.KEYID = 7
1,175,767 UART: [idev] UDS.KEYID = 0
1,176,112 ready_for_fw is high
1,176,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,925 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,209,932 UART: [idev] --
1,210,912 UART: [ldev] ++
1,211,080 UART: [ldev] CDI.KEYID = 6
1,211,443 UART: [ldev] SUBJECT.KEYID = 5
1,211,869 UART: [ldev] AUTHORITY.KEYID = 7
1,212,332 UART: [ldev] FE.KEYID = 1
1,217,632 UART: [ldev] Erasing FE.KEYID = 1
1,244,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,939 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,651 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,908 UART: [ldev] --
1,284,409 UART: [fwproc] Wait for Commands...
1,285,229 UART: [fwproc] Recv command 0x46574c44
1,285,957 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,659,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,528 >>> mbox cmd response: success
2,831,710 UART: [afmc] ++
2,831,878 UART: [afmc] CDI.KEYID = 6
2,832,240 UART: [afmc] SUBJECT.KEYID = 7
2,832,665 UART: [afmc] AUTHORITY.KEYID = 5
2,868,058 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,415 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,872 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,755 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,456 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,230 UART: [afmc] --
2,911,338 UART: [cold-reset] --
2,912,448 UART: [state] Locking Datavault
2,913,561 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,165 UART: [state] Locking ICCM
2,914,745 UART: [exit] Launching FMC @ 0x40000130
2,920,075 UART:
2,920,091 UART: Running Caliptra FMC ...
2,920,499 UART:
2,920,642 UART: [state] CFI Enabled
2,931,006 UART: [fht] FMC Alias Private Key: 7
3,050,196 UART: [art] Extend RT PCRs Done
3,050,624 UART: [art] Lock RT PCRs Done
3,052,252 UART: [art] Populate DV Done
3,060,301 UART: [fht] FMC Alias Private Key: 7
3,061,265 UART: [art] Derive CDI
3,061,545 UART: [art] Store in slot 0x4
3,147,340 UART: [art] Derive Key Pair
3,147,700 UART: [art] Store priv key in slot 0x5
3,161,190 UART: [art] Derive Key Pair - Done
3,176,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,136 UART: [art] PUB.X = F96404FFBD8ACFF3C849D714ECB31FA145030A5E4CFC4E0EB30ECE8F45749FC4DCDCA4A60A6019153890CAA8F8D752AB
3,198,914 UART: [art] PUB.Y = F3CC713894DB23FE1C680A978CD47D811BCC1A84293EAF4A40F7D33822C4F48F5E27478E3843451A8F9C86852B3DEAAF
3,205,871 UART: [art] SIG.R = C74FA7BD89F470C400E46796AB35FB38BBA3D1DEBDD6902B907077F9052E3940A0D4F619A37F4AAB14BB3DF59AA05379
3,212,630 UART: [art] SIG.S = CAC6164527377858DD6E52210F48FD9C0ADC2EAF686835D6E5BF029752B534E4701FBF992332F6FD634FD7F23FB7378F
3,236,269 UART: Caliptra RT
3,236,612 UART: [state] CFI Enabled
3,356,690 UART: [rt] RT listening for mailbox commands...
3,357,360 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,994 UART: [rt]cmd =0x4d454153, len=108
3,409,314 >>> mbox cmd response data (12 bytes)
3,409,315 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,306 UART: [rt]cmd =0x4d454153, len=108
3,460,527 >>> mbox cmd response data (12 bytes)
3,460,528 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,490,583 UART: [rt]cmd =0x4d454153, len=108
3,511,589 >>> mbox cmd response data (12 bytes)
3,511,590 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,533 UART: [rt]cmd =0x4d454153, len=108
3,562,732 >>> mbox cmd response data (12 bytes)
3,562,733 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,968 UART: [rt]cmd =0x4d454153, len=108
3,614,096 >>> mbox cmd response data (12 bytes)
3,614,097 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,364 UART: [rt]cmd =0x4d454153, len=108
3,664,477 >>> mbox cmd response data (12 bytes)
3,664,478 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,503 UART: [rt]cmd =0x4d454153, len=108
3,714,921 >>> mbox cmd response data (12 bytes)
3,714,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,744,773 UART: [rt]cmd =0x4d454153, len=108
3,765,904 >>> mbox cmd response data (12 bytes)
3,765,905 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,795,942 UART: [rt]cmd =0x4d454153, len=108
3,816,276 >>> mbox cmd response data (12 bytes)
3,816,277 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,260 UART: [rt]cmd =0x4d454153, len=108
3,867,363 >>> mbox cmd response data (12 bytes)
3,867,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,265 UART: [rt]cmd =0x4d454153, len=108
3,917,491 >>> mbox cmd response data (12 bytes)
3,917,492 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,539 UART: [rt]cmd =0x4d454153, len=108
3,968,898 >>> mbox cmd response data (12 bytes)
3,968,899 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,800 UART: [rt]cmd =0x4d454153, len=108
4,018,810 >>> mbox cmd response data (12 bytes)
4,018,811 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,048,630 UART: [rt]cmd =0x4d454153, len=108
4,068,929 >>> mbox cmd response data (12 bytes)
4,068,930 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,098,865 UART: [rt]cmd =0x4d454153, len=108
4,100,986 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,482 ready_for_fw is high
1,060,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,435 >>> mbox cmd response: success
2,743,236 UART:
2,743,252 UART: Running Caliptra FMC ...
2,743,660 UART:
2,743,803 UART: [state] CFI Enabled
2,754,329 UART: [fht] FMC Alias Private Key: 7
2,872,935 UART: [art] Extend RT PCRs Done
2,873,363 UART: [art] Lock RT PCRs Done
2,875,003 UART: [art] Populate DV Done
2,883,204 UART: [fht] FMC Alias Private Key: 7
2,884,222 UART: [art] Derive CDI
2,884,502 UART: [art] Store in slot 0x4
2,970,169 UART: [art] Derive Key Pair
2,970,529 UART: [art] Store priv key in slot 0x5
2,984,031 UART: [art] Derive Key Pair - Done
2,998,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,119 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,884 UART: [art] PUB.X = CB977399E8DD14A3944225AEBBCBB1F959EA84C4099D26D2AC026026544BDCC4F8365438DACF6E1A1D7F84DED7080C03
3,021,653 UART: [art] PUB.Y = D52C1F4076854E0ECCD0812108DE6E94A9B9BA2D1BB0B8428FE8422A17E44C9F877A5444937E5FDF3ECFDB92B5B5D9FC
3,028,615 UART: [art] SIG.R = 893E8AF6D5053552B036C5DC35B6D4E709EF761E0BDD75A900B0C5901B7EDD0EDDA17A2F629B8B0CD78DDDB779D9388D
3,035,366 UART: [art] SIG.S = 7CCC40CE92E9EEAFEE42F6CE198D887EC94FF70055B0C3DDA741147E34EAB4FD7CBA4F999F08ACDD52B617BB650D626D
3,058,934 UART: Caliptra RT
3,059,277 UART: [state] CFI Enabled
3,178,526 UART: [rt] RT listening for mailbox commands...
3,179,196 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,920 UART: [rt]cmd =0x4d454153, len=108
3,231,430 >>> mbox cmd response data (12 bytes)
3,231,431 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,261,442 UART: [rt]cmd =0x4d454153, len=108
3,282,471 >>> mbox cmd response data (12 bytes)
3,282,472 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,585 UART: [rt]cmd =0x4d454153, len=108
3,333,011 >>> mbox cmd response data (12 bytes)
3,333,012 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,362,953 UART: [rt]cmd =0x4d454153, len=108
3,383,942 >>> mbox cmd response data (12 bytes)
3,383,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,224 UART: [rt]cmd =0x4d454153, len=108
3,435,500 >>> mbox cmd response data (12 bytes)
3,435,501 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,606 UART: [rt]cmd =0x4d454153, len=108
3,486,571 >>> mbox cmd response data (12 bytes)
3,486,572 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,475 UART: [rt]cmd =0x4d454153, len=108
3,537,095 >>> mbox cmd response data (12 bytes)
3,537,096 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,131 UART: [rt]cmd =0x4d454153, len=108
3,587,102 >>> mbox cmd response data (12 bytes)
3,587,103 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,617,120 UART: [rt]cmd =0x4d454153, len=108
3,638,674 >>> mbox cmd response data (12 bytes)
3,638,675 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,668,754 UART: [rt]cmd =0x4d454153, len=108
3,689,875 >>> mbox cmd response data (12 bytes)
3,689,876 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,959 UART: [rt]cmd =0x4d454153, len=108
3,740,981 >>> mbox cmd response data (12 bytes)
3,740,982 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,001 UART: [rt]cmd =0x4d454153, len=108
3,791,970 >>> mbox cmd response data (12 bytes)
3,791,971 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,088 UART: [rt]cmd =0x4d454153, len=108
3,842,506 >>> mbox cmd response data (12 bytes)
3,842,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,872,486 UART: [rt]cmd =0x4d454153, len=108
3,893,583 >>> mbox cmd response data (12 bytes)
3,893,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,923,637 UART: [rt]cmd =0x4d454153, len=108
3,925,444 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_stash_measurement_pl_context_thresholds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
2,238,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,388,131 UART:
2,388,724 UART: Running Caliptra ROM ...
2,389,830 UART:
2,389,996 UART: [state] CFI Enabled
2,390,929 UART: [state] LifecycleState = Unprovisioned
2,392,620 UART: [state] DebugLocked = No
2,393,736 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,397,046 UART: [kat] SHA2-256
2,397,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,400,732 UART: [kat] ++
2,401,202 UART: [kat] sha1
2,401,715 UART: [kat] SHA2-256
2,402,458 UART: [kat] SHA2-384
2,403,122 UART: [kat] SHA2-512-ACC
2,404,006 UART: [kat] ECC-384
2,767,710 UART: [kat] HMAC-384Kdf
2,798,753 UART: [kat] LMS
3,989,028 UART: [kat] --
3,992,216 UART: [cold-reset] ++
3,994,415 UART: [fht] Storing FHT @ 0x50003400
4,006,489 UART: [idev] ++
4,007,068 UART: [idev] CDI.KEYID = 6
4,008,015 UART: [idev] SUBJECT.KEYID = 7
4,009,295 UART: [idev] UDS.KEYID = 0
4,033,942 UART: [idev] Erasing UDS.KEYID = 0
7,344,478 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,909 UART: [idev] --
7,371,079 UART: [ldev] ++
7,371,695 UART: [ldev] CDI.KEYID = 6
7,372,627 UART: [ldev] SUBJECT.KEYID = 5
7,373,846 UART: [ldev] AUTHORITY.KEYID = 7
7,375,085 UART: [ldev] FE.KEYID = 1
7,421,166 UART: [ldev] Erasing FE.KEYID = 1
10,753,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,470 UART: [ldev] --
13,116,246 UART: [fwproc] Waiting for Commands...
13,118,722 UART: [fwproc] Received command 0x46574c44
13,120,909 UART: [fwproc] Received Image of size 118548 bytes
17,227,946 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,015 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,212 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,097 >>> mbox cmd response: success
17,703,670 UART: [afmc] ++
17,704,259 UART: [afmc] CDI.KEYID = 6
17,705,282 UART: [afmc] SUBJECT.KEYID = 7
17,706,441 UART: [afmc] AUTHORITY.KEYID = 5
21,071,678 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,368 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,688 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,238 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,438,964 UART: [afmc] --
23,442,067 UART: [cold-reset] --
23,446,061 UART: [state] Locking Datavault
23,450,583 UART: [state] Locking PCR0, PCR1 and PCR31
23,452,333 UART: [state] Locking ICCM
23,453,982 UART: [exit] Launching FMC @ 0x40000130
23,462,383 UART:
23,462,617 UART: Running Caliptra FMC ...
23,463,716 UART:
23,463,878 UART: [state] CFI Enabled
23,531,492 UART: [fht] FMC Alias Private Key: 7
25,871,952 UART: [art] Extend RT PCRs Done
25,873,172 UART: [art] Lock RT PCRs Done
25,875,040 UART: [art] Populate DV Done
25,880,239 UART: [fht] FMC Alias Private Key: 7
25,881,787 UART: [art] Derive CDI
25,882,603 UART: [art] Store in slot 0x4
25,940,287 UART: [art] Derive Key Pair
25,941,352 UART: [art] Store priv key in slot 0x5
29,234,493 UART: [art] Derive Key Pair - Done
29,247,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,167 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,675 UART: [art] PUB.X = 76B7B3AC337DEC1CE1A6EBE6E59C0AC21A1C6DA0E068DD933961287BB4B3E48D71EB64C0FAF412C3802C76EFBE7A1A85
31,544,976 UART: [art] PUB.Y = A805A815E87C21BBF553C84520423ACC7E8E9D7E6127E876365DDC0C5A0E3C08D40B21F0FF571A1C4B0D071715C24F87
31,552,261 UART: [art] SIG.R = E02CCBC48FAB67CAD40884D0FDB9399B8B421198DC266691DEE99C4B4B3A1733C50844B9EB701302584402D6D1A24985
31,559,637 UART: [art] SIG.S = 5D16E6E710C06B3A38B9088B89D032B3DB60EB445FDE7A4BF001F4AA7AE721A3A04C90A8D1F519541BF0C70316C56476
32,865,141 UART: Caliptra RT
32,865,846 UART: [state] CFI Enabled
33,042,014 UART: [rt] RT listening for mailbox commands...
33,043,955 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,074,687 UART: [rt]cmd =0x44504543, len=92
33,081,459 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,849 writing to cptra_bootfsm_go
2,236,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,962,942 >>> mbox cmd response: success
23,646,014 UART:
23,646,441 UART: Running Caliptra FMC ...
23,647,588 UART:
23,647,757 UART: [state] CFI Enabled
23,714,856 UART: [fht] FMC Alias Private Key: 7
26,055,091 UART: [art] Extend RT PCRs Done
26,056,320 UART: [art] Lock RT PCRs Done
26,058,172 UART: [art] Populate DV Done
26,063,642 UART: [fht] FMC Alias Private Key: 7
26,065,187 UART: [art] Derive CDI
26,066,026 UART: [art] Store in slot 0x4
26,123,446 UART: [art] Derive Key Pair
26,124,441 UART: [art] Store priv key in slot 0x5
29,417,106 UART: [art] Derive Key Pair - Done
29,430,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,708 UART: [art] Erasing AUTHORITY.KEYID = 7
31,720,229 UART: [art] PUB.X = 071063613B7394816B58D5CE3AB949AB23D2B3A27A4D64D91984136EC7F596A4C1377CDC122DF26E7A2A115D2383B232
31,727,477 UART: [art] PUB.Y = 35E51618346E1D612847363E97B3336004D9645A6732244F761DD1FA3D732082444C442057FD5D514255C5BFF6189639
31,734,700 UART: [art] SIG.R = A37B5519E2AC2C37C791C5A583782F81A82B23970EEB79F8543AF6262356CC5A71C1313814E1248A67E5B8B23E8701CB
31,742,049 UART: [art] SIG.S = 8914244BB3611BC62059907C682FC54294A76FF51FBFAA7D80903E276AE6BE0A3223C933491634032C21889673295BC1
33,047,281 UART: Caliptra RT
33,047,988 UART: [state] CFI Enabled
33,222,844 UART: [rt] RT listening for mailbox commands...
33,224,800 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,255,539 UART: [rt]cmd =0x44504543, len=92
33,262,303 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,246,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,396,815 UART:
2,397,212 UART: Running Caliptra ROM ...
2,398,375 UART:
2,398,569 UART: [state] CFI Enabled
2,399,528 UART: [state] LifecycleState = Unprovisioned
2,401,188 UART: [state] DebugLocked = No
2,402,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,405,545 UART: [kat] SHA2-256
2,406,211 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,409,207 UART: [kat] ++
2,409,656 UART: [kat] sha1
2,410,189 UART: [kat] SHA2-256
2,410,844 UART: [kat] SHA2-384
2,411,497 UART: [kat] SHA2-512-ACC
2,412,291 UART: [kat] ECC-384
3,111,507 UART: [kat] HMAC-384Kdf
3,123,356 UART: [kat] LMS
4,313,457 UART: [kat] --
4,318,450 UART: [cold-reset] ++
4,320,559 UART: [fht] Storing FHT @ 0x50003400
4,332,308 UART: [idev] ++
4,332,929 UART: [idev] CDI.KEYID = 6
4,333,832 UART: [idev] SUBJECT.KEYID = 7
4,335,091 UART: [idev] UDS.KEYID = 0
4,350,317 UART: [idev] Erasing UDS.KEYID = 0
7,620,992 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,720 UART: [idev] --
7,648,983 UART: [ldev] ++
7,649,553 UART: [ldev] CDI.KEYID = 6
7,650,511 UART: [ldev] SUBJECT.KEYID = 5
7,651,717 UART: [ldev] AUTHORITY.KEYID = 7
7,653,002 UART: [ldev] FE.KEYID = 1
7,663,216 UART: [ldev] Erasing FE.KEYID = 1
10,953,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,102 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,571 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,389 UART: [ldev] --
13,313,915 UART: [fwproc] Waiting for Commands...
13,316,554 UART: [fwproc] Received command 0x46574c44
13,318,777 UART: [fwproc] Received Image of size 118548 bytes
17,425,170 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,512 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,694 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,660 >>> mbox cmd response: success
17,909,711 UART: [afmc] ++
17,910,291 UART: [afmc] CDI.KEYID = 6
17,911,346 UART: [afmc] SUBJECT.KEYID = 7
17,912,446 UART: [afmc] AUTHORITY.KEYID = 5
21,226,323 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,014 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,273 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,449 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,880 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,478 UART: [afmc] --
23,588,121 UART: [cold-reset] --
23,590,517 UART: [state] Locking Datavault
23,592,681 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,429 UART: [state] Locking ICCM
23,596,518 UART: [exit] Launching FMC @ 0x40000130
23,604,906 UART:
23,605,134 UART: Running Caliptra FMC ...
23,606,229 UART:
23,606,385 UART: [state] CFI Enabled
23,614,241 UART: [fht] FMC Alias Private Key: 7
25,954,396 UART: [art] Extend RT PCRs Done
25,955,624 UART: [art] Lock RT PCRs Done
25,957,532 UART: [art] Populate DV Done
25,963,069 UART: [fht] FMC Alias Private Key: 7
25,964,665 UART: [art] Derive CDI
25,965,472 UART: [art] Store in slot 0x4
26,007,954 UART: [art] Derive Key Pair
26,008,956 UART: [art] Store priv key in slot 0x5
29,251,028 UART: [art] Derive Key Pair - Done
29,263,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,782 UART: [art] PUB.X = 8DD126F1A58A1E537728B8B1F429958053AC60593CF6970C3EF71E0A10B40DDD0FB4C816BF921BD1B29AE42E3DE38958
31,553,022 UART: [art] PUB.Y = 310305EB1A13FC9AA66A46068641F42942ED3AB991F35970815F564823E687C9B50B8EF9EDF3358FFFEF50CC864C54D4
31,560,278 UART: [art] SIG.R = 410CB743187DE8887768B5BD1B02838409428ABF6DD36D7AD2773D5667905E1FE49DF48D76C7C1A6CDC9B5076AAE7098
31,567,668 UART: [art] SIG.S = 777C44FF84657AA9D3EB1204F9647B5C5A5D3F4F6B4D09E894F297BC7118D0F2E3DB031F96488BABEC93FC211B4D980D
32,873,032 UART: Caliptra RT
32,873,751 UART: [state] CFI Enabled
33,006,327 UART: [rt] RT listening for mailbox commands...
33,008,266 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,038,766 UART: [rt]cmd =0x44504543, len=92
33,045,868 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
2,242,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,013 >>> mbox cmd response: success
23,806,623 UART:
23,807,017 UART: Running Caliptra FMC ...
23,808,207 UART:
23,808,379 UART: [state] CFI Enabled
23,816,305 UART: [fht] FMC Alias Private Key: 7
26,156,434 UART: [art] Extend RT PCRs Done
26,157,660 UART: [art] Lock RT PCRs Done
26,159,315 UART: [art] Populate DV Done
26,164,677 UART: [fht] FMC Alias Private Key: 7
26,166,208 UART: [art] Derive CDI
26,166,941 UART: [art] Store in slot 0x4
26,209,621 UART: [art] Derive Key Pair
26,210,668 UART: [art] Store priv key in slot 0x5
29,453,111 UART: [art] Derive Key Pair - Done
29,465,896 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,114 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,618 UART: [art] PUB.X = D2C53B933FB5A594633DFBA8DA37129A63DD8CBC71CA4DA855FC4C482818C5494C104CC230835501D725590B803D77B9
31,754,862 UART: [art] PUB.Y = 4291D7816E63E14ECDBDCC7978BFAA77B8DD0D2A0094B4AEC44F5EBAAE05964BC870C7B3F82EA791696F23199A86A9BE
31,762,133 UART: [art] SIG.R = 8E01466A0F5636C1C28576DA7CD1D0EC12D5B44BB639475005F6206A6C54C5D2A67CD883C8A271E36B0FA8976E8E944F
31,769,523 UART: [art] SIG.S = 337F207B4692EC96A86737F9C19CE3091B136C9842214FF018DD91CE252250B90886ADCE0565513EFCFB63EB34FB83F1
33,074,582 UART: Caliptra RT
33,075,289 UART: [state] CFI Enabled
33,208,748 UART: [rt] RT listening for mailbox commands...
33,210,683 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
33,241,350 UART: [rt]cmd =0x44504543, len=92
33,247,857 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
2,220,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,370,481 UART:
2,370,880 UART: Running Caliptra ROM ...
2,371,995 UART:
2,372,183 UART: [state] CFI Enabled
2,373,158 UART: [state] LifecycleState = Unprovisioned
2,374,818 UART: [state] DebugLocked = No
2,375,924 UART: [state] WD Timer not started. Device not locked for debugging
2,378,398 UART: [kat] SHA2-256
2,379,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,382,075 UART: [kat] ++
2,382,529 UART: [kat] sha1
2,383,044 UART: [kat] SHA2-256
2,383,786 UART: [kat] SHA2-384
2,384,451 UART: [kat] SHA2-512-ACC
2,385,253 UART: [kat] ECC-384
2,947,511 UART: [kat] HMAC-384Kdf
2,970,309 UART: [kat] LMS
3,446,843 UART: [kat] --
3,451,727 UART: [cold-reset] ++
3,453,358 UART: [fht] FHT @ 0x50003400
3,465,526 UART: [idev] ++
3,466,144 UART: [idev] CDI.KEYID = 6
3,467,155 UART: [idev] SUBJECT.KEYID = 7
3,468,310 UART: [idev] UDS.KEYID = 0
3,500,651 UART: [idev] Erasing UDS.KEYID = 0
5,982,180 UART: [idev] Sha1 KeyId Algorithm
6,005,691 UART: [idev] --
6,010,316 UART: [ldev] ++
6,010,945 UART: [ldev] CDI.KEYID = 6
6,011,862 UART: [ldev] SUBJECT.KEYID = 5
6,013,026 UART: [ldev] AUTHORITY.KEYID = 7
6,014,261 UART: [ldev] FE.KEYID = 1
6,057,257 UART: [ldev] Erasing FE.KEYID = 1
8,562,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,373 UART: [ldev] --
10,371,423 UART: [fwproc] Wait for Commands...
10,373,303 UART: [fwproc] Recv command 0x46574c44
10,375,351 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,937,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,234 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,267 >>> mbox cmd response: success
14,343,474 UART: [afmc] ++
14,344,055 UART: [afmc] CDI.KEYID = 6
14,345,021 UART: [afmc] SUBJECT.KEYID = 7
14,346,234 UART: [afmc] AUTHORITY.KEYID = 5
16,872,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,927 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,015 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,564 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,883 UART: [afmc] --
18,674,296 UART: [cold-reset] --
18,678,698 UART: [state] Locking Datavault
18,684,817 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,564 UART: [state] Locking ICCM
18,687,737 UART: [exit] Launching FMC @ 0x40000130
18,696,128 UART:
18,696,366 UART: Running Caliptra FMC ...
18,697,461 UART:
18,697,628 UART: [state] CFI Enabled
18,753,950 UART: [fht] FMC Alias Private Key: 7
20,519,722 UART: [art] Extend RT PCRs Done
20,520,930 UART: [art] Lock RT PCRs Done
20,522,605 UART: [art] Populate DV Done
20,528,223 UART: [fht] FMC Alias Private Key: 7
20,529,823 UART: [art] Derive CDI
20,530,635 UART: [art] Store in slot 0x4
20,585,941 UART: [art] Derive Key Pair
20,586,976 UART: [art] Store priv key in slot 0x5
23,049,440 UART: [art] Derive Key Pair - Done
23,062,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,152 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,671 UART: [art] PUB.X = 6DA53B11521D307806836FE1A1AAD79F97DFFAB18FB004228D68F1621D7BA2423F41AED0495D79000DAD390843FB60D3
24,784,869 UART: [art] PUB.Y = C23772720C6478C95970F7DF4C79FB7DB2173D52B267568DF39CE88D2520CFB8B21DAAB23D9F0D78EB3935594DD721B0
24,792,151 UART: [art] SIG.R = 1A106C9EE2A768954905378B8DD43686799FDC153D9133E7122323C286EE977F753E849203DCB668DE60B6BE46395359
24,799,481 UART: [art] SIG.S = 7ACD077FA670D61F07B5160F974BAA831A094E9DD36401816FFF4C70877317F9D2CE48925AC942626C6400BC48D857CD
25,778,270 UART: Caliptra RT
25,778,978 UART: [state] CFI Enabled
25,959,593 UART: [rt] RT listening for mailbox commands...
25,961,515 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,992,242 UART: [rt]cmd =0x44504543, len=92
25,998,747 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
2,223,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,208,226 >>> mbox cmd response: success
18,492,941 UART:
18,493,345 UART: Running Caliptra FMC ...
18,494,447 UART:
18,494,599 UART: [state] CFI Enabled
18,560,345 UART: [fht] FMC Alias Private Key: 7
20,326,806 UART: [art] Extend RT PCRs Done
20,328,033 UART: [art] Lock RT PCRs Done
20,329,687 UART: [art] Populate DV Done
20,335,251 UART: [fht] FMC Alias Private Key: 7
20,336,798 UART: [art] Derive CDI
20,337,535 UART: [art] Store in slot 0x4
20,392,934 UART: [art] Derive Key Pair
20,393,971 UART: [art] Store priv key in slot 0x5
22,857,012 UART: [art] Derive Key Pair - Done
22,869,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,193 UART: [art] Erasing AUTHORITY.KEYID = 7
24,584,699 UART: [art] PUB.X = E628D259AF65FD813F52ECBF40D356080AE06D1F8D2DB3C9BB8F6488BCD9CD523F81ED41B43FA3A65835BEB88BE34156
24,592,030 UART: [art] PUB.Y = 5170F5D77F931D9E0D78A60993E920DD5DB7588282D36AE911CA279A6E51CC472FC61650F3431774FE9B3023DC3F0182
24,599,259 UART: [art] SIG.R = A7E8C4361E8254FFB7942B6382351958CFA182F0DAA182EB4E640172B9977D630DC4B95BF329101FB62C259934C74A1C
24,606,621 UART: [art] SIG.S = D65D5665CE2F74E9CE1673A0C1945112812728CEDFCFE7FC9BDB15E0061C6E3588C0175952B489AE8846034DAAC95072
25,585,514 UART: Caliptra RT
25,586,232 UART: [state] CFI Enabled
25,766,178 UART: [rt] RT listening for mailbox commands...
25,768,103 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,798,611 UART: [rt]cmd =0x44504543, len=92
25,805,048 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
2,246,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,396,860 UART:
2,397,261 UART: Running Caliptra ROM ...
2,398,350 UART:
2,398,507 UART: [state] CFI Enabled
2,399,500 UART: [state] LifecycleState = Unprovisioned
2,401,170 UART: [state] DebugLocked = No
2,402,284 UART: [state] WD Timer not started. Device not locked for debugging
2,404,771 UART: [kat] SHA2-256
2,405,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,408,455 UART: [kat] ++
2,408,955 UART: [kat] sha1
2,409,473 UART: [kat] SHA2-256
2,410,164 UART: [kat] SHA2-384
2,410,828 UART: [kat] SHA2-512-ACC
2,411,655 UART: [kat] ECC-384
3,278,029 UART: [kat] HMAC-384Kdf
3,290,244 UART: [kat] LMS
3,766,743 UART: [kat] --
3,771,466 UART: [cold-reset] ++
3,773,511 UART: [fht] FHT @ 0x50003400
3,784,616 UART: [idev] ++
3,785,184 UART: [idev] CDI.KEYID = 6
3,786,152 UART: [idev] SUBJECT.KEYID = 7
3,787,366 UART: [idev] UDS.KEYID = 0
3,803,132 UART: [idev] Erasing UDS.KEYID = 0
6,264,582 UART: [idev] Sha1 KeyId Algorithm
6,288,512 UART: [idev] --
6,293,134 UART: [ldev] ++
6,293,710 UART: [ldev] CDI.KEYID = 6
6,294,648 UART: [ldev] SUBJECT.KEYID = 5
6,295,858 UART: [ldev] AUTHORITY.KEYID = 7
6,297,093 UART: [ldev] FE.KEYID = 1
6,309,615 UART: [ldev] Erasing FE.KEYID = 1
8,785,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,191 UART: [ldev] --
10,582,290 UART: [fwproc] Wait for Commands...
10,585,577 UART: [fwproc] Recv command 0x46574c44
10,587,563 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,652 >>> mbox cmd response: success
14,556,696 UART: [afmc] ++
14,557,278 UART: [afmc] CDI.KEYID = 6
14,558,218 UART: [afmc] SUBJECT.KEYID = 7
14,559,434 UART: [afmc] AUTHORITY.KEYID = 5
17,059,929 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,865 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,067 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,900 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,430 UART: [afmc] --
18,858,038 UART: [cold-reset] --
18,860,180 UART: [state] Locking Datavault
18,866,944 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,705 UART: [state] Locking ICCM
18,871,181 UART: [exit] Launching FMC @ 0x40000130
18,879,581 UART:
18,879,820 UART: Running Caliptra FMC ...
18,880,923 UART:
18,881,085 UART: [state] CFI Enabled
18,888,712 UART: [fht] FMC Alias Private Key: 7
20,654,049 UART: [art] Extend RT PCRs Done
20,655,290 UART: [art] Lock RT PCRs Done
20,656,620 UART: [art] Populate DV Done
20,662,202 UART: [fht] FMC Alias Private Key: 7
20,663,904 UART: [art] Derive CDI
20,664,642 UART: [art] Store in slot 0x4
20,707,671 UART: [art] Derive Key Pair
20,708,713 UART: [art] Store priv key in slot 0x5
23,136,064 UART: [art] Derive Key Pair - Done
23,148,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,854,987 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,491 UART: [art] PUB.X = 90B91A910A0F541E0D8000C2A1FE843AFA05CC43610630D9BBA744B37F2EC231342DE7570304833AB9BCFC91CA61B43F
24,863,741 UART: [art] PUB.Y = 7FA6BFEC3F8BB055D3DF489FFC86B7593B8E00D2B453FE93B77AD3B3FBE3899E9E6F69EC40243C133DBA674D90810557
24,871,026 UART: [art] SIG.R = FCD0952694DAFFAB540331C0C98D84BE331DD34FA70817BA3398B71024F4D075DD98E7D1A93A5B67C0FD439080E133BA
24,878,370 UART: [art] SIG.S = 2C2C7FD23A017BC59437B7446F3CA6D0AAA717E2B49DB732F7477F89AEBF1D0A185DD32A0B622B8D9449B93EC3F24318
25,856,773 UART: Caliptra RT
25,857,458 UART: [state] CFI Enabled
25,989,679 UART: [rt] RT listening for mailbox commands...
25,991,624 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,022,172 UART: [rt]cmd =0x44504543, len=92
26,028,789 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
2,233,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,422,258 >>> mbox cmd response: success
18,672,730 UART:
18,673,125 UART: Running Caliptra FMC ...
18,674,286 UART:
18,674,456 UART: [state] CFI Enabled
18,682,412 UART: [fht] FMC Alias Private Key: 7
20,448,285 UART: [art] Extend RT PCRs Done
20,449,516 UART: [art] Lock RT PCRs Done
20,451,358 UART: [art] Populate DV Done
20,456,724 UART: [fht] FMC Alias Private Key: 7
20,458,332 UART: [art] Derive CDI
20,459,154 UART: [art] Store in slot 0x4
20,501,875 UART: [art] Derive Key Pair
20,502,917 UART: [art] Store priv key in slot 0x5
22,929,451 UART: [art] Derive Key Pair - Done
22,942,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,648,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,650,203 UART: [art] PUB.X = 52C40347FF64B6C2CEFE076832C02D64020C875DF030220A7B6AD527072B3A6E0BE8A94E7BAFCC7CDB801136E1BA1C8A
24,657,463 UART: [art] PUB.Y = 396C2B9883C72AB7FB7E2FC5D3D5ED9B0665048789BFB34A11078784352BC1740C51A39F3A24E12C1AB9716D68A6BC6F
24,664,755 UART: [art] SIG.R = 3DE9BCDF32533426799CB74D6CC5769C37559975735D671EA5DDE059526E172E1225B8FA4487933F2B7BFB39785983F0
24,672,117 UART: [art] SIG.S = 4FEB87F553116D0C735F5F1A4387E69345B055973A37F1E62767C1C919B8FA366225C48BFFBD1BFC32D5AE19D97A325D
25,651,024 UART: Caliptra RT
25,651,745 UART: [state] CFI Enabled
25,784,596 UART: [rt] RT listening for mailbox commands...
25,786,529 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
25,817,197 UART: [rt]cmd =0x44504543, len=92
25,823,925 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,841 writing to cptra_bootfsm_go
2,225,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,376,041 UART:
2,376,458 UART: Running Caliptra ROM ...
2,377,644 UART:
2,377,834 UART: [state] CFI Enabled
2,378,797 UART: [state] LifecycleState = Unprovisioned
2,380,457 UART: [state] DebugLocked = No
2,381,566 UART: [state] WD Timer not started. Device not locked for debugging
2,384,045 UART: [kat] SHA2-256
2,384,718 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,387,724 UART: [kat] ++
2,388,175 UART: [kat] sha1
2,388,688 UART: [kat] SHA2-256
2,389,400 UART: [kat] SHA2-384
2,390,061 UART: [kat] SHA2-512-ACC
2,390,864 UART: [kat] ECC-384
2,946,143 UART: [kat] HMAC-384Kdf
2,971,931 UART: [kat] LMS
3,503,737 UART: [kat] --
3,508,603 UART: [cold-reset] ++
3,509,998 UART: [fht] FHT @ 0x50003400
3,520,593 UART: [idev] ++
3,521,317 UART: [idev] CDI.KEYID = 6
3,522,327 UART: [idev] SUBJECT.KEYID = 7
3,523,485 UART: [idev] UDS.KEYID = 0
3,543,510 UART: [idev] Erasing UDS.KEYID = 0
6,056,897 UART: [idev] Sha1 KeyId Algorithm
6,079,330 UART: [idev] --
6,085,060 UART: [ldev] ++
6,085,765 UART: [ldev] CDI.KEYID = 6
6,086,677 UART: [ldev] SUBJECT.KEYID = 5
6,087,845 UART: [ldev] AUTHORITY.KEYID = 7
6,089,085 UART: [ldev] FE.KEYID = 1
6,128,178 UART: [ldev] Erasing FE.KEYID = 1
8,633,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,370,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,385,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,401,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,416,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,437,111 UART: [ldev] --
10,441,900 UART: [fwproc] Wait for Commands...
10,443,607 UART: [fwproc] Recv command 0x46574c44
10,445,920 UART: [fwproc] Recv'd Img size: 118548 bytes
13,939,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,019,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,142,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,702,848 >>> mbox cmd response: success
14,707,693 UART: [afmc] ++
14,708,393 UART: [afmc] CDI.KEYID = 6
14,709,584 UART: [afmc] SUBJECT.KEYID = 7
14,711,025 UART: [afmc] AUTHORITY.KEYID = 5
17,243,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,986,056 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,987,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,003,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,018,222 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,033,112 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,056,766 UART: [afmc] --
19,060,461 UART: [cold-reset] --
19,063,403 UART: [state] Locking Datavault
19,070,005 UART: [state] Locking PCR0, PCR1 and PCR31
19,072,187 UART: [state] Locking ICCM
19,073,696 UART: [exit] Launching FMC @ 0x40000130
19,082,328 UART:
19,082,607 UART: Running Caliptra FMC ...
19,083,722 UART:
19,083,883 UART: [state] CFI Enabled
19,142,894 UART: [fht] FMC Alias Private Key: 7
20,930,422 UART: [art] Extend RT PCRs Done
20,931,648 UART: [art] Lock RT PCRs Done
20,933,165 UART: [art] Populate DV Done
20,938,521 UART: [fht] FMC Alias Private Key: 7
20,940,168 UART: [art] Derive CDI
20,940,981 UART: [art] Store in slot 0x4
20,995,916 UART: [art] Derive Key Pair
20,996,907 UART: [art] Store priv key in slot 0x5
23,459,696 UART: [art] Derive Key Pair - Done
23,472,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,185,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,588 UART: [art] PUB.X = 3B2628057C225F632FCB8E57A668B0412C43CCFB2E4B6EE252CCD28B06BBAAB6D5B4680EF5C3D4881C7D737EC2491D25
25,193,850 UART: [art] PUB.Y = 889840B1D079B445DC001DE790169E4257B61A12E81A584CD331A3EBA6F8B6BE1998EC5964D04B5CEF2A51550098F8FC
25,201,093 UART: [art] SIG.R = 92E71650E0E18ECA2F20E2902ED6E00CDCB779640220F8E667C8AE50A013324049B113F5C0204C0B2BFF1D1125703812
25,208,485 UART: [art] SIG.S = A53644B715E828391D2C001213D9CE23D419D82F51240920FBEEB1C6FEE358ED74BAB87F84F92C5DADCB7B07DE4B7DAB
26,187,569 UART: Caliptra RT
26,188,283 UART: [state] CFI Enabled
26,368,589 UART: [rt] RT listening for mailbox commands...
26,370,514 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,401,121 UART: [rt]cmd =0x44504543, len=92
26,407,737 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
2,226,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,706 >>> mbox cmd response: success
19,112,060 UART:
19,112,490 UART: Running Caliptra FMC ...
19,113,608 UART:
19,113,780 UART: [state] CFI Enabled
19,178,116 UART: [fht] FMC Alias Private Key: 7
20,943,949 UART: [art] Extend RT PCRs Done
20,945,171 UART: [art] Lock RT PCRs Done
20,946,874 UART: [art] Populate DV Done
20,952,058 UART: [fht] FMC Alias Private Key: 7
20,953,597 UART: [art] Derive CDI
20,954,329 UART: [art] Store in slot 0x4
21,010,951 UART: [art] Derive Key Pair
21,012,001 UART: [art] Store priv key in slot 0x5
23,474,314 UART: [art] Derive Key Pair - Done
23,487,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,727 UART: [art] PUB.X = 1FB1CBC08EE7822887F687F3A6D68C293642C0793D00F0DA0F84EA4DF29CC1236BD3B89C466057284DF38D43349E417F
25,208,991 UART: [art] PUB.Y = 0AF656E553F1EA41A2E54D2089DC5A5B2A8649BB94478FD97941EE683188EBF17666EE3F15E941E9E469DCDFE88B1A0D
25,216,254 UART: [art] SIG.R = 293DA63EA427543C21028D3D5E541BC0D0E2E5E0DA9AD29E539609FC6CF4CF9449174C85E85C084B9F932B6057485436
25,223,664 UART: [art] SIG.S = 84C5F25D0F83C34F563253669334E6741D2B23AE2A4ABCC044BF17A530D3E1A6910D35DDEE753C9A2BA39F541CC44BF7
26,202,758 UART: Caliptra RT
26,203,455 UART: [state] CFI Enabled
26,382,419 UART: [rt] RT listening for mailbox commands...
26,384,344 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,414,800 UART: [rt]cmd =0x44504543, len=92
26,421,532 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
2,239,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,389,446 UART:
2,389,843 UART: Running Caliptra ROM ...
2,391,167 UART:
2,391,341 UART: [state] CFI Enabled
2,392,314 UART: [state] LifecycleState = Unprovisioned
2,393,983 UART: [state] DebugLocked = No
2,395,017 UART: [state] WD Timer not started. Device not locked for debugging
2,397,513 UART: [kat] SHA2-256
2,398,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,401,192 UART: [kat] ++
2,401,650 UART: [kat] sha1
2,402,169 UART: [kat] SHA2-256
2,402,834 UART: [kat] SHA2-384
2,403,494 UART: [kat] SHA2-512-ACC
2,404,331 UART: [kat] ECC-384
3,291,914 UART: [kat] HMAC-384Kdf
3,303,941 UART: [kat] LMS
3,835,757 UART: [kat] --
3,841,359 UART: [cold-reset] ++
3,843,786 UART: [fht] FHT @ 0x50003400
3,855,266 UART: [idev] ++
3,855,951 UART: [idev] CDI.KEYID = 6
3,856,971 UART: [idev] SUBJECT.KEYID = 7
3,858,077 UART: [idev] UDS.KEYID = 0
3,872,978 UART: [idev] Erasing UDS.KEYID = 0
6,333,195 UART: [idev] Sha1 KeyId Algorithm
6,355,866 UART: [idev] --
6,360,672 UART: [ldev] ++
6,361,364 UART: [ldev] CDI.KEYID = 6
6,362,279 UART: [ldev] SUBJECT.KEYID = 5
6,363,500 UART: [ldev] AUTHORITY.KEYID = 7
6,364,686 UART: [ldev] FE.KEYID = 1
6,375,544 UART: [ldev] Erasing FE.KEYID = 1
8,853,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,074 UART: [ldev] --
10,643,561 UART: [fwproc] Wait for Commands...
10,646,042 UART: [fwproc] Recv command 0x46574c44
10,648,315 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,904,617 >>> mbox cmd response: success
14,908,539 UART: [afmc] ++
14,909,240 UART: [afmc] CDI.KEYID = 6
14,910,415 UART: [afmc] SUBJECT.KEYID = 7
14,911,915 UART: [afmc] AUTHORITY.KEYID = 5
17,416,832 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,137,367 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,139,339 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,154,445 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,169,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,184,536 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,447 UART: [afmc] --
19,212,854 UART: [cold-reset] --
19,216,997 UART: [state] Locking Datavault
19,224,812 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,971 UART: [state] Locking ICCM
19,229,243 UART: [exit] Launching FMC @ 0x40000130
19,237,936 UART:
19,238,179 UART: Running Caliptra FMC ...
19,239,284 UART:
19,239,444 UART: [state] CFI Enabled
19,247,676 UART: [fht] FMC Alias Private Key: 7
21,013,455 UART: [art] Extend RT PCRs Done
21,014,685 UART: [art] Lock RT PCRs Done
21,016,281 UART: [art] Populate DV Done
21,021,831 UART: [fht] FMC Alias Private Key: 7
21,023,336 UART: [art] Derive CDI
21,024,102 UART: [art] Store in slot 0x4
21,067,082 UART: [art] Derive Key Pair
21,068,092 UART: [art] Store priv key in slot 0x5
23,495,173 UART: [art] Derive Key Pair - Done
23,508,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,764 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,272 UART: [art] PUB.X = AAF4EE1A112FABA29E451F52421F321FF59CBA397035DCC5928732EBFA21357F2BA44649DFF43040ADA65C0FCB072554
25,223,539 UART: [art] PUB.Y = 7D532CBC68C45CF76874AA7F2771EA1A5E43644C90F10D3ED27523FE54B7FD8EAACEF3666F8A84EDE40A06F08AC796C0
25,230,793 UART: [art] SIG.R = 2175C439A3FCC44B8826CFD3BB9D6A958CEB7FFEBD63D3C1531530477A73F7BD5D9A6321454621375314C8CBFEAAF67F
25,238,226 UART: [art] SIG.S = D72E23BA5ACFFA5ABD1B58A2FC9ACDA39AD7A136BC3C8D862E777D76F07FCA8A5C686FFA3A4269FED0A972F34BC43CFE
26,216,748 UART: Caliptra RT
26,217,460 UART: [state] CFI Enabled
26,350,343 UART: [rt] RT listening for mailbox commands...
26,352,272 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,382,834 UART: [rt]cmd =0x44504543, len=92
26,389,593 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
2,237,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,047,183 >>> mbox cmd response: success
19,300,070 UART:
19,300,481 UART: Running Caliptra FMC ...
19,301,807 UART:
19,301,992 UART: [state] CFI Enabled
19,309,686 UART: [fht] FMC Alias Private Key: 7
21,075,865 UART: [art] Extend RT PCRs Done
21,077,101 UART: [art] Lock RT PCRs Done
21,078,958 UART: [art] Populate DV Done
21,084,479 UART: [fht] FMC Alias Private Key: 7
21,086,026 UART: [art] Derive CDI
21,086,851 UART: [art] Store in slot 0x4
21,129,886 UART: [art] Derive Key Pair
21,130,926 UART: [art] Store priv key in slot 0x5
23,557,651 UART: [art] Derive Key Pair - Done
23,570,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,753 UART: [art] PUB.X = D87B5B14CEFDDF7C7F299C3C85A7974C283817249E69023D5776F3E0D787519412129511EBCACF13924CD7F02932B32C
25,285,980 UART: [art] PUB.Y = 381550EE64D4A1F40D5AE114F20FA75D65B0430655E026A8C8092A1C2EACA75B1A619DDDBBC2D6648F4CDBC2538785DA
25,293,278 UART: [art] SIG.R = F2B4FFB54BD4949A4C8CCE6D2A66C8BE555B17E2B68010B0307089FB4B30282CC54C5496C80A9A87312A0DAA982068BF
25,300,654 UART: [art] SIG.S = 74E055619950FE877E68DCDF07996F1F54CAC931FCBF4C629CE9A7C60B34D1C18F3C6FC946B4B8ABB4E3555B422CAEBB
26,279,909 UART: Caliptra RT
26,280,627 UART: [state] CFI Enabled
26,413,811 UART: [rt] RT listening for mailbox commands...
26,415,746 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
26,446,577 UART: [rt]cmd =0x44504543, len=92
26,453,197 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,385 UART: [kat] SHA2-256
882,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,431 UART: [kat] ++
886,583 UART: [kat] sha1
890,871 UART: [kat] SHA2-256
892,809 UART: [kat] SHA2-384
895,752 UART: [kat] SHA2-512-ACC
897,653 UART: [kat] ECC-384
903,188 UART: [kat] HMAC-384Kdf
907,910 UART: [kat] LMS
1,476,106 UART: [kat] --
1,477,069 UART: [cold-reset] ++
1,477,573 UART: [fht] Storing FHT @ 0x50003400
1,480,310 UART: [idev] ++
1,480,478 UART: [idev] CDI.KEYID = 6
1,480,838 UART: [idev] SUBJECT.KEYID = 7
1,481,262 UART: [idev] UDS.KEYID = 0
1,489,164 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,598 UART: [idev] --
1,514,513 UART: [ldev] ++
1,514,681 UART: [ldev] CDI.KEYID = 6
1,515,044 UART: [ldev] SUBJECT.KEYID = 5
1,515,470 UART: [ldev] AUTHORITY.KEYID = 7
1,515,933 UART: [ldev] FE.KEYID = 1
1,521,149 UART: [ldev] Erasing FE.KEYID = 1
1,546,386 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,326 UART: [ldev] --
1,585,785 UART: [fwproc] Waiting for Commands...
1,586,402 UART: [fwproc] Received command 0x46574c44
1,587,193 UART: [fwproc] Received Image of size 118548 bytes
2,932,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,797 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,276 >>> mbox cmd response: success
3,132,528 UART: [afmc] ++
3,132,696 UART: [afmc] CDI.KEYID = 6
3,133,058 UART: [afmc] SUBJECT.KEYID = 7
3,133,483 UART: [afmc] AUTHORITY.KEYID = 5
3,168,504 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,790 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,279 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,162 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,845 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,917 UART: [afmc] --
3,211,975 UART: [cold-reset] --
3,212,961 UART: [state] Locking Datavault
3,213,922 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,526 UART: [state] Locking ICCM
3,214,976 UART: [exit] Launching FMC @ 0x40000130
3,220,306 UART:
3,220,322 UART: Running Caliptra FMC ...
3,220,730 UART:
3,220,784 UART: [state] CFI Enabled
3,231,148 UART: [fht] FMC Alias Private Key: 7
3,350,132 UART: [art] Extend RT PCRs Done
3,350,560 UART: [art] Lock RT PCRs Done
3,352,240 UART: [art] Populate DV Done
3,360,405 UART: [fht] FMC Alias Private Key: 7
3,361,395 UART: [art] Derive CDI
3,361,675 UART: [art] Store in slot 0x4
3,447,675 UART: [art] Derive Key Pair
3,448,035 UART: [art] Store priv key in slot 0x5
3,461,048 UART: [art] Derive Key Pair - Done
3,475,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,142 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,907 UART: [art] PUB.X = E19DC32449DDC1569C44187661C06B133C189A0FD78671D2C953A4343AC1313A7C6BBDC81B60AB39E08124F05457E03A
3,498,674 UART: [art] PUB.Y = BB2300B2E5C9DA29DB7FA2D1B73A3ED8BF8AED63323F14CFAD6952C5FD332A745CD5B0FFCFB71B2216B304E98E5C7C19
3,505,625 UART: [art] SIG.R = 4980CB6FE00DAF86265876078EA785BBCE62B9CDC2DBD969B864432FE7526ABC3A6E12B9B86A0C51A5AF330749B3E914
3,512,395 UART: [art] SIG.S = 074FF0AFB720173D0B3A9596D18B9F8DF193D96924A73022E946FBEB1F238858968CB3A386457A122A9446FEE486A059
3,536,367 UART: Caliptra RT
3,536,618 UART: [state] CFI Enabled
3,658,545 UART: [rt] RT listening for mailbox commands...
3,659,215 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,389 UART: [rt]cmd =0x44504543, len=92
3,696,678 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,408 >>> mbox cmd response: success
3,041,269 UART:
3,041,285 UART: Running Caliptra FMC ...
3,041,693 UART:
3,041,747 UART: [state] CFI Enabled
3,052,259 UART: [fht] FMC Alias Private Key: 7
3,171,371 UART: [art] Extend RT PCRs Done
3,171,799 UART: [art] Lock RT PCRs Done
3,173,233 UART: [art] Populate DV Done
3,181,194 UART: [fht] FMC Alias Private Key: 7
3,182,366 UART: [art] Derive CDI
3,182,646 UART: [art] Store in slot 0x4
3,268,432 UART: [art] Derive Key Pair
3,268,792 UART: [art] Store priv key in slot 0x5
3,281,583 UART: [art] Derive Key Pair - Done
3,296,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,311 UART: [art] PUB.X = AFFB313F58C26E9BB703E631CF606B46699AF8A4501DA6FF49E99A3377FBBCA6C62BEC4DEC13CA4DC89F8A936A972F04
3,319,097 UART: [art] PUB.Y = 81BCA062EB7CEF5254BE9232A7F8D17F9C04CC5C98676317F789EB96FF9AC7702BFE08FCEE8C0ED877B9B725014AC383
3,326,051 UART: [art] SIG.R = 0EF0A5950BFEB084A07811D18A263DFEC211549FA89D20C2189D4A8E8F0FBF26910D8DAD543C9513CFDF73D6EAE2FC7C
3,332,829 UART: [art] SIG.S = A7494EA53208F586B12C2035BD1BCA4ABB7148E5892A04B97F7004F423395CCA8E6CEE8FE6C09C6D19648FE237252E65
3,356,040 UART: Caliptra RT
3,356,291 UART: [state] CFI Enabled
3,476,079 UART: [rt] RT listening for mailbox commands...
3,476,749 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,455 UART: [rt]cmd =0x44504543, len=92
3,514,820 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,290 UART: [kat] SHA2-256
882,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,336 UART: [kat] ++
886,488 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,357 UART: [kat] SHA2-512-ACC
897,258 UART: [kat] ECC-384
902,815 UART: [kat] HMAC-384Kdf
907,645 UART: [kat] LMS
1,475,841 UART: [kat] --
1,476,614 UART: [cold-reset] ++
1,477,128 UART: [fht] Storing FHT @ 0x50003400
1,479,783 UART: [idev] ++
1,479,951 UART: [idev] CDI.KEYID = 6
1,480,311 UART: [idev] SUBJECT.KEYID = 7
1,480,735 UART: [idev] UDS.KEYID = 0
1,488,531 UART: [idev] Erasing UDS.KEYID = 0
1,505,437 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,162 UART: [ldev] ++
1,515,330 UART: [ldev] CDI.KEYID = 6
1,515,693 UART: [ldev] SUBJECT.KEYID = 5
1,516,119 UART: [ldev] AUTHORITY.KEYID = 7
1,516,582 UART: [ldev] FE.KEYID = 1
1,521,934 UART: [ldev] Erasing FE.KEYID = 1
1,547,187 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,101 UART: [ldev] --
1,586,604 UART: [fwproc] Waiting for Commands...
1,587,433 UART: [fwproc] Received command 0x46574c44
1,588,224 UART: [fwproc] Received Image of size 118548 bytes
2,932,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,490 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,937 >>> mbox cmd response: success
3,132,185 UART: [afmc] ++
3,132,353 UART: [afmc] CDI.KEYID = 6
3,132,715 UART: [afmc] SUBJECT.KEYID = 7
3,133,140 UART: [afmc] AUTHORITY.KEYID = 5
3,169,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,219 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,708 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,591 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,274 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,218 UART: [afmc] --
3,212,096 UART: [cold-reset] --
3,213,072 UART: [state] Locking Datavault
3,213,991 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,595 UART: [state] Locking ICCM
3,215,079 UART: [exit] Launching FMC @ 0x40000130
3,220,409 UART:
3,220,425 UART: Running Caliptra FMC ...
3,220,833 UART:
3,220,976 UART: [state] CFI Enabled
3,231,818 UART: [fht] FMC Alias Private Key: 7
3,350,690 UART: [art] Extend RT PCRs Done
3,351,118 UART: [art] Lock RT PCRs Done
3,352,480 UART: [art] Populate DV Done
3,360,841 UART: [fht] FMC Alias Private Key: 7
3,361,827 UART: [art] Derive CDI
3,362,107 UART: [art] Store in slot 0x4
3,447,881 UART: [art] Derive Key Pair
3,448,241 UART: [art] Store priv key in slot 0x5
3,461,584 UART: [art] Derive Key Pair - Done
3,476,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,669 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,434 UART: [art] PUB.X = 5461A16A3134FC29734B77FEFA68B784332DFA955E38EDF6F6C5BB1D88B59A3B6107983BEDDA91BC27172B9D4A6B1290
3,499,211 UART: [art] PUB.Y = CA9D79E130D8579FAA28ADEF8B267D881146FA72D3B930E1AB9D3B6C419CF106A1D4B35AF3708225D2F52B3E636B511E
3,506,170 UART: [art] SIG.R = 9F87EDD4D9169F6555684A23902998C0554DE011BADEE5571C2073E67F4483A1D83EFC3F472E6E2E81DC1D956A278E8C
3,512,944 UART: [art] SIG.S = D350EA5F1D0D1CBBF4F2FF165E45B99EA5230DC2394157CE021F3C43B2DFFF175416825C79049614FC3FDF45D241D680
3,537,238 UART: Caliptra RT
3,537,581 UART: [state] CFI Enabled
3,657,210 UART: [rt] RT listening for mailbox commands...
3,657,880 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,070 UART: [rt]cmd =0x44504543, len=92
3,695,341 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,475 >>> mbox cmd response: success
3,042,936 UART:
3,042,952 UART: Running Caliptra FMC ...
3,043,360 UART:
3,043,503 UART: [state] CFI Enabled
3,053,781 UART: [fht] FMC Alias Private Key: 7
3,173,113 UART: [art] Extend RT PCRs Done
3,173,541 UART: [art] Lock RT PCRs Done
3,174,937 UART: [art] Populate DV Done
3,183,100 UART: [fht] FMC Alias Private Key: 7
3,184,258 UART: [art] Derive CDI
3,184,538 UART: [art] Store in slot 0x4
3,270,314 UART: [art] Derive Key Pair
3,270,674 UART: [art] Store priv key in slot 0x5
3,284,173 UART: [art] Derive Key Pair - Done
3,299,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,792 UART: [art] PUB.X = 4AD18BCAFC49747386E2D20FEEF333FFF1124225D7CB90C310B6E31DA6CA862729C6D525972740D5DF1547E51776BFC8
3,322,567 UART: [art] PUB.Y = 48D8900CE485FC3A47CB23394472BF6B4AC1359B7A80074563D54578CD52426DD08AE77E9C0A35DE03E18643677AFCB8
3,329,507 UART: [art] SIG.R = AB96B5633CA8AA5AEBB49BC5BC1AD24191A5636AD76F5C829D289D716BBED88D92006DE3C57908391D17E59FA43F6482
3,336,264 UART: [art] SIG.S = C50BF64CFE8B98D37B5F72F1EE1FEA43BA2A60863ABA12C5C7357E3F3CEF473AB3267450526221BC79A5064DAC6A7B2F
3,360,140 UART: Caliptra RT
3,360,483 UART: [state] CFI Enabled
3,480,684 UART: [rt] RT listening for mailbox commands...
3,481,354 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,784 UART: [rt]cmd =0x44504543, len=92
3,518,655 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,928 UART: [state] LifecycleState = Unprovisioned
85,583 UART: [state] DebugLocked = No
86,221 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,324 UART: [kat] SHA2-256
901,264 UART: [kat] SHA2-384
904,011 UART: [kat] SHA2-512-ACC
905,912 UART: [kat] ECC-384
915,609 UART: [kat] HMAC-384Kdf
920,199 UART: [kat] LMS
1,168,511 UART: [kat] --
1,169,236 UART: [cold-reset] ++
1,169,802 UART: [fht] FHT @ 0x50003400
1,172,504 UART: [idev] ++
1,172,672 UART: [idev] CDI.KEYID = 6
1,173,033 UART: [idev] SUBJECT.KEYID = 7
1,173,458 UART: [idev] UDS.KEYID = 0
1,181,403 UART: [idev] Erasing UDS.KEYID = 0
1,198,115 UART: [idev] Sha1 KeyId Algorithm
1,206,939 UART: [idev] --
1,207,786 UART: [ldev] ++
1,207,954 UART: [ldev] CDI.KEYID = 6
1,208,318 UART: [ldev] SUBJECT.KEYID = 5
1,208,745 UART: [ldev] AUTHORITY.KEYID = 7
1,209,208 UART: [ldev] FE.KEYID = 1
1,214,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,369 UART: [fwproc] Wait for Commands...
1,281,044 UART: [fwproc] Recv command 0x46574c44
1,281,777 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,280 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,485 >>> mbox cmd response: success
2,826,665 UART: [afmc] ++
2,826,833 UART: [afmc] CDI.KEYID = 6
2,827,196 UART: [afmc] SUBJECT.KEYID = 7
2,827,622 UART: [afmc] AUTHORITY.KEYID = 5
2,863,387 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,944 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,693 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,284 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,985 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,674 UART: [afmc] --
2,906,489 UART: [cold-reset] --
2,907,425 UART: [state] Locking Datavault
2,908,564 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,168 UART: [state] Locking ICCM
2,909,630 UART: [exit] Launching FMC @ 0x40000130
2,914,960 UART:
2,914,976 UART: Running Caliptra FMC ...
2,915,384 UART:
2,915,438 UART: [state] CFI Enabled
2,926,348 UART: [fht] FMC Alias Private Key: 7
3,045,006 UART: [art] Extend RT PCRs Done
3,045,434 UART: [art] Lock RT PCRs Done
3,046,958 UART: [art] Populate DV Done
3,055,089 UART: [fht] FMC Alias Private Key: 7
3,056,093 UART: [art] Derive CDI
3,056,373 UART: [art] Store in slot 0x4
3,141,806 UART: [art] Derive Key Pair
3,142,166 UART: [art] Store priv key in slot 0x5
3,154,896 UART: [art] Derive Key Pair - Done
3,169,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,469 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,234 UART: [art] PUB.X = A12B1B23EC2B82992A6011C83BA0ECECD10B04CAF402B8AF3BDF6E2DB2567C11931853FD8849AE39982CB63031BDCAD7
3,192,013 UART: [art] PUB.Y = 1C35247B169F1B480534B258549F0C858A8614BF9314EC62EAA1A3D0F7F54F5BF568D78A1662D60991914DEC494A1518
3,198,950 UART: [art] SIG.R = 0716C94482F925C9DA7DE77F4F3F94285E312B08437763A46B6D63DF564D61F7B66C236B0B99FB2EA32A6F7230C8652E
3,205,711 UART: [art] SIG.S = 965B53BF29BE5FC2E0334643B54EB4D2D1FF57A68BDA548B7AD3DBD365D789828F44884D159F9B2CF5BCB500ED0A86D0
3,229,136 UART: Caliptra RT
3,229,387 UART: [state] CFI Enabled
3,348,708 UART: [rt] RT listening for mailbox commands...
3,349,378 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,554 UART: [rt]cmd =0x44504543, len=92
3,386,681 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,172 >>> mbox cmd response: success
2,740,505 UART:
2,740,521 UART: Running Caliptra FMC ...
2,740,929 UART:
2,740,983 UART: [state] CFI Enabled
2,751,379 UART: [fht] FMC Alias Private Key: 7
2,870,311 UART: [art] Extend RT PCRs Done
2,870,739 UART: [art] Lock RT PCRs Done
2,872,221 UART: [art] Populate DV Done
2,880,462 UART: [fht] FMC Alias Private Key: 7
2,881,532 UART: [art] Derive CDI
2,881,812 UART: [art] Store in slot 0x4
2,967,575 UART: [art] Derive Key Pair
2,967,935 UART: [art] Store priv key in slot 0x5
2,981,141 UART: [art] Derive Key Pair - Done
2,995,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,478 UART: [art] PUB.X = BA72DACB40733A84393036A37DFB7294BF3EDE24435AFE883D03A6DCE2CD266E66A0BA55DEBC417456692921329D9DB6
3,019,257 UART: [art] PUB.Y = AF29B515FDB5A46FF2D473758F3CC4386F73E8048CC7D03BA75BC9C2743E198D7844F8CFB536E04E1EF48D9BEB88E0AC
3,026,222 UART: [art] SIG.R = 026A0BD97B5317C51D52C9E0F8D603410BB7EFB8D561A04A0409AF9337F9EF9693E22D7492C3380D2FDCAFBA6C78C253
3,032,981 UART: [art] SIG.S = B553B02F743BBA13A3843CC683B195A89D8E1CAC3A71813B22DD4B805D10E41E0A696451BD57724B51E0E9E8C3D43E24
3,056,790 UART: Caliptra RT
3,057,041 UART: [state] CFI Enabled
3,175,940 UART: [rt] RT listening for mailbox commands...
3,176,610 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,234 UART: [rt]cmd =0x44504543, len=92
3,214,533 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,468 UART: [kat] HMAC-384Kdf
921,112 UART: [kat] LMS
1,169,424 UART: [kat] --
1,170,521 UART: [cold-reset] ++
1,171,011 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,182,580 UART: [idev] Erasing UDS.KEYID = 0
1,200,254 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,415 UART: [ldev] SUBJECT.KEYID = 5
1,210,842 UART: [ldev] AUTHORITY.KEYID = 7
1,211,305 UART: [ldev] FE.KEYID = 1
1,216,469 UART: [ldev] Erasing FE.KEYID = 1
1,242,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,955 UART: [ldev] --
1,282,162 UART: [fwproc] Wait for Commands...
1,282,909 UART: [fwproc] Recv command 0x46574c44
1,283,642 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,747 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,400 >>> mbox cmd response: success
2,826,484 UART: [afmc] ++
2,826,652 UART: [afmc] CDI.KEYID = 6
2,827,015 UART: [afmc] SUBJECT.KEYID = 7
2,827,441 UART: [afmc] AUTHORITY.KEYID = 5
2,863,428 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,475 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,849 UART: [afmc] --
2,906,884 UART: [cold-reset] --
2,907,696 UART: [state] Locking Datavault
2,908,937 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,541 UART: [state] Locking ICCM
2,910,013 UART: [exit] Launching FMC @ 0x40000130
2,915,343 UART:
2,915,359 UART: Running Caliptra FMC ...
2,915,767 UART:
2,915,910 UART: [state] CFI Enabled
2,926,300 UART: [fht] FMC Alias Private Key: 7
3,044,106 UART: [art] Extend RT PCRs Done
3,044,534 UART: [art] Lock RT PCRs Done
3,045,914 UART: [art] Populate DV Done
3,054,045 UART: [fht] FMC Alias Private Key: 7
3,055,179 UART: [art] Derive CDI
3,055,459 UART: [art] Store in slot 0x4
3,141,150 UART: [art] Derive Key Pair
3,141,510 UART: [art] Store priv key in slot 0x5
3,154,650 UART: [art] Derive Key Pair - Done
3,169,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,834 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,599 UART: [art] PUB.X = 3583742E96B5F6B1719697519769F39CCC9083E31CEF1CF4EA5917E8870EDFA39EF723CBE34C7CF6800894F5210CC93B
3,192,364 UART: [art] PUB.Y = 2E806D3E9FB2E63F6A168DE873E49D9BF36DF6E2A03BE2F1AF7C59470A93ABFFAB4A07CDA57A016362B250BEE5E64414
3,199,325 UART: [art] SIG.R = 2169CCB02ABA27E8949D71AC481B5373B01B04D5BE2B65599954805477796DFFB023082893EF8517A1AF9BD52366A1A3
3,206,087 UART: [art] SIG.S = 98EA78A87901F38539D4E872646F6FBF3550D96E06946CDC4A1BA50A703908373C0C8132E25AB17F56EA9DC8096B272E
3,230,121 UART: Caliptra RT
3,230,464 UART: [state] CFI Enabled
3,350,023 UART: [rt] RT listening for mailbox commands...
3,350,693 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,135 UART: [rt]cmd =0x44504543, len=92
3,388,784 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,641 >>> mbox cmd response: success
2,740,872 UART:
2,740,888 UART: Running Caliptra FMC ...
2,741,296 UART:
2,741,439 UART: [state] CFI Enabled
2,751,809 UART: [fht] FMC Alias Private Key: 7
2,870,649 UART: [art] Extend RT PCRs Done
2,871,077 UART: [art] Lock RT PCRs Done
2,872,693 UART: [art] Populate DV Done
2,881,146 UART: [fht] FMC Alias Private Key: 7
2,882,132 UART: [art] Derive CDI
2,882,412 UART: [art] Store in slot 0x4
2,968,541 UART: [art] Derive Key Pair
2,968,901 UART: [art] Store priv key in slot 0x5
2,982,407 UART: [art] Derive Key Pair - Done
2,996,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,008 UART: [art] PUB.X = A7BE06611BE8F04C103680B27FBDE1FD0D978A269FD511A5960485AF5F0D26BB1D8A763E36271FA1715884BEF34EB723
3,019,774 UART: [art] PUB.Y = 24F44064216A4E01DAFA33DFBFA9DAB4A9E52E13DAD0AC65552CAE05618518AD0683AEE66A19FB5A067AC17589DEE6C7
3,026,732 UART: [art] SIG.R = 64AE40EC23ECBA98D9443BB9623D2F1B8359453C2A10A4E7268D07593AB7CBF0D2C5515BC63AF4283F78272AB3EF9C9C
3,033,511 UART: [art] SIG.S = C479F1646427D22614F49224ACE60D71775C85EA7E57C54B0BAD07ADCFA8ACB338784B3E6D936997E5050435D26369BE
3,057,376 UART: Caliptra RT
3,057,719 UART: [state] CFI Enabled
3,178,562 UART: [rt] RT listening for mailbox commands...
3,179,232 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,394 UART: [rt]cmd =0x44504543, len=92
3,216,523 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,649 UART: [kat] SHA2-256
903,589 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,332 UART: [kat] LMS
1,170,660 UART: [kat] --
1,171,755 UART: [cold-reset] ++
1,172,101 UART: [fht] FHT @ 0x50003400
1,174,832 UART: [idev] ++
1,175,000 UART: [idev] CDI.KEYID = 6
1,175,360 UART: [idev] SUBJECT.KEYID = 7
1,175,784 UART: [idev] UDS.KEYID = 0
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,051 UART: [idev] Sha1 KeyId Algorithm
1,208,521 UART: [idev] --
1,209,601 UART: [ldev] ++
1,209,769 UART: [ldev] CDI.KEYID = 6
1,210,132 UART: [ldev] SUBJECT.KEYID = 5
1,210,558 UART: [ldev] AUTHORITY.KEYID = 7
1,211,021 UART: [ldev] FE.KEYID = 1
1,216,205 UART: [ldev] Erasing FE.KEYID = 1
1,242,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,845 UART: [ldev] --
1,282,134 UART: [fwproc] Wait for Commands...
1,282,704 UART: [fwproc] Recv command 0x46574c44
1,283,432 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,950 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,120 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,467 >>> mbox cmd response: success
2,827,597 UART: [afmc] ++
2,827,765 UART: [afmc] CDI.KEYID = 6
2,828,127 UART: [afmc] SUBJECT.KEYID = 7
2,828,552 UART: [afmc] AUTHORITY.KEYID = 5
2,863,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,539 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,422 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,123 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,047 UART: [afmc] --
2,907,175 UART: [cold-reset] --
2,907,933 UART: [state] Locking Datavault
2,909,076 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,680 UART: [state] Locking ICCM
2,910,114 UART: [exit] Launching FMC @ 0x40000130
2,915,444 UART:
2,915,460 UART: Running Caliptra FMC ...
2,915,868 UART:
2,915,922 UART: [state] CFI Enabled
2,926,764 UART: [fht] FMC Alias Private Key: 7
3,045,860 UART: [art] Extend RT PCRs Done
3,046,288 UART: [art] Lock RT PCRs Done
3,047,922 UART: [art] Populate DV Done
3,055,927 UART: [fht] FMC Alias Private Key: 7
3,057,039 UART: [art] Derive CDI
3,057,319 UART: [art] Store in slot 0x4
3,142,728 UART: [art] Derive Key Pair
3,143,088 UART: [art] Store priv key in slot 0x5
3,156,078 UART: [art] Derive Key Pair - Done
3,170,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,098 UART: [art] PUB.X = C1E0C067C2D58A3D4C8FE4491222EE2E4576243B2F7393BC783E0327E59366423CE03E0DEDE3809260C019D4C846912B
3,193,860 UART: [art] PUB.Y = 00924F57600E2B7891F543DA8D57EC1B42A7157B64D2ECBED96604A335E7F76877B6432651009DDF85CF49A48DEAEC37
3,200,764 UART: [art] SIG.R = 9A19DF6260F370808EFF2CB8E54FAFE940A47010CE140A98D9CE1DC1CCCE2E501AF0518B140B35DE7B8ECB40D13C6960
3,207,546 UART: [art] SIG.S = 73706493BA45638DD4737C9A046A70B1DB56804F84797505E6AED310E8AB4199A25C53A8CEC1B74952C47FA6E9B57C45
3,230,938 UART: Caliptra RT
3,231,189 UART: [state] CFI Enabled
3,350,058 UART: [rt] RT listening for mailbox commands...
3,350,728 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,308 UART: [rt]cmd =0x44504543, len=92
3,388,935 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,404 >>> mbox cmd response: success
2,739,983 UART:
2,739,999 UART: Running Caliptra FMC ...
2,740,407 UART:
2,740,461 UART: [state] CFI Enabled
2,750,843 UART: [fht] FMC Alias Private Key: 7
2,869,905 UART: [art] Extend RT PCRs Done
2,870,333 UART: [art] Lock RT PCRs Done
2,871,803 UART: [art] Populate DV Done
2,880,144 UART: [fht] FMC Alias Private Key: 7
2,881,302 UART: [art] Derive CDI
2,881,582 UART: [art] Store in slot 0x4
2,966,943 UART: [art] Derive Key Pair
2,967,303 UART: [art] Store priv key in slot 0x5
2,980,875 UART: [art] Derive Key Pair - Done
2,995,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,076 UART: [art] PUB.X = 304C4EF29B60FE97EAA7D12714902D82C70528F933005A6C9DAF242E877140DDD115E8CEC2482FBF038E49723747C602
3,018,815 UART: [art] PUB.Y = AB87FC044C44D7059217BC235D2892FADF4BB8126C460E221192EA7D6AFFD532AEABF25F2C0C5FDED67C783DA89865CF
3,025,773 UART: [art] SIG.R = A44D812EA320E345EE868461F8F4635C267528631F3F1C5EFD20A0DF52973023C4ADC31B326B24158EECF4986D4375AE
3,032,545 UART: [art] SIG.S = E2C2495B1E474A873493CAF2E5BAF1BC65C9FEB11F23A0FAD1D0FF0E7CC6638C4E114B95E3A18DAA7358AE0F7D7BA2BE
3,056,419 UART: Caliptra RT
3,056,670 UART: [state] CFI Enabled
3,177,086 UART: [rt] RT listening for mailbox commands...
3,177,756 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,322 UART: [rt]cmd =0x44504543, len=92
3,215,549 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,737 UART: [state] LifecycleState = Unprovisioned
86,392 UART: [state] DebugLocked = No
86,952 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,152 UART: [kat] SHA2-256
904,092 UART: [kat] SHA2-384
906,725 UART: [kat] SHA2-512-ACC
908,626 UART: [kat] ECC-384
918,425 UART: [kat] HMAC-384Kdf
922,901 UART: [kat] LMS
1,171,229 UART: [kat] --
1,172,038 UART: [cold-reset] ++
1,172,500 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,184,009 UART: [idev] Erasing UDS.KEYID = 0
1,201,666 UART: [idev] Sha1 KeyId Algorithm
1,210,096 UART: [idev] --
1,211,060 UART: [ldev] ++
1,211,228 UART: [ldev] CDI.KEYID = 6
1,211,591 UART: [ldev] SUBJECT.KEYID = 5
1,212,017 UART: [ldev] AUTHORITY.KEYID = 7
1,212,480 UART: [ldev] FE.KEYID = 1
1,217,980 UART: [ldev] Erasing FE.KEYID = 1
1,244,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,964 UART: [ldev] --
1,283,455 UART: [fwproc] Wait for Commands...
1,284,109 UART: [fwproc] Recv command 0x46574c44
1,284,837 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,453 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,600 >>> mbox cmd response: success
2,829,678 UART: [afmc] ++
2,829,846 UART: [afmc] CDI.KEYID = 6
2,830,208 UART: [afmc] SUBJECT.KEYID = 7
2,830,633 UART: [afmc] AUTHORITY.KEYID = 5
2,866,134 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,430 UART: [afmc] --
2,909,516 UART: [cold-reset] --
2,910,364 UART: [state] Locking Datavault
2,911,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,013 UART: [state] Locking ICCM
2,912,639 UART: [exit] Launching FMC @ 0x40000130
2,917,969 UART:
2,917,985 UART: Running Caliptra FMC ...
2,918,393 UART:
2,918,536 UART: [state] CFI Enabled
2,929,270 UART: [fht] FMC Alias Private Key: 7
3,047,824 UART: [art] Extend RT PCRs Done
3,048,252 UART: [art] Lock RT PCRs Done
3,049,706 UART: [art] Populate DV Done
3,057,921 UART: [fht] FMC Alias Private Key: 7
3,059,001 UART: [art] Derive CDI
3,059,281 UART: [art] Store in slot 0x4
3,144,832 UART: [art] Derive Key Pair
3,145,192 UART: [art] Store priv key in slot 0x5
3,158,448 UART: [art] Derive Key Pair - Done
3,173,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,501 UART: [art] PUB.X = 7CFAF005375D83C3A19264BE23D5CDE4A20AD45122CDC583BA0FFDAB972834D4286683A4B31FC9877B00E33135487956
3,196,244 UART: [art] PUB.Y = 4459DBE34B0DABC756C3F2151694BB052FCEB6081A3D481414D54500B93167045F116BD56C8CBE903B915654AA76CCE1
3,203,164 UART: [art] SIG.R = 68ACE1E75382647BEAC99E9A3D16BE5416427566A26B261AD619C8A3C224B642D698217C6C3DB2E44F3E161FE8811C2F
3,209,938 UART: [art] SIG.S = EFD65E1625D82EDE505BFAC40307FAD0EF2576820E4B859ABC06815AFB61E7FE5292DA506C664DBC2AC1F1D1B0049569
3,234,457 UART: Caliptra RT
3,234,800 UART: [state] CFI Enabled
3,354,747 UART: [rt] RT listening for mailbox commands...
3,355,417 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,041 UART: [rt]cmd =0x44504543, len=92
3,393,176 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,845 >>> mbox cmd response: success
2,742,292 UART:
2,742,308 UART: Running Caliptra FMC ...
2,742,716 UART:
2,742,859 UART: [state] CFI Enabled
2,753,789 UART: [fht] FMC Alias Private Key: 7
2,872,825 UART: [art] Extend RT PCRs Done
2,873,253 UART: [art] Lock RT PCRs Done
2,874,985 UART: [art] Populate DV Done
2,883,158 UART: [fht] FMC Alias Private Key: 7
2,884,098 UART: [art] Derive CDI
2,884,378 UART: [art] Store in slot 0x4
2,970,425 UART: [art] Derive Key Pair
2,970,785 UART: [art] Store priv key in slot 0x5
2,983,875 UART: [art] Derive Key Pair - Done
2,998,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,854 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,619 UART: [art] PUB.X = F48BC73EAB095AED99E66222BBAE57D1F31C6260F840F037B5C41578C843DEF4A7B0B8B5AAB8CE32F05037CC78F4C557
3,021,402 UART: [art] PUB.Y = D39A2D768F071392895AE1476D86FC90CC8EE47E0AA8FF98B7A2ED4F8B8982BB40701D1B9B070CBAE546F80D82FC2569
3,028,349 UART: [art] SIG.R = 6865BB40951DC0503FD7BFFD2C616E47983B41444EAB96060366CC31F995B641204B6E45139D6B204F67DF08FE48B388
3,035,108 UART: [art] SIG.S = 4BCACE83B84A10FE73B9337E5F4109D40E54995CB05053F9CAB146685DE1263209586F9B32564DA87EBE96BD05549995
3,059,006 UART: Caliptra RT
3,059,349 UART: [state] CFI Enabled
3,179,123 UART: [rt] RT listening for mailbox commands...
3,179,793 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,147 UART: [rt]cmd =0x44504543, len=92
3,217,790 >>> mbox cmd response: failed
test test_pauser_privilege_levels::test_user_not_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,140 UART:
192,500 UART: Running Caliptra ROM ...
193,684 UART:
193,840 UART: [state] CFI Enabled
263,198 UART: [state] LifecycleState = Unprovisioned
265,180 UART: [state] DebugLocked = No
267,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,214 UART: [kat] SHA2-256
442,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,452 UART: [kat] ++
453,989 UART: [kat] sha1
464,036 UART: [kat] SHA2-256
466,762 UART: [kat] SHA2-384
473,884 UART: [kat] SHA2-512-ACC
476,260 UART: [kat] ECC-384
2,767,153 UART: [kat] HMAC-384Kdf
2,778,543 UART: [kat] LMS
3,968,867 UART: [kat] --
3,974,512 UART: [cold-reset] ++
3,976,234 UART: [fht] Storing FHT @ 0x50003400
3,987,218 UART: [idev] ++
3,987,783 UART: [idev] CDI.KEYID = 6
3,988,704 UART: [idev] SUBJECT.KEYID = 7
3,989,946 UART: [idev] UDS.KEYID = 0
3,990,928 ready_for_fw is high
3,991,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,161 UART: [idev] Erasing UDS.KEYID = 0
7,324,843 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,831 UART: [idev] --
7,350,769 UART: [ldev] ++
7,351,343 UART: [ldev] CDI.KEYID = 6
7,352,314 UART: [ldev] SUBJECT.KEYID = 5
7,353,528 UART: [ldev] AUTHORITY.KEYID = 7
7,354,757 UART: [ldev] FE.KEYID = 1
7,401,155 UART: [ldev] Erasing FE.KEYID = 1
10,737,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,722 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,857 UART: [ldev] --
13,116,847 UART: [fwproc] Waiting for Commands...
13,118,831 UART: [fwproc] Received command 0x46574c44
13,121,032 UART: [fwproc] Received Image of size 118548 bytes
17,229,538 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,308 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,482 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,416 >>> mbox cmd response: success
17,705,573 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,708,161 UART: [afmc] ++
17,708,753 UART: [afmc] CDI.KEYID = 6
17,709,637 UART: [afmc] SUBJECT.KEYID = 7
17,710,907 UART: [afmc] AUTHORITY.KEYID = 5
21,072,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,164 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,883 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,638 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,042 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,045 UART: [afmc] --
23,444,259 UART: [cold-reset] --
23,448,440 UART: [state] Locking Datavault
23,454,171 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,926 UART: [state] Locking ICCM
23,458,534 UART: [exit] Launching FMC @ 0x40000130
23,466,925 UART:
23,467,157 UART: Running Caliptra FMC ...
23,468,259 UART:
23,468,415 UART: [state] CFI Enabled
23,533,658 UART: [fht] FMC Alias Private Key: 7
25,873,703 UART: [art] Extend RT PCRs Done
25,874,927 UART: [art] Lock RT PCRs Done
25,876,578 UART: [art] Populate DV Done
25,882,040 UART: [fht] FMC Alias Private Key: 7
25,883,848 UART: [art] Derive CDI
25,884,636 UART: [art] Store in slot 0x4
25,942,911 UART: [art] Derive Key Pair
25,943,913 UART: [art] Store priv key in slot 0x5
29,237,058 UART: [art] Derive Key Pair - Done
29,250,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,522 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,043 UART: [art] PUB.X = 3E17332C3300DDD500E6B803EA03EB6D3D23F4DFAB55571C52819D827543916C3FBAAF6D7ED4FD4E251D931D37D41F1B
31,547,288 UART: [art] PUB.Y = BD17DD16D0FC70A3335104AB39F67363417DAB04C879C2DC741061144EE6487D85B3B20AE328AE93F953BC5C66824A58
31,554,525 UART: [art] SIG.R = 6A00B85135718EC3C196AB88629A13614CFAEC2D7127A105672C82E2A541BC4B5B41191318A192C2D6AF5095C38AE929
31,561,853 UART: [art] SIG.S = 9D01AF4B8FB4A76F947E1EDBEEEFE1D2E395F7E910BFE68CEB66F972F17CE551CEAD1EADC3E7E48941BB2A5F83481EFD
32,867,144 UART: Caliptra RT
32,867,863 UART: [state] CFI Enabled
33,044,674 UART: [rt] RT listening for mailbox commands...
33,076,585 UART: [rt]cmd =0x50435245, len=56
33,078,243 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
3,802,867 ready_for_fw is high
3,803,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,824 >>> mbox cmd response: success
17,942,935 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,626,873 UART:
23,627,252 UART: Running Caliptra FMC ...
23,628,363 UART:
23,628,517 UART: [state] CFI Enabled
23,695,447 UART: [fht] FMC Alias Private Key: 7
26,036,495 UART: [art] Extend RT PCRs Done
26,037,719 UART: [art] Lock RT PCRs Done
26,039,053 UART: [art] Populate DV Done
26,044,257 UART: [fht] FMC Alias Private Key: 7
26,045,851 UART: [art] Derive CDI
26,046,670 UART: [art] Store in slot 0x4
26,103,461 UART: [art] Derive Key Pair
26,104,499 UART: [art] Store priv key in slot 0x5
29,397,164 UART: [art] Derive Key Pair - Done
29,410,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,698,890 UART: [art] Erasing AUTHORITY.KEYID = 7
31,700,401 UART: [art] PUB.X = 538FBE2B24A52AE0A4A22137516128939D5950E82E50F3A9C6D07E005A68D0786BE7448A89E441A96AC9A48CCBE4216F
31,707,651 UART: [art] PUB.Y = EB21A46859520DC20E00C9ED2CA9FA5F1061CC07FD70ECDF496BC38302A516ECF4FDBA2D02A46D6BE5AE0F65010A20C4
31,714,890 UART: [art] SIG.R = 709CAE28EFFE8183C55255F458206E1C278B0539F49DAF59B8D1EE3F75171033D36C89CD37386DB48CFAB3DD045D728E
31,722,336 UART: [art] SIG.S = 8E2BB255DBFF7CEE94960883F7C25A2B609333E4A89B2737A33FB0772D48278A76B784D55B3246616BBAB7D22C07F0CF
33,027,457 UART: Caliptra RT
33,028,184 UART: [state] CFI Enabled
33,203,200 UART: [rt] RT listening for mailbox commands...
33,234,471 UART: [rt]cmd =0x50435245, len=56
33,236,022 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
192,352 UART:
192,704 UART: Running Caliptra ROM ...
193,895 UART:
603,759 UART: [state] CFI Enabled
615,147 UART: [state] LifecycleState = Unprovisioned
617,081 UART: [state] DebugLocked = No
619,971 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,611 UART: [kat] SHA2-256
795,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,925 UART: [kat] ++
806,447 UART: [kat] sha1
817,039 UART: [kat] SHA2-256
819,773 UART: [kat] SHA2-384
825,503 UART: [kat] SHA2-512-ACC
827,868 UART: [kat] ECC-384
3,110,419 UART: [kat] HMAC-384Kdf
3,122,684 UART: [kat] LMS
4,312,847 UART: [kat] --
4,317,574 UART: [cold-reset] ++
4,319,645 UART: [fht] Storing FHT @ 0x50003400
4,330,699 UART: [idev] ++
4,331,256 UART: [idev] CDI.KEYID = 6
4,332,186 UART: [idev] SUBJECT.KEYID = 7
4,333,429 UART: [idev] UDS.KEYID = 0
4,334,486 ready_for_fw is high
4,334,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,630 UART: [idev] Erasing UDS.KEYID = 0
7,621,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,939 UART: [idev] --
7,649,090 UART: [ldev] ++
7,649,654 UART: [ldev] CDI.KEYID = 6
7,650,588 UART: [ldev] SUBJECT.KEYID = 5
7,651,841 UART: [ldev] AUTHORITY.KEYID = 7
7,653,040 UART: [ldev] FE.KEYID = 1
7,665,630 UART: [ldev] Erasing FE.KEYID = 1
10,955,096 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,228 UART: [ldev] --
13,312,525 UART: [fwproc] Waiting for Commands...
13,315,797 UART: [fwproc] Received command 0x46574c44
13,317,966 UART: [fwproc] Received Image of size 118548 bytes
17,422,769 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,888 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,871 >>> mbox cmd response: success
17,901,980 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,904,242 UART: [afmc] ++
17,904,876 UART: [afmc] CDI.KEYID = 6
17,905,754 UART: [afmc] SUBJECT.KEYID = 7
17,907,023 UART: [afmc] AUTHORITY.KEYID = 5
21,224,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,050 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,215 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,618 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,608 UART: [afmc] --
23,585,922 UART: [cold-reset] --
23,589,070 UART: [state] Locking Datavault
23,595,876 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,627 UART: [state] Locking ICCM
23,599,368 UART: [exit] Launching FMC @ 0x40000130
23,607,761 UART:
23,607,995 UART: Running Caliptra FMC ...
23,609,087 UART:
23,609,245 UART: [state] CFI Enabled
23,617,450 UART: [fht] FMC Alias Private Key: 7
25,957,897 UART: [art] Extend RT PCRs Done
25,959,120 UART: [art] Lock RT PCRs Done
25,960,666 UART: [art] Populate DV Done
25,966,126 UART: [fht] FMC Alias Private Key: 7
25,967,819 UART: [art] Derive CDI
25,968,627 UART: [art] Store in slot 0x4
26,011,217 UART: [art] Derive Key Pair
26,012,210 UART: [art] Store priv key in slot 0x5
29,254,566 UART: [art] Derive Key Pair - Done
29,267,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,206 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,712 UART: [art] PUB.X = DB709B9A472D19BB572E5FC6AD067D1EF0ABCC8801661BFFE19A3CB8EA0E63A95C4BFD57A1419B3C0955985D57C7D8D4
31,556,003 UART: [art] PUB.Y = 9DC9007D8888EC0F8E4BF3C8EAE767CCDCF05D271F3DA815B3A94387AD6D5DA321C44C7B6AD02DAE9DCE80391B45F293
31,563,279 UART: [art] SIG.R = B26ACD0F24DAF116F58D5B13ABBEBA33EFDA514F880915A916DE074BEAACE45D06FB7D1B20E052CEEB5077B45C657596
31,570,711 UART: [art] SIG.S = EA04E03B9326C2E8B895C19FE1DE4F4F2B9C32254AAB70505AF5426AE28F87C145AA32C8E1E67186CF35014D6E310D69
32,876,069 UART: Caliptra RT
32,876,800 UART: [state] CFI Enabled
33,009,326 UART: [rt] RT listening for mailbox commands...
33,041,233 UART: [rt]cmd =0x50435245, len=56
33,043,093 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,147 writing to cptra_bootfsm_go
4,126,488 ready_for_fw is high
4,127,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,167,661 >>> mbox cmd response: success
18,168,876 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,812,019 UART:
23,812,407 UART: Running Caliptra FMC ...
23,813,515 UART:
23,813,665 UART: [state] CFI Enabled
23,821,627 UART: [fht] FMC Alias Private Key: 7
26,161,518 UART: [art] Extend RT PCRs Done
26,162,740 UART: [art] Lock RT PCRs Done
26,164,550 UART: [art] Populate DV Done
26,169,649 UART: [fht] FMC Alias Private Key: 7
26,171,204 UART: [art] Derive CDI
26,171,936 UART: [art] Store in slot 0x4
26,215,064 UART: [art] Derive Key Pair
26,216,061 UART: [art] Store priv key in slot 0x5
29,458,196 UART: [art] Derive Key Pair - Done
29,471,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,205 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,712 UART: [art] PUB.X = B7F44FECB6A9EDAD871A6ABCB7AD2875E2E5F133983CDE34CE1C2204596CEC025A7A967F72A1199DED209BA371740690
31,760,038 UART: [art] PUB.Y = D821AA501195B875FB8F115F257B230B2B76FDEDEA37AC606FBEE94FDFBC9341FE7E0FD1A3896894D5D18C78A0E22F63
31,767,312 UART: [art] SIG.R = 802316AE77F72F0D400B0B9148E9F52F4E2CE881E0DD1ABF5B1F010DFA0B474C155C9891A515E4E19EC252C8F28D0025
31,774,653 UART: [art] SIG.S = 96A145685911F0821A51981E487C0FD2BE77215C63FC11477ECC2E33CDC57ADA333DBB92E0E9F1ADABD21DD83EB5C5FC
33,080,044 UART: Caliptra RT
33,080,764 UART: [state] CFI Enabled
33,214,261 UART: [rt] RT listening for mailbox commands...
33,246,001 UART: [rt]cmd =0x50435245, len=56
33,247,758 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
191,941 UART:
192,320 UART: Running Caliptra ROM ...
193,445 UART:
193,592 UART: [state] CFI Enabled
264,372 UART: [state] LifecycleState = Unprovisioned
266,368 UART: [state] DebugLocked = No
267,977 UART: [state] WD Timer not started. Device not locked for debugging
271,313 UART: [kat] SHA2-256
450,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,751 UART: [kat] ++
462,196 UART: [kat] sha1
473,563 UART: [kat] SHA2-256
476,282 UART: [kat] SHA2-384
481,561 UART: [kat] SHA2-512-ACC
483,922 UART: [kat] ECC-384
2,949,093 UART: [kat] HMAC-384Kdf
2,970,288 UART: [kat] LMS
3,446,761 UART: [kat] --
3,453,096 UART: [cold-reset] ++
3,455,311 UART: [fht] FHT @ 0x50003400
3,465,873 UART: [idev] ++
3,466,445 UART: [idev] CDI.KEYID = 6
3,467,478 UART: [idev] SUBJECT.KEYID = 7
3,468,649 UART: [idev] UDS.KEYID = 0
3,469,572 ready_for_fw is high
3,469,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,790 UART: [idev] Erasing UDS.KEYID = 0
5,985,892 UART: [idev] Sha1 KeyId Algorithm
6,009,981 UART: [idev] --
6,015,163 UART: [ldev] ++
6,015,726 UART: [ldev] CDI.KEYID = 6
6,016,609 UART: [ldev] SUBJECT.KEYID = 5
6,017,871 UART: [ldev] AUTHORITY.KEYID = 7
6,019,100 UART: [ldev] FE.KEYID = 1
6,057,862 UART: [ldev] Erasing FE.KEYID = 1
8,563,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,510 UART: [ldev] --
10,373,285 UART: [fwproc] Wait for Commands...
10,375,182 UART: [fwproc] Recv command 0x46574c44
10,377,214 UART: [fwproc] Recv'd Img size: 118548 bytes
13,858,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,175 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,202 >>> mbox cmd response: success
14,344,282 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,347,461 UART: [afmc] ++
14,348,052 UART: [afmc] CDI.KEYID = 6
14,348,994 UART: [afmc] SUBJECT.KEYID = 7
14,350,232 UART: [afmc] AUTHORITY.KEYID = 5
16,892,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,766 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,560 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,652 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,197 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,562 UART: [afmc] --
18,692,466 UART: [cold-reset] --
18,695,211 UART: [state] Locking Datavault
18,699,648 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,396 UART: [state] Locking ICCM
18,702,785 UART: [exit] Launching FMC @ 0x40000130
18,711,229 UART:
18,711,470 UART: Running Caliptra FMC ...
18,712,569 UART:
18,712,747 UART: [state] CFI Enabled
18,771,080 UART: [fht] FMC Alias Private Key: 7
20,538,281 UART: [art] Extend RT PCRs Done
20,539,497 UART: [art] Lock RT PCRs Done
20,541,275 UART: [art] Populate DV Done
20,546,625 UART: [fht] FMC Alias Private Key: 7
20,548,317 UART: [art] Derive CDI
20,549,129 UART: [art] Store in slot 0x4
20,604,089 UART: [art] Derive Key Pair
20,605,079 UART: [art] Store priv key in slot 0x5
23,068,509 UART: [art] Derive Key Pair - Done
23,081,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,081 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,597 UART: [art] PUB.X = B5013CB7A936554248CF142126F90F159FEA788A32278F7A053150ED1D735FE31CF61D3E11C4570CEB19357AEA6E8B2C
24,802,846 UART: [art] PUB.Y = CB8B27E190FB4C645104156C881892914CC766DD143412079A9594E35199988F1783CE1649E6E1878A5F1263C342469C
24,810,071 UART: [art] SIG.R = 2063D62D7E6B073629B10E314FFF3BEA73CF48496A57EED0F4FFA14B00DF7E32AAA11091687C851085F1D0F22B821762
24,817,431 UART: [art] SIG.S = 2721208120E22860A88F566DFF8D8EBBF1EB38690B9AA028A904424F14F20976786D7E31BDADB3E4FCAD01210E1AB7E1
25,795,796 UART: Caliptra RT
25,796,511 UART: [state] CFI Enabled
25,977,926 UART: [rt] RT listening for mailbox commands...
26,009,608 UART: [rt]cmd =0x50435245, len=56
26,011,206 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,459,374 ready_for_fw is high
3,459,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,507 >>> mbox cmd response: success
14,226,814 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,509,635 UART:
18,510,021 UART: Running Caliptra FMC ...
18,511,133 UART:
18,511,282 UART: [state] CFI Enabled
18,582,090 UART: [fht] FMC Alias Private Key: 7
20,347,981 UART: [art] Extend RT PCRs Done
20,349,197 UART: [art] Lock RT PCRs Done
20,351,009 UART: [art] Populate DV Done
20,356,328 UART: [fht] FMC Alias Private Key: 7
20,358,025 UART: [art] Derive CDI
20,358,762 UART: [art] Store in slot 0x4
20,414,753 UART: [art] Derive Key Pair
20,415,816 UART: [art] Store priv key in slot 0x5
22,879,009 UART: [art] Derive Key Pair - Done
22,891,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,145 UART: [art] PUB.X = 783B22E5DB13D231A8FB4133C44E0A0BFF4D42BEB9AD24465E10F65326F041C49F7AC5F6F8B55C4EBC00EA20083538A7
24,613,453 UART: [art] PUB.Y = 08ACF017F5D2053B9E39CA056C380DE5D72E081B2A50CFDCF77FD1E382D25D40A8827CA4A861729967F62F85B125533C
24,620,715 UART: [art] SIG.R = 06B627E297C51D2D3A61407B1DDA06F17DC5CCBF07E0401E51218FE107806BFC7ACCBB16D1046D3ECB9A6DF9E828C648
24,628,095 UART: [art] SIG.S = 6C3373E86BD713E7229D340D0D62AEEE90910DE41BDDED2E28801301214721E1F1F0298EC8263E65CE2B5DCFB5BCB036
25,607,389 UART: Caliptra RT
25,608,088 UART: [state] CFI Enabled
25,787,583 UART: [rt] RT listening for mailbox commands...
25,819,260 UART: [rt]cmd =0x50435245, len=56
25,820,960 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,392 UART:
192,753 UART: Running Caliptra ROM ...
193,947 UART:
603,423 UART: [state] CFI Enabled
617,529 UART: [state] LifecycleState = Unprovisioned
619,395 UART: [state] DebugLocked = No
621,197 UART: [state] WD Timer not started. Device not locked for debugging
624,448 UART: [kat] SHA2-256
804,064 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,832 UART: [kat] ++
815,286 UART: [kat] sha1
825,736 UART: [kat] SHA2-256
828,460 UART: [kat] SHA2-384
834,594 UART: [kat] SHA2-512-ACC
836,970 UART: [kat] ECC-384
3,279,965 UART: [kat] HMAC-384Kdf
3,291,484 UART: [kat] LMS
3,768,010 UART: [kat] --
3,773,709 UART: [cold-reset] ++
3,775,705 UART: [fht] FHT @ 0x50003400
3,786,965 UART: [idev] ++
3,787,533 UART: [idev] CDI.KEYID = 6
3,788,567 UART: [idev] SUBJECT.KEYID = 7
3,789,741 UART: [idev] UDS.KEYID = 0
3,790,789 ready_for_fw is high
3,791,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,825 UART: [idev] Erasing UDS.KEYID = 0
6,271,377 UART: [idev] Sha1 KeyId Algorithm
6,295,305 UART: [idev] --
6,299,514 UART: [ldev] ++
6,300,090 UART: [ldev] CDI.KEYID = 6
6,301,031 UART: [ldev] SUBJECT.KEYID = 5
6,302,244 UART: [ldev] AUTHORITY.KEYID = 7
6,303,474 UART: [ldev] FE.KEYID = 1
6,316,346 UART: [ldev] Erasing FE.KEYID = 1
8,795,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,644 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,167 UART: [ldev] --
10,592,160 UART: [fwproc] Wait for Commands...
10,594,473 UART: [fwproc] Recv command 0x46574c44
10,596,513 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,504 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,389 >>> mbox cmd response: success
14,560,454 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,564,301 UART: [afmc] ++
14,564,941 UART: [afmc] CDI.KEYID = 6
14,565,852 UART: [afmc] SUBJECT.KEYID = 7
14,567,073 UART: [afmc] AUTHORITY.KEYID = 5
17,066,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,760 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,944 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,857 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,388 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,839 UART: [afmc] --
18,868,037 UART: [cold-reset] --
18,871,348 UART: [state] Locking Datavault
18,876,015 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,722 UART: [state] Locking ICCM
18,879,115 UART: [exit] Launching FMC @ 0x40000130
18,887,516 UART:
18,887,751 UART: Running Caliptra FMC ...
18,888,853 UART:
18,889,014 UART: [state] CFI Enabled
18,897,125 UART: [fht] FMC Alias Private Key: 7
20,662,908 UART: [art] Extend RT PCRs Done
20,664,111 UART: [art] Lock RT PCRs Done
20,665,597 UART: [art] Populate DV Done
20,671,245 UART: [fht] FMC Alias Private Key: 7
20,672,782 UART: [art] Derive CDI
20,673,520 UART: [art] Store in slot 0x4
20,716,115 UART: [art] Derive Key Pair
20,717,153 UART: [art] Store priv key in slot 0x5
23,143,611 UART: [art] Derive Key Pair - Done
23,157,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,208 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,694 UART: [art] PUB.X = EA9E1FFF2A14C5EC1636A5BDBE450E6CE36458857F8494B4A70879A277994E95A8D348DBB3426E80E32E7EEA9AD35D6F
24,872,056 UART: [art] PUB.Y = AFE218E7765C8D454F1DFD1ED6FDC3B81124AD321597F32720336FE1D7CC46868D804772DA786101BA0DD27F78B5C206
24,879,300 UART: [art] SIG.R = 238DB11A5F6B80BC0D4D5435034A7BCE13F7BB7A325AE82FF7C07FD4F559D81B84759C6D2B5B4FE88533EFD537E4306A
24,886,694 UART: [art] SIG.S = 37BB6F4291F505112023D9BE284495DF947D26B1525D4F2E327423AD30BEB4237072DF667F53CAD09A609182882BB781
25,865,177 UART: Caliptra RT
25,865,883 UART: [state] CFI Enabled
25,999,045 UART: [rt] RT listening for mailbox commands...
26,030,895 UART: [rt]cmd =0x50435245, len=56
26,032,458 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,345 writing to cptra_bootfsm_go
3,792,372 ready_for_fw is high
3,792,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,462,034 >>> mbox cmd response: success
14,463,477 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,717,581 UART:
18,717,961 UART: Running Caliptra FMC ...
18,719,109 UART:
18,719,274 UART: [state] CFI Enabled
18,727,015 UART: [fht] FMC Alias Private Key: 7
20,493,226 UART: [art] Extend RT PCRs Done
20,494,444 UART: [art] Lock RT PCRs Done
20,496,509 UART: [art] Populate DV Done
20,501,930 UART: [fht] FMC Alias Private Key: 7
20,503,472 UART: [art] Derive CDI
20,504,308 UART: [art] Store in slot 0x4
20,546,965 UART: [art] Derive Key Pair
20,547,973 UART: [art] Store priv key in slot 0x5
22,975,070 UART: [art] Derive Key Pair - Done
22,987,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,694,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,695,875 UART: [art] PUB.X = 61807D59B2DF8285E0341C4B78440D048002295A94AE815471F88EF055B5CDB6EA4F5F435DA05536B0C1A4DFBCFD9AB1
24,703,130 UART: [art] PUB.Y = ED5D946A544C2BB7B0101A8F1AE6032A6C28B3F41C16E6F8F6EF6D0E01FD73921C3E31E835AA77FDE667893D8DE4CCA9
24,710,449 UART: [art] SIG.R = EA5D44AB9DD9823CF74A6D473BEA3862E841A014F2976FDE059093D86077E42513ECE061F386CFF95A54F90009C0B5D9
24,717,799 UART: [art] SIG.S = 0664063952CAE14CFD127C1A35D81EEC3AE7D65DD8C74DF122FC0007468F75F71921E9E775E23011B7896DA95B359754
25,696,569 UART: Caliptra RT
25,697,283 UART: [state] CFI Enabled
25,830,652 UART: [rt] RT listening for mailbox commands...
25,862,329 UART: [rt]cmd =0x50435245, len=56
25,864,494 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,296 UART:
192,655 UART: Running Caliptra ROM ...
194,099 UART:
194,291 UART: [state] CFI Enabled
263,405 UART: [state] LifecycleState = Unprovisioned
265,763 UART: [state] DebugLocked = No
267,215 UART: [state] WD Timer not started. Device not locked for debugging
271,174 UART: [kat] SHA2-256
461,048 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,805 UART: [kat] ++
472,251 UART: [kat] sha1
483,548 UART: [kat] SHA2-256
486,551 UART: [kat] SHA2-384
492,465 UART: [kat] SHA2-512-ACC
495,062 UART: [kat] ECC-384
2,951,858 UART: [kat] HMAC-384Kdf
2,972,834 UART: [kat] LMS
3,504,575 UART: [kat] --
3,509,278 UART: [cold-reset] ++
3,511,846 UART: [fht] FHT @ 0x50003400
3,522,892 UART: [idev] ++
3,523,592 UART: [idev] CDI.KEYID = 6
3,524,568 UART: [idev] SUBJECT.KEYID = 7
3,525,735 UART: [idev] UDS.KEYID = 0
3,526,653 ready_for_fw is high
3,526,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,901 UART: [idev] Erasing UDS.KEYID = 0
6,030,280 UART: [idev] Sha1 KeyId Algorithm
6,052,039 UART: [idev] --
6,057,309 UART: [ldev] ++
6,058,017 UART: [ldev] CDI.KEYID = 6
6,058,933 UART: [ldev] SUBJECT.KEYID = 5
6,060,094 UART: [ldev] AUTHORITY.KEYID = 7
6,061,272 UART: [ldev] FE.KEYID = 1
6,102,141 UART: [ldev] Erasing FE.KEYID = 1
8,608,520 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,845 UART: [ldev] --
10,415,784 UART: [fwproc] Wait for Commands...
10,418,683 UART: [fwproc] Recv command 0x46574c44
10,420,983 UART: [fwproc] Recv'd Img size: 118548 bytes
13,923,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,167 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,341 >>> mbox cmd response: success
14,685,386 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,688,455 UART: [afmc] ++
14,689,155 UART: [afmc] CDI.KEYID = 6
14,690,312 UART: [afmc] SUBJECT.KEYID = 7
14,691,841 UART: [afmc] AUTHORITY.KEYID = 5
17,236,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,462 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,418 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,499 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,668 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,602 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,679 UART: [afmc] --
19,031,896 UART: [cold-reset] --
19,038,344 UART: [state] Locking Datavault
19,044,201 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,334 UART: [state] Locking ICCM
19,048,537 UART: [exit] Launching FMC @ 0x40000130
19,057,206 UART:
19,057,439 UART: Running Caliptra FMC ...
19,058,541 UART:
19,058,699 UART: [state] CFI Enabled
19,116,562 UART: [fht] FMC Alias Private Key: 7
20,903,983 UART: [art] Extend RT PCRs Done
20,905,198 UART: [art] Lock RT PCRs Done
20,906,419 UART: [art] Populate DV Done
20,912,155 UART: [fht] FMC Alias Private Key: 7
20,913,856 UART: [art] Derive CDI
20,914,874 UART: [art] Store in slot 0x4
20,969,899 UART: [art] Derive Key Pair
20,970,897 UART: [art] Store priv key in slot 0x5
23,433,778 UART: [art] Derive Key Pair - Done
23,446,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,275 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,780 UART: [art] PUB.X = BE0C458EF6A45812E87A1163B67F6CEEF0DDE77A0122D314CBBC539B1BC9BFF50F21C87A406D93504678731C22AE9ECA
25,168,082 UART: [art] PUB.Y = 533D49A2E53D677ACC4FD9A1B95E95FC547FF6BC5C4A54E2E7759751734672BA6AF1FE9D83DD0AC1E81E528FFB69B4D9
25,175,376 UART: [art] SIG.R = AD5C0B69BE28637770B6C992E3D2B189F4BC7F444D4DEAD887EDD2F17722BCE65D3C89ACF1FD9FC1B5F0BE399C2D27F8
25,182,766 UART: [art] SIG.S = D0E03C19A13CAE17690E6128CF3B1EFF21CF2CDB9948C6EEE006B30943BB0BDF27BE82E8EACA8B6735916771621ED78B
26,161,131 UART: Caliptra RT
26,161,839 UART: [state] CFI Enabled
26,340,545 UART: [rt] RT listening for mailbox commands...
26,371,954 UART: [rt]cmd =0x50435245, len=56
26,373,582 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
3,439,886 ready_for_fw is high
3,440,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,158 >>> mbox cmd response: success
14,816,384 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,112,251 UART:
19,112,630 UART: Running Caliptra FMC ...
19,113,845 UART:
19,114,017 UART: [state] CFI Enabled
19,179,713 UART: [fht] FMC Alias Private Key: 7
20,946,365 UART: [art] Extend RT PCRs Done
20,947,588 UART: [art] Lock RT PCRs Done
20,949,272 UART: [art] Populate DV Done
20,954,743 UART: [fht] FMC Alias Private Key: 7
20,956,336 UART: [art] Derive CDI
20,957,147 UART: [art] Store in slot 0x4
21,012,654 UART: [art] Derive Key Pair
21,013,692 UART: [art] Store priv key in slot 0x5
23,475,756 UART: [art] Derive Key Pair - Done
23,488,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,102 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,614 UART: [art] PUB.X = 99B72A26D8E986CE703E3176388A48FB1AC82B27136F6C7F3B7596B4CA510D9FCFF490687A905271058DF377486D26C0
25,210,869 UART: [art] PUB.Y = 1D9A57E04558266AA295CDB26770165BF33CC2D7DDC18B324E765973CE1CAB6527A34A9B9A81BEC05C84133E091477BF
25,218,120 UART: [art] SIG.R = 7A3E8A5143403F195A85601E1FB52A0C0221A7ABD0065A814355F139B1A12EBDCEE301C61B760B7317FC21B01DEACC7F
25,225,509 UART: [art] SIG.S = A38E6B49171F089005D509A722AFCA576DD237F7B96E32E171CCB8404109AC74BB88796395853F0F4D87BC441D730AD6
26,205,233 UART: Caliptra RT
26,205,951 UART: [state] CFI Enabled
26,384,868 UART: [rt] RT listening for mailbox commands...
26,416,500 UART: [rt]cmd =0x50435245, len=56
26,418,093 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
192,397 UART:
192,759 UART: Running Caliptra ROM ...
193,984 UART:
603,619 UART: [state] CFI Enabled
618,078 UART: [state] LifecycleState = Unprovisioned
620,469 UART: [state] DebugLocked = No
623,420 UART: [state] WD Timer not started. Device not locked for debugging
628,756 UART: [kat] SHA2-256
818,632 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,441 UART: [kat] ++
830,049 UART: [kat] sha1
840,870 UART: [kat] SHA2-256
843,875 UART: [kat] SHA2-384
850,362 UART: [kat] SHA2-512-ACC
852,946 UART: [kat] ECC-384
3,294,646 UART: [kat] HMAC-384Kdf
3,307,897 UART: [kat] LMS
3,839,719 UART: [kat] --
3,844,678 UART: [cold-reset] ++
3,846,907 UART: [fht] FHT @ 0x50003400
3,859,165 UART: [idev] ++
3,859,816 UART: [idev] CDI.KEYID = 6
3,860,852 UART: [idev] SUBJECT.KEYID = 7
3,861,958 UART: [idev] UDS.KEYID = 0
3,862,909 ready_for_fw is high
3,863,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,984 UART: [idev] Erasing UDS.KEYID = 0
6,336,058 UART: [idev] Sha1 KeyId Algorithm
6,359,251 UART: [idev] --
6,364,709 UART: [ldev] ++
6,365,399 UART: [ldev] CDI.KEYID = 6
6,366,317 UART: [ldev] SUBJECT.KEYID = 5
6,367,490 UART: [ldev] AUTHORITY.KEYID = 7
6,368,672 UART: [ldev] FE.KEYID = 1
6,382,097 UART: [ldev] Erasing FE.KEYID = 1
8,856,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,995 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,912 UART: [ldev] --
10,648,735 UART: [fwproc] Wait for Commands...
10,651,762 UART: [fwproc] Recv command 0x46574c44
10,654,076 UART: [fwproc] Recv'd Img size: 118548 bytes
14,160,332 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,549 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,921,307 >>> mbox cmd response: success
14,922,465 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,925,021 UART: [afmc] ++
14,925,760 UART: [afmc] CDI.KEYID = 6
14,926,871 UART: [afmc] SUBJECT.KEYID = 7
14,928,418 UART: [afmc] AUTHORITY.KEYID = 5
17,431,269 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,009 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,154,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,091 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,233 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,177 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,223,571 UART: [afmc] --
19,226,908 UART: [cold-reset] --
19,231,968 UART: [state] Locking Datavault
19,237,659 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,802 UART: [state] Locking ICCM
19,242,584 UART: [exit] Launching FMC @ 0x40000130
19,251,265 UART:
19,251,520 UART: Running Caliptra FMC ...
19,252,547 UART:
19,252,697 UART: [state] CFI Enabled
19,261,127 UART: [fht] FMC Alias Private Key: 7
21,027,148 UART: [art] Extend RT PCRs Done
21,028,378 UART: [art] Lock RT PCRs Done
21,029,828 UART: [art] Populate DV Done
21,035,249 UART: [fht] FMC Alias Private Key: 7
21,037,007 UART: [art] Derive CDI
21,037,958 UART: [art] Store in slot 0x4
21,080,359 UART: [art] Derive Key Pair
21,081,370 UART: [art] Store priv key in slot 0x5
23,508,490 UART: [art] Derive Key Pair - Done
23,521,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,617 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,128 UART: [art] PUB.X = E01F2E1D485C7C85AE9A6C0DDEF400ADB6C3F96E8A8DAF9B35DDE4409F0459BEEAF5140288C8FD3C2C6836B6C63B2178
25,236,416 UART: [art] PUB.Y = 59F2088B1CA6E5ECFA6538957576FD0A49F3D841F0BE2F52E3BD0E39BEC2B07986E1BD14D241B42CA5A95214BC366F6D
25,243,673 UART: [art] SIG.R = 004D02326DC4A1928B8BF510274E765D5D940A1F0332A4E88B2941A5EEFB13679FBEDB12BCFC5EB4B9136FBDBCA7389A
25,251,089 UART: [art] SIG.S = 5D8F323B4B74CE8169FFEB55CB15AA456BB0100FFA4D2114E101B738A139CE2245B511E110107DF29FA7B6035072C8A7
26,229,983 UART: Caliptra RT
26,230,701 UART: [state] CFI Enabled
26,362,635 UART: [rt] RT listening for mailbox commands...
26,394,479 UART: [rt]cmd =0x50435245, len=56
26,396,295 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,751,679 ready_for_fw is high
3,752,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,399 >>> mbox cmd response: success
15,044,664 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,295,946 UART:
19,296,325 UART: Running Caliptra FMC ...
19,297,489 UART:
19,297,647 UART: [state] CFI Enabled
19,305,507 UART: [fht] FMC Alias Private Key: 7
21,070,929 UART: [art] Extend RT PCRs Done
21,072,162 UART: [art] Lock RT PCRs Done
21,074,014 UART: [art] Populate DV Done
21,079,609 UART: [fht] FMC Alias Private Key: 7
21,081,100 UART: [art] Derive CDI
21,081,866 UART: [art] Store in slot 0x4
21,124,846 UART: [art] Derive Key Pair
21,125,849 UART: [art] Store priv key in slot 0x5
23,552,319 UART: [art] Derive Key Pair - Done
23,565,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,492 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,998 UART: [art] PUB.X = E09760069B992DA95276A0AD13E83BF5D46ED8594BFB7463EE9D0EC822EA8897F51BF67F5084DAACDE50DCBA69FEC814
25,280,261 UART: [art] PUB.Y = CA608947B31515CAC873DDA703D7359A3680D05A48E56402F3CA2E6FACEA1075D0E890B1D5E8F15E5A09AB2878CF065C
25,287,494 UART: [art] SIG.R = B04D83479C93C38F11FE4A3A944B3565FFA87ACBC590D761DD82F129860A3403CFE9038CCE1A080456F4EABB32EC4F65
25,294,910 UART: [art] SIG.S = D080489E14237EFF0677FCC5862C3FAEED227CD423A7D8A8EB10344DA6B21A547570E2266FA4E220D0F9832B8B19617C
26,273,328 UART: Caliptra RT
26,274,049 UART: [state] CFI Enabled
26,405,866 UART: [rt] RT listening for mailbox commands...
26,437,811 UART: [rt]cmd =0x50435245, len=56
26,439,595 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,086 UART: [state] LifecycleState = Unprovisioned
85,741 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,127 UART: [kat] SHA2-256
882,058 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,173 UART: [kat] ++
886,325 UART: [kat] sha1
890,485 UART: [kat] SHA2-256
892,423 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,457 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,648 UART: [idev] ++
1,479,816 UART: [idev] CDI.KEYID = 6
1,480,176 UART: [idev] SUBJECT.KEYID = 7
1,480,600 UART: [idev] UDS.KEYID = 0
1,480,945 ready_for_fw is high
1,480,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,818 UART: [idev] Erasing UDS.KEYID = 0
1,505,810 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,258 UART: [idev] --
1,515,321 UART: [ldev] ++
1,515,489 UART: [ldev] CDI.KEYID = 6
1,515,852 UART: [ldev] SUBJECT.KEYID = 5
1,516,278 UART: [ldev] AUTHORITY.KEYID = 7
1,516,741 UART: [ldev] FE.KEYID = 1
1,522,161 UART: [ldev] Erasing FE.KEYID = 1
1,547,774 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,662 UART: [ldev] --
1,587,037 UART: [fwproc] Waiting for Commands...
1,587,718 UART: [fwproc] Received command 0x46574c44
1,588,509 UART: [fwproc] Received Image of size 118548 bytes
2,932,886 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,847 >>> mbox cmd response: success
3,131,847 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,132,911 UART: [afmc] ++
3,133,079 UART: [afmc] CDI.KEYID = 6
3,133,441 UART: [afmc] SUBJECT.KEYID = 7
3,133,866 UART: [afmc] AUTHORITY.KEYID = 5
3,168,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,807 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,179 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,862 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,628 UART: [afmc] --
3,211,586 UART: [cold-reset] --
3,212,444 UART: [state] Locking Datavault
3,213,633 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,237 UART: [state] Locking ICCM
3,214,685 UART: [exit] Launching FMC @ 0x40000130
3,220,015 UART:
3,220,031 UART: Running Caliptra FMC ...
3,220,439 UART:
3,220,493 UART: [state] CFI Enabled
3,230,971 UART: [fht] FMC Alias Private Key: 7
3,350,507 UART: [art] Extend RT PCRs Done
3,350,935 UART: [art] Lock RT PCRs Done
3,352,285 UART: [art] Populate DV Done
3,360,320 UART: [fht] FMC Alias Private Key: 7
3,361,340 UART: [art] Derive CDI
3,361,620 UART: [art] Store in slot 0x4
3,447,148 UART: [art] Derive Key Pair
3,447,508 UART: [art] Store priv key in slot 0x5
3,460,083 UART: [art] Derive Key Pair - Done
3,474,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,557 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,322 UART: [art] PUB.X = 73FD280F823AD032ACA879EEAD252234A3A472175E93F370B80F630AE865B44595533A09D3C88D7F0D3D5AA2FACF3058
3,498,083 UART: [art] PUB.Y = 81F4F3AB1981C95CB4FA59166AF58FE411E4D8DDEFAC933DF61E80B85CA83C52FE6C785911546E1951B63B02C4131442
3,505,038 UART: [art] SIG.R = 39A51B138D74A9305FB0052EE7A074C9192ADE64B176A1CB48DB5266C0A172DFCA309A77A1EEA9898DCE913D999AB32B
3,511,817 UART: [art] SIG.S = 7D59A56077656222BEB35645C657D39A2A50AC570B274BAE75EF7156D11156DEBDEA177E3B23C12370D9EE1F61D977CC
3,535,704 UART: Caliptra RT
3,535,955 UART: [state] CFI Enabled
3,656,346 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,006 UART: [rt]cmd =0x50435245, len=56
3,688,494 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,771 ready_for_fw is high
1,361,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,248 >>> mbox cmd response: success
2,980,248 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,041,829 UART:
3,041,845 UART: Running Caliptra FMC ...
3,042,253 UART:
3,042,307 UART: [state] CFI Enabled
3,052,587 UART: [fht] FMC Alias Private Key: 7
3,171,905 UART: [art] Extend RT PCRs Done
3,172,333 UART: [art] Lock RT PCRs Done
3,173,729 UART: [art] Populate DV Done
3,182,018 UART: [fht] FMC Alias Private Key: 7
3,183,048 UART: [art] Derive CDI
3,183,328 UART: [art] Store in slot 0x4
3,268,772 UART: [art] Derive Key Pair
3,269,132 UART: [art] Store priv key in slot 0x5
3,282,297 UART: [art] Derive Key Pair - Done
3,296,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,559 UART: [art] PUB.X = 1BF196013F503543B802596436735535E034AE9B934468E77D10904DA08C27EB0879C1D7F9914DB54B12846A68D8E88A
3,319,308 UART: [art] PUB.Y = 6C7E380340F60B2255FBF5029BA267A4408454D1F90B2DA16D99C058F20B00EF3B306DEF4156D6CD59E746706780DCD5
3,326,223 UART: [art] SIG.R = E58D636956F2D7127A3C866B8BF9978351ECE14207FE55281657D678F067D396C1A5DD0B6735E456ACD3091EDC21357C
3,332,982 UART: [art] SIG.S = F7D1853A7BECC1734DB4327EA37EAA675DD80017B810FE5C7F7367C8B89C9EF321A066CEA77536BAB9030E94C09148BE
3,356,540 UART: Caliptra RT
3,356,791 UART: [state] CFI Enabled
3,477,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,430 UART: [rt]cmd =0x50435245, len=56
3,509,764 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,272 UART: [kat] SHA2-256
882,203 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,318 UART: [kat] ++
886,470 UART: [kat] sha1
890,650 UART: [kat] SHA2-256
892,588 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,873 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,680 UART: [cold-reset] ++
1,477,100 UART: [fht] Storing FHT @ 0x50003400
1,479,835 UART: [idev] ++
1,480,003 UART: [idev] CDI.KEYID = 6
1,480,363 UART: [idev] SUBJECT.KEYID = 7
1,480,787 UART: [idev] UDS.KEYID = 0
1,481,132 ready_for_fw is high
1,481,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,505,503 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,515,164 UART: [ldev] ++
1,515,332 UART: [ldev] CDI.KEYID = 6
1,515,695 UART: [ldev] SUBJECT.KEYID = 5
1,516,121 UART: [ldev] AUTHORITY.KEYID = 7
1,516,584 UART: [ldev] FE.KEYID = 1
1,522,000 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,713 UART: [ldev] --
1,587,014 UART: [fwproc] Waiting for Commands...
1,587,741 UART: [fwproc] Received command 0x46574c44
1,588,532 UART: [fwproc] Received Image of size 118548 bytes
2,933,844 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,778 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,423 >>> mbox cmd response: success
3,132,423 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,133,493 UART: [afmc] ++
3,133,661 UART: [afmc] CDI.KEYID = 6
3,134,023 UART: [afmc] SUBJECT.KEYID = 7
3,134,448 UART: [afmc] AUTHORITY.KEYID = 5
3,169,755 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,955 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,735 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,327 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,010 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,816 UART: [afmc] --
3,212,944 UART: [cold-reset] --
3,213,684 UART: [state] Locking Datavault
3,214,599 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,203 UART: [state] Locking ICCM
3,215,827 UART: [exit] Launching FMC @ 0x40000130
3,221,157 UART:
3,221,173 UART: Running Caliptra FMC ...
3,221,581 UART:
3,221,724 UART: [state] CFI Enabled
3,232,232 UART: [fht] FMC Alias Private Key: 7
3,351,314 UART: [art] Extend RT PCRs Done
3,351,742 UART: [art] Lock RT PCRs Done
3,353,428 UART: [art] Populate DV Done
3,361,737 UART: [fht] FMC Alias Private Key: 7
3,362,897 UART: [art] Derive CDI
3,363,177 UART: [art] Store in slot 0x4
3,448,707 UART: [art] Derive Key Pair
3,449,067 UART: [art] Store priv key in slot 0x5
3,463,038 UART: [art] Derive Key Pair - Done
3,477,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,932 UART: [art] PUB.X = 0F330B8ED77D9DAED310CE1C695C81681AE25C287A255BE29AB9C969967953A0DC573F4AA0F4B1939F9D3BE3B4CBAB8C
3,500,714 UART: [art] PUB.Y = 789D3A89185BC498A385A7C4207FEB4F90F1CB88DBA505E5942042D6D90B4B084A06DE9B9DB1AC37BA27096BA32C90E0
3,507,659 UART: [art] SIG.R = 0ECB079D5C64AC19815D3A51E78D059EDEF74132335944C39963FD343163FDC16320802527B08D913C7B5D5890D3EE2C
3,514,418 UART: [art] SIG.S = 89B639FF059BBF2FA59404C984B1C20A474E0D7527896609205654F7F4CC9D344CC237CCC84A9A3849180BFB7637981D
3,538,284 UART: Caliptra RT
3,538,627 UART: [state] CFI Enabled
3,659,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,113 UART: [rt]cmd =0x50435245, len=56
3,691,591 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 ready_for_fw is high
1,362,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,725 >>> mbox cmd response: success
2,980,725 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,043,488 UART:
3,043,504 UART: Running Caliptra FMC ...
3,043,912 UART:
3,044,055 UART: [state] CFI Enabled
3,054,515 UART: [fht] FMC Alias Private Key: 7
3,173,707 UART: [art] Extend RT PCRs Done
3,174,135 UART: [art] Lock RT PCRs Done
3,175,879 UART: [art] Populate DV Done
3,184,022 UART: [fht] FMC Alias Private Key: 7
3,185,086 UART: [art] Derive CDI
3,185,366 UART: [art] Store in slot 0x4
3,271,602 UART: [art] Derive Key Pair
3,271,962 UART: [art] Store priv key in slot 0x5
3,285,493 UART: [art] Derive Key Pair - Done
3,300,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,446 UART: [art] PUB.X = E7DF469F3787BA1D77746B41D4C64EF1A4102A1E5C1EF3F844ACABD509E85288720BFD3AC9A033312AC9488ED8421697
3,323,218 UART: [art] PUB.Y = B191E4EECFA25F02FF32109C494EA2FD48716947B3A2023895F14453A536C4AD4C1F027CB7828060F75044C4BC49B93A
3,330,161 UART: [art] SIG.R = A71AA3ECA5D7719E7E0C42FE92904BB6602E89BFCA306276EE3666A02B7519DCAA16480697AAC7B0C6C6AA17A327DCFE
3,336,943 UART: [art] SIG.S = F2AEDAC6F266C5AC4B972C0909DF45A36255B2E4A34225F96E24EEF99501F75A2E2203965670D7390047A79E64053235
3,360,944 UART: Caliptra RT
3,361,287 UART: [state] CFI Enabled
3,481,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,678 UART: [rt]cmd =0x50435245, len=56
3,514,096 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
890,924 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,028 UART: [kat] ++
895,180 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,253 UART: [kat] SHA2-512-ACC
906,154 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,532 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,744 UART: [idev] ++
1,172,912 UART: [idev] CDI.KEYID = 6
1,173,273 UART: [idev] SUBJECT.KEYID = 7
1,173,698 UART: [idev] UDS.KEYID = 0
1,174,044 ready_for_fw is high
1,174,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,907 UART: [idev] Erasing UDS.KEYID = 0
1,198,637 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,214,848 UART: [ldev] Erasing FE.KEYID = 1
1,240,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,098 UART: [ldev] --
1,280,543 UART: [fwproc] Wait for Commands...
1,281,298 UART: [fwproc] Recv command 0x46574c44
1,282,031 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,048 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,745 >>> mbox cmd response: success
2,826,745 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,843 UART: [afmc] ++
2,828,011 UART: [afmc] CDI.KEYID = 6
2,828,374 UART: [afmc] SUBJECT.KEYID = 7
2,828,800 UART: [afmc] AUTHORITY.KEYID = 5
2,864,489 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,571 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,464 UART: [afmc] --
2,907,383 UART: [cold-reset] --
2,908,247 UART: [state] Locking Datavault
2,909,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,064 UART: [state] Locking ICCM
2,910,496 UART: [exit] Launching FMC @ 0x40000130
2,915,826 UART:
2,915,842 UART: Running Caliptra FMC ...
2,916,250 UART:
2,916,304 UART: [state] CFI Enabled
2,927,100 UART: [fht] FMC Alias Private Key: 7
3,046,002 UART: [art] Extend RT PCRs Done
3,046,430 UART: [art] Lock RT PCRs Done
3,047,884 UART: [art] Populate DV Done
3,056,287 UART: [fht] FMC Alias Private Key: 7
3,057,457 UART: [art] Derive CDI
3,057,737 UART: [art] Store in slot 0x4
3,143,700 UART: [art] Derive Key Pair
3,144,060 UART: [art] Store priv key in slot 0x5
3,157,232 UART: [art] Derive Key Pair - Done
3,172,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,373 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,138 UART: [art] PUB.X = 4A3D9B27D21AFA9D12018CA186E0FB3B6FD6FC6C0A22149C61E9695B8A0E1527F1EF40E8883D54B256EA66549225420F
3,194,902 UART: [art] PUB.Y = 8CD8670232E201BF7F097B5D8EAC5EAB26C8D4355FDF954AC2277711FC2AD804AA264BA94739817E5B496271C235E74D
3,201,846 UART: [art] SIG.R = B9740F8CC0D6C242CA611EF92DC1AB2E0F6BE55D604DC72B2F1799927860A8C90014D4F033C8FC9459B5A4050181DC05
3,208,585 UART: [art] SIG.S = B3E90A21DBCEACB9B563E73C9B5A9CE777440D81FEF8F0A1E4E11FF02F812A0336E62409AC9DB7EC685229619BB69029
3,232,709 UART: Caliptra RT
3,232,960 UART: [state] CFI Enabled
3,352,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,972 UART: [rt]cmd =0x50435245, len=56
3,384,378 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,946 ready_for_fw is high
1,058,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,104 >>> mbox cmd response: success
2,679,104 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,741,613 UART:
2,741,629 UART: Running Caliptra FMC ...
2,742,037 UART:
2,742,091 UART: [state] CFI Enabled
2,752,509 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,873,711 UART: [art] Populate DV Done
2,881,966 UART: [fht] FMC Alias Private Key: 7
2,883,062 UART: [art] Derive CDI
2,883,342 UART: [art] Store in slot 0x4
2,969,115 UART: [art] Derive Key Pair
2,969,475 UART: [art] Store priv key in slot 0x5
2,982,931 UART: [art] Derive Key Pair - Done
2,997,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,249 UART: [art] PUB.X = B8E6C23350E33F88FE205D2AF6B9396EFA1B34172D7A93256F2579E908F355E8C519309DF477F7794592DD1B17C664A2
3,021,014 UART: [art] PUB.Y = 6C6A26184FA089DAA417ADE1FAAA2F56E62EC6D3712F39364AF71A43838E7AA8D06E551A96F1E0ED0EA24E4B95B65B06
3,027,974 UART: [art] SIG.R = 579E2AC1D8E7C39BDCFAD043B7889D8E76BDECCCAABD19EC9B1FED717982B2C2440E1E6060FFBEE50548C44EC7F45D11
3,034,766 UART: [art] SIG.S = E9F651169443F1F7B98C48D7C2F12E27D5CEE8071A3FE5E3A7472D4579BC89FC24E7DCC3E8634C076165C96AAA77DEFA
3,058,874 UART: Caliptra RT
3,059,125 UART: [state] CFI Enabled
3,178,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,264 UART: [rt]cmd =0x50435245, len=56
3,210,796 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,139 UART: [state] LifecycleState = Unprovisioned
85,794 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,405 UART: [kat] SHA2-256
890,955 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,059 UART: [kat] ++
895,211 UART: [kat] sha1
899,455 UART: [kat] SHA2-256
901,395 UART: [kat] SHA2-384
904,096 UART: [kat] SHA2-512-ACC
905,997 UART: [kat] ECC-384
915,940 UART: [kat] HMAC-384Kdf
920,680 UART: [kat] LMS
1,168,992 UART: [kat] --
1,169,979 UART: [cold-reset] ++
1,170,305 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 ready_for_fw is high
1,174,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,992 UART: [idev] Erasing UDS.KEYID = 0
1,198,916 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,209,031 UART: [ldev] ++
1,209,199 UART: [ldev] CDI.KEYID = 6
1,209,563 UART: [ldev] SUBJECT.KEYID = 5
1,209,990 UART: [ldev] AUTHORITY.KEYID = 7
1,210,453 UART: [ldev] FE.KEYID = 1
1,215,713 UART: [ldev] Erasing FE.KEYID = 1
1,242,270 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,060 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,678 UART: [fwproc] Wait for Commands...
1,282,295 UART: [fwproc] Recv command 0x46574c44
1,283,028 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,697 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,880 >>> mbox cmd response: success
2,826,880 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,950 UART: [afmc] ++
2,828,118 UART: [afmc] CDI.KEYID = 6
2,828,481 UART: [afmc] SUBJECT.KEYID = 7
2,828,907 UART: [afmc] AUTHORITY.KEYID = 5
2,865,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,966 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,847 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,393 UART: [afmc] --
2,908,366 UART: [cold-reset] --
2,909,048 UART: [state] Locking Datavault
2,910,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,851 UART: [state] Locking ICCM
2,911,347 UART: [exit] Launching FMC @ 0x40000130
2,916,677 UART:
2,916,693 UART: Running Caliptra FMC ...
2,917,101 UART:
2,917,244 UART: [state] CFI Enabled
2,928,028 UART: [fht] FMC Alias Private Key: 7
3,046,224 UART: [art] Extend RT PCRs Done
3,046,652 UART: [art] Lock RT PCRs Done
3,048,110 UART: [art] Populate DV Done
3,056,491 UART: [fht] FMC Alias Private Key: 7
3,057,501 UART: [art] Derive CDI
3,057,781 UART: [art] Store in slot 0x4
3,143,704 UART: [art] Derive Key Pair
3,144,064 UART: [art] Store priv key in slot 0x5
3,157,214 UART: [art] Derive Key Pair - Done
3,171,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,475 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,240 UART: [art] PUB.X = B20E3D119E84C37719061D7A59C624A8A17149E40300194F2E5AA2468BB7846112C207DD5AA56FC1E27832BE6AE7B15A
3,194,976 UART: [art] PUB.Y = 428D1250C17F276573048E35514BB8AF3E6B1C8A3D8C773294961E569C52BCB71BFAC49522731F2A6088DC8FA22CF162
3,201,923 UART: [art] SIG.R = 3D7F82DF695B3D580DCF7ADFEF1DE46269AC575F14B4C4AAB84D00E9EB4613BFF4D0C99B8BC38F1C95AFABC870FADB2E
3,208,702 UART: [art] SIG.S = 6E1C364D0B4966BBD1BB997C1D5ACF6AE052E9F3942778169BE74BA7C072B14D9C41712F7A3DE5BF2B665F19D3E27277
3,232,579 UART: Caliptra RT
3,232,922 UART: [state] CFI Enabled
3,353,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,354 UART: [rt]cmd =0x50435245, len=56
3,385,912 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,565 ready_for_fw is high
1,058,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,389 >>> mbox cmd response: success
2,678,389 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,741,818 UART:
2,741,834 UART: Running Caliptra FMC ...
2,742,242 UART:
2,742,385 UART: [state] CFI Enabled
2,752,885 UART: [fht] FMC Alias Private Key: 7
2,871,981 UART: [art] Extend RT PCRs Done
2,872,409 UART: [art] Lock RT PCRs Done
2,873,939 UART: [art] Populate DV Done
2,882,382 UART: [fht] FMC Alias Private Key: 7
2,883,320 UART: [art] Derive CDI
2,883,600 UART: [art] Store in slot 0x4
2,969,561 UART: [art] Derive Key Pair
2,969,921 UART: [art] Store priv key in slot 0x5
2,983,605 UART: [art] Derive Key Pair - Done
2,998,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,018 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,783 UART: [art] PUB.X = 0563F000EB64102E109052998039358D8C45D99DB2A55A578A9F8418F7284712BC6313DC1E2D2D2C3FC89768E0D0A065
3,021,520 UART: [art] PUB.Y = EA77F7DA9F2284A3A728C6A13058278D103C6C4EF08F2BEAC14E32F897C5476E41E4A815C11B06CAA74039DF979DCDB9
3,028,479 UART: [art] SIG.R = 04DAE22738B31688403095AA215D8422075BD23BF30F3BDA265F83EBA570C2A4B669AC8500E14C1C697C8C106391A764
3,035,216 UART: [art] SIG.S = E31B0ED480000333592BBA782B13D45658D96A46A03ACA79E1C25C88B3EC7627306E9E3023DCB2905F8AF2BD3E46D44C
3,058,938 UART: Caliptra RT
3,059,281 UART: [state] CFI Enabled
3,179,164 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,052 UART: [rt]cmd =0x50435245, len=56
3,211,364 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,460 UART: [kat] SHA2-256
893,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,235 UART: [kat] ++
897,387 UART: [kat] sha1
901,457 UART: [kat] SHA2-256
903,397 UART: [kat] SHA2-384
906,214 UART: [kat] SHA2-512-ACC
908,115 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,178 UART: [kat] LMS
1,170,506 UART: [kat] --
1,171,043 UART: [cold-reset] ++
1,171,579 UART: [fht] FHT @ 0x50003400
1,174,370 UART: [idev] ++
1,174,538 UART: [idev] CDI.KEYID = 6
1,174,898 UART: [idev] SUBJECT.KEYID = 7
1,175,322 UART: [idev] UDS.KEYID = 0
1,175,667 ready_for_fw is high
1,175,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,324 UART: [idev] Erasing UDS.KEYID = 0
1,200,289 UART: [idev] Sha1 KeyId Algorithm
1,208,957 UART: [idev] --
1,210,021 UART: [ldev] ++
1,210,189 UART: [ldev] CDI.KEYID = 6
1,210,552 UART: [ldev] SUBJECT.KEYID = 5
1,210,978 UART: [ldev] AUTHORITY.KEYID = 7
1,211,441 UART: [ldev] FE.KEYID = 1
1,216,621 UART: [ldev] Erasing FE.KEYID = 1
1,243,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,013 UART: [ldev] --
1,282,424 UART: [fwproc] Wait for Commands...
1,283,216 UART: [fwproc] Recv command 0x46574c44
1,283,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,367 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,355 >>> mbox cmd response: success
2,826,355 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,615 UART: [afmc] ++
2,827,783 UART: [afmc] CDI.KEYID = 6
2,828,145 UART: [afmc] SUBJECT.KEYID = 7
2,828,570 UART: [afmc] AUTHORITY.KEYID = 5
2,864,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,363 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,947 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,907 UART: [afmc] --
2,907,997 UART: [cold-reset] --
2,908,707 UART: [state] Locking Datavault
2,910,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,688 UART: [state] Locking ICCM
2,911,216 UART: [exit] Launching FMC @ 0x40000130
2,916,546 UART:
2,916,562 UART: Running Caliptra FMC ...
2,916,970 UART:
2,917,024 UART: [state] CFI Enabled
2,927,508 UART: [fht] FMC Alias Private Key: 7
3,046,908 UART: [art] Extend RT PCRs Done
3,047,336 UART: [art] Lock RT PCRs Done
3,048,856 UART: [art] Populate DV Done
3,057,307 UART: [fht] FMC Alias Private Key: 7
3,058,237 UART: [art] Derive CDI
3,058,517 UART: [art] Store in slot 0x4
3,144,232 UART: [art] Derive Key Pair
3,144,592 UART: [art] Store priv key in slot 0x5
3,157,796 UART: [art] Derive Key Pair - Done
3,172,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,336 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,101 UART: [art] PUB.X = 48F3FB711E0100806DA955DD62A2AC0F69482EFF8A1953495728BF08EEA5CD6F8B7184A587E0561B4D261F09B2414FFE
3,195,843 UART: [art] PUB.Y = EF8C1929E2FE3A47CC06B698C10B15BD4439B54B7AD31D9F1E95916CA2E9778AEF28AB1659AF6C3EF99B370B9B4644B0
3,202,798 UART: [art] SIG.R = 0FA2ECAA730154A6BA0CAB081A68A8BCACB3A4024D01E8ACC78FF887BA08B97B0E226208F6EE23C159BEBCAA74BD0E29
3,209,566 UART: [art] SIG.S = 60D498FC3663D1E0166537F357844915F37B5351B3B88DC1879C2228CFD6EB2547F842693D31F4A6B3113D4778110C91
3,233,305 UART: Caliptra RT
3,233,556 UART: [state] CFI Enabled
3,353,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,604 UART: [rt]cmd =0x50435245, len=56
3,386,102 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,805 ready_for_fw is high
1,059,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,736 >>> mbox cmd response: success
2,680,736 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,859 UART:
2,742,875 UART: Running Caliptra FMC ...
2,743,283 UART:
2,743,337 UART: [state] CFI Enabled
2,753,367 UART: [fht] FMC Alias Private Key: 7
2,873,151 UART: [art] Extend RT PCRs Done
2,873,579 UART: [art] Lock RT PCRs Done
2,875,315 UART: [art] Populate DV Done
2,883,650 UART: [fht] FMC Alias Private Key: 7
2,884,744 UART: [art] Derive CDI
2,885,024 UART: [art] Store in slot 0x4
2,971,117 UART: [art] Derive Key Pair
2,971,477 UART: [art] Store priv key in slot 0x5
2,984,429 UART: [art] Derive Key Pair - Done
2,999,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,294 UART: [art] PUB.X = 3066D48E3454865D197B432A9F53ACEDB0DF6D0D3E22225EA8C3D123948C02498CD0D19D363AF9A590BCCC92EA8776F8
3,022,066 UART: [art] PUB.Y = 7485F7BC25569693D82E6460B93F15E20F7570530CFFD778EC3C08A1B00A7CE4829708B88BB3D74777FBEFB3E6506C94
3,029,003 UART: [art] SIG.R = D948B5F1C5174B0043346079EE2D98AB70C6B98507CEF87A3E9AD70D07F32439E1F265D16821E11D0B89F02108B984E7
3,035,734 UART: [art] SIG.S = 7296FE1BDD974E43CF110C153D4E00B3F9CED08C110110166CACC35CEA098EB363DAE500ED9CC2C5D1148F2A1A4B19D9
3,059,349 UART: Caliptra RT
3,059,600 UART: [state] CFI Enabled
3,179,717 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,297 UART: [rt]cmd =0x50435245, len=56
3,211,705 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
893,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,746 UART: [kat] ++
897,898 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,941 UART: [kat] SHA2-512-ACC
908,842 UART: [kat] ECC-384
918,863 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,686 UART: [cold-reset] ++
1,173,120 UART: [fht] FHT @ 0x50003400
1,175,955 UART: [idev] ++
1,176,123 UART: [idev] CDI.KEYID = 6
1,176,483 UART: [idev] SUBJECT.KEYID = 7
1,176,907 UART: [idev] UDS.KEYID = 0
1,177,252 ready_for_fw is high
1,177,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,917 UART: [idev] Erasing UDS.KEYID = 0
1,202,316 UART: [idev] Sha1 KeyId Algorithm
1,210,886 UART: [idev] --
1,211,858 UART: [ldev] ++
1,212,026 UART: [ldev] CDI.KEYID = 6
1,212,389 UART: [ldev] SUBJECT.KEYID = 5
1,212,815 UART: [ldev] AUTHORITY.KEYID = 7
1,213,278 UART: [ldev] FE.KEYID = 1
1,218,748 UART: [ldev] Erasing FE.KEYID = 1
1,245,053 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,696 UART: [ldev] --
1,283,977 UART: [fwproc] Wait for Commands...
1,284,703 UART: [fwproc] Recv command 0x46574c44
1,285,431 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,780 >>> mbox cmd response: success
2,828,780 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,829,834 UART: [afmc] ++
2,830,002 UART: [afmc] CDI.KEYID = 6
2,830,364 UART: [afmc] SUBJECT.KEYID = 7
2,830,789 UART: [afmc] AUTHORITY.KEYID = 5
2,866,526 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,651 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,360 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,243 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,944 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,856 UART: [afmc] --
2,909,756 UART: [cold-reset] --
2,910,580 UART: [state] Locking Datavault
2,911,809 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,413 UART: [state] Locking ICCM
2,913,029 UART: [exit] Launching FMC @ 0x40000130
2,918,359 UART:
2,918,375 UART: Running Caliptra FMC ...
2,918,783 UART:
2,918,926 UART: [state] CFI Enabled
2,929,564 UART: [fht] FMC Alias Private Key: 7
3,049,498 UART: [art] Extend RT PCRs Done
3,049,926 UART: [art] Lock RT PCRs Done
3,051,144 UART: [art] Populate DV Done
3,059,383 UART: [fht] FMC Alias Private Key: 7
3,060,401 UART: [art] Derive CDI
3,060,681 UART: [art] Store in slot 0x4
3,146,460 UART: [art] Derive Key Pair
3,146,820 UART: [art] Store priv key in slot 0x5
3,160,432 UART: [art] Derive Key Pair - Done
3,175,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,357 UART: [art] PUB.X = 20B97DB2E68FF8F2AAC451F1EB954CF2975F3FFE257F3EFA5774B838D719016D022E326E4853611D1DD2B0C804274B6E
3,198,126 UART: [art] PUB.Y = F2396EF8DCFC19EBC163564EBD916B2D5715B488F137E6AAE1A1509E1E8C8B9B7B6B68ADAD09B27842A1E5693A99070E
3,205,081 UART: [art] SIG.R = 09EC77C6E5CC0EA73FCB2706C5DFEF63A4E18E24586007A3F90F7D40F1FF9BFEB6467BBB48BC2BE7171D0882F7F9B3A8
3,211,855 UART: [art] SIG.S = C1D3B65F9592EDBD5D08E5F27A5EAE0E58EFC3475E55C9F1EFEBEAF8A6FA59C87A9422B82184C615881D09FE215E3ACD
3,235,288 UART: Caliptra RT
3,235,631 UART: [state] CFI Enabled
3,355,348 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,420 UART: [rt]cmd =0x50435245, len=56
3,387,562 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,858 ready_for_fw is high
1,059,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,155 >>> mbox cmd response: success
2,680,155 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,308 UART:
2,742,324 UART: Running Caliptra FMC ...
2,742,732 UART:
2,742,875 UART: [state] CFI Enabled
2,753,755 UART: [fht] FMC Alias Private Key: 7
2,873,059 UART: [art] Extend RT PCRs Done
2,873,487 UART: [art] Lock RT PCRs Done
2,875,081 UART: [art] Populate DV Done
2,883,462 UART: [fht] FMC Alias Private Key: 7
2,884,438 UART: [art] Derive CDI
2,884,718 UART: [art] Store in slot 0x4
2,971,063 UART: [art] Derive Key Pair
2,971,423 UART: [art] Store priv key in slot 0x5
2,985,005 UART: [art] Derive Key Pair - Done
2,999,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,544 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,309 UART: [art] PUB.X = 2F24888DB9A350D4E425E39B4EA89B519B1A93D5CDFA6F20B8492DA984AC69F37FE3A261315B3D8A3E707247AC5B3C1A
3,023,091 UART: [art] PUB.Y = 61FEDB78826CCB952868BDCDEDF8557DEDA70B8174363B6284ED7CB3D465157371C66052CAE604EECC15D3DC388C0C05
3,030,043 UART: [art] SIG.R = 83C37BE320AA3D2E0BDB7B6B75E51B84E112500F2DB790C92217EED70A6B0AECA6E8BDFC999FA0BDD1A8D3151C6FF695
3,036,825 UART: [art] SIG.S = 4D3F8E41F61217B790A1E19F725254C3FFCA89AE422BA4169EF26FFE33D69963B17C3E865D24FEDA106194B2E9E3746F
3,060,845 UART: Caliptra RT
3,061,188 UART: [state] CFI Enabled
3,181,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,407 UART: [rt]cmd =0x50435245, len=56
3,213,659 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_invalid_pcr_index ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,170 UART:
192,525 UART: Running Caliptra ROM ...
193,715 UART:
193,870 UART: [state] CFI Enabled
265,488 UART: [state] LifecycleState = Unprovisioned
267,476 UART: [state] DebugLocked = No
269,651 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,167 UART: [kat] SHA2-256
443,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,372 UART: [kat] ++
454,906 UART: [kat] sha1
466,587 UART: [kat] SHA2-256
469,253 UART: [kat] SHA2-384
476,094 UART: [kat] SHA2-512-ACC
478,468 UART: [kat] ECC-384
2,769,156 UART: [kat] HMAC-384Kdf
2,801,169 UART: [kat] LMS
3,991,486 UART: [kat] --
3,995,026 UART: [cold-reset] ++
3,996,833 UART: [fht] Storing FHT @ 0x50003400
4,007,526 UART: [idev] ++
4,008,107 UART: [idev] CDI.KEYID = 6
4,009,114 UART: [idev] SUBJECT.KEYID = 7
4,010,295 UART: [idev] UDS.KEYID = 0
4,011,370 ready_for_fw is high
4,011,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,741 UART: [idev] Erasing UDS.KEYID = 0
7,347,432 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,346 UART: [idev] --
7,372,369 UART: [ldev] ++
7,372,934 UART: [ldev] CDI.KEYID = 6
7,373,870 UART: [ldev] SUBJECT.KEYID = 5
7,375,132 UART: [ldev] AUTHORITY.KEYID = 7
7,376,369 UART: [ldev] FE.KEYID = 1
7,422,361 UART: [ldev] Erasing FE.KEYID = 1
10,754,594 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,992 UART: [ldev] --
13,117,068 UART: [fwproc] Waiting for Commands...
13,119,702 UART: [fwproc] Received command 0x46574c44
13,121,904 UART: [fwproc] Received Image of size 118548 bytes
17,226,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,820 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,992 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,704,094 >>> mbox cmd response: success
17,705,208 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,708,473 UART: [afmc] ++
17,709,110 UART: [afmc] CDI.KEYID = 6
17,709,989 UART: [afmc] SUBJECT.KEYID = 7
17,711,171 UART: [afmc] AUTHORITY.KEYID = 5
21,072,893 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,593 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,850 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,342 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,020 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,415 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,799 UART: [afmc] --
23,444,069 UART: [cold-reset] --
23,447,714 UART: [state] Locking Datavault
23,453,994 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,748 UART: [state] Locking ICCM
23,458,058 UART: [exit] Launching FMC @ 0x40000130
23,466,469 UART:
23,466,747 UART: Running Caliptra FMC ...
23,467,859 UART:
23,468,017 UART: [state] CFI Enabled
23,532,826 UART: [fht] FMC Alias Private Key: 7
25,873,307 UART: [art] Extend RT PCRs Done
25,874,530 UART: [art] Lock RT PCRs Done
25,876,178 UART: [art] Populate DV Done
25,881,588 UART: [fht] FMC Alias Private Key: 7
25,883,181 UART: [art] Derive CDI
25,883,936 UART: [art] Store in slot 0x4
25,941,870 UART: [art] Derive Key Pair
25,942,911 UART: [art] Store priv key in slot 0x5
29,236,228 UART: [art] Derive Key Pair - Done
29,249,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,631 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,154 UART: [art] PUB.X = 2AA02BDB60D02BB30D32270F5DF85EEFC0BD3233731150D3B6DB88EBFC49609AC5D285F542F3B9D14C99564215672470
31,546,429 UART: [art] PUB.Y = 16EA298C31AC16977C7FF719C28B6089D0D988B1BE963016FCC04C27B9C807200255479557E013D0A99DD10BB6BD21BF
31,553,669 UART: [art] SIG.R = 148C31D49885350A8DA22453AF2B5D2EA409A28B665C564FC9FF357235CACAAE0BB10A53B12029FC2D1F45BAF0B2B659
31,561,057 UART: [art] SIG.S = BB4CBA678E0FE2027612282CBF6CA4AAFEDB3155677CE463836C8D3FE986E8B34569D2AC6A17DF7B7B37C836F5AC7948
32,866,589 UART: Caliptra RT
32,867,303 UART: [state] CFI Enabled
33,044,808 UART: [rt] RT listening for mailbox commands...
33,076,330 UART: [rt]cmd =0x50435251, len=36
34,235,246 >>> mbox cmd response data (1848 bytes)
34,244,147 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,274,497 UART: [rt]cmd =0x50435245, len=56
34,277,768 >>> mbox cmd response data (8 bytes)
34,278,613 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,308,426 UART: [rt]cmd =0x50435251, len=36
35,471,619 >>> mbox cmd response data (1848 bytes)
35,481,659 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,511,907 UART: [rt]cmd =0x50435245, len=56
35,514,994 >>> mbox cmd response data (8 bytes)
35,515,712 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,545,781 UART: [rt]cmd =0x50435251, len=36
36,708,940 >>> mbox cmd response data (1848 bytes)
36,717,857 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,748,253 UART: [rt]cmd =0x50435245, len=56
36,751,367 >>> mbox cmd response data (8 bytes)
36,751,944 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,781,978 UART: [rt]cmd =0x50435251, len=36
37,946,460 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,803,370 ready_for_fw is high
3,803,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,954,344 >>> mbox cmd response: success
17,955,569 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,650,979 UART:
23,651,366 UART: Running Caliptra FMC ...
23,652,491 UART:
23,652,641 UART: [state] CFI Enabled
23,720,061 UART: [fht] FMC Alias Private Key: 7
26,082,163 UART: [art] Extend RT PCRs Done
26,083,395 UART: [art] Lock RT PCRs Done
26,084,787 UART: [art] Populate DV Done
26,090,324 UART: [fht] FMC Alias Private Key: 7
26,092,032 UART: [art] Derive CDI
26,092,777 UART: [art] Store in slot 0x4
26,150,286 UART: [art] Derive Key Pair
26,151,330 UART: [art] Store priv key in slot 0x5
29,444,254 UART: [art] Derive Key Pair - Done
29,457,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,215 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,729 UART: [art] PUB.X = BD431931E22FA29E22C44A9CD35DFF5422E6717057B09A6DD6B566638736658DA04FCC68148BF597D152608A4D06FB4C
31,754,976 UART: [art] PUB.Y = 08E6193E2D12D518CBC471FC5C467C739475C5A0B64858421D8859C06387C92CE9B404D89EBA5EA0592E28D86B22D189
31,762,235 UART: [art] SIG.R = ACF5DB17B920C3647615F1D9D8DE89B7A10C6CA3C81C6AD4D6452CB6D1277ECE89BAAAC77E74996A53D14EAFA3347C2D
31,769,690 UART: [art] SIG.S = 193C7EA846E657D25B5A749016C8103C785068078A735D2DA73659716D9E69812BE74855BC00247F87693E9B11FD1B1D
33,074,351 UART: Caliptra RT
33,075,069 UART: [state] CFI Enabled
33,253,083 UART: [rt] RT listening for mailbox commands...
33,284,506 UART: [rt]cmd =0x50435251, len=36
34,444,255 >>> mbox cmd response data (1848 bytes)
34,453,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,483,482 UART: [rt]cmd =0x50435245, len=56
34,486,611 >>> mbox cmd response data (8 bytes)
34,487,401 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,517,474 UART: [rt]cmd =0x50435251, len=36
35,681,113 >>> mbox cmd response data (1848 bytes)
35,691,096 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,721,375 UART: [rt]cmd =0x50435245, len=56
35,724,443 >>> mbox cmd response data (8 bytes)
35,725,182 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,754,949 UART: [rt]cmd =0x50435251, len=36
36,918,297 >>> mbox cmd response data (1848 bytes)
36,927,214 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,957,382 UART: [rt]cmd =0x50435245, len=56
36,960,354 >>> mbox cmd response data (8 bytes)
36,960,921 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,991,116 UART: [rt]cmd =0x50435251, len=36
38,156,153 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,405 UART:
192,774 UART: Running Caliptra ROM ...
193,879 UART:
603,579 UART: [state] CFI Enabled
619,377 UART: [state] LifecycleState = Unprovisioned
621,310 UART: [state] DebugLocked = No
623,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,026 UART: [kat] SHA2-256
797,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,353 UART: [kat] ++
808,795 UART: [kat] sha1
820,016 UART: [kat] SHA2-256
822,733 UART: [kat] SHA2-384
828,929 UART: [kat] SHA2-512-ACC
831,310 UART: [kat] ECC-384
3,116,549 UART: [kat] HMAC-384Kdf
3,129,572 UART: [kat] LMS
4,319,702 UART: [kat] --
4,325,726 UART: [cold-reset] ++
4,328,164 UART: [fht] Storing FHT @ 0x50003400
4,338,999 UART: [idev] ++
4,339,627 UART: [idev] CDI.KEYID = 6
4,340,531 UART: [idev] SUBJECT.KEYID = 7
4,341,766 UART: [idev] UDS.KEYID = 0
4,342,765 ready_for_fw is high
4,342,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,831 UART: [idev] Erasing UDS.KEYID = 0
7,631,417 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,707 UART: [idev] --
7,656,428 UART: [ldev] ++
7,656,989 UART: [ldev] CDI.KEYID = 6
7,657,944 UART: [ldev] SUBJECT.KEYID = 5
7,659,148 UART: [ldev] AUTHORITY.KEYID = 7
7,660,425 UART: [ldev] FE.KEYID = 1
7,668,974 UART: [ldev] Erasing FE.KEYID = 1
10,958,683 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,107 UART: [ldev] --
13,320,293 UART: [fwproc] Waiting for Commands...
13,321,954 UART: [fwproc] Received command 0x46574c44
13,324,138 UART: [fwproc] Received Image of size 118548 bytes
17,431,165 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,818 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,913,271 >>> mbox cmd response: success
17,914,443 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
17,916,833 UART: [afmc] ++
17,917,432 UART: [afmc] CDI.KEYID = 6
17,918,340 UART: [afmc] SUBJECT.KEYID = 7
17,919,605 UART: [afmc] AUTHORITY.KEYID = 5
21,230,179 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,142 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,517 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,964 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,593,364 UART: [afmc] --
23,597,274 UART: [cold-reset] --
23,600,964 UART: [state] Locking Datavault
23,606,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,063 UART: [state] Locking ICCM
23,610,424 UART: [exit] Launching FMC @ 0x40000130
23,618,863 UART:
23,619,110 UART: Running Caliptra FMC ...
23,620,203 UART:
23,620,363 UART: [state] CFI Enabled
23,628,239 UART: [fht] FMC Alias Private Key: 7
25,968,726 UART: [art] Extend RT PCRs Done
25,969,960 UART: [art] Lock RT PCRs Done
25,971,213 UART: [art] Populate DV Done
25,976,733 UART: [fht] FMC Alias Private Key: 7
25,978,422 UART: [art] Derive CDI
25,979,230 UART: [art] Store in slot 0x4
26,021,708 UART: [art] Derive Key Pair
26,022,703 UART: [art] Store priv key in slot 0x5
29,264,598 UART: [art] Derive Key Pair - Done
29,277,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,183 UART: [art] PUB.X = 3DF1C34D56ED129033F6B51F10ADEED33B161F05F5C9DEDD761154A1DA5F69D905DC05EE7659E856CC41797F41ACA7BE
31,566,496 UART: [art] PUB.Y = 1C6033775B448689891537B749B5020C2B1D4169402BB4ED64D4D75BCF985588444D6657AC94A02A65C6A15B7C72F176
31,573,729 UART: [art] SIG.R = 1B3C090BB805ADE7CA0488E3C161209ABBF44B935D7B4152C0A5F8A1DC8D192F46566DA232F750AE307ABE6648A85E9B
31,581,103 UART: [art] SIG.S = 6CD3620E76D0A48CBAE9BDE7E9094F6439A4F8B59C3F3B30DA6D778DF539378BAE894D70D93E27229B1F74551100A683
32,886,080 UART: Caliptra RT
32,886,799 UART: [state] CFI Enabled
33,019,273 UART: [rt] RT listening for mailbox commands...
33,051,128 UART: [rt]cmd =0x50435251, len=36
34,206,871 >>> mbox cmd response data (1848 bytes)
34,215,786 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,246,220 UART: [rt]cmd =0x50435245, len=56
34,249,552 >>> mbox cmd response data (8 bytes)
34,250,212 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,280,324 UART: [rt]cmd =0x50435251, len=36
35,435,811 >>> mbox cmd response data (1848 bytes)
35,445,792 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,476,126 UART: [rt]cmd =0x50435245, len=56
35,479,099 >>> mbox cmd response data (8 bytes)
35,479,741 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,509,623 UART: [rt]cmd =0x50435251, len=36
36,665,115 >>> mbox cmd response data (1848 bytes)
36,674,221 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,704,507 UART: [rt]cmd =0x50435245, len=56
36,707,637 >>> mbox cmd response data (8 bytes)
36,708,197 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,738,447 UART: [rt]cmd =0x50435251, len=36
37,893,688 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,130,566 ready_for_fw is high
4,131,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,468 >>> mbox cmd response: success
18,158,898 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
23,800,669 UART:
23,801,072 UART: Running Caliptra FMC ...
23,802,217 UART:
23,802,372 UART: [state] CFI Enabled
23,810,006 UART: [fht] FMC Alias Private Key: 7
26,150,030 UART: [art] Extend RT PCRs Done
26,151,263 UART: [art] Lock RT PCRs Done
26,152,675 UART: [art] Populate DV Done
26,158,213 UART: [fht] FMC Alias Private Key: 7
26,159,857 UART: [art] Derive CDI
26,160,672 UART: [art] Store in slot 0x4
26,203,283 UART: [art] Derive Key Pair
26,204,326 UART: [art] Store priv key in slot 0x5
29,446,377 UART: [art] Derive Key Pair - Done
29,459,320 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,739,255 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,765 UART: [art] PUB.X = 8274F06D19EC9B1559AB229842A1D856AEAF6EB49CB89D4C498363372A66AD5413955BEF1157D94BD5B485737B0CA954
31,748,070 UART: [art] PUB.Y = 083EB9789CC9B7ACAFF67BACF963EDB03BE219E22A519E0E0DB6F23B1AE822DAFE5B83FBEA49C1168CA5B673B8CBAA17
31,755,366 UART: [art] SIG.R = D07D4E358AA214CCF36FDA2D62772EB5F9965ED5CB4B0A5BD79100D9A5253ADDE999D7A55ECD9BB7055D7E4829FCE4A5
31,762,753 UART: [art] SIG.S = EEC5E3F69E731DD695191D1343EE06EA63B58978C4D6F3F5E96E31657F53011F9BDA1E615804AFCBB519034FC2966518
33,067,466 UART: Caliptra RT
33,068,216 UART: [state] CFI Enabled
33,201,972 UART: [rt] RT listening for mailbox commands...
33,233,181 UART: [rt]cmd =0x50435251, len=36
34,388,993 >>> mbox cmd response data (1848 bytes)
34,397,870 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,428,289 UART: [rt]cmd =0x50435245, len=56
34,431,466 >>> mbox cmd response data (8 bytes)
34,432,282 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,462,283 UART: [rt]cmd =0x50435251, len=36
35,617,654 >>> mbox cmd response data (1848 bytes)
35,627,587 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,657,653 UART: [rt]cmd =0x50435245, len=56
35,660,616 >>> mbox cmd response data (8 bytes)
35,661,373 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
35,691,581 UART: [rt]cmd =0x50435251, len=36
36,847,270 >>> mbox cmd response data (1848 bytes)
36,856,202 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
36,886,315 UART: [rt]cmd =0x50435245, len=56
36,889,072 >>> mbox cmd response data (8 bytes)
36,889,641 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
36,919,562 UART: [rt]cmd =0x50435251, len=36
38,075,094 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
191,967 UART:
192,326 UART: Running Caliptra ROM ...
193,404 UART:
193,565 UART: [state] CFI Enabled
264,242 UART: [state] LifecycleState = Unprovisioned
266,161 UART: [state] DebugLocked = No
268,393 UART: [state] WD Timer not started. Device not locked for debugging
272,356 UART: [kat] SHA2-256
452,012 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,818 UART: [kat] ++
463,291 UART: [kat] sha1
474,161 UART: [kat] SHA2-256
476,817 UART: [kat] SHA2-384
483,227 UART: [kat] SHA2-512-ACC
485,584 UART: [kat] ECC-384
2,950,587 UART: [kat] HMAC-384Kdf
2,972,376 UART: [kat] LMS
3,448,885 UART: [kat] --
3,452,334 UART: [cold-reset] ++
3,453,647 UART: [fht] FHT @ 0x50003400
3,465,164 UART: [idev] ++
3,465,764 UART: [idev] CDI.KEYID = 6
3,466,652 UART: [idev] SUBJECT.KEYID = 7
3,467,897 UART: [idev] UDS.KEYID = 0
3,468,867 ready_for_fw is high
3,469,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,058 UART: [idev] Erasing UDS.KEYID = 0
5,988,423 UART: [idev] Sha1 KeyId Algorithm
6,010,998 UART: [idev] --
6,016,779 UART: [ldev] ++
6,017,347 UART: [ldev] CDI.KEYID = 6
6,018,275 UART: [ldev] SUBJECT.KEYID = 5
6,019,484 UART: [ldev] AUTHORITY.KEYID = 7
6,020,712 UART: [ldev] FE.KEYID = 1
6,058,200 UART: [ldev] Erasing FE.KEYID = 1
8,567,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,186 UART: [ldev] --
10,372,074 UART: [fwproc] Wait for Commands...
10,374,490 UART: [fwproc] Recv command 0x46574c44
10,376,524 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,212 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,305 >>> mbox cmd response: success
14,351,504 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,355,204 UART: [afmc] ++
14,355,781 UART: [afmc] CDI.KEYID = 6
14,356,769 UART: [afmc] SUBJECT.KEYID = 7
14,357,931 UART: [afmc] AUTHORITY.KEYID = 5
16,888,849 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,632,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,634,910 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,650,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,666,763 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,682,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,708,419 UART: [afmc] --
18,711,302 UART: [cold-reset] --
18,715,428 UART: [state] Locking Datavault
18,721,268 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,020 UART: [state] Locking ICCM
18,724,580 UART: [exit] Launching FMC @ 0x40000130
18,732,969 UART:
18,733,201 UART: Running Caliptra FMC ...
18,734,329 UART:
18,734,494 UART: [state] CFI Enabled
18,789,592 UART: [fht] FMC Alias Private Key: 7
20,555,599 UART: [art] Extend RT PCRs Done
20,556,819 UART: [art] Lock RT PCRs Done
20,558,499 UART: [art] Populate DV Done
20,564,016 UART: [fht] FMC Alias Private Key: 7
20,565,658 UART: [art] Derive CDI
20,566,468 UART: [art] Store in slot 0x4
20,622,014 UART: [art] Derive Key Pair
20,623,058 UART: [art] Store priv key in slot 0x5
23,085,761 UART: [art] Derive Key Pair - Done
23,098,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,811,606 UART: [art] Erasing AUTHORITY.KEYID = 7
24,813,128 UART: [art] PUB.X = 74156181265C16CADE964B240C6C72824326F0F424C8A9217AE0E47837A55AEDE951FB48CAAEF7AA2A3534BFB7820971
24,820,386 UART: [art] PUB.Y = E90352EB610C8B3A1DEB670022F0675005D9F9F711577589AC6138CDA8D21FAECDC95DCADF95F7EA971194BBBC4F9DF2
24,827,697 UART: [art] SIG.R = 6E83590D0524B7830695EB70E204ADD0C5BD3731A067D35A9B17DF53F4A02B8A18F7387746CEA8443C02D30E0A8B9B16
24,835,044 UART: [art] SIG.S = 352CF9477BBC507B44B4394DFBFA9EDA03D7EB3FC10D29A40F43CD472C6F72A0FC301CDA8D71A0A8DB70C4638816D2D6
25,813,981 UART: Caliptra RT
25,814,683 UART: [state] CFI Enabled
25,994,686 UART: [rt] RT listening for mailbox commands...
26,026,551 UART: [rt]cmd =0x50435251, len=36
26,938,961 >>> mbox cmd response data (1848 bytes)
26,947,905 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,978,019 UART: [rt]cmd =0x50435245, len=56
26,981,253 >>> mbox cmd response data (8 bytes)
26,982,167 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,012,054 UART: [rt]cmd =0x50435251, len=36
27,920,210 >>> mbox cmd response data (1848 bytes)
27,930,175 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,960,476 UART: [rt]cmd =0x50435245, len=56
27,963,605 >>> mbox cmd response data (8 bytes)
27,964,350 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,994,393 UART: [rt]cmd =0x50435251, len=36
28,923,123 >>> mbox cmd response data (1848 bytes)
28,932,047 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,962,604 UART: [rt]cmd =0x50435245, len=56
28,965,516 >>> mbox cmd response data (8 bytes)
28,966,077 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,996,047 UART: [rt]cmd =0x50435251, len=36
29,903,811 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,456,309 ready_for_fw is high
3,456,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,053 >>> mbox cmd response: success
14,223,591 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,522,242 UART:
18,522,968 UART: Running Caliptra FMC ...
18,524,094 UART:
18,524,269 UART: [state] CFI Enabled
18,587,804 UART: [fht] FMC Alias Private Key: 7
20,354,531 UART: [art] Extend RT PCRs Done
20,355,764 UART: [art] Lock RT PCRs Done
20,357,132 UART: [art] Populate DV Done
20,362,558 UART: [fht] FMC Alias Private Key: 7
20,364,146 UART: [art] Derive CDI
20,364,899 UART: [art] Store in slot 0x4
20,420,251 UART: [art] Derive Key Pair
20,421,295 UART: [art] Store priv key in slot 0x5
22,883,633 UART: [art] Derive Key Pair - Done
22,896,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,609,625 UART: [art] Erasing AUTHORITY.KEYID = 7
24,611,148 UART: [art] PUB.X = 8DABF72CB9601188554CBA7EB16279C3AA5761248E04A33ABE004F9D87615D7E84FDBD4C9B033C6B09949493A675535D
24,618,376 UART: [art] PUB.Y = E5CB5108655103328737FA68CAD400B63F959961A1E96F99FB0A0564F378EF00BA322039F1DC41E2C5F0BE52B49F8C7F
24,625,580 UART: [art] SIG.R = B3F3F7AA3E79E643D3153EE066D92B239F637383DC5919ADB5A1E02B8DD09F86B1D715115E1E50568C562D4983B9C327
24,632,979 UART: [art] SIG.S = D0A41D725E46D744CE92C370B5B2E6228E54FF5A4EA98717A7E4016864FFA875527150CBA05C2EA58A83B3BDDB777179
25,611,916 UART: Caliptra RT
25,612,634 UART: [state] CFI Enabled
25,791,709 UART: [rt] RT listening for mailbox commands...
25,823,179 UART: [rt]cmd =0x50435251, len=36
26,736,095 >>> mbox cmd response data (1848 bytes)
26,745,092 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,775,443 UART: [rt]cmd =0x50435245, len=56
26,778,511 >>> mbox cmd response data (8 bytes)
26,779,426 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,809,619 UART: [rt]cmd =0x50435251, len=36
27,738,029 >>> mbox cmd response data (1848 bytes)
27,747,979 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,778,405 UART: [rt]cmd =0x50435245, len=56
27,781,431 >>> mbox cmd response data (8 bytes)
27,782,106 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,811,986 UART: [rt]cmd =0x50435251, len=36
28,740,331 >>> mbox cmd response data (1848 bytes)
28,749,323 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,779,441 UART: [rt]cmd =0x50435245, len=56
28,782,139 >>> mbox cmd response data (8 bytes)
28,782,702 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,812,654 UART: [rt]cmd =0x50435251, len=36
29,720,860 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,468 UART:
192,832 UART: Running Caliptra ROM ...
194,026 UART:
603,800 UART: [state] CFI Enabled
617,208 UART: [state] LifecycleState = Unprovisioned
619,155 UART: [state] DebugLocked = No
621,399 UART: [state] WD Timer not started. Device not locked for debugging
624,937 UART: [kat] SHA2-256
804,615 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,426 UART: [kat] ++
815,875 UART: [kat] sha1
826,906 UART: [kat] SHA2-256
829,597 UART: [kat] SHA2-384
836,166 UART: [kat] SHA2-512-ACC
838,543 UART: [kat] ECC-384
3,278,221 UART: [kat] HMAC-384Kdf
3,290,736 UART: [kat] LMS
3,767,257 UART: [kat] --
3,772,385 UART: [cold-reset] ++
3,773,845 UART: [fht] FHT @ 0x50003400
3,784,700 UART: [idev] ++
3,785,303 UART: [idev] CDI.KEYID = 6
3,786,221 UART: [idev] SUBJECT.KEYID = 7
3,787,470 UART: [idev] UDS.KEYID = 0
3,788,396 ready_for_fw is high
3,788,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,371 UART: [idev] Erasing UDS.KEYID = 0
6,264,866 UART: [idev] Sha1 KeyId Algorithm
6,287,713 UART: [idev] --
6,293,600 UART: [ldev] ++
6,294,174 UART: [ldev] CDI.KEYID = 6
6,295,085 UART: [ldev] SUBJECT.KEYID = 5
6,296,304 UART: [ldev] AUTHORITY.KEYID = 7
6,297,536 UART: [ldev] FE.KEYID = 1
6,309,589 UART: [ldev] Erasing FE.KEYID = 1
8,791,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,139 UART: [ldev] --
10,586,658 UART: [fwproc] Wait for Commands...
10,589,513 UART: [fwproc] Recv command 0x46574c44
10,591,497 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,309 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,945 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,948 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,559,379 >>> mbox cmd response: success
14,560,430 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,563,038 UART: [afmc] ++
14,563,622 UART: [afmc] CDI.KEYID = 6
14,564,662 UART: [afmc] SUBJECT.KEYID = 7
14,565,822 UART: [afmc] AUTHORITY.KEYID = 5
17,068,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,080 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,975 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,577 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,895 UART: [afmc] --
18,868,843 UART: [cold-reset] --
18,872,111 UART: [state] Locking Datavault
18,877,093 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,851 UART: [state] Locking ICCM
18,880,518 UART: [exit] Launching FMC @ 0x40000130
18,888,912 UART:
18,889,151 UART: Running Caliptra FMC ...
18,890,275 UART:
18,890,438 UART: [state] CFI Enabled
18,898,218 UART: [fht] FMC Alias Private Key: 7
20,663,436 UART: [art] Extend RT PCRs Done
20,664,659 UART: [art] Lock RT PCRs Done
20,666,584 UART: [art] Populate DV Done
20,671,947 UART: [fht] FMC Alias Private Key: 7
20,673,699 UART: [art] Derive CDI
20,674,524 UART: [art] Store in slot 0x4
20,717,013 UART: [art] Derive Key Pair
20,718,019 UART: [art] Store priv key in slot 0x5
23,144,683 UART: [art] Derive Key Pair - Done
23,157,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,863,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,818 UART: [art] PUB.X = 50245AD223491EB0438B18A899BB0A56C2433600051D1BF1923BE0B509EE9E80E9A5F6011B5848F0907079E54FE18B07
24,872,067 UART: [art] PUB.Y = 443D6A78ACE9F1DFB50699C2E01DCA40440835499D3E3AC3F1F088710FEF2778E14CF8347E6FF1DA28AE109ADDAB6265
24,879,319 UART: [art] SIG.R = E48C86E27024D2C8EA132C65F6F10B1AAC452DC19E8E895491F30B9205EA70BAC82943BFE188C6D775CFDBE7585B2188
24,886,713 UART: [art] SIG.S = CED77352EBE5C3E7EB58649B9E79AD26EFA68A2BA776BCB8AC763CD631F23B50A24DDA1C07DDD2CADD4F449219337305
25,865,606 UART: Caliptra RT
25,866,315 UART: [state] CFI Enabled
25,999,038 UART: [rt] RT listening for mailbox commands...
26,030,447 UART: [rt]cmd =0x50435251, len=36
26,938,308 >>> mbox cmd response data (1848 bytes)
26,947,178 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,977,450 UART: [rt]cmd =0x50435245, len=56
26,980,648 >>> mbox cmd response data (8 bytes)
26,981,458 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,011,546 UART: [rt]cmd =0x50435251, len=36
27,919,676 >>> mbox cmd response data (1848 bytes)
27,929,643 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,960,086 UART: [rt]cmd =0x50435245, len=56
27,963,047 >>> mbox cmd response data (8 bytes)
27,963,704 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,993,996 UART: [rt]cmd =0x50435251, len=36
28,901,909 >>> mbox cmd response data (1848 bytes)
28,910,797 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,941,176 UART: [rt]cmd =0x50435245, len=56
28,944,313 >>> mbox cmd response data (8 bytes)
28,944,873 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,975,072 UART: [rt]cmd =0x50435251, len=36
29,882,824 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,777,166 ready_for_fw is high
3,777,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,435,847 >>> mbox cmd response: success
14,437,311 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
18,689,307 UART:
18,689,689 UART: Running Caliptra FMC ...
18,690,891 UART:
18,691,060 UART: [state] CFI Enabled
18,698,901 UART: [fht] FMC Alias Private Key: 7
20,464,543 UART: [art] Extend RT PCRs Done
20,465,765 UART: [art] Lock RT PCRs Done
20,467,182 UART: [art] Populate DV Done
20,472,491 UART: [fht] FMC Alias Private Key: 7
20,474,135 UART: [art] Derive CDI
20,474,953 UART: [art] Store in slot 0x4
20,518,007 UART: [art] Derive Key Pair
20,519,056 UART: [art] Store priv key in slot 0x5
22,945,776 UART: [art] Derive Key Pair - Done
22,958,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,337 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,841 UART: [art] PUB.X = 56D6498A954F102A9CB4C09E766321326A3A6109B814469896666C9A681E69FAEE937EA86B339CF4B22F1D8114CB22C2
24,674,239 UART: [art] PUB.Y = FB3B3932867C0B04AFAFB8D8FECFD17D628A90B92D3A0E971880BAF3B54DE1AF69A27F54DB3D9D208D26DB9887BD12D0
24,681,414 UART: [art] SIG.R = 3692FFD1B59B18A3E5BFC3CB02E56FFF6DC020994C09770D276F1793C85FB9BDCA33D0137279519C3E85B3F89B414D8E
24,688,762 UART: [art] SIG.S = B7094580EF9D522AAF854B4621175C6F2EDD77411B4E920F87ACEF9316FB4F293888992C1310F6962F79831BF9D24EE4
25,667,574 UART: Caliptra RT
25,668,272 UART: [state] CFI Enabled
25,801,877 UART: [rt] RT listening for mailbox commands...
25,833,603 UART: [rt]cmd =0x50435251, len=36
26,742,011 >>> mbox cmd response data (1848 bytes)
26,750,899 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,781,080 UART: [rt]cmd =0x50435245, len=56
26,784,366 >>> mbox cmd response data (8 bytes)
26,785,186 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,815,113 UART: [rt]cmd =0x50435251, len=36
27,722,716 >>> mbox cmd response data (1848 bytes)
27,732,628 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,762,975 UART: [rt]cmd =0x50435245, len=56
27,766,333 >>> mbox cmd response data (8 bytes)
27,767,027 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,797,042 UART: [rt]cmd =0x50435251, len=36
28,704,924 >>> mbox cmd response data (1848 bytes)
28,713,836 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,744,215 UART: [rt]cmd =0x50435245, len=56
28,747,179 >>> mbox cmd response data (8 bytes)
28,747,755 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,778,037 UART: [rt]cmd =0x50435251, len=36
29,685,864 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,146 UART:
192,503 UART: Running Caliptra ROM ...
193,680 UART:
193,830 UART: [state] CFI Enabled
265,160 UART: [state] LifecycleState = Unprovisioned
267,572 UART: [state] DebugLocked = No
268,962 UART: [state] WD Timer not started. Device not locked for debugging
273,914 UART: [kat] SHA2-256
463,792 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,611 UART: [kat] ++
475,076 UART: [kat] sha1
486,194 UART: [kat] SHA2-256
489,244 UART: [kat] SHA2-384
494,316 UART: [kat] SHA2-512-ACC
496,904 UART: [kat] ECC-384
2,947,706 UART: [kat] HMAC-384Kdf
2,970,920 UART: [kat] LMS
3,502,689 UART: [kat] --
3,507,560 UART: [cold-reset] ++
3,509,351 UART: [fht] FHT @ 0x50003400
3,521,197 UART: [idev] ++
3,521,946 UART: [idev] CDI.KEYID = 6
3,522,828 UART: [idev] SUBJECT.KEYID = 7
3,524,071 UART: [idev] UDS.KEYID = 0
3,524,973 ready_for_fw is high
3,525,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,133 UART: [idev] Erasing UDS.KEYID = 0
6,032,098 UART: [idev] Sha1 KeyId Algorithm
6,055,917 UART: [idev] --
6,060,232 UART: [ldev] ++
6,060,965 UART: [ldev] CDI.KEYID = 6
6,061,879 UART: [ldev] SUBJECT.KEYID = 5
6,063,036 UART: [ldev] AUTHORITY.KEYID = 7
6,064,272 UART: [ldev] FE.KEYID = 1
6,100,415 UART: [ldev] Erasing FE.KEYID = 1
8,604,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,622 UART: [ldev] --
10,414,008 UART: [fwproc] Wait for Commands...
10,416,026 UART: [fwproc] Recv command 0x46574c44
10,418,336 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,949 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,247 >>> mbox cmd response: success
14,679,268 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,681,911 UART: [afmc] ++
14,682,605 UART: [afmc] CDI.KEYID = 6
14,683,791 UART: [afmc] SUBJECT.KEYID = 7
14,685,273 UART: [afmc] AUTHORITY.KEYID = 5
17,216,794 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,417 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,355 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,449 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,614 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,530 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,750 UART: [afmc] --
19,034,045 UART: [cold-reset] --
19,038,205 UART: [state] Locking Datavault
19,042,748 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,947 UART: [state] Locking ICCM
19,047,584 UART: [exit] Launching FMC @ 0x40000130
19,056,249 UART:
19,056,495 UART: Running Caliptra FMC ...
19,057,597 UART:
19,057,760 UART: [state] CFI Enabled
19,115,975 UART: [fht] FMC Alias Private Key: 7
20,882,188 UART: [art] Extend RT PCRs Done
20,883,411 UART: [art] Lock RT PCRs Done
20,885,062 UART: [art] Populate DV Done
20,890,740 UART: [fht] FMC Alias Private Key: 7
20,892,295 UART: [art] Derive CDI
20,893,109 UART: [art] Store in slot 0x4
20,948,342 UART: [art] Derive Key Pair
20,949,340 UART: [art] Store priv key in slot 0x5
23,412,106 UART: [art] Derive Key Pair - Done
23,425,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,129 UART: [art] PUB.X = 593394D8360883E79D005B0A0D012FAC1B7CA7154AE31A41AC9418A3663001791344FB1F28951430962577E17F473FA5
25,146,324 UART: [art] PUB.Y = F59C6CE880F59E47B88B13E29D7F15D6E765AA32DE7B742F9AF65DD850B18E07D4AF5003E0B1432B948F6BC537F2C3C9
25,153,601 UART: [art] SIG.R = 775BC45D9DAA7BF4A1A95E13B61D506211FED35EDB2832954CC32EA724D5E86932D0996417EF959B86B5BCB06B8E5DE7
25,160,992 UART: [art] SIG.S = 4D3829F12D6835DD5C210CDFB9C9FE6E5C7D05AA52C5E0E038925C6D39D53F308E8F1BCD86836481EF1F9C89CAD0DBB0
26,140,018 UART: Caliptra RT
26,140,731 UART: [state] CFI Enabled
26,321,016 UART: [rt] RT listening for mailbox commands...
26,352,817 UART: [rt]cmd =0x50435251, len=36
27,265,691 >>> mbox cmd response data (1848 bytes)
27,274,663 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,304,823 UART: [rt]cmd =0x50435245, len=56
27,307,924 >>> mbox cmd response data (8 bytes)
27,308,827 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,339,051 UART: [rt]cmd =0x50435251, len=36
28,267,536 >>> mbox cmd response data (1848 bytes)
28,277,540 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,307,619 UART: [rt]cmd =0x50435245, len=56
28,310,916 >>> mbox cmd response data (8 bytes)
28,311,609 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,341,790 UART: [rt]cmd =0x50435251, len=36
29,270,108 >>> mbox cmd response data (1848 bytes)
29,279,160 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,309,550 UART: [rt]cmd =0x50435245, len=56
29,312,404 >>> mbox cmd response data (8 bytes)
29,312,889 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,342,729 UART: [rt]cmd =0x50435251, len=36
30,251,652 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,853 writing to cptra_bootfsm_go
3,439,161 ready_for_fw is high
3,439,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,989 >>> mbox cmd response: success
14,824,423 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,115,324 UART:
19,115,722 UART: Running Caliptra FMC ...
19,116,831 UART:
19,116,983 UART: [state] CFI Enabled
19,182,453 UART: [fht] FMC Alias Private Key: 7
20,948,341 UART: [art] Extend RT PCRs Done
20,949,568 UART: [art] Lock RT PCRs Done
20,951,102 UART: [art] Populate DV Done
20,956,528 UART: [fht] FMC Alias Private Key: 7
20,958,224 UART: [art] Derive CDI
20,958,961 UART: [art] Store in slot 0x4
21,015,708 UART: [art] Derive Key Pair
21,016,754 UART: [art] Store priv key in slot 0x5
23,479,217 UART: [art] Derive Key Pair - Done
23,492,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,424 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,928 UART: [art] PUB.X = 5E0964E993E4C6F2A740193511DE5773785A304DF8A5EC9D92823154D8A3E546BDB1E42F3263C3E41526E966D5FADD98
25,213,169 UART: [art] PUB.Y = A0E26F0BEACB37FA87284BF71FF2CAFB51D1F326C7536F2235A6201B7CE571BFB7185F104463439C43A5F28A1D114C10
25,220,474 UART: [art] SIG.R = DD9D5F1C5F9A505FE711328793DB4DEF57F13B3BF75A70D72B547DD9C08C60B7ACD2CD4709601B5EECC8B60A56B9C8A2
25,227,862 UART: [art] SIG.S = 258E9FD89859CEE9F81D831D9E1D914897F8E5E82D33984E847A5FADF7AC9E60B1A5BE1D81E3EFFF6CB904180009584D
26,207,157 UART: Caliptra RT
26,207,866 UART: [state] CFI Enabled
26,387,923 UART: [rt] RT listening for mailbox commands...
26,419,607 UART: [rt]cmd =0x50435251, len=36
27,331,772 >>> mbox cmd response data (1848 bytes)
27,340,671 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,370,788 UART: [rt]cmd =0x50435245, len=56
27,373,914 >>> mbox cmd response data (8 bytes)
27,374,711 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,404,870 UART: [rt]cmd =0x50435251, len=36
28,333,705 >>> mbox cmd response data (1848 bytes)
28,343,779 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,374,219 UART: [rt]cmd =0x50435245, len=56
28,377,274 >>> mbox cmd response data (8 bytes)
28,378,005 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,408,274 UART: [rt]cmd =0x50435251, len=36
29,337,177 >>> mbox cmd response data (1848 bytes)
29,346,061 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,376,388 UART: [rt]cmd =0x50435245, len=56
29,379,402 >>> mbox cmd response data (8 bytes)
29,379,957 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,410,008 UART: [rt]cmd =0x50435251, len=36
30,318,566 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,509 UART:
192,881 UART: Running Caliptra ROM ...
194,012 UART:
603,748 UART: [state] CFI Enabled
619,340 UART: [state] LifecycleState = Unprovisioned
621,724 UART: [state] DebugLocked = No
623,957 UART: [state] WD Timer not started. Device not locked for debugging
628,220 UART: [kat] SHA2-256
818,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,897 UART: [kat] ++
829,365 UART: [kat] sha1
840,243 UART: [kat] SHA2-256
843,254 UART: [kat] SHA2-384
850,031 UART: [kat] SHA2-512-ACC
852,630 UART: [kat] ECC-384
3,296,621 UART: [kat] HMAC-384Kdf
3,309,640 UART: [kat] LMS
3,841,424 UART: [kat] --
3,843,995 UART: [cold-reset] ++
3,845,640 UART: [fht] FHT @ 0x50003400
3,857,208 UART: [idev] ++
3,857,955 UART: [idev] CDI.KEYID = 6
3,858,844 UART: [idev] SUBJECT.KEYID = 7
3,860,090 UART: [idev] UDS.KEYID = 0
3,861,002 ready_for_fw is high
3,861,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,101 UART: [idev] Erasing UDS.KEYID = 0
6,337,836 UART: [idev] Sha1 KeyId Algorithm
6,359,440 UART: [idev] --
6,364,402 UART: [ldev] ++
6,365,090 UART: [ldev] CDI.KEYID = 6
6,366,011 UART: [ldev] SUBJECT.KEYID = 5
6,367,176 UART: [ldev] AUTHORITY.KEYID = 7
6,368,409 UART: [ldev] FE.KEYID = 1
6,379,273 UART: [ldev] Erasing FE.KEYID = 1
8,859,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,582 UART: [ldev] --
10,650,208 UART: [fwproc] Wait for Commands...
10,652,258 UART: [fwproc] Recv command 0x46574c44
10,654,525 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,624 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,245 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,333 >>> mbox cmd response: success
14,909,902 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
14,913,382 UART: [afmc] ++
14,914,087 UART: [afmc] CDI.KEYID = 6
14,915,335 UART: [afmc] SUBJECT.KEYID = 7
14,916,774 UART: [afmc] AUTHORITY.KEYID = 5
17,424,928 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,613 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,535 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,144 UART: [afmc] --
19,223,082 UART: [cold-reset] --
19,227,769 UART: [state] Locking Datavault
19,233,781 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,926 UART: [state] Locking ICCM
19,237,864 UART: [exit] Launching FMC @ 0x40000130
19,246,550 UART:
19,246,790 UART: Running Caliptra FMC ...
19,247,894 UART:
19,248,060 UART: [state] CFI Enabled
19,255,902 UART: [fht] FMC Alias Private Key: 7
21,021,939 UART: [art] Extend RT PCRs Done
21,023,165 UART: [art] Lock RT PCRs Done
21,024,904 UART: [art] Populate DV Done
21,030,646 UART: [fht] FMC Alias Private Key: 7
21,032,264 UART: [art] Derive CDI
21,033,091 UART: [art] Store in slot 0x4
21,075,543 UART: [art] Derive Key Pair
21,076,584 UART: [art] Store priv key in slot 0x5
23,502,793 UART: [art] Derive Key Pair - Done
23,515,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,618 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,127 UART: [art] PUB.X = 1AD9CF9558EC9F84C32C4E769A8B6742979F0960BF2BBEB8189D3A6EB7C45074F0B8D14AC568FA2D9B4A1C6CD498FD4E
25,230,454 UART: [art] PUB.Y = 7DA75BB309294CE16FCF163E169577508DC34037D7BAA8F51C4C687B132109C6228E4ED5DF5BFE0A05C183F0DEDAFBBF
25,237,713 UART: [art] SIG.R = A426B00B0B90F7C3E0D63C9CE8C9110CCE5F84799F77D478CA605C81ACEE9EF6D5969F66E82D7709FCE0391C9D2DC4B9
25,245,129 UART: [art] SIG.S = ECB1DF833141FAE059825308794995B199D3ECDB55A9C9D9D08D0791CDD43B60FE16248A3BB994C73A70B44DAB54B018
26,224,092 UART: Caliptra RT
26,224,789 UART: [state] CFI Enabled
26,358,420 UART: [rt] RT listening for mailbox commands...
26,389,993 UART: [rt]cmd =0x50435251, len=36
27,297,733 >>> mbox cmd response data (1848 bytes)
27,306,657 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,337,245 UART: [rt]cmd =0x50435245, len=56
27,340,320 >>> mbox cmd response data (8 bytes)
27,341,292 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,371,366 UART: [rt]cmd =0x50435251, len=36
28,279,004 >>> mbox cmd response data (1848 bytes)
28,288,990 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,319,350 UART: [rt]cmd =0x50435245, len=56
28,322,384 >>> mbox cmd response data (8 bytes)
28,323,085 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,353,216 UART: [rt]cmd =0x50435251, len=36
29,261,136 >>> mbox cmd response data (1848 bytes)
29,270,021 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,300,356 UART: [rt]cmd =0x50435245, len=56
29,303,322 >>> mbox cmd response data (8 bytes)
29,303,923 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,333,987 UART: [rt]cmd =0x50435251, len=36
30,241,803 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,749,751 ready_for_fw is high
3,750,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,045,006 >>> mbox cmd response: success
15,045,881 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
19,294,303 UART:
19,294,683 UART: Running Caliptra FMC ...
19,295,893 UART:
19,296,065 UART: [state] CFI Enabled
19,303,803 UART: [fht] FMC Alias Private Key: 7
21,069,886 UART: [art] Extend RT PCRs Done
21,071,115 UART: [art] Lock RT PCRs Done
21,072,530 UART: [art] Populate DV Done
21,078,014 UART: [fht] FMC Alias Private Key: 7
21,079,635 UART: [art] Derive CDI
21,080,462 UART: [art] Store in slot 0x4
21,122,963 UART: [art] Derive Key Pair
21,124,010 UART: [art] Store priv key in slot 0x5
23,551,295 UART: [art] Derive Key Pair - Done
23,564,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,819 UART: [art] PUB.X = CEDA39B01590087D5E405BD26B3CDF4CC7235CE9650F896239A9BAF7A9DB233DFFB36F49F261AE67BD8F62022A8E7074
25,279,928 UART: [art] PUB.Y = 4E979775F3B0D161143A31A4E4C7571883E5B304DA9E3D068762A45358727C1AA9BF786ED3A51B7B362C6AB7C6CDA7BB
25,287,211 UART: [art] SIG.R = FCA7270861B5932BAADAB201B098A87C517D17A3A929FD00C88F4DF8F1A9B7CD3DF856FBE159571B6C94F11EB7068DA7
25,294,575 UART: [art] SIG.S = B480985165C281FC7B5530066B9D73DE5C8C6821C6B14693E837B796685BFCA5BFC919FDBB17C31FA670344D04F270CC
26,273,239 UART: Caliptra RT
26,273,961 UART: [state] CFI Enabled
26,407,294 UART: [rt] RT listening for mailbox commands...
26,439,041 UART: [rt]cmd =0x50435251, len=36
27,346,664 >>> mbox cmd response data (1848 bytes)
27,355,726 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
27,385,917 UART: [rt]cmd =0x50435245, len=56
27,388,992 >>> mbox cmd response data (8 bytes)
27,389,898 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
27,419,860 UART: [rt]cmd =0x50435251, len=36
28,327,466 >>> mbox cmd response data (1848 bytes)
28,337,458 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
28,367,734 UART: [rt]cmd =0x50435245, len=56
28,370,717 >>> mbox cmd response data (8 bytes)
28,371,445 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
28,401,253 UART: [rt]cmd =0x50435251, len=36
29,309,079 >>> mbox cmd response data (1848 bytes)
29,317,987 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
29,348,147 UART: [rt]cmd =0x50435245, len=56
29,351,005 >>> mbox cmd response data (8 bytes)
29,351,583 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
29,381,703 UART: [rt]cmd =0x50435251, len=36
30,289,417 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,357 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,003 UART: [kat] SHA2-256
881,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,049 UART: [kat] ++
886,201 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,218 UART: [kat] LMS
1,475,414 UART: [kat] --
1,476,277 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,376 UART: [idev] ++
1,479,544 UART: [idev] CDI.KEYID = 6
1,479,904 UART: [idev] SUBJECT.KEYID = 7
1,480,328 UART: [idev] UDS.KEYID = 0
1,480,673 ready_for_fw is high
1,480,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,140 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,104 UART: [idev] --
1,514,097 UART: [ldev] ++
1,514,265 UART: [ldev] CDI.KEYID = 6
1,514,628 UART: [ldev] SUBJECT.KEYID = 5
1,515,054 UART: [ldev] AUTHORITY.KEYID = 7
1,515,517 UART: [ldev] FE.KEYID = 1
1,520,929 UART: [ldev] Erasing FE.KEYID = 1
1,546,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,388 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,532 UART: [fwproc] Received command 0x46574c44
1,587,323 UART: [fwproc] Received Image of size 118548 bytes
2,932,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,441 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,659 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,962 >>> mbox cmd response: success
3,130,962 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,132,122 UART: [afmc] ++
3,132,290 UART: [afmc] CDI.KEYID = 6
3,132,652 UART: [afmc] SUBJECT.KEYID = 7
3,133,077 UART: [afmc] AUTHORITY.KEYID = 5
3,168,474 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,872 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,361 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,244 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,927 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,797 UART: [afmc] --
3,211,727 UART: [cold-reset] --
3,212,419 UART: [state] Locking Datavault
3,213,752 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,356 UART: [state] Locking ICCM
3,214,886 UART: [exit] Launching FMC @ 0x40000130
3,220,216 UART:
3,220,232 UART: Running Caliptra FMC ...
3,220,640 UART:
3,220,694 UART: [state] CFI Enabled
3,231,354 UART: [fht] FMC Alias Private Key: 7
3,351,074 UART: [art] Extend RT PCRs Done
3,351,502 UART: [art] Lock RT PCRs Done
3,353,032 UART: [art] Populate DV Done
3,361,285 UART: [fht] FMC Alias Private Key: 7
3,362,229 UART: [art] Derive CDI
3,362,509 UART: [art] Store in slot 0x4
3,448,225 UART: [art] Derive Key Pair
3,448,585 UART: [art] Store priv key in slot 0x5
3,462,188 UART: [art] Derive Key Pair - Done
3,476,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,095 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,860 UART: [art] PUB.X = 51D3249360461BEE584BFEE902AB158B5585F4F3348961057754CA24B1FA023564199D815BE78E0B2B5A858220114E22
3,499,608 UART: [art] PUB.Y = 44DC2C45EA2CF39BB7BD45E8709FA4C42C40205AEEA15A0666EC8CF32471F5B31FD93F581D6A2AE3045242CEBD465A7F
3,506,570 UART: [art] SIG.R = C0065A48665E6E2B09F89F82252D0AD5FD96179978405EAB30070AAD3964C97E443E421FD125CC9EB175B31C71DF38DA
3,513,329 UART: [art] SIG.S = 5AA37454292D65E65EBE0777602FEF081F1213A0D917F0B59D75E8CD13316AB4C9CC2BB18B4AE7D3D429189AB7E99AE7
3,536,867 UART: Caliptra RT
3,537,118 UART: [state] CFI Enabled
3,658,202 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,582 UART: [rt]cmd =0x50435251, len=36
3,856,048 >>> mbox cmd response data (1848 bytes)
3,856,049 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,964 UART: [rt]cmd =0x50435245, len=56
3,889,395 >>> mbox cmd response data (8 bytes)
3,889,396 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,918,807 UART: [rt]cmd =0x50435251, len=36
4,085,999 >>> mbox cmd response data (1848 bytes)
4,086,000 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,115,723 UART: [rt]cmd =0x50435245, len=56
4,119,028 >>> mbox cmd response data (8 bytes)
4,119,029 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,148,700 UART: [rt]cmd =0x50435251, len=36
4,316,026 >>> mbox cmd response data (1848 bytes)
4,316,027 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,345,782 UART: [rt]cmd =0x50435245, len=56
4,349,353 >>> mbox cmd response data (8 bytes)
4,349,354 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,378,847 UART: [rt]cmd =0x50435251, len=36
4,546,223 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,165 ready_for_fw is high
1,363,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,094 >>> mbox cmd response: success
2,982,094 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,043,301 UART:
3,043,317 UART: Running Caliptra FMC ...
3,043,725 UART:
3,043,779 UART: [state] CFI Enabled
3,054,301 UART: [fht] FMC Alias Private Key: 7
3,172,645 UART: [art] Extend RT PCRs Done
3,173,073 UART: [art] Lock RT PCRs Done
3,174,381 UART: [art] Populate DV Done
3,182,606 UART: [fht] FMC Alias Private Key: 7
3,183,584 UART: [art] Derive CDI
3,183,864 UART: [art] Store in slot 0x4
3,269,358 UART: [art] Derive Key Pair
3,269,718 UART: [art] Store priv key in slot 0x5
3,283,009 UART: [art] Derive Key Pair - Done
3,297,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,084 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,849 UART: [art] PUB.X = A79AE9BEA74A0E1271B7F7DAE63D2903D1459792B3AD698F055ABDBEAB578BC75CDBDED9D101ECB4B2FB60962C33A25A
3,320,633 UART: [art] PUB.Y = B52DD7EC0AFD7444C7F5CB5F76AAB011628B61B7298F27621D9670E72626B4E1C7BB0A5B3DC75BABB696754392F95CEC
3,327,591 UART: [art] SIG.R = D6832CAC0EF6E01767130475791B7015FE3A4772EC78C07918193DAA55759E902EE8B562B355FDC50905FEB8182D6FDA
3,334,351 UART: [art] SIG.S = FC95BCF26426D6444C7015AF5A8D231712EC8A447BE3863B48BB94E7B242E5945B634A78E686F3EEAE2856E2F8DAEEA1
3,358,877 UART: Caliptra RT
3,359,128 UART: [state] CFI Enabled
3,479,823 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,439 UART: [rt]cmd =0x50435251, len=36
3,677,803 >>> mbox cmd response data (1848 bytes)
3,677,804 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,371 UART: [rt]cmd =0x50435245, len=56
3,710,816 >>> mbox cmd response data (8 bytes)
3,710,817 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,740,472 UART: [rt]cmd =0x50435251, len=36
3,908,156 >>> mbox cmd response data (1848 bytes)
3,908,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,714 UART: [rt]cmd =0x50435245, len=56
3,941,407 >>> mbox cmd response data (8 bytes)
3,941,408 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,971,211 UART: [rt]cmd =0x50435251, len=36
4,138,465 >>> mbox cmd response data (1848 bytes)
4,138,466 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,125 UART: [rt]cmd =0x50435245, len=56
4,171,750 >>> mbox cmd response data (8 bytes)
4,171,751 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,201,114 UART: [rt]cmd =0x50435251, len=36
4,368,162 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,911 UART: [state] LifecycleState = Unprovisioned
86,566 UART: [state] DebugLocked = No
87,110 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,684 UART: [kat] SHA2-256
882,615 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,730 UART: [kat] ++
886,882 UART: [kat] sha1
891,240 UART: [kat] SHA2-256
893,178 UART: [kat] SHA2-384
895,787 UART: [kat] SHA2-512-ACC
897,688 UART: [kat] ECC-384
903,193 UART: [kat] HMAC-384Kdf
907,785 UART: [kat] LMS
1,475,981 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,477,082 UART: [fht] Storing FHT @ 0x50003400
1,479,905 UART: [idev] ++
1,480,073 UART: [idev] CDI.KEYID = 6
1,480,433 UART: [idev] SUBJECT.KEYID = 7
1,480,857 UART: [idev] UDS.KEYID = 0
1,481,202 ready_for_fw is high
1,481,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,913 UART: [idev] Erasing UDS.KEYID = 0
1,505,633 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,267 UART: [idev] --
1,515,322 UART: [ldev] ++
1,515,490 UART: [ldev] CDI.KEYID = 6
1,515,853 UART: [ldev] SUBJECT.KEYID = 5
1,516,279 UART: [ldev] AUTHORITY.KEYID = 7
1,516,742 UART: [ldev] FE.KEYID = 1
1,522,120 UART: [ldev] Erasing FE.KEYID = 1
1,547,485 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,613 UART: [ldev] --
1,586,978 UART: [fwproc] Waiting for Commands...
1,587,597 UART: [fwproc] Received command 0x46574c44
1,588,388 UART: [fwproc] Received Image of size 118548 bytes
2,932,734 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,156 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,673 >>> mbox cmd response: success
3,131,673 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,132,883 UART: [afmc] ++
3,133,051 UART: [afmc] CDI.KEYID = 6
3,133,413 UART: [afmc] SUBJECT.KEYID = 7
3,133,838 UART: [afmc] AUTHORITY.KEYID = 5
3,169,711 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,277 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,057 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,766 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,649 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,332 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,984 UART: [afmc] --
3,212,932 UART: [cold-reset] --
3,213,758 UART: [state] Locking Datavault
3,214,895 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,499 UART: [state] Locking ICCM
3,215,993 UART: [exit] Launching FMC @ 0x40000130
3,221,323 UART:
3,221,339 UART: Running Caliptra FMC ...
3,221,747 UART:
3,221,890 UART: [state] CFI Enabled
3,232,620 UART: [fht] FMC Alias Private Key: 7
3,352,202 UART: [art] Extend RT PCRs Done
3,352,630 UART: [art] Lock RT PCRs Done
3,354,110 UART: [art] Populate DV Done
3,362,303 UART: [fht] FMC Alias Private Key: 7
3,363,317 UART: [art] Derive CDI
3,363,597 UART: [art] Store in slot 0x4
3,449,495 UART: [art] Derive Key Pair
3,449,855 UART: [art] Store priv key in slot 0x5
3,463,324 UART: [art] Derive Key Pair - Done
3,478,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,855 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,620 UART: [art] PUB.X = AF28C35BECB02537EA58BF5E2F036BAF9455B491568656376F9D58FFAFB1EF38807F8CDEB914C58477A0627AF167BF85
3,501,399 UART: [art] PUB.Y = AD3823FA598A1ADB6931F9C0F90ECD35B557E782DE3A3B0834A9C305A61B4F30B9BBC6FA330EB1F3C0BD52F0A5C3ADF2
3,508,361 UART: [art] SIG.R = EA7FD7C8B832FDA3744D5C7CDA060F59945574BBA4BFF081FA4C225A1ED875AF6F6CF76D56BD1C33CB1A62FF549200FF
3,515,127 UART: [art] SIG.S = 7C1B9C52EDA3ACAF7D206FA5D1D4E7DFFC044D97E4B731E4981364FB0A3A4C630FBFD826ADC114081E2BF28769998C20
3,539,165 UART: Caliptra RT
3,539,508 UART: [state] CFI Enabled
3,660,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,116 UART: [rt]cmd =0x50435251, len=36
3,858,478 >>> mbox cmd response data (1848 bytes)
3,858,479 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,028 UART: [rt]cmd =0x50435245, len=56
3,891,677 >>> mbox cmd response data (8 bytes)
3,891,678 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,921,501 UART: [rt]cmd =0x50435251, len=36
4,088,797 >>> mbox cmd response data (1848 bytes)
4,088,798 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,118,407 UART: [rt]cmd =0x50435245, len=56
4,121,770 >>> mbox cmd response data (8 bytes)
4,121,771 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,151,226 UART: [rt]cmd =0x50435251, len=36
4,318,672 >>> mbox cmd response data (1848 bytes)
4,318,673 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,348,346 UART: [rt]cmd =0x50435245, len=56
4,351,725 >>> mbox cmd response data (8 bytes)
4,351,726 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,381,049 UART: [rt]cmd =0x50435251, len=36
4,548,245 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,004 ready_for_fw is high
1,363,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,517 >>> mbox cmd response: success
2,981,517 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
3,043,426 UART:
3,043,442 UART: Running Caliptra FMC ...
3,043,850 UART:
3,043,993 UART: [state] CFI Enabled
3,054,849 UART: [fht] FMC Alias Private Key: 7
3,173,631 UART: [art] Extend RT PCRs Done
3,174,059 UART: [art] Lock RT PCRs Done
3,175,639 UART: [art] Populate DV Done
3,183,680 UART: [fht] FMC Alias Private Key: 7
3,184,860 UART: [art] Derive CDI
3,185,140 UART: [art] Store in slot 0x4
3,270,942 UART: [art] Derive Key Pair
3,271,302 UART: [art] Store priv key in slot 0x5
3,284,523 UART: [art] Derive Key Pair - Done
3,299,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,579 UART: [art] PUB.X = D5171686586B660A078042D6C5D3EF3453A93344FD3241D5AA27C302E0F4EDC3FC64E39E8DEB69FF2F0A3906FE5A252F
3,322,342 UART: [art] PUB.Y = A4BD27A9B08E82CCDE7FBAF6FCA9ECA8D1D66D38A2206351962E22A4A76A9118884A2CE91512F7EA67F0D7285AF3A45A
3,329,310 UART: [art] SIG.R = B4328445D48E9163C55A7E200E86E5097C637321879F86329DCFC663BEF4E5F6E7E537DED0DCBD4C47753322770E32C0
3,336,071 UART: [art] SIG.S = 0311CD9589B3B5E967783D559B87A27959FC45FEC9BDD15053493332905A024986ED994018800FA206B38EF4B03C5D18
3,360,537 UART: Caliptra RT
3,360,880 UART: [state] CFI Enabled
3,480,838 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,606 UART: [rt]cmd =0x50435251, len=36
3,679,280 >>> mbox cmd response data (1848 bytes)
3,679,281 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,746 UART: [rt]cmd =0x50435245, len=56
3,712,449 >>> mbox cmd response data (8 bytes)
3,712,450 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,189 UART: [rt]cmd =0x50435251, len=36
3,909,429 >>> mbox cmd response data (1848 bytes)
3,909,430 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,079 UART: [rt]cmd =0x50435245, len=56
3,942,580 >>> mbox cmd response data (8 bytes)
3,942,581 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,972,354 UART: [rt]cmd =0x50435251, len=36
4,139,626 >>> mbox cmd response data (1848 bytes)
4,139,627 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,222 UART: [rt]cmd =0x50435245, len=56
4,172,591 >>> mbox cmd response data (8 bytes)
4,172,592 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,209 UART: [rt]cmd =0x50435251, len=36
4,369,609 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,441 UART: [kat] SHA2-512-ACC
906,342 UART: [kat] ECC-384
915,957 UART: [kat] HMAC-384Kdf
920,555 UART: [kat] LMS
1,168,867 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,169,880 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 ready_for_fw is high
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,871 UART: [idev] Erasing UDS.KEYID = 0
1,199,147 UART: [idev] Sha1 KeyId Algorithm
1,207,883 UART: [idev] --
1,209,132 UART: [ldev] ++
1,209,300 UART: [ldev] CDI.KEYID = 6
1,209,664 UART: [ldev] SUBJECT.KEYID = 5
1,210,091 UART: [ldev] AUTHORITY.KEYID = 7
1,210,554 UART: [ldev] FE.KEYID = 1
1,215,394 UART: [ldev] Erasing FE.KEYID = 1
1,241,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,732 UART: [ldev] --
1,281,067 UART: [fwproc] Wait for Commands...
1,281,650 UART: [fwproc] Recv command 0x46574c44
1,282,383 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,450 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,803 >>> mbox cmd response: success
2,825,803 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,827,007 UART: [afmc] ++
2,827,175 UART: [afmc] CDI.KEYID = 6
2,827,538 UART: [afmc] SUBJECT.KEYID = 7
2,827,964 UART: [afmc] AUTHORITY.KEYID = 5
2,863,795 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,819 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,529 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,738 UART: [afmc] --
2,906,681 UART: [cold-reset] --
2,907,527 UART: [state] Locking Datavault
2,908,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,236 UART: [state] Locking ICCM
2,909,890 UART: [exit] Launching FMC @ 0x40000130
2,915,220 UART:
2,915,236 UART: Running Caliptra FMC ...
2,915,644 UART:
2,915,698 UART: [state] CFI Enabled
2,925,974 UART: [fht] FMC Alias Private Key: 7
3,045,306 UART: [art] Extend RT PCRs Done
3,045,734 UART: [art] Lock RT PCRs Done
3,047,102 UART: [art] Populate DV Done
3,055,501 UART: [fht] FMC Alias Private Key: 7
3,056,473 UART: [art] Derive CDI
3,056,753 UART: [art] Store in slot 0x4
3,142,632 UART: [art] Derive Key Pair
3,142,992 UART: [art] Store priv key in slot 0x5
3,156,168 UART: [art] Derive Key Pair - Done
3,170,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,390 UART: [art] PUB.X = 4338F3179EDCEF5F27FBF3C7875F87E102BFCDCBF9847687C95FC4BBEC83107563ADF9ED66814DE682C8214D93A1EC21
3,194,173 UART: [art] PUB.Y = B5D02F869E302B0017CB4DEDF2E72BC238B06B30F26DA8957D37CD986D6918855065A08EBEAA274F452FCD0D558AF457
3,201,108 UART: [art] SIG.R = 9823A7D61A2B37F01CABF3E91CA90DB97C58C2E991BC3C841CCC8A420E1D8869102770E627092362373DEE326521DBAD
3,207,875 UART: [art] SIG.S = 70C3B492BAC297A24A087E91189B940B8A280790320CE6295DEE308F2877CDC31A4AC9DB63DAAB21FB9BD91CF3A0432C
3,231,693 UART: Caliptra RT
3,231,944 UART: [state] CFI Enabled
3,351,257 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,851 UART: [rt]cmd =0x50435251, len=36
3,549,095 >>> mbox cmd response data (1848 bytes)
3,549,096 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,729 UART: [rt]cmd =0x50435245, len=56
3,582,270 >>> mbox cmd response data (8 bytes)
3,582,271 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,716 UART: [rt]cmd =0x50435251, len=36
3,779,128 >>> mbox cmd response data (1848 bytes)
3,779,129 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,000 UART: [rt]cmd =0x50435245, len=56
3,812,539 >>> mbox cmd response data (8 bytes)
3,812,540 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,201 UART: [rt]cmd =0x50435251, len=36
4,009,605 >>> mbox cmd response data (1848 bytes)
4,009,606 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,039,127 UART: [rt]cmd =0x50435245, len=56
4,042,690 >>> mbox cmd response data (8 bytes)
4,042,691 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,412 UART: [rt]cmd =0x50435251, len=36
4,239,282 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,606 ready_for_fw is high
1,058,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,828 >>> mbox cmd response: success
2,676,828 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,739,213 UART:
2,739,229 UART: Running Caliptra FMC ...
2,739,637 UART:
2,739,691 UART: [state] CFI Enabled
2,750,033 UART: [fht] FMC Alias Private Key: 7
2,869,399 UART: [art] Extend RT PCRs Done
2,869,827 UART: [art] Lock RT PCRs Done
2,871,365 UART: [art] Populate DV Done
2,879,760 UART: [fht] FMC Alias Private Key: 7
2,880,736 UART: [art] Derive CDI
2,881,016 UART: [art] Store in slot 0x4
2,966,953 UART: [art] Derive Key Pair
2,967,313 UART: [art] Store priv key in slot 0x5
2,980,471 UART: [art] Derive Key Pair - Done
2,995,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,520 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,285 UART: [art] PUB.X = 7D903067E52D7378C572AA96A81913375B1B5BB5F0D1E3A88F41BE76FE0EB6BB808D72C6719D9775681E5D32F4667112
3,018,050 UART: [art] PUB.Y = 5FDD3B601DEDC102D321FFA17A8DDF563BB07CE99B28F32B50F0998821ECF3B35C9B6012E85534D1EFDE977C9DB190EC
3,025,017 UART: [art] SIG.R = B3B7345AD4609145951A456D77AA13F9BF7719074303821456AD6A88176B8B7C3AC09D0B701C9A5B3081C17265881E15
3,031,768 UART: [art] SIG.S = 9C4BF07C1AD1DF6961EDFAB1B7B8D09D05B2E13E29698173DEAD79A149DB7D660D65E7720088956EC0FAD3DB7EE02C99
3,055,838 UART: Caliptra RT
3,056,089 UART: [state] CFI Enabled
3,176,597 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,363 UART: [rt]cmd =0x50435251, len=36
3,374,305 >>> mbox cmd response data (1848 bytes)
3,374,306 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,105 UART: [rt]cmd =0x50435245, len=56
3,407,410 >>> mbox cmd response data (8 bytes)
3,407,411 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,818 UART: [rt]cmd =0x50435251, len=36
3,604,100 >>> mbox cmd response data (1848 bytes)
3,604,101 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,894 UART: [rt]cmd =0x50435245, len=56
3,637,675 >>> mbox cmd response data (8 bytes)
3,637,676 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,355 UART: [rt]cmd =0x50435251, len=36
3,834,595 >>> mbox cmd response data (1848 bytes)
3,834,596 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,864,415 UART: [rt]cmd =0x50435245, len=56
3,868,122 >>> mbox cmd response data (8 bytes)
3,868,123 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,606 UART: [rt]cmd =0x50435251, len=36
4,064,938 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,057 UART: [kat] SHA2-256
891,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,711 UART: [kat] ++
895,863 UART: [kat] sha1
900,005 UART: [kat] SHA2-256
901,945 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
916,272 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,170,425 UART: [cold-reset] ++
1,171,005 UART: [fht] FHT @ 0x50003400
1,173,771 UART: [idev] ++
1,173,939 UART: [idev] CDI.KEYID = 6
1,174,300 UART: [idev] SUBJECT.KEYID = 7
1,174,725 UART: [idev] UDS.KEYID = 0
1,175,071 ready_for_fw is high
1,175,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,742 UART: [idev] Erasing UDS.KEYID = 0
1,199,976 UART: [idev] Sha1 KeyId Algorithm
1,209,006 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,217,001 UART: [ldev] Erasing FE.KEYID = 1
1,243,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,251 UART: [ldev] --
1,282,676 UART: [fwproc] Wait for Commands...
1,283,425 UART: [fwproc] Recv command 0x46574c44
1,284,158 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,541 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,834 >>> mbox cmd response: success
2,825,834 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,826,956 UART: [afmc] ++
2,827,124 UART: [afmc] CDI.KEYID = 6
2,827,487 UART: [afmc] SUBJECT.KEYID = 7
2,827,913 UART: [afmc] AUTHORITY.KEYID = 5
2,863,782 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,644 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,525 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,226 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,095 UART: [afmc] --
2,907,124 UART: [cold-reset] --
2,908,056 UART: [state] Locking Datavault
2,909,259 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,863 UART: [state] Locking ICCM
2,910,423 UART: [exit] Launching FMC @ 0x40000130
2,915,753 UART:
2,915,769 UART: Running Caliptra FMC ...
2,916,177 UART:
2,916,320 UART: [state] CFI Enabled
2,926,894 UART: [fht] FMC Alias Private Key: 7
3,046,392 UART: [art] Extend RT PCRs Done
3,046,820 UART: [art] Lock RT PCRs Done
3,048,356 UART: [art] Populate DV Done
3,056,615 UART: [fht] FMC Alias Private Key: 7
3,057,685 UART: [art] Derive CDI
3,057,965 UART: [art] Store in slot 0x4
3,143,344 UART: [art] Derive Key Pair
3,143,704 UART: [art] Store priv key in slot 0x5
3,157,492 UART: [art] Derive Key Pair - Done
3,172,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,755 UART: [art] PUB.X = 1DB660519FFCD03D5BBA9EA70EC057656DC262BC963185F45F34F304B910A0591F701194E336942BF76E14DF8ADDC480
3,195,525 UART: [art] PUB.Y = D458DBBA4B11B4A6625015495BCBCF7D5AD40183A29678F047C3520331B569897DB2BA6DC38BF0C1A79DE485B6732B81
3,202,475 UART: [art] SIG.R = 8B7ED65B5FEA71989FF7BD022196E0BA9A19946DF4F8CAE795DF4C0E5C33EA5373C437CC89ADE5FCEED17ED822B41AE2
3,209,265 UART: [art] SIG.S = AA83D3957FA1CEB455B3984F46E06E40EAFC25F99F0DCD18C13E7A6478B0D0B2C52B3EF4271625F2139EFF2312C7ED20
3,232,640 UART: Caliptra RT
3,232,983 UART: [state] CFI Enabled
3,352,839 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,585 UART: [rt]cmd =0x50435251, len=36
3,551,053 >>> mbox cmd response data (1848 bytes)
3,551,054 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,681 UART: [rt]cmd =0x50435245, len=56
3,584,374 >>> mbox cmd response data (8 bytes)
3,584,375 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,750 UART: [rt]cmd =0x50435251, len=36
3,780,986 >>> mbox cmd response data (1848 bytes)
3,780,987 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,512 UART: [rt]cmd =0x50435245, len=56
3,814,153 >>> mbox cmd response data (8 bytes)
3,814,154 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,883 UART: [rt]cmd =0x50435251, len=36
4,011,191 >>> mbox cmd response data (1848 bytes)
4,011,192 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,059 UART: [rt]cmd =0x50435245, len=56
4,044,546 >>> mbox cmd response data (8 bytes)
4,044,547 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,170 UART: [rt]cmd =0x50435251, len=36
4,241,668 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,031 ready_for_fw is high
1,059,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,385 >>> mbox cmd response: success
2,679,385 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,734 UART:
2,741,750 UART: Running Caliptra FMC ...
2,742,158 UART:
2,742,301 UART: [state] CFI Enabled
2,753,083 UART: [fht] FMC Alias Private Key: 7
2,872,195 UART: [art] Extend RT PCRs Done
2,872,623 UART: [art] Lock RT PCRs Done
2,874,065 UART: [art] Populate DV Done
2,882,530 UART: [fht] FMC Alias Private Key: 7
2,883,692 UART: [art] Derive CDI
2,883,972 UART: [art] Store in slot 0x4
2,969,991 UART: [art] Derive Key Pair
2,970,351 UART: [art] Store priv key in slot 0x5
2,983,737 UART: [art] Derive Key Pair - Done
2,998,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,892 UART: [art] PUB.X = E2BEB8ED31B9A0CD256DC2473C707B1870C22C86A1C5428812AC0C28D03A82AC009AAD42B4AA09D864937A2405A90F51
3,021,636 UART: [art] PUB.Y = 0C38960E27FF2588BA47CFDE617B2D53BAFCF09FF13E00B09686FEE5AD071014FE13A5B0ADB290C118E680888DA7F828
3,028,569 UART: [art] SIG.R = 5B6842D6C87A1589492C9B44350DF80D83279B922B7323CC92B342353FBCF40BFEF7FB38AA95903C17C1992F6FA4F28D
3,035,334 UART: [art] SIG.S = 1EADC95C96A96EE8FAA5038DCE1C3DD74ED481935815DEA2ECCE6B66B897E9DA007C447149D6C06490E77A5872E01D51
3,058,959 UART: Caliptra RT
3,059,302 UART: [state] CFI Enabled
3,179,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,212 UART: [rt]cmd =0x50435251, len=36
3,377,752 >>> mbox cmd response data (1848 bytes)
3,377,753 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,464 UART: [rt]cmd =0x50435245, len=56
3,411,033 >>> mbox cmd response data (8 bytes)
3,411,034 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,440,545 UART: [rt]cmd =0x50435251, len=36
3,607,989 >>> mbox cmd response data (1848 bytes)
3,607,990 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,795 UART: [rt]cmd =0x50435245, len=56
3,641,216 >>> mbox cmd response data (8 bytes)
3,641,217 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,760 UART: [rt]cmd =0x50435251, len=36
3,838,176 >>> mbox cmd response data (1848 bytes)
3,838,177 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,834 UART: [rt]cmd =0x50435245, len=56
3,871,265 >>> mbox cmd response data (8 bytes)
3,871,266 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,743 UART: [rt]cmd =0x50435251, len=36
4,067,901 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,932 UART: [state] LifecycleState = Unprovisioned
85,587 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
892,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,099 UART: [kat] ++
897,251 UART: [kat] sha1
901,629 UART: [kat] SHA2-256
903,569 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
918,090 UART: [kat] HMAC-384Kdf
922,724 UART: [kat] LMS
1,171,052 UART: [kat] --
1,171,791 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,662 UART: [idev] ++
1,174,830 UART: [idev] CDI.KEYID = 6
1,175,190 UART: [idev] SUBJECT.KEYID = 7
1,175,614 UART: [idev] UDS.KEYID = 0
1,175,959 ready_for_fw is high
1,175,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,522 UART: [idev] Erasing UDS.KEYID = 0
1,200,403 UART: [idev] Sha1 KeyId Algorithm
1,208,939 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,744 UART: [ldev] SUBJECT.KEYID = 5
1,211,170 UART: [ldev] AUTHORITY.KEYID = 7
1,211,633 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,243,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,057 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,773 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,377 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,500 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,558 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,867 >>> mbox cmd response: success
2,826,867 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,828,001 UART: [afmc] ++
2,828,169 UART: [afmc] CDI.KEYID = 6
2,828,531 UART: [afmc] SUBJECT.KEYID = 7
2,828,956 UART: [afmc] AUTHORITY.KEYID = 5
2,863,897 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,274 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,614 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,315 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,195 UART: [afmc] --
2,907,281 UART: [cold-reset] --
2,908,099 UART: [state] Locking Datavault
2,909,350 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,954 UART: [state] Locking ICCM
2,910,440 UART: [exit] Launching FMC @ 0x40000130
2,915,770 UART:
2,915,786 UART: Running Caliptra FMC ...
2,916,194 UART:
2,916,248 UART: [state] CFI Enabled
2,926,952 UART: [fht] FMC Alias Private Key: 7
3,045,984 UART: [art] Extend RT PCRs Done
3,046,412 UART: [art] Lock RT PCRs Done
3,047,910 UART: [art] Populate DV Done
3,056,315 UART: [fht] FMC Alias Private Key: 7
3,057,361 UART: [art] Derive CDI
3,057,641 UART: [art] Store in slot 0x4
3,143,512 UART: [art] Derive Key Pair
3,143,872 UART: [art] Store priv key in slot 0x5
3,157,442 UART: [art] Derive Key Pair - Done
3,172,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,355 UART: [art] PUB.X = DBC1481F1994E415D67DC5A6A3FBCC236F47B760E8041AA89543049136B17F34AE486607A39335C82EFC620B2A38A51E
3,195,115 UART: [art] PUB.Y = 1052E752A0D80435208990CFF7C60798972C5197C19A4A991F18CAB0A05324E9F7691293584BEFB76188BB2116AB492D
3,202,051 UART: [art] SIG.R = C2CA6DA8710BA8D8D47B394821BCA18DDEC0D5C2C3E1DFA9D1621FA53E99DAD705CA1B8F67721AC8EC0F9C45AD249614
3,208,836 UART: [art] SIG.S = 03E073E882C17B551C1416D7702E7F6354ACF0E7C66A00C283482D9CE78FB0399593FD8989D20ACDE96FCB3E2C282C14
3,232,598 UART: Caliptra RT
3,232,849 UART: [state] CFI Enabled
3,352,212 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,800 UART: [rt]cmd =0x50435251, len=36
3,550,344 >>> mbox cmd response data (1848 bytes)
3,550,345 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,304 UART: [rt]cmd =0x50435245, len=56
3,583,877 >>> mbox cmd response data (8 bytes)
3,583,878 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,249 UART: [rt]cmd =0x50435251, len=36
3,780,835 >>> mbox cmd response data (1848 bytes)
3,780,836 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,810,559 UART: [rt]cmd =0x50435245, len=56
3,814,326 >>> mbox cmd response data (8 bytes)
3,814,327 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,024 UART: [rt]cmd =0x50435251, len=36
4,011,442 >>> mbox cmd response data (1848 bytes)
4,011,443 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,062 UART: [rt]cmd =0x50435245, len=56
4,044,971 >>> mbox cmd response data (8 bytes)
4,044,972 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,359 UART: [rt]cmd =0x50435251, len=36
4,241,821 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 ready_for_fw is high
1,060,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,954 >>> mbox cmd response: success
2,678,954 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,741,527 UART:
2,741,543 UART: Running Caliptra FMC ...
2,741,951 UART:
2,742,005 UART: [state] CFI Enabled
2,752,669 UART: [fht] FMC Alias Private Key: 7
2,872,237 UART: [art] Extend RT PCRs Done
2,872,665 UART: [art] Lock RT PCRs Done
2,874,153 UART: [art] Populate DV Done
2,882,208 UART: [fht] FMC Alias Private Key: 7
2,883,224 UART: [art] Derive CDI
2,883,504 UART: [art] Store in slot 0x4
2,969,489 UART: [art] Derive Key Pair
2,969,849 UART: [art] Store priv key in slot 0x5
2,983,245 UART: [art] Derive Key Pair - Done
2,997,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,305 UART: [art] PUB.X = 6012E2FE655D8F49CCC81AB3BE35613EAEE19F2607A28A7B1357D838BC620CC32A94C3D0F1805CD805863829C5BA88B4
3,021,074 UART: [art] PUB.Y = FA3F7A53EB0F67F2599CD506603EBE90957DAEA2397CF5BC25F1E71DA0595AD4CC8FC7B79A7A564F8E61E38DA357FAAA
3,028,042 UART: [art] SIG.R = 1C8863335DAD6B568EDBE67C902C00353EF419574CD436826F15D7EC13FAB935CF1653CAB78B077E3CE0730FDE8EB845
3,034,794 UART: [art] SIG.S = 5B71317F1B5FC092400349E8697D108B75711A5FAA0A7E7EC717770C0E35ACDAE3C97E1885E9A0B5E31356820C52CEE7
3,058,537 UART: Caliptra RT
3,058,788 UART: [state] CFI Enabled
3,178,540 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,050 UART: [rt]cmd =0x50435251, len=36
3,376,314 >>> mbox cmd response data (1848 bytes)
3,376,315 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,056 UART: [rt]cmd =0x50435245, len=56
3,409,639 >>> mbox cmd response data (8 bytes)
3,409,640 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,335 UART: [rt]cmd =0x50435251, len=36
3,606,863 >>> mbox cmd response data (1848 bytes)
3,606,864 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,597 UART: [rt]cmd =0x50435245, len=56
3,640,130 >>> mbox cmd response data (8 bytes)
3,640,131 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,669,910 UART: [rt]cmd =0x50435251, len=36
3,837,284 >>> mbox cmd response data (1848 bytes)
3,837,285 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,154 UART: [rt]cmd =0x50435245, len=56
3,870,891 >>> mbox cmd response data (8 bytes)
3,870,892 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,513 UART: [rt]cmd =0x50435251, len=36
4,067,873 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,478 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,924 UART: [kat] SHA2-256
903,864 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,353 UART: [kat] HMAC-384Kdf
923,157 UART: [kat] LMS
1,171,485 UART: [kat] --
1,172,274 UART: [cold-reset] ++
1,172,792 UART: [fht] FHT @ 0x50003400
1,175,463 UART: [idev] ++
1,175,631 UART: [idev] CDI.KEYID = 6
1,175,991 UART: [idev] SUBJECT.KEYID = 7
1,176,415 UART: [idev] UDS.KEYID = 0
1,176,760 ready_for_fw is high
1,176,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,503 UART: [idev] Erasing UDS.KEYID = 0
1,202,074 UART: [idev] Sha1 KeyId Algorithm
1,210,596 UART: [idev] --
1,211,594 UART: [ldev] ++
1,211,762 UART: [ldev] CDI.KEYID = 6
1,212,125 UART: [ldev] SUBJECT.KEYID = 5
1,212,551 UART: [ldev] AUTHORITY.KEYID = 7
1,213,014 UART: [ldev] FE.KEYID = 1
1,218,270 UART: [ldev] Erasing FE.KEYID = 1
1,245,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,166 UART: [ldev] --
1,284,557 UART: [fwproc] Wait for Commands...
1,285,291 UART: [fwproc] Recv command 0x46574c44
1,286,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,755 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,136 >>> mbox cmd response: success
2,829,136 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,830,206 UART: [afmc] ++
2,830,374 UART: [afmc] CDI.KEYID = 6
2,830,736 UART: [afmc] SUBJECT.KEYID = 7
2,831,161 UART: [afmc] AUTHORITY.KEYID = 5
2,866,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,827 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,536 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,120 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,104 UART: [afmc] --
2,910,196 UART: [cold-reset] --
2,910,998 UART: [state] Locking Datavault
2,912,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,743 UART: [state] Locking ICCM
2,913,239 UART: [exit] Launching FMC @ 0x40000130
2,918,569 UART:
2,918,585 UART: Running Caliptra FMC ...
2,918,993 UART:
2,919,136 UART: [state] CFI Enabled
2,929,696 UART: [fht] FMC Alias Private Key: 7
3,048,180 UART: [art] Extend RT PCRs Done
3,048,608 UART: [art] Lock RT PCRs Done
3,049,910 UART: [art] Populate DV Done
3,058,097 UART: [fht] FMC Alias Private Key: 7
3,059,267 UART: [art] Derive CDI
3,059,547 UART: [art] Store in slot 0x4
3,144,918 UART: [art] Derive Key Pair
3,145,278 UART: [art] Store priv key in slot 0x5
3,159,014 UART: [art] Derive Key Pair - Done
3,173,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,554 UART: [art] PUB.X = 7F015A47C9AA00BD87D54237F2EDDE0104C98456CA8EDB8A9A034FA9ACB9AD487BFCC4024EA3AD6AA2E7183DE6A8C619
3,197,311 UART: [art] PUB.Y = B24495638CD6441BB5F50214E8248328B00FB6BA5B14F7E79867B433AF83A1ABB259B000FC08B1EE6E993C3855917225
3,204,228 UART: [art] SIG.R = B8091E80F8DEA01CEC6849002A85C201137A3A28A5640D3F648626CB5C919508C694677AD75585F2DCC6BC17F23151D2
3,210,962 UART: [art] SIG.S = F10EEC35760A7D1FA6937259BE2FF1095253C2FB838C285B89B27760EA1FDAAD0E1CC8766F2C309D5C467531160A45C3
3,234,643 UART: Caliptra RT
3,234,986 UART: [state] CFI Enabled
3,353,266 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,040 UART: [rt]cmd =0x50435251, len=36
3,551,382 >>> mbox cmd response data (1848 bytes)
3,551,383 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,994 UART: [rt]cmd =0x50435245, len=56
3,584,419 >>> mbox cmd response data (8 bytes)
3,584,420 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,613,767 UART: [rt]cmd =0x50435251, len=36
3,781,137 >>> mbox cmd response data (1848 bytes)
3,781,138 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,071 UART: [rt]cmd =0x50435245, len=56
3,814,682 >>> mbox cmd response data (8 bytes)
3,814,683 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,414 UART: [rt]cmd =0x50435251, len=36
4,011,932 >>> mbox cmd response data (1848 bytes)
4,011,933 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,534 UART: [rt]cmd =0x50435245, len=56
4,044,785 >>> mbox cmd response data (8 bytes)
4,044,786 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,393 UART: [rt]cmd =0x50435251, len=36
4,241,917 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,398 ready_for_fw is high
1,061,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,865 >>> mbox cmd response: success
2,680,865 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
2,743,096 UART:
2,743,112 UART: Running Caliptra FMC ...
2,743,520 UART:
2,743,663 UART: [state] CFI Enabled
2,754,183 UART: [fht] FMC Alias Private Key: 7
2,872,987 UART: [art] Extend RT PCRs Done
2,873,415 UART: [art] Lock RT PCRs Done
2,874,667 UART: [art] Populate DV Done
2,883,068 UART: [fht] FMC Alias Private Key: 7
2,884,066 UART: [art] Derive CDI
2,884,346 UART: [art] Store in slot 0x4
2,970,217 UART: [art] Derive Key Pair
2,970,577 UART: [art] Store priv key in slot 0x5
2,984,027 UART: [art] Derive Key Pair - Done
2,998,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,249 UART: [art] PUB.X = 482044478783ECCFFE24BD547C43C3DC6670D3F5C2F553CDC9BF4EDE68DF5289FAF8B6D58258AFCD71A6BED70388D70D
3,022,033 UART: [art] PUB.Y = 814102D2E9E3872FE018A663F88E1062FAD08916E6749E04C7646B3A6B57050A9CAB573EC0AFC0240C50276B225D4907
3,028,961 UART: [art] SIG.R = 2CE93ECEEEC069A2AC0FE8F1D5302939D802118672B36437129B74805016235491E550D7C806071497D6E431573F4988
3,035,705 UART: [art] SIG.S = D32EFCCE6A39F782DB77ACBED2DE8B18C7C72C80451151131D9CDC71A0EFA1A412B206814036614C283EF2387973B2E6
3,059,436 UART: Caliptra RT
3,059,779 UART: [state] CFI Enabled
3,179,096 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,350 UART: [rt]cmd =0x50435251, len=36
3,376,676 >>> mbox cmd response data (1848 bytes)
3,376,677 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,408 UART: [rt]cmd =0x50435245, len=56
3,410,095 >>> mbox cmd response data (8 bytes)
3,410,096 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,439,693 UART: [rt]cmd =0x50435251, len=36
3,607,147 >>> mbox cmd response data (1848 bytes)
3,607,148 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,965 UART: [rt]cmd =0x50435245, len=56
3,640,736 >>> mbox cmd response data (8 bytes)
3,640,737 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,670,186 UART: [rt]cmd =0x50435251, len=36
3,837,558 >>> mbox cmd response data (1848 bytes)
3,837,559 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,144 UART: [rt]cmd =0x50435245, len=56
3,870,441 >>> mbox cmd response data (8 bytes)
3,870,442 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,035 UART: [rt]cmd =0x50435251, len=36
4,067,563 >>> mbox cmd response data (1848 bytes)
test test_pcr::test_extend_pcr_cmd_multiple_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,366 UART:
192,707 UART: Running Caliptra ROM ...
193,891 UART:
194,045 UART: [state] CFI Enabled
267,150 UART: [state] LifecycleState = Unprovisioned
269,128 UART: [state] DebugLocked = No
271,087 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,466 UART: [kat] SHA2-256
445,213 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,697 UART: [kat] ++
456,167 UART: [kat] sha1
468,715 UART: [kat] SHA2-256
471,403 UART: [kat] SHA2-384
477,022 UART: [kat] SHA2-512-ACC
479,412 UART: [kat] ECC-384
2,768,252 UART: [kat] HMAC-384Kdf
2,800,734 UART: [kat] LMS
3,990,990 UART: [kat] --
3,995,791 UART: [cold-reset] ++
3,997,870 UART: [fht] Storing FHT @ 0x50003400
4,008,071 UART: [idev] ++
4,008,641 UART: [idev] CDI.KEYID = 6
4,009,555 UART: [idev] SUBJECT.KEYID = 7
4,010,803 UART: [idev] UDS.KEYID = 0
4,011,854 ready_for_fw is high
4,012,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,229 UART: [idev] Erasing UDS.KEYID = 0
7,347,459 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,703 UART: [idev] --
7,373,782 UART: [ldev] ++
7,374,361 UART: [ldev] CDI.KEYID = 6
7,375,271 UART: [ldev] SUBJECT.KEYID = 5
7,376,482 UART: [ldev] AUTHORITY.KEYID = 7
7,377,771 UART: [ldev] FE.KEYID = 1
7,422,981 UART: [ldev] Erasing FE.KEYID = 1
10,752,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,281 UART: [ldev] --
13,116,294 UART: [fwproc] Waiting for Commands...
13,118,097 UART: [fwproc] Received command 0x46574c44
13,120,297 UART: [fwproc] Received Image of size 118548 bytes
17,224,653 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,719 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,639 >>> mbox cmd response: success
17,700,725 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,704,538 UART: [afmc] ++
17,705,116 UART: [afmc] CDI.KEYID = 6
17,706,130 UART: [afmc] SUBJECT.KEYID = 7
17,707,288 UART: [afmc] AUTHORITY.KEYID = 5
21,073,459 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,577 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,712 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,181 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,803 UART: [afmc] --
23,443,519 UART: [cold-reset] --
23,447,754 UART: [state] Locking Datavault
23,451,487 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,178 UART: [state] Locking ICCM
23,455,303 UART: [exit] Launching FMC @ 0x40000130
23,463,702 UART:
23,463,934 UART: Running Caliptra FMC ...
23,464,960 UART:
23,465,109 UART: [state] CFI Enabled
23,534,017 UART: [fht] FMC Alias Private Key: 7
25,873,619 UART: [art] Extend RT PCRs Done
25,874,840 UART: [art] Lock RT PCRs Done
25,876,223 UART: [art] Populate DV Done
25,881,641 UART: [fht] FMC Alias Private Key: 7
25,883,246 UART: [art] Derive CDI
25,883,983 UART: [art] Store in slot 0x4
25,942,401 UART: [art] Derive Key Pair
25,943,440 UART: [art] Store priv key in slot 0x5
29,236,672 UART: [art] Derive Key Pair - Done
29,249,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,619 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,127 UART: [art] PUB.X = 4F165FD9A2416354C45CA2A751436DAF00F9771C3D92FED9AAEB18F5BF4419C98382F8CDA61D1A40ECE9194ADCD98139
31,547,416 UART: [art] PUB.Y = 5FB41977E4162243AF9F52A564D6B7D1B2C173B103C382FD0757B4AADE6B2EF372A01C7AFC9E7B70D86CF299C9D1DEC1
31,554,698 UART: [art] SIG.R = DCE90F119C4F88B2DEB3BBF96AF682E2BD464BC10D782F83D3F68FA3E1B5AD03281075DBD50CD179AE468DEE3C576027
31,562,083 UART: [art] SIG.S = 7784C17A91E05026E8B9D63827DC453483E4DC52B448CFD087DA675F6E52C8460490390868474860042C5DB117693F3B
32,866,969 UART: Caliptra RT
32,867,670 UART: [state] CFI Enabled
33,045,016 UART: [rt] RT listening for mailbox commands...
33,077,109 UART: [rt]cmd =0x50435245, len=56
33,078,874 >>> mbox cmd response: failed
33,079,193 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,109,288 UART: [rt]cmd =0x50435245, len=56
33,111,043 >>> mbox cmd response: failed
33,111,320 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,141,342 UART: [rt]cmd =0x50435245, len=56
33,143,032 >>> mbox cmd response: failed
33,143,290 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,173,580 UART: [rt]cmd =0x50435245, len=56
33,175,049 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
3,782,137 ready_for_fw is high
3,782,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,943,355 >>> mbox cmd response: success
17,944,585 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,642,396 UART:
23,642,767 UART: Running Caliptra FMC ...
23,643,915 UART:
23,644,078 UART: [state] CFI Enabled
23,713,812 UART: [fht] FMC Alias Private Key: 7
26,054,353 UART: [art] Extend RT PCRs Done
26,055,576 UART: [art] Lock RT PCRs Done
26,057,042 UART: [art] Populate DV Done
26,062,359 UART: [fht] FMC Alias Private Key: 7
26,064,005 UART: [art] Derive CDI
26,064,774 UART: [art] Store in slot 0x4
26,122,478 UART: [art] Derive Key Pair
26,123,532 UART: [art] Store priv key in slot 0x5
29,416,648 UART: [art] Derive Key Pair - Done
29,429,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,718,454 UART: [art] Erasing AUTHORITY.KEYID = 7
31,719,972 UART: [art] PUB.X = 929E776F59A6EC0BB905772E532D2F8C8E877F9E0190A390EE44C13F1E2643A4782E76AF9D180D7926496819B48B9258
31,727,228 UART: [art] PUB.Y = 5CBB65205F056CF5F0007AE03804179C1C185D39DDDE599848B8A51E585E381BCF00CA4EDEB170A6AB136DDAA553C555
31,734,473 UART: [art] SIG.R = 1C6B134F93653E44F7FB387E630D74B203B57836A6604DB0CF2FA776651E92665886D32408D804AEC326AC7A2262B8B3
31,741,809 UART: [art] SIG.S = 8C7A5F884A68AE75E31A4B780395A979B89CE8C1A024ACCCB23DB43ACCCDE2C555257212783AAE9A23431DB43FBE05C1
33,046,658 UART: Caliptra RT
33,047,392 UART: [state] CFI Enabled
33,225,312 UART: [rt] RT listening for mailbox commands...
33,257,046 UART: [rt]cmd =0x50435245, len=56
33,258,951 >>> mbox cmd response: failed
33,259,250 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,289,454 UART: [rt]cmd =0x50435245, len=56
33,291,260 >>> mbox cmd response: failed
33,291,514 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,321,604 UART: [rt]cmd =0x50435245, len=56
33,323,237 >>> mbox cmd response: failed
33,323,501 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,353,524 UART: [rt]cmd =0x50435245, len=56
33,355,325 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,632 writing to cptra_bootfsm_go
192,794 UART:
193,142 UART: Running Caliptra ROM ...
194,238 UART:
603,789 UART: [state] CFI Enabled
619,405 UART: [state] LifecycleState = Unprovisioned
621,399 UART: [state] DebugLocked = No
623,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,943 UART: [kat] SHA2-256
798,672 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,244 UART: [kat] ++
809,770 UART: [kat] sha1
820,928 UART: [kat] SHA2-256
823,643 UART: [kat] SHA2-384
829,905 UART: [kat] SHA2-512-ACC
832,265 UART: [kat] ECC-384
3,118,108 UART: [kat] HMAC-384Kdf
3,129,626 UART: [kat] LMS
4,319,745 UART: [kat] --
4,325,171 UART: [cold-reset] ++
4,326,248 UART: [fht] Storing FHT @ 0x50003400
4,337,083 UART: [idev] ++
4,337,652 UART: [idev] CDI.KEYID = 6
4,338,676 UART: [idev] SUBJECT.KEYID = 7
4,339,843 UART: [idev] UDS.KEYID = 0
4,340,878 ready_for_fw is high
4,341,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,348 UART: [idev] Erasing UDS.KEYID = 0
7,623,428 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,860 UART: [idev] --
7,648,340 UART: [ldev] ++
7,648,968 UART: [ldev] CDI.KEYID = 6
7,649,908 UART: [ldev] SUBJECT.KEYID = 5
7,651,124 UART: [ldev] AUTHORITY.KEYID = 7
7,652,351 UART: [ldev] FE.KEYID = 1
7,663,372 UART: [ldev] Erasing FE.KEYID = 1
10,951,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,677 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,166 UART: [ldev] --
13,311,341 UART: [fwproc] Waiting for Commands...
13,314,025 UART: [fwproc] Received command 0x46574c44
13,316,261 UART: [fwproc] Received Image of size 118548 bytes
17,428,921 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,887 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,911,009 >>> mbox cmd response: success
17,912,895 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
17,915,461 UART: [afmc] ++
17,916,072 UART: [afmc] CDI.KEYID = 6
17,916,964 UART: [afmc] SUBJECT.KEYID = 7
17,918,243 UART: [afmc] AUTHORITY.KEYID = 5
21,235,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,529,781 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,468 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,180 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,636 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,815 UART: [afmc] --
23,600,737 UART: [cold-reset] --
23,605,294 UART: [state] Locking Datavault
23,611,937 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,698 UART: [state] Locking ICCM
23,615,688 UART: [exit] Launching FMC @ 0x40000130
23,624,075 UART:
23,624,307 UART: Running Caliptra FMC ...
23,625,401 UART:
23,625,555 UART: [state] CFI Enabled
23,633,376 UART: [fht] FMC Alias Private Key: 7
25,974,151 UART: [art] Extend RT PCRs Done
25,975,365 UART: [art] Lock RT PCRs Done
25,977,286 UART: [art] Populate DV Done
25,982,743 UART: [fht] FMC Alias Private Key: 7
25,984,203 UART: [art] Derive CDI
25,984,938 UART: [art] Store in slot 0x4
26,027,605 UART: [art] Derive Key Pair
26,028,601 UART: [art] Store priv key in slot 0x5
29,270,979 UART: [art] Derive Key Pair - Done
29,284,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,874 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,377 UART: [art] PUB.X = 4A43207D84DEDD6C9EC2FD103986E91607CE1DF3439EEA4CAA2E73D0829BC55F6F4D44DC451AD1AF7A86B3B4F662946C
31,573,663 UART: [art] PUB.Y = 303CFDC348ACDB31BD2E38B30CD7CDB4D1EADF3F0CCD3A3425A31BE32922743F38BDF3C24F26FF20D2A098C966839A41
31,581,062 UART: [art] SIG.R = 761C04FC73B21A24DC36AA1497C478807499972D2BC39E669D1CDAFC384AFD5F22D85162446F56F6A62164FAAB95E00D
31,588,366 UART: [art] SIG.S = C3675A2F721646AD4A5332316697708F691ED8EE739B51BC8C9FA41FEE939F5EEC1D0E4AE22E4716D80C37A7926C2149
32,893,592 UART: Caliptra RT
32,894,280 UART: [state] CFI Enabled
33,027,604 UART: [rt] RT listening for mailbox commands...
33,059,611 UART: [rt]cmd =0x50435245, len=56
33,061,421 >>> mbox cmd response: failed
33,061,785 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,091,726 UART: [rt]cmd =0x50435245, len=56
33,093,580 >>> mbox cmd response: failed
33,093,832 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,123,910 UART: [rt]cmd =0x50435245, len=56
33,125,603 >>> mbox cmd response: failed
33,125,872 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,156,102 UART: [rt]cmd =0x50435245, len=56
33,157,849 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,124,452 ready_for_fw is high
4,124,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,446 >>> mbox cmd response: success
18,161,897 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
23,804,957 UART:
23,805,357 UART: Running Caliptra FMC ...
23,806,499 UART:
23,806,651 UART: [state] CFI Enabled
23,814,487 UART: [fht] FMC Alias Private Key: 7
26,154,026 UART: [art] Extend RT PCRs Done
26,155,254 UART: [art] Lock RT PCRs Done
26,157,090 UART: [art] Populate DV Done
26,162,466 UART: [fht] FMC Alias Private Key: 7
26,164,219 UART: [art] Derive CDI
26,164,951 UART: [art] Store in slot 0x4
26,207,331 UART: [art] Derive Key Pair
26,208,366 UART: [art] Store priv key in slot 0x5
29,450,056 UART: [art] Derive Key Pair - Done
29,463,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,871 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,376 UART: [art] PUB.X = 1FE3C834AE3C26673F0B25FCD8C7853F8A8BE3C3510304C2C59B05EBF4A2C9792F94F1069171D588773B52A26690892F
31,751,629 UART: [art] PUB.Y = 30B72914CF365E7616A8F38980BECFDEDE89F5DEDCDCE3CE5E4668188E083220292384B7D27D2E48871557C566903DC6
31,758,873 UART: [art] SIG.R = B950E6A2D87A6CE59006282A88D715B5936E92A527D7863472CF73E6A2CEB58B30B0201170DC07098432A1739E0B5537
31,766,206 UART: [art] SIG.S = 3DDC3ABDB7DD0DF6C7D5C0F7C8354DC3C55054D48978D67F80EB2CCA44453E23263619E569010164757D4D79ACCF12C4
33,071,236 UART: Caliptra RT
33,071,950 UART: [state] CFI Enabled
33,205,171 UART: [rt] RT listening for mailbox commands...
33,237,034 UART: [rt]cmd =0x50435245, len=56
33,238,934 >>> mbox cmd response: failed
33,239,227 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,269,368 UART: [rt]cmd =0x50435245, len=56
33,271,276 >>> mbox cmd response: failed
33,271,533 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,301,503 UART: [rt]cmd =0x50435245, len=56
33,303,411 >>> mbox cmd response: failed
33,303,662 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
33,333,852 UART: [rt]cmd =0x50435245, len=56
33,335,585 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,308 writing to cptra_bootfsm_go
193,531 UART:
193,919 UART: Running Caliptra ROM ...
195,004 UART:
195,155 UART: [state] CFI Enabled
265,854 UART: [state] LifecycleState = Unprovisioned
267,787 UART: [state] DebugLocked = No
270,668 UART: [state] WD Timer not started. Device not locked for debugging
273,778 UART: [kat] SHA2-256
453,413 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,160 UART: [kat] ++
464,759 UART: [kat] sha1
473,999 UART: [kat] SHA2-256
476,708 UART: [kat] SHA2-384
483,304 UART: [kat] SHA2-512-ACC
485,642 UART: [kat] ECC-384
2,950,991 UART: [kat] HMAC-384Kdf
2,972,403 UART: [kat] LMS
3,448,946 UART: [kat] --
3,451,373 UART: [cold-reset] ++
3,453,084 UART: [fht] FHT @ 0x50003400
3,465,614 UART: [idev] ++
3,466,187 UART: [idev] CDI.KEYID = 6
3,467,094 UART: [idev] SUBJECT.KEYID = 7
3,468,332 UART: [idev] UDS.KEYID = 0
3,469,325 ready_for_fw is high
3,469,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,556 UART: [idev] Erasing UDS.KEYID = 0
5,990,370 UART: [idev] Sha1 KeyId Algorithm
6,015,646 UART: [idev] --
6,020,430 UART: [ldev] ++
6,021,008 UART: [ldev] CDI.KEYID = 6
6,021,952 UART: [ldev] SUBJECT.KEYID = 5
6,023,165 UART: [ldev] AUTHORITY.KEYID = 7
6,024,395 UART: [ldev] FE.KEYID = 1
6,059,482 UART: [ldev] Erasing FE.KEYID = 1
8,565,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,282 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,512 UART: [ldev] --
10,377,525 UART: [fwproc] Wait for Commands...
10,379,456 UART: [fwproc] Recv command 0x46574c44
10,381,493 UART: [fwproc] Recv'd Img size: 118548 bytes
13,870,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,348,933 >>> mbox cmd response: success
14,350,007 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,352,258 UART: [afmc] ++
14,352,847 UART: [afmc] CDI.KEYID = 6
14,353,809 UART: [afmc] SUBJECT.KEYID = 7
14,355,022 UART: [afmc] AUTHORITY.KEYID = 5
16,899,167 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,289 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,481 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,274 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,301 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,692,902 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,575 UART: [afmc] --
18,720,999 UART: [cold-reset] --
18,725,460 UART: [state] Locking Datavault
18,731,453 UART: [state] Locking PCR0, PCR1 and PCR31
18,733,160 UART: [state] Locking ICCM
18,735,578 UART: [exit] Launching FMC @ 0x40000130
18,744,021 UART:
18,744,269 UART: Running Caliptra FMC ...
18,745,366 UART:
18,745,524 UART: [state] CFI Enabled
18,799,690 UART: [fht] FMC Alias Private Key: 7
20,566,346 UART: [art] Extend RT PCRs Done
20,567,597 UART: [art] Lock RT PCRs Done
20,569,118 UART: [art] Populate DV Done
20,574,423 UART: [fht] FMC Alias Private Key: 7
20,575,958 UART: [art] Derive CDI
20,576,688 UART: [art] Store in slot 0x4
20,632,561 UART: [art] Derive Key Pair
20,633,555 UART: [art] Store priv key in slot 0x5
23,096,534 UART: [art] Derive Key Pair - Done
23,109,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,770 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,277 UART: [art] PUB.X = 6DF7B2DF6D239522325B7C34CDE0463CF8891C99F81EA875E20FE172E127999E8841223F0BEBE095134C83E501C5AA3B
24,831,522 UART: [art] PUB.Y = 9204B2900FA5AE675A760D26CE324EA0B49F5440DEA7E9196DEFE80E927B06FFE6315A18CEAE07277A186F4D84464BBE
24,838,803 UART: [art] SIG.R = B4FDA5225F8E251BC8532779DA54D31F18E8F3C1D5E0A1AF1CA39C9D770C9953C93908AC6A4ADFC2F2BA4B705D4A0CD8
24,846,251 UART: [art] SIG.S = 2158FA772614E738F6B0118BE03E3421A132E1C1DC34BFE813B9070A38E9DD69DFA22E4D44ECA94B939EB5B4837C5406
25,825,307 UART: Caliptra RT
25,825,997 UART: [state] CFI Enabled
26,007,557 UART: [rt] RT listening for mailbox commands...
26,039,308 UART: [rt]cmd =0x50435245, len=56
26,041,062 >>> mbox cmd response: failed
26,041,370 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,071,349 UART: [rt]cmd =0x50435245, len=56
26,073,041 >>> mbox cmd response: failed
26,073,309 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,103,396 UART: [rt]cmd =0x50435245, len=56
26,105,129 >>> mbox cmd response: failed
26,105,396 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,135,531 UART: [rt]cmd =0x50435245, len=56
26,137,391 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,461,337 ready_for_fw is high
3,461,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,576 >>> mbox cmd response: success
14,240,879 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,535,155 UART:
18,535,535 UART: Running Caliptra FMC ...
18,536,729 UART:
18,536,905 UART: [state] CFI Enabled
18,605,511 UART: [fht] FMC Alias Private Key: 7
20,372,260 UART: [art] Extend RT PCRs Done
20,373,484 UART: [art] Lock RT PCRs Done
20,375,005 UART: [art] Populate DV Done
20,380,479 UART: [fht] FMC Alias Private Key: 7
20,382,019 UART: [art] Derive CDI
20,382,859 UART: [art] Store in slot 0x4
20,438,310 UART: [art] Derive Key Pair
20,439,351 UART: [art] Store priv key in slot 0x5
22,902,418 UART: [art] Derive Key Pair - Done
22,915,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,197 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,704 UART: [art] PUB.X = F8B08676D19102FD29F3DF1DF2CA24E4E07ED6A05F5CEFB5AF8AD1402AA6120A35B39EF4F8AE2CFC7AA81F5D3E0C999D
24,637,010 UART: [art] PUB.Y = A0A032A17D6FCDE75E50E2F1FCCD331F8F140C7AE928F282F7CDF51399F1B8DA3ED6E4F431FE70F239D5AACFA0C3055C
24,644,320 UART: [art] SIG.R = 62CF53E3F92E9EB61CFA5AF719F55F4F1B37C6BE36CEE78B3ABB79B9B543EFAD1BD142819534DB2B90AEF79C2C90E694
24,651,712 UART: [art] SIG.S = 5D860BF3C1F703A98B29C98C481AD1B7286D79775C6EBA9D1A5A1B0DA924A656ABD28C1A8B0C1145E5AC4198EACB0CF5
25,631,139 UART: Caliptra RT
25,631,853 UART: [state] CFI Enabled
25,811,263 UART: [rt] RT listening for mailbox commands...
25,843,166 UART: [rt]cmd =0x50435245, len=56
25,845,032 >>> mbox cmd response: failed
25,845,345 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,875,461 UART: [rt]cmd =0x50435245, len=56
25,877,192 >>> mbox cmd response: failed
25,877,459 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,907,753 UART: [rt]cmd =0x50435245, len=56
25,909,336 >>> mbox cmd response: failed
25,909,598 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,939,513 UART: [rt]cmd =0x50435245, len=56
25,941,358 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,348 UART:
192,700 UART: Running Caliptra ROM ...
194,031 UART:
603,712 UART: [state] CFI Enabled
616,238 UART: [state] LifecycleState = Unprovisioned
618,115 UART: [state] DebugLocked = No
621,067 UART: [state] WD Timer not started. Device not locked for debugging
625,041 UART: [kat] SHA2-256
804,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,527 UART: [kat] ++
816,005 UART: [kat] sha1
827,527 UART: [kat] SHA2-256
830,185 UART: [kat] SHA2-384
837,328 UART: [kat] SHA2-512-ACC
839,736 UART: [kat] ECC-384
3,282,429 UART: [kat] HMAC-384Kdf
3,294,881 UART: [kat] LMS
3,771,421 UART: [kat] --
3,775,926 UART: [cold-reset] ++
3,777,295 UART: [fht] FHT @ 0x50003400
3,788,132 UART: [idev] ++
3,788,768 UART: [idev] CDI.KEYID = 6
3,789,678 UART: [idev] SUBJECT.KEYID = 7
3,790,922 UART: [idev] UDS.KEYID = 0
3,791,974 ready_for_fw is high
3,792,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,056 UART: [idev] Erasing UDS.KEYID = 0
6,269,549 UART: [idev] Sha1 KeyId Algorithm
6,293,698 UART: [idev] --
6,298,770 UART: [ldev] ++
6,299,354 UART: [ldev] CDI.KEYID = 6
6,300,265 UART: [ldev] SUBJECT.KEYID = 5
6,301,485 UART: [ldev] AUTHORITY.KEYID = 7
6,302,718 UART: [ldev] FE.KEYID = 1
6,314,678 UART: [ldev] Erasing FE.KEYID = 1
8,798,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,521,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,537,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,553,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,569,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,591,363 UART: [ldev] --
10,596,800 UART: [fwproc] Wait for Commands...
10,599,152 UART: [fwproc] Recv command 0x46574c44
10,601,151 UART: [fwproc] Recv'd Img size: 118548 bytes
14,084,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,159,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,232,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,249 >>> mbox cmd response: success
14,561,432 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,564,224 UART: [afmc] ++
14,564,824 UART: [afmc] CDI.KEYID = 6
14,565,845 UART: [afmc] SUBJECT.KEYID = 7
14,567,010 UART: [afmc] AUTHORITY.KEYID = 5
17,071,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,953 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,782 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,857 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,869,574 UART: [afmc] --
18,872,632 UART: [cold-reset] --
18,877,083 UART: [state] Locking Datavault
18,882,010 UART: [state] Locking PCR0, PCR1 and PCR31
18,883,764 UART: [state] Locking ICCM
18,886,348 UART: [exit] Launching FMC @ 0x40000130
18,894,802 UART:
18,895,056 UART: Running Caliptra FMC ...
18,896,161 UART:
18,896,320 UART: [state] CFI Enabled
18,904,447 UART: [fht] FMC Alias Private Key: 7
20,670,785 UART: [art] Extend RT PCRs Done
20,672,005 UART: [art] Lock RT PCRs Done
20,673,803 UART: [art] Populate DV Done
20,679,413 UART: [fht] FMC Alias Private Key: 7
20,680,912 UART: [art] Derive CDI
20,681,673 UART: [art] Store in slot 0x4
20,724,429 UART: [art] Derive Key Pair
20,725,428 UART: [art] Store priv key in slot 0x5
23,152,417 UART: [art] Derive Key Pair - Done
23,165,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,763 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,266 UART: [art] PUB.X = A311CF2A067780185864B5D7958907F00A09E6F0663A2702907E0109F78D393DE637757DB3F15FECCBA8A238DB447D62
24,880,531 UART: [art] PUB.Y = 04AC73593801B29F14DD352F610F14A86402E995F77D4E1030BD77314998D2E64991AC1BA8C897AB9F43C1D6E6872872
24,887,761 UART: [art] SIG.R = DF3C9FDA2B2E9325974ABE2ECB7EFB93DFFD1A9EDA1DAC8C12E0BCEA80FCD2BE2CEAA8C1779AD27C271A459E9A5C0AD6
24,895,217 UART: [art] SIG.S = A7322593D02EE28F0942268490BB8D8940AB2FC13BE2170E4406075D29AB5FBBDA9A6F15BFCE0CEF7DCC60428C17DF77
25,873,911 UART: Caliptra RT
25,874,603 UART: [state] CFI Enabled
26,007,478 UART: [rt] RT listening for mailbox commands...
26,039,096 UART: [rt]cmd =0x50435245, len=56
26,040,941 >>> mbox cmd response: failed
26,041,243 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,071,479 UART: [rt]cmd =0x50435245, len=56
26,073,250 >>> mbox cmd response: failed
26,073,523 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,103,718 UART: [rt]cmd =0x50435245, len=56
26,105,569 >>> mbox cmd response: failed
26,105,826 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,136,137 UART: [rt]cmd =0x50435245, len=56
26,137,883 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,783,874 ready_for_fw is high
3,784,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,454,281 >>> mbox cmd response: success
14,455,766 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
18,705,885 UART:
18,706,269 UART: Running Caliptra FMC ...
18,707,472 UART:
18,707,639 UART: [state] CFI Enabled
18,715,367 UART: [fht] FMC Alias Private Key: 7
20,482,148 UART: [art] Extend RT PCRs Done
20,483,366 UART: [art] Lock RT PCRs Done
20,484,671 UART: [art] Populate DV Done
20,490,086 UART: [fht] FMC Alias Private Key: 7
20,491,635 UART: [art] Derive CDI
20,492,405 UART: [art] Store in slot 0x4
20,535,109 UART: [art] Derive Key Pair
20,536,111 UART: [art] Store priv key in slot 0x5
22,963,310 UART: [art] Derive Key Pair - Done
22,976,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,308 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,808 UART: [art] PUB.X = BAC743AD99828ED8989A2160BA4F63D1B9788B9F0C3D82194A8A86C9249C1CFC7332F66C8679B7EA8C62A2118DEC5FE1
24,691,064 UART: [art] PUB.Y = DB2545E6F409E7B1015A4CE9BB52562D59D04EDE733E6C01744A9A388BF2DBED71FB1B60B2408A9F956A02FC4F7E007F
24,698,339 UART: [art] SIG.R = E5B49C7FD42AF2279834AC515D8BA4F46340E364C97D2F5DD7F7B0A9C5C8A1894F47062655CCCEE0F78237A2F25348BE
24,705,742 UART: [art] SIG.S = 080B90973FB4C22F7CE353BAE95F542E707B6F21FDF3CA297AA10B7AF1FDD059DE638F93957C7F00A7D4ED6D4CFCDBD2
25,683,493 UART: Caliptra RT
25,684,196 UART: [state] CFI Enabled
25,817,663 UART: [rt] RT listening for mailbox commands...
25,849,446 UART: [rt]cmd =0x50435245, len=56
25,851,281 >>> mbox cmd response: failed
25,851,582 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,881,545 UART: [rt]cmd =0x50435245, len=56
25,883,094 >>> mbox cmd response: failed
25,883,357 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,913,517 UART: [rt]cmd =0x50435245, len=56
25,915,380 >>> mbox cmd response: failed
25,915,637 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
25,945,620 UART: [rt]cmd =0x50435245, len=56
25,947,248 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,834 writing to cptra_bootfsm_go
192,897 UART:
193,269 UART: Running Caliptra ROM ...
194,468 UART:
194,622 UART: [state] CFI Enabled
263,239 UART: [state] LifecycleState = Unprovisioned
265,657 UART: [state] DebugLocked = No
268,188 UART: [state] WD Timer not started. Device not locked for debugging
272,541 UART: [kat] SHA2-256
462,414 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,226 UART: [kat] ++
473,670 UART: [kat] sha1
485,632 UART: [kat] SHA2-256
488,617 UART: [kat] SHA2-384
496,031 UART: [kat] SHA2-512-ACC
498,681 UART: [kat] ECC-384
2,946,709 UART: [kat] HMAC-384Kdf
2,971,600 UART: [kat] LMS
3,503,391 UART: [kat] --
3,507,195 UART: [cold-reset] ++
3,508,911 UART: [fht] FHT @ 0x50003400
3,520,539 UART: [idev] ++
3,521,208 UART: [idev] CDI.KEYID = 6
3,522,121 UART: [idev] SUBJECT.KEYID = 7
3,523,387 UART: [idev] UDS.KEYID = 0
3,524,308 ready_for_fw is high
3,524,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,357 UART: [idev] Erasing UDS.KEYID = 0
6,029,750 UART: [idev] Sha1 KeyId Algorithm
6,051,045 UART: [idev] --
6,056,670 UART: [ldev] ++
6,057,345 UART: [ldev] CDI.KEYID = 6
6,058,309 UART: [ldev] SUBJECT.KEYID = 5
6,059,462 UART: [ldev] AUTHORITY.KEYID = 7
6,060,693 UART: [ldev] FE.KEYID = 1
6,091,490 UART: [ldev] Erasing FE.KEYID = 1
8,600,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,292 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,627 UART: [ldev] --
10,406,529 UART: [fwproc] Wait for Commands...
10,409,439 UART: [fwproc] Recv command 0x46574c44
10,411,744 UART: [fwproc] Recv'd Img size: 118548 bytes
13,903,670 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,132 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,672,676 >>> mbox cmd response: success
14,673,832 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,677,394 UART: [afmc] ++
14,678,094 UART: [afmc] CDI.KEYID = 6
14,679,199 UART: [afmc] SUBJECT.KEYID = 7
14,680,731 UART: [afmc] AUTHORITY.KEYID = 5
17,227,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,950,164 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,952,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,967,194 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,982,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,997,228 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,021,572 UART: [afmc] --
19,024,791 UART: [cold-reset] --
19,027,194 UART: [state] Locking Datavault
19,034,435 UART: [state] Locking PCR0, PCR1 and PCR31
19,036,616 UART: [state] Locking ICCM
19,038,275 UART: [exit] Launching FMC @ 0x40000130
19,046,924 UART:
19,047,177 UART: Running Caliptra FMC ...
19,048,278 UART:
19,048,439 UART: [state] CFI Enabled
19,106,446 UART: [fht] FMC Alias Private Key: 7
20,872,916 UART: [art] Extend RT PCRs Done
20,874,147 UART: [art] Lock RT PCRs Done
20,875,936 UART: [art] Populate DV Done
20,881,345 UART: [fht] FMC Alias Private Key: 7
20,882,862 UART: [art] Derive CDI
20,883,627 UART: [art] Store in slot 0x4
20,939,610 UART: [art] Derive Key Pair
20,940,600 UART: [art] Store priv key in slot 0x5
23,403,403 UART: [art] Derive Key Pair - Done
23,416,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,129,736 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,241 UART: [art] PUB.X = 446CBDAED8AD630CD8A55848689EFE10D5204A4D9B98A95416250D823275F70C43D76EBDD6E38542A5E2393F9685E2A5
25,138,542 UART: [art] PUB.Y = A4B60B7CF9D9086E47C1F8D7C989412601B10219DE3E67A28B014BB5D5C4A59C15D057A767A2E0587EA4C7C5796A6B91
25,145,780 UART: [art] SIG.R = 85CE0D8236AAA261C3AC0EF79E625608D6E19050E45BC024AAA599FDF14A727A029640A946B24EAB375DFA5E88C004C9
25,153,167 UART: [art] SIG.S = 8BA18E5D29CDCBCCD1632601B812C36570C078C109F9086DDA22DDD4168527CC4044C1914AA03367A979715F0510D574
26,132,193 UART: Caliptra RT
26,132,902 UART: [state] CFI Enabled
26,312,338 UART: [rt] RT listening for mailbox commands...
26,344,468 UART: [rt]cmd =0x50435245, len=56
26,346,201 >>> mbox cmd response: failed
26,346,494 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,376,706 UART: [rt]cmd =0x50435245, len=56
26,378,502 >>> mbox cmd response: failed
26,378,763 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,408,958 UART: [rt]cmd =0x50435245, len=56
26,410,859 >>> mbox cmd response: failed
26,411,125 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,441,257 UART: [rt]cmd =0x50435245, len=56
26,443,159 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,441,952 ready_for_fw is high
3,442,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,527 >>> mbox cmd response: success
14,826,783 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,116,188 UART:
19,116,569 UART: Running Caliptra FMC ...
19,117,679 UART:
19,117,827 UART: [state] CFI Enabled
19,180,885 UART: [fht] FMC Alias Private Key: 7
20,947,384 UART: [art] Extend RT PCRs Done
20,948,601 UART: [art] Lock RT PCRs Done
20,950,525 UART: [art] Populate DV Done
20,956,051 UART: [fht] FMC Alias Private Key: 7
20,957,758 UART: [art] Derive CDI
20,958,494 UART: [art] Store in slot 0x4
21,012,924 UART: [art] Derive Key Pair
21,013,967 UART: [art] Store priv key in slot 0x5
23,477,134 UART: [art] Derive Key Pair - Done
23,490,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,309 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,819 UART: [art] PUB.X = 3A603B0EB04143D610C32BEFBE347D0D009CEE89AA8BE82FF65D0F892DD99448F24BC471E38788E3E688A0663ECAA0BD
25,212,117 UART: [art] PUB.Y = EDC92C32841A732ED873707BDD25CBCF270FFFAED063BFD30F56A89A30456AC3572DAFA0A511B3B644EAB7D7A40FE82F
25,219,416 UART: [art] SIG.R = 086A51E4E62BA42481DBEF2F5C87A967A89B2F6299A5DF477C4CC6785DFB27CAAC8CC6528A2E25EE2075B1193393B4D9
25,226,806 UART: [art] SIG.S = 61C0B428A9AE48E68CD1FD6E27C351B798DCC533450CF2D722003F849F9433E213D0DBADEEABE34EDF69D44F19A88D4A
26,205,884 UART: Caliptra RT
26,206,580 UART: [state] CFI Enabled
26,387,232 UART: [rt] RT listening for mailbox commands...
26,418,974 UART: [rt]cmd =0x50435245, len=56
26,420,728 >>> mbox cmd response: failed
26,421,020 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,451,227 UART: [rt]cmd =0x50435245, len=56
26,452,972 >>> mbox cmd response: failed
26,453,282 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,483,532 UART: [rt]cmd =0x50435245, len=56
26,485,146 >>> mbox cmd response: failed
26,485,405 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,515,914 UART: [rt]cmd =0x50435245, len=56
26,517,498 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,473 UART:
192,843 UART: Running Caliptra ROM ...
193,986 UART:
603,683 UART: [state] CFI Enabled
618,430 UART: [state] LifecycleState = Unprovisioned
620,807 UART: [state] DebugLocked = No
623,264 UART: [state] WD Timer not started. Device not locked for debugging
628,243 UART: [kat] SHA2-256
818,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,914 UART: [kat] ++
829,522 UART: [kat] sha1
840,481 UART: [kat] SHA2-256
843,493 UART: [kat] SHA2-384
849,418 UART: [kat] SHA2-512-ACC
852,024 UART: [kat] ECC-384
3,295,325 UART: [kat] HMAC-384Kdf
3,308,136 UART: [kat] LMS
3,839,976 UART: [kat] --
3,846,311 UART: [cold-reset] ++
3,848,032 UART: [fht] FHT @ 0x50003400
3,860,242 UART: [idev] ++
3,860,992 UART: [idev] CDI.KEYID = 6
3,861,908 UART: [idev] SUBJECT.KEYID = 7
3,863,086 UART: [idev] UDS.KEYID = 0
3,864,017 ready_for_fw is high
3,864,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,912 UART: [idev] Erasing UDS.KEYID = 0
6,339,485 UART: [idev] Sha1 KeyId Algorithm
6,362,865 UART: [idev] --
6,367,454 UART: [ldev] ++
6,368,156 UART: [ldev] CDI.KEYID = 6
6,369,075 UART: [ldev] SUBJECT.KEYID = 5
6,370,241 UART: [ldev] AUTHORITY.KEYID = 7
6,371,425 UART: [ldev] FE.KEYID = 1
6,382,019 UART: [ldev] Erasing FE.KEYID = 1
8,859,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,797 UART: [ldev] --
10,650,032 UART: [fwproc] Wait for Commands...
10,652,073 UART: [fwproc] Recv command 0x46574c44
10,654,382 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,476 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,421 >>> mbox cmd response: success
14,915,564 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
14,917,671 UART: [afmc] ++
14,918,378 UART: [afmc] CDI.KEYID = 6
14,919,571 UART: [afmc] SUBJECT.KEYID = 7
14,921,009 UART: [afmc] AUTHORITY.KEYID = 5
17,423,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,160,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,286 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,190,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,211 UART: [afmc] --
19,218,621 UART: [cold-reset] --
19,223,118 UART: [state] Locking Datavault
19,227,489 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,694 UART: [state] Locking ICCM
19,231,581 UART: [exit] Launching FMC @ 0x40000130
19,240,269 UART:
19,240,506 UART: Running Caliptra FMC ...
19,241,611 UART:
19,241,770 UART: [state] CFI Enabled
19,249,957 UART: [fht] FMC Alias Private Key: 7
21,016,327 UART: [art] Extend RT PCRs Done
21,017,559 UART: [art] Lock RT PCRs Done
21,019,382 UART: [art] Populate DV Done
21,024,804 UART: [fht] FMC Alias Private Key: 7
21,026,408 UART: [art] Derive CDI
21,027,230 UART: [art] Store in slot 0x4
21,070,105 UART: [art] Derive Key Pair
21,071,149 UART: [art] Store priv key in slot 0x5
23,497,893 UART: [art] Derive Key Pair - Done
23,511,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,541 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,054 UART: [art] PUB.X = 913866E25D53E4E9BE1122841276AE862B5859B58C1C3B2AFA9178A4B8ED3C0AE42BC475F882027F2CBE209D3E339E55
25,226,293 UART: [art] PUB.Y = 48F15F33AD368E2C71EFF9D843C222D9DF21D3C04BAE67E7CF82425E6C6345E15B699D8F249BFAA568B7A64CD05A47CD
25,233,556 UART: [art] SIG.R = 9E9ED2027EE7497BCEC65720905DF1963AA14EEE7C7282056E8B84FF51DBCD639DE03034C774DFBF851C4F4635186817
25,240,970 UART: [art] SIG.S = DA6B264084DBBC3F4510156B7F2CFDA7B6BF698DEBA55729EE28CBC2EA0AE300203C099E8C0A165498869537E97C55FA
26,219,478 UART: Caliptra RT
26,220,184 UART: [state] CFI Enabled
26,351,950 UART: [rt] RT listening for mailbox commands...
26,383,423 UART: [rt]cmd =0x50435245, len=56
26,385,355 >>> mbox cmd response: failed
26,385,680 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,415,932 UART: [rt]cmd =0x50435245, len=56
26,417,850 >>> mbox cmd response: failed
26,418,111 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,448,558 UART: [rt]cmd =0x50435245, len=56
26,450,024 >>> mbox cmd response: failed
26,450,294 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,480,222 UART: [rt]cmd =0x50435245, len=56
26,481,922 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,762,207 ready_for_fw is high
3,762,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,582 >>> mbox cmd response: success
15,050,206 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
19,303,209 UART:
19,303,734 UART: Running Caliptra FMC ...
19,304,864 UART:
19,305,021 UART: [state] CFI Enabled
19,312,425 UART: [fht] FMC Alias Private Key: 7
21,079,036 UART: [art] Extend RT PCRs Done
21,080,282 UART: [art] Lock RT PCRs Done
21,081,512 UART: [art] Populate DV Done
21,087,168 UART: [fht] FMC Alias Private Key: 7
21,088,721 UART: [art] Derive CDI
21,089,458 UART: [art] Store in slot 0x4
21,131,970 UART: [art] Derive Key Pair
21,132,977 UART: [art] Store priv key in slot 0x5
23,559,840 UART: [art] Derive Key Pair - Done
23,572,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,279,423 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,935 UART: [art] PUB.X = FEF51E14183284684FF8F9400A8BD80D8484DCED1C9F0CAC8AEBF5BE4119CE84CED884C28F2B371C0E34AC7C2807E009
25,288,215 UART: [art] PUB.Y = E7B7034FDABF32D5FF8FEB55018774315E9BC0E424E7850FB739A8C81422FC6FC05456ED3BECB1CC9C29AE182D9D072C
25,295,491 UART: [art] SIG.R = 0691AE42FCBDEDEBFF1227DA99940ECC1705F510FF23BC9911DCC030A8405E36FF9EE3483855F943556B633ED7DA9B3B
25,302,851 UART: [art] SIG.S = 6EEC698B2C8B89EC780C4887B0FE1878AC06F10B712FAFD62CD5DA97D3C68AE1F85C59A9EB88F84633890876A2A42CA8
26,281,658 UART: Caliptra RT
26,282,374 UART: [state] CFI Enabled
26,414,662 UART: [rt] RT listening for mailbox commands...
26,446,274 UART: [rt]cmd =0x50435245, len=56
26,448,174 >>> mbox cmd response: failed
26,448,489 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,478,562 UART: [rt]cmd =0x50435245, len=56
26,480,245 >>> mbox cmd response: failed
26,480,542 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,510,528 UART: [rt]cmd =0x50435245, len=56
26,512,480 >>> mbox cmd response: failed
26,512,751 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
26,543,157 UART: [rt]cmd =0x50435245, len=56
26,545,132 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,743 UART: [kat] SHA2-256
881,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,789 UART: [kat] ++
885,941 UART: [kat] sha1
890,045 UART: [kat] SHA2-256
891,983 UART: [kat] SHA2-384
894,674 UART: [kat] SHA2-512-ACC
896,575 UART: [kat] ECC-384
902,040 UART: [kat] HMAC-384Kdf
906,612 UART: [kat] LMS
1,474,808 UART: [kat] --
1,475,501 UART: [cold-reset] ++
1,475,965 UART: [fht] Storing FHT @ 0x50003400
1,478,862 UART: [idev] ++
1,479,030 UART: [idev] CDI.KEYID = 6
1,479,390 UART: [idev] SUBJECT.KEYID = 7
1,479,814 UART: [idev] UDS.KEYID = 0
1,480,159 ready_for_fw is high
1,480,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,356 UART: [idev] Erasing UDS.KEYID = 0
1,504,442 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,996 UART: [idev] --
1,514,007 UART: [ldev] ++
1,514,175 UART: [ldev] CDI.KEYID = 6
1,514,538 UART: [ldev] SUBJECT.KEYID = 5
1,514,964 UART: [ldev] AUTHORITY.KEYID = 7
1,515,427 UART: [ldev] FE.KEYID = 1
1,520,729 UART: [ldev] Erasing FE.KEYID = 1
1,545,792 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,682 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,746 UART: [ldev] --
1,585,205 UART: [fwproc] Waiting for Commands...
1,585,884 UART: [fwproc] Received command 0x46574c44
1,586,675 UART: [fwproc] Received Image of size 118548 bytes
2,932,091 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,867 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,336 >>> mbox cmd response: success
3,130,336 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,131,528 UART: [afmc] ++
3,131,696 UART: [afmc] CDI.KEYID = 6
3,132,058 UART: [afmc] SUBJECT.KEYID = 7
3,132,483 UART: [afmc] AUTHORITY.KEYID = 5
3,167,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,364 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,047 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,867 UART: [afmc] --
3,210,983 UART: [cold-reset] --
3,212,011 UART: [state] Locking Datavault
3,213,122 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,726 UART: [state] Locking ICCM
3,214,330 UART: [exit] Launching FMC @ 0x40000130
3,219,660 UART:
3,219,676 UART: Running Caliptra FMC ...
3,220,084 UART:
3,220,138 UART: [state] CFI Enabled
3,230,590 UART: [fht] FMC Alias Private Key: 7
3,349,652 UART: [art] Extend RT PCRs Done
3,350,080 UART: [art] Lock RT PCRs Done
3,351,584 UART: [art] Populate DV Done
3,359,889 UART: [fht] FMC Alias Private Key: 7
3,360,967 UART: [art] Derive CDI
3,361,247 UART: [art] Store in slot 0x4
3,447,259 UART: [art] Derive Key Pair
3,447,619 UART: [art] Store priv key in slot 0x5
3,461,456 UART: [art] Derive Key Pair - Done
3,476,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,161 UART: [art] PUB.X = 7AB4CBA03BCBBFE34CC715E31226632EED33007BB41487C8A8E4FE7925F91156F1343DFEAC1D6799A643A5C7E424A8AB
3,498,925 UART: [art] PUB.Y = 56FEAF575BE3E29483CFC446592A8AF6463ECA7AA7EDF64784EB092BF09C1C4E4D08D50327BEA2054D336BBC35C916B6
3,505,879 UART: [art] SIG.R = 92E8A166A725AB5F343A938F12F65F771B518FCFBA9621C436FDF5C3BF5E432EA42EE8351F807F211957FBBBE117E7CF
3,512,663 UART: [art] SIG.S = D77D90400A2DD8362F7565DB4C677C2F10E0CE1A19D0B8C2719CB829B9640AF0176471C10403BA48A353068F8AAC750D
3,536,813 UART: Caliptra RT
3,537,064 UART: [state] CFI Enabled
3,657,769 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,437 UART: [rt]cmd =0x50435245, len=56
3,689,847 >>> mbox cmd response: failed
3,689,847 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,391 UART: [rt]cmd =0x50435245, len=56
3,720,751 >>> mbox cmd response: failed
3,720,751 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,449 UART: [rt]cmd =0x50435245, len=56
3,751,917 >>> mbox cmd response: failed
3,751,917 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,739 UART: [rt]cmd =0x50435245, len=56
3,783,149 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,495 ready_for_fw is high
1,362,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,150 >>> mbox cmd response: success
2,981,150 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,042,827 UART:
3,042,843 UART: Running Caliptra FMC ...
3,043,251 UART:
3,043,305 UART: [state] CFI Enabled
3,053,651 UART: [fht] FMC Alias Private Key: 7
3,173,107 UART: [art] Extend RT PCRs Done
3,173,535 UART: [art] Lock RT PCRs Done
3,174,879 UART: [art] Populate DV Done
3,183,250 UART: [fht] FMC Alias Private Key: 7
3,184,414 UART: [art] Derive CDI
3,184,694 UART: [art] Store in slot 0x4
3,270,432 UART: [art] Derive Key Pair
3,270,792 UART: [art] Store priv key in slot 0x5
3,284,337 UART: [art] Derive Key Pair - Done
3,298,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,614 UART: [art] PUB.X = 59C90DA25EA2CE72CEAAED0EA114DD085A674580805F26A8E95C0A83C9A0F560E764344B935D4A3956AA51DB90873EE8
3,322,382 UART: [art] PUB.Y = A736EDF276AD9E4E49CE0155FFB49CBD51FFCF70141873B9906D3F5F2BFE7572F85847B6E5020C9A6E54037A4CF1FC36
3,329,334 UART: [art] SIG.R = 3B3FCB71C10471B19D2F8156413F19011911ABE1B9BD0910DBE38F3B4A27C97B6424844A3DE03E7715BE917FF123ABFF
3,336,103 UART: [art] SIG.S = A614EEF23A381B1749F0393C41B762D35D638BCEBEBCB68A848F3752A7443660A1AD8FDFBC2D014E4E9168B77EBC246B
3,359,536 UART: Caliptra RT
3,359,787 UART: [state] CFI Enabled
3,480,217 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,153 UART: [rt]cmd =0x50435245, len=56
3,512,435 >>> mbox cmd response: failed
3,512,435 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,173 UART: [rt]cmd =0x50435245, len=56
3,543,569 >>> mbox cmd response: failed
3,543,569 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,385 UART: [rt]cmd =0x50435245, len=56
3,574,461 >>> mbox cmd response: failed
3,574,461 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,291 UART: [rt]cmd =0x50435245, len=56
3,605,591 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,116 UART: [kat] SHA2-256
882,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,162 UART: [kat] ++
886,314 UART: [kat] sha1
890,474 UART: [kat] SHA2-256
892,412 UART: [kat] SHA2-384
895,039 UART: [kat] SHA2-512-ACC
896,940 UART: [kat] ECC-384
902,559 UART: [kat] HMAC-384Kdf
907,229 UART: [kat] LMS
1,475,425 UART: [kat] --
1,476,114 UART: [cold-reset] ++
1,476,530 UART: [fht] Storing FHT @ 0x50003400
1,479,231 UART: [idev] ++
1,479,399 UART: [idev] CDI.KEYID = 6
1,479,759 UART: [idev] SUBJECT.KEYID = 7
1,480,183 UART: [idev] UDS.KEYID = 0
1,480,528 ready_for_fw is high
1,480,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,493 UART: [idev] Erasing UDS.KEYID = 0
1,505,035 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,733 UART: [idev] --
1,514,578 UART: [ldev] ++
1,514,746 UART: [ldev] CDI.KEYID = 6
1,515,109 UART: [ldev] SUBJECT.KEYID = 5
1,515,535 UART: [ldev] AUTHORITY.KEYID = 7
1,515,998 UART: [ldev] FE.KEYID = 1
1,521,188 UART: [ldev] Erasing FE.KEYID = 1
1,546,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,901 UART: [ldev] --
1,586,276 UART: [fwproc] Waiting for Commands...
1,587,011 UART: [fwproc] Received command 0x46574c44
1,587,802 UART: [fwproc] Received Image of size 118548 bytes
2,932,938 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,660 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,878 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,241 >>> mbox cmd response: success
3,131,241 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,132,419 UART: [afmc] ++
3,132,587 UART: [afmc] CDI.KEYID = 6
3,132,949 UART: [afmc] SUBJECT.KEYID = 7
3,133,374 UART: [afmc] AUTHORITY.KEYID = 5
3,168,343 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,703 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,483 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,192 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,075 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,758 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,828 UART: [afmc] --
3,211,944 UART: [cold-reset] --
3,212,728 UART: [state] Locking Datavault
3,213,985 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,589 UART: [state] Locking ICCM
3,215,097 UART: [exit] Launching FMC @ 0x40000130
3,220,427 UART:
3,220,443 UART: Running Caliptra FMC ...
3,220,851 UART:
3,220,994 UART: [state] CFI Enabled
3,231,856 UART: [fht] FMC Alias Private Key: 7
3,351,192 UART: [art] Extend RT PCRs Done
3,351,620 UART: [art] Lock RT PCRs Done
3,353,036 UART: [art] Populate DV Done
3,361,267 UART: [fht] FMC Alias Private Key: 7
3,362,429 UART: [art] Derive CDI
3,362,709 UART: [art] Store in slot 0x4
3,448,201 UART: [art] Derive Key Pair
3,448,561 UART: [art] Store priv key in slot 0x5
3,461,578 UART: [art] Derive Key Pair - Done
3,476,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,671 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,436 UART: [art] PUB.X = 6FB294EB0388FC8BC73F21A1D259ADC85D894B7265619A3D887D3F2D303F74515F22BC0302BF1025BF72D791D31FE55E
3,499,203 UART: [art] PUB.Y = 1F1AC782EE9BE31AEB373F29216BD78F73ECC2D0E057522E29343D8C2FB03D64E731A758C571D9C98BD93D7AE79142D3
3,506,163 UART: [art] SIG.R = 8C1E0BAC4ED0B78839BCD438D63EF6D727B6514DF27947A5711746DE126472B309CED5D75F1CD31F3D516E25AEDD9F73
3,512,939 UART: [art] SIG.S = 26E69E1EFC605B003340A011BF3579D8D1FE53145B505BF21EA093464E0738092F629693F74ED274647CD9D03D3E7A67
3,536,511 UART: Caliptra RT
3,536,854 UART: [state] CFI Enabled
3,656,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,656 UART: [rt]cmd =0x50435245, len=56
3,689,124 >>> mbox cmd response: failed
3,689,124 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,576 UART: [rt]cmd =0x50435245, len=56
3,720,098 >>> mbox cmd response: failed
3,720,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,594 UART: [rt]cmd =0x50435245, len=56
3,750,960 >>> mbox cmd response: failed
3,750,960 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,560 UART: [rt]cmd =0x50435245, len=56
3,781,952 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,508 ready_for_fw is high
1,362,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,213 >>> mbox cmd response: success
2,981,213 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
3,042,350 UART:
3,042,366 UART: Running Caliptra FMC ...
3,042,774 UART:
3,042,917 UART: [state] CFI Enabled
3,053,439 UART: [fht] FMC Alias Private Key: 7
3,173,085 UART: [art] Extend RT PCRs Done
3,173,513 UART: [art] Lock RT PCRs Done
3,175,119 UART: [art] Populate DV Done
3,183,262 UART: [fht] FMC Alias Private Key: 7
3,184,382 UART: [art] Derive CDI
3,184,662 UART: [art] Store in slot 0x4
3,270,780 UART: [art] Derive Key Pair
3,271,140 UART: [art] Store priv key in slot 0x5
3,284,579 UART: [art] Derive Key Pair - Done
3,299,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,698 UART: [art] PUB.X = 69297235B88571052BA99D7395435B08D163A265459891C4A95B8ABDBE0681764DABB3292239295F2B7F5786C83B5C9C
3,322,449 UART: [art] PUB.Y = 1E9A84F2983F9704C6756151581D7F21EDF57321814F041A088D27D993C1C4C312289D37F675B2AA269D0C7C25A9FAC5
3,329,383 UART: [art] SIG.R = 71B85509535891E94AD12A2F5D4763B3B7A9EEC99564B5C7B86337CC057DABE454B545A1E344A343A9C05ECC05C45C8C
3,336,150 UART: [art] SIG.S = 784D3D636B3CF42E576543419D75D577970510C1681A8A07136CFDB583031354945EB95924FD4C54C823F69BA058366C
3,360,127 UART: Caliptra RT
3,360,470 UART: [state] CFI Enabled
3,479,767 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,317 UART: [rt]cmd =0x50435245, len=56
3,511,839 >>> mbox cmd response: failed
3,511,839 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,529 UART: [rt]cmd =0x50435245, len=56
3,543,111 >>> mbox cmd response: failed
3,543,111 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,811 UART: [rt]cmd =0x50435245, len=56
3,574,271 >>> mbox cmd response: failed
3,574,271 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,907 UART: [rt]cmd =0x50435245, len=56
3,605,161 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,399 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
891,284 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,388 UART: [kat] ++
895,540 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,391 UART: [kat] SHA2-512-ACC
906,292 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,801 UART: [kat] LMS
1,169,113 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,582 UART: [fht] FHT @ 0x50003400
1,173,284 UART: [idev] ++
1,173,452 UART: [idev] CDI.KEYID = 6
1,173,813 UART: [idev] SUBJECT.KEYID = 7
1,174,238 UART: [idev] UDS.KEYID = 0
1,174,584 ready_for_fw is high
1,174,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,695 UART: [idev] Sha1 KeyId Algorithm
1,207,621 UART: [idev] --
1,208,702 UART: [ldev] ++
1,208,870 UART: [ldev] CDI.KEYID = 6
1,209,234 UART: [ldev] SUBJECT.KEYID = 5
1,209,661 UART: [ldev] AUTHORITY.KEYID = 7
1,210,124 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,240,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,400 UART: [ldev] --
1,279,851 UART: [fwproc] Wait for Commands...
1,280,488 UART: [fwproc] Recv command 0x46574c44
1,281,221 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,121 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,296 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,675 >>> mbox cmd response: success
2,823,675 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,824,695 UART: [afmc] ++
2,824,863 UART: [afmc] CDI.KEYID = 6
2,825,226 UART: [afmc] SUBJECT.KEYID = 7
2,825,652 UART: [afmc] AUTHORITY.KEYID = 5
2,861,077 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,556 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,257 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,054 UART: [afmc] --
2,904,003 UART: [cold-reset] --
2,904,951 UART: [state] Locking Datavault
2,906,062 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,666 UART: [state] Locking ICCM
2,907,322 UART: [exit] Launching FMC @ 0x40000130
2,912,652 UART:
2,912,668 UART: Running Caliptra FMC ...
2,913,076 UART:
2,913,130 UART: [state] CFI Enabled
2,923,590 UART: [fht] FMC Alias Private Key: 7
3,042,740 UART: [art] Extend RT PCRs Done
3,043,168 UART: [art] Lock RT PCRs Done
3,044,880 UART: [art] Populate DV Done
3,053,221 UART: [fht] FMC Alias Private Key: 7
3,054,293 UART: [art] Derive CDI
3,054,573 UART: [art] Store in slot 0x4
3,140,326 UART: [art] Derive Key Pair
3,140,686 UART: [art] Store priv key in slot 0x5
3,153,860 UART: [art] Derive Key Pair - Done
3,168,617 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,741 UART: [art] PUB.X = 18F112A2407CCAD2435C1AA1600CAA733751898AC4A53964E53333B374D9B07DF7ADF68C53A776814BEF9D1BCC0D492F
3,191,513 UART: [art] PUB.Y = 25E4CAAAD5D9B33897E91C6E2FB04A3EE325559EFB5023365429764C249806AC818C24F4127BDAFAB5EDDF065894FEB8
3,198,469 UART: [art] SIG.R = 98E28FBBD56DC01006B224052531ADE8ED3DB72A02586079C031EB091415FD145148FE7B314FA9EFF7D35A38379B068E
3,205,228 UART: [art] SIG.S = A0EEE018804B9DC2874ED79F66D97B714F438E7CE002DA18990B976E795D75B8D5D2F47D573CA8AFCA7EFE24E8C3D1F3
3,229,766 UART: Caliptra RT
3,230,017 UART: [state] CFI Enabled
3,350,077 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,763 UART: [rt]cmd =0x50435245, len=56
3,382,015 >>> mbox cmd response: failed
3,382,015 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,693 UART: [rt]cmd =0x50435245, len=56
3,413,029 >>> mbox cmd response: failed
3,413,029 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,839 UART: [rt]cmd =0x50435245, len=56
3,444,397 >>> mbox cmd response: failed
3,444,397 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,293 UART: [rt]cmd =0x50435245, len=56
3,475,837 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,556 ready_for_fw is high
1,059,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,283 >>> mbox cmd response: success
2,677,283 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,740,004 UART:
2,740,020 UART: Running Caliptra FMC ...
2,740,428 UART:
2,740,482 UART: [state] CFI Enabled
2,750,910 UART: [fht] FMC Alias Private Key: 7
2,869,530 UART: [art] Extend RT PCRs Done
2,869,958 UART: [art] Lock RT PCRs Done
2,871,602 UART: [art] Populate DV Done
2,879,783 UART: [fht] FMC Alias Private Key: 7
2,880,891 UART: [art] Derive CDI
2,881,171 UART: [art] Store in slot 0x4
2,967,030 UART: [art] Derive Key Pair
2,967,390 UART: [art] Store priv key in slot 0x5
2,980,466 UART: [art] Derive Key Pair - Done
2,994,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,083 UART: [art] PUB.X = 077A5A269AE0983F6C2B9372F54051EBD65F8236D5C4D6C8D6678EE8FB23BF08FA2F18F75AA57D3BA4E7F2245733A442
3,017,855 UART: [art] PUB.Y = BDCB38D5AB312E025AD1EDF5C45EB925ABD079D523C63F0C7FCD754BFBDD60FEC7274C51753FCFEF0DF79DE5CAC9278E
3,024,830 UART: [art] SIG.R = 1C61E9BA7D9D101D7C588A80AEE8EB216B6DB1157E19C06AC62AF3E5B70CA41B1664A39AE50B2ED7845DB83B685F1BBA
3,031,614 UART: [art] SIG.S = A2C235E0569C64F3CCE5409F92FE66A64EDFA2AEB22B2B81E149F8764C1EEE968043F16FFDAE74CD4CC463CF70730869
3,055,237 UART: Caliptra RT
3,055,488 UART: [state] CFI Enabled
3,174,787 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,703 UART: [rt]cmd =0x50435245, len=56
3,206,925 >>> mbox cmd response: failed
3,206,925 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,715 UART: [rt]cmd =0x50435245, len=56
3,238,167 >>> mbox cmd response: failed
3,238,167 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,267,807 UART: [rt]cmd =0x50435245, len=56
3,269,467 >>> mbox cmd response: failed
3,269,467 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,299,125 UART: [rt]cmd =0x50435245, len=56
3,300,443 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Unprovisioned
86,018 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
88,013 UART: [kat] SHA2-256
891,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,667 UART: [kat] ++
895,819 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
916,324 UART: [kat] HMAC-384Kdf
920,860 UART: [kat] LMS
1,169,172 UART: [kat] --
1,170,181 UART: [cold-reset] ++
1,170,591 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,174,695 ready_for_fw is high
1,174,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,968 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,105 UART: [ldev] ++
1,210,273 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,064 UART: [ldev] AUTHORITY.KEYID = 7
1,211,527 UART: [ldev] FE.KEYID = 1
1,216,475 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,947 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,324 UART: [fwproc] Wait for Commands...
1,283,001 UART: [fwproc] Recv command 0x46574c44
1,283,734 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,079 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,486 >>> mbox cmd response: success
2,827,486 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,828,644 UART: [afmc] ++
2,828,812 UART: [afmc] CDI.KEYID = 6
2,829,175 UART: [afmc] SUBJECT.KEYID = 7
2,829,601 UART: [afmc] AUTHORITY.KEYID = 5
2,865,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,692 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,573 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,274 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,133 UART: [afmc] --
2,908,974 UART: [cold-reset] --
2,909,772 UART: [state] Locking Datavault
2,910,745 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,349 UART: [state] Locking ICCM
2,911,859 UART: [exit] Launching FMC @ 0x40000130
2,917,189 UART:
2,917,205 UART: Running Caliptra FMC ...
2,917,613 UART:
2,917,756 UART: [state] CFI Enabled
2,927,908 UART: [fht] FMC Alias Private Key: 7
3,047,010 UART: [art] Extend RT PCRs Done
3,047,438 UART: [art] Lock RT PCRs Done
3,049,050 UART: [art] Populate DV Done
3,057,433 UART: [fht] FMC Alias Private Key: 7
3,058,589 UART: [art] Derive CDI
3,058,869 UART: [art] Store in slot 0x4
3,144,642 UART: [art] Derive Key Pair
3,145,002 UART: [art] Store priv key in slot 0x5
3,158,800 UART: [art] Derive Key Pair - Done
3,173,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,188 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,953 UART: [art] PUB.X = A2EDDE729F127424189E2FC7D648B3292CAF53C332DC33BC09B30247BBCEF690329E218F040AA1A55E07F093C2A15240
3,196,714 UART: [art] PUB.Y = 4E6C44E63C15C2C5B7A0F0EEFE934252D9184AA221C396FC33EB699DA14898DAB6206DC70F50CF47BC91EBE1B4EE09C9
3,203,676 UART: [art] SIG.R = 4B0BF809DE273E0C65EE4C8421F03A484D65C0C9B9E5293906C4B8529B48045E3296D05ADAB543C4094C74CD9CFF188D
3,210,434 UART: [art] SIG.S = C837EDF8BB7621C80DF7BEE9622F326E014D12443F8B7DFC3644F205A0B0072C68560BA929291AFDF392A756723D6C8D
3,234,463 UART: Caliptra RT
3,234,806 UART: [state] CFI Enabled
3,354,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,243 UART: [rt]cmd =0x50435245, len=56
3,386,719 >>> mbox cmd response: failed
3,386,719 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,609 UART: [rt]cmd =0x50435245, len=56
3,417,925 >>> mbox cmd response: failed
3,417,925 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,545 UART: [rt]cmd =0x50435245, len=56
3,449,157 >>> mbox cmd response: failed
3,449,157 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,809 UART: [rt]cmd =0x50435245, len=56
3,480,369 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,423 ready_for_fw is high
1,059,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,955 >>> mbox cmd response: success
2,676,955 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,739,330 UART:
2,739,346 UART: Running Caliptra FMC ...
2,739,754 UART:
2,739,897 UART: [state] CFI Enabled
2,750,547 UART: [fht] FMC Alias Private Key: 7
2,870,073 UART: [art] Extend RT PCRs Done
2,870,501 UART: [art] Lock RT PCRs Done
2,872,281 UART: [art] Populate DV Done
2,880,298 UART: [fht] FMC Alias Private Key: 7
2,881,266 UART: [art] Derive CDI
2,881,546 UART: [art] Store in slot 0x4
2,967,129 UART: [art] Derive Key Pair
2,967,489 UART: [art] Store priv key in slot 0x5
2,980,891 UART: [art] Derive Key Pair - Done
2,995,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,074 UART: [art] PUB.X = 0B6B09A02C7BFC5090F65958A77ADF180EF934B79EF8D7EA4E678EE46AAE19818ED718846C8CE77D2D701A98D9E8B995
3,018,847 UART: [art] PUB.Y = 35EA7F38D2605E4018991F5CDFDFE242AF41913B256C76CB09DE13E2BF605D381F9CC3952EBC38A8009B260FD5820BD0
3,025,776 UART: [art] SIG.R = CEE6B6398ED0C4350897A0CA3EC4683C4178A6F23FBD61888614462D64FC861774B84295AFC2CD71E466670E21EE519C
3,032,542 UART: [art] SIG.S = 4A4326D8B63B08001BA196FFF7680F4F6CE50B0EEF86722BB460BBF8ADE25844C032BA85B69A1B81E32B711DB2ADC426
3,056,310 UART: Caliptra RT
3,056,653 UART: [state] CFI Enabled
3,176,302 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,434 UART: [rt]cmd =0x50435245, len=56
3,208,972 >>> mbox cmd response: failed
3,208,972 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,808 UART: [rt]cmd =0x50435245, len=56
3,240,074 >>> mbox cmd response: failed
3,240,074 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,870 UART: [rt]cmd =0x50435245, len=56
3,270,984 >>> mbox cmd response: failed
3,270,984 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,820 UART: [rt]cmd =0x50435245, len=56
3,302,228 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,875 UART: [kat] SHA2-256
903,815 UART: [kat] SHA2-384
906,530 UART: [kat] SHA2-512-ACC
908,431 UART: [kat] ECC-384
917,884 UART: [kat] HMAC-384Kdf
922,588 UART: [kat] LMS
1,170,916 UART: [kat] --
1,171,759 UART: [cold-reset] ++
1,172,259 UART: [fht] FHT @ 0x50003400
1,175,000 UART: [idev] ++
1,175,168 UART: [idev] CDI.KEYID = 6
1,175,528 UART: [idev] SUBJECT.KEYID = 7
1,175,952 UART: [idev] UDS.KEYID = 0
1,176,297 ready_for_fw is high
1,176,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,201,111 UART: [idev] Sha1 KeyId Algorithm
1,209,669 UART: [idev] --
1,210,635 UART: [ldev] ++
1,210,803 UART: [ldev] CDI.KEYID = 6
1,211,166 UART: [ldev] SUBJECT.KEYID = 5
1,211,592 UART: [ldev] AUTHORITY.KEYID = 7
1,212,055 UART: [ldev] FE.KEYID = 1
1,217,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,447 UART: [ldev] --
1,282,934 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,715 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,070 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,325 >>> mbox cmd response: success
2,827,325 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,828,451 UART: [afmc] ++
2,828,619 UART: [afmc] CDI.KEYID = 6
2,828,981 UART: [afmc] SUBJECT.KEYID = 7
2,829,406 UART: [afmc] AUTHORITY.KEYID = 5
2,864,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,218 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,558 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,259 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,001 UART: [afmc] --
2,907,935 UART: [cold-reset] --
2,908,621 UART: [state] Locking Datavault
2,910,074 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,678 UART: [state] Locking ICCM
2,911,260 UART: [exit] Launching FMC @ 0x40000130
2,916,590 UART:
2,916,606 UART: Running Caliptra FMC ...
2,917,014 UART:
2,917,068 UART: [state] CFI Enabled
2,927,612 UART: [fht] FMC Alias Private Key: 7
3,046,936 UART: [art] Extend RT PCRs Done
3,047,364 UART: [art] Lock RT PCRs Done
3,048,740 UART: [art] Populate DV Done
3,056,995 UART: [fht] FMC Alias Private Key: 7
3,058,027 UART: [art] Derive CDI
3,058,307 UART: [art] Store in slot 0x4
3,144,716 UART: [art] Derive Key Pair
3,145,076 UART: [art] Store priv key in slot 0x5
3,157,962 UART: [art] Derive Key Pair - Done
3,172,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,083 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,848 UART: [art] PUB.X = D95E65B2B53F4880E9C12A9249DC16A10BF69E246F472CF2D7AE0188A5E78B8559F9426D58670D238DC9786B43725DC2
3,195,609 UART: [art] PUB.Y = 71D3C43C5F643773C488D78A34AFA7E2E0CFB9161E4A9E26769B12759A0A6664FAA55983F30A0D17546D7CD235D6BA97
3,202,554 UART: [art] SIG.R = BB10187028B376BC74B99AE52FC48DF8B41EE0723F6F3D92C1B702E3BE319EBDFCEFAE022566C1D186F4AE44B021C198
3,209,334 UART: [art] SIG.S = 6EA326C66073D8C434BFA8421E1954A9DF55EFF5983576466E139DDFEF6C131607F4418CB0571AD4E25F2877D7E3CDD1
3,233,523 UART: Caliptra RT
3,233,774 UART: [state] CFI Enabled
3,353,093 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,075 UART: [rt]cmd =0x50435245, len=56
3,385,585 >>> mbox cmd response: failed
3,385,585 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,063 UART: [rt]cmd =0x50435245, len=56
3,416,537 >>> mbox cmd response: failed
3,416,537 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,327 UART: [rt]cmd =0x50435245, len=56
3,447,455 >>> mbox cmd response: failed
3,447,455 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,133 UART: [rt]cmd =0x50435245, len=56
3,478,413 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,695 ready_for_fw is high
1,059,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,884 >>> mbox cmd response: success
2,678,884 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,741,051 UART:
2,741,067 UART: Running Caliptra FMC ...
2,741,475 UART:
2,741,529 UART: [state] CFI Enabled
2,752,233 UART: [fht] FMC Alias Private Key: 7
2,871,189 UART: [art] Extend RT PCRs Done
2,871,617 UART: [art] Lock RT PCRs Done
2,873,027 UART: [art] Populate DV Done
2,881,182 UART: [fht] FMC Alias Private Key: 7
2,882,210 UART: [art] Derive CDI
2,882,490 UART: [art] Store in slot 0x4
2,968,081 UART: [art] Derive Key Pair
2,968,441 UART: [art] Store priv key in slot 0x5
2,981,755 UART: [art] Derive Key Pair - Done
2,996,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,274 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,039 UART: [art] PUB.X = C293B8857AEF96A2ECB0D0D925BFE1875BE5F4CC0286D4A06D657A0DB79C92E5704CEFE7B25DEAFC8284E08AFAE90D3C
3,019,826 UART: [art] PUB.Y = 4AB23453A4810026A1C44A90D826E19024D61CABBC2A6224C4BF5A53253FA7197BC91924C04CB287D8E3C03817389282
3,026,750 UART: [art] SIG.R = C3DA3BF3147CE0D81D1692AD19573246A645BA75A9D95528040BFA05E8100D5B61AFE7E4CA9BFF0380E1DC2F25EBF09B
3,033,521 UART: [art] SIG.S = 12BA3FA23CD1451EEC5E5D989E28E9D2BE429621B29EBCBF27E64C0133B4938352680EE5E6A77A01B595DCA73EAEFA63
3,057,394 UART: Caliptra RT
3,057,645 UART: [state] CFI Enabled
3,177,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,552 UART: [rt]cmd =0x50435245, len=56
3,209,626 >>> mbox cmd response: failed
3,209,626 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,478 UART: [rt]cmd =0x50435245, len=56
3,241,010 >>> mbox cmd response: failed
3,241,010 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,786 UART: [rt]cmd =0x50435245, len=56
3,272,244 >>> mbox cmd response: failed
3,272,244 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,790 UART: [rt]cmd =0x50435245, len=56
3,303,096 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,933 UART: [state] LifecycleState = Unprovisioned
86,588 UART: [state] DebugLocked = No
87,172 UART: [state] WD Timer not started. Device not locked for debugging
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,552 UART: [kat] SHA2-256
904,492 UART: [kat] SHA2-384
907,387 UART: [kat] SHA2-512-ACC
909,288 UART: [kat] ECC-384
918,637 UART: [kat] HMAC-384Kdf
923,351 UART: [kat] LMS
1,171,679 UART: [kat] --
1,172,406 UART: [cold-reset] ++
1,172,840 UART: [fht] FHT @ 0x50003400
1,175,699 UART: [idev] ++
1,175,867 UART: [idev] CDI.KEYID = 6
1,176,227 UART: [idev] SUBJECT.KEYID = 7
1,176,651 UART: [idev] UDS.KEYID = 0
1,176,996 ready_for_fw is high
1,176,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,177 UART: [idev] Erasing UDS.KEYID = 0
1,200,400 UART: [idev] Sha1 KeyId Algorithm
1,208,716 UART: [idev] --
1,209,678 UART: [ldev] ++
1,209,846 UART: [ldev] CDI.KEYID = 6
1,210,209 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,258 UART: [ldev] Erasing FE.KEYID = 1
1,242,439 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,205 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,136 UART: [ldev] --
1,281,629 UART: [fwproc] Wait for Commands...
1,282,303 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,496 >>> mbox cmd response: success
2,826,496 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,827,614 UART: [afmc] ++
2,827,782 UART: [afmc] CDI.KEYID = 6
2,828,144 UART: [afmc] SUBJECT.KEYID = 7
2,828,569 UART: [afmc] AUTHORITY.KEYID = 5
2,863,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,251 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,544 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,306 UART: [afmc] --
2,906,308 UART: [cold-reset] --
2,907,164 UART: [state] Locking Datavault
2,908,389 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,993 UART: [state] Locking ICCM
2,909,643 UART: [exit] Launching FMC @ 0x40000130
2,914,973 UART:
2,914,989 UART: Running Caliptra FMC ...
2,915,397 UART:
2,915,540 UART: [state] CFI Enabled
2,926,116 UART: [fht] FMC Alias Private Key: 7
3,044,916 UART: [art] Extend RT PCRs Done
3,045,344 UART: [art] Lock RT PCRs Done
3,046,672 UART: [art] Populate DV Done
3,054,565 UART: [fht] FMC Alias Private Key: 7
3,055,557 UART: [art] Derive CDI
3,055,837 UART: [art] Store in slot 0x4
3,141,798 UART: [art] Derive Key Pair
3,142,158 UART: [art] Store priv key in slot 0x5
3,155,066 UART: [art] Derive Key Pair - Done
3,169,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,390 UART: [art] PUB.X = 9D1EA674830E3E6324E9BAAC8E8AA51A381617967F244BB9F15C16829CDBD7337A9255D14F1F1B5410334F7815DC3BBD
3,193,163 UART: [art] PUB.Y = C0CEF2A104B266CCD83C8884B4B63372008647C269BC648BCD6D7157796A373919AE5553C434BB1FBE400F6D98A65522
3,200,085 UART: [art] SIG.R = 57A38173D823D4DD956DCF83317906BB82F40E873DBA8DD58F780DE6005243435F71DD74850007546DD13B72A164952B
3,206,793 UART: [art] SIG.S = 2FC4479819D6D4AF038EF5EE31E26AFA15E992B37338BE613158E06CAAB5DD5388AE7770C684104C8EE97EC22FDEDA19
3,230,646 UART: Caliptra RT
3,230,989 UART: [state] CFI Enabled
3,350,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,059 UART: [rt]cmd =0x50435245, len=56
3,382,239 >>> mbox cmd response: failed
3,382,239 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,759 UART: [rt]cmd =0x50435245, len=56
3,413,279 >>> mbox cmd response: failed
3,413,279 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,011 UART: [rt]cmd =0x50435245, len=56
3,444,287 >>> mbox cmd response: failed
3,444,287 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,945 UART: [rt]cmd =0x50435245, len=56
3,475,063 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,598 ready_for_fw is high
1,060,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,447 >>> mbox cmd response: success
2,680,447 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
2,742,158 UART:
2,742,174 UART: Running Caliptra FMC ...
2,742,582 UART:
2,742,725 UART: [state] CFI Enabled
2,753,545 UART: [fht] FMC Alias Private Key: 7
2,872,567 UART: [art] Extend RT PCRs Done
2,872,995 UART: [art] Lock RT PCRs Done
2,874,737 UART: [art] Populate DV Done
2,882,836 UART: [fht] FMC Alias Private Key: 7
2,883,938 UART: [art] Derive CDI
2,884,218 UART: [art] Store in slot 0x4
2,970,227 UART: [art] Derive Key Pair
2,970,587 UART: [art] Store priv key in slot 0x5
2,983,455 UART: [art] Derive Key Pair - Done
2,998,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,537 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,302 UART: [art] PUB.X = 818EF23C32CFBCC91C55363B8B9A46AC4877D81E972A9BB457D9CE6DF2F41427A77AF0A51991F8DF1FEEBDAE61A93094
3,021,090 UART: [art] PUB.Y = DFE1599999BB1744F71F0C530831290E63391CDD5D0EA265FC6C9276CDEA872C3DAC825EE6C68BA501CC76DE2166FC2C
3,028,039 UART: [art] SIG.R = 4B409944B9D119CE80F087FB9E68BDF66F677C9DCC7E162133CCD6F05315CB6B2026D15D8634E3F80BCAEF7FC2466169
3,034,816 UART: [art] SIG.S = 4D2E280787B3E2B9FD59F7A9BB85F168BE7CAC514B8D47E662D7B16DF368D984D2424A2D32CE2E4AD70A6D679A5544B4
3,058,976 UART: Caliptra RT
3,059,319 UART: [state] CFI Enabled
3,179,245 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,921 UART: [rt]cmd =0x50435245, len=56
3,211,335 >>> mbox cmd response: failed
3,211,335 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,967 UART: [rt]cmd =0x50435245, len=56
3,242,337 >>> mbox cmd response: failed
3,242,337 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,971 UART: [rt]cmd =0x50435245, len=56
3,273,461 >>> mbox cmd response: failed
3,273,461 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,195 UART: [rt]cmd =0x50435245, len=56
3,304,669 >>> mbox cmd response: failed
test test_pcr::test_extend_pcr_cmd_reserved_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,082 UART:
192,499 UART: Running Caliptra ROM ...
193,665 UART:
193,820 UART: [state] CFI Enabled
265,796 UART: [state] LifecycleState = Unprovisioned
267,788 UART: [state] DebugLocked = No
270,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,448 UART: [kat] SHA2-256
444,183 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,644 UART: [kat] ++
455,250 UART: [kat] sha1
466,820 UART: [kat] SHA2-256
469,536 UART: [kat] SHA2-384
476,736 UART: [kat] SHA2-512-ACC
479,041 UART: [kat] ECC-384
2,767,203 UART: [kat] HMAC-384Kdf
2,780,664 UART: [kat] LMS
3,970,964 UART: [kat] --
3,975,117 UART: [cold-reset] ++
3,977,547 UART: [fht] Storing FHT @ 0x50003400
3,989,960 UART: [idev] ++
3,990,523 UART: [idev] CDI.KEYID = 6
3,991,577 UART: [idev] SUBJECT.KEYID = 7
3,992,753 UART: [idev] UDS.KEYID = 0
3,993,809 ready_for_fw is high
3,994,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,151 UART: [idev] Erasing UDS.KEYID = 0
7,327,251 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,910 UART: [idev] --
7,353,307 UART: [ldev] ++
7,353,874 UART: [ldev] CDI.KEYID = 6
7,354,846 UART: [ldev] SUBJECT.KEYID = 5
7,356,063 UART: [ldev] AUTHORITY.KEYID = 7
7,357,301 UART: [ldev] FE.KEYID = 1
7,404,780 UART: [ldev] Erasing FE.KEYID = 1
10,739,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,664 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,966 UART: [ldev] --
13,119,174 UART: [fwproc] Waiting for Commands...
13,122,182 UART: [fwproc] Received command 0x46574c44
13,124,369 UART: [fwproc] Received Image of size 118548 bytes
17,228,902 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,672 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,708,876 >>> mbox cmd response: success
17,710,050 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,712,355 UART: [afmc] ++
17,712,946 UART: [afmc] CDI.KEYID = 6
17,713,918 UART: [afmc] SUBJECT.KEYID = 7
17,715,128 UART: [afmc] AUTHORITY.KEYID = 5
21,072,256 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,382 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,825 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,509 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,950 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,345 UART: [afmc] --
23,443,151 UART: [cold-reset] --
23,446,466 UART: [state] Locking Datavault
23,452,414 UART: [state] Locking PCR0, PCR1 and PCR31
23,454,164 UART: [state] Locking ICCM
23,456,808 UART: [exit] Launching FMC @ 0x40000130
23,465,193 UART:
23,465,445 UART: Running Caliptra FMC ...
23,466,551 UART:
23,466,715 UART: [state] CFI Enabled
23,533,787 UART: [fht] FMC Alias Private Key: 7
25,874,439 UART: [art] Extend RT PCRs Done
25,875,671 UART: [art] Lock RT PCRs Done
25,877,244 UART: [art] Populate DV Done
25,882,600 UART: [fht] FMC Alias Private Key: 7
25,884,136 UART: [art] Derive CDI
25,884,950 UART: [art] Store in slot 0x4
25,942,134 UART: [art] Derive Key Pair
25,943,166 UART: [art] Store priv key in slot 0x5
29,235,577 UART: [art] Derive Key Pair - Done
29,248,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,607 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,113 UART: [art] PUB.X = C6225D48E2D671691EE324E5EC2B00A6E3C2D809BAAC484470D9660BBE740F8CC60BC312EF12638DCF8399201686260E
31,546,353 UART: [art] PUB.Y = FB91C903FE7A0C93A15211863EB88E9000855A93F8F865B42EA83E3C1E8B4EDAC2CE9772F2B8FAE8441914BD95ADAF62
31,553,622 UART: [art] SIG.R = 5F96CDBFBF6134E36448F916E2B386FB8420DB99ECABDFF18B2EFD506954A707668DBA460C808A4342DDA8115D9000EC
31,560,961 UART: [art] SIG.S = 9EF164E1C21DB2400533F174DC1F653B7EEA2374AAC928CF499D89CB62E32D582D025C6CEA0A5F1788C14E294CEC538A
32,865,757 UART: Caliptra RT
32,866,489 UART: [state] CFI Enabled
33,044,525 UART: [rt] RT listening for mailbox commands...
33,076,099 UART: [rt]cmd =0x50435252, len=8
33,078,199 >>> mbox cmd response data (8 bytes)
33,079,169 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,109,421 UART: [rt]cmd =0x50435251, len=36
34,277,882 >>> mbox cmd response data (1848 bytes)
34,288,166 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,318,080 UART: [rt]cmd =0x43455246, len=4
34,331,177 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,786,641 ready_for_fw is high
3,787,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,973,863 >>> mbox cmd response: success
17,975,421 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,697,225 UART:
23,697,613 UART: Running Caliptra FMC ...
23,698,734 UART:
23,698,888 UART: [state] CFI Enabled
23,763,675 UART: [fht] FMC Alias Private Key: 7
26,104,404 UART: [art] Extend RT PCRs Done
26,105,630 UART: [art] Lock RT PCRs Done
26,107,362 UART: [art] Populate DV Done
26,112,774 UART: [fht] FMC Alias Private Key: 7
26,114,418 UART: [art] Derive CDI
26,115,229 UART: [art] Store in slot 0x4
26,171,456 UART: [art] Derive Key Pair
26,172,493 UART: [art] Store priv key in slot 0x5
29,465,915 UART: [art] Derive Key Pair - Done
29,478,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,766,910 UART: [art] Erasing AUTHORITY.KEYID = 7
31,768,432 UART: [art] PUB.X = B256E277A5D12F0FFE4EFD62E6CFDF1DB658E332C82CE5262275E1A3D0AF678CF20CA27A2B2D37CF7D07DC5DB19F4682
31,775,685 UART: [art] PUB.Y = 44877564A78CD7F59D2E1B9A8A909B05018E3FE29A009A7AC7258D446C6DBAF79EFB4A7E65E58290FAACF2BA9C9C2707
31,782,935 UART: [art] SIG.R = FCAF13FF2A8A00B2A7F5FAE99463A01C5A075C389F6FFC9D9C3A9A5FDA61A62E0B74B5E52E68224FC2B32084CE25E773
31,790,318 UART: [art] SIG.S = 9D0AB7D90473969F11ABB16FE52ED1F5BC1E63EC9BA5D7CBD01DD598470CB5479149700ED8CC94DBEA05D54A8BC67E6D
33,096,344 UART: Caliptra RT
33,097,068 UART: [state] CFI Enabled
33,272,162 UART: [rt] RT listening for mailbox commands...
33,303,361 UART: [rt]cmd =0x50435252, len=8
33,305,161 >>> mbox cmd response data (8 bytes)
33,306,037 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,336,094 UART: [rt]cmd =0x50435251, len=36
34,506,922 >>> mbox cmd response data (1848 bytes)
34,517,349 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,547,320 UART: [rt]cmd =0x43455246, len=4
34,560,467 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,499 UART:
192,849 UART: Running Caliptra ROM ...
194,307 UART:
603,776 UART: [state] CFI Enabled
621,209 UART: [state] LifecycleState = Unprovisioned
623,152 UART: [state] DebugLocked = No
625,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,322 UART: [kat] SHA2-256
801,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,628 UART: [kat] ++
812,098 UART: [kat] sha1
823,259 UART: [kat] SHA2-256
825,985 UART: [kat] SHA2-384
832,823 UART: [kat] SHA2-512-ACC
835,239 UART: [kat] ECC-384
3,116,680 UART: [kat] HMAC-384Kdf
3,129,479 UART: [kat] LMS
4,319,601 UART: [kat] --
4,325,390 UART: [cold-reset] ++
4,326,617 UART: [fht] Storing FHT @ 0x50003400
4,338,165 UART: [idev] ++
4,338,721 UART: [idev] CDI.KEYID = 6
4,339,713 UART: [idev] SUBJECT.KEYID = 7
4,340,879 UART: [idev] UDS.KEYID = 0
4,341,953 ready_for_fw is high
4,342,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,098 UART: [idev] Erasing UDS.KEYID = 0
7,632,017 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,545 UART: [idev] --
7,658,867 UART: [ldev] ++
7,659,443 UART: [ldev] CDI.KEYID = 6
7,660,401 UART: [ldev] SUBJECT.KEYID = 5
7,661,606 UART: [ldev] AUTHORITY.KEYID = 7
7,662,882 UART: [ldev] FE.KEYID = 1
7,673,767 UART: [ldev] Erasing FE.KEYID = 1
10,963,094 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,257,501 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,272,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,286,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,301,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,319,609 UART: [ldev] --
13,323,798 UART: [fwproc] Waiting for Commands...
13,325,408 UART: [fwproc] Received command 0x46574c44
13,327,585 UART: [fwproc] Received Image of size 118548 bytes
17,431,577 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,923 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,073 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,927 >>> mbox cmd response: success
17,915,490 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
17,918,927 UART: [afmc] ++
17,919,558 UART: [afmc] CDI.KEYID = 6
17,920,464 UART: [afmc] SUBJECT.KEYID = 7
17,921,727 UART: [afmc] AUTHORITY.KEYID = 5
21,238,681 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,891 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,536,145 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,550,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,565,305 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,711 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,601,208 UART: [afmc] --
23,605,338 UART: [cold-reset] --
23,608,649 UART: [state] Locking Datavault
23,612,589 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,330 UART: [state] Locking ICCM
23,615,908 UART: [exit] Launching FMC @ 0x40000130
23,624,289 UART:
23,624,516 UART: Running Caliptra FMC ...
23,625,535 UART:
23,625,677 UART: [state] CFI Enabled
23,633,395 UART: [fht] FMC Alias Private Key: 7
25,973,799 UART: [art] Extend RT PCRs Done
25,975,022 UART: [art] Lock RT PCRs Done
25,976,566 UART: [art] Populate DV Done
25,982,138 UART: [fht] FMC Alias Private Key: 7
25,983,829 UART: [art] Derive CDI
25,984,559 UART: [art] Store in slot 0x4
26,027,792 UART: [art] Derive Key Pair
26,028,787 UART: [art] Store priv key in slot 0x5
29,271,485 UART: [art] Derive Key Pair - Done
29,284,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,298 UART: [art] PUB.X = 0C6A052599FCB561EC388BA7C0BCCBFEFD2F794DC0852AEFF8470AE3D8AD1147326F0F94DD58A142E657AB357FDC65B7
31,573,588 UART: [art] PUB.Y = BE51D2C107477D457CA388A9225079B54AFFBC512B7D6CFB9B0DA733694837065D3C03612AE7544B994302FDF6CD1877
31,580,805 UART: [art] SIG.R = C715AD9F159A7ED92C8060B68F8894AEBCAA925C57B8545B7B9FE84E0197212D8BF70C80522F370560FF421887AB7CE0
31,588,244 UART: [art] SIG.S = ACDFAEEE569C0A56A4CB1FEAE3AE118DD15AAA31273D35FC2CF1DE00FD4E3AA433D89039B5543F9E121537385D989CBE
32,893,215 UART: Caliptra RT
32,893,952 UART: [state] CFI Enabled
33,028,149 UART: [rt] RT listening for mailbox commands...
33,059,786 UART: [rt]cmd =0x50435252, len=8
33,061,906 >>> mbox cmd response data (8 bytes)
33,062,875 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,093,049 UART: [rt]cmd =0x50435251, len=36
34,248,567 >>> mbox cmd response data (1848 bytes)
34,258,817 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,288,696 UART: [rt]cmd =0x43455246, len=4
34,301,654 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
4,129,730 ready_for_fw is high
4,130,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,001 >>> mbox cmd response: success
18,156,662 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
23,795,118 UART:
23,795,521 UART: Running Caliptra FMC ...
23,796,714 UART:
23,796,904 UART: [state] CFI Enabled
23,804,267 UART: [fht] FMC Alias Private Key: 7
26,143,821 UART: [art] Extend RT PCRs Done
26,145,044 UART: [art] Lock RT PCRs Done
26,146,623 UART: [art] Populate DV Done
26,151,932 UART: [fht] FMC Alias Private Key: 7
26,153,630 UART: [art] Derive CDI
26,154,443 UART: [art] Store in slot 0x4
26,196,907 UART: [art] Derive Key Pair
26,197,901 UART: [art] Store priv key in slot 0x5
29,439,622 UART: [art] Derive Key Pair - Done
29,452,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,917 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,429 UART: [art] PUB.X = 2DF9531F110A75CF61095279ABCD95CBC231D01A28BA7C758A7B01B0E0EACF7AE49B2CAF800D518DAA21B3C6D91907A0
31,741,757 UART: [art] PUB.Y = 1D915A496C43C4E00BA1F885C0554AD26D9CA44A268B8F3F7EE063F9584484D5F4195B05CF272C53E4DB1AA0A15D5EFA
31,748,966 UART: [art] SIG.R = 7FF8C5A1FD4D89C1B459B94D827BC2AD6EBED171C23E48BBC38DECEA8CFC1B5C582F25A6AED02543EB9232F3C64D2A26
31,756,434 UART: [art] SIG.S = BBBB21010BC448C227028ED51F9832757857927AACCC4C325146982917B4A6BED1BD548D8A5C976B9B39B4E6A5B99925
33,061,470 UART: Caliptra RT
33,062,188 UART: [state] CFI Enabled
33,195,792 UART: [rt] RT listening for mailbox commands...
33,227,478 UART: [rt]cmd =0x50435252, len=8
33,229,647 >>> mbox cmd response data (8 bytes)
33,230,409 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,260,499 UART: [rt]cmd =0x50435251, len=36
34,415,845 >>> mbox cmd response data (1848 bytes)
34,426,055 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
34,455,805 UART: [rt]cmd =0x43455246, len=4
34,468,697 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,075 writing to cptra_bootfsm_go
192,198 UART:
192,554 UART: Running Caliptra ROM ...
193,739 UART:
193,893 UART: [state] CFI Enabled
266,190 UART: [state] LifecycleState = Unprovisioned
268,111 UART: [state] DebugLocked = No
270,640 UART: [state] WD Timer not started. Device not locked for debugging
274,471 UART: [kat] SHA2-256
454,105 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,908 UART: [kat] ++
465,448 UART: [kat] sha1
476,209 UART: [kat] SHA2-256
478,953 UART: [kat] SHA2-384
484,575 UART: [kat] SHA2-512-ACC
486,950 UART: [kat] ECC-384
2,947,457 UART: [kat] HMAC-384Kdf
2,972,702 UART: [kat] LMS
3,449,154 UART: [kat] --
3,452,828 UART: [cold-reset] ++
3,454,907 UART: [fht] FHT @ 0x50003400
3,465,528 UART: [idev] ++
3,466,094 UART: [idev] CDI.KEYID = 6
3,467,077 UART: [idev] SUBJECT.KEYID = 7
3,468,315 UART: [idev] UDS.KEYID = 0
3,469,234 ready_for_fw is high
3,469,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,470 UART: [idev] Erasing UDS.KEYID = 0
5,977,897 UART: [idev] Sha1 KeyId Algorithm
6,001,344 UART: [idev] --
6,006,136 UART: [ldev] ++
6,006,719 UART: [ldev] CDI.KEYID = 6
6,007,624 UART: [ldev] SUBJECT.KEYID = 5
6,008,838 UART: [ldev] AUTHORITY.KEYID = 7
6,010,071 UART: [ldev] FE.KEYID = 1
6,042,595 UART: [ldev] Erasing FE.KEYID = 1
8,547,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,283,835 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,299,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,315,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,331,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,352,715 UART: [ldev] --
10,359,003 UART: [fwproc] Wait for Commands...
10,360,773 UART: [fwproc] Recv command 0x46574c44
10,362,823 UART: [fwproc] Recv'd Img size: 118548 bytes
13,847,539 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,001,820 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,329,803 >>> mbox cmd response: success
14,330,922 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,334,038 UART: [afmc] ++
14,334,620 UART: [afmc] CDI.KEYID = 6
14,335,639 UART: [afmc] SUBJECT.KEYID = 7
14,336,797 UART: [afmc] AUTHORITY.KEYID = 5
16,876,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,667 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,617,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,633,726 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,314 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,234 UART: [afmc] --
18,676,265 UART: [cold-reset] --
18,680,556 UART: [state] Locking Datavault
18,687,094 UART: [state] Locking PCR0, PCR1 and PCR31
18,688,792 UART: [state] Locking ICCM
18,690,397 UART: [exit] Launching FMC @ 0x40000130
18,698,846 UART:
18,699,077 UART: Running Caliptra FMC ...
18,700,171 UART:
18,700,330 UART: [state] CFI Enabled
18,757,916 UART: [fht] FMC Alias Private Key: 7
20,524,542 UART: [art] Extend RT PCRs Done
20,525,764 UART: [art] Lock RT PCRs Done
20,527,330 UART: [art] Populate DV Done
20,532,740 UART: [fht] FMC Alias Private Key: 7
20,534,381 UART: [art] Derive CDI
20,535,218 UART: [art] Store in slot 0x4
20,590,673 UART: [art] Derive Key Pair
20,591,713 UART: [art] Store priv key in slot 0x5
23,054,636 UART: [art] Derive Key Pair - Done
23,067,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,780,073 UART: [art] Erasing AUTHORITY.KEYID = 7
24,781,571 UART: [art] PUB.X = 0670B1AF0F0F544E2A501929F51F05D453D83BFC57D28EDA919B269E42594E3333232418ADEABB1B12D3E2EA1D831E69
24,788,873 UART: [art] PUB.Y = 54E45F88B635045F98C7A5E47C666222BD38BB08C1B1FDFED2BF1FBF56DDD0F02B9FF9C15A8F653812AD36BD41524F32
24,796,168 UART: [art] SIG.R = C4928A99F8A47E50225D7381C31B6F706A68B6D6B72626C49AEF5D75077D34DA14DBD0F4F89300334643E36AC52660B2
24,803,545 UART: [art] SIG.S = AD4C0FBF59014FBE1E87A53070F460CB70F88F63FBBB23D06AC2128C237F3D31D685CF3874A5F7E7CBCC9D2C1C4916B7
25,782,562 UART: Caliptra RT
25,783,274 UART: [state] CFI Enabled
25,961,924 UART: [rt] RT listening for mailbox commands...
25,993,306 UART: [rt]cmd =0x50435252, len=8
25,995,373 >>> mbox cmd response data (8 bytes)
25,996,121 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,026,146 UART: [rt]cmd =0x50435251, len=36
26,950,377 >>> mbox cmd response data (1848 bytes)
26,960,781 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,990,588 UART: [rt]cmd =0x43455246, len=4
27,003,194 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,459,361 ready_for_fw is high
3,459,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,307 >>> mbox cmd response: success
14,215,954 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,511,713 UART:
18,512,088 UART: Running Caliptra FMC ...
18,513,285 UART:
18,513,457 UART: [state] CFI Enabled
18,579,156 UART: [fht] FMC Alias Private Key: 7
20,346,174 UART: [art] Extend RT PCRs Done
20,347,403 UART: [art] Lock RT PCRs Done
20,349,353 UART: [art] Populate DV Done
20,354,710 UART: [fht] FMC Alias Private Key: 7
20,356,192 UART: [art] Derive CDI
20,356,973 UART: [art] Store in slot 0x4
20,412,053 UART: [art] Derive Key Pair
20,413,094 UART: [art] Store priv key in slot 0x5
22,876,174 UART: [art] Derive Key Pair - Done
22,888,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,601,975 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,485 UART: [art] PUB.X = D68B71E6A985017C8E2FB6373CD644D227F559F55A44F851E22960B09B4877C299F8884EAA7560488E2776AEB90BDFF6
24,610,739 UART: [art] PUB.Y = 78E82DA53F3F2425B70A799D85BE74DFB1A8BEDA1DFDD7FE1CC105FBAF7D6CA7FF3892FBFBC5702B0B48038267478AF2
24,618,047 UART: [art] SIG.R = F54B65CFCC0B9D4E0AD0874845E0E121577FC120465EB7BF43FDF3BFD17A7E50891C3C447FAB0FCC116DFA0127BE7CC0
24,625,482 UART: [art] SIG.S = 0C0C5645D31819AD3A6D6F89D3994E822358E5FE67675800544C4F3CFE0B5482D374899A9225E64DC607E3AD4E8A3930
25,604,857 UART: Caliptra RT
25,605,557 UART: [state] CFI Enabled
25,785,980 UART: [rt] RT listening for mailbox commands...
25,817,175 UART: [rt]cmd =0x50435252, len=8
25,819,022 >>> mbox cmd response data (8 bytes)
25,819,874 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,850,045 UART: [rt]cmd =0x50435251, len=36
26,772,762 >>> mbox cmd response data (1848 bytes)
26,782,959 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,812,860 UART: [rt]cmd =0x43455246, len=4
26,825,612 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,664 UART:
193,086 UART: Running Caliptra ROM ...
194,196 UART:
603,799 UART: [state] CFI Enabled
616,955 UART: [state] LifecycleState = Unprovisioned
618,832 UART: [state] DebugLocked = No
620,720 UART: [state] WD Timer not started. Device not locked for debugging
624,763 UART: [kat] SHA2-256
804,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,169 UART: [kat] ++
815,777 UART: [kat] sha1
827,794 UART: [kat] SHA2-256
830,442 UART: [kat] SHA2-384
836,668 UART: [kat] SHA2-512-ACC
839,008 UART: [kat] ECC-384
3,281,569 UART: [kat] HMAC-384Kdf
3,293,721 UART: [kat] LMS
3,770,257 UART: [kat] --
3,775,554 UART: [cold-reset] ++
3,778,060 UART: [fht] FHT @ 0x50003400
3,788,849 UART: [idev] ++
3,789,426 UART: [idev] CDI.KEYID = 6
3,790,383 UART: [idev] SUBJECT.KEYID = 7
3,791,637 UART: [idev] UDS.KEYID = 0
3,792,733 ready_for_fw is high
3,792,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,673 UART: [idev] Erasing UDS.KEYID = 0
6,269,928 UART: [idev] Sha1 KeyId Algorithm
6,294,646 UART: [idev] --
6,299,316 UART: [ldev] ++
6,299,896 UART: [ldev] CDI.KEYID = 6
6,300,779 UART: [ldev] SUBJECT.KEYID = 5
6,302,050 UART: [ldev] AUTHORITY.KEYID = 7
6,303,287 UART: [ldev] FE.KEYID = 1
6,315,885 UART: [ldev] Erasing FE.KEYID = 1
8,793,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,292 UART: [ldev] --
10,587,717 UART: [fwproc] Wait for Commands...
10,590,624 UART: [fwproc] Recv command 0x46574c44
10,592,868 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,231 >>> mbox cmd response: success
14,548,306 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,551,620 UART: [afmc] ++
14,552,266 UART: [afmc] CDI.KEYID = 6
14,553,181 UART: [afmc] SUBJECT.KEYID = 7
14,554,419 UART: [afmc] AUTHORITY.KEYID = 5
17,060,100 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,460 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,676 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,533 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,123 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,300 UART: [afmc] --
18,857,909 UART: [cold-reset] --
18,861,882 UART: [state] Locking Datavault
18,866,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,868,247 UART: [state] Locking ICCM
18,870,081 UART: [exit] Launching FMC @ 0x40000130
18,878,543 UART:
18,878,782 UART: Running Caliptra FMC ...
18,879,885 UART:
18,880,069 UART: [state] CFI Enabled
18,888,204 UART: [fht] FMC Alias Private Key: 7
20,654,316 UART: [art] Extend RT PCRs Done
20,655,538 UART: [art] Lock RT PCRs Done
20,657,164 UART: [art] Populate DV Done
20,662,585 UART: [fht] FMC Alias Private Key: 7
20,664,287 UART: [art] Derive CDI
20,665,105 UART: [art] Store in slot 0x4
20,707,769 UART: [art] Derive Key Pair
20,708,804 UART: [art] Store priv key in slot 0x5
23,135,947 UART: [art] Derive Key Pair - Done
23,148,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,855,130 UART: [art] Erasing AUTHORITY.KEYID = 7
24,856,631 UART: [art] PUB.X = 4444393C35B16E97B1C83B4763657570EB08A1C373A2FCEEEC5B20B4B078F207267D1A44DE12122AB7E1BEBF448E1EDC
24,863,936 UART: [art] PUB.Y = 0E582759147E8DC22F8C5A8492917D5091DB584FE18476CBB1AF978A1DB0853DC36BC62A14D949EC0B60AC0363BF9F1B
24,871,167 UART: [art] SIG.R = 0741AADF2AA432BE3621A534DD2B446985E9F324C85CA614E2A0D81458A795D84DF09DB178DA0023EAC9FA478EDD2592
24,878,579 UART: [art] SIG.S = 7816369B38DE9A8045690FBD3F8F6883B1C57414E33555285C5A998C582B6DEEB00E488276F8C4210D9453024A1B584D
25,857,111 UART: Caliptra RT
25,857,814 UART: [state] CFI Enabled
25,990,417 UART: [rt] RT listening for mailbox commands...
26,021,671 UART: [rt]cmd =0x50435252, len=8
26,023,737 >>> mbox cmd response data (8 bytes)
26,024,564 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,054,561 UART: [rt]cmd =0x50435251, len=36
26,962,468 >>> mbox cmd response data (1848 bytes)
26,972,767 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,002,649 UART: [rt]cmd =0x43455246, len=4
27,015,355 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
3,776,984 ready_for_fw is high
3,777,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,273 >>> mbox cmd response: success
14,443,677 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
18,691,544 UART:
18,691,940 UART: Running Caliptra FMC ...
18,693,238 UART:
18,693,407 UART: [state] CFI Enabled
18,700,942 UART: [fht] FMC Alias Private Key: 7
20,467,437 UART: [art] Extend RT PCRs Done
20,468,660 UART: [art] Lock RT PCRs Done
20,470,254 UART: [art] Populate DV Done
20,475,356 UART: [fht] FMC Alias Private Key: 7
20,476,898 UART: [art] Derive CDI
20,477,639 UART: [art] Store in slot 0x4
20,520,281 UART: [art] Derive Key Pair
20,521,279 UART: [art] Store priv key in slot 0x5
22,948,275 UART: [art] Derive Key Pair - Done
22,961,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,667,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,112 UART: [art] PUB.X = 2AABD0877B26AC3D0F4AE4559C4CE96D90BD1522CF635A7DF64DE2FD9B522D19AED443692F84701AD2AD849AC39610B8
24,676,369 UART: [art] PUB.Y = E2E28A0A1336CCC6F5549BE20375C9A401E09C5A82BB3AE1623E32D8016F4019B8D0DF4502F2D29AFED609546EC9DC58
24,683,684 UART: [art] SIG.R = 3C3300125A66DCC53627AC4F64982DA4E35DA213D58F6993C6546A7E007B1D0AB400E6F8BF8221DAE5040509A25F77D8
24,690,978 UART: [art] SIG.S = E97C347C543C940FB15B3B00F8BE84AFDE52689A22A317DB69D7947B17B8463B387A7AC530A73492CD0475AC76BE5896
25,669,910 UART: Caliptra RT
25,670,612 UART: [state] CFI Enabled
25,802,375 UART: [rt] RT listening for mailbox commands...
25,833,892 UART: [rt]cmd =0x50435252, len=8
25,835,917 >>> mbox cmd response data (8 bytes)
25,837,075 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
25,867,118 UART: [rt]cmd =0x50435251, len=36
26,774,787 >>> mbox cmd response data (1848 bytes)
26,785,466 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
26,815,577 UART: [rt]cmd =0x43455246, len=4
26,828,264 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,263 UART:
192,631 UART: Running Caliptra ROM ...
193,728 UART:
193,873 UART: [state] CFI Enabled
264,965 UART: [state] LifecycleState = Unprovisioned
267,382 UART: [state] DebugLocked = No
269,331 UART: [state] WD Timer not started. Device not locked for debugging
273,718 UART: [kat] SHA2-256
463,590 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,336 UART: [kat] ++
474,781 UART: [kat] sha1
486,504 UART: [kat] SHA2-256
489,580 UART: [kat] SHA2-384
495,921 UART: [kat] SHA2-512-ACC
498,496 UART: [kat] ECC-384
2,946,652 UART: [kat] HMAC-384Kdf
2,971,680 UART: [kat] LMS
3,503,413 UART: [kat] --
3,507,339 UART: [cold-reset] ++
3,509,408 UART: [fht] FHT @ 0x50003400
3,521,311 UART: [idev] ++
3,522,015 UART: [idev] CDI.KEYID = 6
3,522,944 UART: [idev] SUBJECT.KEYID = 7
3,524,116 UART: [idev] UDS.KEYID = 0
3,525,041 ready_for_fw is high
3,525,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,261 UART: [idev] Erasing UDS.KEYID = 0
6,026,029 UART: [idev] Sha1 KeyId Algorithm
6,049,862 UART: [idev] --
6,054,816 UART: [ldev] ++
6,055,559 UART: [ldev] CDI.KEYID = 6
6,056,470 UART: [ldev] SUBJECT.KEYID = 5
6,057,630 UART: [ldev] AUTHORITY.KEYID = 7
6,058,808 UART: [ldev] FE.KEYID = 1
6,102,721 UART: [ldev] Erasing FE.KEYID = 1
8,611,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,777 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,679 UART: [ldev] --
10,417,107 UART: [fwproc] Wait for Commands...
10,419,626 UART: [fwproc] Recv command 0x46574c44
10,421,927 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,699 >>> mbox cmd response: success
14,680,857 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,684,152 UART: [afmc] ++
14,684,888 UART: [afmc] CDI.KEYID = 6
14,686,079 UART: [afmc] SUBJECT.KEYID = 7
14,687,508 UART: [afmc] AUTHORITY.KEYID = 5
17,215,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,734 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,650 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,733 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,909 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,796 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,979 UART: [afmc] --
19,011,460 UART: [cold-reset] --
19,015,754 UART: [state] Locking Datavault
19,021,156 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,356 UART: [state] Locking ICCM
19,025,594 UART: [exit] Launching FMC @ 0x40000130
19,034,309 UART:
19,034,542 UART: Running Caliptra FMC ...
19,035,567 UART:
19,035,713 UART: [state] CFI Enabled
19,095,112 UART: [fht] FMC Alias Private Key: 7
20,861,426 UART: [art] Extend RT PCRs Done
20,862,655 UART: [art] Lock RT PCRs Done
20,864,096 UART: [art] Populate DV Done
20,869,396 UART: [fht] FMC Alias Private Key: 7
20,871,105 UART: [art] Derive CDI
20,871,847 UART: [art] Store in slot 0x4
20,927,598 UART: [art] Derive Key Pair
20,928,643 UART: [art] Store priv key in slot 0x5
23,391,689 UART: [art] Derive Key Pair - Done
23,404,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,297 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,810 UART: [art] PUB.X = 867F632C53BE11B3C45A31D7751DEC3C6884090B3E0C23AB5B8C2826BEF8BDCC8E7116092680A97CBDFF617DB5089EC1
25,126,063 UART: [art] PUB.Y = B8AAC9C81B97CBA2F741FB47F20D9D6651B27B812B2330C9D9382EB1DB74CDC753AEADFD363F69F798BA7EF35346AB46
25,133,355 UART: [art] SIG.R = 1FA37CBB7B06460BF53ECA7025A0A33E3839AE216AFD84A376E2C4E6E809AA63B4FC4EBD30B4FDCE2CD14714CF5CC791
25,140,799 UART: [art] SIG.S = 322F0AA86BCB4098E3BB9DAA78A2B3504674737E4E079DD0F72785ADCA5416DA3DA9F369BB8D9D871E31BEB29EBEF48D
26,119,781 UART: Caliptra RT
26,120,473 UART: [state] CFI Enabled
26,301,146 UART: [rt] RT listening for mailbox commands...
26,332,777 UART: [rt]cmd =0x50435252, len=8
26,334,805 >>> mbox cmd response data (8 bytes)
26,336,007 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,366,142 UART: [rt]cmd =0x50435251, len=36
27,287,762 >>> mbox cmd response data (1848 bytes)
27,298,062 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,327,688 UART: [rt]cmd =0x43455246, len=4
27,340,451 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
3,439,171 ready_for_fw is high
3,439,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,828 >>> mbox cmd response: success
14,823,042 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,108,728 UART:
19,109,145 UART: Running Caliptra FMC ...
19,110,255 UART:
19,110,410 UART: [state] CFI Enabled
19,179,896 UART: [fht] FMC Alias Private Key: 7
20,945,640 UART: [art] Extend RT PCRs Done
20,946,864 UART: [art] Lock RT PCRs Done
20,948,572 UART: [art] Populate DV Done
20,954,268 UART: [fht] FMC Alias Private Key: 7
20,955,807 UART: [art] Derive CDI
20,956,563 UART: [art] Store in slot 0x4
21,012,457 UART: [art] Derive Key Pair
21,013,504 UART: [art] Store priv key in slot 0x5
23,476,342 UART: [art] Derive Key Pair - Done
23,489,505 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,542 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,052 UART: [art] PUB.X = BDC5DAAA185ED6C4D3D3D363DC00404168AA6E392458BB0D4BA7D43447B675A601956A121B570D8D29C49347489CEAB3
25,211,303 UART: [art] PUB.Y = 69C047995FE841DD6CCE6FD094C5D4F74772632143585BFBC5FF884C11CDD1F5F6544037BD007058F52240CB912B3764
25,218,546 UART: [art] SIG.R = 918AF2C8DB1C33FBB68E3BC48DB0BD713A7168763F898E8936C1E7B86A97506B919FED2BC36922A5F360C84AB195BE21
25,225,979 UART: [art] SIG.S = D61F9ED5CFD9A5F9D02AC7732DBE6475503E6EF871D3B22418212AC2C309004AFA25A82B4881D2ADF48AE6C31EF04260
26,205,066 UART: Caliptra RT
26,205,759 UART: [state] CFI Enabled
26,399,740 UART: [rt] RT listening for mailbox commands...
26,431,468 UART: [rt]cmd =0x50435252, len=8
26,433,460 >>> mbox cmd response data (8 bytes)
26,434,318 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,464,629 UART: [rt]cmd =0x50435251, len=36
27,386,209 >>> mbox cmd response data (1848 bytes)
27,396,445 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,426,132 UART: [rt]cmd =0x43455246, len=4
27,438,797 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,482 UART:
192,886 UART: Running Caliptra ROM ...
193,993 UART:
603,657 UART: [state] CFI Enabled
615,992 UART: [state] LifecycleState = Unprovisioned
618,376 UART: [state] DebugLocked = No
620,896 UART: [state] WD Timer not started. Device not locked for debugging
626,299 UART: [kat] SHA2-256
816,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,970 UART: [kat] ++
827,492 UART: [kat] sha1
839,786 UART: [kat] SHA2-256
842,803 UART: [kat] SHA2-384
847,668 UART: [kat] SHA2-512-ACC
850,257 UART: [kat] ECC-384
3,292,592 UART: [kat] HMAC-384Kdf
3,304,945 UART: [kat] LMS
3,836,799 UART: [kat] --
3,841,224 UART: [cold-reset] ++
3,843,371 UART: [fht] FHT @ 0x50003400
3,855,855 UART: [idev] ++
3,856,534 UART: [idev] CDI.KEYID = 6
3,857,579 UART: [idev] SUBJECT.KEYID = 7
3,858,686 UART: [idev] UDS.KEYID = 0
3,859,636 ready_for_fw is high
3,859,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,882 UART: [idev] Erasing UDS.KEYID = 0
6,339,883 UART: [idev] Sha1 KeyId Algorithm
6,362,076 UART: [idev] --
6,365,593 UART: [ldev] ++
6,366,274 UART: [ldev] CDI.KEYID = 6
6,367,194 UART: [ldev] SUBJECT.KEYID = 5
6,368,371 UART: [ldev] AUTHORITY.KEYID = 7
6,369,555 UART: [ldev] FE.KEYID = 1
6,379,774 UART: [ldev] Erasing FE.KEYID = 1
8,860,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,805 UART: [ldev] --
10,652,409 UART: [fwproc] Wait for Commands...
10,655,635 UART: [fwproc] Recv command 0x46574c44
10,657,899 UART: [fwproc] Recv'd Img size: 118548 bytes
14,157,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,240,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,363,788 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,924,646 >>> mbox cmd response: success
14,925,270 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
14,928,436 UART: [afmc] ++
14,929,136 UART: [afmc] CDI.KEYID = 6
14,930,381 UART: [afmc] SUBJECT.KEYID = 7
14,931,825 UART: [afmc] AUTHORITY.KEYID = 5
17,434,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,157,216 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,159,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,284 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,227,526 UART: [afmc] --
19,231,189 UART: [cold-reset] --
19,235,659 UART: [state] Locking Datavault
19,240,597 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,799 UART: [state] Locking ICCM
19,245,841 UART: [exit] Launching FMC @ 0x40000130
19,254,472 UART:
19,254,722 UART: Running Caliptra FMC ...
19,255,825 UART:
19,255,988 UART: [state] CFI Enabled
19,264,096 UART: [fht] FMC Alias Private Key: 7
21,030,558 UART: [art] Extend RT PCRs Done
21,031,785 UART: [art] Lock RT PCRs Done
21,033,771 UART: [art] Populate DV Done
21,039,131 UART: [fht] FMC Alias Private Key: 7
21,040,675 UART: [art] Derive CDI
21,041,494 UART: [art] Store in slot 0x4
21,084,434 UART: [art] Derive Key Pair
21,085,485 UART: [art] Store priv key in slot 0x5
23,512,722 UART: [art] Derive Key Pair - Done
23,525,882 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,232,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,558 UART: [art] PUB.X = A3D256658CE5358F401A6FD64D8B1498F80F6C520854FBC69AE72EADB4D5B3407D5740B6469CEE606A84627AAAA5FAC3
25,240,874 UART: [art] PUB.Y = 5AF69D69717CCB5F48D67CA3DABB12E9F3FABCEA3D034DF4C5A028378A75E330E5D06512C5AFFCC81D4092F0A096AC08
25,248,128 UART: [art] SIG.R = C485B542E451BF545700A1185BAADDF725D44DF0F9EDB56E6976B16E534514F8332CCB50612B46E8C2E727F4D61399D5
25,255,493 UART: [art] SIG.S = A717EA48BA7C6F9C3EF1C331C14A8093F9EC6D46422A72A35C4BDA2C73FE5AA2C591D37AD3A1D1E74581A99A7FA94AF3
26,234,852 UART: Caliptra RT
26,235,544 UART: [state] CFI Enabled
26,368,772 UART: [rt] RT listening for mailbox commands...
26,400,294 UART: [rt]cmd =0x50435252, len=8
26,402,151 >>> mbox cmd response data (8 bytes)
26,403,191 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,433,358 UART: [rt]cmd =0x50435251, len=36
27,341,259 >>> mbox cmd response data (1848 bytes)
27,351,507 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,381,129 UART: [rt]cmd =0x43455246, len=4
27,393,667 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,758,066 ready_for_fw is high
3,758,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,039,985 >>> mbox cmd response: success
15,040,667 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
19,301,793 UART:
19,302,188 UART: Running Caliptra FMC ...
19,303,425 UART:
19,303,593 UART: [state] CFI Enabled
19,311,564 UART: [fht] FMC Alias Private Key: 7
21,077,658 UART: [art] Extend RT PCRs Done
21,078,893 UART: [art] Lock RT PCRs Done
21,080,478 UART: [art] Populate DV Done
21,085,855 UART: [fht] FMC Alias Private Key: 7
21,087,398 UART: [art] Derive CDI
21,088,140 UART: [art] Store in slot 0x4
21,130,735 UART: [art] Derive Key Pair
21,131,738 UART: [art] Store priv key in slot 0x5
23,559,416 UART: [art] Derive Key Pair - Done
23,572,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,524 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,040 UART: [art] PUB.X = F8AB3D08F2ADA515305E8413045C514589D784DE87B07114E59A54F17E80689DA3168D27EDFA926886DB5399D7D714F4
25,287,257 UART: [art] PUB.Y = 5AAE98CB5D8E69EBA5006D6F4DC7DC63BA93E6806302BA2FDF6B372AA676611B87660F4626D22A2A598B8E6B454B8233
25,294,551 UART: [art] SIG.R = 04D489214F1F41A4B4619F771C3F072918F9E6324F7D9D5FF67C83654C22BB6024AEDCBBB88BB3CB23E15BE858879720
25,301,917 UART: [art] SIG.S = A2D3ECD458C63745BF8D29EC2408DFE62CBDE373BFC529994569415EA502550B07447E2FB03A75B7C0C48EEFCD0ED5BC
26,280,697 UART: Caliptra RT
26,281,396 UART: [state] CFI Enabled
26,414,765 UART: [rt] RT listening for mailbox commands...
26,446,436 UART: [rt]cmd =0x50435252, len=8
26,448,211 >>> mbox cmd response data (8 bytes)
26,449,088 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
26,479,030 UART: [rt]cmd =0x50435251, len=36
27,386,626 >>> mbox cmd response data (1848 bytes)
27,397,128 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
27,427,116 UART: [rt]cmd =0x43455246, len=4
27,439,784 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,216 UART: [state] LifecycleState = Unprovisioned
85,871 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,861 UART: [kat] SHA2-256
881,792 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,907 UART: [kat] ++
886,059 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
906,908 UART: [kat] LMS
1,475,104 UART: [kat] --
1,475,793 UART: [cold-reset] ++
1,476,235 UART: [fht] Storing FHT @ 0x50003400
1,478,972 UART: [idev] ++
1,479,140 UART: [idev] CDI.KEYID = 6
1,479,500 UART: [idev] SUBJECT.KEYID = 7
1,479,924 UART: [idev] UDS.KEYID = 0
1,480,269 ready_for_fw is high
1,480,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,642 UART: [idev] Erasing UDS.KEYID = 0
1,503,668 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,364 UART: [idev] --
1,513,451 UART: [ldev] ++
1,513,619 UART: [ldev] CDI.KEYID = 6
1,513,982 UART: [ldev] SUBJECT.KEYID = 5
1,514,408 UART: [ldev] AUTHORITY.KEYID = 7
1,514,871 UART: [ldev] FE.KEYID = 1
1,520,141 UART: [ldev] Erasing FE.KEYID = 1
1,545,090 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,244 UART: [ldev] --
1,584,537 UART: [fwproc] Waiting for Commands...
1,585,188 UART: [fwproc] Received command 0x46574c44
1,585,979 UART: [fwproc] Received Image of size 118548 bytes
2,931,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,969 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,187 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,592 >>> mbox cmd response: success
3,130,592 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,131,798 UART: [afmc] ++
3,131,966 UART: [afmc] CDI.KEYID = 6
3,132,328 UART: [afmc] SUBJECT.KEYID = 7
3,132,753 UART: [afmc] AUTHORITY.KEYID = 5
3,167,798 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,372 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,861 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,744 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,427 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,173 UART: [afmc] --
3,211,051 UART: [cold-reset] --
3,211,919 UART: [state] Locking Datavault
3,212,878 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,482 UART: [state] Locking ICCM
3,214,012 UART: [exit] Launching FMC @ 0x40000130
3,219,342 UART:
3,219,358 UART: Running Caliptra FMC ...
3,219,766 UART:
3,219,820 UART: [state] CFI Enabled
3,230,590 UART: [fht] FMC Alias Private Key: 7
3,349,296 UART: [art] Extend RT PCRs Done
3,349,724 UART: [art] Lock RT PCRs Done
3,351,348 UART: [art] Populate DV Done
3,359,535 UART: [fht] FMC Alias Private Key: 7
3,360,637 UART: [art] Derive CDI
3,360,917 UART: [art] Store in slot 0x4
3,446,321 UART: [art] Derive Key Pair
3,446,681 UART: [art] Store priv key in slot 0x5
3,459,360 UART: [art] Derive Key Pair - Done
3,474,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,831 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,596 UART: [art] PUB.X = 81AC07F6C5278B8AC87910C5F7FA6E5B7BA58DEDDEBA4ED697EA5099997257016313DFE5F23CA7EA7AF260AFA4349FD7
3,496,380 UART: [art] PUB.Y = 764D71A120A29FFA08DA14D8736F55B22A7C629A7254B8BC9894116A577F504BDCF978C31AF7D50305FE161F9BB9872C
3,503,325 UART: [art] SIG.R = 7AE00DBF50CE02EA0BBEF29F96FFDE1F6C71E24D5E2C6BA90A158950F5A10BB3CBF3FAE7736436CA4BBB19BDC73376BE
3,510,112 UART: [art] SIG.S = 49F8CB8454C95EC56E1BAB091231223D7A7D5EEA1EF28BDFE444C7E014731D293620EA9362BBE638D27DD36823D2B4E0
3,533,279 UART: Caliptra RT
3,533,530 UART: [state] CFI Enabled
3,653,469 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,029 UART: [rt]cmd =0x50435252, len=8
3,685,529 >>> mbox cmd response data (8 bytes)
3,685,530 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,715,093 UART: [rt]cmd =0x50435251, len=36
3,882,343 >>> mbox cmd response data (1848 bytes)
3,882,344 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,723 UART: [rt]cmd =0x43455246, len=4
3,924,069 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,203 ready_for_fw is high
1,362,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,742 >>> mbox cmd response: success
2,980,742 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,042,723 UART:
3,042,739 UART: Running Caliptra FMC ...
3,043,147 UART:
3,043,201 UART: [state] CFI Enabled
3,053,461 UART: [fht] FMC Alias Private Key: 7
3,172,461 UART: [art] Extend RT PCRs Done
3,172,889 UART: [art] Lock RT PCRs Done
3,174,425 UART: [art] Populate DV Done
3,182,698 UART: [fht] FMC Alias Private Key: 7
3,183,672 UART: [art] Derive CDI
3,183,952 UART: [art] Store in slot 0x4
3,269,560 UART: [art] Derive Key Pair
3,269,920 UART: [art] Store priv key in slot 0x5
3,282,713 UART: [art] Derive Key Pair - Done
3,297,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,733 UART: [art] PUB.X = DD68279D4E75A841DC18B1ADDC4A0C965EAE70DA781370B5E62168B2444221FEB7C59CCB86B9A1CA9A536C516D9C421C
3,320,514 UART: [art] PUB.Y = 36B5C0C511BFAEEA53BA49A84B9B0FD14A371AB747B159410DE05BC0DE08B6989395A6663BC97382AA864D55EBDAD154
3,327,469 UART: [art] SIG.R = AE2B7FF4374AE9DC7A1033EF2532CCFC68DA9A54491ED8E601E5A866505B8BA83A7BB13E07B20C305EFF5EC305041AFA
3,334,244 UART: [art] SIG.S = D6F5FB7722A7F52AA3DD41DB9B5040A7E105106FA803D34C910D9147CF7C5C72447030007C4F04EDC01E172817EF4904
3,357,991 UART: Caliptra RT
3,358,242 UART: [state] CFI Enabled
3,477,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,663 UART: [rt]cmd =0x50435252, len=8
3,510,049 >>> mbox cmd response data (8 bytes)
3,510,050 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,619 UART: [rt]cmd =0x50435251, len=36
3,707,253 >>> mbox cmd response data (1848 bytes)
3,707,254 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,427 UART: [rt]cmd =0x43455246, len=4
3,748,829 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Unprovisioned
85,798 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,994 UART: [kat] SHA2-256
881,925 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,040 UART: [kat] ++
886,192 UART: [kat] sha1
890,198 UART: [kat] SHA2-256
892,136 UART: [kat] SHA2-384
894,935 UART: [kat] SHA2-512-ACC
896,836 UART: [kat] ECC-384
902,389 UART: [kat] HMAC-384Kdf
906,955 UART: [kat] LMS
1,475,151 UART: [kat] --
1,476,090 UART: [cold-reset] ++
1,476,632 UART: [fht] Storing FHT @ 0x50003400
1,479,521 UART: [idev] ++
1,479,689 UART: [idev] CDI.KEYID = 6
1,480,049 UART: [idev] SUBJECT.KEYID = 7
1,480,473 UART: [idev] UDS.KEYID = 0
1,480,818 ready_for_fw is high
1,480,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,727 UART: [idev] Erasing UDS.KEYID = 0
1,505,725 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,160 UART: [ldev] ++
1,515,328 UART: [ldev] CDI.KEYID = 6
1,515,691 UART: [ldev] SUBJECT.KEYID = 5
1,516,117 UART: [ldev] AUTHORITY.KEYID = 7
1,516,580 UART: [ldev] FE.KEYID = 1
1,521,802 UART: [ldev] Erasing FE.KEYID = 1
1,546,787 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,675 UART: [ldev] --
1,585,944 UART: [fwproc] Waiting for Commands...
1,586,709 UART: [fwproc] Received command 0x46574c44
1,587,500 UART: [fwproc] Received Image of size 118548 bytes
2,931,866 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,618 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,219 >>> mbox cmd response: success
3,131,219 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,132,423 UART: [afmc] ++
3,132,591 UART: [afmc] CDI.KEYID = 6
3,132,953 UART: [afmc] SUBJECT.KEYID = 7
3,133,378 UART: [afmc] AUTHORITY.KEYID = 5
3,168,783 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,761 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,353 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,036 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,870 UART: [afmc] --
3,211,992 UART: [cold-reset] --
3,213,032 UART: [state] Locking Datavault
3,213,969 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,573 UART: [state] Locking ICCM
3,215,007 UART: [exit] Launching FMC @ 0x40000130
3,220,337 UART:
3,220,353 UART: Running Caliptra FMC ...
3,220,761 UART:
3,220,904 UART: [state] CFI Enabled
3,231,802 UART: [fht] FMC Alias Private Key: 7
3,350,574 UART: [art] Extend RT PCRs Done
3,351,002 UART: [art] Lock RT PCRs Done
3,352,286 UART: [art] Populate DV Done
3,360,323 UART: [fht] FMC Alias Private Key: 7
3,361,343 UART: [art] Derive CDI
3,361,623 UART: [art] Store in slot 0x4
3,447,475 UART: [art] Derive Key Pair
3,447,835 UART: [art] Store priv key in slot 0x5
3,461,498 UART: [art] Derive Key Pair - Done
3,476,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,702 UART: [art] PUB.X = 278ED1FBEEFFA16CDCCDA7DCCCBA3C3FF465F9A0BCEE07F86AE9166D84BCFC8832E5BA4D064EFF228B156898FAE25585
3,499,502 UART: [art] PUB.Y = 72BC2219DD3DCFF1F99B7E8D17CC1985C4496BEC722C395EC6375772601EF757CEB240446095DA48B69E7B1885AB25BC
3,506,460 UART: [art] SIG.R = A06495D0C8DB397A05525EBF637ACC82FDBCE6B8F4B84618802B2653000F259A421A19040D709D502E4B5183932DA50B
3,513,193 UART: [art] SIG.S = 7A5520351612932E6D4941401226020D0F0314B243067AB3E9ED0012BFB1EE273D56FCD306DE98860D169F4B5987F48F
3,536,650 UART: Caliptra RT
3,536,993 UART: [state] CFI Enabled
3,656,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,959 UART: [rt]cmd =0x50435252, len=8
3,688,483 >>> mbox cmd response data (8 bytes)
3,688,484 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,199 UART: [rt]cmd =0x50435251, len=36
3,885,425 >>> mbox cmd response data (1848 bytes)
3,885,426 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,914,573 UART: [rt]cmd =0x43455246, len=4
3,926,947 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,054 ready_for_fw is high
1,363,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,391 >>> mbox cmd response: success
2,982,391 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
3,043,450 UART:
3,043,466 UART: Running Caliptra FMC ...
3,043,874 UART:
3,044,017 UART: [state] CFI Enabled
3,054,763 UART: [fht] FMC Alias Private Key: 7
3,173,907 UART: [art] Extend RT PCRs Done
3,174,335 UART: [art] Lock RT PCRs Done
3,175,981 UART: [art] Populate DV Done
3,184,020 UART: [fht] FMC Alias Private Key: 7
3,185,004 UART: [art] Derive CDI
3,185,284 UART: [art] Store in slot 0x4
3,270,820 UART: [art] Derive Key Pair
3,271,180 UART: [art] Store priv key in slot 0x5
3,284,317 UART: [art] Derive Key Pair - Done
3,299,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,362 UART: [art] PUB.X = 757A20BDA30F8D1FDA7566D5C1DB04DE0F3CEED560576849F36A7FB6F3694A0D4939DD78FE9851500AD65BE89884BF68
3,322,129 UART: [art] PUB.Y = 0C1CAD49CC9FB6E650A7AA21265212A3F67DE41692DCC4283395D2A1DD2040894166AC38749C363A8D40C5B04023370C
3,329,073 UART: [art] SIG.R = 55A6DD1221BE0F22C724E4F692857880DE2A2C333F75DAE3F39CB24906B159BF2EEE1D30E5DD192ECF10D08CFBD9E9C4
3,335,855 UART: [art] SIG.S = FA473610ABC4E8CE565951768087063D35105487DACAB2F159E443F81BB3BCC18FEF5DD1CADE84D282171005A5735DB7
3,359,579 UART: Caliptra RT
3,359,922 UART: [state] CFI Enabled
3,480,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,934 UART: [rt]cmd =0x50435252, len=8
3,512,494 >>> mbox cmd response data (8 bytes)
3,512,495 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,134 UART: [rt]cmd =0x50435251, len=36
3,709,438 >>> mbox cmd response data (1848 bytes)
3,709,439 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,738,702 UART: [rt]cmd =0x43455246, len=4
3,750,980 >>> mbox cmd response data (920 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,031 UART: [state] WD Timer not started. Device not locked for debugging
87,338 UART: [kat] SHA2-256
890,888 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,992 UART: [kat] ++
895,144 UART: [kat] sha1
899,370 UART: [kat] SHA2-256
901,310 UART: [kat] SHA2-384
903,825 UART: [kat] SHA2-512-ACC
905,726 UART: [kat] ECC-384
915,237 UART: [kat] HMAC-384Kdf
919,753 UART: [kat] LMS
1,168,065 UART: [kat] --
1,168,982 UART: [cold-reset] ++
1,169,540 UART: [fht] FHT @ 0x50003400
1,172,156 UART: [idev] ++
1,172,324 UART: [idev] CDI.KEYID = 6
1,172,685 UART: [idev] SUBJECT.KEYID = 7
1,173,110 UART: [idev] UDS.KEYID = 0
1,173,456 ready_for_fw is high
1,173,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,293 UART: [idev] Sha1 KeyId Algorithm
1,207,225 UART: [idev] --
1,208,282 UART: [ldev] ++
1,208,450 UART: [ldev] CDI.KEYID = 6
1,208,814 UART: [ldev] SUBJECT.KEYID = 5
1,209,241 UART: [ldev] AUTHORITY.KEYID = 7
1,209,704 UART: [ldev] FE.KEYID = 1
1,214,952 UART: [ldev] Erasing FE.KEYID = 1
1,241,283 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,256 UART: [ldev] --
1,280,679 UART: [fwproc] Wait for Commands...
1,281,360 UART: [fwproc] Recv command 0x46574c44
1,282,093 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,382 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,603 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,778 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,985 >>> mbox cmd response: success
2,825,985 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,827,105 UART: [afmc] ++
2,827,273 UART: [afmc] CDI.KEYID = 6
2,827,636 UART: [afmc] SUBJECT.KEYID = 7
2,828,062 UART: [afmc] AUTHORITY.KEYID = 5
2,864,267 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,807 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,517 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,398 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,099 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,878 UART: [afmc] --
2,907,797 UART: [cold-reset] --
2,908,701 UART: [state] Locking Datavault
2,909,648 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,252 UART: [state] Locking ICCM
2,910,672 UART: [exit] Launching FMC @ 0x40000130
2,916,002 UART:
2,916,018 UART: Running Caliptra FMC ...
2,916,426 UART:
2,916,480 UART: [state] CFI Enabled
2,926,864 UART: [fht] FMC Alias Private Key: 7
3,044,606 UART: [art] Extend RT PCRs Done
3,045,034 UART: [art] Lock RT PCRs Done
3,046,858 UART: [art] Populate DV Done
3,055,259 UART: [fht] FMC Alias Private Key: 7
3,056,197 UART: [art] Derive CDI
3,056,477 UART: [art] Store in slot 0x4
3,142,548 UART: [art] Derive Key Pair
3,142,908 UART: [art] Store priv key in slot 0x5
3,155,862 UART: [art] Derive Key Pair - Done
3,170,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,950 UART: [art] PUB.X = C820A8A5225B9D7F5585CC27458143F4879F8D05A87419657A1265C651949E8F8BE3E1DEB12FE971DB87307C687AD2BE
3,193,717 UART: [art] PUB.Y = 9BA9E05C784BB018EB8A3145A3FC9814E3B69F69A2405E12B4E3F7E097BC36626E01D667A3A43DCD03F6505D6F60E2ED
3,200,671 UART: [art] SIG.R = E8DC87B55B0258729D5C60FA6C97EAAA263D94B72C6FA499B9C7B17E3F2006DE3F114A839D00028169D78FB7E3158E1D
3,207,418 UART: [art] SIG.S = EE8010E39B6BBB019233470160FA27B6BCD48B75F9F5359004837B5F5E0DE84DA8684BCE79726B784BBAFBC4F84B1C8B
3,231,346 UART: Caliptra RT
3,231,597 UART: [state] CFI Enabled
3,350,497 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,079 UART: [rt]cmd =0x50435252, len=8
3,382,467 >>> mbox cmd response data (8 bytes)
3,382,468 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,341 UART: [rt]cmd =0x50435251, len=36
3,579,885 >>> mbox cmd response data (1848 bytes)
3,579,886 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,335 UART: [rt]cmd =0x43455246, len=4
3,621,360 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,316 ready_for_fw is high
1,058,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,782 >>> mbox cmd response: success
2,676,782 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,738,073 UART:
2,738,089 UART: Running Caliptra FMC ...
2,738,497 UART:
2,738,551 UART: [state] CFI Enabled
2,748,765 UART: [fht] FMC Alias Private Key: 7
2,867,203 UART: [art] Extend RT PCRs Done
2,867,631 UART: [art] Lock RT PCRs Done
2,869,307 UART: [art] Populate DV Done
2,877,344 UART: [fht] FMC Alias Private Key: 7
2,878,488 UART: [art] Derive CDI
2,878,768 UART: [art] Store in slot 0x4
2,964,487 UART: [art] Derive Key Pair
2,964,847 UART: [art] Store priv key in slot 0x5
2,977,885 UART: [art] Derive Key Pair - Done
2,992,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,968 UART: [art] PUB.X = E23616D842CAB98326D71A8B6B3D7A14A2E3D87F27B20A14273085579960100FDB0D98B287047B0E7EDBB7F5917C4164
3,015,721 UART: [art] PUB.Y = EBCD837BC09CFC2FB7B2BE32CE2C2E9338AEBBC4138740F2F9E4A87C567351EAB0D8F3661D9B90617C8CD429DCD20955
3,022,688 UART: [art] SIG.R = A2B7DEA747C9AC4CB29957B5460997333BC16F87DB736F804B59670DAE3AF1BA6E99D8476CF9F63D20BB96A2EBE89BF4
3,029,468 UART: [art] SIG.S = 5DF415DE316480E6093B77B385D404B1DB6E4E6898398EF886A1FEE18D916D83D861E3D0BF796BC8CA288F7A6752A923
3,053,216 UART: Caliptra RT
3,053,467 UART: [state] CFI Enabled
3,172,692 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,132 UART: [rt]cmd =0x50435252, len=8
3,204,716 >>> mbox cmd response data (8 bytes)
3,204,717 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,234,380 UART: [rt]cmd =0x50435251, len=36
3,401,906 >>> mbox cmd response data (1848 bytes)
3,401,907 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,168 UART: [rt]cmd =0x43455246, len=4
3,443,267 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
87,106 UART: [state] WD Timer not started. Device not locked for debugging
88,435 UART: [kat] SHA2-256
891,985 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,089 UART: [kat] ++
896,241 UART: [kat] sha1
900,341 UART: [kat] SHA2-256
902,281 UART: [kat] SHA2-384
905,210 UART: [kat] SHA2-512-ACC
907,111 UART: [kat] ECC-384
916,820 UART: [kat] HMAC-384Kdf
921,222 UART: [kat] LMS
1,169,534 UART: [kat] --
1,170,275 UART: [cold-reset] ++
1,170,717 UART: [fht] FHT @ 0x50003400
1,173,283 UART: [idev] ++
1,173,451 UART: [idev] CDI.KEYID = 6
1,173,812 UART: [idev] SUBJECT.KEYID = 7
1,174,237 UART: [idev] UDS.KEYID = 0
1,174,583 ready_for_fw is high
1,174,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,084 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,120 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,735 UART: [ldev] Erasing FE.KEYID = 1
1,242,104 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,225 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,291 UART: [fwproc] Recv command 0x46574c44
1,283,024 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,668 >>> mbox cmd response: success
2,826,668 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,827,846 UART: [afmc] ++
2,828,014 UART: [afmc] CDI.KEYID = 6
2,828,377 UART: [afmc] SUBJECT.KEYID = 7
2,828,803 UART: [afmc] AUTHORITY.KEYID = 5
2,864,774 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,701 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,160 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,041 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,742 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,587 UART: [afmc] --
2,908,424 UART: [cold-reset] --
2,909,306 UART: [state] Locking Datavault
2,910,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,927 UART: [state] Locking ICCM
2,911,465 UART: [exit] Launching FMC @ 0x40000130
2,916,795 UART:
2,916,811 UART: Running Caliptra FMC ...
2,917,219 UART:
2,917,362 UART: [state] CFI Enabled
2,927,788 UART: [fht] FMC Alias Private Key: 7
3,046,484 UART: [art] Extend RT PCRs Done
3,046,912 UART: [art] Lock RT PCRs Done
3,048,282 UART: [art] Populate DV Done
3,056,577 UART: [fht] FMC Alias Private Key: 7
3,057,751 UART: [art] Derive CDI
3,058,031 UART: [art] Store in slot 0x4
3,143,464 UART: [art] Derive Key Pair
3,143,824 UART: [art] Store priv key in slot 0x5
3,156,968 UART: [art] Derive Key Pair - Done
3,172,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,524 UART: [art] PUB.X = 7E468CC4866C66339B85AC735060ED95A858589E68E54B9722AAD00D314C3FF9AB75158001E8216D8FE769375247E408
3,195,277 UART: [art] PUB.Y = 22FE05D6C666079ADE708B0135AAEC502CB85EFD0000588EDFC53C0EADAA5E3C233B6A88D9FF154A7E14B075E0C06D84
3,202,189 UART: [art] SIG.R = 932502CF513E67A64686FEA611C6AA4458FED72FF2CD08FDE36F9AEE877F52DB0FEB09FDEE3EDD506EF9ACC0EABE908E
3,208,979 UART: [art] SIG.S = 2A85E8A9B69D62D8B3FE7B17512091C7B037D3FB7F112CA6159A99F4866B42F135B19CEC9FAFA0ABE0A434AB01681A70
3,232,726 UART: Caliptra RT
3,233,069 UART: [state] CFI Enabled
3,352,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,570 UART: [rt]cmd =0x50435252, len=8
3,385,194 >>> mbox cmd response data (8 bytes)
3,385,195 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,688 UART: [rt]cmd =0x50435251, len=36
3,582,066 >>> mbox cmd response data (1848 bytes)
3,582,067 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,611,592 UART: [rt]cmd =0x43455246, len=4
3,623,627 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,415 ready_for_fw is high
1,059,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,547 >>> mbox cmd response: success
2,678,547 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,740,060 UART:
2,740,076 UART: Running Caliptra FMC ...
2,740,484 UART:
2,740,627 UART: [state] CFI Enabled
2,751,681 UART: [fht] FMC Alias Private Key: 7
2,871,065 UART: [art] Extend RT PCRs Done
2,871,493 UART: [art] Lock RT PCRs Done
2,873,053 UART: [art] Populate DV Done
2,881,342 UART: [fht] FMC Alias Private Key: 7
2,882,516 UART: [art] Derive CDI
2,882,796 UART: [art] Store in slot 0x4
2,968,475 UART: [art] Derive Key Pair
2,968,835 UART: [art] Store priv key in slot 0x5
2,981,831 UART: [art] Derive Key Pair - Done
2,996,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,040 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,805 UART: [art] PUB.X = 1F499531D844C46B0AEE412DD13BA9A476111176E7C115E70DFBDBF63159FA42075B1DC93396555DA421FF446A05E874
3,019,565 UART: [art] PUB.Y = 584B4278ECE357ED2542CED9F86FA2F226CFB28FE4809274DD06CD6197C3E9779B955BC6774549C668B0BCDF190420AE
3,026,517 UART: [art] SIG.R = EAE7DC172FA9C0DA07AD6D0ADF9242EF973A7FD472D7139132674CDFF1BA61C6833CCDBD01345E44518B8138C670A583
3,033,292 UART: [art] SIG.S = 92D048BB74B6D35A788147DB3DF909699C0407A98F421CDCBA28BB180F005F964F2F74EEA2DB0FAAA660CCB84F2D64D7
3,056,831 UART: Caliptra RT
3,057,174 UART: [state] CFI Enabled
3,177,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,460 UART: [rt]cmd =0x50435252, len=8
3,210,092 >>> mbox cmd response data (8 bytes)
3,210,093 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,626 UART: [rt]cmd =0x50435251, len=36
3,407,014 >>> mbox cmd response data (1848 bytes)
3,407,015 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,298 UART: [rt]cmd =0x43455246, len=4
3,448,373 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,591 UART: [kat] SHA2-256
903,531 UART: [kat] SHA2-384
906,352 UART: [kat] SHA2-512-ACC
908,253 UART: [kat] ECC-384
917,762 UART: [kat] HMAC-384Kdf
922,294 UART: [kat] LMS
1,170,622 UART: [kat] --
1,171,445 UART: [cold-reset] ++
1,171,991 UART: [fht] FHT @ 0x50003400
1,174,564 UART: [idev] ++
1,174,732 UART: [idev] CDI.KEYID = 6
1,175,092 UART: [idev] SUBJECT.KEYID = 7
1,175,516 UART: [idev] UDS.KEYID = 0
1,175,861 ready_for_fw is high
1,175,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,734 UART: [idev] Erasing UDS.KEYID = 0
1,200,645 UART: [idev] Sha1 KeyId Algorithm
1,209,207 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,587 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,397 UART: [ldev] --
1,281,672 UART: [fwproc] Wait for Commands...
1,282,374 UART: [fwproc] Recv command 0x46574c44
1,283,102 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,782 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,952 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,161 >>> mbox cmd response: success
2,826,161 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,827,399 UART: [afmc] ++
2,827,567 UART: [afmc] CDI.KEYID = 6
2,827,929 UART: [afmc] SUBJECT.KEYID = 7
2,828,354 UART: [afmc] AUTHORITY.KEYID = 5
2,864,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,572 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,912 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,613 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,525 UART: [afmc] --
2,907,551 UART: [cold-reset] --
2,908,417 UART: [state] Locking Datavault
2,909,516 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,120 UART: [state] Locking ICCM
2,910,734 UART: [exit] Launching FMC @ 0x40000130
2,916,064 UART:
2,916,080 UART: Running Caliptra FMC ...
2,916,488 UART:
2,916,542 UART: [state] CFI Enabled
2,927,006 UART: [fht] FMC Alias Private Key: 7
3,044,952 UART: [art] Extend RT PCRs Done
3,045,380 UART: [art] Lock RT PCRs Done
3,047,064 UART: [art] Populate DV Done
3,055,215 UART: [fht] FMC Alias Private Key: 7
3,056,363 UART: [art] Derive CDI
3,056,643 UART: [art] Store in slot 0x4
3,142,572 UART: [art] Derive Key Pair
3,142,932 UART: [art] Store priv key in slot 0x5
3,156,560 UART: [art] Derive Key Pair - Done
3,171,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,512 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,277 UART: [art] PUB.X = 94BB8A100A77D19F2828E7561E0ABA507CA8F19D735C3F430DBB4045420FE0FD51E0D99962E616ADF1A25BE1AC8D83E5
3,194,047 UART: [art] PUB.Y = 0514710CBAE4FB16A30C6F47E0C34E94AFB5082D431E3B2812883BEBDDA24B12D80CF53F8CB657FEC657A202DFC10BBC
3,200,996 UART: [art] SIG.R = C9F6FBC4D8687FDD475F008694094AA8D76859C2ECD08AE6B7E3598FADDC907E16B3E98CC7E9DAE3FE4020C934243B57
3,207,757 UART: [art] SIG.S = 4077C888B7F1633B0767F0DAD4377F044813486D4732A40AACA9D9918F2FE2B035A89F15C86B493A90A169DBC8931892
3,231,500 UART: Caliptra RT
3,231,751 UART: [state] CFI Enabled
3,351,398 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,874 UART: [rt]cmd =0x50435252, len=8
3,383,102 >>> mbox cmd response data (8 bytes)
3,383,103 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,488 UART: [rt]cmd =0x50435251, len=36
3,579,890 >>> mbox cmd response data (1848 bytes)
3,579,891 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,050 UART: [rt]cmd =0x43455246, len=4
3,620,901 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,677 ready_for_fw is high
1,060,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,882 >>> mbox cmd response: success
2,679,882 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,742,867 UART:
2,742,883 UART: Running Caliptra FMC ...
2,743,291 UART:
2,743,345 UART: [state] CFI Enabled
2,753,565 UART: [fht] FMC Alias Private Key: 7
2,872,563 UART: [art] Extend RT PCRs Done
2,872,991 UART: [art] Lock RT PCRs Done
2,874,515 UART: [art] Populate DV Done
2,882,630 UART: [fht] FMC Alias Private Key: 7
2,883,728 UART: [art] Derive CDI
2,884,008 UART: [art] Store in slot 0x4
2,969,955 UART: [art] Derive Key Pair
2,970,315 UART: [art] Store priv key in slot 0x5
2,983,337 UART: [art] Derive Key Pair - Done
2,997,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,047 UART: [art] PUB.X = 9F91422B3FDEC63B9683D5299E38255F6878C81EA49061C43ECC6504EA32B703861DB7FE23843E350CC91DC0C59DFFCB
3,020,816 UART: [art] PUB.Y = 64D522D8DD6C20ED1954DCE810BE071FAA9A962A94D6E2D607739972946CB11F761DFEAA8FF7FB8FB8FFF5C3F2D3064B
3,027,777 UART: [art] SIG.R = 2548624223F4600AA9A57AA7A5F35A53B1AB486F0B33CDA392DE454569268377C05CE5FC20F06BB785C39E10D05FB99E
3,034,545 UART: [art] SIG.S = E6FE0AAD3F60224123AADB2022402ADAA2FCA441A2E2F408EB7AE779610773AA235E01BA54B539EE72A0DB18B735DA85
3,058,617 UART: Caliptra RT
3,058,868 UART: [state] CFI Enabled
3,179,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,993 UART: [rt]cmd =0x50435252, len=8
3,211,487 >>> mbox cmd response data (8 bytes)
3,211,488 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,081 UART: [rt]cmd =0x50435251, len=36
3,408,503 >>> mbox cmd response data (1848 bytes)
3,408,504 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,437,969 UART: [rt]cmd =0x43455246, len=4
3,450,056 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Unprovisioned
85,758 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,461 UART: [kat] SHA2-256
893,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,236 UART: [kat] ++
897,388 UART: [kat] sha1
901,792 UART: [kat] SHA2-256
903,732 UART: [kat] SHA2-384
906,327 UART: [kat] SHA2-512-ACC
908,228 UART: [kat] ECC-384
917,797 UART: [kat] HMAC-384Kdf
922,421 UART: [kat] LMS
1,170,749 UART: [kat] --
1,171,600 UART: [cold-reset] ++
1,171,990 UART: [fht] FHT @ 0x50003400
1,174,603 UART: [idev] ++
1,174,771 UART: [idev] CDI.KEYID = 6
1,175,131 UART: [idev] SUBJECT.KEYID = 7
1,175,555 UART: [idev] UDS.KEYID = 0
1,175,900 ready_for_fw is high
1,175,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,435 UART: [idev] Erasing UDS.KEYID = 0
1,200,898 UART: [idev] Sha1 KeyId Algorithm
1,209,440 UART: [idev] --
1,210,428 UART: [ldev] ++
1,210,596 UART: [ldev] CDI.KEYID = 6
1,210,959 UART: [ldev] SUBJECT.KEYID = 5
1,211,385 UART: [ldev] AUTHORITY.KEYID = 7
1,211,848 UART: [ldev] FE.KEYID = 1
1,217,040 UART: [ldev] Erasing FE.KEYID = 1
1,244,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,590 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,909 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,128 UART: [ldev] --
1,283,541 UART: [fwproc] Wait for Commands...
1,284,295 UART: [fwproc] Recv command 0x46574c44
1,285,023 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,165 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,335 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,588 >>> mbox cmd response: success
2,827,588 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,828,624 UART: [afmc] ++
2,828,792 UART: [afmc] CDI.KEYID = 6
2,829,154 UART: [afmc] SUBJECT.KEYID = 7
2,829,579 UART: [afmc] AUTHORITY.KEYID = 5
2,864,914 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,625 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,373 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,965 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,666 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,482 UART: [afmc] --
2,908,542 UART: [cold-reset] --
2,909,316 UART: [state] Locking Datavault
2,910,489 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,093 UART: [state] Locking ICCM
2,911,571 UART: [exit] Launching FMC @ 0x40000130
2,916,901 UART:
2,916,917 UART: Running Caliptra FMC ...
2,917,325 UART:
2,917,468 UART: [state] CFI Enabled
2,928,112 UART: [fht] FMC Alias Private Key: 7
3,046,802 UART: [art] Extend RT PCRs Done
3,047,230 UART: [art] Lock RT PCRs Done
3,048,604 UART: [art] Populate DV Done
3,056,621 UART: [fht] FMC Alias Private Key: 7
3,057,723 UART: [art] Derive CDI
3,058,003 UART: [art] Store in slot 0x4
3,143,590 UART: [art] Derive Key Pair
3,143,950 UART: [art] Store priv key in slot 0x5
3,157,776 UART: [art] Derive Key Pair - Done
3,172,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,198 UART: [art] PUB.X = 52E2E81C12905241DF7BC9C316DD354855EDFE1F298807532D8A50455C97D21F8AEA25907D0D1FFB4A53FA25BED98525
3,194,968 UART: [art] PUB.Y = 4DCEA98B79FEB36A78924A706F6CF5FA26314657E0D7CD46AF230EDAFE73C3F3477C00316832FFD6F1EC0BC1DB22DE90
3,201,910 UART: [art] SIG.R = 2BF35152C5EC2DE513C833DF132AC1A4D134B6D64E38E6BBF5DEE9B0F65CD0AFDF4DFAD1915E70C499BA786CA925116E
3,208,704 UART: [art] SIG.S = 181B524CD9CFAB408458635026DFF67552928BC93AD9974B3C5752DD7EB9D2D39CC6EAEF8873D72388C8FC45E003DF90
3,232,109 UART: Caliptra RT
3,232,452 UART: [state] CFI Enabled
3,351,686 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,068 UART: [rt]cmd =0x50435252, len=8
3,383,594 >>> mbox cmd response data (8 bytes)
3,383,595 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,208 UART: [rt]cmd =0x50435251, len=36
3,580,406 >>> mbox cmd response data (1848 bytes)
3,580,407 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,609,816 UART: [rt]cmd =0x43455246, len=4
3,622,047 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,586 ready_for_fw is high
1,060,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,661 >>> mbox cmd response: success
2,678,661 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
2,741,144 UART:
2,741,160 UART: Running Caliptra FMC ...
2,741,568 UART:
2,741,711 UART: [state] CFI Enabled
2,752,537 UART: [fht] FMC Alias Private Key: 7
2,871,851 UART: [art] Extend RT PCRs Done
2,872,279 UART: [art] Lock RT PCRs Done
2,874,091 UART: [art] Populate DV Done
2,881,904 UART: [fht] FMC Alias Private Key: 7
2,883,004 UART: [art] Derive CDI
2,883,284 UART: [art] Store in slot 0x4
2,969,081 UART: [art] Derive Key Pair
2,969,441 UART: [art] Store priv key in slot 0x5
2,982,915 UART: [art] Derive Key Pair - Done
2,997,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,025 UART: [art] PUB.X = 1DF3189908CDCE84D2889BF790E423FC820981BEA8BB66B7E7006910792696C3E7D9D82327CDC39890717B55467D960C
3,020,760 UART: [art] PUB.Y = 48D124CB0649E64412431F28260A201E056ADB187877DD926C17C02C4E3622E0A14A93758F05DFC354986517C0B582F6
3,027,688 UART: [art] SIG.R = BC5F73DB0CB99672265481C1C2FC1BEAC3CDAB07B61CDE5FC7DE10C77300F9A4BB1212C6307D2B1983F8A2C39A022DF9
3,034,447 UART: [art] SIG.S = 97A60AD009721BE0A66FBFEC4B57A3BC002DADE41F00697044A9353A128F6568210F2F807A852E6D539D697D19C62B1D
3,057,928 UART: Caliptra RT
3,058,271 UART: [state] CFI Enabled
3,178,393 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,663 UART: [rt]cmd =0x50435252, len=8
3,210,367 >>> mbox cmd response data (8 bytes)
3,210,368 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,741 UART: [rt]cmd =0x50435251, len=36
3,406,969 >>> mbox cmd response data (1848 bytes)
3,406,970 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,121 UART: [rt]cmd =0x43455246, len=4
3,448,242 >>> mbox cmd response data (888 bytes)
test test_pcr::test_pcr_quote ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,271 UART:
192,610 UART: Running Caliptra ROM ...
193,790 UART:
193,945 UART: [state] CFI Enabled
261,309 UART: [state] LifecycleState = Unprovisioned
263,248 UART: [state] DebugLocked = No
265,633 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,369 UART: [kat] SHA2-256
441,070 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,607 UART: [kat] ++
452,052 UART: [kat] sha1
461,934 UART: [kat] SHA2-256
464,587 UART: [kat] SHA2-384
469,083 UART: [kat] SHA2-512-ACC
471,453 UART: [kat] ECC-384
2,765,465 UART: [kat] HMAC-384Kdf
2,776,363 UART: [kat] LMS
3,966,749 UART: [kat] --
3,971,965 UART: [cold-reset] ++
3,973,327 UART: [fht] Storing FHT @ 0x50003400
3,986,440 UART: [idev] ++
3,987,009 UART: [idev] CDI.KEYID = 6
3,987,926 UART: [idev] SUBJECT.KEYID = 7
3,989,166 UART: [idev] UDS.KEYID = 0
3,990,149 ready_for_fw is high
3,990,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,434 UART: [idev] Erasing UDS.KEYID = 0
7,321,429 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,054 UART: [idev] --
7,348,162 UART: [ldev] ++
7,348,789 UART: [ldev] CDI.KEYID = 6
7,349,715 UART: [ldev] SUBJECT.KEYID = 5
7,350,932 UART: [ldev] AUTHORITY.KEYID = 7
7,352,162 UART: [ldev] FE.KEYID = 1
7,390,144 UART: [ldev] Erasing FE.KEYID = 1
10,721,336 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,016,871 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,078,557 UART: [ldev] --
13,082,581 UART: [fwproc] Waiting for Commands...
13,084,784 UART: [fwproc] Received command 0x46574c44
13,086,967 UART: [fwproc] Received Image of size 118548 bytes
17,191,458 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,265,500 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,338,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,667,667 >>> mbox cmd response: success
17,671,322 UART: [afmc] ++
17,671,916 UART: [afmc] CDI.KEYID = 6
17,672,830 UART: [afmc] SUBJECT.KEYID = 7
17,674,201 UART: [afmc] AUTHORITY.KEYID = 5
21,040,198 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,335,366 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,337,627 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,352,056 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,366,789 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,381,205 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,401,389 UART: [afmc] --
23,405,959 UART: [cold-reset] --
23,410,464 UART: [state] Locking Datavault
23,415,813 UART: [state] Locking PCR0, PCR1 and PCR31
23,417,562 UART: [state] Locking ICCM
23,419,663 UART: [exit] Launching FMC @ 0x40000130
23,428,059 UART:
23,428,295 UART: Running Caliptra FMC ...
23,429,391 UART:
23,429,549 UART: [state] CFI Enabled
23,497,327 UART: [fht] FMC Alias Private Key: 7
25,859,097 UART: [art] Extend RT PCRs Done
25,860,843 UART: [art] Lock RT PCRs Done
25,861,974 UART: [art] Populate DV Done
25,867,303 UART: [fht] FMC Alias Private Key: 7
25,868,958 UART: [art] Derive CDI
25,869,780 UART: [art] Store in slot 0x4
25,924,028 UART: [art] Derive Key Pair
25,925,087 UART: [art] Store priv key in slot 0x5
29,218,341 UART: [art] Derive Key Pair - Done
29,231,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,520,276 UART: [art] Erasing AUTHORITY.KEYID = 7
31,521,785 UART: [art] PUB.X = 6BA324861A43F798A61291BE36F345DDF6122A1C0BA5FABAA8C66178EAC0CD7DFBC4025AAC3F4235D7112A157D346D65
31,529,083 UART: [art] PUB.Y = 97BF8CAAB327B30C4750BC09905728BDE1A164AC0038913D549DFF5D849ACB78CEFD5EB43A4E414AAA142EF502CD8A0D
31,536,317 UART: [art] SIG.R = B0D45AA3A1C11AEEC0AF629529EB50E847FE8EE8A650D1F1707D9E7FDD54859D400677A32D6F6C09D65D85138299704A
31,543,703 UART: [art] SIG.S = EB5B9252D8DCBDC8704405C6F46A4D3C045799D4146A71F7D3746865998D361A0E69B77BAB129E9C9C98A1D888656E31
32,848,818 UART: Caliptra RT
32,849,533 UART: [state] CFI Enabled
33,026,570 UART: [rt] RT listening for mailbox commands...
33,028,549 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,058,658 UART: [rt]cmd =0x44504543, len=28
33,101,633 >>> mbox cmd response data (2076 bytes)
33,111,727 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,141,868 UART: [rt]cmd =0x44504543, len=28
33,182,242 >>> mbox cmd response data (2076 bytes)
33,527,850 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
33,560,941 UART: [rt]cmd =0x49444550, len=353
33,574,454 >>> mbox cmd response data (8 bytes)
33,574,927 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,604,754 UART: [rt]cmd =0x44504543, len=28
33,647,423 >>> mbox cmd response data (2076 bytes)
33,657,439 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,687,541 UART: [rt]cmd =0x44504543, len=28
33,728,574 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,784,205 ready_for_fw is high
3,784,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,042 >>> mbox cmd response: success
23,639,814 UART:
23,640,222 UART: Running Caliptra FMC ...
23,641,368 UART:
23,641,527 UART: [state] CFI Enabled
23,709,737 UART: [fht] FMC Alias Private Key: 7
26,051,082 UART: [art] Extend RT PCRs Done
26,052,316 UART: [art] Lock RT PCRs Done
26,054,056 UART: [art] Populate DV Done
26,059,534 UART: [fht] FMC Alias Private Key: 7
26,061,132 UART: [art] Derive CDI
26,061,949 UART: [art] Store in slot 0x4
26,118,178 UART: [art] Derive Key Pair
26,119,215 UART: [art] Store priv key in slot 0x5
29,412,846 UART: [art] Derive Key Pair - Done
29,426,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,713,057 UART: [art] Erasing AUTHORITY.KEYID = 7
31,714,567 UART: [art] PUB.X = D5EA873E406B612C0CA1DFAEBC6B2806856AE9E44C860264B54E17CD6ECD6C78322E52AE198BFF5FA521EBF33B6971B3
31,721,882 UART: [art] PUB.Y = 8613DCF0A3BDF1DA95F0B41A99A8C52C7FB54950C192E8360D8ED1D6DFB1AF2C34DF143639C9C7BC7597E69901D4D15C
31,729,125 UART: [art] SIG.R = 98C062EA67B8E2DA628097A1408009A31A3B8D35E338343B284A3AFD5D991682B37DD65DEA9BA0EFED2EF500442EDDF4
31,736,516 UART: [art] SIG.S = 988A99630504FD60C9ECB6ABBB12C5B278586F80D1F83E67B54FDA28D1C3ED1CEB8F5C56A9E8CBD543A8F530484DF63F
33,041,492 UART: Caliptra RT
33,042,213 UART: [state] CFI Enabled
33,218,925 UART: [rt] RT listening for mailbox commands...
33,220,865 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,250,735 UART: [rt]cmd =0x44504543, len=28
33,293,652 >>> mbox cmd response data (2076 bytes)
33,303,638 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,333,548 UART: [rt]cmd =0x44504543, len=28
33,374,088 >>> mbox cmd response data (2076 bytes)
33,718,874 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,752,115 UART: [rt]cmd =0x49444550, len=352
33,763,318 >>> mbox cmd response data (8 bytes)
33,763,803 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,793,794 UART: [rt]cmd =0x44504543, len=28
33,836,836 >>> mbox cmd response data (2076 bytes)
33,846,856 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,876,586 UART: [rt]cmd =0x44504543, len=28
33,917,343 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,158 writing to cptra_bootfsm_go
192,449 UART:
192,825 UART: Running Caliptra ROM ...
193,953 UART:
603,572 UART: [state] CFI Enabled
617,522 UART: [state] LifecycleState = Unprovisioned
619,499 UART: [state] DebugLocked = No
620,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,454 UART: [kat] SHA2-256
795,149 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,720 UART: [kat] ++
806,193 UART: [kat] sha1
816,676 UART: [kat] SHA2-256
819,407 UART: [kat] SHA2-384
825,321 UART: [kat] SHA2-512-ACC
827,683 UART: [kat] ECC-384
3,109,574 UART: [kat] HMAC-384Kdf
3,120,807 UART: [kat] LMS
4,310,904 UART: [kat] --
4,315,360 UART: [cold-reset] ++
4,316,375 UART: [fht] Storing FHT @ 0x50003400
4,327,635 UART: [idev] ++
4,328,190 UART: [idev] CDI.KEYID = 6
4,329,217 UART: [idev] SUBJECT.KEYID = 7
4,330,387 UART: [idev] UDS.KEYID = 0
4,331,438 ready_for_fw is high
4,331,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,575 UART: [idev] Erasing UDS.KEYID = 0
7,619,689 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,743 UART: [idev] --
7,644,197 UART: [ldev] ++
7,644,799 UART: [ldev] CDI.KEYID = 6
7,645,702 UART: [ldev] SUBJECT.KEYID = 5
7,646,754 UART: [ldev] AUTHORITY.KEYID = 7
7,648,101 UART: [ldev] FE.KEYID = 1
7,660,662 UART: [ldev] Erasing FE.KEYID = 1
10,947,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,361 UART: [ldev] --
13,305,917 UART: [fwproc] Waiting for Commands...
13,309,033 UART: [fwproc] Received command 0x46574c44
13,311,228 UART: [fwproc] Received Image of size 118548 bytes
17,417,005 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,324 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,564,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,700 >>> mbox cmd response: success
17,898,823 UART: [afmc] ++
17,899,439 UART: [afmc] CDI.KEYID = 6
17,900,345 UART: [afmc] SUBJECT.KEYID = 7
17,901,559 UART: [afmc] AUTHORITY.KEYID = 5
21,212,167 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,504,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,506,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,521,268 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,535,991 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,550,386 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,572,944 UART: [afmc] --
23,577,460 UART: [cold-reset] --
23,581,317 UART: [state] Locking Datavault
23,586,175 UART: [state] Locking PCR0, PCR1 and PCR31
23,587,927 UART: [state] Locking ICCM
23,590,525 UART: [exit] Launching FMC @ 0x40000130
23,598,914 UART:
23,599,143 UART: Running Caliptra FMC ...
23,600,236 UART:
23,600,391 UART: [state] CFI Enabled
23,608,756 UART: [fht] FMC Alias Private Key: 7
25,948,775 UART: [art] Extend RT PCRs Done
25,949,999 UART: [art] Lock RT PCRs Done
25,951,762 UART: [art] Populate DV Done
25,957,333 UART: [fht] FMC Alias Private Key: 7
25,958,925 UART: [art] Derive CDI
25,959,736 UART: [art] Store in slot 0x4
26,002,219 UART: [art] Derive Key Pair
26,003,264 UART: [art] Store priv key in slot 0x5
29,245,407 UART: [art] Derive Key Pair - Done
29,258,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,395 UART: [art] PUB.X = 19850AD71BEBD5259F5113C4EEABE6E3CF75E1CEF8C9BBA310A90507C9685DCF19A4383118AE7DFBFAAD99F51F36AF49
31,547,691 UART: [art] PUB.Y = DC51A8368BA8EFF2CB1402026F1D7921EE95CBE7A0BAE2795952680BC03BE12B5698BD1836FE1169787BBBAA11B01E99
31,554,965 UART: [art] SIG.R = 451657503F9F08BA58732231EBDBAB00AEBB565EA1874B22263EFEB85C5B09B8BF6899B63A0768AFEDCDC80ADD6C1478
31,562,344 UART: [art] SIG.S = 600D53F67936B1459406486BF6250480658A594570721D428FF798B07C349A3DC26892BC7BE76AAE5408B95173AFCEBD
32,867,860 UART: Caliptra RT
32,868,556 UART: [state] CFI Enabled
33,001,763 UART: [rt] RT listening for mailbox commands...
33,003,717 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,033,515 UART: [rt]cmd =0x44504543, len=28
33,076,536 >>> mbox cmd response data (2076 bytes)
33,086,730 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,116,929 UART: [rt]cmd =0x44504543, len=28
33,157,432 >>> mbox cmd response data (2076 bytes)
33,501,969 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
33,535,004 UART: [rt]cmd =0x49444550, len=352
33,546,470 >>> mbox cmd response data (8 bytes)
33,546,920 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,576,737 UART: [rt]cmd =0x44504543, len=28
33,619,957 >>> mbox cmd response data (2076 bytes)
33,629,966 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,660,050 UART: [rt]cmd =0x44504543, len=28
33,701,244 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,129,473 ready_for_fw is high
4,130,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,313 >>> mbox cmd response: success
23,805,001 UART:
23,805,580 UART: Running Caliptra FMC ...
23,806,697 UART:
23,806,846 UART: [state] CFI Enabled
23,814,470 UART: [fht] FMC Alias Private Key: 7
26,154,327 UART: [art] Extend RT PCRs Done
26,155,555 UART: [art] Lock RT PCRs Done
26,157,004 UART: [art] Populate DV Done
26,162,480 UART: [fht] FMC Alias Private Key: 7
26,164,048 UART: [art] Derive CDI
26,164,793 UART: [art] Store in slot 0x4
26,207,502 UART: [art] Derive Key Pair
26,208,498 UART: [art] Store priv key in slot 0x5
29,450,568 UART: [art] Derive Key Pair - Done
29,463,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,864 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,392 UART: [art] PUB.X = 9F2FD6D6D685A1599AA22FF22A8FF6549457A87B8D33197C5C9C91DC37623697F70A575C0C3B3F686B7C6A91C8469C9B
31,752,639 UART: [art] PUB.Y = A332BCA29B69752D14E370564EC3A1CBA60E46F1D09662C309D47F242EB186E20AF3F370ECD6385C61C803CDDE76ADF5
31,759,885 UART: [art] SIG.R = E26E8C22C5DAF523215157ED0395DD57C06E3038822E6E414EFB3C733A3512A88C549F25972709318CFF06542B34875D
31,767,290 UART: [art] SIG.S = B6531194E3BAB3194F201BFB2C81EEAACEE68BF367C20AD871164F0E9B3376715ED5656BAF6D6D1396A6613CC54A991A
33,072,485 UART: Caliptra RT
33,073,208 UART: [state] CFI Enabled
33,206,595 UART: [rt] RT listening for mailbox commands...
33,208,520 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,238,507 UART: [rt]cmd =0x44504543, len=28
33,281,661 >>> mbox cmd response data (2076 bytes)
33,291,709 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,321,742 UART: [rt]cmd =0x44504543, len=28
33,362,160 >>> mbox cmd response data (2076 bytes)
33,706,276 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
33,739,560 UART: [rt]cmd =0x49444550, len=354
33,753,228 >>> mbox cmd response data (8 bytes)
33,753,714 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,783,623 UART: [rt]cmd =0x44504543, len=28
33,826,150 >>> mbox cmd response data (2076 bytes)
33,836,194 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
33,866,094 UART: [rt]cmd =0x44504543, len=28
33,907,181 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,973 UART:
192,351 UART: Running Caliptra ROM ...
193,549 UART:
193,701 UART: [state] CFI Enabled
263,455 UART: [state] LifecycleState = Unprovisioned
265,388 UART: [state] DebugLocked = No
267,337 UART: [state] WD Timer not started. Device not locked for debugging
271,096 UART: [kat] SHA2-256
450,733 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,536 UART: [kat] ++
461,978 UART: [kat] sha1
474,337 UART: [kat] SHA2-256
477,002 UART: [kat] SHA2-384
482,917 UART: [kat] SHA2-512-ACC
485,277 UART: [kat] ECC-384
2,947,966 UART: [kat] HMAC-384Kdf
2,970,374 UART: [kat] LMS
3,446,827 UART: [kat] --
3,451,544 UART: [cold-reset] ++
3,453,074 UART: [fht] FHT @ 0x50003400
3,464,206 UART: [idev] ++
3,464,771 UART: [idev] CDI.KEYID = 6
3,465,689 UART: [idev] SUBJECT.KEYID = 7
3,466,929 UART: [idev] UDS.KEYID = 0
3,467,972 ready_for_fw is high
3,468,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,247 UART: [idev] Erasing UDS.KEYID = 0
5,987,659 UART: [idev] Sha1 KeyId Algorithm
6,010,536 UART: [idev] --
6,015,745 UART: [ldev] ++
6,016,330 UART: [ldev] CDI.KEYID = 6
6,017,241 UART: [ldev] SUBJECT.KEYID = 5
6,018,456 UART: [ldev] AUTHORITY.KEYID = 7
6,019,741 UART: [ldev] FE.KEYID = 1
6,057,878 UART: [ldev] Erasing FE.KEYID = 1
8,565,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,948 UART: [ldev] --
10,375,500 UART: [fwproc] Wait for Commands...
10,377,214 UART: [fwproc] Recv command 0x46574c44
10,379,193 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,758 >>> mbox cmd response: success
14,345,464 UART: [afmc] ++
14,346,053 UART: [afmc] CDI.KEYID = 6
14,347,069 UART: [afmc] SUBJECT.KEYID = 7
14,348,221 UART: [afmc] AUTHORITY.KEYID = 5
16,872,951 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,862 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,730 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,648,376 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,730 UART: [afmc] --
18,676,217 UART: [cold-reset] --
18,678,959 UART: [state] Locking Datavault
18,684,419 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,172 UART: [state] Locking ICCM
18,687,188 UART: [exit] Launching FMC @ 0x40000130
18,695,626 UART:
18,695,857 UART: Running Caliptra FMC ...
18,696,949 UART:
18,697,110 UART: [state] CFI Enabled
18,754,886 UART: [fht] FMC Alias Private Key: 7
20,521,804 UART: [art] Extend RT PCRs Done
20,523,032 UART: [art] Lock RT PCRs Done
20,524,716 UART: [art] Populate DV Done
20,530,123 UART: [fht] FMC Alias Private Key: 7
20,531,813 UART: [art] Derive CDI
20,532,552 UART: [art] Store in slot 0x4
20,587,860 UART: [art] Derive Key Pair
20,588,918 UART: [art] Store priv key in slot 0x5
23,051,509 UART: [art] Derive Key Pair - Done
23,064,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,777,274 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,765 UART: [art] PUB.X = 3687D36CA36A778711A294F3F3D797EEEDFA0CFE4FE9D6714C067E7D6B5134BC0CC7C3A006B8B8F784BACD73F2949029
24,786,068 UART: [art] PUB.Y = 9CEBD718CF225E6CDFB66949D88EE60902BF946BB279DD02873DC07C8AAC2B894ED38BD08CD8B37FEE10930003DC836C
24,793,298 UART: [art] SIG.R = 100F385160A322C9900EA1935AF933924A8F5B8DC8F9D4D07A591F3CC486F5B59A5F43D8D63A33DB9383BC1C8F5BB953
24,800,684 UART: [art] SIG.S = 75A9D84D4D5D32C72996CFA6242532BF8A33CA8A2A86C181FC27ACCD431E1F76A2EBFB96A0A7313982E5D6191B7CDCCF
25,779,680 UART: Caliptra RT
25,780,383 UART: [state] CFI Enabled
25,960,240 UART: [rt] RT listening for mailbox commands...
25,962,185 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,992,099 UART: [rt]cmd =0x44504543, len=28
26,034,665 >>> mbox cmd response data (2076 bytes)
26,044,786 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,074,859 UART: [rt]cmd =0x44504543, len=28
26,115,552 >>> mbox cmd response data (2076 bytes)
26,459,572 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,492,584 UART: [rt]cmd =0x49444550, len=353
26,506,297 >>> mbox cmd response data (8 bytes)
26,506,783 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,536,784 UART: [rt]cmd =0x44504543, len=28
26,579,525 >>> mbox cmd response data (2076 bytes)
26,589,552 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,619,781 UART: [rt]cmd =0x44504543, len=28
26,660,822 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,463,005 ready_for_fw is high
3,463,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,225,213 >>> mbox cmd response: success
18,512,797 UART:
18,513,199 UART: Running Caliptra FMC ...
18,514,331 UART:
18,514,493 UART: [state] CFI Enabled
18,582,902 UART: [fht] FMC Alias Private Key: 7
20,370,865 UART: [art] Extend RT PCRs Done
20,372,087 UART: [art] Lock RT PCRs Done
20,374,089 UART: [art] Populate DV Done
20,379,347 UART: [fht] FMC Alias Private Key: 7
20,381,051 UART: [art] Derive CDI
20,381,877 UART: [art] Store in slot 0x4
20,436,546 UART: [art] Derive Key Pair
20,437,583 UART: [art] Store priv key in slot 0x5
22,900,794 UART: [art] Derive Key Pair - Done
22,913,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,453 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,973 UART: [art] PUB.X = F16D6A609A97A66D8B13885CEA3585A4CFBA468CA9A1AA006C770F063275C0E93CF159968FBA81C256B81D1F71AFE93D
24,635,230 UART: [art] PUB.Y = AD59C642708831AC36CD1F4701B58438C41CFE7FBC876D57C9397D27947922297D05EFAA0BA9E2B4C8C5D001ED28FB4A
24,642,482 UART: [art] SIG.R = 400AA771AB212A30C108FB34F0AB3CEE49AC1D28E8D5B6B247C839D323D1110C7CEE194C662360CE324678B6EB3FAA87
24,649,874 UART: [art] SIG.S = 86E90412C073FE286F2AAFF5437C69BC8045FDFF5198B7B436DAA39C17E951153A57D6D484A1CA3050B72F5D63289BEE
25,628,584 UART: Caliptra RT
25,629,310 UART: [state] CFI Enabled
25,810,176 UART: [rt] RT listening for mailbox commands...
25,812,098 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,842,402 UART: [rt]cmd =0x44504543, len=28
25,885,093 >>> mbox cmd response data (2076 bytes)
25,895,167 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,925,230 UART: [rt]cmd =0x44504543, len=28
25,965,970 >>> mbox cmd response data (2076 bytes)
26,310,054 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,343,071 UART: [rt]cmd =0x49444550, len=352
26,354,332 >>> mbox cmd response data (8 bytes)
26,354,844 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,384,643 UART: [rt]cmd =0x44504543, len=28
26,427,275 >>> mbox cmd response data (2076 bytes)
26,437,311 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,467,313 UART: [rt]cmd =0x44504543, len=28
26,508,329 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,519 UART:
192,881 UART: Running Caliptra ROM ...
193,976 UART:
603,617 UART: [state] CFI Enabled
615,515 UART: [state] LifecycleState = Unprovisioned
617,457 UART: [state] DebugLocked = No
619,121 UART: [state] WD Timer not started. Device not locked for debugging
622,731 UART: [kat] SHA2-256
802,394 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,941 UART: [kat] ++
814,433 UART: [kat] sha1
825,744 UART: [kat] SHA2-256
828,413 UART: [kat] SHA2-384
833,060 UART: [kat] SHA2-512-ACC
835,428 UART: [kat] ECC-384
3,279,469 UART: [kat] HMAC-384Kdf
3,290,427 UART: [kat] LMS
3,766,884 UART: [kat] --
3,770,737 UART: [cold-reset] ++
3,773,161 UART: [fht] FHT @ 0x50003400
3,785,187 UART: [idev] ++
3,785,762 UART: [idev] CDI.KEYID = 6
3,786,803 UART: [idev] SUBJECT.KEYID = 7
3,787,984 UART: [idev] UDS.KEYID = 0
3,788,922 ready_for_fw is high
3,789,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,969 UART: [idev] Erasing UDS.KEYID = 0
6,265,597 UART: [idev] Sha1 KeyId Algorithm
6,289,950 UART: [idev] --
6,295,025 UART: [ldev] ++
6,295,605 UART: [ldev] CDI.KEYID = 6
6,296,541 UART: [ldev] SUBJECT.KEYID = 5
6,297,703 UART: [ldev] AUTHORITY.KEYID = 7
6,298,995 UART: [ldev] FE.KEYID = 1
6,311,047 UART: [ldev] Erasing FE.KEYID = 1
8,790,754 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,218 UART: [ldev] --
10,586,466 UART: [fwproc] Wait for Commands...
10,588,682 UART: [fwproc] Recv command 0x46574c44
10,590,727 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,457 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,522 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,532 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,225 >>> mbox cmd response: success
14,567,162 UART: [afmc] ++
14,567,775 UART: [afmc] CDI.KEYID = 6
14,568,804 UART: [afmc] SUBJECT.KEYID = 7
14,569,912 UART: [afmc] AUTHORITY.KEYID = 5
17,069,434 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,914 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,759 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,829 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,382 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,543 UART: [afmc] --
18,868,490 UART: [cold-reset] --
18,872,735 UART: [state] Locking Datavault
18,877,774 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,535 UART: [state] Locking ICCM
18,880,684 UART: [exit] Launching FMC @ 0x40000130
18,889,141 UART:
18,889,379 UART: Running Caliptra FMC ...
18,890,485 UART:
18,890,644 UART: [state] CFI Enabled
18,899,134 UART: [fht] FMC Alias Private Key: 7
20,665,152 UART: [art] Extend RT PCRs Done
20,666,374 UART: [art] Lock RT PCRs Done
20,667,920 UART: [art] Populate DV Done
20,673,334 UART: [fht] FMC Alias Private Key: 7
20,674,936 UART: [art] Derive CDI
20,675,754 UART: [art] Store in slot 0x4
20,718,355 UART: [art] Derive Key Pair
20,719,356 UART: [art] Store priv key in slot 0x5
23,146,231 UART: [art] Derive Key Pair - Done
23,159,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,996 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,508 UART: [art] PUB.X = C8712376DA425BDBCA6C85498B0234C2EF52C0A55BB86A1DDFC8C2C35B966E68CA0C8403212A8EF5B5535E8B219B6D8C
24,874,759 UART: [art] PUB.Y = 8758BAEB1CE5E66C88B4F824EC0059AA7B934D67C0E8312106C94B3CB2373DAF5F335EE5B27190207D1EA06E8C75D55D
24,882,051 UART: [art] SIG.R = 5476F204815A7A908CBC25C344D9A66762B38A81DFCBB465ED244977B0E5683F6A32EC5827942733690C81771D882F15
24,889,396 UART: [art] SIG.S = FAC5309BF772BB7A36C67A243905DFBADDB1074486FA0E04F91408B4514AF047A94726A538A48D8CDFD7AD703D79D111
25,867,999 UART: Caliptra RT
25,868,702 UART: [state] CFI Enabled
26,000,729 UART: [rt] RT listening for mailbox commands...
26,002,672 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,032,766 UART: [rt]cmd =0x44504543, len=28
26,075,797 >>> mbox cmd response data (2076 bytes)
26,085,821 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,115,968 UART: [rt]cmd =0x44504543, len=28
26,156,675 >>> mbox cmd response data (2076 bytes)
26,501,350 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,534,457 UART: [rt]cmd =0x49444550, len=353
26,548,094 >>> mbox cmd response data (8 bytes)
26,548,584 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,578,589 UART: [rt]cmd =0x44504543, len=28
26,621,167 >>> mbox cmd response data (2076 bytes)
26,631,174 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,661,059 UART: [rt]cmd =0x44504543, len=28
26,702,522 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,780,085 ready_for_fw is high
3,780,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,718 >>> mbox cmd response: success
18,696,699 UART:
18,697,106 UART: Running Caliptra FMC ...
18,698,248 UART:
18,698,406 UART: [state] CFI Enabled
18,706,581 UART: [fht] FMC Alias Private Key: 7
20,472,800 UART: [art] Extend RT PCRs Done
20,474,021 UART: [art] Lock RT PCRs Done
20,475,787 UART: [art] Populate DV Done
20,481,438 UART: [fht] FMC Alias Private Key: 7
20,483,094 UART: [art] Derive CDI
20,483,838 UART: [art] Store in slot 0x4
20,526,707 UART: [art] Derive Key Pair
20,527,704 UART: [art] Store priv key in slot 0x5
22,955,308 UART: [art] Derive Key Pair - Done
22,968,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,789 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,285 UART: [art] PUB.X = 5FB144970E0F046A142222482B8839E4D2037134C4D28AB6B33FA2988F13394BBF03960FEC7B4F8E6E3A93B26D9B10B3
24,683,539 UART: [art] PUB.Y = 00372F77BD8C472F65AB2C763D600BA94B0984F0B586294CD7D768474EEBF78FBD4313D0B644E6EF939D517397D8F1BA
24,690,818 UART: [art] SIG.R = 7E2AB19AFCCB6454D6BE2DA54218C01E584511718703670B5A0B808A28691C943EB0871CD0AE4BA9D8804BBF064DAA17
24,698,218 UART: [art] SIG.S = EB66036C9BE56257F65EFECD4011F16C6BE5BF8ADF56043CEDC0BF4CFF95BBAF06BB90DB2E9EFD2418AEA07C19FBB270
25,677,237 UART: Caliptra RT
25,677,943 UART: [state] CFI Enabled
25,810,826 UART: [rt] RT listening for mailbox commands...
25,812,754 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,843,000 UART: [rt]cmd =0x44504543, len=28
25,886,022 >>> mbox cmd response data (2076 bytes)
25,896,023 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
25,925,973 UART: [rt]cmd =0x44504543, len=28
25,966,082 >>> mbox cmd response data (2076 bytes)
26,310,802 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,343,706 UART: [rt]cmd =0x49444550, len=353
26,357,170 >>> mbox cmd response data (8 bytes)
26,357,662 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,387,615 UART: [rt]cmd =0x44504543, len=28
26,430,755 >>> mbox cmd response data (2076 bytes)
26,440,818 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,470,666 UART: [rt]cmd =0x44504543, len=28
26,511,937 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
192,185 UART:
192,538 UART: Running Caliptra ROM ...
193,757 UART:
193,917 UART: [state] CFI Enabled
264,049 UART: [state] LifecycleState = Unprovisioned
266,476 UART: [state] DebugLocked = No
268,512 UART: [state] WD Timer not started. Device not locked for debugging
272,333 UART: [kat] SHA2-256
462,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,947 UART: [kat] ++
473,448 UART: [kat] sha1
483,187 UART: [kat] SHA2-256
486,266 UART: [kat] SHA2-384
491,615 UART: [kat] SHA2-512-ACC
494,192 UART: [kat] ECC-384
2,948,703 UART: [kat] HMAC-384Kdf
2,970,928 UART: [kat] LMS
3,502,731 UART: [kat] --
3,508,385 UART: [cold-reset] ++
3,509,392 UART: [fht] FHT @ 0x50003400
3,521,666 UART: [idev] ++
3,522,411 UART: [idev] CDI.KEYID = 6
3,523,320 UART: [idev] SUBJECT.KEYID = 7
3,524,490 UART: [idev] UDS.KEYID = 0
3,525,407 ready_for_fw is high
3,525,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,639 UART: [idev] Erasing UDS.KEYID = 0
6,024,330 UART: [idev] Sha1 KeyId Algorithm
6,047,394 UART: [idev] --
6,052,351 UART: [ldev] ++
6,053,035 UART: [ldev] CDI.KEYID = 6
6,053,928 UART: [ldev] SUBJECT.KEYID = 5
6,055,081 UART: [ldev] AUTHORITY.KEYID = 7
6,056,367 UART: [ldev] FE.KEYID = 1
6,098,746 UART: [ldev] Erasing FE.KEYID = 1
8,606,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,721 UART: [ldev] --
10,412,772 UART: [fwproc] Wait for Commands...
10,415,726 UART: [fwproc] Recv command 0x46574c44
10,418,025 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,450 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,621 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,667,526 >>> mbox cmd response: success
14,671,825 UART: [afmc] ++
14,672,560 UART: [afmc] CDI.KEYID = 6
14,673,692 UART: [afmc] SUBJECT.KEYID = 7
14,675,184 UART: [afmc] AUTHORITY.KEYID = 5
17,214,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,936 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,982 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,127 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,991 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,678 UART: [afmc] --
19,032,765 UART: [cold-reset] --
19,038,299 UART: [state] Locking Datavault
19,041,784 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,930 UART: [state] Locking ICCM
19,046,025 UART: [exit] Launching FMC @ 0x40000130
19,054,704 UART:
19,054,943 UART: Running Caliptra FMC ...
19,056,061 UART:
19,056,219 UART: [state] CFI Enabled
19,113,878 UART: [fht] FMC Alias Private Key: 7
20,879,858 UART: [art] Extend RT PCRs Done
20,881,080 UART: [art] Lock RT PCRs Done
20,882,957 UART: [art] Populate DV Done
20,888,466 UART: [fht] FMC Alias Private Key: 7
20,889,995 UART: [art] Derive CDI
20,890,725 UART: [art] Store in slot 0x4
20,946,450 UART: [art] Derive Key Pair
20,947,440 UART: [art] Store priv key in slot 0x5
23,409,810 UART: [art] Derive Key Pair - Done
23,422,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,136,558 UART: [art] Erasing AUTHORITY.KEYID = 7
25,138,052 UART: [art] PUB.X = 120083DEA68F359EEBD638A52C2FBFDCA3B5E48E4F3DD671BFE06D0F6F3BBCC297D9B82E7206E3ABCC3B9DC41E6391E6
25,145,357 UART: [art] PUB.Y = CF056ED5D3701D86A8655E85C1B1055E367E158E83E357578FD544C5C7107F96A8C7AE0D3F8A106B5E75302DFCF63C3C
25,152,611 UART: [art] SIG.R = 3253E1D1F2FB460D53F91485D1128177DDCF77A3620A06322553DF2E56DC1A3354875EE25C39A85AA5F0405A2404EE82
25,159,964 UART: [art] SIG.S = 8B98D3DBF8E8187CF81140D37CB00C7460F9C438E0B37CCDE3B616166D8B361FB3CEEE30E4708D66C76F31B0EBDBB2C5
26,138,989 UART: Caliptra RT
26,139,701 UART: [state] CFI Enabled
26,320,320 UART: [rt] RT listening for mailbox commands...
26,322,297 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,352,546 UART: [rt]cmd =0x44504543, len=28
26,395,877 >>> mbox cmd response data (2076 bytes)
26,405,952 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,435,851 UART: [rt]cmd =0x44504543, len=28
26,476,644 >>> mbox cmd response data (2076 bytes)
26,821,063 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,854,097 UART: [rt]cmd =0x49444550, len=353
26,867,783 >>> mbox cmd response data (8 bytes)
26,868,270 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,898,071 UART: [rt]cmd =0x44504543, len=28
26,941,112 >>> mbox cmd response data (2076 bytes)
26,951,130 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,981,275 UART: [rt]cmd =0x44504543, len=28
27,022,221 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,440,012 ready_for_fw is high
3,440,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,850,646 >>> mbox cmd response: success
19,138,406 UART:
19,138,792 UART: Running Caliptra FMC ...
19,139,935 UART:
19,140,094 UART: [state] CFI Enabled
19,204,532 UART: [fht] FMC Alias Private Key: 7
20,970,759 UART: [art] Extend RT PCRs Done
20,971,979 UART: [art] Lock RT PCRs Done
20,973,551 UART: [art] Populate DV Done
20,978,916 UART: [fht] FMC Alias Private Key: 7
20,980,569 UART: [art] Derive CDI
20,981,380 UART: [art] Store in slot 0x4
21,036,923 UART: [art] Derive Key Pair
21,037,968 UART: [art] Store priv key in slot 0x5
23,500,285 UART: [art] Derive Key Pair - Done
23,513,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,226,315 UART: [art] Erasing AUTHORITY.KEYID = 7
25,227,834 UART: [art] PUB.X = 3C7A3B336B960E2D19BDD0FD02D8B9D879D2FACC4307FCACE6EA9F5CCB5188A5BDF576BD6DF30D823AC9D32D73C895D5
25,235,127 UART: [art] PUB.Y = 02BB04F11FFD92B7BD807767895CB33D0018CDA364641E23B0E794F0F47BD31AD019EEA26917A6DB06E3271BD0742438
25,242,366 UART: [art] SIG.R = 431C8E8D4B690D4DBD07B8357276EEC5D08192C64C14E929CEE0E4F0CAF2B3B91F761B5C7E28882D7FB3576CAD18E159
25,249,757 UART: [art] SIG.S = A4C6939B3EFD0E502FF72BA87F767E815DB0853E3AE004A01CFBF2AE4B428E8BD539702875DA5DA2D307AA6DBE938D32
26,228,868 UART: Caliptra RT
26,229,564 UART: [state] CFI Enabled
26,408,767 UART: [rt] RT listening for mailbox commands...
26,410,709 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,440,631 UART: [rt]cmd =0x44504543, len=28
26,483,439 >>> mbox cmd response data (2076 bytes)
26,493,429 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,523,459 UART: [rt]cmd =0x44504543, len=28
26,563,940 >>> mbox cmd response data (2076 bytes)
26,908,452 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
26,941,596 UART: [rt]cmd =0x49444550, len=353
26,955,256 >>> mbox cmd response data (8 bytes)
26,955,773 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,985,611 UART: [rt]cmd =0x44504543, len=28
27,028,469 >>> mbox cmd response data (2076 bytes)
27,038,511 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,068,375 UART: [rt]cmd =0x44504543, len=28
27,109,481 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,446 UART:
192,815 UART: Running Caliptra ROM ...
194,001 UART:
603,611 UART: [state] CFI Enabled
617,928 UART: [state] LifecycleState = Unprovisioned
620,444 UART: [state] DebugLocked = No
622,630 UART: [state] WD Timer not started. Device not locked for debugging
626,901 UART: [kat] SHA2-256
816,754 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,565 UART: [kat] ++
828,167 UART: [kat] sha1
839,409 UART: [kat] SHA2-256
842,415 UART: [kat] SHA2-384
849,328 UART: [kat] SHA2-512-ACC
851,921 UART: [kat] ECC-384
3,293,866 UART: [kat] HMAC-384Kdf
3,307,125 UART: [kat] LMS
3,838,944 UART: [kat] --
3,843,163 UART: [cold-reset] ++
3,845,734 UART: [fht] FHT @ 0x50003400
3,856,934 UART: [idev] ++
3,857,647 UART: [idev] CDI.KEYID = 6
3,858,682 UART: [idev] SUBJECT.KEYID = 7
3,859,787 UART: [idev] UDS.KEYID = 0
3,861,051 ready_for_fw is high
3,861,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,112 UART: [idev] Erasing UDS.KEYID = 0
6,333,771 UART: [idev] Sha1 KeyId Algorithm
6,355,649 UART: [idev] --
6,361,328 UART: [ldev] ++
6,362,015 UART: [ldev] CDI.KEYID = 6
6,362,912 UART: [ldev] SUBJECT.KEYID = 5
6,364,153 UART: [ldev] AUTHORITY.KEYID = 7
6,365,337 UART: [ldev] FE.KEYID = 1
6,374,991 UART: [ldev] Erasing FE.KEYID = 1
8,851,349 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,148 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,179 UART: [ldev] --
10,641,241 UART: [fwproc] Wait for Commands...
10,643,832 UART: [fwproc] Recv command 0x46574c44
10,646,145 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,466 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,664 >>> mbox cmd response: success
14,920,872 UART: [afmc] ++
14,921,608 UART: [afmc] CDI.KEYID = 6
14,922,725 UART: [afmc] SUBJECT.KEYID = 7
14,924,228 UART: [afmc] AUTHORITY.KEYID = 5
17,426,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,149,529 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,151,657 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,166,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,181,769 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,196,691 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,868 UART: [afmc] --
19,223,940 UART: [cold-reset] --
19,227,893 UART: [state] Locking Datavault
19,234,367 UART: [state] Locking PCR0, PCR1 and PCR31
19,236,531 UART: [state] Locking ICCM
19,239,545 UART: [exit] Launching FMC @ 0x40000130
19,248,194 UART:
19,248,440 UART: Running Caliptra FMC ...
19,249,546 UART:
19,249,719 UART: [state] CFI Enabled
19,257,776 UART: [fht] FMC Alias Private Key: 7
21,023,802 UART: [art] Extend RT PCRs Done
21,025,671 UART: [art] Lock RT PCRs Done
21,026,691 UART: [art] Populate DV Done
21,031,978 UART: [fht] FMC Alias Private Key: 7
21,033,470 UART: [art] Derive CDI
21,034,263 UART: [art] Store in slot 0x4
21,076,438 UART: [art] Derive Key Pair
21,077,473 UART: [art] Store priv key in slot 0x5
23,504,405 UART: [art] Derive Key Pair - Done
23,517,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,886 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,903 UART: [art] PUB.X = 018B5E54D2E5128DA0F96D735DDCD1E045C95C0544FA1FA769B56CD00BBBA9578961AB8417C18592231EC897436A44FE
25,232,677 UART: [art] PUB.Y = 199CF972B3A3FD8CD4B3B2FB76DFF798DE927FFAF6E3DCCAAD8384863DFEC2DD81A8FDEE98FD2A44432FDAEEF55F3F81
25,239,950 UART: [art] SIG.R = 2E5D3072BBDA63842BCE02297753E7B9269E4CBD86405DB39C4664DDCDE808A458CB0B2687EBA803F228939F0D6F5E1C
25,247,380 UART: [art] SIG.S = 7DAEC35BA349CD813E9D71EC16142CA7FCE25F313A63E8A2719BE3FBAD141A7AB81BD6EEDAD30FF3F93313F4D13C2AEF
26,226,479 UART: Caliptra RT
26,227,191 UART: [state] CFI Enabled
26,359,809 UART: [rt] RT listening for mailbox commands...
26,361,779 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,391,943 UART: [rt]cmd =0x44504543, len=28
26,434,709 >>> mbox cmd response data (2076 bytes)
26,444,830 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,475,020 UART: [rt]cmd =0x44504543, len=28
26,515,626 >>> mbox cmd response data (2076 bytes)
26,861,524 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
26,894,484 UART: [rt]cmd =0x49444550, len=354
26,908,325 >>> mbox cmd response data (8 bytes)
26,908,791 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,938,856 UART: [rt]cmd =0x44504543, len=28
26,981,627 >>> mbox cmd response data (2076 bytes)
26,991,646 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,021,649 UART: [rt]cmd =0x44504543, len=28
27,062,706 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,756,532 ready_for_fw is high
3,757,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,050,224 >>> mbox cmd response: success
19,303,485 UART:
19,303,874 UART: Running Caliptra FMC ...
19,304,988 UART:
19,305,146 UART: [state] CFI Enabled
19,313,570 UART: [fht] FMC Alias Private Key: 7
21,079,549 UART: [art] Extend RT PCRs Done
21,080,780 UART: [art] Lock RT PCRs Done
21,082,482 UART: [art] Populate DV Done
21,087,971 UART: [fht] FMC Alias Private Key: 7
21,089,680 UART: [art] Derive CDI
21,090,503 UART: [art] Store in slot 0x4
21,133,125 UART: [art] Derive Key Pair
21,134,133 UART: [art] Store priv key in slot 0x5
23,561,109 UART: [art] Derive Key Pair - Done
23,574,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,255 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,766 UART: [art] PUB.X = 2A50801A8B58F305AF6342CB1A24672C4CC1FB2F8920D297CF7192ED404D2DB06BE606DEDC72A4A3688F62D4A37C05E4
25,289,038 UART: [art] PUB.Y = 21B1896564DA85AAD03E0FCAC34A6A32409EA1C31569E3DE7C7C2614700F5A09AA6B57A55B49F00462D582613E062198
25,296,302 UART: [art] SIG.R = 85629DEEB1CA9C5B4E62A883C623CE8C8BD94819EEC9EAF51241A06AA3C2B701ABD96AF26435AC3E63D14CB6C72B73EB
25,303,682 UART: [art] SIG.S = C7AB04F5D8AF620D0F9DB8377F1AC6DF2A05C2638E5550A3E68B902D8A8D59BE96106A0BEB245CE6B82F6772DBDD41FC
26,282,477 UART: Caliptra RT
26,283,190 UART: [state] CFI Enabled
26,414,433 UART: [rt] RT listening for mailbox commands...
26,416,379 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,446,416 UART: [rt]cmd =0x44504543, len=28
26,489,282 >>> mbox cmd response data (2076 bytes)
26,499,297 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,529,283 UART: [rt]cmd =0x44504543, len=28
26,570,094 >>> mbox cmd response data (2076 bytes)
26,915,618 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
26,948,761 UART: [rt]cmd =0x49444550, len=352
26,960,236 >>> mbox cmd response data (8 bytes)
26,960,711 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
26,990,507 UART: [rt]cmd =0x44504543, len=28
27,033,443 >>> mbox cmd response data (2076 bytes)
27,043,448 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
27,073,437 UART: [rt]cmd =0x44504543, len=28
27,114,157 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,283 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,813 UART: [kat] SHA2-256
881,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,859 UART: [kat] ++
886,011 UART: [kat] sha1
890,321 UART: [kat] SHA2-256
892,259 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,474 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,271 UART: [cold-reset] ++
1,476,739 UART: [fht] Storing FHT @ 0x50003400
1,479,276 UART: [idev] ++
1,479,444 UART: [idev] CDI.KEYID = 6
1,479,804 UART: [idev] SUBJECT.KEYID = 7
1,480,228 UART: [idev] UDS.KEYID = 0
1,480,573 ready_for_fw is high
1,480,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,398 UART: [idev] Erasing UDS.KEYID = 0
1,504,980 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,832 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,673 UART: [ldev] Erasing FE.KEYID = 1
1,547,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,293 UART: [fwproc] Waiting for Commands...
1,586,924 UART: [fwproc] Received command 0x46574c44
1,587,715 UART: [fwproc] Received Image of size 118548 bytes
2,931,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,593 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,010 >>> mbox cmd response: success
3,132,018 UART: [afmc] ++
3,132,186 UART: [afmc] CDI.KEYID = 6
3,132,548 UART: [afmc] SUBJECT.KEYID = 7
3,132,973 UART: [afmc] AUTHORITY.KEYID = 5
3,168,266 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,305 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,188 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,871 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,635 UART: [afmc] --
3,211,593 UART: [cold-reset] --
3,212,557 UART: [state] Locking Datavault
3,213,676 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,280 UART: [state] Locking ICCM
3,214,844 UART: [exit] Launching FMC @ 0x40000130
3,220,174 UART:
3,220,190 UART: Running Caliptra FMC ...
3,220,598 UART:
3,220,652 UART: [state] CFI Enabled
3,231,080 UART: [fht] FMC Alias Private Key: 7
3,350,372 UART: [art] Extend RT PCRs Done
3,350,800 UART: [art] Lock RT PCRs Done
3,352,208 UART: [art] Populate DV Done
3,360,479 UART: [fht] FMC Alias Private Key: 7
3,361,661 UART: [art] Derive CDI
3,361,941 UART: [art] Store in slot 0x4
3,447,645 UART: [art] Derive Key Pair
3,448,005 UART: [art] Store priv key in slot 0x5
3,460,906 UART: [art] Derive Key Pair - Done
3,475,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,785 UART: [art] PUB.X = 798F660CF38016254EC8D731ED555FF875033A9B61AC844296F5E3F93D23BD53B857663D7766BBC380CCDC0E03334FD0
3,498,545 UART: [art] PUB.Y = FA35B472A84CB05A11A40DA8FE29D837FE9F68CCAA47AA4419D078C5C3C8382642128C114F1442596C1FA1FE32DADD17
3,505,504 UART: [art] SIG.R = A8D48497B151DD701D4E24E3A73357A4108CDED619288BCAE0B138FF7971CCF2186D337CB72F1C4020838430ECEB079D
3,512,277 UART: [art] SIG.S = 65A72934C90BD42DF3EDF31C2AE13316A6D2E7ADF010F03328B3BD4A6FED50271A4423782D8CBE850797D458D08A4F9F
3,536,465 UART: Caliptra RT
3,536,716 UART: [state] CFI Enabled
3,656,252 UART: [rt] RT listening for mailbox commands...
3,656,922 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,812 UART: [rt]cmd =0x44504543, len=28
3,729,939 >>> mbox cmd response data (2076 bytes)
3,729,940 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,295 UART: [rt]cmd =0x44504543, len=28
3,800,491 >>> mbox cmd response data (2076 bytes)
3,800,492 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,831,968 UART: [rt]cmd =0x49444550, len=353
3,845,382 >>> mbox cmd response data (8 bytes)
3,845,383 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,836 UART: [rt]cmd =0x44504543, len=28
3,918,327 >>> mbox cmd response data (2076 bytes)
3,918,328 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,947,567 UART: [rt]cmd =0x44504543, len=28
3,989,392 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,827 ready_for_fw is high
1,362,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,800 >>> mbox cmd response: success
3,042,805 UART:
3,042,821 UART: Running Caliptra FMC ...
3,043,229 UART:
3,043,283 UART: [state] CFI Enabled
3,053,545 UART: [fht] FMC Alias Private Key: 7
3,172,145 UART: [art] Extend RT PCRs Done
3,172,573 UART: [art] Lock RT PCRs Done
3,174,197 UART: [art] Populate DV Done
3,182,492 UART: [fht] FMC Alias Private Key: 7
3,183,498 UART: [art] Derive CDI
3,183,778 UART: [art] Store in slot 0x4
3,269,670 UART: [art] Derive Key Pair
3,270,030 UART: [art] Store priv key in slot 0x5
3,283,091 UART: [art] Derive Key Pair - Done
3,297,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,694 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,459 UART: [art] PUB.X = 5374E21CB1AE1A46DFBD648DC1F2B3263A6EA0A323EAE73636DC500229CD4821AD47A9D806C4B4B5211B4F293DBD813F
3,321,237 UART: [art] PUB.Y = B30497F3B5A6FBFBC1C86BBC2DCB6C707F4FFDF5BE026493AFCD8A450A1E743B837ADFF384A404B9FC92FC77207C912B
3,328,201 UART: [art] SIG.R = FCE48CA16F66D791F23A21D40E1E4C89219030CC0292200ED2E781A439F79A45EB9BE92CB97498CCB4C8CC1C290473EB
3,334,969 UART: [art] SIG.S = A8DCD5472A35418D2C796AAA5CF29677C50D3BB64920AFD7623E5F2557AD19DD542099B8AB4926E1B98A850A8F2CA925
3,358,183 UART: Caliptra RT
3,358,434 UART: [state] CFI Enabled
3,479,441 UART: [rt] RT listening for mailbox commands...
3,480,111 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,069 UART: [rt]cmd =0x44504543, len=28
3,553,664 >>> mbox cmd response data (2076 bytes)
3,553,665 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,334 UART: [rt]cmd =0x44504543, len=28
3,624,639 >>> mbox cmd response data (2076 bytes)
3,624,640 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,327 UART: [rt]cmd =0x49444550, len=354
3,669,456 >>> mbox cmd response data (8 bytes)
3,669,457 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,934 UART: [rt]cmd =0x44504543, len=28
3,742,509 >>> mbox cmd response data (2076 bytes)
3,742,510 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,963 UART: [rt]cmd =0x44504543, len=28
3,813,263 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,441 UART: [state] LifecycleState = Unprovisioned
86,096 UART: [state] DebugLocked = No
86,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,137 UART: [kat] SHA2-512-ACC
897,038 UART: [kat] ECC-384
902,865 UART: [kat] HMAC-384Kdf
907,497 UART: [kat] LMS
1,475,693 UART: [kat] --
1,476,466 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,561 UART: [idev] ++
1,479,729 UART: [idev] CDI.KEYID = 6
1,480,089 UART: [idev] SUBJECT.KEYID = 7
1,480,513 UART: [idev] UDS.KEYID = 0
1,480,858 ready_for_fw is high
1,480,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,937 UART: [idev] Erasing UDS.KEYID = 0
1,505,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,153 UART: [idev] --
1,515,158 UART: [ldev] ++
1,515,326 UART: [ldev] CDI.KEYID = 6
1,515,689 UART: [ldev] SUBJECT.KEYID = 5
1,516,115 UART: [ldev] AUTHORITY.KEYID = 7
1,516,578 UART: [ldev] FE.KEYID = 1
1,522,090 UART: [ldev] Erasing FE.KEYID = 1
1,547,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,741 UART: [ldev] --
1,586,132 UART: [fwproc] Waiting for Commands...
1,586,901 UART: [fwproc] Received command 0x46574c44
1,587,692 UART: [fwproc] Received Image of size 118548 bytes
2,932,118 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,544 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,762 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,081 >>> mbox cmd response: success
3,132,335 UART: [afmc] ++
3,132,503 UART: [afmc] CDI.KEYID = 6
3,132,865 UART: [afmc] SUBJECT.KEYID = 7
3,133,290 UART: [afmc] AUTHORITY.KEYID = 5
3,168,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,227 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,007 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,716 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,599 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,282 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,182 UART: [afmc] --
3,212,304 UART: [cold-reset] --
3,213,160 UART: [state] Locking Datavault
3,214,655 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,259 UART: [state] Locking ICCM
3,215,685 UART: [exit] Launching FMC @ 0x40000130
3,221,015 UART:
3,221,031 UART: Running Caliptra FMC ...
3,221,439 UART:
3,221,582 UART: [state] CFI Enabled
3,232,552 UART: [fht] FMC Alias Private Key: 7
3,351,846 UART: [art] Extend RT PCRs Done
3,352,274 UART: [art] Lock RT PCRs Done
3,353,724 UART: [art] Populate DV Done
3,362,151 UART: [fht] FMC Alias Private Key: 7
3,363,311 UART: [art] Derive CDI
3,363,591 UART: [art] Store in slot 0x4
3,448,693 UART: [art] Derive Key Pair
3,449,053 UART: [art] Store priv key in slot 0x5
3,462,088 UART: [art] Derive Key Pair - Done
3,476,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,203 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,968 UART: [art] PUB.X = 15F3AE2280606472256856D689E6FA3DF4C95AFE4360BD0C0AF7F273690CE07F6383785DE2B3998126A00E4A90394EE9
3,499,724 UART: [art] PUB.Y = 89AF2C2DC169897828081F8502635FAA5757256F543B059B9913291750FBAD7DB6747F7FF266AC10C510613C49358D90
3,506,655 UART: [art] SIG.R = 4FFC683CFE3F5D728E81E61CF465BAEE063B42BA55E25EF29F1022058D03131E7BEF54643B7EF2DAC1680F5E59CFA153
3,513,429 UART: [art] SIG.S = 78D57C33910CB1155B744F5F193A286056D4748BB3A800A56953F30EDB9B4BA6FD999B56342ADBA8EFEC97C01D1EC9AC
3,537,127 UART: Caliptra RT
3,537,470 UART: [state] CFI Enabled
3,658,065 UART: [rt] RT listening for mailbox commands...
3,658,735 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,783 UART: [rt]cmd =0x44504543, len=28
3,732,432 >>> mbox cmd response data (2076 bytes)
3,732,433 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,020 UART: [rt]cmd =0x44504543, len=28
3,803,181 >>> mbox cmd response data (2076 bytes)
3,803,182 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,678 UART: [rt]cmd =0x49444550, len=353
3,847,903 >>> mbox cmd response data (8 bytes)
3,847,904 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,297 UART: [rt]cmd =0x44504543, len=28
3,920,426 >>> mbox cmd response data (2076 bytes)
3,920,427 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,128 UART: [rt]cmd =0x44504543, len=28
3,991,422 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,684 ready_for_fw is high
1,362,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,339 >>> mbox cmd response: success
3,043,972 UART:
3,043,988 UART: Running Caliptra FMC ...
3,044,396 UART:
3,044,539 UART: [state] CFI Enabled
3,054,867 UART: [fht] FMC Alias Private Key: 7
3,174,165 UART: [art] Extend RT PCRs Done
3,174,593 UART: [art] Lock RT PCRs Done
3,176,091 UART: [art] Populate DV Done
3,184,428 UART: [fht] FMC Alias Private Key: 7
3,185,360 UART: [art] Derive CDI
3,185,640 UART: [art] Store in slot 0x4
3,270,924 UART: [art] Derive Key Pair
3,271,284 UART: [art] Store priv key in slot 0x5
3,283,675 UART: [art] Derive Key Pair - Done
3,298,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,483 UART: [art] PUB.X = F2D4707662A90A88824ADA5CB91F7056ECD9ABAF7DAC8945211D36B9BB24C91B73CF4CEB28EDC3016C319C2D22461BC8
3,321,263 UART: [art] PUB.Y = 7D9F5935F23AA31D5C205BE12A9DF3CEE647AA324340F44C81D92EEEC7CDE33FA67A99F4990A4E7B396A20030477DD48
3,328,216 UART: [art] SIG.R = 9455B271C7446F194111820B2EEFB9FBF38AAE2FCA5121961F5E2CF02E55416799C38C693E28AF72B6C5EBDB7872CFB0
3,334,993 UART: [art] SIG.S = F83CE5894728D992F4CB218C7513B4594B5ADD31B2C1EE43570BD1CA3DA70EFB9B0582AF01BA45BFF86AEB47F6E4763E
3,358,681 UART: Caliptra RT
3,359,024 UART: [state] CFI Enabled
3,479,367 UART: [rt] RT listening for mailbox commands...
3,480,037 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,093 UART: [rt]cmd =0x44504543, len=28
3,553,756 >>> mbox cmd response data (2076 bytes)
3,553,757 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,182 UART: [rt]cmd =0x44504543, len=28
3,624,119 >>> mbox cmd response data (2076 bytes)
3,624,120 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,860 UART: [rt]cmd =0x49444550, len=353
3,668,955 >>> mbox cmd response data (8 bytes)
3,668,956 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,457 UART: [rt]cmd =0x44504543, len=28
3,741,880 >>> mbox cmd response data (2076 bytes)
3,741,881 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,250 UART: [rt]cmd =0x44504543, len=28
3,812,922 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
86,049 UART: [state] WD Timer not started. Device not locked for debugging
87,192 UART: [kat] SHA2-256
890,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,846 UART: [kat] ++
894,998 UART: [kat] sha1
899,244 UART: [kat] SHA2-256
901,184 UART: [kat] SHA2-384
903,939 UART: [kat] SHA2-512-ACC
905,840 UART: [kat] ECC-384
915,831 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,710 UART: [cold-reset] ++
1,170,108 UART: [fht] FHT @ 0x50003400
1,172,600 UART: [idev] ++
1,172,768 UART: [idev] CDI.KEYID = 6
1,173,129 UART: [idev] SUBJECT.KEYID = 7
1,173,554 UART: [idev] UDS.KEYID = 0
1,173,900 ready_for_fw is high
1,173,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,399 UART: [idev] Erasing UDS.KEYID = 0
1,198,391 UART: [idev] Sha1 KeyId Algorithm
1,207,123 UART: [idev] --
1,208,172 UART: [ldev] ++
1,208,340 UART: [ldev] CDI.KEYID = 6
1,208,704 UART: [ldev] SUBJECT.KEYID = 5
1,209,131 UART: [ldev] AUTHORITY.KEYID = 7
1,209,594 UART: [ldev] FE.KEYID = 1
1,214,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,035 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,262 UART: [ldev] --
1,280,635 UART: [fwproc] Wait for Commands...
1,281,448 UART: [fwproc] Recv command 0x46574c44
1,282,181 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,098 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,640 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,033 >>> mbox cmd response: success
2,827,151 UART: [afmc] ++
2,827,319 UART: [afmc] CDI.KEYID = 6
2,827,682 UART: [afmc] SUBJECT.KEYID = 7
2,828,108 UART: [afmc] AUTHORITY.KEYID = 5
2,863,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,854 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,250 UART: [afmc] --
2,906,211 UART: [cold-reset] --
2,907,177 UART: [state] Locking Datavault
2,908,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,638 UART: [state] Locking ICCM
2,909,244 UART: [exit] Launching FMC @ 0x40000130
2,914,574 UART:
2,914,590 UART: Running Caliptra FMC ...
2,914,998 UART:
2,915,052 UART: [state] CFI Enabled
2,925,254 UART: [fht] FMC Alias Private Key: 7
3,044,408 UART: [art] Extend RT PCRs Done
3,044,836 UART: [art] Lock RT PCRs Done
3,046,562 UART: [art] Populate DV Done
3,054,597 UART: [fht] FMC Alias Private Key: 7
3,055,661 UART: [art] Derive CDI
3,055,941 UART: [art] Store in slot 0x4
3,141,706 UART: [art] Derive Key Pair
3,142,066 UART: [art] Store priv key in slot 0x5
3,154,822 UART: [art] Derive Key Pair - Done
3,170,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,993 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,758 UART: [art] PUB.X = 94F7282F63862D3D255759CBAB27543B62AB2453A63A2F6660163C35AEB5D6903869C0CF057A9CC31AC15BA623736E82
3,193,523 UART: [art] PUB.Y = 4C109724F5184DFC0929B663319BE06A198A9416D40F81D734B35F0E74193247758991EA09BB79014F17E23525145BC8
3,200,444 UART: [art] SIG.R = 112E41E6EF300E2A0D133C9DCA522ADAB6893B8A12FD99A9E3121CB86C839B828F934B3BA70ED7D27ECE5A8414ABF7F8
3,207,223 UART: [art] SIG.S = E4DF934270C517D979DEAD5763EBDE4A19430E99EAE52FC7376B4B3D223223612D09FC08346A9569DE4C07E69AF2F0D5
3,231,391 UART: Caliptra RT
3,231,642 UART: [state] CFI Enabled
3,350,971 UART: [rt] RT listening for mailbox commands...
3,351,641 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,703 UART: [rt]cmd =0x44504543, len=28
3,424,552 >>> mbox cmd response data (2076 bytes)
3,424,553 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,036 UART: [rt]cmd =0x44504543, len=28
3,495,454 >>> mbox cmd response data (2076 bytes)
3,495,455 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,527,047 UART: [rt]cmd =0x49444550, len=353
3,540,135 >>> mbox cmd response data (8 bytes)
3,540,136 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,735 UART: [rt]cmd =0x44504543, len=28
3,612,842 >>> mbox cmd response data (2076 bytes)
3,612,843 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,502 UART: [rt]cmd =0x44504543, len=28
3,684,139 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,898 ready_for_fw is high
1,059,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,626 >>> mbox cmd response: success
2,739,191 UART:
2,739,207 UART: Running Caliptra FMC ...
2,739,615 UART:
2,739,669 UART: [state] CFI Enabled
2,750,005 UART: [fht] FMC Alias Private Key: 7
2,868,429 UART: [art] Extend RT PCRs Done
2,868,857 UART: [art] Lock RT PCRs Done
2,870,595 UART: [art] Populate DV Done
2,878,830 UART: [fht] FMC Alias Private Key: 7
2,879,886 UART: [art] Derive CDI
2,880,166 UART: [art] Store in slot 0x4
2,966,251 UART: [art] Derive Key Pair
2,966,611 UART: [art] Store priv key in slot 0x5
2,979,331 UART: [art] Derive Key Pair - Done
2,993,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,282 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,047 UART: [art] PUB.X = 22EE822B98DD2A06859183A0B860CFCBA2ABCD1617F6719C6822D31780B46ACC8B45DE5931D08B522DF5BA0F128D99EF
3,016,823 UART: [art] PUB.Y = A019D245CF18CD8B7F596AEE600F6F8796D21A927F1BB1C6CC01747F6CF0A57488C27E3E913B77D96A3B232282A1FD16
3,023,775 UART: [art] SIG.R = DB34F9A1D58999DB03FADC547FF854CEFE523C1E313A2B1AC29F6E22FF8288AB3D8E2A8ED5DD360B61D22C770117F2BA
3,030,558 UART: [art] SIG.S = 9F9E59DB1DAA22F2D0E70FD280E89566D1857BF3070A415C051A789EB8FFC63FF88335475D670651B942138D4BCF7C7D
3,053,985 UART: Caliptra RT
3,054,236 UART: [state] CFI Enabled
3,172,914 UART: [rt] RT listening for mailbox commands...
3,173,584 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,312 UART: [rt]cmd =0x44504543, len=28
3,246,463 >>> mbox cmd response data (2076 bytes)
3,246,464 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,275,891 UART: [rt]cmd =0x44504543, len=28
3,317,072 >>> mbox cmd response data (2076 bytes)
3,317,073 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,348,617 UART: [rt]cmd =0x49444550, len=353
3,361,782 >>> mbox cmd response data (8 bytes)
3,361,783 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,162 UART: [rt]cmd =0x44504543, len=28
3,434,767 >>> mbox cmd response data (2076 bytes)
3,434,768 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,464,173 UART: [rt]cmd =0x44504543, len=28
3,505,495 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,725 UART: [kat] SHA2-256
901,665 UART: [kat] SHA2-384
904,400 UART: [kat] SHA2-512-ACC
906,301 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,912 UART: [kat] LMS
1,169,224 UART: [kat] --
1,170,187 UART: [cold-reset] ++
1,170,633 UART: [fht] FHT @ 0x50003400
1,173,337 UART: [idev] ++
1,173,505 UART: [idev] CDI.KEYID = 6
1,173,866 UART: [idev] SUBJECT.KEYID = 7
1,174,291 UART: [idev] UDS.KEYID = 0
1,174,637 ready_for_fw is high
1,174,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,168 UART: [idev] Erasing UDS.KEYID = 0
1,198,794 UART: [idev] Sha1 KeyId Algorithm
1,207,666 UART: [idev] --
1,208,833 UART: [ldev] ++
1,209,001 UART: [ldev] CDI.KEYID = 6
1,209,365 UART: [ldev] SUBJECT.KEYID = 5
1,209,792 UART: [ldev] AUTHORITY.KEYID = 7
1,210,255 UART: [ldev] FE.KEYID = 1
1,215,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,190 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,557 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,629 UART: [fwproc] Recv command 0x46574c44
1,283,362 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,842 >>> mbox cmd response: success
2,827,022 UART: [afmc] ++
2,827,190 UART: [afmc] CDI.KEYID = 6
2,827,553 UART: [afmc] SUBJECT.KEYID = 7
2,827,979 UART: [afmc] AUTHORITY.KEYID = 5
2,863,346 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,834 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,425 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,126 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,727 UART: [afmc] --
2,906,552 UART: [cold-reset] --
2,907,324 UART: [state] Locking Datavault
2,908,427 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,031 UART: [state] Locking ICCM
2,909,459 UART: [exit] Launching FMC @ 0x40000130
2,914,789 UART:
2,914,805 UART: Running Caliptra FMC ...
2,915,213 UART:
2,915,356 UART: [state] CFI Enabled
2,925,780 UART: [fht] FMC Alias Private Key: 7
3,046,186 UART: [art] Extend RT PCRs Done
3,046,614 UART: [art] Lock RT PCRs Done
3,048,216 UART: [art] Populate DV Done
3,056,367 UART: [fht] FMC Alias Private Key: 7
3,057,347 UART: [art] Derive CDI
3,057,627 UART: [art] Store in slot 0x4
3,143,332 UART: [art] Derive Key Pair
3,143,692 UART: [art] Store priv key in slot 0x5
3,157,316 UART: [art] Derive Key Pair - Done
3,172,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,384 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,149 UART: [art] PUB.X = 549664A189E54A9C99346DBA53567CA472C9CB7485C210254AD0D5B12391046CC28F1A4BA41CDDE625E8B39A7F68F7C9
3,194,920 UART: [art] PUB.Y = 2300F2BC0A7110FEBB73E5E8D4A2D2C93E778C9899BAB8E5E2C3924258C72D46949E6B557D7862B37ECABD5AF7AC4436
3,201,857 UART: [art] SIG.R = 30574A7B4BCF0BC5384AB7610732C6595212E7CC8AB422D31C0284DFF3644D4D20F5A3F2EE503737525555D085B06381
3,208,614 UART: [art] SIG.S = D5A305009CE582CE2752A0701DCB7D3238AD76205FAB641C4B5AE7B6AFFFFC797865C30FB8266366F8988D5445794868
3,232,648 UART: Caliptra RT
3,232,991 UART: [state] CFI Enabled
3,352,764 UART: [rt] RT listening for mailbox commands...
3,353,434 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,312 UART: [rt]cmd =0x44504543, len=28
3,426,341 >>> mbox cmd response data (2076 bytes)
3,426,342 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,455,915 UART: [rt]cmd =0x44504543, len=28
3,497,029 >>> mbox cmd response data (2076 bytes)
3,497,030 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,528,690 UART: [rt]cmd =0x49444550, len=353
3,541,818 >>> mbox cmd response data (8 bytes)
3,541,819 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,322 UART: [rt]cmd =0x44504543, len=28
3,614,287 >>> mbox cmd response data (2076 bytes)
3,614,288 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,643,725 UART: [rt]cmd =0x44504543, len=28
3,685,300 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 ready_for_fw is high
1,060,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,029 >>> mbox cmd response: success
2,740,762 UART:
2,740,778 UART: Running Caliptra FMC ...
2,741,186 UART:
2,741,329 UART: [state] CFI Enabled
2,751,817 UART: [fht] FMC Alias Private Key: 7
2,869,793 UART: [art] Extend RT PCRs Done
2,870,221 UART: [art] Lock RT PCRs Done
2,871,575 UART: [art] Populate DV Done
2,879,784 UART: [fht] FMC Alias Private Key: 7
2,880,840 UART: [art] Derive CDI
2,881,120 UART: [art] Store in slot 0x4
2,966,517 UART: [art] Derive Key Pair
2,966,877 UART: [art] Store priv key in slot 0x5
2,980,345 UART: [art] Derive Key Pair - Done
2,995,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,828 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,593 UART: [art] PUB.X = ED235DFAAFABBE5ACC6105F1840790C76A3BB4E41DA9A1C22BA3F6E7A3E84B531B7341905B6BBE72657C61CE7958F335
3,018,375 UART: [art] PUB.Y = 74F5ED9E92A9D6F72D5504748ECE983716E171C8BF19DDA857057C52D60EE5B3FD9F8BBC58AFED8174AE72394646B186
3,025,326 UART: [art] SIG.R = 4226593327F9D7D8DA771F0823CB05719A4AD9A04F448BCF0E1A325B87A1D803F26E8A69D1DCED8ADC86AF0F873FC930
3,032,093 UART: [art] SIG.S = 6E4723C5F7B6BBFB7ECC817CA57F4679D2CB9AEBEFA7963097A5A14F8DF4C8DAD4C8EF8D59DF909E5FC60122648EF2E8
3,056,168 UART: Caliptra RT
3,056,511 UART: [state] CFI Enabled
3,176,013 UART: [rt] RT listening for mailbox commands...
3,176,683 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,449 UART: [rt]cmd =0x44504543, len=28
3,249,938 >>> mbox cmd response data (2076 bytes)
3,249,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,279,778 UART: [rt]cmd =0x44504543, len=28
3,320,839 >>> mbox cmd response data (2076 bytes)
3,320,840 <<< Executing mbox cmd 0x49444550 (354 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,595 UART: [rt]cmd =0x49444550, len=354
3,365,845 >>> mbox cmd response data (8 bytes)
3,365,846 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,259 UART: [rt]cmd =0x44504543, len=28
3,438,458 >>> mbox cmd response data (2076 bytes)
3,438,459 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,468,074 UART: [rt]cmd =0x44504543, len=28
3,509,321 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,198 UART: [kat] SHA2-256
893,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,973 UART: [kat] ++
898,125 UART: [kat] sha1
902,293 UART: [kat] SHA2-256
904,233 UART: [kat] SHA2-384
907,018 UART: [kat] SHA2-512-ACC
908,919 UART: [kat] ECC-384
918,468 UART: [kat] HMAC-384Kdf
923,218 UART: [kat] LMS
1,171,546 UART: [kat] --
1,172,525 UART: [cold-reset] ++
1,172,875 UART: [fht] FHT @ 0x50003400
1,175,420 UART: [idev] ++
1,175,588 UART: [idev] CDI.KEYID = 6
1,175,948 UART: [idev] SUBJECT.KEYID = 7
1,176,372 UART: [idev] UDS.KEYID = 0
1,176,717 ready_for_fw is high
1,176,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,036 UART: [idev] Erasing UDS.KEYID = 0
1,201,049 UART: [idev] Sha1 KeyId Algorithm
1,209,533 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,216,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,443 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,102 UART: [fwproc] Wait for Commands...
1,282,902 UART: [fwproc] Recv command 0x46574c44
1,283,630 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,123 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,756 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,926 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,105 >>> mbox cmd response: success
2,828,287 UART: [afmc] ++
2,828,455 UART: [afmc] CDI.KEYID = 6
2,828,817 UART: [afmc] SUBJECT.KEYID = 7
2,829,242 UART: [afmc] AUTHORITY.KEYID = 5
2,864,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,109 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,992 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,693 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,445 UART: [afmc] --
2,907,369 UART: [cold-reset] --
2,908,135 UART: [state] Locking Datavault
2,909,534 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,138 UART: [state] Locking ICCM
2,910,764 UART: [exit] Launching FMC @ 0x40000130
2,916,094 UART:
2,916,110 UART: Running Caliptra FMC ...
2,916,518 UART:
2,916,572 UART: [state] CFI Enabled
2,926,890 UART: [fht] FMC Alias Private Key: 7
3,045,736 UART: [art] Extend RT PCRs Done
3,046,164 UART: [art] Lock RT PCRs Done
3,047,234 UART: [art] Populate DV Done
3,055,439 UART: [fht] FMC Alias Private Key: 7
3,056,593 UART: [art] Derive CDI
3,056,873 UART: [art] Store in slot 0x4
3,142,336 UART: [art] Derive Key Pair
3,142,696 UART: [art] Store priv key in slot 0x5
3,155,494 UART: [art] Derive Key Pair - Done
3,170,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,635 UART: [art] PUB.X = 009BD574074DCC03D002699B16496867FF2E06BEB108A104CCB1CDE5C1480EF3920CA556E0880F0070444427AAC94944
3,193,332 UART: [art] PUB.Y = 6A3EFC2DC0D6AE90C14DF73A12F768B15A1EA2C77AF8638BC1E537C3ED4FFF7010DFBC884B45481EED1AFBF61D460FD2
3,200,307 UART: [art] SIG.R = 1D62094CF5AB301346246E6A9D269F289FDE6E4866B18D3A572874B569E826825A2EE808698898B765ED3FD90CBFD17C
3,207,068 UART: [art] SIG.S = 615CC7618F5960EA34EBF47DE551F5BEBE63C17D2D2167217FC915B9391A12B1117838799B6A1D77CBF9413CE80CD990
3,230,929 UART: Caliptra RT
3,231,180 UART: [state] CFI Enabled
3,351,486 UART: [rt] RT listening for mailbox commands...
3,352,156 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,966 UART: [rt]cmd =0x44504543, len=28
3,425,143 >>> mbox cmd response data (2076 bytes)
3,425,144 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,454,523 UART: [rt]cmd =0x44504543, len=28
3,495,154 >>> mbox cmd response data (2076 bytes)
3,495,155 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,629 UART: [rt]cmd =0x49444550, len=353
3,539,798 >>> mbox cmd response data (8 bytes)
3,539,799 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,232 UART: [rt]cmd =0x44504543, len=28
3,612,655 >>> mbox cmd response data (2076 bytes)
3,612,656 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,642,189 UART: [rt]cmd =0x44504543, len=28
3,683,465 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,851 ready_for_fw is high
1,059,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,010 >>> mbox cmd response: success
2,740,741 UART:
2,740,757 UART: Running Caliptra FMC ...
2,741,165 UART:
2,741,219 UART: [state] CFI Enabled
2,751,491 UART: [fht] FMC Alias Private Key: 7
2,871,081 UART: [art] Extend RT PCRs Done
2,871,509 UART: [art] Lock RT PCRs Done
2,873,011 UART: [art] Populate DV Done
2,881,116 UART: [fht] FMC Alias Private Key: 7
2,882,132 UART: [art] Derive CDI
2,882,412 UART: [art] Store in slot 0x4
2,968,341 UART: [art] Derive Key Pair
2,968,701 UART: [art] Store priv key in slot 0x5
2,981,871 UART: [art] Derive Key Pair - Done
2,996,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,988 UART: [art] PUB.X = B59B7142FFCE5EC780BF91838F92573F554AEF869F9BB0D29F7EB84F387C8101E385B2B56EA8022DBA2137F104C81617
3,019,755 UART: [art] PUB.Y = 59E92358535D941C28CE9F9AC351F37509CEDE221DEF3795F3D5A813D7C1B73CF2AF8552BAC7EA78AB7A1A15FFA2DCA2
3,026,722 UART: [art] SIG.R = FF5FB4AFA78AC1768BDA01DC521D79A854FB2AF79D3409B535B2DFE8F8B5627557187CAA94445E8D5BB080231ED9951E
3,033,500 UART: [art] SIG.S = 88ACAE5CAC426F8148A4DD548CFFAC07294F99FC3C9CBD7B5182ED02A25A00CCC52E0B78F53F37DBDEA60B72811DB062
3,057,618 UART: Caliptra RT
3,057,869 UART: [state] CFI Enabled
3,176,269 UART: [rt] RT listening for mailbox commands...
3,176,939 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,871 UART: [rt]cmd =0x44504543, len=28
3,250,212 >>> mbox cmd response data (2076 bytes)
3,250,213 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,279,896 UART: [rt]cmd =0x44504543, len=28
3,321,123 >>> mbox cmd response data (2076 bytes)
3,321,124 <<< Executing mbox cmd 0x49444550 (352 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,923 UART: [rt]cmd =0x49444550, len=352
3,363,680 >>> mbox cmd response data (8 bytes)
3,363,681 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,990 UART: [rt]cmd =0x44504543, len=28
3,436,227 >>> mbox cmd response data (2076 bytes)
3,436,228 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,465,815 UART: [rt]cmd =0x44504543, len=28
3,507,226 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [kat] SHA2-256
893,739 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,864 UART: [kat] ++
898,016 UART: [kat] sha1
902,088 UART: [kat] SHA2-256
904,028 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,285 UART: [kat] HMAC-384Kdf
922,967 UART: [kat] LMS
1,171,295 UART: [kat] --
1,172,388 UART: [cold-reset] ++
1,172,922 UART: [fht] FHT @ 0x50003400
1,175,329 UART: [idev] ++
1,175,497 UART: [idev] CDI.KEYID = 6
1,175,857 UART: [idev] SUBJECT.KEYID = 7
1,176,281 UART: [idev] UDS.KEYID = 0
1,176,626 ready_for_fw is high
1,176,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,393 UART: [idev] Erasing UDS.KEYID = 0
1,201,496 UART: [idev] Sha1 KeyId Algorithm
1,210,122 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,862 UART: [ldev] Erasing FE.KEYID = 1
1,244,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,040 UART: [ldev] --
1,283,537 UART: [fwproc] Wait for Commands...
1,284,223 UART: [fwproc] Recv command 0x46574c44
1,284,951 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,600 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,170 >>> mbox cmd response: success
2,830,306 UART: [afmc] ++
2,830,474 UART: [afmc] CDI.KEYID = 6
2,830,836 UART: [afmc] SUBJECT.KEYID = 7
2,831,261 UART: [afmc] AUTHORITY.KEYID = 5
2,866,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,045 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,502 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,385 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,086 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,736 UART: [afmc] --
2,909,654 UART: [cold-reset] --
2,910,358 UART: [state] Locking Datavault
2,911,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,939 UART: [state] Locking ICCM
2,912,389 UART: [exit] Launching FMC @ 0x40000130
2,917,719 UART:
2,917,735 UART: Running Caliptra FMC ...
2,918,143 UART:
2,918,286 UART: [state] CFI Enabled
2,928,632 UART: [fht] FMC Alias Private Key: 7
3,047,292 UART: [art] Extend RT PCRs Done
3,047,720 UART: [art] Lock RT PCRs Done
3,049,296 UART: [art] Populate DV Done
3,057,377 UART: [fht] FMC Alias Private Key: 7
3,058,323 UART: [art] Derive CDI
3,058,603 UART: [art] Store in slot 0x4
3,144,850 UART: [art] Derive Key Pair
3,145,210 UART: [art] Store priv key in slot 0x5
3,158,546 UART: [art] Derive Key Pair - Done
3,173,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,095 UART: [art] PUB.X = 5DB959000F161B9DA03B6974DBA3674E46B27BFF233C6973BDE444FA417946B2745609A952C3A926DB3F935897399EC8
3,196,835 UART: [art] PUB.Y = 565161519D00B00A4EFB2869C52E8D4243C818752B5EF0F388F6D6349972AEF5322EE57421B5D7377F982C3DA2632BE6
3,203,756 UART: [art] SIG.R = 890B29F8BA771C9870D5A145F8F449335D4C9AFB39F40E53DD3D1DD088955BEAB2F236FAE9867A4869CDF01829F7EADB
3,210,534 UART: [art] SIG.S = 04FDB4B0AB921E6917B38D866CFD34ACD29A8FFB0759C30D90DE4A8F9C396EC4871297F293519F9A93E14A0B42D47045
3,234,352 UART: Caliptra RT
3,234,695 UART: [state] CFI Enabled
3,354,070 UART: [rt] RT listening for mailbox commands...
3,354,740 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,616 UART: [rt]cmd =0x44504543, len=28
3,427,689 >>> mbox cmd response data (2076 bytes)
3,427,690 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,457,319 UART: [rt]cmd =0x44504543, len=28
3,498,929 >>> mbox cmd response data (2076 bytes)
3,498,930 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,530,504 UART: [rt]cmd =0x49444550, len=353
3,543,856 >>> mbox cmd response data (8 bytes)
3,543,857 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,514 UART: [rt]cmd =0x44504543, len=28
3,616,617 >>> mbox cmd response data (2076 bytes)
3,616,618 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,021 UART: [rt]cmd =0x44504543, len=28
3,687,882 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,034 ready_for_fw is high
1,061,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,723 >>> mbox cmd response: success
2,742,666 UART:
2,742,682 UART: Running Caliptra FMC ...
2,743,090 UART:
2,743,233 UART: [state] CFI Enabled
2,753,929 UART: [fht] FMC Alias Private Key: 7
2,872,881 UART: [art] Extend RT PCRs Done
2,873,309 UART: [art] Lock RT PCRs Done
2,874,609 UART: [art] Populate DV Done
2,882,700 UART: [fht] FMC Alias Private Key: 7
2,883,798 UART: [art] Derive CDI
2,884,078 UART: [art] Store in slot 0x4
2,970,103 UART: [art] Derive Key Pair
2,970,463 UART: [art] Store priv key in slot 0x5
2,983,737 UART: [art] Derive Key Pair - Done
2,998,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,774 UART: [art] PUB.X = 9A1F1CAA72523A23EF478FB23AA01B94DE08AC10D642534502B3E1D350998A6A5CDB6010F25D80094E202797B8C318D8
3,021,537 UART: [art] PUB.Y = 26D5B4578533D1238617FEF88F979564346C9B98037D1878D8867BD7412D4459AC9BA6D322F4FC96C83356A4086B40A0
3,028,471 UART: [art] SIG.R = 75245A4E78A8C6F60C99A1F1A19467F57F50374FEB5D48A4D116D75A7729BF4EE2DEE5BEBB7DF3F48A5F6A47901949BD
3,035,252 UART: [art] SIG.S = A52F631F94CAE779813136EA043D30D026A33D949F3B4C9C6575DC5594044FC506675F375952A93140C01860F0D941BB
3,058,923 UART: Caliptra RT
3,059,266 UART: [state] CFI Enabled
3,178,757 UART: [rt] RT listening for mailbox commands...
3,179,427 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,353 UART: [rt]cmd =0x44504543, len=28
3,252,936 >>> mbox cmd response data (2076 bytes)
3,252,937 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,282,298 UART: [rt]cmd =0x44504543, len=28
3,323,326 >>> mbox cmd response data (2076 bytes)
3,323,327 <<< Executing mbox cmd 0x49444550 (353 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,931 UART: [rt]cmd =0x49444550, len=353
3,368,057 >>> mbox cmd response data (8 bytes)
3,368,058 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,675 UART: [rt]cmd =0x44504543, len=28
3,440,962 >>> mbox cmd response data (2076 bytes)
3,440,963 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,470,430 UART: [rt]cmd =0x44504543, len=28
3,511,951 >>> mbox cmd response data (2076 bytes)
test test_populate_idev::test_populate_idev_cert_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
test test_populate_idev::test_populate_idev_cert_size_too_big ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 0.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
192,190 UART:
192,555 UART: Running Caliptra ROM ...
193,738 UART:
193,896 UART: [state] CFI Enabled
264,578 UART: [state] LifecycleState = Unprovisioned
266,568 UART: [state] DebugLocked = No
268,979 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,636 UART: [kat] SHA2-256
444,395 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,850 UART: [kat] ++
455,343 UART: [kat] sha1
465,650 UART: [kat] SHA2-256
468,309 UART: [kat] SHA2-384
472,593 UART: [kat] SHA2-512-ACC
475,018 UART: [kat] ECC-384
2,768,639 UART: [kat] HMAC-384Kdf
2,800,607 UART: [kat] LMS
3,990,989 UART: [kat] --
3,996,159 UART: [cold-reset] ++
3,998,262 UART: [fht] Storing FHT @ 0x50003400
4,008,820 UART: [idev] ++
4,009,395 UART: [idev] CDI.KEYID = 6
4,010,311 UART: [idev] SUBJECT.KEYID = 7
4,011,559 UART: [idev] UDS.KEYID = 0
4,012,591 ready_for_fw is high
4,012,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,932 UART: [idev] Erasing UDS.KEYID = 0
7,342,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,488 UART: [idev] --
7,369,298 UART: [ldev] ++
7,369,877 UART: [ldev] CDI.KEYID = 6
7,370,848 UART: [ldev] SUBJECT.KEYID = 5
7,372,064 UART: [ldev] AUTHORITY.KEYID = 7
7,373,298 UART: [ldev] FE.KEYID = 1
7,422,190 UART: [ldev] Erasing FE.KEYID = 1
10,755,092 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,118 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,663 UART: [ldev] --
13,135,129 UART: [fwproc] Waiting for Commands...
13,137,597 UART: [fwproc] Received command 0x46574c44
13,139,780 UART: [fwproc] Received Image of size 118548 bytes
17,250,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,325,786 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,727,337 >>> mbox cmd response: success
17,728,439 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,730,960 UART: [afmc] ++
17,731,552 UART: [afmc] CDI.KEYID = 6
17,732,464 UART: [afmc] SUBJECT.KEYID = 7
17,733,739 UART: [afmc] AUTHORITY.KEYID = 5
21,095,229 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,776 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,186 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,613 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,780 UART: [afmc] --
23,465,455 UART: [cold-reset] --
23,467,593 UART: [state] Locking Datavault
23,472,406 UART: [state] Locking PCR0, PCR1 and PCR31
23,474,155 UART: [state] Locking ICCM
23,476,518 UART: [exit] Launching FMC @ 0x40000130
23,484,912 UART:
23,485,147 UART: Running Caliptra FMC ...
23,486,246 UART:
23,486,403 UART: [state] CFI Enabled
23,552,455 UART: [fht] FMC Alias Private Key: 7
25,893,272 UART: [art] Extend RT PCRs Done
25,894,495 UART: [art] Lock RT PCRs Done
25,896,420 UART: [art] Populate DV Done
25,901,997 UART: [fht] FMC Alias Private Key: 7
25,903,587 UART: [art] Derive CDI
25,904,399 UART: [art] Store in slot 0x4
25,961,420 UART: [art] Derive Key Pair
25,962,464 UART: [art] Store priv key in slot 0x5
29,255,051 UART: [art] Derive Key Pair - Done
29,267,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,283 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,800 UART: [art] PUB.X = 525A950056AB5F06074D9B265A7086EFE39F162DFA793BB3F9CE65BEF8C2581DE23D878D1465D3AA97A0568DF5D0240F
31,566,040 UART: [art] PUB.Y = 01A624B59A41A5FFABBCA3F10E73BDD74CA85D193F595A4CF4DC3DE88F0F010B369730CAA2E9BEA8707523A1C89EA345
31,573,322 UART: [art] SIG.R = 81F151AE52F12FC97098688C7D9F9803BF53819F10243F3412180341F7DAB3E7A0438D5B615877C501E8C71642D82A09
31,580,700 UART: [art] SIG.S = C56D3651A6E1042D118F894011FE3ABB0C83DA0D1BF3595C861FF76EECAB3E475C6FA25DCB3C0FBE82C794E12886586B
32,886,377 UART: Caliptra RT
32,887,101 UART: [state] CFI Enabled
33,064,877 UART: [rt] RT listening for mailbox commands...
33,096,241 UART: [rt]cmd =0x52435458, len=8
33,097,539 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,880 writing to cptra_bootfsm_go
3,808,134 ready_for_fw is high
3,808,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,480 >>> mbox cmd response: success
17,966,892 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,676,146 UART:
23,676,538 UART: Running Caliptra FMC ...
23,677,742 UART:
23,677,907 UART: [state] CFI Enabled
23,743,596 UART: [fht] FMC Alias Private Key: 7
26,083,881 UART: [art] Extend RT PCRs Done
26,085,234 UART: [art] Lock RT PCRs Done
26,086,981 UART: [art] Populate DV Done
26,092,239 UART: [fht] FMC Alias Private Key: 7
26,093,848 UART: [art] Derive CDI
26,094,672 UART: [art] Store in slot 0x4
26,151,795 UART: [art] Derive Key Pair
26,152,787 UART: [art] Store priv key in slot 0x5
29,445,138 UART: [art] Derive Key Pair - Done
29,458,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,455 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,983 UART: [art] PUB.X = 87E7A9A0FFF0C5BEE4947B840BE7DB3942B9DE40F7C5AAE31BCBA95CFD0DDFA556AB88A92ECB520BFCED2A2C8A984DC4
31,755,290 UART: [art] PUB.Y = EA0374ED98F4D41253F7F6504740EBF1292784086579BF5EC9E4411D68BD266EBA3BA60B305EA0EA86864E2AD26B0564
31,762,537 UART: [art] SIG.R = 86ED64115BFA9C5CFE582EDD6936E7DCF2E61F0E393356F2DD7242BCBF4A6D357FED459E39D99446757F555670C351EF
31,769,963 UART: [art] SIG.S = 22EE4CD9C886FF9A446BEF34065511EF10A28F7484275CBF988FF8EC7CE9977900450B008FBD081788501DAE37BCC0CD
33,074,814 UART: Caliptra RT
33,075,536 UART: [state] CFI Enabled
33,252,350 UART: [rt] RT listening for mailbox commands...
33,283,658 UART: [rt]cmd =0x52435458, len=8
33,285,187 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,341 UART:
192,703 UART: Running Caliptra ROM ...
193,891 UART:
603,433 UART: [state] CFI Enabled
621,032 UART: [state] LifecycleState = Unprovisioned
623,006 UART: [state] DebugLocked = No
624,817 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,247 UART: [kat] SHA2-256
798,968 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,552 UART: [kat] ++
809,999 UART: [kat] sha1
821,877 UART: [kat] SHA2-256
824,597 UART: [kat] SHA2-384
829,019 UART: [kat] SHA2-512-ACC
831,382 UART: [kat] ECC-384
3,117,258 UART: [kat] HMAC-384Kdf
3,128,563 UART: [kat] LMS
4,318,665 UART: [kat] --
4,322,467 UART: [cold-reset] ++
4,325,106 UART: [fht] Storing FHT @ 0x50003400
4,336,650 UART: [idev] ++
4,337,217 UART: [idev] CDI.KEYID = 6
4,338,195 UART: [idev] SUBJECT.KEYID = 7
4,339,433 UART: [idev] UDS.KEYID = 0
4,340,415 ready_for_fw is high
4,340,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,640 UART: [idev] Erasing UDS.KEYID = 0
7,628,336 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,753 UART: [idev] --
7,653,825 UART: [ldev] ++
7,654,387 UART: [ldev] CDI.KEYID = 6
7,655,346 UART: [ldev] SUBJECT.KEYID = 5
7,656,552 UART: [ldev] AUTHORITY.KEYID = 7
7,657,886 UART: [ldev] FE.KEYID = 1
7,667,877 UART: [ldev] Erasing FE.KEYID = 1
10,957,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,677 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,281,106 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,629 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,938 UART: [ldev] --
13,320,247 UART: [fwproc] Waiting for Commands...
13,323,359 UART: [fwproc] Received command 0x46574c44
13,325,610 UART: [fwproc] Received Image of size 118548 bytes
17,428,371 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,955 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,143 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,795 >>> mbox cmd response: success
17,905,212 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,907,366 UART: [afmc] ++
17,908,002 UART: [afmc] CDI.KEYID = 6
17,908,909 UART: [afmc] SUBJECT.KEYID = 7
17,910,107 UART: [afmc] AUTHORITY.KEYID = 5
21,226,211 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,134 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,858 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,575 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,961 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,971 UART: [afmc] --
23,588,624 UART: [cold-reset] --
23,591,837 UART: [state] Locking Datavault
23,598,967 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,713 UART: [state] Locking ICCM
23,602,045 UART: [exit] Launching FMC @ 0x40000130
23,610,434 UART:
23,610,670 UART: Running Caliptra FMC ...
23,611,766 UART:
23,611,921 UART: [state] CFI Enabled
23,619,796 UART: [fht] FMC Alias Private Key: 7
25,960,197 UART: [art] Extend RT PCRs Done
25,961,416 UART: [art] Lock RT PCRs Done
25,963,013 UART: [art] Populate DV Done
25,968,580 UART: [fht] FMC Alias Private Key: 7
25,970,111 UART: [art] Derive CDI
25,970,858 UART: [art] Store in slot 0x4
26,013,662 UART: [art] Derive Key Pair
26,014,702 UART: [art] Store priv key in slot 0x5
29,256,381 UART: [art] Derive Key Pair - Done
29,269,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,518 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,027 UART: [art] PUB.X = 90020E23DAE59C5F6041AED2C16593D99B5AD0B7A3F8057E1140343247C2131E644D8521556346D348A479441E44FCB6
31,558,281 UART: [art] PUB.Y = 4C6DCA0909B3E5B0EE68EC9293C9B3F772D575937F32176CF51C06C954A5FF67597B1CC94DE96844F4A9727599DB2870
31,565,502 UART: [art] SIG.R = DF4B32567C8F23D22319E96B7BE0B60ACB66D090E9D335B62136B30C742D9DD8EB4C670EDD6D4CB22E1B74C05443F914
31,572,877 UART: [art] SIG.S = E1B8F56AD88614DB0601FFF4FCFB993B555A7ED1FC5B946A878E9F2180837D612861D9FDBAC7304B97E02BC1C87F60A6
32,878,021 UART: Caliptra RT
32,878,722 UART: [state] CFI Enabled
33,011,309 UART: [rt] RT listening for mailbox commands...
33,042,585 UART: [rt]cmd =0x52435458, len=8
33,043,958 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
4,128,921 ready_for_fw is high
4,129,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,338 >>> mbox cmd response: success
18,163,078 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,803,306 UART:
23,803,698 UART: Running Caliptra FMC ...
23,804,843 UART:
23,804,997 UART: [state] CFI Enabled
23,812,618 UART: [fht] FMC Alias Private Key: 7
26,152,771 UART: [art] Extend RT PCRs Done
26,153,999 UART: [art] Lock RT PCRs Done
26,155,789 UART: [art] Populate DV Done
26,161,112 UART: [fht] FMC Alias Private Key: 7
26,162,759 UART: [art] Derive CDI
26,163,570 UART: [art] Store in slot 0x4
26,205,896 UART: [art] Derive Key Pair
26,206,929 UART: [art] Store priv key in slot 0x5
29,449,117 UART: [art] Derive Key Pair - Done
29,462,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,289 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,796 UART: [art] PUB.X = 3E6AC874ACD4CBDEFF87C981C89005490184AC23120709930648A62E8AD119853165768749E95A0A53077163F184E157
31,751,051 UART: [art] PUB.Y = BA441B70C77D3FF51850D356DDF99734C0A83125652F1907B7A8F548A6A018926EFAF2D55B954BC4F249B7CA46BD1545
31,758,294 UART: [art] SIG.R = AA421C44703411510BCC4DED1BC6001855063A06EEC6B730E282D85AF947C406C2D51C8D1754A3F1FD7D6F93C342447C
31,765,627 UART: [art] SIG.S = 02E852B8609F5748C613240FBF51763D0CEF8344BDE0BCA9526F37DBF6BC047F1B9EA9E654FD6F01B37190069FEE450E
33,071,132 UART: Caliptra RT
33,071,853 UART: [state] CFI Enabled
33,206,389 UART: [rt] RT listening for mailbox commands...
33,237,872 UART: [rt]cmd =0x52435458, len=8
33,239,315 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,993 UART:
192,376 UART: Running Caliptra ROM ...
193,561 UART:
193,713 UART: [state] CFI Enabled
262,761 UART: [state] LifecycleState = Unprovisioned
264,734 UART: [state] DebugLocked = No
267,257 UART: [state] WD Timer not started. Device not locked for debugging
271,008 UART: [kat] SHA2-256
450,704 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,471 UART: [kat] ++
461,952 UART: [kat] sha1
472,324 UART: [kat] SHA2-256
475,039 UART: [kat] SHA2-384
479,679 UART: [kat] SHA2-512-ACC
482,038 UART: [kat] ECC-384
2,928,928 UART: [kat] HMAC-384Kdf
2,949,772 UART: [kat] LMS
3,426,292 UART: [kat] --
3,429,451 UART: [cold-reset] ++
3,431,752 UART: [fht] FHT @ 0x50003400
3,442,730 UART: [idev] ++
3,443,291 UART: [idev] CDI.KEYID = 6
3,444,402 UART: [idev] SUBJECT.KEYID = 7
3,445,523 UART: [idev] UDS.KEYID = 0
3,446,448 ready_for_fw is high
3,446,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,596 UART: [idev] Erasing UDS.KEYID = 0
5,964,624 UART: [idev] Sha1 KeyId Algorithm
5,987,692 UART: [idev] --
5,992,442 UART: [ldev] ++
5,993,009 UART: [ldev] CDI.KEYID = 6
5,993,925 UART: [ldev] SUBJECT.KEYID = 5
5,995,135 UART: [ldev] AUTHORITY.KEYID = 7
5,996,416 UART: [ldev] FE.KEYID = 1
6,036,874 UART: [ldev] Erasing FE.KEYID = 1
8,542,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,773 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,383 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,459 UART: [ldev] --
10,355,665 UART: [fwproc] Wait for Commands...
10,357,427 UART: [fwproc] Recv command 0x46574c44
10,359,412 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,262 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,281 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,329,066 >>> mbox cmd response: success
14,330,262 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,332,310 UART: [afmc] ++
14,332,897 UART: [afmc] CDI.KEYID = 6
14,333,831 UART: [afmc] SUBJECT.KEYID = 7
14,335,041 UART: [afmc] AUTHORITY.KEYID = 5
16,877,375 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,894 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,669 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,761 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,818 UART: [afmc] --
18,693,758 UART: [cold-reset] --
18,698,909 UART: [state] Locking Datavault
18,704,313 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,057 UART: [state] Locking ICCM
18,708,341 UART: [exit] Launching FMC @ 0x40000130
18,716,781 UART:
18,717,006 UART: Running Caliptra FMC ...
18,718,046 UART:
18,718,194 UART: [state] CFI Enabled
18,774,175 UART: [fht] FMC Alias Private Key: 7
20,540,514 UART: [art] Extend RT PCRs Done
20,541,733 UART: [art] Lock RT PCRs Done
20,543,325 UART: [art] Populate DV Done
20,548,751 UART: [fht] FMC Alias Private Key: 7
20,550,445 UART: [art] Derive CDI
20,551,178 UART: [art] Store in slot 0x4
20,607,153 UART: [art] Derive Key Pair
20,608,186 UART: [art] Store priv key in slot 0x5
23,070,576 UART: [art] Derive Key Pair - Done
23,083,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,485 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,143 UART: [art] PUB.X = 2170833FFC2474C92A06373EBBE06BDCB865B154CD4E905E24FAF3C64D178C585DFCDE10B0B3C0C1F5D6A2301589CF89
24,806,275 UART: [art] PUB.Y = 1D3E3247A2F7D12077609F7C32CCB9BCD2D37063184FD489515059D4B87C9B9CF1D546F286A18E9FCA67D635B29D3806
24,813,520 UART: [art] SIG.R = 2AAD15BBC0D3CA4A9DABA5F7854F67B908503449054D55F106A975B1C14859DE5E9D316B47F451A9414DB25CCDDF649F
24,820,917 UART: [art] SIG.S = 1DB26AA5609607F023191E186BC8E3F72A014AC30C840F96339E5BA4161FB1B3EA00B2CB1B0692D703F9B6D8B64F01D3
25,799,649 UART: Caliptra RT
25,800,349 UART: [state] CFI Enabled
25,981,869 UART: [rt] RT listening for mailbox commands...
26,013,430 UART: [rt]cmd =0x52435458, len=8
26,014,819 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,460,189 ready_for_fw is high
3,460,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,354 >>> mbox cmd response: success
14,240,884 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,530,283 UART:
18,530,670 UART: Running Caliptra FMC ...
18,531,861 UART:
18,532,026 UART: [state] CFI Enabled
18,583,001 UART: [fht] FMC Alias Private Key: 7
20,348,819 UART: [art] Extend RT PCRs Done
20,350,044 UART: [art] Lock RT PCRs Done
20,351,539 UART: [art] Populate DV Done
20,357,113 UART: [fht] FMC Alias Private Key: 7
20,358,811 UART: [art] Derive CDI
20,359,545 UART: [art] Store in slot 0x4
20,415,218 UART: [art] Derive Key Pair
20,416,219 UART: [art] Store priv key in slot 0x5
22,879,051 UART: [art] Derive Key Pair - Done
22,892,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,214 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,724 UART: [art] PUB.X = A7E0896FAD86C27E9A384E0CD27DFFE04245C21C38959E5516D3783EB5F7EDDF33DD58887AACE5763A3FD382041EDDE7
24,614,041 UART: [art] PUB.Y = 7F0B9A5465ED97E71F8DE9F6B18FAED1757FA4C0826FFBB4C85EC85D66755C82E85F1AC638B9E8E14541693901B8C478
24,621,301 UART: [art] SIG.R = 01518DC623D14FFE7458CEA0E20497A780D848379A03C35CD58AA8FFEEFF80A953DAF45C288CE58A668AF70837591A95
24,628,643 UART: [art] SIG.S = EE493BCFFE32B472C36363557C071EA8FE4EE0C8350DC704F1B2C758164366F661BEF72C2AAD1ACBC4CA2E725B167C5A
25,607,397 UART: Caliptra RT
25,608,111 UART: [state] CFI Enabled
25,789,662 UART: [rt] RT listening for mailbox commands...
25,821,183 UART: [rt]cmd =0x52435458, len=8
25,822,573 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,471 UART:
192,843 UART: Running Caliptra ROM ...
194,042 UART:
603,602 UART: [state] CFI Enabled
620,683 UART: [state] LifecycleState = Unprovisioned
622,628 UART: [state] DebugLocked = No
624,230 UART: [state] WD Timer not started. Device not locked for debugging
628,625 UART: [kat] SHA2-256
808,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,032 UART: [kat] ++
819,484 UART: [kat] sha1
831,353 UART: [kat] SHA2-256
834,077 UART: [kat] SHA2-384
840,804 UART: [kat] SHA2-512-ACC
843,164 UART: [kat] ECC-384
3,285,755 UART: [kat] HMAC-384Kdf
3,299,053 UART: [kat] LMS
3,775,574 UART: [kat] --
3,779,354 UART: [cold-reset] ++
3,781,991 UART: [fht] FHT @ 0x50003400
3,793,249 UART: [idev] ++
3,793,810 UART: [idev] CDI.KEYID = 6
3,794,841 UART: [idev] SUBJECT.KEYID = 7
3,796,015 UART: [idev] UDS.KEYID = 0
3,797,167 ready_for_fw is high
3,797,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,108 UART: [idev] Erasing UDS.KEYID = 0
6,274,779 UART: [idev] Sha1 KeyId Algorithm
6,298,805 UART: [idev] --
6,303,429 UART: [ldev] ++
6,304,028 UART: [ldev] CDI.KEYID = 6
6,304,920 UART: [ldev] SUBJECT.KEYID = 5
6,306,132 UART: [ldev] AUTHORITY.KEYID = 7
6,307,423 UART: [ldev] FE.KEYID = 1
6,319,263 UART: [ldev] Erasing FE.KEYID = 1
8,794,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,146 UART: [ldev] --
10,590,276 UART: [fwproc] Wait for Commands...
10,592,101 UART: [fwproc] Recv command 0x46574c44
10,594,092 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,153,694 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,226,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,395 >>> mbox cmd response: success
14,555,740 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,559,243 UART: [afmc] ++
14,559,830 UART: [afmc] CDI.KEYID = 6
14,560,772 UART: [afmc] SUBJECT.KEYID = 7
14,561,990 UART: [afmc] AUTHORITY.KEYID = 5
17,070,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,318 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,443 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,028 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,057 UART: [afmc] --
18,870,011 UART: [cold-reset] --
18,873,983 UART: [state] Locking Datavault
18,877,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,283 UART: [state] Locking ICCM
18,880,649 UART: [exit] Launching FMC @ 0x40000130
18,889,043 UART:
18,889,281 UART: Running Caliptra FMC ...
18,890,309 UART:
18,890,462 UART: [state] CFI Enabled
18,898,840 UART: [fht] FMC Alias Private Key: 7
20,664,794 UART: [art] Extend RT PCRs Done
20,666,009 UART: [art] Lock RT PCRs Done
20,668,044 UART: [art] Populate DV Done
20,673,837 UART: [fht] FMC Alias Private Key: 7
20,675,378 UART: [art] Derive CDI
20,676,194 UART: [art] Store in slot 0x4
20,719,185 UART: [art] Derive Key Pair
20,720,200 UART: [art] Store priv key in slot 0x5
23,146,588 UART: [art] Derive Key Pair - Done
23,159,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,815 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,292 UART: [art] PUB.X = B23F6F390EFF867C37171C051247ABE6C7331B20017DB534AC5894E62E4762CEBE84FC9577EF1409B768E84D426BDFB6
24,874,597 UART: [art] PUB.Y = 495B0563C96CFEC9A12E26DDE039C600B14D3D1AB31682016B1DBF82DDC7EBFA596A2363B49946BFCD51EDE8BD1F933B
24,881,828 UART: [art] SIG.R = 5DD3D286C0CC13C61E66F92C8A619FDE6CBA9495848A01EEE9433D1FE080D0EEBFD9FB394B7FCF9DC9E28C45AC95926F
24,889,273 UART: [art] SIG.S = 4A4569F4F608F6FBFA1A14F604569F1128D5AFF1DF261FFF98E0D9FD69C2720239B75F94C7A9FB500D0946AC0D7C0205
25,868,211 UART: Caliptra RT
25,868,927 UART: [state] CFI Enabled
26,001,506 UART: [rt] RT listening for mailbox commands...
26,032,554 UART: [rt]cmd =0x52435458, len=8
26,033,899 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
3,782,354 ready_for_fw is high
3,782,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,697 >>> mbox cmd response: success
14,449,414 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,704,197 UART:
18,704,573 UART: Running Caliptra FMC ...
18,705,723 UART:
18,705,889 UART: [state] CFI Enabled
18,713,843 UART: [fht] FMC Alias Private Key: 7
20,480,009 UART: [art] Extend RT PCRs Done
20,481,254 UART: [art] Lock RT PCRs Done
20,482,888 UART: [art] Populate DV Done
20,488,578 UART: [fht] FMC Alias Private Key: 7
20,490,170 UART: [art] Derive CDI
20,491,052 UART: [art] Store in slot 0x4
20,533,823 UART: [art] Derive Key Pair
20,534,832 UART: [art] Store priv key in slot 0x5
22,961,306 UART: [art] Derive Key Pair - Done
22,974,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,817 UART: [art] PUB.X = B863313260DF05DB40D7F8C184396AC151F2FE8EF4C9C3534FCEF92A19A2967CA7ABAD5CE40F7FFA5747F80ECAF58261
24,690,129 UART: [art] PUB.Y = AE8D2BE17541687538FCB23291C5F4F49125E1F24FB8ED18CA0DE49E72920B9C6397A68BCD5AB35E02487D59E4EA0D4F
24,697,397 UART: [art] SIG.R = AF6AAE2821644B45235CD8A15F719919BF542DD39DCFB81EF3D829B27F535048AE17AD5965BBC488A9DCF395E5A451CC
24,704,787 UART: [art] SIG.S = 7AF3AF3A52060539A3A4C83B5C0AF12C2ABD775359784EDDD74AA3D9DA9397D29E8AA4EED2774780A7405C293CA90C0C
25,683,835 UART: Caliptra RT
25,684,538 UART: [state] CFI Enabled
25,818,179 UART: [rt] RT listening for mailbox commands...
25,849,667 UART: [rt]cmd =0x52435458, len=8
25,850,985 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,161 UART:
192,534 UART: Running Caliptra ROM ...
193,727 UART:
193,881 UART: [state] CFI Enabled
263,213 UART: [state] LifecycleState = Unprovisioned
265,638 UART: [state] DebugLocked = No
267,600 UART: [state] WD Timer not started. Device not locked for debugging
272,556 UART: [kat] SHA2-256
462,462 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,204 UART: [kat] ++
473,652 UART: [kat] sha1
484,098 UART: [kat] SHA2-256
487,117 UART: [kat] SHA2-384
493,247 UART: [kat] SHA2-512-ACC
495,821 UART: [kat] ECC-384
2,960,931 UART: [kat] HMAC-384Kdf
2,985,878 UART: [kat] LMS
3,517,621 UART: [kat] --
3,523,389 UART: [cold-reset] ++
3,525,457 UART: [fht] FHT @ 0x50003400
3,536,781 UART: [idev] ++
3,537,433 UART: [idev] CDI.KEYID = 6
3,538,460 UART: [idev] SUBJECT.KEYID = 7
3,539,553 UART: [idev] UDS.KEYID = 0
3,540,595 ready_for_fw is high
3,540,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,690,229 UART: [idev] Erasing UDS.KEYID = 0
6,043,190 UART: [idev] Sha1 KeyId Algorithm
6,065,224 UART: [idev] --
6,070,060 UART: [ldev] ++
6,070,749 UART: [ldev] CDI.KEYID = 6
6,071,664 UART: [ldev] SUBJECT.KEYID = 5
6,072,822 UART: [ldev] AUTHORITY.KEYID = 7
6,074,049 UART: [ldev] FE.KEYID = 1
6,113,435 UART: [ldev] Erasing FE.KEYID = 1
8,622,903 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,354,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,420,616 UART: [ldev] --
10,426,141 UART: [fwproc] Wait for Commands...
10,429,361 UART: [fwproc] Recv command 0x46574c44
10,431,612 UART: [fwproc] Recv'd Img size: 118548 bytes
13,929,059 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,703 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,858 >>> mbox cmd response: success
14,687,277 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,689,042 UART: [afmc] ++
14,689,741 UART: [afmc] CDI.KEYID = 6
14,690,931 UART: [afmc] SUBJECT.KEYID = 7
14,692,419 UART: [afmc] AUTHORITY.KEYID = 5
17,250,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,277 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,984,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,999,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,014,478 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,029,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,053,541 UART: [afmc] --
19,057,956 UART: [cold-reset] --
19,062,857 UART: [state] Locking Datavault
19,067,841 UART: [state] Locking PCR0, PCR1 and PCR31
19,070,025 UART: [state] Locking ICCM
19,072,447 UART: [exit] Launching FMC @ 0x40000130
19,081,112 UART:
19,081,360 UART: Running Caliptra FMC ...
19,082,467 UART:
19,082,632 UART: [state] CFI Enabled
19,145,747 UART: [fht] FMC Alias Private Key: 7
20,912,890 UART: [art] Extend RT PCRs Done
20,914,597 UART: [art] Lock RT PCRs Done
20,915,875 UART: [art] Populate DV Done
20,921,091 UART: [fht] FMC Alias Private Key: 7
20,922,575 UART: [art] Derive CDI
20,923,351 UART: [art] Store in slot 0x4
20,979,782 UART: [art] Derive Key Pair
20,980,833 UART: [art] Store priv key in slot 0x5
23,444,177 UART: [art] Derive Key Pair - Done
23,457,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,168,962 UART: [art] Erasing AUTHORITY.KEYID = 7
25,170,474 UART: [art] PUB.X = 227BCEF2B859AE3C336F05E20044ECFCB4F89F8418EC8CBA6A7AC7D41CE0965DC294C75F4AA45F6A5CFB18860F815B1E
25,177,786 UART: [art] PUB.Y = 4B3681ACA9B087F363F1E307546687839EB359D160354E9EA3864415F78F00DB9BE726074E5BA845DD976E3ECF25DFCB
25,185,012 UART: [art] SIG.R = 9149B170C5E5F62EAB23BA4EE99421FB456346C56CB72FC07D7877470A3CE60FE8D3DF6C3B41F008E69C76CFACE1BCCD
25,192,415 UART: [art] SIG.S = C3DCB9002BD25589CB287F67D1C943F4F6C94564CFC4ACFC91D34E4A54EE83A6B2FAD6C3205F37B30330D05B744394F9
26,171,395 UART: Caliptra RT
26,172,084 UART: [state] CFI Enabled
26,352,641 UART: [rt] RT listening for mailbox commands...
26,383,657 UART: [rt]cmd =0x52435458, len=8
26,385,029 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,441,728 ready_for_fw is high
3,442,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,753 >>> mbox cmd response: success
14,803,256 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,079,654 UART:
19,080,536 UART: Running Caliptra FMC ...
19,081,675 UART:
19,081,830 UART: [state] CFI Enabled
19,149,756 UART: [fht] FMC Alias Private Key: 7
20,916,205 UART: [art] Extend RT PCRs Done
20,917,426 UART: [art] Lock RT PCRs Done
20,919,022 UART: [art] Populate DV Done
20,924,391 UART: [fht] FMC Alias Private Key: 7
20,925,986 UART: [art] Derive CDI
20,926,801 UART: [art] Store in slot 0x4
20,982,365 UART: [art] Derive Key Pair
20,983,406 UART: [art] Store priv key in slot 0x5
23,446,036 UART: [art] Derive Key Pair - Done
23,459,089 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,165,583 UART: [art] Erasing AUTHORITY.KEYID = 7
25,167,085 UART: [art] PUB.X = 9740815E77ADADE98ECF89E973DC5C6D720B3D3283DC0B5180319C01443AF9C9C04555001D15D2D1C8EB12E5916DD077
25,174,408 UART: [art] PUB.Y = 1C031D26CFC4F4BBEA2E0E5907C536896D7B27AAAF3767D2DBCD3B73AF5AB63894ABF91683BDE11D2E95E6F0F4B0945A
25,181,645 UART: [art] SIG.R = 523E0FF8E1E09CF0ACC198CCF11354374D26154F284494B72737A6F18426E3142A1BC9E415A4BD1B7ADD43B6F4938350
25,189,037 UART: [art] SIG.S = E2400CDE1538CCEF867779E62E263D59B95D2645E0AD5D2983C23A43BDF88047D6D29E27C52864BEAB521A3B629508B6
26,167,915 UART: Caliptra RT
26,168,606 UART: [state] CFI Enabled
26,349,685 UART: [rt] RT listening for mailbox commands...
26,381,170 UART: [rt]cmd =0x52435458, len=8
26,382,470 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,512 UART:
192,878 UART: Running Caliptra ROM ...
194,082 UART:
603,746 UART: [state] CFI Enabled
618,491 UART: [state] LifecycleState = Unprovisioned
620,866 UART: [state] DebugLocked = No
623,176 UART: [state] WD Timer not started. Device not locked for debugging
628,445 UART: [kat] SHA2-256
818,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,151 UART: [kat] ++
829,757 UART: [kat] sha1
840,781 UART: [kat] SHA2-256
843,796 UART: [kat] SHA2-384
849,653 UART: [kat] SHA2-512-ACC
852,240 UART: [kat] ECC-384
3,293,784 UART: [kat] HMAC-384Kdf
3,305,240 UART: [kat] LMS
3,837,084 UART: [kat] --
3,840,328 UART: [cold-reset] ++
3,842,479 UART: [fht] FHT @ 0x50003400
3,852,927 UART: [idev] ++
3,853,679 UART: [idev] CDI.KEYID = 6
3,854,605 UART: [idev] SUBJECT.KEYID = 7
3,855,788 UART: [idev] UDS.KEYID = 0
3,856,737 ready_for_fw is high
3,856,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,631 UART: [idev] Erasing UDS.KEYID = 0
6,331,024 UART: [idev] Sha1 KeyId Algorithm
6,352,811 UART: [idev] --
6,356,216 UART: [ldev] ++
6,356,932 UART: [ldev] CDI.KEYID = 6
6,357,819 UART: [ldev] SUBJECT.KEYID = 5
6,358,923 UART: [ldev] AUTHORITY.KEYID = 7
6,360,220 UART: [ldev] FE.KEYID = 1
6,370,520 UART: [ldev] Erasing FE.KEYID = 1
8,850,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,682 UART: [ldev] --
10,641,439 UART: [fwproc] Wait for Commands...
10,643,210 UART: [fwproc] Recv command 0x46574c44
10,645,524 UART: [fwproc] Recv'd Img size: 118548 bytes
14,134,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,211,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,334,873 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,894,320 >>> mbox cmd response: success
14,895,737 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,898,423 UART: [afmc] ++
14,899,124 UART: [afmc] CDI.KEYID = 6
14,900,368 UART: [afmc] SUBJECT.KEYID = 7
14,901,811 UART: [afmc] AUTHORITY.KEYID = 5
17,406,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,130,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,147,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,162,342 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,177,196 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,329 UART: [afmc] --
19,204,281 UART: [cold-reset] --
19,208,964 UART: [state] Locking Datavault
19,215,182 UART: [state] Locking PCR0, PCR1 and PCR31
19,217,339 UART: [state] Locking ICCM
19,219,875 UART: [exit] Launching FMC @ 0x40000130
19,228,560 UART:
19,228,795 UART: Running Caliptra FMC ...
19,229,900 UART:
19,230,062 UART: [state] CFI Enabled
19,238,061 UART: [fht] FMC Alias Private Key: 7
21,003,911 UART: [art] Extend RT PCRs Done
21,005,136 UART: [art] Lock RT PCRs Done
21,006,762 UART: [art] Populate DV Done
21,012,183 UART: [fht] FMC Alias Private Key: 7
21,013,671 UART: [art] Derive CDI
21,014,411 UART: [art] Store in slot 0x4
21,057,386 UART: [art] Derive Key Pair
21,058,432 UART: [art] Store priv key in slot 0x5
23,485,722 UART: [art] Derive Key Pair - Done
23,498,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,037 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,650 UART: [art] PUB.X = 187BEC1BDB6B550B781A30B0FF0190C85D872447603C81C081AAF7427AE90227AB778201D6E882810F94EBD24437AB21
25,213,843 UART: [art] PUB.Y = A47122666116A3A1E2399552B5BC7A015F03B3EDCC3389782F506C1389A96A13C3DC28AC82E038A4D4D58406A2B763F6
25,221,007 UART: [art] SIG.R = 3592747D08FC6AAA03194D4243068FAF8B88D7D5E0066CCB570076FE113E696D159A24DBA104A509F7E09ADFBFD89935
25,228,432 UART: [art] SIG.S = D3595036950961FE2A28ACCF1D6AA1D00B98DC36F37751248B48111EF91ECEDF5B5330B935FF22F52CB2A5743BBC2266
26,207,374 UART: Caliptra RT
26,208,066 UART: [state] CFI Enabled
26,341,081 UART: [rt] RT listening for mailbox commands...
26,372,734 UART: [rt]cmd =0x52435458, len=8
26,374,140 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,754,888 ready_for_fw is high
3,755,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,196 >>> mbox cmd response: success
15,047,702 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,299,355 UART:
19,299,747 UART: Running Caliptra FMC ...
19,300,949 UART:
19,301,119 UART: [state] CFI Enabled
19,308,855 UART: [fht] FMC Alias Private Key: 7
21,075,301 UART: [art] Extend RT PCRs Done
21,076,533 UART: [art] Lock RT PCRs Done
21,078,340 UART: [art] Populate DV Done
21,083,614 UART: [fht] FMC Alias Private Key: 7
21,085,107 UART: [art] Derive CDI
21,085,885 UART: [art] Store in slot 0x4
21,128,701 UART: [art] Derive Key Pair
21,129,748 UART: [art] Store priv key in slot 0x5
23,556,523 UART: [art] Derive Key Pair - Done
23,569,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,750 UART: [art] PUB.X = 7703A9EFD3059481FF6CD41494CD808D0273815AA6E8D880DA6A38E76AAE7B74FE13C9346853F27100963CE98D559C47
25,285,050 UART: [art] PUB.Y = B8CEBC54E92EC2BEF850F4736BBBFE156E892B28EE427CEAD35D12357BF87B416418D7720EE4CCFD6B372B9DA90F1FEE
25,292,273 UART: [art] SIG.R = 2AB3C381D33E9259D60208A64ECEB84A816483DD25C0284981E79467859EA3FE0E6A10BFC3CBC51DD438219260DCE095
25,299,696 UART: [art] SIG.S = 0CDC24772180EE055F1E58F900ADE87CBDC4FDD9077CB97E48A5BC4FA2028CE3C1C35323DE0DF1DA4CD7A9F34A70E3B4
26,278,306 UART: Caliptra RT
26,279,019 UART: [state] CFI Enabled
26,411,681 UART: [rt] RT listening for mailbox commands...
26,443,097 UART: [rt]cmd =0x52435458, len=8
26,444,400 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,797 UART: [kat] SHA2-256
881,728 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,843 UART: [kat] ++
885,995 UART: [kat] sha1
890,173 UART: [kat] SHA2-256
892,111 UART: [kat] SHA2-384
894,904 UART: [kat] SHA2-512-ACC
896,805 UART: [kat] ECC-384
902,258 UART: [kat] HMAC-384Kdf
906,826 UART: [kat] LMS
1,475,022 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,601 UART: [fht] Storing FHT @ 0x50003400
1,479,390 UART: [idev] ++
1,479,558 UART: [idev] CDI.KEYID = 6
1,479,918 UART: [idev] SUBJECT.KEYID = 7
1,480,342 UART: [idev] UDS.KEYID = 0
1,480,687 ready_for_fw is high
1,480,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,274 UART: [idev] Erasing UDS.KEYID = 0
1,504,642 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,340 UART: [idev] --
1,514,481 UART: [ldev] ++
1,514,649 UART: [ldev] CDI.KEYID = 6
1,515,012 UART: [ldev] SUBJECT.KEYID = 5
1,515,438 UART: [ldev] AUTHORITY.KEYID = 7
1,515,901 UART: [ldev] FE.KEYID = 1
1,521,037 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,250 UART: [ldev] --
1,585,571 UART: [fwproc] Waiting for Commands...
1,586,274 UART: [fwproc] Received command 0x46574c44
1,587,065 UART: [fwproc] Received Image of size 118548 bytes
2,933,171 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,853 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,448 >>> mbox cmd response: success
3,131,448 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,460 UART: [afmc] ++
3,132,628 UART: [afmc] CDI.KEYID = 6
3,132,990 UART: [afmc] SUBJECT.KEYID = 7
3,133,415 UART: [afmc] AUTHORITY.KEYID = 5
3,167,924 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,264 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,044 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,636 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,319 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,005 UART: [afmc] --
3,210,973 UART: [cold-reset] --
3,211,857 UART: [state] Locking Datavault
3,212,912 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,516 UART: [state] Locking ICCM
3,214,108 UART: [exit] Launching FMC @ 0x40000130
3,219,438 UART:
3,219,454 UART: Running Caliptra FMC ...
3,219,862 UART:
3,219,916 UART: [state] CFI Enabled
3,230,064 UART: [fht] FMC Alias Private Key: 7
3,349,216 UART: [art] Extend RT PCRs Done
3,349,644 UART: [art] Lock RT PCRs Done
3,351,492 UART: [art] Populate DV Done
3,359,665 UART: [fht] FMC Alias Private Key: 7
3,360,733 UART: [art] Derive CDI
3,361,013 UART: [art] Store in slot 0x4
3,446,259 UART: [art] Derive Key Pair
3,446,619 UART: [art] Store priv key in slot 0x5
3,459,628 UART: [art] Derive Key Pair - Done
3,474,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,515 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,280 UART: [art] PUB.X = 7F154365391A00B3326EFBF2FCFC98B82488E0F1DFD8609FF43A1E4F1D1AE08E907238630F3940253B30BA445D7C7A76
3,497,029 UART: [art] PUB.Y = FD1BDA975B78B091A7CFE85958F724157F8DA8C761EABB8BE3EF48D6761D4F8BC96BFC31DAAD1F53672A488C015F6794
3,503,994 UART: [art] SIG.R = 6B566B086ED4639B4BB422CE11DC76690408BA5F1D450AA6A36EE6FD39ED0DC44B8F28025E45F277B0DCA18D5819F028
3,510,756 UART: [art] SIG.S = 4ACF17EAB4A10C36D8DC97092737AEC5604238FA40FFA5BD761763E31354C706421CBD3E16228B64176E8CBFD77ED2B1
3,534,403 UART: Caliptra RT
3,534,654 UART: [state] CFI Enabled
3,654,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,263 UART: [rt]cmd =0x52435458, len=8
3,686,290 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,553 ready_for_fw is high
1,362,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,678 >>> mbox cmd response: success
2,980,678 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,303 UART:
3,042,319 UART: Running Caliptra FMC ...
3,042,727 UART:
3,042,781 UART: [state] CFI Enabled
3,053,279 UART: [fht] FMC Alias Private Key: 7
3,171,565 UART: [art] Extend RT PCRs Done
3,171,993 UART: [art] Lock RT PCRs Done
3,173,489 UART: [art] Populate DV Done
3,181,870 UART: [fht] FMC Alias Private Key: 7
3,182,998 UART: [art] Derive CDI
3,183,278 UART: [art] Store in slot 0x4
3,269,108 UART: [art] Derive Key Pair
3,269,468 UART: [art] Store priv key in slot 0x5
3,282,577 UART: [art] Derive Key Pair - Done
3,297,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,958 UART: [art] PUB.X = 2F8E212D7FC3166D0D6D3210D0DD2D05135A8A0F2BED9F3A9FE74BC78B6075B55C3A29E124CE9EB92C310EE9BCADF9A5
3,320,738 UART: [art] PUB.Y = 10E023338AB2616CAC85A855BB8AE767F0905B6668F3632EA911FEC81ADFE0CF6A40662760BD851CDC5987C6FEA3571A
3,327,698 UART: [art] SIG.R = 39689CFC1628738662D53660C824DDB042109405BED22359BD991CAB9B3073371928E08EF7B9CCBC175BD764E8C9F465
3,334,463 UART: [art] SIG.S = 93A8C6B3C9E228A697B9F390AF16A4EBE33CC974D179F8CB2BC025A36A629294550AF7B6F7DC6A24AC88E35C2F511566
3,358,722 UART: Caliptra RT
3,358,973 UART: [state] CFI Enabled
3,478,857 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,559 UART: [rt]cmd =0x52435458, len=8
3,510,706 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,687 UART: [state] LifecycleState = Unprovisioned
86,342 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,468 UART: [kat] SHA2-256
882,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,514 UART: [kat] ++
886,666 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,389 UART: [kat] SHA2-512-ACC
897,290 UART: [kat] ECC-384
902,743 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,477,084 UART: [fht] Storing FHT @ 0x50003400
1,479,821 UART: [idev] ++
1,479,989 UART: [idev] CDI.KEYID = 6
1,480,349 UART: [idev] SUBJECT.KEYID = 7
1,480,773 UART: [idev] UDS.KEYID = 0
1,481,118 ready_for_fw is high
1,481,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,033 UART: [idev] Erasing UDS.KEYID = 0
1,505,391 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,961 UART: [idev] --
1,514,962 UART: [ldev] ++
1,515,130 UART: [ldev] CDI.KEYID = 6
1,515,493 UART: [ldev] SUBJECT.KEYID = 5
1,515,919 UART: [ldev] AUTHORITY.KEYID = 7
1,516,382 UART: [ldev] FE.KEYID = 1
1,521,512 UART: [ldev] Erasing FE.KEYID = 1
1,546,419 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,589 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,279 UART: [ldev] --
1,585,676 UART: [fwproc] Waiting for Commands...
1,586,451 UART: [fwproc] Received command 0x46574c44
1,587,242 UART: [fwproc] Received Image of size 118548 bytes
2,931,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,179 >>> mbox cmd response: success
3,129,179 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,130,289 UART: [afmc] ++
3,130,457 UART: [afmc] CDI.KEYID = 6
3,130,819 UART: [afmc] SUBJECT.KEYID = 7
3,131,244 UART: [afmc] AUTHORITY.KEYID = 5
3,166,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,914 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,797 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,480 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,166 UART: [afmc] --
3,209,142 UART: [cold-reset] --
3,210,114 UART: [state] Locking Datavault
3,211,077 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,681 UART: [state] Locking ICCM
3,212,229 UART: [exit] Launching FMC @ 0x40000130
3,217,559 UART:
3,217,575 UART: Running Caliptra FMC ...
3,217,983 UART:
3,218,126 UART: [state] CFI Enabled
3,228,866 UART: [fht] FMC Alias Private Key: 7
3,348,478 UART: [art] Extend RT PCRs Done
3,348,906 UART: [art] Lock RT PCRs Done
3,350,556 UART: [art] Populate DV Done
3,358,877 UART: [fht] FMC Alias Private Key: 7
3,359,921 UART: [art] Derive CDI
3,360,201 UART: [art] Store in slot 0x4
3,446,459 UART: [art] Derive Key Pair
3,446,819 UART: [art] Store priv key in slot 0x5
3,459,568 UART: [art] Derive Key Pair - Done
3,474,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,350 UART: [art] PUB.X = DF31F9A0F59A3D21C4FEE1B49D7D0C11B848FACE493CCF27E8EE5F02140415515684851EC12CD4363AB87C69DCF5B3BE
3,497,129 UART: [art] PUB.Y = BAEDDAB973609513EEC79419F2964F9BFBCB580AABD17FE052694718AAF0FCF7F8048B2F232D780CC010D994F0ABA9E2
3,504,090 UART: [art] SIG.R = BE1DA80ED3578D0D7F3E30DDDDD75CD90D34A8C28AABC5EC92A3BF5A663772977FAD81F8441B0B9333CAF5603CA7215B
3,510,870 UART: [art] SIG.S = 263987F9F986B7087C89FCDD51F59E71FB849AABE70B43AACF24635BF8FB7E093B8E756EB01D94C19AADFB8358F2F7DE
3,535,141 UART: Caliptra RT
3,535,484 UART: [state] CFI Enabled
3,655,142 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,834 UART: [rt]cmd =0x52435458, len=8
3,686,895 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,150 ready_for_fw is high
1,363,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,905 >>> mbox cmd response: success
2,982,905 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,044,674 UART:
3,044,690 UART: Running Caliptra FMC ...
3,045,098 UART:
3,045,241 UART: [state] CFI Enabled
3,055,851 UART: [fht] FMC Alias Private Key: 7
3,175,619 UART: [art] Extend RT PCRs Done
3,176,047 UART: [art] Lock RT PCRs Done
3,177,419 UART: [art] Populate DV Done
3,185,498 UART: [fht] FMC Alias Private Key: 7
3,186,620 UART: [art] Derive CDI
3,186,900 UART: [art] Store in slot 0x4
3,272,192 UART: [art] Derive Key Pair
3,272,552 UART: [art] Store priv key in slot 0x5
3,286,241 UART: [art] Derive Key Pair - Done
3,300,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,729 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,494 UART: [art] PUB.X = 4ACDF208E4D76B8E165E353D38575C309370D6242702D108F977FC208A7916D7BA73AA730A75ABD98E411718B06C8594
3,324,248 UART: [art] PUB.Y = 353412E40FF2AFBD6791BDB9A806A8B68BA224E328978216320EAE48A87F57F7F9A6D196EEA5F50523CBF496E017DCBE
3,331,198 UART: [art] SIG.R = BE664CD972EF42277FCF3D5B3A6053B417D9A5AFFCB6C4D33A3721DD660E38045851AF59D237B922AF16D4DB82238D5C
3,337,974 UART: [art] SIG.S = CE6A6119FE92115E0DA4A81F2908608A921CDCF7426AEAA76A0AF798BAFA78198E0D7D80F71A6E0EC8091FBFEF72B472
3,361,848 UART: Caliptra RT
3,362,191 UART: [state] CFI Enabled
3,483,848 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,406 UART: [rt]cmd =0x52435458, len=8
3,515,275 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,906 UART: [state] LifecycleState = Unprovisioned
85,561 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,426 UART: [kat] SHA2-256
890,976 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,080 UART: [kat] ++
895,232 UART: [kat] sha1
899,504 UART: [kat] SHA2-256
901,444 UART: [kat] SHA2-384
904,291 UART: [kat] SHA2-512-ACC
906,192 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,269 UART: [kat] LMS
1,168,581 UART: [kat] --
1,169,276 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,532 UART: [idev] ++
1,172,700 UART: [idev] CDI.KEYID = 6
1,173,061 UART: [idev] SUBJECT.KEYID = 7
1,173,486 UART: [idev] UDS.KEYID = 0
1,173,832 ready_for_fw is high
1,173,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,198,307 UART: [idev] Sha1 KeyId Algorithm
1,207,301 UART: [idev] --
1,208,508 UART: [ldev] ++
1,208,676 UART: [ldev] CDI.KEYID = 6
1,209,040 UART: [ldev] SUBJECT.KEYID = 5
1,209,467 UART: [ldev] AUTHORITY.KEYID = 7
1,209,930 UART: [ldev] FE.KEYID = 1
1,215,172 UART: [ldev] Erasing FE.KEYID = 1
1,241,513 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,990 UART: [ldev] --
1,280,201 UART: [fwproc] Wait for Commands...
1,280,984 UART: [fwproc] Recv command 0x46574c44
1,281,717 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,685 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,860 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,029 >>> mbox cmd response: success
2,825,029 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,273 UART: [afmc] ++
2,826,441 UART: [afmc] CDI.KEYID = 6
2,826,804 UART: [afmc] SUBJECT.KEYID = 7
2,827,230 UART: [afmc] AUTHORITY.KEYID = 5
2,862,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,526 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,985 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,866 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,567 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,302 UART: [afmc] --
2,906,235 UART: [cold-reset] --
2,907,189 UART: [state] Locking Datavault
2,908,414 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,018 UART: [state] Locking ICCM
2,909,600 UART: [exit] Launching FMC @ 0x40000130
2,914,930 UART:
2,914,946 UART: Running Caliptra FMC ...
2,915,354 UART:
2,915,408 UART: [state] CFI Enabled
2,925,960 UART: [fht] FMC Alias Private Key: 7
3,044,992 UART: [art] Extend RT PCRs Done
3,045,420 UART: [art] Lock RT PCRs Done
3,046,992 UART: [art] Populate DV Done
3,055,185 UART: [fht] FMC Alias Private Key: 7
3,056,161 UART: [art] Derive CDI
3,056,441 UART: [art] Store in slot 0x4
3,141,802 UART: [art] Derive Key Pair
3,142,162 UART: [art] Store priv key in slot 0x5
3,155,622 UART: [art] Derive Key Pair - Done
3,170,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,301 UART: [art] PUB.X = 678B97E07EF730F1622FD2B6AB3327A3B54457212AADE56278B5AA46E80FD0C9BFA3F7A90DCDC23C8AF271D16417344A
3,193,077 UART: [art] PUB.Y = 8BF3E50AF7EFB2BA08DB368699FA95337CFA15B866E42AC1725D8758FB5DE86E890E0AA84B5EE662981EA822980088E9
3,200,003 UART: [art] SIG.R = C3FC40A625AE4A812AA99098514A5D7D0034CCF5D90CB831DFF285C8B5C7A4F3B4912740072FB9D4D0945CA3BD02CFF5
3,206,756 UART: [art] SIG.S = C21E0FAADF761DE27EEDA9E70BB9EE7333DFBE384D33FEED7281665A306F7C126E064A1D909E7E8B57DC65578D540EA8
3,230,670 UART: Caliptra RT
3,230,921 UART: [state] CFI Enabled
3,350,613 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,081 UART: [rt]cmd =0x52435458, len=8
3,382,074 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,584 ready_for_fw is high
1,058,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,186 >>> mbox cmd response: success
2,676,186 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,737,803 UART:
2,737,819 UART: Running Caliptra FMC ...
2,738,227 UART:
2,738,281 UART: [state] CFI Enabled
2,748,615 UART: [fht] FMC Alias Private Key: 7
2,867,127 UART: [art] Extend RT PCRs Done
2,867,555 UART: [art] Lock RT PCRs Done
2,869,347 UART: [art] Populate DV Done
2,877,586 UART: [fht] FMC Alias Private Key: 7
2,878,534 UART: [art] Derive CDI
2,878,814 UART: [art] Store in slot 0x4
2,965,021 UART: [art] Derive Key Pair
2,965,381 UART: [art] Store priv key in slot 0x5
2,978,237 UART: [art] Derive Key Pair - Done
2,992,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,007,986 UART: [art] Erasing AUTHORITY.KEYID = 7
3,008,751 UART: [art] PUB.X = 6FB831750479B4BD3765C853ECACA23EDE4B2937464EE52221D3CED1EE15C7E7A64224884A56AABCA56EFF1DCBABD138
3,015,538 UART: [art] PUB.Y = 22833A4C8FCC24681D5457E2B03259CFF51413D7300D7DFECFEAF5FD6E596B440729A02C8BE41B011A92BB7AF8F5CEDF
3,022,497 UART: [art] SIG.R = B8BB22716FEA6AA789AAA94B44DCB6C8CF976CC49759D397D653F389039EC174BD58DF11B29DD748BF03361991153C56
3,029,269 UART: [art] SIG.S = FB53162EA7754FDAE627AE18420F1FFD43B7A4317F7F612E7EC4D0B7F34B5EDD7500AF2288D4DC922522286A66AAC55D
3,052,790 UART: Caliptra RT
3,053,041 UART: [state] CFI Enabled
3,172,795 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,285 UART: [rt]cmd =0x52435458, len=8
3,204,396 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,985 UART: [kat] SHA2-256
891,535 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,639 UART: [kat] ++
895,791 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,608 UART: [kat] HMAC-384Kdf
921,334 UART: [kat] LMS
1,169,646 UART: [kat] --
1,170,425 UART: [cold-reset] ++
1,170,797 UART: [fht] FHT @ 0x50003400
1,173,593 UART: [idev] ++
1,173,761 UART: [idev] CDI.KEYID = 6
1,174,122 UART: [idev] SUBJECT.KEYID = 7
1,174,547 UART: [idev] UDS.KEYID = 0
1,174,893 ready_for_fw is high
1,174,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,114 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,714 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,311 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,921 UART: [ldev] --
1,282,346 UART: [fwproc] Wait for Commands...
1,282,985 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,569 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,902 >>> mbox cmd response: success
2,826,902 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,944 UART: [afmc] ++
2,828,112 UART: [afmc] CDI.KEYID = 6
2,828,475 UART: [afmc] SUBJECT.KEYID = 7
2,828,901 UART: [afmc] AUTHORITY.KEYID = 5
2,865,018 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,829 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,288 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,169 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,870 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,421 UART: [afmc] --
2,908,236 UART: [cold-reset] --
2,909,198 UART: [state] Locking Datavault
2,910,297 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,901 UART: [state] Locking ICCM
2,911,333 UART: [exit] Launching FMC @ 0x40000130
2,916,663 UART:
2,916,679 UART: Running Caliptra FMC ...
2,917,087 UART:
2,917,230 UART: [state] CFI Enabled
2,927,964 UART: [fht] FMC Alias Private Key: 7
3,046,322 UART: [art] Extend RT PCRs Done
3,046,750 UART: [art] Lock RT PCRs Done
3,048,192 UART: [art] Populate DV Done
3,056,345 UART: [fht] FMC Alias Private Key: 7
3,057,339 UART: [art] Derive CDI
3,057,619 UART: [art] Store in slot 0x4
3,142,940 UART: [art] Derive Key Pair
3,143,300 UART: [art] Store priv key in slot 0x5
3,156,442 UART: [art] Derive Key Pair - Done
3,171,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,020 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,785 UART: [art] PUB.X = 04C1078865246350CCC0E41DA80DB344A6F93AAC5572FB08AD713A9B26647CC388D37DE0E6DB709D6A077637291EEA9E
3,194,546 UART: [art] PUB.Y = 5D0FEF8B7BE5219639D94484D9D692D15FB3EB4C7E612AA20373A1A9B38A355BAC7E004AD48A52AA2CAB4A132716935D
3,201,480 UART: [art] SIG.R = B0CEA06754F61515D5ED1DE38E4D22D672D7FD6910FA07ACFF10DF940FAFB8F97ADB3945454AE7DC00B9EA86812CA9EE
3,208,246 UART: [art] SIG.S = B7CBD73F96B6DED2F7017EF4FAA3F885A1F9D7DBCC109123CD630B86CBBB131B8900AABBD66F1010A96DE60D9B7777B3
3,232,269 UART: Caliptra RT
3,232,612 UART: [state] CFI Enabled
3,352,038 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,346 UART: [rt]cmd =0x52435458, len=8
3,383,555 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,933 ready_for_fw is high
1,059,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,445 >>> mbox cmd response: success
2,680,445 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,743,016 UART:
2,743,032 UART: Running Caliptra FMC ...
2,743,440 UART:
2,743,583 UART: [state] CFI Enabled
2,753,955 UART: [fht] FMC Alias Private Key: 7
2,872,343 UART: [art] Extend RT PCRs Done
2,872,771 UART: [art] Lock RT PCRs Done
2,874,173 UART: [art] Populate DV Done
2,882,398 UART: [fht] FMC Alias Private Key: 7
2,883,376 UART: [art] Derive CDI
2,883,656 UART: [art] Store in slot 0x4
2,969,219 UART: [art] Derive Key Pair
2,969,579 UART: [art] Store priv key in slot 0x5
2,983,023 UART: [art] Derive Key Pair - Done
2,997,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,127 UART: [art] PUB.X = D1E4CBB00B3A10B40FDBAE1F8E0B0B672984135B043F6FE04F08C35031FD3E48035DFC40A019166697C2541F536E4155
3,020,880 UART: [art] PUB.Y = B9C7A77C8DF1DA7D9B6E71C6295D42A768839C203148B662F27317D18ECA577074D7F78B636C5736D0A40D4DBB9A6068
3,027,829 UART: [art] SIG.R = 0D9D88733FE994AAB0D48C2EB908A7A843EC09A8F6743AA1D1A6AD0CBF9EA2772F4A391477F1249E3E9B7DD6B2012369
3,034,596 UART: [art] SIG.S = F68F45EFF39EF81817163FD531F0DC7AE9B6C57D415DC1C7D10BFAF115861129C4854FA64BA7C00EEBB9727B79144ACC
3,058,626 UART: Caliptra RT
3,058,969 UART: [state] CFI Enabled
3,179,424 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,828 UART: [rt]cmd =0x52435458, len=8
3,210,767 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,724 UART: [state] LifecycleState = Unprovisioned
85,379 UART: [state] DebugLocked = No
85,953 UART: [state] WD Timer not started. Device not locked for debugging
87,140 UART: [kat] SHA2-256
892,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,915 UART: [kat] ++
897,067 UART: [kat] sha1
901,323 UART: [kat] SHA2-256
903,263 UART: [kat] SHA2-384
905,866 UART: [kat] SHA2-512-ACC
907,767 UART: [kat] ECC-384
917,176 UART: [kat] HMAC-384Kdf
921,706 UART: [kat] LMS
1,170,034 UART: [kat] --
1,171,117 UART: [cold-reset] ++
1,171,607 UART: [fht] FHT @ 0x50003400
1,174,068 UART: [idev] ++
1,174,236 UART: [idev] CDI.KEYID = 6
1,174,596 UART: [idev] SUBJECT.KEYID = 7
1,175,020 UART: [idev] UDS.KEYID = 0
1,175,365 ready_for_fw is high
1,175,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,022 UART: [idev] Erasing UDS.KEYID = 0
1,199,747 UART: [idev] Sha1 KeyId Algorithm
1,208,059 UART: [idev] --
1,208,909 UART: [ldev] ++
1,209,077 UART: [ldev] CDI.KEYID = 6
1,209,440 UART: [ldev] SUBJECT.KEYID = 5
1,209,866 UART: [ldev] AUTHORITY.KEYID = 7
1,210,329 UART: [ldev] FE.KEYID = 1
1,215,455 UART: [ldev] Erasing FE.KEYID = 1
1,242,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,777 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,295 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,500 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,843 >>> mbox cmd response: success
2,825,843 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,073 UART: [afmc] ++
2,827,241 UART: [afmc] CDI.KEYID = 6
2,827,603 UART: [afmc] SUBJECT.KEYID = 7
2,828,028 UART: [afmc] AUTHORITY.KEYID = 5
2,863,567 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,768 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,477 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,360 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,061 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,997 UART: [afmc] --
2,906,911 UART: [cold-reset] --
2,907,747 UART: [state] Locking Datavault
2,908,852 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,456 UART: [state] Locking ICCM
2,909,996 UART: [exit] Launching FMC @ 0x40000130
2,915,326 UART:
2,915,342 UART: Running Caliptra FMC ...
2,915,750 UART:
2,915,804 UART: [state] CFI Enabled
2,926,174 UART: [fht] FMC Alias Private Key: 7
3,045,574 UART: [art] Extend RT PCRs Done
3,046,002 UART: [art] Lock RT PCRs Done
3,047,592 UART: [art] Populate DV Done
3,055,987 UART: [fht] FMC Alias Private Key: 7
3,057,135 UART: [art] Derive CDI
3,057,415 UART: [art] Store in slot 0x4
3,143,404 UART: [art] Derive Key Pair
3,143,764 UART: [art] Store priv key in slot 0x5
3,157,648 UART: [art] Derive Key Pair - Done
3,172,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,781 UART: [art] PUB.X = D54989B5907538C665012D6897928CE67C016B45169895EE5D1CDCAC9C4CB68B704ACE5E43FA24DFD7D75B64AC7612E9
3,195,551 UART: [art] PUB.Y = 9E03316C410D226A88B1E6BEB8468780BF58AF55AC57D20CAF42E2241380F843E302AF50986BB1348FBF61DB387D53F2
3,202,493 UART: [art] SIG.R = 98425F6DD2E55E94E2E59A6715F9AF05BC941668149E5E8624242C12BA267266BCF627A0853B534F27DCFA7217F3064D
3,209,255 UART: [art] SIG.S = 1334055C8288FCFC43190F5207D776A92122F900A93E98D0F8517D3A3C0D0D63E172769FB78B800E0B67AB44D4C14BC3
3,232,948 UART: Caliptra RT
3,233,199 UART: [state] CFI Enabled
3,352,948 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,328 UART: [rt]cmd =0x52435458, len=8
3,384,387 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,595 ready_for_fw is high
1,060,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,144 >>> mbox cmd response: success
2,681,144 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,743,533 UART:
2,743,549 UART: Running Caliptra FMC ...
2,743,957 UART:
2,744,011 UART: [state] CFI Enabled
2,754,497 UART: [fht] FMC Alias Private Key: 7
2,873,221 UART: [art] Extend RT PCRs Done
2,873,649 UART: [art] Lock RT PCRs Done
2,875,387 UART: [art] Populate DV Done
2,883,468 UART: [fht] FMC Alias Private Key: 7
2,884,586 UART: [art] Derive CDI
2,884,866 UART: [art] Store in slot 0x4
2,971,019 UART: [art] Derive Key Pair
2,971,379 UART: [art] Store priv key in slot 0x5
2,984,633 UART: [art] Derive Key Pair - Done
2,999,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,574 UART: [art] PUB.X = B16DFFB0362E58E199ABF41AF03421E8FD5B25B100726151ED2C75F75BFAF203D71BE1F9932E9409678DBC1E91A0A85F
3,022,328 UART: [art] PUB.Y = 65FE6552746BEAA574CADA3FDBCAAEA7953E558C67490B2DAC1DB8E2961E6D23AAFF230EC52B119A0B993094EDF8F484
3,029,291 UART: [art] SIG.R = DB309F4A5B5C4EB23E53929D86A26C7CB27DC94586933C799AB2E1B519C635D8C2543B5BFBB4FB44B6DA96BF0C5801E4
3,036,069 UART: [art] SIG.S = 63A310499CB93DE02ACFCFB27A5BD2F3DB162792B44059151A97E573A618D5C583B46703FDC801AADB428353ADBEF576
3,060,045 UART: Caliptra RT
3,060,296 UART: [state] CFI Enabled
3,179,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,311 UART: [rt]cmd =0x52435458, len=8
3,211,230 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
893,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,558 UART: [kat] ++
897,710 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,659 UART: [kat] SHA2-512-ACC
908,560 UART: [kat] ECC-384
918,087 UART: [kat] HMAC-384Kdf
922,709 UART: [kat] LMS
1,171,037 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,278 UART: [fht] FHT @ 0x50003400
1,175,099 UART: [idev] ++
1,175,267 UART: [idev] CDI.KEYID = 6
1,175,627 UART: [idev] SUBJECT.KEYID = 7
1,176,051 UART: [idev] UDS.KEYID = 0
1,176,396 ready_for_fw is high
1,176,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,259 UART: [idev] Erasing UDS.KEYID = 0
1,201,726 UART: [idev] Sha1 KeyId Algorithm
1,209,998 UART: [idev] --
1,211,026 UART: [ldev] ++
1,211,194 UART: [ldev] CDI.KEYID = 6
1,211,557 UART: [ldev] SUBJECT.KEYID = 5
1,211,983 UART: [ldev] AUTHORITY.KEYID = 7
1,212,446 UART: [ldev] FE.KEYID = 1
1,217,542 UART: [ldev] Erasing FE.KEYID = 1
1,244,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,456 UART: [ldev] --
1,283,849 UART: [fwproc] Wait for Commands...
1,284,631 UART: [fwproc] Recv command 0x46574c44
1,285,359 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,072 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,452 >>> mbox cmd response: success
2,828,452 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,572 UART: [afmc] ++
2,829,740 UART: [afmc] CDI.KEYID = 6
2,830,102 UART: [afmc] SUBJECT.KEYID = 7
2,830,527 UART: [afmc] AUTHORITY.KEYID = 5
2,865,558 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,255 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,003 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,712 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,296 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,210 UART: [afmc] --
2,909,258 UART: [cold-reset] --
2,909,816 UART: [state] Locking Datavault
2,910,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,387 UART: [state] Locking ICCM
2,911,963 UART: [exit] Launching FMC @ 0x40000130
2,917,293 UART:
2,917,309 UART: Running Caliptra FMC ...
2,917,717 UART:
2,917,860 UART: [state] CFI Enabled
2,928,458 UART: [fht] FMC Alias Private Key: 7
3,047,790 UART: [art] Extend RT PCRs Done
3,048,218 UART: [art] Lock RT PCRs Done
3,049,744 UART: [art] Populate DV Done
3,057,745 UART: [fht] FMC Alias Private Key: 7
3,058,825 UART: [art] Derive CDI
3,059,105 UART: [art] Store in slot 0x4
3,144,688 UART: [art] Derive Key Pair
3,145,048 UART: [art] Store priv key in slot 0x5
3,157,684 UART: [art] Derive Key Pair - Done
3,172,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,286 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,051 UART: [art] PUB.X = B0D63981EED98F4AEF9065E5800F6CE45C10EADFBE03D184DCE9508DD68F476A00FF2B74D9B843E7A96133BFF7BBF96D
3,195,815 UART: [art] PUB.Y = 9C896A1C06C46BCD60C2CC504D0EAA5D3D3DA29E30389B7E72301EF63A0D5F16A91CABC1EAEDD68E774BF13F610B00D9
3,202,753 UART: [art] SIG.R = B936E27AB530902AE1C4A7FEA0F88191EECABAE1825DA6E1C0908054014BF05D12D7F1A7A75CF46AC0721C65DB6D7B38
3,209,536 UART: [art] SIG.S = 79A27740C3162FE0FC196769A8DD6735117C0E8401F82AF53910DF6E691F0EE92E48943D2B8ED877CEC2180ED5FD8447
3,233,546 UART: Caliptra RT
3,233,889 UART: [state] CFI Enabled
3,352,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,366 UART: [rt]cmd =0x52435458, len=8
3,384,351 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,142 ready_for_fw is high
1,060,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,951 >>> mbox cmd response: success
2,678,951 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,302 UART:
2,741,318 UART: Running Caliptra FMC ...
2,741,726 UART:
2,741,869 UART: [state] CFI Enabled
2,752,301 UART: [fht] FMC Alias Private Key: 7
2,871,505 UART: [art] Extend RT PCRs Done
2,871,933 UART: [art] Lock RT PCRs Done
2,873,373 UART: [art] Populate DV Done
2,881,486 UART: [fht] FMC Alias Private Key: 7
2,882,612 UART: [art] Derive CDI
2,882,892 UART: [art] Store in slot 0x4
2,968,961 UART: [art] Derive Key Pair
2,969,321 UART: [art] Store priv key in slot 0x5
2,982,599 UART: [art] Derive Key Pair - Done
2,997,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,406 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,171 UART: [art] PUB.X = 16429868F7D7CFFB7DDD0DEDEDB0A2225BB813F93142C6B67A6FB731FE8E3379BB2C6F060E8A66D5984B6883C9B7D42D
3,019,948 UART: [art] PUB.Y = 8566A7176DCC57DF20E68C6A74F913DE9F429DE241EF80B48DBE7824C29161141A341AE9C78D1BEA04D5221FE9370A42
3,026,898 UART: [art] SIG.R = 6859710A12CC10822B2CCC4E8080E49361371750A4917C1B492285027BF296F6BE54F64F9FFEB460E05784FF369CCC60
3,033,658 UART: [art] SIG.S = 1287AF1B31E384D0C089D4120FF447D18A4D1400CEA11FA2F23B629DCFEED1FBA10D6C7C42137E4C3A60529D62A1BDAE
3,057,202 UART: Caliptra RT
3,057,545 UART: [state] CFI Enabled
3,177,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,693 UART: [rt]cmd =0x52435458, len=8
3,208,562 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_call_outside_pl0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,051 UART:
192,432 UART: Running Caliptra ROM ...
193,562 UART:
193,709 UART: [state] CFI Enabled
266,242 UART: [state] LifecycleState = Unprovisioned
268,246 UART: [state] DebugLocked = No
270,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,865 UART: [kat] SHA2-256
444,538 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,057 UART: [kat] ++
455,537 UART: [kat] sha1
467,546 UART: [kat] SHA2-256
470,268 UART: [kat] SHA2-384
475,472 UART: [kat] SHA2-512-ACC
477,835 UART: [kat] ECC-384
2,767,764 UART: [kat] HMAC-384Kdf
2,780,563 UART: [kat] LMS
3,970,842 UART: [kat] --
3,974,551 UART: [cold-reset] ++
3,977,112 UART: [fht] Storing FHT @ 0x50003400
3,987,897 UART: [idev] ++
3,988,471 UART: [idev] CDI.KEYID = 6
3,989,501 UART: [idev] SUBJECT.KEYID = 7
3,990,672 UART: [idev] UDS.KEYID = 0
3,991,712 ready_for_fw is high
3,991,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,827 UART: [idev] Erasing UDS.KEYID = 0
7,326,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,005 UART: [idev] --
7,353,088 UART: [ldev] ++
7,353,659 UART: [ldev] CDI.KEYID = 6
7,354,637 UART: [ldev] SUBJECT.KEYID = 5
7,355,848 UART: [ldev] AUTHORITY.KEYID = 7
7,357,075 UART: [ldev] FE.KEYID = 1
7,404,610 UART: [ldev] Erasing FE.KEYID = 1
10,733,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,967 UART: [ldev] --
13,095,213 UART: [fwproc] Waiting for Commands...
13,098,069 UART: [fwproc] Received command 0x46574c44
13,100,310 UART: [fwproc] Received Image of size 118548 bytes
17,203,414 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,609 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,680,722 >>> mbox cmd response: success
17,682,182 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,684,491 UART: [afmc] ++
17,685,070 UART: [afmc] CDI.KEYID = 6
17,685,982 UART: [afmc] SUBJECT.KEYID = 7
17,687,270 UART: [afmc] AUTHORITY.KEYID = 5
21,053,954 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,353,561 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,355,820 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,370,297 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,385,024 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,399,433 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,421,695 UART: [afmc] --
23,425,228 UART: [cold-reset] --
23,429,514 UART: [state] Locking Datavault
23,434,920 UART: [state] Locking PCR0, PCR1 and PCR31
23,436,670 UART: [state] Locking ICCM
23,438,360 UART: [exit] Launching FMC @ 0x40000130
23,446,749 UART:
23,446,980 UART: Running Caliptra FMC ...
23,448,006 UART:
23,448,183 UART: [state] CFI Enabled
23,512,838 UART: [fht] FMC Alias Private Key: 7
25,853,808 UART: [art] Extend RT PCRs Done
25,855,032 UART: [art] Lock RT PCRs Done
25,856,792 UART: [art] Populate DV Done
25,862,295 UART: [fht] FMC Alias Private Key: 7
25,863,776 UART: [art] Derive CDI
25,864,518 UART: [art] Store in slot 0x4
25,920,580 UART: [art] Derive Key Pair
25,921,573 UART: [art] Store priv key in slot 0x5
29,214,368 UART: [art] Derive Key Pair - Done
29,227,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,515,389 UART: [art] Erasing AUTHORITY.KEYID = 7
31,516,897 UART: [art] PUB.X = C3DCCF72A1B746E948DE6599A19FD104399FFE4907F2113912CD83A826CBD4A6F883E6A4D8CB1AA409FBB50A17ACBEFB
31,524,201 UART: [art] PUB.Y = DF0D7B3AFD7FF3028D2E84C4F4C39C115720A7E42F8A01A6559AF5CFB8EF4D6491A70A739148372EDDE134DBB144D6BD
31,531,476 UART: [art] SIG.R = 74023B2A338FA1DB4BDF2A89BDBC99406EF906A5D7AD2F5CEF9677FB727DD44BEA0A9E3327DA3C459C082ABA29971E15
31,538,876 UART: [art] SIG.S = 1E7FC8506E982B10D9FCEC1A2C7C71406D7AE113ECF6ECF9141FACDB78689172052BB78D27A889FAABEFA8ABCA66481F
32,844,026 UART: Caliptra RT
32,844,729 UART: [state] CFI Enabled
33,019,377 UART: [rt] RT listening for mailbox commands...
33,050,849 UART: [rt]cmd =0x52435458, len=8
33,052,304 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,784,150 ready_for_fw is high
3,784,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,075 >>> mbox cmd response: success
17,945,882 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,630,139 UART:
23,631,125 UART: Running Caliptra FMC ...
23,632,281 UART:
23,632,437 UART: [state] CFI Enabled
23,681,546 UART: [fht] FMC Alias Private Key: 7
26,022,378 UART: [art] Extend RT PCRs Done
26,023,641 UART: [art] Lock RT PCRs Done
26,025,686 UART: [art] Populate DV Done
26,031,063 UART: [fht] FMC Alias Private Key: 7
26,032,662 UART: [art] Derive CDI
26,033,402 UART: [art] Store in slot 0x4
26,090,157 UART: [art] Derive Key Pair
26,091,201 UART: [art] Store priv key in slot 0x5
29,366,153 UART: [art] Derive Key Pair - Done
29,379,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,667,336 UART: [art] Erasing AUTHORITY.KEYID = 7
31,668,869 UART: [art] PUB.X = C4FC5EA5AD5BBC75847C28CE3634BC9A211ECD3CA32BB424BD27169F6F03A903B12C278C44A1CD8E7B44DB79EDEC7F40
31,676,168 UART: [art] PUB.Y = A2BC57DB34943563DF1858FC7322831A73E8A94D6D5AC54006003542E2291EB19E5FBF3893F03AB7DFED8917B15E56ED
31,683,430 UART: [art] SIG.R = F3ECFA9B372D473D179B26E6976743B61D6D716C5AB1037E5B47ED149F8F2E0894CCEF083034C257EB5052CF9A42677E
31,690,800 UART: [art] SIG.S = 7585B42969E46F0A0B2455992A00623ACCAB416300FCD5540BFEAEBDB15D9835863B251708E69D90217A4020DB0B81A9
32,996,015 UART: Caliptra RT
32,996,727 UART: [state] CFI Enabled
33,171,481 UART: [rt] RT listening for mailbox commands...
33,202,948 UART: [rt]cmd =0x52435458, len=8
33,204,350 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,467 writing to cptra_bootfsm_go
192,614 UART:
192,977 UART: Running Caliptra ROM ...
194,159 UART:
603,674 UART: [state] CFI Enabled
617,770 UART: [state] LifecycleState = Unprovisioned
619,705 UART: [state] DebugLocked = No
621,458 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,249 UART: [kat] SHA2-256
796,031 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,551 UART: [kat] ++
807,018 UART: [kat] sha1
818,954 UART: [kat] SHA2-256
821,672 UART: [kat] SHA2-384
826,235 UART: [kat] SHA2-512-ACC
828,596 UART: [kat] ECC-384
3,112,460 UART: [kat] HMAC-384Kdf
3,125,340 UART: [kat] LMS
4,315,494 UART: [kat] --
4,320,077 UART: [cold-reset] ++
4,321,517 UART: [fht] Storing FHT @ 0x50003400
4,332,279 UART: [idev] ++
4,332,835 UART: [idev] CDI.KEYID = 6
4,333,827 UART: [idev] SUBJECT.KEYID = 7
4,334,998 UART: [idev] UDS.KEYID = 0
4,336,061 ready_for_fw is high
4,336,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,174 UART: [idev] Erasing UDS.KEYID = 0
7,622,505 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,262 UART: [idev] --
7,647,817 UART: [ldev] ++
7,648,381 UART: [ldev] CDI.KEYID = 6
7,649,340 UART: [ldev] SUBJECT.KEYID = 5
7,650,545 UART: [ldev] AUTHORITY.KEYID = 7
7,651,822 UART: [ldev] FE.KEYID = 1
7,663,433 UART: [ldev] Erasing FE.KEYID = 1
10,950,173 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,393 UART: [ldev] --
13,311,623 UART: [fwproc] Waiting for Commands...
13,314,309 UART: [fwproc] Received command 0x46574c44
13,316,487 UART: [fwproc] Received Image of size 118548 bytes
17,418,839 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,395 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,607 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,667 >>> mbox cmd response: success
17,895,999 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,898,419 UART: [afmc] ++
17,899,009 UART: [afmc] CDI.KEYID = 6
17,899,899 UART: [afmc] SUBJECT.KEYID = 7
17,901,160 UART: [afmc] AUTHORITY.KEYID = 5
21,215,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,341 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,756 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,469 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,920 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,731 UART: [afmc] --
23,583,588 UART: [cold-reset] --
23,586,954 UART: [state] Locking Datavault
23,592,268 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,007 UART: [state] Locking ICCM
23,596,546 UART: [exit] Launching FMC @ 0x40000130
23,604,934 UART:
23,605,163 UART: Running Caliptra FMC ...
23,606,257 UART:
23,606,407 UART: [state] CFI Enabled
23,614,880 UART: [fht] FMC Alias Private Key: 7
25,955,365 UART: [art] Extend RT PCRs Done
25,956,588 UART: [art] Lock RT PCRs Done
25,958,041 UART: [art] Populate DV Done
25,963,400 UART: [fht] FMC Alias Private Key: 7
25,965,040 UART: [art] Derive CDI
25,965,852 UART: [art] Store in slot 0x4
26,008,556 UART: [art] Derive Key Pair
26,009,600 UART: [art] Store priv key in slot 0x5
29,251,337 UART: [art] Derive Key Pair - Done
29,264,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,016 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,548 UART: [art] PUB.X = 5B9D041932CFF2F373D5CFA51310BC77F2E8EAB9BF018FCA6CC7F541E6DF3E83DED7FC9967ECE1E47A4673D00A10E781
31,553,785 UART: [art] PUB.Y = E017656D391096218766A308FBC2FD57C72AAE8926DE9AB73A297E60217766CCA82C21B6525B0855F48BFFAF7019E29B
31,561,067 UART: [art] SIG.R = D6CC438C75AC4F2CD24F92696F4215C2864DC3597C8151BF1CB534457BA1C446136C54A3E62AD1B77153B68E909492D5
31,568,450 UART: [art] SIG.S = 841565CAD942A8EE5936A85CC15469665C5478BFAEFF93881E2AB746ABD57FE2B91730A69A7B6FACF08C6C5BBE732FAE
32,873,248 UART: Caliptra RT
32,873,974 UART: [state] CFI Enabled
33,006,905 UART: [rt] RT listening for mailbox commands...
33,038,524 UART: [rt]cmd =0x52435458, len=8
33,039,844 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,445 writing to cptra_bootfsm_go
4,126,127 ready_for_fw is high
4,126,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,901 >>> mbox cmd response: success
18,153,977 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,796,700 UART:
23,797,077 UART: Running Caliptra FMC ...
23,798,225 UART:
23,798,382 UART: [state] CFI Enabled
23,806,418 UART: [fht] FMC Alias Private Key: 7
26,146,587 UART: [art] Extend RT PCRs Done
26,147,838 UART: [art] Lock RT PCRs Done
26,149,772 UART: [art] Populate DV Done
26,155,410 UART: [fht] FMC Alias Private Key: 7
26,157,051 UART: [art] Derive CDI
26,157,787 UART: [art] Store in slot 0x4
26,200,248 UART: [art] Derive Key Pair
26,201,298 UART: [art] Store priv key in slot 0x5
29,443,502 UART: [art] Derive Key Pair - Done
29,456,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,736,234 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,734 UART: [art] PUB.X = 2BAB55833F8FDB01669A0DBA75B12BDFB0A92C522208C0F89A2AAE289068B1EEAC152C0948AF1723D1D4D922C917EFE7
31,745,028 UART: [art] PUB.Y = 44D8375E3C2D69161900D3CC7F989237DE036220D60DD705523AEFE2FBEDCF39F15B50DA86ED9264F271B8304B9AE64D
31,752,269 UART: [art] SIG.R = 1836851532EE486D58294998C82FDD9359AA32E8C1922C193D2CF4BE39433C3DA08E9E53D73D76DFD0AC6C7005FF71FE
31,759,713 UART: [art] SIG.S = 6BB4F1B3406F8C9CAD248BA4322A14B5ED67AA79DBE5542E06FF68B89025603E30A155C40EBA705DCEBF259D700718DD
33,065,109 UART: Caliptra RT
33,065,843 UART: [state] CFI Enabled
33,198,849 UART: [rt] RT listening for mailbox commands...
33,230,250 UART: [rt]cmd =0x52435458, len=8
33,231,624 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,964 UART:
192,321 UART: Running Caliptra ROM ...
193,408 UART:
193,550 UART: [state] CFI Enabled
260,143 UART: [state] LifecycleState = Unprovisioned
262,130 UART: [state] DebugLocked = No
263,805 UART: [state] WD Timer not started. Device not locked for debugging
267,482 UART: [kat] SHA2-256
447,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,897 UART: [kat] ++
458,383 UART: [kat] sha1
469,255 UART: [kat] SHA2-256
471,975 UART: [kat] SHA2-384
478,597 UART: [kat] SHA2-512-ACC
481,029 UART: [kat] ECC-384
2,928,001 UART: [kat] HMAC-384Kdf
2,950,231 UART: [kat] LMS
3,426,679 UART: [kat] --
3,431,661 UART: [cold-reset] ++
3,433,300 UART: [fht] FHT @ 0x50003400
3,445,836 UART: [idev] ++
3,446,400 UART: [idev] CDI.KEYID = 6
3,447,425 UART: [idev] SUBJECT.KEYID = 7
3,448,595 UART: [idev] UDS.KEYID = 0
3,449,654 ready_for_fw is high
3,449,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,011 UART: [idev] Erasing UDS.KEYID = 0
5,964,374 UART: [idev] Sha1 KeyId Algorithm
5,987,872 UART: [idev] --
5,992,767 UART: [ldev] ++
5,993,341 UART: [ldev] CDI.KEYID = 6
5,994,307 UART: [ldev] SUBJECT.KEYID = 5
5,995,456 UART: [ldev] AUTHORITY.KEYID = 7
5,996,733 UART: [ldev] FE.KEYID = 1
6,036,158 UART: [ldev] Erasing FE.KEYID = 1
8,544,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,541 UART: [ldev] --
10,353,071 UART: [fwproc] Wait for Commands...
10,355,646 UART: [fwproc] Recv command 0x46574c44
10,357,675 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,921,373 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,994,386 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,323,505 >>> mbox cmd response: success
14,324,730 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,326,993 UART: [afmc] ++
14,327,581 UART: [afmc] CDI.KEYID = 6
14,328,545 UART: [afmc] SUBJECT.KEYID = 7
14,329,757 UART: [afmc] AUTHORITY.KEYID = 5
16,871,827 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,276 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,465 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,347 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,645,900 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,669,388 UART: [afmc] --
18,673,466 UART: [cold-reset] --
18,676,893 UART: [state] Locking Datavault
18,682,464 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,154 UART: [state] Locking ICCM
18,685,325 UART: [exit] Launching FMC @ 0x40000130
18,693,761 UART:
18,694,009 UART: Running Caliptra FMC ...
18,695,111 UART:
18,695,273 UART: [state] CFI Enabled
18,753,652 UART: [fht] FMC Alias Private Key: 7
20,519,643 UART: [art] Extend RT PCRs Done
20,520,858 UART: [art] Lock RT PCRs Done
20,522,418 UART: [art] Populate DV Done
20,527,686 UART: [fht] FMC Alias Private Key: 7
20,529,211 UART: [art] Derive CDI
20,529,978 UART: [art] Store in slot 0x4
20,586,178 UART: [art] Derive Key Pair
20,587,168 UART: [art] Store priv key in slot 0x5
23,050,382 UART: [art] Derive Key Pair - Done
23,063,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,264 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,767 UART: [art] PUB.X = D942270CF1F0138681FC2F2D90F80C70AD10D37E0336B25C739D87A211394378A4657EF46460F25FB5CCE97E84FA8FDD
24,785,012 UART: [art] PUB.Y = 8EE1548D69AEAB7A5BF9ADCCAE66B7BF4031D65E731FA234A59C4D9BBA6BE3D5B50ECAD5D9DA823C48FF32E68C5A550A
24,792,313 UART: [art] SIG.R = 9561FB05872D980F189DAB0E675234EE0082410FFC6EE042A9BBCF58CC4B5FBC5EBB81CB01916D61BC1DB424E0CDE846
24,799,709 UART: [art] SIG.S = 45B652EFB36BB24959246FDA51D582564B6A0461688D4FC619A64CFD4C764A387F7B819CA2696660393F0945D34F1B4C
25,778,886 UART: Caliptra RT
25,779,589 UART: [state] CFI Enabled
25,960,016 UART: [rt] RT listening for mailbox commands...
25,991,542 UART: [rt]cmd =0x52435458, len=8
25,992,910 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,462,898 ready_for_fw is high
3,463,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,945 >>> mbox cmd response: success
14,247,495 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,538,539 UART:
18,538,938 UART: Running Caliptra FMC ...
18,540,041 UART:
18,540,199 UART: [state] CFI Enabled
18,604,263 UART: [fht] FMC Alias Private Key: 7
20,370,859 UART: [art] Extend RT PCRs Done
20,372,080 UART: [art] Lock RT PCRs Done
20,373,718 UART: [art] Populate DV Done
20,379,031 UART: [fht] FMC Alias Private Key: 7
20,380,627 UART: [art] Derive CDI
20,381,440 UART: [art] Store in slot 0x4
20,437,217 UART: [art] Derive Key Pair
20,438,270 UART: [art] Store priv key in slot 0x5
22,900,865 UART: [art] Derive Key Pair - Done
22,913,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,663 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,170 UART: [art] PUB.X = 5E65BD25B35EAC66B07EF9A26233839F14D4BDF4E89E92EAEF13BC015DB75579FB3915B604E88D685C1B45B91F20DF77
24,635,476 UART: [art] PUB.Y = 01F560DBB5E6DA0B0AA6D94C0E3C786792E8D0AE73CA99A055D7682801F898803D967D5FF07DC6719B16CAD864949C07
24,642,734 UART: [art] SIG.R = 333A067531BEF33D746112D1E61E5D68C824FF1F567B405B6517948032DCCEA32D01C1DBE2EB427B9E23366AFECCAD1A
24,650,124 UART: [art] SIG.S = 4B40D4A1BC5471B8147570E39B2FB1B4552CA245655F45CCE6D66840EDA7B8ECAE92612B3FCA72A880BFDF2940D5B28B
25,628,994 UART: Caliptra RT
25,629,698 UART: [state] CFI Enabled
25,810,448 UART: [rt] RT listening for mailbox commands...
25,841,609 UART: [rt]cmd =0x52435458, len=8
25,843,058 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,630 UART:
193,001 UART: Running Caliptra ROM ...
194,158 UART:
603,902 UART: [state] CFI Enabled
617,529 UART: [state] LifecycleState = Unprovisioned
619,417 UART: [state] DebugLocked = No
622,014 UART: [state] WD Timer not started. Device not locked for debugging
626,265 UART: [kat] SHA2-256
805,902 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,709 UART: [kat] ++
817,187 UART: [kat] sha1
828,489 UART: [kat] SHA2-256
831,224 UART: [kat] SHA2-384
837,875 UART: [kat] SHA2-512-ACC
840,252 UART: [kat] ECC-384
3,283,364 UART: [kat] HMAC-384Kdf
3,295,450 UART: [kat] LMS
3,771,977 UART: [kat] --
3,778,386 UART: [cold-reset] ++
3,779,533 UART: [fht] FHT @ 0x50003400
3,791,784 UART: [idev] ++
3,792,413 UART: [idev] CDI.KEYID = 6
3,793,298 UART: [idev] SUBJECT.KEYID = 7
3,794,608 UART: [idev] UDS.KEYID = 0
3,795,510 ready_for_fw is high
3,795,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,544 UART: [idev] Erasing UDS.KEYID = 0
6,273,345 UART: [idev] Sha1 KeyId Algorithm
6,298,086 UART: [idev] --
6,302,480 UART: [ldev] ++
6,303,053 UART: [ldev] CDI.KEYID = 6
6,304,025 UART: [ldev] SUBJECT.KEYID = 5
6,305,189 UART: [ldev] AUTHORITY.KEYID = 7
6,306,477 UART: [ldev] FE.KEYID = 1
6,319,015 UART: [ldev] Erasing FE.KEYID = 1
8,802,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,523,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,539,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,555,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,570,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,592,208 UART: [ldev] --
10,598,339 UART: [fwproc] Wait for Commands...
10,601,406 UART: [fwproc] Recv command 0x46574c44
10,603,394 UART: [fwproc] Recv'd Img size: 118548 bytes
14,087,456 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,168 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,565,842 >>> mbox cmd response: success
14,567,205 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,570,428 UART: [afmc] ++
14,571,021 UART: [afmc] CDI.KEYID = 6
14,571,964 UART: [afmc] SUBJECT.KEYID = 7
14,573,182 UART: [afmc] AUTHORITY.KEYID = 5
17,077,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,797,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,845 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,815,666 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,735 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,847,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,111 UART: [afmc] --
18,875,089 UART: [cold-reset] --
18,879,252 UART: [state] Locking Datavault
18,885,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,887,017 UART: [state] Locking ICCM
18,888,850 UART: [exit] Launching FMC @ 0x40000130
18,897,249 UART:
18,897,488 UART: Running Caliptra FMC ...
18,898,593 UART:
18,898,753 UART: [state] CFI Enabled
18,906,636 UART: [fht] FMC Alias Private Key: 7
20,672,726 UART: [art] Extend RT PCRs Done
20,673,944 UART: [art] Lock RT PCRs Done
20,675,728 UART: [art] Populate DV Done
20,681,086 UART: [fht] FMC Alias Private Key: 7
20,682,789 UART: [art] Derive CDI
20,683,607 UART: [art] Store in slot 0x4
20,726,263 UART: [art] Derive Key Pair
20,727,319 UART: [art] Store priv key in slot 0x5
23,153,725 UART: [art] Derive Key Pair - Done
23,166,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,441 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,937 UART: [art] PUB.X = 758B23F4DE369BF18046026CAFD57A27D3357355478677549C926362A0F88171590F08DD56FD783E59C90E7A52513B8E
24,881,178 UART: [art] PUB.Y = 8258FA081B2C59F33181B592324ADF076D234F1798DFB531391194733401A4272FA3997FCC38161A89F781834120AEE5
24,888,407 UART: [art] SIG.R = BCEAB357BD67903211B82C67A24347ABE6D8CD381600456687091222ABA70477443BCDFCD66FBED0D93BF2455D47592A
24,895,795 UART: [art] SIG.S = E8B92B8C6EB9FAACBAF2B1701B932FAF7F776561A0D8615471641D0B32EBECD191CECC423FA2FA36ED92CA6679E2D1DC
25,874,370 UART: Caliptra RT
25,875,076 UART: [state] CFI Enabled
26,005,978 UART: [rt] RT listening for mailbox commands...
26,037,455 UART: [rt]cmd =0x52435458, len=8
26,038,859 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,785,795 ready_for_fw is high
3,786,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,610 >>> mbox cmd response: success
14,447,036 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,695,119 UART:
18,695,528 UART: Running Caliptra FMC ...
18,696,669 UART:
18,696,833 UART: [state] CFI Enabled
18,704,628 UART: [fht] FMC Alias Private Key: 7
20,470,689 UART: [art] Extend RT PCRs Done
20,471,902 UART: [art] Lock RT PCRs Done
20,473,635 UART: [art] Populate DV Done
20,479,270 UART: [fht] FMC Alias Private Key: 7
20,480,773 UART: [art] Derive CDI
20,481,543 UART: [art] Store in slot 0x4
20,524,526 UART: [art] Derive Key Pair
20,525,565 UART: [art] Store priv key in slot 0x5
22,952,499 UART: [art] Derive Key Pair - Done
22,965,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,672,205 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,714 UART: [art] PUB.X = CBE76FA43725C239EE8DD67A3C26710D9DCE03A34ECC2E065E3133FDFBC20E0B71D74C21E175CF8D99D2A0DFA41A9FD9
24,681,043 UART: [art] PUB.Y = A2F0EE5CB437364352484DA382E0CA9B1EC7838306E2589FFDF3629393381F97D5517C14C2AC7902B46D7B298309B53E
24,688,235 UART: [art] SIG.R = 6616C73A5DCFF6D38C6AC97289DEC6C5FCA93257A8BE9A231692219C87954FF2AD8F039D9F5158BA52C58ED14AC70023
24,695,657 UART: [art] SIG.S = 63B9366A75A0E92AC7FD1F38936814B72D9F9B402FAC9B8CF8895FD2670B5748DD90921C68951889E99F12E3AE5F0FA0
25,673,973 UART: Caliptra RT
25,674,698 UART: [state] CFI Enabled
25,807,701 UART: [rt] RT listening for mailbox commands...
25,838,896 UART: [rt]cmd =0x52435458, len=8
25,840,238 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,077 UART:
192,447 UART: Running Caliptra ROM ...
193,657 UART:
193,808 UART: [state] CFI Enabled
259,944 UART: [state] LifecycleState = Unprovisioned
262,363 UART: [state] DebugLocked = No
265,108 UART: [state] WD Timer not started. Device not locked for debugging
269,649 UART: [kat] SHA2-256
459,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,355 UART: [kat] ++
470,885 UART: [kat] sha1
482,186 UART: [kat] SHA2-256
485,192 UART: [kat] SHA2-384
490,464 UART: [kat] SHA2-512-ACC
493,059 UART: [kat] ECC-384
2,946,187 UART: [kat] HMAC-384Kdf
2,972,004 UART: [kat] LMS
3,503,752 UART: [kat] --
3,508,814 UART: [cold-reset] ++
3,511,303 UART: [fht] FHT @ 0x50003400
3,522,768 UART: [idev] ++
3,523,405 UART: [idev] CDI.KEYID = 6
3,524,431 UART: [idev] SUBJECT.KEYID = 7
3,525,603 UART: [idev] UDS.KEYID = 0
3,526,525 ready_for_fw is high
3,526,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,775 UART: [idev] Erasing UDS.KEYID = 0
6,030,883 UART: [idev] Sha1 KeyId Algorithm
6,053,635 UART: [idev] --
6,059,309 UART: [ldev] ++
6,060,005 UART: [ldev] CDI.KEYID = 6
6,060,922 UART: [ldev] SUBJECT.KEYID = 5
6,062,083 UART: [ldev] AUTHORITY.KEYID = 7
6,063,314 UART: [ldev] FE.KEYID = 1
6,099,346 UART: [ldev] Erasing FE.KEYID = 1
8,607,534 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,811 UART: [ldev] --
10,412,284 UART: [fwproc] Wait for Commands...
10,414,483 UART: [fwproc] Recv command 0x46574c44
10,416,810 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,230 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,828 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,168 >>> mbox cmd response: success
14,685,506 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,688,133 UART: [afmc] ++
14,688,825 UART: [afmc] CDI.KEYID = 6
14,690,000 UART: [afmc] SUBJECT.KEYID = 7
14,691,481 UART: [afmc] AUTHORITY.KEYID = 5
17,238,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,981,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,983,743 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,998,825 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,013,989 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,028,895 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,053,073 UART: [afmc] --
19,055,752 UART: [cold-reset] --
19,061,221 UART: [state] Locking Datavault
19,066,384 UART: [state] Locking PCR0, PCR1 and PCR31
19,068,579 UART: [state] Locking ICCM
19,070,191 UART: [exit] Launching FMC @ 0x40000130
19,078,857 UART:
19,079,103 UART: Running Caliptra FMC ...
19,080,205 UART:
19,080,365 UART: [state] CFI Enabled
19,137,563 UART: [fht] FMC Alias Private Key: 7
20,903,981 UART: [art] Extend RT PCRs Done
20,905,203 UART: [art] Lock RT PCRs Done
20,906,876 UART: [art] Populate DV Done
20,912,118 UART: [fht] FMC Alias Private Key: 7
20,913,652 UART: [art] Derive CDI
20,914,463 UART: [art] Store in slot 0x4
20,969,907 UART: [art] Derive Key Pair
20,970,895 UART: [art] Store priv key in slot 0x5
23,434,119 UART: [art] Derive Key Pair - Done
23,446,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,160,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,161,882 UART: [art] PUB.X = 273090374800AA4D6C9783921F03FF46CF9A0D2D70D035DB4CFE49E0083A11275B45F29CF26AA48132AD0D441D66367D
25,169,130 UART: [art] PUB.Y = DCE1FB29681C2E2EA01EF563905BA3444FA5B66C93805DC205934B9DAC11CA44AF14A3C63E2E6D7F78ECEC3A41571A36
25,176,415 UART: [art] SIG.R = FE56EDA091946B04246F2AE51225A0BD08153CB11A46E7FB8A579B3BC6ACF36E8BAB185AB7BE66245D3CF09B60ED061D
25,183,808 UART: [art] SIG.S = 0203EC9142B36B366CE0A8145E86B8A5CC309F00BF5789011A9B9B43C952EEEF5D5711EB44110604539E94F4B400CB15
26,162,465 UART: Caliptra RT
26,163,153 UART: [state] CFI Enabled
26,342,987 UART: [rt] RT listening for mailbox commands...
26,374,562 UART: [rt]cmd =0x52435458, len=8
26,375,898 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,416,730 ready_for_fw is high
3,417,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,670 >>> mbox cmd response: success
14,807,306 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,113,172 UART:
19,113,555 UART: Running Caliptra FMC ...
19,114,700 UART:
19,114,858 UART: [state] CFI Enabled
19,179,549 UART: [fht] FMC Alias Private Key: 7
20,946,121 UART: [art] Extend RT PCRs Done
20,947,332 UART: [art] Lock RT PCRs Done
20,949,063 UART: [art] Populate DV Done
20,954,432 UART: [fht] FMC Alias Private Key: 7
20,956,196 UART: [art] Derive CDI
20,957,016 UART: [art] Store in slot 0x4
21,012,401 UART: [art] Derive Key Pair
21,013,407 UART: [art] Store priv key in slot 0x5
23,476,438 UART: [art] Derive Key Pair - Done
23,489,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,361 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,882 UART: [art] PUB.X = 6C3B7E50F03E2FBD2DC8802858EC7AB707C610EE8AA5CB287487DDC423195DB7F128752746A42B1F5096ED896AC18243
25,211,133 UART: [art] PUB.Y = 06296BCF3FA55F6450B0E1A86FEC198BD9050B3A8622531D51627B8CECA4669FA5BE6DFC6D0201B031A4BCB9BA77977A
25,218,362 UART: [art] SIG.R = 7F38394D2F9CE2AC973FB1C58D7675D34C5C0BF950D47E06FEC780781AC1E16D59C94DC262B4CB0361B001CF894155AE
25,225,804 UART: [art] SIG.S = 65FBE06481D8C3E2417B717913559452D054291D4A7E2D9C29F93D18DC787DBB654CC77B7FB2455F47E2CEE03D13C193
26,204,235 UART: Caliptra RT
26,204,927 UART: [state] CFI Enabled
26,386,555 UART: [rt] RT listening for mailbox commands...
26,417,866 UART: [rt]cmd =0x52435458, len=8
26,419,262 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,395 UART:
192,768 UART: Running Caliptra ROM ...
193,977 UART:
603,750 UART: [state] CFI Enabled
615,137 UART: [state] LifecycleState = Unprovisioned
617,572 UART: [state] DebugLocked = No
619,951 UART: [state] WD Timer not started. Device not locked for debugging
624,141 UART: [kat] SHA2-256
814,054 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,801 UART: [kat] ++
825,325 UART: [kat] sha1
838,120 UART: [kat] SHA2-256
841,139 UART: [kat] SHA2-384
846,994 UART: [kat] SHA2-512-ACC
849,608 UART: [kat] ECC-384
3,293,166 UART: [kat] HMAC-384Kdf
3,306,980 UART: [kat] LMS
3,838,780 UART: [kat] --
3,843,018 UART: [cold-reset] ++
3,845,314 UART: [fht] FHT @ 0x50003400
3,855,723 UART: [idev] ++
3,856,439 UART: [idev] CDI.KEYID = 6
3,857,327 UART: [idev] SUBJECT.KEYID = 7
3,858,577 UART: [idev] UDS.KEYID = 0
3,859,506 ready_for_fw is high
3,859,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,592 UART: [idev] Erasing UDS.KEYID = 0
6,333,584 UART: [idev] Sha1 KeyId Algorithm
6,355,110 UART: [idev] --
6,361,761 UART: [ldev] ++
6,362,438 UART: [ldev] CDI.KEYID = 6
6,363,336 UART: [ldev] SUBJECT.KEYID = 5
6,364,548 UART: [ldev] AUTHORITY.KEYID = 7
6,365,728 UART: [ldev] FE.KEYID = 1
6,376,755 UART: [ldev] Erasing FE.KEYID = 1
8,855,992 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,440 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,787 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,006 UART: [ldev] --
10,650,138 UART: [fwproc] Wait for Commands...
10,651,805 UART: [fwproc] Recv command 0x46574c44
10,654,117 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,737 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,842 >>> mbox cmd response: success
14,910,234 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,913,090 UART: [afmc] ++
14,913,823 UART: [afmc] CDI.KEYID = 6
14,915,020 UART: [afmc] SUBJECT.KEYID = 7
14,916,463 UART: [afmc] AUTHORITY.KEYID = 5
17,421,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,143,967 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,145,929 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,026 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,084 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,261 UART: [afmc] --
19,219,227 UART: [cold-reset] --
19,222,495 UART: [state] Locking Datavault
19,228,129 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,286 UART: [state] Locking ICCM
19,233,361 UART: [exit] Launching FMC @ 0x40000130
19,241,986 UART:
19,242,242 UART: Running Caliptra FMC ...
19,243,352 UART:
19,243,517 UART: [state] CFI Enabled
19,252,196 UART: [fht] FMC Alias Private Key: 7
21,018,365 UART: [art] Extend RT PCRs Done
21,019,593 UART: [art] Lock RT PCRs Done
21,021,446 UART: [art] Populate DV Done
21,026,969 UART: [fht] FMC Alias Private Key: 7
21,028,672 UART: [art] Derive CDI
21,029,416 UART: [art] Store in slot 0x4
21,071,527 UART: [art] Derive Key Pair
21,072,531 UART: [art] Store priv key in slot 0x5
23,499,624 UART: [art] Derive Key Pair - Done
23,512,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,799 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,304 UART: [art] PUB.X = 7CC050E1624F7C5689E369628FA68B8CA202D337A9F87067E9ED0FAE1FBDF2533CD30D59B63969858059A3B2E4FFADFD
25,227,601 UART: [art] PUB.Y = EE1F47CF36EB0FD9D200C9B77C43AFC533E2A8DE6ECBE758CA862D46A5BA2CE73EFC35C6C39CBA107CFE0C9D4BAFDF47
25,234,914 UART: [art] SIG.R = F2FDC83A9BB7FA1068C8B048C7D6782529E6B39F5081AD2FEE88B0703D0DAD84083087B79AACF03A05BF5A1508A15669
25,242,330 UART: [art] SIG.S = B377AB402C142DD0F9FE99697D59187130D99EE40A1C67CA31D5F5A59B5F7E8EFA2388E9E4B3FED5C25B2AC20CCA4ED1
26,221,301 UART: Caliptra RT
26,222,022 UART: [state] CFI Enabled
26,354,483 UART: [rt] RT listening for mailbox commands...
26,386,216 UART: [rt]cmd =0x52435458, len=8
26,387,698 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,756,211 ready_for_fw is high
3,756,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,033,414 >>> mbox cmd response: success
15,034,978 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,284,415 UART:
19,284,791 UART: Running Caliptra FMC ...
19,285,987 UART:
19,286,155 UART: [state] CFI Enabled
19,293,788 UART: [fht] FMC Alias Private Key: 7
21,059,612 UART: [art] Extend RT PCRs Done
21,060,840 UART: [art] Lock RT PCRs Done
21,062,584 UART: [art] Populate DV Done
21,068,043 UART: [fht] FMC Alias Private Key: 7
21,069,610 UART: [art] Derive CDI
21,070,435 UART: [art] Store in slot 0x4
21,112,668 UART: [art] Derive Key Pair
21,113,717 UART: [art] Store priv key in slot 0x5
23,539,976 UART: [art] Derive Key Pair - Done
23,552,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,259,495 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,004 UART: [art] PUB.X = 28A06537E9B87DBD7BC021A2F144DF0E452EE77FBC90CB8AF3CB883EF13C3D9F8FCD628536769143A8330BCB30232411
25,268,278 UART: [art] PUB.Y = 8F287E4270A8734B4A7DDC2A4623569D521E1C89A6643243FCE0F97755C0DA5A035F74E591D4CE6D5FD55E68F11528D2
25,275,495 UART: [art] SIG.R = AD68806CF7EC53DA73009B28AACD023ECCA9101482FE030CD661FDA5BC5DB2A052AC33E3E6CD1CBB1575DD864AE2F90D
25,282,909 UART: [art] SIG.S = B24FB2BE6A245609E0F0081D068265539920B4A0AA981F886458C4FAB3756DB78D37D8DD67E7ABE574B984F49189FB82
26,261,962 UART: Caliptra RT
26,262,688 UART: [state] CFI Enabled
26,395,269 UART: [rt] RT listening for mailbox commands...
26,426,797 UART: [rt]cmd =0x52435458, len=8
26,428,211 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,593 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,307 UART: [kat] SHA2-256
882,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,353 UART: [kat] ++
886,505 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,824 UART: [kat] HMAC-384Kdf
907,288 UART: [kat] LMS
1,475,484 UART: [kat] --
1,476,173 UART: [cold-reset] ++
1,476,597 UART: [fht] Storing FHT @ 0x50003400
1,479,464 UART: [idev] ++
1,479,632 UART: [idev] CDI.KEYID = 6
1,479,992 UART: [idev] SUBJECT.KEYID = 7
1,480,416 UART: [idev] UDS.KEYID = 0
1,480,761 ready_for_fw is high
1,480,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,684 UART: [idev] Erasing UDS.KEYID = 0
1,504,950 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,895 UART: [ldev] ++
1,515,063 UART: [ldev] CDI.KEYID = 6
1,515,426 UART: [ldev] SUBJECT.KEYID = 5
1,515,852 UART: [ldev] AUTHORITY.KEYID = 7
1,516,315 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,734 UART: [ldev] --
1,586,235 UART: [fwproc] Waiting for Commands...
1,587,028 UART: [fwproc] Received command 0x46574c44
1,587,819 UART: [fwproc] Received Image of size 118548 bytes
2,932,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,265 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,483 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,696 >>> mbox cmd response: success
3,131,696 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,858 UART: [afmc] ++
3,133,026 UART: [afmc] CDI.KEYID = 6
3,133,388 UART: [afmc] SUBJECT.KEYID = 7
3,133,813 UART: [afmc] AUTHORITY.KEYID = 5
3,168,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,790 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,499 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,382 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,065 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,967 UART: [afmc] --
3,211,889 UART: [cold-reset] --
3,212,735 UART: [state] Locking Datavault
3,213,778 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,382 UART: [state] Locking ICCM
3,214,806 UART: [exit] Launching FMC @ 0x40000130
3,220,136 UART:
3,220,152 UART: Running Caliptra FMC ...
3,220,560 UART:
3,220,614 UART: [state] CFI Enabled
3,231,034 UART: [fht] FMC Alias Private Key: 7
3,349,636 UART: [art] Extend RT PCRs Done
3,350,064 UART: [art] Lock RT PCRs Done
3,351,574 UART: [art] Populate DV Done
3,359,763 UART: [fht] FMC Alias Private Key: 7
3,360,879 UART: [art] Derive CDI
3,361,159 UART: [art] Store in slot 0x4
3,446,929 UART: [art] Derive Key Pair
3,447,289 UART: [art] Store priv key in slot 0x5
3,460,196 UART: [art] Derive Key Pair - Done
3,475,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,080 UART: [art] PUB.X = 9837715DC772CE8D4A353167F27344F7826EC1456B5781AE1D65B8329890383F27773216020EC236C400325D41D6291D
3,498,804 UART: [art] PUB.Y = FD43E540BC55A97857DCAC24BF9E775200EDD0E32ECDB65DB163ED8C9FDED47624944E741455772120E94FD1069FCF1D
3,505,743 UART: [art] SIG.R = B92CECC8A99BB3AB3BD8456E202BE3D225949865566DCA3511FDF35A092EBE2349546B7BEB071624B6579949233E2993
3,512,509 UART: [art] SIG.S = 73BC9FE9F6DDEA2955B084C9F5C6E086707331446B991335BC48F7432BF833CE7488DDBD1DBD0B122C9B841DC28D5D95
3,536,714 UART: Caliptra RT
3,536,965 UART: [state] CFI Enabled
3,656,827 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,159 UART: [rt]cmd =0x52435458, len=8
3,688,383 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,505 ready_for_fw is high
1,362,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,586 >>> mbox cmd response: success
2,980,586 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,817 UART:
3,041,833 UART: Running Caliptra FMC ...
3,042,241 UART:
3,042,295 UART: [state] CFI Enabled
3,053,117 UART: [fht] FMC Alias Private Key: 7
3,171,991 UART: [art] Extend RT PCRs Done
3,172,419 UART: [art] Lock RT PCRs Done
3,173,881 UART: [art] Populate DV Done
3,182,036 UART: [fht] FMC Alias Private Key: 7
3,183,030 UART: [art] Derive CDI
3,183,310 UART: [art] Store in slot 0x4
3,269,004 UART: [art] Derive Key Pair
3,269,364 UART: [art] Store priv key in slot 0x5
3,282,523 UART: [art] Derive Key Pair - Done
3,297,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,289 UART: [art] PUB.X = 176882FDB7CABD65861E1DD28B1370B80D6768F4B5118F756C632EDE7B1A7EA4FC9708166D42834FE84F9D4415050CBA
3,320,053 UART: [art] PUB.Y = BDC764126C2A6130A56D6F125D58A0435380DB6C6D5541DEACC880A81D16E17CB41799A04D4E1837EE493B7CAAA13DFF
3,327,015 UART: [art] SIG.R = 61A9F0815B35AF89E2A971F6A8D1BCCEAAC438FDDBDF52E57734F60293A03300CC3D81A646C4C851A4017A101888B648
3,333,765 UART: [art] SIG.S = 9B3235192EB384DE41ED4286CFB4F763295CF7020641F3AB15221359825AE10F21CE47F1FC614BD4308E1004071A547A
3,357,474 UART: Caliptra RT
3,357,725 UART: [state] CFI Enabled
3,477,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,527 UART: [rt]cmd =0x52435458, len=8
3,509,411 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,682 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,202 UART: [kat] SHA2-256
882,133 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,248 UART: [kat] ++
886,400 UART: [kat] sha1
890,680 UART: [kat] SHA2-256
892,618 UART: [kat] SHA2-384
895,227 UART: [kat] SHA2-512-ACC
897,128 UART: [kat] ECC-384
902,835 UART: [kat] HMAC-384Kdf
907,421 UART: [kat] LMS
1,475,617 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,476,808 UART: [fht] Storing FHT @ 0x50003400
1,479,803 UART: [idev] ++
1,479,971 UART: [idev] CDI.KEYID = 6
1,480,331 UART: [idev] SUBJECT.KEYID = 7
1,480,755 UART: [idev] UDS.KEYID = 0
1,481,100 ready_for_fw is high
1,481,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,907 UART: [idev] Erasing UDS.KEYID = 0
1,505,613 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,309 UART: [idev] --
1,515,276 UART: [ldev] ++
1,515,444 UART: [ldev] CDI.KEYID = 6
1,515,807 UART: [ldev] SUBJECT.KEYID = 5
1,516,233 UART: [ldev] AUTHORITY.KEYID = 7
1,516,696 UART: [ldev] FE.KEYID = 1
1,521,996 UART: [ldev] Erasing FE.KEYID = 1
1,547,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,876 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,592 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,309 UART: [ldev] --
1,586,746 UART: [fwproc] Waiting for Commands...
1,587,507 UART: [fwproc] Received command 0x46574c44
1,588,298 UART: [fwproc] Received Image of size 118548 bytes
2,933,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,782 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,000 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,347 >>> mbox cmd response: success
3,132,347 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,133,421 UART: [afmc] ++
3,133,589 UART: [afmc] CDI.KEYID = 6
3,133,951 UART: [afmc] SUBJECT.KEYID = 7
3,134,376 UART: [afmc] AUTHORITY.KEYID = 5
3,169,393 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,487 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,267 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,976 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,859 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,262 UART: [afmc] --
3,212,172 UART: [cold-reset] --
3,212,950 UART: [state] Locking Datavault
3,214,277 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,881 UART: [state] Locking ICCM
3,215,479 UART: [exit] Launching FMC @ 0x40000130
3,220,809 UART:
3,220,825 UART: Running Caliptra FMC ...
3,221,233 UART:
3,221,376 UART: [state] CFI Enabled
3,232,220 UART: [fht] FMC Alias Private Key: 7
3,351,750 UART: [art] Extend RT PCRs Done
3,352,178 UART: [art] Lock RT PCRs Done
3,353,570 UART: [art] Populate DV Done
3,361,845 UART: [fht] FMC Alias Private Key: 7
3,362,813 UART: [art] Derive CDI
3,363,093 UART: [art] Store in slot 0x4
3,449,133 UART: [art] Derive Key Pair
3,449,493 UART: [art] Store priv key in slot 0x5
3,462,846 UART: [art] Derive Key Pair - Done
3,477,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,119 UART: [art] PUB.X = A1AD4EBB7296F11C0ACB27C860AE884C0173F2985A34224C9EA9E728C6C9118F2D6AEFFD511A7C21B5470D8345ECEBD2
3,500,896 UART: [art] PUB.Y = BC952B425D33390B7C83A6AE3EBCA71B0B5D5FC48BFF7E355228DF4CA60B497969E3BF3426EBBDF5FD8BB0E05B4082E7
3,507,859 UART: [art] SIG.R = DA9771E539C4D3CF58223477223807C4E46FA5F40D3184996B5773F61C0D351150657BBA8858C14437013872B467A5C8
3,514,603 UART: [art] SIG.S = F9C00F79414067BD1CECF25ECCF8D1FA1292DEBE23E03682E9B1F396D2EF422BE841EAEE6312E4B7ECF515942A11FC17
3,538,082 UART: Caliptra RT
3,538,425 UART: [state] CFI Enabled
3,658,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,972 UART: [rt]cmd =0x52435458, len=8
3,690,026 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,304 ready_for_fw is high
1,363,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,711 >>> mbox cmd response: success
2,981,711 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,043,822 UART:
3,043,838 UART: Running Caliptra FMC ...
3,044,246 UART:
3,044,389 UART: [state] CFI Enabled
3,055,193 UART: [fht] FMC Alias Private Key: 7
3,174,905 UART: [art] Extend RT PCRs Done
3,175,333 UART: [art] Lock RT PCRs Done
3,177,233 UART: [art] Populate DV Done
3,185,596 UART: [fht] FMC Alias Private Key: 7
3,186,734 UART: [art] Derive CDI
3,187,014 UART: [art] Store in slot 0x4
3,272,390 UART: [art] Derive Key Pair
3,272,750 UART: [art] Store priv key in slot 0x5
3,286,613 UART: [art] Derive Key Pair - Done
3,301,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,855 UART: [art] PUB.X = 658E074652A2AA68D76E31038E99FF10F8D757EF7A4257C97B4D7D31991AFC36A47B26867B17961D92682F445026ADFC
3,324,617 UART: [art] PUB.Y = E6B49A3E8F54FD5FC2C4E607C4CE278C9A8F1BE9EE8B694C7FA0F0D94B545A1A6AAD2D579C71D0C430A98DBEC381FEAE
3,331,594 UART: [art] SIG.R = 20F1024C2E55927F1C6989CDC46E413DBB05DF8737B57C4BB80D05FCA608CAC6A4A837D45E8EED3D262B9B5B974FDE68
3,338,365 UART: [art] SIG.S = A678834E2A1711CB24D9E0C965E5A2985BB9091E6E6B986FB2D2CA3EEA2FAB2944AF7443B07B702F805CCBCABFFD67FD
3,362,024 UART: Caliptra RT
3,362,367 UART: [state] CFI Enabled
3,483,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,799 UART: [rt]cmd =0x52435458, len=8
3,514,873 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,388 UART: [kat] SHA2-256
890,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,042 UART: [kat] ++
895,194 UART: [kat] sha1
899,260 UART: [kat] SHA2-256
901,200 UART: [kat] SHA2-384
903,933 UART: [kat] SHA2-512-ACC
905,834 UART: [kat] ECC-384
915,555 UART: [kat] HMAC-384Kdf
920,197 UART: [kat] LMS
1,168,509 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,692 UART: [fht] FHT @ 0x50003400
1,172,414 UART: [idev] ++
1,172,582 UART: [idev] CDI.KEYID = 6
1,172,943 UART: [idev] SUBJECT.KEYID = 7
1,173,368 UART: [idev] UDS.KEYID = 0
1,173,714 ready_for_fw is high
1,173,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,243 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,437 UART: [idev] --
1,208,504 UART: [ldev] ++
1,208,672 UART: [ldev] CDI.KEYID = 6
1,209,036 UART: [ldev] SUBJECT.KEYID = 5
1,209,463 UART: [ldev] AUTHORITY.KEYID = 7
1,209,926 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,681 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,505 UART: [fwproc] Wait for Commands...
1,281,154 UART: [fwproc] Recv command 0x46574c44
1,281,887 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,621 >>> mbox cmd response: success
2,824,621 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,825,831 UART: [afmc] ++
2,825,999 UART: [afmc] CDI.KEYID = 6
2,826,362 UART: [afmc] SUBJECT.KEYID = 7
2,826,788 UART: [afmc] AUTHORITY.KEYID = 5
2,862,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,832 UART: [afmc] --
2,905,689 UART: [cold-reset] --
2,906,707 UART: [state] Locking Datavault
2,908,170 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,774 UART: [state] Locking ICCM
2,909,282 UART: [exit] Launching FMC @ 0x40000130
2,914,612 UART:
2,914,628 UART: Running Caliptra FMC ...
2,915,036 UART:
2,915,090 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,044,624 UART: [art] Extend RT PCRs Done
3,045,052 UART: [art] Lock RT PCRs Done
3,046,574 UART: [art] Populate DV Done
3,054,941 UART: [fht] FMC Alias Private Key: 7
3,056,049 UART: [art] Derive CDI
3,056,329 UART: [art] Store in slot 0x4
3,142,278 UART: [art] Derive Key Pair
3,142,638 UART: [art] Store priv key in slot 0x5
3,155,610 UART: [art] Derive Key Pair - Done
3,170,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,589 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,354 UART: [art] PUB.X = 7EAEA6EFC84745455E9602063021BECD46B72DBB9AA529BEBB4C60C90BC23864748135955083895B7C3CC39F06BBC211
3,193,118 UART: [art] PUB.Y = 8EE2E74D9D5E8DF1B8BE94A2C826170FC7757036AC9BF204F0F4EC82B4AFF38CDD3D0DEBB1FD949043D90ADFE96723C4
3,200,080 UART: [art] SIG.R = BF7CD3E7504400F22A7FB5E0206022C68F1CB5B6A9DEBDCE290F55AA57C0BC7EFC2867009E48E0DB29B2260DBD496453
3,206,816 UART: [art] SIG.S = A4CFF8DCCB105685905918D86F51576224EF6DD22192F557C65C271374AE8BC8F9AC1188E09AD7F823F62A5891D13312
3,230,422 UART: Caliptra RT
3,230,673 UART: [state] CFI Enabled
3,350,179 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,037 UART: [rt]cmd =0x52435458, len=8
3,381,949 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,746 ready_for_fw is high
1,058,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,852 >>> mbox cmd response: success
2,677,852 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,739,159 UART:
2,739,175 UART: Running Caliptra FMC ...
2,739,583 UART:
2,739,637 UART: [state] CFI Enabled
2,750,123 UART: [fht] FMC Alias Private Key: 7
2,869,197 UART: [art] Extend RT PCRs Done
2,869,625 UART: [art] Lock RT PCRs Done
2,871,155 UART: [art] Populate DV Done
2,879,200 UART: [fht] FMC Alias Private Key: 7
2,880,228 UART: [art] Derive CDI
2,880,508 UART: [art] Store in slot 0x4
2,966,213 UART: [art] Derive Key Pair
2,966,573 UART: [art] Store priv key in slot 0x5
2,979,971 UART: [art] Derive Key Pair - Done
2,994,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,290 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,055 UART: [art] PUB.X = 1B9231FF46CB83066A34C966D917F94746B28F1E83C02CF3CF053F3988042F0525B0EAC2083D70F745F125CD5F63314E
3,017,808 UART: [art] PUB.Y = 7730DFFC9C8CB8D915DED791B3D33CFA6DDA88B83904314AA368A662CEA6B626575D8BBDE46085E8B6B2AB5418A4908B
3,024,771 UART: [art] SIG.R = 6B5326EDF3B1497D461CD046D4DC18D7CD27332322FD935C850EC0CF5CCEC67C1E3A89425AF6D796023FB178716C5242
3,031,541 UART: [art] SIG.S = 8BC9852AA02DE52C59249B6CBEA4840FD72A3E9CC8A92C5E2A9E533023D1C32845E06C85BF9890CF9A6F53BD32EE232D
3,054,980 UART: Caliptra RT
3,055,231 UART: [state] CFI Enabled
3,174,814 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,088 UART: [rt]cmd =0x52435458, len=8
3,206,018 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,861 UART: [state] LifecycleState = Unprovisioned
86,516 UART: [state] DebugLocked = No
87,026 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,023 UART: [kat] ++
896,175 UART: [kat] sha1
900,481 UART: [kat] SHA2-256
902,421 UART: [kat] SHA2-384
905,162 UART: [kat] SHA2-512-ACC
907,063 UART: [kat] ECC-384
917,022 UART: [kat] HMAC-384Kdf
921,620 UART: [kat] LMS
1,169,932 UART: [kat] --
1,170,455 UART: [cold-reset] ++
1,170,907 UART: [fht] FHT @ 0x50003400
1,173,623 UART: [idev] ++
1,173,791 UART: [idev] CDI.KEYID = 6
1,174,152 UART: [idev] SUBJECT.KEYID = 7
1,174,577 UART: [idev] UDS.KEYID = 0
1,174,923 ready_for_fw is high
1,174,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,364 UART: [idev] Erasing UDS.KEYID = 0
1,200,014 UART: [idev] Sha1 KeyId Algorithm
1,208,908 UART: [idev] --
1,209,799 UART: [ldev] ++
1,209,967 UART: [ldev] CDI.KEYID = 6
1,210,331 UART: [ldev] SUBJECT.KEYID = 5
1,210,758 UART: [ldev] AUTHORITY.KEYID = 7
1,211,221 UART: [ldev] FE.KEYID = 1
1,216,547 UART: [ldev] Erasing FE.KEYID = 1
1,242,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,553 UART: [ldev] --
1,281,898 UART: [fwproc] Wait for Commands...
1,282,539 UART: [fwproc] Recv command 0x46574c44
1,283,272 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,928 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,103 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,312 >>> mbox cmd response: success
2,826,312 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,496 UART: [afmc] ++
2,827,664 UART: [afmc] CDI.KEYID = 6
2,828,027 UART: [afmc] SUBJECT.KEYID = 7
2,828,453 UART: [afmc] AUTHORITY.KEYID = 5
2,864,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,058 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,515 UART: [afmc] --
2,907,554 UART: [cold-reset] --
2,908,526 UART: [state] Locking Datavault
2,909,775 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,379 UART: [state] Locking ICCM
2,911,023 UART: [exit] Launching FMC @ 0x40000130
2,916,353 UART:
2,916,369 UART: Running Caliptra FMC ...
2,916,777 UART:
2,916,920 UART: [state] CFI Enabled
2,926,870 UART: [fht] FMC Alias Private Key: 7
3,046,352 UART: [art] Extend RT PCRs Done
3,046,780 UART: [art] Lock RT PCRs Done
3,048,276 UART: [art] Populate DV Done
3,056,303 UART: [fht] FMC Alias Private Key: 7
3,057,237 UART: [art] Derive CDI
3,057,517 UART: [art] Store in slot 0x4
3,142,858 UART: [art] Derive Key Pair
3,143,218 UART: [art] Store priv key in slot 0x5
3,156,888 UART: [art] Derive Key Pair - Done
3,171,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,852 UART: [art] PUB.X = A3021D189B6834D942897AB9FC932A3457F281A407FFEA4B9BB8085A672B14C840A1D3E4C1A4F838D9DA1E364F132DC9
3,194,619 UART: [art] PUB.Y = DECDE01B7B48833076893BB66A3D627D497BE19F34A7B1AB3C9BAC2BB7BA81E8AEBB9B3B562480E0D4F846E3443A68F2
3,201,587 UART: [art] SIG.R = C8C0F1E6AB0C93210AE52864BC1A619FD8E9B85C156523FEA578DA6BCDC5BB0F4E6BEB43D021A110C214CAEFA7CFB91E
3,208,376 UART: [art] SIG.S = 9A8658A40550AFDFF34609B36D2492097EDF62B5EA8980F0CB048D7734E85CCDBAC5073B0C27E75C10032CAE473522B1
3,232,257 UART: Caliptra RT
3,232,600 UART: [state] CFI Enabled
3,352,334 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,640 UART: [rt]cmd =0x52435458, len=8
3,383,778 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,683 ready_for_fw is high
1,058,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,767 >>> mbox cmd response: success
2,677,767 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,296 UART:
2,740,312 UART: Running Caliptra FMC ...
2,740,720 UART:
2,740,863 UART: [state] CFI Enabled
2,751,449 UART: [fht] FMC Alias Private Key: 7
2,870,561 UART: [art] Extend RT PCRs Done
2,870,989 UART: [art] Lock RT PCRs Done
2,872,613 UART: [art] Populate DV Done
2,880,718 UART: [fht] FMC Alias Private Key: 7
2,881,656 UART: [art] Derive CDI
2,881,936 UART: [art] Store in slot 0x4
2,967,709 UART: [art] Derive Key Pair
2,968,069 UART: [art] Store priv key in slot 0x5
2,982,021 UART: [art] Derive Key Pair - Done
2,996,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,254 UART: [art] PUB.X = A749F7A9CC5D3929AB3A087863F1F8D269434DF659E0BEACD741CC8C2AB47197986856A46FFA84F9B3D6CDC03A368529
3,020,031 UART: [art] PUB.Y = 507D86BC60D09544D6D6083C7EAA914C7508635440BA6E25EF567193335C2F33BAC92A46FD8DA79C7823D285A2C978F6
3,026,975 UART: [art] SIG.R = 552B010150CAC8BDB65EDE70F153C22F309744E3B8DE9857255DAFEFD6B0675FC6294ED591721EF530CF2D0E9B8470E3
3,033,746 UART: [art] SIG.S = 3D5C0F6C4D939A428FD8E54DE3F032A800CF6C4BF1E9C6C05B5F5A91316560097966D7A28B08C83A5958F7FFC735C467
3,057,835 UART: Caliptra RT
3,058,178 UART: [state] CFI Enabled
3,177,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,078 UART: [rt]cmd =0x52435458, len=8
3,208,900 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,656 UART: [state] LifecycleState = Unprovisioned
86,311 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
893,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,947 UART: [kat] ++
898,099 UART: [kat] sha1
902,365 UART: [kat] SHA2-256
904,305 UART: [kat] SHA2-384
907,216 UART: [kat] SHA2-512-ACC
909,117 UART: [kat] ECC-384
918,836 UART: [kat] HMAC-384Kdf
923,414 UART: [kat] LMS
1,171,742 UART: [kat] --
1,172,491 UART: [cold-reset] ++
1,172,973 UART: [fht] FHT @ 0x50003400
1,175,694 UART: [idev] ++
1,175,862 UART: [idev] CDI.KEYID = 6
1,176,222 UART: [idev] SUBJECT.KEYID = 7
1,176,646 UART: [idev] UDS.KEYID = 0
1,176,991 ready_for_fw is high
1,176,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,692 UART: [idev] Erasing UDS.KEYID = 0
1,201,733 UART: [idev] Sha1 KeyId Algorithm
1,210,269 UART: [idev] --
1,211,537 UART: [ldev] ++
1,211,705 UART: [ldev] CDI.KEYID = 6
1,212,068 UART: [ldev] SUBJECT.KEYID = 5
1,212,494 UART: [ldev] AUTHORITY.KEYID = 7
1,212,957 UART: [ldev] FE.KEYID = 1
1,217,971 UART: [ldev] Erasing FE.KEYID = 1
1,243,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,126 UART: [fwproc] Wait for Commands...
1,283,922 UART: [fwproc] Recv command 0x46574c44
1,284,650 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,087 >>> mbox cmd response: success
2,829,087 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,830,261 UART: [afmc] ++
2,830,429 UART: [afmc] CDI.KEYID = 6
2,830,791 UART: [afmc] SUBJECT.KEYID = 7
2,831,216 UART: [afmc] AUTHORITY.KEYID = 5
2,866,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,890 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,347 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,230 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,931 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,837 UART: [afmc] --
2,909,727 UART: [cold-reset] --
2,910,523 UART: [state] Locking Datavault
2,911,708 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,312 UART: [state] Locking ICCM
2,912,832 UART: [exit] Launching FMC @ 0x40000130
2,918,162 UART:
2,918,178 UART: Running Caliptra FMC ...
2,918,586 UART:
2,918,640 UART: [state] CFI Enabled
2,928,620 UART: [fht] FMC Alias Private Key: 7
3,046,556 UART: [art] Extend RT PCRs Done
3,046,984 UART: [art] Lock RT PCRs Done
3,048,832 UART: [art] Populate DV Done
3,056,981 UART: [fht] FMC Alias Private Key: 7
3,058,145 UART: [art] Derive CDI
3,058,425 UART: [art] Store in slot 0x4
3,144,368 UART: [art] Derive Key Pair
3,144,728 UART: [art] Store priv key in slot 0x5
3,158,312 UART: [art] Derive Key Pair - Done
3,173,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,334 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,099 UART: [art] PUB.X = 1A7C94093C3DE8A6470B5F8E14CF18A77A1872D063DEAAC672E31F479BBBE6BE2EDBC61759058C76856E7F418FB5CFC1
3,195,876 UART: [art] PUB.Y = FBF2FBA5DFAE6DFA51FE347EE4D31799BFBDAA8A14084053E515B1D443D116C80783B63A180DDEBC0BF3F7CD2D4B3E85
3,202,842 UART: [art] SIG.R = 28B68C15A25E94B49B4DFDFDB034265D059633BDB56EC5DCD1E71C6BF2F8DAE3B0F16EF4502C424E7F8D3E8EFCE77C07
3,209,630 UART: [art] SIG.S = F8E285FEBAA13FEDB7E4F3ADF86D9FA256183FE5ECC8E8AAEBFA34E05EFFFC69CDA3BE8D01A993BDDF37746574BC0D0F
3,233,453 UART: Caliptra RT
3,233,704 UART: [state] CFI Enabled
3,353,285 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,913 UART: [rt]cmd =0x52435458, len=8
3,385,097 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,067 ready_for_fw is high
1,060,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,846 >>> mbox cmd response: success
2,678,846 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,611 UART:
2,740,627 UART: Running Caliptra FMC ...
2,741,035 UART:
2,741,089 UART: [state] CFI Enabled
2,751,601 UART: [fht] FMC Alias Private Key: 7
2,870,407 UART: [art] Extend RT PCRs Done
2,870,835 UART: [art] Lock RT PCRs Done
2,872,471 UART: [art] Populate DV Done
2,880,802 UART: [fht] FMC Alias Private Key: 7
2,881,958 UART: [art] Derive CDI
2,882,238 UART: [art] Store in slot 0x4
2,968,203 UART: [art] Derive Key Pair
2,968,563 UART: [art] Store priv key in slot 0x5
2,981,347 UART: [art] Derive Key Pair - Done
2,995,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,448 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,213 UART: [art] PUB.X = BD3B4122A2EA04732AE6B3B478DEBF6326491C72BEE6A88765896489A33C3207DABE4B337463B3456C5F6062A883E736
3,018,977 UART: [art] PUB.Y = AF1ACAF1332294D9267B77C9C6FB2A586B82FFEF1847788BF4734DAE306E5176934AB33BD01AD8CBDB0ACD4E7CFB9DF5
3,025,948 UART: [art] SIG.R = 4C813D1E333C03B4FD0EDA2116C452C517FDCA089047BD26DCC5E440CEE4A49DDB3851DCDDF7731A41F92FB2437B80A4
3,032,727 UART: [art] SIG.S = A2DF65EA3241C223856C1972B601F907C020AA9EE30BCD89EE5C42F22395DB28AD3B2367860ABD3F1A06B67568C59543
3,056,544 UART: Caliptra RT
3,056,795 UART: [state] CFI Enabled
3,175,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,438 UART: [rt]cmd =0x52435458, len=8
3,207,374 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,099 UART: [state] LifecycleState = Unprovisioned
86,754 UART: [state] DebugLocked = No
87,324 UART: [state] WD Timer not started. Device not locked for debugging
88,577 UART: [kat] SHA2-256
894,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,352 UART: [kat] ++
898,504 UART: [kat] sha1
902,520 UART: [kat] SHA2-256
904,460 UART: [kat] SHA2-384
907,327 UART: [kat] SHA2-512-ACC
909,228 UART: [kat] ECC-384
919,183 UART: [kat] HMAC-384Kdf
923,853 UART: [kat] LMS
1,172,181 UART: [kat] --
1,173,092 UART: [cold-reset] ++
1,173,664 UART: [fht] FHT @ 0x50003400
1,176,363 UART: [idev] ++
1,176,531 UART: [idev] CDI.KEYID = 6
1,176,891 UART: [idev] SUBJECT.KEYID = 7
1,177,315 UART: [idev] UDS.KEYID = 0
1,177,660 ready_for_fw is high
1,177,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,577 UART: [idev] Erasing UDS.KEYID = 0
1,203,590 UART: [idev] Sha1 KeyId Algorithm
1,212,022 UART: [idev] --
1,213,292 UART: [ldev] ++
1,213,460 UART: [ldev] CDI.KEYID = 6
1,213,823 UART: [ldev] SUBJECT.KEYID = 5
1,214,249 UART: [ldev] AUTHORITY.KEYID = 7
1,214,712 UART: [ldev] FE.KEYID = 1
1,219,948 UART: [ldev] Erasing FE.KEYID = 1
1,247,007 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,260,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,266,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,272,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,928 UART: [ldev] --
1,286,275 UART: [fwproc] Wait for Commands...
1,286,883 UART: [fwproc] Recv command 0x46574c44
1,287,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,065 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,235 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,400 >>> mbox cmd response: success
2,829,400 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,830,574 UART: [afmc] ++
2,830,742 UART: [afmc] CDI.KEYID = 6
2,831,104 UART: [afmc] SUBJECT.KEYID = 7
2,831,529 UART: [afmc] AUTHORITY.KEYID = 5
2,867,288 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,041 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,789 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,498 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,381 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,096 UART: [afmc] --
2,911,096 UART: [cold-reset] --
2,911,822 UART: [state] Locking Datavault
2,912,769 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,373 UART: [state] Locking ICCM
2,913,981 UART: [exit] Launching FMC @ 0x40000130
2,919,311 UART:
2,919,327 UART: Running Caliptra FMC ...
2,919,735 UART:
2,919,878 UART: [state] CFI Enabled
2,930,592 UART: [fht] FMC Alias Private Key: 7
3,049,902 UART: [art] Extend RT PCRs Done
3,050,330 UART: [art] Lock RT PCRs Done
3,051,930 UART: [art] Populate DV Done
3,060,151 UART: [fht] FMC Alias Private Key: 7
3,061,145 UART: [art] Derive CDI
3,061,425 UART: [art] Store in slot 0x4
3,147,394 UART: [art] Derive Key Pair
3,147,754 UART: [art] Store priv key in slot 0x5
3,160,706 UART: [art] Derive Key Pair - Done
3,175,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,162 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,927 UART: [art] PUB.X = EDE4092C620FE115769A03FC509FA2DB727DE7367698D0109099DE8ABE057B5C1E34AFEF7FE3795060EC0A7F8464C1B7
3,197,692 UART: [art] PUB.Y = 939A7FDF4802F298259E212E8E3312EE69B92357923D584F4E99961684ADA1C985E95F9CF9FFA02BC9ECED7286187C2F
3,204,643 UART: [art] SIG.R = 518B4F8C8D5ABF3A2F058BD0372C5FDC50522F3C4240142F462324906153D745D808B9F8C7F265045E804120C9D34E8B
3,211,400 UART: [art] SIG.S = A532D53BC9AD200516DEA94AF74B7B309C223AD80C81B03E3EE9C64905801DB33C4A2F09E1ADEEAF9AC458D0B77F6080
3,235,360 UART: Caliptra RT
3,235,703 UART: [state] CFI Enabled
3,354,294 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,834 UART: [rt]cmd =0x52435458, len=8
3,385,730 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,028 ready_for_fw is high
1,061,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,745 >>> mbox cmd response: success
2,678,745 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,741,016 UART:
2,741,032 UART: Running Caliptra FMC ...
2,741,440 UART:
2,741,583 UART: [state] CFI Enabled
2,752,333 UART: [fht] FMC Alias Private Key: 7
2,871,483 UART: [art] Extend RT PCRs Done
2,871,911 UART: [art] Lock RT PCRs Done
2,873,581 UART: [art] Populate DV Done
2,881,956 UART: [fht] FMC Alias Private Key: 7
2,883,022 UART: [art] Derive CDI
2,883,302 UART: [art] Store in slot 0x4
2,969,001 UART: [art] Derive Key Pair
2,969,361 UART: [art] Store priv key in slot 0x5
2,982,533 UART: [art] Derive Key Pair - Done
2,997,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,605 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,370 UART: [art] PUB.X = 937302BE33036B38485D40735E8C08AF341E5A01045784F511962EE44F15D5E5A9CFD1A18BDE0122A150EC4296DE4E77
3,020,120 UART: [art] PUB.Y = 1A29999A6EAE5F22DA0D2BEFF75FFA8331A25C334BD117532EB572B9774FEDB045A7D857DBFC1E7832A7CCDB7FA313C9
3,027,089 UART: [art] SIG.R = 7C64CC09C035E51CF97818172447FE6A7F55278C056F025B172D530063C2C1CC5B536723C578462B8590C3E05CFF0E3C
3,033,821 UART: [art] SIG.S = 5CBDBD5E1E721B2A458FA912E33B01AE659296A3916E57EB9F2E148D57BC1EAA2E4E2B360AFA7E0FEFA092B4661576F2
3,057,892 UART: Caliptra RT
3,058,235 UART: [state] CFI Enabled
3,177,843 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,591 UART: [rt]cmd =0x52435458, len=8
3,209,569 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_greater_than_max ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,008 UART:
192,393 UART: Running Caliptra ROM ...
193,495 UART:
193,641 UART: [state] CFI Enabled
264,347 UART: [state] LifecycleState = Unprovisioned
266,341 UART: [state] DebugLocked = No
269,303 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,100 UART: [kat] SHA2-256
443,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,289 UART: [kat] ++
454,737 UART: [kat] sha1
465,613 UART: [kat] SHA2-256
468,266 UART: [kat] SHA2-384
474,255 UART: [kat] SHA2-512-ACC
476,634 UART: [kat] ECC-384
2,770,658 UART: [kat] HMAC-384Kdf
2,801,504 UART: [kat] LMS
3,991,850 UART: [kat] --
3,995,436 UART: [cold-reset] ++
3,996,666 UART: [fht] Storing FHT @ 0x50003400
4,009,706 UART: [idev] ++
4,010,278 UART: [idev] CDI.KEYID = 6
4,011,327 UART: [idev] SUBJECT.KEYID = 7
4,012,511 UART: [idev] UDS.KEYID = 0
4,013,556 ready_for_fw is high
4,013,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,801 UART: [idev] Erasing UDS.KEYID = 0
7,348,832 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,448 UART: [idev] --
7,376,359 UART: [ldev] ++
7,376,969 UART: [ldev] CDI.KEYID = 6
7,377,890 UART: [ldev] SUBJECT.KEYID = 5
7,379,112 UART: [ldev] AUTHORITY.KEYID = 7
7,380,350 UART: [ldev] FE.KEYID = 1
7,423,292 UART: [ldev] Erasing FE.KEYID = 1
10,757,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,244 UART: [ldev] --
13,137,439 UART: [fwproc] Waiting for Commands...
13,139,097 UART: [fwproc] Received command 0x46574c44
13,141,297 UART: [fwproc] Received Image of size 118548 bytes
17,243,534 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,721 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,933 >>> mbox cmd response: success
17,721,295 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,723,509 UART: [afmc] ++
17,724,156 UART: [afmc] CDI.KEYID = 6
17,725,037 UART: [afmc] SUBJECT.KEYID = 7
17,726,311 UART: [afmc] AUTHORITY.KEYID = 5
21,097,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,943 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,338 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,924 UART: [afmc] --
23,465,230 UART: [cold-reset] --
23,469,098 UART: [state] Locking Datavault
23,475,591 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,355 UART: [state] Locking ICCM
23,479,368 UART: [exit] Launching FMC @ 0x40000130
23,487,761 UART:
23,487,997 UART: Running Caliptra FMC ...
23,489,021 UART:
23,489,175 UART: [state] CFI Enabled
23,552,967 UART: [fht] FMC Alias Private Key: 7
25,892,928 UART: [art] Extend RT PCRs Done
25,894,156 UART: [art] Lock RT PCRs Done
25,895,670 UART: [art] Populate DV Done
25,901,032 UART: [fht] FMC Alias Private Key: 7
25,902,516 UART: [art] Derive CDI
25,903,279 UART: [art] Store in slot 0x4
25,962,023 UART: [art] Derive Key Pair
25,963,068 UART: [art] Store priv key in slot 0x5
29,255,529 UART: [art] Derive Key Pair - Done
29,268,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,845 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,363 UART: [art] PUB.X = 2B08FB260477D214EF56C4FD9F3CD23268930AA8555BBFA367F33EDC8DBF76ECEF703AD4ED65396547B127907514BD91
31,565,660 UART: [art] PUB.Y = 003D1E3F475F58FD6D0F7EF8F477ED11FEE063E8618DB6637B40A74CEE62A1AD538B9DD38E537C737395449687624EEF
31,572,892 UART: [art] SIG.R = 141571FEEB28905E7103DCA0EC94E8AEEE8C5CB700355A2D3ACC2AB266E07F8C136C6AF7D8B6FFA3D330216DCCB9C882
31,580,281 UART: [art] SIG.S = C4E2561472FC15C6F416547285290953F71538BEDDAF0D71D348347A7C303CD07B7E74C98A3BE4F4C99DDA8D8840A330
32,885,581 UART: Caliptra RT
32,886,316 UART: [state] CFI Enabled
33,082,000 UART: [rt] RT listening for mailbox commands...
33,113,325 UART: [rt]cmd =0x52435458, len=8
33,114,940 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,784,894 ready_for_fw is high
3,785,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,668 >>> mbox cmd response: success
17,965,110 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,649,075 UART:
23,649,458 UART: Running Caliptra FMC ...
23,650,653 UART:
23,650,819 UART: [state] CFI Enabled
23,720,294 UART: [fht] FMC Alias Private Key: 7
26,060,740 UART: [art] Extend RT PCRs Done
26,061,959 UART: [art] Lock RT PCRs Done
26,063,395 UART: [art] Populate DV Done
26,068,977 UART: [fht] FMC Alias Private Key: 7
26,070,627 UART: [art] Derive CDI
26,071,441 UART: [art] Store in slot 0x4
26,128,998 UART: [art] Derive Key Pair
26,130,043 UART: [art] Store priv key in slot 0x5
29,423,088 UART: [art] Derive Key Pair - Done
29,436,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,734 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,244 UART: [art] PUB.X = E03A330ACAEE9CB2AB5EDD408CC4DB264643D997F79BB6E30E297CA84F0B98E395DE8053A527A9DB3D5F7D9F349AEA43
31,733,541 UART: [art] PUB.Y = B87DC0FCF19AC03525C7A3248E45541315DB1ACE6A4221160812A5042EECD717CA1C680B1A0AC927ABE1F6B34FEFD359
31,740,786 UART: [art] SIG.R = 6BDB2ACA9350D33DECC129F8ED3DFB78AEB55F9EC6C5465AAE9D4C81E57827039920E73124530E98BB23C1E45E6FF46B
31,748,185 UART: [art] SIG.S = D4A40D0345EEA5C99829D1B9B37AE8F7341DC904E91749479BD95904347BBEF373C0A072F42FFBA37A970E7946B075AD
33,053,382 UART: Caliptra RT
33,054,088 UART: [state] CFI Enabled
33,231,691 UART: [rt] RT listening for mailbox commands...
33,263,183 UART: [rt]cmd =0x52435458, len=8
33,264,532 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,307 writing to cptra_bootfsm_go
193,497 UART:
193,839 UART: Running Caliptra ROM ...
194,927 UART:
604,548 UART: [state] CFI Enabled
621,491 UART: [state] LifecycleState = Unprovisioned
623,428 UART: [state] DebugLocked = No
624,948 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,458 UART: [kat] SHA2-256
799,186 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,756 UART: [kat] ++
810,303 UART: [kat] sha1
822,244 UART: [kat] SHA2-256
824,964 UART: [kat] SHA2-384
830,236 UART: [kat] SHA2-512-ACC
832,596 UART: [kat] ECC-384
3,117,401 UART: [kat] HMAC-384Kdf
3,130,855 UART: [kat] LMS
4,320,935 UART: [kat] --
4,326,068 UART: [cold-reset] ++
4,327,865 UART: [fht] Storing FHT @ 0x50003400
4,340,125 UART: [idev] ++
4,340,687 UART: [idev] CDI.KEYID = 6
4,341,661 UART: [idev] SUBJECT.KEYID = 7
4,342,899 UART: [idev] UDS.KEYID = 0
4,343,875 ready_for_fw is high
4,344,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,949 UART: [idev] Erasing UDS.KEYID = 0
7,629,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,838 UART: [idev] --
7,654,399 UART: [ldev] ++
7,654,974 UART: [ldev] CDI.KEYID = 6
7,655,939 UART: [ldev] SUBJECT.KEYID = 5
7,657,142 UART: [ldev] AUTHORITY.KEYID = 7
7,658,369 UART: [ldev] FE.KEYID = 1
7,668,575 UART: [ldev] Erasing FE.KEYID = 1
10,959,661 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,182 UART: [ldev] --
13,320,417 UART: [fwproc] Waiting for Commands...
13,322,688 UART: [fwproc] Received command 0x46574c44
13,324,924 UART: [fwproc] Received Image of size 118548 bytes
17,431,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,662 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,800 >>> mbox cmd response: success
17,909,926 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,912,288 UART: [afmc] ++
17,912,919 UART: [afmc] CDI.KEYID = 6
17,913,821 UART: [afmc] SUBJECT.KEYID = 7
17,915,085 UART: [afmc] AUTHORITY.KEYID = 5
21,229,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,489 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,904 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,628 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,033 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,167 UART: [afmc] --
23,593,509 UART: [cold-reset] --
23,597,044 UART: [state] Locking Datavault
23,601,804 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,597 UART: [state] Locking ICCM
23,606,320 UART: [exit] Launching FMC @ 0x40000130
23,614,715 UART:
23,614,954 UART: Running Caliptra FMC ...
23,616,048 UART:
23,616,211 UART: [state] CFI Enabled
23,624,198 UART: [fht] FMC Alias Private Key: 7
25,963,976 UART: [art] Extend RT PCRs Done
25,965,238 UART: [art] Lock RT PCRs Done
25,966,784 UART: [art] Populate DV Done
25,972,348 UART: [fht] FMC Alias Private Key: 7
25,974,061 UART: [art] Derive CDI
25,974,799 UART: [art] Store in slot 0x4
26,017,593 UART: [art] Derive Key Pair
26,018,637 UART: [art] Store priv key in slot 0x5
29,259,909 UART: [art] Derive Key Pair - Done
29,272,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,983 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,482 UART: [art] PUB.X = 738B5B0DA2CDADA1E9A4B112716D83063C352548F2152686FF2F08B583FCA6DF1F54249AD7CC203C245E0D4BE976E2FC
31,561,781 UART: [art] PUB.Y = 90CC59F88FF5A8A945C468A84B8F3B33EA4B23A8CB15654257D66E098CA0820961AC67D582639326FFBBE3BD679E592C
31,569,056 UART: [art] SIG.R = EA103EA274721FD1A9C892CF681EE91C080B41A251D20CD88B63C5B7328218F08828D39A0790B2432DBD579C96092100
31,576,378 UART: [art] SIG.S = 5811BA26B6117FCABAD44C137EBE3450F733D050C2EBBDCE6E0D16E746B44903B01C232F5BBC7F710280B0DC8A691A88
32,881,794 UART: Caliptra RT
32,882,503 UART: [state] CFI Enabled
33,014,809 UART: [rt] RT listening for mailbox commands...
33,046,278 UART: [rt]cmd =0x52435458, len=8
33,047,601 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,130,071 ready_for_fw is high
4,130,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,175,831 >>> mbox cmd response: success
18,177,099 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,817,656 UART:
23,818,200 UART: Running Caliptra FMC ...
23,819,415 UART:
23,819,581 UART: [state] CFI Enabled
23,827,392 UART: [fht] FMC Alias Private Key: 7
26,167,237 UART: [art] Extend RT PCRs Done
26,168,470 UART: [art] Lock RT PCRs Done
26,169,702 UART: [art] Populate DV Done
26,175,026 UART: [fht] FMC Alias Private Key: 7
26,176,621 UART: [art] Derive CDI
26,177,355 UART: [art] Store in slot 0x4
26,220,552 UART: [art] Derive Key Pair
26,221,593 UART: [art] Store priv key in slot 0x5
29,463,475 UART: [art] Derive Key Pair - Done
29,476,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,756,544 UART: [art] Erasing AUTHORITY.KEYID = 7
31,758,039 UART: [art] PUB.X = BB336C5D57FB0DCFEE3D92AD9F558A6006022663B6C9EEC8D8440523A64C78EAE274C2F404454C94CCE74F56A15D3BFB
31,765,349 UART: [art] PUB.Y = F1D277039BDA89AC64760C7DE315A7252A1A1932976C6B828EAB12AF8DC5647A4C38D79A0053E3990CC59849DF6FF40B
31,772,589 UART: [art] SIG.R = 0AE16BE51AD9EA42DA478082B026A4920DC24C9C49D0E21E29221055FDDD098E5349B49C794BCDF1F95FAF7127770013
31,779,982 UART: [art] SIG.S = C3234FE17B8B7711169EBA1C26FCC077F29FE561D5EFB2530AC97A95B2AEB6C336666967BFED0AE26F0A6005772E465C
33,085,852 UART: Caliptra RT
33,086,564 UART: [state] CFI Enabled
33,221,090 UART: [rt] RT listening for mailbox commands...
33,252,562 UART: [rt]cmd =0x52435458, len=8
33,253,845 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
192,200 UART:
192,568 UART: Running Caliptra ROM ...
193,689 UART:
193,831 UART: [state] CFI Enabled
264,592 UART: [state] LifecycleState = Unprovisioned
266,568 UART: [state] DebugLocked = No
268,237 UART: [state] WD Timer not started. Device not locked for debugging
272,981 UART: [kat] SHA2-256
452,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,368 UART: [kat] ++
463,844 UART: [kat] sha1
474,855 UART: [kat] SHA2-256
477,497 UART: [kat] SHA2-384
482,841 UART: [kat] SHA2-512-ACC
485,210 UART: [kat] ECC-384
2,950,727 UART: [kat] HMAC-384Kdf
2,971,690 UART: [kat] LMS
3,448,175 UART: [kat] --
3,452,453 UART: [cold-reset] ++
3,454,380 UART: [fht] FHT @ 0x50003400
3,467,407 UART: [idev] ++
3,467,970 UART: [idev] CDI.KEYID = 6
3,468,929 UART: [idev] SUBJECT.KEYID = 7
3,470,165 UART: [idev] UDS.KEYID = 0
3,471,084 ready_for_fw is high
3,471,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,422 UART: [idev] Erasing UDS.KEYID = 0
5,988,555 UART: [idev] Sha1 KeyId Algorithm
6,011,151 UART: [idev] --
6,017,414 UART: [ldev] ++
6,018,046 UART: [ldev] CDI.KEYID = 6
6,018,932 UART: [ldev] SUBJECT.KEYID = 5
6,020,146 UART: [ldev] AUTHORITY.KEYID = 7
6,021,376 UART: [ldev] FE.KEYID = 1
6,059,168 UART: [ldev] Erasing FE.KEYID = 1
8,565,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,211 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,313 UART: [ldev] --
10,374,578 UART: [fwproc] Wait for Commands...
10,376,828 UART: [fwproc] Recv command 0x46574c44
10,378,803 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,388 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,140 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,043 >>> mbox cmd response: success
14,341,237 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,343,873 UART: [afmc] ++
14,344,473 UART: [afmc] CDI.KEYID = 6
14,345,355 UART: [afmc] SUBJECT.KEYID = 7
14,346,621 UART: [afmc] AUTHORITY.KEYID = 5
16,873,857 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,597,182 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,422 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,615,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,261 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,865 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,256 UART: [afmc] --
18,675,377 UART: [cold-reset] --
18,678,805 UART: [state] Locking Datavault
18,685,440 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,207 UART: [state] Locking ICCM
18,688,277 UART: [exit] Launching FMC @ 0x40000130
18,696,725 UART:
18,696,955 UART: Running Caliptra FMC ...
18,698,049 UART:
18,698,212 UART: [state] CFI Enabled
18,752,846 UART: [fht] FMC Alias Private Key: 7
20,518,935 UART: [art] Extend RT PCRs Done
20,520,150 UART: [art] Lock RT PCRs Done
20,521,709 UART: [art] Populate DV Done
20,527,009 UART: [fht] FMC Alias Private Key: 7
20,528,493 UART: [art] Derive CDI
20,529,249 UART: [art] Store in slot 0x4
20,586,141 UART: [art] Derive Key Pair
20,587,134 UART: [art] Store priv key in slot 0x5
23,049,848 UART: [art] Derive Key Pair - Done
23,062,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,176 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,680 UART: [art] PUB.X = 91841D404EE309AC67A17E41E980E9DB9BDF6F730EA82B827748186CAA07F03C7DC06FCC4934BEC72A136ABD0D030786
24,784,969 UART: [art] PUB.Y = 8F6D1FDDF4FB8C66F54005D50F2394839A806B9EF422BFAA9851EC48391ECDA29FA17B9EA207257370FA17C5987E22CB
24,792,249 UART: [art] SIG.R = 68C92BF7B55265F7E3FE35087741E77ED569494EE40BEF3D7F41B01E92A4634393D3DE9433D9331CE296F3C47728B11C
24,799,633 UART: [art] SIG.S = EFCCF78A89FB821F6DBEA80DF98D763AD967682AAF11ECF650667FC531A3343B7AE7DE045636B82E7ED0262580AD4382
25,779,205 UART: Caliptra RT
25,779,898 UART: [state] CFI Enabled
25,958,987 UART: [rt] RT listening for mailbox commands...
25,990,256 UART: [rt]cmd =0x52435458, len=8
25,991,593 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,460,684 ready_for_fw is high
3,461,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,226,797 >>> mbox cmd response: success
14,227,971 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,515,005 UART:
18,515,402 UART: Running Caliptra FMC ...
18,516,504 UART:
18,516,655 UART: [state] CFI Enabled
18,583,587 UART: [fht] FMC Alias Private Key: 7
20,349,418 UART: [art] Extend RT PCRs Done
20,350,644 UART: [art] Lock RT PCRs Done
20,352,294 UART: [art] Populate DV Done
20,357,605 UART: [fht] FMC Alias Private Key: 7
20,359,308 UART: [art] Derive CDI
20,360,040 UART: [art] Store in slot 0x4
20,415,855 UART: [art] Derive Key Pair
20,416,853 UART: [art] Store priv key in slot 0x5
22,879,669 UART: [art] Derive Key Pair - Done
22,892,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,561 UART: [art] PUB.X = 7D33E587864F0256C05BD05BF4ED3D5A3AA85B317CCF2AB156DBB628BAE1CFA750C66B0AFE0E1F27263DC922896C0F24
24,613,812 UART: [art] PUB.Y = 1A93A8B8C98551AEF5D921429987FCA65F4DEB9C539CA99A6B09233712B4153F0803A312AFC910FFFCF74EEEF8FBDE69
24,621,099 UART: [art] SIG.R = 88A6A4021E1AAD9D1EF503F6655DA5ED6A9C19D26F71D1101B016BA11134C577EDD64D9B7BA631DF3E7387215E7FEDA4
24,628,507 UART: [art] SIG.S = C5C6582A57FC419FADA337C82306196178103BC1C3CF8030679D4A17F72A7A075CB3BA7273CFEFCCE8094FF3271F0654
25,606,835 UART: Caliptra RT
25,607,551 UART: [state] CFI Enabled
25,787,124 UART: [rt] RT listening for mailbox commands...
25,818,603 UART: [rt]cmd =0x52435458, len=8
25,819,942 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,020 writing to cptra_bootfsm_go
193,178 UART:
193,549 UART: Running Caliptra ROM ...
194,659 UART:
604,476 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,264 UART: [state] DebugLocked = No
621,365 UART: [state] WD Timer not started. Device not locked for debugging
625,255 UART: [kat] SHA2-256
804,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,746 UART: [kat] ++
816,205 UART: [kat] sha1
826,041 UART: [kat] SHA2-256
828,715 UART: [kat] SHA2-384
835,418 UART: [kat] SHA2-512-ACC
837,787 UART: [kat] ECC-384
3,279,337 UART: [kat] HMAC-384Kdf
3,291,562 UART: [kat] LMS
3,768,094 UART: [kat] --
3,774,079 UART: [cold-reset] ++
3,775,373 UART: [fht] FHT @ 0x50003400
3,788,052 UART: [idev] ++
3,788,628 UART: [idev] CDI.KEYID = 6
3,789,542 UART: [idev] SUBJECT.KEYID = 7
3,790,790 UART: [idev] UDS.KEYID = 0
3,791,812 ready_for_fw is high
3,792,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,500 UART: [idev] Erasing UDS.KEYID = 0
6,265,028 UART: [idev] Sha1 KeyId Algorithm
6,289,339 UART: [idev] --
6,293,335 UART: [ldev] ++
6,293,908 UART: [ldev] CDI.KEYID = 6
6,294,872 UART: [ldev] SUBJECT.KEYID = 5
6,296,034 UART: [ldev] AUTHORITY.KEYID = 7
6,297,327 UART: [ldev] FE.KEYID = 1
6,309,970 UART: [ldev] Erasing FE.KEYID = 1
8,791,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,495 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,527 UART: [ldev] --
10,584,779 UART: [fwproc] Wait for Commands...
10,587,687 UART: [fwproc] Recv command 0x46574c44
10,589,671 UART: [fwproc] Recv'd Img size: 118548 bytes
14,083,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,021 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,952 >>> mbox cmd response: success
14,559,390 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,562,789 UART: [afmc] ++
14,563,404 UART: [afmc] CDI.KEYID = 6
14,564,291 UART: [afmc] SUBJECT.KEYID = 7
14,565,507 UART: [afmc] AUTHORITY.KEYID = 5
17,065,931 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,670 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,714 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,754 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,294 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,236 UART: [afmc] --
18,869,555 UART: [cold-reset] --
18,875,253 UART: [state] Locking Datavault
18,880,499 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,239 UART: [state] Locking ICCM
18,884,262 UART: [exit] Launching FMC @ 0x40000130
18,892,662 UART:
18,892,899 UART: Running Caliptra FMC ...
18,893,997 UART:
18,894,157 UART: [state] CFI Enabled
18,902,094 UART: [fht] FMC Alias Private Key: 7
20,668,293 UART: [art] Extend RT PCRs Done
20,669,518 UART: [art] Lock RT PCRs Done
20,671,321 UART: [art] Populate DV Done
20,676,680 UART: [fht] FMC Alias Private Key: 7
20,678,220 UART: [art] Derive CDI
20,679,038 UART: [art] Store in slot 0x4
20,721,153 UART: [art] Derive Key Pair
20,722,193 UART: [art] Store priv key in slot 0x5
23,149,183 UART: [art] Derive Key Pair - Done
23,162,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,639 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,137 UART: [art] PUB.X = 4077EAD92426358B0361E3B7725CED98C254BCB6F3D3737B2129406ECB852DF5713871B5F33C2B3E926293677C1E8951
24,877,388 UART: [art] PUB.Y = 791AF639D8A380BBDDE016E952712F076D746E58FBBF4ACF199F4B11869BBD1DC63B751FD998DCFDE2586967B2B38695
24,884,693 UART: [art] SIG.R = 243C730F1286E2418F744A64CFBD4BAD3FE4E40A9F523892FB6FF662A6F80489707E20A559714021375F5E198FD1BB46
24,892,044 UART: [art] SIG.S = F9FF3A181D2C7B3984A6FDDFA2DB910826EA055E545C17BA10094A5CEC0E65F46F8E2308D97983EE61BD2D4DC32189C5
25,871,285 UART: Caliptra RT
25,871,987 UART: [state] CFI Enabled
26,005,544 UART: [rt] RT listening for mailbox commands...
26,037,039 UART: [rt]cmd =0x52435458, len=8
26,038,337 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,782,863 ready_for_fw is high
3,783,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,334 >>> mbox cmd response: success
14,447,803 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,698,732 UART:
18,699,120 UART: Running Caliptra FMC ...
18,700,276 UART:
18,700,443 UART: [state] CFI Enabled
18,708,386 UART: [fht] FMC Alias Private Key: 7
20,474,498 UART: [art] Extend RT PCRs Done
20,475,727 UART: [art] Lock RT PCRs Done
20,477,412 UART: [art] Populate DV Done
20,483,158 UART: [fht] FMC Alias Private Key: 7
20,484,810 UART: [art] Derive CDI
20,485,629 UART: [art] Store in slot 0x4
20,528,874 UART: [art] Derive Key Pair
20,529,910 UART: [art] Store priv key in slot 0x5
22,957,595 UART: [art] Derive Key Pair - Done
22,970,533 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,578 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,075 UART: [art] PUB.X = E40622EC290095E5DDF661A75F4D7469B01B7FD69394410367D1A2DABAD7F387FEE46A78D6459B839222830CE244222A
24,685,332 UART: [art] PUB.Y = 54E2798C9BFBE70B050C62BEA556999ECB128B0E438673433DBBE615DCA180A2969B6D5336EB4A76AA1146841FC72203
24,692,617 UART: [art] SIG.R = 5084FB7FB087AFF34FCC3D8C397EFC4EB2D3604B964F317E6B853EE1A4F65965B22E7F04F002B7C9532917A65497C624
24,699,962 UART: [art] SIG.S = 7D812F9FB564E2812FCC2B9AF78F44556B27560203BA7B8FEEF8331D8292048E4621F0DD57D1F62556254AAD2B682B1F
25,678,715 UART: Caliptra RT
25,679,409 UART: [state] CFI Enabled
25,812,059 UART: [rt] RT listening for mailbox commands...
25,843,402 UART: [rt]cmd =0x52435458, len=8
25,844,969 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,193 UART:
192,553 UART: Running Caliptra ROM ...
193,758 UART:
193,910 UART: [state] CFI Enabled
264,020 UART: [state] LifecycleState = Unprovisioned
266,370 UART: [state] DebugLocked = No
267,550 UART: [state] WD Timer not started. Device not locked for debugging
271,230 UART: [kat] SHA2-256
461,086 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,833 UART: [kat] ++
472,283 UART: [kat] sha1
483,296 UART: [kat] SHA2-256
486,301 UART: [kat] SHA2-384
492,930 UART: [kat] SHA2-512-ACC
495,576 UART: [kat] ECC-384
2,948,949 UART: [kat] HMAC-384Kdf
2,974,956 UART: [kat] LMS
3,506,704 UART: [kat] --
3,510,057 UART: [cold-reset] ++
3,512,412 UART: [fht] FHT @ 0x50003400
3,523,029 UART: [idev] ++
3,523,738 UART: [idev] CDI.KEYID = 6
3,524,716 UART: [idev] SUBJECT.KEYID = 7
3,525,885 UART: [idev] UDS.KEYID = 0
3,527,155 ready_for_fw is high
3,527,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,404 UART: [idev] Erasing UDS.KEYID = 0
6,030,411 UART: [idev] Sha1 KeyId Algorithm
6,052,071 UART: [idev] --
6,056,773 UART: [ldev] ++
6,057,535 UART: [ldev] CDI.KEYID = 6
6,058,432 UART: [ldev] SUBJECT.KEYID = 5
6,059,452 UART: [ldev] AUTHORITY.KEYID = 7
6,060,792 UART: [ldev] FE.KEYID = 1
6,103,843 UART: [ldev] Erasing FE.KEYID = 1
8,609,509 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,219 UART: [ldev] --
10,417,235 UART: [fwproc] Wait for Commands...
10,419,486 UART: [fwproc] Recv command 0x46574c44
10,421,786 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,712 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,770 >>> mbox cmd response: success
14,670,089 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,673,099 UART: [afmc] ++
14,673,786 UART: [afmc] CDI.KEYID = 6
14,674,937 UART: [afmc] SUBJECT.KEYID = 7
14,676,469 UART: [afmc] AUTHORITY.KEYID = 5
17,214,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,643 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,748 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,917 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,769 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,890 UART: [afmc] --
19,015,655 UART: [cold-reset] --
19,020,364 UART: [state] Locking Datavault
19,025,298 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,479 UART: [state] Locking ICCM
19,030,417 UART: [exit] Launching FMC @ 0x40000130
19,039,076 UART:
19,039,326 UART: Running Caliptra FMC ...
19,040,375 UART:
19,040,524 UART: [state] CFI Enabled
19,096,318 UART: [fht] FMC Alias Private Key: 7
20,883,851 UART: [art] Extend RT PCRs Done
20,885,058 UART: [art] Lock RT PCRs Done
20,886,534 UART: [art] Populate DV Done
20,891,995 UART: [fht] FMC Alias Private Key: 7
20,893,585 UART: [art] Derive CDI
20,894,396 UART: [art] Store in slot 0x4
20,950,766 UART: [art] Derive Key Pair
20,951,828 UART: [art] Store priv key in slot 0x5
23,415,228 UART: [art] Derive Key Pair - Done
23,427,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,487 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,986 UART: [art] PUB.X = B570BAA65FFA402643AC5AE6A6EC134665F025B474FD52AAFD8D1C5437C3A05E7D9E4B1BA89A479D40A5F2CB6703C946
25,149,282 UART: [art] PUB.Y = 7FEFDF96C2323DB810656A009730E54960A3B29A43CCC63A6FBEF2A1F8E0FDD690528E4E8DCBA3C55534A471E8C29E5C
25,156,563 UART: [art] SIG.R = D4EA35A5B2CE73D5435C67BD8D454A33FED9FC3AC8A2C1D55C77580616BA1316F95BBD5660ED2856B3F5F69812DFBBEE
25,163,953 UART: [art] SIG.S = CF2C0CBDBC26716546DF7E2AB5E0CCE6206905EA8FB7BC2A1FB0BC71DAB4CCA2CD831DDC564D7C6B920255959F7484AC
26,143,288 UART: Caliptra RT
26,143,971 UART: [state] CFI Enabled
26,324,285 UART: [rt] RT listening for mailbox commands...
26,355,923 UART: [rt]cmd =0x52435458, len=8
26,357,214 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,438,243 ready_for_fw is high
3,438,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,846,394 >>> mbox cmd response: success
14,848,161 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,155,210 UART:
19,155,635 UART: Running Caliptra FMC ...
19,156,833 UART:
19,157,006 UART: [state] CFI Enabled
19,223,878 UART: [fht] FMC Alias Private Key: 7
20,990,073 UART: [art] Extend RT PCRs Done
20,991,311 UART: [art] Lock RT PCRs Done
20,992,566 UART: [art] Populate DV Done
20,998,148 UART: [fht] FMC Alias Private Key: 7
20,999,742 UART: [art] Derive CDI
21,000,556 UART: [art] Store in slot 0x4
21,056,667 UART: [art] Derive Key Pair
21,057,716 UART: [art] Store priv key in slot 0x5
23,520,981 UART: [art] Derive Key Pair - Done
23,533,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,276 UART: [art] Erasing AUTHORITY.KEYID = 7
25,248,782 UART: [art] PUB.X = 7CB972CFF063762958E2F712E471FE141F49750C7149FCE20DE5022DD24B52ED6C525B4591C7D50810398F08C0A82D8A
25,256,051 UART: [art] PUB.Y = 2710D41973F69A2FB9A8890D59E10C83E487E2289AABD05752784B1852963A39E0D8CED42FA41D2C4601BA51CD047440
25,263,271 UART: [art] SIG.R = BE405D14F83A9A4B6B4F0C6FF94CBF3ABB801B9EF5C4A3BFFA9BDE50C1E68B47CADB38A2ED06887118CEC8D1CBD75438
25,270,729 UART: [art] SIG.S = 3946C64AE7CAA17F34797F1DB472195FCE9BF7DFB323B8C5B7D0BE43DA8FCDC4F12D2B3C477234F818188471DF79571B
26,249,489 UART: Caliptra RT
26,250,195 UART: [state] CFI Enabled
26,430,880 UART: [rt] RT listening for mailbox commands...
26,462,072 UART: [rt]cmd =0x52435458, len=8
26,463,396 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,421 UART:
192,783 UART: Running Caliptra ROM ...
193,941 UART:
603,460 UART: [state] CFI Enabled
619,422 UART: [state] LifecycleState = Unprovisioned
621,812 UART: [state] DebugLocked = No
623,137 UART: [state] WD Timer not started. Device not locked for debugging
628,399 UART: [kat] SHA2-256
818,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,066 UART: [kat] ++
829,595 UART: [kat] sha1
841,980 UART: [kat] SHA2-256
844,993 UART: [kat] SHA2-384
850,773 UART: [kat] SHA2-512-ACC
853,364 UART: [kat] ECC-384
3,295,643 UART: [kat] HMAC-384Kdf
3,307,788 UART: [kat] LMS
3,839,649 UART: [kat] --
3,844,559 UART: [cold-reset] ++
3,846,204 UART: [fht] FHT @ 0x50003400
3,858,252 UART: [idev] ++
3,858,889 UART: [idev] CDI.KEYID = 6
3,859,922 UART: [idev] SUBJECT.KEYID = 7
3,861,049 UART: [idev] UDS.KEYID = 0
3,862,138 ready_for_fw is high
3,862,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,196 UART: [idev] Erasing UDS.KEYID = 0
6,338,998 UART: [idev] Sha1 KeyId Algorithm
6,361,440 UART: [idev] --
6,365,109 UART: [ldev] ++
6,365,804 UART: [ldev] CDI.KEYID = 6
6,366,725 UART: [ldev] SUBJECT.KEYID = 5
6,367,888 UART: [ldev] AUTHORITY.KEYID = 7
6,369,122 UART: [ldev] FE.KEYID = 1
6,379,179 UART: [ldev] Erasing FE.KEYID = 1
8,858,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,181 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,359 UART: [ldev] --
10,648,591 UART: [fwproc] Wait for Commands...
10,650,909 UART: [fwproc] Recv command 0x46574c44
10,653,241 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,341 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,456 >>> mbox cmd response: success
14,910,610 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,913,784 UART: [afmc] ++
14,914,482 UART: [afmc] CDI.KEYID = 6
14,915,676 UART: [afmc] SUBJECT.KEYID = 7
14,917,175 UART: [afmc] AUTHORITY.KEYID = 5
17,418,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,945 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,913 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,999 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,126 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,036 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,208,683 UART: [afmc] --
19,212,668 UART: [cold-reset] --
19,216,282 UART: [state] Locking Datavault
19,221,217 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,372 UART: [state] Locking ICCM
19,226,014 UART: [exit] Launching FMC @ 0x40000130
19,234,696 UART:
19,234,937 UART: Running Caliptra FMC ...
19,236,043 UART:
19,236,209 UART: [state] CFI Enabled
19,244,101 UART: [fht] FMC Alias Private Key: 7
21,010,504 UART: [art] Extend RT PCRs Done
21,011,733 UART: [art] Lock RT PCRs Done
21,013,100 UART: [art] Populate DV Done
21,018,685 UART: [fht] FMC Alias Private Key: 7
21,020,173 UART: [art] Derive CDI
21,020,960 UART: [art] Store in slot 0x4
21,063,185 UART: [art] Derive Key Pair
21,064,237 UART: [art] Store priv key in slot 0x5
23,490,619 UART: [art] Derive Key Pair - Done
23,503,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,209,524 UART: [art] Erasing AUTHORITY.KEYID = 7
25,211,028 UART: [art] PUB.X = 66317A7658CB6FD4D1674A5E722A5C249BD03CEACFFFF96B99DDA19D3998C6FA1957776F60B012381A4ABEA7490F0D41
25,218,304 UART: [art] PUB.Y = 8D61EC049DB07353F45AB3F50CC1EDC78EFB0AB4A58907150A7EFBD18D2ED55FA75B1BE41ACD7B46E148CA57AA0C8BAF
25,225,554 UART: [art] SIG.R = DAA4A946D840C99379F2A93F615D1BBCAB28CB3F4C9A265D85208D8FBE2B3A45E580C8DB0650E198F946C28711237834
25,232,965 UART: [art] SIG.S = D00973DFD1036B19491535A78D9883153763BBEBBD1E81A49CAB08071724360745DA7A87D2C932D4D0659BDC074112A4
26,211,680 UART: Caliptra RT
26,212,366 UART: [state] CFI Enabled
26,345,696 UART: [rt] RT listening for mailbox commands...
26,376,892 UART: [rt]cmd =0x52435458, len=8
26,378,396 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,751,775 ready_for_fw is high
3,752,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,038,277 >>> mbox cmd response: success
15,039,521 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,296,898 UART:
19,297,282 UART: Running Caliptra FMC ...
19,298,387 UART:
19,298,541 UART: [state] CFI Enabled
19,306,834 UART: [fht] FMC Alias Private Key: 7
21,072,940 UART: [art] Extend RT PCRs Done
21,074,165 UART: [art] Lock RT PCRs Done
21,075,775 UART: [art] Populate DV Done
21,081,300 UART: [fht] FMC Alias Private Key: 7
21,083,021 UART: [art] Derive CDI
21,083,849 UART: [art] Store in slot 0x4
21,126,564 UART: [art] Derive Key Pair
21,127,566 UART: [art] Store priv key in slot 0x5
23,554,727 UART: [art] Derive Key Pair - Done
23,567,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,752 UART: [art] PUB.X = 3A9C9A9F4B5A0E44604E13891D7DF5ED1754AF87CF7718FE104B1FCAE47CF97C9065ACB8F165F6B9EE419E6BC2174130
25,283,079 UART: [art] PUB.Y = A142EDC0EE5724C4F36320B1AC309A5F91C22AA6C64B6DCDDDE88D1D97B5351EF8A6D5F3BA37BD56FE2AF1A9E06DFBB2
25,290,344 UART: [art] SIG.R = 3C4A79B57A774E665934A82322E08367E871FD342F0FE6AFD6F319B0757F1B1F4B76E45244A49961C2EA33CDC9B6D654
25,297,713 UART: [art] SIG.S = CDD7AB5CCB188013C2CB073B2A145E4DACEF88B680A80802F0204A32276DC964A99D9863B8A1EC5E8955E6D33023F866
26,277,259 UART: Caliptra RT
26,277,973 UART: [state] CFI Enabled
26,409,676 UART: [rt] RT listening for mailbox commands...
26,441,081 UART: [rt]cmd =0x52435458, len=8
26,442,428 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,813 UART: [kat] SHA2-256
892,751 UART: [kat] SHA2-384
895,686 UART: [kat] SHA2-512-ACC
897,587 UART: [kat] ECC-384
903,314 UART: [kat] HMAC-384Kdf
907,928 UART: [kat] LMS
1,476,124 UART: [kat] --
1,477,029 UART: [cold-reset] ++
1,477,399 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 ready_for_fw is high
1,481,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,744 UART: [idev] Erasing UDS.KEYID = 0
1,505,102 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,778 UART: [idev] --
1,514,799 UART: [ldev] ++
1,514,967 UART: [ldev] CDI.KEYID = 6
1,515,330 UART: [ldev] SUBJECT.KEYID = 5
1,515,756 UART: [ldev] AUTHORITY.KEYID = 7
1,516,219 UART: [ldev] FE.KEYID = 1
1,521,577 UART: [ldev] Erasing FE.KEYID = 1
1,547,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,582 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,628 UART: [ldev] --
1,587,101 UART: [fwproc] Waiting for Commands...
1,587,846 UART: [fwproc] Received command 0x46574c44
1,588,637 UART: [fwproc] Received Image of size 118548 bytes
2,932,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,879 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,097 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,532 >>> mbox cmd response: success
3,131,532 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,588 UART: [afmc] ++
3,132,756 UART: [afmc] CDI.KEYID = 6
3,133,118 UART: [afmc] SUBJECT.KEYID = 7
3,133,543 UART: [afmc] AUTHORITY.KEYID = 5
3,168,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,214 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,994 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,703 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,586 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,269 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,209 UART: [afmc] --
3,212,129 UART: [cold-reset] --
3,212,831 UART: [state] Locking Datavault
3,214,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,820 UART: [state] Locking ICCM
3,215,358 UART: [exit] Launching FMC @ 0x40000130
3,220,688 UART:
3,220,704 UART: Running Caliptra FMC ...
3,221,112 UART:
3,221,166 UART: [state] CFI Enabled
3,231,660 UART: [fht] FMC Alias Private Key: 7
3,350,190 UART: [art] Extend RT PCRs Done
3,350,618 UART: [art] Lock RT PCRs Done
3,351,894 UART: [art] Populate DV Done
3,359,999 UART: [fht] FMC Alias Private Key: 7
3,361,051 UART: [art] Derive CDI
3,361,331 UART: [art] Store in slot 0x4
3,447,199 UART: [art] Derive Key Pair
3,447,559 UART: [art] Store priv key in slot 0x5
3,461,174 UART: [art] Derive Key Pair - Done
3,475,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,314 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,079 UART: [art] PUB.X = 8C07B42D622F3EC3C30D6A60BF2DE9331E2561369D4B0170DBDBCC6183672337102DA0599CAC11E19E2A79025686A00E
3,498,836 UART: [art] PUB.Y = 1AF040BCD7908394714FE4AC964BCDC9979BD3DA5F8C866C27DD5732469D1DD0E740BC27292669DFE9FE2FE52D0091CF
3,505,778 UART: [art] SIG.R = AF06B06E524F32E996476A6BE1D3D0091337C32ACEA072B19BF34829FBBDD9C39205E8C087BB12A1C20E17609D510EBC
3,512,543 UART: [art] SIG.S = E52BA2316EAD94F34162F4B0FBB2C12E46BBB7EBE30741047BB75517E239936C9B0FFFED080B256E84307D3A96B36F4D
3,536,988 UART: Caliptra RT
3,537,239 UART: [state] CFI Enabled
3,657,924 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,328 UART: [rt]cmd =0x52435458, len=8
3,689,126 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,613 ready_for_fw is high
1,362,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,068 >>> mbox cmd response: success
2,981,068 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,043,269 UART:
3,043,285 UART: Running Caliptra FMC ...
3,043,693 UART:
3,043,747 UART: [state] CFI Enabled
3,054,071 UART: [fht] FMC Alias Private Key: 7
3,174,141 UART: [art] Extend RT PCRs Done
3,174,569 UART: [art] Lock RT PCRs Done
3,176,211 UART: [art] Populate DV Done
3,184,490 UART: [fht] FMC Alias Private Key: 7
3,185,434 UART: [art] Derive CDI
3,185,714 UART: [art] Store in slot 0x4
3,271,410 UART: [art] Derive Key Pair
3,271,770 UART: [art] Store priv key in slot 0x5
3,284,815 UART: [art] Derive Key Pair - Done
3,299,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,145 UART: [art] PUB.X = 1E410D47F619D858CDC6811BEEB403F5554AB331F11125498DB00A6180538529A7928BB31896CB48F87A76541EBA2E92
3,322,902 UART: [art] PUB.Y = 941E4C956195C8D14564B2BA3AEC26E588B64108CD0E6D83BAB8D12925335DC4E0C533CEEFD08166D22646EE9918D859
3,329,850 UART: [art] SIG.R = D6E2094B25B510C57187133C7B850DBBE3A5F48BA7CC6E707FA02BE06FD5CD4EDE2B8CB909352076DB14C11D61FA8D17
3,336,627 UART: [art] SIG.S = 4D9BBF5240AF542C4ED643234FFA99C5A38AE6600781DD75C4FA94627945C4BA7A63041D2E03FD69EDDE9B590C9887C9
3,360,317 UART: Caliptra RT
3,360,568 UART: [state] CFI Enabled
3,480,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,220 UART: [rt]cmd =0x52435458, len=8
3,512,126 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,912 UART: [kat] SHA2-256
881,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,958 UART: [kat] ++
886,110 UART: [kat] sha1
890,280 UART: [kat] SHA2-256
892,218 UART: [kat] SHA2-384
895,057 UART: [kat] SHA2-512-ACC
896,958 UART: [kat] ECC-384
902,573 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,328 UART: [cold-reset] ++
1,476,714 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 ready_for_fw is high
1,481,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,506,785 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,205 UART: [idev] --
1,516,318 UART: [ldev] ++
1,516,486 UART: [ldev] CDI.KEYID = 6
1,516,849 UART: [ldev] SUBJECT.KEYID = 5
1,517,275 UART: [ldev] AUTHORITY.KEYID = 7
1,517,738 UART: [ldev] FE.KEYID = 1
1,522,826 UART: [ldev] Erasing FE.KEYID = 1
1,548,649 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,799 UART: [ldev] --
1,588,072 UART: [fwproc] Waiting for Commands...
1,588,849 UART: [fwproc] Received command 0x46574c44
1,589,640 UART: [fwproc] Received Image of size 118548 bytes
2,933,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,165 >>> mbox cmd response: success
3,133,165 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,134,375 UART: [afmc] ++
3,134,543 UART: [afmc] CDI.KEYID = 6
3,134,905 UART: [afmc] SUBJECT.KEYID = 7
3,135,330 UART: [afmc] AUTHORITY.KEYID = 5
3,170,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,043 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,532 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,415 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,098 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,808 UART: [afmc] --
3,213,928 UART: [cold-reset] --
3,214,446 UART: [state] Locking Datavault
3,215,473 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,077 UART: [state] Locking ICCM
3,216,637 UART: [exit] Launching FMC @ 0x40000130
3,221,967 UART:
3,221,983 UART: Running Caliptra FMC ...
3,222,391 UART:
3,222,534 UART: [state] CFI Enabled
3,233,070 UART: [fht] FMC Alias Private Key: 7
3,352,262 UART: [art] Extend RT PCRs Done
3,352,690 UART: [art] Lock RT PCRs Done
3,354,318 UART: [art] Populate DV Done
3,362,657 UART: [fht] FMC Alias Private Key: 7
3,363,753 UART: [art] Derive CDI
3,364,033 UART: [art] Store in slot 0x4
3,449,739 UART: [art] Derive Key Pair
3,450,099 UART: [art] Store priv key in slot 0x5
3,463,878 UART: [art] Derive Key Pair - Done
3,478,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,965 UART: [art] PUB.X = 8C0BA31424DBED5EDDFEFD7133941941E407FC69B4DD8F19602A2106D2A2B79F4A082B53E9B910D4A28F590661F0F01E
3,501,730 UART: [art] PUB.Y = 3B2368DBCD29B52F8CF88AEDBDD27E41D3CE373F0B6FBA7042A0B8FDBD500F9447B73D36ADF9E70AFCAEC7418906DFD5
3,508,698 UART: [art] SIG.R = 4D926B9354F4607625BDB2B5297E1354AC6C59A7EFEA2587919F098B31F51774D048EEC84753CC24A21BA608F066C7C5
3,515,462 UART: [art] SIG.S = 865D30D2785A7E30FAEF9BFAC3C012975C0ACDB7085EAF0F57166A4DF0D14613C4E119F19BC18EA414CEBDDD65ADC169
3,538,797 UART: Caliptra RT
3,539,140 UART: [state] CFI Enabled
3,659,204 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,690 UART: [rt]cmd =0x52435458, len=8
3,690,700 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,388 ready_for_fw is high
1,363,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,357 >>> mbox cmd response: success
2,981,357 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,042,594 UART:
3,042,610 UART: Running Caliptra FMC ...
3,043,018 UART:
3,043,161 UART: [state] CFI Enabled
3,053,537 UART: [fht] FMC Alias Private Key: 7
3,172,395 UART: [art] Extend RT PCRs Done
3,172,823 UART: [art] Lock RT PCRs Done
3,174,383 UART: [art] Populate DV Done
3,182,480 UART: [fht] FMC Alias Private Key: 7
3,183,544 UART: [art] Derive CDI
3,183,824 UART: [art] Store in slot 0x4
3,269,330 UART: [art] Derive Key Pair
3,269,690 UART: [art] Store priv key in slot 0x5
3,282,607 UART: [art] Derive Key Pair - Done
3,297,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,238 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,003 UART: [art] PUB.X = AC72D4C02FBA7A8726F7A6B949EC0B219285C25CB055DDCEA4F3C13C7AFB3EA656FBB57775949B14BB2204F88366FFDC
3,320,787 UART: [art] PUB.Y = E45350E45961EA8BEA22D25CFE048DE81D79CA4B5F4165E15C5CBE2A27C09ECBD786F90ECCE98B39D0002ECA55CD11EB
3,327,733 UART: [art] SIG.R = 531DF1A5320132C87EEF7A22F4C9F97602D413FB547D13F97370925F7D1C7A8EF710AA1A3B650F965A8B03A5ADCF994F
3,334,499 UART: [art] SIG.S = 34F53600BF07A5695C7DE0824EBE95BF82A6CE5E971E83FE420B1DB7768C0E6CA52764EC5F9C7DF5F0839F1D6C441C6A
3,358,368 UART: Caliptra RT
3,358,711 UART: [state] CFI Enabled
3,478,058 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,594 UART: [rt]cmd =0x52435458, len=8
3,509,590 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,747 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,850 UART: [kat] SHA2-256
901,790 UART: [kat] SHA2-384
904,741 UART: [kat] SHA2-512-ACC
906,642 UART: [kat] ECC-384
916,473 UART: [kat] HMAC-384Kdf
921,079 UART: [kat] LMS
1,169,391 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,840 UART: [fht] FHT @ 0x50003400
1,173,728 UART: [idev] ++
1,173,896 UART: [idev] CDI.KEYID = 6
1,174,257 UART: [idev] SUBJECT.KEYID = 7
1,174,682 UART: [idev] UDS.KEYID = 0
1,175,028 ready_for_fw is high
1,175,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,945 UART: [idev] Erasing UDS.KEYID = 0
1,199,761 UART: [idev] Sha1 KeyId Algorithm
1,208,831 UART: [idev] --
1,209,852 UART: [ldev] ++
1,210,020 UART: [ldev] CDI.KEYID = 6
1,210,384 UART: [ldev] SUBJECT.KEYID = 5
1,210,811 UART: [ldev] AUTHORITY.KEYID = 7
1,211,274 UART: [ldev] FE.KEYID = 1
1,216,476 UART: [ldev] Erasing FE.KEYID = 1
1,242,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,380 UART: [ldev] --
1,282,721 UART: [fwproc] Wait for Commands...
1,283,530 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,714 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,911 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,086 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,435 >>> mbox cmd response: success
2,828,435 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,601 UART: [afmc] ++
2,829,769 UART: [afmc] CDI.KEYID = 6
2,830,132 UART: [afmc] SUBJECT.KEYID = 7
2,830,558 UART: [afmc] AUTHORITY.KEYID = 5
2,865,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,260 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,009 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,600 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,301 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,186 UART: [afmc] --
2,909,203 UART: [cold-reset] --
2,910,309 UART: [state] Locking Datavault
2,911,720 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,324 UART: [state] Locking ICCM
2,912,956 UART: [exit] Launching FMC @ 0x40000130
2,918,286 UART:
2,918,302 UART: Running Caliptra FMC ...
2,918,710 UART:
2,918,764 UART: [state] CFI Enabled
2,929,024 UART: [fht] FMC Alias Private Key: 7
3,048,132 UART: [art] Extend RT PCRs Done
3,048,560 UART: [art] Lock RT PCRs Done
3,050,180 UART: [art] Populate DV Done
3,058,275 UART: [fht] FMC Alias Private Key: 7
3,059,431 UART: [art] Derive CDI
3,059,711 UART: [art] Store in slot 0x4
3,145,412 UART: [art] Derive Key Pair
3,145,772 UART: [art] Store priv key in slot 0x5
3,158,814 UART: [art] Derive Key Pair - Done
3,173,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,589 UART: [art] PUB.X = 5974D6D207B0F89ABBE83EF8F44C39DBA7980DF879ED82E449E70004D042B0E0BB60D573897B630C166E97A19B823698
3,196,327 UART: [art] PUB.Y = 64690CB72EBBA210440A36461C4E853252A188B61B90A3C38A7E863AA49C3F1766D25278E52488B95229631C74B566BD
3,203,263 UART: [art] SIG.R = B28150F14760CEB0C305297B497A48142AF369DF058578836EC183B732DFFC6C5D6E058D0F4F9C56054E1CC91FAD8C0C
3,210,021 UART: [art] SIG.S = CDAC6C0E50007946BB73D8D23A1E49B6D73A5EE8A184596E1B387A68CFE76C00E4FCACEAF30708400C02B73EE8950B3D
3,233,793 UART: Caliptra RT
3,234,044 UART: [state] CFI Enabled
3,354,248 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,796 UART: [rt]cmd =0x52435458, len=8
3,385,930 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,864 ready_for_fw is high
1,058,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,454 >>> mbox cmd response: success
2,678,454 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,423 UART:
2,740,439 UART: Running Caliptra FMC ...
2,740,847 UART:
2,740,901 UART: [state] CFI Enabled
2,751,461 UART: [fht] FMC Alias Private Key: 7
2,870,319 UART: [art] Extend RT PCRs Done
2,870,747 UART: [art] Lock RT PCRs Done
2,872,491 UART: [art] Populate DV Done
2,880,734 UART: [fht] FMC Alias Private Key: 7
2,881,840 UART: [art] Derive CDI
2,882,120 UART: [art] Store in slot 0x4
2,968,245 UART: [art] Derive Key Pair
2,968,605 UART: [art] Store priv key in slot 0x5
2,982,359 UART: [art] Derive Key Pair - Done
2,997,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,612 UART: [art] PUB.X = AD7C01BAD3B8B1CA04466AB88DBC60BE687A1FD9D5848044B1563939D587CD031B98387F494364E8293D4230D1AA8987
3,020,375 UART: [art] PUB.Y = 743E2D30F17739EB004A937F303E7B30030D56594011B47CDFDAE886739F286CD4DA98167C16E08A5ADFDDE50EA58B3E
3,027,302 UART: [art] SIG.R = B9BC86A7E1D87838F81F5A89D446E9A34BE9DF7DF08AC4F099DAF33F3E304B1898DE67D025B31EC3C9F8CA9714F04BE8
3,034,090 UART: [art] SIG.S = AE921289DFDE0AB9CFE68903782726766AD0FDF380B9DFD55133B00A48BCB99F369C8813F782EA16BEBE0A2711BC5590
3,058,208 UART: Caliptra RT
3,058,459 UART: [state] CFI Enabled
3,176,657 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,193 UART: [rt]cmd =0x52435458, len=8
3,208,111 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,472 UART: [kat] SHA2-512-ACC
906,373 UART: [kat] ECC-384
915,778 UART: [kat] HMAC-384Kdf
920,464 UART: [kat] LMS
1,168,776 UART: [kat] --
1,169,657 UART: [cold-reset] ++
1,170,027 UART: [fht] FHT @ 0x50003400
1,172,755 UART: [idev] ++
1,172,923 UART: [idev] CDI.KEYID = 6
1,173,284 UART: [idev] SUBJECT.KEYID = 7
1,173,709 UART: [idev] UDS.KEYID = 0
1,174,055 ready_for_fw is high
1,174,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,586 UART: [idev] Erasing UDS.KEYID = 0
1,198,978 UART: [idev] Sha1 KeyId Algorithm
1,207,824 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,525 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,035 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,293 UART: [ldev] --
1,281,748 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,796 >>> mbox cmd response: success
2,826,796 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,032 UART: [afmc] ++
2,828,200 UART: [afmc] CDI.KEYID = 6
2,828,563 UART: [afmc] SUBJECT.KEYID = 7
2,828,989 UART: [afmc] AUTHORITY.KEYID = 5
2,864,120 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,944 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,825 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,285 UART: [afmc] --
2,907,128 UART: [cold-reset] --
2,907,852 UART: [state] Locking Datavault
2,908,907 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,511 UART: [state] Locking ICCM
2,910,167 UART: [exit] Launching FMC @ 0x40000130
2,915,497 UART:
2,915,513 UART: Running Caliptra FMC ...
2,915,921 UART:
2,916,064 UART: [state] CFI Enabled
2,926,918 UART: [fht] FMC Alias Private Key: 7
3,046,004 UART: [art] Extend RT PCRs Done
3,046,432 UART: [art] Lock RT PCRs Done
3,047,836 UART: [art] Populate DV Done
3,055,983 UART: [fht] FMC Alias Private Key: 7
3,057,021 UART: [art] Derive CDI
3,057,301 UART: [art] Store in slot 0x4
3,143,182 UART: [art] Derive Key Pair
3,143,542 UART: [art] Store priv key in slot 0x5
3,157,046 UART: [art] Derive Key Pair - Done
3,171,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,781 UART: [art] PUB.X = 9519C25C9BEB4FEFF60A8BB8F7040FF8AB5C307F5E33909397BBE4FD0B85F7765398E404190E544430EC8CC8A3CF8D9D
3,194,547 UART: [art] PUB.Y = AA73BEDF00AAE91F23CCD956F66C6EC8F501145546802056B849D612F53E43AEA55AA3CC43E94EF628F5CB5FDA75E3FB
3,201,492 UART: [art] SIG.R = 21FB79200971ED9E481F41CCB64FE8353C7C39958314D7527F869AFEFE280E04E80695B42BAFDB8875C270CA3EB90125
3,208,251 UART: [art] SIG.S = BE651C89C1B32E6542D51E5F341277FDE17C27A2B2107A3D9CF780862719BF57918C25CF4759D770BD05B616C4939048
3,231,744 UART: Caliptra RT
3,232,087 UART: [state] CFI Enabled
3,352,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,474 UART: [rt]cmd =0x52435458, len=8
3,384,616 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 ready_for_fw is high
1,059,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,731 >>> mbox cmd response: success
2,679,731 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,628 UART:
2,740,644 UART: Running Caliptra FMC ...
2,741,052 UART:
2,741,195 UART: [state] CFI Enabled
2,751,953 UART: [fht] FMC Alias Private Key: 7
2,871,207 UART: [art] Extend RT PCRs Done
2,871,635 UART: [art] Lock RT PCRs Done
2,873,127 UART: [art] Populate DV Done
2,881,486 UART: [fht] FMC Alias Private Key: 7
2,882,524 UART: [art] Derive CDI
2,882,804 UART: [art] Store in slot 0x4
2,968,557 UART: [art] Derive Key Pair
2,968,917 UART: [art] Store priv key in slot 0x5
2,982,471 UART: [art] Derive Key Pair - Done
2,997,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,502 UART: [art] PUB.X = D11338351E3A20E1BD1429691456702B8C16016E49053297FEEB146B79E029D0E3EC12F9FF5A53455ABE060D67201CFE
3,020,258 UART: [art] PUB.Y = A4A75059352FF0E4EBF6268082C1FBEC77855F3679DB5CA39B16289E9A2169F0962073F15EC386531B4BC979AE7F0985
3,027,205 UART: [art] SIG.R = DD1EFB43506F3B155601266540D4DA79FB92CB04013DC39596CB81A6547FE63A9323CFECFC116DE9D70565910642EBAE
3,033,968 UART: [art] SIG.S = B1F14BB4E7676B8D7D37B56F965BC003C81B654D0CB5F0BA4C7D84FA926EC9E1C041A5D66C270684D1A50C8450EAF467
3,057,228 UART: Caliptra RT
3,057,571 UART: [state] CFI Enabled
3,176,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,105 UART: [rt]cmd =0x52435458, len=8
3,207,987 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
893,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,477 UART: [kat] ++
897,629 UART: [kat] sha1
901,861 UART: [kat] SHA2-256
903,801 UART: [kat] SHA2-384
906,554 UART: [kat] SHA2-512-ACC
908,455 UART: [kat] ECC-384
918,096 UART: [kat] HMAC-384Kdf
922,694 UART: [kat] LMS
1,171,022 UART: [kat] --
1,171,939 UART: [cold-reset] ++
1,172,325 UART: [fht] FHT @ 0x50003400
1,175,016 UART: [idev] ++
1,175,184 UART: [idev] CDI.KEYID = 6
1,175,544 UART: [idev] SUBJECT.KEYID = 7
1,175,968 UART: [idev] UDS.KEYID = 0
1,176,313 ready_for_fw is high
1,176,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,814 UART: [idev] Erasing UDS.KEYID = 0
1,200,479 UART: [idev] Sha1 KeyId Algorithm
1,208,819 UART: [idev] --
1,209,779 UART: [ldev] ++
1,209,947 UART: [ldev] CDI.KEYID = 6
1,210,310 UART: [ldev] SUBJECT.KEYID = 5
1,210,736 UART: [ldev] AUTHORITY.KEYID = 7
1,211,199 UART: [ldev] FE.KEYID = 1
1,216,535 UART: [ldev] Erasing FE.KEYID = 1
1,242,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,407 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,396 UART: [fwproc] Recv command 0x46574c44
1,283,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,114 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,284 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,631 >>> mbox cmd response: success
2,825,631 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,777 UART: [afmc] ++
2,826,945 UART: [afmc] CDI.KEYID = 6
2,827,307 UART: [afmc] SUBJECT.KEYID = 7
2,827,732 UART: [afmc] AUTHORITY.KEYID = 5
2,863,171 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,896 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,597 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,393 UART: [afmc] --
2,906,319 UART: [cold-reset] --
2,907,049 UART: [state] Locking Datavault
2,908,262 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,866 UART: [state] Locking ICCM
2,909,338 UART: [exit] Launching FMC @ 0x40000130
2,914,668 UART:
2,914,684 UART: Running Caliptra FMC ...
2,915,092 UART:
2,915,146 UART: [state] CFI Enabled
2,925,584 UART: [fht] FMC Alias Private Key: 7
3,044,830 UART: [art] Extend RT PCRs Done
3,045,258 UART: [art] Lock RT PCRs Done
3,046,824 UART: [art] Populate DV Done
3,055,293 UART: [fht] FMC Alias Private Key: 7
3,056,439 UART: [art] Derive CDI
3,056,719 UART: [art] Store in slot 0x4
3,142,822 UART: [art] Derive Key Pair
3,143,182 UART: [art] Store priv key in slot 0x5
3,156,090 UART: [art] Derive Key Pair - Done
3,170,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,259 UART: [art] PUB.X = 884344C58664B88C42682FCCFA934D2434CD942FC5D8440FAA1698C462EFF1EC8FAA8C48185474EBCF2A9648A440AFD8
3,194,036 UART: [art] PUB.Y = F98E0E1793A13154437AC267DB44353962AD842DCDB58D5A6CB25FBCF82339836E94132FC855DBF2B4DFE37FD8CDA155
3,200,995 UART: [art] SIG.R = 64B55CA65D7F387FCB4F5107D6A67ADD1B62332B8085EFBDC655B397FF7051B0868DD4B5D8944BDD54068965CF6F35D7
3,207,769 UART: [art] SIG.S = FCF7272E7CE38060DA6F3BB4CCDBE47436A837814CE53E9CD01A77CB9891064F491CE987F69DE531AD7059ABB79CC330
3,231,142 UART: Caliptra RT
3,231,393 UART: [state] CFI Enabled
3,351,484 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,952 UART: [rt]cmd =0x52435458, len=8
3,382,722 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,517 ready_for_fw is high
1,060,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,574 >>> mbox cmd response: success
2,680,574 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,391 UART:
2,742,407 UART: Running Caliptra FMC ...
2,742,815 UART:
2,742,869 UART: [state] CFI Enabled
2,753,571 UART: [fht] FMC Alias Private Key: 7
2,872,545 UART: [art] Extend RT PCRs Done
2,872,973 UART: [art] Lock RT PCRs Done
2,874,221 UART: [art] Populate DV Done
2,882,270 UART: [fht] FMC Alias Private Key: 7
2,883,356 UART: [art] Derive CDI
2,883,636 UART: [art] Store in slot 0x4
2,969,269 UART: [art] Derive Key Pair
2,969,629 UART: [art] Store priv key in slot 0x5
2,982,781 UART: [art] Derive Key Pair - Done
2,997,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,662 UART: [art] PUB.X = DE550F330BA287B1ABBDD3B90037FBBE7C7EAEA208D628D2FACF63A93AF635D5EF35A4E686A328BF247F46EF5DA3FB67
3,020,429 UART: [art] PUB.Y = 77278E36A06A5F36E504B984A0A0385C34DCEC3921B71749EBFACC9C7115DCD60BEC8E8300899D0D0627D3F24736AA03
3,027,348 UART: [art] SIG.R = 028A00B4F0C2ED7244AF4C4CA0A7E51E1F4727488A31032D4562F8A6187862E4DA45BB7095E45D6945ECB7AF8D9E73F5
3,034,096 UART: [art] SIG.S = F709529F48653A6F0655A27021AD19536AC1E33D1589D7D85BE8492198B80B8695212E559DB7B74FD29DA0C4BC3997FB
3,057,695 UART: Caliptra RT
3,057,946 UART: [state] CFI Enabled
3,177,463 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,015 UART: [rt]cmd =0x52435458, len=8
3,209,143 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,065 UART: [kat] SHA2-256
893,715 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,840 UART: [kat] ++
897,992 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
907,157 UART: [kat] SHA2-512-ACC
909,058 UART: [kat] ECC-384
918,659 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,622 UART: [cold-reset] ++
1,173,028 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,531 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,284 UART: [ldev] ++
1,211,452 UART: [ldev] CDI.KEYID = 6
1,211,815 UART: [ldev] SUBJECT.KEYID = 5
1,212,241 UART: [ldev] AUTHORITY.KEYID = 7
1,212,704 UART: [ldev] FE.KEYID = 1
1,217,804 UART: [ldev] Erasing FE.KEYID = 1
1,244,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,826 UART: [ldev] --
1,283,189 UART: [fwproc] Wait for Commands...
1,283,799 UART: [fwproc] Recv command 0x46574c44
1,284,527 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,319 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,590 >>> mbox cmd response: success
2,828,590 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,610 UART: [afmc] ++
2,829,778 UART: [afmc] CDI.KEYID = 6
2,830,140 UART: [afmc] SUBJECT.KEYID = 7
2,830,565 UART: [afmc] AUTHORITY.KEYID = 5
2,866,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,961 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,418 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,301 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,002 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,930 UART: [afmc] --
2,910,050 UART: [cold-reset] --
2,910,940 UART: [state] Locking Datavault
2,912,025 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,629 UART: [state] Locking ICCM
2,913,157 UART: [exit] Launching FMC @ 0x40000130
2,918,487 UART:
2,918,503 UART: Running Caliptra FMC ...
2,918,911 UART:
2,919,054 UART: [state] CFI Enabled
2,929,802 UART: [fht] FMC Alias Private Key: 7
3,049,014 UART: [art] Extend RT PCRs Done
3,049,442 UART: [art] Lock RT PCRs Done
3,050,834 UART: [art] Populate DV Done
3,059,057 UART: [fht] FMC Alias Private Key: 7
3,060,059 UART: [art] Derive CDI
3,060,339 UART: [art] Store in slot 0x4
3,145,934 UART: [art] Derive Key Pair
3,146,294 UART: [art] Store priv key in slot 0x5
3,159,850 UART: [art] Derive Key Pair - Done
3,174,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,635 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,400 UART: [art] PUB.X = D95F27CC2F936FE6D8B439E19C30DCE3257935A39543E45C7F2752A16060052ABDC1294BED98D12118B83D5397F430C3
3,198,167 UART: [art] PUB.Y = B0BEAF2A913C75742FFD413943DF82CBEA0B87305035CDB2AB5BF1CC0C962F222FB53D2D8341865E4EF810DE4E1E8F3D
3,205,131 UART: [art] SIG.R = 1CE9EF19D6EF72E28EF0FA8C88264E41821E2A92E89E473184A8F8731A869265F7E6C20F369D247B70994E05B1122F22
3,211,893 UART: [art] SIG.S = 85AF5F1A4F6DD42BE8A0AB906859BAC78C5BD863B59BD52ECB56CAA85F532CC596600242C4554ED08BC149812B565755
3,235,364 UART: Caliptra RT
3,235,707 UART: [state] CFI Enabled
3,355,312 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,980 UART: [rt]cmd =0x52435458, len=8
3,387,168 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,548 ready_for_fw is high
1,060,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,117 >>> mbox cmd response: success
2,677,117 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,738,274 UART:
2,738,290 UART: Running Caliptra FMC ...
2,738,698 UART:
2,738,841 UART: [state] CFI Enabled
2,749,923 UART: [fht] FMC Alias Private Key: 7
2,868,683 UART: [art] Extend RT PCRs Done
2,869,111 UART: [art] Lock RT PCRs Done
2,870,455 UART: [art] Populate DV Done
2,878,830 UART: [fht] FMC Alias Private Key: 7
2,879,890 UART: [art] Derive CDI
2,880,170 UART: [art] Store in slot 0x4
2,965,797 UART: [art] Derive Key Pair
2,966,157 UART: [art] Store priv key in slot 0x5
2,979,531 UART: [art] Derive Key Pair - Done
2,994,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,483 UART: [art] PUB.X = 010A82AF468A832F684B0076657309A99FCB45A2B0B3A43A3D2F6DDE68FEB4D101688EA7060C79F97229095292F221B7
3,017,208 UART: [art] PUB.Y = 22FCAC8CFFF9F74025A340CCCD618423636C849F54324FCDA1517939E73BE8E2A6309E740501D18FF33FB1A4DE1BEDC5
3,024,166 UART: [art] SIG.R = EF84EFA695A7E82202D86D48D142D278E5FE63A6818C225D98543E666D0728551A341B747E2E3761C3E907F8386688E3
3,030,919 UART: [art] SIG.S = 79F1A02D8A92FE47CE55C58008A06ADDCDE350A2BB1E1EB76A40CF454BD309708CE989C94A472F3B80BEE081690AD636
3,054,778 UART: Caliptra RT
3,055,121 UART: [state] CFI Enabled
3,174,860 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,110 UART: [rt]cmd =0x52435458, len=8
3,206,292 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_min ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,124 UART:
192,495 UART: Running Caliptra ROM ...
193,683 UART:
193,833 UART: [state] CFI Enabled
263,909 UART: [state] LifecycleState = Unprovisioned
265,921 UART: [state] DebugLocked = No
267,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,321 UART: [kat] SHA2-256
442,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,521 UART: [kat] ++
453,997 UART: [kat] sha1
464,443 UART: [kat] SHA2-256
467,169 UART: [kat] SHA2-384
473,513 UART: [kat] SHA2-512-ACC
475,877 UART: [kat] ECC-384
2,768,844 UART: [kat] HMAC-384Kdf
2,798,981 UART: [kat] LMS
3,989,272 UART: [kat] --
3,993,815 UART: [cold-reset] ++
3,995,462 UART: [fht] Storing FHT @ 0x50003400
4,005,375 UART: [idev] ++
4,006,023 UART: [idev] CDI.KEYID = 6
4,006,918 UART: [idev] SUBJECT.KEYID = 7
4,008,264 UART: [idev] UDS.KEYID = 0
4,009,282 ready_for_fw is high
4,009,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,087 UART: [idev] Erasing UDS.KEYID = 0
7,346,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,853 UART: [idev] --
7,372,491 UART: [ldev] ++
7,373,061 UART: [ldev] CDI.KEYID = 6
7,374,078 UART: [ldev] SUBJECT.KEYID = 5
7,375,240 UART: [ldev] AUTHORITY.KEYID = 7
7,376,488 UART: [ldev] FE.KEYID = 1
7,424,044 UART: [ldev] Erasing FE.KEYID = 1
10,756,322 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,670 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,205 UART: [ldev] --
13,139,412 UART: [fwproc] Waiting for Commands...
13,142,096 UART: [fwproc] Received command 0x46574c44
13,144,287 UART: [fwproc] Received Image of size 118548 bytes
17,252,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,860 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,958 >>> mbox cmd response: success
17,728,100 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,731,344 UART: [afmc] ++
17,731,932 UART: [afmc] CDI.KEYID = 6
17,732,900 UART: [afmc] SUBJECT.KEYID = 7
17,734,112 UART: [afmc] AUTHORITY.KEYID = 5
21,091,405 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,625 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,891 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,091 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,521 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,148 UART: [afmc] --
23,464,604 UART: [cold-reset] --
23,467,922 UART: [state] Locking Datavault
23,472,161 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,917 UART: [state] Locking ICCM
23,475,180 UART: [exit] Launching FMC @ 0x40000130
23,483,536 UART:
23,483,779 UART: Running Caliptra FMC ...
23,484,806 UART:
23,484,955 UART: [state] CFI Enabled
23,554,561 UART: [fht] FMC Alias Private Key: 7
25,894,786 UART: [art] Extend RT PCRs Done
25,896,005 UART: [art] Lock RT PCRs Done
25,897,608 UART: [art] Populate DV Done
25,903,178 UART: [fht] FMC Alias Private Key: 7
25,904,663 UART: [art] Derive CDI
25,905,422 UART: [art] Store in slot 0x4
25,963,196 UART: [art] Derive Key Pair
25,964,239 UART: [art] Store priv key in slot 0x5
29,256,744 UART: [art] Derive Key Pair - Done
29,270,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,746 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,271 UART: [art] PUB.X = 71A57C7C63C10BA46905F7D949BFCA3A619C46B1BDDCB039154251CF16AC8A8C34EA894693EBF974A19105880EEE6A75
31,566,518 UART: [art] PUB.Y = 4980D0160E6B1EC4CF15A726E9D3D9C77E727D892D6F8B154C1C026A264310D55269CC94062D77037AC3FD626D3C3712
31,573,795 UART: [art] SIG.R = 6E73E2F331715D52B8F51FFD1F5C46EB4F08C16A9A5689E1966C60F22312E25E8BB30370E63E55DFC0C092874B6FC19D
31,581,191 UART: [art] SIG.S = BFAE7706AD5D5C4D8C515162A9DC68F995D20BEC0641F7FB270BF7A486E845F220951B89A2A7D425B2CC772EE9A3EF55
32,885,924 UART: Caliptra RT
32,886,628 UART: [state] CFI Enabled
33,064,242 UART: [rt] RT listening for mailbox commands...
33,096,427 UART: [rt]cmd =0x44504543, len=96
33,128,241 >>> mbox cmd response data (56 bytes)
33,129,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,159,845 UART: [rt]cmd =0x44504543, len=96
33,192,081 >>> mbox cmd response data (56 bytes)
33,192,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,223,324 UART: [rt]cmd =0x44504543, len=96
33,255,849 >>> mbox cmd response data (56 bytes)
33,256,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,287,018 UART: [rt]cmd =0x44504543, len=96
33,319,113 >>> mbox cmd response data (56 bytes)
33,319,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,350,371 UART: [rt]cmd =0x44504543, len=96
33,381,629 >>> mbox cmd response data (56 bytes)
33,382,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,412,792 UART: [rt]cmd =0x44504543, len=96
33,444,719 >>> mbox cmd response data (56 bytes)
33,445,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,475,906 UART: [rt]cmd =0x44504543, len=96
33,507,422 >>> mbox cmd response data (56 bytes)
33,508,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,538,683 UART: [rt]cmd =0x44504543, len=96
33,570,005 >>> mbox cmd response data (56 bytes)
33,570,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,601,413 UART: [rt]cmd =0x44504543, len=96
33,633,779 >>> mbox cmd response data (56 bytes)
33,634,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,665,023 UART: [rt]cmd =0x44504543, len=96
33,696,984 >>> mbox cmd response data (56 bytes)
33,697,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,728,373 UART: [rt]cmd =0x44504543, len=96
33,760,094 >>> mbox cmd response data (56 bytes)
33,760,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,791,322 UART: [rt]cmd =0x44504543, len=96
33,823,588 >>> mbox cmd response data (56 bytes)
33,824,724 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,854,713 UART: [rt]cmd =0x52435458, len=8
33,856,598 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,805,815 ready_for_fw is high
3,806,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,585 >>> mbox cmd response: success
17,958,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,649,047 UART:
23,649,486 UART: Running Caliptra FMC ...
23,650,594 UART:
23,650,754 UART: [state] CFI Enabled
23,720,498 UART: [fht] FMC Alias Private Key: 7
26,061,038 UART: [art] Extend RT PCRs Done
26,062,271 UART: [art] Lock RT PCRs Done
26,063,870 UART: [art] Populate DV Done
26,069,240 UART: [fht] FMC Alias Private Key: 7
26,070,831 UART: [art] Derive CDI
26,071,571 UART: [art] Store in slot 0x4
26,129,242 UART: [art] Derive Key Pair
26,130,287 UART: [art] Store priv key in slot 0x5
29,422,427 UART: [art] Derive Key Pair - Done
29,435,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,447 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,089 UART: [art] PUB.X = 03B18E487D594E7B037081DA9BBFCCB839A88B0F28290E50E59BBE4B108D23B4AF32A6675B722E27C38E395B4A1D8789
31,732,235 UART: [art] PUB.Y = 5FA218B195B963E15F1FA7550C89DE1F80AE0F1DC154788ACBA8FD1E7F9DB743185C4B7B10982054955C93C810D81170
31,739,493 UART: [art] SIG.R = 4117EE1B11EDF72A8318AE578BB30BBF62920B043A21CFA52C8A1122E07744064595A8DC2865DCD67E8D26B8F83EF195
31,746,888 UART: [art] SIG.S = B775E7CE91B29D77BDD2B2084272E82B3351D4974060368157E13321502FF9547E31652F5F880DC2D75C5C473AF6F6E1
33,052,044 UART: Caliptra RT
33,052,754 UART: [state] CFI Enabled
33,229,399 UART: [rt] RT listening for mailbox commands...
33,261,288 UART: [rt]cmd =0x44504543, len=96
33,293,288 >>> mbox cmd response data (56 bytes)
33,294,166 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,324,894 UART: [rt]cmd =0x44504543, len=96
33,356,788 >>> mbox cmd response data (56 bytes)
33,357,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,387,953 UART: [rt]cmd =0x44504543, len=96
33,419,622 >>> mbox cmd response data (56 bytes)
33,420,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,450,932 UART: [rt]cmd =0x44504543, len=96
33,483,325 >>> mbox cmd response data (56 bytes)
33,483,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,514,675 UART: [rt]cmd =0x44504543, len=96
33,546,757 >>> mbox cmd response data (56 bytes)
33,547,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,578,055 UART: [rt]cmd =0x44504543, len=96
33,609,726 >>> mbox cmd response data (56 bytes)
33,610,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,640,879 UART: [rt]cmd =0x44504543, len=96
33,672,738 >>> mbox cmd response data (56 bytes)
33,673,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,704,037 UART: [rt]cmd =0x44504543, len=96
33,736,013 >>> mbox cmd response data (56 bytes)
33,736,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,767,395 UART: [rt]cmd =0x44504543, len=96
33,798,652 >>> mbox cmd response data (56 bytes)
33,799,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,829,693 UART: [rt]cmd =0x44504543, len=96
33,861,630 >>> mbox cmd response data (56 bytes)
33,862,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,893,009 UART: [rt]cmd =0x44504543, len=96
33,925,821 >>> mbox cmd response data (56 bytes)
33,926,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,956,764 UART: [rt]cmd =0x44504543, len=96
33,988,784 >>> mbox cmd response data (56 bytes)
33,989,966 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,019,729 UART: [rt]cmd =0x52435458, len=8
34,021,608 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,475 UART:
192,912 UART: Running Caliptra ROM ...
194,047 UART:
603,722 UART: [state] CFI Enabled
615,151 UART: [state] LifecycleState = Unprovisioned
617,091 UART: [state] DebugLocked = No
618,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,904 UART: [kat] SHA2-256
793,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,194 UART: [kat] ++
804,725 UART: [kat] sha1
815,388 UART: [kat] SHA2-256
818,099 UART: [kat] SHA2-384
824,507 UART: [kat] SHA2-512-ACC
826,872 UART: [kat] ECC-384
3,112,543 UART: [kat] HMAC-384Kdf
3,124,268 UART: [kat] LMS
4,314,370 UART: [kat] --
4,320,565 UART: [cold-reset] ++
4,321,781 UART: [fht] Storing FHT @ 0x50003400
4,333,258 UART: [idev] ++
4,333,823 UART: [idev] CDI.KEYID = 6
4,334,729 UART: [idev] SUBJECT.KEYID = 7
4,335,968 UART: [idev] UDS.KEYID = 0
4,337,016 ready_for_fw is high
4,337,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,524 UART: [idev] Erasing UDS.KEYID = 0
7,627,639 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,285 UART: [idev] --
7,652,415 UART: [ldev] ++
7,652,982 UART: [ldev] CDI.KEYID = 6
7,653,943 UART: [ldev] SUBJECT.KEYID = 5
7,655,167 UART: [ldev] AUTHORITY.KEYID = 7
7,656,451 UART: [ldev] FE.KEYID = 1
7,669,416 UART: [ldev] Erasing FE.KEYID = 1
10,957,566 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,008 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,811 UART: [ldev] --
13,318,339 UART: [fwproc] Waiting for Commands...
13,320,478 UART: [fwproc] Received command 0x46574c44
13,322,661 UART: [fwproc] Received Image of size 118548 bytes
17,422,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,174 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,679 >>> mbox cmd response: success
17,903,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,906,716 UART: [afmc] ++
17,907,294 UART: [afmc] CDI.KEYID = 6
17,908,310 UART: [afmc] SUBJECT.KEYID = 7
17,909,461 UART: [afmc] AUTHORITY.KEYID = 5
21,224,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,510 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,815 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,953 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,347 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,717 UART: [afmc] --
23,593,167 UART: [cold-reset] --
23,597,463 UART: [state] Locking Datavault
23,604,597 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,357 UART: [state] Locking ICCM
23,608,412 UART: [exit] Launching FMC @ 0x40000130
23,616,804 UART:
23,617,032 UART: Running Caliptra FMC ...
23,618,132 UART:
23,618,290 UART: [state] CFI Enabled
23,626,501 UART: [fht] FMC Alias Private Key: 7
25,966,679 UART: [art] Extend RT PCRs Done
25,967,888 UART: [art] Lock RT PCRs Done
25,969,508 UART: [art] Populate DV Done
25,974,809 UART: [fht] FMC Alias Private Key: 7
25,976,451 UART: [art] Derive CDI
25,977,255 UART: [art] Store in slot 0x4
26,020,001 UART: [art] Derive Key Pair
26,021,042 UART: [art] Store priv key in slot 0x5
29,262,739 UART: [art] Derive Key Pair - Done
29,275,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,847 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,355 UART: [art] PUB.X = 1D4EA89E963DA778F522817A987B158CB7F9457F6AE63E5E8365C3BCF1544424B04E2B74C6F2D25785077BBC6789C503
31,564,650 UART: [art] PUB.Y = 9B71B146BB2EFA605500A1D8232769D59CD3A2355D0F38D9CC0B8D7D48D63BE065437D739C3E7F9B85AB6FA5B49271A3
31,571,875 UART: [art] SIG.R = AB2D2A84E8429362110FAACE0F100C85286986658D287B77E41BFB5B6CFA121DB6D9B77589CB0C147E395CBFA2CB31DF
31,579,252 UART: [art] SIG.S = CC8A98B89DE9CC119047795D8BCC90B79316E2F8FF4F819B0517A0CF64866C804C9234B18757F76981DF221A7404598E
32,884,588 UART: Caliptra RT
32,885,295 UART: [state] CFI Enabled
33,019,158 UART: [rt] RT listening for mailbox commands...
33,051,432 UART: [rt]cmd =0x44504543, len=96
33,083,428 >>> mbox cmd response data (56 bytes)
33,084,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,114,865 UART: [rt]cmd =0x44504543, len=96
33,146,380 >>> mbox cmd response data (56 bytes)
33,147,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,177,613 UART: [rt]cmd =0x44504543, len=96
33,209,530 >>> mbox cmd response data (56 bytes)
33,210,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,240,799 UART: [rt]cmd =0x44504543, len=96
33,272,869 >>> mbox cmd response data (56 bytes)
33,273,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,304,193 UART: [rt]cmd =0x44504543, len=96
33,336,301 >>> mbox cmd response data (56 bytes)
33,336,989 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,367,632 UART: [rt]cmd =0x44504543, len=96
33,399,523 >>> mbox cmd response data (56 bytes)
33,400,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,430,622 UART: [rt]cmd =0x44504543, len=96
33,462,615 >>> mbox cmd response data (56 bytes)
33,463,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,493,684 UART: [rt]cmd =0x44504543, len=96
33,526,146 >>> mbox cmd response data (56 bytes)
33,526,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,557,275 UART: [rt]cmd =0x44504543, len=96
33,588,698 >>> mbox cmd response data (56 bytes)
33,589,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,619,604 UART: [rt]cmd =0x44504543, len=96
33,651,117 >>> mbox cmd response data (56 bytes)
33,651,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,682,340 UART: [rt]cmd =0x44504543, len=96
33,713,744 >>> mbox cmd response data (56 bytes)
33,714,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,744,891 UART: [rt]cmd =0x44504543, len=96
33,777,137 >>> mbox cmd response data (56 bytes)
33,778,409 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,808,282 UART: [rt]cmd =0x52435458, len=8
33,810,112 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
4,127,002 ready_for_fw is high
4,127,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,151,444 >>> mbox cmd response: success
18,152,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,792,500 UART:
23,792,906 UART: Running Caliptra FMC ...
23,794,010 UART:
23,794,169 UART: [state] CFI Enabled
23,802,161 UART: [fht] FMC Alias Private Key: 7
26,142,263 UART: [art] Extend RT PCRs Done
26,143,487 UART: [art] Lock RT PCRs Done
26,144,985 UART: [art] Populate DV Done
26,150,531 UART: [fht] FMC Alias Private Key: 7
26,152,067 UART: [art] Derive CDI
26,152,802 UART: [art] Store in slot 0x4
26,195,502 UART: [art] Derive Key Pair
26,196,547 UART: [art] Store priv key in slot 0x5
29,438,433 UART: [art] Derive Key Pair - Done
29,451,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,425 UART: [art] Erasing AUTHORITY.KEYID = 7
31,732,932 UART: [art] PUB.X = E4B7E5A08BA7DBE3A796CF89F39D148FF1B0DE67A3D4805F8231071F011A8C61DE3DF38AFF654E5E03E1D4F912B85BFE
31,740,243 UART: [art] PUB.Y = EB80902EDDD26A5E38E54783FE13BBCAA49E1AC3BC2DBC6895F8F7E0BFBA6191BDE4E38401A8115C8B1F486A9BB23221
31,747,490 UART: [art] SIG.R = 46BFA11EACD16B60A7F1969861A6CCBBD1553FD31E132BD9BBDCBB44BA21DC1ED8B99145FDD4C51A480F362EA5F45A0D
31,754,935 UART: [art] SIG.S = BFDD2861E9C1C71464BD5603EDA6FED5B88109861B67750A481F0C3CC2D1DA618768CDD124519D2D7D33B28DB4FB5C1E
33,060,830 UART: Caliptra RT
33,061,534 UART: [state] CFI Enabled
33,195,428 UART: [rt] RT listening for mailbox commands...
33,227,409 UART: [rt]cmd =0x44504543, len=96
33,259,209 >>> mbox cmd response data (56 bytes)
33,260,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,290,848 UART: [rt]cmd =0x44504543, len=96
33,321,830 >>> mbox cmd response data (56 bytes)
33,322,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,352,996 UART: [rt]cmd =0x44504543, len=96
33,384,322 >>> mbox cmd response data (56 bytes)
33,385,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,415,782 UART: [rt]cmd =0x44504543, len=96
33,448,016 >>> mbox cmd response data (56 bytes)
33,448,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,479,294 UART: [rt]cmd =0x44504543, len=96
33,510,926 >>> mbox cmd response data (56 bytes)
33,511,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,542,086 UART: [rt]cmd =0x44504543, len=96
33,573,488 >>> mbox cmd response data (56 bytes)
33,574,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,604,443 UART: [rt]cmd =0x44504543, len=96
33,636,201 >>> mbox cmd response data (56 bytes)
33,636,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,667,443 UART: [rt]cmd =0x44504543, len=96
33,699,245 >>> mbox cmd response data (56 bytes)
33,699,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,730,265 UART: [rt]cmd =0x44504543, len=96
33,762,337 >>> mbox cmd response data (56 bytes)
33,763,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,793,387 UART: [rt]cmd =0x44504543, len=96
33,825,330 >>> mbox cmd response data (56 bytes)
33,826,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,856,390 UART: [rt]cmd =0x44504543, len=96
33,888,718 >>> mbox cmd response data (56 bytes)
33,889,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,919,994 UART: [rt]cmd =0x44504543, len=96
33,951,804 >>> mbox cmd response data (56 bytes)
33,953,150 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,983,143 UART: [rt]cmd =0x52435458, len=8
33,985,090 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,070 UART:
192,445 UART: Running Caliptra ROM ...
193,574 UART:
193,720 UART: [state] CFI Enabled
264,432 UART: [state] LifecycleState = Unprovisioned
266,357 UART: [state] DebugLocked = No
267,945 UART: [state] WD Timer not started. Device not locked for debugging
271,965 UART: [kat] SHA2-256
451,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,340 UART: [kat] ++
462,861 UART: [kat] sha1
473,659 UART: [kat] SHA2-256
476,379 UART: [kat] SHA2-384
483,072 UART: [kat] SHA2-512-ACC
485,467 UART: [kat] ECC-384
2,948,596 UART: [kat] HMAC-384Kdf
2,970,281 UART: [kat] LMS
3,446,743 UART: [kat] --
3,449,674 UART: [cold-reset] ++
3,450,963 UART: [fht] FHT @ 0x50003400
3,463,286 UART: [idev] ++
3,463,850 UART: [idev] CDI.KEYID = 6
3,464,878 UART: [idev] SUBJECT.KEYID = 7
3,466,044 UART: [idev] UDS.KEYID = 0
3,466,969 ready_for_fw is high
3,467,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,183 UART: [idev] Erasing UDS.KEYID = 0
5,985,106 UART: [idev] Sha1 KeyId Algorithm
6,009,819 UART: [idev] --
6,014,741 UART: [ldev] ++
6,015,331 UART: [ldev] CDI.KEYID = 6
6,016,353 UART: [ldev] SUBJECT.KEYID = 5
6,017,457 UART: [ldev] AUTHORITY.KEYID = 7
6,018,738 UART: [ldev] FE.KEYID = 1
6,056,133 UART: [ldev] Erasing FE.KEYID = 1
8,561,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,240 UART: [ldev] --
10,370,348 UART: [fwproc] Wait for Commands...
10,372,976 UART: [fwproc] Recv command 0x46574c44
10,374,952 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,388 >>> mbox cmd response: success
14,346,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,350,268 UART: [afmc] ++
14,350,847 UART: [afmc] CDI.KEYID = 6
14,351,976 UART: [afmc] SUBJECT.KEYID = 7
14,353,026 UART: [afmc] AUTHORITY.KEYID = 5
16,895,060 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,764 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,608 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,690,172 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,317 UART: [afmc] --
18,717,335 UART: [cold-reset] --
18,721,998 UART: [state] Locking Datavault
18,728,231 UART: [state] Locking PCR0, PCR1 and PCR31
18,729,989 UART: [state] Locking ICCM
18,732,405 UART: [exit] Launching FMC @ 0x40000130
18,740,795 UART:
18,741,029 UART: Running Caliptra FMC ...
18,742,132 UART:
18,742,291 UART: [state] CFI Enabled
18,795,598 UART: [fht] FMC Alias Private Key: 7
20,562,381 UART: [art] Extend RT PCRs Done
20,563,596 UART: [art] Lock RT PCRs Done
20,565,103 UART: [art] Populate DV Done
20,570,734 UART: [fht] FMC Alias Private Key: 7
20,572,269 UART: [art] Derive CDI
20,573,029 UART: [art] Store in slot 0x4
20,629,076 UART: [art] Derive Key Pair
20,630,116 UART: [art] Store priv key in slot 0x5
23,093,596 UART: [art] Derive Key Pair - Done
23,106,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,810 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,321 UART: [art] PUB.X = 143A30723D7612B48068EB7E9D6420F6025D22AC5A7694CE4CCC9656CCC1BB8226E28C4511F02A6888979EF504AC7EFE
24,827,623 UART: [art] PUB.Y = 1FCCA47D5228E6C9A2E09DD21216E18941B5F0404013E6D7719AC627C48E0A218523875695B14C1186350C3E92941830
24,834,846 UART: [art] SIG.R = AE2814D1DEFF20C20E4472384CA08B374A5906E0DB3BCE8F26E8625D383F1CEE1BAC1A7830181F3BB23F2AD1A1E69E85
24,842,250 UART: [art] SIG.S = 8A31180BAD33FC0D68D35CDC03D50E998B3AFD3711F974FE8A014CD5A0C735C7A7B6A47AD0D39190FB102B440C6156A7
25,821,033 UART: Caliptra RT
25,821,733 UART: [state] CFI Enabled
26,002,570 UART: [rt] RT listening for mailbox commands...
26,034,732 UART: [rt]cmd =0x44504543, len=96
26,066,239 >>> mbox cmd response data (56 bytes)
26,067,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,097,699 UART: [rt]cmd =0x44504543, len=96
26,129,079 >>> mbox cmd response data (56 bytes)
26,129,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,160,533 UART: [rt]cmd =0x44504543, len=96
26,192,612 >>> mbox cmd response data (56 bytes)
26,193,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,223,919 UART: [rt]cmd =0x44504543, len=96
26,255,934 >>> mbox cmd response data (56 bytes)
26,256,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,286,936 UART: [rt]cmd =0x44504543, len=96
26,318,822 >>> mbox cmd response data (56 bytes)
26,319,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,349,928 UART: [rt]cmd =0x44504543, len=96
26,381,850 >>> mbox cmd response data (56 bytes)
26,382,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,412,992 UART: [rt]cmd =0x44504543, len=96
26,445,341 >>> mbox cmd response data (56 bytes)
26,446,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,476,485 UART: [rt]cmd =0x44504543, len=96
26,509,109 >>> mbox cmd response data (56 bytes)
26,509,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,540,400 UART: [rt]cmd =0x44504543, len=96
26,571,805 >>> mbox cmd response data (56 bytes)
26,572,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,603,250 UART: [rt]cmd =0x44504543, len=96
26,635,455 >>> mbox cmd response data (56 bytes)
26,636,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,666,720 UART: [rt]cmd =0x44504543, len=96
26,698,836 >>> mbox cmd response data (56 bytes)
26,699,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,730,181 UART: [rt]cmd =0x44504543, len=96
26,762,511 >>> mbox cmd response data (56 bytes)
26,763,241 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,792,910 UART: [rt]cmd =0x52435458, len=8
26,794,850 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,462,943 ready_for_fw is high
3,463,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,321 >>> mbox cmd response: success
14,244,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,541,702 UART:
18,542,106 UART: Running Caliptra FMC ...
18,543,218 UART:
18,543,371 UART: [state] CFI Enabled
18,607,104 UART: [fht] FMC Alias Private Key: 7
20,373,337 UART: [art] Extend RT PCRs Done
20,374,566 UART: [art] Lock RT PCRs Done
20,376,274 UART: [art] Populate DV Done
20,381,421 UART: [fht] FMC Alias Private Key: 7
20,382,978 UART: [art] Derive CDI
20,383,711 UART: [art] Store in slot 0x4
20,439,980 UART: [art] Derive Key Pair
20,441,025 UART: [art] Store priv key in slot 0x5
22,903,655 UART: [art] Derive Key Pair - Done
22,916,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,630,121 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,641 UART: [art] PUB.X = 9CC9B61764277DABB85A27B07F80B611924E78DBA427FF27F5417BB9EF5087582EE0EA91329C8A72BBCA4C5A58F5462D
24,638,891 UART: [art] PUB.Y = 8FEFFFC1845A5AC6E562961C8CE606AC1936233842B7F26912D2C50C6A81DB36DF15042028032273D69776C1C4C2B6F6
24,646,136 UART: [art] SIG.R = 21EAB0EE1E9DF2DFDC09D1B30F2A8578723A1A919B4253D44877E7E9034DB9EF7D40A85B17386748EE4F5A173D8A395B
24,653,540 UART: [art] SIG.S = 6457DA152FC72AAF8439F224A298E5D2C1F0AF5C2F4F16A330C89E25AD9C59235050FBA67CBB278B18F873708796A17D
25,632,475 UART: Caliptra RT
25,633,181 UART: [state] CFI Enabled
25,814,038 UART: [rt] RT listening for mailbox commands...
25,846,275 UART: [rt]cmd =0x44504543, len=96
25,877,797 >>> mbox cmd response data (56 bytes)
25,878,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,909,232 UART: [rt]cmd =0x44504543, len=96
25,941,144 >>> mbox cmd response data (56 bytes)
25,941,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,972,654 UART: [rt]cmd =0x44504543, len=96
26,004,388 >>> mbox cmd response data (56 bytes)
26,005,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,035,630 UART: [rt]cmd =0x44504543, len=96
26,067,307 >>> mbox cmd response data (56 bytes)
26,067,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,098,524 UART: [rt]cmd =0x44504543, len=96
26,130,037 >>> mbox cmd response data (56 bytes)
26,130,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,161,243 UART: [rt]cmd =0x44504543, len=96
26,193,285 >>> mbox cmd response data (56 bytes)
26,194,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,224,475 UART: [rt]cmd =0x44504543, len=96
26,256,230 >>> mbox cmd response data (56 bytes)
26,256,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,287,403 UART: [rt]cmd =0x44504543, len=96
26,319,173 >>> mbox cmd response data (56 bytes)
26,319,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,350,348 UART: [rt]cmd =0x44504543, len=96
26,382,773 >>> mbox cmd response data (56 bytes)
26,383,462 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,413,828 UART: [rt]cmd =0x44504543, len=96
26,446,666 >>> mbox cmd response data (56 bytes)
26,447,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,478,130 UART: [rt]cmd =0x44504543, len=96
26,510,476 >>> mbox cmd response data (56 bytes)
26,511,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,541,671 UART: [rt]cmd =0x44504543, len=96
26,574,455 >>> mbox cmd response data (56 bytes)
26,575,138 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,604,869 UART: [rt]cmd =0x52435458, len=8
26,606,729 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,370 UART:
192,734 UART: Running Caliptra ROM ...
193,826 UART:
603,724 UART: [state] CFI Enabled
617,549 UART: [state] LifecycleState = Unprovisioned
619,423 UART: [state] DebugLocked = No
621,309 UART: [state] WD Timer not started. Device not locked for debugging
625,275 UART: [kat] SHA2-256
804,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,685 UART: [kat] ++
816,136 UART: [kat] sha1
828,312 UART: [kat] SHA2-256
831,013 UART: [kat] SHA2-384
838,226 UART: [kat] SHA2-512-ACC
840,601 UART: [kat] ECC-384
3,281,640 UART: [kat] HMAC-384Kdf
3,294,185 UART: [kat] LMS
3,770,735 UART: [kat] --
3,775,750 UART: [cold-reset] ++
3,778,263 UART: [fht] FHT @ 0x50003400
3,790,906 UART: [idev] ++
3,791,556 UART: [idev] CDI.KEYID = 6
3,792,468 UART: [idev] SUBJECT.KEYID = 7
3,793,715 UART: [idev] UDS.KEYID = 0
3,794,645 ready_for_fw is high
3,794,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,826 UART: [idev] Erasing UDS.KEYID = 0
6,270,274 UART: [idev] Sha1 KeyId Algorithm
6,294,255 UART: [idev] --
6,298,956 UART: [ldev] ++
6,299,522 UART: [ldev] CDI.KEYID = 6
6,300,541 UART: [ldev] SUBJECT.KEYID = 5
6,301,669 UART: [ldev] AUTHORITY.KEYID = 7
6,302,910 UART: [ldev] FE.KEYID = 1
6,313,883 UART: [ldev] Erasing FE.KEYID = 1
8,790,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,453 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,036 UART: [ldev] --
10,582,696 UART: [fwproc] Wait for Commands...
10,584,426 UART: [fwproc] Recv command 0x46574c44
10,586,417 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,757 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,877 >>> mbox cmd response: success
14,549,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,552,750 UART: [afmc] ++
14,553,340 UART: [afmc] CDI.KEYID = 6
14,554,281 UART: [afmc] SUBJECT.KEYID = 7
14,555,499 UART: [afmc] AUTHORITY.KEYID = 5
17,062,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,962 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,143 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,964 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,032 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,661 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,594 UART: [afmc] --
18,860,295 UART: [cold-reset] --
18,863,557 UART: [state] Locking Datavault
18,867,895 UART: [state] Locking PCR0, PCR1 and PCR31
18,869,648 UART: [state] Locking ICCM
18,872,059 UART: [exit] Launching FMC @ 0x40000130
18,880,515 UART:
18,880,754 UART: Running Caliptra FMC ...
18,881,857 UART:
18,882,014 UART: [state] CFI Enabled
18,890,117 UART: [fht] FMC Alias Private Key: 7
20,656,083 UART: [art] Extend RT PCRs Done
20,657,430 UART: [art] Lock RT PCRs Done
20,658,820 UART: [art] Populate DV Done
20,664,565 UART: [fht] FMC Alias Private Key: 7
20,666,043 UART: [art] Derive CDI
20,666,787 UART: [art] Store in slot 0x4
20,709,809 UART: [art] Derive Key Pair
20,710,809 UART: [art] Store priv key in slot 0x5
23,137,877 UART: [art] Derive Key Pair - Done
23,150,917 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,240 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,738 UART: [art] PUB.X = 0A459806C909D1B0B84DF62446E6BA8D3EA88FD9E675B33062466935E8AD43C224E9C2405A6EA3F90D47129066EE0873
24,865,985 UART: [art] PUB.Y = A3F5DFB5A09093D76B6050C8AE59530787F89D4BAE439F2C465DE6B3C79E6F12600EB7C360465FC915B2E1BA02F76C22
24,873,270 UART: [art] SIG.R = 4D1784153F0969B0D46B4527154193D7D81EB68379D9303A6F77AE69EDFD6560FD47A4B5066655B6E6FFAF034986DAE9
24,880,662 UART: [art] SIG.S = AB9CAB07CB409E766112372303C9868356052990DA754E649A6C7461A2F26CE34C055FEB655B1CE7CE8D28C4726E7E71
25,859,672 UART: Caliptra RT
25,860,386 UART: [state] CFI Enabled
25,992,996 UART: [rt] RT listening for mailbox commands...
26,024,941 UART: [rt]cmd =0x44504543, len=96
26,057,208 >>> mbox cmd response data (56 bytes)
26,058,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,088,690 UART: [rt]cmd =0x44504543, len=96
26,120,414 >>> mbox cmd response data (56 bytes)
26,121,141 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,151,673 UART: [rt]cmd =0x44504543, len=96
26,183,274 >>> mbox cmd response data (56 bytes)
26,184,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,214,707 UART: [rt]cmd =0x44504543, len=96
26,246,512 >>> mbox cmd response data (56 bytes)
26,247,194 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,277,524 UART: [rt]cmd =0x44504543, len=96
26,308,947 >>> mbox cmd response data (56 bytes)
26,309,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,340,255 UART: [rt]cmd =0x44504543, len=96
26,371,561 >>> mbox cmd response data (56 bytes)
26,372,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,402,885 UART: [rt]cmd =0x44504543, len=96
26,435,222 >>> mbox cmd response data (56 bytes)
26,435,933 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,466,571 UART: [rt]cmd =0x44504543, len=96
26,497,622 >>> mbox cmd response data (56 bytes)
26,498,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,528,829 UART: [rt]cmd =0x44504543, len=96
26,560,526 >>> mbox cmd response data (56 bytes)
26,561,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,591,792 UART: [rt]cmd =0x44504543, len=96
26,623,626 >>> mbox cmd response data (56 bytes)
26,624,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,654,789 UART: [rt]cmd =0x44504543, len=96
26,686,712 >>> mbox cmd response data (56 bytes)
26,687,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,718,121 UART: [rt]cmd =0x44504543, len=96
26,750,038 >>> mbox cmd response data (56 bytes)
26,751,213 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,781,087 UART: [rt]cmd =0x52435458, len=8
26,782,868 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,267 writing to cptra_bootfsm_go
3,778,437 ready_for_fw is high
3,778,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,447,716 >>> mbox cmd response: success
14,448,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,703,084 UART:
18,703,464 UART: Running Caliptra FMC ...
18,704,669 UART:
18,704,836 UART: [state] CFI Enabled
18,712,394 UART: [fht] FMC Alias Private Key: 7
20,478,750 UART: [art] Extend RT PCRs Done
20,479,972 UART: [art] Lock RT PCRs Done
20,481,499 UART: [art] Populate DV Done
20,486,783 UART: [fht] FMC Alias Private Key: 7
20,488,499 UART: [art] Derive CDI
20,489,244 UART: [art] Store in slot 0x4
20,532,003 UART: [art] Derive Key Pair
20,533,015 UART: [art] Store priv key in slot 0x5
22,959,796 UART: [art] Derive Key Pair - Done
22,972,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,422 UART: [art] Erasing AUTHORITY.KEYID = 7
24,680,922 UART: [art] PUB.X = 2273D6885F092FF7D1C23A6EA05E5C1CFB9D8F2365F31E8F60785706953A5A4DEB1F8421A7C9DBD9C9D3B214D8908CB4
24,688,184 UART: [art] PUB.Y = 1D970040F0F1AE1D24F09A069FABC58A356195CFEB3FB657B7B5C235C1E9B6B087A594A6F14F0E434749D98D05F1DE00
24,695,435 UART: [art] SIG.R = 28D6073D13B734C173551CB324D91EE9767338187DDE5E66834131234C431F6445DA6CC7E1A2ED712D1424FD0D769FDB
24,702,786 UART: [art] SIG.S = 8E8DFEF77D3E6D03C0454D8BEFD5405F294FC118D89A72D603E6AF7DE03125372C338694DE8F1E27991917CFCE022772
25,681,839 UART: Caliptra RT
25,682,537 UART: [state] CFI Enabled
25,815,205 UART: [rt] RT listening for mailbox commands...
25,847,195 UART: [rt]cmd =0x44504543, len=96
25,878,808 >>> mbox cmd response data (56 bytes)
25,879,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,910,334 UART: [rt]cmd =0x44504543, len=96
25,942,360 >>> mbox cmd response data (56 bytes)
25,943,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,973,685 UART: [rt]cmd =0x44504543, len=96
26,005,295 >>> mbox cmd response data (56 bytes)
26,006,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,401 UART: [rt]cmd =0x44504543, len=96
26,068,965 >>> mbox cmd response data (56 bytes)
26,069,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,100,294 UART: [rt]cmd =0x44504543, len=96
26,132,627 >>> mbox cmd response data (56 bytes)
26,133,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,163,553 UART: [rt]cmd =0x44504543, len=96
26,196,199 >>> mbox cmd response data (56 bytes)
26,196,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,227,582 UART: [rt]cmd =0x44504543, len=96
26,259,173 >>> mbox cmd response data (56 bytes)
26,259,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,290,415 UART: [rt]cmd =0x44504543, len=96
26,322,111 >>> mbox cmd response data (56 bytes)
26,322,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,353,319 UART: [rt]cmd =0x44504543, len=96
26,385,121 >>> mbox cmd response data (56 bytes)
26,385,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,416,173 UART: [rt]cmd =0x44504543, len=96
26,448,111 >>> mbox cmd response data (56 bytes)
26,448,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,479,553 UART: [rt]cmd =0x44504543, len=96
26,511,564 >>> mbox cmd response data (56 bytes)
26,512,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,542,631 UART: [rt]cmd =0x44504543, len=96
26,574,508 >>> mbox cmd response data (56 bytes)
26,575,622 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,605,490 UART: [rt]cmd =0x52435458, len=8
26,607,429 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
192,266 UART:
192,631 UART: Running Caliptra ROM ...
193,764 UART:
193,911 UART: [state] CFI Enabled
264,412 UART: [state] LifecycleState = Unprovisioned
266,869 UART: [state] DebugLocked = No
268,604 UART: [state] WD Timer not started. Device not locked for debugging
273,219 UART: [kat] SHA2-256
463,091 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,855 UART: [kat] ++
474,330 UART: [kat] sha1
486,126 UART: [kat] SHA2-256
489,208 UART: [kat] SHA2-384
496,969 UART: [kat] SHA2-512-ACC
499,564 UART: [kat] ECC-384
2,948,833 UART: [kat] HMAC-384Kdf
2,973,426 UART: [kat] LMS
3,505,234 UART: [kat] --
3,509,650 UART: [cold-reset] ++
3,511,575 UART: [fht] FHT @ 0x50003400
3,524,321 UART: [idev] ++
3,525,022 UART: [idev] CDI.KEYID = 6
3,525,999 UART: [idev] SUBJECT.KEYID = 7
3,527,161 UART: [idev] UDS.KEYID = 0
3,528,081 ready_for_fw is high
3,528,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,410 UART: [idev] Erasing UDS.KEYID = 0
6,030,851 UART: [idev] Sha1 KeyId Algorithm
6,054,669 UART: [idev] --
6,059,613 UART: [ldev] ++
6,060,316 UART: [ldev] CDI.KEYID = 6
6,061,198 UART: [ldev] SUBJECT.KEYID = 5
6,062,407 UART: [ldev] AUTHORITY.KEYID = 7
6,063,636 UART: [ldev] FE.KEYID = 1
6,101,992 UART: [ldev] Erasing FE.KEYID = 1
8,605,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,901 UART: [ldev] --
10,416,130 UART: [fwproc] Wait for Commands...
10,417,895 UART: [fwproc] Recv command 0x46574c44
10,420,148 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,116,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,806 >>> mbox cmd response: success
14,677,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,680,798 UART: [afmc] ++
14,681,530 UART: [afmc] CDI.KEYID = 6
14,682,716 UART: [afmc] SUBJECT.KEYID = 7
14,684,140 UART: [afmc] AUTHORITY.KEYID = 5
17,215,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,960 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,213 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,120 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,771 UART: [afmc] --
19,013,947 UART: [cold-reset] --
19,017,974 UART: [state] Locking Datavault
19,023,668 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,807 UART: [state] Locking ICCM
19,027,143 UART: [exit] Launching FMC @ 0x40000130
19,035,805 UART:
19,036,038 UART: Running Caliptra FMC ...
19,037,141 UART:
19,037,297 UART: [state] CFI Enabled
19,096,919 UART: [fht] FMC Alias Private Key: 7
20,884,707 UART: [art] Extend RT PCRs Done
20,885,928 UART: [art] Lock RT PCRs Done
20,887,905 UART: [art] Populate DV Done
20,893,153 UART: [fht] FMC Alias Private Key: 7
20,894,745 UART: [art] Derive CDI
20,895,553 UART: [art] Store in slot 0x4
20,951,322 UART: [art] Derive Key Pair
20,952,364 UART: [art] Store priv key in slot 0x5
23,415,399 UART: [art] Derive Key Pair - Done
23,428,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,141,426 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,934 UART: [art] PUB.X = 89E3836AB17D7A71EB54CF6E7A7983D47CD81443141FFDE1A019E54BBCFCE2861667E27E57E612943E3B5E593EBE4AF2
25,150,190 UART: [art] PUB.Y = BB481077DEF48BCC5BD6179F38655E677BC2E62CF2A4F16CD2BFFF2E4C9F46E759EEFEC2564129C4C4A393D0F4B6F264
25,157,472 UART: [art] SIG.R = 7F0AF3F4F7E50A16DFE8F4620EAA89839E7CD702C9A71EAE8050E93FF14C2ACF2F4644B768D58ABC19800F693A40DCBF
25,164,899 UART: [art] SIG.S = 4AEC1E29080B9C899BE9CDFD26EC3485B0DEC7D5B11F2CAF243709B20CFF4024D679B3916579D5AB5B9E0D17A971C07E
26,143,616 UART: Caliptra RT
26,144,303 UART: [state] CFI Enabled
26,326,769 UART: [rt] RT listening for mailbox commands...
26,359,026 UART: [rt]cmd =0x44504543, len=96
26,391,118 >>> mbox cmd response data (56 bytes)
26,391,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,422,580 UART: [rt]cmd =0x44504543, len=96
26,453,524 >>> mbox cmd response data (56 bytes)
26,454,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,690 UART: [rt]cmd =0x44504543, len=96
26,516,497 >>> mbox cmd response data (56 bytes)
26,517,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,611 UART: [rt]cmd =0x44504543, len=96
26,579,393 >>> mbox cmd response data (56 bytes)
26,580,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,610,833 UART: [rt]cmd =0x44504543, len=96
26,643,145 >>> mbox cmd response data (56 bytes)
26,643,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,674,242 UART: [rt]cmd =0x44504543, len=96
26,706,851 >>> mbox cmd response data (56 bytes)
26,707,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,737,875 UART: [rt]cmd =0x44504543, len=96
26,769,937 >>> mbox cmd response data (56 bytes)
26,770,657 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,801,076 UART: [rt]cmd =0x44504543, len=96
26,832,953 >>> mbox cmd response data (56 bytes)
26,833,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,863,895 UART: [rt]cmd =0x44504543, len=96
26,896,320 >>> mbox cmd response data (56 bytes)
26,897,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,927,341 UART: [rt]cmd =0x44504543, len=96
26,959,943 >>> mbox cmd response data (56 bytes)
26,960,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,991,332 UART: [rt]cmd =0x44504543, len=96
27,023,249 >>> mbox cmd response data (56 bytes)
27,023,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,054,514 UART: [rt]cmd =0x44504543, len=96
27,085,513 >>> mbox cmd response data (56 bytes)
27,086,639 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,116,590 UART: [rt]cmd =0x52435458, len=8
27,118,375 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,439,538 ready_for_fw is high
3,439,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,602 >>> mbox cmd response: success
14,824,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,127,145 UART:
19,127,545 UART: Running Caliptra FMC ...
19,128,640 UART:
19,128,791 UART: [state] CFI Enabled
19,194,726 UART: [fht] FMC Alias Private Key: 7
20,961,065 UART: [art] Extend RT PCRs Done
20,962,285 UART: [art] Lock RT PCRs Done
20,964,072 UART: [art] Populate DV Done
20,969,671 UART: [fht] FMC Alias Private Key: 7
20,971,170 UART: [art] Derive CDI
20,971,931 UART: [art] Store in slot 0x4
21,027,867 UART: [art] Derive Key Pair
21,028,914 UART: [art] Store priv key in slot 0x5
23,491,167 UART: [art] Derive Key Pair - Done
23,504,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,677 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,177 UART: [art] PUB.X = 598178E210EBDA8BDCB987F4ACD2CDFBF2745DCCABE4D7C57C6C1CAB10663CE89F24A8137652B9F2AD55409411B4868A
25,226,497 UART: [art] PUB.Y = A5D5803EDADD38F18D4C12466495567A0119B5B34D77D3423BED89A922461B4CAC8D461C4E37EF491D52B2972B6E8071
25,233,687 UART: [art] SIG.R = 4B59991E20620AA0F4DEA9AB54F6F4E8203DF8FCD48F8803164FC9814C139BFC8FC4D1250F59D6FB9FFFA9E24BBA3A32
25,241,131 UART: [art] SIG.S = 9F19F5BDAF41996B1EE51157A10DD55D5ECFD7998DFC0E2BBAA64C0A1C1DD24BA200A35871730E55E8B7C5E846621B55
26,219,611 UART: Caliptra RT
26,220,325 UART: [state] CFI Enabled
26,402,430 UART: [rt] RT listening for mailbox commands...
26,434,970 UART: [rt]cmd =0x44504543, len=96
26,467,363 >>> mbox cmd response data (56 bytes)
26,468,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,498,640 UART: [rt]cmd =0x44504543, len=96
26,530,762 >>> mbox cmd response data (56 bytes)
26,531,474 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,561,898 UART: [rt]cmd =0x44504543, len=96
26,594,085 >>> mbox cmd response data (56 bytes)
26,594,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,625,283 UART: [rt]cmd =0x44504543, len=96
26,657,026 >>> mbox cmd response data (56 bytes)
26,657,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,688,094 UART: [rt]cmd =0x44504543, len=96
26,719,729 >>> mbox cmd response data (56 bytes)
26,720,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,750,700 UART: [rt]cmd =0x44504543, len=96
26,782,846 >>> mbox cmd response data (56 bytes)
26,783,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,814,090 UART: [rt]cmd =0x44504543, len=96
26,845,957 >>> mbox cmd response data (56 bytes)
26,846,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,877,102 UART: [rt]cmd =0x44504543, len=96
26,908,959 >>> mbox cmd response data (56 bytes)
26,909,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,940,329 UART: [rt]cmd =0x44504543, len=96
26,972,293 >>> mbox cmd response data (56 bytes)
26,972,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,003,353 UART: [rt]cmd =0x44504543, len=96
27,035,196 >>> mbox cmd response data (56 bytes)
27,035,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,066,519 UART: [rt]cmd =0x44504543, len=96
27,099,275 >>> mbox cmd response data (56 bytes)
27,099,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,130,610 UART: [rt]cmd =0x44504543, len=96
27,162,418 >>> mbox cmd response data (56 bytes)
27,163,575 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,193,414 UART: [rt]cmd =0x52435458, len=8
27,195,416 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,478 UART:
192,868 UART: Running Caliptra ROM ...
194,001 UART:
603,496 UART: [state] CFI Enabled
616,039 UART: [state] LifecycleState = Unprovisioned
618,430 UART: [state] DebugLocked = No
621,101 UART: [state] WD Timer not started. Device not locked for debugging
625,797 UART: [kat] SHA2-256
815,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,440 UART: [kat] ++
827,050 UART: [kat] sha1
838,576 UART: [kat] SHA2-256
841,655 UART: [kat] SHA2-384
848,000 UART: [kat] SHA2-512-ACC
850,592 UART: [kat] ECC-384
3,291,193 UART: [kat] HMAC-384Kdf
3,304,143 UART: [kat] LMS
3,836,024 UART: [kat] --
3,838,487 UART: [cold-reset] ++
3,839,861 UART: [fht] FHT @ 0x50003400
3,851,057 UART: [idev] ++
3,851,770 UART: [idev] CDI.KEYID = 6
3,852,683 UART: [idev] SUBJECT.KEYID = 7
3,853,933 UART: [idev] UDS.KEYID = 0
3,854,862 ready_for_fw is high
3,855,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,980 UART: [idev] Erasing UDS.KEYID = 0
6,333,706 UART: [idev] Sha1 KeyId Algorithm
6,356,022 UART: [idev] --
6,361,203 UART: [ldev] ++
6,361,903 UART: [ldev] CDI.KEYID = 6
6,362,825 UART: [ldev] SUBJECT.KEYID = 5
6,363,990 UART: [ldev] AUTHORITY.KEYID = 7
6,365,170 UART: [ldev] FE.KEYID = 1
6,378,035 UART: [ldev] Erasing FE.KEYID = 1
8,855,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,883 UART: [ldev] --
10,647,113 UART: [fwproc] Wait for Commands...
10,649,640 UART: [fwproc] Recv command 0x46574c44
10,651,947 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,293 >>> mbox cmd response: success
14,917,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,920,135 UART: [afmc] ++
14,920,843 UART: [afmc] CDI.KEYID = 6
14,922,009 UART: [afmc] SUBJECT.KEYID = 7
14,923,512 UART: [afmc] AUTHORITY.KEYID = 5
17,420,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,124 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,292 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,030 UART: [afmc] --
19,215,257 UART: [cold-reset] --
19,219,721 UART: [state] Locking Datavault
19,225,579 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,763 UART: [state] Locking ICCM
19,230,413 UART: [exit] Launching FMC @ 0x40000130
19,239,059 UART:
19,239,299 UART: Running Caliptra FMC ...
19,240,401 UART:
19,240,563 UART: [state] CFI Enabled
19,248,209 UART: [fht] FMC Alias Private Key: 7
21,015,342 UART: [art] Extend RT PCRs Done
21,016,567 UART: [art] Lock RT PCRs Done
21,018,284 UART: [art] Populate DV Done
21,023,508 UART: [fht] FMC Alias Private Key: 7
21,024,997 UART: [art] Derive CDI
21,025,742 UART: [art] Store in slot 0x4
21,068,771 UART: [art] Derive Key Pair
21,069,815 UART: [art] Store priv key in slot 0x5
23,496,476 UART: [art] Derive Key Pair - Done
23,509,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,127 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,640 UART: [art] PUB.X = 5F85059A289BA6E962B6A69A97B0DEE08C0DFE4B015E9D0ECC23E10B99F6F0EDD8DA7AE073171E6EAFD9259C85159CDE
25,223,909 UART: [art] PUB.Y = A93A7514770C8439D555021591D84DD597C70E25D189FD0951FF2127A5B0BD30F0C629A43C66BADA5B3BCD59285A3E3A
25,231,148 UART: [art] SIG.R = AFA8FE8AF7F3D2EC4407001752E89CD4EA601E36414EC78B5AB94EF88849A5DC81BE516163EF3E13B31F267257A7750F
25,238,518 UART: [art] SIG.S = A4EC55B0AD219BC7F8C0CED8EF883254FF6FF79B5A808C303F76E9368DAC8A5184411496D6BAC72958F308E2877F80AF
26,217,981 UART: Caliptra RT
26,218,669 UART: [state] CFI Enabled
26,350,856 UART: [rt] RT listening for mailbox commands...
26,382,914 UART: [rt]cmd =0x44504543, len=96
26,415,869 >>> mbox cmd response data (56 bytes)
26,416,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,447,179 UART: [rt]cmd =0x44504543, len=96
26,479,182 >>> mbox cmd response data (56 bytes)
26,479,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,510,491 UART: [rt]cmd =0x44504543, len=96
26,543,087 >>> mbox cmd response data (56 bytes)
26,543,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,574,419 UART: [rt]cmd =0x44504543, len=96
26,606,184 >>> mbox cmd response data (56 bytes)
26,606,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,637,329 UART: [rt]cmd =0x44504543, len=96
26,669,356 >>> mbox cmd response data (56 bytes)
26,670,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,700,841 UART: [rt]cmd =0x44504543, len=96
26,732,860 >>> mbox cmd response data (56 bytes)
26,733,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,764,105 UART: [rt]cmd =0x44504543, len=96
26,796,310 >>> mbox cmd response data (56 bytes)
26,797,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,827,448 UART: [rt]cmd =0x44504543, len=96
26,859,660 >>> mbox cmd response data (56 bytes)
26,860,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,890,663 UART: [rt]cmd =0x44504543, len=96
26,922,310 >>> mbox cmd response data (56 bytes)
26,923,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,953,456 UART: [rt]cmd =0x44504543, len=96
26,985,164 >>> mbox cmd response data (56 bytes)
26,985,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,016,303 UART: [rt]cmd =0x44504543, len=96
27,047,678 >>> mbox cmd response data (56 bytes)
27,048,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,078,919 UART: [rt]cmd =0x44504543, len=96
27,110,761 >>> mbox cmd response data (56 bytes)
27,111,784 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,141,562 UART: [rt]cmd =0x52435458, len=8
27,143,514 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,754,069 ready_for_fw is high
3,754,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,521 >>> mbox cmd response: success
15,045,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,300,111 UART:
19,300,509 UART: Running Caliptra FMC ...
19,301,662 UART:
19,301,828 UART: [state] CFI Enabled
19,309,844 UART: [fht] FMC Alias Private Key: 7
21,075,810 UART: [art] Extend RT PCRs Done
21,077,060 UART: [art] Lock RT PCRs Done
21,078,561 UART: [art] Populate DV Done
21,083,985 UART: [fht] FMC Alias Private Key: 7
21,085,694 UART: [art] Derive CDI
21,086,438 UART: [art] Store in slot 0x4
21,129,519 UART: [art] Derive Key Pair
21,130,557 UART: [art] Store priv key in slot 0x5
23,556,956 UART: [art] Derive Key Pair - Done
23,570,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,475 UART: [art] Erasing AUTHORITY.KEYID = 7
25,277,982 UART: [art] PUB.X = E5BA181794B23D6E01CA65EAF00B3F515806324C4F409406178E9E56A07C38FCC91EB770C798AFC6A90F1977F99694CF
25,285,250 UART: [art] PUB.Y = 0CDF5650FB41B7AB9795554C0F3A2542D58BBCC8485E92D38C6AF4907151E6CC256FE7181D86FE03D255493627D56B2D
25,292,523 UART: [art] SIG.R = B592CE479CBEEBCBC1423D7E3286CB3713EA2E7CF9F9A1FEE7C4C9CCD00774920357B108BD4CF696F759E6217635FD76
25,299,937 UART: [art] SIG.S = FA3A3C78ED794A741B59086373FBEDD3055551C2020BAAACD5822B647DC3CB46B1D737A473EC6A71C7D002316C34BD11
26,278,366 UART: Caliptra RT
26,279,055 UART: [state] CFI Enabled
26,411,469 UART: [rt] RT listening for mailbox commands...
26,443,422 UART: [rt]cmd =0x44504543, len=96
26,475,374 >>> mbox cmd response data (56 bytes)
26,476,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,506,782 UART: [rt]cmd =0x44504543, len=96
26,538,267 >>> mbox cmd response data (56 bytes)
26,538,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,569,397 UART: [rt]cmd =0x44504543, len=96
26,601,668 >>> mbox cmd response data (56 bytes)
26,602,363 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,632,895 UART: [rt]cmd =0x44504543, len=96
26,664,764 >>> mbox cmd response data (56 bytes)
26,665,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,696,076 UART: [rt]cmd =0x44504543, len=96
26,727,570 >>> mbox cmd response data (56 bytes)
26,728,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,758,849 UART: [rt]cmd =0x44504543, len=96
26,790,914 >>> mbox cmd response data (56 bytes)
26,791,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,821,967 UART: [rt]cmd =0x44504543, len=96
26,854,219 >>> mbox cmd response data (56 bytes)
26,854,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,885,403 UART: [rt]cmd =0x44504543, len=96
26,917,778 >>> mbox cmd response data (56 bytes)
26,918,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,948,996 UART: [rt]cmd =0x44504543, len=96
26,980,774 >>> mbox cmd response data (56 bytes)
26,981,524 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,012,006 UART: [rt]cmd =0x44504543, len=96
27,043,797 >>> mbox cmd response data (56 bytes)
27,044,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,075,126 UART: [rt]cmd =0x44504543, len=96
27,107,335 >>> mbox cmd response data (56 bytes)
27,108,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,138,621 UART: [rt]cmd =0x44504543, len=96
27,170,836 >>> mbox cmd response data (56 bytes)
27,171,954 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,201,867 UART: [rt]cmd =0x52435458, len=8
27,203,849 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,720 UART: [state] LifecycleState = Unprovisioned
85,375 UART: [state] DebugLocked = No
85,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,557 UART: [kat] SHA2-256
881,488 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,603 UART: [kat] ++
885,755 UART: [kat] sha1
890,067 UART: [kat] SHA2-256
892,005 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,238 UART: [kat] HMAC-384Kdf
906,740 UART: [kat] LMS
1,474,936 UART: [kat] --
1,475,815 UART: [cold-reset] ++
1,476,347 UART: [fht] Storing FHT @ 0x50003400
1,479,248 UART: [idev] ++
1,479,416 UART: [idev] CDI.KEYID = 6
1,479,776 UART: [idev] SUBJECT.KEYID = 7
1,480,200 UART: [idev] UDS.KEYID = 0
1,480,545 ready_for_fw is high
1,480,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,160 UART: [idev] Erasing UDS.KEYID = 0
1,505,180 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,714 UART: [idev] --
1,514,683 UART: [ldev] ++
1,514,851 UART: [ldev] CDI.KEYID = 6
1,515,214 UART: [ldev] SUBJECT.KEYID = 5
1,515,640 UART: [ldev] AUTHORITY.KEYID = 7
1,516,103 UART: [ldev] FE.KEYID = 1
1,521,145 UART: [ldev] Erasing FE.KEYID = 1
1,546,316 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,992 UART: [ldev] --
1,585,415 UART: [fwproc] Waiting for Commands...
1,586,094 UART: [fwproc] Received command 0x46574c44
1,586,885 UART: [fwproc] Received Image of size 118548 bytes
2,932,745 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,825 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,043 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,398 >>> mbox cmd response: success
3,131,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,430 UART: [afmc] ++
3,132,598 UART: [afmc] CDI.KEYID = 6
3,132,960 UART: [afmc] SUBJECT.KEYID = 7
3,133,385 UART: [afmc] AUTHORITY.KEYID = 5
3,168,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,232 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,721 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,604 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,287 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,349 UART: [afmc] --
3,211,385 UART: [cold-reset] --
3,212,001 UART: [state] Locking Datavault
3,213,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,836 UART: [state] Locking ICCM
3,214,338 UART: [exit] Launching FMC @ 0x40000130
3,219,668 UART:
3,219,684 UART: Running Caliptra FMC ...
3,220,092 UART:
3,220,146 UART: [state] CFI Enabled
3,230,698 UART: [fht] FMC Alias Private Key: 7
3,349,456 UART: [art] Extend RT PCRs Done
3,349,884 UART: [art] Lock RT PCRs Done
3,351,338 UART: [art] Populate DV Done
3,359,545 UART: [fht] FMC Alias Private Key: 7
3,360,543 UART: [art] Derive CDI
3,360,823 UART: [art] Store in slot 0x4
3,446,407 UART: [art] Derive Key Pair
3,446,767 UART: [art] Store priv key in slot 0x5
3,459,906 UART: [art] Derive Key Pair - Done
3,474,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,592 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,357 UART: [art] PUB.X = 4E43BEF13F6D1EAB7110E393389E67AFB939849C1E6688C1718497D8AB0EFB02F574BC260D4C47933BBA217FA1A3F9E0
3,497,128 UART: [art] PUB.Y = 1E983166782638B036E7A1FFEAF9DE8EDA0130B7C0015F75BFC5DB1CEE5F81EAA864EC76B7D75650661E768338B8AB5F
3,504,086 UART: [art] SIG.R = FD813C42718AD4B3DE3C639212B5E0A273021CF2D23A8E427D1FB2F5302DF95E9E52856948405FE0569627A96A04C891
3,510,848 UART: [art] SIG.S = 9629F23E73DF8DDE21B4815F17ED7B9CCBB28030466A41B445E22EA29CDD9FE63E870EB7D4BED9B73B0CEB942D15ED43
3,534,646 UART: Caliptra RT
3,534,897 UART: [state] CFI Enabled
3,656,386 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,532 UART: [rt]cmd =0x44504543, len=96
3,720,368 >>> mbox cmd response data (56 bytes)
3,720,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,750,440 UART: [rt]cmd =0x44504543, len=96
3,783,592 >>> mbox cmd response data (56 bytes)
3,783,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,813,714 UART: [rt]cmd =0x44504543, len=96
3,845,203 >>> mbox cmd response data (56 bytes)
3,845,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,875,101 UART: [rt]cmd =0x44504543, len=96
3,908,617 >>> mbox cmd response data (56 bytes)
3,908,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,721 UART: [rt]cmd =0x44504543, len=96
3,971,942 >>> mbox cmd response data (56 bytes)
3,971,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,002,122 UART: [rt]cmd =0x44504543, len=96
4,035,400 >>> mbox cmd response data (56 bytes)
4,035,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,065,274 UART: [rt]cmd =0x44504543, len=96
4,098,611 >>> mbox cmd response data (56 bytes)
4,098,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,423 UART: [rt]cmd =0x44504543, len=96
4,161,063 >>> mbox cmd response data (56 bytes)
4,161,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,190,927 UART: [rt]cmd =0x44504543, len=96
4,223,406 >>> mbox cmd response data (56 bytes)
4,223,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,318 UART: [rt]cmd =0x44504543, len=96
4,285,986 >>> mbox cmd response data (56 bytes)
4,285,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,746 UART: [rt]cmd =0x44504543, len=96
4,348,931 >>> mbox cmd response data (56 bytes)
4,348,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,378,799 UART: [rt]cmd =0x44504543, len=96
4,411,983 >>> mbox cmd response data (56 bytes)
4,411,984 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,495 UART: [rt]cmd =0x52435458, len=8
4,443,028 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,339 ready_for_fw is high
1,362,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,242 >>> mbox cmd response: success
2,980,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,709 UART:
3,041,725 UART: Running Caliptra FMC ...
3,042,133 UART:
3,042,187 UART: [state] CFI Enabled
3,052,609 UART: [fht] FMC Alias Private Key: 7
3,171,321 UART: [art] Extend RT PCRs Done
3,171,749 UART: [art] Lock RT PCRs Done
3,173,439 UART: [art] Populate DV Done
3,181,852 UART: [fht] FMC Alias Private Key: 7
3,182,844 UART: [art] Derive CDI
3,183,124 UART: [art] Store in slot 0x4
3,268,896 UART: [art] Derive Key Pair
3,269,256 UART: [art] Store priv key in slot 0x5
3,282,795 UART: [art] Derive Key Pair - Done
3,297,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,369 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,134 UART: [art] PUB.X = CC5E0E25C76D940F1437DFA04CB2FB4B23AA75BF41E2860CF095FFCC9563B67936BD659977FC532324D0B8B6AA47E648
3,320,907 UART: [art] PUB.Y = ABB1ADD98E54D1643AF6A5D98C68ACB73A3361DE3B3801D4120226FB4C5519DC58D2C28653459EEBE95F8049F27FB238
3,327,861 UART: [art] SIG.R = BA3D6BDCA5969F346DDD42B0D2B0A64513787715466546794F8063DDD491954A6065062AC993FCA20151FF643675DE40
3,334,621 UART: [art] SIG.S = FC91A81E265D9AF2E9AFF453EFDC43175526691C7FE086DB64FFF3CA58492C322691FDC857951D716137A8C594404B3C
3,358,615 UART: Caliptra RT
3,358,866 UART: [state] CFI Enabled
3,478,585 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,605 UART: [rt]cmd =0x44504543, len=96
3,542,475 >>> mbox cmd response data (56 bytes)
3,542,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,559 UART: [rt]cmd =0x44504543, len=96
3,605,399 >>> mbox cmd response data (56 bytes)
3,605,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,341 UART: [rt]cmd =0x44504543, len=96
3,668,084 >>> mbox cmd response data (56 bytes)
3,668,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,900 UART: [rt]cmd =0x44504543, len=96
3,731,344 >>> mbox cmd response data (56 bytes)
3,731,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,498 UART: [rt]cmd =0x44504543, len=96
3,794,529 >>> mbox cmd response data (56 bytes)
3,794,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,275 UART: [rt]cmd =0x44504543, len=96
3,856,921 >>> mbox cmd response data (56 bytes)
3,856,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,683 UART: [rt]cmd =0x44504543, len=96
3,919,278 >>> mbox cmd response data (56 bytes)
3,919,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,032 UART: [rt]cmd =0x44504543, len=96
3,981,386 >>> mbox cmd response data (56 bytes)
3,981,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,314 UART: [rt]cmd =0x44504543, len=96
4,044,389 >>> mbox cmd response data (56 bytes)
4,044,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,074,297 UART: [rt]cmd =0x44504543, len=96
4,107,055 >>> mbox cmd response data (56 bytes)
4,107,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,949 UART: [rt]cmd =0x44504543, len=96
4,169,906 >>> mbox cmd response data (56 bytes)
4,169,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,199,660 UART: [rt]cmd =0x44504543, len=96
4,232,528 >>> mbox cmd response data (56 bytes)
4,232,529 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,261,850 UART: [rt]cmd =0x52435458, len=8
4,263,305 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,808 UART: [kat] SHA2-256
881,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,854 UART: [kat] ++
886,006 UART: [kat] sha1
890,038 UART: [kat] SHA2-256
891,976 UART: [kat] SHA2-384
894,683 UART: [kat] SHA2-512-ACC
896,584 UART: [kat] ECC-384
902,413 UART: [kat] HMAC-384Kdf
906,867 UART: [kat] LMS
1,475,063 UART: [kat] --
1,475,868 UART: [cold-reset] ++
1,476,338 UART: [fht] Storing FHT @ 0x50003400
1,479,171 UART: [idev] ++
1,479,339 UART: [idev] CDI.KEYID = 6
1,479,699 UART: [idev] SUBJECT.KEYID = 7
1,480,123 UART: [idev] UDS.KEYID = 0
1,480,468 ready_for_fw is high
1,480,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,395 UART: [idev] Erasing UDS.KEYID = 0
1,505,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,235 UART: [idev] --
1,515,396 UART: [ldev] ++
1,515,564 UART: [ldev] CDI.KEYID = 6
1,515,927 UART: [ldev] SUBJECT.KEYID = 5
1,516,353 UART: [ldev] AUTHORITY.KEYID = 7
1,516,816 UART: [ldev] FE.KEYID = 1
1,521,754 UART: [ldev] Erasing FE.KEYID = 1
1,547,401 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,509 UART: [ldev] --
1,586,830 UART: [fwproc] Waiting for Commands...
1,587,491 UART: [fwproc] Received command 0x46574c44
1,588,282 UART: [fwproc] Received Image of size 118548 bytes
2,932,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,384 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,602 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,963 >>> mbox cmd response: success
3,131,963 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,133,107 UART: [afmc] ++
3,133,275 UART: [afmc] CDI.KEYID = 6
3,133,637 UART: [afmc] SUBJECT.KEYID = 7
3,134,062 UART: [afmc] AUTHORITY.KEYID = 5
3,169,581 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,789 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,569 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,278 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,161 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,844 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,562 UART: [afmc] --
3,212,620 UART: [cold-reset] --
3,213,300 UART: [state] Locking Datavault
3,214,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,075 UART: [state] Locking ICCM
3,215,529 UART: [exit] Launching FMC @ 0x40000130
3,220,859 UART:
3,220,875 UART: Running Caliptra FMC ...
3,221,283 UART:
3,221,426 UART: [state] CFI Enabled
3,231,634 UART: [fht] FMC Alias Private Key: 7
3,350,494 UART: [art] Extend RT PCRs Done
3,350,922 UART: [art] Lock RT PCRs Done
3,352,438 UART: [art] Populate DV Done
3,360,805 UART: [fht] FMC Alias Private Key: 7
3,361,809 UART: [art] Derive CDI
3,362,089 UART: [art] Store in slot 0x4
3,447,867 UART: [art] Derive Key Pair
3,448,227 UART: [art] Store priv key in slot 0x5
3,461,676 UART: [art] Derive Key Pair - Done
3,476,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,035 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,800 UART: [art] PUB.X = EE2137955363AB4AB59839BEC6730F8B1618F73667A08AA15014396D8F2852D8883CF315C8F2646C381306045DDD21A7
3,499,553 UART: [art] PUB.Y = EDC73C5B7FCAD5D14C55D8EFAE80837561FF8BAF3412E2CC8964A9C184510283839B6ACB8E1C9C6D9FEC9294E636F150
3,506,516 UART: [art] SIG.R = 14D66B8086ACE265A6ABF7B56FD2DA93E8500002D86E73C72585482C4700D2A41842655E41871D54B7E6CE36D147B64B
3,513,237 UART: [art] SIG.S = 2FFAF353B900FD5A4905A0D97DEC09A5CE5E0C12387455A5D44E597BAC756111BC25A9554FDA5F333F57253C41B36DA2
3,536,854 UART: Caliptra RT
3,537,197 UART: [state] CFI Enabled
3,657,642 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,766 UART: [rt]cmd =0x44504543, len=96
3,721,776 >>> mbox cmd response data (56 bytes)
3,721,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,858 UART: [rt]cmd =0x44504543, len=96
3,784,326 >>> mbox cmd response data (56 bytes)
3,784,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,268 UART: [rt]cmd =0x44504543, len=96
3,845,951 >>> mbox cmd response data (56 bytes)
3,845,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,876,009 UART: [rt]cmd =0x44504543, len=96
3,908,405 >>> mbox cmd response data (56 bytes)
3,908,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,938,509 UART: [rt]cmd =0x44504543, len=96
3,971,578 >>> mbox cmd response data (56 bytes)
3,971,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,824 UART: [rt]cmd =0x44504543, len=96
4,034,574 >>> mbox cmd response data (56 bytes)
4,034,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,064,698 UART: [rt]cmd =0x44504543, len=96
4,097,983 >>> mbox cmd response data (56 bytes)
4,097,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,029 UART: [rt]cmd =0x44504543, len=96
4,160,613 >>> mbox cmd response data (56 bytes)
4,160,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,190,535 UART: [rt]cmd =0x44504543, len=96
4,223,218 >>> mbox cmd response data (56 bytes)
4,223,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,253,298 UART: [rt]cmd =0x44504543, len=96
4,286,306 >>> mbox cmd response data (56 bytes)
4,286,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,316,110 UART: [rt]cmd =0x44504543, len=96
4,349,595 >>> mbox cmd response data (56 bytes)
4,349,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,379,335 UART: [rt]cmd =0x44504543, len=96
4,411,945 >>> mbox cmd response data (56 bytes)
4,411,946 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,441,531 UART: [rt]cmd =0x52435458, len=8
4,442,948 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,406 ready_for_fw is high
1,362,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,573 >>> mbox cmd response: success
2,980,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,562 UART:
3,042,578 UART: Running Caliptra FMC ...
3,042,986 UART:
3,043,129 UART: [state] CFI Enabled
3,053,693 UART: [fht] FMC Alias Private Key: 7
3,172,861 UART: [art] Extend RT PCRs Done
3,173,289 UART: [art] Lock RT PCRs Done
3,174,927 UART: [art] Populate DV Done
3,183,076 UART: [fht] FMC Alias Private Key: 7
3,184,188 UART: [art] Derive CDI
3,184,468 UART: [art] Store in slot 0x4
3,270,758 UART: [art] Derive Key Pair
3,271,118 UART: [art] Store priv key in slot 0x5
3,284,365 UART: [art] Derive Key Pair - Done
3,299,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,615 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,380 UART: [art] PUB.X = 5CA8F459E7A9FFC21444E3E2B243D0C55FDF253406D574E1AA856C27ED2678A7F863DD42AD550A85DDC5502F5F60A200
3,322,132 UART: [art] PUB.Y = 194DC2AF36D24D61B7E32A3DEE3EA60BF46F2FD0621B69E8E8EDDE680B765BBACD27AA65714DBBCECAC8B35892B3E0BB
3,329,108 UART: [art] SIG.R = 077A172295F540ACAFAA48205BE5C5B87141DD795766B86A4BA12D13810DE9C618D5C95DF632F62911C6F349CA50FCF8
3,335,878 UART: [art] SIG.S = 50ABD71B5C652C28C4486E6ECC0B8A07670CFD6CE13E2A838449C98A2F40F2D60C2FD938041D4D5826EBEBD0DB06E1EA
3,360,186 UART: Caliptra RT
3,360,529 UART: [state] CFI Enabled
3,481,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,374 UART: [rt]cmd =0x44504543, len=96
3,544,502 >>> mbox cmd response data (56 bytes)
3,544,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,348 UART: [rt]cmd =0x44504543, len=96
3,607,516 >>> mbox cmd response data (56 bytes)
3,607,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,464 UART: [rt]cmd =0x44504543, len=96
3,670,051 >>> mbox cmd response data (56 bytes)
3,670,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,169 UART: [rt]cmd =0x44504543, len=96
3,733,585 >>> mbox cmd response data (56 bytes)
3,733,586 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,607 UART: [rt]cmd =0x44504543, len=96
3,796,310 >>> mbox cmd response data (56 bytes)
3,796,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,346 UART: [rt]cmd =0x44504543, len=96
3,858,982 >>> mbox cmd response data (56 bytes)
3,858,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,934 UART: [rt]cmd =0x44504543, len=96
3,922,483 >>> mbox cmd response data (56 bytes)
3,922,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,952,333 UART: [rt]cmd =0x44504543, len=96
3,986,541 >>> mbox cmd response data (56 bytes)
3,986,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,371 UART: [rt]cmd =0x44504543, len=96
4,049,544 >>> mbox cmd response data (56 bytes)
4,049,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,079,414 UART: [rt]cmd =0x44504543, len=96
4,112,034 >>> mbox cmd response data (56 bytes)
4,112,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,834 UART: [rt]cmd =0x44504543, len=96
4,174,677 >>> mbox cmd response data (56 bytes)
4,174,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,204,633 UART: [rt]cmd =0x44504543, len=96
4,237,907 >>> mbox cmd response data (56 bytes)
4,237,908 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,267,227 UART: [rt]cmd =0x52435458, len=8
4,268,576 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,640 UART: [kat] SHA2-256
891,190 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,294 UART: [kat] ++
895,446 UART: [kat] sha1
899,794 UART: [kat] SHA2-256
901,734 UART: [kat] SHA2-384
904,587 UART: [kat] SHA2-512-ACC
906,488 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,605 UART: [kat] LMS
1,168,917 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,332 UART: [fht] FHT @ 0x50003400
1,172,942 UART: [idev] ++
1,173,110 UART: [idev] CDI.KEYID = 6
1,173,471 UART: [idev] SUBJECT.KEYID = 7
1,173,896 UART: [idev] UDS.KEYID = 0
1,174,242 ready_for_fw is high
1,174,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,198,811 UART: [idev] Sha1 KeyId Algorithm
1,207,499 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,214,992 UART: [ldev] Erasing FE.KEYID = 1
1,241,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,922 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,096 UART: [ldev] --
1,280,527 UART: [fwproc] Wait for Commands...
1,281,278 UART: [fwproc] Recv command 0x46574c44
1,282,011 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,705 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,880 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,247 >>> mbox cmd response: success
2,824,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,413 UART: [afmc] ++
2,825,581 UART: [afmc] CDI.KEYID = 6
2,825,944 UART: [afmc] SUBJECT.KEYID = 7
2,826,370 UART: [afmc] AUTHORITY.KEYID = 5
2,861,471 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,116 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,654 UART: [afmc] --
2,904,599 UART: [cold-reset] --
2,905,519 UART: [state] Locking Datavault
2,906,728 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,332 UART: [state] Locking ICCM
2,907,756 UART: [exit] Launching FMC @ 0x40000130
2,913,086 UART:
2,913,102 UART: Running Caliptra FMC ...
2,913,510 UART:
2,913,564 UART: [state] CFI Enabled
2,924,128 UART: [fht] FMC Alias Private Key: 7
3,043,936 UART: [art] Extend RT PCRs Done
3,044,364 UART: [art] Lock RT PCRs Done
3,045,910 UART: [art] Populate DV Done
3,054,251 UART: [fht] FMC Alias Private Key: 7
3,055,219 UART: [art] Derive CDI
3,055,499 UART: [art] Store in slot 0x4
3,141,216 UART: [art] Derive Key Pair
3,141,576 UART: [art] Store priv key in slot 0x5
3,154,490 UART: [art] Derive Key Pair - Done
3,168,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,313 UART: [art] PUB.X = 9E4C028D209EA837B34F63C3C3283FE1BC95A664FCF413EF776B1BB9FA8658B37CF1C4EAB4AB9AE59C6985652084E9C3
3,192,094 UART: [art] PUB.Y = 02445828D687D0ECCCABA84D2CFC225CF2A94C51DA2EBD492298CC8FDC31C5C34C699BF4F99E7A050F987D77550A81C3
3,199,048 UART: [art] SIG.R = 59518A4DE13FB11E67467B3F37834A4B77C1E100322BAC485103D381FB310374F02E3E3A41FF1D5D958B3DA64D27FB1F
3,205,794 UART: [art] SIG.S = 52F2985ABE5461F41D8F9996DFDBC2A854336F3D71036E29DF034B9E634C2D93D730819FB4FC0E18C857243D58C90568
3,228,938 UART: Caliptra RT
3,229,189 UART: [state] CFI Enabled
3,348,083 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,947 UART: [rt]cmd =0x44504543, len=96
3,412,525 >>> mbox cmd response data (56 bytes)
3,412,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,297 UART: [rt]cmd =0x44504543, len=96
3,474,931 >>> mbox cmd response data (56 bytes)
3,474,932 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,504,963 UART: [rt]cmd =0x44504543, len=96
3,537,498 >>> mbox cmd response data (56 bytes)
3,537,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,438 UART: [rt]cmd =0x44504543, len=96
3,600,506 >>> mbox cmd response data (56 bytes)
3,600,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,630,400 UART: [rt]cmd =0x44504543, len=96
3,663,243 >>> mbox cmd response data (56 bytes)
3,663,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,269 UART: [rt]cmd =0x44504543, len=96
3,726,831 >>> mbox cmd response data (56 bytes)
3,726,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,756,697 UART: [rt]cmd =0x44504543, len=96
3,790,278 >>> mbox cmd response data (56 bytes)
3,790,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,164 UART: [rt]cmd =0x44504543, len=96
3,853,370 >>> mbox cmd response data (56 bytes)
3,853,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,212 UART: [rt]cmd =0x44504543, len=96
3,915,477 >>> mbox cmd response data (56 bytes)
3,915,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,589 UART: [rt]cmd =0x44504543, len=96
3,978,609 >>> mbox cmd response data (56 bytes)
3,978,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,639 UART: [rt]cmd =0x44504543, len=96
4,041,668 >>> mbox cmd response data (56 bytes)
4,041,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,548 UART: [rt]cmd =0x44504543, len=96
4,104,856 >>> mbox cmd response data (56 bytes)
4,104,857 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,134,112 UART: [rt]cmd =0x52435458, len=8
4,135,655 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,612 ready_for_fw is high
1,059,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,815 >>> mbox cmd response: success
2,679,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,580 UART:
2,741,596 UART: Running Caliptra FMC ...
2,742,004 UART:
2,742,058 UART: [state] CFI Enabled
2,752,704 UART: [fht] FMC Alias Private Key: 7
2,871,330 UART: [art] Extend RT PCRs Done
2,871,758 UART: [art] Lock RT PCRs Done
2,873,390 UART: [art] Populate DV Done
2,881,505 UART: [fht] FMC Alias Private Key: 7
2,882,521 UART: [art] Derive CDI
2,882,801 UART: [art] Store in slot 0x4
2,968,338 UART: [art] Derive Key Pair
2,968,698 UART: [art] Store priv key in slot 0x5
2,981,818 UART: [art] Derive Key Pair - Done
2,996,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,315 UART: [art] PUB.X = EE593103C9744F468135C35F2779DB8B51D1EC05196C5E1A5D4791F374EA9E7D706D32D449A8C024E53239268D69491E
3,019,073 UART: [art] PUB.Y = D8B4031A6B21CBEC35A16F26F159C289384C3A8E8917DE00ECF6598D6D55EE022E3C1052CCCF0E0C21CE9FF6ADAFA2DB
3,026,013 UART: [art] SIG.R = FBF84A8866E70D6E44F1ED5EFF693A0606BE5FD19BED6DAB1B2E141ED87219D9774ED15BA74E8137D4745387C5FAB033
3,032,790 UART: [art] SIG.S = 55157D517DDEF8C4DEA8637AC095707008F920825303891BF5CDE90248981524FAAA61877958290FC9A331A31FF5F5C3
3,057,030 UART: Caliptra RT
3,057,281 UART: [state] CFI Enabled
3,177,046 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,076 UART: [rt]cmd =0x44504543, len=96
3,241,042 >>> mbox cmd response data (56 bytes)
3,241,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,018 UART: [rt]cmd =0x44504543, len=96
3,304,294 >>> mbox cmd response data (56 bytes)
3,304,295 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,322 UART: [rt]cmd =0x44504543, len=96
3,367,467 >>> mbox cmd response data (56 bytes)
3,367,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,503 UART: [rt]cmd =0x44504543, len=96
3,430,005 >>> mbox cmd response data (56 bytes)
3,430,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,979 UART: [rt]cmd =0x44504543, len=96
3,493,106 >>> mbox cmd response data (56 bytes)
3,493,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,136 UART: [rt]cmd =0x44504543, len=96
3,556,244 >>> mbox cmd response data (56 bytes)
3,556,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,856 UART: [rt]cmd =0x44504543, len=96
3,619,131 >>> mbox cmd response data (56 bytes)
3,619,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,011 UART: [rt]cmd =0x44504543, len=96
3,682,739 >>> mbox cmd response data (56 bytes)
3,682,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,793 UART: [rt]cmd =0x44504543, len=96
3,745,694 >>> mbox cmd response data (56 bytes)
3,745,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,834 UART: [rt]cmd =0x44504543, len=96
3,808,394 >>> mbox cmd response data (56 bytes)
3,808,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,620 UART: [rt]cmd =0x44504543, len=96
3,871,707 >>> mbox cmd response data (56 bytes)
3,871,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,677 UART: [rt]cmd =0x44504543, len=96
3,934,669 >>> mbox cmd response data (56 bytes)
3,934,670 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,095 UART: [rt]cmd =0x52435458, len=8
3,965,676 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,466 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,482 UART: [kat] SHA2-512-ACC
906,383 UART: [kat] ECC-384
916,030 UART: [kat] HMAC-384Kdf
920,718 UART: [kat] LMS
1,169,030 UART: [kat] --
1,169,857 UART: [cold-reset] ++
1,170,199 UART: [fht] FHT @ 0x50003400
1,172,869 UART: [idev] ++
1,173,037 UART: [idev] CDI.KEYID = 6
1,173,398 UART: [idev] SUBJECT.KEYID = 7
1,173,823 UART: [idev] UDS.KEYID = 0
1,174,169 ready_for_fw is high
1,174,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,458 UART: [idev] Erasing UDS.KEYID = 0
1,197,830 UART: [idev] Sha1 KeyId Algorithm
1,206,756 UART: [idev] --
1,207,947 UART: [ldev] ++
1,208,115 UART: [ldev] CDI.KEYID = 6
1,208,479 UART: [ldev] SUBJECT.KEYID = 5
1,208,906 UART: [ldev] AUTHORITY.KEYID = 7
1,209,369 UART: [ldev] FE.KEYID = 1
1,214,509 UART: [ldev] Erasing FE.KEYID = 1
1,240,774 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,198 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,389 UART: [ldev] --
1,279,794 UART: [fwproc] Wait for Commands...
1,280,459 UART: [fwproc] Recv command 0x46574c44
1,281,192 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,539 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,726 >>> mbox cmd response: success
2,824,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,926 UART: [afmc] ++
2,826,094 UART: [afmc] CDI.KEYID = 6
2,826,457 UART: [afmc] SUBJECT.KEYID = 7
2,826,883 UART: [afmc] AUTHORITY.KEYID = 5
2,862,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,968 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,559 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,035 UART: [afmc] --
2,906,056 UART: [cold-reset] --
2,906,930 UART: [state] Locking Datavault
2,907,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,477 UART: [state] Locking ICCM
2,909,051 UART: [exit] Launching FMC @ 0x40000130
2,914,381 UART:
2,914,397 UART: Running Caliptra FMC ...
2,914,805 UART:
2,914,948 UART: [state] CFI Enabled
2,925,554 UART: [fht] FMC Alias Private Key: 7
3,045,072 UART: [art] Extend RT PCRs Done
3,045,500 UART: [art] Lock RT PCRs Done
3,046,980 UART: [art] Populate DV Done
3,055,267 UART: [fht] FMC Alias Private Key: 7
3,056,211 UART: [art] Derive CDI
3,056,491 UART: [art] Store in slot 0x4
3,142,474 UART: [art] Derive Key Pair
3,142,834 UART: [art] Store priv key in slot 0x5
3,155,930 UART: [art] Derive Key Pair - Done
3,170,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,708 UART: [art] PUB.X = B48A23222289532AF11531E4FFFDC096168CA0C34A93EC66A793F105BFDE90C566368C0CDA626EAEFC0CD0EAEEB13017
3,193,485 UART: [art] PUB.Y = E363251DA289804D4F6A1251CD863FDA6FCE8795E904F2FD55DFE594986BD8F862A083A7D15165DD79F130D7C82AED04
3,200,437 UART: [art] SIG.R = 01045C10FD9835D2E65F40C3499C21DD692F923E0A98D34C1B9CE3874F91BCBF58A9E7E019E3BD7E6E8B75B0CD93E6F7
3,207,210 UART: [art] SIG.S = BAFCA772EAFF7B3EC97CC103B490EC83CABABE78A91C58B1645BC6807D7912F2996D68B4700245C04CEA4F41E1F72AAD
3,230,882 UART: Caliptra RT
3,231,225 UART: [state] CFI Enabled
3,352,416 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,250 UART: [rt]cmd =0x44504543, len=96
3,415,418 >>> mbox cmd response data (56 bytes)
3,415,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,468 UART: [rt]cmd =0x44504543, len=96
3,478,604 >>> mbox cmd response data (56 bytes)
3,478,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,676 UART: [rt]cmd =0x44504543, len=96
3,541,565 >>> mbox cmd response data (56 bytes)
3,541,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,723 UART: [rt]cmd =0x44504543, len=96
3,604,399 >>> mbox cmd response data (56 bytes)
3,604,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,375 UART: [rt]cmd =0x44504543, len=96
3,667,630 >>> mbox cmd response data (56 bytes)
3,667,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,506 UART: [rt]cmd =0x44504543, len=96
3,729,964 >>> mbox cmd response data (56 bytes)
3,729,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,980 UART: [rt]cmd =0x44504543, len=96
3,793,133 >>> mbox cmd response data (56 bytes)
3,793,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,113 UART: [rt]cmd =0x44504543, len=96
3,856,339 >>> mbox cmd response data (56 bytes)
3,856,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,467 UART: [rt]cmd =0x44504543, len=96
3,919,720 >>> mbox cmd response data (56 bytes)
3,919,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,706 UART: [rt]cmd =0x44504543, len=96
3,982,802 >>> mbox cmd response data (56 bytes)
3,982,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,986 UART: [rt]cmd =0x44504543, len=96
4,045,847 >>> mbox cmd response data (56 bytes)
4,045,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,919 UART: [rt]cmd =0x44504543, len=96
4,109,173 >>> mbox cmd response data (56 bytes)
4,109,174 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,517 UART: [rt]cmd =0x52435458, len=8
4,139,990 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,325 ready_for_fw is high
1,059,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,257 >>> mbox cmd response: success
2,679,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,344 UART:
2,741,360 UART: Running Caliptra FMC ...
2,741,768 UART:
2,741,911 UART: [state] CFI Enabled
2,752,847 UART: [fht] FMC Alias Private Key: 7
2,872,491 UART: [art] Extend RT PCRs Done
2,872,919 UART: [art] Lock RT PCRs Done
2,874,303 UART: [art] Populate DV Done
2,882,782 UART: [fht] FMC Alias Private Key: 7
2,883,836 UART: [art] Derive CDI
2,884,116 UART: [art] Store in slot 0x4
2,970,087 UART: [art] Derive Key Pair
2,970,447 UART: [art] Store priv key in slot 0x5
2,983,835 UART: [art] Derive Key Pair - Done
2,998,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,832 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,597 UART: [art] PUB.X = CA1C5AF2C61C84D4B3CD10E186194D0A7E993841945187554636CB7D6F29206140E84AE6899C428AF86ECC78790A79A6
3,022,359 UART: [art] PUB.Y = 1A7DA810708E368947B16B4DC0CDBFAC3BD9B364A80ED6E9E7F6B6A87A99CEB5FF4EF8C62CE7D52CC91810C1B0F75F31
3,029,330 UART: [art] SIG.R = D3FC36D3A70FA2BAB2D8DAFB0D5DDA4C58B040EFB940FDD0E8A9DCFB2E0C256D8FEBD91A9D2C0C0AD442A9A94DCE63C9
3,036,127 UART: [art] SIG.S = 89D2BC3FCBC75C8B2C38E47301F0DD9C8706A20EEDD605D332B726A6457BF6493FF48D4E13D51C90C3E71390A73DD052
3,060,917 UART: Caliptra RT
3,061,260 UART: [state] CFI Enabled
3,181,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,618 UART: [rt]cmd =0x44504543, len=96
3,244,678 >>> mbox cmd response data (56 bytes)
3,244,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,274,436 UART: [rt]cmd =0x44504543, len=96
3,306,864 >>> mbox cmd response data (56 bytes)
3,306,865 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,752 UART: [rt]cmd =0x44504543, len=96
3,370,199 >>> mbox cmd response data (56 bytes)
3,370,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,093 UART: [rt]cmd =0x44504543, len=96
3,432,953 >>> mbox cmd response data (56 bytes)
3,432,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,463,071 UART: [rt]cmd =0x44504543, len=96
3,495,938 >>> mbox cmd response data (56 bytes)
3,495,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,798 UART: [rt]cmd =0x44504543, len=96
3,558,396 >>> mbox cmd response data (56 bytes)
3,558,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,588,458 UART: [rt]cmd =0x44504543, len=96
3,621,057 >>> mbox cmd response data (56 bytes)
3,621,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,085 UART: [rt]cmd =0x44504543, len=96
3,683,845 >>> mbox cmd response data (56 bytes)
3,683,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,761 UART: [rt]cmd =0x44504543, len=96
3,747,210 >>> mbox cmd response data (56 bytes)
3,747,211 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,104 UART: [rt]cmd =0x44504543, len=96
3,810,270 >>> mbox cmd response data (56 bytes)
3,810,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,348 UART: [rt]cmd =0x44504543, len=96
3,873,119 >>> mbox cmd response data (56 bytes)
3,873,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,833 UART: [rt]cmd =0x44504543, len=96
3,936,115 >>> mbox cmd response data (56 bytes)
3,936,116 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,347 UART: [rt]cmd =0x52435458, len=8
3,966,946 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,200 UART: [state] LifecycleState = Unprovisioned
85,855 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
893,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,373 UART: [kat] ++
897,525 UART: [kat] sha1
901,539 UART: [kat] SHA2-256
903,479 UART: [kat] SHA2-384
906,160 UART: [kat] SHA2-512-ACC
908,061 UART: [kat] ECC-384
917,532 UART: [kat] HMAC-384Kdf
921,926 UART: [kat] LMS
1,170,254 UART: [kat] --
1,170,977 UART: [cold-reset] ++
1,171,423 UART: [fht] FHT @ 0x50003400
1,174,174 UART: [idev] ++
1,174,342 UART: [idev] CDI.KEYID = 6
1,174,702 UART: [idev] SUBJECT.KEYID = 7
1,175,126 UART: [idev] UDS.KEYID = 0
1,175,471 ready_for_fw is high
1,175,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,188 UART: [idev] Erasing UDS.KEYID = 0
1,200,349 UART: [idev] Sha1 KeyId Algorithm
1,208,855 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,450 UART: [ldev] SUBJECT.KEYID = 5
1,210,876 UART: [ldev] AUTHORITY.KEYID = 7
1,211,339 UART: [ldev] FE.KEYID = 1
1,216,523 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,513 UART: [ldev] --
1,281,910 UART: [fwproc] Wait for Commands...
1,282,614 UART: [fwproc] Recv command 0x46574c44
1,283,342 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,987 >>> mbox cmd response: success
2,826,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,141 UART: [afmc] ++
2,828,309 UART: [afmc] CDI.KEYID = 6
2,828,671 UART: [afmc] SUBJECT.KEYID = 7
2,829,096 UART: [afmc] AUTHORITY.KEYID = 5
2,863,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,618 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,366 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,958 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,659 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,411 UART: [afmc] --
2,907,411 UART: [cold-reset] --
2,908,429 UART: [state] Locking Datavault
2,909,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,076 UART: [state] Locking ICCM
2,910,504 UART: [exit] Launching FMC @ 0x40000130
2,915,834 UART:
2,915,850 UART: Running Caliptra FMC ...
2,916,258 UART:
2,916,312 UART: [state] CFI Enabled
2,927,006 UART: [fht] FMC Alias Private Key: 7
3,046,054 UART: [art] Extend RT PCRs Done
3,046,482 UART: [art] Lock RT PCRs Done
3,048,042 UART: [art] Populate DV Done
3,056,129 UART: [fht] FMC Alias Private Key: 7
3,057,085 UART: [art] Derive CDI
3,057,365 UART: [art] Store in slot 0x4
3,143,052 UART: [art] Derive Key Pair
3,143,412 UART: [art] Store priv key in slot 0x5
3,156,528 UART: [art] Derive Key Pair - Done
3,171,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,962 UART: [art] PUB.X = DA2C714A430227B0567F272BC88F0D76477390B9FEBDCF2DB0D25995C70D8EC992279F03A61CE06751C4410D07393D38
3,194,714 UART: [art] PUB.Y = 6635B74FD11297253F764E4222EC1CACA29BCF4BD860FBA4D94FD917152EF4FD1CC01C9DD836D49CFB192F45F50427E8
3,201,675 UART: [art] SIG.R = C285A9857F349DC56E3500CE5A9BFB428ADA86E78CB5E63968217B8B49012CB2E3907B301520CB67D0004E766FF69F4A
3,208,402 UART: [art] SIG.S = 14174A6310416C59B45FE2668C996E2655EEF842C316577C3F7C65B2360024988D366000E22729792E0E11C45D5E462F
3,232,459 UART: Caliptra RT
3,232,710 UART: [state] CFI Enabled
3,352,547 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,663 UART: [rt]cmd =0x44504543, len=96
3,417,409 >>> mbox cmd response data (56 bytes)
3,417,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,565 UART: [rt]cmd =0x44504543, len=96
3,480,363 >>> mbox cmd response data (56 bytes)
3,480,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,981 UART: [rt]cmd =0x44504543, len=96
3,542,778 >>> mbox cmd response data (56 bytes)
3,542,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,838 UART: [rt]cmd =0x44504543, len=96
3,605,756 >>> mbox cmd response data (56 bytes)
3,605,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,680 UART: [rt]cmd =0x44504543, len=96
3,668,503 >>> mbox cmd response data (56 bytes)
3,668,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,671 UART: [rt]cmd =0x44504543, len=96
3,731,789 >>> mbox cmd response data (56 bytes)
3,731,790 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,731 UART: [rt]cmd =0x44504543, len=96
3,794,394 >>> mbox cmd response data (56 bytes)
3,794,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,302 UART: [rt]cmd =0x44504543, len=96
3,857,400 >>> mbox cmd response data (56 bytes)
3,857,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,334 UART: [rt]cmd =0x44504543, len=96
3,919,727 >>> mbox cmd response data (56 bytes)
3,919,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,693 UART: [rt]cmd =0x44504543, len=96
3,982,655 >>> mbox cmd response data (56 bytes)
3,982,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,605 UART: [rt]cmd =0x44504543, len=96
4,045,646 >>> mbox cmd response data (56 bytes)
4,045,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,596 UART: [rt]cmd =0x44504543, len=96
4,108,528 >>> mbox cmd response data (56 bytes)
4,108,529 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,716 UART: [rt]cmd =0x52435458, len=8
4,139,373 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,341 ready_for_fw is high
1,060,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,430 >>> mbox cmd response: success
2,680,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,839 UART:
2,741,855 UART: Running Caliptra FMC ...
2,742,263 UART:
2,742,317 UART: [state] CFI Enabled
2,753,037 UART: [fht] FMC Alias Private Key: 7
2,871,459 UART: [art] Extend RT PCRs Done
2,871,887 UART: [art] Lock RT PCRs Done
2,873,633 UART: [art] Populate DV Done
2,882,028 UART: [fht] FMC Alias Private Key: 7
2,882,982 UART: [art] Derive CDI
2,883,262 UART: [art] Store in slot 0x4
2,968,855 UART: [art] Derive Key Pair
2,969,215 UART: [art] Store priv key in slot 0x5
2,982,597 UART: [art] Derive Key Pair - Done
2,997,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,746 UART: [art] PUB.X = 2145D8E94E209E8BF896373195DD2AB1E6F7B3158C27E36D9689FEBC8C599419FE7CDD5683819F4B99EE141715DC1B23
3,020,520 UART: [art] PUB.Y = 01BEBB3BEBB2F9782F2EA5073481432ADF890C27D2787CC1288893B2509E451FA8485F5600754982178467060E076EB5
3,027,422 UART: [art] SIG.R = 362D3C8D862EF3BCC95161D0A8C6AD95E82AFC2E0713AFDB990E66FF3A22E4170831ABD7FADF4BBAD18084097BFD320B
3,034,199 UART: [art] SIG.S = B30AFD2E81BD5822EFF5B3DD853C561362A73C791783C220A71CC3377F8A44EBD32F0A01216B25782E22911E35FA5955
3,058,342 UART: Caliptra RT
3,058,593 UART: [state] CFI Enabled
3,177,474 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,846 UART: [rt]cmd =0x44504543, len=96
3,241,378 >>> mbox cmd response data (56 bytes)
3,241,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,390 UART: [rt]cmd =0x44504543, len=96
3,304,570 >>> mbox cmd response data (56 bytes)
3,304,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,700 UART: [rt]cmd =0x44504543, len=96
3,367,965 >>> mbox cmd response data (56 bytes)
3,367,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,117 UART: [rt]cmd =0x44504543, len=96
3,431,469 >>> mbox cmd response data (56 bytes)
3,431,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,461 UART: [rt]cmd =0x44504543, len=96
3,494,014 >>> mbox cmd response data (56 bytes)
3,494,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,034 UART: [rt]cmd =0x44504543, len=96
3,556,860 >>> mbox cmd response data (56 bytes)
3,556,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,748 UART: [rt]cmd =0x44504543, len=96
3,619,803 >>> mbox cmd response data (56 bytes)
3,619,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,879 UART: [rt]cmd =0x44504543, len=96
3,683,259 >>> mbox cmd response data (56 bytes)
3,683,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,365 UART: [rt]cmd =0x44504543, len=96
3,746,712 >>> mbox cmd response data (56 bytes)
3,746,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,782 UART: [rt]cmd =0x44504543, len=96
3,809,936 >>> mbox cmd response data (56 bytes)
3,809,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,024 UART: [rt]cmd =0x44504543, len=96
3,873,549 >>> mbox cmd response data (56 bytes)
3,873,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,515 UART: [rt]cmd =0x44504543, len=96
3,935,903 >>> mbox cmd response data (56 bytes)
3,935,904 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,337 UART: [rt]cmd =0x52435458, len=8
3,966,816 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,631 UART: [state] LifecycleState = Unprovisioned
86,286 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
893,685 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,810 UART: [kat] ++
897,962 UART: [kat] sha1
902,048 UART: [kat] SHA2-256
903,988 UART: [kat] SHA2-384
906,943 UART: [kat] SHA2-512-ACC
908,844 UART: [kat] ECC-384
918,839 UART: [kat] HMAC-384Kdf
923,681 UART: [kat] LMS
1,172,009 UART: [kat] --
1,172,890 UART: [cold-reset] ++
1,173,270 UART: [fht] FHT @ 0x50003400
1,175,953 UART: [idev] ++
1,176,121 UART: [idev] CDI.KEYID = 6
1,176,481 UART: [idev] SUBJECT.KEYID = 7
1,176,905 UART: [idev] UDS.KEYID = 0
1,177,250 ready_for_fw is high
1,177,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,845 UART: [idev] Erasing UDS.KEYID = 0
1,201,898 UART: [idev] Sha1 KeyId Algorithm
1,210,322 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,888 UART: [ldev] --
1,283,361 UART: [fwproc] Wait for Commands...
1,284,167 UART: [fwproc] Recv command 0x46574c44
1,284,895 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,242 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,339 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,488 >>> mbox cmd response: success
2,826,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,556 UART: [afmc] ++
2,827,724 UART: [afmc] CDI.KEYID = 6
2,828,086 UART: [afmc] SUBJECT.KEYID = 7
2,828,511 UART: [afmc] AUTHORITY.KEYID = 5
2,864,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,599 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,347 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,056 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,939 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,640 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,586 UART: [afmc] --
2,907,588 UART: [cold-reset] --
2,908,496 UART: [state] Locking Datavault
2,909,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,531 UART: [state] Locking ICCM
2,911,153 UART: [exit] Launching FMC @ 0x40000130
2,916,483 UART:
2,916,499 UART: Running Caliptra FMC ...
2,916,907 UART:
2,917,050 UART: [state] CFI Enabled
2,927,404 UART: [fht] FMC Alias Private Key: 7
3,045,716 UART: [art] Extend RT PCRs Done
3,046,144 UART: [art] Lock RT PCRs Done
3,047,888 UART: [art] Populate DV Done
3,056,069 UART: [fht] FMC Alias Private Key: 7
3,057,239 UART: [art] Derive CDI
3,057,519 UART: [art] Store in slot 0x4
3,143,328 UART: [art] Derive Key Pair
3,143,688 UART: [art] Store priv key in slot 0x5
3,156,856 UART: [art] Derive Key Pair - Done
3,171,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,593 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,358 UART: [art] PUB.X = F6BD25E79EE703D8728EBC28492D4D0EB4D7BD5E6BE47D034CDDAACF9447036CAA8A79B87117F2D9C82E3A3931EC7345
3,194,134 UART: [art] PUB.Y = 481BE7CD803C90343B8274EEC03D13C5AB95E7A67E8E9FA659F724173058D42AF157446667EE6F87D57E98D280C14889
3,201,082 UART: [art] SIG.R = 116090BAD6C69CA83426989923D31F746A09463A2A241197B51E4345A7AADAD1A7474E5B67F4612ED89B347CBD2A3FF8
3,207,851 UART: [art] SIG.S = 0A53696A824A6A2772E081C07124F733ECFD100CDA251CE05353DCAAC8D0324159C64B63CABAD1DDA22FD20C9D33E934
3,231,842 UART: Caliptra RT
3,232,185 UART: [state] CFI Enabled
3,352,887 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,813 UART: [rt]cmd =0x44504543, len=96
3,416,947 >>> mbox cmd response data (56 bytes)
3,416,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,709 UART: [rt]cmd =0x44504543, len=96
3,479,495 >>> mbox cmd response data (56 bytes)
3,479,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,447 UART: [rt]cmd =0x44504543, len=96
3,542,208 >>> mbox cmd response data (56 bytes)
3,542,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,242 UART: [rt]cmd =0x44504543, len=96
3,605,090 >>> mbox cmd response data (56 bytes)
3,605,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,064 UART: [rt]cmd =0x44504543, len=96
3,667,793 >>> mbox cmd response data (56 bytes)
3,667,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,849 UART: [rt]cmd =0x44504543, len=96
3,730,543 >>> mbox cmd response data (56 bytes)
3,730,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,543 UART: [rt]cmd =0x44504543, len=96
3,792,566 >>> mbox cmd response data (56 bytes)
3,792,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,288 UART: [rt]cmd =0x44504543, len=96
3,855,272 >>> mbox cmd response data (56 bytes)
3,855,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,222 UART: [rt]cmd =0x44504543, len=96
3,918,633 >>> mbox cmd response data (56 bytes)
3,918,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,575 UART: [rt]cmd =0x44504543, len=96
3,981,849 >>> mbox cmd response data (56 bytes)
3,981,850 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,011,783 UART: [rt]cmd =0x44504543, len=96
4,045,094 >>> mbox cmd response data (56 bytes)
4,045,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,184 UART: [rt]cmd =0x44504543, len=96
4,108,384 >>> mbox cmd response data (56 bytes)
4,108,385 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,942 UART: [rt]cmd =0x52435458, len=8
4,139,431 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,332 ready_for_fw is high
1,061,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,697 >>> mbox cmd response: success
2,679,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,366 UART:
2,742,382 UART: Running Caliptra FMC ...
2,742,790 UART:
2,742,933 UART: [state] CFI Enabled
2,753,695 UART: [fht] FMC Alias Private Key: 7
2,872,407 UART: [art] Extend RT PCRs Done
2,872,835 UART: [art] Lock RT PCRs Done
2,874,203 UART: [art] Populate DV Done
2,882,380 UART: [fht] FMC Alias Private Key: 7
2,883,488 UART: [art] Derive CDI
2,883,768 UART: [art] Store in slot 0x4
2,969,513 UART: [art] Derive Key Pair
2,969,873 UART: [art] Store priv key in slot 0x5
2,983,273 UART: [art] Derive Key Pair - Done
2,998,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,734 UART: [art] PUB.X = 7BFC62FED54DA79F587392D2605E3172F4AEA37C3EEEC16532EFD17CB17491E24A97BE4D6729E57BB9F9940A6C115B87
3,021,513 UART: [art] PUB.Y = B0FF0763BEB54CF9761EAA04DDFAC13EF683F11CEA3229EF8EAF039C4EB331A5CB86C6EC500E31F123749D23E3FE6A99
3,028,475 UART: [art] SIG.R = BB5FA392EC421209E34B37F714A177D0847F0FEB793D61067954942A3B4718D43A0D5AAAA560F711790148B70C4B321D
3,035,225 UART: [art] SIG.S = F353701F75A7A59EFB521BD47050C1559BD43F1C3D648055896E0520AC30BEBA7B88F606E82606FE3FF1506768922B95
3,058,780 UART: Caliptra RT
3,059,123 UART: [state] CFI Enabled
3,177,509 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,409 UART: [rt]cmd =0x44504543, len=96
3,241,443 >>> mbox cmd response data (56 bytes)
3,241,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,225 UART: [rt]cmd =0x44504543, len=96
3,305,107 >>> mbox cmd response data (56 bytes)
3,305,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,173 UART: [rt]cmd =0x44504543, len=96
3,368,490 >>> mbox cmd response data (56 bytes)
3,368,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,496 UART: [rt]cmd =0x44504543, len=96
3,430,780 >>> mbox cmd response data (56 bytes)
3,430,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,918 UART: [rt]cmd =0x44504543, len=96
3,494,233 >>> mbox cmd response data (56 bytes)
3,494,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,989 UART: [rt]cmd =0x44504543, len=96
3,556,769 >>> mbox cmd response data (56 bytes)
3,556,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,775 UART: [rt]cmd =0x44504543, len=96
3,620,016 >>> mbox cmd response data (56 bytes)
3,620,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,848 UART: [rt]cmd =0x44504543, len=96
3,682,838 >>> mbox cmd response data (56 bytes)
3,682,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,816 UART: [rt]cmd =0x44504543, len=96
3,745,729 >>> mbox cmd response data (56 bytes)
3,745,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,577 UART: [rt]cmd =0x44504543, len=96
3,808,781 >>> mbox cmd response data (56 bytes)
3,808,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,705 UART: [rt]cmd =0x44504543, len=96
3,871,378 >>> mbox cmd response data (56 bytes)
3,871,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,278 UART: [rt]cmd =0x44504543, len=96
3,934,424 >>> mbox cmd response data (56 bytes)
3,934,425 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,726 UART: [rt]cmd =0x52435458, len=8
3,965,335 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl0_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,000 UART:
192,375 UART: Running Caliptra ROM ...
193,517 UART:
193,667 UART: [state] CFI Enabled
264,288 UART: [state] LifecycleState = Unprovisioned
266,287 UART: [state] DebugLocked = No
268,963 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,752 UART: [kat] SHA2-256
444,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,941 UART: [kat] ++
455,435 UART: [kat] sha1
466,241 UART: [kat] SHA2-256
468,968 UART: [kat] SHA2-384
475,168 UART: [kat] SHA2-512-ACC
477,534 UART: [kat] ECC-384
2,770,418 UART: [kat] HMAC-384Kdf
2,801,686 UART: [kat] LMS
3,992,005 UART: [kat] --
3,996,366 UART: [cold-reset] ++
3,997,797 UART: [fht] Storing FHT @ 0x50003400
4,009,359 UART: [idev] ++
4,009,964 UART: [idev] CDI.KEYID = 6
4,010,888 UART: [idev] SUBJECT.KEYID = 7
4,012,069 UART: [idev] UDS.KEYID = 0
4,013,055 ready_for_fw is high
4,013,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,229 UART: [idev] Erasing UDS.KEYID = 0
7,348,490 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,229 UART: [idev] --
7,374,610 UART: [ldev] ++
7,375,191 UART: [ldev] CDI.KEYID = 6
7,376,175 UART: [ldev] SUBJECT.KEYID = 5
7,377,391 UART: [ldev] AUTHORITY.KEYID = 7
7,378,623 UART: [ldev] FE.KEYID = 1
7,422,052 UART: [ldev] Erasing FE.KEYID = 1
10,758,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,820 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,630 UART: [ldev] --
13,134,718 UART: [fwproc] Waiting for Commands...
13,137,055 UART: [fwproc] Received command 0x46574c44
13,139,302 UART: [fwproc] Received Image of size 118548 bytes
17,244,881 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,319,014 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,392,179 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,721,215 >>> mbox cmd response: success
17,722,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,726,185 UART: [afmc] ++
17,726,766 UART: [afmc] CDI.KEYID = 6
17,727,784 UART: [afmc] SUBJECT.KEYID = 7
17,728,940 UART: [afmc] AUTHORITY.KEYID = 5
21,090,842 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,176 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,406,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,421,619 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,031 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,012 UART: [afmc] --
23,461,781 UART: [cold-reset] --
23,465,748 UART: [state] Locking Datavault
23,470,293 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,044 UART: [state] Locking ICCM
23,474,358 UART: [exit] Launching FMC @ 0x40000130
23,482,756 UART:
23,482,992 UART: Running Caliptra FMC ...
23,484,093 UART:
23,484,260 UART: [state] CFI Enabled
23,550,154 UART: [fht] FMC Alias Private Key: 7
25,891,173 UART: [art] Extend RT PCRs Done
25,892,400 UART: [art] Lock RT PCRs Done
25,894,079 UART: [art] Populate DV Done
25,899,386 UART: [fht] FMC Alias Private Key: 7
25,901,051 UART: [art] Derive CDI
25,901,865 UART: [art] Store in slot 0x4
25,958,874 UART: [art] Derive Key Pair
25,959,918 UART: [art] Store priv key in slot 0x5
29,252,443 UART: [art] Derive Key Pair - Done
29,265,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,773 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,280 UART: [art] PUB.X = E78049E1074FD005DA0C8168C1EDA3A3146F0CD42F2227C37E326ACC5ED9BA34E2377F1B3108E3A4BF4FB6A35A612CE7
31,562,521 UART: [art] PUB.Y = EAB1376B40B49160494DAEB34C26B062BD10EB2566EE3EDA50075E80DA3067FA5049AAFA2FAF96F9EA929AB6524C44DB
31,569,805 UART: [art] SIG.R = 90EE819680A6E712168F55238937675955435E13A7E5B6FDB545B987E9AC4A3593A8AE99519DF425F3FA8D31861D81E6
31,577,190 UART: [art] SIG.S = 90D7F97DC35F9BAD9DB86F68A3CDE2318E66BA24702AA399B5274C0D647A811C395DF3411B8844C95002D3B5113BCB97
32,882,427 UART: Caliptra RT
32,883,130 UART: [state] CFI Enabled
33,059,932 UART: [rt] RT listening for mailbox commands...
33,091,840 UART: [rt]cmd =0x44504543, len=96
33,123,974 >>> mbox cmd response data (56 bytes)
33,125,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,155,787 UART: [rt]cmd =0x44504543, len=96
33,187,651 >>> mbox cmd response data (56 bytes)
33,188,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,219,048 UART: [rt]cmd =0x44504543, len=96
33,251,043 >>> mbox cmd response data (56 bytes)
33,251,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,282,210 UART: [rt]cmd =0x44504543, len=96
33,313,997 >>> mbox cmd response data (56 bytes)
33,314,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,345,320 UART: [rt]cmd =0x44504543, len=96
33,376,726 >>> mbox cmd response data (56 bytes)
33,377,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,408,032 UART: [rt]cmd =0x44504543, len=96
33,439,725 >>> mbox cmd response data (56 bytes)
33,440,398 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,470,956 UART: [rt]cmd =0x44504543, len=96
33,503,121 >>> mbox cmd response data (56 bytes)
33,503,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,534,256 UART: [rt]cmd =0x44504543, len=96
33,566,140 >>> mbox cmd response data (56 bytes)
33,566,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,597,505 UART: [rt]cmd =0x44504543, len=96
33,629,485 >>> mbox cmd response data (56 bytes)
33,630,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,660,519 UART: [rt]cmd =0x44504543, len=96
33,692,951 >>> mbox cmd response data (56 bytes)
33,693,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,724,191 UART: [rt]cmd =0x44504543, len=96
33,755,989 >>> mbox cmd response data (56 bytes)
33,756,660 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,787,251 UART: [rt]cmd =0x44504543, len=96
33,818,780 >>> mbox cmd response data (56 bytes)
33,819,851 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,849,822 UART: [rt]cmd =0x52435458, len=8
33,851,628 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
3,805,671 ready_for_fw is high
3,806,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,978,094 >>> mbox cmd response: success
17,979,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,669,364 UART:
23,669,815 UART: Running Caliptra FMC ...
23,670,929 UART:
23,671,085 UART: [state] CFI Enabled
23,741,027 UART: [fht] FMC Alias Private Key: 7
26,081,903 UART: [art] Extend RT PCRs Done
26,083,142 UART: [art] Lock RT PCRs Done
26,084,883 UART: [art] Populate DV Done
26,090,414 UART: [fht] FMC Alias Private Key: 7
26,091,971 UART: [art] Derive CDI
26,092,790 UART: [art] Store in slot 0x4
26,149,115 UART: [art] Derive Key Pair
26,150,164 UART: [art] Store priv key in slot 0x5
29,442,971 UART: [art] Derive Key Pair - Done
29,456,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,146 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,675 UART: [art] PUB.X = 217585FC9073C3B75E40960F394291929877B6D1F5FC0F9B4CDDB760A7FC2A3897122CF9527DC15C9AF66C01143FB48B
31,753,922 UART: [art] PUB.Y = AB219F9114FCDC3E37AA805692D5CBD8835583F5427442380BB166B61CA597702A68E7BFC4C5D9E344A1F1908DD3FF7A
31,761,162 UART: [art] SIG.R = 2842A18F3B1C9E2493F2A0EDECB93780E6054477DCAE56F5F3AE89FCFD296F57BF79651F2987F687E60DE8507D3EBA18
31,768,551 UART: [art] SIG.S = EB293D2344CF68A2487140074B688E7763728E4EA80A1E537A6634B5B17028FB86F34FF24B0F065C87B321522076AE91
33,074,104 UART: Caliptra RT
33,074,828 UART: [state] CFI Enabled
33,251,541 UART: [rt] RT listening for mailbox commands...
33,283,346 UART: [rt]cmd =0x44504543, len=96
33,314,936 >>> mbox cmd response data (56 bytes)
33,315,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,346,396 UART: [rt]cmd =0x44504543, len=96
33,377,561 >>> mbox cmd response data (56 bytes)
33,378,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,408,859 UART: [rt]cmd =0x44504543, len=96
33,440,590 >>> mbox cmd response data (56 bytes)
33,441,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,471,907 UART: [rt]cmd =0x44504543, len=96
33,503,481 >>> mbox cmd response data (56 bytes)
33,504,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,534,809 UART: [rt]cmd =0x44504543, len=96
33,566,587 >>> mbox cmd response data (56 bytes)
33,567,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,597,742 UART: [rt]cmd =0x44504543, len=96
33,629,231 >>> mbox cmd response data (56 bytes)
33,629,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,660,478 UART: [rt]cmd =0x44504543, len=96
33,692,007 >>> mbox cmd response data (56 bytes)
33,692,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,723,177 UART: [rt]cmd =0x44504543, len=96
33,755,229 >>> mbox cmd response data (56 bytes)
33,755,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,786,424 UART: [rt]cmd =0x44504543, len=96
33,817,844 >>> mbox cmd response data (56 bytes)
33,818,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,848,997 UART: [rt]cmd =0x44504543, len=96
33,880,645 >>> mbox cmd response data (56 bytes)
33,881,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,912,004 UART: [rt]cmd =0x44504543, len=96
33,944,099 >>> mbox cmd response data (56 bytes)
33,944,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,975,402 UART: [rt]cmd =0x44504543, len=96
34,008,396 >>> mbox cmd response data (56 bytes)
34,009,483 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,039,279 UART: [rt]cmd =0x52435458, len=8
34,041,149 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
192,352 UART:
192,722 UART: Running Caliptra ROM ...
193,815 UART:
603,748 UART: [state] CFI Enabled
619,693 UART: [state] LifecycleState = Unprovisioned
621,631 UART: [state] DebugLocked = No
623,361 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,788 UART: [kat] SHA2-256
798,512 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,100 UART: [kat] ++
809,543 UART: [kat] sha1
820,786 UART: [kat] SHA2-256
823,474 UART: [kat] SHA2-384
830,029 UART: [kat] SHA2-512-ACC
832,395 UART: [kat] ECC-384
3,116,129 UART: [kat] HMAC-384Kdf
3,127,853 UART: [kat] LMS
4,317,974 UART: [kat] --
4,322,818 UART: [cold-reset] ++
4,323,841 UART: [fht] Storing FHT @ 0x50003400
4,335,242 UART: [idev] ++
4,335,796 UART: [idev] CDI.KEYID = 6
4,336,747 UART: [idev] SUBJECT.KEYID = 7
4,337,983 UART: [idev] UDS.KEYID = 0
4,339,181 ready_for_fw is high
4,339,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,138 UART: [idev] Erasing UDS.KEYID = 0
7,621,566 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,624 UART: [idev] --
7,649,318 UART: [ldev] ++
7,649,935 UART: [ldev] CDI.KEYID = 6
7,650,867 UART: [ldev] SUBJECT.KEYID = 5
7,652,070 UART: [ldev] AUTHORITY.KEYID = 7
7,653,354 UART: [ldev] FE.KEYID = 1
7,664,076 UART: [ldev] Erasing FE.KEYID = 1
10,951,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,988 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,361 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,546 UART: [ldev] --
13,312,469 UART: [fwproc] Waiting for Commands...
13,315,854 UART: [fwproc] Received command 0x46574c44
13,318,029 UART: [fwproc] Received Image of size 118548 bytes
17,419,785 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,035 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,283 >>> mbox cmd response: success
17,901,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,905,327 UART: [afmc] ++
17,905,968 UART: [afmc] CDI.KEYID = 6
17,906,869 UART: [afmc] SUBJECT.KEYID = 7
17,908,084 UART: [afmc] AUTHORITY.KEYID = 5
21,219,228 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,302 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,710 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,580,839 UART: [afmc] --
23,584,211 UART: [cold-reset] --
23,587,954 UART: [state] Locking Datavault
23,591,841 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,596 UART: [state] Locking ICCM
23,595,044 UART: [exit] Launching FMC @ 0x40000130
23,603,438 UART:
23,603,666 UART: Running Caliptra FMC ...
23,604,781 UART:
23,604,937 UART: [state] CFI Enabled
23,612,978 UART: [fht] FMC Alias Private Key: 7
25,953,220 UART: [art] Extend RT PCRs Done
25,954,445 UART: [art] Lock RT PCRs Done
25,956,277 UART: [art] Populate DV Done
25,961,842 UART: [fht] FMC Alias Private Key: 7
25,963,489 UART: [art] Derive CDI
25,964,300 UART: [art] Store in slot 0x4
26,006,672 UART: [art] Derive Key Pair
26,007,670 UART: [art] Store priv key in slot 0x5
29,249,715 UART: [art] Derive Key Pair - Done
29,262,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,543,163 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,679 UART: [art] PUB.X = FDD8FA5CE47E6BBA6FB4BA410E196F5C44AE0799EBA6AD65EA5534474542FFC4E10B21D2E8F3D3C10BE3F4D0F529B1F4
31,551,976 UART: [art] PUB.Y = F4E8616A066023F90A7314C792C71BA5F86DE9E1CE5C590930BA9A5527878D15CA8F5729EC3C4454ECF37AF114C76E88
31,559,213 UART: [art] SIG.R = 19C85FC1C2E311A69137EB50C1623D2C4D56C9D6FB44751AFA35A11D13C1F0D1310D37D8D9D85A742DC0FAE76AB3188E
31,566,594 UART: [art] SIG.S = 0B8115DB56B6EDCC4D7509CD081B358F8CD44CE716CE684E961FB1422E7ECFA9EE9AB36E6B0F27B842E22D358CF48FD3
32,871,379 UART: Caliptra RT
32,872,081 UART: [state] CFI Enabled
33,005,836 UART: [rt] RT listening for mailbox commands...
33,038,170 UART: [rt]cmd =0x44504543, len=96
33,069,934 >>> mbox cmd response data (56 bytes)
33,070,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,101,348 UART: [rt]cmd =0x44504543, len=96
33,133,157 >>> mbox cmd response data (56 bytes)
33,133,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,164,608 UART: [rt]cmd =0x44504543, len=96
33,197,689 >>> mbox cmd response data (56 bytes)
33,198,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,864 UART: [rt]cmd =0x44504543, len=96
33,261,179 >>> mbox cmd response data (56 bytes)
33,261,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,292,134 UART: [rt]cmd =0x44504543, len=96
33,323,891 >>> mbox cmd response data (56 bytes)
33,324,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,355,026 UART: [rt]cmd =0x44504543, len=96
33,387,701 >>> mbox cmd response data (56 bytes)
33,388,418 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,419,213 UART: [rt]cmd =0x44504543, len=96
33,451,117 >>> mbox cmd response data (56 bytes)
33,451,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,482,390 UART: [rt]cmd =0x44504543, len=96
33,513,843 >>> mbox cmd response data (56 bytes)
33,514,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,544,951 UART: [rt]cmd =0x44504543, len=96
33,576,559 >>> mbox cmd response data (56 bytes)
33,577,240 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,607,726 UART: [rt]cmd =0x44504543, len=96
33,640,398 >>> mbox cmd response data (56 bytes)
33,641,168 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,671,808 UART: [rt]cmd =0x44504543, len=96
33,704,313 >>> mbox cmd response data (56 bytes)
33,705,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,735,605 UART: [rt]cmd =0x44504543, len=96
33,767,566 >>> mbox cmd response data (56 bytes)
33,768,654 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,798,550 UART: [rt]cmd =0x52435458, len=8
33,800,506 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
4,128,210 ready_for_fw is high
4,128,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,748 >>> mbox cmd response: success
18,165,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,801,063 UART:
23,801,458 UART: Running Caliptra FMC ...
23,802,606 UART:
23,802,765 UART: [state] CFI Enabled
23,810,740 UART: [fht] FMC Alias Private Key: 7
26,150,190 UART: [art] Extend RT PCRs Done
26,151,418 UART: [art] Lock RT PCRs Done
26,153,253 UART: [art] Populate DV Done
26,158,885 UART: [fht] FMC Alias Private Key: 7
26,160,420 UART: [art] Derive CDI
26,161,235 UART: [art] Store in slot 0x4
26,203,724 UART: [art] Derive Key Pair
26,204,759 UART: [art] Store priv key in slot 0x5
29,447,456 UART: [art] Derive Key Pair - Done
29,460,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,719 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,227 UART: [art] PUB.X = 0507578176F84D13F90D48CD6B508D611082CA7DAF7C092A3541BEFF913412D19313A9B5A025173D0E81C9119B84E382
31,749,472 UART: [art] PUB.Y = A96571A44BFC61D95D7A22ECEF044BF6CBDA820136EEE161049BA12CDF48AC79318B59E8183C1E92DB5AF1FAD965D936
31,756,778 UART: [art] SIG.R = BE4264B3AFC1A7A63F26FD526C5F76012EC10E3A708840A4D6EB5D8FA32949958CD17877CD8B9D6946DC7167235281EF
31,764,169 UART: [art] SIG.S = 1EF27C7D51D28BA1E414636CFFC905EC1E034C04FF2E7452E35677749DD5DF4C9D2080834168384E139B64C910A3324A
33,068,846 UART: Caliptra RT
33,069,563 UART: [state] CFI Enabled
33,202,742 UART: [rt] RT listening for mailbox commands...
33,234,988 UART: [rt]cmd =0x44504543, len=96
33,266,328 >>> mbox cmd response data (56 bytes)
33,267,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,297,884 UART: [rt]cmd =0x44504543, len=96
33,329,109 >>> mbox cmd response data (56 bytes)
33,329,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,360,090 UART: [rt]cmd =0x44504543, len=96
33,392,339 >>> mbox cmd response data (56 bytes)
33,393,057 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,423,425 UART: [rt]cmd =0x44504543, len=96
33,454,630 >>> mbox cmd response data (56 bytes)
33,455,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,485,900 UART: [rt]cmd =0x44504543, len=96
33,517,547 >>> mbox cmd response data (56 bytes)
33,518,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,548,928 UART: [rt]cmd =0x44504543, len=96
33,580,097 >>> mbox cmd response data (56 bytes)
33,580,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,611,179 UART: [rt]cmd =0x44504543, len=96
33,642,727 >>> mbox cmd response data (56 bytes)
33,643,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,674,023 UART: [rt]cmd =0x44504543, len=96
33,706,091 >>> mbox cmd response data (56 bytes)
33,706,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,737,248 UART: [rt]cmd =0x44504543, len=96
33,770,277 >>> mbox cmd response data (56 bytes)
33,770,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,801,504 UART: [rt]cmd =0x44504543, len=96
33,834,144 >>> mbox cmd response data (56 bytes)
33,834,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,865,200 UART: [rt]cmd =0x44504543, len=96
33,897,227 >>> mbox cmd response data (56 bytes)
33,897,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,928,519 UART: [rt]cmd =0x44504543, len=96
33,960,931 >>> mbox cmd response data (56 bytes)
33,962,066 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,992,110 UART: [rt]cmd =0x52435458, len=8
33,993,829 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,175 UART:
192,593 UART: Running Caliptra ROM ...
193,688 UART:
193,832 UART: [state] CFI Enabled
261,554 UART: [state] LifecycleState = Unprovisioned
263,555 UART: [state] DebugLocked = No
264,735 UART: [state] WD Timer not started. Device not locked for debugging
269,210 UART: [kat] SHA2-256
448,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,627 UART: [kat] ++
460,152 UART: [kat] sha1
471,309 UART: [kat] SHA2-256
474,026 UART: [kat] SHA2-384
479,376 UART: [kat] SHA2-512-ACC
481,735 UART: [kat] ECC-384
2,927,010 UART: [kat] HMAC-384Kdf
2,951,274 UART: [kat] LMS
3,427,759 UART: [kat] --
3,431,112 UART: [cold-reset] ++
3,433,677 UART: [fht] FHT @ 0x50003400
3,446,206 UART: [idev] ++
3,446,842 UART: [idev] CDI.KEYID = 6
3,447,720 UART: [idev] SUBJECT.KEYID = 7
3,448,935 UART: [idev] UDS.KEYID = 0
3,450,000 ready_for_fw is high
3,450,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,599,102 UART: [idev] Erasing UDS.KEYID = 0
5,964,956 UART: [idev] Sha1 KeyId Algorithm
5,989,735 UART: [idev] --
5,993,352 UART: [ldev] ++
5,993,919 UART: [ldev] CDI.KEYID = 6
5,994,859 UART: [ldev] SUBJECT.KEYID = 5
5,996,063 UART: [ldev] AUTHORITY.KEYID = 7
5,997,314 UART: [ldev] FE.KEYID = 1
6,039,002 UART: [ldev] Erasing FE.KEYID = 1
8,545,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,066 UART: [ldev] --
10,355,111 UART: [fwproc] Wait for Commands...
10,356,658 UART: [fwproc] Recv command 0x46574c44
10,358,632 UART: [fwproc] Recv'd Img size: 118548 bytes
13,842,815 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,926,795 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,999,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,327,899 >>> mbox cmd response: success
14,329,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,331,410 UART: [afmc] ++
14,331,996 UART: [afmc] CDI.KEYID = 6
14,332,958 UART: [afmc] SUBJECT.KEYID = 7
14,334,107 UART: [afmc] AUTHORITY.KEYID = 5
16,878,117 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,187 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,974 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,048 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,618 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,696,443 UART: [afmc] --
18,699,647 UART: [cold-reset] --
18,705,445 UART: [state] Locking Datavault
18,710,472 UART: [state] Locking PCR0, PCR1 and PCR31
18,712,225 UART: [state] Locking ICCM
18,713,555 UART: [exit] Launching FMC @ 0x40000130
18,721,964 UART:
18,722,198 UART: Running Caliptra FMC ...
18,723,293 UART:
18,723,464 UART: [state] CFI Enabled
18,778,829 UART: [fht] FMC Alias Private Key: 7
20,544,580 UART: [art] Extend RT PCRs Done
20,545,820 UART: [art] Lock RT PCRs Done
20,547,257 UART: [art] Populate DV Done
20,552,666 UART: [fht] FMC Alias Private Key: 7
20,554,317 UART: [art] Derive CDI
20,555,129 UART: [art] Store in slot 0x4
20,611,190 UART: [art] Derive Key Pair
20,612,234 UART: [art] Store priv key in slot 0x5
23,075,520 UART: [art] Derive Key Pair - Done
23,088,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,317 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,849 UART: [art] PUB.X = 23AE98B551DA9A51F338547A729EFDD033797F3F51B8B53CA6E256FF06610E667779B102F3205A30103B4D1346E467CB
24,810,124 UART: [art] PUB.Y = 48468BB96460EB27D28ABB1C29A53A8561E5F356FB16D6D5C825B5BE4FE7142B10376F441DAA718F9C4318A81C3C0D0F
24,817,369 UART: [art] SIG.R = 539B4DC89DDB9B3042A55857439AD53417A899697CD72B05B99FD4BC990F609BA8960E5CFF8E45907ACAA20FA7A9E33D
24,824,755 UART: [art] SIG.S = 57843D3E4F31E89B80EFBD8FA8DD1F4FC35F9943B05B59BB1EF5DB46129D9AD809F61A73CCC0BE165DB9B4F4EEB34902
25,803,940 UART: Caliptra RT
25,804,675 UART: [state] CFI Enabled
25,984,688 UART: [rt] RT listening for mailbox commands...
26,016,958 UART: [rt]cmd =0x44504543, len=96
26,048,741 >>> mbox cmd response data (56 bytes)
26,049,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,080,566 UART: [rt]cmd =0x44504543, len=96
26,112,174 >>> mbox cmd response data (56 bytes)
26,112,906 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,143,543 UART: [rt]cmd =0x44504543, len=96
26,174,969 >>> mbox cmd response data (56 bytes)
26,175,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,206,292 UART: [rt]cmd =0x44504543, len=96
26,237,985 >>> mbox cmd response data (56 bytes)
26,238,658 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,269,409 UART: [rt]cmd =0x44504543, len=96
26,301,023 >>> mbox cmd response data (56 bytes)
26,301,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,332,098 UART: [rt]cmd =0x44504543, len=96
26,363,985 >>> mbox cmd response data (56 bytes)
26,364,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,395,036 UART: [rt]cmd =0x44504543, len=96
26,427,325 >>> mbox cmd response data (56 bytes)
26,428,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,458,629 UART: [rt]cmd =0x44504543, len=96
26,490,544 >>> mbox cmd response data (56 bytes)
26,491,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,854 UART: [rt]cmd =0x44504543, len=96
26,554,158 >>> mbox cmd response data (56 bytes)
26,554,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,585,372 UART: [rt]cmd =0x44504543, len=96
26,617,208 >>> mbox cmd response data (56 bytes)
26,617,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,648,689 UART: [rt]cmd =0x44504543, len=96
26,681,376 >>> mbox cmd response data (56 bytes)
26,682,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,712,584 UART: [rt]cmd =0x44504543, len=96
26,744,629 >>> mbox cmd response data (56 bytes)
26,745,846 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,775,519 UART: [rt]cmd =0x52435458, len=8
26,777,459 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
3,458,335 ready_for_fw is high
3,458,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,234,333 >>> mbox cmd response: success
14,235,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,513,745 UART:
18,514,126 UART: Running Caliptra FMC ...
18,515,306 UART:
18,515,478 UART: [state] CFI Enabled
18,581,187 UART: [fht] FMC Alias Private Key: 7
20,347,021 UART: [art] Extend RT PCRs Done
20,348,248 UART: [art] Lock RT PCRs Done
20,349,816 UART: [art] Populate DV Done
20,355,393 UART: [fht] FMC Alias Private Key: 7
20,356,881 UART: [art] Derive CDI
20,357,639 UART: [art] Store in slot 0x4
20,414,180 UART: [art] Derive Key Pair
20,415,220 UART: [art] Store priv key in slot 0x5
22,878,085 UART: [art] Derive Key Pair - Done
22,891,029 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,108 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,756 UART: [art] PUB.X = 685D15CE3588B8F78B8B6796C7C289B8B4405B3FE67C8BABB3CF8EB3EBA919D0F18BD11B771D296907451A8E7C8B93A2
24,612,862 UART: [art] PUB.Y = FD9D018DF2988CAC3FB9B7274C23B1E4FC346D7758710144D196E797EA920C0FE081E8590CEA75484C03DAE7B2AC969F
24,620,112 UART: [art] SIG.R = 4EA8810BDE18C4E14E81653EC0B5424FA0375A0981CFF70D60934C47B35EE113528294466AD7B91C7A922FA2413D1E3C
24,627,515 UART: [art] SIG.S = 8B0743E252D4A29206C400B37D022D5EAF27B92515C3E848CDCDEA7CCD43201F769A78FEBCCD39948773C447965F50B5
25,606,430 UART: Caliptra RT
25,607,126 UART: [state] CFI Enabled
25,787,936 UART: [rt] RT listening for mailbox commands...
25,819,912 UART: [rt]cmd =0x44504543, len=96
25,851,641 >>> mbox cmd response data (56 bytes)
25,852,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,883,339 UART: [rt]cmd =0x44504543, len=96
25,915,849 >>> mbox cmd response data (56 bytes)
25,916,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,947,010 UART: [rt]cmd =0x44504543, len=96
25,979,089 >>> mbox cmd response data (56 bytes)
25,979,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,010,182 UART: [rt]cmd =0x44504543, len=96
26,041,390 >>> mbox cmd response data (56 bytes)
26,042,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,072,668 UART: [rt]cmd =0x44504543, len=96
26,103,961 >>> mbox cmd response data (56 bytes)
26,104,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,135,453 UART: [rt]cmd =0x44504543, len=96
26,166,741 >>> mbox cmd response data (56 bytes)
26,167,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,197,894 UART: [rt]cmd =0x44504543, len=96
26,229,916 >>> mbox cmd response data (56 bytes)
26,230,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,260,957 UART: [rt]cmd =0x44504543, len=96
26,293,407 >>> mbox cmd response data (56 bytes)
26,294,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,324,713 UART: [rt]cmd =0x44504543, len=96
26,357,159 >>> mbox cmd response data (56 bytes)
26,357,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,388,326 UART: [rt]cmd =0x44504543, len=96
26,419,776 >>> mbox cmd response data (56 bytes)
26,420,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,070 UART: [rt]cmd =0x44504543, len=96
26,482,913 >>> mbox cmd response data (56 bytes)
26,483,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,120 UART: [rt]cmd =0x44504543, len=96
26,546,133 >>> mbox cmd response data (56 bytes)
26,547,295 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,577,073 UART: [rt]cmd =0x52435458, len=8
26,579,172 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,413 UART:
192,784 UART: Running Caliptra ROM ...
193,880 UART:
603,560 UART: [state] CFI Enabled
615,322 UART: [state] LifecycleState = Unprovisioned
617,271 UART: [state] DebugLocked = No
619,373 UART: [state] WD Timer not started. Device not locked for debugging
623,983 UART: [kat] SHA2-256
803,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,449 UART: [kat] ++
814,987 UART: [kat] sha1
826,794 UART: [kat] SHA2-256
829,467 UART: [kat] SHA2-384
834,966 UART: [kat] SHA2-512-ACC
837,335 UART: [kat] ECC-384
3,280,926 UART: [kat] HMAC-384Kdf
3,294,554 UART: [kat] LMS
3,771,036 UART: [kat] --
3,775,810 UART: [cold-reset] ++
3,778,019 UART: [fht] FHT @ 0x50003400
3,789,227 UART: [idev] ++
3,789,795 UART: [idev] CDI.KEYID = 6
3,790,830 UART: [idev] SUBJECT.KEYID = 7
3,792,014 UART: [idev] UDS.KEYID = 0
3,792,956 ready_for_fw is high
3,793,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,116 UART: [idev] Erasing UDS.KEYID = 0
6,274,080 UART: [idev] Sha1 KeyId Algorithm
6,298,166 UART: [idev] --
6,301,572 UART: [ldev] ++
6,302,147 UART: [ldev] CDI.KEYID = 6
6,303,055 UART: [ldev] SUBJECT.KEYID = 5
6,304,275 UART: [ldev] AUTHORITY.KEYID = 7
6,305,508 UART: [ldev] FE.KEYID = 1
6,315,942 UART: [ldev] Erasing FE.KEYID = 1
8,793,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,729 UART: [ldev] --
10,589,439 UART: [fwproc] Wait for Commands...
10,592,449 UART: [fwproc] Recv command 0x46574c44
10,594,435 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,864 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,561,038 >>> mbox cmd response: success
14,562,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,564,419 UART: [afmc] ++
14,565,010 UART: [afmc] CDI.KEYID = 6
14,565,957 UART: [afmc] SUBJECT.KEYID = 7
14,567,366 UART: [afmc] AUTHORITY.KEYID = 5
17,070,772 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,257 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,170 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,174 UART: [afmc] --
18,871,814 UART: [cold-reset] --
18,876,813 UART: [state] Locking Datavault
18,884,057 UART: [state] Locking PCR0, PCR1 and PCR31
18,885,764 UART: [state] Locking ICCM
18,887,028 UART: [exit] Launching FMC @ 0x40000130
18,895,485 UART:
18,895,730 UART: Running Caliptra FMC ...
18,896,757 UART:
18,896,906 UART: [state] CFI Enabled
18,904,901 UART: [fht] FMC Alias Private Key: 7
20,671,484 UART: [art] Extend RT PCRs Done
20,672,710 UART: [art] Lock RT PCRs Done
20,674,091 UART: [art] Populate DV Done
20,679,400 UART: [fht] FMC Alias Private Key: 7
20,681,048 UART: [art] Derive CDI
20,681,868 UART: [art] Store in slot 0x4
20,724,646 UART: [art] Derive Key Pair
20,725,650 UART: [art] Store priv key in slot 0x5
23,153,104 UART: [art] Derive Key Pair - Done
23,166,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,798 UART: [art] Erasing AUTHORITY.KEYID = 7
24,874,290 UART: [art] PUB.X = D8F9C9AAA166901A732719418BF1EDFD43F938E93BAB56A866444A81E334E319FAB0CC4606F4EC1765736451C2CFAEF9
24,881,598 UART: [art] PUB.Y = A067C37BFBBA18AB2ECC80CEBF54C4E0BCCC1B4EB3722C99989E872924252613B9C3AA305C5590651644FE3FEA6E4C34
24,888,847 UART: [art] SIG.R = F138A804B4E28D8541CCB81FFD55C54A31CBABD3611B6593CBC9990EAAAD02000665ED3C20C4C298CB1F40C9AF98B180
24,896,252 UART: [art] SIG.S = B7AD149587B0BF380C3517AB9B7BD066B4927B99C423DFEA2415F78B10AFE33B7A434B3D21E22DF1C5CDC3E36E9D64AB
25,874,590 UART: Caliptra RT
25,875,301 UART: [state] CFI Enabled
26,007,774 UART: [rt] RT listening for mailbox commands...
26,039,733 UART: [rt]cmd =0x44504543, len=96
26,071,372 >>> mbox cmd response data (56 bytes)
26,072,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,102,757 UART: [rt]cmd =0x44504543, len=96
26,135,498 >>> mbox cmd response data (56 bytes)
26,136,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,166,747 UART: [rt]cmd =0x44504543, len=96
26,198,487 >>> mbox cmd response data (56 bytes)
26,199,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,229,600 UART: [rt]cmd =0x44504543, len=96
26,261,530 >>> mbox cmd response data (56 bytes)
26,262,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,107 UART: [rt]cmd =0x44504543, len=96
26,324,475 >>> mbox cmd response data (56 bytes)
26,325,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,355,633 UART: [rt]cmd =0x44504543, len=96
26,387,737 >>> mbox cmd response data (56 bytes)
26,388,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,078 UART: [rt]cmd =0x44504543, len=96
26,450,701 >>> mbox cmd response data (56 bytes)
26,451,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,482,043 UART: [rt]cmd =0x44504543, len=96
26,513,740 >>> mbox cmd response data (56 bytes)
26,514,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,545,149 UART: [rt]cmd =0x44504543, len=96
26,577,335 >>> mbox cmd response data (56 bytes)
26,578,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,608,797 UART: [rt]cmd =0x44504543, len=96
26,640,760 >>> mbox cmd response data (56 bytes)
26,641,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,671,862 UART: [rt]cmd =0x44504543, len=96
26,703,912 >>> mbox cmd response data (56 bytes)
26,704,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,127 UART: [rt]cmd =0x44504543, len=96
26,767,712 >>> mbox cmd response data (56 bytes)
26,768,785 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,798,473 UART: [rt]cmd =0x52435458, len=8
26,800,411 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,780,050 ready_for_fw is high
3,780,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,307 >>> mbox cmd response: success
14,440,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,689,625 UART:
18,690,007 UART: Running Caliptra FMC ...
18,691,158 UART:
18,691,325 UART: [state] CFI Enabled
18,699,387 UART: [fht] FMC Alias Private Key: 7
20,464,798 UART: [art] Extend RT PCRs Done
20,466,017 UART: [art] Lock RT PCRs Done
20,467,861 UART: [art] Populate DV Done
20,473,500 UART: [fht] FMC Alias Private Key: 7
20,475,043 UART: [art] Derive CDI
20,475,865 UART: [art] Store in slot 0x4
20,518,733 UART: [art] Derive Key Pair
20,519,776 UART: [art] Store priv key in slot 0x5
22,946,241 UART: [art] Derive Key Pair - Done
22,959,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,822 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,318 UART: [art] PUB.X = 42250937DAE1365C3A7C0A592303737E882E206207D554183E71FF5FB3383E811C502B88D5330D92D824C2F63876D75A
24,674,593 UART: [art] PUB.Y = A18D1DCAA59101AB71BFAEA5BB6BF8C8C06E57E9BAF273A5615279FB30F77F9AC2579DFFC1611B5427B88061D3747E30
24,681,868 UART: [art] SIG.R = FD69D13AABC846265CF656366E56BA81246A3B7D5B14A9B9605E60AC16043863E59008C83200EC207B056B75AFFEC020
24,689,222 UART: [art] SIG.S = 68E1127F48CB598EE504C3302F3FBD52A1CA0EB91EA111FA0626C4A2DD21B1E6C2080819F052D88A5621E51B2CCC46BF
25,667,881 UART: Caliptra RT
25,668,584 UART: [state] CFI Enabled
25,801,811 UART: [rt] RT listening for mailbox commands...
25,833,715 UART: [rt]cmd =0x44504543, len=96
25,866,220 >>> mbox cmd response data (56 bytes)
25,867,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,897,656 UART: [rt]cmd =0x44504543, len=96
25,928,904 >>> mbox cmd response data (56 bytes)
25,929,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,960,200 UART: [rt]cmd =0x44504543, len=96
25,991,870 >>> mbox cmd response data (56 bytes)
25,992,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,023,027 UART: [rt]cmd =0x44504543, len=96
26,054,080 >>> mbox cmd response data (56 bytes)
26,054,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,085,228 UART: [rt]cmd =0x44504543, len=96
26,116,958 >>> mbox cmd response data (56 bytes)
26,117,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,148,210 UART: [rt]cmd =0x44504543, len=96
26,180,491 >>> mbox cmd response data (56 bytes)
26,181,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,211,487 UART: [rt]cmd =0x44504543, len=96
26,243,210 >>> mbox cmd response data (56 bytes)
26,243,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,274,530 UART: [rt]cmd =0x44504543, len=96
26,305,679 >>> mbox cmd response data (56 bytes)
26,306,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,953 UART: [rt]cmd =0x44504543, len=96
26,368,860 >>> mbox cmd response data (56 bytes)
26,369,577 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,400,215 UART: [rt]cmd =0x44504543, len=96
26,432,133 >>> mbox cmd response data (56 bytes)
26,432,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,463,500 UART: [rt]cmd =0x44504543, len=96
26,495,188 >>> mbox cmd response data (56 bytes)
26,495,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,526,299 UART: [rt]cmd =0x44504543, len=96
26,558,023 >>> mbox cmd response data (56 bytes)
26,559,091 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,588,776 UART: [rt]cmd =0x52435458, len=8
26,590,594 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
192,125 UART:
192,502 UART: Running Caliptra ROM ...
193,695 UART:
193,845 UART: [state] CFI Enabled
262,482 UART: [state] LifecycleState = Unprovisioned
264,900 UART: [state] DebugLocked = No
266,372 UART: [state] WD Timer not started. Device not locked for debugging
271,325 UART: [kat] SHA2-256
461,248 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,982 UART: [kat] ++
472,458 UART: [kat] sha1
484,468 UART: [kat] SHA2-256
487,473 UART: [kat] SHA2-384
493,955 UART: [kat] SHA2-512-ACC
496,545 UART: [kat] ECC-384
2,951,341 UART: [kat] HMAC-384Kdf
2,973,156 UART: [kat] LMS
3,504,935 UART: [kat] --
3,508,387 UART: [cold-reset] ++
3,509,966 UART: [fht] FHT @ 0x50003400
3,520,801 UART: [idev] ++
3,521,503 UART: [idev] CDI.KEYID = 6
3,522,482 UART: [idev] SUBJECT.KEYID = 7
3,523,653 UART: [idev] UDS.KEYID = 0
3,524,575 ready_for_fw is high
3,524,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,921 UART: [idev] Erasing UDS.KEYID = 0
6,032,991 UART: [idev] Sha1 KeyId Algorithm
6,055,052 UART: [idev] --
6,060,116 UART: [ldev] ++
6,060,805 UART: [ldev] CDI.KEYID = 6
6,061,719 UART: [ldev] SUBJECT.KEYID = 5
6,062,953 UART: [ldev] AUTHORITY.KEYID = 7
6,064,131 UART: [ldev] FE.KEYID = 1
6,101,300 UART: [ldev] Erasing FE.KEYID = 1
8,606,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,145 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,318 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,057 UART: [ldev] --
10,413,540 UART: [fwproc] Wait for Commands...
10,415,256 UART: [fwproc] Recv command 0x46574c44
10,417,507 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,765 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,376 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,037 >>> mbox cmd response: success
14,674,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,677,805 UART: [afmc] ++
14,678,499 UART: [afmc] CDI.KEYID = 6
14,679,655 UART: [afmc] SUBJECT.KEYID = 7
14,681,183 UART: [afmc] AUTHORITY.KEYID = 5
17,213,262 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,972,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,987,328 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,174 UART: [afmc] --
19,014,762 UART: [cold-reset] --
19,019,012 UART: [state] Locking Datavault
19,025,234 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,412 UART: [state] Locking ICCM
19,028,980 UART: [exit] Launching FMC @ 0x40000130
19,037,642 UART:
19,037,874 UART: Running Caliptra FMC ...
19,038,973 UART:
19,039,131 UART: [state] CFI Enabled
19,096,674 UART: [fht] FMC Alias Private Key: 7
20,883,964 UART: [art] Extend RT PCRs Done
20,885,193 UART: [art] Lock RT PCRs Done
20,886,517 UART: [art] Populate DV Done
20,891,769 UART: [fht] FMC Alias Private Key: 7
20,893,356 UART: [art] Derive CDI
20,894,101 UART: [art] Store in slot 0x4
20,950,734 UART: [art] Derive Key Pair
20,951,776 UART: [art] Store priv key in slot 0x5
23,414,842 UART: [art] Derive Key Pair - Done
23,427,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,943 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,451 UART: [art] PUB.X = 12167FFABEFB9405BFC67F3148622ADCC9E4D2136E0FA2944BC08A027EF9FD96AFF4F795479CACBF219CB735D1A00222
25,149,762 UART: [art] PUB.Y = 232C56F927BF9E4AB6E8EEA2D6929891ECA1E9AF71B356B3C0FC6D2C077BFA8FA70B2E260838DF2105258301509A0280
25,156,996 UART: [art] SIG.R = 0B292713EBD36ACF03CECA9127821158F503948B935E91251F33D3A14AA9C07C3D61B699E030D2305926CEBDD782D945
25,164,380 UART: [art] SIG.S = 736BEC36B8D981ACCC9B624E77CACD6FAFBC146EA52A7CB258884B5B3219C5057101BAA4AAC24CC82E495D52FD771801
26,143,662 UART: Caliptra RT
26,144,356 UART: [state] CFI Enabled
26,323,242 UART: [rt] RT listening for mailbox commands...
26,355,308 UART: [rt]cmd =0x44504543, len=96
26,387,677 >>> mbox cmd response data (56 bytes)
26,388,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,092 UART: [rt]cmd =0x44504543, len=96
26,451,179 >>> mbox cmd response data (56 bytes)
26,451,907 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,482,438 UART: [rt]cmd =0x44504543, len=96
26,514,290 >>> mbox cmd response data (56 bytes)
26,514,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,545,606 UART: [rt]cmd =0x44504543, len=96
26,577,226 >>> mbox cmd response data (56 bytes)
26,577,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,608,597 UART: [rt]cmd =0x44504543, len=96
26,640,328 >>> mbox cmd response data (56 bytes)
26,641,016 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,671,332 UART: [rt]cmd =0x44504543, len=96
26,703,567 >>> mbox cmd response data (56 bytes)
26,704,283 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,735,086 UART: [rt]cmd =0x44504543, len=96
26,766,132 >>> mbox cmd response data (56 bytes)
26,766,809 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,797,167 UART: [rt]cmd =0x44504543, len=96
26,828,643 >>> mbox cmd response data (56 bytes)
26,829,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,859,857 UART: [rt]cmd =0x44504543, len=96
26,892,237 >>> mbox cmd response data (56 bytes)
26,892,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,923,297 UART: [rt]cmd =0x44504543, len=96
26,955,594 >>> mbox cmd response data (56 bytes)
26,956,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,986,688 UART: [rt]cmd =0x44504543, len=96
27,019,089 >>> mbox cmd response data (56 bytes)
27,019,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,050,403 UART: [rt]cmd =0x44504543, len=96
27,082,472 >>> mbox cmd response data (56 bytes)
27,083,528 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,113,384 UART: [rt]cmd =0x52435458, len=8
27,115,197 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
3,437,525 ready_for_fw is high
3,437,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,802 >>> mbox cmd response: success
14,827,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,112,811 UART:
19,113,212 UART: Running Caliptra FMC ...
19,114,363 UART:
19,114,524 UART: [state] CFI Enabled
19,181,295 UART: [fht] FMC Alias Private Key: 7
20,947,965 UART: [art] Extend RT PCRs Done
20,949,195 UART: [art] Lock RT PCRs Done
20,951,142 UART: [art] Populate DV Done
20,956,614 UART: [fht] FMC Alias Private Key: 7
20,958,157 UART: [art] Derive CDI
20,958,973 UART: [art] Store in slot 0x4
21,013,557 UART: [art] Derive Key Pair
21,014,604 UART: [art] Store priv key in slot 0x5
23,477,023 UART: [art] Derive Key Pair - Done
23,490,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,155 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,648 UART: [art] PUB.X = D7F27C255F4E3105CFC6BDBFFA4C8C2E6B94D17E4054BBEF5687C763F5402F3BCE83A2ED17F1D118A8D62B4DD1A8FD2A
25,210,946 UART: [art] PUB.Y = 416C2D8A29000778D39EB6BD4192676B10983AF798826365EEDEF26EC8CFBE6AF44CA48EB9EBDEA1AC6EF64FE243F73F
25,218,235 UART: [art] SIG.R = 90359AAEF66EED4E19975CC62AF1AEE71326F91D803CD01A41AB101A3086CB770A054913AB4C9A92F9720D10FE87C5DB
25,225,630 UART: [art] SIG.S = 2CD0523C15D43E743A0616AC2705F56B09391FDAE6267000B042A5AA5B5596579F9EDE8E3A5A6EF2A51C4B4CE332F90E
26,204,318 UART: Caliptra RT
26,205,027 UART: [state] CFI Enabled
26,384,612 UART: [rt] RT listening for mailbox commands...
26,416,795 UART: [rt]cmd =0x44504543, len=96
26,448,651 >>> mbox cmd response data (56 bytes)
26,449,573 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,480,013 UART: [rt]cmd =0x44504543, len=96
26,511,984 >>> mbox cmd response data (56 bytes)
26,512,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,543,375 UART: [rt]cmd =0x44504543, len=96
26,574,993 >>> mbox cmd response data (56 bytes)
26,575,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,606,501 UART: [rt]cmd =0x44504543, len=96
26,637,905 >>> mbox cmd response data (56 bytes)
26,638,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,669,295 UART: [rt]cmd =0x44504543, len=96
26,700,686 >>> mbox cmd response data (56 bytes)
26,701,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,731,916 UART: [rt]cmd =0x44504543, len=96
26,763,795 >>> mbox cmd response data (56 bytes)
26,764,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,795,100 UART: [rt]cmd =0x44504543, len=96
26,827,274 >>> mbox cmd response data (56 bytes)
26,827,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,858,282 UART: [rt]cmd =0x44504543, len=96
26,890,281 >>> mbox cmd response data (56 bytes)
26,890,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,921,515 UART: [rt]cmd =0x44504543, len=96
26,953,398 >>> mbox cmd response data (56 bytes)
26,954,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,984,736 UART: [rt]cmd =0x44504543, len=96
27,016,972 >>> mbox cmd response data (56 bytes)
27,017,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,048,178 UART: [rt]cmd =0x44504543, len=96
27,079,525 >>> mbox cmd response data (56 bytes)
27,080,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,110,726 UART: [rt]cmd =0x44504543, len=96
27,143,063 >>> mbox cmd response data (56 bytes)
27,144,140 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,173,880 UART: [rt]cmd =0x52435458, len=8
27,175,804 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
192,392 UART:
192,761 UART: Running Caliptra ROM ...
193,867 UART:
603,795 UART: [state] CFI Enabled
615,927 UART: [state] LifecycleState = Unprovisioned
618,311 UART: [state] DebugLocked = No
619,915 UART: [state] WD Timer not started. Device not locked for debugging
624,042 UART: [kat] SHA2-256
813,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,694 UART: [kat] ++
825,309 UART: [kat] sha1
837,048 UART: [kat] SHA2-256
840,072 UART: [kat] SHA2-384
846,925 UART: [kat] SHA2-512-ACC
849,512 UART: [kat] ECC-384
3,292,687 UART: [kat] HMAC-384Kdf
3,306,071 UART: [kat] LMS
3,837,884 UART: [kat] --
3,842,754 UART: [cold-reset] ++
3,845,260 UART: [fht] FHT @ 0x50003400
3,857,167 UART: [idev] ++
3,857,885 UART: [idev] CDI.KEYID = 6
3,858,774 UART: [idev] SUBJECT.KEYID = 7
3,860,019 UART: [idev] UDS.KEYID = 0
3,860,959 ready_for_fw is high
3,861,181 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,057 UART: [idev] Erasing UDS.KEYID = 0
6,339,204 UART: [idev] Sha1 KeyId Algorithm
6,360,966 UART: [idev] --
6,365,959 UART: [ldev] ++
6,366,649 UART: [ldev] CDI.KEYID = 6
6,367,534 UART: [ldev] SUBJECT.KEYID = 5
6,368,748 UART: [ldev] AUTHORITY.KEYID = 7
6,369,927 UART: [ldev] FE.KEYID = 1
6,380,091 UART: [ldev] Erasing FE.KEYID = 1
8,857,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,499 UART: [ldev] --
10,649,618 UART: [fwproc] Wait for Commands...
10,652,093 UART: [fwproc] Recv command 0x46574c44
10,654,350 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,134 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,782 >>> mbox cmd response: success
14,908,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,911,420 UART: [afmc] ++
14,912,131 UART: [afmc] CDI.KEYID = 6
14,913,383 UART: [afmc] SUBJECT.KEYID = 7
14,914,824 UART: [afmc] AUTHORITY.KEYID = 5
17,421,513 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,632 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,675 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,883 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,325 UART: [afmc] --
19,221,459 UART: [cold-reset] --
19,225,260 UART: [state] Locking Datavault
19,231,677 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,890 UART: [state] Locking ICCM
19,235,397 UART: [exit] Launching FMC @ 0x40000130
19,244,075 UART:
19,244,316 UART: Running Caliptra FMC ...
19,245,423 UART:
19,245,582 UART: [state] CFI Enabled
19,253,688 UART: [fht] FMC Alias Private Key: 7
21,019,612 UART: [art] Extend RT PCRs Done
21,020,839 UART: [art] Lock RT PCRs Done
21,022,350 UART: [art] Populate DV Done
21,028,064 UART: [fht] FMC Alias Private Key: 7
21,029,613 UART: [art] Derive CDI
21,030,437 UART: [art] Store in slot 0x4
21,072,825 UART: [art] Derive Key Pair
21,073,867 UART: [art] Store priv key in slot 0x5
23,500,801 UART: [art] Derive Key Pair - Done
23,513,853 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,978 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,488 UART: [art] PUB.X = 6B3C6DBE9B95B0A1252B2174708D909EA2300A2AB63C16415C4AFAF00E3D74E7D8907A35388840989D11CFF6D5DE514A
25,228,797 UART: [art] PUB.Y = 3CB43401D3A7534CBA87B0BD54FEF52B9DF11721FFB15376423D1EB3B78775801721D79A11BA11D3D087BC4BA693B70C
25,236,010 UART: [art] SIG.R = 2D7A0849D6E90F2E5F667B0E97454023E6192C8AE7EE395CAB9793706F0C74F316C73A7A7482F0EE069D0B5AF6ABAC19
25,243,376 UART: [art] SIG.S = 86BFAC81E9F1F0BA2A2BF16C6A01BEEA42125ADDFCBAE88E88C18BE03782F5B466B26EBDB9E1E44FCAA03E3980A4889C
26,222,377 UART: Caliptra RT
26,223,697 UART: [state] CFI Enabled
26,355,508 UART: [rt] RT listening for mailbox commands...
26,387,854 UART: [rt]cmd =0x44504543, len=96
26,420,039 >>> mbox cmd response data (56 bytes)
26,421,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,451,596 UART: [rt]cmd =0x44504543, len=96
26,483,652 >>> mbox cmd response data (56 bytes)
26,484,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,514,876 UART: [rt]cmd =0x44504543, len=96
26,546,149 >>> mbox cmd response data (56 bytes)
26,546,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,577,607 UART: [rt]cmd =0x44504543, len=96
26,608,782 >>> mbox cmd response data (56 bytes)
26,609,512 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,640,149 UART: [rt]cmd =0x44504543, len=96
26,672,085 >>> mbox cmd response data (56 bytes)
26,672,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,703,294 UART: [rt]cmd =0x44504543, len=96
26,734,618 >>> mbox cmd response data (56 bytes)
26,735,414 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,765,916 UART: [rt]cmd =0x44504543, len=96
26,798,080 >>> mbox cmd response data (56 bytes)
26,798,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,829,371 UART: [rt]cmd =0x44504543, len=96
26,861,591 >>> mbox cmd response data (56 bytes)
26,862,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,892,873 UART: [rt]cmd =0x44504543, len=96
26,924,353 >>> mbox cmd response data (56 bytes)
26,925,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,955,616 UART: [rt]cmd =0x44504543, len=96
26,988,256 >>> mbox cmd response data (56 bytes)
26,988,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,019,619 UART: [rt]cmd =0x44504543, len=96
27,051,153 >>> mbox cmd response data (56 bytes)
27,051,840 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,082,513 UART: [rt]cmd =0x44504543, len=96
27,114,619 >>> mbox cmd response data (56 bytes)
27,115,933 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,145,810 UART: [rt]cmd =0x52435458, len=8
27,147,810 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,758,333 ready_for_fw is high
3,758,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,511 >>> mbox cmd response: success
15,046,027 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,293,425 UART:
19,293,810 UART: Running Caliptra FMC ...
19,295,014 UART:
19,295,194 UART: [state] CFI Enabled
19,302,592 UART: [fht] FMC Alias Private Key: 7
21,068,767 UART: [art] Extend RT PCRs Done
21,069,998 UART: [art] Lock RT PCRs Done
21,071,581 UART: [art] Populate DV Done
21,076,906 UART: [fht] FMC Alias Private Key: 7
21,078,460 UART: [art] Derive CDI
21,079,208 UART: [art] Store in slot 0x4
21,122,243 UART: [art] Derive Key Pair
21,123,243 UART: [art] Store priv key in slot 0x5
23,550,094 UART: [art] Derive Key Pair - Done
23,563,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,269,609 UART: [art] Erasing AUTHORITY.KEYID = 7
25,271,106 UART: [art] PUB.X = E99EDC9AE890D04669B66FF801C575C6F72B52B0D7899DC8EDF197104FC9EFEB5C8F99E6C179C784173ED0D62A0A3315
25,278,429 UART: [art] PUB.Y = D1C6C28653860F7C3C03682C0E1BC152F1F0F942A8896B50B077960A8FFAB7C0F1BCF650BEAE738EF93BE27A051B19CA
25,285,692 UART: [art] SIG.R = DC8E9CC52A444411B16B3E87CC415FD43764F730C1FEC855BCE9283E7A3FF2AC5B25458F355EDA6E6751E3881C5ADF33
25,293,147 UART: [art] SIG.S = 743B8E9BEE0F05B8D170E26F79D9A74DBA23CFFE8C946610BEF7A6B4DA21C81B932E3F011DE10D71DFEBA7F4E852CF87
26,272,706 UART: Caliptra RT
26,273,422 UART: [state] CFI Enabled
26,406,868 UART: [rt] RT listening for mailbox commands...
26,439,082 UART: [rt]cmd =0x44504543, len=96
26,470,277 >>> mbox cmd response data (56 bytes)
26,471,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,501,894 UART: [rt]cmd =0x44504543, len=96
26,533,511 >>> mbox cmd response data (56 bytes)
26,534,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,564,534 UART: [rt]cmd =0x44504543, len=96
26,596,613 >>> mbox cmd response data (56 bytes)
26,597,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,627,709 UART: [rt]cmd =0x44504543, len=96
26,660,008 >>> mbox cmd response data (56 bytes)
26,660,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,691,273 UART: [rt]cmd =0x44504543, len=96
26,723,202 >>> mbox cmd response data (56 bytes)
26,723,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,754,402 UART: [rt]cmd =0x44504543, len=96
26,786,078 >>> mbox cmd response data (56 bytes)
26,786,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,817,427 UART: [rt]cmd =0x44504543, len=96
26,849,316 >>> mbox cmd response data (56 bytes)
26,850,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,880,596 UART: [rt]cmd =0x44504543, len=96
26,912,895 >>> mbox cmd response data (56 bytes)
26,913,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,944,160 UART: [rt]cmd =0x44504543, len=96
26,975,700 >>> mbox cmd response data (56 bytes)
26,976,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,007,169 UART: [rt]cmd =0x44504543, len=96
27,038,820 >>> mbox cmd response data (56 bytes)
27,039,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,070,058 UART: [rt]cmd =0x44504543, len=96
27,102,140 >>> mbox cmd response data (56 bytes)
27,102,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,133,590 UART: [rt]cmd =0x44504543, len=96
27,164,559 >>> mbox cmd response data (56 bytes)
27,165,646 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,195,535 UART: [rt]cmd =0x52435458, len=8
27,197,265 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,903 UART: [kat] SHA2-256
881,834 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,949 UART: [kat] ++
886,101 UART: [kat] sha1
890,141 UART: [kat] SHA2-256
892,079 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,414 UART: [kat] HMAC-384Kdf
907,016 UART: [kat] LMS
1,475,212 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,719 UART: [fht] Storing FHT @ 0x50003400
1,479,472 UART: [idev] ++
1,479,640 UART: [idev] CDI.KEYID = 6
1,480,000 UART: [idev] SUBJECT.KEYID = 7
1,480,424 UART: [idev] UDS.KEYID = 0
1,480,769 ready_for_fw is high
1,480,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,538 UART: [idev] Erasing UDS.KEYID = 0
1,504,930 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,472 UART: [idev] --
1,514,489 UART: [ldev] ++
1,514,657 UART: [ldev] CDI.KEYID = 6
1,515,020 UART: [ldev] SUBJECT.KEYID = 5
1,515,446 UART: [ldev] AUTHORITY.KEYID = 7
1,515,909 UART: [ldev] FE.KEYID = 1
1,520,795 UART: [ldev] Erasing FE.KEYID = 1
1,546,298 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,050 UART: [ldev] --
1,585,433 UART: [fwproc] Waiting for Commands...
1,586,122 UART: [fwproc] Received command 0x46574c44
1,586,913 UART: [fwproc] Received Image of size 118548 bytes
2,932,375 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,749 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,967 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,360 >>> mbox cmd response: success
3,131,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,420 UART: [afmc] ++
3,132,588 UART: [afmc] CDI.KEYID = 6
3,132,950 UART: [afmc] SUBJECT.KEYID = 7
3,133,375 UART: [afmc] AUTHORITY.KEYID = 5
3,168,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,024 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,707 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,831 UART: [afmc] --
3,211,893 UART: [cold-reset] --
3,212,761 UART: [state] Locking Datavault
3,213,880 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,484 UART: [state] Locking ICCM
3,215,004 UART: [exit] Launching FMC @ 0x40000130
3,220,334 UART:
3,220,350 UART: Running Caliptra FMC ...
3,220,758 UART:
3,220,812 UART: [state] CFI Enabled
3,231,752 UART: [fht] FMC Alias Private Key: 7
3,351,228 UART: [art] Extend RT PCRs Done
3,351,656 UART: [art] Lock RT PCRs Done
3,353,276 UART: [art] Populate DV Done
3,361,685 UART: [fht] FMC Alias Private Key: 7
3,362,729 UART: [art] Derive CDI
3,363,009 UART: [art] Store in slot 0x4
3,448,661 UART: [art] Derive Key Pair
3,449,021 UART: [art] Store priv key in slot 0x5
3,462,268 UART: [art] Derive Key Pair - Done
3,476,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,362 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,127 UART: [art] PUB.X = FFE76AC06B7F95928A850E1C14AC08E27D6030D42355B649715BD5624BB40A8E61D50254A2C05DA9BD845C11E86A72FD
3,499,891 UART: [art] PUB.Y = AE6B750373B3B493FEA8069DD11D7BB85DA9D1E5E92A6A39DEF89597467E061CF2D2E034B926A2DEB27E3FD8D69994B3
3,506,846 UART: [art] SIG.R = 1FA423F27BC67DA1F93585A88AB3B16B2F36F6EEFC9C39502259B7CC658F9982E88B31C929F56EA22B0CC6DB6B0617A8
3,513,622 UART: [art] SIG.S = 38B7913693EB050A90AA33B7C2A2E1BDCE599E184EBA3E085D8308C52462FE44B5DFCCB14E53E27196F97C70D0EB037D
3,537,403 UART: Caliptra RT
3,537,654 UART: [state] CFI Enabled
3,657,687 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,573 UART: [rt]cmd =0x44504543, len=96
3,721,743 >>> mbox cmd response data (56 bytes)
3,721,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,823 UART: [rt]cmd =0x44504543, len=96
3,785,180 >>> mbox cmd response data (56 bytes)
3,785,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,348 UART: [rt]cmd =0x44504543, len=96
3,847,726 >>> mbox cmd response data (56 bytes)
3,847,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,877,642 UART: [rt]cmd =0x44504543, len=96
3,910,005 >>> mbox cmd response data (56 bytes)
3,910,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,940,121 UART: [rt]cmd =0x44504543, len=96
3,972,629 >>> mbox cmd response data (56 bytes)
3,972,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,002,461 UART: [rt]cmd =0x44504543, len=96
4,034,748 >>> mbox cmd response data (56 bytes)
4,034,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,064,554 UART: [rt]cmd =0x44504543, len=96
4,097,216 >>> mbox cmd response data (56 bytes)
4,097,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,127,118 UART: [rt]cmd =0x44504543, len=96
4,160,121 >>> mbox cmd response data (56 bytes)
4,160,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,190,109 UART: [rt]cmd =0x44504543, len=96
4,222,211 >>> mbox cmd response data (56 bytes)
4,222,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,252,021 UART: [rt]cmd =0x44504543, len=96
4,285,142 >>> mbox cmd response data (56 bytes)
4,285,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,315,038 UART: [rt]cmd =0x44504543, len=96
4,347,666 >>> mbox cmd response data (56 bytes)
4,347,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,377,616 UART: [rt]cmd =0x44504543, len=96
4,411,275 >>> mbox cmd response data (56 bytes)
4,411,276 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,440,569 UART: [rt]cmd =0x52435458, len=8
4,442,136 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,093 ready_for_fw is high
1,363,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,122 >>> mbox cmd response: success
2,982,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,935 UART:
3,043,951 UART: Running Caliptra FMC ...
3,044,359 UART:
3,044,413 UART: [state] CFI Enabled
3,054,881 UART: [fht] FMC Alias Private Key: 7
3,173,501 UART: [art] Extend RT PCRs Done
3,173,929 UART: [art] Lock RT PCRs Done
3,175,397 UART: [art] Populate DV Done
3,183,452 UART: [fht] FMC Alias Private Key: 7
3,184,592 UART: [art] Derive CDI
3,184,872 UART: [art] Store in slot 0x4
3,270,664 UART: [art] Derive Key Pair
3,271,024 UART: [art] Store priv key in slot 0x5
3,284,207 UART: [art] Derive Key Pair - Done
3,298,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,054 UART: [art] PUB.X = 886F2380C6A345C8ADB34A52A32D38C17650D71395A06F5A55EC82725861A14BAF2A7C55A1F963902FE5C6B94FA7CF17
3,321,828 UART: [art] PUB.Y = 0E8149E635920D26C391C6E702705817AEDA73B9BC3D307BF624BF8587424E7E2289DD8D45891067D581B912BBC3723E
3,328,765 UART: [art] SIG.R = B98A5247860D3593D685FABAEE2AEB095375FC7E5194875177051FF220ABF943F3B6B2086D2547F787016999FF871E08
3,335,513 UART: [art] SIG.S = A87F462B7CE1183A12EFB7DDCB00589BB547F4370EF3947D44697A6CDDE4B182B5EE71CAFF16FFF796368C04ED498CA0
3,359,419 UART: Caliptra RT
3,359,670 UART: [state] CFI Enabled
3,480,233 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,145 UART: [rt]cmd =0x44504543, len=96
3,543,423 >>> mbox cmd response data (56 bytes)
3,543,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,369 UART: [rt]cmd =0x44504543, len=96
3,606,770 >>> mbox cmd response data (56 bytes)
3,606,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,584 UART: [rt]cmd =0x44504543, len=96
3,668,688 >>> mbox cmd response data (56 bytes)
3,668,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,538 UART: [rt]cmd =0x44504543, len=96
3,731,573 >>> mbox cmd response data (56 bytes)
3,731,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,561 UART: [rt]cmd =0x44504543, len=96
3,795,425 >>> mbox cmd response data (56 bytes)
3,795,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,283 UART: [rt]cmd =0x44504543, len=96
3,858,598 >>> mbox cmd response data (56 bytes)
3,858,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,378 UART: [rt]cmd =0x44504543, len=96
3,920,880 >>> mbox cmd response data (56 bytes)
3,920,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,950,626 UART: [rt]cmd =0x44504543, len=96
3,982,929 >>> mbox cmd response data (56 bytes)
3,982,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,755 UART: [rt]cmd =0x44504543, len=96
4,046,995 >>> mbox cmd response data (56 bytes)
4,046,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,789 UART: [rt]cmd =0x44504543, len=96
4,109,404 >>> mbox cmd response data (56 bytes)
4,109,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,180 UART: [rt]cmd =0x44504543, len=96
4,172,896 >>> mbox cmd response data (56 bytes)
4,172,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,786 UART: [rt]cmd =0x44504543, len=96
4,235,787 >>> mbox cmd response data (56 bytes)
4,235,788 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,265,219 UART: [rt]cmd =0x52435458, len=8
4,266,710 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Unprovisioned
86,470 UART: [state] DebugLocked = No
86,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
891,150 UART: [kat] SHA2-256
893,088 UART: [kat] SHA2-384
895,977 UART: [kat] SHA2-512-ACC
897,878 UART: [kat] ECC-384
903,231 UART: [kat] HMAC-384Kdf
907,879 UART: [kat] LMS
1,476,075 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,340 UART: [fht] Storing FHT @ 0x50003400
1,480,043 UART: [idev] ++
1,480,211 UART: [idev] CDI.KEYID = 6
1,480,571 UART: [idev] SUBJECT.KEYID = 7
1,480,995 UART: [idev] UDS.KEYID = 0
1,481,340 ready_for_fw is high
1,481,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,223 UART: [idev] Erasing UDS.KEYID = 0
1,506,021 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,521 UART: [idev] --
1,515,438 UART: [ldev] ++
1,515,606 UART: [ldev] CDI.KEYID = 6
1,515,969 UART: [ldev] SUBJECT.KEYID = 5
1,516,395 UART: [ldev] AUTHORITY.KEYID = 7
1,516,858 UART: [ldev] FE.KEYID = 1
1,522,006 UART: [ldev] Erasing FE.KEYID = 1
1,547,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,321 UART: [ldev] --
1,586,824 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 118548 bytes
2,932,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,362 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,967 >>> mbox cmd response: success
3,129,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,045 UART: [afmc] ++
3,131,213 UART: [afmc] CDI.KEYID = 6
3,131,575 UART: [afmc] SUBJECT.KEYID = 7
3,132,000 UART: [afmc] AUTHORITY.KEYID = 5
3,167,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,545 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,325 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,034 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,917 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,600 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,588 UART: [afmc] --
3,210,532 UART: [cold-reset] --
3,211,162 UART: [state] Locking Datavault
3,212,223 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,827 UART: [state] Locking ICCM
3,213,449 UART: [exit] Launching FMC @ 0x40000130
3,218,779 UART:
3,218,795 UART: Running Caliptra FMC ...
3,219,203 UART:
3,219,346 UART: [state] CFI Enabled
3,230,014 UART: [fht] FMC Alias Private Key: 7
3,348,762 UART: [art] Extend RT PCRs Done
3,349,190 UART: [art] Lock RT PCRs Done
3,350,692 UART: [art] Populate DV Done
3,358,677 UART: [fht] FMC Alias Private Key: 7
3,359,723 UART: [art] Derive CDI
3,360,003 UART: [art] Store in slot 0x4
3,445,621 UART: [art] Derive Key Pair
3,445,981 UART: [art] Store priv key in slot 0x5
3,459,400 UART: [art] Derive Key Pair - Done
3,474,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,703 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,468 UART: [art] PUB.X = 45C438B96511808F3C296B0C889F252BE94B55BEDC10B2355EE666113EFA8E1F15B27F50BB75B64BCD262C85E4468F03
3,497,236 UART: [art] PUB.Y = 4140F0D82EBEFC3A072E04B924255268DA7D27E27907CB6FB74F12C90C856AC36CAB74F94E0543A9161A6C71F500C6BB
3,504,157 UART: [art] SIG.R = 8F81E9980D2E5E8517DF5A0D5BB017D66E0DAECCCE8E7C24A0B3B6F3D8D4BAA8D7FDB2014FEC6586317DD061CED89D82
3,510,941 UART: [art] SIG.S = 340248B4527BC7834FE82EC63842FDBC44162062399F4403CCB7F075DD0A39AC0633D8ED9DBF45C821DA4BCC9BD18BE7
3,534,489 UART: Caliptra RT
3,534,832 UART: [state] CFI Enabled
3,655,730 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,522 UART: [rt]cmd =0x44504543, len=96
3,719,336 >>> mbox cmd response data (56 bytes)
3,719,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,284 UART: [rt]cmd =0x44504543, len=96
3,781,421 >>> mbox cmd response data (56 bytes)
3,781,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,811,347 UART: [rt]cmd =0x44504543, len=96
3,844,113 >>> mbox cmd response data (56 bytes)
3,844,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,874,247 UART: [rt]cmd =0x44504543, len=96
3,907,264 >>> mbox cmd response data (56 bytes)
3,907,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,412 UART: [rt]cmd =0x44504543, len=96
3,970,500 >>> mbox cmd response data (56 bytes)
3,970,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,000,174 UART: [rt]cmd =0x44504543, len=96
4,033,271 >>> mbox cmd response data (56 bytes)
4,033,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,063,011 UART: [rt]cmd =0x44504543, len=96
4,096,183 >>> mbox cmd response data (56 bytes)
4,096,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,126,131 UART: [rt]cmd =0x44504543, len=96
4,158,338 >>> mbox cmd response data (56 bytes)
4,158,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,188,376 UART: [rt]cmd =0x44504543, len=96
4,221,666 >>> mbox cmd response data (56 bytes)
4,221,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,251,750 UART: [rt]cmd =0x44504543, len=96
4,284,321 >>> mbox cmd response data (56 bytes)
4,284,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,314,279 UART: [rt]cmd =0x44504543, len=96
4,346,935 >>> mbox cmd response data (56 bytes)
4,346,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,376,769 UART: [rt]cmd =0x44504543, len=96
4,409,878 >>> mbox cmd response data (56 bytes)
4,409,879 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,439,210 UART: [rt]cmd =0x52435458, len=8
4,440,647 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,720 ready_for_fw is high
1,362,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,389 >>> mbox cmd response: success
2,980,389 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,041,928 UART:
3,041,944 UART: Running Caliptra FMC ...
3,042,352 UART:
3,042,495 UART: [state] CFI Enabled
3,053,249 UART: [fht] FMC Alias Private Key: 7
3,172,183 UART: [art] Extend RT PCRs Done
3,172,611 UART: [art] Lock RT PCRs Done
3,174,191 UART: [art] Populate DV Done
3,182,272 UART: [fht] FMC Alias Private Key: 7
3,183,284 UART: [art] Derive CDI
3,183,564 UART: [art] Store in slot 0x4
3,269,236 UART: [art] Derive Key Pair
3,269,596 UART: [art] Store priv key in slot 0x5
3,282,991 UART: [art] Derive Key Pair - Done
3,297,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,394 UART: [art] PUB.X = A704B577F4CCA9D48D4A081C4835193568FE2772DF73DBA2CA0C6C29FB1D8F59ABC38352F1E34B178DB5F58F150831A6
3,321,162 UART: [art] PUB.Y = 7F4DE5BF12D55189E3FF24277B26DD2D41AF46DE1DE4C2A5D680750024B87DF9E0FD97D629CF7FDBE58571B570DCE28B
3,328,108 UART: [art] SIG.R = 395019512DDEA3EE40091BCA9EA9586C61B4DC3CD41D3A49AA5B72B44DEE91C516DCCD733B61E75242C273FC92151842
3,334,885 UART: [art] SIG.S = D0D2BEDAC1956B2E83609E5192705840BF05C84A133850E82A5565E451B225B9D25C8597DFE71EBCE197E03F940DB233
3,359,061 UART: Caliptra RT
3,359,404 UART: [state] CFI Enabled
3,479,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,158 UART: [rt]cmd =0x44504543, len=96
3,542,568 >>> mbox cmd response data (56 bytes)
3,542,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,572,644 UART: [rt]cmd =0x44504543, len=96
3,605,853 >>> mbox cmd response data (56 bytes)
3,605,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,805 UART: [rt]cmd =0x44504543, len=96
3,668,467 >>> mbox cmd response data (56 bytes)
3,668,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,387 UART: [rt]cmd =0x44504543, len=96
3,731,332 >>> mbox cmd response data (56 bytes)
3,731,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,176 UART: [rt]cmd =0x44504543, len=96
3,794,138 >>> mbox cmd response data (56 bytes)
3,794,139 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,168 UART: [rt]cmd =0x44504543, len=96
3,856,961 >>> mbox cmd response data (56 bytes)
3,856,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,755 UART: [rt]cmd =0x44504543, len=96
3,920,143 >>> mbox cmd response data (56 bytes)
3,920,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,945 UART: [rt]cmd =0x44504543, len=96
3,982,994 >>> mbox cmd response data (56 bytes)
3,982,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,974 UART: [rt]cmd =0x44504543, len=96
4,046,338 >>> mbox cmd response data (56 bytes)
4,046,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,270 UART: [rt]cmd =0x44504543, len=96
4,108,989 >>> mbox cmd response data (56 bytes)
4,108,990 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,013 UART: [rt]cmd =0x44504543, len=96
4,172,791 >>> mbox cmd response data (56 bytes)
4,172,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,202,759 UART: [rt]cmd =0x44504543, len=96
4,234,974 >>> mbox cmd response data (56 bytes)
4,234,975 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,264,226 UART: [rt]cmd =0x52435458, len=8
4,265,857 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,733 UART: [state] WD Timer not started. Device not locked for debugging
88,062 UART: [kat] SHA2-256
891,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,716 UART: [kat] ++
895,868 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,795 UART: [kat] SHA2-512-ACC
906,696 UART: [kat] ECC-384
916,329 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,186 UART: [cold-reset] ++
1,170,750 UART: [fht] FHT @ 0x50003400
1,173,286 UART: [idev] ++
1,173,454 UART: [idev] CDI.KEYID = 6
1,173,815 UART: [idev] SUBJECT.KEYID = 7
1,174,240 UART: [idev] UDS.KEYID = 0
1,174,586 ready_for_fw is high
1,174,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,299 UART: [idev] Sha1 KeyId Algorithm
1,208,021 UART: [idev] --
1,209,136 UART: [ldev] ++
1,209,304 UART: [ldev] CDI.KEYID = 6
1,209,668 UART: [ldev] SUBJECT.KEYID = 5
1,210,095 UART: [ldev] AUTHORITY.KEYID = 7
1,210,558 UART: [ldev] FE.KEYID = 1
1,215,924 UART: [ldev] Erasing FE.KEYID = 1
1,242,051 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,038 UART: [ldev] --
1,281,409 UART: [fwproc] Wait for Commands...
1,282,120 UART: [fwproc] Recv command 0x46574c44
1,282,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,958 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,475 >>> mbox cmd response: success
2,824,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,601 UART: [afmc] ++
2,825,769 UART: [afmc] CDI.KEYID = 6
2,826,132 UART: [afmc] SUBJECT.KEYID = 7
2,826,558 UART: [afmc] AUTHORITY.KEYID = 5
2,862,053 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,917 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,508 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,209 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,020 UART: [afmc] --
2,904,993 UART: [cold-reset] --
2,905,875 UART: [state] Locking Datavault
2,907,026 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,630 UART: [state] Locking ICCM
2,908,208 UART: [exit] Launching FMC @ 0x40000130
2,913,538 UART:
2,913,554 UART: Running Caliptra FMC ...
2,913,962 UART:
2,914,016 UART: [state] CFI Enabled
2,924,616 UART: [fht] FMC Alias Private Key: 7
3,043,628 UART: [art] Extend RT PCRs Done
3,044,056 UART: [art] Lock RT PCRs Done
3,045,766 UART: [art] Populate DV Done
3,054,139 UART: [fht] FMC Alias Private Key: 7
3,055,309 UART: [art] Derive CDI
3,055,589 UART: [art] Store in slot 0x4
3,141,506 UART: [art] Derive Key Pair
3,141,866 UART: [art] Store priv key in slot 0x5
3,155,146 UART: [art] Derive Key Pair - Done
3,169,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,136 UART: [art] PUB.X = 05457AA57DA42C10EBF58E16A19CF7970733FE2706086BE6900FFCD3FA56CF4AF4D60F744C55FFA2DC823BC4611F93CB
3,192,904 UART: [art] PUB.Y = 660DDF01D1D627FFB131BC4A4501FDD14BAC9FADF93B842C9C3D84CD4403C850654C3A3E1E2197776E6197A5B2A102E8
3,199,851 UART: [art] SIG.R = CCBFAB31C8D3239331C84FECDC8121DCE03692327758A35A023A0702F0A954F62A87BE11E046EA6732679FAEFE494A14
3,206,620 UART: [art] SIG.S = EBD8A8999FBA4A9C86A4DA0ECFCC4E742F71CD573EEAA4C8C0B2F7AAF8DB66EA6F44758A024401D5EB95D31BEE400674
3,230,314 UART: Caliptra RT
3,230,565 UART: [state] CFI Enabled
3,350,631 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,847 UART: [rt]cmd =0x44504543, len=96
3,415,043 >>> mbox cmd response data (56 bytes)
3,415,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,941 UART: [rt]cmd =0x44504543, len=96
3,477,756 >>> mbox cmd response data (56 bytes)
3,477,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,882 UART: [rt]cmd =0x44504543, len=96
3,541,596 >>> mbox cmd response data (56 bytes)
3,541,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,310 UART: [rt]cmd =0x44504543, len=96
3,603,457 >>> mbox cmd response data (56 bytes)
3,603,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,633,285 UART: [rt]cmd =0x44504543, len=96
3,665,827 >>> mbox cmd response data (56 bytes)
3,665,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,913 UART: [rt]cmd =0x44504543, len=96
3,728,936 >>> mbox cmd response data (56 bytes)
3,728,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,036 UART: [rt]cmd =0x44504543, len=96
3,792,590 >>> mbox cmd response data (56 bytes)
3,792,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,308 UART: [rt]cmd =0x44504543, len=96
3,855,421 >>> mbox cmd response data (56 bytes)
3,855,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,885,497 UART: [rt]cmd =0x44504543, len=96
3,919,101 >>> mbox cmd response data (56 bytes)
3,919,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,039 UART: [rt]cmd =0x44504543, len=96
3,982,480 >>> mbox cmd response data (56 bytes)
3,982,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,572 UART: [rt]cmd =0x44504543, len=96
4,046,248 >>> mbox cmd response data (56 bytes)
4,046,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,328 UART: [rt]cmd =0x44504543, len=96
4,109,987 >>> mbox cmd response data (56 bytes)
4,109,988 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,423 UART: [rt]cmd =0x52435458, len=8
4,140,782 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,918 ready_for_fw is high
1,058,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,988 >>> mbox cmd response: success
2,676,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,738,779 UART:
2,738,795 UART: Running Caliptra FMC ...
2,739,203 UART:
2,739,257 UART: [state] CFI Enabled
2,749,979 UART: [fht] FMC Alias Private Key: 7
2,869,087 UART: [art] Extend RT PCRs Done
2,869,515 UART: [art] Lock RT PCRs Done
2,871,005 UART: [art] Populate DV Done
2,879,032 UART: [fht] FMC Alias Private Key: 7
2,880,166 UART: [art] Derive CDI
2,880,446 UART: [art] Store in slot 0x4
2,966,733 UART: [art] Derive Key Pair
2,967,093 UART: [art] Store priv key in slot 0x5
2,980,517 UART: [art] Derive Key Pair - Done
2,994,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,892 UART: [art] PUB.X = 140AA42C0ED608658E9730BDEFEB037A9E79E59E42C6B0EF8FAD05DA3B801241A8E3F9B80B285103BCF4E3B8EC96AB04
3,017,656 UART: [art] PUB.Y = BC6DF5033FDB340C3665B3B549EDB28945003333098436989E3604414107398305DEB1295F02DAC76BD7A95B4D82FA64
3,024,557 UART: [art] SIG.R = EACB1C89EBC020C85662CED8E543C71C0713801E9B16F62BBD97E5144D2920A0B9E4A26CA9B1622E1C394539CE7FE63F
3,031,336 UART: [art] SIG.S = 784A5E97101E553A2113A650D993710E2323B40CE99DC5D15FC932BD811E8114BEB0F45DFB4DEAAFCD793A73728C6BE5
3,055,744 UART: Caliptra RT
3,055,995 UART: [state] CFI Enabled
3,175,738 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,746 UART: [rt]cmd =0x44504543, len=96
3,239,366 >>> mbox cmd response data (56 bytes)
3,239,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,056 UART: [rt]cmd =0x44504543, len=96
3,301,543 >>> mbox cmd response data (56 bytes)
3,301,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,331,507 UART: [rt]cmd =0x44504543, len=96
3,364,149 >>> mbox cmd response data (56 bytes)
3,364,150 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,191 UART: [rt]cmd =0x44504543, len=96
3,426,722 >>> mbox cmd response data (56 bytes)
3,426,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,456,724 UART: [rt]cmd =0x44504543, len=96
3,489,246 >>> mbox cmd response data (56 bytes)
3,489,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,310 UART: [rt]cmd =0x44504543, len=96
3,552,691 >>> mbox cmd response data (56 bytes)
3,552,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,683 UART: [rt]cmd =0x44504543, len=96
3,615,399 >>> mbox cmd response data (56 bytes)
3,615,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,645,311 UART: [rt]cmd =0x44504543, len=96
3,678,928 >>> mbox cmd response data (56 bytes)
3,678,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,708,824 UART: [rt]cmd =0x44504543, len=96
3,741,562 >>> mbox cmd response data (56 bytes)
3,741,563 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,771,462 UART: [rt]cmd =0x44504543, len=96
3,804,689 >>> mbox cmd response data (56 bytes)
3,804,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,681 UART: [rt]cmd =0x44504543, len=96
3,867,565 >>> mbox cmd response data (56 bytes)
3,867,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,721 UART: [rt]cmd =0x44504543, len=96
3,930,676 >>> mbox cmd response data (56 bytes)
3,930,677 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,959,934 UART: [rt]cmd =0x52435458, len=8
3,961,579 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
891,657 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,761 UART: [kat] ++
895,913 UART: [kat] sha1
900,029 UART: [kat] SHA2-256
901,969 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,962 UART: [kat] HMAC-384Kdf
921,750 UART: [kat] LMS
1,170,062 UART: [kat] --
1,170,995 UART: [cold-reset] ++
1,171,397 UART: [fht] FHT @ 0x50003400
1,173,855 UART: [idev] ++
1,174,023 UART: [idev] CDI.KEYID = 6
1,174,384 UART: [idev] SUBJECT.KEYID = 7
1,174,809 UART: [idev] UDS.KEYID = 0
1,175,155 ready_for_fw is high
1,175,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,856 UART: [idev] Erasing UDS.KEYID = 0
1,199,758 UART: [idev] Sha1 KeyId Algorithm
1,208,512 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,243,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,332 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,059 UART: [ldev] --
1,282,402 UART: [fwproc] Wait for Commands...
1,283,011 UART: [fwproc] Recv command 0x46574c44
1,283,744 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,954 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,129 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,508 >>> mbox cmd response: success
2,826,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,746 UART: [afmc] ++
2,827,914 UART: [afmc] CDI.KEYID = 6
2,828,277 UART: [afmc] SUBJECT.KEYID = 7
2,828,703 UART: [afmc] AUTHORITY.KEYID = 5
2,864,364 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,526 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,236 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,117 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,818 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,725 UART: [afmc] --
2,907,660 UART: [cold-reset] --
2,908,700 UART: [state] Locking Datavault
2,909,983 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,587 UART: [state] Locking ICCM
2,911,097 UART: [exit] Launching FMC @ 0x40000130
2,916,427 UART:
2,916,443 UART: Running Caliptra FMC ...
2,916,851 UART:
2,916,994 UART: [state] CFI Enabled
2,927,898 UART: [fht] FMC Alias Private Key: 7
3,046,478 UART: [art] Extend RT PCRs Done
3,046,906 UART: [art] Lock RT PCRs Done
3,048,656 UART: [art] Populate DV Done
3,056,773 UART: [fht] FMC Alias Private Key: 7
3,057,847 UART: [art] Derive CDI
3,058,127 UART: [art] Store in slot 0x4
3,143,826 UART: [art] Derive Key Pair
3,144,186 UART: [art] Store priv key in slot 0x5
3,157,386 UART: [art] Derive Key Pair - Done
3,172,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,386 UART: [art] PUB.X = 9E60C6B606AF98E80E7D30441EB9AB2C42EC5576348951B6CD1DF0FB55B1616F89EC36A0A0D8C7AFBA71DCFA72101E4C
3,195,168 UART: [art] PUB.Y = 82E46FB6EE759AD3E641B5442CFC92640CA9970247039813541411D711B6B739820EA915A10ADC163B0CB45F630B3B42
3,202,093 UART: [art] SIG.R = 8820C8BC3ABC705FF67425748A4E7BC54A3F6E0B21CA1381EB980F278101F9A82C24644DA7B5C25CC5978A3D30A6D707
3,208,857 UART: [art] SIG.S = EEE09F33E196AA260125B3DA288619C849AF4F26BF3EBBD5DA0576BD31A88D39A2AB7ADCCA6AAA744C56744307190D8C
3,232,827 UART: Caliptra RT
3,233,170 UART: [state] CFI Enabled
3,352,408 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,614 UART: [rt]cmd =0x44504543, len=96
3,416,722 >>> mbox cmd response data (56 bytes)
3,416,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,446,700 UART: [rt]cmd =0x44504543, len=96
3,480,065 >>> mbox cmd response data (56 bytes)
3,480,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,039 UART: [rt]cmd =0x44504543, len=96
3,543,691 >>> mbox cmd response data (56 bytes)
3,543,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,781 UART: [rt]cmd =0x44504543, len=96
3,606,662 >>> mbox cmd response data (56 bytes)
3,606,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,884 UART: [rt]cmd =0x44504543, len=96
3,669,654 >>> mbox cmd response data (56 bytes)
3,669,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,590 UART: [rt]cmd =0x44504543, len=96
3,732,679 >>> mbox cmd response data (56 bytes)
3,732,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,777 UART: [rt]cmd =0x44504543, len=96
3,795,651 >>> mbox cmd response data (56 bytes)
3,795,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,573 UART: [rt]cmd =0x44504543, len=96
3,858,754 >>> mbox cmd response data (56 bytes)
3,858,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,512 UART: [rt]cmd =0x44504543, len=96
3,921,914 >>> mbox cmd response data (56 bytes)
3,921,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,694 UART: [rt]cmd =0x44504543, len=96
3,984,469 >>> mbox cmd response data (56 bytes)
3,984,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,567 UART: [rt]cmd =0x44504543, len=96
4,047,927 >>> mbox cmd response data (56 bytes)
4,047,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,779 UART: [rt]cmd =0x44504543, len=96
4,111,468 >>> mbox cmd response data (56 bytes)
4,111,469 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,866 UART: [rt]cmd =0x52435458, len=8
4,142,409 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,967 ready_for_fw is high
1,058,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,227 >>> mbox cmd response: success
2,679,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,232 UART:
2,741,248 UART: Running Caliptra FMC ...
2,741,656 UART:
2,741,799 UART: [state] CFI Enabled
2,752,411 UART: [fht] FMC Alias Private Key: 7
2,871,013 UART: [art] Extend RT PCRs Done
2,871,441 UART: [art] Lock RT PCRs Done
2,873,029 UART: [art] Populate DV Done
2,881,458 UART: [fht] FMC Alias Private Key: 7
2,882,482 UART: [art] Derive CDI
2,882,762 UART: [art] Store in slot 0x4
2,968,895 UART: [art] Derive Key Pair
2,969,255 UART: [art] Store priv key in slot 0x5
2,982,803 UART: [art] Derive Key Pair - Done
2,997,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,143 UART: [art] PUB.X = B6BB35EA8A074126FC7E62748E1CBFCFB3C0CA6D4FAE605A483491F268FA11911446DDD213265C9B1400AA2D57754B1D
3,020,900 UART: [art] PUB.Y = 4B1B0B74B425BA4E1C668E1E4717714E66A8E89FB1C645F52290F2338CB004C38A20E5DA18633B68BA10F046FB2765F7
3,027,846 UART: [art] SIG.R = 4191971C306446A88B6914C7FBDA529CA6DB47DD65BC3EF26423317B915F5D12AD0D7960BE49108F67B3FD646458983A
3,034,613 UART: [art] SIG.S = 7AF776805AAED2611FAAE07A3531C2F19BF1D99639FDAD32A7A3222769DC07B5B53297983D1498DAD7897BEC54928802
3,058,367 UART: Caliptra RT
3,058,710 UART: [state] CFI Enabled
3,178,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,194 UART: [rt]cmd =0x44504543, len=96
3,242,614 >>> mbox cmd response data (56 bytes)
3,242,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,272,406 UART: [rt]cmd =0x44504543, len=96
3,305,035 >>> mbox cmd response data (56 bytes)
3,305,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,859 UART: [rt]cmd =0x44504543, len=96
3,367,817 >>> mbox cmd response data (56 bytes)
3,367,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,819 UART: [rt]cmd =0x44504543, len=96
3,429,492 >>> mbox cmd response data (56 bytes)
3,429,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,396 UART: [rt]cmd =0x44504543, len=96
3,492,244 >>> mbox cmd response data (56 bytes)
3,492,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,112 UART: [rt]cmd =0x44504543, len=96
3,554,919 >>> mbox cmd response data (56 bytes)
3,554,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,584,859 UART: [rt]cmd =0x44504543, len=96
3,617,833 >>> mbox cmd response data (56 bytes)
3,617,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,647,855 UART: [rt]cmd =0x44504543, len=96
3,680,624 >>> mbox cmd response data (56 bytes)
3,680,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,528 UART: [rt]cmd =0x44504543, len=96
3,743,918 >>> mbox cmd response data (56 bytes)
3,743,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,773,818 UART: [rt]cmd =0x44504543, len=96
3,807,605 >>> mbox cmd response data (56 bytes)
3,807,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,617 UART: [rt]cmd =0x44504543, len=96
3,870,117 >>> mbox cmd response data (56 bytes)
3,870,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,005 UART: [rt]cmd =0x44504543, len=96
3,933,216 >>> mbox cmd response data (56 bytes)
3,933,217 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,602 UART: [rt]cmd =0x52435458, len=8
3,964,021 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,463 UART: [state] WD Timer not started. Device not locked for debugging
87,802 UART: [kat] SHA2-256
893,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,577 UART: [kat] ++
897,729 UART: [kat] sha1
902,049 UART: [kat] SHA2-256
903,989 UART: [kat] SHA2-384
906,656 UART: [kat] SHA2-512-ACC
908,557 UART: [kat] ECC-384
918,404 UART: [kat] HMAC-384Kdf
922,976 UART: [kat] LMS
1,171,304 UART: [kat] --
1,172,177 UART: [cold-reset] ++
1,172,703 UART: [fht] FHT @ 0x50003400
1,175,326 UART: [idev] ++
1,175,494 UART: [idev] CDI.KEYID = 6
1,175,854 UART: [idev] SUBJECT.KEYID = 7
1,176,278 UART: [idev] UDS.KEYID = 0
1,176,623 ready_for_fw is high
1,176,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,201,205 UART: [idev] Sha1 KeyId Algorithm
1,209,707 UART: [idev] --
1,210,813 UART: [ldev] ++
1,210,981 UART: [ldev] CDI.KEYID = 6
1,211,344 UART: [ldev] SUBJECT.KEYID = 5
1,211,770 UART: [ldev] AUTHORITY.KEYID = 7
1,212,233 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,243,326 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,816 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,218 UART: [fwproc] Wait for Commands...
1,283,896 UART: [fwproc] Recv command 0x46574c44
1,284,624 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,581 >>> mbox cmd response: success
2,827,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,669 UART: [afmc] ++
2,828,837 UART: [afmc] CDI.KEYID = 6
2,829,199 UART: [afmc] SUBJECT.KEYID = 7
2,829,624 UART: [afmc] AUTHORITY.KEYID = 5
2,864,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,314 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,654 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,355 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,347 UART: [afmc] --
2,908,429 UART: [cold-reset] --
2,909,161 UART: [state] Locking Datavault
2,910,494 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,098 UART: [state] Locking ICCM
2,911,704 UART: [exit] Launching FMC @ 0x40000130
2,917,034 UART:
2,917,050 UART: Running Caliptra FMC ...
2,917,458 UART:
2,917,512 UART: [state] CFI Enabled
2,928,122 UART: [fht] FMC Alias Private Key: 7
3,046,958 UART: [art] Extend RT PCRs Done
3,047,386 UART: [art] Lock RT PCRs Done
3,048,928 UART: [art] Populate DV Done
3,057,185 UART: [fht] FMC Alias Private Key: 7
3,058,333 UART: [art] Derive CDI
3,058,613 UART: [art] Store in slot 0x4
3,144,302 UART: [art] Derive Key Pair
3,144,662 UART: [art] Store priv key in slot 0x5
3,157,216 UART: [art] Derive Key Pair - Done
3,171,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,049 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,814 UART: [art] PUB.X = BCAF508091C237F0BE90E3BB28F2424D6B4B960CDCB37955C47C99FF69A841C5D10926775E51AF91B701916579A93FAC
3,194,581 UART: [art] PUB.Y = 1609EBFDFD63CD5332483CCE5F54741569B7D19E6BD8D24C8868E629551730288F9516EC30ED76F42DB7691919A77018
3,201,524 UART: [art] SIG.R = DA94A7108FECBAD1665B5255F104DD7B785D15AE78EAC4403A69921AC111FBEBDD83C7C23BFB5934269EFE8E36E84D03
3,208,306 UART: [art] SIG.S = FC1A25B8F1A2E3FFF41D868E173341663D6D0F6E83809CEEA3751108C936C1E118501A7AE2B23977E9817A062FCEA872
3,232,393 UART: Caliptra RT
3,232,644 UART: [state] CFI Enabled
3,352,084 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,940 UART: [rt]cmd =0x44504543, len=96
3,415,044 >>> mbox cmd response data (56 bytes)
3,415,045 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,445,186 UART: [rt]cmd =0x44504543, len=96
3,477,893 >>> mbox cmd response data (56 bytes)
3,477,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,937 UART: [rt]cmd =0x44504543, len=96
3,541,257 >>> mbox cmd response data (56 bytes)
3,541,258 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,571,295 UART: [rt]cmd =0x44504543, len=96
3,604,736 >>> mbox cmd response data (56 bytes)
3,604,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,610 UART: [rt]cmd =0x44504543, len=96
3,667,494 >>> mbox cmd response data (56 bytes)
3,667,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,426 UART: [rt]cmd =0x44504543, len=96
3,729,901 >>> mbox cmd response data (56 bytes)
3,729,902 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,759,919 UART: [rt]cmd =0x44504543, len=96
3,792,471 >>> mbox cmd response data (56 bytes)
3,792,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,822,283 UART: [rt]cmd =0x44504543, len=96
3,854,996 >>> mbox cmd response data (56 bytes)
3,854,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,884,894 UART: [rt]cmd =0x44504543, len=96
3,918,502 >>> mbox cmd response data (56 bytes)
3,918,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,948,260 UART: [rt]cmd =0x44504543, len=96
3,982,277 >>> mbox cmd response data (56 bytes)
3,982,278 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,097 UART: [rt]cmd =0x44504543, len=96
4,045,451 >>> mbox cmd response data (56 bytes)
4,045,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,385 UART: [rt]cmd =0x44504543, len=96
4,108,300 >>> mbox cmd response data (56 bytes)
4,108,301 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,544 UART: [rt]cmd =0x52435458, len=8
4,139,235 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 ready_for_fw is high
1,060,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,958 >>> mbox cmd response: success
2,678,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,877 UART:
2,740,893 UART: Running Caliptra FMC ...
2,741,301 UART:
2,741,355 UART: [state] CFI Enabled
2,751,687 UART: [fht] FMC Alias Private Key: 7
2,870,975 UART: [art] Extend RT PCRs Done
2,871,403 UART: [art] Lock RT PCRs Done
2,873,123 UART: [art] Populate DV Done
2,881,122 UART: [fht] FMC Alias Private Key: 7
2,882,240 UART: [art] Derive CDI
2,882,520 UART: [art] Store in slot 0x4
2,968,721 UART: [art] Derive Key Pair
2,969,081 UART: [art] Store priv key in slot 0x5
2,982,117 UART: [art] Derive Key Pair - Done
2,996,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,617 UART: [art] PUB.X = 1ACFA1DF2A196F5447C2CE2279063005C7448734580EDC1C7C964F3E18A6778846CE3ACF6AF5D97654F51A43FB365027
3,019,380 UART: [art] PUB.Y = AD7C7F66E4B65BA4A0E513837D3DF65764E89148425CC4DDE354F77081B41389FB17412309F6C2335107167587D97537
3,026,314 UART: [art] SIG.R = 682F2BBF865F387C7C8F81EAA52864CBD8A386AAC829B4F03352051F42C4893A5837AB8BB862A5F790A9B2329DFCD712
3,033,089 UART: [art] SIG.S = 9BF116D971FB889D07EAA7AF39BBC2EB4EB340AD7345558310AA0BCE71EDE993725BEE804702AD6EDFB7F46A4CC72783
3,057,290 UART: Caliptra RT
3,057,541 UART: [state] CFI Enabled
3,177,134 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,262 UART: [rt]cmd =0x44504543, len=96
3,240,686 >>> mbox cmd response data (56 bytes)
3,240,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,572 UART: [rt]cmd =0x44504543, len=96
3,303,743 >>> mbox cmd response data (56 bytes)
3,303,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,333,763 UART: [rt]cmd =0x44504543, len=96
3,366,759 >>> mbox cmd response data (56 bytes)
3,366,760 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,893 UART: [rt]cmd =0x44504543, len=96
3,430,174 >>> mbox cmd response data (56 bytes)
3,430,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,460,198 UART: [rt]cmd =0x44504543, len=96
3,493,212 >>> mbox cmd response data (56 bytes)
3,493,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,122 UART: [rt]cmd =0x44504543, len=96
3,555,881 >>> mbox cmd response data (56 bytes)
3,555,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,913 UART: [rt]cmd =0x44504543, len=96
3,619,039 >>> mbox cmd response data (56 bytes)
3,619,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,013 UART: [rt]cmd =0x44504543, len=96
3,681,414 >>> mbox cmd response data (56 bytes)
3,681,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,278 UART: [rt]cmd =0x44504543, len=96
3,743,606 >>> mbox cmd response data (56 bytes)
3,743,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,773,308 UART: [rt]cmd =0x44504543, len=96
3,806,827 >>> mbox cmd response data (56 bytes)
3,806,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,836,669 UART: [rt]cmd =0x44504543, len=96
3,869,961 >>> mbox cmd response data (56 bytes)
3,869,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,787 UART: [rt]cmd =0x44504543, len=96
3,933,166 >>> mbox cmd response data (56 bytes)
3,933,167 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,702 UART: [rt]cmd =0x52435458, len=8
3,964,277 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,708 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,901 UART: [kat] SHA2-512-ACC
908,802 UART: [kat] ECC-384
918,823 UART: [kat] HMAC-384Kdf
923,425 UART: [kat] LMS
1,171,753 UART: [kat] --
1,172,732 UART: [cold-reset] ++
1,173,266 UART: [fht] FHT @ 0x50003400
1,175,773 UART: [idev] ++
1,175,941 UART: [idev] CDI.KEYID = 6
1,176,301 UART: [idev] SUBJECT.KEYID = 7
1,176,725 UART: [idev] UDS.KEYID = 0
1,177,070 ready_for_fw is high
1,177,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,201,740 UART: [idev] Sha1 KeyId Algorithm
1,210,180 UART: [idev] --
1,211,144 UART: [ldev] ++
1,211,312 UART: [ldev] CDI.KEYID = 6
1,211,675 UART: [ldev] SUBJECT.KEYID = 5
1,212,101 UART: [ldev] AUTHORITY.KEYID = 7
1,212,564 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,226 UART: [ldev] --
1,284,591 UART: [fwproc] Wait for Commands...
1,285,201 UART: [fwproc] Recv command 0x46574c44
1,285,929 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,659 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,948 >>> mbox cmd response: success
2,829,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,831,034 UART: [afmc] ++
2,831,202 UART: [afmc] CDI.KEYID = 6
2,831,564 UART: [afmc] SUBJECT.KEYID = 7
2,831,989 UART: [afmc] AUTHORITY.KEYID = 5
2,867,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,033 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,156 UART: [afmc] --
2,911,234 UART: [cold-reset] --
2,911,942 UART: [state] Locking Datavault
2,913,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,827 UART: [state] Locking ICCM
2,914,357 UART: [exit] Launching FMC @ 0x40000130
2,919,687 UART:
2,919,703 UART: Running Caliptra FMC ...
2,920,111 UART:
2,920,254 UART: [state] CFI Enabled
2,930,606 UART: [fht] FMC Alias Private Key: 7
3,049,636 UART: [art] Extend RT PCRs Done
3,050,064 UART: [art] Lock RT PCRs Done
3,051,612 UART: [art] Populate DV Done
3,059,965 UART: [fht] FMC Alias Private Key: 7
3,061,053 UART: [art] Derive CDI
3,061,333 UART: [art] Store in slot 0x4
3,147,348 UART: [art] Derive Key Pair
3,147,708 UART: [art] Store priv key in slot 0x5
3,161,302 UART: [art] Derive Key Pair - Done
3,176,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,301 UART: [art] PUB.X = 6F00D8F538BFF4BBB00BB105EC4A7376B3359A8F0404E4F6E0620A28342A9E0EC0F1FEFCAA4456503467D2ECF69B4FFA
3,199,049 UART: [art] PUB.Y = CB1ABD8431350552D3F25248D660EE41802E843D4448BA7978574A7E23B367F754E5915E50626DC535A553DCECD6A122
3,205,992 UART: [art] SIG.R = CB5C8AB3CDE65E93736BDAFABEEB8811C2E1805B1B36E5752A3BA391B550F2690C71F62801FEC0FFB2E794F94AF2DB13
3,212,778 UART: [art] SIG.S = 5CEEB76DACBC0F5C02D891AC472FF1AABF2B0CD2F55BB8EBF40A15FBF523E4DCC6922478B65568F4F88BFDEF284465CA
3,236,386 UART: Caliptra RT
3,236,729 UART: [state] CFI Enabled
3,356,112 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,990 UART: [rt]cmd =0x44504543, len=96
3,420,288 >>> mbox cmd response data (56 bytes)
3,420,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,264 UART: [rt]cmd =0x44504543, len=96
3,482,927 >>> mbox cmd response data (56 bytes)
3,482,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,953 UART: [rt]cmd =0x44504543, len=96
3,545,717 >>> mbox cmd response data (56 bytes)
3,545,718 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,455 UART: [rt]cmd =0x44504543, len=96
3,608,162 >>> mbox cmd response data (56 bytes)
3,608,163 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,060 UART: [rt]cmd =0x44504543, len=96
3,671,022 >>> mbox cmd response data (56 bytes)
3,671,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,900 UART: [rt]cmd =0x44504543, len=96
3,733,711 >>> mbox cmd response data (56 bytes)
3,733,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,763,461 UART: [rt]cmd =0x44504543, len=96
3,796,407 >>> mbox cmd response data (56 bytes)
3,796,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,826,139 UART: [rt]cmd =0x44504543, len=96
3,859,598 >>> mbox cmd response data (56 bytes)
3,859,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,889,682 UART: [rt]cmd =0x44504543, len=96
3,921,924 >>> mbox cmd response data (56 bytes)
3,921,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,868 UART: [rt]cmd =0x44504543, len=96
3,984,867 >>> mbox cmd response data (56 bytes)
3,984,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,829 UART: [rt]cmd =0x44504543, len=96
4,047,881 >>> mbox cmd response data (56 bytes)
4,047,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,077,857 UART: [rt]cmd =0x44504543, len=96
4,111,350 >>> mbox cmd response data (56 bytes)
4,111,351 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,672 UART: [rt]cmd =0x52435458, len=8
4,142,101 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,312 ready_for_fw is high
1,060,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,847 >>> mbox cmd response: success
2,679,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,696 UART:
2,741,712 UART: Running Caliptra FMC ...
2,742,120 UART:
2,742,263 UART: [state] CFI Enabled
2,752,699 UART: [fht] FMC Alias Private Key: 7
2,871,711 UART: [art] Extend RT PCRs Done
2,872,139 UART: [art] Lock RT PCRs Done
2,873,749 UART: [art] Populate DV Done
2,881,896 UART: [fht] FMC Alias Private Key: 7
2,882,844 UART: [art] Derive CDI
2,883,124 UART: [art] Store in slot 0x4
2,969,159 UART: [art] Derive Key Pair
2,969,519 UART: [art] Store priv key in slot 0x5
2,983,165 UART: [art] Derive Key Pair - Done
2,998,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,231 UART: [art] PUB.X = 4296682EA78F52A0AAA890AB529BD73D6DCDCFDC971E58FCED9E7C0F879DD45CF7E8E627B1A6A28A6AAA92D2ADB0136D
3,021,026 UART: [art] PUB.Y = 8524AE2399044CEEAC630730F9443BB3209251DAF1FDABB68683A732A29282211E957208BB45412C5E6557DCED59575B
3,027,965 UART: [art] SIG.R = 13A69A721DFB3234BC2951C3C138E304AFA9D4B096EEC5791BBD4F03DDC3CA145F079398899BAFEF3F7FC9CFBBE7BB91
3,034,750 UART: [art] SIG.S = 2D4097B293E3FC5B67BE2B21B47D8A7F73E86F158016658AA9A68B80103C58A14639F9D81E537D3274CB3D1CC459E1A9
3,058,600 UART: Caliptra RT
3,058,943 UART: [state] CFI Enabled
3,177,895 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,827 UART: [rt]cmd =0x44504543, len=96
3,241,561 >>> mbox cmd response data (56 bytes)
3,241,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,465 UART: [rt]cmd =0x44504543, len=96
3,304,316 >>> mbox cmd response data (56 bytes)
3,304,317 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,294 UART: [rt]cmd =0x44504543, len=96
3,366,898 >>> mbox cmd response data (56 bytes)
3,366,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,000 UART: [rt]cmd =0x44504543, len=96
3,429,895 >>> mbox cmd response data (56 bytes)
3,429,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,885 UART: [rt]cmd =0x44504543, len=96
3,492,965 >>> mbox cmd response data (56 bytes)
3,492,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,669 UART: [rt]cmd =0x44504543, len=96
3,555,086 >>> mbox cmd response data (56 bytes)
3,555,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,585,256 UART: [rt]cmd =0x44504543, len=96
3,619,048 >>> mbox cmd response data (56 bytes)
3,619,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,918 UART: [rt]cmd =0x44504543, len=96
3,681,803 >>> mbox cmd response data (56 bytes)
3,681,804 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,715 UART: [rt]cmd =0x44504543, len=96
3,744,773 >>> mbox cmd response data (56 bytes)
3,744,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,727 UART: [rt]cmd =0x44504543, len=96
3,807,862 >>> mbox cmd response data (56 bytes)
3,807,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,762 UART: [rt]cmd =0x44504543, len=96
3,870,764 >>> mbox cmd response data (56 bytes)
3,870,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,814 UART: [rt]cmd =0x44504543, len=96
3,933,437 >>> mbox cmd response data (56 bytes)
3,933,438 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,963,035 UART: [rt]cmd =0x52435458, len=8
3,964,398 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_pl1_less_than_used ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,597,743 UART: [rt]cmd =0x44504543, len=96
34,629,793 >>> mbox cmd response data (56 bytes)
34,630,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,661,064 UART: [rt]cmd =0x44504543, len=96
34,693,230 >>> mbox cmd response data (56 bytes)
34,693,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,724,498 UART: [rt]cmd =0x44504543, len=96
34,756,061 >>> mbox cmd response data (56 bytes)
34,756,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,787,391 UART: [rt]cmd =0x44504543, len=96
34,819,644 >>> mbox cmd response data (56 bytes)
34,820,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,850,919 UART: [rt]cmd =0x44504543, len=96
34,883,246 >>> mbox cmd response data (56 bytes)
34,883,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,914,630 UART: [rt]cmd =0x44504543, len=96
34,921,719 >>> mbox cmd response: failed
34,922,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,952,507 UART: [rt]cmd =0x44504543, len=96
34,984,926 >>> mbox cmd response data (56 bytes)
34,985,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,016,229 UART: [rt]cmd =0x44504543, len=96
35,049,117 >>> mbox cmd response data (56 bytes)
35,049,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,080,084 UART: [rt]cmd =0x44504543, len=96
35,086,930 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,268 UART:
192,621 UART: Running Caliptra ROM ...
193,802 UART:
193,958 UART: [state] CFI Enabled
262,598 UART: [state] LifecycleState = Unprovisioned
264,584 UART: [state] DebugLocked = No
267,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,987 UART: [kat] SHA2-256
442,712 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,189 UART: [kat] ++
453,727 UART: [kat] sha1
464,466 UART: [kat] SHA2-256
467,187 UART: [kat] SHA2-384
473,316 UART: [kat] SHA2-512-ACC
475,930 UART: [kat] ECC-384
2,766,597 UART: [kat] HMAC-384Kdf
2,778,928 UART: [kat] LMS
3,969,271 UART: [kat] --
3,972,294 UART: [cold-reset] ++
3,973,447 UART: [fht] Storing FHT @ 0x50003400
3,983,868 UART: [idev] ++
3,984,433 UART: [idev] CDI.KEYID = 6
3,985,465 UART: [idev] SUBJECT.KEYID = 7
3,986,607 UART: [idev] UDS.KEYID = 0
3,987,694 ready_for_fw is high
3,987,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,010 UART: [idev] Erasing UDS.KEYID = 0
7,327,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,046 UART: [idev] --
7,354,035 UART: [ldev] ++
7,354,604 UART: [ldev] CDI.KEYID = 6
7,355,684 UART: [ldev] SUBJECT.KEYID = 5
7,356,808 UART: [ldev] AUTHORITY.KEYID = 7
7,358,050 UART: [ldev] FE.KEYID = 1
7,401,463 UART: [ldev] Erasing FE.KEYID = 1
10,731,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,495 UART: [ldev] --
13,094,735 UART: [fwproc] Waiting for Commands...
13,096,992 UART: [fwproc] Received command 0x46574c44
13,099,229 UART: [fwproc] Received Image of size 118548 bytes
17,212,481 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,604 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,772 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,688,402 >>> mbox cmd response: success
17,688,927 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,692,142 UART: [afmc] ++
17,692,719 UART: [afmc] CDI.KEYID = 6
17,693,599 UART: [afmc] SUBJECT.KEYID = 7
17,694,867 UART: [afmc] AUTHORITY.KEYID = 5
21,050,709 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,816 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,093 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,366,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,281 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,395,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,203 UART: [afmc] --
23,419,580 UART: [cold-reset] --
23,423,110 UART: [state] Locking Datavault
23,427,488 UART: [state] Locking PCR0, PCR1 and PCR31
23,429,238 UART: [state] Locking ICCM
23,431,253 UART: [exit] Launching FMC @ 0x40000130
23,439,649 UART:
23,439,934 UART: Running Caliptra FMC ...
23,441,044 UART:
23,441,213 UART: [state] CFI Enabled
23,511,261 UART: [fht] FMC Alias Private Key: 7
25,852,431 UART: [art] Extend RT PCRs Done
25,853,685 UART: [art] Lock RT PCRs Done
25,855,129 UART: [art] Populate DV Done
25,860,597 UART: [fht] FMC Alias Private Key: 7
25,862,135 UART: [art] Derive CDI
25,862,872 UART: [art] Store in slot 0x4
25,920,322 UART: [art] Derive Key Pair
25,921,356 UART: [art] Store priv key in slot 0x5
29,214,317 UART: [art] Derive Key Pair - Done
29,227,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,516,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,518,034 UART: [art] PUB.X = 93DB8597B87B9151FD32DCA0E71F66DED92E3A6AAF11D2C20F70AD503EFE681860C339FB69691C31AF99DD4FCEE553B1
31,525,335 UART: [art] PUB.Y = 5F8755366B26ABC00C26CCC91C39AE42FA0FF584B18268BC4F5E01B9C6F6A7286A7E5DF98EDC3F678052D04DBCA1D0F5
31,532,569 UART: [art] SIG.R = 7F27612C2F191ACDC9CAA03F4E513C15E4AFB082DC4E4F8F576E8481A2BCE3BD58A0102928FC9323FC90DC615685B7FF
31,540,006 UART: [art] SIG.S = 73E2413C3892527F0B43986F9498416C02B397E160FE3FAE475DF0B790B7F34A48E4743F4BB7ECB2FC4302AFE02E0161
32,845,383 UART: Caliptra RT
32,846,082 UART: [state] CFI Enabled
33,022,030 UART: [rt] RT listening for mailbox commands...
33,053,472 UART: [rt]cmd =0x52435458, len=8
33,055,839 >>> mbox cmd response data (16 bytes)
33,056,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,086,899 UART: [rt]cmd =0x44504543, len=96
33,118,927 >>> mbox cmd response data (56 bytes)
33,119,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,150,370 UART: [rt]cmd =0x44504543, len=96
33,182,172 >>> mbox cmd response data (56 bytes)
33,182,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,213,283 UART: [rt]cmd =0x44504543, len=96
33,245,170 >>> mbox cmd response data (56 bytes)
33,245,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,276,557 UART: [rt]cmd =0x44504543, len=96
33,308,716 >>> mbox cmd response data (56 bytes)
33,309,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,340,050 UART: [rt]cmd =0x44504543, len=96
33,372,558 >>> mbox cmd response data (56 bytes)
33,373,269 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,403,957 UART: [rt]cmd =0x44504543, len=96
33,436,249 >>> mbox cmd response data (56 bytes)
33,436,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,467,657 UART: [rt]cmd =0x44504543, len=96
33,499,233 >>> mbox cmd response data (56 bytes)
33,499,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,530,434 UART: [rt]cmd =0x44504543, len=96
33,561,942 >>> mbox cmd response data (56 bytes)
33,562,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,593,146 UART: [rt]cmd =0x44504543, len=96
33,624,889 >>> mbox cmd response data (56 bytes)
33,625,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,656,073 UART: [rt]cmd =0x44504543, len=96
33,688,390 >>> mbox cmd response data (56 bytes)
33,689,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,719,528 UART: [rt]cmd =0x44504543, len=96
33,751,597 >>> mbox cmd response data (56 bytes)
33,752,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,782,808 UART: [rt]cmd =0x44504543, len=96
33,814,914 >>> mbox cmd response data (56 bytes)
33,815,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,846,185 UART: [rt]cmd =0x44504543, len=96
33,877,965 >>> mbox cmd response data (56 bytes)
33,878,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,909,116 UART: [rt]cmd =0x44504543, len=96
33,941,038 >>> mbox cmd response data (56 bytes)
33,941,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,972,507 UART: [rt]cmd =0x44504543, len=96
34,004,373 >>> mbox cmd response data (56 bytes)
34,005,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,035,545 UART: [rt]cmd =0x44504543, len=96
34,068,052 >>> mbox cmd response data (56 bytes)
34,068,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,099,221 UART: [rt]cmd =0x44504543, len=96
34,130,896 >>> mbox cmd response data (56 bytes)
34,131,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,162,177 UART: [rt]cmd =0x44504543, len=96
34,194,980 >>> mbox cmd response data (56 bytes)
34,195,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,226,139 UART: [rt]cmd =0x44504543, len=96
34,258,376 >>> mbox cmd response data (56 bytes)
34,259,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,289,837 UART: [rt]cmd =0x44504543, len=96
34,322,074 >>> mbox cmd response data (56 bytes)
34,322,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,353,131 UART: [rt]cmd =0x44504543, len=96
34,385,142 >>> mbox cmd response data (56 bytes)
34,385,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,416,347 UART: [rt]cmd =0x44504543, len=96
34,448,503 >>> mbox cmd response data (56 bytes)
34,449,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,479,936 UART: [rt]cmd =0x44504543, len=96
34,512,046 >>> mbox cmd response data (56 bytes)
34,512,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,543,095 UART: [rt]cmd =0x44504543, len=96
34,575,723 >>> mbox cmd response data (56 bytes)
34,576,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,606,913 UART: [rt]cmd =0x44504543, len=96
34,639,529 >>> mbox cmd response data (56 bytes)
34,640,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,670,668 UART: [rt]cmd =0x44504543, len=96
34,703,285 >>> mbox cmd response data (56 bytes)
34,703,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,734,600 UART: [rt]cmd =0x44504543, len=96
34,766,109 >>> mbox cmd response data (56 bytes)
34,766,795 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,797,441 UART: [rt]cmd =0x44504543, len=96
34,829,916 >>> mbox cmd response data (56 bytes)
34,830,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,861,227 UART: [rt]cmd =0x44504543, len=96
34,892,980 >>> mbox cmd response data (56 bytes)
34,893,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,924,491 UART: [rt]cmd =0x44504543, len=96
34,931,535 >>> mbox cmd response: failed
34,931,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,962,472 UART: [rt]cmd =0x44504543, len=96
34,995,029 >>> mbox cmd response data (56 bytes)
34,995,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,026,284 UART: [rt]cmd =0x44504543, len=96
35,033,151 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.81s
Truncated 208126 bytes from beginning
465 UART: [rt]cmd =0x44504543, len=96
33,432,432 >>> mbox cmd response data (56 bytes)
33,433,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,463,627 UART: [rt]cmd =0x44504543, len=96
33,495,900 >>> mbox cmd response data (56 bytes)
33,496,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,527,084 UART: [rt]cmd =0x44504543, len=96
33,559,225 >>> mbox cmd response data (56 bytes)
33,559,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,590,380 UART: [rt]cmd =0x44504543, len=96
33,622,216 >>> mbox cmd response data (56 bytes)
33,622,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,653,388 UART: [rt]cmd =0x44504543, len=96
33,685,283 >>> mbox cmd response data (56 bytes)
33,685,965 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,716,650 UART: [rt]cmd =0x44504543, len=96
33,748,628 >>> mbox cmd response data (56 bytes)
33,749,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,780,009 UART: [rt]cmd =0x44504543, len=96
33,811,892 >>> mbox cmd response data (56 bytes)
33,812,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,843,634 UART: [rt]cmd =0x44504543, len=96
33,875,055 >>> mbox cmd response data (56 bytes)
33,875,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,906,183 UART: [rt]cmd =0x44504543, len=96
33,938,395 >>> mbox cmd response data (56 bytes)
33,939,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,969,841 UART: [rt]cmd =0x44504543, len=96
34,001,834 >>> mbox cmd response data (56 bytes)
34,002,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,033,168 UART: [rt]cmd =0x44504543, len=96
34,065,192 >>> mbox cmd response data (56 bytes)
34,065,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,096,230 UART: [rt]cmd =0x44504543, len=96
34,128,193 >>> mbox cmd response data (56 bytes)
34,128,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,159,352 UART: [rt]cmd =0x44504543, len=96
34,191,189 >>> mbox cmd response data (56 bytes)
34,191,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,222,327 UART: [rt]cmd =0x44504543, len=96
34,253,785 >>> mbox cmd response data (56 bytes)
34,254,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,284,940 UART: [rt]cmd =0x44504543, len=96
34,317,608 >>> mbox cmd response data (56 bytes)
34,318,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,348,801 UART: [rt]cmd =0x44504543, len=96
34,380,991 >>> mbox cmd response data (56 bytes)
34,381,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,412,189 UART: [rt]cmd =0x44504543, len=96
34,444,798 >>> mbox cmd response data (56 bytes)
34,445,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,475,849 UART: [rt]cmd =0x44504543, len=96
34,507,850 >>> mbox cmd response data (56 bytes)
34,508,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,538,965 UART: [rt]cmd =0x44504543, len=96
34,571,410 >>> mbox cmd response data (56 bytes)
34,572,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,602,509 UART: [rt]cmd =0x44504543, len=96
34,634,490 >>> mbox cmd response data (56 bytes)
34,635,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,666,106 UART: [rt]cmd =0x44504543, len=96
34,698,250 >>> mbox cmd response data (56 bytes)
34,699,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,730,080 UART: [rt]cmd =0x44504543, len=96
34,761,675 >>> mbox cmd response data (56 bytes)
34,762,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,793,226 UART: [rt]cmd =0x44504543, len=96
34,825,546 >>> mbox cmd response data (56 bytes)
34,826,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,857,086 UART: [rt]cmd =0x44504543, len=96
34,890,380 >>> mbox cmd response data (56 bytes)
34,891,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,921,635 UART: [rt]cmd =0x44504543, len=96
34,954,347 >>> mbox cmd response data (56 bytes)
34,955,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,985,926 UART: [rt]cmd =0x44504543, len=96
35,017,688 >>> mbox cmd response data (56 bytes)
35,018,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,049,262 UART: [rt]cmd =0x44504543, len=96
35,055,981 >>> mbox cmd response: failed
35,056,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,086,977 UART: [rt]cmd =0x44504543, len=96
35,119,481 >>> mbox cmd response data (56 bytes)
35,120,200 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,150,833 UART: [rt]cmd =0x44504543, len=96
35,182,370 >>> mbox cmd response data (56 bytes)
35,183,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,213,686 UART: [rt]cmd =0x44504543, len=96
35,220,415 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
3,780,150 ready_for_fw is high
3,781,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,371 >>> mbox cmd response: success
17,937,213 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,633,357 UART:
23,633,754 UART: Running Caliptra FMC ...
23,634,934 UART:
23,635,094 UART: [state] CFI Enabled
23,699,319 UART: [fht] FMC Alias Private Key: 7
26,039,114 UART: [art] Extend RT PCRs Done
26,040,336 UART: [art] Lock RT PCRs Done
26,041,966 UART: [art] Populate DV Done
26,047,390 UART: [fht] FMC Alias Private Key: 7
26,048,927 UART: [art] Derive CDI
26,049,895 UART: [art] Store in slot 0x4
26,107,490 UART: [art] Derive Key Pair
26,108,506 UART: [art] Store priv key in slot 0x5
29,402,380 UART: [art] Derive Key Pair - Done
29,415,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,340 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,852 UART: [art] PUB.X = 2BAE2D17491278BDE5D032736D703A8ED414238FBA7EBC827284EC975CF05C54969B0CCD73E3642FFF309CD203FDC6AD
31,712,126 UART: [art] PUB.Y = E6C64651D57E87DED692EB1CA42FE5579FE80CE088DCC80B1EC4A3C7CD27D470E9452FE5DAC7F36387F3FE95BB716041
31,719,391 UART: [art] SIG.R = 5ACDA6AAA6B94EE7331113CFC2C66E8CF789C7F8972E9B477AFC1C5D18766E93BDD875D5495B4AB6EF7D8C2391AE6E01
31,726,781 UART: [art] SIG.S = 98A053999B3883CB3F1394C43D8F9CE24A2F70AD2BFBACED03C836313ACB17DAD51EFC353E6FC2EE17BC4BEC516318E6
33,031,780 UART: Caliptra RT
33,032,491 UART: [state] CFI Enabled
33,208,285 UART: [rt] RT listening for mailbox commands...
33,240,028 UART: [rt]cmd =0x52435458, len=8
33,242,211 >>> mbox cmd response data (16 bytes)
33,242,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,273,149 UART: [rt]cmd =0x44504543, len=96
33,304,981 >>> mbox cmd response data (56 bytes)
33,305,782 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,336,652 UART: [rt]cmd =0x44504543, len=96
33,368,114 >>> mbox cmd response data (56 bytes)
33,368,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,399,282 UART: [rt]cmd =0x44504543, len=96
33,430,954 >>> mbox cmd response data (56 bytes)
33,431,674 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,462,310 UART: [rt]cmd =0x44504543, len=96
33,494,420 >>> mbox cmd response data (56 bytes)
33,495,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,525,725 UART: [rt]cmd =0x44504543, len=96
33,557,196 >>> mbox cmd response data (56 bytes)
33,557,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,588,338 UART: [rt]cmd =0x44504543, len=96
33,620,440 >>> mbox cmd response data (56 bytes)
33,621,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,651,710 UART: [rt]cmd =0x44504543, len=96
33,682,784 >>> mbox cmd response data (56 bytes)
33,683,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,713,990 UART: [rt]cmd =0x44504543, len=96
33,745,848 >>> mbox cmd response data (56 bytes)
33,746,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,777,106 UART: [rt]cmd =0x44504543, len=96
33,808,797 >>> mbox cmd response data (56 bytes)
33,810,006 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,840,503 UART: [rt]cmd =0x44504543, len=96
33,872,427 >>> mbox cmd response data (56 bytes)
33,873,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,903,712 UART: [rt]cmd =0x44504543, len=96
33,936,630 >>> mbox cmd response data (56 bytes)
33,937,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,967,721 UART: [rt]cmd =0x44504543, len=96
33,999,420 >>> mbox cmd response data (56 bytes)
34,000,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,030,777 UART: [rt]cmd =0x44504543, len=96
34,062,206 >>> mbox cmd response data (56 bytes)
34,062,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,093,420 UART: [rt]cmd =0x44504543, len=96
34,125,059 >>> mbox cmd response data (56 bytes)
34,125,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,156,541 UART: [rt]cmd =0x44504543, len=96
34,188,326 >>> mbox cmd response data (56 bytes)
34,189,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,219,663 UART: [rt]cmd =0x44504543, len=96
34,252,203 >>> mbox cmd response data (56 bytes)
34,252,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,283,249 UART: [rt]cmd =0x44504543, len=96
34,315,545 >>> mbox cmd response data (56 bytes)
34,316,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,346,783 UART: [rt]cmd =0x44504543, len=96
34,378,107 >>> mbox cmd response data (56 bytes)
34,378,825 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,409,629 UART: [rt]cmd =0x44504543, len=96
34,441,282 >>> mbox cmd response data (56 bytes)
34,441,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,472,504 UART: [rt]cmd =0x44504543, len=96
34,504,670 >>> mbox cmd response data (56 bytes)
34,505,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,535,819 UART: [rt]cmd =0x44504543, len=96
34,567,451 >>> mbox cmd response data (56 bytes)
34,568,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,598,664 UART: [rt]cmd =0x44504543, len=96
34,631,172 >>> mbox cmd response data (56 bytes)
34,631,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,662,482 UART: [rt]cmd =0x44504543, len=96
34,694,515 >>> mbox cmd response data (56 bytes)
34,695,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,725,932 UART: [rt]cmd =0x44504543, len=96
34,759,090 >>> mbox cmd response data (56 bytes)
34,759,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,790,323 UART: [rt]cmd =0x44504543, len=96
34,821,891 >>> mbox cmd response data (56 bytes)
34,822,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,853,000 UART: [rt]cmd =0x44504543, len=96
34,885,433 >>> mbox cmd response data (56 bytes)
34,886,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,916,641 UART: [rt]cmd =0x44504543, len=96
34,949,041 >>> mbox cmd response data (56 bytes)
34,949,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,980,452 UART: [rt]cmd =0x44504543, len=96
35,012,804 >>> mbox cmd response data (56 bytes)
35,013,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,044,102 UART: [rt]cmd =0x44504543, len=96
35,076,495 >>> mbox cmd response data (56 bytes)
35,077,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,107,625 UART: [rt]cmd =0x44504543, len=96
35,114,440 >>> mbox cmd response: failed
35,114,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,145,219 UART: [rt]cmd =0x44504543, len=96
35,176,587 >>> mbox cmd response data (56 bytes)
35,177,303 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,207,778 UART: [rt]cmd =0x44504543, len=96
35,214,668 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.09s
Truncated 309346 bytes from beginning
(96 bytes) from SoC
34,556,964 UART: [rt]cmd =0x44504543, len=96
34,589,392 >>> mbox cmd response data (56 bytes)
34,590,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,620,445 UART: [rt]cmd =0x44504543, len=96
34,652,545 >>> mbox cmd response data (56 bytes)
34,653,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,683,516 UART: [rt]cmd =0x44504543, len=96
34,715,849 >>> mbox cmd response data (56 bytes)
34,716,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,747,186 UART: [rt]cmd =0x44504543, len=96
34,779,469 >>> mbox cmd response data (56 bytes)
34,780,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,810,677 UART: [rt]cmd =0x44504543, len=96
34,843,879 >>> mbox cmd response data (56 bytes)
34,844,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,875,071 UART: [rt]cmd =0x44504543, len=96
34,881,943 >>> mbox cmd response: failed
34,882,324 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,912,676 UART: [rt]cmd =0x44504543, len=96
34,944,635 >>> mbox cmd response data (56 bytes)
34,945,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,975,974 UART: [rt]cmd =0x44504543, len=96
35,007,989 >>> mbox cmd response data (56 bytes)
35,008,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,038,914 UART: [rt]cmd =0x44504543, len=96
35,045,833 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,415 UART:
192,768 UART: Running Caliptra ROM ...
193,846 UART:
603,769 UART: [state] CFI Enabled
615,889 UART: [state] LifecycleState = Unprovisioned
617,791 UART: [state] DebugLocked = No
620,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,821 UART: [kat] SHA2-256
794,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,099 UART: [kat] ++
805,553 UART: [kat] sha1
816,468 UART: [kat] SHA2-256
819,184 UART: [kat] SHA2-384
824,390 UART: [kat] SHA2-512-ACC
826,749 UART: [kat] ECC-384
3,110,498 UART: [kat] HMAC-384Kdf
3,122,381 UART: [kat] LMS
4,312,536 UART: [kat] --
4,315,552 UART: [cold-reset] ++
4,316,996 UART: [fht] Storing FHT @ 0x50003400
4,327,897 UART: [idev] ++
4,328,470 UART: [idev] CDI.KEYID = 6
4,329,417 UART: [idev] SUBJECT.KEYID = 7
4,330,653 UART: [idev] UDS.KEYID = 0
4,331,658 ready_for_fw is high
4,331,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,652 UART: [idev] Erasing UDS.KEYID = 0
7,616,509 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,280 UART: [idev] --
7,641,752 UART: [ldev] ++
7,642,314 UART: [ldev] CDI.KEYID = 6
7,643,246 UART: [ldev] SUBJECT.KEYID = 5
7,644,450 UART: [ldev] AUTHORITY.KEYID = 7
7,645,733 UART: [ldev] FE.KEYID = 1
7,655,868 UART: [ldev] Erasing FE.KEYID = 1
10,945,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,318 UART: [ldev] --
13,306,039 UART: [fwproc] Waiting for Commands...
13,309,211 UART: [fwproc] Received command 0x46574c44
13,311,387 UART: [fwproc] Received Image of size 118548 bytes
17,415,497 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,394 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,569 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,907 >>> mbox cmd response: success
17,895,449 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
17,898,841 UART: [afmc] ++
17,899,469 UART: [afmc] CDI.KEYID = 6
17,900,379 UART: [afmc] SUBJECT.KEYID = 7
17,901,643 UART: [afmc] AUTHORITY.KEYID = 5
21,215,386 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,752 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,004 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,459 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,144 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,596 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,330 UART: [afmc] --
23,582,371 UART: [cold-reset] --
23,585,575 UART: [state] Locking Datavault
23,590,378 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,124 UART: [state] Locking ICCM
23,593,274 UART: [exit] Launching FMC @ 0x40000130
23,601,659 UART:
23,601,926 UART: Running Caliptra FMC ...
23,602,953 UART:
23,603,097 UART: [state] CFI Enabled
23,611,362 UART: [fht] FMC Alias Private Key: 7
25,951,475 UART: [art] Extend RT PCRs Done
25,952,691 UART: [art] Lock RT PCRs Done
25,954,357 UART: [art] Populate DV Done
25,959,656 UART: [fht] FMC Alias Private Key: 7
25,961,132 UART: [art] Derive CDI
25,961,888 UART: [art] Store in slot 0x4
26,004,745 UART: [art] Derive Key Pair
26,005,789 UART: [art] Store priv key in slot 0x5
29,247,477 UART: [art] Derive Key Pair - Done
29,260,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,396 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,898 UART: [art] PUB.X = B2DEC900309C529E006CB06C3FB872A3065BBD9B76BCBC2CE89D59F6421EFE8A2817D85BD1053C4A4AE9AE20376D8978
31,549,131 UART: [art] PUB.Y = 761181426A976CE1071E64134FF56B0C00B34FFE45DD11CA55E990ADE680FECF4F95A0DE88DEEBE130FF689B1D8C7CF5
31,556,407 UART: [art] SIG.R = 79C1ED60A887F6136F6BB08994330F467F30817E27A7D8B55631751BD068242DE2945EC988DD0E11936AC895B2658289
31,563,792 UART: [art] SIG.S = 7A097B8107862CAD6735FAE2C7D4B70C9F58A69DC69E95A4D400046087A2176B3F81D8B6B8952D50A569A36705108D36
32,868,914 UART: Caliptra RT
32,869,612 UART: [state] CFI Enabled
33,002,127 UART: [rt] RT listening for mailbox commands...
33,033,673 UART: [rt]cmd =0x52435458, len=8
33,035,892 >>> mbox cmd response data (16 bytes)
33,036,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,067,025 UART: [rt]cmd =0x44504543, len=96
33,098,533 >>> mbox cmd response data (56 bytes)
33,099,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,129,693 UART: [rt]cmd =0x44504543, len=96
33,161,369 >>> mbox cmd response data (56 bytes)
33,162,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,192,592 UART: [rt]cmd =0x44504543, len=96
33,224,424 >>> mbox cmd response data (56 bytes)
33,225,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,255,663 UART: [rt]cmd =0x44504543, len=96
33,287,319 >>> mbox cmd response data (56 bytes)
33,288,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,318,410 UART: [rt]cmd =0x44504543, len=96
33,350,866 >>> mbox cmd response data (56 bytes)
33,351,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,382,088 UART: [rt]cmd =0x44504543, len=96
33,414,395 >>> mbox cmd response data (56 bytes)
33,415,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,445,635 UART: [rt]cmd =0x44504543, len=96
33,477,409 >>> mbox cmd response data (56 bytes)
33,478,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,508,619 UART: [rt]cmd =0x44504543, len=96
33,540,917 >>> mbox cmd response data (56 bytes)
33,541,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,572,268 UART: [rt]cmd =0x44504543, len=96
33,604,248 >>> mbox cmd response data (56 bytes)
33,604,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,635,480 UART: [rt]cmd =0x44504543, len=96
33,667,596 >>> mbox cmd response data (56 bytes)
33,668,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,698,986 UART: [rt]cmd =0x44504543, len=96
33,731,090 >>> mbox cmd response data (56 bytes)
33,731,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,762,411 UART: [rt]cmd =0x44504543, len=96
33,794,295 >>> mbox cmd response data (56 bytes)
33,794,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,825,500 UART: [rt]cmd =0x44504543, len=96
33,857,462 >>> mbox cmd response data (56 bytes)
33,858,183 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,888,813 UART: [rt]cmd =0x44504543, len=96
33,921,372 >>> mbox cmd response data (56 bytes)
33,922,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,952,401 UART: [rt]cmd =0x44504543, len=96
33,984,685 >>> mbox cmd response data (56 bytes)
33,985,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,015,853 UART: [rt]cmd =0x44504543, len=96
34,047,909 >>> mbox cmd response data (56 bytes)
34,048,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,079,134 UART: [rt]cmd =0x44504543, len=96
34,111,231 >>> mbox cmd response data (56 bytes)
34,111,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,142,702 UART: [rt]cmd =0x44504543, len=96
34,174,667 >>> mbox cmd response data (56 bytes)
34,175,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,205,796 UART: [rt]cmd =0x44504543, len=96
34,238,623 >>> mbox cmd response data (56 bytes)
34,239,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,269,908 UART: [rt]cmd =0x44504543, len=96
34,301,085 >>> mbox cmd response data (56 bytes)
34,301,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,332,377 UART: [rt]cmd =0x44504543, len=96
34,363,980 >>> mbox cmd response data (56 bytes)
34,364,670 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,395,357 UART: [rt]cmd =0x44504543, len=96
34,427,118 >>> mbox cmd response data (56 bytes)
34,427,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,458,467 UART: [rt]cmd =0x44504543, len=96
34,490,441 >>> mbox cmd response data (56 bytes)
34,491,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,521,836 UART: [rt]cmd =0x44504543, len=96
34,554,547 >>> mbox cmd response data (56 bytes)
34,555,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,585,743 UART: [rt]cmd =0x44504543, len=96
34,618,330 >>> mbox cmd response data (56 bytes)
34,619,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,649,598 UART: [rt]cmd =0x44504543, len=96
34,682,458 >>> mbox cmd response data (56 bytes)
34,683,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,713,732 UART: [rt]cmd =0x44504543, len=96
34,745,967 >>> mbox cmd response data (56 bytes)
34,746,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,777,140 UART: [rt]cmd =0x44504543, len=96
34,809,749 >>> mbox cmd response data (56 bytes)
34,810,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,840,761 UART: [rt]cmd =0x44504543, len=96
34,872,820 >>> mbox cmd response data (56 bytes)
34,873,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,904,008 UART: [rt]cmd =0x44504543, len=96
34,910,925 >>> mbox cmd response: failed
34,911,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,942,028 UART: [rt]cmd =0x44504543, len=96
34,973,977 >>> mbox cmd response data (56 bytes)
34,974,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,004,954 UART: [rt]cmd =0x44504543, len=96
35,012,246 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 55.75s
Truncated 208126 bytes from beginning
873 UART: [rt]cmd =0x44504543, len=96
33,418,134 >>> mbox cmd response data (56 bytes)
33,418,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,449,396 UART: [rt]cmd =0x44504543, len=96
33,480,827 >>> mbox cmd response data (56 bytes)
33,481,506 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,512,081 UART: [rt]cmd =0x44504543, len=96
33,543,786 >>> mbox cmd response data (56 bytes)
33,544,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,574,934 UART: [rt]cmd =0x44504543, len=96
33,607,126 >>> mbox cmd response data (56 bytes)
33,607,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,638,476 UART: [rt]cmd =0x44504543, len=96
33,670,112 >>> mbox cmd response data (56 bytes)
33,670,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,701,428 UART: [rt]cmd =0x44504543, len=96
33,733,539 >>> mbox cmd response data (56 bytes)
33,734,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,764,881 UART: [rt]cmd =0x44504543, len=96
33,797,141 >>> mbox cmd response data (56 bytes)
33,797,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,828,197 UART: [rt]cmd =0x44504543, len=96
33,860,718 >>> mbox cmd response data (56 bytes)
33,861,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,892,093 UART: [rt]cmd =0x44504543, len=96
33,924,074 >>> mbox cmd response data (56 bytes)
33,924,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,955,263 UART: [rt]cmd =0x44504543, len=96
33,987,761 >>> mbox cmd response data (56 bytes)
33,988,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,018,973 UART: [rt]cmd =0x44504543, len=96
34,051,407 >>> mbox cmd response data (56 bytes)
34,052,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,082,687 UART: [rt]cmd =0x44504543, len=96
34,114,765 >>> mbox cmd response data (56 bytes)
34,115,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,145,827 UART: [rt]cmd =0x44504543, len=96
34,177,382 >>> mbox cmd response data (56 bytes)
34,178,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,208,576 UART: [rt]cmd =0x44504543, len=96
34,240,735 >>> mbox cmd response data (56 bytes)
34,241,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,271,875 UART: [rt]cmd =0x44504543, len=96
34,304,537 >>> mbox cmd response data (56 bytes)
34,305,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,335,748 UART: [rt]cmd =0x44504543, len=96
34,367,470 >>> mbox cmd response data (56 bytes)
34,368,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,398,754 UART: [rt]cmd =0x44504543, len=96
34,431,725 >>> mbox cmd response data (56 bytes)
34,432,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,462,982 UART: [rt]cmd =0x44504543, len=96
34,496,353 >>> mbox cmd response data (56 bytes)
34,497,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,527,588 UART: [rt]cmd =0x44504543, len=96
34,559,882 >>> mbox cmd response data (56 bytes)
34,560,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,590,976 UART: [rt]cmd =0x44504543, len=96
34,622,881 >>> mbox cmd response data (56 bytes)
34,623,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,654,025 UART: [rt]cmd =0x44504543, len=96
34,685,645 >>> mbox cmd response data (56 bytes)
34,686,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,716,973 UART: [rt]cmd =0x44504543, len=96
34,749,617 >>> mbox cmd response data (56 bytes)
34,750,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,780,817 UART: [rt]cmd =0x44504543, len=96
34,813,212 >>> mbox cmd response data (56 bytes)
34,813,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,844,556 UART: [rt]cmd =0x44504543, len=96
34,876,631 >>> mbox cmd response data (56 bytes)
34,877,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,907,945 UART: [rt]cmd =0x44504543, len=96
34,940,551 >>> mbox cmd response data (56 bytes)
34,941,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,971,751 UART: [rt]cmd =0x44504543, len=96
35,003,907 >>> mbox cmd response data (56 bytes)
35,004,589 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,035,166 UART: [rt]cmd =0x44504543, len=96
35,041,928 >>> mbox cmd response: failed
35,042,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,072,880 UART: [rt]cmd =0x44504543, len=96
35,104,295 >>> mbox cmd response data (56 bytes)
35,104,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,135,624 UART: [rt]cmd =0x44504543, len=96
35,168,047 >>> mbox cmd response data (56 bytes)
35,168,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,199,163 UART: [rt]cmd =0x44504543, len=96
35,206,374 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
4,129,466 ready_for_fw is high
4,129,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,751 >>> mbox cmd response: success
18,154,359 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
23,797,225 UART:
23,797,617 UART: Running Caliptra FMC ...
23,798,730 UART:
23,798,881 UART: [state] CFI Enabled
23,806,780 UART: [fht] FMC Alias Private Key: 7
26,147,494 UART: [art] Extend RT PCRs Done
26,148,721 UART: [art] Lock RT PCRs Done
26,150,514 UART: [art] Populate DV Done
26,156,102 UART: [fht] FMC Alias Private Key: 7
26,157,801 UART: [art] Derive CDI
26,158,534 UART: [art] Store in slot 0x4
26,201,183 UART: [art] Derive Key Pair
26,202,226 UART: [art] Store priv key in slot 0x5
29,443,656 UART: [art] Derive Key Pair - Done
29,457,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,266 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,777 UART: [art] PUB.X = 3A5D554A7955AB6843DF99E3B63D8FBE77625123673650DE44F34B92DA46025CC0ACFDAB181B9908B20B3D0CCFA49FC9
31,746,020 UART: [art] PUB.Y = 0C651D38BEBA554847608CA0C8BDEA5DD14A7FA8C88A6366986D8B027A5AE6E940B1C826BF67A955950617DC24A0E503
31,753,316 UART: [art] SIG.R = 40076228F208B20267FEF181414A63DC5473B0CDAE257D0C9561512C956E01E4656882453E5B508C930EEDD1996EA3FC
31,760,652 UART: [art] SIG.S = 26EF4E04F3E601448ED3B4C05166748F6685DF8B2CCD64C72573837A0BC9EEC816CDE984BF6980089A6DBFE644A7E9FC
33,065,740 UART: Caliptra RT
33,066,449 UART: [state] CFI Enabled
33,199,817 UART: [rt] RT listening for mailbox commands...
33,231,115 UART: [rt]cmd =0x52435458, len=8
33,233,157 >>> mbox cmd response data (16 bytes)
33,233,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,264,218 UART: [rt]cmd =0x44504543, len=96
33,295,080 >>> mbox cmd response data (56 bytes)
33,295,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,326,473 UART: [rt]cmd =0x44504543, len=96
33,358,813 >>> mbox cmd response data (56 bytes)
33,359,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,390,075 UART: [rt]cmd =0x44504543, len=96
33,421,537 >>> mbox cmd response data (56 bytes)
33,422,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,452,703 UART: [rt]cmd =0x44504543, len=96
33,484,274 >>> mbox cmd response data (56 bytes)
33,484,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,515,514 UART: [rt]cmd =0x44504543, len=96
33,547,538 >>> mbox cmd response data (56 bytes)
33,548,247 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,578,714 UART: [rt]cmd =0x44504543, len=96
33,611,157 >>> mbox cmd response data (56 bytes)
33,611,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,642,361 UART: [rt]cmd =0x44504543, len=96
33,673,547 >>> mbox cmd response data (56 bytes)
33,674,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,704,698 UART: [rt]cmd =0x44504543, len=96
33,736,855 >>> mbox cmd response data (56 bytes)
33,737,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,768,077 UART: [rt]cmd =0x44504543, len=96
33,800,426 >>> mbox cmd response data (56 bytes)
33,801,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,831,564 UART: [rt]cmd =0x44504543, len=96
33,863,641 >>> mbox cmd response data (56 bytes)
33,864,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,894,779 UART: [rt]cmd =0x44504543, len=96
33,926,685 >>> mbox cmd response data (56 bytes)
33,927,351 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,957,817 UART: [rt]cmd =0x44504543, len=96
33,990,042 >>> mbox cmd response data (56 bytes)
33,990,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,021,164 UART: [rt]cmd =0x44504543, len=96
34,052,792 >>> mbox cmd response data (56 bytes)
34,053,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,083,784 UART: [rt]cmd =0x44504543, len=96
34,116,484 >>> mbox cmd response data (56 bytes)
34,117,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,147,898 UART: [rt]cmd =0x44504543, len=96
34,179,498 >>> mbox cmd response data (56 bytes)
34,180,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,210,569 UART: [rt]cmd =0x44504543, len=96
34,242,817 >>> mbox cmd response data (56 bytes)
34,243,495 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,274,211 UART: [rt]cmd =0x44504543, len=96
34,306,428 >>> mbox cmd response data (56 bytes)
34,307,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,337,608 UART: [rt]cmd =0x44504543, len=96
34,369,070 >>> mbox cmd response data (56 bytes)
34,369,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,400,331 UART: [rt]cmd =0x44504543, len=96
34,432,197 >>> mbox cmd response data (56 bytes)
34,432,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,463,560 UART: [rt]cmd =0x44504543, len=96
34,496,132 >>> mbox cmd response data (56 bytes)
34,496,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,527,212 UART: [rt]cmd =0x44504543, len=96
34,559,336 >>> mbox cmd response data (56 bytes)
34,560,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,590,653 UART: [rt]cmd =0x44504543, len=96
34,623,141 >>> mbox cmd response data (56 bytes)
34,623,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,654,415 UART: [rt]cmd =0x44504543, len=96
34,686,680 >>> mbox cmd response data (56 bytes)
34,687,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,717,872 UART: [rt]cmd =0x44504543, len=96
34,750,003 >>> mbox cmd response data (56 bytes)
34,750,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,781,211 UART: [rt]cmd =0x44504543, len=96
34,813,609 >>> mbox cmd response data (56 bytes)
34,814,459 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,844,952 UART: [rt]cmd =0x44504543, len=96
34,876,322 >>> mbox cmd response data (56 bytes)
34,876,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,907,579 UART: [rt]cmd =0x44504543, len=96
34,940,383 >>> mbox cmd response data (56 bytes)
34,941,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,971,526 UART: [rt]cmd =0x44504543, len=96
35,004,464 >>> mbox cmd response data (56 bytes)
35,005,176 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,035,921 UART: [rt]cmd =0x44504543, len=96
35,068,052 >>> mbox cmd response data (56 bytes)
35,068,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,099,295 UART: [rt]cmd =0x44504543, len=96
35,106,414 >>> mbox cmd response: failed
35,106,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,137,423 UART: [rt]cmd =0x44504543, len=96
35,169,463 >>> mbox cmd response data (56 bytes)
35,170,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,200,444 UART: [rt]cmd =0x44504543, len=96
35,206,943 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 56.03s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,481,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,511,650 UART: [rt]cmd =0x44504543, len=96
27,544,696 >>> mbox cmd response data (56 bytes)
27,545,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,575,831 UART: [rt]cmd =0x44504543, len=96
27,607,733 >>> mbox cmd response data (56 bytes)
27,608,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,639,044 UART: [rt]cmd =0x44504543, len=96
27,671,057 >>> mbox cmd response data (56 bytes)
27,671,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,702,290 UART: [rt]cmd =0x44504543, len=96
27,734,336 >>> mbox cmd response data (56 bytes)
27,735,015 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,765,757 UART: [rt]cmd =0x44504543, len=96
27,798,520 >>> mbox cmd response data (56 bytes)
27,799,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,829,692 UART: [rt]cmd =0x44504543, len=96
27,836,635 >>> mbox cmd response: failed
27,837,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,867,612 UART: [rt]cmd =0x44504543, len=96
27,899,711 >>> mbox cmd response data (56 bytes)
27,900,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,930,995 UART: [rt]cmd =0x44504543, len=96
27,962,988 >>> mbox cmd response data (56 bytes)
27,963,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,994,096 UART: [rt]cmd =0x44504543, len=96
28,001,279 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,922 writing to cptra_bootfsm_go
193,073 UART:
193,458 UART: Running Caliptra ROM ...
194,542 UART:
194,684 UART: [state] CFI Enabled
262,081 UART: [state] LifecycleState = Unprovisioned
264,028 UART: [state] DebugLocked = No
266,186 UART: [state] WD Timer not started. Device not locked for debugging
269,518 UART: [kat] SHA2-256
449,185 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,992 UART: [kat] ++
460,443 UART: [kat] sha1
470,944 UART: [kat] SHA2-256
473,669 UART: [kat] SHA2-384
478,732 UART: [kat] SHA2-512-ACC
481,098 UART: [kat] ECC-384
2,928,036 UART: [kat] HMAC-384Kdf
2,948,725 UART: [kat] LMS
3,425,208 UART: [kat] --
3,430,483 UART: [cold-reset] ++
3,432,336 UART: [fht] FHT @ 0x50003400
3,442,755 UART: [idev] ++
3,443,357 UART: [idev] CDI.KEYID = 6
3,444,239 UART: [idev] SUBJECT.KEYID = 7
3,445,548 UART: [idev] UDS.KEYID = 0
3,446,479 ready_for_fw is high
3,446,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,610 UART: [idev] Erasing UDS.KEYID = 0
5,966,179 UART: [idev] Sha1 KeyId Algorithm
5,989,350 UART: [idev] --
5,994,208 UART: [ldev] ++
5,994,829 UART: [ldev] CDI.KEYID = 6
5,995,706 UART: [ldev] SUBJECT.KEYID = 5
5,996,966 UART: [ldev] AUTHORITY.KEYID = 7
5,998,163 UART: [ldev] FE.KEYID = 1
6,036,549 UART: [ldev] Erasing FE.KEYID = 1
8,547,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,056 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,162 UART: [ldev] --
10,353,634 UART: [fwproc] Wait for Commands...
10,355,987 UART: [fwproc] Recv command 0x46574c44
10,358,018 UART: [fwproc] Recv'd Img size: 118548 bytes
13,847,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,927,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,000,681 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,328,088 >>> mbox cmd response: success
14,328,662 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,331,524 UART: [afmc] ++
14,332,102 UART: [afmc] CDI.KEYID = 6
14,333,041 UART: [afmc] SUBJECT.KEYID = 7
14,334,256 UART: [afmc] AUTHORITY.KEYID = 5
16,872,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,599,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,975 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,631,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,671,332 UART: [afmc] --
18,675,630 UART: [cold-reset] --
18,680,239 UART: [state] Locking Datavault
18,685,589 UART: [state] Locking PCR0, PCR1 and PCR31
18,687,334 UART: [state] Locking ICCM
18,688,755 UART: [exit] Launching FMC @ 0x40000130
18,697,169 UART:
18,697,404 UART: Running Caliptra FMC ...
18,698,429 UART:
18,698,574 UART: [state] CFI Enabled
18,752,903 UART: [fht] FMC Alias Private Key: 7
20,518,849 UART: [art] Extend RT PCRs Done
20,520,058 UART: [art] Lock RT PCRs Done
20,521,464 UART: [art] Populate DV Done
20,526,821 UART: [fht] FMC Alias Private Key: 7
20,528,457 UART: [art] Derive CDI
20,529,267 UART: [art] Store in slot 0x4
20,585,588 UART: [art] Derive Key Pair
20,586,621 UART: [art] Store priv key in slot 0x5
23,049,446 UART: [art] Derive Key Pair - Done
23,062,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,215 UART: [art] Erasing AUTHORITY.KEYID = 7
24,776,745 UART: [art] PUB.X = E9B8228BFA663E45770495EC6E2C769BB61400EC34CCDC37FA4A173F206E9E305819AE13F479415EA315E56FD67F0EFC
24,784,000 UART: [art] PUB.Y = 2CBD342F8549C4261F90EBFAE8460C144BC50C0033D7861B3345860A484C41F07B6326161575405F837494DCA6F25477
24,791,185 UART: [art] SIG.R = 7A9714822EF943A1D9743E77B457D8BED5362C6CC198BD1037E07C26601E87F36D9E6258FC6C723F57FB636DDAC70EBA
24,798,583 UART: [art] SIG.S = 553C8AC60527A297DBC39EA0AD1727AFAC3787A91D3ACCBED7B3C98A8D66D42D4EFC98F0617EF012196DBDDF11B08A52
25,777,317 UART: Caliptra RT
25,778,003 UART: [state] CFI Enabled
25,958,808 UART: [rt] RT listening for mailbox commands...
25,990,217 UART: [rt]cmd =0x52435458, len=8
25,992,441 >>> mbox cmd response data (16 bytes)
25,993,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,023,665 UART: [rt]cmd =0x44504543, len=96
26,055,393 >>> mbox cmd response data (56 bytes)
26,056,191 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,086,731 UART: [rt]cmd =0x44504543, len=96
26,118,887 >>> mbox cmd response data (56 bytes)
26,119,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,150,183 UART: [rt]cmd =0x44504543, len=96
26,181,933 >>> mbox cmd response data (56 bytes)
26,182,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,213,138 UART: [rt]cmd =0x44504543, len=96
26,244,901 >>> mbox cmd response data (56 bytes)
26,245,625 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,276,262 UART: [rt]cmd =0x44504543, len=96
26,308,599 >>> mbox cmd response data (56 bytes)
26,309,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,339,971 UART: [rt]cmd =0x44504543, len=96
26,372,010 >>> mbox cmd response data (56 bytes)
26,372,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,237 UART: [rt]cmd =0x44504543, len=96
26,435,394 >>> mbox cmd response data (56 bytes)
26,436,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,466,772 UART: [rt]cmd =0x44504543, len=96
26,498,812 >>> mbox cmd response data (56 bytes)
26,499,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,530,057 UART: [rt]cmd =0x44504543, len=96
26,561,267 >>> mbox cmd response data (56 bytes)
26,562,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,592,661 UART: [rt]cmd =0x44504543, len=96
26,625,005 >>> mbox cmd response data (56 bytes)
26,625,683 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,656,373 UART: [rt]cmd =0x44504543, len=96
26,688,525 >>> mbox cmd response data (56 bytes)
26,689,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,719,572 UART: [rt]cmd =0x44504543, len=96
26,751,462 >>> mbox cmd response data (56 bytes)
26,752,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,782,574 UART: [rt]cmd =0x44504543, len=96
26,814,472 >>> mbox cmd response data (56 bytes)
26,815,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,845,690 UART: [rt]cmd =0x44504543, len=96
26,877,488 >>> mbox cmd response data (56 bytes)
26,878,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,908,776 UART: [rt]cmd =0x44504543, len=96
26,941,259 >>> mbox cmd response data (56 bytes)
26,941,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,972,334 UART: [rt]cmd =0x44504543, len=96
27,004,647 >>> mbox cmd response data (56 bytes)
27,005,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,035,864 UART: [rt]cmd =0x44504543, len=96
27,068,445 >>> mbox cmd response data (56 bytes)
27,069,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,100,011 UART: [rt]cmd =0x44504543, len=96
27,132,484 >>> mbox cmd response data (56 bytes)
27,133,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,163,905 UART: [rt]cmd =0x44504543, len=96
27,196,141 >>> mbox cmd response data (56 bytes)
27,196,823 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,227,252 UART: [rt]cmd =0x44504543, len=96
27,259,522 >>> mbox cmd response data (56 bytes)
27,260,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,290,823 UART: [rt]cmd =0x44504543, len=96
27,323,955 >>> mbox cmd response data (56 bytes)
27,324,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,355,273 UART: [rt]cmd =0x44504543, len=96
27,386,529 >>> mbox cmd response data (56 bytes)
27,387,242 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,417,826 UART: [rt]cmd =0x44504543, len=96
27,450,329 >>> mbox cmd response data (56 bytes)
27,451,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,481,627 UART: [rt]cmd =0x44504543, len=96
27,513,282 >>> mbox cmd response data (56 bytes)
27,513,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,544,455 UART: [rt]cmd =0x44504543, len=96
27,576,642 >>> mbox cmd response data (56 bytes)
27,577,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,607,828 UART: [rt]cmd =0x44504543, len=96
27,640,477 >>> mbox cmd response data (56 bytes)
27,641,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,671,785 UART: [rt]cmd =0x44504543, len=96
27,704,295 >>> mbox cmd response data (56 bytes)
27,705,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,735,383 UART: [rt]cmd =0x44504543, len=96
27,767,565 >>> mbox cmd response data (56 bytes)
27,768,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,798,593 UART: [rt]cmd =0x44504543, len=96
27,830,872 >>> mbox cmd response data (56 bytes)
27,831,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,861,996 UART: [rt]cmd =0x44504543, len=96
27,868,968 >>> mbox cmd response: failed
27,869,346 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,900,075 UART: [rt]cmd =0x44504543, len=96
27,931,334 >>> mbox cmd response data (56 bytes)
27,932,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,962,665 UART: [rt]cmd =0x44504543, len=96
27,969,603 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.24s
Truncated 208126 bytes from beginning
820 UART: [rt]cmd =0x44504543, len=96
26,048,693 >>> mbox cmd response data (56 bytes)
26,049,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,080,068 UART: [rt]cmd =0x44504543, len=96
26,111,633 >>> mbox cmd response data (56 bytes)
26,112,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,142,621 UART: [rt]cmd =0x44504543, len=96
26,174,691 >>> mbox cmd response data (56 bytes)
26,175,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,206,211 UART: [rt]cmd =0x44504543, len=96
26,239,289 >>> mbox cmd response data (56 bytes)
26,239,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,270,404 UART: [rt]cmd =0x44504543, len=96
26,302,620 >>> mbox cmd response data (56 bytes)
26,303,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,617 UART: [rt]cmd =0x44504543, len=96
26,366,343 >>> mbox cmd response data (56 bytes)
26,367,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,707 UART: [rt]cmd =0x44504543, len=96
26,430,185 >>> mbox cmd response data (56 bytes)
26,430,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,400 UART: [rt]cmd =0x44504543, len=96
26,492,931 >>> mbox cmd response data (56 bytes)
26,493,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,166 UART: [rt]cmd =0x44504543, len=96
26,556,561 >>> mbox cmd response data (56 bytes)
26,557,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,587,785 UART: [rt]cmd =0x44504543, len=96
26,619,559 >>> mbox cmd response data (56 bytes)
26,620,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,650,871 UART: [rt]cmd =0x44504543, len=96
26,683,493 >>> mbox cmd response data (56 bytes)
26,684,208 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,715,002 UART: [rt]cmd =0x44504543, len=96
26,746,980 >>> mbox cmd response data (56 bytes)
26,747,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,778,439 UART: [rt]cmd =0x44504543, len=96
26,810,621 >>> mbox cmd response data (56 bytes)
26,811,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,841,890 UART: [rt]cmd =0x44504543, len=96
26,873,459 >>> mbox cmd response data (56 bytes)
26,874,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,904,815 UART: [rt]cmd =0x44504543, len=96
26,936,753 >>> mbox cmd response data (56 bytes)
26,937,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,967,850 UART: [rt]cmd =0x44504543, len=96
26,999,655 >>> mbox cmd response data (56 bytes)
27,000,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,030,904 UART: [rt]cmd =0x44504543, len=96
27,061,900 >>> mbox cmd response data (56 bytes)
27,062,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,092,886 UART: [rt]cmd =0x44504543, len=96
27,125,821 >>> mbox cmd response data (56 bytes)
27,126,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,157,030 UART: [rt]cmd =0x44504543, len=96
27,189,400 >>> mbox cmd response data (56 bytes)
27,190,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,220,640 UART: [rt]cmd =0x44504543, len=96
27,252,364 >>> mbox cmd response data (56 bytes)
27,253,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,283,519 UART: [rt]cmd =0x44504543, len=96
27,315,590 >>> mbox cmd response data (56 bytes)
27,316,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,347,099 UART: [rt]cmd =0x44504543, len=96
27,379,598 >>> mbox cmd response data (56 bytes)
27,380,458 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,411,329 UART: [rt]cmd =0x44504543, len=96
27,443,410 >>> mbox cmd response data (56 bytes)
27,444,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,474,758 UART: [rt]cmd =0x44504543, len=96
27,506,869 >>> mbox cmd response data (56 bytes)
27,507,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,538,136 UART: [rt]cmd =0x44504543, len=96
27,570,014 >>> mbox cmd response data (56 bytes)
27,570,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,601,202 UART: [rt]cmd =0x44504543, len=96
27,633,277 >>> mbox cmd response data (56 bytes)
27,633,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,664,684 UART: [rt]cmd =0x44504543, len=96
27,671,516 >>> mbox cmd response: failed
27,671,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,702,254 UART: [rt]cmd =0x44504543, len=96
27,734,402 >>> mbox cmd response data (56 bytes)
27,735,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,765,566 UART: [rt]cmd =0x44504543, len=96
27,798,291 >>> mbox cmd response data (56 bytes)
27,799,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,829,753 UART: [rt]cmd =0x44504543, len=96
27,836,636 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,458,648 ready_for_fw is high
3,459,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,228,696 >>> mbox cmd response: success
14,231,791 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,517,562 UART:
18,517,952 UART: Running Caliptra FMC ...
18,519,067 UART:
18,519,224 UART: [state] CFI Enabled
18,580,648 UART: [fht] FMC Alias Private Key: 7
20,346,236 UART: [art] Extend RT PCRs Done
20,347,473 UART: [art] Lock RT PCRs Done
20,349,183 UART: [art] Populate DV Done
20,354,896 UART: [fht] FMC Alias Private Key: 7
20,356,389 UART: [art] Derive CDI
20,357,157 UART: [art] Store in slot 0x4
20,413,363 UART: [art] Derive Key Pair
20,414,363 UART: [art] Store priv key in slot 0x5
22,877,251 UART: [art] Derive Key Pair - Done
22,890,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,443 UART: [art] PUB.X = DD81E5795540398CBDC111A21F16051984657D937576D871464CC0C46720EB336687AB057821F9E3A2C2646D8165180E
24,612,694 UART: [art] PUB.Y = 532344D32955D03E78383DF8DEE3279738CC6A4166D85F971EB48AFA667ED345E1292B5D05B62C8DBC6FA4DD3429907D
24,619,909 UART: [art] SIG.R = 8ECD7D9ED1FE8EF0C0DC544587F82B2C320A07CACD18A03E2E9B698C6F5EEF444D8F3847BF6AD94196FA69672DE4A528
24,627,369 UART: [art] SIG.S = 0308D5C0FC21E5309A2153EAF71504C8F4A707B5D90E5CB0042FC5C78D571B368A02D023F259DE6F2208DB1272E8DADB
25,605,839 UART: Caliptra RT
25,606,554 UART: [state] CFI Enabled
25,786,797 UART: [rt] RT listening for mailbox commands...
25,818,589 UART: [rt]cmd =0x52435458, len=8
25,820,905 >>> mbox cmd response data (16 bytes)
25,821,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,852,058 UART: [rt]cmd =0x44504543, len=96
25,883,407 >>> mbox cmd response data (56 bytes)
25,884,217 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,914,711 UART: [rt]cmd =0x44504543, len=96
25,946,734 >>> mbox cmd response data (56 bytes)
25,947,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,978,066 UART: [rt]cmd =0x44504543, len=96
26,010,448 >>> mbox cmd response data (56 bytes)
26,011,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,041,736 UART: [rt]cmd =0x44504543, len=96
26,073,278 >>> mbox cmd response data (56 bytes)
26,073,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,104,653 UART: [rt]cmd =0x44504543, len=96
26,136,518 >>> mbox cmd response data (56 bytes)
26,137,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,167,610 UART: [rt]cmd =0x44504543, len=96
26,199,104 >>> mbox cmd response data (56 bytes)
26,199,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,230,404 UART: [rt]cmd =0x44504543, len=96
26,262,008 >>> mbox cmd response data (56 bytes)
26,262,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,293,344 UART: [rt]cmd =0x44504543, len=96
26,324,752 >>> mbox cmd response data (56 bytes)
26,325,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,356,037 UART: [rt]cmd =0x44504543, len=96
26,388,091 >>> mbox cmd response data (56 bytes)
26,388,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,084 UART: [rt]cmd =0x44504543, len=96
26,451,370 >>> mbox cmd response data (56 bytes)
26,452,086 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,482,840 UART: [rt]cmd =0x44504543, len=96
26,513,844 >>> mbox cmd response data (56 bytes)
26,514,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,545,079 UART: [rt]cmd =0x44504543, len=96
26,576,828 >>> mbox cmd response data (56 bytes)
26,577,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,607,738 UART: [rt]cmd =0x44504543, len=96
26,639,895 >>> mbox cmd response data (56 bytes)
26,640,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,671,227 UART: [rt]cmd =0x44504543, len=96
26,703,112 >>> mbox cmd response data (56 bytes)
26,703,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,734,316 UART: [rt]cmd =0x44504543, len=96
26,766,389 >>> mbox cmd response data (56 bytes)
26,767,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,797,412 UART: [rt]cmd =0x44504543, len=96
26,829,163 >>> mbox cmd response data (56 bytes)
26,829,877 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,860,292 UART: [rt]cmd =0x44504543, len=96
26,892,844 >>> mbox cmd response data (56 bytes)
26,893,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,923,811 UART: [rt]cmd =0x44504543, len=96
26,955,372 >>> mbox cmd response data (56 bytes)
26,956,061 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,986,697 UART: [rt]cmd =0x44504543, len=96
27,018,662 >>> mbox cmd response data (56 bytes)
27,019,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,050,065 UART: [rt]cmd =0x44504543, len=96
27,082,376 >>> mbox cmd response data (56 bytes)
27,083,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,113,839 UART: [rt]cmd =0x44504543, len=96
27,146,284 >>> mbox cmd response data (56 bytes)
27,146,956 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,177,400 UART: [rt]cmd =0x44504543, len=96
27,209,723 >>> mbox cmd response data (56 bytes)
27,210,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,240,855 UART: [rt]cmd =0x44504543, len=96
27,272,866 >>> mbox cmd response data (56 bytes)
27,273,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,303,754 UART: [rt]cmd =0x44504543, len=96
27,336,423 >>> mbox cmd response data (56 bytes)
27,337,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,367,605 UART: [rt]cmd =0x44504543, len=96
27,399,041 >>> mbox cmd response data (56 bytes)
27,399,755 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,430,337 UART: [rt]cmd =0x44504543, len=96
27,463,046 >>> mbox cmd response data (56 bytes)
27,463,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,494,146 UART: [rt]cmd =0x44504543, len=96
27,525,928 >>> mbox cmd response data (56 bytes)
27,526,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,557,037 UART: [rt]cmd =0x44504543, len=96
27,589,897 >>> mbox cmd response data (56 bytes)
27,590,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,621,387 UART: [rt]cmd =0x44504543, len=96
27,654,433 >>> mbox cmd response data (56 bytes)
27,655,184 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,685,822 UART: [rt]cmd =0x44504543, len=96
27,693,093 >>> mbox cmd response: failed
27,693,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,723,900 UART: [rt]cmd =0x44504543, len=96
27,755,841 >>> mbox cmd response data (56 bytes)
27,756,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,787,111 UART: [rt]cmd =0x44504543, len=96
27,793,699 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.95s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,483,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,513,863 UART: [rt]cmd =0x44504543, len=96
27,545,501 >>> mbox cmd response data (56 bytes)
27,546,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,576,659 UART: [rt]cmd =0x44504543, len=96
27,609,466 >>> mbox cmd response data (56 bytes)
27,610,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,640,681 UART: [rt]cmd =0x44504543, len=96
27,672,629 >>> mbox cmd response data (56 bytes)
27,673,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,703,895 UART: [rt]cmd =0x44504543, len=96
27,735,916 >>> mbox cmd response data (56 bytes)
27,736,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,767,324 UART: [rt]cmd =0x44504543, len=96
27,799,445 >>> mbox cmd response data (56 bytes)
27,800,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,830,913 UART: [rt]cmd =0x44504543, len=96
27,837,917 >>> mbox cmd response: failed
27,838,292 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,868,966 UART: [rt]cmd =0x44504543, len=96
27,901,317 >>> mbox cmd response data (56 bytes)
27,902,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,932,371 UART: [rt]cmd =0x44504543, len=96
27,964,349 >>> mbox cmd response data (56 bytes)
27,965,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,995,547 UART: [rt]cmd =0x44504543, len=96
28,002,106 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,884 writing to cptra_bootfsm_go
192,986 UART:
193,331 UART: Running Caliptra ROM ...
194,653 UART:
604,361 UART: [state] CFI Enabled
620,218 UART: [state] LifecycleState = Unprovisioned
622,112 UART: [state] DebugLocked = No
623,663 UART: [state] WD Timer not started. Device not locked for debugging
627,913 UART: [kat] SHA2-256
807,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,360 UART: [kat] ++
818,814 UART: [kat] sha1
829,332 UART: [kat] SHA2-256
831,985 UART: [kat] SHA2-384
837,350 UART: [kat] SHA2-512-ACC
839,754 UART: [kat] ECC-384
3,281,517 UART: [kat] HMAC-384Kdf
3,293,254 UART: [kat] LMS
3,769,713 UART: [kat] --
3,773,568 UART: [cold-reset] ++
3,774,786 UART: [fht] FHT @ 0x50003400
3,785,126 UART: [idev] ++
3,785,696 UART: [idev] CDI.KEYID = 6
3,786,748 UART: [idev] SUBJECT.KEYID = 7
3,787,931 UART: [idev] UDS.KEYID = 0
3,788,858 ready_for_fw is high
3,789,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,261 UART: [idev] Erasing UDS.KEYID = 0
6,270,802 UART: [idev] Sha1 KeyId Algorithm
6,293,646 UART: [idev] --
6,298,910 UART: [ldev] ++
6,299,489 UART: [ldev] CDI.KEYID = 6
6,300,404 UART: [ldev] SUBJECT.KEYID = 5
6,301,617 UART: [ldev] AUTHORITY.KEYID = 7
6,302,906 UART: [ldev] FE.KEYID = 1
6,315,608 UART: [ldev] Erasing FE.KEYID = 1
8,791,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,742 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,686 UART: [ldev] --
10,588,978 UART: [fwproc] Wait for Commands...
10,591,284 UART: [fwproc] Recv command 0x46574c44
10,593,328 UART: [fwproc] Recv'd Img size: 118548 bytes
14,086,922 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,371 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,563,855 >>> mbox cmd response: success
14,564,407 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,568,329 UART: [afmc] ++
14,568,910 UART: [afmc] CDI.KEYID = 6
14,569,936 UART: [afmc] SUBJECT.KEYID = 7
14,571,042 UART: [afmc] AUTHORITY.KEYID = 5
17,073,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,756 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,798,955 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,787 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,830,818 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,440 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,143 UART: [afmc] --
18,875,763 UART: [cold-reset] --
18,878,709 UART: [state] Locking Datavault
18,885,472 UART: [state] Locking PCR0, PCR1 and PCR31
18,887,219 UART: [state] Locking ICCM
18,889,426 UART: [exit] Launching FMC @ 0x40000130
18,897,822 UART:
18,898,064 UART: Running Caliptra FMC ...
18,899,174 UART:
18,899,331 UART: [state] CFI Enabled
18,907,701 UART: [fht] FMC Alias Private Key: 7
20,673,907 UART: [art] Extend RT PCRs Done
20,675,286 UART: [art] Lock RT PCRs Done
20,676,809 UART: [art] Populate DV Done
20,682,543 UART: [fht] FMC Alias Private Key: 7
20,684,091 UART: [art] Derive CDI
20,684,912 UART: [art] Store in slot 0x4
20,727,830 UART: [art] Derive Key Pair
20,728,832 UART: [art] Store priv key in slot 0x5
23,156,104 UART: [art] Derive Key Pair - Done
23,169,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,592 UART: [art] Erasing AUTHORITY.KEYID = 7
24,877,095 UART: [art] PUB.X = 9A0C5D5EA56472F1651AFF5F8B1096699021A323C622F660AE00E536E82D8DF394A4C346038748E931551F6672CD2096
24,884,342 UART: [art] PUB.Y = 59AA8F010D7797CD5CF97A711CDF6DDB35BCACB0837711DFC808CF336E559230C64337BC020D3678FA57D127FF81B054
24,891,571 UART: [art] SIG.R = 2749B6C655DF18DEBDB27AD8F69C333B5366582E7CD2E2AF8ABE4C0FA4C593912B78CF8E2603F0DE4225B5B0C43278D2
24,898,972 UART: [art] SIG.S = 9DC3622C43C511B7F2451CB2B52A7A373324A996190D1DFBC53C51FECE5E6712317BC74C0665FAB779F55F8B9E330543
25,877,997 UART: Caliptra RT
25,878,714 UART: [state] CFI Enabled
26,011,354 UART: [rt] RT listening for mailbox commands...
26,042,706 UART: [rt]cmd =0x52435458, len=8
26,044,796 >>> mbox cmd response data (16 bytes)
26,045,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,075,648 UART: [rt]cmd =0x44504543, len=96
26,107,561 >>> mbox cmd response data (56 bytes)
26,108,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,138,778 UART: [rt]cmd =0x44504543, len=96
26,170,070 >>> mbox cmd response data (56 bytes)
26,170,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,201,258 UART: [rt]cmd =0x44504543, len=96
26,233,687 >>> mbox cmd response data (56 bytes)
26,234,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,264,959 UART: [rt]cmd =0x44504543, len=96
26,296,718 >>> mbox cmd response data (56 bytes)
26,297,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,988 UART: [rt]cmd =0x44504543, len=96
26,359,687 >>> mbox cmd response data (56 bytes)
26,360,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,390,766 UART: [rt]cmd =0x44504543, len=96
26,421,916 >>> mbox cmd response data (56 bytes)
26,422,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,452,863 UART: [rt]cmd =0x44504543, len=96
26,484,589 >>> mbox cmd response data (56 bytes)
26,485,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,515,814 UART: [rt]cmd =0x44504543, len=96
26,547,973 >>> mbox cmd response data (56 bytes)
26,548,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,579,082 UART: [rt]cmd =0x44504543, len=96
26,611,218 >>> mbox cmd response data (56 bytes)
26,611,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,642,487 UART: [rt]cmd =0x44504543, len=96
26,674,400 >>> mbox cmd response data (56 bytes)
26,675,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,705,814 UART: [rt]cmd =0x44504543, len=96
26,737,509 >>> mbox cmd response data (56 bytes)
26,738,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,768,764 UART: [rt]cmd =0x44504543, len=96
26,800,783 >>> mbox cmd response data (56 bytes)
26,801,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,831,796 UART: [rt]cmd =0x44504543, len=96
26,863,678 >>> mbox cmd response data (56 bytes)
26,864,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,894,931 UART: [rt]cmd =0x44504543, len=96
26,927,245 >>> mbox cmd response data (56 bytes)
26,927,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,958,543 UART: [rt]cmd =0x44504543, len=96
26,990,095 >>> mbox cmd response data (56 bytes)
26,990,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,021,315 UART: [rt]cmd =0x44504543, len=96
27,053,319 >>> mbox cmd response data (56 bytes)
27,054,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,084,553 UART: [rt]cmd =0x44504543, len=96
27,116,664 >>> mbox cmd response data (56 bytes)
27,117,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,148,091 UART: [rt]cmd =0x44504543, len=96
27,179,842 >>> mbox cmd response data (56 bytes)
27,180,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,211,025 UART: [rt]cmd =0x44504543, len=96
27,243,482 >>> mbox cmd response data (56 bytes)
27,244,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,274,708 UART: [rt]cmd =0x44504543, len=96
27,306,456 >>> mbox cmd response data (56 bytes)
27,307,146 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,337,519 UART: [rt]cmd =0x44504543, len=96
27,370,054 >>> mbox cmd response data (56 bytes)
27,370,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,401,293 UART: [rt]cmd =0x44504543, len=96
27,433,209 >>> mbox cmd response data (56 bytes)
27,433,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,464,435 UART: [rt]cmd =0x44504543, len=96
27,496,042 >>> mbox cmd response data (56 bytes)
27,496,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,527,293 UART: [rt]cmd =0x44504543, len=96
27,559,053 >>> mbox cmd response data (56 bytes)
27,559,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,590,145 UART: [rt]cmd =0x44504543, len=96
27,621,943 >>> mbox cmd response data (56 bytes)
27,622,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,653,011 UART: [rt]cmd =0x44504543, len=96
27,685,660 >>> mbox cmd response data (56 bytes)
27,686,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,716,885 UART: [rt]cmd =0x44504543, len=96
27,749,367 >>> mbox cmd response data (56 bytes)
27,750,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,780,589 UART: [rt]cmd =0x44504543, len=96
27,812,666 >>> mbox cmd response data (56 bytes)
27,813,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,843,856 UART: [rt]cmd =0x44504543, len=96
27,876,295 >>> mbox cmd response data (56 bytes)
27,877,019 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,907,663 UART: [rt]cmd =0x44504543, len=96
27,914,500 >>> mbox cmd response: failed
27,914,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,945,293 UART: [rt]cmd =0x44504543, len=96
27,976,957 >>> mbox cmd response data (56 bytes)
27,977,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,008,428 UART: [rt]cmd =0x44504543, len=96
28,015,434 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.26s
Truncated 208126 bytes from beginning
098 UART: [rt]cmd =0x44504543, len=96
26,029,772 >>> mbox cmd response data (56 bytes)
26,030,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,061,079 UART: [rt]cmd =0x44504543, len=96
26,093,326 >>> mbox cmd response data (56 bytes)
26,094,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,124,620 UART: [rt]cmd =0x44504543, len=96
26,156,651 >>> mbox cmd response data (56 bytes)
26,157,373 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,187,850 UART: [rt]cmd =0x44504543, len=96
26,219,446 >>> mbox cmd response data (56 bytes)
26,220,167 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,250,859 UART: [rt]cmd =0x44504543, len=96
26,282,338 >>> mbox cmd response data (56 bytes)
26,283,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,313,553 UART: [rt]cmd =0x44504543, len=96
26,344,813 >>> mbox cmd response data (56 bytes)
26,345,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,375,974 UART: [rt]cmd =0x44504543, len=96
26,408,144 >>> mbox cmd response data (56 bytes)
26,408,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,270 UART: [rt]cmd =0x44504543, len=96
26,471,567 >>> mbox cmd response data (56 bytes)
26,472,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,502,494 UART: [rt]cmd =0x44504543, len=96
26,534,519 >>> mbox cmd response data (56 bytes)
26,535,246 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,565,719 UART: [rt]cmd =0x44504543, len=96
26,598,542 >>> mbox cmd response data (56 bytes)
26,599,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,629,926 UART: [rt]cmd =0x44504543, len=96
26,662,084 >>> mbox cmd response data (56 bytes)
26,662,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,693,493 UART: [rt]cmd =0x44504543, len=96
26,725,490 >>> mbox cmd response data (56 bytes)
26,726,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,756,656 UART: [rt]cmd =0x44504543, len=96
26,788,846 >>> mbox cmd response data (56 bytes)
26,789,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,819,940 UART: [rt]cmd =0x44504543, len=96
26,852,337 >>> mbox cmd response data (56 bytes)
26,853,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,883,911 UART: [rt]cmd =0x44504543, len=96
26,916,263 >>> mbox cmd response data (56 bytes)
26,916,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,947,436 UART: [rt]cmd =0x44504543, len=96
26,980,241 >>> mbox cmd response data (56 bytes)
26,980,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,011,429 UART: [rt]cmd =0x44504543, len=96
27,043,252 >>> mbox cmd response data (56 bytes)
27,043,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,074,565 UART: [rt]cmd =0x44504543, len=96
27,106,539 >>> mbox cmd response data (56 bytes)
27,107,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,137,902 UART: [rt]cmd =0x44504543, len=96
27,169,818 >>> mbox cmd response data (56 bytes)
27,170,501 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,201,147 UART: [rt]cmd =0x44504543, len=96
27,233,625 >>> mbox cmd response data (56 bytes)
27,234,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,264,853 UART: [rt]cmd =0x44504543, len=96
27,297,710 >>> mbox cmd response data (56 bytes)
27,298,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,329,095 UART: [rt]cmd =0x44504543, len=96
27,362,118 >>> mbox cmd response data (56 bytes)
27,362,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,393,340 UART: [rt]cmd =0x44504543, len=96
27,425,598 >>> mbox cmd response data (56 bytes)
27,426,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,456,907 UART: [rt]cmd =0x44504543, len=96
27,488,443 >>> mbox cmd response data (56 bytes)
27,489,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,519,825 UART: [rt]cmd =0x44504543, len=96
27,552,575 >>> mbox cmd response data (56 bytes)
27,553,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,583,961 UART: [rt]cmd =0x44504543, len=96
27,616,120 >>> mbox cmd response data (56 bytes)
27,616,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,647,288 UART: [rt]cmd =0x44504543, len=96
27,654,184 >>> mbox cmd response: failed
27,654,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,684,929 UART: [rt]cmd =0x44504543, len=96
27,717,587 >>> mbox cmd response data (56 bytes)
27,718,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,748,814 UART: [rt]cmd =0x44504543, len=96
27,780,968 >>> mbox cmd response data (56 bytes)
27,781,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,812,138 UART: [rt]cmd =0x44504543, len=96
27,818,868 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,610 writing to cptra_bootfsm_go
3,779,879 ready_for_fw is high
3,780,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,429,505 >>> mbox cmd response: success
14,432,689 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
18,684,070 UART:
18,684,476 UART: Running Caliptra FMC ...
18,685,686 UART:
18,685,859 UART: [state] CFI Enabled
18,693,499 UART: [fht] FMC Alias Private Key: 7
20,459,450 UART: [art] Extend RT PCRs Done
20,460,681 UART: [art] Lock RT PCRs Done
20,462,449 UART: [art] Populate DV Done
20,467,861 UART: [fht] FMC Alias Private Key: 7
20,469,399 UART: [art] Derive CDI
20,470,134 UART: [art] Store in slot 0x4
20,512,670 UART: [art] Derive Key Pair
20,513,685 UART: [art] Store priv key in slot 0x5
22,940,484 UART: [art] Derive Key Pair - Done
22,953,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,659,741 UART: [art] Erasing AUTHORITY.KEYID = 7
24,661,245 UART: [art] PUB.X = 4EC67D63093B88E9629F4F6B183E16D43756140FB0A69424ABD88EBC5AB7C9A667905AB40765C1C63516DAC6C3FD4EF1
24,668,508 UART: [art] PUB.Y = 4D40A38A3D3E24DCAA9D9DF5FD82E7F2FA190856E105D6E42DCF1C88EB38D3F8E988D4AEB5EB558A47EF2852AC4A47B5
24,675,787 UART: [art] SIG.R = 167161EBCF2C7D933097C3CEBC4C4E2BE6FB0E1B53A1A38C9063229EFFCF276B0C202811194320863968169052833684
24,683,135 UART: [art] SIG.S = E4276AD634390BB2B1F52E2A2956FAFEA4C07EE08BB129BDF89E3368774602FAC182CEE3BCF7EA85C00BD3CE38011D71
25,661,774 UART: Caliptra RT
25,662,466 UART: [state] CFI Enabled
25,795,824 UART: [rt] RT listening for mailbox commands...
25,827,505 UART: [rt]cmd =0x52435458, len=8
25,829,679 >>> mbox cmd response data (16 bytes)
25,830,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,861,189 UART: [rt]cmd =0x44504543, len=96
25,892,950 >>> mbox cmd response data (56 bytes)
25,893,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,924,072 UART: [rt]cmd =0x44504543, len=96
25,955,915 >>> mbox cmd response data (56 bytes)
25,956,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,987,150 UART: [rt]cmd =0x44504543, len=96
26,019,239 >>> mbox cmd response data (56 bytes)
26,019,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,050,451 UART: [rt]cmd =0x44504543, len=96
26,082,045 >>> mbox cmd response data (56 bytes)
26,082,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,113,311 UART: [rt]cmd =0x44504543, len=96
26,144,952 >>> mbox cmd response data (56 bytes)
26,145,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,176,323 UART: [rt]cmd =0x44504543, len=96
26,207,569 >>> mbox cmd response data (56 bytes)
26,208,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,238,920 UART: [rt]cmd =0x44504543, len=96
26,270,483 >>> mbox cmd response data (56 bytes)
26,271,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,301,756 UART: [rt]cmd =0x44504543, len=96
26,332,978 >>> mbox cmd response data (56 bytes)
26,333,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,364,235 UART: [rt]cmd =0x44504543, len=96
26,396,158 >>> mbox cmd response data (56 bytes)
26,396,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,427,372 UART: [rt]cmd =0x44504543, len=96
26,458,850 >>> mbox cmd response data (56 bytes)
26,459,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,489,961 UART: [rt]cmd =0x44504543, len=96
26,522,032 >>> mbox cmd response data (56 bytes)
26,522,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,553,171 UART: [rt]cmd =0x44504543, len=96
26,585,551 >>> mbox cmd response data (56 bytes)
26,586,238 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,616,661 UART: [rt]cmd =0x44504543, len=96
26,648,193 >>> mbox cmd response data (56 bytes)
26,648,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,679,338 UART: [rt]cmd =0x44504543, len=96
26,711,795 >>> mbox cmd response data (56 bytes)
26,712,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,742,900 UART: [rt]cmd =0x44504543, len=96
26,774,967 >>> mbox cmd response data (56 bytes)
26,775,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,806,448 UART: [rt]cmd =0x44504543, len=96
26,838,716 >>> mbox cmd response data (56 bytes)
26,839,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,870,099 UART: [rt]cmd =0x44504543, len=96
26,902,153 >>> mbox cmd response data (56 bytes)
26,902,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,933,319 UART: [rt]cmd =0x44504543, len=96
26,965,338 >>> mbox cmd response data (56 bytes)
26,966,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,996,640 UART: [rt]cmd =0x44504543, len=96
27,029,192 >>> mbox cmd response data (56 bytes)
27,029,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,060,360 UART: [rt]cmd =0x44504543, len=96
27,092,321 >>> mbox cmd response data (56 bytes)
27,093,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,123,719 UART: [rt]cmd =0x44504543, len=96
27,155,666 >>> mbox cmd response data (56 bytes)
27,156,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,187,153 UART: [rt]cmd =0x44504543, len=96
27,219,343 >>> mbox cmd response data (56 bytes)
27,220,060 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,250,807 UART: [rt]cmd =0x44504543, len=96
27,282,235 >>> mbox cmd response data (56 bytes)
27,282,949 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,313,473 UART: [rt]cmd =0x44504543, len=96
27,346,030 >>> mbox cmd response data (56 bytes)
27,346,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,377,186 UART: [rt]cmd =0x44504543, len=96
27,409,555 >>> mbox cmd response data (56 bytes)
27,410,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,440,582 UART: [rt]cmd =0x44504543, len=96
27,473,059 >>> mbox cmd response data (56 bytes)
27,473,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,504,382 UART: [rt]cmd =0x44504543, len=96
27,536,771 >>> mbox cmd response data (56 bytes)
27,537,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,567,847 UART: [rt]cmd =0x44504543, len=96
27,599,914 >>> mbox cmd response data (56 bytes)
27,600,624 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,631,098 UART: [rt]cmd =0x44504543, len=96
27,663,762 >>> mbox cmd response data (56 bytes)
27,664,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,695,129 UART: [rt]cmd =0x44504543, len=96
27,701,824 >>> mbox cmd response: failed
27,702,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,732,743 UART: [rt]cmd =0x44504543, len=96
27,764,975 >>> mbox cmd response data (56 bytes)
27,765,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,796,391 UART: [rt]cmd =0x44504543, len=96
27,803,176 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 44.97s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,794,309 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,825,049 UART: [rt]cmd =0x44504543, len=96
27,857,611 >>> mbox cmd response data (56 bytes)
27,858,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,888,860 UART: [rt]cmd =0x44504543, len=96
27,920,782 >>> mbox cmd response data (56 bytes)
27,921,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,951,915 UART: [rt]cmd =0x44504543, len=96
27,983,815 >>> mbox cmd response data (56 bytes)
27,984,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,015,018 UART: [rt]cmd =0x44504543, len=96
28,047,653 >>> mbox cmd response data (56 bytes)
28,048,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,078,715 UART: [rt]cmd =0x44504543, len=96
28,110,922 >>> mbox cmd response data (56 bytes)
28,111,626 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,142,311 UART: [rt]cmd =0x44504543, len=96
28,149,083 >>> mbox cmd response: failed
28,149,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,180,204 UART: [rt]cmd =0x44504543, len=96
28,212,677 >>> mbox cmd response data (56 bytes)
28,213,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,243,959 UART: [rt]cmd =0x44504543, len=96
28,276,812 >>> mbox cmd response data (56 bytes)
28,277,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,308,025 UART: [rt]cmd =0x44504543, len=96
28,314,967 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,153 UART:
192,508 UART: Running Caliptra ROM ...
193,640 UART:
193,783 UART: [state] CFI Enabled
259,590 UART: [state] LifecycleState = Unprovisioned
261,958 UART: [state] DebugLocked = No
263,840 UART: [state] WD Timer not started. Device not locked for debugging
267,723 UART: [kat] SHA2-256
457,619 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,308 UART: [kat] ++
468,762 UART: [kat] sha1
480,573 UART: [kat] SHA2-256
483,584 UART: [kat] SHA2-384
489,856 UART: [kat] SHA2-512-ACC
492,431 UART: [kat] ECC-384
2,948,443 UART: [kat] HMAC-384Kdf
2,969,908 UART: [kat] LMS
3,501,683 UART: [kat] --
3,505,829 UART: [cold-reset] ++
3,507,615 UART: [fht] FHT @ 0x50003400
3,518,724 UART: [idev] ++
3,519,432 UART: [idev] CDI.KEYID = 6
3,520,379 UART: [idev] SUBJECT.KEYID = 7
3,521,614 UART: [idev] UDS.KEYID = 0
3,522,512 ready_for_fw is high
3,522,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,746 UART: [idev] Erasing UDS.KEYID = 0
6,027,287 UART: [idev] Sha1 KeyId Algorithm
6,049,052 UART: [idev] --
6,054,029 UART: [ldev] ++
6,054,768 UART: [ldev] CDI.KEYID = 6
6,055,649 UART: [ldev] SUBJECT.KEYID = 5
6,056,862 UART: [ldev] AUTHORITY.KEYID = 7
6,058,040 UART: [ldev] FE.KEYID = 1
6,097,504 UART: [ldev] Erasing FE.KEYID = 1
8,602,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,921 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,987 UART: [ldev] --
10,412,135 UART: [fwproc] Wait for Commands...
10,415,245 UART: [fwproc] Recv command 0x46574c44
10,417,564 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,182 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,138 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,674,909 >>> mbox cmd response: success
14,675,412 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,678,190 UART: [afmc] ++
14,678,875 UART: [afmc] CDI.KEYID = 6
14,680,113 UART: [afmc] SUBJECT.KEYID = 7
14,681,540 UART: [afmc] AUTHORITY.KEYID = 5
17,212,969 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,405 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,679 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,595 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,014 UART: [afmc] --
19,029,883 UART: [cold-reset] --
19,034,551 UART: [state] Locking Datavault
19,039,476 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,661 UART: [state] Locking ICCM
19,042,944 UART: [exit] Launching FMC @ 0x40000130
19,051,604 UART:
19,051,836 UART: Running Caliptra FMC ...
19,052,935 UART:
19,053,096 UART: [state] CFI Enabled
19,113,249 UART: [fht] FMC Alias Private Key: 7
20,900,676 UART: [art] Extend RT PCRs Done
20,901,888 UART: [art] Lock RT PCRs Done
20,903,642 UART: [art] Populate DV Done
20,908,669 UART: [fht] FMC Alias Private Key: 7
20,910,404 UART: [art] Derive CDI
20,911,245 UART: [art] Store in slot 0x4
20,967,077 UART: [art] Derive Key Pair
20,968,078 UART: [art] Store priv key in slot 0x5
23,431,313 UART: [art] Derive Key Pair - Done
23,444,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,171 UART: [art] Erasing AUTHORITY.KEYID = 7
25,158,655 UART: [art] PUB.X = 75E3271001B5F3917333EB51B093B31E48FAF0646638FE381707EE4C3C47706B0E22256630A9C72FDE1673FE089EC125
25,165,898 UART: [art] PUB.Y = F21770E31DF6B393E0DC9EBA8C37CDA538AAC4A6A2F7A7AA0C2B19360D17A470D7093FA9DED30DE1AA923BA63B7D8DCF
25,173,177 UART: [art] SIG.R = 65F74D26596F29FA8B2F0553D65595A60575687B7A0EB75E918BAB76BEB76EE6FE1347C27035D0FE93B0D4CF61F4C4B7
25,180,623 UART: [art] SIG.S = A0F653FA3477ECCDA79A4C1EBC17797FA58E6236E64CD7FAC93D02ED1E5337FCBC11DD97DB5777C4FD3BACD9C4B8B5D1
26,159,647 UART: Caliptra RT
26,160,369 UART: [state] CFI Enabled
26,339,700 UART: [rt] RT listening for mailbox commands...
26,370,989 UART: [rt]cmd =0x52435458, len=8
26,373,084 >>> mbox cmd response data (16 bytes)
26,373,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,404,071 UART: [rt]cmd =0x44504543, len=96
26,435,666 >>> mbox cmd response data (56 bytes)
26,436,478 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,467,013 UART: [rt]cmd =0x44504543, len=96
26,498,546 >>> mbox cmd response data (56 bytes)
26,499,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,529,617 UART: [rt]cmd =0x44504543, len=96
26,562,047 >>> mbox cmd response data (56 bytes)
26,562,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,593,059 UART: [rt]cmd =0x44504543, len=96
26,625,483 >>> mbox cmd response data (56 bytes)
26,626,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,656,538 UART: [rt]cmd =0x44504543, len=96
26,688,177 >>> mbox cmd response data (56 bytes)
26,688,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,719,262 UART: [rt]cmd =0x44504543, len=96
26,750,548 >>> mbox cmd response data (56 bytes)
26,751,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,781,800 UART: [rt]cmd =0x44504543, len=96
26,813,925 >>> mbox cmd response data (56 bytes)
26,814,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,845,246 UART: [rt]cmd =0x44504543, len=96
26,876,756 >>> mbox cmd response data (56 bytes)
26,877,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,908,142 UART: [rt]cmd =0x44504543, len=96
26,940,414 >>> mbox cmd response data (56 bytes)
26,941,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,971,627 UART: [rt]cmd =0x44504543, len=96
27,003,209 >>> mbox cmd response data (56 bytes)
27,003,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,034,683 UART: [rt]cmd =0x44504543, len=96
27,066,971 >>> mbox cmd response data (56 bytes)
27,067,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,098,261 UART: [rt]cmd =0x44504543, len=96
27,130,694 >>> mbox cmd response data (56 bytes)
27,131,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,161,753 UART: [rt]cmd =0x44504543, len=96
27,193,425 >>> mbox cmd response data (56 bytes)
27,194,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,224,631 UART: [rt]cmd =0x44504543, len=96
27,256,810 >>> mbox cmd response data (56 bytes)
27,257,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,288,168 UART: [rt]cmd =0x44504543, len=96
27,320,405 >>> mbox cmd response data (56 bytes)
27,321,117 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,351,810 UART: [rt]cmd =0x44504543, len=96
27,384,088 >>> mbox cmd response data (56 bytes)
27,384,758 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,415,279 UART: [rt]cmd =0x44504543, len=96
27,447,402 >>> mbox cmd response data (56 bytes)
27,448,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,478,651 UART: [rt]cmd =0x44504543, len=96
27,511,078 >>> mbox cmd response data (56 bytes)
27,511,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,542,134 UART: [rt]cmd =0x44504543, len=96
27,574,199 >>> mbox cmd response data (56 bytes)
27,574,918 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,605,553 UART: [rt]cmd =0x44504543, len=96
27,638,414 >>> mbox cmd response data (56 bytes)
27,639,130 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,669,494 UART: [rt]cmd =0x44504543, len=96
27,702,095 >>> mbox cmd response data (56 bytes)
27,702,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,733,273 UART: [rt]cmd =0x44504543, len=96
27,765,391 >>> mbox cmd response data (56 bytes)
27,766,078 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,796,828 UART: [rt]cmd =0x44504543, len=96
27,829,408 >>> mbox cmd response data (56 bytes)
27,830,128 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,860,818 UART: [rt]cmd =0x44504543, len=96
27,892,727 >>> mbox cmd response data (56 bytes)
27,893,453 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,923,875 UART: [rt]cmd =0x44504543, len=96
27,955,385 >>> mbox cmd response data (56 bytes)
27,956,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,986,783 UART: [rt]cmd =0x44504543, len=96
28,019,649 >>> mbox cmd response data (56 bytes)
28,020,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,050,640 UART: [rt]cmd =0x44504543, len=96
28,083,136 >>> mbox cmd response data (56 bytes)
28,083,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,114,393 UART: [rt]cmd =0x44504543, len=96
28,146,602 >>> mbox cmd response data (56 bytes)
28,147,286 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,177,753 UART: [rt]cmd =0x44504543, len=96
28,209,990 >>> mbox cmd response data (56 bytes)
28,210,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,241,124 UART: [rt]cmd =0x44504543, len=96
28,248,004 >>> mbox cmd response: failed
28,248,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,278,855 UART: [rt]cmd =0x44504543, len=96
28,310,841 >>> mbox cmd response data (56 bytes)
28,311,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,342,052 UART: [rt]cmd =0x44504543, len=96
28,348,832 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.69s
Truncated 208126 bytes from beginning
631 UART: [rt]cmd =0x44504543, len=96
26,612,665 >>> mbox cmd response data (56 bytes)
26,613,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,974 UART: [rt]cmd =0x44504543, len=96
26,676,348 >>> mbox cmd response data (56 bytes)
26,677,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,707,477 UART: [rt]cmd =0x44504543, len=96
26,739,582 >>> mbox cmd response data (56 bytes)
26,740,277 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,770,820 UART: [rt]cmd =0x44504543, len=96
26,801,956 >>> mbox cmd response data (56 bytes)
26,802,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,833,227 UART: [rt]cmd =0x44504543, len=96
26,864,121 >>> mbox cmd response data (56 bytes)
26,864,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,895,322 UART: [rt]cmd =0x44504543, len=96
26,926,622 >>> mbox cmd response data (56 bytes)
26,927,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,957,924 UART: [rt]cmd =0x44504543, len=96
26,990,045 >>> mbox cmd response data (56 bytes)
26,990,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,021,382 UART: [rt]cmd =0x44504543, len=96
27,052,510 >>> mbox cmd response data (56 bytes)
27,053,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,083,770 UART: [rt]cmd =0x44504543, len=96
27,115,231 >>> mbox cmd response data (56 bytes)
27,115,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,146,556 UART: [rt]cmd =0x44504543, len=96
27,178,950 >>> mbox cmd response data (56 bytes)
27,179,666 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,210,468 UART: [rt]cmd =0x44504543, len=96
27,242,388 >>> mbox cmd response data (56 bytes)
27,243,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,273,434 UART: [rt]cmd =0x44504543, len=96
27,304,696 >>> mbox cmd response data (56 bytes)
27,305,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,335,960 UART: [rt]cmd =0x44504543, len=96
27,367,686 >>> mbox cmd response data (56 bytes)
27,368,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,399,021 UART: [rt]cmd =0x44504543, len=96
27,431,454 >>> mbox cmd response data (56 bytes)
27,432,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,462,840 UART: [rt]cmd =0x44504543, len=96
27,494,436 >>> mbox cmd response data (56 bytes)
27,495,158 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,525,851 UART: [rt]cmd =0x44504543, len=96
27,557,979 >>> mbox cmd response data (56 bytes)
27,558,663 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,589,062 UART: [rt]cmd =0x44504543, len=96
27,621,280 >>> mbox cmd response data (56 bytes)
27,621,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,652,517 UART: [rt]cmd =0x44504543, len=96
27,684,308 >>> mbox cmd response data (56 bytes)
27,685,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,715,547 UART: [rt]cmd =0x44504543, len=96
27,747,897 >>> mbox cmd response data (56 bytes)
27,748,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,779,048 UART: [rt]cmd =0x44504543, len=96
27,811,885 >>> mbox cmd response data (56 bytes)
27,812,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,843,252 UART: [rt]cmd =0x44504543, len=96
27,875,321 >>> mbox cmd response data (56 bytes)
27,876,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,906,765 UART: [rt]cmd =0x44504543, len=96
27,939,104 >>> mbox cmd response data (56 bytes)
27,939,799 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,970,179 UART: [rt]cmd =0x44504543, len=96
28,002,818 >>> mbox cmd response data (56 bytes)
28,003,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,033,993 UART: [rt]cmd =0x44504543, len=96
28,066,725 >>> mbox cmd response data (56 bytes)
28,067,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,098,180 UART: [rt]cmd =0x44504543, len=96
28,130,929 >>> mbox cmd response data (56 bytes)
28,131,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,162,350 UART: [rt]cmd =0x44504543, len=96
28,194,740 >>> mbox cmd response data (56 bytes)
28,195,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,225,957 UART: [rt]cmd =0x44504543, len=96
28,232,994 >>> mbox cmd response: failed
28,233,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,263,767 UART: [rt]cmd =0x44504543, len=96
28,295,787 >>> mbox cmd response data (56 bytes)
28,296,517 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,327,048 UART: [rt]cmd =0x44504543, len=96
28,359,173 >>> mbox cmd response data (56 bytes)
28,360,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,390,855 UART: [rt]cmd =0x44504543, len=96
28,397,695 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
3,414,427 ready_for_fw is high
3,414,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,606 >>> mbox cmd response: success
14,821,196 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,110,797 UART:
19,111,176 UART: Running Caliptra FMC ...
19,112,304 UART:
19,112,648 UART: [state] CFI Enabled
19,178,476 UART: [fht] FMC Alias Private Key: 7
20,966,969 UART: [art] Extend RT PCRs Done
20,968,196 UART: [art] Lock RT PCRs Done
20,969,738 UART: [art] Populate DV Done
20,975,371 UART: [fht] FMC Alias Private Key: 7
20,977,074 UART: [art] Derive CDI
20,977,914 UART: [art] Store in slot 0x4
21,033,039 UART: [art] Derive Key Pair
21,034,090 UART: [art] Store priv key in slot 0x5
23,496,818 UART: [art] Derive Key Pair - Done
23,509,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,824 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,330 UART: [art] PUB.X = 027273278F2E5616E37AEF264DC713F1E48E46F0D8193E03A1DC3DFFE6914A64E7B4D348E7E5E5E144CB3D907D0E30E8
25,231,576 UART: [art] PUB.Y = A76978EFD3D793A4EB3C3A24CDA54EBA02670C088DE50086BBCA4C3D916C51E1B646CB9CE2E73AD31574E44D43515F1B
25,238,831 UART: [art] SIG.R = 9BD988B0C5844B14D4C15A0C261F4A261E675FA48A76D39D7761D73118BD10031F511FF372AD48AF97FF775AA99A2B96
25,246,217 UART: [art] SIG.S = 4A6F330BDB467035F16EB127A5B753037CB8E8B5C07C7FA1DE053054FA15F249B7A2F9EF15BBD1F48E7329DF26702C40
26,225,473 UART: Caliptra RT
26,226,167 UART: [state] CFI Enabled
26,406,321 UART: [rt] RT listening for mailbox commands...
26,437,793 UART: [rt]cmd =0x52435458, len=8
26,439,968 >>> mbox cmd response data (16 bytes)
26,440,562 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,056 UART: [rt]cmd =0x44504543, len=96
26,503,089 >>> mbox cmd response data (56 bytes)
26,503,909 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,341 UART: [rt]cmd =0x44504543, len=96
26,565,984 >>> mbox cmd response data (56 bytes)
26,566,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,597,186 UART: [rt]cmd =0x44504543, len=96
26,629,091 >>> mbox cmd response data (56 bytes)
26,629,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,660,321 UART: [rt]cmd =0x44504543, len=96
26,692,249 >>> mbox cmd response data (56 bytes)
26,692,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,723,766 UART: [rt]cmd =0x44504543, len=96
26,755,815 >>> mbox cmd response data (56 bytes)
26,756,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,786,977 UART: [rt]cmd =0x44504543, len=96
26,818,153 >>> mbox cmd response data (56 bytes)
26,818,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,849,526 UART: [rt]cmd =0x44504543, len=96
26,881,811 >>> mbox cmd response data (56 bytes)
26,882,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,913,186 UART: [rt]cmd =0x44504543, len=96
26,944,827 >>> mbox cmd response data (56 bytes)
26,945,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,975,940 UART: [rt]cmd =0x44504543, len=96
27,007,294 >>> mbox cmd response data (56 bytes)
27,007,991 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,038,701 UART: [rt]cmd =0x44504543, len=96
27,069,885 >>> mbox cmd response data (56 bytes)
27,070,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,101,160 UART: [rt]cmd =0x44504543, len=96
27,133,076 >>> mbox cmd response data (56 bytes)
27,133,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,164,349 UART: [rt]cmd =0x44504543, len=96
27,196,640 >>> mbox cmd response data (56 bytes)
27,197,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,227,947 UART: [rt]cmd =0x44504543, len=96
27,259,852 >>> mbox cmd response data (56 bytes)
27,260,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,291,279 UART: [rt]cmd =0x44504543, len=96
27,322,734 >>> mbox cmd response data (56 bytes)
27,323,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,353,912 UART: [rt]cmd =0x44504543, len=96
27,386,285 >>> mbox cmd response data (56 bytes)
27,386,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,417,334 UART: [rt]cmd =0x44504543, len=96
27,449,749 >>> mbox cmd response data (56 bytes)
27,450,469 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,481,180 UART: [rt]cmd =0x44504543, len=96
27,512,390 >>> mbox cmd response data (56 bytes)
27,513,285 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,543,876 UART: [rt]cmd =0x44504543, len=96
27,576,161 >>> mbox cmd response data (56 bytes)
27,576,839 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,607,319 UART: [rt]cmd =0x44504543, len=96
27,639,529 >>> mbox cmd response data (56 bytes)
27,640,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,670,535 UART: [rt]cmd =0x44504543, len=96
27,702,619 >>> mbox cmd response data (56 bytes)
27,703,335 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,733,865 UART: [rt]cmd =0x44504543, len=96
27,766,221 >>> mbox cmd response data (56 bytes)
27,766,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,797,579 UART: [rt]cmd =0x44504543, len=96
27,829,727 >>> mbox cmd response data (56 bytes)
27,830,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,860,968 UART: [rt]cmd =0x44504543, len=96
27,892,860 >>> mbox cmd response data (56 bytes)
27,893,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,924,376 UART: [rt]cmd =0x44504543, len=96
27,956,702 >>> mbox cmd response data (56 bytes)
27,957,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,988,189 UART: [rt]cmd =0x44504543, len=96
28,021,254 >>> mbox cmd response data (56 bytes)
28,021,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,052,459 UART: [rt]cmd =0x44504543, len=96
28,084,347 >>> mbox cmd response data (56 bytes)
28,085,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,115,548 UART: [rt]cmd =0x44504543, len=96
28,147,727 >>> mbox cmd response data (56 bytes)
28,148,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,179,014 UART: [rt]cmd =0x44504543, len=96
28,212,094 >>> mbox cmd response data (56 bytes)
28,212,789 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,243,166 UART: [rt]cmd =0x44504543, len=96
28,274,731 >>> mbox cmd response data (56 bytes)
28,275,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,305,949 UART: [rt]cmd =0x44504543, len=96
28,312,896 >>> mbox cmd response: failed
28,313,314 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,343,943 UART: [rt]cmd =0x44504543, len=96
28,376,507 >>> mbox cmd response data (56 bytes)
28,377,193 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,407,571 UART: [rt]cmd =0x44504543, len=96
28,414,547 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.81s
Truncated 307156 bytes from beginning
d response data (56 bytes)
27,837,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,868,132 UART: [rt]cmd =0x44504543, len=96
27,900,483 >>> mbox cmd response data (56 bytes)
27,901,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,931,917 UART: [rt]cmd =0x44504543, len=96
27,964,723 >>> mbox cmd response data (56 bytes)
27,965,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,996,085 UART: [rt]cmd =0x44504543, len=96
28,028,115 >>> mbox cmd response data (56 bytes)
28,028,845 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,059,267 UART: [rt]cmd =0x44504543, len=96
28,091,348 >>> mbox cmd response data (56 bytes)
28,092,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,122,518 UART: [rt]cmd =0x44504543, len=96
28,155,434 >>> mbox cmd response data (56 bytes)
28,156,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,186,490 UART: [rt]cmd =0x44504543, len=96
28,193,472 >>> mbox cmd response: failed
28,193,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,224,426 UART: [rt]cmd =0x44504543, len=96
28,256,658 >>> mbox cmd response data (56 bytes)
28,257,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,287,775 UART: [rt]cmd =0x44504543, len=96
28,320,174 >>> mbox cmd response data (56 bytes)
28,320,856 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,351,280 UART: [rt]cmd =0x44504543, len=96
28,357,987 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
192,419 UART:
192,805 UART: Running Caliptra ROM ...
193,902 UART:
603,639 UART: [state] CFI Enabled
618,741 UART: [state] LifecycleState = Unprovisioned
621,148 UART: [state] DebugLocked = No
623,751 UART: [state] WD Timer not started. Device not locked for debugging
627,592 UART: [kat] SHA2-256
817,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,225 UART: [kat] ++
828,753 UART: [kat] sha1
840,522 UART: [kat] SHA2-256
843,536 UART: [kat] SHA2-384
849,533 UART: [kat] SHA2-512-ACC
852,125 UART: [kat] ECC-384
3,293,952 UART: [kat] HMAC-384Kdf
3,307,606 UART: [kat] LMS
3,839,413 UART: [kat] --
3,845,040 UART: [cold-reset] ++
3,846,339 UART: [fht] FHT @ 0x50003400
3,858,252 UART: [idev] ++
3,859,086 UART: [idev] CDI.KEYID = 6
3,860,014 UART: [idev] SUBJECT.KEYID = 7
3,861,134 UART: [idev] UDS.KEYID = 0
3,862,063 ready_for_fw is high
3,862,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,957 UART: [idev] Erasing UDS.KEYID = 0
6,339,026 UART: [idev] Sha1 KeyId Algorithm
6,360,424 UART: [idev] --
6,364,414 UART: [ldev] ++
6,365,104 UART: [ldev] CDI.KEYID = 6
6,366,223 UART: [ldev] SUBJECT.KEYID = 5
6,367,376 UART: [ldev] AUTHORITY.KEYID = 7
6,368,619 UART: [ldev] FE.KEYID = 1
6,378,843 UART: [ldev] Erasing FE.KEYID = 1
8,853,357 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,616 UART: [ldev] --
10,644,385 UART: [fwproc] Wait for Commands...
10,647,467 UART: [fwproc] Recv command 0x46574c44
10,649,782 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,003 >>> mbox cmd response: success
14,915,531 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
14,919,305 UART: [afmc] ++
14,920,019 UART: [afmc] CDI.KEYID = 6
14,921,215 UART: [afmc] SUBJECT.KEYID = 7
14,922,665 UART: [afmc] AUTHORITY.KEYID = 5
17,424,777 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,209 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,246 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,342 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,219,042 UART: [afmc] --
19,221,994 UART: [cold-reset] --
19,227,980 UART: [state] Locking Datavault
19,232,864 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,065 UART: [state] Locking ICCM
19,236,358 UART: [exit] Launching FMC @ 0x40000130
19,245,007 UART:
19,245,259 UART: Running Caliptra FMC ...
19,246,366 UART:
19,246,528 UART: [state] CFI Enabled
19,254,797 UART: [fht] FMC Alias Private Key: 7
21,021,293 UART: [art] Extend RT PCRs Done
21,022,527 UART: [art] Lock RT PCRs Done
21,024,229 UART: [art] Populate DV Done
21,029,489 UART: [fht] FMC Alias Private Key: 7
21,031,201 UART: [art] Derive CDI
21,032,024 UART: [art] Store in slot 0x4
21,074,578 UART: [art] Derive Key Pair
21,075,620 UART: [art] Store priv key in slot 0x5
23,503,055 UART: [art] Derive Key Pair - Done
23,516,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,030 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,566 UART: [art] PUB.X = 5939DA3F28BA6185AB65C33B7132246C68EDD1500218A0AC97755DA5B6E68C218CA6DB6CE06849E69ECB9B6EEB00ADCA
25,231,831 UART: [art] PUB.Y = 14A1F4118CCE270FAE17D79417960273C2BB9567CFAA5AD6174EFB882E7E4B158F38BC33579C4E21320FC71BC6C7F53F
25,239,091 UART: [art] SIG.R = CA05380EC2369A0E3BD149236F20B74EAEA9F49C2A9271231E3F78DA9889A3084F4FA7857C2970F2365BF3FE59497A98
25,246,452 UART: [art] SIG.S = 95C5C022BCBCDC06C2C928164F7F3D52570F9821EC18667F3FAD2D3326D9D806C24926614474ECAFBF52999237280C26
26,225,742 UART: Caliptra RT
26,226,454 UART: [state] CFI Enabled
26,358,468 UART: [rt] RT listening for mailbox commands...
26,389,752 UART: [rt]cmd =0x52435458, len=8
26,391,823 >>> mbox cmd response data (16 bytes)
26,392,360 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,422,959 UART: [rt]cmd =0x44504543, len=96
26,454,582 >>> mbox cmd response data (56 bytes)
26,455,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,485,745 UART: [rt]cmd =0x44504543, len=96
26,518,262 >>> mbox cmd response data (56 bytes)
26,518,993 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,549,602 UART: [rt]cmd =0x44504543, len=96
26,581,363 >>> mbox cmd response data (56 bytes)
26,582,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,612,674 UART: [rt]cmd =0x44504543, len=96
26,644,580 >>> mbox cmd response data (56 bytes)
26,645,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,676,006 UART: [rt]cmd =0x44504543, len=96
26,707,741 >>> mbox cmd response data (56 bytes)
26,708,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,739,195 UART: [rt]cmd =0x44504543, len=96
26,771,085 >>> mbox cmd response data (56 bytes)
26,771,778 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,802,470 UART: [rt]cmd =0x44504543, len=96
26,833,898 >>> mbox cmd response data (56 bytes)
26,834,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,865,148 UART: [rt]cmd =0x44504543, len=96
26,897,076 >>> mbox cmd response data (56 bytes)
26,897,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,928,359 UART: [rt]cmd =0x44504543, len=96
26,960,452 >>> mbox cmd response data (56 bytes)
26,961,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,991,469 UART: [rt]cmd =0x44504543, len=96
27,023,082 >>> mbox cmd response data (56 bytes)
27,023,781 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,054,478 UART: [rt]cmd =0x44504543, len=96
27,085,210 >>> mbox cmd response data (56 bytes)
27,085,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,116,740 UART: [rt]cmd =0x44504543, len=96
27,148,442 >>> mbox cmd response data (56 bytes)
27,149,165 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,179,802 UART: [rt]cmd =0x44504543, len=96
27,212,464 >>> mbox cmd response data (56 bytes)
27,213,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,243,915 UART: [rt]cmd =0x44504543, len=96
27,276,126 >>> mbox cmd response data (56 bytes)
27,276,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,307,356 UART: [rt]cmd =0x44504543, len=96
27,339,509 >>> mbox cmd response data (56 bytes)
27,340,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,370,680 UART: [rt]cmd =0x44504543, len=96
27,403,034 >>> mbox cmd response data (56 bytes)
27,403,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,434,380 UART: [rt]cmd =0x44504543, len=96
27,466,516 >>> mbox cmd response data (56 bytes)
27,467,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,497,981 UART: [rt]cmd =0x44504543, len=96
27,530,437 >>> mbox cmd response data (56 bytes)
27,531,113 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,561,889 UART: [rt]cmd =0x44504543, len=96
27,595,020 >>> mbox cmd response data (56 bytes)
27,595,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,626,194 UART: [rt]cmd =0x44504543, len=96
27,658,617 >>> mbox cmd response data (56 bytes)
27,659,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,689,777 UART: [rt]cmd =0x44504543, len=96
27,722,173 >>> mbox cmd response data (56 bytes)
27,722,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,753,363 UART: [rt]cmd =0x44504543, len=96
27,785,534 >>> mbox cmd response data (56 bytes)
27,786,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,816,807 UART: [rt]cmd =0x44504543, len=96
27,848,506 >>> mbox cmd response data (56 bytes)
27,849,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,879,673 UART: [rt]cmd =0x44504543, len=96
27,912,180 >>> mbox cmd response data (56 bytes)
27,912,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,943,246 UART: [rt]cmd =0x44504543, len=96
27,975,405 >>> mbox cmd response data (56 bytes)
27,976,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,006,677 UART: [rt]cmd =0x44504543, len=96
28,038,868 >>> mbox cmd response data (56 bytes)
28,039,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,070,177 UART: [rt]cmd =0x44504543, len=96
28,102,479 >>> mbox cmd response data (56 bytes)
28,103,202 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,133,732 UART: [rt]cmd =0x44504543, len=96
28,165,484 >>> mbox cmd response data (56 bytes)
28,166,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,196,913 UART: [rt]cmd =0x44504543, len=96
28,229,558 >>> mbox cmd response data (56 bytes)
28,230,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,261,083 UART: [rt]cmd =0x44504543, len=96
28,267,739 >>> mbox cmd response: failed
28,268,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,298,579 UART: [rt]cmd =0x44504543, len=96
28,330,104 >>> mbox cmd response data (56 bytes)
28,330,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,361,063 UART: [rt]cmd =0x44504543, len=96
28,368,051 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.74s
Truncated 208126 bytes from beginning
857 UART: [rt]cmd =0x44504543, len=96
26,621,735 >>> mbox cmd response data (56 bytes)
26,622,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,653,041 UART: [rt]cmd =0x44504543, len=96
26,684,920 >>> mbox cmd response data (56 bytes)
26,685,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,716,262 UART: [rt]cmd =0x44504543, len=96
26,747,533 >>> mbox cmd response data (56 bytes)
26,748,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,778,635 UART: [rt]cmd =0x44504543, len=96
26,810,226 >>> mbox cmd response data (56 bytes)
26,810,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,841,485 UART: [rt]cmd =0x44504543, len=96
26,873,687 >>> mbox cmd response data (56 bytes)
26,874,368 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,904,963 UART: [rt]cmd =0x44504543, len=96
26,937,070 >>> mbox cmd response data (56 bytes)
26,937,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,968,472 UART: [rt]cmd =0x44504543, len=96
27,000,363 >>> mbox cmd response data (56 bytes)
27,001,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,031,713 UART: [rt]cmd =0x44504543, len=96
27,062,828 >>> mbox cmd response data (56 bytes)
27,063,552 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,094,086 UART: [rt]cmd =0x44504543, len=96
27,126,012 >>> mbox cmd response data (56 bytes)
27,126,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,157,216 UART: [rt]cmd =0x44504543, len=96
27,189,563 >>> mbox cmd response data (56 bytes)
27,190,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,220,533 UART: [rt]cmd =0x44504543, len=96
27,252,154 >>> mbox cmd response data (56 bytes)
27,252,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,283,375 UART: [rt]cmd =0x44504543, len=96
27,314,427 >>> mbox cmd response data (56 bytes)
27,315,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,345,958 UART: [rt]cmd =0x44504543, len=96
27,378,357 >>> mbox cmd response data (56 bytes)
27,379,083 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,409,776 UART: [rt]cmd =0x44504543, len=96
27,442,012 >>> mbox cmd response data (56 bytes)
27,442,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,473,179 UART: [rt]cmd =0x44504543, len=96
27,505,724 >>> mbox cmd response data (56 bytes)
27,506,419 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,537,144 UART: [rt]cmd =0x44504543, len=96
27,569,151 >>> mbox cmd response data (56 bytes)
27,569,847 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,600,430 UART: [rt]cmd =0x44504543, len=96
27,632,355 >>> mbox cmd response data (56 bytes)
27,633,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,663,671 UART: [rt]cmd =0x44504543, len=96
27,695,651 >>> mbox cmd response data (56 bytes)
27,696,377 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,727,072 UART: [rt]cmd =0x44504543, len=96
27,759,692 >>> mbox cmd response data (56 bytes)
27,760,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,790,858 UART: [rt]cmd =0x44504543, len=96
27,823,613 >>> mbox cmd response data (56 bytes)
27,824,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,855,012 UART: [rt]cmd =0x44504543, len=96
27,887,410 >>> mbox cmd response data (56 bytes)
27,888,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,918,684 UART: [rt]cmd =0x44504543, len=96
27,951,418 >>> mbox cmd response data (56 bytes)
27,952,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,982,719 UART: [rt]cmd =0x44504543, len=96
28,015,122 >>> mbox cmd response data (56 bytes)
28,015,846 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,046,489 UART: [rt]cmd =0x44504543, len=96
28,078,894 >>> mbox cmd response data (56 bytes)
28,079,580 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,110,131 UART: [rt]cmd =0x44504543, len=96
28,142,458 >>> mbox cmd response data (56 bytes)
28,143,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,173,748 UART: [rt]cmd =0x44504543, len=96
28,206,173 >>> mbox cmd response data (56 bytes)
28,206,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,237,357 UART: [rt]cmd =0x44504543, len=96
28,244,196 >>> mbox cmd response: failed
28,244,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,275,097 UART: [rt]cmd =0x44504543, len=96
28,307,689 >>> mbox cmd response data (56 bytes)
28,308,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,338,760 UART: [rt]cmd =0x44504543, len=96
28,371,466 >>> mbox cmd response data (56 bytes)
28,372,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,402,851 UART: [rt]cmd =0x44504543, len=96
28,409,704 >>> mbox cmd response: failed
PL0 Limit 31
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,752,542 ready_for_fw is high
3,752,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,029,173 >>> mbox cmd response: success
15,029,763 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
19,282,952 UART:
19,283,334 UART: Running Caliptra FMC ...
19,284,474 UART:
19,284,631 UART: [state] CFI Enabled
19,292,474 UART: [fht] FMC Alias Private Key: 7
21,058,520 UART: [art] Extend RT PCRs Done
21,059,730 UART: [art] Lock RT PCRs Done
21,061,377 UART: [art] Populate DV Done
21,067,179 UART: [fht] FMC Alias Private Key: 7
21,068,568 UART: [art] Derive CDI
21,069,323 UART: [art] Store in slot 0x4
21,112,090 UART: [art] Derive Key Pair
21,113,106 UART: [art] Store priv key in slot 0x5
23,540,218 UART: [art] Derive Key Pair - Done
23,553,210 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,260,053 UART: [art] Erasing AUTHORITY.KEYID = 7
25,261,557 UART: [art] PUB.X = 90E0BF5E875077DEA2242C52447D28D6C1F3471D69D92730FE57811D90F57874310A9FFA1F15A0FB91A535E66079D3F9
25,268,826 UART: [art] PUB.Y = 15D6CE382C3988536328BF2439A6353C57A2D9A66FA2A1CA3D52E75B3ED589F0FD001A56C9DE7F1395E24A580A008D26
25,276,006 UART: [art] SIG.R = 3A61C7B79EAD95C01CD2399E92BC2E3BC7795733D58B18CFBCFE5D2745D0518E531CCBFA14F53B535FA41E94A25AF131
25,283,431 UART: [art] SIG.S = 740EFE69ECD4CD287AE997A164BA858902264D986227E851B60D1767427DED290D774ACAC2925D79D2DAE9185396C17E
26,262,268 UART: Caliptra RT
26,262,964 UART: [state] CFI Enabled
26,396,256 UART: [rt] RT listening for mailbox commands...
26,427,626 UART: [rt]cmd =0x52435458, len=8
26,429,944 >>> mbox cmd response data (16 bytes)
26,430,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,460,948 UART: [rt]cmd =0x44504543, len=96
26,492,871 >>> mbox cmd response data (56 bytes)
26,493,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,415 UART: [rt]cmd =0x44504543, len=96
26,556,304 >>> mbox cmd response data (56 bytes)
26,557,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,587,555 UART: [rt]cmd =0x44504543, len=96
26,618,907 >>> mbox cmd response data (56 bytes)
26,619,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,650,188 UART: [rt]cmd =0x44504543, len=96
26,682,177 >>> mbox cmd response data (56 bytes)
26,682,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,713,556 UART: [rt]cmd =0x44504543, len=96
26,746,028 >>> mbox cmd response data (56 bytes)
26,746,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,777,627 UART: [rt]cmd =0x44504543, len=96
26,808,952 >>> mbox cmd response data (56 bytes)
26,809,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,840,145 UART: [rt]cmd =0x44504543, len=96
26,872,355 >>> mbox cmd response data (56 bytes)
26,873,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,903,638 UART: [rt]cmd =0x44504543, len=96
26,935,986 >>> mbox cmd response data (56 bytes)
26,936,713 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,967,245 UART: [rt]cmd =0x44504543, len=96
26,998,405 >>> mbox cmd response data (56 bytes)
26,999,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,029,658 UART: [rt]cmd =0x44504543, len=96
27,061,741 >>> mbox cmd response data (56 bytes)
27,062,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,093,150 UART: [rt]cmd =0x44504543, len=96
27,124,715 >>> mbox cmd response data (56 bytes)
27,125,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,155,992 UART: [rt]cmd =0x44504543, len=96
27,188,086 >>> mbox cmd response data (56 bytes)
27,188,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,219,304 UART: [rt]cmd =0x44504543, len=96
27,251,430 >>> mbox cmd response data (56 bytes)
27,252,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,282,941 UART: [rt]cmd =0x44504543, len=96
27,316,231 >>> mbox cmd response data (56 bytes)
27,316,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,347,670 UART: [rt]cmd =0x44504543, len=96
27,379,799 >>> mbox cmd response data (56 bytes)
27,380,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,410,940 UART: [rt]cmd =0x44504543, len=96
27,443,207 >>> mbox cmd response data (56 bytes)
27,443,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,474,442 UART: [rt]cmd =0x44504543, len=96
27,506,548 >>> mbox cmd response data (56 bytes)
27,507,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,537,813 UART: [rt]cmd =0x44504543, len=96
27,569,672 >>> mbox cmd response data (56 bytes)
27,570,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,600,816 UART: [rt]cmd =0x44504543, len=96
27,633,053 >>> mbox cmd response data (56 bytes)
27,633,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,664,406 UART: [rt]cmd =0x44504543, len=96
27,695,831 >>> mbox cmd response data (56 bytes)
27,696,504 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,727,041 UART: [rt]cmd =0x44504543, len=96
27,759,112 >>> mbox cmd response data (56 bytes)
27,759,801 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,790,556 UART: [rt]cmd =0x44504543, len=96
27,822,176 >>> mbox cmd response data (56 bytes)
27,822,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,853,505 UART: [rt]cmd =0x44504543, len=96
27,885,957 >>> mbox cmd response data (56 bytes)
27,886,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,917,260 UART: [rt]cmd =0x44504543, len=96
27,949,882 >>> mbox cmd response data (56 bytes)
27,950,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,981,079 UART: [rt]cmd =0x44504543, len=96
28,013,966 >>> mbox cmd response data (56 bytes)
28,014,652 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,045,303 UART: [rt]cmd =0x44504543, len=96
28,076,381 >>> mbox cmd response data (56 bytes)
28,077,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,107,648 UART: [rt]cmd =0x44504543, len=96
28,140,024 >>> mbox cmd response data (56 bytes)
28,140,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,171,299 UART: [rt]cmd =0x44504543, len=96
28,203,295 >>> mbox cmd response data (56 bytes)
28,204,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,234,596 UART: [rt]cmd =0x44504543, len=96
28,266,722 >>> mbox cmd response data (56 bytes)
28,267,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,298,301 UART: [rt]cmd =0x44504543, len=96
28,305,563 >>> mbox cmd response: failed
28,305,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,336,571 UART: [rt]cmd =0x44504543, len=96
28,369,067 >>> mbox cmd response data (56 bytes)
28,369,792 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
28,400,449 UART: [rt]cmd =0x44504543, len=96
28,407,066 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 45.83s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Unprovisioned
85,947 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,469 UART: [kat] SHA2-256
892,407 UART: [kat] SHA2-384
895,080 UART: [kat] SHA2-512-ACC
896,981 UART: [kat] ECC-384
902,634 UART: [kat] HMAC-384Kdf
907,228 UART: [kat] LMS
1,475,424 UART: [kat] --
1,476,111 UART: [cold-reset] ++
1,476,555 UART: [fht] Storing FHT @ 0x50003400
1,479,354 UART: [idev] ++
1,479,522 UART: [idev] CDI.KEYID = 6
1,479,882 UART: [idev] SUBJECT.KEYID = 7
1,480,306 UART: [idev] UDS.KEYID = 0
1,480,651 ready_for_fw is high
1,480,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,522 UART: [idev] Erasing UDS.KEYID = 0
1,504,976 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,760 UART: [idev] --
1,514,943 UART: [ldev] ++
1,515,111 UART: [ldev] CDI.KEYID = 6
1,515,474 UART: [ldev] SUBJECT.KEYID = 5
1,515,900 UART: [ldev] AUTHORITY.KEYID = 7
1,516,363 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,642 UART: [ldev] --
1,585,917 UART: [fwproc] Waiting for Commands...
1,586,634 UART: [fwproc] Received command 0x46574c44
1,587,425 UART: [fwproc] Received Image of size 118548 bytes
2,932,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,913 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,564 >>> mbox cmd response: success
3,131,564 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,132,688 UART: [afmc] ++
3,132,856 UART: [afmc] CDI.KEYID = 6
3,133,218 UART: [afmc] SUBJECT.KEYID = 7
3,133,643 UART: [afmc] AUTHORITY.KEYID = 5
3,168,494 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,770 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,550 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,142 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,825 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,557 UART: [afmc] --
3,211,639 UART: [cold-reset] --
3,212,645 UART: [state] Locking Datavault
3,213,908 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,512 UART: [state] Locking ICCM
3,215,102 UART: [exit] Launching FMC @ 0x40000130
3,220,432 UART:
3,220,448 UART: Running Caliptra FMC ...
3,220,856 UART:
3,220,910 UART: [state] CFI Enabled
3,231,154 UART: [fht] FMC Alias Private Key: 7
3,349,884 UART: [art] Extend RT PCRs Done
3,350,312 UART: [art] Lock RT PCRs Done
3,352,194 UART: [art] Populate DV Done
3,360,549 UART: [fht] FMC Alias Private Key: 7
3,361,573 UART: [art] Derive CDI
3,361,853 UART: [art] Store in slot 0x4
3,447,775 UART: [art] Derive Key Pair
3,448,135 UART: [art] Store priv key in slot 0x5
3,460,908 UART: [art] Derive Key Pair - Done
3,475,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,496 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,261 UART: [art] PUB.X = 55DEE7D595C6AF10880F163F6AB0420FFD5461696439EB8F98E99A450A04B6D24EC2327252638E158E532C483180F33A
3,499,015 UART: [art] PUB.Y = 36542279E14A8BE1253E49C7CA895DB82ECA56BBDD7E3A4C64A4A54C7F435DA226AD266DC6CAA666C5FD641D0DB95F09
3,505,977 UART: [art] SIG.R = AB551DB5CA0EDEF7351E9797C8394B86C91E513B3EAE052423A99213AF78CD2AD16ABF1EC63969A8DBEAA1F00AB6D4F9
3,512,760 UART: [art] SIG.S = 6F076785022A7B23109BBD9B70D24737AE736B4B9F61473F52D055F3F4CC5945BCB1C3776692A9BAAF66593F18E505ED
3,536,579 UART: Caliptra RT
3,536,830 UART: [state] CFI Enabled
3,656,972 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,404 UART: [rt]cmd =0x52435458, len=8
3,689,012 >>> mbox cmd response data (16 bytes)
3,689,013 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,014 UART: [rt]cmd =0x44504543, len=96
3,751,520 >>> mbox cmd response data (56 bytes)
3,751,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,402 UART: [rt]cmd =0x44504543, len=96
3,814,300 >>> mbox cmd response data (56 bytes)
3,814,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,362 UART: [rt]cmd =0x44504543, len=96
3,876,315 >>> mbox cmd response data (56 bytes)
3,876,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,906,203 UART: [rt]cmd =0x44504543, len=96
3,939,363 >>> mbox cmd response data (56 bytes)
3,939,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,295 UART: [rt]cmd =0x44504543, len=96
4,002,212 >>> mbox cmd response data (56 bytes)
4,002,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,240 UART: [rt]cmd =0x44504543, len=96
4,065,240 >>> mbox cmd response data (56 bytes)
4,065,241 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,095,216 UART: [rt]cmd =0x44504543, len=96
4,128,387 >>> mbox cmd response data (56 bytes)
4,128,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,158,263 UART: [rt]cmd =0x44504543, len=96
4,190,361 >>> mbox cmd response data (56 bytes)
4,190,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,220,239 UART: [rt]cmd =0x44504543, len=96
4,253,390 >>> mbox cmd response data (56 bytes)
4,253,391 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,283,308 UART: [rt]cmd =0x44504543, len=96
4,317,106 >>> mbox cmd response data (56 bytes)
4,317,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,346,994 UART: [rt]cmd =0x44504543, len=96
4,380,093 >>> mbox cmd response data (56 bytes)
4,380,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,410,075 UART: [rt]cmd =0x44504543, len=96
4,443,305 >>> mbox cmd response data (56 bytes)
4,443,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,473,325 UART: [rt]cmd =0x44504543, len=96
4,506,318 >>> mbox cmd response data (56 bytes)
4,506,319 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,536,438 UART: [rt]cmd =0x44504543, len=96
4,569,886 >>> mbox cmd response data (56 bytes)
4,569,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,599,720 UART: [rt]cmd =0x44504543, len=96
4,632,685 >>> mbox cmd response data (56 bytes)
4,632,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,662,599 UART: [rt]cmd =0x44504543, len=96
4,695,687 >>> mbox cmd response data (56 bytes)
4,695,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,725,759 UART: [rt]cmd =0x44504543, len=96
4,758,522 >>> mbox cmd response data (56 bytes)
4,758,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,788,612 UART: [rt]cmd =0x44504543, len=96
4,821,940 >>> mbox cmd response data (56 bytes)
4,821,941 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,851,936 UART: [rt]cmd =0x44504543, len=96
4,885,827 >>> mbox cmd response data (56 bytes)
4,885,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,915,841 UART: [rt]cmd =0x44504543, len=96
4,949,349 >>> mbox cmd response data (56 bytes)
4,949,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,979,205 UART: [rt]cmd =0x44504543, len=96
5,012,400 >>> mbox cmd response data (56 bytes)
5,012,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,042,410 UART: [rt]cmd =0x44504543, len=96
5,076,330 >>> mbox cmd response data (56 bytes)
5,076,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,106,166 UART: [rt]cmd =0x44504543, len=96
5,139,537 >>> mbox cmd response data (56 bytes)
5,139,538 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,169,549 UART: [rt]cmd =0x44504543, len=96
5,202,441 >>> mbox cmd response data (56 bytes)
5,202,442 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,232,289 UART: [rt]cmd =0x44504543, len=96
5,265,752 >>> mbox cmd response data (56 bytes)
5,265,753 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,295,654 UART: [rt]cmd =0x44504543, len=96
5,328,686 >>> mbox cmd response data (56 bytes)
5,328,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,358,548 UART: [rt]cmd =0x44504543, len=96
5,391,919 >>> mbox cmd response data (56 bytes)
5,391,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,422,011 UART: [rt]cmd =0x44504543, len=96
5,455,283 >>> mbox cmd response data (56 bytes)
5,455,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,485,211 UART: [rt]cmd =0x44504543, len=96
5,519,032 >>> mbox cmd response data (56 bytes)
5,519,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,549,158 UART: [rt]cmd =0x44504543, len=96
5,556,701 >>> mbox cmd response: failed
5,556,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,586,517 UART: [rt]cmd =0x44504543, len=96
5,619,514 >>> mbox cmd response data (56 bytes)
5,619,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,649,354 UART: [rt]cmd =0x44504543, len=96
5,656,975 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.61s
Truncated 260626 bytes from beginning
4,645,062 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,674,939 UART: [rt]cmd =0x44504543, len=96
4,708,648 >>> mbox cmd response data (56 bytes)
4,708,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,738,750 UART: [rt]cmd =0x44504543, len=96
4,772,214 >>> mbox cmd response data (56 bytes)
4,772,215 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,802,116 UART: [rt]cmd =0x44504543, len=96
4,835,073 >>> mbox cmd response data (56 bytes)
4,835,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,864,727 UART: [rt]cmd =0x44504543, len=96
4,897,965 >>> mbox cmd response data (56 bytes)
4,897,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,927,865 UART: [rt]cmd =0x44504543, len=96
4,960,984 >>> mbox cmd response data (56 bytes)
4,960,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,990,894 UART: [rt]cmd =0x44504543, len=96
5,023,840 >>> mbox cmd response data (56 bytes)
5,023,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,054,068 UART: [rt]cmd =0x44504543, len=96
5,086,619 >>> mbox cmd response data (56 bytes)
5,086,620 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,116,377 UART: [rt]cmd =0x44504543, len=96
5,149,087 >>> mbox cmd response data (56 bytes)
5,149,088 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,179,099 UART: [rt]cmd =0x44504543, len=96
5,212,816 >>> mbox cmd response data (56 bytes)
5,212,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,242,730 UART: [rt]cmd =0x44504543, len=96
5,276,068 >>> mbox cmd response data (56 bytes)
5,276,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,306,030 UART: [rt]cmd =0x44504543, len=96
5,313,185 >>> mbox cmd response: failed
5,313,185 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,343,217 UART: [rt]cmd =0x44504543, len=96
5,376,188 >>> mbox cmd response data (56 bytes)
5,376,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,406,138 UART: [rt]cmd =0x44504543, len=96
5,439,509 >>> mbox cmd response data (56 bytes)
5,439,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,469,489 UART: [rt]cmd =0x44504543, len=96
5,476,806 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,377 ready_for_fw is high
1,362,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,710 >>> mbox cmd response: success
2,978,710 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,040,055 UART:
3,040,071 UART: Running Caliptra FMC ...
3,040,479 UART:
3,040,533 UART: [state] CFI Enabled
3,051,303 UART: [fht] FMC Alias Private Key: 7
3,170,403 UART: [art] Extend RT PCRs Done
3,170,831 UART: [art] Lock RT PCRs Done
3,172,363 UART: [art] Populate DV Done
3,180,418 UART: [fht] FMC Alias Private Key: 7
3,181,428 UART: [art] Derive CDI
3,181,708 UART: [art] Store in slot 0x4
3,267,688 UART: [art] Derive Key Pair
3,268,048 UART: [art] Store priv key in slot 0x5
3,280,911 UART: [art] Derive Key Pair - Done
3,295,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,887 UART: [art] PUB.X = B6B30FBBA3CCA5C71BEDA29B022D165B5D09468641B5AAD14D1287E6F2A14DDE3CA8B2E3D2D778261500E9354249C10C
3,318,637 UART: [art] PUB.Y = 79A3F61F84D8F3A6982D97697ACCC7A7E187184EE19DE7071A99DD3B8984DBED376EB39C728780E38535172793D6C4D9
3,325,586 UART: [art] SIG.R = 1023D77BC1311A07196EACD9406DCBD44080F2B869E8C4FC78E2B2C6428FFDB108874D8E5C6CB699F60C1FCB9B7211DA
3,332,361 UART: [art] SIG.S = 3D709F3BC63657D214FBEE1ABC4C1F6B66F13DA2E293DFC946510FE9AF7AF68EFCC70FFE94818BE41657E7B57C2723AB
3,356,183 UART: Caliptra RT
3,356,434 UART: [state] CFI Enabled
3,476,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,229 UART: [rt]cmd =0x52435458, len=8
3,508,841 >>> mbox cmd response data (16 bytes)
3,508,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,763 UART: [rt]cmd =0x44504543, len=96
3,570,637 >>> mbox cmd response data (56 bytes)
3,570,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,649 UART: [rt]cmd =0x44504543, len=96
3,633,649 >>> mbox cmd response data (56 bytes)
3,633,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,631 UART: [rt]cmd =0x44504543, len=96
3,696,250 >>> mbox cmd response data (56 bytes)
3,696,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,972 UART: [rt]cmd =0x44504543, len=96
3,759,150 >>> mbox cmd response data (56 bytes)
3,759,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,150 UART: [rt]cmd =0x44504543, len=96
3,822,499 >>> mbox cmd response data (56 bytes)
3,822,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,593 UART: [rt]cmd =0x44504543, len=96
3,885,611 >>> mbox cmd response data (56 bytes)
3,885,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,617 UART: [rt]cmd =0x44504543, len=96
3,948,088 >>> mbox cmd response data (56 bytes)
3,948,089 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,962 UART: [rt]cmd =0x44504543, len=96
4,010,852 >>> mbox cmd response data (56 bytes)
4,010,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,650 UART: [rt]cmd =0x44504543, len=96
4,073,037 >>> mbox cmd response data (56 bytes)
4,073,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,103,123 UART: [rt]cmd =0x44504543, len=96
4,135,513 >>> mbox cmd response data (56 bytes)
4,135,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,165,591 UART: [rt]cmd =0x44504543, len=96
4,198,854 >>> mbox cmd response data (56 bytes)
4,198,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,228,814 UART: [rt]cmd =0x44504543, len=96
4,261,150 >>> mbox cmd response data (56 bytes)
4,261,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,291,094 UART: [rt]cmd =0x44504543, len=96
4,323,725 >>> mbox cmd response data (56 bytes)
4,323,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,353,671 UART: [rt]cmd =0x44504543, len=96
4,386,529 >>> mbox cmd response data (56 bytes)
4,386,530 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,416,385 UART: [rt]cmd =0x44504543, len=96
4,449,262 >>> mbox cmd response data (56 bytes)
4,449,263 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,479,246 UART: [rt]cmd =0x44504543, len=96
4,512,560 >>> mbox cmd response data (56 bytes)
4,512,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,542,466 UART: [rt]cmd =0x44504543, len=96
4,575,509 >>> mbox cmd response data (56 bytes)
4,575,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,605,451 UART: [rt]cmd =0x44504543, len=96
4,639,051 >>> mbox cmd response data (56 bytes)
4,639,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,668,989 UART: [rt]cmd =0x44504543, len=96
4,702,136 >>> mbox cmd response data (56 bytes)
4,702,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,732,228 UART: [rt]cmd =0x44504543, len=96
4,765,200 >>> mbox cmd response data (56 bytes)
4,765,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,795,206 UART: [rt]cmd =0x44504543, len=96
4,828,421 >>> mbox cmd response data (56 bytes)
4,828,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,858,389 UART: [rt]cmd =0x44504543, len=96
4,891,741 >>> mbox cmd response data (56 bytes)
4,891,742 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,921,753 UART: [rt]cmd =0x44504543, len=96
4,953,814 >>> mbox cmd response data (56 bytes)
4,953,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,983,796 UART: [rt]cmd =0x44504543, len=96
5,016,952 >>> mbox cmd response data (56 bytes)
5,016,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,046,926 UART: [rt]cmd =0x44504543, len=96
5,080,221 >>> mbox cmd response data (56 bytes)
5,080,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,009 UART: [rt]cmd =0x44504543, len=96
5,144,429 >>> mbox cmd response data (56 bytes)
5,144,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,174,527 UART: [rt]cmd =0x44504543, len=96
5,207,804 >>> mbox cmd response data (56 bytes)
5,207,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,944 UART: [rt]cmd =0x44504543, len=96
5,270,810 >>> mbox cmd response data (56 bytes)
5,270,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,300,826 UART: [rt]cmd =0x44504543, len=96
5,334,363 >>> mbox cmd response data (56 bytes)
5,334,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,364,547 UART: [rt]cmd =0x44504543, len=96
5,372,010 >>> mbox cmd response: failed
5,372,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,401,876 UART: [rt]cmd =0x44504543, len=96
5,434,987 >>> mbox cmd response data (56 bytes)
5,434,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,465,041 UART: [rt]cmd =0x44504543, len=96
5,472,498 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.30s
Truncated 361846 bytes from beginning
a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,647 UART: [state] LifecycleState = Unprovisioned
86,302 UART: [state] DebugLocked = No
86,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,474 UART: [kat] SHA2-256
882,405 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,520 UART: [kat] ++
886,672 UART: [kat] sha1
890,810 UART: [kat] SHA2-256
892,748 UART: [kat] SHA2-384
895,541 UART: [kat] SHA2-512-ACC
897,442 UART: [kat] ECC-384
902,833 UART: [kat] HMAC-384Kdf
907,449 UART: [kat] LMS
1,475,645 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,747 UART: [idev] ++
1,479,915 UART: [idev] CDI.KEYID = 6
1,480,275 UART: [idev] SUBJECT.KEYID = 7
1,480,699 UART: [idev] UDS.KEYID = 0
1,481,044 ready_for_fw is high
1,481,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,659 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,373 UART: [idev] --
1,515,324 UART: [ldev] ++
1,515,492 UART: [ldev] CDI.KEYID = 6
1,515,855 UART: [ldev] SUBJECT.KEYID = 5
1,516,281 UART: [ldev] AUTHORITY.KEYID = 7
1,516,744 UART: [ldev] FE.KEYID = 1
1,522,188 UART: [ldev] Erasing FE.KEYID = 1
1,547,561 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,703 UART: [ldev] --
1,587,148 UART: [fwproc] Waiting for Commands...
1,587,975 UART: [fwproc] Received command 0x46574c44
1,588,766 UART: [fwproc] Received Image of size 118548 bytes
2,933,952 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,552 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,770 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,095 >>> mbox cmd response: success
3,134,095 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,135,107 UART: [afmc] ++
3,135,275 UART: [afmc] CDI.KEYID = 6
3,135,637 UART: [afmc] SUBJECT.KEYID = 7
3,136,062 UART: [afmc] AUTHORITY.KEYID = 5
3,171,255 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,403 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,183 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,775 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,458 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,298 UART: [afmc] --
3,214,408 UART: [cold-reset] --
3,215,392 UART: [state] Locking Datavault
3,216,399 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,003 UART: [state] Locking ICCM
3,217,563 UART: [exit] Launching FMC @ 0x40000130
3,222,893 UART:
3,222,909 UART: Running Caliptra FMC ...
3,223,317 UART:
3,223,460 UART: [state] CFI Enabled
3,234,150 UART: [fht] FMC Alias Private Key: 7
3,353,114 UART: [art] Extend RT PCRs Done
3,353,542 UART: [art] Lock RT PCRs Done
3,355,092 UART: [art] Populate DV Done
3,363,205 UART: [fht] FMC Alias Private Key: 7
3,364,175 UART: [art] Derive CDI
3,364,455 UART: [art] Store in slot 0x4
3,450,497 UART: [art] Derive Key Pair
3,450,857 UART: [art] Store priv key in slot 0x5
3,464,278 UART: [art] Derive Key Pair - Done
3,479,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,619 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,384 UART: [art] PUB.X = 45B9FFA1F98DB4F9D06DCE5184819213E91238D9D628A2DA7CE335B0CB4FD9429E14B2C1386BB2A8355A392D7C7A170F
3,502,161 UART: [art] PUB.Y = 72C48C3F43BC00B7C061EF9082A128E92D337ADFF598272F7940F9E06681F450F932FA72D17B1565805950230486B28A
3,509,078 UART: [art] SIG.R = 99BCBC9D591C3AE1D0F6A3F5D9E39AFF6E43DAAAF8290BE49B022EF4BA0D971897892B8131B02F2A5D9FB609F5B24531
3,515,854 UART: [art] SIG.S = 71A639612010D881BEC530854DB585AD8978ECD051594E293F9B5B0075DC3A5DD85556D49CE9DA57BE46E4D8A086D482
3,539,742 UART: Caliptra RT
3,540,085 UART: [state] CFI Enabled
3,660,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,789 UART: [rt]cmd =0x52435458, len=8
3,692,451 >>> mbox cmd response data (16 bytes)
3,692,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,219 UART: [rt]cmd =0x44504543, len=96
3,755,433 >>> mbox cmd response data (56 bytes)
3,755,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,785,443 UART: [rt]cmd =0x44504543, len=96
3,817,677 >>> mbox cmd response data (56 bytes)
3,817,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,655 UART: [rt]cmd =0x44504543, len=96
3,880,058 >>> mbox cmd response data (56 bytes)
3,880,059 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,034 UART: [rt]cmd =0x44504543, len=96
3,943,606 >>> mbox cmd response data (56 bytes)
3,943,607 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,973,500 UART: [rt]cmd =0x44504543, len=96
4,005,543 >>> mbox cmd response data (56 bytes)
4,005,544 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,035,359 UART: [rt]cmd =0x44504543, len=96
4,068,739 >>> mbox cmd response data (56 bytes)
4,068,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,098,783 UART: [rt]cmd =0x44504543, len=96
4,131,654 >>> mbox cmd response data (56 bytes)
4,131,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,161,696 UART: [rt]cmd =0x44504543, len=96
4,194,596 >>> mbox cmd response data (56 bytes)
4,194,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,224,292 UART: [rt]cmd =0x44504543, len=96
4,257,469 >>> mbox cmd response data (56 bytes)
4,257,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,287,265 UART: [rt]cmd =0x44504543, len=96
4,320,877 >>> mbox cmd response data (56 bytes)
4,320,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,350,767 UART: [rt]cmd =0x44504543, len=96
4,383,918 >>> mbox cmd response data (56 bytes)
4,383,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,413,796 UART: [rt]cmd =0x44504543, len=96
4,446,904 >>> mbox cmd response data (56 bytes)
4,446,905 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,476,642 UART: [rt]cmd =0x44504543, len=96
4,509,219 >>> mbox cmd response data (56 bytes)
4,509,220 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,539,347 UART: [rt]cmd =0x44504543, len=96
4,572,939 >>> mbox cmd response data (56 bytes)
4,572,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,602,855 UART: [rt]cmd =0x44504543, len=96
4,636,404 >>> mbox cmd response data (56 bytes)
4,636,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,666,416 UART: [rt]cmd =0x44504543, len=96
4,700,004 >>> mbox cmd response data (56 bytes)
4,700,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,729,960 UART: [rt]cmd =0x44504543, len=96
4,763,063 >>> mbox cmd response data (56 bytes)
4,763,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,793,217 UART: [rt]cmd =0x44504543, len=96
4,826,945 >>> mbox cmd response data (56 bytes)
4,826,946 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,856,611 UART: [rt]cmd =0x44504543, len=96
4,889,796 >>> mbox cmd response data (56 bytes)
4,889,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,919,838 UART: [rt]cmd =0x44504543, len=96
4,953,342 >>> mbox cmd response data (56 bytes)
4,953,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,983,072 UART: [rt]cmd =0x44504543, len=96
5,016,515 >>> mbox cmd response data (56 bytes)
5,016,516 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,046,663 UART: [rt]cmd =0x44504543, len=96
5,080,327 >>> mbox cmd response data (56 bytes)
5,080,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,535 UART: [rt]cmd =0x44504543, len=96
5,142,884 >>> mbox cmd response data (56 bytes)
5,142,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,172,630 UART: [rt]cmd =0x44504543, len=96
5,205,934 >>> mbox cmd response data (56 bytes)
5,205,935 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,235,884 UART: [rt]cmd =0x44504543, len=96
5,268,897 >>> mbox cmd response data (56 bytes)
5,268,898 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,298,865 UART: [rt]cmd =0x44504543, len=96
5,332,769 >>> mbox cmd response data (56 bytes)
5,332,770 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,362,975 UART: [rt]cmd =0x44504543, len=96
5,396,160 >>> mbox cmd response data (56 bytes)
5,396,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,426,248 UART: [rt]cmd =0x44504543, len=96
5,459,936 >>> mbox cmd response data (56 bytes)
5,459,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,489,892 UART: [rt]cmd =0x44504543, len=96
5,523,399 >>> mbox cmd response data (56 bytes)
5,523,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,553,485 UART: [rt]cmd =0x44504543, len=96
5,561,154 >>> mbox cmd response: failed
5,561,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,590,980 UART: [rt]cmd =0x44504543, len=96
5,624,853 >>> mbox cmd response data (56 bytes)
5,624,854 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,654,831 UART: [rt]cmd =0x44504543, len=96
5,662,326 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.70s
Truncated 260626 bytes from beginning
4,647,768 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,677,479 UART: [rt]cmd =0x44504543, len=96
4,711,202 >>> mbox cmd response data (56 bytes)
4,711,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,740,894 UART: [rt]cmd =0x44504543, len=96
4,773,462 >>> mbox cmd response data (56 bytes)
4,773,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,803,356 UART: [rt]cmd =0x44504543, len=96
4,835,575 >>> mbox cmd response data (56 bytes)
4,835,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,865,515 UART: [rt]cmd =0x44504543, len=96
4,898,701 >>> mbox cmd response data (56 bytes)
4,898,702 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,928,533 UART: [rt]cmd =0x44504543, len=96
4,961,242 >>> mbox cmd response data (56 bytes)
4,961,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,991,126 UART: [rt]cmd =0x44504543, len=96
5,024,854 >>> mbox cmd response data (56 bytes)
5,024,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,054,702 UART: [rt]cmd =0x44504543, len=96
5,088,035 >>> mbox cmd response data (56 bytes)
5,088,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,951 UART: [rt]cmd =0x44504543, len=96
5,151,597 >>> mbox cmd response data (56 bytes)
5,151,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,181,547 UART: [rt]cmd =0x44504543, len=96
5,214,696 >>> mbox cmd response data (56 bytes)
5,214,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,244,786 UART: [rt]cmd =0x44504543, len=96
5,278,366 >>> mbox cmd response data (56 bytes)
5,278,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,308,266 UART: [rt]cmd =0x44504543, len=96
5,316,103 >>> mbox cmd response: failed
5,316,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,346,033 UART: [rt]cmd =0x44504543, len=96
5,378,918 >>> mbox cmd response data (56 bytes)
5,378,919 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,408,946 UART: [rt]cmd =0x44504543, len=96
5,442,307 >>> mbox cmd response data (56 bytes)
5,442,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,472,331 UART: [rt]cmd =0x44504543, len=96
5,479,786 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 ready_for_fw is high
1,363,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,187 >>> mbox cmd response: success
2,980,187 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
3,041,072 UART:
3,041,088 UART: Running Caliptra FMC ...
3,041,496 UART:
3,041,639 UART: [state] CFI Enabled
3,052,257 UART: [fht] FMC Alias Private Key: 7
3,170,925 UART: [art] Extend RT PCRs Done
3,171,353 UART: [art] Lock RT PCRs Done
3,173,069 UART: [art] Populate DV Done
3,181,186 UART: [fht] FMC Alias Private Key: 7
3,182,126 UART: [art] Derive CDI
3,182,406 UART: [art] Store in slot 0x4
3,267,592 UART: [art] Derive Key Pair
3,267,952 UART: [art] Store priv key in slot 0x5
3,281,155 UART: [art] Derive Key Pair - Done
3,295,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,721 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,486 UART: [art] PUB.X = 687432B2B17A9954F0ED578050FFC4AE74957F09FE0226D0DB18ACF5D8D9565E2EFE1BB5BEBC76656A66CE13BF3EE999
3,319,266 UART: [art] PUB.Y = 563C8E921DD7937DD7371FA084FA65DCBDDBF95CC7F80BA0C6D6439E441C6CA25948B1E11487E52C6E107C99B6CC68A9
3,326,227 UART: [art] SIG.R = 815C36445B9D743310D98DBDF2E9E24A4358A2F21B953D1E4C91E28EE099ACF756EEAD6F685DB4CB0D639A732489FBB3
3,333,006 UART: [art] SIG.S = F228E07E764E515BCE666AC3B99E5A600D5DA07F5D9AAEB29E0183B04E8D6E16C9B8BBFC2FF7F73BB4D30D03864845D7
3,357,042 UART: Caliptra RT
3,357,385 UART: [state] CFI Enabled
3,477,268 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,926 UART: [rt]cmd =0x52435458, len=8
3,509,638 >>> mbox cmd response data (16 bytes)
3,509,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,622 UART: [rt]cmd =0x44504543, len=96
3,572,566 >>> mbox cmd response data (56 bytes)
3,572,567 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,398 UART: [rt]cmd =0x44504543, len=96
3,635,198 >>> mbox cmd response data (56 bytes)
3,635,199 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,220 UART: [rt]cmd =0x44504543, len=96
3,698,387 >>> mbox cmd response data (56 bytes)
3,698,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,343 UART: [rt]cmd =0x44504543, len=96
3,760,871 >>> mbox cmd response data (56 bytes)
3,760,872 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,987 UART: [rt]cmd =0x44504543, len=96
3,823,456 >>> mbox cmd response data (56 bytes)
3,823,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,314 UART: [rt]cmd =0x44504543, len=96
3,885,510 >>> mbox cmd response data (56 bytes)
3,885,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,915,402 UART: [rt]cmd =0x44504543, len=96
3,947,825 >>> mbox cmd response data (56 bytes)
3,947,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,977,751 UART: [rt]cmd =0x44504543, len=96
4,010,431 >>> mbox cmd response data (56 bytes)
4,010,432 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,040,371 UART: [rt]cmd =0x44504543, len=96
4,072,820 >>> mbox cmd response data (56 bytes)
4,072,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,102,838 UART: [rt]cmd =0x44504543, len=96
4,135,040 >>> mbox cmd response data (56 bytes)
4,135,041 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,164,818 UART: [rt]cmd =0x44504543, len=96
4,197,815 >>> mbox cmd response data (56 bytes)
4,197,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,227,965 UART: [rt]cmd =0x44504543, len=96
4,260,965 >>> mbox cmd response data (56 bytes)
4,260,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,291,099 UART: [rt]cmd =0x44504543, len=96
4,323,596 >>> mbox cmd response data (56 bytes)
4,323,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,353,406 UART: [rt]cmd =0x44504543, len=96
4,387,460 >>> mbox cmd response data (56 bytes)
4,387,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,417,574 UART: [rt]cmd =0x44504543, len=96
4,450,711 >>> mbox cmd response data (56 bytes)
4,450,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,480,641 UART: [rt]cmd =0x44504543, len=96
4,514,369 >>> mbox cmd response data (56 bytes)
4,514,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,544,263 UART: [rt]cmd =0x44504543, len=96
4,577,254 >>> mbox cmd response data (56 bytes)
4,577,255 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,607,184 UART: [rt]cmd =0x44504543, len=96
4,641,158 >>> mbox cmd response data (56 bytes)
4,641,159 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,671,232 UART: [rt]cmd =0x44504543, len=96
4,705,325 >>> mbox cmd response data (56 bytes)
4,705,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,735,239 UART: [rt]cmd =0x44504543, len=96
4,768,559 >>> mbox cmd response data (56 bytes)
4,768,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,798,413 UART: [rt]cmd =0x44504543, len=96
4,831,366 >>> mbox cmd response data (56 bytes)
4,831,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,861,250 UART: [rt]cmd =0x44504543, len=96
4,894,528 >>> mbox cmd response data (56 bytes)
4,894,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,924,686 UART: [rt]cmd =0x44504543, len=96
4,957,293 >>> mbox cmd response data (56 bytes)
4,957,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,987,099 UART: [rt]cmd =0x44504543, len=96
5,020,339 >>> mbox cmd response data (56 bytes)
5,020,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,050,323 UART: [rt]cmd =0x44504543, len=96
5,084,264 >>> mbox cmd response data (56 bytes)
5,084,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,114,222 UART: [rt]cmd =0x44504543, len=96
5,147,454 >>> mbox cmd response data (56 bytes)
5,147,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,177,190 UART: [rt]cmd =0x44504543, len=96
5,210,497 >>> mbox cmd response data (56 bytes)
5,210,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,683 UART: [rt]cmd =0x44504543, len=96
5,274,355 >>> mbox cmd response data (56 bytes)
5,274,356 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,304,147 UART: [rt]cmd =0x44504543, len=96
5,337,678 >>> mbox cmd response data (56 bytes)
5,337,679 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,367,698 UART: [rt]cmd =0x44504543, len=96
5,375,029 >>> mbox cmd response: failed
5,375,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,405,153 UART: [rt]cmd =0x44504543, len=96
5,438,330 >>> mbox cmd response data (56 bytes)
5,438,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,468,368 UART: [rt]cmd =0x44504543, len=96
5,475,967 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.35s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,211 UART: [kat] SHA2-512-ACC
906,112 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,545 UART: [kat] LMS
1,168,857 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,220 UART: [fht] FHT @ 0x50003400
1,172,970 UART: [idev] ++
1,173,138 UART: [idev] CDI.KEYID = 6
1,173,499 UART: [idev] SUBJECT.KEYID = 7
1,173,924 UART: [idev] UDS.KEYID = 0
1,174,270 ready_for_fw is high
1,174,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,149 UART: [idev] Erasing UDS.KEYID = 0
1,198,759 UART: [idev] Sha1 KeyId Algorithm
1,207,643 UART: [idev] --
1,208,596 UART: [ldev] ++
1,208,764 UART: [ldev] CDI.KEYID = 6
1,209,128 UART: [ldev] SUBJECT.KEYID = 5
1,209,555 UART: [ldev] AUTHORITY.KEYID = 7
1,210,018 UART: [ldev] FE.KEYID = 1
1,215,376 UART: [ldev] Erasing FE.KEYID = 1
1,241,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,928 UART: [ldev] --
1,281,265 UART: [fwproc] Wait for Commands...
1,281,894 UART: [fwproc] Recv command 0x46574c44
1,282,627 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,931 >>> mbox cmd response: success
2,826,931 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,828,139 UART: [afmc] ++
2,828,307 UART: [afmc] CDI.KEYID = 6
2,828,670 UART: [afmc] SUBJECT.KEYID = 7
2,829,096 UART: [afmc] AUTHORITY.KEYID = 5
2,864,503 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,434 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,135 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,860 UART: [afmc] --
2,907,755 UART: [cold-reset] --
2,908,695 UART: [state] Locking Datavault
2,909,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,418 UART: [state] Locking ICCM
2,910,930 UART: [exit] Launching FMC @ 0x40000130
2,916,260 UART:
2,916,276 UART: Running Caliptra FMC ...
2,916,684 UART:
2,916,738 UART: [state] CFI Enabled
2,927,546 UART: [fht] FMC Alias Private Key: 7
3,046,968 UART: [art] Extend RT PCRs Done
3,047,396 UART: [art] Lock RT PCRs Done
3,049,126 UART: [art] Populate DV Done
3,057,421 UART: [fht] FMC Alias Private Key: 7
3,058,469 UART: [art] Derive CDI
3,058,749 UART: [art] Store in slot 0x4
3,144,992 UART: [art] Derive Key Pair
3,145,352 UART: [art] Store priv key in slot 0x5
3,158,708 UART: [art] Derive Key Pair - Done
3,173,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,321 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,086 UART: [art] PUB.X = 31F3C84F992F3D3F713F960D72FC7C82CCFDECB1F403EE31F3C0A5AF554D81129FB6F517A5FFB91DB3DDBAF7799B6E8E
3,196,876 UART: [art] PUB.Y = A10E3FA473006AB2892598444E73DEB4271CCFE93FDEE5219C152C78D197821E6B902150A30CDD5EADDC91085D0FEA62
3,203,802 UART: [art] SIG.R = 440CE99E87A7C86BCEB013CB77A827683E2A7792E7D79C87AADA03CE7C3B33655267333D088D3988915D7619D398413F
3,210,561 UART: [art] SIG.S = A67E71C70FE2193BA2B16470F377099843CE83D32B777A46240F52F91C1FE5057A9269539795A358D7E704C4AC3FB6AA
3,234,276 UART: Caliptra RT
3,234,527 UART: [state] CFI Enabled
3,353,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,388 UART: [rt]cmd =0x52435458, len=8
3,386,054 >>> mbox cmd response data (16 bytes)
3,386,055 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,068 UART: [rt]cmd =0x44504543, len=96
3,448,746 >>> mbox cmd response data (56 bytes)
3,448,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,846 UART: [rt]cmd =0x44504543, len=96
3,512,260 >>> mbox cmd response data (56 bytes)
3,512,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,470 UART: [rt]cmd =0x44504543, len=96
3,575,095 >>> mbox cmd response data (56 bytes)
3,575,096 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,867 UART: [rt]cmd =0x44504543, len=96
3,637,837 >>> mbox cmd response data (56 bytes)
3,637,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,667,735 UART: [rt]cmd =0x44504543, len=96
3,700,916 >>> mbox cmd response data (56 bytes)
3,700,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,922 UART: [rt]cmd =0x44504543, len=96
3,764,226 >>> mbox cmd response data (56 bytes)
3,764,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,794,246 UART: [rt]cmd =0x44504543, len=96
3,827,453 >>> mbox cmd response data (56 bytes)
3,827,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,857,403 UART: [rt]cmd =0x44504543, len=96
3,890,051 >>> mbox cmd response data (56 bytes)
3,890,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,920,079 UART: [rt]cmd =0x44504543, len=96
3,953,144 >>> mbox cmd response data (56 bytes)
3,953,145 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,982,898 UART: [rt]cmd =0x44504543, len=96
4,015,970 >>> mbox cmd response data (56 bytes)
4,015,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,045,664 UART: [rt]cmd =0x44504543, len=96
4,078,877 >>> mbox cmd response data (56 bytes)
4,078,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,108,939 UART: [rt]cmd =0x44504543, len=96
4,141,611 >>> mbox cmd response data (56 bytes)
4,141,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,469 UART: [rt]cmd =0x44504543, len=96
4,204,578 >>> mbox cmd response data (56 bytes)
4,204,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,234,770 UART: [rt]cmd =0x44504543, len=96
4,267,174 >>> mbox cmd response data (56 bytes)
4,267,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,297,108 UART: [rt]cmd =0x44504543, len=96
4,330,299 >>> mbox cmd response data (56 bytes)
4,330,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,360,557 UART: [rt]cmd =0x44504543, len=96
4,393,865 >>> mbox cmd response data (56 bytes)
4,393,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,423,921 UART: [rt]cmd =0x44504543, len=96
4,457,484 >>> mbox cmd response data (56 bytes)
4,457,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,487,244 UART: [rt]cmd =0x44504543, len=96
4,520,564 >>> mbox cmd response data (56 bytes)
4,520,565 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,550,516 UART: [rt]cmd =0x44504543, len=96
4,583,205 >>> mbox cmd response data (56 bytes)
4,583,206 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,613,219 UART: [rt]cmd =0x44504543, len=96
4,646,877 >>> mbox cmd response data (56 bytes)
4,646,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,676,721 UART: [rt]cmd =0x44504543, len=96
4,709,872 >>> mbox cmd response data (56 bytes)
4,709,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,739,888 UART: [rt]cmd =0x44504543, len=96
4,773,074 >>> mbox cmd response data (56 bytes)
4,773,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,803,128 UART: [rt]cmd =0x44504543, len=96
4,836,227 >>> mbox cmd response data (56 bytes)
4,836,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,866,267 UART: [rt]cmd =0x44504543, len=96
4,899,957 >>> mbox cmd response data (56 bytes)
4,899,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,929,743 UART: [rt]cmd =0x44504543, len=96
4,962,706 >>> mbox cmd response data (56 bytes)
4,962,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,992,820 UART: [rt]cmd =0x44504543, len=96
5,026,092 >>> mbox cmd response data (56 bytes)
5,026,093 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,055,984 UART: [rt]cmd =0x44504543, len=96
5,089,017 >>> mbox cmd response data (56 bytes)
5,089,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,118,923 UART: [rt]cmd =0x44504543, len=96
5,152,433 >>> mbox cmd response data (56 bytes)
5,152,434 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,182,337 UART: [rt]cmd =0x44504543, len=96
5,216,642 >>> mbox cmd response data (56 bytes)
5,216,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,246,588 UART: [rt]cmd =0x44504543, len=96
5,254,023 >>> mbox cmd response: failed
5,254,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,284,039 UART: [rt]cmd =0x44504543, len=96
5,316,544 >>> mbox cmd response data (56 bytes)
5,316,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,346,484 UART: [rt]cmd =0x44504543, len=96
5,353,909 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.78s
Truncated 260626 bytes from beginning
4,341,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,371,531 UART: [rt]cmd =0x44504543, len=96
4,404,758 >>> mbox cmd response data (56 bytes)
4,404,759 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,434,568 UART: [rt]cmd =0x44504543, len=96
4,468,032 >>> mbox cmd response data (56 bytes)
4,468,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,497,976 UART: [rt]cmd =0x44504543, len=96
4,531,121 >>> mbox cmd response data (56 bytes)
4,531,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,560,915 UART: [rt]cmd =0x44504543, len=96
4,593,885 >>> mbox cmd response data (56 bytes)
4,593,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,624,045 UART: [rt]cmd =0x44504543, len=96
4,656,866 >>> mbox cmd response data (56 bytes)
4,656,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,686,770 UART: [rt]cmd =0x44504543, len=96
4,720,688 >>> mbox cmd response data (56 bytes)
4,720,689 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,750,858 UART: [rt]cmd =0x44504543, len=96
4,784,317 >>> mbox cmd response data (56 bytes)
4,784,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,814,265 UART: [rt]cmd =0x44504543, len=96
4,847,941 >>> mbox cmd response data (56 bytes)
4,847,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,877,997 UART: [rt]cmd =0x44504543, len=96
4,911,028 >>> mbox cmd response data (56 bytes)
4,911,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,941,038 UART: [rt]cmd =0x44504543, len=96
4,974,114 >>> mbox cmd response data (56 bytes)
4,974,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,004,278 UART: [rt]cmd =0x44504543, len=96
5,011,897 >>> mbox cmd response: failed
5,011,897 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,041,813 UART: [rt]cmd =0x44504543, len=96
5,074,428 >>> mbox cmd response data (56 bytes)
5,074,429 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,104,376 UART: [rt]cmd =0x44504543, len=96
5,137,647 >>> mbox cmd response data (56 bytes)
5,137,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,167,457 UART: [rt]cmd =0x44504543, len=96
5,175,002 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,782 ready_for_fw is high
1,059,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,512 >>> mbox cmd response: success
2,678,512 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,529 UART:
2,740,545 UART: Running Caliptra FMC ...
2,740,953 UART:
2,741,007 UART: [state] CFI Enabled
2,751,483 UART: [fht] FMC Alias Private Key: 7
2,869,989 UART: [art] Extend RT PCRs Done
2,870,417 UART: [art] Lock RT PCRs Done
2,871,879 UART: [art] Populate DV Done
2,880,132 UART: [fht] FMC Alias Private Key: 7
2,881,108 UART: [art] Derive CDI
2,881,388 UART: [art] Store in slot 0x4
2,967,439 UART: [art] Derive Key Pair
2,967,799 UART: [art] Store priv key in slot 0x5
2,981,603 UART: [art] Derive Key Pair - Done
2,996,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,237 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,002 UART: [art] PUB.X = 9814DB64E4C9BDBD34FB941603C9F10E8017D10300246CAFB4944E644413107A1EBC18F47319F3B0A607BC01EA1A1BA0
3,018,741 UART: [art] PUB.Y = 3416858FA00273D932AB033D918B8F93B890BC40B4393636726A9A3A92C7F3181E15EC1164FD8AB30619B86534B8F813
3,025,674 UART: [art] SIG.R = C9E982A9D37DB7609C5D5669F67590ADC3B9C6DFF537F2C23EDCB82BA90C2A8C8230BCD6A557D8360917DDE8B228D4E7
3,032,454 UART: [art] SIG.S = DEA41017BF76DCA76FA7430BA774F99FD3438D5DB9E3C5856121219EE858EA36E974DDB22C9BF05C2D2CD9D4D0DC3C4B
3,056,645 UART: Caliptra RT
3,056,896 UART: [state] CFI Enabled
3,176,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,980 UART: [rt]cmd =0x52435458, len=8
3,208,680 >>> mbox cmd response data (16 bytes)
3,208,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,688 UART: [rt]cmd =0x44504543, len=96
3,271,818 >>> mbox cmd response data (56 bytes)
3,271,819 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,816 UART: [rt]cmd =0x44504543, len=96
3,334,680 >>> mbox cmd response data (56 bytes)
3,334,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,364,690 UART: [rt]cmd =0x44504543, len=96
3,398,067 >>> mbox cmd response data (56 bytes)
3,398,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,847 UART: [rt]cmd =0x44504543, len=96
3,460,877 >>> mbox cmd response data (56 bytes)
3,460,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,490,637 UART: [rt]cmd =0x44504543, len=96
3,523,860 >>> mbox cmd response data (56 bytes)
3,523,861 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,944 UART: [rt]cmd =0x44504543, len=96
3,586,328 >>> mbox cmd response data (56 bytes)
3,586,329 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,348 UART: [rt]cmd =0x44504543, len=96
3,649,209 >>> mbox cmd response data (56 bytes)
3,649,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,679,087 UART: [rt]cmd =0x44504543, len=96
3,712,159 >>> mbox cmd response data (56 bytes)
3,712,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,742,209 UART: [rt]cmd =0x44504543, len=96
3,775,114 >>> mbox cmd response data (56 bytes)
3,775,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,805,194 UART: [rt]cmd =0x44504543, len=96
3,838,774 >>> mbox cmd response data (56 bytes)
3,838,775 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,868,780 UART: [rt]cmd =0x44504543, len=96
3,901,971 >>> mbox cmd response data (56 bytes)
3,901,972 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,139 UART: [rt]cmd =0x44504543, len=96
3,965,421 >>> mbox cmd response data (56 bytes)
3,965,422 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,995,587 UART: [rt]cmd =0x44504543, len=96
4,028,062 >>> mbox cmd response data (56 bytes)
4,028,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,058,018 UART: [rt]cmd =0x44504543, len=96
4,090,894 >>> mbox cmd response data (56 bytes)
4,090,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,120,990 UART: [rt]cmd =0x44504543, len=96
4,154,131 >>> mbox cmd response data (56 bytes)
4,154,132 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,184,107 UART: [rt]cmd =0x44504543, len=96
4,216,909 >>> mbox cmd response data (56 bytes)
4,216,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,807 UART: [rt]cmd =0x44504543, len=96
4,280,090 >>> mbox cmd response data (56 bytes)
4,280,091 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,309,986 UART: [rt]cmd =0x44504543, len=96
4,343,120 >>> mbox cmd response data (56 bytes)
4,343,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,373,312 UART: [rt]cmd =0x44504543, len=96
4,407,607 >>> mbox cmd response data (56 bytes)
4,407,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,437,827 UART: [rt]cmd =0x44504543, len=96
4,471,481 >>> mbox cmd response data (56 bytes)
4,471,482 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,501,641 UART: [rt]cmd =0x44504543, len=96
4,534,874 >>> mbox cmd response data (56 bytes)
4,534,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,890 UART: [rt]cmd =0x44504543, len=96
4,598,424 >>> mbox cmd response data (56 bytes)
4,598,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,628,430 UART: [rt]cmd =0x44504543, len=96
4,661,121 >>> mbox cmd response data (56 bytes)
4,661,122 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,691,087 UART: [rt]cmd =0x44504543, len=96
4,724,447 >>> mbox cmd response data (56 bytes)
4,724,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,754,659 UART: [rt]cmd =0x44504543, len=96
4,788,230 >>> mbox cmd response data (56 bytes)
4,788,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,818,062 UART: [rt]cmd =0x44504543, len=96
4,851,380 >>> mbox cmd response data (56 bytes)
4,851,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,881,498 UART: [rt]cmd =0x44504543, len=96
4,914,137 >>> mbox cmd response data (56 bytes)
4,914,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,944,217 UART: [rt]cmd =0x44504543, len=96
4,977,827 >>> mbox cmd response data (56 bytes)
4,977,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,007,737 UART: [rt]cmd =0x44504543, len=96
5,041,104 >>> mbox cmd response data (56 bytes)
5,041,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,070,800 UART: [rt]cmd =0x44504543, len=96
5,078,601 >>> mbox cmd response: failed
5,078,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,469 UART: [rt]cmd =0x44504543, len=96
5,141,570 >>> mbox cmd response data (56 bytes)
5,141,571 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,171,564 UART: [rt]cmd =0x44504543, len=96
5,179,069 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 43.05s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,997 UART: [kat] SHA2-256
901,937 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,116 UART: [kat] HMAC-384Kdf
920,558 UART: [kat] LMS
1,168,870 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,169,903 UART: [fht] FHT @ 0x50003400
1,172,441 UART: [idev] ++
1,172,609 UART: [idev] CDI.KEYID = 6
1,172,970 UART: [idev] SUBJECT.KEYID = 7
1,173,395 UART: [idev] UDS.KEYID = 0
1,173,741 ready_for_fw is high
1,173,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,328 UART: [idev] Erasing UDS.KEYID = 0
1,198,452 UART: [idev] Sha1 KeyId Algorithm
1,207,358 UART: [idev] --
1,208,563 UART: [ldev] ++
1,208,731 UART: [ldev] CDI.KEYID = 6
1,209,095 UART: [ldev] SUBJECT.KEYID = 5
1,209,522 UART: [ldev] AUTHORITY.KEYID = 7
1,209,985 UART: [ldev] FE.KEYID = 1
1,215,361 UART: [ldev] Erasing FE.KEYID = 1
1,241,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,509 UART: [ldev] --
1,280,782 UART: [fwproc] Wait for Commands...
1,281,423 UART: [fwproc] Recv command 0x46574c44
1,282,156 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,609 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,780 >>> mbox cmd response: success
2,825,780 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,826,980 UART: [afmc] ++
2,827,148 UART: [afmc] CDI.KEYID = 6
2,827,511 UART: [afmc] SUBJECT.KEYID = 7
2,827,937 UART: [afmc] AUTHORITY.KEYID = 5
2,863,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,880 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,497 UART: [afmc] --
2,906,458 UART: [cold-reset] --
2,907,268 UART: [state] Locking Datavault
2,908,271 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,875 UART: [state] Locking ICCM
2,909,365 UART: [exit] Launching FMC @ 0x40000130
2,914,695 UART:
2,914,711 UART: Running Caliptra FMC ...
2,915,119 UART:
2,915,262 UART: [state] CFI Enabled
2,926,154 UART: [fht] FMC Alias Private Key: 7
3,045,320 UART: [art] Extend RT PCRs Done
3,045,748 UART: [art] Lock RT PCRs Done
3,047,130 UART: [art] Populate DV Done
3,055,527 UART: [fht] FMC Alias Private Key: 7
3,056,485 UART: [art] Derive CDI
3,056,765 UART: [art] Store in slot 0x4
3,142,796 UART: [art] Derive Key Pair
3,143,156 UART: [art] Store priv key in slot 0x5
3,156,814 UART: [art] Derive Key Pair - Done
3,171,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,811 UART: [art] PUB.X = 536AAE344968C2B930988EFE6F6F534FD6BEAA39964D2CCA16EAFC2E317BEC3D9B6430ED953FEA44446E91E16FB3E2D1
3,194,601 UART: [art] PUB.Y = 4F8A18D2D93E6DAE1855FB8CE385CC1E82E5953B7F65DED97E74A8858A3299AEA146844776E99CEC3EF8B536620F464A
3,201,558 UART: [art] SIG.R = 79342B18B2195B94A68EC94B427E69D3FF0A79E1CD54E067A0787E94D25E7D3976900C3F2F84AC41323159EF2746BC2D
3,208,322 UART: [art] SIG.S = 12EDDE205217316DAC60F1DA985F7E1EBFC786221A99978AC3E2C091F65663FCD6BBD06E3036113A6BFAAA3314F740C5
3,232,540 UART: Caliptra RT
3,232,883 UART: [state] CFI Enabled
3,352,955 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,233 UART: [rt]cmd =0x52435458, len=8
3,384,841 >>> mbox cmd response data (16 bytes)
3,384,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,885 UART: [rt]cmd =0x44504543, len=96
3,448,055 >>> mbox cmd response data (56 bytes)
3,448,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,887 UART: [rt]cmd =0x44504543, len=96
3,510,787 >>> mbox cmd response data (56 bytes)
3,510,788 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,531 UART: [rt]cmd =0x44504543, len=96
3,572,974 >>> mbox cmd response data (56 bytes)
3,572,975 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,894 UART: [rt]cmd =0x44504543, len=96
3,635,926 >>> mbox cmd response data (56 bytes)
3,635,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,756 UART: [rt]cmd =0x44504543, len=96
3,698,667 >>> mbox cmd response data (56 bytes)
3,698,668 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,728,719 UART: [rt]cmd =0x44504543, len=96
3,761,723 >>> mbox cmd response data (56 bytes)
3,761,724 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,787 UART: [rt]cmd =0x44504543, len=96
3,824,820 >>> mbox cmd response data (56 bytes)
3,824,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,816 UART: [rt]cmd =0x44504543, len=96
3,886,812 >>> mbox cmd response data (56 bytes)
3,886,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,736 UART: [rt]cmd =0x44504543, len=96
3,948,583 >>> mbox cmd response data (56 bytes)
3,948,584 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,978,289 UART: [rt]cmd =0x44504543, len=96
4,011,209 >>> mbox cmd response data (56 bytes)
4,011,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,041,089 UART: [rt]cmd =0x44504543, len=96
4,074,532 >>> mbox cmd response data (56 bytes)
4,074,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,104,594 UART: [rt]cmd =0x44504543, len=96
4,137,612 >>> mbox cmd response data (56 bytes)
4,137,613 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,167,584 UART: [rt]cmd =0x44504543, len=96
4,201,045 >>> mbox cmd response data (56 bytes)
4,201,046 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,241 UART: [rt]cmd =0x44504543, len=96
4,263,877 >>> mbox cmd response data (56 bytes)
4,263,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,293,963 UART: [rt]cmd =0x44504543, len=96
4,326,610 >>> mbox cmd response data (56 bytes)
4,326,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,356,532 UART: [rt]cmd =0x44504543, len=96
4,390,462 >>> mbox cmd response data (56 bytes)
4,390,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,396 UART: [rt]cmd =0x44504543, len=96
4,452,695 >>> mbox cmd response data (56 bytes)
4,452,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,482,593 UART: [rt]cmd =0x44504543, len=96
4,516,151 >>> mbox cmd response data (56 bytes)
4,516,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,546,087 UART: [rt]cmd =0x44504543, len=96
4,579,424 >>> mbox cmd response data (56 bytes)
4,579,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,609,330 UART: [rt]cmd =0x44504543, len=96
4,642,434 >>> mbox cmd response data (56 bytes)
4,642,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,672,430 UART: [rt]cmd =0x44504543, len=96
4,706,071 >>> mbox cmd response data (56 bytes)
4,706,072 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,151 UART: [rt]cmd =0x44504543, len=96
4,768,907 >>> mbox cmd response data (56 bytes)
4,768,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,798,799 UART: [rt]cmd =0x44504543, len=96
4,831,568 >>> mbox cmd response data (56 bytes)
4,831,569 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,861,364 UART: [rt]cmd =0x44504543, len=96
4,895,358 >>> mbox cmd response data (56 bytes)
4,895,359 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,925,308 UART: [rt]cmd =0x44504543, len=96
4,958,859 >>> mbox cmd response data (56 bytes)
4,958,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,988,835 UART: [rt]cmd =0x44504543, len=96
5,021,263 >>> mbox cmd response data (56 bytes)
5,021,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,051,117 UART: [rt]cmd =0x44504543, len=96
5,084,378 >>> mbox cmd response data (56 bytes)
5,084,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,114,292 UART: [rt]cmd =0x44504543, len=96
5,147,592 >>> mbox cmd response data (56 bytes)
5,147,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,177,560 UART: [rt]cmd =0x44504543, len=96
5,210,805 >>> mbox cmd response data (56 bytes)
5,210,806 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,721 UART: [rt]cmd =0x44504543, len=96
5,248,232 >>> mbox cmd response: failed
5,248,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,278,102 UART: [rt]cmd =0x44504543, len=96
5,310,869 >>> mbox cmd response data (56 bytes)
5,310,870 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,340,831 UART: [rt]cmd =0x44504543, len=96
5,348,196 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 46.40s
Truncated 260626 bytes from beginning
4,342,807 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,372,856 UART: [rt]cmd =0x44504543, len=96
4,405,775 >>> mbox cmd response data (56 bytes)
4,405,776 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,435,759 UART: [rt]cmd =0x44504543, len=96
4,468,341 >>> mbox cmd response data (56 bytes)
4,468,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,498,453 UART: [rt]cmd =0x44504543, len=96
4,531,258 >>> mbox cmd response data (56 bytes)
4,531,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,561,100 UART: [rt]cmd =0x44504543, len=96
4,593,642 >>> mbox cmd response data (56 bytes)
4,593,643 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,623,502 UART: [rt]cmd =0x44504543, len=96
4,655,973 >>> mbox cmd response data (56 bytes)
4,655,974 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,686,025 UART: [rt]cmd =0x44504543, len=96
4,718,983 >>> mbox cmd response data (56 bytes)
4,718,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,748,877 UART: [rt]cmd =0x44504543, len=96
4,781,878 >>> mbox cmd response data (56 bytes)
4,781,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,811,714 UART: [rt]cmd =0x44504543, len=96
4,845,130 >>> mbox cmd response data (56 bytes)
4,845,131 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,875,336 UART: [rt]cmd =0x44504543, len=96
4,909,483 >>> mbox cmd response data (56 bytes)
4,909,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,939,617 UART: [rt]cmd =0x44504543, len=96
4,973,057 >>> mbox cmd response data (56 bytes)
4,973,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,002,965 UART: [rt]cmd =0x44504543, len=96
5,010,774 >>> mbox cmd response: failed
5,010,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,040,698 UART: [rt]cmd =0x44504543, len=96
5,073,587 >>> mbox cmd response data (56 bytes)
5,073,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,103,629 UART: [rt]cmd =0x44504543, len=96
5,136,436 >>> mbox cmd response data (56 bytes)
5,136,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,166,286 UART: [rt]cmd =0x44504543, len=96
5,173,847 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,259 ready_for_fw is high
1,059,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,625 >>> mbox cmd response: success
2,680,625 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,510 UART:
2,742,526 UART: Running Caliptra FMC ...
2,742,934 UART:
2,743,077 UART: [state] CFI Enabled
2,753,829 UART: [fht] FMC Alias Private Key: 7
2,872,797 UART: [art] Extend RT PCRs Done
2,873,225 UART: [art] Lock RT PCRs Done
2,874,699 UART: [art] Populate DV Done
2,883,200 UART: [fht] FMC Alias Private Key: 7
2,884,198 UART: [art] Derive CDI
2,884,478 UART: [art] Store in slot 0x4
2,970,107 UART: [art] Derive Key Pair
2,970,467 UART: [art] Store priv key in slot 0x5
2,983,515 UART: [art] Derive Key Pair - Done
2,998,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,982 UART: [art] PUB.X = A3CE9DCCFC1FC70F6FB27B8BDCAB0F2A5F3BF3CFB1AB97AB376E01A46784820AF25C5C95B81C415DF5578F354E7D517F
3,021,768 UART: [art] PUB.Y = 3547B7A9518B7ADA667C8E4B9ECD22A344422E68D872CECCF210E59387B70E022906BEEAA12F6CE170D5556DC5FF68F9
3,028,721 UART: [art] SIG.R = 371EECDD0D4319F0E413BF3A8462F2C3F40E4DDB0317F7F2862D6DDCBA0AF64EA8E58157353490C5183FFF2A5D244AF5
3,035,495 UART: [art] SIG.S = EEA814649F2F786988E7DE2E6EC82D3EEE44F13E321AB76EBA0B76869729BB8457089BB84DBF246E8720D4F9C70B7F75
3,059,714 UART: Caliptra RT
3,060,057 UART: [state] CFI Enabled
3,180,702 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,050 UART: [rt]cmd =0x52435458, len=8
3,212,702 >>> mbox cmd response data (16 bytes)
3,212,703 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,516 UART: [rt]cmd =0x44504543, len=96
3,276,146 >>> mbox cmd response data (56 bytes)
3,276,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,192 UART: [rt]cmd =0x44504543, len=96
3,339,266 >>> mbox cmd response data (56 bytes)
3,339,267 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,369,106 UART: [rt]cmd =0x44504543, len=96
3,401,951 >>> mbox cmd response data (56 bytes)
3,401,952 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,627 UART: [rt]cmd =0x44504543, len=96
3,464,881 >>> mbox cmd response data (56 bytes)
3,464,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,494,997 UART: [rt]cmd =0x44504543, len=96
3,528,000 >>> mbox cmd response data (56 bytes)
3,528,001 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,558,010 UART: [rt]cmd =0x44504543, len=96
3,590,698 >>> mbox cmd response data (56 bytes)
3,590,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,620,802 UART: [rt]cmd =0x44504543, len=96
3,653,961 >>> mbox cmd response data (56 bytes)
3,653,962 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,119 UART: [rt]cmd =0x44504543, len=96
3,716,451 >>> mbox cmd response data (56 bytes)
3,716,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,577 UART: [rt]cmd =0x44504543, len=96
3,779,348 >>> mbox cmd response data (56 bytes)
3,779,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,809,420 UART: [rt]cmd =0x44504543, len=96
3,841,460 >>> mbox cmd response data (56 bytes)
3,841,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,871,322 UART: [rt]cmd =0x44504543, len=96
3,904,037 >>> mbox cmd response data (56 bytes)
3,904,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,934,083 UART: [rt]cmd =0x44504543, len=96
3,967,401 >>> mbox cmd response data (56 bytes)
3,967,402 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,997,289 UART: [rt]cmd =0x44504543, len=96
4,030,594 >>> mbox cmd response data (56 bytes)
4,030,595 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,060,786 UART: [rt]cmd =0x44504543, len=96
4,093,654 >>> mbox cmd response data (56 bytes)
4,093,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,123,676 UART: [rt]cmd =0x44504543, len=96
4,156,289 >>> mbox cmd response data (56 bytes)
4,156,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,186,155 UART: [rt]cmd =0x44504543, len=96
4,219,525 >>> mbox cmd response data (56 bytes)
4,219,526 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,651 UART: [rt]cmd =0x44504543, len=96
4,282,764 >>> mbox cmd response data (56 bytes)
4,282,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,312,842 UART: [rt]cmd =0x44504543, len=96
4,346,272 >>> mbox cmd response data (56 bytes)
4,346,273 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,376,334 UART: [rt]cmd =0x44504543, len=96
4,409,939 >>> mbox cmd response data (56 bytes)
4,409,940 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,439,755 UART: [rt]cmd =0x44504543, len=96
4,472,605 >>> mbox cmd response data (56 bytes)
4,472,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,502,461 UART: [rt]cmd =0x44504543, len=96
4,535,786 >>> mbox cmd response data (56 bytes)
4,535,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,565,752 UART: [rt]cmd =0x44504543, len=96
4,598,972 >>> mbox cmd response data (56 bytes)
4,598,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,628,902 UART: [rt]cmd =0x44504543, len=96
4,662,215 >>> mbox cmd response data (56 bytes)
4,662,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,692,315 UART: [rt]cmd =0x44504543, len=96
4,724,943 >>> mbox cmd response data (56 bytes)
4,724,944 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,754,879 UART: [rt]cmd =0x44504543, len=96
4,787,960 >>> mbox cmd response data (56 bytes)
4,787,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,817,846 UART: [rt]cmd =0x44504543, len=96
4,851,176 >>> mbox cmd response data (56 bytes)
4,851,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,880,980 UART: [rt]cmd =0x44504543, len=96
4,914,599 >>> mbox cmd response data (56 bytes)
4,914,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,944,799 UART: [rt]cmd =0x44504543, len=96
4,977,381 >>> mbox cmd response data (56 bytes)
4,977,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,007,385 UART: [rt]cmd =0x44504543, len=96
5,041,052 >>> mbox cmd response data (56 bytes)
5,041,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,071,132 UART: [rt]cmd =0x44504543, len=96
5,078,669 >>> mbox cmd response: failed
5,078,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,591 UART: [rt]cmd =0x44504543, len=96
5,141,478 >>> mbox cmd response data (56 bytes)
5,141,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,171,556 UART: [rt]cmd =0x44504543, len=96
5,179,013 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.99s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,618 UART: [kat] SHA2-512-ACC
908,519 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,126 UART: [kat] LMS
1,171,454 UART: [kat] --
1,172,273 UART: [cold-reset] ++
1,172,639 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 ready_for_fw is high
1,176,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,680 UART: [idev] Erasing UDS.KEYID = 0
1,200,361 UART: [idev] Sha1 KeyId Algorithm
1,208,821 UART: [idev] --
1,209,829 UART: [ldev] ++
1,209,997 UART: [ldev] CDI.KEYID = 6
1,210,360 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,008 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,682 UART: [fwproc] Wait for Commands...
1,283,428 UART: [fwproc] Recv command 0x46574c44
1,284,156 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,803 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,714 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,069 >>> mbox cmd response: success
2,826,069 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,827,179 UART: [afmc] ++
2,827,347 UART: [afmc] CDI.KEYID = 6
2,827,709 UART: [afmc] SUBJECT.KEYID = 7
2,828,134 UART: [afmc] AUTHORITY.KEYID = 5
2,863,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,982 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,574 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,275 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,963 UART: [afmc] --
2,907,001 UART: [cold-reset] --
2,907,827 UART: [state] Locking Datavault
2,909,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,790 UART: [state] Locking ICCM
2,910,272 UART: [exit] Launching FMC @ 0x40000130
2,915,602 UART:
2,915,618 UART: Running Caliptra FMC ...
2,916,026 UART:
2,916,080 UART: [state] CFI Enabled
2,926,604 UART: [fht] FMC Alias Private Key: 7
3,045,128 UART: [art] Extend RT PCRs Done
3,045,556 UART: [art] Lock RT PCRs Done
3,046,642 UART: [art] Populate DV Done
3,054,791 UART: [fht] FMC Alias Private Key: 7
3,055,955 UART: [art] Derive CDI
3,056,235 UART: [art] Store in slot 0x4
3,142,244 UART: [art] Derive Key Pair
3,142,604 UART: [art] Store priv key in slot 0x5
3,155,998 UART: [art] Derive Key Pair - Done
3,170,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,737 UART: [art] PUB.X = 420585C90A49A3D2A3B7AF48DBD4B2F26F8134597259D00A9A624B09AA162C74AE408955B61F16E86F9422DCED02F736
3,193,494 UART: [art] PUB.Y = D6B31325F30DD2D0C0436E6C4B94E52E16A9BBA0389FC70092BBD7168235289F28CDF056D9C6C7B130B859AE8BE2EB76
3,200,429 UART: [art] SIG.R = 8BA2C6B274B64B7B9AEDC0F549BCCA907E5CEA36BB69984F915F40891E113A34669107BD3D6A25F180AA4F7303145208
3,207,196 UART: [art] SIG.S = 4011414BB4623504F3120C09E3BF4422C33214EED2CEC13E2B2F168C256D14AE04D0EEEF35A1510EB643F4C53EA730DD
3,231,271 UART: Caliptra RT
3,231,522 UART: [state] CFI Enabled
3,351,329 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,917 UART: [rt]cmd =0x52435458, len=8
3,383,513 >>> mbox cmd response data (16 bytes)
3,383,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,513 UART: [rt]cmd =0x44504543, len=96
3,446,243 >>> mbox cmd response data (56 bytes)
3,446,244 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,381 UART: [rt]cmd =0x44504543, len=96
3,508,783 >>> mbox cmd response data (56 bytes)
3,508,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,538,737 UART: [rt]cmd =0x44504543, len=96
3,571,288 >>> mbox cmd response data (56 bytes)
3,571,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,250 UART: [rt]cmd =0x44504543, len=96
3,633,584 >>> mbox cmd response data (56 bytes)
3,633,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,663,674 UART: [rt]cmd =0x44504543, len=96
3,697,049 >>> mbox cmd response data (56 bytes)
3,697,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,039 UART: [rt]cmd =0x44504543, len=96
3,760,101 >>> mbox cmd response data (56 bytes)
3,760,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,075 UART: [rt]cmd =0x44504543, len=96
3,823,544 >>> mbox cmd response data (56 bytes)
3,823,545 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,552 UART: [rt]cmd =0x44504543, len=96
3,886,504 >>> mbox cmd response data (56 bytes)
3,886,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,636 UART: [rt]cmd =0x44504543, len=96
3,949,613 >>> mbox cmd response data (56 bytes)
3,949,614 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,473 UART: [rt]cmd =0x44504543, len=96
4,012,393 >>> mbox cmd response data (56 bytes)
4,012,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,191 UART: [rt]cmd =0x44504543, len=96
4,075,648 >>> mbox cmd response data (56 bytes)
4,075,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,518 UART: [rt]cmd =0x44504543, len=96
4,138,982 >>> mbox cmd response data (56 bytes)
4,138,983 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,970 UART: [rt]cmd =0x44504543, len=96
4,201,161 >>> mbox cmd response data (56 bytes)
4,201,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,009 UART: [rt]cmd =0x44504543, len=96
4,263,867 >>> mbox cmd response data (56 bytes)
4,263,868 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,294,001 UART: [rt]cmd =0x44504543, len=96
4,327,400 >>> mbox cmd response data (56 bytes)
4,327,401 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,357,454 UART: [rt]cmd =0x44504543, len=96
4,390,944 >>> mbox cmd response data (56 bytes)
4,390,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,794 UART: [rt]cmd =0x44504543, len=96
4,454,411 >>> mbox cmd response data (56 bytes)
4,454,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,229 UART: [rt]cmd =0x44504543, len=96
4,517,049 >>> mbox cmd response data (56 bytes)
4,517,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,547,091 UART: [rt]cmd =0x44504543, len=96
4,580,370 >>> mbox cmd response data (56 bytes)
4,580,371 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,610,150 UART: [rt]cmd =0x44504543, len=96
4,643,696 >>> mbox cmd response data (56 bytes)
4,643,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,673,490 UART: [rt]cmd =0x44504543, len=96
4,706,309 >>> mbox cmd response data (56 bytes)
4,706,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,145 UART: [rt]cmd =0x44504543, len=96
4,769,103 >>> mbox cmd response data (56 bytes)
4,769,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,107 UART: [rt]cmd =0x44504543, len=96
4,832,236 >>> mbox cmd response data (56 bytes)
4,832,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,862,070 UART: [rt]cmd =0x44504543, len=96
4,895,720 >>> mbox cmd response data (56 bytes)
4,895,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,925,822 UART: [rt]cmd =0x44504543, len=96
4,960,271 >>> mbox cmd response data (56 bytes)
4,960,272 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,990,251 UART: [rt]cmd =0x44504543, len=96
5,023,315 >>> mbox cmd response data (56 bytes)
5,023,316 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,052,983 UART: [rt]cmd =0x44504543, len=96
5,086,998 >>> mbox cmd response data (56 bytes)
5,086,999 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,116,950 UART: [rt]cmd =0x44504543, len=96
5,150,480 >>> mbox cmd response data (56 bytes)
5,150,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,180,366 UART: [rt]cmd =0x44504543, len=96
5,213,817 >>> mbox cmd response data (56 bytes)
5,213,818 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,243,807 UART: [rt]cmd =0x44504543, len=96
5,251,446 >>> mbox cmd response: failed
5,251,446 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,281,602 UART: [rt]cmd =0x44504543, len=96
5,314,387 >>> mbox cmd response data (56 bytes)
5,314,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,344,525 UART: [rt]cmd =0x44504543, len=96
5,351,976 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.84s
Truncated 260626 bytes from beginning
4,339,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,369,759 UART: [rt]cmd =0x44504543, len=96
4,403,912 >>> mbox cmd response data (56 bytes)
4,403,913 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,433,840 UART: [rt]cmd =0x44504543, len=96
4,466,560 >>> mbox cmd response data (56 bytes)
4,466,561 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,496,362 UART: [rt]cmd =0x44504543, len=96
4,529,985 >>> mbox cmd response data (56 bytes)
4,529,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,560,031 UART: [rt]cmd =0x44504543, len=96
4,593,339 >>> mbox cmd response data (56 bytes)
4,593,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,623,317 UART: [rt]cmd =0x44504543, len=96
4,656,920 >>> mbox cmd response data (56 bytes)
4,656,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,686,766 UART: [rt]cmd =0x44504543, len=96
4,719,296 >>> mbox cmd response data (56 bytes)
4,719,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,749,092 UART: [rt]cmd =0x44504543, len=96
4,782,485 >>> mbox cmd response data (56 bytes)
4,782,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,812,245 UART: [rt]cmd =0x44504543, len=96
4,845,491 >>> mbox cmd response data (56 bytes)
4,845,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,875,549 UART: [rt]cmd =0x44504543, len=96
4,908,792 >>> mbox cmd response data (56 bytes)
4,908,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,938,682 UART: [rt]cmd =0x44504543, len=96
4,971,426 >>> mbox cmd response data (56 bytes)
4,971,427 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,001,380 UART: [rt]cmd =0x44504543, len=96
5,008,677 >>> mbox cmd response: failed
5,008,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,038,679 UART: [rt]cmd =0x44504543, len=96
5,071,734 >>> mbox cmd response data (56 bytes)
5,071,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,101,654 UART: [rt]cmd =0x44504543, len=96
5,136,633 >>> mbox cmd response data (56 bytes)
5,136,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,166,351 UART: [rt]cmd =0x44504543, len=96
5,174,058 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,637 ready_for_fw is high
1,059,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,968 >>> mbox cmd response: success
2,677,968 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,740,069 UART:
2,740,085 UART: Running Caliptra FMC ...
2,740,493 UART:
2,740,547 UART: [state] CFI Enabled
2,751,015 UART: [fht] FMC Alias Private Key: 7
2,869,763 UART: [art] Extend RT PCRs Done
2,870,191 UART: [art] Lock RT PCRs Done
2,871,943 UART: [art] Populate DV Done
2,880,084 UART: [fht] FMC Alias Private Key: 7
2,881,180 UART: [art] Derive CDI
2,881,460 UART: [art] Store in slot 0x4
2,967,807 UART: [art] Derive Key Pair
2,968,167 UART: [art] Store priv key in slot 0x5
2,981,769 UART: [art] Derive Key Pair - Done
2,996,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,250 UART: [art] PUB.X = 31AE783782E68A9618FBB622C9AF858A6E30FF333602E29A805782E570EC81DF8F7FA980A036594A59C8D881B296E0AD
3,019,019 UART: [art] PUB.Y = 208FA0FDE04473C23118DEF2757E9E52B4474C6ECEE9CA1D905675650BDE80B81F36309227AD1F2FF6C6B6D2E0704481
3,025,972 UART: [art] SIG.R = D89BF4A6DC6D8D55DE8E71EC9914AFAF0EBC316B12F64AA61F6221FA7C73D20696E1B612965DF049EFE339A0B7C97674
3,032,752 UART: [art] SIG.S = 8A46EEBF520D19C08E5307D072B491504D281D011C6950AAA4D7A5C67A9CA0969E71E3F3384F7BECD06516285A99FAF4
3,056,921 UART: Caliptra RT
3,057,172 UART: [state] CFI Enabled
3,177,218 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,730 UART: [rt]cmd =0x52435458, len=8
3,209,410 >>> mbox cmd response data (16 bytes)
3,209,411 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,212 UART: [rt]cmd =0x44504543, len=96
3,271,510 >>> mbox cmd response data (56 bytes)
3,271,511 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,460 UART: [rt]cmd =0x44504543, len=96
3,334,100 >>> mbox cmd response data (56 bytes)
3,334,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,363,846 UART: [rt]cmd =0x44504543, len=96
3,396,575 >>> mbox cmd response data (56 bytes)
3,396,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,426,365 UART: [rt]cmd =0x44504543, len=96
3,459,255 >>> mbox cmd response data (56 bytes)
3,459,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,489,099 UART: [rt]cmd =0x44504543, len=96
3,521,956 >>> mbox cmd response data (56 bytes)
3,521,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,551,686 UART: [rt]cmd =0x44504543, len=96
3,585,006 >>> mbox cmd response data (56 bytes)
3,585,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,615,138 UART: [rt]cmd =0x44504543, len=96
3,648,171 >>> mbox cmd response data (56 bytes)
3,648,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,678,029 UART: [rt]cmd =0x44504543, len=96
3,711,161 >>> mbox cmd response data (56 bytes)
3,711,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,283 UART: [rt]cmd =0x44504543, len=96
3,774,244 >>> mbox cmd response data (56 bytes)
3,774,245 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,282 UART: [rt]cmd =0x44504543, len=96
3,837,122 >>> mbox cmd response data (56 bytes)
3,837,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,867,244 UART: [rt]cmd =0x44504543, len=96
3,899,967 >>> mbox cmd response data (56 bytes)
3,899,968 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,821 UART: [rt]cmd =0x44504543, len=96
3,962,595 >>> mbox cmd response data (56 bytes)
3,962,596 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,361 UART: [rt]cmd =0x44504543, len=96
4,024,886 >>> mbox cmd response data (56 bytes)
4,024,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,054,922 UART: [rt]cmd =0x44504543, len=96
4,087,250 >>> mbox cmd response data (56 bytes)
4,087,251 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,117,176 UART: [rt]cmd =0x44504543, len=96
4,150,995 >>> mbox cmd response data (56 bytes)
4,150,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,180,881 UART: [rt]cmd =0x44504543, len=96
4,213,969 >>> mbox cmd response data (56 bytes)
4,213,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,243,851 UART: [rt]cmd =0x44504543, len=96
4,276,474 >>> mbox cmd response data (56 bytes)
4,276,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,306,578 UART: [rt]cmd =0x44504543, len=96
4,339,286 >>> mbox cmd response data (56 bytes)
4,339,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,369,562 UART: [rt]cmd =0x44504543, len=96
4,402,797 >>> mbox cmd response data (56 bytes)
4,402,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,432,917 UART: [rt]cmd =0x44504543, len=96
4,466,369 >>> mbox cmd response data (56 bytes)
4,466,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,496,077 UART: [rt]cmd =0x44504543, len=96
4,529,492 >>> mbox cmd response data (56 bytes)
4,529,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,559,676 UART: [rt]cmd =0x44504543, len=96
4,594,194 >>> mbox cmd response data (56 bytes)
4,594,195 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,624,128 UART: [rt]cmd =0x44504543, len=96
4,657,459 >>> mbox cmd response data (56 bytes)
4,657,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,687,477 UART: [rt]cmd =0x44504543, len=96
4,720,221 >>> mbox cmd response data (56 bytes)
4,720,222 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,750,145 UART: [rt]cmd =0x44504543, len=96
4,783,674 >>> mbox cmd response data (56 bytes)
4,783,675 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,813,714 UART: [rt]cmd =0x44504543, len=96
4,846,854 >>> mbox cmd response data (56 bytes)
4,846,855 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,876,764 UART: [rt]cmd =0x44504543, len=96
4,910,531 >>> mbox cmd response data (56 bytes)
4,910,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,940,713 UART: [rt]cmd =0x44504543, len=96
4,973,941 >>> mbox cmd response data (56 bytes)
4,973,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,003,797 UART: [rt]cmd =0x44504543, len=96
5,037,646 >>> mbox cmd response data (56 bytes)
5,037,647 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,067,510 UART: [rt]cmd =0x44504543, len=96
5,074,937 >>> mbox cmd response: failed
5,074,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,023 UART: [rt]cmd =0x44504543, len=96
5,138,852 >>> mbox cmd response data (56 bytes)
5,138,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,168,930 UART: [rt]cmd =0x44504543, len=96
5,176,379 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 43.98s
Truncated 359656 bytes from beginning
2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
87,919 UART: [kat] SHA2-256
893,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,694 UART: [kat] ++
897,846 UART: [kat] sha1
902,002 UART: [kat] SHA2-256
903,942 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,225 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,231 UART: [idev] ++
1,175,399 UART: [idev] CDI.KEYID = 6
1,175,759 UART: [idev] SUBJECT.KEYID = 7
1,176,183 UART: [idev] UDS.KEYID = 0
1,176,528 ready_for_fw is high
1,176,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,233 UART: [idev] Erasing UDS.KEYID = 0
1,201,184 UART: [idev] Sha1 KeyId Algorithm
1,209,696 UART: [idev] --
1,210,912 UART: [ldev] ++
1,211,080 UART: [ldev] CDI.KEYID = 6
1,211,443 UART: [ldev] SUBJECT.KEYID = 5
1,211,869 UART: [ldev] AUTHORITY.KEYID = 7
1,212,332 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,244,385 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,432 UART: [ldev] --
1,283,717 UART: [fwproc] Wait for Commands...
1,284,435 UART: [fwproc] Recv command 0x46574c44
1,285,163 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,725 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,895 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,198 >>> mbox cmd response: success
2,828,198 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,829,294 UART: [afmc] ++
2,829,462 UART: [afmc] CDI.KEYID = 6
2,829,824 UART: [afmc] SUBJECT.KEYID = 7
2,830,249 UART: [afmc] AUTHORITY.KEYID = 5
2,866,394 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,173 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,874 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,614 UART: [afmc] --
2,909,618 UART: [cold-reset] --
2,910,250 UART: [state] Locking Datavault
2,911,425 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,029 UART: [state] Locking ICCM
2,912,557 UART: [exit] Launching FMC @ 0x40000130
2,917,887 UART:
2,917,903 UART: Running Caliptra FMC ...
2,918,311 UART:
2,918,454 UART: [state] CFI Enabled
2,928,970 UART: [fht] FMC Alias Private Key: 7
3,047,172 UART: [art] Extend RT PCRs Done
3,047,600 UART: [art] Lock RT PCRs Done
3,048,980 UART: [art] Populate DV Done
3,056,875 UART: [fht] FMC Alias Private Key: 7
3,058,057 UART: [art] Derive CDI
3,058,337 UART: [art] Store in slot 0x4
3,143,930 UART: [art] Derive Key Pair
3,144,290 UART: [art] Store priv key in slot 0x5
3,157,850 UART: [art] Derive Key Pair - Done
3,172,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,869 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,634 UART: [art] PUB.X = AF063CB319F0C8B4D6259FF58A815C542874BC958F5218689B0C039E201743ACA24D5F04BF28A8D489CDB0B752655B0F
3,195,393 UART: [art] PUB.Y = 6D4598EE4F8B69D4AC65EAB14163DA3B02D91434A10298D3882C5111425A3F47F8A69F01B21F5E15E987D5B03BD93052
3,202,334 UART: [art] SIG.R = 27DFEFA5F2F12900274AA37C25AB21F08E30AA40264706E820398877B0ADB2B1C4F14AA16E33AAC9340C33F0FCA821EE
3,209,088 UART: [art] SIG.S = 2644FCEB943E3AEBCF5F60BB4CEBCAC71B92D321866897DD8F0A6C559774F96F88DCDD3E56A029A90194ED0A8FDF2384
3,232,391 UART: Caliptra RT
3,232,734 UART: [state] CFI Enabled
3,351,828 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,454 UART: [rt]cmd =0x52435458, len=8
3,384,204 >>> mbox cmd response data (16 bytes)
3,384,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,136 UART: [rt]cmd =0x44504543, len=96
3,447,382 >>> mbox cmd response data (56 bytes)
3,447,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,094 UART: [rt]cmd =0x44504543, len=96
3,509,902 >>> mbox cmd response data (56 bytes)
3,509,903 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,590 UART: [rt]cmd =0x44504543, len=96
3,572,299 >>> mbox cmd response data (56 bytes)
3,572,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,191 UART: [rt]cmd =0x44504543, len=96
3,635,321 >>> mbox cmd response data (56 bytes)
3,635,322 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,665,285 UART: [rt]cmd =0x44504543, len=96
3,697,532 >>> mbox cmd response data (56 bytes)
3,697,533 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,392 UART: [rt]cmd =0x44504543, len=96
3,760,332 >>> mbox cmd response data (56 bytes)
3,760,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,790,124 UART: [rt]cmd =0x44504543, len=96
3,823,565 >>> mbox cmd response data (56 bytes)
3,823,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,485 UART: [rt]cmd =0x44504543, len=96
3,886,255 >>> mbox cmd response data (56 bytes)
3,886,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,916,275 UART: [rt]cmd =0x44504543, len=96
3,949,420 >>> mbox cmd response data (56 bytes)
3,949,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,979,482 UART: [rt]cmd =0x44504543, len=96
4,012,756 >>> mbox cmd response data (56 bytes)
4,012,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,042,608 UART: [rt]cmd =0x44504543, len=96
4,075,733 >>> mbox cmd response data (56 bytes)
4,075,734 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,105,571 UART: [rt]cmd =0x44504543, len=96
4,138,593 >>> mbox cmd response data (56 bytes)
4,138,594 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,483 UART: [rt]cmd =0x44504543, len=96
4,201,504 >>> mbox cmd response data (56 bytes)
4,201,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,231,448 UART: [rt]cmd =0x44504543, len=96
4,264,898 >>> mbox cmd response data (56 bytes)
4,264,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,295,082 UART: [rt]cmd =0x44504543, len=96
4,328,399 >>> mbox cmd response data (56 bytes)
4,328,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,358,363 UART: [rt]cmd =0x44504543, len=96
4,390,865 >>> mbox cmd response data (56 bytes)
4,390,866 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,420,929 UART: [rt]cmd =0x44504543, len=96
4,455,052 >>> mbox cmd response data (56 bytes)
4,455,053 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,484,944 UART: [rt]cmd =0x44504543, len=96
4,517,836 >>> mbox cmd response data (56 bytes)
4,517,837 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,547,900 UART: [rt]cmd =0x44504543, len=96
4,581,025 >>> mbox cmd response data (56 bytes)
4,581,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,611,043 UART: [rt]cmd =0x44504543, len=96
4,644,081 >>> mbox cmd response data (56 bytes)
4,644,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,673,843 UART: [rt]cmd =0x44504543, len=96
4,706,842 >>> mbox cmd response data (56 bytes)
4,706,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,736,842 UART: [rt]cmd =0x44504543, len=96
4,770,344 >>> mbox cmd response data (56 bytes)
4,770,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,800,222 UART: [rt]cmd =0x44504543, len=96
4,832,809 >>> mbox cmd response data (56 bytes)
4,832,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,862,785 UART: [rt]cmd =0x44504543, len=96
4,896,545 >>> mbox cmd response data (56 bytes)
4,896,546 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,926,547 UART: [rt]cmd =0x44504543, len=96
4,959,874 >>> mbox cmd response data (56 bytes)
4,959,875 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,989,724 UART: [rt]cmd =0x44504543, len=96
5,022,748 >>> mbox cmd response data (56 bytes)
5,022,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,052,752 UART: [rt]cmd =0x44504543, len=96
5,087,293 >>> mbox cmd response data (56 bytes)
5,087,294 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,163 UART: [rt]cmd =0x44504543, len=96
5,150,743 >>> mbox cmd response data (56 bytes)
5,150,744 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,180,819 UART: [rt]cmd =0x44504543, len=96
5,213,958 >>> mbox cmd response data (56 bytes)
5,213,959 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,243,860 UART: [rt]cmd =0x44504543, len=96
5,251,553 >>> mbox cmd response: failed
5,251,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,281,461 UART: [rt]cmd =0x44504543, len=96
5,314,490 >>> mbox cmd response data (56 bytes)
5,314,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,344,452 UART: [rt]cmd =0x44504543, len=96
5,351,861 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 45.81s
Truncated 260626 bytes from beginning
4,344,066 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,374,147 UART: [rt]cmd =0x44504543, len=96
4,408,322 >>> mbox cmd response data (56 bytes)
4,408,323 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,438,440 UART: [rt]cmd =0x44504543, len=96
4,471,422 >>> mbox cmd response data (56 bytes)
4,471,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,501,404 UART: [rt]cmd =0x44504543, len=96
4,534,185 >>> mbox cmd response data (56 bytes)
4,534,186 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,564,067 UART: [rt]cmd =0x44504543, len=96
4,596,563 >>> mbox cmd response data (56 bytes)
4,596,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,626,679 UART: [rt]cmd =0x44504543, len=96
4,659,834 >>> mbox cmd response data (56 bytes)
4,659,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,690,026 UART: [rt]cmd =0x44504543, len=96
4,723,522 >>> mbox cmd response data (56 bytes)
4,723,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,753,418 UART: [rt]cmd =0x44504543, len=96
4,786,655 >>> mbox cmd response data (56 bytes)
4,786,656 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,816,569 UART: [rt]cmd =0x44504543, len=96
4,849,513 >>> mbox cmd response data (56 bytes)
4,849,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,879,553 UART: [rt]cmd =0x44504543, len=96
4,913,020 >>> mbox cmd response data (56 bytes)
4,913,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,942,818 UART: [rt]cmd =0x44504543, len=96
4,975,578 >>> mbox cmd response data (56 bytes)
4,975,579 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,005,628 UART: [rt]cmd =0x44504543, len=96
5,013,339 >>> mbox cmd response: failed
5,013,339 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,043,249 UART: [rt]cmd =0x44504543, len=96
5,075,760 >>> mbox cmd response data (56 bytes)
5,075,761 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,498 UART: [rt]cmd =0x44504543, len=96
5,138,915 >>> mbox cmd response data (56 bytes)
5,138,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,168,813 UART: [rt]cmd =0x44504543, len=96
5,176,556 >>> mbox cmd response: failed
PL0 Limit 31
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 ready_for_fw is high
1,060,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,855 >>> mbox cmd response: success
2,679,855 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
2,742,722 UART:
2,742,738 UART: Running Caliptra FMC ...
2,743,146 UART:
2,743,289 UART: [state] CFI Enabled
2,753,921 UART: [fht] FMC Alias Private Key: 7
2,873,305 UART: [art] Extend RT PCRs Done
2,873,733 UART: [art] Lock RT PCRs Done
2,875,301 UART: [art] Populate DV Done
2,883,640 UART: [fht] FMC Alias Private Key: 7
2,884,568 UART: [art] Derive CDI
2,884,848 UART: [art] Store in slot 0x4
2,970,439 UART: [art] Derive Key Pair
2,970,799 UART: [art] Store priv key in slot 0x5
2,983,991 UART: [art] Derive Key Pair - Done
2,999,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,520 UART: [art] PUB.X = BF217254F5135A96BDC0795956E69568D272A3E5DCFADC8F458834C667BF78BF8E524515A7C1A4EB9F9B89CA6EF0E05F
3,022,302 UART: [art] PUB.Y = A6B247BB65793A14B45F77829C818CC1358DF0B6D6E1816B444275871D2DE3F40CEA756FEFE82670D32A06682AA77B79
3,029,248 UART: [art] SIG.R = 25F798C01781EF3D397E011F247B8BFD06CF72FDC981FC719B6B859CCD6BB293E9E2A14CF34A6B79EC7922D11BB75C0A
3,036,025 UART: [art] SIG.S = 14EEB934E6BA5F1FCF7956958D91CF35F71286E8249A54F47BBB6C9E9C7D8AA196A2DEB84551541054E93034DF8F8786
3,060,257 UART: Caliptra RT
3,060,600 UART: [state] CFI Enabled
3,179,804 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,290 UART: [rt]cmd =0x52435458, len=8
3,211,842 >>> mbox cmd response data (16 bytes)
3,211,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,800 UART: [rt]cmd =0x44504543, len=96
3,274,278 >>> mbox cmd response data (56 bytes)
3,274,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,152 UART: [rt]cmd =0x44504543, len=96
3,336,592 >>> mbox cmd response data (56 bytes)
3,336,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,366,470 UART: [rt]cmd =0x44504543, len=96
3,398,969 >>> mbox cmd response data (56 bytes)
3,398,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,815 UART: [rt]cmd =0x44504543, len=96
3,460,825 >>> mbox cmd response data (56 bytes)
3,460,826 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,490,659 UART: [rt]cmd =0x44504543, len=96
3,523,722 >>> mbox cmd response data (56 bytes)
3,523,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,553,712 UART: [rt]cmd =0x44504543, len=96
3,586,700 >>> mbox cmd response data (56 bytes)
3,586,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,616,638 UART: [rt]cmd =0x44504543, len=96
3,649,019 >>> mbox cmd response data (56 bytes)
3,649,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,678,863 UART: [rt]cmd =0x44504543, len=96
3,711,489 >>> mbox cmd response data (56 bytes)
3,711,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,741,263 UART: [rt]cmd =0x44504543, len=96
3,773,884 >>> mbox cmd response data (56 bytes)
3,773,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,804,038 UART: [rt]cmd =0x44504543, len=96
3,836,724 >>> mbox cmd response data (56 bytes)
3,836,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,866,528 UART: [rt]cmd =0x44504543, len=96
3,900,111 >>> mbox cmd response data (56 bytes)
3,900,112 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,929,963 UART: [rt]cmd =0x44504543, len=96
3,962,753 >>> mbox cmd response data (56 bytes)
3,962,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,815 UART: [rt]cmd =0x44504543, len=96
4,026,230 >>> mbox cmd response data (56 bytes)
4,026,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,178 UART: [rt]cmd =0x44504543, len=96
4,089,652 >>> mbox cmd response data (56 bytes)
4,089,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,119,418 UART: [rt]cmd =0x44504543, len=96
4,152,147 >>> mbox cmd response data (56 bytes)
4,152,148 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,182,275 UART: [rt]cmd =0x44504543, len=96
4,216,107 >>> mbox cmd response data (56 bytes)
4,216,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,246,051 UART: [rt]cmd =0x44504543, len=96
4,280,078 >>> mbox cmd response data (56 bytes)
4,280,079 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,310,208 UART: [rt]cmd =0x44504543, len=96
4,343,616 >>> mbox cmd response data (56 bytes)
4,343,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,373,400 UART: [rt]cmd =0x44504543, len=96
4,406,813 >>> mbox cmd response data (56 bytes)
4,406,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,436,963 UART: [rt]cmd =0x44504543, len=96
4,470,341 >>> mbox cmd response data (56 bytes)
4,470,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,500,241 UART: [rt]cmd =0x44504543, len=96
4,533,306 >>> mbox cmd response data (56 bytes)
4,533,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,563,274 UART: [rt]cmd =0x44504543, len=96
4,596,638 >>> mbox cmd response data (56 bytes)
4,596,639 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,626,712 UART: [rt]cmd =0x44504543, len=96
4,658,661 >>> mbox cmd response data (56 bytes)
4,658,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,688,707 UART: [rt]cmd =0x44504543, len=96
4,722,475 >>> mbox cmd response data (56 bytes)
4,722,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,752,395 UART: [rt]cmd =0x44504543, len=96
4,786,898 >>> mbox cmd response data (56 bytes)
4,786,899 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,816,902 UART: [rt]cmd =0x44504543, len=96
4,850,542 >>> mbox cmd response data (56 bytes)
4,850,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,880,630 UART: [rt]cmd =0x44504543, len=96
4,914,191 >>> mbox cmd response data (56 bytes)
4,914,192 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,944,063 UART: [rt]cmd =0x44504543, len=96
4,978,119 >>> mbox cmd response data (56 bytes)
4,978,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,008,135 UART: [rt]cmd =0x44504543, len=96
5,041,670 >>> mbox cmd response data (56 bytes)
5,041,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,071,710 UART: [rt]cmd =0x44504543, len=96
5,078,943 >>> mbox cmd response: failed
5,078,943 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,687 UART: [rt]cmd =0x44504543, len=96
5,141,556 >>> mbox cmd response data (56 bytes)
5,141,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,171,408 UART: [rt]cmd =0x44504543, len=96
5,179,045 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_range ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 44.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,157 UART:
192,515 UART: Running Caliptra ROM ...
193,705 UART:
193,866 UART: [state] CFI Enabled
262,971 UART: [state] LifecycleState = Unprovisioned
264,888 UART: [state] DebugLocked = No
266,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,960 UART: [kat] SHA2-256
440,661 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,193 UART: [kat] ++
451,644 UART: [kat] sha1
463,157 UART: [kat] SHA2-256
465,882 UART: [kat] SHA2-384
470,737 UART: [kat] SHA2-512-ACC
473,101 UART: [kat] ECC-384
2,768,288 UART: [kat] HMAC-384Kdf
2,800,643 UART: [kat] LMS
3,990,891 UART: [kat] --
3,994,919 UART: [cold-reset] ++
3,995,787 UART: [fht] Storing FHT @ 0x50003400
4,006,998 UART: [idev] ++
4,007,622 UART: [idev] CDI.KEYID = 6
4,008,569 UART: [idev] SUBJECT.KEYID = 7
4,009,755 UART: [idev] UDS.KEYID = 0
4,010,834 ready_for_fw is high
4,011,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,223 UART: [idev] Erasing UDS.KEYID = 0
7,361,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,384,562 UART: [idev] --
7,388,558 UART: [ldev] ++
7,389,127 UART: [ldev] CDI.KEYID = 6
7,390,063 UART: [ldev] SUBJECT.KEYID = 5
7,391,335 UART: [ldev] AUTHORITY.KEYID = 7
7,392,564 UART: [ldev] FE.KEYID = 1
7,437,156 UART: [ldev] Erasing FE.KEYID = 1
10,768,224 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,077,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,126,475 UART: [ldev] --
13,130,829 UART: [fwproc] Waiting for Commands...
13,132,814 UART: [fwproc] Received command 0x46574c44
13,134,996 UART: [fwproc] Received Image of size 118548 bytes
17,241,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,190 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,370 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,017 >>> mbox cmd response: success
17,720,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,723,381 UART: [afmc] ++
17,723,958 UART: [afmc] CDI.KEYID = 6
17,724,893 UART: [afmc] SUBJECT.KEYID = 7
17,726,164 UART: [afmc] AUTHORITY.KEYID = 5
21,086,162 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,389,025 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,391,287 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,405,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,420,476 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,434,873 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,456,785 UART: [afmc] --
23,461,040 UART: [cold-reset] --
23,464,747 UART: [state] Locking Datavault
23,470,374 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,125 UART: [state] Locking ICCM
23,473,272 UART: [exit] Launching FMC @ 0x40000130
23,481,664 UART:
23,481,901 UART: Running Caliptra FMC ...
23,483,002 UART:
23,483,168 UART: [state] CFI Enabled
23,547,044 UART: [fht] FMC Alias Private Key: 7
25,908,670 UART: [art] Extend RT PCRs Done
25,909,892 UART: [art] Lock RT PCRs Done
25,911,595 UART: [art] Populate DV Done
25,917,112 UART: [fht] FMC Alias Private Key: 7
25,918,741 UART: [art] Derive CDI
25,919,491 UART: [art] Store in slot 0x4
25,976,855 UART: [art] Derive Key Pair
25,977,853 UART: [art] Store priv key in slot 0x5
29,270,569 UART: [art] Derive Key Pair - Done
29,283,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,572,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,574,456 UART: [art] PUB.X = 1CC3DF8D4DEB756C1AF0F34F87ABE0925FBA87291DEF6D9CA3286CB88070F00C482A67E8E08B21498D3D73059C018C90
31,581,746 UART: [art] PUB.Y = 79A89FD1D9148A20ABE6E5AA0D1757D04EE570DC05E0B0092EBFFFEBEB13EFAB6823C521084C9E3857D745CF14304442
31,588,973 UART: [art] SIG.R = 078599794301FE9B070DD7F901124890D1771B897DDB7CD4A6AD56204DF36DE99691613E3168BF76AA68D568CFB8BE6D
31,596,360 UART: [art] SIG.S = 6372192EB46E58CF41BFEBC39B0E623B2794394CDCC3D087EDABE9018E9B1EA9885E2E4B47A70125FE06EBCB154567F8
32,902,145 UART: Caliptra RT
32,902,887 UART: [state] CFI Enabled
33,079,704 UART: [rt] RT listening for mailbox commands...
33,111,939 UART: [rt]cmd =0x44504543, len=96
33,143,907 >>> mbox cmd response data (56 bytes)
33,144,869 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,175,776 UART: [rt]cmd =0x44504543, len=96
33,206,998 >>> mbox cmd response data (56 bytes)
33,207,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,238,376 UART: [rt]cmd =0x44504543, len=96
33,270,401 >>> mbox cmd response data (56 bytes)
33,271,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,301,626 UART: [rt]cmd =0x44504543, len=96
33,334,166 >>> mbox cmd response data (56 bytes)
33,334,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,365,399 UART: [rt]cmd =0x44504543, len=96
33,397,503 >>> mbox cmd response data (56 bytes)
33,398,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,428,571 UART: [rt]cmd =0x44504543, len=96
33,461,131 >>> mbox cmd response data (56 bytes)
33,461,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,492,584 UART: [rt]cmd =0x44504543, len=96
33,523,951 >>> mbox cmd response data (56 bytes)
33,524,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,555,036 UART: [rt]cmd =0x44504543, len=96
33,587,592 >>> mbox cmd response data (56 bytes)
33,588,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,618,849 UART: [rt]cmd =0x44504543, len=96
33,649,819 >>> mbox cmd response data (56 bytes)
33,650,500 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,681,301 UART: [rt]cmd =0x44504543, len=96
33,713,622 >>> mbox cmd response data (56 bytes)
33,714,308 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,744,582 UART: [rt]cmd =0x44504543, len=96
33,776,329 >>> mbox cmd response data (56 bytes)
33,777,044 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,807,574 UART: [rt]cmd =0x44504543, len=96
33,839,927 >>> mbox cmd response data (56 bytes)
33,841,208 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,871,087 UART: [rt]cmd =0x52435458, len=8
33,873,425 >>> mbox cmd response data (16 bytes)
35,946,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,097,364 UART:
36,097,741 UART: Running Caliptra ROM ...
36,098,904 UART:
36,099,083 UART: [state] CFI Enabled
36,159,388 UART: [state] LifecycleState = Unprovisioned
36,161,331 UART: [state] DebugLocked = No
36,163,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,168,157 UART: [kat] SHA2-256
36,337,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,348,370 UART: [kat] ++
36,348,860 UART: [kat] sha1
36,358,643 UART: [kat] SHA2-256
36,361,332 UART: [kat] SHA2-384
36,366,883 UART: [kat] SHA2-512-ACC
36,369,234 UART: [kat] ECC-384
38,662,062 UART: [kat] HMAC-384Kdf
38,674,194 UART: [kat] LMS
39,864,534 UART: [kat] --
39,869,379 UART: [update-reset] ++
44,059,491 UART: [update-reset] Image verified using Vendor ECC Key Index 0
44,063,383 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,461,158 >>> mbox cmd response: success
44,461,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,461,995 UART: [update-reset] Copying MAN_2 To MAN_1
44,484,178 UART: [update-reset Success] --
44,488,446 UART: [state] Locking Datavault
44,491,971 UART: [state] Locking PCR0, PCR1 and PCR31
44,493,725 UART: [state] Locking ICCM
44,496,169 UART: [exit] Launching FMC @ 0x40000130
44,504,610 UART:
44,504,852 UART: Running Caliptra FMC ...
44,505,876 UART:
44,506,023 UART: [state] CFI Enabled
44,593,350 UART: [art] Extend RT PCRs Done
44,594,554 UART: [art] Lock RT PCRs Done
44,596,089 UART: [art] Populate DV Done
44,601,659 UART: [fht] FMC Alias Private Key: 7
44,603,249 UART: [art] Derive CDI
44,604,061 UART: [art] Store in slot 0x4
44,661,890 UART: [art] Derive Key Pair
44,662,927 UART: [art] Store priv key in slot 0x5
47,956,006 UART: [art] Derive Key Pair - Done
47,968,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,257,176 UART: [art] Erasing AUTHORITY.KEYID = 7
50,258,685 UART: [art] PUB.X = ECD8273E9FE0B843ACED0020D38B8E231B94FEBF9D8DBE8117664B52C387A59A51ECD07F94122F789C162600E83BE8E1
50,265,924 UART: [art] PUB.Y = 555520E8C4D79A75E04CACE41F583F62730FA8EACB9F5E6D1E73C9FF79C8768671646F06206D1384B794BE57388A45F9
50,273,157 UART: [art] SIG.R = 1C306D9D423CF7479593BD475B128D3AEE6B5F5B213A1E4AAE0138A5218CC68711C10FD5101878EC3BBF5385099DB71C
50,280,541 UART: [art] SIG.S = 8892173D9A2A125425DF848235801451BBCBE0B22351C50162F192792B27C1D96C55B72ABC6052F30FEEC52011F49E95
51,585,819 UART: Caliptra RT
51,586,533 UART: [state] CFI Enabled
51,990,122 UART: [rt] RT listening for mailbox commands...
52,021,964 UART: [rt]cmd =0x44504543, len=96
52,053,529 >>> mbox cmd response data (56 bytes)
52,054,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,084,982 UART: [rt]cmd =0x44504543, len=96
52,117,518 >>> mbox cmd response data (56 bytes)
52,118,213 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,148,799 UART: [rt]cmd =0x44504543, len=96
52,180,986 >>> mbox cmd response data (56 bytes)
52,181,712 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,212,300 UART: [rt]cmd =0x44504543, len=96
52,244,097 >>> mbox cmd response data (56 bytes)
52,244,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,275,362 UART: [rt]cmd =0x44504543, len=96
52,306,948 >>> mbox cmd response data (56 bytes)
52,307,621 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,338,015 UART: [rt]cmd =0x44504543, len=96
52,370,775 >>> mbox cmd response data (56 bytes)
52,371,460 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,401,834 UART: [rt]cmd =0x44504543, len=96
52,434,371 >>> mbox cmd response data (56 bytes)
52,435,050 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,465,630 UART: [rt]cmd =0x44504543, len=96
52,497,439 >>> mbox cmd response data (56 bytes)
52,498,164 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,528,852 UART: [rt]cmd =0x44504543, len=96
52,560,445 >>> mbox cmd response data (56 bytes)
52,561,161 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,591,798 UART: [rt]cmd =0x44504543, len=96
52,623,816 >>> mbox cmd response data (56 bytes)
52,624,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,654,923 UART: [rt]cmd =0x44504543, len=96
52,661,481 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,805,529 ready_for_fw is high
3,805,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,934 >>> mbox cmd response: success
17,959,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,654,026 UART:
23,654,421 UART: Running Caliptra FMC ...
23,655,540 UART:
23,655,691 UART: [state] CFI Enabled
23,721,271 UART: [fht] FMC Alias Private Key: 7
26,060,872 UART: [art] Extend RT PCRs Done
26,062,120 UART: [art] Lock RT PCRs Done
26,063,674 UART: [art] Populate DV Done
26,068,825 UART: [fht] FMC Alias Private Key: 7
26,070,429 UART: [art] Derive CDI
26,071,172 UART: [art] Store in slot 0x4
26,128,406 UART: [art] Derive Key Pair
26,129,441 UART: [art] Store priv key in slot 0x5
29,422,259 UART: [art] Derive Key Pair - Done
29,435,317 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,686 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,209 UART: [art] PUB.X = DA3D00448CCE65369EC94993AFDFE8972F37F2B0C67C2D40E8894EB9AA29F4C81A8A7B998E858335619BA02C434C500F
31,733,460 UART: [art] PUB.Y = 785C32A78C156800DD39977441EFAE6F61743B683C33BD6D84FDA8BAC3BA0CD555023537E2CAB8593931F1DBF686B385
31,740,689 UART: [art] SIG.R = A0C09BDEFFE88279AC6CC7CF2C717109B4B1C41B4AE348EDD9A0E5000FCB96D50130AD320F39A73C56776C7657A3387E
31,748,078 UART: [art] SIG.S = AB4DE6E6F09758611EBBB48681BA6F96A9EED0833F85FD7D31F4EB75774260A51174302CE35191BD8455EBCEB74FCFAB
33,053,022 UART: Caliptra RT
33,053,729 UART: [state] CFI Enabled
33,230,030 UART: [rt] RT listening for mailbox commands...
33,262,164 UART: [rt]cmd =0x44504543, len=96
33,294,509 >>> mbox cmd response data (56 bytes)
33,295,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,326,124 UART: [rt]cmd =0x44504543, len=96
33,358,449 >>> mbox cmd response data (56 bytes)
33,359,134 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,389,600 UART: [rt]cmd =0x44504543, len=96
33,421,426 >>> mbox cmd response data (56 bytes)
33,422,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,452,609 UART: [rt]cmd =0x44504543, len=96
33,484,802 >>> mbox cmd response data (56 bytes)
33,485,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,516,052 UART: [rt]cmd =0x44504543, len=96
33,548,055 >>> mbox cmd response data (56 bytes)
33,548,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,579,265 UART: [rt]cmd =0x44504543, len=96
33,611,335 >>> mbox cmd response data (56 bytes)
33,612,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,642,559 UART: [rt]cmd =0x44504543, len=96
33,674,874 >>> mbox cmd response data (56 bytes)
33,675,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,706,127 UART: [rt]cmd =0x44504543, len=96
33,738,241 >>> mbox cmd response data (56 bytes)
33,738,925 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,769,456 UART: [rt]cmd =0x44504543, len=96
33,802,204 >>> mbox cmd response data (56 bytes)
33,802,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,833,509 UART: [rt]cmd =0x44504543, len=96
33,865,634 >>> mbox cmd response data (56 bytes)
33,866,313 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,896,786 UART: [rt]cmd =0x44504543, len=96
33,929,101 >>> mbox cmd response data (56 bytes)
33,929,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,960,609 UART: [rt]cmd =0x44504543, len=96
33,992,124 >>> mbox cmd response data (56 bytes)
33,993,408 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
34,023,287 UART: [rt]cmd =0x52435458, len=8
34,025,354 >>> mbox cmd response data (16 bytes)
36,097,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,927,848 >>> mbox cmd response: success
44,928,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,960,400 UART:
44,960,702 UART: Running Caliptra FMC ...
44,961,734 UART:
44,961,886 UART: [state] CFI Enabled
45,067,676 UART: [art] Extend RT PCRs Done
45,068,883 UART: [art] Lock RT PCRs Done
45,070,210 UART: [art] Populate DV Done
45,076,007 UART: [fht] FMC Alias Private Key: 7
45,077,605 UART: [art] Derive CDI
45,078,345 UART: [art] Store in slot 0x4
45,136,707 UART: [art] Derive Key Pair
45,137,724 UART: [art] Store priv key in slot 0x5
48,430,610 UART: [art] Derive Key Pair - Done
48,443,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,732,308 UART: [art] Erasing AUTHORITY.KEYID = 7
50,733,820 UART: [art] PUB.X = D1D3863D6CBD6A89E85F4E6E24AC3A16C68E6FB7A4B99047817DEB89037B39D5CB9DE1AE0C183C07ED8D5D9DDCAA4E16
50,741,114 UART: [art] PUB.Y = F44F44729A48312F1B4D503324EA3C53DB98A11DBEE779FFF4B146B5A5828721BB16DA74D7E98B2AC4C90CB9B2F65A02
50,748,371 UART: [art] SIG.R = B06B2BE9F81225321313194AFDCD2D69F7D338CAAC94D0E532B607A989A51BD77DA92342F946BC7E63CD1EF14C977217
50,755,828 UART: [art] SIG.S = 02EEEFC5D10B87AB7587B4762FF1F86C26D3B2754FFC200FCC2B88AFFBD964F13B38822159EAA631BF041B8C24C408C2
52,061,472 UART: Caliptra RT
52,062,189 UART: [state] CFI Enabled
52,468,728 UART: [rt] RT listening for mailbox commands...
52,500,594 UART: [rt]cmd =0x44504543, len=96
52,532,827 >>> mbox cmd response data (56 bytes)
52,533,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,564,354 UART: [rt]cmd =0x44504543, len=96
52,596,550 >>> mbox cmd response data (56 bytes)
52,597,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,627,992 UART: [rt]cmd =0x44504543, len=96
52,660,280 >>> mbox cmd response data (56 bytes)
52,660,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,691,600 UART: [rt]cmd =0x44504543, len=96
52,723,813 >>> mbox cmd response data (56 bytes)
52,724,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,755,028 UART: [rt]cmd =0x44504543, len=96
52,786,642 >>> mbox cmd response data (56 bytes)
52,787,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,818,004 UART: [rt]cmd =0x44504543, len=96
52,850,307 >>> mbox cmd response data (56 bytes)
52,851,023 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,881,719 UART: [rt]cmd =0x44504543, len=96
52,913,908 >>> mbox cmd response data (56 bytes)
52,914,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,945,067 UART: [rt]cmd =0x44504543, len=96
52,976,814 >>> mbox cmd response data (56 bytes)
52,977,489 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,008,194 UART: [rt]cmd =0x44504543, len=96
53,040,409 >>> mbox cmd response data (56 bytes)
53,041,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,071,702 UART: [rt]cmd =0x44504543, len=96
53,103,852 >>> mbox cmd response data (56 bytes)
53,104,535 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
53,135,114 UART: [rt]cmd =0x44504543, len=96
53,141,939 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,367 UART:
192,731 UART: Running Caliptra ROM ...
193,828 UART:
603,542 UART: [state] CFI Enabled
615,433 UART: [state] LifecycleState = Unprovisioned
617,370 UART: [state] DebugLocked = No
619,309 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,605 UART: [kat] SHA2-256
793,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,918 UART: [kat] ++
804,357 UART: [kat] sha1
816,359 UART: [kat] SHA2-256
819,026 UART: [kat] SHA2-384
824,379 UART: [kat] SHA2-512-ACC
826,767 UART: [kat] ECC-384
3,110,073 UART: [kat] HMAC-384Kdf
3,122,540 UART: [kat] LMS
4,312,653 UART: [kat] --
4,319,084 UART: [cold-reset] ++
4,320,232 UART: [fht] Storing FHT @ 0x50003400
4,332,058 UART: [idev] ++
4,332,613 UART: [idev] CDI.KEYID = 6
4,333,592 UART: [idev] SUBJECT.KEYID = 7
4,334,830 UART: [idev] UDS.KEYID = 0
4,335,888 ready_for_fw is high
4,336,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,029 UART: [idev] Erasing UDS.KEYID = 0
7,621,442 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,992 UART: [idev] --
7,646,846 UART: [ldev] ++
7,647,423 UART: [ldev] CDI.KEYID = 6
7,648,436 UART: [ldev] SUBJECT.KEYID = 5
7,649,586 UART: [ldev] AUTHORITY.KEYID = 7
7,650,860 UART: [ldev] FE.KEYID = 1
7,662,738 UART: [ldev] Erasing FE.KEYID = 1
10,952,074 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,945 UART: [ldev] --
13,313,821 UART: [fwproc] Waiting for Commands...
13,316,130 UART: [fwproc] Received command 0x46574c44
13,318,358 UART: [fwproc] Received Image of size 118548 bytes
17,420,789 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,648 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,848 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,614 >>> mbox cmd response: success
17,899,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,902,659 UART: [afmc] ++
17,903,239 UART: [afmc] CDI.KEYID = 6
17,904,204 UART: [afmc] SUBJECT.KEYID = 7
17,905,407 UART: [afmc] AUTHORITY.KEYID = 5
21,222,748 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,514,052 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,720 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,437 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,917 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,400 UART: [afmc] --
23,585,901 UART: [cold-reset] --
23,590,795 UART: [state] Locking Datavault
23,595,006 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,698 UART: [state] Locking ICCM
23,598,492 UART: [exit] Launching FMC @ 0x40000130
23,606,878 UART:
23,607,115 UART: Running Caliptra FMC ...
23,608,210 UART:
23,608,361 UART: [state] CFI Enabled
23,616,075 UART: [fht] FMC Alias Private Key: 7
25,956,382 UART: [art] Extend RT PCRs Done
25,957,610 UART: [art] Lock RT PCRs Done
25,959,102 UART: [art] Populate DV Done
25,964,400 UART: [fht] FMC Alias Private Key: 7
25,965,934 UART: [art] Derive CDI
25,966,664 UART: [art] Store in slot 0x4
26,008,887 UART: [art] Derive Key Pair
26,009,889 UART: [art] Store priv key in slot 0x5
29,251,568 UART: [art] Derive Key Pair - Done
29,264,349 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,870 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,373 UART: [art] PUB.X = 50DDD803958FDA9FF2DBE7EB69DBF7683F242551B0B506D7A4348AB5A56C7EBA8760634CDF72A884611371AC4EB6612E
31,553,684 UART: [art] PUB.Y = 94440E42B196B7D7D1B080FB46E342333DC0CFBD3FE758A6A3B9F4D70AE2B514A3E789EF7C5EC654D93117D5AAE63C2A
31,560,915 UART: [art] SIG.R = 585E3B79D6E4016942CC348FF607FD42AE36CAE0A951BA7867DDAD8505FCDBAD9951EEDF61876C3D3E52B6C39AEBEDC4
31,568,351 UART: [art] SIG.S = 43C35FCACB1C8D4355556F44C135165D74FE026D3C9EA759D984F5D2FC73859E5D24783F6951F56B6FD85404D87688AD
32,873,085 UART: Caliptra RT
32,873,831 UART: [state] CFI Enabled
33,007,152 UART: [rt] RT listening for mailbox commands...
33,039,221 UART: [rt]cmd =0x44504543, len=96
33,070,694 >>> mbox cmd response data (56 bytes)
33,071,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,102,109 UART: [rt]cmd =0x44504543, len=96
33,134,254 >>> mbox cmd response data (56 bytes)
33,134,942 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,165,438 UART: [rt]cmd =0x44504543, len=96
33,197,597 >>> mbox cmd response data (56 bytes)
33,198,284 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,228,785 UART: [rt]cmd =0x44504543, len=96
33,260,683 >>> mbox cmd response data (56 bytes)
33,261,375 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,291,898 UART: [rt]cmd =0x44504543, len=96
33,323,499 >>> mbox cmd response data (56 bytes)
33,324,228 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,354,706 UART: [rt]cmd =0x44504543, len=96
33,386,835 >>> mbox cmd response data (56 bytes)
33,387,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,418,017 UART: [rt]cmd =0x44504543, len=96
33,450,467 >>> mbox cmd response data (56 bytes)
33,451,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,481,808 UART: [rt]cmd =0x44504543, len=96
33,513,530 >>> mbox cmd response data (56 bytes)
33,514,207 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,544,674 UART: [rt]cmd =0x44504543, len=96
33,576,643 >>> mbox cmd response data (56 bytes)
33,577,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,607,935 UART: [rt]cmd =0x44504543, len=96
33,639,250 >>> mbox cmd response data (56 bytes)
33,639,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,670,434 UART: [rt]cmd =0x44504543, len=96
33,702,008 >>> mbox cmd response data (56 bytes)
33,702,684 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,733,237 UART: [rt]cmd =0x44504543, len=96
33,765,615 >>> mbox cmd response data (56 bytes)
33,766,807 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,796,807 UART: [rt]cmd =0x52435458, len=8
33,798,857 >>> mbox cmd response data (16 bytes)
35,868,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,019,575 UART:
36,019,934 UART: Running Caliptra ROM ...
36,020,986 UART:
36,021,193 UART: [state] CFI Enabled
36,036,184 UART: [state] LifecycleState = Unprovisioned
36,038,118 UART: [state] DebugLocked = No
36,040,883 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
36,044,978 UART: [kat] SHA2-256
36,214,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
36,225,243 UART: [kat] ++
36,225,700 UART: [kat] sha1
36,236,470 UART: [kat] SHA2-256
36,239,163 UART: [kat] SHA2-384
36,244,119 UART: [kat] SHA2-512-ACC
36,246,459 UART: [kat] ECC-384
38,530,289 UART: [kat] HMAC-384Kdf
38,541,926 UART: [kat] LMS
39,731,961 UART: [kat] --
39,736,565 UART: [update-reset] ++
43,925,572 UART: [update-reset] Image verified using Vendor ECC Key Index 0
43,928,648 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
44,326,404 >>> mbox cmd response: success
44,326,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,327,228 UART: [update-reset] Copying MAN_2 To MAN_1
44,349,197 UART: [update-reset Success] --
44,354,126 UART: [state] Locking Datavault
44,357,437 UART: [state] Locking PCR0, PCR1 and PCR31
44,359,187 UART: [state] Locking ICCM
44,360,497 UART: [exit] Launching FMC @ 0x40000130
44,368,936 UART:
44,369,171 UART: Running Caliptra FMC ...
44,370,196 UART:
44,370,340 UART: [state] CFI Enabled
44,414,883 UART: [art] Extend RT PCRs Done
44,416,013 UART: [art] Lock RT PCRs Done
44,417,437 UART: [art] Populate DV Done
44,422,782 UART: [fht] FMC Alias Private Key: 7
44,424,357 UART: [art] Derive CDI
44,425,084 UART: [art] Store in slot 0x4
44,468,055 UART: [art] Derive Key Pair
44,469,112 UART: [art] Store priv key in slot 0x5
47,711,094 UART: [art] Derive Key Pair - Done
47,724,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,004,373 UART: [art] Erasing AUTHORITY.KEYID = 7
50,005,889 UART: [art] PUB.X = B149438A36007D2878CAE11FF36C30F640FEE917270619BBD753EC36CA682BCB56575E2EAFCD8EDAF2FA49A81CE18515
50,013,195 UART: [art] PUB.Y = A3AC82A6D7C1C38D42B71694D0F71B6FAA612EAC4D5AEEB735400B951D7008DDEA449AB1A6FD84F95DE47654333574A7
50,020,420 UART: [art] SIG.R = FDDB7215DFC8047774F8F95202334666503E61758354F1800BEDA8CE27F5AB1B9667DA8F44F23D666FDEF105B705B81B
50,027,846 UART: [art] SIG.S = 13B29865E1BF954627ED5C6AD6F15E876C0872867C48E48C2145C4706F4A2D557776D529E23FA639BE017410E409E8B1
51,332,579 UART: Caliptra RT
51,333,268 UART: [state] CFI Enabled
51,698,652 UART: [rt] RT listening for mailbox commands...
51,730,547 UART: [rt]cmd =0x44504543, len=96
51,762,212 >>> mbox cmd response data (56 bytes)
51,763,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,793,691 UART: [rt]cmd =0x44504543, len=96
51,826,124 >>> mbox cmd response data (56 bytes)
51,826,832 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,857,364 UART: [rt]cmd =0x44504543, len=96
51,889,928 >>> mbox cmd response data (56 bytes)
51,890,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,921,122 UART: [rt]cmd =0x44504543, len=96
51,953,111 >>> mbox cmd response data (56 bytes)
51,953,853 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
51,984,327 UART: [rt]cmd =0x44504543, len=96
52,015,760 >>> mbox cmd response data (56 bytes)
52,016,436 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,046,769 UART: [rt]cmd =0x44504543, len=96
52,078,987 >>> mbox cmd response data (56 bytes)
52,079,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,110,319 UART: [rt]cmd =0x44504543, len=96
52,142,154 >>> mbox cmd response data (56 bytes)
52,142,867 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,173,306 UART: [rt]cmd =0x44504543, len=96
52,205,315 >>> mbox cmd response data (56 bytes)
52,206,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,237,045 UART: [rt]cmd =0x44504543, len=96
52,269,992 >>> mbox cmd response data (56 bytes)
52,270,701 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,301,225 UART: [rt]cmd =0x44504543, len=96
52,333,066 >>> mbox cmd response data (56 bytes)
52,333,736 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,364,271 UART: [rt]cmd =0x44504543, len=96
52,371,078 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,127,699 ready_for_fw is high
4,128,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,526 >>> mbox cmd response: success
18,165,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,803,788 UART:
23,804,208 UART: Running Caliptra FMC ...
23,805,321 UART:
23,805,475 UART: [state] CFI Enabled
23,813,160 UART: [fht] FMC Alias Private Key: 7
26,153,097 UART: [art] Extend RT PCRs Done
26,154,330 UART: [art] Lock RT PCRs Done
26,156,027 UART: [art] Populate DV Done
26,161,668 UART: [fht] FMC Alias Private Key: 7
26,163,317 UART: [art] Derive CDI
26,164,130 UART: [art] Store in slot 0x4
26,206,461 UART: [art] Derive Key Pair
26,207,504 UART: [art] Store priv key in slot 0x5
29,449,815 UART: [art] Derive Key Pair - Done
29,463,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,536 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,045 UART: [art] PUB.X = F5345D0CE70473B5266587A8CC917D8199B7E83771A29847C8231F52017A447732F76CA31C72584AB9ECC408F033489F
31,752,295 UART: [art] PUB.Y = 390EF31378D884992C93093ACD12548EF2BCEA59731DA757BAF2DEF3D4203D700FC73D7EFD60E3E3E71AA79E74C4DF49
31,759,537 UART: [art] SIG.R = 36D1361429450566BB846AD0FA3F2D8EB47FD656D7E9B0755F3E657D3ABECFA03EB6455693AEA335F0EE433021D393CE
31,766,934 UART: [art] SIG.S = E611D7224E8425AA4871E211C92E7B60565A85DA991AF5A071BB52E338556F1FB30BC3AE9315992E46C21B7578CE30F7
33,071,931 UART: Caliptra RT
33,072,635 UART: [state] CFI Enabled
33,206,218 UART: [rt] RT listening for mailbox commands...
33,238,013 UART: [rt]cmd =0x44504543, len=96
33,270,604 >>> mbox cmd response data (56 bytes)
33,271,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,302,168 UART: [rt]cmd =0x44504543, len=96
33,333,789 >>> mbox cmd response data (56 bytes)
33,334,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,364,963 UART: [rt]cmd =0x44504543, len=96
33,396,665 >>> mbox cmd response data (56 bytes)
33,397,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,427,753 UART: [rt]cmd =0x44504543, len=96
33,459,832 >>> mbox cmd response data (56 bytes)
33,460,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,491,288 UART: [rt]cmd =0x44504543, len=96
33,522,894 >>> mbox cmd response data (56 bytes)
33,523,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,554,220 UART: [rt]cmd =0x44504543, len=96
33,585,101 >>> mbox cmd response data (56 bytes)
33,585,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,616,308 UART: [rt]cmd =0x44504543, len=96
33,648,115 >>> mbox cmd response data (56 bytes)
33,648,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,679,463 UART: [rt]cmd =0x44504543, len=96
33,710,620 >>> mbox cmd response data (56 bytes)
33,711,331 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,741,966 UART: [rt]cmd =0x44504543, len=96
33,773,984 >>> mbox cmd response data (56 bytes)
33,774,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,805,165 UART: [rt]cmd =0x44504543, len=96
33,837,240 >>> mbox cmd response data (56 bytes)
33,837,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,868,359 UART: [rt]cmd =0x44504543, len=96
33,900,363 >>> mbox cmd response data (56 bytes)
33,901,068 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,931,923 UART: [rt]cmd =0x44504543, len=96
33,964,004 >>> mbox cmd response data (56 bytes)
33,965,342 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
33,995,130 UART: [rt]cmd =0x52435458, len=8
33,997,300 >>> mbox cmd response data (16 bytes)
36,066,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,815,869 >>> mbox cmd response: success
44,816,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,850,318 UART:
44,850,632 UART: Running Caliptra FMC ...
44,851,689 UART:
44,851,838 UART: [state] CFI Enabled
44,895,751 UART: [art] Extend RT PCRs Done
44,896,894 UART: [art] Lock RT PCRs Done
44,898,367 UART: [art] Populate DV Done
44,903,879 UART: [fht] FMC Alias Private Key: 7
44,905,535 UART: [art] Derive CDI
44,906,267 UART: [art] Store in slot 0x4
44,948,476 UART: [art] Derive Key Pair
44,949,476 UART: [art] Store priv key in slot 0x5
48,191,452 UART: [art] Derive Key Pair - Done
48,204,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
50,484,535 UART: [art] Erasing AUTHORITY.KEYID = 7
50,486,042 UART: [art] PUB.X = 9D3C98F7BA82E5AE29A0AE6C57FEA15F5EAE996C27F9387679CDF07597641AC96FDC315BA3C4CFCFD01D9EA092F7A679
50,493,296 UART: [art] PUB.Y = 41F6F8305BCFEFCADDEB9F1B24D48D78855865187FEBAEEB4683BA8996FE462D6F287D24FD2F1279AADC74183B3297EE
50,500,620 UART: [art] SIG.R = 6FAFC3746099BFA4647F95302A1631A9CC19B9F9769244A45367EB95D1EFA8A837092E586E017D1AA6BDBA0B70205B1A
50,508,035 UART: [art] SIG.S = 75F4CA2787CF82383591A8F67BCDE2D62A03FB44ACD5C700B1161F85FA6928D3D8657B833E4AC5CE436ECBEB9F039EEE
51,813,595 UART: Caliptra RT
51,814,281 UART: [state] CFI Enabled
52,167,513 UART: [rt] RT listening for mailbox commands...
52,199,437 UART: [rt]cmd =0x44504543, len=96
52,231,927 >>> mbox cmd response data (56 bytes)
52,232,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,263,236 UART: [rt]cmd =0x44504543, len=96
52,295,183 >>> mbox cmd response data (56 bytes)
52,295,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,326,300 UART: [rt]cmd =0x44504543, len=96
52,357,511 >>> mbox cmd response data (56 bytes)
52,358,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,388,754 UART: [rt]cmd =0x44504543, len=96
52,420,508 >>> mbox cmd response data (56 bytes)
52,421,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,451,877 UART: [rt]cmd =0x44504543, len=96
52,484,004 >>> mbox cmd response data (56 bytes)
52,484,686 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,515,068 UART: [rt]cmd =0x44504543, len=96
52,547,248 >>> mbox cmd response data (56 bytes)
52,547,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,578,817 UART: [rt]cmd =0x44504543, len=96
52,611,133 >>> mbox cmd response data (56 bytes)
52,611,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,642,395 UART: [rt]cmd =0x44504543, len=96
52,674,852 >>> mbox cmd response data (56 bytes)
52,675,572 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,706,154 UART: [rt]cmd =0x44504543, len=96
52,737,738 >>> mbox cmd response data (56 bytes)
52,738,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,768,892 UART: [rt]cmd =0x44504543, len=96
52,800,692 >>> mbox cmd response data (56 bytes)
52,801,378 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
52,831,645 UART: [rt]cmd =0x44504543, len=96
52,838,458 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
192,231 UART:
192,602 UART: Running Caliptra ROM ...
193,793 UART:
193,945 UART: [state] CFI Enabled
261,317 UART: [state] LifecycleState = Unprovisioned
263,331 UART: [state] DebugLocked = No
265,562 UART: [state] WD Timer not started. Device not locked for debugging
269,315 UART: [kat] SHA2-256
448,962 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,697 UART: [kat] ++
460,143 UART: [kat] sha1
469,950 UART: [kat] SHA2-256
472,662 UART: [kat] SHA2-384
478,745 UART: [kat] SHA2-512-ACC
481,161 UART: [kat] ECC-384
2,945,635 UART: [kat] HMAC-384Kdf
2,969,394 UART: [kat] LMS
3,445,959 UART: [kat] --
3,449,527 UART: [cold-reset] ++
3,450,962 UART: [fht] FHT @ 0x50003400
3,462,003 UART: [idev] ++
3,462,576 UART: [idev] CDI.KEYID = 6
3,463,602 UART: [idev] SUBJECT.KEYID = 7
3,464,772 UART: [idev] UDS.KEYID = 0
3,465,694 ready_for_fw is high
3,465,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,614,943 UART: [idev] Erasing UDS.KEYID = 0
5,982,543 UART: [idev] Sha1 KeyId Algorithm
6,007,276 UART: [idev] --
6,011,193 UART: [ldev] ++
6,011,768 UART: [ldev] CDI.KEYID = 6
6,012,696 UART: [ldev] SUBJECT.KEYID = 5
6,013,861 UART: [ldev] AUTHORITY.KEYID = 7
6,015,144 UART: [ldev] FE.KEYID = 1
6,055,812 UART: [ldev] Erasing FE.KEYID = 1
8,562,750 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,420 UART: [ldev] --
10,372,545 UART: [fwproc] Wait for Commands...
10,374,630 UART: [fwproc] Recv command 0x46574c44
10,376,665 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,674 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,676 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,347,496 >>> mbox cmd response: success
14,348,576 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,351,044 UART: [afmc] ++
14,351,633 UART: [afmc] CDI.KEYID = 6
14,352,658 UART: [afmc] SUBJECT.KEYID = 7
14,353,812 UART: [afmc] AUTHORITY.KEYID = 5
16,892,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,634,060 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,636,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,652,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,668,137 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,683,684 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,707,806 UART: [afmc] --
18,711,181 UART: [cold-reset] --
18,714,658 UART: [state] Locking Datavault
18,719,420 UART: [state] Locking PCR0, PCR1 and PCR31
18,721,180 UART: [state] Locking ICCM
18,723,499 UART: [exit] Launching FMC @ 0x40000130
18,731,946 UART:
18,732,175 UART: Running Caliptra FMC ...
18,733,273 UART:
18,733,437 UART: [state] CFI Enabled
18,792,956 UART: [fht] FMC Alias Private Key: 7
20,559,887 UART: [art] Extend RT PCRs Done
20,561,105 UART: [art] Lock RT PCRs Done
20,562,586 UART: [art] Populate DV Done
20,568,368 UART: [fht] FMC Alias Private Key: 7
20,570,118 UART: [art] Derive CDI
20,570,851 UART: [art] Store in slot 0x4
20,626,089 UART: [art] Derive Key Pair
20,627,089 UART: [art] Store priv key in slot 0x5
23,089,731 UART: [art] Derive Key Pair - Done
23,102,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,816,385 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,884 UART: [art] PUB.X = BF6351661863F81B1784CDABF934EC92BB194ED3968AD281FC43637574E2CB12AB5613F8B2DC2846F32802FEF1FCE4A7
24,825,181 UART: [art] PUB.Y = 07589DA1AE346331771F8AA7CB06DBB85E0E0923EB89C83B63570CB85CCDC1B2519672C75B6973D4F8796AE7FF08F044
24,832,415 UART: [art] SIG.R = 0B686E19DC2A9338223605878F9BD9FEAAB511FE05FF2C7816A837C7DF902582AB9AD95C802F61001A34C213E367FB8E
24,839,807 UART: [art] SIG.S = 9A7150A70B963717BE1546B5E7D1414C7C6C28705DA62DB1264E45FDB3C6D67E034269E744302123129B1316E70839F2
25,818,532 UART: Caliptra RT
25,819,249 UART: [state] CFI Enabled
25,999,044 UART: [rt] RT listening for mailbox commands...
26,030,891 UART: [rt]cmd =0x44504543, len=96
26,063,343 >>> mbox cmd response data (56 bytes)
26,064,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,094,985 UART: [rt]cmd =0x44504543, len=96
26,126,713 >>> mbox cmd response data (56 bytes)
26,127,415 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,158,160 UART: [rt]cmd =0x44504543, len=96
26,189,627 >>> mbox cmd response data (56 bytes)
26,190,315 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,220,950 UART: [rt]cmd =0x44504543, len=96
26,252,645 >>> mbox cmd response data (56 bytes)
26,253,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,284,057 UART: [rt]cmd =0x44504543, len=96
26,315,426 >>> mbox cmd response data (56 bytes)
26,316,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,346,599 UART: [rt]cmd =0x44504543, len=96
26,376,920 >>> mbox cmd response data (56 bytes)
26,377,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,408,089 UART: [rt]cmd =0x44504543, len=96
26,439,817 >>> mbox cmd response data (56 bytes)
26,440,502 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,471,186 UART: [rt]cmd =0x44504543, len=96
26,503,532 >>> mbox cmd response data (56 bytes)
26,504,264 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,534,522 UART: [rt]cmd =0x44504543, len=96
26,565,843 >>> mbox cmd response data (56 bytes)
26,566,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,597,300 UART: [rt]cmd =0x44504543, len=96
26,629,525 >>> mbox cmd response data (56 bytes)
26,630,198 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,660,730 UART: [rt]cmd =0x44504543, len=96
26,693,961 >>> mbox cmd response data (56 bytes)
26,694,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,725,232 UART: [rt]cmd =0x44504543, len=96
26,757,168 >>> mbox cmd response data (56 bytes)
26,758,249 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,788,124 UART: [rt]cmd =0x52435458, len=8
26,790,293 >>> mbox cmd response data (16 bytes)
28,847,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,998,226 UART:
28,998,642 UART: Running Caliptra ROM ...
28,999,692 UART:
28,999,852 UART: [state] CFI Enabled
29,062,703 UART: [state] LifecycleState = Unprovisioned
29,064,643 UART: [state] DebugLocked = No
29,067,061 UART: [state] WD Timer not started. Device not locked for debugging
29,071,671 UART: [kat] SHA2-256
29,251,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,262,125 UART: [kat] ++
29,262,661 UART: [kat] sha1
29,273,278 UART: [kat] SHA2-256
29,275,985 UART: [kat] SHA2-384
29,282,119 UART: [kat] SHA2-512-ACC
29,284,478 UART: [kat] ECC-384
31,742,748 UART: [kat] HMAC-384Kdf
31,767,459 UART: [kat] LMS
32,243,898 UART: [kat] --
32,247,831 UART: [update-reset] ++
35,751,662 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,754,561 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,152,176 >>> mbox cmd response: success
36,152,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,153,645 UART: [update-reset] Copying MAN_2 To MAN_1
36,190,736 UART: [update-reset Success] --
36,194,677 UART: [state] Locking Datavault
36,198,745 UART: [state] Locking PCR0, PCR1 and PCR31
36,200,504 UART: [state] Locking ICCM
36,201,766 UART: [exit] Launching FMC @ 0x40000130
36,210,164 UART:
36,210,396 UART: Running Caliptra FMC ...
36,211,491 UART:
36,211,645 UART: [state] CFI Enabled
36,299,945 UART: [art] Extend RT PCRs Done
36,301,122 UART: [art] Lock RT PCRs Done
36,302,355 UART: [art] Populate DV Done
36,307,430 UART: [fht] FMC Alias Private Key: 7
36,309,014 UART: [art] Derive CDI
36,309,826 UART: [art] Store in slot 0x4
36,368,786 UART: [art] Derive Key Pair
36,369,823 UART: [art] Store priv key in slot 0x5
38,832,943 UART: [art] Derive Key Pair - Done
38,846,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,557,807 UART: [art] Erasing AUTHORITY.KEYID = 7
40,559,348 UART: [art] PUB.X = 809D2AF320BF4580EE321D239F2F0AFA1717F9EE02D7DAFE50AA081F4CFEE7EC02912098B49E093C0AC3B17720048AF5
40,566,603 UART: [art] PUB.Y = 724C0A60966027BC6264C61FA0FA1CDD2B0B6C4B86D476CAD9E16F00784C40E5CE559A42068D3C3D70D00788374CE587
40,573,831 UART: [art] SIG.R = 1842FE3AA6F9DB45F792176C69368757DB43170CE76946536D3F6297D90531F51C7DDE00B52AF64366A200AEF4483266
40,581,178 UART: [art] SIG.S = 2817400B5F18E681596E18DCD41CF2A1A37A530BA8CF883D9CBEEF1FFACA3FDDB081EA37A483630610AFBBE1466B01B2
41,560,258 UART: Caliptra RT
41,560,949 UART: [state] CFI Enabled
41,971,041 UART: [rt] RT listening for mailbox commands...
42,002,854 UART: [rt]cmd =0x44504543, len=96
42,035,120 >>> mbox cmd response data (56 bytes)
42,036,014 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,066,779 UART: [rt]cmd =0x44504543, len=96
42,098,656 >>> mbox cmd response data (56 bytes)
42,099,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,129,935 UART: [rt]cmd =0x44504543, len=96
42,161,752 >>> mbox cmd response data (56 bytes)
42,162,475 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,193,078 UART: [rt]cmd =0x44504543, len=96
42,225,317 >>> mbox cmd response data (56 bytes)
42,225,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,256,253 UART: [rt]cmd =0x44504543, len=96
42,289,122 >>> mbox cmd response data (56 bytes)
42,289,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,320,205 UART: [rt]cmd =0x44504543, len=96
42,351,721 >>> mbox cmd response data (56 bytes)
42,352,406 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,382,877 UART: [rt]cmd =0x44504543, len=96
42,415,061 >>> mbox cmd response data (56 bytes)
42,415,777 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,446,414 UART: [rt]cmd =0x44504543, len=96
42,478,223 >>> mbox cmd response data (56 bytes)
42,478,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,509,680 UART: [rt]cmd =0x44504543, len=96
42,542,037 >>> mbox cmd response data (56 bytes)
42,542,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,573,093 UART: [rt]cmd =0x44504543, len=96
42,605,737 >>> mbox cmd response data (56 bytes)
42,606,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,636,967 UART: [rt]cmd =0x44504543, len=96
42,643,943 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,461,254 ready_for_fw is high
3,461,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,235,219 >>> mbox cmd response: success
14,236,542 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,514,051 UART:
18,514,458 UART: Running Caliptra FMC ...
18,515,571 UART:
18,515,730 UART: [state] CFI Enabled
18,583,506 UART: [fht] FMC Alias Private Key: 7
20,349,669 UART: [art] Extend RT PCRs Done
20,350,902 UART: [art] Lock RT PCRs Done
20,352,148 UART: [art] Populate DV Done
20,357,625 UART: [fht] FMC Alias Private Key: 7
20,359,272 UART: [art] Derive CDI
20,360,084 UART: [art] Store in slot 0x4
20,416,030 UART: [art] Derive Key Pair
20,417,079 UART: [art] Store priv key in slot 0x5
22,879,728 UART: [art] Derive Key Pair - Done
22,892,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,607,123 UART: [art] PUB.X = D0F971347604C333E42577F1EC230E3B3DC840D8F2FF8220CF45614F4FC6213E3881CA1A66BF0346E0D973372F95FE94
24,614,400 UART: [art] PUB.Y = 9BC0DB025A21CB2C2ECC401B1CCF802269670C0278627FDCA559838305C10255E8C9DE00B54A087C54A1241A7240A09B
24,621,562 UART: [art] SIG.R = FABCD5AA8592EBC462E7A430A763F5E59ECAC87860D3EC6C952822C6A1F3386E190E0C3D186C9424B7DC7BBC46E7300C
24,629,015 UART: [art] SIG.S = BEB9819C261376CA70A5727E2D01E7EBCF5716B3FB212C5A6E0C795317A264ACB4A60ED7F18C71F4A3A773DB8C4C15CF
25,608,319 UART: Caliptra RT
25,609,035 UART: [state] CFI Enabled
25,789,416 UART: [rt] RT listening for mailbox commands...
25,821,528 UART: [rt]cmd =0x44504543, len=96
25,852,648 >>> mbox cmd response data (56 bytes)
25,853,612 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,884,274 UART: [rt]cmd =0x44504543, len=96
25,915,981 >>> mbox cmd response data (56 bytes)
25,916,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,947,236 UART: [rt]cmd =0x44504543, len=96
25,979,640 >>> mbox cmd response data (56 bytes)
25,980,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,011,058 UART: [rt]cmd =0x44504543, len=96
26,042,701 >>> mbox cmd response data (56 bytes)
26,043,382 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,073,978 UART: [rt]cmd =0x44504543, len=96
26,105,856 >>> mbox cmd response data (56 bytes)
26,106,556 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,137,095 UART: [rt]cmd =0x44504543, len=96
26,168,873 >>> mbox cmd response data (56 bytes)
26,169,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,200,143 UART: [rt]cmd =0x44504543, len=96
26,233,364 >>> mbox cmd response data (56 bytes)
26,234,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,264,560 UART: [rt]cmd =0x44504543, len=96
26,296,209 >>> mbox cmd response data (56 bytes)
26,296,929 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,327,239 UART: [rt]cmd =0x44504543, len=96
26,359,305 >>> mbox cmd response data (56 bytes)
26,359,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,390,579 UART: [rt]cmd =0x44504543, len=96
26,422,301 >>> mbox cmd response data (56 bytes)
26,423,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,453,609 UART: [rt]cmd =0x44504543, len=96
26,485,487 >>> mbox cmd response data (56 bytes)
26,486,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,516,591 UART: [rt]cmd =0x44504543, len=96
26,548,177 >>> mbox cmd response data (56 bytes)
26,549,418 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,579,205 UART: [rt]cmd =0x52435458, len=8
26,581,440 >>> mbox cmd response data (16 bytes)
28,637,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,938,236 >>> mbox cmd response: success
35,938,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,972,403 UART:
35,972,884 UART: Running Caliptra FMC ...
35,974,023 UART:
35,974,204 UART: [state] CFI Enabled
36,065,595 UART: [art] Extend RT PCRs Done
36,066,783 UART: [art] Lock RT PCRs Done
36,067,997 UART: [art] Populate DV Done
36,073,356 UART: [fht] FMC Alias Private Key: 7
36,075,054 UART: [art] Derive CDI
36,075,791 UART: [art] Store in slot 0x4
36,134,636 UART: [art] Derive Key Pair
36,135,672 UART: [art] Store priv key in slot 0x5
38,598,816 UART: [art] Derive Key Pair - Done
38,611,711 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,324,471 UART: [art] Erasing AUTHORITY.KEYID = 7
40,325,976 UART: [art] PUB.X = B55E4DE0D25BF4D74B48D4203EC38BB3BC52D75075D9586EEA720AAF96712696C9E77AA987AF0B4200FFA7145EA97B45
40,333,255 UART: [art] PUB.Y = 9A208AF22E48D5BB80F9B2BF85F6D317C7CF99E3EB1820665910AC347A185B6E655A896DCC497D6AAB8A5237190E0B40
40,340,541 UART: [art] SIG.R = E4A58321C299778B12DEB8D3F5C5EA0A7DC318642C0A3E42E13414ECEC4252238A2D375B69637FA3168E9FF333763DA5
40,347,882 UART: [art] SIG.S = 6321D83ADF0A6055DCF76C7F6422E72D067F0A19608184AA4C5417EAFF3FD28D9BDB076933136358D702B7862649C639
41,327,004 UART: Caliptra RT
41,327,728 UART: [state] CFI Enabled
41,741,512 UART: [rt] RT listening for mailbox commands...
41,773,326 UART: [rt]cmd =0x44504543, len=96
41,805,133 >>> mbox cmd response data (56 bytes)
41,805,948 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,836,236 UART: [rt]cmd =0x44504543, len=96
41,867,324 >>> mbox cmd response data (56 bytes)
41,868,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,898,563 UART: [rt]cmd =0x44504543, len=96
41,930,888 >>> mbox cmd response data (56 bytes)
41,931,578 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,962,103 UART: [rt]cmd =0x44504543, len=96
41,993,877 >>> mbox cmd response data (56 bytes)
41,994,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,025,288 UART: [rt]cmd =0x44504543, len=96
42,056,795 >>> mbox cmd response data (56 bytes)
42,057,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,088,207 UART: [rt]cmd =0x44504543, len=96
42,120,110 >>> mbox cmd response data (56 bytes)
42,120,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,151,269 UART: [rt]cmd =0x44504543, len=96
42,183,696 >>> mbox cmd response data (56 bytes)
42,184,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,215,132 UART: [rt]cmd =0x44504543, len=96
42,247,187 >>> mbox cmd response data (56 bytes)
42,247,879 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,278,351 UART: [rt]cmd =0x44504543, len=96
42,309,938 >>> mbox cmd response data (56 bytes)
42,310,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,341,169 UART: [rt]cmd =0x44504543, len=96
42,373,580 >>> mbox cmd response data (56 bytes)
42,374,297 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,404,716 UART: [rt]cmd =0x44504543, len=96
42,411,545 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,303 UART:
192,666 UART: Running Caliptra ROM ...
193,786 UART:
603,442 UART: [state] CFI Enabled
621,127 UART: [state] LifecycleState = Unprovisioned
623,037 UART: [state] DebugLocked = No
624,797 UART: [state] WD Timer not started. Device not locked for debugging
627,927 UART: [kat] SHA2-256
807,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,373 UART: [kat] ++
818,820 UART: [kat] sha1
830,474 UART: [kat] SHA2-256
833,203 UART: [kat] SHA2-384
839,051 UART: [kat] SHA2-512-ACC
841,419 UART: [kat] ECC-384
3,284,446 UART: [kat] HMAC-384Kdf
3,296,965 UART: [kat] LMS
3,773,458 UART: [kat] --
3,778,489 UART: [cold-reset] ++
3,780,287 UART: [fht] FHT @ 0x50003400
3,791,982 UART: [idev] ++
3,792,548 UART: [idev] CDI.KEYID = 6
3,793,582 UART: [idev] SUBJECT.KEYID = 7
3,794,759 UART: [idev] UDS.KEYID = 0
3,795,762 ready_for_fw is high
3,795,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,007 UART: [idev] Erasing UDS.KEYID = 0
6,270,970 UART: [idev] Sha1 KeyId Algorithm
6,293,645 UART: [idev] --
6,298,493 UART: [ldev] ++
6,299,108 UART: [ldev] CDI.KEYID = 6
6,300,025 UART: [ldev] SUBJECT.KEYID = 5
6,301,245 UART: [ldev] AUTHORITY.KEYID = 7
6,302,479 UART: [ldev] FE.KEYID = 1
6,314,818 UART: [ldev] Erasing FE.KEYID = 1
8,791,574 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,517 UART: [ldev] --
10,582,623 UART: [fwproc] Wait for Commands...
10,584,395 UART: [fwproc] Recv command 0x46574c44
10,586,381 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,598 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,240 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,183 >>> mbox cmd response: success
14,548,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,551,871 UART: [afmc] ++
14,552,525 UART: [afmc] CDI.KEYID = 6
14,553,439 UART: [afmc] SUBJECT.KEYID = 7
14,554,656 UART: [afmc] AUTHORITY.KEYID = 5
17,061,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,382 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,418 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,000 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,328 UART: [afmc] --
18,862,535 UART: [cold-reset] --
18,865,809 UART: [state] Locking Datavault
18,871,866 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,564 UART: [state] Locking ICCM
18,875,229 UART: [exit] Launching FMC @ 0x40000130
18,883,683 UART:
18,883,944 UART: Running Caliptra FMC ...
18,885,051 UART:
18,885,228 UART: [state] CFI Enabled
18,893,357 UART: [fht] FMC Alias Private Key: 7
20,658,833 UART: [art] Extend RT PCRs Done
20,660,049 UART: [art] Lock RT PCRs Done
20,661,592 UART: [art] Populate DV Done
20,666,948 UART: [fht] FMC Alias Private Key: 7
20,668,541 UART: [art] Derive CDI
20,669,358 UART: [art] Store in slot 0x4
20,711,821 UART: [art] Derive Key Pair
20,712,854 UART: [art] Store priv key in slot 0x5
23,140,119 UART: [art] Derive Key Pair - Done
23,152,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,858,961 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,473 UART: [art] PUB.X = 80039489CF679FAC32EB50CE31F861318951C4AF589F366870491487252011B6B2FEA44396BFFEDF65284F70B5C923B0
24,867,737 UART: [art] PUB.Y = 9CA80924357A87D8004AF1924DA24E9C4659A5D20A9979B0C39079ED5A33586D603792C9C6D09AD36332A7007E2B0D9D
24,874,966 UART: [art] SIG.R = 87E3417F9B42CDEE3204006CAC17EF65E01A3ABBC8B76A695AC5BCE46D2563B3E904B8EA094D2CF527F2F6E6DB1F819B
24,882,361 UART: [art] SIG.S = C518EBCA1B507A6F3FA4C9C524533005595A810AE36C73221569538D707D0401F0E02A55962286757F461E23EFD8B383
25,860,889 UART: Caliptra RT
25,861,580 UART: [state] CFI Enabled
25,994,210 UART: [rt] RT listening for mailbox commands...
26,026,327 UART: [rt]cmd =0x44504543, len=96
26,057,851 >>> mbox cmd response data (56 bytes)
26,058,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,089,027 UART: [rt]cmd =0x44504543, len=96
26,120,517 >>> mbox cmd response data (56 bytes)
26,121,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,151,643 UART: [rt]cmd =0x44504543, len=96
26,183,579 >>> mbox cmd response data (56 bytes)
26,184,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,214,958 UART: [rt]cmd =0x44504543, len=96
26,247,058 >>> mbox cmd response data (56 bytes)
26,247,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,278,371 UART: [rt]cmd =0x44504543, len=96
26,310,689 >>> mbox cmd response data (56 bytes)
26,311,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,341,919 UART: [rt]cmd =0x44504543, len=96
26,374,108 >>> mbox cmd response data (56 bytes)
26,374,791 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,405,415 UART: [rt]cmd =0x44504543, len=96
26,437,746 >>> mbox cmd response data (56 bytes)
26,438,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,468,813 UART: [rt]cmd =0x44504543, len=96
26,500,858 >>> mbox cmd response data (56 bytes)
26,501,549 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,532,350 UART: [rt]cmd =0x44504543, len=96
26,564,831 >>> mbox cmd response data (56 bytes)
26,565,566 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,595,936 UART: [rt]cmd =0x44504543, len=96
26,628,018 >>> mbox cmd response data (56 bytes)
26,628,738 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,659,269 UART: [rt]cmd =0x44504543, len=96
26,690,963 >>> mbox cmd response data (56 bytes)
26,691,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,722,122 UART: [rt]cmd =0x44504543, len=96
26,754,656 >>> mbox cmd response data (56 bytes)
26,755,765 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,785,950 UART: [rt]cmd =0x52435458, len=8
26,788,178 >>> mbox cmd response data (16 bytes)
28,858,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,008,654 UART:
29,009,058 UART: Running Caliptra ROM ...
29,010,213 UART:
29,010,397 UART: [state] CFI Enabled
29,025,564 UART: [state] LifecycleState = Unprovisioned
29,027,497 UART: [state] DebugLocked = No
29,030,210 UART: [state] WD Timer not started. Device not locked for debugging
29,034,885 UART: [kat] SHA2-256
29,214,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
29,225,373 UART: [kat] ++
29,225,830 UART: [kat] sha1
29,238,283 UART: [kat] SHA2-256
29,240,977 UART: [kat] SHA2-384
29,245,894 UART: [kat] SHA2-512-ACC
29,248,298 UART: [kat] ECC-384
31,688,389 UART: [kat] HMAC-384Kdf
31,700,678 UART: [kat] LMS
32,177,155 UART: [kat] --
32,182,057 UART: [update-reset] ++
35,687,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
35,690,905 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,088,515 >>> mbox cmd response: success
36,088,953 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,090,503 UART: [update-reset] Copying MAN_2 To MAN_1
36,127,630 UART: [update-reset Success] --
36,132,566 UART: [state] Locking Datavault
36,134,518 UART: [state] Locking PCR0, PCR1 and PCR31
36,136,276 UART: [state] Locking ICCM
36,137,369 UART: [exit] Launching FMC @ 0x40000130
36,145,731 UART:
36,145,969 UART: Running Caliptra FMC ...
36,147,019 UART:
36,147,173 UART: [state] CFI Enabled
36,191,618 UART: [art] Extend RT PCRs Done
36,192,767 UART: [art] Lock RT PCRs Done
36,194,187 UART: [art] Populate DV Done
36,199,592 UART: [fht] FMC Alias Private Key: 7
36,201,230 UART: [art] Derive CDI
36,201,965 UART: [art] Store in slot 0x4
36,244,773 UART: [art] Derive Key Pair
36,245,809 UART: [art] Store priv key in slot 0x5
38,672,500 UART: [art] Derive Key Pair - Done
38,685,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,391,612 UART: [art] Erasing AUTHORITY.KEYID = 7
40,393,115 UART: [art] PUB.X = 948FA205A5E51FB21A56A8C7D8F938E13DD2CF4835B5F2E323847C0DE347ED8D7E53BE7E8269085A465006F315AC7696
40,400,371 UART: [art] PUB.Y = 7571A5BDEE75FF86EEDE3EFA1E47E89C2D38195178BEAE68F8A95196A8F086103C96E84E34935E224ECACF223D2E18DF
40,407,658 UART: [art] SIG.R = 74D95215FDE9B2577D0EADB77FA9A96626BEF9B7E70E954BDB5A29828F835DC11799117DBD247CE228C435A292437F37
40,415,070 UART: [art] SIG.S = EEC76C53B7D0472CFE5DA1072DC0D28490315A716D570C78E922A7B7C25A4F8BDCC573A30C8546D2FEC56EC474255EC4
41,394,017 UART: Caliptra RT
41,394,725 UART: [state] CFI Enabled
41,757,691 UART: [rt] RT listening for mailbox commands...
41,789,594 UART: [rt]cmd =0x44504543, len=96
41,821,283 >>> mbox cmd response data (56 bytes)
41,822,108 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,852,593 UART: [rt]cmd =0x44504543, len=96
41,884,455 >>> mbox cmd response data (56 bytes)
41,885,147 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,915,473 UART: [rt]cmd =0x44504543, len=96
41,947,742 >>> mbox cmd response data (56 bytes)
41,948,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,979,144 UART: [rt]cmd =0x44504543, len=96
42,011,027 >>> mbox cmd response data (56 bytes)
42,011,720 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,042,219 UART: [rt]cmd =0x44504543, len=96
42,075,101 >>> mbox cmd response data (56 bytes)
42,075,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,106,294 UART: [rt]cmd =0x44504543, len=96
42,138,417 >>> mbox cmd response data (56 bytes)
42,139,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,169,721 UART: [rt]cmd =0x44504543, len=96
42,201,946 >>> mbox cmd response data (56 bytes)
42,202,611 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,233,299 UART: [rt]cmd =0x44504543, len=96
42,265,573 >>> mbox cmd response data (56 bytes)
42,266,271 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,296,637 UART: [rt]cmd =0x44504543, len=96
42,329,129 >>> mbox cmd response data (56 bytes)
42,329,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,360,566 UART: [rt]cmd =0x44504543, len=96
42,392,283 >>> mbox cmd response data (56 bytes)
42,393,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,423,703 UART: [rt]cmd =0x44504543, len=96
42,430,807 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,777,333 ready_for_fw is high
3,777,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,465 >>> mbox cmd response: success
14,445,763 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,686,317 UART:
18,686,693 UART: Running Caliptra FMC ...
18,687,890 UART:
18,688,080 UART: [state] CFI Enabled
18,695,499 UART: [fht] FMC Alias Private Key: 7
20,462,070 UART: [art] Extend RT PCRs Done
20,463,299 UART: [art] Lock RT PCRs Done
20,465,040 UART: [art] Populate DV Done
20,470,567 UART: [fht] FMC Alias Private Key: 7
20,472,276 UART: [art] Derive CDI
20,473,096 UART: [art] Store in slot 0x4
20,515,995 UART: [art] Derive Key Pair
20,517,042 UART: [art] Store priv key in slot 0x5
22,943,744 UART: [art] Derive Key Pair - Done
22,956,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,662,791 UART: [art] Erasing AUTHORITY.KEYID = 7
24,664,291 UART: [art] PUB.X = 68A0450AE6F2A9F59977521777181D94BC3BD4B5D1DDDAFD2FF345941D59B2B5F6C44F6D0CA07516A592DF476A05C879
24,671,594 UART: [art] PUB.Y = 88D93A869D6D77D46FBBF965E6956AA3715D180BA5573701289AE7976FA874EBD24C1B552FDA907362FB874A546F0D7C
24,678,859 UART: [art] SIG.R = BA6D1EE50B4BCA3F0832C2BDE5C241101751D4D9CA7BE1F4BECC8781CC13ACE170231A07C31CA41D57E831E05F494A0D
24,686,265 UART: [art] SIG.S = A8E05D2726540246C6C416568796E701FF876C144F74E5848056D2A62850AE6A157CE0191492F78BF642326AE8CD3311
25,664,913 UART: Caliptra RT
25,665,614 UART: [state] CFI Enabled
25,799,318 UART: [rt] RT listening for mailbox commands...
25,831,168 UART: [rt]cmd =0x44504543, len=96
25,862,314 >>> mbox cmd response data (56 bytes)
25,863,235 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,894,003 UART: [rt]cmd =0x44504543, len=96
25,925,672 >>> mbox cmd response data (56 bytes)
25,926,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,956,717 UART: [rt]cmd =0x44504543, len=96
25,988,085 >>> mbox cmd response data (56 bytes)
25,988,797 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,019,166 UART: [rt]cmd =0x44504543, len=96
26,051,377 >>> mbox cmd response data (56 bytes)
26,052,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,082,642 UART: [rt]cmd =0x44504543, len=96
26,114,222 >>> mbox cmd response data (56 bytes)
26,114,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,145,431 UART: [rt]cmd =0x44504543, len=96
26,177,392 >>> mbox cmd response data (56 bytes)
26,178,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,208,564 UART: [rt]cmd =0x44504543, len=96
26,240,178 >>> mbox cmd response data (56 bytes)
26,240,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,271,603 UART: [rt]cmd =0x44504543, len=96
26,303,596 >>> mbox cmd response data (56 bytes)
26,304,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,711 UART: [rt]cmd =0x44504543, len=96
26,366,311 >>> mbox cmd response data (56 bytes)
26,367,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,782 UART: [rt]cmd =0x44504543, len=96
26,430,220 >>> mbox cmd response data (56 bytes)
26,430,934 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,461,465 UART: [rt]cmd =0x44504543, len=96
26,493,212 >>> mbox cmd response data (56 bytes)
26,493,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,524,594 UART: [rt]cmd =0x44504543, len=96
26,556,538 >>> mbox cmd response data (56 bytes)
26,557,602 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
26,587,468 UART: [rt]cmd =0x52435458, len=8
26,589,673 >>> mbox cmd response data (16 bytes)
28,651,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,871,664 >>> mbox cmd response: success
35,872,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,907,362 UART:
35,907,658 UART: Running Caliptra FMC ...
35,908,728 UART:
35,908,881 UART: [state] CFI Enabled
35,953,189 UART: [art] Extend RT PCRs Done
35,954,370 UART: [art] Lock RT PCRs Done
35,955,882 UART: [art] Populate DV Done
35,961,476 UART: [fht] FMC Alias Private Key: 7
35,963,135 UART: [art] Derive CDI
35,963,953 UART: [art] Store in slot 0x4
36,006,332 UART: [art] Derive Key Pair
36,007,339 UART: [art] Store priv key in slot 0x5
38,434,347 UART: [art] Derive Key Pair - Done
38,447,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,153,589 UART: [art] Erasing AUTHORITY.KEYID = 7
40,155,302 UART: [art] PUB.X = 1854C8D26976EA9A7FCE7CF3078184DF0B92EC9C3687A9A27801DF9440B8ED9B5D49CF8B8DE36208E053DA721BACA95F
40,162,406 UART: [art] PUB.Y = C3860601BBB55D0E99700BAE7AA9D55151F02534B957488667430D9A0DCB9640213047650F222B1C481F2B9FFCFB695D
40,169,606 UART: [art] SIG.R = 09EBCEA90975991DB639F5D68376945B8C9020EDF5981FBC44D8EAC34486DA59FBDA13C496F2780D4F2EE4ADD8556769
40,177,039 UART: [art] SIG.S = D67DA523603B96ECFC476A7528319A476A02136F8F65F034709BE9E89A3FF56FEA5EFE3870F4BBB113035C7C4CBBEF5E
41,156,315 UART: Caliptra RT
41,157,028 UART: [state] CFI Enabled
41,516,312 UART: [rt] RT listening for mailbox commands...
41,547,893 UART: [rt]cmd =0x44504543, len=96
41,579,576 >>> mbox cmd response data (56 bytes)
41,580,394 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,611,044 UART: [rt]cmd =0x44504543, len=96
41,643,286 >>> mbox cmd response data (56 bytes)
41,644,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,674,388 UART: [rt]cmd =0x44504543, len=96
41,707,171 >>> mbox cmd response data (56 bytes)
41,707,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,738,269 UART: [rt]cmd =0x44504543, len=96
41,770,660 >>> mbox cmd response data (56 bytes)
41,771,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,801,936 UART: [rt]cmd =0x44504543, len=96
41,833,818 >>> mbox cmd response data (56 bytes)
41,834,507 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,865,374 UART: [rt]cmd =0x44504543, len=96
41,897,150 >>> mbox cmd response data (56 bytes)
41,897,864 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,928,445 UART: [rt]cmd =0x44504543, len=96
41,961,009 >>> mbox cmd response data (56 bytes)
41,961,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
41,992,430 UART: [rt]cmd =0x44504543, len=96
42,023,967 >>> mbox cmd response data (56 bytes)
42,024,690 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,055,175 UART: [rt]cmd =0x44504543, len=96
42,087,571 >>> mbox cmd response data (56 bytes)
42,088,252 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,118,791 UART: [rt]cmd =0x44504543, len=96
42,150,192 >>> mbox cmd response data (56 bytes)
42,150,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,181,323 UART: [rt]cmd =0x44504543, len=96
42,188,299 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,118 UART:
192,477 UART: Running Caliptra ROM ...
193,668 UART:
193,830 UART: [state] CFI Enabled
263,628 UART: [state] LifecycleState = Unprovisioned
266,054 UART: [state] DebugLocked = No
268,944 UART: [state] WD Timer not started. Device not locked for debugging
273,612 UART: [kat] SHA2-256
463,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,223 UART: [kat] ++
474,726 UART: [kat] sha1
487,094 UART: [kat] SHA2-256
490,109 UART: [kat] SHA2-384
496,239 UART: [kat] SHA2-512-ACC
498,815 UART: [kat] ECC-384
2,947,435 UART: [kat] HMAC-384Kdf
2,972,252 UART: [kat] LMS
3,503,990 UART: [kat] --
3,507,413 UART: [cold-reset] ++
3,508,835 UART: [fht] FHT @ 0x50003400
3,524,825 UART: [idev] ++
3,525,363 UART: [idev] CDI.KEYID = 6
3,526,243 UART: [idev] SUBJECT.KEYID = 7
3,527,263 UART: [idev] UDS.KEYID = 0
3,528,187 ready_for_fw is high
3,528,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,834 UART: [idev] Erasing UDS.KEYID = 0
6,029,489 UART: [idev] Sha1 KeyId Algorithm
6,052,236 UART: [idev] --
6,057,581 UART: [ldev] ++
6,058,313 UART: [ldev] CDI.KEYID = 6
6,059,223 UART: [ldev] SUBJECT.KEYID = 5
6,060,380 UART: [ldev] AUTHORITY.KEYID = 7
6,061,759 UART: [ldev] FE.KEYID = 1
6,099,996 UART: [ldev] Erasing FE.KEYID = 1
8,607,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,480 UART: [ldev] --
10,411,419 UART: [fwproc] Wait for Commands...
10,413,292 UART: [fwproc] Recv command 0x46574c44
10,415,596 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,266 >>> mbox cmd response: success
14,678,444 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,680,547 UART: [afmc] ++
14,681,240 UART: [afmc] CDI.KEYID = 6
14,682,473 UART: [afmc] SUBJECT.KEYID = 7
14,683,898 UART: [afmc] AUTHORITY.KEYID = 5
17,212,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,265 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,323 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,459 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,995 UART: [afmc] --
19,008,863 UART: [cold-reset] --
19,013,754 UART: [state] Locking Datavault
19,020,025 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,201 UART: [state] Locking ICCM
19,024,143 UART: [exit] Launching FMC @ 0x40000130
19,032,811 UART:
19,033,047 UART: Running Caliptra FMC ...
19,034,152 UART:
19,034,314 UART: [state] CFI Enabled
19,092,966 UART: [fht] FMC Alias Private Key: 7
20,859,654 UART: [art] Extend RT PCRs Done
20,860,871 UART: [art] Lock RT PCRs Done
20,862,791 UART: [art] Populate DV Done
20,868,431 UART: [fht] FMC Alias Private Key: 7
20,869,982 UART: [art] Derive CDI
20,870,799 UART: [art] Store in slot 0x4
20,925,709 UART: [art] Derive Key Pair
20,926,700 UART: [art] Store priv key in slot 0x5
23,389,557 UART: [art] Derive Key Pair - Done
23,402,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,117,183 UART: [art] PUB.X = AA614F2C23A9DD59E4AE60C9795CEE0CA2465B0D4EB631E6C6A2A21ECB5DDBABD80BFAAB91492270A7D72F4CDE1A6B58
25,124,484 UART: [art] PUB.Y = 1A4AE96533BFD3754F71FCCB119FA4BAC4134F800C6B9BC36D52AA7E23509D383325779C4817B2D826B3FF1869930A3C
25,131,776 UART: [art] SIG.R = FB32A12A8FEDEC1A54FABD9877DB592C65CBDB71C7264C9B4BABA5A81793E514C94E24D455D491C7B0C8D62268A4E24F
25,139,161 UART: [art] SIG.S = FA60F5642D980E2917EFE6F581FA8ADF786B086C3FC862EC3D23AE41953F8B7C56B2B7B8C752EF96672459A474977DD4
26,118,405 UART: Caliptra RT
26,119,095 UART: [state] CFI Enabled
26,298,006 UART: [rt] RT listening for mailbox commands...
26,329,785 UART: [rt]cmd =0x44504543, len=96
26,361,342 >>> mbox cmd response data (56 bytes)
26,362,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,393,021 UART: [rt]cmd =0x44504543, len=96
26,425,293 >>> mbox cmd response data (56 bytes)
26,425,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,456,470 UART: [rt]cmd =0x44504543, len=96
26,489,732 >>> mbox cmd response data (56 bytes)
26,490,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,144 UART: [rt]cmd =0x44504543, len=96
26,553,222 >>> mbox cmd response data (56 bytes)
26,553,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,584,332 UART: [rt]cmd =0x44504543, len=96
26,616,152 >>> mbox cmd response data (56 bytes)
26,616,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,647,429 UART: [rt]cmd =0x44504543, len=96
26,679,263 >>> mbox cmd response data (56 bytes)
26,679,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,710,483 UART: [rt]cmd =0x44504543, len=96
26,742,206 >>> mbox cmd response data (56 bytes)
26,742,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,773,533 UART: [rt]cmd =0x44504543, len=96
26,805,293 >>> mbox cmd response data (56 bytes)
26,806,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,836,552 UART: [rt]cmd =0x44504543, len=96
26,868,516 >>> mbox cmd response data (56 bytes)
26,869,239 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,899,711 UART: [rt]cmd =0x44504543, len=96
26,932,318 >>> mbox cmd response data (56 bytes)
26,933,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,963,428 UART: [rt]cmd =0x44504543, len=96
26,995,705 >>> mbox cmd response data (56 bytes)
26,996,396 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,027,157 UART: [rt]cmd =0x44504543, len=96
27,059,529 >>> mbox cmd response data (56 bytes)
27,060,651 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,090,578 UART: [rt]cmd =0x52435458, len=8
27,092,753 >>> mbox cmd response data (16 bytes)
29,155,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,306,673 UART:
29,307,063 UART: Running Caliptra ROM ...
29,308,204 UART:
29,308,375 UART: [state] CFI Enabled
29,381,095 UART: [state] LifecycleState = Unprovisioned
29,383,197 UART: [state] DebugLocked = No
29,384,526 UART: [state] WD Timer not started. Device not locked for debugging
29,389,290 UART: [kat] SHA2-256
29,579,128 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,589,886 UART: [kat] ++
29,590,389 UART: [kat] sha1
29,602,408 UART: [kat] SHA2-256
29,605,373 UART: [kat] SHA2-384
29,612,221 UART: [kat] SHA2-512-ACC
29,614,787 UART: [kat] ECC-384
32,063,610 UART: [kat] HMAC-384Kdf
32,085,725 UART: [kat] LMS
32,617,268 UART: [kat] --
32,620,618 UART: [update-reset] ++
36,125,952 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,129,881 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,759,657 >>> mbox cmd response: success
36,760,085 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,760,932 UART: [update-reset] Copying MAN_2 To MAN_1
36,798,495 UART: [update-reset Success] --
36,801,144 UART: [state] Locking Datavault
36,805,158 UART: [state] Locking PCR0, PCR1 and PCR31
36,807,363 UART: [state] Locking ICCM
36,809,083 UART: [exit] Launching FMC @ 0x40000130
36,817,752 UART:
36,817,979 UART: Running Caliptra FMC ...
36,819,079 UART:
36,819,259 UART: [state] CFI Enabled
36,916,427 UART: [art] Extend RT PCRs Done
36,917,628 UART: [art] Lock RT PCRs Done
36,919,082 UART: [art] Populate DV Done
36,924,813 UART: [fht] FMC Alias Private Key: 7
36,926,395 UART: [art] Derive CDI
36,927,204 UART: [art] Store in slot 0x4
36,985,165 UART: [art] Derive Key Pair
36,986,231 UART: [art] Store priv key in slot 0x5
39,448,804 UART: [art] Derive Key Pair - Done
39,461,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,174,539 UART: [art] Erasing AUTHORITY.KEYID = 7
41,176,046 UART: [art] PUB.X = CC669E319258C41F4EA3802DEF3EF2147CFB7240C044B705A3D3661A66AE18E030A92D1D72F0D8A2A71404568F15FE0E
41,183,332 UART: [art] PUB.Y = 304E72C5F60A3CE6EB093886DCD4C2A277F7167F9FAA0E9D1D1C843E081344EF3A2E089C276DAD2E718C9F6025783EE5
41,190,580 UART: [art] SIG.R = BFA891064EE72F64A55524656DA9230F545EEC0860C13E43DB743DF23D4F20BBCC6A8792E4D66FFA680FCF647A08E4DB
41,197,965 UART: [art] SIG.S = 0BA84EEF550E2FB7083E9057F28A5635451774C185E4C80FF38AB8D9E9C75E0A6EA4D5A127B99D698126EBFE280365C3
42,176,961 UART: Caliptra RT
42,177,678 UART: [state] CFI Enabled
42,583,070 UART: [rt] RT listening for mailbox commands...
42,614,762 UART: [rt]cmd =0x44504543, len=96
42,646,933 >>> mbox cmd response data (56 bytes)
42,647,829 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,678,636 UART: [rt]cmd =0x44504543, len=96
42,711,255 >>> mbox cmd response data (56 bytes)
42,711,987 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,742,420 UART: [rt]cmd =0x44504543, len=96
42,774,813 >>> mbox cmd response data (56 bytes)
42,775,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,806,029 UART: [rt]cmd =0x44504543, len=96
42,838,030 >>> mbox cmd response data (56 bytes)
42,838,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,869,310 UART: [rt]cmd =0x44504543, len=96
42,901,954 >>> mbox cmd response data (56 bytes)
42,902,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,933,349 UART: [rt]cmd =0x44504543, len=96
42,965,798 >>> mbox cmd response data (56 bytes)
42,966,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,997,107 UART: [rt]cmd =0x44504543, len=96
43,029,295 >>> mbox cmd response data (56 bytes)
43,030,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,060,392 UART: [rt]cmd =0x44504543, len=96
43,092,140 >>> mbox cmd response data (56 bytes)
43,092,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,123,205 UART: [rt]cmd =0x44504543, len=96
43,154,983 >>> mbox cmd response data (56 bytes)
43,155,672 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,186,083 UART: [rt]cmd =0x44504543, len=96
43,217,725 >>> mbox cmd response data (56 bytes)
43,218,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,248,915 UART: [rt]cmd =0x44504543, len=96
43,255,750 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,415,472 ready_for_fw is high
3,415,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,799,780 >>> mbox cmd response: success
14,800,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,114,484 UART:
19,114,859 UART: Running Caliptra FMC ...
19,115,986 UART:
19,116,164 UART: [state] CFI Enabled
19,182,281 UART: [fht] FMC Alias Private Key: 7
20,948,512 UART: [art] Extend RT PCRs Done
20,949,735 UART: [art] Lock RT PCRs Done
20,951,198 UART: [art] Populate DV Done
20,956,668 UART: [fht] FMC Alias Private Key: 7
20,958,156 UART: [art] Derive CDI
20,958,915 UART: [art] Store in slot 0x4
21,015,058 UART: [art] Derive Key Pair
21,016,069 UART: [art] Store priv key in slot 0x5
23,478,824 UART: [art] Derive Key Pair - Done
23,491,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,373 UART: [art] PUB.X = 0B9A5998BFDF76C7181C9FBFBB2BF13E7BBFA7333DC84534972C9BA6D995F3459F0D4F90A63F5C982BAD084F684CACC4
25,213,620 UART: [art] PUB.Y = F69323DE9E8895ED70F730EFFB6F5D17CCB933F78BCF9057AEC439C4ED067F9B7E9217CC48CDF01DA19D1FFE95A24CEF
25,220,904 UART: [art] SIG.R = 27A438C0911FD124CFF039368A563440B6113442312EC9AFE60DE0C4FC8AA1B9F427D5474CC686391474F41F0FD6AAB3
25,228,316 UART: [art] SIG.S = 88D6468972832BD7690D9A433F743FF2CCF4E5D8C222EE7D4ED4181F038FB9DEBE3F95AE86F86975F43481CE12857B42
26,206,725 UART: Caliptra RT
26,207,415 UART: [state] CFI Enabled
26,389,616 UART: [rt] RT listening for mailbox commands...
26,421,698 UART: [rt]cmd =0x44504543, len=96
26,453,235 >>> mbox cmd response data (56 bytes)
26,454,094 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,484,877 UART: [rt]cmd =0x44504543, len=96
26,515,966 >>> mbox cmd response data (56 bytes)
26,516,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,097 UART: [rt]cmd =0x44504543, len=96
26,579,425 >>> mbox cmd response data (56 bytes)
26,580,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,610,694 UART: [rt]cmd =0x44504543, len=96
26,642,233 >>> mbox cmd response data (56 bytes)
26,642,958 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,673,509 UART: [rt]cmd =0x44504543, len=96
26,705,447 >>> mbox cmd response data (56 bytes)
26,706,174 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,736,703 UART: [rt]cmd =0x44504543, len=96
26,768,505 >>> mbox cmd response data (56 bytes)
26,769,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,799,607 UART: [rt]cmd =0x44504543, len=96
26,831,382 >>> mbox cmd response data (56 bytes)
26,832,069 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,862,776 UART: [rt]cmd =0x44504543, len=96
26,894,234 >>> mbox cmd response data (56 bytes)
26,894,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,925,561 UART: [rt]cmd =0x44504543, len=96
26,957,259 >>> mbox cmd response data (56 bytes)
26,957,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,988,623 UART: [rt]cmd =0x44504543, len=96
27,021,805 >>> mbox cmd response data (56 bytes)
27,022,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,053,219 UART: [rt]cmd =0x44504543, len=96
27,085,342 >>> mbox cmd response data (56 bytes)
27,086,020 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,116,246 UART: [rt]cmd =0x44504543, len=96
27,148,081 >>> mbox cmd response data (56 bytes)
27,149,168 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,178,899 UART: [rt]cmd =0x52435458, len=8
27,181,021 >>> mbox cmd response data (16 bytes)
29,242,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,160,985 >>> mbox cmd response: success
37,161,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,196,593 UART:
37,196,921 UART: Running Caliptra FMC ...
37,198,045 UART:
37,198,220 UART: [state] CFI Enabled
37,287,557 UART: [art] Extend RT PCRs Done
37,288,749 UART: [art] Lock RT PCRs Done
37,290,261 UART: [art] Populate DV Done
37,295,886 UART: [fht] FMC Alias Private Key: 7
37,297,428 UART: [art] Derive CDI
37,298,167 UART: [art] Store in slot 0x4
37,356,748 UART: [art] Derive Key Pair
37,357,785 UART: [art] Store priv key in slot 0x5
39,820,448 UART: [art] Derive Key Pair - Done
39,833,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,546,990 UART: [art] Erasing AUTHORITY.KEYID = 7
41,548,500 UART: [art] PUB.X = 984E11B44F081DD4FC8455F30D59D132C77A2BA39C55FF9C2D78B438BEFC35B4136ACFF2B2DF618ACB0E87BF83474CDA
41,555,796 UART: [art] PUB.Y = 0EEDDF799D1B415388C39A9D4F966B45C125E04B0A7F9D9B845D4B0D58BDEEE089A04AC196A250303D61C5FA8FA4FE6A
41,563,027 UART: [art] SIG.R = 1CCCDDD1F6AE99A843D2BC7C23F887041305A8CFC13CD978B62876B0F9AA455CA9A6E82F59D6D000DB120D8A41E73BAA
41,570,423 UART: [art] SIG.S = 6C036638596D00543FDF7866ECF882EC15C4748C81481023483C886C71CEA93A813454E95424BC92884C198D503D43A3
42,549,317 UART: Caliptra RT
42,550,028 UART: [state] CFI Enabled
42,960,680 UART: [rt] RT listening for mailbox commands...
42,992,525 UART: [rt]cmd =0x44504543, len=96
43,024,339 >>> mbox cmd response data (56 bytes)
43,025,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,056,029 UART: [rt]cmd =0x44504543, len=96
43,088,062 >>> mbox cmd response data (56 bytes)
43,088,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,119,219 UART: [rt]cmd =0x44504543, len=96
43,150,522 >>> mbox cmd response data (56 bytes)
43,151,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,181,894 UART: [rt]cmd =0x44504543, len=96
43,213,516 >>> mbox cmd response data (56 bytes)
43,214,209 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,244,737 UART: [rt]cmd =0x44504543, len=96
43,276,490 >>> mbox cmd response data (56 bytes)
43,277,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,307,676 UART: [rt]cmd =0x44504543, len=96
43,339,260 >>> mbox cmd response data (56 bytes)
43,339,936 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,370,625 UART: [rt]cmd =0x44504543, len=96
43,402,167 >>> mbox cmd response data (56 bytes)
43,402,852 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,433,226 UART: [rt]cmd =0x44504543, len=96
43,465,063 >>> mbox cmd response data (56 bytes)
43,465,756 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,496,194 UART: [rt]cmd =0x44504543, len=96
43,527,810 >>> mbox cmd response data (56 bytes)
43,528,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,559,168 UART: [rt]cmd =0x44504543, len=96
43,590,645 >>> mbox cmd response data (56 bytes)
43,591,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,621,723 UART: [rt]cmd =0x44504543, len=96
43,628,613 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,524 UART:
192,891 UART: Running Caliptra ROM ...
193,996 UART:
603,892 UART: [state] CFI Enabled
615,796 UART: [state] LifecycleState = Unprovisioned
618,186 UART: [state] DebugLocked = No
620,443 UART: [state] WD Timer not started. Device not locked for debugging
624,934 UART: [kat] SHA2-256
814,807 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,618 UART: [kat] ++
826,242 UART: [kat] sha1
838,902 UART: [kat] SHA2-256
841,911 UART: [kat] SHA2-384
847,976 UART: [kat] SHA2-512-ACC
850,561 UART: [kat] ECC-384
3,296,071 UART: [kat] HMAC-384Kdf
3,310,014 UART: [kat] LMS
3,841,807 UART: [kat] --
3,845,614 UART: [cold-reset] ++
3,846,908 UART: [fht] FHT @ 0x50003400
3,858,598 UART: [idev] ++
3,859,305 UART: [idev] CDI.KEYID = 6
3,860,192 UART: [idev] SUBJECT.KEYID = 7
3,861,387 UART: [idev] UDS.KEYID = 0
3,862,382 ready_for_fw is high
3,862,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,507 UART: [idev] Erasing UDS.KEYID = 0
6,331,924 UART: [idev] Sha1 KeyId Algorithm
6,355,428 UART: [idev] --
6,360,663 UART: [ldev] ++
6,361,347 UART: [ldev] CDI.KEYID = 6
6,362,258 UART: [ldev] SUBJECT.KEYID = 5
6,363,418 UART: [ldev] AUTHORITY.KEYID = 7
6,364,650 UART: [ldev] FE.KEYID = 1
6,374,486 UART: [ldev] Erasing FE.KEYID = 1
8,854,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,752 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,769 UART: [ldev] --
10,648,629 UART: [fwproc] Wait for Commands...
10,651,337 UART: [fwproc] Recv command 0x46574c44
10,653,648 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,672 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,886 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,352,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,014 >>> mbox cmd response: success
14,912,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,916,037 UART: [afmc] ++
14,916,746 UART: [afmc] CDI.KEYID = 6
14,917,859 UART: [afmc] SUBJECT.KEYID = 7
14,919,408 UART: [afmc] AUTHORITY.KEYID = 5
17,425,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,148,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,150,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,165,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,656 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,195,550 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,664 UART: [afmc] --
19,221,618 UART: [cold-reset] --
19,225,431 UART: [state] Locking Datavault
19,233,117 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,262 UART: [state] Locking ICCM
19,236,551 UART: [exit] Launching FMC @ 0x40000130
19,245,228 UART:
19,245,467 UART: Running Caliptra FMC ...
19,246,570 UART:
19,246,733 UART: [state] CFI Enabled
19,254,810 UART: [fht] FMC Alias Private Key: 7
21,021,088 UART: [art] Extend RT PCRs Done
21,022,316 UART: [art] Lock RT PCRs Done
21,023,840 UART: [art] Populate DV Done
21,029,427 UART: [fht] FMC Alias Private Key: 7
21,031,149 UART: [art] Derive CDI
21,031,974 UART: [art] Store in slot 0x4
21,074,640 UART: [art] Derive Key Pair
21,075,646 UART: [art] Store priv key in slot 0x5
23,502,717 UART: [art] Derive Key Pair - Done
23,516,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,222,149 UART: [art] Erasing AUTHORITY.KEYID = 7
25,223,656 UART: [art] PUB.X = C60B10126A07DF517A328AD41298EE2D01FF00CF8087401290689D0679403BF4060706B3706656E9304D851754517EED
25,230,869 UART: [art] PUB.Y = 1D59017C205355CAE0A1E038D625713A4CCCAE444AC9C0D41EC53B32D7B7C0FD274F89F33CE0714D565006C2B9185E25
25,238,075 UART: [art] SIG.R = 093785FDDE3546F596E4C718BE00C9EF4A04ACC522A4807FD44E73BAA66AA51BDA2508DF7052EF727918014EABF62677
25,245,496 UART: [art] SIG.S = 59E525766B75F6C33283E953709BB8D188A2FC2BA3C8EAD18BB0D3350C0C12D3F7C5E19C9FCC473CC2A948DBEC3F4E85
26,224,328 UART: Caliptra RT
26,225,018 UART: [state] CFI Enabled
26,358,928 UART: [rt] RT listening for mailbox commands...
26,390,816 UART: [rt]cmd =0x44504543, len=96
26,422,819 >>> mbox cmd response data (56 bytes)
26,423,794 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,454,294 UART: [rt]cmd =0x44504543, len=96
26,486,001 >>> mbox cmd response data (56 bytes)
26,486,737 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,517,116 UART: [rt]cmd =0x44504543, len=96
26,548,895 >>> mbox cmd response data (56 bytes)
26,549,641 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,580,392 UART: [rt]cmd =0x44504543, len=96
26,611,824 >>> mbox cmd response data (56 bytes)
26,612,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,643,056 UART: [rt]cmd =0x44504543, len=96
26,675,818 >>> mbox cmd response data (56 bytes)
26,676,515 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,707,163 UART: [rt]cmd =0x44504543, len=96
26,739,108 >>> mbox cmd response data (56 bytes)
26,739,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,770,344 UART: [rt]cmd =0x44504543, len=96
26,802,264 >>> mbox cmd response data (56 bytes)
26,802,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,833,402 UART: [rt]cmd =0x44504543, len=96
26,865,150 >>> mbox cmd response data (56 bytes)
26,865,871 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,896,401 UART: [rt]cmd =0x44504543, len=96
26,928,363 >>> mbox cmd response data (56 bytes)
26,929,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,959,629 UART: [rt]cmd =0x44504543, len=96
26,992,430 >>> mbox cmd response data (56 bytes)
26,993,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,023,712 UART: [rt]cmd =0x44504543, len=96
27,056,147 >>> mbox cmd response data (56 bytes)
27,056,842 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,087,477 UART: [rt]cmd =0x44504543, len=96
27,119,741 >>> mbox cmd response data (56 bytes)
27,120,966 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,150,867 UART: [rt]cmd =0x52435458, len=8
27,152,993 >>> mbox cmd response data (16 bytes)
29,215,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,365,937 UART:
29,366,311 UART: Running Caliptra ROM ...
29,367,370 UART:
29,367,577 UART: [state] CFI Enabled
29,381,697 UART: [state] LifecycleState = Unprovisioned
29,383,592 UART: [state] DebugLocked = No
29,386,051 UART: [state] WD Timer not started. Device not locked for debugging
29,390,910 UART: [kat] SHA2-256
29,580,798 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
29,591,532 UART: [kat] ++
29,592,054 UART: [kat] sha1
29,604,033 UART: [kat] SHA2-256
29,607,015 UART: [kat] SHA2-384
29,613,069 UART: [kat] SHA2-512-ACC
29,615,643 UART: [kat] ECC-384
32,056,556 UART: [kat] HMAC-384Kdf
32,069,710 UART: [kat] LMS
32,601,334 UART: [kat] --
32,606,469 UART: [update-reset] ++
36,117,657 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
36,120,283 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
36,750,032 >>> mbox cmd response: success
36,750,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
36,751,784 UART: [update-reset] Copying MAN_2 To MAN_1
36,789,311 UART: [update-reset Success] --
36,793,863 UART: [state] Locking Datavault
36,797,454 UART: [state] Locking PCR0, PCR1 and PCR31
36,799,668 UART: [state] Locking ICCM
36,800,937 UART: [exit] Launching FMC @ 0x40000130
36,809,610 UART:
36,809,849 UART: Running Caliptra FMC ...
36,810,877 UART:
36,811,025 UART: [state] CFI Enabled
36,855,318 UART: [art] Extend RT PCRs Done
36,856,463 UART: [art] Lock RT PCRs Done
36,858,051 UART: [art] Populate DV Done
36,863,718 UART: [fht] FMC Alias Private Key: 7
36,865,376 UART: [art] Derive CDI
36,866,132 UART: [art] Store in slot 0x4
36,909,054 UART: [art] Derive Key Pair
36,910,059 UART: [art] Store priv key in slot 0x5
39,336,753 UART: [art] Derive Key Pair - Done
39,349,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,056,078 UART: [art] Erasing AUTHORITY.KEYID = 7
41,057,581 UART: [art] PUB.X = 404F925EDB3EF1F2A0135907A6BAAEEE027FE5C070773EBE0A83D98FF1C089449C6B2CF5BFA7B563665E88D36F378190
41,064,911 UART: [art] PUB.Y = F82F1EBC9E1FE612A403A814B96DBDFE8A672033615C17B5F2A8B57A8DF6EFE4171ABBA5C7E5D534348200EB880D8DEC
41,072,157 UART: [art] SIG.R = E29827960DDF50A1FE542DA3910CC55C56C5A2A69172C32A395BE42F875C3984194873630D07EF043137F8ECA73CD49B
41,079,515 UART: [art] SIG.S = 8358D7A010E8ED2EED7C52AC6B54E370DEF3F2B11058C16BAE74A03822FB4A8A065AC67DD382F93F407C70B6E7F347D9
42,059,198 UART: Caliptra RT
42,059,915 UART: [state] CFI Enabled
42,419,846 UART: [rt] RT listening for mailbox commands...
42,451,496 UART: [rt]cmd =0x44504543, len=96
42,483,992 >>> mbox cmd response data (56 bytes)
42,484,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,515,397 UART: [rt]cmd =0x44504543, len=96
42,547,201 >>> mbox cmd response data (56 bytes)
42,547,920 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,578,457 UART: [rt]cmd =0x44504543, len=96
42,610,205 >>> mbox cmd response data (56 bytes)
42,610,884 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,641,692 UART: [rt]cmd =0x44504543, len=96
42,674,883 >>> mbox cmd response data (56 bytes)
42,675,581 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,706,177 UART: [rt]cmd =0x44504543, len=96
42,739,474 >>> mbox cmd response data (56 bytes)
42,740,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,770,420 UART: [rt]cmd =0x44504543, len=96
42,803,146 >>> mbox cmd response data (56 bytes)
42,803,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,834,664 UART: [rt]cmd =0x44504543, len=96
42,867,029 >>> mbox cmd response data (56 bytes)
42,867,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,898,223 UART: [rt]cmd =0x44504543, len=96
42,930,992 >>> mbox cmd response data (56 bytes)
42,931,665 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,962,355 UART: [rt]cmd =0x44504543, len=96
42,995,212 >>> mbox cmd response data (56 bytes)
42,995,888 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,026,480 UART: [rt]cmd =0x44504543, len=96
43,058,212 >>> mbox cmd response data (56 bytes)
43,058,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,089,382 UART: [rt]cmd =0x44504543, len=96
43,096,059 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,755,869 ready_for_fw is high
3,756,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,361 >>> mbox cmd response: success
15,050,039 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,296,808 UART:
19,297,195 UART: Running Caliptra FMC ...
19,298,341 UART:
19,298,502 UART: [state] CFI Enabled
19,306,446 UART: [fht] FMC Alias Private Key: 7
21,073,099 UART: [art] Extend RT PCRs Done
21,074,329 UART: [art] Lock RT PCRs Done
21,076,349 UART: [art] Populate DV Done
21,081,564 UART: [fht] FMC Alias Private Key: 7
21,083,058 UART: [art] Derive CDI
21,083,829 UART: [art] Store in slot 0x4
21,127,020 UART: [art] Derive Key Pair
21,128,026 UART: [art] Store priv key in slot 0x5
23,554,721 UART: [art] Derive Key Pair - Done
23,567,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,833 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,340 UART: [art] PUB.X = 23193F83D4CFCDD2D427C84FC1B4A55E5C01D960C62EC3C182F5409963A1D4238A899D0B965B58834CA2227C63A7AC76
25,282,609 UART: [art] PUB.Y = 39246AC4790B6D9D4B7C8E0806441405A13CBAAE216DFFB75D534E7DDCB0F26D3DC4BF29539820BFAFC13ECFBDE77EAC
25,289,872 UART: [art] SIG.R = E9822BF312884910BF207B919E742D5BE26E3D9562F218700BE706E663ED42275182466FACC9C035DE197848921FE671
25,297,285 UART: [art] SIG.S = 9525F0CFE45229A87384CA51AF61733212F162C8366CD911A87811B6C3901CB334FABFB860492C0F5909B04777BCBB84
26,275,816 UART: Caliptra RT
26,276,510 UART: [state] CFI Enabled
26,408,527 UART: [rt] RT listening for mailbox commands...
26,440,951 UART: [rt]cmd =0x44504543, len=96
26,473,110 >>> mbox cmd response data (56 bytes)
26,473,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,504,404 UART: [rt]cmd =0x44504543, len=96
26,535,374 >>> mbox cmd response data (56 bytes)
26,536,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,566,719 UART: [rt]cmd =0x44504543, len=96
26,599,154 >>> mbox cmd response data (56 bytes)
26,599,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,630,574 UART: [rt]cmd =0x44504543, len=96
26,662,896 >>> mbox cmd response data (56 bytes)
26,663,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,694,132 UART: [rt]cmd =0x44504543, len=96
26,725,899 >>> mbox cmd response data (56 bytes)
26,726,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,757,144 UART: [rt]cmd =0x44504543, len=96
26,789,357 >>> mbox cmd response data (56 bytes)
26,790,047 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,820,540 UART: [rt]cmd =0x44504543, len=96
26,852,433 >>> mbox cmd response data (56 bytes)
26,853,125 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,883,707 UART: [rt]cmd =0x44504543, len=96
26,914,981 >>> mbox cmd response data (56 bytes)
26,915,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,946,420 UART: [rt]cmd =0x44504543, len=96
26,978,122 >>> mbox cmd response data (56 bytes)
26,978,805 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,009,350 UART: [rt]cmd =0x44504543, len=96
27,042,435 >>> mbox cmd response data (56 bytes)
27,043,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,073,835 UART: [rt]cmd =0x44504543, len=96
27,106,652 >>> mbox cmd response data (56 bytes)
27,107,344 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
27,138,141 UART: [rt]cmd =0x44504543, len=96
27,169,633 >>> mbox cmd response data (56 bytes)
27,170,912 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
27,200,969 UART: [rt]cmd =0x52435458, len=8
27,203,092 >>> mbox cmd response data (16 bytes)
29,270,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,081,800 >>> mbox cmd response: success
37,082,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
37,116,374 UART:
37,116,671 UART: Running Caliptra FMC ...
37,117,796 UART:
37,117,966 UART: [state] CFI Enabled
37,162,550 UART: [art] Extend RT PCRs Done
37,163,740 UART: [art] Lock RT PCRs Done
37,164,990 UART: [art] Populate DV Done
37,170,248 UART: [fht] FMC Alias Private Key: 7
37,171,788 UART: [art] Derive CDI
37,172,622 UART: [art] Store in slot 0x4
37,215,549 UART: [art] Derive Key Pair
37,216,551 UART: [art] Store priv key in slot 0x5
39,643,384 UART: [art] Derive Key Pair - Done
39,656,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
41,362,606 UART: [art] Erasing AUTHORITY.KEYID = 7
41,364,116 UART: [art] PUB.X = A14A93DCE28031A0BA1C0369D68258FD32366EE8AF0EE14A784BD4EB960DF40ECEAAD3F2A9A1F46731534F499F626A79
41,371,396 UART: [art] PUB.Y = A6291FAC7F0F682196E26A8F3D50B5B675CAF855C41C8E330CB290B7536DF49E0976833864F48024897B03DF7190A1FA
41,378,640 UART: [art] SIG.R = 2F0E31B2B2F16D8BCC88D238FB0101EC364AA56918C4F8E3881258E81DC9FB01A9F648721401F9888C72A07ADC00735E
41,386,037 UART: [art] SIG.S = 26DDE7FFA3B4C912E6609859C51C50E824A0334D93F3A286DB164929847483879314754A8A6E2D4C55595826A94B65F7
42,365,484 UART: Caliptra RT
42,366,189 UART: [state] CFI Enabled
42,727,486 UART: [rt] RT listening for mailbox commands...
42,759,499 UART: [rt]cmd =0x44504543, len=96
42,792,414 >>> mbox cmd response data (56 bytes)
42,793,256 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,823,945 UART: [rt]cmd =0x44504543, len=96
42,856,061 >>> mbox cmd response data (56 bytes)
42,856,766 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,887,405 UART: [rt]cmd =0x44504543, len=96
42,919,761 >>> mbox cmd response data (56 bytes)
42,920,493 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
42,950,867 UART: [rt]cmd =0x44504543, len=96
42,983,003 >>> mbox cmd response data (56 bytes)
42,983,728 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,014,211 UART: [rt]cmd =0x44504543, len=96
43,045,910 >>> mbox cmd response data (56 bytes)
43,046,605 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,077,041 UART: [rt]cmd =0x44504543, len=96
43,109,421 >>> mbox cmd response data (56 bytes)
43,110,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,140,820 UART: [rt]cmd =0x44504543, len=96
43,172,290 >>> mbox cmd response data (56 bytes)
43,172,988 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,203,566 UART: [rt]cmd =0x44504543, len=96
43,235,706 >>> mbox cmd response data (56 bytes)
43,236,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,266,916 UART: [rt]cmd =0x44504543, len=96
43,298,724 >>> mbox cmd response data (56 bytes)
43,299,409 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,329,771 UART: [rt]cmd =0x44504543, len=96
43,363,042 >>> mbox cmd response data (56 bytes)
43,363,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
43,394,244 UART: [rt]cmd =0x44504543, len=96
43,401,072 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
Truncated 1063 bytes from beginning
546 UART: [kat] SHA2-512-ACC
897,447 UART: [kat] ECC-384
902,872 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,793 UART: [cold-reset] ++
1,477,155 UART: [fht] Storing FHT @ 0x50003400
1,479,910 UART: [idev] ++
1,480,078 UART: [idev] CDI.KEYID = 6
1,480,438 UART: [idev] SUBJECT.KEYID = 7
1,480,862 UART: [idev] UDS.KEYID = 0
1,481,207 ready_for_fw is high
1,481,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,184 UART: [idev] Erasing UDS.KEYID = 0
1,505,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,160 UART: [idev] --
1,515,163 UART: [ldev] ++
1,515,331 UART: [ldev] CDI.KEYID = 6
1,515,694 UART: [ldev] SUBJECT.KEYID = 5
1,516,120 UART: [ldev] AUTHORITY.KEYID = 7
1,516,583 UART: [ldev] FE.KEYID = 1
1,521,729 UART: [ldev] Erasing FE.KEYID = 1
1,547,006 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,879 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,595 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,372 UART: [ldev] --
1,586,677 UART: [fwproc] Waiting for Commands...
1,587,514 UART: [fwproc] Received command 0x46574c44
1,588,305 UART: [fwproc] Received Image of size 118548 bytes
2,932,573 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,905 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,123 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,424 >>> mbox cmd response: success
3,130,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,664 UART: [afmc] ++
3,131,832 UART: [afmc] CDI.KEYID = 6
3,132,194 UART: [afmc] SUBJECT.KEYID = 7
3,132,619 UART: [afmc] AUTHORITY.KEYID = 5
3,167,986 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,944 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,433 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,316 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,999 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,897 UART: [afmc] --
3,210,861 UART: [cold-reset] --
3,211,541 UART: [state] Locking Datavault
3,212,832 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,436 UART: [state] Locking ICCM
3,214,090 UART: [exit] Launching FMC @ 0x40000130
3,219,420 UART:
3,219,436 UART: Running Caliptra FMC ...
3,219,844 UART:
3,219,898 UART: [state] CFI Enabled
3,230,616 UART: [fht] FMC Alias Private Key: 7
3,350,254 UART: [art] Extend RT PCRs Done
3,350,682 UART: [art] Lock RT PCRs Done
3,352,536 UART: [art] Populate DV Done
3,360,939 UART: [fht] FMC Alias Private Key: 7
3,361,999 UART: [art] Derive CDI
3,362,279 UART: [art] Store in slot 0x4
3,447,985 UART: [art] Derive Key Pair
3,448,345 UART: [art] Store priv key in slot 0x5
3,461,036 UART: [art] Derive Key Pair - Done
3,475,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,103 UART: [art] PUB.X = BF81FF00849EAD234342EAC15B5C408D681AA1C1193809880071AC28965340AF2C525437D7A3FBE542D5D9E6E5EB4ADD
3,498,834 UART: [art] PUB.Y = 86D0A7D65BB0566BA3D54CCDF4FC708D53E70C1EA8CABC068AE8C3988DC120E4996667500201B74A90869A19F663D705
3,505,775 UART: [art] SIG.R = 3D9BD642A9E78649786EE78EEE1189138F68381C8FE63A5C80C17A8E2092148772B4F5A53BA582B82A2992D89939883B
3,512,539 UART: [art] SIG.S = BFA80EBE0BD0531B695140C1ACB3F26ADBFAEFD79F24B5F826DA80DB923D68BE0041151E234295E52EB30CC600FEAA51
3,536,760 UART: Caliptra RT
3,537,011 UART: [state] CFI Enabled
3,657,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,795 UART: [rt]cmd =0x44504543, len=96
3,722,181 >>> mbox cmd response data (56 bytes)
3,722,182 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,752,149 UART: [rt]cmd =0x44504543, len=96
3,785,125 >>> mbox cmd response data (56 bytes)
3,785,126 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,161 UART: [rt]cmd =0x44504543, len=96
3,847,984 >>> mbox cmd response data (56 bytes)
3,847,985 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,878,010 UART: [rt]cmd =0x44504543, len=96
3,911,574 >>> mbox cmd response data (56 bytes)
3,911,575 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,941,582 UART: [rt]cmd =0x44504543, len=96
3,975,081 >>> mbox cmd response data (56 bytes)
3,975,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,133 UART: [rt]cmd =0x44504543, len=96
4,037,573 >>> mbox cmd response data (56 bytes)
4,037,574 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,067,437 UART: [rt]cmd =0x44504543, len=96
4,100,614 >>> mbox cmd response data (56 bytes)
4,100,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,130,442 UART: [rt]cmd =0x44504543, len=96
4,163,858 >>> mbox cmd response data (56 bytes)
4,163,859 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,193,676 UART: [rt]cmd =0x44504543, len=96
4,227,101 >>> mbox cmd response data (56 bytes)
4,227,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,256,989 UART: [rt]cmd =0x44504543, len=96
4,289,921 >>> mbox cmd response data (56 bytes)
4,289,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,319,699 UART: [rt]cmd =0x44504543, len=96
4,352,498 >>> mbox cmd response data (56 bytes)
4,352,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,382,560 UART: [rt]cmd =0x44504543, len=96
4,416,476 >>> mbox cmd response data (56 bytes)
4,416,477 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,445,998 UART: [rt]cmd =0x52435458, len=8
4,447,680 >>> mbox cmd response data (16 bytes)
4,447,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,448,363 UART:
4,448,379 UART: Running Caliptra ROM ...
4,448,787 UART:
4,448,841 UART: [state] CFI Enabled
4,451,383 UART: [state] LifecycleState = Unprovisioned
4,452,038 UART: [state] DebugLocked = No
4,452,520 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,454,021 UART: [kat] SHA2-256
5,247,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,252,067 UART: [kat] ++
5,252,219 UART: [kat] sha1
5,256,269 UART: [kat] SHA2-256
5,258,207 UART: [kat] SHA2-384
5,260,862 UART: [kat] SHA2-512-ACC
5,262,762 UART: [kat] ECC-384
5,268,161 UART: [kat] HMAC-384Kdf
5,272,675 UART: [kat] LMS
5,840,871 UART: [kat] --
5,841,912 UART: [update-reset] ++
7,223,312 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,224,582 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,379,849 >>> mbox cmd response: success
7,379,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,380,056 UART: [update-reset] Copying MAN_2 To MAN_1
7,388,070 UART: [update-reset Success] --
7,389,001 UART: [state] Locking Datavault
7,389,973 UART: [state] Locking PCR0, PCR1 and PCR31
7,390,577 UART: [state] Locking ICCM
7,391,019 UART: [exit] Launching FMC @ 0x40000130
7,396,349 UART:
7,396,365 UART: Running Caliptra FMC ...
7,396,773 UART:
7,396,827 UART: [state] CFI Enabled
7,485,894 UART: [art] Extend RT PCRs Done
7,486,322 UART: [art] Lock RT PCRs Done
7,487,251 UART: [art] Populate DV Done
7,495,556 UART: [fht] FMC Alias Private Key: 7
7,496,596 UART: [art] Derive CDI
7,496,876 UART: [art] Store in slot 0x4
7,582,168 UART: [art] Derive Key Pair
7,582,528 UART: [art] Store priv key in slot 0x5
7,595,807 UART: [art] Derive Key Pair - Done
7,610,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,626,068 UART: [art] Erasing AUTHORITY.KEYID = 7
7,626,833 UART: [art] PUB.X = E4E6BD5E0EDEC629891B41C514D870C2F1A7E32CB152CA231BE5EB70E48B9AD960AF37A892E5D975DDEBF0960635C516
7,633,613 UART: [art] PUB.Y = A9D91A4AFCA6719838D7E12CC1FC48BE52B32756F0AE00E6F58F80FF4FF321EC1846E495AF6C6FBDE8657626D96CECE2
7,640,561 UART: [art] SIG.R = E9B89895C1B5F8C738DB8AD49883189292DF050677A0758716D53D8DDE9B715A172B819DBEABA050D9551D17DB73DBB6
7,647,331 UART: [art] SIG.S = F52E7BE5BE3BD3E85149133DAFECF6C9912C891A619BCB12B9CC54B41E86C6AFD57898F2BD204B74EE6D38877485F76E
7,670,837 UART: Caliptra RT
7,671,088 UART: [state] CFI Enabled
8,020,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,050,695 UART: [rt]cmd =0x44504543, len=96
8,083,356 >>> mbox cmd response data (56 bytes)
8,083,357 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,113,260 UART: [rt]cmd =0x44504543, len=96
8,145,830 >>> mbox cmd response data (56 bytes)
8,145,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,175,798 UART: [rt]cmd =0x44504543, len=96
8,208,885 >>> mbox cmd response data (56 bytes)
8,208,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,238,951 UART: [rt]cmd =0x44504543, len=96
8,271,509 >>> mbox cmd response data (56 bytes)
8,271,510 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,301,495 UART: [rt]cmd =0x44504543, len=96
8,335,310 >>> mbox cmd response data (56 bytes)
8,335,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,365,184 UART: [rt]cmd =0x44504543, len=96
8,399,008 >>> mbox cmd response data (56 bytes)
8,399,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,428,832 UART: [rt]cmd =0x44504543, len=96
8,461,813 >>> mbox cmd response data (56 bytes)
8,461,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,491,743 UART: [rt]cmd =0x44504543, len=96
8,524,589 >>> mbox cmd response data (56 bytes)
8,524,590 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,554,615 UART: [rt]cmd =0x44504543, len=96
8,588,660 >>> mbox cmd response data (56 bytes)
8,588,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,618,660 UART: [rt]cmd =0x44504543, len=96
8,651,842 >>> mbox cmd response data (56 bytes)
8,651,843 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,681,716 UART: [rt]cmd =0x44504543, len=96
8,689,269 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,985 ready_for_fw is high
1,362,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,882 >>> mbox cmd response: success
2,980,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,043,701 UART:
3,043,717 UART: Running Caliptra FMC ...
3,044,125 UART:
3,044,179 UART: [state] CFI Enabled
3,054,665 UART: [fht] FMC Alias Private Key: 7
3,173,737 UART: [art] Extend RT PCRs Done
3,174,165 UART: [art] Lock RT PCRs Done
3,175,979 UART: [art] Populate DV Done
3,184,450 UART: [fht] FMC Alias Private Key: 7
3,185,600 UART: [art] Derive CDI
3,185,880 UART: [art] Store in slot 0x4
3,271,216 UART: [art] Derive Key Pair
3,271,576 UART: [art] Store priv key in slot 0x5
3,284,129 UART: [art] Derive Key Pair - Done
3,299,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,500 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,265 UART: [art] PUB.X = 963D43EA8E1E225E0BDF30A4193089E5CB7B90736F5845BABA5D6B3F67E0979B48225D07E658CF6A328DBB037A618C5E
3,322,034 UART: [art] PUB.Y = 1694ED26FBDB5AEA80401CC869AD6A5CFCD06EAFF6C55B16DBCD2D12CCD78B54981DE40612531E3068D7EE36FC522874
3,329,001 UART: [art] SIG.R = AF248CAEC7380D0555FBFA7FF394D8B6E711553B9499899FFABFFA93FA68E1CBE2E91548D07D0DF4019350C89ADF356E
3,335,777 UART: [art] SIG.S = C82C902D3FF0A1CE619627BCF8A4A3C70CAA4109B847C10B7FD33538D3D1A9B4FB88D50B80D318476F264A648ED7E5DF
3,359,981 UART: Caliptra RT
3,360,232 UART: [state] CFI Enabled
3,481,337 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,353 UART: [rt]cmd =0x44504543, len=96
3,545,447 >>> mbox cmd response data (56 bytes)
3,545,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,575,567 UART: [rt]cmd =0x44504543, len=96
3,608,535 >>> mbox cmd response data (56 bytes)
3,608,536 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,385 UART: [rt]cmd =0x44504543, len=96
3,671,324 >>> mbox cmd response data (56 bytes)
3,671,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,428 UART: [rt]cmd =0x44504543, len=96
3,734,300 >>> mbox cmd response data (56 bytes)
3,734,301 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,764,244 UART: [rt]cmd =0x44504543, len=96
3,797,819 >>> mbox cmd response data (56 bytes)
3,797,820 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,773 UART: [rt]cmd =0x44504543, len=96
3,861,033 >>> mbox cmd response data (56 bytes)
3,861,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,890,921 UART: [rt]cmd =0x44504543, len=96
3,923,582 >>> mbox cmd response data (56 bytes)
3,923,583 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,953,548 UART: [rt]cmd =0x44504543, len=96
3,986,602 >>> mbox cmd response data (56 bytes)
3,986,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,772 UART: [rt]cmd =0x44504543, len=96
4,048,827 >>> mbox cmd response data (56 bytes)
4,048,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,078,723 UART: [rt]cmd =0x44504543, len=96
4,111,785 >>> mbox cmd response data (56 bytes)
4,111,786 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,141,837 UART: [rt]cmd =0x44504543, len=96
4,174,260 >>> mbox cmd response data (56 bytes)
4,174,261 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,203,982 UART: [rt]cmd =0x44504543, len=96
4,237,276 >>> mbox cmd response data (56 bytes)
4,237,277 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,266,796 UART: [rt]cmd =0x52435458, len=8
4,268,498 >>> mbox cmd response data (16 bytes)
4,268,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,082,539 >>> mbox cmd response: success
7,082,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,096,085 UART:
7,096,101 UART: Running Caliptra FMC ...
7,096,509 UART:
7,096,563 UART: [state] CFI Enabled
7,185,352 UART: [art] Extend RT PCRs Done
7,185,780 UART: [art] Lock RT PCRs Done
7,187,115 UART: [art] Populate DV Done
7,195,302 UART: [fht] FMC Alias Private Key: 7
7,196,470 UART: [art] Derive CDI
7,196,750 UART: [art] Store in slot 0x4
7,282,292 UART: [art] Derive Key Pair
7,282,652 UART: [art] Store priv key in slot 0x5
7,295,489 UART: [art] Derive Key Pair - Done
7,310,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,325,852 UART: [art] Erasing AUTHORITY.KEYID = 7
7,326,617 UART: [art] PUB.X = 5C8671385FCBD9C82143ADEE5DE6AE364706D2692A18DE8031A1712B4E5D8520B79684D3BC161E771D3EDD2AC11FB242
7,333,392 UART: [art] PUB.Y = FF0E78D2C4E5847DE3300460ABD8FB95E9A9E2664D12559C20935FBAE7E622053813806438B154984A778C5DA8BD522C
7,340,333 UART: [art] SIG.R = 54EC61ECB92A53AC56F78DF31E4DEAB94FA8AC40696DCCFC48B021817177DF57AFD36248807F06A622420A4DF1E94366
7,347,109 UART: [art] SIG.S = 493C01A71FDB22FC10570CEB09C8CE97AAFA0509D72C1509BE398CA60E2D68722E70204229C360D07F5BA844B9A73D62
7,371,026 UART: Caliptra RT
7,371,277 UART: [state] CFI Enabled
7,723,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,754,590 UART: [rt]cmd =0x44504543, len=96
7,788,155 >>> mbox cmd response data (56 bytes)
7,788,156 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,818,297 UART: [rt]cmd =0x44504543, len=96
7,851,833 >>> mbox cmd response data (56 bytes)
7,851,834 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,881,653 UART: [rt]cmd =0x44504543, len=96
7,914,446 >>> mbox cmd response data (56 bytes)
7,914,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,944,174 UART: [rt]cmd =0x44504543, len=96
7,977,820 >>> mbox cmd response data (56 bytes)
7,977,821 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,007,880 UART: [rt]cmd =0x44504543, len=96
8,040,753 >>> mbox cmd response data (56 bytes)
8,040,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,070,817 UART: [rt]cmd =0x44504543, len=96
8,103,997 >>> mbox cmd response data (56 bytes)
8,103,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,134,055 UART: [rt]cmd =0x44504543, len=96
8,167,004 >>> mbox cmd response data (56 bytes)
8,167,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,197,056 UART: [rt]cmd =0x44504543, len=96
8,230,670 >>> mbox cmd response data (56 bytes)
8,230,671 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,260,296 UART: [rt]cmd =0x44504543, len=96
8,293,983 >>> mbox cmd response data (56 bytes)
8,293,984 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,323,941 UART: [rt]cmd =0x44504543, len=96
8,356,597 >>> mbox cmd response data (56 bytes)
8,356,598 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,386,743 UART: [rt]cmd =0x44504543, len=96
8,394,166 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.44s
Truncated 1063 bytes from beginning
335 UART: [kat] SHA2-512-ACC
897,236 UART: [kat] ECC-384
902,571 UART: [kat] HMAC-384Kdf
907,153 UART: [kat] LMS
1,475,349 UART: [kat] --
1,476,046 UART: [cold-reset] ++
1,476,380 UART: [fht] Storing FHT @ 0x50003400
1,478,989 UART: [idev] ++
1,479,157 UART: [idev] CDI.KEYID = 6
1,479,517 UART: [idev] SUBJECT.KEYID = 7
1,479,941 UART: [idev] UDS.KEYID = 0
1,480,286 ready_for_fw is high
1,480,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,859 UART: [idev] Erasing UDS.KEYID = 0
1,503,977 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,555 UART: [idev] --
1,513,456 UART: [ldev] ++
1,513,624 UART: [ldev] CDI.KEYID = 6
1,513,987 UART: [ldev] SUBJECT.KEYID = 5
1,514,413 UART: [ldev] AUTHORITY.KEYID = 7
1,514,876 UART: [ldev] FE.KEYID = 1
1,520,260 UART: [ldev] Erasing FE.KEYID = 1
1,546,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,455 UART: [ldev] --
1,585,924 UART: [fwproc] Waiting for Commands...
1,586,625 UART: [fwproc] Received command 0x46574c44
1,587,416 UART: [fwproc] Received Image of size 118548 bytes
2,931,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,646 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,864 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,081 >>> mbox cmd response: success
3,130,081 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,131,099 UART: [afmc] ++
3,131,267 UART: [afmc] CDI.KEYID = 6
3,131,629 UART: [afmc] SUBJECT.KEYID = 7
3,132,054 UART: [afmc] AUTHORITY.KEYID = 5
3,167,207 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,563 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,052 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,935 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,618 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,460 UART: [afmc] --
3,210,526 UART: [cold-reset] --
3,211,394 UART: [state] Locking Datavault
3,212,517 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,121 UART: [state] Locking ICCM
3,213,719 UART: [exit] Launching FMC @ 0x40000130
3,219,049 UART:
3,219,065 UART: Running Caliptra FMC ...
3,219,473 UART:
3,219,616 UART: [state] CFI Enabled
3,230,256 UART: [fht] FMC Alias Private Key: 7
3,349,312 UART: [art] Extend RT PCRs Done
3,349,740 UART: [art] Lock RT PCRs Done
3,351,430 UART: [art] Populate DV Done
3,359,389 UART: [fht] FMC Alias Private Key: 7
3,360,363 UART: [art] Derive CDI
3,360,643 UART: [art] Store in slot 0x4
3,446,227 UART: [art] Derive Key Pair
3,446,587 UART: [art] Store priv key in slot 0x5
3,459,996 UART: [art] Derive Key Pair - Done
3,474,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,484 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,249 UART: [art] PUB.X = 977CB0C4617ED92D1C942930A78FF6C6F69C77662A96FC5B18BD591EF945D4E8BBE03244BD4717971BEBE455694EF3BD
3,498,029 UART: [art] PUB.Y = 560E034A06E56EFDCE8E3499DBACEF722E46CDA66847E096C306489A9400AD160D16DB6A8B1A5DB69A4CC3020331E38F
3,504,948 UART: [art] SIG.R = 7A81FAA236DA03B43A05EA6B71A5E381B87418B7E5C0B6FA738A433A7B6ADB2F0F7D276B62B409591FD098CF7FD269E2
3,511,720 UART: [art] SIG.S = DEF694CEE98C7A2279422448048480CCEB1601B2636ED674EAECF28E2C83E135584CE4D0F51CAE806F6C99325DCFD635
3,535,426 UART: Caliptra RT
3,535,769 UART: [state] CFI Enabled
3,656,133 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,263 UART: [rt]cmd =0x44504543, len=96
3,719,899 >>> mbox cmd response data (56 bytes)
3,719,900 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,749,791 UART: [rt]cmd =0x44504543, len=96
3,782,997 >>> mbox cmd response data (56 bytes)
3,782,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,812,989 UART: [rt]cmd =0x44504543, len=96
3,845,524 >>> mbox cmd response data (56 bytes)
3,845,525 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,875,620 UART: [rt]cmd =0x44504543, len=96
3,909,218 >>> mbox cmd response data (56 bytes)
3,909,219 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,939,222 UART: [rt]cmd =0x44504543, len=96
3,972,731 >>> mbox cmd response data (56 bytes)
3,972,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,005 UART: [rt]cmd =0x44504543, len=96
4,036,179 >>> mbox cmd response data (56 bytes)
4,036,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,066,165 UART: [rt]cmd =0x44504543, len=96
4,098,142 >>> mbox cmd response data (56 bytes)
4,098,143 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,128,144 UART: [rt]cmd =0x44504543, len=96
4,161,484 >>> mbox cmd response data (56 bytes)
4,161,485 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,191,482 UART: [rt]cmd =0x44504543, len=96
4,224,559 >>> mbox cmd response data (56 bytes)
4,224,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,254,537 UART: [rt]cmd =0x44504543, len=96
4,287,721 >>> mbox cmd response data (56 bytes)
4,287,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,317,859 UART: [rt]cmd =0x44504543, len=96
4,350,472 >>> mbox cmd response data (56 bytes)
4,350,473 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,380,434 UART: [rt]cmd =0x44504543, len=96
4,413,598 >>> mbox cmd response data (56 bytes)
4,413,599 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,442,928 UART: [rt]cmd =0x52435458, len=8
4,444,636 >>> mbox cmd response data (16 bytes)
4,444,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,445,431 UART:
4,445,447 UART: Running Caliptra ROM ...
4,445,855 UART:
4,445,996 UART: [state] CFI Enabled
4,448,386 UART: [state] LifecycleState = Unprovisioned
4,449,041 UART: [state] DebugLocked = No
4,449,599 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,451,172 UART: [kat] SHA2-256
5,245,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,249,218 UART: [kat] ++
5,249,370 UART: [kat] sha1
5,253,636 UART: [kat] SHA2-256
5,255,574 UART: [kat] SHA2-384
5,258,263 UART: [kat] SHA2-512-ACC
5,260,163 UART: [kat] ECC-384
5,265,876 UART: [kat] HMAC-384Kdf
5,270,394 UART: [kat] LMS
5,838,590 UART: [kat] --
5,839,863 UART: [update-reset] ++
7,221,689 UART: [update-reset] Image verified using Vendor ECC Key Index 0
7,222,981 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
7,378,248 >>> mbox cmd response: success
7,378,248 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,378,405 UART: [update-reset] Copying MAN_2 To MAN_1
7,386,419 UART: [update-reset Success] --
7,387,386 UART: [state] Locking Datavault
7,388,086 UART: [state] Locking PCR0, PCR1 and PCR31
7,388,690 UART: [state] Locking ICCM
7,389,114 UART: [exit] Launching FMC @ 0x40000130
7,394,444 UART:
7,394,460 UART: Running Caliptra FMC ...
7,394,868 UART:
7,395,011 UART: [state] CFI Enabled
7,484,444 UART: [art] Extend RT PCRs Done
7,484,872 UART: [art] Lock RT PCRs Done
7,486,163 UART: [art] Populate DV Done
7,494,356 UART: [fht] FMC Alias Private Key: 7
7,495,518 UART: [art] Derive CDI
7,495,798 UART: [art] Store in slot 0x4
7,581,380 UART: [art] Derive Key Pair
7,581,740 UART: [art] Store priv key in slot 0x5
7,595,137 UART: [art] Derive Key Pair - Done
7,610,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,625,894 UART: [art] Erasing AUTHORITY.KEYID = 7
7,626,659 UART: [art] PUB.X = 004673EF87107DF1D316DC19FFD8AE135CC53FF0E36162F14BC646A8A46ACCA19A9D4D7F62FB710EAB86253D56F069E3
7,633,418 UART: [art] PUB.Y = 86CD6044BE4D0BCD8B674544285928284DFC3E3C5E0C6339D7CBC96CE28FBAA766A7A30FF2725BAD8C12A5501C569593
7,640,369 UART: [art] SIG.R = 9AB6551CBE1954713894CEF7388A81033480DDA78688C86AA5D43BD8FB68F6B68245042D84FBB95E9F75531509557F28
7,647,126 UART: [art] SIG.S = 9DFA87057961BB5CCD28B5601809126C6D80C3F40424EE216248C56CB869B5A7049B492B06788974BCD254F4B984FE19
7,670,737 UART: Caliptra RT
7,671,080 UART: [state] CFI Enabled
8,022,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,053,265 UART: [rt]cmd =0x44504543, len=96
8,086,298 >>> mbox cmd response data (56 bytes)
8,086,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,116,428 UART: [rt]cmd =0x44504543, len=96
8,149,380 >>> mbox cmd response data (56 bytes)
8,149,381 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,179,216 UART: [rt]cmd =0x44504543, len=96
8,212,695 >>> mbox cmd response data (56 bytes)
8,212,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,242,681 UART: [rt]cmd =0x44504543, len=96
8,276,361 >>> mbox cmd response data (56 bytes)
8,276,362 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,306,503 UART: [rt]cmd =0x44504543, len=96
8,339,360 >>> mbox cmd response data (56 bytes)
8,339,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,369,232 UART: [rt]cmd =0x44504543, len=96
8,402,694 >>> mbox cmd response data (56 bytes)
8,402,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,432,594 UART: [rt]cmd =0x44504543, len=96
8,466,385 >>> mbox cmd response data (56 bytes)
8,466,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,496,529 UART: [rt]cmd =0x44504543, len=96
8,529,409 >>> mbox cmd response data (56 bytes)
8,529,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,559,139 UART: [rt]cmd =0x44504543, len=96
8,591,740 >>> mbox cmd response data (56 bytes)
8,591,741 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,621,564 UART: [rt]cmd =0x44504543, len=96
8,654,394 >>> mbox cmd response data (56 bytes)
8,654,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,684,068 UART: [rt]cmd =0x44504543, len=96
8,691,759 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,552 ready_for_fw is high
1,362,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,723 >>> mbox cmd response: success
2,980,723 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,650 UART:
3,042,666 UART: Running Caliptra FMC ...
3,043,074 UART:
3,043,217 UART: [state] CFI Enabled
3,053,935 UART: [fht] FMC Alias Private Key: 7
3,173,257 UART: [art] Extend RT PCRs Done
3,173,685 UART: [art] Lock RT PCRs Done
3,175,349 UART: [art] Populate DV Done
3,183,530 UART: [fht] FMC Alias Private Key: 7
3,184,504 UART: [art] Derive CDI
3,184,784 UART: [art] Store in slot 0x4
3,270,294 UART: [art] Derive Key Pair
3,270,654 UART: [art] Store priv key in slot 0x5
3,284,019 UART: [art] Derive Key Pair - Done
3,299,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,762 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,527 UART: [art] PUB.X = 8FABF885E2E4D0F52BFF70D3B452D6E79D0C8415FD295F00025FF5783E33BB69C090ECF64184BAAF6BF9446BA9E66D89
3,322,285 UART: [art] PUB.Y = A5A1E4684C06FF589AD3C2861B54594E03C64B5039E65D2451F338CF30BEF138B2330C6A44241DB2D676CAE11579914B
3,329,226 UART: [art] SIG.R = 3CBA4885BF3094BB9145E30959479E2BD69FFA2D319CBA383CB9332801CF39FAD604C610FE1AB45B6C78A11F1A1805D2
3,335,994 UART: [art] SIG.S = 7676D54B1C6ADC110A00EAA5B72065E96ED1F81872766E02D7C74CF7F9D0009260D1D4AE858A495F13492238D1A45D3F
3,359,446 UART: Caliptra RT
3,359,789 UART: [state] CFI Enabled
3,480,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,750 UART: [rt]cmd =0x44504543, len=96
3,544,766 >>> mbox cmd response data (56 bytes)
3,544,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,970 UART: [rt]cmd =0x44504543, len=96
3,608,592 >>> mbox cmd response data (56 bytes)
3,608,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,638,782 UART: [rt]cmd =0x44504543, len=96
3,671,763 >>> mbox cmd response data (56 bytes)
3,671,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,721 UART: [rt]cmd =0x44504543, len=96
3,735,115 >>> mbox cmd response data (56 bytes)
3,735,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,764,961 UART: [rt]cmd =0x44504543, len=96
3,797,622 >>> mbox cmd response data (56 bytes)
3,797,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,540 UART: [rt]cmd =0x44504543, len=96
3,861,292 >>> mbox cmd response data (56 bytes)
3,861,293 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,891,172 UART: [rt]cmd =0x44504543, len=96
3,924,729 >>> mbox cmd response data (56 bytes)
3,924,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,954,713 UART: [rt]cmd =0x44504543, len=96
3,987,335 >>> mbox cmd response data (56 bytes)
3,987,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,245 UART: [rt]cmd =0x44504543, len=96
4,050,442 >>> mbox cmd response data (56 bytes)
4,050,443 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,080,254 UART: [rt]cmd =0x44504543, len=96
4,113,784 >>> mbox cmd response data (56 bytes)
4,113,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,143,784 UART: [rt]cmd =0x44504543, len=96
4,176,649 >>> mbox cmd response data (56 bytes)
4,176,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,206,603 UART: [rt]cmd =0x44504543, len=96
4,240,285 >>> mbox cmd response data (56 bytes)
4,240,286 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,269,649 UART: [rt]cmd =0x52435458, len=8
4,271,457 >>> mbox cmd response data (16 bytes)
4,271,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,085,417 >>> mbox cmd response: success
7,085,417 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
7,098,861 UART:
7,098,877 UART: Running Caliptra FMC ...
7,099,285 UART:
7,099,428 UART: [state] CFI Enabled
7,188,919 UART: [art] Extend RT PCRs Done
7,189,347 UART: [art] Lock RT PCRs Done
7,190,574 UART: [art] Populate DV Done
7,198,803 UART: [fht] FMC Alias Private Key: 7
7,199,971 UART: [art] Derive CDI
7,200,251 UART: [art] Store in slot 0x4
7,286,399 UART: [art] Derive Key Pair
7,286,759 UART: [art] Store priv key in slot 0x5
7,300,354 UART: [art] Derive Key Pair - Done
7,315,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,330,696 UART: [art] Erasing AUTHORITY.KEYID = 7
7,331,461 UART: [art] PUB.X = D254A3191E7862632A162A34BE60D8234C26A21553C36E9279B2FA3C35FF6D2821FCADCE32DB20F7B77081D401FD8793
7,338,230 UART: [art] PUB.Y = F9F50FF84E246ED24B5703F1AF67F99BD523F347F1D9783DDEABFE5782B4889A6770EF884FF8B63ECB67502E13D6D1F2
7,345,188 UART: [art] SIG.R = CA94F167D4B68228FFC73A0DB405E0B2535B97CDDD1DCEC7D30CFE8AE0E4A7C3F37220537ADDF75DF5423D145DBCD56F
7,351,975 UART: [art] SIG.S = 63DCFCC93EF65435738FAA05F76A421F6FCE90169C019350CEF3BEDF5826526204CDE9E466E625DC16076358D9BFB12C
7,375,425 UART: Caliptra RT
7,375,768 UART: [state] CFI Enabled
7,720,709 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,751,506 UART: [rt]cmd =0x44504543, len=96
7,784,637 >>> mbox cmd response data (56 bytes)
7,784,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,814,555 UART: [rt]cmd =0x44504543, len=96
7,847,411 >>> mbox cmd response data (56 bytes)
7,847,412 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,877,469 UART: [rt]cmd =0x44504543, len=96
7,909,792 >>> mbox cmd response data (56 bytes)
7,909,793 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,939,666 UART: [rt]cmd =0x44504543, len=96
7,972,950 >>> mbox cmd response data (56 bytes)
7,972,951 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,003,134 UART: [rt]cmd =0x44504543, len=96
8,035,739 >>> mbox cmd response data (56 bytes)
8,035,740 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,065,623 UART: [rt]cmd =0x44504543, len=96
8,099,493 >>> mbox cmd response data (56 bytes)
8,099,494 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,129,429 UART: [rt]cmd =0x44504543, len=96
8,162,768 >>> mbox cmd response data (56 bytes)
8,162,769 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,192,786 UART: [rt]cmd =0x44504543, len=96
8,226,616 >>> mbox cmd response data (56 bytes)
8,226,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,256,498 UART: [rt]cmd =0x44504543, len=96
8,290,363 >>> mbox cmd response data (56 bytes)
8,290,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,320,089 UART: [rt]cmd =0x44504543, len=96
8,353,171 >>> mbox cmd response data (56 bytes)
8,353,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,383,077 UART: [rt]cmd =0x44504543, len=96
8,390,244 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
Truncated 959 bytes from beginning
] sha1
899,724 UART: [kat] SHA2-256
901,664 UART: [kat] SHA2-384
904,415 UART: [kat] SHA2-512-ACC
906,316 UART: [kat] ECC-384
916,259 UART: [kat] HMAC-384Kdf
920,623 UART: [kat] LMS
1,168,935 UART: [kat] --
1,169,724 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,590 UART: [idev] ++
1,172,758 UART: [idev] CDI.KEYID = 6
1,173,119 UART: [idev] SUBJECT.KEYID = 7
1,173,544 UART: [idev] UDS.KEYID = 0
1,173,890 ready_for_fw is high
1,173,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,841 UART: [idev] Erasing UDS.KEYID = 0
1,198,623 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,524 UART: [ldev] ++
1,208,692 UART: [ldev] CDI.KEYID = 6
1,209,056 UART: [ldev] SUBJECT.KEYID = 5
1,209,483 UART: [ldev] AUTHORITY.KEYID = 7
1,209,946 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,240,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,254 UART: [ldev] --
1,280,565 UART: [fwproc] Wait for Commands...
1,281,202 UART: [fwproc] Recv command 0x46574c44
1,281,935 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,546 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,041 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,597 >>> mbox cmd response: success
2,825,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,826,829 UART: [afmc] ++
2,826,997 UART: [afmc] CDI.KEYID = 6
2,827,360 UART: [afmc] SUBJECT.KEYID = 7
2,827,786 UART: [afmc] AUTHORITY.KEYID = 5
2,863,363 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,001 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,818 UART: [afmc] --
2,906,733 UART: [cold-reset] --
2,907,427 UART: [state] Locking Datavault
2,908,856 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,460 UART: [state] Locking ICCM
2,909,996 UART: [exit] Launching FMC @ 0x40000130
2,915,326 UART:
2,915,342 UART: Running Caliptra FMC ...
2,915,750 UART:
2,915,804 UART: [state] CFI Enabled
2,926,426 UART: [fht] FMC Alias Private Key: 7
3,045,636 UART: [art] Extend RT PCRs Done
3,046,064 UART: [art] Lock RT PCRs Done
3,047,956 UART: [art] Populate DV Done
3,056,201 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,486 UART: [art] Derive Key Pair
3,143,846 UART: [art] Store priv key in slot 0x5
3,156,618 UART: [art] Derive Key Pair - Done
3,171,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,687 UART: [art] PUB.X = F7EEAA0F366949065BBA505AD7BD93B363E67A61562BD552F8A1668C44CAAA664221EBAB022B973138FC8CB7218EF150
3,194,458 UART: [art] PUB.Y = 31825CD71BFD9CB24CDA0067570B52B35AB69AE6DF7DD2B1FB889E704E55A4A42155448B6A5420F2C138447BBEA93475
3,201,391 UART: [art] SIG.R = 65A2FD9F814701426138405D8634B2D0BB7F8CDD96676FB1686A95B61D5D1F3A1E476EA379438F1A28521F4532CC964D
3,208,156 UART: [art] SIG.S = E1E098C87E1B44212E2A9D40192906CB8D8FAF6B2A9DC7EC36BA77CED168199E3C83B66B2277DA7546EB06EB144BA2B7
3,232,026 UART: Caliptra RT
3,232,277 UART: [state] CFI Enabled
3,351,004 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,022 UART: [rt]cmd =0x44504543, len=96
3,415,172 >>> mbox cmd response data (56 bytes)
3,415,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,444,914 UART: [rt]cmd =0x44504543, len=96
3,476,504 >>> mbox cmd response data (56 bytes)
3,476,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,414 UART: [rt]cmd =0x44504543, len=96
3,539,035 >>> mbox cmd response data (56 bytes)
3,539,036 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,569,121 UART: [rt]cmd =0x44504543, len=96
3,602,319 >>> mbox cmd response data (56 bytes)
3,602,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,632,227 UART: [rt]cmd =0x44504543, len=96
3,664,764 >>> mbox cmd response data (56 bytes)
3,664,765 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,780 UART: [rt]cmd =0x44504543, len=96
3,727,520 >>> mbox cmd response data (56 bytes)
3,727,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,350 UART: [rt]cmd =0x44504543, len=96
3,790,637 >>> mbox cmd response data (56 bytes)
3,790,638 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,719 UART: [rt]cmd =0x44504543, len=96
3,853,215 >>> mbox cmd response data (56 bytes)
3,853,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,883,331 UART: [rt]cmd =0x44504543, len=96
3,915,890 >>> mbox cmd response data (56 bytes)
3,915,891 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,945,694 UART: [rt]cmd =0x44504543, len=96
3,978,304 >>> mbox cmd response data (56 bytes)
3,978,305 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,008,186 UART: [rt]cmd =0x44504543, len=96
4,041,325 >>> mbox cmd response data (56 bytes)
4,041,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,071,135 UART: [rt]cmd =0x44504543, len=96
4,104,101 >>> mbox cmd response data (56 bytes)
4,104,102 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,133,623 UART: [rt]cmd =0x52435458, len=8
4,135,331 >>> mbox cmd response data (16 bytes)
4,135,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,136,325 UART:
4,136,341 UART: Running Caliptra ROM ...
4,136,749 UART:
4,136,804 UART: [state] CFI Enabled
4,139,208 UART: [state] LifecycleState = Unprovisioned
4,139,863 UART: [state] DebugLocked = No
4,140,357 UART: [state] WD Timer not started. Device not locked for debugging
4,141,695 UART: [kat] SHA2-256
4,945,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,949,349 UART: [kat] ++
4,949,501 UART: [kat] sha1
4,953,625 UART: [kat] SHA2-256
4,955,565 UART: [kat] SHA2-384
4,958,320 UART: [kat] SHA2-512-ACC
4,960,220 UART: [kat] ECC-384
4,969,855 UART: [kat] HMAC-384Kdf
4,974,409 UART: [kat] LMS
5,222,721 UART: [kat] --
5,223,839 UART: [update-reset] ++
6,583,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,584,175 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,739,390 >>> mbox cmd response: success
6,739,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,739,605 UART: [update-reset] Copying MAN_2 To MAN_1
6,747,619 UART: [update-reset Success] --
6,748,374 UART: [state] Locking Datavault
6,749,066 UART: [state] Locking PCR0, PCR1 and PCR31
6,749,670 UART: [state] Locking ICCM
6,750,284 UART: [exit] Launching FMC @ 0x40000130
6,755,614 UART:
6,755,630 UART: Running Caliptra FMC ...
6,756,038 UART:
6,756,092 UART: [state] CFI Enabled
6,845,013 UART: [art] Extend RT PCRs Done
6,845,441 UART: [art] Lock RT PCRs Done
6,846,898 UART: [art] Populate DV Done
6,855,049 UART: [fht] FMC Alias Private Key: 7
6,856,111 UART: [art] Derive CDI
6,856,391 UART: [art] Store in slot 0x4
6,942,056 UART: [art] Derive Key Pair
6,942,416 UART: [art] Store priv key in slot 0x5
6,955,868 UART: [art] Derive Key Pair - Done
6,970,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,985,856 UART: [art] Erasing AUTHORITY.KEYID = 7
6,986,621 UART: [art] PUB.X = 05004AA02EE7D019762D5F2CEB808547BD4BF323898EB290E348B156FE209E42DD0EE9B8C2676D2BF32FCC151F950D48
6,993,368 UART: [art] PUB.Y = 84FECB31A5FABE7207BFAF40A88283D67338FF3F8853161B879220B4EF461429553A63469A144AD054ACF539D1B23E79
7,000,317 UART: [art] SIG.R = B397620BA4F3374834393CCD4216753F6A4467EDE9C83ABDE40A47295F260DB1BCE8D93F69AADCF12CC4705BE8FA8819
7,007,090 UART: [art] SIG.S = 39985328001D0ED926ED96B8D14F4CC8DCB144EB7131B3F02366069BA142C3D2EEEF51AE8F6126FC13C69C574792190A
7,030,471 UART: Caliptra RT
7,030,722 UART: [state] CFI Enabled
7,387,250 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,418,097 UART: [rt]cmd =0x44504543, len=96
7,451,032 >>> mbox cmd response data (56 bytes)
7,451,033 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,481,228 UART: [rt]cmd =0x44504543, len=96
7,514,732 >>> mbox cmd response data (56 bytes)
7,514,733 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,544,704 UART: [rt]cmd =0x44504543, len=96
7,578,325 >>> mbox cmd response data (56 bytes)
7,578,326 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,608,197 UART: [rt]cmd =0x44504543, len=96
7,641,645 >>> mbox cmd response data (56 bytes)
7,641,646 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,671,641 UART: [rt]cmd =0x44504543, len=96
7,704,944 >>> mbox cmd response data (56 bytes)
7,704,945 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,734,794 UART: [rt]cmd =0x44504543, len=96
7,768,202 >>> mbox cmd response data (56 bytes)
7,768,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,798,184 UART: [rt]cmd =0x44504543, len=96
7,831,341 >>> mbox cmd response data (56 bytes)
7,831,342 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,861,175 UART: [rt]cmd =0x44504543, len=96
7,893,745 >>> mbox cmd response data (56 bytes)
7,893,746 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,923,861 UART: [rt]cmd =0x44504543, len=96
7,956,470 >>> mbox cmd response data (56 bytes)
7,956,471 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,986,458 UART: [rt]cmd =0x44504543, len=96
8,018,600 >>> mbox cmd response data (56 bytes)
8,018,601 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,048,594 UART: [rt]cmd =0x44504543, len=96
8,056,079 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,768 ready_for_fw is high
1,059,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,274 >>> mbox cmd response: success
2,678,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,963 UART:
2,739,979 UART: Running Caliptra FMC ...
2,740,387 UART:
2,740,441 UART: [state] CFI Enabled
2,750,669 UART: [fht] FMC Alias Private Key: 7
2,870,667 UART: [art] Extend RT PCRs Done
2,871,095 UART: [art] Lock RT PCRs Done
2,872,501 UART: [art] Populate DV Done
2,880,416 UART: [fht] FMC Alias Private Key: 7
2,881,562 UART: [art] Derive CDI
2,881,842 UART: [art] Store in slot 0x4
2,967,475 UART: [art] Derive Key Pair
2,967,835 UART: [art] Store priv key in slot 0x5
2,980,631 UART: [art] Derive Key Pair - Done
2,995,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,484 UART: [art] PUB.X = 70F37658B6922EAD010D4F1A8EB16F7FDC22A86997CF6646D54211CBC6388B8B6E4AB4425C990B095132223FF32E505B
3,018,244 UART: [art] PUB.Y = DD0E8337158D516DE2DFE2AAE27AC3BFB80A33D4D31DFC73199AE465DD48F3A61D78B9462685631EA7F73D48A52E5E80
3,025,202 UART: [art] SIG.R = D2B8B6249BA58EDBEFE79BE90F25DCD8F79B79152E8E18A3AC8F2702E41421C1D30B07A6213591587F12B94911B81488
3,031,964 UART: [art] SIG.S = 066AD035D4D2DE4819D30ADD1528EFE8D04260BEEC98AB2C331D2A9FBBF331A033540E22A6F5556603BE0100F82E50ED
3,055,701 UART: Caliptra RT
3,055,952 UART: [state] CFI Enabled
3,175,323 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,553 UART: [rt]cmd =0x44504543, len=96
3,239,057 >>> mbox cmd response data (56 bytes)
3,239,058 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,269,021 UART: [rt]cmd =0x44504543, len=96
3,301,965 >>> mbox cmd response data (56 bytes)
3,301,966 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,331,669 UART: [rt]cmd =0x44504543, len=96
3,364,108 >>> mbox cmd response data (56 bytes)
3,364,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,278 UART: [rt]cmd =0x44504543, len=96
3,426,496 >>> mbox cmd response data (56 bytes)
3,426,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,456,266 UART: [rt]cmd =0x44504543, len=96
3,488,923 >>> mbox cmd response data (56 bytes)
3,488,924 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,731 UART: [rt]cmd =0x44504543, len=96
3,551,249 >>> mbox cmd response data (56 bytes)
3,551,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,581,327 UART: [rt]cmd =0x44504543, len=96
3,614,098 >>> mbox cmd response data (56 bytes)
3,614,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,192 UART: [rt]cmd =0x44504543, len=96
3,677,298 >>> mbox cmd response data (56 bytes)
3,677,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,120 UART: [rt]cmd =0x44504543, len=96
3,740,605 >>> mbox cmd response data (56 bytes)
3,740,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,770,667 UART: [rt]cmd =0x44504543, len=96
3,804,141 >>> mbox cmd response data (56 bytes)
3,804,142 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,834,077 UART: [rt]cmd =0x44504543, len=96
3,866,886 >>> mbox cmd response data (56 bytes)
3,866,887 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,872 UART: [rt]cmd =0x44504543, len=96
3,929,804 >>> mbox cmd response data (56 bytes)
3,929,805 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,959,098 UART: [rt]cmd =0x52435458, len=8
3,960,666 >>> mbox cmd response data (16 bytes)
3,960,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,450,129 >>> mbox cmd response: success
6,450,129 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,463,960 UART:
6,463,976 UART: Running Caliptra FMC ...
6,464,384 UART:
6,464,438 UART: [state] CFI Enabled
6,553,015 UART: [art] Extend RT PCRs Done
6,553,443 UART: [art] Lock RT PCRs Done
6,554,646 UART: [art] Populate DV Done
6,563,019 UART: [fht] FMC Alias Private Key: 7
6,564,151 UART: [art] Derive CDI
6,564,431 UART: [art] Store in slot 0x4
6,650,006 UART: [art] Derive Key Pair
6,650,366 UART: [art] Store priv key in slot 0x5
6,663,612 UART: [art] Derive Key Pair - Done
6,678,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,693,829 UART: [art] Erasing AUTHORITY.KEYID = 7
6,694,594 UART: [art] PUB.X = 9A115AD88A9A49511B80D4A1E40B845CA53C3AD8DCF5314F8BBD0DB32EF71187848CCE14F8743F0C87B337DEAC2FA699
6,701,371 UART: [art] PUB.Y = 94140308C780C9C3738C08A1933D4128FE5FFE8FB7436ADBF3F6493B5A4AE44D4EC41481082A0850E2DCBB45554099E7
6,708,308 UART: [art] SIG.R = 402CD877635EC528FD7C7DC2DA77CF4D6E9407390A132686D2DE1B2AC56F9D2A4FA77235C882E9DCA885D9D308294BF5
6,715,079 UART: [art] SIG.S = 5E6C6B12F595499DD51827FEE45BA6F1B18038CE0996D68248400064D4D21E66236E18FFF3C822EAC137D5F67526EF01
6,738,815 UART: Caliptra RT
6,739,066 UART: [state] CFI Enabled
7,092,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,320 UART: [rt]cmd =0x44504543, len=96
7,155,925 >>> mbox cmd response data (56 bytes)
7,155,926 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,185,971 UART: [rt]cmd =0x44504543, len=96
7,219,317 >>> mbox cmd response data (56 bytes)
7,219,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,249,143 UART: [rt]cmd =0x44504543, len=96
7,282,436 >>> mbox cmd response data (56 bytes)
7,282,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,312,354 UART: [rt]cmd =0x44504543, len=96
7,345,956 >>> mbox cmd response data (56 bytes)
7,345,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,375,930 UART: [rt]cmd =0x44504543, len=96
7,409,159 >>> mbox cmd response data (56 bytes)
7,409,160 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,438,937 UART: [rt]cmd =0x44504543, len=96
7,472,083 >>> mbox cmd response data (56 bytes)
7,472,084 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,502,003 UART: [rt]cmd =0x44504543, len=96
7,535,242 >>> mbox cmd response data (56 bytes)
7,535,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,564,996 UART: [rt]cmd =0x44504543, len=96
7,598,236 >>> mbox cmd response data (56 bytes)
7,598,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,627,986 UART: [rt]cmd =0x44504543, len=96
7,660,997 >>> mbox cmd response data (56 bytes)
7,660,998 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,690,831 UART: [rt]cmd =0x44504543, len=96
7,723,975 >>> mbox cmd response data (56 bytes)
7,723,976 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,753,891 UART: [rt]cmd =0x44504543, len=96
7,761,148 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
Truncated 959 bytes from beginning
] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,212 UART: [kat] SHA2-512-ACC
906,113 UART: [kat] ECC-384
915,648 UART: [kat] HMAC-384Kdf
920,336 UART: [kat] LMS
1,168,648 UART: [kat] --
1,169,579 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,703 UART: [idev] ++
1,172,871 UART: [idev] CDI.KEYID = 6
1,173,232 UART: [idev] SUBJECT.KEYID = 7
1,173,657 UART: [idev] UDS.KEYID = 0
1,174,003 ready_for_fw is high
1,174,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,256 UART: [idev] Erasing UDS.KEYID = 0
1,198,208 UART: [idev] Sha1 KeyId Algorithm
1,207,042 UART: [idev] --
1,208,105 UART: [ldev] ++
1,208,273 UART: [ldev] CDI.KEYID = 6
1,208,637 UART: [ldev] SUBJECT.KEYID = 5
1,209,064 UART: [ldev] AUTHORITY.KEYID = 7
1,209,527 UART: [ldev] FE.KEYID = 1
1,215,007 UART: [ldev] Erasing FE.KEYID = 1
1,241,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,605 UART: [ldev] --
1,280,912 UART: [fwproc] Wait for Commands...
1,281,703 UART: [fwproc] Recv command 0x46574c44
1,282,436 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,090 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,265 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,454 >>> mbox cmd response: success
2,824,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,825,644 UART: [afmc] ++
2,825,812 UART: [afmc] CDI.KEYID = 6
2,826,175 UART: [afmc] SUBJECT.KEYID = 7
2,826,601 UART: [afmc] AUTHORITY.KEYID = 5
2,862,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,122 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,713 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,414 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,027 UART: [afmc] --
2,904,854 UART: [cold-reset] --
2,905,604 UART: [state] Locking Datavault
2,906,603 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,207 UART: [state] Locking ICCM
2,907,749 UART: [exit] Launching FMC @ 0x40000130
2,913,079 UART:
2,913,095 UART: Running Caliptra FMC ...
2,913,503 UART:
2,913,646 UART: [state] CFI Enabled
2,923,972 UART: [fht] FMC Alias Private Key: 7
3,042,346 UART: [art] Extend RT PCRs Done
3,042,774 UART: [art] Lock RT PCRs Done
3,044,254 UART: [art] Populate DV Done
3,052,317 UART: [fht] FMC Alias Private Key: 7
3,053,389 UART: [art] Derive CDI
3,053,669 UART: [art] Store in slot 0x4
3,139,508 UART: [art] Derive Key Pair
3,139,868 UART: [art] Store priv key in slot 0x5
3,153,184 UART: [art] Derive Key Pair - Done
3,167,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,145 UART: [art] PUB.X = 66B6437FB058AFA22CA1A34C008A51447F0FB4237B11168DB57F900DFCD5645C35B6F376FFAD220CF89FB71BDFF36894
3,190,896 UART: [art] PUB.Y = 5D09607F4BCB56383A816C6E73120A95DBF4C8160AD747DA455F13DED7FBBD4A2B6D9D7FF4F19945ADD796369EEB6B5F
3,197,855 UART: [art] SIG.R = 63DE98E91B92E50813EA15A31F7CA2186DC52E4F5A2A4CEBF6E7663DACBFFA02EF4C3124019319ABBB1250E09B56F35E
3,204,634 UART: [art] SIG.S = 72B59DB8EEF64251FC86FB90BB0589DF1977017EA50B383C3EE079FC76F88224D243E109B94711D1C48B6E06885CBE0A
3,228,590 UART: Caliptra RT
3,228,933 UART: [state] CFI Enabled
3,348,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,501 UART: [rt]cmd =0x44504543, len=96
3,412,495 >>> mbox cmd response data (56 bytes)
3,412,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,442,397 UART: [rt]cmd =0x44504543, len=96
3,474,731 >>> mbox cmd response data (56 bytes)
3,474,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,504,711 UART: [rt]cmd =0x44504543, len=96
3,537,086 >>> mbox cmd response data (56 bytes)
3,537,087 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,566,958 UART: [rt]cmd =0x44504543, len=96
3,599,770 >>> mbox cmd response data (56 bytes)
3,599,771 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,629,794 UART: [rt]cmd =0x44504543, len=96
3,662,249 >>> mbox cmd response data (56 bytes)
3,662,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,692,341 UART: [rt]cmd =0x44504543, len=96
3,725,273 >>> mbox cmd response data (56 bytes)
3,725,274 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,985 UART: [rt]cmd =0x44504543, len=96
3,788,286 >>> mbox cmd response data (56 bytes)
3,788,287 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,300 UART: [rt]cmd =0x44504543, len=96
3,851,592 >>> mbox cmd response data (56 bytes)
3,851,593 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,881,364 UART: [rt]cmd =0x44504543, len=96
3,914,911 >>> mbox cmd response data (56 bytes)
3,914,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,944,941 UART: [rt]cmd =0x44504543, len=96
3,977,633 >>> mbox cmd response data (56 bytes)
3,977,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,007,777 UART: [rt]cmd =0x44504543, len=96
4,040,126 >>> mbox cmd response data (56 bytes)
4,040,127 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,069,862 UART: [rt]cmd =0x44504543, len=96
4,103,016 >>> mbox cmd response data (56 bytes)
4,103,017 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,132,488 UART: [rt]cmd =0x52435458, len=8
4,134,406 >>> mbox cmd response data (16 bytes)
4,134,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,135,208 UART:
4,135,224 UART: Running Caliptra ROM ...
4,135,632 UART:
4,135,774 UART: [state] CFI Enabled
4,138,630 UART: [state] LifecycleState = Unprovisioned
4,139,285 UART: [state] DebugLocked = No
4,139,801 UART: [state] WD Timer not started. Device not locked for debugging
4,140,991 UART: [kat] SHA2-256
4,944,541 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,948,645 UART: [kat] ++
4,948,797 UART: [kat] sha1
4,953,107 UART: [kat] SHA2-256
4,955,047 UART: [kat] SHA2-384
4,957,762 UART: [kat] SHA2-512-ACC
4,959,662 UART: [kat] ECC-384
4,969,245 UART: [kat] HMAC-384Kdf
4,973,859 UART: [kat] LMS
5,222,171 UART: [kat] --
5,223,007 UART: [update-reset] ++
6,581,325 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,582,328 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,737,543 >>> mbox cmd response: success
6,737,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,737,766 UART: [update-reset] Copying MAN_2 To MAN_1
6,745,780 UART: [update-reset Success] --
6,746,697 UART: [state] Locking Datavault
6,747,471 UART: [state] Locking PCR0, PCR1 and PCR31
6,748,075 UART: [state] Locking ICCM
6,748,701 UART: [exit] Launching FMC @ 0x40000130
6,754,031 UART:
6,754,047 UART: Running Caliptra FMC ...
6,754,455 UART:
6,754,598 UART: [state] CFI Enabled
6,844,001 UART: [art] Extend RT PCRs Done
6,844,429 UART: [art] Lock RT PCRs Done
6,845,574 UART: [art] Populate DV Done
6,853,983 UART: [fht] FMC Alias Private Key: 7
6,854,979 UART: [art] Derive CDI
6,855,259 UART: [art] Store in slot 0x4
6,941,594 UART: [art] Derive Key Pair
6,941,954 UART: [art] Store priv key in slot 0x5
6,954,892 UART: [art] Derive Key Pair - Done
6,969,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,985,022 UART: [art] Erasing AUTHORITY.KEYID = 7
6,985,787 UART: [art] PUB.X = FF2FD032DCB4745A5C6CAA049E3CCC396D84FEF31DB458B68955FE5B6C79B08A3BF59F4AC9C0F5A227825F7F86E2CB92
6,992,576 UART: [art] PUB.Y = 8F2B0E663ED24D334A4083CB96D7184639661F3994BAB0EB990A014C29DD77D466DB169A75E3B6B660D02354B8721CBC
6,999,519 UART: [art] SIG.R = 3563B9BE926A31FCBB37CCBC7AB2DB2062AED775DF5271CF41237C17714E0DB0ED51985663E24ED6CE378C2091631320
7,006,294 UART: [art] SIG.S = 111560B87C00ABEDB3C02E0A6AA1F9804A75EE3E130F09A44C77D31CD47325DA226253748D4FB00A1F1235D1BDA0FC8C
7,029,686 UART: Caliptra RT
7,030,029 UART: [state] CFI Enabled
7,380,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,411,339 UART: [rt]cmd =0x44504543, len=96
7,444,430 >>> mbox cmd response data (56 bytes)
7,444,431 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,474,644 UART: [rt]cmd =0x44504543, len=96
7,507,832 >>> mbox cmd response data (56 bytes)
7,507,833 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,537,712 UART: [rt]cmd =0x44504543, len=96
7,571,073 >>> mbox cmd response data (56 bytes)
7,571,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,600,941 UART: [rt]cmd =0x44504543, len=96
7,634,349 >>> mbox cmd response data (56 bytes)
7,634,350 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,664,371 UART: [rt]cmd =0x44504543, len=96
7,697,718 >>> mbox cmd response data (56 bytes)
7,697,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,727,706 UART: [rt]cmd =0x44504543, len=96
7,760,136 >>> mbox cmd response data (56 bytes)
7,760,137 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,790,180 UART: [rt]cmd =0x44504543, len=96
7,823,453 >>> mbox cmd response data (56 bytes)
7,823,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,853,449 UART: [rt]cmd =0x44504543, len=96
7,886,407 >>> mbox cmd response data (56 bytes)
7,886,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,916,295 UART: [rt]cmd =0x44504543, len=96
7,949,476 >>> mbox cmd response data (56 bytes)
7,949,477 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,979,540 UART: [rt]cmd =0x44504543, len=96
8,012,502 >>> mbox cmd response data (56 bytes)
8,012,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,042,508 UART: [rt]cmd =0x44504543, len=96
8,050,227 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,335 ready_for_fw is high
1,059,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,981 >>> mbox cmd response: success
2,679,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,458 UART:
2,742,474 UART: Running Caliptra FMC ...
2,742,882 UART:
2,743,025 UART: [state] CFI Enabled
2,753,753 UART: [fht] FMC Alias Private Key: 7
2,872,651 UART: [art] Extend RT PCRs Done
2,873,079 UART: [art] Lock RT PCRs Done
2,874,735 UART: [art] Populate DV Done
2,882,782 UART: [fht] FMC Alias Private Key: 7
2,883,718 UART: [art] Derive CDI
2,883,998 UART: [art] Store in slot 0x4
2,969,529 UART: [art] Derive Key Pair
2,969,889 UART: [art] Store priv key in slot 0x5
2,983,377 UART: [art] Derive Key Pair - Done
2,998,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,586 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,351 UART: [art] PUB.X = 5429CB22EB212A36EF97B384492AC6C97D6AA263BDF71E1B48D813B4BEEA355B615D9ECE0192B10C358B984C3690F6C3
3,021,125 UART: [art] PUB.Y = D0C3191A470089E56B4A6A0872BC499B474902F959E3E2AEB070CB3F9F069573F6603DE66D34B24D307E9EBE2FA0931B
3,028,048 UART: [art] SIG.R = 626617A06B080081FD0DC21052B3ECD83B6C7BB46FDCC60871EF86613E60600C6A79285924C1E6CF35CCE26A28B90316
3,034,783 UART: [art] SIG.S = 7F52353718A1BE0A4F371D4CA2003862F1FF706770DF473B86F9EBC36DF3E400ED02F5C549E7EA4B90C11D3712664B96
3,058,779 UART: Caliptra RT
3,059,122 UART: [state] CFI Enabled
3,178,954 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,222 UART: [rt]cmd =0x44504543, len=96
3,243,626 >>> mbox cmd response data (56 bytes)
3,243,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,524 UART: [rt]cmd =0x44504543, len=96
3,306,074 >>> mbox cmd response data (56 bytes)
3,306,075 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,335,938 UART: [rt]cmd =0x44504543, len=96
3,368,797 >>> mbox cmd response data (56 bytes)
3,368,798 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,709 UART: [rt]cmd =0x44504543, len=96
3,431,725 >>> mbox cmd response data (56 bytes)
3,431,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,775 UART: [rt]cmd =0x44504543, len=96
3,494,542 >>> mbox cmd response data (56 bytes)
3,494,543 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,464 UART: [rt]cmd =0x44504543, len=96
3,556,480 >>> mbox cmd response data (56 bytes)
3,556,481 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,484 UART: [rt]cmd =0x44504543, len=96
3,619,151 >>> mbox cmd response data (56 bytes)
3,619,152 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,901 UART: [rt]cmd =0x44504543, len=96
3,682,479 >>> mbox cmd response data (56 bytes)
3,682,480 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,399 UART: [rt]cmd =0x44504543, len=96
3,744,830 >>> mbox cmd response data (56 bytes)
3,744,831 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,774,890 UART: [rt]cmd =0x44504543, len=96
3,807,996 >>> mbox cmd response data (56 bytes)
3,807,997 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,768 UART: [rt]cmd =0x44504543, len=96
3,870,453 >>> mbox cmd response data (56 bytes)
3,870,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,383 UART: [rt]cmd =0x44504543, len=96
3,933,441 >>> mbox cmd response data (56 bytes)
3,933,442 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,757 UART: [rt]cmd =0x52435458, len=8
3,964,549 >>> mbox cmd response data (16 bytes)
3,964,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,454,455 >>> mbox cmd response: success
6,454,455 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,467,922 UART:
6,467,938 UART: Running Caliptra FMC ...
6,468,346 UART:
6,468,489 UART: [state] CFI Enabled
6,557,562 UART: [art] Extend RT PCRs Done
6,557,990 UART: [art] Lock RT PCRs Done
6,559,341 UART: [art] Populate DV Done
6,567,640 UART: [fht] FMC Alias Private Key: 7
6,568,774 UART: [art] Derive CDI
6,569,054 UART: [art] Store in slot 0x4
6,654,913 UART: [art] Derive Key Pair
6,655,273 UART: [art] Store priv key in slot 0x5
6,668,815 UART: [art] Derive Key Pair - Done
6,683,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,698,875 UART: [art] Erasing AUTHORITY.KEYID = 7
6,699,640 UART: [art] PUB.X = 67B27CB9BC3FD017E9C61D1E5644FF752539873F61C064977822ED6B1596621081BF19C35B6042BB4B4ACE94C2A280FF
6,706,412 UART: [art] PUB.Y = E4514454E2A171D0366D4521D3CF88D110B7A68A93D173C420EBC93248A64C6BC780B21FE1154CEBC6E59E158F130FF7
6,713,363 UART: [art] SIG.R = 25106DD401FAA1858CDA98765664D3C2A642173A6C45DE253ECBFA947500FF5EFFF9D2B893CF33A8DF8873BE89E0D8BD
6,720,124 UART: [art] SIG.S = 79908A0455DA0E9ADCDEFEB031BC8527EF04A59B4991B4CF14823DF54D7CD07D3D5EF396E339F8C0018B27BCA2DDA593
6,744,060 UART: Caliptra RT
6,744,403 UART: [state] CFI Enabled
7,094,470 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,125,135 UART: [rt]cmd =0x44504543, len=96
7,158,100 >>> mbox cmd response data (56 bytes)
7,158,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,187,960 UART: [rt]cmd =0x44504543, len=96
7,220,972 >>> mbox cmd response data (56 bytes)
7,220,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,250,966 UART: [rt]cmd =0x44504543, len=96
7,284,363 >>> mbox cmd response data (56 bytes)
7,284,364 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,314,355 UART: [rt]cmd =0x44504543, len=96
7,347,599 >>> mbox cmd response data (56 bytes)
7,347,600 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,377,505 UART: [rt]cmd =0x44504543, len=96
7,411,188 >>> mbox cmd response data (56 bytes)
7,411,189 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,441,040 UART: [rt]cmd =0x44504543, len=96
7,474,344 >>> mbox cmd response data (56 bytes)
7,474,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,504,224 UART: [rt]cmd =0x44504543, len=96
7,537,187 >>> mbox cmd response data (56 bytes)
7,537,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,567,055 UART: [rt]cmd =0x44504543, len=96
7,600,275 >>> mbox cmd response data (56 bytes)
7,600,276 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,630,409 UART: [rt]cmd =0x44504543, len=96
7,662,972 >>> mbox cmd response data (56 bytes)
7,662,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,692,818 UART: [rt]cmd =0x44504543, len=96
7,725,394 >>> mbox cmd response data (56 bytes)
7,725,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,755,386 UART: [rt]cmd =0x44504543, len=96
7,762,335 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
Truncated 959 bytes from beginning
] sha1
901,851 UART: [kat] SHA2-256
903,791 UART: [kat] SHA2-384
906,490 UART: [kat] SHA2-512-ACC
908,391 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,796 UART: [kat] LMS
1,171,124 UART: [kat] --
1,172,153 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,262 UART: [idev] ++
1,175,430 UART: [idev] CDI.KEYID = 6
1,175,790 UART: [idev] SUBJECT.KEYID = 7
1,176,214 UART: [idev] UDS.KEYID = 0
1,176,559 ready_for_fw is high
1,176,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,140 UART: [idev] Erasing UDS.KEYID = 0
1,200,931 UART: [idev] Sha1 KeyId Algorithm
1,209,581 UART: [idev] --
1,210,489 UART: [ldev] ++
1,210,657 UART: [ldev] CDI.KEYID = 6
1,211,020 UART: [ldev] SUBJECT.KEYID = 5
1,211,446 UART: [ldev] AUTHORITY.KEYID = 7
1,211,909 UART: [ldev] FE.KEYID = 1
1,217,017 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,545 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,659 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,132 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,631 >>> mbox cmd response: success
2,828,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,831 UART: [afmc] ++
2,829,999 UART: [afmc] CDI.KEYID = 6
2,830,361 UART: [afmc] SUBJECT.KEYID = 7
2,830,786 UART: [afmc] AUTHORITY.KEYID = 5
2,865,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,970 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,718 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,427 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,310 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,773 UART: [afmc] --
2,909,695 UART: [cold-reset] --
2,910,357 UART: [state] Locking Datavault
2,911,684 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,288 UART: [state] Locking ICCM
2,912,754 UART: [exit] Launching FMC @ 0x40000130
2,918,084 UART:
2,918,100 UART: Running Caliptra FMC ...
2,918,508 UART:
2,918,562 UART: [state] CFI Enabled
2,928,780 UART: [fht] FMC Alias Private Key: 7
3,047,734 UART: [art] Extend RT PCRs Done
3,048,162 UART: [art] Lock RT PCRs Done
3,049,766 UART: [art] Populate DV Done
3,058,157 UART: [fht] FMC Alias Private Key: 7
3,059,291 UART: [art] Derive CDI
3,059,571 UART: [art] Store in slot 0x4
3,145,058 UART: [art] Derive Key Pair
3,145,418 UART: [art] Store priv key in slot 0x5
3,158,518 UART: [art] Derive Key Pair - Done
3,173,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,848 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,613 UART: [art] PUB.X = B003E0F8954C0D93836670B0FAABB43D08CA6A07BE18F45956E2801270969B989AC1139F313F9E8502E76DA26A06ED42
3,196,365 UART: [art] PUB.Y = F99FC801B450F0322EADDDBE2B3C0A1141148557CC313035C655419C6B2348B39399A511CBCFC791E0114DEAF4E8636C
3,203,315 UART: [art] SIG.R = FB7CC12015D98B239E3A0218F2BC3DC35852EF16FDD959C4FBAF5316A0E7BE0E96F5A86ED346264C522219D0D89E2922
3,210,089 UART: [art] SIG.S = D950A0981E192E2687AAF7924564FEE776B015F34B7316CA15EFE6C104A0A369B3BB8068B7F83C3934843A105CADFF36
3,234,150 UART: Caliptra RT
3,234,401 UART: [state] CFI Enabled
3,353,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,675 UART: [rt]cmd =0x44504543, len=96
3,417,335 >>> mbox cmd response data (56 bytes)
3,417,336 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,447,295 UART: [rt]cmd =0x44504543, len=96
3,480,039 >>> mbox cmd response data (56 bytes)
3,480,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,069 UART: [rt]cmd =0x44504543, len=96
3,543,248 >>> mbox cmd response data (56 bytes)
3,543,249 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,573,182 UART: [rt]cmd =0x44504543, len=96
3,606,460 >>> mbox cmd response data (56 bytes)
3,606,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,214 UART: [rt]cmd =0x44504543, len=96
3,669,097 >>> mbox cmd response data (56 bytes)
3,669,098 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,061 UART: [rt]cmd =0x44504543, len=96
3,732,115 >>> mbox cmd response data (56 bytes)
3,732,116 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,761,749 UART: [rt]cmd =0x44504543, len=96
3,794,360 >>> mbox cmd response data (56 bytes)
3,794,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,824,522 UART: [rt]cmd =0x44504543, len=96
3,857,298 >>> mbox cmd response data (56 bytes)
3,857,299 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,106 UART: [rt]cmd =0x44504543, len=96
3,919,847 >>> mbox cmd response data (56 bytes)
3,919,848 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,949,611 UART: [rt]cmd =0x44504543, len=96
3,982,633 >>> mbox cmd response data (56 bytes)
3,982,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,397 UART: [rt]cmd =0x44504543, len=96
4,045,406 >>> mbox cmd response data (56 bytes)
4,045,407 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,075,354 UART: [rt]cmd =0x44504543, len=96
4,108,226 >>> mbox cmd response data (56 bytes)
4,108,227 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,137,638 UART: [rt]cmd =0x52435458, len=8
4,139,384 >>> mbox cmd response data (16 bytes)
4,139,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,140,134 UART:
4,140,150 UART: Running Caliptra ROM ...
4,140,558 UART:
4,140,613 UART: [state] CFI Enabled
4,142,941 UART: [state] LifecycleState = Unprovisioned
4,143,596 UART: [state] DebugLocked = No
4,144,144 UART: [state] WD Timer not started. Device not locked for debugging
4,145,460 UART: [kat] SHA2-256
4,951,110 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,955,235 UART: [kat] ++
4,955,387 UART: [kat] sha1
4,959,535 UART: [kat] SHA2-256
4,961,475 UART: [kat] SHA2-384
4,964,286 UART: [kat] SHA2-512-ACC
4,966,186 UART: [kat] ECC-384
4,975,837 UART: [kat] HMAC-384Kdf
4,980,527 UART: [kat] LMS
5,228,855 UART: [kat] --
5,229,797 UART: [update-reset] ++
6,590,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,591,814 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,747,029 >>> mbox cmd response: success
6,747,029 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,747,200 UART: [update-reset] Copying MAN_2 To MAN_1
6,755,214 UART: [update-reset Success] --
6,756,233 UART: [state] Locking Datavault
6,757,173 UART: [state] Locking PCR0, PCR1 and PCR31
6,757,777 UART: [state] Locking ICCM
6,758,355 UART: [exit] Launching FMC @ 0x40000130
6,763,685 UART:
6,763,701 UART: Running Caliptra FMC ...
6,764,109 UART:
6,764,163 UART: [state] CFI Enabled
6,853,118 UART: [art] Extend RT PCRs Done
6,853,546 UART: [art] Lock RT PCRs Done
6,855,177 UART: [art] Populate DV Done
6,863,506 UART: [fht] FMC Alias Private Key: 7
6,864,504 UART: [art] Derive CDI
6,864,784 UART: [art] Store in slot 0x4
6,950,603 UART: [art] Derive Key Pair
6,950,963 UART: [art] Store priv key in slot 0x5
6,964,207 UART: [art] Derive Key Pair - Done
6,978,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,994,297 UART: [art] Erasing AUTHORITY.KEYID = 7
6,995,062 UART: [art] PUB.X = B672EA0C3F95DC88A28C5AEED0CEFA7FAB1CBB725DF08FE4BB9E200427CB9EF481A9D7522C645A01EA8A9388FA6798C0
7,001,849 UART: [art] PUB.Y = 4D6DA22A752700BB4F539095754FF45A1C72E7B7313C67E758D6FB3279C7E40DF1F89403E6C2D87D0EB5D9242AB81747
7,008,770 UART: [art] SIG.R = 79FDA627592EE6241947191A3888C34EFFC34CCFB01809F862332292AABC5AE942B91576B928A1A42B936AC2F479FFFA
7,015,543 UART: [art] SIG.S = 284B341D816790D3B6CC9B7D5598433D10D4AA05463BEB7EEB797BF5606DF8FDEA6DD213BDE470DDAE897257E02F2401
7,040,065 UART: Caliptra RT
7,040,316 UART: [state] CFI Enabled
7,389,123 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,420,020 UART: [rt]cmd =0x44504543, len=96
7,453,621 >>> mbox cmd response data (56 bytes)
7,453,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,483,521 UART: [rt]cmd =0x44504543, len=96
7,515,889 >>> mbox cmd response data (56 bytes)
7,515,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,545,877 UART: [rt]cmd =0x44504543, len=96
7,578,734 >>> mbox cmd response data (56 bytes)
7,578,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,608,650 UART: [rt]cmd =0x44504543, len=96
7,641,894 >>> mbox cmd response data (56 bytes)
7,641,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,671,930 UART: [rt]cmd =0x44504543, len=96
7,705,153 >>> mbox cmd response data (56 bytes)
7,705,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,734,989 UART: [rt]cmd =0x44504543, len=96
7,767,357 >>> mbox cmd response data (56 bytes)
7,767,358 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,797,317 UART: [rt]cmd =0x44504543, len=96
7,830,584 >>> mbox cmd response data (56 bytes)
7,830,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,860,506 UART: [rt]cmd =0x44504543, len=96
7,893,546 >>> mbox cmd response data (56 bytes)
7,893,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,923,276 UART: [rt]cmd =0x44504543, len=96
7,955,721 >>> mbox cmd response data (56 bytes)
7,955,722 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,985,593 UART: [rt]cmd =0x44504543, len=96
8,018,929 >>> mbox cmd response data (56 bytes)
8,018,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,048,699 UART: [rt]cmd =0x44504543, len=96
8,056,160 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,813 ready_for_fw is high
1,060,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,250 >>> mbox cmd response: success
2,680,250 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,339 UART:
2,742,355 UART: Running Caliptra FMC ...
2,742,763 UART:
2,742,817 UART: [state] CFI Enabled
2,753,277 UART: [fht] FMC Alias Private Key: 7
2,872,017 UART: [art] Extend RT PCRs Done
2,872,445 UART: [art] Lock RT PCRs Done
2,873,871 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,132 UART: [art] Derive CDI
2,883,412 UART: [art] Store in slot 0x4
2,969,551 UART: [art] Derive Key Pair
2,969,911 UART: [art] Store priv key in slot 0x5
2,982,941 UART: [art] Derive Key Pair - Done
2,997,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,131 UART: [art] PUB.X = 84C78C30ABA898C605C0EE0EF233B270E205AD14BEAB962CCBD1DC90A32D6003385C55389363207147BC80E5B49BEF57
3,020,897 UART: [art] PUB.Y = 1A8520CB0B59E37A846B89D7782E279ABD0E95FF4A3DD6C96A772A34C1967D5D5A9816F75AABE152661EE54B3A663497
3,027,847 UART: [art] SIG.R = 6007DE1312C8833C92B864FD3327D161091DB6F6ACFB1B866EA8DB4E9B30FB71AEF51900815073D9F1B16FCCD1EEA1B8
3,034,603 UART: [art] SIG.S = 3848262507D1EBB6862C0AD5522CE9037664F8536992F30953B2435D4F7C6CDF210ECC0FA20AA75F1BBB5AA985C59E52
3,059,014 UART: Caliptra RT
3,059,265 UART: [state] CFI Enabled
3,178,307 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,457 UART: [rt]cmd =0x44504543, len=96
3,241,927 >>> mbox cmd response data (56 bytes)
3,241,928 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,929 UART: [rt]cmd =0x44504543, len=96
3,304,639 >>> mbox cmd response data (56 bytes)
3,304,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,334,545 UART: [rt]cmd =0x44504543, len=96
3,367,134 >>> mbox cmd response data (56 bytes)
3,367,135 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,208 UART: [rt]cmd =0x44504543, len=96
3,430,122 >>> mbox cmd response data (56 bytes)
3,430,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,459,928 UART: [rt]cmd =0x44504543, len=96
3,493,661 >>> mbox cmd response data (56 bytes)
3,493,662 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,523 UART: [rt]cmd =0x44504543, len=96
3,556,609 >>> mbox cmd response data (56 bytes)
3,556,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,579 UART: [rt]cmd =0x44504543, len=96
3,619,438 >>> mbox cmd response data (56 bytes)
3,619,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,254 UART: [rt]cmd =0x44504543, len=96
3,682,438 >>> mbox cmd response data (56 bytes)
3,682,439 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,422 UART: [rt]cmd =0x44504543, len=96
3,745,369 >>> mbox cmd response data (56 bytes)
3,745,370 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,421 UART: [rt]cmd =0x44504543, len=96
3,808,161 >>> mbox cmd response data (56 bytes)
3,808,162 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,213 UART: [rt]cmd =0x44504543, len=96
3,871,980 >>> mbox cmd response data (56 bytes)
3,871,981 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,732 UART: [rt]cmd =0x44504543, len=96
3,935,382 >>> mbox cmd response data (56 bytes)
3,935,383 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,740 UART: [rt]cmd =0x52435458, len=8
3,966,552 >>> mbox cmd response data (16 bytes)
3,966,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,456,654 >>> mbox cmd response: success
6,456,654 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,470,241 UART:
6,470,257 UART: Running Caliptra FMC ...
6,470,665 UART:
6,470,719 UART: [state] CFI Enabled
6,559,926 UART: [art] Extend RT PCRs Done
6,560,354 UART: [art] Lock RT PCRs Done
6,561,609 UART: [art] Populate DV Done
6,569,838 UART: [fht] FMC Alias Private Key: 7
6,570,776 UART: [art] Derive CDI
6,571,056 UART: [art] Store in slot 0x4
6,656,931 UART: [art] Derive Key Pair
6,657,291 UART: [art] Store priv key in slot 0x5
6,670,767 UART: [art] Derive Key Pair - Done
6,685,531 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,700,744 UART: [art] Erasing AUTHORITY.KEYID = 7
6,701,509 UART: [art] PUB.X = 6DAC9D984481375C477047DF6C4C533DD96D15164E89D47A906D5F03062193ADC94A965DA54B2A006FFF76E3032D8921
6,708,246 UART: [art] PUB.Y = E18C152786F43A1EDDF55CA639221211FE42579A06E42580C277E38D3A52223F6F25F87D260E89BEAE12D013D891531F
6,715,188 UART: [art] SIG.R = 7EDD238AF1DB039C248344E6825F0557676BF2FD698198DF1C478E03713D97F2CD75A02F89445521C195305CB0C6FF70
6,721,947 UART: [art] SIG.S = 5F880F648AEDB2389FA0E96C39ED3332DE482F2360AC03CF31FD238CD4AFEB171965BD0565F9A10A03A1B2D3109FC9D8
6,746,066 UART: Caliptra RT
6,746,317 UART: [state] CFI Enabled
7,092,634 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,123,483 UART: [rt]cmd =0x44504543, len=96
7,157,064 >>> mbox cmd response data (56 bytes)
7,157,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,187,010 UART: [rt]cmd =0x44504543, len=96
7,219,526 >>> mbox cmd response data (56 bytes)
7,219,527 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,249,332 UART: [rt]cmd =0x44504543, len=96
7,282,475 >>> mbox cmd response data (56 bytes)
7,282,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,312,453 UART: [rt]cmd =0x44504543, len=96
7,345,385 >>> mbox cmd response data (56 bytes)
7,345,386 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,375,283 UART: [rt]cmd =0x44504543, len=96
7,408,536 >>> mbox cmd response data (56 bytes)
7,408,537 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,438,428 UART: [rt]cmd =0x44504543, len=96
7,471,498 >>> mbox cmd response data (56 bytes)
7,471,499 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,501,564 UART: [rt]cmd =0x44504543, len=96
7,534,953 >>> mbox cmd response data (56 bytes)
7,534,954 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,565,189 UART: [rt]cmd =0x44504543, len=96
7,598,123 >>> mbox cmd response data (56 bytes)
7,598,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,628,139 UART: [rt]cmd =0x44504543, len=96
7,661,202 >>> mbox cmd response data (56 bytes)
7,661,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,691,258 UART: [rt]cmd =0x44504543, len=96
7,725,704 >>> mbox cmd response data (56 bytes)
7,725,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,755,598 UART: [rt]cmd =0x44504543, len=96
7,762,739 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
Truncated 959 bytes from beginning
] sha1
902,466 UART: [kat] SHA2-256
904,406 UART: [kat] SHA2-384
907,173 UART: [kat] SHA2-512-ACC
909,074 UART: [kat] ECC-384
918,611 UART: [kat] HMAC-384Kdf
923,217 UART: [kat] LMS
1,171,545 UART: [kat] --
1,172,466 UART: [cold-reset] ++
1,172,876 UART: [fht] FHT @ 0x50003400
1,175,453 UART: [idev] ++
1,175,621 UART: [idev] CDI.KEYID = 6
1,175,981 UART: [idev] SUBJECT.KEYID = 7
1,176,405 UART: [idev] UDS.KEYID = 0
1,176,750 ready_for_fw is high
1,176,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,425 UART: [idev] Erasing UDS.KEYID = 0
1,200,990 UART: [idev] Sha1 KeyId Algorithm
1,209,530 UART: [idev] --
1,210,658 UART: [ldev] ++
1,210,826 UART: [ldev] CDI.KEYID = 6
1,211,189 UART: [ldev] SUBJECT.KEYID = 5
1,211,615 UART: [ldev] AUTHORITY.KEYID = 7
1,212,078 UART: [ldev] FE.KEYID = 1
1,217,372 UART: [ldev] Erasing FE.KEYID = 1
1,244,089 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,765 UART: [fwproc] Wait for Commands...
1,284,389 UART: [fwproc] Recv command 0x46574c44
1,285,117 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,466 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,483 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,716 >>> mbox cmd response: success
2,828,716 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,829,950 UART: [afmc] ++
2,830,118 UART: [afmc] CDI.KEYID = 6
2,830,480 UART: [afmc] SUBJECT.KEYID = 7
2,830,905 UART: [afmc] AUTHORITY.KEYID = 5
2,866,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,875 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,168 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,872 UART: [afmc] --
2,909,948 UART: [cold-reset] --
2,910,588 UART: [state] Locking Datavault
2,911,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,299 UART: [state] Locking ICCM
2,912,749 UART: [exit] Launching FMC @ 0x40000130
2,918,079 UART:
2,918,095 UART: Running Caliptra FMC ...
2,918,503 UART:
2,918,646 UART: [state] CFI Enabled
2,929,180 UART: [fht] FMC Alias Private Key: 7
3,048,166 UART: [art] Extend RT PCRs Done
3,048,594 UART: [art] Lock RT PCRs Done
3,050,370 UART: [art] Populate DV Done
3,058,679 UART: [fht] FMC Alias Private Key: 7
3,059,713 UART: [art] Derive CDI
3,059,993 UART: [art] Store in slot 0x4
3,145,786 UART: [art] Derive Key Pair
3,146,146 UART: [art] Store priv key in slot 0x5
3,159,718 UART: [art] Derive Key Pair - Done
3,174,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,597 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,362 UART: [art] PUB.X = 62FDAA9E3CD15511CEE77447E51C57FD8D17052A7CB047948F627E34A9A6DD6B8F8EDED752BB1420B9B00BE38CBA54EA
3,197,146 UART: [art] PUB.Y = E1245F117E7CA978A61AC6231BD791FC0250E7C5AFB8A6CCAAB403830884BB724E681F62F4BC9F4B485123E1CE5B45D3
3,204,099 UART: [art] SIG.R = A2FF0919F3AACC4EB223B063D0EDB2C3AC482238E1BBAD0D43FE02C2F3341FF081BFA22E720091D25D3FA417D1B01461
3,210,856 UART: [art] SIG.S = 0A3C3771003FD7D3666E5963D74A7D08ABB9181143DF10FE4D848664A13071113F044AAD0121922F304F7CC1938A5E23
3,235,118 UART: Caliptra RT
3,235,461 UART: [state] CFI Enabled
3,355,344 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,408 UART: [rt]cmd =0x44504543, len=96
3,419,360 >>> mbox cmd response data (56 bytes)
3,419,361 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,336 UART: [rt]cmd =0x44504543, len=96
3,481,888 >>> mbox cmd response data (56 bytes)
3,481,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,788 UART: [rt]cmd =0x44504543, len=96
3,544,921 >>> mbox cmd response data (56 bytes)
3,544,922 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,574,943 UART: [rt]cmd =0x44504543, len=96
3,607,331 >>> mbox cmd response data (56 bytes)
3,607,332 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,421 UART: [rt]cmd =0x44504543, len=96
3,669,734 >>> mbox cmd response data (56 bytes)
3,669,735 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,790 UART: [rt]cmd =0x44504543, len=96
3,732,368 >>> mbox cmd response data (56 bytes)
3,732,369 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,762,304 UART: [rt]cmd =0x44504543, len=96
3,795,567 >>> mbox cmd response data (56 bytes)
3,795,568 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,825,423 UART: [rt]cmd =0x44504543, len=96
3,858,169 >>> mbox cmd response data (56 bytes)
3,858,170 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,889 UART: [rt]cmd =0x44504543, len=96
3,920,920 >>> mbox cmd response data (56 bytes)
3,920,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,042 UART: [rt]cmd =0x44504543, len=96
3,984,062 >>> mbox cmd response data (56 bytes)
3,984,063 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,912 UART: [rt]cmd =0x44504543, len=96
4,046,633 >>> mbox cmd response data (56 bytes)
4,046,634 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,076,587 UART: [rt]cmd =0x44504543, len=96
4,110,373 >>> mbox cmd response data (56 bytes)
4,110,374 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,139,795 UART: [rt]cmd =0x52435458, len=8
4,141,367 >>> mbox cmd response data (16 bytes)
4,141,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,142,191 UART:
4,142,207 UART: Running Caliptra ROM ...
4,142,615 UART:
4,142,757 UART: [state] CFI Enabled
4,145,063 UART: [state] LifecycleState = Unprovisioned
4,145,718 UART: [state] DebugLocked = No
4,146,310 UART: [state] WD Timer not started. Device not locked for debugging
4,147,644 UART: [kat] SHA2-256
4,953,294 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,957,419 UART: [kat] ++
4,957,571 UART: [kat] sha1
4,961,629 UART: [kat] SHA2-256
4,963,569 UART: [kat] SHA2-384
4,966,496 UART: [kat] SHA2-512-ACC
4,968,396 UART: [kat] ECC-384
4,977,639 UART: [kat] HMAC-384Kdf
4,982,219 UART: [kat] LMS
5,230,547 UART: [kat] --
5,231,347 UART: [update-reset] ++
6,591,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,592,822 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,748,037 >>> mbox cmd response: success
6,748,037 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,748,274 UART: [update-reset] Copying MAN_2 To MAN_1
6,756,288 UART: [update-reset Success] --
6,757,467 UART: [state] Locking Datavault
6,758,101 UART: [state] Locking PCR0, PCR1 and PCR31
6,758,705 UART: [state] Locking ICCM
6,759,347 UART: [exit] Launching FMC @ 0x40000130
6,764,677 UART:
6,764,693 UART: Running Caliptra FMC ...
6,765,101 UART:
6,765,244 UART: [state] CFI Enabled
6,854,477 UART: [art] Extend RT PCRs Done
6,854,905 UART: [art] Lock RT PCRs Done
6,856,378 UART: [art] Populate DV Done
6,864,703 UART: [fht] FMC Alias Private Key: 7
6,865,827 UART: [art] Derive CDI
6,866,107 UART: [art] Store in slot 0x4
6,952,178 UART: [art] Derive Key Pair
6,952,538 UART: [art] Store priv key in slot 0x5
6,966,332 UART: [art] Derive Key Pair - Done
6,981,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,996,972 UART: [art] Erasing AUTHORITY.KEYID = 7
6,997,737 UART: [art] PUB.X = DB340934AC5259C3D2B18BB60BE59FC983C48ABA0354502B9BB62FEB84F4FF14DA2878862C02AC100C1477707945383D
7,004,496 UART: [art] PUB.Y = 8A3A26DC685E6628EEB14729DD6721821734EC73FF26B2EBB090970667BF71B38FBFB27653FE46F4D801A9D6B8EBB450
7,011,448 UART: [art] SIG.R = 1F07AC2D76A3BE66BEE3F3FC3DD33210AA92092CAF33D58C7C2ABCEC672A18572CCF90177C6F2B7659A82AF11FAB9F4F
7,018,236 UART: [art] SIG.S = 64843B4BFD2208C0A394C75AD233C8D8E36211BCE872D52CF7898F8803B8DB45D97405E72F167F52E6CB93ADFB4C9CFC
7,042,653 UART: Caliptra RT
7,042,996 UART: [state] CFI Enabled
7,390,541 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,421,442 UART: [rt]cmd =0x44504543, len=96
7,454,179 >>> mbox cmd response data (56 bytes)
7,454,180 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,484,047 UART: [rt]cmd =0x44504543, len=96
7,516,763 >>> mbox cmd response data (56 bytes)
7,516,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,546,723 UART: [rt]cmd =0x44504543, len=96
7,579,242 >>> mbox cmd response data (56 bytes)
7,579,243 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,609,398 UART: [rt]cmd =0x44504543, len=96
7,643,504 >>> mbox cmd response data (56 bytes)
7,643,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,673,366 UART: [rt]cmd =0x44504543, len=96
7,705,211 >>> mbox cmd response data (56 bytes)
7,705,212 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,735,073 UART: [rt]cmd =0x44504543, len=96
7,767,749 >>> mbox cmd response data (56 bytes)
7,767,750 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,797,423 UART: [rt]cmd =0x44504543, len=96
7,830,556 >>> mbox cmd response data (56 bytes)
7,830,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,860,668 UART: [rt]cmd =0x44504543, len=96
7,893,668 >>> mbox cmd response data (56 bytes)
7,893,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,923,642 UART: [rt]cmd =0x44504543, len=96
7,957,261 >>> mbox cmd response data (56 bytes)
7,957,262 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,987,307 UART: [rt]cmd =0x44504543, len=96
8,020,705 >>> mbox cmd response data (56 bytes)
8,020,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,050,727 UART: [rt]cmd =0x44504543, len=96
8,057,922 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,252 ready_for_fw is high
1,061,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,659 >>> mbox cmd response: success
2,679,659 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,742,414 UART:
2,742,430 UART: Running Caliptra FMC ...
2,742,838 UART:
2,742,981 UART: [state] CFI Enabled
2,753,523 UART: [fht] FMC Alias Private Key: 7
2,872,675 UART: [art] Extend RT PCRs Done
2,873,103 UART: [art] Lock RT PCRs Done
2,874,619 UART: [art] Populate DV Done
2,882,766 UART: [fht] FMC Alias Private Key: 7
2,883,736 UART: [art] Derive CDI
2,884,016 UART: [art] Store in slot 0x4
2,969,969 UART: [art] Derive Key Pair
2,970,329 UART: [art] Store priv key in slot 0x5
2,983,647 UART: [art] Derive Key Pair - Done
2,998,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,563 UART: [art] PUB.X = 129B83A41C1C61332671CC260DC1802A723F6209B450B75CFBE085E0EA3A3C7E8A7BCB509ECEF6A9762BDE758FC88FE8
3,021,341 UART: [art] PUB.Y = 8E4B6B797105C6D1F813623FAD49C83BCADD8DFF9FD284E6FE51A656C67460E3F60932548A16627FB19275AD9A8D441D
3,028,293 UART: [art] SIG.R = 08F5F4CD0AC894B475470DE88CDD9A28930F381F7332D5AF28160AC349DFF92173BD970AACCEA9999B18932348F773FE
3,035,053 UART: [art] SIG.S = F6F8898C86447B75DDA73F98404B7188527B86A37E834DC354F46A68E1CA6598AFA39487184B8580177B95174E0E8AD1
3,059,142 UART: Caliptra RT
3,059,485 UART: [state] CFI Enabled
3,179,500 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,668 UART: [rt]cmd =0x44504543, len=96
3,243,258 >>> mbox cmd response data (56 bytes)
3,243,259 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,426 UART: [rt]cmd =0x44504543, len=96
3,306,460 >>> mbox cmd response data (56 bytes)
3,306,461 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,328 UART: [rt]cmd =0x44504543, len=96
3,369,089 >>> mbox cmd response data (56 bytes)
3,369,090 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,951 UART: [rt]cmd =0x44504543, len=96
3,431,969 >>> mbox cmd response data (56 bytes)
3,431,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,995 UART: [rt]cmd =0x44504543, len=96
3,494,366 >>> mbox cmd response data (56 bytes)
3,494,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,284 UART: [rt]cmd =0x44504543, len=96
3,556,834 >>> mbox cmd response data (56 bytes)
3,556,835 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,586,802 UART: [rt]cmd =0x44504543, len=96
3,620,055 >>> mbox cmd response data (56 bytes)
3,620,056 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,650,023 UART: [rt]cmd =0x44504543, len=96
3,683,103 >>> mbox cmd response data (56 bytes)
3,683,104 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,712,803 UART: [rt]cmd =0x44504543, len=96
3,745,704 >>> mbox cmd response data (56 bytes)
3,745,705 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,775,710 UART: [rt]cmd =0x44504543, len=96
3,808,122 >>> mbox cmd response data (56 bytes)
3,808,123 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,080 UART: [rt]cmd =0x44504543, len=96
3,872,203 >>> mbox cmd response data (56 bytes)
3,872,204 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,977 UART: [rt]cmd =0x44504543, len=96
3,935,061 >>> mbox cmd response data (56 bytes)
3,935,062 <<< Executing mbox cmd 0x52435458 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,964,395 UART: [rt]cmd =0x52435458, len=8
3,966,099 >>> mbox cmd response data (16 bytes)
3,966,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,456,404 >>> mbox cmd response: success
6,456,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
6,469,537 UART:
6,469,553 UART: Running Caliptra FMC ...
6,469,961 UART:
6,470,104 UART: [state] CFI Enabled
6,559,239 UART: [art] Extend RT PCRs Done
6,559,667 UART: [art] Lock RT PCRs Done
6,561,132 UART: [art] Populate DV Done
6,569,413 UART: [fht] FMC Alias Private Key: 7
6,570,483 UART: [art] Derive CDI
6,570,763 UART: [art] Store in slot 0x4
6,656,196 UART: [art] Derive Key Pair
6,656,556 UART: [art] Store priv key in slot 0x5
6,670,004 UART: [art] Derive Key Pair - Done
6,684,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,699,996 UART: [art] Erasing AUTHORITY.KEYID = 7
6,700,761 UART: [art] PUB.X = 53386CC605A56937316D60687C1ADB8FB9CF216F37C1F34A7C317157451FCB9965854DD24A969C83ABCC7E63E9920379
6,707,523 UART: [art] PUB.Y = 5D695DDF30B0E2E576ED593C2D374B05D1D196165C0B6A218E493C1D523845BE551E1302D41759AEE9E35BBF6C340BD0
6,714,467 UART: [art] SIG.R = F8149E336BD838D3E08DA35D0980E1408B0EFE23DD835DB6B63BD4282A5D97CEF481B64E27F5558B40B1EAD674347E5B
6,721,241 UART: [art] SIG.S = 3A9FC20882B179696850F4E5266809AB99FBA4D20274817118896693E07B412969BB801FC69B96CD3D178C6554A6C76F
6,745,994 UART: Caliptra RT
6,746,337 UART: [state] CFI Enabled
7,096,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,126,712 UART: [rt]cmd =0x44504543, len=96
7,159,681 >>> mbox cmd response data (56 bytes)
7,159,682 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,189,477 UART: [rt]cmd =0x44504543, len=96
7,222,451 >>> mbox cmd response data (56 bytes)
7,222,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,252,285 UART: [rt]cmd =0x44504543, len=96
7,285,098 >>> mbox cmd response data (56 bytes)
7,285,099 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,315,148 UART: [rt]cmd =0x44504543, len=96
7,347,970 >>> mbox cmd response data (56 bytes)
7,347,971 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,378,018 UART: [rt]cmd =0x44504543, len=96
7,410,639 >>> mbox cmd response data (56 bytes)
7,410,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,440,455 UART: [rt]cmd =0x44504543, len=96
7,473,495 >>> mbox cmd response data (56 bytes)
7,473,496 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,503,261 UART: [rt]cmd =0x44504543, len=96
7,536,384 >>> mbox cmd response data (56 bytes)
7,536,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,566,262 UART: [rt]cmd =0x44504543, len=96
7,599,750 >>> mbox cmd response data (56 bytes)
7,599,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,629,748 UART: [rt]cmd =0x44504543, len=96
7,662,731 >>> mbox cmd response data (56 bytes)
7,662,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,692,495 UART: [rt]cmd =0x44504543, len=96
7,725,713 >>> mbox cmd response data (56 bytes)
7,725,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,755,805 UART: [rt]cmd =0x44504543, len=96
7,763,568 >>> mbox cmd response: failed
test test_reallocate_dpe_context_limits::test_pl0_pl1_reallocation_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
192,188 UART:
192,543 UART: Running Caliptra ROM ...
193,716 UART:
193,868 UART: [state] CFI Enabled
260,555 UART: [state] LifecycleState = Unprovisioned
262,520 UART: [state] DebugLocked = No
263,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,120 UART: [kat] SHA2-256
437,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,346 UART: [kat] ++
448,839 UART: [kat] sha1
459,912 UART: [kat] SHA2-256
462,613 UART: [kat] SHA2-384
467,706 UART: [kat] SHA2-512-ACC
470,076 UART: [kat] ECC-384
2,767,049 UART: [kat] HMAC-384Kdf
2,798,767 UART: [kat] LMS
3,989,070 UART: [kat] --
3,993,168 UART: [cold-reset] ++
3,995,036 UART: [fht] Storing FHT @ 0x50003400
4,005,096 UART: [idev] ++
4,005,744 UART: [idev] CDI.KEYID = 6
4,006,635 UART: [idev] SUBJECT.KEYID = 7
4,007,883 UART: [idev] UDS.KEYID = 0
4,008,844 ready_for_fw is high
4,009,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,114 UART: [idev] Erasing UDS.KEYID = 0
7,341,189 UART: [idev] Using Sha1 for KeyId Algorithm
7,363,535 UART: [idev] --
7,367,545 UART: [ldev] ++
7,368,118 UART: [ldev] CDI.KEYID = 6
7,369,056 UART: [ldev] SUBJECT.KEYID = 5
7,370,324 UART: [ldev] AUTHORITY.KEYID = 7
7,371,477 UART: [ldev] FE.KEYID = 1
7,400,833 UART: [ldev] Erasing FE.KEYID = 1
10,728,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,023,490 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,894 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,086,152 UART: [ldev] --
13,090,878 UART: [fwproc] Waiting for Commands...
13,093,295 UART: [fwproc] Received command 0x46574c44
13,095,623 UART: [fwproc] Received Image of size 118548 bytes
17,202,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,124 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,246 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,687,364 >>> mbox cmd response: success
17,692,214 UART: [afmc] ++
17,692,811 UART: [afmc] CDI.KEYID = 6
17,693,775 UART: [afmc] SUBJECT.KEYID = 7
17,694,989 UART: [afmc] AUTHORITY.KEYID = 5
21,071,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,457 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,596 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,195 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,178 UART: [afmc] --
23,440,042 UART: [cold-reset] --
23,445,037 UART: [state] Locking Datavault
23,450,156 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,912 UART: [state] Locking ICCM
23,453,681 UART: [exit] Launching FMC @ 0x40000130
23,462,076 UART:
23,462,314 UART: Running Caliptra FMC ...
23,463,414 UART:
23,463,570 UART: [state] CFI Enabled
23,529,017 UART: [fht] FMC Alias Private Key: 7
25,869,539 UART: [art] Extend RT PCRs Done
25,870,757 UART: [art] Lock RT PCRs Done
25,872,031 UART: [art] Populate DV Done
25,877,289 UART: [fht] FMC Alias Private Key: 7
25,878,885 UART: [art] Derive CDI
25,879,623 UART: [art] Store in slot 0x4
25,938,062 UART: [art] Derive Key Pair
25,939,104 UART: [art] Store priv key in slot 0x5
29,231,941 UART: [art] Derive Key Pair - Done
29,244,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,535,606 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,112 UART: [art] PUB.X = 0376191F5397FBA79EA440382E5C0F04EFD0EDC82DFA12BC3A0EC1EC02C48E12FE9D46F0F264199CFBBCE43934DFE3D2
31,544,411 UART: [art] PUB.Y = 3BB77F23D84446DEEB38FE2E50EFD7D01C5786F7BB275FA6D981394663D7AD6B0FA98E701BF12F6AC2740288A35C572F
31,551,689 UART: [art] SIG.R = F9917B9D86ED41C17B072DADFEFCD09273A534DF2C90CE9C04A2821DBABB26F013462DFC15D49D50A47BA2858663B65F
31,559,073 UART: [art] SIG.S = 3A55A79ABCD59FB8FA802A6EEE28F34D535790D7826603963D0DAF22E9358C195EF6AC92EB0AC05479CEEECACC79C11D
32,864,286 UART: Caliptra RT
32,865,001 UART: [state] CFI Enabled
33,040,635 UART: [rt] RT listening for mailbox commands...
33,042,774 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,073,591 UART: [rt]cmd =0x44504543, len=96
38,842,619 >>> mbox cmd response data (6236 bytes)
38,871,908 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,902,136 UART: [rt]cmd =0x52564348, len=36
38,905,327 >>> mbox cmd response data (8 bytes)
38,905,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,936,136 UART: [rt]cmd =0x44504543, len=96
44,705,952 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,808,292 ready_for_fw is high
3,808,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,982,981 >>> mbox cmd response: success
23,670,913 UART:
23,671,307 UART: Running Caliptra FMC ...
23,672,451 UART:
23,672,610 UART: [state] CFI Enabled
23,742,205 UART: [fht] FMC Alias Private Key: 7
26,082,152 UART: [art] Extend RT PCRs Done
26,083,379 UART: [art] Lock RT PCRs Done
26,084,818 UART: [art] Populate DV Done
26,089,971 UART: [fht] FMC Alias Private Key: 7
26,091,621 UART: [art] Derive CDI
26,092,441 UART: [art] Store in slot 0x4
26,150,369 UART: [art] Derive Key Pair
26,151,410 UART: [art] Store priv key in slot 0x5
29,443,751 UART: [art] Derive Key Pair - Done
29,456,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,310 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,823 UART: [art] PUB.X = 2F6F1A23E44EA93B4FEEDBF12E754D8034527E4419A169B418FBE2129FEECE9AF0B1D29A5CF9826901DE58E4681D2E06
31,754,115 UART: [art] PUB.Y = 16F5D16E9B1D5F21EF96B6F3C65F333865EC6FBD9A15CB24B642F55AE1CEC3FC221A165A09F3A3A333B81E0E7A11D8CB
31,761,354 UART: [art] SIG.R = 324856FE2723B5839B59B5F5C5F5447B50F95F1BBDC8ED447E7AE6A54D87D6950E1ABA0A2915A32328DD6951AFCF7198
31,768,808 UART: [art] SIG.S = AAF247CA0E6DFF08BD41B7C552A83AD4773EAF6E01C76B17EFDFFEE751509D2B62F0C0CEAE8A373615450E78FCAB3532
33,074,074 UART: Caliptra RT
33,074,777 UART: [state] CFI Enabled
33,251,998 UART: [rt] RT listening for mailbox commands...
33,254,337 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,284,721 UART: [rt]cmd =0x44504543, len=96
39,054,709 >>> mbox cmd response data (6236 bytes)
39,083,933 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,114,107 UART: [rt]cmd =0x52564348, len=36
39,117,029 >>> mbox cmd response data (8 bytes)
39,117,383 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,147,875 UART: [rt]cmd =0x44504543, len=96
44,920,844 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,436 UART:
192,801 UART: Running Caliptra ROM ...
193,978 UART:
603,773 UART: [state] CFI Enabled
619,798 UART: [state] LifecycleState = Unprovisioned
621,782 UART: [state] DebugLocked = No
624,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,015 UART: [kat] SHA2-256
798,747 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,265 UART: [kat] ++
809,813 UART: [kat] sha1
820,469 UART: [kat] SHA2-256
823,193 UART: [kat] SHA2-384
829,104 UART: [kat] SHA2-512-ACC
831,466 UART: [kat] ECC-384
3,116,538 UART: [kat] HMAC-384Kdf
3,127,351 UART: [kat] LMS
4,317,487 UART: [kat] --
4,322,069 UART: [cold-reset] ++
4,323,507 UART: [fht] Storing FHT @ 0x50003400
4,335,054 UART: [idev] ++
4,335,641 UART: [idev] CDI.KEYID = 6
4,336,522 UART: [idev] SUBJECT.KEYID = 7
4,337,831 UART: [idev] UDS.KEYID = 0
4,338,796 ready_for_fw is high
4,338,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,041 UART: [idev] Erasing UDS.KEYID = 0
7,625,854 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,889 UART: [idev] --
7,651,088 UART: [ldev] ++
7,651,650 UART: [ldev] CDI.KEYID = 6
7,652,585 UART: [ldev] SUBJECT.KEYID = 5
7,653,787 UART: [ldev] AUTHORITY.KEYID = 7
7,655,062 UART: [ldev] FE.KEYID = 1
7,665,563 UART: [ldev] Erasing FE.KEYID = 1
10,954,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,480 UART: [ldev] --
13,314,086 UART: [fwproc] Waiting for Commands...
13,316,333 UART: [fwproc] Received command 0x46574c44
13,318,507 UART: [fwproc] Received Image of size 118548 bytes
17,416,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,402 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,895,326 >>> mbox cmd response: success
17,899,811 UART: [afmc] ++
17,900,432 UART: [afmc] CDI.KEYID = 6
17,901,501 UART: [afmc] SUBJECT.KEYID = 7
17,902,600 UART: [afmc] AUTHORITY.KEYID = 5
21,215,906 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,067 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,763 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,481 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,928 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,706 UART: [afmc] --
23,582,138 UART: [cold-reset] --
23,585,277 UART: [state] Locking Datavault
23,591,774 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,524 UART: [state] Locking ICCM
23,595,888 UART: [exit] Launching FMC @ 0x40000130
23,604,281 UART:
23,604,513 UART: Running Caliptra FMC ...
23,605,608 UART:
23,605,764 UART: [state] CFI Enabled
23,613,806 UART: [fht] FMC Alias Private Key: 7
25,953,415 UART: [art] Extend RT PCRs Done
25,954,636 UART: [art] Lock RT PCRs Done
25,956,097 UART: [art] Populate DV Done
25,961,614 UART: [fht] FMC Alias Private Key: 7
25,963,202 UART: [art] Derive CDI
25,964,012 UART: [art] Store in slot 0x4
26,006,390 UART: [art] Derive Key Pair
26,007,434 UART: [art] Store priv key in slot 0x5
29,249,784 UART: [art] Derive Key Pair - Done
29,262,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,835 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,341 UART: [art] PUB.X = 8875284C69CFC09BCF316570B1113CD2DD05373BEC183BCF3AC3295DBA5DA90DEBB89E0CAE33075222E89680D45E4A02
31,551,576 UART: [art] PUB.Y = E61EB864EC1EB5469A6D8D1CEB1AB3E43F2FA4F6BC58C1686FB0E3A1F752B7AAF8DF330A73A7C9183DAFBF8D3AB17BF9
31,558,916 UART: [art] SIG.R = 7BF2598E7CF39D6DA0227C1639ABE819BCA2B3267E1745C62C0B37D5A42222B48321F5EABCD5EDB0579F6375956915C2
31,566,297 UART: [art] SIG.S = 95AE4DC8AE75C2A9772573560B04A2D83354FBA221F07DD8CC394382FFC3E881891CBFEFB1CC89BC8E6171FA0076DF73
32,871,273 UART: Caliptra RT
32,872,007 UART: [state] CFI Enabled
33,004,982 UART: [rt] RT listening for mailbox commands...
33,007,423 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,038,297 UART: [rt]cmd =0x44504543, len=96
38,713,246 >>> mbox cmd response data (6236 bytes)
38,742,374 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,772,703 UART: [rt]cmd =0x52564348, len=36
38,775,949 >>> mbox cmd response data (8 bytes)
38,776,410 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,807,109 UART: [rt]cmd =0x44504543, len=96
44,481,321 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,127,795 ready_for_fw is high
4,128,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,153,118 >>> mbox cmd response: success
23,794,864 UART:
23,795,263 UART: Running Caliptra FMC ...
23,796,412 UART:
23,796,571 UART: [state] CFI Enabled
23,804,284 UART: [fht] FMC Alias Private Key: 7
26,143,986 UART: [art] Extend RT PCRs Done
26,145,203 UART: [art] Lock RT PCRs Done
26,147,016 UART: [art] Populate DV Done
26,152,324 UART: [fht] FMC Alias Private Key: 7
26,154,021 UART: [art] Derive CDI
26,154,836 UART: [art] Store in slot 0x4
26,197,433 UART: [art] Derive Key Pair
26,198,436 UART: [art] Store priv key in slot 0x5
29,440,532 UART: [art] Derive Key Pair - Done
29,453,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,659 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,174 UART: [art] PUB.X = C085E1463E9D5EEDFB4B42041566545FB6D0F1C539A63007CBB851F19D3D3DEFB5E80C052699877A4D9C6C97B1DC7334
31,743,463 UART: [art] PUB.Y = 573653341B935640F065F8767D34EFD033FB21F4C89A388C3755F15833F3F1C4BE830019B91A8E4C66ACD9422AA05B2A
31,750,677 UART: [art] SIG.R = 96515FF51159B4FA99EDA463119AE3B161FD21ADF8D4466ABAA91142FBC2252D74774CB974B8EF507D8979B91B6795C0
31,758,072 UART: [art] SIG.S = DF7E198E188C74C5CA68AE73D516CFFB7002400245F5A20B292F370E72617021A315DEE5A46C9A75FF8C4F4ED3C41839
33,063,012 UART: Caliptra RT
33,063,724 UART: [state] CFI Enabled
33,196,998 UART: [rt] RT listening for mailbox commands...
33,199,279 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,230,098 UART: [rt]cmd =0x44504543, len=96
38,904,534 >>> mbox cmd response data (6236 bytes)
38,933,553 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,963,850 UART: [rt]cmd =0x52564348, len=36
38,967,074 >>> mbox cmd response data (8 bytes)
38,967,514 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,998,253 UART: [rt]cmd =0x44504543, len=96
44,673,112 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,090 UART:
192,454 UART: Running Caliptra ROM ...
193,572 UART:
193,713 UART: [state] CFI Enabled
267,167 UART: [state] LifecycleState = Unprovisioned
269,220 UART: [state] DebugLocked = No
270,604 UART: [state] WD Timer not started. Device not locked for debugging
274,221 UART: [kat] SHA2-256
453,923 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,691 UART: [kat] ++
465,167 UART: [kat] sha1
476,185 UART: [kat] SHA2-256
478,838 UART: [kat] SHA2-384
484,610 UART: [kat] SHA2-512-ACC
486,972 UART: [kat] ECC-384
2,952,310 UART: [kat] HMAC-384Kdf
2,973,069 UART: [kat] LMS
3,449,567 UART: [kat] --
3,454,553 UART: [cold-reset] ++
3,456,266 UART: [fht] FHT @ 0x50003400
3,468,656 UART: [idev] ++
3,469,215 UART: [idev] CDI.KEYID = 6
3,470,242 UART: [idev] SUBJECT.KEYID = 7
3,471,410 UART: [idev] UDS.KEYID = 0
3,472,329 ready_for_fw is high
3,472,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,610 UART: [idev] Erasing UDS.KEYID = 0
5,988,563 UART: [idev] Sha1 KeyId Algorithm
6,010,990 UART: [idev] --
6,016,230 UART: [ldev] ++
6,016,800 UART: [ldev] CDI.KEYID = 6
6,017,763 UART: [ldev] SUBJECT.KEYID = 5
6,018,920 UART: [ldev] AUTHORITY.KEYID = 7
6,020,203 UART: [ldev] FE.KEYID = 1
6,060,551 UART: [ldev] Erasing FE.KEYID = 1
8,564,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,193 UART: [ldev] --
10,375,639 UART: [fwproc] Wait for Commands...
10,378,108 UART: [fwproc] Recv command 0x46574c44
10,380,098 UART: [fwproc] Recv'd Img size: 118548 bytes
13,873,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,948,921 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,021,942 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,806 >>> mbox cmd response: success
14,354,734 UART: [afmc] ++
14,355,320 UART: [afmc] CDI.KEYID = 6
14,356,259 UART: [afmc] SUBJECT.KEYID = 7
14,357,469 UART: [afmc] AUTHORITY.KEYID = 5
16,902,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,622,174 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,624,345 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,640,186 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,656,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,671,781 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,698 UART: [afmc] --
18,699,109 UART: [cold-reset] --
18,703,839 UART: [state] Locking Datavault
18,709,457 UART: [state] Locking PCR0, PCR1 and PCR31
18,711,202 UART: [state] Locking ICCM
18,713,320 UART: [exit] Launching FMC @ 0x40000130
18,721,705 UART:
18,721,942 UART: Running Caliptra FMC ...
18,723,040 UART:
18,723,199 UART: [state] CFI Enabled
18,780,851 UART: [fht] FMC Alias Private Key: 7
20,568,251 UART: [art] Extend RT PCRs Done
20,569,467 UART: [art] Lock RT PCRs Done
20,571,386 UART: [art] Populate DV Done
20,577,003 UART: [fht] FMC Alias Private Key: 7
20,578,669 UART: [art] Derive CDI
20,579,480 UART: [art] Store in slot 0x4
20,633,658 UART: [art] Derive Key Pair
20,634,698 UART: [art] Store priv key in slot 0x5
23,097,975 UART: [art] Derive Key Pair - Done
23,111,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,823,609 UART: [art] Erasing AUTHORITY.KEYID = 7
24,825,112 UART: [art] PUB.X = 211C908DC7C0EF23222FE5D7221F778FD34A7295719AF9BBD1A6154BAC4183A518388157F7DEC288BC31AF733A2AFCBC
24,832,354 UART: [art] PUB.Y = 4D6092F6015FD5E6119E3DFD97B9BB7EF58DCA2B684FE129A19E24D248A88C356186C8B4693E578B99B662F26506ACAF
24,839,638 UART: [art] SIG.R = 9709892CC7106D970F6C29F4249F697AC4E469FB10AD8F17CCC53E9E8AAEC04C1B0D162BA328D481937BF36D21F944E0
24,847,037 UART: [art] SIG.S = 5DC78DAFB99BF1BE42B82B040509E6F9C196D55F1CBA78AFCD987ABB94F5D3C043D6996A3D3E82711C52BEF28C6D09B1
25,826,464 UART: Caliptra RT
25,827,170 UART: [state] CFI Enabled
26,006,810 UART: [rt] RT listening for mailbox commands...
26,008,978 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,039,819 UART: [rt]cmd =0x44504543, len=96
30,404,766 >>> mbox cmd response data (6236 bytes)
30,433,944 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,464,295 UART: [rt]cmd =0x52564348, len=36
30,467,308 >>> mbox cmd response data (8 bytes)
30,467,694 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,498,109 UART: [rt]cmd =0x44504543, len=96
34,864,187 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
3,457,233 ready_for_fw is high
3,457,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,128 >>> mbox cmd response: success
18,531,636 UART:
18,532,050 UART: Running Caliptra FMC ...
18,533,175 UART:
18,533,330 UART: [state] CFI Enabled
18,602,572 UART: [fht] FMC Alias Private Key: 7
20,369,568 UART: [art] Extend RT PCRs Done
20,370,796 UART: [art] Lock RT PCRs Done
20,372,560 UART: [art] Populate DV Done
20,378,141 UART: [fht] FMC Alias Private Key: 7
20,379,727 UART: [art] Derive CDI
20,380,471 UART: [art] Store in slot 0x4
20,435,889 UART: [art] Derive Key Pair
20,436,927 UART: [art] Store priv key in slot 0x5
22,899,563 UART: [art] Derive Key Pair - Done
22,912,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,625,527 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,030 UART: [art] PUB.X = 88387F52F2BFD4FDBF260809779E22705F2B34187C42D426FCE08E881DE6DDCBDF0902821B419BEF3D919CEA1A8DEC4C
24,634,289 UART: [art] PUB.Y = 8B942A96C0911457625BAD4DCBC96D91A21CFCEE0716E9952B13B1E4008922D5C8F4F0CFACC8C8410F05A9DD90E82E1D
24,641,542 UART: [art] SIG.R = 4E3EEC2EDA93E7C903AA6BF6DDA7AD09CB44D95A503349A27DA43E9867D762603BCA7336B7EA6547CD73B51619EA4EB6
24,648,991 UART: [art] SIG.S = 5D263D6ED8F39D8254F5CB312642AF00A7B81BEE3DABF1D6D1FC273134E4BF99AA291C941107C91D3A509484FE1A03F1
25,627,801 UART: Caliptra RT
25,628,514 UART: [state] CFI Enabled
25,810,540 UART: [rt] RT listening for mailbox commands...
25,812,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,491 UART: [rt]cmd =0x44504543, len=96
30,207,358 >>> mbox cmd response data (6236 bytes)
30,236,429 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,266,532 UART: [rt]cmd =0x52564348, len=36
30,269,426 >>> mbox cmd response data (8 bytes)
30,269,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,300,352 UART: [rt]cmd =0x44504543, len=96
34,665,701 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,547 UART:
192,932 UART: Running Caliptra ROM ...
194,126 UART:
603,639 UART: [state] CFI Enabled
619,726 UART: [state] LifecycleState = Unprovisioned
621,597 UART: [state] DebugLocked = No
622,915 UART: [state] WD Timer not started. Device not locked for debugging
626,389 UART: [kat] SHA2-256
806,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,858 UART: [kat] ++
817,306 UART: [kat] sha1
829,458 UART: [kat] SHA2-256
832,111 UART: [kat] SHA2-384
836,903 UART: [kat] SHA2-512-ACC
839,273 UART: [kat] ECC-384
3,282,258 UART: [kat] HMAC-384Kdf
3,295,128 UART: [kat] LMS
3,771,598 UART: [kat] --
3,777,464 UART: [cold-reset] ++
3,778,973 UART: [fht] FHT @ 0x50003400
3,789,665 UART: [idev] ++
3,790,241 UART: [idev] CDI.KEYID = 6
3,791,168 UART: [idev] SUBJECT.KEYID = 7
3,792,422 UART: [idev] UDS.KEYID = 0
3,793,354 ready_for_fw is high
3,793,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,510 UART: [idev] Erasing UDS.KEYID = 0
6,270,587 UART: [idev] Sha1 KeyId Algorithm
6,293,604 UART: [idev] --
6,297,122 UART: [ldev] ++
6,297,692 UART: [ldev] CDI.KEYID = 6
6,298,578 UART: [ldev] SUBJECT.KEYID = 5
6,299,736 UART: [ldev] AUTHORITY.KEYID = 7
6,301,034 UART: [ldev] FE.KEYID = 1
6,311,030 UART: [ldev] Erasing FE.KEYID = 1
8,792,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,931 UART: [ldev] --
10,589,313 UART: [fwproc] Wait for Commands...
10,591,892 UART: [fwproc] Recv command 0x46574c44
10,593,881 UART: [fwproc] Recv'd Img size: 118548 bytes
14,080,224 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,590 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,620 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,864 >>> mbox cmd response: success
14,558,375 UART: [afmc] ++
14,559,006 UART: [afmc] CDI.KEYID = 6
14,559,925 UART: [afmc] SUBJECT.KEYID = 7
14,561,091 UART: [afmc] AUTHORITY.KEYID = 5
17,066,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,545 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,390 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,430 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,838,018 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,872 UART: [afmc] --
18,865,627 UART: [cold-reset] --
18,869,433 UART: [state] Locking Datavault
18,875,662 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,347 UART: [state] Locking ICCM
18,879,860 UART: [exit] Launching FMC @ 0x40000130
18,888,262 UART:
18,888,516 UART: Running Caliptra FMC ...
18,889,571 UART:
18,889,733 UART: [state] CFI Enabled
18,897,837 UART: [fht] FMC Alias Private Key: 7
20,664,645 UART: [art] Extend RT PCRs Done
20,665,863 UART: [art] Lock RT PCRs Done
20,667,569 UART: [art] Populate DV Done
20,673,259 UART: [fht] FMC Alias Private Key: 7
20,674,970 UART: [art] Derive CDI
20,675,787 UART: [art] Store in slot 0x4
20,718,278 UART: [art] Derive Key Pair
20,719,318 UART: [art] Store priv key in slot 0x5
23,146,392 UART: [art] Derive Key Pair - Done
23,159,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,398 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,898 UART: [art] PUB.X = 0181AAFD339C7A363F77E98926F3C92922E48EA8385EF7626A36B9BD9C9E3FBE1DE9672E4598E2DB43EDF8F454A8CD4E
24,874,164 UART: [art] PUB.Y = E4D44D456CB3C7719BCB810F57FE9D7E4297BBA2412971333570743FE9F5ED121F06569104EF0B9FB0E3F83D214EE663
24,881,426 UART: [art] SIG.R = B31CD1A1923C2123D43AA13A4F1941DD892048F1630A4E0D6089A7293F6CB5256055B3EC89BD5E8525C6808137E8C102
24,888,780 UART: [art] SIG.S = AFB7C33033E250C540B80C4FFD04E60F414437E8BC520259A1ED6B47D49A64851BC90F784B107D25483A9DCC4B0F277B
25,868,196 UART: Caliptra RT
25,868,893 UART: [state] CFI Enabled
26,000,939 UART: [rt] RT listening for mailbox commands...
26,003,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,034,153 UART: [rt]cmd =0x44504543, len=96
30,320,502 >>> mbox cmd response data (6236 bytes)
30,349,617 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,379,829 UART: [rt]cmd =0x52564348, len=36
30,382,530 >>> mbox cmd response data (8 bytes)
30,382,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,413,518 UART: [rt]cmd =0x44504543, len=96
34,698,869 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
3,777,507 ready_for_fw is high
3,777,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,884 >>> mbox cmd response: success
18,698,098 UART:
18,698,477 UART: Running Caliptra FMC ...
18,699,672 UART:
18,699,846 UART: [state] CFI Enabled
18,707,577 UART: [fht] FMC Alias Private Key: 7
20,474,214 UART: [art] Extend RT PCRs Done
20,475,437 UART: [art] Lock RT PCRs Done
20,477,226 UART: [art] Populate DV Done
20,482,697 UART: [fht] FMC Alias Private Key: 7
20,484,454 UART: [art] Derive CDI
20,485,277 UART: [art] Store in slot 0x4
20,527,742 UART: [art] Derive Key Pair
20,528,751 UART: [art] Store priv key in slot 0x5
22,955,557 UART: [art] Derive Key Pair - Done
22,968,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,833 UART: [art] Erasing AUTHORITY.KEYID = 7
24,676,337 UART: [art] PUB.X = 51EDC3769ECFF9286CE4291D818E915B13BD19E9D9C0A565464FC3E0B6A45A39DA905AB65B43B808FD38A9C3958E4147
24,683,593 UART: [art] PUB.Y = E16D55567940F8C2B1CC017E260B76FCEB7025F8E0B5C593B75AC9C6100D378320C207485BE083ACC50B084AED9C7D4D
24,690,845 UART: [art] SIG.R = 738ED015AB91EFC951BE22C2F513A733F3A18FE2BB297F17D646799FB59B3A012578F0F1779BB8ADA9ADF9746D55BBF5
24,698,289 UART: [art] SIG.S = 61812BF00C18F221F9B7B3CDC6213367AD9C74248EC5FA1BBBCE47CAA3A68DFBA7938E4DB853818B5A16758640FA43AD
25,677,512 UART: Caliptra RT
25,678,230 UART: [state] CFI Enabled
25,810,470 UART: [rt] RT listening for mailbox commands...
25,812,725 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,843,621 UART: [rt]cmd =0x44504543, len=96
30,128,915 >>> mbox cmd response data (6236 bytes)
30,158,133 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,188,215 UART: [rt]cmd =0x52564348, len=36
30,191,403 >>> mbox cmd response data (8 bytes)
30,191,849 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,222,481 UART: [rt]cmd =0x44504543, len=96
34,509,724 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
192,002 UART:
192,367 UART: Running Caliptra ROM ...
193,505 UART:
193,655 UART: [state] CFI Enabled
265,473 UART: [state] LifecycleState = Unprovisioned
267,889 UART: [state] DebugLocked = No
269,705 UART: [state] WD Timer not started. Device not locked for debugging
274,091 UART: [kat] SHA2-256
463,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,725 UART: [kat] ++
475,172 UART: [kat] sha1
485,691 UART: [kat] SHA2-256
488,698 UART: [kat] SHA2-384
494,181 UART: [kat] SHA2-512-ACC
496,826 UART: [kat] ECC-384
2,949,803 UART: [kat] HMAC-384Kdf
2,973,312 UART: [kat] LMS
3,505,123 UART: [kat] --
3,509,837 UART: [cold-reset] ++
3,512,114 UART: [fht] FHT @ 0x50003400
3,523,791 UART: [idev] ++
3,524,486 UART: [idev] CDI.KEYID = 6
3,525,435 UART: [idev] SUBJECT.KEYID = 7
3,526,667 UART: [idev] UDS.KEYID = 0
3,527,564 ready_for_fw is high
3,527,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,246 UART: [idev] Erasing UDS.KEYID = 0
6,030,979 UART: [idev] Sha1 KeyId Algorithm
6,053,183 UART: [idev] --
6,059,440 UART: [ldev] ++
6,060,120 UART: [ldev] CDI.KEYID = 6
6,061,036 UART: [ldev] SUBJECT.KEYID = 5
6,062,193 UART: [ldev] AUTHORITY.KEYID = 7
6,063,422 UART: [ldev] FE.KEYID = 1
6,102,218 UART: [ldev] Erasing FE.KEYID = 1
8,607,410 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,329 UART: [ldev] --
10,415,609 UART: [fwproc] Wait for Commands...
10,417,807 UART: [fwproc] Recv command 0x46574c44
10,420,105 UART: [fwproc] Recv'd Img size: 118548 bytes
13,920,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,154 >>> mbox cmd response: success
14,691,037 UART: [afmc] ++
14,691,740 UART: [afmc] CDI.KEYID = 6
14,692,978 UART: [afmc] SUBJECT.KEYID = 7
14,694,408 UART: [afmc] AUTHORITY.KEYID = 5
17,237,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,783 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,968 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,858 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,031,807 UART: [afmc] --
19,035,242 UART: [cold-reset] --
19,038,076 UART: [state] Locking Datavault
19,045,060 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,269 UART: [state] Locking ICCM
19,048,828 UART: [exit] Launching FMC @ 0x40000130
19,057,505 UART:
19,057,738 UART: Running Caliptra FMC ...
19,059,057 UART:
19,059,229 UART: [state] CFI Enabled
19,119,370 UART: [fht] FMC Alias Private Key: 7
20,885,910 UART: [art] Extend RT PCRs Done
20,887,132 UART: [art] Lock RT PCRs Done
20,888,927 UART: [art] Populate DV Done
20,894,390 UART: [fht] FMC Alias Private Key: 7
20,896,057 UART: [art] Derive CDI
20,896,874 UART: [art] Store in slot 0x4
20,952,339 UART: [art] Derive Key Pair
20,953,380 UART: [art] Store priv key in slot 0x5
23,416,788 UART: [art] Derive Key Pair - Done
23,429,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,142,463 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,969 UART: [art] PUB.X = 5ADE9797B59747C3802F2F06EA38AC23358E7B53B256116BEDF1249AFDB9ACC4C002C323781B792BA902FE6598D60218
25,151,231 UART: [art] PUB.Y = E8071EBCFE3F5C8DA20B7E706149E6FCEF64C68B47042EC6121C57634A0EDA5EF7CAF901646E882ED35ED5C2E79231C4
25,158,469 UART: [art] SIG.R = 3494EC5CD126E056A95E97E1040AE69731758FB5A9EF8B38753D8F8719A331965D69AC442222C6B3E43F9725CC45FB5A
25,165,868 UART: [art] SIG.S = 1604C269679A80F9F6D813D0C0F110C9519D46B79A81D7265CFE3AC6A7BFB4EBBFAF2DB8D22F545FFD853ACD61C25FB5
26,145,278 UART: Caliptra RT
26,145,970 UART: [state] CFI Enabled
26,326,565 UART: [rt] RT listening for mailbox commands...
26,328,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,359,426 UART: [rt]cmd =0x44504543, len=96
30,723,943 >>> mbox cmd response data (6236 bytes)
30,753,195 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,783,269 UART: [rt]cmd =0x52564348, len=36
30,786,193 >>> mbox cmd response data (8 bytes)
30,786,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,816,972 UART: [rt]cmd =0x44504543, len=96
35,182,204 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,440,554 ready_for_fw is high
3,441,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,815,984 >>> mbox cmd response: success
19,109,035 UART:
19,109,416 UART: Running Caliptra FMC ...
19,110,623 UART:
19,110,789 UART: [state] CFI Enabled
19,180,190 UART: [fht] FMC Alias Private Key: 7
20,946,483 UART: [art] Extend RT PCRs Done
20,947,703 UART: [art] Lock RT PCRs Done
20,949,413 UART: [art] Populate DV Done
20,954,886 UART: [fht] FMC Alias Private Key: 7
20,956,426 UART: [art] Derive CDI
20,957,163 UART: [art] Store in slot 0x4
21,013,255 UART: [art] Derive Key Pair
21,014,304 UART: [art] Store priv key in slot 0x5
23,477,048 UART: [art] Derive Key Pair - Done
23,490,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,347 UART: [art] Erasing AUTHORITY.KEYID = 7
25,204,866 UART: [art] PUB.X = A1C00B91152701899D08037F8D0899FD75F74849B800DED87D5A6CB39B7602715BFA3F103DD92707E246DB0CF927ABE6
25,212,113 UART: [art] PUB.Y = 0033436C488DC67FC2403286785B6B4536AA219B12F94AF8CDFB683BAFB5A1E8D849B4CECEB9794E97F7A55ECEE83AE8
25,219,342 UART: [art] SIG.R = B68D07B3DC64714BD3AD911AF0B6AE9BB878B2ACA5FE2D7A31A932B7258C07A459C7E6C03DB9CFFD535A0910CC2DDA75
25,226,779 UART: [art] SIG.S = B7AD4F96517AFFFB11543DF2FA5072397A953DE984F6F19B23172CF48C6AC33F1BB6A51BEF01DA005FCFC6173C91C3F2
26,205,566 UART: Caliptra RT
26,206,261 UART: [state] CFI Enabled
26,388,272 UART: [rt] RT listening for mailbox commands...
26,390,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,421,190 UART: [rt]cmd =0x44504543, len=96
30,784,057 >>> mbox cmd response data (6236 bytes)
30,813,111 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,843,423 UART: [rt]cmd =0x52564348, len=36
30,846,268 >>> mbox cmd response data (8 bytes)
30,846,696 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,877,059 UART: [rt]cmd =0x44504543, len=96
35,242,771 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,491 UART:
192,860 UART: Running Caliptra ROM ...
193,966 UART:
603,814 UART: [state] CFI Enabled
617,282 UART: [state] LifecycleState = Unprovisioned
619,666 UART: [state] DebugLocked = No
621,705 UART: [state] WD Timer not started. Device not locked for debugging
626,463 UART: [kat] SHA2-256
816,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,151 UART: [kat] ++
827,680 UART: [kat] sha1
839,621 UART: [kat] SHA2-256
842,643 UART: [kat] SHA2-384
848,213 UART: [kat] SHA2-512-ACC
850,800 UART: [kat] ECC-384
3,294,382 UART: [kat] HMAC-384Kdf
3,307,396 UART: [kat] LMS
3,839,217 UART: [kat] --
3,843,922 UART: [cold-reset] ++
3,844,997 UART: [fht] FHT @ 0x50003400
3,856,693 UART: [idev] ++
3,857,436 UART: [idev] CDI.KEYID = 6
3,858,343 UART: [idev] SUBJECT.KEYID = 7
3,859,525 UART: [idev] UDS.KEYID = 0
3,860,460 ready_for_fw is high
3,860,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,578 UART: [idev] Erasing UDS.KEYID = 0
6,331,453 UART: [idev] Sha1 KeyId Algorithm
6,354,414 UART: [idev] --
6,360,222 UART: [ldev] ++
6,360,914 UART: [ldev] CDI.KEYID = 6
6,361,803 UART: [ldev] SUBJECT.KEYID = 5
6,363,016 UART: [ldev] AUTHORITY.KEYID = 7
6,364,212 UART: [ldev] FE.KEYID = 1
6,376,777 UART: [ldev] Erasing FE.KEYID = 1
8,853,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,468 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,075 UART: [ldev] --
10,646,017 UART: [fwproc] Wait for Commands...
10,647,897 UART: [fwproc] Recv command 0x46574c44
10,650,153 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,199 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,822 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,577 >>> mbox cmd response: success
14,914,707 UART: [afmc] ++
14,915,415 UART: [afmc] CDI.KEYID = 6
14,916,668 UART: [afmc] SUBJECT.KEYID = 7
14,918,066 UART: [afmc] AUTHORITY.KEYID = 5
17,425,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,635 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,876 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,799 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,388 UART: [afmc] --
19,220,748 UART: [cold-reset] --
19,223,870 UART: [state] Locking Datavault
19,228,549 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,723 UART: [state] Locking ICCM
19,232,726 UART: [exit] Launching FMC @ 0x40000130
19,241,365 UART:
19,241,601 UART: Running Caliptra FMC ...
19,242,707 UART:
19,242,869 UART: [state] CFI Enabled
19,250,601 UART: [fht] FMC Alias Private Key: 7
21,017,003 UART: [art] Extend RT PCRs Done
21,018,249 UART: [art] Lock RT PCRs Done
21,019,678 UART: [art] Populate DV Done
21,025,256 UART: [fht] FMC Alias Private Key: 7
21,026,959 UART: [art] Derive CDI
21,027,779 UART: [art] Store in slot 0x4
21,070,698 UART: [art] Derive Key Pair
21,071,737 UART: [art] Store priv key in slot 0x5
23,499,010 UART: [art] Derive Key Pair - Done
23,512,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,229 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,734 UART: [art] PUB.X = D1DAC31044A038C7E60A96E9184C20F3F7291DC0AFDA171D1907BDBAB6316179F957864FC85F2269BAA4A0D219390353
25,227,004 UART: [art] PUB.Y = 45FC31D8BE232C0FB037D0AE7311020047BB610663DFC89EA5D1E1433C0791846621A1D8293468F0D65358D5E0953FEF
25,234,271 UART: [art] SIG.R = A4C3C4A60C6B0AFFFDDFBC76D66E0A5A724D32852B877E25840E48D282941AAD3DDAA7FE5B8EC4EB3B13D2B17A63AE70
25,241,647 UART: [art] SIG.S = 0F4AF2200709B7EB5D8A2EA82A82870E1E3B37CD7D750D2C626AAA3EE7A613BA6627395D67B1583FEE862BBB60D2882B
26,219,871 UART: Caliptra RT
26,220,582 UART: [state] CFI Enabled
26,353,988 UART: [rt] RT listening for mailbox commands...
26,356,420 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,387,130 UART: [rt]cmd =0x44504543, len=96
30,672,059 >>> mbox cmd response data (6236 bytes)
30,701,162 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,731,194 UART: [rt]cmd =0x52564348, len=36
30,734,563 >>> mbox cmd response data (8 bytes)
30,735,024 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,765,943 UART: [rt]cmd =0x44504543, len=96
35,050,638 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
3,757,696 ready_for_fw is high
3,758,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,043,566 >>> mbox cmd response: success
19,296,679 UART:
19,297,065 UART: Running Caliptra FMC ...
19,298,215 UART:
19,298,379 UART: [state] CFI Enabled
19,306,292 UART: [fht] FMC Alias Private Key: 7
21,072,932 UART: [art] Extend RT PCRs Done
21,074,162 UART: [art] Lock RT PCRs Done
21,075,589 UART: [art] Populate DV Done
21,080,934 UART: [fht] FMC Alias Private Key: 7
21,082,430 UART: [art] Derive CDI
21,083,198 UART: [art] Store in slot 0x4
21,125,912 UART: [art] Derive Key Pair
21,126,962 UART: [art] Store priv key in slot 0x5
23,554,072 UART: [art] Derive Key Pair - Done
23,566,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,064 UART: [art] Erasing AUTHORITY.KEYID = 7
25,274,590 UART: [art] PUB.X = AB0D12CE51FD370E724A76C951AB73FB3FC32596ECDEAC643DB57E7D9F1952C2802B21D6CF4B1DF06CF1A7A3A9049BF4
25,281,805 UART: [art] PUB.Y = 93557B87B05D350552C98FBD4F138EC537C78D8A72655F306AB823689C0B682EEA7E311AEB92B924F933DCD1C460E869
25,289,100 UART: [art] SIG.R = 691EC5CE8F3F7C2B241400ED36655BA7590FB8684EF3149499E79668744E1FDA918C6F350B95E050C65268E30600D756
25,296,416 UART: [art] SIG.S = 217EEBAFABEC870E8A0446A953EC4164F55725984499215803A396B9A90CF0BB3D805BAE90E0399FEAD3683F1F629D81
26,275,411 UART: Caliptra RT
26,276,123 UART: [state] CFI Enabled
26,409,584 UART: [rt] RT listening for mailbox commands...
26,412,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,563 UART: [rt]cmd =0x44504543, len=96
30,728,295 >>> mbox cmd response data (6236 bytes)
30,757,341 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,787,345 UART: [rt]cmd =0x52564348, len=36
30,790,103 >>> mbox cmd response data (8 bytes)
30,790,457 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,821,168 UART: [rt]cmd =0x44504543, len=96
35,106,948 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,777 UART: [kat] SHA2-256
892,715 UART: [kat] SHA2-384
895,468 UART: [kat] SHA2-512-ACC
897,369 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,388 UART: [kat] LMS
1,475,584 UART: [kat] --
1,476,051 UART: [cold-reset] ++
1,476,551 UART: [fht] Storing FHT @ 0x50003400
1,479,296 UART: [idev] ++
1,479,464 UART: [idev] CDI.KEYID = 6
1,479,824 UART: [idev] SUBJECT.KEYID = 7
1,480,248 UART: [idev] UDS.KEYID = 0
1,480,593 ready_for_fw is high
1,480,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,156 UART: [idev] Erasing UDS.KEYID = 0
1,504,878 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,462 UART: [idev] --
1,514,495 UART: [ldev] ++
1,514,663 UART: [ldev] CDI.KEYID = 6
1,515,026 UART: [ldev] SUBJECT.KEYID = 5
1,515,452 UART: [ldev] AUTHORITY.KEYID = 7
1,515,915 UART: [ldev] FE.KEYID = 1
1,521,425 UART: [ldev] Erasing FE.KEYID = 1
1,546,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,050 UART: [ldev] --
1,586,539 UART: [fwproc] Waiting for Commands...
1,587,352 UART: [fwproc] Received command 0x46574c44
1,588,143 UART: [fwproc] Received Image of size 118548 bytes
2,932,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,353 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,848 >>> mbox cmd response: success
3,133,010 UART: [afmc] ++
3,133,178 UART: [afmc] CDI.KEYID = 6
3,133,540 UART: [afmc] SUBJECT.KEYID = 7
3,133,965 UART: [afmc] AUTHORITY.KEYID = 5
3,168,812 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,152 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,641 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,524 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,207 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,875 UART: [afmc] --
3,211,849 UART: [cold-reset] --
3,212,537 UART: [state] Locking Datavault
3,213,648 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,252 UART: [state] Locking ICCM
3,214,740 UART: [exit] Launching FMC @ 0x40000130
3,220,070 UART:
3,220,086 UART: Running Caliptra FMC ...
3,220,494 UART:
3,220,548 UART: [state] CFI Enabled
3,230,802 UART: [fht] FMC Alias Private Key: 7
3,349,648 UART: [art] Extend RT PCRs Done
3,350,076 UART: [art] Lock RT PCRs Done
3,351,716 UART: [art] Populate DV Done
3,359,937 UART: [fht] FMC Alias Private Key: 7
3,360,923 UART: [art] Derive CDI
3,361,203 UART: [art] Store in slot 0x4
3,446,957 UART: [art] Derive Key Pair
3,447,317 UART: [art] Store priv key in slot 0x5
3,460,030 UART: [art] Derive Key Pair - Done
3,474,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,352 UART: [art] PUB.X = 378348AF45946917CE0013EE97D5B4C91B61FF6948005FDE9B5AC854A13D91D7CE9DCDC3E85DFB5B9694C76A04AAFC08
3,498,086 UART: [art] PUB.Y = A87D424BC502E75181AA0B30EBDE63A60F58BAF61FD4C5ECA6A277E27D6E58F2DA53E135D1A903DFED6B72BBF2BD03A5
3,505,047 UART: [art] SIG.R = 38A538BBA6F04123150171BB0C09B1EA3575352DCD39367E3FEBE16B3F5875B880AEC938AE6FC437DF57C7EBD50657F4
3,511,815 UART: [art] SIG.S = BD0C15D5985FC406423FC04238BCE7613E021D60A8F11830EC38D410F4E3653A1EF08BBEF77101C67995617DA15DF11C
3,535,473 UART: Caliptra RT
3,535,724 UART: [state] CFI Enabled
3,656,154 UART: [rt] RT listening for mailbox commands...
3,656,824 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,848 UART: [rt]cmd =0x44504543, len=96
3,868,913 >>> mbox cmd response data (6236 bytes)
3,868,914 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,445 UART: [rt]cmd =0x52564348, len=36
3,901,399 >>> mbox cmd response data (8 bytes)
3,901,400 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,931,129 UART: [rt]cmd =0x44504543, len=96
4,113,726 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,285 ready_for_fw is high
1,362,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,776 >>> mbox cmd response: success
3,042,785 UART:
3,042,801 UART: Running Caliptra FMC ...
3,043,209 UART:
3,043,263 UART: [state] CFI Enabled
3,053,379 UART: [fht] FMC Alias Private Key: 7
3,172,307 UART: [art] Extend RT PCRs Done
3,172,735 UART: [art] Lock RT PCRs Done
3,174,569 UART: [art] Populate DV Done
3,182,574 UART: [fht] FMC Alias Private Key: 7
3,183,526 UART: [art] Derive CDI
3,183,806 UART: [art] Store in slot 0x4
3,269,734 UART: [art] Derive Key Pair
3,270,094 UART: [art] Store priv key in slot 0x5
3,284,053 UART: [art] Derive Key Pair - Done
3,299,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,504 UART: [art] PUB.X = 8A68532B673ACDBF4E2A904E7BA2AB9AA02EC68A58390E81D048F3E23615549D22F29D9214007C31E24536ADE0879FDB
3,322,255 UART: [art] PUB.Y = 369DE5667B16AD537953AFD6C281E9C1181098A5B5ABBE2A1C9571F1992287143594BAC1BC9F45D1657EAA2285BB7065
3,329,207 UART: [art] SIG.R = 0E119D0956B2EC3218C6B611024088E1490B18AA1BD8689ED9E69BD8CAA265E22863557D11911245A44E31553A42E656
3,335,957 UART: [art] SIG.S = AFFB2DF90541F000413321CE9D49E97AA6D7A222C417BEA6FB973F333ABC96CDBCA65A96FD6398FADFCEDE60F1DE1BEF
3,359,358 UART: Caliptra RT
3,359,609 UART: [state] CFI Enabled
3,479,535 UART: [rt] RT listening for mailbox commands...
3,480,205 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,653 UART: [rt]cmd =0x44504543, len=96
3,693,410 >>> mbox cmd response data (6236 bytes)
3,693,411 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,790 UART: [rt]cmd =0x52564348, len=36
3,725,172 >>> mbox cmd response data (8 bytes)
3,725,173 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,982 UART: [rt]cmd =0x44504543, len=96
3,936,173 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,844 UART: [kat] SHA2-256
882,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,890 UART: [kat] ++
887,042 UART: [kat] sha1
891,042 UART: [kat] SHA2-256
892,980 UART: [kat] SHA2-384
895,589 UART: [kat] SHA2-512-ACC
897,490 UART: [kat] ECC-384
903,017 UART: [kat] HMAC-384Kdf
907,703 UART: [kat] LMS
1,475,899 UART: [kat] --
1,476,952 UART: [cold-reset] ++
1,477,326 UART: [fht] Storing FHT @ 0x50003400
1,480,189 UART: [idev] ++
1,480,357 UART: [idev] CDI.KEYID = 6
1,480,717 UART: [idev] SUBJECT.KEYID = 7
1,481,141 UART: [idev] UDS.KEYID = 0
1,481,486 ready_for_fw is high
1,481,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,773 UART: [idev] Erasing UDS.KEYID = 0
1,505,473 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,484 UART: [ldev] ++
1,515,652 UART: [ldev] CDI.KEYID = 6
1,516,015 UART: [ldev] SUBJECT.KEYID = 5
1,516,441 UART: [ldev] AUTHORITY.KEYID = 7
1,516,904 UART: [ldev] FE.KEYID = 1
1,522,130 UART: [ldev] Erasing FE.KEYID = 1
1,547,273 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,393 UART: [ldev] --
1,586,760 UART: [fwproc] Waiting for Commands...
1,587,445 UART: [fwproc] Received command 0x46574c44
1,588,236 UART: [fwproc] Received Image of size 118548 bytes
2,932,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,235 >>> mbox cmd response: success
3,132,249 UART: [afmc] ++
3,132,417 UART: [afmc] CDI.KEYID = 6
3,132,779 UART: [afmc] SUBJECT.KEYID = 7
3,133,204 UART: [afmc] AUTHORITY.KEYID = 5
3,168,471 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,167 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,656 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,539 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,222 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,048 UART: [afmc] --
3,212,166 UART: [cold-reset] --
3,213,106 UART: [state] Locking Datavault
3,214,489 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,093 UART: [state] Locking ICCM
3,215,629 UART: [exit] Launching FMC @ 0x40000130
3,220,959 UART:
3,220,975 UART: Running Caliptra FMC ...
3,221,383 UART:
3,221,526 UART: [state] CFI Enabled
3,232,246 UART: [fht] FMC Alias Private Key: 7
3,350,734 UART: [art] Extend RT PCRs Done
3,351,162 UART: [art] Lock RT PCRs Done
3,352,866 UART: [art] Populate DV Done
3,361,105 UART: [fht] FMC Alias Private Key: 7
3,362,055 UART: [art] Derive CDI
3,362,335 UART: [art] Store in slot 0x4
3,448,001 UART: [art] Derive Key Pair
3,448,361 UART: [art] Store priv key in slot 0x5
3,461,738 UART: [art] Derive Key Pair - Done
3,476,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,821 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,586 UART: [art] PUB.X = D19BC1E0D1F7F5CBD6B54A49AD4BC22CD16AB32CAD3A8AAB2F9120C705A8082050B02AD143812E9E659E2324C950F595
3,499,364 UART: [art] PUB.Y = E156BA0CFE98B472C5F685A51F7E813AD31BAAFEC361AE6307620D624E885CEBD4A1697771F565170B5A83573837C005
3,506,303 UART: [art] SIG.R = C827744575ADA86C8266DBB388DE567B979013E28821AAF5B74628D29A5E3ACD66BF89796690A1E3F4AC39E8F029966A
3,513,075 UART: [art] SIG.S = 5D881B85C9DACA3C013FC24A43880D6911F4035E57809E066B4D995D878DC7640A9EEAB7028CD8E5F8E474AF2CDD4880
3,536,921 UART: Caliptra RT
3,537,264 UART: [state] CFI Enabled
3,657,960 UART: [rt] RT listening for mailbox commands...
3,658,630 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,954 UART: [rt]cmd =0x44504543, len=96
3,870,846 >>> mbox cmd response data (6236 bytes)
3,870,847 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,184 UART: [rt]cmd =0x52564348, len=36
3,902,668 >>> mbox cmd response data (8 bytes)
3,902,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,932,780 UART: [rt]cmd =0x44504543, len=96
4,115,660 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,656 ready_for_fw is high
1,362,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,985 >>> mbox cmd response: success
3,042,286 UART:
3,042,302 UART: Running Caliptra FMC ...
3,042,710 UART:
3,042,853 UART: [state] CFI Enabled
3,053,479 UART: [fht] FMC Alias Private Key: 7
3,172,535 UART: [art] Extend RT PCRs Done
3,172,963 UART: [art] Lock RT PCRs Done
3,174,311 UART: [art] Populate DV Done
3,182,398 UART: [fht] FMC Alias Private Key: 7
3,183,478 UART: [art] Derive CDI
3,183,758 UART: [art] Store in slot 0x4
3,269,414 UART: [art] Derive Key Pair
3,269,774 UART: [art] Store priv key in slot 0x5
3,282,855 UART: [art] Derive Key Pair - Done
3,297,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,734 UART: [art] PUB.X = 9775572ED6D775944BDB45631D367616A312A1D8F1EA243209164AE0EDD8466DA3B59C7D1389C7C2340A1C3B92EA9863
3,320,496 UART: [art] PUB.Y = 90309ADE335B2D185FBC037B2AC1F392A93006B1EF786FD9E86897CC1C6CCD589BA52D941C7E5AB5DFA5DEA878E760D2
3,327,458 UART: [art] SIG.R = 9263D3AC9031C63B1CC88CAD10B7B3110B7F39DAEA0720C096418C42CA4EE976D2923EFAF6CC6BBF1A100BD0D42C8D96
3,334,237 UART: [art] SIG.S = BCA11327851383E19C752F2DA8E58396D614AD70EB330B4C3E73E0CFADC0373ECFAA4F915F7B3480D4FA0455DC62F568
3,357,507 UART: Caliptra RT
3,357,850 UART: [state] CFI Enabled
3,478,883 UART: [rt] RT listening for mailbox commands...
3,479,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,865 UART: [rt]cmd =0x44504543, len=96
3,692,139 >>> mbox cmd response data (6236 bytes)
3,692,140 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,889 UART: [rt]cmd =0x52564348, len=36
3,724,305 >>> mbox cmd response data (8 bytes)
3,724,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,754,373 UART: [rt]cmd =0x44504543, len=96
3,936,657 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,730 UART: [kat] SHA2-256
901,670 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,663 UART: [kat] HMAC-384Kdf
920,163 UART: [kat] LMS
1,168,475 UART: [kat] --
1,169,466 UART: [cold-reset] ++
1,169,898 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 ready_for_fw is high
1,173,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,591 UART: [idev] Erasing UDS.KEYID = 0
1,198,297 UART: [idev] Sha1 KeyId Algorithm
1,207,131 UART: [idev] --
1,208,108 UART: [ldev] ++
1,208,276 UART: [ldev] CDI.KEYID = 6
1,208,640 UART: [ldev] SUBJECT.KEYID = 5
1,209,067 UART: [ldev] AUTHORITY.KEYID = 7
1,209,530 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,241,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,283 UART: [fwproc] Wait for Commands...
1,280,934 UART: [fwproc] Recv command 0x46574c44
1,281,667 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,233 >>> mbox cmd response: success
2,826,487 UART: [afmc] ++
2,826,655 UART: [afmc] CDI.KEYID = 6
2,827,018 UART: [afmc] SUBJECT.KEYID = 7
2,827,444 UART: [afmc] AUTHORITY.KEYID = 5
2,862,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,172 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,921 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,512 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,213 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,826 UART: [afmc] --
2,904,667 UART: [cold-reset] --
2,905,419 UART: [state] Locking Datavault
2,906,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,104 UART: [state] Locking ICCM
2,907,712 UART: [exit] Launching FMC @ 0x40000130
2,913,042 UART:
2,913,058 UART: Running Caliptra FMC ...
2,913,466 UART:
2,913,520 UART: [state] CFI Enabled
2,924,132 UART: [fht] FMC Alias Private Key: 7
3,043,330 UART: [art] Extend RT PCRs Done
3,043,758 UART: [art] Lock RT PCRs Done
3,045,254 UART: [art] Populate DV Done
3,053,393 UART: [fht] FMC Alias Private Key: 7
3,054,481 UART: [art] Derive CDI
3,054,761 UART: [art] Store in slot 0x4
3,140,644 UART: [art] Derive Key Pair
3,141,004 UART: [art] Store priv key in slot 0x5
3,153,670 UART: [art] Derive Key Pair - Done
3,168,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,756 UART: [art] PUB.X = 2D8F1244D10F5E926AB335E47C5E0298BBCB6C8039618C6B3BCB3EDC273494CCE4584284E34E422B7F51CAB77D5F8AE4
3,191,532 UART: [art] PUB.Y = 71E4EDA7FD5280A2B18C19C9B147B290B86C51A91B9583EECD03A91678919CE29EA4C58E183AA9E9BE0F9E8D2AE8213B
3,198,490 UART: [art] SIG.R = 6E136F0B0729DD01CE59F0AB57BB06F9F7FE7DA73E40EFA6A61D6066831F469BABBC931E0A6D71648D10167AB34EE376
3,205,259 UART: [art] SIG.S = CF58B80682A4305D37169EA67D40B718EA2426D25926ADD24F42DCD68A2356547C3D11FA933F259FAAAAD7F338823176
3,228,634 UART: Caliptra RT
3,228,885 UART: [state] CFI Enabled
3,349,260 UART: [rt] RT listening for mailbox commands...
3,349,930 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,664 UART: [rt]cmd =0x44504543, len=96
3,563,711 >>> mbox cmd response data (6236 bytes)
3,563,712 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,325 UART: [rt]cmd =0x52564348, len=36
3,595,559 >>> mbox cmd response data (8 bytes)
3,595,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,625,441 UART: [rt]cmd =0x44504543, len=96
3,807,056 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,536 ready_for_fw is high
1,059,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,410 >>> mbox cmd response: success
2,740,879 UART:
2,740,895 UART: Running Caliptra FMC ...
2,741,303 UART:
2,741,357 UART: [state] CFI Enabled
2,752,057 UART: [fht] FMC Alias Private Key: 7
2,870,745 UART: [art] Extend RT PCRs Done
2,871,173 UART: [art] Lock RT PCRs Done
2,872,791 UART: [art] Populate DV Done
2,881,268 UART: [fht] FMC Alias Private Key: 7
2,882,400 UART: [art] Derive CDI
2,882,680 UART: [art] Store in slot 0x4
2,968,469 UART: [art] Derive Key Pair
2,968,829 UART: [art] Store priv key in slot 0x5
2,981,943 UART: [art] Derive Key Pair - Done
2,996,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,974 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,739 UART: [art] PUB.X = F4BC55BCB335C7171855F50ED2DAE8F836172E9CE489524F439A625EA5AEF33BA807C736537DE585B6629F1A1ECE02B9
3,019,510 UART: [art] PUB.Y = FE15434711920B9237EF9FA1CBBE592ACCA51549221679F52F8BD6C561EAD69BC8B6588F8AA3E8703710AC791B8BE72E
3,026,467 UART: [art] SIG.R = 76744A32DEB709CEF02F2FE4A10690F6B94474508A9B4C16DFC4DD41F9C38E0AFF5C00F0E82DB066467B6407B997C70F
3,033,210 UART: [art] SIG.S = E3489FC6B6CB341AB865E580A76375A10838AA4EEB02036FA79B729760A2EE5AB2B798772ACE01A83EEB5DE8A8F113CD
3,057,076 UART: Caliptra RT
3,057,327 UART: [state] CFI Enabled
3,176,140 UART: [rt] RT listening for mailbox commands...
3,176,810 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,074 UART: [rt]cmd =0x44504543, len=96
3,389,236 >>> mbox cmd response data (6236 bytes)
3,389,237 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,884 UART: [rt]cmd =0x52564348, len=36
3,421,528 >>> mbox cmd response data (8 bytes)
3,421,529 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,532 UART: [rt]cmd =0x44504543, len=96
3,634,298 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,005 UART: [state] LifecycleState = Unprovisioned
85,660 UART: [state] DebugLocked = No
86,168 UART: [state] WD Timer not started. Device not locked for debugging
87,319 UART: [kat] SHA2-256
890,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,973 UART: [kat] ++
895,125 UART: [kat] sha1
899,191 UART: [kat] SHA2-256
901,131 UART: [kat] SHA2-384
903,792 UART: [kat] SHA2-512-ACC
905,693 UART: [kat] ECC-384
915,906 UART: [kat] HMAC-384Kdf
920,580 UART: [kat] LMS
1,168,892 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,481 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 ready_for_fw is high
1,174,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,826 UART: [idev] Erasing UDS.KEYID = 0
1,198,784 UART: [idev] Sha1 KeyId Algorithm
1,207,458 UART: [idev] --
1,208,565 UART: [ldev] ++
1,208,733 UART: [ldev] CDI.KEYID = 6
1,209,097 UART: [ldev] SUBJECT.KEYID = 5
1,209,524 UART: [ldev] AUTHORITY.KEYID = 7
1,209,987 UART: [ldev] FE.KEYID = 1
1,215,225 UART: [ldev] Erasing FE.KEYID = 1
1,241,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,935 UART: [ldev] --
1,281,144 UART: [fwproc] Wait for Commands...
1,281,905 UART: [fwproc] Recv command 0x46574c44
1,282,638 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,806 >>> mbox cmd response: success
2,826,062 UART: [afmc] ++
2,826,230 UART: [afmc] CDI.KEYID = 6
2,826,593 UART: [afmc] SUBJECT.KEYID = 7
2,827,019 UART: [afmc] AUTHORITY.KEYID = 5
2,862,380 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,651 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,110 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,991 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,692 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,485 UART: [afmc] --
2,905,452 UART: [cold-reset] --
2,906,424 UART: [state] Locking Datavault
2,907,783 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,387 UART: [state] Locking ICCM
2,908,881 UART: [exit] Launching FMC @ 0x40000130
2,914,211 UART:
2,914,227 UART: Running Caliptra FMC ...
2,914,635 UART:
2,914,778 UART: [state] CFI Enabled
2,925,844 UART: [fht] FMC Alias Private Key: 7
3,045,190 UART: [art] Extend RT PCRs Done
3,045,618 UART: [art] Lock RT PCRs Done
3,046,948 UART: [art] Populate DV Done
3,055,171 UART: [fht] FMC Alias Private Key: 7
3,056,261 UART: [art] Derive CDI
3,056,541 UART: [art] Store in slot 0x4
3,142,454 UART: [art] Derive Key Pair
3,142,814 UART: [art] Store priv key in slot 0x5
3,156,740 UART: [art] Derive Key Pair - Done
3,171,200 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,861 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,626 UART: [art] PUB.X = FF780DF925347179F36D8AB6F64233A1221C5D2F0391AC381EDD25A4FE80E20C7704FE596165C3F18784E62AE721D157
3,194,384 UART: [art] PUB.Y = 2C2DBB6189171E2383CFF35B1EAE09EB75506EE46459D42999F14B58F07DC98DB82272675FE56843F59A333B2DF6D866
3,201,333 UART: [art] SIG.R = C7F32F66245C6F9BD2F2A16CE737569BE7F67E45AD8B6695D82511D6B6E72800EE184C58CC10BEEBC28202796099025B
3,208,079 UART: [art] SIG.S = CEA3B8AEB3A63068E0D5784DB1EC4DD04ADA16252D4B8921399A57F8262D42031F0A4CFAF80E3CC60FA8F9B37FC31B5C
3,231,687 UART: Caliptra RT
3,232,030 UART: [state] CFI Enabled
3,351,338 UART: [rt] RT listening for mailbox commands...
3,352,008 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,360 UART: [rt]cmd =0x44504543, len=96
3,566,079 >>> mbox cmd response data (6236 bytes)
3,566,080 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,667 UART: [rt]cmd =0x52564348, len=36
3,597,813 >>> mbox cmd response data (8 bytes)
3,597,814 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,627,575 UART: [rt]cmd =0x44504543, len=96
3,808,902 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,339 ready_for_fw is high
1,059,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,959 >>> mbox cmd response: success
2,740,388 UART:
2,740,404 UART: Running Caliptra FMC ...
2,740,812 UART:
2,740,955 UART: [state] CFI Enabled
2,751,563 UART: [fht] FMC Alias Private Key: 7
2,871,071 UART: [art] Extend RT PCRs Done
2,871,499 UART: [art] Lock RT PCRs Done
2,873,115 UART: [art] Populate DV Done
2,881,282 UART: [fht] FMC Alias Private Key: 7
2,882,310 UART: [art] Derive CDI
2,882,590 UART: [art] Store in slot 0x4
2,968,337 UART: [art] Derive Key Pair
2,968,697 UART: [art] Store priv key in slot 0x5
2,981,733 UART: [art] Derive Key Pair - Done
2,996,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,104 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,869 UART: [art] PUB.X = 5F76772E75DEFA632FC090EA029E02C85F3FB4CF32E9D3000835E7BEC6A4D661EE4FEF2556AB3D8E0B407BB2BB5AADEE
3,019,631 UART: [art] PUB.Y = D4CD660C7E9A94F77AF7BC22F809F28EFF88D08B8A964AB322752F5B455CE9DF458F2A622C56D7C462F15467A16F18FB
3,026,587 UART: [art] SIG.R = 502A7EF8B67F64B4BE203D2972F5A20C6FFE264887132FAD8640346C6F6888AF71518ACC0348B98067DB3B016FA29632
3,033,348 UART: [art] SIG.S = 368FF9BAA868E6A0F5BCDB99C6180002F0B5B5E7F8E94D0E03B358A1A4485E1FB158455625A7505D28A98B9B069B3952
3,057,918 UART: Caliptra RT
3,058,261 UART: [state] CFI Enabled
3,177,269 UART: [rt] RT listening for mailbox commands...
3,177,939 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,149 UART: [rt]cmd =0x44504543, len=96
3,390,213 >>> mbox cmd response data (6236 bytes)
3,390,214 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,947 UART: [rt]cmd =0x52564348, len=36
3,422,437 >>> mbox cmd response data (8 bytes)
3,422,438 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,235 UART: [rt]cmd =0x44504543, len=96
3,634,851 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,319 UART: [state] WD Timer not started. Device not locked for debugging
87,496 UART: [kat] SHA2-256
893,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,271 UART: [kat] ++
897,423 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,426 UART: [kat] SHA2-512-ACC
908,327 UART: [kat] ECC-384
918,114 UART: [kat] HMAC-384Kdf
922,554 UART: [kat] LMS
1,170,882 UART: [kat] --
1,171,743 UART: [cold-reset] ++
1,172,179 UART: [fht] FHT @ 0x50003400
1,174,900 UART: [idev] ++
1,175,068 UART: [idev] CDI.KEYID = 6
1,175,428 UART: [idev] SUBJECT.KEYID = 7
1,175,852 UART: [idev] UDS.KEYID = 0
1,176,197 ready_for_fw is high
1,176,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,782 UART: [idev] Erasing UDS.KEYID = 0
1,200,793 UART: [idev] Sha1 KeyId Algorithm
1,209,463 UART: [idev] --
1,210,491 UART: [ldev] ++
1,210,659 UART: [ldev] CDI.KEYID = 6
1,211,022 UART: [ldev] SUBJECT.KEYID = 5
1,211,448 UART: [ldev] AUTHORITY.KEYID = 7
1,211,911 UART: [ldev] FE.KEYID = 1
1,217,159 UART: [ldev] Erasing FE.KEYID = 1
1,242,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,696 UART: [fwproc] Wait for Commands...
1,282,352 UART: [fwproc] Recv command 0x46574c44
1,283,080 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,487 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,512 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,682 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,839 >>> mbox cmd response: success
2,827,019 UART: [afmc] ++
2,827,187 UART: [afmc] CDI.KEYID = 6
2,827,549 UART: [afmc] SUBJECT.KEYID = 7
2,827,974 UART: [afmc] AUTHORITY.KEYID = 5
2,862,965 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,086 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,795 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,678 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,153 UART: [afmc] --
2,906,089 UART: [cold-reset] --
2,906,821 UART: [state] Locking Datavault
2,908,130 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,734 UART: [state] Locking ICCM
2,909,192 UART: [exit] Launching FMC @ 0x40000130
2,914,522 UART:
2,914,538 UART: Running Caliptra FMC ...
2,914,946 UART:
2,915,000 UART: [state] CFI Enabled
2,925,536 UART: [fht] FMC Alias Private Key: 7
3,044,204 UART: [art] Extend RT PCRs Done
3,044,632 UART: [art] Lock RT PCRs Done
3,046,326 UART: [art] Populate DV Done
3,054,735 UART: [fht] FMC Alias Private Key: 7
3,055,723 UART: [art] Derive CDI
3,056,003 UART: [art] Store in slot 0x4
3,141,642 UART: [art] Derive Key Pair
3,142,002 UART: [art] Store priv key in slot 0x5
3,155,472 UART: [art] Derive Key Pair - Done
3,170,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,407 UART: [art] PUB.X = 497AF5048386C0F269C0C6546BF1EAC89D3588403C310C82B69EC3113192CF6628F9966743E909CD58025362D3A1361A
3,193,155 UART: [art] PUB.Y = 977DD780A83F7F7E60ECD4E7AC7D5E925A1D0AC995EC9026AB907A950746E93DE3A6AC85C6C14F05A9D44AC2E7786DA9
3,200,112 UART: [art] SIG.R = 4E6497B56D8775C31145FB88C12C15BD33050AA259F9A0063D220D0A0DD3B59EB024C5762148EFA632474609360CC5F2
3,206,854 UART: [art] SIG.S = D85B5993010C76FF3C8C561B6FB0DFDC99F954EB58C8A69074A2B000959B43C096A448E9B119FBD2CDA6DF63591C6624
3,230,602 UART: Caliptra RT
3,230,853 UART: [state] CFI Enabled
3,349,738 UART: [rt] RT listening for mailbox commands...
3,350,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,634 UART: [rt]cmd =0x44504543, len=96
3,562,782 >>> mbox cmd response data (6236 bytes)
3,562,783 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,248 UART: [rt]cmd =0x52564348, len=36
3,595,010 >>> mbox cmd response data (8 bytes)
3,595,011 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,624,834 UART: [rt]cmd =0x44504543, len=96
3,805,540 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,737 ready_for_fw is high
1,060,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,130 >>> mbox cmd response: success
2,740,465 UART:
2,740,481 UART: Running Caliptra FMC ...
2,740,889 UART:
2,740,943 UART: [state] CFI Enabled
2,751,575 UART: [fht] FMC Alias Private Key: 7
2,870,853 UART: [art] Extend RT PCRs Done
2,871,281 UART: [art] Lock RT PCRs Done
2,872,757 UART: [art] Populate DV Done
2,881,078 UART: [fht] FMC Alias Private Key: 7
2,882,200 UART: [art] Derive CDI
2,882,480 UART: [art] Store in slot 0x4
2,967,731 UART: [art] Derive Key Pair
2,968,091 UART: [art] Store priv key in slot 0x5
2,981,031 UART: [art] Derive Key Pair - Done
2,995,655 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,967 UART: [art] PUB.X = 9FDFE43DF1EDD58E86E9FF16EACC30AC1040BC1E20EDABC9DD52947C9C01628D1323BDA39D45621FF087AE4F83E6CAC6
3,018,762 UART: [art] PUB.Y = 7E854FBD185CB02AA38025530B71FDFC42F55C8B65102A5F606A416C4C848700474257619914C0F077ED7B27BF3A8533
3,025,683 UART: [art] SIG.R = 9F63D6266DF3BD95266EC54DBC8058A4844616A3AF363761B06B7DCED4ED098C03DF6A58E5DCB7F5718CB6D2BFC15ED6
3,032,465 UART: [art] SIG.S = 3CEC7E9D63D05444D9D94CE4C28CB43E142F031BE9721AD8AF78471B09786D635E95E8FC23D7DB23357284ED28244142
3,056,141 UART: Caliptra RT
3,056,392 UART: [state] CFI Enabled
3,176,781 UART: [rt] RT listening for mailbox commands...
3,177,451 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,121 UART: [rt]cmd =0x44504543, len=96
3,389,083 >>> mbox cmd response data (6236 bytes)
3,389,084 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,781 UART: [rt]cmd =0x52564348, len=36
3,421,631 >>> mbox cmd response data (8 bytes)
3,421,632 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,691 UART: [rt]cmd =0x44504543, len=96
3,634,117 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,129 UART: [kat] SHA2-256
893,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,904 UART: [kat] ++
898,056 UART: [kat] sha1
902,442 UART: [kat] SHA2-256
904,382 UART: [kat] SHA2-384
906,991 UART: [kat] SHA2-512-ACC
908,892 UART: [kat] ECC-384
919,011 UART: [kat] HMAC-384Kdf
923,807 UART: [kat] LMS
1,172,135 UART: [kat] --
1,172,990 UART: [cold-reset] ++
1,173,470 UART: [fht] FHT @ 0x50003400
1,176,195 UART: [idev] ++
1,176,363 UART: [idev] CDI.KEYID = 6
1,176,723 UART: [idev] SUBJECT.KEYID = 7
1,177,147 UART: [idev] UDS.KEYID = 0
1,177,492 ready_for_fw is high
1,177,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,129 UART: [idev] Erasing UDS.KEYID = 0
1,202,414 UART: [idev] Sha1 KeyId Algorithm
1,211,068 UART: [idev] --
1,212,126 UART: [ldev] ++
1,212,294 UART: [ldev] CDI.KEYID = 6
1,212,657 UART: [ldev] SUBJECT.KEYID = 5
1,213,083 UART: [ldev] AUTHORITY.KEYID = 7
1,213,546 UART: [ldev] FE.KEYID = 1
1,218,978 UART: [ldev] Erasing FE.KEYID = 1
1,244,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,354 UART: [ldev] --
1,284,725 UART: [fwproc] Wait for Commands...
1,285,427 UART: [fwproc] Recv command 0x46574c44
1,286,155 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,924 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,895 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,402 >>> mbox cmd response: success
2,829,600 UART: [afmc] ++
2,829,768 UART: [afmc] CDI.KEYID = 6
2,830,130 UART: [afmc] SUBJECT.KEYID = 7
2,830,555 UART: [afmc] AUTHORITY.KEYID = 5
2,866,816 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,006 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,448 UART: [afmc] --
2,910,528 UART: [cold-reset] --
2,911,498 UART: [state] Locking Datavault
2,912,677 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,281 UART: [state] Locking ICCM
2,913,739 UART: [exit] Launching FMC @ 0x40000130
2,919,069 UART:
2,919,085 UART: Running Caliptra FMC ...
2,919,493 UART:
2,919,636 UART: [state] CFI Enabled
2,930,744 UART: [fht] FMC Alias Private Key: 7
3,049,678 UART: [art] Extend RT PCRs Done
3,050,106 UART: [art] Lock RT PCRs Done
3,051,482 UART: [art] Populate DV Done
3,060,057 UART: [fht] FMC Alias Private Key: 7
3,061,189 UART: [art] Derive CDI
3,061,469 UART: [art] Store in slot 0x4
3,147,520 UART: [art] Derive Key Pair
3,147,880 UART: [art] Store priv key in slot 0x5
3,161,096 UART: [art] Derive Key Pair - Done
3,175,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,997 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,762 UART: [art] PUB.X = 3E12BFC2B3E1FE7EAA2D270637579C0AE478ED383B96173D1C70EC8C0464E3F77B6339CC13440671529890CB76603774
3,198,518 UART: [art] PUB.Y = 29459C4D57D1496FEF462AD758A20CE1AA34F8B88BF551E7E055FFA8AF06F2D9C3572658B2807C14213812DB1B692393
3,205,464 UART: [art] SIG.R = B9182D7DF758F5471F90B66AD604148F755D246FE19A8952FC86E31C4CDFF25EEFCC6160FEFA724B865EAF98A69A456A
3,212,245 UART: [art] SIG.S = 471BDC4DBA49EC6425A09ECEB84769B2141EA3A8EE1EAF7D0FC3ECA0F422DA443EC8E7FD2E5840F0EC9E66DE145D0453
3,236,003 UART: Caliptra RT
3,236,346 UART: [state] CFI Enabled
3,356,881 UART: [rt] RT listening for mailbox commands...
3,357,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,861 UART: [rt]cmd =0x44504543, len=96
3,569,433 >>> mbox cmd response data (6236 bytes)
3,569,434 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,599,139 UART: [rt]cmd =0x52564348, len=36
3,601,691 >>> mbox cmd response data (8 bytes)
3,601,692 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,631,627 UART: [rt]cmd =0x44504543, len=96
3,813,833 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,734 ready_for_fw is high
1,060,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,977 >>> mbox cmd response: success
2,739,516 UART:
2,739,532 UART: Running Caliptra FMC ...
2,739,940 UART:
2,740,083 UART: [state] CFI Enabled
2,750,797 UART: [fht] FMC Alias Private Key: 7
2,869,663 UART: [art] Extend RT PCRs Done
2,870,091 UART: [art] Lock RT PCRs Done
2,871,379 UART: [art] Populate DV Done
2,879,554 UART: [fht] FMC Alias Private Key: 7
2,880,514 UART: [art] Derive CDI
2,880,794 UART: [art] Store in slot 0x4
2,966,515 UART: [art] Derive Key Pair
2,966,875 UART: [art] Store priv key in slot 0x5
2,980,601 UART: [art] Derive Key Pair - Done
2,995,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,826 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,591 UART: [art] PUB.X = 9A3E582CDDCB9ECA63562F9180400DFACDC506AF88A62FFA2CB11882470CDCC7BC2BFB1BD31423755090501818C45F74
3,018,366 UART: [art] PUB.Y = 747C46512F417424B73DA9EEF8F9881D71B65A6B7F7842369D814D53F63D9FE7F7E023A1944C8AADD94646928DA764FF
3,025,318 UART: [art] SIG.R = D04F4C338E5F2867C7EAB6EE5F1E7C2A6B15124D5F24BEF6F287E87B2C3B84239BD7D1E9D029955B99135C55A97614CF
3,032,098 UART: [art] SIG.S = 7804B91651C93D3C45DAB3752F483B4650B78BABF44C772570F3B79A0C984933E75B9B5D7CF2E99DB502C2AB58EF9B6E
3,055,515 UART: Caliptra RT
3,055,858 UART: [state] CFI Enabled
3,175,451 UART: [rt] RT listening for mailbox commands...
3,176,121 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,443 UART: [rt]cmd =0x44504543, len=96
3,387,811 >>> mbox cmd response data (6236 bytes)
3,387,812 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,167 UART: [rt]cmd =0x52564348, len=36
3,419,703 >>> mbox cmd response data (8 bytes)
3,419,704 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,449,659 UART: [rt]cmd =0x44504543, len=96
3,631,745 >>> mbox cmd response data (6236 bytes)
test test_revoke_exported_cdi_handle::test_export_cdi_after_revoke ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
191,997 UART:
192,364 UART: Running Caliptra ROM ...
193,503 UART:
193,649 UART: [state] CFI Enabled
264,244 UART: [state] LifecycleState = Unprovisioned
266,227 UART: [state] DebugLocked = No
267,410 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,913 UART: [kat] SHA2-256
442,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,169 UART: [kat] ++
453,655 UART: [kat] sha1
464,177 UART: [kat] SHA2-256
466,839 UART: [kat] SHA2-384
473,630 UART: [kat] SHA2-512-ACC
476,001 UART: [kat] ECC-384
2,769,497 UART: [kat] HMAC-384Kdf
2,801,780 UART: [kat] LMS
3,992,044 UART: [kat] --
3,996,544 UART: [cold-reset] ++
3,998,831 UART: [fht] Storing FHT @ 0x50003400
4,010,805 UART: [idev] ++
4,011,452 UART: [idev] CDI.KEYID = 6
4,012,342 UART: [idev] SUBJECT.KEYID = 7
4,013,593 UART: [idev] UDS.KEYID = 0
4,014,598 ready_for_fw is high
4,014,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,001 UART: [idev] Erasing UDS.KEYID = 0
7,344,658 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,062 UART: [idev] --
7,371,139 UART: [ldev] ++
7,371,766 UART: [ldev] CDI.KEYID = 6
7,372,675 UART: [ldev] SUBJECT.KEYID = 5
7,373,890 UART: [ldev] AUTHORITY.KEYID = 7
7,375,177 UART: [ldev] FE.KEYID = 1
7,421,695 UART: [ldev] Erasing FE.KEYID = 1
10,759,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,402 UART: [ldev] --
13,135,130 UART: [fwproc] Waiting for Commands...
13,137,329 UART: [fwproc] Received command 0x46574c44
13,139,564 UART: [fwproc] Received Image of size 118548 bytes
17,246,448 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,327,128 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,400,328 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,728,142 >>> mbox cmd response: success
17,733,158 UART: [afmc] ++
17,733,786 UART: [afmc] CDI.KEYID = 6
17,734,697 UART: [afmc] SUBJECT.KEYID = 7
17,735,922 UART: [afmc] AUTHORITY.KEYID = 5
21,112,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,410,213 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,412,534 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,426,939 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,441,659 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,456,107 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,478,477 UART: [afmc] --
23,481,908 UART: [cold-reset] --
23,486,425 UART: [state] Locking Datavault
23,491,465 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,180 UART: [state] Locking ICCM
23,494,497 UART: [exit] Launching FMC @ 0x40000130
23,502,894 UART:
23,503,127 UART: Running Caliptra FMC ...
23,504,226 UART:
23,504,381 UART: [state] CFI Enabled
23,571,028 UART: [fht] FMC Alias Private Key: 7
25,910,786 UART: [art] Extend RT PCRs Done
25,912,010 UART: [art] Lock RT PCRs Done
25,913,449 UART: [art] Populate DV Done
25,918,974 UART: [fht] FMC Alias Private Key: 7
25,920,563 UART: [art] Derive CDI
25,921,378 UART: [art] Store in slot 0x4
25,979,982 UART: [art] Derive Key Pair
25,981,020 UART: [art] Store priv key in slot 0x5
29,273,812 UART: [art] Derive Key Pair - Done
29,286,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,575,852 UART: [art] Erasing AUTHORITY.KEYID = 7
31,577,628 UART: [art] PUB.X = 596993924250BDA5ADF521A6D156B2C17522046B6A7CF8AC5F56606EE292653928EA0CF0893F85780C678A532FA41B48
31,584,603 UART: [art] PUB.Y = CD6626525FCCE335B4C78A7BDD7299182824C1C0F18E82862A029F93D61CAEAFB37CABBF518DF87E1D80CE35DDE82784
31,591,884 UART: [art] SIG.R = 3A02134167C6E31142C21B2C480D47A6059E3C514BE9FAFF8C6B48E88168CC52BB3281F1804C5837F3B5D781AFF2F725
31,599,266 UART: [art] SIG.S = A80A73DD72E7423EB8FBFF922DCD0EAC43C83C526DAC9DBF014FE05E17F599B1F677E825B46B382F114BD74A146E4638
32,904,399 UART: Caliptra RT
32,905,122 UART: [state] CFI Enabled
33,082,492 UART: [rt] RT listening for mailbox commands...
33,084,564 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,115,485 UART: [rt]cmd =0x44504543, len=96
38,895,993 >>> mbox cmd response data (6236 bytes)
38,925,614 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,955,953 UART: [rt]cmd =0x52564348, len=36
38,959,313 >>> mbox cmd response data (8 bytes)
38,959,771 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,989,621 UART: [rt]cmd =0x52564348, len=36
38,991,866 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,786,496 ready_for_fw is high
3,786,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,706 >>> mbox cmd response: success
23,651,796 UART:
23,652,218 UART: Running Caliptra FMC ...
23,653,329 UART:
23,653,482 UART: [state] CFI Enabled
23,723,237 UART: [fht] FMC Alias Private Key: 7
26,063,705 UART: [art] Extend RT PCRs Done
26,064,940 UART: [art] Lock RT PCRs Done
26,066,436 UART: [art] Populate DV Done
26,071,760 UART: [fht] FMC Alias Private Key: 7
26,073,357 UART: [art] Derive CDI
26,074,097 UART: [art] Store in slot 0x4
26,132,500 UART: [art] Derive Key Pair
26,133,541 UART: [art] Store priv key in slot 0x5
29,426,475 UART: [art] Derive Key Pair - Done
29,439,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,174 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,680 UART: [art] PUB.X = F4499BC7BCCF5C97BE2B4A4974D2DFC6F9CB7B18D4498FE113C946A0AE3EC005ED8284D67B20C2F706B6B264F605F133
31,737,045 UART: [art] PUB.Y = 053C4A634E31501A0BEDA4A4D286D3D3EAE311F76D52A7183B331AD82A4689E206A01224D92ACB8733F0B9E40A30F546
31,744,250 UART: [art] SIG.R = 3C954E8E6CE735694315E7AD5C63C86FB721EF791A7FCD36B13E47C2BE9B08679A20CD71BC89ACF5168E2B4062E805BE
31,751,647 UART: [art] SIG.S = 57E8A0BDE32ACA926C2DFFA88FBC9DC4FD446426373A1B68C60EDE869F1C1CEF9871A6961CBC4ED1E62F2098A94B1233
33,056,524 UART: Caliptra RT
33,057,235 UART: [state] CFI Enabled
33,233,531 UART: [rt] RT listening for mailbox commands...
33,235,466 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,266,011 UART: [rt]cmd =0x44504543, len=96
39,045,735 >>> mbox cmd response data (6236 bytes)
39,075,132 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,105,485 UART: [rt]cmd =0x52564348, len=36
39,108,248 >>> mbox cmd response data (8 bytes)
39,108,669 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,138,737 UART: [rt]cmd =0x52564348, len=36
39,140,865 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,377 UART:
192,751 UART: Running Caliptra ROM ...
193,844 UART:
603,441 UART: [state] CFI Enabled
620,947 UART: [state] LifecycleState = Unprovisioned
622,815 UART: [state] DebugLocked = No
625,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,266 UART: [kat] SHA2-256
799,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,584 UART: [kat] ++
811,031 UART: [kat] sha1
821,975 UART: [kat] SHA2-256
824,695 UART: [kat] SHA2-384
830,749 UART: [kat] SHA2-512-ACC
833,112 UART: [kat] ECC-384
3,116,196 UART: [kat] HMAC-384Kdf
3,128,206 UART: [kat] LMS
4,318,343 UART: [kat] --
4,323,433 UART: [cold-reset] ++
4,324,369 UART: [fht] Storing FHT @ 0x50003400
4,336,408 UART: [idev] ++
4,336,976 UART: [idev] CDI.KEYID = 6
4,337,882 UART: [idev] SUBJECT.KEYID = 7
4,339,135 UART: [idev] UDS.KEYID = 0
4,340,177 ready_for_fw is high
4,340,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,259 UART: [idev] Erasing UDS.KEYID = 0
7,633,218 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,892 UART: [idev] --
7,657,429 UART: [ldev] ++
7,658,003 UART: [ldev] CDI.KEYID = 6
7,659,024 UART: [ldev] SUBJECT.KEYID = 5
7,660,183 UART: [ldev] AUTHORITY.KEYID = 7
7,661,461 UART: [ldev] FE.KEYID = 1
7,672,646 UART: [ldev] Erasing FE.KEYID = 1
10,961,877 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,269,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,284,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,969 UART: [ldev] --
13,320,757 UART: [fwproc] Waiting for Commands...
13,322,403 UART: [fwproc] Received command 0x46574c44
13,324,644 UART: [fwproc] Received Image of size 118548 bytes
17,435,532 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,696 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,877 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,159 >>> mbox cmd response: success
17,910,624 UART: [afmc] ++
17,911,290 UART: [afmc] CDI.KEYID = 6
17,912,203 UART: [afmc] SUBJECT.KEYID = 7
17,913,410 UART: [afmc] AUTHORITY.KEYID = 5
21,228,011 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,216 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,522 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,673 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,134 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,970 UART: [afmc] --
23,595,725 UART: [cold-reset] --
23,598,775 UART: [state] Locking Datavault
23,604,772 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,520 UART: [state] Locking ICCM
23,608,611 UART: [exit] Launching FMC @ 0x40000130
23,617,008 UART:
23,617,246 UART: Running Caliptra FMC ...
23,618,341 UART:
23,618,493 UART: [state] CFI Enabled
23,626,565 UART: [fht] FMC Alias Private Key: 7
25,966,736 UART: [art] Extend RT PCRs Done
25,967,970 UART: [art] Lock RT PCRs Done
25,969,608 UART: [art] Populate DV Done
25,975,014 UART: [fht] FMC Alias Private Key: 7
25,976,546 UART: [art] Derive CDI
25,977,354 UART: [art] Store in slot 0x4
26,020,106 UART: [art] Derive Key Pair
26,021,107 UART: [art] Store priv key in slot 0x5
29,263,158 UART: [art] Derive Key Pair - Done
29,276,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,894 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,406 UART: [art] PUB.X = F0FFBD7216C5EE776270578ACF17F6257DEBB45007C89FBD325EDE4D33009DBE3219D0B05097829A8E9D13AB353B921C
31,564,678 UART: [art] PUB.Y = 132635C0BDE6DB9D9023B0B1AF74B72EB517ED204DBBFBD38B2BB076C876ABB87B2D45FD219082102F978848740EB71A
31,571,964 UART: [art] SIG.R = 07D35EA54AB060FDEE9852DB1AE724E72EFE3F3E976A578EAECD6817E434CCF9C8E3FFBE8038991CE104C0068F950384
31,579,353 UART: [art] SIG.S = 866CDEFE7BAE582CA391482A7926977268E6B83689BE628AFA5F46010AAE199758381B858DA6305AA1CA405D1A4267C2
32,885,404 UART: Caliptra RT
32,886,104 UART: [state] CFI Enabled
33,020,221 UART: [rt] RT listening for mailbox commands...
33,022,178 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,052,930 UART: [rt]cmd =0x44504543, len=96
38,738,410 >>> mbox cmd response data (6236 bytes)
38,767,634 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,797,969 UART: [rt]cmd =0x52564348, len=36
38,801,162 >>> mbox cmd response data (8 bytes)
38,801,589 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,831,595 UART: [rt]cmd =0x52564348, len=36
38,833,562 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
4,126,738 ready_for_fw is high
4,127,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,161,921 >>> mbox cmd response: success
23,802,651 UART:
23,803,066 UART: Running Caliptra FMC ...
23,804,180 UART:
23,804,330 UART: [state] CFI Enabled
23,812,286 UART: [fht] FMC Alias Private Key: 7
26,153,021 UART: [art] Extend RT PCRs Done
26,154,263 UART: [art] Lock RT PCRs Done
26,155,755 UART: [art] Populate DV Done
26,161,181 UART: [fht] FMC Alias Private Key: 7
26,162,827 UART: [art] Derive CDI
26,163,558 UART: [art] Store in slot 0x4
26,206,633 UART: [art] Derive Key Pair
26,207,625 UART: [art] Store priv key in slot 0x5
29,449,367 UART: [art] Derive Key Pair - Done
29,462,225 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,742,108 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,608 UART: [art] PUB.X = 80BC1623A375A1459F9EA322FBDFA01E39304719DACA8D5E98245776682A2BF0D1B98242EDF5370AF843280840B76873
31,750,928 UART: [art] PUB.Y = B175A52024868CDBD38BCAC9ED86DE7BF9F6C567C49724DD4B3A4DC26B2724354420AE0DBC9F75F1A75379B69DB8F887
31,758,192 UART: [art] SIG.R = 201625F55D2CEAC0BB38D41973873E40F1A3DD0E1B6A238AD1A8BDBD1D8816E6D1D3FA2A2D379AB860EA08154AA95CA6
31,765,588 UART: [art] SIG.S = F58EE61E1036D5916988DA0CC373EAB228591248F42EABBCFE4DD8172E25FBA8BC844738F91C9183F86174D664A1E27C
33,070,480 UART: Caliptra RT
33,071,192 UART: [state] CFI Enabled
33,204,473 UART: [rt] RT listening for mailbox commands...
33,206,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,237,107 UART: [rt]cmd =0x44504543, len=96
38,921,133 >>> mbox cmd response data (6236 bytes)
38,950,423 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,980,701 UART: [rt]cmd =0x52564348, len=36
38,983,944 >>> mbox cmd response data (8 bytes)
38,984,354 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,014,599 UART: [rt]cmd =0x52564348, len=36
39,016,725 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
192,090 UART:
192,483 UART: Running Caliptra ROM ...
193,577 UART:
193,719 UART: [state] CFI Enabled
264,921 UART: [state] LifecycleState = Unprovisioned
266,832 UART: [state] DebugLocked = No
269,417 UART: [state] WD Timer not started. Device not locked for debugging
273,098 UART: [kat] SHA2-256
452,790 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,526 UART: [kat] ++
464,124 UART: [kat] sha1
474,999 UART: [kat] SHA2-256
477,643 UART: [kat] SHA2-384
482,992 UART: [kat] SHA2-512-ACC
485,356 UART: [kat] ECC-384
2,947,137 UART: [kat] HMAC-384Kdf
2,971,529 UART: [kat] LMS
3,448,018 UART: [kat] --
3,453,360 UART: [cold-reset] ++
3,455,861 UART: [fht] FHT @ 0x50003400
3,466,301 UART: [idev] ++
3,466,864 UART: [idev] CDI.KEYID = 6
3,467,811 UART: [idev] SUBJECT.KEYID = 7
3,469,044 UART: [idev] UDS.KEYID = 0
3,469,941 ready_for_fw is high
3,470,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,595 UART: [idev] Erasing UDS.KEYID = 0
5,987,225 UART: [idev] Sha1 KeyId Algorithm
6,011,200 UART: [idev] --
6,017,416 UART: [ldev] ++
6,018,035 UART: [ldev] CDI.KEYID = 6
6,018,956 UART: [ldev] SUBJECT.KEYID = 5
6,020,118 UART: [ldev] AUTHORITY.KEYID = 7
6,021,423 UART: [ldev] FE.KEYID = 1
6,058,313 UART: [ldev] Erasing FE.KEYID = 1
8,565,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,638 UART: [ldev] --
10,376,709 UART: [fwproc] Wait for Commands...
10,378,425 UART: [fwproc] Recv command 0x46574c44
10,380,458 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,405 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,350 >>> mbox cmd response: success
14,344,878 UART: [afmc] ++
14,345,513 UART: [afmc] CDI.KEYID = 6
14,346,426 UART: [afmc] SUBJECT.KEYID = 7
14,347,642 UART: [afmc] AUTHORITY.KEYID = 5
16,876,392 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,776 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,955 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,838 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,424 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,757 UART: [afmc] --
18,697,374 UART: [cold-reset] --
18,701,773 UART: [state] Locking Datavault
18,706,581 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,328 UART: [state] Locking ICCM
18,710,899 UART: [exit] Launching FMC @ 0x40000130
18,719,341 UART:
18,719,589 UART: Running Caliptra FMC ...
18,720,689 UART:
18,720,845 UART: [state] CFI Enabled
18,774,108 UART: [fht] FMC Alias Private Key: 7
20,540,511 UART: [art] Extend RT PCRs Done
20,541,727 UART: [art] Lock RT PCRs Done
20,543,486 UART: [art] Populate DV Done
20,549,218 UART: [fht] FMC Alias Private Key: 7
20,550,870 UART: [art] Derive CDI
20,551,682 UART: [art] Store in slot 0x4
20,606,719 UART: [art] Derive Key Pair
20,607,753 UART: [art] Store priv key in slot 0x5
23,071,242 UART: [art] Derive Key Pair - Done
23,084,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,396 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,901 UART: [art] PUB.X = 7990AE0A6BCBB6F27F3BC8BD3AE6DF5D5551FAB50416F3EF3CE5CC0597A45B0AF16550677B276F7ABF32F2B69993970D
24,805,230 UART: [art] PUB.Y = CF0AEA22DF880AFF2C2304A21503649155B04DB93AA07C188769AC80CAAE824792515FC5D9C117A85B8EA5395C1CD162
24,812,465 UART: [art] SIG.R = 5601198A7B6DEBFB78932AA1FF0CB08A0CD7BD73BB26F25CB849F77393A393D9D5E4F6B49835F5AE920028DCB0201E0C
24,819,892 UART: [art] SIG.S = 66D66376B7364AFA6D4B6BB6015F0353A3C6A4A7E9330103A21660329D17738A6028B81C5532AEAE3DCCEB6B44D1E1FC
25,798,252 UART: Caliptra RT
25,798,952 UART: [state] CFI Enabled
25,978,491 UART: [rt] RT listening for mailbox commands...
25,980,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,011,102 UART: [rt]cmd =0x44504543, len=96
30,385,817 >>> mbox cmd response data (6236 bytes)
30,415,079 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,445,061 UART: [rt]cmd =0x52564348, len=36
30,448,019 >>> mbox cmd response data (8 bytes)
30,448,464 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,478,551 UART: [rt]cmd =0x52564348, len=36
30,480,354 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,462,192 ready_for_fw is high
3,462,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,793 >>> mbox cmd response: success
18,515,660 UART:
18,516,056 UART: Running Caliptra FMC ...
18,517,220 UART:
18,517,388 UART: [state] CFI Enabled
18,583,131 UART: [fht] FMC Alias Private Key: 7
20,349,832 UART: [art] Extend RT PCRs Done
20,351,060 UART: [art] Lock RT PCRs Done
20,353,009 UART: [art] Populate DV Done
20,358,339 UART: [fht] FMC Alias Private Key: 7
20,359,920 UART: [art] Derive CDI
20,360,746 UART: [art] Store in slot 0x4
20,415,726 UART: [art] Derive Key Pair
20,416,718 UART: [art] Store priv key in slot 0x5
22,879,308 UART: [art] Derive Key Pair - Done
22,892,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,508 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,019 UART: [art] PUB.X = 2574496C004C23FD109FB90528D7A2B78F9FAD4E2B0B101CD2019D8B99FA3D68883066A15A457A520AF813039AE92B92
24,613,282 UART: [art] PUB.Y = 6D18352BEC2CE5BF7992389BE89269BC84BD3B8E92B6C605873E0051FC9C7F9E6341513CE5FA96557B27DB11C75E4919
24,620,470 UART: [art] SIG.R = 33E57C5EDB348DCEF273DC25A350359ABA5AF8401FBD4ACEDFA5DF5655B25D08BE9054AC102847317A48DBFBB5923C3E
24,627,927 UART: [art] SIG.S = 73B35BE7158A4B3E99AD2F82D77C3B3F8AE4C7BB2E696AC6B21934DD74C160388892EFA050BBD1072E3D3A30FFA03176
25,606,801 UART: Caliptra RT
25,607,503 UART: [state] CFI Enabled
25,788,381 UART: [rt] RT listening for mailbox commands...
25,790,307 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,820,706 UART: [rt]cmd =0x44504543, len=96
30,195,752 >>> mbox cmd response data (6236 bytes)
30,225,103 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,255,169 UART: [rt]cmd =0x52564348, len=36
30,258,147 >>> mbox cmd response data (8 bytes)
30,258,581 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,288,373 UART: [rt]cmd =0x52564348, len=36
30,290,492 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
192,439 UART:
192,798 UART: Running Caliptra ROM ...
193,971 UART:
603,458 UART: [state] CFI Enabled
618,898 UART: [state] LifecycleState = Unprovisioned
620,772 UART: [state] DebugLocked = No
623,653 UART: [state] WD Timer not started. Device not locked for debugging
627,407 UART: [kat] SHA2-256
807,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,878 UART: [kat] ++
818,328 UART: [kat] sha1
829,346 UART: [kat] SHA2-256
832,109 UART: [kat] SHA2-384
837,002 UART: [kat] SHA2-512-ACC
839,316 UART: [kat] ECC-384
3,284,319 UART: [kat] HMAC-384Kdf
3,295,478 UART: [kat] LMS
3,771,991 UART: [kat] --
3,777,332 UART: [cold-reset] ++
3,779,978 UART: [fht] FHT @ 0x50003400
3,791,401 UART: [idev] ++
3,792,001 UART: [idev] CDI.KEYID = 6
3,792,895 UART: [idev] SUBJECT.KEYID = 7
3,794,214 UART: [idev] UDS.KEYID = 0
3,795,113 ready_for_fw is high
3,795,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,993 UART: [idev] Erasing UDS.KEYID = 0
6,267,374 UART: [idev] Sha1 KeyId Algorithm
6,291,466 UART: [idev] --
6,296,036 UART: [ldev] ++
6,296,624 UART: [ldev] CDI.KEYID = 6
6,297,528 UART: [ldev] SUBJECT.KEYID = 5
6,298,744 UART: [ldev] AUTHORITY.KEYID = 7
6,299,982 UART: [ldev] FE.KEYID = 1
6,311,954 UART: [ldev] Erasing FE.KEYID = 1
8,790,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,087 UART: [ldev] --
10,582,323 UART: [fwproc] Wait for Commands...
10,585,601 UART: [fwproc] Recv command 0x46574c44
10,587,639 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,623 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,571 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,622 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,731 >>> mbox cmd response: success
14,552,428 UART: [afmc] ++
14,553,091 UART: [afmc] CDI.KEYID = 6
14,553,983 UART: [afmc] SUBJECT.KEYID = 7
14,555,201 UART: [afmc] AUTHORITY.KEYID = 5
17,056,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,681 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,526 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,610 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,177 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,547 UART: [afmc] --
18,858,250 UART: [cold-reset] --
18,861,415 UART: [state] Locking Datavault
18,868,341 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,041 UART: [state] Locking ICCM
18,872,436 UART: [exit] Launching FMC @ 0x40000130
18,880,844 UART:
18,881,086 UART: Running Caliptra FMC ...
18,882,194 UART:
18,882,353 UART: [state] CFI Enabled
18,890,349 UART: [fht] FMC Alias Private Key: 7
20,656,846 UART: [art] Extend RT PCRs Done
20,658,061 UART: [art] Lock RT PCRs Done
20,659,582 UART: [art] Populate DV Done
20,664,997 UART: [fht] FMC Alias Private Key: 7
20,666,481 UART: [art] Derive CDI
20,667,241 UART: [art] Store in slot 0x4
20,710,162 UART: [art] Derive Key Pair
20,711,206 UART: [art] Store priv key in slot 0x5
23,138,443 UART: [art] Derive Key Pair - Done
23,151,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,462 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,976 UART: [art] PUB.X = 84F710E50F3BB230F7E412F5A39B03BEF7D6E82FFC4B3085946011BFDA77ACF2C8F926729A786B6D32D08053550513AF
24,866,222 UART: [art] PUB.Y = 11BA0C881A6B53652537CD50DC9CB419EB7C2D13DA83A168320F7B9E32C5185B4229C01EA7E8C0345FCD8944D3AA4FD6
24,873,510 UART: [art] SIG.R = C1B0DC885CC95DCE3D8D8322D898BE5550477836C034340E7DC278F1E21B424CD85685A6B949A04307AD3590B0C8143C
24,880,904 UART: [art] SIG.S = EAB4C72EF39F4BF8E258DA767A65C9C2B0F443F9245C1FC1D960863C9B1015FDAB26B45354134FBB616DE00CB418F341
25,859,680 UART: Caliptra RT
25,860,390 UART: [state] CFI Enabled
25,992,426 UART: [rt] RT listening for mailbox commands...
25,994,345 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,024,880 UART: [rt]cmd =0x44504543, len=96
30,321,030 >>> mbox cmd response data (6236 bytes)
30,350,237 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,380,317 UART: [rt]cmd =0x52564348, len=36
30,383,546 >>> mbox cmd response data (8 bytes)
30,383,994 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,414,174 UART: [rt]cmd =0x52564348, len=36
30,416,170 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,779,951 ready_for_fw is high
3,780,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,288 >>> mbox cmd response: success
18,706,303 UART:
18,706,715 UART: Running Caliptra FMC ...
18,707,828 UART:
18,707,985 UART: [state] CFI Enabled
18,716,102 UART: [fht] FMC Alias Private Key: 7
20,482,387 UART: [art] Extend RT PCRs Done
20,483,610 UART: [art] Lock RT PCRs Done
20,485,320 UART: [art] Populate DV Done
20,490,532 UART: [fht] FMC Alias Private Key: 7
20,492,127 UART: [art] Derive CDI
20,492,866 UART: [art] Store in slot 0x4
20,535,524 UART: [art] Derive Key Pair
20,536,564 UART: [art] Store priv key in slot 0x5
22,963,705 UART: [art] Derive Key Pair - Done
22,976,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,739 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,243 UART: [art] PUB.X = D1D64954F2625EDF705855CE50D6603DDCE98349787A7E3D10D99C5EC11F9E62FE39A74EA35199E1B6EF5938165C9466
24,691,533 UART: [art] PUB.Y = 3FD073914EBB98F6D410DF1ED839BE28D9EC1EE53B875F76456E111EC8732B325EA4BD6679493380BEA0058E3E8C1591
24,698,773 UART: [art] SIG.R = 6F7446D03C2631A875DBC8B72314EB88C578128D97206B230ACFCF87016C1E48EFB0594978E666012246A177A3C45998
24,706,125 UART: [art] SIG.S = 350E3B99D8E3F30893308EA6C9393C4C922EED22774D5D27C62C5C5092B49DCC13B45359127AE6B14617B4EB4840022D
25,685,413 UART: Caliptra RT
25,686,121 UART: [state] CFI Enabled
25,819,453 UART: [rt] RT listening for mailbox commands...
25,821,379 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,851,925 UART: [rt]cmd =0x44504543, len=96
30,147,566 >>> mbox cmd response data (6236 bytes)
30,176,721 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,206,988 UART: [rt]cmd =0x52564348, len=36
30,209,800 >>> mbox cmd response data (8 bytes)
30,210,215 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,240,315 UART: [rt]cmd =0x52564348, len=36
30,242,215 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,955 UART:
192,323 UART: Running Caliptra ROM ...
193,617 UART:
193,793 UART: [state] CFI Enabled
266,608 UART: [state] LifecycleState = Unprovisioned
269,019 UART: [state] DebugLocked = No
271,617 UART: [state] WD Timer not started. Device not locked for debugging
276,365 UART: [kat] SHA2-256
466,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,023 UART: [kat] ++
477,556 UART: [kat] sha1
489,289 UART: [kat] SHA2-256
492,289 UART: [kat] SHA2-384
498,201 UART: [kat] SHA2-512-ACC
500,775 UART: [kat] ECC-384
2,946,105 UART: [kat] HMAC-384Kdf
2,970,913 UART: [kat] LMS
3,502,698 UART: [kat] --
3,507,095 UART: [cold-reset] ++
3,508,631 UART: [fht] FHT @ 0x50003400
3,520,313 UART: [idev] ++
3,521,016 UART: [idev] CDI.KEYID = 6
3,522,016 UART: [idev] SUBJECT.KEYID = 7
3,523,187 UART: [idev] UDS.KEYID = 0
3,524,110 ready_for_fw is high
3,524,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,460 UART: [idev] Erasing UDS.KEYID = 0
6,041,859 UART: [idev] Sha1 KeyId Algorithm
6,065,470 UART: [idev] --
6,070,649 UART: [ldev] ++
6,071,325 UART: [ldev] CDI.KEYID = 6
6,072,237 UART: [ldev] SUBJECT.KEYID = 5
6,073,448 UART: [ldev] AUTHORITY.KEYID = 7
6,074,626 UART: [ldev] FE.KEYID = 1
6,113,134 UART: [ldev] Erasing FE.KEYID = 1
8,618,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,356,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,023 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,267 UART: [ldev] --
10,427,823 UART: [fwproc] Wait for Commands...
10,430,896 UART: [fwproc] Recv command 0x46574c44
10,433,201 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,842 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,409 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,882 >>> mbox cmd response: success
14,685,113 UART: [afmc] ++
14,685,837 UART: [afmc] CDI.KEYID = 6
14,687,000 UART: [afmc] SUBJECT.KEYID = 7
14,688,522 UART: [afmc] AUTHORITY.KEYID = 5
17,228,583 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,970,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,972,876 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,987,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,003,075 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,018,002 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,042,374 UART: [afmc] --
19,045,913 UART: [cold-reset] --
19,051,341 UART: [state] Locking Datavault
19,057,891 UART: [state] Locking PCR0, PCR1 and PCR31
19,060,034 UART: [state] Locking ICCM
19,061,757 UART: [exit] Launching FMC @ 0x40000130
19,070,432 UART:
19,070,668 UART: Running Caliptra FMC ...
19,071,692 UART:
19,071,859 UART: [state] CFI Enabled
19,127,406 UART: [fht] FMC Alias Private Key: 7
20,894,295 UART: [art] Extend RT PCRs Done
20,895,516 UART: [art] Lock RT PCRs Done
20,897,218 UART: [art] Populate DV Done
20,902,681 UART: [fht] FMC Alias Private Key: 7
20,904,201 UART: [art] Derive CDI
20,904,939 UART: [art] Store in slot 0x4
20,960,452 UART: [art] Derive Key Pair
20,961,447 UART: [art] Store priv key in slot 0x5
23,424,562 UART: [art] Derive Key Pair - Done
23,437,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,151,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,152,804 UART: [art] PUB.X = 08BAFB996FCB18AACE89164AFDBD67E2946118DF162B8B0E231CA3194FBA9AA8C0EABDD44F13206883F74917656CE4C3
25,160,117 UART: [art] PUB.Y = 01B7417C688B882628E56947F936142EA7B8B137D9456D7FD063508564A5833F1CFE299A10FB590D11945BAE584B82EF
25,167,349 UART: [art] SIG.R = EB6A4F4DC75F3502DB02CFCA9EB0136BB4F859CE225EE183CB606C71524B0CE061D32D2D58F28FD9BC37AE071EFE5805
25,174,768 UART: [art] SIG.S = 2C6B1E452C0252078AFD8ED9553F95EB1E4CCB602E3B549DF456FAFEBA7EA1EFED52FBC52F3B7322D4E8D2099DB71065
26,153,304 UART: Caliptra RT
26,154,012 UART: [state] CFI Enabled
26,334,529 UART: [rt] RT listening for mailbox commands...
26,336,470 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,367,018 UART: [rt]cmd =0x44504543, len=96
30,743,088 >>> mbox cmd response data (6236 bytes)
30,772,483 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,802,533 UART: [rt]cmd =0x52564348, len=36
30,805,558 >>> mbox cmd response data (8 bytes)
30,805,994 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,835,923 UART: [rt]cmd =0x52564348, len=36
30,837,933 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,416,411 ready_for_fw is high
3,416,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,014 >>> mbox cmd response: success
19,093,203 UART:
19,093,599 UART: Running Caliptra FMC ...
19,094,789 UART:
19,094,965 UART: [state] CFI Enabled
19,159,060 UART: [fht] FMC Alias Private Key: 7
20,925,084 UART: [art] Extend RT PCRs Done
20,926,314 UART: [art] Lock RT PCRs Done
20,928,000 UART: [art] Populate DV Done
20,933,318 UART: [fht] FMC Alias Private Key: 7
20,934,861 UART: [art] Derive CDI
20,935,673 UART: [art] Store in slot 0x4
20,992,068 UART: [art] Derive Key Pair
20,993,113 UART: [art] Store priv key in slot 0x5
23,455,893 UART: [art] Derive Key Pair - Done
23,468,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,182,076 UART: [art] Erasing AUTHORITY.KEYID = 7
25,183,750 UART: [art] PUB.X = ED4C90CDBD539AA23F5F9FDBAD8A826B97D8510286B121EC17FFDFD3D2EA322A83D50810A9A3F307D138D7D70CB3D2AB
25,190,853 UART: [art] PUB.Y = FCD891AD3A5287B7EC00CBCA44BCF7F8B0E3D6BCCA0A65AC4EF554F357F239D694AA9B20ED1254CC501322E1E9E0F63B
25,198,137 UART: [art] SIG.R = 6436F7A44EC7AF1F1EC2C8797B1D40BF6C3223C9966CCA485EA771193CE35C54DBCEF3B7F38CAAB79F5DB9051416D20A
25,205,553 UART: [art] SIG.S = 1D7B1807C3C9613465F6F4F396925D1B2089973668742D76237495338D6CEE52541121CFEA8026E7E7F3AA0A77BE49F6
26,183,927 UART: Caliptra RT
26,184,618 UART: [state] CFI Enabled
26,365,065 UART: [rt] RT listening for mailbox commands...
26,366,996 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,759 UART: [rt]cmd =0x44504543, len=96
30,773,982 >>> mbox cmd response data (6236 bytes)
30,803,280 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,833,345 UART: [rt]cmd =0x52564348, len=36
30,836,378 >>> mbox cmd response data (8 bytes)
30,836,794 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,866,907 UART: [rt]cmd =0x52564348, len=36
30,868,908 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,502 UART:
192,863 UART: Running Caliptra ROM ...
194,070 UART:
603,687 UART: [state] CFI Enabled
621,861 UART: [state] LifecycleState = Unprovisioned
624,207 UART: [state] DebugLocked = No
626,383 UART: [state] WD Timer not started. Device not locked for debugging
631,152 UART: [kat] SHA2-256
821,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,754 UART: [kat] ++
832,308 UART: [kat] sha1
844,960 UART: [kat] SHA2-256
847,971 UART: [kat] SHA2-384
854,622 UART: [kat] SHA2-512-ACC
857,220 UART: [kat] ECC-384
3,299,659 UART: [kat] HMAC-384Kdf
3,311,960 UART: [kat] LMS
3,843,782 UART: [kat] --
3,847,155 UART: [cold-reset] ++
3,849,658 UART: [fht] FHT @ 0x50003400
3,860,791 UART: [idev] ++
3,861,430 UART: [idev] CDI.KEYID = 6
3,862,467 UART: [idev] SUBJECT.KEYID = 7
3,863,649 UART: [idev] UDS.KEYID = 0
3,864,579 ready_for_fw is high
3,864,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,618 UART: [idev] Erasing UDS.KEYID = 0
6,341,712 UART: [idev] Sha1 KeyId Algorithm
6,363,469 UART: [idev] --
6,367,481 UART: [ldev] ++
6,368,174 UART: [ldev] CDI.KEYID = 6
6,369,094 UART: [ldev] SUBJECT.KEYID = 5
6,370,258 UART: [ldev] AUTHORITY.KEYID = 7
6,371,492 UART: [ldev] FE.KEYID = 1
6,381,871 UART: [ldev] Erasing FE.KEYID = 1
8,860,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,093 UART: [ldev] --
10,648,931 UART: [fwproc] Wait for Commands...
10,651,293 UART: [fwproc] Recv command 0x46574c44
10,653,601 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,251 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,340 >>> mbox cmd response: success
14,913,187 UART: [afmc] ++
14,913,918 UART: [afmc] CDI.KEYID = 6
14,915,122 UART: [afmc] SUBJECT.KEYID = 7
14,916,574 UART: [afmc] AUTHORITY.KEYID = 5
17,419,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,178 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,266 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,952 UART: [afmc] --
19,216,795 UART: [cold-reset] --
19,220,996 UART: [state] Locking Datavault
19,225,538 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,704 UART: [state] Locking ICCM
19,230,247 UART: [exit] Launching FMC @ 0x40000130
19,238,886 UART:
19,239,122 UART: Running Caliptra FMC ...
19,240,226 UART:
19,240,385 UART: [state] CFI Enabled
19,248,381 UART: [fht] FMC Alias Private Key: 7
21,014,971 UART: [art] Extend RT PCRs Done
21,016,191 UART: [art] Lock RT PCRs Done
21,017,798 UART: [art] Populate DV Done
21,023,322 UART: [fht] FMC Alias Private Key: 7
21,024,849 UART: [art] Derive CDI
21,025,595 UART: [art] Store in slot 0x4
21,068,250 UART: [art] Derive Key Pair
21,069,258 UART: [art] Store priv key in slot 0x5
23,496,113 UART: [art] Derive Key Pair - Done
23,509,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,215,495 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,001 UART: [art] PUB.X = CC08E028E45E5833CA14C1349EA63788C5138B35E11472F37900DFF32CCF159D3754D006D917F3BC5F5658DC50042A04
25,224,218 UART: [art] PUB.Y = F894A391CB676110E88140CEC875E9CD956461297EB80E98233206593A2A0A20E61DBE0C8158715334BAD894BBC48183
25,231,420 UART: [art] SIG.R = 83D34A139A6084D73BB9D27FEFF654AD47C524B1C35E9EB43EAC5A0BDE6A32B7FF4849A30501FC54AD387BFC2436A53E
25,238,844 UART: [art] SIG.S = 9BCC9EF370650DC360498A4DAA084AB7F2BEC740F8D1F35584CBAA97DA046D330FFC922C3CDCAABE1994E3C1DFC6AE2E
26,217,747 UART: Caliptra RT
26,218,466 UART: [state] CFI Enabled
26,351,260 UART: [rt] RT listening for mailbox commands...
26,353,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,383,804 UART: [rt]cmd =0x44504543, len=96
30,680,091 >>> mbox cmd response data (6236 bytes)
30,709,399 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,739,198 UART: [rt]cmd =0x52564348, len=36
30,742,178 >>> mbox cmd response data (8 bytes)
30,742,632 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,772,713 UART: [rt]cmd =0x52564348, len=36
30,774,797 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
3,755,718 ready_for_fw is high
3,756,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,146 >>> mbox cmd response: success
19,301,338 UART:
19,301,724 UART: Running Caliptra FMC ...
19,302,928 UART:
19,303,123 UART: [state] CFI Enabled
19,310,754 UART: [fht] FMC Alias Private Key: 7
21,077,337 UART: [art] Extend RT PCRs Done
21,078,576 UART: [art] Lock RT PCRs Done
21,080,324 UART: [art] Populate DV Done
21,085,815 UART: [fht] FMC Alias Private Key: 7
21,087,316 UART: [art] Derive CDI
21,088,089 UART: [art] Store in slot 0x4
21,130,913 UART: [art] Derive Key Pair
21,131,963 UART: [art] Store priv key in slot 0x5
23,558,604 UART: [art] Derive Key Pair - Done
23,572,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,797 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,314 UART: [art] PUB.X = 22F2B6B9CC41488D48A70F9842A45DEF70C3DA38F7D778995C3B618043F6A8D677600B20A90A30BE854A60CAB8DF790E
25,287,525 UART: [art] PUB.Y = 8ADBECBBF68651D1C52C85B5C468B116435E2E43C1B6EE9DAA51CFBAFE64D9E399E6D9DF46C195A236ED52C9DE26BE81
25,294,843 UART: [art] SIG.R = 25315FF3E9199D4820AFAC02D12BD573E54CAC7F3C30E0C9508A3AEDC80111B301B7C48EAD1BD0598C7B2A8052C5E493
25,302,231 UART: [art] SIG.S = 0F197F7626006D5F8BB522DD03A8FA833A8443BFFBE37CF6037BE17F186E44C617D4EF84DF457E75D31FAF804001455D
26,281,359 UART: Caliptra RT
26,282,075 UART: [state] CFI Enabled
26,414,988 UART: [rt] RT listening for mailbox commands...
26,416,927 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,447,638 UART: [rt]cmd =0x44504543, len=96
30,742,960 >>> mbox cmd response data (6236 bytes)
30,772,091 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,802,286 UART: [rt]cmd =0x52564348, len=36
30,805,302 >>> mbox cmd response data (8 bytes)
30,805,735 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,835,869 UART: [rt]cmd =0x52564348, len=36
30,838,064 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,656 UART: [state] LifecycleState = Unprovisioned
85,311 UART: [state] DebugLocked = No
85,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,423 UART: [kat] SHA2-256
881,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,469 UART: [kat] ++
885,621 UART: [kat] sha1
889,837 UART: [kat] SHA2-256
891,775 UART: [kat] SHA2-384
894,304 UART: [kat] SHA2-512-ACC
896,205 UART: [kat] ECC-384
901,742 UART: [kat] HMAC-384Kdf
906,358 UART: [kat] LMS
1,474,554 UART: [kat] --
1,475,425 UART: [cold-reset] ++
1,475,933 UART: [fht] Storing FHT @ 0x50003400
1,478,834 UART: [idev] ++
1,479,002 UART: [idev] CDI.KEYID = 6
1,479,362 UART: [idev] SUBJECT.KEYID = 7
1,479,786 UART: [idev] UDS.KEYID = 0
1,480,131 ready_for_fw is high
1,480,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,802 UART: [idev] Erasing UDS.KEYID = 0
1,504,554 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,200 UART: [idev] --
1,514,105 UART: [ldev] ++
1,514,273 UART: [ldev] CDI.KEYID = 6
1,514,636 UART: [ldev] SUBJECT.KEYID = 5
1,515,062 UART: [ldev] AUTHORITY.KEYID = 7
1,515,525 UART: [ldev] FE.KEYID = 1
1,520,833 UART: [ldev] Erasing FE.KEYID = 1
1,546,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,575 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,291 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,068 UART: [ldev] --
1,585,583 UART: [fwproc] Waiting for Commands...
1,586,404 UART: [fwproc] Received command 0x46574c44
1,587,195 UART: [fwproc] Received Image of size 118548 bytes
2,930,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,956,941 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,568 >>> mbox cmd response: success
3,129,642 UART: [afmc] ++
3,129,810 UART: [afmc] CDI.KEYID = 6
3,130,172 UART: [afmc] SUBJECT.KEYID = 7
3,130,597 UART: [afmc] AUTHORITY.KEYID = 5
3,165,936 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,152 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,641 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,524 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,207 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,139 UART: [afmc] --
3,209,091 UART: [cold-reset] --
3,210,021 UART: [state] Locking Datavault
3,211,336 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,940 UART: [state] Locking ICCM
3,212,448 UART: [exit] Launching FMC @ 0x40000130
3,217,778 UART:
3,217,794 UART: Running Caliptra FMC ...
3,218,202 UART:
3,218,256 UART: [state] CFI Enabled
3,228,456 UART: [fht] FMC Alias Private Key: 7
3,347,230 UART: [art] Extend RT PCRs Done
3,347,658 UART: [art] Lock RT PCRs Done
3,349,044 UART: [art] Populate DV Done
3,357,091 UART: [fht] FMC Alias Private Key: 7
3,358,235 UART: [art] Derive CDI
3,358,515 UART: [art] Store in slot 0x4
3,443,917 UART: [art] Derive Key Pair
3,444,277 UART: [art] Store priv key in slot 0x5
3,457,032 UART: [art] Derive Key Pair - Done
3,471,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,251 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,016 UART: [art] PUB.X = 67BA2EAF6C26AFA291617E872D5EA2C46771D50AF93A50B4ED486A8357CD5126806004227754DBC1FD8A3E061A9A42FC
3,494,785 UART: [art] PUB.Y = 8AC83EAC61ED7D6DDE73AFE66DE59F926074BEFFE99ECCC68BDF15F8571B3DFF90F8EA954DB37A97C8EBC678E27ED0E1
3,501,769 UART: [art] SIG.R = C3A202E31B4EC21F1A6AED16C51F62E50CA0C979AD375FDF1EBAE729E0A561B00B4B7879F78F86CA350ABEC60CAB353B
3,508,548 UART: [art] SIG.S = 48B7C48FDE96527FCE9CD220FA7FBC88E3929D01CCE65CF89E3BD1C958555AD7B198870C7807060BC1CFD8AB1E43AC9E
3,532,127 UART: Caliptra RT
3,532,378 UART: [state] CFI Enabled
3,652,166 UART: [rt] RT listening for mailbox commands...
3,652,836 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,683,372 UART: [rt]cmd =0x44504543, len=96
3,876,211 >>> mbox cmd response data (6236 bytes)
3,876,212 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,905,663 UART: [rt]cmd =0x52564348, len=36
3,908,313 >>> mbox cmd response data (8 bytes)
3,908,314 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,937,797 UART: [rt]cmd =0x52564348, len=36
3,939,516 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,039 ready_for_fw is high
1,362,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,492 >>> mbox cmd response: success
3,039,387 UART:
3,039,403 UART: Running Caliptra FMC ...
3,039,811 UART:
3,039,865 UART: [state] CFI Enabled
3,050,417 UART: [fht] FMC Alias Private Key: 7
3,169,257 UART: [art] Extend RT PCRs Done
3,169,685 UART: [art] Lock RT PCRs Done
3,171,409 UART: [art] Populate DV Done
3,179,406 UART: [fht] FMC Alias Private Key: 7
3,180,496 UART: [art] Derive CDI
3,180,776 UART: [art] Store in slot 0x4
3,266,576 UART: [art] Derive Key Pair
3,266,936 UART: [art] Store priv key in slot 0x5
3,279,809 UART: [art] Derive Key Pair - Done
3,294,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,309,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,310,635 UART: [art] PUB.X = D1E8554276947BF8D36DA86888B78022D3ED678F965AFF4E1896B4EB85C48A0C696C0A1F953765A60A2A7E277E2C0673
3,317,393 UART: [art] PUB.Y = 9405264135814E15D5BCE2BBDA5680E9E4042C580A7CD4235287ED8EA3FD27B36307BD640665E7B2E27702CC9077714B
3,324,323 UART: [art] SIG.R = 1004D77C16A8DF3FD9BE4D18A99E476D8DB449A7332955C85F571683082551301E945722975A1C381521D56C1A7F4702
3,331,072 UART: [art] SIG.S = 04F65EB2781BEBA7A984523E5BFC3A38F016713D90D7BAEF2FAF40809B28ABA8046CFD3F2D25FD53F8E63F6FD195E3DB
3,354,852 UART: Caliptra RT
3,355,103 UART: [state] CFI Enabled
3,475,364 UART: [rt] RT listening for mailbox commands...
3,476,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,420 UART: [rt]cmd =0x44504543, len=96
3,697,978 >>> mbox cmd response data (6236 bytes)
3,697,979 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,912 UART: [rt]cmd =0x52564348, len=36
3,730,708 >>> mbox cmd response data (8 bytes)
3,730,709 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,760,286 UART: [rt]cmd =0x52564348, len=36
3,762,223 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,266 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,912 UART: [kat] SHA2-256
881,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,958 UART: [kat] ++
886,110 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,043 UART: [kat] SHA2-512-ACC
896,944 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,213 UART: [kat] LMS
1,475,409 UART: [kat] --
1,476,224 UART: [cold-reset] ++
1,476,550 UART: [fht] Storing FHT @ 0x50003400
1,479,301 UART: [idev] ++
1,479,469 UART: [idev] CDI.KEYID = 6
1,479,829 UART: [idev] SUBJECT.KEYID = 7
1,480,253 UART: [idev] UDS.KEYID = 0
1,480,598 ready_for_fw is high
1,480,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,545 UART: [idev] Erasing UDS.KEYID = 0
1,505,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,762 UART: [ldev] ++
1,514,930 UART: [ldev] CDI.KEYID = 6
1,515,293 UART: [ldev] SUBJECT.KEYID = 5
1,515,719 UART: [ldev] AUTHORITY.KEYID = 7
1,516,182 UART: [ldev] FE.KEYID = 1
1,521,666 UART: [ldev] Erasing FE.KEYID = 1
1,547,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,429 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,141 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,215 UART: [ldev] --
1,586,494 UART: [fwproc] Waiting for Commands...
1,587,297 UART: [fwproc] Received command 0x46574c44
1,588,088 UART: [fwproc] Received Image of size 118548 bytes
2,932,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,186 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,811 >>> mbox cmd response: success
3,132,863 UART: [afmc] ++
3,133,031 UART: [afmc] CDI.KEYID = 6
3,133,393 UART: [afmc] SUBJECT.KEYID = 7
3,133,818 UART: [afmc] AUTHORITY.KEYID = 5
3,169,265 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,217 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,926 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,809 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,492 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,314 UART: [afmc] --
3,212,346 UART: [cold-reset] --
3,213,226 UART: [state] Locking Datavault
3,214,407 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,011 UART: [state] Locking ICCM
3,215,567 UART: [exit] Launching FMC @ 0x40000130
3,220,897 UART:
3,220,913 UART: Running Caliptra FMC ...
3,221,321 UART:
3,221,464 UART: [state] CFI Enabled
3,232,426 UART: [fht] FMC Alias Private Key: 7
3,350,752 UART: [art] Extend RT PCRs Done
3,351,180 UART: [art] Lock RT PCRs Done
3,352,664 UART: [art] Populate DV Done
3,360,889 UART: [fht] FMC Alias Private Key: 7
3,361,855 UART: [art] Derive CDI
3,362,135 UART: [art] Store in slot 0x4
3,447,557 UART: [art] Derive Key Pair
3,447,917 UART: [art] Store priv key in slot 0x5
3,461,534 UART: [art] Derive Key Pair - Done
3,476,712 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,062 UART: [art] PUB.X = A61EB950B73A53750FCA434486178F48D3D438C23E4F0950623E29CFF889A57428AA60A817186AC1A55A7A75F432AE6D
3,499,826 UART: [art] PUB.Y = FC40E14C6A4D1FA86A5874957CFC15FB6B94D6D6C85316A09DE7B18D1AACBF08656987B48ECDEAB9FE586C261AB2E178
3,506,793 UART: [art] SIG.R = 96B3E4D7880CC17DA06BD3344B6CD82C67952E717554311CDF0E3F1CCB6A3FCFDCDACEDE48AF1FB30E66FA673BDBA1A4
3,513,584 UART: [art] SIG.S = 5C422E83B5BFD77E038B76273F07170BD70B1A2C041BB876D2918B2A2F970855B0F24D4977955E08C849200D6FF79DB0
3,537,332 UART: Caliptra RT
3,537,675 UART: [state] CFI Enabled
3,658,247 UART: [rt] RT listening for mailbox commands...
3,658,917 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,471 UART: [rt]cmd =0x44504543, len=96
3,880,849 >>> mbox cmd response data (6236 bytes)
3,880,850 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,379 UART: [rt]cmd =0x52564348, len=36
3,913,305 >>> mbox cmd response data (8 bytes)
3,913,306 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,942,879 UART: [rt]cmd =0x52564348, len=36
3,944,564 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,911 >>> mbox cmd response: success
3,044,374 UART:
3,044,390 UART: Running Caliptra FMC ...
3,044,798 UART:
3,044,941 UART: [state] CFI Enabled
3,055,599 UART: [fht] FMC Alias Private Key: 7
3,175,283 UART: [art] Extend RT PCRs Done
3,175,711 UART: [art] Lock RT PCRs Done
3,177,373 UART: [art] Populate DV Done
3,185,654 UART: [fht] FMC Alias Private Key: 7
3,186,832 UART: [art] Derive CDI
3,187,112 UART: [art] Store in slot 0x4
3,273,034 UART: [art] Derive Key Pair
3,273,394 UART: [art] Store priv key in slot 0x5
3,286,779 UART: [art] Derive Key Pair - Done
3,301,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,707 UART: [art] PUB.X = 3477D1543CD6CE251AD50FF4AE1D2BC2F8969E42EB88E0EA7BFB517A0CA43151AECCC878FE73CC189A6BE9F2D49AA18E
3,324,497 UART: [art] PUB.Y = 783F57BC4C94BDACB91B145696AA9F53DD7F4FC4E990230E1BF90E1DBD25B9CEAB0064EFCFF6F5BF39CC2BEA0F2DD0CD
3,331,452 UART: [art] SIG.R = 025CD467A937F918C5C4915B8DF5AF61FA647E09258170DDEAD062C7FF5B1132F99CE623CDD25FF4B6A68AEB9356F47F
3,338,230 UART: [art] SIG.S = 6983422933D97945FB2EDF86371176B9984CEE897C1E9A00AC3BE432FC86CB174FE6B7E640258FC1B576B0B1CF3C4653
3,361,678 UART: Caliptra RT
3,362,021 UART: [state] CFI Enabled
3,482,754 UART: [rt] RT listening for mailbox commands...
3,483,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,868 UART: [rt]cmd =0x44504543, len=96
3,707,059 >>> mbox cmd response data (6236 bytes)
3,707,060 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,647 UART: [rt]cmd =0x52564348, len=36
3,739,279 >>> mbox cmd response data (8 bytes)
3,739,280 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,768,733 UART: [rt]cmd =0x52564348, len=36
3,770,560 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
891,132 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,236 UART: [kat] ++
895,388 UART: [kat] sha1
899,490 UART: [kat] SHA2-256
901,430 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
916,425 UART: [kat] HMAC-384Kdf
920,995 UART: [kat] LMS
1,169,307 UART: [kat] --
1,170,212 UART: [cold-reset] ++
1,170,662 UART: [fht] FHT @ 0x50003400
1,173,260 UART: [idev] ++
1,173,428 UART: [idev] CDI.KEYID = 6
1,173,789 UART: [idev] SUBJECT.KEYID = 7
1,174,214 UART: [idev] UDS.KEYID = 0
1,174,560 ready_for_fw is high
1,174,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,223 UART: [idev] Erasing UDS.KEYID = 0
1,199,399 UART: [idev] Sha1 KeyId Algorithm
1,208,183 UART: [idev] --
1,209,364 UART: [ldev] ++
1,209,532 UART: [ldev] CDI.KEYID = 6
1,209,896 UART: [ldev] SUBJECT.KEYID = 5
1,210,323 UART: [ldev] AUTHORITY.KEYID = 7
1,210,786 UART: [ldev] FE.KEYID = 1
1,216,008 UART: [ldev] Erasing FE.KEYID = 1
1,241,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,458 UART: [ldev] --
1,280,669 UART: [fwproc] Wait for Commands...
1,281,386 UART: [fwproc] Recv command 0x46574c44
1,282,119 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,327 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,502 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,675 >>> mbox cmd response: success
2,825,719 UART: [afmc] ++
2,825,887 UART: [afmc] CDI.KEYID = 6
2,826,250 UART: [afmc] SUBJECT.KEYID = 7
2,826,676 UART: [afmc] AUTHORITY.KEYID = 5
2,862,855 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,989 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,571 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,220 UART: [afmc] --
2,906,251 UART: [cold-reset] --
2,906,947 UART: [state] Locking Datavault
2,908,178 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,782 UART: [state] Locking ICCM
2,909,390 UART: [exit] Launching FMC @ 0x40000130
2,914,720 UART:
2,914,736 UART: Running Caliptra FMC ...
2,915,144 UART:
2,915,198 UART: [state] CFI Enabled
2,925,784 UART: [fht] FMC Alias Private Key: 7
3,044,918 UART: [art] Extend RT PCRs Done
3,045,346 UART: [art] Lock RT PCRs Done
3,047,014 UART: [art] Populate DV Done
3,055,425 UART: [fht] FMC Alias Private Key: 7
3,056,427 UART: [art] Derive CDI
3,056,707 UART: [art] Store in slot 0x4
3,142,348 UART: [art] Derive Key Pair
3,142,708 UART: [art] Store priv key in slot 0x5
3,155,778 UART: [art] Derive Key Pair - Done
3,170,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,653 UART: [art] PUB.X = CC3A87418FD6B1F0828841E81AC9405F3B6F544D8B0862A93EA59078B3ECFED26C290B44DDA1CB8A22329771FDA9FC14
3,193,429 UART: [art] PUB.Y = 9FD2423FFC88F3077EA64FDE0DE8ADFAB9AFBEB1133EE3FA1A07AA809FBACBE302300A6C0F267F7DCF6F3D0C9D5D9416
3,200,392 UART: [art] SIG.R = FCC83297B743E16E258E010563924C6007BFB2A41AE8038F6FB9737F636669F420018702160D305AA9A72A32308E767B
3,207,131 UART: [art] SIG.S = A0688A5B6E8AFC346AC22E1903AB386C0B98B80C86A77BB5B549F9268BFB72E823BCCE21871EA4FEBFAAB109C19047E5
3,230,337 UART: Caliptra RT
3,230,588 UART: [state] CFI Enabled
3,349,710 UART: [rt] RT listening for mailbox commands...
3,350,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,110 UART: [rt]cmd =0x44504543, len=96
3,572,561 >>> mbox cmd response data (6236 bytes)
3,572,562 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,065 UART: [rt]cmd =0x52564348, len=36
3,604,931 >>> mbox cmd response data (8 bytes)
3,604,932 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,634,401 UART: [rt]cmd =0x52564348, len=36
3,636,054 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,940 ready_for_fw is high
1,059,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,360 >>> mbox cmd response: success
2,741,221 UART:
2,741,237 UART: Running Caliptra FMC ...
2,741,645 UART:
2,741,699 UART: [state] CFI Enabled
2,752,087 UART: [fht] FMC Alias Private Key: 7
2,870,977 UART: [art] Extend RT PCRs Done
2,871,405 UART: [art] Lock RT PCRs Done
2,872,823 UART: [art] Populate DV Done
2,880,982 UART: [fht] FMC Alias Private Key: 7
2,882,132 UART: [art] Derive CDI
2,882,412 UART: [art] Store in slot 0x4
2,968,225 UART: [art] Derive Key Pair
2,968,585 UART: [art] Store priv key in slot 0x5
2,982,313 UART: [art] Derive Key Pair - Done
2,997,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,278 UART: [art] PUB.X = 4CDA9BCE5B985118137F3F2CA130B71EC77F4CAB87FC1963A18DD6C891C785F133B1BA4ECB0FDEB47C62E19F18846044
3,020,061 UART: [art] PUB.Y = 84273203A9A3AB08B0750B8B791928A2CFC0F274A3EEA8B6D10848B32606D3AF08DA696B57A63E887A9341DE92196EDD
3,026,997 UART: [art] SIG.R = 8D8251FDC09F965A95EA46A5A0BDAFF699A9D55865231AF16E2F8C3E66B550ABD266C90B54A9F2C17016761007C7F836
3,033,767 UART: [art] SIG.S = 0B9A3188D94479C19262F591ADA275BD210201CCA46706AB527593D9428AFFACA00541F9C2D0E87FF9E732E6EE0DD6E3
3,057,941 UART: Caliptra RT
3,058,192 UART: [state] CFI Enabled
3,178,059 UART: [rt] RT listening for mailbox commands...
3,178,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,001 UART: [rt]cmd =0x44504543, len=96
3,400,533 >>> mbox cmd response data (6236 bytes)
3,400,534 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,967 UART: [rt]cmd =0x52564348, len=36
3,432,351 >>> mbox cmd response data (8 bytes)
3,432,352 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,963 UART: [rt]cmd =0x52564348, len=36
3,463,330 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,535 UART: [kat] SHA2-256
901,475 UART: [kat] SHA2-384
904,192 UART: [kat] SHA2-512-ACC
906,093 UART: [kat] ECC-384
915,468 UART: [kat] HMAC-384Kdf
920,072 UART: [kat] LMS
1,168,384 UART: [kat] --
1,169,461 UART: [cold-reset] ++
1,169,979 UART: [fht] FHT @ 0x50003400
1,172,789 UART: [idev] ++
1,172,957 UART: [idev] CDI.KEYID = 6
1,173,318 UART: [idev] SUBJECT.KEYID = 7
1,173,743 UART: [idev] UDS.KEYID = 0
1,174,089 ready_for_fw is high
1,174,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,198,742 UART: [idev] Sha1 KeyId Algorithm
1,207,638 UART: [idev] --
1,208,813 UART: [ldev] ++
1,208,981 UART: [ldev] CDI.KEYID = 6
1,209,345 UART: [ldev] SUBJECT.KEYID = 5
1,209,772 UART: [ldev] AUTHORITY.KEYID = 7
1,210,235 UART: [ldev] FE.KEYID = 1
1,215,307 UART: [ldev] Erasing FE.KEYID = 1
1,241,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,379 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,583 UART: [ldev] --
1,280,864 UART: [fwproc] Wait for Commands...
1,281,527 UART: [fwproc] Recv command 0x46574c44
1,282,260 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,947 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,882 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,418 >>> mbox cmd response: success
2,824,504 UART: [afmc] ++
2,824,672 UART: [afmc] CDI.KEYID = 6
2,825,035 UART: [afmc] SUBJECT.KEYID = 7
2,825,461 UART: [afmc] AUTHORITY.KEYID = 5
2,861,768 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,260 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,851 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,552 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,407 UART: [afmc] --
2,905,240 UART: [cold-reset] --
2,905,948 UART: [state] Locking Datavault
2,906,679 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,283 UART: [state] Locking ICCM
2,907,885 UART: [exit] Launching FMC @ 0x40000130
2,913,215 UART:
2,913,231 UART: Running Caliptra FMC ...
2,913,639 UART:
2,913,782 UART: [state] CFI Enabled
2,924,778 UART: [fht] FMC Alias Private Key: 7
3,043,480 UART: [art] Extend RT PCRs Done
3,043,908 UART: [art] Lock RT PCRs Done
3,045,486 UART: [art] Populate DV Done
3,053,485 UART: [fht] FMC Alias Private Key: 7
3,054,459 UART: [art] Derive CDI
3,054,739 UART: [art] Store in slot 0x4
3,140,428 UART: [art] Derive Key Pair
3,140,788 UART: [art] Store priv key in slot 0x5
3,154,812 UART: [art] Derive Key Pair - Done
3,169,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,714 UART: [art] PUB.X = 1322F3AD43964B316B5642515B4B3DC55732AED59C3B88ACC04B296D13E7535D5B1F0179A61C01AA8CF6CCECC31E55A8
3,192,488 UART: [art] PUB.Y = A8E053B9681D32FE6A5EA7B2DBB94DA0676B62AD4094A09BDB3823DD80FE72EFF932BBC33CF1E3E16E16BC16118396B0
3,199,456 UART: [art] SIG.R = 552DC53C13A54486D9133FA96429B23D3A04BAC3AB43B6CE1F45AC720823188EE3C9E3C35DBEE303BB2DF6360131CE6E
3,206,226 UART: [art] SIG.S = C49B4E2988DF8390AA6FB88435E2DFE8A76D9217FED378A1C7ACB904A7AFB43A3D3B71B715E483F586820927C9245D49
3,230,074 UART: Caliptra RT
3,230,417 UART: [state] CFI Enabled
3,350,360 UART: [rt] RT listening for mailbox commands...
3,351,030 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,520 UART: [rt]cmd =0x44504543, len=96
3,573,521 >>> mbox cmd response data (6236 bytes)
3,573,522 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,911 UART: [rt]cmd =0x52564348, len=36
3,605,477 >>> mbox cmd response data (8 bytes)
3,605,478 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,635,129 UART: [rt]cmd =0x52564348, len=36
3,636,500 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,149 ready_for_fw is high
1,059,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,045 >>> mbox cmd response: success
2,743,122 UART:
2,743,138 UART: Running Caliptra FMC ...
2,743,546 UART:
2,743,689 UART: [state] CFI Enabled
2,754,417 UART: [fht] FMC Alias Private Key: 7
2,873,333 UART: [art] Extend RT PCRs Done
2,873,761 UART: [art] Lock RT PCRs Done
2,875,603 UART: [art] Populate DV Done
2,884,102 UART: [fht] FMC Alias Private Key: 7
2,885,030 UART: [art] Derive CDI
2,885,310 UART: [art] Store in slot 0x4
2,970,737 UART: [art] Derive Key Pair
2,971,097 UART: [art] Store priv key in slot 0x5
2,984,969 UART: [art] Derive Key Pair - Done
2,999,623 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,669 UART: [art] PUB.X = 7DDA7BC5A9F3622DB67AE552CEC5F97FC6EA5D112377CD11862FB2D1F4FBB6734BE7C77104166FB957CFD0E986FB0825
3,022,451 UART: [art] PUB.Y = 573A899419481E2728AF21143996D0750B8450DCCAEA4ED1D2A24F9BC359D339010DC7A93660855F5F71A71E4864FF3D
3,029,390 UART: [art] SIG.R = 341760B32E3BC3E9373DC2D10ADAA4A11127EE5ADAD2159B5DEB317CF6595453A1DB40EA85B5E028CF9978B4EAC44452
3,036,171 UART: [art] SIG.S = BF95C0B69BAE805167696B6CB36CA0FA9BAA43E6507C3B4E0A02832AFFA505E2C1CAE7A6E7D2D67E3C51C492AFDE5B20
3,060,430 UART: Caliptra RT
3,060,773 UART: [state] CFI Enabled
3,180,404 UART: [rt] RT listening for mailbox commands...
3,181,074 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,476 UART: [rt]cmd =0x44504543, len=96
3,404,537 >>> mbox cmd response data (6236 bytes)
3,404,538 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,029 UART: [rt]cmd =0x52564348, len=36
3,436,413 >>> mbox cmd response data (8 bytes)
3,436,414 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,466,265 UART: [rt]cmd =0x52564348, len=36
3,468,236 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,042 UART: [state] LifecycleState = Unprovisioned
85,697 UART: [state] DebugLocked = No
86,349 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,538 UART: [kat] SHA2-512-ACC
908,439 UART: [kat] ECC-384
917,920 UART: [kat] HMAC-384Kdf
922,410 UART: [kat] LMS
1,170,738 UART: [kat] --
1,171,645 UART: [cold-reset] ++
1,172,083 UART: [fht] FHT @ 0x50003400
1,174,734 UART: [idev] ++
1,174,902 UART: [idev] CDI.KEYID = 6
1,175,262 UART: [idev] SUBJECT.KEYID = 7
1,175,686 UART: [idev] UDS.KEYID = 0
1,176,031 ready_for_fw is high
1,176,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,410 UART: [idev] Erasing UDS.KEYID = 0
1,200,791 UART: [idev] Sha1 KeyId Algorithm
1,209,167 UART: [idev] --
1,210,411 UART: [ldev] ++
1,210,579 UART: [ldev] CDI.KEYID = 6
1,210,942 UART: [ldev] SUBJECT.KEYID = 5
1,211,368 UART: [ldev] AUTHORITY.KEYID = 7
1,211,831 UART: [ldev] FE.KEYID = 1
1,216,691 UART: [ldev] Erasing FE.KEYID = 1
1,243,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,033 UART: [ldev] --
1,282,518 UART: [fwproc] Wait for Commands...
1,283,154 UART: [fwproc] Recv command 0x46574c44
1,283,882 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,277 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,278 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,457 >>> mbox cmd response: success
2,827,583 UART: [afmc] ++
2,827,751 UART: [afmc] CDI.KEYID = 6
2,828,113 UART: [afmc] SUBJECT.KEYID = 7
2,828,538 UART: [afmc] AUTHORITY.KEYID = 5
2,864,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,508 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,256 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,965 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,848 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,549 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,301 UART: [afmc] --
2,907,323 UART: [cold-reset] --
2,908,269 UART: [state] Locking Datavault
2,909,666 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,270 UART: [state] Locking ICCM
2,910,710 UART: [exit] Launching FMC @ 0x40000130
2,916,040 UART:
2,916,056 UART: Running Caliptra FMC ...
2,916,464 UART:
2,916,518 UART: [state] CFI Enabled
2,926,688 UART: [fht] FMC Alias Private Key: 7
3,045,504 UART: [art] Extend RT PCRs Done
3,045,932 UART: [art] Lock RT PCRs Done
3,047,634 UART: [art] Populate DV Done
3,055,749 UART: [fht] FMC Alias Private Key: 7
3,056,693 UART: [art] Derive CDI
3,056,973 UART: [art] Store in slot 0x4
3,142,794 UART: [art] Derive Key Pair
3,143,154 UART: [art] Store priv key in slot 0x5
3,156,594 UART: [art] Derive Key Pair - Done
3,171,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,308 UART: [art] PUB.X = 0F2B48EE75BA0552B9F1F6DA904F310E06CB5BAA1F81670860A7DC9A783BC3755998CFCA57D5E02558765390B7356788
3,194,065 UART: [art] PUB.Y = 8A7E9CEAB30491C2A3C5A28C3B7F4DAFDC555847A8EB2B17C1EE5B87EA45C8CE879593684C28182E08362486D89AE595
3,201,019 UART: [art] SIG.R = 1052C9DE7891C42D8C0DE6D1D3EBDB76635ADB99F084534808C647D0ABA65F17871FA1690A8E437BA6BAFAD8900B0EEB
3,207,790 UART: [art] SIG.S = 3E4A4C1F651E4D6B1966E2D3582350A20FFF780158DA325393C4DEFB1D47373F8657D7EEC5EB2CC097DE29B47BB825CB
3,231,420 UART: Caliptra RT
3,231,671 UART: [state] CFI Enabled
3,352,079 UART: [rt] RT listening for mailbox commands...
3,352,749 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,987 UART: [rt]cmd =0x44504543, len=96
3,575,859 >>> mbox cmd response data (6236 bytes)
3,575,860 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,191 UART: [rt]cmd =0x52564348, len=36
3,608,063 >>> mbox cmd response data (8 bytes)
3,608,064 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,637,741 UART: [rt]cmd =0x52564348, len=36
3,639,608 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 ready_for_fw is high
1,060,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,526 >>> mbox cmd response: success
2,741,009 UART:
2,741,025 UART: Running Caliptra FMC ...
2,741,433 UART:
2,741,487 UART: [state] CFI Enabled
2,751,865 UART: [fht] FMC Alias Private Key: 7
2,870,707 UART: [art] Extend RT PCRs Done
2,871,135 UART: [art] Lock RT PCRs Done
2,872,577 UART: [art] Populate DV Done
2,880,626 UART: [fht] FMC Alias Private Key: 7
2,881,594 UART: [art] Derive CDI
2,881,874 UART: [art] Store in slot 0x4
2,967,743 UART: [art] Derive Key Pair
2,968,103 UART: [art] Store priv key in slot 0x5
2,980,843 UART: [art] Derive Key Pair - Done
2,995,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,179 UART: [art] PUB.X = 440FF0B38400362048277A7F62A920BF6D7859F88FEBA101D2B04A1EF015FE585F8A60A7BDA689BDD7D864FFAD4379FA
3,018,933 UART: [art] PUB.Y = 3B94761E787FFA224A2779F6129986A4CC1024E281389F7EA345124D1F3B1247CBCA57B78E5D56B74940BE5BE66F8E48
3,025,883 UART: [art] SIG.R = 5971EF6135A294797F47E541C23AE25F9C96E6800CA4FDF0953C05F0850ABAA35F69BAA07E5E6705A2B839415FCAB204
3,032,644 UART: [art] SIG.S = 625688AD05BC17E96209A10C5179030A67BC60EA0F32F2BEE2C420AABB74C26C021FAAE99CEA160E07E0AC39A2B2CF1E
3,056,265 UART: Caliptra RT
3,056,516 UART: [state] CFI Enabled
3,176,948 UART: [rt] RT listening for mailbox commands...
3,177,618 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,932 UART: [rt]cmd =0x44504543, len=96
3,400,349 >>> mbox cmd response data (6236 bytes)
3,400,350 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,849 UART: [rt]cmd =0x52564348, len=36
3,432,263 >>> mbox cmd response data (8 bytes)
3,432,264 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,461,819 UART: [rt]cmd =0x52564348, len=36
3,463,464 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
88,083 UART: [kat] SHA2-256
893,733 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,858 UART: [kat] ++
898,010 UART: [kat] sha1
902,194 UART: [kat] SHA2-256
904,134 UART: [kat] SHA2-384
906,827 UART: [kat] SHA2-512-ACC
908,728 UART: [kat] ECC-384
918,569 UART: [kat] HMAC-384Kdf
923,375 UART: [kat] LMS
1,171,703 UART: [kat] --
1,172,544 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,717 UART: [idev] ++
1,175,885 UART: [idev] CDI.KEYID = 6
1,176,245 UART: [idev] SUBJECT.KEYID = 7
1,176,669 UART: [idev] UDS.KEYID = 0
1,177,014 ready_for_fw is high
1,177,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,513 UART: [idev] Erasing UDS.KEYID = 0
1,201,794 UART: [idev] Sha1 KeyId Algorithm
1,210,238 UART: [idev] --
1,211,212 UART: [ldev] ++
1,211,380 UART: [ldev] CDI.KEYID = 6
1,211,743 UART: [ldev] SUBJECT.KEYID = 5
1,212,169 UART: [ldev] AUTHORITY.KEYID = 7
1,212,632 UART: [ldev] FE.KEYID = 1
1,217,774 UART: [ldev] Erasing FE.KEYID = 1
1,244,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,662 UART: [ldev] --
1,282,967 UART: [fwproc] Wait for Commands...
1,283,695 UART: [fwproc] Recv command 0x46574c44
1,284,423 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,621 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,791 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,124 >>> mbox cmd response: success
2,829,260 UART: [afmc] ++
2,829,428 UART: [afmc] CDI.KEYID = 6
2,829,790 UART: [afmc] SUBJECT.KEYID = 7
2,830,215 UART: [afmc] AUTHORITY.KEYID = 5
2,865,574 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,117 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,457 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,158 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,916 UART: [afmc] --
2,909,014 UART: [cold-reset] --
2,910,120 UART: [state] Locking Datavault
2,911,247 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,851 UART: [state] Locking ICCM
2,912,277 UART: [exit] Launching FMC @ 0x40000130
2,917,607 UART:
2,917,623 UART: Running Caliptra FMC ...
2,918,031 UART:
2,918,174 UART: [state] CFI Enabled
2,928,786 UART: [fht] FMC Alias Private Key: 7
3,047,558 UART: [art] Extend RT PCRs Done
3,047,986 UART: [art] Lock RT PCRs Done
3,049,648 UART: [art] Populate DV Done
3,057,741 UART: [fht] FMC Alias Private Key: 7
3,058,853 UART: [art] Derive CDI
3,059,133 UART: [art] Store in slot 0x4
3,144,556 UART: [art] Derive Key Pair
3,144,916 UART: [art] Store priv key in slot 0x5
3,158,090 UART: [art] Derive Key Pair - Done
3,172,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,372 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,137 UART: [art] PUB.X = 3BBBDD363CC968572A213E9E01B11AF2B8A05C044A591AD2731B211CA9430352C88801D1295F8D64D4A6198CDA6FE5DA
3,195,903 UART: [art] PUB.Y = AA7BE8D7E8CC5CE4540015F1E19E4F1B216AE0F62C4AC47051D4E969694151235BDD73E9B01F33B6F6B6758FAFFBDBBF
3,202,851 UART: [art] SIG.R = E5DD0B2FB77926ABF4CEEF88A8221354E9071A38E52382BCE7082A1AE5E0B4687EFE43E160B03446E0A6476CA4C44D93
3,209,622 UART: [art] SIG.S = D649EDC84BA4D6DD7869E62FA44423A710186600F8AA018A9775975D456DC4941E7DC99B4866C4B3296319D5C3FC6CBB
3,233,411 UART: Caliptra RT
3,233,754 UART: [state] CFI Enabled
3,352,970 UART: [rt] RT listening for mailbox commands...
3,353,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,120 UART: [rt]cmd =0x44504543, len=96
3,575,366 >>> mbox cmd response data (6236 bytes)
3,575,367 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,996 UART: [rt]cmd =0x52564348, len=36
3,607,156 >>> mbox cmd response data (8 bytes)
3,607,157 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,620 UART: [rt]cmd =0x52564348, len=36
3,638,413 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,716 ready_for_fw is high
1,060,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,829 >>> mbox cmd response: success
2,743,874 UART:
2,743,890 UART: Running Caliptra FMC ...
2,744,298 UART:
2,744,441 UART: [state] CFI Enabled
2,755,093 UART: [fht] FMC Alias Private Key: 7
2,873,969 UART: [art] Extend RT PCRs Done
2,874,397 UART: [art] Lock RT PCRs Done
2,875,963 UART: [art] Populate DV Done
2,883,984 UART: [fht] FMC Alias Private Key: 7
2,885,142 UART: [art] Derive CDI
2,885,422 UART: [art] Store in slot 0x4
2,970,981 UART: [art] Derive Key Pair
2,971,341 UART: [art] Store priv key in slot 0x5
2,984,547 UART: [art] Derive Key Pair - Done
2,999,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,472 UART: [art] PUB.X = 6E3C742935F1288B29356F0886BCA2BC70C837129E4850DB8CD5000801DEE8794B106094CF0D02BCB884A2A8E64745BD
3,022,205 UART: [art] PUB.Y = 01C9462DA5167CD4FA4F86D15C6C81E012A8BC5102DC86A61C26895ABC90480430C2C02F0F7DF5B3E46CFFD56DFD98D4
3,029,157 UART: [art] SIG.R = F1ED8F7C0333D061D9C5E33E2DDD4C26E59B1AD6A2AE2D60D07B875886E9CBCE2B1DB69A6127EBE72A503875312D64DE
3,035,942 UART: [art] SIG.S = B515ED01EFA1058EE2C13F139B479EF0172B91ED3DCFF143266BD1CC4B2A7471D93AE15E158CFA96B3228B0A545ACB9D
3,059,931 UART: Caliptra RT
3,060,274 UART: [state] CFI Enabled
3,179,970 UART: [rt] RT listening for mailbox commands...
3,180,640 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,940 UART: [rt]cmd =0x44504543, len=96
3,400,883 >>> mbox cmd response data (6236 bytes)
3,400,884 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,343 UART: [rt]cmd =0x52564348, len=36
3,432,811 >>> mbox cmd response data (8 bytes)
3,432,812 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,462,329 UART: [rt]cmd =0x52564348, len=36
3,463,936 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_already_revoked_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,461 writing to cptra_bootfsm_go
193,691 UART:
194,053 UART: Running Caliptra ROM ...
195,238 UART:
195,394 UART: [state] CFI Enabled
264,332 UART: [state] LifecycleState = Unprovisioned
266,317 UART: [state] DebugLocked = No
268,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,431 UART: [kat] SHA2-256
442,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,579 UART: [kat] ++
453,186 UART: [kat] sha1
463,925 UART: [kat] SHA2-256
466,566 UART: [kat] SHA2-384
472,697 UART: [kat] SHA2-512-ACC
475,074 UART: [kat] ECC-384
2,768,536 UART: [kat] HMAC-384Kdf
2,800,006 UART: [kat] LMS
3,990,315 UART: [kat] --
3,994,899 UART: [cold-reset] ++
3,997,123 UART: [fht] Storing FHT @ 0x50003400
4,007,715 UART: [idev] ++
4,008,326 UART: [idev] CDI.KEYID = 6
4,009,222 UART: [idev] SUBJECT.KEYID = 7
4,010,475 UART: [idev] UDS.KEYID = 0
4,011,444 ready_for_fw is high
4,011,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,746 UART: [idev] Erasing UDS.KEYID = 0
7,346,291 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,869 UART: [idev] --
7,372,751 UART: [ldev] ++
7,373,337 UART: [ldev] CDI.KEYID = 6
7,374,308 UART: [ldev] SUBJECT.KEYID = 5
7,375,526 UART: [ldev] AUTHORITY.KEYID = 7
7,376,757 UART: [ldev] FE.KEYID = 1
7,423,728 UART: [ldev] Erasing FE.KEYID = 1
10,756,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,064,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,079,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,108,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,127,330 UART: [ldev] --
13,131,365 UART: [fwproc] Waiting for Commands...
13,133,784 UART: [fwproc] Received command 0x46574c44
13,135,961 UART: [fwproc] Received Image of size 118548 bytes
17,237,012 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,314,846 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,011 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,244 >>> mbox cmd response: success
17,722,262 UART: [afmc] ++
17,722,877 UART: [afmc] CDI.KEYID = 6
17,723,790 UART: [afmc] SUBJECT.KEYID = 7
17,725,063 UART: [afmc] AUTHORITY.KEYID = 5
21,089,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,385,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,387,302 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,401,721 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,416,451 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,430,895 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,712 UART: [afmc] --
23,455,865 UART: [cold-reset] --
23,461,729 UART: [state] Locking Datavault
23,466,490 UART: [state] Locking PCR0, PCR1 and PCR31
23,468,186 UART: [state] Locking ICCM
23,470,047 UART: [exit] Launching FMC @ 0x40000130
23,478,442 UART:
23,478,684 UART: Running Caliptra FMC ...
23,479,706 UART:
23,479,852 UART: [state] CFI Enabled
23,545,376 UART: [fht] FMC Alias Private Key: 7
25,885,811 UART: [art] Extend RT PCRs Done
25,887,032 UART: [art] Lock RT PCRs Done
25,888,794 UART: [art] Populate DV Done
25,894,206 UART: [fht] FMC Alias Private Key: 7
25,895,845 UART: [art] Derive CDI
25,896,575 UART: [art] Store in slot 0x4
25,955,017 UART: [art] Derive Key Pair
25,956,061 UART: [art] Store priv key in slot 0x5
29,248,284 UART: [art] Derive Key Pair - Done
29,261,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,786 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,292 UART: [art] PUB.X = 834109AB0FFF2B876DD778C4B014B171D9D2B8F7D3EFD0C28EB0F57B609A599EECDF15C2CDBC8A385F0AC442C3BC96CC
31,559,584 UART: [art] PUB.Y = BC7CCC928C1FDB12B7E5B695CF6FE585ECA2E1FDCFA388A5FBAA6793875B2CEF2003D814D332E8A55800D7F0C3A4F9CB
31,566,857 UART: [art] SIG.R = 303B83429830F50659E1EAED140C48424D4C12E406D706851676561FE5C760151DA78A9DEEFE6E970F567E1DC56A5772
31,574,244 UART: [art] SIG.S = 91F72814F0684027CE9895321E4BE2531D8DDC79EF3E048D1C3A318AB6B633304970F92E2440FFAD613442BA71A26AC5
32,879,646 UART: Caliptra RT
32,880,356 UART: [state] CFI Enabled
33,056,541 UART: [rt] RT listening for mailbox commands...
33,058,472 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,088,998 UART: [rt]cmd =0x44504543, len=96
38,871,239 >>> mbox cmd response data (6236 bytes)
38,900,534 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,930,385 UART: [rt]cmd =0x52564348, len=36
38,933,683 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,802,348 ready_for_fw is high
3,802,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,459 >>> mbox cmd response: success
23,656,634 UART:
23,657,020 UART: Running Caliptra FMC ...
23,658,134 UART:
23,658,289 UART: [state] CFI Enabled
23,721,997 UART: [fht] FMC Alias Private Key: 7
26,062,530 UART: [art] Extend RT PCRs Done
26,063,760 UART: [art] Lock RT PCRs Done
26,065,583 UART: [art] Populate DV Done
26,071,025 UART: [fht] FMC Alias Private Key: 7
26,072,681 UART: [art] Derive CDI
26,073,423 UART: [art] Store in slot 0x4
26,130,960 UART: [art] Derive Key Pair
26,132,006 UART: [art] Store priv key in slot 0x5
29,425,030 UART: [art] Derive Key Pair - Done
29,438,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,079 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,589 UART: [art] PUB.X = EBAC7FD2F8F27675662F512316291A910C075FFF57D2020376A09B899AE944354166FEDFA0D7A8F56B458727CC7C16EC
31,735,841 UART: [art] PUB.Y = B4C6DDE20AE0E3D0369AE99966D7E0B0BA014927CE00255D2A40701AE5B0777BBE64C6A34163F1E0DBFD11342970EC97
31,743,081 UART: [art] SIG.R = BFE92FE1604979A35498BFBAFCB683EA01AAC9278789C551DAC2AB299C3081932E9C07D08B69E9E5B27EA6B760E8782E
31,750,490 UART: [art] SIG.S = E4CEBB5DC0E7C7A000BAC08250DE97DEC7E5C9306B061E2C1807ABDEF2E64E69D26991685F1613BCFA86A2761ADC8357
33,055,671 UART: Caliptra RT
33,056,377 UART: [state] CFI Enabled
33,234,120 UART: [rt] RT listening for mailbox commands...
33,236,034 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,267,022 UART: [rt]cmd =0x44504543, len=96
39,048,600 >>> mbox cmd response data (6236 bytes)
39,077,735 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,108,064 UART: [rt]cmd =0x52564348, len=36
39,111,204 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,053 writing to cptra_bootfsm_go
193,351 UART:
193,708 UART: Running Caliptra ROM ...
194,890 UART:
604,535 UART: [state] CFI Enabled
618,784 UART: [state] LifecycleState = Unprovisioned
620,723 UART: [state] DebugLocked = No
623,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,808 UART: [kat] SHA2-256
797,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,099 UART: [kat] ++
808,583 UART: [kat] sha1
818,954 UART: [kat] SHA2-256
821,674 UART: [kat] SHA2-384
828,861 UART: [kat] SHA2-512-ACC
831,223 UART: [kat] ECC-384
3,116,161 UART: [kat] HMAC-384Kdf
3,127,204 UART: [kat] LMS
4,317,305 UART: [kat] --
4,323,248 UART: [cold-reset] ++
4,324,955 UART: [fht] Storing FHT @ 0x50003400
4,335,801 UART: [idev] ++
4,336,362 UART: [idev] CDI.KEYID = 6
4,337,242 UART: [idev] SUBJECT.KEYID = 7
4,338,543 UART: [idev] UDS.KEYID = 0
4,339,515 ready_for_fw is high
4,339,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,531 UART: [idev] Erasing UDS.KEYID = 0
7,628,180 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,035 UART: [idev] --
7,654,242 UART: [ldev] ++
7,654,813 UART: [ldev] CDI.KEYID = 6
7,655,768 UART: [ldev] SUBJECT.KEYID = 5
7,656,974 UART: [ldev] AUTHORITY.KEYID = 7
7,658,249 UART: [ldev] FE.KEYID = 1
7,669,596 UART: [ldev] Erasing FE.KEYID = 1
10,955,270 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,286 UART: [ldev] --
13,315,327 UART: [fwproc] Waiting for Commands...
13,317,848 UART: [fwproc] Received command 0x46574c44
13,320,085 UART: [fwproc] Received Image of size 118548 bytes
17,424,721 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,055 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,215 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,027 >>> mbox cmd response: success
17,911,057 UART: [afmc] ++
17,911,692 UART: [afmc] CDI.KEYID = 6
17,912,607 UART: [afmc] SUBJECT.KEYID = 7
17,913,839 UART: [afmc] AUTHORITY.KEYID = 5
21,229,443 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,523,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,086 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,504 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,228 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,670 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,114 UART: [afmc] --
23,594,109 UART: [cold-reset] --
23,597,484 UART: [state] Locking Datavault
23,602,140 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,877 UART: [state] Locking ICCM
23,605,272 UART: [exit] Launching FMC @ 0x40000130
23,613,665 UART:
23,613,904 UART: Running Caliptra FMC ...
23,615,001 UART:
23,615,179 UART: [state] CFI Enabled
23,623,013 UART: [fht] FMC Alias Private Key: 7
25,963,334 UART: [art] Extend RT PCRs Done
25,964,553 UART: [art] Lock RT PCRs Done
25,965,989 UART: [art] Populate DV Done
25,971,343 UART: [fht] FMC Alias Private Key: 7
25,972,984 UART: [art] Derive CDI
25,973,716 UART: [art] Store in slot 0x4
26,016,144 UART: [art] Derive Key Pair
26,017,185 UART: [art] Store priv key in slot 0x5
29,259,152 UART: [art] Derive Key Pair - Done
29,272,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,327 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,837 UART: [art] PUB.X = 1E3092A8297563FF954B7D105F610CFCC9B13F1E96AFF37C1E298478998743CF60B4A2DF1785C8A35D176EF1F93F2B41
31,561,069 UART: [art] PUB.Y = 109E2A23B323B1FCDDFD30CEF875E4348DA03B554892C4114C2EF6CD4EC93C470D2789B2E2C1634ED22BC97C92DB9238
31,568,403 UART: [art] SIG.R = 69812A5CCC4DD43C078CE7ECEB7A4494EB826B657E3F78B7E761DAD491F42915FAEB08E47200014AD2195D17F4021837
31,575,803 UART: [art] SIG.S = 9F03C9114E538024E02BDCAF23FA279136C47F89E8612E355BD2FA56293D845C5002645E43FA6F2C11BDD87457EC32FE
32,881,182 UART: Caliptra RT
32,881,882 UART: [state] CFI Enabled
33,014,979 UART: [rt] RT listening for mailbox commands...
33,016,950 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,047,876 UART: [rt]cmd =0x44504543, len=96
38,732,053 >>> mbox cmd response data (6236 bytes)
38,761,317 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,791,368 UART: [rt]cmd =0x52564348, len=36
38,794,608 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,128,550 ready_for_fw is high
4,128,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,328 >>> mbox cmd response: success
23,808,880 UART:
23,809,303 UART: Running Caliptra FMC ...
23,810,648 UART:
23,810,821 UART: [state] CFI Enabled
23,818,401 UART: [fht] FMC Alias Private Key: 7
26,158,478 UART: [art] Extend RT PCRs Done
26,159,826 UART: [art] Lock RT PCRs Done
26,161,354 UART: [art] Populate DV Done
26,166,987 UART: [fht] FMC Alias Private Key: 7
26,168,629 UART: [art] Derive CDI
26,169,443 UART: [art] Store in slot 0x4
26,212,196 UART: [art] Derive Key Pair
26,213,185 UART: [art] Store priv key in slot 0x5
29,455,336 UART: [art] Derive Key Pair - Done
29,468,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,698 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,201 UART: [art] PUB.X = 2E2271379737C9A35B36963A67A1F3AFD8A030693F68CD138A0E727279CE38260C4BA3AA197B4659E3E14E609F0E5884
31,757,447 UART: [art] PUB.Y = 7632B5FF384F774A4AD847812C7C5A43A5687CD4ACCE10F68EFB4D116B1C773A39901C4F946A2089AA30677C2A920B57
31,764,723 UART: [art] SIG.R = FF728F4C603FAA16F5C6A05BB79FFAA7DD71C2CF0D5B1A6891A242D88BB4B86B092A55143371317FC480C08FC4D58992
31,772,123 UART: [art] SIG.S = 7311B87DB36BB8ACFD5C6748ED426BE748401F7DC8D2BEF9948CC770AA32FDC537EF7911F41ACFE816607C7D7F9D93D9
33,078,008 UART: Caliptra RT
33,078,728 UART: [state] CFI Enabled
33,211,844 UART: [rt] RT listening for mailbox commands...
33,213,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,244,407 UART: [rt]cmd =0x44504543, len=96
38,929,090 >>> mbox cmd response data (6236 bytes)
38,958,214 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,988,302 UART: [rt]cmd =0x52564348, len=36
38,991,106 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,078 UART:
192,436 UART: Running Caliptra ROM ...
193,573 UART:
193,715 UART: [state] CFI Enabled
263,982 UART: [state] LifecycleState = Unprovisioned
265,903 UART: [state] DebugLocked = No
268,855 UART: [state] WD Timer not started. Device not locked for debugging
271,825 UART: [kat] SHA2-256
451,546 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,273 UART: [kat] ++
462,896 UART: [kat] sha1
474,129 UART: [kat] SHA2-256
476,839 UART: [kat] SHA2-384
482,901 UART: [kat] SHA2-512-ACC
485,261 UART: [kat] ECC-384
2,947,716 UART: [kat] HMAC-384Kdf
2,972,603 UART: [kat] LMS
3,449,076 UART: [kat] --
3,452,963 UART: [cold-reset] ++
3,454,321 UART: [fht] FHT @ 0x50003400
3,465,433 UART: [idev] ++
3,465,993 UART: [idev] CDI.KEYID = 6
3,467,016 UART: [idev] SUBJECT.KEYID = 7
3,468,184 UART: [idev] UDS.KEYID = 0
3,469,226 ready_for_fw is high
3,469,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,599 UART: [idev] Erasing UDS.KEYID = 0
5,968,914 UART: [idev] Sha1 KeyId Algorithm
5,993,908 UART: [idev] --
5,999,816 UART: [ldev] ++
6,000,385 UART: [ldev] CDI.KEYID = 6
6,001,402 UART: [ldev] SUBJECT.KEYID = 5
6,002,558 UART: [ldev] AUTHORITY.KEYID = 7
6,003,788 UART: [ldev] FE.KEYID = 1
6,037,993 UART: [ldev] Erasing FE.KEYID = 1
8,544,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,153 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,865 UART: [ldev] --
10,355,587 UART: [fwproc] Wait for Commands...
10,357,382 UART: [fwproc] Recv command 0x46574c44
10,359,431 UART: [fwproc] Recv'd Img size: 118548 bytes
13,841,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,987,907 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,316,911 >>> mbox cmd response: success
14,321,438 UART: [afmc] ++
14,322,054 UART: [afmc] CDI.KEYID = 6
14,322,974 UART: [afmc] SUBJECT.KEYID = 7
14,324,187 UART: [afmc] AUTHORITY.KEYID = 5
16,855,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,599,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,601,906 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,617,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,633,753 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,535 UART: [afmc] --
18,677,501 UART: [cold-reset] --
18,679,790 UART: [state] Locking Datavault
18,684,336 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,084 UART: [state] Locking ICCM
18,688,940 UART: [exit] Launching FMC @ 0x40000130
18,697,327 UART:
18,697,560 UART: Running Caliptra FMC ...
18,698,653 UART:
18,698,810 UART: [state] CFI Enabled
18,755,897 UART: [fht] FMC Alias Private Key: 7
20,522,626 UART: [art] Extend RT PCRs Done
20,523,855 UART: [art] Lock RT PCRs Done
20,525,833 UART: [art] Populate DV Done
20,530,975 UART: [fht] FMC Alias Private Key: 7
20,532,507 UART: [art] Derive CDI
20,533,258 UART: [art] Store in slot 0x4
20,588,683 UART: [art] Derive Key Pair
20,589,724 UART: [art] Store priv key in slot 0x5
23,052,506 UART: [art] Derive Key Pair - Done
23,065,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,778,404 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,145 UART: [art] PUB.X = 8236E33AC2C13B6AB66D4B2E7C2B4DABF5AEA979AE95B62CB695F08D862F2FC293872D73A77AB86263A497D069E43FF2
24,787,187 UART: [art] PUB.Y = 8A796A0591343B0558F7857A21E67E5AD34E6096FE44F0F173CA96F859E520441D893BCF4AF87E1D4BFC177B7E48203A
24,794,421 UART: [art] SIG.R = 718AD86A434D20BBF12725D58EE812902A90EDA01C31401F0C4C6A85206288A4970FBED7D84EFF92BF562D33582BA8A9
24,801,861 UART: [art] SIG.S = B9CB8AB5958930E369278302479A8A930C67A2ED93C226A2ABC8EC75F2825C9BC5FE0EF32E7DFBE7408D2FC9F1640A9E
25,780,920 UART: Caliptra RT
25,781,627 UART: [state] CFI Enabled
25,961,066 UART: [rt] RT listening for mailbox commands...
25,962,986 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,993,911 UART: [rt]cmd =0x44504543, len=96
30,370,508 >>> mbox cmd response data (6236 bytes)
30,399,970 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,429,878 UART: [rt]cmd =0x52564348, len=36
30,432,912 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,460,544 ready_for_fw is high
3,460,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,437 >>> mbox cmd response: success
18,534,647 UART:
18,535,030 UART: Running Caliptra FMC ...
18,536,153 UART:
18,536,303 UART: [state] CFI Enabled
18,605,109 UART: [fht] FMC Alias Private Key: 7
20,370,785 UART: [art] Extend RT PCRs Done
20,372,007 UART: [art] Lock RT PCRs Done
20,373,503 UART: [art] Populate DV Done
20,378,753 UART: [fht] FMC Alias Private Key: 7
20,380,464 UART: [art] Derive CDI
20,381,202 UART: [art] Store in slot 0x4
20,437,427 UART: [art] Derive Key Pair
20,438,425 UART: [art] Store priv key in slot 0x5
22,901,740 UART: [art] Derive Key Pair - Done
22,914,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,734 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,258 UART: [art] PUB.X = 1402DD4C86B8FF107554D0C673F410AABB5F09790B1CE536238E3B63228D8CF8FD6549DC88AE4E32488F5B7C822A74EF
24,636,519 UART: [art] PUB.Y = C9B72D9A7FDA34DA7F4558F26F14656EDAC9712A3F0685B1A444CF96AD7B48B4D06606726C70E0152B0ADD4E0D2FFF52
24,643,774 UART: [art] SIG.R = 890C306B79EC13187167A306E2F691B732B139B0061E3316EF589F2013461243C724E12EE8BAE3C023966A496BD30888
24,651,116 UART: [art] SIG.S = A15C520D2FD0DA3EFE1FEB021CF3B0EED940DAF4871E8601D651F8E8BDDD2719E64A998894E038EAEE9114DD365A07C4
25,630,103 UART: Caliptra RT
25,630,823 UART: [state] CFI Enabled
25,811,870 UART: [rt] RT listening for mailbox commands...
25,813,784 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,844,486 UART: [rt]cmd =0x44504543, len=96
30,220,041 >>> mbox cmd response data (6236 bytes)
30,249,212 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,279,274 UART: [rt]cmd =0x52564348, len=36
30,282,325 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,458 UART:
192,815 UART: Running Caliptra ROM ...
194,005 UART:
603,605 UART: [state] CFI Enabled
615,365 UART: [state] LifecycleState = Unprovisioned
617,241 UART: [state] DebugLocked = No
619,202 UART: [state] WD Timer not started. Device not locked for debugging
623,015 UART: [kat] SHA2-256
802,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,408 UART: [kat] ++
814,014 UART: [kat] sha1
825,325 UART: [kat] SHA2-256
828,051 UART: [kat] SHA2-384
834,541 UART: [kat] SHA2-512-ACC
836,929 UART: [kat] ECC-384
3,277,424 UART: [kat] HMAC-384Kdf
3,290,867 UART: [kat] LMS
3,767,396 UART: [kat] --
3,770,964 UART: [cold-reset] ++
3,772,896 UART: [fht] FHT @ 0x50003400
3,784,367 UART: [idev] ++
3,784,940 UART: [idev] CDI.KEYID = 6
3,785,975 UART: [idev] SUBJECT.KEYID = 7
3,787,151 UART: [idev] UDS.KEYID = 0
3,788,086 ready_for_fw is high
3,788,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,248 UART: [idev] Erasing UDS.KEYID = 0
6,261,679 UART: [idev] Sha1 KeyId Algorithm
6,285,061 UART: [idev] --
6,290,943 UART: [ldev] ++
6,291,533 UART: [ldev] CDI.KEYID = 6
6,292,446 UART: [ldev] SUBJECT.KEYID = 5
6,293,662 UART: [ldev] AUTHORITY.KEYID = 7
6,294,898 UART: [ldev] FE.KEYID = 1
6,304,952 UART: [ldev] Erasing FE.KEYID = 1
8,782,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,533 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,393 UART: [ldev] --
10,575,064 UART: [fwproc] Wait for Commands...
10,577,706 UART: [fwproc] Recv command 0x46574c44
10,579,740 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,124 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,653 >>> mbox cmd response: success
14,548,843 UART: [afmc] ++
14,549,452 UART: [afmc] CDI.KEYID = 6
14,550,338 UART: [afmc] SUBJECT.KEYID = 7
14,551,613 UART: [afmc] AUTHORITY.KEYID = 5
17,051,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,775,975 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,778,163 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,794,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,810,061 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,825,657 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,850,086 UART: [afmc] --
18,854,654 UART: [cold-reset] --
18,857,920 UART: [state] Locking Datavault
18,862,248 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,056 UART: [state] Locking ICCM
18,865,114 UART: [exit] Launching FMC @ 0x40000130
18,873,512 UART:
18,873,745 UART: Running Caliptra FMC ...
18,874,771 UART:
18,874,921 UART: [state] CFI Enabled
18,882,867 UART: [fht] FMC Alias Private Key: 7
20,649,095 UART: [art] Extend RT PCRs Done
20,650,313 UART: [art] Lock RT PCRs Done
20,652,128 UART: [art] Populate DV Done
20,657,482 UART: [fht] FMC Alias Private Key: 7
20,659,073 UART: [art] Derive CDI
20,659,890 UART: [art] Store in slot 0x4
20,702,053 UART: [art] Derive Key Pair
20,703,092 UART: [art] Store priv key in slot 0x5
23,130,239 UART: [art] Derive Key Pair - Done
23,143,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,018 UART: [art] Erasing AUTHORITY.KEYID = 7
24,851,527 UART: [art] PUB.X = A9029B18A25E6D1C31175BED3B0C537B3C354E8FF5C1F5CB77F762FBA6EA9021E9D302452DD4280F400D3A9C9BB07772
24,858,781 UART: [art] PUB.Y = 199C993572761CF8FE1DBE3A7CAE4DCC79DE2DAA3EE805E4CEE7D5B3B39F6F43174D6558A5BAE23561C5288C6DE38DAF
24,866,049 UART: [art] SIG.R = 9B1451B0DC1C508E3FC66CA56D52286D1DEE58B7EF36AABF3531281EBCD94EB15ABCEC06F9B71CC84E3634BC85F32784
24,873,457 UART: [art] SIG.S = 00CD6CE5EEED84E3AB5614A4335B728D0222DCC87A8E37C3D8E73F3B96EF9FAAF0F19A44B8F3282857EB3B3E76651746
25,852,396 UART: Caliptra RT
25,853,094 UART: [state] CFI Enabled
25,986,721 UART: [rt] RT listening for mailbox commands...
25,988,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,019,172 UART: [rt]cmd =0x44504543, len=96
30,314,666 >>> mbox cmd response data (6236 bytes)
30,343,774 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,373,823 UART: [rt]cmd =0x52564348, len=36
30,376,960 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
3,782,444 ready_for_fw is high
3,782,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,874 >>> mbox cmd response: success
18,707,279 UART:
18,707,671 UART: Running Caliptra FMC ...
18,708,788 UART:
18,708,945 UART: [state] CFI Enabled
18,716,878 UART: [fht] FMC Alias Private Key: 7
20,482,502 UART: [art] Extend RT PCRs Done
20,483,721 UART: [art] Lock RT PCRs Done
20,485,594 UART: [art] Populate DV Done
20,491,182 UART: [fht] FMC Alias Private Key: 7
20,492,843 UART: [art] Derive CDI
20,493,586 UART: [art] Store in slot 0x4
20,536,302 UART: [art] Derive Key Pair
20,537,344 UART: [art] Store priv key in slot 0x5
22,964,571 UART: [art] Derive Key Pair - Done
22,977,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,848 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,348 UART: [art] PUB.X = 8F414374F4550593B67CE4FB01EC308987A1E81D8D80F8BFF6493C01B3A090589F0C5FE1272A8930FAB0C8EC619091AE
24,692,659 UART: [art] PUB.Y = 3EE2932FF18E00506D0E75A37AEA46B3238E95A089DEB82FD8FD2D3FFFACE7A80B8355C081A541FB8DB3ACBF7E0EC2C8
24,699,912 UART: [art] SIG.R = 850C3A944408811A0BB0376370FFEFE69BF28549E36D9EBBA602B1CACA03CDE15F837893D69E47185ED4B5EDA5E30C8C
24,707,319 UART: [art] SIG.S = 73515A06C169EC5254020B382B947D55A58367B254F4A9AD60D802B6C1BAE5267D6E5E30CDD3D583B6F87712CF378BFB
25,686,097 UART: Caliptra RT
25,686,802 UART: [state] CFI Enabled
25,818,622 UART: [rt] RT listening for mailbox commands...
25,820,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,851,075 UART: [rt]cmd =0x44504543, len=96
30,145,817 >>> mbox cmd response data (6236 bytes)
30,174,940 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,205,011 UART: [rt]cmd =0x52564348, len=36
30,207,911 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,030 UART:
192,393 UART: Running Caliptra ROM ...
193,527 UART:
193,668 UART: [state] CFI Enabled
265,700 UART: [state] LifecycleState = Unprovisioned
268,104 UART: [state] DebugLocked = No
269,922 UART: [state] WD Timer not started. Device not locked for debugging
275,377 UART: [kat] SHA2-256
465,259 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,002 UART: [kat] ++
476,482 UART: [kat] sha1
488,130 UART: [kat] SHA2-256
491,131 UART: [kat] SHA2-384
495,623 UART: [kat] SHA2-512-ACC
498,207 UART: [kat] ECC-384
2,946,864 UART: [kat] HMAC-384Kdf
2,970,626 UART: [kat] LMS
3,502,417 UART: [kat] --
3,507,201 UART: [cold-reset] ++
3,508,170 UART: [fht] FHT @ 0x50003400
3,519,647 UART: [idev] ++
3,520,360 UART: [idev] CDI.KEYID = 6
3,521,339 UART: [idev] SUBJECT.KEYID = 7
3,522,510 UART: [idev] UDS.KEYID = 0
3,523,434 ready_for_fw is high
3,523,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,686 UART: [idev] Erasing UDS.KEYID = 0
6,026,356 UART: [idev] Sha1 KeyId Algorithm
6,048,772 UART: [idev] --
6,054,593 UART: [ldev] ++
6,055,271 UART: [ldev] CDI.KEYID = 6
6,056,181 UART: [ldev] SUBJECT.KEYID = 5
6,057,412 UART: [ldev] AUTHORITY.KEYID = 7
6,058,590 UART: [ldev] FE.KEYID = 1
6,098,999 UART: [ldev] Erasing FE.KEYID = 1
8,606,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,844 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,730 UART: [ldev] --
10,412,043 UART: [fwproc] Wait for Commands...
10,414,997 UART: [fwproc] Recv command 0x46574c44
10,417,306 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,983,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,667,967 >>> mbox cmd response: success
14,671,724 UART: [afmc] ++
14,672,452 UART: [afmc] CDI.KEYID = 6
14,673,646 UART: [afmc] SUBJECT.KEYID = 7
14,675,081 UART: [afmc] AUTHORITY.KEYID = 5
17,210,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,753 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,674 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,805 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,916 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,842 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,382 UART: [afmc] --
19,013,920 UART: [cold-reset] --
19,017,460 UART: [state] Locking Datavault
19,023,040 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,221 UART: [state] Locking ICCM
19,027,634 UART: [exit] Launching FMC @ 0x40000130
19,036,274 UART:
19,036,520 UART: Running Caliptra FMC ...
19,037,625 UART:
19,037,784 UART: [state] CFI Enabled
19,094,733 UART: [fht] FMC Alias Private Key: 7
20,860,987 UART: [art] Extend RT PCRs Done
20,862,204 UART: [art] Lock RT PCRs Done
20,863,729 UART: [art] Populate DV Done
20,869,055 UART: [fht] FMC Alias Private Key: 7
20,870,594 UART: [art] Derive CDI
20,871,404 UART: [art] Store in slot 0x4
20,929,901 UART: [art] Derive Key Pair
20,930,891 UART: [art] Store priv key in slot 0x5
23,394,001 UART: [art] Derive Key Pair - Done
23,407,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,049 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,581 UART: [art] PUB.X = 28D1A5405A33F57F1EF3DE5B0FD080F768C4D8538A95398B15BED5DC504237EB98F3F84BC917698FCFA402D49418B8E4
25,128,800 UART: [art] PUB.Y = 2F518E72E2DC314E39944601EBE6A50A0B79C80CAC1D1F75E58D00F092DCC4447AAA02D69AE609267ABB5294DABA6C7F
25,136,036 UART: [art] SIG.R = 21AAE5DDC0BB834A7F9E497832E7882DD1183D77F354F558894FD23806280430328ECD49FA266EA0515425612A6889A9
25,143,436 UART: [art] SIG.S = A9EA985286A998B21591D8A4E76BD316C8C0D93C896A718DD649BC9A56BC1CF82BB27B6E731BB3CCD136D6DD0301DD77
26,122,288 UART: Caliptra RT
26,122,997 UART: [state] CFI Enabled
26,304,124 UART: [rt] RT listening for mailbox commands...
26,306,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,336,749 UART: [rt]cmd =0x44504543, len=96
30,711,472 >>> mbox cmd response data (6236 bytes)
30,740,602 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,770,813 UART: [rt]cmd =0x52564348, len=36
30,773,836 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,436,833 ready_for_fw is high
3,437,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,830,011 >>> mbox cmd response: success
19,121,507 UART:
19,121,898 UART: Running Caliptra FMC ...
19,123,012 UART:
19,123,168 UART: [state] CFI Enabled
19,190,365 UART: [fht] FMC Alias Private Key: 7
20,957,324 UART: [art] Extend RT PCRs Done
20,958,553 UART: [art] Lock RT PCRs Done
20,959,814 UART: [art] Populate DV Done
20,965,228 UART: [fht] FMC Alias Private Key: 7
20,966,713 UART: [art] Derive CDI
20,967,494 UART: [art] Store in slot 0x4
21,023,452 UART: [art] Derive Key Pair
21,024,448 UART: [art] Store priv key in slot 0x5
23,488,020 UART: [art] Derive Key Pair - Done
23,500,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,796 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,307 UART: [art] PUB.X = 5A40192703FFEDB2099A5434C86864839E88CD6EAC7DDAF9328AC765284E05A229A7F0094CB7A80DBED4C3144D7C1C40
25,221,543 UART: [art] PUB.Y = 95C5F1DBFF14A4936E068EE8825E480B8AAA72047BC753B9969BF5832961A49C75A75B879C7E2B25307CA418E7A93971
25,228,801 UART: [art] SIG.R = D463FDF668AA230A56410CC170BAB6E1FD667A94BDA97FE30DF490BAA588E45172F47C748851D57CF8C587CC2E183F6B
25,236,218 UART: [art] SIG.S = 9CAFB643694A0E04D0B1D451938C1969CF69F31B0479F5D32436D0B217B68E8691B629D25925DA75D3CB60071A1465D3
26,215,392 UART: Caliptra RT
26,216,106 UART: [state] CFI Enabled
26,395,583 UART: [rt] RT listening for mailbox commands...
26,397,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,428,140 UART: [rt]cmd =0x44504543, len=96
30,803,854 >>> mbox cmd response data (6236 bytes)
30,832,953 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,863,220 UART: [rt]cmd =0x52564348, len=36
30,866,354 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,205 UART:
192,569 UART: Running Caliptra ROM ...
193,765 UART:
603,364 UART: [state] CFI Enabled
616,072 UART: [state] LifecycleState = Unprovisioned
618,463 UART: [state] DebugLocked = No
620,991 UART: [state] WD Timer not started. Device not locked for debugging
626,394 UART: [kat] SHA2-256
816,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,065 UART: [kat] ++
827,685 UART: [kat] sha1
839,068 UART: [kat] SHA2-256
842,079 UART: [kat] SHA2-384
848,857 UART: [kat] SHA2-512-ACC
851,453 UART: [kat] ECC-384
3,293,496 UART: [kat] HMAC-384Kdf
3,308,137 UART: [kat] LMS
3,839,957 UART: [kat] --
3,843,810 UART: [cold-reset] ++
3,846,382 UART: [fht] FHT @ 0x50003400
3,857,607 UART: [idev] ++
3,858,354 UART: [idev] CDI.KEYID = 6
3,859,281 UART: [idev] SUBJECT.KEYID = 7
3,860,465 UART: [idev] UDS.KEYID = 0
3,861,397 ready_for_fw is high
3,861,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,313 UART: [idev] Erasing UDS.KEYID = 0
6,335,012 UART: [idev] Sha1 KeyId Algorithm
6,357,807 UART: [idev] --
6,361,749 UART: [ldev] ++
6,362,428 UART: [ldev] CDI.KEYID = 6
6,363,350 UART: [ldev] SUBJECT.KEYID = 5
6,364,560 UART: [ldev] AUTHORITY.KEYID = 7
6,365,740 UART: [ldev] FE.KEYID = 1
6,376,008 UART: [ldev] Erasing FE.KEYID = 1
8,853,893 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,159 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,386 UART: [ldev] --
10,644,136 UART: [fwproc] Wait for Commands...
10,645,971 UART: [fwproc] Recv command 0x46574c44
10,648,236 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,341,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,902,388 >>> mbox cmd response: success
14,906,829 UART: [afmc] ++
14,907,485 UART: [afmc] CDI.KEYID = 6
14,908,749 UART: [afmc] SUBJECT.KEYID = 7
14,910,206 UART: [afmc] AUTHORITY.KEYID = 5
17,415,217 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,742 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,949 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,813 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,587 UART: [afmc] --
19,213,730 UART: [cold-reset] --
19,217,909 UART: [state] Locking Datavault
19,222,647 UART: [state] Locking PCR0, PCR1 and PCR31
19,224,813 UART: [state] Locking ICCM
19,226,976 UART: [exit] Launching FMC @ 0x40000130
19,235,670 UART:
19,235,906 UART: Running Caliptra FMC ...
19,237,012 UART:
19,237,186 UART: [state] CFI Enabled
19,245,201 UART: [fht] FMC Alias Private Key: 7
21,011,732 UART: [art] Extend RT PCRs Done
21,012,949 UART: [art] Lock RT PCRs Done
21,014,634 UART: [art] Populate DV Done
21,019,896 UART: [fht] FMC Alias Private Key: 7
21,021,548 UART: [art] Derive CDI
21,022,367 UART: [art] Store in slot 0x4
21,064,862 UART: [art] Derive Key Pair
21,065,903 UART: [art] Store priv key in slot 0x5
23,492,382 UART: [art] Derive Key Pair - Done
23,505,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,878 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,389 UART: [art] PUB.X = 9CD84E321021DA14ABF564DD44885D903C1799E3475CC324622C96E4B2DA934F0C1E068CCF78E2AA18097007AC59D2B6
25,220,660 UART: [art] PUB.Y = 8E9361A3870A9F33D8F8C3DF0A9ED1278335C9BD2EEE7FC1C7EBC78D73B48846D82095C602DFD811B6D95E198C89B32C
25,227,924 UART: [art] SIG.R = 019FB04C07B9A148B32DB4AEE28DE5CE66BA12585DD9B62A2F9E3A7CB30F398D5CCBA31EACDAA38EA40E772E78BBAB9B
25,235,345 UART: [art] SIG.S = 514643743087E7B43AAF1F8A64892F2C3666110FE7E466612559409EB2CDF4AFEA2A3AF3FD8C1FAD4396F733E47627C5
26,214,074 UART: Caliptra RT
26,214,789 UART: [state] CFI Enabled
26,348,013 UART: [rt] RT listening for mailbox commands...
26,349,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,380,533 UART: [rt]cmd =0x44504543, len=96
30,674,866 >>> mbox cmd response data (6236 bytes)
30,704,143 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,734,375 UART: [rt]cmd =0x52564348, len=36
30,737,331 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,759,260 ready_for_fw is high
3,759,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,058,326 >>> mbox cmd response: success
19,311,408 UART:
19,311,810 UART: Running Caliptra FMC ...
19,312,923 UART:
19,313,077 UART: [state] CFI Enabled
19,320,929 UART: [fht] FMC Alias Private Key: 7
21,086,762 UART: [art] Extend RT PCRs Done
21,087,998 UART: [art] Lock RT PCRs Done
21,089,172 UART: [art] Populate DV Done
21,094,767 UART: [fht] FMC Alias Private Key: 7
21,096,277 UART: [art] Derive CDI
21,097,019 UART: [art] Store in slot 0x4
21,139,512 UART: [art] Derive Key Pair
21,140,517 UART: [art] Store priv key in slot 0x5
23,567,405 UART: [art] Derive Key Pair - Done
23,580,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,286,433 UART: [art] Erasing AUTHORITY.KEYID = 7
25,287,936 UART: [art] PUB.X = EAED42494ECAFA0245FCF0DAF6EB1E6B206B70AB70813760D76D62E914857E5B737A0E41E0BB53BDAA889F072519AD31
25,295,201 UART: [art] PUB.Y = F6A8D04A23D451CFDAFA0ADF016DC837EE672D53C17FB1F558FD347F72E48DA0A3AA8C1395CABEF2FB91E944C6DD2FC1
25,302,517 UART: [art] SIG.R = 5C3A1921549580C05072B5A076D9D6D55281954046A9C6942BFC4261C83D0DD7E1A904083ACE55DB67CE58EAA658AFF4
25,309,915 UART: [art] SIG.S = ED742E4435D6366FB8127E264D5B2FB22F50FC5D7E54F12F6E8B1D46F21506F8CCA7673DACDB9970542216CA646D80C8
26,288,970 UART: Caliptra RT
26,289,683 UART: [state] CFI Enabled
26,422,136 UART: [rt] RT listening for mailbox commands...
26,424,196 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,454,912 UART: [rt]cmd =0x44504543, len=96
30,749,391 >>> mbox cmd response data (6236 bytes)
30,778,455 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,808,615 UART: [rt]cmd =0x52564348, len=36
30,811,860 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,972 UART: [state] LifecycleState = Unprovisioned
85,627 UART: [state] DebugLocked = No
86,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,955 UART: [kat] SHA2-256
881,886 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,001 UART: [kat] ++
886,153 UART: [kat] sha1
890,275 UART: [kat] SHA2-256
892,213 UART: [kat] SHA2-384
894,874 UART: [kat] SHA2-512-ACC
896,775 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,141 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,226 UART: [idev] ++
1,479,394 UART: [idev] CDI.KEYID = 6
1,479,754 UART: [idev] SUBJECT.KEYID = 7
1,480,178 UART: [idev] UDS.KEYID = 0
1,480,523 ready_for_fw is high
1,480,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,148 UART: [idev] Erasing UDS.KEYID = 0
1,504,760 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,352 UART: [idev] --
1,514,395 UART: [ldev] ++
1,514,563 UART: [ldev] CDI.KEYID = 6
1,514,926 UART: [ldev] SUBJECT.KEYID = 5
1,515,352 UART: [ldev] AUTHORITY.KEYID = 7
1,515,815 UART: [ldev] FE.KEYID = 1
1,521,169 UART: [ldev] Erasing FE.KEYID = 1
1,545,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,584 UART: [ldev] --
1,584,933 UART: [fwproc] Waiting for Commands...
1,585,626 UART: [fwproc] Received command 0x46574c44
1,586,417 UART: [fwproc] Received Image of size 118548 bytes
2,930,003 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,455 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,673 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,926 >>> mbox cmd response: success
3,130,084 UART: [afmc] ++
3,130,252 UART: [afmc] CDI.KEYID = 6
3,130,614 UART: [afmc] SUBJECT.KEYID = 7
3,131,039 UART: [afmc] AUTHORITY.KEYID = 5
3,166,214 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,839 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,722 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,405 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,151 UART: [afmc] --
3,209,143 UART: [cold-reset] --
3,210,185 UART: [state] Locking Datavault
3,211,302 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,906 UART: [state] Locking ICCM
3,212,350 UART: [exit] Launching FMC @ 0x40000130
3,217,680 UART:
3,217,696 UART: Running Caliptra FMC ...
3,218,104 UART:
3,218,158 UART: [state] CFI Enabled
3,228,698 UART: [fht] FMC Alias Private Key: 7
3,347,210 UART: [art] Extend RT PCRs Done
3,347,638 UART: [art] Lock RT PCRs Done
3,349,408 UART: [art] Populate DV Done
3,357,871 UART: [fht] FMC Alias Private Key: 7
3,359,025 UART: [art] Derive CDI
3,359,305 UART: [art] Store in slot 0x4
3,445,275 UART: [art] Derive Key Pair
3,445,635 UART: [art] Store priv key in slot 0x5
3,458,584 UART: [art] Derive Key Pair - Done
3,473,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,250 UART: [art] PUB.X = F5D7D370D2DA69E4CF77CB7BFA1E8161886E9BD2F0986DAF7C0AF238B90109D3E5CA2738D0DD56803608F04980F771BF
3,496,020 UART: [art] PUB.Y = 7F152CDDDD45F4BA739463AE48F349BAF412989A5F2548A76B495A1ABD9377438E05188BA1B922C4E78DF077C1D2CBE1
3,502,977 UART: [art] SIG.R = DD451F0CC44D740BC486F537A39EA4AB6F7B230C7DA1C78079132FB3179BCFA1100A8181A0652E18146B059A9E1EA3A7
3,509,740 UART: [art] SIG.S = F279566527C01D12D34ED26E2C014289065BEA8D163A0DCA38E5B1FD27FAF541B1963A525D82D1737B192ABF9F03622B
3,533,622 UART: Caliptra RT
3,533,873 UART: [state] CFI Enabled
3,653,356 UART: [rt] RT listening for mailbox commands...
3,654,026 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,532 UART: [rt]cmd =0x44504543, len=96
3,878,086 >>> mbox cmd response data (6236 bytes)
3,878,087 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,828 UART: [rt]cmd =0x52564348, len=36
3,910,670 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,901 ready_for_fw is high
1,361,901 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,836 >>> mbox cmd response: success
3,042,413 UART:
3,042,429 UART: Running Caliptra FMC ...
3,042,837 UART:
3,042,891 UART: [state] CFI Enabled
3,053,521 UART: [fht] FMC Alias Private Key: 7
3,172,699 UART: [art] Extend RT PCRs Done
3,173,127 UART: [art] Lock RT PCRs Done
3,174,639 UART: [art] Populate DV Done
3,182,638 UART: [fht] FMC Alias Private Key: 7
3,183,648 UART: [art] Derive CDI
3,183,928 UART: [art] Store in slot 0x4
3,269,436 UART: [art] Derive Key Pair
3,269,796 UART: [art] Store priv key in slot 0x5
3,283,715 UART: [art] Derive Key Pair - Done
3,298,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,037 UART: [art] PUB.X = AFE15ABCB64737BC8CD435C19427693912CD8CB1918D287F43058EB99BA7C47F2385F1841A36F3630D81A07B463C7D30
3,321,803 UART: [art] PUB.Y = 3704D5318F536D2BCA12717424843DF955225128E78363FFD4701A910BD45CEB75D36B3549A0AB5124C4E21E5912214E
3,328,739 UART: [art] SIG.R = 18E6DB7CCBFB95A6FAD3244C501BB8322B2C5B784FA19C7A6610081417DCFDE8C869C5A503AA521075D0EC35E860D29E
3,335,517 UART: [art] SIG.S = 8B41DC8AA9D58E161F250686A09EB22B470DB5CB70D32E18CE2E64F0C864985C825AFABCB3BA37B7A0514BFCD2D3D303
3,359,702 UART: Caliptra RT
3,359,953 UART: [state] CFI Enabled
3,478,957 UART: [rt] RT listening for mailbox commands...
3,479,627 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,001 UART: [rt]cmd =0x44504543, len=96
3,701,330 >>> mbox cmd response data (6236 bytes)
3,701,331 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,730,918 UART: [rt]cmd =0x52564348, len=36
3,733,834 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,418 UART: [kat] SHA2-256
882,349 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,464 UART: [kat] ++
886,616 UART: [kat] sha1
890,726 UART: [kat] SHA2-256
892,664 UART: [kat] SHA2-384
895,463 UART: [kat] SHA2-512-ACC
897,364 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,824 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,480,169 UART: [idev] ++
1,480,337 UART: [idev] CDI.KEYID = 6
1,480,697 UART: [idev] SUBJECT.KEYID = 7
1,481,121 UART: [idev] UDS.KEYID = 0
1,481,466 ready_for_fw is high
1,481,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,943 UART: [idev] Erasing UDS.KEYID = 0
1,506,889 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,469 UART: [idev] --
1,516,476 UART: [ldev] ++
1,516,644 UART: [ldev] CDI.KEYID = 6
1,517,007 UART: [ldev] SUBJECT.KEYID = 5
1,517,433 UART: [ldev] AUTHORITY.KEYID = 7
1,517,896 UART: [ldev] FE.KEYID = 1
1,523,000 UART: [ldev] Erasing FE.KEYID = 1
1,548,155 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,377 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,089 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,205 UART: [ldev] --
1,587,618 UART: [fwproc] Waiting for Commands...
1,588,401 UART: [fwproc] Received command 0x46574c44
1,589,192 UART: [fwproc] Received Image of size 118548 bytes
2,933,658 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,474 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,692 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,995 >>> mbox cmd response: success
3,134,149 UART: [afmc] ++
3,134,317 UART: [afmc] CDI.KEYID = 6
3,134,679 UART: [afmc] SUBJECT.KEYID = 7
3,135,104 UART: [afmc] AUTHORITY.KEYID = 5
3,169,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,679 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,459 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,168 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,051 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,734 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,594 UART: [afmc] --
3,212,618 UART: [cold-reset] --
3,213,614 UART: [state] Locking Datavault
3,214,731 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,335 UART: [state] Locking ICCM
3,215,909 UART: [exit] Launching FMC @ 0x40000130
3,221,239 UART:
3,221,255 UART: Running Caliptra FMC ...
3,221,663 UART:
3,221,806 UART: [state] CFI Enabled
3,232,568 UART: [fht] FMC Alias Private Key: 7
3,351,314 UART: [art] Extend RT PCRs Done
3,351,742 UART: [art] Lock RT PCRs Done
3,353,094 UART: [art] Populate DV Done
3,361,349 UART: [fht] FMC Alias Private Key: 7
3,362,435 UART: [art] Derive CDI
3,362,715 UART: [art] Store in slot 0x4
3,448,307 UART: [art] Derive Key Pair
3,448,667 UART: [art] Store priv key in slot 0x5
3,461,480 UART: [art] Derive Key Pair - Done
3,476,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,374 UART: [art] PUB.X = BB09A9244215A2CA61F5E589B3A5462433B12E6C76B1B075CA55EB6DEB41F2C2BC9351A078883C788475A94B2A465AAF
3,499,147 UART: [art] PUB.Y = EB48474D464D51B0C16EC57D258023239D27DBE52BC47DB42687418F3516F171ED3D39745C3C9291F853B9A1E758B689
3,506,093 UART: [art] SIG.R = B3B312C119EEEDFEF915394DD177AF698027D325DEAC0B5DD053CF3AA56C179351AFC8CA3320CF13FD88575D47089408
3,512,866 UART: [art] SIG.S = A14FD23FD03F8E8F8A7E46F2E6377C533377D5DACBF5AF2269A17FFBB375BF51D624E488597B34BBBA2A019028427997
3,536,843 UART: Caliptra RT
3,537,186 UART: [state] CFI Enabled
3,656,881 UART: [rt] RT listening for mailbox commands...
3,657,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,061 UART: [rt]cmd =0x44504543, len=96
3,879,956 >>> mbox cmd response data (6236 bytes)
3,879,957 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,420 UART: [rt]cmd =0x52564348, len=36
3,911,930 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,280 ready_for_fw is high
1,363,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,861 >>> mbox cmd response: success
3,045,848 UART:
3,045,864 UART: Running Caliptra FMC ...
3,046,272 UART:
3,046,415 UART: [state] CFI Enabled
3,057,231 UART: [fht] FMC Alias Private Key: 7
3,176,797 UART: [art] Extend RT PCRs Done
3,177,225 UART: [art] Lock RT PCRs Done
3,178,693 UART: [art] Populate DV Done
3,186,872 UART: [fht] FMC Alias Private Key: 7
3,187,930 UART: [art] Derive CDI
3,188,210 UART: [art] Store in slot 0x4
3,273,684 UART: [art] Derive Key Pair
3,274,044 UART: [art] Store priv key in slot 0x5
3,287,353 UART: [art] Derive Key Pair - Done
3,302,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,318,741 UART: [art] PUB.X = BAAFFCB6BF1409C721B02D6C8A8EC1BB55846455EBB16FFDB5C3148C6A7683159035FA63F030873413AB84B75CBDB047
3,325,522 UART: [art] PUB.Y = 0EBD6E9205C725336D2E92313EA4F0E0BF32A5D86C4238936D6B9106E4EDED488BC7604D5840F514A95F53DA4D5C568C
3,332,469 UART: [art] SIG.R = 206EBACBBA4753F9CF9F5BD572AFC3EB4CE9FD1D06F806EE8C9B3D3B6B83CAE277DD9984F20A66B1A2FB9B16B811DDE8
3,339,262 UART: [art] SIG.S = A2282B32CB13BE7642A614132FE0D83C0D2D2CDD471ECA7765A58DE7D06924201292B08FBA0A92F7F341B14AC8955978
3,363,108 UART: Caliptra RT
3,363,451 UART: [state] CFI Enabled
3,483,887 UART: [rt] RT listening for mailbox commands...
3,484,557 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,955 UART: [rt]cmd =0x44504543, len=96
3,707,195 >>> mbox cmd response data (6236 bytes)
3,707,196 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,736,733 UART: [rt]cmd =0x52564348, len=36
3,739,373 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,617 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,623 UART: [kat] SHA2-512-ACC
906,524 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,234 UART: [fht] FHT @ 0x50003400
1,172,982 UART: [idev] ++
1,173,150 UART: [idev] CDI.KEYID = 6
1,173,511 UART: [idev] SUBJECT.KEYID = 7
1,173,936 UART: [idev] UDS.KEYID = 0
1,174,282 ready_for_fw is high
1,174,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,159 UART: [idev] Erasing UDS.KEYID = 0
1,198,741 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,562 UART: [ldev] ++
1,208,730 UART: [ldev] CDI.KEYID = 6
1,209,094 UART: [ldev] SUBJECT.KEYID = 5
1,209,521 UART: [ldev] AUTHORITY.KEYID = 7
1,209,984 UART: [ldev] FE.KEYID = 1
1,215,090 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,563 UART: [fwproc] Wait for Commands...
1,281,224 UART: [fwproc] Recv command 0x46574c44
1,281,957 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,901 >>> mbox cmd response: success
2,826,141 UART: [afmc] ++
2,826,309 UART: [afmc] CDI.KEYID = 6
2,826,672 UART: [afmc] SUBJECT.KEYID = 7
2,827,098 UART: [afmc] AUTHORITY.KEYID = 5
2,862,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,192 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,941 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,651 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,532 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,233 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,070 UART: [afmc] --
2,906,031 UART: [cold-reset] --
2,906,901 UART: [state] Locking Datavault
2,907,924 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,528 UART: [state] Locking ICCM
2,909,008 UART: [exit] Launching FMC @ 0x40000130
2,914,338 UART:
2,914,354 UART: Running Caliptra FMC ...
2,914,762 UART:
2,914,816 UART: [state] CFI Enabled
2,925,566 UART: [fht] FMC Alias Private Key: 7
3,044,616 UART: [art] Extend RT PCRs Done
3,045,044 UART: [art] Lock RT PCRs Done
3,046,628 UART: [art] Populate DV Done
3,055,195 UART: [fht] FMC Alias Private Key: 7
3,056,141 UART: [art] Derive CDI
3,056,421 UART: [art] Store in slot 0x4
3,141,842 UART: [art] Derive Key Pair
3,142,202 UART: [art] Store priv key in slot 0x5
3,155,384 UART: [art] Derive Key Pair - Done
3,170,191 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,451 UART: [art] PUB.X = CE8B3BD05DBCDEFD23F8EFBCB03279F2EB8F33BFBE66BA3A860008587DEF6266385E03AE6E479A787FC3400EF68E7E88
3,193,214 UART: [art] PUB.Y = 54810E12765F08F8CA5FBE96117FD53861AE4406479E7C02F2F37570B4BD30C59EA70B64BA326A2D8A7A27317C82FF99
3,200,151 UART: [art] SIG.R = 8FC44E3AB97E28B175B321186DAB7D2B4E775702111E99ED56604BD5C089F8A01A0CBD6B4FE563C16E8CD1A9B289AFD2
3,206,929 UART: [art] SIG.S = 096E11957B235945B57E5FB6CB0065202ECD4CFEDE31CE649A4A254A23C898C3C70A0C0BF821156B40F57C58DB0CCAAD
3,230,588 UART: Caliptra RT
3,230,839 UART: [state] CFI Enabled
3,350,658 UART: [rt] RT listening for mailbox commands...
3,351,328 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,800 UART: [rt]cmd =0x44504543, len=96
3,574,516 >>> mbox cmd response data (6236 bytes)
3,574,517 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,966 UART: [rt]cmd =0x52564348, len=36
3,606,276 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,564 ready_for_fw is high
1,059,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,448 >>> mbox cmd response: success
2,741,153 UART:
2,741,169 UART: Running Caliptra FMC ...
2,741,577 UART:
2,741,631 UART: [state] CFI Enabled
2,752,159 UART: [fht] FMC Alias Private Key: 7
2,870,603 UART: [art] Extend RT PCRs Done
2,871,031 UART: [art] Lock RT PCRs Done
2,872,851 UART: [art] Populate DV Done
2,880,848 UART: [fht] FMC Alias Private Key: 7
2,881,954 UART: [art] Derive CDI
2,882,234 UART: [art] Store in slot 0x4
2,968,299 UART: [art] Derive Key Pair
2,968,659 UART: [art] Store priv key in slot 0x5
2,981,973 UART: [art] Derive Key Pair - Done
2,996,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,777 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,542 UART: [art] PUB.X = F6D70D1E2EAFB5B118374FF21EB9D21EBD85A5F72847CEAA2EB73E67DCBA8E279B0B26EE293785DF0621D59DC307F98A
3,019,322 UART: [art] PUB.Y = 7FB42B4E491939DDAE5C9E5DE8B6F8C2198DEB1D69B6A67226129F513AE15D32814D7831498E0526A23BAFB5310317D6
3,026,270 UART: [art] SIG.R = B81FA375901801C8818682F92C51EEE92A87278319DDAE73A213D2A9FC05C966DFD0AE2FE545F276D04C44ED82C41F7E
3,033,042 UART: [art] SIG.S = 58683ACDAE9DBA08CF2E642A0E7040D25C40BE7104CA7BE5D4742F67CFD29CA9D308C029FDE591688FBE5EA4CE35BAC2
3,056,904 UART: Caliptra RT
3,057,155 UART: [state] CFI Enabled
3,176,554 UART: [rt] RT listening for mailbox commands...
3,177,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,762 UART: [rt]cmd =0x44504543, len=96
3,399,412 >>> mbox cmd response data (6236 bytes)
3,399,413 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,974 UART: [rt]cmd =0x52564348, len=36
3,431,654 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,814 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,620 UART: [kat] HMAC-384Kdf
921,354 UART: [kat] LMS
1,169,666 UART: [kat] --
1,170,655 UART: [cold-reset] ++
1,171,233 UART: [fht] FHT @ 0x50003400
1,173,945 UART: [idev] ++
1,174,113 UART: [idev] CDI.KEYID = 6
1,174,474 UART: [idev] SUBJECT.KEYID = 7
1,174,899 UART: [idev] UDS.KEYID = 0
1,175,245 ready_for_fw is high
1,175,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,878 UART: [idev] Erasing UDS.KEYID = 0
1,200,070 UART: [idev] Sha1 KeyId Algorithm
1,209,092 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,629 UART: [ldev] SUBJECT.KEYID = 5
1,211,056 UART: [ldev] AUTHORITY.KEYID = 7
1,211,519 UART: [ldev] FE.KEYID = 1
1,216,897 UART: [ldev] Erasing FE.KEYID = 1
1,242,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,833 UART: [ldev] --
1,282,242 UART: [fwproc] Wait for Commands...
1,282,937 UART: [fwproc] Recv command 0x46574c44
1,283,670 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,155 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,062 >>> mbox cmd response: success
2,827,242 UART: [afmc] ++
2,827,410 UART: [afmc] CDI.KEYID = 6
2,827,773 UART: [afmc] SUBJECT.KEYID = 7
2,828,199 UART: [afmc] AUTHORITY.KEYID = 5
2,863,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,905 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,654 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,364 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,245 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,946 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,675 UART: [afmc] --
2,906,720 UART: [cold-reset] --
2,907,746 UART: [state] Locking Datavault
2,908,813 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,417 UART: [state] Locking ICCM
2,909,923 UART: [exit] Launching FMC @ 0x40000130
2,915,253 UART:
2,915,269 UART: Running Caliptra FMC ...
2,915,677 UART:
2,915,820 UART: [state] CFI Enabled
2,926,318 UART: [fht] FMC Alias Private Key: 7
3,045,312 UART: [art] Extend RT PCRs Done
3,045,740 UART: [art] Lock RT PCRs Done
3,047,206 UART: [art] Populate DV Done
3,055,403 UART: [fht] FMC Alias Private Key: 7
3,056,475 UART: [art] Derive CDI
3,056,755 UART: [art] Store in slot 0x4
3,142,700 UART: [art] Derive Key Pair
3,143,060 UART: [art] Store priv key in slot 0x5
3,156,304 UART: [art] Derive Key Pair - Done
3,171,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,405 UART: [art] PUB.X = 55D67B163E49AAF3B20F94C435483E150AE0FD0C6826A91FA5EE9E79C101E63AB77973B31ABD8DCA00C0951F9AECF4E9
3,194,157 UART: [art] PUB.Y = F70CCDD0956F3500987D3C6379874A70A9420272918E1FFEC729CC0080D78E7BFB06387C7454D71322E86F43B8A7CEE6
3,201,054 UART: [art] SIG.R = 9404B520F067D443243E687A988DF6910D905BBC8243D94DEE344D67BF1D4CD0FD500FBA424F8A94C3741BAF02F6870D
3,207,815 UART: [art] SIG.S = 599066D7DB7FEE19C0385DECB2680EA8B3529F6819DCA00E8DD033AE2FCF46D45955C406D8359AA0C9AC689E5D09E35F
3,231,617 UART: Caliptra RT
3,231,960 UART: [state] CFI Enabled
3,351,917 UART: [rt] RT listening for mailbox commands...
3,352,587 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,871 UART: [rt]cmd =0x44504543, len=96
3,574,877 >>> mbox cmd response data (6236 bytes)
3,574,878 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,609 UART: [rt]cmd =0x52564348, len=36
3,606,791 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,067 ready_for_fw is high
1,059,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,743 >>> mbox cmd response: success
2,741,342 UART:
2,741,358 UART: Running Caliptra FMC ...
2,741,766 UART:
2,741,909 UART: [state] CFI Enabled
2,752,787 UART: [fht] FMC Alias Private Key: 7
2,871,477 UART: [art] Extend RT PCRs Done
2,871,905 UART: [art] Lock RT PCRs Done
2,873,365 UART: [art] Populate DV Done
2,881,528 UART: [fht] FMC Alias Private Key: 7
2,882,588 UART: [art] Derive CDI
2,882,868 UART: [art] Store in slot 0x4
2,968,543 UART: [art] Derive Key Pair
2,968,903 UART: [art] Store priv key in slot 0x5
2,982,399 UART: [art] Derive Key Pair - Done
2,997,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,465 UART: [art] PUB.X = 488DDB2D6B01AC7FAC4C75015CE9BC1B887746B9E32C708B73BCFB5E65B6739DDE0AC2ABA58C046B9CA463B9B2DC0B7B
3,020,246 UART: [art] PUB.Y = 8190D15E0CFA76B86C89E7A955248F356EB81CABBBC2209C3ED130C9390B526043EA3D0A3070BA64EE62EBF2630F6940
3,027,192 UART: [art] SIG.R = 429B0B14CD37BE515E058B14BB4CEE522398F4DAE4E93786E6D71C8D61B008FAC26BF5F824037A67026680CD9AC912E1
3,033,955 UART: [art] SIG.S = 649EE73CEA08BAEF63FEC276DA86C6A4B6720CA4A982DFA2DA21662F8F729686190DFFDE793B258DF18512153109E4A0
3,058,097 UART: Caliptra RT
3,058,440 UART: [state] CFI Enabled
3,177,746 UART: [rt] RT listening for mailbox commands...
3,178,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,626 UART: [rt]cmd =0x44504543, len=96
3,401,088 >>> mbox cmd response data (6236 bytes)
3,401,089 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,430,690 UART: [rt]cmd =0x52564348, len=36
3,433,426 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,606 UART: [state] LifecycleState = Unprovisioned
85,261 UART: [state] DebugLocked = No
85,779 UART: [state] WD Timer not started. Device not locked for debugging
87,066 UART: [kat] SHA2-256
892,716 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,841 UART: [kat] ++
896,993 UART: [kat] sha1
901,151 UART: [kat] SHA2-256
903,091 UART: [kat] SHA2-384
905,666 UART: [kat] SHA2-512-ACC
907,567 UART: [kat] ECC-384
916,998 UART: [kat] HMAC-384Kdf
921,524 UART: [kat] LMS
1,169,852 UART: [kat] --
1,170,697 UART: [cold-reset] ++
1,171,169 UART: [fht] FHT @ 0x50003400
1,174,026 UART: [idev] ++
1,174,194 UART: [idev] CDI.KEYID = 6
1,174,554 UART: [idev] SUBJECT.KEYID = 7
1,174,978 UART: [idev] UDS.KEYID = 0
1,175,323 ready_for_fw is high
1,175,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,690 UART: [idev] Erasing UDS.KEYID = 0
1,199,249 UART: [idev] Sha1 KeyId Algorithm
1,207,653 UART: [idev] --
1,208,553 UART: [ldev] ++
1,208,721 UART: [ldev] CDI.KEYID = 6
1,209,084 UART: [ldev] SUBJECT.KEYID = 5
1,209,510 UART: [ldev] AUTHORITY.KEYID = 7
1,209,973 UART: [ldev] FE.KEYID = 1
1,215,397 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,859 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,575 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,167 UART: [ldev] --
1,281,578 UART: [fwproc] Wait for Commands...
1,282,360 UART: [fwproc] Recv command 0x46574c44
1,283,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,354 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,219 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,756 >>> mbox cmd response: success
2,827,964 UART: [afmc] ++
2,828,132 UART: [afmc] CDI.KEYID = 6
2,828,494 UART: [afmc] SUBJECT.KEYID = 7
2,828,919 UART: [afmc] AUTHORITY.KEYID = 5
2,864,730 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,077 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,417 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,118 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,844 UART: [afmc] --
2,907,882 UART: [cold-reset] --
2,908,744 UART: [state] Locking Datavault
2,909,765 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,369 UART: [state] Locking ICCM
2,910,967 UART: [exit] Launching FMC @ 0x40000130
2,916,297 UART:
2,916,313 UART: Running Caliptra FMC ...
2,916,721 UART:
2,916,775 UART: [state] CFI Enabled
2,927,185 UART: [fht] FMC Alias Private Key: 7
3,046,233 UART: [art] Extend RT PCRs Done
3,046,661 UART: [art] Lock RT PCRs Done
3,048,299 UART: [art] Populate DV Done
3,056,452 UART: [fht] FMC Alias Private Key: 7
3,057,440 UART: [art] Derive CDI
3,057,720 UART: [art] Store in slot 0x4
3,143,439 UART: [art] Derive Key Pair
3,143,799 UART: [art] Store priv key in slot 0x5
3,156,255 UART: [art] Derive Key Pair - Done
3,170,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,068 UART: [art] PUB.X = 7F9341A473155C1B12389297B33265E0CB8204F28286D29C643A311C2DA7E5EF4A080C4897DA2B9FF3E4D4855D4B6194
3,193,825 UART: [art] PUB.Y = B9CEE4DE52292A97F58778A10699DD0E0B9BBED7082C920C6439C8D1F5A22757427EF3C1A831BE0B91D684C84184B5CC
3,200,765 UART: [art] SIG.R = F1A05D415AF0B4251CD831B64E766888E1F33403C647CE813FE1A326C63C9A359DF16CCF5B36408821238B20FC968697
3,207,530 UART: [art] SIG.S = FB6B2131CDC58D3420C44F8C60F64001EA85464EC3F96EB329D6D8F18B048892EF3410D348E47C8FF8D874510FFAFBBA
3,231,777 UART: Caliptra RT
3,232,028 UART: [state] CFI Enabled
3,351,630 UART: [rt] RT listening for mailbox commands...
3,352,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,588 UART: [rt]cmd =0x44504543, len=96
3,575,261 >>> mbox cmd response data (6236 bytes)
3,575,262 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,807 UART: [rt]cmd =0x52564348, len=36
3,607,213 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,190 >>> mbox cmd response: success
2,741,193 UART:
2,741,209 UART: Running Caliptra FMC ...
2,741,617 UART:
2,741,671 UART: [state] CFI Enabled
2,751,911 UART: [fht] FMC Alias Private Key: 7
2,870,749 UART: [art] Extend RT PCRs Done
2,871,177 UART: [art] Lock RT PCRs Done
2,873,025 UART: [art] Populate DV Done
2,880,964 UART: [fht] FMC Alias Private Key: 7
2,882,112 UART: [art] Derive CDI
2,882,392 UART: [art] Store in slot 0x4
2,968,381 UART: [art] Derive Key Pair
2,968,741 UART: [art] Store priv key in slot 0x5
2,982,513 UART: [art] Derive Key Pair - Done
2,997,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,670 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,435 UART: [art] PUB.X = 911E716B81BBD4B04B9916D28F3F8FD99581E31B0BAB8C752C326FC8CD4179FB61F3155782A9C64588786EB7EC3C1F1E
3,020,210 UART: [art] PUB.Y = B6463BF4742CA121C919F136221C22C698FA9B452F469FA154B2634350483DA0D923A77F8E1DCD81783031FE295C7EEA
3,027,160 UART: [art] SIG.R = 2A43C0C19ACCB0901A5AFAE0D14583507B9290BF2B8BEA495A6F363D76EE2E6A801D1CD5FDC8D295D354E79101CB964F
3,033,943 UART: [art] SIG.S = 048CF0FA8F57BAFEEDB6415F7096F05C5E1236DC1488461C04EB8908CB9DAB4B159DD0CBBB152E94F04AD15935D50249
3,057,681 UART: Caliptra RT
3,057,932 UART: [state] CFI Enabled
3,177,650 UART: [rt] RT listening for mailbox commands...
3,178,320 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,876 UART: [rt]cmd =0x44504543, len=96
3,401,785 >>> mbox cmd response data (6236 bytes)
3,401,786 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,271 UART: [rt]cmd =0x52564348, len=36
3,433,661 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,764 UART: [kat] SHA2-256
903,704 UART: [kat] SHA2-384
906,379 UART: [kat] SHA2-512-ACC
908,280 UART: [kat] ECC-384
918,605 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,512 UART: [cold-reset] ++
1,172,990 UART: [fht] FHT @ 0x50003400
1,175,581 UART: [idev] ++
1,175,749 UART: [idev] CDI.KEYID = 6
1,176,109 UART: [idev] SUBJECT.KEYID = 7
1,176,533 UART: [idev] UDS.KEYID = 0
1,176,878 ready_for_fw is high
1,176,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,291 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,426 UART: [idev] --
1,211,370 UART: [ldev] ++
1,211,538 UART: [ldev] CDI.KEYID = 6
1,211,901 UART: [ldev] SUBJECT.KEYID = 5
1,212,327 UART: [ldev] AUTHORITY.KEYID = 7
1,212,790 UART: [ldev] FE.KEYID = 1
1,218,150 UART: [ldev] Erasing FE.KEYID = 1
1,244,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,342 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,664 UART: [ldev] --
1,284,151 UART: [fwproc] Wait for Commands...
1,284,883 UART: [fwproc] Recv command 0x46574c44
1,285,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,252 >>> mbox cmd response: success
2,830,302 UART: [afmc] ++
2,830,470 UART: [afmc] CDI.KEYID = 6
2,830,832 UART: [afmc] SUBJECT.KEYID = 7
2,831,257 UART: [afmc] AUTHORITY.KEYID = 5
2,866,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,323 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,915 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,616 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,428 UART: [afmc] --
2,910,442 UART: [cold-reset] --
2,911,210 UART: [state] Locking Datavault
2,912,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,043 UART: [state] Locking ICCM
2,913,647 UART: [exit] Launching FMC @ 0x40000130
2,918,977 UART:
2,918,993 UART: Running Caliptra FMC ...
2,919,401 UART:
2,919,544 UART: [state] CFI Enabled
2,929,916 UART: [fht] FMC Alias Private Key: 7
3,048,880 UART: [art] Extend RT PCRs Done
3,049,308 UART: [art] Lock RT PCRs Done
3,050,836 UART: [art] Populate DV Done
3,059,171 UART: [fht] FMC Alias Private Key: 7
3,060,261 UART: [art] Derive CDI
3,060,541 UART: [art] Store in slot 0x4
3,146,654 UART: [art] Derive Key Pair
3,147,014 UART: [art] Store priv key in slot 0x5
3,160,322 UART: [art] Derive Key Pair - Done
3,175,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,755 UART: [art] PUB.X = 5C7130DFFABAA7E62171812600CD1936098DFFD218A01AD2E83D5793DC5E3AFC5C53A4E40DD977180E9FFF2622BFB708
3,198,505 UART: [art] PUB.Y = F3D3DB466435567D21A7F45FC05133A6EDA9A762D4EB1595F633C1D74D55AA33537AB20D7D11131FBC7C9F78CC4C3D9F
3,205,464 UART: [art] SIG.R = ACA7F961E5ECFCC48B9F24E5D21D567A27B967A9D9E2F45F57431AD845FC1703038C5E8FE4929A8CDA7FF9461B4DA045
3,212,244 UART: [art] SIG.S = 2D88D0ABE0B6788B650C36157B0FEB5942449B5529C215948F1375DDEA0C2BC3126424EA5FC0BEC4917A78A086CDF729
3,235,749 UART: Caliptra RT
3,236,092 UART: [state] CFI Enabled
3,355,297 UART: [rt] RT listening for mailbox commands...
3,355,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,489 UART: [rt]cmd =0x44504543, len=96
3,578,548 >>> mbox cmd response data (6236 bytes)
3,578,549 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,932 UART: [rt]cmd =0x52564348, len=36
3,610,468 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,004 ready_for_fw is high
1,060,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,901 >>> mbox cmd response: success
2,742,220 UART:
2,742,236 UART: Running Caliptra FMC ...
2,742,644 UART:
2,742,787 UART: [state] CFI Enabled
2,753,429 UART: [fht] FMC Alias Private Key: 7
2,872,673 UART: [art] Extend RT PCRs Done
2,873,101 UART: [art] Lock RT PCRs Done
2,874,533 UART: [art] Populate DV Done
2,882,696 UART: [fht] FMC Alias Private Key: 7
2,883,844 UART: [art] Derive CDI
2,884,124 UART: [art] Store in slot 0x4
2,969,895 UART: [art] Derive Key Pair
2,970,255 UART: [art] Store priv key in slot 0x5
2,983,695 UART: [art] Derive Key Pair - Done
2,998,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,789 UART: [art] PUB.X = ACFC9C0D4BFEC8F5A46408FF6EFB987C498BD18CFCB345AAEF65CDC6B3C41ECC7FB92F7B3A506EDBE869D5AFB9C574DE
3,021,595 UART: [art] PUB.Y = 49D9CC450CC0BBF0F5D5583253D85DA783A182443ED3C65544F8C1AD6ED97508C4072151B6DDCD2CBACB727F1D4B1F20
3,028,550 UART: [art] SIG.R = 0A095BA163D66C9147F49830ABC2E04AE7E10942DDD0BAC0D8B6D1C712D464021353B8C7849058DDC3168510F666776F
3,035,308 UART: [art] SIG.S = F1D703216E02963731B6B5FED4AFA3402265F4515341A45E2B6CB8F7ACBF79DE92C14078F47CAF27CE187B4231ABFECE
3,059,156 UART: Caliptra RT
3,059,499 UART: [state] CFI Enabled
3,180,160 UART: [rt] RT listening for mailbox commands...
3,180,830 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,972 UART: [rt]cmd =0x44504543, len=96
3,402,369 >>> mbox cmd response data (6236 bytes)
3,402,370 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,933 UART: [rt]cmd =0x52564348, len=36
3,434,297 >>> mbox cmd response data (8 bytes)
test test_revoke_exported_cdi_handle::test_revoke_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
191,980 UART:
192,340 UART: Running Caliptra ROM ...
193,448 UART:
193,592 UART: [state] CFI Enabled
266,723 UART: [state] LifecycleState = Unprovisioned
268,653 UART: [state] DebugLocked = No
271,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,652 UART: [kat] SHA2-256
446,404 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,858 UART: [kat] ++
457,306 UART: [kat] sha1
466,831 UART: [kat] SHA2-256
469,487 UART: [kat] SHA2-384
476,914 UART: [kat] SHA2-512-ACC
479,287 UART: [kat] ECC-384
2,769,517 UART: [kat] HMAC-384Kdf
2,799,298 UART: [kat] LMS
3,989,623 UART: [kat] --
3,994,994 UART: [cold-reset] ++
3,997,357 UART: [fht] Storing FHT @ 0x50003400
4,009,757 UART: [idev] ++
4,010,397 UART: [idev] CDI.KEYID = 6
4,011,311 UART: [idev] SUBJECT.KEYID = 7
4,012,555 UART: [idev] UDS.KEYID = 0
4,013,603 ready_for_fw is high
4,013,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,907 UART: [idev] Erasing UDS.KEYID = 0
7,346,981 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,954 UART: [idev] --
7,372,261 UART: [ldev] ++
7,372,832 UART: [ldev] CDI.KEYID = 6
7,373,852 UART: [ldev] SUBJECT.KEYID = 5
7,375,009 UART: [ldev] AUTHORITY.KEYID = 7
7,376,245 UART: [ldev] FE.KEYID = 1
7,422,280 UART: [ldev] Erasing FE.KEYID = 1
10,757,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,137 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,427 UART: [ldev] --
13,137,419 UART: [fwproc] Waiting for Commands...
13,139,074 UART: [fwproc] Received command 0x46574c44
13,141,258 UART: [fwproc] Received Image of size 118548 bytes
17,250,671 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,397,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,726,169 >>> mbox cmd response: success
17,730,793 UART: [afmc] ++
17,731,397 UART: [afmc] CDI.KEYID = 6
17,732,311 UART: [afmc] SUBJECT.KEYID = 7
17,733,591 UART: [afmc] AUTHORITY.KEYID = 5
21,092,150 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,393,254 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,921 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,698 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,094 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,738 UART: [afmc] --
23,463,383 UART: [cold-reset] --
23,468,807 UART: [state] Locking Datavault
23,474,734 UART: [state] Locking PCR0, PCR1 and PCR31
23,476,538 UART: [state] Locking ICCM
23,478,994 UART: [exit] Launching FMC @ 0x40000130
23,487,401 UART:
23,487,637 UART: Running Caliptra FMC ...
23,488,737 UART:
23,488,898 UART: [state] CFI Enabled
23,552,268 UART: [fht] FMC Alias Private Key: 7
25,893,068 UART: [art] Extend RT PCRs Done
25,894,293 UART: [art] Lock RT PCRs Done
25,896,001 UART: [art] Populate DV Done
25,901,309 UART: [fht] FMC Alias Private Key: 7
25,902,900 UART: [art] Derive CDI
25,903,713 UART: [art] Store in slot 0x4
25,961,363 UART: [art] Derive Key Pair
25,962,406 UART: [art] Store priv key in slot 0x5
29,255,047 UART: [art] Derive Key Pair - Done
29,268,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,558,617 UART: [art] PUB.X = 4FDB8E751CC6D24DCB7A072AAF667D11CF68256C18642259C968DA4AA5363A6BD926128E032A7F81429F1E6839FD0C3F
31,565,922 UART: [art] PUB.Y = 09AC4C70EE5E55B5C67877C1C74D668394D08AB5090A9E37631CF230922849A66A64D0DD2AECAFBC3EBD2A28A2803A09
31,573,161 UART: [art] SIG.R = FFE816C3563966DF2ADDED16B40ACADD694E225BE7B106E7E17B26041C3D9753631AB034190D77807C70CCEDEB77AD58
31,580,550 UART: [art] SIG.S = 6190194B20D767DD4430AE77415B2682730AD6CF12C9A85B27EE09FEFFBED23142BF5406BD7A1AFEBFB73B2DD1DF53E4
32,886,308 UART: Caliptra RT
32,887,031 UART: [state] CFI Enabled
33,062,195 UART: [rt] RT listening for mailbox commands...
33,064,095 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,094,084 UART: [rt]cmd =0x52564348, len=36
33,096,154 >>> mbox cmd response: failed
33,096,493 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,126,454 UART: [rt]cmd =0x52564348, len=36
33,128,317 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,918 writing to cptra_bootfsm_go
3,785,274 ready_for_fw is high
3,785,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,957,434 >>> mbox cmd response: success
23,644,867 UART:
23,645,264 UART: Running Caliptra FMC ...
23,646,408 UART:
23,646,574 UART: [state] CFI Enabled
23,710,429 UART: [fht] FMC Alias Private Key: 7
26,051,006 UART: [art] Extend RT PCRs Done
26,052,240 UART: [art] Lock RT PCRs Done
26,053,780 UART: [art] Populate DV Done
26,059,269 UART: [fht] FMC Alias Private Key: 7
26,060,814 UART: [art] Derive CDI
26,061,629 UART: [art] Store in slot 0x4
26,119,433 UART: [art] Derive Key Pair
26,120,478 UART: [art] Store priv key in slot 0x5
29,412,953 UART: [art] Derive Key Pair - Done
29,426,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,714,795 UART: [art] Erasing AUTHORITY.KEYID = 7
31,716,297 UART: [art] PUB.X = 40FA32F7937B1F3E76A6931451C70DCE0B944C353640068F6DE95DD8F970FBCA34738618641E3599686666723B54A912
31,723,544 UART: [art] PUB.Y = 53583C59AE00F0EFE43BB947A8CCB564C4704D8A0BEA5D209E0903B4D6DC81EC0938B261950F3153D749E76EB8F897B7
31,730,795 UART: [art] SIG.R = ABE402B72581A69A436DAFBCEE5134A704F9696093410E1BC29FB423FFF4AFE49484D883913905A7F1FEDA9834C32FB2
31,738,189 UART: [art] SIG.S = 52A23A4E1AFE309A99051210A3177470975A86009264309CA33E24D0FDC955E9CA048900B91141285F2CE1D346B7609C
33,043,082 UART: Caliptra RT
33,043,807 UART: [state] CFI Enabled
33,221,729 UART: [rt] RT listening for mailbox commands...
33,223,615 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,253,920 UART: [rt]cmd =0x52564348, len=36
33,255,944 >>> mbox cmd response: failed
33,256,271 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,286,277 UART: [rt]cmd =0x52564348, len=36
33,288,460 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,352 UART:
192,736 UART: Running Caliptra ROM ...
193,833 UART:
603,498 UART: [state] CFI Enabled
618,655 UART: [state] LifecycleState = Unprovisioned
620,596 UART: [state] DebugLocked = No
622,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,490 UART: [kat] SHA2-256
796,285 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,798 UART: [kat] ++
807,241 UART: [kat] sha1
818,128 UART: [kat] SHA2-256
820,813 UART: [kat] SHA2-384
826,875 UART: [kat] SHA2-512-ACC
829,180 UART: [kat] ECC-384
3,113,911 UART: [kat] HMAC-384Kdf
3,125,432 UART: [kat] LMS
4,315,585 UART: [kat] --
4,321,727 UART: [cold-reset] ++
4,322,807 UART: [fht] Storing FHT @ 0x50003400
4,333,809 UART: [idev] ++
4,334,418 UART: [idev] CDI.KEYID = 6
4,335,454 UART: [idev] SUBJECT.KEYID = 7
4,336,643 UART: [idev] UDS.KEYID = 0
4,337,624 ready_for_fw is high
4,337,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,515 UART: [idev] Erasing UDS.KEYID = 0
7,627,642 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,876 UART: [idev] --
7,654,622 UART: [ldev] ++
7,655,188 UART: [ldev] CDI.KEYID = 6
7,656,147 UART: [ldev] SUBJECT.KEYID = 5
7,657,351 UART: [ldev] AUTHORITY.KEYID = 7
7,658,630 UART: [ldev] FE.KEYID = 1
7,671,160 UART: [ldev] Erasing FE.KEYID = 1
10,960,323 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,181 UART: [ldev] --
13,318,197 UART: [fwproc] Waiting for Commands...
13,320,441 UART: [fwproc] Received command 0x46574c44
13,322,670 UART: [fwproc] Received Image of size 118548 bytes
17,436,037 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,511,866 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,055 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,914,401 >>> mbox cmd response: success
17,919,225 UART: [afmc] ++
17,919,825 UART: [afmc] CDI.KEYID = 6
17,920,706 UART: [afmc] SUBJECT.KEYID = 7
17,921,968 UART: [afmc] AUTHORITY.KEYID = 5
21,241,250 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,901 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,536,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,550,631 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,565,354 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,579,739 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,000 UART: [afmc] --
23,603,265 UART: [cold-reset] --
23,607,981 UART: [state] Locking Datavault
23,614,474 UART: [state] Locking PCR0, PCR1 and PCR31
23,616,261 UART: [state] Locking ICCM
23,618,550 UART: [exit] Launching FMC @ 0x40000130
23,626,944 UART:
23,627,184 UART: Running Caliptra FMC ...
23,628,278 UART:
23,628,431 UART: [state] CFI Enabled
23,636,741 UART: [fht] FMC Alias Private Key: 7
25,976,341 UART: [art] Extend RT PCRs Done
25,977,558 UART: [art] Lock RT PCRs Done
25,979,172 UART: [art] Populate DV Done
25,984,471 UART: [fht] FMC Alias Private Key: 7
25,986,167 UART: [art] Derive CDI
25,986,977 UART: [art] Store in slot 0x4
26,029,676 UART: [art] Derive Key Pair
26,030,719 UART: [art] Store priv key in slot 0x5
29,272,838 UART: [art] Derive Key Pair - Done
29,285,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,518 UART: [art] PUB.X = 3DADF6DE27665A39CAEAF9286A4BFA10AD0B076A5C7666AB081BB36231A627C677B7FA08744E6DE8B7498E14E7A8FFD9
31,574,326 UART: [art] PUB.Y = DCD4C9190C83AF96B25982C8DD2C125635E900DA2E090D626DDAA5C31A4381FC8D5A5A8E29E5B4127210C6348E1E55A9
31,581,557 UART: [art] SIG.R = C61AA5616CF8F19FE61C8F8F42E626280416617025DFAECA1C16C293DD142C8656E2E88B45AF29766630D7FB4B42D0C5
31,588,939 UART: [art] SIG.S = B55D80925DA5ED8D8F9DBAEA9331B66E03E9668C178F7F9096DC9FA166E00B8647338216A27F167CCF55AA1D5F256201
32,893,934 UART: Caliptra RT
32,895,203 UART: [state] CFI Enabled
33,028,442 UART: [rt] RT listening for mailbox commands...
33,030,358 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,060,530 UART: [rt]cmd =0x52564348, len=36
33,062,653 >>> mbox cmd response: failed
33,062,989 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,092,996 UART: [rt]cmd =0x52564348, len=36
33,095,175 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
4,123,389 ready_for_fw is high
4,123,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,160,004 >>> mbox cmd response: success
23,805,713 UART:
23,806,103 UART: Running Caliptra FMC ...
23,807,304 UART:
23,807,470 UART: [state] CFI Enabled
23,815,243 UART: [fht] FMC Alias Private Key: 7
26,155,166 UART: [art] Extend RT PCRs Done
26,156,400 UART: [art] Lock RT PCRs Done
26,157,763 UART: [art] Populate DV Done
26,163,177 UART: [fht] FMC Alias Private Key: 7
26,164,774 UART: [art] Derive CDI
26,165,508 UART: [art] Store in slot 0x4
26,208,207 UART: [art] Derive Key Pair
26,209,244 UART: [art] Store priv key in slot 0x5
29,451,625 UART: [art] Derive Key Pair - Done
29,464,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,530 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,056 UART: [art] PUB.X = 31154CC924D5865A3F5D261F36D0E39978A5803B0FC93E2881AB97A9DDE17BCF26D38A879BCBC8FB79DBDCCF7E682622
31,753,309 UART: [art] PUB.Y = 597D08B907C5EA0D047368902DD986DDD7EC5AFF7E917C984733DFBFF265392353885FD2F4DF79FB95186000B4D8D713
31,760,547 UART: [art] SIG.R = E2FDBB042D1BB4B25B0AE7973C8BB2F0EB5EE706F1DFF07FE0F58FEFEE09C8185AE75D490E19FF2F2A3D7F0583B3A79F
31,767,939 UART: [art] SIG.S = 389443DA143CAFDF426FDF76AB7B9F11CA9CA68FA80B1C021B4BF140711B083A4BA63C5BE92333BEF8C8C5348EB26709
33,073,516 UART: Caliptra RT
33,074,223 UART: [state] CFI Enabled
33,207,161 UART: [rt] RT listening for mailbox commands...
33,209,040 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,239,117 UART: [rt]cmd =0x52564348, len=36
33,240,955 >>> mbox cmd response: failed
33,241,255 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
33,271,200 UART: [rt]cmd =0x52564348, len=36
33,273,375 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,983 UART:
192,362 UART: Running Caliptra ROM ...
193,505 UART:
193,653 UART: [state] CFI Enabled
268,329 UART: [state] LifecycleState = Unprovisioned
270,241 UART: [state] DebugLocked = No
271,495 UART: [state] WD Timer not started. Device not locked for debugging
275,404 UART: [kat] SHA2-256
455,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,847 UART: [kat] ++
466,298 UART: [kat] sha1
477,238 UART: [kat] SHA2-256
479,955 UART: [kat] SHA2-384
486,329 UART: [kat] SHA2-512-ACC
488,755 UART: [kat] ECC-384
2,949,939 UART: [kat] HMAC-384Kdf
2,972,776 UART: [kat] LMS
3,449,218 UART: [kat] --
3,453,582 UART: [cold-reset] ++
3,455,233 UART: [fht] FHT @ 0x50003400
3,466,771 UART: [idev] ++
3,467,328 UART: [idev] CDI.KEYID = 6
3,468,351 UART: [idev] SUBJECT.KEYID = 7
3,469,518 UART: [idev] UDS.KEYID = 0
3,470,558 ready_for_fw is high
3,470,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,924 UART: [idev] Erasing UDS.KEYID = 0
5,988,056 UART: [idev] Sha1 KeyId Algorithm
6,011,507 UART: [idev] --
6,016,281 UART: [ldev] ++
6,016,851 UART: [ldev] CDI.KEYID = 6
6,017,752 UART: [ldev] SUBJECT.KEYID = 5
6,018,964 UART: [ldev] AUTHORITY.KEYID = 7
6,020,247 UART: [ldev] FE.KEYID = 1
6,058,572 UART: [ldev] Erasing FE.KEYID = 1
8,565,883 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,994 UART: [ldev] --
10,374,478 UART: [fwproc] Wait for Commands...
10,376,088 UART: [fwproc] Recv command 0x46574c44
10,378,127 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,636 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,641 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,617 >>> mbox cmd response: success
14,343,889 UART: [afmc] ++
14,344,482 UART: [afmc] CDI.KEYID = 6
14,345,391 UART: [afmc] SUBJECT.KEYID = 7
14,346,606 UART: [afmc] AUTHORITY.KEYID = 5
16,894,331 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,059 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,238 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,016 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,094 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,665 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,755 UART: [afmc] --
18,694,502 UART: [cold-reset] --
18,697,928 UART: [state] Locking Datavault
18,704,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,320 UART: [state] Locking ICCM
18,708,323 UART: [exit] Launching FMC @ 0x40000130
18,716,718 UART:
18,716,949 UART: Running Caliptra FMC ...
18,718,043 UART:
18,718,208 UART: [state] CFI Enabled
18,774,881 UART: [fht] FMC Alias Private Key: 7
20,541,162 UART: [art] Extend RT PCRs Done
20,542,386 UART: [art] Lock RT PCRs Done
20,543,934 UART: [art] Populate DV Done
20,549,506 UART: [fht] FMC Alias Private Key: 7
20,551,197 UART: [art] Derive CDI
20,551,929 UART: [art] Store in slot 0x4
20,607,393 UART: [art] Derive Key Pair
20,608,432 UART: [art] Store priv key in slot 0x5
23,071,451 UART: [art] Derive Key Pair - Done
23,084,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,213 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,716 UART: [art] PUB.X = 4D360B15FFE96C968B6F78E1E0A8B81226A92464F61D689AAC69603CA2AA4F7DC4B680B0EE7D3BACAC41A47067FF1DF5
24,806,047 UART: [art] PUB.Y = 0E433BC55D5F6F40B32D07F7BD5A78669BE3572380ABB18CDF800104CB0B1E9C6A9B53B9495D8E9B22E86C80C4885388
24,813,301 UART: [art] SIG.R = 8EE46F4B9B4B823C00BAC827DD48877BA05F467DCE746BDCF255F89871726F06DAC421726647F067AE00104B1EE391E2
24,820,638 UART: [art] SIG.S = 51ACFFD1BDD0222D81676CB63546259E2C03BEA498928160EE63E78B19C75C0DE23F85F57B94B46A6F847FC698BDEBEA
25,799,991 UART: Caliptra RT
25,800,894 UART: [state] CFI Enabled
25,984,458 UART: [rt] RT listening for mailbox commands...
25,986,348 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,016,350 UART: [rt]cmd =0x52564348, len=36
26,018,727 >>> mbox cmd response: failed
26,019,143 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,049,047 UART: [rt]cmd =0x52564348, len=36
26,050,805 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,461,188 ready_for_fw is high
3,461,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,791 >>> mbox cmd response: success
18,510,778 UART:
18,511,187 UART: Running Caliptra FMC ...
18,512,294 UART:
18,512,446 UART: [state] CFI Enabled
18,580,445 UART: [fht] FMC Alias Private Key: 7
20,346,994 UART: [art] Extend RT PCRs Done
20,348,232 UART: [art] Lock RT PCRs Done
20,349,831 UART: [art] Populate DV Done
20,355,366 UART: [fht] FMC Alias Private Key: 7
20,357,013 UART: [art] Derive CDI
20,357,753 UART: [art] Store in slot 0x4
20,414,093 UART: [art] Derive Key Pair
20,415,137 UART: [art] Store priv key in slot 0x5
22,877,393 UART: [art] Derive Key Pair - Done
22,890,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,892 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,403 UART: [art] PUB.X = 7D1A6A2AE84439D5C6C5E2D08DFF72B88289B85F9B6879B41BC04E480A78557FF6326DBB1981675F61F1548262BB2231
24,611,651 UART: [art] PUB.Y = 672DB9C52A2848CE301DA85E1E5392B00331EDD217CF4938411A84AA40B4D94511497C75C65CC78E8ECEE7A8B042C2F2
24,618,899 UART: [art] SIG.R = 5DA3418025F6A46CDAB6DC3B4B19958C4165F696E57767FCD6D4BFA3BB1D2FC37E7D2A03E38818F864D4212835AABA1F
24,626,444 UART: [art] SIG.S = A6F6C3404A1C69CB453FD8FDDD39B53F3A3639EAD6752BF6BEA59F170012DCAE4BA7E71E54845CCF6F520DC8227C0672
25,605,411 UART: Caliptra RT
25,606,131 UART: [state] CFI Enabled
25,786,329 UART: [rt] RT listening for mailbox commands...
25,788,198 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,818,545 UART: [rt]cmd =0x52564348, len=36
25,820,404 >>> mbox cmd response: failed
25,820,706 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,850,917 UART: [rt]cmd =0x52564348, len=36
25,853,024 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,497 UART:
192,863 UART: Running Caliptra ROM ...
193,997 UART:
603,665 UART: [state] CFI Enabled
620,680 UART: [state] LifecycleState = Unprovisioned
622,782 UART: [state] DebugLocked = No
624,197 UART: [state] WD Timer not started. Device not locked for debugging
627,182 UART: [kat] SHA2-256
806,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,627 UART: [kat] ++
818,093 UART: [kat] sha1
829,047 UART: [kat] SHA2-256
831,701 UART: [kat] SHA2-384
837,482 UART: [kat] SHA2-512-ACC
839,859 UART: [kat] ECC-384
3,280,623 UART: [kat] HMAC-384Kdf
3,291,866 UART: [kat] LMS
3,768,340 UART: [kat] --
3,772,780 UART: [cold-reset] ++
3,773,871 UART: [fht] FHT @ 0x50003400
3,785,206 UART: [idev] ++
3,785,847 UART: [idev] CDI.KEYID = 6
3,786,759 UART: [idev] SUBJECT.KEYID = 7
3,788,009 UART: [idev] UDS.KEYID = 0
3,788,945 ready_for_fw is high
3,789,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,006 UART: [idev] Erasing UDS.KEYID = 0
6,263,785 UART: [idev] Sha1 KeyId Algorithm
6,286,679 UART: [idev] --
6,292,238 UART: [ldev] ++
6,292,869 UART: [ldev] CDI.KEYID = 6
6,293,781 UART: [ldev] SUBJECT.KEYID = 5
6,294,998 UART: [ldev] AUTHORITY.KEYID = 7
6,296,229 UART: [ldev] FE.KEYID = 1
6,308,722 UART: [ldev] Erasing FE.KEYID = 1
8,791,609 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,804 UART: [ldev] --
10,584,852 UART: [fwproc] Wait for Commands...
10,587,074 UART: [fwproc] Recv command 0x46574c44
10,589,074 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,216 >>> mbox cmd response: success
14,560,910 UART: [afmc] ++
14,561,556 UART: [afmc] CDI.KEYID = 6
14,562,443 UART: [afmc] SUBJECT.KEYID = 7
14,563,658 UART: [afmc] AUTHORITY.KEYID = 5
17,068,864 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,493 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,936 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,715 UART: [afmc] --
18,871,048 UART: [cold-reset] --
18,874,932 UART: [state] Locking Datavault
18,879,752 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,453 UART: [state] Locking ICCM
18,882,798 UART: [exit] Launching FMC @ 0x40000130
18,891,198 UART:
18,891,485 UART: Running Caliptra FMC ...
18,892,639 UART:
18,892,809 UART: [state] CFI Enabled
18,900,621 UART: [fht] FMC Alias Private Key: 7
20,666,925 UART: [art] Extend RT PCRs Done
20,668,137 UART: [art] Lock RT PCRs Done
20,670,035 UART: [art] Populate DV Done
20,675,397 UART: [fht] FMC Alias Private Key: 7
20,677,110 UART: [art] Derive CDI
20,677,949 UART: [art] Store in slot 0x4
20,720,068 UART: [art] Derive Key Pair
20,721,112 UART: [art] Store priv key in slot 0x5
23,148,205 UART: [art] Derive Key Pair - Done
23,161,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,616 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,114 UART: [art] PUB.X = 3B91789D008FA0EBC00736BA9EA4091E87460FA0E7BCCAC306D169884A8F5BF99FE7A03C43E48E0BBD07DF666429C1AA
24,876,418 UART: [art] PUB.Y = 9177527854431560F04515F5A17BBCC0DEEB08EA48F30F2B667FF651053EC10D9D5D8E02825D80B157DAAB345C6A62BA
24,883,652 UART: [art] SIG.R = D95AB69D27A5EA1E5E44BE9A285F79C51EE0EB850C103610AD8D9EF6DCF892A9F0E47075D95DED3D19D2CC5B5CE7A976
24,891,107 UART: [art] SIG.S = F2C724D7C249075BFDBAFB017ED20C59685AF5B52C0094E8349C4AA5C359CA8F3D23D3DE1E44D46E1C45A55DB4B85CA0
25,870,297 UART: Caliptra RT
25,870,994 UART: [state] CFI Enabled
26,003,818 UART: [rt] RT listening for mailbox commands...
26,005,702 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,035,514 UART: [rt]cmd =0x52564348, len=36
26,037,872 >>> mbox cmd response: failed
26,038,194 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,068,320 UART: [rt]cmd =0x52564348, len=36
26,070,490 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,776,254 ready_for_fw is high
3,776,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,422 >>> mbox cmd response: success
18,692,669 UART:
18,693,078 UART: Running Caliptra FMC ...
18,694,225 UART:
18,694,390 UART: [state] CFI Enabled
18,702,554 UART: [fht] FMC Alias Private Key: 7
20,468,408 UART: [art] Extend RT PCRs Done
20,469,626 UART: [art] Lock RT PCRs Done
20,471,421 UART: [art] Populate DV Done
20,476,897 UART: [fht] FMC Alias Private Key: 7
20,478,558 UART: [art] Derive CDI
20,479,384 UART: [art] Store in slot 0x4
20,522,204 UART: [art] Derive Key Pair
20,523,244 UART: [art] Store priv key in slot 0x5
22,950,685 UART: [art] Derive Key Pair - Done
22,963,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,670,553 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,109 UART: [art] PUB.X = B6EC8BBEA81611E7B2A27B73E49D8EA2E7070729F032FFD2721C88D6A1801248EC03CF2A230CC225BCA9348FF7C6A7DD
24,679,321 UART: [art] PUB.Y = F3983D8F0DCD218CD196560D3BD611E9DC05BC21D626BB5C4AF8D01158519A06700FFD59234487EB9C1E837A19151C2E
24,686,612 UART: [art] SIG.R = F368E6AD1E23DB6A183B0E1C22159F57F411AA9353518394C1CA530B3BE92AB0FA030BED46F3853AB253A0EA4A7B1AFC
24,694,017 UART: [art] SIG.S = 0EF26C2A5A8ED8E759D1F88F0B432670A91EACCA66551662F254EE8EA28CCBD1C1992266F2C1063C716FF32DA41F0E9F
25,673,112 UART: Caliptra RT
25,673,827 UART: [state] CFI Enabled
25,806,584 UART: [rt] RT listening for mailbox commands...
25,808,478 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,838,524 UART: [rt]cmd =0x52564348, len=36
25,840,396 >>> mbox cmd response: failed
25,840,697 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
25,870,506 UART: [rt]cmd =0x52564348, len=36
25,872,499 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,063 UART:
192,446 UART: Running Caliptra ROM ...
193,632 UART:
193,790 UART: [state] CFI Enabled
261,167 UART: [state] LifecycleState = Unprovisioned
263,524 UART: [state] DebugLocked = No
266,008 UART: [state] WD Timer not started. Device not locked for debugging
269,935 UART: [kat] SHA2-256
459,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,594 UART: [kat] ++
471,131 UART: [kat] sha1
483,715 UART: [kat] SHA2-256
486,726 UART: [kat] SHA2-384
491,714 UART: [kat] SHA2-512-ACC
494,357 UART: [kat] ECC-384
2,948,910 UART: [kat] HMAC-384Kdf
2,971,006 UART: [kat] LMS
3,502,828 UART: [kat] --
3,507,527 UART: [cold-reset] ++
3,508,601 UART: [fht] FHT @ 0x50003400
3,520,565 UART: [idev] ++
3,521,191 UART: [idev] CDI.KEYID = 6
3,522,184 UART: [idev] SUBJECT.KEYID = 7
3,523,352 UART: [idev] UDS.KEYID = 0
3,524,272 ready_for_fw is high
3,524,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,502 UART: [idev] Erasing UDS.KEYID = 0
6,029,926 UART: [idev] Sha1 KeyId Algorithm
6,053,109 UART: [idev] --
6,057,484 UART: [ldev] ++
6,058,166 UART: [ldev] CDI.KEYID = 6
6,059,182 UART: [ldev] SUBJECT.KEYID = 5
6,060,284 UART: [ldev] AUTHORITY.KEYID = 7
6,061,514 UART: [ldev] FE.KEYID = 1
6,100,245 UART: [ldev] Erasing FE.KEYID = 1
8,608,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,517 UART: [ldev] --
10,417,052 UART: [fwproc] Wait for Commands...
10,418,821 UART: [fwproc] Recv command 0x46574c44
10,421,128 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,898 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,039 >>> mbox cmd response: success
14,689,928 UART: [afmc] ++
14,690,627 UART: [afmc] CDI.KEYID = 6
14,691,868 UART: [afmc] SUBJECT.KEYID = 7
14,693,310 UART: [afmc] AUTHORITY.KEYID = 5
17,225,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,947,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,949,609 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,964,711 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,979,850 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,994,810 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,016,961 UART: [afmc] --
19,021,094 UART: [cold-reset] --
19,026,373 UART: [state] Locking Datavault
19,031,632 UART: [state] Locking PCR0, PCR1 and PCR31
19,033,836 UART: [state] Locking ICCM
19,035,503 UART: [exit] Launching FMC @ 0x40000130
19,044,184 UART:
19,044,425 UART: Running Caliptra FMC ...
19,045,525 UART:
19,045,689 UART: [state] CFI Enabled
19,105,082 UART: [fht] FMC Alias Private Key: 7
20,871,251 UART: [art] Extend RT PCRs Done
20,872,478 UART: [art] Lock RT PCRs Done
20,874,072 UART: [art] Populate DV Done
20,879,695 UART: [fht] FMC Alias Private Key: 7
20,881,278 UART: [art] Derive CDI
20,882,022 UART: [art] Store in slot 0x4
20,937,755 UART: [art] Derive Key Pair
20,938,785 UART: [art] Store priv key in slot 0x5
23,401,600 UART: [art] Derive Key Pair - Done
23,414,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,127,515 UART: [art] Erasing AUTHORITY.KEYID = 7
25,129,008 UART: [art] PUB.X = 342D0B198B7A4CB18DC32AF049702ED8DC8B6D7E1DBC152D07E105F655B3533B4B58455CACD153E56EFE9BF0FF90492D
25,136,276 UART: [art] PUB.Y = 0AA1041AE8B3D8C3789C4C383AA49630516846092A02B1CFD485E2A82A03EBF056FB44B1B230A92B6DE8743A0ADA20B5
25,143,569 UART: [art] SIG.R = 91190500F26818595339F563D2CBA0CA9E1119C9E8673C8E834A3FB848868C9B0822916AFF1012CB255FAEE60A886124
25,150,956 UART: [art] SIG.S = 0BB50BAF53B419BC61AED1D7BB5BCF4D6AD8C05E5E352F210D434695D7EDB6E900B0ADDA93D46C196396CF50C32C18FC
26,129,526 UART: Caliptra RT
26,130,240 UART: [state] CFI Enabled
26,311,366 UART: [rt] RT listening for mailbox commands...
26,313,259 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,343,407 UART: [rt]cmd =0x52564348, len=36
26,345,494 >>> mbox cmd response: failed
26,345,806 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,375,762 UART: [rt]cmd =0x52564348, len=36
26,377,732 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,438,380 ready_for_fw is high
3,438,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,385 >>> mbox cmd response: success
19,129,672 UART:
19,130,056 UART: Running Caliptra FMC ...
19,131,190 UART:
19,131,351 UART: [state] CFI Enabled
19,197,672 UART: [fht] FMC Alias Private Key: 7
20,963,867 UART: [art] Extend RT PCRs Done
20,965,099 UART: [art] Lock RT PCRs Done
20,966,650 UART: [art] Populate DV Done
20,972,311 UART: [fht] FMC Alias Private Key: 7
20,974,033 UART: [art] Derive CDI
20,974,857 UART: [art] Store in slot 0x4
21,030,520 UART: [art] Derive Key Pair
21,031,572 UART: [art] Store priv key in slot 0x5
23,494,110 UART: [art] Derive Key Pair - Done
23,507,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,990 UART: [art] Erasing AUTHORITY.KEYID = 7
25,221,495 UART: [art] PUB.X = E084564ED8DE3F75A35BEAEFCF90D1B6FC95CF686C00E0AE2DF036150051EED9493236345716B679C111D0B7A2B45A27
25,228,744 UART: [art] PUB.Y = 7CD720F8DC3D70C01A4F275E3B89D358D441ED6C79192B558EA5733EE37F2E39AEF21318CBEF24F68725F46056FAC014
25,235,996 UART: [art] SIG.R = ADF055611CA4A7EE73EDCD5F2C1513091EF6F47BA21FFE409924790B5DF2053C23966B4D8F4272ECF1501CDD11C6C0D3
25,243,354 UART: [art] SIG.S = 22D1B01233888C3EDC25B87CE0A8D7EC6AB80EA5038678D8C2E2A0369198504B18A38C0F68AEF438FC8410A10D82F0CE
26,222,186 UART: Caliptra RT
26,222,878 UART: [state] CFI Enabled
26,403,084 UART: [rt] RT listening for mailbox commands...
26,404,961 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,435,041 UART: [rt]cmd =0x52564348, len=36
26,436,905 >>> mbox cmd response: failed
26,437,210 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,467,430 UART: [rt]cmd =0x52564348, len=36
26,469,509 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,404 UART:
192,793 UART: Running Caliptra ROM ...
193,940 UART:
603,725 UART: [state] CFI Enabled
616,276 UART: [state] LifecycleState = Unprovisioned
618,665 UART: [state] DebugLocked = No
621,124 UART: [state] WD Timer not started. Device not locked for debugging
626,391 UART: [kat] SHA2-256
816,218 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,030 UART: [kat] ++
827,644 UART: [kat] sha1
838,250 UART: [kat] SHA2-256
841,260 UART: [kat] SHA2-384
845,980 UART: [kat] SHA2-512-ACC
848,565 UART: [kat] ECC-384
3,291,552 UART: [kat] HMAC-384Kdf
3,304,635 UART: [kat] LMS
3,836,481 UART: [kat] --
3,839,719 UART: [cold-reset] ++
3,841,374 UART: [fht] FHT @ 0x50003400
3,852,523 UART: [idev] ++
3,853,277 UART: [idev] CDI.KEYID = 6
3,854,175 UART: [idev] SUBJECT.KEYID = 7
3,855,357 UART: [idev] UDS.KEYID = 0
3,856,313 ready_for_fw is high
3,856,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,325 UART: [idev] Erasing UDS.KEYID = 0
6,333,865 UART: [idev] Sha1 KeyId Algorithm
6,356,399 UART: [idev] --
6,360,071 UART: [ldev] ++
6,360,760 UART: [ldev] CDI.KEYID = 6
6,361,677 UART: [ldev] SUBJECT.KEYID = 5
6,362,890 UART: [ldev] AUTHORITY.KEYID = 7
6,364,071 UART: [ldev] FE.KEYID = 1
6,374,185 UART: [ldev] Erasing FE.KEYID = 1
8,850,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,632 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,477 UART: [ldev] --
10,641,556 UART: [fwproc] Wait for Commands...
10,643,389 UART: [fwproc] Recv command 0x46574c44
10,645,849 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,882 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,491 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,409 >>> mbox cmd response: success
14,915,278 UART: [afmc] ++
14,915,985 UART: [afmc] CDI.KEYID = 6
14,917,233 UART: [afmc] SUBJECT.KEYID = 7
14,918,677 UART: [afmc] AUTHORITY.KEYID = 5
17,424,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,630 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,852 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,772 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,733 UART: [afmc] --
19,222,615 UART: [cold-reset] --
19,225,464 UART: [state] Locking Datavault
19,230,246 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,408 UART: [state] Locking ICCM
19,233,976 UART: [exit] Launching FMC @ 0x40000130
19,242,673 UART:
19,242,918 UART: Running Caliptra FMC ...
19,244,026 UART:
19,244,193 UART: [state] CFI Enabled
19,252,141 UART: [fht] FMC Alias Private Key: 7
21,018,703 UART: [art] Extend RT PCRs Done
21,019,932 UART: [art] Lock RT PCRs Done
21,021,455 UART: [art] Populate DV Done
21,026,622 UART: [fht] FMC Alias Private Key: 7
21,028,176 UART: [art] Derive CDI
21,029,003 UART: [art] Store in slot 0x4
21,071,508 UART: [art] Derive Key Pair
21,072,550 UART: [art] Store priv key in slot 0x5
23,499,451 UART: [art] Derive Key Pair - Done
23,512,829 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,295 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,807 UART: [art] PUB.X = 051D80AC080CD4C0EFDEC48E5900C0BE0D16A8A7D4651F9C4CA9470EA1807EE0F72A3DB078EE61FE5FFAA532392254D6
25,228,074 UART: [art] PUB.Y = 5EB3AB8BFBA9CC50B660698F0C4BA769C59E01C7525CFCFFDE546588E500EF360B8726D7C6FB1D8296A497505A28D19B
25,235,330 UART: [art] SIG.R = 03F5CC4F24DE7A154A23506B46838C96303B823F39E5447AD8B6599EB07CE86C922B8389B70BFA95A4174B438B5D0A03
25,242,694 UART: [art] SIG.S = 3817828C5E0F5B520D8FE535920EB2B0AF26FE77075066F5D7DAD60FFF10848DCB48F49E9BA12D307CD519B24D8C0546
26,221,082 UART: Caliptra RT
26,221,771 UART: [state] CFI Enabled
26,354,362 UART: [rt] RT listening for mailbox commands...
26,356,261 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,386,475 UART: [rt]cmd =0x52564348, len=36
26,388,625 >>> mbox cmd response: failed
26,389,008 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,418,723 UART: [rt]cmd =0x52564348, len=36
26,420,794 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,761,507 ready_for_fw is high
3,761,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,060,281 >>> mbox cmd response: success
19,314,089 UART:
19,314,524 UART: Running Caliptra FMC ...
19,315,647 UART:
19,315,808 UART: [state] CFI Enabled
19,323,557 UART: [fht] FMC Alias Private Key: 7
21,089,496 UART: [art] Extend RT PCRs Done
21,090,737 UART: [art] Lock RT PCRs Done
21,092,452 UART: [art] Populate DV Done
21,097,846 UART: [fht] FMC Alias Private Key: 7
21,099,346 UART: [art] Derive CDI
21,100,093 UART: [art] Store in slot 0x4
21,142,709 UART: [art] Derive Key Pair
21,143,756 UART: [art] Store priv key in slot 0x5
23,570,028 UART: [art] Derive Key Pair - Done
23,583,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,581 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,095 UART: [art] PUB.X = 5EC40BB4FFB945E34B944DB7CF45394AFB597C4372FE43299DDBF7751B6535D503E3D423EFDB42A102457E4D01D1AD04
25,298,391 UART: [art] PUB.Y = E9CBA93AEDAECE5138683CD87815DBC405E53C1AAFF4409CBE68E8086519188D24898808887167DC749D7B8AC19EE541
25,305,629 UART: [art] SIG.R = 81A57268AB67C718747C6163B06F5FEEE0D85B5075D4E88177C348230E0AC85726EAA74A0E8F997B5E7E9BA99D87D1D5
25,313,054 UART: [art] SIG.S = 8502A98FA41459DEDBA70AE1A414F7A958A4D813EC79C20D545933BB1743B13E56994BD2FD7F0C4016AA1BA4473AF6F3
26,292,337 UART: Caliptra RT
26,293,049 UART: [state] CFI Enabled
26,425,713 UART: [rt] RT listening for mailbox commands...
26,427,603 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,457,760 UART: [rt]cmd =0x52564348, len=36
26,459,740 >>> mbox cmd response: failed
26,460,034 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
26,489,774 UART: [rt]cmd =0x52564348, len=36
26,491,746 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,953 UART: [kat] SHA2-256
881,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,999 UART: [kat] ++
886,151 UART: [kat] sha1
890,247 UART: [kat] SHA2-256
892,185 UART: [kat] SHA2-384
894,874 UART: [kat] SHA2-512-ACC
896,775 UART: [kat] ECC-384
902,456 UART: [kat] HMAC-384Kdf
907,114 UART: [kat] LMS
1,475,310 UART: [kat] --
1,476,155 UART: [cold-reset] ++
1,476,663 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 ready_for_fw is high
1,480,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,422 UART: [idev] Erasing UDS.KEYID = 0
1,505,566 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,128 UART: [idev] --
1,515,053 UART: [ldev] ++
1,515,221 UART: [ldev] CDI.KEYID = 6
1,515,584 UART: [ldev] SUBJECT.KEYID = 5
1,516,010 UART: [ldev] AUTHORITY.KEYID = 7
1,516,473 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,774 UART: [ldev] --
1,585,083 UART: [fwproc] Waiting for Commands...
1,585,908 UART: [fwproc] Received command 0x46574c44
1,586,699 UART: [fwproc] Received Image of size 118548 bytes
2,932,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,335 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,553 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,754 >>> mbox cmd response: success
3,131,896 UART: [afmc] ++
3,132,064 UART: [afmc] CDI.KEYID = 6
3,132,426 UART: [afmc] SUBJECT.KEYID = 7
3,132,851 UART: [afmc] AUTHORITY.KEYID = 5
3,168,074 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,172 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,544 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,227 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,129 UART: [afmc] --
3,211,109 UART: [cold-reset] --
3,212,113 UART: [state] Locking Datavault
3,213,286 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,890 UART: [state] Locking ICCM
3,214,310 UART: [exit] Launching FMC @ 0x40000130
3,219,640 UART:
3,219,656 UART: Running Caliptra FMC ...
3,220,064 UART:
3,220,118 UART: [state] CFI Enabled
3,230,756 UART: [fht] FMC Alias Private Key: 7
3,349,534 UART: [art] Extend RT PCRs Done
3,349,962 UART: [art] Lock RT PCRs Done
3,351,482 UART: [art] Populate DV Done
3,359,539 UART: [fht] FMC Alias Private Key: 7
3,360,571 UART: [art] Derive CDI
3,360,851 UART: [art] Store in slot 0x4
3,446,877 UART: [art] Derive Key Pair
3,447,237 UART: [art] Store priv key in slot 0x5
3,460,282 UART: [art] Derive Key Pair - Done
3,474,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,255 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,020 UART: [art] PUB.X = 1FE7807ADC92E30DC233F73EB6317D82A63A255BACFAD249F67C84DF696ECADEDAEADEA98B27650562C332E66B5CF6B6
3,497,808 UART: [art] PUB.Y = BB260FF3BB2C3B93D4ABEEA7686A4E429219B5EAE1D429CA0D53DDD43E1EE7D5B5EBB55A8CD5CBA766D6BC14FD9DBD43
3,504,788 UART: [art] SIG.R = CB736CB2DA782BDD38531C49209057452005DDFF19F8C40D99C615C02A6A1CB35E8F69F098EBC1FD79D4386701D7BDA1
3,511,559 UART: [art] SIG.S = AF9F1A13E821D8B81CD97B43B83EFDDA6E3B86E41159209E6D1BB42E3D8ACCBBC0C8262654BA8DCC46F38435D90AFF7C
3,536,068 UART: Caliptra RT
3,536,319 UART: [state] CFI Enabled
3,656,428 UART: [rt] RT listening for mailbox commands...
3,657,098 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,186 UART: [rt]cmd =0x52564348, len=36
3,688,777 >>> mbox cmd response: failed
3,688,777 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,501 UART: [rt]cmd =0x52564348, len=36
3,720,131 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,175 ready_for_fw is high
1,362,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,502 >>> mbox cmd response: success
3,040,731 UART:
3,040,747 UART: Running Caliptra FMC ...
3,041,155 UART:
3,041,209 UART: [state] CFI Enabled
3,051,551 UART: [fht] FMC Alias Private Key: 7
3,170,357 UART: [art] Extend RT PCRs Done
3,170,785 UART: [art] Lock RT PCRs Done
3,172,491 UART: [art] Populate DV Done
3,180,848 UART: [fht] FMC Alias Private Key: 7
3,181,988 UART: [art] Derive CDI
3,182,268 UART: [art] Store in slot 0x4
3,267,800 UART: [art] Derive Key Pair
3,268,160 UART: [art] Store priv key in slot 0x5
3,281,611 UART: [art] Derive Key Pair - Done
3,296,570 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,996 UART: [art] PUB.X = C89158E4B5DA9DAB9F8F17E05CB8717094E2475DF5B6FF2BC8D53D51CDFD7518FD06EF9F7B94C8F37D211D57AC9C7A42
3,319,783 UART: [art] PUB.Y = BBCE6361D036FCCE56BC78B1D41953CF264DD2733F79A29FFAC8B4FF6AE67BB9D4D3676577C7CD5EB224E56B36A6804B
3,326,753 UART: [art] SIG.R = 9F95216B4B27F90CBBD3B4FAA40C1C6CF2AAB67CE6A0222C9FF540D957ABD4C19A04D7F819BF2FD1B07A53304CE9B46D
3,333,538 UART: [art] SIG.S = EDAFFCDCC75E7AA0E711B545357A5912FA2B2DE41A9978B01FB31E963F8980C5BE030CD95906F4DFBCF2D572B058E0CA
3,357,865 UART: Caliptra RT
3,358,116 UART: [state] CFI Enabled
3,478,065 UART: [rt] RT listening for mailbox commands...
3,478,735 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,955 UART: [rt]cmd =0x52564348, len=36
3,510,670 >>> mbox cmd response: failed
3,510,670 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,474 UART: [rt]cmd =0x52564348, len=36
3,542,162 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,482 UART: [kat] SHA2-256
892,420 UART: [kat] SHA2-384
894,921 UART: [kat] SHA2-512-ACC
896,822 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,235 UART: [kat] LMS
1,475,431 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,880 UART: [fht] Storing FHT @ 0x50003400
1,479,843 UART: [idev] ++
1,480,011 UART: [idev] CDI.KEYID = 6
1,480,371 UART: [idev] SUBJECT.KEYID = 7
1,480,795 UART: [idev] UDS.KEYID = 0
1,481,140 ready_for_fw is high
1,481,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,245 UART: [idev] Erasing UDS.KEYID = 0
1,505,821 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,357 UART: [idev] --
1,515,480 UART: [ldev] ++
1,515,648 UART: [ldev] CDI.KEYID = 6
1,516,011 UART: [ldev] SUBJECT.KEYID = 5
1,516,437 UART: [ldev] AUTHORITY.KEYID = 7
1,516,900 UART: [ldev] FE.KEYID = 1
1,522,360 UART: [ldev] Erasing FE.KEYID = 1
1,547,903 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,145 UART: [ldev] --
1,587,570 UART: [fwproc] Waiting for Commands...
1,588,229 UART: [fwproc] Received command 0x46574c44
1,589,020 UART: [fwproc] Received Image of size 118548 bytes
2,933,960 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,964 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,182 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,427 >>> mbox cmd response: success
3,133,481 UART: [afmc] ++
3,133,649 UART: [afmc] CDI.KEYID = 6
3,134,011 UART: [afmc] SUBJECT.KEYID = 7
3,134,436 UART: [afmc] AUTHORITY.KEYID = 5
3,169,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,759 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,539 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,248 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,814 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,900 UART: [afmc] --
3,213,002 UART: [cold-reset] --
3,213,986 UART: [state] Locking Datavault
3,215,339 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,943 UART: [state] Locking ICCM
3,216,525 UART: [exit] Launching FMC @ 0x40000130
3,221,855 UART:
3,221,871 UART: Running Caliptra FMC ...
3,222,279 UART:
3,222,422 UART: [state] CFI Enabled
3,233,146 UART: [fht] FMC Alias Private Key: 7
3,351,498 UART: [art] Extend RT PCRs Done
3,351,926 UART: [art] Lock RT PCRs Done
3,353,660 UART: [art] Populate DV Done
3,361,823 UART: [fht] FMC Alias Private Key: 7
3,362,919 UART: [art] Derive CDI
3,363,199 UART: [art] Store in slot 0x4
3,448,953 UART: [art] Derive Key Pair
3,449,313 UART: [art] Store priv key in slot 0x5
3,462,916 UART: [art] Derive Key Pair - Done
3,477,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,656 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,421 UART: [art] PUB.X = 1F5B31D157306D12DE745F1C86DBDC5E8CFCDC557C627A917A2BE6C9EC304A18F42365409E00C5D9C1BBB9C9951804B4
3,500,178 UART: [art] PUB.Y = F88715150804E5D9634DEDE3E3A9C4052F5F433C692FF500E429313FBB444733CC6AC85B2EA9192241316727E53B7A9A
3,507,095 UART: [art] SIG.R = 657A3D297C83E88526EA64F8197B708AC9B1291EFA390747B6C03845A52E6E36DFCDFB2600E404E40272C6E2720D2B47
3,513,831 UART: [art] SIG.S = F8F6E3FCE4525FB83EFDFCC9BFB95350C2EB8C5D2123A67AC60154ABE2F3E1413ED004D00FFF70C0B693B2E20B8232F7
3,537,561 UART: Caliptra RT
3,537,904 UART: [state] CFI Enabled
3,658,022 UART: [rt] RT listening for mailbox commands...
3,658,692 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,852 UART: [rt]cmd =0x52564348, len=36
3,690,391 >>> mbox cmd response: failed
3,690,391 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,891 UART: [rt]cmd =0x52564348, len=36
3,721,719 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 ready_for_fw is high
1,362,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,323 >>> mbox cmd response: success
3,045,212 UART:
3,045,228 UART: Running Caliptra FMC ...
3,045,636 UART:
3,045,779 UART: [state] CFI Enabled
3,056,307 UART: [fht] FMC Alias Private Key: 7
3,175,083 UART: [art] Extend RT PCRs Done
3,175,511 UART: [art] Lock RT PCRs Done
3,176,947 UART: [art] Populate DV Done
3,185,186 UART: [fht] FMC Alias Private Key: 7
3,186,354 UART: [art] Derive CDI
3,186,634 UART: [art] Store in slot 0x4
3,272,656 UART: [art] Derive Key Pair
3,273,016 UART: [art] Store priv key in slot 0x5
3,286,155 UART: [art] Derive Key Pair - Done
3,300,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,249 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,014 UART: [art] PUB.X = E5A6D86DC74F2820B3DD0AFC58AD4F66CDFE81C77DFAE4609564A12FDFEF2A5CDF3CD0C548FF10F4640008E33F661F2C
3,323,782 UART: [art] PUB.Y = A9932751151901F9A48ACE70D2373563CAF618253030E18C15A5017018A20EBAC764F5A9B6307A0C9CD3842B8A657CA9
3,330,716 UART: [art] SIG.R = 7C71420FCDCF9246CCEF5B887A55A0F5B3AC82345F8D8E30EFC1A35CD8CD1933C300E3B7525FD15D4BBFDAC06A276602
3,337,478 UART: [art] SIG.S = 78B0F856D177E2C34BE99026EAAF5725ED61114977E6EC05A454AA36DEA57357E5F941144DEB0A57E9A30D80F0DFE59D
3,361,177 UART: Caliptra RT
3,361,520 UART: [state] CFI Enabled
3,482,401 UART: [rt] RT listening for mailbox commands...
3,483,071 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,289 UART: [rt]cmd =0x52564348, len=36
3,514,946 >>> mbox cmd response: failed
3,514,946 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,544,588 UART: [rt]cmd =0x52564348, len=36
3,546,320 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,553 UART: [state] WD Timer not started. Device not locked for debugging
87,664 UART: [kat] SHA2-256
891,214 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,318 UART: [kat] ++
895,470 UART: [kat] sha1
899,548 UART: [kat] SHA2-256
901,488 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,167 UART: [kat] LMS
1,168,479 UART: [kat] --
1,169,242 UART: [cold-reset] ++
1,169,804 UART: [fht] FHT @ 0x50003400
1,172,472 UART: [idev] ++
1,172,640 UART: [idev] CDI.KEYID = 6
1,173,001 UART: [idev] SUBJECT.KEYID = 7
1,173,426 UART: [idev] UDS.KEYID = 0
1,173,772 ready_for_fw is high
1,173,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,357 UART: [idev] Erasing UDS.KEYID = 0
1,198,599 UART: [idev] Sha1 KeyId Algorithm
1,207,445 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,215,230 UART: [ldev] Erasing FE.KEYID = 1
1,241,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,444 UART: [ldev] --
1,280,849 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,686 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,322 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,667 >>> mbox cmd response: success
2,826,757 UART: [afmc] ++
2,826,925 UART: [afmc] CDI.KEYID = 6
2,827,288 UART: [afmc] SUBJECT.KEYID = 7
2,827,714 UART: [afmc] AUTHORITY.KEYID = 5
2,863,557 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,591 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,182 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,883 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,638 UART: [afmc] --
2,906,471 UART: [cold-reset] --
2,907,317 UART: [state] Locking Datavault
2,908,202 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,806 UART: [state] Locking ICCM
2,909,360 UART: [exit] Launching FMC @ 0x40000130
2,914,690 UART:
2,914,706 UART: Running Caliptra FMC ...
2,915,114 UART:
2,915,168 UART: [state] CFI Enabled
2,925,516 UART: [fht] FMC Alias Private Key: 7
3,043,916 UART: [art] Extend RT PCRs Done
3,044,344 UART: [art] Lock RT PCRs Done
3,045,716 UART: [art] Populate DV Done
3,053,967 UART: [fht] FMC Alias Private Key: 7
3,055,049 UART: [art] Derive CDI
3,055,329 UART: [art] Store in slot 0x4
3,141,162 UART: [art] Derive Key Pair
3,141,522 UART: [art] Store priv key in slot 0x5
3,154,764 UART: [art] Derive Key Pair - Done
3,169,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,430 UART: [art] PUB.X = 8D2C5165E421AC77F7ACB96D7BE889859265BF862228CC2B3ECE1A0B403AD57D3C8637B1B41834E7416DC2996D2BFF62
3,192,205 UART: [art] PUB.Y = 4F4611E2003F3A3C5F2EEFA54761B2B0355581297D66CE543D72ACCAC86C521EAD25542EE1CE1131BA0709D3A3DBCA7B
3,199,141 UART: [art] SIG.R = 9E7CB8A8467F5D924EBAE6A96546EC5FD9F686494D787CE233CF954C00274B71AD5811CE53C20952F34F49C1ACF5AB20
3,205,896 UART: [art] SIG.S = B763C8F1982779D31A51D28200A7A5F88FDC242F6E4F93626D492885619857FB21F71DB33E3027B4AA19C898C8184077
3,230,154 UART: Caliptra RT
3,230,405 UART: [state] CFI Enabled
3,349,869 UART: [rt] RT listening for mailbox commands...
3,350,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,543 UART: [rt]cmd =0x52564348, len=36
3,382,018 >>> mbox cmd response: failed
3,382,018 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,490 UART: [rt]cmd =0x52564348, len=36
3,413,206 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,332 ready_for_fw is high
1,059,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,248 >>> mbox cmd response: success
2,739,697 UART:
2,739,713 UART: Running Caliptra FMC ...
2,740,121 UART:
2,740,175 UART: [state] CFI Enabled
2,750,523 UART: [fht] FMC Alias Private Key: 7
2,869,639 UART: [art] Extend RT PCRs Done
2,870,067 UART: [art] Lock RT PCRs Done
2,871,733 UART: [art] Populate DV Done
2,879,984 UART: [fht] FMC Alias Private Key: 7
2,880,938 UART: [art] Derive CDI
2,881,218 UART: [art] Store in slot 0x4
2,967,337 UART: [art] Derive Key Pair
2,967,697 UART: [art] Store priv key in slot 0x5
2,981,061 UART: [art] Derive Key Pair - Done
2,996,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,355 UART: [art] PUB.X = 792CBAC09C93B0A601177E767289770D8011BF2DE8911E114090AF50C832B7780BA8496E4D79A452FB2FD6C1C15A3A90
3,019,116 UART: [art] PUB.Y = F84F60F8121244DAA8EB09F1CE511AF99B18E9DDCC162DCD874DDC8BA5712468992A38B56431D1846F31D47229B97B00
3,026,047 UART: [art] SIG.R = 30EB45154F87BE6D421AAB5CBD82FB4F255D83415FBB3E4C97F71D708DBA08D50F9E5610CDD753E05289B036053A7151
3,032,816 UART: [art] SIG.S = 7591A6F90CBF56489370B84F91A59D09C884403D1A73C128FD934265436879D257ECD64C79F89A7810178CD74968589E
3,056,572 UART: Caliptra RT
3,056,823 UART: [state] CFI Enabled
3,176,883 UART: [rt] RT listening for mailbox commands...
3,177,553 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,657 UART: [rt]cmd =0x52564348, len=36
3,209,296 >>> mbox cmd response: failed
3,209,296 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,856 UART: [rt]cmd =0x52564348, len=36
3,240,696 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,771 UART: [state] LifecycleState = Unprovisioned
85,426 UART: [state] DebugLocked = No
86,116 UART: [state] WD Timer not started. Device not locked for debugging
87,447 UART: [kat] SHA2-256
890,997 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,101 UART: [kat] ++
895,253 UART: [kat] sha1
899,355 UART: [kat] SHA2-256
901,295 UART: [kat] SHA2-384
904,032 UART: [kat] SHA2-512-ACC
905,933 UART: [kat] ECC-384
915,650 UART: [kat] HMAC-384Kdf
920,316 UART: [kat] LMS
1,168,628 UART: [kat] --
1,169,367 UART: [cold-reset] ++
1,169,743 UART: [fht] FHT @ 0x50003400
1,172,323 UART: [idev] ++
1,172,491 UART: [idev] CDI.KEYID = 6
1,172,852 UART: [idev] SUBJECT.KEYID = 7
1,173,277 UART: [idev] UDS.KEYID = 0
1,173,623 ready_for_fw is high
1,173,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,756 UART: [idev] Erasing UDS.KEYID = 0
1,198,738 UART: [idev] Sha1 KeyId Algorithm
1,207,668 UART: [idev] --
1,208,791 UART: [ldev] ++
1,208,959 UART: [ldev] CDI.KEYID = 6
1,209,323 UART: [ldev] SUBJECT.KEYID = 5
1,209,750 UART: [ldev] AUTHORITY.KEYID = 7
1,210,213 UART: [ldev] FE.KEYID = 1
1,215,617 UART: [ldev] Erasing FE.KEYID = 1
1,241,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,707 UART: [ldev] --
1,280,924 UART: [fwproc] Wait for Commands...
1,281,651 UART: [fwproc] Recv command 0x46574c44
1,282,384 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,232 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,676 >>> mbox cmd response: success
2,825,906 UART: [afmc] ++
2,826,074 UART: [afmc] CDI.KEYID = 6
2,826,437 UART: [afmc] SUBJECT.KEYID = 7
2,826,863 UART: [afmc] AUTHORITY.KEYID = 5
2,862,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,519 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,268 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,978 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,859 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,560 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,131 UART: [afmc] --
2,905,064 UART: [cold-reset] --
2,905,718 UART: [state] Locking Datavault
2,906,871 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,475 UART: [state] Locking ICCM
2,907,959 UART: [exit] Launching FMC @ 0x40000130
2,913,289 UART:
2,913,305 UART: Running Caliptra FMC ...
2,913,713 UART:
2,913,856 UART: [state] CFI Enabled
2,924,470 UART: [fht] FMC Alias Private Key: 7
3,044,194 UART: [art] Extend RT PCRs Done
3,044,622 UART: [art] Lock RT PCRs Done
3,046,158 UART: [art] Populate DV Done
3,054,479 UART: [fht] FMC Alias Private Key: 7
3,055,431 UART: [art] Derive CDI
3,055,711 UART: [art] Store in slot 0x4
3,141,754 UART: [art] Derive Key Pair
3,142,114 UART: [art] Store priv key in slot 0x5
3,155,730 UART: [art] Derive Key Pair - Done
3,170,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,992 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,757 UART: [art] PUB.X = DD2600B4786CB258576599A26D0F51247AE5D5F6DCAAA0DC1A927E853B6B68278931DC8B3EFB0BF52E7DF712803580D7
3,193,507 UART: [art] PUB.Y = 4B475C3BEF5A9D06129C229C45223C355A5C1D697B1C903C63A2B108CAACD55BEE0BD6621C881B2D646286C106002952
3,200,425 UART: [art] SIG.R = 59CCB993A3BFA1F4475B3C9A55611FD9E8C2ECC87A9E44958A5D0D750031F75E0F24D2DA0577651A5BBF305C15C34706
3,207,169 UART: [art] SIG.S = E3170EE940127507A4AD4C675C68EFF567E6049C33C32392D8219A61E01A698C2ED6EAD0C0B951EAD89786577F7E983F
3,230,734 UART: Caliptra RT
3,231,077 UART: [state] CFI Enabled
3,350,656 UART: [rt] RT listening for mailbox commands...
3,351,326 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,490 UART: [rt]cmd =0x52564348, len=36
3,382,965 >>> mbox cmd response: failed
3,382,965 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,507 UART: [rt]cmd =0x52564348, len=36
3,414,447 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 ready_for_fw is high
1,059,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,027 >>> mbox cmd response: success
2,741,828 UART:
2,741,844 UART: Running Caliptra FMC ...
2,742,252 UART:
2,742,395 UART: [state] CFI Enabled
2,752,893 UART: [fht] FMC Alias Private Key: 7
2,871,069 UART: [art] Extend RT PCRs Done
2,871,497 UART: [art] Lock RT PCRs Done
2,872,917 UART: [art] Populate DV Done
2,881,242 UART: [fht] FMC Alias Private Key: 7
2,882,300 UART: [art] Derive CDI
2,882,580 UART: [art] Store in slot 0x4
2,968,817 UART: [art] Derive Key Pair
2,969,177 UART: [art] Store priv key in slot 0x5
2,982,409 UART: [art] Derive Key Pair - Done
2,997,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,740 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,505 UART: [art] PUB.X = 8238112DCA617B42505F9D146EDDA8A698208E6A3B33AA30097DE414E0C04AF754B00BC6BDE3858DA0FE52F69FD4E9AA
3,020,283 UART: [art] PUB.Y = EC1B7EEDF1D682480F8BCB2643A8CF0251E6AC87E6F532D169CB9CB8641B9E96E1F0DF62DE281018027DEAAB930D1937
3,027,237 UART: [art] SIG.R = 7F00DA36D821586A90A1DC2F3AC1A8FD005AD3A2D6C7096D6901FE4977C926643384A4E6BF3FDDDEEA21C0864BA29E48
3,033,971 UART: [art] SIG.S = D9D0172DC824983DEFEA174C7ADDA946F562AAFF322E6E507DFFD66B403FF9B4A7D7BDCA8403D3724DA217BEAE987D62
3,057,576 UART: Caliptra RT
3,057,919 UART: [state] CFI Enabled
3,178,058 UART: [rt] RT listening for mailbox commands...
3,178,728 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,914 UART: [rt]cmd =0x52564348, len=36
3,210,627 >>> mbox cmd response: failed
3,210,627 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,247 UART: [rt]cmd =0x52564348, len=36
3,241,829 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,588 UART: [state] LifecycleState = Unprovisioned
86,243 UART: [state] DebugLocked = No
86,853 UART: [state] WD Timer not started. Device not locked for debugging
88,060 UART: [kat] SHA2-256
893,710 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,835 UART: [kat] ++
897,987 UART: [kat] sha1
902,221 UART: [kat] SHA2-256
904,161 UART: [kat] SHA2-384
906,878 UART: [kat] SHA2-512-ACC
908,779 UART: [kat] ECC-384
918,414 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,171,991 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,175,134 UART: [idev] ++
1,175,302 UART: [idev] CDI.KEYID = 6
1,175,662 UART: [idev] SUBJECT.KEYID = 7
1,176,086 UART: [idev] UDS.KEYID = 0
1,176,431 ready_for_fw is high
1,176,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,668 UART: [idev] Erasing UDS.KEYID = 0
1,200,903 UART: [idev] Sha1 KeyId Algorithm
1,209,467 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,216,711 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,340 UART: [fwproc] Recv command 0x46574c44
1,283,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,127 >>> mbox cmd response: success
2,827,335 UART: [afmc] ++
2,827,503 UART: [afmc] CDI.KEYID = 6
2,827,865 UART: [afmc] SUBJECT.KEYID = 7
2,828,290 UART: [afmc] AUTHORITY.KEYID = 5
2,863,177 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,380 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,837 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,720 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,421 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,363 UART: [afmc] --
2,906,349 UART: [cold-reset] --
2,907,443 UART: [state] Locking Datavault
2,908,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,318 UART: [state] Locking ICCM
2,909,862 UART: [exit] Launching FMC @ 0x40000130
2,915,192 UART:
2,915,208 UART: Running Caliptra FMC ...
2,915,616 UART:
2,915,670 UART: [state] CFI Enabled
2,926,230 UART: [fht] FMC Alias Private Key: 7
3,044,320 UART: [art] Extend RT PCRs Done
3,044,748 UART: [art] Lock RT PCRs Done
3,046,340 UART: [art] Populate DV Done
3,054,653 UART: [fht] FMC Alias Private Key: 7
3,055,757 UART: [art] Derive CDI
3,056,037 UART: [art] Store in slot 0x4
3,141,588 UART: [art] Derive Key Pair
3,141,948 UART: [art] Store priv key in slot 0x5
3,155,552 UART: [art] Derive Key Pair - Done
3,170,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,170 UART: [art] PUB.X = 7EB9618CDD3EB4BC647CC28168D134B5E5F350FA7AAD5F8DE817C2D9AC88F3DE64D0F4CC71DF7C861012A18A1F259499
3,192,958 UART: [art] PUB.Y = 4B40358AF9C169A2B5CE091532E797FC293AF03E871EFC1F23C6C06E5F558BD542BC2A7ED6E357C2DC1F440AF806DB6B
3,199,915 UART: [art] SIG.R = 95E30C559436ECC72CE487EAA816A39D0CB79691E233C32EE70152675B429C22016D9B068DF4096886FB569D601B2C9E
3,206,665 UART: [art] SIG.S = 76A6F96119EB685F5D99CE4EE0539E7D8E2CBD7F0B2A5CBD87CAC20600D95316B2CA8D719BBB1BE2DC8A82BDD2B452BB
3,230,413 UART: Caliptra RT
3,230,664 UART: [state] CFI Enabled
3,350,107 UART: [rt] RT listening for mailbox commands...
3,350,777 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,783 UART: [rt]cmd =0x52564348, len=36
3,382,284 >>> mbox cmd response: failed
3,382,284 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,411,686 UART: [rt]cmd =0x52564348, len=36
3,413,614 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,569 ready_for_fw is high
1,060,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,822 >>> mbox cmd response: success
2,741,809 UART:
2,741,825 UART: Running Caliptra FMC ...
2,742,233 UART:
2,742,287 UART: [state] CFI Enabled
2,752,827 UART: [fht] FMC Alias Private Key: 7
2,871,703 UART: [art] Extend RT PCRs Done
2,872,131 UART: [art] Lock RT PCRs Done
2,873,565 UART: [art] Populate DV Done
2,881,948 UART: [fht] FMC Alias Private Key: 7
2,882,942 UART: [art] Derive CDI
2,883,222 UART: [art] Store in slot 0x4
2,969,161 UART: [art] Derive Key Pair
2,969,521 UART: [art] Store priv key in slot 0x5
2,982,021 UART: [art] Derive Key Pair - Done
2,996,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,498 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,263 UART: [art] PUB.X = CE2ED76694727831C43FAAF82ADB8F9750CD79A6B8D8BA30BB9867C40E945E4E168543751CB2694DD6D05F551D0CC4D3
3,020,037 UART: [art] PUB.Y = 153A6B20F911624216D47CB7EB92AC4FD0775243573A2E2BCB7D52E81F5B21803A662315B153365C7698511B4375B845
3,026,977 UART: [art] SIG.R = 19034BF90D28FE006FB6DF5AB2A319F0398756132DE7361BC8E5A8CE4C6D6F8FE9BF7E59703995D378B72C788CA95799
3,033,725 UART: [art] SIG.S = 1BC191ECA804E4C9013EEF40ACF6FFA9743B0C032548795E6089B8ED4E8B4D8AFFAD7D9F8D0ED21C560F90D32F8E541D
3,057,789 UART: Caliptra RT
3,058,040 UART: [state] CFI Enabled
3,176,986 UART: [rt] RT listening for mailbox commands...
3,177,656 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,566 UART: [rt]cmd =0x52564348, len=36
3,209,473 >>> mbox cmd response: failed
3,209,473 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,011 UART: [rt]cmd =0x52564348, len=36
3,240,637 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
902,170 UART: [kat] SHA2-256
904,110 UART: [kat] SHA2-384
906,853 UART: [kat] SHA2-512-ACC
908,754 UART: [kat] ECC-384
918,577 UART: [kat] HMAC-384Kdf
923,233 UART: [kat] LMS
1,171,561 UART: [kat] --
1,172,446 UART: [cold-reset] ++
1,172,952 UART: [fht] FHT @ 0x50003400
1,175,669 UART: [idev] ++
1,175,837 UART: [idev] CDI.KEYID = 6
1,176,197 UART: [idev] SUBJECT.KEYID = 7
1,176,621 UART: [idev] UDS.KEYID = 0
1,176,966 ready_for_fw is high
1,176,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,835 UART: [idev] Erasing UDS.KEYID = 0
1,202,042 UART: [idev] Sha1 KeyId Algorithm
1,210,526 UART: [idev] --
1,211,336 UART: [ldev] ++
1,211,504 UART: [ldev] CDI.KEYID = 6
1,211,867 UART: [ldev] SUBJECT.KEYID = 5
1,212,293 UART: [ldev] AUTHORITY.KEYID = 7
1,212,756 UART: [ldev] FE.KEYID = 1
1,218,340 UART: [ldev] Erasing FE.KEYID = 1
1,244,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,842 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,449 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,040 UART: [ldev] --
1,284,379 UART: [fwproc] Wait for Commands...
1,284,995 UART: [fwproc] Recv command 0x46574c44
1,285,723 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,346 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,425 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,596 >>> mbox cmd response: success
2,829,638 UART: [afmc] ++
2,829,806 UART: [afmc] CDI.KEYID = 6
2,830,168 UART: [afmc] SUBJECT.KEYID = 7
2,830,593 UART: [afmc] AUTHORITY.KEYID = 5
2,866,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,119 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,828 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,711 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,326 UART: [afmc] --
2,910,244 UART: [cold-reset] --
2,911,286 UART: [state] Locking Datavault
2,912,279 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,883 UART: [state] Locking ICCM
2,913,395 UART: [exit] Launching FMC @ 0x40000130
2,918,725 UART:
2,918,741 UART: Running Caliptra FMC ...
2,919,149 UART:
2,919,292 UART: [state] CFI Enabled
2,929,912 UART: [fht] FMC Alias Private Key: 7
3,048,890 UART: [art] Extend RT PCRs Done
3,049,318 UART: [art] Lock RT PCRs Done
3,050,806 UART: [art] Populate DV Done
3,058,831 UART: [fht] FMC Alias Private Key: 7
3,059,925 UART: [art] Derive CDI
3,060,205 UART: [art] Store in slot 0x4
3,145,544 UART: [art] Derive Key Pair
3,145,904 UART: [art] Store priv key in slot 0x5
3,159,164 UART: [art] Derive Key Pair - Done
3,173,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,123 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,888 UART: [art] PUB.X = 36AF52C391E547BBE88CBA6B8715A54ABB5654D4A46C49F9BB1FEEBBABA6B72DF6ED01592F33CB6230DFEF44578F252F
3,196,679 UART: [art] PUB.Y = EB8605E412BA1022CA3E03CEE5A3AE756757DA391523A78FE819217BD2377D4366620172ABF5BF308D5E0F405BDF729F
3,203,623 UART: [art] SIG.R = 29B6C6BB71F13B3B5E4AA71BF5D2FE6487CA3417BF9CE334F305D92487DD792488994432E5882E1C37507411E190B00B
3,210,387 UART: [art] SIG.S = 591720D0FD27F8199D683DE3F3F0D77B3074D0A41CBC30486CD890CAA36E58EB64F0AF4C8C182D0C089E4A076EA99339
3,234,280 UART: Caliptra RT
3,234,623 UART: [state] CFI Enabled
3,354,179 UART: [rt] RT listening for mailbox commands...
3,354,849 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,975 UART: [rt]cmd =0x52564348, len=36
3,386,452 >>> mbox cmd response: failed
3,386,452 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,002 UART: [rt]cmd =0x52564348, len=36
3,417,516 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,178 ready_for_fw is high
1,060,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,891 >>> mbox cmd response: success
2,742,886 UART:
2,742,902 UART: Running Caliptra FMC ...
2,743,310 UART:
2,743,453 UART: [state] CFI Enabled
2,754,093 UART: [fht] FMC Alias Private Key: 7
2,873,493 UART: [art] Extend RT PCRs Done
2,873,921 UART: [art] Lock RT PCRs Done
2,875,605 UART: [art] Populate DV Done
2,883,654 UART: [fht] FMC Alias Private Key: 7
2,884,694 UART: [art] Derive CDI
2,884,974 UART: [art] Store in slot 0x4
2,970,935 UART: [art] Derive Key Pair
2,971,295 UART: [art] Store priv key in slot 0x5
2,985,065 UART: [art] Derive Key Pair - Done
2,999,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,046 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,811 UART: [art] PUB.X = E6A5CFE0ED37A72A292FA59B95D9C1F0BD9C47DC4ABC6A1B3E6D1EC73B7A61C77C21203586C5B7FE6AD8293EB5F67243
3,022,603 UART: [art] PUB.Y = E0FD4E9BB74DE92211242C161C5303D80E47385302339F15189E4E72DA4DD2E38F62DDB0947532DB85E0D579D3E379D9
3,029,544 UART: [art] SIG.R = 01B8F298D5345A693D4875F0EDF124D5D721CA56D030EBC022C765FC753596989A85E0E62D85F5681BA837439E486704
3,036,302 UART: [art] SIG.S = 1892870A8C4B594BF228EDFDB4BC41DB5CC400BA99C759774DB4472632C8C4D8F9B202EBFD30F14CC1213283783CEB24
3,060,572 UART: Caliptra RT
3,060,915 UART: [state] CFI Enabled
3,180,907 UART: [rt] RT listening for mailbox commands...
3,181,577 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,591 UART: [rt]cmd =0x52564348, len=36
3,213,428 >>> mbox cmd response: failed
3,213,428 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,764 UART: [rt]cmd =0x52564348, len=36
3,244,484 >>> mbox cmd response: failed
test test_revoke_exported_cdi_handle::test_revoke_non_existant_exported_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
191,994 UART:
192,366 UART: Running Caliptra ROM ...
193,518 UART:
193,668 UART: [state] CFI Enabled
263,396 UART: [state] LifecycleState = Unprovisioned
265,395 UART: [state] DebugLocked = No
267,429 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,590 UART: [kat] SHA2-256
442,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,775 UART: [kat] ++
453,255 UART: [kat] sha1
464,198 UART: [kat] SHA2-256
466,847 UART: [kat] SHA2-384
472,643 UART: [kat] SHA2-512-ACC
475,011 UART: [kat] ECC-384
2,766,337 UART: [kat] HMAC-384Kdf
2,779,132 UART: [kat] LMS
3,969,437 UART: [kat] --
3,973,302 UART: [cold-reset] ++
3,974,875 UART: [fht] Storing FHT @ 0x50003400
3,986,710 UART: [idev] ++
3,987,274 UART: [idev] CDI.KEYID = 6
3,988,306 UART: [idev] SUBJECT.KEYID = 7
3,989,480 UART: [idev] UDS.KEYID = 0
3,990,551 ready_for_fw is high
3,990,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,927 UART: [idev] Erasing UDS.KEYID = 0
7,327,190 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,626 UART: [idev] --
7,352,259 UART: [ldev] ++
7,352,832 UART: [ldev] CDI.KEYID = 6
7,353,797 UART: [ldev] SUBJECT.KEYID = 5
7,355,011 UART: [ldev] AUTHORITY.KEYID = 7
7,356,245 UART: [ldev] FE.KEYID = 1
7,404,419 UART: [ldev] Erasing FE.KEYID = 1
10,734,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,086 UART: [ldev] --
13,097,704 UART: [fwproc] Waiting for Commands...
13,101,046 UART: [fwproc] Received command 0x46574c44
13,103,228 UART: [fwproc] Received Image of size 118548 bytes
22,197,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,282,555 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,355,740 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,683,730 >>> mbox cmd response: success
22,687,414 UART: [afmc] ++
22,688,038 UART: [afmc] CDI.KEYID = 6
22,688,934 UART: [afmc] SUBJECT.KEYID = 7
22,690,152 UART: [afmc] AUTHORITY.KEYID = 5
26,065,688 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,364,114 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,366,418 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,380,881 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,395,656 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,410,055 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,431,596 UART: [afmc] --
28,435,372 UART: [cold-reset] --
28,439,722 UART: [state] Locking Datavault
28,443,907 UART: [state] Locking PCR0, PCR1 and PCR31
28,445,661 UART: [state] Locking ICCM
28,447,790 UART: [exit] Launching FMC @ 0x40000130
28,456,179 UART:
28,456,413 UART: Running Caliptra FMC ...
28,457,449 UART:
28,457,596 UART: [state] CFI Enabled
28,525,481 UART: [fht] FMC Alias Private Key: 7
30,865,580 UART: [art] Extend RT PCRs Done
30,866,820 UART: [art] Lock RT PCRs Done
30,868,258 UART: [art] Populate DV Done
30,873,677 UART: [fht] FMC Alias Private Key: 7
30,875,216 UART: [art] Derive CDI
30,875,946 UART: [art] Store in slot 0x4
30,933,818 UART: [art] Derive Key Pair
30,934,857 UART: [art] Store priv key in slot 0x5
34,227,248 UART: [art] Derive Key Pair - Done
34,240,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,530,012 UART: [art] Erasing AUTHORITY.KEYID = 7
36,531,521 UART: [art] PUB.X = A863810EEB90D049ABBCDD2B977911F23A209C0B204C13DCA46199684BB18255DB94E919456FC56764E3A90B4D866B84
36,538,818 UART: [art] PUB.Y = 23B33C50AB3E2B72FED1319A92784C76B329210859F1628BCE190E09BFDB1B2DE0FCF2C6B17C8C8514FF88024A46896C
36,546,044 UART: [art] SIG.R = 9B08E8F108240FCB9EBAE4917F5842A0DCD0F8237CF97D243F1BA1C329183116085FCF047C5F06C56AE8AED15996CE80
36,553,432 UART: [art] SIG.S = 3BD17968C17FBF0BC899C4C82209C79E13925CD095D47B7B68C506B137905D961000AC479CCD22E66084738F73164F62
37,858,704 UART: Caliptra RT
37,859,406 UART: [state] CFI Enabled
38,035,850 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
42,104,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,260,250 UART: [rt]cmd =0x41544d4e, len=14344
50,653,617 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,806,141 ready_for_fw is high
3,806,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,069,115 >>> mbox cmd response: success
27,770,877 UART:
27,771,277 UART: Running Caliptra FMC ...
27,772,414 UART:
27,772,577 UART: [state] CFI Enabled
27,836,168 UART: [fht] FMC Alias Private Key: 7
30,176,838 UART: [art] Extend RT PCRs Done
30,178,066 UART: [art] Lock RT PCRs Done
30,179,478 UART: [art] Populate DV Done
30,184,955 UART: [fht] FMC Alias Private Key: 7
30,186,439 UART: [art] Derive CDI
30,187,196 UART: [art] Store in slot 0x4
30,244,941 UART: [art] Derive Key Pair
30,245,981 UART: [art] Store priv key in slot 0x5
33,538,620 UART: [art] Derive Key Pair - Done
33,551,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,840,299 UART: [art] Erasing AUTHORITY.KEYID = 7
35,841,806 UART: [art] PUB.X = D27B7525020DA8CB2131D0E0C72F726085393EDBDFCAF702041ABD3E99D2D7938A4E9961593F33513A4CB4B4FA1E3BAD
35,849,132 UART: [art] PUB.Y = 4BAF058031C9682FCF732ADA907C53286A4B2E2286141FB2FE61E3E1F2EF89565DF7EE101D0DC6D80F0A99AE51DC3477
35,856,384 UART: [art] SIG.R = 37F68EF0E7E677AC2C0711902153EFF7D3268552FCE770E20B36118F41C1F3DB44F77736F9ED9161A7C76679C7A11CA5
35,863,787 UART: [art] SIG.S = 88861494FE3B8B6767EC3BDE3217AB12716B1119EBD4AF172C0ADF578867A3BAB88C74F10969878BF1F088962082DE44
37,169,077 UART: Caliptra RT
37,169,794 UART: [state] CFI Enabled
37,344,139 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,413,600 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,568,964 UART: [rt]cmd =0x41544d4e, len=14344
50,014,538 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,438 UART:
192,813 UART: Running Caliptra ROM ...
193,964 UART:
603,729 UART: [state] CFI Enabled
621,462 UART: [state] LifecycleState = Unprovisioned
623,404 UART: [state] DebugLocked = No
626,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,149 UART: [kat] SHA2-256
800,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,402 UART: [kat] ++
811,929 UART: [kat] sha1
822,171 UART: [kat] SHA2-256
824,917 UART: [kat] SHA2-384
829,666 UART: [kat] SHA2-512-ACC
832,055 UART: [kat] ECC-384
3,115,206 UART: [kat] HMAC-384Kdf
3,126,658 UART: [kat] LMS
4,316,757 UART: [kat] --
4,321,625 UART: [cold-reset] ++
4,323,273 UART: [fht] Storing FHT @ 0x50003400
4,334,744 UART: [idev] ++
4,335,303 UART: [idev] CDI.KEYID = 6
4,336,277 UART: [idev] SUBJECT.KEYID = 7
4,337,516 UART: [idev] UDS.KEYID = 0
4,338,580 ready_for_fw is high
4,338,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,749 UART: [idev] Erasing UDS.KEYID = 0
7,621,764 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,849 UART: [idev] --
7,647,020 UART: [ldev] ++
7,647,615 UART: [ldev] CDI.KEYID = 6
7,648,519 UART: [ldev] SUBJECT.KEYID = 5
7,649,775 UART: [ldev] AUTHORITY.KEYID = 7
7,651,008 UART: [ldev] FE.KEYID = 1
7,660,063 UART: [ldev] Erasing FE.KEYID = 1
10,946,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,348 UART: [ldev] --
13,305,429 UART: [fwproc] Waiting for Commands...
13,308,261 UART: [fwproc] Received command 0x46574c44
13,310,451 UART: [fwproc] Received Image of size 118548 bytes
22,149,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,229,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,302,993 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,632,271 >>> mbox cmd response: success
22,637,170 UART: [afmc] ++
22,637,790 UART: [afmc] CDI.KEYID = 6
22,638,705 UART: [afmc] SUBJECT.KEYID = 7
22,639,913 UART: [afmc] AUTHORITY.KEYID = 5
25,955,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,248,073 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,250,334 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,264,875 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,279,667 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,294,068 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,314,870 UART: [afmc] --
28,318,296 UART: [cold-reset] --
28,323,122 UART: [state] Locking Datavault
28,329,062 UART: [state] Locking PCR0, PCR1 and PCR31
28,330,789 UART: [state] Locking ICCM
28,332,074 UART: [exit] Launching FMC @ 0x40000130
28,340,468 UART:
28,340,698 UART: Running Caliptra FMC ...
28,341,792 UART:
28,341,949 UART: [state] CFI Enabled
28,349,974 UART: [fht] FMC Alias Private Key: 7
30,690,548 UART: [art] Extend RT PCRs Done
30,691,764 UART: [art] Lock RT PCRs Done
30,693,263 UART: [art] Populate DV Done
30,698,724 UART: [fht] FMC Alias Private Key: 7
30,700,210 UART: [art] Derive CDI
30,700,966 UART: [art] Store in slot 0x4
30,743,544 UART: [art] Derive Key Pair
30,744,740 UART: [art] Store priv key in slot 0x5
33,986,627 UART: [art] Derive Key Pair - Done
33,999,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,280,562 UART: [art] Erasing AUTHORITY.KEYID = 7
36,282,062 UART: [art] PUB.X = A25445A6A3B6F1F4390F9FFA6D161BA990E895EC65D274089E4011C6245BE6B5E97C44D42749ACAAA594AA63C84AB372
36,289,307 UART: [art] PUB.Y = 43F4A463B902BCEFD98277AABCB061BC6F21BCA2F597C041EC175A3DC5ED4AE2A834E8A62C1FBF244F30F1FB67F71EA0
36,296,639 UART: [art] SIG.R = 189BC7D2AABE1A6647B4B45FF3D79903FEE5569FC7E3C721868517E96B144A3CDE1D7D3FA431A7E9F2A36AB1A3133859
36,304,032 UART: [art] SIG.S = B4B621D8134B9525509557D8358CF1F762641E7408825F1C3EE82AC129442C24491600650866D45C7B059B98AD16AC11
37,608,847 UART: Caliptra RT
37,609,550 UART: [state] CFI Enabled
37,742,717 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,804,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,960,465 UART: [rt]cmd =0x41544d4e, len=14344
50,612,368 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
4,129,247 ready_for_fw is high
4,129,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,347,602 >>> mbox cmd response: success
27,987,119 UART:
27,987,519 UART: Running Caliptra FMC ...
27,988,665 UART:
27,988,824 UART: [state] CFI Enabled
27,996,557 UART: [fht] FMC Alias Private Key: 7
30,336,981 UART: [art] Extend RT PCRs Done
30,338,208 UART: [art] Lock RT PCRs Done
30,339,780 UART: [art] Populate DV Done
30,345,351 UART: [fht] FMC Alias Private Key: 7
30,346,835 UART: [art] Derive CDI
30,347,594 UART: [art] Store in slot 0x4
30,390,048 UART: [art] Derive Key Pair
30,391,096 UART: [art] Store priv key in slot 0x5
33,632,747 UART: [art] Derive Key Pair - Done
33,645,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,926,059 UART: [art] Erasing AUTHORITY.KEYID = 7
35,927,561 UART: [art] PUB.X = 6CC0E5DD22CEC26066803930D415211EA00E1E62232E45F71CF2D90E9E071AB73497B9F5FFCD9B199079C392518C5ED1
35,934,871 UART: [art] PUB.Y = 081651E76D5A696FD2CEB0F8AC78ADFAAD5A234CE658534639513B27ABD9223751A0F3674168E8E1F9C88B7977B2A634
35,942,105 UART: [art] SIG.R = 19725B1DD2E741C6C39B550525AA1FB2BC7CCCC38269E9AD9B8AF4A2950BE5C9EF3C7BCB84DCC5BABE0B4F12E993F90B
35,949,506 UART: [art] SIG.S = 77775BA7FB1018C7291BE86492BD98602130FFE8B767DB2A583692AD3E029F28299A00EF9A2643661F781CBF2A670FAE
37,254,511 UART: Caliptra RT
37,255,201 UART: [state] CFI Enabled
37,388,710 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,465,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,621,359 UART: [rt]cmd =0x41544d4e, len=14344
50,091,534 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,014 UART:
192,415 UART: Running Caliptra ROM ...
193,614 UART:
193,771 UART: [state] CFI Enabled
267,276 UART: [state] LifecycleState = Unprovisioned
269,212 UART: [state] DebugLocked = No
271,463 UART: [state] WD Timer not started. Device not locked for debugging
275,203 UART: [kat] SHA2-256
454,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,688 UART: [kat] ++
466,217 UART: [kat] sha1
478,231 UART: [kat] SHA2-256
480,944 UART: [kat] SHA2-384
486,529 UART: [kat] SHA2-512-ACC
488,872 UART: [kat] ECC-384
2,953,066 UART: [kat] HMAC-384Kdf
2,977,732 UART: [kat] LMS
3,454,227 UART: [kat] --
3,458,582 UART: [cold-reset] ++
3,460,296 UART: [fht] FHT @ 0x50003400
3,473,050 UART: [idev] ++
3,473,623 UART: [idev] CDI.KEYID = 6
3,474,551 UART: [idev] SUBJECT.KEYID = 7
3,475,795 UART: [idev] UDS.KEYID = 0
3,476,716 ready_for_fw is high
3,476,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,626,097 UART: [idev] Erasing UDS.KEYID = 0
5,991,815 UART: [idev] Sha1 KeyId Algorithm
6,016,866 UART: [idev] --
6,021,218 UART: [ldev] ++
6,021,793 UART: [ldev] CDI.KEYID = 6
6,022,734 UART: [ldev] SUBJECT.KEYID = 5
6,023,945 UART: [ldev] AUTHORITY.KEYID = 7
6,025,193 UART: [ldev] FE.KEYID = 1
6,064,013 UART: [ldev] Erasing FE.KEYID = 1
8,571,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,306,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,322,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,338,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,354,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,337 UART: [ldev] --
10,382,055 UART: [fwproc] Wait for Commands...
10,383,661 UART: [fwproc] Recv command 0x46574c44
10,385,648 UART: [fwproc] Recv'd Img size: 118548 bytes
14,931,336 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,018,711 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,091,698 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,420,676 >>> mbox cmd response: success
15,424,832 UART: [afmc] ++
15,425,464 UART: [afmc] CDI.KEYID = 6
15,426,384 UART: [afmc] SUBJECT.KEYID = 7
15,427,602 UART: [afmc] AUTHORITY.KEYID = 5
17,970,142 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,712,230 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,714,470 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,730,317 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,746,252 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,761,913 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,785,319 UART: [afmc] --
19,788,442 UART: [cold-reset] --
19,792,735 UART: [state] Locking Datavault
19,798,135 UART: [state] Locking PCR0, PCR1 and PCR31
19,799,887 UART: [state] Locking ICCM
19,801,331 UART: [exit] Launching FMC @ 0x40000130
19,809,721 UART:
19,809,973 UART: Running Caliptra FMC ...
19,811,069 UART:
19,811,234 UART: [state] CFI Enabled
19,868,626 UART: [fht] FMC Alias Private Key: 7
21,635,643 UART: [art] Extend RT PCRs Done
21,636,872 UART: [art] Lock RT PCRs Done
21,638,574 UART: [art] Populate DV Done
21,643,987 UART: [fht] FMC Alias Private Key: 7
21,645,686 UART: [art] Derive CDI
21,646,507 UART: [art] Store in slot 0x4
21,701,008 UART: [art] Derive Key Pair
21,702,046 UART: [art] Store priv key in slot 0x5
24,164,846 UART: [art] Derive Key Pair - Done
24,177,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,890,882 UART: [art] Erasing AUTHORITY.KEYID = 7
25,892,391 UART: [art] PUB.X = C2736477E399BC28086F4EF2F00D3F4ADE29A35E9B2CB72532B091156D9D0A0F69F045F2D432B0BB74C7DED0F18A04E5
25,899,714 UART: [art] PUB.Y = CEC5C3E8D9FD69D134DBF001AAF91C401E071CDAC40E2B3488C6767CEA5252A216012A28B9942E878B82212BC0068C42
25,906,906 UART: [art] SIG.R = A3CFE05B0254A995BAA71A6B2524FCEDF9ECD6D43D279E4CCBB444EDAAE90EAD6A52074657882C07A34B6265561E061F
25,914,294 UART: [art] SIG.S = 6B3683488ACE9CADABC4689AA611F8F69658167EE984330FD7EF6596F1CE7613F0D6A4148402F5B1B650AAC388102651
26,893,529 UART: Caliptra RT
26,894,216 UART: [state] CFI Enabled
27,075,428 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,111,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,267,219 UART: [rt]cmd =0x41544d4e, len=14344
36,171,607 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
3,459,951 ready_for_fw is high
3,460,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,394,553 >>> mbox cmd response: success
19,688,273 UART:
19,688,697 UART: Running Caliptra FMC ...
19,689,833 UART:
19,689,993 UART: [state] CFI Enabled
19,755,842 UART: [fht] FMC Alias Private Key: 7
21,522,416 UART: [art] Extend RT PCRs Done
21,523,641 UART: [art] Lock RT PCRs Done
21,525,422 UART: [art] Populate DV Done
21,530,913 UART: [fht] FMC Alias Private Key: 7
21,532,564 UART: [art] Derive CDI
21,533,378 UART: [art] Store in slot 0x4
21,589,177 UART: [art] Derive Key Pair
21,590,216 UART: [art] Store priv key in slot 0x5
24,052,471 UART: [art] Derive Key Pair - Done
24,065,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,779,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,780,773 UART: [art] PUB.X = 7648FF720144554B99FDEE2BE8CCE1818F6C1C50BA2A1DC7A91FCA59DE5105DCB9C4F518C8764405E58110272A3171F7
25,788,023 UART: [art] PUB.Y = D02D646A59EA85F33D2B925460F6764AFAF0F987E5B1A0473312411CB1A51A2FA96CFB6B8B486BB313D3CA1686F7151F
25,795,283 UART: [art] SIG.R = 50F882998B40FF0DE81011FFB682EC87079CDA27995B18B4989B3CD5CF0AD881A5909A84BB6DBA3C3B3E74EE048C956F
25,802,731 UART: [art] SIG.S = 048931B440DFABE87966F31642A1E9B10855F54B377B0777637AACEEB73C534F273B47C6EF6F7036DEFFAFA148BC801E
26,781,767 UART: Caliptra RT
26,782,477 UART: [state] CFI Enabled
26,962,876 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,000,621 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,156,155 UART: [rt]cmd =0x41544d4e, len=14344
36,041,441 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,517 UART:
193,012 UART: Running Caliptra ROM ...
194,161 UART:
603,628 UART: [state] CFI Enabled
615,051 UART: [state] LifecycleState = Unprovisioned
616,975 UART: [state] DebugLocked = No
619,009 UART: [state] WD Timer not started. Device not locked for debugging
622,821 UART: [kat] SHA2-256
802,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,240 UART: [kat] ++
813,759 UART: [kat] sha1
824,488 UART: [kat] SHA2-256
827,213 UART: [kat] SHA2-384
832,703 UART: [kat] SHA2-512-ACC
835,009 UART: [kat] ECC-384
3,274,708 UART: [kat] HMAC-384Kdf
3,286,535 UART: [kat] LMS
3,763,068 UART: [kat] --
3,766,425 UART: [cold-reset] ++
3,768,787 UART: [fht] FHT @ 0x50003400
3,779,055 UART: [idev] ++
3,779,644 UART: [idev] CDI.KEYID = 6
3,780,560 UART: [idev] SUBJECT.KEYID = 7
3,781,810 UART: [idev] UDS.KEYID = 0
3,782,739 ready_for_fw is high
3,782,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,931,876 UART: [idev] Erasing UDS.KEYID = 0
6,258,925 UART: [idev] Sha1 KeyId Algorithm
6,282,973 UART: [idev] --
6,287,890 UART: [ldev] ++
6,288,501 UART: [ldev] CDI.KEYID = 6
6,289,418 UART: [ldev] SUBJECT.KEYID = 5
6,290,636 UART: [ldev] AUTHORITY.KEYID = 7
6,291,877 UART: [ldev] FE.KEYID = 1
6,303,604 UART: [ldev] Erasing FE.KEYID = 1
8,784,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,631 UART: [ldev] --
10,580,764 UART: [fwproc] Wait for Commands...
10,583,183 UART: [fwproc] Recv command 0x46574c44
10,585,165 UART: [fwproc] Recv'd Img size: 118548 bytes
15,127,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,205,621 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,278,637 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,606,138 >>> mbox cmd response: success
15,610,180 UART: [afmc] ++
15,610,796 UART: [afmc] CDI.KEYID = 6
15,611,713 UART: [afmc] SUBJECT.KEYID = 7
15,612,929 UART: [afmc] AUTHORITY.KEYID = 5
18,117,302 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,839,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,841,192 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,857,069 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,872,990 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,888,723 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,914,086 UART: [afmc] --
19,916,989 UART: [cold-reset] --
19,922,256 UART: [state] Locking Datavault
19,928,311 UART: [state] Locking PCR0, PCR1 and PCR31
19,930,010 UART: [state] Locking ICCM
19,932,113 UART: [exit] Launching FMC @ 0x40000130
19,940,515 UART:
19,940,762 UART: Running Caliptra FMC ...
19,941,867 UART:
19,942,029 UART: [state] CFI Enabled
19,949,651 UART: [fht] FMC Alias Private Key: 7
21,715,935 UART: [art] Extend RT PCRs Done
21,717,148 UART: [art] Lock RT PCRs Done
21,718,423 UART: [art] Populate DV Done
21,723,521 UART: [fht] FMC Alias Private Key: 7
21,725,168 UART: [art] Derive CDI
21,725,908 UART: [art] Store in slot 0x4
21,768,488 UART: [art] Derive Key Pair
21,769,508 UART: [art] Store priv key in slot 0x5
24,196,649 UART: [art] Derive Key Pair - Done
24,209,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,916,141 UART: [art] Erasing AUTHORITY.KEYID = 7
25,917,647 UART: [art] PUB.X = FDE08F53BCFECB75FF6B3796F34C646908997C6760A72BC77C68C907821DEBD476BA791623C618F9A2BEDF7FB0267CDD
25,924,896 UART: [art] PUB.Y = EAE15415EFB7CF27B91E2A9973D0D84037D9EE5A2146FF865BFA3FF0B317E721615E86730F7662187506958F71862898
25,932,178 UART: [art] SIG.R = 27F4C480A31A9F105CC29A7881CCED76B9711DC33DB46801D5633B34A4B7457ADCCAC7B5DB24FBED06DA907C62B3F20A
25,939,571 UART: [art] SIG.S = DCD4D8FB2506A424CA4F1E5D8BCBF20581EB451802981E978FA8ECD9FDA8CFD7F0C62F3B27320412BB06E9E7F76682EE
26,918,604 UART: Caliptra RT
26,919,318 UART: [state] CFI Enabled
27,052,257 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,093,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,248,785 UART: [rt]cmd =0x41544d4e, len=14344
36,149,131 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
3,780,226 ready_for_fw is high
3,780,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,596,708 >>> mbox cmd response: success
19,848,488 UART:
19,848,953 UART: Running Caliptra FMC ...
19,850,069 UART:
19,850,244 UART: [state] CFI Enabled
19,858,517 UART: [fht] FMC Alias Private Key: 7
21,624,789 UART: [art] Extend RT PCRs Done
21,626,015 UART: [art] Lock RT PCRs Done
21,627,761 UART: [art] Populate DV Done
21,633,396 UART: [fht] FMC Alias Private Key: 7
21,634,939 UART: [art] Derive CDI
21,635,757 UART: [art] Store in slot 0x4
21,678,302 UART: [art] Derive Key Pair
21,679,342 UART: [art] Store priv key in slot 0x5
24,106,072 UART: [art] Derive Key Pair - Done
24,119,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,825,229 UART: [art] Erasing AUTHORITY.KEYID = 7
25,826,766 UART: [art] PUB.X = 128A714B368965E3B6DB4387C191E445AE4923382E472FF897D77E972B13960FB86FF52814C71885A18F4456613E5BF9
25,833,973 UART: [art] PUB.Y = 27EF4EE8191DF10D1531E89B593A063A10B1CA5919E8BBB73E7CD35FDAEB8AA04B221CD292DC2FED21C46C20693E0BA3
25,841,236 UART: [art] SIG.R = 26935C4DC4688BE2F56EF143FA0D285F75DA6E0F013CC31329D5F62E23C21F6D1728C4D41F29B9FCA7BF45CAA1E5FEFD
25,848,692 UART: [art] SIG.S = 85C0431191D2356FE74C9233701DE9FEF13E8B8F108A251CA45A1A34B1E7F500C0DD87706BBAD4259DF3C7C93E4DB252
26,828,303 UART: Caliptra RT
26,828,995 UART: [state] CFI Enabled
26,962,749 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,012,712 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,168,853 UART: [rt]cmd =0x41544d4e, len=14344
36,077,821 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,071 UART:
192,431 UART: Running Caliptra ROM ...
193,612 UART:
193,760 UART: [state] CFI Enabled
262,948 UART: [state] LifecycleState = Unprovisioned
265,006 UART: [state] DebugLocked = No
268,179 UART: [state] WD Timer not started. Device not locked for debugging
272,356 UART: [kat] SHA2-256
462,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,960 UART: [kat] ++
473,508 UART: [kat] sha1
484,662 UART: [kat] SHA2-256
487,677 UART: [kat] SHA2-384
494,589 UART: [kat] SHA2-512-ACC
497,163 UART: [kat] ECC-384
2,952,631 UART: [kat] HMAC-384Kdf
2,973,182 UART: [kat] LMS
3,504,992 UART: [kat] --
3,510,761 UART: [cold-reset] ++
3,513,040 UART: [fht] FHT @ 0x50003400
3,523,468 UART: [idev] ++
3,524,108 UART: [idev] CDI.KEYID = 6
3,525,136 UART: [idev] SUBJECT.KEYID = 7
3,526,306 UART: [idev] UDS.KEYID = 0
3,527,490 ready_for_fw is high
3,527,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,730 UART: [idev] Erasing UDS.KEYID = 0
6,052,166 UART: [idev] Sha1 KeyId Algorithm
6,075,367 UART: [idev] --
6,079,209 UART: [ldev] ++
6,079,883 UART: [ldev] CDI.KEYID = 6
6,080,804 UART: [ldev] SUBJECT.KEYID = 5
6,081,963 UART: [ldev] AUTHORITY.KEYID = 7
6,083,196 UART: [ldev] FE.KEYID = 1
6,122,251 UART: [ldev] Erasing FE.KEYID = 1
8,629,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,598 UART: [ldev] --
10,435,261 UART: [fwproc] Wait for Commands...
10,436,980 UART: [fwproc] Recv command 0x46574c44
10,439,290 UART: [fwproc] Recv'd Img size: 118548 bytes
15,127,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,209,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,333,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,894,202 >>> mbox cmd response: success
15,899,191 UART: [afmc] ++
15,899,914 UART: [afmc] CDI.KEYID = 6
15,901,027 UART: [afmc] SUBJECT.KEYID = 7
15,902,574 UART: [afmc] AUTHORITY.KEYID = 5
18,433,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,177,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,179,492 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,194,604 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,209,799 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,224,884 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,249,147 UART: [afmc] --
20,252,677 UART: [cold-reset] --
20,256,005 UART: [state] Locking Datavault
20,261,260 UART: [state] Locking PCR0, PCR1 and PCR31
20,263,456 UART: [state] Locking ICCM
20,264,956 UART: [exit] Launching FMC @ 0x40000130
20,273,632 UART:
20,273,871 UART: Running Caliptra FMC ...
20,274,972 UART:
20,275,130 UART: [state] CFI Enabled
20,333,399 UART: [fht] FMC Alias Private Key: 7
22,121,281 UART: [art] Extend RT PCRs Done
22,122,499 UART: [art] Lock RT PCRs Done
22,124,065 UART: [art] Populate DV Done
22,129,421 UART: [fht] FMC Alias Private Key: 7
22,131,005 UART: [art] Derive CDI
22,131,823 UART: [art] Store in slot 0x4
22,187,512 UART: [art] Derive Key Pair
22,188,555 UART: [art] Store priv key in slot 0x5
24,651,088 UART: [art] Derive Key Pair - Done
24,664,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,377,447 UART: [art] Erasing AUTHORITY.KEYID = 7
26,378,952 UART: [art] PUB.X = 1222CE6E3133EF5BAC4241C8C04674A0BF3C7D0EE2E0AAD40DB4D76629AC5329683D84F3DBBE26E1561C23DB7D24F194
26,386,261 UART: [art] PUB.Y = 8DF03543241396B9AF229B690DCAFE22AE2BE813994056DFE1E500ABDB4085B1A93E064394C000C3FDB7577DEE753AAC
26,393,505 UART: [art] SIG.R = AA8BDAF5B33FDF98E2B55683E3D1D6E4A52F44049D1B5C2CC614747AE36FE670BE40598E415E08C799AA59C1443F20B7
26,400,866 UART: [art] SIG.S = 9F4E75B8D3FF14DBD154A794791E4793E9D5FFA0AFB67C6EFE4A6855A8A980146F96365F6AB514790AC8E70A01314E6F
27,379,973 UART: Caliptra RT
27,380,685 UART: [state] CFI Enabled
27,561,199 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,607,420 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,763,018 UART: [rt]cmd =0x41544d4e, len=14344
36,668,494 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,439,625 ready_for_fw is high
3,440,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,921,504 >>> mbox cmd response: success
20,204,938 UART:
20,205,323 UART: Running Caliptra FMC ...
20,206,540 UART:
20,206,712 UART: [state] CFI Enabled
20,270,200 UART: [fht] FMC Alias Private Key: 7
22,036,520 UART: [art] Extend RT PCRs Done
22,037,727 UART: [art] Lock RT PCRs Done
22,039,678 UART: [art] Populate DV Done
22,044,984 UART: [fht] FMC Alias Private Key: 7
22,046,563 UART: [art] Derive CDI
22,047,387 UART: [art] Store in slot 0x4
22,103,206 UART: [art] Derive Key Pair
22,104,210 UART: [art] Store priv key in slot 0x5
24,567,126 UART: [art] Derive Key Pair - Done
24,580,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,293,365 UART: [art] Erasing AUTHORITY.KEYID = 7
26,294,860 UART: [art] PUB.X = F7AF844186BFA6E31F0562B6D839333F8B6E62A08565689F1312734B684761B6DA81D44969D2D283EF4230E51BCE2A32
26,302,146 UART: [art] PUB.Y = 2F4A45B8011449A7A1DF5F09946BCCCBB254021C1D18E6AE326934895E0AF5EDBE92DAE9AD1453B9138342DDD9905128
26,309,374 UART: [art] SIG.R = 6F1D8DEF2CD0D439279643F32601D13515E17E0F418E8ACC4BECF180C81BE3D288E55290BF1DFCEA8145F47DD2904293
26,316,755 UART: [art] SIG.S = F6F74059BF0E274ACE22D1C311DCE4606ECF9CDCDE6025DCBF77AC3EC6C60D4DC14E8ADB8AF1612AF7C8929978B9B658
27,295,926 UART: Caliptra RT
27,296,635 UART: [state] CFI Enabled
27,477,669 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,524,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,679,838 UART: [rt]cmd =0x41544d4e, len=14344
36,583,887 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,143 writing to cptra_bootfsm_go
192,375 UART:
192,735 UART: Running Caliptra ROM ...
193,924 UART:
603,552 UART: [state] CFI Enabled
616,449 UART: [state] LifecycleState = Unprovisioned
618,831 UART: [state] DebugLocked = No
621,789 UART: [state] WD Timer not started. Device not locked for debugging
626,545 UART: [kat] SHA2-256
816,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,166 UART: [kat] ++
827,718 UART: [kat] sha1
838,950 UART: [kat] SHA2-256
841,966 UART: [kat] SHA2-384
849,187 UART: [kat] SHA2-512-ACC
851,777 UART: [kat] ECC-384
3,294,516 UART: [kat] HMAC-384Kdf
3,307,603 UART: [kat] LMS
3,839,429 UART: [kat] --
3,843,132 UART: [cold-reset] ++
3,845,570 UART: [fht] FHT @ 0x50003400
3,858,394 UART: [idev] ++
3,859,033 UART: [idev] CDI.KEYID = 6
3,860,074 UART: [idev] SUBJECT.KEYID = 7
3,861,256 UART: [idev] UDS.KEYID = 0
3,862,195 ready_for_fw is high
3,862,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,344 UART: [idev] Erasing UDS.KEYID = 0
6,334,741 UART: [idev] Sha1 KeyId Algorithm
6,357,911 UART: [idev] --
6,363,279 UART: [ldev] ++
6,363,964 UART: [ldev] CDI.KEYID = 6
6,364,880 UART: [ldev] SUBJECT.KEYID = 5
6,366,044 UART: [ldev] AUTHORITY.KEYID = 7
6,367,283 UART: [ldev] FE.KEYID = 1
6,377,175 UART: [ldev] Erasing FE.KEYID = 1
8,853,507 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,656 UART: [ldev] --
10,648,013 UART: [fwproc] Wait for Commands...
10,651,029 UART: [fwproc] Recv command 0x46574c44
10,653,341 UART: [fwproc] Recv'd Img size: 118548 bytes
15,315,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,396,433 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,520,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,081,008 >>> mbox cmd response: success
16,085,339 UART: [afmc] ++
16,086,066 UART: [afmc] CDI.KEYID = 6
16,087,268 UART: [afmc] SUBJECT.KEYID = 7
16,088,721 UART: [afmc] AUTHORITY.KEYID = 5
18,593,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,317,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,319,477 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,334,583 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,349,831 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,364,861 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,388,993 UART: [afmc] --
20,393,022 UART: [cold-reset] --
20,396,076 UART: [state] Locking Datavault
20,403,536 UART: [state] Locking PCR0, PCR1 and PCR31
20,405,705 UART: [state] Locking ICCM
20,407,857 UART: [exit] Launching FMC @ 0x40000130
20,416,506 UART:
20,416,747 UART: Running Caliptra FMC ...
20,417,850 UART:
20,418,011 UART: [state] CFI Enabled
20,426,012 UART: [fht] FMC Alias Private Key: 7
22,192,072 UART: [art] Extend RT PCRs Done
22,193,291 UART: [art] Lock RT PCRs Done
22,194,894 UART: [art] Populate DV Done
22,200,468 UART: [fht] FMC Alias Private Key: 7
22,202,168 UART: [art] Derive CDI
22,202,910 UART: [art] Store in slot 0x4
22,245,505 UART: [art] Derive Key Pair
22,246,547 UART: [art] Store priv key in slot 0x5
24,673,453 UART: [art] Derive Key Pair - Done
24,686,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,564 UART: [art] Erasing AUTHORITY.KEYID = 7
26,394,193 UART: [art] PUB.X = 669F34D065B28C184CD3ECD08413F8010269CEEE3842D57137EFBFA028B4C45F08DA33A167E36D310E88B2C8999968BA
26,401,356 UART: [art] PUB.Y = 8AC152B4E1402B1725F8302C12E2CD370851D996AE778C7B38A6503EF6745FDA66E243C2F90E5A14A29494E70BD54E5A
26,408,614 UART: [art] SIG.R = 5ED80F66837A36777336FC0A55C543682C2A145B34793624E479A1ECDBB5BBCCEAC506E297D8344C21192B85AA06C135
26,415,994 UART: [art] SIG.S = 17A738FE71FF96706B228B684703A3D36E17CD223B1727F4AAA78485E3DC88ED55F6721C1266BD5FC4B568D685E02BCE
27,394,697 UART: Caliptra RT
27,395,386 UART: [state] CFI Enabled
27,527,893 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,581,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,736,812 UART: [rt]cmd =0x41544d4e, len=14344
36,645,195 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,758,654 ready_for_fw is high
3,759,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,129,305 >>> mbox cmd response: success
20,388,409 UART:
20,388,808 UART: Running Caliptra FMC ...
20,389,957 UART:
20,390,143 UART: [state] CFI Enabled
20,398,185 UART: [fht] FMC Alias Private Key: 7
22,164,581 UART: [art] Extend RT PCRs Done
22,165,806 UART: [art] Lock RT PCRs Done
22,167,543 UART: [art] Populate DV Done
22,172,974 UART: [fht] FMC Alias Private Key: 7
22,174,665 UART: [art] Derive CDI
22,175,493 UART: [art] Store in slot 0x4
22,217,933 UART: [art] Derive Key Pair
22,218,938 UART: [art] Store priv key in slot 0x5
24,645,898 UART: [art] Derive Key Pair - Done
24,658,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,365,172 UART: [art] Erasing AUTHORITY.KEYID = 7
26,366,676 UART: [art] PUB.X = 3F0B6E22C192DA09E388496CC2272D764F4933D7879CC8CBB04DCA6273D189ECF406D707701528BF63BC73A005FD4AE4
26,373,955 UART: [art] PUB.Y = 7603AC2656B6290B8E1DFC83D5861CDFF119A675FF2AAAA54BFFD4DD1102875DCCF7006F96D398FE9850189E7ADD9233
26,381,220 UART: [art] SIG.R = 10F16EB1881803D51103A63FECE827084D9055251C22D3BA46BE0900B73FE7E5F1A8576FD496B4792A474E17ECA1EF34
26,388,558 UART: [art] SIG.S = 531BF82E59EEFDB65A6A781FCBBD586DC2D7313E0E7EAF381487927F93A7CB8989B8347790FB1981804CE013D8F45BCF
27,367,588 UART: Caliptra RT
27,368,298 UART: [state] CFI Enabled
27,500,814 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,556,373 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,711,869 UART: [rt]cmd =0x41544d4e, len=14344
36,601,564 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,230 UART: [kat] SHA2-512-ACC
897,131 UART: [kat] ECC-384
902,584 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,397 UART: [cold-reset] ++
1,476,903 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,990 UART: [idev] Erasing UDS.KEYID = 0
1,505,204 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,804 UART: [idev] --
1,514,877 UART: [ldev] ++
1,515,045 UART: [ldev] CDI.KEYID = 6
1,515,408 UART: [ldev] SUBJECT.KEYID = 5
1,515,834 UART: [ldev] AUTHORITY.KEYID = 7
1,516,297 UART: [ldev] FE.KEYID = 1
1,521,553 UART: [ldev] Erasing FE.KEYID = 1
1,546,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,164 UART: [ldev] --
1,585,481 UART: [fwproc] Waiting for Commands...
1,586,324 UART: [fwproc] Received command 0x46574c44
1,587,115 UART: [fwproc] Received Image of size 118548 bytes
5,091,138 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,118,588 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,149,806 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,290,175 >>> mbox cmd response: success
5,291,259 UART: [afmc] ++
5,291,427 UART: [afmc] CDI.KEYID = 6
5,291,789 UART: [afmc] SUBJECT.KEYID = 7
5,292,214 UART: [afmc] AUTHORITY.KEYID = 5
5,326,777 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,342,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,343,707 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,349,413 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,355,292 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,361,005 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,368,898 UART: [afmc] --
5,369,952 UART: [cold-reset] --
5,370,460 UART: [state] Locking Datavault
5,372,023 UART: [state] Locking PCR0, PCR1 and PCR31
5,372,627 UART: [state] Locking ICCM
5,373,211 UART: [exit] Launching FMC @ 0x40000130
5,378,541 UART:
5,378,557 UART: Running Caliptra FMC ...
5,378,965 UART:
5,379,019 UART: [state] CFI Enabled
5,389,401 UART: [fht] FMC Alias Private Key: 7
5,508,707 UART: [art] Extend RT PCRs Done
5,509,135 UART: [art] Lock RT PCRs Done
5,510,533 UART: [art] Populate DV Done
5,518,756 UART: [fht] FMC Alias Private Key: 7
5,519,756 UART: [art] Derive CDI
5,520,036 UART: [art] Store in slot 0x4
5,605,752 UART: [art] Derive Key Pair
5,606,112 UART: [art] Store priv key in slot 0x5
5,619,065 UART: [art] Derive Key Pair - Done
5,633,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,649,263 UART: [art] Erasing AUTHORITY.KEYID = 7
5,650,028 UART: [art] PUB.X = 64D4B80177509A86F113E6697AA8862B5362E9B105FF580E86D62B15E0F6517CDCFFEF5559D1C143ED39E15CBB4A70C6
5,656,795 UART: [art] PUB.Y = D749640A8D123647789846A1597C170A03A955514ABD14B59F4BBFAC2B9C8D90844697F8A37C2B887A164587D96962BB
5,663,730 UART: [art] SIG.R = A9BB8AC24E3212D103F0D8FD13235E856E171D65F8F2D2518B5BC4137BBEFB084666EE6862E7E3D977EF119DD8B96678
5,670,502 UART: [art] SIG.S = 61CDFBA5F41BD96EBCAF73E11C5E5F1361A08872818A98982DEB14BE2E069F23989D8D82275DACEEE130362D968DFE9D
5,694,429 UART: Caliptra RT
5,694,680 UART: [state] CFI Enabled
5,815,170 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,815,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,938,958 UART: [rt]cmd =0x41544d4e, len=14344
11,019,506 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,217 ready_for_fw is high
1,362,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,066,757 >>> mbox cmd response: success
5,128,854 UART:
5,128,870 UART: Running Caliptra FMC ...
5,129,278 UART:
5,129,332 UART: [state] CFI Enabled
5,139,916 UART: [fht] FMC Alias Private Key: 7
5,259,138 UART: [art] Extend RT PCRs Done
5,259,566 UART: [art] Lock RT PCRs Done
5,261,056 UART: [art] Populate DV Done
5,269,293 UART: [fht] FMC Alias Private Key: 7
5,270,359 UART: [art] Derive CDI
5,270,639 UART: [art] Store in slot 0x4
5,356,161 UART: [art] Derive Key Pair
5,356,521 UART: [art] Store priv key in slot 0x5
5,370,430 UART: [art] Derive Key Pair - Done
5,384,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,400,617 UART: [art] Erasing AUTHORITY.KEYID = 7
5,401,382 UART: [art] PUB.X = A02F52ECD0816BC7D39ABB23E1E63F5DAE0F9F82640D36505B23466DBDD2206E959E0A0527891CB092319CC76C800D68
5,408,143 UART: [art] PUB.Y = 0F964AA51C268498624162FAB400E6BC7CEB6F8F87FF7501CEF774E92F42A2E5A81616C3E6326E9FB1B043EC592047BC
5,415,073 UART: [art] SIG.R = C4B2A273D888B8ACC209B0E349557FEEE1FA326B226DD42AA55B1B6533773512F5FAE80ED161A73E82AAC79E8CD614BB
5,421,853 UART: [art] SIG.S = 59F9F8F2D6C5CCAB8ED37939ADE845996F0CDB526DD38B8866F61623E68F86556A2C6299FA155322F656DF3C634EBCB9
5,446,142 UART: Caliptra RT
5,446,393 UART: [state] CFI Enabled
5,566,379 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,567,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,690,239 UART: [rt]cmd =0x41544d4e, len=14344
10,543,658 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,904 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
891,190 UART: [kat] SHA2-256
893,128 UART: [kat] SHA2-384
896,017 UART: [kat] SHA2-512-ACC
897,918 UART: [kat] ECC-384
903,551 UART: [kat] HMAC-384Kdf
908,133 UART: [kat] LMS
1,476,329 UART: [kat] --
1,477,284 UART: [cold-reset] ++
1,477,836 UART: [fht] Storing FHT @ 0x50003400
1,480,555 UART: [idev] ++
1,480,723 UART: [idev] CDI.KEYID = 6
1,481,083 UART: [idev] SUBJECT.KEYID = 7
1,481,507 UART: [idev] UDS.KEYID = 0
1,481,852 ready_for_fw is high
1,481,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,387 UART: [idev] Erasing UDS.KEYID = 0
1,506,249 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,845 UART: [idev] --
1,515,704 UART: [ldev] ++
1,515,872 UART: [ldev] CDI.KEYID = 6
1,516,235 UART: [ldev] SUBJECT.KEYID = 5
1,516,661 UART: [ldev] AUTHORITY.KEYID = 7
1,517,124 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,548,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,305 UART: [ldev] --
1,587,718 UART: [fwproc] Waiting for Commands...
1,588,433 UART: [fwproc] Received command 0x46574c44
1,589,224 UART: [fwproc] Received Image of size 118548 bytes
5,358,256 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,385,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,416,884 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,557,099 >>> mbox cmd response: success
5,558,255 UART: [afmc] ++
5,558,423 UART: [afmc] CDI.KEYID = 6
5,558,785 UART: [afmc] SUBJECT.KEYID = 7
5,559,210 UART: [afmc] AUTHORITY.KEYID = 5
5,594,633 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,610,899 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,611,679 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,617,385 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,623,264 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,628,977 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,636,928 UART: [afmc] --
5,638,032 UART: [cold-reset] --
5,638,818 UART: [state] Locking Datavault
5,639,769 UART: [state] Locking PCR0, PCR1 and PCR31
5,640,373 UART: [state] Locking ICCM
5,640,857 UART: [exit] Launching FMC @ 0x40000130
5,646,187 UART:
5,646,203 UART: Running Caliptra FMC ...
5,646,611 UART:
5,646,754 UART: [state] CFI Enabled
5,657,294 UART: [fht] FMC Alias Private Key: 7
5,775,618 UART: [art] Extend RT PCRs Done
5,776,046 UART: [art] Lock RT PCRs Done
5,777,672 UART: [art] Populate DV Done
5,785,803 UART: [fht] FMC Alias Private Key: 7
5,786,833 UART: [art] Derive CDI
5,787,113 UART: [art] Store in slot 0x4
5,872,873 UART: [art] Derive Key Pair
5,873,233 UART: [art] Store priv key in slot 0x5
5,886,386 UART: [art] Derive Key Pair - Done
5,901,120 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,916,495 UART: [art] Erasing AUTHORITY.KEYID = 7
5,917,260 UART: [art] PUB.X = 62E74E9980231AC0F962FA48D8334170835C4FD8647577C9A94C28D7E91572A1FF4CE97E0E245D55D7C2557A39A3F49B
5,924,025 UART: [art] PUB.Y = 4B3DA04F0ED863D7A8F9467BA295D72E8106F492306A23DC34782DB404C468420C7822F760A1B2A4BE15DC21C20E37FB
5,930,964 UART: [art] SIG.R = E8C6F614A172BC2D2FFA36E314BDCE274B1D5D6F25DC37B082B7D6AFBDE0B4DA388CEB77CEDE2DBDC57EAC4BA788922B
5,937,770 UART: [art] SIG.S = 550D64F68D1E5F4CE78CA1F24A8463075224A4FCD56C4555F736B1CF57BD9DEDCBF6C849521D5BEFF7D1EFB6BDFCB3BD
5,961,716 UART: Caliptra RT
5,962,059 UART: [state] CFI Enabled
6,081,371 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
6,082,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,204,881 UART: [rt]cmd =0x41544d4e, len=14344
11,095,928 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 ready_for_fw is high
1,362,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,028,395 >>> mbox cmd response: success
5,090,568 UART:
5,090,584 UART: Running Caliptra FMC ...
5,090,992 UART:
5,091,135 UART: [state] CFI Enabled
5,101,627 UART: [fht] FMC Alias Private Key: 7
5,219,995 UART: [art] Extend RT PCRs Done
5,220,423 UART: [art] Lock RT PCRs Done
5,221,783 UART: [art] Populate DV Done
5,229,650 UART: [fht] FMC Alias Private Key: 7
5,230,820 UART: [art] Derive CDI
5,231,100 UART: [art] Store in slot 0x4
5,316,396 UART: [art] Derive Key Pair
5,316,756 UART: [art] Store priv key in slot 0x5
5,330,339 UART: [art] Derive Key Pair - Done
5,345,363 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,360,868 UART: [art] Erasing AUTHORITY.KEYID = 7
5,361,633 UART: [art] PUB.X = 85D1BC7AD52EAFD9A8EBC4F1F52A8D9F278389F23E0C13240870D457F7B29D6E79DA41E60C2B7AD4DD5827B90B2BAEAB
5,368,413 UART: [art] PUB.Y = 75FD0B6EFC8A1C275F0E29343289679B2DE5A38A1974836696147EDF20CAAEBB1BE3FDED2E93E2C11C1B0DE36A4CC753
5,375,372 UART: [art] SIG.R = 0D732EE44F7E868760540385E623C6CCA256884D6B497F8FA0513EE0A7CF14E32D2AD1637D0F3EE7F128036E22A6ECD5
5,382,136 UART: [art] SIG.S = 0CF352DC897C916D3E41EA1284DCA249C81690177E3965BC7AE45E7E9C57F072529D0B0D4B9F71147970AA18A66956A7
5,406,199 UART: Caliptra RT
5,406,542 UART: [state] CFI Enabled
5,527,381 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,528,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,650,913 UART: [rt]cmd =0x41544d4e, len=14344
10,579,184 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,300 UART: [state] LifecycleState = Unprovisioned
85,955 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,912 UART: [kat] SHA2-256
891,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,566 UART: [kat] ++
895,718 UART: [kat] sha1
900,062 UART: [kat] SHA2-256
902,002 UART: [kat] SHA2-384
904,843 UART: [kat] SHA2-512-ACC
906,744 UART: [kat] ECC-384
916,609 UART: [kat] HMAC-384Kdf
921,125 UART: [kat] LMS
1,169,437 UART: [kat] --
1,170,246 UART: [cold-reset] ++
1,170,712 UART: [fht] FHT @ 0x50003400
1,173,570 UART: [idev] ++
1,173,738 UART: [idev] CDI.KEYID = 6
1,174,099 UART: [idev] SUBJECT.KEYID = 7
1,174,524 UART: [idev] UDS.KEYID = 0
1,174,870 ready_for_fw is high
1,174,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,329 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,431 UART: [idev] --
1,209,344 UART: [ldev] ++
1,209,512 UART: [ldev] CDI.KEYID = 6
1,209,876 UART: [ldev] SUBJECT.KEYID = 5
1,210,303 UART: [ldev] AUTHORITY.KEYID = 7
1,210,766 UART: [ldev] FE.KEYID = 1
1,215,988 UART: [ldev] Erasing FE.KEYID = 1
1,242,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,569 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,285 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,040 UART: [ldev] --
1,281,275 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,682 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,363,883 >>> mbox cmd response: success
3,364,971 UART: [afmc] ++
3,365,139 UART: [afmc] CDI.KEYID = 6
3,365,502 UART: [afmc] SUBJECT.KEYID = 7
3,365,928 UART: [afmc] AUTHORITY.KEYID = 5
3,401,227 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,168 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,917 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,624 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,501 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,211 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,827 UART: [afmc] --
3,444,828 UART: [cold-reset] --
3,445,940 UART: [state] Locking Datavault
3,446,973 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,577 UART: [state] Locking ICCM
3,448,179 UART: [exit] Launching FMC @ 0x40000130
3,453,509 UART:
3,453,525 UART: Running Caliptra FMC ...
3,453,933 UART:
3,453,987 UART: [state] CFI Enabled
3,464,373 UART: [fht] FMC Alias Private Key: 7
3,583,003 UART: [art] Extend RT PCRs Done
3,583,431 UART: [art] Lock RT PCRs Done
3,584,713 UART: [art] Populate DV Done
3,593,094 UART: [fht] FMC Alias Private Key: 7
3,594,044 UART: [art] Derive CDI
3,594,324 UART: [art] Store in slot 0x4
3,680,605 UART: [art] Derive Key Pair
3,680,965 UART: [art] Store priv key in slot 0x5
3,694,145 UART: [art] Derive Key Pair - Done
3,709,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,470 UART: [art] PUB.X = BC0D425323D721ACE7349DEDC434AF4046002C4809F33F74959B1D0647AB447DD6CE3776C86FD2E44C4ACFBA27E9F60D
3,732,218 UART: [art] PUB.Y = 387C82C3F21038C87DED101B7C2E094D09200F5C94B08433B795EAECE3DA8F4D5682A8960E09DFEAE0A34CD890F136E4
3,739,163 UART: [art] SIG.R = 40444040AE3E6BD287A706DF2DCA0B5E7AB750C464D8515DB9458215A5C7843F488696004E909282DB8D0954731584E4
3,745,894 UART: [art] SIG.S = 64954DA34E549215C3BEE4FC2E530EF6C1547C8FF6A3D4615DF7B1BA785D0D8B8FFCAE3BD8BFBFC583B0C351B72EE07B
3,770,012 UART: Caliptra RT
3,770,263 UART: [state] CFI Enabled
3,890,255 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,890,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,827 UART: [rt]cmd =0x41544d4e, len=14344
5,458,496 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,570 ready_for_fw is high
1,059,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,557 >>> mbox cmd response: success
3,285,150 UART:
3,285,166 UART: Running Caliptra FMC ...
3,285,574 UART:
3,285,628 UART: [state] CFI Enabled
3,296,282 UART: [fht] FMC Alias Private Key: 7
3,415,328 UART: [art] Extend RT PCRs Done
3,415,756 UART: [art] Lock RT PCRs Done
3,417,238 UART: [art] Populate DV Done
3,425,543 UART: [fht] FMC Alias Private Key: 7
3,426,531 UART: [art] Derive CDI
3,426,811 UART: [art] Store in slot 0x4
3,512,292 UART: [art] Derive Key Pair
3,512,652 UART: [art] Store priv key in slot 0x5
3,526,062 UART: [art] Derive Key Pair - Done
3,541,100 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,414 UART: [art] PUB.X = 09F6FA3D446662E8C725A6A0824B0AD7936E376FA2B1AF7DD08963E574FEFB5D57558FE1A1599A8DD0673E69BE187724
3,564,184 UART: [art] PUB.Y = 8A16881E6A78D22C559BC32F36C6C62651A2D04A321E41835D2C73AE4CEA0921779D4E8B7FE9F3D41AD2AF852CAB93EA
3,571,143 UART: [art] SIG.R = E7F23F680F68BFAB96D7FA9061320573E3FF41618242D7C1871D81FA8069693C0D4907761CB77F0D60D180F95FA1F835
3,577,896 UART: [art] SIG.S = CC6C3382A344A0624CA26EDD9296D62DB8909716E4446CDB5F6F8DA2CA4621E268501315294F5C6B4D5183494DBA96CD
3,601,062 UART: Caliptra RT
3,601,313 UART: [state] CFI Enabled
3,720,744 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,721,414 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,500 UART: [rt]cmd =0x41544d4e, len=14344
5,280,468 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
891,587 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,691 UART: [kat] ++
895,843 UART: [kat] sha1
900,019 UART: [kat] SHA2-256
901,959 UART: [kat] SHA2-384
904,792 UART: [kat] SHA2-512-ACC
906,693 UART: [kat] ECC-384
916,592 UART: [kat] HMAC-384Kdf
921,218 UART: [kat] LMS
1,169,530 UART: [kat] --
1,170,343 UART: [cold-reset] ++
1,170,677 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 ready_for_fw is high
1,174,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,384 UART: [idev] Erasing UDS.KEYID = 0
1,199,530 UART: [idev] Sha1 KeyId Algorithm
1,208,558 UART: [idev] --
1,209,543 UART: [ldev] ++
1,209,711 UART: [ldev] CDI.KEYID = 6
1,210,075 UART: [ldev] SUBJECT.KEYID = 5
1,210,502 UART: [ldev] AUTHORITY.KEYID = 7
1,210,965 UART: [ldev] FE.KEYID = 1
1,216,285 UART: [ldev] Erasing FE.KEYID = 1
1,242,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,003 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,065 UART: [fwproc] Recv command 0x46574c44
1,282,798 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,786 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,961 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,120 >>> mbox cmd response: success
3,379,272 UART: [afmc] ++
3,379,440 UART: [afmc] CDI.KEYID = 6
3,379,803 UART: [afmc] SUBJECT.KEYID = 7
3,380,229 UART: [afmc] AUTHORITY.KEYID = 5
3,416,150 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,314 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,021 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,898 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,608 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,338 UART: [afmc] --
3,459,381 UART: [cold-reset] --
3,460,127 UART: [state] Locking Datavault
3,461,000 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,604 UART: [state] Locking ICCM
3,462,256 UART: [exit] Launching FMC @ 0x40000130
3,467,586 UART:
3,467,602 UART: Running Caliptra FMC ...
3,468,010 UART:
3,468,153 UART: [state] CFI Enabled
3,478,483 UART: [fht] FMC Alias Private Key: 7
3,596,943 UART: [art] Extend RT PCRs Done
3,597,371 UART: [art] Lock RT PCRs Done
3,598,729 UART: [art] Populate DV Done
3,606,806 UART: [fht] FMC Alias Private Key: 7
3,607,788 UART: [art] Derive CDI
3,608,068 UART: [art] Store in slot 0x4
3,693,971 UART: [art] Derive Key Pair
3,694,331 UART: [art] Store priv key in slot 0x5
3,707,409 UART: [art] Derive Key Pair - Done
3,722,481 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,684 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,449 UART: [art] PUB.X = 18BBA94705EEF63727995E18861093AE332196DAE729DD49D7388AF0C59A58B45B98D0A573528C55C24BD35B8C5E09E5
3,745,213 UART: [art] PUB.Y = 1E355A8C403B1D28323A7A97CCF3835E5D14CD041914B90B615E42A458E8F10BC735E144B5CD0613E2D99C71BEF0C477
3,752,155 UART: [art] SIG.R = 9AF77C13A806F05644CE50C337F44B341EA30D63E6A7A739BC306FEF561F944DC0DD695FB70AD6F280AD2036486C7814
3,758,922 UART: [art] SIG.S = 486665066AF2D7E071E2FE2637B2A72AC78761BD5E1A7EC2752B53E3E529A14D6AC290D77C8EEF5ECE81F495686AAC6B
3,782,599 UART: Caliptra RT
3,782,942 UART: [state] CFI Enabled
3,901,898 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,902,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,772 UART: [rt]cmd =0x41544d4e, len=14344
5,477,994 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,051 ready_for_fw is high
1,060,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,091 >>> mbox cmd response: success
3,283,892 UART:
3,283,908 UART: Running Caliptra FMC ...
3,284,316 UART:
3,284,459 UART: [state] CFI Enabled
3,295,355 UART: [fht] FMC Alias Private Key: 7
3,414,381 UART: [art] Extend RT PCRs Done
3,414,809 UART: [art] Lock RT PCRs Done
3,416,287 UART: [art] Populate DV Done
3,424,466 UART: [fht] FMC Alias Private Key: 7
3,425,640 UART: [art] Derive CDI
3,425,920 UART: [art] Store in slot 0x4
3,511,883 UART: [art] Derive Key Pair
3,512,243 UART: [art] Store priv key in slot 0x5
3,525,749 UART: [art] Derive Key Pair - Done
3,540,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,131 UART: [art] PUB.X = E74F332F20ABFDD2A4A7B41C85F4AE694ADEFB4564DC5C697511490A22D3978D916564439DF0B93A7D5638AA2FA387EE
3,563,910 UART: [art] PUB.Y = 70A48EA61AABA383F3302A3E60A050D192D15BCA6CFB66BF31BF7DFF6EE6198217A2E284C9A9EC7E137FDB71E63E52A0
3,570,880 UART: [art] SIG.R = EE95991C920D60E54A2BE2433BD4BE9168863EEE1F454286AE3FF7281B33E1922F9B9574D14C05354987AF0F3F71F7B2
3,577,643 UART: [art] SIG.S = 7755F69B2CBE8EC509AA06CA8C073092024A80D8E2BBFF5FA247DDBC96500EFC00BFAA9E5BE4BC67E9797C2C0829CBC4
3,601,259 UART: Caliptra RT
3,601,602 UART: [state] CFI Enabled
3,721,394 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,722,064 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,870 UART: [rt]cmd =0x41544d4e, len=14344
5,302,400 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
893,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,511 UART: [kat] ++
897,663 UART: [kat] sha1
901,927 UART: [kat] SHA2-256
903,867 UART: [kat] SHA2-384
906,742 UART: [kat] SHA2-512-ACC
908,643 UART: [kat] ECC-384
918,198 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,409 UART: [fht] FHT @ 0x50003400
1,175,086 UART: [idev] ++
1,175,254 UART: [idev] CDI.KEYID = 6
1,175,614 UART: [idev] SUBJECT.KEYID = 7
1,176,038 UART: [idev] UDS.KEYID = 0
1,176,383 ready_for_fw is high
1,176,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,744 UART: [idev] Erasing UDS.KEYID = 0
1,200,325 UART: [idev] Sha1 KeyId Algorithm
1,208,773 UART: [idev] --
1,209,761 UART: [ldev] ++
1,209,929 UART: [ldev] CDI.KEYID = 6
1,210,292 UART: [ldev] SUBJECT.KEYID = 5
1,210,718 UART: [ldev] AUTHORITY.KEYID = 7
1,211,181 UART: [ldev] FE.KEYID = 1
1,216,375 UART: [ldev] Erasing FE.KEYID = 1
1,242,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,527 UART: [ldev] --
1,281,792 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,324 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,689 >>> mbox cmd response: success
3,367,877 UART: [afmc] ++
3,368,045 UART: [afmc] CDI.KEYID = 6
3,368,407 UART: [afmc] SUBJECT.KEYID = 7
3,368,832 UART: [afmc] AUTHORITY.KEYID = 5
3,404,209 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,510 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,258 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,964 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,843 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,553 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,332 UART: [afmc] --
3,447,248 UART: [cold-reset] --
3,448,244 UART: [state] Locking Datavault
3,449,549 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,153 UART: [state] Locking ICCM
3,450,717 UART: [exit] Launching FMC @ 0x40000130
3,456,047 UART:
3,456,063 UART: Running Caliptra FMC ...
3,456,471 UART:
3,456,525 UART: [state] CFI Enabled
3,467,407 UART: [fht] FMC Alias Private Key: 7
3,585,395 UART: [art] Extend RT PCRs Done
3,585,823 UART: [art] Lock RT PCRs Done
3,587,335 UART: [art] Populate DV Done
3,595,498 UART: [fht] FMC Alias Private Key: 7
3,596,526 UART: [art] Derive CDI
3,596,806 UART: [art] Store in slot 0x4
3,682,417 UART: [art] Derive Key Pair
3,682,777 UART: [art] Store priv key in slot 0x5
3,695,653 UART: [art] Derive Key Pair - Done
3,710,523 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,239 UART: [art] PUB.X = 802A41670E2ACD31201000544246D8647200DE3EFF3F776221C6F61A809FEA3CBEA75C782C606302D332804F9B1ED6D4
3,733,957 UART: [art] PUB.Y = 363875160C6A305D7A67B1AE36EC2E0BABC5E7077571ECE3E5FC12D3FDD6C0EA39091C805223785F67B76B64B42D3832
3,740,901 UART: [art] SIG.R = FD1F8003B370E0121A87E7922005797915ECA9F98D000129DE8B738894CAB1DE64996E7A6B74E796F10B8F9B26BDDB81
3,747,639 UART: [art] SIG.S = 56F70642E66271B92F8C599AE5AB2F972D58592C14919C4F609077C4DC65B2CE41F4316883A60F3FF7E8A5E19C5DF97B
3,771,189 UART: Caliptra RT
3,771,440 UART: [state] CFI Enabled
3,891,360 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,892,030 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,928 UART: [rt]cmd =0x41544d4e, len=14344
5,459,359 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 ready_for_fw is high
1,060,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,016 >>> mbox cmd response: success
3,287,083 UART:
3,287,099 UART: Running Caliptra FMC ...
3,287,507 UART:
3,287,561 UART: [state] CFI Enabled
3,298,025 UART: [fht] FMC Alias Private Key: 7
3,416,511 UART: [art] Extend RT PCRs Done
3,416,939 UART: [art] Lock RT PCRs Done
3,418,681 UART: [art] Populate DV Done
3,426,822 UART: [fht] FMC Alias Private Key: 7
3,427,844 UART: [art] Derive CDI
3,428,124 UART: [art] Store in slot 0x4
3,513,695 UART: [art] Derive Key Pair
3,514,055 UART: [art] Store priv key in slot 0x5
3,527,209 UART: [art] Derive Key Pair - Done
3,541,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,607 UART: [art] PUB.X = CD1929ABDA1F0323261471939D8591D15587D9C8536A783A11361CC26C20C8DF1F056B9A93C1BAD689F56EAC59B6E99C
3,564,375 UART: [art] PUB.Y = 92719D29104D5E63494F75E3F2516559A3465335D4101D5AB7362FE559BA561697B14F6F99F97325C4E987AE786FCE9A
3,571,317 UART: [art] SIG.R = A16E1FF5F493E45D61AE27A2274A3DBACA7DBE75E68DF17CCEE09398DDF98B22DA0A1749E6A4FE7BE2342DBA842313C0
3,578,108 UART: [art] SIG.S = 3980F14FD9287E1F53A24ECC0D4B29B49466D16ECC4A40C82E5E40022F11A9D8221A1296A5BAD23B23415B5A2CBE05C5
3,602,019 UART: Caliptra RT
3,602,270 UART: [state] CFI Enabled
3,723,300 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,723,970 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,974 UART: [rt]cmd =0x41544d4e, len=14344
5,293,130 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,753 UART: [kat] SHA2-512-ACC
908,654 UART: [kat] ECC-384
918,583 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,676 UART: [cold-reset] ++
1,173,096 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 ready_for_fw is high
1,176,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,202,144 UART: [idev] Sha1 KeyId Algorithm
1,210,456 UART: [idev] --
1,211,604 UART: [ldev] ++
1,211,772 UART: [ldev] CDI.KEYID = 6
1,212,135 UART: [ldev] SUBJECT.KEYID = 5
1,212,561 UART: [ldev] AUTHORITY.KEYID = 7
1,213,024 UART: [ldev] FE.KEYID = 1
1,217,946 UART: [ldev] Erasing FE.KEYID = 1
1,244,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,432 UART: [ldev] --
1,283,881 UART: [fwproc] Wait for Commands...
1,284,483 UART: [fwproc] Recv command 0x46574c44
1,285,211 UART: [fwproc] Recv'd Img size: 118548 bytes
3,183,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,211,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,242,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,383,114 >>> mbox cmd response: success
3,384,206 UART: [afmc] ++
3,384,374 UART: [afmc] CDI.KEYID = 6
3,384,736 UART: [afmc] SUBJECT.KEYID = 7
3,385,161 UART: [afmc] AUTHORITY.KEYID = 5
3,420,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,437,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,437,785 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,443,491 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,449,370 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,455,080 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,759 UART: [afmc] --
3,463,685 UART: [cold-reset] --
3,464,443 UART: [state] Locking Datavault
3,465,560 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,164 UART: [state] Locking ICCM
3,466,730 UART: [exit] Launching FMC @ 0x40000130
3,472,060 UART:
3,472,076 UART: Running Caliptra FMC ...
3,472,484 UART:
3,472,627 UART: [state] CFI Enabled
3,483,249 UART: [fht] FMC Alias Private Key: 7
3,601,825 UART: [art] Extend RT PCRs Done
3,602,253 UART: [art] Lock RT PCRs Done
3,603,947 UART: [art] Populate DV Done
3,612,084 UART: [fht] FMC Alias Private Key: 7
3,613,196 UART: [art] Derive CDI
3,613,476 UART: [art] Store in slot 0x4
3,699,665 UART: [art] Derive Key Pair
3,700,025 UART: [art] Store priv key in slot 0x5
3,713,553 UART: [art] Derive Key Pair - Done
3,728,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,356 UART: [art] PUB.X = 9E67C47D68E1C8F97AB1C7FBFD90CC826B3B2F91E935E8B9D6E235668B30DF22298215E74599AA73627151AD724756B3
3,751,128 UART: [art] PUB.Y = 77FC0DA8FA993ADE2D8D8E0D631F2B08362B44335F9ACBCE794E83B1340272AC226CB67686170F27F5DA182280001AAB
3,758,049 UART: [art] SIG.R = B7EDC3E3AE3A5CEBE621875F227F412FC44FE474318B2511D8399550DEB517B2A0AC1EDFEF6EDE4D11075C0738F9136A
3,764,829 UART: [art] SIG.S = DB8D893C69F285D0274ED62B135B4B3E45505DDE949C3B26B6BE6599CC5C0E38549BE8C0D2BFE12D4398DA9CE37B49D9
3,788,478 UART: Caliptra RT
3,788,821 UART: [state] CFI Enabled
3,908,168 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,908,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,031,970 UART: [rt]cmd =0x41544d4e, len=14344
5,473,210 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,870 ready_for_fw is high
1,060,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,493 >>> mbox cmd response: success
3,280,928 UART:
3,280,944 UART: Running Caliptra FMC ...
3,281,352 UART:
3,281,495 UART: [state] CFI Enabled
3,292,367 UART: [fht] FMC Alias Private Key: 7
3,410,723 UART: [art] Extend RT PCRs Done
3,411,151 UART: [art] Lock RT PCRs Done
3,412,801 UART: [art] Populate DV Done
3,420,738 UART: [fht] FMC Alias Private Key: 7
3,421,846 UART: [art] Derive CDI
3,422,126 UART: [art] Store in slot 0x4
3,507,895 UART: [art] Derive Key Pair
3,508,255 UART: [art] Store priv key in slot 0x5
3,522,163 UART: [art] Derive Key Pair - Done
3,537,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,025 UART: [art] PUB.X = D34DE248A3EF507940487E2E116F2872C446BB426A625EB508E935E8A46319EE080099167748D725AE4783B3D18F2438
3,559,757 UART: [art] PUB.Y = B771D70419A6E58248589F12584FFAEBE24CE692386152E15715D0482CA78BC79EB5612EA9511ADC0306DBFAAC5B90E2
3,566,704 UART: [art] SIG.R = 9F41DB964B8D20D1DE0BAC4442314DF33A759EECFF625E52CD4CB56B578C310D8F09686BA1C9331E6CC6D3ABCA406988
3,573,481 UART: [art] SIG.S = EFCF26701452C365289FFDDCCED79B77956249C1F69F304CACFFD90F1B5643F8F50ABC7B7451D1DB7AF812134AE038D8
3,597,415 UART: Caliptra RT
3,597,758 UART: [state] CFI Enabled
3,717,379 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,718,049 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,069 UART: [rt]cmd =0x41544d4e, len=14344
5,280,534 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,138 writing to cptra_bootfsm_go
192,223 UART:
192,585 UART: Running Caliptra ROM ...
193,712 UART:
193,864 UART: [state] CFI Enabled
264,031 UART: [state] LifecycleState = Unprovisioned
266,031 UART: [state] DebugLocked = No
268,917 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,419 UART: [kat] SHA2-256
444,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,656 UART: [kat] ++
455,132 UART: [kat] sha1
466,076 UART: [kat] SHA2-256
468,805 UART: [kat] SHA2-384
474,872 UART: [kat] SHA2-512-ACC
477,241 UART: [kat] ECC-384
2,770,280 UART: [kat] HMAC-384Kdf
2,799,861 UART: [kat] LMS
3,990,099 UART: [kat] --
3,994,820 UART: [cold-reset] ++
3,995,967 UART: [fht] Storing FHT @ 0x50003400
4,007,172 UART: [idev] ++
4,007,783 UART: [idev] CDI.KEYID = 6
4,008,704 UART: [idev] SUBJECT.KEYID = 7
4,009,957 UART: [idev] UDS.KEYID = 0
4,011,020 ready_for_fw is high
4,011,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,141 UART: [idev] Erasing UDS.KEYID = 0
7,343,889 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,970 UART: [idev] --
7,369,098 UART: [ldev] ++
7,369,686 UART: [ldev] CDI.KEYID = 6
7,370,624 UART: [ldev] SUBJECT.KEYID = 5
7,371,853 UART: [ldev] AUTHORITY.KEYID = 7
7,373,034 UART: [ldev] FE.KEYID = 1
7,422,347 UART: [ldev] Erasing FE.KEYID = 1
10,755,423 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,085,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,100,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,961 UART: [ldev] --
13,137,371 UART: [fwproc] Waiting for Commands...
13,140,229 UART: [fwproc] Received command 0x46574c44
13,142,412 UART: [fwproc] Received Image of size 118548 bytes
21,835,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,919,461 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,992,612 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,321,244 >>> mbox cmd response: success
22,326,313 UART: [afmc] ++
22,326,946 UART: [afmc] CDI.KEYID = 6
22,327,846 UART: [afmc] SUBJECT.KEYID = 7
22,329,062 UART: [afmc] AUTHORITY.KEYID = 5
25,700,409 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,998,546 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,000,803 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,015,302 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,030,096 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,044,440 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,066,366 UART: [afmc] --
28,070,503 UART: [cold-reset] --
28,074,473 UART: [state] Locking Datavault
28,080,045 UART: [state] Locking PCR0, PCR1 and PCR31
28,081,803 UART: [state] Locking ICCM
28,084,979 UART: [exit] Launching FMC @ 0x40000130
28,092,977 UART:
28,093,225 UART: Running Caliptra FMC ...
28,094,330 UART:
28,094,489 UART: [state] CFI Enabled
28,158,257 UART: [fht] FMC Alias Private Key: 7
30,519,635 UART: [art] Extend RT PCRs Done
30,520,856 UART: [art] Lock RT PCRs Done
30,522,294 UART: [art] Populate DV Done
30,527,759 UART: [fht] FMC Alias Private Key: 7
30,529,401 UART: [art] Derive CDI
30,530,133 UART: [art] Store in slot 0x4
30,587,541 UART: [art] Derive Key Pair
30,588,579 UART: [art] Store priv key in slot 0x5
33,880,286 UART: [art] Derive Key Pair - Done
33,893,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,181,566 UART: [art] Erasing AUTHORITY.KEYID = 7
36,183,097 UART: [art] PUB.X = F87173A07E883DDD32E6E47FDF5F7D6F1C64C1713AD5E6BFE0ABF3D0AB7EAE1970DEF94A5D9043A041FFDDFCB005DEE2
36,190,400 UART: [art] PUB.Y = 63115A4A3A77994BBEF289F82F4522D9669D2E5D7A82AB999374DF2A768B7170FFE5FB662D5E6C0E24513A53F2A8D00E
36,197,677 UART: [art] SIG.R = E58C1FAABB5D2EB325FDF3E7F01F4771DAE68082DCB28F046A23BE746D27C49B8B6C98EC188ECB91C2053CFFA91CCF15
36,205,070 UART: [art] SIG.S = B2FF79399462A297A34B09710771F2FB5D58A3262FDB10695A1259B0605A5245E88B6CEA31482EED989A2EA2362BA7E3
37,510,402 UART: Caliptra RT
37,511,111 UART: [state] CFI Enabled
37,687,450 UART: [rt] RT listening for mailbox commands...
37,689,755 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,845,136 UART: [rt]cmd =0x41544d4e, len=14344
44,234,391 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,803,976 ready_for_fw is high
3,804,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,099,690 >>> mbox cmd response: success
27,791,823 UART:
27,792,272 UART: Running Caliptra FMC ...
27,793,389 UART:
27,793,549 UART: [state] CFI Enabled
27,860,923 UART: [fht] FMC Alias Private Key: 7
30,202,160 UART: [art] Extend RT PCRs Done
30,203,403 UART: [art] Lock RT PCRs Done
30,205,200 UART: [art] Populate DV Done
30,210,406 UART: [fht] FMC Alias Private Key: 7
30,212,094 UART: [art] Derive CDI
30,212,872 UART: [art] Store in slot 0x4
30,268,940 UART: [art] Derive Key Pair
30,269,942 UART: [art] Store priv key in slot 0x5
33,562,947 UART: [art] Derive Key Pair - Done
33,576,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,863,964 UART: [art] Erasing AUTHORITY.KEYID = 7
35,865,469 UART: [art] PUB.X = 17570710666C07620421E676F63A328CA5D493CE0AF5EEAB83A2B019F79C00CCC086437EFB2E92BA10F489DD2C4FC44C
35,872,728 UART: [art] PUB.Y = A0BE760A0A54FF92770FE5D6E8F043A3448BE56BC6B50F0D4D194589BCB59073EB8A3049E06A56FC6FE1A8C7587F09C9
35,879,989 UART: [art] SIG.R = BB7F65461ACEAC435F9AA25F0D25F96DB4DB930942D7047A55CE375A82058C0C10DBEB41831796F30A02A5A4EB261264
35,887,384 UART: [art] SIG.S = E2B141B25319EF2E4216229FC353160C6BA628C99161CE39C5ABCDD908A4BECFB199F2D9D0C372B1273C4C6FDB082192
37,192,635 UART: Caliptra RT
37,193,345 UART: [state] CFI Enabled
37,370,572 UART: [rt] RT listening for mailbox commands...
37,372,868 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,528,290 UART: [rt]cmd =0x41544d4e, len=14344
43,865,908 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,487 UART:
192,851 UART: Running Caliptra ROM ...
193,974 UART:
603,508 UART: [state] CFI Enabled
619,477 UART: [state] LifecycleState = Unprovisioned
621,468 UART: [state] DebugLocked = No
623,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,349 UART: [kat] SHA2-256
799,077 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,687 UART: [kat] ++
810,220 UART: [kat] sha1
820,175 UART: [kat] SHA2-256
822,900 UART: [kat] SHA2-384
828,387 UART: [kat] SHA2-512-ACC
830,758 UART: [kat] ECC-384
3,115,211 UART: [kat] HMAC-384Kdf
3,127,116 UART: [kat] LMS
4,317,195 UART: [kat] --
4,323,407 UART: [cold-reset] ++
4,324,982 UART: [fht] Storing FHT @ 0x50003400
4,337,022 UART: [idev] ++
4,337,591 UART: [idev] CDI.KEYID = 6
4,338,573 UART: [idev] SUBJECT.KEYID = 7
4,339,817 UART: [idev] UDS.KEYID = 0
4,340,893 ready_for_fw is high
4,341,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,010 UART: [idev] Erasing UDS.KEYID = 0
7,625,319 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,262 UART: [idev] --
7,649,897 UART: [ldev] ++
7,650,502 UART: [ldev] CDI.KEYID = 6
7,651,415 UART: [ldev] SUBJECT.KEYID = 5
7,652,625 UART: [ldev] AUTHORITY.KEYID = 7
7,653,903 UART: [ldev] FE.KEYID = 1
7,663,622 UART: [ldev] Erasing FE.KEYID = 1
10,949,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,891 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,204 UART: [ldev] --
13,307,564 UART: [fwproc] Waiting for Commands...
13,309,717 UART: [fwproc] Received command 0x46574c44
13,311,899 UART: [fwproc] Received Image of size 118548 bytes
22,075,768 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,151,981 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,225,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,552,748 >>> mbox cmd response: success
22,557,549 UART: [afmc] ++
22,558,161 UART: [afmc] CDI.KEYID = 6
22,559,048 UART: [afmc] SUBJECT.KEYID = 7
22,560,324 UART: [afmc] AUTHORITY.KEYID = 5
25,875,980 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,168,180 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,170,436 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,184,900 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,199,740 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,214,125 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,234,474 UART: [afmc] --
28,238,714 UART: [cold-reset] --
28,241,443 UART: [state] Locking Datavault
28,245,880 UART: [state] Locking PCR0, PCR1 and PCR31
28,247,628 UART: [state] Locking ICCM
28,249,530 UART: [exit] Launching FMC @ 0x40000130
28,257,923 UART:
28,258,161 UART: Running Caliptra FMC ...
28,259,260 UART:
28,259,418 UART: [state] CFI Enabled
28,267,460 UART: [fht] FMC Alias Private Key: 7
30,607,830 UART: [art] Extend RT PCRs Done
30,609,051 UART: [art] Lock RT PCRs Done
30,610,972 UART: [art] Populate DV Done
30,616,546 UART: [fht] FMC Alias Private Key: 7
30,618,100 UART: [art] Derive CDI
30,618,913 UART: [art] Store in slot 0x4
30,661,774 UART: [art] Derive Key Pair
30,662,771 UART: [art] Store priv key in slot 0x5
33,904,436 UART: [art] Derive Key Pair - Done
33,917,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,197,687 UART: [art] Erasing AUTHORITY.KEYID = 7
36,199,191 UART: [art] PUB.X = 0E8E30E92D9806FE7B605A11A7A5A9391486637E607BD2433A72761435C85FA11D0DD41C69AE826C59CEEF2AF8D724B2
36,206,490 UART: [art] PUB.Y = 9326A911903AB4220F6ABF541870F434439CA95B5A9E604EB63AC3ABB4B48ADB35F3DB6B2E99AF36E7BBAE333F3EBD23
36,213,745 UART: [art] SIG.R = AF6FF6906EE95B811FC2F54CFBBACD94C0FD030F405AAFD199141A43891050FC9B1576B005C2432F45DB8C207A46FF74
36,221,194 UART: [art] SIG.S = 75A80A40BD105D90B67D27AD30251ECCF4F9ABF1CABC5D0B749BE12FF10D76DB2F37EF569C44358F99F8F9D3816BBEDD
37,526,295 UART: Caliptra RT
37,527,001 UART: [state] CFI Enabled
37,660,231 UART: [rt] RT listening for mailbox commands...
37,662,552 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,817,916 UART: [rt]cmd =0x41544d4e, len=14344
44,362,184 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
4,118,630 ready_for_fw is high
4,119,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,464,886 >>> mbox cmd response: success
28,103,373 UART:
28,103,824 UART: Running Caliptra FMC ...
28,104,966 UART:
28,105,126 UART: [state] CFI Enabled
28,112,997 UART: [fht] FMC Alias Private Key: 7
30,452,797 UART: [art] Extend RT PCRs Done
30,454,027 UART: [art] Lock RT PCRs Done
30,455,441 UART: [art] Populate DV Done
30,460,686 UART: [fht] FMC Alias Private Key: 7
30,462,170 UART: [art] Derive CDI
30,462,925 UART: [art] Store in slot 0x4
30,505,590 UART: [art] Derive Key Pair
30,506,583 UART: [art] Store priv key in slot 0x5
33,748,457 UART: [art] Derive Key Pair - Done
33,761,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,041,727 UART: [art] Erasing AUTHORITY.KEYID = 7
36,043,234 UART: [art] PUB.X = 02D495E6733455454DAF3E9FDC0E80B8B2C2F848F7A08006DC92C79662DFF4A7A664C6855574491FF4C31BE30CFAE91D
36,050,510 UART: [art] PUB.Y = 507C1E0E6D6BC6E25298E59EC3836FF05A8606CA607202D1AF5A6C267363D37B9D68642D322218F7CAAF1C7435A2A73E
36,057,722 UART: [art] SIG.R = 054065112CD05FFF7DB40A78C43F002C5A7F93839DAE5B039734567024331FBBB13B8D5C567558FAA6DF77827C8F5614
36,065,061 UART: [art] SIG.S = B07F22352BD698596624124D7655E8479837DD41352AAEB0AA74812FBB8457995385DEAD3D4C9B35E581C506DF32E5AF
37,370,291 UART: Caliptra RT
37,370,987 UART: [state] CFI Enabled
37,504,426 UART: [rt] RT listening for mailbox commands...
37,506,747 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,662,054 UART: [rt]cmd =0x41544d4e, len=14344
44,232,739 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,255 UART:
192,604 UART: Running Caliptra ROM ...
193,780 UART:
193,932 UART: [state] CFI Enabled
263,860 UART: [state] LifecycleState = Unprovisioned
265,847 UART: [state] DebugLocked = No
268,178 UART: [state] WD Timer not started. Device not locked for debugging
272,846 UART: [kat] SHA2-256
452,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,291 UART: [kat] ++
463,827 UART: [kat] sha1
473,999 UART: [kat] SHA2-256
476,716 UART: [kat] SHA2-384
483,012 UART: [kat] SHA2-512-ACC
485,380 UART: [kat] ECC-384
2,944,810 UART: [kat] HMAC-384Kdf
2,970,123 UART: [kat] LMS
3,446,637 UART: [kat] --
3,451,909 UART: [cold-reset] ++
3,454,408 UART: [fht] FHT @ 0x50003400
3,466,379 UART: [idev] ++
3,466,941 UART: [idev] CDI.KEYID = 6
3,467,968 UART: [idev] SUBJECT.KEYID = 7
3,469,143 UART: [idev] UDS.KEYID = 0
3,470,064 ready_for_fw is high
3,470,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,301 UART: [idev] Erasing UDS.KEYID = 0
5,984,924 UART: [idev] Sha1 KeyId Algorithm
6,008,588 UART: [idev] --
6,012,179 UART: [ldev] ++
6,012,751 UART: [ldev] CDI.KEYID = 6
6,013,660 UART: [ldev] SUBJECT.KEYID = 5
6,014,875 UART: [ldev] AUTHORITY.KEYID = 7
6,016,166 UART: [ldev] FE.KEYID = 1
6,056,301 UART: [ldev] Erasing FE.KEYID = 1
8,562,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,518 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,577 UART: [ldev] --
10,373,484 UART: [fwproc] Wait for Commands...
10,376,561 UART: [fwproc] Recv command 0x46574c44
10,378,592 UART: [fwproc] Recv'd Img size: 118548 bytes
14,922,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,004,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,077,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,405,804 >>> mbox cmd response: success
15,410,456 UART: [afmc] ++
15,411,051 UART: [afmc] CDI.KEYID = 6
15,412,021 UART: [afmc] SUBJECT.KEYID = 7
15,413,240 UART: [afmc] AUTHORITY.KEYID = 5
17,960,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,683,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,685,282 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,701,126 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,717,063 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,732,780 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,756,042 UART: [afmc] --
19,759,314 UART: [cold-reset] --
19,762,590 UART: [state] Locking Datavault
19,766,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,289 UART: [state] Locking ICCM
19,770,011 UART: [exit] Launching FMC @ 0x40000130
19,778,418 UART:
19,778,652 UART: Running Caliptra FMC ...
19,779,752 UART:
19,779,914 UART: [state] CFI Enabled
19,839,530 UART: [fht] FMC Alias Private Key: 7
21,605,934 UART: [art] Extend RT PCRs Done
21,607,156 UART: [art] Lock RT PCRs Done
21,608,671 UART: [art] Populate DV Done
21,614,079 UART: [fht] FMC Alias Private Key: 7
21,615,619 UART: [art] Derive CDI
21,616,432 UART: [art] Store in slot 0x4
21,672,283 UART: [art] Derive Key Pair
21,673,321 UART: [art] Store priv key in slot 0x5
24,136,169 UART: [art] Derive Key Pair - Done
24,149,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,862,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,863,662 UART: [art] PUB.X = F65CE8ADA59788BC83FE270DB17FA42C100C7F0778083B32CE2B26E3E4CBCE235872AA7E5EC9823178C5A39F5751858A
25,870,866 UART: [art] PUB.Y = 149C1D98A02DE6FD96DB95D9AC14359DFFF01E22C8332CCEC68D52E87B8766A12602D1796FD7295F42C07BF0DFF997A2
25,878,164 UART: [art] SIG.R = 73EAA4F4C59B30CD48CF2520CE3E41B6E7AAD99B92F6F83F935F67D7730B028F7262E6B4C81A84BC672D0C3916758573
25,885,552 UART: [art] SIG.S = CB66BA922A1CB03B522B6C405D280595BF217ABC1B97DA1FA17A410BD25334C1261735D4955764FB5583B7066CF5CF76
26,864,314 UART: Caliptra RT
26,865,013 UART: [state] CFI Enabled
27,047,152 UART: [rt] RT listening for mailbox commands...
27,049,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,935 UART: [rt]cmd =0x41544d4e, len=14344
30,921,823 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,096 writing to cptra_bootfsm_go
3,458,162 ready_for_fw is high
3,458,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,363,819 >>> mbox cmd response: success
19,642,367 UART:
19,642,765 UART: Running Caliptra FMC ...
19,643,897 UART:
19,644,057 UART: [state] CFI Enabled
19,710,382 UART: [fht] FMC Alias Private Key: 7
21,476,890 UART: [art] Extend RT PCRs Done
21,478,104 UART: [art] Lock RT PCRs Done
21,479,726 UART: [art] Populate DV Done
21,485,094 UART: [fht] FMC Alias Private Key: 7
21,486,646 UART: [art] Derive CDI
21,487,404 UART: [art] Store in slot 0x4
21,543,047 UART: [art] Derive Key Pair
21,544,085 UART: [art] Store priv key in slot 0x5
24,006,960 UART: [art] Derive Key Pair - Done
24,020,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,733,039 UART: [art] Erasing AUTHORITY.KEYID = 7
25,734,549 UART: [art] PUB.X = F721A351310161858F3BE84D5BDC0D61DDB9002CAD1768000E9EC1EB2D00D9A6EEE51BF7C225226867A9214D43AA0918
25,741,747 UART: [art] PUB.Y = 1E63C27DEEC8845C7704D6826CDA9B6CE63226D82073BD975302652D2F9CDBD717B4424589547A245E1979ED315E891E
25,749,011 UART: [art] SIG.R = 5D0AC91CCC7FF17BCBDC2FE7768CD7D08ABE96635A9D81DAC2297BC9D1DC278EC49ADE86BF5617F1C73BEA63F1510CE5
25,756,409 UART: [art] SIG.S = 38E751AF4E35CED2F08982B8222744027102F49CB76F69759218A7347963ECCD168D7FEA982A123E7266B479EE85715A
26,734,923 UART: Caliptra RT
26,735,612 UART: [state] CFI Enabled
26,916,647 UART: [rt] RT listening for mailbox commands...
26,918,966 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,074,218 UART: [rt]cmd =0x41544d4e, len=14344
30,789,086 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,581 UART:
192,954 UART: Running Caliptra ROM ...
194,045 UART:
603,754 UART: [state] CFI Enabled
618,610 UART: [state] LifecycleState = Unprovisioned
620,512 UART: [state] DebugLocked = No
623,384 UART: [state] WD Timer not started. Device not locked for debugging
627,414 UART: [kat] SHA2-256
807,101 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,909 UART: [kat] ++
818,380 UART: [kat] sha1
828,616 UART: [kat] SHA2-256
831,349 UART: [kat] SHA2-384
838,337 UART: [kat] SHA2-512-ACC
840,709 UART: [kat] ECC-384
3,279,112 UART: [kat] HMAC-384Kdf
3,292,132 UART: [kat] LMS
3,768,670 UART: [kat] --
3,771,597 UART: [cold-reset] ++
3,773,600 UART: [fht] FHT @ 0x50003400
3,784,858 UART: [idev] ++
3,785,426 UART: [idev] CDI.KEYID = 6
3,786,335 UART: [idev] SUBJECT.KEYID = 7
3,787,581 UART: [idev] UDS.KEYID = 0
3,788,630 ready_for_fw is high
3,788,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,696 UART: [idev] Erasing UDS.KEYID = 0
6,268,548 UART: [idev] Sha1 KeyId Algorithm
6,293,122 UART: [idev] --
6,296,995 UART: [ldev] ++
6,297,581 UART: [ldev] CDI.KEYID = 6
6,298,464 UART: [ldev] SUBJECT.KEYID = 5
6,299,679 UART: [ldev] AUTHORITY.KEYID = 7
6,300,969 UART: [ldev] FE.KEYID = 1
6,313,096 UART: [ldev] Erasing FE.KEYID = 1
8,785,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,688 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,257 UART: [ldev] --
10,579,412 UART: [fwproc] Wait for Commands...
10,582,332 UART: [fwproc] Recv command 0x46574c44
10,584,373 UART: [fwproc] Recv'd Img size: 118548 bytes
15,138,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,225,426 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,298,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,626,089 >>> mbox cmd response: success
15,629,339 UART: [afmc] ++
15,629,955 UART: [afmc] CDI.KEYID = 6
15,630,873 UART: [afmc] SUBJECT.KEYID = 7
15,632,093 UART: [afmc] AUTHORITY.KEYID = 5
18,134,724 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,858,296 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,860,484 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,876,372 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,892,274 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,907,978 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,933,311 UART: [afmc] --
19,937,181 UART: [cold-reset] --
19,941,857 UART: [state] Locking Datavault
19,947,322 UART: [state] Locking PCR0, PCR1 and PCR31
19,949,079 UART: [state] Locking ICCM
19,950,208 UART: [exit] Launching FMC @ 0x40000130
19,958,605 UART:
19,958,850 UART: Running Caliptra FMC ...
19,959,955 UART:
19,960,118 UART: [state] CFI Enabled
19,968,177 UART: [fht] FMC Alias Private Key: 7
21,734,503 UART: [art] Extend RT PCRs Done
21,735,717 UART: [art] Lock RT PCRs Done
21,737,266 UART: [art] Populate DV Done
21,742,904 UART: [fht] FMC Alias Private Key: 7
21,744,444 UART: [art] Derive CDI
21,745,201 UART: [art] Store in slot 0x4
21,787,739 UART: [art] Derive Key Pair
21,788,737 UART: [art] Store priv key in slot 0x5
24,215,363 UART: [art] Derive Key Pair - Done
24,228,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,934,706 UART: [art] Erasing AUTHORITY.KEYID = 7
25,936,209 UART: [art] PUB.X = 85A2713CBA64BECFBDA69202340CAA0AA9FD1DB4FC2757F33405055E9D8C2B451D0A06C653B1A4C124584E7A8A07B8CF
25,943,510 UART: [art] PUB.Y = 4C58BB49ACFA63295FA0E4DE3B807C12476A10664928FD2B99ACA014853AEE4ED9111B0D02C2F6F884814A316CEF3803
25,950,792 UART: [art] SIG.R = 2BB30DC99C223914E1709D1FABD24E3614DE599BE711DED2B1DA1F72174E443B4514286A125D2BA30A342502D4DAA2B3
25,958,193 UART: [art] SIG.S = 6BE06DFE58BF69A6650BAA7C5FEEB09D8360B968788146CA83BA592C41C9DA14A0E7319E49641E7647AC0E79A9B9CEF0
26,936,997 UART: Caliptra RT
26,937,704 UART: [state] CFI Enabled
27,070,210 UART: [rt] RT listening for mailbox commands...
27,072,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,228,112 UART: [rt]cmd =0x41544d4e, len=14344
30,946,856 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,779,618 ready_for_fw is high
3,780,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,611,708 >>> mbox cmd response: success
19,865,490 UART:
19,865,883 UART: Running Caliptra FMC ...
19,867,090 UART:
19,867,265 UART: [state] CFI Enabled
19,875,425 UART: [fht] FMC Alias Private Key: 7
21,642,246 UART: [art] Extend RT PCRs Done
21,643,490 UART: [art] Lock RT PCRs Done
21,645,227 UART: [art] Populate DV Done
21,650,530 UART: [fht] FMC Alias Private Key: 7
21,652,166 UART: [art] Derive CDI
21,652,992 UART: [art] Store in slot 0x4
21,695,431 UART: [art] Derive Key Pair
21,696,435 UART: [art] Store priv key in slot 0x5
24,123,411 UART: [art] Derive Key Pair - Done
24,136,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,738 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,247 UART: [art] PUB.X = 4565ECC0F8FF5DFF68F689830277101175A1D8DB158969500F516C022BC3F113232F422DE6F2250B60F94A948CA00393
25,851,445 UART: [art] PUB.Y = FD4FA516F205FB65F2EF241BD912B1FF4E850E00591994CB92AC7D732BA51376740A09A6B9CBBEF906C4E6652FA2F10C
25,858,718 UART: [art] SIG.R = 1BBED3FE6B989C5D8E762CE264CE48ED3CAF9CD934887553D758D8A9A19D0122ADA76823A8D5C29B6CF40A2D45203024
25,866,130 UART: [art] SIG.S = DAAD3E88E5577107A8B2CC33C4C3CA8F3F6FCDFB0CD3ECC277EB4AC3BF3C5943C6B1CB04D4FE17E8C324EC51A156B287
26,845,227 UART: Caliptra RT
26,845,940 UART: [state] CFI Enabled
26,978,673 UART: [rt] RT listening for mailbox commands...
26,981,007 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,136,372 UART: [rt]cmd =0x41544d4e, len=14344
30,861,383 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,131 UART:
192,504 UART: Running Caliptra ROM ...
193,696 UART:
193,851 UART: [state] CFI Enabled
261,944 UART: [state] LifecycleState = Unprovisioned
264,321 UART: [state] DebugLocked = No
265,640 UART: [state] WD Timer not started. Device not locked for debugging
270,452 UART: [kat] SHA2-256
460,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,091 UART: [kat] ++
471,545 UART: [kat] sha1
483,842 UART: [kat] SHA2-256
486,847 UART: [kat] SHA2-384
493,753 UART: [kat] SHA2-512-ACC
496,331 UART: [kat] ECC-384
2,946,430 UART: [kat] HMAC-384Kdf
2,971,310 UART: [kat] LMS
3,503,122 UART: [kat] --
3,507,071 UART: [cold-reset] ++
3,507,937 UART: [fht] FHT @ 0x50003400
3,519,478 UART: [idev] ++
3,520,180 UART: [idev] CDI.KEYID = 6
3,521,265 UART: [idev] SUBJECT.KEYID = 7
3,522,366 UART: [idev] UDS.KEYID = 0
3,523,307 ready_for_fw is high
3,523,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,586 UART: [idev] Erasing UDS.KEYID = 0
6,030,032 UART: [idev] Sha1 KeyId Algorithm
6,053,180 UART: [idev] --
6,056,689 UART: [ldev] ++
6,057,370 UART: [ldev] CDI.KEYID = 6
6,058,286 UART: [ldev] SUBJECT.KEYID = 5
6,059,446 UART: [ldev] AUTHORITY.KEYID = 7
6,060,683 UART: [ldev] FE.KEYID = 1
6,101,124 UART: [ldev] Erasing FE.KEYID = 1
8,608,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,352 UART: [ldev] --
10,415,829 UART: [fwproc] Wait for Commands...
10,418,624 UART: [fwproc] Recv command 0x46574c44
10,420,929 UART: [fwproc] Recv'd Img size: 118548 bytes
15,099,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,183,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,307,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,867,308 >>> mbox cmd response: success
15,871,694 UART: [afmc] ++
15,872,443 UART: [afmc] CDI.KEYID = 6
15,873,637 UART: [afmc] SUBJECT.KEYID = 7
15,875,074 UART: [afmc] AUTHORITY.KEYID = 5
18,408,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,131,477 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,133,410 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,148,467 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,163,710 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,178,758 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,202,771 UART: [afmc] --
20,205,937 UART: [cold-reset] --
20,211,097 UART: [state] Locking Datavault
20,216,958 UART: [state] Locking PCR0, PCR1 and PCR31
20,219,162 UART: [state] Locking ICCM
20,220,228 UART: [exit] Launching FMC @ 0x40000130
20,228,905 UART:
20,229,137 UART: Running Caliptra FMC ...
20,230,235 UART:
20,230,391 UART: [state] CFI Enabled
20,289,551 UART: [fht] FMC Alias Private Key: 7
22,055,887 UART: [art] Extend RT PCRs Done
22,057,131 UART: [art] Lock RT PCRs Done
22,058,650 UART: [art] Populate DV Done
22,064,327 UART: [fht] FMC Alias Private Key: 7
22,066,026 UART: [art] Derive CDI
22,066,845 UART: [art] Store in slot 0x4
22,122,269 UART: [art] Derive Key Pair
22,123,310 UART: [art] Store priv key in slot 0x5
24,586,531 UART: [art] Derive Key Pair - Done
24,599,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,545 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,051 UART: [art] PUB.X = 7FF5B900232BD5E4A1B4334CF3086CF929E04BA22D7E4F3C02D37B40BF55B3BC30461A41C7F3DF375E58F0BD6534D5C5
26,321,311 UART: [art] PUB.Y = 668501B8C77E4012F3F9ABE0E1FFCD4E9AC0958108AF5521236D4A9A76403840F10D42C5094EA07078716CD2B83DE8E1
26,328,546 UART: [art] SIG.R = D13DAE244FEA652E6F5023F45F794E2492A4844FB584424AC4E629D3EA9DA29C7E937009D8D70F58BC5AC073F1AEF7D3
26,335,955 UART: [art] SIG.S = CE2756CC40CABEE479B7089293DBEB1D9BA1A84019259D7C7DA3B2BA949B6962FF69E320BF03AA9C71BA38DBC5DB74C6
27,315,453 UART: Caliptra RT
27,316,158 UART: [state] CFI Enabled
27,497,556 UART: [rt] RT listening for mailbox commands...
27,499,879 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,655,139 UART: [rt]cmd =0x41544d4e, len=14344
31,366,741 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,440,804 ready_for_fw is high
3,441,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,931,688 >>> mbox cmd response: success
20,223,112 UART:
20,223,510 UART: Running Caliptra FMC ...
20,224,621 UART:
20,224,772 UART: [state] CFI Enabled
20,288,928 UART: [fht] FMC Alias Private Key: 7
22,054,779 UART: [art] Extend RT PCRs Done
22,056,007 UART: [art] Lock RT PCRs Done
22,057,789 UART: [art] Populate DV Done
22,063,423 UART: [fht] FMC Alias Private Key: 7
22,064,931 UART: [art] Derive CDI
22,065,670 UART: [art] Store in slot 0x4
22,121,740 UART: [art] Derive Key Pair
22,122,781 UART: [art] Store priv key in slot 0x5
24,585,977 UART: [art] Derive Key Pair - Done
24,599,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,412 UART: [art] Erasing AUTHORITY.KEYID = 7
26,312,919 UART: [art] PUB.X = D3555CF075881F1AEF81681F5C1498EAC1DA788B00C638AFFFE2BDA7A08CBCEF258B2CDFB5DD4111A27C37C6819182E7
26,320,186 UART: [art] PUB.Y = B9A52014D09A860CC2A694911C6BE7B1FE739939E82442F8BFA4DA0D5C0C227727228BBAE94B112A0543599F67328D47
26,327,436 UART: [art] SIG.R = 32AEDB107B51011454EE009F35A867A2026E555C7D410A93073B3962BC21EE4CF8E31DE4DD68F5DE77AEABFCE4FBDCD9
26,334,818 UART: [art] SIG.S = 09469FC6D7E9B6E395956BCD6050558096BC5CD93DC9B62FB90942BCD6FB842AD29F49C21444BEBFB031E461D7729FA4
27,313,631 UART: Caliptra RT
27,314,345 UART: [state] CFI Enabled
27,492,913 UART: [rt] RT listening for mailbox commands...
27,495,225 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,483 UART: [rt]cmd =0x41544d4e, len=14344
31,381,341 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
192,355 UART:
192,742 UART: Running Caliptra ROM ...
193,840 UART:
603,557 UART: [state] CFI Enabled
616,653 UART: [state] LifecycleState = Unprovisioned
618,680 UART: [state] DebugLocked = No
620,339 UART: [state] WD Timer not started. Device not locked for debugging
624,884 UART: [kat] SHA2-256
814,796 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,551 UART: [kat] ++
826,161 UART: [kat] sha1
836,903 UART: [kat] SHA2-256
839,920 UART: [kat] SHA2-384
846,059 UART: [kat] SHA2-512-ACC
848,654 UART: [kat] ECC-384
3,291,241 UART: [kat] HMAC-384Kdf
3,303,693 UART: [kat] LMS
3,835,494 UART: [kat] --
3,841,194 UART: [cold-reset] ++
3,843,055 UART: [fht] FHT @ 0x50003400
3,854,550 UART: [idev] ++
3,855,294 UART: [idev] CDI.KEYID = 6
3,856,215 UART: [idev] SUBJECT.KEYID = 7
3,857,394 UART: [idev] UDS.KEYID = 0
3,858,325 ready_for_fw is high
3,858,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,319 UART: [idev] Erasing UDS.KEYID = 0
6,339,116 UART: [idev] Sha1 KeyId Algorithm
6,361,312 UART: [idev] --
6,366,163 UART: [ldev] ++
6,366,840 UART: [ldev] CDI.KEYID = 6
6,367,754 UART: [ldev] SUBJECT.KEYID = 5
6,368,916 UART: [ldev] AUTHORITY.KEYID = 7
6,370,177 UART: [ldev] FE.KEYID = 1
6,380,263 UART: [ldev] Erasing FE.KEYID = 1
8,860,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,320 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,447 UART: [ldev] --
10,650,797 UART: [fwproc] Wait for Commands...
10,653,318 UART: [fwproc] Recv command 0x46574c44
10,655,583 UART: [fwproc] Recv'd Img size: 118548 bytes
15,334,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,415,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,539,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,099,110 >>> mbox cmd response: success
16,102,748 UART: [afmc] ++
16,103,499 UART: [afmc] CDI.KEYID = 6
16,104,562 UART: [afmc] SUBJECT.KEYID = 7
16,106,123 UART: [afmc] AUTHORITY.KEYID = 5
18,610,872 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,329,336 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,331,313 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,346,412 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,361,615 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,376,659 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,401,823 UART: [afmc] --
20,405,905 UART: [cold-reset] --
20,408,822 UART: [state] Locking Datavault
20,414,618 UART: [state] Locking PCR0, PCR1 and PCR31
20,416,791 UART: [state] Locking ICCM
20,419,541 UART: [exit] Launching FMC @ 0x40000130
20,428,184 UART:
20,428,450 UART: Running Caliptra FMC ...
20,429,559 UART:
20,429,722 UART: [state] CFI Enabled
20,437,770 UART: [fht] FMC Alias Private Key: 7
22,203,462 UART: [art] Extend RT PCRs Done
22,204,693 UART: [art] Lock RT PCRs Done
22,206,349 UART: [art] Populate DV Done
22,211,819 UART: [fht] FMC Alias Private Key: 7
22,213,466 UART: [art] Derive CDI
22,214,209 UART: [art] Store in slot 0x4
22,256,639 UART: [art] Derive Key Pair
22,257,682 UART: [art] Store priv key in slot 0x5
24,684,535 UART: [art] Derive Key Pair - Done
24,696,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,403,934 UART: [art] Erasing AUTHORITY.KEYID = 7
26,405,442 UART: [art] PUB.X = B022703BDC82E0883AD5849FE7E63A63BD053482ABDACB964CA29C857AEA6825FAA77A3DCFCDF9212398DAB7D890C5BE
26,412,740 UART: [art] PUB.Y = 0A8A9EDCC86BD3A6D9965F07519D685DB2C57CF67952522FBD4C3C11718145C2D0C1935F080944559DEA5372EF950DFB
26,419,953 UART: [art] SIG.R = 3364AA39232E915FBF84050FF3F7C77026306120F91683259056BAD7665C58BC9879D7EFDEB7B373BAF69FA367026FC8
26,427,320 UART: [art] SIG.S = 813547A7BCD72B7C7464ABB1B69C16279D8D755FDEF1705F83B2945927338201211DD31F0AAB5203262D09204B9CB66E
27,405,930 UART: Caliptra RT
27,406,646 UART: [state] CFI Enabled
27,540,007 UART: [rt] RT listening for mailbox commands...
27,542,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,697,471 UART: [rt]cmd =0x41544d4e, len=14344
31,417,659 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,755,050 ready_for_fw is high
3,755,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,146,090 >>> mbox cmd response: success
20,399,375 UART:
20,399,757 UART: Running Caliptra FMC ...
20,400,959 UART:
20,401,151 UART: [state] CFI Enabled
20,408,881 UART: [fht] FMC Alias Private Key: 7
22,174,401 UART: [art] Extend RT PCRs Done
22,175,629 UART: [art] Lock RT PCRs Done
22,177,375 UART: [art] Populate DV Done
22,183,004 UART: [fht] FMC Alias Private Key: 7
22,184,604 UART: [art] Derive CDI
22,185,424 UART: [art] Store in slot 0x4
22,228,075 UART: [art] Derive Key Pair
22,229,123 UART: [art] Store priv key in slot 0x5
24,656,222 UART: [art] Derive Key Pair - Done
24,669,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,376,092 UART: [art] Erasing AUTHORITY.KEYID = 7
26,377,597 UART: [art] PUB.X = 1B3D24E7FF38D5467E1386A6941D755F3D2F61423A0C3494B75334BC8F2B7FBC4CC8CFF4EE632852A87B0BCF2C7B16BD
26,384,862 UART: [art] PUB.Y = CFBBC5E423925A017D0DCE307EA616773E780ED5B848258C7231735CF72FBA128E937B926D155CCDAF7B687305E48979
26,392,103 UART: [art] SIG.R = 028DD08165F3E782ECC26D35AC2DB23F47291F15E18EB2D0FF82ECB79FC40643EF777D7A5B0157C791DDC86AE08A6D2B
26,399,542 UART: [art] SIG.S = 0BA64D247B83E5595CF4E9540CDA328DFD2D4881AA1E1602DE12C359B509F1A1930C7C9E0F741AFABAFD4F4847DFC5AB
27,378,466 UART: Caliptra RT
27,379,181 UART: [state] CFI Enabled
27,511,758 UART: [rt] RT listening for mailbox commands...
27,514,091 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,669,625 UART: [rt]cmd =0x41544d4e, len=14344
31,384,452 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,058 UART: [state] LifecycleState = Unprovisioned
85,713 UART: [state] DebugLocked = No
86,229 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,827 UART: [kat] SHA2-256
881,758 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,873 UART: [kat] ++
886,025 UART: [kat] sha1
890,235 UART: [kat] SHA2-256
892,173 UART: [kat] SHA2-384
894,790 UART: [kat] SHA2-512-ACC
896,691 UART: [kat] ECC-384
902,348 UART: [kat] HMAC-384Kdf
906,788 UART: [kat] LMS
1,474,984 UART: [kat] --
1,475,807 UART: [cold-reset] ++
1,476,387 UART: [fht] Storing FHT @ 0x50003400
1,479,156 UART: [idev] ++
1,479,324 UART: [idev] CDI.KEYID = 6
1,479,684 UART: [idev] SUBJECT.KEYID = 7
1,480,108 UART: [idev] UDS.KEYID = 0
1,480,453 ready_for_fw is high
1,480,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,400 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,581 UART: [ldev] ++
1,514,749 UART: [ldev] CDI.KEYID = 6
1,515,112 UART: [ldev] SUBJECT.KEYID = 5
1,515,538 UART: [ldev] AUTHORITY.KEYID = 7
1,516,001 UART: [ldev] FE.KEYID = 1
1,521,405 UART: [ldev] Erasing FE.KEYID = 1
1,547,338 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,162 UART: [ldev] --
1,586,433 UART: [fwproc] Waiting for Commands...
1,587,194 UART: [fwproc] Received command 0x46574c44
1,587,985 UART: [fwproc] Received Image of size 118548 bytes
4,979,277 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,006,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,037,907 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,178,272 >>> mbox cmd response: success
5,179,354 UART: [afmc] ++
5,179,522 UART: [afmc] CDI.KEYID = 6
5,179,884 UART: [afmc] SUBJECT.KEYID = 7
5,180,309 UART: [afmc] AUTHORITY.KEYID = 5
5,215,506 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,232,010 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,232,790 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,238,496 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,244,375 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,250,088 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,258,073 UART: [afmc] --
5,259,163 UART: [cold-reset] --
5,260,127 UART: [state] Locking Datavault
5,261,350 UART: [state] Locking PCR0, PCR1 and PCR31
5,261,954 UART: [state] Locking ICCM
5,262,600 UART: [exit] Launching FMC @ 0x40000130
5,267,930 UART:
5,267,946 UART: Running Caliptra FMC ...
5,268,354 UART:
5,268,408 UART: [state] CFI Enabled
5,278,604 UART: [fht] FMC Alias Private Key: 7
5,398,392 UART: [art] Extend RT PCRs Done
5,398,820 UART: [art] Lock RT PCRs Done
5,400,742 UART: [art] Populate DV Done
5,408,967 UART: [fht] FMC Alias Private Key: 7
5,409,963 UART: [art] Derive CDI
5,410,243 UART: [art] Store in slot 0x4
5,495,775 UART: [art] Derive Key Pair
5,496,135 UART: [art] Store priv key in slot 0x5
5,509,554 UART: [art] Derive Key Pair - Done
5,524,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,539,262 UART: [art] Erasing AUTHORITY.KEYID = 7
5,540,027 UART: [art] PUB.X = AA312153B75A7E8FA033B47106E6986084495C1A2880E01AE7D56D43BD1B6EF6DFF5AEEEEFD0FA8EFB489AF3CDFE8FEE
5,546,822 UART: [art] PUB.Y = B5FC856FBDAE9107580ECFF12CD44A2B77A0BBEE73B35C70A4A966AB8A2CC5FF6B661625EC5F42B1251182C0BD16ADDB
5,553,792 UART: [art] SIG.R = F3328BA11769660CC39153F6CEAB58228F01C82B904462EC7F3F8E6C6C4428D62386747972DC5C475773BB0948880A70
5,560,542 UART: [art] SIG.S = 327A27CECF0BDC21E0E7B45B74FA204301D7CCA30BB4174861555BDD8CEBE6523195F3E1A255A560062F1B5A0C41D0FB
5,583,797 UART: Caliptra RT
5,584,048 UART: [state] CFI Enabled
5,705,184 UART: [rt] RT listening for mailbox commands...
5,705,854 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,828,840 UART: [rt]cmd =0x41544d4e, len=14344
9,534,727 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,527 ready_for_fw is high
1,362,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,216,913 >>> mbox cmd response: success
5,278,430 UART:
5,278,446 UART: Running Caliptra FMC ...
5,278,854 UART:
5,278,908 UART: [state] CFI Enabled
5,289,708 UART: [fht] FMC Alias Private Key: 7
5,409,678 UART: [art] Extend RT PCRs Done
5,410,106 UART: [art] Lock RT PCRs Done
5,411,640 UART: [art] Populate DV Done
5,420,025 UART: [fht] FMC Alias Private Key: 7
5,420,985 UART: [art] Derive CDI
5,421,265 UART: [art] Store in slot 0x4
5,506,739 UART: [art] Derive Key Pair
5,507,099 UART: [art] Store priv key in slot 0x5
5,520,524 UART: [art] Derive Key Pair - Done
5,535,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,550,769 UART: [art] Erasing AUTHORITY.KEYID = 7
5,551,534 UART: [art] PUB.X = 2F707E277CA1BE2E2AD05364E35EAD4425C52898AE059EABAD39CB11B5249248C7EB515B41C6F6DAD28507ECA76C92D3
5,558,312 UART: [art] PUB.Y = C4517BF99608D3955DF7D634CA20C892876D8E5716F3B7A23B74C5C0B4994D534C8E8FBB0744ECBDD1E9A3D36523C52A
5,565,264 UART: [art] SIG.R = 74B13E90542F0ED22900621FC9C9BFDD3E0085BD3BC3747EB3F0F47CB3ED43D31BFB9A512F2D80275EDCDCD8198342D9
5,572,003 UART: [art] SIG.S = 368146A453A0AED8B64657E010D1EDF9F817015E99D71A1BA8D2F28148EAD2B67D338A45429923BFF32E1B5AE436A66E
5,595,846 UART: Caliptra RT
5,596,097 UART: [state] CFI Enabled
5,716,374 UART: [rt] RT listening for mailbox commands...
5,717,044 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,839,924 UART: [rt]cmd =0x41544d4e, len=14344
9,544,937 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
86,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,554 UART: [kat] SHA2-256
882,485 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,600 UART: [kat] ++
886,752 UART: [kat] sha1
891,024 UART: [kat] SHA2-256
892,962 UART: [kat] SHA2-384
895,653 UART: [kat] SHA2-512-ACC
897,554 UART: [kat] ECC-384
903,321 UART: [kat] HMAC-384Kdf
907,939 UART: [kat] LMS
1,476,135 UART: [kat] --
1,476,878 UART: [cold-reset] ++
1,477,266 UART: [fht] Storing FHT @ 0x50003400
1,480,011 UART: [idev] ++
1,480,179 UART: [idev] CDI.KEYID = 6
1,480,539 UART: [idev] SUBJECT.KEYID = 7
1,480,963 UART: [idev] UDS.KEYID = 0
1,481,308 ready_for_fw is high
1,481,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,759 UART: [idev] Erasing UDS.KEYID = 0
1,505,331 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,027 UART: [idev] --
1,514,956 UART: [ldev] ++
1,515,124 UART: [ldev] CDI.KEYID = 6
1,515,487 UART: [ldev] SUBJECT.KEYID = 5
1,515,913 UART: [ldev] AUTHORITY.KEYID = 7
1,516,376 UART: [ldev] FE.KEYID = 1
1,521,664 UART: [ldev] Erasing FE.KEYID = 1
1,547,471 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,797 UART: [ldev] --
1,587,208 UART: [fwproc] Waiting for Commands...
1,587,913 UART: [fwproc] Received command 0x46574c44
1,588,704 UART: [fwproc] Received Image of size 118548 bytes
5,131,548 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,159,746 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,190,964 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,331,403 >>> mbox cmd response: success
5,332,659 UART: [afmc] ++
5,332,827 UART: [afmc] CDI.KEYID = 6
5,333,189 UART: [afmc] SUBJECT.KEYID = 7
5,333,614 UART: [afmc] AUTHORITY.KEYID = 5
5,368,477 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,384,931 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,385,711 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,391,417 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,397,296 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,403,009 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,410,918 UART: [afmc] --
5,411,860 UART: [cold-reset] --
5,412,716 UART: [state] Locking Datavault
5,413,979 UART: [state] Locking PCR0, PCR1 and PCR31
5,414,583 UART: [state] Locking ICCM
5,415,019 UART: [exit] Launching FMC @ 0x40000130
5,420,349 UART:
5,420,365 UART: Running Caliptra FMC ...
5,420,773 UART:
5,420,916 UART: [state] CFI Enabled
5,431,584 UART: [fht] FMC Alias Private Key: 7
5,550,438 UART: [art] Extend RT PCRs Done
5,550,866 UART: [art] Lock RT PCRs Done
5,552,398 UART: [art] Populate DV Done
5,560,687 UART: [fht] FMC Alias Private Key: 7
5,561,819 UART: [art] Derive CDI
5,562,099 UART: [art] Store in slot 0x4
5,648,039 UART: [art] Derive Key Pair
5,648,399 UART: [art] Store priv key in slot 0x5
5,661,976 UART: [art] Derive Key Pair - Done
5,676,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,692,141 UART: [art] Erasing AUTHORITY.KEYID = 7
5,692,906 UART: [art] PUB.X = 3EFB6651CDE490D9508C58111BBA1BAD62CCFC280C534B7FA3CBE12C2748C254B8E6D426899AB66F08129211ACB3CDAB
5,699,688 UART: [art] PUB.Y = B4AC1AB781EF151D5A99D0ED4C2CD548DB73CC9C6E3F763B542A670649D2E109537035B118EA14BE7E6BA2D6EC2F2EFE
5,706,652 UART: [art] SIG.R = 65263E1796A9D73C605AD88CF72374A8207E35286121A5000259E23528B5AA80A106CA364BFAF34ADD9E7D98D83E69A5
5,713,392 UART: [art] SIG.S = D3231B8A6ACF5E170326C7B2BA22B756DCA6251D9CFB17886A3D7E911E018CDD5DEAC837C5A689859A211ADA21D291B0
5,737,372 UART: Caliptra RT
5,737,715 UART: [state] CFI Enabled
5,858,191 UART: [rt] RT listening for mailbox commands...
5,858,861 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,981,521 UART: [rt]cmd =0x41544d4e, len=14344
9,724,732 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,696 ready_for_fw is high
1,362,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,921 >>> mbox cmd response: success
5,317,636 UART:
5,317,652 UART: Running Caliptra FMC ...
5,318,060 UART:
5,318,203 UART: [state] CFI Enabled
5,328,807 UART: [fht] FMC Alias Private Key: 7
5,447,831 UART: [art] Extend RT PCRs Done
5,448,259 UART: [art] Lock RT PCRs Done
5,449,993 UART: [art] Populate DV Done
5,458,086 UART: [fht] FMC Alias Private Key: 7
5,459,240 UART: [art] Derive CDI
5,459,520 UART: [art] Store in slot 0x4
5,545,494 UART: [art] Derive Key Pair
5,545,854 UART: [art] Store priv key in slot 0x5
5,559,187 UART: [art] Derive Key Pair - Done
5,573,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,444 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,209 UART: [art] PUB.X = EF1A55B13F8EAB2445FE2A35A8D61D5F3B8560F4EBC91714ABD7EDF7388E36510E4CD2276EF1AC3533F35DE0BA9F0421
5,596,991 UART: [art] PUB.Y = 8B9EB3C9A0954361D41447F72F504A06ECED47E77F26E91CD1B97E77E198101BC6DFEA34E3626148AFAA8AE7A830FABB
5,603,954 UART: [art] SIG.R = 79CF04CB0B1533FAC5387C1E9A49E5657DD04F5C109F9C52B281615865B7A8C3E4B25AB71DDDF16A4189D71C776CB5A8
5,610,728 UART: [art] SIG.S = 4CAEB07C891D279E458379D66DABCFE14F53E8410AF8B0C3DBD4DD177E5988CFB86BCF9CE62E07274681B649B42C55AD
5,634,654 UART: Caliptra RT
5,634,997 UART: [state] CFI Enabled
5,754,154 UART: [rt] RT listening for mailbox commands...
5,754,824 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,878,180 UART: [rt]cmd =0x41544d4e, len=14344
9,697,577 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,424 UART: [kat] SHA2-256
901,364 UART: [kat] SHA2-384
904,083 UART: [kat] SHA2-512-ACC
905,984 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,397 UART: [kat] LMS
1,168,709 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,162 UART: [fht] FHT @ 0x50003400
1,172,870 UART: [idev] ++
1,173,038 UART: [idev] CDI.KEYID = 6
1,173,399 UART: [idev] SUBJECT.KEYID = 7
1,173,824 UART: [idev] UDS.KEYID = 0
1,174,170 ready_for_fw is high
1,174,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,655 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,528 UART: [ldev] Erasing FE.KEYID = 1
1,241,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,198 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,102 UART: [fwproc] Recv command 0x46574c44
1,281,835 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,017 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,136 >>> mbox cmd response: success
3,375,154 UART: [afmc] ++
3,375,322 UART: [afmc] CDI.KEYID = 6
3,375,685 UART: [afmc] SUBJECT.KEYID = 7
3,376,111 UART: [afmc] AUTHORITY.KEYID = 5
3,411,480 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,754 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,461 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,338 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,048 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,964 UART: [afmc] --
3,454,947 UART: [cold-reset] --
3,455,821 UART: [state] Locking Datavault
3,456,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,324 UART: [state] Locking ICCM
3,457,934 UART: [exit] Launching FMC @ 0x40000130
3,463,264 UART:
3,463,280 UART: Running Caliptra FMC ...
3,463,688 UART:
3,463,742 UART: [state] CFI Enabled
3,474,280 UART: [fht] FMC Alias Private Key: 7
3,592,668 UART: [art] Extend RT PCRs Done
3,593,096 UART: [art] Lock RT PCRs Done
3,594,472 UART: [art] Populate DV Done
3,602,835 UART: [fht] FMC Alias Private Key: 7
3,603,841 UART: [art] Derive CDI
3,604,121 UART: [art] Store in slot 0x4
3,689,974 UART: [art] Derive Key Pair
3,690,334 UART: [art] Store priv key in slot 0x5
3,703,450 UART: [art] Derive Key Pair - Done
3,718,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,522 UART: [art] PUB.X = 547456BAF9F83C5216C5E95C7229F446EA967B3FBD1F486AEC292A0BEDAE2C2EFDBD396D66DEF7C2313D2B5F047167FF
3,741,306 UART: [art] PUB.Y = 33A1C658EC8699096E9D17C636EEBB486B47D2A1B5740A5C92F2A07EC7ED9CA3A5546FAD59D68DB4B13B2CB25DAFFDAB
3,748,274 UART: [art] SIG.R = BF9B61CCC1DD96B06BEE77EE9950E0783412EAC1D34F59D79CB3D785B2E517B93E2BC02EE0BA27737D9FD61A7875108B
3,755,060 UART: [art] SIG.S = 56AEF737E679B2A06BEB686B8486425EF989E7985E05200E1AE6163A72056FA2918E7FBC14FB3D32188C4A1F4C9936EB
3,779,637 UART: Caliptra RT
3,779,888 UART: [state] CFI Enabled
3,899,070 UART: [rt] RT listening for mailbox commands...
3,899,740 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,422 UART: [rt]cmd =0x41544d4e, len=14344
5,184,108 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,102 ready_for_fw is high
1,058,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,096 >>> mbox cmd response: success
3,290,745 UART:
3,290,761 UART: Running Caliptra FMC ...
3,291,169 UART:
3,291,223 UART: [state] CFI Enabled
3,301,397 UART: [fht] FMC Alias Private Key: 7
3,419,813 UART: [art] Extend RT PCRs Done
3,420,241 UART: [art] Lock RT PCRs Done
3,422,031 UART: [art] Populate DV Done
3,430,400 UART: [fht] FMC Alias Private Key: 7
3,431,486 UART: [art] Derive CDI
3,431,766 UART: [art] Store in slot 0x4
3,517,679 UART: [art] Derive Key Pair
3,518,039 UART: [art] Store priv key in slot 0x5
3,530,693 UART: [art] Derive Key Pair - Done
3,545,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,157 UART: [art] PUB.X = 0F3BA2D1783DDDFDFC681EAC653855D43DF63B5AF6F2C63B3FE1B3246B69F4715B9804BE9203E17BD90488154DF104F4
3,568,924 UART: [art] PUB.Y = 93FB2E6D24A3C9612E22E52ECDA73765279A49E70233878A63B3787D7B2068C89744882DD8036300AD1F21B633B37F20
3,575,838 UART: [art] SIG.R = F05FF2A110166CBFD776D1A71E19A24A564DC2D34C81139BF2ADAC1D29FC891343F59549EBF14DC1ED8B4B56C100C923
3,582,600 UART: [art] SIG.S = 39483333A3C8759A3A47F733DBBF9AF0BDBDFD1CEFE4499844CD3A77080558D417AA20B0B02CAAA6F8B512BE901F2162
3,606,218 UART: Caliptra RT
3,606,469 UART: [state] CFI Enabled
3,725,925 UART: [rt] RT listening for mailbox commands...
3,726,595 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,509 UART: [rt]cmd =0x41544d4e, len=14344
5,011,423 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,634 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
915,922 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,170,291 UART: [cold-reset] ++
1,170,677 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 ready_for_fw is high
1,174,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,914 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,731 UART: [ldev] Erasing FE.KEYID = 1
1,241,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,769 UART: [ldev] --
1,281,174 UART: [fwproc] Wait for Commands...
1,281,751 UART: [fwproc] Recv command 0x46574c44
1,282,484 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,236 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,411 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,692 >>> mbox cmd response: success
3,379,896 UART: [afmc] ++
3,380,064 UART: [afmc] CDI.KEYID = 6
3,380,427 UART: [afmc] SUBJECT.KEYID = 7
3,380,853 UART: [afmc] AUTHORITY.KEYID = 5
3,416,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,567 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,316 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,023 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,900 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,610 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,292 UART: [afmc] --
3,459,303 UART: [cold-reset] --
3,460,241 UART: [state] Locking Datavault
3,461,056 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,660 UART: [state] Locking ICCM
3,462,156 UART: [exit] Launching FMC @ 0x40000130
3,467,486 UART:
3,467,502 UART: Running Caliptra FMC ...
3,467,910 UART:
3,468,053 UART: [state] CFI Enabled
3,478,853 UART: [fht] FMC Alias Private Key: 7
3,597,263 UART: [art] Extend RT PCRs Done
3,597,691 UART: [art] Lock RT PCRs Done
3,599,203 UART: [art] Populate DV Done
3,607,466 UART: [fht] FMC Alias Private Key: 7
3,608,560 UART: [art] Derive CDI
3,608,840 UART: [art] Store in slot 0x4
3,694,671 UART: [art] Derive Key Pair
3,695,031 UART: [art] Store priv key in slot 0x5
3,709,311 UART: [art] Derive Key Pair - Done
3,723,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,979 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,744 UART: [art] PUB.X = 63B3897710713CFF39460D81CE10B8E98E4BAB9931A62B2E2E5DC07FABE92BF9BA693F24DDA4EDC52777E17CE57E8919
3,746,525 UART: [art] PUB.Y = 35BEEEF2AB3CBD223120C71548843CD018E5DC018E72CCD56A41C74B37635815EF8A67B58AD9CFF2C3F78464560AFCD2
3,753,483 UART: [art] SIG.R = 647FBDF6F84CAC9DC44A44D859E563667A954F3F7CCF251DC9576BB52893D5C4DF39D1CAF014988BDF16560CAE4BD7A8
3,760,268 UART: [art] SIG.S = 5DE237DAA23E7606996CA0E84E2230C70341EF5FF88BE2DE8A61F1E46839FE6A51C94062C057BCAAD740B65E35221077
3,784,664 UART: Caliptra RT
3,785,007 UART: [state] CFI Enabled
3,904,831 UART: [rt] RT listening for mailbox commands...
3,905,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,559 UART: [rt]cmd =0x41544d4e, len=14344
5,180,171 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,573 ready_for_fw is high
1,059,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,454 >>> mbox cmd response: success
3,277,473 UART:
3,277,489 UART: Running Caliptra FMC ...
3,277,897 UART:
3,278,040 UART: [state] CFI Enabled
3,288,968 UART: [fht] FMC Alias Private Key: 7
3,407,888 UART: [art] Extend RT PCRs Done
3,408,316 UART: [art] Lock RT PCRs Done
3,410,112 UART: [art] Populate DV Done
3,418,585 UART: [fht] FMC Alias Private Key: 7
3,419,631 UART: [art] Derive CDI
3,419,911 UART: [art] Store in slot 0x4
3,506,014 UART: [art] Derive Key Pair
3,506,374 UART: [art] Store priv key in slot 0x5
3,519,988 UART: [art] Derive Key Pair - Done
3,534,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,818 UART: [art] PUB.X = 4F7663EBF0CEB4603A4ECCDC359860EA3B7A1CF27F27C78392FFE1AC561E5B3F7C197957BFBD958CD6540326F5A7CE38
3,557,603 UART: [art] PUB.Y = 5ADC068AFBE1C4A23EF040CF625A5E7CA06AD4B3E63A91B412B17984A97514318E249D1CC15ECBA7309423F9D9F285FC
3,564,564 UART: [art] SIG.R = E07694581AC576767FC3817629E9932119892FE14FC26FC1528E283797AFCD4A2DF0373EA6E79D1A006C49959111BC4F
3,571,308 UART: [art] SIG.S = AB2A1E599F63D7D4B77CBB14445EE539B8165C1A6B5B8CE3E9CB21F163647CB2613099646162A38F83061ED939BEF70B
3,594,914 UART: Caliptra RT
3,595,257 UART: [state] CFI Enabled
3,715,716 UART: [rt] RT listening for mailbox commands...
3,716,386 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,668 UART: [rt]cmd =0x41544d4e, len=14344
4,998,883 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,676 UART: [state] LifecycleState = Unprovisioned
86,331 UART: [state] DebugLocked = No
86,903 UART: [state] WD Timer not started. Device not locked for debugging
88,108 UART: [kat] SHA2-256
893,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,883 UART: [kat] ++
898,035 UART: [kat] sha1
902,203 UART: [kat] SHA2-256
904,143 UART: [kat] SHA2-384
906,800 UART: [kat] SHA2-512-ACC
908,701 UART: [kat] ECC-384
918,632 UART: [kat] HMAC-384Kdf
923,200 UART: [kat] LMS
1,171,528 UART: [kat] --
1,172,673 UART: [cold-reset] ++
1,173,195 UART: [fht] FHT @ 0x50003400
1,175,956 UART: [idev] ++
1,176,124 UART: [idev] CDI.KEYID = 6
1,176,484 UART: [idev] SUBJECT.KEYID = 7
1,176,908 UART: [idev] UDS.KEYID = 0
1,177,253 ready_for_fw is high
1,177,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,958 UART: [idev] Erasing UDS.KEYID = 0
1,202,349 UART: [idev] Sha1 KeyId Algorithm
1,210,867 UART: [idev] --
1,211,951 UART: [ldev] ++
1,212,119 UART: [ldev] CDI.KEYID = 6
1,212,482 UART: [ldev] SUBJECT.KEYID = 5
1,212,908 UART: [ldev] AUTHORITY.KEYID = 7
1,213,371 UART: [ldev] FE.KEYID = 1
1,218,285 UART: [ldev] Erasing FE.KEYID = 1
1,244,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,555 UART: [ldev] --
1,283,992 UART: [fwproc] Wait for Commands...
1,284,810 UART: [fwproc] Recv command 0x46574c44
1,285,538 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,716 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,886 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,215 >>> mbox cmd response: success
3,365,269 UART: [afmc] ++
3,365,437 UART: [afmc] CDI.KEYID = 6
3,365,799 UART: [afmc] SUBJECT.KEYID = 7
3,366,224 UART: [afmc] AUTHORITY.KEYID = 5
3,401,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,102 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,808 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,687 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,397 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,358 UART: [afmc] --
3,445,312 UART: [cold-reset] --
3,445,992 UART: [state] Locking Datavault
3,447,193 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,797 UART: [state] Locking ICCM
3,448,333 UART: [exit] Launching FMC @ 0x40000130
3,453,663 UART:
3,453,679 UART: Running Caliptra FMC ...
3,454,087 UART:
3,454,141 UART: [state] CFI Enabled
3,464,883 UART: [fht] FMC Alias Private Key: 7
3,583,715 UART: [art] Extend RT PCRs Done
3,584,143 UART: [art] Lock RT PCRs Done
3,585,721 UART: [art] Populate DV Done
3,593,640 UART: [fht] FMC Alias Private Key: 7
3,594,650 UART: [art] Derive CDI
3,594,930 UART: [art] Store in slot 0x4
3,681,035 UART: [art] Derive Key Pair
3,681,395 UART: [art] Store priv key in slot 0x5
3,694,847 UART: [art] Derive Key Pair - Done
3,709,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,228 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,993 UART: [art] PUB.X = AE6260336396C89F8D537BF1AB81DA6959C6F4FD1238C295BD26E1A0C88FFC82F5B8CE5EDC370B6F80C45397CA2A4E11
3,732,774 UART: [art] PUB.Y = E741624A9E5F5470FD98833F574036F098BF01D0746720DF2ECBA15A6747912A63AE2BC88887C7BA4E615FE21405FE9B
3,739,720 UART: [art] SIG.R = 3855B90F5373AA7D415EE164E890883A4BF8C44AF16722447327443AA4AD8104E2F48B4B48A4B988148A7CDB7C74F456
3,746,482 UART: [art] SIG.S = 4A19DB7D38BCFF323CE2ED9CB5622EEB78A2475EDE2E474B9F850E73B9D75AA153C300A3C26C885E8400CA470935BB03
3,770,083 UART: Caliptra RT
3,770,334 UART: [state] CFI Enabled
3,889,508 UART: [rt] RT listening for mailbox commands...
3,890,178 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,198 UART: [rt]cmd =0x41544d4e, len=14344
5,177,247 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,265 ready_for_fw is high
1,060,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,232,149 >>> mbox cmd response: success
3,294,596 UART:
3,294,612 UART: Running Caliptra FMC ...
3,295,020 UART:
3,295,074 UART: [state] CFI Enabled
3,305,150 UART: [fht] FMC Alias Private Key: 7
3,424,850 UART: [art] Extend RT PCRs Done
3,425,278 UART: [art] Lock RT PCRs Done
3,426,498 UART: [art] Populate DV Done
3,434,757 UART: [fht] FMC Alias Private Key: 7
3,435,689 UART: [art] Derive CDI
3,435,969 UART: [art] Store in slot 0x4
3,521,624 UART: [art] Derive Key Pair
3,521,984 UART: [art] Store priv key in slot 0x5
3,535,078 UART: [art] Derive Key Pair - Done
3,550,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,565,416 UART: [art] Erasing AUTHORITY.KEYID = 7
3,566,181 UART: [art] PUB.X = 6FD0CAB7CEA0C47C2E8AAE684689F4A3E70B574547F46788C815356B4A8E292855518231A00EA540C689789C638A92B3
3,572,943 UART: [art] PUB.Y = 1EF9757B3BF5B3F1B3F306E0C5F8F45A667640089C7C63112095C52A51E65384BC27DC93A1116AED0A2FFB4284372EC1
3,579,888 UART: [art] SIG.R = 61D2413B535BA5D91446701ED70029317D5AE9974494772D42B5D6614128B4848600B49C2FAAB465316834FD204764F7
3,586,598 UART: [art] SIG.S = A6E0622C030D799E32B6BFFDE68F82F206DA8B1E655D3EDC34D8842CA48507C97B9904BA9C22074939A403140E6B5E64
3,610,906 UART: Caliptra RT
3,611,157 UART: [state] CFI Enabled
3,730,427 UART: [rt] RT listening for mailbox commands...
3,731,097 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,301 UART: [rt]cmd =0x41544d4e, len=14344
5,018,270 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
901,912 UART: [kat] SHA2-256
903,852 UART: [kat] SHA2-384
906,661 UART: [kat] SHA2-512-ACC
908,562 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,304 UART: [fht] FHT @ 0x50003400
1,175,959 UART: [idev] ++
1,176,127 UART: [idev] CDI.KEYID = 6
1,176,487 UART: [idev] SUBJECT.KEYID = 7
1,176,911 UART: [idev] UDS.KEYID = 0
1,177,256 ready_for_fw is high
1,177,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,641 UART: [idev] Erasing UDS.KEYID = 0
1,201,564 UART: [idev] Sha1 KeyId Algorithm
1,210,028 UART: [idev] --
1,211,228 UART: [ldev] ++
1,211,396 UART: [ldev] CDI.KEYID = 6
1,211,759 UART: [ldev] SUBJECT.KEYID = 5
1,212,185 UART: [ldev] AUTHORITY.KEYID = 7
1,212,648 UART: [ldev] FE.KEYID = 1
1,217,846 UART: [ldev] Erasing FE.KEYID = 1
1,244,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,134 UART: [ldev] --
1,283,545 UART: [fwproc] Wait for Commands...
1,284,215 UART: [fwproc] Recv command 0x46574c44
1,284,943 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,761 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,931 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,363,184 >>> mbox cmd response: success
3,364,254 UART: [afmc] ++
3,364,422 UART: [afmc] CDI.KEYID = 6
3,364,784 UART: [afmc] SUBJECT.KEYID = 7
3,365,209 UART: [afmc] AUTHORITY.KEYID = 5
3,400,944 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,033 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,739 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,618 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,328 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,087 UART: [afmc] --
3,444,195 UART: [cold-reset] --
3,444,979 UART: [state] Locking Datavault
3,446,500 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,104 UART: [state] Locking ICCM
3,447,554 UART: [exit] Launching FMC @ 0x40000130
3,452,884 UART:
3,452,900 UART: Running Caliptra FMC ...
3,453,308 UART:
3,453,451 UART: [state] CFI Enabled
3,464,279 UART: [fht] FMC Alias Private Key: 7
3,583,379 UART: [art] Extend RT PCRs Done
3,583,807 UART: [art] Lock RT PCRs Done
3,585,565 UART: [art] Populate DV Done
3,593,502 UART: [fht] FMC Alias Private Key: 7
3,594,478 UART: [art] Derive CDI
3,594,758 UART: [art] Store in slot 0x4
3,680,689 UART: [art] Derive Key Pair
3,681,049 UART: [art] Store priv key in slot 0x5
3,695,279 UART: [art] Derive Key Pair - Done
3,710,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,433 UART: [art] PUB.X = 25D5068078C1425BCA9674B1E309E431EFBCE7BC391818877FD9C266FB66B32E0DE45C60311B0A9EBD043A1F450A9931
3,733,189 UART: [art] PUB.Y = BD6C33A78DDD849AAA96AD7615C6227A6F94EB3C5C6A8C9FE52665748228D70EE4368468B2F793C2115A0BC4EE7DE381
3,740,143 UART: [art] SIG.R = C82F8E0A707401319EB6BB54F885A73FB3DE86CA7BB9611CCFDB2A3C9F98D5CBAE458D66DE4F9E621BBEA6149F14A361
3,746,929 UART: [art] SIG.S = FF6A715B4C2BE82A46DF7DF74C5666EA516C6B10546B86E5D4FAA830E7F77161993C03DC1252ACB6B5F5B313F4A3F366
3,770,730 UART: Caliptra RT
3,771,073 UART: [state] CFI Enabled
3,890,954 UART: [rt] RT listening for mailbox commands...
3,891,624 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,732 UART: [rt]cmd =0x41544d4e, len=14344
5,171,034 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,934 ready_for_fw is high
1,060,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,213,006 >>> mbox cmd response: success
3,275,479 UART:
3,275,495 UART: Running Caliptra FMC ...
3,275,903 UART:
3,276,046 UART: [state] CFI Enabled
3,286,590 UART: [fht] FMC Alias Private Key: 7
3,404,912 UART: [art] Extend RT PCRs Done
3,405,340 UART: [art] Lock RT PCRs Done
3,406,824 UART: [art] Populate DV Done
3,415,085 UART: [fht] FMC Alias Private Key: 7
3,416,235 UART: [art] Derive CDI
3,416,515 UART: [art] Store in slot 0x4
3,502,562 UART: [art] Derive Key Pair
3,502,922 UART: [art] Store priv key in slot 0x5
3,515,798 UART: [art] Derive Key Pair - Done
3,530,918 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,546,517 UART: [art] Erasing AUTHORITY.KEYID = 7
3,547,282 UART: [art] PUB.X = 1C1ACDA6D71BB064C63CF04EAF9E05D69860D9CE9A4BEED1667CBEBCF3A418ECE2D8D36B0477B50B16B87B5A08E7D800
3,554,044 UART: [art] PUB.Y = BAF982C6B85011F78B4348C51613139A48E3960B5F7F30E65029E739A38D8AA75B32FCB04274CC60E598E27BC7C49E9B
3,560,993 UART: [art] SIG.R = A943A9D63BBA90F22E4576CB8B50E2FF029A9E05F889190A091360E595635F5955AAEEFDD54A3270B700CB9450F46596
3,567,731 UART: [art] SIG.S = A7A2733BAD796917A7FEE3EF5229EB3C6086F920378673C9F5CC93C170A7C124F8430A4B268D2905217E1D34ECE5D745
3,591,703 UART: Caliptra RT
3,592,046 UART: [state] CFI Enabled
3,712,251 UART: [rt] RT listening for mailbox commands...
3,712,921 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,835,825 UART: [rt]cmd =0x41544d4e, len=14344
5,005,462 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,362 UART:
192,706 UART: Running Caliptra ROM ...
193,887 UART:
194,046 UART: [state] CFI Enabled
261,774 UART: [state] LifecycleState = Unprovisioned
263,706 UART: [state] DebugLocked = No
266,382 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,743 UART: [kat] SHA2-256
441,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,975 UART: [kat] ++
452,470 UART: [kat] sha1
464,348 UART: [kat] SHA2-256
467,008 UART: [kat] SHA2-384
472,193 UART: [kat] SHA2-512-ACC
474,601 UART: [kat] ECC-384
2,764,354 UART: [kat] HMAC-384Kdf
2,776,615 UART: [kat] LMS
3,966,917 UART: [kat] --
3,972,618 UART: [cold-reset] ++
3,973,485 UART: [fht] Storing FHT @ 0x50003400
3,986,095 UART: [idev] ++
3,986,727 UART: [idev] CDI.KEYID = 6
3,987,608 UART: [idev] SUBJECT.KEYID = 7
3,988,920 UART: [idev] UDS.KEYID = 0
3,989,920 ready_for_fw is high
3,990,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,216 UART: [idev] Erasing UDS.KEYID = 0
7,323,566 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,761 UART: [idev] --
7,348,739 UART: [ldev] ++
7,349,311 UART: [ldev] CDI.KEYID = 6
7,350,472 UART: [ldev] SUBJECT.KEYID = 5
7,351,633 UART: [ldev] AUTHORITY.KEYID = 7
7,352,821 UART: [ldev] FE.KEYID = 1
7,400,844 UART: [ldev] Erasing FE.KEYID = 1
10,731,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,465 UART: [ldev] --
13,096,247 UART: [fwproc] Waiting for Commands...
13,098,558 UART: [fwproc] Received command 0x46574c44
13,100,741 UART: [fwproc] Received Image of size 118548 bytes
21,633,680 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,713,276 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,786,447 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,114,457 >>> mbox cmd response: success
22,118,833 UART: [afmc] ++
22,119,449 UART: [afmc] CDI.KEYID = 6
22,120,361 UART: [afmc] SUBJECT.KEYID = 7
22,121,584 UART: [afmc] AUTHORITY.KEYID = 5
25,479,962 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,782,895 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,785,158 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,799,630 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,814,455 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,828,790 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,849,887 UART: [afmc] --
27,853,977 UART: [cold-reset] --
27,859,133 UART: [state] Locking Datavault
27,862,271 UART: [state] Locking PCR0, PCR1 and PCR31
27,863,966 UART: [state] Locking ICCM
27,866,197 UART: [exit] Launching FMC @ 0x40000130
27,874,610 UART:
27,874,843 UART: Running Caliptra FMC ...
27,875,869 UART:
27,876,015 UART: [state] CFI Enabled
27,943,848 UART: [fht] FMC Alias Private Key: 7
30,284,310 UART: [art] Extend RT PCRs Done
30,285,525 UART: [art] Lock RT PCRs Done
30,287,124 UART: [art] Populate DV Done
30,292,532 UART: [fht] FMC Alias Private Key: 7
30,294,233 UART: [art] Derive CDI
30,294,966 UART: [art] Store in slot 0x4
30,352,924 UART: [art] Derive Key Pair
30,353,967 UART: [art] Store priv key in slot 0x5
33,646,547 UART: [art] Derive Key Pair - Done
33,659,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,948,821 UART: [art] Erasing AUTHORITY.KEYID = 7
35,950,356 UART: [art] PUB.X = 0E4D65AB69F4C88C5B821A2A62690A30EC4F3254F535F137231597F8374C8EABCDF849E44C86F52DCDDA8FD1A7607CCB
35,957,600 UART: [art] PUB.Y = 9F861B6A28A9A59319977EE5F2E644E07F122707F6BA25FF4BF28E1B42B225CC62F5D2EA8B6175D8F38BD4542F3163B4
35,964,878 UART: [art] SIG.R = 00731D9F8B0AE13A5899EC04F9C3DCBAEF8F41FA625F544E2F8B8D3F5EA3D9CE73721702C14D116E6050681F28625C13
35,972,210 UART: [art] SIG.S = DE8E4BF0EA230F1A01D54FB29EB3B4125578D3C294443B56B1150683D83700451FD406A3420420B9163A3172689809E3
37,277,839 UART: Caliptra RT
37,278,546 UART: [state] CFI Enabled
37,455,160 UART: [rt] RT listening for mailbox commands...
37,457,543 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,612,850 UART: [rt]cmd =0x41544d4e, len=14344
44,079,397 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
3,808,476 ready_for_fw is high
3,808,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,163,222 >>> mbox cmd response: success
27,853,756 UART:
27,854,610 UART: Running Caliptra FMC ...
27,855,728 UART:
27,855,882 UART: [state] CFI Enabled
27,926,417 UART: [fht] FMC Alias Private Key: 7
30,266,721 UART: [art] Extend RT PCRs Done
30,267,996 UART: [art] Lock RT PCRs Done
30,269,382 UART: [art] Populate DV Done
30,274,511 UART: [fht] FMC Alias Private Key: 7
30,276,068 UART: [art] Derive CDI
30,276,845 UART: [art] Store in slot 0x4
30,326,395 UART: [art] Derive Key Pair
30,327,391 UART: [art] Store priv key in slot 0x5
33,620,064 UART: [art] Derive Key Pair - Done
33,633,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,921,680 UART: [art] Erasing AUTHORITY.KEYID = 7
35,923,707 UART: [art] PUB.X = C096E470CA7839236F6B01463952ED207DA6543FBF10A7110033AE3383A4EDCF4C6570A2B4547C7FFFFDE920D9ECCE29
35,930,472 UART: [art] PUB.Y = BB921F59E9F7FD2454B6A8975993CB0160AE28C9C0C0E6EDA0D640875A80AB9949B91B1A8B8AEB3B81D66CF979553819
35,937,753 UART: [art] SIG.R = A3EF467A6C52484FC58D285DD42383FA699B0E1FE3C0D27C3DF0AFD2FE08B9BC611452A059BC714309BDF6A714C8DAC3
35,945,143 UART: [art] SIG.S = CC2A61D67339963ECA613A5783FDE3A67BEF3E31E3E6BA75929C147C39F53C6F9CCC7267602FF970F7DAE76EBB6CC37E
37,250,820 UART: Caliptra RT
37,251,535 UART: [state] CFI Enabled
37,429,781 UART: [rt] RT listening for mailbox commands...
37,432,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,587,473 UART: [rt]cmd =0x41544d4e, len=14344
43,898,781 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,348 UART:
192,708 UART: Running Caliptra ROM ...
194,010 UART:
603,684 UART: [state] CFI Enabled
615,574 UART: [state] LifecycleState = Unprovisioned
617,534 UART: [state] DebugLocked = No
620,287 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,494 UART: [kat] SHA2-256
795,228 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,742 UART: [kat] ++
806,217 UART: [kat] sha1
817,157 UART: [kat] SHA2-256
819,870 UART: [kat] SHA2-384
826,065 UART: [kat] SHA2-512-ACC
828,439 UART: [kat] ECC-384
3,113,121 UART: [kat] HMAC-384Kdf
3,124,654 UART: [kat] LMS
4,314,697 UART: [kat] --
4,318,782 UART: [cold-reset] ++
4,320,144 UART: [fht] Storing FHT @ 0x50003400
4,331,633 UART: [idev] ++
4,332,312 UART: [idev] CDI.KEYID = 6
4,333,248 UART: [idev] SUBJECT.KEYID = 7
4,334,422 UART: [idev] UDS.KEYID = 0
4,335,420 ready_for_fw is high
4,335,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,321 UART: [idev] Erasing UDS.KEYID = 0
7,617,135 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,842 UART: [idev] --
7,641,999 UART: [ldev] ++
7,642,561 UART: [ldev] CDI.KEYID = 6
7,643,524 UART: [ldev] SUBJECT.KEYID = 5
7,644,728 UART: [ldev] AUTHORITY.KEYID = 7
7,646,006 UART: [ldev] FE.KEYID = 1
7,657,030 UART: [ldev] Erasing FE.KEYID = 1
10,946,639 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,133 UART: [ldev] --
13,307,000 UART: [fwproc] Waiting for Commands...
13,308,988 UART: [fwproc] Received command 0x46574c44
13,311,164 UART: [fwproc] Received Image of size 118548 bytes
22,472,110 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,553,360 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,626,563 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,955,677 >>> mbox cmd response: success
22,960,072 UART: [afmc] ++
22,960,662 UART: [afmc] CDI.KEYID = 6
22,961,565 UART: [afmc] SUBJECT.KEYID = 7
22,962,830 UART: [afmc] AUTHORITY.KEYID = 5
26,272,982 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,565,749 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,568,018 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,582,539 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,597,314 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,611,704 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,633,154 UART: [afmc] --
28,636,527 UART: [cold-reset] --
28,640,165 UART: [state] Locking Datavault
28,647,522 UART: [state] Locking PCR0, PCR1 and PCR31
28,649,318 UART: [state] Locking ICCM
28,651,662 UART: [exit] Launching FMC @ 0x40000130
28,660,066 UART:
28,660,300 UART: Running Caliptra FMC ...
28,661,395 UART:
28,661,549 UART: [state] CFI Enabled
28,669,698 UART: [fht] FMC Alias Private Key: 7
31,009,402 UART: [art] Extend RT PCRs Done
31,010,640 UART: [art] Lock RT PCRs Done
31,012,301 UART: [art] Populate DV Done
31,017,708 UART: [fht] FMC Alias Private Key: 7
31,019,404 UART: [art] Derive CDI
31,020,139 UART: [art] Store in slot 0x4
31,062,890 UART: [art] Derive Key Pair
31,063,929 UART: [art] Store priv key in slot 0x5
34,305,288 UART: [art] Derive Key Pair - Done
34,318,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,598,568 UART: [art] Erasing AUTHORITY.KEYID = 7
36,600,070 UART: [art] PUB.X = 2E8B79B97CDF445E37807CA8470A92B7577041899455DAC924BF675CCC67FC257365EC82457FCE19FCA4DC270CA3E4C8
36,607,307 UART: [art] PUB.Y = 2BB5CB504B5217213F6668909806428A6ACD0C0621AE96DC536A6D9F71A45C741F2E35216404CB136B11E640A62405DF
36,614,578 UART: [art] SIG.R = B95A869A44466C02CF2A4B9026A3619C7033591101795D14088695195D5AFB41DD81CA5415CC5E43FD279C9C1C07692F
36,621,964 UART: [art] SIG.S = 4932F2748A4EA3BC4F2D518FFA205770A1E6C7ABA663C19BE663236AB1D336857B53E1F16DEA6E44BFBEBD826DF2795C
37,927,230 UART: Caliptra RT
37,927,943 UART: [state] CFI Enabled
38,060,255 UART: [rt] RT listening for mailbox commands...
38,062,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,217,861 UART: [rt]cmd =0x41544d4e, len=14344
44,581,021 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.50s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
4,129,827 ready_for_fw is high
4,130,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,273,138 >>> mbox cmd response: success
27,921,934 UART:
27,922,378 UART: Running Caliptra FMC ...
27,923,490 UART:
27,923,652 UART: [state] CFI Enabled
27,931,818 UART: [fht] FMC Alias Private Key: 7
30,271,244 UART: [art] Extend RT PCRs Done
30,272,518 UART: [art] Lock RT PCRs Done
30,274,115 UART: [art] Populate DV Done
30,279,673 UART: [fht] FMC Alias Private Key: 7
30,281,318 UART: [art] Derive CDI
30,282,140 UART: [art] Store in slot 0x4
30,324,704 UART: [art] Derive Key Pair
30,325,742 UART: [art] Store priv key in slot 0x5
33,567,569 UART: [art] Derive Key Pair - Done
33,580,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,860,800 UART: [art] Erasing AUTHORITY.KEYID = 7
35,862,310 UART: [art] PUB.X = DAD2D7F101D9E3DD9B531F55A1830A4CEE62E57D71480FB3CBCC13036E7589E1C4DFB0E25B1DA303EF0DF1BB2E171517
35,869,565 UART: [art] PUB.Y = 412049336DEB41B78B1AB11C15C74FEC2F52F4EBFBAB9AA572E6855D6E10DD98ED106554C1114E05BE352447F210BB44
35,876,840 UART: [art] SIG.R = 0E0C95880E8F78F522FCC995874AE288B04DE916885C7A615963AE1058FA0E10F020D6ACC355607384DDDE67BBD31E38
35,884,240 UART: [art] SIG.S = 5A1556274AA416002340A5301CC0C86650099E3F623167BCE599BF8794139AC33A5643B18DEE7ACC3EA11BC62A66A6BD
37,189,758 UART: Caliptra RT
37,190,473 UART: [state] CFI Enabled
37,324,982 UART: [rt] RT listening for mailbox commands...
37,327,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,482,675 UART: [rt]cmd =0x41544d4e, len=14344
43,768,372 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,034 UART:
192,418 UART: Running Caliptra ROM ...
193,544 UART:
193,691 UART: [state] CFI Enabled
262,909 UART: [state] LifecycleState = Unprovisioned
264,806 UART: [state] DebugLocked = No
267,613 UART: [state] WD Timer not started. Device not locked for debugging
271,284 UART: [kat] SHA2-256
450,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,723 UART: [kat] ++
462,258 UART: [kat] sha1
473,561 UART: [kat] SHA2-256
476,274 UART: [kat] SHA2-384
483,057 UART: [kat] SHA2-512-ACC
485,432 UART: [kat] ECC-384
2,948,189 UART: [kat] HMAC-384Kdf
2,969,881 UART: [kat] LMS
3,446,404 UART: [kat] --
3,452,655 UART: [cold-reset] ++
3,453,519 UART: [fht] FHT @ 0x50003400
3,464,348 UART: [idev] ++
3,464,910 UART: [idev] CDI.KEYID = 6
3,465,858 UART: [idev] SUBJECT.KEYID = 7
3,467,095 UART: [idev] UDS.KEYID = 0
3,468,106 ready_for_fw is high
3,468,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,473 UART: [idev] Erasing UDS.KEYID = 0
5,991,166 UART: [idev] Sha1 KeyId Algorithm
6,015,486 UART: [idev] --
6,021,199 UART: [ldev] ++
6,021,792 UART: [ldev] CDI.KEYID = 6
6,022,701 UART: [ldev] SUBJECT.KEYID = 5
6,023,912 UART: [ldev] AUTHORITY.KEYID = 7
6,025,139 UART: [ldev] FE.KEYID = 1
6,057,982 UART: [ldev] Erasing FE.KEYID = 1
8,563,706 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,420 UART: [ldev] --
10,374,270 UART: [fwproc] Wait for Commands...
10,377,060 UART: [fwproc] Recv command 0x46574c44
10,379,042 UART: [fwproc] Recv'd Img size: 118548 bytes
14,895,040 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,981,726 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,054,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,383,656 >>> mbox cmd response: success
15,387,446 UART: [afmc] ++
15,388,035 UART: [afmc] CDI.KEYID = 6
15,388,980 UART: [afmc] SUBJECT.KEYID = 7
15,390,191 UART: [afmc] AUTHORITY.KEYID = 5
17,917,114 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,661,156 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,663,348 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,679,196 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,695,128 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,710,854 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,734,328 UART: [afmc] --
19,738,947 UART: [cold-reset] --
19,742,801 UART: [state] Locking Datavault
19,747,416 UART: [state] Locking PCR0, PCR1 and PCR31
19,749,167 UART: [state] Locking ICCM
19,750,562 UART: [exit] Launching FMC @ 0x40000130
19,758,953 UART:
19,759,198 UART: Running Caliptra FMC ...
19,760,302 UART:
19,760,460 UART: [state] CFI Enabled
19,817,798 UART: [fht] FMC Alias Private Key: 7
21,584,022 UART: [art] Extend RT PCRs Done
21,585,245 UART: [art] Lock RT PCRs Done
21,587,016 UART: [art] Populate DV Done
21,592,588 UART: [fht] FMC Alias Private Key: 7
21,594,230 UART: [art] Derive CDI
21,594,964 UART: [art] Store in slot 0x4
21,650,319 UART: [art] Derive Key Pair
21,651,354 UART: [art] Store priv key in slot 0x5
24,114,341 UART: [art] Derive Key Pair - Done
24,127,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,840,084 UART: [art] Erasing AUTHORITY.KEYID = 7
25,841,591 UART: [art] PUB.X = D61BB9C1A883D93E78F3B24C051DF03A6BFB0771BE9ACBF8BDC17139645A11DEFEBCBBEDD0206156FEA64BAAD0B6EA9B
25,848,912 UART: [art] PUB.Y = F55EBC23EC78A575BEE35BBF14C1B8594061152ABDAAD61BFE99D76579DDF0BB19CC5D779D5F0B9C294C1F134FFC2C93
25,856,153 UART: [art] SIG.R = 20E98003EEE5CAAB582555F407CD8E61CA651699116E05C83690B1A49576FF66C89C6BE18B5F866497303EFF7753FDFD
25,863,552 UART: [art] SIG.S = 0CF1352A6E8B0AA05DD3CB1C45FAAAB8A643B5EFC4EEAE9DF290797ACAC0D346375E29AE8AE0C64A8DA425F0B8AE8780
26,842,688 UART: Caliptra RT
26,843,399 UART: [state] CFI Enabled
27,024,117 UART: [rt] RT listening for mailbox commands...
27,026,446 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,181,756 UART: [rt]cmd =0x41544d4e, len=14344
30,898,096 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,462,645 ready_for_fw is high
3,463,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,370,208 >>> mbox cmd response: success
19,671,044 UART:
19,671,434 UART: Running Caliptra FMC ...
19,672,592 UART:
19,672,749 UART: [state] CFI Enabled
19,737,124 UART: [fht] FMC Alias Private Key: 7
21,503,838 UART: [art] Extend RT PCRs Done
21,505,048 UART: [art] Lock RT PCRs Done
21,506,727 UART: [art] Populate DV Done
21,512,037 UART: [fht] FMC Alias Private Key: 7
21,513,640 UART: [art] Derive CDI
21,514,456 UART: [art] Store in slot 0x4
21,570,155 UART: [art] Derive Key Pair
21,571,193 UART: [art] Store priv key in slot 0x5
24,034,114 UART: [art] Derive Key Pair - Done
24,047,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,759,773 UART: [art] Erasing AUTHORITY.KEYID = 7
25,761,265 UART: [art] PUB.X = 1180248922C270CB1535B58005FE2746FEE544054BD65404E0EA5F4679B8A0AB7CB081C3AC4CD88BC98C5435714FF0FD
25,768,598 UART: [art] PUB.Y = F10ACC5D232949926E66D685685AA68BB931300040D34F9C7CFCC4FC42EF92EF5A15835795DF34066E623C2B05969D4F
25,775,768 UART: [art] SIG.R = DC65AB12AA20C7304AAF05CD346948F18289225651301D011F1839B5E404CBC2CBE5EEE79DBE5A0413B46899D524CE7D
25,783,167 UART: [art] SIG.S = 90D7301D1D9EC036F657DA9D0C2FCC73905F7DCBF2C952E8FCE125C43B62164364785E7681ADB687A3571571D5FE17CF
26,762,152 UART: Caliptra RT
26,762,888 UART: [state] CFI Enabled
26,943,567 UART: [rt] RT listening for mailbox commands...
26,945,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,101,171 UART: [rt]cmd =0x41544d4e, len=14344
30,818,427 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,276 UART:
192,645 UART: Running Caliptra ROM ...
193,828 UART:
603,416 UART: [state] CFI Enabled
615,986 UART: [state] LifecycleState = Unprovisioned
617,864 UART: [state] DebugLocked = No
620,458 UART: [state] WD Timer not started. Device not locked for debugging
623,991 UART: [kat] SHA2-256
803,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,398 UART: [kat] ++
814,951 UART: [kat] sha1
824,402 UART: [kat] SHA2-256
827,126 UART: [kat] SHA2-384
832,900 UART: [kat] SHA2-512-ACC
835,268 UART: [kat] ECC-384
3,273,660 UART: [kat] HMAC-384Kdf
3,286,910 UART: [kat] LMS
3,763,434 UART: [kat] --
3,768,069 UART: [cold-reset] ++
3,769,243 UART: [fht] FHT @ 0x50003400
3,780,017 UART: [idev] ++
3,780,595 UART: [idev] CDI.KEYID = 6
3,781,630 UART: [idev] SUBJECT.KEYID = 7
3,782,812 UART: [idev] UDS.KEYID = 0
3,783,746 ready_for_fw is high
3,783,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,932,920 UART: [idev] Erasing UDS.KEYID = 0
6,258,217 UART: [idev] Sha1 KeyId Algorithm
6,281,088 UART: [idev] --
6,287,055 UART: [ldev] ++
6,287,638 UART: [ldev] CDI.KEYID = 6
6,288,550 UART: [ldev] SUBJECT.KEYID = 5
6,289,764 UART: [ldev] AUTHORITY.KEYID = 7
6,290,999 UART: [ldev] FE.KEYID = 1
6,301,380 UART: [ldev] Erasing FE.KEYID = 1
8,780,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,049 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,249 UART: [ldev] --
10,576,386 UART: [fwproc] Wait for Commands...
10,578,806 UART: [fwproc] Recv command 0x46574c44
10,580,793 UART: [fwproc] Recv'd Img size: 118548 bytes
15,122,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,210,404 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,283,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,612,292 >>> mbox cmd response: success
15,617,074 UART: [afmc] ++
15,617,694 UART: [afmc] CDI.KEYID = 6
15,618,611 UART: [afmc] SUBJECT.KEYID = 7
15,619,850 UART: [afmc] AUTHORITY.KEYID = 5
18,120,968 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,843,811 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,845,998 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,861,887 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,877,786 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,893,488 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,917,709 UART: [afmc] --
19,921,895 UART: [cold-reset] --
19,925,278 UART: [state] Locking Datavault
19,931,070 UART: [state] Locking PCR0, PCR1 and PCR31
19,932,827 UART: [state] Locking ICCM
19,933,879 UART: [exit] Launching FMC @ 0x40000130
19,942,280 UART:
19,942,523 UART: Running Caliptra FMC ...
19,943,628 UART:
19,943,811 UART: [state] CFI Enabled
19,951,809 UART: [fht] FMC Alias Private Key: 7
21,718,468 UART: [art] Extend RT PCRs Done
21,719,682 UART: [art] Lock RT PCRs Done
21,721,467 UART: [art] Populate DV Done
21,726,715 UART: [fht] FMC Alias Private Key: 7
21,728,376 UART: [art] Derive CDI
21,729,198 UART: [art] Store in slot 0x4
21,772,392 UART: [art] Derive Key Pair
21,773,394 UART: [art] Store priv key in slot 0x5
24,200,516 UART: [art] Derive Key Pair - Done
24,213,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,920,748 UART: [art] Erasing AUTHORITY.KEYID = 7
25,922,254 UART: [art] PUB.X = 663FFEA2D17B8A08D55AF36BFE969958C988469F0B85067B151366127F26282B787FA7FF3F4336E23F59754258CCA173
25,929,502 UART: [art] PUB.Y = CAFE54BC11A97CDC361A1FCB0A0C89C069BC20264986E078E638F4478E4E05A70CB4D1F2CAA6D25D20478795A559B8FF
25,936,733 UART: [art] SIG.R = 60657CBE5B49AE144385B61406339C170A0285DAB040337C00B5AE941D22F7E75D017E033CCD86EA9012CE97EB6FC8AA
25,944,153 UART: [art] SIG.S = A16C2C52012A4129A8E06FF3DD19A612024ADC208277885957ED3DC0178AE806FA4E352F795E0F09E3D6B8995968015E
26,922,646 UART: Caliptra RT
26,923,346 UART: [state] CFI Enabled
27,055,851 UART: [rt] RT listening for mailbox commands...
27,058,165 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,213,756 UART: [rt]cmd =0x41544d4e, len=14344
30,922,998 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,775,371 ready_for_fw is high
3,775,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,595,918 >>> mbox cmd response: success
19,848,479 UART:
19,848,868 UART: Running Caliptra FMC ...
19,849,974 UART:
19,850,130 UART: [state] CFI Enabled
19,857,870 UART: [fht] FMC Alias Private Key: 7
21,624,146 UART: [art] Extend RT PCRs Done
21,625,365 UART: [art] Lock RT PCRs Done
21,627,212 UART: [art] Populate DV Done
21,632,629 UART: [fht] FMC Alias Private Key: 7
21,634,340 UART: [art] Derive CDI
21,635,158 UART: [art] Store in slot 0x4
21,677,760 UART: [art] Derive Key Pair
21,678,805 UART: [art] Store priv key in slot 0x5
24,104,612 UART: [art] Derive Key Pair - Done
24,117,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,823,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,825,199 UART: [art] PUB.X = F2921AADC43E11E19FB69730B903C06905F160EC050EE7E8A30A764BB1CB5ACCFC8019D75F4BAFBEAAF7D131808D9536
25,832,462 UART: [art] PUB.Y = F85C1C03DB5E40CA87987A6D37EE6828506D5F2B8966CCA1DB9122D170BD25E8EB979FD9A12D73D1C7C4F28C94190830
25,839,719 UART: [art] SIG.R = C741C92FFD72EB1FAB530A60E9B7A2DC9C2DDA500C8AAC1CB732F326FB7164FEA3B0EE118BF1329C3DDDC0C912D00D38
25,847,191 UART: [art] SIG.S = EBF70BF87B5425F6030F1F11558896D518738303569C851C6B8BBC8B2532C6D647AB2E8C001478F5B968465E514D44BC
26,826,502 UART: Caliptra RT
26,827,212 UART: [state] CFI Enabled
26,960,094 UART: [rt] RT listening for mailbox commands...
26,962,423 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,117,843 UART: [rt]cmd =0x41544d4e, len=14344
30,827,428 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
192,061 UART:
192,631 UART: Running Caliptra ROM ...
193,747 UART:
193,899 UART: [state] CFI Enabled
266,758 UART: [state] LifecycleState = Unprovisioned
269,139 UART: [state] DebugLocked = No
270,806 UART: [state] WD Timer not started. Device not locked for debugging
276,280 UART: [kat] SHA2-256
466,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,894 UART: [kat] ++
477,528 UART: [kat] sha1
487,907 UART: [kat] SHA2-256
490,972 UART: [kat] SHA2-384
497,958 UART: [kat] SHA2-512-ACC
500,535 UART: [kat] ECC-384
2,950,537 UART: [kat] HMAC-384Kdf
2,973,012 UART: [kat] LMS
3,504,773 UART: [kat] --
3,508,200 UART: [cold-reset] ++
3,510,621 UART: [fht] FHT @ 0x50003400
3,521,736 UART: [idev] ++
3,522,434 UART: [idev] CDI.KEYID = 6
3,523,334 UART: [idev] SUBJECT.KEYID = 7
3,524,596 UART: [idev] UDS.KEYID = 0
3,525,520 ready_for_fw is high
3,525,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,780 UART: [idev] Erasing UDS.KEYID = 0
6,029,419 UART: [idev] Sha1 KeyId Algorithm
6,052,049 UART: [idev] --
6,056,889 UART: [ldev] ++
6,057,575 UART: [ldev] CDI.KEYID = 6
6,058,458 UART: [ldev] SUBJECT.KEYID = 5
6,059,665 UART: [ldev] AUTHORITY.KEYID = 7
6,060,895 UART: [ldev] FE.KEYID = 1
6,100,393 UART: [ldev] Erasing FE.KEYID = 1
8,607,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,718 UART: [ldev] --
10,414,031 UART: [fwproc] Wait for Commands...
10,416,936 UART: [fwproc] Recv command 0x46574c44
10,419,186 UART: [fwproc] Recv'd Img size: 118548 bytes
15,075,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,153,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,277,523 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,838,128 >>> mbox cmd response: success
15,841,414 UART: [afmc] ++
15,842,140 UART: [afmc] CDI.KEYID = 6
15,843,332 UART: [afmc] SUBJECT.KEYID = 7
15,844,769 UART: [afmc] AUTHORITY.KEYID = 5
18,385,728 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,110,902 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,112,801 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,127,952 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,143,104 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,158,134 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,182,380 UART: [afmc] --
20,186,611 UART: [cold-reset] --
20,190,805 UART: [state] Locking Datavault
20,195,300 UART: [state] Locking PCR0, PCR1 and PCR31
20,197,542 UART: [state] Locking ICCM
20,198,940 UART: [exit] Launching FMC @ 0x40000130
20,207,621 UART:
20,207,858 UART: Running Caliptra FMC ...
20,208,957 UART:
20,209,111 UART: [state] CFI Enabled
20,269,253 UART: [fht] FMC Alias Private Key: 7
22,036,060 UART: [art] Extend RT PCRs Done
22,037,285 UART: [art] Lock RT PCRs Done
22,038,686 UART: [art] Populate DV Done
22,044,095 UART: [fht] FMC Alias Private Key: 7
22,045,576 UART: [art] Derive CDI
22,046,334 UART: [art] Store in slot 0x4
22,102,393 UART: [art] Derive Key Pair
22,103,391 UART: [art] Store priv key in slot 0x5
24,566,280 UART: [art] Derive Key Pair - Done
24,579,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,291,887 UART: [art] Erasing AUTHORITY.KEYID = 7
26,293,387 UART: [art] PUB.X = CA6E67B9C52C25AC93239956A33CFEA3ABC54AAA5300CCC9B02CC255105B296831425CA94783A2F6F54C184528400B77
26,300,590 UART: [art] PUB.Y = 24D7494E742411B02CFB6FBABC007AA09C97FB04ED79DA5008CE5A19D0EADD07C0FCB9DE41D472E18BC585D28724CC2F
26,307,887 UART: [art] SIG.R = D37F2C7985DAA1F38A89A920EB11812AFA70CF018CCFED4BEE6195A0EE930FAA1E3E3E68149F4ABB4F6FA1CA0C01755B
26,315,291 UART: [art] SIG.S = F14EDB5EFA502B0F0860F73C3B68EEB74E4A13E4B1CD87786E9668D04444F5380C49EC352005BF02FFB50C342B94DC4A
27,294,337 UART: Caliptra RT
27,295,038 UART: [state] CFI Enabled
27,474,954 UART: [rt] RT listening for mailbox commands...
27,477,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,632,719 UART: [rt]cmd =0x41544d4e, len=14344
31,356,114 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,418,013 ready_for_fw is high
3,418,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,876,864 >>> mbox cmd response: success
20,157,246 UART:
20,157,641 UART: Running Caliptra FMC ...
20,158,753 UART:
20,158,904 UART: [state] CFI Enabled
20,225,185 UART: [fht] FMC Alias Private Key: 7
21,990,598 UART: [art] Extend RT PCRs Done
21,991,829 UART: [art] Lock RT PCRs Done
21,993,755 UART: [art] Populate DV Done
21,998,947 UART: [fht] FMC Alias Private Key: 7
22,000,641 UART: [art] Derive CDI
22,001,382 UART: [art] Store in slot 0x4
22,057,674 UART: [art] Derive Key Pair
22,058,717 UART: [art] Store priv key in slot 0x5
24,522,024 UART: [art] Derive Key Pair - Done
24,534,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,246,879 UART: [art] Erasing AUTHORITY.KEYID = 7
26,248,382 UART: [art] PUB.X = 76E7CA35FAE428F2006553C0E6DC56E80D69EF50D0D4DA2B1310E09A4D39C3280124CFF29CBB6429D423CFAAC837474D
26,255,673 UART: [art] PUB.Y = 63291BD9BFDD2A9244A6FBD73854A847A0E7B102794CC66AF1B715A47DD5CE58216BA20CC7C9BD473F97D6489CF36946
26,262,898 UART: [art] SIG.R = 87681222198FF8CDC486B0853DC5606354CDA1D38498E666DA59F725053408350808D93B283F2EFFC4D26721C3E3AE6C
26,270,314 UART: [art] SIG.S = CA4BA00AE6FEA7AF323A2468B32DE05532ADE321AAD9A871D44B5552647737CD5DC8D0F8672A6F9860390A2B33C7F903
27,249,462 UART: Caliptra RT
27,250,195 UART: [state] CFI Enabled
27,430,871 UART: [rt] RT listening for mailbox commands...
27,433,201 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,588,290 UART: [rt]cmd =0x41544d4e, len=14344
31,293,493 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,483 UART:
192,866 UART: Running Caliptra ROM ...
193,950 UART:
603,518 UART: [state] CFI Enabled
618,052 UART: [state] LifecycleState = Unprovisioned
620,392 UART: [state] DebugLocked = No
623,204 UART: [state] WD Timer not started. Device not locked for debugging
626,899 UART: [kat] SHA2-256
816,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,328 UART: [kat] ++
827,933 UART: [kat] sha1
838,907 UART: [kat] SHA2-256
841,890 UART: [kat] SHA2-384
847,391 UART: [kat] SHA2-512-ACC
849,979 UART: [kat] ECC-384
3,289,405 UART: [kat] HMAC-384Kdf
3,303,626 UART: [kat] LMS
3,835,494 UART: [kat] --
3,839,702 UART: [cold-reset] ++
3,841,488 UART: [fht] FHT @ 0x50003400
3,853,394 UART: [idev] ++
3,854,034 UART: [idev] CDI.KEYID = 6
3,855,070 UART: [idev] SUBJECT.KEYID = 7
3,856,177 UART: [idev] UDS.KEYID = 0
3,857,117 ready_for_fw is high
3,857,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,209 UART: [idev] Erasing UDS.KEYID = 0
6,332,841 UART: [idev] Sha1 KeyId Algorithm
6,355,544 UART: [idev] --
6,360,307 UART: [ldev] ++
6,361,031 UART: [ldev] CDI.KEYID = 6
6,361,955 UART: [ldev] SUBJECT.KEYID = 5
6,363,118 UART: [ldev] AUTHORITY.KEYID = 7
6,364,297 UART: [ldev] FE.KEYID = 1
6,376,786 UART: [ldev] Erasing FE.KEYID = 1
8,854,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,830 UART: [ldev] --
10,645,741 UART: [fwproc] Wait for Commands...
10,648,431 UART: [fwproc] Recv command 0x46574c44
10,650,688 UART: [fwproc] Recv'd Img size: 118548 bytes
15,332,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,411,091 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,534,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,094,925 >>> mbox cmd response: success
16,099,128 UART: [afmc] ++
16,099,864 UART: [afmc] CDI.KEYID = 6
16,101,068 UART: [afmc] SUBJECT.KEYID = 7
16,102,517 UART: [afmc] AUTHORITY.KEYID = 5
18,610,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,332,708 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,334,679 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,349,785 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,365,005 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,380,074 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,403,310 UART: [afmc] --
20,406,800 UART: [cold-reset] --
20,412,138 UART: [state] Locking Datavault
20,416,067 UART: [state] Locking PCR0, PCR1 and PCR31
20,418,232 UART: [state] Locking ICCM
20,420,931 UART: [exit] Launching FMC @ 0x40000130
20,429,567 UART:
20,429,805 UART: Running Caliptra FMC ...
20,430,909 UART:
20,431,079 UART: [state] CFI Enabled
20,439,028 UART: [fht] FMC Alias Private Key: 7
22,204,768 UART: [art] Extend RT PCRs Done
22,206,010 UART: [art] Lock RT PCRs Done
22,207,752 UART: [art] Populate DV Done
22,212,903 UART: [fht] FMC Alias Private Key: 7
22,214,471 UART: [art] Derive CDI
22,215,299 UART: [art] Store in slot 0x4
22,257,409 UART: [art] Derive Key Pair
22,258,409 UART: [art] Store priv key in slot 0x5
24,685,103 UART: [art] Derive Key Pair - Done
24,697,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,404,304 UART: [art] Erasing AUTHORITY.KEYID = 7
26,405,826 UART: [art] PUB.X = 4E7B33603FAFAF38B658481734741DBA5D8E8EED77610B49C2A729F6CA7D94027A8ADE63A327BB33EFEC59D02BE88F90
26,413,108 UART: [art] PUB.Y = C47D309722C6A998600F368D29C153951662D7ED0A7ECF23CDAD4224E58CD29C0BAFA39B142D0D38902CEF5080BDDC28
26,420,369 UART: [art] SIG.R = FC2BC1D28232C2FDA9AB484B408894A53B8772946516B9B4E163012C432134E9ADAA4799A620D02EEF2DD32BC595C1C5
26,427,752 UART: [art] SIG.S = 61A2988594318BC697C09C6175AED88C6D4E19714D7AB2CB2CCFBDF3B6BE4F9597A045A83FB9A72E574E87336CEADCA3
27,406,711 UART: Caliptra RT
27,407,425 UART: [state] CFI Enabled
27,540,543 UART: [rt] RT listening for mailbox commands...
27,542,843 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,698,439 UART: [rt]cmd =0x41544d4e, len=14344
31,419,741 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
3,760,573 ready_for_fw is high
3,760,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,152,372 >>> mbox cmd response: success
20,404,164 UART:
20,404,554 UART: Running Caliptra FMC ...
20,405,686 UART:
20,405,852 UART: [state] CFI Enabled
20,413,530 UART: [fht] FMC Alias Private Key: 7
22,180,620 UART: [art] Extend RT PCRs Done
22,182,004 UART: [art] Lock RT PCRs Done
22,183,382 UART: [art] Populate DV Done
22,189,006 UART: [fht] FMC Alias Private Key: 7
22,190,607 UART: [art] Derive CDI
22,191,430 UART: [art] Store in slot 0x4
22,233,671 UART: [art] Derive Key Pair
22,234,676 UART: [art] Store priv key in slot 0x5
24,661,205 UART: [art] Derive Key Pair - Done
24,673,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,380,207 UART: [art] Erasing AUTHORITY.KEYID = 7
26,381,709 UART: [art] PUB.X = 4AF2CEF1E553AB5EE2357F81EC39573B7C03E9A80A0E47CCFEA5E98EA70BD40EC0F03BF064CBDD81DE08FD04266F16AE
26,389,013 UART: [art] PUB.Y = 3FD1E8EE8B924D55B7798C4108C5A1114721763C60665C5358D1E5844BC09A11D5A01CC5D22B16249A3FF77F94B55490
26,396,240 UART: [art] SIG.R = 68E8EDD4BC5A60A1F09AE6758B231DC79F526D7796876EA6BDCCC1E2FB2DE006E8AA8C9477DD969599764796364D55B5
26,403,664 UART: [art] SIG.S = 685340E69E710044C19618C93951C0E4E935FE9CDFEC8E73E23B6669993B3F79F9C9A805A339090604C290B58817CFE2
27,382,439 UART: Caliptra RT
27,383,136 UART: [state] CFI Enabled
27,516,021 UART: [rt] RT listening for mailbox commands...
27,518,318 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,673,674 UART: [rt]cmd =0x41544d4e, len=14344
31,405,486 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
86,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,795 UART: [kat] SHA2-256
881,726 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,841 UART: [kat] ++
885,993 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,522 UART: [kat] HMAC-384Kdf
907,178 UART: [kat] LMS
1,475,374 UART: [kat] --
1,476,545 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 ready_for_fw is high
1,481,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,254 UART: [idev] Erasing UDS.KEYID = 0
1,504,400 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,042 UART: [idev] --
1,514,117 UART: [ldev] ++
1,514,285 UART: [ldev] CDI.KEYID = 6
1,514,648 UART: [ldev] SUBJECT.KEYID = 5
1,515,074 UART: [ldev] AUTHORITY.KEYID = 7
1,515,537 UART: [ldev] FE.KEYID = 1
1,520,711 UART: [ldev] Erasing FE.KEYID = 1
1,546,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,530 UART: [ldev] --
1,585,959 UART: [fwproc] Waiting for Commands...
1,586,768 UART: [fwproc] Received command 0x46574c44
1,587,559 UART: [fwproc] Received Image of size 118548 bytes
5,394,472 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,421,928 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,453,146 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,593,595 >>> mbox cmd response: success
5,594,781 UART: [afmc] ++
5,594,949 UART: [afmc] CDI.KEYID = 6
5,595,311 UART: [afmc] SUBJECT.KEYID = 7
5,595,736 UART: [afmc] AUTHORITY.KEYID = 5
5,631,127 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,647,339 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,648,119 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,653,825 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,659,704 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,665,417 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,673,062 UART: [afmc] --
5,673,962 UART: [cold-reset] --
5,674,830 UART: [state] Locking Datavault
5,675,997 UART: [state] Locking PCR0, PCR1 and PCR31
5,676,601 UART: [state] Locking ICCM
5,677,239 UART: [exit] Launching FMC @ 0x40000130
5,682,569 UART:
5,682,585 UART: Running Caliptra FMC ...
5,682,993 UART:
5,683,047 UART: [state] CFI Enabled
5,693,495 UART: [fht] FMC Alias Private Key: 7
5,812,459 UART: [art] Extend RT PCRs Done
5,812,887 UART: [art] Lock RT PCRs Done
5,814,389 UART: [art] Populate DV Done
5,822,738 UART: [fht] FMC Alias Private Key: 7
5,823,734 UART: [art] Derive CDI
5,824,014 UART: [art] Store in slot 0x4
5,910,048 UART: [art] Derive Key Pair
5,910,408 UART: [art] Store priv key in slot 0x5
5,923,781 UART: [art] Derive Key Pair - Done
5,938,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,954,306 UART: [art] Erasing AUTHORITY.KEYID = 7
5,955,071 UART: [art] PUB.X = B52770BD404B3CE0EB86E5B1B01F5881A528A332AC7FF3319DB31313C09B160669B752050AF9D285E6AF9E8D0D42DFBE
5,961,839 UART: [art] PUB.Y = AD1158E4695A81C4C2471CED04CBC776895DDEBA8B44008A3D9FAB68A9431B1982A587050C0BA57C4098F7B7ADB7D48C
5,968,767 UART: [art] SIG.R = 99376A1C9032B9FCDCCE7AF76C112DAC794DBB8AD0E1C30EBA479C9527F1F5609E0716D537067B89E11702DE75C0C571
5,975,535 UART: [art] SIG.S = 09EFA3FF23216D44196171C3857B68F5C360E5E663CB5A8D4556ABA306EED03896F8B54AD56E2989F644542958EDB465
5,999,353 UART: Caliptra RT
5,999,604 UART: [state] CFI Enabled
6,120,196 UART: [rt] RT listening for mailbox commands...
6,120,866 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,243,956 UART: [rt]cmd =0x41544d4e, len=14344
9,873,269 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,607 ready_for_fw is high
1,362,607 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,065,935 >>> mbox cmd response: success
5,126,854 UART:
5,126,870 UART: Running Caliptra FMC ...
5,127,278 UART:
5,127,332 UART: [state] CFI Enabled
5,138,140 UART: [fht] FMC Alias Private Key: 7
5,257,368 UART: [art] Extend RT PCRs Done
5,257,796 UART: [art] Lock RT PCRs Done
5,259,308 UART: [art] Populate DV Done
5,267,359 UART: [fht] FMC Alias Private Key: 7
5,268,479 UART: [art] Derive CDI
5,268,759 UART: [art] Store in slot 0x4
5,354,451 UART: [art] Derive Key Pair
5,354,811 UART: [art] Store priv key in slot 0x5
5,368,274 UART: [art] Derive Key Pair - Done
5,383,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,399,321 UART: [art] Erasing AUTHORITY.KEYID = 7
5,400,086 UART: [art] PUB.X = DF1FB7F9990FCEA4E7B4013DDC1BD45AC27D994D337E9CBD9E6069264D0A727BA7DCF3B2886B5DF39DC60E682C37BEFA
5,406,870 UART: [art] PUB.Y = F4D8DBC715AF7101C85C0F73F94EB53E802C01963248718EE0AAA7AF3E1CAE5F7FDDF44FD0CBA794F27BCFA98A55C7CE
5,413,839 UART: [art] SIG.R = 7DE7917F95408A7CBB607266013FF04FF6CF9002AFEF629FC81569B451AF8B2589D9D0BF55AB7DB474B673E709CE82DB
5,420,612 UART: [art] SIG.S = E40EBE3B7910836E59BF23B248AB8D4E026F79306815CFA10CF3C4C275370A48522E8F4AE414676300B3950E734BC6C0
5,444,603 UART: Caliptra RT
5,444,854 UART: [state] CFI Enabled
5,563,958 UART: [rt] RT listening for mailbox commands...
5,564,628 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,687,526 UART: [rt]cmd =0x41544d4e, len=14344
9,505,989 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,075 UART: [state] LifecycleState = Unprovisioned
85,730 UART: [state] DebugLocked = No
86,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,946 UART: [kat] SHA2-256
881,877 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,992 UART: [kat] ++
886,144 UART: [kat] sha1
890,236 UART: [kat] SHA2-256
892,174 UART: [kat] SHA2-384
894,997 UART: [kat] SHA2-512-ACC
896,898 UART: [kat] ECC-384
902,243 UART: [kat] HMAC-384Kdf
906,889 UART: [kat] LMS
1,475,085 UART: [kat] --
1,475,974 UART: [cold-reset] ++
1,476,468 UART: [fht] Storing FHT @ 0x50003400
1,479,183 UART: [idev] ++
1,479,351 UART: [idev] CDI.KEYID = 6
1,479,711 UART: [idev] SUBJECT.KEYID = 7
1,480,135 UART: [idev] UDS.KEYID = 0
1,480,480 ready_for_fw is high
1,480,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,481 UART: [idev] Erasing UDS.KEYID = 0
1,504,947 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,669 UART: [idev] --
1,514,510 UART: [ldev] ++
1,514,678 UART: [ldev] CDI.KEYID = 6
1,515,041 UART: [ldev] SUBJECT.KEYID = 5
1,515,467 UART: [ldev] AUTHORITY.KEYID = 7
1,515,930 UART: [ldev] FE.KEYID = 1
1,521,134 UART: [ldev] Erasing FE.KEYID = 1
1,546,655 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,585,984 UART: [fwproc] Waiting for Commands...
1,586,775 UART: [fwproc] Received command 0x46574c44
1,587,566 UART: [fwproc] Received Image of size 118548 bytes
5,092,761 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,121,025 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,152,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,292,634 >>> mbox cmd response: success
5,293,826 UART: [afmc] ++
5,293,994 UART: [afmc] CDI.KEYID = 6
5,294,356 UART: [afmc] SUBJECT.KEYID = 7
5,294,781 UART: [afmc] AUTHORITY.KEYID = 5
5,330,034 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,346,364 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,347,144 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,352,850 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,358,729 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,364,442 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,372,093 UART: [afmc] --
5,373,157 UART: [cold-reset] --
5,373,813 UART: [state] Locking Datavault
5,375,080 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,684 UART: [state] Locking ICCM
5,376,130 UART: [exit] Launching FMC @ 0x40000130
5,381,460 UART:
5,381,476 UART: Running Caliptra FMC ...
5,381,884 UART:
5,382,027 UART: [state] CFI Enabled
5,392,393 UART: [fht] FMC Alias Private Key: 7
5,510,371 UART: [art] Extend RT PCRs Done
5,510,799 UART: [art] Lock RT PCRs Done
5,512,213 UART: [art] Populate DV Done
5,520,508 UART: [fht] FMC Alias Private Key: 7
5,521,556 UART: [art] Derive CDI
5,521,836 UART: [art] Store in slot 0x4
5,607,512 UART: [art] Derive Key Pair
5,607,872 UART: [art] Store priv key in slot 0x5
5,621,475 UART: [art] Derive Key Pair - Done
5,636,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,652,157 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,922 UART: [art] PUB.X = ACCC29324BA47A0A131D2279D917917F27363AFCD04393CB156CFF09C5E74A659F34016248928150254DC284EC6628F3
5,659,679 UART: [art] PUB.Y = EB29ECDD6C33E8389E244F7650A4DC80534333C715CE64CCE3B64EFF678EB10E3FFA005108D1A57DBD1D8FCF4F104060
5,666,617 UART: [art] SIG.R = A69559C246C6411BF187A2DE3B8602330CAEA56E57D7C833811B27041328A292C18CB09F32EF7AEFA139AF9076ECA245
5,673,382 UART: [art] SIG.S = E5EB749A473C1730F0C2302CA6A651049D4D6EB47A22C0B72F3415D086FD70993B47B6081F120C669D6CDE5608353AE1
5,697,440 UART: Caliptra RT
5,697,783 UART: [state] CFI Enabled
5,817,730 UART: [rt] RT listening for mailbox commands...
5,818,400 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,941,498 UART: [rt]cmd =0x41544d4e, len=14344
9,874,222 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.37s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 ready_for_fw is high
1,362,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,404,403 >>> mbox cmd response: success
5,466,298 UART:
5,466,314 UART: Running Caliptra FMC ...
5,466,722 UART:
5,466,865 UART: [state] CFI Enabled
5,477,575 UART: [fht] FMC Alias Private Key: 7
5,596,917 UART: [art] Extend RT PCRs Done
5,597,345 UART: [art] Lock RT PCRs Done
5,598,873 UART: [art] Populate DV Done
5,607,070 UART: [fht] FMC Alias Private Key: 7
5,608,222 UART: [art] Derive CDI
5,608,502 UART: [art] Store in slot 0x4
5,694,468 UART: [art] Derive Key Pair
5,694,828 UART: [art] Store priv key in slot 0x5
5,708,153 UART: [art] Derive Key Pair - Done
5,722,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,738,069 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,834 UART: [art] PUB.X = 9C7A1BD72CE076566698D0A5DD8CB7FA2F0C740C80E41C2F1D30F8DF1A2026099C695C3015E8E10E8F9BB666702E675E
5,745,600 UART: [art] PUB.Y = AA21FD77F2F42BE9729574278ABCE107CCB0F273E853F5037A70CA551D7482EA309F4DAB6E9C2CF9CD620E7ADEC3E96A
5,752,561 UART: [art] SIG.R = 3AE64C4C8D012404A67D71E603B50D938EC6753F78B4AB7074389D6AF5B1861DB5843B90D420FD2DA16252F76F2BA0C2
5,759,323 UART: [art] SIG.S = B52A9B615A70169BEE3CC8C09A91245A0CD91E1415741F22D8BB80E79ED00F1751E1EC374FE66FE17517D6D0BB623E2E
5,783,073 UART: Caliptra RT
5,783,416 UART: [state] CFI Enabled
5,903,272 UART: [rt] RT listening for mailbox commands...
5,903,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,026,980 UART: [rt]cmd =0x41544d4e, len=14344
9,693,986 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,557 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
891,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,530 UART: [kat] ++
895,682 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,577 UART: [kat] SHA2-512-ACC
906,478 UART: [kat] ECC-384
916,417 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,169,878 UART: [cold-reset] ++
1,170,392 UART: [fht] FHT @ 0x50003400
1,173,070 UART: [idev] ++
1,173,238 UART: [idev] CDI.KEYID = 6
1,173,599 UART: [idev] SUBJECT.KEYID = 7
1,174,024 UART: [idev] UDS.KEYID = 0
1,174,370 ready_for_fw is high
1,174,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,895 UART: [idev] Erasing UDS.KEYID = 0
1,198,757 UART: [idev] Sha1 KeyId Algorithm
1,207,695 UART: [idev] --
1,208,828 UART: [ldev] ++
1,208,996 UART: [ldev] CDI.KEYID = 6
1,209,360 UART: [ldev] SUBJECT.KEYID = 5
1,209,787 UART: [ldev] AUTHORITY.KEYID = 7
1,210,250 UART: [ldev] FE.KEYID = 1
1,215,452 UART: [ldev] Erasing FE.KEYID = 1
1,242,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,414 UART: [ldev] --
1,281,679 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,572 >>> mbox cmd response: success
3,372,714 UART: [afmc] ++
3,372,882 UART: [afmc] CDI.KEYID = 6
3,373,245 UART: [afmc] SUBJECT.KEYID = 7
3,373,671 UART: [afmc] AUTHORITY.KEYID = 5
3,409,162 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,120 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,827 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,704 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,414 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,076 UART: [afmc] --
3,451,981 UART: [cold-reset] --
3,453,027 UART: [state] Locking Datavault
3,454,232 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,836 UART: [state] Locking ICCM
3,455,462 UART: [exit] Launching FMC @ 0x40000130
3,460,792 UART:
3,460,808 UART: Running Caliptra FMC ...
3,461,216 UART:
3,461,270 UART: [state] CFI Enabled
3,471,976 UART: [fht] FMC Alias Private Key: 7
3,590,798 UART: [art] Extend RT PCRs Done
3,591,226 UART: [art] Lock RT PCRs Done
3,592,972 UART: [art] Populate DV Done
3,601,299 UART: [fht] FMC Alias Private Key: 7
3,602,471 UART: [art] Derive CDI
3,602,751 UART: [art] Store in slot 0x4
3,688,684 UART: [art] Derive Key Pair
3,689,044 UART: [art] Store priv key in slot 0x5
3,702,750 UART: [art] Derive Key Pair - Done
3,717,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,153 UART: [art] PUB.X = 0298D85389152081EBC4D9A365BA52B6EFB0A8B624EFDF4582E7FA29E0BE1252D08AEB1EBF37D208DF16656C3AB2D574
3,739,931 UART: [art] PUB.Y = D905B9D7F6801D1AE472D5004903B1650A777CF948D39D6D215B247D4AD34E4D63E912F44DC95FE53FD5AB849D4AB000
3,746,834 UART: [art] SIG.R = 091DEBB1A812C12EB932C57D39342997BECEE55DBC79954DC4FEE87024F671CFC95F63AD82F4E73759284A0CAC57021E
3,753,607 UART: [art] SIG.S = 386F62BDED201803863190FA9A471454225696FF2C895E267E0CD06E6E7FC01AC47223DB2C2779E97A5C23F03EC32787
3,777,149 UART: Caliptra RT
3,777,400 UART: [state] CFI Enabled
3,896,550 UART: [rt] RT listening for mailbox commands...
3,897,220 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,178 UART: [rt]cmd =0x41544d4e, len=14344
5,184,197 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,534 ready_for_fw is high
1,059,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,233 >>> mbox cmd response: success
3,277,382 UART:
3,277,398 UART: Running Caliptra FMC ...
3,277,806 UART:
3,277,860 UART: [state] CFI Enabled
3,288,264 UART: [fht] FMC Alias Private Key: 7
3,407,146 UART: [art] Extend RT PCRs Done
3,407,574 UART: [art] Lock RT PCRs Done
3,409,118 UART: [art] Populate DV Done
3,417,447 UART: [fht] FMC Alias Private Key: 7
3,418,615 UART: [art] Derive CDI
3,418,895 UART: [art] Store in slot 0x4
3,504,662 UART: [art] Derive Key Pair
3,505,022 UART: [art] Store priv key in slot 0x5
3,517,552 UART: [art] Derive Key Pair - Done
3,532,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,548,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,058 UART: [art] PUB.X = A16C28176419C3A69D622D850647ACE9DF0AB1943F193BCEB6F298ECF25D47FEB7520145A861C4DB3F695E8268DEC1FD
3,555,831 UART: [art] PUB.Y = B4E0464AA7503B0F475114B030E248BA2E566BA8A64C8817E9D7C5F24BFC3C94DA21789BF5158EDD5A749EE91813D065
3,562,784 UART: [art] SIG.R = 8DEEBD2911B5EC12F8E5E875A63F09E80C5ED7BE246204FA153ADC547E958CE6BCC00D7F9DFBDFDD13E982FF1C6D911C
3,569,570 UART: [art] SIG.S = 5235094F33E5EC10C282417F252F9BD3210C39A47883BD947395A9A3EE9F9D1784CD179CB5FFE676C01BEA9DC288254A
3,592,992 UART: Caliptra RT
3,593,243 UART: [state] CFI Enabled
3,713,349 UART: [rt] RT listening for mailbox commands...
3,714,019 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,837,053 UART: [rt]cmd =0x41544d4e, len=14344
5,003,995 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
86,994 UART: [state] WD Timer not started. Device not locked for debugging
88,313 UART: [kat] SHA2-256
891,863 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,967 UART: [kat] ++
896,119 UART: [kat] sha1
900,211 UART: [kat] SHA2-256
902,151 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,750 UART: [kat] HMAC-384Kdf
921,246 UART: [kat] LMS
1,169,558 UART: [kat] --
1,170,313 UART: [cold-reset] ++
1,170,863 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 ready_for_fw is high
1,174,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,426 UART: [idev] Erasing UDS.KEYID = 0
1,199,702 UART: [idev] Sha1 KeyId Algorithm
1,208,752 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,321 UART: [ldev] Erasing FE.KEYID = 1
1,242,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,770 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,580 UART: [fwproc] Wait for Commands...
1,283,327 UART: [fwproc] Recv command 0x46574c44
1,284,060 UART: [fwproc] Recv'd Img size: 118548 bytes
3,165,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,692 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,867 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,216 >>> mbox cmd response: success
3,365,382 UART: [afmc] ++
3,365,550 UART: [afmc] CDI.KEYID = 6
3,365,913 UART: [afmc] SUBJECT.KEYID = 7
3,366,339 UART: [afmc] AUTHORITY.KEYID = 5
3,402,204 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,418,871 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,419,620 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,425,327 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,431,204 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,436,914 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,444,706 UART: [afmc] --
3,445,659 UART: [cold-reset] --
3,446,317 UART: [state] Locking Datavault
3,447,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,194 UART: [state] Locking ICCM
3,448,676 UART: [exit] Launching FMC @ 0x40000130
3,454,006 UART:
3,454,022 UART: Running Caliptra FMC ...
3,454,430 UART:
3,454,573 UART: [state] CFI Enabled
3,465,085 UART: [fht] FMC Alias Private Key: 7
3,584,557 UART: [art] Extend RT PCRs Done
3,584,985 UART: [art] Lock RT PCRs Done
3,586,373 UART: [art] Populate DV Done
3,594,714 UART: [fht] FMC Alias Private Key: 7
3,595,662 UART: [art] Derive CDI
3,595,942 UART: [art] Store in slot 0x4
3,681,647 UART: [art] Derive Key Pair
3,682,007 UART: [art] Store priv key in slot 0x5
3,695,385 UART: [art] Derive Key Pair - Done
3,709,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,694 UART: [art] PUB.X = FA337444C73A018DB56201CDBDA29906B37BF1C84FEFF9CD8E0AB613F9A75AD64383057A95B04CF13C5514C7E0B9638E
3,732,461 UART: [art] PUB.Y = 485CE8311602928DCEAD362D855D4146BFA136286A69A9B8210854D48FB23FBD368C1DA649EB233DDB537504706F7A0C
3,739,401 UART: [art] SIG.R = CD939549A85A32C354D1AADF0E15C428B8BC05CCEE743FBCD43457FD21BE95C21B457FD19E2B936E3D9F334C22AD9440
3,746,181 UART: [art] SIG.S = 81DA4A2700147158CD284DF4836A0118BB0B35887FEEF27C0B8FDEF728B0FDC96E1C248AA8D20252CA93C63163EAB43B
3,770,103 UART: Caliptra RT
3,770,446 UART: [state] CFI Enabled
3,889,845 UART: [rt] RT listening for mailbox commands...
3,890,515 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,825 UART: [rt]cmd =0x41544d4e, len=14344
5,168,028 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,849 ready_for_fw is high
1,059,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,640 >>> mbox cmd response: success
3,291,255 UART:
3,291,271 UART: Running Caliptra FMC ...
3,291,679 UART:
3,291,822 UART: [state] CFI Enabled
3,302,416 UART: [fht] FMC Alias Private Key: 7
3,421,568 UART: [art] Extend RT PCRs Done
3,421,996 UART: [art] Lock RT PCRs Done
3,423,598 UART: [art] Populate DV Done
3,431,751 UART: [fht] FMC Alias Private Key: 7
3,432,721 UART: [art] Derive CDI
3,433,001 UART: [art] Store in slot 0x4
3,518,638 UART: [art] Derive Key Pair
3,518,998 UART: [art] Store priv key in slot 0x5
3,532,190 UART: [art] Derive Key Pair - Done
3,546,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,235 UART: [art] PUB.X = 90986E1F013CC073FCD299C09536F84858A66762031DB4B9E5D3505FE735FA34A80776B6059F38EBBF3E55A4BC2713B3
3,569,993 UART: [art] PUB.Y = FD0C1B0354683F255DF38F897360138D47C0C49D3E2D8359778A8F4410BFE23C09C2FCFC20EE935BC74B4DDCDC15E93D
3,576,946 UART: [art] SIG.R = 2F8D6B1DC9ECB25A32D20646CE8FFB967A2D359D315D9484C3C19FC9E35E173F48A807C7428E59CA09956A0A06C0F0C7
3,583,711 UART: [art] SIG.S = 00B648027CB56D23448E339E2F98F2A5A0A24DD31BA60FF44D9B072561352411592C8070DE32589998B2BF0BD9CE4042
3,608,075 UART: Caliptra RT
3,608,418 UART: [state] CFI Enabled
3,729,473 UART: [rt] RT listening for mailbox commands...
3,730,143 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,245 UART: [rt]cmd =0x41544d4e, len=14344
5,011,802 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
893,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,669 UART: [kat] ++
897,821 UART: [kat] sha1
902,123 UART: [kat] SHA2-256
904,063 UART: [kat] SHA2-384
906,652 UART: [kat] SHA2-512-ACC
908,553 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,664 UART: [kat] LMS
1,170,992 UART: [kat] --
1,171,949 UART: [cold-reset] ++
1,172,347 UART: [fht] FHT @ 0x50003400
1,175,022 UART: [idev] ++
1,175,190 UART: [idev] CDI.KEYID = 6
1,175,550 UART: [idev] SUBJECT.KEYID = 7
1,175,974 UART: [idev] UDS.KEYID = 0
1,176,319 ready_for_fw is high
1,176,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,656 UART: [idev] Erasing UDS.KEYID = 0
1,200,709 UART: [idev] Sha1 KeyId Algorithm
1,209,195 UART: [idev] --
1,210,271 UART: [ldev] ++
1,210,439 UART: [ldev] CDI.KEYID = 6
1,210,802 UART: [ldev] SUBJECT.KEYID = 5
1,211,228 UART: [ldev] AUTHORITY.KEYID = 7
1,211,691 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,151 UART: [ldev] --
1,282,474 UART: [fwproc] Wait for Commands...
1,283,224 UART: [fwproc] Recv command 0x46574c44
1,283,952 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,148 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,645 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,146 >>> mbox cmd response: success
3,372,176 UART: [afmc] ++
3,372,344 UART: [afmc] CDI.KEYID = 6
3,372,706 UART: [afmc] SUBJECT.KEYID = 7
3,373,131 UART: [afmc] AUTHORITY.KEYID = 5
3,409,032 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,507 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,255 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,961 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,840 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,550 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,461 UART: [afmc] --
3,452,437 UART: [cold-reset] --
3,453,251 UART: [state] Locking Datavault
3,454,594 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,198 UART: [state] Locking ICCM
3,455,650 UART: [exit] Launching FMC @ 0x40000130
3,460,980 UART:
3,460,996 UART: Running Caliptra FMC ...
3,461,404 UART:
3,461,458 UART: [state] CFI Enabled
3,471,856 UART: [fht] FMC Alias Private Key: 7
3,590,662 UART: [art] Extend RT PCRs Done
3,591,090 UART: [art] Lock RT PCRs Done
3,592,554 UART: [art] Populate DV Done
3,600,885 UART: [fht] FMC Alias Private Key: 7
3,601,951 UART: [art] Derive CDI
3,602,231 UART: [art] Store in slot 0x4
3,688,114 UART: [art] Derive Key Pair
3,688,474 UART: [art] Store priv key in slot 0x5
3,701,642 UART: [art] Derive Key Pair - Done
3,716,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,781 UART: [art] PUB.X = 9CC5B9388C4C16B328B0685277FA7A741E628E85D2A5CEC0916315067A43D9D10248904E20501A7FA61CAA846FEFDAE4
3,739,549 UART: [art] PUB.Y = 5694A108EC5EBE73D8150ABA66936BE4875E7210B405864F829E2391E59824BE08DBD48EB0AA5F8B1406639FAD1F8F94
3,746,488 UART: [art] SIG.R = 8BD60143C405056C66DEA5F55C8BB3208FEE018CD3065134C03BE3CC92371A67F86822ED7AED2B7F6E37CE52A0A816A1
3,753,253 UART: [art] SIG.S = A59C3C4F48CC3DA4FAFDF7884550E9272779844BD2E08667C826BD9750A429CC2D769AF9AE3CDD546AC1B3FA841CDEB9
3,777,251 UART: Caliptra RT
3,777,502 UART: [state] CFI Enabled
3,896,777 UART: [rt] RT listening for mailbox commands...
3,897,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,237 UART: [rt]cmd =0x41544d4e, len=14344
5,179,226 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 ready_for_fw is high
1,060,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,038 >>> mbox cmd response: success
3,282,167 UART:
3,282,183 UART: Running Caliptra FMC ...
3,282,591 UART:
3,282,645 UART: [state] CFI Enabled
3,293,031 UART: [fht] FMC Alias Private Key: 7
3,411,967 UART: [art] Extend RT PCRs Done
3,412,395 UART: [art] Lock RT PCRs Done
3,413,803 UART: [art] Populate DV Done
3,422,014 UART: [fht] FMC Alias Private Key: 7
3,423,126 UART: [art] Derive CDI
3,423,406 UART: [art] Store in slot 0x4
3,509,309 UART: [art] Derive Key Pair
3,509,669 UART: [art] Store priv key in slot 0x5
3,522,863 UART: [art] Derive Key Pair - Done
3,537,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,197 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,962 UART: [art] PUB.X = AE2CC9BAFAA5267E7E34A229CA00365EA876288706540CE6EC947C581AC1CFAEAE60A4DD2955F26A796073430404B173
3,560,706 UART: [art] PUB.Y = 02FA1A066B5804196A67935442A69EC98F8A7C928457A362B3246BB9A191DF81FD164F39BF841DE9FDDD763EAF0BAE73
3,567,652 UART: [art] SIG.R = E5C6F4B8E13C42519BB81F57D4AAD81145CA95BD4E4DFE76F70297590B24157ED9B36F7F1871407F2574071EE03316B1
3,574,415 UART: [art] SIG.S = 07C97DAFF173F0BA3EF34CCB0DB4D9BCAF46A885DED68E8F1E7614A8BCF1470F5B98ADA562D0792EA8D19E71F5FD8AD6
3,598,102 UART: Caliptra RT
3,598,353 UART: [state] CFI Enabled
3,718,765 UART: [rt] RT listening for mailbox commands...
3,719,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,543 UART: [rt]cmd =0x41544d4e, len=14344
5,017,404 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,493 UART: [state] LifecycleState = Unprovisioned
86,148 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,366 UART: [kat] SHA2-256
904,306 UART: [kat] SHA2-384
906,895 UART: [kat] SHA2-512-ACC
908,796 UART: [kat] ECC-384
918,845 UART: [kat] HMAC-384Kdf
923,335 UART: [kat] LMS
1,171,663 UART: [kat] --
1,172,616 UART: [cold-reset] ++
1,173,058 UART: [fht] FHT @ 0x50003400
1,175,785 UART: [idev] ++
1,175,953 UART: [idev] CDI.KEYID = 6
1,176,313 UART: [idev] SUBJECT.KEYID = 7
1,176,737 UART: [idev] UDS.KEYID = 0
1,177,082 ready_for_fw is high
1,177,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,349 UART: [idev] Erasing UDS.KEYID = 0
1,202,464 UART: [idev] Sha1 KeyId Algorithm
1,210,732 UART: [idev] --
1,211,852 UART: [ldev] ++
1,212,020 UART: [ldev] CDI.KEYID = 6
1,212,383 UART: [ldev] SUBJECT.KEYID = 5
1,212,809 UART: [ldev] AUTHORITY.KEYID = 7
1,213,272 UART: [ldev] FE.KEYID = 1
1,218,656 UART: [ldev] Erasing FE.KEYID = 1
1,245,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,564 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,797 UART: [fwproc] Recv command 0x46574c44
1,285,525 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,044 >>> mbox cmd response: success
3,369,238 UART: [afmc] ++
3,369,406 UART: [afmc] CDI.KEYID = 6
3,369,768 UART: [afmc] SUBJECT.KEYID = 7
3,370,193 UART: [afmc] AUTHORITY.KEYID = 5
3,405,562 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,429 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,177 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,883 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,762 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,472 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,235 UART: [afmc] --
3,448,209 UART: [cold-reset] --
3,448,939 UART: [state] Locking Datavault
3,450,034 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,638 UART: [state] Locking ICCM
3,451,122 UART: [exit] Launching FMC @ 0x40000130
3,456,452 UART:
3,456,468 UART: Running Caliptra FMC ...
3,456,876 UART:
3,457,019 UART: [state] CFI Enabled
3,467,853 UART: [fht] FMC Alias Private Key: 7
3,587,195 UART: [art] Extend RT PCRs Done
3,587,623 UART: [art] Lock RT PCRs Done
3,589,299 UART: [art] Populate DV Done
3,597,426 UART: [fht] FMC Alias Private Key: 7
3,598,596 UART: [art] Derive CDI
3,598,876 UART: [art] Store in slot 0x4
3,684,429 UART: [art] Derive Key Pair
3,684,789 UART: [art] Store priv key in slot 0x5
3,698,375 UART: [art] Derive Key Pair - Done
3,713,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,412 UART: [art] PUB.X = 3530AF5228912143A6512C39E71A856344D43923D52DF5FCA53F8CBAB688123A4C8C1D5F01521495F5CDD23075918238
3,736,171 UART: [art] PUB.Y = 942B724FC90CB01A3BC7F4B8F631F7BBD3FA4F41638250A7535D0993872EB48869068ABBA12FA9324934F6D161A6983D
3,743,114 UART: [art] SIG.R = F1862308A7BF6D434941D0137946C7F2222FB444B5D3269EF3D4A747CC1FB5BCF86A8E1101E8FE48DB67844FBADA7A17
3,749,888 UART: [art] SIG.S = 28EC7E54E5D76EC4E6CADDEF8632EB55912A900E6CE1B34370BD09972493F9FC27D0799A213A14A97E594FCF62C109A8
3,773,895 UART: Caliptra RT
3,774,238 UART: [state] CFI Enabled
3,893,858 UART: [rt] RT listening for mailbox commands...
3,894,528 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,638 UART: [rt]cmd =0x41544d4e, len=14344
5,168,714 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
91316139 cb0a2c23 3ba05390 27f59437 546a1286 c208d658 93040b4c 2fbad081 7cb14398 cd31aa20 23406c24 1a96e9eb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,354 ready_for_fw is high
1,061,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,800 >>> mbox cmd response: success
3,289,351 UART:
3,289,367 UART: Running Caliptra FMC ...
3,289,775 UART:
3,289,918 UART: [state] CFI Enabled
3,300,206 UART: [fht] FMC Alias Private Key: 7
3,419,620 UART: [art] Extend RT PCRs Done
3,420,048 UART: [art] Lock RT PCRs Done
3,421,672 UART: [art] Populate DV Done
3,430,001 UART: [fht] FMC Alias Private Key: 7
3,430,971 UART: [art] Derive CDI
3,431,251 UART: [art] Store in slot 0x4
3,517,000 UART: [art] Derive Key Pair
3,517,360 UART: [art] Store priv key in slot 0x5
3,530,298 UART: [art] Derive Key Pair - Done
3,544,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,923 UART: [art] PUB.X = 06C8FE0C8A24410BB5B1BAF383A9E6F717F2121BC8C0FFA5076F8DED3A5ABD9A38E3F6128CE865822214B6448AECE996
3,567,697 UART: [art] PUB.Y = 4E57ADBBDD7ED2E1D3A978DF338DE57E636238FCB27AFB9147D3DCEBCEA1475134CAC5A5E7DAC5E6072C5D52BB0CFFD2
3,574,675 UART: [art] SIG.R = 0099450A18D23304FE55FED66AF5DC420BABE8BD1B815A3CDCED346024D5783E13C3152B87395A574373B3802C723FC1
3,581,418 UART: [art] SIG.S = F85A1CF569FE9FDC5974FAD7848BCCA65F7A4563DEF5C13A9D68E8A8E861CDDF30C9740FC44EC74B719182041391C99A
3,605,236 UART: Caliptra RT
3,605,579 UART: [state] CFI Enabled
3,726,258 UART: [rt] RT listening for mailbox commands...
3,726,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,952 UART: [rt]cmd =0x41544d4e, len=14344
5,013,955 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_ignore_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,241 UART:
192,607 UART: Running Caliptra ROM ...
193,796 UART:
193,952 UART: [state] CFI Enabled
265,483 UART: [state] LifecycleState = Unprovisioned
267,462 UART: [state] DebugLocked = No
269,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,634 UART: [kat] SHA2-256
445,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,876 UART: [kat] ++
456,357 UART: [kat] sha1
465,742 UART: [kat] SHA2-256
468,467 UART: [kat] SHA2-384
474,014 UART: [kat] SHA2-512-ACC
476,434 UART: [kat] ECC-384
2,768,089 UART: [kat] HMAC-384Kdf
2,799,003 UART: [kat] LMS
3,989,280 UART: [kat] --
3,993,371 UART: [cold-reset] ++
3,995,920 UART: [fht] Storing FHT @ 0x50003400
4,008,046 UART: [idev] ++
4,008,622 UART: [idev] CDI.KEYID = 6
4,009,510 UART: [idev] SUBJECT.KEYID = 7
4,010,760 UART: [idev] UDS.KEYID = 0
4,011,719 ready_for_fw is high
4,011,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,979 UART: [idev] Erasing UDS.KEYID = 0
7,345,949 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,481 UART: [idev] --
7,371,942 UART: [ldev] ++
7,372,580 UART: [ldev] CDI.KEYID = 6
7,373,493 UART: [ldev] SUBJECT.KEYID = 5
7,374,729 UART: [ldev] AUTHORITY.KEYID = 7
7,375,964 UART: [ldev] FE.KEYID = 1
7,422,855 UART: [ldev] Erasing FE.KEYID = 1
10,754,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,949 UART: [ldev] --
13,116,169 UART: [fwproc] Waiting for Commands...
13,119,439 UART: [fwproc] Received command 0x46574c44
13,121,626 UART: [fwproc] Received Image of size 118548 bytes
21,578,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,658,037 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,731,168 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,059,216 >>> mbox cmd response: success
22,062,719 UART: [afmc] ++
22,063,325 UART: [afmc] CDI.KEYID = 6
22,064,243 UART: [afmc] SUBJECT.KEYID = 7
22,065,464 UART: [afmc] AUTHORITY.KEYID = 5
25,419,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,718,893 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,721,147 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,735,668 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,750,448 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,764,834 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,786,023 UART: [afmc] --
27,789,734 UART: [cold-reset] --
27,794,728 UART: [state] Locking Datavault
27,798,570 UART: [state] Locking PCR0, PCR1 and PCR31
27,800,323 UART: [state] Locking ICCM
27,801,661 UART: [exit] Launching FMC @ 0x40000130
27,810,022 UART:
27,810,262 UART: Running Caliptra FMC ...
27,811,365 UART:
27,811,526 UART: [state] CFI Enabled
27,878,685 UART: [fht] FMC Alias Private Key: 7
30,218,737 UART: [art] Extend RT PCRs Done
30,219,972 UART: [art] Lock RT PCRs Done
30,221,683 UART: [art] Populate DV Done
30,227,094 UART: [fht] FMC Alias Private Key: 7
30,228,641 UART: [art] Derive CDI
30,229,457 UART: [art] Store in slot 0x4
30,287,205 UART: [art] Derive Key Pair
30,288,250 UART: [art] Store priv key in slot 0x5
33,580,551 UART: [art] Derive Key Pair - Done
33,593,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,883,048 UART: [art] Erasing AUTHORITY.KEYID = 7
35,884,582 UART: [art] PUB.X = E410B412D89F5B30D3611E5F430A74E4DC47111B408466791857BC27436C52DF962E13CFF2C91DB460F3D69C273F15C8
35,891,830 UART: [art] PUB.Y = 6658B0FE24FFAFB02C5104F51725E8553B71438C65F3DF6024DB6CDC3EE73395B6EFC6695D14C778E79957312FBA1994
35,899,071 UART: [art] SIG.R = 959EB0381787A6F2F946D7B0FB895CD161FD5E723251CF8C5C70B96CF2348DF8EF0F0D2E7334A57CCC73D1125AF99A22
35,906,463 UART: [art] SIG.S = 1B12C8BD0071AF8539F463416998804F7E814A694F38E7A13FEE2E6FF23F6583FAA2FF123E7F68649BF7D3575EA3413A
37,211,974 UART: Caliptra RT
37,212,682 UART: [state] CFI Enabled
37,389,313 UART: [rt] RT listening for mailbox commands...
37,391,923 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,547,215 UART: [rt]cmd =0x41544d4e, len=14344
37,549,197 >>> mbox cmd response: failed
37,549,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,705,304 UART: [rt]cmd =0x41544d4e, len=14344
37,706,896 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,784,206 ready_for_fw is high
3,784,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,935,586 >>> mbox cmd response: success
27,622,910 UART:
27,623,305 UART: Running Caliptra FMC ...
27,624,512 UART:
27,624,688 UART: [state] CFI Enabled
27,689,942 UART: [fht] FMC Alias Private Key: 7
30,030,514 UART: [art] Extend RT PCRs Done
30,031,744 UART: [art] Lock RT PCRs Done
30,033,491 UART: [art] Populate DV Done
30,039,149 UART: [fht] FMC Alias Private Key: 7
30,040,818 UART: [art] Derive CDI
30,041,641 UART: [art] Store in slot 0x4
30,098,419 UART: [art] Derive Key Pair
30,099,443 UART: [art] Store priv key in slot 0x5
33,392,456 UART: [art] Derive Key Pair - Done
33,405,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,693,962 UART: [art] Erasing AUTHORITY.KEYID = 7
35,695,470 UART: [art] PUB.X = 38A7B843A8EFB74A47994F824DFDBE241C7AC2D8BCE112628702EA48C3F38645BBE41DBF4250B53FEB68F0268BACD7D0
35,702,724 UART: [art] PUB.Y = AF1564B898E0AF5330B375380E073C37F1278DE5E2318B262911505B5B8688A6BA2AFE0C0661D332531F4E061BA390B3
35,709,963 UART: [art] SIG.R = FCED49FBEEF08A7D8F72521F4660DADDE081ABBF0664057569A5C2D6E8831C8EB8349F10B0C4ACD1A71075EFF1DDF536
35,717,352 UART: [art] SIG.S = CFD1E0DD29C8978D8B4F939948095562BDEA154980653938F9464827264455717C7FE23C25233C3BD9F899A7CF7C2B07
37,023,014 UART: Caliptra RT
37,023,726 UART: [state] CFI Enabled
37,198,575 UART: [rt] RT listening for mailbox commands...
37,201,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,356,595 UART: [rt]cmd =0x41544d4e, len=14344
37,358,469 >>> mbox cmd response: failed
37,359,422 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,514,425 UART: [rt]cmd =0x41544d4e, len=14344
37,516,188 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
192,467 UART:
192,853 UART: Running Caliptra ROM ...
194,061 UART:
603,517 UART: [state] CFI Enabled
617,267 UART: [state] LifecycleState = Unprovisioned
619,331 UART: [state] DebugLocked = No
622,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,990 UART: [kat] SHA2-256
796,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,278 UART: [kat] ++
807,719 UART: [kat] sha1
819,655 UART: [kat] SHA2-256
822,367 UART: [kat] SHA2-384
829,415 UART: [kat] SHA2-512-ACC
831,787 UART: [kat] ECC-384
3,116,420 UART: [kat] HMAC-384Kdf
3,126,941 UART: [kat] LMS
4,317,107 UART: [kat] --
4,321,292 UART: [cold-reset] ++
4,322,661 UART: [fht] Storing FHT @ 0x50003400
4,334,419 UART: [idev] ++
4,334,990 UART: [idev] CDI.KEYID = 6
4,335,972 UART: [idev] SUBJECT.KEYID = 7
4,337,213 UART: [idev] UDS.KEYID = 0
4,338,273 ready_for_fw is high
4,338,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,335 UART: [idev] Erasing UDS.KEYID = 0
7,623,115 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,554 UART: [idev] --
7,648,767 UART: [ldev] ++
7,649,335 UART: [ldev] CDI.KEYID = 6
7,650,298 UART: [ldev] SUBJECT.KEYID = 5
7,651,504 UART: [ldev] AUTHORITY.KEYID = 7
7,652,786 UART: [ldev] FE.KEYID = 1
7,663,135 UART: [ldev] Erasing FE.KEYID = 1
10,955,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,518 UART: [ldev] --
13,316,722 UART: [fwproc] Waiting for Commands...
13,319,781 UART: [fwproc] Received command 0x46574c44
13,322,013 UART: [fwproc] Received Image of size 118548 bytes
22,556,657 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,637,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,710,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,038,481 >>> mbox cmd response: success
23,042,665 UART: [afmc] ++
23,043,287 UART: [afmc] CDI.KEYID = 6
23,044,227 UART: [afmc] SUBJECT.KEYID = 7
23,045,447 UART: [afmc] AUTHORITY.KEYID = 5
26,361,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,656,023 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,658,335 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,672,806 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,687,588 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,702,019 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,723,167 UART: [afmc] --
28,726,599 UART: [cold-reset] --
28,729,968 UART: [state] Locking Datavault
28,734,232 UART: [state] Locking PCR0, PCR1 and PCR31
28,735,978 UART: [state] Locking ICCM
28,737,198 UART: [exit] Launching FMC @ 0x40000130
28,745,589 UART:
28,745,818 UART: Running Caliptra FMC ...
28,746,930 UART:
28,747,088 UART: [state] CFI Enabled
28,755,322 UART: [fht] FMC Alias Private Key: 7
31,095,744 UART: [art] Extend RT PCRs Done
31,096,979 UART: [art] Lock RT PCRs Done
31,098,714 UART: [art] Populate DV Done
31,104,287 UART: [fht] FMC Alias Private Key: 7
31,105,832 UART: [art] Derive CDI
31,106,643 UART: [art] Store in slot 0x4
31,149,018 UART: [art] Derive Key Pair
31,150,015 UART: [art] Store priv key in slot 0x5
34,392,085 UART: [art] Derive Key Pair - Done
34,405,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,684,855 UART: [art] Erasing AUTHORITY.KEYID = 7
36,686,361 UART: [art] PUB.X = 20402E2478005AF8682F690541C8F126E173C8C58D7C592AA437F58379F7CFAF86A090E7FD7CAAA916D1654FF9FB6A69
36,693,604 UART: [art] PUB.Y = 07A9A8372AA3CEB53B23A44C6292CE62A7E48AF8A7A4E4DF7ED30F2E6B4D60EB5C03DA2934067141AF895EDC3525C5CF
36,700,875 UART: [art] SIG.R = E4991E884821D7FD5A27E900F0AE72C3C42875B97F14A8C513E395E99B07C97AD462FD79F4A9EBC4D51F9234B04979C7
36,708,282 UART: [art] SIG.S = F0BAA42B0CA28C27F8C7650BE3D5DFA58884B56CDE4252D025FD8FD3D74A959EA5A6328D8499F91E3FA94982FB529B0A
38,013,050 UART: Caliptra RT
38,013,772 UART: [state] CFI Enabled
38,147,605 UART: [rt] RT listening for mailbox commands...
38,150,011 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,305,454 UART: [rt]cmd =0x41544d4e, len=14344
38,307,162 >>> mbox cmd response: failed
38,307,934 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,463,137 UART: [rt]cmd =0x41544d4e, len=14344
38,464,884 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
4,128,633 ready_for_fw is high
4,129,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,943,927 >>> mbox cmd response: success
27,581,484 UART:
27,581,901 UART: Running Caliptra FMC ...
27,583,037 UART:
27,583,195 UART: [state] CFI Enabled
27,591,400 UART: [fht] FMC Alias Private Key: 7
29,931,219 UART: [art] Extend RT PCRs Done
29,932,442 UART: [art] Lock RT PCRs Done
29,933,952 UART: [art] Populate DV Done
29,939,418 UART: [fht] FMC Alias Private Key: 7
29,941,063 UART: [art] Derive CDI
29,941,869 UART: [art] Store in slot 0x4
29,984,417 UART: [art] Derive Key Pair
29,985,461 UART: [art] Store priv key in slot 0x5
33,227,508 UART: [art] Derive Key Pair - Done
33,240,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,520,917 UART: [art] Erasing AUTHORITY.KEYID = 7
35,522,426 UART: [art] PUB.X = D97FA43BCE56F5C4C063D08CE5EDA6A0B5C3A6C649B124157575BD3B45AAB7A15F3ED4CB9409DD58F6CB3812891E7A06
35,529,733 UART: [art] PUB.Y = 28D5596B951717502B2CE8D45195642861E4F96BB64BCC566A9183A53B627EF777B397727D51F72D003EA9F427B64C73
35,536,912 UART: [art] SIG.R = 8515FDB1355DA8DB35C103473CA0C2F41F7D548B120FDC57EA98E31CBAEA0F84577E742A9C5BE5BE48D9030D742CA0F1
35,544,299 UART: [art] SIG.S = 58FF02766CC142A2BD253B721F427CF6023470BDA68E6B2955A97E4F9A1F7ECC356AE39EF2F9483CA276BDC49E0C8A3C
36,849,225 UART: Caliptra RT
36,849,917 UART: [state] CFI Enabled
36,983,235 UART: [rt] RT listening for mailbox commands...
36,985,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,141,046 UART: [rt]cmd =0x41544d4e, len=14344
37,143,027 >>> mbox cmd response: failed
37,143,884 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,299,631 UART: [rt]cmd =0x41544d4e, len=14344
37,301,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,870 writing to cptra_bootfsm_go
191,918 UART:
192,293 UART: Running Caliptra ROM ...
193,384 UART:
193,524 UART: [state] CFI Enabled
263,582 UART: [state] LifecycleState = Unprovisioned
265,491 UART: [state] DebugLocked = No
268,073 UART: [state] WD Timer not started. Device not locked for debugging
271,261 UART: [kat] SHA2-256
450,951 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,694 UART: [kat] ++
462,221 UART: [kat] sha1
474,582 UART: [kat] SHA2-256
477,299 UART: [kat] SHA2-384
482,936 UART: [kat] SHA2-512-ACC
485,296 UART: [kat] ECC-384
2,946,270 UART: [kat] HMAC-384Kdf
2,969,812 UART: [kat] LMS
3,446,342 UART: [kat] --
3,448,496 UART: [cold-reset] ++
3,449,994 UART: [fht] FHT @ 0x50003400
3,460,533 UART: [idev] ++
3,461,100 UART: [idev] CDI.KEYID = 6
3,462,126 UART: [idev] SUBJECT.KEYID = 7
3,463,294 UART: [idev] UDS.KEYID = 0
3,464,230 ready_for_fw is high
3,464,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,613,489 UART: [idev] Erasing UDS.KEYID = 0
5,984,584 UART: [idev] Sha1 KeyId Algorithm
6,008,898 UART: [idev] --
6,015,056 UART: [ldev] ++
6,015,635 UART: [ldev] CDI.KEYID = 6
6,016,545 UART: [ldev] SUBJECT.KEYID = 5
6,017,756 UART: [ldev] AUTHORITY.KEYID = 7
6,019,063 UART: [ldev] FE.KEYID = 1
6,056,624 UART: [ldev] Erasing FE.KEYID = 1
8,562,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,398 UART: [ldev] --
10,371,249 UART: [fwproc] Wait for Commands...
10,373,699 UART: [fwproc] Recv command 0x46574c44
10,375,741 UART: [fwproc] Recv'd Img size: 118548 bytes
14,923,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,007,188 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,080,234 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,407,775 >>> mbox cmd response: success
15,411,343 UART: [afmc] ++
15,411,981 UART: [afmc] CDI.KEYID = 6
15,412,895 UART: [afmc] SUBJECT.KEYID = 7
15,414,111 UART: [afmc] AUTHORITY.KEYID = 5
17,939,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,663,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,665,567 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,681,414 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,697,342 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,713,052 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,737,368 UART: [afmc] --
19,741,511 UART: [cold-reset] --
19,747,205 UART: [state] Locking Datavault
19,753,848 UART: [state] Locking PCR0, PCR1 and PCR31
19,755,547 UART: [state] Locking ICCM
19,757,774 UART: [exit] Launching FMC @ 0x40000130
19,766,215 UART:
19,766,467 UART: Running Caliptra FMC ...
19,767,567 UART:
19,767,730 UART: [state] CFI Enabled
19,820,576 UART: [fht] FMC Alias Private Key: 7
21,607,938 UART: [art] Extend RT PCRs Done
21,609,160 UART: [art] Lock RT PCRs Done
21,610,892 UART: [art] Populate DV Done
21,616,410 UART: [fht] FMC Alias Private Key: 7
21,618,114 UART: [art] Derive CDI
21,618,926 UART: [art] Store in slot 0x4
21,674,449 UART: [art] Derive Key Pair
21,675,483 UART: [art] Store priv key in slot 0x5
24,138,673 UART: [art] Derive Key Pair - Done
24,151,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,863,730 UART: [art] Erasing AUTHORITY.KEYID = 7
25,865,238 UART: [art] PUB.X = 5ABA9A543A32A4966EE96595CE2C6C4B69AF75919D7EFBBCDEA4A41996E01C821401E612E82F3219B94A738C207646AC
25,872,504 UART: [art] PUB.Y = 2E7167773630703707B6F14CAE38C254DEB49FCDAAC2F8B4B420966A41C4EB22CFC6DD8F4A633934CB972479A0703347
25,879,743 UART: [art] SIG.R = 09DDCB913BAE958C80C61463FBC76BE2D3DC62720A6615DE31DC1B6F73F5CD5BC4C3BF8D0DC4E9D0DD38BDBFDD281A48
25,887,226 UART: [art] SIG.S = 31C775484CB846BCD5688C4FF042E2C6B2842FE6587F7321481E0DEA4B77617C1F64A0A60BCAB5DB9B3B2977379E22B2
26,866,080 UART: Caliptra RT
26,866,802 UART: [state] CFI Enabled
27,047,416 UART: [rt] RT listening for mailbox commands...
27,049,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,543 UART: [rt]cmd =0x41544d4e, len=14344
27,207,561 >>> mbox cmd response: failed
27,208,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,363,503 UART: [rt]cmd =0x41544d4e, len=14344
27,365,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,460,775 ready_for_fw is high
3,461,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,369,893 >>> mbox cmd response: success
19,666,678 UART:
19,667,100 UART: Running Caliptra FMC ...
19,668,232 UART:
19,668,390 UART: [state] CFI Enabled
19,735,181 UART: [fht] FMC Alias Private Key: 7
21,501,299 UART: [art] Extend RT PCRs Done
21,502,537 UART: [art] Lock RT PCRs Done
21,504,276 UART: [art] Populate DV Done
21,509,430 UART: [fht] FMC Alias Private Key: 7
21,510,919 UART: [art] Derive CDI
21,511,677 UART: [art] Store in slot 0x4
21,567,635 UART: [art] Derive Key Pair
21,568,648 UART: [art] Store priv key in slot 0x5
24,032,175 UART: [art] Derive Key Pair - Done
24,044,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,758,656 UART: [art] Erasing AUTHORITY.KEYID = 7
25,760,178 UART: [art] PUB.X = 108904BB857908A51CFCF29247C73814BF86E4D74C46D5459C3896F1588A9A83913EAE8185989180629D87504E31328A
25,767,385 UART: [art] PUB.Y = 7BB529C0C683FAFF6A77CE2011FF5547E474C7AF3D5C11C46A61C58F5DB5E53C5B8C686501CBE5247ECD59DF23F2F315
25,774,681 UART: [art] SIG.R = C637F4ED268EF0E370B975E9C2EB75E9AECE7FDAD7A0248F965B4F7F7E092C1539C4691391EDF23DC15D9018A11DE110
25,782,071 UART: [art] SIG.S = 60F2EA5E2D7F4D47AB8133169A291966E72BC82FB913E06AF525BD574EFEC282555D239573118E5D59801012B6C7E206
26,760,781 UART: Caliptra RT
26,761,489 UART: [state] CFI Enabled
26,942,777 UART: [rt] RT listening for mailbox commands...
26,945,648 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,100,913 UART: [rt]cmd =0x41544d4e, len=14344
27,102,555 >>> mbox cmd response: failed
27,103,278 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,258,593 UART: [rt]cmd =0x41544d4e, len=14344
27,260,411 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,481 UART:
192,842 UART: Running Caliptra ROM ...
193,944 UART:
603,505 UART: [state] CFI Enabled
618,886 UART: [state] LifecycleState = Unprovisioned
620,822 UART: [state] DebugLocked = No
622,412 UART: [state] WD Timer not started. Device not locked for debugging
627,011 UART: [kat] SHA2-256
806,716 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,457 UART: [kat] ++
817,900 UART: [kat] sha1
828,419 UART: [kat] SHA2-256
831,145 UART: [kat] SHA2-384
836,815 UART: [kat] SHA2-512-ACC
839,150 UART: [kat] ECC-384
3,280,451 UART: [kat] HMAC-384Kdf
3,292,903 UART: [kat] LMS
3,769,413 UART: [kat] --
3,773,501 UART: [cold-reset] ++
3,775,792 UART: [fht] FHT @ 0x50003400
3,788,049 UART: [idev] ++
3,788,629 UART: [idev] CDI.KEYID = 6
3,789,541 UART: [idev] SUBJECT.KEYID = 7
3,790,794 UART: [idev] UDS.KEYID = 0
3,791,740 ready_for_fw is high
3,791,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,798 UART: [idev] Erasing UDS.KEYID = 0
6,269,327 UART: [idev] Sha1 KeyId Algorithm
6,292,319 UART: [idev] --
6,298,668 UART: [ldev] ++
6,299,306 UART: [ldev] CDI.KEYID = 6
6,300,217 UART: [ldev] SUBJECT.KEYID = 5
6,301,376 UART: [ldev] AUTHORITY.KEYID = 7
6,302,663 UART: [ldev] FE.KEYID = 1
6,314,445 UART: [ldev] Erasing FE.KEYID = 1
8,791,672 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,812 UART: [ldev] --
10,583,722 UART: [fwproc] Wait for Commands...
10,586,522 UART: [fwproc] Recv command 0x46574c44
10,588,508 UART: [fwproc] Recv'd Img size: 118548 bytes
15,125,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,214,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,287,369 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,615,510 >>> mbox cmd response: success
15,619,414 UART: [afmc] ++
15,620,056 UART: [afmc] CDI.KEYID = 6
15,620,941 UART: [afmc] SUBJECT.KEYID = 7
15,622,217 UART: [afmc] AUTHORITY.KEYID = 5
18,125,537 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,845,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,848,144 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,864,024 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,879,939 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,895,652 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,919,554 UART: [afmc] --
19,923,428 UART: [cold-reset] --
19,928,209 UART: [state] Locking Datavault
19,935,723 UART: [state] Locking PCR0, PCR1 and PCR31
19,937,430 UART: [state] Locking ICCM
19,940,066 UART: [exit] Launching FMC @ 0x40000130
19,948,469 UART:
19,948,706 UART: Running Caliptra FMC ...
19,949,810 UART:
19,949,971 UART: [state] CFI Enabled
19,957,909 UART: [fht] FMC Alias Private Key: 7
21,723,127 UART: [art] Extend RT PCRs Done
21,724,344 UART: [art] Lock RT PCRs Done
21,725,802 UART: [art] Populate DV Done
21,731,131 UART: [fht] FMC Alias Private Key: 7
21,732,727 UART: [art] Derive CDI
21,733,542 UART: [art] Store in slot 0x4
21,776,356 UART: [art] Derive Key Pair
21,777,355 UART: [art] Store priv key in slot 0x5
24,203,902 UART: [art] Derive Key Pair - Done
24,217,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,923,730 UART: [art] Erasing AUTHORITY.KEYID = 7
25,925,233 UART: [art] PUB.X = C92885229D84AD51BF0FAC99286921982D0D07BF615EC410EE91800F4775FCC3B3BF17197A358DE2A70E31E6DE46B0E1
25,932,533 UART: [art] PUB.Y = E5C97819DABC4217B2F416A47C4AA215F57910B0CE5DA32E9AAA3695476F83373242EE431B9AFA35AFC372BBEF94FF3F
25,939,826 UART: [art] SIG.R = 0EA7AA2F43CB649F2E3ABD75A8A584F23FAEB0D520C8739DB2796652B608ECAFEB7341C1764CC7B24693EFD14ECCE5DA
25,947,220 UART: [art] SIG.S = 1571252EE02A73731B4787C5858C5A94581C6C80B551396357210E26DA7D8FB1F585E22059768595D8623E68F26C2D08
26,926,659 UART: Caliptra RT
26,927,367 UART: [state] CFI Enabled
27,060,744 UART: [rt] RT listening for mailbox commands...
27,063,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,218,623 UART: [rt]cmd =0x41544d4e, len=14344
27,220,384 >>> mbox cmd response: failed
27,221,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,376,411 UART: [rt]cmd =0x41544d4e, len=14344
27,378,437 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
3,777,607 ready_for_fw is high
3,777,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,614,525 >>> mbox cmd response: success
19,873,664 UART:
19,874,050 UART: Running Caliptra FMC ...
19,875,253 UART:
19,875,425 UART: [state] CFI Enabled
19,883,339 UART: [fht] FMC Alias Private Key: 7
21,649,521 UART: [art] Extend RT PCRs Done
21,650,746 UART: [art] Lock RT PCRs Done
21,652,215 UART: [art] Populate DV Done
21,657,741 UART: [fht] FMC Alias Private Key: 7
21,659,340 UART: [art] Derive CDI
21,660,162 UART: [art] Store in slot 0x4
21,702,497 UART: [art] Derive Key Pair
21,703,544 UART: [art] Store priv key in slot 0x5
24,129,801 UART: [art] Derive Key Pair - Done
24,142,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,849,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,850,715 UART: [art] PUB.X = 51A80AF70899640FAB6B60BCFE589BF0B1D807C04F11F861804BA27AE0821A0694FD1809BCF56E0E87103645F487D257
25,857,966 UART: [art] PUB.Y = B801B47C1955BCF0B217E5ED76371BA5C4A04D9C3DDAFF4FF5156F5FD174081B49CD9E324A88CD638B415F584586C9FB
25,865,226 UART: [art] SIG.R = 878340B048E21CFA31E3B366C456134C081B2D5E31DDE1FD4B116A803B4C79F7BC20661402B60B6318CD3C80227C9B70
25,872,635 UART: [art] SIG.S = AF399F13CA0126A192EC0A611A9DE356C220726E8FFE4C0F70C78CBF320450A2959714FFFA2ADFC572CAD94E8225C0CD
26,851,480 UART: Caliptra RT
26,852,186 UART: [state] CFI Enabled
26,985,021 UART: [rt] RT listening for mailbox commands...
26,987,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,143,127 UART: [rt]cmd =0x41544d4e, len=14344
27,144,931 >>> mbox cmd response: failed
27,145,704 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,300,958 UART: [rt]cmd =0x41544d4e, len=14344
27,302,819 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,040 UART:
192,393 UART: Running Caliptra ROM ...
193,577 UART:
193,728 UART: [state] CFI Enabled
265,937 UART: [state] LifecycleState = Unprovisioned
268,343 UART: [state] DebugLocked = No
270,296 UART: [state] WD Timer not started. Device not locked for debugging
275,540 UART: [kat] SHA2-256
465,386 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,206 UART: [kat] ++
476,689 UART: [kat] sha1
487,520 UART: [kat] SHA2-256
490,524 UART: [kat] SHA2-384
496,374 UART: [kat] SHA2-512-ACC
498,974 UART: [kat] ECC-384
2,949,909 UART: [kat] HMAC-384Kdf
2,973,377 UART: [kat] LMS
3,505,128 UART: [kat] --
3,509,330 UART: [cold-reset] ++
3,510,190 UART: [fht] FHT @ 0x50003400
3,522,165 UART: [idev] ++
3,522,868 UART: [idev] CDI.KEYID = 6
3,523,897 UART: [idev] SUBJECT.KEYID = 7
3,525,063 UART: [idev] UDS.KEYID = 0
3,525,988 ready_for_fw is high
3,526,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,210 UART: [idev] Erasing UDS.KEYID = 0
6,027,992 UART: [idev] Sha1 KeyId Algorithm
6,050,845 UART: [idev] --
6,054,768 UART: [ldev] ++
6,055,472 UART: [ldev] CDI.KEYID = 6
6,056,393 UART: [ldev] SUBJECT.KEYID = 5
6,057,557 UART: [ldev] AUTHORITY.KEYID = 7
6,058,788 UART: [ldev] FE.KEYID = 1
6,101,946 UART: [ldev] Erasing FE.KEYID = 1
8,608,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,553 UART: [ldev] --
10,414,353 UART: [fwproc] Wait for Commands...
10,417,204 UART: [fwproc] Recv command 0x46574c44
10,419,507 UART: [fwproc] Recv'd Img size: 118548 bytes
15,108,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,185,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,308,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,868,877 >>> mbox cmd response: success
15,873,733 UART: [afmc] ++
15,874,458 UART: [afmc] CDI.KEYID = 6
15,875,647 UART: [afmc] SUBJECT.KEYID = 7
15,877,087 UART: [afmc] AUTHORITY.KEYID = 5
18,407,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,132,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,134,609 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,149,711 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,164,964 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,179,991 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,203,948 UART: [afmc] --
20,207,679 UART: [cold-reset] --
20,211,494 UART: [state] Locking Datavault
20,216,098 UART: [state] Locking PCR0, PCR1 and PCR31
20,218,323 UART: [state] Locking ICCM
20,219,472 UART: [exit] Launching FMC @ 0x40000130
20,228,097 UART:
20,228,340 UART: Running Caliptra FMC ...
20,229,441 UART:
20,229,598 UART: [state] CFI Enabled
20,290,223 UART: [fht] FMC Alias Private Key: 7
22,056,299 UART: [art] Extend RT PCRs Done
22,057,519 UART: [art] Lock RT PCRs Done
22,059,090 UART: [art] Populate DV Done
22,064,500 UART: [fht] FMC Alias Private Key: 7
22,066,033 UART: [art] Derive CDI
22,066,797 UART: [art] Store in slot 0x4
22,123,327 UART: [art] Derive Key Pair
22,124,361 UART: [art] Store priv key in slot 0x5
24,587,000 UART: [art] Derive Key Pair - Done
24,599,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,313,296 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,805 UART: [art] PUB.X = 3601A63924E42F43AC08C28255EC848ECD54F803BB01154F0385BE37CC3F83EBDC3D615F623DBA49C3B796C93B81F40D
26,322,066 UART: [art] PUB.Y = B1E7348D06595F92DB172E29C8A3A68092D1CD52FD6CCE1C66FE97B878EC50D0C89A634E9277B64E3DE18E8256B0AEBB
26,329,342 UART: [art] SIG.R = 18C39463DBA7DE10B24F210DC2583F1B580E6FECCD39308E51670BF405BEEBBA7EBC999387EB9C5B2A25DB0F00FA0447
26,336,703 UART: [art] SIG.S = 7478A5921139A5650E904F7D66604B093C2C95B74FDB2507B9FD85AA832711A0BE053B7699BCBA24B66F14C731142CE8
27,315,583 UART: Caliptra RT
27,316,294 UART: [state] CFI Enabled
27,497,700 UART: [rt] RT listening for mailbox commands...
27,500,323 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,655,702 UART: [rt]cmd =0x41544d4e, len=14344
27,657,622 >>> mbox cmd response: failed
27,658,361 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,813,515 UART: [rt]cmd =0x41544d4e, len=14344
27,815,323 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,440,226 ready_for_fw is high
3,440,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,907,404 >>> mbox cmd response: success
20,189,233 UART:
20,189,521 UART: Running Caliptra FMC ...
20,190,612 UART:
20,190,760 UART: [state] CFI Enabled
20,256,897 UART: [fht] FMC Alias Private Key: 7
22,044,052 UART: [art] Extend RT PCRs Done
22,045,153 UART: [art] Lock RT PCRs Done
22,047,058 UART: [art] Populate DV Done
22,052,725 UART: [fht] FMC Alias Private Key: 7
22,054,282 UART: [art] Derive CDI
22,055,004 UART: [art] Store in slot 0x4
22,103,264 UART: [art] Derive Key Pair
22,104,222 UART: [art] Store priv key in slot 0x5
24,567,031 UART: [art] Derive Key Pair - Done
24,580,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,293,727 UART: [art] Erasing AUTHORITY.KEYID = 7
26,295,124 UART: [art] PUB.X = 7C7F18731B7F78E72B0182A83EFF385C78FF37D5495CA009A9264744745B43AC14DD78960B5838027071A79A0F2BA0E1
26,302,368 UART: [art] PUB.Y = 4C077A145FB9A5752B24F123002AA74E17961B8F5F38F98972328868C959E4CF30D447BA1311266CFE9C6BE40351468A
26,309,688 UART: [art] SIG.R = 156AAE958D7B655827E41EB2C66845C3C65FA7040F6DEF648C1544D1DC33350DA09DE318A662E200CAE702D7039F5EDB
26,316,934 UART: [art] SIG.S = DA66B1064939C8BD31A08D133C793E4BBE19A93C61244CDB79658B3E84FC20F003CA46A0B1B1A5CC6B5496C5F6817AA2
27,296,085 UART: Caliptra RT
27,296,678 UART: [state] CFI Enabled
27,476,937 UART: [rt] RT listening for mailbox commands...
27,479,307 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,634,426 UART: [rt]cmd =0x41544d4e, len=14344
27,636,290 >>> mbox cmd response: failed
27,637,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,792,153 UART: [rt]cmd =0x41544d4e, len=14344
27,794,226 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
192,542 UART:
192,915 UART: Running Caliptra ROM ...
194,099 UART:
603,897 UART: [state] CFI Enabled
615,067 UART: [state] LifecycleState = Unprovisioned
617,469 UART: [state] DebugLocked = No
619,570 UART: [state] WD Timer not started. Device not locked for debugging
624,839 UART: [kat] SHA2-256
814,721 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,475 UART: [kat] ++
825,999 UART: [kat] sha1
838,507 UART: [kat] SHA2-256
841,523 UART: [kat] SHA2-384
847,090 UART: [kat] SHA2-512-ACC
849,684 UART: [kat] ECC-384
3,290,867 UART: [kat] HMAC-384Kdf
3,303,221 UART: [kat] LMS
3,835,093 UART: [kat] --
3,839,025 UART: [cold-reset] ++
3,841,034 UART: [fht] FHT @ 0x50003400
3,852,946 UART: [idev] ++
3,853,598 UART: [idev] CDI.KEYID = 6
3,854,588 UART: [idev] SUBJECT.KEYID = 7
3,855,763 UART: [idev] UDS.KEYID = 0
3,856,693 ready_for_fw is high
3,856,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,283 UART: [idev] Erasing UDS.KEYID = 0
6,325,393 UART: [idev] Sha1 KeyId Algorithm
6,347,763 UART: [idev] --
6,353,055 UART: [ldev] ++
6,353,739 UART: [ldev] CDI.KEYID = 6
6,354,675 UART: [ldev] SUBJECT.KEYID = 5
6,355,778 UART: [ldev] AUTHORITY.KEYID = 7
6,357,068 UART: [ldev] FE.KEYID = 1
6,368,636 UART: [ldev] Erasing FE.KEYID = 1
8,848,062 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,686 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,852 UART: [ldev] --
10,639,553 UART: [fwproc] Wait for Commands...
10,641,597 UART: [fwproc] Recv command 0x46574c44
10,643,911 UART: [fwproc] Recv'd Img size: 118548 bytes
15,312,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,392,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,516,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,077,235 >>> mbox cmd response: success
16,080,759 UART: [afmc] ++
16,081,501 UART: [afmc] CDI.KEYID = 6
16,082,700 UART: [afmc] SUBJECT.KEYID = 7
16,084,148 UART: [afmc] AUTHORITY.KEYID = 5
18,589,773 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,312,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,314,596 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,329,740 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,344,898 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,359,941 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,383,652 UART: [afmc] --
20,387,882 UART: [cold-reset] --
20,392,982 UART: [state] Locking Datavault
20,399,017 UART: [state] Locking PCR0, PCR1 and PCR31
20,401,184 UART: [state] Locking ICCM
20,403,736 UART: [exit] Launching FMC @ 0x40000130
20,412,374 UART:
20,412,612 UART: Running Caliptra FMC ...
20,413,716 UART:
20,413,879 UART: [state] CFI Enabled
20,421,881 UART: [fht] FMC Alias Private Key: 7
22,187,958 UART: [art] Extend RT PCRs Done
22,189,183 UART: [art] Lock RT PCRs Done
22,190,793 UART: [art] Populate DV Done
22,196,102 UART: [fht] FMC Alias Private Key: 7
22,197,645 UART: [art] Derive CDI
22,198,410 UART: [art] Store in slot 0x4
22,241,380 UART: [art] Derive Key Pair
22,242,424 UART: [art] Store priv key in slot 0x5
24,669,599 UART: [art] Derive Key Pair - Done
24,682,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,388,713 UART: [art] Erasing AUTHORITY.KEYID = 7
26,390,223 UART: [art] PUB.X = 297CE8D7363A4D2782BFE1559A537CDB46511CC10048851B6CB18F22593EA7A57C81B10B23083A85AD985DDBC18C9685
26,397,439 UART: [art] PUB.Y = 245698A9ED9CBD020E7FECFD3F8C5C0B60DD63D35144F1E2C4EF91B709F1D7143ACB797E75DE8955EA9EABE8279A25CB
26,404,697 UART: [art] SIG.R = 3F133464D18FC77573D7B54D7748AF86095E28175E242AFFF11DD3FB722F08FE46B97F8995D05A52EA94253756FF9FA0
26,412,114 UART: [art] SIG.S = DF03ADD00C73F7B772EE9B9D044C124303CB1A9498869011272FE3FABCA6839846B48591E27EC38F9DFE8747E63DEBEC
27,390,906 UART: Caliptra RT
27,391,618 UART: [state] CFI Enabled
27,523,922 UART: [rt] RT listening for mailbox commands...
27,526,536 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,681,917 UART: [rt]cmd =0x41544d4e, len=14344
27,683,941 >>> mbox cmd response: failed
27,684,664 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,839,867 UART: [rt]cmd =0x41544d4e, len=14344
27,841,790 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,761,872 ready_for_fw is high
3,762,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,179,004 >>> mbox cmd response: success
20,429,565 UART:
20,429,976 UART: Running Caliptra FMC ...
20,431,130 UART:
20,431,302 UART: [state] CFI Enabled
20,439,413 UART: [fht] FMC Alias Private Key: 7
22,205,549 UART: [art] Extend RT PCRs Done
22,206,773 UART: [art] Lock RT PCRs Done
22,208,100 UART: [art] Populate DV Done
22,213,747 UART: [fht] FMC Alias Private Key: 7
22,215,235 UART: [art] Derive CDI
22,215,973 UART: [art] Store in slot 0x4
22,258,237 UART: [art] Derive Key Pair
22,259,273 UART: [art] Store priv key in slot 0x5
24,685,560 UART: [art] Derive Key Pair - Done
24,698,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,404,769 UART: [art] Erasing AUTHORITY.KEYID = 7
26,406,277 UART: [art] PUB.X = 38EF197B79DD8BA1C30D761B93DBBC7CEF75ED05BF260A85CFD12757730BC9885A424C7CF40CBA51BCD96661B378E8A5
26,413,550 UART: [art] PUB.Y = ACB61F60F10BEEED50ED606921BE40F5DA0D37911AB779EBB699909F63023EA5F0063E9E39F2D807E1F934B4481F07D3
26,420,823 UART: [art] SIG.R = 40D821FE36E955151B00F91B12D1905CCE019E8C207495AABC39F36ED57E93B65F6C21B4EBD001D6C2C1EA73F955BAB9
26,428,195 UART: [art] SIG.S = D8C709F5BDF2A122B4CE6F6E27A1E14EEFBE151EB790F45741BD2946FD6630F6F4FFA30A92251DDB22A69807171F37DD
27,407,186 UART: Caliptra RT
27,407,890 UART: [state] CFI Enabled
27,540,621 UART: [rt] RT listening for mailbox commands...
27,543,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,698,423 UART: [rt]cmd =0x41544d4e, len=14344
27,700,471 >>> mbox cmd response: failed
27,701,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,856,446 UART: [rt]cmd =0x41544d4e, len=14344
27,858,268 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,362 UART: [state] LifecycleState = Unprovisioned
86,017 UART: [state] DebugLocked = No
86,727 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,275 UART: [kat] SHA2-256
882,206 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,321 UART: [kat] ++
886,473 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,392 UART: [kat] SHA2-512-ACC
897,293 UART: [kat] ECC-384
903,064 UART: [kat] HMAC-384Kdf
907,654 UART: [kat] LMS
1,475,850 UART: [kat] --
1,476,667 UART: [cold-reset] ++
1,477,067 UART: [fht] Storing FHT @ 0x50003400
1,480,026 UART: [idev] ++
1,480,194 UART: [idev] CDI.KEYID = 6
1,480,554 UART: [idev] SUBJECT.KEYID = 7
1,480,978 UART: [idev] UDS.KEYID = 0
1,481,323 ready_for_fw is high
1,481,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,102 UART: [idev] Erasing UDS.KEYID = 0
1,505,808 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,480 UART: [idev] --
1,515,355 UART: [ldev] ++
1,515,523 UART: [ldev] CDI.KEYID = 6
1,515,886 UART: [ldev] SUBJECT.KEYID = 5
1,516,312 UART: [ldev] AUTHORITY.KEYID = 7
1,516,775 UART: [ldev] FE.KEYID = 1
1,522,063 UART: [ldev] Erasing FE.KEYID = 1
1,546,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,778 UART: [ldev] --
1,586,197 UART: [fwproc] Waiting for Commands...
1,586,894 UART: [fwproc] Received command 0x46574c44
1,587,685 UART: [fwproc] Received Image of size 118548 bytes
5,205,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,086 >>> mbox cmd response: success
5,406,138 UART: [afmc] ++
5,406,306 UART: [afmc] CDI.KEYID = 6
5,406,668 UART: [afmc] SUBJECT.KEYID = 7
5,407,093 UART: [afmc] AUTHORITY.KEYID = 5
5,441,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,458,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,458,878 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,584 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,463 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,476,176 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,483,929 UART: [afmc] --
5,484,915 UART: [cold-reset] --
5,485,807 UART: [state] Locking Datavault
5,486,902 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,506 UART: [state] Locking ICCM
5,488,040 UART: [exit] Launching FMC @ 0x40000130
5,493,370 UART:
5,493,386 UART: Running Caliptra FMC ...
5,493,794 UART:
5,493,848 UART: [state] CFI Enabled
5,504,438 UART: [fht] FMC Alias Private Key: 7
5,623,372 UART: [art] Extend RT PCRs Done
5,623,800 UART: [art] Lock RT PCRs Done
5,625,438 UART: [art] Populate DV Done
5,633,739 UART: [fht] FMC Alias Private Key: 7
5,634,781 UART: [art] Derive CDI
5,635,061 UART: [art] Store in slot 0x4
5,720,855 UART: [art] Derive Key Pair
5,721,215 UART: [art] Store priv key in slot 0x5
5,734,636 UART: [art] Derive Key Pair - Done
5,749,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,773 UART: [art] Erasing AUTHORITY.KEYID = 7
5,765,538 UART: [art] PUB.X = 9677D3DFB185CB7B1DF5B8724209954EDFD55647A039BB825F06F63B7C8B5001BD3C51C3698EF470D4FCF718CDB4E070
5,772,309 UART: [art] PUB.Y = 21E7CFA3922897D666C01CF9E6D9EED33D10F7F355307C4B5FCDACBF4866FCF71EE863C066D418C4D459A10605806DBD
5,779,267 UART: [art] SIG.R = 55F2E8E58A83B392191CAF8F7E3282D05F004C3B58B578042B69A3B8EA9C96FE262FABEDE5AA73713E9EAF4A06532CB7
5,786,023 UART: [art] SIG.S = 549A62893BB51AB8B322168ED96555D418169B955C48A787C8470FBAC6400AD413F20DFB26BAC8B6DE3C3F28209A2C0E
5,810,051 UART: Caliptra RT
5,810,302 UART: [state] CFI Enabled
5,929,733 UART: [rt] RT listening for mailbox commands...
5,930,403 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,053,283 UART: [rt]cmd =0x41544d4e, len=14344
6,054,606 >>> mbox cmd response: failed
6,054,606 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,177,120 UART: [rt]cmd =0x41544d4e, len=14344
6,178,653 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,171 ready_for_fw is high
1,363,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,254,550 >>> mbox cmd response: success
5,315,791 UART:
5,315,807 UART: Running Caliptra FMC ...
5,316,215 UART:
5,316,269 UART: [state] CFI Enabled
5,326,965 UART: [fht] FMC Alias Private Key: 7
5,445,697 UART: [art] Extend RT PCRs Done
5,446,125 UART: [art] Lock RT PCRs Done
5,447,693 UART: [art] Populate DV Done
5,455,808 UART: [fht] FMC Alias Private Key: 7
5,456,858 UART: [art] Derive CDI
5,457,138 UART: [art] Store in slot 0x4
5,543,030 UART: [art] Derive Key Pair
5,543,390 UART: [art] Store priv key in slot 0x5
5,556,843 UART: [art] Derive Key Pair - Done
5,571,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,586,802 UART: [art] Erasing AUTHORITY.KEYID = 7
5,587,567 UART: [art] PUB.X = 46C4E4315B8F5F5D4A571CFFB2996AAE8A975BC7C2FE4C80180EDC85AE1CF9F650F306B19C1D5720072BE8568878E79C
5,594,340 UART: [art] PUB.Y = 18F04C74E9071B6241F7D3446AF56CC31B27D28699B8F77D08D4D7CEB94170A378D5412356BA11CE71FEE436814716FF
5,601,284 UART: [art] SIG.R = 9172433068222BA076CBB4B81A6B3CBB1FD47FBE2864A196274806B7F5360B2EF08EE524B9A13EBB5A1D82CD4B5BA418
5,608,058 UART: [art] SIG.S = 7AADCCA60205B0B8A7275070D4D919F346B51B2D3045D304F1AFE0D77C2937DFE9DF301D9C1F80290822955E9F9161F6
5,631,884 UART: Caliptra RT
5,632,135 UART: [state] CFI Enabled
5,750,663 UART: [rt] RT listening for mailbox commands...
5,751,333 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,874,447 UART: [rt]cmd =0x41544d4e, len=14344
5,875,788 >>> mbox cmd response: failed
5,875,788 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,998,294 UART: [rt]cmd =0x41544d4e, len=14344
5,999,749 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,192 UART: [kat] SHA2-256
882,123 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,238 UART: [kat] ++
886,390 UART: [kat] sha1
890,818 UART: [kat] SHA2-256
892,756 UART: [kat] SHA2-384
895,689 UART: [kat] SHA2-512-ACC
897,590 UART: [kat] ECC-384
903,271 UART: [kat] HMAC-384Kdf
907,699 UART: [kat] LMS
1,475,895 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,186 UART: [fht] Storing FHT @ 0x50003400
1,480,023 UART: [idev] ++
1,480,191 UART: [idev] CDI.KEYID = 6
1,480,551 UART: [idev] SUBJECT.KEYID = 7
1,480,975 UART: [idev] UDS.KEYID = 0
1,481,320 ready_for_fw is high
1,481,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,105 UART: [idev] Erasing UDS.KEYID = 0
1,505,515 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,997 UART: [idev] --
1,515,094 UART: [ldev] ++
1,515,262 UART: [ldev] CDI.KEYID = 6
1,515,625 UART: [ldev] SUBJECT.KEYID = 5
1,516,051 UART: [ldev] AUTHORITY.KEYID = 7
1,516,514 UART: [ldev] FE.KEYID = 1
1,521,622 UART: [ldev] Erasing FE.KEYID = 1
1,547,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,955 UART: [ldev] --
1,586,404 UART: [fwproc] Waiting for Commands...
1,587,205 UART: [fwproc] Received command 0x46574c44
1,587,996 UART: [fwproc] Received Image of size 118548 bytes
5,092,443 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,120,877 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,152,095 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,292,342 >>> mbox cmd response: success
5,293,504 UART: [afmc] ++
5,293,672 UART: [afmc] CDI.KEYID = 6
5,294,034 UART: [afmc] SUBJECT.KEYID = 7
5,294,459 UART: [afmc] AUTHORITY.KEYID = 5
5,329,992 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,346,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,347,244 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,352,950 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,358,829 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,364,542 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,372,375 UART: [afmc] --
5,373,325 UART: [cold-reset] --
5,374,129 UART: [state] Locking Datavault
5,375,508 UART: [state] Locking PCR0, PCR1 and PCR31
5,376,112 UART: [state] Locking ICCM
5,376,558 UART: [exit] Launching FMC @ 0x40000130
5,381,888 UART:
5,381,904 UART: Running Caliptra FMC ...
5,382,312 UART:
5,382,455 UART: [state] CFI Enabled
5,392,899 UART: [fht] FMC Alias Private Key: 7
5,511,633 UART: [art] Extend RT PCRs Done
5,512,061 UART: [art] Lock RT PCRs Done
5,513,755 UART: [art] Populate DV Done
5,522,078 UART: [fht] FMC Alias Private Key: 7
5,523,132 UART: [art] Derive CDI
5,523,412 UART: [art] Store in slot 0x4
5,609,000 UART: [art] Derive Key Pair
5,609,360 UART: [art] Store priv key in slot 0x5
5,622,267 UART: [art] Derive Key Pair - Done
5,636,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,652,103 UART: [art] Erasing AUTHORITY.KEYID = 7
5,652,868 UART: [art] PUB.X = 14D92E1B659A980E3FACFDC46FC1478C4CA95BE4B663D32A68679DF6D1C3629F580524839F59E5AE34B7F68A264B261E
5,659,640 UART: [art] PUB.Y = 683C1DCCC69D7E9CDFC68A2CD8D4C3728AA847D6B45FCDB4D72F752DF6336A51AC89228B773FD4C1E5575532D0729F64
5,666,604 UART: [art] SIG.R = 953EB3ACDE0FB019588B43C1FED41EE0E8E422E521C596C0AEF67FD0E77ECCE1E6B39E7F6BFE2508351BB0F187895820
5,673,386 UART: [art] SIG.S = DA1A3B4C7743D86BC60D8E81279855DC2F45F2934BA0ECD1272DB8875D0B226C6EC53F82967E7200B79FB4DA9AD4A7B0
5,696,956 UART: Caliptra RT
5,697,299 UART: [state] CFI Enabled
5,816,810 UART: [rt] RT listening for mailbox commands...
5,817,480 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,940,586 UART: [rt]cmd =0x41544d4e, len=14344
5,942,123 >>> mbox cmd response: failed
5,942,123 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,869 UART: [rt]cmd =0x41544d4e, len=14344
6,066,368 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,118 ready_for_fw is high
1,363,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,106,212 >>> mbox cmd response: success
5,167,597 UART:
5,167,613 UART: Running Caliptra FMC ...
5,168,021 UART:
5,168,164 UART: [state] CFI Enabled
5,178,654 UART: [fht] FMC Alias Private Key: 7
5,297,978 UART: [art] Extend RT PCRs Done
5,298,406 UART: [art] Lock RT PCRs Done
5,300,128 UART: [art] Populate DV Done
5,308,427 UART: [fht] FMC Alias Private Key: 7
5,309,587 UART: [art] Derive CDI
5,309,867 UART: [art] Store in slot 0x4
5,395,825 UART: [art] Derive Key Pair
5,396,185 UART: [art] Store priv key in slot 0x5
5,409,278 UART: [art] Derive Key Pair - Done
5,424,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,440,194 UART: [art] Erasing AUTHORITY.KEYID = 7
5,440,959 UART: [art] PUB.X = 4A6B67A95008F132684257D4D65DDDBE93D6D498E38E428B496EF5E6EC503BBBF90CB8A21D128C510B77138A215F473C
5,447,726 UART: [art] PUB.Y = 49F401F3C161151BF7036E5F547252E13C9C77D52FFF0618B2CF33344BD6B9FB5728614FB4AFEB0708F77ED8D35E5F9B
5,454,669 UART: [art] SIG.R = 5BC3ABCE2E37354B698517ACC2CE7223B86AAEF9535D3149327179854610C3C9598A465D46AAF39EF2741118B308B524
5,461,434 UART: [art] SIG.S = 5D4D06127D4B7DE6A9BD13EF181F7F354EB4FAEA405D9CB1DAC93574E3A03D9B565C007492770FDE70D0E28AE6E5506B
5,486,104 UART: Caliptra RT
5,486,447 UART: [state] CFI Enabled
5,607,832 UART: [rt] RT listening for mailbox commands...
5,608,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,731,346 UART: [rt]cmd =0x41544d4e, len=14344
5,732,667 >>> mbox cmd response: failed
5,732,667 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,855,423 UART: [rt]cmd =0x41544d4e, len=14344
5,857,164 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
891,242 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,346 UART: [kat] ++
895,498 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,385 UART: [kat] SHA2-512-ACC
906,286 UART: [kat] ECC-384
915,503 UART: [kat] HMAC-384Kdf
920,023 UART: [kat] LMS
1,168,335 UART: [kat] --
1,169,144 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,420 UART: [idev] ++
1,172,588 UART: [idev] CDI.KEYID = 6
1,172,949 UART: [idev] SUBJECT.KEYID = 7
1,173,374 UART: [idev] UDS.KEYID = 0
1,173,720 ready_for_fw is high
1,173,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,663 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,749 UART: [idev] --
1,208,692 UART: [ldev] ++
1,208,860 UART: [ldev] CDI.KEYID = 6
1,209,224 UART: [ldev] SUBJECT.KEYID = 5
1,209,651 UART: [ldev] AUTHORITY.KEYID = 7
1,210,114 UART: [ldev] FE.KEYID = 1
1,215,284 UART: [ldev] Erasing FE.KEYID = 1
1,241,047 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,194 UART: [ldev] --
1,280,633 UART: [fwproc] Wait for Commands...
1,281,300 UART: [fwproc] Recv command 0x46574c44
1,282,033 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,920 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,705 >>> mbox cmd response: success
3,367,889 UART: [afmc] ++
3,368,057 UART: [afmc] CDI.KEYID = 6
3,368,420 UART: [afmc] SUBJECT.KEYID = 7
3,368,846 UART: [afmc] AUTHORITY.KEYID = 5
3,403,607 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,278 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,027 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,734 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,611 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,321 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,149 UART: [afmc] --
3,447,036 UART: [cold-reset] --
3,448,106 UART: [state] Locking Datavault
3,449,249 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,853 UART: [state] Locking ICCM
3,450,445 UART: [exit] Launching FMC @ 0x40000130
3,455,775 UART:
3,455,791 UART: Running Caliptra FMC ...
3,456,199 UART:
3,456,253 UART: [state] CFI Enabled
3,466,729 UART: [fht] FMC Alias Private Key: 7
3,585,475 UART: [art] Extend RT PCRs Done
3,585,903 UART: [art] Lock RT PCRs Done
3,587,505 UART: [art] Populate DV Done
3,595,634 UART: [fht] FMC Alias Private Key: 7
3,596,636 UART: [art] Derive CDI
3,596,916 UART: [art] Store in slot 0x4
3,682,381 UART: [art] Derive Key Pair
3,682,741 UART: [art] Store priv key in slot 0x5
3,695,859 UART: [art] Derive Key Pair - Done
3,710,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,877 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,642 UART: [art] PUB.X = 66A05726F4FAB82B106FDC1D8C0D0299AE9AFAC8869FA4ED0ED9CE1192D7BFE6FBF82D2B06A24959D528C16D6E6E3968
3,733,420 UART: [art] PUB.Y = 1EFD250D01E18F5E7F57BC9C2E361811AC93B45DCA14949B577C71C7CF3B92B534B26ECE694F2C9D8B1E85DC492E43E2
3,740,378 UART: [art] SIG.R = AA3EC467C510E04AF56758BA14E6C514BCBED94918D200F3EEBE6710411725DF034174640E1DB42F660ABF088F842EFD
3,747,124 UART: [art] SIG.S = 7A72363B867E43E0F4A8C04ED29FB0605232C916C17A228200B99F522A3FD78E18FC629C2A3D0BE87CC27F54C8A19991
3,770,937 UART: Caliptra RT
3,771,188 UART: [state] CFI Enabled
3,891,094 UART: [rt] RT listening for mailbox commands...
3,891,764 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,836 UART: [rt]cmd =0x41544d4e, len=14344
4,016,385 >>> mbox cmd response: failed
4,016,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,138,881 UART: [rt]cmd =0x41544d4e, len=14344
4,140,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,060 ready_for_fw is high
1,059,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,530 >>> mbox cmd response: success
3,282,603 UART:
3,282,619 UART: Running Caliptra FMC ...
3,283,027 UART:
3,283,081 UART: [state] CFI Enabled
3,293,469 UART: [fht] FMC Alias Private Key: 7
3,412,739 UART: [art] Extend RT PCRs Done
3,413,167 UART: [art] Lock RT PCRs Done
3,415,087 UART: [art] Populate DV Done
3,423,426 UART: [fht] FMC Alias Private Key: 7
3,424,468 UART: [art] Derive CDI
3,424,748 UART: [art] Store in slot 0x4
3,510,657 UART: [art] Derive Key Pair
3,511,017 UART: [art] Store priv key in slot 0x5
3,524,135 UART: [art] Derive Key Pair - Done
3,539,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,552 UART: [art] PUB.X = 5D6D840169446E53F19CFEB13BC92A59BEB70F85279D8E411479E7824C8F4B78EB393E48C3DF41BF3B1EBACC04F7EE83
3,562,327 UART: [art] PUB.Y = D753C8C5E353B70F7441361DA513B0D6F7ED4B131F522FA1C26F3099588433C42119AECA5833872C8BAB540F84510E45
3,569,266 UART: [art] SIG.R = 88EDC7AFDAE0178A7CAF75D26E7B5A2C3C2787AA4140FF4AEC68D983BFBAE6B3A716CC72A31849AA1FFE33FC67B0B18E
3,576,066 UART: [art] SIG.S = F938581598C069614CE7882163BBF10B168C43A9E08BB5959BAB9FD6305CC4BE7C146AFFAE3AB90E7C5EB0AF986561F5
3,599,688 UART: Caliptra RT
3,599,939 UART: [state] CFI Enabled
3,720,314 UART: [rt] RT listening for mailbox commands...
3,720,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,990 UART: [rt]cmd =0x41544d4e, len=14344
3,845,269 >>> mbox cmd response: failed
3,845,269 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,967,739 UART: [rt]cmd =0x41544d4e, len=14344
3,969,084 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,199 UART: [state] LifecycleState = Unprovisioned
85,854 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,605 UART: [kat] SHA2-256
891,155 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,259 UART: [kat] ++
895,411 UART: [kat] sha1
899,815 UART: [kat] SHA2-256
901,755 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,594 UART: [kat] LMS
1,168,906 UART: [kat] --
1,169,855 UART: [cold-reset] ++
1,170,409 UART: [fht] FHT @ 0x50003400
1,173,183 UART: [idev] ++
1,173,351 UART: [idev] CDI.KEYID = 6
1,173,712 UART: [idev] SUBJECT.KEYID = 7
1,174,137 UART: [idev] UDS.KEYID = 0
1,174,483 ready_for_fw is high
1,174,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,476 UART: [idev] Erasing UDS.KEYID = 0
1,199,666 UART: [idev] Sha1 KeyId Algorithm
1,208,628 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,243,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,799 UART: [ldev] --
1,283,208 UART: [fwproc] Wait for Commands...
1,283,959 UART: [fwproc] Recv command 0x46574c44
1,284,692 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,084 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,929 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,104 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,265 >>> mbox cmd response: success
3,370,379 UART: [afmc] ++
3,370,547 UART: [afmc] CDI.KEYID = 6
3,370,910 UART: [afmc] SUBJECT.KEYID = 7
3,371,336 UART: [afmc] AUTHORITY.KEYID = 5
3,407,401 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,896 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,645 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,352 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,229 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,939 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,631 UART: [afmc] --
3,450,540 UART: [cold-reset] --
3,451,368 UART: [state] Locking Datavault
3,452,629 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,233 UART: [state] Locking ICCM
3,453,841 UART: [exit] Launching FMC @ 0x40000130
3,459,171 UART:
3,459,187 UART: Running Caliptra FMC ...
3,459,595 UART:
3,459,738 UART: [state] CFI Enabled
3,470,340 UART: [fht] FMC Alias Private Key: 7
3,589,388 UART: [art] Extend RT PCRs Done
3,589,816 UART: [art] Lock RT PCRs Done
3,591,220 UART: [art] Populate DV Done
3,599,319 UART: [fht] FMC Alias Private Key: 7
3,600,483 UART: [art] Derive CDI
3,600,763 UART: [art] Store in slot 0x4
3,686,740 UART: [art] Derive Key Pair
3,687,100 UART: [art] Store priv key in slot 0x5
3,700,760 UART: [art] Derive Key Pair - Done
3,715,313 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,266 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,031 UART: [art] PUB.X = 085ACACCC9702B83CCED1711AA73D569C43E85A769927AD569CA80F6B097CFAF24F0AA9E3B3182E543575F48573B4219
3,738,806 UART: [art] PUB.Y = 21E14098B32C2932704BEF8715743189D220AB9C5F2094605AA45754A54453C5E842CBDBEC546E02AA92874AA3CFFDF9
3,745,755 UART: [art] SIG.R = 847997A59F86769B9B33FA616D2914C072E4CBCC6669871AA3CF6DA3D39DFF15C3D870D8DF3729DE0935269578BDAFD7
3,752,530 UART: [art] SIG.S = 92B4B0B432354B9CC4D76037612B4E161A52D6FFF67CCA998BE3E0499C38561D93A385BDFC9364F306B2B1C041F046B1
3,776,505 UART: Caliptra RT
3,776,848 UART: [state] CFI Enabled
3,896,519 UART: [rt] RT listening for mailbox commands...
3,897,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,167 UART: [rt]cmd =0x41544d4e, len=14344
4,021,836 >>> mbox cmd response: failed
4,021,836 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,268 UART: [rt]cmd =0x41544d4e, len=14344
4,145,579 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,337 ready_for_fw is high
1,059,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,229,536 >>> mbox cmd response: success
3,290,783 UART:
3,290,799 UART: Running Caliptra FMC ...
3,291,207 UART:
3,291,350 UART: [state] CFI Enabled
3,302,128 UART: [fht] FMC Alias Private Key: 7
3,421,452 UART: [art] Extend RT PCRs Done
3,421,880 UART: [art] Lock RT PCRs Done
3,423,450 UART: [art] Populate DV Done
3,431,467 UART: [fht] FMC Alias Private Key: 7
3,432,527 UART: [art] Derive CDI
3,432,807 UART: [art] Store in slot 0x4
3,518,500 UART: [art] Derive Key Pair
3,518,860 UART: [art] Store priv key in slot 0x5
3,531,436 UART: [art] Derive Key Pair - Done
3,546,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,930 UART: [art] PUB.X = 8BB1BF0841370E6DE07DF2EF2CFB9906540CA4D55A87CC5BE59F3D39FBDF80D630E794F8436AC47616BA2160A21ADE33
3,569,704 UART: [art] PUB.Y = 772A491737226DF98606E5C7320A70CFCEC4C6FC08D5F34EF6B2C9FC9EDFBC9A7044B74EE2FF495ABDC0925AFCA3D827
3,576,667 UART: [art] SIG.R = 180B9018E7EBC7E997FB96B18898275DC73D7DE367943BB91809D1087BD419A01D84AF32F7DD919CF3F00A4C395BDB28
3,583,431 UART: [art] SIG.S = 69FE05E253E5F2395859893B059C1D42C81A8402409F2116B46D8C56546EEED1C433F00206FCEE1CAF0FEADAF8B64388
3,607,317 UART: Caliptra RT
3,607,660 UART: [state] CFI Enabled
3,727,170 UART: [rt] RT listening for mailbox commands...
3,727,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,770 UART: [rt]cmd =0x41544d4e, len=14344
3,852,317 >>> mbox cmd response: failed
3,852,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,975,087 UART: [rt]cmd =0x41544d4e, len=14344
3,976,388 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,189 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,481 UART: [kat] SHA2-256
903,421 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,578 UART: [kat] HMAC-384Kdf
922,338 UART: [kat] LMS
1,170,666 UART: [kat] --
1,171,473 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,420 UART: [idev] ++
1,174,588 UART: [idev] CDI.KEYID = 6
1,174,948 UART: [idev] SUBJECT.KEYID = 7
1,175,372 UART: [idev] UDS.KEYID = 0
1,175,717 ready_for_fw is high
1,175,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,214 UART: [idev] Erasing UDS.KEYID = 0
1,199,863 UART: [idev] Sha1 KeyId Algorithm
1,208,291 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,994 UART: [ldev] SUBJECT.KEYID = 5
1,210,420 UART: [ldev] AUTHORITY.KEYID = 7
1,210,883 UART: [ldev] FE.KEYID = 1
1,216,017 UART: [ldev] Erasing FE.KEYID = 1
1,241,836 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,497 UART: [ldev] --
1,280,852 UART: [fwproc] Wait for Commands...
1,281,590 UART: [fwproc] Recv command 0x46574c44
1,282,318 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,638 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,931 >>> mbox cmd response: success
3,371,957 UART: [afmc] ++
3,372,125 UART: [afmc] CDI.KEYID = 6
3,372,487 UART: [afmc] SUBJECT.KEYID = 7
3,372,912 UART: [afmc] AUTHORITY.KEYID = 5
3,408,675 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,968 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,674 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,553 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,263 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,962 UART: [afmc] --
3,452,012 UART: [cold-reset] --
3,452,586 UART: [state] Locking Datavault
3,454,051 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,655 UART: [state] Locking ICCM
3,455,179 UART: [exit] Launching FMC @ 0x40000130
3,460,509 UART:
3,460,525 UART: Running Caliptra FMC ...
3,460,933 UART:
3,460,987 UART: [state] CFI Enabled
3,471,423 UART: [fht] FMC Alias Private Key: 7
3,590,393 UART: [art] Extend RT PCRs Done
3,590,821 UART: [art] Lock RT PCRs Done
3,592,603 UART: [art] Populate DV Done
3,601,102 UART: [fht] FMC Alias Private Key: 7
3,602,156 UART: [art] Derive CDI
3,602,436 UART: [art] Store in slot 0x4
3,687,797 UART: [art] Derive Key Pair
3,688,157 UART: [art] Store priv key in slot 0x5
3,701,001 UART: [art] Derive Key Pair - Done
3,715,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,085 UART: [art] PUB.X = 7132F65E1F5BB1DFDAE93A23511A4BB0D6C254CCFE0A18C9ECAF89CA886141F0B4976288822811FCBCB1B7E81F2AB6C7
3,738,872 UART: [art] PUB.Y = 37DA12F2EE7740C77015A5F4D0C0C8F6B54E003985470C3C06B90DAA39785F3306960F8925412CD4226F36B4F3A88B0B
3,745,780 UART: [art] SIG.R = 1A8370CFE711BC9AC5CDBF9FCCD3536A00BD30B58D7A8D2A3F0A80D13E0532B5CE6B97147F9942C4ACEB16024F1F657B
3,752,539 UART: [art] SIG.S = 844932076B22E8EF7DD46D72F0E357DAFCD1D5B2CAF467B6391E38541B6C1D98CDB9E080938FA38315DEF128F9A80B8F
3,776,351 UART: Caliptra RT
3,776,602 UART: [state] CFI Enabled
3,897,282 UART: [rt] RT listening for mailbox commands...
3,897,952 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,854 UART: [rt]cmd =0x41544d4e, len=14344
4,022,079 >>> mbox cmd response: failed
4,022,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,144,775 UART: [rt]cmd =0x41544d4e, len=14344
4,146,416 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,191 ready_for_fw is high
1,060,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,307 >>> mbox cmd response: success
3,284,370 UART:
3,284,386 UART: Running Caliptra FMC ...
3,284,794 UART:
3,284,848 UART: [state] CFI Enabled
3,295,722 UART: [fht] FMC Alias Private Key: 7
3,414,628 UART: [art] Extend RT PCRs Done
3,415,056 UART: [art] Lock RT PCRs Done
3,416,724 UART: [art] Populate DV Done
3,424,929 UART: [fht] FMC Alias Private Key: 7
3,425,877 UART: [art] Derive CDI
3,426,157 UART: [art] Store in slot 0x4
3,511,964 UART: [art] Derive Key Pair
3,512,324 UART: [art] Store priv key in slot 0x5
3,525,442 UART: [art] Derive Key Pair - Done
3,540,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,135 UART: [art] PUB.X = CD4228A1EEB53F71DC8AEB697F65AD97CFBF9540156F80090DFA69000D6B425188DD84421AFC14ECB28E5AE29A694D29
3,563,888 UART: [art] PUB.Y = 3564DD9EDBCF52BC0A6C0348CD470CCA6E0CCB5D585D1C690C307A2603D82AA1E2AC1A0B9E4C5BCAD7A056C189048564
3,570,834 UART: [art] SIG.R = A55393FA4DCD93367500CDABCC35D76E7C1D2EA8D65174B95BF71FB20EDE3C34C5583CCB74D14FB59028F4781CD3C4EA
3,577,599 UART: [art] SIG.S = 637E1C51C6EEC6AB05ED093E7D7DA334F5D087345F95FA61340A8B57094D1E36818CE516EB6672135EAB64131C4B59DE
3,601,823 UART: Caliptra RT
3,602,074 UART: [state] CFI Enabled
3,721,968 UART: [rt] RT listening for mailbox commands...
3,722,638 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,845,914 UART: [rt]cmd =0x41544d4e, len=14344
3,847,425 >>> mbox cmd response: failed
3,847,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,969,705 UART: [rt]cmd =0x41544d4e, len=14344
3,971,018 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
893,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,998 UART: [kat] ++
898,150 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,367 UART: [kat] HMAC-384Kdf
922,817 UART: [kat] LMS
1,171,145 UART: [kat] --
1,172,084 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,255 UART: [idev] ++
1,175,423 UART: [idev] CDI.KEYID = 6
1,175,783 UART: [idev] SUBJECT.KEYID = 7
1,176,207 UART: [idev] UDS.KEYID = 0
1,176,552 ready_for_fw is high
1,176,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,261 UART: [idev] Erasing UDS.KEYID = 0
1,201,686 UART: [idev] Sha1 KeyId Algorithm
1,210,266 UART: [idev] --
1,211,458 UART: [ldev] ++
1,211,626 UART: [ldev] CDI.KEYID = 6
1,211,989 UART: [ldev] SUBJECT.KEYID = 5
1,212,415 UART: [ldev] AUTHORITY.KEYID = 7
1,212,878 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,243,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,670 UART: [ldev] --
1,283,181 UART: [fwproc] Wait for Commands...
1,283,913 UART: [fwproc] Recv command 0x46574c44
1,284,641 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,235,632 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,961 >>> mbox cmd response: success
3,377,105 UART: [afmc] ++
3,377,273 UART: [afmc] CDI.KEYID = 6
3,377,635 UART: [afmc] SUBJECT.KEYID = 7
3,378,060 UART: [afmc] AUTHORITY.KEYID = 5
3,414,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,394 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,437,100 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,979 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,689 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,528 UART: [afmc] --
3,457,650 UART: [cold-reset] --
3,458,528 UART: [state] Locking Datavault
3,459,957 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,561 UART: [state] Locking ICCM
3,461,233 UART: [exit] Launching FMC @ 0x40000130
3,466,563 UART:
3,466,579 UART: Running Caliptra FMC ...
3,466,987 UART:
3,467,130 UART: [state] CFI Enabled
3,477,852 UART: [fht] FMC Alias Private Key: 7
3,596,560 UART: [art] Extend RT PCRs Done
3,596,988 UART: [art] Lock RT PCRs Done
3,598,262 UART: [art] Populate DV Done
3,606,577 UART: [fht] FMC Alias Private Key: 7
3,607,549 UART: [art] Derive CDI
3,607,829 UART: [art] Store in slot 0x4
3,693,762 UART: [art] Derive Key Pair
3,694,122 UART: [art] Store priv key in slot 0x5
3,707,656 UART: [art] Derive Key Pair - Done
3,722,554 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,865 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,630 UART: [art] PUB.X = 0C74D59EDE6DDCD1FABF11A257573602650A2ABACE22830CCFC469F97A2D58295C93A7549564C9942412476EA3D15AA1
3,745,396 UART: [art] PUB.Y = 53B9B17E114B177AC2FDC7E95DE99D027C89BD87DAA7D488DDA0518D038FAFB97F13DFA060E7830BA2EE022C50FB508C
3,752,354 UART: [art] SIG.R = 45BE9A9F2842349D08DAEF9D33A9943B78A89D3E61D3CA8F97130F12ACFBC68FE2E6AE843C3C69BFABAD0D03DF02C721
3,759,131 UART: [art] SIG.S = CCE69A8A8DCBBC48D245530D3BB94B053F2F5467F761AA1252B921B34C0C48729803779747B046C384EF13CA69FFC27F
3,782,567 UART: Caliptra RT
3,782,910 UART: [state] CFI Enabled
3,903,266 UART: [rt] RT listening for mailbox commands...
3,903,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,140 UART: [rt]cmd =0x41544d4e, len=14344
4,028,649 >>> mbox cmd response: failed
4,028,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,151,401 UART: [rt]cmd =0x41544d4e, len=14344
4,153,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,110 ready_for_fw is high
1,061,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,180 >>> mbox cmd response: success
3,280,541 UART:
3,280,557 UART: Running Caliptra FMC ...
3,280,965 UART:
3,281,108 UART: [state] CFI Enabled
3,291,544 UART: [fht] FMC Alias Private Key: 7
3,411,396 UART: [art] Extend RT PCRs Done
3,411,824 UART: [art] Lock RT PCRs Done
3,413,576 UART: [art] Populate DV Done
3,421,707 UART: [fht] FMC Alias Private Key: 7
3,422,853 UART: [art] Derive CDI
3,423,133 UART: [art] Store in slot 0x4
3,508,692 UART: [art] Derive Key Pair
3,509,052 UART: [art] Store priv key in slot 0x5
3,523,036 UART: [art] Derive Key Pair - Done
3,537,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,699 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,464 UART: [art] PUB.X = 656F27D91020A2787944BC26E1C87CFC98D1DF5F12062805D9CAA4E52B338948881CDFC2856D240650CAE31620948F6B
3,561,223 UART: [art] PUB.Y = 7030B4CA0047E9304DC72B84971485C5316A5F6DF0682AB284CE496813050BD3EC8AD634C6A15E6F11E6DFC6D35D699C
3,568,149 UART: [art] SIG.R = BCCCD1A900DE83E5BC3EA2EDDC9009CB0CC80AEEE18E5E7487E36237A6DDCDAD6DD50D270CBFAA7096F972FD3B6762A3
3,574,916 UART: [art] SIG.S = 5620987620BBE078196332E78A8A87B84618F3EDF80A9BF6F703A34B587C909DBCC7F85A814A8E5F40A3CC75ABE38F60
3,598,758 UART: Caliptra RT
3,599,101 UART: [state] CFI Enabled
3,718,467 UART: [rt] RT listening for mailbox commands...
3,719,137 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,187 UART: [rt]cmd =0x41544d4e, len=14344
3,843,550 >>> mbox cmd response: failed
3,843,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,218 UART: [rt]cmd =0x41544d4e, len=14344
3,967,645 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_invalid_len ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,265 UART:
192,615 UART: Running Caliptra ROM ...
193,719 UART:
193,863 UART: [state] CFI Enabled
263,131 UART: [state] LifecycleState = Unprovisioned
265,039 UART: [state] DebugLocked = No
267,919 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,554 UART: [kat] SHA2-256
442,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,754 UART: [kat] ++
453,232 UART: [kat] sha1
463,879 UART: [kat] SHA2-256
466,567 UART: [kat] SHA2-384
471,637 UART: [kat] SHA2-512-ACC
473,936 UART: [kat] ECC-384
2,765,644 UART: [kat] HMAC-384Kdf
2,777,755 UART: [kat] LMS
3,968,079 UART: [kat] --
3,972,887 UART: [cold-reset] ++
3,974,084 UART: [fht] Storing FHT @ 0x50003400
3,985,659 UART: [idev] ++
3,986,229 UART: [idev] CDI.KEYID = 6
3,987,265 UART: [idev] SUBJECT.KEYID = 7
3,988,439 UART: [idev] UDS.KEYID = 0
3,989,393 ready_for_fw is high
3,989,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,637 UART: [idev] Erasing UDS.KEYID = 0
7,321,267 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,501 UART: [idev] --
7,346,796 UART: [ldev] ++
7,347,378 UART: [ldev] CDI.KEYID = 6
7,348,345 UART: [ldev] SUBJECT.KEYID = 5
7,349,559 UART: [ldev] AUTHORITY.KEYID = 7
7,350,789 UART: [ldev] FE.KEYID = 1
7,378,287 UART: [ldev] Erasing FE.KEYID = 1
10,709,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,005,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,020,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,035,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,049,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,067,664 UART: [ldev] --
13,072,499 UART: [fwproc] Waiting for Commands...
13,075,183 UART: [fwproc] Received command 0x46574c44
13,077,420 UART: [fwproc] Received Image of size 118548 bytes
22,245,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,326,820 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,400,003 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,728,377 >>> mbox cmd response: success
22,733,403 UART: [afmc] ++
22,734,019 UART: [afmc] CDI.KEYID = 6
22,734,937 UART: [afmc] SUBJECT.KEYID = 7
22,736,158 UART: [afmc] AUTHORITY.KEYID = 5
26,099,363 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,398,953 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,401,212 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,415,741 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,430,519 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,444,856 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,467,413 UART: [afmc] --
28,471,450 UART: [cold-reset] --
28,474,584 UART: [state] Locking Datavault
28,481,731 UART: [state] Locking PCR0, PCR1 and PCR31
28,483,429 UART: [state] Locking ICCM
28,485,683 UART: [exit] Launching FMC @ 0x40000130
28,494,082 UART:
28,494,325 UART: Running Caliptra FMC ...
28,495,433 UART:
28,495,599 UART: [state] CFI Enabled
28,559,492 UART: [fht] FMC Alias Private Key: 7
30,921,072 UART: [art] Extend RT PCRs Done
30,922,299 UART: [art] Lock RT PCRs Done
30,924,033 UART: [art] Populate DV Done
30,929,499 UART: [fht] FMC Alias Private Key: 7
30,931,247 UART: [art] Derive CDI
30,931,984 UART: [art] Store in slot 0x4
30,988,556 UART: [art] Derive Key Pair
30,989,613 UART: [art] Store priv key in slot 0x5
34,281,821 UART: [art] Derive Key Pair - Done
34,294,928 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,583,134 UART: [art] Erasing AUTHORITY.KEYID = 7
36,584,642 UART: [art] PUB.X = 5206945D8747DFE7D64C0B78BA53E5757B02CFAFC96CCB507768E5464EB6D1C2340176C270FF95BCB4723983B581FCAE
36,591,893 UART: [art] PUB.Y = D4AC1D43CA6DE0E09E3F88B49BCEF24B9559CBC62A11C00F3D1C061DE9147E25772CA086BDFD3BC22C3C85A42690A702
36,599,179 UART: [art] SIG.R = 3B3446737651AD5DCC33E9B6670EF551C212113AE1F4537865F23C6152F763CE0B6BC9C8C6FD59E3D29BC5C64D55588E
36,606,559 UART: [art] SIG.S = 48E76FB97FBB4410CCABE00AE4713D23C52E8E77F0D8A59874C4005F2A8620D57351BF6BFB6C6BD401545F5D6C807467
37,911,396 UART: Caliptra RT
37,912,091 UART: [state] CFI Enabled
38,089,523 UART: [rt] RT listening for mailbox commands...
38,091,913 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,247,081 UART: [rt]cmd =0x41544d4e, len=14344
46,745,412 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,804,333 ready_for_fw is high
3,804,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,926,447 >>> mbox cmd response: success
27,630,063 UART:
27,630,526 UART: Running Caliptra FMC ...
27,631,649 UART:
27,631,802 UART: [state] CFI Enabled
27,698,427 UART: [fht] FMC Alias Private Key: 7
30,038,448 UART: [art] Extend RT PCRs Done
30,039,677 UART: [art] Lock RT PCRs Done
30,041,252 UART: [art] Populate DV Done
30,046,701 UART: [fht] FMC Alias Private Key: 7
30,048,355 UART: [art] Derive CDI
30,049,173 UART: [art] Store in slot 0x4
30,106,983 UART: [art] Derive Key Pair
30,108,029 UART: [art] Store priv key in slot 0x5
33,400,778 UART: [art] Derive Key Pair - Done
33,413,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,703,134 UART: [art] Erasing AUTHORITY.KEYID = 7
35,704,634 UART: [art] PUB.X = 19CD61123C89F59BC262DCBB8CAD783FA83D95B9D0858C26D763001F4F8BAF357531DE08A6CBE624DF2E59ED87B8DF16
35,711,880 UART: [art] PUB.Y = C04C36E173E1571F1D72BE96F61BD09683D50002962B5E29FAEF08D6D60883D206B941A18C09CBBE1EB3F029291036CD
35,719,090 UART: [art] SIG.R = 294D2657AF2063DD46EFC0FBD42AD14BA3CF95D418C87DB3D1EAE1E2AE2F15CEC1423F7CBBCE71EE2D4569E47563F2F4
35,726,548 UART: [art] SIG.S = 216BFEA1C858228D7CFD62E960EFB2AAB5DE4837C497B8517334DDEB3254A8236C5CAA3F6EB700789CB182EB579D3E57
37,031,736 UART: Caliptra RT
37,032,431 UART: [state] CFI Enabled
37,208,371 UART: [rt] RT listening for mailbox commands...
37,210,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,366,226 UART: [rt]cmd =0x41544d4e, len=14344
45,916,295 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
192,607 UART:
192,968 UART: Running Caliptra ROM ...
194,163 UART:
603,865 UART: [state] CFI Enabled
620,078 UART: [state] LifecycleState = Unprovisioned
621,933 UART: [state] DebugLocked = No
623,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,608 UART: [kat] SHA2-256
797,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,922 UART: [kat] ++
808,367 UART: [kat] sha1
819,380 UART: [kat] SHA2-256
822,031 UART: [kat] SHA2-384
828,379 UART: [kat] SHA2-512-ACC
830,739 UART: [kat] ECC-384
3,114,145 UART: [kat] HMAC-384Kdf
3,126,103 UART: [kat] LMS
4,316,188 UART: [kat] --
4,318,844 UART: [cold-reset] ++
4,320,988 UART: [fht] Storing FHT @ 0x50003400
4,331,036 UART: [idev] ++
4,331,595 UART: [idev] CDI.KEYID = 6
4,332,548 UART: [idev] SUBJECT.KEYID = 7
4,333,800 UART: [idev] UDS.KEYID = 0
4,334,773 ready_for_fw is high
4,334,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,866 UART: [idev] Erasing UDS.KEYID = 0
7,620,926 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,299 UART: [idev] --
7,646,449 UART: [ldev] ++
7,647,066 UART: [ldev] CDI.KEYID = 6
7,648,002 UART: [ldev] SUBJECT.KEYID = 5
7,649,213 UART: [ldev] AUTHORITY.KEYID = 7
7,650,491 UART: [ldev] FE.KEYID = 1
7,663,271 UART: [ldev] Erasing FE.KEYID = 1
10,949,268 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,656 UART: [ldev] --
13,306,897 UART: [fwproc] Waiting for Commands...
13,308,666 UART: [fwproc] Received command 0x46574c44
13,310,949 UART: [fwproc] Received Image of size 118548 bytes
22,008,475 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,087,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,160,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,489,541 >>> mbox cmd response: success
22,493,971 UART: [afmc] ++
22,494,592 UART: [afmc] CDI.KEYID = 6
22,495,506 UART: [afmc] SUBJECT.KEYID = 7
22,496,779 UART: [afmc] AUTHORITY.KEYID = 5
25,812,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,107,309 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,109,568 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,124,057 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,138,839 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,153,221 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,175,325 UART: [afmc] --
28,178,554 UART: [cold-reset] --
28,181,549 UART: [state] Locking Datavault
28,187,709 UART: [state] Locking PCR0, PCR1 and PCR31
28,189,458 UART: [state] Locking ICCM
28,192,068 UART: [exit] Launching FMC @ 0x40000130
28,200,463 UART:
28,200,695 UART: Running Caliptra FMC ...
28,201,785 UART:
28,201,937 UART: [state] CFI Enabled
28,210,086 UART: [fht] FMC Alias Private Key: 7
30,550,257 UART: [art] Extend RT PCRs Done
30,551,474 UART: [art] Lock RT PCRs Done
30,553,008 UART: [art] Populate DV Done
30,558,260 UART: [fht] FMC Alias Private Key: 7
30,559,835 UART: [art] Derive CDI
30,560,650 UART: [art] Store in slot 0x4
30,603,243 UART: [art] Derive Key Pair
30,604,242 UART: [art] Store priv key in slot 0x5
33,846,272 UART: [art] Derive Key Pair - Done
33,859,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,139,392 UART: [art] Erasing AUTHORITY.KEYID = 7
36,140,892 UART: [art] PUB.X = 2B68DBF0B6883C46B961F630566698838658811A0FACED48114F01229994325D4419724D843FA129F17E566F7DEE0C28
36,148,131 UART: [art] PUB.Y = 03135A829AFD490CB2E73BB1163900BD38E00534D0FC303D7F964535CD3EA41D31A90466D43A848D70DF16326656E788
36,155,361 UART: [art] SIG.R = E4AA4400BC55CA497F0F65B40B5D024AB8313AF8183186EA958F1978389651D250A7448A0BF092B37BF79A76146D613E
36,162,719 UART: [art] SIG.S = 7361309CB4DF85D2FA7AC520A4985B27105ACF2612BC13B7C037C6688004C978603740E014C4D9A75D2D7B41835FEDF2
37,468,540 UART: Caliptra RT
37,469,246 UART: [state] CFI Enabled
37,602,251 UART: [rt] RT listening for mailbox commands...
37,604,661 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,759,938 UART: [rt]cmd =0x41544d4e, len=14344
46,206,376 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
4,124,888 ready_for_fw is high
4,125,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,214,810 >>> mbox cmd response: success
27,855,018 UART:
27,855,451 UART: Running Caliptra FMC ...
27,856,593 UART:
27,856,756 UART: [state] CFI Enabled
27,864,594 UART: [fht] FMC Alias Private Key: 7
30,204,747 UART: [art] Extend RT PCRs Done
30,205,982 UART: [art] Lock RT PCRs Done
30,207,553 UART: [art] Populate DV Done
30,213,104 UART: [fht] FMC Alias Private Key: 7
30,214,753 UART: [art] Derive CDI
30,215,565 UART: [art] Store in slot 0x4
30,258,071 UART: [art] Derive Key Pair
30,259,070 UART: [art] Store priv key in slot 0x5
33,501,687 UART: [art] Derive Key Pair - Done
33,514,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,795,128 UART: [art] Erasing AUTHORITY.KEYID = 7
35,796,641 UART: [art] PUB.X = E5C25209B0B49B42DD820F3157188939E11CC1893A1A8C0180F30DB2FEF2833A6413265277D30CFABDCA89F5CF9377CC
35,803,908 UART: [art] PUB.Y = 63FBB570FED1BC8707FC016CDA7CBBF571D9737466CEB681C6F85B92C4BC98750867D39BB9264A972824435C3780289F
35,811,168 UART: [art] SIG.R = 2FD0A4DF3681DBDF69C055F674898DE5CE6B5B075F738369675BA7299F5569CCD1830F3AAC49A7C9F49ED046A2B3352C
35,818,555 UART: [art] SIG.S = E4C382334A43A6CA03501C0F7921FABCD51E3AAEEEE313C5B8F04402318BA2BA97EFCC3C4E092F8290B6969990AF8431
37,123,760 UART: Caliptra RT
37,124,471 UART: [state] CFI Enabled
37,258,124 UART: [rt] RT listening for mailbox commands...
37,260,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,415,836 UART: [rt]cmd =0x41544d4e, len=14344
45,939,680 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,001 UART:
192,369 UART: Running Caliptra ROM ...
193,700 UART:
193,852 UART: [state] CFI Enabled
262,308 UART: [state] LifecycleState = Unprovisioned
264,244 UART: [state] DebugLocked = No
265,672 UART: [state] WD Timer not started. Device not locked for debugging
269,935 UART: [kat] SHA2-256
449,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,334 UART: [kat] ++
460,853 UART: [kat] sha1
471,244 UART: [kat] SHA2-256
473,973 UART: [kat] SHA2-384
480,599 UART: [kat] SHA2-512-ACC
483,031 UART: [kat] ECC-384
2,946,886 UART: [kat] HMAC-384Kdf
2,972,410 UART: [kat] LMS
3,448,951 UART: [kat] --
3,453,587 UART: [cold-reset] ++
3,456,013 UART: [fht] FHT @ 0x50003400
3,467,557 UART: [idev] ++
3,468,123 UART: [idev] CDI.KEYID = 6
3,469,153 UART: [idev] SUBJECT.KEYID = 7
3,470,324 UART: [idev] UDS.KEYID = 0
3,471,247 ready_for_fw is high
3,471,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,591 UART: [idev] Erasing UDS.KEYID = 0
5,984,875 UART: [idev] Sha1 KeyId Algorithm
6,008,642 UART: [idev] --
6,012,262 UART: [ldev] ++
6,012,891 UART: [ldev] CDI.KEYID = 6
6,013,816 UART: [ldev] SUBJECT.KEYID = 5
6,014,972 UART: [ldev] AUTHORITY.KEYID = 7
6,016,252 UART: [ldev] FE.KEYID = 1
6,058,396 UART: [ldev] Erasing FE.KEYID = 1
8,568,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,912 UART: [ldev] --
10,376,350 UART: [fwproc] Wait for Commands...
10,378,229 UART: [fwproc] Recv command 0x46574c44
10,380,232 UART: [fwproc] Recv'd Img size: 118548 bytes
14,907,355 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,991,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,064,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,392,280 >>> mbox cmd response: success
15,395,976 UART: [afmc] ++
15,396,620 UART: [afmc] CDI.KEYID = 6
15,397,537 UART: [afmc] SUBJECT.KEYID = 7
15,398,761 UART: [afmc] AUTHORITY.KEYID = 5
17,939,435 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,665,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,667,532 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,683,376 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,699,309 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,715,045 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,739,909 UART: [afmc] --
19,743,044 UART: [cold-reset] --
19,745,395 UART: [state] Locking Datavault
19,750,801 UART: [state] Locking PCR0, PCR1 and PCR31
19,752,549 UART: [state] Locking ICCM
19,755,276 UART: [exit] Launching FMC @ 0x40000130
19,763,679 UART:
19,763,913 UART: Running Caliptra FMC ...
19,765,008 UART:
19,765,176 UART: [state] CFI Enabled
19,821,228 UART: [fht] FMC Alias Private Key: 7
21,587,641 UART: [art] Extend RT PCRs Done
21,588,844 UART: [art] Lock RT PCRs Done
21,590,783 UART: [art] Populate DV Done
21,596,242 UART: [fht] FMC Alias Private Key: 7
21,597,719 UART: [art] Derive CDI
21,598,477 UART: [art] Store in slot 0x4
21,653,432 UART: [art] Derive Key Pair
21,654,501 UART: [art] Store priv key in slot 0x5
24,116,962 UART: [art] Derive Key Pair - Done
24,129,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,604 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,104 UART: [art] PUB.X = 7089D0447706E62335EE12693F515C8060BD34830AF1520FB6D583E3B7FF47B505ACCC3D588EBEB68F52DBB057F1DF51
25,851,354 UART: [art] PUB.Y = C0B7F9BA877A4775A3AB7D370BDFDFDCB4BA8FD79F73C74C69FCD4886AACDC761B9AB6D2C9E7CC8FF53752B8954369F1
25,858,634 UART: [art] SIG.R = 117A2668E7C6C6D2845AC6FB5DD8211F01618A101D475B899AE7EBEA77D7867A5595BF0A7F6E5712B227DF00C973045E
25,866,023 UART: [art] SIG.S = 7DA8C8AA93A56C5FBA2296DCCABDE505C17833FC87A17311EA4A0CB5AFF90913EE653C47A494E808EB7FFD6ABA5F8DAE
26,844,831 UART: Caliptra RT
26,845,521 UART: [state] CFI Enabled
27,025,740 UART: [rt] RT listening for mailbox commands...
27,028,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,183,323 UART: [rt]cmd =0x41544d4e, len=14344
32,102,783 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
3,459,845 ready_for_fw is high
3,460,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,377,660 >>> mbox cmd response: success
19,667,985 UART:
19,668,378 UART: Running Caliptra FMC ...
19,669,482 UART:
19,669,630 UART: [state] CFI Enabled
19,734,815 UART: [fht] FMC Alias Private Key: 7
21,501,365 UART: [art] Extend RT PCRs Done
21,502,585 UART: [art] Lock RT PCRs Done
21,504,453 UART: [art] Populate DV Done
21,510,033 UART: [fht] FMC Alias Private Key: 7
21,511,737 UART: [art] Derive CDI
21,512,472 UART: [art] Store in slot 0x4
21,567,888 UART: [art] Derive Key Pair
21,568,922 UART: [art] Store priv key in slot 0x5
24,032,055 UART: [art] Derive Key Pair - Done
24,044,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,757,861 UART: [art] Erasing AUTHORITY.KEYID = 7
25,759,362 UART: [art] PUB.X = 9ABBB00165253DC4B2EA32E3D12D769B77C15EDD1E05B29A02E1732BE629ACDD7AAEC3ADED70BC98771EF1E4C2C08551
25,766,677 UART: [art] PUB.Y = 9E32E84F7084CA4727B999BD99AC975A8AE79907CB9062E412E8F7E385AC345853C126D71EDF25FEA557A8E783E26C18
25,773,936 UART: [art] SIG.R = 9428A1A0371141455B19691881203A830C9241375A71A2117959B41ABA72BE4D88E16CF731519EDCEC9635FED26E8F3E
25,781,320 UART: [art] SIG.S = 0B678F13338FDEFC57E044D0B669F6E4B82454BCD310B51D6BF9207F542A89B9C60FD08D1F0B5BBD80379586CE5F2EB0
26,759,683 UART: Caliptra RT
26,760,396 UART: [state] CFI Enabled
26,940,903 UART: [rt] RT listening for mailbox commands...
26,943,168 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,098,475 UART: [rt]cmd =0x41544d4e, len=14344
32,008,536 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,389 UART:
192,748 UART: Running Caliptra ROM ...
193,870 UART:
603,524 UART: [state] CFI Enabled
615,721 UART: [state] LifecycleState = Unprovisioned
617,660 UART: [state] DebugLocked = No
619,046 UART: [state] WD Timer not started. Device not locked for debugging
623,160 UART: [kat] SHA2-256
802,758 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,550 UART: [kat] ++
814,001 UART: [kat] sha1
826,020 UART: [kat] SHA2-256
828,746 UART: [kat] SHA2-384
834,735 UART: [kat] SHA2-512-ACC
837,275 UART: [kat] ECC-384
3,280,104 UART: [kat] HMAC-384Kdf
3,293,124 UART: [kat] LMS
3,769,637 UART: [kat] --
3,774,707 UART: [cold-reset] ++
3,775,929 UART: [fht] FHT @ 0x50003400
3,786,146 UART: [idev] ++
3,786,786 UART: [idev] CDI.KEYID = 6
3,787,695 UART: [idev] SUBJECT.KEYID = 7
3,788,941 UART: [idev] UDS.KEYID = 0
3,789,867 ready_for_fw is high
3,790,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,943 UART: [idev] Erasing UDS.KEYID = 0
6,263,927 UART: [idev] Sha1 KeyId Algorithm
6,286,440 UART: [idev] --
6,291,923 UART: [ldev] ++
6,292,499 UART: [ldev] CDI.KEYID = 6
6,293,386 UART: [ldev] SUBJECT.KEYID = 5
6,294,544 UART: [ldev] AUTHORITY.KEYID = 7
6,295,885 UART: [ldev] FE.KEYID = 1
6,306,019 UART: [ldev] Erasing FE.KEYID = 1
8,787,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,977 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,840 UART: [ldev] --
10,583,428 UART: [fwproc] Wait for Commands...
10,586,717 UART: [fwproc] Recv command 0x46574c44
10,588,704 UART: [fwproc] Recv'd Img size: 118548 bytes
15,154,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,231,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,304,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,633,419 >>> mbox cmd response: success
15,637,692 UART: [afmc] ++
15,638,327 UART: [afmc] CDI.KEYID = 6
15,639,221 UART: [afmc] SUBJECT.KEYID = 7
15,640,265 UART: [afmc] AUTHORITY.KEYID = 5
18,145,639 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,867,883 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,870,060 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,885,975 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,901,852 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,917,549 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,942,823 UART: [afmc] --
19,946,044 UART: [cold-reset] --
19,950,233 UART: [state] Locking Datavault
19,954,833 UART: [state] Locking PCR0, PCR1 and PCR31
19,956,588 UART: [state] Locking ICCM
19,958,749 UART: [exit] Launching FMC @ 0x40000130
19,967,174 UART:
19,967,413 UART: Running Caliptra FMC ...
19,968,439 UART:
19,968,589 UART: [state] CFI Enabled
19,977,145 UART: [fht] FMC Alias Private Key: 7
21,742,713 UART: [art] Extend RT PCRs Done
21,743,921 UART: [art] Lock RT PCRs Done
21,745,412 UART: [art] Populate DV Done
21,750,938 UART: [fht] FMC Alias Private Key: 7
21,752,587 UART: [art] Derive CDI
21,753,401 UART: [art] Store in slot 0x4
21,796,438 UART: [art] Derive Key Pair
21,797,621 UART: [art] Store priv key in slot 0x5
24,223,669 UART: [art] Derive Key Pair - Done
24,236,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,942,869 UART: [art] Erasing AUTHORITY.KEYID = 7
25,944,364 UART: [art] PUB.X = F18071FA7A21E8A1ACF42249392C974A7717B077776D548CE3335622D0AF654A9F11ABD1246C605521E2719F94CEB1C3
25,951,610 UART: [art] PUB.Y = F86C34E4E2DAEDF44A5FBE5DD5D413E2F850C27DCB55EEA6B4D156A54B17EE8F0A013D0BB22BC8862EE84DFCFF276E72
25,958,941 UART: [art] SIG.R = 9D8C3D312D8FFE16321E77CA9386686F0CBEB10883FDEB074F695BBA9F120C4B0EFC2CAD9D6C3DD47591D5F2B6DF4639
25,966,348 UART: [art] SIG.S = EA1C2DA8E1A19F5C054746EBD014FB17747960D1093F1CBF6355A0C2D4C3D6BB669AEA8A76A14CEEC9219E04AF8A4C4D
26,945,198 UART: Caliptra RT
26,945,904 UART: [state] CFI Enabled
27,079,185 UART: [rt] RT listening for mailbox commands...
27,081,484 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,236,818 UART: [rt]cmd =0x41544d4e, len=14344
32,160,625 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,774,414 ready_for_fw is high
3,774,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,626,833 >>> mbox cmd response: success
19,879,494 UART:
19,879,879 UART: Running Caliptra FMC ...
19,881,088 UART:
19,881,269 UART: [state] CFI Enabled
19,889,052 UART: [fht] FMC Alias Private Key: 7
21,655,650 UART: [art] Extend RT PCRs Done
21,656,882 UART: [art] Lock RT PCRs Done
21,658,299 UART: [art] Populate DV Done
21,663,574 UART: [fht] FMC Alias Private Key: 7
21,665,169 UART: [art] Derive CDI
21,665,922 UART: [art] Store in slot 0x4
21,708,690 UART: [art] Derive Key Pair
21,709,695 UART: [art] Store priv key in slot 0x5
24,137,169 UART: [art] Derive Key Pair - Done
24,150,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,856,417 UART: [art] Erasing AUTHORITY.KEYID = 7
25,857,932 UART: [art] PUB.X = ED486BD9231E56D43C88B367DB83CB926561945231B8D1E4DA090C90A6445E91A34BE75AF7699B139BCA8DB32B6CD01B
25,865,150 UART: [art] PUB.Y = 50774CCAF95B9A02D5DEBB4FA4CF4AE3A1E1F221961E42DAA9A17DB5E8C76A6637CBFBD2427A143236B110C01043BDBD
25,872,437 UART: [art] SIG.R = 61FD834D6048B6BDCE9370F309D45F727A61994D4EE44E86326B396727221EB9F77A790934C063C08A7B27EA321583E5
25,879,847 UART: [art] SIG.S = D5AB4B5E2A1CCFFF530007E74C9DF1B56B923519A14DA3CB443E62980C85F3520B2E1FBCCF128B8DC017139BFAF9C3BA
26,858,522 UART: Caliptra RT
26,859,236 UART: [state] CFI Enabled
26,991,350 UART: [rt] RT listening for mailbox commands...
26,993,665 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,149,018 UART: [rt]cmd =0x41544d4e, len=14344
32,064,280 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,166 UART:
192,514 UART: Running Caliptra ROM ...
193,603 UART:
193,747 UART: [state] CFI Enabled
264,362 UART: [state] LifecycleState = Unprovisioned
266,804 UART: [state] DebugLocked = No
269,468 UART: [state] WD Timer not started. Device not locked for debugging
273,917 UART: [kat] SHA2-256
463,839 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,556 UART: [kat] ++
475,085 UART: [kat] sha1
487,174 UART: [kat] SHA2-256
490,244 UART: [kat] SHA2-384
496,368 UART: [kat] SHA2-512-ACC
498,942 UART: [kat] ECC-384
2,947,604 UART: [kat] HMAC-384Kdf
2,970,777 UART: [kat] LMS
3,502,567 UART: [kat] --
3,505,499 UART: [cold-reset] ++
3,507,207 UART: [fht] FHT @ 0x50003400
3,519,953 UART: [idev] ++
3,520,612 UART: [idev] CDI.KEYID = 6
3,521,644 UART: [idev] SUBJECT.KEYID = 7
3,522,818 UART: [idev] UDS.KEYID = 0
3,524,005 ready_for_fw is high
3,524,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,365 UART: [idev] Erasing UDS.KEYID = 0
6,031,778 UART: [idev] Sha1 KeyId Algorithm
6,055,070 UART: [idev] --
6,060,257 UART: [ldev] ++
6,060,985 UART: [ldev] CDI.KEYID = 6
6,061,866 UART: [ldev] SUBJECT.KEYID = 5
6,063,070 UART: [ldev] AUTHORITY.KEYID = 7
6,064,304 UART: [ldev] FE.KEYID = 1
6,100,087 UART: [ldev] Erasing FE.KEYID = 1
8,604,468 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,459 UART: [ldev] --
10,412,308 UART: [fwproc] Wait for Commands...
10,414,675 UART: [fwproc] Recv command 0x46574c44
10,416,977 UART: [fwproc] Recv'd Img size: 118548 bytes
15,111,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,197,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,321,342 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,882,355 >>> mbox cmd response: success
15,886,162 UART: [afmc] ++
15,886,891 UART: [afmc] CDI.KEYID = 6
15,888,082 UART: [afmc] SUBJECT.KEYID = 7
15,889,522 UART: [afmc] AUTHORITY.KEYID = 5
18,425,443 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,148,891 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,150,797 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,165,911 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,181,122 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,196,182 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,219,566 UART: [afmc] --
20,222,346 UART: [cold-reset] --
20,227,072 UART: [state] Locking Datavault
20,231,471 UART: [state] Locking PCR0, PCR1 and PCR31
20,233,671 UART: [state] Locking ICCM
20,235,006 UART: [exit] Launching FMC @ 0x40000130
20,243,677 UART:
20,243,909 UART: Running Caliptra FMC ...
20,245,007 UART:
20,245,172 UART: [state] CFI Enabled
20,306,670 UART: [fht] FMC Alias Private Key: 7
22,094,238 UART: [art] Extend RT PCRs Done
22,095,461 UART: [art] Lock RT PCRs Done
22,096,911 UART: [art] Populate DV Done
22,102,323 UART: [fht] FMC Alias Private Key: 7
22,103,895 UART: [art] Derive CDI
22,104,713 UART: [art] Store in slot 0x4
22,160,174 UART: [art] Derive Key Pair
22,161,170 UART: [art] Store priv key in slot 0x5
24,624,048 UART: [art] Derive Key Pair - Done
24,637,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,349,032 UART: [art] Erasing AUTHORITY.KEYID = 7
26,350,540 UART: [art] PUB.X = 070606FD624E7B65684E419B731E6BE071C179BEC7AC1D5E7DD2C582273FD8F82D9E5AF2F034E36BBB5A0A309B11CF79
26,357,790 UART: [art] PUB.Y = 36B4833A9455EDCAFF636D9398A70C7274864EE4DC18AFEB49562BED40A347C46876D9DF2AC05CA023465A109380736D
26,365,085 UART: [art] SIG.R = 751632D2B4D3566C7F55CAF95E8124F604ED8FAE62A2740038F79508C8D8931B9D4C759DA9DEC016CEF4FF6BDD726735
26,372,446 UART: [art] SIG.S = E69B0D6353100B977D92DF28B2861275ABA5F6A117EAEF718199D0385EFEADC5F0626BC301EBC0538E415B51FE6C41E4
27,351,256 UART: Caliptra RT
27,351,981 UART: [state] CFI Enabled
27,532,016 UART: [rt] RT listening for mailbox commands...
27,534,309 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,689,772 UART: [rt]cmd =0x41544d4e, len=14344
32,606,976 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,863 writing to cptra_bootfsm_go
3,437,713 ready_for_fw is high
3,438,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,900,038 >>> mbox cmd response: success
20,199,364 UART:
20,199,756 UART: Running Caliptra FMC ...
20,200,866 UART:
20,201,019 UART: [state] CFI Enabled
20,267,317 UART: [fht] FMC Alias Private Key: 7
22,033,401 UART: [art] Extend RT PCRs Done
22,034,633 UART: [art] Lock RT PCRs Done
22,036,217 UART: [art] Populate DV Done
22,041,987 UART: [fht] FMC Alias Private Key: 7
22,043,474 UART: [art] Derive CDI
22,044,238 UART: [art] Store in slot 0x4
22,100,312 UART: [art] Derive Key Pair
22,101,355 UART: [art] Store priv key in slot 0x5
24,564,478 UART: [art] Derive Key Pair - Done
24,577,335 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,290,523 UART: [art] Erasing AUTHORITY.KEYID = 7
26,292,058 UART: [art] PUB.X = D777BA7AEB1EEBCE2D7288487A3F2AB8157EC58B6B32C562E28D9910B33506EC4D868C58196DC0C6C788371F0B1AADA3
26,299,298 UART: [art] PUB.Y = 2A880288E05D65A26BF7525FAF65FFA9E658A271559508F34769215A8AF35B0185BA22595F08D47DA3AA4C084ECF8D6B
26,306,500 UART: [art] SIG.R = EC9DE3C7F555E7288C5873DC6774148BC6370F47B9108406368C7928C9BA320650BA0C78FD20589E04DC3805173080CA
26,313,910 UART: [art] SIG.S = 4956B08D8857B769ADB4C9CBE1820EDAE7FBA9AFCBD8FC1D791B49B63463719F3D09ECEFDF850A3BCA349FA07AB26722
27,293,090 UART: Caliptra RT
27,293,789 UART: [state] CFI Enabled
27,474,567 UART: [rt] RT listening for mailbox commands...
27,476,865 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,632,451 UART: [rt]cmd =0x41544d4e, len=14344
32,550,385 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
192,485 UART:
192,848 UART: Running Caliptra ROM ...
193,990 UART:
603,733 UART: [state] CFI Enabled
620,238 UART: [state] LifecycleState = Unprovisioned
622,604 UART: [state] DebugLocked = No
625,264 UART: [state] WD Timer not started. Device not locked for debugging
630,349 UART: [kat] SHA2-256
820,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,024 UART: [kat] ++
831,484 UART: [kat] sha1
843,426 UART: [kat] SHA2-256
846,434 UART: [kat] SHA2-384
853,568 UART: [kat] SHA2-512-ACC
856,158 UART: [kat] ECC-384
3,297,365 UART: [kat] HMAC-384Kdf
3,309,694 UART: [kat] LMS
3,841,556 UART: [kat] --
3,844,937 UART: [cold-reset] ++
3,847,091 UART: [fht] FHT @ 0x50003400
3,858,149 UART: [idev] ++
3,858,866 UART: [idev] CDI.KEYID = 6
3,859,901 UART: [idev] SUBJECT.KEYID = 7
3,861,008 UART: [idev] UDS.KEYID = 0
3,861,943 ready_for_fw is high
3,862,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,980 UART: [idev] Erasing UDS.KEYID = 0
6,331,020 UART: [idev] Sha1 KeyId Algorithm
6,353,705 UART: [idev] --
6,358,320 UART: [ldev] ++
6,359,063 UART: [ldev] CDI.KEYID = 6
6,360,002 UART: [ldev] SUBJECT.KEYID = 5
6,361,117 UART: [ldev] AUTHORITY.KEYID = 7
6,362,353 UART: [ldev] FE.KEYID = 1
6,375,433 UART: [ldev] Erasing FE.KEYID = 1
8,853,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,261 UART: [ldev] --
10,644,226 UART: [fwproc] Wait for Commands...
10,646,542 UART: [fwproc] Recv command 0x46574c44
10,648,854 UART: [fwproc] Recv'd Img size: 118548 bytes
15,323,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,408,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,532,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,093,282 >>> mbox cmd response: success
16,097,392 UART: [afmc] ++
16,098,130 UART: [afmc] CDI.KEYID = 6
16,099,252 UART: [afmc] SUBJECT.KEYID = 7
16,100,757 UART: [afmc] AUTHORITY.KEYID = 5
18,602,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,325,614 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,327,532 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,342,631 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,357,857 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,372,899 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,395,858 UART: [afmc] --
20,400,220 UART: [cold-reset] --
20,403,775 UART: [state] Locking Datavault
20,410,067 UART: [state] Locking PCR0, PCR1 and PCR31
20,412,232 UART: [state] Locking ICCM
20,414,461 UART: [exit] Launching FMC @ 0x40000130
20,423,105 UART:
20,423,344 UART: Running Caliptra FMC ...
20,424,451 UART:
20,424,617 UART: [state] CFI Enabled
20,432,788 UART: [fht] FMC Alias Private Key: 7
22,199,022 UART: [art] Extend RT PCRs Done
22,200,253 UART: [art] Lock RT PCRs Done
22,201,512 UART: [art] Populate DV Done
22,207,198 UART: [fht] FMC Alias Private Key: 7
22,208,846 UART: [art] Derive CDI
22,209,666 UART: [art] Store in slot 0x4
22,252,268 UART: [art] Derive Key Pair
22,253,273 UART: [art] Store priv key in slot 0x5
24,680,273 UART: [art] Derive Key Pair - Done
24,693,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,399,698 UART: [art] Erasing AUTHORITY.KEYID = 7
26,401,205 UART: [art] PUB.X = 2908FE2ACB77DD78BFE750898DC6DAC2E7A320770BBAC26079EF8BFC0D89C285D6B8B0D2922BFCD7C2E24551809D2C94
26,408,476 UART: [art] PUB.Y = 1A64E8D1575A5038E722662E8BB63DDC6262F744F25CF3DDE0A3A79812359704CF64EAFD6F74FCAB1D06DB1807446D57
26,415,737 UART: [art] SIG.R = 7DC294547C31E6F485FD2089D953AF5128BB4E4EBE825A9718C08F09905F04D3EBB0978F373CDB6EF3CDEEB9432408B6
26,423,115 UART: [art] SIG.S = 5FE949FB05F360E2262347D228461F3CE0B44D8B223E59553E5148A7172B42BE7BE03CDF83427FED3EDB0D0FED1C58EE
27,401,930 UART: Caliptra RT
27,402,622 UART: [state] CFI Enabled
27,535,301 UART: [rt] RT listening for mailbox commands...
27,537,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,693,119 UART: [rt]cmd =0x41544d4e, len=14344
32,604,363 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,752,404 ready_for_fw is high
3,753,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,122,555 >>> mbox cmd response: success
20,375,439 UART:
20,375,846 UART: Running Caliptra FMC ...
20,377,050 UART:
20,377,234 UART: [state] CFI Enabled
20,385,308 UART: [fht] FMC Alias Private Key: 7
22,151,507 UART: [art] Extend RT PCRs Done
22,152,738 UART: [art] Lock RT PCRs Done
22,154,379 UART: [art] Populate DV Done
22,159,838 UART: [fht] FMC Alias Private Key: 7
22,161,456 UART: [art] Derive CDI
22,162,201 UART: [art] Store in slot 0x4
22,205,030 UART: [art] Derive Key Pair
22,206,080 UART: [art] Store priv key in slot 0x5
24,633,148 UART: [art] Derive Key Pair - Done
24,645,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,352,521 UART: [art] Erasing AUTHORITY.KEYID = 7
26,354,029 UART: [art] PUB.X = 5C574724169347E87BB9A06E982442C4A4A08059F5E9C35162DCE934FAB8B56A9CCD41FA55DEC4945487539162D85378
26,361,286 UART: [art] PUB.Y = ECFCACE09114F6D67C015B9BB7E9D7BB116048CC26B834FB610272F046A34C9D349CF49F3617070383523C24C6C847F6
26,368,567 UART: [art] SIG.R = AE8F53B124A97AA8A8E3897600A48A775195946D401EB331F1F53CAB1A58D1BFB4E3996673C156B2196D65936090DB89
26,375,887 UART: [art] SIG.S = 56AC0FE6E5F6B53030A177C660E0B37A1A280860633D9A4953614C40E113A56B1E6105D55B83184262D47E3750741FB6
27,355,410 UART: Caliptra RT
27,356,118 UART: [state] CFI Enabled
27,489,366 UART: [rt] RT listening for mailbox commands...
27,491,698 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,647,075 UART: [rt]cmd =0x41544d4e, len=14344
32,553,075 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,293 UART: [kat] SHA2-256
882,224 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,339 UART: [kat] ++
886,491 UART: [kat] sha1
890,767 UART: [kat] SHA2-256
892,705 UART: [kat] SHA2-384
895,500 UART: [kat] SHA2-512-ACC
897,401 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,704 UART: [kat] LMS
1,475,900 UART: [kat] --
1,476,713 UART: [cold-reset] ++
1,477,081 UART: [fht] Storing FHT @ 0x50003400
1,480,022 UART: [idev] ++
1,480,190 UART: [idev] CDI.KEYID = 6
1,480,550 UART: [idev] SUBJECT.KEYID = 7
1,480,974 UART: [idev] UDS.KEYID = 0
1,481,319 ready_for_fw is high
1,481,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,038 UART: [idev] Erasing UDS.KEYID = 0
1,505,468 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,000 UART: [idev] --
1,515,047 UART: [ldev] ++
1,515,215 UART: [ldev] CDI.KEYID = 6
1,515,578 UART: [ldev] SUBJECT.KEYID = 5
1,516,004 UART: [ldev] AUTHORITY.KEYID = 7
1,516,467 UART: [ldev] FE.KEYID = 1
1,521,397 UART: [ldev] Erasing FE.KEYID = 1
1,547,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,232 UART: [ldev] --
1,586,541 UART: [fwproc] Waiting for Commands...
1,587,304 UART: [fwproc] Received command 0x46574c44
1,588,095 UART: [fwproc] Received Image of size 118548 bytes
5,319,250 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,990 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,378,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,518,541 >>> mbox cmd response: success
5,519,775 UART: [afmc] ++
5,519,943 UART: [afmc] CDI.KEYID = 6
5,520,305 UART: [afmc] SUBJECT.KEYID = 7
5,520,730 UART: [afmc] AUTHORITY.KEYID = 5
5,555,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,572,193 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,572,973 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,578,679 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,584,558 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,590,271 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,598,058 UART: [afmc] --
5,599,010 UART: [cold-reset] --
5,599,978 UART: [state] Locking Datavault
5,601,333 UART: [state] Locking PCR0, PCR1 and PCR31
5,601,937 UART: [state] Locking ICCM
5,602,359 UART: [exit] Launching FMC @ 0x40000130
5,607,689 UART:
5,607,705 UART: Running Caliptra FMC ...
5,608,113 UART:
5,608,167 UART: [state] CFI Enabled
5,618,733 UART: [fht] FMC Alias Private Key: 7
5,737,783 UART: [art] Extend RT PCRs Done
5,738,211 UART: [art] Lock RT PCRs Done
5,740,019 UART: [art] Populate DV Done
5,748,124 UART: [fht] FMC Alias Private Key: 7
5,749,108 UART: [art] Derive CDI
5,749,388 UART: [art] Store in slot 0x4
5,835,050 UART: [art] Derive Key Pair
5,835,410 UART: [art] Store priv key in slot 0x5
5,848,633 UART: [art] Derive Key Pair - Done
5,863,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,889 UART: [art] Erasing AUTHORITY.KEYID = 7
5,879,654 UART: [art] PUB.X = 9F83AECFB81116477B086252E545789E2E43D54C35B548939F24EDF5E8776FEF1BE45463583673241A2D536315F96952
5,886,411 UART: [art] PUB.Y = BBF0063D61811B0D4DDDE021657BA600ADCD4970E694BB477EA62EB74A9CEF3E9B8BCB37DAB5963943D81A08C5993D86
5,893,346 UART: [art] SIG.R = AE1D582880E629090203E89BC203B970709D79773A851B02B69832E25B5C9E955613B0A8FFED8A9D3B9D560213C9B39D
5,900,094 UART: [art] SIG.S = C789D5231C81DF54DCBDA9791D0EDF959853D093F13385B64BF229DE4868E26C4EB697C71C06FB83FD7766B01502BCFD
5,924,217 UART: Caliptra RT
5,924,468 UART: [state] CFI Enabled
6,043,491 UART: [rt] RT listening for mailbox commands...
6,044,161 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,167,399 UART: [rt]cmd =0x41544d4e, len=14344
11,022,257 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,903 ready_for_fw is high
1,362,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,293,039 >>> mbox cmd response: success
5,353,912 UART:
5,353,928 UART: Running Caliptra FMC ...
5,354,336 UART:
5,354,390 UART: [state] CFI Enabled
5,364,948 UART: [fht] FMC Alias Private Key: 7
5,483,076 UART: [art] Extend RT PCRs Done
5,483,504 UART: [art] Lock RT PCRs Done
5,485,122 UART: [art] Populate DV Done
5,493,469 UART: [fht] FMC Alias Private Key: 7
5,494,475 UART: [art] Derive CDI
5,494,755 UART: [art] Store in slot 0x4
5,579,919 UART: [art] Derive Key Pair
5,580,279 UART: [art] Store priv key in slot 0x5
5,594,174 UART: [art] Derive Key Pair - Done
5,608,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,624,294 UART: [art] Erasing AUTHORITY.KEYID = 7
5,625,059 UART: [art] PUB.X = AD92C3B40E3F11A73BE79A0AD1E7CD40F975005CB6074233FFF23D6C56B258E14B933DCCB47ADDCEFCD905BD4927A2B2
5,631,817 UART: [art] PUB.Y = 73737A405680344AE76F76C8C1B73AFBDC1DF7A503A6ABCD917B1A641BB53AFE5085F6D1507D23EC3AB8753195DD86FF
5,638,778 UART: [art] SIG.R = 8EA02047143E9D06C8618FA9B152A6E8BA9F99EED5B8E67B5C07E3A0B8F06754A9F6CCFAEC2EDB7171F1309F5B29501E
5,645,558 UART: [art] SIG.S = E55E4C0219F4BDC249146588B4B592D462EE4DA23BFE0536CEF2ED2762392C409BC3B6B8381298222145054B8CF29072
5,669,353 UART: Caliptra RT
5,669,604 UART: [state] CFI Enabled
5,789,225 UART: [rt] RT listening for mailbox commands...
5,789,895 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,913,255 UART: [rt]cmd =0x41544d4e, len=14344
10,957,999 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,315 UART: [state] LifecycleState = Unprovisioned
85,970 UART: [state] DebugLocked = No
86,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,144 UART: [kat] SHA2-256
882,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,190 UART: [kat] ++
886,342 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
895,001 UART: [kat] SHA2-512-ACC
896,902 UART: [kat] ECC-384
902,615 UART: [kat] HMAC-384Kdf
907,383 UART: [kat] LMS
1,475,579 UART: [kat] --
1,476,402 UART: [cold-reset] ++
1,476,978 UART: [fht] Storing FHT @ 0x50003400
1,479,759 UART: [idev] ++
1,479,927 UART: [idev] CDI.KEYID = 6
1,480,287 UART: [idev] SUBJECT.KEYID = 7
1,480,711 UART: [idev] UDS.KEYID = 0
1,481,056 ready_for_fw is high
1,481,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,893 UART: [idev] Erasing UDS.KEYID = 0
1,505,919 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,541 UART: [idev] --
1,515,638 UART: [ldev] ++
1,515,806 UART: [ldev] CDI.KEYID = 6
1,516,169 UART: [ldev] SUBJECT.KEYID = 5
1,516,595 UART: [ldev] AUTHORITY.KEYID = 7
1,517,058 UART: [ldev] FE.KEYID = 1
1,522,480 UART: [ldev] Erasing FE.KEYID = 1
1,547,973 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,380 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,983 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,081 UART: [ldev] --
1,587,366 UART: [fwproc] Waiting for Commands...
1,588,041 UART: [fwproc] Received command 0x46574c44
1,588,832 UART: [fwproc] Received Image of size 118548 bytes
5,207,100 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,235,792 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,267,010 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,407,399 >>> mbox cmd response: success
5,408,591 UART: [afmc] ++
5,408,759 UART: [afmc] CDI.KEYID = 6
5,409,121 UART: [afmc] SUBJECT.KEYID = 7
5,409,546 UART: [afmc] AUTHORITY.KEYID = 5
5,444,939 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,461,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,462,201 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,467,907 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,473,786 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,479,499 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,487,144 UART: [afmc] --
5,488,026 UART: [cold-reset] --
5,489,060 UART: [state] Locking Datavault
5,490,245 UART: [state] Locking PCR0, PCR1 and PCR31
5,490,849 UART: [state] Locking ICCM
5,491,381 UART: [exit] Launching FMC @ 0x40000130
5,496,711 UART:
5,496,727 UART: Running Caliptra FMC ...
5,497,135 UART:
5,497,278 UART: [state] CFI Enabled
5,508,068 UART: [fht] FMC Alias Private Key: 7
5,626,954 UART: [art] Extend RT PCRs Done
5,627,382 UART: [art] Lock RT PCRs Done
5,629,018 UART: [art] Populate DV Done
5,637,485 UART: [fht] FMC Alias Private Key: 7
5,638,547 UART: [art] Derive CDI
5,638,827 UART: [art] Store in slot 0x4
5,724,403 UART: [art] Derive Key Pair
5,724,763 UART: [art] Store priv key in slot 0x5
5,738,142 UART: [art] Derive Key Pair - Done
5,753,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,768,465 UART: [art] Erasing AUTHORITY.KEYID = 7
5,769,230 UART: [art] PUB.X = 3EA8A4303D1E622F8B4D6F5FBD34A966D4A1E76555CF44742B36871CC2B95289B893229383B367EB24A1B988EF7FB035
5,776,002 UART: [art] PUB.Y = 70DFC4A8BA6F32D0B2081B84D4291FC2D2D01ED487DBB7587A7510C86FB116BB5B7D46DD8E54568A6574EDB9EF7DBA88
5,782,967 UART: [art] SIG.R = 8C5B59343A262A20ED683C5AFB2B402A58496E72DE1C3D67EBDFBEE6C001AED789C4864920C4B45427B096D294B53EC2
5,789,744 UART: [art] SIG.S = C77F0682FEC810000105CE4F6A960E4E3CFCC3C8AE1DC452BB112B8CCD0D1475B1F82958595CC0A249CF62DB232E4D3A
5,813,051 UART: Caliptra RT
5,813,394 UART: [state] CFI Enabled
5,933,569 UART: [rt] RT listening for mailbox commands...
5,934,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,057,243 UART: [rt]cmd =0x41544d4e, len=14344
10,912,709 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.63s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,252 ready_for_fw is high
1,363,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,635,267 >>> mbox cmd response: success
5,697,058 UART:
5,697,074 UART: Running Caliptra FMC ...
5,697,482 UART:
5,697,625 UART: [state] CFI Enabled
5,708,171 UART: [fht] FMC Alias Private Key: 7
5,827,237 UART: [art] Extend RT PCRs Done
5,827,665 UART: [art] Lock RT PCRs Done
5,829,101 UART: [art] Populate DV Done
5,837,620 UART: [fht] FMC Alias Private Key: 7
5,838,552 UART: [art] Derive CDI
5,838,832 UART: [art] Store in slot 0x4
5,924,484 UART: [art] Derive Key Pair
5,924,844 UART: [art] Store priv key in slot 0x5
5,938,489 UART: [art] Derive Key Pair - Done
5,953,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,969,065 UART: [art] Erasing AUTHORITY.KEYID = 7
5,969,830 UART: [art] PUB.X = 0FB04BC2AF37D5D149C05E5091CF87B9D5BB0FD45BAD8BAA5354FA576DB33914206657E2B3DC37B1B446B6FBACA0C715
5,976,614 UART: [art] PUB.Y = C1E54E455925FEE1B5060ACDB9240BA045A8BE8034C83F0797EF04EA9ACBD072FAA691366548786F933D805C3B5B455B
5,983,557 UART: [art] SIG.R = C346A6FD379A93F3063EB2FDF3DC6BCC79446B3A3411F6B09CF0A62CDA99DFF007E5611E3579EC755D2A737C7048A501
5,990,330 UART: [art] SIG.S = D4C05D6BA80B2F81954CA406AABA15E9D8213F91EFB2C8D476C8D2E583F176F359B251B5C416EC3BBD7A641C08EED9D2
6,013,655 UART: Caliptra RT
6,013,998 UART: [state] CFI Enabled
6,134,921 UART: [rt] RT listening for mailbox commands...
6,135,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,258,491 UART: [rt]cmd =0x41544d4e, len=14344
11,000,099 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,393 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,714 UART: [kat] SHA2-256
901,654 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,233 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,652 UART: [fht] FHT @ 0x50003400
1,173,490 UART: [idev] ++
1,173,658 UART: [idev] CDI.KEYID = 6
1,174,019 UART: [idev] SUBJECT.KEYID = 7
1,174,444 UART: [idev] UDS.KEYID = 0
1,174,790 ready_for_fw is high
1,174,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,569 UART: [idev] Erasing UDS.KEYID = 0
1,199,813 UART: [idev] Sha1 KeyId Algorithm
1,208,747 UART: [idev] --
1,209,676 UART: [ldev] ++
1,209,844 UART: [ldev] CDI.KEYID = 6
1,210,208 UART: [ldev] SUBJECT.KEYID = 5
1,210,635 UART: [ldev] AUTHORITY.KEYID = 7
1,211,098 UART: [ldev] FE.KEYID = 1
1,216,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,481 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,197 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,936 UART: [ldev] --
1,282,197 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 118548 bytes
3,157,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,185,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,216,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,356,730 >>> mbox cmd response: success
3,357,846 UART: [afmc] ++
3,358,014 UART: [afmc] CDI.KEYID = 6
3,358,377 UART: [afmc] SUBJECT.KEYID = 7
3,358,803 UART: [afmc] AUTHORITY.KEYID = 5
3,393,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,410,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,410,948 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,416,655 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,422,532 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,428,242 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,435,794 UART: [afmc] --
3,436,775 UART: [cold-reset] --
3,437,617 UART: [state] Locking Datavault
3,438,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,439,384 UART: [state] Locking ICCM
3,440,030 UART: [exit] Launching FMC @ 0x40000130
3,445,360 UART:
3,445,376 UART: Running Caliptra FMC ...
3,445,784 UART:
3,445,838 UART: [state] CFI Enabled
3,456,304 UART: [fht] FMC Alias Private Key: 7
3,575,216 UART: [art] Extend RT PCRs Done
3,575,644 UART: [art] Lock RT PCRs Done
3,576,894 UART: [art] Populate DV Done
3,585,003 UART: [fht] FMC Alias Private Key: 7
3,586,179 UART: [art] Derive CDI
3,586,459 UART: [art] Store in slot 0x4
3,672,018 UART: [art] Derive Key Pair
3,672,378 UART: [art] Store priv key in slot 0x5
3,685,614 UART: [art] Derive Key Pair - Done
3,700,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,715,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,716,511 UART: [art] PUB.X = 375066AADDE2BC56B92853B062345B58E5FBA6ACC169967F0DBF1C42E93E575B6135D3FFB91FB10DCBD0C4786E850F39
3,723,286 UART: [art] PUB.Y = F3774E611F83E9734DC8DEDD4217DB7F884D456B7AB88AA47FB1A23CBEC8677A4070DE7C2C544E89612B073B1379E788
3,730,241 UART: [art] SIG.R = EAFCB7CBDD2DB04E8A4F0C2E8CAF2FC50C39A8370053687A0FD1D912604B9376F109F33F5469B5A55F7A0564B72AE654
3,736,988 UART: [art] SIG.S = D690E9998D57FF14416EE0242630CC22C8C7B832FC1D2B2EF2B3A4936AA7B322235874EB5EFE9206BA2559B09BF94927
3,760,043 UART: Caliptra RT
3,760,294 UART: [state] CFI Enabled
3,881,135 UART: [rt] RT listening for mailbox commands...
3,881,805 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,004,583 UART: [rt]cmd =0x41544d4e, len=14344
5,443,233 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,474 ready_for_fw is high
1,059,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,637 >>> mbox cmd response: success
3,280,622 UART:
3,280,638 UART: Running Caliptra FMC ...
3,281,046 UART:
3,281,100 UART: [state] CFI Enabled
3,291,634 UART: [fht] FMC Alias Private Key: 7
3,410,510 UART: [art] Extend RT PCRs Done
3,410,938 UART: [art] Lock RT PCRs Done
3,412,472 UART: [art] Populate DV Done
3,420,583 UART: [fht] FMC Alias Private Key: 7
3,421,613 UART: [art] Derive CDI
3,421,893 UART: [art] Store in slot 0x4
3,508,144 UART: [art] Derive Key Pair
3,508,504 UART: [art] Store priv key in slot 0x5
3,521,892 UART: [art] Derive Key Pair - Done
3,536,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,420 UART: [art] PUB.X = 3B7574895C3F9F5580D462128CEAEDC9443952075C5C5274C43D58B3944C623AF2427181C16007BD302EF99EA086F994
3,559,176 UART: [art] PUB.Y = 2317D7BD9A5D41B71684914A386A9264C300316708C6C2D124A9134D4B3323BC1DE58E12BB270EE0456D887DF13C0B27
3,566,091 UART: [art] SIG.R = ECBE1B5F21282EF5BD7BF3AFE28B2BF02E360E4FA7CF5F02C2F0359AEB5CF847AAAF00BAD23A7019A54CB8522C48D3D2
3,572,863 UART: [art] SIG.S = 46B36DA755CB9C7A98EE8A90109631B968C4D07024F7755D4A5D41D73DD946775F694D4EA06009B4BFB8E49A97872D8D
3,596,498 UART: Caliptra RT
3,596,749 UART: [state] CFI Enabled
3,717,521 UART: [rt] RT listening for mailbox commands...
3,718,191 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,101 UART: [rt]cmd =0x41544d4e, len=14344
5,289,895 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,130 UART: [state] WD Timer not started. Device not locked for debugging
88,359 UART: [kat] SHA2-256
891,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,013 UART: [kat] ++
896,165 UART: [kat] sha1
900,541 UART: [kat] SHA2-256
902,481 UART: [kat] SHA2-384
905,426 UART: [kat] SHA2-512-ACC
907,327 UART: [kat] ECC-384
917,432 UART: [kat] HMAC-384Kdf
921,954 UART: [kat] LMS
1,170,266 UART: [kat] --
1,171,241 UART: [cold-reset] ++
1,171,579 UART: [fht] FHT @ 0x50003400
1,174,163 UART: [idev] ++
1,174,331 UART: [idev] CDI.KEYID = 6
1,174,692 UART: [idev] SUBJECT.KEYID = 7
1,175,117 UART: [idev] UDS.KEYID = 0
1,175,463 ready_for_fw is high
1,175,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,024 UART: [idev] Erasing UDS.KEYID = 0
1,200,234 UART: [idev] Sha1 KeyId Algorithm
1,209,018 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,044 UART: [ldev] AUTHORITY.KEYID = 7
1,211,507 UART: [ldev] FE.KEYID = 1
1,216,891 UART: [ldev] Erasing FE.KEYID = 1
1,243,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,221 UART: [ldev] --
1,282,492 UART: [fwproc] Wait for Commands...
1,283,095 UART: [fwproc] Recv command 0x46574c44
1,283,828 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,376 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,932 >>> mbox cmd response: success
3,376,012 UART: [afmc] ++
3,376,180 UART: [afmc] CDI.KEYID = 6
3,376,543 UART: [afmc] SUBJECT.KEYID = 7
3,376,969 UART: [afmc] AUTHORITY.KEYID = 5
3,412,004 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,749 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,498 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,205 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,082 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,792 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,418 UART: [afmc] --
3,455,445 UART: [cold-reset] --
3,456,383 UART: [state] Locking Datavault
3,457,712 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,316 UART: [state] Locking ICCM
3,458,916 UART: [exit] Launching FMC @ 0x40000130
3,464,246 UART:
3,464,262 UART: Running Caliptra FMC ...
3,464,670 UART:
3,464,813 UART: [state] CFI Enabled
3,475,555 UART: [fht] FMC Alias Private Key: 7
3,594,847 UART: [art] Extend RT PCRs Done
3,595,275 UART: [art] Lock RT PCRs Done
3,596,821 UART: [art] Populate DV Done
3,604,816 UART: [fht] FMC Alias Private Key: 7
3,605,780 UART: [art] Derive CDI
3,606,060 UART: [art] Store in slot 0x4
3,691,675 UART: [art] Derive Key Pair
3,692,035 UART: [art] Store priv key in slot 0x5
3,705,913 UART: [art] Derive Key Pair - Done
3,720,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,386 UART: [art] PUB.X = D3B8300FC301DBD7D3FDD038AEB86491BD1C98135EA0C668F2DDFB7241C323EDB7EBDFA5EB6311339AD79829795675E5
3,743,166 UART: [art] PUB.Y = 4F516F1B483C86AB83AED5C3DB9EC7D6C8B4C3A44065833A2A04BE7DD6BC02D7B12AC842B85B917B3C6680D089F77B7B
3,750,126 UART: [art] SIG.R = AA1894B8B53D4E6101C16317AF835E485FA6BE03375B86C9B7EDAD4342630AD3D0F799399E2BF57802EB7EE32BA07BCE
3,756,896 UART: [art] SIG.S = B9B89253D44ECEE4EA6E2DE99862F844A96618EE3AF4ADB447DEE410E15BF6BFC7B46AFD54C8AA7DC754745693F5F4F6
3,780,768 UART: Caliptra RT
3,781,111 UART: [state] CFI Enabled
3,902,072 UART: [rt] RT listening for mailbox commands...
3,902,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,684 UART: [rt]cmd =0x41544d4e, len=14344
5,482,769 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,709 ready_for_fw is high
1,058,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,885 >>> mbox cmd response: success
3,284,932 UART:
3,284,948 UART: Running Caliptra FMC ...
3,285,356 UART:
3,285,499 UART: [state] CFI Enabled
3,296,087 UART: [fht] FMC Alias Private Key: 7
3,414,811 UART: [art] Extend RT PCRs Done
3,415,239 UART: [art] Lock RT PCRs Done
3,416,489 UART: [art] Populate DV Done
3,424,756 UART: [fht] FMC Alias Private Key: 7
3,425,834 UART: [art] Derive CDI
3,426,114 UART: [art] Store in slot 0x4
3,511,965 UART: [art] Derive Key Pair
3,512,325 UART: [art] Store priv key in slot 0x5
3,525,707 UART: [art] Derive Key Pair - Done
3,540,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,996 UART: [art] PUB.X = C7025C6F4C615DFE8D4F1A88BDF9F5B50A0C5027A5642378385B814597F2F39086E860DF0C2F89DAF88FB5496B980933
3,563,753 UART: [art] PUB.Y = A18775C3BF0040B34A1BC0784E8A6C49CDD6E3028016CFDAC10042F174D187CA3816DBA4BD35004BA33CEF9B434C84F5
3,570,646 UART: [art] SIG.R = 36D83DB501CAD0587951BC962072AE28757588AA53CF893716404F6FA255AC065970FB6C447A6F1F52D508AE74370A8D
3,577,402 UART: [art] SIG.S = 540404D861CD9E0D6465CEEFADDCF99BF44644C9EB90AF50FC7F09D170718D5F50ED932160DEDDB8DE770D684F481D5E
3,600,695 UART: Caliptra RT
3,601,038 UART: [state] CFI Enabled
3,720,656 UART: [rt] RT listening for mailbox commands...
3,721,326 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,546 UART: [rt]cmd =0x41544d4e, len=14344
5,288,404 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
893,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,411 UART: [kat] ++
897,563 UART: [kat] sha1
901,707 UART: [kat] SHA2-256
903,647 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,472 UART: [kat] LMS
1,170,800 UART: [kat] --
1,171,575 UART: [cold-reset] ++
1,172,095 UART: [fht] FHT @ 0x50003400
1,174,838 UART: [idev] ++
1,175,006 UART: [idev] CDI.KEYID = 6
1,175,366 UART: [idev] SUBJECT.KEYID = 7
1,175,790 UART: [idev] UDS.KEYID = 0
1,176,135 ready_for_fw is high
1,176,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,954 UART: [idev] Erasing UDS.KEYID = 0
1,200,885 UART: [idev] Sha1 KeyId Algorithm
1,209,409 UART: [idev] --
1,210,533 UART: [ldev] ++
1,210,701 UART: [ldev] CDI.KEYID = 6
1,211,064 UART: [ldev] SUBJECT.KEYID = 5
1,211,490 UART: [ldev] AUTHORITY.KEYID = 7
1,211,953 UART: [ldev] FE.KEYID = 1
1,217,167 UART: [ldev] Erasing FE.KEYID = 1
1,243,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,400 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,632 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,365,901 >>> mbox cmd response: success
3,366,987 UART: [afmc] ++
3,367,155 UART: [afmc] CDI.KEYID = 6
3,367,517 UART: [afmc] SUBJECT.KEYID = 7
3,367,942 UART: [afmc] AUTHORITY.KEYID = 5
3,403,065 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,419,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,480 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,186 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,065 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,437,775 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,445,454 UART: [afmc] --
3,446,574 UART: [cold-reset] --
3,447,258 UART: [state] Locking Datavault
3,448,313 UART: [state] Locking PCR0, PCR1 and PCR31
3,448,917 UART: [state] Locking ICCM
3,449,399 UART: [exit] Launching FMC @ 0x40000130
3,454,729 UART:
3,454,745 UART: Running Caliptra FMC ...
3,455,153 UART:
3,455,207 UART: [state] CFI Enabled
3,465,753 UART: [fht] FMC Alias Private Key: 7
3,584,811 UART: [art] Extend RT PCRs Done
3,585,239 UART: [art] Lock RT PCRs Done
3,587,165 UART: [art] Populate DV Done
3,595,216 UART: [fht] FMC Alias Private Key: 7
3,596,322 UART: [art] Derive CDI
3,596,602 UART: [art] Store in slot 0x4
3,682,243 UART: [art] Derive Key Pair
3,682,603 UART: [art] Store priv key in slot 0x5
3,696,177 UART: [art] Derive Key Pair - Done
3,710,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,923 UART: [art] PUB.X = A83DAF9C9E6FF07E402C8ADAA9D5CAF2C95690FE3E6F8EA657FF531F3F2B0E085DF0A2170A1B2DA3258B4A5AD3FBE694
3,733,712 UART: [art] PUB.Y = 7C587311BBCFC807B974C679AFBF44D4FB4A5CFE671C2A9162A706FC1BA8F5B9C9A4E9D5069B32A2F2A5C1348B450E58
3,740,666 UART: [art] SIG.R = 0C6FDBD2AD7D1F3216706E4A73CEF02D06FDE9BAC42C1474C956243D89E7A115EF41C0A40E941BA62D5E02D0FB1C509B
3,747,442 UART: [art] SIG.S = DB52C8CA4B3C427738CB3D9EDFDBD18A80CA633D59C939B603EC721B649DCCB5F1EC87302C774A6A7EB83F29FC3CA6BF
3,771,651 UART: Caliptra RT
3,771,902 UART: [state] CFI Enabled
3,891,180 UART: [rt] RT listening for mailbox commands...
3,891,850 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,076 UART: [rt]cmd =0x41544d4e, len=14344
5,482,333 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,075 ready_for_fw is high
1,060,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,208,715 >>> mbox cmd response: success
3,270,710 UART:
3,270,726 UART: Running Caliptra FMC ...
3,271,134 UART:
3,271,188 UART: [state] CFI Enabled
3,281,804 UART: [fht] FMC Alias Private Key: 7
3,400,522 UART: [art] Extend RT PCRs Done
3,400,950 UART: [art] Lock RT PCRs Done
3,402,404 UART: [art] Populate DV Done
3,410,637 UART: [fht] FMC Alias Private Key: 7
3,411,767 UART: [art] Derive CDI
3,412,047 UART: [art] Store in slot 0x4
3,497,676 UART: [art] Derive Key Pair
3,498,036 UART: [art] Store priv key in slot 0x5
3,511,356 UART: [art] Derive Key Pair - Done
3,526,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,541,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,542,375 UART: [art] PUB.X = C725E576A5A30A4D9F89CA1DE8A151214EDB1C43146148B73C7698C65635D964E46FEFC8BCA085F46FEB0502B4A5D907
3,549,141 UART: [art] PUB.Y = 1EEFDEE4728C1D4EB9649B37AEF90DF7F601F332C1585E5C47BD1866ACC5D9D703502460256BD8619680734B5B333A3C
3,556,088 UART: [art] SIG.R = 274B434332D846BBA8CF9E7488675E3320197CEE9F932C227A0F57F4FC0429718D10F39574CB28936D8537CD9959E101
3,562,841 UART: [art] SIG.S = 5741060C5EAA5CCDA53599F1C8D8491A9C8A14C2F26D362EA1A0338956F32DC1888D7212F65FCC7575D688492D098EB6
3,586,718 UART: Caliptra RT
3,586,969 UART: [state] CFI Enabled
3,705,867 UART: [rt] RT listening for mailbox commands...
3,706,537 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,829,673 UART: [rt]cmd =0x41544d4e, len=14344
5,278,597 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
893,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,822 UART: [kat] ++
897,974 UART: [kat] sha1
901,996 UART: [kat] SHA2-256
903,936 UART: [kat] SHA2-384
906,697 UART: [kat] SHA2-512-ACC
908,598 UART: [kat] ECC-384
918,237 UART: [kat] HMAC-384Kdf
922,739 UART: [kat] LMS
1,171,067 UART: [kat] --
1,171,926 UART: [cold-reset] ++
1,172,348 UART: [fht] FHT @ 0x50003400
1,175,101 UART: [idev] ++
1,175,269 UART: [idev] CDI.KEYID = 6
1,175,629 UART: [idev] SUBJECT.KEYID = 7
1,176,053 UART: [idev] UDS.KEYID = 0
1,176,398 ready_for_fw is high
1,176,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,133 UART: [idev] Erasing UDS.KEYID = 0
1,201,388 UART: [idev] Sha1 KeyId Algorithm
1,209,796 UART: [idev] --
1,210,922 UART: [ldev] ++
1,211,090 UART: [ldev] CDI.KEYID = 6
1,211,453 UART: [ldev] SUBJECT.KEYID = 5
1,211,879 UART: [ldev] AUTHORITY.KEYID = 7
1,212,342 UART: [ldev] FE.KEYID = 1
1,217,640 UART: [ldev] Erasing FE.KEYID = 1
1,244,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,508 UART: [ldev] --
1,283,815 UART: [fwproc] Wait for Commands...
1,284,619 UART: [fwproc] Recv command 0x46574c44
1,285,347 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,820 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,990 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,321 >>> mbox cmd response: success
3,372,535 UART: [afmc] ++
3,372,703 UART: [afmc] CDI.KEYID = 6
3,373,065 UART: [afmc] SUBJECT.KEYID = 7
3,373,490 UART: [afmc] AUTHORITY.KEYID = 5
3,409,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,552 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,300 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,006 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,885 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,595 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,362 UART: [afmc] --
3,452,434 UART: [cold-reset] --
3,453,388 UART: [state] Locking Datavault
3,454,311 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,915 UART: [state] Locking ICCM
3,455,401 UART: [exit] Launching FMC @ 0x40000130
3,460,731 UART:
3,460,747 UART: Running Caliptra FMC ...
3,461,155 UART:
3,461,298 UART: [state] CFI Enabled
3,471,630 UART: [fht] FMC Alias Private Key: 7
3,590,856 UART: [art] Extend RT PCRs Done
3,591,284 UART: [art] Lock RT PCRs Done
3,593,144 UART: [art] Populate DV Done
3,601,493 UART: [fht] FMC Alias Private Key: 7
3,602,445 UART: [art] Derive CDI
3,602,725 UART: [art] Store in slot 0x4
3,688,308 UART: [art] Derive Key Pair
3,688,668 UART: [art] Store priv key in slot 0x5
3,702,586 UART: [art] Derive Key Pair - Done
3,717,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,732,972 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,737 UART: [art] PUB.X = E98BDFE998B36615A215E43DC3C1C14AA08B6E0923FFE87A37E8E2A0A4674199CAFD997002C6D85C8C286D46EFC8FCC9
3,740,517 UART: [art] PUB.Y = DC59153938724157B97DF80621E35C555CF5686358E714880C0B8C44663914654C53273D1EC9EA9716C1B69F63131DFE
3,747,446 UART: [art] SIG.R = 3122A372E78F0BBC8E791E7515B1A7569C5DA71260F421CECD8BC837D103B3D6912D69BA7C57F998D20DFD9B9CAC2093
3,754,217 UART: [art] SIG.S = F282AB0617D339AA722B85677BC42D983F1788DFB64BA222CA9ACBF0F552692115A9F50A89FFCF37464E28555FCA2629
3,778,081 UART: Caliptra RT
3,778,424 UART: [state] CFI Enabled
3,898,588 UART: [rt] RT listening for mailbox commands...
3,899,258 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,270 UART: [rt]cmd =0x41544d4e, len=14344
5,473,747 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,848 ready_for_fw is high
1,060,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,324 >>> mbox cmd response: success
3,278,757 UART:
3,278,773 UART: Running Caliptra FMC ...
3,279,181 UART:
3,279,324 UART: [state] CFI Enabled
3,290,200 UART: [fht] FMC Alias Private Key: 7
3,409,412 UART: [art] Extend RT PCRs Done
3,409,840 UART: [art] Lock RT PCRs Done
3,411,470 UART: [art] Populate DV Done
3,419,869 UART: [fht] FMC Alias Private Key: 7
3,420,839 UART: [art] Derive CDI
3,421,119 UART: [art] Store in slot 0x4
3,506,808 UART: [art] Derive Key Pair
3,507,168 UART: [art] Store priv key in slot 0x5
3,520,624 UART: [art] Derive Key Pair - Done
3,535,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,353 UART: [art] PUB.X = 73A0E87C3C4068A19FAF17FF91EC64D0F49A740D40DF8C99F949D2D2BD630ED38FE7AD2C647BB53C933E11AAEC6AC67E
3,558,139 UART: [art] PUB.Y = BB7F59C00EE4E62EFC0FD267814237FBE202C97A83C3E494075DE7AC2154545A7A014E5669DDFD3CF5EA7EF746D76871
3,565,086 UART: [art] SIG.R = F178F3B62CE720689F8B30F1142632279552A36FE621056374099941430ACA8C82CF7F3EC2AA8B2AB59FBB6351480AE9
3,571,842 UART: [art] SIG.S = 25E03371FEC394264D606B4753310822F1C38A1E28774C139760D69FC3F926E1C1E73EBC8D6A479AFB379F2E97B4392C
3,595,403 UART: Caliptra RT
3,595,746 UART: [state] CFI Enabled
3,714,786 UART: [rt] RT listening for mailbox commands...
3,715,456 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,460 UART: [rt]cmd =0x41544d4e, len=14344
5,287,718 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,177 UART:
192,530 UART: Running Caliptra ROM ...
193,633 UART:
193,777 UART: [state] CFI Enabled
263,917 UART: [state] LifecycleState = Unprovisioned
265,804 UART: [state] DebugLocked = No
268,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,741 UART: [kat] SHA2-256
442,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,900 UART: [kat] ++
453,432 UART: [kat] sha1
465,121 UART: [kat] SHA2-256
467,802 UART: [kat] SHA2-384
473,729 UART: [kat] SHA2-512-ACC
476,102 UART: [kat] ECC-384
2,770,309 UART: [kat] HMAC-384Kdf
2,802,632 UART: [kat] LMS
3,992,964 UART: [kat] --
3,996,987 UART: [cold-reset] ++
3,998,425 UART: [fht] Storing FHT @ 0x50003400
4,010,258 UART: [idev] ++
4,010,828 UART: [idev] CDI.KEYID = 6
4,011,862 UART: [idev] SUBJECT.KEYID = 7
4,013,038 UART: [idev] UDS.KEYID = 0
4,014,012 ready_for_fw is high
4,014,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,782 UART: [idev] Erasing UDS.KEYID = 0
7,348,096 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,583 UART: [idev] --
7,374,797 UART: [ldev] ++
7,375,365 UART: [ldev] CDI.KEYID = 6
7,376,384 UART: [ldev] SUBJECT.KEYID = 5
7,377,542 UART: [ldev] AUTHORITY.KEYID = 7
7,378,826 UART: [ldev] FE.KEYID = 1
7,426,511 UART: [ldev] Erasing FE.KEYID = 1
10,759,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,858 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,103,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,118,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,137,232 UART: [ldev] --
13,142,559 UART: [fwproc] Waiting for Commands...
13,145,514 UART: [fwproc] Received command 0x46574c44
13,147,750 UART: [fwproc] Received Image of size 118548 bytes
21,912,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,993,260 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,066,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,394,953 >>> mbox cmd response: success
22,398,791 UART: [afmc] ++
22,399,445 UART: [afmc] CDI.KEYID = 6
22,400,339 UART: [afmc] SUBJECT.KEYID = 7
22,401,559 UART: [afmc] AUTHORITY.KEYID = 5
25,768,950 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,069,987 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,072,279 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,086,746 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,101,593 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,115,938 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,136,162 UART: [afmc] --
28,140,288 UART: [cold-reset] --
28,144,605 UART: [state] Locking Datavault
28,151,152 UART: [state] Locking PCR0, PCR1 and PCR31
28,152,914 UART: [state] Locking ICCM
28,154,072 UART: [exit] Launching FMC @ 0x40000130
28,162,472 UART:
28,162,708 UART: Running Caliptra FMC ...
28,163,808 UART:
28,163,967 UART: [state] CFI Enabled
28,230,227 UART: [fht] FMC Alias Private Key: 7
30,571,228 UART: [art] Extend RT PCRs Done
30,572,466 UART: [art] Lock RT PCRs Done
30,574,228 UART: [art] Populate DV Done
30,579,748 UART: [fht] FMC Alias Private Key: 7
30,581,232 UART: [art] Derive CDI
30,581,999 UART: [art] Store in slot 0x4
30,639,158 UART: [art] Derive Key Pair
30,640,224 UART: [art] Store priv key in slot 0x5
33,933,149 UART: [art] Derive Key Pair - Done
33,945,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,234,801 UART: [art] Erasing AUTHORITY.KEYID = 7
36,236,311 UART: [art] PUB.X = 8CAA4714790211CD7BDDBE4CDC3C18B5CFD59A1BC871625B01FB774EBE45D0B84DDE6B4CC45B7F214EE6AB7A8DB21F1F
36,243,599 UART: [art] PUB.Y = 5D614173BBE1F5BA579C9A8C032737790CE9D7CF63B362292AA8D916A268439E5AB45C6450BF37BDCEFF2A33F5372240
36,250,826 UART: [art] SIG.R = 84E3004B7AAAD0514DED4B83FE90B436F214EC646212AF117F773D96CB8EE25D5CBDA645242171A9D2F8145E12DBF02A
36,258,207 UART: [art] SIG.S = 5064A05003BFD88A03656F55EB9E7182EF423F7A141E461B737B6EE564F03A0B5BA15EECFF1037608F1F157872CE3D2D
37,563,663 UART: Caliptra RT
37,564,370 UART: [state] CFI Enabled
37,741,203 UART: [rt] RT listening for mailbox commands...
37,743,498 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,898,649 UART: [rt]cmd =0x41544d4e, len=14344
42,093,075 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
3,785,420 ready_for_fw is high
3,785,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,941,445 >>> mbox cmd response: success
27,639,368 UART:
27,639,753 UART: Running Caliptra FMC ...
27,640,902 UART:
27,641,070 UART: [state] CFI Enabled
27,710,888 UART: [fht] FMC Alias Private Key: 7
30,051,105 UART: [art] Extend RT PCRs Done
30,052,332 UART: [art] Lock RT PCRs Done
30,054,074 UART: [art] Populate DV Done
30,059,364 UART: [fht] FMC Alias Private Key: 7
30,061,070 UART: [art] Derive CDI
30,061,893 UART: [art] Store in slot 0x4
30,119,978 UART: [art] Derive Key Pair
30,121,017 UART: [art] Store priv key in slot 0x5
33,413,576 UART: [art] Derive Key Pair - Done
33,426,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,715,072 UART: [art] Erasing AUTHORITY.KEYID = 7
35,716,618 UART: [art] PUB.X = 0A0957136BC52567FD713B8680ADD1AD7D74AAE398F19028DF86CD1D059C9F85114F5AD5F8DC3B403CE85696D2A03DEF
35,723,876 UART: [art] PUB.Y = 2668DD429266ED247DF520C0082F9EF980639D1337EC555EAD38CF2834463A3217DBDD1545106456C93942F3444EA941
35,731,105 UART: [art] SIG.R = D62E0739A205AF2697D7EBD5135D1F262DE517FD2CA2C66898261CDDADFBB4DD8E3A2ED299795CE28AA76DF2C7E37B5A
35,738,505 UART: [art] SIG.S = 1C0D706A116026A5F64940396C799806E02DBE4FE50476486BFA636999C8BFF5417AFC40DF95C326458F4F0059FF2972
37,043,431 UART: Caliptra RT
37,044,150 UART: [state] CFI Enabled
37,222,440 UART: [rt] RT listening for mailbox commands...
37,224,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,379,884 UART: [rt]cmd =0x41544d4e, len=14344
41,574,653 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,329 UART:
192,719 UART: Running Caliptra ROM ...
193,852 UART:
603,624 UART: [state] CFI Enabled
617,714 UART: [state] LifecycleState = Unprovisioned
619,636 UART: [state] DebugLocked = No
621,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,265 UART: [kat] SHA2-256
796,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,549 UART: [kat] ++
806,996 UART: [kat] sha1
818,787 UART: [kat] SHA2-256
821,513 UART: [kat] SHA2-384
827,503 UART: [kat] SHA2-512-ACC
829,860 UART: [kat] ECC-384
3,113,321 UART: [kat] HMAC-384Kdf
3,124,697 UART: [kat] LMS
4,314,842 UART: [kat] --
4,319,860 UART: [cold-reset] ++
4,321,602 UART: [fht] Storing FHT @ 0x50003400
4,333,501 UART: [idev] ++
4,334,070 UART: [idev] CDI.KEYID = 6
4,335,053 UART: [idev] SUBJECT.KEYID = 7
4,336,294 UART: [idev] UDS.KEYID = 0
4,337,222 ready_for_fw is high
4,337,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,283 UART: [idev] Erasing UDS.KEYID = 0
7,628,654 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,573 UART: [idev] --
7,656,244 UART: [ldev] ++
7,656,818 UART: [ldev] CDI.KEYID = 6
7,657,775 UART: [ldev] SUBJECT.KEYID = 5
7,658,982 UART: [ldev] AUTHORITY.KEYID = 7
7,660,263 UART: [ldev] FE.KEYID = 1
7,671,605 UART: [ldev] Erasing FE.KEYID = 1
10,956,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,653 UART: [ldev] --
13,314,674 UART: [fwproc] Waiting for Commands...
13,317,192 UART: [fwproc] Received command 0x46574c44
13,319,363 UART: [fwproc] Received Image of size 118548 bytes
22,167,858 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,245,059 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,318,236 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,646,052 >>> mbox cmd response: success
22,649,460 UART: [afmc] ++
22,650,075 UART: [afmc] CDI.KEYID = 6
22,650,994 UART: [afmc] SUBJECT.KEYID = 7
22,652,224 UART: [afmc] AUTHORITY.KEYID = 5
25,968,329 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,265,436 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,267,740 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,282,219 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,297,005 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,311,408 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,333,512 UART: [afmc] --
28,337,530 UART: [cold-reset] --
28,341,706 UART: [state] Locking Datavault
28,346,460 UART: [state] Locking PCR0, PCR1 and PCR31
28,348,212 UART: [state] Locking ICCM
28,350,658 UART: [exit] Launching FMC @ 0x40000130
28,359,046 UART:
28,359,276 UART: Running Caliptra FMC ...
28,360,370 UART:
28,360,545 UART: [state] CFI Enabled
28,369,231 UART: [fht] FMC Alias Private Key: 7
30,708,745 UART: [art] Extend RT PCRs Done
30,709,967 UART: [art] Lock RT PCRs Done
30,711,669 UART: [art] Populate DV Done
30,717,127 UART: [fht] FMC Alias Private Key: 7
30,718,722 UART: [art] Derive CDI
30,719,532 UART: [art] Store in slot 0x4
30,762,269 UART: [art] Derive Key Pair
30,763,314 UART: [art] Store priv key in slot 0x5
34,005,728 UART: [art] Derive Key Pair - Done
34,018,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,299,346 UART: [art] Erasing AUTHORITY.KEYID = 7
36,300,857 UART: [art] PUB.X = 52F212E126829707BCE5835059E91C8A42067CFB49E3255B4EFF543A8146FD0FD829B3D0D60B9EB6615233F25E6747AD
36,308,092 UART: [art] PUB.Y = 5D757E17378FAA133B9E4A189B45BF6D98D514FBF242D1D015ADD5B904BF983AF7A00FF95F73E4D339C6A49D97E999FB
36,315,379 UART: [art] SIG.R = 6969A18E2C11BF79C1C3B0FBE13E4FFDB6DE352F20661113E83D0DE17F9BB66D31907CA49F75FF452DE5402B291420C1
36,322,833 UART: [art] SIG.S = 2ECA7C8541FEE6A3B0680B81D11AF4CE5C1A72E73813BC56E2FF5BED1984166DE9A56136D26FB2DF182C90FDEDAC9508
37,628,266 UART: Caliptra RT
37,628,977 UART: [state] CFI Enabled
37,762,251 UART: [rt] RT listening for mailbox commands...
37,764,560 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,920,095 UART: [rt]cmd =0x41544d4e, len=14344
42,140,373 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
4,129,147 ready_for_fw is high
4,129,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,280,901 >>> mbox cmd response: success
27,921,060 UART:
27,921,455 UART: Running Caliptra FMC ...
27,922,568 UART:
27,922,722 UART: [state] CFI Enabled
27,930,859 UART: [fht] FMC Alias Private Key: 7
30,270,840 UART: [art] Extend RT PCRs Done
30,272,061 UART: [art] Lock RT PCRs Done
30,273,984 UART: [art] Populate DV Done
30,279,386 UART: [fht] FMC Alias Private Key: 7
30,280,978 UART: [art] Derive CDI
30,281,726 UART: [art] Store in slot 0x4
30,324,207 UART: [art] Derive Key Pair
30,325,204 UART: [art] Store priv key in slot 0x5
33,567,203 UART: [art] Derive Key Pair - Done
33,580,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,860,373 UART: [art] Erasing AUTHORITY.KEYID = 7
35,861,889 UART: [art] PUB.X = 35B7E939001C2809746B7006C06CF4D603337BB12E5117FB241F9EC81B4D21117629C14ACE55D335B57F608089F1F508
35,869,084 UART: [art] PUB.Y = 05D4A7ED45C82805872CFE7A86D00DC75CB260DD23DF58633B125976D08CE6CFD6FD35C61F38C196290967261E882BF3
35,876,357 UART: [art] SIG.R = B1EE63E243214CAECFDF69BD524EB3722D038ED3C5E9F66FCA89D09C3DD0B35344D594748E408A294AAE14F7620E3846
35,883,750 UART: [art] SIG.S = A7763062FDF4F89E4839EF3676DD7F499B1C09CC78ED92CD7C3578B913B4FA3183E0C1EEB5C11FEC42635556C11F343D
37,188,968 UART: Caliptra RT
37,189,672 UART: [state] CFI Enabled
37,323,258 UART: [rt] RT listening for mailbox commands...
37,325,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,480,696 UART: [rt]cmd =0x41544d4e, len=14344
41,623,563 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,034 UART:
192,420 UART: Running Caliptra ROM ...
193,498 UART:
193,637 UART: [state] CFI Enabled
266,239 UART: [state] LifecycleState = Unprovisioned
268,152 UART: [state] DebugLocked = No
270,819 UART: [state] WD Timer not started. Device not locked for debugging
275,206 UART: [kat] SHA2-256
454,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,630 UART: [kat] ++
466,078 UART: [kat] sha1
477,240 UART: [kat] SHA2-256
479,960 UART: [kat] SHA2-384
484,875 UART: [kat] SHA2-512-ACC
487,232 UART: [kat] ECC-384
2,949,044 UART: [kat] HMAC-384Kdf
2,970,797 UART: [kat] LMS
3,447,324 UART: [kat] --
3,451,877 UART: [cold-reset] ++
3,452,949 UART: [fht] FHT @ 0x50003400
3,464,005 UART: [idev] ++
3,464,604 UART: [idev] CDI.KEYID = 6
3,465,529 UART: [idev] SUBJECT.KEYID = 7
3,466,772 UART: [idev] UDS.KEYID = 0
3,467,709 ready_for_fw is high
3,467,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,921 UART: [idev] Erasing UDS.KEYID = 0
5,984,057 UART: [idev] Sha1 KeyId Algorithm
6,007,074 UART: [idev] --
6,012,587 UART: [ldev] ++
6,013,155 UART: [ldev] CDI.KEYID = 6
6,014,120 UART: [ldev] SUBJECT.KEYID = 5
6,015,332 UART: [ldev] AUTHORITY.KEYID = 7
6,016,565 UART: [ldev] FE.KEYID = 1
6,055,876 UART: [ldev] Erasing FE.KEYID = 1
8,562,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,060 UART: [ldev] --
10,371,709 UART: [fwproc] Wait for Commands...
10,374,876 UART: [fwproc] Recv command 0x46574c44
10,376,910 UART: [fwproc] Recv'd Img size: 118548 bytes
14,938,945 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,022,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,096,037 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,424,355 >>> mbox cmd response: success
15,429,096 UART: [afmc] ++
15,429,689 UART: [afmc] CDI.KEYID = 6
15,430,577 UART: [afmc] SUBJECT.KEYID = 7
15,431,844 UART: [afmc] AUTHORITY.KEYID = 5
17,961,422 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,685,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,687,846 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,703,712 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,719,616 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,735,325 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,759,381 UART: [afmc] --
19,763,995 UART: [cold-reset] --
19,767,806 UART: [state] Locking Datavault
19,773,481 UART: [state] Locking PCR0, PCR1 and PCR31
19,775,228 UART: [state] Locking ICCM
19,776,863 UART: [exit] Launching FMC @ 0x40000130
19,785,266 UART:
19,785,549 UART: Running Caliptra FMC ...
19,786,578 UART:
19,786,721 UART: [state] CFI Enabled
19,842,218 UART: [fht] FMC Alias Private Key: 7
21,609,714 UART: [art] Extend RT PCRs Done
21,610,931 UART: [art] Lock RT PCRs Done
21,612,578 UART: [art] Populate DV Done
21,617,789 UART: [fht] FMC Alias Private Key: 7
21,619,436 UART: [art] Derive CDI
21,620,248 UART: [art] Store in slot 0x4
21,675,297 UART: [art] Derive Key Pair
21,676,335 UART: [art] Store priv key in slot 0x5
24,139,040 UART: [art] Derive Key Pair - Done
24,152,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,865,522 UART: [art] Erasing AUTHORITY.KEYID = 7
25,867,172 UART: [art] PUB.X = 48919D0C3A8F3D82AEF2C019AF8BC79D5765178DFC028F2A24E655E864A770EC3CC037342A9BBE6CF323174BBBA7DA8E
25,874,318 UART: [art] PUB.Y = 47920996387C600F7ACD7BBB83B5F0D4E69C485DA512D3215A2507C5AE53DD1020FC557C4FF317C37B02D955F528A390
25,881,604 UART: [art] SIG.R = 285A196E6D5C849F15ACE85F68134CC03CFEF00F0195FFC6BAD4FAE0F86A37DE93A128999C42BD69F954BDC37CD3B325
25,889,006 UART: [art] SIG.S = F474344D0D9B88FE97D057DDB8363F2E1FC3CEE8F8D814116A5D27E0DFF6F7C4E996CB0C859969F7CFFB869ADF11A248
26,867,851 UART: Caliptra RT
26,868,572 UART: [state] CFI Enabled
27,047,945 UART: [rt] RT listening for mailbox commands...
27,050,297 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,205,879 UART: [rt]cmd =0x41544d4e, len=14344
29,602,106 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,460,831 ready_for_fw is high
3,461,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,378,427 >>> mbox cmd response: success
19,664,697 UART:
19,665,097 UART: Running Caliptra FMC ...
19,666,247 UART:
19,666,405 UART: [state] CFI Enabled
19,734,006 UART: [fht] FMC Alias Private Key: 7
21,499,835 UART: [art] Extend RT PCRs Done
21,501,081 UART: [art] Lock RT PCRs Done
21,502,759 UART: [art] Populate DV Done
21,508,185 UART: [fht] FMC Alias Private Key: 7
21,509,895 UART: [art] Derive CDI
21,510,714 UART: [art] Store in slot 0x4
21,566,413 UART: [art] Derive Key Pair
21,567,455 UART: [art] Store priv key in slot 0x5
24,030,215 UART: [art] Derive Key Pair - Done
24,043,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,755,935 UART: [art] Erasing AUTHORITY.KEYID = 7
25,757,440 UART: [art] PUB.X = 28E23FCA048539F08281340325E94BBB685C5A54A8DFDF7CEABE057D9DCA1B3F79E12E18FDC92D7CC71B43543ED1917D
25,764,756 UART: [art] PUB.Y = 8D171984C3CECBDA9E7F665F39699AC42CB258204BA213331EB1C239DA8815AFB31C81E88A5862EDC27B3579D9FA655B
25,772,036 UART: [art] SIG.R = 8945BFA5C5AA0DCF2A0C242DA810094B045A145CF5874E922BA6C309C9E40C590AF82A202DAEE069F2486F5E9FC057B8
25,779,382 UART: [art] SIG.S = 3B674D698659EF7820FF847663E526A6EF79B353BE7680AF9749D40BBEDEE1976B2494E2BAB76A2AE0A6DEF320C22611
26,758,273 UART: Caliptra RT
26,758,988 UART: [state] CFI Enabled
26,939,488 UART: [rt] RT listening for mailbox commands...
26,941,792 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,097,042 UART: [rt]cmd =0x41544d4e, len=14344
29,495,364 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,557 UART:
192,904 UART: Running Caliptra ROM ...
194,090 UART:
603,603 UART: [state] CFI Enabled
617,574 UART: [state] LifecycleState = Unprovisioned
619,542 UART: [state] DebugLocked = No
621,706 UART: [state] WD Timer not started. Device not locked for debugging
626,181 UART: [kat] SHA2-256
805,782 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,567 UART: [kat] ++
817,014 UART: [kat] sha1
828,249 UART: [kat] SHA2-256
830,920 UART: [kat] SHA2-384
837,198 UART: [kat] SHA2-512-ACC
839,569 UART: [kat] ECC-384
3,280,350 UART: [kat] HMAC-384Kdf
3,293,219 UART: [kat] LMS
3,769,692 UART: [kat] --
3,773,998 UART: [cold-reset] ++
3,776,503 UART: [fht] FHT @ 0x50003400
3,787,480 UART: [idev] ++
3,788,046 UART: [idev] CDI.KEYID = 6
3,788,973 UART: [idev] SUBJECT.KEYID = 7
3,790,227 UART: [idev] UDS.KEYID = 0
3,791,157 ready_for_fw is high
3,791,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,215 UART: [idev] Erasing UDS.KEYID = 0
6,269,307 UART: [idev] Sha1 KeyId Algorithm
6,293,433 UART: [idev] --
6,297,918 UART: [ldev] ++
6,298,524 UART: [ldev] CDI.KEYID = 6
6,299,444 UART: [ldev] SUBJECT.KEYID = 5
6,300,607 UART: [ldev] AUTHORITY.KEYID = 7
6,301,893 UART: [ldev] FE.KEYID = 1
6,314,862 UART: [ldev] Erasing FE.KEYID = 1
8,795,998 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,317 UART: [ldev] --
10,586,203 UART: [fwproc] Wait for Commands...
10,588,417 UART: [fwproc] Recv command 0x46574c44
10,590,408 UART: [fwproc] Recv'd Img size: 118548 bytes
15,132,289 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,208,470 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,281,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,609,616 >>> mbox cmd response: success
15,613,782 UART: [afmc] ++
15,614,389 UART: [afmc] CDI.KEYID = 6
15,615,278 UART: [afmc] SUBJECT.KEYID = 7
15,616,552 UART: [afmc] AUTHORITY.KEYID = 5
18,119,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,838,738 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,840,910 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,856,781 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,872,704 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,888,399 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,913,382 UART: [afmc] --
19,916,882 UART: [cold-reset] --
19,920,124 UART: [state] Locking Datavault
19,926,512 UART: [state] Locking PCR0, PCR1 and PCR31
19,928,270 UART: [state] Locking ICCM
19,930,317 UART: [exit] Launching FMC @ 0x40000130
19,938,714 UART:
19,938,960 UART: Running Caliptra FMC ...
19,940,066 UART:
19,940,232 UART: [state] CFI Enabled
19,948,176 UART: [fht] FMC Alias Private Key: 7
21,713,927 UART: [art] Extend RT PCRs Done
21,715,150 UART: [art] Lock RT PCRs Done
21,716,373 UART: [art] Populate DV Done
21,721,900 UART: [fht] FMC Alias Private Key: 7
21,723,446 UART: [art] Derive CDI
21,724,183 UART: [art] Store in slot 0x4
21,767,265 UART: [art] Derive Key Pair
21,768,322 UART: [art] Store priv key in slot 0x5
24,194,758 UART: [art] Derive Key Pair - Done
24,207,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,913,356 UART: [art] Erasing AUTHORITY.KEYID = 7
25,914,866 UART: [art] PUB.X = E08EE78F35F1B76144649ADDA7026239112AD0F061928D0CCE0FFF3782797014CD3B56EBC350CA34BF4F1E2F636A244F
25,922,167 UART: [art] PUB.Y = ECDCB0130DD1D20831FDF528C2070B141CF0579A51553B02071D7F179CFF15901B21C8E1F18C8EA3CE3A7C89D731F062
25,929,394 UART: [art] SIG.R = D207FE5F2D70D2E867CD590C242A7FBDDA962DF749441F4F3B8BA7D40EFDF0022804ACA79EE002D83820463CABF1B833
25,936,796 UART: [art] SIG.S = 2026DD7FDDF4890EBC7154EC140911C616ACAEA5B08AFB4326D3F497971EB907CF12BC3B253391B05190DE270BBF52D0
26,915,893 UART: Caliptra RT
26,916,600 UART: [state] CFI Enabled
27,048,746 UART: [rt] RT listening for mailbox commands...
27,051,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,206,348 UART: [rt]cmd =0x41544d4e, len=14344
29,600,242 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,776,226 ready_for_fw is high
3,776,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,596,672 >>> mbox cmd response: success
19,845,671 UART:
19,846,071 UART: Running Caliptra FMC ...
19,847,276 UART:
19,847,451 UART: [state] CFI Enabled
19,855,405 UART: [fht] FMC Alias Private Key: 7
21,621,554 UART: [art] Extend RT PCRs Done
21,622,778 UART: [art] Lock RT PCRs Done
21,624,304 UART: [art] Populate DV Done
21,629,751 UART: [fht] FMC Alias Private Key: 7
21,631,345 UART: [art] Derive CDI
21,632,088 UART: [art] Store in slot 0x4
21,674,855 UART: [art] Derive Key Pair
21,675,917 UART: [art] Store priv key in slot 0x5
24,102,505 UART: [art] Derive Key Pair - Done
24,115,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,821,336 UART: [art] Erasing AUTHORITY.KEYID = 7
25,822,844 UART: [art] PUB.X = FFC64670F155553F49BCA96FB07A726337E5C2BA3A299FBC1BDCBB52F48664639C8634CFE70178267DE00AA8CB66DD50
25,830,102 UART: [art] PUB.Y = EEBDE7B2413FD5F842C738BAF281A44BF36289728E4470D1A5FC286843A7F5A1C8B634BAD1E10423D96AF6BE9627FF54
25,837,360 UART: [art] SIG.R = FFB9073A99CC56E8E2D011182966178279E3F6B528DAFCB32FC605367B88918E635AA8039F0F7E1D4732634FE55828D8
25,844,771 UART: [art] SIG.S = BF56C958EFBAA0EE7A516E05B54EF4EC2B6685D08DAE694E0FEDE593F6CD6014B0D6703C7619B45BD9CBD9DC291934CD
26,823,591 UART: Caliptra RT
26,824,300 UART: [state] CFI Enabled
26,956,755 UART: [rt] RT listening for mailbox commands...
26,959,084 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,114,188 UART: [rt]cmd =0x41544d4e, len=14344
29,506,221 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,270 UART:
192,639 UART: Running Caliptra ROM ...
193,877 UART:
194,037 UART: [state] CFI Enabled
265,147 UART: [state] LifecycleState = Unprovisioned
267,527 UART: [state] DebugLocked = No
269,700 UART: [state] WD Timer not started. Device not locked for debugging
275,127 UART: [kat] SHA2-256
465,052 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,776 UART: [kat] ++
476,265 UART: [kat] sha1
487,352 UART: [kat] SHA2-256
490,421 UART: [kat] SHA2-384
496,998 UART: [kat] SHA2-512-ACC
499,544 UART: [kat] ECC-384
2,945,277 UART: [kat] HMAC-384Kdf
2,970,453 UART: [kat] LMS
3,502,283 UART: [kat] --
3,506,439 UART: [cold-reset] ++
3,507,586 UART: [fht] FHT @ 0x50003400
3,519,724 UART: [idev] ++
3,520,350 UART: [idev] CDI.KEYID = 6
3,521,299 UART: [idev] SUBJECT.KEYID = 7
3,522,536 UART: [idev] UDS.KEYID = 0
3,523,434 ready_for_fw is high
3,523,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,805 UART: [idev] Erasing UDS.KEYID = 0
6,048,422 UART: [idev] Sha1 KeyId Algorithm
6,071,976 UART: [idev] --
6,076,345 UART: [ldev] ++
6,077,079 UART: [ldev] CDI.KEYID = 6
6,077,993 UART: [ldev] SUBJECT.KEYID = 5
6,079,149 UART: [ldev] AUTHORITY.KEYID = 7
6,080,378 UART: [ldev] FE.KEYID = 1
6,120,008 UART: [ldev] Erasing FE.KEYID = 1
8,626,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,377,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,392,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,407,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,428 UART: [ldev] --
10,432,924 UART: [fwproc] Wait for Commands...
10,435,719 UART: [fwproc] Recv command 0x46574c44
10,438,024 UART: [fwproc] Recv'd Img size: 118548 bytes
15,117,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,202,378 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,325,975 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,885,632 >>> mbox cmd response: success
15,889,425 UART: [afmc] ++
15,890,122 UART: [afmc] CDI.KEYID = 6
15,891,253 UART: [afmc] SUBJECT.KEYID = 7
15,892,802 UART: [afmc] AUTHORITY.KEYID = 5
18,430,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,151,767 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,153,677 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,168,730 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,183,996 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,199,039 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,222,368 UART: [afmc] --
20,226,179 UART: [cold-reset] --
20,230,528 UART: [state] Locking Datavault
20,237,833 UART: [state] Locking PCR0, PCR1 and PCR31
20,240,043 UART: [state] Locking ICCM
20,241,978 UART: [exit] Launching FMC @ 0x40000130
20,250,655 UART:
20,250,886 UART: Running Caliptra FMC ...
20,251,952 UART:
20,252,101 UART: [state] CFI Enabled
20,308,459 UART: [fht] FMC Alias Private Key: 7
22,075,236 UART: [art] Extend RT PCRs Done
22,076,463 UART: [art] Lock RT PCRs Done
22,078,090 UART: [art] Populate DV Done
22,083,391 UART: [fht] FMC Alias Private Key: 7
22,084,927 UART: [art] Derive CDI
22,085,741 UART: [art] Store in slot 0x4
22,141,952 UART: [art] Derive Key Pair
22,142,981 UART: [art] Store priv key in slot 0x5
24,606,174 UART: [art] Derive Key Pair - Done
24,619,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,332,134 UART: [art] Erasing AUTHORITY.KEYID = 7
26,333,768 UART: [art] PUB.X = EDC5C827EA0D09C418B416DB56F4C6D106C7C7574EB24058F62151E8C0BBC11631CD4B3BD214EB52EA1126021A938D9A
26,340,920 UART: [art] PUB.Y = DC4A08C4741372DDFB5964EB1D9A38B8392FF766724C7BC0D8DDBA8AD492A4893D4210CFA7744A6545F3C787A238033F
26,348,192 UART: [art] SIG.R = 5F57C9FE663B4055A613E7C2EC5DA6B90CA74F20466F51A500F057A812B6A0C62E74A671C2B4DF98325956FCF877C85B
26,355,536 UART: [art] SIG.S = 11915D260751C09FC5B8FD25AF6F51073BC9FD074BCD558B22C1C473C4741FD968132D0A1C8FBB0896FCDD7F50B27215
27,334,368 UART: Caliptra RT
27,335,056 UART: [state] CFI Enabled
27,516,525 UART: [rt] RT listening for mailbox commands...
27,518,893 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,377 UART: [rt]cmd =0x41544d4e, len=14344
30,065,429 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
3,438,986 ready_for_fw is high
3,439,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,957,853 >>> mbox cmd response: success
20,245,235 UART:
20,245,617 UART: Running Caliptra FMC ...
20,246,734 UART:
20,246,888 UART: [state] CFI Enabled
20,313,301 UART: [fht] FMC Alias Private Key: 7
22,079,341 UART: [art] Extend RT PCRs Done
22,080,570 UART: [art] Lock RT PCRs Done
22,082,495 UART: [art] Populate DV Done
22,087,832 UART: [fht] FMC Alias Private Key: 7
22,089,537 UART: [art] Derive CDI
22,090,274 UART: [art] Store in slot 0x4
22,145,259 UART: [art] Derive Key Pair
22,146,255 UART: [art] Store priv key in slot 0x5
24,609,131 UART: [art] Derive Key Pair - Done
24,622,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,919 UART: [art] Erasing AUTHORITY.KEYID = 7
26,336,430 UART: [art] PUB.X = 8B990DBFAA8A6346B5FEE7F1A92BE6B14161A9358F4ADDACD27C5A50D8608392D3950D609BCDD60CD9983D08C994ABD0
26,343,676 UART: [art] PUB.Y = 6D3CB64E781FAEE669DB5A32F3081E5616727B3A4A5B18F6B14BE1893FBF0565D08D8D776AA6D2AFEB43CA07691A14DA
26,350,986 UART: [art] SIG.R = 147B6B79B7EE300797D47417E0DB573655A0473FBFE601A0E2266C33B27373C5514992FA00FD3561BB6E706D208B90FC
26,358,342 UART: [art] SIG.S = 40716068D30FD515103B460E4CFA09811F430C0551F8BCF1CC3EC41798A1A6FB3835E332139ED2591A9E7AF68C664788
27,337,394 UART: Caliptra RT
27,338,114 UART: [state] CFI Enabled
27,519,826 UART: [rt] RT listening for mailbox commands...
27,522,132 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,493 UART: [rt]cmd =0x41544d4e, len=14344
30,061,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,513 UART:
192,883 UART: Running Caliptra ROM ...
193,987 UART:
603,507 UART: [state] CFI Enabled
615,480 UART: [state] LifecycleState = Unprovisioned
617,846 UART: [state] DebugLocked = No
620,232 UART: [state] WD Timer not started. Device not locked for debugging
625,040 UART: [kat] SHA2-256
814,950 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,730 UART: [kat] ++
826,256 UART: [kat] sha1
836,064 UART: [kat] SHA2-256
839,095 UART: [kat] SHA2-384
846,016 UART: [kat] SHA2-512-ACC
848,609 UART: [kat] ECC-384
3,291,481 UART: [kat] HMAC-384Kdf
3,304,391 UART: [kat] LMS
3,836,230 UART: [kat] --
3,840,687 UART: [cold-reset] ++
3,842,841 UART: [fht] FHT @ 0x50003400
3,854,113 UART: [idev] ++
3,854,822 UART: [idev] CDI.KEYID = 6
3,855,966 UART: [idev] SUBJECT.KEYID = 7
3,857,049 UART: [idev] UDS.KEYID = 0
3,858,059 ready_for_fw is high
3,858,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,981 UART: [idev] Erasing UDS.KEYID = 0
6,338,996 UART: [idev] Sha1 KeyId Algorithm
6,362,625 UART: [idev] --
6,367,865 UART: [ldev] ++
6,368,597 UART: [ldev] CDI.KEYID = 6
6,369,486 UART: [ldev] SUBJECT.KEYID = 5
6,370,594 UART: [ldev] AUTHORITY.KEYID = 7
6,371,887 UART: [ldev] FE.KEYID = 1
6,382,399 UART: [ldev] Erasing FE.KEYID = 1
8,859,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,070 UART: [ldev] --
10,650,932 UART: [fwproc] Wait for Commands...
10,652,756 UART: [fwproc] Recv command 0x46574c44
10,655,009 UART: [fwproc] Recv'd Img size: 118548 bytes
15,328,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,410,590 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,534,253 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,094,623 >>> mbox cmd response: success
16,098,292 UART: [afmc] ++
16,099,038 UART: [afmc] CDI.KEYID = 6
16,100,189 UART: [afmc] SUBJECT.KEYID = 7
16,101,643 UART: [afmc] AUTHORITY.KEYID = 5
18,605,497 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,328,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,330,416 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,345,521 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,360,781 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,375,757 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,399,137 UART: [afmc] --
20,402,304 UART: [cold-reset] --
20,407,607 UART: [state] Locking Datavault
20,413,592 UART: [state] Locking PCR0, PCR1 and PCR31
20,415,759 UART: [state] Locking ICCM
20,417,927 UART: [exit] Launching FMC @ 0x40000130
20,426,582 UART:
20,426,835 UART: Running Caliptra FMC ...
20,427,945 UART:
20,428,108 UART: [state] CFI Enabled
20,436,001 UART: [fht] FMC Alias Private Key: 7
22,201,934 UART: [art] Extend RT PCRs Done
22,203,148 UART: [art] Lock RT PCRs Done
22,204,618 UART: [art] Populate DV Done
22,210,137 UART: [fht] FMC Alias Private Key: 7
22,211,686 UART: [art] Derive CDI
22,212,507 UART: [art] Store in slot 0x4
22,255,317 UART: [art] Derive Key Pair
22,256,524 UART: [art] Store priv key in slot 0x5
24,683,194 UART: [art] Derive Key Pair - Done
24,696,250 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,402,519 UART: [art] Erasing AUTHORITY.KEYID = 7
26,404,028 UART: [art] PUB.X = 59BC1C1D02DB11CAEB8B58B27E3EEB0EB9ED521CDB1D2967BEE9DFB9A5F2C48664C83B784A4D72539A8E9D1C8AA74D8D
26,411,364 UART: [art] PUB.Y = 7253E19018EA09C221741E107CE86AD0A55AF15D7E5589F5EAA228DFFB3499EBBC991EB2EDBDFAA477C559972D560D61
26,418,650 UART: [art] SIG.R = 96D2A7C2FCA08724D5F3B1535FF892D10CDC9A54690C4506D82434849ACD1479690F7C635876E271C4C8BB1AB45D2BFA
26,426,045 UART: [art] SIG.S = CC22FD3A45BC2B5C1E6D108A8D6A9D65F4C49FCD3D0CAC92128295C1AA619736571A80AFE8B048BE471D5B5D33FC031B
27,404,935 UART: Caliptra RT
27,405,649 UART: [state] CFI Enabled
27,538,603 UART: [rt] RT listening for mailbox commands...
27,540,930 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,696,236 UART: [rt]cmd =0x41544d4e, len=14344
30,068,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
3,755,284 ready_for_fw is high
3,755,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,128,678 >>> mbox cmd response: success
20,377,887 UART:
20,378,268 UART: Running Caliptra FMC ...
20,379,402 UART:
20,379,560 UART: [state] CFI Enabled
20,387,269 UART: [fht] FMC Alias Private Key: 7
22,153,922 UART: [art] Extend RT PCRs Done
22,155,146 UART: [art] Lock RT PCRs Done
22,156,616 UART: [art] Populate DV Done
22,162,024 UART: [fht] FMC Alias Private Key: 7
22,163,628 UART: [art] Derive CDI
22,164,447 UART: [art] Store in slot 0x4
22,207,321 UART: [art] Derive Key Pair
22,208,330 UART: [art] Store priv key in slot 0x5
24,634,836 UART: [art] Derive Key Pair - Done
24,647,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,354,008 UART: [art] Erasing AUTHORITY.KEYID = 7
26,355,530 UART: [art] PUB.X = 4E1681BB150F2CAA0F6552B718CD162DF6855F31B82B4471C62E93A977812961871D0BB89C4BA0F5EB9198D27668626B
26,362,747 UART: [art] PUB.Y = 31F5246CF728802C4EB6BB6BB178C6B80613798B473757F6B538BAA1ACDCD8358358599C137E6207372B8C45B8F27F1F
26,369,997 UART: [art] SIG.R = F6433451E62BC30A924F00BA21434E24FCAC0F6E9A30A91B2070D4CB263776A2DEE5885713BBDC9EF763B06881271FBA
26,377,452 UART: [art] SIG.S = EC83C300A8CF8E6EE6A56D0C5AA77FEDF5FFEDA037353CE328BF705A517DE10338517B93E5192BB74C5A693E755F7FB5
27,355,931 UART: Caliptra RT
27,356,617 UART: [state] CFI Enabled
27,489,726 UART: [rt] RT listening for mailbox commands...
27,492,041 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,647,536 UART: [rt]cmd =0x41544d4e, len=14344
30,041,772 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,138 UART: [state] LifecycleState = Unprovisioned
85,793 UART: [state] DebugLocked = No
86,323 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,915 UART: [kat] SHA2-256
881,846 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,961 UART: [kat] ++
886,113 UART: [kat] sha1
890,561 UART: [kat] SHA2-256
892,499 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,802 UART: [kat] HMAC-384Kdf
907,286 UART: [kat] LMS
1,475,482 UART: [kat] --
1,476,409 UART: [cold-reset] ++
1,476,767 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 ready_for_fw is high
1,480,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,520 UART: [idev] Erasing UDS.KEYID = 0
1,504,610 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,072 UART: [idev] --
1,514,089 UART: [ldev] ++
1,514,257 UART: [ldev] CDI.KEYID = 6
1,514,620 UART: [ldev] SUBJECT.KEYID = 5
1,515,046 UART: [ldev] AUTHORITY.KEYID = 7
1,515,509 UART: [ldev] FE.KEYID = 1
1,520,467 UART: [ldev] Erasing FE.KEYID = 1
1,546,048 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,888 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,600 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,572 UART: [ldev] --
1,584,989 UART: [fwproc] Waiting for Commands...
1,585,824 UART: [fwproc] Received command 0x46574c44
1,586,615 UART: [fwproc] Received Image of size 118548 bytes
5,355,035 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,383,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,414,453 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,554,824 >>> mbox cmd response: success
5,555,926 UART: [afmc] ++
5,556,094 UART: [afmc] CDI.KEYID = 6
5,556,456 UART: [afmc] SUBJECT.KEYID = 7
5,556,881 UART: [afmc] AUTHORITY.KEYID = 5
5,591,722 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,607,884 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,608,664 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,614,370 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,620,249 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,625,962 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,633,835 UART: [afmc] --
5,634,781 UART: [cold-reset] --
5,635,723 UART: [state] Locking Datavault
5,637,080 UART: [state] Locking PCR0, PCR1 and PCR31
5,637,684 UART: [state] Locking ICCM
5,638,196 UART: [exit] Launching FMC @ 0x40000130
5,643,526 UART:
5,643,542 UART: Running Caliptra FMC ...
5,643,950 UART:
5,644,004 UART: [state] CFI Enabled
5,654,510 UART: [fht] FMC Alias Private Key: 7
5,773,072 UART: [art] Extend RT PCRs Done
5,773,500 UART: [art] Lock RT PCRs Done
5,775,000 UART: [art] Populate DV Done
5,783,309 UART: [fht] FMC Alias Private Key: 7
5,784,399 UART: [art] Derive CDI
5,784,679 UART: [art] Store in slot 0x4
5,870,271 UART: [art] Derive Key Pair
5,870,631 UART: [art] Store priv key in slot 0x5
5,883,968 UART: [art] Derive Key Pair - Done
5,898,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,914,122 UART: [art] Erasing AUTHORITY.KEYID = 7
5,914,887 UART: [art] PUB.X = D6B81AEA905AECA3D8AFD5AB223E6713ADDE86208929501B849DE9221FAB93E00F09D4AC444D501DF3178E7EF4AA8B9A
5,921,671 UART: [art] PUB.Y = 00CD20ED30D8756C66FE84CF3A15022477C0AD7416F7FD4688CAB5F07258DC3A697FFB138A7144A5CEA209DE68105A8C
5,928,603 UART: [art] SIG.R = 4B44AAC1089B7DC7572FF5457019908825315260EC780116680D557DF3ECC2539C0B8BD442B688BAF05A3FB74674FBFC
5,935,363 UART: [art] SIG.S = 492B2E7A03942DE9866B10D5B714FE28985753BFA7CF48D47C889BF9F773A8474DEF7856CE0C8D8D6E1FA20A21BE1A22
5,958,932 UART: Caliptra RT
5,959,183 UART: [state] CFI Enabled
6,079,500 UART: [rt] RT listening for mailbox commands...
6,080,170 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,203,404 UART: [rt]cmd =0x41544d4e, len=14344
8,395,516 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,635 ready_for_fw is high
1,362,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,178,220 >>> mbox cmd response: success
5,239,791 UART:
5,239,807 UART: Running Caliptra FMC ...
5,240,215 UART:
5,240,269 UART: [state] CFI Enabled
5,250,597 UART: [fht] FMC Alias Private Key: 7
5,370,457 UART: [art] Extend RT PCRs Done
5,370,885 UART: [art] Lock RT PCRs Done
5,372,583 UART: [art] Populate DV Done
5,380,792 UART: [fht] FMC Alias Private Key: 7
5,381,886 UART: [art] Derive CDI
5,382,166 UART: [art] Store in slot 0x4
5,468,278 UART: [art] Derive Key Pair
5,468,638 UART: [art] Store priv key in slot 0x5
5,481,771 UART: [art] Derive Key Pair - Done
5,496,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,512,315 UART: [art] Erasing AUTHORITY.KEYID = 7
5,513,080 UART: [art] PUB.X = B450898E22CD0D2B4367B629602EF7C6C0007250D2AEDCB0A6F26264567F632A87449B69A474A41857DC3F43B0844CB1
5,519,823 UART: [art] PUB.Y = B3025A3833E7B265E284B862E76528FD3F186829BB29547A4D8EEB893060ADC04CF89E2554D1D8D53FB946370E9A958B
5,526,767 UART: [art] SIG.R = 4B38FFDC1D29397FF1082D1ABC428894F64463E4923217EED90D7413F1F700B739FE5CD77AF5512F16E6031A716E462C
5,533,508 UART: [art] SIG.S = D7E0155164C2B3DB290874BB39716A65FF52901523E43DD37D2B612C315D51C7806A8E45EF603C8F5EC7D7E94A769AF9
5,557,851 UART: Caliptra RT
5,558,102 UART: [state] CFI Enabled
5,678,218 UART: [rt] RT listening for mailbox commands...
5,678,888 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,870 UART: [rt]cmd =0x41544d4e, len=14344
8,145,945 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,921 UART: [state] LifecycleState = Unprovisioned
85,576 UART: [state] DebugLocked = No
86,156 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,656 UART: [kat] SHA2-256
881,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,702 UART: [kat] ++
885,854 UART: [kat] sha1
890,180 UART: [kat] SHA2-256
892,118 UART: [kat] SHA2-384
894,887 UART: [kat] SHA2-512-ACC
896,788 UART: [kat] ECC-384
902,357 UART: [kat] HMAC-384Kdf
906,985 UART: [kat] LMS
1,475,181 UART: [kat] --
1,476,010 UART: [cold-reset] ++
1,476,510 UART: [fht] Storing FHT @ 0x50003400
1,479,267 UART: [idev] ++
1,479,435 UART: [idev] CDI.KEYID = 6
1,479,795 UART: [idev] SUBJECT.KEYID = 7
1,480,219 UART: [idev] UDS.KEYID = 0
1,480,564 ready_for_fw is high
1,480,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,049 UART: [idev] Erasing UDS.KEYID = 0
1,504,791 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,389 UART: [idev] --
1,514,326 UART: [ldev] ++
1,514,494 UART: [ldev] CDI.KEYID = 6
1,514,857 UART: [ldev] SUBJECT.KEYID = 5
1,515,283 UART: [ldev] AUTHORITY.KEYID = 7
1,515,746 UART: [ldev] FE.KEYID = 1
1,520,820 UART: [ldev] Erasing FE.KEYID = 1
1,546,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,829 UART: [ldev] --
1,586,116 UART: [fwproc] Waiting for Commands...
1,586,881 UART: [fwproc] Received command 0x46574c44
1,587,672 UART: [fwproc] Received Image of size 118548 bytes
5,204,152 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,232,420 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,263,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,403,945 >>> mbox cmd response: success
5,404,997 UART: [afmc] ++
5,405,165 UART: [afmc] CDI.KEYID = 6
5,405,527 UART: [afmc] SUBJECT.KEYID = 7
5,405,952 UART: [afmc] AUTHORITY.KEYID = 5
5,441,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,458,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,458,899 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,605 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,484 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,476,197 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,484,090 UART: [afmc] --
5,485,132 UART: [cold-reset] --
5,485,970 UART: [state] Locking Datavault
5,487,005 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,609 UART: [state] Locking ICCM
5,488,179 UART: [exit] Launching FMC @ 0x40000130
5,493,509 UART:
5,493,525 UART: Running Caliptra FMC ...
5,493,933 UART:
5,494,076 UART: [state] CFI Enabled
5,504,474 UART: [fht] FMC Alias Private Key: 7
5,623,424 UART: [art] Extend RT PCRs Done
5,623,852 UART: [art] Lock RT PCRs Done
5,625,170 UART: [art] Populate DV Done
5,633,517 UART: [fht] FMC Alias Private Key: 7
5,634,643 UART: [art] Derive CDI
5,634,923 UART: [art] Store in slot 0x4
5,720,865 UART: [art] Derive Key Pair
5,721,225 UART: [art] Store priv key in slot 0x5
5,734,350 UART: [art] Derive Key Pair - Done
5,749,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,556 UART: [art] Erasing AUTHORITY.KEYID = 7
5,765,321 UART: [art] PUB.X = 50D7079A74827F0D9CA53CAE731D1449C142A3C5E951BA84595A12EE8BA60E973EBBE6222B6CF1E48D277314BE37A1BF
5,772,092 UART: [art] PUB.Y = F4A4D0E6A159FF433D458748C82EE9AFFD5B08D631DC86245847940DDDD5D794555B760D3C7F4CF2BA6BC91D7EF3E859
5,779,047 UART: [art] SIG.R = BDADBC5C207432216458F03B56EF94BA051D72A1B6C9B71D11AF6516DE7604A21CA9CC4E2730E6B08340AC11280BDB13
5,785,818 UART: [art] SIG.S = B1489BE25CB4801BFE2B8E65130C0E9035E15D02D2991219960251B2DDDC63E6919EBCC104727FA8C74ECD83FF51CD39
5,809,993 UART: Caliptra RT
5,810,336 UART: [state] CFI Enabled
5,930,369 UART: [rt] RT listening for mailbox commands...
5,931,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,053,949 UART: [rt]cmd =0x41544d4e, len=14344
8,624,958 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,038 ready_for_fw is high
1,363,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,069,014 >>> mbox cmd response: success
5,130,589 UART:
5,130,605 UART: Running Caliptra FMC ...
5,131,013 UART:
5,131,156 UART: [state] CFI Enabled
5,141,166 UART: [fht] FMC Alias Private Key: 7
5,260,668 UART: [art] Extend RT PCRs Done
5,261,096 UART: [art] Lock RT PCRs Done
5,262,482 UART: [art] Populate DV Done
5,270,729 UART: [fht] FMC Alias Private Key: 7
5,271,911 UART: [art] Derive CDI
5,272,191 UART: [art] Store in slot 0x4
5,357,883 UART: [art] Derive Key Pair
5,358,243 UART: [art] Store priv key in slot 0x5
5,371,332 UART: [art] Derive Key Pair - Done
5,386,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,401,508 UART: [art] Erasing AUTHORITY.KEYID = 7
5,402,273 UART: [art] PUB.X = 3A119F379CD19016115D9C8D76F4944BC30E46595704E9ADEE78C63F3F956300F4D9207A950D87339A44C3272C5D02EE
5,409,005 UART: [art] PUB.Y = FDB5E6F610B797DEA4E54C7E114A38CA89B0B1EBC079CA2995299935CA6F6F61A7E776FD929F43EB4E3B69EDA4B75557
5,415,971 UART: [art] SIG.R = 86425D8839062D62B33E6EB0987E5B2EE9D7033ABA5F3792A29F37EC95691EBEA72555A0E36574451AFE6F8FF914B79F
5,422,739 UART: [art] SIG.S = CE820138A1CBC43084CC1755E3F995EA1C68509F9B4F99CCC08B4B3B12B1CBCF0958361AB79E4DDA490AC65293051994
5,446,685 UART: Caliptra RT
5,447,028 UART: [state] CFI Enabled
5,566,833 UART: [rt] RT listening for mailbox commands...
5,567,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,690,891 UART: [rt]cmd =0x41544d4e, len=14344
7,882,653 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.98s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,572 UART: [state] LifecycleState = Unprovisioned
86,227 UART: [state] DebugLocked = No
86,775 UART: [state] WD Timer not started. Device not locked for debugging
88,010 UART: [kat] SHA2-256
891,560 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,664 UART: [kat] ++
895,816 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,813 UART: [kat] SHA2-512-ACC
906,714 UART: [kat] ECC-384
916,437 UART: [kat] HMAC-384Kdf
921,047 UART: [kat] LMS
1,169,359 UART: [kat] --
1,170,314 UART: [cold-reset] ++
1,170,766 UART: [fht] FHT @ 0x50003400
1,173,438 UART: [idev] ++
1,173,606 UART: [idev] CDI.KEYID = 6
1,173,967 UART: [idev] SUBJECT.KEYID = 7
1,174,392 UART: [idev] UDS.KEYID = 0
1,174,738 ready_for_fw is high
1,174,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,001 UART: [idev] Erasing UDS.KEYID = 0
1,198,667 UART: [idev] Sha1 KeyId Algorithm
1,207,727 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,132 UART: [ldev] Erasing FE.KEYID = 1
1,241,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,263 UART: [fwproc] Wait for Commands...
1,281,030 UART: [fwproc] Recv command 0x46574c44
1,281,763 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,063 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,226 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,401 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,684 >>> mbox cmd response: success
3,370,814 UART: [afmc] ++
3,370,982 UART: [afmc] CDI.KEYID = 6
3,371,345 UART: [afmc] SUBJECT.KEYID = 7
3,371,771 UART: [afmc] AUTHORITY.KEYID = 5
3,407,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,636 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,343 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,220 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,930 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,674 UART: [afmc] --
3,450,653 UART: [cold-reset] --
3,451,533 UART: [state] Locking Datavault
3,452,830 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,434 UART: [state] Locking ICCM
3,454,084 UART: [exit] Launching FMC @ 0x40000130
3,459,414 UART:
3,459,430 UART: Running Caliptra FMC ...
3,459,838 UART:
3,459,892 UART: [state] CFI Enabled
3,470,746 UART: [fht] FMC Alias Private Key: 7
3,589,540 UART: [art] Extend RT PCRs Done
3,589,968 UART: [art] Lock RT PCRs Done
3,591,430 UART: [art] Populate DV Done
3,599,659 UART: [fht] FMC Alias Private Key: 7
3,600,699 UART: [art] Derive CDI
3,600,979 UART: [art] Store in slot 0x4
3,686,758 UART: [art] Derive Key Pair
3,687,118 UART: [art] Store priv key in slot 0x5
3,700,350 UART: [art] Derive Key Pair - Done
3,715,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,309 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,074 UART: [art] PUB.X = E84D7371AD8A3529F1B43DAFB36E12F63E5909CDFB0554F69E78432E3E36FC9EE57112A63EA7DA76C9E497C8A6570FB3
3,737,847 UART: [art] PUB.Y = DD871B2C00E350E94835E752AE2B88D0029F1B655F93AC7B179BB033FA3F1780B8F38DBFBCC9C230D1570A6C6BEBB847
3,744,783 UART: [art] SIG.R = 74ABAA6CA5BC3174F29FAB771D2D07476A2BA2D26039B815CD44AB173DE53255108F9D28D39B4E359C50CCF955F32789
3,751,558 UART: [art] SIG.S = 3F061EDEBD172AE5A0CB0AABB4128974D4681CF1B0CD88A53A3BEF697EDEB5649A9D7509DFD91644E4E674BC818B44BA
3,775,751 UART: Caliptra RT
3,776,002 UART: [state] CFI Enabled
3,896,482 UART: [rt] RT listening for mailbox commands...
3,897,152 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,078 UART: [rt]cmd =0x41544d4e, len=14344
4,607,534 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,374 ready_for_fw is high
1,058,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,947 >>> mbox cmd response: success
3,282,750 UART:
3,282,766 UART: Running Caliptra FMC ...
3,283,174 UART:
3,283,228 UART: [state] CFI Enabled
3,293,906 UART: [fht] FMC Alias Private Key: 7
3,412,940 UART: [art] Extend RT PCRs Done
3,413,368 UART: [art] Lock RT PCRs Done
3,415,220 UART: [art] Populate DV Done
3,423,199 UART: [fht] FMC Alias Private Key: 7
3,424,289 UART: [art] Derive CDI
3,424,569 UART: [art] Store in slot 0x4
3,509,848 UART: [art] Derive Key Pair
3,510,208 UART: [art] Store priv key in slot 0x5
3,523,282 UART: [art] Derive Key Pair - Done
3,538,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,855 UART: [art] PUB.X = 5F74B9C2B87DF27D98E99E96F4F56AC1513CE785860078AB14449B4BFED26FDC158E39EC91A87A303819DAA1E5F6012F
3,560,610 UART: [art] PUB.Y = 101AD1EBFE1D51689655855B7CCA6E438BCC675D9CBD34204271A71847F46A1FB0535DDC99764926E1A20F75973579C9
3,567,557 UART: [art] SIG.R = 9A7936DAFA7F08B908DF0C12EED9CAB4003FE134DA95FE47E27FD51C0A535D3796E1CB1AE582C875D171C06C072D6642
3,574,304 UART: [art] SIG.S = 45C2D2ABFE3FE3552F7F7D2B175D6B835B09C9DB7526D9701E3C91EF18328541DD6A9B3D5021726864E5547276A8F45C
3,597,779 UART: Caliptra RT
3,598,030 UART: [state] CFI Enabled
3,717,572 UART: [rt] RT listening for mailbox commands...
3,718,242 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,674 UART: [rt]cmd =0x41544d4e, len=14344
4,426,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
891,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,771 UART: [kat] ++
895,923 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,708 UART: [kat] SHA2-512-ACC
906,609 UART: [kat] ECC-384
916,600 UART: [kat] HMAC-384Kdf
921,394 UART: [kat] LMS
1,169,706 UART: [kat] --
1,170,651 UART: [cold-reset] ++
1,171,197 UART: [fht] FHT @ 0x50003400
1,174,007 UART: [idev] ++
1,174,175 UART: [idev] CDI.KEYID = 6
1,174,536 UART: [idev] SUBJECT.KEYID = 7
1,174,961 UART: [idev] UDS.KEYID = 0
1,175,307 ready_for_fw is high
1,175,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,200,086 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,209,953 UART: [ldev] ++
1,210,121 UART: [ldev] CDI.KEYID = 6
1,210,485 UART: [ldev] SUBJECT.KEYID = 5
1,210,912 UART: [ldev] AUTHORITY.KEYID = 7
1,211,375 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,242,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,907 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,282,901 UART: [fwproc] Recv command 0x46574c44
1,283,634 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,443 >>> mbox cmd response: success
3,371,543 UART: [afmc] ++
3,371,711 UART: [afmc] CDI.KEYID = 6
3,372,074 UART: [afmc] SUBJECT.KEYID = 7
3,372,500 UART: [afmc] AUTHORITY.KEYID = 5
3,408,183 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,346 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,095 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,802 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,679 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,389 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,987 UART: [afmc] --
3,450,938 UART: [cold-reset] --
3,451,538 UART: [state] Locking Datavault
3,452,873 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,477 UART: [state] Locking ICCM
3,453,997 UART: [exit] Launching FMC @ 0x40000130
3,459,327 UART:
3,459,343 UART: Running Caliptra FMC ...
3,459,751 UART:
3,459,894 UART: [state] CFI Enabled
3,470,372 UART: [fht] FMC Alias Private Key: 7
3,589,796 UART: [art] Extend RT PCRs Done
3,590,224 UART: [art] Lock RT PCRs Done
3,592,014 UART: [art] Populate DV Done
3,600,411 UART: [fht] FMC Alias Private Key: 7
3,601,345 UART: [art] Derive CDI
3,601,625 UART: [art] Store in slot 0x4
3,687,550 UART: [art] Derive Key Pair
3,687,910 UART: [art] Store priv key in slot 0x5
3,701,104 UART: [art] Derive Key Pair - Done
3,715,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,252 UART: [art] PUB.X = 0FC129176D9177A1ADAA673D2F9341217F03B4F9FF2C7443C2792272ABBDD5D4D5239B5AE2284D86AE5E481718F2498F
3,739,020 UART: [art] PUB.Y = 191D50CA459A3CDD4876F7A3C3F621CF869DD5E9AEC504BBFD084644E1B03DC47F8670352F84B48F56929F035A179A4B
3,745,969 UART: [art] SIG.R = 7A798094EC6E16345A5733151030C6793509410A9D9142E962675AFA8CE77DE0DE31F2F9B110109C1294AFE9C1456533
3,752,723 UART: [art] SIG.S = 2B1AAD16A918D7B0C5BD87E57DE9383F6D4BB77100CAECFF6414A9E311AFF370FA5A69359803D5CF8C3917C6399845D4
3,776,518 UART: Caliptra RT
3,776,861 UART: [state] CFI Enabled
3,895,851 UART: [rt] RT listening for mailbox commands...
3,896,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,347 UART: [rt]cmd =0x41544d4e, len=14344
4,591,743 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 ready_for_fw is high
1,059,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,979 >>> mbox cmd response: success
3,288,722 UART:
3,288,738 UART: Running Caliptra FMC ...
3,289,146 UART:
3,289,289 UART: [state] CFI Enabled
3,300,237 UART: [fht] FMC Alias Private Key: 7
3,419,477 UART: [art] Extend RT PCRs Done
3,419,905 UART: [art] Lock RT PCRs Done
3,421,571 UART: [art] Populate DV Done
3,429,926 UART: [fht] FMC Alias Private Key: 7
3,431,058 UART: [art] Derive CDI
3,431,338 UART: [art] Store in slot 0x4
3,516,437 UART: [art] Derive Key Pair
3,516,797 UART: [art] Store priv key in slot 0x5
3,530,259 UART: [art] Derive Key Pair - Done
3,544,860 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,441 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,206 UART: [art] PUB.X = B456723632DC5151BA2AC5D4651908F3B8DE3D4A42CA17354BCFE4E23C55F5CBAE4A13D8FE72F538586E0AB996D45F37
3,567,982 UART: [art] PUB.Y = EFF20634C439334965E168D92A6BDB62172CD373EE6C724B7137193BD5024F87CC798957825C7D266E9282EFEAFEC1A7
3,574,928 UART: [art] SIG.R = D7F21E4B871B2ED60C85AC2F2C3FE1BBD61DBEEBFBA5B94756C07B10682CC080179392DBCE1C772CCF7EBA6D99EB7FD2
3,581,725 UART: [art] SIG.S = 75ECB94EC70D22BAC609921BD8F2057A566740B7838421E09EBE8BCC00645AA46635C643CF3E24A3806FB9A50C7102C9
3,605,642 UART: Caliptra RT
3,605,985 UART: [state] CFI Enabled
3,725,275 UART: [rt] RT listening for mailbox commands...
3,725,945 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,031 UART: [rt]cmd =0x41544d4e, len=14344
4,433,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Unprovisioned
86,077 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [kat] SHA2-256
893,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,673 UART: [kat] ++
897,825 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,782 UART: [kat] SHA2-512-ACC
908,683 UART: [kat] ECC-384
918,264 UART: [kat] HMAC-384Kdf
922,910 UART: [kat] LMS
1,171,238 UART: [kat] --
1,172,377 UART: [cold-reset] ++
1,172,911 UART: [fht] FHT @ 0x50003400
1,175,418 UART: [idev] ++
1,175,586 UART: [idev] CDI.KEYID = 6
1,175,946 UART: [idev] SUBJECT.KEYID = 7
1,176,370 UART: [idev] UDS.KEYID = 0
1,176,715 ready_for_fw is high
1,176,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,490 UART: [idev] Erasing UDS.KEYID = 0
1,201,737 UART: [idev] Sha1 KeyId Algorithm
1,210,237 UART: [idev] --
1,211,103 UART: [ldev] ++
1,211,271 UART: [ldev] CDI.KEYID = 6
1,211,634 UART: [ldev] SUBJECT.KEYID = 5
1,212,060 UART: [ldev] AUTHORITY.KEYID = 7
1,212,523 UART: [ldev] FE.KEYID = 1
1,217,517 UART: [ldev] Erasing FE.KEYID = 1
1,243,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,603 UART: [ldev] --
1,282,972 UART: [fwproc] Wait for Commands...
1,283,598 UART: [fwproc] Recv command 0x46574c44
1,284,326 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,678 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,207,263 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,238,433 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,600 >>> mbox cmd response: success
3,379,794 UART: [afmc] ++
3,379,962 UART: [afmc] CDI.KEYID = 6
3,380,324 UART: [afmc] SUBJECT.KEYID = 7
3,380,749 UART: [afmc] AUTHORITY.KEYID = 5
3,415,440 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,741 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,447 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,326 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,036 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,823 UART: [afmc] --
3,458,907 UART: [cold-reset] --
3,459,785 UART: [state] Locking Datavault
3,460,806 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,410 UART: [state] Locking ICCM
3,461,968 UART: [exit] Launching FMC @ 0x40000130
3,467,298 UART:
3,467,314 UART: Running Caliptra FMC ...
3,467,722 UART:
3,467,776 UART: [state] CFI Enabled
3,478,436 UART: [fht] FMC Alias Private Key: 7
3,597,426 UART: [art] Extend RT PCRs Done
3,597,854 UART: [art] Lock RT PCRs Done
3,598,958 UART: [art] Populate DV Done
3,607,061 UART: [fht] FMC Alias Private Key: 7
3,608,127 UART: [art] Derive CDI
3,608,407 UART: [art] Store in slot 0x4
3,694,154 UART: [art] Derive Key Pair
3,694,514 UART: [art] Store priv key in slot 0x5
3,707,766 UART: [art] Derive Key Pair - Done
3,722,456 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,113 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,878 UART: [art] PUB.X = 56083594EFFFB595B98F60D9F7F13B2D5E4FBAD757A12BC60B5604723247A2D2F022C0601816710FA1FC90D4F5C44C2D
3,745,642 UART: [art] PUB.Y = BFC29E1DD44BD3E73CE611105F9A3B1F2B7556B31C9596523A55B2799E1F2287A350CB92F85EF9EA12830E726688E4B3
3,752,593 UART: [art] SIG.R = 2ABFD3FCE00354A6292EEB803520138251C2D03ECF18B6015B6F789DC96718E023A68F9527BBFFE82F5560A92636BF77
3,759,361 UART: [art] SIG.S = 27F3ECD216A10F8B25DEC54B2996EEFC26628F74748F93FC6A444E82CB93B50043C28E704D87BBB80EC76DE7E3707596
3,782,993 UART: Caliptra RT
3,783,244 UART: [state] CFI Enabled
3,903,286 UART: [rt] RT listening for mailbox commands...
3,903,956 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,102 UART: [rt]cmd =0x41544d4e, len=14344
4,612,151 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,623 ready_for_fw is high
1,060,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,909 >>> mbox cmd response: success
3,287,182 UART:
3,287,198 UART: Running Caliptra FMC ...
3,287,606 UART:
3,287,660 UART: [state] CFI Enabled
3,298,208 UART: [fht] FMC Alias Private Key: 7
3,417,426 UART: [art] Extend RT PCRs Done
3,417,854 UART: [art] Lock RT PCRs Done
3,419,396 UART: [art] Populate DV Done
3,427,721 UART: [fht] FMC Alias Private Key: 7
3,428,845 UART: [art] Derive CDI
3,429,125 UART: [art] Store in slot 0x4
3,515,062 UART: [art] Derive Key Pair
3,515,422 UART: [art] Store priv key in slot 0x5
3,528,236 UART: [art] Derive Key Pair - Done
3,543,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,937 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,702 UART: [art] PUB.X = 1FA67CB290C5E75927A6438E4B199BB512F36FDA697AC7FD9CE810EEA4600677F086D92C2893CCF62D304278A16BFC12
3,566,477 UART: [art] PUB.Y = 76BA5D703C252ACA789C6A60A18EA3227AD489176DB2CD2A0DC561701DEE8E53A3EC231F4EEA7B45E118B4F2DEF0EB60
3,573,444 UART: [art] SIG.R = 23AD4E6EA212AB9873DB2D8392D39A9E6C5BB6CC437C93FA7E8C92780D4278C42901A160C90E3A1ABFA01D23CCF00A49
3,580,216 UART: [art] SIG.S = FC305215E667BB3CC52431EA6D2A4B3CD15479F622DB1FD4BC3421F8C7A6042AE7FF44D0C95AADFC87A73BE5DB5A53F2
3,604,591 UART: Caliptra RT
3,604,842 UART: [state] CFI Enabled
3,724,128 UART: [rt] RT listening for mailbox commands...
3,724,798 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,814 UART: [rt]cmd =0x41544d4e, len=14344
4,432,501 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,015 UART: [state] LifecycleState = Unprovisioned
85,670 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
893,185 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,310 UART: [kat] ++
897,462 UART: [kat] sha1
901,546 UART: [kat] SHA2-256
903,486 UART: [kat] SHA2-384
906,159 UART: [kat] SHA2-512-ACC
908,060 UART: [kat] ECC-384
917,595 UART: [kat] HMAC-384Kdf
922,341 UART: [kat] LMS
1,170,669 UART: [kat] --
1,171,592 UART: [cold-reset] ++
1,171,956 UART: [fht] FHT @ 0x50003400
1,174,601 UART: [idev] ++
1,174,769 UART: [idev] CDI.KEYID = 6
1,175,129 UART: [idev] SUBJECT.KEYID = 7
1,175,553 UART: [idev] UDS.KEYID = 0
1,175,898 ready_for_fw is high
1,175,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,921 UART: [idev] Erasing UDS.KEYID = 0
1,201,700 UART: [idev] Sha1 KeyId Algorithm
1,210,014 UART: [idev] --
1,211,028 UART: [ldev] ++
1,211,196 UART: [ldev] CDI.KEYID = 6
1,211,559 UART: [ldev] SUBJECT.KEYID = 5
1,211,985 UART: [ldev] AUTHORITY.KEYID = 7
1,212,448 UART: [ldev] FE.KEYID = 1
1,217,310 UART: [ldev] Erasing FE.KEYID = 1
1,244,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,866 UART: [ldev] --
1,283,283 UART: [fwproc] Wait for Commands...
1,283,939 UART: [fwproc] Recv command 0x46574c44
1,284,667 UART: [fwproc] Recv'd Img size: 118548 bytes
3,155,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,182,887 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,214,057 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,354,298 >>> mbox cmd response: success
3,355,422 UART: [afmc] ++
3,355,590 UART: [afmc] CDI.KEYID = 6
3,355,952 UART: [afmc] SUBJECT.KEYID = 7
3,356,377 UART: [afmc] AUTHORITY.KEYID = 5
3,391,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,408,209 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,408,957 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,414,663 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,420,542 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,426,252 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,434,211 UART: [afmc] --
3,435,273 UART: [cold-reset] --
3,435,971 UART: [state] Locking Datavault
3,437,084 UART: [state] Locking PCR0, PCR1 and PCR31
3,437,688 UART: [state] Locking ICCM
3,438,314 UART: [exit] Launching FMC @ 0x40000130
3,443,644 UART:
3,443,660 UART: Running Caliptra FMC ...
3,444,068 UART:
3,444,211 UART: [state] CFI Enabled
3,454,717 UART: [fht] FMC Alias Private Key: 7
3,573,511 UART: [art] Extend RT PCRs Done
3,573,939 UART: [art] Lock RT PCRs Done
3,575,617 UART: [art] Populate DV Done
3,584,058 UART: [fht] FMC Alias Private Key: 7
3,585,064 UART: [art] Derive CDI
3,585,344 UART: [art] Store in slot 0x4
3,671,353 UART: [art] Derive Key Pair
3,671,713 UART: [art] Store priv key in slot 0x5
3,685,231 UART: [art] Derive Key Pair - Done
3,699,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,715,596 UART: [art] Erasing AUTHORITY.KEYID = 7
3,716,361 UART: [art] PUB.X = 792C9EA1816F3C66ECD6F7B137C9A55BE6BCD89B656C4D1F1E3F18B45C7BD37CADB8BCCB17969D0A79B5A1E22D402B2F
3,723,152 UART: [art] PUB.Y = F7515AF70E32F2D7FD1572FE61E7F5011EB37F581954558B99C93A664F39576A337434CB42D4981BC21504475FDAA1FB
3,730,093 UART: [art] SIG.R = F01C254911AF6C0C2689CA85DF5134AA0E4078F27383840DD28E10EE5BBDEBC295E6FAEFEBF70BC5E339D0069BD046F8
3,736,866 UART: [art] SIG.S = A69F6AFC00DAFB50BAC540AB890AFCE5498EF429ABB3A3C4BABF15158114E46249C42DC83B38A5252F363271F76959B7
3,760,559 UART: Caliptra RT
3,760,902 UART: [state] CFI Enabled
3,879,815 UART: [rt] RT listening for mailbox commands...
3,880,485 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,747 UART: [rt]cmd =0x41544d4e, len=14344
4,588,902 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,826 ready_for_fw is high
1,060,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,254 >>> mbox cmd response: success
3,287,649 UART:
3,287,665 UART: Running Caliptra FMC ...
3,288,073 UART:
3,288,216 UART: [state] CFI Enabled
3,298,786 UART: [fht] FMC Alias Private Key: 7
3,418,112 UART: [art] Extend RT PCRs Done
3,418,540 UART: [art] Lock RT PCRs Done
3,420,028 UART: [art] Populate DV Done
3,428,093 UART: [fht] FMC Alias Private Key: 7
3,429,169 UART: [art] Derive CDI
3,429,449 UART: [art] Store in slot 0x4
3,515,550 UART: [art] Derive Key Pair
3,515,910 UART: [art] Store priv key in slot 0x5
3,529,150 UART: [art] Derive Key Pair - Done
3,543,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,612 UART: [art] PUB.X = 7BD61D16B9AFD1794BFDD2E43221F1A88D87A7B267A93C00A09752A23D1D8EE7124C50E79C3DA0A4388AA1776FEA66B0
3,567,372 UART: [art] PUB.Y = 6E762D742036B8B521DEDD96F0E14406ED388918A4B8E7A8567EC63788A736B6F19C61D3682DB33B38361DB078D87F03
3,574,314 UART: [art] SIG.R = E3097ECA98B03DEFC439657B89D13588846BAE3EBB9B14FB56AA67947E4DEFFB0006DF63FB78EFB85DF1B205799EB857
3,581,071 UART: [art] SIG.S = 46E5A35F4864415FDB4ECE5649DF6DA5502F18B91FD6B769E0639F954E7D836FA3914CB982ACEF93C20B1900E50EFDED
3,604,883 UART: Caliptra RT
3,605,226 UART: [state] CFI Enabled
3,725,626 UART: [rt] RT listening for mailbox commands...
3,726,296 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,100 UART: [rt]cmd =0x41544d4e, len=14344
4,426,228 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_max_plus_one_metadata_entry_limit ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
192,160 UART:
192,508 UART: Running Caliptra ROM ...
193,704 UART:
193,863 UART: [state] CFI Enabled
262,133 UART: [state] LifecycleState = Unprovisioned
264,075 UART: [state] DebugLocked = No
266,541 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,185 UART: [kat] SHA2-256
441,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,405 UART: [kat] ++
452,938 UART: [kat] sha1
462,950 UART: [kat] SHA2-256
465,637 UART: [kat] SHA2-384
472,207 UART: [kat] SHA2-512-ACC
474,515 UART: [kat] ECC-384
2,767,367 UART: [kat] HMAC-384Kdf
2,799,911 UART: [kat] LMS
3,990,252 UART: [kat] --
3,994,613 UART: [cold-reset] ++
3,997,263 UART: [fht] Storing FHT @ 0x50003400
4,008,036 UART: [idev] ++
4,008,613 UART: [idev] CDI.KEYID = 6
4,009,535 UART: [idev] SUBJECT.KEYID = 7
4,010,790 UART: [idev] UDS.KEYID = 0
4,011,904 ready_for_fw is high
4,012,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,256 UART: [idev] Erasing UDS.KEYID = 0
7,342,328 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,464 UART: [idev] --
7,369,544 UART: [ldev] ++
7,370,172 UART: [ldev] CDI.KEYID = 6
7,371,084 UART: [ldev] SUBJECT.KEYID = 5
7,372,305 UART: [ldev] AUTHORITY.KEYID = 7
7,373,590 UART: [ldev] FE.KEYID = 1
7,400,978 UART: [ldev] Erasing FE.KEYID = 1
10,734,162 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,619 UART: [ldev] --
13,092,641 UART: [fwproc] Waiting for Commands...
13,094,730 UART: [fwproc] Received command 0x46574c44
13,096,957 UART: [fwproc] Received Image of size 118548 bytes
21,941,572 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,019,856 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,093,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,421,866 >>> mbox cmd response: success
22,425,861 UART: [afmc] ++
22,426,533 UART: [afmc] CDI.KEYID = 6
22,427,424 UART: [afmc] SUBJECT.KEYID = 7
22,428,640 UART: [afmc] AUTHORITY.KEYID = 5
25,783,185 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,083,446 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,085,702 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,100,182 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,114,965 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,129,356 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,149,984 UART: [afmc] --
28,154,577 UART: [cold-reset] --
28,158,987 UART: [state] Locking Datavault
28,165,042 UART: [state] Locking PCR0, PCR1 and PCR31
28,166,796 UART: [state] Locking ICCM
28,169,190 UART: [exit] Launching FMC @ 0x40000130
28,177,592 UART:
28,177,830 UART: Running Caliptra FMC ...
28,178,853 UART:
28,179,004 UART: [state] CFI Enabled
28,244,844 UART: [fht] FMC Alias Private Key: 7
30,606,867 UART: [art] Extend RT PCRs Done
30,608,093 UART: [art] Lock RT PCRs Done
30,609,818 UART: [art] Populate DV Done
30,615,181 UART: [fht] FMC Alias Private Key: 7
30,616,753 UART: [art] Derive CDI
30,617,494 UART: [art] Store in slot 0x4
30,673,686 UART: [art] Derive Key Pair
30,674,692 UART: [art] Store priv key in slot 0x5
33,967,718 UART: [art] Derive Key Pair - Done
33,980,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,268,349 UART: [art] Erasing AUTHORITY.KEYID = 7
36,269,857 UART: [art] PUB.X = 90FC4C15CFA1BFDEF1515D9E3A82E89C8503C315173576CB05BFC7C25B3AABC1330B2F9894BEADD95264EEC363ACE314
36,277,158 UART: [art] PUB.Y = 805598458F2C235E921BCB3B7C9E1079001F0D95AF827B48D4DB6E79D32AD38BEA888636157C1519CB73F1B7EE0CC064
36,284,444 UART: [art] SIG.R = 89FEC45A95144C145FD63FE6AD6C90B616973B14465B1999315BA3878B40F925060732EF3B6C8110DB564CE4B2CA69D3
36,291,844 UART: [art] SIG.S = 699CC709BABFDCD24ED4692953924B73A5D82C71FC033292F0007400910E121266E534DB3B83AF365F391BE6C3856E91
37,597,121 UART: Caliptra RT
37,597,812 UART: [state] CFI Enabled
37,772,740 UART: [rt] RT listening for mailbox commands...
37,775,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,930,455 UART: [rt]cmd =0x41544d4e, len=14344
42,151,159 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
3,787,387 ready_for_fw is high
3,787,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,947,113 >>> mbox cmd response: success
27,644,026 UART:
27,644,438 UART: Running Caliptra FMC ...
27,645,642 UART:
27,645,811 UART: [state] CFI Enabled
27,715,621 UART: [fht] FMC Alias Private Key: 7
30,076,335 UART: [art] Extend RT PCRs Done
30,077,570 UART: [art] Lock RT PCRs Done
30,079,309 UART: [art] Populate DV Done
30,084,676 UART: [fht] FMC Alias Private Key: 7
30,086,354 UART: [art] Derive CDI
30,087,180 UART: [art] Store in slot 0x4
30,145,434 UART: [art] Derive Key Pair
30,146,475 UART: [art] Store priv key in slot 0x5
33,439,409 UART: [art] Derive Key Pair - Done
33,452,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,741,517 UART: [art] Erasing AUTHORITY.KEYID = 7
35,743,020 UART: [art] PUB.X = 0EBDA5A01CF0078737F0125C65DF59995286554BB1535121AD35CE116FBC2FCF65F985E330030BAB2D1A36C9155D9640
35,750,280 UART: [art] PUB.Y = 8E7328F64FFE98A5020A4F312014308F2CB6A39B6226471DDD32C6A38EFFB31B0EFC7943532B6267C4111FAB5468263F
35,757,501 UART: [art] SIG.R = 740D20BA816DBB3D3AE55D036E67A54E404B1CE3D7835A8B75A9FFF5AF97D54A9977E39BCA36DAD8D88228DC0B80FF97
35,764,949 UART: [art] SIG.S = 824C343267CD5A586840C310182E3EF47029609F9D442F7B081B2E36DD2F139C5763C83AE12E5F794CC4ACA897BA2134
37,070,196 UART: Caliptra RT
37,070,915 UART: [state] CFI Enabled
37,246,842 UART: [rt] RT listening for mailbox commands...
37,249,126 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,404,372 UART: [rt]cmd =0x41544d4e, len=14344
41,624,409 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,593 UART:
192,954 UART: Running Caliptra ROM ...
194,081 UART:
603,776 UART: [state] CFI Enabled
618,434 UART: [state] LifecycleState = Unprovisioned
620,387 UART: [state] DebugLocked = No
622,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,052 UART: [kat] SHA2-256
796,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,351 UART: [kat] ++
807,870 UART: [kat] sha1
817,694 UART: [kat] SHA2-256
820,451 UART: [kat] SHA2-384
826,886 UART: [kat] SHA2-512-ACC
829,283 UART: [kat] ECC-384
3,113,527 UART: [kat] HMAC-384Kdf
3,123,987 UART: [kat] LMS
4,314,115 UART: [kat] --
4,319,331 UART: [cold-reset] ++
4,321,471 UART: [fht] Storing FHT @ 0x50003400
4,331,877 UART: [idev] ++
4,332,431 UART: [idev] CDI.KEYID = 6
4,333,379 UART: [idev] SUBJECT.KEYID = 7
4,334,614 UART: [idev] UDS.KEYID = 0
4,335,626 ready_for_fw is high
4,336,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,829 UART: [idev] Erasing UDS.KEYID = 0
7,618,355 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,252 UART: [idev] --
7,643,395 UART: [ldev] ++
7,644,022 UART: [ldev] CDI.KEYID = 6
7,644,934 UART: [ldev] SUBJECT.KEYID = 5
7,646,141 UART: [ldev] AUTHORITY.KEYID = 7
7,647,423 UART: [ldev] FE.KEYID = 1
7,657,469 UART: [ldev] Erasing FE.KEYID = 1
10,943,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,300 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,372 UART: [ldev] --
13,304,619 UART: [fwproc] Waiting for Commands...
13,307,697 UART: [fwproc] Received command 0x46574c44
13,309,880 UART: [fwproc] Received Image of size 118548 bytes
22,089,909 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,172,857 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,246,049 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,574,937 >>> mbox cmd response: success
22,579,352 UART: [afmc] ++
22,579,984 UART: [afmc] CDI.KEYID = 6
22,580,900 UART: [afmc] SUBJECT.KEYID = 7
22,582,109 UART: [afmc] AUTHORITY.KEYID = 5
25,899,631 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,194,046 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,196,297 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,210,811 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,225,596 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,239,985 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,261,397 UART: [afmc] --
28,265,252 UART: [cold-reset] --
28,268,851 UART: [state] Locking Datavault
28,272,170 UART: [state] Locking PCR0, PCR1 and PCR31
28,273,919 UART: [state] Locking ICCM
28,276,040 UART: [exit] Launching FMC @ 0x40000130
28,284,433 UART:
28,284,661 UART: Running Caliptra FMC ...
28,285,682 UART:
28,285,822 UART: [state] CFI Enabled
28,293,970 UART: [fht] FMC Alias Private Key: 7
30,633,758 UART: [art] Extend RT PCRs Done
30,634,980 UART: [art] Lock RT PCRs Done
30,636,712 UART: [art] Populate DV Done
30,642,345 UART: [fht] FMC Alias Private Key: 7
30,644,041 UART: [art] Derive CDI
30,644,853 UART: [art] Store in slot 0x4
30,687,443 UART: [art] Derive Key Pair
30,688,472 UART: [art] Store priv key in slot 0x5
33,930,467 UART: [art] Derive Key Pair - Done
33,943,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,223,531 UART: [art] Erasing AUTHORITY.KEYID = 7
36,225,048 UART: [art] PUB.X = 190EAAE1428DFAF6348679ED1727382845CAAFDBA7769AA32059A255EDD4A730D6FEC52D3E6681B0FF1228BC7789192B
36,232,306 UART: [art] PUB.Y = 924C6C8495C7692A4C73EDF1B2F6A0765F10EAB423A9B8A537306ECFE0EA60AB75B61BAD6A01A1ADAEDB5604F6240383
36,239,583 UART: [art] SIG.R = BA49A3B61678F4A3267E5804B550D8D3495099236FD959E9C609C0DED75CE92D1301F5D622F3A189719AA542110C1061
36,246,964 UART: [art] SIG.S = 560535A5AE17CB8FC241C2716FD64C1811BC510DA6815F9680FF9659A2219C7EF6A6DEAAFA889B600DA03807A1BFD2B3
37,552,687 UART: Caliptra RT
37,553,398 UART: [state] CFI Enabled
37,686,120 UART: [rt] RT listening for mailbox commands...
37,688,467 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,843,943 UART: [rt]cmd =0x41544d4e, len=14344
42,116,044 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,396 writing to cptra_bootfsm_go
4,129,453 ready_for_fw is high
4,129,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,415,084 >>> mbox cmd response: success
28,059,580 UART:
28,059,987 UART: Running Caliptra FMC ...
28,061,100 UART:
28,061,272 UART: [state] CFI Enabled
28,069,596 UART: [fht] FMC Alias Private Key: 7
30,410,095 UART: [art] Extend RT PCRs Done
30,411,319 UART: [art] Lock RT PCRs Done
30,412,915 UART: [art] Populate DV Done
30,418,336 UART: [fht] FMC Alias Private Key: 7
30,419,927 UART: [art] Derive CDI
30,420,661 UART: [art] Store in slot 0x4
30,463,192 UART: [art] Derive Key Pair
30,464,184 UART: [art] Store priv key in slot 0x5
33,706,141 UART: [art] Derive Key Pair - Done
33,718,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,998,915 UART: [art] Erasing AUTHORITY.KEYID = 7
36,000,428 UART: [art] PUB.X = 8AAA09953020C1E3F45104412FD2118231E009918BEE797BD34B8A84935B78A0E9B2196AA0B7821E0598BBCEBAE56875
36,007,679 UART: [art] PUB.Y = 285F8C7F6D632DCB1FBD9C9C4D11B4D6BEC0CDD0B53E4D87C8DBBA33BC118E2C58C09A355567A76BD37FEE5863AA1DB9
36,015,008 UART: [art] SIG.R = E5E0B0F0031DA8161483CA1D362ED8E5BE5440F24F8DA0CDC218025D3FE9CABA2604DDCDE665C60A6B158C171B2F135D
36,022,431 UART: [art] SIG.S = 0A433EA43B08B476E85554E101DFA5C7DB9EAB80A3F4F7E31E5562D31A976D6FA5CDB4D423ABF59BE0ED072376BD83F9
37,327,295 UART: Caliptra RT
37,328,005 UART: [state] CFI Enabled
37,461,156 UART: [rt] RT listening for mailbox commands...
37,463,458 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,618,860 UART: [rt]cmd =0x41544d4e, len=14344
41,813,430 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,114 UART:
192,489 UART: Running Caliptra ROM ...
193,674 UART:
193,826 UART: [state] CFI Enabled
264,610 UART: [state] LifecycleState = Unprovisioned
266,599 UART: [state] DebugLocked = No
268,205 UART: [state] WD Timer not started. Device not locked for debugging
271,604 UART: [kat] SHA2-256
451,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,013 UART: [kat] ++
462,486 UART: [kat] sha1
473,072 UART: [kat] SHA2-256
475,804 UART: [kat] SHA2-384
482,002 UART: [kat] SHA2-512-ACC
484,367 UART: [kat] ECC-384
2,948,473 UART: [kat] HMAC-384Kdf
2,971,378 UART: [kat] LMS
3,447,869 UART: [kat] --
3,453,212 UART: [cold-reset] ++
3,455,418 UART: [fht] FHT @ 0x50003400
3,466,672 UART: [idev] ++
3,467,235 UART: [idev] CDI.KEYID = 6
3,468,261 UART: [idev] SUBJECT.KEYID = 7
3,469,426 UART: [idev] UDS.KEYID = 0
3,470,357 ready_for_fw is high
3,470,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,814 UART: [idev] Erasing UDS.KEYID = 0
5,990,631 UART: [idev] Sha1 KeyId Algorithm
6,013,440 UART: [idev] --
6,017,865 UART: [ldev] ++
6,018,433 UART: [ldev] CDI.KEYID = 6
6,019,316 UART: [ldev] SUBJECT.KEYID = 5
6,020,580 UART: [ldev] AUTHORITY.KEYID = 7
6,021,835 UART: [ldev] FE.KEYID = 1
6,056,773 UART: [ldev] Erasing FE.KEYID = 1
8,563,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,061 UART: [ldev] --
10,374,228 UART: [fwproc] Wait for Commands...
10,376,800 UART: [fwproc] Recv command 0x46574c44
10,378,831 UART: [fwproc] Recv'd Img size: 118548 bytes
14,899,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,981,589 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,054,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,383,332 >>> mbox cmd response: success
15,387,575 UART: [afmc] ++
15,388,186 UART: [afmc] CDI.KEYID = 6
15,389,103 UART: [afmc] SUBJECT.KEYID = 7
15,390,320 UART: [afmc] AUTHORITY.KEYID = 5
17,918,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,127 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,303 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,680,154 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,696,093 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,711,806 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,735,542 UART: [afmc] --
19,738,601 UART: [cold-reset] --
19,741,756 UART: [state] Locking Datavault
19,748,027 UART: [state] Locking PCR0, PCR1 and PCR31
19,749,723 UART: [state] Locking ICCM
19,751,221 UART: [exit] Launching FMC @ 0x40000130
19,759,664 UART:
19,759,926 UART: Running Caliptra FMC ...
19,761,027 UART:
19,761,187 UART: [state] CFI Enabled
19,819,806 UART: [fht] FMC Alias Private Key: 7
21,585,700 UART: [art] Extend RT PCRs Done
21,586,910 UART: [art] Lock RT PCRs Done
21,588,473 UART: [art] Populate DV Done
21,593,827 UART: [fht] FMC Alias Private Key: 7
21,595,463 UART: [art] Derive CDI
21,596,275 UART: [art] Store in slot 0x4
21,652,617 UART: [art] Derive Key Pair
21,653,648 UART: [art] Store priv key in slot 0x5
24,116,267 UART: [art] Derive Key Pair - Done
24,129,095 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,842,513 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,015 UART: [art] PUB.X = 308494F76401F71EF9E17542630E9F5D7FE8DCFE8CF58032C686E3361B928F46A61DD7C1DD75AC38C80EE3C9E89617BA
25,851,287 UART: [art] PUB.Y = EB1505A9DD6C2CE81D193EC1C3527CED8EDF9A65993F846CE7C52B43424B6A3CE8897EA4BCF95D88CD96319315545A19
25,858,518 UART: [art] SIG.R = 8A47BFED4551CDAE094ABAEAD1A1BDF72504F44106D2DB3BCB5CA6D9F9B8DE98C858ED7F6A2420B828B258AC783ABF92
25,865,964 UART: [art] SIG.S = 0DCB792D7D73A9C81721BCDF9BB51E210DB6A8245544C22311F09CE6EAA82149176DF3DDD24EA4F6CC95EAE93AD99365
26,844,967 UART: Caliptra RT
26,845,657 UART: [state] CFI Enabled
27,027,247 UART: [rt] RT listening for mailbox commands...
27,029,550 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,184,585 UART: [rt]cmd =0x41544d4e, len=14344
29,578,096 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
3,460,998 ready_for_fw is high
3,461,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,402,698 >>> mbox cmd response: success
19,687,698 UART:
19,688,073 UART: Running Caliptra FMC ...
19,689,182 UART:
19,689,334 UART: [state] CFI Enabled
19,754,698 UART: [fht] FMC Alias Private Key: 7
21,521,438 UART: [art] Extend RT PCRs Done
21,522,667 UART: [art] Lock RT PCRs Done
21,524,257 UART: [art] Populate DV Done
21,529,807 UART: [fht] FMC Alias Private Key: 7
21,531,557 UART: [art] Derive CDI
21,532,288 UART: [art] Store in slot 0x4
21,588,020 UART: [art] Derive Key Pair
21,589,040 UART: [art] Store priv key in slot 0x5
24,052,139 UART: [art] Derive Key Pair - Done
24,064,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,777,873 UART: [art] Erasing AUTHORITY.KEYID = 7
25,779,357 UART: [art] PUB.X = F940FB76241904D862D080FCF1B1F11EA7935D5041D5E6530ECA7B5BF78F705DCA684ABDA07BD57220A07D396DF9B6D6
25,786,664 UART: [art] PUB.Y = 936893BAD937E02A057C2798167BE9178C87338AC22D6B33CB98C7C6DECF1F285773B9170644A820C90A4AA01EE02FBE
25,793,935 UART: [art] SIG.R = BD4C24638FBF96133351CB8CB7663AF8928CCD50878745F118A1CC26E15864755F1FFCB944285EC7EFBC96B0CFC01786
25,801,326 UART: [art] SIG.S = 7DC4DD5CD066AD88D0A64E616C132CF3B523B3E3CCF4AA3D6E7850D89DF5D1681808373CFF77718F48FC45AF67A68264
26,780,052 UART: Caliptra RT
26,780,766 UART: [state] CFI Enabled
26,962,647 UART: [rt] RT listening for mailbox commands...
26,964,935 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,120,071 UART: [rt]cmd =0x41544d4e, len=14344
29,503,317 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
192,513 UART:
192,859 UART: Running Caliptra ROM ...
193,972 UART:
603,869 UART: [state] CFI Enabled
619,544 UART: [state] LifecycleState = Unprovisioned
621,517 UART: [state] DebugLocked = No
624,391 UART: [state] WD Timer not started. Device not locked for debugging
627,444 UART: [kat] SHA2-256
807,096 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,883 UART: [kat] ++
818,328 UART: [kat] sha1
827,757 UART: [kat] SHA2-256
830,481 UART: [kat] SHA2-384
836,706 UART: [kat] SHA2-512-ACC
839,089 UART: [kat] ECC-384
3,282,883 UART: [kat] HMAC-384Kdf
3,294,548 UART: [kat] LMS
3,771,056 UART: [kat] --
3,775,982 UART: [cold-reset] ++
3,777,568 UART: [fht] FHT @ 0x50003400
3,788,978 UART: [idev] ++
3,789,546 UART: [idev] CDI.KEYID = 6
3,790,577 UART: [idev] SUBJECT.KEYID = 7
3,791,759 UART: [idev] UDS.KEYID = 0
3,792,690 ready_for_fw is high
3,792,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,701 UART: [idev] Erasing UDS.KEYID = 0
6,266,067 UART: [idev] Sha1 KeyId Algorithm
6,289,137 UART: [idev] --
6,293,850 UART: [ldev] ++
6,294,421 UART: [ldev] CDI.KEYID = 6
6,295,335 UART: [ldev] SUBJECT.KEYID = 5
6,296,552 UART: [ldev] AUTHORITY.KEYID = 7
6,297,784 UART: [ldev] FE.KEYID = 1
6,308,280 UART: [ldev] Erasing FE.KEYID = 1
8,785,548 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,124 UART: [ldev] --
10,576,045 UART: [fwproc] Wait for Commands...
10,579,005 UART: [fwproc] Recv command 0x46574c44
10,581,046 UART: [fwproc] Recv'd Img size: 118548 bytes
15,129,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,212,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,285,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,613,646 >>> mbox cmd response: success
15,617,057 UART: [afmc] ++
15,617,675 UART: [afmc] CDI.KEYID = 6
15,618,562 UART: [afmc] SUBJECT.KEYID = 7
15,619,836 UART: [afmc] AUTHORITY.KEYID = 5
18,123,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,843,834 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,846,015 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,861,898 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,877,821 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,893,514 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,917,771 UART: [afmc] --
19,922,076 UART: [cold-reset] --
19,925,520 UART: [state] Locking Datavault
19,929,975 UART: [state] Locking PCR0, PCR1 and PCR31
19,931,731 UART: [state] Locking ICCM
19,933,208 UART: [exit] Launching FMC @ 0x40000130
19,941,599 UART:
19,941,843 UART: Running Caliptra FMC ...
19,942,946 UART:
19,943,106 UART: [state] CFI Enabled
19,951,156 UART: [fht] FMC Alias Private Key: 7
21,717,931 UART: [art] Extend RT PCRs Done
21,719,154 UART: [art] Lock RT PCRs Done
21,720,753 UART: [art] Populate DV Done
21,726,545 UART: [fht] FMC Alias Private Key: 7
21,728,200 UART: [art] Derive CDI
21,728,943 UART: [art] Store in slot 0x4
21,771,709 UART: [art] Derive Key Pair
21,772,747 UART: [art] Store priv key in slot 0x5
24,199,688 UART: [art] Derive Key Pair - Done
24,212,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,918,945 UART: [art] Erasing AUTHORITY.KEYID = 7
25,920,447 UART: [art] PUB.X = 80D4BFCF3C13D3E0307BEF49B33375B68FF3B098791BD6424A854CCAB72724563D03B6FACFCC5565B556F131DB323693
25,927,697 UART: [art] PUB.Y = 919B6BC650A4FABA0D0FFB6F72A61842BAACB809B50EAC442ABAD05A7D8BA662DF74FF1822B27EEDE1F7B75CE3F19676
25,935,032 UART: [art] SIG.R = F53A9695A8A64988F6ED4B98839049A3002465978950829B282B72F8B13CAD6E6B88DE6E92A903C53650386C2CA31D59
25,942,379 UART: [art] SIG.S = 3DCA06AE897BA353604DE16BB22C58A9278C178AA45DC09F06940CE7AF25EAC9A62B534C2C99EE8BB4D3F0DFDB67BDE7
26,920,839 UART: Caliptra RT
26,921,523 UART: [state] CFI Enabled
27,054,845 UART: [rt] RT listening for mailbox commands...
27,057,140 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,606 UART: [rt]cmd =0x41544d4e, len=14344
29,604,823 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,447 writing to cptra_bootfsm_go
3,784,536 ready_for_fw is high
3,784,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,600,520 >>> mbox cmd response: success
19,853,696 UART:
19,854,083 UART: Running Caliptra FMC ...
19,855,223 UART:
19,855,405 UART: [state] CFI Enabled
19,862,903 UART: [fht] FMC Alias Private Key: 7
21,628,573 UART: [art] Extend RT PCRs Done
21,629,790 UART: [art] Lock RT PCRs Done
21,631,261 UART: [art] Populate DV Done
21,636,922 UART: [fht] FMC Alias Private Key: 7
21,638,518 UART: [art] Derive CDI
21,639,332 UART: [art] Store in slot 0x4
21,681,879 UART: [art] Derive Key Pair
21,682,916 UART: [art] Store priv key in slot 0x5
24,109,863 UART: [art] Derive Key Pair - Done
24,122,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,828,742 UART: [art] Erasing AUTHORITY.KEYID = 7
25,830,246 UART: [art] PUB.X = 3685C87BC7A3E65321F8ABAB7C9BDFEAD75AD9454A59535096B2D997C8F829FE7824794FC21614A22A1048BE7C4BE834
25,837,555 UART: [art] PUB.Y = 5937EF3A3914CA24E0888A07AF8118B170AFD41DA32579D7CCDF2DA53E473AB69C08B072E73A80BEB66BEB519EF76CE0
25,844,812 UART: [art] SIG.R = A1181F535FD7777050E345D439C1C0F2F3FDF77682024628B1430D21C146F8040325720EF88421B663BE9E83521B7C0B
25,852,202 UART: [art] SIG.S = 2434A4D6C43AD2C40C5ED9C92470C5B32D9C4B87AA9F3E50346FB112C316B364B77C5A308EC1F0745D035C4717331BE4
26,830,977 UART: Caliptra RT
26,831,687 UART: [state] CFI Enabled
26,964,435 UART: [rt] RT listening for mailbox commands...
26,966,718 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,122,075 UART: [rt]cmd =0x41544d4e, len=14344
29,519,239 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,166 UART:
192,526 UART: Running Caliptra ROM ...
193,644 UART:
193,787 UART: [state] CFI Enabled
263,466 UART: [state] LifecycleState = Unprovisioned
265,823 UART: [state] DebugLocked = No
268,547 UART: [state] WD Timer not started. Device not locked for debugging
273,359 UART: [kat] SHA2-256
463,230 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,039 UART: [kat] ++
474,489 UART: [kat] sha1
485,601 UART: [kat] SHA2-256
488,648 UART: [kat] SHA2-384
494,743 UART: [kat] SHA2-512-ACC
497,328 UART: [kat] ECC-384
2,946,869 UART: [kat] HMAC-384Kdf
2,970,267 UART: [kat] LMS
3,502,028 UART: [kat] --
3,506,779 UART: [cold-reset] ++
3,507,936 UART: [fht] FHT @ 0x50003400
3,519,323 UART: [idev] ++
3,520,079 UART: [idev] CDI.KEYID = 6
3,521,009 UART: [idev] SUBJECT.KEYID = 7
3,522,186 UART: [idev] UDS.KEYID = 0
3,523,107 ready_for_fw is high
3,523,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,298 UART: [idev] Erasing UDS.KEYID = 0
6,029,543 UART: [idev] Sha1 KeyId Algorithm
6,051,043 UART: [idev] --
6,056,247 UART: [ldev] ++
6,056,925 UART: [ldev] CDI.KEYID = 6
6,057,834 UART: [ldev] SUBJECT.KEYID = 5
6,059,043 UART: [ldev] AUTHORITY.KEYID = 7
6,060,218 UART: [ldev] FE.KEYID = 1
6,098,041 UART: [ldev] Erasing FE.KEYID = 1
8,604,693 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,804 UART: [ldev] --
10,413,157 UART: [fwproc] Wait for Commands...
10,414,928 UART: [fwproc] Recv command 0x46574c44
10,417,232 UART: [fwproc] Recv'd Img size: 118548 bytes
15,097,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,188,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,312,029 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,872,973 >>> mbox cmd response: success
15,876,447 UART: [afmc] ++
15,877,145 UART: [afmc] CDI.KEYID = 6
15,878,384 UART: [afmc] SUBJECT.KEYID = 7
15,879,817 UART: [afmc] AUTHORITY.KEYID = 5
18,426,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,149,897 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,151,804 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,166,968 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,182,132 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,197,168 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,221,579 UART: [afmc] --
20,225,327 UART: [cold-reset] --
20,230,432 UART: [state] Locking Datavault
20,235,810 UART: [state] Locking PCR0, PCR1 and PCR31
20,238,040 UART: [state] Locking ICCM
20,240,660 UART: [exit] Launching FMC @ 0x40000130
20,249,332 UART:
20,249,575 UART: Running Caliptra FMC ...
20,250,676 UART:
20,250,834 UART: [state] CFI Enabled
20,307,573 UART: [fht] FMC Alias Private Key: 7
22,074,270 UART: [art] Extend RT PCRs Done
22,075,492 UART: [art] Lock RT PCRs Done
22,077,138 UART: [art] Populate DV Done
22,082,598 UART: [fht] FMC Alias Private Key: 7
22,084,244 UART: [art] Derive CDI
22,085,058 UART: [art] Store in slot 0x4
22,140,371 UART: [art] Derive Key Pair
22,141,373 UART: [art] Store priv key in slot 0x5
24,603,895 UART: [art] Derive Key Pair - Done
24,616,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,330,133 UART: [art] Erasing AUTHORITY.KEYID = 7
26,331,632 UART: [art] PUB.X = 613DD54F4A6D33B3ABB308910D58EEB3F7AA2C2776113591C214B7EC5A967C8D93C7678B7E12D0DDA6D24E7EC442AB92
26,338,937 UART: [art] PUB.Y = 4AC7905DA44D40A25232B2DE1968891DFE56FB1D9D33B6D4AFA2D3F8783EFB8322160AF91A38A24AC4794D1C2A6E9CC8
26,346,171 UART: [art] SIG.R = 917510687ECD7A70E8D8E5679E1F53F14668A551D5C2D980F846EDF7EA82A31089CEBD96E5D236E0800D9A478F8DF547
26,353,580 UART: [art] SIG.S = 94866133A0A1C0EAEDD93CADF70F010AEECB5D090E194EC5C9D613773B6A0CCD711565EFA55A8621131BA5F5D040ADC1
27,332,244 UART: Caliptra RT
27,332,932 UART: [state] CFI Enabled
27,514,670 UART: [rt] RT listening for mailbox commands...
27,517,117 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,455 UART: [rt]cmd =0x41544d4e, len=14344
30,056,765 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,435,872 ready_for_fw is high
3,436,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,936,312 >>> mbox cmd response: success
20,214,894 UART:
20,215,268 UART: Running Caliptra FMC ...
20,216,403 UART:
20,216,564 UART: [state] CFI Enabled
20,285,072 UART: [fht] FMC Alias Private Key: 7
22,051,294 UART: [art] Extend RT PCRs Done
22,052,523 UART: [art] Lock RT PCRs Done
22,054,526 UART: [art] Populate DV Done
22,059,927 UART: [fht] FMC Alias Private Key: 7
22,061,473 UART: [art] Derive CDI
22,062,234 UART: [art] Store in slot 0x4
22,117,864 UART: [art] Derive Key Pair
22,118,864 UART: [art] Store priv key in slot 0x5
24,582,701 UART: [art] Derive Key Pair - Done
24,595,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,308,107 UART: [art] Erasing AUTHORITY.KEYID = 7
26,309,621 UART: [art] PUB.X = 2773A72211CD39581442A7FBE07F3DBD337909230AD4DFA6FA178A263ACC4CD509523D92F38D4559CBB0155347CE29CF
26,316,909 UART: [art] PUB.Y = 6EE2D836A260ACB9788917F6990C5AF58B5CFE1E60F9BCC91C51987BEB31FFAD64EDF36AF7EF7E50CE4CE4C03F6850C2
26,324,222 UART: [art] SIG.R = FFABA96C475654F184BEA6F4CAABA91655E955CE39D2E420423B5CDE33B912E2D5CC32300BE915161E66C4AB5ABD901A
26,331,588 UART: [art] SIG.S = B9797246ACB70D24BB49ABFA81E725D2866BF942E2E154B1AE875CEF596B7D1D1DA5692CE1D3C884BAFF62B41690FA58
27,310,290 UART: Caliptra RT
27,311,009 UART: [state] CFI Enabled
27,491,905 UART: [rt] RT listening for mailbox commands...
27,494,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,649,825 UART: [rt]cmd =0x41544d4e, len=14344
30,032,050 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,485 UART:
192,842 UART: Running Caliptra ROM ...
194,012 UART:
603,746 UART: [state] CFI Enabled
616,313 UART: [state] LifecycleState = Unprovisioned
618,713 UART: [state] DebugLocked = No
621,040 UART: [state] WD Timer not started. Device not locked for debugging
625,542 UART: [kat] SHA2-256
815,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,188 UART: [kat] ++
826,801 UART: [kat] sha1
837,116 UART: [kat] SHA2-256
840,125 UART: [kat] SHA2-384
847,466 UART: [kat] SHA2-512-ACC
850,056 UART: [kat] ECC-384
3,295,095 UART: [kat] HMAC-384Kdf
3,308,975 UART: [kat] LMS
3,840,838 UART: [kat] --
3,847,204 UART: [cold-reset] ++
3,848,081 UART: [fht] FHT @ 0x50003400
3,860,558 UART: [idev] ++
3,861,265 UART: [idev] CDI.KEYID = 6
3,862,177 UART: [idev] SUBJECT.KEYID = 7
3,863,423 UART: [idev] UDS.KEYID = 0
3,864,347 ready_for_fw is high
3,864,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,392 UART: [idev] Erasing UDS.KEYID = 0
6,337,029 UART: [idev] Sha1 KeyId Algorithm
6,358,970 UART: [idev] --
6,362,693 UART: [ldev] ++
6,363,376 UART: [ldev] CDI.KEYID = 6
6,364,263 UART: [ldev] SUBJECT.KEYID = 5
6,365,477 UART: [ldev] AUTHORITY.KEYID = 7
6,366,656 UART: [ldev] FE.KEYID = 1
6,378,112 UART: [ldev] Erasing FE.KEYID = 1
8,857,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,452 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,444 UART: [ldev] --
10,650,424 UART: [fwproc] Wait for Commands...
10,653,223 UART: [fwproc] Recv command 0x46574c44
10,655,478 UART: [fwproc] Recv'd Img size: 118548 bytes
15,325,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,407,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,530,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,091,139 >>> mbox cmd response: success
16,094,601 UART: [afmc] ++
16,095,315 UART: [afmc] CDI.KEYID = 6
16,096,533 UART: [afmc] SUBJECT.KEYID = 7
16,097,981 UART: [afmc] AUTHORITY.KEYID = 5
18,598,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,319,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,321,755 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,336,862 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,352,112 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,367,137 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,391,308 UART: [afmc] --
20,394,164 UART: [cold-reset] --
20,396,854 UART: [state] Locking Datavault
20,403,529 UART: [state] Locking PCR0, PCR1 and PCR31
20,405,693 UART: [state] Locking ICCM
20,407,310 UART: [exit] Launching FMC @ 0x40000130
20,416,005 UART:
20,416,259 UART: Running Caliptra FMC ...
20,417,332 UART:
20,417,492 UART: [state] CFI Enabled
20,425,490 UART: [fht] FMC Alias Private Key: 7
22,191,188 UART: [art] Extend RT PCRs Done
22,192,459 UART: [art] Lock RT PCRs Done
22,194,096 UART: [art] Populate DV Done
22,199,612 UART: [fht] FMC Alias Private Key: 7
22,201,168 UART: [art] Derive CDI
22,201,937 UART: [art] Store in slot 0x4
22,245,159 UART: [art] Derive Key Pair
22,246,197 UART: [art] Store priv key in slot 0x5
24,672,577 UART: [art] Derive Key Pair - Done
24,685,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,022 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,544 UART: [art] PUB.X = 846BA0171924127D4ABF2B06AA1BAE4C4B3CB600981BF534FAF8A8036BFD3CC5444CEB50199AC9152C8B2D75CC2FE024
26,400,758 UART: [art] PUB.Y = C46775F0EFCC040306C1F1F5DDAF908ED1D7042EB79CE46F26E8518D152EDCC69542173100DABAD68C681F98FB6E6B46
26,408,036 UART: [art] SIG.R = 80F241478F0236B6D9A04EE065D3CD5BF3DB6E6D681BFD5494C80C6FC8DC10D42C16A6B90245DA1DE8C5B703C21783F4
26,415,416 UART: [art] SIG.S = FA722334C1ECE0C7B8D7272ACB3BA529F60DF7C51547FF7B1558CA04AC4102FC3F62CE74C0C5B41957FCC500916D875E
27,394,137 UART: Caliptra RT
27,394,850 UART: [state] CFI Enabled
27,526,953 UART: [rt] RT listening for mailbox commands...
27,529,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,684,718 UART: [rt]cmd =0x41544d4e, len=14344
30,074,703 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,751,374 ready_for_fw is high
3,751,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,132,842 >>> mbox cmd response: success
20,384,803 UART:
20,385,212 UART: Running Caliptra FMC ...
20,386,342 UART:
20,386,519 UART: [state] CFI Enabled
20,394,015 UART: [fht] FMC Alias Private Key: 7
22,160,129 UART: [art] Extend RT PCRs Done
22,161,345 UART: [art] Lock RT PCRs Done
22,163,165 UART: [art] Populate DV Done
22,168,709 UART: [fht] FMC Alias Private Key: 7
22,170,200 UART: [art] Derive CDI
22,170,971 UART: [art] Store in slot 0x4
22,213,411 UART: [art] Derive Key Pair
22,214,447 UART: [art] Store priv key in slot 0x5
24,641,083 UART: [art] Derive Key Pair - Done
24,653,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,360,123 UART: [art] Erasing AUTHORITY.KEYID = 7
26,361,617 UART: [art] PUB.X = 40BC6F6444B5D38B5DB2EE439141608974D911D8ADEEA878BF95FC2926637462E8C0196B1AE1EC023CCDEB3E7DE91993
26,368,945 UART: [art] PUB.Y = F1CB36EFED84731B1315CF35131FA4DB539A569C4E8778CF67AA7DED6367950640921DF1DF5078665C08B0DECE2E9ACF
26,376,179 UART: [art] SIG.R = E1A544337A05F31319EAE36769955AD0CBD49A7F1BE6F7251742B3578A4721CB4991CD615FC716125233DE25DCBEEE08
26,383,628 UART: [art] SIG.S = 06BFCD24C6A4B74691C088FEB0744ED1915847CF459066B938EEA617E1F057486C17A748B8B7097847FE0B555F51C3C5
27,362,127 UART: Caliptra RT
27,362,848 UART: [state] CFI Enabled
27,496,516 UART: [rt] RT listening for mailbox commands...
27,498,826 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,654,298 UART: [rt]cmd =0x41544d4e, len=14344
30,049,588 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
85,975 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,647 UART: [kat] SHA2-256
881,578 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,693 UART: [kat] ++
885,845 UART: [kat] sha1
889,915 UART: [kat] SHA2-256
891,853 UART: [kat] SHA2-384
894,610 UART: [kat] SHA2-512-ACC
896,511 UART: [kat] ECC-384
901,924 UART: [kat] HMAC-384Kdf
906,706 UART: [kat] LMS
1,474,902 UART: [kat] --
1,475,757 UART: [cold-reset] ++
1,476,187 UART: [fht] Storing FHT @ 0x50003400
1,479,190 UART: [idev] ++
1,479,358 UART: [idev] CDI.KEYID = 6
1,479,718 UART: [idev] SUBJECT.KEYID = 7
1,480,142 UART: [idev] UDS.KEYID = 0
1,480,487 ready_for_fw is high
1,480,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,492 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,170 UART: [idev] --
1,515,151 UART: [ldev] ++
1,515,319 UART: [ldev] CDI.KEYID = 6
1,515,682 UART: [ldev] SUBJECT.KEYID = 5
1,516,108 UART: [ldev] AUTHORITY.KEYID = 7
1,516,571 UART: [ldev] FE.KEYID = 1
1,521,541 UART: [ldev] Erasing FE.KEYID = 1
1,546,746 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,518 UART: [ldev] --
1,585,897 UART: [fwproc] Waiting for Commands...
1,586,544 UART: [fwproc] Received command 0x46574c44
1,587,335 UART: [fwproc] Received Image of size 118548 bytes
5,242,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,006 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,224 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,442,447 >>> mbox cmd response: success
5,443,617 UART: [afmc] ++
5,443,785 UART: [afmc] CDI.KEYID = 6
5,444,147 UART: [afmc] SUBJECT.KEYID = 7
5,444,572 UART: [afmc] AUTHORITY.KEYID = 5
5,479,921 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,209 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,502,915 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,508,794 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,507 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,216 UART: [afmc] --
5,523,176 UART: [cold-reset] --
5,524,016 UART: [state] Locking Datavault
5,525,209 UART: [state] Locking PCR0, PCR1 and PCR31
5,525,813 UART: [state] Locking ICCM
5,526,257 UART: [exit] Launching FMC @ 0x40000130
5,531,587 UART:
5,531,603 UART: Running Caliptra FMC ...
5,532,011 UART:
5,532,065 UART: [state] CFI Enabled
5,542,371 UART: [fht] FMC Alias Private Key: 7
5,662,023 UART: [art] Extend RT PCRs Done
5,662,451 UART: [art] Lock RT PCRs Done
5,663,927 UART: [art] Populate DV Done
5,672,078 UART: [fht] FMC Alias Private Key: 7
5,673,014 UART: [art] Derive CDI
5,673,294 UART: [art] Store in slot 0x4
5,759,320 UART: [art] Derive Key Pair
5,759,680 UART: [art] Store priv key in slot 0x5
5,773,139 UART: [art] Derive Key Pair - Done
5,788,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,803,999 UART: [art] Erasing AUTHORITY.KEYID = 7
5,804,764 UART: [art] PUB.X = CEF9BB0A221F6DFB14AF31966077B876031526392EC15596868F2F8BBF41563FCE473287D94ECAE1BC55628419A5C963
5,811,530 UART: [art] PUB.Y = 3CF6084386727EA112B2253A70BBCF2417C56E5537689F74397219723EC5F6CB16493A26B53BFA864E6478834C2883F2
5,818,467 UART: [art] SIG.R = BB5567E9472C66019A29BB89A27193398BBF46213C6FE11092369B9028CF0CB210C00B31E62AEEF725D04B3435E397AC
5,825,228 UART: [art] SIG.S = 398FA358B83CB726ACBAB54201D9BBF5B3086EA536C4F5BA71E1EFB7DD4DE87691153D2AEE8AFA3092038E8EC165B236
5,848,433 UART: Caliptra RT
5,848,684 UART: [state] CFI Enabled
5,968,764 UART: [rt] RT listening for mailbox commands...
5,969,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,092,330 UART: [rt]cmd =0x41544d4e, len=14344
8,435,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,595 ready_for_fw is high
1,362,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,540 >>> mbox cmd response: success
5,317,007 UART:
5,317,023 UART: Running Caliptra FMC ...
5,317,431 UART:
5,317,485 UART: [state] CFI Enabled
5,328,389 UART: [fht] FMC Alias Private Key: 7
5,447,395 UART: [art] Extend RT PCRs Done
5,447,823 UART: [art] Lock RT PCRs Done
5,449,039 UART: [art] Populate DV Done
5,457,460 UART: [fht] FMC Alias Private Key: 7
5,458,470 UART: [art] Derive CDI
5,458,750 UART: [art] Store in slot 0x4
5,544,306 UART: [art] Derive Key Pair
5,544,666 UART: [art] Store priv key in slot 0x5
5,558,229 UART: [art] Derive Key Pair - Done
5,573,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,029 UART: [art] Erasing AUTHORITY.KEYID = 7
5,589,794 UART: [art] PUB.X = C0ACF99C35A4C24D5284BE47551DAAEB137FB8AC0583502211B0C3CFC304C00BBF6FC0AC9042B8FDD3A1EA6B657226BE
5,596,577 UART: [art] PUB.Y = 32127377D3B60F70B562FDA5062812A85DA958916ABAF268AE4F3230B3BBC1737EB565A6939A609D8FC8A7006A2E6683
5,603,499 UART: [art] SIG.R = 5311F22D0C9DA2341F627A29A1EC10817361B2E83DD65DC01FF5C8890343E1664207AA77CE6062B174A3E989472AE0E8
5,610,258 UART: [art] SIG.S = 8B3404598E090B56B13043CEE0D19DB7EA8904E8E34537748978F85888626EEC52C61634C50C63021827715E36D77DA2
5,634,146 UART: Caliptra RT
5,634,397 UART: [state] CFI Enabled
5,754,797 UART: [rt] RT listening for mailbox commands...
5,755,467 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,878,299 UART: [rt]cmd =0x41544d4e, len=14344
8,108,502 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,719 UART: [kat] SHA2-512-ACC
897,620 UART: [kat] ECC-384
903,313 UART: [kat] HMAC-384Kdf
907,951 UART: [kat] LMS
1,476,147 UART: [kat] --
1,476,894 UART: [cold-reset] ++
1,477,418 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 ready_for_fw is high
1,481,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,373 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,899 UART: [idev] --
1,514,974 UART: [ldev] ++
1,515,142 UART: [ldev] CDI.KEYID = 6
1,515,505 UART: [ldev] SUBJECT.KEYID = 5
1,515,931 UART: [ldev] AUTHORITY.KEYID = 7
1,516,394 UART: [ldev] FE.KEYID = 1
1,521,586 UART: [ldev] Erasing FE.KEYID = 1
1,546,705 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,792 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,627 UART: [ldev] --
1,586,098 UART: [fwproc] Waiting for Commands...
1,586,773 UART: [fwproc] Received command 0x46574c44
1,587,564 UART: [fwproc] Received Image of size 118548 bytes
5,318,987 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,347,193 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,378,411 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,518,702 >>> mbox cmd response: success
5,519,776 UART: [afmc] ++
5,519,944 UART: [afmc] CDI.KEYID = 6
5,520,306 UART: [afmc] SUBJECT.KEYID = 7
5,520,731 UART: [afmc] AUTHORITY.KEYID = 5
5,556,124 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,572,350 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,573,130 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,578,836 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,584,715 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,590,428 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,598,445 UART: [afmc] --
5,599,503 UART: [cold-reset] --
5,600,407 UART: [state] Locking Datavault
5,601,540 UART: [state] Locking PCR0, PCR1 and PCR31
5,602,144 UART: [state] Locking ICCM
5,602,596 UART: [exit] Launching FMC @ 0x40000130
5,607,926 UART:
5,607,942 UART: Running Caliptra FMC ...
5,608,350 UART:
5,608,493 UART: [state] CFI Enabled
5,618,945 UART: [fht] FMC Alias Private Key: 7
5,737,999 UART: [art] Extend RT PCRs Done
5,738,427 UART: [art] Lock RT PCRs Done
5,739,869 UART: [art] Populate DV Done
5,747,990 UART: [fht] FMC Alias Private Key: 7
5,749,096 UART: [art] Derive CDI
5,749,376 UART: [art] Store in slot 0x4
5,835,148 UART: [art] Derive Key Pair
5,835,508 UART: [art] Store priv key in slot 0x5
5,848,861 UART: [art] Derive Key Pair - Done
5,863,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,879,375 UART: [art] Erasing AUTHORITY.KEYID = 7
5,880,140 UART: [art] PUB.X = 64E66EF7D66B499E90ABEC278DCE9925AA443DDDBB955D0DEE1AFAFF1E08A83988A58C2FD7A377B3686895AA5D2AEACE
5,886,932 UART: [art] PUB.Y = D4A087AB951FD4BF068FEE7BC272D4689C84FF90290A9FEE49142690FB12014C9C66C5374160B3E9884BC509190BA601
5,893,866 UART: [art] SIG.R = 34E1A12F00D81D3B883B1A94CE639ECE6D4F71AB30AE7D3AAF04F452CEA0BF3BB2871E908DBD6EDB5D07D661C5099248
5,900,625 UART: [art] SIG.S = 34AD10AA6428234EC3BBC34FB3A1D9D41695226AED112BD1393D74BBE84EC080AF681A0F01E7443D997AAAEAF2E1774E
5,924,115 UART: Caliptra RT
5,924,458 UART: [state] CFI Enabled
6,044,039 UART: [rt] RT listening for mailbox commands...
6,044,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,167,783 UART: [rt]cmd =0x41544d4e, len=14344
8,397,864 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,456 ready_for_fw is high
1,363,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,269 >>> mbox cmd response: success
5,393,410 UART:
5,393,426 UART: Running Caliptra FMC ...
5,393,834 UART:
5,393,977 UART: [state] CFI Enabled
5,404,555 UART: [fht] FMC Alias Private Key: 7
5,523,287 UART: [art] Extend RT PCRs Done
5,523,715 UART: [art] Lock RT PCRs Done
5,525,277 UART: [art] Populate DV Done
5,533,522 UART: [fht] FMC Alias Private Key: 7
5,534,544 UART: [art] Derive CDI
5,534,824 UART: [art] Store in slot 0x4
5,620,444 UART: [art] Derive Key Pair
5,620,804 UART: [art] Store priv key in slot 0x5
5,634,229 UART: [art] Derive Key Pair - Done
5,648,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,664,272 UART: [art] Erasing AUTHORITY.KEYID = 7
5,665,037 UART: [art] PUB.X = CF6B7E0B2EC2AEEF7D4E4EA618EDE1E8CB19FA20AFC2F5A79D825C60DCB750F5FD90D564E6E11040858C120E9568866B
5,671,823 UART: [art] PUB.Y = CC214198AAFD1CE39078322A48E511D8F5C918743B85660D1E5B3B908D62A87DC3FE2F5D4BAC6D9B90ED85223E817115
5,678,776 UART: [art] SIG.R = 8CCC2E33118B01058E5EAB38AFF6AAAC09D953B11E8AA57A18523F13CABFDD10074C04E93256330AE8970E0278A7CE84
5,685,534 UART: [art] SIG.S = 625F011C1A9DFC0AF81B4104967439E08ED07FB06C4F50E271D3DDFB138955BAD3E2EA297E6317AEE34E9E021BA95CF3
5,709,462 UART: Caliptra RT
5,709,805 UART: [state] CFI Enabled
5,829,953 UART: [rt] RT listening for mailbox commands...
5,830,623 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,954,043 UART: [rt]cmd =0x41544d4e, len=14344
8,259,776 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,840 UART: [state] LifecycleState = Unprovisioned
85,495 UART: [state] DebugLocked = No
86,073 UART: [state] WD Timer not started. Device not locked for debugging
87,258 UART: [kat] SHA2-256
890,808 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,912 UART: [kat] ++
895,064 UART: [kat] sha1
899,158 UART: [kat] SHA2-256
901,098 UART: [kat] SHA2-384
903,651 UART: [kat] SHA2-512-ACC
905,552 UART: [kat] ECC-384
915,545 UART: [kat] HMAC-384Kdf
920,125 UART: [kat] LMS
1,168,437 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 ready_for_fw is high
1,174,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,785 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,795 UART: [idev] --
1,208,826 UART: [ldev] ++
1,208,994 UART: [ldev] CDI.KEYID = 6
1,209,358 UART: [ldev] SUBJECT.KEYID = 5
1,209,785 UART: [ldev] AUTHORITY.KEYID = 7
1,210,248 UART: [ldev] FE.KEYID = 1
1,215,540 UART: [ldev] Erasing FE.KEYID = 1
1,242,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,665 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,026 UART: [ldev] --
1,281,475 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,011 >>> mbox cmd response: success
3,379,247 UART: [afmc] ++
3,379,415 UART: [afmc] CDI.KEYID = 6
3,379,778 UART: [afmc] SUBJECT.KEYID = 7
3,380,204 UART: [afmc] AUTHORITY.KEYID = 5
3,415,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,865 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,572 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,449 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,159 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,931 UART: [afmc] --
3,458,832 UART: [cold-reset] --
3,459,624 UART: [state] Locking Datavault
3,461,089 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,693 UART: [state] Locking ICCM
3,462,171 UART: [exit] Launching FMC @ 0x40000130
3,467,501 UART:
3,467,517 UART: Running Caliptra FMC ...
3,467,925 UART:
3,467,979 UART: [state] CFI Enabled
3,478,603 UART: [fht] FMC Alias Private Key: 7
3,597,213 UART: [art] Extend RT PCRs Done
3,597,641 UART: [art] Lock RT PCRs Done
3,599,237 UART: [art] Populate DV Done
3,607,230 UART: [fht] FMC Alias Private Key: 7
3,608,324 UART: [art] Derive CDI
3,608,604 UART: [art] Store in slot 0x4
3,694,253 UART: [art] Derive Key Pair
3,694,613 UART: [art] Store priv key in slot 0x5
3,707,495 UART: [art] Derive Key Pair - Done
3,722,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,627 UART: [art] PUB.X = 4CB0A97DD74916DB7881B60C213F0F099560544109D12D41DCD97D23F8B7A5A8466839873B66ED50B17E1F872DA625C4
3,745,383 UART: [art] PUB.Y = A4A0EC4C02C5FE75BF5D315FB65D347136A50639B0D86F81DB18FC9C6D5B4EE447A3F9004E55A691F3ABA9046872CF20
3,752,314 UART: [art] SIG.R = 6D9C8F1C21C7CAC38D07CE997BD2C02E132BE615AF8228F8B32E6E018CF2E8D91D602CB59983DEBFFC308FD9D11A5249
3,759,096 UART: [art] SIG.S = 8CC6389FA909DDEAFEDDA97745F8BB6546D82ADD09006B275C729B7E1A35AAAB4D81E40D22988F917F33FDF8765C17BD
3,783,193 UART: Caliptra RT
3,783,444 UART: [state] CFI Enabled
3,904,032 UART: [rt] RT listening for mailbox commands...
3,904,702 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,898 UART: [rt]cmd =0x41544d4e, len=14344
4,613,219 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,034 ready_for_fw is high
1,059,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,499 >>> mbox cmd response: success
3,285,810 UART:
3,285,826 UART: Running Caliptra FMC ...
3,286,234 UART:
3,286,288 UART: [state] CFI Enabled
3,296,578 UART: [fht] FMC Alias Private Key: 7
3,414,946 UART: [art] Extend RT PCRs Done
3,415,374 UART: [art] Lock RT PCRs Done
3,417,014 UART: [art] Populate DV Done
3,425,325 UART: [fht] FMC Alias Private Key: 7
3,426,425 UART: [art] Derive CDI
3,426,705 UART: [art] Store in slot 0x4
3,512,372 UART: [art] Derive Key Pair
3,512,732 UART: [art] Store priv key in slot 0x5
3,526,492 UART: [art] Derive Key Pair - Done
3,541,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,414 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,179 UART: [art] PUB.X = 66B3F2496A1D39CBE8B61DDEE897C8A1901149B2C4ABE488D466321B54E268A1D54423353170C6ADE96AE6C8CD2A92CA
3,564,959 UART: [art] PUB.Y = AF5108851BD0B8872728FAD8B467DD1078B21E2F89823C670A0A406CD09B961FDCD9EABEFFE72A5DD7AC543BF933F768
3,571,916 UART: [art] SIG.R = 3D9C8312E1D14BE76AD981C01008A396A85FD45DFF7B6A0BCDD94697984356F9877A36AEC8A6AB80F29C3BA156E17B10
3,578,690 UART: [art] SIG.S = E26936F3095DE3CE4E278F8D2709FF7C0DA31FF00CC3E7A21050A1108D0DC9F6D724D1C1191AC86C39732F25B0AAE4E4
3,602,701 UART: Caliptra RT
3,602,952 UART: [state] CFI Enabled
3,722,900 UART: [rt] RT listening for mailbox commands...
3,723,570 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,880 UART: [rt]cmd =0x41544d4e, len=14344
4,442,355 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,229 UART: [state] LifecycleState = Unprovisioned
85,884 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,545 UART: [kat] SHA2-256
891,095 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,199 UART: [kat] ++
895,351 UART: [kat] sha1
899,497 UART: [kat] SHA2-256
901,437 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,488 UART: [kat] HMAC-384Kdf
920,194 UART: [kat] LMS
1,168,506 UART: [kat] --
1,169,527 UART: [cold-reset] ++
1,169,969 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 ready_for_fw is high
1,173,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,806 UART: [idev] Erasing UDS.KEYID = 0
1,198,790 UART: [idev] Sha1 KeyId Algorithm
1,207,786 UART: [idev] --
1,208,731 UART: [ldev] ++
1,208,899 UART: [ldev] CDI.KEYID = 6
1,209,263 UART: [ldev] SUBJECT.KEYID = 5
1,209,690 UART: [ldev] AUTHORITY.KEYID = 7
1,210,153 UART: [ldev] FE.KEYID = 1
1,215,347 UART: [ldev] Erasing FE.KEYID = 1
1,241,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,916 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,805 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,517 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,717 UART: [ldev] --
1,281,114 UART: [fwproc] Wait for Commands...
1,281,779 UART: [fwproc] Recv command 0x46574c44
1,282,512 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,071 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,012 >>> mbox cmd response: success
3,369,266 UART: [afmc] ++
3,369,434 UART: [afmc] CDI.KEYID = 6
3,369,797 UART: [afmc] SUBJECT.KEYID = 7
3,370,223 UART: [afmc] AUTHORITY.KEYID = 5
3,405,272 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,537 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,286 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,993 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,870 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,580 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,424 UART: [afmc] --
3,448,419 UART: [cold-reset] --
3,449,073 UART: [state] Locking Datavault
3,450,490 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,094 UART: [state] Locking ICCM
3,451,732 UART: [exit] Launching FMC @ 0x40000130
3,457,062 UART:
3,457,078 UART: Running Caliptra FMC ...
3,457,486 UART:
3,457,629 UART: [state] CFI Enabled
3,468,373 UART: [fht] FMC Alias Private Key: 7
3,587,069 UART: [art] Extend RT PCRs Done
3,587,497 UART: [art] Lock RT PCRs Done
3,588,977 UART: [art] Populate DV Done
3,597,300 UART: [fht] FMC Alias Private Key: 7
3,598,362 UART: [art] Derive CDI
3,598,642 UART: [art] Store in slot 0x4
3,684,689 UART: [art] Derive Key Pair
3,685,049 UART: [art] Store priv key in slot 0x5
3,698,541 UART: [art] Derive Key Pair - Done
3,713,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,892 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,657 UART: [art] PUB.X = 3F8F16CD6D729FBEF5896618151B1C93B9D3B540419CF5EC91FBB8FB5A3F4C22146EFDC45750122A95C187E25F3D302C
3,736,437 UART: [art] PUB.Y = 9E00DDB57A8B16948D32A917F8B609E323A3C559D2076E65A7EAD84D0000187838AC515910ABCF242AEF3B86BD18524F
3,743,319 UART: [art] SIG.R = F822FA4237A763C96CEA2CC472BA594CB01E7BF2A10B439E22DFD4D20205AA301408ED05F2E304CAE02ABAC3D8A3F315
3,750,089 UART: [art] SIG.S = 5965104DAB898F9392D9D2BED1F5E1007A0B5EC2598A1EA32577B742061835A78C5B40E70D6FD92A4669C2FC946EB342
3,774,066 UART: Caliptra RT
3,774,409 UART: [state] CFI Enabled
3,893,897 UART: [rt] RT listening for mailbox commands...
3,894,567 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,523 UART: [rt]cmd =0x41544d4e, len=14344
4,589,461 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,593 ready_for_fw is high
1,059,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,858 >>> mbox cmd response: success
3,293,035 UART:
3,293,051 UART: Running Caliptra FMC ...
3,293,459 UART:
3,293,602 UART: [state] CFI Enabled
3,304,488 UART: [fht] FMC Alias Private Key: 7
3,423,728 UART: [art] Extend RT PCRs Done
3,424,156 UART: [art] Lock RT PCRs Done
3,425,618 UART: [art] Populate DV Done
3,433,971 UART: [fht] FMC Alias Private Key: 7
3,435,149 UART: [art] Derive CDI
3,435,429 UART: [art] Store in slot 0x4
3,521,062 UART: [art] Derive Key Pair
3,521,422 UART: [art] Store priv key in slot 0x5
3,534,680 UART: [art] Derive Key Pair - Done
3,549,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,564,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,386 UART: [art] PUB.X = 43507D4DA0C3C55B3F7C510FE6B344288E357E657336D23E5B836BA8C4298DB17A2B1027C283DAD377EC13ADB2AA2902
3,572,156 UART: [art] PUB.Y = CC6A058CB77497275D90F5F9BCBA7849E2E0A85793CED0B0614B0D24660D2BF1DEBFA2F83C36F3E588F3BF0E09777157
3,579,103 UART: [art] SIG.R = 05876EACED3767EA74BD7E52D2F02907F5DB49E052037FC93F3C9C1AB50CB413B8AF26F5871063CC9E0846670A4FB25C
3,585,865 UART: [art] SIG.S = CCB4A094085311890C6B519EBC0B6B8120C6C31EFA7232C4CF16A6A6BCA22E86A8A5D4F922A0D8FD0B8485C909D875D3
3,609,874 UART: Caliptra RT
3,610,217 UART: [state] CFI Enabled
3,730,503 UART: [rt] RT listening for mailbox commands...
3,731,173 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,357 UART: [rt]cmd =0x41544d4e, len=14344
4,434,166 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,942 UART: [state] LifecycleState = Unprovisioned
85,597 UART: [state] DebugLocked = No
86,107 UART: [state] WD Timer not started. Device not locked for debugging
87,328 UART: [kat] SHA2-256
892,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,103 UART: [kat] ++
897,255 UART: [kat] sha1
901,327 UART: [kat] SHA2-256
903,267 UART: [kat] SHA2-384
906,080 UART: [kat] SHA2-512-ACC
907,981 UART: [kat] ECC-384
917,210 UART: [kat] HMAC-384Kdf
921,814 UART: [kat] LMS
1,170,142 UART: [kat] --
1,170,951 UART: [cold-reset] ++
1,171,431 UART: [fht] FHT @ 0x50003400
1,173,976 UART: [idev] ++
1,174,144 UART: [idev] CDI.KEYID = 6
1,174,504 UART: [idev] SUBJECT.KEYID = 7
1,174,928 UART: [idev] UDS.KEYID = 0
1,175,273 ready_for_fw is high
1,175,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,822 UART: [idev] Erasing UDS.KEYID = 0
1,200,083 UART: [idev] Sha1 KeyId Algorithm
1,208,533 UART: [idev] --
1,209,575 UART: [ldev] ++
1,209,743 UART: [ldev] CDI.KEYID = 6
1,210,106 UART: [ldev] SUBJECT.KEYID = 5
1,210,532 UART: [ldev] AUTHORITY.KEYID = 7
1,210,995 UART: [ldev] FE.KEYID = 1
1,216,129 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,180 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,457 UART: [ldev] --
1,281,742 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 118548 bytes
3,154,732 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,182,555 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,213,725 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,354,100 >>> mbox cmd response: success
3,355,168 UART: [afmc] ++
3,355,336 UART: [afmc] CDI.KEYID = 6
3,355,698 UART: [afmc] SUBJECT.KEYID = 7
3,356,123 UART: [afmc] AUTHORITY.KEYID = 5
3,391,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,408,149 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,408,897 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,414,603 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,420,482 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,426,192 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,433,939 UART: [afmc] --
3,434,941 UART: [cold-reset] --
3,435,901 UART: [state] Locking Datavault
3,437,028 UART: [state] Locking PCR0, PCR1 and PCR31
3,437,632 UART: [state] Locking ICCM
3,438,170 UART: [exit] Launching FMC @ 0x40000130
3,443,500 UART:
3,443,516 UART: Running Caliptra FMC ...
3,443,924 UART:
3,443,978 UART: [state] CFI Enabled
3,454,102 UART: [fht] FMC Alias Private Key: 7
3,572,844 UART: [art] Extend RT PCRs Done
3,573,272 UART: [art] Lock RT PCRs Done
3,574,618 UART: [art] Populate DV Done
3,582,907 UART: [fht] FMC Alias Private Key: 7
3,583,967 UART: [art] Derive CDI
3,584,247 UART: [art] Store in slot 0x4
3,669,904 UART: [art] Derive Key Pair
3,670,264 UART: [art] Store priv key in slot 0x5
3,682,938 UART: [art] Derive Key Pair - Done
3,697,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,712,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,713,440 UART: [art] PUB.X = 519DB63AB66DF5307182152CDA66E24F207A9AABB0B26102568D7371648C018605209B459B8E6FC680FBF209370D4ECB
3,720,195 UART: [art] PUB.Y = 163FBFCF1A3B8DBDEDF50AD002CB093D9E075E50582A1713E07E022740F826CCCD112C517F6733888BC6A057DE377562
3,727,138 UART: [art] SIG.R = 9190C52C3499701973E71689EE83BA4FACD35F30684DBD91AC3F1DBE5BA3D42D25F90AAC2DFB51C2445890E18C3B6F85
3,733,917 UART: [art] SIG.S = 99CEA63BBB430CC8E72C0A33FD063249E4BCCFFA3F30FA207148AE0062D7E0F5B01905084B489B1FDF341B73007C53AD
3,758,232 UART: Caliptra RT
3,758,483 UART: [state] CFI Enabled
3,877,634 UART: [rt] RT listening for mailbox commands...
3,878,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,001,258 UART: [rt]cmd =0x41544d4e, len=14344
4,586,119 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,787 ready_for_fw is high
1,059,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,184 >>> mbox cmd response: success
3,288,603 UART:
3,288,619 UART: Running Caliptra FMC ...
3,289,027 UART:
3,289,081 UART: [state] CFI Enabled
3,299,457 UART: [fht] FMC Alias Private Key: 7
3,418,343 UART: [art] Extend RT PCRs Done
3,418,771 UART: [art] Lock RT PCRs Done
3,420,355 UART: [art] Populate DV Done
3,428,606 UART: [fht] FMC Alias Private Key: 7
3,429,774 UART: [art] Derive CDI
3,430,054 UART: [art] Store in slot 0x4
3,516,025 UART: [art] Derive Key Pair
3,516,385 UART: [art] Store priv key in slot 0x5
3,529,723 UART: [art] Derive Key Pair - Done
3,544,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,824 UART: [art] PUB.X = E70558187E18B579249CDF18BD363C7739B8BF88C3CCF777F61FAE377A7045FEBAE5042DACBE5F8AA401FA2295DE3680
3,567,599 UART: [art] PUB.Y = 65E788667391E535110A7968257D666A8E712367AAA66563A486CCE2FCC54D4B50BC09F6D280B55BE0ED6F2929044BFC
3,574,540 UART: [art] SIG.R = 468154564115CB78F422E264488868B8218F643AFDA1A74FC862195B2E2B386D75458E9967C18120D0FBA3892CD2995C
3,581,300 UART: [art] SIG.S = 04C7BE5F40A6891F919E5199ED98B22FCB116A315F9BF03C5D1BAF87F07514080EFA1D8C023BF663E1151FF6943B406C
3,605,244 UART: Caliptra RT
3,605,495 UART: [state] CFI Enabled
3,725,097 UART: [rt] RT listening for mailbox commands...
3,725,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,819 UART: [rt]cmd =0x41544d4e, len=14344
4,436,459 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,971 UART: [state] LifecycleState = Unprovisioned
86,626 UART: [state] DebugLocked = No
87,208 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [kat] SHA2-256
894,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,274 UART: [kat] ++
898,426 UART: [kat] sha1
902,530 UART: [kat] SHA2-256
904,470 UART: [kat] SHA2-384
907,187 UART: [kat] SHA2-512-ACC
909,088 UART: [kat] ECC-384
919,195 UART: [kat] HMAC-384Kdf
923,841 UART: [kat] LMS
1,172,169 UART: [kat] --
1,172,906 UART: [cold-reset] ++
1,173,236 UART: [fht] FHT @ 0x50003400
1,176,021 UART: [idev] ++
1,176,189 UART: [idev] CDI.KEYID = 6
1,176,549 UART: [idev] SUBJECT.KEYID = 7
1,176,973 UART: [idev] UDS.KEYID = 0
1,177,318 ready_for_fw is high
1,177,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,145 UART: [idev] Erasing UDS.KEYID = 0
1,202,212 UART: [idev] Sha1 KeyId Algorithm
1,210,824 UART: [idev] --
1,211,660 UART: [ldev] ++
1,211,828 UART: [ldev] CDI.KEYID = 6
1,212,191 UART: [ldev] SUBJECT.KEYID = 5
1,212,617 UART: [ldev] AUTHORITY.KEYID = 7
1,213,080 UART: [ldev] FE.KEYID = 1
1,218,530 UART: [ldev] Erasing FE.KEYID = 1
1,245,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,836 UART: [ldev] --
1,284,161 UART: [fwproc] Wait for Commands...
1,284,847 UART: [fwproc] Recv command 0x46574c44
1,285,575 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,665 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,204,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,016 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,361 >>> mbox cmd response: success
3,377,611 UART: [afmc] ++
3,377,779 UART: [afmc] CDI.KEYID = 6
3,378,141 UART: [afmc] SUBJECT.KEYID = 7
3,378,566 UART: [afmc] AUTHORITY.KEYID = 5
3,414,783 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,372 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,120 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,437,826 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,705 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,415 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,256 UART: [afmc] --
3,458,194 UART: [cold-reset] --
3,458,868 UART: [state] Locking Datavault
3,460,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,623 UART: [state] Locking ICCM
3,461,253 UART: [exit] Launching FMC @ 0x40000130
3,466,583 UART:
3,466,599 UART: Running Caliptra FMC ...
3,467,007 UART:
3,467,150 UART: [state] CFI Enabled
3,478,022 UART: [fht] FMC Alias Private Key: 7
3,597,042 UART: [art] Extend RT PCRs Done
3,597,470 UART: [art] Lock RT PCRs Done
3,599,244 UART: [art] Populate DV Done
3,607,611 UART: [fht] FMC Alias Private Key: 7
3,608,729 UART: [art] Derive CDI
3,609,009 UART: [art] Store in slot 0x4
3,694,766 UART: [art] Derive Key Pair
3,695,126 UART: [art] Store priv key in slot 0x5
3,709,116 UART: [art] Derive Key Pair - Done
3,723,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,402 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,167 UART: [art] PUB.X = 61CCE0299A595B1AD2AC1454E1B95B4C5140B9F4E2DD556CBEFBFB9976D24A11AD605280F32F39A93BD239AC1F9FB76E
3,746,955 UART: [art] PUB.Y = 9B9106C50CFE82E068694AB3F9CED21D30C1DBD4ED1F3F91EF0DA647C11EE93877422E8FF1DB4F30224A91294AFCC149
3,753,912 UART: [art] SIG.R = A8D3D6A8B29E47786C71BDB7F7739AA12B33BC24F4EBF1AC2170B1AAFB6609FF69E784BF5661B4484A4446D5AF6D9200
3,760,671 UART: [art] SIG.S = 54468F0C6BDD0CF48ACD9A8A3025BE40C7AC04398E457B889E35815976EC033EF37B35F0D297B329C791094FF3E401C3
3,784,593 UART: Caliptra RT
3,784,936 UART: [state] CFI Enabled
3,905,220 UART: [rt] RT listening for mailbox commands...
3,905,890 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,164 UART: [rt]cmd =0x41544d4e, len=14344
4,619,437 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,742 ready_for_fw is high
1,060,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,695 >>> mbox cmd response: success
3,285,850 UART:
3,285,866 UART: Running Caliptra FMC ...
3,286,274 UART:
3,286,417 UART: [state] CFI Enabled
3,297,095 UART: [fht] FMC Alias Private Key: 7
3,416,419 UART: [art] Extend RT PCRs Done
3,416,847 UART: [art] Lock RT PCRs Done
3,418,587 UART: [art] Populate DV Done
3,427,100 UART: [fht] FMC Alias Private Key: 7
3,428,110 UART: [art] Derive CDI
3,428,390 UART: [art] Store in slot 0x4
3,514,307 UART: [art] Derive Key Pair
3,514,667 UART: [art] Store priv key in slot 0x5
3,528,139 UART: [art] Derive Key Pair - Done
3,542,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,590 UART: [art] PUB.X = 3763CEFF5150246DEE936B1FAA28CCA7EEB02F41B4F419B2F0988C5D285346DDF5BF9474EA862DAA0471DC56EB4AA770
3,566,375 UART: [art] PUB.Y = 2C016408B530B52DD56D334AF033FAECC7991C70AAFB332E10BD4F0F61AF719C0A6082EDA28F1A8810CED768F6D7A6B0
3,573,329 UART: [art] SIG.R = A7CFE79D626E8ABDEEBBD74987FD584818681C2EAFAB566B76F9F9B93DCFAECBD7F2F90574DB097D8F71FF574462C57E
3,580,119 UART: [art] SIG.S = EAF60783F6635E01F82A638B0B804485496508B7F590D1F0484C686E53C527E3469D2081C4C37C2A05C575F402105474
3,603,763 UART: Caliptra RT
3,604,106 UART: [state] CFI Enabled
3,725,271 UART: [rt] RT listening for mailbox commands...
3,725,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,921 UART: [rt]cmd =0x41544d4e, len=14344
4,439,210 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_cmd_zero_metadata_entry ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,174 UART:
192,526 UART: Running Caliptra ROM ...
193,738 UART:
193,891 UART: [state] CFI Enabled
262,021 UART: [state] LifecycleState = Unprovisioned
263,932 UART: [state] DebugLocked = No
266,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,695 UART: [kat] SHA2-256
441,440 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,929 UART: [kat] ++
452,386 UART: [kat] sha1
463,796 UART: [kat] SHA2-256
466,493 UART: [kat] SHA2-384
473,418 UART: [kat] SHA2-512-ACC
475,787 UART: [kat] ECC-384
2,766,284 UART: [kat] HMAC-384Kdf
2,798,140 UART: [kat] LMS
3,988,497 UART: [kat] --
3,993,876 UART: [cold-reset] ++
3,994,812 UART: [fht] Storing FHT @ 0x50003400
4,005,719 UART: [idev] ++
4,006,361 UART: [idev] CDI.KEYID = 6
4,007,247 UART: [idev] SUBJECT.KEYID = 7
4,008,494 UART: [idev] UDS.KEYID = 0
4,009,459 ready_for_fw is high
4,009,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,722 UART: [idev] Erasing UDS.KEYID = 0
7,345,400 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,504 UART: [idev] --
7,370,931 UART: [ldev] ++
7,371,562 UART: [ldev] CDI.KEYID = 6
7,372,477 UART: [ldev] SUBJECT.KEYID = 5
7,373,692 UART: [ldev] AUTHORITY.KEYID = 7
7,374,975 UART: [ldev] FE.KEYID = 1
7,420,799 UART: [ldev] Erasing FE.KEYID = 1
10,758,231 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,895 UART: [ldev] --
13,136,942 UART: [fwproc] Waiting for Commands...
13,139,303 UART: [fwproc] Received command 0x46574c44
13,141,482 UART: [fwproc] Received Image of size 118548 bytes
22,148,004 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,225,518 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,298,696 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,627,406 >>> mbox cmd response: success
22,632,489 UART: [afmc] ++
22,633,105 UART: [afmc] CDI.KEYID = 6
22,634,012 UART: [afmc] SUBJECT.KEYID = 7
22,635,235 UART: [afmc] AUTHORITY.KEYID = 5
25,998,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,299,361 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,301,667 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,316,162 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,330,956 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,345,300 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,367,245 UART: [afmc] --
28,370,950 UART: [cold-reset] --
28,375,563 UART: [state] Locking Datavault
28,380,485 UART: [state] Locking PCR0, PCR1 and PCR31
28,382,181 UART: [state] Locking ICCM
28,383,650 UART: [exit] Launching FMC @ 0x40000130
28,392,075 UART:
28,392,324 UART: Running Caliptra FMC ...
28,393,443 UART:
28,393,602 UART: [state] CFI Enabled
28,457,692 UART: [fht] FMC Alias Private Key: 7
30,798,491 UART: [art] Extend RT PCRs Done
30,799,710 UART: [art] Lock RT PCRs Done
30,801,738 UART: [art] Populate DV Done
30,807,251 UART: [fht] FMC Alias Private Key: 7
30,808,946 UART: [art] Derive CDI
30,809,679 UART: [art] Store in slot 0x4
30,865,953 UART: [art] Derive Key Pair
30,866,987 UART: [art] Store priv key in slot 0x5
34,159,433 UART: [art] Derive Key Pair - Done
34,172,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,460,742 UART: [art] Erasing AUTHORITY.KEYID = 7
36,462,243 UART: [art] PUB.X = BC43BAA4065D3BCF89580A39022605A7AEAC91B2C2AB58E35BCCD82A849FC1B94ACF90F85642C90FA05FE91D77CD1553
36,469,562 UART: [art] PUB.Y = 6E2CD886B364DA039F1F0EE39F98351565F1E803CC2ED450119E8367107A1F8C09C80CDD110726CA4344EE6CB19E6626
36,476,755 UART: [art] SIG.R = 835ABC118798EFF2A636C7371E3DB02713B24B2DAAFCA74F899067BBBC223CE394421A054E012FCFA7D549DCB4B6CA9D
36,484,197 UART: [art] SIG.S = B51DBE43458A68B231CFFCB4E7A3DF97D54AF3DBC79841198BC51A80BE382E7218168E1EBA4F871E629A081AA7345430
37,789,628 UART: Caliptra RT
37,790,352 UART: [state] CFI Enabled
37,966,694 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
42,032,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,188,499 UART: [rt]cmd =0x41544d4e, len=14344
50,711,211 >>> mbox cmd response data (8 bytes)
50,714,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,744,433 UART: [rt]cmd =0x494e464f, len=4
50,748,778 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
3,805,729 ready_for_fw is high
3,806,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,076,862 >>> mbox cmd response: success
27,770,520 UART:
27,770,916 UART: Running Caliptra FMC ...
27,772,224 UART:
27,772,401 UART: [state] CFI Enabled
27,839,797 UART: [fht] FMC Alias Private Key: 7
30,180,108 UART: [art] Extend RT PCRs Done
30,181,329 UART: [art] Lock RT PCRs Done
30,182,881 UART: [art] Populate DV Done
30,188,358 UART: [fht] FMC Alias Private Key: 7
30,189,898 UART: [art] Derive CDI
30,190,711 UART: [art] Store in slot 0x4
30,248,673 UART: [art] Derive Key Pair
30,249,708 UART: [art] Store priv key in slot 0x5
33,542,479 UART: [art] Derive Key Pair - Done
33,555,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,844,767 UART: [art] Erasing AUTHORITY.KEYID = 7
35,846,285 UART: [art] PUB.X = 0B309E2E2085F932D78543045ACCAA8ED6BE13C28EDD8240BCF8DCD4534E4F34C60655953507CFB81AC8F38311431C22
35,853,533 UART: [art] PUB.Y = 6BA5DD2902B1ED3725284C6B69F3C5FB6B42180D948AC8531BFFE36F984B940E8919D2DC2A3F62CDD0A619226932410A
35,860,824 UART: [art] SIG.R = B4FCF71844CF32654D14660FFCE062DBF4AA6AEE3300AC3BF8376966A6C6B00A9D785D4C67DE69CE9C739277E62D7FE9
35,868,211 UART: [art] SIG.S = 04D4639FD3FB727166672029FA67BEFE507F9B373B8F01D3F006165709888E23B2CA6D13479CF8FBBBDEA98DE1C7DA18
37,173,040 UART: Caliptra RT
37,173,741 UART: [state] CFI Enabled
37,351,295 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,419,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,575,427 UART: [rt]cmd =0x41544d4e, len=14344
49,942,423 >>> mbox cmd response data (8 bytes)
49,945,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,975,692 UART: [rt]cmd =0x494e464f, len=4
49,979,928 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.62s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,343 UART:
192,709 UART: Running Caliptra ROM ...
193,889 UART:
603,397 UART: [state] CFI Enabled
614,233 UART: [state] LifecycleState = Unprovisioned
616,173 UART: [state] DebugLocked = No
618,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,331 UART: [kat] SHA2-256
793,093 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,615 UART: [kat] ++
804,099 UART: [kat] sha1
813,979 UART: [kat] SHA2-256
816,704 UART: [kat] SHA2-384
822,617 UART: [kat] SHA2-512-ACC
824,993 UART: [kat] ECC-384
3,110,658 UART: [kat] HMAC-384Kdf
3,122,033 UART: [kat] LMS
4,312,144 UART: [kat] --
4,315,878 UART: [cold-reset] ++
4,317,247 UART: [fht] Storing FHT @ 0x50003400
4,327,441 UART: [idev] ++
4,327,998 UART: [idev] CDI.KEYID = 6
4,328,968 UART: [idev] SUBJECT.KEYID = 7
4,330,202 UART: [idev] UDS.KEYID = 0
4,331,191 ready_for_fw is high
4,331,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,221 UART: [idev] Erasing UDS.KEYID = 0
7,618,466 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,934 UART: [idev] --
7,646,357 UART: [ldev] ++
7,646,994 UART: [ldev] CDI.KEYID = 6
7,647,914 UART: [ldev] SUBJECT.KEYID = 5
7,649,119 UART: [ldev] AUTHORITY.KEYID = 7
7,650,400 UART: [ldev] FE.KEYID = 1
7,661,093 UART: [ldev] Erasing FE.KEYID = 1
10,949,536 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,789 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,810 UART: [ldev] --
13,306,854 UART: [fwproc] Waiting for Commands...
13,309,102 UART: [fwproc] Received command 0x46574c44
13,311,276 UART: [fwproc] Received Image of size 118548 bytes
22,322,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,406,168 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,479,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,807,259 >>> mbox cmd response: success
22,810,676 UART: [afmc] ++
22,811,284 UART: [afmc] CDI.KEYID = 6
22,812,197 UART: [afmc] SUBJECT.KEYID = 7
22,813,464 UART: [afmc] AUTHORITY.KEYID = 5
26,125,949 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,421,736 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,423,997 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,438,517 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,453,293 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,467,683 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,490,049 UART: [afmc] --
28,493,327 UART: [cold-reset] --
28,496,591 UART: [state] Locking Datavault
28,501,406 UART: [state] Locking PCR0, PCR1 and PCR31
28,503,175 UART: [state] Locking ICCM
28,505,810 UART: [exit] Launching FMC @ 0x40000130
28,514,202 UART:
28,514,431 UART: Running Caliptra FMC ...
28,515,527 UART:
28,515,685 UART: [state] CFI Enabled
28,523,648 UART: [fht] FMC Alias Private Key: 7
30,863,197 UART: [art] Extend RT PCRs Done
30,864,414 UART: [art] Lock RT PCRs Done
30,865,659 UART: [art] Populate DV Done
30,871,282 UART: [fht] FMC Alias Private Key: 7
30,873,014 UART: [art] Derive CDI
30,873,841 UART: [art] Store in slot 0x4
30,916,244 UART: [art] Derive Key Pair
30,917,233 UART: [art] Store priv key in slot 0x5
34,159,093 UART: [art] Derive Key Pair - Done
34,171,951 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,451,785 UART: [art] Erasing AUTHORITY.KEYID = 7
36,453,288 UART: [art] PUB.X = AFC83D52AAB3F5A70DBAAF176CE5390CA462A1A7F3132928C0DB84970BDA6DA77C472079C6E819C5AC098BFD463BA74B
36,460,586 UART: [art] PUB.Y = DA6A4DB288AA70E15C3B87BA5D8BE1912F7BECC8CB9FCCED9614D3F01538D9E5F6C1B4FD5E1290E9DE7EB87206C292A3
36,467,868 UART: [art] SIG.R = BFE9AED42E64CD7B62E0D91CF110AE308A2A416ECE83EC2A1FE1A631B4070BE056684C5F0E8CF142B08B631000D84820
36,475,286 UART: [art] SIG.S = F84CAD275300DD37DE606AC6934F547500CA971160591D3ED5BD3715E86A89C6B796B88BA18B5A6FB84851B779C02A63
37,780,294 UART: Caliptra RT
37,781,009 UART: [state] CFI Enabled
37,914,339 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,975,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
42,131,551 UART: [rt]cmd =0x41544d4e, len=14344
50,653,376 >>> mbox cmd response data (8 bytes)
50,656,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
50,686,634 UART: [rt]cmd =0x494e464f, len=4
50,691,109 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
4,128,644 ready_for_fw is high
4,129,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,074,601 >>> mbox cmd response: success
27,719,367 UART:
27,719,753 UART: Running Caliptra FMC ...
27,720,883 UART:
27,721,039 UART: [state] CFI Enabled
27,728,889 UART: [fht] FMC Alias Private Key: 7
30,068,427 UART: [art] Extend RT PCRs Done
30,069,653 UART: [art] Lock RT PCRs Done
30,071,333 UART: [art] Populate DV Done
30,076,804 UART: [fht] FMC Alias Private Key: 7
30,078,453 UART: [art] Derive CDI
30,079,274 UART: [art] Store in slot 0x4
30,122,037 UART: [art] Derive Key Pair
30,123,080 UART: [art] Store priv key in slot 0x5
33,364,879 UART: [art] Derive Key Pair - Done
33,378,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,658,794 UART: [art] Erasing AUTHORITY.KEYID = 7
35,660,302 UART: [art] PUB.X = 835653680A55CC930BFE59C9AC9AB94A2B1221953A5160319BC2D0914EA32ABE4A95FFD1F71A2BEC7CB76B4297B2F95B
35,667,544 UART: [art] PUB.Y = B27265B542D90E92659A455FCE758415B6F198004F617210A14CD40E9000AD3867DCC8C902038557269312A59D67D7A8
35,674,785 UART: [art] SIG.R = 01CFAD6ECC982354E158A0E090A71DD0BF0409EC24AE6E63B2B2F899BD214FB70F6B2CEB635FBF960D5B49CEEA1303EF
35,682,181 UART: [art] SIG.S = B0F67A9973835FFE077BA8A0BCF14C1EB918CC45DE7AC89B97BD433D2CB9D814532343DEE1045A44691BF344D881973E
36,987,974 UART: Caliptra RT
36,988,676 UART: [state] CFI Enabled
37,122,690 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
41,185,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
41,341,008 UART: [rt]cmd =0x41544d4e, len=14344
49,759,895 >>> mbox cmd response data (8 bytes)
49,763,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
49,793,005 UART: [rt]cmd =0x494e464f, len=4
49,797,463 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,018 UART:
192,384 UART: Running Caliptra ROM ...
193,513 UART:
193,661 UART: [state] CFI Enabled
266,947 UART: [state] LifecycleState = Unprovisioned
268,866 UART: [state] DebugLocked = No
270,761 UART: [state] WD Timer not started. Device not locked for debugging
274,230 UART: [kat] SHA2-256
453,915 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,667 UART: [kat] ++
465,187 UART: [kat] sha1
476,909 UART: [kat] SHA2-256
479,630 UART: [kat] SHA2-384
486,889 UART: [kat] SHA2-512-ACC
489,261 UART: [kat] ECC-384
2,948,072 UART: [kat] HMAC-384Kdf
2,971,328 UART: [kat] LMS
3,447,859 UART: [kat] --
3,451,574 UART: [cold-reset] ++
3,452,934 UART: [fht] FHT @ 0x50003400
3,464,207 UART: [idev] ++
3,464,775 UART: [idev] CDI.KEYID = 6
3,465,691 UART: [idev] SUBJECT.KEYID = 7
3,466,931 UART: [idev] UDS.KEYID = 0
3,467,971 ready_for_fw is high
3,468,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,233 UART: [idev] Erasing UDS.KEYID = 0
6,000,458 UART: [idev] Sha1 KeyId Algorithm
6,024,729 UART: [idev] --
6,029,804 UART: [ldev] ++
6,030,375 UART: [ldev] CDI.KEYID = 6
6,031,340 UART: [ldev] SUBJECT.KEYID = 5
6,032,549 UART: [ldev] AUTHORITY.KEYID = 7
6,033,774 UART: [ldev] FE.KEYID = 1
6,070,835 UART: [ldev] Erasing FE.KEYID = 1
8,578,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,313,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,349 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,383,202 UART: [ldev] --
10,389,078 UART: [fwproc] Wait for Commands...
10,391,664 UART: [fwproc] Recv command 0x46574c44
10,393,697 UART: [fwproc] Recv'd Img size: 118548 bytes
14,958,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,042,217 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,115,253 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,443,787 >>> mbox cmd response: success
15,447,097 UART: [afmc] ++
15,447,714 UART: [afmc] CDI.KEYID = 6
15,448,629 UART: [afmc] SUBJECT.KEYID = 7
15,449,837 UART: [afmc] AUTHORITY.KEYID = 5
17,973,276 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,697,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,699,470 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,715,358 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,731,270 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,746,945 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,770,753 UART: [afmc] --
19,774,987 UART: [cold-reset] --
19,778,139 UART: [state] Locking Datavault
19,784,090 UART: [state] Locking PCR0, PCR1 and PCR31
19,785,840 UART: [state] Locking ICCM
19,788,257 UART: [exit] Launching FMC @ 0x40000130
19,796,649 UART:
19,796,881 UART: Running Caliptra FMC ...
19,797,979 UART:
19,798,142 UART: [state] CFI Enabled
19,854,415 UART: [fht] FMC Alias Private Key: 7
21,641,627 UART: [art] Extend RT PCRs Done
21,642,848 UART: [art] Lock RT PCRs Done
21,644,627 UART: [art] Populate DV Done
21,650,035 UART: [fht] FMC Alias Private Key: 7
21,651,517 UART: [art] Derive CDI
21,652,276 UART: [art] Store in slot 0x4
21,708,060 UART: [art] Derive Key Pair
21,709,060 UART: [art] Store priv key in slot 0x5
24,172,195 UART: [art] Derive Key Pair - Done
24,185,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,897,683 UART: [art] Erasing AUTHORITY.KEYID = 7
25,899,191 UART: [art] PUB.X = 2D7B24E1D4EEE5AC6133AD663C39FA0B657E1E2809A4C14E700E16B4F3566D8096F27E2B1EAFE1B5A8D687D689C442FB
25,906,440 UART: [art] PUB.Y = 0CB66322908A856BBB57C489725BF7EF7673E1B9081DAD40DF6E2E226813A15D24E1FEE60A640285D87BB12DD9AD8660
25,913,721 UART: [art] SIG.R = DEB70297EEF2E59F47EEEF1DD69170D4E9878F76D3EE20E427077716E82D9043237F626DFB6169B42B2767CDEE1CC147
25,921,106 UART: [art] SIG.S = 8EE357B6368ABEB57D4FFA1BBCDDE63FB3DEE9F88205E34B4A929604E2D555F3C0E64E5F8723DB3ECCBB1379F29F4FD7
26,900,237 UART: Caliptra RT
26,900,957 UART: [state] CFI Enabled
27,081,747 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,119,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,275,047 UART: [rt]cmd =0x41544d4e, len=14344
36,187,964 >>> mbox cmd response data (8 bytes)
36,191,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,221,365 UART: [rt]cmd =0x494e464f, len=4
36,225,681 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,461,439 ready_for_fw is high
3,461,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,373,362 >>> mbox cmd response: success
19,665,905 UART:
19,666,291 UART: Running Caliptra FMC ...
19,667,485 UART:
19,667,653 UART: [state] CFI Enabled
19,733,702 UART: [fht] FMC Alias Private Key: 7
21,499,908 UART: [art] Extend RT PCRs Done
21,501,123 UART: [art] Lock RT PCRs Done
21,502,276 UART: [art] Populate DV Done
21,507,802 UART: [fht] FMC Alias Private Key: 7
21,509,284 UART: [art] Derive CDI
21,510,044 UART: [art] Store in slot 0x4
21,565,489 UART: [art] Derive Key Pair
21,566,533 UART: [art] Store priv key in slot 0x5
24,029,626 UART: [art] Derive Key Pair - Done
24,042,414 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,754,004 UART: [art] Erasing AUTHORITY.KEYID = 7
25,755,536 UART: [art] PUB.X = D07DF1C605D4904BE8F6DEC6F73BD8AD0E59B1E25E4A6A78DE142DAB089A8A2FC8861D4774BED336631AA4CF246A432B
25,762,809 UART: [art] PUB.Y = 284745C498D1AEBCA455C62F7C213BBA9BF6AB46A813E2FB6983D032F8E3FDE7F1E9D20936FA6A3F59EA6DC4D69E683A
25,770,068 UART: [art] SIG.R = 3AB84B0F4FA79288526612AC1F70994100CF597682A0E7F062E9E04A098574A577C0142B5250FE91F063205FE2A4E689
25,777,418 UART: [art] SIG.S = 1769A6C6335C02A50E09FF6C481D79CEFB3359C0F5F5FC5085AA3A971784A07714D31EB47E5C65C59EFF6C61B15D6C8F
26,756,781 UART: Caliptra RT
26,757,475 UART: [state] CFI Enabled
26,938,185 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
30,974,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,130,674 UART: [rt]cmd =0x41544d4e, len=14344
36,025,949 >>> mbox cmd response data (8 bytes)
36,029,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,059,496 UART: [rt]cmd =0x494e464f, len=4
36,063,855 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,335 UART:
192,727 UART: Running Caliptra ROM ...
193,887 UART:
603,641 UART: [state] CFI Enabled
617,503 UART: [state] LifecycleState = Unprovisioned
619,456 UART: [state] DebugLocked = No
621,414 UART: [state] WD Timer not started. Device not locked for debugging
625,378 UART: [kat] SHA2-256
804,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,767 UART: [kat] ++
816,366 UART: [kat] sha1
827,890 UART: [kat] SHA2-256
830,614 UART: [kat] SHA2-384
836,748 UART: [kat] SHA2-512-ACC
839,078 UART: [kat] ECC-384
3,281,793 UART: [kat] HMAC-384Kdf
3,293,806 UART: [kat] LMS
3,770,308 UART: [kat] --
3,775,551 UART: [cold-reset] ++
3,777,848 UART: [fht] FHT @ 0x50003400
3,787,835 UART: [idev] ++
3,788,480 UART: [idev] CDI.KEYID = 6
3,789,391 UART: [idev] SUBJECT.KEYID = 7
3,790,635 UART: [idev] UDS.KEYID = 0
3,791,563 ready_for_fw is high
3,791,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,601 UART: [idev] Erasing UDS.KEYID = 0
6,270,223 UART: [idev] Sha1 KeyId Algorithm
6,292,899 UART: [idev] --
6,298,864 UART: [ldev] ++
6,299,443 UART: [ldev] CDI.KEYID = 6
6,300,357 UART: [ldev] SUBJECT.KEYID = 5
6,301,569 UART: [ldev] AUTHORITY.KEYID = 7
6,302,798 UART: [ldev] FE.KEYID = 1
6,313,301 UART: [ldev] Erasing FE.KEYID = 1
8,792,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,732 UART: [ldev] --
10,588,350 UART: [fwproc] Wait for Commands...
10,591,255 UART: [fwproc] Recv command 0x46574c44
10,593,238 UART: [fwproc] Recv'd Img size: 118548 bytes
15,141,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,230,175 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,303,231 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,632,230 >>> mbox cmd response: success
15,636,930 UART: [afmc] ++
15,637,558 UART: [afmc] CDI.KEYID = 6
15,638,494 UART: [afmc] SUBJECT.KEYID = 7
15,639,720 UART: [afmc] AUTHORITY.KEYID = 5
18,145,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,868,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,871,068 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,886,971 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,902,857 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,918,556 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,944,069 UART: [afmc] --
19,948,364 UART: [cold-reset] --
19,952,119 UART: [state] Locking Datavault
19,955,770 UART: [state] Locking PCR0, PCR1 and PCR31
19,957,510 UART: [state] Locking ICCM
19,959,160 UART: [exit] Launching FMC @ 0x40000130
19,967,556 UART:
19,967,793 UART: Running Caliptra FMC ...
19,968,840 UART:
19,968,990 UART: [state] CFI Enabled
19,977,258 UART: [fht] FMC Alias Private Key: 7
21,742,819 UART: [art] Extend RT PCRs Done
21,744,034 UART: [art] Lock RT PCRs Done
21,745,744 UART: [art] Populate DV Done
21,751,213 UART: [fht] FMC Alias Private Key: 7
21,752,698 UART: [art] Derive CDI
21,753,433 UART: [art] Store in slot 0x4
21,796,301 UART: [art] Derive Key Pair
21,797,336 UART: [art] Store priv key in slot 0x5
24,224,196 UART: [art] Derive Key Pair - Done
24,236,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,943,206 UART: [art] Erasing AUTHORITY.KEYID = 7
25,944,711 UART: [art] PUB.X = 7C94A6391065BEC6739B9A1ABFB0B0376FDE9FFEDF469AA5AF620B40DB971691FCEE6013A1E798F1E86440BB396E3083
25,952,017 UART: [art] PUB.Y = 9EBCC4FE3EEAA369805566FE477B88C72EAA3805CFB023D3D7EF411E2D0DD8A1F85084EFA2571CACAD23E73A3902CDC6
25,959,300 UART: [art] SIG.R = E6260F61B17BAF0D3FF8FBF3B67B3C91A27E1F2CBD9331274E93348E0DB1BD8EC7D4E097A6EF32F021D0EB17AFB106BF
25,966,707 UART: [art] SIG.S = AE440A2F8B1803CC199ABE847FBACBA888D7B6E984B5FAF702784F3F7CE1EED269C0F7D52449B062D1CA1627938F2F99
26,945,439 UART: Caliptra RT
26,946,142 UART: [state] CFI Enabled
27,078,812 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,137,581 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,293,306 UART: [rt]cmd =0x41544d4e, len=14344
36,210,863 >>> mbox cmd response data (8 bytes)
36,214,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,244,221 UART: [rt]cmd =0x494e464f, len=4
36,248,621 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,775,213 ready_for_fw is high
3,775,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,592,980 >>> mbox cmd response: success
19,840,348 UART:
19,840,739 UART: Running Caliptra FMC ...
19,841,854 UART:
19,842,013 UART: [state] CFI Enabled
19,850,354 UART: [fht] FMC Alias Private Key: 7
21,616,041 UART: [art] Extend RT PCRs Done
21,617,266 UART: [art] Lock RT PCRs Done
21,618,814 UART: [art] Populate DV Done
21,624,181 UART: [fht] FMC Alias Private Key: 7
21,625,781 UART: [art] Derive CDI
21,626,519 UART: [art] Store in slot 0x4
21,669,382 UART: [art] Derive Key Pair
21,670,384 UART: [art] Store priv key in slot 0x5
24,097,613 UART: [art] Derive Key Pair - Done
24,110,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,816,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,818,295 UART: [art] PUB.X = B2F90FF0B6E73DE20F1166E1E1C08B47CA4C815342EAFFAEAA38612FD951F957164FD6CF848929215D42110863A70980
25,825,551 UART: [art] PUB.Y = B67004B85A224266E8018D112515224BB1A5EE1DCDD18320EE4579471CE765E33AD39D7A278D1DE97985E3D58DD773E4
25,832,796 UART: [art] SIG.R = 7D69304E3378F96FC9C4F924B68476BBDED8C450BB4CC894AB16C0CCA576F3259C33C7701167EB11F625F6C2660ADC8E
25,840,217 UART: [art] SIG.S = 426F4C79E57101F880D794F6A3A7ADD829ED4D4910F5319B227BE1BDDDF3A646D14CB31BABF2575E043A8F7AD2CCFD1F
26,818,828 UART: Caliptra RT
26,819,519 UART: [state] CFI Enabled
26,952,718 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,014,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,170,644 UART: [rt]cmd =0x41544d4e, len=14344
36,070,199 >>> mbox cmd response data (8 bytes)
36,073,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,103,626 UART: [rt]cmd =0x494e464f, len=4
36,107,820 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.92s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,116 UART:
192,503 UART: Running Caliptra ROM ...
193,699 UART:
193,852 UART: [state] CFI Enabled
266,489 UART: [state] LifecycleState = Unprovisioned
268,915 UART: [state] DebugLocked = No
270,891 UART: [state] WD Timer not started. Device not locked for debugging
275,655 UART: [kat] SHA2-256
465,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,312 UART: [kat] ++
476,788 UART: [kat] sha1
488,369 UART: [kat] SHA2-256
491,372 UART: [kat] SHA2-384
498,280 UART: [kat] SHA2-512-ACC
500,861 UART: [kat] ECC-384
2,947,348 UART: [kat] HMAC-384Kdf
2,973,259 UART: [kat] LMS
3,505,025 UART: [kat] --
3,507,040 UART: [cold-reset] ++
3,509,251 UART: [fht] FHT @ 0x50003400
3,521,708 UART: [idev] ++
3,522,414 UART: [idev] CDI.KEYID = 6
3,523,444 UART: [idev] SUBJECT.KEYID = 7
3,524,545 UART: [idev] UDS.KEYID = 0
3,525,465 ready_for_fw is high
3,525,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,760 UART: [idev] Erasing UDS.KEYID = 0
6,032,021 UART: [idev] Sha1 KeyId Algorithm
6,054,340 UART: [idev] --
6,058,709 UART: [ldev] ++
6,059,385 UART: [ldev] CDI.KEYID = 6
6,060,318 UART: [ldev] SUBJECT.KEYID = 5
6,061,472 UART: [ldev] AUTHORITY.KEYID = 7
6,062,721 UART: [ldev] FE.KEYID = 1
6,102,129 UART: [ldev] Erasing FE.KEYID = 1
8,609,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,853 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,937 UART: [ldev] --
10,415,653 UART: [fwproc] Wait for Commands...
10,418,392 UART: [fwproc] Recv command 0x46574c44
10,420,694 UART: [fwproc] Recv'd Img size: 118548 bytes
15,094,047 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,180,350 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,303,945 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,864,190 >>> mbox cmd response: success
15,867,400 UART: [afmc] ++
15,868,124 UART: [afmc] CDI.KEYID = 6
15,869,578 UART: [afmc] SUBJECT.KEYID = 7
15,870,809 UART: [afmc] AUTHORITY.KEYID = 5
18,412,252 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,135,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,137,643 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,152,689 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,167,929 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,182,958 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,206,465 UART: [afmc] --
20,210,276 UART: [cold-reset] --
20,213,768 UART: [state] Locking Datavault
20,219,940 UART: [state] Locking PCR0, PCR1 and PCR31
20,222,136 UART: [state] Locking ICCM
20,223,632 UART: [exit] Launching FMC @ 0x40000130
20,232,308 UART:
20,232,566 UART: Running Caliptra FMC ...
20,233,666 UART:
20,233,822 UART: [state] CFI Enabled
20,292,674 UART: [fht] FMC Alias Private Key: 7
22,080,050 UART: [art] Extend RT PCRs Done
22,081,272 UART: [art] Lock RT PCRs Done
22,083,009 UART: [art] Populate DV Done
22,088,369 UART: [fht] FMC Alias Private Key: 7
22,089,957 UART: [art] Derive CDI
22,090,771 UART: [art] Store in slot 0x4
22,146,679 UART: [art] Derive Key Pair
22,147,712 UART: [art] Store priv key in slot 0x5
24,611,033 UART: [art] Derive Key Pair - Done
24,623,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,336,876 UART: [art] Erasing AUTHORITY.KEYID = 7
26,338,375 UART: [art] PUB.X = 509148C0943C77C241765B68B646EEC0FCF3FF8677BAED8023AB9D02E545E43FF032B37A970F5CF3772C7EA652CC9F6D
26,345,653 UART: [art] PUB.Y = B263096310FCBDEE8EDE16754E2C19114841E1396B01582903240857012C86DC2BAE4588BB5B84C599E882AEA4DA77AB
26,352,878 UART: [art] SIG.R = 65D7F1001892FD2A5B8A06DECD870F8AD380CBFE1BCE3B58252380F227F22D81A5CE4B4B3F32B9B70819BA5493E4A530
26,360,304 UART: [art] SIG.S = D782976D315C7C8D332BCBA807AC4B65C964F98F8B829F59123660A4CC8609E16610410105AD01AAC5439F1C107F16ED
27,339,066 UART: Caliptra RT
27,339,749 UART: [state] CFI Enabled
27,520,690 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,567,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,722,837 UART: [rt]cmd =0x41544d4e, len=14344
36,640,393 >>> mbox cmd response data (8 bytes)
36,643,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,673,692 UART: [rt]cmd =0x494e464f, len=4
36,677,959 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,439,468 ready_for_fw is high
3,440,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,934,027 >>> mbox cmd response: success
20,219,934 UART:
20,220,310 UART: Running Caliptra FMC ...
20,221,507 UART:
20,221,679 UART: [state] CFI Enabled
20,288,936 UART: [fht] FMC Alias Private Key: 7
22,054,907 UART: [art] Extend RT PCRs Done
22,056,151 UART: [art] Lock RT PCRs Done
22,057,942 UART: [art] Populate DV Done
22,063,526 UART: [fht] FMC Alias Private Key: 7
22,065,284 UART: [art] Derive CDI
22,066,096 UART: [art] Store in slot 0x4
22,121,903 UART: [art] Derive Key Pair
22,122,942 UART: [art] Store priv key in slot 0x5
24,585,889 UART: [art] Derive Key Pair - Done
24,598,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,753 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,256 UART: [art] PUB.X = A0CD409226645BACDF00EE13382E8417B9C00F1422A2F220346713DE8DE7FC27CF317A95B95AB51EBE39BDA98E109469
26,320,494 UART: [art] PUB.Y = 08CC6A679393C1BF114808105FF2B324F122B7CD0A8ED608A942B7FFD548C2F6270127C2B972315C59153CEC544DD741
26,327,771 UART: [art] SIG.R = 7A908A7F05B82EDF17D54751B61A3591FFEDB65BD000F78C763264A517CDA9F6E27B54D583EDEE39538D6EEE21BB765E
26,335,188 UART: [art] SIG.S = 17EECFC264232DDB7E85A902FB64E63FFA21E17492FCCA77FD281EAEA0E262D041B6D6BC2117B304C35759133C3A1C9F
27,314,325 UART: Caliptra RT
27,315,020 UART: [state] CFI Enabled
27,496,290 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,546,338 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,702,354 UART: [rt]cmd =0x41544d4e, len=14344
36,623,480 >>> mbox cmd response data (8 bytes)
36,626,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,656,782 UART: [rt]cmd =0x494e464f, len=4
36,661,239 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
192,553 UART:
192,924 UART: Running Caliptra ROM ...
194,125 UART:
603,932 UART: [state] CFI Enabled
618,042 UART: [state] LifecycleState = Unprovisioned
620,427 UART: [state] DebugLocked = No
622,320 UART: [state] WD Timer not started. Device not locked for debugging
627,300 UART: [kat] SHA2-256
817,156 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,964 UART: [kat] ++
828,593 UART: [kat] sha1
838,702 UART: [kat] SHA2-256
841,790 UART: [kat] SHA2-384
848,565 UART: [kat] SHA2-512-ACC
851,151 UART: [kat] ECC-384
3,294,080 UART: [kat] HMAC-384Kdf
3,307,739 UART: [kat] LMS
3,839,563 UART: [kat] --
3,846,397 UART: [cold-reset] ++
3,848,116 UART: [fht] FHT @ 0x50003400
3,859,876 UART: [idev] ++
3,860,594 UART: [idev] CDI.KEYID = 6
3,861,551 UART: [idev] SUBJECT.KEYID = 7
3,862,731 UART: [idev] UDS.KEYID = 0
3,863,675 ready_for_fw is high
3,863,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,111 UART: [idev] Erasing UDS.KEYID = 0
6,331,618 UART: [idev] Sha1 KeyId Algorithm
6,352,900 UART: [idev] --
6,357,272 UART: [ldev] ++
6,357,953 UART: [ldev] CDI.KEYID = 6
6,358,872 UART: [ldev] SUBJECT.KEYID = 5
6,360,034 UART: [ldev] AUTHORITY.KEYID = 7
6,361,273 UART: [ldev] FE.KEYID = 1
6,372,893 UART: [ldev] Erasing FE.KEYID = 1
8,852,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,026 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,046 UART: [ldev] --
10,644,818 UART: [fwproc] Wait for Commands...
10,646,831 UART: [fwproc] Recv command 0x46574c44
10,649,167 UART: [fwproc] Recv'd Img size: 118548 bytes
15,317,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,403,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,527,209 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,088,147 >>> mbox cmd response: success
16,092,228 UART: [afmc] ++
16,092,935 UART: [afmc] CDI.KEYID = 6
16,094,140 UART: [afmc] SUBJECT.KEYID = 7
16,095,511 UART: [afmc] AUTHORITY.KEYID = 5
18,598,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,321,065 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,322,975 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,338,074 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,353,332 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,368,366 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,392,305 UART: [afmc] --
20,396,658 UART: [cold-reset] --
20,401,296 UART: [state] Locking Datavault
20,406,121 UART: [state] Locking PCR0, PCR1 and PCR31
20,408,288 UART: [state] Locking ICCM
20,410,264 UART: [exit] Launching FMC @ 0x40000130
20,418,897 UART:
20,419,138 UART: Running Caliptra FMC ...
20,420,244 UART:
20,420,403 UART: [state] CFI Enabled
20,428,507 UART: [fht] FMC Alias Private Key: 7
22,194,542 UART: [art] Extend RT PCRs Done
22,195,753 UART: [art] Lock RT PCRs Done
22,197,142 UART: [art] Populate DV Done
22,202,563 UART: [fht] FMC Alias Private Key: 7
22,204,102 UART: [art] Derive CDI
22,204,864 UART: [art] Store in slot 0x4
22,247,786 UART: [art] Derive Key Pair
22,248,829 UART: [art] Store priv key in slot 0x5
24,675,247 UART: [art] Derive Key Pair - Done
24,687,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,394,521 UART: [art] Erasing AUTHORITY.KEYID = 7
26,396,028 UART: [art] PUB.X = DB38E3166D8EEE163AFCDCCBFB6B70E221E9818F5E8402250E078AB063A991F83EB500FA320093B1755EA1859F645AB0
26,403,266 UART: [art] PUB.Y = 64112CC68A2FF2816C7309454FE28D476F75757C3DAAF24D9A1687DC25F5AA5FC63FB25D35CCB231ADF345610DBC9DB6
26,410,534 UART: [art] SIG.R = 3C5DDC4E1DC649249AE33E1319FAC580D6C422F24BA6AAAB39A12B927515CB841725EB36E48A57DD2E91885CCCA367D8
26,417,952 UART: [art] SIG.S = 7BD9BF19B5DBB9214FC109105CE4551972B788266D6C1D621ECE6E50AEF7FDE9F9565ED774F7DD25FE70C13ADB210F57
27,397,165 UART: Caliptra RT
27,397,879 UART: [state] CFI Enabled
27,530,882 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,582,904 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,738,941 UART: [rt]cmd =0x41544d4e, len=14344
36,649,621 >>> mbox cmd response data (8 bytes)
36,653,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,683,055 UART: [rt]cmd =0x494e464f, len=4
36,687,303 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,754,200 ready_for_fw is high
3,754,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,136,663 >>> mbox cmd response: success
20,385,678 UART:
20,386,094 UART: Running Caliptra FMC ...
20,387,311 UART:
20,387,479 UART: [state] CFI Enabled
20,395,068 UART: [fht] FMC Alias Private Key: 7
22,161,004 UART: [art] Extend RT PCRs Done
22,162,226 UART: [art] Lock RT PCRs Done
22,163,805 UART: [art] Populate DV Done
22,169,173 UART: [fht] FMC Alias Private Key: 7
22,170,776 UART: [art] Derive CDI
22,171,599 UART: [art] Store in slot 0x4
22,214,521 UART: [art] Derive Key Pair
22,215,526 UART: [art] Store priv key in slot 0x5
24,642,642 UART: [art] Derive Key Pair - Done
24,655,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,361,698 UART: [art] Erasing AUTHORITY.KEYID = 7
26,363,205 UART: [art] PUB.X = B16D1F671FFFDD98C1E57BAAD86CAF8BB3EB39D9AFA51D5F2A1A177AD3077D126E5A59F9E3D00D08F3CA33561552A98F
26,370,500 UART: [art] PUB.Y = 3F16E334B5FBAC7D1B849FA5824674C2F582916ED1CCE1746C66CF08A00C788D2EF21B95F00E437F8AB9B90A64D57D00
26,377,767 UART: [art] SIG.R = 7E40601A8A2241DE336B7B864796DC1ED582E919CB17C6B46EE84CAF7DC09871769B158ABFD7036EB31C60A139953D41
26,385,150 UART: [art] SIG.S = 20ED9B1C50D84536292E9EF141DDD14A1DAF80B5652EE3739C4344C841BB9C0FED609CE48B969D8D42309B5C8B8DB46F
27,363,905 UART: Caliptra RT
27,364,598 UART: [state] CFI Enabled
27,497,622 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
31,554,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
31,710,340 UART: [rt]cmd =0x41544d4e, len=14344
36,618,751 >>> mbox cmd response data (8 bytes)
36,622,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
36,651,916 UART: [rt]cmd =0x494e464f, len=4
36,656,187 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,734 UART: [state] LifecycleState = Unprovisioned
85,389 UART: [state] DebugLocked = No
85,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,545 UART: [kat] SHA2-256
881,476 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,591 UART: [kat] ++
885,743 UART: [kat] sha1
889,911 UART: [kat] SHA2-256
891,849 UART: [kat] SHA2-384
894,580 UART: [kat] SHA2-512-ACC
896,481 UART: [kat] ECC-384
902,176 UART: [kat] HMAC-384Kdf
906,844 UART: [kat] LMS
1,475,040 UART: [kat] --
1,476,009 UART: [cold-reset] ++
1,476,439 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 ready_for_fw is high
1,480,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,504,768 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,318 UART: [idev] --
1,514,367 UART: [ldev] ++
1,514,535 UART: [ldev] CDI.KEYID = 6
1,514,898 UART: [ldev] SUBJECT.KEYID = 5
1,515,324 UART: [ldev] AUTHORITY.KEYID = 7
1,515,787 UART: [ldev] FE.KEYID = 1
1,521,197 UART: [ldev] Erasing FE.KEYID = 1
1,546,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,823 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,430 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,182 UART: [ldev] --
1,585,635 UART: [fwproc] Waiting for Commands...
1,586,490 UART: [fwproc] Received command 0x46574c44
1,587,281 UART: [fwproc] Received Image of size 118548 bytes
5,204,801 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,233,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,264,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,404,870 >>> mbox cmd response: success
5,406,006 UART: [afmc] ++
5,406,174 UART: [afmc] CDI.KEYID = 6
5,406,536 UART: [afmc] SUBJECT.KEYID = 7
5,406,961 UART: [afmc] AUTHORITY.KEYID = 5
5,441,608 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,457,840 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,458,620 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,464,326 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,470,205 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,475,918 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,483,837 UART: [afmc] --
5,484,969 UART: [cold-reset] --
5,485,615 UART: [state] Locking Datavault
5,486,678 UART: [state] Locking PCR0, PCR1 and PCR31
5,487,282 UART: [state] Locking ICCM
5,487,788 UART: [exit] Launching FMC @ 0x40000130
5,493,118 UART:
5,493,134 UART: Running Caliptra FMC ...
5,493,542 UART:
5,493,596 UART: [state] CFI Enabled
5,503,960 UART: [fht] FMC Alias Private Key: 7
5,622,996 UART: [art] Extend RT PCRs Done
5,623,424 UART: [art] Lock RT PCRs Done
5,624,952 UART: [art] Populate DV Done
5,633,199 UART: [fht] FMC Alias Private Key: 7
5,634,153 UART: [art] Derive CDI
5,634,433 UART: [art] Store in slot 0x4
5,720,249 UART: [art] Derive Key Pair
5,720,609 UART: [art] Store priv key in slot 0x5
5,733,710 UART: [art] Derive Key Pair - Done
5,748,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,376 UART: [art] Erasing AUTHORITY.KEYID = 7
5,765,141 UART: [art] PUB.X = 3C2283A78FA5A8B102DA6244A67BB30D565A7D68B52EF19B8A456F5E4E65115297EB927290E077E7F7419AB9CADA92DE
5,771,913 UART: [art] PUB.Y = D4D4B60C5FF71A2BA2F90E57CAD13BD7D677CDC9047B2C46A74586E9F6A2533E4C62875328EDDB61EFB1B85EAF91B3F8
5,778,874 UART: [art] SIG.R = A68CD9D2C91A2A6F3124F286773DEA7FC7FDB03C1C0083AAD3FBA09C604B1D65BBFECEF51268A2B27A61A3912AE8957E
5,785,644 UART: [art] SIG.S = 883B948AC3135774A0165099ECD185E5F2F8A4A32D8637E6B609A7364A7CF663C32D42C56BB4C1171D425C53E23739E6
5,809,827 UART: Caliptra RT
5,810,078 UART: [state] CFI Enabled
5,930,365 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,931,035 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,053,741 UART: [rt]cmd =0x41544d4e, len=14344
11,096,201 >>> mbox cmd response data (8 bytes)
11,096,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,125,569 UART: [rt]cmd =0x494e464f, len=4
11,129,293 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,911 ready_for_fw is high
1,361,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,367,431 >>> mbox cmd response: success
5,429,566 UART:
5,429,582 UART: Running Caliptra FMC ...
5,429,990 UART:
5,430,044 UART: [state] CFI Enabled
5,440,770 UART: [fht] FMC Alias Private Key: 7
5,559,754 UART: [art] Extend RT PCRs Done
5,560,182 UART: [art] Lock RT PCRs Done
5,561,896 UART: [art] Populate DV Done
5,569,919 UART: [fht] FMC Alias Private Key: 7
5,570,865 UART: [art] Derive CDI
5,571,145 UART: [art] Store in slot 0x4
5,656,825 UART: [art] Derive Key Pair
5,657,185 UART: [art] Store priv key in slot 0x5
5,670,742 UART: [art] Derive Key Pair - Done
5,685,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,701,300 UART: [art] Erasing AUTHORITY.KEYID = 7
5,702,065 UART: [art] PUB.X = 89B2ECB0CA2F3E0ADF9F906B1F5FBDC944CA44684761B0B47722AD45FB9015E0AA5B2E7865E047987141B10F8688E77E
5,708,839 UART: [art] PUB.Y = 4DD51812133C995FF8B1AC8A88FC8228344D6401863F5FE413790534A26582248AB26349CC03DA0FEF7A17A715EC68A1
5,715,775 UART: [art] SIG.R = 701FDA31500423BE46336057CB79732BD13131A83219C7EC17B69EB149F942DC1A5F906C1009CFE4D7814BC22D89152E
5,722,537 UART: [art] SIG.S = 379905C24FDD9E31262E6BAC2400360902040C45AFD2D0A7D4402BBC2667EC156041884DC6180F96599F81C85AA29FD9
5,746,487 UART: Caliptra RT
5,746,738 UART: [state] CFI Enabled
5,867,345 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,868,015 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,990,825 UART: [rt]cmd =0x41544d4e, len=14344
10,767,791 >>> mbox cmd response data (8 bytes)
10,767,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,797,147 UART: [rt]cmd =0x494e464f, len=4
10,801,023 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,426 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,902 UART: [kat] SHA2-256
881,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,948 UART: [kat] ++
886,100 UART: [kat] sha1
890,320 UART: [kat] SHA2-256
892,258 UART: [kat] SHA2-384
894,947 UART: [kat] SHA2-512-ACC
896,848 UART: [kat] ECC-384
902,205 UART: [kat] HMAC-384Kdf
906,991 UART: [kat] LMS
1,475,187 UART: [kat] --
1,476,190 UART: [cold-reset] ++
1,476,690 UART: [fht] Storing FHT @ 0x50003400
1,479,495 UART: [idev] ++
1,479,663 UART: [idev] CDI.KEYID = 6
1,480,023 UART: [idev] SUBJECT.KEYID = 7
1,480,447 UART: [idev] UDS.KEYID = 0
1,480,792 ready_for_fw is high
1,480,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,769 UART: [idev] Erasing UDS.KEYID = 0
1,505,375 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,366 UART: [ldev] ++
1,515,534 UART: [ldev] CDI.KEYID = 6
1,515,897 UART: [ldev] SUBJECT.KEYID = 5
1,516,323 UART: [ldev] AUTHORITY.KEYID = 7
1,516,786 UART: [ldev] FE.KEYID = 1
1,522,242 UART: [ldev] Erasing FE.KEYID = 1
1,547,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,110 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,001 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,587,130 UART: [fwproc] Waiting for Commands...
1,587,845 UART: [fwproc] Received command 0x46574c44
1,588,636 UART: [fwproc] Received Image of size 118548 bytes
5,092,669 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,120,395 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,151,613 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,291,946 >>> mbox cmd response: success
5,293,008 UART: [afmc] ++
5,293,176 UART: [afmc] CDI.KEYID = 6
5,293,538 UART: [afmc] SUBJECT.KEYID = 7
5,293,963 UART: [afmc] AUTHORITY.KEYID = 5
5,329,852 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,346,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,347,164 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,352,870 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,358,749 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,364,462 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,372,263 UART: [afmc] --
5,373,237 UART: [cold-reset] --
5,373,987 UART: [state] Locking Datavault
5,375,224 UART: [state] Locking PCR0, PCR1 and PCR31
5,375,828 UART: [state] Locking ICCM
5,376,418 UART: [exit] Launching FMC @ 0x40000130
5,381,748 UART:
5,381,764 UART: Running Caliptra FMC ...
5,382,172 UART:
5,382,315 UART: [state] CFI Enabled
5,392,931 UART: [fht] FMC Alias Private Key: 7
5,511,559 UART: [art] Extend RT PCRs Done
5,511,987 UART: [art] Lock RT PCRs Done
5,513,739 UART: [art] Populate DV Done
5,522,074 UART: [fht] FMC Alias Private Key: 7
5,523,246 UART: [art] Derive CDI
5,523,526 UART: [art] Store in slot 0x4
5,609,148 UART: [art] Derive Key Pair
5,609,508 UART: [art] Store priv key in slot 0x5
5,623,427 UART: [art] Derive Key Pair - Done
5,637,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,653,463 UART: [art] Erasing AUTHORITY.KEYID = 7
5,654,228 UART: [art] PUB.X = 1CDC388F3E24CC19EAA39DC0BFD4B5A3D1918A828E9E2E278F2DB03F5DF9FA369640FE025935F4985386C21103E199BF
5,661,004 UART: [art] PUB.Y = 380B57FD75F3656E0A166C728AAE867C826E1E6849FAE56F2ABED3AFE889BAD65189D7579B9AEB7329861F58FF3C8035
5,667,958 UART: [art] SIG.R = 936D49DF98DD1AE5EFA87525273E0662DBD4EA6A4C8DFAB69127BDD0612FF8F04B231828E7424EB9459272EF49419C27
5,674,733 UART: [art] SIG.S = B0A780F6FA14D583A2F47AA85BD73F3406CCE19C55B01DD2C5BDFC0EF9B0C390C40663011A69624B6138D3D0406AB589
5,698,875 UART: Caliptra RT
5,699,218 UART: [state] CFI Enabled
5,819,731 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,820,401 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,943,515 UART: [rt]cmd =0x41544d4e, len=14344
10,834,577 >>> mbox cmd response data (8 bytes)
10,834,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,864,023 UART: [rt]cmd =0x494e464f, len=4
10,867,601 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,606 ready_for_fw is high
1,362,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,180,123 >>> mbox cmd response: success
5,242,670 UART:
5,242,686 UART: Running Caliptra FMC ...
5,243,094 UART:
5,243,237 UART: [state] CFI Enabled
5,254,119 UART: [fht] FMC Alias Private Key: 7
5,372,617 UART: [art] Extend RT PCRs Done
5,373,045 UART: [art] Lock RT PCRs Done
5,374,517 UART: [art] Populate DV Done
5,382,728 UART: [fht] FMC Alias Private Key: 7
5,383,744 UART: [art] Derive CDI
5,384,024 UART: [art] Store in slot 0x4
5,469,926 UART: [art] Derive Key Pair
5,470,286 UART: [art] Store priv key in slot 0x5
5,483,459 UART: [art] Derive Key Pair - Done
5,498,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,513,553 UART: [art] Erasing AUTHORITY.KEYID = 7
5,514,318 UART: [art] PUB.X = 1D917BF74225EF32FFC41397C6939488405E4383DAA47C03F2BE984A9DB780990DB57647AE66A51A098C67D9AA8CEA66
5,521,083 UART: [art] PUB.Y = 8DF4CA536133A9B21378B447D7E0021A73D5D76770E40925FB40875D5E90D5E21029DB487B91763F175B907749E5D3E1
5,528,019 UART: [art] SIG.R = B4ED3418A7AA7FA797324C73B28C474CFC37A78D422DFAF85C1BF035F4FC3C7A01C1643F6A0A59B15BBCD18D338C217A
5,534,801 UART: [art] SIG.S = 464EA4FCC3C56533A6B907C01347CDCECEC83B37525B96A42BC38D118E8B6756FA7AB4C088422416A68B099ED660D052
5,558,317 UART: Caliptra RT
5,558,660 UART: [state] CFI Enabled
5,679,236 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
5,679,906 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,802,618 UART: [rt]cmd =0x41544d4e, len=14344
10,731,697 >>> mbox cmd response data (8 bytes)
10,731,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
10,760,955 UART: [rt]cmd =0x494e464f, len=4
10,764,641 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
891,110 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,214 UART: [kat] ++
895,366 UART: [kat] sha1
899,618 UART: [kat] SHA2-256
901,558 UART: [kat] SHA2-384
904,483 UART: [kat] SHA2-512-ACC
906,384 UART: [kat] ECC-384
915,921 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,714 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,173,112 UART: [idev] ++
1,173,280 UART: [idev] CDI.KEYID = 6
1,173,641 UART: [idev] SUBJECT.KEYID = 7
1,174,066 UART: [idev] UDS.KEYID = 0
1,174,412 ready_for_fw is high
1,174,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,199,459 UART: [idev] Sha1 KeyId Algorithm
1,208,287 UART: [idev] --
1,209,314 UART: [ldev] ++
1,209,482 UART: [ldev] CDI.KEYID = 6
1,209,846 UART: [ldev] SUBJECT.KEYID = 5
1,210,273 UART: [ldev] AUTHORITY.KEYID = 7
1,210,736 UART: [ldev] FE.KEYID = 1
1,215,830 UART: [ldev] Erasing FE.KEYID = 1
1,242,367 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,436 UART: [ldev] --
1,281,729 UART: [fwproc] Wait for Commands...
1,282,322 UART: [fwproc] Recv command 0x46574c44
1,283,055 UART: [fwproc] Recv'd Img size: 118548 bytes
3,181,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,209,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,240,883 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,381,106 >>> mbox cmd response: success
3,382,230 UART: [afmc] ++
3,382,398 UART: [afmc] CDI.KEYID = 6
3,382,761 UART: [afmc] SUBJECT.KEYID = 7
3,383,187 UART: [afmc] AUTHORITY.KEYID = 5
3,418,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,435,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,435,766 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,441,473 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,447,350 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,453,060 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,460,788 UART: [afmc] --
3,461,725 UART: [cold-reset] --
3,462,777 UART: [state] Locking Datavault
3,464,108 UART: [state] Locking PCR0, PCR1 and PCR31
3,464,712 UART: [state] Locking ICCM
3,465,232 UART: [exit] Launching FMC @ 0x40000130
3,470,562 UART:
3,470,578 UART: Running Caliptra FMC ...
3,470,986 UART:
3,471,040 UART: [state] CFI Enabled
3,481,504 UART: [fht] FMC Alias Private Key: 7
3,600,614 UART: [art] Extend RT PCRs Done
3,601,042 UART: [art] Lock RT PCRs Done
3,602,336 UART: [art] Populate DV Done
3,610,513 UART: [fht] FMC Alias Private Key: 7
3,611,527 UART: [art] Derive CDI
3,611,807 UART: [art] Store in slot 0x4
3,697,670 UART: [art] Derive Key Pair
3,698,030 UART: [art] Store priv key in slot 0x5
3,710,892 UART: [art] Derive Key Pair - Done
3,725,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,741,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,742,166 UART: [art] PUB.X = 89BFED636DE92538F931B0F4C489C7CD5EA011295A9B4472843EFB9E4FB2AD29DBF72EAFF872B6BBE386B1B3F4BD60BA
3,748,960 UART: [art] PUB.Y = D22F06CE687588537E1206EFC3C7661CE5D56A5029348A9DA2F74AB115F57511AE38912EFC63B21DD205F817F3BFF7DB
3,755,909 UART: [art] SIG.R = FE275E8404AA01359BC4FEF2928213E137C877CF875B5C271135FE9A9BB48C80487F74C39FB8FCEC03C83874D1992C12
3,762,674 UART: [art] SIG.S = 7F4996B1E4F55EC970C200BD3184C04B97F8170239FD1E643B5CD514B6E12C0C4526069BB4781098B0D2612C3F60C8F7
3,786,775 UART: Caliptra RT
3,787,026 UART: [state] CFI Enabled
3,907,050 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,907,720 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,848 UART: [rt]cmd =0x41544d4e, len=14344
5,482,918 >>> mbox cmd response data (8 bytes)
5,482,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,512,476 UART: [rt]cmd =0x494e464f, len=4
5,516,328 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,612 ready_for_fw is high
1,059,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,230 >>> mbox cmd response: success
3,287,743 UART:
3,287,759 UART: Running Caliptra FMC ...
3,288,167 UART:
3,288,221 UART: [state] CFI Enabled
3,298,883 UART: [fht] FMC Alias Private Key: 7
3,417,773 UART: [art] Extend RT PCRs Done
3,418,201 UART: [art] Lock RT PCRs Done
3,420,127 UART: [art] Populate DV Done
3,428,298 UART: [fht] FMC Alias Private Key: 7
3,429,244 UART: [art] Derive CDI
3,429,524 UART: [art] Store in slot 0x4
3,514,777 UART: [art] Derive Key Pair
3,515,137 UART: [art] Store priv key in slot 0x5
3,527,971 UART: [art] Derive Key Pair - Done
3,542,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,048 UART: [art] PUB.X = 05273CD87C3F4A4414E0619632B467ED5CB1070EFE7DD7195B55272A5353D009FBF78DA473C4162C1C00136C15461E3B
3,565,782 UART: [art] PUB.Y = E8A00223D1578F50D9E420CA87AF5632EC11378D526E380B0B33D724EC51091B9A583BD1C94131348E05275991F9215E
3,572,709 UART: [art] SIG.R = DCE489B412C153972F27F9B06A5FA511AE8FA15EE11A72A8C9C19DC96CA4A3CB59EC125378D248E101E13DF11086361D
3,579,486 UART: [art] SIG.S = 607C83C00E7AD02001CDE7A9913BDC83B033C5E5E74650E4C4FE25117593ECF92D83AE97B67A9F39EC8FBC66D13C2D1D
3,603,244 UART: Caliptra RT
3,603,495 UART: [state] CFI Enabled
3,723,493 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,724,163 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,245 UART: [rt]cmd =0x41544d4e, len=14344
5,286,270 >>> mbox cmd response data (8 bytes)
5,286,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,315,304 UART: [rt]cmd =0x494e464f, len=4
5,319,020 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,444 UART: [state] WD Timer not started. Device not locked for debugging
87,565 UART: [kat] SHA2-256
891,115 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,219 UART: [kat] ++
895,371 UART: [kat] sha1
899,669 UART: [kat] SHA2-256
901,609 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,276 UART: [kat] HMAC-384Kdf
920,730 UART: [kat] LMS
1,169,042 UART: [kat] --
1,169,973 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,174,293 ready_for_fw is high
1,174,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,606 UART: [idev] Erasing UDS.KEYID = 0
1,199,610 UART: [idev] Sha1 KeyId Algorithm
1,208,530 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,173 UART: [ldev] SUBJECT.KEYID = 5
1,210,600 UART: [ldev] AUTHORITY.KEYID = 7
1,211,063 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,243,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,161 UART: [ldev] --
1,282,528 UART: [fwproc] Wait for Commands...
1,283,209 UART: [fwproc] Recv command 0x46574c44
1,283,942 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,206 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,381 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,692 >>> mbox cmd response: success
3,375,776 UART: [afmc] ++
3,375,944 UART: [afmc] CDI.KEYID = 6
3,376,307 UART: [afmc] SUBJECT.KEYID = 7
3,376,733 UART: [afmc] AUTHORITY.KEYID = 5
3,412,708 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,159 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,908 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,615 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,492 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,202 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,782 UART: [afmc] --
3,455,767 UART: [cold-reset] --
3,456,759 UART: [state] Locking Datavault
3,457,668 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,272 UART: [state] Locking ICCM
3,458,790 UART: [exit] Launching FMC @ 0x40000130
3,464,120 UART:
3,464,136 UART: Running Caliptra FMC ...
3,464,544 UART:
3,464,687 UART: [state] CFI Enabled
3,475,211 UART: [fht] FMC Alias Private Key: 7
3,594,199 UART: [art] Extend RT PCRs Done
3,594,627 UART: [art] Lock RT PCRs Done
3,596,161 UART: [art] Populate DV Done
3,604,250 UART: [fht] FMC Alias Private Key: 7
3,605,324 UART: [art] Derive CDI
3,605,604 UART: [art] Store in slot 0x4
3,691,233 UART: [art] Derive Key Pair
3,691,593 UART: [art] Store priv key in slot 0x5
3,704,755 UART: [art] Derive Key Pair - Done
3,719,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,844 UART: [art] PUB.X = 7B08FE9001397913D2C6836CA0B4632FC8ED3558E07772EDB150EE5091922DF51B7467773C7EF01741C6B95D4922DC5F
3,742,606 UART: [art] PUB.Y = 18E41ECEE690205B343C442C375710B939BFE03D28482D9BAE452EBE359F054BAC477B49FA24754F0DBA580A05C3767F
3,749,550 UART: [art] SIG.R = 8FE0F0D4412CAF52EAC3C2C90A6D1F461AE05972C57D1975298F2E4A61CD29532EACE717F19CDE4222F8B06827B93166
3,756,325 UART: [art] SIG.S = 900D2089F8A82CAACC3184488FF2322FCBB2812BF32D9C0A6008023E638324B09FBAFBCB393A62D88CC6021126F87626
3,779,872 UART: Caliptra RT
3,780,215 UART: [state] CFI Enabled
3,900,538 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,901,208 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,166 UART: [rt]cmd =0x41544d4e, len=14344
5,473,515 >>> mbox cmd response data (8 bytes)
5,473,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,502,959 UART: [rt]cmd =0x494e464f, len=4
5,506,775 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,433 ready_for_fw is high
1,059,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,472 >>> mbox cmd response: success
3,280,851 UART:
3,280,867 UART: Running Caliptra FMC ...
3,281,275 UART:
3,281,418 UART: [state] CFI Enabled
3,292,314 UART: [fht] FMC Alias Private Key: 7
3,411,046 UART: [art] Extend RT PCRs Done
3,411,474 UART: [art] Lock RT PCRs Done
3,412,932 UART: [art] Populate DV Done
3,420,947 UART: [fht] FMC Alias Private Key: 7
3,421,983 UART: [art] Derive CDI
3,422,263 UART: [art] Store in slot 0x4
3,508,300 UART: [art] Derive Key Pair
3,508,660 UART: [art] Store priv key in slot 0x5
3,522,136 UART: [art] Derive Key Pair - Done
3,536,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,511 UART: [art] PUB.X = 3767D582A6B150ED1C2B0450EAF68A3A9F7FA67023B92572EBAD4D851000D5E8E7DA6C3C9C132B726351B76F147B610B
3,560,259 UART: [art] PUB.Y = 98BD2C94C71C5ED9FCE275A0EE7644FC52BB0DA1B4950527EF9A283B0886961651639A4CD86CD9EB4D5351F39D772EB5
3,567,210 UART: [art] SIG.R = 9379F6F8A559CFA3154B11B35C8D15C81B20959A48A2BCA53609B18563DED062C732326EFFBD52BC3FFC1822B6AEBA2F
3,573,991 UART: [art] SIG.S = 53D507134FEF24714D6C44AC7EC13BDB84CF8552AF371B2FA44DCB8404167FF7A77DA67DF62FE79DD6FC9090B050DEA7
3,597,661 UART: Caliptra RT
3,598,004 UART: [state] CFI Enabled
3,718,272 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,718,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,744 UART: [rt]cmd =0x41544d4e, len=14344
5,288,632 >>> mbox cmd response data (8 bytes)
5,288,633 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,317,746 UART: [rt]cmd =0x494e464f, len=4
5,321,492 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,466 UART: [state] LifecycleState = Unprovisioned
86,121 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,051 UART: [kat] SHA2-256
903,991 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,222 UART: [kat] HMAC-384Kdf
922,790 UART: [kat] LMS
1,171,118 UART: [kat] --
1,171,919 UART: [cold-reset] ++
1,172,269 UART: [fht] FHT @ 0x50003400
1,174,806 UART: [idev] ++
1,174,974 UART: [idev] CDI.KEYID = 6
1,175,334 UART: [idev] SUBJECT.KEYID = 7
1,175,758 UART: [idev] UDS.KEYID = 0
1,176,103 ready_for_fw is high
1,176,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,201,441 UART: [idev] Sha1 KeyId Algorithm
1,209,847 UART: [idev] --
1,211,007 UART: [ldev] ++
1,211,175 UART: [ldev] CDI.KEYID = 6
1,211,538 UART: [ldev] SUBJECT.KEYID = 5
1,211,964 UART: [ldev] AUTHORITY.KEYID = 7
1,212,427 UART: [ldev] FE.KEYID = 1
1,217,729 UART: [ldev] Erasing FE.KEYID = 1
1,244,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,141 UART: [ldev] --
1,283,632 UART: [fwproc] Wait for Commands...
1,284,416 UART: [fwproc] Recv command 0x46574c44
1,285,144 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,842 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,165 >>> mbox cmd response: success
3,379,377 UART: [afmc] ++
3,379,545 UART: [afmc] CDI.KEYID = 6
3,379,907 UART: [afmc] SUBJECT.KEYID = 7
3,380,332 UART: [afmc] AUTHORITY.KEYID = 5
3,415,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,752 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,458 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,337 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,047 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,844 UART: [afmc] --
3,458,732 UART: [cold-reset] --
3,459,438 UART: [state] Locking Datavault
3,460,471 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,075 UART: [state] Locking ICCM
3,461,725 UART: [exit] Launching FMC @ 0x40000130
3,467,055 UART:
3,467,071 UART: Running Caliptra FMC ...
3,467,479 UART:
3,467,533 UART: [state] CFI Enabled
3,477,885 UART: [fht] FMC Alias Private Key: 7
3,597,775 UART: [art] Extend RT PCRs Done
3,598,203 UART: [art] Lock RT PCRs Done
3,599,779 UART: [art] Populate DV Done
3,607,782 UART: [fht] FMC Alias Private Key: 7
3,608,838 UART: [art] Derive CDI
3,609,118 UART: [art] Store in slot 0x4
3,694,827 UART: [art] Derive Key Pair
3,695,187 UART: [art] Store priv key in slot 0x5
3,708,843 UART: [art] Derive Key Pair - Done
3,723,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,001 UART: [art] PUB.X = 502E6BE5DE3ED6E908DABA590CEF21DDAAAF166FA5DA2D3941790A9B5C713C3FA8ACB8F8D4BAFDBC5AF4402116ABB49D
3,746,798 UART: [art] PUB.Y = FEE3C8CA3677C693C219452C1BFD00211131B1171EF7A21F06F48B13F815E829087A23E22F1F0457D66E5B3ED07D32A7
3,753,719 UART: [art] SIG.R = B19313E7EF3079ECA0F5ABAD5DF119B8A1A6A28CC9AE157AABB0055EFDD3F090F407E329AF8AD3A8787F009639CCC35C
3,760,485 UART: [art] SIG.S = 6EC03CA6341133FE0780CC5607B143664FD9E2C8A1E3505FE8FDD19866F20C06D04A2E95A6704955DF58CF2303A8D168
3,783,964 UART: Caliptra RT
3,784,215 UART: [state] CFI Enabled
3,903,407 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,904,077 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,121 UART: [rt]cmd =0x41544d4e, len=14344
5,460,716 >>> mbox cmd response data (8 bytes)
5,460,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,490,020 UART: [rt]cmd =0x494e464f, len=4
5,493,704 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,555 ready_for_fw is high
1,059,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,700 >>> mbox cmd response: success
3,284,261 UART:
3,284,277 UART: Running Caliptra FMC ...
3,284,685 UART:
3,284,739 UART: [state] CFI Enabled
3,294,951 UART: [fht] FMC Alias Private Key: 7
3,414,473 UART: [art] Extend RT PCRs Done
3,414,901 UART: [art] Lock RT PCRs Done
3,416,379 UART: [art] Populate DV Done
3,424,636 UART: [fht] FMC Alias Private Key: 7
3,425,638 UART: [art] Derive CDI
3,425,918 UART: [art] Store in slot 0x4
3,511,705 UART: [art] Derive Key Pair
3,512,065 UART: [art] Store priv key in slot 0x5
3,524,533 UART: [art] Derive Key Pair - Done
3,539,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,724 UART: [art] PUB.X = 5D13D2CE13C59FD3815FD3675A4EBC3C932E2426E0B0D1122509175885996A7AF0BB2C93266EAD97D2E2348AC2D5629A
3,562,495 UART: [art] PUB.Y = A92704364BAAFDB84EC46A67FF82BF044D9D1A8425AB9BAB55BDF5861769A73E2BE0D78D8459C4B07F5E20F050F4CA83
3,569,455 UART: [art] SIG.R = D75E23D38DFBFAD4C00FAD997E8DD14422E5D069A0CA94DC7E1CA7CB875F384E221C6AC681DEDA75B1184453610C2A89
3,576,237 UART: [art] SIG.S = 15CFC43F7CCE01907919CD8A2AF3D1E9E356DBF5F0FCA1C6497C14E85281740DEFE1E0C508B62AF968A4402CD4B5546B
3,599,786 UART: Caliptra RT
3,600,037 UART: [state] CFI Enabled
3,719,481 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,720,151 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,387 UART: [rt]cmd =0x41544d4e, len=14344
5,287,200 >>> mbox cmd response data (8 bytes)
5,287,201 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,316,522 UART: [rt]cmd =0x494e464f, len=4
5,320,358 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,777 UART: [state] LifecycleState = Unprovisioned
86,432 UART: [state] DebugLocked = No
86,920 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,153 UART: [kat] SHA2-512-ACC
909,054 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,327 UART: [kat] LMS
1,171,655 UART: [kat] --
1,172,656 UART: [cold-reset] ++
1,173,182 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 ready_for_fw is high
1,177,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,945 UART: [idev] Erasing UDS.KEYID = 0
1,202,042 UART: [idev] Sha1 KeyId Algorithm
1,210,726 UART: [idev] --
1,211,868 UART: [ldev] ++
1,212,036 UART: [ldev] CDI.KEYID = 6
1,212,399 UART: [ldev] SUBJECT.KEYID = 5
1,212,825 UART: [ldev] AUTHORITY.KEYID = 7
1,213,288 UART: [ldev] FE.KEYID = 1
1,218,102 UART: [ldev] Erasing FE.KEYID = 1
1,244,211 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,078 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,149 UART: [fwproc] Recv command 0x46574c44
1,284,877 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,103 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,482 >>> mbox cmd response: success
3,378,668 UART: [afmc] ++
3,378,836 UART: [afmc] CDI.KEYID = 6
3,379,198 UART: [afmc] SUBJECT.KEYID = 7
3,379,623 UART: [afmc] AUTHORITY.KEYID = 5
3,415,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,121 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,869 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,575 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,454 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,164 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,069 UART: [afmc] --
3,459,065 UART: [cold-reset] --
3,459,817 UART: [state] Locking Datavault
3,460,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,478 UART: [state] Locking ICCM
3,461,898 UART: [exit] Launching FMC @ 0x40000130
3,467,228 UART:
3,467,244 UART: Running Caliptra FMC ...
3,467,652 UART:
3,467,795 UART: [state] CFI Enabled
3,478,339 UART: [fht] FMC Alias Private Key: 7
3,597,631 UART: [art] Extend RT PCRs Done
3,598,059 UART: [art] Lock RT PCRs Done
3,599,503 UART: [art] Populate DV Done
3,607,794 UART: [fht] FMC Alias Private Key: 7
3,608,906 UART: [art] Derive CDI
3,609,186 UART: [art] Store in slot 0x4
3,695,197 UART: [art] Derive Key Pair
3,695,557 UART: [art] Store priv key in slot 0x5
3,709,399 UART: [art] Derive Key Pair - Done
3,724,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,740,009 UART: [art] PUB.X = 868FD073649467D008D14F6109168CE05DA6A4D15C21DCF0F3EEDFD7AE36C67C19E4DA8A22F3772717B0B7CDBCF5696E
3,746,787 UART: [art] PUB.Y = 4E5EE6B767D5C9B3173234A04ED2192EE7C141CBEA4C127DA7D1C6F8541909EF885657FE26C320E7F256952B4DDE2EDF
3,753,746 UART: [art] SIG.R = BAD1A3A947BD5B746FAE5C7A8C9BA10D55455AAF8D8D5C776259D348036B9572DA547CBE637922CE684476BD4F10992D
3,760,520 UART: [art] SIG.S = 1281943FC682CE47DC6DE766444265CF0DAE247C47E59FE99BFBCED8373F6E2414B2B4A1A47A24C063EC2B4FAB1E7658
3,785,469 UART: Caliptra RT
3,785,812 UART: [state] CFI Enabled
3,905,372 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,906,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,200 UART: [rt]cmd =0x41544d4e, len=14344
5,481,796 >>> mbox cmd response data (8 bytes)
5,481,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,511,314 UART: [rt]cmd =0x494e464f, len=4
5,515,084 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,632 ready_for_fw is high
1,060,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,128 >>> mbox cmd response: success
3,289,793 UART:
3,289,809 UART: Running Caliptra FMC ...
3,290,217 UART:
3,290,360 UART: [state] CFI Enabled
3,300,790 UART: [fht] FMC Alias Private Key: 7
3,419,616 UART: [art] Extend RT PCRs Done
3,420,044 UART: [art] Lock RT PCRs Done
3,421,612 UART: [art] Populate DV Done
3,429,827 UART: [fht] FMC Alias Private Key: 7
3,430,987 UART: [art] Derive CDI
3,431,267 UART: [art] Store in slot 0x4
3,517,098 UART: [art] Derive Key Pair
3,517,458 UART: [art] Store priv key in slot 0x5
3,530,850 UART: [art] Derive Key Pair - Done
3,545,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,299 UART: [art] PUB.X = D7DF7721CB70626151D267651E76EAE107E9DDE791B0B6995F226914275ECDA14B9B92454FD1596A9232FF878F7D64E8
3,569,066 UART: [art] PUB.Y = 5707D0C64E76CCF69837D91E38536C94672F3EB6F40EBE03B62C07294EE54FF0D08F47AF4B0E37F8A497E26D57147216
3,576,003 UART: [art] SIG.R = EB0A1E4667871BBADD6EB4D0EB1DA7CFEE134121915ACE3DB07471BB300C1341806C6DF314D79BCDE439080FCF419398
3,582,777 UART: [art] SIG.S = 530A15F19083FEAA7F0C3F1783F9EDF20C39D6D30B698D17EB9B919449180FA9F69307AF04A752657848654A524CCDE8
3,605,790 UART: Caliptra RT
3,606,133 UART: [state] CFI Enabled
3,725,935 UART: [rt] RT listening for mailbox commands...
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
3,726,605 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,831 UART: [rt]cmd =0x41544d4e, len=14344
5,296,313 >>> mbox cmd response data (8 bytes)
5,296,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,325,531 UART: [rt]cmd =0x494e464f, len=4
5,329,089 >>> mbox cmd response data (312 bytes)
test test_set_auth_manifest::test_set_auth_manifest_fw_info_digest ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,111 UART:
192,474 UART: Running Caliptra ROM ...
193,677 UART:
193,844 UART: [state] CFI Enabled
262,843 UART: [state] LifecycleState = Unprovisioned
264,787 UART: [state] DebugLocked = No
266,973 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,335 UART: [kat] SHA2-256
442,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,528 UART: [kat] ++
453,011 UART: [kat] sha1
464,395 UART: [kat] SHA2-256
467,128 UART: [kat] SHA2-384
471,983 UART: [kat] SHA2-512-ACC
474,347 UART: [kat] ECC-384
2,767,132 UART: [kat] HMAC-384Kdf
2,799,346 UART: [kat] LMS
3,989,669 UART: [kat] --
3,995,537 UART: [cold-reset] ++
3,998,182 UART: [fht] Storing FHT @ 0x50003400
4,009,514 UART: [idev] ++
4,010,091 UART: [idev] CDI.KEYID = 6
4,011,008 UART: [idev] SUBJECT.KEYID = 7
4,012,256 UART: [idev] UDS.KEYID = 0
4,013,325 ready_for_fw is high
4,013,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,688 UART: [idev] Erasing UDS.KEYID = 0
7,346,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,368 UART: [idev] --
7,372,063 UART: [ldev] ++
7,372,634 UART: [ldev] CDI.KEYID = 6
7,373,599 UART: [ldev] SUBJECT.KEYID = 5
7,374,815 UART: [ldev] AUTHORITY.KEYID = 7
7,376,102 UART: [ldev] FE.KEYID = 1
7,422,751 UART: [ldev] Erasing FE.KEYID = 1
10,754,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,080 UART: [ldev] --
13,118,431 UART: [fwproc] Waiting for Commands...
13,121,032 UART: [fwproc] Received command 0x46574c44
13,123,275 UART: [fwproc] Received Image of size 118548 bytes
22,056,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,136,780 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,209,902 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,538,704 >>> mbox cmd response: success
22,542,705 UART: [afmc] ++
22,543,325 UART: [afmc] CDI.KEYID = 6
22,544,216 UART: [afmc] SUBJECT.KEYID = 7
22,545,490 UART: [afmc] AUTHORITY.KEYID = 5
25,912,487 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,209,906 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,212,164 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,226,628 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,241,457 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,255,846 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,277,750 UART: [afmc] --
28,280,861 UART: [cold-reset] --
28,285,582 UART: [state] Locking Datavault
28,290,659 UART: [state] Locking PCR0, PCR1 and PCR31
28,292,424 UART: [state] Locking ICCM
28,293,853 UART: [exit] Launching FMC @ 0x40000130
28,302,254 UART:
28,302,487 UART: Running Caliptra FMC ...
28,303,511 UART:
28,303,657 UART: [state] CFI Enabled
28,370,127 UART: [fht] FMC Alias Private Key: 7
30,709,928 UART: [art] Extend RT PCRs Done
30,711,139 UART: [art] Lock RT PCRs Done
30,713,003 UART: [art] Populate DV Done
30,718,522 UART: [fht] FMC Alias Private Key: 7
30,720,216 UART: [art] Derive CDI
30,720,973 UART: [art] Store in slot 0x4
30,777,661 UART: [art] Derive Key Pair
30,778,712 UART: [art] Store priv key in slot 0x5
34,071,505 UART: [art] Derive Key Pair - Done
34,084,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,371,725 UART: [art] Erasing AUTHORITY.KEYID = 7
36,373,227 UART: [art] PUB.X = CAFC179B83C8405EBAA11C7C1682BBABEA81F8D2B2B8F06676B110C09A8D76C94E6B585B20E015222022CE0432AA0684
36,380,519 UART: [art] PUB.Y = 5B6FFCFC674C1AB56A88A987033EDFDAE57B0EF4ACE873808401EA1C7C9D995345561E0C3FE6A6D8A63F604DFC0F5735
36,387,802 UART: [art] SIG.R = 4EAF69BDA48A1A3AF3B79644E0C9FE089EEAC324B644E827C1305625B4C38644CA2F204511FEB2335F444A54F34803CE
36,395,190 UART: [art] SIG.S = 32717E9378B9CF9CD23F0A31BE367BDAB9AFEC650BF29BFC9CA3E2F4911259339AE9B683F07C85FDD67869B40B16B87C
37,700,235 UART: Caliptra RT
37,700,943 UART: [state] CFI Enabled
37,876,223 UART: [rt] RT listening for mailbox commands...
37,878,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,033,985 UART: [rt]cmd =0x41544d4e, len=14344
42,280,866 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,807,916 ready_for_fw is high
3,808,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,170,220 >>> mbox cmd response: success
27,874,371 UART:
27,874,770 UART: Running Caliptra FMC ...
27,875,891 UART:
27,876,046 UART: [state] CFI Enabled
27,942,630 UART: [fht] FMC Alias Private Key: 7
30,282,774 UART: [art] Extend RT PCRs Done
30,284,002 UART: [art] Lock RT PCRs Done
30,285,605 UART: [art] Populate DV Done
30,291,289 UART: [fht] FMC Alias Private Key: 7
30,292,988 UART: [art] Derive CDI
30,293,802 UART: [art] Store in slot 0x4
30,350,792 UART: [art] Derive Key Pair
30,351,995 UART: [art] Store priv key in slot 0x5
33,643,903 UART: [art] Derive Key Pair - Done
33,656,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,946,111 UART: [art] Erasing AUTHORITY.KEYID = 7
35,947,640 UART: [art] PUB.X = 6EE9C878D1215E1ABBE8B5E54ABF560BF6487F7737F11B0A76A2B325C70C88713CED44F5FB04889AF60AB81227D3382C
35,954,915 UART: [art] PUB.Y = F04D6AFA733FF0CDCB83D5544A965577F35AC5A52201D4FB1F46EB6651EE69284FB5F492C4B0504C1C85A9BA199B49BF
35,962,131 UART: [art] SIG.R = 8D856EFEB1ED451ADF15D8BBA344DFB8FF6B5B581B5FFA0FC40DD1CB0908936CF44A8ADD1E4B848D028DB6B2ED9D3446
35,969,583 UART: [art] SIG.S = FDDA0E85B6E96F28C5C5224B090C9DA4981A087A3F5E73A4806C4046DBC8A4A5C01DE6FF85A43D66A5034B0126623456
37,275,084 UART: Caliptra RT
37,275,796 UART: [state] CFI Enabled
37,471,677 UART: [rt] RT listening for mailbox commands...
37,473,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,629,436 UART: [rt]cmd =0x41544d4e, len=14344
41,953,165 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
192,367 UART:
192,734 UART: Running Caliptra ROM ...
193,862 UART:
603,690 UART: [state] CFI Enabled
617,742 UART: [state] LifecycleState = Unprovisioned
619,727 UART: [state] DebugLocked = No
621,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,812 UART: [kat] SHA2-256
796,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,144 UART: [kat] ++
807,672 UART: [kat] sha1
819,542 UART: [kat] SHA2-256
822,184 UART: [kat] SHA2-384
827,947 UART: [kat] SHA2-512-ACC
830,317 UART: [kat] ECC-384
3,115,490 UART: [kat] HMAC-384Kdf
3,127,434 UART: [kat] LMS
4,317,537 UART: [kat] --
4,320,848 UART: [cold-reset] ++
4,323,488 UART: [fht] Storing FHT @ 0x50003400
4,335,740 UART: [idev] ++
4,336,305 UART: [idev] CDI.KEYID = 6
4,337,282 UART: [idev] SUBJECT.KEYID = 7
4,338,519 UART: [idev] UDS.KEYID = 0
4,339,605 ready_for_fw is high
4,339,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,689 UART: [idev] Erasing UDS.KEYID = 0
7,628,145 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,153 UART: [idev] --
7,653,852 UART: [ldev] ++
7,654,425 UART: [ldev] CDI.KEYID = 6
7,655,383 UART: [ldev] SUBJECT.KEYID = 5
7,656,590 UART: [ldev] AUTHORITY.KEYID = 7
7,657,876 UART: [ldev] FE.KEYID = 1
7,671,159 UART: [ldev] Erasing FE.KEYID = 1
10,961,901 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,895 UART: [ldev] --
13,319,126 UART: [fwproc] Waiting for Commands...
13,320,946 UART: [fwproc] Received command 0x46574c44
13,323,176 UART: [fwproc] Received Image of size 118548 bytes
22,410,739 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,487,144 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,560,305 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,888,287 >>> mbox cmd response: success
22,893,229 UART: [afmc] ++
22,893,854 UART: [afmc] CDI.KEYID = 6
22,894,764 UART: [afmc] SUBJECT.KEYID = 7
22,895,977 UART: [afmc] AUTHORITY.KEYID = 5
26,212,762 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,506,561 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,508,813 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,523,280 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,538,114 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,552,471 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,574,250 UART: [afmc] --
28,577,525 UART: [cold-reset] --
28,581,275 UART: [state] Locking Datavault
28,586,627 UART: [state] Locking PCR0, PCR1 and PCR31
28,588,318 UART: [state] Locking ICCM
28,589,687 UART: [exit] Launching FMC @ 0x40000130
28,598,076 UART:
28,598,312 UART: Running Caliptra FMC ...
28,599,406 UART:
28,599,558 UART: [state] CFI Enabled
28,608,042 UART: [fht] FMC Alias Private Key: 7
30,947,994 UART: [art] Extend RT PCRs Done
30,949,228 UART: [art] Lock RT PCRs Done
30,951,053 UART: [art] Populate DV Done
30,956,484 UART: [fht] FMC Alias Private Key: 7
30,958,126 UART: [art] Derive CDI
30,958,854 UART: [art] Store in slot 0x4
31,001,766 UART: [art] Derive Key Pair
31,002,764 UART: [art] Store priv key in slot 0x5
34,245,067 UART: [art] Derive Key Pair - Done
34,257,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,537,779 UART: [art] Erasing AUTHORITY.KEYID = 7
36,539,284 UART: [art] PUB.X = FC41D782B5DF76BE309E3BFE9F74D1A7262189179C5652C1EF944328CCBA442A3310B5D4C3DA6623497DCBC28E73DC88
36,546,530 UART: [art] PUB.Y = 53E8ABB10B749B455D51C0D79A6446146DCE1A51710324A6ABD06B3E5B6340B09CF535FAFCA0EBA9DB617F8186C0EBFA
36,553,856 UART: [art] SIG.R = 428D178A7C2DD84BFC8FD44268A984C001C6469009B0CD3F05BAE625B746C69FD00CC8D4500E11603E453A734E81C883
36,561,237 UART: [art] SIG.S = 6D980CC2DC55F378CBC709AEF195B73319CA5BFC72F758F14A68CBD0FC526681EE8B38E3147DBD850A3485BF249E95AB
37,866,080 UART: Caliptra RT
37,866,778 UART: [state] CFI Enabled
38,001,454 UART: [rt] RT listening for mailbox commands...
38,003,823 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,159,160 UART: [rt]cmd =0x41544d4e, len=14344
42,327,469 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,126,789 ready_for_fw is high
4,127,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,069,021 >>> mbox cmd response: success
27,705,281 UART:
27,705,705 UART: Running Caliptra FMC ...
27,706,839 UART:
27,706,998 UART: [state] CFI Enabled
27,714,993 UART: [fht] FMC Alias Private Key: 7
30,054,649 UART: [art] Extend RT PCRs Done
30,055,889 UART: [art] Lock RT PCRs Done
30,057,369 UART: [art] Populate DV Done
30,062,563 UART: [fht] FMC Alias Private Key: 7
30,064,061 UART: [art] Derive CDI
30,064,823 UART: [art] Store in slot 0x4
30,107,688 UART: [art] Derive Key Pair
30,108,733 UART: [art] Store priv key in slot 0x5
33,350,785 UART: [art] Derive Key Pair - Done
33,363,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,644,322 UART: [art] Erasing AUTHORITY.KEYID = 7
35,645,830 UART: [art] PUB.X = 9697F9EB1929E4590B83569D14D666CAD8B4625790D4D55DF08A7FC8031136D499E1F3EA39E5E9F6E1C0E40838F4FA0A
35,653,084 UART: [art] PUB.Y = 15E33E99D61A68DAB3ACA4ACB6AFA84CB03C0166AD07196D17D6F5C3251FE0982D73F3766AB3D3FBFB20946943F7DE4F
35,660,344 UART: [art] SIG.R = C5EB42FC37F5493D1DDBDBC5D0DF3A32D36CF8CB96FDE1BE2398F74E9FB398EB774EAF3BB9E0ED0BF3960916F6722197
35,667,797 UART: [art] SIG.S = 1411FCA324AA6B593B7480546775C00C7793793E84A7A02335A93B6F74FDCED3D3D7C194F835FA565F85F8B36E66FE38
36,973,297 UART: Caliptra RT
36,974,005 UART: [state] CFI Enabled
37,106,932 UART: [rt] RT listening for mailbox commands...
37,109,255 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,264,506 UART: [rt]cmd =0x41544d4e, len=14344
41,432,910 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
192,013 UART:
192,376 UART: Running Caliptra ROM ...
193,521 UART:
193,663 UART: [state] CFI Enabled
264,641 UART: [state] LifecycleState = Unprovisioned
266,555 UART: [state] DebugLocked = No
269,442 UART: [state] WD Timer not started. Device not locked for debugging
273,041 UART: [kat] SHA2-256
452,726 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,484 UART: [kat] ++
463,928 UART: [kat] sha1
475,153 UART: [kat] SHA2-256
477,881 UART: [kat] SHA2-384
483,797 UART: [kat] SHA2-512-ACC
486,193 UART: [kat] ECC-384
2,950,764 UART: [kat] HMAC-384Kdf
2,973,502 UART: [kat] LMS
3,449,972 UART: [kat] --
3,453,974 UART: [cold-reset] ++
3,455,200 UART: [fht] FHT @ 0x50003400
3,465,890 UART: [idev] ++
3,466,449 UART: [idev] CDI.KEYID = 6
3,467,481 UART: [idev] SUBJECT.KEYID = 7
3,468,648 UART: [idev] UDS.KEYID = 0
3,469,638 ready_for_fw is high
3,469,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,038 UART: [idev] Erasing UDS.KEYID = 0
5,988,741 UART: [idev] Sha1 KeyId Algorithm
6,012,013 UART: [idev] --
6,016,370 UART: [ldev] ++
6,016,996 UART: [ldev] CDI.KEYID = 6
6,017,880 UART: [ldev] SUBJECT.KEYID = 5
6,019,091 UART: [ldev] AUTHORITY.KEYID = 7
6,020,379 UART: [ldev] FE.KEYID = 1
6,059,245 UART: [ldev] Erasing FE.KEYID = 1
8,568,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,322 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,313 UART: [ldev] --
10,375,808 UART: [fwproc] Wait for Commands...
10,378,446 UART: [fwproc] Recv command 0x46574c44
10,380,480 UART: [fwproc] Recv'd Img size: 118548 bytes
14,925,415 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,010,462 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,083,524 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,412,121 >>> mbox cmd response: success
15,416,523 UART: [afmc] ++
15,417,108 UART: [afmc] CDI.KEYID = 6
15,418,045 UART: [afmc] SUBJECT.KEYID = 7
15,419,259 UART: [afmc] AUTHORITY.KEYID = 5
17,962,230 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,707,652 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,709,875 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,725,705 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,741,627 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,757,355 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,781,908 UART: [afmc] --
19,785,299 UART: [cold-reset] --
19,788,558 UART: [state] Locking Datavault
19,793,799 UART: [state] Locking PCR0, PCR1 and PCR31
19,795,495 UART: [state] Locking ICCM
19,796,671 UART: [exit] Launching FMC @ 0x40000130
19,805,062 UART:
19,805,301 UART: Running Caliptra FMC ...
19,806,397 UART:
19,806,551 UART: [state] CFI Enabled
19,863,011 UART: [fht] FMC Alias Private Key: 7
21,628,960 UART: [art] Extend RT PCRs Done
21,630,160 UART: [art] Lock RT PCRs Done
21,631,637 UART: [art] Populate DV Done
21,636,833 UART: [fht] FMC Alias Private Key: 7
21,638,446 UART: [art] Derive CDI
21,639,256 UART: [art] Store in slot 0x4
21,695,546 UART: [art] Derive Key Pair
21,696,602 UART: [art] Store priv key in slot 0x5
24,159,585 UART: [art] Derive Key Pair - Done
24,172,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,884,819 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,321 UART: [art] PUB.X = 26ABDD1884DFB42A99607D1366EBFACE151B69F47ED936284386175511F9BEA3FCF7D873915E3CAACBC5BC9F3FDAFE59
25,893,626 UART: [art] PUB.Y = 1FB5CE74EA4F3697F3D5E36B089B37B6FDBD6E4B0B43690009DFE6176AD70E72E27A30FDA4B9CFDFC636896229812068
25,900,912 UART: [art] SIG.R = 7E67AB13DED7223B622E06B20467180CE49E13ED2D477631BF8DAA22D237A2BEB073DD1730D1152AC1E41864C3BCA0CA
25,908,303 UART: [art] SIG.S = 960D1639EE1592B7AEAADDFDCF3FE990B16D4594B2DF02B07BC1BC589D412F1993F9D34AF913E4431375C2F0A77B6D82
26,887,196 UART: Caliptra RT
26,887,884 UART: [state] CFI Enabled
27,069,438 UART: [rt] RT listening for mailbox commands...
27,071,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,937 UART: [rt]cmd =0x41544d4e, len=14344
29,616,483 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,457,673 ready_for_fw is high
3,458,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,414,009 >>> mbox cmd response: success
19,706,873 UART:
19,707,272 UART: Running Caliptra FMC ...
19,708,410 UART:
19,708,567 UART: [state] CFI Enabled
19,777,063 UART: [fht] FMC Alias Private Key: 7
21,542,879 UART: [art] Extend RT PCRs Done
21,544,107 UART: [art] Lock RT PCRs Done
21,545,733 UART: [art] Populate DV Done
21,551,105 UART: [fht] FMC Alias Private Key: 7
21,552,683 UART: [art] Derive CDI
21,553,511 UART: [art] Store in slot 0x4
21,609,905 UART: [art] Derive Key Pair
21,610,905 UART: [art] Store priv key in slot 0x5
24,074,442 UART: [art] Derive Key Pair - Done
24,087,463 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,799,781 UART: [art] Erasing AUTHORITY.KEYID = 7
25,801,294 UART: [art] PUB.X = FE751A35C4989637E4DFCF38EC5EFED087CA91AA67EB5DDBD3B53A20E2362BBDBD1FF8CA568C46F5A23768595E225A44
25,808,555 UART: [art] PUB.Y = FDC6CD001FF9B8A77A50E48BA4726FF8BDB0818D03D26D9BA1794035F71A46FFBBDF1851F67599C5190EA9960D4CDAF5
25,815,857 UART: [art] SIG.R = 549B21FBDBDA40C57FA9EC7EBEB2CE0FA3C9B1C4C671685A518854BB30845B357415CF43CF005A3E577AC17FF015EB07
25,823,203 UART: [art] SIG.S = 855BDFDB15953F4BC4D93E37D64122514175FD5F624C92CF16C2D29F55853C169F2E467F930E1C99968D5FB09BEAAB6C
26,802,157 UART: Caliptra RT
26,802,873 UART: [state] CFI Enabled
26,983,425 UART: [rt] RT listening for mailbox commands...
26,985,961 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,141,505 UART: [rt]cmd =0x41544d4e, len=14344
29,524,263 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,448 UART:
192,816 UART: Running Caliptra ROM ...
193,973 UART:
603,831 UART: [state] CFI Enabled
619,834 UART: [state] LifecycleState = Unprovisioned
621,776 UART: [state] DebugLocked = No
623,591 UART: [state] WD Timer not started. Device not locked for debugging
626,627 UART: [kat] SHA2-256
806,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,064 UART: [kat] ++
817,547 UART: [kat] sha1
829,326 UART: [kat] SHA2-256
832,091 UART: [kat] SHA2-384
838,314 UART: [kat] SHA2-512-ACC
840,632 UART: [kat] ECC-384
3,280,913 UART: [kat] HMAC-384Kdf
3,293,701 UART: [kat] LMS
3,770,199 UART: [kat] --
3,774,843 UART: [cold-reset] ++
3,776,557 UART: [fht] FHT @ 0x50003400
3,789,249 UART: [idev] ++
3,789,852 UART: [idev] CDI.KEYID = 6
3,790,738 UART: [idev] SUBJECT.KEYID = 7
3,792,055 UART: [idev] UDS.KEYID = 0
3,792,959 ready_for_fw is high
3,793,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,900 UART: [idev] Erasing UDS.KEYID = 0
6,271,664 UART: [idev] Sha1 KeyId Algorithm
6,295,430 UART: [idev] --
6,299,263 UART: [ldev] ++
6,299,908 UART: [ldev] CDI.KEYID = 6
6,300,820 UART: [ldev] SUBJECT.KEYID = 5
6,301,977 UART: [ldev] AUTHORITY.KEYID = 7
6,303,264 UART: [ldev] FE.KEYID = 1
6,315,044 UART: [ldev] Erasing FE.KEYID = 1
8,796,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,474 UART: [ldev] --
10,592,228 UART: [fwproc] Wait for Commands...
10,594,301 UART: [fwproc] Recv command 0x46574c44
10,596,294 UART: [fwproc] Recv'd Img size: 118548 bytes
15,125,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,214,426 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,287,399 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,615,920 >>> mbox cmd response: success
15,620,200 UART: [afmc] ++
15,620,813 UART: [afmc] CDI.KEYID = 6
15,621,730 UART: [afmc] SUBJECT.KEYID = 7
15,622,948 UART: [afmc] AUTHORITY.KEYID = 5
18,129,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,849,998 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,852,187 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,868,070 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,883,988 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,899,699 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,924,121 UART: [afmc] --
19,927,556 UART: [cold-reset] --
19,933,040 UART: [state] Locking Datavault
19,937,481 UART: [state] Locking PCR0, PCR1 and PCR31
19,939,210 UART: [state] Locking ICCM
19,940,934 UART: [exit] Launching FMC @ 0x40000130
19,949,340 UART:
19,949,621 UART: Running Caliptra FMC ...
19,950,733 UART:
19,950,890 UART: [state] CFI Enabled
19,959,209 UART: [fht] FMC Alias Private Key: 7
21,724,862 UART: [art] Extend RT PCRs Done
21,726,081 UART: [art] Lock RT PCRs Done
21,727,656 UART: [art] Populate DV Done
21,733,180 UART: [fht] FMC Alias Private Key: 7
21,734,670 UART: [art] Derive CDI
21,735,434 UART: [art] Store in slot 0x4
21,777,973 UART: [art] Derive Key Pair
21,778,979 UART: [art] Store priv key in slot 0x5
24,206,319 UART: [art] Derive Key Pair - Done
24,219,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,926,075 UART: [art] Erasing AUTHORITY.KEYID = 7
25,927,587 UART: [art] PUB.X = 6CA1118BC307CFE804F8CEF55C3BC35D5AC28AE9F4CD3FEA327478B9BFD11AAC480D1A4104AEE96E81E3E8228226D1F4
25,934,834 UART: [art] PUB.Y = 9399A3320571F3490E902E2C580D62B790D4131396F2C63A35358601974F87E7E1B735DC8B06D0C65DDA019EB03D6EA6
25,942,066 UART: [art] SIG.R = 502ED341BB7F88A707CD88FCD778471BE84C32580F89EA99A9C4A98569E9B0EAE633A16D9AB3F7D780B6720CE25A000D
25,949,549 UART: [art] SIG.S = C05DF95EBC62C966B5345940558A001112F04945CD3DB8E19D0182AB35450E89EA67272A39BECCBD6A397593D81F9393
26,928,187 UART: Caliptra RT
26,928,891 UART: [state] CFI Enabled
27,061,778 UART: [rt] RT listening for mailbox commands...
27,064,094 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,219,809 UART: [rt]cmd =0x41544d4e, len=14344
29,614,125 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,781,311 ready_for_fw is high
3,781,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,572,804 >>> mbox cmd response: success
19,826,349 UART:
19,826,752 UART: Running Caliptra FMC ...
19,827,870 UART:
19,828,026 UART: [state] CFI Enabled
19,836,151 UART: [fht] FMC Alias Private Key: 7
21,601,941 UART: [art] Extend RT PCRs Done
21,603,165 UART: [art] Lock RT PCRs Done
21,604,979 UART: [art] Populate DV Done
21,610,246 UART: [fht] FMC Alias Private Key: 7
21,612,004 UART: [art] Derive CDI
21,612,750 UART: [art] Store in slot 0x4
21,655,317 UART: [art] Derive Key Pair
21,656,325 UART: [art] Store priv key in slot 0x5
24,083,325 UART: [art] Derive Key Pair - Done
24,096,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,803,202 UART: [art] Erasing AUTHORITY.KEYID = 7
25,804,700 UART: [art] PUB.X = 40D520E3C198DAC2844301BD05A8BC1B9959B87DAAD18D00533C4072960A07D3F0748E5D2CEC06DEE69C48E4D34A7489
25,811,952 UART: [art] PUB.Y = F75D8F206CD390759076B0BD7CD5E12FED972122759A8D841CFBC0D249E21574E65484692D167DA74261A4E5297C6B06
25,819,206 UART: [art] SIG.R = 51F8E7948A48D2FB021FB66F8C134AE23D4E75C85EB58384E525351D4E54E6B77366CAF636D8E5B5F147D5145C4AED37
25,826,614 UART: [art] SIG.S = 5B61D67DED67F69A15C8DEA04CAC99A60DA02D56EC4206195BD3C6C5DFDB5C90CAB32BF5AA14FC01D8AB8AA897C8CBF2
26,804,646 UART: Caliptra RT
26,805,351 UART: [state] CFI Enabled
26,938,403 UART: [rt] RT listening for mailbox commands...
26,940,694 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,096,175 UART: [rt]cmd =0x41544d4e, len=14344
29,479,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,040 UART:
192,408 UART: Running Caliptra ROM ...
193,551 UART:
193,700 UART: [state] CFI Enabled
264,196 UART: [state] LifecycleState = Unprovisioned
266,593 UART: [state] DebugLocked = No
269,473 UART: [state] WD Timer not started. Device not locked for debugging
274,726 UART: [kat] SHA2-256
464,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,400 UART: [kat] ++
475,872 UART: [kat] sha1
488,373 UART: [kat] SHA2-256
491,378 UART: [kat] SHA2-384
497,434 UART: [kat] SHA2-512-ACC
500,007 UART: [kat] ECC-384
2,949,279 UART: [kat] HMAC-384Kdf
2,972,247 UART: [kat] LMS
3,503,974 UART: [kat] --
3,507,990 UART: [cold-reset] ++
3,509,924 UART: [fht] FHT @ 0x50003400
3,521,392 UART: [idev] ++
3,522,101 UART: [idev] CDI.KEYID = 6
3,523,004 UART: [idev] SUBJECT.KEYID = 7
3,524,270 UART: [idev] UDS.KEYID = 0
3,525,245 ready_for_fw is high
3,525,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,600 UART: [idev] Erasing UDS.KEYID = 0
6,027,826 UART: [idev] Sha1 KeyId Algorithm
6,049,989 UART: [idev] --
6,054,456 UART: [ldev] ++
6,055,144 UART: [ldev] CDI.KEYID = 6
6,056,052 UART: [ldev] SUBJECT.KEYID = 5
6,057,263 UART: [ldev] AUTHORITY.KEYID = 7
6,058,489 UART: [ldev] FE.KEYID = 1
6,100,456 UART: [ldev] Erasing FE.KEYID = 1
8,606,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,516 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,377 UART: [ldev] --
10,412,687 UART: [fwproc] Wait for Commands...
10,414,992 UART: [fwproc] Recv command 0x46574c44
10,417,297 UART: [fwproc] Recv'd Img size: 118548 bytes
15,092,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,175,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,299,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,860,331 >>> mbox cmd response: success
15,864,988 UART: [afmc] ++
15,865,712 UART: [afmc] CDI.KEYID = 6
15,866,906 UART: [afmc] SUBJECT.KEYID = 7
15,868,354 UART: [afmc] AUTHORITY.KEYID = 5
18,409,165 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,133,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,135,720 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,150,791 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,166,043 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,181,077 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,203,980 UART: [afmc] --
20,207,658 UART: [cold-reset] --
20,210,882 UART: [state] Locking Datavault
20,216,567 UART: [state] Locking PCR0, PCR1 and PCR31
20,218,764 UART: [state] Locking ICCM
20,219,883 UART: [exit] Launching FMC @ 0x40000130
20,228,557 UART:
20,228,791 UART: Running Caliptra FMC ...
20,229,887 UART:
20,230,042 UART: [state] CFI Enabled
20,291,594 UART: [fht] FMC Alias Private Key: 7
22,079,286 UART: [art] Extend RT PCRs Done
22,080,514 UART: [art] Lock RT PCRs Done
22,082,483 UART: [art] Populate DV Done
22,087,946 UART: [fht] FMC Alias Private Key: 7
22,089,646 UART: [art] Derive CDI
22,090,460 UART: [art] Store in slot 0x4
22,145,449 UART: [art] Derive Key Pair
22,146,488 UART: [art] Store priv key in slot 0x5
24,609,518 UART: [art] Derive Key Pair - Done
24,622,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,335,629 UART: [art] Erasing AUTHORITY.KEYID = 7
26,337,171 UART: [art] PUB.X = 4A6270BBF4BE17DD553D859879029C6FADEEFDEFA41F7AF893D8A0A57DF5356174967994021E676EA5152B1B8398D071
26,344,380 UART: [art] PUB.Y = 37BCACA5869BFE7956EA96ACF800F3DA41ECA0841A959D1246D4289DD0DFCEE3F738C4418A840D4542E8CA31C2962DC3
26,351,618 UART: [art] SIG.R = 773550C15888F5F4C4B5F3EC8E1C2EFFA9A5077BB050B3E88C50FBAF8F1A04F91FFA293CD4D5D1E3D8BC98545F75BFDF
26,359,028 UART: [art] SIG.S = FE571C31A7A98F1DAB9A54E0631E114B7DE722299C1A49FCEA3FA8B2E3E452CB8B369DB3E7A1EB901C9DDC69BF38323C
27,337,849 UART: Caliptra RT
27,338,535 UART: [state] CFI Enabled
27,519,993 UART: [rt] RT listening for mailbox commands...
27,522,317 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,853 UART: [rt]cmd =0x41544d4e, len=14344
30,069,458 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,419,192 ready_for_fw is high
3,419,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,899,478 >>> mbox cmd response: success
20,175,002 UART:
20,175,412 UART: Running Caliptra FMC ...
20,176,523 UART:
20,176,674 UART: [state] CFI Enabled
20,244,071 UART: [fht] FMC Alias Private Key: 7
22,010,222 UART: [art] Extend RT PCRs Done
22,011,451 UART: [art] Lock RT PCRs Done
22,013,430 UART: [art] Populate DV Done
22,018,949 UART: [fht] FMC Alias Private Key: 7
22,020,538 UART: [art] Derive CDI
22,021,274 UART: [art] Store in slot 0x4
22,076,974 UART: [art] Derive Key Pair
22,078,018 UART: [art] Store priv key in slot 0x5
24,541,278 UART: [art] Derive Key Pair - Done
24,554,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,266,921 UART: [art] Erasing AUTHORITY.KEYID = 7
26,268,427 UART: [art] PUB.X = 5A0F816981024C50A7AEBD81D9E7EB5C6ACC553CFD6D375D5EFBA0B66A9A078C35562748C4AF05E3B965EB06AAD322F9
26,275,721 UART: [art] PUB.Y = CCB823EB85E5F65F8DBF2AA4A7409499AA80CFF466610EEB75818ADB320DB86F561171ABCE15D151F948CC234FFE636A
26,282,976 UART: [art] SIG.R = 0C840BA293837863EB2071EC58740B49DD47D0650C1842BFE4EBA184A2BEBD1C5E6B6B34B2F8772FD85096528434C8F5
26,290,369 UART: [art] SIG.S = 2EB6E4A4FB028EE5BCC6F1D88FC5562CA19090841171F2CB745E973D710123335E6976CF2A5B608A8DF47A43BEBE0B7E
27,269,202 UART: Caliptra RT
27,269,889 UART: [state] CFI Enabled
27,450,237 UART: [rt] RT listening for mailbox commands...
27,452,523 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,722 UART: [rt]cmd =0x41544d4e, len=14344
29,998,700 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,681 UART:
193,056 UART: Running Caliptra ROM ...
194,256 UART:
603,749 UART: [state] CFI Enabled
613,728 UART: [state] LifecycleState = Unprovisioned
616,102 UART: [state] DebugLocked = No
618,971 UART: [state] WD Timer not started. Device not locked for debugging
623,076 UART: [kat] SHA2-256
812,975 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,783 UART: [kat] ++
824,283 UART: [kat] sha1
836,229 UART: [kat] SHA2-256
839,248 UART: [kat] SHA2-384
845,527 UART: [kat] SHA2-512-ACC
848,113 UART: [kat] ECC-384
3,292,771 UART: [kat] HMAC-384Kdf
3,305,830 UART: [kat] LMS
3,837,619 UART: [kat] --
3,843,757 UART: [cold-reset] ++
3,844,705 UART: [fht] FHT @ 0x50003400
3,857,890 UART: [idev] ++
3,858,529 UART: [idev] CDI.KEYID = 6
3,859,483 UART: [idev] SUBJECT.KEYID = 7
3,860,725 UART: [idev] UDS.KEYID = 0
3,861,632 ready_for_fw is high
3,861,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,725 UART: [idev] Erasing UDS.KEYID = 0
6,335,017 UART: [idev] Sha1 KeyId Algorithm
6,356,207 UART: [idev] --
6,361,123 UART: [ldev] ++
6,361,861 UART: [ldev] CDI.KEYID = 6
6,362,747 UART: [ldev] SUBJECT.KEYID = 5
6,363,879 UART: [ldev] AUTHORITY.KEYID = 7
6,365,169 UART: [ldev] FE.KEYID = 1
6,373,955 UART: [ldev] Erasing FE.KEYID = 1
8,852,216 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,256 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,438 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,440 UART: [ldev] --
10,644,282 UART: [fwproc] Wait for Commands...
10,645,739 UART: [fwproc] Recv command 0x46574c44
10,647,677 UART: [fwproc] Recv'd Img size: 118548 bytes
15,339,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,416,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,540,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,100,152 >>> mbox cmd response: success
16,103,426 UART: [afmc] ++
16,104,160 UART: [afmc] CDI.KEYID = 6
16,105,277 UART: [afmc] SUBJECT.KEYID = 7
16,106,785 UART: [afmc] AUTHORITY.KEYID = 5
18,612,905 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,333,582 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,335,497 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,350,601 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,365,862 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,380,890 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,403,973 UART: [afmc] --
20,406,664 UART: [cold-reset] --
20,409,730 UART: [state] Locking Datavault
20,415,000 UART: [state] Locking PCR0, PCR1 and PCR31
20,417,171 UART: [state] Locking ICCM
20,419,649 UART: [exit] Launching FMC @ 0x40000130
20,428,313 UART:
20,428,558 UART: Running Caliptra FMC ...
20,429,666 UART:
20,429,830 UART: [state] CFI Enabled
20,438,101 UART: [fht] FMC Alias Private Key: 7
22,203,899 UART: [art] Extend RT PCRs Done
22,205,122 UART: [art] Lock RT PCRs Done
22,206,858 UART: [art] Populate DV Done
22,212,277 UART: [fht] FMC Alias Private Key: 7
22,213,928 UART: [art] Derive CDI
22,214,750 UART: [art] Store in slot 0x4
22,257,304 UART: [art] Derive Key Pair
22,258,344 UART: [art] Store priv key in slot 0x5
24,685,537 UART: [art] Derive Key Pair - Done
24,698,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,405,194 UART: [art] Erasing AUTHORITY.KEYID = 7
26,406,724 UART: [art] PUB.X = 242BF6A21AB186065BEB50F620720EF902AC60EDD3AC3C5B1B7AE1D4D3FB4932DB78184B0B68B13FF849005A27846C48
26,413,940 UART: [art] PUB.Y = CF4471029CB331100C8B9A34D6400B83DDE4FD49281407AE416CC09CEAD1B5F825510B49AB2BDF2D237E3F08B17C92B0
26,421,209 UART: [art] SIG.R = 23990C0413B56BD813317CF7981B9789E4CEC4E7EB6D2039699624EE60BA8DF0AA36E9F30C20992EECEF8E5B77CC675F
26,428,585 UART: [art] SIG.S = 232BFE4920F54AF7CF295104F61D14D76183B6645A48B04C27E0FF264D8367506A07BD44DE6D0843F944AC1BE0D0BB35
27,407,686 UART: Caliptra RT
27,408,395 UART: [state] CFI Enabled
27,541,673 UART: [rt] RT listening for mailbox commands...
27,544,020 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,699,118 UART: [rt]cmd =0x41544d4e, len=14344
30,095,419 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,754,385 ready_for_fw is high
3,755,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,561 >>> mbox cmd response: success
20,393,792 UART:
20,394,202 UART: Running Caliptra FMC ...
20,395,371 UART:
20,395,535 UART: [state] CFI Enabled
20,403,577 UART: [fht] FMC Alias Private Key: 7
22,169,497 UART: [art] Extend RT PCRs Done
22,170,717 UART: [art] Lock RT PCRs Done
22,172,496 UART: [art] Populate DV Done
22,178,067 UART: [fht] FMC Alias Private Key: 7
22,179,772 UART: [art] Derive CDI
22,180,512 UART: [art] Store in slot 0x4
22,223,480 UART: [art] Derive Key Pair
22,224,483 UART: [art] Store priv key in slot 0x5
24,651,546 UART: [art] Derive Key Pair - Done
24,664,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,370,938 UART: [art] Erasing AUTHORITY.KEYID = 7
26,372,434 UART: [art] PUB.X = B721710DD0BB0D8526ACF86D4F945AFC47129C9D037351322CCB98D21AE887BD1D11D31264F84C7133164E08CB9F2706
26,379,694 UART: [art] PUB.Y = 07044731869BA5B0F1BB55ED8AB17D81ED252376F753E0ECC6FD60B65BD72DEE60E332C98B3159F0504944B55104963A
26,387,000 UART: [art] SIG.R = F04C9B8F7F19B23BBA02974D1D09AEDEA55D972195E38C2F43766675406BD84335684518F4CC1C1D8F022BEA33535557
26,394,473 UART: [art] SIG.S = 6C2E8A8BA6A64472B5DB3E6836D2A213A8A357490DBD3A6A0D19401EFE1D5FFD0EBFF62FA824B08FB9ADC7919E4259FA
27,373,528 UART: Caliptra RT
27,374,222 UART: [state] CFI Enabled
27,507,591 UART: [rt] RT listening for mailbox commands...
27,509,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,665,589 UART: [rt]cmd =0x41544d4e, len=14344
30,046,374 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,383 UART: [kat] SHA2-256
892,321 UART: [kat] SHA2-384
895,202 UART: [kat] SHA2-512-ACC
897,103 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,174 UART: [kat] LMS
1,475,370 UART: [kat] --
1,476,189 UART: [cold-reset] ++
1,476,631 UART: [fht] Storing FHT @ 0x50003400
1,479,302 UART: [idev] ++
1,479,470 UART: [idev] CDI.KEYID = 6
1,479,830 UART: [idev] SUBJECT.KEYID = 7
1,480,254 UART: [idev] UDS.KEYID = 0
1,480,599 ready_for_fw is high
1,480,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,348 UART: [idev] Erasing UDS.KEYID = 0
1,505,212 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,682 UART: [idev] --
1,514,649 UART: [ldev] ++
1,514,817 UART: [ldev] CDI.KEYID = 6
1,515,180 UART: [ldev] SUBJECT.KEYID = 5
1,515,606 UART: [ldev] AUTHORITY.KEYID = 7
1,516,069 UART: [ldev] FE.KEYID = 1
1,521,041 UART: [ldev] Erasing FE.KEYID = 1
1,546,632 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,508 UART: [ldev] --
1,585,799 UART: [fwproc] Waiting for Commands...
1,586,580 UART: [fwproc] Received command 0x46574c44
1,587,371 UART: [fwproc] Received Image of size 118548 bytes
5,243,808 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,932 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,303,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,505 >>> mbox cmd response: success
5,444,691 UART: [afmc] ++
5,444,859 UART: [afmc] CDI.KEYID = 6
5,445,221 UART: [afmc] SUBJECT.KEYID = 7
5,445,646 UART: [afmc] AUTHORITY.KEYID = 5
5,480,599 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,496,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,657 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,363 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,242 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,514,955 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,842 UART: [afmc] --
5,523,732 UART: [cold-reset] --
5,524,640 UART: [state] Locking Datavault
5,525,815 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,419 UART: [state] Locking ICCM
5,526,985 UART: [exit] Launching FMC @ 0x40000130
5,532,315 UART:
5,532,331 UART: Running Caliptra FMC ...
5,532,739 UART:
5,532,793 UART: [state] CFI Enabled
5,543,651 UART: [fht] FMC Alias Private Key: 7
5,663,195 UART: [art] Extend RT PCRs Done
5,663,623 UART: [art] Lock RT PCRs Done
5,665,183 UART: [art] Populate DV Done
5,673,286 UART: [fht] FMC Alias Private Key: 7
5,674,342 UART: [art] Derive CDI
5,674,622 UART: [art] Store in slot 0x4
5,760,352 UART: [art] Derive Key Pair
5,760,712 UART: [art] Store priv key in slot 0x5
5,773,553 UART: [art] Derive Key Pair - Done
5,788,368 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,050 UART: [art] PUB.X = 2E2EFF181A934BA495412C8A0A26D06A85EE637FF4F208A3E93570367796CEA1F6A6E8FBAE07B78CE934224A4D44C489
5,811,819 UART: [art] PUB.Y = 312AA383538B8D2CDE0638E4F486FF0DCDE7A4C557E2C4836813B3CE5F8B0A21864C1510258165829647854E89535EE8
5,818,756 UART: [art] SIG.R = 710BD022C2808C6F5CEF2AEF6C4F1AC8CE76D6869E4470FBCEB5BF8E105446F9371AB7E9CF3DDBA26C8FA7F49065787F
5,825,545 UART: [art] SIG.S = A7FD8B45D24D1E1E4519E45083489D4AA861C73F7E524FD94E8F469FD038D38092100DB451B7C7DEA5A8FA2CC2719F5E
5,849,696 UART: Caliptra RT
5,849,947 UART: [state] CFI Enabled
5,970,397 UART: [rt] RT listening for mailbox commands...
5,971,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,094,123 UART: [rt]cmd =0x41544d4e, len=14344
8,437,841 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,637 ready_for_fw is high
1,362,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,290,835 >>> mbox cmd response: success
5,352,476 UART:
5,352,492 UART: Running Caliptra FMC ...
5,352,900 UART:
5,352,954 UART: [state] CFI Enabled
5,363,448 UART: [fht] FMC Alias Private Key: 7
5,482,384 UART: [art] Extend RT PCRs Done
5,482,812 UART: [art] Lock RT PCRs Done
5,484,510 UART: [art] Populate DV Done
5,492,535 UART: [fht] FMC Alias Private Key: 7
5,493,677 UART: [art] Derive CDI
5,493,957 UART: [art] Store in slot 0x4
5,579,861 UART: [art] Derive Key Pair
5,580,221 UART: [art] Store priv key in slot 0x5
5,593,420 UART: [art] Derive Key Pair - Done
5,608,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,623,728 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,493 UART: [art] PUB.X = 89C534A634C378DE03118F323E23B06F1C6D86263AA773F5F894D38F1E422902A17B9B85A90CBCE19AAAEECD17FA21CD
5,631,266 UART: [art] PUB.Y = 91C5F858325414E34ADFB34B337D7F0AFE409AED10DA2EAEBE195B0DFD3238268B13388CC0ABBAE8F8752894D3F22046
5,638,224 UART: [art] SIG.R = 95147FEBF6D0E06D009D7613219C02EF693D6DB248531E300A7AC8883B10EA1274C5DF530E1419374D38510301AC8B0C
5,644,952 UART: [art] SIG.S = 2426A10ACFA6FFB8CE75A805430FF06D5C20CF7B404CB156F9BF2507DB0AD0D8D09D267B5ECF8013839D3A1F08F010FC
5,668,514 UART: Caliptra RT
5,668,765 UART: [state] CFI Enabled
5,789,971 UART: [rt] RT listening for mailbox commands...
5,790,641 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,914,115 UART: [rt]cmd =0x41544d4e, len=14344
8,182,255 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,423 UART: [state] LifecycleState = Unprovisioned
86,078 UART: [state] DebugLocked = No
86,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,904 UART: [kat] SHA2-256
892,842 UART: [kat] SHA2-384
895,533 UART: [kat] SHA2-512-ACC
897,434 UART: [kat] ECC-384
903,407 UART: [kat] HMAC-384Kdf
908,179 UART: [kat] LMS
1,476,375 UART: [kat] --
1,477,186 UART: [cold-reset] ++
1,477,568 UART: [fht] Storing FHT @ 0x50003400
1,480,489 UART: [idev] ++
1,480,657 UART: [idev] CDI.KEYID = 6
1,481,017 UART: [idev] SUBJECT.KEYID = 7
1,481,441 UART: [idev] UDS.KEYID = 0
1,481,786 ready_for_fw is high
1,481,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,261 UART: [idev] Erasing UDS.KEYID = 0
1,506,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,997 UART: [idev] --
1,516,266 UART: [ldev] ++
1,516,434 UART: [ldev] CDI.KEYID = 6
1,516,797 UART: [ldev] SUBJECT.KEYID = 5
1,517,223 UART: [ldev] AUTHORITY.KEYID = 7
1,517,686 UART: [ldev] FE.KEYID = 1
1,522,814 UART: [ldev] Erasing FE.KEYID = 1
1,548,511 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,930 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,287 UART: [ldev] --
1,587,690 UART: [fwproc] Waiting for Commands...
1,588,469 UART: [fwproc] Received command 0x46574c44
1,589,260 UART: [fwproc] Received Image of size 118548 bytes
5,206,968 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,235,108 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,266,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,406,675 >>> mbox cmd response: success
5,407,931 UART: [afmc] ++
5,408,099 UART: [afmc] CDI.KEYID = 6
5,408,461 UART: [afmc] SUBJECT.KEYID = 7
5,408,886 UART: [afmc] AUTHORITY.KEYID = 5
5,443,835 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,460,237 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,461,017 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,466,723 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,472,602 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,478,315 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,486,234 UART: [afmc] --
5,487,182 UART: [cold-reset] --
5,487,926 UART: [state] Locking Datavault
5,488,969 UART: [state] Locking PCR0, PCR1 and PCR31
5,489,573 UART: [state] Locking ICCM
5,490,029 UART: [exit] Launching FMC @ 0x40000130
5,495,359 UART:
5,495,375 UART: Running Caliptra FMC ...
5,495,783 UART:
5,495,926 UART: [state] CFI Enabled
5,506,522 UART: [fht] FMC Alias Private Key: 7
5,625,942 UART: [art] Extend RT PCRs Done
5,626,370 UART: [art] Lock RT PCRs Done
5,627,838 UART: [art] Populate DV Done
5,635,825 UART: [fht] FMC Alias Private Key: 7
5,636,951 UART: [art] Derive CDI
5,637,231 UART: [art] Store in slot 0x4
5,723,099 UART: [art] Derive Key Pair
5,723,459 UART: [art] Store priv key in slot 0x5
5,736,708 UART: [art] Derive Key Pair - Done
5,751,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,767,381 UART: [art] Erasing AUTHORITY.KEYID = 7
5,768,146 UART: [art] PUB.X = D3C1814DEA0D50898D999E25349EB563FA19CBE0518B295FD698D1113460C19E9A3B36BD1170F73B4E625A1DE979B918
5,774,915 UART: [art] PUB.Y = 788395F0A23DB3E31EF173B8B175F20116BB07A3C5751C1DD97ECE79AC18FE2DFCDED9B741C8ED78636E9980787A8546
5,781,869 UART: [art] SIG.R = E6DD1DEA9E2E9653E4C75F4C70439444EECB475A6FE17CD8BD8CC1080391C552E4704CC773DE210133C428B584B5E505
5,788,635 UART: [art] SIG.S = EE3C97A1489033EB32F798D4B2C8C634F409843E0FB35CDB7CCABD7F5BB462063A204FA85C1440AE555B44CCE8275C51
5,811,740 UART: Caliptra RT
5,812,083 UART: [state] CFI Enabled
5,931,742 UART: [rt] RT listening for mailbox commands...
5,932,412 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,055,682 UART: [rt]cmd =0x41544d4e, len=14344
8,210,098 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,636 ready_for_fw is high
1,363,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,106,293 >>> mbox cmd response: success
5,167,988 UART:
5,168,004 UART: Running Caliptra FMC ...
5,168,412 UART:
5,168,555 UART: [state] CFI Enabled
5,179,343 UART: [fht] FMC Alias Private Key: 7
5,298,133 UART: [art] Extend RT PCRs Done
5,298,561 UART: [art] Lock RT PCRs Done
5,299,889 UART: [art] Populate DV Done
5,307,936 UART: [fht] FMC Alias Private Key: 7
5,309,024 UART: [art] Derive CDI
5,309,304 UART: [art] Store in slot 0x4
5,394,440 UART: [art] Derive Key Pair
5,394,800 UART: [art] Store priv key in slot 0x5
5,408,259 UART: [art] Derive Key Pair - Done
5,422,812 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,437,977 UART: [art] Erasing AUTHORITY.KEYID = 7
5,438,742 UART: [art] PUB.X = 25858D1E307198DF3B5CADC3FE17285CC9797311BA929C3BA8F19216E4A43C834AA4E53F92D73A4A5013345F5470E255
5,445,512 UART: [art] PUB.Y = 52B61303B4FB58AEFD486E311FE66B00F0E2C69129FA008E0EE61358B0DBAC44615D9B6A37549650110FAA936D92E17E
5,452,415 UART: [art] SIG.R = 28515FE9E29C52D86206D8950D68276B11A0B5B7110EBFED4D386B3A96335E841229AD961F44183076F3E77199769B1F
5,459,168 UART: [art] SIG.S = 4C4D1D6EC2221029FBCDE7AB1C727173795A3AE469FE320859BAA7DB6736143DB4F9C0BC2EF28F4FF6426AA971D4F3D8
5,482,739 UART: Caliptra RT
5,483,082 UART: [state] CFI Enabled
5,603,079 UART: [rt] RT listening for mailbox commands...
5,603,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,726,697 UART: [rt]cmd =0x41544d4e, len=14344
7,843,519 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,826 UART: [kat] SHA2-256
891,376 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,480 UART: [kat] ++
895,632 UART: [kat] sha1
899,774 UART: [kat] SHA2-256
901,714 UART: [kat] SHA2-384
904,405 UART: [kat] SHA2-512-ACC
906,306 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,171,010 UART: [fht] FHT @ 0x50003400
1,173,540 UART: [idev] ++
1,173,708 UART: [idev] CDI.KEYID = 6
1,174,069 UART: [idev] SUBJECT.KEYID = 7
1,174,494 UART: [idev] UDS.KEYID = 0
1,174,840 ready_for_fw is high
1,174,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,011 UART: [idev] Erasing UDS.KEYID = 0
1,199,645 UART: [idev] Sha1 KeyId Algorithm
1,208,487 UART: [idev] --
1,209,572 UART: [ldev] ++
1,209,740 UART: [ldev] CDI.KEYID = 6
1,210,104 UART: [ldev] SUBJECT.KEYID = 5
1,210,531 UART: [ldev] AUTHORITY.KEYID = 7
1,210,994 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,242,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,950 UART: [ldev] --
1,282,193 UART: [fwproc] Wait for Commands...
1,282,886 UART: [fwproc] Recv command 0x46574c44
1,283,619 UART: [fwproc] Recv'd Img size: 118548 bytes
3,162,251 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,221,089 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,396 >>> mbox cmd response: success
3,362,656 UART: [afmc] ++
3,362,824 UART: [afmc] CDI.KEYID = 6
3,363,187 UART: [afmc] SUBJECT.KEYID = 7
3,363,613 UART: [afmc] AUTHORITY.KEYID = 5
3,398,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,415,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,416,130 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,421,837 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,427,714 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,433,424 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,441,014 UART: [afmc] --
3,441,913 UART: [cold-reset] --
3,442,733 UART: [state] Locking Datavault
3,443,848 UART: [state] Locking PCR0, PCR1 and PCR31
3,444,452 UART: [state] Locking ICCM
3,445,068 UART: [exit] Launching FMC @ 0x40000130
3,450,398 UART:
3,450,414 UART: Running Caliptra FMC ...
3,450,822 UART:
3,450,876 UART: [state] CFI Enabled
3,461,378 UART: [fht] FMC Alias Private Key: 7
3,579,602 UART: [art] Extend RT PCRs Done
3,580,030 UART: [art] Lock RT PCRs Done
3,581,602 UART: [art] Populate DV Done
3,589,537 UART: [fht] FMC Alias Private Key: 7
3,590,587 UART: [art] Derive CDI
3,590,867 UART: [art] Store in slot 0x4
3,676,542 UART: [art] Derive Key Pair
3,676,902 UART: [art] Store priv key in slot 0x5
3,690,108 UART: [art] Derive Key Pair - Done
3,704,979 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,720,702 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,467 UART: [art] PUB.X = E3DB63F5D9CD49B0107C273FBDA732DAD674A23852509D7DC709379E969D88A409F9734686EE8E284F77FD980A99B4E4
3,728,232 UART: [art] PUB.Y = 555B00E0F3BF51DA9F4862BD8FEF6B750076A19EC5B51ED337713E934458560FB439F45E9F4697DD7C919622616FCEB6
3,735,139 UART: [art] SIG.R = FE243295B0E6CFA31172376954524024BACAB65B8DD6F82F6B2C81CFD1D307BBD70BFF2406707D3E375D3652E0A8C754
3,741,908 UART: [art] SIG.S = 9DE5F1D40B7960C00C6E198CEFD74D558D9ECAAED89E3ED4158972DF0B86A95DB994CD1BDF1E8839F11463E1D931AA49
3,765,653 UART: Caliptra RT
3,765,904 UART: [state] CFI Enabled
3,886,255 UART: [rt] RT listening for mailbox commands...
3,886,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,010,077 UART: [rt]cmd =0x41544d4e, len=14344
4,594,852 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,182 ready_for_fw is high
1,059,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,773 >>> mbox cmd response: success
3,284,766 UART:
3,284,782 UART: Running Caliptra FMC ...
3,285,190 UART:
3,285,244 UART: [state] CFI Enabled
3,295,874 UART: [fht] FMC Alias Private Key: 7
3,414,606 UART: [art] Extend RT PCRs Done
3,415,034 UART: [art] Lock RT PCRs Done
3,416,466 UART: [art] Populate DV Done
3,424,597 UART: [fht] FMC Alias Private Key: 7
3,425,539 UART: [art] Derive CDI
3,425,819 UART: [art] Store in slot 0x4
3,511,420 UART: [art] Derive Key Pair
3,511,780 UART: [art] Store priv key in slot 0x5
3,524,532 UART: [art] Derive Key Pair - Done
3,539,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,676 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,441 UART: [art] PUB.X = FCE2FF433500FE12BBCDDA41D15658F0E87821802FA4D18FE4C49F3F4E5B54502955F44DE578EA42FB9505DA7AAE88D9
3,562,202 UART: [art] PUB.Y = 3E93FE373D1743B5E4CCBD60F12D01401ACDDF127293D38951FC95327037ADCF2EE075EA9A066CC850B869B5108CB6D6
3,569,156 UART: [art] SIG.R = FB325DA4A3F0DEDDA2DD2538C8360BAEB8A8450E9F196433CB43D0822BD3D450987656267C1C76D2A99E0DD903C9B999
3,575,924 UART: [art] SIG.S = DDDBFDF8068145B7F957BC0C04F18400B25A96D90AA664FB33B4371B31ABBFD61B162FE0D1B9488F5B0BE6CE458A0ABF
3,599,602 UART: Caliptra RT
3,599,853 UART: [state] CFI Enabled
3,720,164 UART: [rt] RT listening for mailbox commands...
3,720,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,706 UART: [rt]cmd =0x41544d4e, len=14344
4,426,034 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,201 UART: [kat] SHA2-256
891,751 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,855 UART: [kat] ++
896,007 UART: [kat] sha1
900,087 UART: [kat] SHA2-256
902,027 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,712 UART: [kat] HMAC-384Kdf
921,234 UART: [kat] LMS
1,169,546 UART: [kat] --
1,170,279 UART: [cold-reset] ++
1,170,687 UART: [fht] FHT @ 0x50003400
1,173,355 UART: [idev] ++
1,173,523 UART: [idev] CDI.KEYID = 6
1,173,884 UART: [idev] SUBJECT.KEYID = 7
1,174,309 UART: [idev] UDS.KEYID = 0
1,174,655 ready_for_fw is high
1,174,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,312 UART: [idev] Erasing UDS.KEYID = 0
1,199,606 UART: [idev] Sha1 KeyId Algorithm
1,208,252 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,715 UART: [ldev] Erasing FE.KEYID = 1
1,241,938 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,047 UART: [ldev] --
1,281,300 UART: [fwproc] Wait for Commands...
1,282,037 UART: [fwproc] Recv command 0x46574c44
1,282,770 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,319 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,390 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,565 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,950 >>> mbox cmd response: success
3,372,096 UART: [afmc] ++
3,372,264 UART: [afmc] CDI.KEYID = 6
3,372,627 UART: [afmc] SUBJECT.KEYID = 7
3,373,053 UART: [afmc] AUTHORITY.KEYID = 5
3,408,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,174 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,881 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,758 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,468 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,451,310 UART: [afmc] --
3,452,375 UART: [cold-reset] --
3,453,181 UART: [state] Locking Datavault
3,454,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,012 UART: [state] Locking ICCM
3,455,650 UART: [exit] Launching FMC @ 0x40000130
3,460,980 UART:
3,460,996 UART: Running Caliptra FMC ...
3,461,404 UART:
3,461,547 UART: [state] CFI Enabled
3,472,539 UART: [fht] FMC Alias Private Key: 7
3,591,555 UART: [art] Extend RT PCRs Done
3,591,983 UART: [art] Lock RT PCRs Done
3,593,559 UART: [art] Populate DV Done
3,601,652 UART: [fht] FMC Alias Private Key: 7
3,602,724 UART: [art] Derive CDI
3,603,004 UART: [art] Store in slot 0x4
3,688,783 UART: [art] Derive Key Pair
3,689,143 UART: [art] Store priv key in slot 0x5
3,702,835 UART: [art] Derive Key Pair - Done
3,717,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,796 UART: [art] PUB.X = EE9A08A774B477AC782DEAB782A7D31BB57C73463F3AB5290BE81D696ECCA33F6A7A8A9B57460E376AFA906558B97675
3,740,567 UART: [art] PUB.Y = 0527CD741B8094365D9AACAA5E5E87C09C024EFC77C211E0173C724D29D14E24DDCAE7444257A9221B59E60F5EDBCC31
3,747,518 UART: [art] SIG.R = B8E7D8B0EE18046DF2FD2859C0E5877617D5C48775C2A89D132644762B88291F5CA74E1F6C5D9E8BE5B99BA782FDF64F
3,754,293 UART: [art] SIG.S = 30B79BC00CCCD3085DB4C58E55E2498A3919BF5CD59EB98C5DE9BD26C9A3318B3683FC50BFF6A9156A871B6B76C04005
3,777,972 UART: Caliptra RT
3,778,315 UART: [state] CFI Enabled
3,898,425 UART: [rt] RT listening for mailbox commands...
3,899,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,089 UART: [rt]cmd =0x41544d4e, len=14344
4,607,296 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,223 ready_for_fw is high
1,059,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,256 >>> mbox cmd response: success
3,290,159 UART:
3,290,175 UART: Running Caliptra FMC ...
3,290,583 UART:
3,290,726 UART: [state] CFI Enabled
3,301,166 UART: [fht] FMC Alias Private Key: 7
3,419,766 UART: [art] Extend RT PCRs Done
3,420,194 UART: [art] Lock RT PCRs Done
3,421,570 UART: [art] Populate DV Done
3,429,693 UART: [fht] FMC Alias Private Key: 7
3,430,863 UART: [art] Derive CDI
3,431,143 UART: [art] Store in slot 0x4
3,516,726 UART: [art] Derive Key Pair
3,517,086 UART: [art] Store priv key in slot 0x5
3,530,076 UART: [art] Derive Key Pair - Done
3,545,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,235 UART: [art] Erasing AUTHORITY.KEYID = 7
3,561,000 UART: [art] PUB.X = 3714CC793B75788612054E7EEF3B9BCE592159061B8FF901AE19F817FC83FBE659F4467B766894E88F2BFED1493AA431
3,567,763 UART: [art] PUB.Y = D63C834E728BDECFF0727CF5441076D931FB7160555D2361F25D18E9524E0A304F854403763F33BA4825985CE8F8F3FF
3,574,705 UART: [art] SIG.R = B0F4A50B52C1B190A56B521258AAEE66DA58217D993E79B27204FBA937018932BAF69B528C2BE48514CA1DFC52B77729
3,581,470 UART: [art] SIG.S = 4AFCBCEF59E6B244372A5EE1C4E2554EDEC536DF53875FF1FF7B05D3741E21C5B9A747848435BC51228B2A41300243FD
3,604,806 UART: Caliptra RT
3,605,149 UART: [state] CFI Enabled
3,725,095 UART: [rt] RT listening for mailbox commands...
3,725,765 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,871 UART: [rt]cmd =0x41544d4e, len=14344
4,426,045 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,658 UART: [kat] SHA2-256
893,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,433 UART: [kat] ++
897,585 UART: [kat] sha1
901,805 UART: [kat] SHA2-256
903,745 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,857 UART: [cold-reset] ++
1,172,185 UART: [fht] FHT @ 0x50003400
1,174,828 UART: [idev] ++
1,174,996 UART: [idev] CDI.KEYID = 6
1,175,356 UART: [idev] SUBJECT.KEYID = 7
1,175,780 UART: [idev] UDS.KEYID = 0
1,176,125 ready_for_fw is high
1,176,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,848 UART: [idev] Erasing UDS.KEYID = 0
1,200,757 UART: [idev] Sha1 KeyId Algorithm
1,209,115 UART: [idev] --
1,210,123 UART: [ldev] ++
1,210,291 UART: [ldev] CDI.KEYID = 6
1,210,654 UART: [ldev] SUBJECT.KEYID = 5
1,211,080 UART: [ldev] AUTHORITY.KEYID = 7
1,211,543 UART: [ldev] FE.KEYID = 1
1,216,541 UART: [ldev] Erasing FE.KEYID = 1
1,243,092 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,753 UART: [ldev] --
1,282,200 UART: [fwproc] Wait for Commands...
1,282,804 UART: [fwproc] Recv command 0x46574c44
1,283,532 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,422 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,611 >>> mbox cmd response: success
3,371,739 UART: [afmc] ++
3,371,907 UART: [afmc] CDI.KEYID = 6
3,372,269 UART: [afmc] SUBJECT.KEYID = 7
3,372,694 UART: [afmc] AUTHORITY.KEYID = 5
3,408,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,768 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,516 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,222 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,101 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,811 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,714 UART: [afmc] --
3,451,650 UART: [cold-reset] --
3,452,462 UART: [state] Locking Datavault
3,453,699 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,303 UART: [state] Locking ICCM
3,454,881 UART: [exit] Launching FMC @ 0x40000130
3,460,211 UART:
3,460,227 UART: Running Caliptra FMC ...
3,460,635 UART:
3,460,689 UART: [state] CFI Enabled
3,471,205 UART: [fht] FMC Alias Private Key: 7
3,590,123 UART: [art] Extend RT PCRs Done
3,590,551 UART: [art] Lock RT PCRs Done
3,591,951 UART: [art] Populate DV Done
3,599,988 UART: [fht] FMC Alias Private Key: 7
3,600,930 UART: [art] Derive CDI
3,601,210 UART: [art] Store in slot 0x4
3,686,865 UART: [art] Derive Key Pair
3,687,225 UART: [art] Store priv key in slot 0x5
3,700,237 UART: [art] Derive Key Pair - Done
3,715,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,506 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,271 UART: [art] PUB.X = 9B53D91EB444711116C0A2FC2571704A8776157DE326E616B38182F42B45BC1AB56121154337D5B8FCCDDA0422C8C1C2
3,738,036 UART: [art] PUB.Y = E9BD6444732E67CD99F4831A2EC0AA211B2972C62270C8ED0B207F4F7557FCEDFA18BC2815D695549834883D0F29494C
3,744,982 UART: [art] SIG.R = 6B168E1D9A425AF2BC81866AA39001F0AE3C1920CE4FA56E8E40BD986BBF6AD60EC041559EEE5939D41DD9FDB0FCEFFF
3,751,772 UART: [art] SIG.S = 6994215FF8AA20508894B9CF08E3C7D0D838BE112C0E5FE2F2C23BD143401D7183946E1A3B2B868EB7601442FE5F325A
3,775,822 UART: Caliptra RT
3,776,073 UART: [state] CFI Enabled
3,896,355 UART: [rt] RT listening for mailbox commands...
3,897,025 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,187 UART: [rt]cmd =0x41544d4e, len=14344
4,600,358 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 ready_for_fw is high
1,060,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,821 >>> mbox cmd response: success
3,297,954 UART:
3,297,970 UART: Running Caliptra FMC ...
3,298,378 UART:
3,298,432 UART: [state] CFI Enabled
3,309,284 UART: [fht] FMC Alias Private Key: 7
3,428,568 UART: [art] Extend RT PCRs Done
3,428,996 UART: [art] Lock RT PCRs Done
3,430,354 UART: [art] Populate DV Done
3,438,513 UART: [fht] FMC Alias Private Key: 7
3,439,511 UART: [art] Derive CDI
3,439,791 UART: [art] Store in slot 0x4
3,525,494 UART: [art] Derive Key Pair
3,525,854 UART: [art] Store priv key in slot 0x5
3,539,022 UART: [art] Derive Key Pair - Done
3,553,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,569,368 UART: [art] Erasing AUTHORITY.KEYID = 7
3,570,133 UART: [art] PUB.X = 828E28CC95B8660DDD5140FAA30C40F58DF0E8B172A8D652BF1A32C342B57D1034A7890E5997D238EC917A6CD7220174
3,576,893 UART: [art] PUB.Y = 92C759342701615303DAB8260C9E2092B96D021492F1D989F4ED8A4AC4D80A3D072CAC6D8C9AF68AF7F32E4C56BA907A
3,583,831 UART: [art] SIG.R = 5D3ADE4BADEA2F67D69DD7418C26DDDF1837E47249601D33934E8E568363061E22F12F895799C7C00622A4DE132F18A1
3,590,597 UART: [art] SIG.S = D2DDD3764E900BC3B2277638C54395C6974669AB916ACCBECE231971EEA36688E9A2D86888B0E9423A11A788A7C37A5C
3,614,628 UART: Caliptra RT
3,614,879 UART: [state] CFI Enabled
3,734,711 UART: [rt] RT listening for mailbox commands...
3,735,381 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,329 UART: [rt]cmd =0x41544d4e, len=14344
4,445,847 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,725 UART: [state] LifecycleState = Unprovisioned
86,380 UART: [state] DebugLocked = No
86,954 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
893,711 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,836 UART: [kat] ++
897,988 UART: [kat] sha1
902,270 UART: [kat] SHA2-256
904,210 UART: [kat] SHA2-384
907,093 UART: [kat] SHA2-512-ACC
908,994 UART: [kat] ECC-384
918,737 UART: [kat] HMAC-384Kdf
923,483 UART: [kat] LMS
1,171,811 UART: [kat] --
1,172,620 UART: [cold-reset] ++
1,173,048 UART: [fht] FHT @ 0x50003400
1,175,527 UART: [idev] ++
1,175,695 UART: [idev] CDI.KEYID = 6
1,176,055 UART: [idev] SUBJECT.KEYID = 7
1,176,479 UART: [idev] UDS.KEYID = 0
1,176,824 ready_for_fw is high
1,176,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,407 UART: [idev] Erasing UDS.KEYID = 0
1,201,348 UART: [idev] Sha1 KeyId Algorithm
1,209,812 UART: [idev] --
1,210,746 UART: [ldev] ++
1,210,914 UART: [ldev] CDI.KEYID = 6
1,211,277 UART: [ldev] SUBJECT.KEYID = 5
1,211,703 UART: [ldev] AUTHORITY.KEYID = 7
1,212,166 UART: [ldev] FE.KEYID = 1
1,217,572 UART: [ldev] Erasing FE.KEYID = 1
1,244,067 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,780 UART: [ldev] --
1,283,057 UART: [fwproc] Wait for Commands...
1,283,707 UART: [fwproc] Recv command 0x46574c44
1,284,435 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,309 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,362,652 >>> mbox cmd response: success
3,363,886 UART: [afmc] ++
3,364,054 UART: [afmc] CDI.KEYID = 6
3,364,416 UART: [afmc] SUBJECT.KEYID = 7
3,364,841 UART: [afmc] AUTHORITY.KEYID = 5
3,400,014 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,416,609 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,417,357 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,063 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,428,942 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,434,652 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,442,363 UART: [afmc] --
3,443,301 UART: [cold-reset] --
3,444,171 UART: [state] Locking Datavault
3,445,148 UART: [state] Locking PCR0, PCR1 and PCR31
3,445,752 UART: [state] Locking ICCM
3,446,426 UART: [exit] Launching FMC @ 0x40000130
3,451,756 UART:
3,451,772 UART: Running Caliptra FMC ...
3,452,180 UART:
3,452,323 UART: [state] CFI Enabled
3,462,719 UART: [fht] FMC Alias Private Key: 7
3,582,565 UART: [art] Extend RT PCRs Done
3,582,993 UART: [art] Lock RT PCRs Done
3,584,519 UART: [art] Populate DV Done
3,592,758 UART: [fht] FMC Alias Private Key: 7
3,593,920 UART: [art] Derive CDI
3,594,200 UART: [art] Store in slot 0x4
3,679,711 UART: [art] Derive Key Pair
3,680,071 UART: [art] Store priv key in slot 0x5
3,693,173 UART: [art] Derive Key Pair - Done
3,707,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,056 UART: [art] PUB.X = AB18E238DBFD306FFF4805EE48AB8B76BCEBE376DF674E4D0AB2940E8A71E05DFF6FDCFF1648A9C40AD821928CCAFBE6
3,730,846 UART: [art] PUB.Y = CBEAE95BBF85EFDCA873981B6CFB456431F7D30BCDF7A7D05240686CACADC6E1F8AE88032A65A2C60C490A00E661255D
3,737,784 UART: [art] SIG.R = A705924E8CE76085A191587DA87B899F877063F0EFFA5358127512FDC9BC6FEBECD7E8990D4F47F86774E133D57CB4DD
3,744,556 UART: [art] SIG.S = B1F9C30CF645A9B1B0D2243E666E5720D412435D3D72B696B6BA3C809F18A3222138F75DD8CC9C314B788E7E80DA68A3
3,768,081 UART: Caliptra RT
3,768,424 UART: [state] CFI Enabled
3,888,773 UART: [rt] RT listening for mailbox commands...
3,889,443 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,257 UART: [rt]cmd =0x41544d4e, len=14344
4,594,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,550 ready_for_fw is high
1,060,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,985 >>> mbox cmd response: success
3,287,110 UART:
3,287,126 UART: Running Caliptra FMC ...
3,287,534 UART:
3,287,677 UART: [state] CFI Enabled
3,298,209 UART: [fht] FMC Alias Private Key: 7
3,417,401 UART: [art] Extend RT PCRs Done
3,417,829 UART: [art] Lock RT PCRs Done
3,419,237 UART: [art] Populate DV Done
3,427,392 UART: [fht] FMC Alias Private Key: 7
3,428,348 UART: [art] Derive CDI
3,428,628 UART: [art] Store in slot 0x4
3,514,755 UART: [art] Derive Key Pair
3,515,115 UART: [art] Store priv key in slot 0x5
3,528,801 UART: [art] Derive Key Pair - Done
3,543,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,773 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,538 UART: [art] PUB.X = 0FECF49A618B2BB55231DBBF0E70D7001CD5DABAD405CE805694153604264D88C17569839599A817FC41A8D0B4376490
3,566,274 UART: [art] PUB.Y = 4B8AF66A31FF01D92B20227B9E8A31C6B17051C397071FAD1880D9065EC4C821922E72B95F13933010D7198C87322873
3,573,205 UART: [art] SIG.R = 68D06675A65EB63F9BF96AFE0E502BBFD5423263751597E209CD0CA47A4905A483696430D2E0B4A3E991D217EE8697D0
3,579,963 UART: [art] SIG.S = 6CC5B50CEC67A6C4EC8DC0488715BD6FAE4C4A4BC2A0ECD56B262E85ACF50307DE1AE52CCFA35359F9BC12C564A5B79A
3,604,144 UART: Caliptra RT
3,604,487 UART: [state] CFI Enabled
3,723,797 UART: [rt] RT listening for mailbox commands...
3,724,467 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,647 UART: [rt]cmd =0x41544d4e, len=14344
4,427,294 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_metadata_list_count ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
192,099 UART:
192,472 UART: Running Caliptra ROM ...
193,610 UART:
193,761 UART: [state] CFI Enabled
265,184 UART: [state] LifecycleState = Unprovisioned
267,123 UART: [state] DebugLocked = No
269,132 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,229 UART: [kat] SHA2-256
442,949 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,478 UART: [kat] ++
453,928 UART: [kat] sha1
465,580 UART: [kat] SHA2-256
468,251 UART: [kat] SHA2-384
473,390 UART: [kat] SHA2-512-ACC
475,759 UART: [kat] ECC-384
2,768,717 UART: [kat] HMAC-384Kdf
2,799,638 UART: [kat] LMS
3,989,976 UART: [kat] --
3,993,559 UART: [cold-reset] ++
3,995,769 UART: [fht] Storing FHT @ 0x50003400
4,007,029 UART: [idev] ++
4,007,598 UART: [idev] CDI.KEYID = 6
4,008,555 UART: [idev] SUBJECT.KEYID = 7
4,009,807 UART: [idev] UDS.KEYID = 0
4,010,819 ready_for_fw is high
4,011,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,550 UART: [idev] Erasing UDS.KEYID = 0
7,348,778 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,658 UART: [idev] --
7,375,303 UART: [ldev] ++
7,375,873 UART: [ldev] CDI.KEYID = 6
7,376,855 UART: [ldev] SUBJECT.KEYID = 5
7,378,016 UART: [ldev] AUTHORITY.KEYID = 7
7,379,305 UART: [ldev] FE.KEYID = 1
7,422,027 UART: [ldev] Erasing FE.KEYID = 1
10,753,193 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,138 UART: [ldev] --
13,112,859 UART: [fwproc] Waiting for Commands...
13,115,058 UART: [fwproc] Received command 0x46574c44
13,117,240 UART: [fwproc] Received Image of size 118548 bytes
22,445,147 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,526,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,599,516 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,928,254 >>> mbox cmd response: success
22,931,857 UART: [afmc] ++
22,932,473 UART: [afmc] CDI.KEYID = 6
22,933,363 UART: [afmc] SUBJECT.KEYID = 7
22,934,580 UART: [afmc] AUTHORITY.KEYID = 5
26,292,035 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,592,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,594,335 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,608,805 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,623,640 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,637,978 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,658,248 UART: [afmc] --
28,661,298 UART: [cold-reset] --
28,665,508 UART: [state] Locking Datavault
28,669,954 UART: [state] Locking PCR0, PCR1 and PCR31
28,671,950 UART: [state] Locking ICCM
28,673,280 UART: [exit] Launching FMC @ 0x40000130
28,681,679 UART:
28,681,912 UART: Running Caliptra FMC ...
28,683,013 UART:
28,683,197 UART: [state] CFI Enabled
28,750,977 UART: [fht] FMC Alias Private Key: 7
31,091,194 UART: [art] Extend RT PCRs Done
31,092,413 UART: [art] Lock RT PCRs Done
31,094,204 UART: [art] Populate DV Done
31,099,789 UART: [fht] FMC Alias Private Key: 7
31,101,385 UART: [art] Derive CDI
31,102,201 UART: [art] Store in slot 0x4
31,159,192 UART: [art] Derive Key Pair
31,160,252 UART: [art] Store priv key in slot 0x5
34,453,265 UART: [art] Derive Key Pair - Done
34,466,430 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,754,002 UART: [art] Erasing AUTHORITY.KEYID = 7
36,755,512 UART: [art] PUB.X = A07ED80ADD8309F670BA2DA4D9F0530D6088A6C1A65402841957DF50E4920F48721F8CAAC081FE848F4A16AAA68A309C
36,762,807 UART: [art] PUB.Y = E6DC01726295D6345EB0EEEB6A8E2FC422192136F2D3E6CD80D0A0DFDDFC417D345182483322479EB351DFAEBDC25A45
36,770,037 UART: [art] SIG.R = C23051C89F45F5F249F861247EFBE77C9D2FBE1C0F4D9EFE95006EA9432D5E67A35A7BC894DBA8A5EDDA469BD96FCF98
36,777,475 UART: [art] SIG.S = 7E08CADD2EDE78380C9C4A5F889BA3FFC59BF7693D3B7B8BC607A0550F9A36551595CB94BB6FB4C0A121A774D1DC00C3
38,082,505 UART: Caliptra RT
38,083,219 UART: [state] CFI Enabled
38,258,974 UART: [rt] RT listening for mailbox commands...
38,261,304 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,416,889 UART: [rt]cmd =0x41544d4e, len=14344
40,427,798 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,786,155 ready_for_fw is high
3,786,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,048,527 >>> mbox cmd response: success
27,748,980 UART:
27,749,366 UART: Running Caliptra FMC ...
27,750,472 UART:
27,750,629 UART: [state] CFI Enabled
27,815,930 UART: [fht] FMC Alias Private Key: 7
30,156,641 UART: [art] Extend RT PCRs Done
30,157,864 UART: [art] Lock RT PCRs Done
30,159,517 UART: [art] Populate DV Done
30,164,652 UART: [fht] FMC Alias Private Key: 7
30,166,217 UART: [art] Derive CDI
30,166,952 UART: [art] Store in slot 0x4
30,224,103 UART: [art] Derive Key Pair
30,225,170 UART: [art] Store priv key in slot 0x5
33,517,860 UART: [art] Derive Key Pair - Done
33,530,746 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,819,909 UART: [art] Erasing AUTHORITY.KEYID = 7
35,821,854 UART: [art] PUB.X = D24439D2C95FC7A35132ED7F23834FD978764A87F38BAA0EEFCBE2A1B6FA1AABF8C8BD6218CA6DA9061C7E0046B8FECC
35,828,736 UART: [art] PUB.Y = 9FC42A17BD17D7352DE520195D5CD5F2897210215EA09EE909DF2970FCD91AFA935F18D80F18D53E2D0508B473CE338F
35,835,947 UART: [art] SIG.R = C76FEF148E6F153D3384C87DB1184CEDCF95D91225B81D53C8AD203AB5AD4442950A373F8CE1A34C2B7E132F256D6111
35,843,337 UART: [art] SIG.S = 0038B82EB674C0C628ACDBC231958A2172CCFA72724CD2D0F70A4FBBF90A23A6B0091BC134657B0B3B4C1ACBA12FDC94
37,148,741 UART: Caliptra RT
37,149,457 UART: [state] CFI Enabled
37,326,455 UART: [rt] RT listening for mailbox commands...
37,328,771 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,484,065 UART: [rt]cmd =0x41544d4e, len=14344
39,520,363 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,328 UART:
192,700 UART: Running Caliptra ROM ...
193,806 UART:
603,329 UART: [state] CFI Enabled
615,498 UART: [state] LifecycleState = Unprovisioned
617,483 UART: [state] DebugLocked = No
620,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,216 UART: [kat] SHA2-256
795,007 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,524 UART: [kat] ++
805,965 UART: [kat] sha1
816,901 UART: [kat] SHA2-256
819,618 UART: [kat] SHA2-384
826,099 UART: [kat] SHA2-512-ACC
828,464 UART: [kat] ECC-384
3,110,301 UART: [kat] HMAC-384Kdf
3,121,269 UART: [kat] LMS
4,311,385 UART: [kat] --
4,317,530 UART: [cold-reset] ++
4,319,316 UART: [fht] Storing FHT @ 0x50003400
4,330,861 UART: [idev] ++
4,331,417 UART: [idev] CDI.KEYID = 6
4,332,393 UART: [idev] SUBJECT.KEYID = 7
4,333,633 UART: [idev] UDS.KEYID = 0
4,334,630 ready_for_fw is high
4,334,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,687 UART: [idev] Erasing UDS.KEYID = 0
7,621,550 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,806 UART: [idev] --
7,649,011 UART: [ldev] ++
7,649,582 UART: [ldev] CDI.KEYID = 6
7,650,543 UART: [ldev] SUBJECT.KEYID = 5
7,651,744 UART: [ldev] AUTHORITY.KEYID = 7
7,653,038 UART: [ldev] FE.KEYID = 1
7,664,499 UART: [ldev] Erasing FE.KEYID = 1
10,955,123 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,061 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,826 UART: [ldev] --
13,317,135 UART: [fwproc] Waiting for Commands...
13,319,758 UART: [fwproc] Received command 0x46574c44
13,321,937 UART: [fwproc] Received Image of size 118548 bytes
22,412,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,489,528 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,562,707 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,891,684 >>> mbox cmd response: success
22,896,654 UART: [afmc] ++
22,897,282 UART: [afmc] CDI.KEYID = 6
22,898,193 UART: [afmc] SUBJECT.KEYID = 7
22,899,407 UART: [afmc] AUTHORITY.KEYID = 5
26,214,809 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,508,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,511,132 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,525,654 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,540,466 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,554,814 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,576,423 UART: [afmc] --
28,581,041 UART: [cold-reset] --
28,583,874 UART: [state] Locking Datavault
28,589,273 UART: [state] Locking PCR0, PCR1 and PCR31
28,591,017 UART: [state] Locking ICCM
28,593,411 UART: [exit] Launching FMC @ 0x40000130
28,601,798 UART:
28,602,045 UART: Running Caliptra FMC ...
28,603,144 UART:
28,603,299 UART: [state] CFI Enabled
28,611,397 UART: [fht] FMC Alias Private Key: 7
30,951,156 UART: [art] Extend RT PCRs Done
30,952,384 UART: [art] Lock RT PCRs Done
30,954,167 UART: [art] Populate DV Done
30,959,685 UART: [fht] FMC Alias Private Key: 7
30,961,273 UART: [art] Derive CDI
30,962,080 UART: [art] Store in slot 0x4
31,004,834 UART: [art] Derive Key Pair
31,005,834 UART: [art] Store priv key in slot 0x5
34,248,937 UART: [art] Derive Key Pair - Done
34,261,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,542,545 UART: [art] Erasing AUTHORITY.KEYID = 7
36,544,053 UART: [art] PUB.X = 425732A5826EAA198EFE34785467EEDA41439EF28793EA1456EAC685E1C1E8ACD03856EE38804015E2274A78AA28A8C8
36,551,308 UART: [art] PUB.Y = C5F475126B0C426B24F4CE13D1ABA46DAE34EE93FA04D99B5C80E9C374244B0E5112495FD1838850346F86D678D5E731
36,558,586 UART: [art] SIG.R = BA278438736EF1D419505155F6797E242D22D92390A559E468F582F388F76A27C7090E34267D9C682299E545FB0A8671
36,565,920 UART: [art] SIG.S = C11636A23092DD290F0756079C6B6D94451E5397C36AFEA992813F5BC69948F237B5B5495AE466A727DCCD9A2F2F90A1
37,871,771 UART: Caliptra RT
37,872,479 UART: [state] CFI Enabled
38,006,349 UART: [rt] RT listening for mailbox commands...
38,008,681 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,163,864 UART: [rt]cmd =0x41544d4e, len=14344
40,303,839 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
4,128,935 ready_for_fw is high
4,129,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,010,711 >>> mbox cmd response: success
27,649,648 UART:
27,650,031 UART: Running Caliptra FMC ...
27,651,159 UART:
27,651,318 UART: [state] CFI Enabled
27,659,431 UART: [fht] FMC Alias Private Key: 7
29,999,424 UART: [art] Extend RT PCRs Done
30,000,658 UART: [art] Lock RT PCRs Done
30,002,178 UART: [art] Populate DV Done
30,007,637 UART: [fht] FMC Alias Private Key: 7
30,009,235 UART: [art] Derive CDI
30,010,051 UART: [art] Store in slot 0x4
30,052,889 UART: [art] Derive Key Pair
30,053,937 UART: [art] Store priv key in slot 0x5
33,296,086 UART: [art] Derive Key Pair - Done
33,308,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,589,190 UART: [art] Erasing AUTHORITY.KEYID = 7
35,590,720 UART: [art] PUB.X = 060D24EA21579EE02319BB64B0DC806FBFFC8078FF2200C6FAE02C5B005E9D591A8F3C00BE0CEA76AFC51D5EAAD9A287
35,597,912 UART: [art] PUB.Y = 946F3DA94C82464C784179C1F0913FA9FF6FE295AB6AB6897C3CFFCD3FB9A5A5302977B1699A49AF165C01EB600D3745
35,605,174 UART: [art] SIG.R = 51F626F0BF81D74036BA98F15AB66F6BCEE1B129DCE29CAA7267A2FBF0F855356A1553330A937916D01002EDF6D6CC35
35,612,567 UART: [art] SIG.S = 9E1B1A9BECD0D5815A1D8A7669636CF733DC7C07FB42ED4545232933EB9FEEDD8D66066506A5D37CAE944BC871665302
36,918,297 UART: Caliptra RT
36,918,990 UART: [state] CFI Enabled
37,051,393 UART: [rt] RT listening for mailbox commands...
37,053,709 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,208,866 UART: [rt]cmd =0x41544d4e, len=14344
39,219,042 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
192,124 UART:
192,481 UART: Running Caliptra ROM ...
193,613 UART:
193,758 UART: [state] CFI Enabled
265,869 UART: [state] LifecycleState = Unprovisioned
267,853 UART: [state] DebugLocked = No
270,738 UART: [state] WD Timer not started. Device not locked for debugging
273,732 UART: [kat] SHA2-256
453,404 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,144 UART: [kat] ++
464,687 UART: [kat] sha1
476,478 UART: [kat] SHA2-256
479,202 UART: [kat] SHA2-384
484,923 UART: [kat] SHA2-512-ACC
487,299 UART: [kat] ECC-384
2,949,963 UART: [kat] HMAC-384Kdf
2,971,151 UART: [kat] LMS
3,447,690 UART: [kat] --
3,453,065 UART: [cold-reset] ++
3,454,059 UART: [fht] FHT @ 0x50003400
3,465,603 UART: [idev] ++
3,466,176 UART: [idev] CDI.KEYID = 6
3,467,210 UART: [idev] SUBJECT.KEYID = 7
3,468,379 UART: [idev] UDS.KEYID = 0
3,469,298 ready_for_fw is high
3,469,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,077 UART: [idev] Erasing UDS.KEYID = 0
5,987,525 UART: [idev] Sha1 KeyId Algorithm
6,011,015 UART: [idev] --
6,016,592 UART: [ldev] ++
6,017,213 UART: [ldev] CDI.KEYID = 6
6,018,135 UART: [ldev] SUBJECT.KEYID = 5
6,019,292 UART: [ldev] AUTHORITY.KEYID = 7
6,020,575 UART: [ldev] FE.KEYID = 1
6,057,739 UART: [ldev] Erasing FE.KEYID = 1
8,563,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,105 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,343 UART: [ldev] --
10,375,220 UART: [fwproc] Wait for Commands...
10,377,360 UART: [fwproc] Recv command 0x46574c44
10,379,336 UART: [fwproc] Recv'd Img size: 118548 bytes
14,896,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,977,538 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,050,552 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,378,490 >>> mbox cmd response: success
15,383,009 UART: [afmc] ++
15,383,595 UART: [afmc] CDI.KEYID = 6
15,384,482 UART: [afmc] SUBJECT.KEYID = 7
15,385,747 UART: [afmc] AUTHORITY.KEYID = 5
17,920,000 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,644,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,646,681 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,662,515 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,678,448 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,694,200 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,717,741 UART: [afmc] --
19,720,692 UART: [cold-reset] --
19,724,277 UART: [state] Locking Datavault
19,731,156 UART: [state] Locking PCR0, PCR1 and PCR31
19,732,906 UART: [state] Locking ICCM
19,734,673 UART: [exit] Launching FMC @ 0x40000130
19,743,075 UART:
19,743,309 UART: Running Caliptra FMC ...
19,744,407 UART:
19,744,569 UART: [state] CFI Enabled
19,801,191 UART: [fht] FMC Alias Private Key: 7
21,567,620 UART: [art] Extend RT PCRs Done
21,568,841 UART: [art] Lock RT PCRs Done
21,570,629 UART: [art] Populate DV Done
21,576,037 UART: [fht] FMC Alias Private Key: 7
21,577,570 UART: [art] Derive CDI
21,578,330 UART: [art] Store in slot 0x4
21,634,067 UART: [art] Derive Key Pair
21,635,112 UART: [art] Store priv key in slot 0x5
24,097,882 UART: [art] Derive Key Pair - Done
24,111,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,824,335 UART: [art] Erasing AUTHORITY.KEYID = 7
25,825,834 UART: [art] PUB.X = 40D2847A4ECB089C97ECDB53DA2102D4324FA9A94627EEEAB2EC2FE47415EBB454F67159B0B149A9809BDB948633FD3A
25,833,134 UART: [art] PUB.Y = 39AD3F98A10D57EBBF8EF70576742929D55DDF5E1AA8E499C80E36059549B074AEA27759052865409E9E39CA61C97F3D
25,840,369 UART: [art] SIG.R = AA41E27D0242577BE1A2992DB3E4C7F9D1C57667BBE5F625BB33595CA7D730244461C52E37E0804AF3E8B9DF1BF30813
25,847,755 UART: [art] SIG.S = 22296677C0CE9C48288DFA12B46F523540D21C61C7DA461D46C5F110DB798BD03B993464F2FB8BF41A647D914C0ED375
26,826,002 UART: Caliptra RT
26,826,717 UART: [state] CFI Enabled
27,008,718 UART: [rt] RT listening for mailbox commands...
27,011,249 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,166,512 UART: [rt]cmd =0x41544d4e, len=14344
28,364,488 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,946 writing to cptra_bootfsm_go
3,460,143 ready_for_fw is high
3,460,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,394,853 >>> mbox cmd response: success
19,704,433 UART:
19,704,827 UART: Running Caliptra FMC ...
19,706,010 UART:
19,706,186 UART: [state] CFI Enabled
19,774,254 UART: [fht] FMC Alias Private Key: 7
21,540,990 UART: [art] Extend RT PCRs Done
21,542,202 UART: [art] Lock RT PCRs Done
21,544,149 UART: [art] Populate DV Done
21,549,507 UART: [fht] FMC Alias Private Key: 7
21,551,150 UART: [art] Derive CDI
21,551,962 UART: [art] Store in slot 0x4
21,607,648 UART: [art] Derive Key Pair
21,608,685 UART: [art] Store priv key in slot 0x5
24,071,134 UART: [art] Derive Key Pair - Done
24,084,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,797,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,798,678 UART: [art] PUB.X = 1806111071374186DF72FD79D90F03ABF18581E8F47A54C863899AB05D7A413212D46F91CC8138DA4F992517FE77609C
25,805,936 UART: [art] PUB.Y = 60FF7A32CF9A2CC0DF9A3B6DE5D68E54AD8B8583B943C3767E9FA1F24F60119F91C31CAADCE9078BAA8E321F12432ECA
25,813,209 UART: [art] SIG.R = 6CB9977060EE70C1D9612086AE884446A409C4AAD773B1C3998DC11ABD4F055D8E07781FA7F5BCB4FB7DF654AF635C14
25,820,620 UART: [art] SIG.S = 125ACAEE834A8EB1767C76DDAEFB3962881AD34391AA8AC86EF87BEC62870D5A44D3AA841D0178673E6CA50DF0662841
26,799,245 UART: Caliptra RT
26,799,958 UART: [state] CFI Enabled
26,981,069 UART: [rt] RT listening for mailbox commands...
26,983,410 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,138,669 UART: [rt]cmd =0x41544d4e, len=14344
28,335,546 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
192,708 UART:
193,060 UART: Running Caliptra ROM ...
194,182 UART:
603,808 UART: [state] CFI Enabled
618,795 UART: [state] LifecycleState = Unprovisioned
620,707 UART: [state] DebugLocked = No
622,051 UART: [state] WD Timer not started. Device not locked for debugging
625,174 UART: [kat] SHA2-256
804,775 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,593 UART: [kat] ++
816,069 UART: [kat] sha1
826,808 UART: [kat] SHA2-256
829,532 UART: [kat] SHA2-384
835,169 UART: [kat] SHA2-512-ACC
837,550 UART: [kat] ECC-384
3,281,406 UART: [kat] HMAC-384Kdf
3,293,918 UART: [kat] LMS
3,770,452 UART: [kat] --
3,775,110 UART: [cold-reset] ++
3,777,539 UART: [fht] FHT @ 0x50003400
3,789,935 UART: [idev] ++
3,790,506 UART: [idev] CDI.KEYID = 6
3,791,480 UART: [idev] SUBJECT.KEYID = 7
3,792,729 UART: [idev] UDS.KEYID = 0
3,793,637 ready_for_fw is high
3,793,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,675 UART: [idev] Erasing UDS.KEYID = 0
6,269,310 UART: [idev] Sha1 KeyId Algorithm
6,291,933 UART: [idev] --
6,295,794 UART: [ldev] ++
6,296,373 UART: [ldev] CDI.KEYID = 6
6,297,285 UART: [ldev] SUBJECT.KEYID = 5
6,298,504 UART: [ldev] AUTHORITY.KEYID = 7
6,299,737 UART: [ldev] FE.KEYID = 1
6,313,331 UART: [ldev] Erasing FE.KEYID = 1
8,794,397 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,373 UART: [ldev] --
10,586,258 UART: [fwproc] Wait for Commands...
10,588,300 UART: [fwproc] Recv command 0x46574c44
10,590,342 UART: [fwproc] Recv'd Img size: 118548 bytes
15,118,378 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,200,446 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,273,440 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,602,493 >>> mbox cmd response: success
15,607,142 UART: [afmc] ++
15,607,758 UART: [afmc] CDI.KEYID = 6
15,608,647 UART: [afmc] SUBJECT.KEYID = 7
15,609,924 UART: [afmc] AUTHORITY.KEYID = 5
18,117,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,840,390 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,842,582 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,858,467 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,874,389 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,890,117 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,915,690 UART: [afmc] --
19,918,966 UART: [cold-reset] --
19,921,261 UART: [state] Locking Datavault
19,925,268 UART: [state] Locking PCR0, PCR1 and PCR31
19,927,022 UART: [state] Locking ICCM
19,928,534 UART: [exit] Launching FMC @ 0x40000130
19,936,930 UART:
19,937,173 UART: Running Caliptra FMC ...
19,938,277 UART:
19,938,435 UART: [state] CFI Enabled
19,946,648 UART: [fht] FMC Alias Private Key: 7
21,712,747 UART: [art] Extend RT PCRs Done
21,713,996 UART: [art] Lock RT PCRs Done
21,715,519 UART: [art] Populate DV Done
21,721,041 UART: [fht] FMC Alias Private Key: 7
21,722,757 UART: [art] Derive CDI
21,723,578 UART: [art] Store in slot 0x4
21,766,558 UART: [art] Derive Key Pair
21,767,590 UART: [art] Store priv key in slot 0x5
24,194,131 UART: [art] Derive Key Pair - Done
24,207,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,913,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,915,124 UART: [art] PUB.X = 9A060046300DEEEBC889EEC48DBBC2AA552048A6C95FB68AB8119738A9F83DD297A6CB7DEC42622910AC1471DE06AD39
25,922,428 UART: [art] PUB.Y = 7595C8401C24DFE9FE0AC03F83D1612C94C63A60A1FB718B75244B50F1F976D5D6FF44B8D7B93EA9671DEBD4AFAEA6E0
25,929,659 UART: [art] SIG.R = FCB07AAFD614AB326A0E58CAFA0418E5A78D761B63BF414E2556BC766FA43EB3A030DDBC7891698E15E90F8E0E3B213E
25,937,114 UART: [art] SIG.S = 257A68D5970031ADAEA2BA43D8852485ABCE0546A8D88E29AC19BAD94103B9D6BECB8A94C4D7C2A33B990244344D07E8
26,916,189 UART: Caliptra RT
26,916,900 UART: [state] CFI Enabled
27,049,963 UART: [rt] RT listening for mailbox commands...
27,052,264 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,207,357 UART: [rt]cmd =0x41544d4e, len=14344
28,409,089 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,776,776 ready_for_fw is high
3,777,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,597,339 >>> mbox cmd response: success
19,845,233 UART:
19,845,623 UART: Running Caliptra FMC ...
19,846,768 UART:
19,846,932 UART: [state] CFI Enabled
19,854,726 UART: [fht] FMC Alias Private Key: 7
21,620,638 UART: [art] Extend RT PCRs Done
21,621,875 UART: [art] Lock RT PCRs Done
21,623,616 UART: [art] Populate DV Done
21,629,042 UART: [fht] FMC Alias Private Key: 7
21,630,812 UART: [art] Derive CDI
21,631,554 UART: [art] Store in slot 0x4
21,674,212 UART: [art] Derive Key Pair
21,675,259 UART: [art] Store priv key in slot 0x5
24,101,774 UART: [art] Derive Key Pair - Done
24,114,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,820,760 UART: [art] Erasing AUTHORITY.KEYID = 7
25,822,282 UART: [art] PUB.X = 30F37F9A4218D8255D5949CA6760847E2FDE2E5592B9CF3E45F6D5D430D1369A82721F3755CEF5830E32977D6EB8A3CA
25,829,540 UART: [art] PUB.Y = A07F6C30D2AA64ED66D56A16D78973D160F2CA0509E82EA926F811AE6BEB4AB98E5216D6957505739A94B2B7ADC5D7B9
25,836,821 UART: [art] SIG.R = 5411A4DEC27B0E1373E646DF6987614DB12C4426B1C941FC99FF8DDAC27B32CE08E9C37AF9823ECBA972EA0E8CCAE076
25,844,261 UART: [art] SIG.S = C4DAC0284EF85E6387AF11DC5E956378AE9EA40217E9F6CC4A38F18D0B6DA7E62A81C5F92A1A08A4C41FB6B7F6D09469
26,822,645 UART: Caliptra RT
26,823,334 UART: [state] CFI Enabled
26,955,848 UART: [rt] RT listening for mailbox commands...
26,958,162 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,561 UART: [rt]cmd =0x41544d4e, len=14344
28,315,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,297 UART:
192,653 UART: Running Caliptra ROM ...
193,812 UART:
193,959 UART: [state] CFI Enabled
263,814 UART: [state] LifecycleState = Unprovisioned
266,216 UART: [state] DebugLocked = No
267,826 UART: [state] WD Timer not started. Device not locked for debugging
272,227 UART: [kat] SHA2-256
462,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,846 UART: [kat] ++
473,305 UART: [kat] sha1
485,104 UART: [kat] SHA2-256
488,114 UART: [kat] SHA2-384
494,389 UART: [kat] SHA2-512-ACC
496,968 UART: [kat] ECC-384
2,948,618 UART: [kat] HMAC-384Kdf
2,972,371 UART: [kat] LMS
3,504,107 UART: [kat] --
3,508,280 UART: [cold-reset] ++
3,510,785 UART: [fht] FHT @ 0x50003400
3,523,037 UART: [idev] ++
3,523,682 UART: [idev] CDI.KEYID = 6
3,524,672 UART: [idev] SUBJECT.KEYID = 7
3,525,799 UART: [idev] UDS.KEYID = 0
3,526,843 ready_for_fw is high
3,527,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,291 UART: [idev] Erasing UDS.KEYID = 0
6,029,291 UART: [idev] Sha1 KeyId Algorithm
6,051,013 UART: [idev] --
6,054,526 UART: [ldev] ++
6,055,205 UART: [ldev] CDI.KEYID = 6
6,056,113 UART: [ldev] SUBJECT.KEYID = 5
6,057,187 UART: [ldev] AUTHORITY.KEYID = 7
6,058,535 UART: [ldev] FE.KEYID = 1
6,102,047 UART: [ldev] Erasing FE.KEYID = 1
8,605,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,379 UART: [ldev] --
10,419,502 UART: [fwproc] Wait for Commands...
10,422,347 UART: [fwproc] Recv command 0x46574c44
10,424,803 UART: [fwproc] Recv'd Img size: 118548 bytes
15,103,685 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,179,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,303,475 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,863,233 >>> mbox cmd response: success
15,867,037 UART: [afmc] ++
15,867,729 UART: [afmc] CDI.KEYID = 6
15,868,923 UART: [afmc] SUBJECT.KEYID = 7
15,870,365 UART: [afmc] AUTHORITY.KEYID = 5
18,411,847 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,152,747 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,154,677 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,169,808 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,184,991 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,200,040 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,223,590 UART: [afmc] --
20,226,802 UART: [cold-reset] --
20,231,690 UART: [state] Locking Datavault
20,235,971 UART: [state] Locking PCR0, PCR1 and PCR31
20,238,122 UART: [state] Locking ICCM
20,239,355 UART: [exit] Launching FMC @ 0x40000130
20,248,031 UART:
20,248,267 UART: Running Caliptra FMC ...
20,249,365 UART:
20,249,521 UART: [state] CFI Enabled
20,311,398 UART: [fht] FMC Alias Private Key: 7
22,077,622 UART: [art] Extend RT PCRs Done
22,078,841 UART: [art] Lock RT PCRs Done
22,080,434 UART: [art] Populate DV Done
22,085,906 UART: [fht] FMC Alias Private Key: 7
22,087,549 UART: [art] Derive CDI
22,088,361 UART: [art] Store in slot 0x4
22,143,891 UART: [art] Derive Key Pair
22,144,932 UART: [art] Store priv key in slot 0x5
24,607,953 UART: [art] Derive Key Pair - Done
24,621,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,333,408 UART: [art] Erasing AUTHORITY.KEYID = 7
26,334,913 UART: [art] PUB.X = 8ED45AE65AE963421602A9967193BB9700073B609A9B0189349CE9348FE327CCFAC7EA15617D9ACECD0BCEB0817C75A2
26,342,182 UART: [art] PUB.Y = ADDCF475AAC1F02C9A5873E742E5665070254D7E1245468AAFD197970E4D3DD0C0F1FAC2A6C81CBA1AA95382BC2E0A68
26,349,456 UART: [art] SIG.R = 63307EC71B6750595A1E00B282B44332860FB7D12A6746C3361DFEFAEB6BEE2DFA8DC48F240731FDFF1BB1897707C859
26,356,809 UART: [art] SIG.S = F9403A65F800FE738ECC3113460044E2D5F5B3D3C57A004F7502F9A0FEF4F45D38F97C78F1BB0F33CBCE2D97B7A5CAF9
27,335,947 UART: Caliptra RT
27,336,634 UART: [state] CFI Enabled
27,516,379 UART: [rt] RT listening for mailbox commands...
27,518,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,674,000 UART: [rt]cmd =0x41544d4e, len=14344
28,881,608 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
3,441,710 ready_for_fw is high
3,442,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,924,913 >>> mbox cmd response: success
20,220,433 UART:
20,220,933 UART: Running Caliptra FMC ...
20,222,047 UART:
20,222,214 UART: [state] CFI Enabled
20,290,019 UART: [fht] FMC Alias Private Key: 7
22,055,992 UART: [art] Extend RT PCRs Done
22,057,230 UART: [art] Lock RT PCRs Done
22,058,723 UART: [art] Populate DV Done
22,064,199 UART: [fht] FMC Alias Private Key: 7
22,065,739 UART: [art] Derive CDI
22,066,534 UART: [art] Store in slot 0x4
22,122,720 UART: [art] Derive Key Pair
22,123,765 UART: [art] Store priv key in slot 0x5
24,586,544 UART: [art] Derive Key Pair - Done
24,599,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,602 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,108 UART: [art] PUB.X = 7B30463A80410309ACB1BD08090572CF8EA3A4B46543CC0541707530587D69539AC6F23B7C0CE7BDCA46ACC8E06D4327
26,320,348 UART: [art] PUB.Y = AED68320C33E98977BE8E18EE54DD64153E21956B4F083992238DE04B398C5E21D5193533640CA9281F00E0C113FC821
26,327,593 UART: [art] SIG.R = 9D86A5C3108CD8446AD99A205AA07F781809419A1B0A28D4AEE388614A24BEBECE90E040B37ADEA4C2924273DCCF67E1
26,334,945 UART: [art] SIG.S = 03BD306B8B03DCF81E73C0FC0522CCF46A5F1104AE41CF164B28C98C4F231E8AA5BDF44BDA692E75745E3D5E2D8195B7
27,314,082 UART: Caliptra RT
27,314,770 UART: [state] CFI Enabled
27,496,412 UART: [rt] RT listening for mailbox commands...
27,498,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,654,193 UART: [rt]cmd =0x41544d4e, len=14344
28,852,205 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
192,421 UART:
192,788 UART: Running Caliptra ROM ...
193,921 UART:
603,566 UART: [state] CFI Enabled
620,294 UART: [state] LifecycleState = Unprovisioned
622,612 UART: [state] DebugLocked = No
624,642 UART: [state] WD Timer not started. Device not locked for debugging
629,325 UART: [kat] SHA2-256
819,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,008 UART: [kat] ++
830,555 UART: [kat] sha1
842,789 UART: [kat] SHA2-256
845,799 UART: [kat] SHA2-384
850,879 UART: [kat] SHA2-512-ACC
853,464 UART: [kat] ECC-384
3,294,887 UART: [kat] HMAC-384Kdf
3,307,050 UART: [kat] LMS
3,838,850 UART: [kat] --
3,843,215 UART: [cold-reset] ++
3,845,439 UART: [fht] FHT @ 0x50003400
3,856,720 UART: [idev] ++
3,857,393 UART: [idev] CDI.KEYID = 6
3,858,314 UART: [idev] SUBJECT.KEYID = 7
3,859,568 UART: [idev] UDS.KEYID = 0
3,860,784 ready_for_fw is high
3,860,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,085 UART: [idev] Erasing UDS.KEYID = 0
6,338,181 UART: [idev] Sha1 KeyId Algorithm
6,361,145 UART: [idev] --
6,365,469 UART: [ldev] ++
6,366,205 UART: [ldev] CDI.KEYID = 6
6,367,122 UART: [ldev] SUBJECT.KEYID = 5
6,368,285 UART: [ldev] AUTHORITY.KEYID = 7
6,369,517 UART: [ldev] FE.KEYID = 1
6,380,922 UART: [ldev] Erasing FE.KEYID = 1
8,859,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,584 UART: [ldev] --
10,651,310 UART: [fwproc] Wait for Commands...
10,653,227 UART: [fwproc] Recv command 0x46574c44
10,655,547 UART: [fwproc] Recv'd Img size: 118548 bytes
15,326,707 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,404,885 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,528,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,088,084 >>> mbox cmd response: success
16,092,953 UART: [afmc] ++
16,093,712 UART: [afmc] CDI.KEYID = 6
16,094,921 UART: [afmc] SUBJECT.KEYID = 7
16,096,323 UART: [afmc] AUTHORITY.KEYID = 5
18,602,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,324,193 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,326,152 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,341,270 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,356,503 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,371,545 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,395,252 UART: [afmc] --
20,398,917 UART: [cold-reset] --
20,403,605 UART: [state] Locking Datavault
20,408,816 UART: [state] Locking PCR0, PCR1 and PCR31
20,410,976 UART: [state] Locking ICCM
20,412,167 UART: [exit] Launching FMC @ 0x40000130
20,420,825 UART:
20,421,070 UART: Running Caliptra FMC ...
20,422,102 UART:
20,422,254 UART: [state] CFI Enabled
20,430,631 UART: [fht] FMC Alias Private Key: 7
22,196,861 UART: [art] Extend RT PCRs Done
22,198,086 UART: [art] Lock RT PCRs Done
22,199,698 UART: [art] Populate DV Done
22,204,917 UART: [fht] FMC Alias Private Key: 7
22,206,408 UART: [art] Derive CDI
22,207,146 UART: [art] Store in slot 0x4
22,249,696 UART: [art] Derive Key Pair
22,250,703 UART: [art] Store priv key in slot 0x5
24,677,834 UART: [art] Derive Key Pair - Done
24,690,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,397,616 UART: [art] Erasing AUTHORITY.KEYID = 7
26,399,125 UART: [art] PUB.X = 1229F2C51A5D17AE22B6022785F4D62B04EE936CFED20620B23A6AC5946BF497BE3F09ED491AFF99E31F335555298164
26,406,383 UART: [art] PUB.Y = 7AD9CCA3C0B1090149118FA8E6DD7442B44925D5686AF35FAA765AFDED8C25F35007FA634C61134D7B7C971E44ACA7DF
26,413,677 UART: [art] SIG.R = 827743D0140D97358736AA8B1A190E9E1AAB88F791B8DEC94392B2B4D87802BE0319F9871FB2F2F85C5B06F87D4FF075
26,421,054 UART: [art] SIG.S = 8717A3DAC5590F059D652D2D8FFECCB6365FBDB1A8753FCDEBEEC61908454050FF1D55DB3A5BC0CF787A2C1703729F72
27,399,878 UART: Caliptra RT
27,400,594 UART: [state] CFI Enabled
27,533,817 UART: [rt] RT listening for mailbox commands...
27,536,125 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,691,381 UART: [rt]cmd =0x41544d4e, len=14344
28,899,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
3,758,000 ready_for_fw is high
3,758,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,141,597 >>> mbox cmd response: success
20,398,757 UART:
20,399,158 UART: Running Caliptra FMC ...
20,400,370 UART:
20,400,545 UART: [state] CFI Enabled
20,408,121 UART: [fht] FMC Alias Private Key: 7
22,173,992 UART: [art] Extend RT PCRs Done
22,175,220 UART: [art] Lock RT PCRs Done
22,177,067 UART: [art] Populate DV Done
22,182,868 UART: [fht] FMC Alias Private Key: 7
22,184,521 UART: [art] Derive CDI
22,185,344 UART: [art] Store in slot 0x4
22,227,630 UART: [art] Derive Key Pair
22,228,675 UART: [art] Store priv key in slot 0x5
24,655,565 UART: [art] Derive Key Pair - Done
24,668,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,375,082 UART: [art] Erasing AUTHORITY.KEYID = 7
26,376,591 UART: [art] PUB.X = 9068946E1F04B5468FEAEA2B6F3E055BB1DC845B9BD60357F3FC6A978CE943AC638399C549D25E136F032B787A95572D
26,383,863 UART: [art] PUB.Y = 032EFE505E6E406386BC8F53C4C6AC30823A354FEFCDA1ADD7B394FAD52B311DF168722B0AAD0B788B4D0EC19AADCBE6
26,391,159 UART: [art] SIG.R = 06A6B83DE2AD872F4FAD3B009FCD81E1A5379F1F807DFD394DA07BEEB9F3798C16D0DF6297B22ED133984745E5EE979D
26,398,538 UART: [art] SIG.S = 073CC1F2EF2D040FD381099C98060905118B35218C2AC5E984C5688504CF09C9D9899F738720D30DDCA42D2BB3538017
27,377,444 UART: Caliptra RT
27,378,133 UART: [state] CFI Enabled
27,511,409 UART: [rt] RT listening for mailbox commands...
27,513,735 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,668,873 UART: [rt]cmd =0x41544d4e, len=14344
28,876,415 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,736 UART: [state] LifecycleState = Unprovisioned
86,391 UART: [state] DebugLocked = No
87,101 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,769 UART: [kat] SHA2-256
882,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,815 UART: [kat] ++
886,967 UART: [kat] sha1
891,345 UART: [kat] SHA2-256
893,283 UART: [kat] SHA2-384
895,988 UART: [kat] SHA2-512-ACC
897,889 UART: [kat] ECC-384
903,558 UART: [kat] HMAC-384Kdf
907,940 UART: [kat] LMS
1,476,136 UART: [kat] --
1,477,181 UART: [cold-reset] ++
1,477,647 UART: [fht] Storing FHT @ 0x50003400
1,480,466 UART: [idev] ++
1,480,634 UART: [idev] CDI.KEYID = 6
1,480,994 UART: [idev] SUBJECT.KEYID = 7
1,481,418 UART: [idev] UDS.KEYID = 0
1,481,763 ready_for_fw is high
1,481,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,254 UART: [idev] Erasing UDS.KEYID = 0
1,505,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,338 UART: [idev] --
1,515,395 UART: [ldev] ++
1,515,563 UART: [ldev] CDI.KEYID = 6
1,515,926 UART: [ldev] SUBJECT.KEYID = 5
1,516,352 UART: [ldev] AUTHORITY.KEYID = 7
1,516,815 UART: [ldev] FE.KEYID = 1
1,522,037 UART: [ldev] Erasing FE.KEYID = 1
1,546,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,371 UART: [fwproc] Waiting for Commands...
1,587,202 UART: [fwproc] Received command 0x46574c44
1,587,993 UART: [fwproc] Received Image of size 118548 bytes
5,319,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,347,816 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,379,034 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,519,319 >>> mbox cmd response: success
5,520,511 UART: [afmc] ++
5,520,679 UART: [afmc] CDI.KEYID = 6
5,521,041 UART: [afmc] SUBJECT.KEYID = 7
5,521,466 UART: [afmc] AUTHORITY.KEYID = 5
5,556,271 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,572,771 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,573,551 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,579,257 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,585,136 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,590,849 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,598,740 UART: [afmc] --
5,599,628 UART: [cold-reset] --
5,600,232 UART: [state] Locking Datavault
5,601,695 UART: [state] Locking PCR0, PCR1 and PCR31
5,602,299 UART: [state] Locking ICCM
5,602,741 UART: [exit] Launching FMC @ 0x40000130
5,608,071 UART:
5,608,087 UART: Running Caliptra FMC ...
5,608,495 UART:
5,608,549 UART: [state] CFI Enabled
5,618,847 UART: [fht] FMC Alias Private Key: 7
5,738,125 UART: [art] Extend RT PCRs Done
5,738,553 UART: [art] Lock RT PCRs Done
5,739,977 UART: [art] Populate DV Done
5,748,048 UART: [fht] FMC Alias Private Key: 7
5,749,108 UART: [art] Derive CDI
5,749,388 UART: [art] Store in slot 0x4
5,835,198 UART: [art] Derive Key Pair
5,835,558 UART: [art] Store priv key in slot 0x5
5,848,555 UART: [art] Derive Key Pair - Done
5,863,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,334 UART: [art] Erasing AUTHORITY.KEYID = 7
5,879,099 UART: [art] PUB.X = AA023D2436F09AA80E9A762287E246EC8F8F60094E25B86F6DD7BF7B03030DDB557BE16465289805179341CB5B3A4344
5,885,846 UART: [art] PUB.Y = 91F3327A9ABE7065D9226D8D8FFFA29347478B9DC59534D1AAE4F92148BBCC8B478877C834A372389FDEA243E62D21E4
5,892,802 UART: [art] SIG.R = B21A0C90BBE2AFA47E572973AB805449E64654B75C973F8CC102BB150324C128153128DA300127A0C78F34D427BDA078
5,899,558 UART: [art] SIG.S = 8D28992B41CBA9DA545A9D5D5EAB2192B636732BBB9A19B1CC22F7D5D8229743B63C41004C97694AC7A23A7004F7A012
5,923,285 UART: Caliptra RT
5,923,536 UART: [state] CFI Enabled
6,044,477 UART: [rt] RT listening for mailbox commands...
6,045,147 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,167,859 UART: [rt]cmd =0x41544d4e, len=14344
7,288,333 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,713 ready_for_fw is high
1,362,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,481,278 >>> mbox cmd response: success
5,542,055 UART:
5,542,071 UART: Running Caliptra FMC ...
5,542,479 UART:
5,542,533 UART: [state] CFI Enabled
5,552,861 UART: [fht] FMC Alias Private Key: 7
5,671,957 UART: [art] Extend RT PCRs Done
5,672,385 UART: [art] Lock RT PCRs Done
5,673,845 UART: [art] Populate DV Done
5,682,148 UART: [fht] FMC Alias Private Key: 7
5,683,314 UART: [art] Derive CDI
5,683,594 UART: [art] Store in slot 0x4
5,768,898 UART: [art] Derive Key Pair
5,769,258 UART: [art] Store priv key in slot 0x5
5,782,381 UART: [art] Derive Key Pair - Done
5,797,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,812,715 UART: [art] Erasing AUTHORITY.KEYID = 7
5,813,480 UART: [art] PUB.X = AC5FD14AA7EF9A37C660235A07BF9CEBC7AD8AF649AD2A53E76ED2A0E953625C99670ED33A02F775491AB8A76E2ED86D
5,820,261 UART: [art] PUB.Y = 70AA30AD11D1C0F4DD1BC17081194F39E85DF2140679FBAD5EBFA3516F22874FE59C06D3CAA89E997A98892B869385EC
5,827,215 UART: [art] SIG.R = 0029F4BEA3A756E16D15F7C6D6C22D1884ABCD74EF7A2039B67B669580CAE1F8BC1E5DA70B2FAE972A26D4F815532FE1
5,833,976 UART: [art] SIG.S = 5EC26BEE3431E3DB1C89BE0B7F93B252E249BA12F8088A91EC96F4B4ADE7F88422BBB6DBAA233CAD6112EDBF7B504FBF
5,858,104 UART: Caliptra RT
5,858,355 UART: [state] CFI Enabled
5,978,015 UART: [rt] RT listening for mailbox commands...
5,978,685 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,101,603 UART: [rt]cmd =0x41544d4e, len=14344
7,184,327 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.77s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,840 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,348 UART: [kat] SHA2-256
882,279 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,394 UART: [kat] ++
886,546 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,601 UART: [kat] SHA2-512-ACC
897,502 UART: [kat] ECC-384
903,209 UART: [kat] HMAC-384Kdf
907,807 UART: [kat] LMS
1,476,003 UART: [kat] --
1,477,072 UART: [cold-reset] ++
1,477,548 UART: [fht] Storing FHT @ 0x50003400
1,480,353 UART: [idev] ++
1,480,521 UART: [idev] CDI.KEYID = 6
1,480,881 UART: [idev] SUBJECT.KEYID = 7
1,481,305 UART: [idev] UDS.KEYID = 0
1,481,650 ready_for_fw is high
1,481,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,381 UART: [idev] Erasing UDS.KEYID = 0
1,505,855 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,397 UART: [idev] --
1,515,448 UART: [ldev] ++
1,515,616 UART: [ldev] CDI.KEYID = 6
1,515,979 UART: [ldev] SUBJECT.KEYID = 5
1,516,405 UART: [ldev] AUTHORITY.KEYID = 7
1,516,868 UART: [ldev] FE.KEYID = 1
1,522,068 UART: [ldev] Erasing FE.KEYID = 1
1,547,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,191 UART: [ldev] --
1,587,460 UART: [fwproc] Waiting for Commands...
1,588,097 UART: [fwproc] Received command 0x46574c44
1,588,888 UART: [fwproc] Received Image of size 118548 bytes
5,017,393 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,045,027 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,076,245 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,216,666 >>> mbox cmd response: success
5,217,702 UART: [afmc] ++
5,217,870 UART: [afmc] CDI.KEYID = 6
5,218,232 UART: [afmc] SUBJECT.KEYID = 7
5,218,657 UART: [afmc] AUTHORITY.KEYID = 5
5,254,404 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,270,578 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,271,358 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,277,064 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,282,943 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,288,656 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,296,551 UART: [afmc] --
5,297,451 UART: [cold-reset] --
5,298,181 UART: [state] Locking Datavault
5,299,374 UART: [state] Locking PCR0, PCR1 and PCR31
5,299,978 UART: [state] Locking ICCM
5,300,516 UART: [exit] Launching FMC @ 0x40000130
5,305,846 UART:
5,305,862 UART: Running Caliptra FMC ...
5,306,270 UART:
5,306,413 UART: [state] CFI Enabled
5,316,891 UART: [fht] FMC Alias Private Key: 7
5,435,611 UART: [art] Extend RT PCRs Done
5,436,039 UART: [art] Lock RT PCRs Done
5,437,429 UART: [art] Populate DV Done
5,445,432 UART: [fht] FMC Alias Private Key: 7
5,446,496 UART: [art] Derive CDI
5,446,776 UART: [art] Store in slot 0x4
5,532,240 UART: [art] Derive Key Pair
5,532,600 UART: [art] Store priv key in slot 0x5
5,545,839 UART: [art] Derive Key Pair - Done
5,560,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,575,972 UART: [art] Erasing AUTHORITY.KEYID = 7
5,576,737 UART: [art] PUB.X = 6B3415310A664E4E606D848492D426FD494F2412E594018F2A1AD41688397BEE90484865AA3CB01CECD496CC7A827BA4
5,583,499 UART: [art] PUB.Y = BA66C7944A421CF9685E78215F5E1A09CC8F1B085D2ED737D3E5BA5EA8469222AEE5DF3B9C1713E60205E243E3721FB8
5,590,445 UART: [art] SIG.R = E3E37A6A45B0058FF54B94F36F4F2C3214BB45FD4135DDDE84D85183F564348286912F86E0D065C13CE87A177F166623
5,597,210 UART: [art] SIG.S = C322F9CBBBBDFCC868BE2D03B922EC8C208AB985AB74A3EB38107805609A757709552524994A397EE2C2CCDAFD58E9FC
5,621,267 UART: Caliptra RT
5,621,610 UART: [state] CFI Enabled
5,741,017 UART: [rt] RT listening for mailbox commands...
5,741,687 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,864,613 UART: [rt]cmd =0x41544d4e, len=14344
7,060,908 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,214 ready_for_fw is high
1,362,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,444,262 >>> mbox cmd response: success
5,505,763 UART:
5,505,779 UART: Running Caliptra FMC ...
5,506,187 UART:
5,506,330 UART: [state] CFI Enabled
5,517,140 UART: [fht] FMC Alias Private Key: 7
5,636,152 UART: [art] Extend RT PCRs Done
5,636,580 UART: [art] Lock RT PCRs Done
5,637,950 UART: [art] Populate DV Done
5,646,325 UART: [fht] FMC Alias Private Key: 7
5,647,495 UART: [art] Derive CDI
5,647,775 UART: [art] Store in slot 0x4
5,733,469 UART: [art] Derive Key Pair
5,733,829 UART: [art] Store priv key in slot 0x5
5,747,256 UART: [art] Derive Key Pair - Done
5,762,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,247 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,012 UART: [art] PUB.X = 5A3E5A94BDFE7E7BF89893D329137FEC89E8A35469CFDBB297ACE50DFBF16FEF808496757244B6661459059C4B54B093
5,784,784 UART: [art] PUB.Y = 39E057C3E51418347D17EAA76AFCDBF2D4E98AB407CF7FF3143FEE17E2AC3DCB58F4CDF20FC5B3F559CC5E478ECC18AD
5,791,758 UART: [art] SIG.R = C122B08FB51ECD5DE7098270F8CA9268FC3EFF6E95193615927827A2C30DCD32AE2E1905699A0076F9972C52B53E3C16
5,798,499 UART: [art] SIG.S = A2350D20FDCB36222E160C15CA97B60986146D9EF96CACF7313CE2C8B53D943218C99ACDFB66117D19D57591256EC6C7
5,821,734 UART: Caliptra RT
5,822,077 UART: [state] CFI Enabled
5,942,354 UART: [rt] RT listening for mailbox commands...
5,943,024 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,066,104 UART: [rt]cmd =0x41544d4e, len=14344
7,225,363 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,346 UART: [state] LifecycleState = Unprovisioned
86,001 UART: [state] DebugLocked = No
86,665 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,914 UART: [kat] SHA2-256
901,854 UART: [kat] SHA2-384
904,643 UART: [kat] SHA2-512-ACC
906,544 UART: [kat] ECC-384
916,245 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,470 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 ready_for_fw is high
1,174,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,459 UART: [idev] Erasing UDS.KEYID = 0
1,199,119 UART: [idev] Sha1 KeyId Algorithm
1,207,987 UART: [idev] --
1,209,106 UART: [ldev] ++
1,209,274 UART: [ldev] CDI.KEYID = 6
1,209,638 UART: [ldev] SUBJECT.KEYID = 5
1,210,065 UART: [ldev] AUTHORITY.KEYID = 7
1,210,528 UART: [ldev] FE.KEYID = 1
1,215,822 UART: [ldev] Erasing FE.KEYID = 1
1,242,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,076 UART: [ldev] --
1,281,371 UART: [fwproc] Wait for Commands...
1,282,180 UART: [fwproc] Recv command 0x46574c44
1,282,913 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,220 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,784 >>> mbox cmd response: success
3,372,820 UART: [afmc] ++
3,372,988 UART: [afmc] CDI.KEYID = 6
3,373,351 UART: [afmc] SUBJECT.KEYID = 7
3,373,777 UART: [afmc] AUTHORITY.KEYID = 5
3,408,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,418 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,125 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,002 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,712 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,612 UART: [afmc] --
3,451,495 UART: [cold-reset] --
3,452,351 UART: [state] Locking Datavault
3,453,638 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,242 UART: [state] Locking ICCM
3,454,724 UART: [exit] Launching FMC @ 0x40000130
3,460,054 UART:
3,460,070 UART: Running Caliptra FMC ...
3,460,478 UART:
3,460,532 UART: [state] CFI Enabled
3,470,996 UART: [fht] FMC Alias Private Key: 7
3,590,200 UART: [art] Extend RT PCRs Done
3,590,628 UART: [art] Lock RT PCRs Done
3,592,420 UART: [art] Populate DV Done
3,600,639 UART: [fht] FMC Alias Private Key: 7
3,601,813 UART: [art] Derive CDI
3,602,093 UART: [art] Store in slot 0x4
3,688,148 UART: [art] Derive Key Pair
3,688,508 UART: [art] Store priv key in slot 0x5
3,702,056 UART: [art] Derive Key Pair - Done
3,716,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,823 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,588 UART: [art] PUB.X = 611819A06F817F3A729F6C953EC8E63A679034B2A98CDD5ECED2E6604EAA694B9F3735E1B971E8DDD7A8E0AC824C5D5F
3,739,372 UART: [art] PUB.Y = BB706EE8821812ABEC2AEF8BD4466492F28C8368930DA061FCE39EB1747B94380EB009F83B4AE37004EAFBB12EC6A287
3,746,322 UART: [art] SIG.R = 144AF276B8FC8C052E5FD2DC75CEEF95B7349E38A3902D2D7D8224DC37820CF192DF87CBEFD44FB0F696C94AA9F6B242
3,753,104 UART: [art] SIG.S = 91BFF53659F3FA356A1E57DE1AE0093B630880A1537FABC5571AFE9BE85EFD220C7B515C50FADE4908FDE0ECDC53041A
3,776,193 UART: Caliptra RT
3,776,444 UART: [state] CFI Enabled
3,896,200 UART: [rt] RT listening for mailbox commands...
3,896,870 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,892 UART: [rt]cmd =0x41544d4e, len=14344
4,317,401 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,058 ready_for_fw is high
1,058,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,741 >>> mbox cmd response: success
3,278,610 UART:
3,278,626 UART: Running Caliptra FMC ...
3,279,034 UART:
3,279,088 UART: [state] CFI Enabled
3,289,652 UART: [fht] FMC Alias Private Key: 7
3,408,222 UART: [art] Extend RT PCRs Done
3,408,650 UART: [art] Lock RT PCRs Done
3,410,188 UART: [art] Populate DV Done
3,418,445 UART: [fht] FMC Alias Private Key: 7
3,419,467 UART: [art] Derive CDI
3,419,747 UART: [art] Store in slot 0x4
3,505,644 UART: [art] Derive Key Pair
3,506,004 UART: [art] Store priv key in slot 0x5
3,519,532 UART: [art] Derive Key Pair - Done
3,534,192 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,549,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,390 UART: [art] PUB.X = 7E39323BF6B40FFA79C3539DD8CEF8BD59852E9E04F3579C8312BB93C3466EB0C64BC2747C534D39E1B279FC4A427CE6
3,557,164 UART: [art] PUB.Y = E475432EF91FD312AF84EB69544BDB2A0465AD2C84F9AC016C6218F87D7F563C88B39AD19F79356324C7CEC284B70BD2
3,564,113 UART: [art] SIG.R = C0735601F7C7095EF704D9DC8110EFFBEF4A263214D3C1E34F82885570863D1D9F84425E37F8CFFEE8BD5D3DEEB9BBBF
3,570,892 UART: [art] SIG.S = 7C5D3E3DC1C3C73C1770D10411C015A751AB96B822E3769421DFC567F8B7A14AAEB9CBE3141EDC6AEEC0CB589F7796CD
3,594,491 UART: Caliptra RT
3,594,742 UART: [state] CFI Enabled
3,714,388 UART: [rt] RT listening for mailbox commands...
3,715,058 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,096 UART: [rt]cmd =0x41544d4e, len=14344
4,141,771 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,065 UART: [kat] SHA2-256
902,005 UART: [kat] SHA2-384
904,906 UART: [kat] SHA2-512-ACC
906,807 UART: [kat] ECC-384
916,636 UART: [kat] HMAC-384Kdf
921,422 UART: [kat] LMS
1,169,734 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,803 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,174,713 ready_for_fw is high
1,174,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,534 UART: [idev] Erasing UDS.KEYID = 0
1,199,524 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,467 UART: [ldev] ++
1,209,635 UART: [ldev] CDI.KEYID = 6
1,209,999 UART: [ldev] SUBJECT.KEYID = 5
1,210,426 UART: [ldev] AUTHORITY.KEYID = 7
1,210,889 UART: [ldev] FE.KEYID = 1
1,216,065 UART: [ldev] Erasing FE.KEYID = 1
1,241,920 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,650 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,366 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,255 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,967 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,077 UART: [ldev] --
1,281,530 UART: [fwproc] Wait for Commands...
1,282,325 UART: [fwproc] Recv command 0x46574c44
1,283,058 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,086 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,856 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,145 >>> mbox cmd response: success
3,367,285 UART: [afmc] ++
3,367,453 UART: [afmc] CDI.KEYID = 6
3,367,816 UART: [afmc] SUBJECT.KEYID = 7
3,368,242 UART: [afmc] AUTHORITY.KEYID = 5
3,403,719 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,350 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,099 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,806 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,683 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,393 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,175 UART: [afmc] --
3,447,136 UART: [cold-reset] --
3,447,918 UART: [state] Locking Datavault
3,449,203 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,807 UART: [state] Locking ICCM
3,450,311 UART: [exit] Launching FMC @ 0x40000130
3,455,641 UART:
3,455,657 UART: Running Caliptra FMC ...
3,456,065 UART:
3,456,208 UART: [state] CFI Enabled
3,466,794 UART: [fht] FMC Alias Private Key: 7
3,585,604 UART: [art] Extend RT PCRs Done
3,586,032 UART: [art] Lock RT PCRs Done
3,587,420 UART: [art] Populate DV Done
3,595,543 UART: [fht] FMC Alias Private Key: 7
3,596,589 UART: [art] Derive CDI
3,596,869 UART: [art] Store in slot 0x4
3,682,714 UART: [art] Derive Key Pair
3,683,074 UART: [art] Store priv key in slot 0x5
3,696,458 UART: [art] Derive Key Pair - Done
3,711,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,433 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,198 UART: [art] PUB.X = D8A8FEFD5DD1CB926B21CB3C45C347DE56014D90137106708724DC5EB299F65B5CE4626072C0171D37D6662AE816772E
3,733,964 UART: [art] PUB.Y = CB5F6FA60DE6266EC8DD6205EBB14F00350AE283D04CCBA7C3B35A7DD02672946431F4163F518BBE51D70C55CEA3BAAF
3,740,900 UART: [art] SIG.R = B113C55B0531485AA614664BD06DF5EA1D23A78974E6E0F3F86F5E9C631A975920685F5E70D1976A6E4C7489E6BB7A82
3,747,667 UART: [art] SIG.S = FFFB84418C30B78567929CDA5993B3F78777DEE0256E5CDBECA21FF7857BEF8B6A73F856FB3F32D1215AAA4DA992B347
3,771,205 UART: Caliptra RT
3,771,548 UART: [state] CFI Enabled
3,892,063 UART: [rt] RT listening for mailbox commands...
3,892,733 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,867 UART: [rt]cmd =0x41544d4e, len=14344
4,306,053 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 ready_for_fw is high
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,316 >>> mbox cmd response: success
3,281,357 UART:
3,281,373 UART: Running Caliptra FMC ...
3,281,781 UART:
3,281,924 UART: [state] CFI Enabled
3,292,576 UART: [fht] FMC Alias Private Key: 7
3,411,594 UART: [art] Extend RT PCRs Done
3,412,022 UART: [art] Lock RT PCRs Done
3,413,826 UART: [art] Populate DV Done
3,421,895 UART: [fht] FMC Alias Private Key: 7
3,422,871 UART: [art] Derive CDI
3,423,151 UART: [art] Store in slot 0x4
3,509,190 UART: [art] Derive Key Pair
3,509,550 UART: [art] Store priv key in slot 0x5
3,522,464 UART: [art] Derive Key Pair - Done
3,537,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,605 UART: [art] PUB.X = 77719D11F72383591F15445486803AEAD5954BFFAAFB5B8147BE45A13C80D4B0AD2D9A4ACD26A50FA53A18126673CF34
3,560,378 UART: [art] PUB.Y = E73C82F070116BD4BF047C43E72B26A2E2732271DC8CA9A2781496C0203170A501D8899E37C4A553085CD1CFFCDA5C91
3,567,321 UART: [art] SIG.R = A0C7E229CC8CD447D99025CBBC603F841A3073B184CFE0AD4F4D3484344DE6336400A84CA2A2C7A5B4A8CA76780E2455
3,574,074 UART: [art] SIG.S = F77E66117D7D2DB39FED20A43EDA6D5A0C3638CC0979EB417378B58EA0A42BAD699FC41834F7320CBBB092E06C3FFCB5
3,598,489 UART: Caliptra RT
3,598,832 UART: [state] CFI Enabled
3,718,535 UART: [rt] RT listening for mailbox commands...
3,719,205 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,909 UART: [rt]cmd =0x41544d4e, len=14344
4,142,245 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,810 UART: [state] LifecycleState = Unprovisioned
85,465 UART: [state] DebugLocked = No
86,113 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,573 UART: [kat] SHA2-256
903,513 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,446 UART: [kat] HMAC-384Kdf
923,042 UART: [kat] LMS
1,171,370 UART: [kat] --
1,172,489 UART: [cold-reset] ++
1,172,975 UART: [fht] FHT @ 0x50003400
1,175,648 UART: [idev] ++
1,175,816 UART: [idev] CDI.KEYID = 6
1,176,176 UART: [idev] SUBJECT.KEYID = 7
1,176,600 UART: [idev] UDS.KEYID = 0
1,176,945 ready_for_fw is high
1,176,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,986 UART: [idev] Erasing UDS.KEYID = 0
1,201,905 UART: [idev] Sha1 KeyId Algorithm
1,210,617 UART: [idev] --
1,211,595 UART: [ldev] ++
1,211,763 UART: [ldev] CDI.KEYID = 6
1,212,126 UART: [ldev] SUBJECT.KEYID = 5
1,212,552 UART: [ldev] AUTHORITY.KEYID = 7
1,213,015 UART: [ldev] FE.KEYID = 1
1,218,243 UART: [ldev] Erasing FE.KEYID = 1
1,244,638 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,435 UART: [ldev] --
1,283,932 UART: [fwproc] Wait for Commands...
1,284,704 UART: [fwproc] Recv command 0x46574c44
1,285,432 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,785 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,596 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,766 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,943 >>> mbox cmd response: success
3,379,101 UART: [afmc] ++
3,379,269 UART: [afmc] CDI.KEYID = 6
3,379,631 UART: [afmc] SUBJECT.KEYID = 7
3,380,056 UART: [afmc] AUTHORITY.KEYID = 5
3,415,323 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,660 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,408 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,114 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,993 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,703 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,686 UART: [afmc] --
3,458,664 UART: [cold-reset] --
3,459,674 UART: [state] Locking Datavault
3,460,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,317 UART: [state] Locking ICCM
3,461,921 UART: [exit] Launching FMC @ 0x40000130
3,467,251 UART:
3,467,267 UART: Running Caliptra FMC ...
3,467,675 UART:
3,467,729 UART: [state] CFI Enabled
3,478,003 UART: [fht] FMC Alias Private Key: 7
3,596,925 UART: [art] Extend RT PCRs Done
3,597,353 UART: [art] Lock RT PCRs Done
3,598,565 UART: [art] Populate DV Done
3,606,668 UART: [fht] FMC Alias Private Key: 7
3,607,612 UART: [art] Derive CDI
3,607,892 UART: [art] Store in slot 0x4
3,693,881 UART: [art] Derive Key Pair
3,694,241 UART: [art] Store priv key in slot 0x5
3,707,881 UART: [art] Derive Key Pair - Done
3,722,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,113 UART: [art] PUB.X = 8CE6951E8806B8C2D455CA6929125D47FD61EA2EFB3C7AB4575E919A6EFF18E412C15AF966EA54DAF734ABED18FCD923
3,745,898 UART: [art] PUB.Y = 111CB05A9086AC3CC6F960A3D71E51B4838F514E912DAC91D465A8BA8CEA9092433BEB5F1E50262810BF0B41C2406A13
3,752,851 UART: [art] SIG.R = 018D6C0EDC270059B258416AFEAC0CEEF25E6385C6CE2E143E8AA0B055CC45E633DFE9BB61AEC36F0C43A1FA7CCB3205
3,759,608 UART: [art] SIG.S = 0CBF2A026401C78C98DD240135F21689A857A829C881D7FA71D09246AF41CD36CAC306DE639A8C205B60CA71C2147AFE
3,783,367 UART: Caliptra RT
3,783,618 UART: [state] CFI Enabled
3,903,518 UART: [rt] RT listening for mailbox commands...
3,904,188 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,292 UART: [rt]cmd =0x41544d4e, len=14344
4,330,455 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,725 ready_for_fw is high
1,060,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,417 >>> mbox cmd response: success
3,284,514 UART:
3,284,530 UART: Running Caliptra FMC ...
3,284,938 UART:
3,284,992 UART: [state] CFI Enabled
3,295,630 UART: [fht] FMC Alias Private Key: 7
3,414,236 UART: [art] Extend RT PCRs Done
3,414,664 UART: [art] Lock RT PCRs Done
3,415,934 UART: [art] Populate DV Done
3,424,167 UART: [fht] FMC Alias Private Key: 7
3,425,227 UART: [art] Derive CDI
3,425,507 UART: [art] Store in slot 0x4
3,511,202 UART: [art] Derive Key Pair
3,511,562 UART: [art] Store priv key in slot 0x5
3,524,540 UART: [art] Derive Key Pair - Done
3,539,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,089 UART: [art] PUB.X = 74FA0CEDA16E40E12BD5B929F4363835141BC96F4470B53B406F501137B0EE3CEA1E3F947A239737A09999175BF38749
3,561,854 UART: [art] PUB.Y = 66B8DD9E7831FB1D8F52CA7294FDC96D5E50713BE59E9DA3A80A22B869E5A8AEE95A882375C400CD9E85AF2AA0332037
3,568,791 UART: [art] SIG.R = 65D6CD1FF2549D287F358C9A66F30367BFAC2B730FE303C2678C24796F00EB1AD3A838BA90EBC49B32F2A6390380D73C
3,575,535 UART: [art] SIG.S = D446A89A5B6106752F1B903D867AA9527FE0C2A94AF72188C2000B1AF417FE8DCC1B57782EF285C4F0D6166E85D98BFF
3,598,987 UART: Caliptra RT
3,599,238 UART: [state] CFI Enabled
3,718,964 UART: [rt] RT listening for mailbox commands...
3,719,634 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,464 UART: [rt]cmd =0x41544d4e, len=14344
4,140,669 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,282 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
893,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,214 UART: [kat] ++
897,366 UART: [kat] sha1
901,422 UART: [kat] SHA2-256
903,362 UART: [kat] SHA2-384
906,139 UART: [kat] SHA2-512-ACC
908,040 UART: [kat] ECC-384
918,113 UART: [kat] HMAC-384Kdf
922,939 UART: [kat] LMS
1,171,267 UART: [kat] --
1,172,364 UART: [cold-reset] ++
1,172,814 UART: [fht] FHT @ 0x50003400
1,175,565 UART: [idev] ++
1,175,733 UART: [idev] CDI.KEYID = 6
1,176,093 UART: [idev] SUBJECT.KEYID = 7
1,176,517 UART: [idev] UDS.KEYID = 0
1,176,862 ready_for_fw is high
1,176,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,323 UART: [idev] Erasing UDS.KEYID = 0
1,201,932 UART: [idev] Sha1 KeyId Algorithm
1,210,506 UART: [idev] --
1,211,556 UART: [ldev] ++
1,211,724 UART: [ldev] CDI.KEYID = 6
1,212,087 UART: [ldev] SUBJECT.KEYID = 5
1,212,513 UART: [ldev] AUTHORITY.KEYID = 7
1,212,976 UART: [ldev] FE.KEYID = 1
1,218,252 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,442 UART: [ldev] --
1,283,703 UART: [fwproc] Wait for Commands...
1,284,347 UART: [fwproc] Recv command 0x46574c44
1,285,075 UART: [fwproc] Recv'd Img size: 118548 bytes
3,183,196 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,210,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,241,767 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,382,110 >>> mbox cmd response: success
3,383,152 UART: [afmc] ++
3,383,320 UART: [afmc] CDI.KEYID = 6
3,383,682 UART: [afmc] SUBJECT.KEYID = 7
3,384,107 UART: [afmc] AUTHORITY.KEYID = 5
3,419,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,436,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,436,917 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,442,623 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,448,502 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,454,212 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,051 UART: [afmc] --
3,463,129 UART: [cold-reset] --
3,463,969 UART: [state] Locking Datavault
3,465,382 UART: [state] Locking PCR0, PCR1 and PCR31
3,465,986 UART: [state] Locking ICCM
3,466,608 UART: [exit] Launching FMC @ 0x40000130
3,471,938 UART:
3,471,954 UART: Running Caliptra FMC ...
3,472,362 UART:
3,472,505 UART: [state] CFI Enabled
3,483,077 UART: [fht] FMC Alias Private Key: 7
3,602,325 UART: [art] Extend RT PCRs Done
3,602,753 UART: [art] Lock RT PCRs Done
3,604,119 UART: [art] Populate DV Done
3,612,330 UART: [fht] FMC Alias Private Key: 7
3,613,458 UART: [art] Derive CDI
3,613,738 UART: [art] Store in slot 0x4
3,700,061 UART: [art] Derive Key Pair
3,700,421 UART: [art] Store priv key in slot 0x5
3,713,283 UART: [art] Derive Key Pair - Done
3,727,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,742,900 UART: [art] Erasing AUTHORITY.KEYID = 7
3,743,665 UART: [art] PUB.X = 823905653F7298FE7BABE154E790B17879B961FAC5BE981C284FF7C54DCACF41FEBB11D7BDB41AF64B7F1056090BEFFE
3,750,446 UART: [art] PUB.Y = 191893730F9A2F96BC252B04363D9B46FAD6EBC46B1E0E4D1EA7CC32056FF8899AD5EB1A07AE2FC4E886273A30780D71
3,757,388 UART: [art] SIG.R = 56DB87F2FF84F795A9C4FB0841FC0816CC0B3B6887D3260E65ECB165847A3D0A3A32F9F8528125A1FDC6AE79A64E09B1
3,764,150 UART: [art] SIG.S = AFE1A3C50D0C4E310154992CF2572FDB163F23B206C23586DFD20884805F89DDC61F86C5ACF176B141C306B4EA501F58
3,787,714 UART: Caliptra RT
3,788,057 UART: [state] CFI Enabled
3,907,227 UART: [rt] RT listening for mailbox commands...
3,907,897 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,030,783 UART: [rt]cmd =0x41544d4e, len=14344
4,323,632 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 ready_for_fw is high
1,060,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,401 >>> mbox cmd response: success
3,292,428 UART:
3,292,444 UART: Running Caliptra FMC ...
3,292,852 UART:
3,292,995 UART: [state] CFI Enabled
3,303,797 UART: [fht] FMC Alias Private Key: 7
3,423,197 UART: [art] Extend RT PCRs Done
3,423,625 UART: [art] Lock RT PCRs Done
3,425,583 UART: [art] Populate DV Done
3,434,058 UART: [fht] FMC Alias Private Key: 7
3,435,064 UART: [art] Derive CDI
3,435,344 UART: [art] Store in slot 0x4
3,521,469 UART: [art] Derive Key Pair
3,521,829 UART: [art] Store priv key in slot 0x5
3,535,149 UART: [art] Derive Key Pair - Done
3,549,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,565,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,965 UART: [art] PUB.X = DB3975B69E9EFB5AE4FF7D276A5255601BA4044C6E6D107ECAB3E8A9846E813452F794330ADDE24C638222029FB79FD4
3,572,734 UART: [art] PUB.Y = 1BF577460990206EF9BF858FBEEFDE1BCA87EFAFB066177134BCC5744F02DD94FABBF8FAF45E34D0FC5A96EA09F5984C
3,579,701 UART: [art] SIG.R = DA02AA510F55F59BFF4D7A19D347325B4FAE08453A867A9D12E085B3DCF763C84CC755741E69D1EC01099067BB405375
3,586,460 UART: [art] SIG.S = AF4A4E6029FB361C0ECF2842D6BD8EC984D5806FA31F02B4350301678CA4D3B15981A82171FD2E4E6E57B00C3D57EC4A
3,610,869 UART: Caliptra RT
3,611,212 UART: [state] CFI Enabled
3,730,983 UART: [rt] RT listening for mailbox commands...
3,731,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,854,625 UART: [rt]cmd =0x41544d4e, len=14344
4,155,693 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,023 UART:
192,376 UART: Running Caliptra ROM ...
193,525 UART:
193,672 UART: [state] CFI Enabled
265,952 UART: [state] LifecycleState = Unprovisioned
267,900 UART: [state] DebugLocked = No
270,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,550 UART: [kat] SHA2-256
445,239 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,766 UART: [kat] ++
456,301 UART: [kat] sha1
466,969 UART: [kat] SHA2-256
469,615 UART: [kat] SHA2-384
475,814 UART: [kat] SHA2-512-ACC
478,188 UART: [kat] ECC-384
2,767,150 UART: [kat] HMAC-384Kdf
2,799,415 UART: [kat] LMS
3,989,700 UART: [kat] --
3,996,268 UART: [cold-reset] ++
3,998,411 UART: [fht] Storing FHT @ 0x50003400
4,009,114 UART: [idev] ++
4,009,683 UART: [idev] CDI.KEYID = 6
4,010,641 UART: [idev] SUBJECT.KEYID = 7
4,011,885 UART: [idev] UDS.KEYID = 0
4,012,879 ready_for_fw is high
4,013,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,644 UART: [idev] Erasing UDS.KEYID = 0
7,343,660 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,363 UART: [idev] --
7,368,114 UART: [ldev] ++
7,368,740 UART: [ldev] CDI.KEYID = 6
7,369,622 UART: [ldev] SUBJECT.KEYID = 5
7,370,839 UART: [ldev] AUTHORITY.KEYID = 7
7,372,120 UART: [ldev] FE.KEYID = 1
7,399,495 UART: [ldev] Erasing FE.KEYID = 1
10,731,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,424 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,800 UART: [ldev] --
13,092,208 UART: [fwproc] Waiting for Commands...
13,095,161 UART: [fwproc] Received command 0x46574c44
13,097,342 UART: [fwproc] Received Image of size 118548 bytes
21,952,331 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,031,001 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,104,193 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,432,382 >>> mbox cmd response: success
22,435,692 UART: [afmc] ++
22,436,285 UART: [afmc] CDI.KEYID = 6
22,437,166 UART: [afmc] SUBJECT.KEYID = 7
22,438,434 UART: [afmc] AUTHORITY.KEYID = 5
25,808,751 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,126,584 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,128,840 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,143,318 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,158,113 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,172,505 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,194,245 UART: [afmc] --
28,197,173 UART: [cold-reset] --
28,200,716 UART: [state] Locking Datavault
28,206,242 UART: [state] Locking PCR0, PCR1 and PCR31
28,207,996 UART: [state] Locking ICCM
28,210,065 UART: [exit] Launching FMC @ 0x40000130
28,218,461 UART:
28,218,695 UART: Running Caliptra FMC ...
28,219,747 UART:
28,219,896 UART: [state] CFI Enabled
28,284,855 UART: [fht] FMC Alias Private Key: 7
30,624,807 UART: [art] Extend RT PCRs Done
30,626,022 UART: [art] Lock RT PCRs Done
30,627,649 UART: [art] Populate DV Done
30,633,234 UART: [fht] FMC Alias Private Key: 7
30,634,779 UART: [art] Derive CDI
30,635,596 UART: [art] Store in slot 0x4
30,693,122 UART: [art] Derive Key Pair
30,694,156 UART: [art] Store priv key in slot 0x5
33,986,721 UART: [art] Derive Key Pair - Done
33,999,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,287,462 UART: [art] Erasing AUTHORITY.KEYID = 7
36,288,971 UART: [art] PUB.X = 21EF62C720492031EECF34E6283633CB32D7681AFCC6C78DD6C178BFCA340C1B9BB789B163D8D7D7118B1AEB2E9C3313
36,296,269 UART: [art] PUB.Y = 2B78F9660A08A5FF210E65059CD63F07D27893BEF1BEDD9A3E04D8E0F476F647141706319710EEC676C582BD00AAE494
36,303,495 UART: [art] SIG.R = 6A652572E46F2A8BD9C900386C9907F474355A228B2E615698266B31867E0D48FAC9024D59C67551BE9B8A290EB37DB5
36,310,826 UART: [art] SIG.S = F293A2ADCA5FBC18B83C1CA5C604035558F30C27903A5F19A983AB8753E47F1642570AFA4EFC668D94B80AE3BC42C718
37,616,292 UART: Caliptra RT
37,616,992 UART: [state] CFI Enabled
37,794,287 UART: [rt] RT listening for mailbox commands...
37,796,627 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,952,063 UART: [rt]cmd =0x41544d4e, len=14344
41,354,413 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,803,772 ready_for_fw is high
3,804,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,085,342 >>> mbox cmd response: success
27,768,848 UART:
27,769,280 UART: Running Caliptra FMC ...
27,770,400 UART:
27,770,573 UART: [state] CFI Enabled
27,840,888 UART: [fht] FMC Alias Private Key: 7
30,180,551 UART: [art] Extend RT PCRs Done
30,181,781 UART: [art] Lock RT PCRs Done
30,183,646 UART: [art] Populate DV Done
30,189,388 UART: [fht] FMC Alias Private Key: 7
30,191,033 UART: [art] Derive CDI
30,191,776 UART: [art] Store in slot 0x4
30,247,859 UART: [art] Derive Key Pair
30,248,858 UART: [art] Store priv key in slot 0x5
33,542,138 UART: [art] Derive Key Pair - Done
33,554,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,843,097 UART: [art] Erasing AUTHORITY.KEYID = 7
35,844,612 UART: [art] PUB.X = 6E27F61F10D27F83AA176B8689B6D8FEA4F600171FAD52E5AF6E0640749F8C1976AB51CB1C0C74BA2C560C807756C908
35,851,865 UART: [art] PUB.Y = D007E89A5B8B65286E10F8FCB9456650A4C1593777AB5A78D5894039B79FF7EDAF2586EBF529EA167046EBA5F63F6126
35,859,108 UART: [art] SIG.R = 685228BCBF46F2DA0C6A230ADEB991897E190B0026E1F1D472A8BC37B087C07461A8EC95B69DDC0B22DC2519968F90B9
35,866,519 UART: [art] SIG.S = 4FB32FC2222DA38ADC22DBAF9F33C9EE56F1175D730A6154605B9CF9503B768F59D8CE87CB97E010F0B42BB29F45638E
37,171,654 UART: Caliptra RT
37,172,370 UART: [state] CFI Enabled
37,369,276 UART: [rt] RT listening for mailbox commands...
37,371,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,527,001 UART: [rt]cmd =0x41544d4e, len=14344
40,851,982 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,422 UART:
192,776 UART: Running Caliptra ROM ...
193,888 UART:
603,478 UART: [state] CFI Enabled
615,388 UART: [state] LifecycleState = Unprovisioned
617,268 UART: [state] DebugLocked = No
619,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,131 UART: [kat] SHA2-256
793,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,424 UART: [kat] ++
804,866 UART: [kat] sha1
815,563 UART: [kat] SHA2-256
818,254 UART: [kat] SHA2-384
824,245 UART: [kat] SHA2-512-ACC
826,617 UART: [kat] ECC-384
3,112,226 UART: [kat] HMAC-384Kdf
3,123,351 UART: [kat] LMS
4,313,465 UART: [kat] --
4,317,960 UART: [cold-reset] ++
4,319,173 UART: [fht] Storing FHT @ 0x50003400
4,329,718 UART: [idev] ++
4,330,441 UART: [idev] CDI.KEYID = 6
4,331,354 UART: [idev] SUBJECT.KEYID = 7
4,332,467 UART: [idev] UDS.KEYID = 0
4,333,468 ready_for_fw is high
4,333,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,497 UART: [idev] Erasing UDS.KEYID = 0
7,620,682 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,836 UART: [idev] --
7,647,018 UART: [ldev] ++
7,647,590 UART: [ldev] CDI.KEYID = 6
7,648,547 UART: [ldev] SUBJECT.KEYID = 5
7,649,751 UART: [ldev] AUTHORITY.KEYID = 7
7,651,030 UART: [ldev] FE.KEYID = 1
7,661,729 UART: [ldev] Erasing FE.KEYID = 1
10,949,708 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,668 UART: [ldev] --
13,307,992 UART: [fwproc] Waiting for Commands...
13,310,837 UART: [fwproc] Received command 0x46574c44
13,313,028 UART: [fwproc] Received Image of size 118548 bytes
22,159,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,241,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,315,052 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,642,763 >>> mbox cmd response: success
22,646,071 UART: [afmc] ++
22,646,698 UART: [afmc] CDI.KEYID = 6
22,647,605 UART: [afmc] SUBJECT.KEYID = 7
22,648,818 UART: [afmc] AUTHORITY.KEYID = 5
25,960,954 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,257,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,259,697 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,274,216 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,288,987 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,303,367 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,323,951 UART: [afmc] --
28,327,120 UART: [cold-reset] --
28,331,021 UART: [state] Locking Datavault
28,334,599 UART: [state] Locking PCR0, PCR1 and PCR31
28,336,370 UART: [state] Locking ICCM
28,339,146 UART: [exit] Launching FMC @ 0x40000130
28,347,534 UART:
28,347,762 UART: Running Caliptra FMC ...
28,348,856 UART:
28,349,013 UART: [state] CFI Enabled
28,356,627 UART: [fht] FMC Alias Private Key: 7
30,697,073 UART: [art] Extend RT PCRs Done
30,698,294 UART: [art] Lock RT PCRs Done
30,700,132 UART: [art] Populate DV Done
30,705,646 UART: [fht] FMC Alias Private Key: 7
30,707,187 UART: [art] Derive CDI
30,707,942 UART: [art] Store in slot 0x4
30,750,653 UART: [art] Derive Key Pair
30,751,686 UART: [art] Store priv key in slot 0x5
33,993,534 UART: [art] Derive Key Pair - Done
34,006,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,286,536 UART: [art] Erasing AUTHORITY.KEYID = 7
36,288,044 UART: [art] PUB.X = 787B3BB1338DB92ABA58A30CE380DAA48FE39E0E42AA38DC3C70AFBA5345E2D0FF2FBC432B365BDCBA3D7EC8D0D4BD8E
36,295,349 UART: [art] PUB.Y = FC7E2A7BB4DF313BFB22AE48EC530CCD748F2A317D622B274117692C9F6DFF3D163C36CC52F5D38CA3BABE73E4351117
36,302,625 UART: [art] SIG.R = C8643DBAC8F38EB2ED5B52B5B519BA410B87BF0999629DB5FFD6E53BB38A534400858131AD752B12E495FDC0D2FDD263
36,310,009 UART: [art] SIG.S = 2976C88548CBA7B58A098BD889FDCE13618CC9EB7345151C25CCA27214FF3C86C1A501637CE334FC1729874D505F54D7
37,616,015 UART: Caliptra RT
37,616,700 UART: [state] CFI Enabled
37,749,849 UART: [rt] RT listening for mailbox commands...
37,752,148 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,907,396 UART: [rt]cmd =0x41544d4e, len=14344
41,257,883 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
4,131,344 ready_for_fw is high
4,131,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,086,863 >>> mbox cmd response: success
27,727,469 UART:
27,727,892 UART: Running Caliptra FMC ...
27,729,070 UART:
27,729,235 UART: [state] CFI Enabled
27,736,917 UART: [fht] FMC Alias Private Key: 7
30,076,518 UART: [art] Extend RT PCRs Done
30,077,758 UART: [art] Lock RT PCRs Done
30,079,583 UART: [art] Populate DV Done
30,085,050 UART: [fht] FMC Alias Private Key: 7
30,086,542 UART: [art] Derive CDI
30,087,303 UART: [art] Store in slot 0x4
30,130,001 UART: [art] Derive Key Pair
30,131,006 UART: [art] Store priv key in slot 0x5
33,371,925 UART: [art] Derive Key Pair - Done
33,385,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,665,557 UART: [art] Erasing AUTHORITY.KEYID = 7
35,667,071 UART: [art] PUB.X = DDDF5C58FB3710B0B8AF1272AAEE33747998A8165F2BC6B7DB04EA20F64223AF0D37C6E559907402E50A029FC7DED393
35,674,334 UART: [art] PUB.Y = BE4C87AAD50EFE90C70B020293A6EE9616E24C7A9CC6DDA092E0B1D560CAC541EF02347C73DC680D702B228E48232EA0
35,681,623 UART: [art] SIG.R = 3D6D629A9993FAFEFA6B4DCE97073EE07A2F8E63198FCA1DE4B5F275DEF451E607D7AC85CF2873806F573128A5CA106E
35,689,022 UART: [art] SIG.S = 3DAC3FFDDD9EF0807F378F93691C1589A7E54491C56826650B2B5979B3986608B54C8AB887FEDEFA9E3A8C9491413158
36,994,056 UART: Caliptra RT
36,994,771 UART: [state] CFI Enabled
37,127,945 UART: [rt] RT listening for mailbox commands...
37,130,281 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,285,658 UART: [rt]cmd =0x41544d4e, len=14344
40,610,120 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,383 UART:
192,734 UART: Running Caliptra ROM ...
193,952 UART:
194,101 UART: [state] CFI Enabled
262,013 UART: [state] LifecycleState = Unprovisioned
263,940 UART: [state] DebugLocked = No
265,753 UART: [state] WD Timer not started. Device not locked for debugging
270,290 UART: [kat] SHA2-256
449,994 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,758 UART: [kat] ++
461,293 UART: [kat] sha1
472,170 UART: [kat] SHA2-256
474,885 UART: [kat] SHA2-384
481,003 UART: [kat] SHA2-512-ACC
483,371 UART: [kat] ECC-384
2,950,286 UART: [kat] HMAC-384Kdf
2,971,910 UART: [kat] LMS
3,448,432 UART: [kat] --
3,453,366 UART: [cold-reset] ++
3,454,946 UART: [fht] FHT @ 0x50003400
3,466,700 UART: [idev] ++
3,467,260 UART: [idev] CDI.KEYID = 6
3,468,290 UART: [idev] SUBJECT.KEYID = 7
3,469,458 UART: [idev] UDS.KEYID = 0
3,470,500 ready_for_fw is high
3,470,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,736 UART: [idev] Erasing UDS.KEYID = 0
5,987,851 UART: [idev] Sha1 KeyId Algorithm
6,011,728 UART: [idev] --
6,017,568 UART: [ldev] ++
6,018,134 UART: [ldev] CDI.KEYID = 6
6,019,036 UART: [ldev] SUBJECT.KEYID = 5
6,020,258 UART: [ldev] AUTHORITY.KEYID = 7
6,021,546 UART: [ldev] FE.KEYID = 1
6,058,683 UART: [ldev] Erasing FE.KEYID = 1
8,560,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,251 UART: [ldev] --
10,370,969 UART: [fwproc] Wait for Commands...
10,374,081 UART: [fwproc] Recv command 0x46574c44
10,376,129 UART: [fwproc] Recv'd Img size: 118548 bytes
14,946,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,031,802 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,104,776 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,432,715 >>> mbox cmd response: success
15,436,391 UART: [afmc] ++
15,437,041 UART: [afmc] CDI.KEYID = 6
15,437,955 UART: [afmc] SUBJECT.KEYID = 7
15,439,170 UART: [afmc] AUTHORITY.KEYID = 5
17,984,821 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,725,300 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,727,543 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,743,424 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,759,286 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,775,007 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,798,509 UART: [afmc] --
19,802,804 UART: [cold-reset] --
19,807,690 UART: [state] Locking Datavault
19,814,229 UART: [state] Locking PCR0, PCR1 and PCR31
19,815,986 UART: [state] Locking ICCM
19,817,757 UART: [exit] Launching FMC @ 0x40000130
19,826,175 UART:
19,826,441 UART: Running Caliptra FMC ...
19,827,469 UART:
19,827,617 UART: [state] CFI Enabled
19,883,169 UART: [fht] FMC Alias Private Key: 7
21,649,909 UART: [art] Extend RT PCRs Done
21,651,141 UART: [art] Lock RT PCRs Done
21,653,224 UART: [art] Populate DV Done
21,658,904 UART: [fht] FMC Alias Private Key: 7
21,660,510 UART: [art] Derive CDI
21,661,256 UART: [art] Store in slot 0x4
21,715,695 UART: [art] Derive Key Pair
21,716,693 UART: [art] Store priv key in slot 0x5
24,179,610 UART: [art] Derive Key Pair - Done
24,192,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,904,714 UART: [art] Erasing AUTHORITY.KEYID = 7
25,906,225 UART: [art] PUB.X = 6EF6498847BDF6B6FFEBF3773F8D5A390FC6EA5EA9F17156F01EDFEBA78EBA03251BBD63F18F54D4F523B136C648539D
25,913,528 UART: [art] PUB.Y = 1D66BF2BF9D932DD35F2DC70D2FB98606160A924C75817ACDF076C1C69F60C66182B1A43CD37D5B2A336DF23C6F947E9
25,920,816 UART: [art] SIG.R = 99C33A17972FB13169F46DC1661EE0279930FE20E48311485212CC8635C36D78AB58FCB8DC54CBFB670A0C6FAD26D6EC
25,928,196 UART: [art] SIG.S = B86E7B935CAD038D686613A640A05C76376EA30AB457EBA12E052FF29969A6D2C2422E3AC59FC80E60704E8D0EAE5957
26,906,817 UART: Caliptra RT
26,907,515 UART: [state] CFI Enabled
27,087,701 UART: [rt] RT listening for mailbox commands...
27,090,036 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,245,470 UART: [rt]cmd =0x41544d4e, len=14344
29,407,991 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,460,284 ready_for_fw is high
3,460,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,376,856 >>> mbox cmd response: success
19,662,721 UART:
19,663,125 UART: Running Caliptra FMC ...
19,664,230 UART:
19,664,382 UART: [state] CFI Enabled
19,729,250 UART: [fht] FMC Alias Private Key: 7
21,516,208 UART: [art] Extend RT PCRs Done
21,517,428 UART: [art] Lock RT PCRs Done
21,519,025 UART: [art] Populate DV Done
21,524,553 UART: [fht] FMC Alias Private Key: 7
21,526,140 UART: [art] Derive CDI
21,526,870 UART: [art] Store in slot 0x4
21,582,467 UART: [art] Derive Key Pair
21,583,506 UART: [art] Store priv key in slot 0x5
24,046,497 UART: [art] Derive Key Pair - Done
24,059,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,771,620 UART: [art] Erasing AUTHORITY.KEYID = 7
25,773,127 UART: [art] PUB.X = B04CC5ADA21079C67E4E5529784EE830BDF5DEB039766B6C095B8013550414EF4E92C2B39AC894551EE72D370438D1B8
25,780,376 UART: [art] PUB.Y = 8CD733884EB3FDDCE809FC2E7E632ABF4DD88C050D6D36B06E807F20AB4AA0D4AAED9AC6B53CFEEB6209FDAAF1AE6867
25,787,712 UART: [art] SIG.R = 062E7E8B348E46CD1536A28BFF9455B11D9FEB17867CF3112A69B9F69D79582D5F717D8B1A839DDF8725E479B912CC38
25,795,061 UART: [art] SIG.S = 387108FB5F9B40F8BEE37673DDEED7A296AA5C775F15DD78A13021BBF6AD5625BCFEB2B04DCE29D4FEB16C6915089D2C
26,774,655 UART: Caliptra RT
26,775,366 UART: [state] CFI Enabled
26,955,396 UART: [rt] RT listening for mailbox commands...
26,957,695 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,113,177 UART: [rt]cmd =0x41544d4e, len=14344
29,280,213 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,531 UART:
192,880 UART: Running Caliptra ROM ...
194,117 UART:
603,908 UART: [state] CFI Enabled
620,414 UART: [state] LifecycleState = Unprovisioned
622,290 UART: [state] DebugLocked = No
623,667 UART: [state] WD Timer not started. Device not locked for debugging
626,986 UART: [kat] SHA2-256
806,656 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,401 UART: [kat] ++
817,952 UART: [kat] sha1
828,975 UART: [kat] SHA2-256
831,711 UART: [kat] SHA2-384
836,853 UART: [kat] SHA2-512-ACC
839,219 UART: [kat] ECC-384
3,279,911 UART: [kat] HMAC-384Kdf
3,290,854 UART: [kat] LMS
3,767,340 UART: [kat] --
3,771,509 UART: [cold-reset] ++
3,773,735 UART: [fht] FHT @ 0x50003400
3,785,348 UART: [idev] ++
3,785,920 UART: [idev] CDI.KEYID = 6
3,786,954 UART: [idev] SUBJECT.KEYID = 7
3,788,137 UART: [idev] UDS.KEYID = 0
3,789,073 ready_for_fw is high
3,789,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,244 UART: [idev] Erasing UDS.KEYID = 0
6,267,568 UART: [idev] Sha1 KeyId Algorithm
6,291,318 UART: [idev] --
6,295,746 UART: [ldev] ++
6,296,377 UART: [ldev] CDI.KEYID = 6
6,297,289 UART: [ldev] SUBJECT.KEYID = 5
6,298,454 UART: [ldev] AUTHORITY.KEYID = 7
6,299,745 UART: [ldev] FE.KEYID = 1
6,311,004 UART: [ldev] Erasing FE.KEYID = 1
8,792,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,027 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,194 UART: [ldev] --
10,590,568 UART: [fwproc] Wait for Commands...
10,592,123 UART: [fwproc] Recv command 0x46574c44
10,594,107 UART: [fwproc] Recv'd Img size: 118548 bytes
15,134,932 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,215,287 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,288,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,615,845 >>> mbox cmd response: success
15,619,047 UART: [afmc] ++
15,619,664 UART: [afmc] CDI.KEYID = 6
15,620,606 UART: [afmc] SUBJECT.KEYID = 7
15,621,830 UART: [afmc] AUTHORITY.KEYID = 5
18,128,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,852,843 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,855,019 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,870,901 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,886,825 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,902,514 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,927,276 UART: [afmc] --
19,930,516 UART: [cold-reset] --
19,935,848 UART: [state] Locking Datavault
19,939,965 UART: [state] Locking PCR0, PCR1 and PCR31
19,941,664 UART: [state] Locking ICCM
19,943,980 UART: [exit] Launching FMC @ 0x40000130
19,952,383 UART:
19,952,624 UART: Running Caliptra FMC ...
19,953,747 UART:
19,953,907 UART: [state] CFI Enabled
19,962,391 UART: [fht] FMC Alias Private Key: 7
21,728,260 UART: [art] Extend RT PCRs Done
21,729,490 UART: [art] Lock RT PCRs Done
21,731,145 UART: [art] Populate DV Done
21,736,614 UART: [fht] FMC Alias Private Key: 7
21,738,155 UART: [art] Derive CDI
21,738,975 UART: [art] Store in slot 0x4
21,781,906 UART: [art] Derive Key Pair
21,782,941 UART: [art] Store priv key in slot 0x5
24,209,854 UART: [art] Derive Key Pair - Done
24,222,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,928,982 UART: [art] Erasing AUTHORITY.KEYID = 7
25,930,487 UART: [art] PUB.X = 3ACF95184BAA25D8F48DCE5930B5A452AD6F90227145557F1C61FBB60900DEC33D40F9FCC463D4459B2FD81DB2A24F14
25,937,730 UART: [art] PUB.Y = FDE3743C95917805BD76A5F79CC4526D40969BF5BA962E299629C6BF783A2B560AC11EE4F45C05338A0670D484BD0CA3
25,944,982 UART: [art] SIG.R = 4248A2F416A7D76D7F09910421CBB039F6824105F33EE76364B8007943A6592643DC9B6B9673AE9269052845FBD66CA5
25,952,321 UART: [art] SIG.S = 691189C99FC75D5EF6C3B39D9E3C1886C9A556B62EA43B94FF1FF32632DDBAEC067DA6C3D6CA9951C690C03B40DDA348
26,931,261 UART: Caliptra RT
26,931,952 UART: [state] CFI Enabled
27,064,791 UART: [rt] RT listening for mailbox commands...
27,067,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,222,341 UART: [rt]cmd =0x41544d4e, len=14344
29,384,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,780,705 ready_for_fw is high
3,781,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,627,261 >>> mbox cmd response: success
19,873,748 UART:
19,874,126 UART: Running Caliptra FMC ...
19,875,242 UART:
19,875,402 UART: [state] CFI Enabled
19,883,573 UART: [fht] FMC Alias Private Key: 7
21,649,501 UART: [art] Extend RT PCRs Done
21,650,721 UART: [art] Lock RT PCRs Done
21,652,323 UART: [art] Populate DV Done
21,657,641 UART: [fht] FMC Alias Private Key: 7
21,659,239 UART: [art] Derive CDI
21,659,980 UART: [art] Store in slot 0x4
21,702,793 UART: [art] Derive Key Pair
21,703,838 UART: [art] Store priv key in slot 0x5
24,130,927 UART: [art] Derive Key Pair - Done
24,144,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,850,169 UART: [art] Erasing AUTHORITY.KEYID = 7
25,851,682 UART: [art] PUB.X = 8D0806D416AFBA048B4CE3E3ACA98014DC4D1D77AC811762619ECD2C20201000D2899400135BC02FBDF6E7BEBC254E82
25,858,958 UART: [art] PUB.Y = 6333B7E55C519FA25FFA775C618F56D5EFADEB0DF861AE06C72091B4D3E17E90947CB863011EF9DF81DADA6ECEAC2B84
25,866,262 UART: [art] SIG.R = 943DDEAA83F86A566B0E8B1DD74F40722B5968965F96AFCE6171AD472D99570D418B469EBA2C56A9D8ABEEC1DDE71680
25,873,623 UART: [art] SIG.S = E27CB1812B3F01AAD34A842EDBA1E51C41462CD352823F07DCF22E6AFE0F246152187A919905335C9C1119C81EFA2902
26,852,410 UART: Caliptra RT
26,853,103 UART: [state] CFI Enabled
26,986,479 UART: [rt] RT listening for mailbox commands...
26,988,797 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,143,829 UART: [rt]cmd =0x41544d4e, len=14344
29,304,441 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
192,077 UART:
192,439 UART: Running Caliptra ROM ...
193,625 UART:
193,800 UART: [state] CFI Enabled
263,881 UART: [state] LifecycleState = Unprovisioned
266,301 UART: [state] DebugLocked = No
268,904 UART: [state] WD Timer not started. Device not locked for debugging
273,636 UART: [kat] SHA2-256
463,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,284 UART: [kat] ++
474,764 UART: [kat] sha1
487,191 UART: [kat] SHA2-256
490,200 UART: [kat] SHA2-384
496,609 UART: [kat] SHA2-512-ACC
499,182 UART: [kat] ECC-384
2,946,664 UART: [kat] HMAC-384Kdf
2,972,164 UART: [kat] LMS
3,503,911 UART: [kat] --
3,509,533 UART: [cold-reset] ++
3,511,904 UART: [fht] FHT @ 0x50003400
3,523,089 UART: [idev] ++
3,523,792 UART: [idev] CDI.KEYID = 6
3,524,749 UART: [idev] SUBJECT.KEYID = 7
3,525,925 UART: [idev] UDS.KEYID = 0
3,526,822 ready_for_fw is high
3,527,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,144 UART: [idev] Erasing UDS.KEYID = 0
6,031,096 UART: [idev] Sha1 KeyId Algorithm
6,052,923 UART: [idev] --
6,057,027 UART: [ldev] ++
6,057,708 UART: [ldev] CDI.KEYID = 6
6,058,624 UART: [ldev] SUBJECT.KEYID = 5
6,060,090 UART: [ldev] AUTHORITY.KEYID = 7
6,061,293 UART: [ldev] FE.KEYID = 1
6,100,952 UART: [ldev] Erasing FE.KEYID = 1
8,604,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,369 UART: [ldev] --
10,413,046 UART: [fwproc] Wait for Commands...
10,414,926 UART: [fwproc] Recv command 0x46574c44
10,417,229 UART: [fwproc] Recv'd Img size: 118548 bytes
15,069,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,143,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,266,815 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,827,927 >>> mbox cmd response: success
15,831,333 UART: [afmc] ++
15,832,030 UART: [afmc] CDI.KEYID = 6
15,833,277 UART: [afmc] SUBJECT.KEYID = 7
15,834,741 UART: [afmc] AUTHORITY.KEYID = 5
18,362,251 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,087,050 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,088,958 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,104,059 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,119,309 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,134,288 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,158,696 UART: [afmc] --
20,161,705 UART: [cold-reset] --
20,165,677 UART: [state] Locking Datavault
20,170,820 UART: [state] Locking PCR0, PCR1 and PCR31
20,172,962 UART: [state] Locking ICCM
20,174,863 UART: [exit] Launching FMC @ 0x40000130
20,183,538 UART:
20,183,769 UART: Running Caliptra FMC ...
20,184,868 UART:
20,185,046 UART: [state] CFI Enabled
20,243,426 UART: [fht] FMC Alias Private Key: 7
22,010,037 UART: [art] Extend RT PCRs Done
22,011,253 UART: [art] Lock RT PCRs Done
22,012,725 UART: [art] Populate DV Done
22,018,081 UART: [fht] FMC Alias Private Key: 7
22,019,728 UART: [art] Derive CDI
22,020,544 UART: [art] Store in slot 0x4
22,076,301 UART: [art] Derive Key Pair
22,077,345 UART: [art] Store priv key in slot 0x5
24,539,921 UART: [art] Derive Key Pair - Done
24,552,600 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,266,325 UART: [art] Erasing AUTHORITY.KEYID = 7
26,267,816 UART: [art] PUB.X = 59FBBB670A85AF4947788C2EA649962BAB89C8A20CBD962C6203B906557123282721C526999012DDD14878EE74A096AA
26,275,072 UART: [art] PUB.Y = 7AB5E9DE41DDB92E3B3A4494EFFA20A96B9D03652255AD12B58422B7C3517AF2FA24B335FEA9D51BA2CAE423DE68954B
26,282,373 UART: [art] SIG.R = 2BF0B1A19F263CFDE87A854798FE9E79B671F47B2986AD0B78D6C1EF07F60D3BB0CBFDF97D09010385FC037DF7BE327D
26,289,800 UART: [art] SIG.S = 4BB8E7F2045FAB35AF82DAC1121C59D7FB255BCB287E0B3D1DEBD24C4BA33D36766F1A970D9374F9B4EF171B03A4C940
27,268,406 UART: Caliptra RT
27,269,118 UART: [state] CFI Enabled
27,449,927 UART: [rt] RT listening for mailbox commands...
27,452,218 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,607,637 UART: [rt]cmd =0x41544d4e, len=14344
29,766,780 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,437,061 ready_for_fw is high
3,437,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,947,465 >>> mbox cmd response: success
20,246,726 UART:
20,247,126 UART: Running Caliptra FMC ...
20,248,229 UART:
20,248,384 UART: [state] CFI Enabled
20,312,814 UART: [fht] FMC Alias Private Key: 7
22,078,734 UART: [art] Extend RT PCRs Done
22,079,956 UART: [art] Lock RT PCRs Done
22,081,315 UART: [art] Populate DV Done
22,086,778 UART: [fht] FMC Alias Private Key: 7
22,088,428 UART: [art] Derive CDI
22,089,245 UART: [art] Store in slot 0x4
22,145,714 UART: [art] Derive Key Pair
22,146,755 UART: [art] Store priv key in slot 0x5
24,609,856 UART: [art] Derive Key Pair - Done
24,622,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,335,504 UART: [art] Erasing AUTHORITY.KEYID = 7
26,337,023 UART: [art] PUB.X = 5E74A4588994CE106BF619045A101697F2B84E48C5C7980EFE6CE354790792AFFC9032D9ECE1A1D8E1F5F90D6C5AA60C
26,344,265 UART: [art] PUB.Y = FD480214DA50D5FDFDED834BBE66DF1CB2D9BC8C7EE69E5867C40835A925AE3CCFDA4525A0BF45EB5C32B2C7E2ADE0D4
26,351,557 UART: [art] SIG.R = ABB91E619B4FC8250A7BBDFE65BD0A0B28EB917C9C036156B9CE61A4F1B6180BC5B18993EE98F426A30E43BFD5C9C3D9
26,359,010 UART: [art] SIG.S = 8784B6C257C2744AFB1224966B2C3FB795F4D30DBBE8FA96053D422025041B0415B202B3C7288EB9F01C6CDF7A86AE49
27,338,234 UART: Caliptra RT
27,338,949 UART: [state] CFI Enabled
27,519,997 UART: [rt] RT listening for mailbox commands...
27,522,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,677,625 UART: [rt]cmd =0x41544d4e, len=14344
29,835,087 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,460 UART:
192,827 UART: Running Caliptra ROM ...
194,176 UART:
603,728 UART: [state] CFI Enabled
616,396 UART: [state] LifecycleState = Unprovisioned
618,415 UART: [state] DebugLocked = No
620,299 UART: [state] WD Timer not started. Device not locked for debugging
624,197 UART: [kat] SHA2-256
814,107 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,870 UART: [kat] ++
825,420 UART: [kat] sha1
835,289 UART: [kat] SHA2-256
838,353 UART: [kat] SHA2-384
844,497 UART: [kat] SHA2-512-ACC
847,087 UART: [kat] ECC-384
3,289,723 UART: [kat] HMAC-384Kdf
3,303,306 UART: [kat] LMS
3,835,144 UART: [kat] --
3,839,937 UART: [cold-reset] ++
3,840,880 UART: [fht] FHT @ 0x50003400
3,852,223 UART: [idev] ++
3,852,931 UART: [idev] CDI.KEYID = 6
3,853,819 UART: [idev] SUBJECT.KEYID = 7
3,855,064 UART: [idev] UDS.KEYID = 0
3,855,971 ready_for_fw is high
3,856,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,119 UART: [idev] Erasing UDS.KEYID = 0
6,332,217 UART: [idev] Sha1 KeyId Algorithm
6,354,359 UART: [idev] --
6,359,522 UART: [ldev] ++
6,360,214 UART: [ldev] CDI.KEYID = 6
6,361,099 UART: [ldev] SUBJECT.KEYID = 5
6,362,318 UART: [ldev] AUTHORITY.KEYID = 7
6,363,555 UART: [ldev] FE.KEYID = 1
6,372,555 UART: [ldev] Erasing FE.KEYID = 1
8,852,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,414 UART: [ldev] --
10,644,004 UART: [fwproc] Wait for Commands...
10,645,513 UART: [fwproc] Recv command 0x46574c44
10,647,844 UART: [fwproc] Recv'd Img size: 118548 bytes
15,342,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,430,622 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,554,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,115,412 >>> mbox cmd response: success
16,120,258 UART: [afmc] ++
16,120,968 UART: [afmc] CDI.KEYID = 6
16,122,084 UART: [afmc] SUBJECT.KEYID = 7
16,123,648 UART: [afmc] AUTHORITY.KEYID = 5
18,631,716 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,354,915 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,356,892 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,371,952 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,387,206 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,402,237 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,425,782 UART: [afmc] --
20,430,156 UART: [cold-reset] --
20,435,498 UART: [state] Locking Datavault
20,439,457 UART: [state] Locking PCR0, PCR1 and PCR31
20,441,630 UART: [state] Locking ICCM
20,444,191 UART: [exit] Launching FMC @ 0x40000130
20,452,822 UART:
20,453,059 UART: Running Caliptra FMC ...
20,454,091 UART:
20,454,247 UART: [state] CFI Enabled
20,462,727 UART: [fht] FMC Alias Private Key: 7
22,228,745 UART: [art] Extend RT PCRs Done
22,229,965 UART: [art] Lock RT PCRs Done
22,231,779 UART: [art] Populate DV Done
22,237,298 UART: [fht] FMC Alias Private Key: 7
22,238,950 UART: [art] Derive CDI
22,239,691 UART: [art] Store in slot 0x4
22,282,638 UART: [art] Derive Key Pair
22,283,679 UART: [art] Store priv key in slot 0x5
24,710,443 UART: [art] Derive Key Pair - Done
24,723,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,429,678 UART: [art] Erasing AUTHORITY.KEYID = 7
26,431,188 UART: [art] PUB.X = 377202C639603A4DCF2AA86C7D856C4576400F0711982BDD56AFC73DFD22306FC2C9A5C6230AC32AE7376133B8F79742
26,438,471 UART: [art] PUB.Y = EA4C494E0B23BF1591F07B223C65F3E7DF3466DDB1BFEEB6BBDDF3805DF9947E3C01F3A6869C7D8E58101F1DF431ADC3
26,445,744 UART: [art] SIG.R = F78C756F237FD587891541D76409223E5D0F5F8911B6E1E1667205F9AEFDAD31D51D3887983AC2378E40191797A11F8A
26,453,114 UART: [art] SIG.S = B8B3CD6450B1AC68E0FC6AE31FCC167E716C987FC443F06D2E82A56A8508D5D9142973487555522FD1B12E789BC2290A
27,432,144 UART: Caliptra RT
27,432,831 UART: [state] CFI Enabled
27,565,070 UART: [rt] RT listening for mailbox commands...
27,567,398 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,722,552 UART: [rt]cmd =0x41544d4e, len=14344
29,879,643 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,753,281 ready_for_fw is high
3,753,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,134,217 >>> mbox cmd response: success
20,389,570 UART:
20,389,973 UART: Running Caliptra FMC ...
20,391,180 UART:
20,391,365 UART: [state] CFI Enabled
20,399,035 UART: [fht] FMC Alias Private Key: 7
22,165,607 UART: [art] Extend RT PCRs Done
22,166,835 UART: [art] Lock RT PCRs Done
22,168,523 UART: [art] Populate DV Done
22,173,777 UART: [fht] FMC Alias Private Key: 7
22,175,281 UART: [art] Derive CDI
22,176,052 UART: [art] Store in slot 0x4
22,219,043 UART: [art] Derive Key Pair
22,220,054 UART: [art] Store priv key in slot 0x5
24,647,071 UART: [art] Derive Key Pair - Done
24,660,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,366,611 UART: [art] Erasing AUTHORITY.KEYID = 7
26,368,128 UART: [art] PUB.X = 99964AD8504833D37641692330459401FF237239B9F9041A4594A852FFA0B371B57AB0F76C5C387ED470F73E297D36A3
26,375,353 UART: [art] PUB.Y = 59001C7C6EEACAD6CAB2FD9C8C90382EC34D6814B3B62030827623279595B06150B03580B9A469279AB1B5FCAFE8B871
26,382,586 UART: [art] SIG.R = C3408D41065C559DF35822527F6209285879FA36ACB3C5780DF4772B50ABF4BF92C4307544118815F1405B36B41A23D1
26,389,960 UART: [art] SIG.S = 0B0519622B43B025436959F21262E525F01F9B72B9E20020733CB4A62ECB604DF0594A747F5EB6A817F5E165C215A847
27,368,840 UART: Caliptra RT
27,369,535 UART: [state] CFI Enabled
27,503,173 UART: [rt] RT listening for mailbox commands...
27,505,473 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,661,006 UART: [rt]cmd =0x41544d4e, len=14344
29,819,941 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,207 UART: [kat] SHA2-256
882,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,253 UART: [kat] ++
886,405 UART: [kat] sha1
890,573 UART: [kat] SHA2-256
892,511 UART: [kat] SHA2-384
895,380 UART: [kat] SHA2-512-ACC
897,281 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,583 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,770 UART: [idev] ++
1,479,938 UART: [idev] CDI.KEYID = 6
1,480,298 UART: [idev] SUBJECT.KEYID = 7
1,480,722 UART: [idev] UDS.KEYID = 0
1,481,067 ready_for_fw is high
1,481,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,132 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,740 UART: [idev] --
1,514,859 UART: [ldev] ++
1,515,027 UART: [ldev] CDI.KEYID = 6
1,515,390 UART: [ldev] SUBJECT.KEYID = 5
1,515,816 UART: [ldev] AUTHORITY.KEYID = 7
1,516,279 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,209 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,100 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,934 UART: [ldev] --
1,586,303 UART: [fwproc] Waiting for Commands...
1,587,020 UART: [fwproc] Received command 0x46574c44
1,587,811 UART: [fwproc] Received Image of size 118548 bytes
5,129,703 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,157,227 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,188,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,328,712 >>> mbox cmd response: success
5,329,952 UART: [afmc] ++
5,330,120 UART: [afmc] CDI.KEYID = 6
5,330,482 UART: [afmc] SUBJECT.KEYID = 7
5,330,907 UART: [afmc] AUTHORITY.KEYID = 5
5,366,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,382,660 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,383,440 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,389,146 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,395,025 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,400,738 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,408,639 UART: [afmc] --
5,409,675 UART: [cold-reset] --
5,410,497 UART: [state] Locking Datavault
5,411,666 UART: [state] Locking PCR0, PCR1 and PCR31
5,412,270 UART: [state] Locking ICCM
5,412,866 UART: [exit] Launching FMC @ 0x40000130
5,418,196 UART:
5,418,212 UART: Running Caliptra FMC ...
5,418,620 UART:
5,418,674 UART: [state] CFI Enabled
5,428,960 UART: [fht] FMC Alias Private Key: 7
5,547,792 UART: [art] Extend RT PCRs Done
5,548,220 UART: [art] Lock RT PCRs Done
5,549,978 UART: [art] Populate DV Done
5,558,173 UART: [fht] FMC Alias Private Key: 7
5,559,199 UART: [art] Derive CDI
5,559,479 UART: [art] Store in slot 0x4
5,644,953 UART: [art] Derive Key Pair
5,645,313 UART: [art] Store priv key in slot 0x5
5,658,388 UART: [art] Derive Key Pair - Done
5,673,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,688,261 UART: [art] Erasing AUTHORITY.KEYID = 7
5,689,026 UART: [art] PUB.X = A8EF5E3207A0DD13E3E1ADF0A60DE1DB30EFA332A0E3ACDC5D5A7BF7B086959F218426D94E8D8C5F8AE1CF259DAC4674
5,695,816 UART: [art] PUB.Y = AC803000F1347FB4405B1791798C91327888ECFA1BD7E99DE5476CFDFBFCA0180FC66E4036720B8F44F3F40550BFEB4B
5,702,745 UART: [art] SIG.R = 14973738B618E690D92EA83EEA566CCA3F1541D3736EEC194ACBACC186B4D8CE7D10F9A6497FF52C8AD9F800F2EF87AD
5,709,511 UART: [art] SIG.S = CD2B03070913328F508051BF36C07F0B429C8BF8EBA57DB3602C4013832A1592395098E24D735604DBDB7C62F6F4167F
5,732,854 UART: Caliptra RT
5,733,105 UART: [state] CFI Enabled
5,852,311 UART: [rt] RT listening for mailbox commands...
5,852,981 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,976,067 UART: [rt]cmd =0x41544d4e, len=14344
7,175,220 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.81s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 ready_for_fw is high
1,362,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,217,481 >>> mbox cmd response: success
5,278,902 UART:
5,278,918 UART: Running Caliptra FMC ...
5,279,326 UART:
5,279,380 UART: [state] CFI Enabled
5,290,098 UART: [fht] FMC Alias Private Key: 7
5,409,350 UART: [art] Extend RT PCRs Done
5,409,778 UART: [art] Lock RT PCRs Done
5,411,452 UART: [art] Populate DV Done
5,419,555 UART: [fht] FMC Alias Private Key: 7
5,420,627 UART: [art] Derive CDI
5,420,907 UART: [art] Store in slot 0x4
5,506,531 UART: [art] Derive Key Pair
5,506,891 UART: [art] Store priv key in slot 0x5
5,519,842 UART: [art] Derive Key Pair - Done
5,534,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,550,190 UART: [art] Erasing AUTHORITY.KEYID = 7
5,550,955 UART: [art] PUB.X = 8DE572F22F0CA89EEFB7C4CA3459AEA03AB378B714C11228DE79E759783F2D218B88DDD79622A138C63BFFBE2B29D113
5,557,736 UART: [art] PUB.Y = BF36D8F673CE7AD4EE32E4C39C877F08BB37A89B82A4C6BAF25591B8117524B1668154A4898BCBA2C4E25B324460670A
5,564,686 UART: [art] SIG.R = 288E619B86846FC5B41C8B2AF611301B7E85DFBE6FF3E86937A5CCDCF265D716845DA62B3C6B5E70DF3C4B30181401BF
5,571,465 UART: [art] SIG.S = E660E71B0737ECA5B68A6941B81B0B886E9DFAF1456EB5C38077C55E5F72B15DF45441C26DF49F0257F77EF96E2D83E9
5,595,544 UART: Caliptra RT
5,595,795 UART: [state] CFI Enabled
5,715,549 UART: [rt] RT listening for mailbox commands...
5,716,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,839,451 UART: [rt]cmd =0x41544d4e, len=14344
7,075,832 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.76s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,574 UART: [kat] SHA2-256
882,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,620 UART: [kat] ++
886,772 UART: [kat] sha1
890,932 UART: [kat] SHA2-256
892,870 UART: [kat] SHA2-384
895,663 UART: [kat] SHA2-512-ACC
897,564 UART: [kat] ECC-384
903,521 UART: [kat] HMAC-384Kdf
908,205 UART: [kat] LMS
1,476,401 UART: [kat] --
1,477,114 UART: [cold-reset] ++
1,477,528 UART: [fht] Storing FHT @ 0x50003400
1,480,293 UART: [idev] ++
1,480,461 UART: [idev] CDI.KEYID = 6
1,480,821 UART: [idev] SUBJECT.KEYID = 7
1,481,245 UART: [idev] UDS.KEYID = 0
1,481,590 ready_for_fw is high
1,481,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,255 UART: [idev] Erasing UDS.KEYID = 0
1,506,165 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,785 UART: [idev] --
1,515,924 UART: [ldev] ++
1,516,092 UART: [ldev] CDI.KEYID = 6
1,516,455 UART: [ldev] SUBJECT.KEYID = 5
1,516,881 UART: [ldev] AUTHORITY.KEYID = 7
1,517,344 UART: [ldev] FE.KEYID = 1
1,522,802 UART: [ldev] Erasing FE.KEYID = 1
1,548,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,001 UART: [ldev] --
1,587,408 UART: [fwproc] Waiting for Commands...
1,588,093 UART: [fwproc] Received command 0x46574c44
1,588,884 UART: [fwproc] Received Image of size 118548 bytes
5,169,343 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,529 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,227,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,038 >>> mbox cmd response: success
5,369,058 UART: [afmc] ++
5,369,226 UART: [afmc] CDI.KEYID = 6
5,369,588 UART: [afmc] SUBJECT.KEYID = 7
5,370,013 UART: [afmc] AUTHORITY.KEYID = 5
5,404,908 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,421,114 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,421,894 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,427,600 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,433,479 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,439,192 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,446,911 UART: [afmc] --
5,447,895 UART: [cold-reset] --
5,448,813 UART: [state] Locking Datavault
5,449,992 UART: [state] Locking PCR0, PCR1 and PCR31
5,450,596 UART: [state] Locking ICCM
5,451,178 UART: [exit] Launching FMC @ 0x40000130
5,456,508 UART:
5,456,524 UART: Running Caliptra FMC ...
5,456,932 UART:
5,457,075 UART: [state] CFI Enabled
5,468,051 UART: [fht] FMC Alias Private Key: 7
5,587,325 UART: [art] Extend RT PCRs Done
5,587,753 UART: [art] Lock RT PCRs Done
5,589,029 UART: [art] Populate DV Done
5,597,322 UART: [fht] FMC Alias Private Key: 7
5,598,410 UART: [art] Derive CDI
5,598,690 UART: [art] Store in slot 0x4
5,684,648 UART: [art] Derive Key Pair
5,685,008 UART: [art] Store priv key in slot 0x5
5,698,357 UART: [art] Derive Key Pair - Done
5,713,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,728,299 UART: [art] Erasing AUTHORITY.KEYID = 7
5,729,064 UART: [art] PUB.X = 31D375A144FC9F82760C97BA0851BF0F80F78D5DD84BEA0E29AF1C5A18E8D36C414A195CFE79F60B14E5E77509F16562
5,735,824 UART: [art] PUB.Y = E137D1A6EF4CE4F3B481C3EB4F9D76BFE8BF1926D17F57E11825EF41C75742BF1282E60CEFF5D9C173EF3AF4CA86BA4F
5,742,795 UART: [art] SIG.R = 8CA168A83A2A0B30CE35DB8E8DF5B5ECEA7A7566FBD50707DF57C85C049C80EFE29B9D7151CE70F06F68123C2C25424B
5,749,569 UART: [art] SIG.S = EA233CBD0AD774F801004B367383634135108C521A076F152B1875C0A415DCD0A9BE7EC1B2B286D8C22B9B1D402304F8
5,773,211 UART: Caliptra RT
5,773,554 UART: [state] CFI Enabled
5,893,487 UART: [rt] RT listening for mailbox commands...
5,894,157 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,999 UART: [rt]cmd =0x41544d4e, len=14344
7,215,675 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.89s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,904 ready_for_fw is high
1,362,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,411 >>> mbox cmd response: success
5,202,016 UART:
5,202,032 UART: Running Caliptra FMC ...
5,202,440 UART:
5,202,583 UART: [state] CFI Enabled
5,213,105 UART: [fht] FMC Alias Private Key: 7
5,332,199 UART: [art] Extend RT PCRs Done
5,332,627 UART: [art] Lock RT PCRs Done
5,334,181 UART: [art] Populate DV Done
5,342,300 UART: [fht] FMC Alias Private Key: 7
5,343,324 UART: [art] Derive CDI
5,343,604 UART: [art] Store in slot 0x4
5,429,586 UART: [art] Derive Key Pair
5,429,946 UART: [art] Store priv key in slot 0x5
5,443,505 UART: [art] Derive Key Pair - Done
5,458,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,473,896 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,661 UART: [art] PUB.X = 753331C41090B0E198D442F40667CA84621100139DECD7B2429BB5476CA253535764F4C33845B47AEC5679C2BE67897A
5,481,396 UART: [art] PUB.Y = FA51CBA11798907D0F9C36BBE731ADE05E3A70B9F9189A030AD5DEAAE9149C8223A561483312385B90B13FF88458504A
5,488,341 UART: [art] SIG.R = E6EABABF4B476B269FE74ACBF3F82E245E9B722E95DDB6D55B59F14F0E3AD7BA0C804C18B6468FF68950C520972813A4
5,495,121 UART: [art] SIG.S = 838267F2EAF46F7FD9F1CE0691B46F0AABF6ACD15EF69E063F6C3B9B37439CF98F9C7933BE63927A3F0A9CB4F66CBD79
5,519,195 UART: Caliptra RT
5,519,538 UART: [state] CFI Enabled
5,639,833 UART: [rt] RT listening for mailbox commands...
5,640,503 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,763,517 UART: [rt]cmd =0x41544d4e, len=14344
6,810,432 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.74s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,556 UART: [state] LifecycleState = Unprovisioned
86,211 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,970 UART: [kat] SHA2-256
891,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,624 UART: [kat] ++
895,776 UART: [kat] sha1
899,866 UART: [kat] SHA2-256
901,806 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,785 UART: [kat] LMS
1,169,097 UART: [kat] --
1,169,934 UART: [cold-reset] ++
1,170,352 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,174,224 ready_for_fw is high
1,174,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,617 UART: [idev] Erasing UDS.KEYID = 0
1,198,487 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,434 UART: [ldev] ++
1,208,602 UART: [ldev] CDI.KEYID = 6
1,208,966 UART: [ldev] SUBJECT.KEYID = 5
1,209,393 UART: [ldev] AUTHORITY.KEYID = 7
1,209,856 UART: [ldev] FE.KEYID = 1
1,214,882 UART: [ldev] Erasing FE.KEYID = 1
1,241,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,030 UART: [ldev] --
1,280,331 UART: [fwproc] Wait for Commands...
1,281,064 UART: [fwproc] Recv command 0x46574c44
1,281,797 UART: [fwproc] Recv'd Img size: 118548 bytes
3,179,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,208,030 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,239,205 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,379,362 >>> mbox cmd response: success
3,380,400 UART: [afmc] ++
3,380,568 UART: [afmc] CDI.KEYID = 6
3,380,931 UART: [afmc] SUBJECT.KEYID = 7
3,381,357 UART: [afmc] AUTHORITY.KEYID = 5
3,417,024 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,433,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,434,124 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,439,831 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,445,708 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,451,418 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,459,202 UART: [afmc] --
3,460,193 UART: [cold-reset] --
3,461,033 UART: [state] Locking Datavault
3,462,218 UART: [state] Locking PCR0, PCR1 and PCR31
3,462,822 UART: [state] Locking ICCM
3,463,276 UART: [exit] Launching FMC @ 0x40000130
3,468,606 UART:
3,468,622 UART: Running Caliptra FMC ...
3,469,030 UART:
3,469,084 UART: [state] CFI Enabled
3,479,438 UART: [fht] FMC Alias Private Key: 7
3,598,162 UART: [art] Extend RT PCRs Done
3,598,590 UART: [art] Lock RT PCRs Done
3,600,160 UART: [art] Populate DV Done
3,608,369 UART: [fht] FMC Alias Private Key: 7
3,609,455 UART: [art] Derive CDI
3,609,735 UART: [art] Store in slot 0x4
3,695,298 UART: [art] Derive Key Pair
3,695,658 UART: [art] Store priv key in slot 0x5
3,709,206 UART: [art] Derive Key Pair - Done
3,723,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,807 UART: [art] PUB.X = 3A0E92CECF4A6B52029D9EC3C06E2E4F6CB08DE7227CE83B49B33238B3D8DC3979C8A40CD420EC6243293C6C321C326F
3,746,580 UART: [art] PUB.Y = B96F87E29A00A2A8660970B6849345C801D6EAEF96BD597993DDD1BE06300991819092E4038CC85D634C92EF1B1606B9
3,753,486 UART: [art] SIG.R = E598900A9026FE898B5EBCF7D99448125D411315908325A69E60C9CC08948D3E76E006E0ED9336D25E39909D207D82B5
3,760,239 UART: [art] SIG.S = DF3E0F8ECAE420D99F0C3DCFE54391229166AC11227F5139C8B0A4330AB6BA62E4648B3D0A87FC3EBBC76E0C283D5543
3,783,794 UART: Caliptra RT
3,784,045 UART: [state] CFI Enabled
3,903,566 UART: [rt] RT listening for mailbox commands...
3,904,236 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,284 UART: [rt]cmd =0x41544d4e, len=14344
4,329,865 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,330 ready_for_fw is high
1,058,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,032 >>> mbox cmd response: success
3,283,143 UART:
3,283,159 UART: Running Caliptra FMC ...
3,283,567 UART:
3,283,621 UART: [state] CFI Enabled
3,294,117 UART: [fht] FMC Alias Private Key: 7
3,413,291 UART: [art] Extend RT PCRs Done
3,413,719 UART: [art] Lock RT PCRs Done
3,415,293 UART: [art] Populate DV Done
3,423,418 UART: [fht] FMC Alias Private Key: 7
3,424,358 UART: [art] Derive CDI
3,424,638 UART: [art] Store in slot 0x4
3,510,339 UART: [art] Derive Key Pair
3,510,699 UART: [art] Store priv key in slot 0x5
3,523,331 UART: [art] Derive Key Pair - Done
3,538,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,497 UART: [art] PUB.X = 2C2FAFDA2F00DEF6DB98CDA37580DED163D2BFD42BF49F9BB08FDB9A93C85AEB51A2C0ED112BECD4462B0B66C2515253
3,561,272 UART: [art] PUB.Y = C87603BF125FD8CB05A3E51D756043770EC8B05863B130700D3BAAF384403D2D096982FB2AA26483A09E5B0F03FB6223
3,568,201 UART: [art] SIG.R = 7B620A218BC7AF3938AA73D6E004E8B89A5E35F95E5BBFF6508B5566245F56F7111A9AB3A14B82CD55DB17B0281D9EF3
3,574,975 UART: [art] SIG.S = BEC071BE3FBF3EA04C46FF70A9172E3D714523672B46F8C22467070D50FB0BF1F02DA52F7411695ABDD79AB17B68BC36
3,599,002 UART: Caliptra RT
3,599,253 UART: [state] CFI Enabled
3,718,885 UART: [rt] RT listening for mailbox commands...
3,719,555 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,271 UART: [rt]cmd =0x41544d4e, len=14344
4,144,934 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
891,363 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,467 UART: [kat] ++
895,619 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,998 UART: [kat] SHA2-512-ACC
906,899 UART: [kat] ECC-384
916,630 UART: [kat] HMAC-384Kdf
921,228 UART: [kat] LMS
1,169,540 UART: [kat] --
1,170,447 UART: [cold-reset] ++
1,170,931 UART: [fht] FHT @ 0x50003400
1,173,513 UART: [idev] ++
1,173,681 UART: [idev] CDI.KEYID = 6
1,174,042 UART: [idev] SUBJECT.KEYID = 7
1,174,467 UART: [idev] UDS.KEYID = 0
1,174,813 ready_for_fw is high
1,174,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,370 UART: [idev] Erasing UDS.KEYID = 0
1,199,852 UART: [idev] Sha1 KeyId Algorithm
1,208,810 UART: [idev] --
1,209,803 UART: [ldev] ++
1,209,971 UART: [ldev] CDI.KEYID = 6
1,210,335 UART: [ldev] SUBJECT.KEYID = 5
1,210,762 UART: [ldev] AUTHORITY.KEYID = 7
1,211,225 UART: [ldev] FE.KEYID = 1
1,216,633 UART: [ldev] Erasing FE.KEYID = 1
1,242,812 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,314 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,949 UART: [ldev] --
1,282,354 UART: [fwproc] Wait for Commands...
1,283,011 UART: [fwproc] Recv command 0x46574c44
1,283,744 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,998 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,217 >>> mbox cmd response: success
3,368,355 UART: [afmc] ++
3,368,523 UART: [afmc] CDI.KEYID = 6
3,368,886 UART: [afmc] SUBJECT.KEYID = 7
3,369,312 UART: [afmc] AUTHORITY.KEYID = 5
3,404,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,414 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,163 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,870 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,747 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,457 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,431 UART: [afmc] --
3,448,370 UART: [cold-reset] --
3,449,414 UART: [state] Locking Datavault
3,450,577 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,181 UART: [state] Locking ICCM
3,451,705 UART: [exit] Launching FMC @ 0x40000130
3,457,035 UART:
3,457,051 UART: Running Caliptra FMC ...
3,457,459 UART:
3,457,602 UART: [state] CFI Enabled
3,468,094 UART: [fht] FMC Alias Private Key: 7
3,588,176 UART: [art] Extend RT PCRs Done
3,588,604 UART: [art] Lock RT PCRs Done
3,590,120 UART: [art] Populate DV Done
3,598,173 UART: [fht] FMC Alias Private Key: 7
3,599,133 UART: [art] Derive CDI
3,599,413 UART: [art] Store in slot 0x4
3,685,332 UART: [art] Derive Key Pair
3,685,692 UART: [art] Store priv key in slot 0x5
3,699,234 UART: [art] Derive Key Pair - Done
3,713,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,242 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,007 UART: [art] PUB.X = 9B22A9AC4AC43BBD3371278986266D5FA2ED6509B9B3905FAB3AD4B48AE4BD2D5166E03E968DF82E1ABBFBD34A1359A4
3,736,792 UART: [art] PUB.Y = FBC456E36B5B998197DDA299FE40BB17D4233B948EF70DED85902D9A6FF9255CDCF8BDF81C71F46E5E4358C309BEE17C
3,743,754 UART: [art] SIG.R = D72D056A1E0C6B665C0F6CA898BDD7DEA1C2B58D8FF9E7E40D2B950E514FC01F5395D8CC41861FB16EE8BFBF655B12CD
3,750,533 UART: [art] SIG.S = 404599FA814AC5A0990CCA60CA12A8631ED125A2573B0B4364F884AEA241F6BADB6EE7532CED693D80E0A06713F24A46
3,774,143 UART: Caliptra RT
3,774,486 UART: [state] CFI Enabled
3,893,660 UART: [rt] RT listening for mailbox commands...
3,894,330 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,564 UART: [rt]cmd =0x41544d4e, len=14344
4,322,726 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 ready_for_fw is high
1,059,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,781 >>> mbox cmd response: success
3,284,576 UART:
3,284,592 UART: Running Caliptra FMC ...
3,285,000 UART:
3,285,143 UART: [state] CFI Enabled
3,295,747 UART: [fht] FMC Alias Private Key: 7
3,414,355 UART: [art] Extend RT PCRs Done
3,414,783 UART: [art] Lock RT PCRs Done
3,416,191 UART: [art] Populate DV Done
3,424,188 UART: [fht] FMC Alias Private Key: 7
3,425,338 UART: [art] Derive CDI
3,425,618 UART: [art] Store in slot 0x4
3,511,421 UART: [art] Derive Key Pair
3,511,781 UART: [art] Store priv key in slot 0x5
3,525,079 UART: [art] Derive Key Pair - Done
3,540,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,590 UART: [art] PUB.X = B32B19528A31B614A037706FF40CE8B96DB6296C8F14798AB312ED774EBDEE1B555FD6AF7322648D098C0A022B07044B
3,562,346 UART: [art] PUB.Y = 03318F4AB47A0F7F107F6E4BA5DB54A2E3234776E6E3E286A9573C26519B3C99B7788230B9DBAE5E171D7EBED0234FEB
3,569,300 UART: [art] SIG.R = 0F1FC9D3B791A635F0F1AB0B08D7D29E8048E004983170AFE7182833CFA8D085E512CDCF418B338952E85C6511AD9FF6
3,576,064 UART: [art] SIG.S = 5877940707D34FE2670174B68BCA2825F6F027171431B84CAB8399D725DACC77C2F0DE26619E7F5E66F28C3D9D747375
3,598,897 UART: Caliptra RT
3,599,240 UART: [state] CFI Enabled
3,719,554 UART: [rt] RT listening for mailbox commands...
3,720,224 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,382 UART: [rt]cmd =0x41544d4e, len=14344
4,143,482 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,588 UART: [kat] SHA2-512-ACC
908,489 UART: [kat] ECC-384
918,442 UART: [kat] HMAC-384Kdf
923,214 UART: [kat] LMS
1,171,542 UART: [kat] --
1,172,375 UART: [cold-reset] ++
1,172,889 UART: [fht] FHT @ 0x50003400
1,175,542 UART: [idev] ++
1,175,710 UART: [idev] CDI.KEYID = 6
1,176,070 UART: [idev] SUBJECT.KEYID = 7
1,176,494 UART: [idev] UDS.KEYID = 0
1,176,839 ready_for_fw is high
1,176,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,500 UART: [idev] Erasing UDS.KEYID = 0
1,201,315 UART: [idev] Sha1 KeyId Algorithm
1,209,745 UART: [idev] --
1,210,629 UART: [ldev] ++
1,210,797 UART: [ldev] CDI.KEYID = 6
1,211,160 UART: [ldev] SUBJECT.KEYID = 5
1,211,586 UART: [ldev] AUTHORITY.KEYID = 7
1,212,049 UART: [ldev] FE.KEYID = 1
1,217,409 UART: [ldev] Erasing FE.KEYID = 1
1,243,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,129 UART: [ldev] --
1,283,486 UART: [fwproc] Wait for Commands...
1,284,100 UART: [fwproc] Recv command 0x46574c44
1,284,828 UART: [fwproc] Recv'd Img size: 118548 bytes
3,176,616 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,568 >>> mbox cmd response: success
3,377,650 UART: [afmc] ++
3,377,818 UART: [afmc] CDI.KEYID = 6
3,378,180 UART: [afmc] SUBJECT.KEYID = 7
3,378,605 UART: [afmc] AUTHORITY.KEYID = 5
3,413,976 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,491 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,239 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,945 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,824 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,534 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,447 UART: [afmc] --
3,457,349 UART: [cold-reset] --
3,458,341 UART: [state] Locking Datavault
3,459,494 UART: [state] Locking PCR0, PCR1 and PCR31
3,460,098 UART: [state] Locking ICCM
3,460,522 UART: [exit] Launching FMC @ 0x40000130
3,465,852 UART:
3,465,868 UART: Running Caliptra FMC ...
3,466,276 UART:
3,466,330 UART: [state] CFI Enabled
3,477,110 UART: [fht] FMC Alias Private Key: 7
3,595,910 UART: [art] Extend RT PCRs Done
3,596,338 UART: [art] Lock RT PCRs Done
3,597,950 UART: [art] Populate DV Done
3,605,873 UART: [fht] FMC Alias Private Key: 7
3,606,901 UART: [art] Derive CDI
3,607,181 UART: [art] Store in slot 0x4
3,692,722 UART: [art] Derive Key Pair
3,693,082 UART: [art] Store priv key in slot 0x5
3,706,822 UART: [art] Derive Key Pair - Done
3,721,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,555 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,320 UART: [art] PUB.X = F295B162E57759BF5C0BBC47DF473B421E2D30C9CA9A656DC05D9FC5A385626B496BCE1B094CA2F626400511FDE1653B
3,745,091 UART: [art] PUB.Y = 2BB83F1F3618FE926F865F62A322CD551B4BB58E0D422C3958BFA2E0B0B7EC785E5032D5921E642AB25E86E48C238E59
3,752,044 UART: [art] SIG.R = D7CE7DF549F3DC96BE665688EEFD7A8D2CBA66392D6746424AF9AF3C3CE7281E568C38CBC53100BAC116FCEC694024A3
3,758,810 UART: [art] SIG.S = 685F62B144BC9FF413B6ECDA0813CDE44907A3F6462C7CCDB7670031421B3131E1D674FD648E1A0AC698694659F19696
3,782,331 UART: Caliptra RT
3,782,582 UART: [state] CFI Enabled
3,901,654 UART: [rt] RT listening for mailbox commands...
3,902,324 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,476 UART: [rt]cmd =0x41544d4e, len=14344
4,325,354 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,949 ready_for_fw is high
1,060,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,215 >>> mbox cmd response: success
3,286,886 UART:
3,286,902 UART: Running Caliptra FMC ...
3,287,310 UART:
3,287,364 UART: [state] CFI Enabled
3,297,842 UART: [fht] FMC Alias Private Key: 7
3,417,456 UART: [art] Extend RT PCRs Done
3,417,884 UART: [art] Lock RT PCRs Done
3,419,432 UART: [art] Populate DV Done
3,428,001 UART: [fht] FMC Alias Private Key: 7
3,429,119 UART: [art] Derive CDI
3,429,399 UART: [art] Store in slot 0x4
3,515,158 UART: [art] Derive Key Pair
3,515,518 UART: [art] Store priv key in slot 0x5
3,529,376 UART: [art] Derive Key Pair - Done
3,544,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,560,048 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,813 UART: [art] PUB.X = 0C4AE17F3AD12B98ED9DF5AECF0263C97DE31702DAAEFDEBE4C5F6ED7697D496D19577B40D485B31C73E53211EAD6D4E
3,567,595 UART: [art] PUB.Y = 6FD78728F95E7300B4B86D4C6C2A50747EBB48642F2C8B5AAD7598F907E987E9E5AC75C95411296311FDE47A4D87DE49
3,574,524 UART: [art] SIG.R = 876EE960D03942B7A63729B6DB0B935691DDEBC2C1D7D0B91BEE176FD319E17D24AD33E2D4AFC57E5B69316BC1489F8A
3,581,305 UART: [art] SIG.S = 7B62C94EE27BAABB5CE04E6DFBB132021E5388A1C9B9091DE7F241F3EC419D68C9640E1757B218C8883AD4D30413D324
3,605,019 UART: Caliptra RT
3,605,270 UART: [state] CFI Enabled
3,725,458 UART: [rt] RT listening for mailbox commands...
3,726,128 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,004 UART: [rt]cmd =0x41544d4e, len=14344
4,146,155 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,488 UART: [kat] SHA2-256
904,428 UART: [kat] SHA2-384
907,105 UART: [kat] SHA2-512-ACC
909,006 UART: [kat] ECC-384
918,649 UART: [kat] HMAC-384Kdf
923,159 UART: [kat] LMS
1,171,487 UART: [kat] --
1,172,306 UART: [cold-reset] ++
1,172,634 UART: [fht] FHT @ 0x50003400
1,175,121 UART: [idev] ++
1,175,289 UART: [idev] CDI.KEYID = 6
1,175,649 UART: [idev] SUBJECT.KEYID = 7
1,176,073 UART: [idev] UDS.KEYID = 0
1,176,418 ready_for_fw is high
1,176,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,200,766 UART: [idev] Sha1 KeyId Algorithm
1,209,454 UART: [idev] --
1,210,324 UART: [ldev] ++
1,210,492 UART: [ldev] CDI.KEYID = 6
1,210,855 UART: [ldev] SUBJECT.KEYID = 5
1,211,281 UART: [ldev] AUTHORITY.KEYID = 7
1,211,744 UART: [ldev] FE.KEYID = 1
1,217,124 UART: [ldev] Erasing FE.KEYID = 1
1,243,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,088 UART: [ldev] --
1,282,551 UART: [fwproc] Wait for Commands...
1,283,255 UART: [fwproc] Recv command 0x46574c44
1,283,983 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,381 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,582 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,931 >>> mbox cmd response: success
3,375,983 UART: [afmc] ++
3,376,151 UART: [afmc] CDI.KEYID = 6
3,376,513 UART: [afmc] SUBJECT.KEYID = 7
3,376,938 UART: [afmc] AUTHORITY.KEYID = 5
3,412,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,898 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,646 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,352 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,231 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,941 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,796 UART: [afmc] --
3,455,880 UART: [cold-reset] --
3,456,426 UART: [state] Locking Datavault
3,457,487 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,091 UART: [state] Locking ICCM
3,458,743 UART: [exit] Launching FMC @ 0x40000130
3,464,073 UART:
3,464,089 UART: Running Caliptra FMC ...
3,464,497 UART:
3,464,640 UART: [state] CFI Enabled
3,475,376 UART: [fht] FMC Alias Private Key: 7
3,594,140 UART: [art] Extend RT PCRs Done
3,594,568 UART: [art] Lock RT PCRs Done
3,596,270 UART: [art] Populate DV Done
3,604,385 UART: [fht] FMC Alias Private Key: 7
3,605,315 UART: [art] Derive CDI
3,605,595 UART: [art] Store in slot 0x4
3,691,224 UART: [art] Derive Key Pair
3,691,584 UART: [art] Store priv key in slot 0x5
3,704,668 UART: [art] Derive Key Pair - Done
3,719,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,073 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,838 UART: [art] PUB.X = 70E6247D24F4320E425C72EBE68228E8BB2DBC1C2ED3857B11D7F0B79DD31EAD059ED10AB58839BD8581A533A454BA06
3,742,606 UART: [art] PUB.Y = DF1980982B9FBBAB5A57389936125198BD8CDFCE416716CED2753FCA3BD7B98620BE4FCD10BFDAEBCA4399A29EBFAB2F
3,749,584 UART: [art] SIG.R = 5112B6949147E975599958DD5F90B3956459480D74EC453B3B0791D01C4B1348FD7C9D5E11D3C81C604DC20AB67EF54F
3,756,341 UART: [art] SIG.S = 2288318252110AC482C900BA2F4A0AB8CAE4C502167780DD00C287F9E8F006CE6C54145E1A86521D13BF0DCC361D81F1
3,780,106 UART: Caliptra RT
3,780,449 UART: [state] CFI Enabled
3,899,701 UART: [rt] RT listening for mailbox commands...
3,900,371 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,301 UART: [rt]cmd =0x41544d4e, len=14344
4,326,062 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 ready_for_fw is high
1,060,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,463 >>> mbox cmd response: success
3,286,304 UART:
3,286,320 UART: Running Caliptra FMC ...
3,286,728 UART:
3,286,871 UART: [state] CFI Enabled
3,297,615 UART: [fht] FMC Alias Private Key: 7
3,416,681 UART: [art] Extend RT PCRs Done
3,417,109 UART: [art] Lock RT PCRs Done
3,418,691 UART: [art] Populate DV Done
3,427,002 UART: [fht] FMC Alias Private Key: 7
3,428,008 UART: [art] Derive CDI
3,428,288 UART: [art] Store in slot 0x4
3,514,143 UART: [art] Derive Key Pair
3,514,503 UART: [art] Store priv key in slot 0x5
3,527,819 UART: [art] Derive Key Pair - Done
3,542,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,171 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,936 UART: [art] PUB.X = CF17E4E4AE66D78D25F9CC5F2F49D1A705469D681A6E3902C1CA30AB8E61901D0189312B47F3133C17816E39EC706A0A
3,565,698 UART: [art] PUB.Y = C82219FDF82EC0396F7BC8BBBE93F852F2227348848C002CDE113A642BB30BAA8B3499EB03582A36B00C7D0DB9EEC7FC
3,572,630 UART: [art] SIG.R = 717979CD80EBF2BD0D724A4CA1DED38032C9E5BF354E57C7B9B0F61DCA870438566262B8716EA6E707E337598ABCC664
3,579,399 UART: [art] SIG.S = F6CB34AEA53D572329F48AC6E11BDCF7027D52FA3C45934F7AD8274B1247F10387762DBA0B3EA82D2E89C958E2ADDB50
3,603,226 UART: Caliptra RT
3,603,569 UART: [state] CFI Enabled
3,723,843 UART: [rt] RT listening for mailbox commands...
3,724,513 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,605 UART: [rt]cmd =0x41544d4e, len=14344
4,150,010 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
192,116 UART:
192,495 UART: Running Caliptra ROM ...
193,645 UART:
193,819 UART: [state] CFI Enabled
264,815 UART: [state] LifecycleState = Unprovisioned
266,729 UART: [state] DebugLocked = No
269,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,760 UART: [kat] SHA2-256
443,507 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,975 UART: [kat] ++
454,450 UART: [kat] sha1
464,685 UART: [kat] SHA2-256
467,332 UART: [kat] SHA2-384
473,036 UART: [kat] SHA2-512-ACC
475,403 UART: [kat] ECC-384
2,770,229 UART: [kat] HMAC-384Kdf
2,799,436 UART: [kat] LMS
3,989,754 UART: [kat] --
3,994,258 UART: [cold-reset] ++
3,995,425 UART: [fht] Storing FHT @ 0x50003400
4,007,194 UART: [idev] ++
4,007,768 UART: [idev] CDI.KEYID = 6
4,008,683 UART: [idev] SUBJECT.KEYID = 7
4,009,933 UART: [idev] UDS.KEYID = 0
4,011,004 ready_for_fw is high
4,011,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,292 UART: [idev] Erasing UDS.KEYID = 0
7,346,252 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,872 UART: [idev] --
7,370,434 UART: [ldev] ++
7,371,000 UART: [ldev] CDI.KEYID = 6
7,371,942 UART: [ldev] SUBJECT.KEYID = 5
7,373,098 UART: [ldev] AUTHORITY.KEYID = 7
7,374,447 UART: [ldev] FE.KEYID = 1
7,421,200 UART: [ldev] Erasing FE.KEYID = 1
10,755,918 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,351 UART: [ldev] --
13,133,423 UART: [fwproc] Waiting for Commands...
13,135,838 UART: [fwproc] Received command 0x46574c44
13,138,012 UART: [fwproc] Received Image of size 118548 bytes
17,243,747 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,317,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,054 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,163 >>> mbox cmd response: success
17,724,649 UART: [afmc] ++
17,725,261 UART: [afmc] CDI.KEYID = 6
17,726,175 UART: [afmc] SUBJECT.KEYID = 7
17,727,412 UART: [afmc] AUTHORITY.KEYID = 5
21,088,133 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,802 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,112 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,403,545 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,418,276 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,432,660 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,617 UART: [afmc] --
23,459,257 UART: [cold-reset] --
23,463,393 UART: [state] Locking Datavault
23,470,365 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,118 UART: [state] Locking ICCM
23,473,862 UART: [exit] Launching FMC @ 0x40000130
23,482,254 UART:
23,482,538 UART: Running Caliptra FMC ...
23,483,568 UART:
23,483,737 UART: [state] CFI Enabled
23,547,127 UART: [fht] FMC Alias Private Key: 7
25,888,297 UART: [art] Extend RT PCRs Done
25,889,514 UART: [art] Lock RT PCRs Done
25,891,002 UART: [art] Populate DV Done
25,896,255 UART: [fht] FMC Alias Private Key: 7
25,897,786 UART: [art] Derive CDI
25,898,518 UART: [art] Store in slot 0x4
25,955,230 UART: [art] Derive Key Pair
25,956,226 UART: [art] Store priv key in slot 0x5
29,249,545 UART: [art] Derive Key Pair - Done
29,262,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,982 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,490 UART: [art] PUB.X = E35379136B8028AD85B94F53AF3BE9CBA854E23D9E12F042600E8DF5E398B348EB9014C71F29BF638306E162836BFD65
31,559,794 UART: [art] PUB.Y = 6899E014B79DF2714DC95F52B7AD669C961A8C280951D0CAB104DAAC2BEB586A1D6C46F95E8564558E2704A68D4DECD4
31,567,054 UART: [art] SIG.R = BD89BC4D523A09B845ACA973109989587A15F080BD93506F68FF0A891DDF8ACE3767B8B4DB917C9C1029A06890FFA9BC
31,574,476 UART: [art] SIG.S = 98370B5F6D65778C4B359F8FF723BC5BD226AC6D5441EDD3C534886357AAF72D7E6CD35AEE02E6B8E35A9287169D0AD3
32,879,861 UART: Caliptra RT
32,880,546 UART: [state] CFI Enabled
33,057,586 UART: [rt] RT listening for mailbox commands...
33,059,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,215,250 UART: [rt]cmd =0x41544d4e, len=14344
38,516,170 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,804,317 ready_for_fw is high
3,804,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,286 >>> mbox cmd response: success
23,649,380 UART:
23,649,797 UART: Running Caliptra FMC ...
23,650,917 UART:
23,651,073 UART: [state] CFI Enabled
23,720,705 UART: [fht] FMC Alias Private Key: 7
26,061,495 UART: [art] Extend RT PCRs Done
26,062,731 UART: [art] Lock RT PCRs Done
26,064,632 UART: [art] Populate DV Done
26,069,992 UART: [fht] FMC Alias Private Key: 7
26,071,651 UART: [art] Derive CDI
26,072,473 UART: [art] Store in slot 0x4
26,129,683 UART: [art] Derive Key Pair
26,130,683 UART: [art] Store priv key in slot 0x5
29,423,244 UART: [art] Derive Key Pair - Done
29,436,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,724,798 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,315 UART: [art] PUB.X = 1ECB6815D78E4ECEFD599E39CC50220B25497B67BC7081DF68EF2A9B622A1BCA5B541FBA55D3004BF19296856EEEAAA4
31,733,571 UART: [art] PUB.Y = 91D06E9D3F5DECC79227942DB518D6C4DB2D4D36A5B03DBD96ADE41035AEEE205E6FBD6881FD4241DFC9F054352E4E58
31,740,855 UART: [art] SIG.R = F5CC5987CF96630AA927F0FD1C76C9BE92E7C2E73A29375281743899D6BF16AD9869CE783500528F27613BA47E51F43D
31,748,204 UART: [art] SIG.S = 5CC89E3B4823951EC464F1106654A0EE969BF3DD915BD3401DFF4A1AD49B0EDE5E55F6C1A87B5D10515DC0D4F91DA3DB
33,053,056 UART: Caliptra RT
33,053,775 UART: [state] CFI Enabled
33,229,796 UART: [rt] RT listening for mailbox commands...
33,232,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,387,518 UART: [rt]cmd =0x41544d4e, len=14344
38,688,491 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
192,614 UART:
192,967 UART: Running Caliptra ROM ...
194,144 UART:
603,944 UART: [state] CFI Enabled
621,449 UART: [state] LifecycleState = Unprovisioned
623,385 UART: [state] DebugLocked = No
626,208 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
631,030 UART: [kat] SHA2-256
800,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,269 UART: [kat] ++
811,791 UART: [kat] sha1
823,011 UART: [kat] SHA2-256
825,730 UART: [kat] SHA2-384
830,242 UART: [kat] SHA2-512-ACC
832,604 UART: [kat] ECC-384
3,117,268 UART: [kat] HMAC-384Kdf
3,130,197 UART: [kat] LMS
4,320,320 UART: [kat] --
4,323,629 UART: [cold-reset] ++
4,324,847 UART: [fht] Storing FHT @ 0x50003400
4,335,473 UART: [idev] ++
4,336,031 UART: [idev] CDI.KEYID = 6
4,337,057 UART: [idev] SUBJECT.KEYID = 7
4,338,230 UART: [idev] UDS.KEYID = 0
4,339,298 ready_for_fw is high
4,339,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,397 UART: [idev] Erasing UDS.KEYID = 0
7,626,128 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,464 UART: [idev] --
7,651,314 UART: [ldev] ++
7,651,936 UART: [ldev] CDI.KEYID = 6
7,652,896 UART: [ldev] SUBJECT.KEYID = 5
7,654,096 UART: [ldev] AUTHORITY.KEYID = 7
7,655,323 UART: [ldev] FE.KEYID = 1
7,664,345 UART: [ldev] Erasing FE.KEYID = 1
10,950,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,174 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,540 UART: [ldev] --
13,313,039 UART: [fwproc] Waiting for Commands...
13,316,368 UART: [fwproc] Received command 0x46574c44
13,318,546 UART: [fwproc] Received Image of size 118548 bytes
17,426,354 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,226 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,833 >>> mbox cmd response: success
17,907,319 UART: [afmc] ++
17,907,949 UART: [afmc] CDI.KEYID = 6
17,908,834 UART: [afmc] SUBJECT.KEYID = 7
17,910,108 UART: [afmc] AUTHORITY.KEYID = 5
21,226,452 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,726 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,141 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,864 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,252 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,681 UART: [afmc] --
23,589,795 UART: [cold-reset] --
23,594,794 UART: [state] Locking Datavault
23,600,704 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,400 UART: [state] Locking ICCM
23,603,603 UART: [exit] Launching FMC @ 0x40000130
23,611,991 UART:
23,612,216 UART: Running Caliptra FMC ...
23,613,235 UART:
23,613,377 UART: [state] CFI Enabled
23,622,010 UART: [fht] FMC Alias Private Key: 7
25,962,041 UART: [art] Extend RT PCRs Done
25,963,273 UART: [art] Lock RT PCRs Done
25,964,709 UART: [art] Populate DV Done
25,970,084 UART: [fht] FMC Alias Private Key: 7
25,971,730 UART: [art] Derive CDI
25,972,541 UART: [art] Store in slot 0x4
26,015,297 UART: [art] Derive Key Pair
26,016,338 UART: [art] Store priv key in slot 0x5
29,258,026 UART: [art] Derive Key Pair - Done
29,270,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,017 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,522 UART: [art] PUB.X = 87D6319C0C5815E839A4EF4A182AC6EFB93216FF5BC9933F8CD6E274841B7FA8713AAC10703B81C4D6F931F96C3498CD
31,559,765 UART: [art] PUB.Y = 3683DBBC7C5BC23ED4320B9307E9606C7E703ECFB2E7235095E548E0904501A0AAB97491BE3AF720646DDF050217BECF
31,567,055 UART: [art] SIG.R = 17B15C6B39F9166D71D63E0B4683858886D2865D051117E6A860A809777A595C7111E2403903F8483F431D29F291CB3B
31,574,382 UART: [art] SIG.S = 4986F07F4A618E08ABDBBD40657D92DAA4224B8BDAD75FFC13764910FDD8AC1FB23DBBCDD03B6A11DA3104D7725CE2D0
32,879,947 UART: Caliptra RT
32,880,629 UART: [state] CFI Enabled
33,013,616 UART: [rt] RT listening for mailbox commands...
33,015,922 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,171,611 UART: [rt]cmd =0x41544d4e, len=14344
38,472,572 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
4,125,961 ready_for_fw is high
4,126,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,574 >>> mbox cmd response: success
23,793,902 UART:
23,794,309 UART: Running Caliptra FMC ...
23,795,420 UART:
23,795,576 UART: [state] CFI Enabled
23,803,191 UART: [fht] FMC Alias Private Key: 7
26,143,138 UART: [art] Extend RT PCRs Done
26,144,366 UART: [art] Lock RT PCRs Done
26,146,260 UART: [art] Populate DV Done
26,151,767 UART: [fht] FMC Alias Private Key: 7
26,153,466 UART: [art] Derive CDI
26,154,275 UART: [art] Store in slot 0x4
26,196,563 UART: [art] Derive Key Pair
26,197,605 UART: [art] Store priv key in slot 0x5
29,439,745 UART: [art] Derive Key Pair - Done
29,452,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,764 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,272 UART: [art] PUB.X = 01A316A4760DF558FFBBCFE961774D3B0D110DD5DCCDFA0F75E66B2EC173E82D642E0B2D4F0487A89B36B2867F4BBFE4
31,741,531 UART: [art] PUB.Y = 4B8A63033DACDB1008588A3D9052EB120D6D316D301AE40500511BD91A5294EBBF8CF745D6F36C31559C03101A50F68C
31,748,781 UART: [art] SIG.R = 739007C58FA47D594BE24A864C84F5C1911EAD8E72F56C018A9B96A9C0AAECE77510A4786DDFBCA78C6472226FA8F097
31,756,172 UART: [art] SIG.S = 2E96E6298053359C0841707AA15862ABA8201A3E563857C1DC0AD29E61CF34871BCE15A8FD47B1CD1A5A2894535B25B5
33,060,935 UART: Caliptra RT
33,061,633 UART: [state] CFI Enabled
33,194,589 UART: [rt] RT listening for mailbox commands...
33,196,881 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,352,008 UART: [rt]cmd =0x41544d4e, len=14344
38,653,297 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
192,075 UART:
192,453 UART: Running Caliptra ROM ...
193,544 UART:
193,686 UART: [state] CFI Enabled
262,695 UART: [state] LifecycleState = Unprovisioned
264,667 UART: [state] DebugLocked = No
266,186 UART: [state] WD Timer not started. Device not locked for debugging
270,285 UART: [kat] SHA2-256
449,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,676 UART: [kat] ++
461,119 UART: [kat] sha1
473,198 UART: [kat] SHA2-256
475,856 UART: [kat] SHA2-384
481,643 UART: [kat] SHA2-512-ACC
484,002 UART: [kat] ECC-384
2,949,468 UART: [kat] HMAC-384Kdf
2,970,407 UART: [kat] LMS
3,446,950 UART: [kat] --
3,451,372 UART: [cold-reset] ++
3,453,731 UART: [fht] FHT @ 0x50003400
3,465,203 UART: [idev] ++
3,465,759 UART: [idev] CDI.KEYID = 6
3,466,705 UART: [idev] SUBJECT.KEYID = 7
3,468,012 UART: [idev] UDS.KEYID = 0
3,468,913 ready_for_fw is high
3,469,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,277 UART: [idev] Erasing UDS.KEYID = 0
5,986,749 UART: [idev] Sha1 KeyId Algorithm
6,009,555 UART: [idev] --
6,014,548 UART: [ldev] ++
6,015,178 UART: [ldev] CDI.KEYID = 6
6,016,088 UART: [ldev] SUBJECT.KEYID = 5
6,017,303 UART: [ldev] AUTHORITY.KEYID = 7
6,018,534 UART: [ldev] FE.KEYID = 1
6,055,340 UART: [ldev] Erasing FE.KEYID = 1
8,563,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,718 UART: [ldev] --
10,373,826 UART: [fwproc] Wait for Commands...
10,375,447 UART: [fwproc] Recv command 0x46574c44
10,377,429 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,169 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,376 >>> mbox cmd response: success
14,341,799 UART: [afmc] ++
14,342,443 UART: [afmc] CDI.KEYID = 6
14,343,350 UART: [afmc] SUBJECT.KEYID = 7
14,344,564 UART: [afmc] AUTHORITY.KEYID = 5
16,877,211 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,853 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,938 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,478 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,095 UART: [afmc] --
18,692,856 UART: [cold-reset] --
18,695,103 UART: [state] Locking Datavault
18,701,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,374 UART: [state] Locking ICCM
18,705,578 UART: [exit] Launching FMC @ 0x40000130
18,714,029 UART:
18,714,266 UART: Running Caliptra FMC ...
18,715,366 UART:
18,715,527 UART: [state] CFI Enabled
18,773,869 UART: [fht] FMC Alias Private Key: 7
20,561,629 UART: [art] Extend RT PCRs Done
20,562,835 UART: [art] Lock RT PCRs Done
20,564,502 UART: [art] Populate DV Done
20,569,800 UART: [fht] FMC Alias Private Key: 7
20,571,549 UART: [art] Derive CDI
20,572,362 UART: [art] Store in slot 0x4
20,627,611 UART: [art] Derive Key Pair
20,628,676 UART: [art] Store priv key in slot 0x5
23,092,494 UART: [art] Derive Key Pair - Done
23,105,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,971 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,483 UART: [art] PUB.X = 758CEA71A41256B4B838041431A2B1F2F8AFBD51E47124EF75CEC80307054F1C88B16BE96C399DEE38DE5EAAE55A3FE7
24,826,792 UART: [art] PUB.Y = 4A850D967E4E811DBB29AB6E30BB1289A7A3CCE73719D6AFB45DF7BB571BDD51082ABFA8AA0AF000F866B3D2B94F976D
24,834,026 UART: [art] SIG.R = 1FAC58480A8EAB0DA7C0BF2ADB5C49658E41736D0946FE7638F761E86D663E0AFA77B38B22922A923A0875C380681B5F
24,841,418 UART: [art] SIG.S = D117822C93691D126D864A70103286C8DC79FA1D784C418307D616B194A3A90CF37F2A130CECE5C7F716B7F1C0C049D1
25,820,411 UART: Caliptra RT
25,821,114 UART: [state] CFI Enabled
26,001,796 UART: [rt] RT listening for mailbox commands...
26,004,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,159,647 UART: [rt]cmd =0x41544d4e, len=14344
30,155,838 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
3,460,878 ready_for_fw is high
3,461,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,058 >>> mbox cmd response: success
18,535,718 UART:
18,536,099 UART: Running Caliptra FMC ...
18,537,239 UART:
18,537,397 UART: [state] CFI Enabled
18,601,553 UART: [fht] FMC Alias Private Key: 7
20,367,369 UART: [art] Extend RT PCRs Done
20,368,596 UART: [art] Lock RT PCRs Done
20,370,218 UART: [art] Populate DV Done
20,375,812 UART: [fht] FMC Alias Private Key: 7
20,377,401 UART: [art] Derive CDI
20,378,214 UART: [art] Store in slot 0x4
20,434,448 UART: [art] Derive Key Pair
20,435,495 UART: [art] Store priv key in slot 0x5
22,898,314 UART: [art] Derive Key Pair - Done
22,911,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,485 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,998 UART: [art] PUB.X = BA4CE43FEE2D43108EA76BB83F3D0CEFF300D13CE61E4F09F0646E234CFA39AF4DF8EF03241B2E61FD3B8066FDCAE7AD
24,633,279 UART: [art] PUB.Y = 0358ED9EAD06B7E825BFD82A81D23E7AF72C19EA7ABBFAC8931948AF2E32324102F94242142910638878F7FB047EAFDF
24,640,538 UART: [art] SIG.R = D5DBE9A6DBD8B463F0250157AAF4BD760129A2521C74A071184985FA5A231EF545B3AAF86ACB92169216D341D04F4BCB
24,647,938 UART: [art] SIG.S = 3D37AB335FD331A32A1476EF61F79308022455870D268DB03997E650D6FB55078281E77138003EE128370CC5F8740669
25,626,210 UART: Caliptra RT
25,626,924 UART: [state] CFI Enabled
25,808,953 UART: [rt] RT listening for mailbox commands...
25,811,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,966,484 UART: [rt]cmd =0x41544d4e, len=14344
29,962,042 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,568 UART:
192,917 UART: Running Caliptra ROM ...
194,036 UART:
603,802 UART: [state] CFI Enabled
620,049 UART: [state] LifecycleState = Unprovisioned
621,964 UART: [state] DebugLocked = No
623,857 UART: [state] WD Timer not started. Device not locked for debugging
628,328 UART: [kat] SHA2-256
807,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,797 UART: [kat] ++
819,247 UART: [kat] sha1
830,124 UART: [kat] SHA2-256
832,848 UART: [kat] SHA2-384
837,845 UART: [kat] SHA2-512-ACC
840,232 UART: [kat] ECC-384
3,281,132 UART: [kat] HMAC-384Kdf
3,294,143 UART: [kat] LMS
3,770,643 UART: [kat] --
3,774,564 UART: [cold-reset] ++
3,776,776 UART: [fht] FHT @ 0x50003400
3,787,748 UART: [idev] ++
3,788,383 UART: [idev] CDI.KEYID = 6
3,789,264 UART: [idev] SUBJECT.KEYID = 7
3,790,578 UART: [idev] UDS.KEYID = 0
3,791,506 ready_for_fw is high
3,791,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,548 UART: [idev] Erasing UDS.KEYID = 0
6,266,814 UART: [idev] Sha1 KeyId Algorithm
6,291,780 UART: [idev] --
6,295,883 UART: [ldev] ++
6,296,535 UART: [ldev] CDI.KEYID = 6
6,297,451 UART: [ldev] SUBJECT.KEYID = 5
6,298,612 UART: [ldev] AUTHORITY.KEYID = 7
6,300,057 UART: [ldev] FE.KEYID = 1
6,310,750 UART: [ldev] Erasing FE.KEYID = 1
8,788,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,188 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,277 UART: [ldev] --
10,584,757 UART: [fwproc] Wait for Commands...
10,586,689 UART: [fwproc] Recv command 0x46574c44
10,588,673 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,646 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,546,501 >>> mbox cmd response: success
14,549,826 UART: [afmc] ++
14,550,482 UART: [afmc] CDI.KEYID = 6
14,551,400 UART: [afmc] SUBJECT.KEYID = 7
14,552,617 UART: [afmc] AUTHORITY.KEYID = 5
17,059,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,760 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,845 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,379 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,696 UART: [afmc] --
18,859,883 UART: [cold-reset] --
18,863,309 UART: [state] Locking Datavault
18,868,625 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,403 UART: [state] Locking ICCM
18,872,018 UART: [exit] Launching FMC @ 0x40000130
18,880,427 UART:
18,880,670 UART: Running Caliptra FMC ...
18,881,773 UART:
18,881,931 UART: [state] CFI Enabled
18,890,251 UART: [fht] FMC Alias Private Key: 7
20,656,156 UART: [art] Extend RT PCRs Done
20,657,365 UART: [art] Lock RT PCRs Done
20,658,911 UART: [art] Populate DV Done
20,664,546 UART: [fht] FMC Alias Private Key: 7
20,666,085 UART: [art] Derive CDI
20,666,829 UART: [art] Store in slot 0x4
20,709,689 UART: [art] Derive Key Pair
20,710,725 UART: [art] Store priv key in slot 0x5
23,137,486 UART: [art] Derive Key Pair - Done
23,150,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,313 UART: [art] PUB.X = 4AEFF127CD10309D55AF422ADF2E6950A7919C1C2A0715D85C105C2E7C334D55706EFA486077F61C44EAFB16D9EF41B4
24,865,631 UART: [art] PUB.Y = 21B7C1F18F460C6083DBFE72BEB5C9CA25065AE71AA3F39A8B6B29D0C26652CD98D175FECB78DADD606760D48FD0105C
24,872,928 UART: [art] SIG.R = 63B88B6EABF60FA3F6FB6C10800FDFE41C5DE1FE24F0227DEDEE6E524F66AFD1247058B5666FE9938220B431EDBF1F58
24,880,330 UART: [art] SIG.S = A493CB4B0F93D5FEC9C0C8A674CFA4DC4B03CCDAAF319B4D2633B2A0E28F938DEB7ED7365406A12D16FE3944C7BDFF66
25,859,191 UART: Caliptra RT
25,859,911 UART: [state] CFI Enabled
25,991,919 UART: [rt] RT listening for mailbox commands...
25,994,219 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,149,456 UART: [rt]cmd =0x41544d4e, len=14344
30,144,668 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
3,782,533 ready_for_fw is high
3,782,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,650 >>> mbox cmd response: success
18,693,875 UART:
18,694,273 UART: Running Caliptra FMC ...
18,695,400 UART:
18,695,558 UART: [state] CFI Enabled
18,703,740 UART: [fht] FMC Alias Private Key: 7
20,470,027 UART: [art] Extend RT PCRs Done
20,471,250 UART: [art] Lock RT PCRs Done
20,472,982 UART: [art] Populate DV Done
20,478,352 UART: [fht] FMC Alias Private Key: 7
20,479,957 UART: [art] Derive CDI
20,480,724 UART: [art] Store in slot 0x4
20,523,532 UART: [art] Derive Key Pair
20,524,570 UART: [art] Store priv key in slot 0x5
22,951,302 UART: [art] Derive Key Pair - Done
22,964,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,020 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,531 UART: [art] PUB.X = CEC5B28C761A7AF3D3CD970283C6B0955C23F3E770082894ED4DDD302DECA0802980289C673D46A60A0CBA0997303224
24,679,804 UART: [art] PUB.Y = 5618F3EEE6CFD1DF6B8D9A44B6E7ABEE37593DB287E183F26578E058377404202FCB5A404B63F999F8A145AACD5A23F5
24,687,056 UART: [art] SIG.R = 70FC7B4598A497C0BCE810447326010C7D899E84FDB3E1D29D354BEA8CD0FF3255116E1FA847BB6CAE6C31351267FDF1
24,694,463 UART: [art] SIG.S = B319A9A2FE25C08D9E622FD8EE621636F1F5B041C33F00CFDB2AC841F571D8C282D6596FFF20B63233AAAC34F1B0735A
25,672,544 UART: Caliptra RT
25,673,256 UART: [state] CFI Enabled
25,806,145 UART: [rt] RT listening for mailbox commands...
25,808,677 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,963,941 UART: [rt]cmd =0x41544d4e, len=14344
29,959,615 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,010 UART:
192,381 UART: Running Caliptra ROM ...
193,490 UART:
193,637 UART: [state] CFI Enabled
267,962 UART: [state] LifecycleState = Unprovisioned
270,306 UART: [state] DebugLocked = No
271,683 UART: [state] WD Timer not started. Device not locked for debugging
276,416 UART: [kat] SHA2-256
466,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,096 UART: [kat] ++
477,588 UART: [kat] sha1
489,380 UART: [kat] SHA2-256
492,385 UART: [kat] SHA2-384
497,468 UART: [kat] SHA2-512-ACC
500,087 UART: [kat] ECC-384
2,951,551 UART: [kat] HMAC-384Kdf
2,973,654 UART: [kat] LMS
3,505,401 UART: [kat] --
3,509,621 UART: [cold-reset] ++
3,511,202 UART: [fht] FHT @ 0x50003400
3,521,252 UART: [idev] ++
3,521,952 UART: [idev] CDI.KEYID = 6
3,522,980 UART: [idev] SUBJECT.KEYID = 7
3,524,149 UART: [idev] UDS.KEYID = 0
3,525,335 ready_for_fw is high
3,525,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,689 UART: [idev] Erasing UDS.KEYID = 0
6,028,280 UART: [idev] Sha1 KeyId Algorithm
6,049,949 UART: [idev] --
6,053,834 UART: [ldev] ++
6,054,514 UART: [ldev] CDI.KEYID = 6
6,055,449 UART: [ldev] SUBJECT.KEYID = 5
6,056,607 UART: [ldev] AUTHORITY.KEYID = 7
6,057,844 UART: [ldev] FE.KEYID = 1
6,104,417 UART: [ldev] Erasing FE.KEYID = 1
8,607,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,346,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,201 UART: [ldev] --
10,420,499 UART: [fwproc] Wait for Commands...
10,423,656 UART: [fwproc] Recv command 0x46574c44
10,425,916 UART: [fwproc] Recv'd Img size: 118548 bytes
13,914,100 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,107,974 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,667,570 >>> mbox cmd response: success
14,670,849 UART: [afmc] ++
14,671,570 UART: [afmc] CDI.KEYID = 6
14,672,681 UART: [afmc] SUBJECT.KEYID = 7
14,674,228 UART: [afmc] AUTHORITY.KEYID = 5
17,220,925 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,943,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,945,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,960,397 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,975,536 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,990,507 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,013,791 UART: [afmc] --
19,016,953 UART: [cold-reset] --
19,020,706 UART: [state] Locking Datavault
19,028,226 UART: [state] Locking PCR0, PCR1 and PCR31
19,030,382 UART: [state] Locking ICCM
19,033,097 UART: [exit] Launching FMC @ 0x40000130
19,041,724 UART:
19,041,961 UART: Running Caliptra FMC ...
19,043,062 UART:
19,043,225 UART: [state] CFI Enabled
19,100,823 UART: [fht] FMC Alias Private Key: 7
20,867,409 UART: [art] Extend RT PCRs Done
20,868,631 UART: [art] Lock RT PCRs Done
20,870,495 UART: [art] Populate DV Done
20,875,899 UART: [fht] FMC Alias Private Key: 7
20,877,376 UART: [art] Derive CDI
20,878,110 UART: [art] Store in slot 0x4
20,933,775 UART: [art] Derive Key Pair
20,934,827 UART: [art] Store priv key in slot 0x5
23,397,475 UART: [art] Derive Key Pair - Done
23,410,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,124,238 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,743 UART: [art] PUB.X = 0C7D5C00F23A0CB09F95F93C0B183EEF95FD27380502CB4B0EDC9B4BA3A759E24F05D8A1E78BB3EF2B2F5B28DA5BE6D1
25,133,010 UART: [art] PUB.Y = 2DBDDAF75CD6D04DA84D993D5288FC302FFB064DADDCC715567E2C130C6F8D35AAB774AAD0DB502D251C72131910308C
25,140,273 UART: [art] SIG.R = DD5B72081D2EBB18080AA6E0D1025DB6165D3E6B2FBFBF7CECC83C2946ACB788F675C0BF82904A12A0B2E0BF6398CF90
25,147,693 UART: [art] SIG.S = F7441718D9B9F0F06B6658A0D2ED9EC7CDE3B277F4B46905E376AD8DD768D19176EED8F862838A071A9951794B7BBE65
26,126,857 UART: Caliptra RT
26,127,558 UART: [state] CFI Enabled
26,307,408 UART: [rt] RT listening for mailbox commands...
26,309,753 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,465,126 UART: [rt]cmd =0x41544d4e, len=14344
30,460,797 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,440,445 ready_for_fw is high
3,440,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,977 >>> mbox cmd response: success
19,132,506 UART:
19,132,892 UART: Running Caliptra FMC ...
19,134,032 UART:
19,134,192 UART: [state] CFI Enabled
19,200,676 UART: [fht] FMC Alias Private Key: 7
20,988,223 UART: [art] Extend RT PCRs Done
20,989,477 UART: [art] Lock RT PCRs Done
20,990,917 UART: [art] Populate DV Done
20,996,223 UART: [fht] FMC Alias Private Key: 7
20,997,875 UART: [art] Derive CDI
20,998,610 UART: [art] Store in slot 0x4
21,055,009 UART: [art] Derive Key Pair
21,056,062 UART: [art] Store priv key in slot 0x5
23,519,345 UART: [art] Derive Key Pair - Done
23,532,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,245,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,679 UART: [art] PUB.X = 96BB4446CE05F2BD74C6AA0EA802E33DDF1E137FE27C1B3853172376178E3FC1F1CAB504A02015085998C81201115A32
25,253,915 UART: [art] PUB.Y = 6D69430EF8B90B59A65A2A457256F3C3EAD9DCD33C48607E0BF26BFAB86F09A8FA26010DCADF767B66639C03ABC68C70
25,261,224 UART: [art] SIG.R = 7AA3F7CC19FD48D08CD065AB4D0B2BA15B7533C1F3EC25E3CF2FB93F1B2823FA327F041BF527F547B814A841951123E2
25,268,579 UART: [art] SIG.S = 33D1570DD1138DE5E731F36369ADFAA60F55A4BE770B4BD7924C2A4EEF31718DCA47C35BF5AA4B883A55B8A424FAF1C5
26,247,173 UART: Caliptra RT
26,247,886 UART: [state] CFI Enabled
26,430,151 UART: [rt] RT listening for mailbox commands...
26,433,878 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,589,304 UART: [rt]cmd =0x41544d4e, len=14344
30,584,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,402 UART:
192,759 UART: Running Caliptra ROM ...
193,886 UART:
603,724 UART: [state] CFI Enabled
617,919 UART: [state] LifecycleState = Unprovisioned
620,351 UART: [state] DebugLocked = No
622,018 UART: [state] WD Timer not started. Device not locked for debugging
626,135 UART: [kat] SHA2-256
816,025 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,776 UART: [kat] ++
827,322 UART: [kat] sha1
839,761 UART: [kat] SHA2-256
842,843 UART: [kat] SHA2-384
848,573 UART: [kat] SHA2-512-ACC
851,126 UART: [kat] ECC-384
3,293,212 UART: [kat] HMAC-384Kdf
3,307,525 UART: [kat] LMS
3,839,335 UART: [kat] --
3,844,066 UART: [cold-reset] ++
3,845,368 UART: [fht] FHT @ 0x50003400
3,856,426 UART: [idev] ++
3,857,082 UART: [idev] CDI.KEYID = 6
3,858,122 UART: [idev] SUBJECT.KEYID = 7
3,859,230 UART: [idev] UDS.KEYID = 0
3,860,157 ready_for_fw is high
3,860,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,213 UART: [idev] Erasing UDS.KEYID = 0
6,338,385 UART: [idev] Sha1 KeyId Algorithm
6,362,101 UART: [idev] --
6,366,419 UART: [ldev] ++
6,367,104 UART: [ldev] CDI.KEYID = 6
6,368,219 UART: [ldev] SUBJECT.KEYID = 5
6,369,285 UART: [ldev] AUTHORITY.KEYID = 7
6,370,409 UART: [ldev] FE.KEYID = 1
6,381,082 UART: [ldev] Erasing FE.KEYID = 1
8,858,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,230 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,096 UART: [ldev] --
10,647,257 UART: [fwproc] Wait for Commands...
10,649,401 UART: [fwproc] Recv command 0x46574c44
10,651,708 UART: [fwproc] Recv'd Img size: 118548 bytes
14,147,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,748 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,361 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,197 >>> mbox cmd response: success
14,912,606 UART: [afmc] ++
14,913,339 UART: [afmc] CDI.KEYID = 6
14,914,546 UART: [afmc] SUBJECT.KEYID = 7
14,915,991 UART: [afmc] AUTHORITY.KEYID = 5
17,420,328 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,597 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,574 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,157,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,817 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,752 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,616 UART: [afmc] --
19,214,814 UART: [cold-reset] --
19,220,091 UART: [state] Locking Datavault
19,226,441 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,604 UART: [state] Locking ICCM
19,231,228 UART: [exit] Launching FMC @ 0x40000130
19,239,915 UART:
19,240,154 UART: Running Caliptra FMC ...
19,241,265 UART:
19,241,425 UART: [state] CFI Enabled
19,249,545 UART: [fht] FMC Alias Private Key: 7
21,015,672 UART: [art] Extend RT PCRs Done
21,016,904 UART: [art] Lock RT PCRs Done
21,018,594 UART: [art] Populate DV Done
21,023,904 UART: [fht] FMC Alias Private Key: 7
21,025,504 UART: [art] Derive CDI
21,026,322 UART: [art] Store in slot 0x4
21,069,192 UART: [art] Derive Key Pair
21,070,204 UART: [art] Store priv key in slot 0x5
23,496,834 UART: [art] Derive Key Pair - Done
23,510,104 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,478 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,981 UART: [art] PUB.X = B176B7BB977C10593F601742071F736A0AF4D0EBA10BE3965E029FE25D79C531962F0868AC813C96C8FC574FB55481E4
25,225,189 UART: [art] PUB.Y = 803A33BD2172314196ECCD8F04AA270694C070C12CB91DB7EF97BFA19912BEDF70E96BAE1CC9BDA82887217662651E08
25,232,509 UART: [art] SIG.R = C6C9A26154B002BB1BCBAC0E9460DC5A89BC8067D5CF31A95F80ED998FDA0ACD00C5DAE6A4326AE653AA86C69A9FA070
25,239,882 UART: [art] SIG.S = D08BCB137BBB3F60491F7D539FDED5C654E5C3A74EB1FC4534350BB6EE1B3E15E0138BB2E82C605EC26C34D0E85ADA9D
26,218,974 UART: Caliptra RT
26,219,697 UART: [state] CFI Enabled
26,352,208 UART: [rt] RT listening for mailbox commands...
26,354,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,510,008 UART: [rt]cmd =0x41544d4e, len=14344
30,505,543 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
3,756,838 ready_for_fw is high
3,757,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,167 >>> mbox cmd response: success
19,293,512 UART:
19,293,900 UART: Running Caliptra FMC ...
19,295,099 UART:
19,295,274 UART: [state] CFI Enabled
19,303,361 UART: [fht] FMC Alias Private Key: 7
21,069,306 UART: [art] Extend RT PCRs Done
21,070,530 UART: [art] Lock RT PCRs Done
21,072,382 UART: [art] Populate DV Done
21,077,805 UART: [fht] FMC Alias Private Key: 7
21,079,411 UART: [art] Derive CDI
21,080,236 UART: [art] Store in slot 0x4
21,123,024 UART: [art] Derive Key Pair
21,124,071 UART: [art] Store priv key in slot 0x5
23,550,980 UART: [art] Derive Key Pair - Done
23,563,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,317 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,159 UART: [art] PUB.X = BA1B6DBE8925D9883B374BC3BCB6F0D7BC5EF6DD8D4472C3AD12F4372419D89DC4741E785B8F32EB3935890461407B98
25,279,104 UART: [art] PUB.Y = 02C7F3291F0D4C92559935953AFD05951537C77B40BA0CFBA911D1A85AB8F6748D577B68CAE350E2D5891DE72B4E093E
25,286,314 UART: [art] SIG.R = C15894C221543A45B384A4E4CC60EF39FC95929F261F3D37764BA6C58E288AE0CC2D99AD2A1F70315072589CFA77D3B5
25,293,745 UART: [art] SIG.S = AB87D638C79F2CA72B8DED1BE5BC950A5F1FEA1CC56FF6EC1CF29FC28601B940EEBB1E90F926EFBDCAF45F2AC92BF5DB
26,272,250 UART: Caliptra RT
26,272,971 UART: [state] CFI Enabled
26,406,469 UART: [rt] RT listening for mailbox commands...
26,408,807 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,564,120 UART: [rt]cmd =0x41544d4e, len=14344
30,560,368 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,099 UART: [kat] SHA2-256
882,030 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,145 UART: [kat] ++
886,297 UART: [kat] sha1
890,403 UART: [kat] SHA2-256
892,341 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,330 UART: [kat] HMAC-384Kdf
907,086 UART: [kat] LMS
1,475,282 UART: [kat] --
1,476,251 UART: [cold-reset] ++
1,476,759 UART: [fht] Storing FHT @ 0x50003400
1,479,552 UART: [idev] ++
1,479,720 UART: [idev] CDI.KEYID = 6
1,480,080 UART: [idev] SUBJECT.KEYID = 7
1,480,504 UART: [idev] UDS.KEYID = 0
1,480,849 ready_for_fw is high
1,480,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,504,882 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,496 UART: [idev] --
1,514,407 UART: [ldev] ++
1,514,575 UART: [ldev] CDI.KEYID = 6
1,514,938 UART: [ldev] SUBJECT.KEYID = 5
1,515,364 UART: [ldev] AUTHORITY.KEYID = 7
1,515,827 UART: [ldev] FE.KEYID = 1
1,521,119 UART: [ldev] Erasing FE.KEYID = 1
1,545,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,922 UART: [ldev] --
1,585,211 UART: [fwproc] Waiting for Commands...
1,586,030 UART: [fwproc] Received command 0x46574c44
1,586,821 UART: [fwproc] Received Image of size 118548 bytes
2,931,633 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,787 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,005 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,390 >>> mbox cmd response: success
3,131,450 UART: [afmc] ++
3,131,618 UART: [afmc] CDI.KEYID = 6
3,131,980 UART: [afmc] SUBJECT.KEYID = 7
3,132,405 UART: [afmc] AUTHORITY.KEYID = 5
3,167,456 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,256 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,036 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,628 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,311 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,305 UART: [afmc] --
3,211,285 UART: [cold-reset] --
3,212,215 UART: [state] Locking Datavault
3,213,306 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,910 UART: [state] Locking ICCM
3,214,584 UART: [exit] Launching FMC @ 0x40000130
3,219,914 UART:
3,219,930 UART: Running Caliptra FMC ...
3,220,338 UART:
3,220,392 UART: [state] CFI Enabled
3,230,852 UART: [fht] FMC Alias Private Key: 7
3,348,982 UART: [art] Extend RT PCRs Done
3,349,410 UART: [art] Lock RT PCRs Done
3,350,556 UART: [art] Populate DV Done
3,358,759 UART: [fht] FMC Alias Private Key: 7
3,359,759 UART: [art] Derive CDI
3,360,039 UART: [art] Store in slot 0x4
3,445,985 UART: [art] Derive Key Pair
3,446,345 UART: [art] Store priv key in slot 0x5
3,459,280 UART: [art] Derive Key Pair - Done
3,474,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,290 UART: [art] PUB.X = 9F5C1F238C1A1D7E3BFC5DD7149FCFDE2D6D0CFE821455D10CC35B8DF47765F191158A468ED1C003CDC9268F6CB995C7
3,497,069 UART: [art] PUB.Y = 9CBBE5A62740977DB23C521D65E8BF2F869D3868BBBF8E6ADBB1F951EBAF399FAED1774B9A0A8C9599F2FFB366F643AE
3,504,040 UART: [art] SIG.R = 2320400F07533A4AE650798626FBD856015FC3BBA355EA879AC6D3F911FCC4F635824307D5ADA4B37D1266C82186D65A
3,510,798 UART: [art] SIG.S = EAD7976418106CDB0BC60CC432787F3CF6E0CF33F05E853D0A2DDC9CE4E4FCBF19322CE6B3DFBD710DF58D9763DD14C1
3,534,184 UART: Caliptra RT
3,534,435 UART: [state] CFI Enabled
3,654,329 UART: [rt] RT listening for mailbox commands...
3,654,999 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,778,157 UART: [rt]cmd =0x41544d4e, len=14344
4,088,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,381 ready_for_fw is high
1,362,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,706 >>> mbox cmd response: success
3,042,883 UART:
3,042,899 UART: Running Caliptra FMC ...
3,043,307 UART:
3,043,361 UART: [state] CFI Enabled
3,053,675 UART: [fht] FMC Alias Private Key: 7
3,172,415 UART: [art] Extend RT PCRs Done
3,172,843 UART: [art] Lock RT PCRs Done
3,174,055 UART: [art] Populate DV Done
3,182,336 UART: [fht] FMC Alias Private Key: 7
3,183,316 UART: [art] Derive CDI
3,183,596 UART: [art] Store in slot 0x4
3,269,702 UART: [art] Derive Key Pair
3,270,062 UART: [art] Store priv key in slot 0x5
3,283,671 UART: [art] Derive Key Pair - Done
3,298,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,623 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,388 UART: [art] PUB.X = 4385A18E97C48CB4D28B3590FF9860B546B87201871793D331C18810C3F976C57D018CB5D6307A5C72F7B5C92561F842
3,321,142 UART: [art] PUB.Y = 450F8CCCCE528A6E1C6F4D88DD413A5B439D41A07F7903BD3E1CB9AAF657FFE9DD0807CA3D28A6D5B07F98B3C3721A6A
3,328,102 UART: [art] SIG.R = 615457AF602ABCFC2F40743C6841D645BB77AE5D081A9EC69935CF6B85DE087ED178F642981492733C379955260270E2
3,334,857 UART: [art] SIG.S = B51E4D437B3F8885A37A1ADFAEB9DA1A12FB7E326A68CB6591DB1C1AF9E537B8F91994B04D8A35A0D4987366F0A5DD96
3,358,675 UART: Caliptra RT
3,358,926 UART: [state] CFI Enabled
3,479,678 UART: [rt] RT listening for mailbox commands...
3,480,348 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,382 UART: [rt]cmd =0x41544d4e, len=14344
3,912,723 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,401 UART: [state] LifecycleState = Unprovisioned
86,056 UART: [state] DebugLocked = No
86,556 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,078 UART: [kat] SHA2-256
882,009 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,124 UART: [kat] ++
886,276 UART: [kat] sha1
890,552 UART: [kat] SHA2-256
892,490 UART: [kat] SHA2-384
895,363 UART: [kat] SHA2-512-ACC
897,264 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,823 UART: [kat] LMS
1,476,019 UART: [kat] --
1,476,768 UART: [cold-reset] ++
1,477,194 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 ready_for_fw is high
1,481,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,749 UART: [idev] Erasing UDS.KEYID = 0
1,505,445 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,873 UART: [idev] --
1,514,918 UART: [ldev] ++
1,515,086 UART: [ldev] CDI.KEYID = 6
1,515,449 UART: [ldev] SUBJECT.KEYID = 5
1,515,875 UART: [ldev] AUTHORITY.KEYID = 7
1,516,338 UART: [ldev] FE.KEYID = 1
1,521,572 UART: [ldev] Erasing FE.KEYID = 1
1,546,867 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,763 UART: [ldev] --
1,586,122 UART: [fwproc] Waiting for Commands...
1,586,813 UART: [fwproc] Received command 0x46574c44
1,587,604 UART: [fwproc] Received Image of size 118548 bytes
2,932,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,546 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,764 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,157 >>> mbox cmd response: success
3,133,333 UART: [afmc] ++
3,133,501 UART: [afmc] CDI.KEYID = 6
3,133,863 UART: [afmc] SUBJECT.KEYID = 7
3,134,288 UART: [afmc] AUTHORITY.KEYID = 5
3,169,721 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,063 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,552 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,435 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,118 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,882 UART: [afmc] --
3,212,808 UART: [cold-reset] --
3,213,880 UART: [state] Locking Datavault
3,214,849 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,453 UART: [state] Locking ICCM
3,215,945 UART: [exit] Launching FMC @ 0x40000130
3,221,275 UART:
3,221,291 UART: Running Caliptra FMC ...
3,221,699 UART:
3,221,842 UART: [state] CFI Enabled
3,232,350 UART: [fht] FMC Alias Private Key: 7
3,352,242 UART: [art] Extend RT PCRs Done
3,352,670 UART: [art] Lock RT PCRs Done
3,354,290 UART: [art] Populate DV Done
3,362,489 UART: [fht] FMC Alias Private Key: 7
3,363,469 UART: [art] Derive CDI
3,363,749 UART: [art] Store in slot 0x4
3,449,591 UART: [art] Derive Key Pair
3,449,951 UART: [art] Store priv key in slot 0x5
3,463,064 UART: [art] Derive Key Pair - Done
3,477,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,080 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,845 UART: [art] PUB.X = AF8A2BA3634151128D4D9AC369B8ED6C7C444B836FEE52C31136119C08C9E140C57155F855F4C40999DF9D86291A2F3D
3,500,611 UART: [art] PUB.Y = 65D16FFA4EE4ADADC38CB3185C5D64E675202844E1448305FF5A547A5B11344E62B56AEE1571DAA3539D4D56D2CFDBD4
3,507,572 UART: [art] SIG.R = 6420B80463B26B8D10216F6368A102E1B0C04D97F179D41CC7413DBA5F2F45CBE7DF9D0CC9E190135E590F4C144BF9BA
3,514,338 UART: [art] SIG.S = 2DA24E5155BC0DFF481034008B75A996B05F728696F88C5995BFE8561E34117084A55EC2C339FD5416E68D2E1F9FDF82
3,538,543 UART: Caliptra RT
3,538,886 UART: [state] CFI Enabled
3,658,695 UART: [rt] RT listening for mailbox commands...
3,659,365 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,343 UART: [rt]cmd =0x41544d4e, len=14344
4,092,064 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,230 ready_for_fw is high
1,363,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,043 >>> mbox cmd response: success
3,043,970 UART:
3,043,986 UART: Running Caliptra FMC ...
3,044,394 UART:
3,044,537 UART: [state] CFI Enabled
3,055,139 UART: [fht] FMC Alias Private Key: 7
3,173,959 UART: [art] Extend RT PCRs Done
3,174,387 UART: [art] Lock RT PCRs Done
3,175,821 UART: [art] Populate DV Done
3,184,024 UART: [fht] FMC Alias Private Key: 7
3,185,086 UART: [art] Derive CDI
3,185,366 UART: [art] Store in slot 0x4
3,270,820 UART: [art] Derive Key Pair
3,271,180 UART: [art] Store priv key in slot 0x5
3,284,771 UART: [art] Derive Key Pair - Done
3,299,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,401 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,166 UART: [art] PUB.X = 55C762F9D4C64914961D4C2E682069E18EFAC5F04D23269A4D4C4FA243428A76C661CAD336B14F5252C0787DC6A4353B
3,321,936 UART: [art] PUB.Y = 4C7A08CEFA113E427AFAF0964AC1A88132DAC2AC115D164063C7C2662046870B55F00A0BBBE7AB4EFD271804B4ADEC75
3,328,887 UART: [art] SIG.R = 86A3D296E3727D74E47ADEF6F523EA57D7FC62724E3F6308ED7562A0C994795566AFAF6C89C4B6FC23CAD793142E5C7A
3,335,664 UART: [art] SIG.S = EBA32933D4E239FADF64249333CEE619E061F93E7434E118FD4E36474D53CC64E8CE1ED1B2A8CE5BCC83EFFB354BAB8E
3,360,174 UART: Caliptra RT
3,360,517 UART: [state] CFI Enabled
3,480,864 UART: [rt] RT listening for mailbox commands...
3,481,534 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,254 UART: [rt]cmd =0x41544d4e, len=14344
3,914,381 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,254 UART: [kat] SHA2-256
890,804 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,908 UART: [kat] ++
895,060 UART: [kat] sha1
899,336 UART: [kat] SHA2-256
901,276 UART: [kat] SHA2-384
904,229 UART: [kat] SHA2-512-ACC
906,130 UART: [kat] ECC-384
915,939 UART: [kat] HMAC-384Kdf
920,499 UART: [kat] LMS
1,168,811 UART: [kat] --
1,169,568 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,476 UART: [idev] ++
1,172,644 UART: [idev] CDI.KEYID = 6
1,173,005 UART: [idev] SUBJECT.KEYID = 7
1,173,430 UART: [idev] UDS.KEYID = 0
1,173,776 ready_for_fw is high
1,173,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,543 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,338 UART: [ldev] ++
1,208,506 UART: [ldev] CDI.KEYID = 6
1,208,870 UART: [ldev] SUBJECT.KEYID = 5
1,209,297 UART: [ldev] AUTHORITY.KEYID = 7
1,209,760 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,567 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,456 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,090 UART: [ldev] --
1,280,527 UART: [fwproc] Wait for Commands...
1,281,266 UART: [fwproc] Recv command 0x46574c44
1,281,999 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,300 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,601 >>> mbox cmd response: success
2,825,647 UART: [afmc] ++
2,825,815 UART: [afmc] CDI.KEYID = 6
2,826,178 UART: [afmc] SUBJECT.KEYID = 7
2,826,604 UART: [afmc] AUTHORITY.KEYID = 5
2,862,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,780 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,529 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,239 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,120 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,821 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,546 UART: [afmc] --
2,905,455 UART: [cold-reset] --
2,906,447 UART: [state] Locking Datavault
2,907,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,282 UART: [state] Locking ICCM
2,908,934 UART: [exit] Launching FMC @ 0x40000130
2,914,264 UART:
2,914,280 UART: Running Caliptra FMC ...
2,914,688 UART:
2,914,742 UART: [state] CFI Enabled
2,925,480 UART: [fht] FMC Alias Private Key: 7
3,043,820 UART: [art] Extend RT PCRs Done
3,044,248 UART: [art] Lock RT PCRs Done
3,045,816 UART: [art] Populate DV Done
3,053,979 UART: [fht] FMC Alias Private Key: 7
3,055,093 UART: [art] Derive CDI
3,055,373 UART: [art] Store in slot 0x4
3,141,466 UART: [art] Derive Key Pair
3,141,826 UART: [art] Store priv key in slot 0x5
3,154,774 UART: [art] Derive Key Pair - Done
3,169,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,647 UART: [art] PUB.X = EE2EFB816EA3387997A79D3BE603F710CAB7899EC6E5ED0174492D80C801F40AD7CD71050923E2C1EAD152C1E9B678E1
3,192,409 UART: [art] PUB.Y = DB170F3CA46BA84BCD71A6B05CE6F607D2A45786E31647ACCAB549818FAFACF7640ECFDEDFCA6C09BB87FAA727AE8E9D
3,199,381 UART: [art] SIG.R = 2CDE34D3CC39F5CFEA742F0BB28A862F95AF1595DBF3C78B8A6C61A315709DA3A5A4D6F2A8EF1645D77FDC0BC79DA5E7
3,206,171 UART: [art] SIG.S = 154CF55899C3CFF6E88F41C6F259CB50D94CF86DA6F7C1C703B6C73D60CD2645A280A8E56EA83E28FD5B51B6C22A665B
3,229,720 UART: Caliptra RT
3,229,971 UART: [state] CFI Enabled
3,349,283 UART: [rt] RT listening for mailbox commands...
3,349,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,161 UART: [rt]cmd =0x41544d4e, len=14344
3,783,406 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,188 ready_for_fw is high
1,059,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,870 >>> mbox cmd response: success
2,740,229 UART:
2,740,245 UART: Running Caliptra FMC ...
2,740,653 UART:
2,740,707 UART: [state] CFI Enabled
2,751,425 UART: [fht] FMC Alias Private Key: 7
2,870,639 UART: [art] Extend RT PCRs Done
2,871,067 UART: [art] Lock RT PCRs Done
2,872,597 UART: [art] Populate DV Done
2,880,770 UART: [fht] FMC Alias Private Key: 7
2,881,752 UART: [art] Derive CDI
2,882,032 UART: [art] Store in slot 0x4
2,967,735 UART: [art] Derive Key Pair
2,968,095 UART: [art] Store priv key in slot 0x5
2,981,873 UART: [art] Derive Key Pair - Done
2,996,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,027 UART: [art] PUB.X = A44DB08C921782E519CF9501D91A820F8BFF1ABDEDE0411C41C76C95D165605B247452087B19289164C972A11FE4C771
3,019,786 UART: [art] PUB.Y = 3F4011CC300CA5966FDC64422F826085B35C4C152992AF388B82ABC908D04EB2BE606065CE304B17D1D8A3549F322CA5
3,026,732 UART: [art] SIG.R = 9849247006DED0A1ECC47F6E4FDEBCC72CD9AA7FD31D6A99613073B0FEC3868CD04B45C8EB614375D3C90717496AB55C
3,033,510 UART: [art] SIG.S = AB6DE2E165B0E7D3E17DCF0505F2A39311440675C9EF05EFED0DF3E54447B638AD89F2B8214E50EEFF5C500753BE0500
3,056,865 UART: Caliptra RT
3,057,116 UART: [state] CFI Enabled
3,177,430 UART: [rt] RT listening for mailbox commands...
3,178,100 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,242 UART: [rt]cmd =0x41544d4e, len=14344
3,610,721 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,778 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
891,645 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,749 UART: [kat] ++
895,901 UART: [kat] sha1
900,225 UART: [kat] SHA2-256
902,165 UART: [kat] SHA2-384
904,912 UART: [kat] SHA2-512-ACC
906,813 UART: [kat] ECC-384
916,686 UART: [kat] HMAC-384Kdf
921,228 UART: [kat] LMS
1,169,540 UART: [kat] --
1,170,585 UART: [cold-reset] ++
1,171,055 UART: [fht] FHT @ 0x50003400
1,173,813 UART: [idev] ++
1,173,981 UART: [idev] CDI.KEYID = 6
1,174,342 UART: [idev] SUBJECT.KEYID = 7
1,174,767 UART: [idev] UDS.KEYID = 0
1,175,113 ready_for_fw is high
1,175,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,898 UART: [idev] Erasing UDS.KEYID = 0
1,199,794 UART: [idev] Sha1 KeyId Algorithm
1,208,696 UART: [idev] --
1,209,649 UART: [ldev] ++
1,209,817 UART: [ldev] CDI.KEYID = 6
1,210,181 UART: [ldev] SUBJECT.KEYID = 5
1,210,608 UART: [ldev] AUTHORITY.KEYID = 7
1,211,071 UART: [ldev] FE.KEYID = 1
1,216,457 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,962 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,678 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,279 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,389 UART: [ldev] --
1,282,788 UART: [fwproc] Wait for Commands...
1,283,465 UART: [fwproc] Recv command 0x46574c44
1,284,198 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,832 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,007 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,274 >>> mbox cmd response: success
2,827,316 UART: [afmc] ++
2,827,484 UART: [afmc] CDI.KEYID = 6
2,827,847 UART: [afmc] SUBJECT.KEYID = 7
2,828,273 UART: [afmc] AUTHORITY.KEYID = 5
2,863,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,089 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,838 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,429 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,889 UART: [afmc] --
2,906,766 UART: [cold-reset] --
2,907,410 UART: [state] Locking Datavault
2,908,463 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,067 UART: [state] Locking ICCM
2,909,673 UART: [exit] Launching FMC @ 0x40000130
2,915,003 UART:
2,915,019 UART: Running Caliptra FMC ...
2,915,427 UART:
2,915,570 UART: [state] CFI Enabled
2,925,758 UART: [fht] FMC Alias Private Key: 7
3,044,468 UART: [art] Extend RT PCRs Done
3,044,896 UART: [art] Lock RT PCRs Done
3,046,706 UART: [art] Populate DV Done
3,054,711 UART: [fht] FMC Alias Private Key: 7
3,055,685 UART: [art] Derive CDI
3,055,965 UART: [art] Store in slot 0x4
3,141,890 UART: [art] Derive Key Pair
3,142,250 UART: [art] Store priv key in slot 0x5
3,156,630 UART: [art] Derive Key Pair - Done
3,171,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,059 UART: [art] PUB.X = B52EB05D2298C308FAD4AA8A5FA438EF6CBE584E1CD8207BB6D9205B3AF548B4C79F9E0740C4928C751CB9C9C6B77D7B
3,194,841 UART: [art] PUB.Y = 645BA45C8ABE97A804F18E7F78C1DE5FE80706B6FD6E6C179E17A34E6FD2C8051544590481A12773DD62E4D253C510D6
3,201,780 UART: [art] SIG.R = ADBF5398F2F9B461BA0B1A4AF466C98D267CB22B9A21A422DB5D84A1648BFC8263F6C51EB8718B86B97422900B5ECAD7
3,208,558 UART: [art] SIG.S = 2038A3CD72A89187C950C2487A4D1175AACB2960BE39304CC0526F7A2FB1C9E0587D2E9AAEE9F1EB90EE058554851CA9
3,233,311 UART: Caliptra RT
3,233,654 UART: [state] CFI Enabled
3,353,189 UART: [rt] RT listening for mailbox commands...
3,353,859 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,875 UART: [rt]cmd =0x41544d4e, len=14344
3,786,184 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 ready_for_fw is high
1,059,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,547 >>> mbox cmd response: success
2,740,360 UART:
2,740,376 UART: Running Caliptra FMC ...
2,740,784 UART:
2,740,927 UART: [state] CFI Enabled
2,751,611 UART: [fht] FMC Alias Private Key: 7
2,870,583 UART: [art] Extend RT PCRs Done
2,871,011 UART: [art] Lock RT PCRs Done
2,872,897 UART: [art] Populate DV Done
2,881,356 UART: [fht] FMC Alias Private Key: 7
2,882,436 UART: [art] Derive CDI
2,882,716 UART: [art] Store in slot 0x4
2,968,663 UART: [art] Derive Key Pair
2,969,023 UART: [art] Store priv key in slot 0x5
2,982,981 UART: [art] Derive Key Pair - Done
2,997,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,667 UART: [art] PUB.X = 1CCC366F5FDCEF68648B1B5EFAACCF12D816BA8C21CD0B7B5C8A5978C4AB0346764E3FB7FCD9E572CAAE04BF06DA277E
3,020,457 UART: [art] PUB.Y = 6FF7EEE884F06B43FFC680C15F9BBA6A99D80CCB0A87314970238FB3C48183A860E782D31BE38D608C682BBA58A232D1
3,027,411 UART: [art] SIG.R = 7FE3BFE543E6604E040F09BDC19CC43CB070DE6238F5F72F2F4B29A29B443F32BE4671240FCC20C3A7942326E58B5C89
3,034,177 UART: [art] SIG.S = 63B38B75A88CE210E85C0A859A6C21892DBA3819BF82864DC93C2155F5ADF5A7DD6253B4DE86B0F5F34825631C1EFCF0
3,057,744 UART: Caliptra RT
3,058,087 UART: [state] CFI Enabled
3,177,759 UART: [rt] RT listening for mailbox commands...
3,178,429 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,567 UART: [rt]cmd =0x41544d4e, len=14344
3,611,546 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,652 UART: [kat] SHA2-256
893,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,427 UART: [kat] ++
897,579 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,818 UART: [kat] HMAC-384Kdf
922,400 UART: [kat] LMS
1,170,728 UART: [kat] --
1,171,673 UART: [cold-reset] ++
1,172,059 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 ready_for_fw is high
1,176,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,386 UART: [idev] Erasing UDS.KEYID = 0
1,200,147 UART: [idev] Sha1 KeyId Algorithm
1,208,685 UART: [idev] --
1,209,555 UART: [ldev] ++
1,209,723 UART: [ldev] CDI.KEYID = 6
1,210,086 UART: [ldev] SUBJECT.KEYID = 5
1,210,512 UART: [ldev] AUTHORITY.KEYID = 7
1,210,975 UART: [ldev] FE.KEYID = 1
1,215,987 UART: [ldev] Erasing FE.KEYID = 1
1,241,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,657 UART: [ldev] --
1,281,170 UART: [fwproc] Wait for Commands...
1,281,784 UART: [fwproc] Recv command 0x46574c44
1,282,512 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,863 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,294 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,464 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,819 >>> mbox cmd response: success
2,827,913 UART: [afmc] ++
2,828,081 UART: [afmc] CDI.KEYID = 6
2,828,443 UART: [afmc] SUBJECT.KEYID = 7
2,828,868 UART: [afmc] AUTHORITY.KEYID = 5
2,863,877 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,571 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,299 UART: [afmc] --
2,907,335 UART: [cold-reset] --
2,908,189 UART: [state] Locking Datavault
2,909,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,884 UART: [state] Locking ICCM
2,910,378 UART: [exit] Launching FMC @ 0x40000130
2,915,708 UART:
2,915,724 UART: Running Caliptra FMC ...
2,916,132 UART:
2,916,186 UART: [state] CFI Enabled
2,926,910 UART: [fht] FMC Alias Private Key: 7
3,046,030 UART: [art] Extend RT PCRs Done
3,046,458 UART: [art] Lock RT PCRs Done
3,048,310 UART: [art] Populate DV Done
3,056,533 UART: [fht] FMC Alias Private Key: 7
3,057,489 UART: [art] Derive CDI
3,057,769 UART: [art] Store in slot 0x4
3,143,560 UART: [art] Derive Key Pair
3,143,920 UART: [art] Store priv key in slot 0x5
3,157,418 UART: [art] Derive Key Pair - Done
3,171,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,761 UART: [art] PUB.X = C15AD9941D7EEE95C45B91B9864931827D214E7704CB955B12C695E95FE0C4904EF901C6CE5EA364E6BD73FF8CCE8D08
3,194,532 UART: [art] PUB.Y = AC3AF916CF8A310872FD12FCD2A25426F185591E8429620077078AA6931F8E854F0C5C861C45BF272C14864588F40A03
3,201,439 UART: [art] SIG.R = A758040AFFDB06886010B09CB951DA2A250CB70ABB8690053DCA52B832AB90D1DFC8A42CAD43BFA6A0ECB6021E798819
3,208,204 UART: [art] SIG.S = 219D1E637ABE68D798777C7F51FB5A96ABDC84540FCC90BC6C8CBCC0AE9B9B3F0CE431AFC7F2D1FEF8B78CB70A488F24
3,231,935 UART: Caliptra RT
3,232,186 UART: [state] CFI Enabled
3,351,509 UART: [rt] RT listening for mailbox commands...
3,352,179 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,279 UART: [rt]cmd =0x41544d4e, len=14344
3,785,150 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,257 ready_for_fw is high
1,060,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,586 >>> mbox cmd response: success
2,739,221 UART:
2,739,237 UART: Running Caliptra FMC ...
2,739,645 UART:
2,739,699 UART: [state] CFI Enabled
2,750,205 UART: [fht] FMC Alias Private Key: 7
2,869,049 UART: [art] Extend RT PCRs Done
2,869,477 UART: [art] Lock RT PCRs Done
2,870,967 UART: [art] Populate DV Done
2,879,232 UART: [fht] FMC Alias Private Key: 7
2,880,166 UART: [art] Derive CDI
2,880,446 UART: [art] Store in slot 0x4
2,966,427 UART: [art] Derive Key Pair
2,966,787 UART: [art] Store priv key in slot 0x5
2,979,785 UART: [art] Derive Key Pair - Done
2,994,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,218 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,983 UART: [art] PUB.X = 90160FEBBCB04D152130B0C988C5F4C3374F6FCED684F35C44750333A6C3B4ED2EFC25DDCA3E9A6A2016789133706D05
3,017,752 UART: [art] PUB.Y = 6F8D8F76DFA7136B5DE44CC614B6756637BA4EF6EC8480EDC61667ECA17BDCDC04CFC004B615EC2B9370248D085EAA13
3,024,711 UART: [art] SIG.R = FE773B2A5CC76F771DEE68B134C2872E2D2701C9119A77D779F1ECEC6974BF2691A7014BB6D3BA870D131340B1D7A1C3
3,031,480 UART: [art] SIG.S = CBB83C63BCE12116884005800AB7744C194CB6A0DC91E2BC6B8893CCDC23269EE1A34549CB3D079BFD29D36900EC7D3D
3,054,795 UART: Caliptra RT
3,055,046 UART: [state] CFI Enabled
3,174,928 UART: [rt] RT listening for mailbox commands...
3,175,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,778 UART: [rt]cmd =0x41544d4e, len=14344
3,609,231 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,834 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,458 UART: [kat] SHA2-256
904,398 UART: [kat] SHA2-384
907,287 UART: [kat] SHA2-512-ACC
909,188 UART: [kat] ECC-384
919,243 UART: [kat] HMAC-384Kdf
923,935 UART: [kat] LMS
1,172,263 UART: [kat] --
1,173,214 UART: [cold-reset] ++
1,173,730 UART: [fht] FHT @ 0x50003400
1,176,341 UART: [idev] ++
1,176,509 UART: [idev] CDI.KEYID = 6
1,176,869 UART: [idev] SUBJECT.KEYID = 7
1,177,293 UART: [idev] UDS.KEYID = 0
1,177,638 ready_for_fw is high
1,177,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,209 UART: [idev] Erasing UDS.KEYID = 0
1,202,748 UART: [idev] Sha1 KeyId Algorithm
1,211,380 UART: [idev] --
1,212,554 UART: [ldev] ++
1,212,722 UART: [ldev] CDI.KEYID = 6
1,213,085 UART: [ldev] SUBJECT.KEYID = 5
1,213,511 UART: [ldev] AUTHORITY.KEYID = 7
1,213,974 UART: [ldev] FE.KEYID = 1
1,218,968 UART: [ldev] Erasing FE.KEYID = 1
1,245,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,592 UART: [ldev] --
1,285,085 UART: [fwproc] Wait for Commands...
1,285,869 UART: [fwproc] Recv command 0x46574c44
1,286,597 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,550 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,600 >>> mbox cmd response: success
2,830,730 UART: [afmc] ++
2,830,898 UART: [afmc] CDI.KEYID = 6
2,831,260 UART: [afmc] SUBJECT.KEYID = 7
2,831,685 UART: [afmc] AUTHORITY.KEYID = 5
2,867,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,241 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,989 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,698 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,581 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,282 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,142 UART: [afmc] --
2,911,074 UART: [cold-reset] --
2,911,876 UART: [state] Locking Datavault
2,913,061 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,665 UART: [state] Locking ICCM
2,914,135 UART: [exit] Launching FMC @ 0x40000130
2,919,465 UART:
2,919,481 UART: Running Caliptra FMC ...
2,919,889 UART:
2,920,032 UART: [state] CFI Enabled
2,930,616 UART: [fht] FMC Alias Private Key: 7
3,049,682 UART: [art] Extend RT PCRs Done
3,050,110 UART: [art] Lock RT PCRs Done
3,051,498 UART: [art] Populate DV Done
3,059,543 UART: [fht] FMC Alias Private Key: 7
3,060,535 UART: [art] Derive CDI
3,060,815 UART: [art] Store in slot 0x4
3,146,600 UART: [art] Derive Key Pair
3,146,960 UART: [art] Store priv key in slot 0x5
3,160,664 UART: [art] Derive Key Pair - Done
3,175,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,973 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,738 UART: [art] PUB.X = ECBF169A686211FA74795B962C946F4AD136A3215C4C0AF7D7E9602157CA887438C12AD8BC65A333C4556E5E97244A5C
3,198,507 UART: [art] PUB.Y = BC85AC605A431B71735BCB035DD3F5E4859AE756625D3EDE8928C1A9854400EFDF9C7D4EA022D2E240FED4DC8D06D40B
3,205,442 UART: [art] SIG.R = DF650C7DABF34EE049C19A62104AF3EEF5CBA63386A995E1F85E1E3B5C66E99ADA65CB9A1D6CAEECB5EE71F1AF660447
3,212,234 UART: [art] SIG.S = C957DA8677383F17563A17D1D5BC3461C93FF292604BC77EF87B9DE2C32323145A9DA32904F42D1ABFA952BC0A10DD42
3,235,912 UART: Caliptra RT
3,236,255 UART: [state] CFI Enabled
3,356,213 UART: [rt] RT listening for mailbox commands...
3,356,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,189 UART: [rt]cmd =0x41544d4e, len=14344
3,790,012 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,190 ready_for_fw is high
1,060,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,473 >>> mbox cmd response: success
2,741,446 UART:
2,741,462 UART: Running Caliptra FMC ...
2,741,870 UART:
2,742,013 UART: [state] CFI Enabled
2,752,683 UART: [fht] FMC Alias Private Key: 7
2,871,723 UART: [art] Extend RT PCRs Done
2,872,151 UART: [art] Lock RT PCRs Done
2,873,807 UART: [art] Populate DV Done
2,882,122 UART: [fht] FMC Alias Private Key: 7
2,883,082 UART: [art] Derive CDI
2,883,362 UART: [art] Store in slot 0x4
2,968,991 UART: [art] Derive Key Pair
2,969,351 UART: [art] Store priv key in slot 0x5
2,982,337 UART: [art] Derive Key Pair - Done
2,996,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,471 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,236 UART: [art] PUB.X = 03C7DE052E16BB3E1D33DBA72DFB2B99F7AC6CF53254B428F9905B1F6A48E72F6275B3C085076386B3F662DA9754A580
3,020,003 UART: [art] PUB.Y = B6034D708B92005151283D5969B0038F30972A1324FE0620BC4A2681005F9361126BDCBCD4348E180725E84EBD6A5B5E
3,026,889 UART: [art] SIG.R = 61D59FEA3863B8C2B01776CAEEE365EE1FFFF5C939C78F42085826833244DB2F2B5BB0072E98BDA84BD67593A3175829
3,033,659 UART: [art] SIG.S = AF348118E3A326AE77F82AB6108A5D41C02AA70158ADB5B1F472ED3A5CA6D01EC21F83552FDF5707F6F16084E5C50266
3,058,220 UART: Caliptra RT
3,058,563 UART: [state] CFI Enabled
3,177,832 UART: [rt] RT listening for mailbox commands...
3,178,502 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,308 UART: [rt]cmd =0x41544d4e, len=14344
3,611,089 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,052 UART:
192,437 UART: Running Caliptra ROM ...
193,552 UART:
193,698 UART: [state] CFI Enabled
267,672 UART: [state] LifecycleState = Unprovisioned
269,667 UART: [state] DebugLocked = No
271,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,501 UART: [kat] SHA2-256
446,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,699 UART: [kat] ++
457,193 UART: [kat] sha1
467,859 UART: [kat] SHA2-256
470,518 UART: [kat] SHA2-384
477,009 UART: [kat] SHA2-512-ACC
479,398 UART: [kat] ECC-384
2,768,519 UART: [kat] HMAC-384Kdf
2,800,847 UART: [kat] LMS
3,991,098 UART: [kat] --
3,995,470 UART: [cold-reset] ++
3,997,335 UART: [fht] Storing FHT @ 0x50003400
4,007,319 UART: [idev] ++
4,007,896 UART: [idev] CDI.KEYID = 6
4,008,825 UART: [idev] SUBJECT.KEYID = 7
4,010,081 UART: [idev] UDS.KEYID = 0
4,011,180 ready_for_fw is high
4,011,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,539 UART: [idev] Erasing UDS.KEYID = 0
7,346,776 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,509 UART: [idev] --
7,372,156 UART: [ldev] ++
7,372,802 UART: [ldev] CDI.KEYID = 6
7,373,899 UART: [ldev] SUBJECT.KEYID = 5
7,375,028 UART: [ldev] AUTHORITY.KEYID = 7
7,376,133 UART: [ldev] FE.KEYID = 1
7,422,825 UART: [ldev] Erasing FE.KEYID = 1
10,752,926 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,712 UART: [ldev] --
13,114,792 UART: [fwproc] Waiting for Commands...
13,117,967 UART: [fwproc] Received command 0x46574c44
13,120,145 UART: [fwproc] Received Image of size 118548 bytes
21,578,627 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,656,633 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,729,779 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,059,185 >>> mbox cmd response: success
22,062,891 UART: [afmc] ++
22,063,512 UART: [afmc] CDI.KEYID = 6
22,064,411 UART: [afmc] SUBJECT.KEYID = 7
22,065,636 UART: [afmc] AUTHORITY.KEYID = 5
25,437,817 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,739,370 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,741,675 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,756,150 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,770,930 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,785,372 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,805,600 UART: [afmc] --
27,808,929 UART: [cold-reset] --
27,813,276 UART: [state] Locking Datavault
27,818,842 UART: [state] Locking PCR0, PCR1 and PCR31
27,820,611 UART: [state] Locking ICCM
27,821,931 UART: [exit] Launching FMC @ 0x40000130
27,830,338 UART:
27,830,571 UART: Running Caliptra FMC ...
27,831,598 UART:
27,831,746 UART: [state] CFI Enabled
27,898,324 UART: [fht] FMC Alias Private Key: 7
30,238,587 UART: [art] Extend RT PCRs Done
30,239,816 UART: [art] Lock RT PCRs Done
30,241,199 UART: [art] Populate DV Done
30,246,937 UART: [fht] FMC Alias Private Key: 7
30,248,473 UART: [art] Derive CDI
30,249,241 UART: [art] Store in slot 0x4
30,307,038 UART: [art] Derive Key Pair
30,308,086 UART: [art] Store priv key in slot 0x5
33,600,983 UART: [art] Derive Key Pair - Done
33,614,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,902,915 UART: [art] Erasing AUTHORITY.KEYID = 7
35,904,426 UART: [art] PUB.X = 36E382C770F4939E480EFF1F820CC78DEA3D82AB70CC8ACFA0A0B4549BB0D0B3ABC34C0BE683FCB6893999989A535AF0
35,911,729 UART: [art] PUB.Y = D7DA434A2DAEB38A5F5A4D84685103536129D439DD38A933C94B2D7F418F099465B92E773025F45FCD84F4609FFA2810
35,918,953 UART: [art] SIG.R = 569EB3205CAF16755C9AEA4058D5B6EC08E1E8D6683305EE90DD00EB861946AB4DA1BD975553B8244366E52A06BF601E
35,926,346 UART: [art] SIG.S = 0D889F885721B474D7108B533E3E7346DD92C2B84C0DDB7AFCD40DD4C827AE33ABEA1209F52F99B6031CBB0C96268389
37,231,490 UART: Caliptra RT
37,232,187 UART: [state] CFI Enabled
37,407,348 UART: [rt] RT listening for mailbox commands...
37,409,692 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,565,056 UART: [rt]cmd =0x41544d4e, len=14344
43,926,675 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
3,784,787 ready_for_fw is high
3,785,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,275,035 >>> mbox cmd response: success
27,958,901 UART:
27,959,294 UART: Running Caliptra FMC ...
27,960,431 UART:
27,960,591 UART: [state] CFI Enabled
28,030,544 UART: [fht] FMC Alias Private Key: 7
30,370,660 UART: [art] Extend RT PCRs Done
30,371,876 UART: [art] Lock RT PCRs Done
30,373,552 UART: [art] Populate DV Done
30,379,011 UART: [fht] FMC Alias Private Key: 7
30,380,718 UART: [art] Derive CDI
30,381,531 UART: [art] Store in slot 0x4
30,438,359 UART: [art] Derive Key Pair
30,439,397 UART: [art] Store priv key in slot 0x5
33,732,634 UART: [art] Derive Key Pair - Done
33,745,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,033,720 UART: [art] Erasing AUTHORITY.KEYID = 7
36,035,234 UART: [art] PUB.X = C6A3832A848A9D230BEAF51F19E4C2239C760FFC9D68EB58CA485A00318F3BDFDDC890100011D45E480BCACB37E5B6D2
36,042,488 UART: [art] PUB.Y = 7223438E816FB5F102F165AD9C503269387AA18C150946D7C477A0510546498F553BA75865B4EB7700351A8900D1C64D
36,049,647 UART: [art] SIG.R = 0DEAF7E4CBF7090D718626384B4FAA305C3FACEBE64BC6E0C365638AAC376BC793C59045B88114AE1A64FDA9998C7B85
36,057,042 UART: [art] SIG.S = 85A9BD5CE1817F6E98DF6E8CAE668C7E7B09A42CD9843899E40C92AB369939FA4AD686A1D18291D0D178DEEB597608C2
37,362,396 UART: Caliptra RT
37,363,104 UART: [state] CFI Enabled
37,540,598 UART: [rt] RT listening for mailbox commands...
37,542,891 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,698,151 UART: [rt]cmd =0x41544d4e, len=14344
43,878,509 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
192,596 UART:
192,944 UART: Running Caliptra ROM ...
194,061 UART:
603,703 UART: [state] CFI Enabled
615,406 UART: [state] LifecycleState = Unprovisioned
617,351 UART: [state] DebugLocked = No
619,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,857 UART: [kat] SHA2-256
794,609 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,136 UART: [kat] ++
805,612 UART: [kat] sha1
817,122 UART: [kat] SHA2-256
819,846 UART: [kat] SHA2-384
825,856 UART: [kat] SHA2-512-ACC
828,260 UART: [kat] ECC-384
3,112,598 UART: [kat] HMAC-384Kdf
3,123,366 UART: [kat] LMS
4,313,518 UART: [kat] --
4,317,770 UART: [cold-reset] ++
4,319,915 UART: [fht] Storing FHT @ 0x50003400
4,331,671 UART: [idev] ++
4,332,241 UART: [idev] CDI.KEYID = 6
4,333,124 UART: [idev] SUBJECT.KEYID = 7
4,334,434 UART: [idev] UDS.KEYID = 0
4,335,501 ready_for_fw is high
4,335,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,599 UART: [idev] Erasing UDS.KEYID = 0
7,622,961 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,696 UART: [idev] --
7,648,445 UART: [ldev] ++
7,649,016 UART: [ldev] CDI.KEYID = 6
7,649,981 UART: [ldev] SUBJECT.KEYID = 5
7,651,187 UART: [ldev] AUTHORITY.KEYID = 7
7,652,466 UART: [ldev] FE.KEYID = 1
7,664,202 UART: [ldev] Erasing FE.KEYID = 1
10,949,142 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,303 UART: [ldev] --
13,311,669 UART: [fwproc] Waiting for Commands...
13,314,904 UART: [fwproc] Received command 0x46574c44
13,317,133 UART: [fwproc] Received Image of size 118548 bytes
22,164,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,242,297 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,315,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,643,712 >>> mbox cmd response: success
22,648,744 UART: [afmc] ++
22,649,355 UART: [afmc] CDI.KEYID = 6
22,650,341 UART: [afmc] SUBJECT.KEYID = 7
22,651,553 UART: [afmc] AUTHORITY.KEYID = 5
25,964,724 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,259,086 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,261,366 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,275,879 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,290,680 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,305,072 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,326,002 UART: [afmc] --
28,329,873 UART: [cold-reset] --
28,334,432 UART: [state] Locking Datavault
28,339,030 UART: [state] Locking PCR0, PCR1 and PCR31
28,340,777 UART: [state] Locking ICCM
28,342,736 UART: [exit] Launching FMC @ 0x40000130
28,351,134 UART:
28,351,407 UART: Running Caliptra FMC ...
28,352,534 UART:
28,352,695 UART: [state] CFI Enabled
28,360,686 UART: [fht] FMC Alias Private Key: 7
30,701,006 UART: [art] Extend RT PCRs Done
30,702,232 UART: [art] Lock RT PCRs Done
30,703,540 UART: [art] Populate DV Done
30,708,950 UART: [fht] FMC Alias Private Key: 7
30,710,479 UART: [art] Derive CDI
30,711,239 UART: [art] Store in slot 0x4
30,754,157 UART: [art] Derive Key Pair
30,755,192 UART: [art] Store priv key in slot 0x5
33,997,567 UART: [art] Derive Key Pair - Done
34,010,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,290,605 UART: [art] Erasing AUTHORITY.KEYID = 7
36,292,103 UART: [art] PUB.X = 16E0EFC66CB2DAC1F2A0652C1DAFD04C4BFB178733E5071568D9594BEBB96738040F01CB5C967B10D5E76C125C516E1D
36,299,389 UART: [art] PUB.Y = EC78FF0327AD97FAFE84A00FB0C39C7BB0C727293A5FFB95631CCC27F75A3BE2013AED1F1CC560C9696E2832B6FDEFF9
36,306,681 UART: [art] SIG.R = 64D98E8CA9A0C28658573415549C65B6A90F644B1AA6AD72C09AEEC92A6DF3CEBB0553A2C4FF400B5E34B9196E4891CB
36,314,075 UART: [art] SIG.S = 3FC2B895838F07F4FB5E121970E8C3B78E5F2E5032070747CBE77AFF74C971C0FD9381A7ACC37B89B645C3FEE1964644
37,618,943 UART: Caliptra RT
37,619,649 UART: [state] CFI Enabled
37,753,418 UART: [rt] RT listening for mailbox commands...
37,755,763 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,911,038 UART: [rt]cmd =0x41544d4e, len=14344
44,169,637 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
4,127,010 ready_for_fw is high
4,127,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,674,890 >>> mbox cmd response: success
28,313,849 UART:
28,314,264 UART: Running Caliptra FMC ...
28,315,471 UART:
28,315,643 UART: [state] CFI Enabled
28,323,199 UART: [fht] FMC Alias Private Key: 7
30,662,910 UART: [art] Extend RT PCRs Done
30,664,164 UART: [art] Lock RT PCRs Done
30,665,982 UART: [art] Populate DV Done
30,671,286 UART: [fht] FMC Alias Private Key: 7
30,672,990 UART: [art] Derive CDI
30,673,800 UART: [art] Store in slot 0x4
30,716,824 UART: [art] Derive Key Pair
30,717,814 UART: [art] Store priv key in slot 0x5
33,959,976 UART: [art] Derive Key Pair - Done
33,972,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,253,446 UART: [art] Erasing AUTHORITY.KEYID = 7
36,254,958 UART: [art] PUB.X = DDC5F92D74CFB3C4D72BF02EB0E54FE3E39E7E4A6C5572577310694928CC076E516E70C71D9BD4CB2B76BF511239F2BF
36,262,274 UART: [art] PUB.Y = 2F76D6F6435D4C3EBED1CF932BB5A3B860CF5EED3701A5257F96E68C40C65CF5E401F6802FDBEB3270D9B900E09B81C1
36,269,500 UART: [art] SIG.R = B92C46A6DFAC6D63320B55FF9566314C334C15E098B17792BF65F939BEF893D0A6C9679CD9FF3145FDA7552426CB5A7F
36,276,899 UART: [art] SIG.S = 6C71693F2DD34AA4C2C5D351A729869B451165B42706713F95B9D2A78F88BCD46CC1293A552E58408400042A699E7F61
37,581,974 UART: Caliptra RT
37,582,665 UART: [state] CFI Enabled
37,716,729 UART: [rt] RT listening for mailbox commands...
37,719,039 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,874,401 UART: [rt]cmd =0x41544d4e, len=14344
44,029,531 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
192,269 UART:
192,616 UART: Running Caliptra ROM ...
193,798 UART:
193,949 UART: [state] CFI Enabled
265,533 UART: [state] LifecycleState = Unprovisioned
267,505 UART: [state] DebugLocked = No
269,390 UART: [state] WD Timer not started. Device not locked for debugging
272,777 UART: [kat] SHA2-256
452,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,188 UART: [kat] ++
463,638 UART: [kat] sha1
475,289 UART: [kat] SHA2-256
478,013 UART: [kat] SHA2-384
484,269 UART: [kat] SHA2-512-ACC
486,636 UART: [kat] ECC-384
2,948,714 UART: [kat] HMAC-384Kdf
2,970,330 UART: [kat] LMS
3,446,824 UART: [kat] --
3,451,314 UART: [cold-reset] ++
3,452,674 UART: [fht] FHT @ 0x50003400
3,464,288 UART: [idev] ++
3,464,844 UART: [idev] CDI.KEYID = 6
3,465,797 UART: [idev] SUBJECT.KEYID = 7
3,467,032 UART: [idev] UDS.KEYID = 0
3,467,950 ready_for_fw is high
3,468,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,391 UART: [idev] Erasing UDS.KEYID = 0
5,984,590 UART: [idev] Sha1 KeyId Algorithm
6,009,091 UART: [idev] --
6,014,322 UART: [ldev] ++
6,014,961 UART: [ldev] CDI.KEYID = 6
6,015,874 UART: [ldev] SUBJECT.KEYID = 5
6,017,030 UART: [ldev] AUTHORITY.KEYID = 7
6,018,311 UART: [ldev] FE.KEYID = 1
6,055,524 UART: [ldev] Erasing FE.KEYID = 1
8,564,769 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,025 UART: [ldev] --
10,369,668 UART: [fwproc] Wait for Commands...
10,372,143 UART: [fwproc] Recv command 0x46574c44
10,374,123 UART: [fwproc] Recv'd Img size: 118548 bytes
14,935,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,015,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,088,784 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,417,724 >>> mbox cmd response: success
15,422,082 UART: [afmc] ++
15,422,667 UART: [afmc] CDI.KEYID = 6
15,423,631 UART: [afmc] SUBJECT.KEYID = 7
15,424,842 UART: [afmc] AUTHORITY.KEYID = 5
17,960,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,682,362 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,684,550 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,700,378 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,716,336 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,732,004 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,756,581 UART: [afmc] --
19,759,727 UART: [cold-reset] --
19,762,949 UART: [state] Locking Datavault
19,768,465 UART: [state] Locking PCR0, PCR1 and PCR31
19,770,209 UART: [state] Locking ICCM
19,771,633 UART: [exit] Launching FMC @ 0x40000130
19,780,019 UART:
19,780,250 UART: Running Caliptra FMC ...
19,781,349 UART:
19,781,502 UART: [state] CFI Enabled
19,839,599 UART: [fht] FMC Alias Private Key: 7
21,605,835 UART: [art] Extend RT PCRs Done
21,607,072 UART: [art] Lock RT PCRs Done
21,608,835 UART: [art] Populate DV Done
21,614,102 UART: [fht] FMC Alias Private Key: 7
21,615,745 UART: [art] Derive CDI
21,616,481 UART: [art] Store in slot 0x4
21,672,160 UART: [art] Derive Key Pair
21,673,156 UART: [art] Store priv key in slot 0x5
24,136,037 UART: [art] Derive Key Pair - Done
24,148,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,860,863 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,364 UART: [art] PUB.X = 19775388A44BFCB070A0C64BFE6AB350A7DF73D756F2E69D2D275239C5703CBE660900FE2FE1D5B5A152E26159A5038E
25,869,617 UART: [art] PUB.Y = 97C645F1B268743BA16FB34ADBFB933BE16B234130C3C80600450B374FDF2E3F417ED3204B47ECF399E752BC20973246
25,876,846 UART: [art] SIG.R = 730C308F3DC6F5014373BC7D04BE0581FC35E9F2DF64B4D258D8AF28CF30972B985D6488953C422774732BA2AA746373
25,884,176 UART: [art] SIG.S = E6676238EF1414379DA4B175C5E9F227538B1719A7DE4549B774B4A85E6CBDBDF06CC4C4EDE0597E240710CA82852EDA
26,862,985 UART: Caliptra RT
26,863,748 UART: [state] CFI Enabled
27,046,506 UART: [rt] RT listening for mailbox commands...
27,048,828 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,204,151 UART: [rt]cmd =0x41544d4e, len=14344
30,823,851 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,459,864 ready_for_fw is high
3,460,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,386,207 >>> mbox cmd response: success
19,678,415 UART:
19,678,850 UART: Running Caliptra FMC ...
19,679,969 UART:
19,680,124 UART: [state] CFI Enabled
19,748,348 UART: [fht] FMC Alias Private Key: 7
21,514,664 UART: [art] Extend RT PCRs Done
21,515,890 UART: [art] Lock RT PCRs Done
21,517,705 UART: [art] Populate DV Done
21,522,958 UART: [fht] FMC Alias Private Key: 7
21,524,548 UART: [art] Derive CDI
21,525,370 UART: [art] Store in slot 0x4
21,581,271 UART: [art] Derive Key Pair
21,582,272 UART: [art] Store priv key in slot 0x5
24,045,053 UART: [art] Derive Key Pair - Done
24,058,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,771,105 UART: [art] Erasing AUTHORITY.KEYID = 7
25,772,613 UART: [art] PUB.X = 2D9A69FABE16EF20CAF09ACCBBDAD5DB5F906C39FAF4A07FCDED5A0299EDFB0425C865214B69B2EA8DD6DE8E9AE2D6DA
25,779,944 UART: [art] PUB.Y = 7AA33F47E6A430061BA4A738199BCDC6EA57070CF19C201CD973ED34D8FD0BD38116291DA53384A716A66B227EAD6DB0
25,787,189 UART: [art] SIG.R = 5D9E37CA7577E47CFC31345EAA4FF5843C0E96169B3813D789FF141EB0ECACD88B8B8C433F75265B7447F93E93173299
25,794,585 UART: [art] SIG.S = E18788C62111BE397C4C3BAC5FE1191B468D2E6F3FC157D5B4322B05BC117A2BD882C8FDCDAF3BD62121E11F41B5A806
26,773,318 UART: Caliptra RT
26,774,030 UART: [state] CFI Enabled
26,955,204 UART: [rt] RT listening for mailbox commands...
26,957,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,112,718 UART: [rt]cmd =0x41544d4e, len=14344
30,732,375 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,419 UART:
192,769 UART: Running Caliptra ROM ...
193,880 UART:
603,731 UART: [state] CFI Enabled
616,261 UART: [state] LifecycleState = Unprovisioned
618,135 UART: [state] DebugLocked = No
619,524 UART: [state] WD Timer not started. Device not locked for debugging
624,127 UART: [kat] SHA2-256
803,803 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,603 UART: [kat] ++
815,141 UART: [kat] sha1
825,953 UART: [kat] SHA2-256
828,612 UART: [kat] SHA2-384
835,737 UART: [kat] SHA2-512-ACC
838,108 UART: [kat] ECC-384
3,279,755 UART: [kat] HMAC-384Kdf
3,291,627 UART: [kat] LMS
3,768,196 UART: [kat] --
3,773,204 UART: [cold-reset] ++
3,775,074 UART: [fht] FHT @ 0x50003400
3,786,632 UART: [idev] ++
3,787,196 UART: [idev] CDI.KEYID = 6
3,788,150 UART: [idev] SUBJECT.KEYID = 7
3,789,395 UART: [idev] UDS.KEYID = 0
3,790,299 ready_for_fw is high
3,790,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,370 UART: [idev] Erasing UDS.KEYID = 0
6,269,544 UART: [idev] Sha1 KeyId Algorithm
6,292,494 UART: [idev] --
6,297,463 UART: [ldev] ++
6,298,033 UART: [ldev] CDI.KEYID = 6
6,298,982 UART: [ldev] SUBJECT.KEYID = 5
6,300,144 UART: [ldev] AUTHORITY.KEYID = 7
6,301,434 UART: [ldev] FE.KEYID = 1
6,311,915 UART: [ldev] Erasing FE.KEYID = 1
8,792,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,297 UART: [ldev] --
10,588,003 UART: [fwproc] Wait for Commands...
10,591,087 UART: [fwproc] Recv command 0x46574c44
10,593,132 UART: [fwproc] Recv'd Img size: 118548 bytes
15,124,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,211,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,284,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,612,282 >>> mbox cmd response: success
15,616,457 UART: [afmc] ++
15,617,072 UART: [afmc] CDI.KEYID = 6
15,618,044 UART: [afmc] SUBJECT.KEYID = 7
15,619,261 UART: [afmc] AUTHORITY.KEYID = 5
18,121,890 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,844,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,846,656 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,862,555 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,878,422 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,894,122 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,918,817 UART: [afmc] --
19,922,359 UART: [cold-reset] --
19,925,685 UART: [state] Locking Datavault
19,932,266 UART: [state] Locking PCR0, PCR1 and PCR31
19,934,002 UART: [state] Locking ICCM
19,936,237 UART: [exit] Launching FMC @ 0x40000130
19,944,648 UART:
19,944,893 UART: Running Caliptra FMC ...
19,946,002 UART:
19,946,169 UART: [state] CFI Enabled
19,954,385 UART: [fht] FMC Alias Private Key: 7
21,721,089 UART: [art] Extend RT PCRs Done
21,722,304 UART: [art] Lock RT PCRs Done
21,724,310 UART: [art] Populate DV Done
21,729,896 UART: [fht] FMC Alias Private Key: 7
21,731,439 UART: [art] Derive CDI
21,732,260 UART: [art] Store in slot 0x4
21,774,586 UART: [art] Derive Key Pair
21,775,624 UART: [art] Store priv key in slot 0x5
24,202,755 UART: [art] Derive Key Pair - Done
24,216,016 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,922,799 UART: [art] Erasing AUTHORITY.KEYID = 7
25,924,310 UART: [art] PUB.X = 420DB3F9841495A8649DE1B79D5741E35AA4F3668B7781B8EB33715D090C726BA30392ACE7C42EC0CC3D95EF260D74DC
25,931,577 UART: [art] PUB.Y = 612D61B1E5804776AE523A979BC8734187FEBD216ECE2DD47463E7A1C69F8A6F9DB80A2F76557718D7E3B19951804B94
25,938,818 UART: [art] SIG.R = 81A54607DDAE27ED5EA8AB7308D7125E7AC054434F28FAEB5F90B06E4E0B772BC74E157DBA6791D00999EAEE23273BD5
25,946,212 UART: [art] SIG.S = FC10753DE38CC0F8E92D0886FF621B6DDD0523A459FAB3F073E00E712874AC650430D45621A4381CA565379FFAC9B97D
26,925,178 UART: Caliptra RT
26,925,886 UART: [state] CFI Enabled
27,058,138 UART: [rt] RT listening for mailbox commands...
27,060,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,852 UART: [rt]cmd =0x41544d4e, len=14344
30,826,344 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
3,779,248 ready_for_fw is high
3,779,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,614,386 >>> mbox cmd response: success
19,864,545 UART:
19,864,927 UART: Running Caliptra FMC ...
19,866,075 UART:
19,866,240 UART: [state] CFI Enabled
19,874,280 UART: [fht] FMC Alias Private Key: 7
21,640,053 UART: [art] Extend RT PCRs Done
21,641,280 UART: [art] Lock RT PCRs Done
21,642,962 UART: [art] Populate DV Done
21,648,497 UART: [fht] FMC Alias Private Key: 7
21,650,204 UART: [art] Derive CDI
21,651,024 UART: [art] Store in slot 0x4
21,693,947 UART: [art] Derive Key Pair
21,695,156 UART: [art] Store priv key in slot 0x5
24,122,225 UART: [art] Derive Key Pair - Done
24,135,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,841,904 UART: [art] Erasing AUTHORITY.KEYID = 7
25,843,402 UART: [art] PUB.X = B48D84D717DDB1718F35213A4D8B632E2D2CF8999527F1180EE400A47593C11334A318CFBCD14DD152CF0985F8650D33
25,850,655 UART: [art] PUB.Y = 164EEB90BF7892860DCC4436F2B7FE8604E018A1948611CECB53FF8612BFB7666062C854E4B75C43D650D37535AB57E2
25,857,942 UART: [art] SIG.R = A23F7E6DE4617D3699F4C32E11C76D1F9C452908F305BFC60253EB28F086C5A573F98D433BE153072FA7764760ACAE66
25,865,309 UART: [art] SIG.S = 8A985786B89CD03374EABC7A9CC641873BD7B1CBC724A91DDBD844AE2D3FF699BA3998945D90EBD1D9C0C07BE85F26A1
26,844,286 UART: Caliptra RT
26,844,978 UART: [state] CFI Enabled
26,977,658 UART: [rt] RT listening for mailbox commands...
26,979,951 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,135,149 UART: [rt]cmd =0x41544d4e, len=14344
30,748,967 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,892 writing to cptra_bootfsm_go
192,062 UART:
192,447 UART: Running Caliptra ROM ...
193,597 UART:
193,746 UART: [state] CFI Enabled
262,966 UART: [state] LifecycleState = Unprovisioned
265,383 UART: [state] DebugLocked = No
267,204 UART: [state] WD Timer not started. Device not locked for debugging
271,375 UART: [kat] SHA2-256
461,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,012 UART: [kat] ++
472,549 UART: [kat] sha1
484,064 UART: [kat] SHA2-256
487,031 UART: [kat] SHA2-384
494,056 UART: [kat] SHA2-512-ACC
496,646 UART: [kat] ECC-384
2,947,840 UART: [kat] HMAC-384Kdf
2,971,024 UART: [kat] LMS
3,502,780 UART: [kat] --
3,507,653 UART: [cold-reset] ++
3,509,583 UART: [fht] FHT @ 0x50003400
3,520,484 UART: [idev] ++
3,521,124 UART: [idev] CDI.KEYID = 6
3,522,150 UART: [idev] SUBJECT.KEYID = 7
3,523,319 UART: [idev] UDS.KEYID = 0
3,524,240 ready_for_fw is high
3,524,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,546 UART: [idev] Erasing UDS.KEYID = 0
6,024,757 UART: [idev] Sha1 KeyId Algorithm
6,047,771 UART: [idev] --
6,053,170 UART: [ldev] ++
6,053,849 UART: [ldev] CDI.KEYID = 6
6,054,762 UART: [ldev] SUBJECT.KEYID = 5
6,055,976 UART: [ldev] AUTHORITY.KEYID = 7
6,057,151 UART: [ldev] FE.KEYID = 1
6,099,406 UART: [ldev] Erasing FE.KEYID = 1
8,617,650 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,281 UART: [ldev] --
10,426,883 UART: [fwproc] Wait for Commands...
10,429,137 UART: [fwproc] Recv command 0x46574c44
10,431,442 UART: [fwproc] Recv'd Img size: 118548 bytes
15,109,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,193,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,317,194 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,877,717 >>> mbox cmd response: success
15,881,936 UART: [afmc] ++
15,882,656 UART: [afmc] CDI.KEYID = 6
15,883,868 UART: [afmc] SUBJECT.KEYID = 7
15,885,308 UART: [afmc] AUTHORITY.KEYID = 5
18,417,439 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,161,333 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,163,246 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,178,395 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,193,558 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,208,590 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,232,661 UART: [afmc] --
20,235,443 UART: [cold-reset] --
20,238,547 UART: [state] Locking Datavault
20,243,692 UART: [state] Locking PCR0, PCR1 and PCR31
20,245,834 UART: [state] Locking ICCM
20,248,478 UART: [exit] Launching FMC @ 0x40000130
20,257,174 UART:
20,257,416 UART: Running Caliptra FMC ...
20,258,465 UART:
20,258,612 UART: [state] CFI Enabled
20,318,316 UART: [fht] FMC Alias Private Key: 7
22,084,647 UART: [art] Extend RT PCRs Done
22,085,871 UART: [art] Lock RT PCRs Done
22,087,558 UART: [art] Populate DV Done
22,092,994 UART: [fht] FMC Alias Private Key: 7
22,094,643 UART: [art] Derive CDI
22,095,455 UART: [art] Store in slot 0x4
22,150,923 UART: [art] Derive Key Pair
22,151,911 UART: [art] Store priv key in slot 0x5
24,614,455 UART: [art] Derive Key Pair - Done
24,627,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,340,473 UART: [art] Erasing AUTHORITY.KEYID = 7
26,341,983 UART: [art] PUB.X = 101C6933286F779DE142B817A2CD074E8E3210C7F350621CDFBCA4329F24150E18A7BC64FB40AA9A8C00F1A5E08286CA
26,349,198 UART: [art] PUB.Y = DA92E9AAB2E85F5BA1C507DAB113F396C7F47A241F872133A609C26B70669B2C5034E1032E02BAE3D04C2CA575E4AC6F
26,356,452 UART: [art] SIG.R = C4CBD3F31751B2AC4F296B450E9DD4E6B9748667061F42508BA6A1266627A7249D5DE247DD7B345FA0CC9E8649A3D2B4
26,363,856 UART: [art] SIG.S = 636A2ACCC803D5C046CDD57117305ED1C9CE79F3B5B537C314298F505CF585C7E8E7AFED145EA434644EE9AAEDCF706D
27,342,746 UART: Caliptra RT
27,343,458 UART: [state] CFI Enabled
27,525,207 UART: [rt] RT listening for mailbox commands...
27,527,652 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,682,931 UART: [rt]cmd =0x41544d4e, len=14344
31,295,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
3,440,295 ready_for_fw is high
3,440,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,914,334 >>> mbox cmd response: success
20,200,135 UART:
20,200,518 UART: Running Caliptra FMC ...
20,201,634 UART:
20,201,791 UART: [state] CFI Enabled
20,269,433 UART: [fht] FMC Alias Private Key: 7
22,035,658 UART: [art] Extend RT PCRs Done
22,036,877 UART: [art] Lock RT PCRs Done
22,038,368 UART: [art] Populate DV Done
22,043,940 UART: [fht] FMC Alias Private Key: 7
22,045,588 UART: [art] Derive CDI
22,046,324 UART: [art] Store in slot 0x4
22,102,174 UART: [art] Derive Key Pair
22,103,363 UART: [art] Store priv key in slot 0x5
24,565,986 UART: [art] Derive Key Pair - Done
24,579,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,291,401 UART: [art] Erasing AUTHORITY.KEYID = 7
26,292,899 UART: [art] PUB.X = BFCF03587F5B98E09D826244C626BCF9E4DBD4FFC9F57CD704E98A76CCC3FE46AD530D0045614E02E6F57F3640EA4982
26,300,135 UART: [art] PUB.Y = 6FDC09BA0ADE8CA8DD7451E5B9BA8272B0D71CA6E5FA1F6A3C19097856842D7D9C7C487B9FA1ED1429AB5B5F9F3AE84F
26,307,431 UART: [art] SIG.R = A9D96093747AB874B1F1A6F1BAD205C5D8EA23B2FB7325864076917A3559C602C57D19DDE43FF0ACA58C6D4A1114CEA9
26,314,800 UART: [art] SIG.S = CD441267C322D6046931973ECAE76B80A6DB8380491BDCC527CE86D2E4EFD9C159F8E3B8E59C267F30DE20E7E38E321C
27,293,965 UART: Caliptra RT
27,294,679 UART: [state] CFI Enabled
27,474,870 UART: [rt] RT listening for mailbox commands...
27,477,189 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,632,657 UART: [rt]cmd =0x41544d4e, len=14344
31,250,281 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,483 UART:
192,834 UART: Running Caliptra ROM ...
194,087 UART:
603,846 UART: [state] CFI Enabled
620,796 UART: [state] LifecycleState = Unprovisioned
623,219 UART: [state] DebugLocked = No
625,964 UART: [state] WD Timer not started. Device not locked for debugging
630,650 UART: [kat] SHA2-256
820,549 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,352 UART: [kat] ++
831,844 UART: [kat] sha1
842,933 UART: [kat] SHA2-256
845,948 UART: [kat] SHA2-384
851,023 UART: [kat] SHA2-512-ACC
853,615 UART: [kat] ECC-384
3,296,086 UART: [kat] HMAC-384Kdf
3,309,954 UART: [kat] LMS
3,841,776 UART: [kat] --
3,847,664 UART: [cold-reset] ++
3,848,752 UART: [fht] FHT @ 0x50003400
3,860,722 UART: [idev] ++
3,861,366 UART: [idev] CDI.KEYID = 6
3,862,398 UART: [idev] SUBJECT.KEYID = 7
3,863,502 UART: [idev] UDS.KEYID = 0
3,864,436 ready_for_fw is high
3,864,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,846 UART: [idev] Erasing UDS.KEYID = 0
6,341,862 UART: [idev] Sha1 KeyId Algorithm
6,363,253 UART: [idev] --
6,367,952 UART: [ldev] ++
6,368,688 UART: [ldev] CDI.KEYID = 6
6,369,606 UART: [ldev] SUBJECT.KEYID = 5
6,370,768 UART: [ldev] AUTHORITY.KEYID = 7
6,371,947 UART: [ldev] FE.KEYID = 1
6,383,428 UART: [ldev] Erasing FE.KEYID = 1
8,859,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,774 UART: [ldev] --
10,651,962 UART: [fwproc] Wait for Commands...
10,654,549 UART: [fwproc] Recv command 0x46574c44
10,656,859 UART: [fwproc] Recv'd Img size: 118548 bytes
15,346,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,428,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,552,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,112,192 >>> mbox cmd response: success
16,115,503 UART: [afmc] ++
16,116,218 UART: [afmc] CDI.KEYID = 6
16,117,438 UART: [afmc] SUBJECT.KEYID = 7
16,118,889 UART: [afmc] AUTHORITY.KEYID = 5
18,625,176 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,345,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,347,303 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,362,425 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,377,653 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,392,703 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,417,057 UART: [afmc] --
20,420,388 UART: [cold-reset] --
20,424,486 UART: [state] Locking Datavault
20,429,647 UART: [state] Locking PCR0, PCR1 and PCR31
20,431,811 UART: [state] Locking ICCM
20,434,343 UART: [exit] Launching FMC @ 0x40000130
20,443,034 UART:
20,443,282 UART: Running Caliptra FMC ...
20,444,409 UART:
20,444,571 UART: [state] CFI Enabled
20,452,572 UART: [fht] FMC Alias Private Key: 7
22,218,508 UART: [art] Extend RT PCRs Done
22,219,728 UART: [art] Lock RT PCRs Done
22,221,221 UART: [art] Populate DV Done
22,226,525 UART: [fht] FMC Alias Private Key: 7
22,228,066 UART: [art] Derive CDI
22,228,803 UART: [art] Store in slot 0x4
22,271,340 UART: [art] Derive Key Pair
22,272,344 UART: [art] Store priv key in slot 0x5
24,699,126 UART: [art] Derive Key Pair - Done
24,711,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,418,045 UART: [art] Erasing AUTHORITY.KEYID = 7
26,419,566 UART: [art] PUB.X = B906949412D2A97CE8A94C525C7C0F3720A714B2DFCD46504E63CC9B878641566A0BF5A0B8E508A8B5E9144B940B5884
26,426,787 UART: [art] PUB.Y = C1FC19DDC8CDB04C3799EDECC8E3E9D8385202188F5539111C921A928ED1A07141275BC6B50D4A982F4073DDE37E9D9D
26,434,071 UART: [art] SIG.R = 8709A745BAB960FD6C12F1F5D859B68C548AE71C318EC4C9575728A4F38D66D31621361D84EB6399B0F684BD7EC61030
26,441,453 UART: [art] SIG.S = AE50CB570785EB83C5B514D37F97506E347A402239CE213D63C94AA5756248C5308FF2EF10B4883612B541DAB836C64C
27,420,260 UART: Caliptra RT
27,420,977 UART: [state] CFI Enabled
27,554,460 UART: [rt] RT listening for mailbox commands...
27,556,785 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,712,111 UART: [rt]cmd =0x41544d4e, len=14344
31,332,887 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,756,389 ready_for_fw is high
3,756,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,153,078 >>> mbox cmd response: success
20,408,349 UART:
20,408,734 UART: Running Caliptra FMC ...
20,409,878 UART:
20,410,049 UART: [state] CFI Enabled
20,418,057 UART: [fht] FMC Alias Private Key: 7
22,184,093 UART: [art] Extend RT PCRs Done
22,185,328 UART: [art] Lock RT PCRs Done
22,187,202 UART: [art] Populate DV Done
22,192,828 UART: [fht] FMC Alias Private Key: 7
22,194,376 UART: [art] Derive CDI
22,195,117 UART: [art] Store in slot 0x4
22,237,605 UART: [art] Derive Key Pair
22,238,605 UART: [art] Store priv key in slot 0x5
24,665,952 UART: [art] Derive Key Pair - Done
24,678,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,385,115 UART: [art] Erasing AUTHORITY.KEYID = 7
26,386,638 UART: [art] PUB.X = F4D590D3298BDDC600B7963D6CCE01F23E0AD52D9018B09C00751404BC4B79642CE0AA52B42DA9DD3471A49AF23E5CE1
26,393,857 UART: [art] PUB.Y = D851FDF14F4221CED43D54530BB26802FDC8201C2CCE94576FF8853E043CDF88B8996D88ADB35951887331A8D2623CD7
26,401,082 UART: [art] SIG.R = A043E7DD86D5E85C6A7A6C4418D6C50594BEA7463799AECA2D9BA91186DC9295E9F961CB09E9D64C275D94D26EADFE00
26,408,531 UART: [art] SIG.S = B2DFE9C8646AB09C15B90DEA82ADB6645B7384B8916EB13BF587E70AA968D790EC0009863EAD16583B2532DEA27E8F38
27,387,767 UART: Caliptra RT
27,388,461 UART: [state] CFI Enabled
27,522,097 UART: [rt] RT listening for mailbox commands...
27,524,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,679,904 UART: [rt]cmd =0x41544d4e, len=14344
31,290,627 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,264 UART: [state] LifecycleState = Unprovisioned
85,919 UART: [state] DebugLocked = No
86,439 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,491 UART: [kat] SHA2-256
892,429 UART: [kat] SHA2-384
895,176 UART: [kat] SHA2-512-ACC
897,077 UART: [kat] ECC-384
902,588 UART: [kat] HMAC-384Kdf
907,158 UART: [kat] LMS
1,475,354 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,661 UART: [fht] Storing FHT @ 0x50003400
1,479,488 UART: [idev] ++
1,479,656 UART: [idev] CDI.KEYID = 6
1,480,016 UART: [idev] SUBJECT.KEYID = 7
1,480,440 UART: [idev] UDS.KEYID = 0
1,480,785 ready_for_fw is high
1,480,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,437 UART: [ldev] ++
1,514,605 UART: [ldev] CDI.KEYID = 6
1,514,968 UART: [ldev] SUBJECT.KEYID = 5
1,515,394 UART: [ldev] AUTHORITY.KEYID = 7
1,515,857 UART: [ldev] FE.KEYID = 1
1,520,895 UART: [ldev] Erasing FE.KEYID = 1
1,545,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,498 UART: [ldev] --
1,584,905 UART: [fwproc] Waiting for Commands...
1,585,692 UART: [fwproc] Received command 0x46574c44
1,586,483 UART: [fwproc] Received Image of size 118548 bytes
5,054,303 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,082,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,113,793 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,254,084 >>> mbox cmd response: success
5,255,260 UART: [afmc] ++
5,255,428 UART: [afmc] CDI.KEYID = 6
5,255,790 UART: [afmc] SUBJECT.KEYID = 7
5,256,215 UART: [afmc] AUTHORITY.KEYID = 5
5,291,194 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,307,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,308,258 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,313,964 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,319,843 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,325,556 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,333,403 UART: [afmc] --
5,334,429 UART: [cold-reset] --
5,335,303 UART: [state] Locking Datavault
5,336,686 UART: [state] Locking PCR0, PCR1 and PCR31
5,337,290 UART: [state] Locking ICCM
5,337,742 UART: [exit] Launching FMC @ 0x40000130
5,343,072 UART:
5,343,088 UART: Running Caliptra FMC ...
5,343,496 UART:
5,343,550 UART: [state] CFI Enabled
5,354,450 UART: [fht] FMC Alias Private Key: 7
5,473,874 UART: [art] Extend RT PCRs Done
5,474,302 UART: [art] Lock RT PCRs Done
5,475,738 UART: [art] Populate DV Done
5,483,899 UART: [fht] FMC Alias Private Key: 7
5,484,963 UART: [art] Derive CDI
5,485,243 UART: [art] Store in slot 0x4
5,570,835 UART: [art] Derive Key Pair
5,571,195 UART: [art] Store priv key in slot 0x5
5,584,142 UART: [art] Derive Key Pair - Done
5,598,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,613,980 UART: [art] Erasing AUTHORITY.KEYID = 7
5,614,745 UART: [art] PUB.X = 108A3CFD1A763FFFDD9BFE1567150C778E69F6957951D1BF16AB77BB044CB13E079E20A13F090A8B51C3E8001D722278
5,621,484 UART: [art] PUB.Y = 536220E03724DB68D007174926D1E940CD97BF819C16B80F874E69FC18EFE6679CD9CA823ACFF90F1BA67C839FAEB507
5,628,430 UART: [art] SIG.R = 763928CB166F783B1D65C20DF164207BE818636A912D46FC6AE2FACA187CCAFAFFDE653C076066FCA4AFA0FDC456E505
5,635,209 UART: [art] SIG.S = EFD587E3538876FC8598636F6A6E1DDBFE23B7394F5264102799B3096073F0315AFE620769C42C7768D50FBB99C29125
5,659,180 UART: Caliptra RT
5,659,431 UART: [state] CFI Enabled
5,779,973 UART: [rt] RT listening for mailbox commands...
5,780,643 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,903,541 UART: [rt]cmd =0x41544d4e, len=14344
9,555,284 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,875 ready_for_fw is high
1,362,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,144 >>> mbox cmd response: success
5,392,575 UART:
5,392,591 UART: Running Caliptra FMC ...
5,392,999 UART:
5,393,053 UART: [state] CFI Enabled
5,403,619 UART: [fht] FMC Alias Private Key: 7
5,522,559 UART: [art] Extend RT PCRs Done
5,522,987 UART: [art] Lock RT PCRs Done
5,524,425 UART: [art] Populate DV Done
5,532,708 UART: [fht] FMC Alias Private Key: 7
5,533,878 UART: [art] Derive CDI
5,534,158 UART: [art] Store in slot 0x4
5,619,654 UART: [art] Derive Key Pair
5,620,014 UART: [art] Store priv key in slot 0x5
5,633,141 UART: [art] Derive Key Pair - Done
5,647,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,663,200 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,965 UART: [art] PUB.X = 244FD9BA4CECC4A60B973D3C1AB08ECB807914417E372B0D228785DA573C251864D8EB7BC3C09D9E59C764EAAA126A88
5,670,741 UART: [art] PUB.Y = 9B1679365A35190A07DE53BBB7FF3448F2FC89F542C2719011D38102F26F273F6760CEE9868A150131AD663C6D53A932
5,677,673 UART: [art] SIG.R = AA8797BE1D4CD14CA50062D88FDE3AB7CDE2521E0C28B00167492C036EC41F6C7F436C11459E9A11271BAD18A00CB9E0
5,684,421 UART: [art] SIG.S = 52AC471D0C8349BA72AA0C7297A4DEFDA47E9BF47445D0C8D53AE29ED3B000A4F6188151AB3DD68C930D1909EEE18BCC
5,708,395 UART: Caliptra RT
5,708,646 UART: [state] CFI Enabled
5,829,242 UART: [rt] RT listening for mailbox commands...
5,829,912 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,952,970 UART: [rt]cmd =0x41544d4e, len=14344
9,604,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,636 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,536 UART: [kat] SHA2-256
892,474 UART: [kat] SHA2-384
895,449 UART: [kat] SHA2-512-ACC
897,350 UART: [kat] ECC-384
903,323 UART: [kat] HMAC-384Kdf
908,023 UART: [kat] LMS
1,476,219 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,696 UART: [fht] Storing FHT @ 0x50003400
1,480,413 UART: [idev] ++
1,480,581 UART: [idev] CDI.KEYID = 6
1,480,941 UART: [idev] SUBJECT.KEYID = 7
1,481,365 UART: [idev] UDS.KEYID = 0
1,481,710 ready_for_fw is high
1,481,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,327 UART: [idev] Erasing UDS.KEYID = 0
1,506,259 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,009 UART: [idev] --
1,515,936 UART: [ldev] ++
1,516,104 UART: [ldev] CDI.KEYID = 6
1,516,467 UART: [ldev] SUBJECT.KEYID = 5
1,516,893 UART: [ldev] AUTHORITY.KEYID = 7
1,517,356 UART: [ldev] FE.KEYID = 1
1,522,692 UART: [ldev] Erasing FE.KEYID = 1
1,548,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,443 UART: [ldev] --
1,587,768 UART: [fwproc] Waiting for Commands...
1,588,529 UART: [fwproc] Received command 0x46574c44
1,589,320 UART: [fwproc] Received Image of size 118548 bytes
5,169,535 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,789 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,369,214 >>> mbox cmd response: success
5,370,234 UART: [afmc] ++
5,370,402 UART: [afmc] CDI.KEYID = 6
5,370,764 UART: [afmc] SUBJECT.KEYID = 7
5,371,189 UART: [afmc] AUTHORITY.KEYID = 5
5,406,654 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,552 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,332 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,429,038 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,917 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,630 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,465 UART: [afmc] --
5,449,381 UART: [cold-reset] --
5,450,257 UART: [state] Locking Datavault
5,451,460 UART: [state] Locking PCR0, PCR1 and PCR31
5,452,064 UART: [state] Locking ICCM
5,452,512 UART: [exit] Launching FMC @ 0x40000130
5,457,842 UART:
5,457,858 UART: Running Caliptra FMC ...
5,458,266 UART:
5,458,409 UART: [state] CFI Enabled
5,468,895 UART: [fht] FMC Alias Private Key: 7
5,587,875 UART: [art] Extend RT PCRs Done
5,588,303 UART: [art] Lock RT PCRs Done
5,589,785 UART: [art] Populate DV Done
5,598,062 UART: [fht] FMC Alias Private Key: 7
5,599,186 UART: [art] Derive CDI
5,599,466 UART: [art] Store in slot 0x4
5,684,964 UART: [art] Derive Key Pair
5,685,324 UART: [art] Store priv key in slot 0x5
5,698,389 UART: [art] Derive Key Pair - Done
5,712,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,728,235 UART: [art] Erasing AUTHORITY.KEYID = 7
5,729,000 UART: [art] PUB.X = 09E60413CF09DB65F0BDD77934037B35FED19673AA76695F6F5D11DFCE31760D833C0C4F3ED51C82659465A88F0D7906
5,735,748 UART: [art] PUB.Y = 5D2403DCD8714C8CCD17C338608D8D3C7CBEB116CE6C345E1264F68CEE0D631BABF69B450F7DB3D41F318F22B98B3175
5,742,703 UART: [art] SIG.R = FE55CE9B15AC993A7BE737E8D42FE357287BD561B64726D9170DA3BF7D439246E02E1EDC9C19F3CBF0860AAC5AD7C601
5,749,480 UART: [art] SIG.S = 4C421E3939383CF176D3591B968165A3FA26D33F9F18E080900A747C1BB575BAFF8E5172DE6F2E9235C4C84B9DC3F4E3
5,773,417 UART: Caliptra RT
5,773,760 UART: [state] CFI Enabled
5,893,908 UART: [rt] RT listening for mailbox commands...
5,894,578 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,017,468 UART: [rt]cmd =0x41544d4e, len=14344
9,404,908 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,088 ready_for_fw is high
1,363,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,332,277 >>> mbox cmd response: success
5,394,708 UART:
5,394,724 UART: Running Caliptra FMC ...
5,395,132 UART:
5,395,275 UART: [state] CFI Enabled
5,405,737 UART: [fht] FMC Alias Private Key: 7
5,524,507 UART: [art] Extend RT PCRs Done
5,524,935 UART: [art] Lock RT PCRs Done
5,526,549 UART: [art] Populate DV Done
5,534,784 UART: [fht] FMC Alias Private Key: 7
5,535,876 UART: [art] Derive CDI
5,536,156 UART: [art] Store in slot 0x4
5,622,050 UART: [art] Derive Key Pair
5,622,410 UART: [art] Store priv key in slot 0x5
5,635,391 UART: [art] Derive Key Pair - Done
5,650,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,665,902 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,667 UART: [art] PUB.X = 14E3D2F19AF9ECF7498B9CE20193BB388DC9ED14AA072CEF9B3AC6EB569054D81106F2BB83BE3662468472CA484EA3E3
5,673,442 UART: [art] PUB.Y = DF9CFD134C43C045C48CAE8A024E85C1A0246906F33870B9F159D465E181881651EF41B36C24FDAE44BAE585002706A0
5,680,363 UART: [art] SIG.R = 75FC16F98CECA03811D08E8B3C19ABC918596C2BA07A7FA85966372CF195BBAAE5DDF9CC1CE4173914E6077281F9A144
5,687,142 UART: [art] SIG.S = BCB7B250328F970B627958AEF54A0F4FC5309A3286984E3B3436A8CE49A80DCEDCD68B50F61C236FBDE7DA95BE245182
5,711,059 UART: Caliptra RT
5,711,402 UART: [state] CFI Enabled
5,831,650 UART: [rt] RT listening for mailbox commands...
5,832,320 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,955,386 UART: [rt]cmd =0x41544d4e, len=14344
9,304,265 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,596 UART: [state] LifecycleState = Unprovisioned
85,251 UART: [state] DebugLocked = No
85,905 UART: [state] WD Timer not started. Device not locked for debugging
87,048 UART: [kat] SHA2-256
890,598 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,702 UART: [kat] ++
894,854 UART: [kat] sha1
899,318 UART: [kat] SHA2-256
901,258 UART: [kat] SHA2-384
904,077 UART: [kat] SHA2-512-ACC
905,978 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,283 UART: [kat] LMS
1,168,595 UART: [kat] --
1,169,818 UART: [cold-reset] ++
1,170,174 UART: [fht] FHT @ 0x50003400
1,173,072 UART: [idev] ++
1,173,240 UART: [idev] CDI.KEYID = 6
1,173,601 UART: [idev] SUBJECT.KEYID = 7
1,174,026 UART: [idev] UDS.KEYID = 0
1,174,372 ready_for_fw is high
1,174,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,183 UART: [idev] Erasing UDS.KEYID = 0
1,199,151 UART: [idev] Sha1 KeyId Algorithm
1,208,255 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,216,162 UART: [ldev] Erasing FE.KEYID = 1
1,242,297 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,751 UART: [fwproc] Wait for Commands...
1,282,394 UART: [fwproc] Recv command 0x46574c44
1,283,127 UART: [fwproc] Recv'd Img size: 118548 bytes
3,167,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,654 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,225,829 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,046 >>> mbox cmd response: success
3,367,190 UART: [afmc] ++
3,367,358 UART: [afmc] CDI.KEYID = 6
3,367,721 UART: [afmc] SUBJECT.KEYID = 7
3,368,147 UART: [afmc] AUTHORITY.KEYID = 5
3,403,946 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,205 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,954 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,661 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,538 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,248 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,030 UART: [afmc] --
3,446,849 UART: [cold-reset] --
3,447,627 UART: [state] Locking Datavault
3,448,706 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,310 UART: [state] Locking ICCM
3,449,930 UART: [exit] Launching FMC @ 0x40000130
3,455,260 UART:
3,455,276 UART: Running Caliptra FMC ...
3,455,684 UART:
3,455,738 UART: [state] CFI Enabled
3,466,292 UART: [fht] FMC Alias Private Key: 7
3,585,198 UART: [art] Extend RT PCRs Done
3,585,626 UART: [art] Lock RT PCRs Done
3,587,096 UART: [art] Populate DV Done
3,595,241 UART: [fht] FMC Alias Private Key: 7
3,596,211 UART: [art] Derive CDI
3,596,491 UART: [art] Store in slot 0x4
3,682,522 UART: [art] Derive Key Pair
3,682,882 UART: [art] Store priv key in slot 0x5
3,696,916 UART: [art] Derive Key Pair - Done
3,711,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,920 UART: [art] Erasing AUTHORITY.KEYID = 7
3,727,685 UART: [art] PUB.X = 6E4841D1CDFB51E6E366590313BCA1A6631B399DB3ED7857E47F55C7CA7BA4A235F01F3E2DE53D257CB5DB931C8F34CB
3,734,468 UART: [art] PUB.Y = 8B934583AFAC267C97235FB658A117DCD4AB58E2DF8098DE14B046752BEB70A5C0F2A2613A41F41725C7AC52B2E861B7
3,741,426 UART: [art] SIG.R = 5A78C14EE401AB19E46FFF55EE05C1CCED7F108D5A799DCF3AA837D37B6452FEC31CE0B05E43FBA3980ECFEDEC9934E8
3,748,215 UART: [art] SIG.S = 3D81CC9939E80FE6D7A7F09B8DBA67328D1910AF953B248AFD4D5D7B3BFDE5F51496CDFE2C7F30B4B267B6334F0976AA
3,771,889 UART: Caliptra RT
3,772,140 UART: [state] CFI Enabled
3,892,420 UART: [rt] RT listening for mailbox commands...
3,893,090 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,288 UART: [rt]cmd =0x41544d4e, len=14344
4,972,997 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,546 ready_for_fw is high
1,059,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,115 >>> mbox cmd response: success
3,279,534 UART:
3,279,550 UART: Running Caliptra FMC ...
3,279,958 UART:
3,280,012 UART: [state] CFI Enabled
3,290,666 UART: [fht] FMC Alias Private Key: 7
3,409,274 UART: [art] Extend RT PCRs Done
3,409,702 UART: [art] Lock RT PCRs Done
3,411,484 UART: [art] Populate DV Done
3,419,635 UART: [fht] FMC Alias Private Key: 7
3,420,689 UART: [art] Derive CDI
3,420,969 UART: [art] Store in slot 0x4
3,506,524 UART: [art] Derive Key Pair
3,506,884 UART: [art] Store priv key in slot 0x5
3,519,342 UART: [art] Derive Key Pair - Done
3,534,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,549,037 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,802 UART: [art] PUB.X = 08A0559BB8EF6C3F0F0908B88CA9A89E69DB14F7AE91F9836328AB29F6D0D93961BF9A9706F708F682A58406FD68CF23
3,556,557 UART: [art] PUB.Y = CF108A7F463FE23F041112EB7A02BD71D346AC6B8FD0BA0B08013D0FB19165448737E452ACCEB4DDF41EFDA1C499FF26
3,563,507 UART: [art] SIG.R = 08D1EBBB80B5A8219E34BC5FFC4F78A46D0E83E0AB06FFAC4613E24273B6409AB76649434B7F6F7163FBC6C03580DE35
3,570,280 UART: [art] SIG.S = EE90DE6838EB1F222E113131DC8437E28271EC56E1B41C43666AC7E527DAF2801EF2D01784C9BB97C43244870B706F92
3,594,053 UART: Caliptra RT
3,594,304 UART: [state] CFI Enabled
3,714,942 UART: [rt] RT listening for mailbox commands...
3,715,612 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,138 UART: [rt]cmd =0x41544d4e, len=14344
4,800,313 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
891,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,477 UART: [kat] ++
895,629 UART: [kat] sha1
899,845 UART: [kat] SHA2-256
901,785 UART: [kat] SHA2-384
904,448 UART: [kat] SHA2-512-ACC
906,349 UART: [kat] ECC-384
916,040 UART: [kat] HMAC-384Kdf
920,694 UART: [kat] LMS
1,169,006 UART: [kat] --
1,169,827 UART: [cold-reset] ++
1,170,197 UART: [fht] FHT @ 0x50003400
1,172,749 UART: [idev] ++
1,172,917 UART: [idev] CDI.KEYID = 6
1,173,278 UART: [idev] SUBJECT.KEYID = 7
1,173,703 UART: [idev] UDS.KEYID = 0
1,174,049 ready_for_fw is high
1,174,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,804 UART: [idev] Erasing UDS.KEYID = 0
1,199,046 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,529 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,171 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,061 UART: [fwproc] Recv command 0x46574c44
1,282,794 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,413 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,444 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,367,824 >>> mbox cmd response: success
3,369,046 UART: [afmc] ++
3,369,214 UART: [afmc] CDI.KEYID = 6
3,369,577 UART: [afmc] SUBJECT.KEYID = 7
3,370,003 UART: [afmc] AUTHORITY.KEYID = 5
3,405,582 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,047 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,796 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,503 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,380 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,090 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,752 UART: [afmc] --
3,448,593 UART: [cold-reset] --
3,449,431 UART: [state] Locking Datavault
3,450,796 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,400 UART: [state] Locking ICCM
3,451,974 UART: [exit] Launching FMC @ 0x40000130
3,457,304 UART:
3,457,320 UART: Running Caliptra FMC ...
3,457,728 UART:
3,457,871 UART: [state] CFI Enabled
3,468,559 UART: [fht] FMC Alias Private Key: 7
3,588,333 UART: [art] Extend RT PCRs Done
3,588,761 UART: [art] Lock RT PCRs Done
3,590,157 UART: [art] Populate DV Done
3,598,634 UART: [fht] FMC Alias Private Key: 7
3,599,716 UART: [art] Derive CDI
3,599,996 UART: [art] Store in slot 0x4
3,685,347 UART: [art] Derive Key Pair
3,685,707 UART: [art] Store priv key in slot 0x5
3,698,823 UART: [art] Derive Key Pair - Done
3,713,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,129 UART: [art] PUB.X = E48B300199B426BF6CF9221BE25DDA18ADA0B96974118E343EA1748FA89FA09DF1388434747A1588AFF7F28A2EBFFBCA
3,736,910 UART: [art] PUB.Y = 7DE14E9F5DB08AAA81A3B47ABF122C1C373FEE5C44F686130983F65841D23295B1AFAB15AC05A5EFAF9D97694B2C9FB9
3,743,872 UART: [art] SIG.R = 39467021E82A193A2680BB94D37355D6EB687731267B4A1EF75070E4D373C189EF4813FB89386C91D11E33B5217B35DF
3,750,634 UART: [art] SIG.S = 902C9A0CAA3DF4AF9861141A1B9CB060F137FBF8A5547456C6FC49D7781CF62D8F99AC6E1C1FA81272E50814986119E9
3,774,618 UART: Caliptra RT
3,774,961 UART: [state] CFI Enabled
3,894,839 UART: [rt] RT listening for mailbox commands...
3,895,509 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,541 UART: [rt]cmd =0x41544d4e, len=14344
4,964,780 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,429 ready_for_fw is high
1,059,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,230,847 >>> mbox cmd response: success
3,293,042 UART:
3,293,058 UART: Running Caliptra FMC ...
3,293,466 UART:
3,293,609 UART: [state] CFI Enabled
3,304,505 UART: [fht] FMC Alias Private Key: 7
3,423,713 UART: [art] Extend RT PCRs Done
3,424,141 UART: [art] Lock RT PCRs Done
3,425,851 UART: [art] Populate DV Done
3,434,226 UART: [fht] FMC Alias Private Key: 7
3,435,190 UART: [art] Derive CDI
3,435,470 UART: [art] Store in slot 0x4
3,521,129 UART: [art] Derive Key Pair
3,521,489 UART: [art] Store priv key in slot 0x5
3,535,103 UART: [art] Derive Key Pair - Done
3,549,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,565,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,565,858 UART: [art] PUB.X = 17E5E87BC0303AD7598FF22A9648A95A2EF5843628A9F6595CA0E526DEA2DF9FA7C0BD01FB67477067AF03FCE1F520E9
3,572,634 UART: [art] PUB.Y = D549195CDA2B290C7CF9B5597BCA9568B8B678354144602F1737AF51E6AA3B3E96FE4764D9DEDB2CB9A3E4C31C71436A
3,579,591 UART: [art] SIG.R = 8954F350DA585C9BC1C56E8457909D886F094A615FD977B5F2844643A950BCCA27CA26D11963AE75CD1050D105020CDA
3,586,349 UART: [art] SIG.S = 03517B5033B70A2237129C2F64A84948347EA18708FDAB5E844B9508BDB534AF27BF6D9AC732436CB4749AE3266068A0
3,610,583 UART: Caliptra RT
3,610,926 UART: [state] CFI Enabled
3,729,972 UART: [rt] RT listening for mailbox commands...
3,730,642 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,853,536 UART: [rt]cmd =0x41544d4e, len=14344
4,813,092 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
893,484 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,609 UART: [kat] ++
897,761 UART: [kat] sha1
902,005 UART: [kat] SHA2-256
903,945 UART: [kat] SHA2-384
906,728 UART: [kat] SHA2-512-ACC
908,629 UART: [kat] ECC-384
918,116 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,172,197 UART: [cold-reset] ++
1,172,623 UART: [fht] FHT @ 0x50003400
1,175,198 UART: [idev] ++
1,175,366 UART: [idev] CDI.KEYID = 6
1,175,726 UART: [idev] SUBJECT.KEYID = 7
1,176,150 UART: [idev] UDS.KEYID = 0
1,176,495 ready_for_fw is high
1,176,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,436 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,855 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,649 UART: [ldev] Erasing FE.KEYID = 1
1,243,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,556 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,429 UART: [ldev] --
1,283,922 UART: [fwproc] Wait for Commands...
1,284,696 UART: [fwproc] Recv command 0x46574c44
1,285,424 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,137 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,307 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,654 >>> mbox cmd response: success
3,371,742 UART: [afmc] ++
3,371,910 UART: [afmc] CDI.KEYID = 6
3,372,272 UART: [afmc] SUBJECT.KEYID = 7
3,372,697 UART: [afmc] AUTHORITY.KEYID = 5
3,407,866 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,725 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,473 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,179 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,058 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,768 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,623 UART: [afmc] --
3,451,661 UART: [cold-reset] --
3,452,265 UART: [state] Locking Datavault
3,453,408 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,012 UART: [state] Locking ICCM
3,454,496 UART: [exit] Launching FMC @ 0x40000130
3,459,826 UART:
3,459,842 UART: Running Caliptra FMC ...
3,460,250 UART:
3,460,304 UART: [state] CFI Enabled
3,470,938 UART: [fht] FMC Alias Private Key: 7
3,590,664 UART: [art] Extend RT PCRs Done
3,591,092 UART: [art] Lock RT PCRs Done
3,592,386 UART: [art] Populate DV Done
3,600,545 UART: [fht] FMC Alias Private Key: 7
3,601,491 UART: [art] Derive CDI
3,601,771 UART: [art] Store in slot 0x4
3,687,412 UART: [art] Derive Key Pair
3,687,772 UART: [art] Store priv key in slot 0x5
3,701,218 UART: [art] Derive Key Pair - Done
3,715,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,135 UART: [art] PUB.X = 7DD81B31D0C0793FBC7440203AD49CB2C32FF0D8DA5CFDE7D8B4240DEF00F641C62EB878808E624B5D040AEE4941F31A
3,738,890 UART: [art] PUB.Y = 427A4820C0740B2F0B5AF843B5A33E607CB4FFE2DBD56826E6C8C3FE507765B60F38C970055C14546D061D5D4754484E
3,745,825 UART: [art] SIG.R = A32F6904A281D80B91C61D0C11CAE5EDD015B2955A639C5B49B3E2728E7FE8F227D9EDDF3100686AAC32C063A3041AB1
3,752,571 UART: [art] SIG.S = 4D5E40BCBC74DB5CBB8072684B88664FC9E2FE15E4CCB81992698B05BE3AAE45CA754FCD75E60B3B6716028C15DA4609
3,776,483 UART: Caliptra RT
3,776,734 UART: [state] CFI Enabled
3,897,484 UART: [rt] RT listening for mailbox commands...
3,898,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,018 UART: [rt]cmd =0x41544d4e, len=14344
4,988,135 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,701 ready_for_fw is high
1,060,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,314 >>> mbox cmd response: success
3,286,473 UART:
3,286,489 UART: Running Caliptra FMC ...
3,286,897 UART:
3,286,951 UART: [state] CFI Enabled
3,297,233 UART: [fht] FMC Alias Private Key: 7
3,416,993 UART: [art] Extend RT PCRs Done
3,417,421 UART: [art] Lock RT PCRs Done
3,418,787 UART: [art] Populate DV Done
3,427,120 UART: [fht] FMC Alias Private Key: 7
3,428,246 UART: [art] Derive CDI
3,428,526 UART: [art] Store in slot 0x4
3,514,575 UART: [art] Derive Key Pair
3,514,935 UART: [art] Store priv key in slot 0x5
3,528,433 UART: [art] Derive Key Pair - Done
3,543,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,264 UART: [art] PUB.X = 77C2ED1406DF43072C533E00D15A9E5BC920C867AE3FABA4CA5ECC96D3BF19B47A8FC5C9FBE76E2FC73CEEAF9C353500
3,566,010 UART: [art] PUB.Y = B603AE4AE4D2A777CDA3AE28C58D77DD3D3A3438268B9957B3A9C0C8AF0A190F56792112268F85F3D575A28F7FBA1E5E
3,572,963 UART: [art] SIG.R = 504CE65C358FBE9C987367EF98BF7612BB0589A9F173D453C81AAA4A2991F04C467CEDFED3BF36763B3EE692ED2F4B67
3,579,744 UART: [art] SIG.S = 538A902FE75D626C5D9C9120589BA30EA60C09683AE190327E9759DF3B3EEACF214BBCD7C5D90284C243908B11CEA7C0
3,603,908 UART: Caliptra RT
3,604,159 UART: [state] CFI Enabled
3,722,969 UART: [rt] RT listening for mailbox commands...
3,723,639 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,741 UART: [rt]cmd =0x41544d4e, len=14344
4,809,130 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,007 UART: [state] LifecycleState = Unprovisioned
86,662 UART: [state] DebugLocked = No
87,160 UART: [state] WD Timer not started. Device not locked for debugging
88,499 UART: [kat] SHA2-256
894,149 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,274 UART: [kat] ++
898,426 UART: [kat] sha1
902,468 UART: [kat] SHA2-256
904,408 UART: [kat] SHA2-384
907,221 UART: [kat] SHA2-512-ACC
909,122 UART: [kat] ECC-384
918,855 UART: [kat] HMAC-384Kdf
923,601 UART: [kat] LMS
1,171,929 UART: [kat] --
1,172,924 UART: [cold-reset] ++
1,173,390 UART: [fht] FHT @ 0x50003400
1,175,991 UART: [idev] ++
1,176,159 UART: [idev] CDI.KEYID = 6
1,176,519 UART: [idev] SUBJECT.KEYID = 7
1,176,943 UART: [idev] UDS.KEYID = 0
1,177,288 ready_for_fw is high
1,177,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,759 UART: [idev] Erasing UDS.KEYID = 0
1,202,020 UART: [idev] Sha1 KeyId Algorithm
1,210,618 UART: [idev] --
1,211,604 UART: [ldev] ++
1,211,772 UART: [ldev] CDI.KEYID = 6
1,212,135 UART: [ldev] SUBJECT.KEYID = 5
1,212,561 UART: [ldev] AUTHORITY.KEYID = 7
1,213,024 UART: [ldev] FE.KEYID = 1
1,218,526 UART: [ldev] Erasing FE.KEYID = 1
1,244,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,556 UART: [ldev] --
1,284,067 UART: [fwproc] Wait for Commands...
1,284,691 UART: [fwproc] Recv command 0x46574c44
1,285,419 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,897 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,138 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,601 >>> mbox cmd response: success
3,372,725 UART: [afmc] ++
3,372,893 UART: [afmc] CDI.KEYID = 6
3,373,255 UART: [afmc] SUBJECT.KEYID = 7
3,373,680 UART: [afmc] AUTHORITY.KEYID = 5
3,409,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,426,784 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,490 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,369 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,079 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,042 UART: [afmc] --
3,453,038 UART: [cold-reset] --
3,453,878 UART: [state] Locking Datavault
3,455,133 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,737 UART: [state] Locking ICCM
3,456,347 UART: [exit] Launching FMC @ 0x40000130
3,461,677 UART:
3,461,693 UART: Running Caliptra FMC ...
3,462,101 UART:
3,462,244 UART: [state] CFI Enabled
3,472,550 UART: [fht] FMC Alias Private Key: 7
3,591,710 UART: [art] Extend RT PCRs Done
3,592,138 UART: [art] Lock RT PCRs Done
3,593,644 UART: [art] Populate DV Done
3,601,819 UART: [fht] FMC Alias Private Key: 7
3,602,953 UART: [art] Derive CDI
3,603,233 UART: [art] Store in slot 0x4
3,689,048 UART: [art] Derive Key Pair
3,689,408 UART: [art] Store priv key in slot 0x5
3,702,974 UART: [art] Derive Key Pair - Done
3,717,513 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,024 UART: [art] Erasing AUTHORITY.KEYID = 7
3,733,789 UART: [art] PUB.X = A0A5B9135B9B36DF5ABE19BEAE14E4300F50DC632F5CE77CAD869B768196A450FAF12B230FCDEC7A02D438EAC0CD1C1A
3,740,576 UART: [art] PUB.Y = 10333B6773373F0EEC48A4E1D9FA8D401C689842EF353BFB34A10069656DEE5FBC20EC7D7EEC01F7F646AC2984249A71
3,747,506 UART: [art] SIG.R = 0809308EA58646EFB7E028F6DA7339303E8453C93F3C056AC70FE0FB2F3317F770A363E0797C1E0F398BD768993192F8
3,754,257 UART: [art] SIG.S = F07D8FB247636910A015EC31589974D461C6FF87C1DFFB8C86B89A9A538961134AE20A1559CE37FED64809B9AA06E4D2
3,777,842 UART: Caliptra RT
3,778,185 UART: [state] CFI Enabled
3,898,177 UART: [rt] RT listening for mailbox commands...
3,898,847 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,022,085 UART: [rt]cmd =0x41544d4e, len=14344
4,989,532 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,642 ready_for_fw is high
1,059,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,210,109 >>> mbox cmd response: success
3,273,042 UART:
3,273,058 UART: Running Caliptra FMC ...
3,273,466 UART:
3,273,609 UART: [state] CFI Enabled
3,284,519 UART: [fht] FMC Alias Private Key: 7
3,404,219 UART: [art] Extend RT PCRs Done
3,404,647 UART: [art] Lock RT PCRs Done
3,406,325 UART: [art] Populate DV Done
3,414,638 UART: [fht] FMC Alias Private Key: 7
3,415,792 UART: [art] Derive CDI
3,416,072 UART: [art] Store in slot 0x4
3,501,281 UART: [art] Derive Key Pair
3,501,641 UART: [art] Store priv key in slot 0x5
3,514,757 UART: [art] Derive Key Pair - Done
3,529,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,544,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,545,514 UART: [art] PUB.X = 652B5FD14AB34E4ADD1F58493FB3E498C38C21D97C45EFC2AC8561FF4C319221BEFC7CF0A8A0508FA226AFDECE3B8EA4
3,552,310 UART: [art] PUB.Y = 09DBAB4E238F3F2F62A78D9BAC02DC3CFF127F9D42F4ED62718995AF0D57E332AE88E94462DE1922EF51E199371C9471
3,559,261 UART: [art] SIG.R = 8191C542B65989E55795EA3A65189D89520DE771EE9F5FA98CFBC02162B04290082E9642C9471B79358A99E677731D4F
3,566,015 UART: [art] SIG.S = C41CE0C4CE330B8BE7EB9E4EFB9C04100CC45B2F530B364D9CA32580BD1F6317871349149C8833C33DF546175EB9B248
3,590,119 UART: Caliptra RT
3,590,462 UART: [state] CFI Enabled
3,709,841 UART: [rt] RT listening for mailbox commands...
3,710,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,833,785 UART: [rt]cmd =0x41544d4e, len=14344
4,780,166 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,275 UART:
192,652 UART: Running Caliptra ROM ...
193,860 UART:
194,020 UART: [state] CFI Enabled
264,888 UART: [state] LifecycleState = Unprovisioned
266,823 UART: [state] DebugLocked = No
269,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,872 UART: [kat] SHA2-256
443,541 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,101 UART: [kat] ++
454,558 UART: [kat] sha1
465,792 UART: [kat] SHA2-256
468,445 UART: [kat] SHA2-384
475,143 UART: [kat] SHA2-512-ACC
477,511 UART: [kat] ECC-384
2,767,022 UART: [kat] HMAC-384Kdf
2,798,872 UART: [kat] LMS
3,989,169 UART: [kat] --
3,991,627 UART: [cold-reset] ++
3,992,636 UART: [fht] Storing FHT @ 0x50003400
4,003,966 UART: [idev] ++
4,004,601 UART: [idev] CDI.KEYID = 6
4,005,487 UART: [idev] SUBJECT.KEYID = 7
4,006,737 UART: [idev] UDS.KEYID = 0
4,007,743 ready_for_fw is high
4,007,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,466 UART: [idev] Erasing UDS.KEYID = 0
7,344,219 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,602 UART: [idev] --
7,370,951 UART: [ldev] ++
7,371,517 UART: [ldev] CDI.KEYID = 6
7,372,531 UART: [ldev] SUBJECT.KEYID = 5
7,373,687 UART: [ldev] AUTHORITY.KEYID = 7
7,374,988 UART: [ldev] FE.KEYID = 1
7,421,612 UART: [ldev] Erasing FE.KEYID = 1
10,757,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,359 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,957 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,178 UART: [ldev] --
13,135,380 UART: [fwproc] Waiting for Commands...
13,137,963 UART: [fwproc] Received command 0x46574c44
13,140,143 UART: [fwproc] Received Image of size 118548 bytes
21,516,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,599,569 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,672,747 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,001,377 >>> mbox cmd response: success
22,005,346 UART: [afmc] ++
22,006,000 UART: [afmc] CDI.KEYID = 6
22,007,089 UART: [afmc] SUBJECT.KEYID = 7
22,008,204 UART: [afmc] AUTHORITY.KEYID = 5
25,379,528 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,674,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,676,328 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,690,858 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,705,634 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,720,019 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,741,661 UART: [afmc] --
27,745,743 UART: [cold-reset] --
27,749,764 UART: [state] Locking Datavault
27,755,386 UART: [state] Locking PCR0, PCR1 and PCR31
27,757,141 UART: [state] Locking ICCM
27,758,423 UART: [exit] Launching FMC @ 0x40000130
27,766,822 UART:
27,767,078 UART: Running Caliptra FMC ...
27,768,187 UART:
27,768,345 UART: [state] CFI Enabled
27,834,879 UART: [fht] FMC Alias Private Key: 7
30,196,567 UART: [art] Extend RT PCRs Done
30,197,789 UART: [art] Lock RT PCRs Done
30,199,522 UART: [art] Populate DV Done
30,204,720 UART: [fht] FMC Alias Private Key: 7
30,206,373 UART: [art] Derive CDI
30,207,191 UART: [art] Store in slot 0x4
30,263,101 UART: [art] Derive Key Pair
30,264,098 UART: [art] Store priv key in slot 0x5
33,557,213 UART: [art] Derive Key Pair - Done
33,569,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,858,426 UART: [art] Erasing AUTHORITY.KEYID = 7
35,859,933 UART: [art] PUB.X = A463852B5EAD8A791CFE7C74A6054B40372F4C392D04AA0175CEF5F95F494BA82BDA3F4C6971E2CEF8BFC0046D42EDDA
35,867,256 UART: [art] PUB.Y = 5C748FB798197AAC084DC01F3482DAE5BB58DFC987AEA7A0D1EE1833C7A8B974AE1C2B99A191CFAE4D00410170F6F773
35,874,493 UART: [art] SIG.R = 6F5CB9F8F4AFD21590CE84862307E0440AB4FE362ABAF9355E8FF4C20058146B81B52A48B85132A6BDD68C3CAE141770
35,881,843 UART: [art] SIG.S = 6A5F00B0219D8FC87AC616D77C4D1B2BDF6295F2865B8F81F61FA0BF09092323BA6761CB8C8DFE596DA4D641B0BF1744
37,186,796 UART: Caliptra RT
37,187,480 UART: [state] CFI Enabled
37,365,268 UART: [rt] RT listening for mailbox commands...
37,367,566 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,522,966 UART: [rt]cmd =0x41544d4e, len=14344
45,043,881 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,784,742 ready_for_fw is high
3,785,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,671,136 >>> mbox cmd response: success
27,362,898 UART:
27,363,306 UART: Running Caliptra FMC ...
27,364,446 UART:
27,364,608 UART: [state] CFI Enabled
27,432,577 UART: [fht] FMC Alias Private Key: 7
29,772,862 UART: [art] Extend RT PCRs Done
29,774,081 UART: [art] Lock RT PCRs Done
29,775,600 UART: [art] Populate DV Done
29,780,843 UART: [fht] FMC Alias Private Key: 7
29,782,544 UART: [art] Derive CDI
29,783,359 UART: [art] Store in slot 0x4
29,841,212 UART: [art] Derive Key Pair
29,842,256 UART: [art] Store priv key in slot 0x5
33,134,964 UART: [art] Derive Key Pair - Done
33,147,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,436,318 UART: [art] Erasing AUTHORITY.KEYID = 7
35,437,821 UART: [art] PUB.X = F8D896F0BBA2A2D498EEC82FA61B9DFD3C42E25264433FBBE4E2718AC03818D56B077BAD56425F05AF84E6BE14C0DD5D
35,445,115 UART: [art] PUB.Y = DDD7CEFCF5CF5698660B0739FE844679A39DB7B04A3188A5518E2890CB4C1F88AF0AE1C52CE2F2F7C9B1901C00C1FA6D
35,452,353 UART: [art] SIG.R = E01AE5DE509EA4281386BE18315693009E5EF1B006D3327FF0D193BD489A067AAFE0AD492FA95A2F1246AA23D27B2C5B
35,459,744 UART: [art] SIG.S = 8281AD719D4932F45C10FADC37C0FB740C93314ED8C4F4E5EA64B13F3895D50A9E4A540F635C9D92499840984F611FBB
36,765,540 UART: Caliptra RT
36,766,254 UART: [state] CFI Enabled
36,941,950 UART: [rt] RT listening for mailbox commands...
36,944,260 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,099,686 UART: [rt]cmd =0x41544d4e, len=14344
44,723,697 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,381 UART:
192,746 UART: Running Caliptra ROM ...
193,947 UART:
603,728 UART: [state] CFI Enabled
616,765 UART: [state] LifecycleState = Unprovisioned
618,633 UART: [state] DebugLocked = No
620,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,838 UART: [kat] SHA2-256
795,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,082 UART: [kat] ++
806,606 UART: [kat] sha1
816,548 UART: [kat] SHA2-256
819,258 UART: [kat] SHA2-384
824,673 UART: [kat] SHA2-512-ACC
827,033 UART: [kat] ECC-384
3,111,172 UART: [kat] HMAC-384Kdf
3,123,323 UART: [kat] LMS
4,313,439 UART: [kat] --
4,318,443 UART: [cold-reset] ++
4,320,396 UART: [fht] Storing FHT @ 0x50003400
4,332,085 UART: [idev] ++
4,332,718 UART: [idev] CDI.KEYID = 6
4,333,596 UART: [idev] SUBJECT.KEYID = 7
4,334,905 UART: [idev] UDS.KEYID = 0
4,335,954 ready_for_fw is high
4,336,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,022 UART: [idev] Erasing UDS.KEYID = 0
7,622,763 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,255 UART: [idev] --
7,646,517 UART: [ldev] ++
7,647,144 UART: [ldev] CDI.KEYID = 6
7,648,022 UART: [ldev] SUBJECT.KEYID = 5
7,649,283 UART: [ldev] AUTHORITY.KEYID = 7
7,650,561 UART: [ldev] FE.KEYID = 1
7,661,069 UART: [ldev] Erasing FE.KEYID = 1
10,950,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,797 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,614 UART: [ldev] --
13,309,660 UART: [fwproc] Waiting for Commands...
13,311,473 UART: [fwproc] Received command 0x46574c44
13,313,652 UART: [fwproc] Received Image of size 118548 bytes
22,006,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,093,177 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,166,301 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,495,089 >>> mbox cmd response: success
22,498,973 UART: [afmc] ++
22,499,597 UART: [afmc] CDI.KEYID = 6
22,500,479 UART: [afmc] SUBJECT.KEYID = 7
22,501,714 UART: [afmc] AUTHORITY.KEYID = 5
25,817,801 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,114,105 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,116,404 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,130,884 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,145,666 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,160,055 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,182,052 UART: [afmc] --
28,185,425 UART: [cold-reset] --
28,190,681 UART: [state] Locking Datavault
28,197,007 UART: [state] Locking PCR0, PCR1 and PCR31
28,198,703 UART: [state] Locking ICCM
28,200,063 UART: [exit] Launching FMC @ 0x40000130
28,208,451 UART:
28,208,695 UART: Running Caliptra FMC ...
28,209,719 UART:
28,209,883 UART: [state] CFI Enabled
28,217,987 UART: [fht] FMC Alias Private Key: 7
30,557,974 UART: [art] Extend RT PCRs Done
30,559,202 UART: [art] Lock RT PCRs Done
30,561,068 UART: [art] Populate DV Done
30,566,805 UART: [fht] FMC Alias Private Key: 7
30,568,337 UART: [art] Derive CDI
30,569,068 UART: [art] Store in slot 0x4
30,611,828 UART: [art] Derive Key Pair
30,612,866 UART: [art] Store priv key in slot 0x5
33,854,491 UART: [art] Derive Key Pair - Done
33,867,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,147,756 UART: [art] Erasing AUTHORITY.KEYID = 7
36,149,264 UART: [art] PUB.X = AD0C18586FFA947DC5B7566C797FB0215AF723AAE3F10FA00888C8B0F0B77A93BD4D81A6F2DD52C731A043B562004E27
36,156,504 UART: [art] PUB.Y = D7D5A22CC558FBF449C27475CB0C1629BE506EF98E4523E97F9BCA572403F2D9B46418AAD4F405F6B08359C5CE6FB10E
36,163,780 UART: [art] SIG.R = 1A8DB0448C346A05A4D99606CEA5BF0408DC0F4F74C31D72C7E2BC448B3F0B24DE614D2B289D129840F96BFC961E0B1C
36,171,183 UART: [art] SIG.S = B0837E8DA54750C7FF72D2334D9D03980BD3877A17039E67E6287164952C9E8333B301759663A47B7EC77EE14DB94D39
37,476,242 UART: Caliptra RT
37,476,930 UART: [state] CFI Enabled
37,609,771 UART: [rt] RT listening for mailbox commands...
37,612,094 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,767,276 UART: [rt]cmd =0x41544d4e, len=14344
45,365,687 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.59s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,124,538 ready_for_fw is high
4,124,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,342,372 >>> mbox cmd response: success
27,978,304 UART:
27,978,688 UART: Running Caliptra FMC ...
27,979,814 UART:
27,979,977 UART: [state] CFI Enabled
27,987,638 UART: [fht] FMC Alias Private Key: 7
30,328,366 UART: [art] Extend RT PCRs Done
30,329,601 UART: [art] Lock RT PCRs Done
30,331,287 UART: [art] Populate DV Done
30,336,803 UART: [fht] FMC Alias Private Key: 7
30,338,353 UART: [art] Derive CDI
30,339,166 UART: [art] Store in slot 0x4
30,381,905 UART: [art] Derive Key Pair
30,382,915 UART: [art] Store priv key in slot 0x5
33,625,242 UART: [art] Derive Key Pair - Done
33,638,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,918,589 UART: [art] Erasing AUTHORITY.KEYID = 7
35,920,103 UART: [art] PUB.X = 88030A7B2284E78FCD364CC4FC9E8FF7367E13CEC9E54B388B0780DF39874B8820C6C6DDC8A0EBE08C32B9070E34B01D
35,927,352 UART: [art] PUB.Y = 1DF1B8B07927827DF3E89A3AE9D4D7998ABE75B7CE521E5E700E2ED6168D1D2818506C69BEF5BC3BDBE19D5283065113
35,934,637 UART: [art] SIG.R = 846C4773C0C8D6ECD5B4AA496F22E3A48C43587088EA7851B0CCAADA277D2FA7D61B61008857F92D1DD3093ACC57745A
35,942,063 UART: [art] SIG.S = E621BABFB3D228C5D35841585D9DB6DDCE1AC445071EE7828172A56EF43AA67788A16205C28CE4702D9EFD450167EB01
37,247,252 UART: Caliptra RT
37,247,941 UART: [state] CFI Enabled
37,381,427 UART: [rt] RT listening for mailbox commands...
37,383,767 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,539,002 UART: [rt]cmd =0x41544d4e, len=14344
45,190,142 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,168 UART:
192,514 UART: Running Caliptra ROM ...
193,713 UART:
193,864 UART: [state] CFI Enabled
264,107 UART: [state] LifecycleState = Unprovisioned
266,085 UART: [state] DebugLocked = No
269,042 UART: [state] WD Timer not started. Device not locked for debugging
272,588 UART: [kat] SHA2-256
452,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,050 UART: [kat] ++
463,584 UART: [kat] sha1
473,221 UART: [kat] SHA2-256
475,923 UART: [kat] SHA2-384
481,557 UART: [kat] SHA2-512-ACC
483,918 UART: [kat] ECC-384
2,950,722 UART: [kat] HMAC-384Kdf
2,973,213 UART: [kat] LMS
3,449,771 UART: [kat] --
3,455,668 UART: [cold-reset] ++
3,458,029 UART: [fht] FHT @ 0x50003400
3,469,568 UART: [idev] ++
3,470,128 UART: [idev] CDI.KEYID = 6
3,471,156 UART: [idev] SUBJECT.KEYID = 7
3,472,324 UART: [idev] UDS.KEYID = 0
3,473,247 ready_for_fw is high
3,473,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,715 UART: [idev] Erasing UDS.KEYID = 0
5,987,660 UART: [idev] Sha1 KeyId Algorithm
6,010,039 UART: [idev] --
6,014,363 UART: [ldev] ++
6,014,938 UART: [ldev] CDI.KEYID = 6
6,015,845 UART: [ldev] SUBJECT.KEYID = 5
6,017,077 UART: [ldev] AUTHORITY.KEYID = 7
6,018,310 UART: [ldev] FE.KEYID = 1
6,060,275 UART: [ldev] Erasing FE.KEYID = 1
8,568,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,590 UART: [ldev] --
10,379,224 UART: [fwproc] Wait for Commands...
10,382,399 UART: [fwproc] Recv command 0x46574c44
10,384,434 UART: [fwproc] Recv'd Img size: 118548 bytes
14,942,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,027,468 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,100,497 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,429,241 >>> mbox cmd response: success
15,432,821 UART: [afmc] ++
15,433,419 UART: [afmc] CDI.KEYID = 6
15,434,328 UART: [afmc] SUBJECT.KEYID = 7
15,435,544 UART: [afmc] AUTHORITY.KEYID = 5
17,963,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,706,927 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,709,112 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,724,999 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,740,929 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,756,631 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,779,639 UART: [afmc] --
19,783,288 UART: [cold-reset] --
19,788,168 UART: [state] Locking Datavault
19,794,649 UART: [state] Locking PCR0, PCR1 and PCR31
19,796,348 UART: [state] Locking ICCM
19,798,331 UART: [exit] Launching FMC @ 0x40000130
19,806,743 UART:
19,806,977 UART: Running Caliptra FMC ...
19,808,071 UART:
19,808,235 UART: [state] CFI Enabled
19,863,793 UART: [fht] FMC Alias Private Key: 7
21,629,996 UART: [art] Extend RT PCRs Done
21,631,227 UART: [art] Lock RT PCRs Done
21,632,902 UART: [art] Populate DV Done
21,638,472 UART: [fht] FMC Alias Private Key: 7
21,640,014 UART: [art] Derive CDI
21,640,780 UART: [art] Store in slot 0x4
21,697,110 UART: [art] Derive Key Pair
21,698,143 UART: [art] Store priv key in slot 0x5
24,160,818 UART: [art] Derive Key Pair - Done
24,173,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,886,463 UART: [art] Erasing AUTHORITY.KEYID = 7
25,887,990 UART: [art] PUB.X = F252CE8D1B3229B634E90C07C7769061BACFC54AF2F1D6370BEB43D61B81ED7831EAA5A50B7E5A9AB994662A05219ABB
25,895,241 UART: [art] PUB.Y = CAC664BCE4588067A0406D658B4C9C47EBD06DAD5F292BD460D80303FA0767FE047F2A68077A4C5085731F53B096A10B
25,902,476 UART: [art] SIG.R = 7DECE170239AC9036A41E2FECC2147240F7A8005B629A961A5ED60C3D2BCAC40A3110D787B89032AA546A1AD7EF72583
25,909,923 UART: [art] SIG.S = D887278E587AD0CCAF9B1BC9E4A43D83FD6E75B27ADA886378078D911A8A8A4C356F8C07BDD70A3E972A20915ECF5A1F
26,889,049 UART: Caliptra RT
26,889,763 UART: [state] CFI Enabled
27,069,046 UART: [rt] RT listening for mailbox commands...
27,071,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,226,584 UART: [rt]cmd =0x41544d4e, len=14344
31,810,880 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,458,760 ready_for_fw is high
3,459,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,409,250 >>> mbox cmd response: success
19,692,001 UART:
19,692,444 UART: Running Caliptra FMC ...
19,693,551 UART:
19,693,714 UART: [state] CFI Enabled
19,757,457 UART: [fht] FMC Alias Private Key: 7
21,524,213 UART: [art] Extend RT PCRs Done
21,525,437 UART: [art] Lock RT PCRs Done
21,527,332 UART: [art] Populate DV Done
21,532,567 UART: [fht] FMC Alias Private Key: 7
21,534,062 UART: [art] Derive CDI
21,534,823 UART: [art] Store in slot 0x4
21,590,447 UART: [art] Derive Key Pair
21,591,488 UART: [art] Store priv key in slot 0x5
24,054,234 UART: [art] Derive Key Pair - Done
24,067,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,780,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,782,256 UART: [art] PUB.X = 3F73972AE7AA08EA8B47AAED6B852FB30FA706C5F70E06AE2951DD3598466054ED68A1681EA7AF6F4C2D3CBD6223109D
25,789,561 UART: [art] PUB.Y = 50DDFF19A4A81485BCA8A71C907FBE6BA6AE9FAA861C9D69E6423EED167CAEFB4EB5035CF96D1A96E2307813255B5893
25,796,863 UART: [art] SIG.R = 62F03CF9ED160658D1B07594C0FEA96EFB22024B0D91035D9CF53FA51134F995DDCB1BA2E53F4C1AD9A950483882A853
25,804,256 UART: [art] SIG.S = 4FFB56010337EE14F10B27C541FBCE749CD2AC1EF260A34F3F2AED0C40A29ADEEB4B60A57A1314F18510554664A68EB5
26,782,658 UART: Caliptra RT
26,783,365 UART: [state] CFI Enabled
26,965,068 UART: [rt] RT listening for mailbox commands...
26,967,367 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,122,652 UART: [rt]cmd =0x41544d4e, len=14344
31,687,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,337 UART:
192,695 UART: Running Caliptra ROM ...
193,834 UART:
603,709 UART: [state] CFI Enabled
619,008 UART: [state] LifecycleState = Unprovisioned
620,893 UART: [state] DebugLocked = No
622,556 UART: [state] WD Timer not started. Device not locked for debugging
625,730 UART: [kat] SHA2-256
805,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,143 UART: [kat] ++
816,593 UART: [kat] sha1
827,893 UART: [kat] SHA2-256
830,619 UART: [kat] SHA2-384
836,971 UART: [kat] SHA2-512-ACC
839,338 UART: [kat] ECC-384
3,281,470 UART: [kat] HMAC-384Kdf
3,294,376 UART: [kat] LMS
3,770,832 UART: [kat] --
3,773,717 UART: [cold-reset] ++
3,775,467 UART: [fht] FHT @ 0x50003400
3,786,592 UART: [idev] ++
3,787,226 UART: [idev] CDI.KEYID = 6
3,788,107 UART: [idev] SUBJECT.KEYID = 7
3,789,425 UART: [idev] UDS.KEYID = 0
3,790,327 ready_for_fw is high
3,790,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,461 UART: [idev] Erasing UDS.KEYID = 0
6,266,786 UART: [idev] Sha1 KeyId Algorithm
6,290,571 UART: [idev] --
6,295,485 UART: [ldev] ++
6,296,107 UART: [ldev] CDI.KEYID = 6
6,297,031 UART: [ldev] SUBJECT.KEYID = 5
6,298,201 UART: [ldev] AUTHORITY.KEYID = 7
6,299,491 UART: [ldev] FE.KEYID = 1
6,311,434 UART: [ldev] Erasing FE.KEYID = 1
8,787,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,855 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,436 UART: [ldev] --
10,580,268 UART: [fwproc] Wait for Commands...
10,581,940 UART: [fwproc] Recv command 0x46574c44
10,583,984 UART: [fwproc] Recv'd Img size: 118548 bytes
15,120,200 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,202,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,275,266 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,602,890 >>> mbox cmd response: success
15,606,526 UART: [afmc] ++
15,607,140 UART: [afmc] CDI.KEYID = 6
15,608,034 UART: [afmc] SUBJECT.KEYID = 7
15,609,267 UART: [afmc] AUTHORITY.KEYID = 5
18,113,543 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,836,543 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,838,779 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,854,654 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,870,539 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,886,260 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,909,189 UART: [afmc] --
19,912,626 UART: [cold-reset] --
19,916,766 UART: [state] Locking Datavault
19,922,830 UART: [state] Locking PCR0, PCR1 and PCR31
19,924,594 UART: [state] Locking ICCM
19,926,971 UART: [exit] Launching FMC @ 0x40000130
19,935,388 UART:
19,935,669 UART: Running Caliptra FMC ...
19,936,785 UART:
19,936,953 UART: [state] CFI Enabled
19,945,336 UART: [fht] FMC Alias Private Key: 7
21,711,897 UART: [art] Extend RT PCRs Done
21,713,102 UART: [art] Lock RT PCRs Done
21,714,837 UART: [art] Populate DV Done
21,720,414 UART: [fht] FMC Alias Private Key: 7
21,722,135 UART: [art] Derive CDI
21,722,960 UART: [art] Store in slot 0x4
21,765,353 UART: [art] Derive Key Pair
21,766,354 UART: [art] Store priv key in slot 0x5
24,193,082 UART: [art] Derive Key Pair - Done
24,206,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,912,525 UART: [art] Erasing AUTHORITY.KEYID = 7
25,914,021 UART: [art] PUB.X = 04213993A9E639B8870A87BE34DBAEE6529B0E4A5E3CDFED9647A469BA5F3985CEBEFB7D29F5B7F34449AB22CF5F4921
25,921,277 UART: [art] PUB.Y = 6E96B9A36CFB1B234484CCE3F93526317AA18DA3F9CE84C3195F83EB315A7DA63FF3887532B59BB3C272E0E7BAB32737
25,928,571 UART: [art] SIG.R = 8FB3A9B90B7D595E7CC138A03D6A7198DA273AF2729164C3450F048E1EEFF3A05CE8E5EAAFCDC9D53A3D766BB90AEA74
25,935,995 UART: [art] SIG.S = A955FC92561FE2598710EFE346206AA101A1F67DE99B512DBECBDD16DFB790EFC811BC11535B7282B1A9B060E3218BAF
26,915,405 UART: Caliptra RT
26,916,113 UART: [state] CFI Enabled
27,048,674 UART: [rt] RT listening for mailbox commands...
27,051,055 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,206,579 UART: [rt]cmd =0x41544d4e, len=14344
31,788,322 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.91s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,777,552 ready_for_fw is high
3,777,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,585,117 >>> mbox cmd response: success
19,835,753 UART:
19,836,144 UART: Running Caliptra FMC ...
19,837,293 UART:
19,837,455 UART: [state] CFI Enabled
19,845,288 UART: [fht] FMC Alias Private Key: 7
21,611,455 UART: [art] Extend RT PCRs Done
21,612,676 UART: [art] Lock RT PCRs Done
21,614,412 UART: [art] Populate DV Done
21,619,557 UART: [fht] FMC Alias Private Key: 7
21,621,261 UART: [art] Derive CDI
21,621,999 UART: [art] Store in slot 0x4
21,664,600 UART: [art] Derive Key Pair
21,665,604 UART: [art] Store priv key in slot 0x5
24,091,911 UART: [art] Derive Key Pair - Done
24,105,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,811,299 UART: [art] Erasing AUTHORITY.KEYID = 7
25,812,822 UART: [art] PUB.X = 4F63DD2163C8707338AB1B926CA0A81B572D0FC4210134AA9A0B8344C7277919DCCBEA488B15B5BB60CDF5DD3EE30726
25,820,093 UART: [art] PUB.Y = 9AE6EB98789817CB56C6C4749937AB50BBB523C1250CE4F41A1824508100F33BD5DB2ED9190D2A6F9486692EE10B1189
25,827,287 UART: [art] SIG.R = 09734A60AE7B02760A85AF332CBDB482B57A722ED53B1D3B50321AA531C421AB5A322504A3DD4D73352592B2C5472B73
25,834,686 UART: [art] SIG.S = 94D8E75C1FD772B40640B519B532CCFDED7C08F4F5146A9FCB6D4F0E1F09740704C6B88688D75E8FF6B946F32604A51B
26,814,259 UART: Caliptra RT
26,814,977 UART: [state] CFI Enabled
26,948,079 UART: [rt] RT listening for mailbox commands...
26,950,372 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,105,895 UART: [rt]cmd =0x41544d4e, len=14344
31,679,895 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.90s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,174 UART:
192,537 UART: Running Caliptra ROM ...
193,691 UART:
193,840 UART: [state] CFI Enabled
265,781 UART: [state] LifecycleState = Unprovisioned
268,203 UART: [state] DebugLocked = No
271,103 UART: [state] WD Timer not started. Device not locked for debugging
276,261 UART: [kat] SHA2-256
466,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,907 UART: [kat] ++
477,445 UART: [kat] sha1
488,327 UART: [kat] SHA2-256
491,396 UART: [kat] SHA2-384
496,389 UART: [kat] SHA2-512-ACC
498,965 UART: [kat] ECC-384
2,948,608 UART: [kat] HMAC-384Kdf
2,973,210 UART: [kat] LMS
3,504,970 UART: [kat] --
3,509,956 UART: [cold-reset] ++
3,512,531 UART: [fht] FHT @ 0x50003400
3,523,578 UART: [idev] ++
3,524,221 UART: [idev] CDI.KEYID = 6
3,525,250 UART: [idev] SUBJECT.KEYID = 7
3,526,421 UART: [idev] UDS.KEYID = 0
3,527,349 ready_for_fw is high
3,527,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,632 UART: [idev] Erasing UDS.KEYID = 0
6,029,162 UART: [idev] Sha1 KeyId Algorithm
6,052,400 UART: [idev] --
6,058,201 UART: [ldev] ++
6,058,889 UART: [ldev] CDI.KEYID = 6
6,059,826 UART: [ldev] SUBJECT.KEYID = 5
6,060,986 UART: [ldev] AUTHORITY.KEYID = 7
6,062,212 UART: [ldev] FE.KEYID = 1
6,101,160 UART: [ldev] Erasing FE.KEYID = 1
8,605,785 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,479 UART: [ldev] --
10,414,361 UART: [fwproc] Wait for Commands...
10,416,613 UART: [fwproc] Recv command 0x46574c44
10,418,871 UART: [fwproc] Recv'd Img size: 118548 bytes
15,088,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,173,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,297,353 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,858,459 >>> mbox cmd response: success
15,862,260 UART: [afmc] ++
15,862,981 UART: [afmc] CDI.KEYID = 6
15,864,096 UART: [afmc] SUBJECT.KEYID = 7
15,865,650 UART: [afmc] AUTHORITY.KEYID = 5
18,409,039 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,131,101 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,133,017 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,148,068 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,163,321 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,178,353 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,201,577 UART: [afmc] --
20,204,354 UART: [cold-reset] --
20,207,962 UART: [state] Locking Datavault
20,212,017 UART: [state] Locking PCR0, PCR1 and PCR31
20,214,178 UART: [state] Locking ICCM
20,216,557 UART: [exit] Launching FMC @ 0x40000130
20,225,232 UART:
20,225,469 UART: Running Caliptra FMC ...
20,226,507 UART:
20,226,652 UART: [state] CFI Enabled
20,290,051 UART: [fht] FMC Alias Private Key: 7
22,057,045 UART: [art] Extend RT PCRs Done
22,058,268 UART: [art] Lock RT PCRs Done
22,059,975 UART: [art] Populate DV Done
22,065,282 UART: [fht] FMC Alias Private Key: 7
22,066,981 UART: [art] Derive CDI
22,067,796 UART: [art] Store in slot 0x4
22,122,290 UART: [art] Derive Key Pair
22,123,286 UART: [art] Store priv key in slot 0x5
24,585,850 UART: [art] Derive Key Pair - Done
24,598,734 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,779 UART: [art] Erasing AUTHORITY.KEYID = 7
26,314,290 UART: [art] PUB.X = EC63EE8391F6E1D012C05DF02E81D9B748845CDD2300177D3D9F03C448753A420726A7DC5F9EDE5AEF0C019C140E9EA2
26,321,502 UART: [art] PUB.Y = FBDBE87F542EFAFD78BE186DB57DB737D29EC575392D7119AF307D4A6F33CE507739BBFF245C7B3DECA9571960ABFD2D
26,328,799 UART: [art] SIG.R = 29909248D523F20B50A4AED2A14EA5CD457003CB51B6F4387DB5BB20AA100A63153E1BA362A4F04587BB7CC518546FFD
26,336,215 UART: [art] SIG.S = E37B3B597FCD8483427ADC3BC966F94FA6307F46410B3A0803138104D0BF37755CFD858DDA96EBDB9D7DD0CA24708B9F
27,315,428 UART: Caliptra RT
27,316,118 UART: [state] CFI Enabled
27,496,700 UART: [rt] RT listening for mailbox commands...
27,499,003 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,654,427 UART: [rt]cmd =0x41544d4e, len=14344
32,230,202 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,438,459 ready_for_fw is high
3,438,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,925,810 >>> mbox cmd response: success
20,220,059 UART:
20,220,455 UART: Running Caliptra FMC ...
20,221,648 UART:
20,221,822 UART: [state] CFI Enabled
20,286,891 UART: [fht] FMC Alias Private Key: 7
22,052,908 UART: [art] Extend RT PCRs Done
22,054,130 UART: [art] Lock RT PCRs Done
22,055,439 UART: [art] Populate DV Done
22,060,696 UART: [fht] FMC Alias Private Key: 7
22,062,407 UART: [art] Derive CDI
22,063,250 UART: [art] Store in slot 0x4
22,119,991 UART: [art] Derive Key Pair
22,121,028 UART: [art] Store priv key in slot 0x5
24,583,843 UART: [art] Derive Key Pair - Done
24,596,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,308,741 UART: [art] Erasing AUTHORITY.KEYID = 7
26,310,245 UART: [art] PUB.X = 63A93D51D89A7B2328FE84393A870118E304E66C76718F6B46AB92A085663AAA6D846547F536F265E751D89EC7F4FEFF
26,317,483 UART: [art] PUB.Y = D5C0A0519B0C7692A1EC918BD764271A59284E7F1ED296387FED77E1752EDFEDFF410F3389242A36C3856D4169A528DA
26,324,771 UART: [art] SIG.R = B9A31FAC559B85B16DE2811C04BF2FB0119DF13216071D9F178708099D7585F5B9FA27D3A0239BB03C7892036B641B3E
26,332,299 UART: [art] SIG.S = 9B45E37A662B3416034B14C806DF53A33EEA393575BA4C633AF5234189ABEBEFAD8A51ACF5CB86BE634C229252BB1268
27,310,960 UART: Caliptra RT
27,311,677 UART: [state] CFI Enabled
27,492,727 UART: [rt] RT listening for mailbox commands...
27,495,056 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,583 UART: [rt]cmd =0x41544d4e, len=14344
32,224,715 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
192,388 UART:
192,763 UART: Running Caliptra ROM ...
193,912 UART:
603,549 UART: [state] CFI Enabled
614,530 UART: [state] LifecycleState = Unprovisioned
616,908 UART: [state] DebugLocked = No
619,381 UART: [state] WD Timer not started. Device not locked for debugging
624,144 UART: [kat] SHA2-256
813,979 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,726 UART: [kat] ++
825,280 UART: [kat] sha1
837,724 UART: [kat] SHA2-256
840,731 UART: [kat] SHA2-384
846,888 UART: [kat] SHA2-512-ACC
849,515 UART: [kat] ECC-384
3,291,064 UART: [kat] HMAC-384Kdf
3,303,916 UART: [kat] LMS
3,835,704 UART: [kat] --
3,839,498 UART: [cold-reset] ++
3,840,580 UART: [fht] FHT @ 0x50003400
3,852,691 UART: [idev] ++
3,853,412 UART: [idev] CDI.KEYID = 6
3,854,297 UART: [idev] SUBJECT.KEYID = 7
3,855,540 UART: [idev] UDS.KEYID = 0
3,856,448 ready_for_fw is high
3,856,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,576 UART: [idev] Erasing UDS.KEYID = 0
6,336,782 UART: [idev] Sha1 KeyId Algorithm
6,358,878 UART: [idev] --
6,363,692 UART: [ldev] ++
6,364,426 UART: [ldev] CDI.KEYID = 6
6,365,506 UART: [ldev] SUBJECT.KEYID = 5
6,366,636 UART: [ldev] AUTHORITY.KEYID = 7
6,367,773 UART: [ldev] FE.KEYID = 1
6,377,744 UART: [ldev] Erasing FE.KEYID = 1
8,854,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,880 UART: [ldev] --
10,646,255 UART: [fwproc] Wait for Commands...
10,648,024 UART: [fwproc] Recv command 0x46574c44
10,650,338 UART: [fwproc] Recv'd Img size: 118548 bytes
15,314,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,390,598 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,514,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,075,069 >>> mbox cmd response: success
16,079,339 UART: [afmc] ++
16,080,056 UART: [afmc] CDI.KEYID = 6
16,081,173 UART: [afmc] SUBJECT.KEYID = 7
16,082,679 UART: [afmc] AUTHORITY.KEYID = 5
18,585,549 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,308,492 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,310,463 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,325,512 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,340,761 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,355,801 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,378,981 UART: [afmc] --
20,382,910 UART: [cold-reset] --
20,386,408 UART: [state] Locking Datavault
20,393,251 UART: [state] Locking PCR0, PCR1 and PCR31
20,395,415 UART: [state] Locking ICCM
20,396,465 UART: [exit] Launching FMC @ 0x40000130
20,405,157 UART:
20,405,393 UART: Running Caliptra FMC ...
20,406,423 UART:
20,406,573 UART: [state] CFI Enabled
20,414,947 UART: [fht] FMC Alias Private Key: 7
22,180,905 UART: [art] Extend RT PCRs Done
22,182,130 UART: [art] Lock RT PCRs Done
22,183,783 UART: [art] Populate DV Done
22,189,034 UART: [fht] FMC Alias Private Key: 7
22,190,631 UART: [art] Derive CDI
22,191,376 UART: [art] Store in slot 0x4
22,234,194 UART: [art] Derive Key Pair
22,235,234 UART: [art] Store priv key in slot 0x5
24,662,726 UART: [art] Derive Key Pair - Done
24,675,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,382,060 UART: [art] Erasing AUTHORITY.KEYID = 7
26,383,579 UART: [art] PUB.X = 7C901AD09E25D892B4A95A665B4D736B704A402945C718C222813A6713C58427E1463A1AF5D44EBE4311300CE29FD328
26,390,809 UART: [art] PUB.Y = 7D820DA33A08739D417256163E6A0F04FAC16625617901A2AEBCFDFA003C74366D6FC37B93B4FF8230224C62E97892C8
26,398,066 UART: [art] SIG.R = B13D648AF4FC1BBF4D2EEBF396D09DFE409BBC9F657B87E7F95F2B882A9A8640DF26005ECC5991ED256412C0C5E5888D
26,405,439 UART: [art] SIG.S = 8FDBAE474E7EC5919504B947D6F612559679DB9126028A44676A0B8B715516E85E69BA306F5677838D5E39AB9BFB0042
27,383,987 UART: Caliptra RT
27,384,700 UART: [state] CFI Enabled
27,518,109 UART: [rt] RT listening for mailbox commands...
27,520,425 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,850 UART: [rt]cmd =0x41544d4e, len=14344
32,232,672 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,757,172 ready_for_fw is high
3,757,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,150,149 >>> mbox cmd response: success
20,401,816 UART:
20,402,223 UART: Running Caliptra FMC ...
20,403,414 UART:
20,403,587 UART: [state] CFI Enabled
20,411,502 UART: [fht] FMC Alias Private Key: 7
22,176,955 UART: [art] Extend RT PCRs Done
22,178,189 UART: [art] Lock RT PCRs Done
22,179,847 UART: [art] Populate DV Done
22,185,309 UART: [fht] FMC Alias Private Key: 7
22,186,852 UART: [art] Derive CDI
22,187,621 UART: [art] Store in slot 0x4
22,229,957 UART: [art] Derive Key Pair
22,230,999 UART: [art] Store priv key in slot 0x5
24,658,226 UART: [art] Derive Key Pair - Done
24,671,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,377,683 UART: [art] Erasing AUTHORITY.KEYID = 7
26,379,182 UART: [art] PUB.X = 254850D59361EE07CBD9D36848B68FA8B34AE7D31D8C398778C6AB19A1C0A1DD608675A5734A654E150EF4B49167309F
26,386,468 UART: [art] PUB.Y = 28FE676C57C141B24F8AF9A25999B33EE9F928565D5E64C5CE1705D806AB4F32C6CC3D73F7C1D976DB1939B0FEB5172A
26,393,715 UART: [art] SIG.R = 67A9EE481B8FAC1F53471C3E04BB17EE9B9823C9AAC658D8DC959CA4CDED1729C319753B774F7DA0269959190BAA41B8
26,401,143 UART: [art] SIG.S = 8557F94B10113DA381DFBCB891FAA738E8077C3B9DCF2EA3BF83C5196E5DF4FB2E20D9DA7B1510B18E81665FAD87FE54
27,379,531 UART: Caliptra RT
27,380,250 UART: [state] CFI Enabled
27,513,768 UART: [rt] RT listening for mailbox commands...
27,516,085 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,671,293 UART: [rt]cmd =0x41544d4e, len=14344
32,249,967 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.93s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,249 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,185 UART: [kat] SHA2-256
892,123 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,168 UART: [kat] HMAC-384Kdf
906,534 UART: [kat] LMS
1,474,730 UART: [kat] --
1,475,619 UART: [cold-reset] ++
1,476,133 UART: [fht] Storing FHT @ 0x50003400
1,478,842 UART: [idev] ++
1,479,010 UART: [idev] CDI.KEYID = 6
1,479,370 UART: [idev] SUBJECT.KEYID = 7
1,479,794 UART: [idev] UDS.KEYID = 0
1,480,139 ready_for_fw is high
1,480,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,626 UART: [idev] Erasing UDS.KEYID = 0
1,504,372 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,126 UART: [idev] --
1,514,199 UART: [ldev] ++
1,514,367 UART: [ldev] CDI.KEYID = 6
1,514,730 UART: [ldev] SUBJECT.KEYID = 5
1,515,156 UART: [ldev] AUTHORITY.KEYID = 7
1,515,619 UART: [ldev] FE.KEYID = 1
1,520,869 UART: [ldev] Erasing FE.KEYID = 1
1,545,730 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,195 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,598 UART: [ldev] --
1,584,875 UART: [fwproc] Waiting for Commands...
1,585,718 UART: [fwproc] Received command 0x46574c44
1,586,509 UART: [fwproc] Received Image of size 118548 bytes
5,203,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,231,551 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,262,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,403,030 >>> mbox cmd response: success
5,404,138 UART: [afmc] ++
5,404,306 UART: [afmc] CDI.KEYID = 6
5,404,668 UART: [afmc] SUBJECT.KEYID = 7
5,405,093 UART: [afmc] AUTHORITY.KEYID = 5
5,440,672 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,456,830 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,457,610 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,463,316 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,469,195 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,474,908 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,482,789 UART: [afmc] --
5,483,739 UART: [cold-reset] --
5,484,559 UART: [state] Locking Datavault
5,485,736 UART: [state] Locking PCR0, PCR1 and PCR31
5,486,340 UART: [state] Locking ICCM
5,486,792 UART: [exit] Launching FMC @ 0x40000130
5,492,122 UART:
5,492,138 UART: Running Caliptra FMC ...
5,492,546 UART:
5,492,600 UART: [state] CFI Enabled
5,503,324 UART: [fht] FMC Alias Private Key: 7
5,622,990 UART: [art] Extend RT PCRs Done
5,623,418 UART: [art] Lock RT PCRs Done
5,624,640 UART: [art] Populate DV Done
5,633,015 UART: [fht] FMC Alias Private Key: 7
5,634,175 UART: [art] Derive CDI
5,634,455 UART: [art] Store in slot 0x4
5,720,309 UART: [art] Derive Key Pair
5,720,669 UART: [art] Store priv key in slot 0x5
5,734,338 UART: [art] Derive Key Pair - Done
5,748,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,764,135 UART: [art] Erasing AUTHORITY.KEYID = 7
5,764,900 UART: [art] PUB.X = A05B14B9CDB23E0EA9A526CB6246ECB288351C0823A7ADA6249AECE990973CF06B00991A62C1E29036E45E1E43878260
5,771,646 UART: [art] PUB.Y = 2334D5A53280808D8531D64AC0804D7413A1EB0A9C74B2688721787BF080E6344F5D095CB76DB44E8817667D79CFD7A7
5,778,584 UART: [art] SIG.R = E65E311B12AB3E1BF7ACE82F7CAC3FA046D3F63D4EF367FBA9C458F6C78CB0042B8F46B5FE75DFD21295463EBDB8AF77
5,785,377 UART: [art] SIG.S = 82A3AF34779C264BC660AAC1F843EBF57F710FED48EDAB1C02E654D36BC5579AB87F7D36AFF5585B3A5E447A29CF9EB7
5,809,213 UART: Caliptra RT
5,809,464 UART: [state] CFI Enabled
5,929,529 UART: [rt] RT listening for mailbox commands...
5,930,199 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,052,923 UART: [rt]cmd =0x41544d4e, len=14344
9,442,224 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,429 ready_for_fw is high
1,362,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,179,962 >>> mbox cmd response: success
5,241,427 UART:
5,241,443 UART: Running Caliptra FMC ...
5,241,851 UART:
5,241,905 UART: [state] CFI Enabled
5,252,351 UART: [fht] FMC Alias Private Key: 7
5,371,129 UART: [art] Extend RT PCRs Done
5,371,557 UART: [art] Lock RT PCRs Done
5,372,961 UART: [art] Populate DV Done
5,381,116 UART: [fht] FMC Alias Private Key: 7
5,382,198 UART: [art] Derive CDI
5,382,478 UART: [art] Store in slot 0x4
5,468,048 UART: [art] Derive Key Pair
5,468,408 UART: [art] Store priv key in slot 0x5
5,481,301 UART: [art] Derive Key Pair - Done
5,495,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,511,338 UART: [art] Erasing AUTHORITY.KEYID = 7
5,512,103 UART: [art] PUB.X = 7D0B9A59DCAAE5491CDE509E5A25173BCA132D1AC6C1A739D2AABC858E5C87B6C30E96E8423774184414ECFEEB990DEB
5,518,884 UART: [art] PUB.Y = 9771214373122AC84CEF84502D1A5E9628471DBE521CF069341F17B09916347521B71A9F378BF99AF198D34EDFC835C9
5,525,828 UART: [art] SIG.R = 10AB4908FB070852ED5081A46BA8C7D9FE51BC32AF64853A30D63FD61BDE42825C8AEEF51C6F9C6A0383CFF84821EECD
5,532,604 UART: [art] SIG.S = 5B2592B96FD2BEDB5B33FFB842AE4EA314D6CBA1D48E67BD841075E1324E87F57113516B8B0B1346BC42737E8082659F
5,556,411 UART: Caliptra RT
5,556,662 UART: [state] CFI Enabled
5,676,217 UART: [rt] RT listening for mailbox commands...
5,676,887 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,800,065 UART: [rt]cmd =0x41544d4e, len=14344
9,112,817 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,278 UART: [kat] SHA2-256
882,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,324 UART: [kat] ++
886,476 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,517 UART: [kat] SHA2-512-ACC
897,418 UART: [kat] ECC-384
903,363 UART: [kat] HMAC-384Kdf
908,219 UART: [kat] LMS
1,476,415 UART: [kat] --
1,477,260 UART: [cold-reset] ++
1,477,614 UART: [fht] Storing FHT @ 0x50003400
1,480,403 UART: [idev] ++
1,480,571 UART: [idev] CDI.KEYID = 6
1,480,931 UART: [idev] SUBJECT.KEYID = 7
1,481,355 UART: [idev] UDS.KEYID = 0
1,481,700 ready_for_fw is high
1,481,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,351 UART: [idev] Erasing UDS.KEYID = 0
1,505,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,371 UART: [idev] --
1,515,488 UART: [ldev] ++
1,515,656 UART: [ldev] CDI.KEYID = 6
1,516,019 UART: [ldev] SUBJECT.KEYID = 5
1,516,445 UART: [ldev] AUTHORITY.KEYID = 7
1,516,908 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,875 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 118548 bytes
5,320,129 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,347,551 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,378,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,519,024 >>> mbox cmd response: success
5,520,118 UART: [afmc] ++
5,520,286 UART: [afmc] CDI.KEYID = 6
5,520,648 UART: [afmc] SUBJECT.KEYID = 7
5,521,073 UART: [afmc] AUTHORITY.KEYID = 5
5,556,254 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,572,452 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,573,232 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,578,938 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,584,817 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,590,530 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,598,379 UART: [afmc] --
5,599,469 UART: [cold-reset] --
5,600,457 UART: [state] Locking Datavault
5,601,462 UART: [state] Locking PCR0, PCR1 and PCR31
5,602,066 UART: [state] Locking ICCM
5,602,662 UART: [exit] Launching FMC @ 0x40000130
5,607,992 UART:
5,608,008 UART: Running Caliptra FMC ...
5,608,416 UART:
5,608,559 UART: [state] CFI Enabled
5,619,583 UART: [fht] FMC Alias Private Key: 7
5,738,773 UART: [art] Extend RT PCRs Done
5,739,201 UART: [art] Lock RT PCRs Done
5,740,591 UART: [art] Populate DV Done
5,748,714 UART: [fht] FMC Alias Private Key: 7
5,749,722 UART: [art] Derive CDI
5,750,002 UART: [art] Store in slot 0x4
5,835,682 UART: [art] Derive Key Pair
5,836,042 UART: [art] Store priv key in slot 0x5
5,848,915 UART: [art] Derive Key Pair - Done
5,863,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,550 UART: [art] Erasing AUTHORITY.KEYID = 7
5,879,315 UART: [art] PUB.X = 7E5CA72F303DFE014029A56D813F9427D1F20C747F9175F0AD4F31CFAFDAAEAD1A091B7D899FBAB8550ED5AFFD447B94
5,886,095 UART: [art] PUB.Y = 0B619A1B0572BE205C13CD64DFC7D18093348F9CFD054857BFF49F4A0C76B6AB4D2A876F38959FBD0691983DA6C4CD7E
5,893,042 UART: [art] SIG.R = 243BE83FF98BA68A86F998481C77B7997A4ABCBEDC711F90758471CF8EF8903707B9F8EEEE50A83043A82D1A7205ED7E
5,899,816 UART: [art] SIG.S = 9142A383ACC97C4B39DB08373243F42A384A285956FD53EBB44175D02D8ACE3E3FBB954BD0D302B893EDF1D2C3671755
5,923,790 UART: Caliptra RT
5,924,133 UART: [state] CFI Enabled
6,044,667 UART: [rt] RT listening for mailbox commands...
6,045,337 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,168,089 UART: [rt]cmd =0x41544d4e, len=14344
9,670,653 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,562 ready_for_fw is high
1,362,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,290,868 >>> mbox cmd response: success
5,351,747 UART:
5,351,763 UART: Running Caliptra FMC ...
5,352,171 UART:
5,352,314 UART: [state] CFI Enabled
5,362,974 UART: [fht] FMC Alias Private Key: 7
5,481,716 UART: [art] Extend RT PCRs Done
5,482,144 UART: [art] Lock RT PCRs Done
5,483,518 UART: [art] Populate DV Done
5,491,717 UART: [fht] FMC Alias Private Key: 7
5,492,735 UART: [art] Derive CDI
5,493,015 UART: [art] Store in slot 0x4
5,578,779 UART: [art] Derive Key Pair
5,579,139 UART: [art] Store priv key in slot 0x5
5,592,558 UART: [art] Derive Key Pair - Done
5,607,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,622,470 UART: [art] Erasing AUTHORITY.KEYID = 7
5,623,235 UART: [art] PUB.X = 88B19267228DEC32ED76D813E8F7A7A7F7E17D2DAF37A5CF2124A4EEFFE7F22123E00B448423370F476ABD777B36344F
5,630,007 UART: [art] PUB.Y = 61B26C5E9D0D43270E75E0802F2F0D5BD893462CD26222C22DB55379E14E69DDD74EB0FB084B6AB3038DC3259EE4022D
5,636,945 UART: [art] SIG.R = F764A7904A533AAB5E48D951F8C2745F39919E55424E539FBE095653B2AFDA299A6A38559EDD7F29361FF0B1060138C4
5,643,706 UART: [art] SIG.S = FEB2F7D2FD887E5B8550F554A97ADA80F72EC2AA10465AE791F621EF550F080B5424F5D45473163232430D455A388F34
5,666,976 UART: Caliptra RT
5,667,319 UART: [state] CFI Enabled
5,787,760 UART: [rt] RT listening for mailbox commands...
5,788,430 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,911,716 UART: [rt]cmd =0x41544d4e, len=14344
9,490,334 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,731 UART: [state] WD Timer not started. Device not locked for debugging
87,952 UART: [kat] SHA2-256
891,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,606 UART: [kat] ++
895,758 UART: [kat] sha1
900,090 UART: [kat] SHA2-256
902,030 UART: [kat] SHA2-384
904,679 UART: [kat] SHA2-512-ACC
906,580 UART: [kat] ECC-384
916,451 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,066 UART: [cold-reset] ++
1,170,400 UART: [fht] FHT @ 0x50003400
1,173,142 UART: [idev] ++
1,173,310 UART: [idev] CDI.KEYID = 6
1,173,671 UART: [idev] SUBJECT.KEYID = 7
1,174,096 UART: [idev] UDS.KEYID = 0
1,174,442 ready_for_fw is high
1,174,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,227 UART: [idev] Erasing UDS.KEYID = 0
1,198,995 UART: [idev] Sha1 KeyId Algorithm
1,207,891 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,286 UART: [ldev] Erasing FE.KEYID = 1
1,241,451 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,160 UART: [ldev] --
1,280,507 UART: [fwproc] Wait for Commands...
1,281,116 UART: [fwproc] Recv command 0x46574c44
1,281,849 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,826 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,194,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,108 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,439 >>> mbox cmd response: success
3,367,495 UART: [afmc] ++
3,367,663 UART: [afmc] CDI.KEYID = 6
3,368,026 UART: [afmc] SUBJECT.KEYID = 7
3,368,452 UART: [afmc] AUTHORITY.KEYID = 5
3,404,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,408 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,157 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,864 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,741 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,451 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,201 UART: [afmc] --
3,447,080 UART: [cold-reset] --
3,447,902 UART: [state] Locking Datavault
3,448,983 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,587 UART: [state] Locking ICCM
3,450,191 UART: [exit] Launching FMC @ 0x40000130
3,455,521 UART:
3,455,537 UART: Running Caliptra FMC ...
3,455,945 UART:
3,455,999 UART: [state] CFI Enabled
3,466,491 UART: [fht] FMC Alias Private Key: 7
3,585,383 UART: [art] Extend RT PCRs Done
3,585,811 UART: [art] Lock RT PCRs Done
3,587,291 UART: [art] Populate DV Done
3,595,300 UART: [fht] FMC Alias Private Key: 7
3,596,250 UART: [art] Derive CDI
3,596,530 UART: [art] Store in slot 0x4
3,682,147 UART: [art] Derive Key Pair
3,682,507 UART: [art] Store priv key in slot 0x5
3,695,499 UART: [art] Derive Key Pair - Done
3,710,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,726,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,966 UART: [art] PUB.X = 89D29DF17F6DB5CFC2BEAA30853348CFD33560C9AEF203D95301FF62CC04EEEB9D14D814530DC152147E84BBD416F1D3
3,733,740 UART: [art] PUB.Y = 531086D4B39914616B0F101C9FBC86FD3515EF3831B6DAA61E418F3FE30CB6D284E0EE02CA308AD4F76D61B61B0557A4
3,740,686 UART: [art] SIG.R = FF21B548D3329FBE2B11EA2CDDB7DB81CE9C1B176B33F8AAD77786830C978E36574792B3C556ADF21484DB68DF49667B
3,747,465 UART: [art] SIG.S = 9072CA33DDD6E96DF622A238CD89EF15DA4DDEA84048184C0E79DFF6A6F1F20DA1A249AE152E740608EAA41436216CC1
3,771,035 UART: Caliptra RT
3,771,286 UART: [state] CFI Enabled
3,891,381 UART: [rt] RT listening for mailbox commands...
3,892,051 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,969 UART: [rt]cmd =0x41544d4e, len=14344
4,979,134 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,752 ready_for_fw is high
1,058,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,220,658 >>> mbox cmd response: success
3,282,241 UART:
3,282,257 UART: Running Caliptra FMC ...
3,282,665 UART:
3,282,719 UART: [state] CFI Enabled
3,293,085 UART: [fht] FMC Alias Private Key: 7
3,411,877 UART: [art] Extend RT PCRs Done
3,412,305 UART: [art] Lock RT PCRs Done
3,413,841 UART: [art] Populate DV Done
3,421,916 UART: [fht] FMC Alias Private Key: 7
3,422,908 UART: [art] Derive CDI
3,423,188 UART: [art] Store in slot 0x4
3,509,123 UART: [art] Derive Key Pair
3,509,483 UART: [art] Store priv key in slot 0x5
3,522,439 UART: [art] Derive Key Pair - Done
3,537,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,819 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,584 UART: [art] PUB.X = 606F32A7164F489C5FF24B864EBF4045A96A52738AA6C0D4F7EB5890A5FE4EF4D3A898EBF58BD9562E2C6758FA12ED9A
3,560,368 UART: [art] PUB.Y = A0AF58F21851C38D4BA35EEFC22C64585F05E9E1E9C91B1868EEBE242A3B9C6380342128011210C4946C2552C199A1C5
3,567,312 UART: [art] SIG.R = DBDC9722C99557CFD8F0DFCD1DB61E69030523C5E489A283DA624624C4F8445D9E005A265A6A34FB86E60F71C23BE6DB
3,574,063 UART: [art] SIG.S = 053E951DAEEA926AEB2F801FBEE1B26434FE82F50A063B8846DC37366A6B9369439D6BFD161C785E4991A590F58B6387
3,597,388 UART: Caliptra RT
3,597,639 UART: [state] CFI Enabled
3,718,141 UART: [rt] RT listening for mailbox commands...
3,718,811 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,619 UART: [rt]cmd =0x41544d4e, len=14344
4,798,173 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,175 UART: [state] LifecycleState = Unprovisioned
85,830 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,753 UART: [kat] SHA2-256
901,693 UART: [kat] SHA2-384
904,402 UART: [kat] SHA2-512-ACC
906,303 UART: [kat] ECC-384
915,680 UART: [kat] HMAC-384Kdf
920,144 UART: [kat] LMS
1,168,456 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,069 UART: [fht] FHT @ 0x50003400
1,172,677 UART: [idev] ++
1,172,845 UART: [idev] CDI.KEYID = 6
1,173,206 UART: [idev] SUBJECT.KEYID = 7
1,173,631 UART: [idev] UDS.KEYID = 0
1,173,977 ready_for_fw is high
1,173,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,566 UART: [idev] Erasing UDS.KEYID = 0
1,198,516 UART: [idev] Sha1 KeyId Algorithm
1,207,442 UART: [idev] --
1,208,635 UART: [ldev] ++
1,208,803 UART: [ldev] CDI.KEYID = 6
1,209,167 UART: [ldev] SUBJECT.KEYID = 5
1,209,594 UART: [ldev] AUTHORITY.KEYID = 7
1,210,057 UART: [ldev] FE.KEYID = 1
1,215,409 UART: [ldev] Erasing FE.KEYID = 1
1,242,280 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,069 UART: [ldev] --
1,281,374 UART: [fwproc] Wait for Commands...
1,281,977 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,590 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,765 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,966 >>> mbox cmd response: success
3,376,006 UART: [afmc] ++
3,376,174 UART: [afmc] CDI.KEYID = 6
3,376,537 UART: [afmc] SUBJECT.KEYID = 7
3,376,963 UART: [afmc] AUTHORITY.KEYID = 5
3,411,826 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,501 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,250 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,434,957 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,440,834 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,544 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,202 UART: [afmc] --
3,455,103 UART: [cold-reset] --
3,455,963 UART: [state] Locking Datavault
3,457,198 UART: [state] Locking PCR0, PCR1 and PCR31
3,457,802 UART: [state] Locking ICCM
3,458,330 UART: [exit] Launching FMC @ 0x40000130
3,463,660 UART:
3,463,676 UART: Running Caliptra FMC ...
3,464,084 UART:
3,464,227 UART: [state] CFI Enabled
3,474,783 UART: [fht] FMC Alias Private Key: 7
3,593,457 UART: [art] Extend RT PCRs Done
3,593,885 UART: [art] Lock RT PCRs Done
3,595,635 UART: [art] Populate DV Done
3,603,970 UART: [fht] FMC Alias Private Key: 7
3,604,918 UART: [art] Derive CDI
3,605,198 UART: [art] Store in slot 0x4
3,691,377 UART: [art] Derive Key Pair
3,691,737 UART: [art] Store priv key in slot 0x5
3,704,581 UART: [art] Derive Key Pair - Done
3,719,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,584 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,349 UART: [art] PUB.X = EF043B51B842630F91E70D88D1EBB7E901B8A1BE72725CFE5CD01E5C7CCB456E03EE6937DC950A031A7D50353B28F18D
3,742,110 UART: [art] PUB.Y = 962707E534DEE2FE222FA02636E6064EF55E6C458D94375622C8ED973F34DC95E635CA83526D07C6C805AEA726E86BCD
3,749,052 UART: [art] SIG.R = D2ADDC4E2559439A60B41290EFC17B2D5C2CC6039B0A53E67A6C536A6BAD294C646929DDC92A524180870E267B28108B
3,755,817 UART: [art] SIG.S = 7DF04A1440B4626AEAEEEB60E4937E43508B213B2CBF4CA79F688A9409BFC7C238CB3BF0A8385BA344D30ED1C1B5A70A
3,779,484 UART: Caliptra RT
3,779,827 UART: [state] CFI Enabled
3,900,237 UART: [rt] RT listening for mailbox commands...
3,900,907 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,073 UART: [rt]cmd =0x41544d4e, len=14344
4,980,423 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 ready_for_fw is high
1,060,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,979 >>> mbox cmd response: success
3,285,286 UART:
3,285,302 UART: Running Caliptra FMC ...
3,285,710 UART:
3,285,853 UART: [state] CFI Enabled
3,296,717 UART: [fht] FMC Alias Private Key: 7
3,415,739 UART: [art] Extend RT PCRs Done
3,416,167 UART: [art] Lock RT PCRs Done
3,417,487 UART: [art] Populate DV Done
3,425,934 UART: [fht] FMC Alias Private Key: 7
3,427,112 UART: [art] Derive CDI
3,427,392 UART: [art] Store in slot 0x4
3,513,437 UART: [art] Derive Key Pair
3,513,797 UART: [art] Store priv key in slot 0x5
3,526,851 UART: [art] Derive Key Pair - Done
3,541,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,493 UART: [art] PUB.X = A4BC3497F4F0CFD46FF69827CEE438026B96CB810D4BE2EA2888F042D84930AAF0C3D5667DC560D6722342707790F1C6
3,565,261 UART: [art] PUB.Y = E9992F3B2DA0BE5AB84B9CBAD1BEB0182B32D97FEAE09DAB320F18CA3AFD335EB136BBDE8F16C107C0E0577DD4548FA6
3,572,235 UART: [art] SIG.R = EE2B54AE56E48B5103A5CBF992EA4B92F588B93C250D68E480F0DB5BF9A777AAF6140DA3FDF5A8E545864E3162F89ED3
3,579,012 UART: [art] SIG.S = 54D336F5F2C0772536D0E371E79E9C2DCFF375319BB80473FA6A78711F601475CA3021D2C4BB6EBDA216C82B09F9208B
3,602,296 UART: Caliptra RT
3,602,639 UART: [state] CFI Enabled
3,723,271 UART: [rt] RT listening for mailbox commands...
3,723,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,153 UART: [rt]cmd =0x41544d4e, len=14344
4,800,756 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
86,047 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,088 UART: [kat] SHA2-512-ACC
907,989 UART: [kat] ECC-384
917,574 UART: [kat] HMAC-384Kdf
922,158 UART: [kat] LMS
1,170,486 UART: [kat] --
1,171,451 UART: [cold-reset] ++
1,171,833 UART: [fht] FHT @ 0x50003400
1,174,660 UART: [idev] ++
1,174,828 UART: [idev] CDI.KEYID = 6
1,175,188 UART: [idev] SUBJECT.KEYID = 7
1,175,612 UART: [idev] UDS.KEYID = 0
1,175,957 ready_for_fw is high
1,175,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,396 UART: [idev] Erasing UDS.KEYID = 0
1,200,433 UART: [idev] Sha1 KeyId Algorithm
1,209,011 UART: [idev] --
1,210,027 UART: [ldev] ++
1,210,195 UART: [ldev] CDI.KEYID = 6
1,210,558 UART: [ldev] SUBJECT.KEYID = 5
1,210,984 UART: [ldev] AUTHORITY.KEYID = 7
1,211,447 UART: [ldev] FE.KEYID = 1
1,217,061 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,066 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,669 UART: [ldev] --
1,282,158 UART: [fwproc] Wait for Commands...
1,282,964 UART: [fwproc] Recv command 0x46574c44
1,283,692 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,187 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,542 >>> mbox cmd response: success
3,374,768 UART: [afmc] ++
3,374,936 UART: [afmc] CDI.KEYID = 6
3,375,298 UART: [afmc] SUBJECT.KEYID = 7
3,375,723 UART: [afmc] AUTHORITY.KEYID = 5
3,410,984 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,933 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,639 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,518 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,228 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,031 UART: [afmc] --
3,454,143 UART: [cold-reset] --
3,454,897 UART: [state] Locking Datavault
3,455,860 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,464 UART: [state] Locking ICCM
3,456,906 UART: [exit] Launching FMC @ 0x40000130
3,462,236 UART:
3,462,252 UART: Running Caliptra FMC ...
3,462,660 UART:
3,462,714 UART: [state] CFI Enabled
3,473,322 UART: [fht] FMC Alias Private Key: 7
3,592,612 UART: [art] Extend RT PCRs Done
3,593,040 UART: [art] Lock RT PCRs Done
3,594,898 UART: [art] Populate DV Done
3,603,317 UART: [fht] FMC Alias Private Key: 7
3,604,351 UART: [art] Derive CDI
3,604,631 UART: [art] Store in slot 0x4
3,690,506 UART: [art] Derive Key Pair
3,690,866 UART: [art] Store priv key in slot 0x5
3,704,350 UART: [art] Derive Key Pair - Done
3,719,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,794 UART: [art] PUB.X = B9CD6A9726B3F1DDB9FA798BE1ECC3981D0443165354711CCA17C54A34E03A18DE54AFE1F94E499C6C7C89876227C683
3,742,569 UART: [art] PUB.Y = F5BC40CCBFD4B7935BBE9E2430563E7EE8B60DB33A2B3C64DD05510156C088189868D979E4EBD726B1343DD57433B7A7
3,749,518 UART: [art] SIG.R = 34B254485D7634FFD48C7243246646A7A3651AF2EC61C6438F3EB9B93D3F4658277CC5BB66ECAF71F025B158679B419D
3,756,288 UART: [art] SIG.S = F49D88449FEA5071165782A9927CCE57E9F2853F63FE24B343FF07D63F702AA6F27DBD33C428015DABA9602D8C2CD9F7
3,780,420 UART: Caliptra RT
3,780,671 UART: [state] CFI Enabled
3,901,893 UART: [rt] RT listening for mailbox commands...
3,902,563 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,589 UART: [rt]cmd =0x41544d4e, len=14344
4,984,848 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,057 ready_for_fw is high
1,060,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,869 >>> mbox cmd response: success
3,287,008 UART:
3,287,024 UART: Running Caliptra FMC ...
3,287,432 UART:
3,287,486 UART: [state] CFI Enabled
3,297,530 UART: [fht] FMC Alias Private Key: 7
3,416,416 UART: [art] Extend RT PCRs Done
3,416,844 UART: [art] Lock RT PCRs Done
3,418,678 UART: [art] Populate DV Done
3,426,819 UART: [fht] FMC Alias Private Key: 7
3,427,831 UART: [art] Derive CDI
3,428,111 UART: [art] Store in slot 0x4
3,514,302 UART: [art] Derive Key Pair
3,514,662 UART: [art] Store priv key in slot 0x5
3,528,426 UART: [art] Derive Key Pair - Done
3,543,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,403 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,168 UART: [art] PUB.X = EC1B74A3EF11DA5A6A971DC6997E952510793C680AD6B7EC85F6E561E9822F8C7B09FAAB3D724D54E6A92754E147D47A
3,565,942 UART: [art] PUB.Y = 03AC582FAB46568C5614BE3F38D14A7DBDAC1FB7D055897BB9A7E86CEC5BC3E606562BF3A0DB7C57EDDC9E45BB87413F
3,572,910 UART: [art] SIG.R = AB6472621E0B319BD9063AC420059C90987B5F2F42DFEDABF1F98630246FF4DB6EC10ADA79952FB28C2FC78890E2F04F
3,579,680 UART: [art] SIG.S = B7CD087BF8CB10EAF195A21C0FC19AB79366F9833053514E9BE0EE288988FE3B42D50424817648752760EA416092D534
3,603,257 UART: Caliptra RT
3,603,508 UART: [state] CFI Enabled
3,724,099 UART: [rt] RT listening for mailbox commands...
3,724,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,817 UART: [rt]cmd =0x41544d4e, len=14344
4,799,383 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
893,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,302 UART: [kat] ++
897,454 UART: [kat] sha1
901,642 UART: [kat] SHA2-256
903,582 UART: [kat] SHA2-384
906,459 UART: [kat] SHA2-512-ACC
908,360 UART: [kat] ECC-384
917,967 UART: [kat] HMAC-384Kdf
922,503 UART: [kat] LMS
1,170,831 UART: [kat] --
1,171,984 UART: [cold-reset] ++
1,172,350 UART: [fht] FHT @ 0x50003400
1,175,055 UART: [idev] ++
1,175,223 UART: [idev] CDI.KEYID = 6
1,175,583 UART: [idev] SUBJECT.KEYID = 7
1,176,007 UART: [idev] UDS.KEYID = 0
1,176,352 ready_for_fw is high
1,176,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,803 UART: [idev] Erasing UDS.KEYID = 0
1,201,044 UART: [idev] Sha1 KeyId Algorithm
1,209,628 UART: [idev] --
1,210,796 UART: [ldev] ++
1,210,964 UART: [ldev] CDI.KEYID = 6
1,211,327 UART: [ldev] SUBJECT.KEYID = 5
1,211,753 UART: [ldev] AUTHORITY.KEYID = 7
1,212,216 UART: [ldev] FE.KEYID = 1
1,217,636 UART: [ldev] Erasing FE.KEYID = 1
1,244,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,310 UART: [ldev] --
1,283,677 UART: [fwproc] Wait for Commands...
1,284,421 UART: [fwproc] Recv command 0x46574c44
1,285,149 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,353 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,524 >>> mbox cmd response: success
3,369,736 UART: [afmc] ++
3,369,904 UART: [afmc] CDI.KEYID = 6
3,370,266 UART: [afmc] SUBJECT.KEYID = 7
3,370,691 UART: [afmc] AUTHORITY.KEYID = 5
3,407,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,424,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,839 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,545 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,424 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,442,134 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,005 UART: [afmc] --
3,450,949 UART: [cold-reset] --
3,451,817 UART: [state] Locking Datavault
3,452,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,576 UART: [state] Locking ICCM
3,454,010 UART: [exit] Launching FMC @ 0x40000130
3,459,340 UART:
3,459,356 UART: Running Caliptra FMC ...
3,459,764 UART:
3,459,907 UART: [state] CFI Enabled
3,470,857 UART: [fht] FMC Alias Private Key: 7
3,589,513 UART: [art] Extend RT PCRs Done
3,589,941 UART: [art] Lock RT PCRs Done
3,591,439 UART: [art] Populate DV Done
3,599,718 UART: [fht] FMC Alias Private Key: 7
3,600,736 UART: [art] Derive CDI
3,601,016 UART: [art] Store in slot 0x4
3,686,987 UART: [art] Derive Key Pair
3,687,347 UART: [art] Store priv key in slot 0x5
3,700,729 UART: [art] Derive Key Pair - Done
3,715,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,730,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,731,691 UART: [art] PUB.X = 131A0207C071D46183E6DEDE1854718510F36B090EE75FD88497059E702787E5DE25AA91A02DD8474F9FB5CD01F8C9C6
3,738,443 UART: [art] PUB.Y = 6F3F873D08F6A9C322F3DD8E2EC05A89760743968AD3845CE88A28DDF6CE5D861FE64618E1081F3BD446076D7CD5B59C
3,745,389 UART: [art] SIG.R = 38F713AD4B54EC47272AC70132BAA3A99D59C529B1440FB514F6BEF841F0DB77E51EDFBE445D6DD447503DFC32720611
3,752,160 UART: [art] SIG.S = 7836A1EC27631AB4B56A2486CF2C1C2E8A939B9B8CA76FAC322D7AA41CF717B165CEFD828E1061C3AA850EA8EC327B36
3,775,445 UART: Caliptra RT
3,775,788 UART: [state] CFI Enabled
3,895,472 UART: [rt] RT listening for mailbox commands...
3,896,142 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,168 UART: [rt]cmd =0x41544d4e, len=14344
4,976,128 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,890 ready_for_fw is high
1,060,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,476 >>> mbox cmd response: success
3,284,407 UART:
3,284,423 UART: Running Caliptra FMC ...
3,284,831 UART:
3,284,974 UART: [state] CFI Enabled
3,295,272 UART: [fht] FMC Alias Private Key: 7
3,414,296 UART: [art] Extend RT PCRs Done
3,414,724 UART: [art] Lock RT PCRs Done
3,416,168 UART: [art] Populate DV Done
3,424,361 UART: [fht] FMC Alias Private Key: 7
3,425,417 UART: [art] Derive CDI
3,425,697 UART: [art] Store in slot 0x4
3,511,634 UART: [art] Derive Key Pair
3,511,994 UART: [art] Store priv key in slot 0x5
3,525,230 UART: [art] Derive Key Pair - Done
3,540,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,555,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,196 UART: [art] PUB.X = 53113A8E7EF6628A7B283C85B6AA1756B7F79735FC445FFEF9F9796D7BBDC236C1B6ADC1200DF8B5C74404C8724B7369
3,562,968 UART: [art] PUB.Y = 28042F135829C3B0EB213C956D3BFBA6777849C59D32C346E20D78A20E37465BF698F4355ABC6A639E2DC857F255139B
3,569,907 UART: [art] SIG.R = 9170550E7BF27C6E448634AAF546AF162A55003CB67043D1F5BBF4E9BB755BCA5EC2059F38A0F34D2A4D75A1538EB002
3,576,654 UART: [art] SIG.S = 72E368BE7EDF814D2B7A95855537FC75DF481495B69458E9845946B9D5285EE6F7126E08E2FCE4F2FF7BA8348E5436D8
3,600,271 UART: Caliptra RT
3,600,614 UART: [state] CFI Enabled
3,720,164 UART: [rt] RT listening for mailbox commands...
3,720,834 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,844,024 UART: [rt]cmd =0x41544d4e, len=14344
4,792,899 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,204 UART:
192,568 UART: Running Caliptra ROM ...
193,760 UART:
193,913 UART: [state] CFI Enabled
265,536 UART: [state] LifecycleState = Unprovisioned
267,444 UART: [state] DebugLocked = No
270,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,609 UART: [kat] SHA2-256
445,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,852 UART: [kat] ++
456,302 UART: [kat] sha1
467,036 UART: [kat] SHA2-256
469,702 UART: [kat] SHA2-384
476,548 UART: [kat] SHA2-512-ACC
478,917 UART: [kat] ECC-384
2,767,366 UART: [kat] HMAC-384Kdf
2,800,630 UART: [kat] LMS
3,990,928 UART: [kat] --
3,994,227 UART: [cold-reset] ++
3,996,727 UART: [fht] Storing FHT @ 0x50003400
4,008,774 UART: [idev] ++
4,009,343 UART: [idev] CDI.KEYID = 6
4,010,383 UART: [idev] SUBJECT.KEYID = 7
4,011,560 UART: [idev] UDS.KEYID = 0
4,012,631 ready_for_fw is high
4,012,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,903 UART: [idev] Erasing UDS.KEYID = 0
7,345,620 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,498 UART: [idev] --
7,372,760 UART: [ldev] ++
7,373,333 UART: [ldev] CDI.KEYID = 6
7,374,346 UART: [ldev] SUBJECT.KEYID = 5
7,375,505 UART: [ldev] AUTHORITY.KEYID = 7
7,376,806 UART: [ldev] FE.KEYID = 1
7,421,729 UART: [ldev] Erasing FE.KEYID = 1
10,753,461 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,295 UART: [ldev] --
13,115,746 UART: [fwproc] Waiting for Commands...
13,118,925 UART: [fwproc] Received command 0x46574c44
13,121,104 UART: [fwproc] Received Image of size 118548 bytes
17,226,186 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,305,174 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,378,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,989 >>> mbox cmd response: success
17,711,406 UART: [afmc] ++
17,712,049 UART: [afmc] CDI.KEYID = 6
17,712,975 UART: [afmc] SUBJECT.KEYID = 7
17,714,195 UART: [afmc] AUTHORITY.KEYID = 5
21,069,143 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,606 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,851 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,262 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,028 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,442 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,972 UART: [afmc] --
23,440,971 UART: [cold-reset] --
23,444,832 UART: [state] Locking Datavault
23,449,104 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,858 UART: [state] Locking ICCM
23,452,997 UART: [exit] Launching FMC @ 0x40000130
23,461,393 UART:
23,461,659 UART: Running Caliptra FMC ...
23,462,764 UART:
23,462,923 UART: [state] CFI Enabled
23,528,540 UART: [fht] FMC Alias Private Key: 7
25,890,512 UART: [art] Extend RT PCRs Done
25,891,728 UART: [art] Lock RT PCRs Done
25,893,458 UART: [art] Populate DV Done
25,899,083 UART: [fht] FMC Alias Private Key: 7
25,900,516 UART: [art] Derive CDI
25,901,281 UART: [art] Store in slot 0x4
25,957,792 UART: [art] Derive Key Pair
25,958,836 UART: [art] Store priv key in slot 0x5
29,251,541 UART: [art] Derive Key Pair - Done
29,264,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,215 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,727 UART: [art] PUB.X = DD69B38D9708946E6907B1A03F371141823EB139037E3037A070AC3DBBDB475D09311BB4453043139CF4A794FD133544
31,562,023 UART: [art] PUB.Y = 103876997C83598B48C862825EDAEF03C2BC3B90818C23D5EAD13251543194BA79B136A1B9194C7490B01F753E1BA2DA
31,569,212 UART: [art] SIG.R = A720A0270FBB2B75E5D3FA62DA8F1D3E92C7ED3495585AFE99DDCD0714278BDA8EC2495B2E1F8DDCF5B39EE13354986B
31,576,665 UART: [art] SIG.S = F446069B1B64408324B6908A8271D330730735C821D12DA0313340885C250C9BD3005FD7219D92284679C77B44D3E20B
32,882,013 UART: Caliptra RT
32,882,730 UART: [state] CFI Enabled
33,059,080 UART: [rt] RT listening for mailbox commands...
33,061,411 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,217,114 UART: [rt]cmd =0x41544d4e, len=14344
38,518,021 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
3,803,883 ready_for_fw is high
3,804,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,681 >>> mbox cmd response: success
23,672,836 UART:
23,673,215 UART: Running Caliptra FMC ...
23,674,417 UART:
23,674,584 UART: [state] CFI Enabled
23,742,974 UART: [fht] FMC Alias Private Key: 7
26,083,253 UART: [art] Extend RT PCRs Done
26,084,480 UART: [art] Lock RT PCRs Done
26,085,836 UART: [art] Populate DV Done
26,091,350 UART: [fht] FMC Alias Private Key: 7
26,092,952 UART: [art] Derive CDI
26,093,790 UART: [art] Store in slot 0x4
26,151,542 UART: [art] Derive Key Pair
26,152,578 UART: [art] Store priv key in slot 0x5
29,445,447 UART: [art] Derive Key Pair - Done
29,458,127 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,748,230 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,738 UART: [art] PUB.X = 95245A0D0F86159B94E96255BD773E9CB09CCC0996D5DC6F8F8B8A230D100F7923339B8EB151A3D76A69DC103B9091CC
31,757,099 UART: [art] PUB.Y = 2E1740F241D8CFF8DA50DAB08C88D8A5415859186AD6301340D0D7D45127B609FE503C343962D8E2C780754109B745BD
31,764,223 UART: [art] SIG.R = 543BF4D5CFAAFBD4CEBBE26458CE0491B667BCD419AE71EB33A370C82B06C661998005404D6201D80CBE4FAB6BE0340F
31,771,676 UART: [art] SIG.S = 0ADC23C3AB660717880A118421251320A1B61C3ED340FBD8E3C5E3CCD2D0AC2BC29ADD0D0A58D766CAB1AE8B42983FFF
33,077,083 UART: Caliptra RT
33,077,797 UART: [state] CFI Enabled
33,254,249 UART: [rt] RT listening for mailbox commands...
33,256,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,412,045 UART: [rt]cmd =0x41544d4e, len=14344
38,712,643 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,435 UART:
192,798 UART: Running Caliptra ROM ...
193,911 UART:
603,471 UART: [state] CFI Enabled
615,329 UART: [state] LifecycleState = Unprovisioned
617,311 UART: [state] DebugLocked = No
620,061 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,729 UART: [kat] SHA2-256
794,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,042 UART: [kat] ++
805,505 UART: [kat] sha1
816,303 UART: [kat] SHA2-256
819,020 UART: [kat] SHA2-384
825,500 UART: [kat] SHA2-512-ACC
827,862 UART: [kat] ECC-384
3,114,242 UART: [kat] HMAC-384Kdf
3,127,042 UART: [kat] LMS
4,317,111 UART: [kat] --
4,320,189 UART: [cold-reset] ++
4,322,329 UART: [fht] Storing FHT @ 0x50003400
4,332,668 UART: [idev] ++
4,333,220 UART: [idev] CDI.KEYID = 6
4,334,243 UART: [idev] SUBJECT.KEYID = 7
4,335,428 UART: [idev] UDS.KEYID = 0
4,336,490 ready_for_fw is high
4,336,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,528 UART: [idev] Erasing UDS.KEYID = 0
7,619,026 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,590 UART: [idev] --
7,643,148 UART: [ldev] ++
7,643,715 UART: [ldev] CDI.KEYID = 6
7,644,644 UART: [ldev] SUBJECT.KEYID = 5
7,645,900 UART: [ldev] AUTHORITY.KEYID = 7
7,647,103 UART: [ldev] FE.KEYID = 1
7,656,583 UART: [ldev] Erasing FE.KEYID = 1
10,944,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,795 UART: [ldev] --
13,304,106 UART: [fwproc] Waiting for Commands...
13,306,948 UART: [fwproc] Received command 0x46574c44
13,309,123 UART: [fwproc] Received Image of size 118548 bytes
17,414,556 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,488,145 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,561,321 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,889,003 >>> mbox cmd response: success
17,893,566 UART: [afmc] ++
17,894,202 UART: [afmc] CDI.KEYID = 6
17,895,089 UART: [afmc] SUBJECT.KEYID = 7
17,896,306 UART: [afmc] AUTHORITY.KEYID = 5
21,207,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,503,702 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,505,962 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,520,395 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,535,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,549,521 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,571,091 UART: [afmc] --
23,575,105 UART: [cold-reset] --
23,579,302 UART: [state] Locking Datavault
23,583,143 UART: [state] Locking PCR0, PCR1 and PCR31
23,584,892 UART: [state] Locking ICCM
23,587,013 UART: [exit] Launching FMC @ 0x40000130
23,595,404 UART:
23,595,634 UART: Running Caliptra FMC ...
23,596,725 UART:
23,596,878 UART: [state] CFI Enabled
23,604,968 UART: [fht] FMC Alias Private Key: 7
25,944,296 UART: [art] Extend RT PCRs Done
25,945,522 UART: [art] Lock RT PCRs Done
25,947,163 UART: [art] Populate DV Done
25,952,469 UART: [fht] FMC Alias Private Key: 7
25,954,058 UART: [art] Derive CDI
25,954,869 UART: [art] Store in slot 0x4
25,997,139 UART: [art] Derive Key Pair
25,998,177 UART: [art] Store priv key in slot 0x5
29,240,346 UART: [art] Derive Key Pair - Done
29,253,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,581 UART: [art] Erasing AUTHORITY.KEYID = 7
31,535,086 UART: [art] PUB.X = AC7DF635DD7BB64112B1604DCE5FFFF1D908FDD825F2216B0109E0A5736C8E359865C3778C49F659229EA542A0CB7792
31,542,326 UART: [art] PUB.Y = E6B3653B9C9EA3FA2B89B8E69037CF74F5C3DE7B8B176827607625B0233B1B2379294B33F1066135EC4000C589F82AAB
31,549,551 UART: [art] SIG.R = 2C16784A554EF1ECAEE00BC157B7C180AAF0CB32277C85FCC79819928BBB833AD39B9BE784028D95B13D891B7F4D8F54
31,556,990 UART: [art] SIG.S = 65458F3BAB8DB5842342CED74D4E866C693F0B0B410488607867FD635442923F39DD8AA91C35FC09827F5D9A7B656332
32,861,865 UART: Caliptra RT
32,862,569 UART: [state] CFI Enabled
32,996,540 UART: [rt] RT listening for mailbox commands...
32,998,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,154,230 UART: [rt]cmd =0x41544d4e, len=14344
38,455,203 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
4,126,884 ready_for_fw is high
4,127,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,173,085 >>> mbox cmd response: success
23,810,695 UART:
23,811,073 UART: Running Caliptra FMC ...
23,812,200 UART:
23,812,361 UART: [state] CFI Enabled
23,819,819 UART: [fht] FMC Alias Private Key: 7
26,160,093 UART: [art] Extend RT PCRs Done
26,161,318 UART: [art] Lock RT PCRs Done
26,163,209 UART: [art] Populate DV Done
26,168,724 UART: [fht] FMC Alias Private Key: 7
26,170,262 UART: [art] Derive CDI
26,171,069 UART: [art] Store in slot 0x4
26,213,898 UART: [art] Derive Key Pair
26,214,941 UART: [art] Store priv key in slot 0x5
29,456,763 UART: [art] Derive Key Pair - Done
29,469,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,236 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,744 UART: [art] PUB.X = 59359986F6354F351965031B203B2F396D2EACDD0BFEEDDE104C461E2BA593F77586792F78800B639802B43841C33229
31,758,935 UART: [art] PUB.Y = BE457D0FBE7D1E3E2974B53E0A362C3B6D33F121AA75D6FDCE129212F712733803932B4D1367FC3F4F32DFE001062A5F
31,766,196 UART: [art] SIG.R = 6D952D223C6633EF94F9D1774C5C0D220BBFA5807ACCDA9CEEB42EA72E943757A6929B22183AFA487EECB8C768E09085
31,773,648 UART: [art] SIG.S = 6B84511E6EE02D4CE3C00BCF39DC9FFE0B7981BB8914812CA4CCDF036C20FD06B88872F530EE549A9C2762E54A14E66E
33,078,251 UART: Caliptra RT
33,078,989 UART: [state] CFI Enabled
33,212,877 UART: [rt] RT listening for mailbox commands...
33,215,353 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,370,455 UART: [rt]cmd =0x41544d4e, len=14344
38,671,033 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,057 UART:
192,418 UART: Running Caliptra ROM ...
193,616 UART:
193,766 UART: [state] CFI Enabled
263,880 UART: [state] LifecycleState = Unprovisioned
265,858 UART: [state] DebugLocked = No
267,882 UART: [state] WD Timer not started. Device not locked for debugging
271,059 UART: [kat] SHA2-256
450,671 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,485 UART: [kat] ++
462,010 UART: [kat] sha1
472,391 UART: [kat] SHA2-256
475,028 UART: [kat] SHA2-384
479,590 UART: [kat] SHA2-512-ACC
481,956 UART: [kat] ECC-384
2,923,905 UART: [kat] HMAC-384Kdf
2,950,580 UART: [kat] LMS
3,427,059 UART: [kat] --
3,429,567 UART: [cold-reset] ++
3,431,916 UART: [fht] FHT @ 0x50003400
3,443,759 UART: [idev] ++
3,444,323 UART: [idev] CDI.KEYID = 6
3,445,301 UART: [idev] SUBJECT.KEYID = 7
3,446,544 UART: [idev] UDS.KEYID = 0
3,447,468 ready_for_fw is high
3,447,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,831 UART: [idev] Erasing UDS.KEYID = 0
5,965,784 UART: [idev] Sha1 KeyId Algorithm
5,989,722 UART: [idev] --
5,994,529 UART: [ldev] ++
5,995,098 UART: [ldev] CDI.KEYID = 6
5,996,039 UART: [ldev] SUBJECT.KEYID = 5
5,997,250 UART: [ldev] AUTHORITY.KEYID = 7
5,998,478 UART: [ldev] FE.KEYID = 1
6,036,714 UART: [ldev] Erasing FE.KEYID = 1
8,544,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,161 UART: [ldev] --
10,354,301 UART: [fwproc] Wait for Commands...
10,356,181 UART: [fwproc] Recv command 0x46574c44
10,358,161 UART: [fwproc] Recv'd Img size: 118548 bytes
13,836,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,916,714 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,989,730 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,317,219 >>> mbox cmd response: success
14,321,826 UART: [afmc] ++
14,322,421 UART: [afmc] CDI.KEYID = 6
14,323,384 UART: [afmc] SUBJECT.KEYID = 7
14,324,597 UART: [afmc] AUTHORITY.KEYID = 5
16,849,789 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,575,220 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,577,401 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,593,218 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,609,266 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,624,815 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,649,312 UART: [afmc] --
18,653,711 UART: [cold-reset] --
18,656,862 UART: [state] Locking Datavault
18,662,385 UART: [state] Locking PCR0, PCR1 and PCR31
18,664,181 UART: [state] Locking ICCM
18,665,635 UART: [exit] Launching FMC @ 0x40000130
18,674,031 UART:
18,674,265 UART: Running Caliptra FMC ...
18,675,366 UART:
18,675,526 UART: [state] CFI Enabled
18,732,102 UART: [fht] FMC Alias Private Key: 7
20,498,745 UART: [art] Extend RT PCRs Done
20,500,096 UART: [art] Lock RT PCRs Done
20,501,620 UART: [art] Populate DV Done
20,507,079 UART: [fht] FMC Alias Private Key: 7
20,508,786 UART: [art] Derive CDI
20,509,598 UART: [art] Store in slot 0x4
20,564,803 UART: [art] Derive Key Pair
20,565,849 UART: [art] Store priv key in slot 0x5
23,028,665 UART: [art] Derive Key Pair - Done
23,041,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,754,143 UART: [art] Erasing AUTHORITY.KEYID = 7
24,755,658 UART: [art] PUB.X = 466CB9B81FA38370626C5CC5DF32CE9ACB8CF02A60967D367884D1503F7AC8F2ED0EA868B26371E3A83527E957257A0D
24,762,920 UART: [art] PUB.Y = 35547EB49513C428625FB6CD67807E6B6061493B7C3A466967C979F6D6ADECB2B41A421774050C18C63BCC963090D2A7
24,770,149 UART: [art] SIG.R = 3F6EC6E7E28C30AC5506964E29A459F232E35CCD2B45E0FBFCB41D23E75A35D455CC297A76F05307C00AC9F4026AD5E2
24,777,539 UART: [art] SIG.S = 0B25A3B1209062B7C21D9CEF47D44EECF35FE421F5CDBC419F5FD315B2BDD1B34AB28C3DB465EDBB5A23D4BD97033B92
25,756,151 UART: Caliptra RT
25,756,844 UART: [state] CFI Enabled
25,937,553 UART: [rt] RT listening for mailbox commands...
25,940,021 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,095,188 UART: [rt]cmd =0x41544d4e, len=14344
30,090,577 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,463,087 ready_for_fw is high
3,463,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,310 >>> mbox cmd response: success
18,529,868 UART:
18,530,294 UART: Running Caliptra FMC ...
18,531,437 UART:
18,531,594 UART: [state] CFI Enabled
18,601,475 UART: [fht] FMC Alias Private Key: 7
20,367,995 UART: [art] Extend RT PCRs Done
20,369,255 UART: [art] Lock RT PCRs Done
20,370,472 UART: [art] Populate DV Done
20,375,719 UART: [fht] FMC Alias Private Key: 7
20,377,324 UART: [art] Derive CDI
20,378,136 UART: [art] Store in slot 0x4
20,434,312 UART: [art] Derive Key Pair
20,435,349 UART: [art] Store priv key in slot 0x5
22,898,167 UART: [art] Derive Key Pair - Done
22,911,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,323 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,834 UART: [art] PUB.X = 2D917DD0E32C5398F3E37C58CEE3018BC240638372B44461B756A4B0F1CE0759891E432F334B443F03CFC360786D7CD6
24,632,093 UART: [art] PUB.Y = F68B3E22FA9DE86D4F3C4D287A131E42DDFC9681D18FB1FAF910217F36A5E29688FA8CC762972641A49F2941B398C79E
24,639,355 UART: [art] SIG.R = EAADC098F475CCAAA7F16FCC9C51A25D3409C15A60F7DEEB4491958FC1770851CA0D4F512492F8840865016781B230AB
24,646,700 UART: [art] SIG.S = B6F90318E7841F12ABC288BB0A216A2F8CD4D323E968E1A68B8EE286191EB01562275741A5B90774C22051FD2A425988
25,625,284 UART: Caliptra RT
25,625,990 UART: [state] CFI Enabled
25,806,496 UART: [rt] RT listening for mailbox commands...
25,808,825 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,964,107 UART: [rt]cmd =0x41544d4e, len=14344
29,959,948 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,665 writing to cptra_bootfsm_go
193,833 UART:
194,186 UART: Running Caliptra ROM ...
195,319 UART:
605,062 UART: [state] CFI Enabled
619,588 UART: [state] LifecycleState = Unprovisioned
621,541 UART: [state] DebugLocked = No
622,916 UART: [state] WD Timer not started. Device not locked for debugging
626,451 UART: [kat] SHA2-256
806,097 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,846 UART: [kat] ++
817,377 UART: [kat] sha1
828,393 UART: [kat] SHA2-256
831,118 UART: [kat] SHA2-384
837,331 UART: [kat] SHA2-512-ACC
839,703 UART: [kat] ECC-384
3,282,366 UART: [kat] HMAC-384Kdf
3,295,659 UART: [kat] LMS
3,772,124 UART: [kat] --
3,775,393 UART: [cold-reset] ++
3,776,625 UART: [fht] FHT @ 0x50003400
3,788,314 UART: [idev] ++
3,788,891 UART: [idev] CDI.KEYID = 6
3,789,816 UART: [idev] SUBJECT.KEYID = 7
3,791,063 UART: [idev] UDS.KEYID = 0
3,791,994 ready_for_fw is high
3,792,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,120 UART: [idev] Erasing UDS.KEYID = 0
6,273,523 UART: [idev] Sha1 KeyId Algorithm
6,296,751 UART: [idev] --
6,301,507 UART: [ldev] ++
6,302,149 UART: [ldev] CDI.KEYID = 6
6,303,063 UART: [ldev] SUBJECT.KEYID = 5
6,304,233 UART: [ldev] AUTHORITY.KEYID = 7
6,305,481 UART: [ldev] FE.KEYID = 1
6,315,723 UART: [ldev] Erasing FE.KEYID = 1
8,795,077 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,531,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,901 UART: [ldev] --
10,589,799 UART: [fwproc] Wait for Commands...
10,591,734 UART: [fwproc] Recv command 0x46574c44
10,593,726 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,953 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,952 >>> mbox cmd response: success
14,553,869 UART: [afmc] ++
14,554,464 UART: [afmc] CDI.KEYID = 6
14,555,399 UART: [afmc] SUBJECT.KEYID = 7
14,556,628 UART: [afmc] AUTHORITY.KEYID = 5
17,064,013 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,451 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,302 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,349 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,894 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,859,631 UART: [afmc] --
18,864,040 UART: [cold-reset] --
18,868,340 UART: [state] Locking Datavault
18,874,140 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,896 UART: [state] Locking ICCM
18,877,183 UART: [exit] Launching FMC @ 0x40000130
18,885,589 UART:
18,885,865 UART: Running Caliptra FMC ...
18,886,999 UART:
18,887,164 UART: [state] CFI Enabled
18,895,221 UART: [fht] FMC Alias Private Key: 7
20,661,891 UART: [art] Extend RT PCRs Done
20,663,111 UART: [art] Lock RT PCRs Done
20,664,576 UART: [art] Populate DV Done
20,669,775 UART: [fht] FMC Alias Private Key: 7
20,671,267 UART: [art] Derive CDI
20,672,030 UART: [art] Store in slot 0x4
20,714,681 UART: [art] Derive Key Pair
20,715,682 UART: [art] Store priv key in slot 0x5
23,142,347 UART: [art] Derive Key Pair - Done
23,155,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,362 UART: [art] PUB.X = 38D31B39D8155A704FD96C77B659F3D3D4780D4A93C96E7B3796731442F44942FE08D689327DA953DBDFFCB4349C0B05
24,870,613 UART: [art] PUB.Y = DEE6DE811EC5C8A3D9693DABBA08479D6C55485DE4939D0341F807A8ED0345A3BB5DA8CA45F606B7F7C9532482A38C7C
24,877,926 UART: [art] SIG.R = 0F272505B1D215BD1ABDFDF792F56F68981DBEAA8FAEF1B0F14FB7FA26169AC4BED1A5D38DA50284C05B77C5AA3528F4
24,885,356 UART: [art] SIG.S = F3ED62B1FE5A15EC4FCB27860BACAFE67D665D698931A5A9FC3D437F17F001E19CB37C8145452C6136CFB3DF81F1913A
25,864,158 UART: Caliptra RT
25,864,854 UART: [state] CFI Enabled
25,998,231 UART: [rt] RT listening for mailbox commands...
26,000,650 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,155,951 UART: [rt]cmd =0x41544d4e, len=14344
30,151,325 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,777,191 ready_for_fw is high
3,777,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,534 >>> mbox cmd response: success
18,699,211 UART:
18,699,591 UART: Running Caliptra FMC ...
18,700,754 UART:
18,700,915 UART: [state] CFI Enabled
18,708,604 UART: [fht] FMC Alias Private Key: 7
20,474,282 UART: [art] Extend RT PCRs Done
20,475,498 UART: [art] Lock RT PCRs Done
20,477,446 UART: [art] Populate DV Done
20,482,666 UART: [fht] FMC Alias Private Key: 7
20,484,373 UART: [art] Derive CDI
20,485,193 UART: [art] Store in slot 0x4
20,527,798 UART: [art] Derive Key Pair
20,528,844 UART: [art] Store priv key in slot 0x5
22,955,380 UART: [art] Derive Key Pair - Done
22,968,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,674,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,950 UART: [art] PUB.X = 989C8CEC493001F5853A60CAD2242AC35098F8F3D4CF99DAF654B45CED957071948DC5F8D4AE12A3E2DD5A1D981B217C
24,683,270 UART: [art] PUB.Y = 90D4464DB62039FCD4D3D87FE46A87C4D5C56A0B9E82176FA2985F2673FFE20318ED2E3193FA071F8E15A4AD7A75F8FC
24,690,539 UART: [art] SIG.R = C8F782E840BE55B6730873175A33CC8C63F1C04535A7B53D6B4F80798B74BC021AE834CDDE3664AFCADBE5D728152040
24,697,950 UART: [art] SIG.S = B779D2F96192D25B6A427CFBD0D714A3878344448259EAD97BDAEC887E185E6E247BB6E4A7A536398A467ADDF7BB90C3
25,677,144 UART: Caliptra RT
25,677,829 UART: [state] CFI Enabled
25,810,296 UART: [rt] RT listening for mailbox commands...
25,812,608 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,967,920 UART: [rt]cmd =0x41544d4e, len=14344
29,963,571 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,091 UART:
192,456 UART: Running Caliptra ROM ...
193,646 UART:
193,804 UART: [state] CFI Enabled
265,747 UART: [state] LifecycleState = Unprovisioned
268,207 UART: [state] DebugLocked = No
269,892 UART: [state] WD Timer not started. Device not locked for debugging
273,772 UART: [kat] SHA2-256
463,665 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,473 UART: [kat] ++
474,916 UART: [kat] sha1
485,786 UART: [kat] SHA2-256
488,790 UART: [kat] SHA2-384
494,703 UART: [kat] SHA2-512-ACC
497,292 UART: [kat] ECC-384
2,947,960 UART: [kat] HMAC-384Kdf
2,972,974 UART: [kat] LMS
3,504,723 UART: [kat] --
3,509,535 UART: [cold-reset] ++
3,511,611 UART: [fht] FHT @ 0x50003400
3,523,091 UART: [idev] ++
3,523,818 UART: [idev] CDI.KEYID = 6
3,524,730 UART: [idev] SUBJECT.KEYID = 7
3,525,971 UART: [idev] UDS.KEYID = 0
3,526,895 ready_for_fw is high
3,527,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,304 UART: [idev] Erasing UDS.KEYID = 0
6,030,970 UART: [idev] Sha1 KeyId Algorithm
6,052,811 UART: [idev] --
6,057,507 UART: [ldev] ++
6,058,184 UART: [ldev] CDI.KEYID = 6
6,059,096 UART: [ldev] SUBJECT.KEYID = 5
6,060,259 UART: [ldev] AUTHORITY.KEYID = 7
6,061,488 UART: [ldev] FE.KEYID = 1
6,103,406 UART: [ldev] Erasing FE.KEYID = 1
8,610,730 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,822 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,942 UART: [ldev] --
10,416,633 UART: [fwproc] Wait for Commands...
10,418,785 UART: [fwproc] Recv command 0x46574c44
10,421,189 UART: [fwproc] Recv'd Img size: 118548 bytes
13,925,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,361 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,686,046 >>> mbox cmd response: success
14,689,428 UART: [afmc] ++
14,690,153 UART: [afmc] CDI.KEYID = 6
14,691,419 UART: [afmc] SUBJECT.KEYID = 7
14,692,751 UART: [afmc] AUTHORITY.KEYID = 5
17,234,790 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,562 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,521 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,575 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,721 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,745 UART: [afmc] --
19,032,929 UART: [cold-reset] --
19,036,420 UART: [state] Locking Datavault
19,039,895 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,042 UART: [state] Locking ICCM
19,043,801 UART: [exit] Launching FMC @ 0x40000130
19,052,476 UART:
19,052,708 UART: Running Caliptra FMC ...
19,053,735 UART:
19,053,881 UART: [state] CFI Enabled
19,115,983 UART: [fht] FMC Alias Private Key: 7
20,904,222 UART: [art] Extend RT PCRs Done
20,905,429 UART: [art] Lock RT PCRs Done
20,906,806 UART: [art] Populate DV Done
20,912,002 UART: [fht] FMC Alias Private Key: 7
20,913,701 UART: [art] Derive CDI
20,914,435 UART: [art] Store in slot 0x4
20,969,246 UART: [art] Derive Key Pair
20,970,243 UART: [art] Store priv key in slot 0x5
23,432,810 UART: [art] Derive Key Pair - Done
23,445,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,750 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,252 UART: [art] PUB.X = A18225A81E084D846046527446B4C1B73667CB5DBDDA0CD4888BF8A9BE466936239FD917C2ED3A5C354788C572C18DA2
25,166,511 UART: [art] PUB.Y = 462AEAC83AEE855E1384175C42DEE85B8D98C91E37B0C876CA909C9A02D77A100794A8709E53CAF72A501E7B0F10D1E4
25,173,758 UART: [art] SIG.R = 736441F219F877F6DB07A0A0573C7C91333CB617CCFF1BF68E75FD706D1A8580238EBA1B8E2FC29B8105B2E006F4AECF
25,181,165 UART: [art] SIG.S = 1A14EE6F9C2CA94D3D0F1A6971C9DC3308DB44682C8A2BA236DBD69415954AD8C5EF202FA241306D6705BC6FC135CC6E
26,159,914 UART: Caliptra RT
26,160,652 UART: [state] CFI Enabled
26,340,676 UART: [rt] RT listening for mailbox commands...
26,343,005 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,498,195 UART: [rt]cmd =0x41544d4e, len=14344
30,493,608 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,439,903 ready_for_fw is high
3,440,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,066 >>> mbox cmd response: success
19,107,799 UART:
19,108,168 UART: Running Caliptra FMC ...
19,109,295 UART:
19,109,477 UART: [state] CFI Enabled
19,176,530 UART: [fht] FMC Alias Private Key: 7
20,942,314 UART: [art] Extend RT PCRs Done
20,943,538 UART: [art] Lock RT PCRs Done
20,945,469 UART: [art] Populate DV Done
20,950,765 UART: [fht] FMC Alias Private Key: 7
20,952,307 UART: [art] Derive CDI
20,953,044 UART: [art] Store in slot 0x4
21,009,032 UART: [art] Derive Key Pair
21,010,036 UART: [art] Store priv key in slot 0x5
23,473,408 UART: [art] Derive Key Pair - Done
23,486,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,357 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,854 UART: [art] PUB.X = 57BFACB53F5D78C494334FD99E5C78F2BE9121EB148CF52F593229F650372C92A6EDCE6CDA4708E816748C4CA1DB8048
25,208,147 UART: [art] PUB.Y = E1ADFAC729DAC890DE88B00312D366C708BBED8AD87EA99504C2CAA0269BFE84906755C0911C0469016EAA2B0A0E03B3
25,215,420 UART: [art] SIG.R = C53B74CCDE1EB1778D1431A9B2C3F42C4879D4986B7DEAAB0BC123E476B7A591CEA173224A755E1694776D50548452FF
25,222,832 UART: [art] SIG.S = AF3943C1DA81AA510ED61312F06730CF7CA378534EBE19285D024E2AD65DC580EB1FFE5A7A29B684E669E036D6130286
26,201,768 UART: Caliptra RT
26,202,490 UART: [state] CFI Enabled
26,382,951 UART: [rt] RT listening for mailbox commands...
26,385,453 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,540,848 UART: [rt]cmd =0x41544d4e, len=14344
30,536,647 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,393 UART:
192,784 UART: Running Caliptra ROM ...
193,884 UART:
603,389 UART: [state] CFI Enabled
618,689 UART: [state] LifecycleState = Unprovisioned
621,074 UART: [state] DebugLocked = No
622,899 UART: [state] WD Timer not started. Device not locked for debugging
628,150 UART: [kat] SHA2-256
817,998 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,839 UART: [kat] ++
829,302 UART: [kat] sha1
840,897 UART: [kat] SHA2-256
843,913 UART: [kat] SHA2-384
850,260 UART: [kat] SHA2-512-ACC
852,850 UART: [kat] ECC-384
3,294,361 UART: [kat] HMAC-384Kdf
3,306,965 UART: [kat] LMS
3,838,795 UART: [kat] --
3,843,876 UART: [cold-reset] ++
3,846,025 UART: [fht] FHT @ 0x50003400
3,857,650 UART: [idev] ++
3,858,285 UART: [idev] CDI.KEYID = 6
3,859,250 UART: [idev] SUBJECT.KEYID = 7
3,860,510 UART: [idev] UDS.KEYID = 0
3,861,418 ready_for_fw is high
3,861,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,418 UART: [idev] Erasing UDS.KEYID = 0
6,336,523 UART: [idev] Sha1 KeyId Algorithm
6,359,914 UART: [idev] --
6,364,807 UART: [ldev] ++
6,365,500 UART: [ldev] CDI.KEYID = 6
6,366,422 UART: [ldev] SUBJECT.KEYID = 5
6,367,587 UART: [ldev] AUTHORITY.KEYID = 7
6,368,836 UART: [ldev] FE.KEYID = 1
6,379,000 UART: [ldev] Erasing FE.KEYID = 1
8,853,687 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,176 UART: [ldev] --
10,643,114 UART: [fwproc] Wait for Commands...
10,644,720 UART: [fwproc] Recv command 0x46574c44
10,647,027 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,217,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,340,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,901,013 >>> mbox cmd response: success
14,905,872 UART: [afmc] ++
14,906,623 UART: [afmc] CDI.KEYID = 6
14,907,826 UART: [afmc] SUBJECT.KEYID = 7
14,909,274 UART: [afmc] AUTHORITY.KEYID = 5
17,408,539 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,130,610 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,132,525 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,147,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,162,810 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,177,677 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,201,499 UART: [afmc] --
19,204,179 UART: [cold-reset] --
19,210,371 UART: [state] Locking Datavault
19,215,591 UART: [state] Locking PCR0, PCR1 and PCR31
19,217,751 UART: [state] Locking ICCM
19,220,131 UART: [exit] Launching FMC @ 0x40000130
19,228,695 UART:
19,228,962 UART: Running Caliptra FMC ...
19,230,069 UART:
19,230,235 UART: [state] CFI Enabled
19,238,554 UART: [fht] FMC Alias Private Key: 7
21,004,690 UART: [art] Extend RT PCRs Done
21,005,919 UART: [art] Lock RT PCRs Done
21,007,363 UART: [art] Populate DV Done
21,012,626 UART: [fht] FMC Alias Private Key: 7
21,014,177 UART: [art] Derive CDI
21,014,947 UART: [art] Store in slot 0x4
21,057,701 UART: [art] Derive Key Pair
21,058,704 UART: [art] Store priv key in slot 0x5
23,485,662 UART: [art] Derive Key Pair - Done
23,498,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,807 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,314 UART: [art] PUB.X = EDCC9E32BDB61C249CE04666092CD38DB6D9289C175CC87D9FB363254DDCF247B6AE574F1D96EFA96ED3ACBC7B720701
25,213,597 UART: [art] PUB.Y = F9D20E62053FE56BC545ACF2D0A919F382FDC7C3A77F170EA93FCBFD6CB1058DAD1ED9F905511D105455BAD0F28C3DA8
25,220,884 UART: [art] SIG.R = 4D009710D7FBD859433930F0F400C18D3D9B17D76A39C4B6E12066F75D638C80313941DCBEFB4C38858D21DD79616372
25,228,207 UART: [art] SIG.S = 174B55F97FE09AB6FA7336962A9A14D7B45AEA9BC56BF86B6ED385DF3AF712A70B85EA270FEB1B4E5A337F681D5B9625
26,207,257 UART: Caliptra RT
26,207,956 UART: [state] CFI Enabled
26,341,390 UART: [rt] RT listening for mailbox commands...
26,343,690 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,498,752 UART: [rt]cmd =0x41544d4e, len=14344
30,494,529 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,756,773 ready_for_fw is high
3,757,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,174 >>> mbox cmd response: success
19,287,646 UART:
19,288,040 UART: Running Caliptra FMC ...
19,289,184 UART:
19,289,351 UART: [state] CFI Enabled
19,297,377 UART: [fht] FMC Alias Private Key: 7
21,063,403 UART: [art] Extend RT PCRs Done
21,064,631 UART: [art] Lock RT PCRs Done
21,066,235 UART: [art] Populate DV Done
21,071,624 UART: [fht] FMC Alias Private Key: 7
21,073,337 UART: [art] Derive CDI
21,074,081 UART: [art] Store in slot 0x4
21,116,965 UART: [art] Derive Key Pair
21,118,012 UART: [art] Store priv key in slot 0x5
23,544,963 UART: [art] Derive Key Pair - Done
23,558,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,264,389 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,896 UART: [art] PUB.X = 4BCEAAAF6B068CB77757C8276AE6F1FD439F80ECF38CD27A795A478FF67CF8C384F37FDD8DD019891E1B5A9994AF8B91
25,273,165 UART: [art] PUB.Y = 856F3747AFF0F06463FB1E5F5D8AFE1B0F87BBC2A6FB4FFC7C9ED0EB134B3F4305DF11325225C31B6808B084A1496C2B
25,280,459 UART: [art] SIG.R = 041F148F32AA9A94E382AAB62D6F0B29019736EE8E658C463D254F299B90A5DDF5D2F0EFEA8E0C5E42DEC21668BFC128
25,287,892 UART: [art] SIG.S = F6663FC45D5C276A204617334163F4B72E418849C428495ACCD557BBB404AEFEA21B2321DDB0949BD03224919777F961
26,267,260 UART: Caliptra RT
26,267,967 UART: [state] CFI Enabled
26,400,753 UART: [rt] RT listening for mailbox commands...
26,403,052 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,558,390 UART: [rt]cmd =0x41544d4e, len=14344
30,553,903 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,050 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,845 UART: [kat] SHA2-256
881,776 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,891 UART: [kat] ++
886,043 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
895,162 UART: [kat] SHA2-512-ACC
897,063 UART: [kat] ECC-384
902,486 UART: [kat] HMAC-384Kdf
907,076 UART: [kat] LMS
1,475,272 UART: [kat] --
1,476,463 UART: [cold-reset] ++
1,476,963 UART: [fht] Storing FHT @ 0x50003400
1,479,750 UART: [idev] ++
1,479,918 UART: [idev] CDI.KEYID = 6
1,480,278 UART: [idev] SUBJECT.KEYID = 7
1,480,702 UART: [idev] UDS.KEYID = 0
1,481,047 ready_for_fw is high
1,481,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,126 UART: [idev] Erasing UDS.KEYID = 0
1,504,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,154 UART: [idev] --
1,514,039 UART: [ldev] ++
1,514,207 UART: [ldev] CDI.KEYID = 6
1,514,570 UART: [ldev] SUBJECT.KEYID = 5
1,514,996 UART: [ldev] AUTHORITY.KEYID = 7
1,515,459 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,028 UART: [ldev] --
1,585,367 UART: [fwproc] Waiting for Commands...
1,586,132 UART: [fwproc] Received command 0x46574c44
1,586,923 UART: [fwproc] Received Image of size 118548 bytes
2,931,677 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,653 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,871 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,320 >>> mbox cmd response: success
3,131,526 UART: [afmc] ++
3,131,694 UART: [afmc] CDI.KEYID = 6
3,132,056 UART: [afmc] SUBJECT.KEYID = 7
3,132,481 UART: [afmc] AUTHORITY.KEYID = 5
3,167,188 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,064 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,747 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,527 UART: [afmc] --
3,210,453 UART: [cold-reset] --
3,211,319 UART: [state] Locking Datavault
3,212,566 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,170 UART: [state] Locking ICCM
3,213,844 UART: [exit] Launching FMC @ 0x40000130
3,219,174 UART:
3,219,190 UART: Running Caliptra FMC ...
3,219,598 UART:
3,219,652 UART: [state] CFI Enabled
3,230,320 UART: [fht] FMC Alias Private Key: 7
3,349,080 UART: [art] Extend RT PCRs Done
3,349,508 UART: [art] Lock RT PCRs Done
3,350,834 UART: [art] Populate DV Done
3,359,057 UART: [fht] FMC Alias Private Key: 7
3,360,149 UART: [art] Derive CDI
3,360,429 UART: [art] Store in slot 0x4
3,446,009 UART: [art] Derive Key Pair
3,446,369 UART: [art] Store priv key in slot 0x5
3,459,978 UART: [art] Derive Key Pair - Done
3,474,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,491 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,256 UART: [art] PUB.X = 521BDD8A0CA0572AC1002F77653C646B06307F5FA5B42D5C144EA098D12C83E6EBD0E90BACA5C5B71605EB2877DB3097
3,498,002 UART: [art] PUB.Y = 8821C7E78BF5F997F7534C1EE8C676022E1218CE65869E302927DF40FBF8E8CF55C6EC951DB404FDB43E0DFA41C74F8E
3,504,955 UART: [art] SIG.R = 16AD576AF4792A19814E529767C9DD601BF0544339A421D0556348228912379416B286BF275A5F652509D3DD07FDEF24
3,511,707 UART: [art] SIG.S = 1A49BED477F8C2D4C97911B17C6A68A3734115017101E075B53F90507C9E0F2EC48DED5A6EA7431A8055F7563E2C1A95
3,535,348 UART: Caliptra RT
3,535,599 UART: [state] CFI Enabled
3,655,484 UART: [rt] RT listening for mailbox commands...
3,656,154 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,312 UART: [rt]cmd =0x41544d4e, len=14344
4,088,727 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,837 ready_for_fw is high
1,361,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,600 >>> mbox cmd response: success
3,040,303 UART:
3,040,319 UART: Running Caliptra FMC ...
3,040,727 UART:
3,040,781 UART: [state] CFI Enabled
3,051,395 UART: [fht] FMC Alias Private Key: 7
3,170,235 UART: [art] Extend RT PCRs Done
3,170,663 UART: [art] Lock RT PCRs Done
3,172,237 UART: [art] Populate DV Done
3,180,242 UART: [fht] FMC Alias Private Key: 7
3,181,302 UART: [art] Derive CDI
3,181,582 UART: [art] Store in slot 0x4
3,267,158 UART: [art] Derive Key Pair
3,267,518 UART: [art] Store priv key in slot 0x5
3,280,423 UART: [art] Derive Key Pair - Done
3,295,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,338 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,103 UART: [art] PUB.X = 26CFF512E0C9F8613C90F695F46BD3942D18D719668389A86465468D453408E4AC9E367BFD4D28D5FD385B36D0578244
3,317,864 UART: [art] PUB.Y = 807F5C585CE9C9CB1288119A9982C5958F0E2F5F08238F4B819B7E6255748CDE1185996CFB26CA906A07C953207F58D8
3,324,801 UART: [art] SIG.R = E7DAC4AC68F4FC852F07628FC808A083B5ADA89017C7B7D8EF92DE8E2D82F11EEDDD394B15441E919C60AFEF7FC5FC44
3,331,589 UART: [art] SIG.S = 47C6F7D8CD2301442D9E9D152A48BB6D926F6F46E812FBD94079644079FC220142BC4A6E641A96EB7C0FF47BC9838C81
3,354,840 UART: Caliptra RT
3,355,091 UART: [state] CFI Enabled
3,475,603 UART: [rt] RT listening for mailbox commands...
3,476,273 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,599,261 UART: [rt]cmd =0x41544d4e, len=14344
3,909,556 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Unprovisioned
86,520 UART: [state] DebugLocked = No
87,018 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,560 UART: [kat] SHA2-256
882,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,606 UART: [kat] ++
886,758 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
902,959 UART: [kat] HMAC-384Kdf
907,683 UART: [kat] LMS
1,475,879 UART: [kat] --
1,476,558 UART: [cold-reset] ++
1,476,968 UART: [fht] Storing FHT @ 0x50003400
1,479,939 UART: [idev] ++
1,480,107 UART: [idev] CDI.KEYID = 6
1,480,467 UART: [idev] SUBJECT.KEYID = 7
1,480,891 UART: [idev] UDS.KEYID = 0
1,481,236 ready_for_fw is high
1,481,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,505,841 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,377 UART: [idev] --
1,515,620 UART: [ldev] ++
1,515,788 UART: [ldev] CDI.KEYID = 6
1,516,151 UART: [ldev] SUBJECT.KEYID = 5
1,516,577 UART: [ldev] AUTHORITY.KEYID = 7
1,517,040 UART: [ldev] FE.KEYID = 1
1,522,378 UART: [ldev] Erasing FE.KEYID = 1
1,548,035 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,621 UART: [ldev] --
1,588,124 UART: [fwproc] Waiting for Commands...
1,588,967 UART: [fwproc] Received command 0x46574c44
1,589,758 UART: [fwproc] Received Image of size 118548 bytes
2,933,786 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,718 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,936 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,375 >>> mbox cmd response: success
3,133,457 UART: [afmc] ++
3,133,625 UART: [afmc] CDI.KEYID = 6
3,133,987 UART: [afmc] SUBJECT.KEYID = 7
3,134,412 UART: [afmc] AUTHORITY.KEYID = 5
3,169,955 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,121 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,610 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,493 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,176 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,870 UART: [afmc] --
3,212,858 UART: [cold-reset] --
3,213,740 UART: [state] Locking Datavault
3,214,847 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,451 UART: [state] Locking ICCM
3,215,999 UART: [exit] Launching FMC @ 0x40000130
3,221,329 UART:
3,221,345 UART: Running Caliptra FMC ...
3,221,753 UART:
3,221,896 UART: [state] CFI Enabled
3,232,582 UART: [fht] FMC Alias Private Key: 7
3,351,656 UART: [art] Extend RT PCRs Done
3,352,084 UART: [art] Lock RT PCRs Done
3,353,516 UART: [art] Populate DV Done
3,361,869 UART: [fht] FMC Alias Private Key: 7
3,362,873 UART: [art] Derive CDI
3,363,153 UART: [art] Store in slot 0x4
3,449,131 UART: [art] Derive Key Pair
3,449,491 UART: [art] Store priv key in slot 0x5
3,462,574 UART: [art] Derive Key Pair - Done
3,477,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,841 UART: [art] PUB.X = E0A95D5729A39474D52B7014AF47CFE9377EAAA9D009725BE0B6328542D90F6C81B3415461A6CBDB27E08D4B09EA1480
3,500,606 UART: [art] PUB.Y = 9543A5641543BD71B742DF8BA4B1C564D95ECDE26C8088DA4839DBDD546EC262C487A9BEE7AA3B11B1B8A851646B9A15
3,507,568 UART: [art] SIG.R = 599A6F72DDE20E13D505B273B6FA886936C93FE6257C16B45FE4C02270C4C1ADD8837015F524B156E59D41D0AFD15FAC
3,514,340 UART: [art] SIG.S = 2C654FD48F5BEBDDFFD7627D9191F590CA811C695B7F0E8CBCD6208E5F6526098AE7D09A09995275D05467D8057D4311
3,538,264 UART: Caliptra RT
3,538,607 UART: [state] CFI Enabled
3,659,102 UART: [rt] RT listening for mailbox commands...
3,659,772 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,232 UART: [rt]cmd =0x41544d4e, len=14344
4,093,131 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,904 ready_for_fw is high
1,362,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,677 >>> mbox cmd response: success
3,044,018 UART:
3,044,034 UART: Running Caliptra FMC ...
3,044,442 UART:
3,044,585 UART: [state] CFI Enabled
3,055,263 UART: [fht] FMC Alias Private Key: 7
3,174,741 UART: [art] Extend RT PCRs Done
3,175,169 UART: [art] Lock RT PCRs Done
3,176,867 UART: [art] Populate DV Done
3,184,914 UART: [fht] FMC Alias Private Key: 7
3,185,886 UART: [art] Derive CDI
3,186,166 UART: [art] Store in slot 0x4
3,271,772 UART: [art] Derive Key Pair
3,272,132 UART: [art] Store priv key in slot 0x5
3,285,025 UART: [art] Derive Key Pair - Done
3,299,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,643 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,408 UART: [art] PUB.X = C969E7F7E42D79CA9DAA6CF7F1640BE11853262094BAF5C9F4B8E1B42B411360999742113BB9A64430C5A8006566B819
3,323,151 UART: [art] PUB.Y = BCBD1AF3FEB837B95200346238BC1ACFA6BA21141BAE90D7D7DC0D6E73568365B4B24E09EF385225337CB3927388E9C1
3,330,083 UART: [art] SIG.R = 31CD4575BDA458FCC8AC51C0D412B372A78F5F49853292D61061095CC9AB46CB3EBC735EA49E227CBB87191EF8B6A5BA
3,336,864 UART: [art] SIG.S = 9592523165F0F60B2C067695D7F272DB91147A5B3CA63515B2D8A2C35CD20DFC202F1C34EE3C9745687F093B73A4C434
3,360,002 UART: Caliptra RT
3,360,345 UART: [state] CFI Enabled
3,479,945 UART: [rt] RT listening for mailbox commands...
3,480,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,779 UART: [rt]cmd =0x41544d4e, len=14344
3,913,412 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,558 UART: [kat] SHA2-256
901,498 UART: [kat] SHA2-384
904,417 UART: [kat] SHA2-512-ACC
906,318 UART: [kat] ECC-384
916,153 UART: [kat] HMAC-384Kdf
920,685 UART: [kat] LMS
1,168,997 UART: [kat] --
1,169,870 UART: [cold-reset] ++
1,170,356 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 ready_for_fw is high
1,174,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,817 UART: [idev] Erasing UDS.KEYID = 0
1,198,775 UART: [idev] Sha1 KeyId Algorithm
1,207,743 UART: [idev] --
1,208,796 UART: [ldev] ++
1,208,964 UART: [ldev] CDI.KEYID = 6
1,209,328 UART: [ldev] SUBJECT.KEYID = 5
1,209,755 UART: [ldev] AUTHORITY.KEYID = 7
1,210,218 UART: [ldev] FE.KEYID = 1
1,215,462 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,914 UART: [ldev] --
1,281,271 UART: [fwproc] Wait for Commands...
1,282,018 UART: [fwproc] Recv command 0x46574c44
1,282,751 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,457 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,632 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,935 >>> mbox cmd response: success
2,826,157 UART: [afmc] ++
2,826,325 UART: [afmc] CDI.KEYID = 6
2,826,688 UART: [afmc] SUBJECT.KEYID = 7
2,827,114 UART: [afmc] AUTHORITY.KEYID = 5
2,862,879 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,236 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,985 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,695 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,576 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,277 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,070 UART: [afmc] --
2,906,037 UART: [cold-reset] --
2,906,959 UART: [state] Locking Datavault
2,908,218 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,822 UART: [state] Locking ICCM
2,909,328 UART: [exit] Launching FMC @ 0x40000130
2,914,658 UART:
2,914,674 UART: Running Caliptra FMC ...
2,915,082 UART:
2,915,136 UART: [state] CFI Enabled
2,925,766 UART: [fht] FMC Alias Private Key: 7
3,044,876 UART: [art] Extend RT PCRs Done
3,045,304 UART: [art] Lock RT PCRs Done
3,046,968 UART: [art] Populate DV Done
3,055,077 UART: [fht] FMC Alias Private Key: 7
3,056,045 UART: [art] Derive CDI
3,056,325 UART: [art] Store in slot 0x4
3,141,954 UART: [art] Derive Key Pair
3,142,314 UART: [art] Store priv key in slot 0x5
3,155,854 UART: [art] Derive Key Pair - Done
3,170,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,038 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,803 UART: [art] PUB.X = 082F3A7A70A50D0FCD628EE7B1D0B19AEFA29DB8D6E6FA8A5ADAF7AD9E50B673724E149F7F3A12432F50F0D3AC1D543F
3,193,588 UART: [art] PUB.Y = 875693242D51A78F857B53CD0AE33E14B4EDF2648C262BB7B080967BB0CEA1698BE1C33F660468B320B89DC340764DA5
3,200,534 UART: [art] SIG.R = 7C196C9196AD49C3B2E0DF950886BF88E2A20915164F5A48C60444E6118099494F6D5E4BAB4F4EFC73AF4465E5FEDEE7
3,207,303 UART: [art] SIG.S = 9814790AEA055C04E2CDBF96B2E041A74023F3B443B4E8BB30AA962A0D5D92572801C6548352EB22A17FDF60DB359611
3,230,862 UART: Caliptra RT
3,231,113 UART: [state] CFI Enabled
3,351,072 UART: [rt] RT listening for mailbox commands...
3,351,742 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,342 UART: [rt]cmd =0x41544d4e, len=14344
3,784,903 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,250 ready_for_fw is high
1,059,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,652 >>> mbox cmd response: success
2,740,421 UART:
2,740,437 UART: Running Caliptra FMC ...
2,740,845 UART:
2,740,899 UART: [state] CFI Enabled
2,751,365 UART: [fht] FMC Alias Private Key: 7
2,870,161 UART: [art] Extend RT PCRs Done
2,870,589 UART: [art] Lock RT PCRs Done
2,871,981 UART: [art] Populate DV Done
2,880,382 UART: [fht] FMC Alias Private Key: 7
2,881,424 UART: [art] Derive CDI
2,881,704 UART: [art] Store in slot 0x4
2,967,459 UART: [art] Derive Key Pair
2,967,819 UART: [art] Store priv key in slot 0x5
2,981,275 UART: [art] Derive Key Pair - Done
2,995,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,040 UART: [art] PUB.X = B5EC6DECFD9A8567F1285C573BA9B3777395D56944C4555FB27EF5B0BE1092BD7C74DC2C0945C87224CB5445B6480225
3,018,808 UART: [art] PUB.Y = 9CB5D9C4DE25B5164CF9C07BE730F1AED068AD388851ABEB75B0E2ED80299DEDB4C2D6355FEC26370D777D2122B17E7F
3,025,773 UART: [art] SIG.R = CB78D20C9213F753FCA16F6C5606D56D327DEAA4E237CE92EE6C5E14BC63A3C1F6D94BD97356414D347C5CD6C4E4E445
3,032,551 UART: [art] SIG.S = F8ED7B037A567A96C6D8EC4F3F31EB6ABEF141E8CBE30098422D3564228DD6E602F22A0BF78B5783C840CEECCC5ECFC0
3,056,042 UART: Caliptra RT
3,056,293 UART: [state] CFI Enabled
3,177,921 UART: [rt] RT listening for mailbox commands...
3,178,591 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,301,757 UART: [rt]cmd =0x41544d4e, len=14344
3,611,444 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,321 UART: [kat] SHA2-256
891,871 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,975 UART: [kat] ++
896,127 UART: [kat] sha1
900,453 UART: [kat] SHA2-256
902,393 UART: [kat] SHA2-384
905,126 UART: [kat] SHA2-512-ACC
907,027 UART: [kat] ECC-384
916,698 UART: [kat] HMAC-384Kdf
921,398 UART: [kat] LMS
1,169,710 UART: [kat] --
1,170,481 UART: [cold-reset] ++
1,170,895 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,174,719 ready_for_fw is high
1,174,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,852 UART: [idev] Erasing UDS.KEYID = 0
1,199,880 UART: [idev] Sha1 KeyId Algorithm
1,208,786 UART: [idev] --
1,209,841 UART: [ldev] ++
1,210,009 UART: [ldev] CDI.KEYID = 6
1,210,373 UART: [ldev] SUBJECT.KEYID = 5
1,210,800 UART: [ldev] AUTHORITY.KEYID = 7
1,211,263 UART: [ldev] FE.KEYID = 1
1,216,635 UART: [ldev] Erasing FE.KEYID = 1
1,242,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,626 UART: [fwproc] Wait for Commands...
1,283,199 UART: [fwproc] Recv command 0x46574c44
1,283,932 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,935 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,172 >>> mbox cmd response: success
2,827,354 UART: [afmc] ++
2,827,522 UART: [afmc] CDI.KEYID = 6
2,827,885 UART: [afmc] SUBJECT.KEYID = 7
2,828,311 UART: [afmc] AUTHORITY.KEYID = 5
2,864,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,221 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,970 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,680 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,561 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,262 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,019 UART: [afmc] --
2,908,034 UART: [cold-reset] --
2,909,000 UART: [state] Locking Datavault
2,910,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,073 UART: [state] Locking ICCM
2,911,561 UART: [exit] Launching FMC @ 0x40000130
2,916,891 UART:
2,916,907 UART: Running Caliptra FMC ...
2,917,315 UART:
2,917,458 UART: [state] CFI Enabled
2,927,646 UART: [fht] FMC Alias Private Key: 7
3,046,228 UART: [art] Extend RT PCRs Done
3,046,656 UART: [art] Lock RT PCRs Done
3,048,450 UART: [art] Populate DV Done
3,056,531 UART: [fht] FMC Alias Private Key: 7
3,057,465 UART: [art] Derive CDI
3,057,745 UART: [art] Store in slot 0x4
3,144,056 UART: [art] Derive Key Pair
3,144,416 UART: [art] Store priv key in slot 0x5
3,157,020 UART: [art] Derive Key Pair - Done
3,171,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,332 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,097 UART: [art] PUB.X = 744ACF7B2D53B191320EE0B63C3F49E7A6C4B49674AC8D75C3F67E896686051FF310AD660416D02083F3F6832DF7EE52
3,194,860 UART: [art] PUB.Y = A60A8DC24E5BE250D560E054BAC7D7410B6DB104B6631EB48848D5AAE76F9D1E19CAA75A7D8364995DB16FF9179D67EA
3,201,815 UART: [art] SIG.R = A288CB43371A0912B0D4DF11B466D41552232E8BEB4C606E11AC29C69035EFBEA4762725A8712C1261BF4F203101E6EE
3,208,581 UART: [art] SIG.S = D4DE5C6803590F8D6D50BF7796903987BE890D2BD37E35FAF6DEAD4FCAC7C933E327ACADB5F5A5431BA1AD46A0A16082
3,232,148 UART: Caliptra RT
3,232,491 UART: [state] CFI Enabled
3,352,609 UART: [rt] RT listening for mailbox commands...
3,353,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,447 UART: [rt]cmd =0x41544d4e, len=14344
3,786,176 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,333 ready_for_fw is high
1,059,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,183 >>> mbox cmd response: success
2,740,106 UART:
2,740,122 UART: Running Caliptra FMC ...
2,740,530 UART:
2,740,673 UART: [state] CFI Enabled
2,751,611 UART: [fht] FMC Alias Private Key: 7
2,871,029 UART: [art] Extend RT PCRs Done
2,871,457 UART: [art] Lock RT PCRs Done
2,872,567 UART: [art] Populate DV Done
2,880,828 UART: [fht] FMC Alias Private Key: 7
2,881,766 UART: [art] Derive CDI
2,882,046 UART: [art] Store in slot 0x4
2,967,565 UART: [art] Derive Key Pair
2,967,925 UART: [art] Store priv key in slot 0x5
2,980,571 UART: [art] Derive Key Pair - Done
2,995,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,346 UART: [art] PUB.X = 7F657E28F4D4F4A77460D42BDE991B378224AC44305DC84FB79BAA84452F8858C16F240B79CD49FCA0DBD0D4E8940BFC
3,018,122 UART: [art] PUB.Y = 828D9335FD2C1D929E4EBB7D24C745AB419E0B99C5A16A1110F9C63C622194B9C4A4ECC09D4B3BBCC9CA933ECDD2C1DC
3,025,091 UART: [art] SIG.R = 5E47B2A21C784AF2B61EC03EF238CD0B8D3F38804A5C53B2AF7057913F3C2A6DC2A1C923E8F1C6B73F326B2F2C484F41
3,031,870 UART: [art] SIG.S = DBF9D5BEB2C5CE97C075FDED57E7C438310C9B6DFA7BB5C0B9EF3585E7CC40B14F4CD05AE71CA8C628DBFB20E52B1A7F
3,056,131 UART: Caliptra RT
3,056,474 UART: [state] CFI Enabled
3,176,689 UART: [rt] RT listening for mailbox commands...
3,177,359 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,423 UART: [rt]cmd =0x41544d4e, len=14344
3,610,466 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,669 UART: [state] WD Timer not started. Device not locked for debugging
88,008 UART: [kat] SHA2-256
893,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,783 UART: [kat] ++
897,935 UART: [kat] sha1
902,303 UART: [kat] SHA2-256
904,243 UART: [kat] SHA2-384
906,820 UART: [kat] SHA2-512-ACC
908,721 UART: [kat] ECC-384
918,188 UART: [kat] HMAC-384Kdf
922,802 UART: [kat] LMS
1,171,130 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,603 UART: [fht] FHT @ 0x50003400
1,175,158 UART: [idev] ++
1,175,326 UART: [idev] CDI.KEYID = 6
1,175,686 UART: [idev] SUBJECT.KEYID = 7
1,176,110 UART: [idev] UDS.KEYID = 0
1,176,455 ready_for_fw is high
1,176,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,616 UART: [idev] Erasing UDS.KEYID = 0
1,201,393 UART: [idev] Sha1 KeyId Algorithm
1,209,677 UART: [idev] --
1,210,813 UART: [ldev] ++
1,210,981 UART: [ldev] CDI.KEYID = 6
1,211,344 UART: [ldev] SUBJECT.KEYID = 5
1,211,770 UART: [ldev] AUTHORITY.KEYID = 7
1,212,233 UART: [ldev] FE.KEYID = 1
1,217,421 UART: [ldev] Erasing FE.KEYID = 1
1,243,268 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,079 UART: [ldev] --
1,282,594 UART: [fwproc] Wait for Commands...
1,283,356 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,735 >>> mbox cmd response: success
2,828,905 UART: [afmc] ++
2,829,073 UART: [afmc] CDI.KEYID = 6
2,829,435 UART: [afmc] SUBJECT.KEYID = 7
2,829,860 UART: [afmc] AUTHORITY.KEYID = 5
2,865,379 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,818 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,527 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,410 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,111 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,081 UART: [afmc] --
2,909,043 UART: [cold-reset] --
2,909,993 UART: [state] Locking Datavault
2,911,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,942 UART: [state] Locking ICCM
2,912,458 UART: [exit] Launching FMC @ 0x40000130
2,917,788 UART:
2,917,804 UART: Running Caliptra FMC ...
2,918,212 UART:
2,918,266 UART: [state] CFI Enabled
2,928,202 UART: [fht] FMC Alias Private Key: 7
3,046,788 UART: [art] Extend RT PCRs Done
3,047,216 UART: [art] Lock RT PCRs Done
3,049,044 UART: [art] Populate DV Done
3,057,145 UART: [fht] FMC Alias Private Key: 7
3,058,237 UART: [art] Derive CDI
3,058,517 UART: [art] Store in slot 0x4
3,144,392 UART: [art] Derive Key Pair
3,144,752 UART: [art] Store priv key in slot 0x5
3,157,544 UART: [art] Derive Key Pair - Done
3,172,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,588 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,353 UART: [art] PUB.X = 2DE172750087F28CA9E7FA24ABB83571F050CA36C83E19B46B87F8B713CFA288370001651368ED381169C7E56877425A
3,195,070 UART: [art] PUB.Y = E27971DB3A4C74FD71259B0C97F54AD372F8B59CE62F2874B4F07E8669114601C4A30CE3CB3C936D4AFF1BB2A236A32E
3,202,021 UART: [art] SIG.R = 5F67604694628E8913BA5EDF98EF3DFB927921B12F1059E86288F37B04F77347D1FDF7C2E075A0BB576BF4F57A38581C
3,208,790 UART: [art] SIG.S = B90A6288BCA3DD23F5228CB46C850F01BABE3E6A68FEC1C5AC41D9F96A54297622C8C88F0E8AA97D8E1BBFC0F5217C71
3,231,904 UART: Caliptra RT
3,232,155 UART: [state] CFI Enabled
3,352,222 UART: [rt] RT listening for mailbox commands...
3,352,892 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,794 UART: [rt]cmd =0x41544d4e, len=14344
3,786,105 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,001 ready_for_fw is high
1,060,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,804 >>> mbox cmd response: success
2,740,765 UART:
2,740,781 UART: Running Caliptra FMC ...
2,741,189 UART:
2,741,243 UART: [state] CFI Enabled
2,751,993 UART: [fht] FMC Alias Private Key: 7
2,870,713 UART: [art] Extend RT PCRs Done
2,871,141 UART: [art] Lock RT PCRs Done
2,872,719 UART: [art] Populate DV Done
2,881,042 UART: [fht] FMC Alias Private Key: 7
2,882,152 UART: [art] Derive CDI
2,882,432 UART: [art] Store in slot 0x4
2,968,379 UART: [art] Derive Key Pair
2,968,739 UART: [art] Store priv key in slot 0x5
2,981,755 UART: [art] Derive Key Pair - Done
2,996,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,987 UART: [art] PUB.X = E7AE4C0694E03E66DA57D6235BB2087D17BA71197440674F6F5DC20DA821BCD582B72766629455D0FC43915AA47ADC3B
3,019,752 UART: [art] PUB.Y = FF88E149ABA3A8045F18438DA3BEC5C9DFA9F2A349C3321F6EC6AFF024C2CD50E6BF18A8FE01308585EC0DE161CC60C2
3,026,715 UART: [art] SIG.R = 7A7B57E387080B3553CD5120730E00BCF624C3E933EFD807A9D216ED751DE1A4EECF0E1FE591C5B8B884CBE8E5AE44EA
3,033,466 UART: [art] SIG.S = 689797B547B7B0BB2DB5F7DEBEC21686FACD69ECCDE5CE3AE9A3C652F40AB2BDB7EDFBDC5DDE0E4578DDA650E9AFCE43
3,056,896 UART: Caliptra RT
3,057,147 UART: [state] CFI Enabled
3,176,377 UART: [rt] RT listening for mailbox commands...
3,177,047 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,037 UART: [rt]cmd =0x41544d4e, len=14344
3,609,648 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,741 UART: [kat] SHA2-256
893,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,516 UART: [kat] ++
897,668 UART: [kat] sha1
901,680 UART: [kat] SHA2-256
903,620 UART: [kat] SHA2-384
906,529 UART: [kat] SHA2-512-ACC
908,430 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
923,085 UART: [kat] LMS
1,171,413 UART: [kat] --
1,172,102 UART: [cold-reset] ++
1,172,468 UART: [fht] FHT @ 0x50003400
1,175,199 UART: [idev] ++
1,175,367 UART: [idev] CDI.KEYID = 6
1,175,727 UART: [idev] SUBJECT.KEYID = 7
1,176,151 UART: [idev] UDS.KEYID = 0
1,176,496 ready_for_fw is high
1,176,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,441 UART: [idev] Erasing UDS.KEYID = 0
1,201,642 UART: [idev] Sha1 KeyId Algorithm
1,210,110 UART: [idev] --
1,211,162 UART: [ldev] ++
1,211,330 UART: [ldev] CDI.KEYID = 6
1,211,693 UART: [ldev] SUBJECT.KEYID = 5
1,212,119 UART: [ldev] AUTHORITY.KEYID = 7
1,212,582 UART: [ldev] FE.KEYID = 1
1,217,652 UART: [ldev] Erasing FE.KEYID = 1
1,243,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,592 UART: [ldev] --
1,282,905 UART: [fwproc] Wait for Commands...
1,283,535 UART: [fwproc] Recv command 0x46574c44
1,284,263 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,553 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,723 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,874 >>> mbox cmd response: success
2,826,982 UART: [afmc] ++
2,827,150 UART: [afmc] CDI.KEYID = 6
2,827,512 UART: [afmc] SUBJECT.KEYID = 7
2,827,937 UART: [afmc] AUTHORITY.KEYID = 5
2,863,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,833 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,290 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,173 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,874 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,558 UART: [afmc] --
2,906,676 UART: [cold-reset] --
2,907,592 UART: [state] Locking Datavault
2,908,949 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,553 UART: [state] Locking ICCM
2,909,993 UART: [exit] Launching FMC @ 0x40000130
2,915,323 UART:
2,915,339 UART: Running Caliptra FMC ...
2,915,747 UART:
2,915,890 UART: [state] CFI Enabled
2,926,582 UART: [fht] FMC Alias Private Key: 7
3,045,674 UART: [art] Extend RT PCRs Done
3,046,102 UART: [art] Lock RT PCRs Done
3,047,552 UART: [art] Populate DV Done
3,055,769 UART: [fht] FMC Alias Private Key: 7
3,056,753 UART: [art] Derive CDI
3,057,033 UART: [art] Store in slot 0x4
3,142,404 UART: [art] Derive Key Pair
3,142,764 UART: [art] Store priv key in slot 0x5
3,155,626 UART: [art] Derive Key Pair - Done
3,170,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,262 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,027 UART: [art] PUB.X = DB67950FEF748B7C2D8C3C1C8D982545B779007410EE35E223E5A37BD2264A0631C1FCD85281B9ACA57EE6CB35227B3F
3,193,777 UART: [art] PUB.Y = AEF1718D2ED22BC82041932720BDF716A3CC7B20F3E0A20CDD7B26DBA1273F8FA3500663B1A0DEE2D085E2D69EDABFD5
3,200,743 UART: [art] SIG.R = 7F2381BFD8C67B9905BC469295158A8CEEEA3F6466492CD3C95FA18915212BA1AE8524461949F08A5ACD5B9F2928D41D
3,207,514 UART: [art] SIG.S = 23BA22DA5E56CE808AAFE24678045464D61E52E6B270F85FFEE2C3BF68FE31E6731C7E98CD11954DDC735CDAD57DDD10
3,231,705 UART: Caliptra RT
3,232,048 UART: [state] CFI Enabled
3,350,658 UART: [rt] RT listening for mailbox commands...
3,351,328 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,592 UART: [rt]cmd =0x41544d4e, len=14344
3,784,749 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,934 ready_for_fw is high
1,059,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,785 >>> mbox cmd response: success
2,741,580 UART:
2,741,596 UART: Running Caliptra FMC ...
2,742,004 UART:
2,742,147 UART: [state] CFI Enabled
2,752,853 UART: [fht] FMC Alias Private Key: 7
2,871,845 UART: [art] Extend RT PCRs Done
2,872,273 UART: [art] Lock RT PCRs Done
2,873,923 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,256 UART: [art] Derive CDI
2,883,536 UART: [art] Store in slot 0x4
2,969,353 UART: [art] Derive Key Pair
2,969,713 UART: [art] Store priv key in slot 0x5
2,983,887 UART: [art] Derive Key Pair - Done
2,998,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,106 UART: [art] PUB.X = 58499A874AF3BBF395CFB6E33232961D4EBE6D4C644D9074E8F0A1C55E1689DCD7B6C75C8F9884C3E946F63EC04DED96
3,021,888 UART: [art] PUB.Y = E638B8E5BB649C519A75F50885C90F7FCCB9937F3DC080BDC36C95D2F2BE624C7DA44C94F31101C43C9FDD6FEAB496ED
3,028,849 UART: [art] SIG.R = 863D12F536D9DFA5BA98AA381BDB0E52B512BF89E73D099A4D1D8E1862589DD2E803B180313DBAF6D1E35B516B239264
3,035,618 UART: [art] SIG.S = 84539CDAA3B6BC9773C9F86A641B3B57AF918A145A1748F14ECAF6E6FCF1E12AF43E4CA71469F8EE0FB65CAB429A18CB
3,059,763 UART: Caliptra RT
3,060,106 UART: [state] CFI Enabled
3,180,748 UART: [rt] RT listening for mailbox commands...
3,181,418 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,266 UART: [rt]cmd =0x41544d4e, len=14344
3,613,557 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_owner_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,154 UART:
192,511 UART: Running Caliptra ROM ...
193,646 UART:
193,797 UART: [state] CFI Enabled
265,895 UART: [state] LifecycleState = Unprovisioned
267,888 UART: [state] DebugLocked = No
270,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,578 UART: [kat] SHA2-256
444,340 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,791 UART: [kat] ++
455,309 UART: [kat] sha1
466,180 UART: [kat] SHA2-256
468,902 UART: [kat] SHA2-384
474,891 UART: [kat] SHA2-512-ACC
477,267 UART: [kat] ECC-384
2,769,502 UART: [kat] HMAC-384Kdf
2,801,341 UART: [kat] LMS
3,991,649 UART: [kat] --
3,996,464 UART: [cold-reset] ++
3,999,039 UART: [fht] Storing FHT @ 0x50003400
4,010,114 UART: [idev] ++
4,010,720 UART: [idev] CDI.KEYID = 6
4,011,637 UART: [idev] SUBJECT.KEYID = 7
4,012,889 UART: [idev] UDS.KEYID = 0
4,013,980 ready_for_fw is high
4,014,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,136 UART: [idev] Erasing UDS.KEYID = 0
7,348,454 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,510 UART: [idev] --
7,374,907 UART: [ldev] ++
7,375,493 UART: [ldev] CDI.KEYID = 6
7,376,403 UART: [ldev] SUBJECT.KEYID = 5
7,377,619 UART: [ldev] AUTHORITY.KEYID = 7
7,378,914 UART: [ldev] FE.KEYID = 1
7,424,962 UART: [ldev] Erasing FE.KEYID = 1
10,758,503 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,950 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,533 UART: [ldev] --
13,135,971 UART: [fwproc] Waiting for Commands...
13,138,930 UART: [fwproc] Received command 0x46574c44
13,141,111 UART: [fwproc] Received Image of size 118548 bytes
22,151,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,239,866 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,313,039 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,642,053 >>> mbox cmd response: success
22,646,741 UART: [afmc] ++
22,647,383 UART: [afmc] CDI.KEYID = 6
22,648,304 UART: [afmc] SUBJECT.KEYID = 7
22,649,527 UART: [afmc] AUTHORITY.KEYID = 5
26,018,246 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,316,511 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,318,820 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,333,310 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,348,069 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,362,466 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,383,712 UART: [afmc] --
28,387,628 UART: [cold-reset] --
28,391,334 UART: [state] Locking Datavault
28,395,281 UART: [state] Locking PCR0, PCR1 and PCR31
28,397,034 UART: [state] Locking ICCM
28,398,191 UART: [exit] Launching FMC @ 0x40000130
28,406,598 UART:
28,406,873 UART: Running Caliptra FMC ...
28,407,990 UART:
28,408,149 UART: [state] CFI Enabled
28,478,413 UART: [fht] FMC Alias Private Key: 7
30,819,157 UART: [art] Extend RT PCRs Done
30,820,378 UART: [art] Lock RT PCRs Done
30,822,168 UART: [art] Populate DV Done
30,827,378 UART: [fht] FMC Alias Private Key: 7
30,828,861 UART: [art] Derive CDI
30,829,619 UART: [art] Store in slot 0x4
30,887,524 UART: [art] Derive Key Pair
30,888,561 UART: [art] Store priv key in slot 0x5
34,182,245 UART: [art] Derive Key Pair - Done
34,195,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,483,674 UART: [art] Erasing AUTHORITY.KEYID = 7
36,485,308 UART: [art] PUB.X = 35EBEDC4E5ED622F8B55C8C3AFF25E2CC5E88582B22C160F454E251929DF09E662D1AAD94651A36828DAC36022A3E52C
36,492,441 UART: [art] PUB.Y = 630C8675076952AF323BD0A81481795EBED6CC3F44C39C9E104115F24A939C23DF0393201ACA85E86F6B1CFDD3400000
36,499,668 UART: [art] SIG.R = 705C5AF7D8D869123827845AA7D259F968D003F2FAF26C11E9931D6504E9C39699165B1D6A3527FD8164515AB4B22B91
36,507,069 UART: [art] SIG.S = FB6DD5A3348EED867D9783A39D4AACDC5B0E71043F7EE83A8000AE760E1EB47CC4A949AC78770F303E619E23666397ED
37,812,165 UART: Caliptra RT
37,812,857 UART: [state] CFI Enabled
37,988,173 UART: [rt] RT listening for mailbox commands...
37,990,593 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,146,232 UART: [rt]cmd =0x41544d4e, len=14344
38,148,041 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,783,614 ready_for_fw is high
3,784,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,122,713 >>> mbox cmd response: success
27,810,368 UART:
27,810,771 UART: Running Caliptra FMC ...
27,811,885 UART:
27,812,040 UART: [state] CFI Enabled
27,881,880 UART: [fht] FMC Alias Private Key: 7
30,222,620 UART: [art] Extend RT PCRs Done
30,223,855 UART: [art] Lock RT PCRs Done
30,225,487 UART: [art] Populate DV Done
30,230,835 UART: [fht] FMC Alias Private Key: 7
30,232,330 UART: [art] Derive CDI
30,233,098 UART: [art] Store in slot 0x4
30,289,922 UART: [art] Derive Key Pair
30,290,967 UART: [art] Store priv key in slot 0x5
33,583,779 UART: [art] Derive Key Pair - Done
33,596,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,884,491 UART: [art] Erasing AUTHORITY.KEYID = 7
35,886,008 UART: [art] PUB.X = 8564A92674BE4A0BA027AAFE9EB958934D6FCC81B41A19AAEFBBCBC4CBF684E7D5C29BBE6D7A41032ED54A82B420B5CF
35,893,323 UART: [art] PUB.Y = DEC8CFD81A6F9EFDA94C65A4E57ECA50A22A241F08356C9A30F9D752E0E541062A16B306C5A58BF3FBABF4E61E167114
35,900,582 UART: [art] SIG.R = E78A17FAC979D7647962FB05330609712CDB0370DB7A55BC8D942627CA541B0F711EF1E8AF90D08EDEC01C8415D26E6F
35,907,977 UART: [art] SIG.S = 68C2157EAACF466740C857607E7137A768F0B75FF608085124ABA6BE34AC74EAF51337FB46290FED11712B9668DB077B
37,213,051 UART: Caliptra RT
37,213,767 UART: [state] CFI Enabled
37,390,609 UART: [rt] RT listening for mailbox commands...
37,392,926 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,548,120 UART: [rt]cmd =0x41544d4e, len=14344
37,550,088 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
192,442 UART:
192,818 UART: Running Caliptra ROM ...
193,949 UART:
603,421 UART: [state] CFI Enabled
616,887 UART: [state] LifecycleState = Unprovisioned
618,753 UART: [state] DebugLocked = No
620,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,481 UART: [kat] SHA2-256
794,170 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,715 UART: [kat] ++
805,234 UART: [kat] sha1
814,894 UART: [kat] SHA2-256
817,616 UART: [kat] SHA2-384
822,036 UART: [kat] SHA2-512-ACC
824,399 UART: [kat] ECC-384
3,108,617 UART: [kat] HMAC-384Kdf
3,119,837 UART: [kat] LMS
4,310,002 UART: [kat] --
4,313,445 UART: [cold-reset] ++
4,315,021 UART: [fht] Storing FHT @ 0x50003400
4,326,353 UART: [idev] ++
4,326,911 UART: [idev] CDI.KEYID = 6
4,327,935 UART: [idev] SUBJECT.KEYID = 7
4,329,103 UART: [idev] UDS.KEYID = 0
4,330,203 ready_for_fw is high
4,330,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,340 UART: [idev] Erasing UDS.KEYID = 0
7,613,881 UART: [idev] Using Sha1 for KeyId Algorithm
7,635,303 UART: [idev] --
7,638,299 UART: [ldev] ++
7,638,926 UART: [ldev] CDI.KEYID = 6
7,639,842 UART: [ldev] SUBJECT.KEYID = 5
7,641,046 UART: [ldev] AUTHORITY.KEYID = 7
7,642,345 UART: [ldev] FE.KEYID = 1
7,653,368 UART: [ldev] Erasing FE.KEYID = 1
10,942,807 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,866 UART: [ldev] --
13,304,858 UART: [fwproc] Waiting for Commands...
13,307,862 UART: [fwproc] Received command 0x46574c44
13,310,099 UART: [fwproc] Received Image of size 118548 bytes
22,233,602 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,313,952 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,387,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,715,721 >>> mbox cmd response: success
22,720,205 UART: [afmc] ++
22,720,844 UART: [afmc] CDI.KEYID = 6
22,721,761 UART: [afmc] SUBJECT.KEYID = 7
22,722,980 UART: [afmc] AUTHORITY.KEYID = 5
26,039,815 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,335,075 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,337,330 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,351,867 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,366,610 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,381,001 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,401,992 UART: [afmc] --
28,405,639 UART: [cold-reset] --
28,409,282 UART: [state] Locking Datavault
28,414,154 UART: [state] Locking PCR0, PCR1 and PCR31
28,415,907 UART: [state] Locking ICCM
28,417,812 UART: [exit] Launching FMC @ 0x40000130
28,426,202 UART:
28,426,453 UART: Running Caliptra FMC ...
28,427,555 UART:
28,427,716 UART: [state] CFI Enabled
28,435,575 UART: [fht] FMC Alias Private Key: 7
30,775,332 UART: [art] Extend RT PCRs Done
30,776,543 UART: [art] Lock RT PCRs Done
30,778,224 UART: [art] Populate DV Done
30,783,368 UART: [fht] FMC Alias Private Key: 7
30,785,058 UART: [art] Derive CDI
30,785,871 UART: [art] Store in slot 0x4
30,828,474 UART: [art] Derive Key Pair
30,829,777 UART: [art] Store priv key in slot 0x5
34,070,860 UART: [art] Derive Key Pair - Done
34,083,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,363,907 UART: [art] Erasing AUTHORITY.KEYID = 7
36,365,413 UART: [art] PUB.X = F1AA67C07EFCCE6C005257C984B2079A59569DC982EAA3C5233A4217EF37E5CEC5768BAD4A3F2543927253598AB1822D
36,372,671 UART: [art] PUB.Y = 238ACE0A0860B565CD91ECF14FA10DE0661C15E2EDF62EE82BE09E1C99F821B8F4AE3EF21A63E3795E16C129C62B1A4B
36,379,905 UART: [art] SIG.R = ECAC7375046510D922FD3D82817C466DC4E46F91C07885D46416459F2108D0C2992B432B567888261577094B0B1AD969
36,387,291 UART: [art] SIG.S = F0F55A50B9A3787EF98EB6518815D6BAE262542E54329A9F30FC6DE4344F3FF5DD0C0C5312505526909B6BD787FBEED0
37,691,718 UART: Caliptra RT
37,692,408 UART: [state] CFI Enabled
37,825,113 UART: [rt] RT listening for mailbox commands...
37,827,672 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,983,191 UART: [rt]cmd =0x41544d4e, len=14344
37,985,210 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
4,127,773 ready_for_fw is high
4,128,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,530,953 >>> mbox cmd response: success
28,171,352 UART:
28,171,757 UART: Running Caliptra FMC ...
28,172,943 UART:
28,173,112 UART: [state] CFI Enabled
28,181,045 UART: [fht] FMC Alias Private Key: 7
30,520,619 UART: [art] Extend RT PCRs Done
30,521,848 UART: [art] Lock RT PCRs Done
30,523,164 UART: [art] Populate DV Done
30,528,415 UART: [fht] FMC Alias Private Key: 7
30,530,005 UART: [art] Derive CDI
30,530,842 UART: [art] Store in slot 0x4
30,573,490 UART: [art] Derive Key Pair
30,574,491 UART: [art] Store priv key in slot 0x5
33,816,545 UART: [art] Derive Key Pair - Done
33,829,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,109,618 UART: [art] Erasing AUTHORITY.KEYID = 7
36,111,130 UART: [art] PUB.X = 8D6F1B52C146C75BE44797EAC6EE5FA6EDB855D47000DD577B26C9AF574DD49F0024378D2C407A8E8A02988E22B47BFC
36,118,399 UART: [art] PUB.Y = A187DF8C05F7279F35C5340AF72643672E73C41B6B2842C012A06E74F171DAD2CF060A5BAC621C32FAB736B37063D6A5
36,125,633 UART: [art] SIG.R = 3E527215AF5B69F832F72476D38A42D62B0B9273CE2A6C8E6D9B3995057B0A51083426DC008585CD0F2889E7053726A1
36,132,973 UART: [art] SIG.S = CE033DA39D331D2E3DF637A810B62FD424D94A7295F5D6A72D8C927582A58E3C32100BEE0ED57457E7624C3FD22097D8
37,437,833 UART: Caliptra RT
37,438,541 UART: [state] CFI Enabled
37,571,341 UART: [rt] RT listening for mailbox commands...
37,573,636 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,728,846 UART: [rt]cmd =0x41544d4e, len=14344
37,730,764 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,016 UART:
192,391 UART: Running Caliptra ROM ...
193,527 UART:
193,673 UART: [state] CFI Enabled
261,696 UART: [state] LifecycleState = Unprovisioned
263,690 UART: [state] DebugLocked = No
266,148 UART: [state] WD Timer not started. Device not locked for debugging
269,192 UART: [kat] SHA2-256
448,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,642 UART: [kat] ++
460,091 UART: [kat] sha1
471,134 UART: [kat] SHA2-256
473,854 UART: [kat] SHA2-384
478,207 UART: [kat] SHA2-512-ACC
480,579 UART: [kat] ECC-384
2,925,537 UART: [kat] HMAC-384Kdf
2,949,778 UART: [kat] LMS
3,426,333 UART: [kat] --
3,430,214 UART: [cold-reset] ++
3,431,931 UART: [fht] FHT @ 0x50003400
3,443,040 UART: [idev] ++
3,443,601 UART: [idev] CDI.KEYID = 6
3,444,576 UART: [idev] SUBJECT.KEYID = 7
3,445,742 UART: [idev] UDS.KEYID = 0
3,446,806 ready_for_fw is high
3,447,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,089 UART: [idev] Erasing UDS.KEYID = 0
5,966,135 UART: [idev] Sha1 KeyId Algorithm
5,990,494 UART: [idev] --
5,995,398 UART: [ldev] ++
5,996,026 UART: [ldev] CDI.KEYID = 6
5,996,912 UART: [ldev] SUBJECT.KEYID = 5
5,998,113 UART: [ldev] AUTHORITY.KEYID = 7
5,999,395 UART: [ldev] FE.KEYID = 1
6,035,537 UART: [ldev] Erasing FE.KEYID = 1
8,543,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,171 UART: [ldev] --
10,351,211 UART: [fwproc] Wait for Commands...
10,354,215 UART: [fwproc] Recv command 0x46574c44
10,356,243 UART: [fwproc] Recv'd Img size: 118548 bytes
14,914,343 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,001,938 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,074,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,404,016 >>> mbox cmd response: success
15,407,598 UART: [afmc] ++
15,408,185 UART: [afmc] CDI.KEYID = 6
15,409,089 UART: [afmc] SUBJECT.KEYID = 7
15,410,360 UART: [afmc] AUTHORITY.KEYID = 5
17,934,668 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,662,175 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,664,343 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,680,186 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,696,143 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,711,812 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,736,795 UART: [afmc] --
19,740,730 UART: [cold-reset] --
19,743,726 UART: [state] Locking Datavault
19,749,507 UART: [state] Locking PCR0, PCR1 and PCR31
19,751,264 UART: [state] Locking ICCM
19,753,086 UART: [exit] Launching FMC @ 0x40000130
19,761,535 UART:
19,761,767 UART: Running Caliptra FMC ...
19,762,861 UART:
19,763,018 UART: [state] CFI Enabled
19,818,810 UART: [fht] FMC Alias Private Key: 7
21,585,457 UART: [art] Extend RT PCRs Done
21,586,675 UART: [art] Lock RT PCRs Done
21,588,295 UART: [art] Populate DV Done
21,593,884 UART: [fht] FMC Alias Private Key: 7
21,595,533 UART: [art] Derive CDI
21,596,340 UART: [art] Store in slot 0x4
21,651,785 UART: [art] Derive Key Pair
21,652,822 UART: [art] Store priv key in slot 0x5
24,115,687 UART: [art] Derive Key Pair - Done
24,128,805 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,843,062 UART: [art] Erasing AUTHORITY.KEYID = 7
25,844,584 UART: [art] PUB.X = A22EC8B84B726061F0EA591A868C92AFCD287F06996DFAD4924724BF96205FB687E6DCEDA15261BDCCD4EDB3F8A64C02
25,851,834 UART: [art] PUB.Y = 9CCA62C9E267FB17AB79A5574977D91B85335F0BC27930FE56DE89A6FEE55396B6E509778F0CE8D68F30CA1AA8DD0F9C
25,859,121 UART: [art] SIG.R = B9DD987F9BC76F34BBEFDD76FE4506FE6AC5131C3DC08FA04BBF918BE180D2163CFC7B1C74F305BD100DA383053D5940
25,866,507 UART: [art] SIG.S = E65E992A9A7CEC5FC55DD20EE5931E46766B5C6910303CDA56FBB5C12DEE9FDB4A16237C1DBEBBFAEEB4446B35D6FFF2
26,845,331 UART: Caliptra RT
26,846,054 UART: [state] CFI Enabled
27,025,491 UART: [rt] RT listening for mailbox commands...
27,027,817 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,183,264 UART: [rt]cmd =0x41544d4e, len=14344
27,185,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,458,821 ready_for_fw is high
3,459,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,376,132 >>> mbox cmd response: success
19,661,262 UART:
19,661,664 UART: Running Caliptra FMC ...
19,662,767 UART:
19,662,915 UART: [state] CFI Enabled
19,732,437 UART: [fht] FMC Alias Private Key: 7
21,498,228 UART: [art] Extend RT PCRs Done
21,499,453 UART: [art] Lock RT PCRs Done
21,501,534 UART: [art] Populate DV Done
21,507,006 UART: [fht] FMC Alias Private Key: 7
21,508,661 UART: [art] Derive CDI
21,509,395 UART: [art] Store in slot 0x4
21,565,295 UART: [art] Derive Key Pair
21,566,335 UART: [art] Store priv key in slot 0x5
24,029,148 UART: [art] Derive Key Pair - Done
24,042,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,754,862 UART: [art] Erasing AUTHORITY.KEYID = 7
25,756,380 UART: [art] PUB.X = ED79985B3EE28BD017486310E8E46A371BCE85EB78F6DC5D53E92B58991FBD0DB54134DFA1456A8B1EAFF6410DE11A27
25,763,695 UART: [art] PUB.Y = 53EA8A998FE1B7272423B4AE0CD2D984FE69245DB644B9645980D191DB92D92D922EBCBDF6F964EE047192F0D0183359
25,770,908 UART: [art] SIG.R = D0CC0674AF5C5E21B69831560E1DA9BE9E9B3F0DDD949FB5F67A6E61FD09C6E53B652962711DC43D3A1A21536898780C
25,778,314 UART: [art] SIG.S = 536936829941F1F1B73EE194D32E2510DFF7AF2D10E3A062C1A07CAFBE942A1F816FC5EA9DF0AFD824256A58D1CA99E1
26,756,792 UART: Caliptra RT
26,757,505 UART: [state] CFI Enabled
26,938,180 UART: [rt] RT listening for mailbox commands...
26,940,497 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,095,958 UART: [rt]cmd =0x41544d4e, len=14344
27,097,663 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,438 UART:
192,798 UART: Running Caliptra ROM ...
193,944 UART:
603,512 UART: [state] CFI Enabled
613,986 UART: [state] LifecycleState = Unprovisioned
615,865 UART: [state] DebugLocked = No
617,538 UART: [state] WD Timer not started. Device not locked for debugging
621,225 UART: [kat] SHA2-256
800,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,666 UART: [kat] ++
812,205 UART: [kat] sha1
823,444 UART: [kat] SHA2-256
826,167 UART: [kat] SHA2-384
831,050 UART: [kat] SHA2-512-ACC
833,403 UART: [kat] ECC-384
3,274,151 UART: [kat] HMAC-384Kdf
3,285,471 UART: [kat] LMS
3,761,968 UART: [kat] --
3,765,759 UART: [cold-reset] ++
3,767,053 UART: [fht] FHT @ 0x50003400
3,777,703 UART: [idev] ++
3,778,265 UART: [idev] CDI.KEYID = 6
3,779,219 UART: [idev] SUBJECT.KEYID = 7
3,780,463 UART: [idev] UDS.KEYID = 0
3,781,450 ready_for_fw is high
3,781,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,930,492 UART: [idev] Erasing UDS.KEYID = 0
6,261,043 UART: [idev] Sha1 KeyId Algorithm
6,283,720 UART: [idev] --
6,289,149 UART: [ldev] ++
6,289,788 UART: [ldev] CDI.KEYID = 6
6,290,864 UART: [ldev] SUBJECT.KEYID = 5
6,291,971 UART: [ldev] AUTHORITY.KEYID = 7
6,293,145 UART: [ldev] FE.KEYID = 1
6,303,849 UART: [ldev] Erasing FE.KEYID = 1
8,784,432 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,933 UART: [ldev] --
10,579,282 UART: [fwproc] Wait for Commands...
10,580,846 UART: [fwproc] Recv command 0x46574c44
10,582,830 UART: [fwproc] Recv'd Img size: 118548 bytes
15,120,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,207,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,280,200 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,608,635 >>> mbox cmd response: success
15,612,727 UART: [afmc] ++
15,613,350 UART: [afmc] CDI.KEYID = 6
15,614,242 UART: [afmc] SUBJECT.KEYID = 7
15,615,518 UART: [afmc] AUTHORITY.KEYID = 5
18,118,493 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,840,946 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,843,129 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,858,956 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,874,934 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,890,583 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,915,061 UART: [afmc] --
19,919,697 UART: [cold-reset] --
19,922,965 UART: [state] Locking Datavault
19,929,403 UART: [state] Locking PCR0, PCR1 and PCR31
19,931,101 UART: [state] Locking ICCM
19,933,496 UART: [exit] Launching FMC @ 0x40000130
19,941,952 UART:
19,942,189 UART: Running Caliptra FMC ...
19,943,218 UART:
19,943,368 UART: [state] CFI Enabled
19,951,592 UART: [fht] FMC Alias Private Key: 7
21,718,354 UART: [art] Extend RT PCRs Done
21,719,576 UART: [art] Lock RT PCRs Done
21,721,230 UART: [art] Populate DV Done
21,726,721 UART: [fht] FMC Alias Private Key: 7
21,728,378 UART: [art] Derive CDI
21,729,194 UART: [art] Store in slot 0x4
21,771,901 UART: [art] Derive Key Pair
21,772,905 UART: [art] Store priv key in slot 0x5
24,200,015 UART: [art] Derive Key Pair - Done
24,212,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,919,230 UART: [art] Erasing AUTHORITY.KEYID = 7
25,920,737 UART: [art] PUB.X = 6C01D44B1A1E7AE56CCC7E3EB147698DF4D82D0A0DF9E3BEEF9561EE921E884A095A09D60B98E985AEE74CFFAD480EB7
25,928,038 UART: [art] PUB.Y = 8522FBA917015D25267BA2636F63DAAD28B796302A2B40BE7F06E221FEAA7CE67EC9EFC7839C38D0DC4B77D51BC08A9D
25,935,334 UART: [art] SIG.R = 791A8F15B260FAA877DC775F8907D13A96E248696F39E53567ACBFCA50A74C962176BBEF54F52C9706157C1BFE88F2B3
25,942,733 UART: [art] SIG.S = 81E779E4BDC4FF593FEA026150F477485BC1B9DCE4DD225B8C5DE8E5FA904EE111ECE35CC588C877867F6B24D421781C
26,921,259 UART: Caliptra RT
26,921,949 UART: [state] CFI Enabled
27,055,045 UART: [rt] RT listening for mailbox commands...
27,057,342 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,212,942 UART: [rt]cmd =0x41544d4e, len=14344
27,214,971 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,783,233 ready_for_fw is high
3,783,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,601,962 >>> mbox cmd response: success
19,848,164 UART:
19,848,570 UART: Running Caliptra FMC ...
19,849,682 UART:
19,849,842 UART: [state] CFI Enabled
19,857,753 UART: [fht] FMC Alias Private Key: 7
21,624,201 UART: [art] Extend RT PCRs Done
21,625,435 UART: [art] Lock RT PCRs Done
21,627,038 UART: [art] Populate DV Done
21,632,198 UART: [fht] FMC Alias Private Key: 7
21,633,854 UART: [art] Derive CDI
21,634,677 UART: [art] Store in slot 0x4
21,677,544 UART: [art] Derive Key Pair
21,678,550 UART: [art] Store priv key in slot 0x5
24,105,382 UART: [art] Derive Key Pair - Done
24,118,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,825,090 UART: [art] Erasing AUTHORITY.KEYID = 7
25,827,113 UART: [art] PUB.X = 6127807ECED096DEAEC0B2DE1025AC4C376095DA301D8286661C00DE1055A05419EF3ABA56D50F30D1A4ECA750986AB2
25,833,873 UART: [art] PUB.Y = 948D8393475067E6B57A4FFCB004F0EC27D35761DC924AE7FB695E9A224A47AD82838039D0C59177BFCD225CD9357FB0
25,841,148 UART: [art] SIG.R = A055F9FB6031B53E5CA1F4E8AD586E1C2AE499E0952A906464C34C43CF8D43C464C441848D817D50E6D8BB11604EF2FA
25,848,512 UART: [art] SIG.S = 4920A6C489722F88E5C89CC216B36BB694EBB5F161DEF0EEC9F6C4C212A1303C06BA2A9DDA4DA303DD31BFA8C9DA228A
26,827,848 UART: Caliptra RT
26,828,562 UART: [state] CFI Enabled
26,960,837 UART: [rt] RT listening for mailbox commands...
26,963,156 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,118,533 UART: [rt]cmd =0x41544d4e, len=14344
27,120,667 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,150 UART:
192,515 UART: Running Caliptra ROM ...
193,716 UART:
193,871 UART: [state] CFI Enabled
261,380 UART: [state] LifecycleState = Unprovisioned
263,805 UART: [state] DebugLocked = No
266,544 UART: [state] WD Timer not started. Device not locked for debugging
271,000 UART: [kat] SHA2-256
460,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,715 UART: [kat] ++
472,168 UART: [kat] sha1
482,541 UART: [kat] SHA2-256
485,547 UART: [kat] SHA2-384
492,175 UART: [kat] SHA2-512-ACC
494,752 UART: [kat] ECC-384
2,944,801 UART: [kat] HMAC-384Kdf
2,969,416 UART: [kat] LMS
3,501,186 UART: [kat] --
3,504,346 UART: [cold-reset] ++
3,506,346 UART: [fht] FHT @ 0x50003400
3,518,882 UART: [idev] ++
3,519,596 UART: [idev] CDI.KEYID = 6
3,520,577 UART: [idev] SUBJECT.KEYID = 7
3,521,744 UART: [idev] UDS.KEYID = 0
3,522,639 ready_for_fw is high
3,522,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,895 UART: [idev] Erasing UDS.KEYID = 0
6,027,704 UART: [idev] Sha1 KeyId Algorithm
6,049,970 UART: [idev] --
6,055,422 UART: [ldev] ++
6,056,106 UART: [ldev] CDI.KEYID = 6
6,057,169 UART: [ldev] SUBJECT.KEYID = 5
6,058,294 UART: [ldev] AUTHORITY.KEYID = 7
6,059,474 UART: [ldev] FE.KEYID = 1
6,098,702 UART: [ldev] Erasing FE.KEYID = 1
8,607,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,530 UART: [ldev] --
10,412,198 UART: [fwproc] Wait for Commands...
10,414,558 UART: [fwproc] Recv command 0x46574c44
10,416,811 UART: [fwproc] Recv'd Img size: 118548 bytes
15,083,078 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,166,668 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,290,272 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,850,795 >>> mbox cmd response: success
15,854,199 UART: [afmc] ++
15,854,974 UART: [afmc] CDI.KEYID = 6
15,856,030 UART: [afmc] SUBJECT.KEYID = 7
15,857,586 UART: [afmc] AUTHORITY.KEYID = 5
18,386,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,130,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,132,137 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,147,282 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,162,492 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,177,518 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,201,010 UART: [afmc] --
20,204,221 UART: [cold-reset] --
20,206,513 UART: [state] Locking Datavault
20,211,117 UART: [state] Locking PCR0, PCR1 and PCR31
20,213,269 UART: [state] Locking ICCM
20,214,394 UART: [exit] Launching FMC @ 0x40000130
20,223,095 UART:
20,223,383 UART: Running Caliptra FMC ...
20,224,492 UART:
20,224,648 UART: [state] CFI Enabled
20,288,192 UART: [fht] FMC Alias Private Key: 7
22,054,762 UART: [art] Extend RT PCRs Done
22,055,988 UART: [art] Lock RT PCRs Done
22,057,615 UART: [art] Populate DV Done
22,063,085 UART: [fht] FMC Alias Private Key: 7
22,064,664 UART: [art] Derive CDI
22,065,487 UART: [art] Store in slot 0x4
22,120,904 UART: [art] Derive Key Pair
22,121,902 UART: [art] Store priv key in slot 0x5
24,584,764 UART: [art] Derive Key Pair - Done
24,597,861 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,310,990 UART: [art] Erasing AUTHORITY.KEYID = 7
26,312,522 UART: [art] PUB.X = 32DEA72D0BE7C796D2024C1EF95A93F5F1A804C19CB65091DDCFB03CA917A33CBA19B1327D3DAF3E42FF12DA82C51073
26,319,794 UART: [art] PUB.Y = A7F101D98C377237004B6EAEC9BD5A8042E50D2D2C831D58FADBFD7F890AEC7C51E79D063963F6D45AE30992418A6324
26,327,030 UART: [art] SIG.R = 5304AC27ABE0CC08DE3A49BDEE0560C019785F435849B42D04CFCBCB0A6F3D7F2D98440D82FE06E1CB25991890E2FF6D
26,334,432 UART: [art] SIG.S = F2832309A34BDDE3670CE2438133722211F67187DCD020DF2A0D176319BDFF392FAFBB5FF43161CA444AE24E0C72EA3E
27,313,104 UART: Caliptra RT
27,313,798 UART: [state] CFI Enabled
27,495,001 UART: [rt] RT listening for mailbox commands...
27,497,315 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,652,821 UART: [rt]cmd =0x41544d4e, len=14344
27,654,752 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,436,709 ready_for_fw is high
3,437,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,914,847 >>> mbox cmd response: success
20,196,888 UART:
20,197,279 UART: Running Caliptra FMC ...
20,198,482 UART:
20,198,655 UART: [state] CFI Enabled
20,265,935 UART: [fht] FMC Alias Private Key: 7
22,032,538 UART: [art] Extend RT PCRs Done
22,033,765 UART: [art] Lock RT PCRs Done
22,035,183 UART: [art] Populate DV Done
22,040,434 UART: [fht] FMC Alias Private Key: 7
22,041,988 UART: [art] Derive CDI
22,042,752 UART: [art] Store in slot 0x4
22,098,763 UART: [art] Derive Key Pair
22,099,801 UART: [art] Store priv key in slot 0x5
24,562,793 UART: [art] Derive Key Pair - Done
24,575,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,289,117 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,646 UART: [art] PUB.X = 6739D3DF723CF4B9BC045304749289B033160A4BAE03EAC7F30ECFE57FEEAF3CDA8D9F8AEE2E536F89D6B99FD331614E
26,297,887 UART: [art] PUB.Y = 2B59BA004D007D179802D1670D757B9AB5A666EA8AE5B2AFB36BBA9AC3656FA7CA6C4575FDB39F35DAA0C66163B906BE
26,305,134 UART: [art] SIG.R = BABF6A59B563ED78A7C23FC9D758E84D215F9A1381DD020DAEF4BCC471CC3422609DDBA95531E1DA611ACE049A7C1B02
26,312,563 UART: [art] SIG.S = 5E8F8C2DD8D7BD524995B1F62E182CB35ED2E96C0E3DBB47794588A2434A820CF03BAD25678A8001AAF90BD349F325B9
27,291,582 UART: Caliptra RT
27,292,296 UART: [state] CFI Enabled
27,473,128 UART: [rt] RT listening for mailbox commands...
27,475,435 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,630,755 UART: [rt]cmd =0x41544d4e, len=14344
27,632,667 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,373 UART:
192,739 UART: Running Caliptra ROM ...
193,889 UART:
603,485 UART: [state] CFI Enabled
615,960 UART: [state] LifecycleState = Unprovisioned
618,342 UART: [state] DebugLocked = No
619,584 UART: [state] WD Timer not started. Device not locked for debugging
624,759 UART: [kat] SHA2-256
814,656 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,401 UART: [kat] ++
825,926 UART: [kat] sha1
837,795 UART: [kat] SHA2-256
840,819 UART: [kat] SHA2-384
846,929 UART: [kat] SHA2-512-ACC
849,524 UART: [kat] ECC-384
3,293,123 UART: [kat] HMAC-384Kdf
3,305,878 UART: [kat] LMS
3,837,730 UART: [kat] --
3,841,739 UART: [cold-reset] ++
3,843,039 UART: [fht] FHT @ 0x50003400
3,855,097 UART: [idev] ++
3,855,808 UART: [idev] CDI.KEYID = 6
3,856,689 UART: [idev] SUBJECT.KEYID = 7
3,857,934 UART: [idev] UDS.KEYID = 0
3,858,838 ready_for_fw is high
3,859,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,885 UART: [idev] Erasing UDS.KEYID = 0
6,337,013 UART: [idev] Sha1 KeyId Algorithm
6,359,918 UART: [idev] --
6,364,265 UART: [ldev] ++
6,364,955 UART: [ldev] CDI.KEYID = 6
6,365,873 UART: [ldev] SUBJECT.KEYID = 5
6,367,056 UART: [ldev] AUTHORITY.KEYID = 7
6,368,240 UART: [ldev] FE.KEYID = 1
6,378,836 UART: [ldev] Erasing FE.KEYID = 1
8,855,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,266 UART: [ldev] --
10,646,639 UART: [fwproc] Wait for Commands...
10,649,701 UART: [fwproc] Recv command 0x46574c44
10,652,013 UART: [fwproc] Recv'd Img size: 118548 bytes
15,305,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,390,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,514,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,074,173 >>> mbox cmd response: success
16,079,002 UART: [afmc] ++
16,079,748 UART: [afmc] CDI.KEYID = 6
16,080,872 UART: [afmc] SUBJECT.KEYID = 7
16,082,379 UART: [afmc] AUTHORITY.KEYID = 5
18,586,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,304,494 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,306,411 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,321,519 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,336,778 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,351,807 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,376,570 UART: [afmc] --
20,379,741 UART: [cold-reset] --
20,385,993 UART: [state] Locking Datavault
20,390,406 UART: [state] Locking PCR0, PCR1 and PCR31
20,392,569 UART: [state] Locking ICCM
20,394,376 UART: [exit] Launching FMC @ 0x40000130
20,403,032 UART:
20,403,277 UART: Running Caliptra FMC ...
20,404,308 UART:
20,404,459 UART: [state] CFI Enabled
20,412,625 UART: [fht] FMC Alias Private Key: 7
22,179,245 UART: [art] Extend RT PCRs Done
22,180,471 UART: [art] Lock RT PCRs Done
22,182,238 UART: [art] Populate DV Done
22,187,652 UART: [fht] FMC Alias Private Key: 7
22,189,354 UART: [art] Derive CDI
22,190,095 UART: [art] Store in slot 0x4
22,232,743 UART: [art] Derive Key Pair
22,233,785 UART: [art] Store priv key in slot 0x5
24,660,361 UART: [art] Derive Key Pair - Done
24,673,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,379,182 UART: [art] Erasing AUTHORITY.KEYID = 7
26,380,708 UART: [art] PUB.X = 54D84DA4F07F8C4E0D0E12EE4566FB2C3C9F960BC2CF198165BEBF3F38DC992DBDD766FD269F0CF833914B5FC27D94C9
26,387,984 UART: [art] PUB.Y = 2024DF6A5CE596AE11075FD6D957A1848773F09EFB497BD9760C5735B6E5501C6705B5F706CF1578A7EE3331B8CB60E4
26,395,252 UART: [art] SIG.R = C28EC19E90F9AB8A616289EC3C2D4A5B8138AB2D0DD4C249E751252FC770280B653A62607A47F35028F696C6778D5339
26,402,610 UART: [art] SIG.S = 7881F7EA03A263CCC8C39BB0A17D026E9365DBB0BE5C5DCB4499AED4BFD5AC7A2BBD47CE5C6CF84E2231E44EDD82A61B
27,381,274 UART: Caliptra RT
27,381,968 UART: [state] CFI Enabled
27,514,977 UART: [rt] RT listening for mailbox commands...
27,517,289 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,672,542 UART: [rt]cmd =0x41544d4e, len=14344
27,674,453 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,757,461 ready_for_fw is high
3,757,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,157,598 >>> mbox cmd response: success
20,409,915 UART:
20,410,368 UART: Running Caliptra FMC ...
20,411,496 UART:
20,411,671 UART: [state] CFI Enabled
20,419,898 UART: [fht] FMC Alias Private Key: 7
22,186,598 UART: [art] Extend RT PCRs Done
22,187,826 UART: [art] Lock RT PCRs Done
22,189,196 UART: [art] Populate DV Done
22,194,722 UART: [fht] FMC Alias Private Key: 7
22,196,318 UART: [art] Derive CDI
22,197,137 UART: [art] Store in slot 0x4
22,240,006 UART: [art] Derive Key Pair
22,241,025 UART: [art] Store priv key in slot 0x5
24,668,200 UART: [art] Derive Key Pair - Done
24,680,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,387,016 UART: [art] Erasing AUTHORITY.KEYID = 7
26,388,531 UART: [art] PUB.X = 74FBA6B863FEB9358F45527FA96D182C8BC22D5C63179397AEA75B39E81011A36C615A2EA6F18AF9B07986A9086C4602
26,395,752 UART: [art] PUB.Y = 12AC4FFAAF2DA2BD35A26B123E0A6E623153D2A92B0FA5239845D95E257FBB117627614D414E3AEB0E194504426F853D
26,403,045 UART: [art] SIG.R = F031169996EEA1BF69D7EACE6E9F3AEE1F12C46A1EB014870D8F4B1AB68C5B192035B37BD53DDCEC1D5F1F210B3ECC51
26,410,449 UART: [art] SIG.S = 5CF99D523439461023DC58F72EDFF61BC15DA1A607D1C645D06AC6F1560B53378DD8BBD9BB35731EA19D568F870EB62B
27,388,490 UART: Caliptra RT
27,389,185 UART: [state] CFI Enabled
27,521,963 UART: [rt] RT listening for mailbox commands...
27,524,261 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,679,808 UART: [rt]cmd =0x41544d4e, len=14344
27,681,456 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,893 UART: [kat] SHA2-256
881,824 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,939 UART: [kat] ++
886,091 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,904 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,961 UART: [cold-reset] ++
1,477,293 UART: [fht] Storing FHT @ 0x50003400
1,480,046 UART: [idev] ++
1,480,214 UART: [idev] CDI.KEYID = 6
1,480,574 UART: [idev] SUBJECT.KEYID = 7
1,480,998 UART: [idev] UDS.KEYID = 0
1,481,343 ready_for_fw is high
1,481,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,348 UART: [idev] Erasing UDS.KEYID = 0
1,506,060 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,614 UART: [idev] --
1,515,577 UART: [ldev] ++
1,515,745 UART: [ldev] CDI.KEYID = 6
1,516,108 UART: [ldev] SUBJECT.KEYID = 5
1,516,534 UART: [ldev] AUTHORITY.KEYID = 7
1,516,997 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,002 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,256 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,060 UART: [ldev] --
1,586,569 UART: [fwproc] Waiting for Commands...
1,587,204 UART: [fwproc] Received command 0x46574c44
1,587,995 UART: [fwproc] Received Image of size 118548 bytes
5,168,402 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,197,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,600 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,889 >>> mbox cmd response: success
5,369,921 UART: [afmc] ++
5,370,089 UART: [afmc] CDI.KEYID = 6
5,370,451 UART: [afmc] SUBJECT.KEYID = 7
5,370,876 UART: [afmc] AUTHORITY.KEYID = 5
5,406,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,797 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,577 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,429,283 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,435,162 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,875 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,610 UART: [afmc] --
5,449,722 UART: [cold-reset] --
5,450,426 UART: [state] Locking Datavault
5,451,521 UART: [state] Locking PCR0, PCR1 and PCR31
5,452,125 UART: [state] Locking ICCM
5,452,793 UART: [exit] Launching FMC @ 0x40000130
5,458,123 UART:
5,458,139 UART: Running Caliptra FMC ...
5,458,547 UART:
5,458,601 UART: [state] CFI Enabled
5,469,509 UART: [fht] FMC Alias Private Key: 7
5,588,193 UART: [art] Extend RT PCRs Done
5,588,621 UART: [art] Lock RT PCRs Done
5,590,529 UART: [art] Populate DV Done
5,598,792 UART: [fht] FMC Alias Private Key: 7
5,599,722 UART: [art] Derive CDI
5,600,002 UART: [art] Store in slot 0x4
5,685,284 UART: [art] Derive Key Pair
5,685,644 UART: [art] Store priv key in slot 0x5
5,699,019 UART: [art] Derive Key Pair - Done
5,713,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,729,566 UART: [art] Erasing AUTHORITY.KEYID = 7
5,730,331 UART: [art] PUB.X = 3F8DB4DB26B4F6A64476A7AE4D1B37E06F4B5900091B50B330468A894116F0CE46712564B7D5DC7C03A5514F68BEB63C
5,737,077 UART: [art] PUB.Y = AC8F57F26BAE4053B0C2D25553B68731E23652AAAF07EA2CBECF4706FE1E793F23F85CE48B6B346210AA4260221936C5
5,744,029 UART: [art] SIG.R = A88B824DA1764CF00B56338513CC4014B936E9C90F8D5D517F3E89DA2B4AB754E8B41A5431F1F324FEB634BDFD43879E
5,750,801 UART: [art] SIG.S = F9BC3DCF7E754251F47CD7708E44755B9E26B4279143028D2CB319F379119597FD5E6A83CC9877526126BD1662E043F0
5,774,614 UART: Caliptra RT
5,774,865 UART: [state] CFI Enabled
5,895,578 UART: [rt] RT listening for mailbox commands...
5,896,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,019,378 UART: [rt]cmd =0x41544d4e, len=14344
6,020,825 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,849 ready_for_fw is high
1,361,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,141,993 >>> mbox cmd response: success
5,202,166 UART:
5,202,182 UART: Running Caliptra FMC ...
5,202,590 UART:
5,202,644 UART: [state] CFI Enabled
5,213,496 UART: [fht] FMC Alias Private Key: 7
5,332,098 UART: [art] Extend RT PCRs Done
5,332,526 UART: [art] Lock RT PCRs Done
5,334,020 UART: [art] Populate DV Done
5,342,453 UART: [fht] FMC Alias Private Key: 7
5,343,481 UART: [art] Derive CDI
5,343,761 UART: [art] Store in slot 0x4
5,429,153 UART: [art] Derive Key Pair
5,429,513 UART: [art] Store priv key in slot 0x5
5,442,734 UART: [art] Derive Key Pair - Done
5,457,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,473,548 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,313 UART: [art] PUB.X = B768B0475CFFB00ACC61155193CFEC44E3D0248B84EE1E9144C7266C07C6D1936D74FB0B09ABAE1E2E42372EA1E39405
5,481,078 UART: [art] PUB.Y = 8A39CD99D3BF3B1897FF11B4E135785FF123140F78724B3318CAE3D0B9E7069A3EE5E4E1E26A9EFCE5FB7DC7F4891F21
5,488,036 UART: [art] SIG.R = 1A8F834A94E3A84AEF17FB2B94997DB2E6ABD5D93ED41675EACA876B0E72F1FECB38E37D9B7FB415EEAB43F4514B74A3
5,494,827 UART: [art] SIG.S = EDA5A0EE572FE98475EDA642EA4F1480C983DBB8FD5E69EC22342A8CA8D29BFED142445D7995FC40BB25C154044E18A1
5,518,918 UART: Caliptra RT
5,519,169 UART: [state] CFI Enabled
5,639,983 UART: [rt] RT listening for mailbox commands...
5,640,653 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,763,591 UART: [rt]cmd =0x41544d4e, len=14344
5,764,950 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,985 UART: [state] LifecycleState = Unprovisioned
85,640 UART: [state] DebugLocked = No
86,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,848 UART: [kat] SHA2-256
881,779 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,894 UART: [kat] ++
886,046 UART: [kat] sha1
890,370 UART: [kat] SHA2-256
892,308 UART: [kat] SHA2-384
894,973 UART: [kat] SHA2-512-ACC
896,874 UART: [kat] ECC-384
902,541 UART: [kat] HMAC-384Kdf
907,091 UART: [kat] LMS
1,475,287 UART: [kat] --
1,476,182 UART: [cold-reset] ++
1,476,668 UART: [fht] Storing FHT @ 0x50003400
1,479,501 UART: [idev] ++
1,479,669 UART: [idev] CDI.KEYID = 6
1,480,029 UART: [idev] SUBJECT.KEYID = 7
1,480,453 UART: [idev] UDS.KEYID = 0
1,480,798 ready_for_fw is high
1,480,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,575 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,177 UART: [idev] --
1,515,056 UART: [ldev] ++
1,515,224 UART: [ldev] CDI.KEYID = 6
1,515,587 UART: [ldev] SUBJECT.KEYID = 5
1,516,013 UART: [ldev] AUTHORITY.KEYID = 7
1,516,476 UART: [ldev] FE.KEYID = 1
1,521,662 UART: [ldev] Erasing FE.KEYID = 1
1,547,339 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,985 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,917 UART: [ldev] --
1,586,298 UART: [fwproc] Waiting for Commands...
1,587,153 UART: [fwproc] Received command 0x46574c44
1,587,944 UART: [fwproc] Received Image of size 118548 bytes
5,205,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,234,424 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,265,642 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,405,993 >>> mbox cmd response: success
5,407,125 UART: [afmc] ++
5,407,293 UART: [afmc] CDI.KEYID = 6
5,407,655 UART: [afmc] SUBJECT.KEYID = 7
5,408,080 UART: [afmc] AUTHORITY.KEYID = 5
5,443,547 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,459,909 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,460,689 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,466,395 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,472,274 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,477,987 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,485,906 UART: [afmc] --
5,486,892 UART: [cold-reset] --
5,487,738 UART: [state] Locking Datavault
5,488,927 UART: [state] Locking PCR0, PCR1 and PCR31
5,489,531 UART: [state] Locking ICCM
5,489,973 UART: [exit] Launching FMC @ 0x40000130
5,495,303 UART:
5,495,319 UART: Running Caliptra FMC ...
5,495,727 UART:
5,495,870 UART: [state] CFI Enabled
5,506,214 UART: [fht] FMC Alias Private Key: 7
5,624,724 UART: [art] Extend RT PCRs Done
5,625,152 UART: [art] Lock RT PCRs Done
5,626,722 UART: [art] Populate DV Done
5,635,057 UART: [fht] FMC Alias Private Key: 7
5,636,163 UART: [art] Derive CDI
5,636,443 UART: [art] Store in slot 0x4
5,722,287 UART: [art] Derive Key Pair
5,722,647 UART: [art] Store priv key in slot 0x5
5,735,788 UART: [art] Derive Key Pair - Done
5,750,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,765,483 UART: [art] Erasing AUTHORITY.KEYID = 7
5,766,248 UART: [art] PUB.X = 3FB8F659BE7C3F4C1779180EBA99B7219B12447CC8C1E2A57F6CF2F882FF6577CA9120D51EFEF900CF4B9F1A661008AC
5,773,004 UART: [art] PUB.Y = 16AC14155270D1B07E432195233282138C6B9AE48D24E743FD68CC6379C7709F977A52481BE1D70816BCF43865EB2E95
5,779,943 UART: [art] SIG.R = E3D2CFD724BAC893E9D3937161CD2E08844F9EAF1587C9115B73350A40EEE6EBE024A35B70AC8C435E5A25EF99FA8F55
5,786,721 UART: [art] SIG.S = BB139515CA3470AEDAC2A6A387E239D11C299A9BF882ACFF348674D0BE3D2251709E10334813220DE72868D5DE21FBF3
5,810,624 UART: Caliptra RT
5,810,967 UART: [state] CFI Enabled
5,930,840 UART: [rt] RT listening for mailbox commands...
5,931,510 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,054,658 UART: [rt]cmd =0x41544d4e, len=14344
6,056,345 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,014 ready_for_fw is high
1,363,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,180,325 >>> mbox cmd response: success
5,242,138 UART:
5,242,154 UART: Running Caliptra FMC ...
5,242,562 UART:
5,242,705 UART: [state] CFI Enabled
5,253,579 UART: [fht] FMC Alias Private Key: 7
5,371,963 UART: [art] Extend RT PCRs Done
5,372,391 UART: [art] Lock RT PCRs Done
5,374,055 UART: [art] Populate DV Done
5,382,278 UART: [fht] FMC Alias Private Key: 7
5,383,252 UART: [art] Derive CDI
5,383,532 UART: [art] Store in slot 0x4
5,469,554 UART: [art] Derive Key Pair
5,469,914 UART: [art] Store priv key in slot 0x5
5,483,755 UART: [art] Derive Key Pair - Done
5,498,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,514,043 UART: [art] Erasing AUTHORITY.KEYID = 7
5,514,808 UART: [art] PUB.X = 418BB8C098D44048F1DA22F74E9C2D2C9410976B3FE234FCF68EC1D263C9D370D0DAC6E33673C406E7DDC933B010FF14
5,521,585 UART: [art] PUB.Y = 1A4A3B573AEAC7DBDC881947E2B3C2D227C7D803B67AA3555EA51A3B7C881AD5FB26E9B74AA33034B0ABF674D2249B1F
5,528,550 UART: [art] SIG.R = 6AA972D0C11270B1A009EED2013727F267F690A83765EBEE192A7F797308D9E039E41D11AAB6519B7002338E59F38EDD
5,535,308 UART: [art] SIG.S = 1395F1BEA6AE08B28BB3AAE944FF237EDC43A5F00A7DB33201694795861AB677D7A76A3A26ED547FDD097B0334732DDF
5,558,921 UART: Caliptra RT
5,559,264 UART: [state] CFI Enabled
5,680,213 UART: [rt] RT listening for mailbox commands...
5,680,883 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,803,709 UART: [rt]cmd =0x41544d4e, len=14344
5,805,112 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,746 UART: [state] LifecycleState = Unprovisioned
85,401 UART: [state] DebugLocked = No
86,085 UART: [state] WD Timer not started. Device not locked for debugging
87,366 UART: [kat] SHA2-256
890,916 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,020 UART: [kat] ++
895,172 UART: [kat] sha1
899,260 UART: [kat] SHA2-256
901,200 UART: [kat] SHA2-384
903,937 UART: [kat] SHA2-512-ACC
905,838 UART: [kat] ECC-384
915,193 UART: [kat] HMAC-384Kdf
919,753 UART: [kat] LMS
1,168,065 UART: [kat] --
1,169,048 UART: [cold-reset] ++
1,169,396 UART: [fht] FHT @ 0x50003400
1,172,164 UART: [idev] ++
1,172,332 UART: [idev] CDI.KEYID = 6
1,172,693 UART: [idev] SUBJECT.KEYID = 7
1,173,118 UART: [idev] UDS.KEYID = 0
1,173,464 ready_for_fw is high
1,173,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,263 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,208,100 UART: [ldev] ++
1,208,268 UART: [ldev] CDI.KEYID = 6
1,208,632 UART: [ldev] SUBJECT.KEYID = 5
1,209,059 UART: [ldev] AUTHORITY.KEYID = 7
1,209,522 UART: [ldev] FE.KEYID = 1
1,214,768 UART: [ldev] Erasing FE.KEYID = 1
1,240,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,632 UART: [ldev] --
1,279,993 UART: [fwproc] Wait for Commands...
1,280,808 UART: [fwproc] Recv command 0x46574c44
1,281,541 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,190,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,221,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,361,993 >>> mbox cmd response: success
3,363,117 UART: [afmc] ++
3,363,285 UART: [afmc] CDI.KEYID = 6
3,363,648 UART: [afmc] SUBJECT.KEYID = 7
3,364,074 UART: [afmc] AUTHORITY.KEYID = 5
3,399,945 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,416,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,417,181 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,422,888 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,428,765 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,434,475 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,442,187 UART: [afmc] --
3,443,000 UART: [cold-reset] --
3,443,922 UART: [state] Locking Datavault
3,445,191 UART: [state] Locking PCR0, PCR1 and PCR31
3,445,795 UART: [state] Locking ICCM
3,446,351 UART: [exit] Launching FMC @ 0x40000130
3,451,681 UART:
3,451,697 UART: Running Caliptra FMC ...
3,452,105 UART:
3,452,159 UART: [state] CFI Enabled
3,462,899 UART: [fht] FMC Alias Private Key: 7
3,582,269 UART: [art] Extend RT PCRs Done
3,582,697 UART: [art] Lock RT PCRs Done
3,584,133 UART: [art] Populate DV Done
3,592,606 UART: [fht] FMC Alias Private Key: 7
3,593,646 UART: [art] Derive CDI
3,593,926 UART: [art] Store in slot 0x4
3,679,567 UART: [art] Derive Key Pair
3,679,927 UART: [art] Store priv key in slot 0x5
3,693,085 UART: [art] Derive Key Pair - Done
3,707,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,723,923 UART: [art] PUB.X = 48B97C630A4F5EB5115410A6190525411408A640F701828832967960E07B6DABD174682371C24265F946A6614DA09D90
3,730,661 UART: [art] PUB.Y = DA6C9F9944BAD9357AE3401CF90513D01451B71DD7BCA0B18240C919535A3C418E4777DAC6CADF78B74D015203AEAD70
3,737,612 UART: [art] SIG.R = 927ACD7595CE64DDD5B12316024E9F2E920CAACDD87EF78D10E12F4A6700483EBFD118DB73D9013287848370AF782AE5
3,744,359 UART: [art] SIG.S = 3A4787090B986594A4641031DDFCC0C0EDA42F6E13BBA6BBF81865C05A10B9F906B3A8946F6991DC0D32D005638553D4
3,767,888 UART: Caliptra RT
3,768,139 UART: [state] CFI Enabled
3,888,387 UART: [rt] RT listening for mailbox commands...
3,889,057 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,012,037 UART: [rt]cmd =0x41544d4e, len=14344
4,013,784 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,624 ready_for_fw is high
1,058,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,222,757 >>> mbox cmd response: success
3,284,092 UART:
3,284,108 UART: Running Caliptra FMC ...
3,284,516 UART:
3,284,570 UART: [state] CFI Enabled
3,294,784 UART: [fht] FMC Alias Private Key: 7
3,413,318 UART: [art] Extend RT PCRs Done
3,413,746 UART: [art] Lock RT PCRs Done
3,415,090 UART: [art] Populate DV Done
3,423,263 UART: [fht] FMC Alias Private Key: 7
3,424,283 UART: [art] Derive CDI
3,424,563 UART: [art] Store in slot 0x4
3,510,674 UART: [art] Derive Key Pair
3,511,034 UART: [art] Store priv key in slot 0x5
3,524,418 UART: [art] Derive Key Pair - Done
3,539,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,555,472 UART: [art] PUB.X = DABE79C01477E8D07EAA738BB147CD54D7E64AA93DC409612078CC7C9539E16D61B6035CE0781E39A148043AE60CCF1F
3,562,240 UART: [art] PUB.Y = F1E68A76DC2A39BFE227CFAACA22E83C0FE75093DC9C2B6578B0A46720F4EA65FB654E02A09CDD88FDA14480C4AF1F1B
3,569,208 UART: [art] SIG.R = 2D022ADC545E688DD3F5B89DEF4E13AB0F03C5AD9EDC9F30A66D335EC8871B5241937E01021B6C7C187BB684EFE1CF0F
3,575,978 UART: [art] SIG.S = B6161004E82FE1311DF1E7F5340E48DAE3E5ED9F6D9B60DAAD695DE807EB280D319FFFB7B1E5C9BFEE76720D60B9A2B4
3,600,149 UART: Caliptra RT
3,600,400 UART: [state] CFI Enabled
3,719,536 UART: [rt] RT listening for mailbox commands...
3,720,206 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,843,458 UART: [rt]cmd =0x41544d4e, len=14344
3,844,629 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
899,977 UART: [kat] SHA2-256
901,917 UART: [kat] SHA2-384
904,766 UART: [kat] SHA2-512-ACC
906,667 UART: [kat] ECC-384
916,878 UART: [kat] HMAC-384Kdf
921,730 UART: [kat] LMS
1,170,042 UART: [kat] --
1,170,997 UART: [cold-reset] ++
1,171,383 UART: [fht] FHT @ 0x50003400
1,174,069 UART: [idev] ++
1,174,237 UART: [idev] CDI.KEYID = 6
1,174,598 UART: [idev] SUBJECT.KEYID = 7
1,175,023 UART: [idev] UDS.KEYID = 0
1,175,369 ready_for_fw is high
1,175,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,358 UART: [idev] Erasing UDS.KEYID = 0
1,200,608 UART: [idev] Sha1 KeyId Algorithm
1,209,414 UART: [idev] --
1,210,473 UART: [ldev] ++
1,210,641 UART: [ldev] CDI.KEYID = 6
1,211,005 UART: [ldev] SUBJECT.KEYID = 5
1,211,432 UART: [ldev] AUTHORITY.KEYID = 7
1,211,895 UART: [ldev] FE.KEYID = 1
1,217,103 UART: [ldev] Erasing FE.KEYID = 1
1,243,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,501 UART: [ldev] --
1,282,904 UART: [fwproc] Wait for Commands...
1,283,645 UART: [fwproc] Recv command 0x46574c44
1,284,378 UART: [fwproc] Recv'd Img size: 118548 bytes
3,169,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,568 >>> mbox cmd response: success
3,369,824 UART: [afmc] ++
3,369,992 UART: [afmc] CDI.KEYID = 6
3,370,355 UART: [afmc] SUBJECT.KEYID = 7
3,370,781 UART: [afmc] AUTHORITY.KEYID = 5
3,406,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,993 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,742 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,449 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,326 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,036 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,696 UART: [afmc] --
3,449,723 UART: [cold-reset] --
3,450,543 UART: [state] Locking Datavault
3,451,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,478 UART: [state] Locking ICCM
3,453,142 UART: [exit] Launching FMC @ 0x40000130
3,458,472 UART:
3,458,488 UART: Running Caliptra FMC ...
3,458,896 UART:
3,459,039 UART: [state] CFI Enabled
3,469,289 UART: [fht] FMC Alias Private Key: 7
3,588,567 UART: [art] Extend RT PCRs Done
3,588,995 UART: [art] Lock RT PCRs Done
3,590,221 UART: [art] Populate DV Done
3,598,554 UART: [fht] FMC Alias Private Key: 7
3,599,564 UART: [art] Derive CDI
3,599,844 UART: [art] Store in slot 0x4
3,685,621 UART: [art] Derive Key Pair
3,685,981 UART: [art] Store priv key in slot 0x5
3,699,451 UART: [art] Derive Key Pair - Done
3,714,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,725 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,490 UART: [art] PUB.X = 18DDEA99D4EA041E896FA2CE5DEE03B01EBBBAAFB88FB5762390F17337EC4C3F07EFEB446E0CAE9FFE61842EA2A1468D
3,737,278 UART: [art] PUB.Y = E46AE19DF2FFCD793AB53DFFE8609487EBB69C3B2A2688C31DAA48CA15AE773A78D4BF4E3C92A6024B419A11805301A7
3,744,238 UART: [art] SIG.R = 88E6B4915A9D5C6BD98FD84620554251A4E21B2759EE607F851C703ABFEDFD2B21F86E91E517D328C65BBCF970CEECBD
3,751,024 UART: [art] SIG.S = 3E6EDEA76A47208A076629E8BC1992A56211BCDFD59D74875A1D0FB7CFA9013F4C6CF13644A844F2CF4A4D1D3FCBBF14
3,774,681 UART: Caliptra RT
3,775,024 UART: [state] CFI Enabled
3,895,636 UART: [rt] RT listening for mailbox commands...
3,896,306 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,556 UART: [rt]cmd =0x41544d4e, len=14344
4,020,905 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,491 ready_for_fw is high
1,059,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,612 >>> mbox cmd response: success
3,290,669 UART:
3,290,685 UART: Running Caliptra FMC ...
3,291,093 UART:
3,291,236 UART: [state] CFI Enabled
3,302,282 UART: [fht] FMC Alias Private Key: 7
3,421,260 UART: [art] Extend RT PCRs Done
3,421,688 UART: [art] Lock RT PCRs Done
3,423,186 UART: [art] Populate DV Done
3,431,341 UART: [fht] FMC Alias Private Key: 7
3,432,471 UART: [art] Derive CDI
3,432,751 UART: [art] Store in slot 0x4
3,518,594 UART: [art] Derive Key Pair
3,518,954 UART: [art] Store priv key in slot 0x5
3,532,014 UART: [art] Derive Key Pair - Done
3,546,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,526 UART: [art] Erasing AUTHORITY.KEYID = 7
3,563,291 UART: [art] PUB.X = F145BA2C6579E9BF110310DC76FA533F670F644C33EC109578B1DB8E0BB1AB4369BD242C8DAF43135AFBD07452F8C200
3,570,040 UART: [art] PUB.Y = 0C9EEECFF9435076F7979E1EBD9DD2FA9434BDC8CC5E8B166CB4DDEA0A893D77AC86619154C9B74BC2279E9DEC320DDC
3,577,007 UART: [art] SIG.R = 845EEA0550DB4E007A508D7A69B7BF9457A0A49E149C691C7FFE4758A47C0AE1807C0C497FA3E483750E8B9C64EAE9BE
3,583,755 UART: [art] SIG.S = 54E16D48BBB7D3DD6959B0B43A54F0F247DE883360EF6CE108F8EBFC657FC27DF58D0FAE22BA64306A25C2C1ABC6CB66
3,607,723 UART: Caliptra RT
3,608,066 UART: [state] CFI Enabled
3,728,474 UART: [rt] RT listening for mailbox commands...
3,729,144 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,196 UART: [rt]cmd =0x41544d4e, len=14344
3,853,575 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,771 UART: [state] WD Timer not started. Device not locked for debugging
88,054 UART: [kat] SHA2-256
893,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,829 UART: [kat] ++
897,981 UART: [kat] sha1
902,315 UART: [kat] SHA2-256
904,255 UART: [kat] SHA2-384
906,810 UART: [kat] SHA2-512-ACC
908,711 UART: [kat] ECC-384
918,794 UART: [kat] HMAC-384Kdf
923,384 UART: [kat] LMS
1,171,712 UART: [kat] --
1,172,575 UART: [cold-reset] ++
1,173,017 UART: [fht] FHT @ 0x50003400
1,175,626 UART: [idev] ++
1,175,794 UART: [idev] CDI.KEYID = 6
1,176,154 UART: [idev] SUBJECT.KEYID = 7
1,176,578 UART: [idev] UDS.KEYID = 0
1,176,923 ready_for_fw is high
1,176,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,352 UART: [idev] Erasing UDS.KEYID = 0
1,202,037 UART: [idev] Sha1 KeyId Algorithm
1,210,375 UART: [idev] --
1,211,457 UART: [ldev] ++
1,211,625 UART: [ldev] CDI.KEYID = 6
1,211,988 UART: [ldev] SUBJECT.KEYID = 5
1,212,414 UART: [ldev] AUTHORITY.KEYID = 7
1,212,877 UART: [ldev] FE.KEYID = 1
1,217,853 UART: [ldev] Erasing FE.KEYID = 1
1,243,604 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,847 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,450 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,537 UART: [ldev] --
1,283,024 UART: [fwproc] Wait for Commands...
1,283,790 UART: [fwproc] Recv command 0x46574c44
1,284,518 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,372 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,439 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,752 >>> mbox cmd response: success
3,370,778 UART: [afmc] ++
3,370,946 UART: [afmc] CDI.KEYID = 6
3,371,308 UART: [afmc] SUBJECT.KEYID = 7
3,371,733 UART: [afmc] AUTHORITY.KEYID = 5
3,407,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,645 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,393 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,099 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,435,978 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,688 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,271 UART: [afmc] --
3,450,161 UART: [cold-reset] --
3,450,847 UART: [state] Locking Datavault
3,451,874 UART: [state] Locking PCR0, PCR1 and PCR31
3,452,478 UART: [state] Locking ICCM
3,453,022 UART: [exit] Launching FMC @ 0x40000130
3,458,352 UART:
3,458,368 UART: Running Caliptra FMC ...
3,458,776 UART:
3,458,830 UART: [state] CFI Enabled
3,469,594 UART: [fht] FMC Alias Private Key: 7
3,588,654 UART: [art] Extend RT PCRs Done
3,589,082 UART: [art] Lock RT PCRs Done
3,590,544 UART: [art] Populate DV Done
3,598,689 UART: [fht] FMC Alias Private Key: 7
3,599,649 UART: [art] Derive CDI
3,599,929 UART: [art] Store in slot 0x4
3,685,476 UART: [art] Derive Key Pair
3,685,836 UART: [art] Store priv key in slot 0x5
3,699,156 UART: [art] Derive Key Pair - Done
3,713,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,725 UART: [art] PUB.X = D06229DD4D2B927A0CEAB70DCFD4B7FDAED469DEB7E2DD087C49B353F311257210F9D1C88768B0CC060E20376C6E110D
3,737,493 UART: [art] PUB.Y = 5473DC6BD4FE0BCB45AB19230B446AD62FEE37339B8E2C86E0E61F8129A293DD35ACC3055F3395268255768CE68E9962
3,744,438 UART: [art] SIG.R = FC78FA5D5A37CF21DF838194721F27D45B6A684ED810392AC177C52360F49F5B2530425AF4A62A049A4873C4DFA123C4
3,751,207 UART: [art] SIG.S = E94ED75E67BC48905E56D1F4EA693DC457596874F83C402CF01BE6EF7CE4BBFE6354A6E013104242609741EAD632F948
3,774,743 UART: Caliptra RT
3,774,994 UART: [state] CFI Enabled
3,894,625 UART: [rt] RT listening for mailbox commands...
3,895,295 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,257 UART: [rt]cmd =0x41544d4e, len=14344
4,019,632 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 ready_for_fw is high
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,897 >>> mbox cmd response: success
3,295,752 UART:
3,295,768 UART: Running Caliptra FMC ...
3,296,176 UART:
3,296,230 UART: [state] CFI Enabled
3,306,294 UART: [fht] FMC Alias Private Key: 7
3,425,058 UART: [art] Extend RT PCRs Done
3,425,486 UART: [art] Lock RT PCRs Done
3,427,094 UART: [art] Populate DV Done
3,435,551 UART: [fht] FMC Alias Private Key: 7
3,436,525 UART: [art] Derive CDI
3,436,805 UART: [art] Store in slot 0x4
3,522,720 UART: [art] Derive Key Pair
3,523,080 UART: [art] Store priv key in slot 0x5
3,536,896 UART: [art] Derive Key Pair - Done
3,551,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,566,570 UART: [art] Erasing AUTHORITY.KEYID = 7
3,567,335 UART: [art] PUB.X = B382EC8D7BF3C1CB33FF77767194409D1633510A4D14D92815AAF8D8CDF29CC3C2C918392D9A4DE82A893A7B9C85AFB2
3,574,114 UART: [art] PUB.Y = 3A38A1E1B3325F8FEA4B6C9BD18113F6E729086B8C133E86518D295BA4C2AAAAD0317F9A923B3FB66C9D7FEDCF8D3E98
3,581,079 UART: [art] SIG.R = 7FE3C2C532A83E0A6B049D606B1FF25F71F253CD8880C7FBF3DCB4A004C604A49D3AB4D58E5EEE2194F0930821C73458
3,587,844 UART: [art] SIG.S = D9ECB79338F9C45606E0DB765EE05C4E2F6E907465D9FED04D387EA3AFC8A6ECA6A14391980A853D5C7EDFCB91830773
3,611,725 UART: Caliptra RT
3,611,976 UART: [state] CFI Enabled
3,732,258 UART: [rt] RT listening for mailbox commands...
3,732,928 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,856 UART: [rt]cmd =0x41544d4e, len=14344
3,857,261 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,349 UART: [state] LifecycleState = Unprovisioned
86,004 UART: [state] DebugLocked = No
86,490 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
893,487 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,612 UART: [kat] ++
897,764 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,779 UART: [kat] SHA2-512-ACC
908,680 UART: [kat] ECC-384
918,251 UART: [kat] HMAC-384Kdf
922,681 UART: [kat] LMS
1,171,009 UART: [kat] --
1,171,992 UART: [cold-reset] ++
1,172,504 UART: [fht] FHT @ 0x50003400
1,175,171 UART: [idev] ++
1,175,339 UART: [idev] CDI.KEYID = 6
1,175,699 UART: [idev] SUBJECT.KEYID = 7
1,176,123 UART: [idev] UDS.KEYID = 0
1,176,468 ready_for_fw is high
1,176,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,451 UART: [idev] Erasing UDS.KEYID = 0
1,202,120 UART: [idev] Sha1 KeyId Algorithm
1,210,606 UART: [idev] --
1,211,546 UART: [ldev] ++
1,211,714 UART: [ldev] CDI.KEYID = 6
1,212,077 UART: [ldev] SUBJECT.KEYID = 5
1,212,503 UART: [ldev] AUTHORITY.KEYID = 7
1,212,966 UART: [ldev] FE.KEYID = 1
1,218,074 UART: [ldev] Erasing FE.KEYID = 1
1,244,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,828 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,414 UART: [ldev] --
1,283,835 UART: [fwproc] Wait for Commands...
1,284,563 UART: [fwproc] Recv command 0x46574c44
1,285,291 UART: [fwproc] Recv'd Img size: 118548 bytes
3,183,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,210,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,242,033 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,382,336 >>> mbox cmd response: success
3,383,456 UART: [afmc] ++
3,383,624 UART: [afmc] CDI.KEYID = 6
3,383,986 UART: [afmc] SUBJECT.KEYID = 7
3,384,411 UART: [afmc] AUTHORITY.KEYID = 5
3,420,108 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,436,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,437,417 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,443,123 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,449,002 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,454,712 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,462,623 UART: [afmc] --
3,463,745 UART: [cold-reset] --
3,464,503 UART: [state] Locking Datavault
3,465,698 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,302 UART: [state] Locking ICCM
3,466,786 UART: [exit] Launching FMC @ 0x40000130
3,472,116 UART:
3,472,132 UART: Running Caliptra FMC ...
3,472,540 UART:
3,472,683 UART: [state] CFI Enabled
3,483,299 UART: [fht] FMC Alias Private Key: 7
3,602,065 UART: [art] Extend RT PCRs Done
3,602,493 UART: [art] Lock RT PCRs Done
3,603,959 UART: [art] Populate DV Done
3,611,922 UART: [fht] FMC Alias Private Key: 7
3,612,966 UART: [art] Derive CDI
3,613,246 UART: [art] Store in slot 0x4
3,699,515 UART: [art] Derive Key Pair
3,699,875 UART: [art] Store priv key in slot 0x5
3,713,725 UART: [art] Derive Key Pair - Done
3,728,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,658 UART: [art] PUB.X = 29BCE92A6208BD05493F94BCAEFF4F31B23AF345997A49A826AAA495365D1369DAC235164965AE686D32B18F9006190F
3,751,418 UART: [art] PUB.Y = 41704A102DCACA15E0A4BBEFF9EBC60805AF5A8C74B0F1A8AF99CDEF4F79C59CD8B7E7C7DF1B79B1BE4039F3089FD455
3,758,387 UART: [art] SIG.R = A5A42367BE131B35DEC7B3B7BD9236C58D32890E7C2A1B28099573139343D5C35870926CCE08AA9A425AB58A4D410C7C
3,765,147 UART: [art] SIG.S = 14450A0DBE2AE7D04E65B626C7F5680CF37F64D0B8C6A21B6C2E85BBE606D6232900DFC05C85B55FC22EECC03A091C01
3,789,051 UART: Caliptra RT
3,789,394 UART: [state] CFI Enabled
3,909,380 UART: [rt] RT listening for mailbox commands...
3,910,050 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,174 UART: [rt]cmd =0x41544d4e, len=14344
4,034,667 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,044 ready_for_fw is high
1,060,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,063 >>> mbox cmd response: success
3,285,260 UART:
3,285,276 UART: Running Caliptra FMC ...
3,285,684 UART:
3,285,827 UART: [state] CFI Enabled
3,296,693 UART: [fht] FMC Alias Private Key: 7
3,415,379 UART: [art] Extend RT PCRs Done
3,415,807 UART: [art] Lock RT PCRs Done
3,417,557 UART: [art] Populate DV Done
3,425,506 UART: [fht] FMC Alias Private Key: 7
3,426,660 UART: [art] Derive CDI
3,426,940 UART: [art] Store in slot 0x4
3,512,331 UART: [art] Derive Key Pair
3,512,691 UART: [art] Store priv key in slot 0x5
3,526,567 UART: [art] Derive Key Pair - Done
3,541,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,929 UART: [art] Erasing AUTHORITY.KEYID = 7
3,557,694 UART: [art] PUB.X = FEEE77762190FA1DD410ED4BB6DB862F65AB77D17A282A21CC1EB46268E9B4084C206371DAA743730E055107DBDC2CD5
3,564,464 UART: [art] PUB.Y = 0375A6B88B3F9C2CA765057EECD6D8543C9AF0BF841D7E194DD00A9AD0059D5F7D143E41329C3629C1F4E1D15111E62B
3,571,410 UART: [art] SIG.R = 303C2E96CAB0CAC12256A5BD8BCA540C4794FB4BB39489A4EF8AAE190A5FF84FA412CFF93407A8A2FEC1A1CA11328671
3,578,191 UART: [art] SIG.S = 730A0605C8BFEE227F7A3FBBA23C7D1F6AD6288357A4B648CBCEFA0734097F03F754A3A70F43FB75C33BFACCB918B731
3,602,128 UART: Caliptra RT
3,602,471 UART: [state] CFI Enabled
3,722,463 UART: [rt] RT listening for mailbox commands...
3,723,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,846,069 UART: [rt]cmd =0x41544d4e, len=14344
3,847,582 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_marker ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
192,104 UART:
192,476 UART: Running Caliptra ROM ...
193,621 UART:
193,773 UART: [state] CFI Enabled
265,451 UART: [state] LifecycleState = Unprovisioned
267,327 UART: [state] DebugLocked = No
268,988 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,192 UART: [kat] SHA2-256
443,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,364 UART: [kat] ++
454,811 UART: [kat] sha1
465,826 UART: [kat] SHA2-256
468,550 UART: [kat] SHA2-384
474,895 UART: [kat] SHA2-512-ACC
477,264 UART: [kat] ECC-384
2,767,417 UART: [kat] HMAC-384Kdf
2,800,472 UART: [kat] LMS
3,990,808 UART: [kat] --
3,995,753 UART: [cold-reset] ++
3,997,901 UART: [fht] Storing FHT @ 0x50003400
4,009,665 UART: [idev] ++
4,010,245 UART: [idev] CDI.KEYID = 6
4,011,131 UART: [idev] SUBJECT.KEYID = 7
4,012,376 UART: [idev] UDS.KEYID = 0
4,013,367 ready_for_fw is high
4,013,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,651 UART: [idev] Erasing UDS.KEYID = 0
7,345,141 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,324 UART: [idev] --
7,370,663 UART: [ldev] ++
7,371,231 UART: [ldev] CDI.KEYID = 6
7,372,202 UART: [ldev] SUBJECT.KEYID = 5
7,373,416 UART: [ldev] AUTHORITY.KEYID = 7
7,374,667 UART: [ldev] FE.KEYID = 1
7,422,243 UART: [ldev] Erasing FE.KEYID = 1
10,754,803 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,373 UART: [ldev] --
13,116,824 UART: [fwproc] Waiting for Commands...
13,118,647 UART: [fwproc] Received command 0x46574c44
13,120,831 UART: [fwproc] Received Image of size 118548 bytes
21,733,929 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,810,991 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,884,175 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,213,275 >>> mbox cmd response: success
22,217,981 UART: [afmc] ++
22,218,621 UART: [afmc] CDI.KEYID = 6
22,219,540 UART: [afmc] SUBJECT.KEYID = 7
22,220,707 UART: [afmc] AUTHORITY.KEYID = 5
25,592,566 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,893,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,895,933 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,910,397 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,925,228 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,939,569 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,961,915 UART: [afmc] --
27,964,965 UART: [cold-reset] --
27,969,052 UART: [state] Locking Datavault
27,974,852 UART: [state] Locking PCR0, PCR1 and PCR31
27,976,613 UART: [state] Locking ICCM
27,978,150 UART: [exit] Launching FMC @ 0x40000130
27,986,545 UART:
27,986,798 UART: Running Caliptra FMC ...
27,987,902 UART:
27,988,066 UART: [state] CFI Enabled
28,051,919 UART: [fht] FMC Alias Private Key: 7
30,392,507 UART: [art] Extend RT PCRs Done
30,393,742 UART: [art] Lock RT PCRs Done
30,395,237 UART: [art] Populate DV Done
30,400,703 UART: [fht] FMC Alias Private Key: 7
30,402,237 UART: [art] Derive CDI
30,402,968 UART: [art] Store in slot 0x4
30,461,202 UART: [art] Derive Key Pair
30,462,244 UART: [art] Store priv key in slot 0x5
33,754,823 UART: [art] Derive Key Pair - Done
33,767,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,056,935 UART: [art] Erasing AUTHORITY.KEYID = 7
36,058,446 UART: [art] PUB.X = F7966A052E55D55819FA5D6E67442EA1CD89EEF0E6E5A47B762BB36F96994D92D6DA47601133151D82AACEC13AC070A4
36,065,768 UART: [art] PUB.Y = 5C0BBF64E3CE4633EAF945EE587BB2E6005C27C4530947EFE7E54252B6B1D75EC86B83E05246DAC38A11FADF207EF848
36,073,003 UART: [art] SIG.R = 8BEC0ECACE17D37FDECCB49A8009413126983416A8CE2E3D3522D0CE354B8CF6BC9C5FD446900FDB359AAE383DBBE528
36,080,399 UART: [art] SIG.S = BE29A7FBBAD0945CB5769D3DEE046C07EDA91CCA6AB0D472267E045FEF34AA1E3B52A26E966754E2EA04C0389CF3AFE2
37,385,720 UART: Caliptra RT
37,386,439 UART: [state] CFI Enabled
37,562,480 UART: [rt] RT listening for mailbox commands...
37,564,820 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,720,189 UART: [rt]cmd =0x41544d4e, len=14344
37,722,047 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,220 writing to cptra_bootfsm_go
3,785,529 ready_for_fw is high
3,785,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,221,631 >>> mbox cmd response: success
27,918,275 UART:
27,918,667 UART: Running Caliptra FMC ...
27,919,811 UART:
27,919,973 UART: [state] CFI Enabled
27,988,820 UART: [fht] FMC Alias Private Key: 7
30,329,366 UART: [art] Extend RT PCRs Done
30,330,587 UART: [art] Lock RT PCRs Done
30,332,019 UART: [art] Populate DV Done
30,337,429 UART: [fht] FMC Alias Private Key: 7
30,339,131 UART: [art] Derive CDI
30,339,869 UART: [art] Store in slot 0x4
30,397,520 UART: [art] Derive Key Pair
30,398,521 UART: [art] Store priv key in slot 0x5
33,691,235 UART: [art] Derive Key Pair - Done
33,704,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,993,173 UART: [art] Erasing AUTHORITY.KEYID = 7
35,994,682 UART: [art] PUB.X = 0B4F5E30D1B5F9B50DB426AAFC4D87F7826D88CAB2CF7473DF6374B23B5F1A3A3AA09C615DA5016DCB30CE3DACD74F9F
36,002,158 UART: [art] PUB.Y = 973ABA824332551E19EFEA1D6A0D5EFAB5D9A68C47777B66B795CF5B6156B93413743F79E7B5499C668242A0E387BCFC
36,009,242 UART: [art] SIG.R = 351A0F93A7C0A18FCE2DB600A135CB34D9EED9C3F9A6425EE6E4C12EB047D6B21C8B80E24A66C8E1177961F79D41CDAE
36,016,599 UART: [art] SIG.S = C77E1CF3F3A1FCAD34F1B0BD56616F7BA8F97DF17753B3096AAB5F1902B342048BCD63E70BC10ACC9418A4DCD102EE86
37,321,299 UART: Caliptra RT
37,322,012 UART: [state] CFI Enabled
37,500,143 UART: [rt] RT listening for mailbox commands...
37,502,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,657,749 UART: [rt]cmd =0x41544d4e, len=14344
37,659,881 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,570 UART:
192,924 UART: Running Caliptra ROM ...
194,025 UART:
603,754 UART: [state] CFI Enabled
616,855 UART: [state] LifecycleState = Unprovisioned
618,795 UART: [state] DebugLocked = No
620,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,088 UART: [kat] SHA2-256
793,873 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,393 UART: [kat] ++
804,858 UART: [kat] sha1
815,654 UART: [kat] SHA2-256
818,372 UART: [kat] SHA2-384
825,141 UART: [kat] SHA2-512-ACC
827,497 UART: [kat] ECC-384
3,111,158 UART: [kat] HMAC-384Kdf
3,124,094 UART: [kat] LMS
4,314,278 UART: [kat] --
4,318,434 UART: [cold-reset] ++
4,319,797 UART: [fht] Storing FHT @ 0x50003400
4,330,060 UART: [idev] ++
4,330,619 UART: [idev] CDI.KEYID = 6
4,331,590 UART: [idev] SUBJECT.KEYID = 7
4,332,822 UART: [idev] UDS.KEYID = 0
4,333,878 ready_for_fw is high
4,334,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,962 UART: [idev] Erasing UDS.KEYID = 0
7,617,551 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,197 UART: [idev] --
7,643,132 UART: [ldev] ++
7,643,750 UART: [ldev] CDI.KEYID = 6
7,644,759 UART: [ldev] SUBJECT.KEYID = 5
7,645,906 UART: [ldev] AUTHORITY.KEYID = 7
7,647,125 UART: [ldev] FE.KEYID = 1
7,658,790 UART: [ldev] Erasing FE.KEYID = 1
10,945,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,890 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,960 UART: [ldev] --
13,306,730 UART: [fwproc] Waiting for Commands...
13,309,264 UART: [fwproc] Received command 0x46574c44
13,311,493 UART: [fwproc] Received Image of size 118548 bytes
22,393,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,472,150 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,545,324 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,873,582 >>> mbox cmd response: success
22,878,515 UART: [afmc] ++
22,879,147 UART: [afmc] CDI.KEYID = 6
22,880,030 UART: [afmc] SUBJECT.KEYID = 7
22,881,243 UART: [afmc] AUTHORITY.KEYID = 5
26,193,997 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,488,866 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,491,133 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,505,598 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,520,430 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,534,818 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,556,453 UART: [afmc] --
28,559,571 UART: [cold-reset] --
28,562,135 UART: [state] Locking Datavault
28,567,010 UART: [state] Locking PCR0, PCR1 and PCR31
28,568,759 UART: [state] Locking ICCM
28,570,149 UART: [exit] Launching FMC @ 0x40000130
28,578,536 UART:
28,578,760 UART: Running Caliptra FMC ...
28,579,850 UART:
28,580,002 UART: [state] CFI Enabled
28,588,209 UART: [fht] FMC Alias Private Key: 7
30,927,638 UART: [art] Extend RT PCRs Done
30,928,872 UART: [art] Lock RT PCRs Done
30,930,605 UART: [art] Populate DV Done
30,936,278 UART: [fht] FMC Alias Private Key: 7
30,937,820 UART: [art] Derive CDI
30,938,652 UART: [art] Store in slot 0x4
30,981,035 UART: [art] Derive Key Pair
30,982,077 UART: [art] Store priv key in slot 0x5
34,224,620 UART: [art] Derive Key Pair - Done
34,237,752 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,518,426 UART: [art] Erasing AUTHORITY.KEYID = 7
36,519,939 UART: [art] PUB.X = 353B69E091B4FEC471E92DDC67FF0A788821D809881621863A6B9FB86F83EC01F5CD1F9B3C7076C9DE46D220D5F1F3E8
36,527,174 UART: [art] PUB.Y = EEC46370E94CCB57E2D743421434B5052CE9A7CCA463641758264B6F5E2E0C8EF4C520440E12F74ED113C52D920F1737
36,534,396 UART: [art] SIG.R = 8DEFB05F2171AE4D5E7B54E163CF5A5DB09233326499A5F2DAB2C57195789EC98A4F66DDB886D2C78620C8B0AC7F878C
36,541,833 UART: [art] SIG.S = 63A98EFE700A1EBA22EB6F80B86F923620E555571B9D698AE5FE09987BEE57CC1325F0A930EAE4FACDF80D73DD1EA59C
37,846,519 UART: Caliptra RT
37,847,231 UART: [state] CFI Enabled
37,980,597 UART: [rt] RT listening for mailbox commands...
37,982,900 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,138,388 UART: [rt]cmd =0x41544d4e, len=14344
38,140,469 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
4,130,129 ready_for_fw is high
4,130,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,225,044 >>> mbox cmd response: success
27,864,187 UART:
27,864,661 UART: Running Caliptra FMC ...
27,865,768 UART:
27,865,924 UART: [state] CFI Enabled
27,873,846 UART: [fht] FMC Alias Private Key: 7
30,213,809 UART: [art] Extend RT PCRs Done
30,215,039 UART: [art] Lock RT PCRs Done
30,216,888 UART: [art] Populate DV Done
30,222,509 UART: [fht] FMC Alias Private Key: 7
30,224,108 UART: [art] Derive CDI
30,224,922 UART: [art] Store in slot 0x4
30,267,481 UART: [art] Derive Key Pair
30,268,544 UART: [art] Store priv key in slot 0x5
33,510,661 UART: [art] Derive Key Pair - Done
33,523,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,803,419 UART: [art] Erasing AUTHORITY.KEYID = 7
35,804,923 UART: [art] PUB.X = 16DDEFF79BCCDFD2935FE0DA704309D939FDF2A5483752989C5AABD10FE982228A65524EBCE66BAF2B1195625BACC957
35,812,226 UART: [art] PUB.Y = EA989D9870A0FD137C122B8BFC5F0171E932DA4D064EFC459C41C65A4D7BA4E107616219A6C6DC09EF6B9F9EC114CFD8
35,819,489 UART: [art] SIG.R = 5245469DF83E4681776F90E7D88815503C92FC56B795580E24BA87CF93FA49DCB374E469672E0BDB1024367BD2C4361D
35,827,043 UART: [art] SIG.S = 1441DA4D22F9DCECE3710E2787B11C2FEE540B385F9994F55A35113CF760AAB01314515C8E161BF28811161977EB3679
37,132,441 UART: Caliptra RT
37,133,163 UART: [state] CFI Enabled
37,267,172 UART: [rt] RT listening for mailbox commands...
37,269,615 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,424,938 UART: [rt]cmd =0x41544d4e, len=14344
37,427,111 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,032 UART:
192,401 UART: Running Caliptra ROM ...
193,504 UART:
193,646 UART: [state] CFI Enabled
265,927 UART: [state] LifecycleState = Unprovisioned
267,939 UART: [state] DebugLocked = No
270,815 UART: [state] WD Timer not started. Device not locked for debugging
275,204 UART: [kat] SHA2-256
454,858 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,600 UART: [kat] ++
466,331 UART: [kat] sha1
477,352 UART: [kat] SHA2-256
480,074 UART: [kat] SHA2-384
486,349 UART: [kat] SHA2-512-ACC
488,707 UART: [kat] ECC-384
2,949,028 UART: [kat] HMAC-384Kdf
2,970,446 UART: [kat] LMS
3,447,001 UART: [kat] --
3,452,086 UART: [cold-reset] ++
3,454,229 UART: [fht] FHT @ 0x50003400
3,464,487 UART: [idev] ++
3,465,050 UART: [idev] CDI.KEYID = 6
3,465,960 UART: [idev] SUBJECT.KEYID = 7
3,467,202 UART: [idev] UDS.KEYID = 0
3,468,245 ready_for_fw is high
3,468,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,612 UART: [idev] Erasing UDS.KEYID = 0
5,983,838 UART: [idev] Sha1 KeyId Algorithm
6,008,089 UART: [idev] --
6,013,657 UART: [ldev] ++
6,014,239 UART: [ldev] CDI.KEYID = 6
6,015,182 UART: [ldev] SUBJECT.KEYID = 5
6,016,343 UART: [ldev] AUTHORITY.KEYID = 7
6,017,623 UART: [ldev] FE.KEYID = 1
6,056,789 UART: [ldev] Erasing FE.KEYID = 1
8,566,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,065 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,377 UART: [ldev] --
10,373,202 UART: [fwproc] Wait for Commands...
10,374,745 UART: [fwproc] Recv command 0x46574c44
10,376,777 UART: [fwproc] Recv'd Img size: 118548 bytes
14,894,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,977,446 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,050,456 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,377,879 >>> mbox cmd response: success
15,382,050 UART: [afmc] ++
15,382,644 UART: [afmc] CDI.KEYID = 6
15,383,584 UART: [afmc] SUBJECT.KEYID = 7
15,384,795 UART: [afmc] AUTHORITY.KEYID = 5
17,919,130 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,640,933 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,643,101 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,658,986 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,674,890 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,690,625 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,716,261 UART: [afmc] --
19,719,697 UART: [cold-reset] --
19,723,881 UART: [state] Locking Datavault
19,728,310 UART: [state] Locking PCR0, PCR1 and PCR31
19,730,011 UART: [state] Locking ICCM
19,731,260 UART: [exit] Launching FMC @ 0x40000130
19,739,656 UART:
19,739,887 UART: Running Caliptra FMC ...
19,740,980 UART:
19,741,132 UART: [state] CFI Enabled
19,798,242 UART: [fht] FMC Alias Private Key: 7
21,564,038 UART: [art] Extend RT PCRs Done
21,565,273 UART: [art] Lock RT PCRs Done
21,566,621 UART: [art] Populate DV Done
21,572,135 UART: [fht] FMC Alias Private Key: 7
21,573,718 UART: [art] Derive CDI
21,574,527 UART: [art] Store in slot 0x4
21,630,803 UART: [art] Derive Key Pair
21,631,840 UART: [art] Store priv key in slot 0x5
24,094,884 UART: [art] Derive Key Pair - Done
24,107,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,819,718 UART: [art] Erasing AUTHORITY.KEYID = 7
25,821,196 UART: [art] PUB.X = AED2ADA6511D4A845F953C541F815FCB094EA7EA5E959C7E2E000B40A32A9941BDBCC5AE2C78FEBABABAD8D3C0434640
25,828,552 UART: [art] PUB.Y = 8A4441F67FB28BD5C7C0FB269378FEE4FB5849BC48EFC217052E8050C0D17A195C56BB2C375A365DD7F20EB365EBF3A3
25,835,752 UART: [art] SIG.R = CAFCDBC7A4FD8EFDE9DB2C592B41335284C41DB9FD3DD35EB7C5F215E6D6B094D7BF815130484961439C1623D2F28385
25,843,138 UART: [art] SIG.S = 55486BE37CA537A74118734DC2F731A98F2914AE64F958D5B407E94DFCA8F7B4E14B532366E2548179B9D8B3D2D91C38
26,821,522 UART: Caliptra RT
26,822,230 UART: [state] CFI Enabled
27,003,701 UART: [rt] RT listening for mailbox commands...
27,006,031 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,161,386 UART: [rt]cmd =0x41544d4e, len=14344
27,163,352 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,460,063 ready_for_fw is high
3,460,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,415,031 >>> mbox cmd response: success
19,713,840 UART:
19,714,248 UART: Running Caliptra FMC ...
19,715,445 UART:
19,715,613 UART: [state] CFI Enabled
19,777,431 UART: [fht] FMC Alias Private Key: 7
21,544,363 UART: [art] Extend RT PCRs Done
21,545,592 UART: [art] Lock RT PCRs Done
21,547,651 UART: [art] Populate DV Done
21,553,127 UART: [fht] FMC Alias Private Key: 7
21,554,772 UART: [art] Derive CDI
21,555,583 UART: [art] Store in slot 0x4
21,610,522 UART: [art] Derive Key Pair
21,611,570 UART: [art] Store priv key in slot 0x5
24,074,032 UART: [art] Derive Key Pair - Done
24,086,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,799,762 UART: [art] Erasing AUTHORITY.KEYID = 7
25,801,277 UART: [art] PUB.X = 051ECA61B7CAA57947D74C24C115ACCB7DCF24CF574ED4DC899AFC7A34C95F1ACB7A594030786EA29D64750178478A6A
25,808,538 UART: [art] PUB.Y = FDAE765155D3FC96A420ED009330896A1932C1BA745C4D5F7F09E57147E4BF3389EBE6604E461CEA94B49B98BA7207FB
25,815,776 UART: [art] SIG.R = 4BD2BC2F39BB6F083F96D4CFC3A65FEA9A1C0B90AA7DE312BB47B81040B66704635314809A5495C9C596FA290F3C1F46
25,823,226 UART: [art] SIG.S = 73C5B33BE9AB3F3BE2F601A84B1C5D9D5AE179DDFDEF0705A2595C9B442F93FCACE74CDDD63AC2181F6A8369D45A6FDA
26,802,418 UART: Caliptra RT
26,803,107 UART: [state] CFI Enabled
26,983,341 UART: [rt] RT listening for mailbox commands...
26,985,713 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,141,010 UART: [rt]cmd =0x41544d4e, len=14344
27,143,087 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,485 UART:
192,834 UART: Running Caliptra ROM ...
194,049 UART:
603,543 UART: [state] CFI Enabled
618,490 UART: [state] LifecycleState = Unprovisioned
620,431 UART: [state] DebugLocked = No
622,033 UART: [state] WD Timer not started. Device not locked for debugging
625,651 UART: [kat] SHA2-256
805,318 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,139 UART: [kat] ++
816,673 UART: [kat] sha1
829,203 UART: [kat] SHA2-256
831,892 UART: [kat] SHA2-384
838,108 UART: [kat] SHA2-512-ACC
840,487 UART: [kat] ECC-384
3,284,906 UART: [kat] HMAC-384Kdf
3,297,491 UART: [kat] LMS
3,774,029 UART: [kat] --
3,775,506 UART: [cold-reset] ++
3,777,164 UART: [fht] FHT @ 0x50003400
3,788,806 UART: [idev] ++
3,789,409 UART: [idev] CDI.KEYID = 6
3,790,323 UART: [idev] SUBJECT.KEYID = 7
3,791,575 UART: [idev] UDS.KEYID = 0
3,792,508 ready_for_fw is high
3,792,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,523 UART: [idev] Erasing UDS.KEYID = 0
6,267,140 UART: [idev] Sha1 KeyId Algorithm
6,290,806 UART: [idev] --
6,295,398 UART: [ldev] ++
6,295,972 UART: [ldev] CDI.KEYID = 6
6,296,992 UART: [ldev] SUBJECT.KEYID = 5
6,298,121 UART: [ldev] AUTHORITY.KEYID = 7
6,299,359 UART: [ldev] FE.KEYID = 1
6,309,842 UART: [ldev] Erasing FE.KEYID = 1
8,790,880 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,631 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,083 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,990 UART: [ldev] --
10,583,876 UART: [fwproc] Wait for Commands...
10,586,077 UART: [fwproc] Recv command 0x46574c44
10,588,102 UART: [fwproc] Recv'd Img size: 118548 bytes
15,119,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,201,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,274,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,603,448 >>> mbox cmd response: success
15,608,229 UART: [afmc] ++
15,608,846 UART: [afmc] CDI.KEYID = 6
15,609,767 UART: [afmc] SUBJECT.KEYID = 7
15,610,988 UART: [afmc] AUTHORITY.KEYID = 5
18,112,811 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,148 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,837,331 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,853,151 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,869,108 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,884,822 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,909,327 UART: [afmc] --
19,912,975 UART: [cold-reset] --
19,918,890 UART: [state] Locking Datavault
19,924,900 UART: [state] Locking PCR0, PCR1 and PCR31
19,926,652 UART: [state] Locking ICCM
19,929,320 UART: [exit] Launching FMC @ 0x40000130
19,937,736 UART:
19,937,973 UART: Running Caliptra FMC ...
19,939,076 UART:
19,939,239 UART: [state] CFI Enabled
19,947,298 UART: [fht] FMC Alias Private Key: 7
21,713,878 UART: [art] Extend RT PCRs Done
21,715,102 UART: [art] Lock RT PCRs Done
21,716,755 UART: [art] Populate DV Done
21,722,278 UART: [fht] FMC Alias Private Key: 7
21,723,880 UART: [art] Derive CDI
21,724,623 UART: [art] Store in slot 0x4
21,767,380 UART: [art] Derive Key Pair
21,768,381 UART: [art] Store priv key in slot 0x5
24,195,379 UART: [art] Derive Key Pair - Done
24,208,597 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,914,784 UART: [art] Erasing AUTHORITY.KEYID = 7
25,916,315 UART: [art] PUB.X = 3DAABAA4601B575E85D9852E949F8E5F27BDF01C42D64862AA49B0BD0108400138936EFBE0A391F358B31C17C059B7F3
25,923,562 UART: [art] PUB.Y = 060154E149DDDE156FFCE99B18F8BCDD3CC0996E0814D41D759914B82469F1F41432335C9ED26465F8572F6004FE0CF2
25,930,852 UART: [art] SIG.R = C10370F490F0E8BA69DFA5A1A3067276F822E0E525E0F23A0541534378E665F8C2671C7B0322C417A31A128C7E11D1E7
25,938,198 UART: [art] SIG.S = 13ADD1B0D6489BB01F3583C1D847326B3487087C438CAECC99365BE9C4E5758E8A33781921FC3D8FFCD3F099BC86AB15
26,917,415 UART: Caliptra RT
26,918,126 UART: [state] CFI Enabled
27,051,124 UART: [rt] RT listening for mailbox commands...
27,053,406 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,208,965 UART: [rt]cmd =0x41544d4e, len=14344
27,210,713 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
3,783,842 ready_for_fw is high
3,784,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,630,063 >>> mbox cmd response: success
19,876,853 UART:
19,877,230 UART: Running Caliptra FMC ...
19,878,648 UART:
19,878,826 UART: [state] CFI Enabled
19,886,422 UART: [fht] FMC Alias Private Key: 7
21,652,892 UART: [art] Extend RT PCRs Done
21,654,117 UART: [art] Lock RT PCRs Done
21,656,044 UART: [art] Populate DV Done
21,661,544 UART: [fht] FMC Alias Private Key: 7
21,663,236 UART: [art] Derive CDI
21,663,987 UART: [art] Store in slot 0x4
21,706,745 UART: [art] Derive Key Pair
21,707,752 UART: [art] Store priv key in slot 0x5
24,134,663 UART: [art] Derive Key Pair - Done
24,147,343 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,853,794 UART: [art] Erasing AUTHORITY.KEYID = 7
25,855,282 UART: [art] PUB.X = CA46D96D1878E6EF47F321873110F2D934791029F4C3D2B0346C345636C5FD6EEE4ABAA4E9AC1924E476D3EFCFE3E4DD
25,862,534 UART: [art] PUB.Y = B8543536706107905AF215F9DDC0C54DD4E611B761CCEFEBD905027EBA4F0532E361E62160177BB0497B86D7D7594AEC
25,869,843 UART: [art] SIG.R = 57FA73F77FD95714FFD3FD9629C35A02B4D93438A2DD18CF183E537DE18250D717FF22AFCD9710A0D666C9844EBC0BD6
25,877,253 UART: [art] SIG.S = 3188796B67CAA2D0FB817DED4A0E74BDC21E22B145AA771762D1DFEFB326FF99C97C8E9219B033CE0ACB376A663BC39B
26,856,296 UART: Caliptra RT
26,857,013 UART: [state] CFI Enabled
26,989,202 UART: [rt] RT listening for mailbox commands...
26,991,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,147,000 UART: [rt]cmd =0x41544d4e, len=14344
27,149,129 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,168 UART:
192,529 UART: Running Caliptra ROM ...
193,725 UART:
193,879 UART: [state] CFI Enabled
265,963 UART: [state] LifecycleState = Unprovisioned
268,387 UART: [state] DebugLocked = No
269,853 UART: [state] WD Timer not started. Device not locked for debugging
273,956 UART: [kat] SHA2-256
463,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,635 UART: [kat] ++
475,098 UART: [kat] sha1
487,111 UART: [kat] SHA2-256
490,119 UART: [kat] SHA2-384
495,895 UART: [kat] SHA2-512-ACC
498,473 UART: [kat] ECC-384
2,945,188 UART: [kat] HMAC-384Kdf
2,969,771 UART: [kat] LMS
3,501,593 UART: [kat] --
3,506,522 UART: [cold-reset] ++
3,508,447 UART: [fht] FHT @ 0x50003400
3,519,700 UART: [idev] ++
3,520,399 UART: [idev] CDI.KEYID = 6
3,521,319 UART: [idev] SUBJECT.KEYID = 7
3,522,563 UART: [idev] UDS.KEYID = 0
3,523,488 ready_for_fw is high
3,523,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,888 UART: [idev] Erasing UDS.KEYID = 0
6,028,120 UART: [idev] Sha1 KeyId Algorithm
6,049,149 UART: [idev] --
6,054,932 UART: [ldev] ++
6,055,610 UART: [ldev] CDI.KEYID = 6
6,056,518 UART: [ldev] SUBJECT.KEYID = 5
6,057,729 UART: [ldev] AUTHORITY.KEYID = 7
6,059,238 UART: [ldev] FE.KEYID = 1
6,100,938 UART: [ldev] Erasing FE.KEYID = 1
8,604,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,389 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,916 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,778 UART: [ldev] --
10,414,713 UART: [fwproc] Wait for Commands...
10,416,230 UART: [fwproc] Recv command 0x46574c44
10,418,486 UART: [fwproc] Recv'd Img size: 118548 bytes
15,104,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,184,471 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,308,078 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,868,066 >>> mbox cmd response: success
15,871,392 UART: [afmc] ++
15,872,112 UART: [afmc] CDI.KEYID = 6
15,873,300 UART: [afmc] SUBJECT.KEYID = 7
15,874,747 UART: [afmc] AUTHORITY.KEYID = 5
18,412,631 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,153,885 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,155,793 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,170,890 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,186,126 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,201,098 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,224,727 UART: [afmc] --
20,227,495 UART: [cold-reset] --
20,230,610 UART: [state] Locking Datavault
20,235,649 UART: [state] Locking PCR0, PCR1 and PCR31
20,237,800 UART: [state] Locking ICCM
20,239,733 UART: [exit] Launching FMC @ 0x40000130
20,248,407 UART:
20,248,638 UART: Running Caliptra FMC ...
20,249,734 UART:
20,249,887 UART: [state] CFI Enabled
20,311,642 UART: [fht] FMC Alias Private Key: 7
22,078,424 UART: [art] Extend RT PCRs Done
22,079,647 UART: [art] Lock RT PCRs Done
22,080,898 UART: [art] Populate DV Done
22,086,303 UART: [fht] FMC Alias Private Key: 7
22,088,056 UART: [art] Derive CDI
22,088,889 UART: [art] Store in slot 0x4
22,144,019 UART: [art] Derive Key Pair
22,145,056 UART: [art] Store priv key in slot 0x5
24,608,214 UART: [art] Derive Key Pair - Done
24,620,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,334,057 UART: [art] Erasing AUTHORITY.KEYID = 7
26,335,564 UART: [art] PUB.X = 5D21E305162B0495FF8B66C6AE54052047412DCBCBAFA7A252B44EE432136E85E268A63EC3F14741550DD5A56F6B2CD1
26,342,819 UART: [art] PUB.Y = C081658AE51F1186A4F124F5483F84FF1B3B5A4939E5ECF5DAEF3D15E34CAC484E75B21493C9BD349CA4D034BD3541F1
26,350,110 UART: [art] SIG.R = 459C28B33EC8789E97B9C52070811503B3875E15F308E5F4D07C69DD3D1B56A630C1C94711211FE1D3ABCF74F584B4FF
26,357,459 UART: [art] SIG.S = 06EE7D1184203D47B943321CE3E4030877EE94AFF13CE7CE70B6B082AED18C209F8351A4AC767A31E41F42D232867EF4
27,336,342 UART: Caliptra RT
27,337,054 UART: [state] CFI Enabled
27,518,125 UART: [rt] RT listening for mailbox commands...
27,520,457 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,675,824 UART: [rt]cmd =0x41544d4e, len=14344
27,677,731 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,438,374 ready_for_fw is high
3,438,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,924,565 >>> mbox cmd response: success
20,217,719 UART:
20,218,110 UART: Running Caliptra FMC ...
20,219,244 UART:
20,219,402 UART: [state] CFI Enabled
20,287,492 UART: [fht] FMC Alias Private Key: 7
22,053,463 UART: [art] Extend RT PCRs Done
22,054,691 UART: [art] Lock RT PCRs Done
22,056,588 UART: [art] Populate DV Done
22,062,168 UART: [fht] FMC Alias Private Key: 7
22,063,763 UART: [art] Derive CDI
22,064,505 UART: [art] Store in slot 0x4
22,119,543 UART: [art] Derive Key Pair
22,120,580 UART: [art] Store priv key in slot 0x5
24,583,188 UART: [art] Derive Key Pair - Done
24,596,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,309,684 UART: [art] Erasing AUTHORITY.KEYID = 7
26,311,195 UART: [art] PUB.X = 96C28AF3C8EB36865A35C6A5CAE64E551DA212C35810CC0162CE973E979BEC96F4CD298C068E678A071BD92E4CB6A725
26,318,423 UART: [art] PUB.Y = 33E6A372D2130D2339D78FC6AD006A596F98087AF0470F8A26E25F2AF3134B9CFE21FB92E43B4CA22055E60BBEA31E28
26,325,677 UART: [art] SIG.R = 7001D14EE7B811930EA488665040684777DEBC9FE9A609EF165E3C4E42BCDF5D1107A8C14D5CEF938758FC299A2E3334
26,333,095 UART: [art] SIG.S = 814A4AFEBA6207CBDBBC0095A57B9AB02AB28BEFA3CED89D635025BF4326E5179AD1FAF133ECE93E8F1A1D55EF10DC10
27,312,114 UART: Caliptra RT
27,312,830 UART: [state] CFI Enabled
27,492,585 UART: [rt] RT listening for mailbox commands...
27,494,925 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,650,303 UART: [rt]cmd =0x41544d4e, len=14344
27,652,056 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,418 UART:
192,764 UART: Running Caliptra ROM ...
193,958 UART:
603,520 UART: [state] CFI Enabled
616,837 UART: [state] LifecycleState = Unprovisioned
619,229 UART: [state] DebugLocked = No
621,970 UART: [state] WD Timer not started. Device not locked for debugging
626,869 UART: [kat] SHA2-256
816,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,566 UART: [kat] ++
828,197 UART: [kat] sha1
841,001 UART: [kat] SHA2-256
844,024 UART: [kat] SHA2-384
849,317 UART: [kat] SHA2-512-ACC
851,913 UART: [kat] ECC-384
3,296,067 UART: [kat] HMAC-384Kdf
3,310,450 UART: [kat] LMS
3,842,264 UART: [kat] --
3,845,493 UART: [cold-reset] ++
3,848,073 UART: [fht] FHT @ 0x50003400
3,858,782 UART: [idev] ++
3,859,503 UART: [idev] CDI.KEYID = 6
3,860,396 UART: [idev] SUBJECT.KEYID = 7
3,861,642 UART: [idev] UDS.KEYID = 0
3,862,577 ready_for_fw is high
3,862,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,668 UART: [idev] Erasing UDS.KEYID = 0
6,334,678 UART: [idev] Sha1 KeyId Algorithm
6,355,803 UART: [idev] --
6,361,581 UART: [ldev] ++
6,362,260 UART: [ldev] CDI.KEYID = 6
6,363,173 UART: [ldev] SUBJECT.KEYID = 5
6,364,334 UART: [ldev] AUTHORITY.KEYID = 7
6,365,566 UART: [ldev] FE.KEYID = 1
6,376,755 UART: [ldev] Erasing FE.KEYID = 1
8,855,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,649 UART: [ldev] --
10,644,705 UART: [fwproc] Wait for Commands...
10,646,235 UART: [fwproc] Recv command 0x46574c44
10,648,502 UART: [fwproc] Recv'd Img size: 118548 bytes
15,337,264 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,418,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,542,325 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,103,472 >>> mbox cmd response: success
16,107,880 UART: [afmc] ++
16,108,611 UART: [afmc] CDI.KEYID = 6
16,109,730 UART: [afmc] SUBJECT.KEYID = 7
16,111,232 UART: [afmc] AUTHORITY.KEYID = 5
18,612,958 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,336,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,338,397 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,353,506 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,368,703 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,383,738 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,408,199 UART: [afmc] --
20,412,461 UART: [cold-reset] --
20,415,369 UART: [state] Locking Datavault
20,421,566 UART: [state] Locking PCR0, PCR1 and PCR31
20,423,731 UART: [state] Locking ICCM
20,424,862 UART: [exit] Launching FMC @ 0x40000130
20,433,555 UART:
20,433,795 UART: Running Caliptra FMC ...
20,434,902 UART:
20,435,064 UART: [state] CFI Enabled
20,443,391 UART: [fht] FMC Alias Private Key: 7
22,209,178 UART: [art] Extend RT PCRs Done
22,210,403 UART: [art] Lock RT PCRs Done
22,212,172 UART: [art] Populate DV Done
22,217,593 UART: [fht] FMC Alias Private Key: 7
22,219,186 UART: [art] Derive CDI
22,219,947 UART: [art] Store in slot 0x4
22,262,654 UART: [art] Derive Key Pair
22,263,694 UART: [art] Store priv key in slot 0x5
24,690,023 UART: [art] Derive Key Pair - Done
24,703,237 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,409,616 UART: [art] Erasing AUTHORITY.KEYID = 7
26,411,127 UART: [art] PUB.X = BDA79B07272D43E912E17C85466E89DC0DB34D6770C58AE0A0584FC9529B5C2F5F8C8F5DB5B3D147F8BA3F33CF06E751
26,418,406 UART: [art] PUB.Y = 4CB99A7649021090325E4F8DAB5DE967E60579331E934BBD62FA20E1A225C67DC055E7C00696E4B92A05F123ACEF5A79
26,425,608 UART: [art] SIG.R = 87851CFAB27C00A71F3BD8B90001B1AF3FD0F89EAF9A73B973B76C1E739DB715FA745667EA93FBE49D22A39806CF798D
26,432,970 UART: [art] SIG.S = 208AB73C34B64DD4C3FBDDB2552CF0D6A1A29881A68124BA6E6E3A168074A5785B73BD003F7260B9E4937A9C084AE88F
27,412,182 UART: Caliptra RT
27,412,876 UART: [state] CFI Enabled
27,546,045 UART: [rt] RT listening for mailbox commands...
27,548,374 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,703,456 UART: [rt]cmd =0x41544d4e, len=14344
27,705,372 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
3,755,253 ready_for_fw is high
3,755,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,147,729 >>> mbox cmd response: success
20,398,334 UART:
20,398,716 UART: Running Caliptra FMC ...
20,399,937 UART:
20,400,127 UART: [state] CFI Enabled
20,407,894 UART: [fht] FMC Alias Private Key: 7
22,173,978 UART: [art] Extend RT PCRs Done
22,175,194 UART: [art] Lock RT PCRs Done
22,176,936 UART: [art] Populate DV Done
22,182,287 UART: [fht] FMC Alias Private Key: 7
22,184,001 UART: [art] Derive CDI
22,184,828 UART: [art] Store in slot 0x4
22,227,219 UART: [art] Derive Key Pair
22,228,288 UART: [art] Store priv key in slot 0x5
24,654,625 UART: [art] Derive Key Pair - Done
24,667,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,373,992 UART: [art] Erasing AUTHORITY.KEYID = 7
26,375,499 UART: [art] PUB.X = 1FF028262C8355304A464AB698277858AAFBD5E94BE97DE6D3594FC1416BFE11E8764A44C950A52F1C39E0E7107EED06
26,382,773 UART: [art] PUB.Y = C87B3A71756C0F674F6E4E4DE1070378091ABF0179AA657EAFA09A2F8FB2A853E0866E0650B372189B6A7D3B98F3FA5D
26,390,020 UART: [art] SIG.R = 44E444BD0D27E256F7A73A21D32A1C72709B441248935656592208C37F57A8A5E75AA48F7B3370933E4BCE7FE8BDF60A
26,397,397 UART: [art] SIG.S = 50ED4BCC41D3C10B9EE570E356CABF95B9ED3E0711E8CB48FD650EC77A6463EA3F6D94B7534ABCCB286CF03C5E84D38E
27,376,125 UART: Caliptra RT
27,376,825 UART: [state] CFI Enabled
27,510,078 UART: [rt] RT listening for mailbox commands...
27,512,391 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,667,807 UART: [rt]cmd =0x41544d4e, len=14344
27,669,559 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,683 UART: [kat] SHA2-256
892,621 UART: [kat] SHA2-384
895,470 UART: [kat] SHA2-512-ACC
897,371 UART: [kat] ECC-384
902,818 UART: [kat] HMAC-384Kdf
907,212 UART: [kat] LMS
1,475,408 UART: [kat] --
1,476,439 UART: [cold-reset] ++
1,476,855 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 ready_for_fw is high
1,481,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,784 UART: [idev] Erasing UDS.KEYID = 0
1,504,702 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,268 UART: [idev] --
1,514,159 UART: [ldev] ++
1,514,327 UART: [ldev] CDI.KEYID = 6
1,514,690 UART: [ldev] SUBJECT.KEYID = 5
1,515,116 UART: [ldev] AUTHORITY.KEYID = 7
1,515,579 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,546,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,560 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,190 UART: [ldev] --
1,585,579 UART: [fwproc] Waiting for Commands...
1,586,342 UART: [fwproc] Received command 0x46574c44
1,587,133 UART: [fwproc] Received Image of size 118548 bytes
5,168,258 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,196,958 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,228,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,368,571 >>> mbox cmd response: success
5,369,807 UART: [afmc] ++
5,369,975 UART: [afmc] CDI.KEYID = 6
5,370,337 UART: [afmc] SUBJECT.KEYID = 7
5,370,762 UART: [afmc] AUTHORITY.KEYID = 5
5,406,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,422,333 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,423,113 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,428,819 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,434,698 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,440,411 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,448,266 UART: [afmc] --
5,449,278 UART: [cold-reset] --
5,450,184 UART: [state] Locking Datavault
5,451,151 UART: [state] Locking PCR0, PCR1 and PCR31
5,451,755 UART: [state] Locking ICCM
5,452,401 UART: [exit] Launching FMC @ 0x40000130
5,457,731 UART:
5,457,747 UART: Running Caliptra FMC ...
5,458,155 UART:
5,458,209 UART: [state] CFI Enabled
5,468,781 UART: [fht] FMC Alias Private Key: 7
5,587,125 UART: [art] Extend RT PCRs Done
5,587,553 UART: [art] Lock RT PCRs Done
5,589,299 UART: [art] Populate DV Done
5,597,424 UART: [fht] FMC Alias Private Key: 7
5,598,532 UART: [art] Derive CDI
5,598,812 UART: [art] Store in slot 0x4
5,684,682 UART: [art] Derive Key Pair
5,685,042 UART: [art] Store priv key in slot 0x5
5,698,459 UART: [art] Derive Key Pair - Done
5,713,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,728,462 UART: [art] Erasing AUTHORITY.KEYID = 7
5,729,227 UART: [art] PUB.X = E109FE90563A3F082C80D84CA3B3E437D92399417AE6902C7DA12BF24075142CE0CF10A18858DA69182FDD1C5589EBBD
5,735,997 UART: [art] PUB.Y = 9640BAE4A2FC2CDFE458F5757571239CB4067C83B50E838F48906AF8E18D87EE40F0558E08DE885E39A4E5945BF370DA
5,742,944 UART: [art] SIG.R = 6C9E093BE1E52A28569FD0B30A1D862FBF007A8B40A0402D51548A569A6AE61B0919F07DFE38B8B4DE91C018818B9470
5,749,687 UART: [art] SIG.S = 1AF2A377A47C1AE8EA8AD03AFF3C570A67ADEFC103069396C654BDC53369F4B1ACF8519238892A5156E31C486BEE0E27
5,773,627 UART: Caliptra RT
5,773,878 UART: [state] CFI Enabled
5,894,359 UART: [rt] RT listening for mailbox commands...
5,895,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,018,163 UART: [rt]cmd =0x41544d4e, len=14344
6,019,442 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,889 ready_for_fw is high
1,361,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,140,681 >>> mbox cmd response: success
5,201,690 UART:
5,201,706 UART: Running Caliptra FMC ...
5,202,114 UART:
5,202,168 UART: [state] CFI Enabled
5,212,682 UART: [fht] FMC Alias Private Key: 7
5,331,532 UART: [art] Extend RT PCRs Done
5,331,960 UART: [art] Lock RT PCRs Done
5,333,618 UART: [art] Populate DV Done
5,341,813 UART: [fht] FMC Alias Private Key: 7
5,342,791 UART: [art] Derive CDI
5,343,071 UART: [art] Store in slot 0x4
5,429,133 UART: [art] Derive Key Pair
5,429,493 UART: [art] Store priv key in slot 0x5
5,443,058 UART: [art] Derive Key Pair - Done
5,457,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,473,633 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,398 UART: [art] PUB.X = 477BD0B041CCC9B224705D09337F081F3ADE48AF2F4742DE02C195BB86667EE04264065E443E42791833C844B846B17B
5,481,152 UART: [art] PUB.Y = BA8B7BFEF742821F94F65CBD22D47C15B99DFABF2B720115267DC0B98693DD642FF8238A92658F7DA54BC9E0471CD364
5,488,111 UART: [art] SIG.R = B3271E4613AFCCBF1FB4821807C6B9249B1672EA09871D04DC5C2F62727A2D87B2D42AF132E5C499D3DE6E47709520D5
5,494,876 UART: [art] SIG.S = 96BB69E69E855C83158DED580B4128059008E60E56AE16804564714FEE196F19A7112B8848A0AB45FDD6220AC82ABFF1
5,518,615 UART: Caliptra RT
5,518,866 UART: [state] CFI Enabled
5,638,563 UART: [rt] RT listening for mailbox commands...
5,639,233 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,761,947 UART: [rt]cmd =0x41544d4e, len=14344
5,763,164 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,510 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,054 UART: [kat] SHA2-256
881,985 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,100 UART: [kat] ++
886,252 UART: [kat] sha1
890,350 UART: [kat] SHA2-256
892,288 UART: [kat] SHA2-384
895,007 UART: [kat] SHA2-512-ACC
896,908 UART: [kat] ECC-384
902,597 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,260 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 ready_for_fw is high
1,481,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,725 UART: [idev] Erasing UDS.KEYID = 0
1,504,885 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,515 UART: [idev] --
1,514,538 UART: [ldev] ++
1,514,706 UART: [ldev] CDI.KEYID = 6
1,515,069 UART: [ldev] SUBJECT.KEYID = 5
1,515,495 UART: [ldev] AUTHORITY.KEYID = 7
1,515,958 UART: [ldev] FE.KEYID = 1
1,521,190 UART: [ldev] Erasing FE.KEYID = 1
1,546,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,499 UART: [ldev] --
1,585,914 UART: [fwproc] Waiting for Commands...
1,586,703 UART: [fwproc] Received command 0x46574c44
1,587,494 UART: [fwproc] Received Image of size 118548 bytes
5,243,561 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,271,747 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,302,965 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,443,322 >>> mbox cmd response: success
5,444,380 UART: [afmc] ++
5,444,548 UART: [afmc] CDI.KEYID = 6
5,444,910 UART: [afmc] SUBJECT.KEYID = 7
5,445,335 UART: [afmc] AUTHORITY.KEYID = 5
5,480,756 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,497,130 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,497,910 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,503,616 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,509,495 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,515,208 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,522,923 UART: [afmc] --
5,523,823 UART: [cold-reset] --
5,524,679 UART: [state] Locking Datavault
5,525,700 UART: [state] Locking PCR0, PCR1 and PCR31
5,526,304 UART: [state] Locking ICCM
5,526,872 UART: [exit] Launching FMC @ 0x40000130
5,532,202 UART:
5,532,218 UART: Running Caliptra FMC ...
5,532,626 UART:
5,532,769 UART: [state] CFI Enabled
5,543,493 UART: [fht] FMC Alias Private Key: 7
5,663,159 UART: [art] Extend RT PCRs Done
5,663,587 UART: [art] Lock RT PCRs Done
5,665,421 UART: [art] Populate DV Done
5,673,488 UART: [fht] FMC Alias Private Key: 7
5,674,506 UART: [art] Derive CDI
5,674,786 UART: [art] Store in slot 0x4
5,760,542 UART: [art] Derive Key Pair
5,760,902 UART: [art] Store priv key in slot 0x5
5,774,551 UART: [art] Derive Key Pair - Done
5,789,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,804,594 UART: [art] Erasing AUTHORITY.KEYID = 7
5,805,359 UART: [art] PUB.X = 458DAAEE8F6AFCB732D728E8FBC54CB64C72E4FF89667DD7F31C56EA0D9DEFBEA664965EB9EABA9274614854F1976087
5,812,146 UART: [art] PUB.Y = 4CD216075D0C2B361D9562E65309F323D7AABD6A2E7247B805639D0BC488A8E9EF4C5D6303E254442E28BEA33D6F4E9E
5,819,084 UART: [art] SIG.R = 502D87B06A0F58800A3D04400EB7541DBE1F42AD56E9CE2F853DD4A704C05F69A692FF59465DB0D5B7D40F722AFB0764
5,825,841 UART: [art] SIG.S = 2D2FE2276A7E8489E9299983E6C4D4DE4BEA6F5CED18E1E034CC9175B48874D88D36D6563B73428229BD07948AF73452
5,849,540 UART: Caliptra RT
5,849,883 UART: [state] CFI Enabled
5,970,884 UART: [rt] RT listening for mailbox commands...
5,971,554 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,094,520 UART: [rt]cmd =0x41544d4e, len=14344
6,095,993 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.95s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,676 ready_for_fw is high
1,362,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,178,889 >>> mbox cmd response: success
5,240,474 UART:
5,240,490 UART: Running Caliptra FMC ...
5,240,898 UART:
5,241,041 UART: [state] CFI Enabled
5,251,393 UART: [fht] FMC Alias Private Key: 7
5,370,789 UART: [art] Extend RT PCRs Done
5,371,217 UART: [art] Lock RT PCRs Done
5,372,747 UART: [art] Populate DV Done
5,380,914 UART: [fht] FMC Alias Private Key: 7
5,382,044 UART: [art] Derive CDI
5,382,324 UART: [art] Store in slot 0x4
5,468,010 UART: [art] Derive Key Pair
5,468,370 UART: [art] Store priv key in slot 0x5
5,481,575 UART: [art] Derive Key Pair - Done
5,496,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,511,902 UART: [art] Erasing AUTHORITY.KEYID = 7
5,512,667 UART: [art] PUB.X = E4E5775DFD288EC235A8CC71697C48BA21CDFD95F304AD7CAB84F77C76017A12D6DADD21F72D5FCAF63D60CCF261502C
5,519,453 UART: [art] PUB.Y = EDFC4AF777E904FBE7E88BD8AF505440385C1B76BEF4DD5BD09A139E5742A8C05A106FB8C9CD257D190F79CC06C27FEE
5,526,416 UART: [art] SIG.R = 147BC2F9E45624826F1B7B0814A18FD015DEF9DC076E765933DFE01B5FD4089C11BE8957B0F3036FFD4857A296BB7E15
5,533,180 UART: [art] SIG.S = 5E6E5EA5DB6F4FCB4F7258D91D30DFD323F94A4F0AA1639732AE91A2EB55C68E1182AA9DDA69D20AF8D919F75AF9CCA1
5,556,828 UART: Caliptra RT
5,557,171 UART: [state] CFI Enabled
5,677,486 UART: [rt] RT listening for mailbox commands...
5,678,156 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,801,150 UART: [rt]cmd =0x41544d4e, len=14344
5,802,829 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
890,894 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,998 UART: [kat] ++
895,150 UART: [kat] sha1
899,246 UART: [kat] SHA2-256
901,186 UART: [kat] SHA2-384
903,803 UART: [kat] SHA2-512-ACC
905,704 UART: [kat] ECC-384
915,463 UART: [kat] HMAC-384Kdf
920,091 UART: [kat] LMS
1,168,403 UART: [kat] --
1,169,090 UART: [cold-reset] ++
1,169,666 UART: [fht] FHT @ 0x50003400
1,172,374 UART: [idev] ++
1,172,542 UART: [idev] CDI.KEYID = 6
1,172,903 UART: [idev] SUBJECT.KEYID = 7
1,173,328 UART: [idev] UDS.KEYID = 0
1,173,674 ready_for_fw is high
1,173,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,198,121 UART: [idev] Sha1 KeyId Algorithm
1,207,165 UART: [idev] --
1,208,116 UART: [ldev] ++
1,208,284 UART: [ldev] CDI.KEYID = 6
1,208,648 UART: [ldev] SUBJECT.KEYID = 5
1,209,075 UART: [ldev] AUTHORITY.KEYID = 7
1,209,538 UART: [ldev] FE.KEYID = 1
1,214,660 UART: [ldev] Erasing FE.KEYID = 1
1,241,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,290 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,514 UART: [ldev] --
1,280,765 UART: [fwproc] Wait for Commands...
1,281,474 UART: [fwproc] Recv command 0x46574c44
1,282,207 UART: [fwproc] Recv'd Img size: 118548 bytes
3,170,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,198,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,229,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,369,900 >>> mbox cmd response: success
3,370,936 UART: [afmc] ++
3,371,104 UART: [afmc] CDI.KEYID = 6
3,371,467 UART: [afmc] SUBJECT.KEYID = 7
3,371,893 UART: [afmc] AUTHORITY.KEYID = 5
3,407,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,423,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,424,662 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,430,369 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,436,246 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,441,956 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,449,622 UART: [afmc] --
3,450,549 UART: [cold-reset] --
3,451,547 UART: [state] Locking Datavault
3,452,634 UART: [state] Locking PCR0, PCR1 and PCR31
3,453,238 UART: [state] Locking ICCM
3,453,736 UART: [exit] Launching FMC @ 0x40000130
3,459,066 UART:
3,459,082 UART: Running Caliptra FMC ...
3,459,490 UART:
3,459,544 UART: [state] CFI Enabled
3,469,996 UART: [fht] FMC Alias Private Key: 7
3,588,768 UART: [art] Extend RT PCRs Done
3,589,196 UART: [art] Lock RT PCRs Done
3,591,050 UART: [art] Populate DV Done
3,599,095 UART: [fht] FMC Alias Private Key: 7
3,600,065 UART: [art] Derive CDI
3,600,345 UART: [art] Store in slot 0x4
3,686,392 UART: [art] Derive Key Pair
3,686,752 UART: [art] Store priv key in slot 0x5
3,700,032 UART: [art] Derive Key Pair - Done
3,714,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,575 UART: [art] PUB.X = 8A0C4979AEC6C1B78E74C637C6B39EEF0E10D675DFA35A0992ED43C397D2569AB91478058DD6E3DAD50B08C687555A75
3,737,335 UART: [art] PUB.Y = 1E0C2F8583117BBFBBA25E99C811619CEC7FB74D44A237EEAA705A51EC962975CE7F5D2E8AE3C6E8EFE3A8EA431BFC7B
3,744,308 UART: [art] SIG.R = 515802C0A51BBCA4FFDFA2DA6E0F0E8661B0842234450DE5836CAB3B7212E0EEDDC1F2E63A5E58355703BFC4D104A76E
3,751,076 UART: [art] SIG.S = 7C833D684A89911ED8E3EEEE2160368F8F02AD4B3D36745B627DB4D4300895172FA8343498006021F860E32E7106F261
3,774,669 UART: Caliptra RT
3,774,920 UART: [state] CFI Enabled
3,895,710 UART: [rt] RT listening for mailbox commands...
3,896,380 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,019,754 UART: [rt]cmd =0x41544d4e, len=14344
4,021,423 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,722 ready_for_fw is high
1,058,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,232,457 >>> mbox cmd response: success
3,293,972 UART:
3,293,988 UART: Running Caliptra FMC ...
3,294,396 UART:
3,294,450 UART: [state] CFI Enabled
3,304,594 UART: [fht] FMC Alias Private Key: 7
3,424,646 UART: [art] Extend RT PCRs Done
3,425,074 UART: [art] Lock RT PCRs Done
3,426,944 UART: [art] Populate DV Done
3,435,279 UART: [fht] FMC Alias Private Key: 7
3,436,211 UART: [art] Derive CDI
3,436,491 UART: [art] Store in slot 0x4
3,522,756 UART: [art] Derive Key Pair
3,523,116 UART: [art] Store priv key in slot 0x5
3,535,940 UART: [art] Derive Key Pair - Done
3,550,894 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,566,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,567,444 UART: [art] PUB.X = A3A066A2CB295D0A796EFEBD53588572117DFF741390927D8C496FDB310774793446D847E2EDDD2C3701F5795D2765D2
3,574,203 UART: [art] PUB.Y = 71DBD6AC63AE5750F9E37F65732D60A08A506498D5C32F5E255E833A3848CD7D45C0466CD7483FB602582F6B1873D849
3,581,148 UART: [art] SIG.R = 2D566C3AB4AC90EBAB97D464A69B94022060B8D8973826453F4A8C6998D6F68D3BCB31B403E29F43AA1C9A33C95B97F4
3,587,918 UART: [art] SIG.S = 1CCA7937CEBC5F965A98BE4112D1CE4C4E1ADE5E885D14F7BB96125C55D3C9DFA0247A3CA662F6DB0BE0A753F439A9D4
3,611,983 UART: Caliptra RT
3,612,234 UART: [state] CFI Enabled
3,732,872 UART: [rt] RT listening for mailbox commands...
3,733,542 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,856,478 UART: [rt]cmd =0x41544d4e, len=14344
3,857,873 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,290 UART: [state] WD Timer not started. Device not locked for debugging
87,453 UART: [kat] SHA2-256
891,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,248 UART: [kat] SHA2-512-ACC
906,149 UART: [kat] ECC-384
915,970 UART: [kat] HMAC-384Kdf
920,756 UART: [kat] LMS
1,169,068 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,163 UART: [idev] ++
1,173,331 UART: [idev] CDI.KEYID = 6
1,173,692 UART: [idev] SUBJECT.KEYID = 7
1,174,117 UART: [idev] UDS.KEYID = 0
1,174,463 ready_for_fw is high
1,174,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,270 UART: [idev] Erasing UDS.KEYID = 0
1,198,944 UART: [idev] Sha1 KeyId Algorithm
1,207,718 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,623 UART: [ldev] Erasing FE.KEYID = 1
1,241,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,535 UART: [ldev] --
1,280,896 UART: [fwproc] Wait for Commands...
1,281,671 UART: [fwproc] Recv command 0x46574c44
1,282,404 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,849 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,108 >>> mbox cmd response: success
3,369,340 UART: [afmc] ++
3,369,508 UART: [afmc] CDI.KEYID = 6
3,369,871 UART: [afmc] SUBJECT.KEYID = 7
3,370,297 UART: [afmc] AUTHORITY.KEYID = 5
3,406,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,465 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,214 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,921 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,798 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,508 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,242 UART: [afmc] --
3,449,107 UART: [cold-reset] --
3,449,845 UART: [state] Locking Datavault
3,450,972 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,576 UART: [state] Locking ICCM
3,452,206 UART: [exit] Launching FMC @ 0x40000130
3,457,536 UART:
3,457,552 UART: Running Caliptra FMC ...
3,457,960 UART:
3,458,103 UART: [state] CFI Enabled
3,468,923 UART: [fht] FMC Alias Private Key: 7
3,588,087 UART: [art] Extend RT PCRs Done
3,588,515 UART: [art] Lock RT PCRs Done
3,589,889 UART: [art] Populate DV Done
3,598,254 UART: [fht] FMC Alias Private Key: 7
3,599,312 UART: [art] Derive CDI
3,599,592 UART: [art] Store in slot 0x4
3,685,343 UART: [art] Derive Key Pair
3,685,703 UART: [art] Store priv key in slot 0x5
3,699,289 UART: [art] Derive Key Pair - Done
3,714,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,729,739 UART: [art] Erasing AUTHORITY.KEYID = 7
3,730,504 UART: [art] PUB.X = B0F8C947F72B96238F604C4DA47640A178B45ECB2B61B0EECCA1E746D3D38693438789F5C372AC917073C14315806924
3,737,270 UART: [art] PUB.Y = 8A42FBC940A3AB862740A83403B927D29E73F078B795678084B92F53529EFD40DE9F76A57DECDA6BCB16AFBB081892CE
3,744,224 UART: [art] SIG.R = C906CEF0E34720D84CE37A63F189920FE1239265F82FD92E6E341FC5CC1660FC9F9DD10617718996DB3FFF2DC7795368
3,750,989 UART: [art] SIG.S = CF1B9F3CB82BAD41CA4A1E50D2F3F2C2641859CD3AC24FA6A9011371DBBC03BC9BE8E854F70B34C21D2D4207763BEF41
3,774,805 UART: Caliptra RT
3,775,148 UART: [state] CFI Enabled
3,894,791 UART: [rt] RT listening for mailbox commands...
3,895,461 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,485 UART: [rt]cmd =0x41544d4e, len=14344
4,019,942 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,623 ready_for_fw is high
1,059,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,312 >>> mbox cmd response: success
3,280,187 UART:
3,280,203 UART: Running Caliptra FMC ...
3,280,611 UART:
3,280,754 UART: [state] CFI Enabled
3,291,656 UART: [fht] FMC Alias Private Key: 7
3,411,350 UART: [art] Extend RT PCRs Done
3,411,778 UART: [art] Lock RT PCRs Done
3,413,210 UART: [art] Populate DV Done
3,421,509 UART: [fht] FMC Alias Private Key: 7
3,422,505 UART: [art] Derive CDI
3,422,785 UART: [art] Store in slot 0x4
3,508,678 UART: [art] Derive Key Pair
3,509,038 UART: [art] Store priv key in slot 0x5
3,522,746 UART: [art] Derive Key Pair - Done
3,536,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,552,455 UART: [art] Erasing AUTHORITY.KEYID = 7
3,553,220 UART: [art] PUB.X = 94AE67AA1B1E4D4976CE03EF28255144654AFC40950290AD611F2D40A9F3BF53B903570C94813B3C18F406BA7DE2E4A5
3,559,979 UART: [art] PUB.Y = B115018CA77F5AFD19D04DF7023B437A7E760D1173A1B63F0316ACB9E5E64EA1D6FBCE8DDECE60CF90B3B7595B44C7BE
3,566,939 UART: [art] SIG.R = B0F0419FC463F7081A62AD1EFF6A1FEE340B7BF50DA8FB1DDA7087F0116A9CB4617A22960FCDB89A991A97DE7C09E6FC
3,573,716 UART: [art] SIG.S = 13C1233DC8181ACF912251F8FF29E698F307A0409CC26C8327E1299C6677E37DEF1F1E9DCF0B8592347F088032B8A601
3,597,424 UART: Caliptra RT
3,597,767 UART: [state] CFI Enabled
3,717,671 UART: [rt] RT listening for mailbox commands...
3,718,341 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,183 UART: [rt]cmd =0x41544d4e, len=14344
3,842,754 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,612 UART: [kat] SHA2-512-ACC
908,513 UART: [kat] ECC-384
918,088 UART: [kat] HMAC-384Kdf
922,652 UART: [kat] LMS
1,170,980 UART: [kat] --
1,171,957 UART: [cold-reset] ++
1,172,535 UART: [fht] FHT @ 0x50003400
1,175,144 UART: [idev] ++
1,175,312 UART: [idev] CDI.KEYID = 6
1,175,672 UART: [idev] SUBJECT.KEYID = 7
1,176,096 UART: [idev] UDS.KEYID = 0
1,176,441 ready_for_fw is high
1,176,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,062 UART: [idev] Erasing UDS.KEYID = 0
1,200,873 UART: [idev] Sha1 KeyId Algorithm
1,209,583 UART: [idev] --
1,210,797 UART: [ldev] ++
1,210,965 UART: [ldev] CDI.KEYID = 6
1,211,328 UART: [ldev] SUBJECT.KEYID = 5
1,211,754 UART: [ldev] AUTHORITY.KEYID = 7
1,212,217 UART: [ldev] FE.KEYID = 1
1,217,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,142 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,043 UART: [ldev] --
1,283,396 UART: [fwproc] Wait for Commands...
1,284,134 UART: [fwproc] Recv command 0x46574c44
1,284,862 UART: [fwproc] Recv'd Img size: 118548 bytes
3,172,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,201,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,232,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,372,761 >>> mbox cmd response: success
3,373,855 UART: [afmc] ++
3,374,023 UART: [afmc] CDI.KEYID = 6
3,374,385 UART: [afmc] SUBJECT.KEYID = 7
3,374,810 UART: [afmc] AUTHORITY.KEYID = 5
3,410,123 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,784 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,532 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,238 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,117 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,827 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,648 UART: [afmc] --
3,453,572 UART: [cold-reset] --
3,454,344 UART: [state] Locking Datavault
3,455,665 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,269 UART: [state] Locking ICCM
3,456,907 UART: [exit] Launching FMC @ 0x40000130
3,462,237 UART:
3,462,253 UART: Running Caliptra FMC ...
3,462,661 UART:
3,462,715 UART: [state] CFI Enabled
3,473,235 UART: [fht] FMC Alias Private Key: 7
3,592,731 UART: [art] Extend RT PCRs Done
3,593,159 UART: [art] Lock RT PCRs Done
3,594,537 UART: [art] Populate DV Done
3,602,840 UART: [fht] FMC Alias Private Key: 7
3,603,874 UART: [art] Derive CDI
3,604,154 UART: [art] Store in slot 0x4
3,689,991 UART: [art] Derive Key Pair
3,690,351 UART: [art] Store priv key in slot 0x5
3,703,301 UART: [art] Derive Key Pair - Done
3,718,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,733,728 UART: [art] Erasing AUTHORITY.KEYID = 7
3,734,493 UART: [art] PUB.X = 65BB78979F63A49CCD17BD0AB271AD6A99B134F2A423A3B733ED285C8ED732E39D7EF58499EB567D2EBC74D998FF60A8
3,741,274 UART: [art] PUB.Y = 3C7E05141A51EC19364A71128657CBE798F240602E8EC6577DF7ACD07097413A1DF2F42A796341BEC16E74E00D132CF0
3,748,218 UART: [art] SIG.R = D5BCB9C0737AF56C595486A8304338348DC3CC59442F0046DC23FD94DB06990FB8814947BA5DE61002E2F558D341D54A
3,754,957 UART: [art] SIG.S = AF14E495675E8928F46FA8485A8C1E191BE3D179610B038E242FBABD373F24EA72AFAF691F68CFB54119AFC543AD0E4A
3,778,526 UART: Caliptra RT
3,778,777 UART: [state] CFI Enabled
3,898,090 UART: [rt] RT listening for mailbox commands...
3,898,760 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,828 UART: [rt]cmd =0x41544d4e, len=14344
4,023,443 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 ready_for_fw is high
1,060,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,841 >>> mbox cmd response: success
3,283,454 UART:
3,283,470 UART: Running Caliptra FMC ...
3,283,878 UART:
3,283,932 UART: [state] CFI Enabled
3,294,910 UART: [fht] FMC Alias Private Key: 7
3,413,546 UART: [art] Extend RT PCRs Done
3,413,974 UART: [art] Lock RT PCRs Done
3,415,716 UART: [art] Populate DV Done
3,423,913 UART: [fht] FMC Alias Private Key: 7
3,424,997 UART: [art] Derive CDI
3,425,277 UART: [art] Store in slot 0x4
3,510,402 UART: [art] Derive Key Pair
3,510,762 UART: [art] Store priv key in slot 0x5
3,523,708 UART: [art] Derive Key Pair - Done
3,538,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,554,055 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,820 UART: [art] PUB.X = 8A89C19A632EA20DF3DA1A4508D4ED772B4D632CA51750E1A167C05398628A78EA8BC60EA748DECC2FBFD4C7A60DAE2F
3,561,598 UART: [art] PUB.Y = 0583856E61DFC355A923772240534BE672F2A0864388FDA0FDEC56246300877E5E6829F6A7CA28BDF16E5C2B864E1C77
3,568,521 UART: [art] SIG.R = 7A07DE3EEF08C7F715C2BE1D4A2E8BB43761AC1A77505BDBCDB34A01593F1D88D75E18D7C3C441F32E07E71DEA1F5484
3,575,297 UART: [art] SIG.S = D079110C48D32568DD42D963A5966FB02A7F4930D75CF759F3F1CC34DAFD71E746D30E127BF062B9DC5B99D13339F5AB
3,598,787 UART: Caliptra RT
3,599,038 UART: [state] CFI Enabled
3,719,014 UART: [rt] RT listening for mailbox commands...
3,719,684 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,662 UART: [rt]cmd =0x41544d4e, len=14344
3,844,157 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,532 UART: [kat] SHA2-256
904,472 UART: [kat] SHA2-384
907,195 UART: [kat] SHA2-512-ACC
909,096 UART: [kat] ECC-384
918,771 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,754 UART: [cold-reset] ++
1,173,334 UART: [fht] FHT @ 0x50003400
1,175,903 UART: [idev] ++
1,176,071 UART: [idev] CDI.KEYID = 6
1,176,431 UART: [idev] SUBJECT.KEYID = 7
1,176,855 UART: [idev] UDS.KEYID = 0
1,177,200 ready_for_fw is high
1,177,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,881 UART: [idev] Erasing UDS.KEYID = 0
1,201,978 UART: [idev] Sha1 KeyId Algorithm
1,210,506 UART: [idev] --
1,211,526 UART: [ldev] ++
1,211,694 UART: [ldev] CDI.KEYID = 6
1,212,057 UART: [ldev] SUBJECT.KEYID = 5
1,212,483 UART: [ldev] AUTHORITY.KEYID = 7
1,212,946 UART: [ldev] FE.KEYID = 1
1,218,010 UART: [ldev] Erasing FE.KEYID = 1
1,244,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,480 UART: [ldev] --
1,283,769 UART: [fwproc] Wait for Commands...
1,284,493 UART: [fwproc] Recv command 0x46574c44
1,285,221 UART: [fwproc] Recv'd Img size: 118548 bytes
3,173,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,200,523 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,231,693 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,371,846 >>> mbox cmd response: success
3,372,988 UART: [afmc] ++
3,373,156 UART: [afmc] CDI.KEYID = 6
3,373,518 UART: [afmc] SUBJECT.KEYID = 7
3,373,943 UART: [afmc] AUTHORITY.KEYID = 5
3,409,906 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,426,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,427,173 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,432,879 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,438,758 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,444,468 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,452,241 UART: [afmc] --
3,453,223 UART: [cold-reset] --
3,453,943 UART: [state] Locking Datavault
3,455,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,455,746 UART: [state] Locking ICCM
3,456,356 UART: [exit] Launching FMC @ 0x40000130
3,461,686 UART:
3,461,702 UART: Running Caliptra FMC ...
3,462,110 UART:
3,462,253 UART: [state] CFI Enabled
3,473,349 UART: [fht] FMC Alias Private Key: 7
3,593,403 UART: [art] Extend RT PCRs Done
3,593,831 UART: [art] Lock RT PCRs Done
3,595,613 UART: [art] Populate DV Done
3,603,856 UART: [fht] FMC Alias Private Key: 7
3,605,020 UART: [art] Derive CDI
3,605,300 UART: [art] Store in slot 0x4
3,690,735 UART: [art] Derive Key Pair
3,691,095 UART: [art] Store priv key in slot 0x5
3,704,015 UART: [art] Derive Key Pair - Done
3,718,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,577 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,342 UART: [art] PUB.X = 654A02FC428B97E2DB2556DABC6BF8263B738D82CB04492E95DE8ADBD8306FF0085D3D1A1C55F06D602EA64CBFE7006B
3,742,097 UART: [art] PUB.Y = FEB0BDABB535C18C3D71B9BA03F7B395598BC22CCC6E0978FBA912206A896224F84183B4556C0B5A7F702B5FD157C1D7
3,749,050 UART: [art] SIG.R = A9885ABD4003E41A705081DA26CE8229F04846B572F534BED19545F0DFD413A04128871E0A9E969C84693C0373A6FC87
3,755,807 UART: [art] SIG.S = 282F063C330D758BB87164CE0FB160A27E6A53CFD2A0A7D88B35C5502176F64079FE2925676AEC4D6E933EB29E8FF49B
3,778,892 UART: Caliptra RT
3,779,235 UART: [state] CFI Enabled
3,900,735 UART: [rt] RT listening for mailbox commands...
3,901,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,389 UART: [rt]cmd =0x41544d4e, len=14344
4,025,722 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 ready_for_fw is high
1,061,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,245 >>> mbox cmd response: success
3,288,276 UART:
3,288,292 UART: Running Caliptra FMC ...
3,288,700 UART:
3,288,843 UART: [state] CFI Enabled
3,299,735 UART: [fht] FMC Alias Private Key: 7
3,418,991 UART: [art] Extend RT PCRs Done
3,419,419 UART: [art] Lock RT PCRs Done
3,420,881 UART: [art] Populate DV Done
3,428,646 UART: [fht] FMC Alias Private Key: 7
3,429,724 UART: [art] Derive CDI
3,430,004 UART: [art] Store in slot 0x4
3,515,851 UART: [art] Derive Key Pair
3,516,211 UART: [art] Store priv key in slot 0x5
3,529,439 UART: [art] Derive Key Pair - Done
3,544,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,288 UART: [art] PUB.X = 6A4FCE4F6D955BEEFB84BC5299AAFB3FE92D59FCB38E7CB8786BB21F1DA4637033B6793C2179381E634D9EB9F8AB186B
3,567,078 UART: [art] PUB.Y = 4ED69839A3E0D5D92142FF2B130EF8549249F12E205CB14C5FE3C3A0954B2872C27D71264B4B448B34C956E604BAD404
3,574,019 UART: [art] SIG.R = 3632760FE09C0777BA0C85138ED3B30D77FEB72FA138E1A536E153D2BA6CCFE14B861D0AF50D2E27ED9D41BBECFE55A9
3,580,791 UART: [art] SIG.S = 6474DAA141090A01E620997E340090D1037249A0475E05C46A058ADE672855FF5C0196CC36980948BBC1D94F9E0ABB38
3,604,730 UART: Caliptra RT
3,605,073 UART: [state] CFI Enabled
3,724,283 UART: [rt] RT listening for mailbox commands...
3,724,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,848,361 UART: [rt]cmd =0x41544d4e, len=14344
3,849,824 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_preamble_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,024 UART:
192,395 UART: Running Caliptra ROM ...
193,524 UART:
193,672 UART: [state] CFI Enabled
262,446 UART: [state] LifecycleState = Unprovisioned
264,368 UART: [state] DebugLocked = No
266,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,892 UART: [kat] SHA2-256
440,634 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,151 UART: [kat] ++
451,598 UART: [kat] sha1
463,392 UART: [kat] SHA2-256
466,118 UART: [kat] SHA2-384
472,324 UART: [kat] SHA2-512-ACC
474,691 UART: [kat] ECC-384
2,768,977 UART: [kat] HMAC-384Kdf
2,801,315 UART: [kat] LMS
3,991,554 UART: [kat] --
3,997,430 UART: [cold-reset] ++
3,999,226 UART: [fht] Storing FHT @ 0x50003400
4,010,862 UART: [idev] ++
4,011,470 UART: [idev] CDI.KEYID = 6
4,012,362 UART: [idev] SUBJECT.KEYID = 7
4,013,612 UART: [idev] UDS.KEYID = 0
4,014,638 ready_for_fw is high
4,014,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,770 UART: [idev] Erasing UDS.KEYID = 0
7,347,044 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,606 UART: [idev] --
7,370,442 UART: [ldev] ++
7,371,018 UART: [ldev] CDI.KEYID = 6
7,372,002 UART: [ldev] SUBJECT.KEYID = 5
7,373,224 UART: [ldev] AUTHORITY.KEYID = 7
7,374,454 UART: [ldev] FE.KEYID = 1
7,402,674 UART: [ldev] Erasing FE.KEYID = 1
10,736,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,227 UART: [ldev] --
13,116,221 UART: [fwproc] Waiting for Commands...
13,118,794 UART: [fwproc] Received command 0x46574c44
13,120,979 UART: [fwproc] Received Image of size 118548 bytes
21,733,947 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,816,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,890,001 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,218,811 >>> mbox cmd response: success
22,223,063 UART: [afmc] ++
22,223,682 UART: [afmc] CDI.KEYID = 6
22,224,619 UART: [afmc] SUBJECT.KEYID = 7
22,225,842 UART: [afmc] AUTHORITY.KEYID = 5
25,593,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,892,479 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,894,791 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,909,257 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,924,078 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,938,457 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,958,264 UART: [afmc] --
27,961,590 UART: [cold-reset] --
27,964,911 UART: [state] Locking Datavault
27,969,832 UART: [state] Locking PCR0, PCR1 and PCR31
27,971,539 UART: [state] Locking ICCM
27,972,856 UART: [exit] Launching FMC @ 0x40000130
27,981,249 UART:
27,981,484 UART: Running Caliptra FMC ...
27,982,603 UART:
27,982,765 UART: [state] CFI Enabled
28,053,296 UART: [fht] FMC Alias Private Key: 7
30,394,413 UART: [art] Extend RT PCRs Done
30,395,639 UART: [art] Lock RT PCRs Done
30,397,700 UART: [art] Populate DV Done
30,403,213 UART: [fht] FMC Alias Private Key: 7
30,404,700 UART: [art] Derive CDI
30,405,464 UART: [art] Store in slot 0x4
30,461,699 UART: [art] Derive Key Pair
30,462,743 UART: [art] Store priv key in slot 0x5
33,755,352 UART: [art] Derive Key Pair - Done
33,768,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,056,528 UART: [art] Erasing AUTHORITY.KEYID = 7
36,058,045 UART: [art] PUB.X = F951CDA3A220F860BC77F7637E59C6417D230F3EBD7751A870614E905DD4F81FD807F530B4F4B1AA99FB67DACAAA99FC
36,065,305 UART: [art] PUB.Y = 6326D1B5B2490A717C79565EF74FEDB6C66823F5BD11A7EB45F82A18771540A6E43AD1340A2D8D2F63CD0FE98C21FFA3
36,072,555 UART: [art] SIG.R = 2F96B521EF22C60AB7641E757CD2F6FDF50A06F378F3B0BDB41798A3FC536859C74C964659D7C1767484E98FD030808D
36,079,946 UART: [art] SIG.S = 49985DDF05EB990EEFC2E6402EC8168BBF4F883EDCA0B928BF529A8BC4345361DA0BE315B21D76504F4ADD018E5C361E
37,385,573 UART: Caliptra RT
37,386,280 UART: [state] CFI Enabled
37,564,080 UART: [rt] RT listening for mailbox commands...
37,566,390 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,721,486 UART: [rt]cmd =0x41544d4e, len=14344
37,726,426 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,809,202 ready_for_fw is high
3,809,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,090,841 >>> mbox cmd response: success
27,796,290 UART:
27,796,687 UART: Running Caliptra FMC ...
27,797,835 UART:
27,797,997 UART: [state] CFI Enabled
27,864,005 UART: [fht] FMC Alias Private Key: 7
30,203,617 UART: [art] Extend RT PCRs Done
30,204,866 UART: [art] Lock RT PCRs Done
30,206,389 UART: [art] Populate DV Done
30,211,850 UART: [fht] FMC Alias Private Key: 7
30,213,335 UART: [art] Derive CDI
30,214,100 UART: [art] Store in slot 0x4
30,273,136 UART: [art] Derive Key Pair
30,274,129 UART: [art] Store priv key in slot 0x5
33,567,037 UART: [art] Derive Key Pair - Done
33,579,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,868,724 UART: [art] Erasing AUTHORITY.KEYID = 7
35,870,247 UART: [art] PUB.X = D9A2450ED5F90C23E03B8625D6B47D5AE25CB6DCD47C458CFB2734F38494DFF7798E09F9E0E9D7D102E28EBBBD8DA993
35,877,496 UART: [art] PUB.Y = 40A13D768B07D41115809116577620C3F5C81ADB6DB37B6450E3E4DE318193C0246E9CD4E4FB330744A91FFBBC014F80
35,884,793 UART: [art] SIG.R = 5934DD916E6164CCD076B21E277FAA750167162D8110A75CAF9F1CA13489E17D8E2090C3A7D886620A262C64C221D07E
35,892,141 UART: [art] SIG.S = BEA969BF1311F68B1BF05775D69793901507DB05E32C2C334A2D4F1A39BFB15F2BF9CE83285F1E1A2FD756B7CA5E4E68
37,197,322 UART: Caliptra RT
37,198,015 UART: [state] CFI Enabled
37,374,982 UART: [rt] RT listening for mailbox commands...
37,377,268 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,532,474 UART: [rt]cmd =0x41544d4e, len=14344
37,537,702 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,381 UART:
192,756 UART: Running Caliptra ROM ...
193,937 UART:
603,746 UART: [state] CFI Enabled
620,613 UART: [state] LifecycleState = Unprovisioned
622,555 UART: [state] DebugLocked = No
624,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,337 UART: [kat] SHA2-256
800,047 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,575 UART: [kat] ++
811,021 UART: [kat] sha1
820,828 UART: [kat] SHA2-256
823,554 UART: [kat] SHA2-384
828,685 UART: [kat] SHA2-512-ACC
831,047 UART: [kat] ECC-384
3,114,258 UART: [kat] HMAC-384Kdf
3,126,316 UART: [kat] LMS
4,316,461 UART: [kat] --
4,321,261 UART: [cold-reset] ++
4,323,198 UART: [fht] Storing FHT @ 0x50003400
4,333,392 UART: [idev] ++
4,333,945 UART: [idev] CDI.KEYID = 6
4,334,892 UART: [idev] SUBJECT.KEYID = 7
4,336,126 UART: [idev] UDS.KEYID = 0
4,337,156 ready_for_fw is high
4,337,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,246 UART: [idev] Erasing UDS.KEYID = 0
7,620,816 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,210 UART: [idev] --
7,646,640 UART: [ldev] ++
7,647,208 UART: [ldev] CDI.KEYID = 6
7,648,166 UART: [ldev] SUBJECT.KEYID = 5
7,649,372 UART: [ldev] AUTHORITY.KEYID = 7
7,650,672 UART: [ldev] FE.KEYID = 1
7,660,991 UART: [ldev] Erasing FE.KEYID = 1
10,952,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,980 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,183 UART: [ldev] --
13,313,795 UART: [fwproc] Waiting for Commands...
13,315,504 UART: [fwproc] Received command 0x46574c44
13,317,687 UART: [fwproc] Received Image of size 118548 bytes
22,484,828 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,568,177 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,641,350 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,968,989 >>> mbox cmd response: success
22,973,948 UART: [afmc] ++
22,974,574 UART: [afmc] CDI.KEYID = 6
22,975,483 UART: [afmc] SUBJECT.KEYID = 7
22,976,748 UART: [afmc] AUTHORITY.KEYID = 5
26,293,584 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,590,696 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,593,003 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,607,481 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,622,253 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,636,724 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,657,988 UART: [afmc] --
28,661,038 UART: [cold-reset] --
28,666,782 UART: [state] Locking Datavault
28,671,321 UART: [state] Locking PCR0, PCR1 and PCR31
28,673,063 UART: [state] Locking ICCM
28,674,489 UART: [exit] Launching FMC @ 0x40000130
28,682,877 UART:
28,683,121 UART: Running Caliptra FMC ...
28,684,140 UART:
28,684,281 UART: [state] CFI Enabled
28,692,537 UART: [fht] FMC Alias Private Key: 7
31,032,700 UART: [art] Extend RT PCRs Done
31,033,934 UART: [art] Lock RT PCRs Done
31,035,426 UART: [art] Populate DV Done
31,040,897 UART: [fht] FMC Alias Private Key: 7
31,042,496 UART: [art] Derive CDI
31,043,308 UART: [art] Store in slot 0x4
31,085,632 UART: [art] Derive Key Pair
31,086,629 UART: [art] Store priv key in slot 0x5
34,328,989 UART: [art] Derive Key Pair - Done
34,341,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,622,171 UART: [art] Erasing AUTHORITY.KEYID = 7
36,623,676 UART: [art] PUB.X = CB50A75345DBF3D375EB6D8D77AA70C86BE4073C815F97FB16FF68BC90C6E9B30C8684EF62EF7DC97955C7EB3BF5E4A8
36,631,007 UART: [art] PUB.Y = 814CE0C2C5EAE38213DF3296E2583614B747B88DC39AE6933FA5B9E49AEB19648BCA656F35E8B8764B44D5E7844A33CF
36,638,200 UART: [art] SIG.R = AD02559576444276AB323F36BEF70BE97E125C4FC671EB2583536A1AD0983C895A95A5E1387F4B8C453D1A22972F37D4
36,645,584 UART: [art] SIG.S = 60A53038508BA59D85B8F94BFBB33226776F1ABF589E59531BA5F55FFA01979DBDCA2936216DDC83603FC062C397661E
37,951,030 UART: Caliptra RT
37,951,715 UART: [state] CFI Enabled
38,085,133 UART: [rt] RT listening for mailbox commands...
38,087,464 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,242,791 UART: [rt]cmd =0x41544d4e, len=14344
38,247,405 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
4,123,792 ready_for_fw is high
4,124,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,489,651 >>> mbox cmd response: success
28,130,855 UART:
28,131,268 UART: Running Caliptra FMC ...
28,132,465 UART:
28,132,652 UART: [state] CFI Enabled
28,140,531 UART: [fht] FMC Alias Private Key: 7
30,480,700 UART: [art] Extend RT PCRs Done
30,481,931 UART: [art] Lock RT PCRs Done
30,483,203 UART: [art] Populate DV Done
30,488,663 UART: [fht] FMC Alias Private Key: 7
30,490,251 UART: [art] Derive CDI
30,490,988 UART: [art] Store in slot 0x4
30,533,690 UART: [art] Derive Key Pair
30,534,731 UART: [art] Store priv key in slot 0x5
33,776,707 UART: [art] Derive Key Pair - Done
33,789,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,070,337 UART: [art] Erasing AUTHORITY.KEYID = 7
36,071,847 UART: [art] PUB.X = 54A67A40F69274DE576B4D8CFA41AA94CD661101B4217B60A0AB77ACCC743ADDA2403FC58E20D8524CE9575FF3CA2692
36,079,100 UART: [art] PUB.Y = B47B722C4B1E94658BBED2A26A7E468DC7052F32B6FCADAFEF67B5BBC3F9382A703383CBCA490B58BED5E7E625F6A9C2
36,086,365 UART: [art] SIG.R = C9B4DDC5FDAFB33D3C9C0E75A38EB20FFB7B1A951AE9915CA3293DB21C2787DD39A9655CF10DC2B4AF3285AB0173D5A6
36,093,834 UART: [art] SIG.S = AE0674CA0872B479C57D0BC80B2CBA5FE3224CDE40402C502A37CDFB00130F6DC252235964B1CDA8432B64484E525D6A
37,399,500 UART: Caliptra RT
37,400,690 UART: [state] CFI Enabled
37,533,514 UART: [rt] RT listening for mailbox commands...
37,536,059 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,691,743 UART: [rt]cmd =0x41544d4e, len=14344
37,696,647 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,050 UART:
192,431 UART: Running Caliptra ROM ...
193,628 UART:
193,781 UART: [state] CFI Enabled
261,966 UART: [state] LifecycleState = Unprovisioned
263,933 UART: [state] DebugLocked = No
265,818 UART: [state] WD Timer not started. Device not locked for debugging
269,071 UART: [kat] SHA2-256
448,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,475 UART: [kat] ++
459,956 UART: [kat] sha1
471,967 UART: [kat] SHA2-256
474,683 UART: [kat] SHA2-384
480,886 UART: [kat] SHA2-512-ACC
483,248 UART: [kat] ECC-384
2,947,070 UART: [kat] HMAC-384Kdf
2,969,691 UART: [kat] LMS
3,446,165 UART: [kat] --
3,449,516 UART: [cold-reset] ++
3,450,807 UART: [fht] FHT @ 0x50003400
3,462,169 UART: [idev] ++
3,462,806 UART: [idev] CDI.KEYID = 6
3,463,683 UART: [idev] SUBJECT.KEYID = 7
3,464,924 UART: [idev] UDS.KEYID = 0
3,465,890 ready_for_fw is high
3,466,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,360 UART: [idev] Erasing UDS.KEYID = 0
5,983,486 UART: [idev] Sha1 KeyId Algorithm
6,006,771 UART: [idev] --
6,012,494 UART: [ldev] ++
6,013,059 UART: [ldev] CDI.KEYID = 6
6,013,942 UART: [ldev] SUBJECT.KEYID = 5
6,015,149 UART: [ldev] AUTHORITY.KEYID = 7
6,016,429 UART: [ldev] FE.KEYID = 1
6,055,738 UART: [ldev] Erasing FE.KEYID = 1
8,558,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,006 UART: [ldev] --
10,350,998 UART: [fwproc] Wait for Commands...
10,353,100 UART: [fwproc] Recv command 0x46574c44
10,355,139 UART: [fwproc] Recv'd Img size: 118548 bytes
14,875,016 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,962,823 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,035,838 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,363,491 >>> mbox cmd response: success
15,366,827 UART: [afmc] ++
15,367,418 UART: [afmc] CDI.KEYID = 6
15,368,328 UART: [afmc] SUBJECT.KEYID = 7
15,369,542 UART: [afmc] AUTHORITY.KEYID = 5
17,892,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,617,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,619,987 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,635,841 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,651,761 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,667,430 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,691,791 UART: [afmc] --
19,695,010 UART: [cold-reset] --
19,699,355 UART: [state] Locking Datavault
19,704,707 UART: [state] Locking PCR0, PCR1 and PCR31
19,706,401 UART: [state] Locking ICCM
19,707,741 UART: [exit] Launching FMC @ 0x40000130
19,716,133 UART:
19,716,370 UART: Running Caliptra FMC ...
19,717,468 UART:
19,717,621 UART: [state] CFI Enabled
19,773,324 UART: [fht] FMC Alias Private Key: 7
21,539,330 UART: [art] Extend RT PCRs Done
21,540,552 UART: [art] Lock RT PCRs Done
21,542,228 UART: [art] Populate DV Done
21,547,747 UART: [fht] FMC Alias Private Key: 7
21,549,498 UART: [art] Derive CDI
21,550,329 UART: [art] Store in slot 0x4
21,606,343 UART: [art] Derive Key Pair
21,607,372 UART: [art] Store priv key in slot 0x5
24,070,135 UART: [art] Derive Key Pair - Done
24,082,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,796,089 UART: [art] Erasing AUTHORITY.KEYID = 7
25,797,592 UART: [art] PUB.X = 70A890BBE150045C751D515B985C4CCE93FD961F5A21E04D2129D3E168FDDBBC1375E2834C7712FD1C408FAD4C12A9B0
25,804,922 UART: [art] PUB.Y = 6188E791CB82E758AA2DFB78D9DF28C031979E11A050D313E09BA0F2D8F31FA56E6AFAF7EFE348CB68C83A7BBB8DE8E5
25,812,167 UART: [art] SIG.R = 46CB87B28856FC5D68A2AD40B08950A6EAA57DBBF34BC25546E4E6AE0D2C686FD2F7F513A5C54A87CF59AC2899B7A2F0
25,819,567 UART: [art] SIG.S = 38B5BB3D94D3E464404B1C2A9CA214E3AA4415B0646CBA9E44E1198DDC491FD8FDD06096791DD9CF6027E650BBA96657
26,798,509 UART: Caliptra RT
26,799,189 UART: [state] CFI Enabled
26,979,533 UART: [rt] RT listening for mailbox commands...
26,981,840 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,137,123 UART: [rt]cmd =0x41544d4e, len=14344
27,142,291 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,094 writing to cptra_bootfsm_go
3,456,784 ready_for_fw is high
3,457,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,386,067 >>> mbox cmd response: success
19,683,448 UART:
19,683,841 UART: Running Caliptra FMC ...
19,685,033 UART:
19,685,207 UART: [state] CFI Enabled
19,753,365 UART: [fht] FMC Alias Private Key: 7
21,519,818 UART: [art] Extend RT PCRs Done
21,521,033 UART: [art] Lock RT PCRs Done
21,522,451 UART: [art] Populate DV Done
21,527,702 UART: [fht] FMC Alias Private Key: 7
21,529,238 UART: [art] Derive CDI
21,530,035 UART: [art] Store in slot 0x4
21,586,330 UART: [art] Derive Key Pair
21,587,364 UART: [art] Store priv key in slot 0x5
24,050,400 UART: [art] Derive Key Pair - Done
24,063,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,776,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,777,842 UART: [art] PUB.X = 0EE2CEF13E6B55BFCE68AC6849238D8A9CEAAEB13206DB9C5C59AB243445EC57F377C1D4431B943AF7FA6BBA396BCF78
25,785,152 UART: [art] PUB.Y = 8925F96942973066F02BBFF117DA5AE602D3E428ABE484161291C017BCA3416A31E97CA2472E6D05415EAAEBBA609BCC
25,792,397 UART: [art] SIG.R = D2F706FFEAB4F94E689020A25DAEAA1044943B4CAA94EF0D21D172ED60AB8302F4491A6C5DE248AAC251CD8BFBBEBD81
25,799,799 UART: [art] SIG.S = 3EE6F84ABC0889962CAE6B3B7D348DFDD42D2F156E3F4BF9C6DEBA99715910B867BA2B770A8DBC211C6A69D0C5EB3433
26,778,870 UART: Caliptra RT
26,779,684 UART: [state] CFI Enabled
26,960,995 UART: [rt] RT listening for mailbox commands...
26,963,299 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,118,752 UART: [rt]cmd =0x41544d4e, len=14344
27,124,062 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,424 UART:
192,818 UART: Running Caliptra ROM ...
193,982 UART:
603,480 UART: [state] CFI Enabled
617,373 UART: [state] LifecycleState = Unprovisioned
619,322 UART: [state] DebugLocked = No
622,277 UART: [state] WD Timer not started. Device not locked for debugging
625,673 UART: [kat] SHA2-256
805,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,099 UART: [kat] ++
816,554 UART: [kat] sha1
828,594 UART: [kat] SHA2-256
831,286 UART: [kat] SHA2-384
836,934 UART: [kat] SHA2-512-ACC
839,311 UART: [kat] ECC-384
3,281,791 UART: [kat] HMAC-384Kdf
3,294,601 UART: [kat] LMS
3,771,059 UART: [kat] --
3,775,500 UART: [cold-reset] ++
3,777,577 UART: [fht] FHT @ 0x50003400
3,789,775 UART: [idev] ++
3,790,390 UART: [idev] CDI.KEYID = 6
3,791,308 UART: [idev] SUBJECT.KEYID = 7
3,792,560 UART: [idev] UDS.KEYID = 0
3,793,486 ready_for_fw is high
3,793,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,409 UART: [idev] Erasing UDS.KEYID = 0
6,267,147 UART: [idev] Sha1 KeyId Algorithm
6,289,428 UART: [idev] --
6,295,052 UART: [ldev] ++
6,295,629 UART: [ldev] CDI.KEYID = 6
6,296,539 UART: [ldev] SUBJECT.KEYID = 5
6,297,756 UART: [ldev] AUTHORITY.KEYID = 7
6,299,007 UART: [ldev] FE.KEYID = 1
6,309,232 UART: [ldev] Erasing FE.KEYID = 1
8,791,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,327 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,960 UART: [ldev] --
10,584,527 UART: [fwproc] Wait for Commands...
10,586,082 UART: [fwproc] Recv command 0x46574c44
10,588,076 UART: [fwproc] Recv'd Img size: 118548 bytes
15,115,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,197,307 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,270,314 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,598,874 >>> mbox cmd response: success
15,603,145 UART: [afmc] ++
15,603,785 UART: [afmc] CDI.KEYID = 6
15,604,707 UART: [afmc] SUBJECT.KEYID = 7
15,605,929 UART: [afmc] AUTHORITY.KEYID = 5
18,110,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,835,436 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,837,624 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,853,503 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,869,414 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,885,132 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,910,205 UART: [afmc] --
19,913,103 UART: [cold-reset] --
19,915,729 UART: [state] Locking Datavault
19,921,466 UART: [state] Locking PCR0, PCR1 and PCR31
19,923,226 UART: [state] Locking ICCM
19,924,356 UART: [exit] Launching FMC @ 0x40000130
19,932,814 UART:
19,933,080 UART: Running Caliptra FMC ...
19,934,190 UART:
19,934,350 UART: [state] CFI Enabled
19,942,133 UART: [fht] FMC Alias Private Key: 7
21,708,706 UART: [art] Extend RT PCRs Done
21,709,929 UART: [art] Lock RT PCRs Done
21,711,125 UART: [art] Populate DV Done
21,716,546 UART: [fht] FMC Alias Private Key: 7
21,718,038 UART: [art] Derive CDI
21,718,807 UART: [art] Store in slot 0x4
21,761,460 UART: [art] Derive Key Pair
21,762,463 UART: [art] Store priv key in slot 0x5
24,189,344 UART: [art] Derive Key Pair - Done
24,202,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,909,577 UART: [art] Erasing AUTHORITY.KEYID = 7
25,911,081 UART: [art] PUB.X = A4D80CF6026121EDE7E05223CC2CEA065596D5C31A327D194D9B32F6161C5C05540CEC99F1D9AC666613CA31E7A8B2E1
25,918,407 UART: [art] PUB.Y = B910A8A89C1FBFF18F1A528EF02C861969C786600242DAABC7F4753BECF1288BD23C3FEEC7267BE39892A06D1D63D00F
25,925,642 UART: [art] SIG.R = 217971DCDCA8427AD4B68736525648F5A8339C9599CCAC5FA18F3DA838003AC710032B02E1B4046F35EA0B28172FA840
25,933,049 UART: [art] SIG.S = AF34DC35B28A2317229D94770D7EE24FA946B1140084734EE2DFD74C75668BEBAD5FBDEB93242AA14D241047D78DBFBB
26,912,268 UART: Caliptra RT
26,912,961 UART: [state] CFI Enabled
27,045,143 UART: [rt] RT listening for mailbox commands...
27,047,434 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,202,520 UART: [rt]cmd =0x41544d4e, len=14344
27,207,776 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.68s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,330 writing to cptra_bootfsm_go
3,778,164 ready_for_fw is high
3,778,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,575,569 >>> mbox cmd response: success
19,824,809 UART:
19,825,199 UART: Running Caliptra FMC ...
19,826,309 UART:
19,826,468 UART: [state] CFI Enabled
19,834,384 UART: [fht] FMC Alias Private Key: 7
21,599,684 UART: [art] Extend RT PCRs Done
21,600,907 UART: [art] Lock RT PCRs Done
21,602,404 UART: [art] Populate DV Done
21,607,674 UART: [fht] FMC Alias Private Key: 7
21,609,271 UART: [art] Derive CDI
21,610,014 UART: [art] Store in slot 0x4
21,652,779 UART: [art] Derive Key Pair
21,653,824 UART: [art] Store priv key in slot 0x5
24,080,409 UART: [art] Derive Key Pair - Done
24,093,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,799,727 UART: [art] Erasing AUTHORITY.KEYID = 7
25,801,243 UART: [art] PUB.X = E751365A85F0FBA262DE97281DC3153B3FFC282FF6B88EE4E0958459D622CFFFD17769F177009A7CDC0AB151AD6960CD
25,808,452 UART: [art] PUB.Y = DC8E7AC73A3F5FEFD5628FDF694ED553A41F9EB00BA341F78C63822D99AFBD0D43D8C1BD59C0073233715CBF4D20C5F0
25,815,758 UART: [art] SIG.R = 2932492C29D3CF98E75D58AE36EBFA1BB9E70D83CE1DE4EDB3A6353D0231D153C504947F2B8CEB64A462F81593466887
25,823,159 UART: [art] SIG.S = 8A3D8234312B4451A32D15384DC1138070AE9FE94EC5CCDB504D73B9694E63A37720DBFA8980B48E8298FAA272DDD551
26,802,057 UART: Caliptra RT
26,802,760 UART: [state] CFI Enabled
26,935,449 UART: [rt] RT listening for mailbox commands...
26,937,758 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,093,068 UART: [rt]cmd =0x41544d4e, len=14344
27,098,234 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.67s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,975 UART:
192,331 UART: Running Caliptra ROM ...
193,476 UART:
193,644 UART: [state] CFI Enabled
264,571 UART: [state] LifecycleState = Unprovisioned
266,926 UART: [state] DebugLocked = No
269,379 UART: [state] WD Timer not started. Device not locked for debugging
273,625 UART: [kat] SHA2-256
463,501 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,332 UART: [kat] ++
474,779 UART: [kat] sha1
486,218 UART: [kat] SHA2-256
489,195 UART: [kat] SHA2-384
495,260 UART: [kat] SHA2-512-ACC
497,840 UART: [kat] ECC-384
2,946,670 UART: [kat] HMAC-384Kdf
2,971,979 UART: [kat] LMS
3,503,734 UART: [kat] --
3,509,503 UART: [cold-reset] ++
3,511,952 UART: [fht] FHT @ 0x50003400
3,524,633 UART: [idev] ++
3,525,263 UART: [idev] CDI.KEYID = 6
3,526,289 UART: [idev] SUBJECT.KEYID = 7
3,527,461 UART: [idev] UDS.KEYID = 0
3,528,383 ready_for_fw is high
3,528,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,734 UART: [idev] Erasing UDS.KEYID = 0
6,051,455 UART: [idev] Sha1 KeyId Algorithm
6,075,549 UART: [idev] --
6,079,812 UART: [ldev] ++
6,080,539 UART: [ldev] CDI.KEYID = 6
6,081,418 UART: [ldev] SUBJECT.KEYID = 5
6,082,624 UART: [ldev] AUTHORITY.KEYID = 7
6,083,851 UART: [ldev] FE.KEYID = 1
6,122,183 UART: [ldev] Erasing FE.KEYID = 1
8,629,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,355,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,370,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,385,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,400,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,421,682 UART: [ldev] --
10,427,588 UART: [fwproc] Wait for Commands...
10,429,201 UART: [fwproc] Recv command 0x46574c44
10,431,502 UART: [fwproc] Recv'd Img size: 118548 bytes
15,100,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,180,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,304,343 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,865,440 >>> mbox cmd response: success
15,868,686 UART: [afmc] ++
15,869,389 UART: [afmc] CDI.KEYID = 6
15,870,569 UART: [afmc] SUBJECT.KEYID = 7
15,872,128 UART: [afmc] AUTHORITY.KEYID = 5
18,398,514 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,122,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,124,828 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,139,939 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,155,185 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,170,221 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,194,551 UART: [afmc] --
20,198,016 UART: [cold-reset] --
20,200,161 UART: [state] Locking Datavault
20,205,095 UART: [state] Locking PCR0, PCR1 and PCR31
20,207,243 UART: [state] Locking ICCM
20,208,557 UART: [exit] Launching FMC @ 0x40000130
20,217,229 UART:
20,217,455 UART: Running Caliptra FMC ...
20,218,482 UART:
20,218,646 UART: [state] CFI Enabled
20,279,221 UART: [fht] FMC Alias Private Key: 7
22,046,019 UART: [art] Extend RT PCRs Done
22,047,239 UART: [art] Lock RT PCRs Done
22,048,729 UART: [art] Populate DV Done
22,054,304 UART: [fht] FMC Alias Private Key: 7
22,056,004 UART: [art] Derive CDI
22,056,745 UART: [art] Store in slot 0x4
22,111,886 UART: [art] Derive Key Pair
22,112,930 UART: [art] Store priv key in slot 0x5
24,575,861 UART: [art] Derive Key Pair - Done
24,588,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,301,694 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,202 UART: [art] PUB.X = C177E02740615097EC652DD6FF9070DD7303C7AC1997095954B10457B4A6AF4DFD17FFB7C81BF31BF655A6D1698CD5EE
26,310,455 UART: [art] PUB.Y = 28E291FA6E27DBD8783AB94B0E96226FCBF6FE6F28CF2788C40F1089B02D1E2B808409CC5A74BB9840D7161D27C450DE
26,317,710 UART: [art] SIG.R = 458FC11BE3DEE3B5EC2C7A08AB18BBC6D5DDCD21FD8517B02996FA245A122114CAC204D5684713B5FDDFDFD17A0E442B
26,325,193 UART: [art] SIG.S = 9AEDA7B63F0CEA72F85552C9215BB319E0D3EB13A9F41AE68FD5FD4A2C9781FF98ED4EA5742C1D2865DCD35C2A021B2D
27,304,125 UART: Caliptra RT
27,304,815 UART: [state] CFI Enabled
27,485,263 UART: [rt] RT listening for mailbox commands...
27,487,575 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,642,899 UART: [rt]cmd =0x41544d4e, len=14344
27,648,046 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,854 writing to cptra_bootfsm_go
3,438,380 ready_for_fw is high
3,438,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,937,616 >>> mbox cmd response: success
20,217,969 UART:
20,218,368 UART: Running Caliptra FMC ...
20,219,502 UART:
20,219,667 UART: [state] CFI Enabled
20,283,110 UART: [fht] FMC Alias Private Key: 7
22,049,433 UART: [art] Extend RT PCRs Done
22,050,670 UART: [art] Lock RT PCRs Done
22,051,976 UART: [art] Populate DV Done
22,057,346 UART: [fht] FMC Alias Private Key: 7
22,058,941 UART: [art] Derive CDI
22,059,754 UART: [art] Store in slot 0x4
22,115,356 UART: [art] Derive Key Pair
22,116,398 UART: [art] Store priv key in slot 0x5
24,578,924 UART: [art] Derive Key Pair - Done
24,591,669 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,304,715 UART: [art] Erasing AUTHORITY.KEYID = 7
26,306,238 UART: [art] PUB.X = 45583FB69FF35CE143B3363B25876105399199F280F16A1C4E0F248CE00C9D868214DBA6B0C00DAFA31662876143CBB5
26,313,471 UART: [art] PUB.Y = 22EE787668EC7B065B4DEE5F00334B0CF3C0C39A1ACC2C6CECAA9DDDA8F99C8E80522E0D728FC94754D4A197BE71BE0F
26,320,720 UART: [art] SIG.R = 61E0250D35F89FC4C8692D6B31A0E949F33DE07D7DD581D7AAA453EE58B2734EC8B31411D6F2B2BB835A9476701F10FA
26,328,153 UART: [art] SIG.S = 8A4B124330FA1B725ADA55A4E6337F50AEC385608A5FDBAD5D0974396187DF6C1A5132BDE053D52274F477D6A9602E50
27,306,959 UART: Caliptra RT
27,307,665 UART: [state] CFI Enabled
27,489,980 UART: [rt] RT listening for mailbox commands...
27,492,303 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,647,569 UART: [rt]cmd =0x41544d4e, len=14344
27,652,401 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
192,423 UART:
192,805 UART: Running Caliptra ROM ...
193,946 UART:
603,584 UART: [state] CFI Enabled
617,321 UART: [state] LifecycleState = Unprovisioned
619,708 UART: [state] DebugLocked = No
622,582 UART: [state] WD Timer not started. Device not locked for debugging
627,260 UART: [kat] SHA2-256
817,093 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,910 UART: [kat] ++
828,432 UART: [kat] sha1
839,094 UART: [kat] SHA2-256
842,124 UART: [kat] SHA2-384
847,695 UART: [kat] SHA2-512-ACC
850,287 UART: [kat] ECC-384
3,291,318 UART: [kat] HMAC-384Kdf
3,304,276 UART: [kat] LMS
3,836,105 UART: [kat] --
3,841,691 UART: [cold-reset] ++
3,843,637 UART: [fht] FHT @ 0x50003400
3,853,932 UART: [idev] ++
3,854,684 UART: [idev] CDI.KEYID = 6
3,855,616 UART: [idev] SUBJECT.KEYID = 7
3,856,795 UART: [idev] UDS.KEYID = 0
3,857,727 ready_for_fw is high
3,857,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,703 UART: [idev] Erasing UDS.KEYID = 0
6,334,751 UART: [idev] Sha1 KeyId Algorithm
6,357,543 UART: [idev] --
6,361,269 UART: [ldev] ++
6,361,949 UART: [ldev] CDI.KEYID = 6
6,362,836 UART: [ldev] SUBJECT.KEYID = 5
6,364,047 UART: [ldev] AUTHORITY.KEYID = 7
6,365,180 UART: [ldev] FE.KEYID = 1
6,376,440 UART: [ldev] Erasing FE.KEYID = 1
8,854,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,627 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,006 UART: [ldev] --
10,645,088 UART: [fwproc] Wait for Commands...
10,648,321 UART: [fwproc] Recv command 0x46574c44
10,650,776 UART: [fwproc] Recv'd Img size: 118548 bytes
15,326,506 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,408,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,532,047 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,092,547 >>> mbox cmd response: success
16,096,329 UART: [afmc] ++
16,097,066 UART: [afmc] CDI.KEYID = 6
16,098,289 UART: [afmc] SUBJECT.KEYID = 7
16,099,739 UART: [afmc] AUTHORITY.KEYID = 5
18,607,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,329,379 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,331,317 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,346,419 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,361,667 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,376,686 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,400,660 UART: [afmc] --
20,403,987 UART: [cold-reset] --
20,407,918 UART: [state] Locking Datavault
20,414,432 UART: [state] Locking PCR0, PCR1 and PCR31
20,416,635 UART: [state] Locking ICCM
20,417,770 UART: [exit] Launching FMC @ 0x40000130
20,426,463 UART:
20,426,713 UART: Running Caliptra FMC ...
20,427,836 UART:
20,427,998 UART: [state] CFI Enabled
20,436,208 UART: [fht] FMC Alias Private Key: 7
22,202,293 UART: [art] Extend RT PCRs Done
22,203,520 UART: [art] Lock RT PCRs Done
22,205,104 UART: [art] Populate DV Done
22,210,469 UART: [fht] FMC Alias Private Key: 7
22,211,954 UART: [art] Derive CDI
22,212,719 UART: [art] Store in slot 0x4
22,255,639 UART: [art] Derive Key Pair
22,256,675 UART: [art] Store priv key in slot 0x5
24,683,482 UART: [art] Derive Key Pair - Done
24,696,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,403,098 UART: [art] Erasing AUTHORITY.KEYID = 7
26,404,609 UART: [art] PUB.X = B05CC20574F0294078E97637EFCBE955991457ACF5EC5110AA84C813D410EA5F39F672EB04A68B699A07AB0CE60FF570
26,411,894 UART: [art] PUB.Y = 644DD31B42DD66459839A4CCF7AF1055B76FBD6DCBFBFF096245D14F86C8EA8D320346332001482C1A1398B4999A69E8
26,419,128 UART: [art] SIG.R = 8FB75F99A27319AAA155097758B54DB3093DAC1BA7ABF425D0512D17DA7D79C235575EFAEB9624606033824372D84A8F
26,426,506 UART: [art] SIG.S = A809F1EDB077685FF595BAAD5283D31E31E32D78342B356226CC454E9A785895154A2C4FFAB089E5E62FA84B49864D51
27,405,495 UART: Caliptra RT
27,406,186 UART: [state] CFI Enabled
27,538,966 UART: [rt] RT listening for mailbox commands...
27,541,276 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,696,635 UART: [rt]cmd =0x41544d4e, len=14344
27,701,572 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,753,593 ready_for_fw is high
3,753,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,123,328 >>> mbox cmd response: success
20,369,917 UART:
20,370,309 UART: Running Caliptra FMC ...
20,371,460 UART:
20,371,630 UART: [state] CFI Enabled
20,379,619 UART: [fht] FMC Alias Private Key: 7
22,145,115 UART: [art] Extend RT PCRs Done
22,146,371 UART: [art] Lock RT PCRs Done
22,148,119 UART: [art] Populate DV Done
22,153,560 UART: [fht] FMC Alias Private Key: 7
22,155,197 UART: [art] Derive CDI
22,155,946 UART: [art] Store in slot 0x4
22,198,441 UART: [art] Derive Key Pair
22,199,450 UART: [art] Store priv key in slot 0x5
24,625,763 UART: [art] Derive Key Pair - Done
24,638,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,345,065 UART: [art] Erasing AUTHORITY.KEYID = 7
26,346,581 UART: [art] PUB.X = 2BA7878612DA72333B02D052A7FEA73810CB30F8190BCB2631F276F8B9F8183E0FF4B9D0969C27A228053902FC17E77B
26,353,868 UART: [art] PUB.Y = C7FBC33C6D39D60AF883DADC749FE81E7EC00EC6A90FE3BB4D18D2C59817C02DAE82B5355C3733DD909C675FCC28D300
26,361,099 UART: [art] SIG.R = 2BEC2C52C90622D289687FFE20E050681179A218E37C1CF148EB8B131F84F9720C05CEDAAA7064BDBE831541D35955BC
26,368,466 UART: [art] SIG.S = EE5CD30A029567596347E9252D66BB2CD31397A7BFBC0434D19A2D9A82E2D7568307A02F50EA13DD74AA5AC90D8C3E8C
27,347,892 UART: Caliptra RT
27,348,605 UART: [state] CFI Enabled
27,481,674 UART: [rt] RT listening for mailbox commands...
27,483,985 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,639,495 UART: [rt]cmd =0x41544d4e, len=14344
27,644,602 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.70s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,714 UART: [state] LifecycleState = Unprovisioned
85,369 UART: [state] DebugLocked = No
86,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,619 UART: [kat] SHA2-256
881,550 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,665 UART: [kat] ++
885,817 UART: [kat] sha1
890,059 UART: [kat] SHA2-256
891,997 UART: [kat] SHA2-384
894,664 UART: [kat] SHA2-512-ACC
896,565 UART: [kat] ECC-384
902,126 UART: [kat] HMAC-384Kdf
906,796 UART: [kat] LMS
1,474,992 UART: [kat] --
1,476,017 UART: [cold-reset] ++
1,476,389 UART: [fht] Storing FHT @ 0x50003400
1,479,104 UART: [idev] ++
1,479,272 UART: [idev] CDI.KEYID = 6
1,479,632 UART: [idev] SUBJECT.KEYID = 7
1,480,056 UART: [idev] UDS.KEYID = 0
1,480,401 ready_for_fw is high
1,480,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,505,296 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,968 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,391 UART: [ldev] Erasing FE.KEYID = 1
1,547,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,172 UART: [ldev] --
1,586,657 UART: [fwproc] Waiting for Commands...
1,587,314 UART: [fwproc] Received command 0x46574c44
1,588,105 UART: [fwproc] Received Image of size 118548 bytes
5,130,971 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,159,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,190,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,330,910 >>> mbox cmd response: success
5,332,038 UART: [afmc] ++
5,332,206 UART: [afmc] CDI.KEYID = 6
5,332,568 UART: [afmc] SUBJECT.KEYID = 7
5,332,993 UART: [afmc] AUTHORITY.KEYID = 5
5,367,588 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,383,900 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,384,680 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,390,386 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,396,265 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,401,978 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,409,625 UART: [afmc] --
5,410,645 UART: [cold-reset] --
5,411,393 UART: [state] Locking Datavault
5,412,610 UART: [state] Locking PCR0, PCR1 and PCR31
5,413,214 UART: [state] Locking ICCM
5,413,790 UART: [exit] Launching FMC @ 0x40000130
5,419,120 UART:
5,419,136 UART: Running Caliptra FMC ...
5,419,544 UART:
5,419,598 UART: [state] CFI Enabled
5,430,014 UART: [fht] FMC Alias Private Key: 7
5,549,686 UART: [art] Extend RT PCRs Done
5,550,114 UART: [art] Lock RT PCRs Done
5,551,766 UART: [art] Populate DV Done
5,559,739 UART: [fht] FMC Alias Private Key: 7
5,560,859 UART: [art] Derive CDI
5,561,139 UART: [art] Store in slot 0x4
5,646,851 UART: [art] Derive Key Pair
5,647,211 UART: [art] Store priv key in slot 0x5
5,660,314 UART: [art] Derive Key Pair - Done
5,675,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,690,785 UART: [art] Erasing AUTHORITY.KEYID = 7
5,691,550 UART: [art] PUB.X = F92576284C00FAEA0534F3587A1FA9549CD2E53FC173C5E4827D99FAC7949F595833B61B0BD9CF6300448BFF8FECEB18
5,698,280 UART: [art] PUB.Y = 9F4C6B7FB726B6A05E041EE57B866BF907AB9BFB59DECEDF87BF7701290D5859E6E0AE33AB852AA48E0362B1EAE5AE85
5,705,237 UART: [art] SIG.R = 0CFD2058B72D60478E3C888ACB0A084FCA336A97268E21C1BDDE7B5DCF1D169B18A3C81B2677482AD92A2A6DD4E0B1E0
5,712,014 UART: [art] SIG.S = 2473E314CB1A48157E91549B01485D0FFE78C4101F8304279D9A0928987D9D5097180C8AC699DF80D99472B9FDB8D778
5,735,401 UART: Caliptra RT
5,735,652 UART: [state] CFI Enabled
5,857,269 UART: [rt] RT listening for mailbox commands...
5,857,939 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,981,257 UART: [rt]cmd =0x41544d4e, len=14344
5,987,536 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,089 ready_for_fw is high
1,362,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,293,063 >>> mbox cmd response: success
5,354,222 UART:
5,354,238 UART: Running Caliptra FMC ...
5,354,646 UART:
5,354,700 UART: [state] CFI Enabled
5,365,044 UART: [fht] FMC Alias Private Key: 7
5,483,494 UART: [art] Extend RT PCRs Done
5,483,922 UART: [art] Lock RT PCRs Done
5,485,520 UART: [art] Populate DV Done
5,493,925 UART: [fht] FMC Alias Private Key: 7
5,494,981 UART: [art] Derive CDI
5,495,261 UART: [art] Store in slot 0x4
5,580,873 UART: [art] Derive Key Pair
5,581,233 UART: [art] Store priv key in slot 0x5
5,593,968 UART: [art] Derive Key Pair - Done
5,608,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,624,065 UART: [art] Erasing AUTHORITY.KEYID = 7
5,624,830 UART: [art] PUB.X = 842CB2729B691B9420378902739292147F2FF8B56DD193918ACADBF290DF54EDA605CACCE59F22E4A50AA9D090626D81
5,631,595 UART: [art] PUB.Y = 92B57B83AC53D1967097CA4D2EEDD20A46282D7FD0E4CE1F5132041025DC5854CA809FC08F1F6CC0C60B98153844BB34
5,638,542 UART: [art] SIG.R = DD468D5EC847393DBCE8BEA5DAEA66DCE8AA19F082BD74375DA0307F4D7CF69F7DF8CB30134BCA6CE7113D27C6C2843E
5,645,338 UART: [art] SIG.S = B8C98F740756F2AD5FEB71809520277ED86AA894D8D80EC44D5796D2071BC9C2EF3A0F72B9CF01DC3D090AC6F8D34C32
5,669,127 UART: Caliptra RT
5,669,378 UART: [state] CFI Enabled
5,788,877 UART: [rt] RT listening for mailbox commands...
5,789,547 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,912,711 UART: [rt]cmd =0x41544d4e, len=14344
5,919,126 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,086 UART: [kat] SHA2-256
882,017 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,132 UART: [kat] ++
886,284 UART: [kat] sha1
890,288 UART: [kat] SHA2-256
892,226 UART: [kat] SHA2-384
895,103 UART: [kat] SHA2-512-ACC
897,004 UART: [kat] ECC-384
902,497 UART: [kat] HMAC-384Kdf
907,191 UART: [kat] LMS
1,475,387 UART: [kat] --
1,476,116 UART: [cold-reset] ++
1,476,540 UART: [fht] Storing FHT @ 0x50003400
1,479,211 UART: [idev] ++
1,479,379 UART: [idev] CDI.KEYID = 6
1,479,739 UART: [idev] SUBJECT.KEYID = 7
1,480,163 UART: [idev] UDS.KEYID = 0
1,480,508 ready_for_fw is high
1,480,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,341 UART: [idev] Erasing UDS.KEYID = 0
1,505,063 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,605 UART: [idev] --
1,514,576 UART: [ldev] ++
1,514,744 UART: [ldev] CDI.KEYID = 6
1,515,107 UART: [ldev] SUBJECT.KEYID = 5
1,515,533 UART: [ldev] AUTHORITY.KEYID = 7
1,515,996 UART: [ldev] FE.KEYID = 1
1,521,448 UART: [ldev] Erasing FE.KEYID = 1
1,546,751 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,963 UART: [ldev] --
1,586,226 UART: [fwproc] Waiting for Commands...
1,586,997 UART: [fwproc] Received command 0x46574c44
1,587,788 UART: [fwproc] Received Image of size 118548 bytes
5,281,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,308,622 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,339,840 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,480,051 >>> mbox cmd response: success
5,481,303 UART: [afmc] ++
5,481,471 UART: [afmc] CDI.KEYID = 6
5,481,833 UART: [afmc] SUBJECT.KEYID = 7
5,482,258 UART: [afmc] AUTHORITY.KEYID = 5
5,517,511 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,533,867 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,534,647 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,540,353 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,546,232 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,551,945 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,559,932 UART: [afmc] --
5,560,904 UART: [cold-reset] --
5,561,658 UART: [state] Locking Datavault
5,562,993 UART: [state] Locking PCR0, PCR1 and PCR31
5,563,597 UART: [state] Locking ICCM
5,564,075 UART: [exit] Launching FMC @ 0x40000130
5,569,405 UART:
5,569,421 UART: Running Caliptra FMC ...
5,569,829 UART:
5,569,972 UART: [state] CFI Enabled
5,580,084 UART: [fht] FMC Alias Private Key: 7
5,699,454 UART: [art] Extend RT PCRs Done
5,699,882 UART: [art] Lock RT PCRs Done
5,701,176 UART: [art] Populate DV Done
5,709,349 UART: [fht] FMC Alias Private Key: 7
5,710,387 UART: [art] Derive CDI
5,710,667 UART: [art] Store in slot 0x4
5,796,387 UART: [art] Derive Key Pair
5,796,747 UART: [art] Store priv key in slot 0x5
5,810,440 UART: [art] Derive Key Pair - Done
5,825,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,840,600 UART: [art] Erasing AUTHORITY.KEYID = 7
5,841,365 UART: [art] PUB.X = 0804EDA4F20E4FC67C66A5BAAC55FB30F3C7C3961D3BFEA110F3B9D02B9B691409D2792ACD26B944CFC43E61048CBE56
5,848,138 UART: [art] PUB.Y = 0A5CFE9C6BD0675470E3A8D4AD674E4C8CB81D8B048684F94FDF722FFF1C5F5D5BB0E7C8C2FB2E9C405B71806DC59FE2
5,855,104 UART: [art] SIG.R = D5A28E285ACB050900ABD0990DAFA6A76C40641794188CCEE53EA0A4E8EA4CE1F564A711CC670BF6A86B13AB49DA8F13
5,861,858 UART: [art] SIG.S = DBD30833E14EF75341E886C2E737119C70D3CDE0A4D1DBF66725AE8CD64DC11105B24E86732444EB4F84FDC753F04696
5,886,022 UART: Caliptra RT
5,886,365 UART: [state] CFI Enabled
6,005,962 UART: [rt] RT listening for mailbox commands...
6,006,632 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,506 UART: [rt]cmd =0x41544d4e, len=14344
6,135,711 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,886 ready_for_fw is high
1,362,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,482,259 >>> mbox cmd response: success
5,544,272 UART:
5,544,288 UART: Running Caliptra FMC ...
5,544,696 UART:
5,544,839 UART: [state] CFI Enabled
5,555,701 UART: [fht] FMC Alias Private Key: 7
5,675,149 UART: [art] Extend RT PCRs Done
5,675,577 UART: [art] Lock RT PCRs Done
5,677,099 UART: [art] Populate DV Done
5,685,308 UART: [fht] FMC Alias Private Key: 7
5,686,430 UART: [art] Derive CDI
5,686,710 UART: [art] Store in slot 0x4
5,772,532 UART: [art] Derive Key Pair
5,772,892 UART: [art] Store priv key in slot 0x5
5,786,391 UART: [art] Derive Key Pair - Done
5,800,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,816,855 UART: [art] Erasing AUTHORITY.KEYID = 7
5,817,620 UART: [art] PUB.X = 5D8DF335BD26F7BE2E7372975338922F8252920C4546531729A7356404090DA787B93338060191FF88C201151FB84763
5,824,347 UART: [art] PUB.Y = 19C0115BD5148235434FB906730A755521DF8679B765EFFA02F696DDFF4369587483123F8B19976BFA0E006B16BF027E
5,831,254 UART: [art] SIG.R = 2F55C9BC5760FE24DCA597A945ACB647FC32F23D98AAD3F5A370320431C771896C092039F61FD270738FF2553E74E7D2
5,838,020 UART: [art] SIG.S = 87C5923E1BAB23F6856923AB1FE2BB80C1E922B7EA17411235646319ABF38E9F442BB0DD54CC350404C3F8A03141F277
5,861,466 UART: Caliptra RT
5,861,809 UART: [state] CFI Enabled
5,981,463 UART: [rt] RT listening for mailbox commands...
5,982,133 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,105,135 UART: [rt]cmd =0x41544d4e, len=14344
6,111,328 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,788 UART: [kat] SHA2-256
891,338 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,442 UART: [kat] ++
895,594 UART: [kat] sha1
899,808 UART: [kat] SHA2-256
901,748 UART: [kat] SHA2-384
904,447 UART: [kat] SHA2-512-ACC
906,348 UART: [kat] ECC-384
916,071 UART: [kat] HMAC-384Kdf
920,535 UART: [kat] LMS
1,168,847 UART: [kat] --
1,169,814 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,648 UART: [idev] ++
1,172,816 UART: [idev] CDI.KEYID = 6
1,173,177 UART: [idev] SUBJECT.KEYID = 7
1,173,602 UART: [idev] UDS.KEYID = 0
1,173,948 ready_for_fw is high
1,173,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,453 UART: [idev] Erasing UDS.KEYID = 0
1,198,751 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,566 UART: [ldev] ++
1,208,734 UART: [ldev] CDI.KEYID = 6
1,209,098 UART: [ldev] SUBJECT.KEYID = 5
1,209,525 UART: [ldev] AUTHORITY.KEYID = 7
1,209,988 UART: [ldev] FE.KEYID = 1
1,214,972 UART: [ldev] Erasing FE.KEYID = 1
1,241,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,240 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,896 UART: [ldev] --
1,281,225 UART: [fwproc] Wait for Commands...
1,281,944 UART: [fwproc] Recv command 0x46574c44
1,282,677 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,197,341 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,228,516 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,747 >>> mbox cmd response: success
3,369,879 UART: [afmc] ++
3,370,047 UART: [afmc] CDI.KEYID = 6
3,370,410 UART: [afmc] SUBJECT.KEYID = 7
3,370,836 UART: [afmc] AUTHORITY.KEYID = 5
3,406,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,422,556 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,423,305 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,429,012 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,889 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,440,599 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,448,375 UART: [afmc] --
3,449,336 UART: [cold-reset] --
3,450,160 UART: [state] Locking Datavault
3,451,377 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,981 UART: [state] Locking ICCM
3,452,571 UART: [exit] Launching FMC @ 0x40000130
3,457,901 UART:
3,457,917 UART: Running Caliptra FMC ...
3,458,325 UART:
3,458,379 UART: [state] CFI Enabled
3,468,865 UART: [fht] FMC Alias Private Key: 7
3,587,777 UART: [art] Extend RT PCRs Done
3,588,205 UART: [art] Lock RT PCRs Done
3,589,669 UART: [art] Populate DV Done
3,598,116 UART: [fht] FMC Alias Private Key: 7
3,599,234 UART: [art] Derive CDI
3,599,514 UART: [art] Store in slot 0x4
3,685,357 UART: [art] Derive Key Pair
3,685,717 UART: [art] Store priv key in slot 0x5
3,698,535 UART: [art] Derive Key Pair - Done
3,713,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,328 UART: [art] PUB.X = C4C80F4995A8B1A769786F4C5E227509CC4EB77FDFC276FA1EF6A8C64CB8F2C5E8BDBED3765E5D78B055580EB101CEB4
3,736,106 UART: [art] PUB.Y = 6EA51BEAC294A8BDB67BF4CB6D04DD6076B5886CF62B943ADF26FE733EE8798FA29D6BC2CCC18BB6DE09B8013A22189E
3,743,071 UART: [art] SIG.R = 8BB5B29A32F30CCF4F52AC79C25C686B84ADEB12DA5898F368EFC52F922048D6EBFB1290E6686B203219524FDE9AD278
3,749,850 UART: [art] SIG.S = 26E32A871ACCBD925E79A9A63105B9732F31158BCAD2461CF7823E977DA49B5127ADC8174E48FE6C4773EE4386D22E22
3,773,089 UART: Caliptra RT
3,773,340 UART: [state] CFI Enabled
3,892,372 UART: [rt] RT listening for mailbox commands...
3,893,042 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,292 UART: [rt]cmd =0x41544d4e, len=14344
4,022,315 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,024 ready_for_fw is high
1,059,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,738 >>> mbox cmd response: success
3,278,069 UART:
3,278,085 UART: Running Caliptra FMC ...
3,278,493 UART:
3,278,547 UART: [state] CFI Enabled
3,289,353 UART: [fht] FMC Alias Private Key: 7
3,407,873 UART: [art] Extend RT PCRs Done
3,408,301 UART: [art] Lock RT PCRs Done
3,409,787 UART: [art] Populate DV Done
3,418,126 UART: [fht] FMC Alias Private Key: 7
3,419,184 UART: [art] Derive CDI
3,419,464 UART: [art] Store in slot 0x4
3,505,231 UART: [art] Derive Key Pair
3,505,591 UART: [art] Store priv key in slot 0x5
3,519,031 UART: [art] Derive Key Pair - Done
3,533,636 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,548,909 UART: [art] Erasing AUTHORITY.KEYID = 7
3,549,674 UART: [art] PUB.X = 19AD9CE908044BB39B0E3116A3F9DF361AD66C1A1EED0741A1BF2EC7275FB58C16024104A8BB6E38003C1DC14318E523
3,556,412 UART: [art] PUB.Y = 9783B85E8B303898686EB6011BE5473B3EEC4675768EDCB06F2A923ED4969493C467878DB6C8B51F4078026430B621A7
3,563,348 UART: [art] SIG.R = 024DBF9A2CDB61827007E78A611C3A50B127482AC49EA663B563CD8DC986D4E0FAFF7397BFEDBDBDF80E382FBB517357
3,570,127 UART: [art] SIG.S = E86C45678D885A5EEA14991683DC39BD573F0AFBC61B974ED5BCA2092C6189E6FEDE4A3C01E1FBD1CEB9ACC97A674A11
3,593,898 UART: Caliptra RT
3,594,149 UART: [state] CFI Enabled
3,715,031 UART: [rt] RT listening for mailbox commands...
3,715,701 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,859 UART: [rt]cmd =0x41544d4e, len=14344
3,845,260 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,811 UART: [kat] SHA2-256
901,751 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
915,944 UART: [kat] HMAC-384Kdf
920,576 UART: [kat] LMS
1,168,888 UART: [kat] --
1,169,583 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,819 UART: [idev] ++
1,172,987 UART: [idev] CDI.KEYID = 6
1,173,348 UART: [idev] SUBJECT.KEYID = 7
1,173,773 UART: [idev] UDS.KEYID = 0
1,174,119 ready_for_fw is high
1,174,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,686 UART: [idev] Erasing UDS.KEYID = 0
1,198,828 UART: [idev] Sha1 KeyId Algorithm
1,207,614 UART: [idev] --
1,208,663 UART: [ldev] ++
1,208,831 UART: [ldev] CDI.KEYID = 6
1,209,195 UART: [ldev] SUBJECT.KEYID = 5
1,209,622 UART: [ldev] AUTHORITY.KEYID = 7
1,210,085 UART: [ldev] FE.KEYID = 1
1,215,335 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,036 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,253 UART: [ldev] --
1,280,488 UART: [fwproc] Wait for Commands...
1,281,185 UART: [fwproc] Recv command 0x46574c44
1,281,918 UART: [fwproc] Recv'd Img size: 118548 bytes
3,171,234 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,199,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,230,338 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,370,669 >>> mbox cmd response: success
3,371,879 UART: [afmc] ++
3,372,047 UART: [afmc] CDI.KEYID = 6
3,372,410 UART: [afmc] SUBJECT.KEYID = 7
3,372,836 UART: [afmc] AUTHORITY.KEYID = 5
3,408,545 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,425,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,425,907 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,431,614 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,437,491 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,443,201 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,450,919 UART: [afmc] --
3,451,750 UART: [cold-reset] --
3,452,754 UART: [state] Locking Datavault
3,454,019 UART: [state] Locking PCR0, PCR1 and PCR31
3,454,623 UART: [state] Locking ICCM
3,455,119 UART: [exit] Launching FMC @ 0x40000130
3,460,449 UART:
3,460,465 UART: Running Caliptra FMC ...
3,460,873 UART:
3,461,016 UART: [state] CFI Enabled
3,471,722 UART: [fht] FMC Alias Private Key: 7
3,590,832 UART: [art] Extend RT PCRs Done
3,591,260 UART: [art] Lock RT PCRs Done
3,592,692 UART: [art] Populate DV Done
3,601,141 UART: [fht] FMC Alias Private Key: 7
3,602,295 UART: [art] Derive CDI
3,602,575 UART: [art] Store in slot 0x4
3,688,306 UART: [art] Derive Key Pair
3,688,666 UART: [art] Store priv key in slot 0x5
3,701,620 UART: [art] Derive Key Pair - Done
3,716,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,731,798 UART: [art] Erasing AUTHORITY.KEYID = 7
3,732,563 UART: [art] PUB.X = CA3D53E4B04B7D767CE67A20221A216E7A56C24035CE818E68BE3514DC55D0DE0982126E0C98EA24A702D091986B4763
3,739,324 UART: [art] PUB.Y = C96416F3B107AC56C391A4E6F1C105B00EE2FE28DF94C327C2617C8CF90AD3221A169097E59F2CC7466F448DB0759411
3,746,264 UART: [art] SIG.R = 21A32D84D90725AFC5640F6A46BF7F580A6354829FC02C90689B9C571F947C2C88856B6C104064F37F0B538B2E7BF546
3,753,018 UART: [art] SIG.S = B2C91D9F39D79A7D4FC1792EB5BD3E5A7FD23FFBC3813DD7DD48DBD6946BE04D93928139E4D6EA0BEA645EC143393283
3,777,181 UART: Caliptra RT
3,777,524 UART: [state] CFI Enabled
3,897,302 UART: [rt] RT listening for mailbox commands...
3,897,972 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,021,118 UART: [rt]cmd =0x41544d4e, len=14344
4,027,671 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,177 ready_for_fw is high
1,059,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,065 >>> mbox cmd response: success
3,278,858 UART:
3,278,874 UART: Running Caliptra FMC ...
3,279,282 UART:
3,279,425 UART: [state] CFI Enabled
3,290,099 UART: [fht] FMC Alias Private Key: 7
3,409,435 UART: [art] Extend RT PCRs Done
3,409,863 UART: [art] Lock RT PCRs Done
3,411,523 UART: [art] Populate DV Done
3,419,892 UART: [fht] FMC Alias Private Key: 7
3,421,026 UART: [art] Derive CDI
3,421,306 UART: [art] Store in slot 0x4
3,507,129 UART: [art] Derive Key Pair
3,507,489 UART: [art] Store priv key in slot 0x5
3,520,767 UART: [art] Derive Key Pair - Done
3,535,466 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,724 UART: [art] PUB.X = E54F6CEE14D0C68CB6E21076CF38497E784C9ABB6915AC035995249CE8AA65B8E9FABF8B8F74C2A56C4827EE4BF19BC4
3,558,509 UART: [art] PUB.Y = D7A73F3DD52C75630E1B0CB3BBD2437AC69EB46ED1D49CA7808514B86DB5D534F1B8DE3A556BF9C1EDA194E57D424918
3,565,469 UART: [art] SIG.R = 93FE37D8D31221E0C9249FE7E955C9CC1691202C518DA1A375B5295F06AF8CC8B07FC90B43CFEF256730DF83F124F06B
3,572,241 UART: [art] SIG.S = 8139D30024E6337A716B3110C3249C69FC9E18709C9A68054EAEC3A54D95C98A4F31FC6AFCC5E46C85422CC9C0BC07E7
3,595,985 UART: Caliptra RT
3,596,328 UART: [state] CFI Enabled
3,715,393 UART: [rt] RT listening for mailbox commands...
3,716,063 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,045 UART: [rt]cmd =0x41544d4e, len=14344
3,845,414 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,168 UART: [state] LifecycleState = Unprovisioned
85,823 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,699 UART: [kat] SHA2-256
903,639 UART: [kat] SHA2-384
906,358 UART: [kat] SHA2-512-ACC
908,259 UART: [kat] ECC-384
917,856 UART: [kat] HMAC-384Kdf
922,462 UART: [kat] LMS
1,170,790 UART: [kat] --
1,171,703 UART: [cold-reset] ++
1,172,283 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 ready_for_fw is high
1,176,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,868 UART: [idev] Erasing UDS.KEYID = 0
1,200,639 UART: [idev] Sha1 KeyId Algorithm
1,208,991 UART: [idev] --
1,209,883 UART: [ldev] ++
1,210,051 UART: [ldev] CDI.KEYID = 6
1,210,414 UART: [ldev] SUBJECT.KEYID = 5
1,210,840 UART: [ldev] AUTHORITY.KEYID = 7
1,211,303 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,988 UART: [fwproc] Wait for Commands...
1,282,776 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,310 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,480 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,643 >>> mbox cmd response: success
3,367,853 UART: [afmc] ++
3,368,021 UART: [afmc] CDI.KEYID = 6
3,368,383 UART: [afmc] SUBJECT.KEYID = 7
3,368,808 UART: [afmc] AUTHORITY.KEYID = 5
3,403,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,420,190 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,420,938 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,426,644 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,432,523 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,438,233 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,212 UART: [afmc] --
3,447,252 UART: [cold-reset] --
3,448,136 UART: [state] Locking Datavault
3,449,321 UART: [state] Locking PCR0, PCR1 and PCR31
3,449,925 UART: [state] Locking ICCM
3,450,575 UART: [exit] Launching FMC @ 0x40000130
3,455,905 UART:
3,455,921 UART: Running Caliptra FMC ...
3,456,329 UART:
3,456,383 UART: [state] CFI Enabled
3,466,729 UART: [fht] FMC Alias Private Key: 7
3,585,493 UART: [art] Extend RT PCRs Done
3,585,921 UART: [art] Lock RT PCRs Done
3,587,153 UART: [art] Populate DV Done
3,595,080 UART: [fht] FMC Alias Private Key: 7
3,596,032 UART: [art] Derive CDI
3,596,312 UART: [art] Store in slot 0x4
3,682,075 UART: [art] Derive Key Pair
3,682,435 UART: [art] Store priv key in slot 0x5
3,695,635 UART: [art] Derive Key Pair - Done
3,710,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,759 UART: [art] PUB.X = A61432D5DAB419D3BE42F2252BD4D2BA103B320076A2554258980670CBCAD0BD38D37DF1F6D79CD1B1009A4BFBDFBE2F
3,733,500 UART: [art] PUB.Y = F6E2C4BCFD658679A464E29EB467EE25D3A08E1079200D9FCB92BF65ED92A1C8752BDF9BC330F45D1529DE9CCE7FCF94
3,740,467 UART: [art] SIG.R = EBB1CAC059AA593C9945664F928D033B2B0B6F39AACEAA1AE358D652D3BE81CC55BDA07611162DBC610CF8DD424AAFCB
3,747,254 UART: [art] SIG.S = DCF0BFE20C9F3A451DC32FAC2A8F3986CE229B7480D1417420DC74FCCD269F7E10B37AACCD4D248F778D7C26974DBB8A
3,771,577 UART: Caliptra RT
3,771,828 UART: [state] CFI Enabled
3,892,271 UART: [rt] RT listening for mailbox commands...
3,892,941 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,015,901 UART: [rt]cmd =0x41544d4e, len=14344
4,022,178 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,275 ready_for_fw is high
1,060,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,503 >>> mbox cmd response: success
3,279,672 UART:
3,279,688 UART: Running Caliptra FMC ...
3,280,096 UART:
3,280,150 UART: [state] CFI Enabled
3,290,566 UART: [fht] FMC Alias Private Key: 7
3,410,466 UART: [art] Extend RT PCRs Done
3,410,894 UART: [art] Lock RT PCRs Done
3,412,568 UART: [art] Populate DV Done
3,420,585 UART: [fht] FMC Alias Private Key: 7
3,421,535 UART: [art] Derive CDI
3,421,815 UART: [art] Store in slot 0x4
3,507,416 UART: [art] Derive Key Pair
3,507,776 UART: [art] Store priv key in slot 0x5
3,521,356 UART: [art] Derive Key Pair - Done
3,535,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,551,636 UART: [art] Erasing AUTHORITY.KEYID = 7
3,552,401 UART: [art] PUB.X = 88B745E9406B3158EF73AB50B297FDBA988E3A37F361103E117522C2215120B40F2AD5F86B297049A91081633F3075FF
3,559,160 UART: [art] PUB.Y = 609A09744191B6D45CF283764269D447EDA6B7EDF8BC6A2F1DF17607156237876CEA94981CD2C929E76A0318D6B48112
3,566,097 UART: [art] SIG.R = 20F5F2DA1CDF2E2A41D3446D6BAD9569A774CA2281ECCC9BDA6D6CD7DD8A9F643CA94045E144A8270F1AF0F5999687BF
3,572,884 UART: [art] SIG.S = 06D806BC094AE7DCB20F12846A37A4C108CA0867EDC3122B99F132D3D6391828A967FDC85BD98D20616EAF960F0704E5
3,597,021 UART: Caliptra RT
3,597,272 UART: [state] CFI Enabled
3,717,266 UART: [rt] RT listening for mailbox commands...
3,717,936 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,840,910 UART: [rt]cmd =0x41544d4e, len=14344
3,846,949 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,739 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,109 UART: [kat] SHA2-256
893,759 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,884 UART: [kat] ++
898,036 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
906,837 UART: [kat] SHA2-512-ACC
908,738 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,832 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 ready_for_fw is high
1,176,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,477 UART: [idev] Erasing UDS.KEYID = 0
1,201,624 UART: [idev] Sha1 KeyId Algorithm
1,210,206 UART: [idev] --
1,211,472 UART: [ldev] ++
1,211,640 UART: [ldev] CDI.KEYID = 6
1,212,003 UART: [ldev] SUBJECT.KEYID = 5
1,212,429 UART: [ldev] AUTHORITY.KEYID = 7
1,212,892 UART: [ldev] FE.KEYID = 1
1,218,312 UART: [ldev] Erasing FE.KEYID = 1
1,243,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,418 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,134 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,740 UART: [ldev] --
1,283,175 UART: [fwproc] Wait for Commands...
1,283,925 UART: [fwproc] Recv command 0x46574c44
1,284,653 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,840 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,707 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,877 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,028 >>> mbox cmd response: success
3,369,082 UART: [afmc] ++
3,369,250 UART: [afmc] CDI.KEYID = 6
3,369,612 UART: [afmc] SUBJECT.KEYID = 7
3,370,037 UART: [afmc] AUTHORITY.KEYID = 5
3,405,382 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,689 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,437 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,428,143 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,434,022 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,732 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,503 UART: [afmc] --
3,448,533 UART: [cold-reset] --
3,449,117 UART: [state] Locking Datavault
3,450,528 UART: [state] Locking PCR0, PCR1 and PCR31
3,451,132 UART: [state] Locking ICCM
3,451,590 UART: [exit] Launching FMC @ 0x40000130
3,456,920 UART:
3,456,936 UART: Running Caliptra FMC ...
3,457,344 UART:
3,457,487 UART: [state] CFI Enabled
3,468,063 UART: [fht] FMC Alias Private Key: 7
3,587,007 UART: [art] Extend RT PCRs Done
3,587,435 UART: [art] Lock RT PCRs Done
3,588,705 UART: [art] Populate DV Done
3,596,616 UART: [fht] FMC Alias Private Key: 7
3,597,632 UART: [art] Derive CDI
3,597,912 UART: [art] Store in slot 0x4
3,683,619 UART: [art] Derive Key Pair
3,683,979 UART: [art] Store priv key in slot 0x5
3,697,593 UART: [art] Derive Key Pair - Done
3,712,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,293 UART: [art] Erasing AUTHORITY.KEYID = 7
3,729,058 UART: [art] PUB.X = 79DB2AC35F73FD149E620CD783941A17B151E0D9F7F9E46C882BA0CC19E93DB15C6197658F6D3B82313F46BC4D98DD14
3,735,833 UART: [art] PUB.Y = FD5C416241EF075223DAC00BF0A9F9471C835C7867C834A18D34AA3BC83BF6474A9DA3F0ACD4B0F822B438F478410543
3,742,780 UART: [art] SIG.R = C88D38118281B48D66EE9E9E97C7BD2877A1612E5D1DC4A09488566677F0D4E219F76DB60CA0986743A41CFBABCD51F6
3,749,553 UART: [art] SIG.S = E2F5437A0FDC57350414859AF8A780FA9EAE9B4FD80AD40DFF4A29A54903F18C1A7268D8AF586B4DF49833FD5FFDD0F6
3,773,016 UART: Caliptra RT
3,773,359 UART: [state] CFI Enabled
3,894,126 UART: [rt] RT listening for mailbox commands...
3,894,796 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,017,662 UART: [rt]cmd =0x41544d4e, len=14344
4,023,889 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,676 ready_for_fw is high
1,060,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,058 >>> mbox cmd response: success
3,289,743 UART:
3,289,759 UART: Running Caliptra FMC ...
3,290,167 UART:
3,290,310 UART: [state] CFI Enabled
3,301,282 UART: [fht] FMC Alias Private Key: 7
3,420,458 UART: [art] Extend RT PCRs Done
3,420,886 UART: [art] Lock RT PCRs Done
3,422,806 UART: [art] Populate DV Done
3,431,089 UART: [fht] FMC Alias Private Key: 7
3,432,049 UART: [art] Derive CDI
3,432,329 UART: [art] Store in slot 0x4
3,517,984 UART: [art] Derive Key Pair
3,518,344 UART: [art] Store priv key in slot 0x5
3,531,582 UART: [art] Derive Key Pair - Done
3,546,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,562,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,790 UART: [art] PUB.X = 529230E565432908CEAC6C124F3C20CF2A88A91AA4C2D496BBF4BE7428467CDDA6E9A5DFB109E9653E1B9FE3775C0E7C
3,569,565 UART: [art] PUB.Y = D34A7DB2B94C91531675F58A9A6FDA70EAEA4381ED9F6CD624368E82405EA23B3495D98431043A701F9BE5ACFB3DD0EF
3,576,526 UART: [art] SIG.R = 92B76D72637A4F198D42210E11AB4E6421B367A4BD85161D4C16089014D2E057D4947FF6289DD2FD32C5873B129E4C80
3,583,284 UART: [art] SIG.S = 20CB7F90C1A2688FC4F73F152CD9FECD1CECCA17AFD3CE1C3931FED0EAF01F01C3E41D184D433AC791A123DE5AC19667
3,607,105 UART: Caliptra RT
3,607,448 UART: [state] CFI Enabled
3,727,060 UART: [rt] RT listening for mailbox commands...
3,727,730 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,690 UART: [rt]cmd =0x41544d4e, len=14344
3,856,667 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,179 UART:
192,532 UART: Running Caliptra ROM ...
193,724 UART:
193,877 UART: [state] CFI Enabled
265,969 UART: [state] LifecycleState = Unprovisioned
267,951 UART: [state] DebugLocked = No
269,982 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,345 UART: [kat] SHA2-256
444,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,563 UART: [kat] ++
455,096 UART: [kat] sha1
465,534 UART: [kat] SHA2-256
468,229 UART: [kat] SHA2-384
473,666 UART: [kat] SHA2-512-ACC
476,056 UART: [kat] ECC-384
2,768,566 UART: [kat] HMAC-384Kdf
2,801,064 UART: [kat] LMS
3,991,337 UART: [kat] --
3,998,554 UART: [cold-reset] ++
4,000,526 UART: [fht] Storing FHT @ 0x50003400
4,012,307 UART: [idev] ++
4,012,879 UART: [idev] CDI.KEYID = 6
4,013,880 UART: [idev] SUBJECT.KEYID = 7
4,015,065 UART: [idev] UDS.KEYID = 0
4,016,249 ready_for_fw is high
4,016,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,090 UART: [idev] Erasing UDS.KEYID = 0
7,352,420 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,621 UART: [idev] --
7,377,099 UART: [ldev] ++
7,377,681 UART: [ldev] CDI.KEYID = 6
7,378,650 UART: [ldev] SUBJECT.KEYID = 5
7,379,866 UART: [ldev] AUTHORITY.KEYID = 7
7,381,103 UART: [ldev] FE.KEYID = 1
7,427,752 UART: [ldev] Erasing FE.KEYID = 1
10,759,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,052,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,067,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,082,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,096,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,322 UART: [ldev] --
13,120,764 UART: [fwproc] Waiting for Commands...
13,124,099 UART: [fwproc] Received command 0x46574c44
13,126,281 UART: [fwproc] Received Image of size 118548 bytes
21,902,251 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,985,498 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,058,685 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,388,051 >>> mbox cmd response: success
22,392,427 UART: [afmc] ++
22,393,053 UART: [afmc] CDI.KEYID = 6
22,393,972 UART: [afmc] SUBJECT.KEYID = 7
22,395,192 UART: [afmc] AUTHORITY.KEYID = 5
25,751,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,048,476 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,050,733 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,065,227 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,080,019 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,094,428 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,114,697 UART: [afmc] --
28,118,506 UART: [cold-reset] --
28,121,609 UART: [state] Locking Datavault
28,126,660 UART: [state] Locking PCR0, PCR1 and PCR31
28,128,360 UART: [state] Locking ICCM
28,130,330 UART: [exit] Launching FMC @ 0x40000130
28,138,738 UART:
28,138,974 UART: Running Caliptra FMC ...
28,140,002 UART:
28,140,166 UART: [state] CFI Enabled
28,211,242 UART: [fht] FMC Alias Private Key: 7
30,552,170 UART: [art] Extend RT PCRs Done
30,553,399 UART: [art] Lock RT PCRs Done
30,555,002 UART: [art] Populate DV Done
30,560,583 UART: [fht] FMC Alias Private Key: 7
30,562,338 UART: [art] Derive CDI
30,563,164 UART: [art] Store in slot 0x4
30,620,860 UART: [art] Derive Key Pair
30,621,852 UART: [art] Store priv key in slot 0x5
33,915,008 UART: [art] Derive Key Pair - Done
33,928,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,217,060 UART: [art] Erasing AUTHORITY.KEYID = 7
36,218,568 UART: [art] PUB.X = 001BE01CFEC15043DE99FF841D394D808880BF4648D376A26CC23772307BD6D51EDCCD86BA1B5D8A62781E646303AF7E
36,225,897 UART: [art] PUB.Y = F435095B2A9F2887A83DF1FFACC5D9E0E4B62E318E3D672CCD7596BE7864EC910938C6C705FDD02F60EBD7983DEDEF10
36,233,139 UART: [art] SIG.R = 6FF3239E5B6705914FD21E7C62A1C8CAF39BD19ECE47CA65B3C4A30CA0ABA6AA28FE7D86333F09230AE7B17741F54747
36,240,527 UART: [art] SIG.S = 91ED0763404D92B65D451A83B9282AC8F0D775D879EA7467E4F053B3C19FC080BF1DE13D423A23E9E736DB2286F2D803
37,545,152 UART: Caliptra RT
37,545,840 UART: [state] CFI Enabled
37,724,335 UART: [rt] RT listening for mailbox commands...
37,726,629 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,882,086 UART: [rt]cmd =0x41544d4e, len=14344
39,175,236 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,804,100 ready_for_fw is high
3,804,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,957,157 >>> mbox cmd response: success
27,638,901 UART:
27,639,340 UART: Running Caliptra FMC ...
27,640,474 UART:
27,640,630 UART: [state] CFI Enabled
27,708,556 UART: [fht] FMC Alias Private Key: 7
30,049,051 UART: [art] Extend RT PCRs Done
30,050,282 UART: [art] Lock RT PCRs Done
30,051,777 UART: [art] Populate DV Done
30,056,928 UART: [fht] FMC Alias Private Key: 7
30,058,468 UART: [art] Derive CDI
30,059,206 UART: [art] Store in slot 0x4
30,117,707 UART: [art] Derive Key Pair
30,118,703 UART: [art] Store priv key in slot 0x5
33,411,594 UART: [art] Derive Key Pair - Done
33,424,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,713,787 UART: [art] Erasing AUTHORITY.KEYID = 7
35,715,310 UART: [art] PUB.X = 18CCEA56BE2E49DCDD20E8C1677FAB46FB26D1AA042A8B53F2D4476C7AACF53ABE46E90E2B56E11A4FB68A8E86386A81
35,722,623 UART: [art] PUB.Y = EF52F425F045B2F62FA618A7038DB1277B48946DB898E74EEC1F70C13FDD7D85F80EDB80B62D5746D9CA212CC7B66A77
35,729,864 UART: [art] SIG.R = 5605EDFECD2EF4F42F0E3A768A054B9288EAAEB331BACD073057C3233062B7010D22ABFC24EEFA6C758A09BB14E524FA
35,737,281 UART: [art] SIG.S = 7D6C45D0EE7F11976332352F2C075A027C047E4C370D0B95D7EAC85847334AD5F821F64CA4AE1679213F811ECD877F1E
37,042,526 UART: Caliptra RT
37,043,216 UART: [state] CFI Enabled
37,218,432 UART: [rt] RT listening for mailbox commands...
37,220,790 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,376,171 UART: [rt]cmd =0x41544d4e, len=14344
38,669,090 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,420 writing to cptra_bootfsm_go
192,590 UART:
192,947 UART: Running Caliptra ROM ...
194,152 UART:
603,873 UART: [state] CFI Enabled
618,039 UART: [state] LifecycleState = Unprovisioned
619,989 UART: [state] DebugLocked = No
621,592 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,046 UART: [kat] SHA2-256
795,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,389 UART: [kat] ++
806,834 UART: [kat] sha1
817,630 UART: [kat] SHA2-256
820,351 UART: [kat] SHA2-384
825,839 UART: [kat] SHA2-512-ACC
828,201 UART: [kat] ECC-384
3,111,268 UART: [kat] HMAC-384Kdf
3,122,149 UART: [kat] LMS
4,312,240 UART: [kat] --
4,315,922 UART: [cold-reset] ++
4,317,077 UART: [fht] Storing FHT @ 0x50003400
4,329,271 UART: [idev] ++
4,329,824 UART: [idev] CDI.KEYID = 6
4,330,770 UART: [idev] SUBJECT.KEYID = 7
4,332,008 UART: [idev] UDS.KEYID = 0
4,332,995 ready_for_fw is high
4,333,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,007 UART: [idev] Erasing UDS.KEYID = 0
7,617,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,305 UART: [idev] --
7,642,000 UART: [ldev] ++
7,642,569 UART: [ldev] CDI.KEYID = 6
7,643,527 UART: [ldev] SUBJECT.KEYID = 5
7,644,732 UART: [ldev] AUTHORITY.KEYID = 7
7,646,007 UART: [ldev] FE.KEYID = 1
7,657,327 UART: [ldev] Erasing FE.KEYID = 1
10,946,600 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,162 UART: [ldev] --
13,306,017 UART: [fwproc] Waiting for Commands...
13,309,294 UART: [fwproc] Received command 0x46574c44
13,311,523 UART: [fwproc] Received Image of size 118548 bytes
22,314,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,388,746 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,461,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,791,092 >>> mbox cmd response: success
22,794,618 UART: [afmc] ++
22,795,241 UART: [afmc] CDI.KEYID = 6
22,796,172 UART: [afmc] SUBJECT.KEYID = 7
22,797,388 UART: [afmc] AUTHORITY.KEYID = 5
26,115,602 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,412,115 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,414,373 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,428,882 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,443,656 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,458,044 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,479,926 UART: [afmc] --
28,483,315 UART: [cold-reset] --
28,487,981 UART: [state] Locking Datavault
28,492,626 UART: [state] Locking PCR0, PCR1 and PCR31
28,494,370 UART: [state] Locking ICCM
28,496,189 UART: [exit] Launching FMC @ 0x40000130
28,504,585 UART:
28,504,811 UART: Running Caliptra FMC ...
28,505,922 UART:
28,506,077 UART: [state] CFI Enabled
28,514,181 UART: [fht] FMC Alias Private Key: 7
30,853,911 UART: [art] Extend RT PCRs Done
30,855,135 UART: [art] Lock RT PCRs Done
30,857,184 UART: [art] Populate DV Done
30,862,599 UART: [fht] FMC Alias Private Key: 7
30,864,120 UART: [art] Derive CDI
30,864,881 UART: [art] Store in slot 0x4
30,907,685 UART: [art] Derive Key Pair
30,908,679 UART: [art] Store priv key in slot 0x5
34,151,488 UART: [art] Derive Key Pair - Done
34,164,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,445,214 UART: [art] Erasing AUTHORITY.KEYID = 7
36,446,716 UART: [art] PUB.X = 11D064E4518655798108F06000FA3B40DB33CA4AEE7E3490027E77CAFEA741A56915C7F4B4DE507D48FE1B47CED83E87
36,454,008 UART: [art] PUB.Y = 3AB536F30D825495458F6DBF867753E8BE13FF02D272E82C4620BC894EEA610540AF6D5AA87F220E0253B53034E64F13
36,461,279 UART: [art] SIG.R = 08763A7BD68E9F066D7FA6FE27A3EB204897334F7B477729F79EC773F5CF885618B1C85C837E0E72DF036EA6BB1C5397
36,468,635 UART: [art] SIG.S = ACB64D2D653B9CCA525A1B8483515C2ECCB9A90E7DD4CC837D5F6DDE7EAD618474DD09A0C6F18C222E8B588CC4F21D3A
37,773,784 UART: Caliptra RT
37,774,500 UART: [state] CFI Enabled
37,908,045 UART: [rt] RT listening for mailbox commands...
37,910,385 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,065,692 UART: [rt]cmd =0x41544d4e, len=14344
39,358,867 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
4,129,981 ready_for_fw is high
4,130,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,551,969 >>> mbox cmd response: success
28,190,045 UART:
28,190,462 UART: Running Caliptra FMC ...
28,191,655 UART:
28,191,822 UART: [state] CFI Enabled
28,199,590 UART: [fht] FMC Alias Private Key: 7
30,539,070 UART: [art] Extend RT PCRs Done
30,540,312 UART: [art] Lock RT PCRs Done
30,541,726 UART: [art] Populate DV Done
30,547,132 UART: [fht] FMC Alias Private Key: 7
30,548,617 UART: [art] Derive CDI
30,549,376 UART: [art] Store in slot 0x4
30,592,028 UART: [art] Derive Key Pair
30,593,073 UART: [art] Store priv key in slot 0x5
33,834,839 UART: [art] Derive Key Pair - Done
33,847,410 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,127,711 UART: [art] Erasing AUTHORITY.KEYID = 7
36,129,218 UART: [art] PUB.X = 61B704CD42E8437EAC5F889A8CC6FFAF1728AB116D08EB76661641EFC2473F53EC014155F66D5B03982E400046BA37A3
36,136,449 UART: [art] PUB.Y = 9B2D94D860DFC5DA28074068A1B8F289CBFD0CA241BAF01F8EBD94E44FB468560322B2B6BD28FB8BA3C3B5764F2B897D
36,143,725 UART: [art] SIG.R = 4C5097DDA412254A57630146D63049DAE3D219A13AE25EAEE00CBFDC09C2EFE93A8660C8528EE10D017ACAB59933706B
36,151,123 UART: [art] SIG.S = 4F48160D4EBA79F5C3AE4E3249985657EB43A04F6FC98D2E49489353B648E58AC61E24ACCB6EDD0B877B246D9AD2DB1D
37,455,915 UART: Caliptra RT
37,456,629 UART: [state] CFI Enabled
37,589,221 UART: [rt] RT listening for mailbox commands...
37,591,527 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,746,732 UART: [rt]cmd =0x41544d4e, len=14344
39,039,550 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,156 UART:
192,511 UART: Running Caliptra ROM ...
193,640 UART:
193,785 UART: [state] CFI Enabled
264,101 UART: [state] LifecycleState = Unprovisioned
266,008 UART: [state] DebugLocked = No
268,685 UART: [state] WD Timer not started. Device not locked for debugging
272,774 UART: [kat] SHA2-256
452,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,244 UART: [kat] ++
463,740 UART: [kat] sha1
475,676 UART: [kat] SHA2-256
478,326 UART: [kat] SHA2-384
483,669 UART: [kat] SHA2-512-ACC
486,026 UART: [kat] ECC-384
2,947,568 UART: [kat] HMAC-384Kdf
2,970,463 UART: [kat] LMS
3,446,919 UART: [kat] --
3,452,052 UART: [cold-reset] ++
3,453,056 UART: [fht] FHT @ 0x50003400
3,465,165 UART: [idev] ++
3,465,721 UART: [idev] CDI.KEYID = 6
3,466,750 UART: [idev] SUBJECT.KEYID = 7
3,467,914 UART: [idev] UDS.KEYID = 0
3,468,958 ready_for_fw is high
3,469,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,333 UART: [idev] Erasing UDS.KEYID = 0
5,985,498 UART: [idev] Sha1 KeyId Algorithm
6,010,151 UART: [idev] --
6,015,584 UART: [ldev] ++
6,016,163 UART: [ldev] CDI.KEYID = 6
6,017,231 UART: [ldev] SUBJECT.KEYID = 5
6,018,338 UART: [ldev] AUTHORITY.KEYID = 7
6,019,509 UART: [ldev] FE.KEYID = 1
6,056,372 UART: [ldev] Erasing FE.KEYID = 1
8,566,768 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,009 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,304 UART: [ldev] --
10,374,020 UART: [fwproc] Wait for Commands...
10,376,619 UART: [fwproc] Recv command 0x46574c44
10,378,603 UART: [fwproc] Recv'd Img size: 118548 bytes
14,906,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,995,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,068,159 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,396,863 >>> mbox cmd response: success
15,401,575 UART: [afmc] ++
15,402,199 UART: [afmc] CDI.KEYID = 6
15,403,115 UART: [afmc] SUBJECT.KEYID = 7
15,404,334 UART: [afmc] AUTHORITY.KEYID = 5
17,937,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,679,327 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,681,556 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,697,391 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,713,330 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,729,083 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,753,961 UART: [afmc] --
19,758,426 UART: [cold-reset] --
19,762,716 UART: [state] Locking Datavault
19,767,211 UART: [state] Locking PCR0, PCR1 and PCR31
19,768,961 UART: [state] Locking ICCM
19,770,024 UART: [exit] Launching FMC @ 0x40000130
19,778,418 UART:
19,778,650 UART: Running Caliptra FMC ...
19,779,745 UART:
19,779,904 UART: [state] CFI Enabled
19,835,835 UART: [fht] FMC Alias Private Key: 7
21,622,919 UART: [art] Extend RT PCRs Done
21,624,138 UART: [art] Lock RT PCRs Done
21,626,030 UART: [art] Populate DV Done
21,631,553 UART: [fht] FMC Alias Private Key: 7
21,633,097 UART: [art] Derive CDI
21,633,878 UART: [art] Store in slot 0x4
21,689,726 UART: [art] Derive Key Pair
21,690,764 UART: [art] Store priv key in slot 0x5
24,153,682 UART: [art] Derive Key Pair - Done
24,166,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,879,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,880,840 UART: [art] PUB.X = 5314746DADAD15188C1D05C520D007D35DD2975B23EF6A41EF7077BC11E0CF028389FF96BD2D3DB0AB21E45AC277DAEE
25,888,117 UART: [art] PUB.Y = 1E4F33ED174C1AC74236C2EC81DADAC36D30A765E65FD4CE35C591A412F189FAD8853FF2BBBA8F7DD22B67C12530B895
25,895,411 UART: [art] SIG.R = B303C96EDB9E48A99045489D9BC6041B6C56CF72E5BAD5B21042104D46BA0A85484F76C4FAB69DF0E848ED565B0C787F
25,902,797 UART: [art] SIG.S = E0E2BAB41F5A07B61EC73EAC079A36A99B324973B88F89E97C431C5127AC47F39A52F653275059176556E2DC68B194E3
26,881,944 UART: Caliptra RT
26,882,628 UART: [state] CFI Enabled
27,062,320 UART: [rt] RT listening for mailbox commands...
27,064,649 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,220,089 UART: [rt]cmd =0x41544d4e, len=14344
28,187,074 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,463,503 ready_for_fw is high
3,464,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,387,884 >>> mbox cmd response: success
19,666,649 UART:
19,667,038 UART: Running Caliptra FMC ...
19,668,172 UART:
19,668,326 UART: [state] CFI Enabled
19,732,548 UART: [fht] FMC Alias Private Key: 7
21,498,624 UART: [art] Extend RT PCRs Done
21,499,843 UART: [art] Lock RT PCRs Done
21,501,599 UART: [art] Populate DV Done
21,507,235 UART: [fht] FMC Alias Private Key: 7
21,508,886 UART: [art] Derive CDI
21,509,744 UART: [art] Store in slot 0x4
21,566,201 UART: [art] Derive Key Pair
21,567,250 UART: [art] Store priv key in slot 0x5
24,029,746 UART: [art] Derive Key Pair - Done
24,042,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,755,185 UART: [art] Erasing AUTHORITY.KEYID = 7
25,756,733 UART: [art] PUB.X = F3FA8580D96C6A7247FB0C3B3569F83712C326418019913051ACC95C2C53118168C487E71378D253C400BE15AFB69196
25,764,127 UART: [art] PUB.Y = AF058E5B9AA34E34937D038FF307749B3F9AE275079CB1B440395AD38605004BBDC8DEFEA82B9B22FD15B45396BFA49A
25,771,210 UART: [art] SIG.R = EBBEB67020ECF9BA1740029D99F79AF47F07DBAA45D411B63C84313A8EBA309CE712D7653ADD75BAE2FFD789F3443EDF
25,778,626 UART: [art] SIG.S = 5C8F9DCC6A558A7D991A51C47909B64A81B533F5A46D53F6B7A9D491C215825A3F81E191A369CAB9EE0082CFE4FAE2FE
26,758,189 UART: Caliptra RT
26,758,934 UART: [state] CFI Enabled
26,938,729 UART: [rt] RT listening for mailbox commands...
26,941,067 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,096,257 UART: [rt]cmd =0x41544d4e, len=14344
28,062,829 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,513 UART:
192,869 UART: Running Caliptra ROM ...
194,007 UART:
603,632 UART: [state] CFI Enabled
617,956 UART: [state] LifecycleState = Unprovisioned
619,919 UART: [state] DebugLocked = No
622,164 UART: [state] WD Timer not started. Device not locked for debugging
625,839 UART: [kat] SHA2-256
805,443 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,264 UART: [kat] ++
816,746 UART: [kat] sha1
828,473 UART: [kat] SHA2-256
831,130 UART: [kat] SHA2-384
836,910 UART: [kat] SHA2-512-ACC
839,332 UART: [kat] ECC-384
3,283,592 UART: [kat] HMAC-384Kdf
3,295,818 UART: [kat] LMS
3,772,321 UART: [kat] --
3,776,551 UART: [cold-reset] ++
3,778,058 UART: [fht] FHT @ 0x50003400
3,790,246 UART: [idev] ++
3,790,817 UART: [idev] CDI.KEYID = 6
3,791,771 UART: [idev] SUBJECT.KEYID = 7
3,793,018 UART: [idev] UDS.KEYID = 0
3,793,923 ready_for_fw is high
3,794,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,007 UART: [idev] Erasing UDS.KEYID = 0
6,273,530 UART: [idev] Sha1 KeyId Algorithm
6,297,137 UART: [idev] --
6,302,346 UART: [ldev] ++
6,302,933 UART: [ldev] CDI.KEYID = 6
6,303,845 UART: [ldev] SUBJECT.KEYID = 5
6,305,063 UART: [ldev] AUTHORITY.KEYID = 7
6,306,299 UART: [ldev] FE.KEYID = 1
6,317,668 UART: [ldev] Erasing FE.KEYID = 1
8,793,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,515,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,449 UART: [ldev] --
10,588,663 UART: [fwproc] Wait for Commands...
10,590,273 UART: [fwproc] Recv command 0x46574c44
10,592,262 UART: [fwproc] Recv'd Img size: 118548 bytes
15,136,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,218,703 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,291,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,620,344 >>> mbox cmd response: success
15,623,604 UART: [afmc] ++
15,624,221 UART: [afmc] CDI.KEYID = 6
15,625,160 UART: [afmc] SUBJECT.KEYID = 7
15,626,325 UART: [afmc] AUTHORITY.KEYID = 5
18,126,528 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,849,224 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,851,413 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,867,287 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,883,193 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,898,905 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,922,917 UART: [afmc] --
19,927,214 UART: [cold-reset] --
19,929,511 UART: [state] Locking Datavault
19,934,166 UART: [state] Locking PCR0, PCR1 and PCR31
19,935,926 UART: [state] Locking ICCM
19,937,537 UART: [exit] Launching FMC @ 0x40000130
19,945,941 UART:
19,946,179 UART: Running Caliptra FMC ...
19,947,253 UART:
19,947,413 UART: [state] CFI Enabled
19,955,413 UART: [fht] FMC Alias Private Key: 7
21,721,790 UART: [art] Extend RT PCRs Done
21,723,008 UART: [art] Lock RT PCRs Done
21,724,593 UART: [art] Populate DV Done
21,729,960 UART: [fht] FMC Alias Private Key: 7
21,731,445 UART: [art] Derive CDI
21,732,180 UART: [art] Store in slot 0x4
21,774,936 UART: [art] Derive Key Pair
21,775,936 UART: [art] Store priv key in slot 0x5
24,202,801 UART: [art] Derive Key Pair - Done
24,216,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,922,398 UART: [art] Erasing AUTHORITY.KEYID = 7
25,923,905 UART: [art] PUB.X = 34F9EE14068FF8F10C15173C2F290C99DCCB1FAD4BB78A35986A347A9F2E4277425D572E402CFE220E821EEA6E015817
25,931,160 UART: [art] PUB.Y = 1AC04005A3AF232E301F4445C999C396C33502C5034681931AD372AC934F86EBAA73A7E468823F529876772BFCABC93B
25,938,411 UART: [art] SIG.R = 8B2D6DB46C1F3CB092E66AB20ED75AB0C5FA8ABB4770863E77184F3A23D695117050705D4B102A79BB1DAF8C96CBF3EB
25,945,808 UART: [art] SIG.S = 1FBA7B9A39E24A767A7312F987ED6A993AFC29F0C9DD343015304EA020E7569EC389355C9D2B0CCA5D7E3FF44F8CF068
26,924,490 UART: Caliptra RT
26,925,179 UART: [state] CFI Enabled
27,057,685 UART: [rt] RT listening for mailbox commands...
27,059,984 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,215,617 UART: [rt]cmd =0x41544d4e, len=14344
28,182,306 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.73s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,194 writing to cptra_bootfsm_go
3,782,077 ready_for_fw is high
3,782,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,603,506 >>> mbox cmd response: success
19,856,836 UART:
19,857,235 UART: Running Caliptra FMC ...
19,858,383 UART:
19,858,548 UART: [state] CFI Enabled
19,866,506 UART: [fht] FMC Alias Private Key: 7
21,632,787 UART: [art] Extend RT PCRs Done
21,634,010 UART: [art] Lock RT PCRs Done
21,635,371 UART: [art] Populate DV Done
21,640,803 UART: [fht] FMC Alias Private Key: 7
21,642,449 UART: [art] Derive CDI
21,643,271 UART: [art] Store in slot 0x4
21,685,731 UART: [art] Derive Key Pair
21,686,777 UART: [art] Store priv key in slot 0x5
24,113,403 UART: [art] Derive Key Pair - Done
24,126,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,832,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,833,844 UART: [art] PUB.X = B267230839BFDB5AE9CF4CB8B01A27B05E5EF1E7664EEB134C9EC47D9304FE8F8A0A6F4C1A61D226E567211687CADC9F
25,841,097 UART: [art] PUB.Y = D42D3AE19E5BA9455B8BD3667AF31A1AAF309FA9EE7F12F83D19F36D9EF4F7BB880478B84A18F2A58D14D799922B5853
25,848,391 UART: [art] SIG.R = 39BD598D37E24E6439B9E8ECFF46F1819C7DE350D54C1B84381BBA8C97FD2CF07B5FDBDC78385201A478D2C8E1396A74
25,855,806 UART: [art] SIG.S = 966D239DDD617A303D3578773099B069E66B2F6B835495ABF611416E3A9D14CF28406B131E41C23C4ACC4F6369C17E27
26,834,622 UART: Caliptra RT
26,835,330 UART: [state] CFI Enabled
26,968,537 UART: [rt] RT listening for mailbox commands...
26,970,856 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,126,228 UART: [rt]cmd =0x41544d4e, len=14344
28,093,440 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.72s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,024 UART:
192,391 UART: Running Caliptra ROM ...
193,579 UART:
193,732 UART: [state] CFI Enabled
264,642 UART: [state] LifecycleState = Unprovisioned
267,070 UART: [state] DebugLocked = No
268,258 UART: [state] WD Timer not started. Device not locked for debugging
272,709 UART: [kat] SHA2-256
462,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,357 UART: [kat] ++
473,805 UART: [kat] sha1
483,773 UART: [kat] SHA2-256
486,779 UART: [kat] SHA2-384
493,407 UART: [kat] SHA2-512-ACC
495,984 UART: [kat] ECC-384
2,947,418 UART: [kat] HMAC-384Kdf
2,973,210 UART: [kat] LMS
3,504,950 UART: [kat] --
3,509,510 UART: [cold-reset] ++
3,510,942 UART: [fht] FHT @ 0x50003400
3,522,911 UART: [idev] ++
3,523,611 UART: [idev] CDI.KEYID = 6
3,524,590 UART: [idev] SUBJECT.KEYID = 7
3,525,758 UART: [idev] UDS.KEYID = 0
3,526,676 ready_for_fw is high
3,526,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,004 UART: [idev] Erasing UDS.KEYID = 0
6,030,940 UART: [idev] Sha1 KeyId Algorithm
6,052,859 UART: [idev] --
6,058,084 UART: [ldev] ++
6,058,775 UART: [ldev] CDI.KEYID = 6
6,059,659 UART: [ldev] SUBJECT.KEYID = 5
6,060,759 UART: [ldev] AUTHORITY.KEYID = 7
6,062,046 UART: [ldev] FE.KEYID = 1
6,101,078 UART: [ldev] Erasing FE.KEYID = 1
8,609,865 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,510 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,911 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,375 UART: [ldev] --
10,412,796 UART: [fwproc] Wait for Commands...
10,415,964 UART: [fwproc] Recv command 0x46574c44
10,418,286 UART: [fwproc] Recv'd Img size: 118548 bytes
15,071,925 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,158,454 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,282,092 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,841,597 >>> mbox cmd response: success
15,845,279 UART: [afmc] ++
15,845,997 UART: [afmc] CDI.KEYID = 6
15,847,188 UART: [afmc] SUBJECT.KEYID = 7
15,848,675 UART: [afmc] AUTHORITY.KEYID = 5
18,391,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,134,602 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,136,459 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,151,561 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,166,814 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,181,847 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,204,957 UART: [afmc] --
20,208,230 UART: [cold-reset] --
20,212,856 UART: [state] Locking Datavault
20,216,921 UART: [state] Locking PCR0, PCR1 and PCR31
20,219,134 UART: [state] Locking ICCM
20,220,146 UART: [exit] Launching FMC @ 0x40000130
20,228,822 UART:
20,229,053 UART: Running Caliptra FMC ...
20,230,105 UART:
20,230,253 UART: [state] CFI Enabled
20,290,210 UART: [fht] FMC Alias Private Key: 7
22,056,557 UART: [art] Extend RT PCRs Done
22,057,777 UART: [art] Lock RT PCRs Done
22,059,134 UART: [art] Populate DV Done
22,064,493 UART: [fht] FMC Alias Private Key: 7
22,066,093 UART: [art] Derive CDI
22,066,908 UART: [art] Store in slot 0x4
22,122,342 UART: [art] Derive Key Pair
22,123,373 UART: [art] Store priv key in slot 0x5
24,585,807 UART: [art] Derive Key Pair - Done
24,598,692 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,311,485 UART: [art] Erasing AUTHORITY.KEYID = 7
26,312,988 UART: [art] PUB.X = E6E73C12109101316E825AB7D924C1B42B2F6E8D1A7DF59CB0459E07958ED900AC99A74B4A59550961DE4D5D04180B56
26,320,254 UART: [art] PUB.Y = 025C80B2A4AC5B3B3D2665938B33C720227D1ABD2E2BE5975D03D33C29BA24D73AAE7FFDF77945EFE5A1DF306F57C1C5
26,327,514 UART: [art] SIG.R = A551BA4FEE97CA9D3569685318F2869945135BE0E5541E90741D38816D5E38BF502EDD28B85DD5FC2BB1F648BC9C9D70
26,334,915 UART: [art] SIG.S = A1EE23012340E67886233D56794A155A00E5BEF8E402368A9AD51F73D5F76AF489313414FB6CFB09D2104F4ADAE901C6
27,313,463 UART: Caliptra RT
27,314,163 UART: [state] CFI Enabled
27,495,273 UART: [rt] RT listening for mailbox commands...
27,497,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,653,139 UART: [rt]cmd =0x41544d4e, len=14344
28,620,311 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
3,419,565 ready_for_fw is high
3,419,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,913,962 >>> mbox cmd response: success
20,213,238 UART:
20,213,622 UART: Running Caliptra FMC ...
20,214,722 UART:
20,214,874 UART: [state] CFI Enabled
20,280,713 UART: [fht] FMC Alias Private Key: 7
22,047,426 UART: [art] Extend RT PCRs Done
22,048,656 UART: [art] Lock RT PCRs Done
22,050,435 UART: [art] Populate DV Done
22,055,847 UART: [fht] FMC Alias Private Key: 7
22,057,442 UART: [art] Derive CDI
22,058,185 UART: [art] Store in slot 0x4
22,113,466 UART: [art] Derive Key Pair
22,114,499 UART: [art] Store priv key in slot 0x5
24,577,377 UART: [art] Derive Key Pair - Done
24,590,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,303,154 UART: [art] Erasing AUTHORITY.KEYID = 7
26,304,656 UART: [art] PUB.X = 7AEAD9AC3C5F1F85AF64F0CCD718E6A0A8E9A8DEE0C0E3165A3B4FC493CEC7D1ADF4DAF4D54AF2553BB630238B1B0077
26,311,944 UART: [art] PUB.Y = E97ACABBA5BB6855D9CA2076AF5BA974F645FFE6F44ACBAA424870FFE33943D8DDBF2821DEEF5B817ED2C09A2B34FC56
26,319,243 UART: [art] SIG.R = D59F53734C0385B4F4123C6AB41C2D4294F34DA32C7D94FD081188AF4A3CADAA2BDB04F196C1FB66D09D609E62BA8901
26,326,603 UART: [art] SIG.S = 778AC06344DB652D1B3337339F8AF74380BBC639C9BFADFB7F753C9E4007C9145B1428DF5D4288746E2631BE72D2CFD1
27,305,513 UART: Caliptra RT
27,306,225 UART: [state] CFI Enabled
27,487,152 UART: [rt] RT listening for mailbox commands...
27,489,447 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,644,756 UART: [rt]cmd =0x41544d4e, len=14344
28,611,766 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,508 UART:
192,873 UART: Running Caliptra ROM ...
194,025 UART:
603,775 UART: [state] CFI Enabled
614,485 UART: [state] LifecycleState = Unprovisioned
616,807 UART: [state] DebugLocked = No
618,573 UART: [state] WD Timer not started. Device not locked for debugging
622,347 UART: [kat] SHA2-256
812,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,083 UART: [kat] ++
823,574 UART: [kat] sha1
834,617 UART: [kat] SHA2-256
837,681 UART: [kat] SHA2-384
843,406 UART: [kat] SHA2-512-ACC
845,998 UART: [kat] ECC-384
3,287,825 UART: [kat] HMAC-384Kdf
3,300,776 UART: [kat] LMS
3,832,556 UART: [kat] --
3,839,340 UART: [cold-reset] ++
3,840,351 UART: [fht] FHT @ 0x50003400
3,851,263 UART: [idev] ++
3,851,984 UART: [idev] CDI.KEYID = 6
3,852,918 UART: [idev] SUBJECT.KEYID = 7
3,854,168 UART: [idev] UDS.KEYID = 0
3,855,365 ready_for_fw is high
3,855,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,519 UART: [idev] Erasing UDS.KEYID = 0
6,329,142 UART: [idev] Sha1 KeyId Algorithm
6,352,536 UART: [idev] --
6,358,131 UART: [ldev] ++
6,358,826 UART: [ldev] CDI.KEYID = 6
6,359,740 UART: [ldev] SUBJECT.KEYID = 5
6,360,898 UART: [ldev] AUTHORITY.KEYID = 7
6,362,130 UART: [ldev] FE.KEYID = 1
6,374,269 UART: [ldev] Erasing FE.KEYID = 1
8,847,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,581,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,596,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,818 UART: [ldev] --
10,636,761 UART: [fwproc] Wait for Commands...
10,638,318 UART: [fwproc] Recv command 0x46574c44
10,640,625 UART: [fwproc] Recv'd Img size: 118548 bytes
15,309,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,398,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,522,215 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,081,911 >>> mbox cmd response: success
16,086,482 UART: [afmc] ++
16,087,220 UART: [afmc] CDI.KEYID = 6
16,088,431 UART: [afmc] SUBJECT.KEYID = 7
16,089,887 UART: [afmc] AUTHORITY.KEYID = 5
18,597,278 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,318,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,319,977 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,335,082 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,350,292 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,365,397 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,389,714 UART: [afmc] --
20,393,204 UART: [cold-reset] --
20,397,079 UART: [state] Locking Datavault
20,401,385 UART: [state] Locking PCR0, PCR1 and PCR31
20,403,554 UART: [state] Locking ICCM
20,405,547 UART: [exit] Launching FMC @ 0x40000130
20,414,241 UART:
20,414,481 UART: Running Caliptra FMC ...
20,415,588 UART:
20,415,748 UART: [state] CFI Enabled
20,423,800 UART: [fht] FMC Alias Private Key: 7
22,190,159 UART: [art] Extend RT PCRs Done
22,191,402 UART: [art] Lock RT PCRs Done
22,193,033 UART: [art] Populate DV Done
22,198,484 UART: [fht] FMC Alias Private Key: 7
22,200,143 UART: [art] Derive CDI
22,200,960 UART: [art] Store in slot 0x4
22,243,557 UART: [art] Derive Key Pair
22,244,564 UART: [art] Store priv key in slot 0x5
24,671,282 UART: [art] Derive Key Pair - Done
24,684,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,390,401 UART: [art] Erasing AUTHORITY.KEYID = 7
26,391,912 UART: [art] PUB.X = 215A74E1070C4EB96D609530BBF2811BB82BDA1C8969E6F5DDA2C899C5C5D5E26E8EDCEB62B37A5B8E419B7CECF7BB95
26,399,194 UART: [art] PUB.Y = 1A65AF972F7EDFCCC48F17517E12EF4A66EBAC7AC6ADCF6AA0BD33CCFA32D0489F6E6A617FE425DF4F98964753D51F23
26,406,509 UART: [art] SIG.R = DC28577B75C0F3D4D97BA4008E2042623555C4963AC9CD528EC788BB49DE8C3F6B6777B71371B459153F5708CD39FD13
26,413,825 UART: [art] SIG.S = CF176AD16D2E7448AB41F2F1A71186D2DFE7DEB08DE8C2A92AEFF9B3CE241C03318EAC8A157666A74B51BF0B1F95EA0F
27,392,549 UART: Caliptra RT
27,393,265 UART: [state] CFI Enabled
27,526,174 UART: [rt] RT listening for mailbox commands...
27,528,489 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,683,754 UART: [rt]cmd =0x41544d4e, len=14344
28,650,664 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
3,753,781 ready_for_fw is high
3,754,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,118,216 >>> mbox cmd response: success
20,372,258 UART:
20,372,648 UART: Running Caliptra FMC ...
20,373,859 UART:
20,374,043 UART: [state] CFI Enabled
20,381,970 UART: [fht] FMC Alias Private Key: 7
22,148,455 UART: [art] Extend RT PCRs Done
22,149,670 UART: [art] Lock RT PCRs Done
22,151,220 UART: [art] Populate DV Done
22,156,651 UART: [fht] FMC Alias Private Key: 7
22,158,144 UART: [art] Derive CDI
22,158,909 UART: [art] Store in slot 0x4
22,201,774 UART: [art] Derive Key Pair
22,202,783 UART: [art] Store priv key in slot 0x5
24,629,644 UART: [art] Derive Key Pair - Done
24,642,808 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,349,114 UART: [art] Erasing AUTHORITY.KEYID = 7
26,350,616 UART: [art] PUB.X = 6A825E6D9D6A453BE8F4E56A0D07906864BEBE85439D5543B32AE82E71886EFA84E6ED933F66B57568845616AAA2886D
26,357,835 UART: [art] PUB.Y = 037013A97B8553D2D214850A9A85287015F24806EF971FB8FCD7626814D32E4C923E8736D5CFAAD556E57F638C6F3023
26,365,108 UART: [art] SIG.R = 7818444B4DA276BC1001FE47DD06E4BA26F21664DF284345ABA34A8C59AB1DB67CD97EDCC95AFAB69284DCA71134AF8E
26,372,477 UART: [art] SIG.S = 7A6EE8FB33861B7FF11C0926236F2E675D1303C9B4F721666823FD2F2B6C7ECF0E8D0BE54C0E645E0EE6365406740521
27,351,780 UART: Caliptra RT
27,352,498 UART: [state] CFI Enabled
27,485,504 UART: [rt] RT listening for mailbox commands...
27,487,821 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,643,580 UART: [rt]cmd =0x41544d4e, len=14344
28,610,718 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.75s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,005 UART: [kat] SHA2-256
881,936 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,051 UART: [kat] ++
886,203 UART: [kat] sha1
890,393 UART: [kat] SHA2-256
892,331 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,379 UART: [cold-reset] ++
1,476,787 UART: [fht] Storing FHT @ 0x50003400
1,479,528 UART: [idev] ++
1,479,696 UART: [idev] CDI.KEYID = 6
1,480,056 UART: [idev] SUBJECT.KEYID = 7
1,480,480 UART: [idev] UDS.KEYID = 0
1,480,825 ready_for_fw is high
1,480,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,184 UART: [idev] Erasing UDS.KEYID = 0
1,504,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,580 UART: [idev] --
1,514,669 UART: [ldev] ++
1,514,837 UART: [ldev] CDI.KEYID = 6
1,515,200 UART: [ldev] SUBJECT.KEYID = 5
1,515,626 UART: [ldev] AUTHORITY.KEYID = 7
1,516,089 UART: [ldev] FE.KEYID = 1
1,521,277 UART: [ldev] Erasing FE.KEYID = 1
1,546,422 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,478 UART: [ldev] --
1,585,871 UART: [fwproc] Waiting for Commands...
1,586,668 UART: [fwproc] Received command 0x46574c44
1,587,459 UART: [fwproc] Received Image of size 118548 bytes
5,281,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,309,621 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,340,839 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,481,222 >>> mbox cmd response: success
5,482,482 UART: [afmc] ++
5,482,650 UART: [afmc] CDI.KEYID = 6
5,483,012 UART: [afmc] SUBJECT.KEYID = 7
5,483,437 UART: [afmc] AUTHORITY.KEYID = 5
5,518,934 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,535,200 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,535,980 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,541,686 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,547,565 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,553,278 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,560,949 UART: [afmc] --
5,562,039 UART: [cold-reset] --
5,562,843 UART: [state] Locking Datavault
5,564,034 UART: [state] Locking PCR0, PCR1 and PCR31
5,564,638 UART: [state] Locking ICCM
5,565,098 UART: [exit] Launching FMC @ 0x40000130
5,570,428 UART:
5,570,444 UART: Running Caliptra FMC ...
5,570,852 UART:
5,570,906 UART: [state] CFI Enabled
5,581,674 UART: [fht] FMC Alias Private Key: 7
5,700,136 UART: [art] Extend RT PCRs Done
5,700,564 UART: [art] Lock RT PCRs Done
5,702,224 UART: [art] Populate DV Done
5,710,285 UART: [fht] FMC Alias Private Key: 7
5,711,449 UART: [art] Derive CDI
5,711,729 UART: [art] Store in slot 0x4
5,797,171 UART: [art] Derive Key Pair
5,797,531 UART: [art] Store priv key in slot 0x5
5,810,602 UART: [art] Derive Key Pair - Done
5,825,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,840,646 UART: [art] Erasing AUTHORITY.KEYID = 7
5,841,411 UART: [art] PUB.X = 5CBD04B67D269E29E11E04CBA2085064E0A475163127B80613FF0E94FB6C0657EA5B6DFA1320FFB8FFC88C588CEF4841
5,848,173 UART: [art] PUB.Y = 625C64AF592F6C0EFE18581DDF5DA89C702EDEC1BB49FAB593C93A97A1C21950DC11B01EB008C10BFE1F49FFE7885145
5,855,132 UART: [art] SIG.R = 6D5EDC54243BB7C06E2EA925DC173A23336BF8CD62BCD6B075630434B1A51C5776E3EC8A6E6C63D5FE9CA89EEA0AFC45
5,861,916 UART: [art] SIG.S = F31476781D6DE56E57C57B1140139B68E528373EA3FEACFB85EE27ACA7704D82D3254D66DA44793D9BCE8C9E84AC49A4
5,886,064 UART: Caliptra RT
5,886,315 UART: [state] CFI Enabled
6,006,285 UART: [rt] RT listening for mailbox commands...
6,006,955 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,129,831 UART: [rt]cmd =0x41544d4e, len=14344
6,138,237 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,463 ready_for_fw is high
1,362,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,406,130 >>> mbox cmd response: success
5,467,233 UART:
5,467,249 UART: Running Caliptra FMC ...
5,467,657 UART:
5,467,711 UART: [state] CFI Enabled
5,477,977 UART: [fht] FMC Alias Private Key: 7
5,596,501 UART: [art] Extend RT PCRs Done
5,596,929 UART: [art] Lock RT PCRs Done
5,598,291 UART: [art] Populate DV Done
5,606,270 UART: [fht] FMC Alias Private Key: 7
5,607,344 UART: [art] Derive CDI
5,607,624 UART: [art] Store in slot 0x4
5,693,166 UART: [art] Derive Key Pair
5,693,526 UART: [art] Store priv key in slot 0x5
5,707,359 UART: [art] Derive Key Pair - Done
5,722,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,737,771 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,536 UART: [art] PUB.X = 6A5E40137EA4AB7E34B409ADDDDD0237B194749DF0FA5EA542C9A3EAEFD4EF7C91012AACA8A137639C062E22146EFD06
5,745,311 UART: [art] PUB.Y = DA0C1B0DC0D3402EACAF99ED71FCCF4B70F0095A57CAFB858A20A345A161515E35F0CE4C16A560C4D0AA3DBD4D40F7AF
5,752,280 UART: [art] SIG.R = EEF2AA2505A8ED17744BB9D0659095B3E8F3690148EFAD02BB4579373A13FDE6ABB984A18E79DA31B481F606756064D5
5,759,044 UART: [art] SIG.S = 28D2E15F789E3761E6CFA16DECC5483B767F17EDAC4D43B5EC9864978172AE9B83C7BE492C0F86E24CD3BFC5F1527BED
5,782,933 UART: Caliptra RT
5,783,184 UART: [state] CFI Enabled
5,903,074 UART: [rt] RT listening for mailbox commands...
5,903,744 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,026,708 UART: [rt]cmd =0x41544d4e, len=14344
6,035,486 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,868 UART: [kat] SHA2-256
892,806 UART: [kat] SHA2-384
895,437 UART: [kat] SHA2-512-ACC
897,338 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,477,252 UART: [cold-reset] ++
1,477,666 UART: [fht] Storing FHT @ 0x50003400
1,480,279 UART: [idev] ++
1,480,447 UART: [idev] CDI.KEYID = 6
1,480,807 UART: [idev] SUBJECT.KEYID = 7
1,481,231 UART: [idev] UDS.KEYID = 0
1,481,576 ready_for_fw is high
1,481,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,143 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,615 UART: [idev] --
1,515,530 UART: [ldev] ++
1,515,698 UART: [ldev] CDI.KEYID = 6
1,516,061 UART: [ldev] SUBJECT.KEYID = 5
1,516,487 UART: [ldev] AUTHORITY.KEYID = 7
1,516,950 UART: [ldev] FE.KEYID = 1
1,522,254 UART: [ldev] Erasing FE.KEYID = 1
1,547,345 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,533 UART: [ldev] --
1,586,948 UART: [fwproc] Waiting for Commands...
1,587,583 UART: [fwproc] Received command 0x46574c44
1,588,374 UART: [fwproc] Received Image of size 118548 bytes
4,979,996 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,008,530 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,039,748 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,180,103 >>> mbox cmd response: success
5,181,305 UART: [afmc] ++
5,181,473 UART: [afmc] CDI.KEYID = 6
5,181,835 UART: [afmc] SUBJECT.KEYID = 7
5,182,260 UART: [afmc] AUTHORITY.KEYID = 5
5,217,733 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,233,959 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,234,739 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,240,445 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,246,324 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,252,037 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,259,958 UART: [afmc] --
5,260,994 UART: [cold-reset] --
5,261,862 UART: [state] Locking Datavault
5,263,063 UART: [state] Locking PCR0, PCR1 and PCR31
5,263,667 UART: [state] Locking ICCM
5,264,257 UART: [exit] Launching FMC @ 0x40000130
5,269,587 UART:
5,269,603 UART: Running Caliptra FMC ...
5,270,011 UART:
5,270,154 UART: [state] CFI Enabled
5,280,822 UART: [fht] FMC Alias Private Key: 7
5,399,250 UART: [art] Extend RT PCRs Done
5,399,678 UART: [art] Lock RT PCRs Done
5,401,188 UART: [art] Populate DV Done
5,409,397 UART: [fht] FMC Alias Private Key: 7
5,410,363 UART: [art] Derive CDI
5,410,643 UART: [art] Store in slot 0x4
5,496,429 UART: [art] Derive Key Pair
5,496,789 UART: [art] Store priv key in slot 0x5
5,510,810 UART: [art] Derive Key Pair - Done
5,525,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,540,928 UART: [art] Erasing AUTHORITY.KEYID = 7
5,541,693 UART: [art] PUB.X = 2E2BA4E130F1ECF404CAAC343D560810C29C1BF64FB7A533DE46A2FAB67E3F24F21C8DDA32D3CD6A72B01A65E109D221
5,548,474 UART: [art] PUB.Y = 07BD8C813762DE1623A5DF0CDA9C54A8C90358D372995D2E1B5E3047CA55BD83E3F95001C47253BD74A59AD5062E8C0D
5,555,412 UART: [art] SIG.R = 5EAF78EEF792D4872F7908F6CF9A9B8B290554E7A116D1906AA4D26AD1F69F64C05AFDBCFBFDB5796B0153DF78E44F93
5,562,191 UART: [art] SIG.S = 0FBD292404345B43521CEEF28647DE994DE8A925D09F0E05259D7FCA7AFF02C5B1AC7457AF5717CD5A3ABF8CCAF091EB
5,586,058 UART: Caliptra RT
5,586,401 UART: [state] CFI Enabled
5,707,202 UART: [rt] RT listening for mailbox commands...
5,707,872 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,830,936 UART: [rt]cmd =0x41544d4e, len=14344
5,839,630 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,746 ready_for_fw is high
1,362,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,255,003 >>> mbox cmd response: success
5,316,072 UART:
5,316,088 UART: Running Caliptra FMC ...
5,316,496 UART:
5,316,639 UART: [state] CFI Enabled
5,327,339 UART: [fht] FMC Alias Private Key: 7
5,447,089 UART: [art] Extend RT PCRs Done
5,447,517 UART: [art] Lock RT PCRs Done
5,449,255 UART: [art] Populate DV Done
5,457,552 UART: [fht] FMC Alias Private Key: 7
5,458,724 UART: [art] Derive CDI
5,459,004 UART: [art] Store in slot 0x4
5,544,420 UART: [art] Derive Key Pair
5,544,780 UART: [art] Store priv key in slot 0x5
5,558,643 UART: [art] Derive Key Pair - Done
5,573,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,589,279 UART: [art] Erasing AUTHORITY.KEYID = 7
5,590,044 UART: [art] PUB.X = 3EC0E3370359AB3B302E7DADAB00B5F385C12BEB4D1F108DC8CA0D7C114F3A10972CF4E613B12BCD7C82E32FA4E9C17F
5,596,808 UART: [art] PUB.Y = 8E14B002F3D7E7E2462AB86A2E5A7D05433B76E3F9E6587D753A75731C1D0E937F751EEB8999F2338505F5A092A844FF
5,603,746 UART: [art] SIG.R = 80A0C7135BA52DE2831C36B0CD0FDFA1C8C2836C5CC05B2EFECB19728AF68C7867DE171EA76D6AD0D455C9AC40ECB481
5,610,535 UART: [art] SIG.S = D005E3DFB513FFA5C188F3D6BAA30ABC08107620429D023CA82EF1A91444DE8E01C50AAF928122F0707B0655BC0F174D
5,633,639 UART: Caliptra RT
5,633,982 UART: [state] CFI Enabled
5,753,501 UART: [rt] RT listening for mailbox commands...
5,754,171 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,877,077 UART: [rt]cmd =0x41544d4e, len=14344
5,885,357 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.71s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,881 UART: [state] WD Timer not started. Device not locked for debugging
88,156 UART: [kat] SHA2-256
891,706 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,810 UART: [kat] ++
895,962 UART: [kat] sha1
900,208 UART: [kat] SHA2-256
902,148 UART: [kat] SHA2-384
905,017 UART: [kat] SHA2-512-ACC
906,918 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,879 UART: [kat] LMS
1,169,191 UART: [kat] --
1,169,946 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,172,766 UART: [idev] ++
1,172,934 UART: [idev] CDI.KEYID = 6
1,173,295 UART: [idev] SUBJECT.KEYID = 7
1,173,720 UART: [idev] UDS.KEYID = 0
1,174,066 ready_for_fw is high
1,174,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,961 UART: [idev] Erasing UDS.KEYID = 0
1,199,047 UART: [idev] Sha1 KeyId Algorithm
1,207,929 UART: [idev] --
1,208,958 UART: [ldev] ++
1,209,126 UART: [ldev] CDI.KEYID = 6
1,209,490 UART: [ldev] SUBJECT.KEYID = 5
1,209,917 UART: [ldev] AUTHORITY.KEYID = 7
1,210,380 UART: [ldev] FE.KEYID = 1
1,215,696 UART: [ldev] Erasing FE.KEYID = 1
1,241,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,016 UART: [ldev] --
1,280,461 UART: [fwproc] Wait for Commands...
1,281,084 UART: [fwproc] Recv command 0x46574c44
1,281,817 UART: [fwproc] Recv'd Img size: 118548 bytes
3,168,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,196,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,227,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,368,171 >>> mbox cmd response: success
3,369,185 UART: [afmc] ++
3,369,353 UART: [afmc] CDI.KEYID = 6
3,369,716 UART: [afmc] SUBJECT.KEYID = 7
3,370,142 UART: [afmc] AUTHORITY.KEYID = 5
3,405,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,422,279 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,986 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,863 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,573 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,447,277 UART: [afmc] --
3,448,272 UART: [cold-reset] --
3,449,108 UART: [state] Locking Datavault
3,450,307 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,911 UART: [state] Locking ICCM
3,451,525 UART: [exit] Launching FMC @ 0x40000130
3,456,855 UART:
3,456,871 UART: Running Caliptra FMC ...
3,457,279 UART:
3,457,333 UART: [state] CFI Enabled
3,467,633 UART: [fht] FMC Alias Private Key: 7
3,586,457 UART: [art] Extend RT PCRs Done
3,586,885 UART: [art] Lock RT PCRs Done
3,588,415 UART: [art] Populate DV Done
3,596,630 UART: [fht] FMC Alias Private Key: 7
3,597,746 UART: [art] Derive CDI
3,598,026 UART: [art] Store in slot 0x4
3,683,529 UART: [art] Derive Key Pair
3,683,889 UART: [art] Store priv key in slot 0x5
3,697,397 UART: [art] Derive Key Pair - Done
3,712,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,727,445 UART: [art] Erasing AUTHORITY.KEYID = 7
3,728,210 UART: [art] PUB.X = 9F15147A637493346AE945B004304CD92CD284DBE7D8A163ACB183F2D787C102DF80CE4D8198EA75FC9BF19C8B119CB3
3,734,982 UART: [art] PUB.Y = E8ACED96779E44106CEC5EAB8945F5F56D853C2C98F5CBD44E1006D2335826713082E14EA36E9752EB617CC121D43975
3,741,931 UART: [art] SIG.R = E87CEC0FCBBC1B39C0F42EB140F36A2C89BF8864BA5C91DFFA5C00F3A7C472ECF01B3DDF46CCD4124FE45F9630991468
3,748,700 UART: [art] SIG.S = 97414B68EF8E597E5D65D39B7DAF285FF857E02818729BDE538E1ADD4B3EF070B6772160C83E99EA9F9C4ADC02F29C9A
3,772,665 UART: Caliptra RT
3,772,916 UART: [state] CFI Enabled
3,892,601 UART: [rt] RT listening for mailbox commands...
3,893,271 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,551 UART: [rt]cmd =0x41544d4e, len=14344
4,025,153 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,556 ready_for_fw is high
1,059,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,175 >>> mbox cmd response: success
3,279,464 UART:
3,279,480 UART: Running Caliptra FMC ...
3,279,888 UART:
3,279,942 UART: [state] CFI Enabled
3,290,538 UART: [fht] FMC Alias Private Key: 7
3,409,682 UART: [art] Extend RT PCRs Done
3,410,110 UART: [art] Lock RT PCRs Done
3,411,402 UART: [art] Populate DV Done
3,419,663 UART: [fht] FMC Alias Private Key: 7
3,420,601 UART: [art] Derive CDI
3,420,881 UART: [art] Store in slot 0x4
3,506,486 UART: [art] Derive Key Pair
3,506,846 UART: [art] Store priv key in slot 0x5
3,520,198 UART: [art] Derive Key Pair - Done
3,534,660 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,315 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,080 UART: [art] PUB.X = 485D9440BFF8F224784F2C3362FC0D47B278A5090EA56C4FBAE9B8B5C25C4B35CDAE8785D7E900B4E9AA85DBDDA3DEC5
3,557,841 UART: [art] PUB.Y = 6A935D3057A2D482D111BFFE632514BC0818F1553D8D69CA4C4A784853DDFEA71A3ACDA274E84C80C0246593D86EB80E
3,564,793 UART: [art] SIG.R = 2EEEBEA7F701F4B95957C6D4990FB521EF1C7765ACF27E17AE67EE4A1C517021D6C1E8D773F74FB8429190EA7B1F16D5
3,571,571 UART: [art] SIG.S = EEE3E35EFA9723E130D684339A4448A96EC486950FAA6D65158E44C489BA144AC3B5BDD265B4C762E501532CB948A0A0
3,594,397 UART: Caliptra RT
3,594,648 UART: [state] CFI Enabled
3,715,824 UART: [rt] RT listening for mailbox commands...
3,716,494 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,496 UART: [rt]cmd =0x41544d4e, len=14344
3,847,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,660 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,324 UART: [kat] SHA2-512-ACC
906,225 UART: [kat] ECC-384
915,972 UART: [kat] HMAC-384Kdf
920,472 UART: [kat] LMS
1,168,784 UART: [kat] --
1,169,467 UART: [cold-reset] ++
1,170,005 UART: [fht] FHT @ 0x50003400
1,172,727 UART: [idev] ++
1,172,895 UART: [idev] CDI.KEYID = 6
1,173,256 UART: [idev] SUBJECT.KEYID = 7
1,173,681 UART: [idev] UDS.KEYID = 0
1,174,027 ready_for_fw is high
1,174,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,468 UART: [idev] Erasing UDS.KEYID = 0
1,198,394 UART: [idev] Sha1 KeyId Algorithm
1,207,294 UART: [idev] --
1,208,341 UART: [ldev] ++
1,208,509 UART: [ldev] CDI.KEYID = 6
1,208,873 UART: [ldev] SUBJECT.KEYID = 5
1,209,300 UART: [ldev] AUTHORITY.KEYID = 7
1,209,763 UART: [ldev] FE.KEYID = 1
1,215,023 UART: [ldev] Erasing FE.KEYID = 1
1,241,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,617 UART: [ldev] --
1,281,002 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,478 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,952 >>> mbox cmd response: success
3,379,162 UART: [afmc] ++
3,379,330 UART: [afmc] CDI.KEYID = 6
3,379,693 UART: [afmc] SUBJECT.KEYID = 7
3,380,119 UART: [afmc] AUTHORITY.KEYID = 5
3,415,538 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,432,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,433,276 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,983 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,860 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,450,570 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,458,344 UART: [afmc] --
3,459,265 UART: [cold-reset] --
3,459,785 UART: [state] Locking Datavault
3,461,066 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,670 UART: [state] Locking ICCM
3,462,232 UART: [exit] Launching FMC @ 0x40000130
3,467,562 UART:
3,467,578 UART: Running Caliptra FMC ...
3,467,986 UART:
3,468,129 UART: [state] CFI Enabled
3,478,673 UART: [fht] FMC Alias Private Key: 7
3,597,247 UART: [art] Extend RT PCRs Done
3,597,675 UART: [art] Lock RT PCRs Done
3,599,161 UART: [art] Populate DV Done
3,607,370 UART: [fht] FMC Alias Private Key: 7
3,608,530 UART: [art] Derive CDI
3,608,810 UART: [art] Store in slot 0x4
3,694,223 UART: [art] Derive Key Pair
3,694,583 UART: [art] Store priv key in slot 0x5
3,708,221 UART: [art] Derive Key Pair - Done
3,723,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,738,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,190 UART: [art] PUB.X = 2A24A7AD4D0A933C0F289176761CEDAB3124080CCDAC07E9C8DE5A19EECA085995BB4386B69D380B56DCB817C116BA4D
3,745,955 UART: [art] PUB.Y = 5E05520D6827B254D52E794483D24CF44C9156ED03DD6D875A3D4ABE536A353EF57D8C04BCE61EC763C8837C0BFDCA4B
3,752,902 UART: [art] SIG.R = 5DEBB37E2FA1CCF395EB7C824D3D86B2A8C414CCD648F61EED7A22787E6292C9462BD22F72619B2B4257520AC610ED3E
3,759,683 UART: [art] SIG.S = 900D652DC44635AA70F1DEB8869EDB66AB9F8D7EF1CB2EA450863282CC6207BF896B67F0BF6250F07729468522F548BA
3,783,763 UART: Caliptra RT
3,784,106 UART: [state] CFI Enabled
3,903,294 UART: [rt] RT listening for mailbox commands...
3,903,964 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,026,860 UART: [rt]cmd =0x41544d4e, len=14344
4,035,416 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,249 ready_for_fw is high
1,059,249 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,225,677 >>> mbox cmd response: success
3,287,620 UART:
3,287,636 UART: Running Caliptra FMC ...
3,288,044 UART:
3,288,187 UART: [state] CFI Enabled
3,298,705 UART: [fht] FMC Alias Private Key: 7
3,417,751 UART: [art] Extend RT PCRs Done
3,418,179 UART: [art] Lock RT PCRs Done
3,419,589 UART: [art] Populate DV Done
3,427,604 UART: [fht] FMC Alias Private Key: 7
3,428,630 UART: [art] Derive CDI
3,428,910 UART: [art] Store in slot 0x4
3,514,521 UART: [art] Derive Key Pair
3,514,881 UART: [art] Store priv key in slot 0x5
3,528,405 UART: [art] Derive Key Pair - Done
3,543,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,652 UART: [art] PUB.X = A7FB1776C361061A23091BBDC7FA2A4AC65E986AD270BDDEFA17D66F41147CACD5A53EB229C609441E07B5F33926124C
3,566,422 UART: [art] PUB.Y = 1A9F5B9886C55BB0E9B49FCB6DDFA2965003587640F28B2DA2BD24F26F4154BDFE6919ECBDF3A7A4502F6520CDB053A8
3,573,385 UART: [art] SIG.R = 0131D150939F4E2276B6964D4D7B01174E15D709A2758B0ED56F2C6AB2588E4B9162144AA4676E9D9BB8A79FA3B14FA6
3,580,143 UART: [art] SIG.S = C81E848E181A28C57A43607E2F95DE1F8FFF3AE6717B6F384483610C65142E8F15A0B08DA8E25FE56690EB85AFF962A0
3,603,782 UART: Caliptra RT
3,604,125 UART: [state] CFI Enabled
3,723,915 UART: [rt] RT listening for mailbox commands...
3,724,585 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,691 UART: [rt]cmd =0x41544d4e, len=14344
3,855,969 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,774 UART: [kat] SHA2-256
893,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,549 UART: [kat] ++
897,701 UART: [kat] sha1
902,107 UART: [kat] SHA2-256
904,047 UART: [kat] SHA2-384
906,822 UART: [kat] SHA2-512-ACC
908,723 UART: [kat] ECC-384
917,952 UART: [kat] HMAC-384Kdf
922,646 UART: [kat] LMS
1,170,974 UART: [kat] --
1,171,787 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,782 UART: [idev] ++
1,174,950 UART: [idev] CDI.KEYID = 6
1,175,310 UART: [idev] SUBJECT.KEYID = 7
1,175,734 UART: [idev] UDS.KEYID = 0
1,176,079 ready_for_fw is high
1,176,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,704 UART: [idev] Erasing UDS.KEYID = 0
1,200,975 UART: [idev] Sha1 KeyId Algorithm
1,209,477 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,089 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,961 UART: [ldev] --
1,282,404 UART: [fwproc] Wait for Commands...
1,283,130 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 118548 bytes
3,164,135 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,192,728 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,223,898 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,364,229 >>> mbox cmd response: success
3,365,433 UART: [afmc] ++
3,365,601 UART: [afmc] CDI.KEYID = 6
3,365,963 UART: [afmc] SUBJECT.KEYID = 7
3,366,388 UART: [afmc] AUTHORITY.KEYID = 5
3,401,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,592 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,298 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,177 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,887 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,828 UART: [afmc] --
3,444,886 UART: [cold-reset] --
3,445,782 UART: [state] Locking Datavault
3,446,859 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,463 UART: [state] Locking ICCM
3,447,933 UART: [exit] Launching FMC @ 0x40000130
3,453,263 UART:
3,453,279 UART: Running Caliptra FMC ...
3,453,687 UART:
3,453,741 UART: [state] CFI Enabled
3,464,455 UART: [fht] FMC Alias Private Key: 7
3,584,069 UART: [art] Extend RT PCRs Done
3,584,497 UART: [art] Lock RT PCRs Done
3,585,967 UART: [art] Populate DV Done
3,594,322 UART: [fht] FMC Alias Private Key: 7
3,595,428 UART: [art] Derive CDI
3,595,708 UART: [art] Store in slot 0x4
3,681,445 UART: [art] Derive Key Pair
3,681,805 UART: [art] Store priv key in slot 0x5
3,694,871 UART: [art] Derive Key Pair - Done
3,709,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,725,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,726,078 UART: [art] PUB.X = ADC0A8F2887943A71AAEB6D5DDF5841A2449F6216DA959E83B8909202E24893FB7B75535DE1CCFE1BD1B3CD61FB6A6F3
3,732,861 UART: [art] PUB.Y = 333A565E57DD338B98C874A962DBF684250807041CF2EB3A628C76BB8FCEC0473A9DDC9D3FBCC6B3B8A3AB2FA56AA2E6
3,739,822 UART: [art] SIG.R = 27C60D2C7F06624473B82B643666697B5033357302A72AA9DDBE33736D9D2298CA1CB1F8F60E69E51E43481F7594947A
3,746,572 UART: [art] SIG.S = 8CDB5B80C6A620B59E7E2992E547E57D806C7E5D1B6E5BEA5A59D2CA20173104F61CA2E495D8162AD1439AEB6463639C
3,770,297 UART: Caliptra RT
3,770,548 UART: [state] CFI Enabled
3,889,738 UART: [rt] RT listening for mailbox commands...
3,890,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,336 UART: [rt]cmd =0x41544d4e, len=14344
4,021,748 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 ready_for_fw is high
1,060,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,612 >>> mbox cmd response: success
3,286,361 UART:
3,286,377 UART: Running Caliptra FMC ...
3,286,785 UART:
3,286,839 UART: [state] CFI Enabled
3,297,279 UART: [fht] FMC Alias Private Key: 7
3,416,239 UART: [art] Extend RT PCRs Done
3,416,667 UART: [art] Lock RT PCRs Done
3,418,177 UART: [art] Populate DV Done
3,426,380 UART: [fht] FMC Alias Private Key: 7
3,427,522 UART: [art] Derive CDI
3,427,802 UART: [art] Store in slot 0x4
3,513,707 UART: [art] Derive Key Pair
3,514,067 UART: [art] Store priv key in slot 0x5
3,527,179 UART: [art] Derive Key Pair - Done
3,541,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,557,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,558,042 UART: [art] PUB.X = C6CFD112C4A1413F3F3C233F62E7F009127AFD83EE9652F3D21BE6E185CED02CA0FAC4FECFE88176FBBBAAC3F77F0735
3,564,832 UART: [art] PUB.Y = C78C15BACEDD31443514C1C98E5F9AB0BF8B9D7335194945136249E0BB03AB732D0AF3EBDEEFDEC60CB8A6DF9C2436A5
3,571,795 UART: [art] SIG.R = D2FF465AECFA8996F7935A8BA15B6E1610607EDF38A194A7413C02940A941D7C022C5D29864C938DC113A38216F51D18
3,578,556 UART: [art] SIG.S = DF3FCFE8CBD2F9F87292AC1811B0C6B3DFE8463F7A5110F1ABB9FCCD6B48B694D07AB0F5F5017D0263E532EFF7D55AB9
3,602,722 UART: Caliptra RT
3,602,973 UART: [state] CFI Enabled
3,723,512 UART: [rt] RT listening for mailbox commands...
3,724,182 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,462 UART: [rt]cmd =0x41544d4e, len=14344
3,855,816 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,075 UART: [kat] SHA2-256
893,725 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,850 UART: [kat] ++
898,002 UART: [kat] sha1
902,104 UART: [kat] SHA2-256
904,044 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,561 UART: [kat] HMAC-384Kdf
923,213 UART: [kat] LMS
1,171,541 UART: [kat] --
1,172,518 UART: [cold-reset] ++
1,173,034 UART: [fht] FHT @ 0x50003400
1,175,531 UART: [idev] ++
1,175,699 UART: [idev] CDI.KEYID = 6
1,176,059 UART: [idev] SUBJECT.KEYID = 7
1,176,483 UART: [idev] UDS.KEYID = 0
1,176,828 ready_for_fw is high
1,176,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,202,184 UART: [idev] Sha1 KeyId Algorithm
1,210,710 UART: [idev] --
1,211,758 UART: [ldev] ++
1,211,926 UART: [ldev] CDI.KEYID = 6
1,212,289 UART: [ldev] SUBJECT.KEYID = 5
1,212,715 UART: [ldev] AUTHORITY.KEYID = 7
1,213,178 UART: [ldev] FE.KEYID = 1
1,218,230 UART: [ldev] Erasing FE.KEYID = 1
1,244,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,502 UART: [ldev] --
1,283,775 UART: [fwproc] Wait for Commands...
1,284,559 UART: [fwproc] Recv command 0x46574c44
1,285,287 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,604 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,206,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,757 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,378,084 >>> mbox cmd response: success
3,379,270 UART: [afmc] ++
3,379,438 UART: [afmc] CDI.KEYID = 6
3,379,800 UART: [afmc] SUBJECT.KEYID = 7
3,380,225 UART: [afmc] AUTHORITY.KEYID = 5
3,415,326 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,889 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,637 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,438,343 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,444,222 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,932 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,687 UART: [afmc] --
3,458,655 UART: [cold-reset] --
3,459,427 UART: [state] Locking Datavault
3,460,532 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,136 UART: [state] Locking ICCM
3,461,744 UART: [exit] Launching FMC @ 0x40000130
3,467,074 UART:
3,467,090 UART: Running Caliptra FMC ...
3,467,498 UART:
3,467,641 UART: [state] CFI Enabled
3,478,287 UART: [fht] FMC Alias Private Key: 7
3,597,355 UART: [art] Extend RT PCRs Done
3,597,783 UART: [art] Lock RT PCRs Done
3,599,229 UART: [art] Populate DV Done
3,607,616 UART: [fht] FMC Alias Private Key: 7
3,608,782 UART: [art] Derive CDI
3,609,062 UART: [art] Store in slot 0x4
3,694,889 UART: [art] Derive Key Pair
3,695,249 UART: [art] Store priv key in slot 0x5
3,708,761 UART: [art] Derive Key Pair - Done
3,723,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,739,010 UART: [art] Erasing AUTHORITY.KEYID = 7
3,739,775 UART: [art] PUB.X = 800CE6F8EBA056D0A3557288809442F1A635FA047572918EF50CC5C3F6EB463CBD6655CA3AC05859F9942220670C9253
3,746,529 UART: [art] PUB.Y = 460D64EDCA626EAC22529FBA678B8FE601F0CFFE4A66101BBFA2630E933E11945CD6C1261C0D51D6D91A91B039312D55
3,753,477 UART: [art] SIG.R = FF9BB2C5F6A722AFD263B248B31231EBB321F7094337343B049F19A87BED6AF9808CB685D7D1D7CC57BEE426879082AC
3,760,251 UART: [art] SIG.S = 2F19904164CF3281EF24CC10FFCAF25B3D5EE5D48E5372482826B04E7B8E914DAD14FE0EEA666B64DBAA8A12690744C3
3,784,257 UART: Caliptra RT
3,784,600 UART: [state] CFI Enabled
3,903,408 UART: [rt] RT listening for mailbox commands...
3,904,078 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,038 UART: [rt]cmd =0x41544d4e, len=14344
4,035,964 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,048 ready_for_fw is high
1,060,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,130 >>> mbox cmd response: success
3,281,169 UART:
3,281,185 UART: Running Caliptra FMC ...
3,281,593 UART:
3,281,736 UART: [state] CFI Enabled
3,292,488 UART: [fht] FMC Alias Private Key: 7
3,411,762 UART: [art] Extend RT PCRs Done
3,412,190 UART: [art] Lock RT PCRs Done
3,414,218 UART: [art] Populate DV Done
3,422,335 UART: [fht] FMC Alias Private Key: 7
3,423,381 UART: [art] Derive CDI
3,423,661 UART: [art] Store in slot 0x4
3,509,762 UART: [art] Derive Key Pair
3,510,122 UART: [art] Store priv key in slot 0x5
3,523,546 UART: [art] Derive Key Pair - Done
3,538,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,553,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,554,078 UART: [art] PUB.X = 8FC4F1DC556BDAAECF84C180961A005A1472C1F328E054D11CA3A4C0E11C3E9AA4F14EA923324DA97E0B2AAA28243B22
3,560,839 UART: [art] PUB.Y = E6220EC85535727C97EECA681C820646F835AACBE671C741E8C927BD093ADB6FEB2BD2BAC37260AA8125E351BBF1551E
3,567,794 UART: [art] SIG.R = ED1264FACD3A0645E7D7848C4227C71C32B5B548E8506655597949F7BFDE3A501C419ADB9177076B7032019BE10829B3
3,574,548 UART: [art] SIG.S = F06133FC9BB9544F71DD00A85D8F2CBAA6A3273E435E793263307A8FE3E5078BE70161EC948EC58CB67E63FCBB1F6DCD
3,598,566 UART: Caliptra RT
3,598,909 UART: [state] CFI Enabled
3,719,168 UART: [rt] RT listening for mailbox commands...
3,719,838 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,842,664 UART: [rt]cmd =0x41544d4e, len=14344
3,851,468 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,065 UART:
192,437 UART: Running Caliptra ROM ...
193,544 UART:
193,690 UART: [state] CFI Enabled
263,584 UART: [state] LifecycleState = Unprovisioned
265,500 UART: [state] DebugLocked = No
268,397 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,046 UART: [kat] SHA2-256
442,717 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,243 UART: [kat] ++
453,781 UART: [kat] sha1
465,085 UART: [kat] SHA2-256
467,735 UART: [kat] SHA2-384
472,805 UART: [kat] SHA2-512-ACC
475,172 UART: [kat] ECC-384
2,768,328 UART: [kat] HMAC-384Kdf
2,799,451 UART: [kat] LMS
3,989,773 UART: [kat] --
3,993,666 UART: [cold-reset] ++
3,995,603 UART: [fht] Storing FHT @ 0x50003400
4,006,864 UART: [idev] ++
4,007,431 UART: [idev] CDI.KEYID = 6
4,008,410 UART: [idev] SUBJECT.KEYID = 7
4,009,586 UART: [idev] UDS.KEYID = 0
4,010,563 ready_for_fw is high
4,010,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,844 UART: [idev] Erasing UDS.KEYID = 0
7,347,604 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,569 UART: [idev] --
7,373,667 UART: [ldev] ++
7,374,234 UART: [ldev] CDI.KEYID = 6
7,375,204 UART: [ldev] SUBJECT.KEYID = 5
7,376,458 UART: [ldev] AUTHORITY.KEYID = 7
7,377,896 UART: [ldev] FE.KEYID = 1
7,422,228 UART: [ldev] Erasing FE.KEYID = 1
10,754,478 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,138 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,336 UART: [ldev] --
13,115,353 UART: [fwproc] Waiting for Commands...
13,118,695 UART: [fwproc] Received command 0x46574c44
13,120,932 UART: [fwproc] Received Image of size 118548 bytes
17,225,826 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,304,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,377,526 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,706,799 >>> mbox cmd response: success
17,710,339 UART: [afmc] ++
17,710,956 UART: [afmc] CDI.KEYID = 6
17,711,873 UART: [afmc] SUBJECT.KEYID = 7
17,713,092 UART: [afmc] AUTHORITY.KEYID = 5
21,072,097 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,072 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,360 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,813 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,496 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,903 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,279 UART: [afmc] --
23,445,362 UART: [cold-reset] --
23,449,220 UART: [state] Locking Datavault
23,454,844 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,602 UART: [state] Locking ICCM
23,458,239 UART: [exit] Launching FMC @ 0x40000130
23,466,669 UART:
23,466,905 UART: Running Caliptra FMC ...
23,468,008 UART:
23,468,178 UART: [state] CFI Enabled
23,534,056 UART: [fht] FMC Alias Private Key: 7
25,874,334 UART: [art] Extend RT PCRs Done
25,875,568 UART: [art] Lock RT PCRs Done
25,876,871 UART: [art] Populate DV Done
25,882,340 UART: [fht] FMC Alias Private Key: 7
25,883,985 UART: [art] Derive CDI
25,884,800 UART: [art] Store in slot 0x4
25,943,159 UART: [art] Derive Key Pair
25,944,200 UART: [art] Store priv key in slot 0x5
29,237,164 UART: [art] Derive Key Pair - Done
29,250,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,586 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,088 UART: [art] PUB.X = A6194F636A4709D8F7681CD474F37C0792A0E85093A6DF2184828CB2CE25CDB75C87640421EC71454018B6B6AAC6586F
31,547,328 UART: [art] PUB.Y = 5E9EB6A32FD9CD34921B1E50553B81BA965AB5C7771D7BEDCD0340AA4C61E68919367E171D2163333563A1494864BC1F
31,554,550 UART: [art] SIG.R = 0EEF754D0DA3D43DF1851AC4782984B8A37C1C558FE8DCDEB9C789B1F0389E6CBB9C491C3EB607BD724A21151C74A5D7
31,561,992 UART: [art] SIG.S = 1B335BF87DF63D585E818D538AE7F14A8D47A1E78C86D8E9F42809832D199FB901A2861493D34D61FD2EA9FC22689193
32,867,448 UART: Caliptra RT
32,868,158 UART: [state] CFI Enabled
33,065,249 UART: [rt] RT listening for mailbox commands...
33,067,590 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,222,731 UART: [rt]cmd =0x41544d4e, len=14344
38,523,407 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,933 writing to cptra_bootfsm_go
3,785,115 ready_for_fw is high
3,785,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,115 >>> mbox cmd response: success
23,654,139 UART:
23,654,525 UART: Running Caliptra FMC ...
23,655,638 UART:
23,655,792 UART: [state] CFI Enabled
23,721,581 UART: [fht] FMC Alias Private Key: 7
26,061,229 UART: [art] Extend RT PCRs Done
26,062,465 UART: [art] Lock RT PCRs Done
26,064,232 UART: [art] Populate DV Done
26,069,764 UART: [fht] FMC Alias Private Key: 7
26,071,421 UART: [art] Derive CDI
26,072,168 UART: [art] Store in slot 0x4
26,129,229 UART: [art] Derive Key Pair
26,130,275 UART: [art] Store priv key in slot 0x5
29,422,797 UART: [art] Derive Key Pair - Done
29,435,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,204 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,286 UART: [art] PUB.X = CCC7661378AE4BCE6C1C65CF0153F7EA74E8411DD4B7DCAC87233CF3A364B08C530BB68FCF6D34F1B7E4D479561C0C63
31,730,063 UART: [art] PUB.Y = 6B85AD435952808635DD8433727C27570DDAAAE657F33C0D1A5E826EC63239743D038695A46ED868E849C43826A79D5E
31,737,280 UART: [art] SIG.R = 64747D9556DBDA354748D2453E73B2E22AEE3557B93F4479AE7242F606E319B2B96090A2DF1879451CC42CB3AB17CDAC
31,744,631 UART: [art] SIG.S = 39944A0589850EF8455B807E733A6B5D73951ABAD81A8A00AB33087FF2AC8960324F639E48C423696F28E734AE601456
33,049,586 UART: Caliptra RT
33,050,793 UART: [state] CFI Enabled
33,241,977 UART: [rt] RT listening for mailbox commands...
33,244,319 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,399,446 UART: [rt]cmd =0x41544d4e, len=14344
38,700,303 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,365 UART:
192,724 UART: Running Caliptra ROM ...
193,820 UART:
603,608 UART: [state] CFI Enabled
620,183 UART: [state] LifecycleState = Unprovisioned
622,117 UART: [state] DebugLocked = No
623,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,845 UART: [kat] SHA2-256
797,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,192 UART: [kat] ++
808,649 UART: [kat] sha1
819,042 UART: [kat] SHA2-256
821,776 UART: [kat] SHA2-384
828,893 UART: [kat] SHA2-512-ACC
831,255 UART: [kat] ECC-384
3,115,697 UART: [kat] HMAC-384Kdf
3,127,305 UART: [kat] LMS
4,317,373 UART: [kat] --
4,323,667 UART: [cold-reset] ++
4,325,122 UART: [fht] Storing FHT @ 0x50003400
4,337,221 UART: [idev] ++
4,337,801 UART: [idev] CDI.KEYID = 6
4,338,751 UART: [idev] SUBJECT.KEYID = 7
4,339,993 UART: [idev] UDS.KEYID = 0
4,340,979 ready_for_fw is high
4,341,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,121 UART: [idev] Erasing UDS.KEYID = 0
7,626,315 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,874 UART: [idev] --
7,651,290 UART: [ldev] ++
7,651,862 UART: [ldev] CDI.KEYID = 6
7,652,827 UART: [ldev] SUBJECT.KEYID = 5
7,654,034 UART: [ldev] AUTHORITY.KEYID = 7
7,655,314 UART: [ldev] FE.KEYID = 1
7,667,335 UART: [ldev] Erasing FE.KEYID = 1
10,956,933 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,837 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,295 UART: [ldev] --
13,316,698 UART: [fwproc] Waiting for Commands...
13,318,948 UART: [fwproc] Received command 0x46574c44
13,321,173 UART: [fwproc] Received Image of size 118548 bytes
17,429,274 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,816 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,994 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,284 >>> mbox cmd response: success
17,910,149 UART: [afmc] ++
17,910,761 UART: [afmc] CDI.KEYID = 6
17,911,701 UART: [afmc] SUBJECT.KEYID = 7
17,912,935 UART: [afmc] AUTHORITY.KEYID = 5
21,226,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,626 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,331 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,071 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,460 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,917 UART: [afmc] --
23,590,505 UART: [cold-reset] --
23,594,363 UART: [state] Locking Datavault
23,601,172 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,917 UART: [state] Locking ICCM
23,604,742 UART: [exit] Launching FMC @ 0x40000130
23,613,121 UART:
23,613,378 UART: Running Caliptra FMC ...
23,614,477 UART:
23,614,653 UART: [state] CFI Enabled
23,622,593 UART: [fht] FMC Alias Private Key: 7
25,962,838 UART: [art] Extend RT PCRs Done
25,964,060 UART: [art] Lock RT PCRs Done
25,966,088 UART: [art] Populate DV Done
25,971,822 UART: [fht] FMC Alias Private Key: 7
25,973,458 UART: [art] Derive CDI
25,974,266 UART: [art] Store in slot 0x4
26,016,911 UART: [art] Derive Key Pair
26,017,957 UART: [art] Store priv key in slot 0x5
29,260,709 UART: [art] Derive Key Pair - Done
29,273,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,943 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,476 UART: [art] PUB.X = E62462420C4AFD614112176D3095433289B2191BDA19C56CB60FD120D1E67502B37066C4D54CC0144C4825A509CE48B0
31,562,667 UART: [art] PUB.Y = B8F7A2D6B150A89E8D11AE38344E7E4A0943CFA659EBC79222AADCB00A4063B9F5AE2CF029A9DA38FA60F14789EC7792
31,569,942 UART: [art] SIG.R = 2D913A191F92287B03F3ACD4549FCD446C100891777E72B741375A47B8D6AC748BB738D8C4CA91C2242ABD8EE521F259
31,577,341 UART: [art] SIG.S = 735ACF8AC7C034591B6B55BDFD8A558BE3E011B6813214D6F91434F83595C90176C2E37DD59A5AA423D02D19622B3605
32,882,225 UART: Caliptra RT
32,882,938 UART: [state] CFI Enabled
33,016,812 UART: [rt] RT listening for mailbox commands...
33,019,106 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,174,421 UART: [rt]cmd =0x41544d4e, len=14344
38,475,068 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
4,125,919 ready_for_fw is high
4,126,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,607 >>> mbox cmd response: success
23,809,906 UART:
23,810,310 UART: Running Caliptra FMC ...
23,811,418 UART:
23,811,567 UART: [state] CFI Enabled
23,819,567 UART: [fht] FMC Alias Private Key: 7
26,158,935 UART: [art] Extend RT PCRs Done
26,160,161 UART: [art] Lock RT PCRs Done
26,161,597 UART: [art] Populate DV Done
26,167,218 UART: [fht] FMC Alias Private Key: 7
26,168,805 UART: [art] Derive CDI
26,169,539 UART: [art] Store in slot 0x4
26,212,461 UART: [art] Derive Key Pair
26,213,506 UART: [art] Store priv key in slot 0x5
29,455,613 UART: [art] Derive Key Pair - Done
29,468,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,025 UART: [art] Erasing AUTHORITY.KEYID = 7
31,750,548 UART: [art] PUB.X = A0A6EA29A55D70C52972E18716421B55303FAD1553A6F58EAE1F5D4B649084519DDB340B7919AAD47D34CD1CAD8DE26D
31,757,804 UART: [art] PUB.Y = 8E9D521C64D2C546B154F3D91B4ACF18C6A2B58D11A5C370F25A9712E22D04789608D1207C95C78DB2642E86A6C25152
31,765,018 UART: [art] SIG.R = 7C317E77887B5AAEB5F900676BD3D307484311E92ACB5546F19FE7755ADDB9B152651FEAF92625B065C903107BBD0F6C
31,772,433 UART: [art] SIG.S = F5FAEEB0CBB68349AF85FBD267F743922ECE1DE5CB0F18A255F3AB4894AE7B0D6B81448AB5C78DE88BB73F963AF8B5A2
33,077,960 UART: Caliptra RT
33,078,679 UART: [state] CFI Enabled
33,211,355 UART: [rt] RT listening for mailbox commands...
33,213,655 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,369,499 UART: [rt]cmd =0x41544d4e, len=14344
38,670,111 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,044 UART:
192,402 UART: Running Caliptra ROM ...
193,603 UART:
193,752 UART: [state] CFI Enabled
266,566 UART: [state] LifecycleState = Unprovisioned
268,488 UART: [state] DebugLocked = No
269,810 UART: [state] WD Timer not started. Device not locked for debugging
273,125 UART: [kat] SHA2-256
452,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,604 UART: [kat] ++
464,046 UART: [kat] sha1
474,587 UART: [kat] SHA2-256
477,314 UART: [kat] SHA2-384
483,228 UART: [kat] SHA2-512-ACC
485,585 UART: [kat] ECC-384
2,947,473 UART: [kat] HMAC-384Kdf
2,971,249 UART: [kat] LMS
3,447,724 UART: [kat] --
3,452,431 UART: [cold-reset] ++
3,454,357 UART: [fht] FHT @ 0x50003400
3,466,674 UART: [idev] ++
3,467,241 UART: [idev] CDI.KEYID = 6
3,468,193 UART: [idev] SUBJECT.KEYID = 7
3,469,437 UART: [idev] UDS.KEYID = 0
3,470,404 ready_for_fw is high
3,470,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,837 UART: [idev] Erasing UDS.KEYID = 0
5,984,051 UART: [idev] Sha1 KeyId Algorithm
6,007,451 UART: [idev] --
6,013,606 UART: [ldev] ++
6,014,171 UART: [ldev] CDI.KEYID = 6
6,015,108 UART: [ldev] SUBJECT.KEYID = 5
6,016,315 UART: [ldev] AUTHORITY.KEYID = 7
6,017,541 UART: [ldev] FE.KEYID = 1
6,056,802 UART: [ldev] Erasing FE.KEYID = 1
8,564,999 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,967 UART: [ldev] --
10,370,200 UART: [fwproc] Wait for Commands...
10,372,192 UART: [fwproc] Recv command 0x46574c44
10,374,265 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,949 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,345,918 >>> mbox cmd response: success
14,350,286 UART: [afmc] ++
14,350,877 UART: [afmc] CDI.KEYID = 6
14,351,815 UART: [afmc] SUBJECT.KEYID = 7
14,353,024 UART: [afmc] AUTHORITY.KEYID = 5
16,895,507 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,511 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,601 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,216 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,600 UART: [afmc] --
18,715,155 UART: [cold-reset] --
18,718,797 UART: [state] Locking Datavault
18,721,932 UART: [state] Locking PCR0, PCR1 and PCR31
18,723,679 UART: [state] Locking ICCM
18,725,879 UART: [exit] Launching FMC @ 0x40000130
18,734,324 UART:
18,734,565 UART: Running Caliptra FMC ...
18,735,665 UART:
18,735,823 UART: [state] CFI Enabled
18,793,711 UART: [fht] FMC Alias Private Key: 7
20,560,039 UART: [art] Extend RT PCRs Done
20,561,241 UART: [art] Lock RT PCRs Done
20,562,725 UART: [art] Populate DV Done
20,568,074 UART: [fht] FMC Alias Private Key: 7
20,569,712 UART: [art] Derive CDI
20,570,445 UART: [art] Store in slot 0x4
20,627,331 UART: [art] Derive Key Pair
20,628,367 UART: [art] Store priv key in slot 0x5
23,091,483 UART: [art] Derive Key Pair - Done
23,104,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,466 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,958 UART: [art] PUB.X = 2195B626ADD200980E3FBDA750DB2282DCAC027A9189F7C99D98A29051D38454894BFC109EC7204D7EC8E0FCDE72D2BE
24,826,259 UART: [art] PUB.Y = D3253AA65772C6B0C85DEA84A8A0CA83A33E033AB0EB963213293840CF316AC15DD5B267761A8FF844DD92FE01708EE8
24,833,545 UART: [art] SIG.R = 8CD02F3307881743A175CDE7EAB7B98D593261F341D46249F3A3645CA4C3484E75070883315C92D9D2AB411A4A5A500D
24,840,887 UART: [art] SIG.S = FD87042AFA22EF62DFBC1F1689D04D7E59B73EBAE8ABA41A47D759948EB2451C3A7076F732676E1F0157B7C67F3FABB1
25,820,207 UART: Caliptra RT
25,820,922 UART: [state] CFI Enabled
26,000,876 UART: [rt] RT listening for mailbox commands...
26,003,176 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,158,645 UART: [rt]cmd =0x41544d4e, len=14344
30,154,070 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,460,891 ready_for_fw is high
3,461,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,418 >>> mbox cmd response: success
18,534,445 UART:
18,535,331 UART: Running Caliptra FMC ...
18,536,465 UART:
18,536,629 UART: [state] CFI Enabled
18,601,304 UART: [fht] FMC Alias Private Key: 7
20,388,986 UART: [art] Extend RT PCRs Done
20,390,196 UART: [art] Lock RT PCRs Done
20,391,832 UART: [art] Populate DV Done
20,397,195 UART: [fht] FMC Alias Private Key: 7
20,398,842 UART: [art] Derive CDI
20,399,654 UART: [art] Store in slot 0x4
20,455,348 UART: [art] Derive Key Pair
20,456,380 UART: [art] Store priv key in slot 0x5
22,919,273 UART: [art] Derive Key Pair - Done
22,932,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,077 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,578 UART: [art] PUB.X = E8F2919015E7C822B277FE04E90F8FBC4FE885FA1282990756FA355E6A683381DDB50998C31397C2B4E9491DC1C66DA0
24,653,832 UART: [art] PUB.Y = EC06A67C4F11E90AC89E9E66163ACE7ECACD2935BA0692402AA312DE4C1BC988E721281BFD62CC05938321622EAF26FE
24,661,120 UART: [art] SIG.R = 04C7C18913EAF2CCD8C0118B103E023089C82DD293A4D122674ABF1748C6DE75CFF2C847CC22C8AB468C96991E7DE38F
24,668,520 UART: [art] SIG.S = 5431736CB3FE163B96D8682D7B89579686E177BBFF38E7D3818B266C2D7C995A1A3D6A3821EB56F1D53D55B2838FB986
25,647,191 UART: Caliptra RT
25,647,909 UART: [state] CFI Enabled
25,829,290 UART: [rt] RT listening for mailbox commands...
25,831,592 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,986,913 UART: [rt]cmd =0x41544d4e, len=14344
29,982,575 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
192,360 UART:
192,743 UART: Running Caliptra ROM ...
193,877 UART:
603,503 UART: [state] CFI Enabled
618,372 UART: [state] LifecycleState = Unprovisioned
620,260 UART: [state] DebugLocked = No
622,361 UART: [state] WD Timer not started. Device not locked for debugging
626,960 UART: [kat] SHA2-256
806,623 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,435 UART: [kat] ++
817,884 UART: [kat] sha1
828,872 UART: [kat] SHA2-256
831,531 UART: [kat] SHA2-384
838,330 UART: [kat] SHA2-512-ACC
840,668 UART: [kat] ECC-384
3,282,522 UART: [kat] HMAC-384Kdf
3,294,199 UART: [kat] LMS
3,770,699 UART: [kat] --
3,776,490 UART: [cold-reset] ++
3,778,349 UART: [fht] FHT @ 0x50003400
3,788,966 UART: [idev] ++
3,789,529 UART: [idev] CDI.KEYID = 6
3,790,483 UART: [idev] SUBJECT.KEYID = 7
3,791,734 UART: [idev] UDS.KEYID = 0
3,792,631 ready_for_fw is high
3,792,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,665 UART: [idev] Erasing UDS.KEYID = 0
6,270,374 UART: [idev] Sha1 KeyId Algorithm
6,294,621 UART: [idev] --
6,299,782 UART: [ldev] ++
6,300,367 UART: [ldev] CDI.KEYID = 6
6,301,281 UART: [ldev] SUBJECT.KEYID = 5
6,302,464 UART: [ldev] AUTHORITY.KEYID = 7
6,303,754 UART: [ldev] FE.KEYID = 1
6,313,862 UART: [ldev] Erasing FE.KEYID = 1
8,794,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,858 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,844 UART: [ldev] --
10,590,810 UART: [fwproc] Wait for Commands...
10,592,364 UART: [fwproc] Recv command 0x46574c44
10,594,405 UART: [fwproc] Recv'd Img size: 118548 bytes
14,079,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,747 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,884 >>> mbox cmd response: success
14,562,663 UART: [afmc] ++
14,563,276 UART: [afmc] CDI.KEYID = 6
14,564,192 UART: [afmc] SUBJECT.KEYID = 7
14,565,412 UART: [afmc] AUTHORITY.KEYID = 5
17,071,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,847 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,953 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,097 UART: [afmc] --
18,869,517 UART: [cold-reset] --
18,872,948 UART: [state] Locking Datavault
18,876,790 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,492 UART: [state] Locking ICCM
18,881,236 UART: [exit] Launching FMC @ 0x40000130
18,889,664 UART:
18,889,908 UART: Running Caliptra FMC ...
18,891,011 UART:
18,891,176 UART: [state] CFI Enabled
18,899,334 UART: [fht] FMC Alias Private Key: 7
20,666,039 UART: [art] Extend RT PCRs Done
20,667,259 UART: [art] Lock RT PCRs Done
20,669,087 UART: [art] Populate DV Done
20,674,666 UART: [fht] FMC Alias Private Key: 7
20,676,257 UART: [art] Derive CDI
20,676,998 UART: [art] Store in slot 0x4
20,720,096 UART: [art] Derive Key Pair
20,721,125 UART: [art] Store priv key in slot 0x5
23,148,265 UART: [art] Derive Key Pair - Done
23,161,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,129 UART: [art] PUB.X = 73815EF48C2A2BF03F1858A992DD8655A3AA69DAE2B46317133FE764CE41A16A02C35D414906A938088DA9E02AA1332A
24,876,434 UART: [art] PUB.Y = F33D2F9BEFE8450F6921DF3EB7EA78940108220C7015A85CAF3474A92781E58A5C1E2C1C9B23F3DD6510398585B6067E
24,883,664 UART: [art] SIG.R = 3F6647C87570672A869F84A6FBC8EA2D83BD68AEB41727DBA6FDDC0337219946CD6F50B12B80EB7620E44283D04B29B2
24,891,068 UART: [art] SIG.S = F4A1068037D199F3ECC38A5F1ACE125E7BC97B23CDDD4CD5A5C64D561BA08F37EAA4F83E02C65BBBAC104A607AA7A513
25,869,741 UART: Caliptra RT
25,870,443 UART: [state] CFI Enabled
26,002,443 UART: [rt] RT listening for mailbox commands...
26,004,769 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,160,178 UART: [rt]cmd =0x41544d4e, len=14344
30,156,121 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,774,537 ready_for_fw is high
3,774,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,969 >>> mbox cmd response: success
18,699,737 UART:
18,700,130 UART: Running Caliptra FMC ...
18,701,277 UART:
18,701,463 UART: [state] CFI Enabled
18,709,037 UART: [fht] FMC Alias Private Key: 7
20,474,932 UART: [art] Extend RT PCRs Done
20,476,161 UART: [art] Lock RT PCRs Done
20,477,846 UART: [art] Populate DV Done
20,483,330 UART: [fht] FMC Alias Private Key: 7
20,485,031 UART: [art] Derive CDI
20,485,861 UART: [art] Store in slot 0x4
20,528,657 UART: [art] Derive Key Pair
20,529,698 UART: [art] Store priv key in slot 0x5
22,956,364 UART: [art] Derive Key Pair - Done
22,969,309 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,487 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,008 UART: [art] PUB.X = DA70BC80CB7168C3441112269561FDD650BAA3E16CAAF1169C9FF0D14BEAEA3C8BFC88E6220E650A67C8029A1955D97F
24,684,271 UART: [art] PUB.Y = ADC43C19E63FA21987AC3E62A18E64B74F171854BA14CA50B6A3CB70F1FEF48C36699A89ABFA8C4A8B595B24452C3306
24,691,532 UART: [art] SIG.R = 6FA3E3DB5D88F9B0BEE2AA682DDD3A8DC9956EC845E57208B75C281157AF7D9BDA198CD86A064E0FB1672EF2E9059681
24,698,955 UART: [art] SIG.S = 1EE44B7A92A9E228E6F6F79BC59495513391B2BD81C6D47F9924DA89A653506F49704292BFAED66D72C61CBC3952F45A
25,677,925 UART: Caliptra RT
25,678,635 UART: [state] CFI Enabled
25,810,997 UART: [rt] RT listening for mailbox commands...
25,813,334 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,968,654 UART: [rt]cmd =0x41544d4e, len=14344
29,964,020 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,002 UART:
192,373 UART: Running Caliptra ROM ...
193,581 UART:
193,740 UART: [state] CFI Enabled
251,339 UART: [state] LifecycleState = Unprovisioned
253,754 UART: [state] DebugLocked = No
255,924 UART: [state] WD Timer not started. Device not locked for debugging
260,942 UART: [kat] SHA2-256
450,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,633 UART: [kat] ++
462,127 UART: [kat] sha1
473,226 UART: [kat] SHA2-256
476,230 UART: [kat] SHA2-384
482,859 UART: [kat] SHA2-512-ACC
485,438 UART: [kat] ECC-384
2,934,925 UART: [kat] HMAC-384Kdf
2,958,464 UART: [kat] LMS
3,490,267 UART: [kat] --
3,494,914 UART: [cold-reset] ++
3,497,063 UART: [fht] FHT @ 0x50003400
3,508,470 UART: [idev] ++
3,509,100 UART: [idev] CDI.KEYID = 6
3,510,129 UART: [idev] SUBJECT.KEYID = 7
3,511,302 UART: [idev] UDS.KEYID = 0
3,512,230 ready_for_fw is high
3,512,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,661,775 UART: [idev] Erasing UDS.KEYID = 0
6,015,214 UART: [idev] Sha1 KeyId Algorithm
6,036,773 UART: [idev] --
6,041,037 UART: [ldev] ++
6,041,718 UART: [ldev] CDI.KEYID = 6
6,042,638 UART: [ldev] SUBJECT.KEYID = 5
6,043,803 UART: [ldev] AUTHORITY.KEYID = 7
6,045,036 UART: [ldev] FE.KEYID = 1
6,084,816 UART: [ldev] Erasing FE.KEYID = 1
8,589,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,997 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,393 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,533 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,393,722 UART: [ldev] --
10,399,356 UART: [fwproc] Wait for Commands...
10,401,876 UART: [fwproc] Recv command 0x46574c44
10,404,176 UART: [fwproc] Recv'd Img size: 118548 bytes
13,902,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,974,006 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,097,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,658,009 >>> mbox cmd response: success
14,661,622 UART: [afmc] ++
14,662,348 UART: [afmc] CDI.KEYID = 6
14,663,536 UART: [afmc] SUBJECT.KEYID = 7
14,665,032 UART: [afmc] AUTHORITY.KEYID = 5
17,198,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,922,359 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,924,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,939,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,954,524 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,969,381 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,991,847 UART: [afmc] --
18,994,679 UART: [cold-reset] --
18,999,996 UART: [state] Locking Datavault
19,005,827 UART: [state] Locking PCR0, PCR1 and PCR31
19,007,982 UART: [state] Locking ICCM
19,010,298 UART: [exit] Launching FMC @ 0x40000130
19,018,930 UART:
19,019,164 UART: Running Caliptra FMC ...
19,020,210 UART:
19,020,362 UART: [state] CFI Enabled
19,079,766 UART: [fht] FMC Alias Private Key: 7
20,846,417 UART: [art] Extend RT PCRs Done
20,847,634 UART: [art] Lock RT PCRs Done
20,849,392 UART: [art] Populate DV Done
20,854,582 UART: [fht] FMC Alias Private Key: 7
20,856,114 UART: [art] Derive CDI
20,856,919 UART: [art] Store in slot 0x4
20,912,602 UART: [art] Derive Key Pair
20,913,600 UART: [art] Store priv key in slot 0x5
23,376,422 UART: [art] Derive Key Pair - Done
23,389,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,102,657 UART: [art] Erasing AUTHORITY.KEYID = 7
25,104,165 UART: [art] PUB.X = 5B1F83ED02442BE177E4427F784788508154B3167FE659C479774AD8AE52002D4066FCBC5FF8FCD429F8F736003EB67B
25,111,346 UART: [art] PUB.Y = 0AD9DF71C9142F497BD0D7C00CDCB3A06CED0427ABA3F73E3390DFB0BF589BA2EC5FFA3804C88D6369F8B656B530D4A5
25,118,669 UART: [art] SIG.R = 0B63EECBDBCEC9A7D390481B845733E7F386C67B12CAA64C952D1A594ADCD41D0974616AF28BF255D0B96A99B190EDE6
25,126,022 UART: [art] SIG.S = 84CEB0A96B36F550265F7F4CA1F0ACAF3E21432DEB37F0138107B0FCA40C7F7551A14C6BE314ED03D8F86B3A43E1186C
26,104,581 UART: Caliptra RT
26,105,283 UART: [state] CFI Enabled
26,285,193 UART: [rt] RT listening for mailbox commands...
26,287,509 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,442,702 UART: [rt]cmd =0x41544d4e, len=14344
30,437,406 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,440,993 ready_for_fw is high
3,441,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,625 >>> mbox cmd response: success
19,134,883 UART:
19,135,271 UART: Running Caliptra FMC ...
19,136,575 UART:
19,136,745 UART: [state] CFI Enabled
19,201,777 UART: [fht] FMC Alias Private Key: 7
20,968,176 UART: [art] Extend RT PCRs Done
20,969,394 UART: [art] Lock RT PCRs Done
20,970,752 UART: [art] Populate DV Done
20,976,322 UART: [fht] FMC Alias Private Key: 7
20,977,847 UART: [art] Derive CDI
20,978,613 UART: [art] Store in slot 0x4
21,035,003 UART: [art] Derive Key Pair
21,036,010 UART: [art] Store priv key in slot 0x5
23,498,926 UART: [art] Derive Key Pair - Done
23,511,654 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,225,258 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,763 UART: [art] PUB.X = BD0258D54D3750D83BFB6FC6C02EB73D3B1548EE0B593A58D7280E6D704E96D10706238F901D6255B57D5CF6C2F3F576
25,234,030 UART: [art] PUB.Y = AB9297295A1651328978F5D7587965413BECE3D87C37112DC7643AE9B5F84DC1616F768FFA00DF44BD87D86FD257096E
25,241,257 UART: [art] SIG.R = 7CD9E4C57B4F3F0EBCBAD1865B5CED90D1B21ECD5E841EE03930E5298E77FC96A407D36480D540A1C47BA54A4C2C3B23
25,248,612 UART: [art] SIG.S = 885785514A5429594CAA6EEC77620268553748AC8618E1D81DCD12229AC165ED0AD04718E5A8A64DD191DDC147F2477A
26,227,351 UART: Caliptra RT
26,228,065 UART: [state] CFI Enabled
26,408,928 UART: [rt] RT listening for mailbox commands...
26,411,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,566,693 UART: [rt]cmd =0x41544d4e, len=14344
30,562,041 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,441 UART:
192,811 UART: Running Caliptra ROM ...
193,962 UART:
603,719 UART: [state] CFI Enabled
616,965 UART: [state] LifecycleState = Unprovisioned
619,278 UART: [state] DebugLocked = No
621,465 UART: [state] WD Timer not started. Device not locked for debugging
626,168 UART: [kat] SHA2-256
816,060 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,879 UART: [kat] ++
827,404 UART: [kat] sha1
838,422 UART: [kat] SHA2-256
841,436 UART: [kat] SHA2-384
847,076 UART: [kat] SHA2-512-ACC
849,666 UART: [kat] ECC-384
3,290,278 UART: [kat] HMAC-384Kdf
3,302,319 UART: [kat] LMS
3,834,090 UART: [kat] --
3,839,466 UART: [cold-reset] ++
3,841,195 UART: [fht] FHT @ 0x50003400
3,851,891 UART: [idev] ++
3,852,600 UART: [idev] CDI.KEYID = 6
3,853,654 UART: [idev] SUBJECT.KEYID = 7
3,854,760 UART: [idev] UDS.KEYID = 0
3,855,688 ready_for_fw is high
3,855,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,844 UART: [idev] Erasing UDS.KEYID = 0
6,329,139 UART: [idev] Sha1 KeyId Algorithm
6,352,916 UART: [idev] --
6,357,997 UART: [ldev] ++
6,358,681 UART: [ldev] CDI.KEYID = 6
6,359,595 UART: [ldev] SUBJECT.KEYID = 5
6,360,811 UART: [ldev] AUTHORITY.KEYID = 7
6,361,990 UART: [ldev] FE.KEYID = 1
6,373,988 UART: [ldev] Erasing FE.KEYID = 1
8,850,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,321 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,004 UART: [ldev] --
10,640,774 UART: [fwproc] Wait for Commands...
10,643,249 UART: [fwproc] Recv command 0x46574c44
10,645,558 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,213,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,336,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,896,351 >>> mbox cmd response: success
14,899,725 UART: [afmc] ++
14,900,437 UART: [afmc] CDI.KEYID = 6
14,901,690 UART: [afmc] SUBJECT.KEYID = 7
14,903,138 UART: [afmc] AUTHORITY.KEYID = 5
17,403,598 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,128,685 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,130,623 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,145,726 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,160,864 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,175,784 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,199,099 UART: [afmc] --
19,203,146 UART: [cold-reset] --
19,208,911 UART: [state] Locking Datavault
19,215,972 UART: [state] Locking PCR0, PCR1 and PCR31
19,218,134 UART: [state] Locking ICCM
19,219,630 UART: [exit] Launching FMC @ 0x40000130
19,228,319 UART:
19,228,564 UART: Running Caliptra FMC ...
19,229,603 UART:
19,229,755 UART: [state] CFI Enabled
19,237,700 UART: [fht] FMC Alias Private Key: 7
21,003,687 UART: [art] Extend RT PCRs Done
21,004,948 UART: [art] Lock RT PCRs Done
21,006,481 UART: [art] Populate DV Done
21,012,015 UART: [fht] FMC Alias Private Key: 7
21,013,668 UART: [art] Derive CDI
21,014,410 UART: [art] Store in slot 0x4
21,057,171 UART: [art] Derive Key Pair
21,058,216 UART: [art] Store priv key in slot 0x5
23,485,299 UART: [art] Derive Key Pair - Done
23,498,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,615 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,121 UART: [art] PUB.X = 4518FC086D812D38E321D073EA318134F10C19789CCE21F063C828695742479FCFB6265923144F7FCD31F66F825F7342
25,213,335 UART: [art] PUB.Y = 2B597CE894D2FBAE3A66142B91985A72063C95B4641DB1CD100D7485A409922570FA0C715CDB5E5C3C71621994EC269F
25,220,596 UART: [art] SIG.R = 8FC43110D05A879FD0ABC9E1642ED40CBDC594179A1D15995F1252F7ABDDF3E50F78B4B3AB07D473A31DA6E999339FAD
25,227,977 UART: [art] SIG.S = 80E75C64B1EFFDE2F18BD2EFCC7E180581BA1B8DC3771071DF05E3D36C60AC0E38257D77748DF3978A80EA8D2B218F67
26,206,743 UART: Caliptra RT
26,207,447 UART: [state] CFI Enabled
26,339,638 UART: [rt] RT listening for mailbox commands...
26,341,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,497,241 UART: [rt]cmd =0x41544d4e, len=14344
30,492,481 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,757,379 ready_for_fw is high
3,757,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,031,047 >>> mbox cmd response: success
19,284,855 UART:
19,285,242 UART: Running Caliptra FMC ...
19,286,395 UART:
19,286,561 UART: [state] CFI Enabled
19,294,651 UART: [fht] FMC Alias Private Key: 7
21,060,396 UART: [art] Extend RT PCRs Done
21,061,633 UART: [art] Lock RT PCRs Done
21,063,327 UART: [art] Populate DV Done
21,068,688 UART: [fht] FMC Alias Private Key: 7
21,070,346 UART: [art] Derive CDI
21,071,178 UART: [art] Store in slot 0x4
21,114,004 UART: [art] Derive Key Pair
21,115,053 UART: [art] Store priv key in slot 0x5
23,542,290 UART: [art] Derive Key Pair - Done
23,555,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,261,303 UART: [art] Erasing AUTHORITY.KEYID = 7
25,262,808 UART: [art] PUB.X = 0EBE31BCA3CFF0559BC52A2BC64DAA10BDE6B6CFA19B3CD1150660F300D40CCB3067492191A23FB9DA7F15EDAC130717
25,270,086 UART: [art] PUB.Y = 1572799C476D7E43D9DD06A5192DDB0E1050FDB7D755D34575F3395B9FCB026246176CE1B5D89E38AD6EF9F5B0CCFE4C
25,277,317 UART: [art] SIG.R = 7143D86E5945459D90D174CEF104652010979DB6CC8B306D145D9BCA724BBE70A5A9D8E0103805A0D1769E4CF927BABA
25,284,740 UART: [art] SIG.S = 3F80220F902487C578EE60488A98B9333A0F306ED0F358FDFCD3FE587C77FFF3344179AB860D68D17455407912466490
26,263,934 UART: Caliptra RT
26,264,648 UART: [state] CFI Enabled
26,396,906 UART: [rt] RT listening for mailbox commands...
26,399,234 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,554,379 UART: [rt]cmd =0x41544d4e, len=14344
30,550,194 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,936 UART: [state] LifecycleState = Unprovisioned
85,591 UART: [state] DebugLocked = No
86,289 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,983 UART: [kat] SHA2-256
881,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,029 UART: [kat] ++
886,181 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
894,926 UART: [kat] SHA2-512-ACC
896,827 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,902 UART: [kat] LMS
1,475,098 UART: [kat] --
1,476,055 UART: [cold-reset] ++
1,476,557 UART: [fht] Storing FHT @ 0x50003400
1,479,334 UART: [idev] ++
1,479,502 UART: [idev] CDI.KEYID = 6
1,479,862 UART: [idev] SUBJECT.KEYID = 7
1,480,286 UART: [idev] UDS.KEYID = 0
1,480,631 ready_for_fw is high
1,480,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,174 UART: [idev] Erasing UDS.KEYID = 0
1,504,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,288 UART: [idev] --
1,514,467 UART: [ldev] ++
1,514,635 UART: [ldev] CDI.KEYID = 6
1,514,998 UART: [ldev] SUBJECT.KEYID = 5
1,515,424 UART: [ldev] AUTHORITY.KEYID = 7
1,515,887 UART: [ldev] FE.KEYID = 1
1,521,039 UART: [ldev] Erasing FE.KEYID = 1
1,546,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,025 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,286 UART: [ldev] --
1,585,739 UART: [fwproc] Waiting for Commands...
1,586,558 UART: [fwproc] Received command 0x46574c44
1,587,349 UART: [fwproc] Received Image of size 118548 bytes
2,932,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,199 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,417 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,676 >>> mbox cmd response: success
3,132,824 UART: [afmc] ++
3,132,992 UART: [afmc] CDI.KEYID = 6
3,133,354 UART: [afmc] SUBJECT.KEYID = 7
3,133,779 UART: [afmc] AUTHORITY.KEYID = 5
3,169,228 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,304 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,793 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,676 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,359 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,079 UART: [afmc] --
3,212,103 UART: [cold-reset] --
3,212,829 UART: [state] Locking Datavault
3,214,048 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,652 UART: [state] Locking ICCM
3,215,232 UART: [exit] Launching FMC @ 0x40000130
3,220,562 UART:
3,220,578 UART: Running Caliptra FMC ...
3,220,986 UART:
3,221,040 UART: [state] CFI Enabled
3,231,426 UART: [fht] FMC Alias Private Key: 7
3,350,196 UART: [art] Extend RT PCRs Done
3,350,624 UART: [art] Lock RT PCRs Done
3,351,968 UART: [art] Populate DV Done
3,360,111 UART: [fht] FMC Alias Private Key: 7
3,361,225 UART: [art] Derive CDI
3,361,505 UART: [art] Store in slot 0x4
3,446,927 UART: [art] Derive Key Pair
3,447,287 UART: [art] Store priv key in slot 0x5
3,460,598 UART: [art] Derive Key Pair - Done
3,475,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,540 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,305 UART: [art] PUB.X = DAE86E7AF4670CE2EFC16644D699ADF4D7674DB020C583EB0720B4ABCEA77BD5F5A7D6FDBC6DEDF5EB4A18EA34CD86C3
3,498,103 UART: [art] PUB.Y = 700C51B2279F83A4D73178857DE0EE4139FF31B3823260CA4D3C98D1467539DC8DC3D09C6A9ABBC48E8D7D57EE361CE3
3,505,058 UART: [art] SIG.R = BAEE7F28CD3002E9F160533253D6EED52ABA2C90AF022C09C83CF149032C0F1DC9B5E564D6602DBB1585DC8A255625B3
3,511,825 UART: [art] SIG.S = 9C7C7313C9F691E9F454B1DF0F194311F56E04B52F23A0CD36098B40AEF19D8A146D6D1F92AF895048D2B1F26C64FCFF
3,535,168 UART: Caliptra RT
3,535,419 UART: [state] CFI Enabled
3,655,990 UART: [rt] RT listening for mailbox commands...
3,656,660 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,666 UART: [rt]cmd =0x41544d4e, len=14344
4,089,569 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,301 ready_for_fw is high
1,362,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,340 >>> mbox cmd response: success
3,042,435 UART:
3,042,451 UART: Running Caliptra FMC ...
3,042,859 UART:
3,042,913 UART: [state] CFI Enabled
3,053,563 UART: [fht] FMC Alias Private Key: 7
3,172,831 UART: [art] Extend RT PCRs Done
3,173,259 UART: [art] Lock RT PCRs Done
3,174,493 UART: [art] Populate DV Done
3,182,868 UART: [fht] FMC Alias Private Key: 7
3,183,864 UART: [art] Derive CDI
3,184,144 UART: [art] Store in slot 0x4
3,269,906 UART: [art] Derive Key Pair
3,270,266 UART: [art] Store priv key in slot 0x5
3,283,191 UART: [art] Derive Key Pair - Done
3,297,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,643 UART: [art] PUB.X = 932577D24B5F63BC9E048A5AD05BF4BE7E7BA93FA0DFA4254CE5392B5D97B3015EF09AC93457949B8C9FAF25616EAB8E
3,320,423 UART: [art] PUB.Y = 1773024DC95DDDF8733229A1FFC01B5CB238CA8727706EECDF8F3545D2521987E3964EF8A0EBDD4436516BD0AFCA24A6
3,327,382 UART: [art] SIG.R = 7652D7F32623AF487EE5EC00F00ED1268E79E0AE6367A9E76D8EEBC646096681F637A981EB4D9804E50046EC28311CA7
3,334,101 UART: [art] SIG.S = 44E8E223862EB92D44482B43E0DE64E8AE3481024323523EFDD719F5F11EC4214127CB52DE29FE4B109E7CFAAC4C7404
3,358,039 UART: Caliptra RT
3,358,290 UART: [state] CFI Enabled
3,479,059 UART: [rt] RT listening for mailbox commands...
3,479,729 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,947 UART: [rt]cmd =0x41544d4e, len=14344
3,913,226 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,708 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,884 UART: [kat] SHA2-256
892,822 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,117 UART: [kat] HMAC-384Kdf
907,917 UART: [kat] LMS
1,476,113 UART: [kat] --
1,476,864 UART: [cold-reset] ++
1,477,218 UART: [fht] Storing FHT @ 0x50003400
1,479,879 UART: [idev] ++
1,480,047 UART: [idev] CDI.KEYID = 6
1,480,407 UART: [idev] SUBJECT.KEYID = 7
1,480,831 UART: [idev] UDS.KEYID = 0
1,481,176 ready_for_fw is high
1,481,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,723 UART: [idev] Erasing UDS.KEYID = 0
1,505,405 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,133 UART: [idev] --
1,515,004 UART: [ldev] ++
1,515,172 UART: [ldev] CDI.KEYID = 6
1,515,535 UART: [ldev] SUBJECT.KEYID = 5
1,515,961 UART: [ldev] AUTHORITY.KEYID = 7
1,516,424 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,547,473 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,010 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,726 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,337 UART: [ldev] --
1,586,784 UART: [fwproc] Waiting for Commands...
1,587,545 UART: [fwproc] Received command 0x46574c44
1,588,336 UART: [fwproc] Received Image of size 118548 bytes
2,933,020 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,488 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,121 >>> mbox cmd response: success
3,132,263 UART: [afmc] ++
3,132,431 UART: [afmc] CDI.KEYID = 6
3,132,793 UART: [afmc] SUBJECT.KEYID = 7
3,133,218 UART: [afmc] AUTHORITY.KEYID = 5
3,168,789 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,581 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,361 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,953 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,636 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,270 UART: [afmc] --
3,211,250 UART: [cold-reset] --
3,212,034 UART: [state] Locking Datavault
3,213,153 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,757 UART: [state] Locking ICCM
3,214,411 UART: [exit] Launching FMC @ 0x40000130
3,219,741 UART:
3,219,757 UART: Running Caliptra FMC ...
3,220,165 UART:
3,220,308 UART: [state] CFI Enabled
3,230,686 UART: [fht] FMC Alias Private Key: 7
3,348,898 UART: [art] Extend RT PCRs Done
3,349,326 UART: [art] Lock RT PCRs Done
3,350,806 UART: [art] Populate DV Done
3,359,045 UART: [fht] FMC Alias Private Key: 7
3,360,127 UART: [art] Derive CDI
3,360,407 UART: [art] Store in slot 0x4
3,446,201 UART: [art] Derive Key Pair
3,446,561 UART: [art] Store priv key in slot 0x5
3,459,612 UART: [art] Derive Key Pair - Done
3,474,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,036 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,801 UART: [art] PUB.X = 7D71C3A5458FD7D5D999C1B610D409A8D0F86E3739B715B7F1048BF91A486EFE8C1FBF1F882AA1B37E279CC6B1C7B8E1
3,497,579 UART: [art] PUB.Y = 072EE4CC50AE2F5DBC5B8882CF4D14CD4AF37908AE6E953E779D6FABDB86DD16B65378D36899C6618D5331D1820152B1
3,504,530 UART: [art] SIG.R = EF26A6D1DD232AA720D38E52DE933ED0132F60557AE124BD8E2E7708D37638CCDBBD53ABBA44845A7E0561E83561D3D9
3,511,306 UART: [art] SIG.S = 1879ABA90413DADB4809AE1D4CA7B0348E7C9DBD1CAF5D766D771C999C1C2BE110264EBCCC239A7125988F2A18ABFFC3
3,534,838 UART: Caliptra RT
3,535,181 UART: [state] CFI Enabled
3,654,425 UART: [rt] RT listening for mailbox commands...
3,655,095 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,777,923 UART: [rt]cmd =0x41544d4e, len=14344
4,087,916 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 ready_for_fw is high
1,362,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,995 >>> mbox cmd response: success
3,042,298 UART:
3,042,314 UART: Running Caliptra FMC ...
3,042,722 UART:
3,042,865 UART: [state] CFI Enabled
3,053,517 UART: [fht] FMC Alias Private Key: 7
3,172,367 UART: [art] Extend RT PCRs Done
3,172,795 UART: [art] Lock RT PCRs Done
3,174,393 UART: [art] Populate DV Done
3,182,484 UART: [fht] FMC Alias Private Key: 7
3,183,570 UART: [art] Derive CDI
3,183,850 UART: [art] Store in slot 0x4
3,269,304 UART: [art] Derive Key Pair
3,269,664 UART: [art] Store priv key in slot 0x5
3,282,989 UART: [art] Derive Key Pair - Done
3,297,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,352 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,117 UART: [art] PUB.X = 7156E5F727F3A394700CF233FC36D26CD20B3E595194F5CDEDB0C7C9C16DD3611F5720C6E6BBE0D0BD04F22F47F5C8D9
3,320,892 UART: [art] PUB.Y = 20C8D233BC5712D8EA99997996FBD9F682A97A5C2C7EB53B19F595574BAE00EAE2A4982E0471FF3BAF684A4658E36414
3,327,823 UART: [art] SIG.R = F8B1DC26593CED141E292A52686CF7B39F43AFB4D90168AD8BDE88B6179D142C1FD0AA4D0F5F77E10EDC51A2C8E0C6EB
3,334,606 UART: [art] SIG.S = 362CE5A1F4B1FEA23140AC0CFC180B508B7CA037CD774B862687E81DF21793EB66C30D3F0B2EBBBB4DDFD0C58060585E
3,358,320 UART: Caliptra RT
3,358,663 UART: [state] CFI Enabled
3,479,465 UART: [rt] RT listening for mailbox commands...
3,480,135 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,603,199 UART: [rt]cmd =0x41544d4e, len=14344
3,912,810 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,197 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
890,944 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,048 UART: [kat] ++
895,200 UART: [kat] sha1
899,514 UART: [kat] SHA2-256
901,454 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
915,913 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,368 UART: [cold-reset] ++
1,169,740 UART: [fht] FHT @ 0x50003400
1,172,198 UART: [idev] ++
1,172,366 UART: [idev] CDI.KEYID = 6
1,172,727 UART: [idev] SUBJECT.KEYID = 7
1,173,152 UART: [idev] UDS.KEYID = 0
1,173,498 ready_for_fw is high
1,173,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,987 UART: [idev] Erasing UDS.KEYID = 0
1,197,421 UART: [idev] Sha1 KeyId Algorithm
1,206,473 UART: [idev] --
1,207,562 UART: [ldev] ++
1,207,730 UART: [ldev] CDI.KEYID = 6
1,208,094 UART: [ldev] SUBJECT.KEYID = 5
1,208,521 UART: [ldev] AUTHORITY.KEYID = 7
1,208,984 UART: [ldev] FE.KEYID = 1
1,214,344 UART: [ldev] Erasing FE.KEYID = 1
1,240,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,069 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,318 UART: [ldev] --
1,279,685 UART: [fwproc] Wait for Commands...
1,280,270 UART: [fwproc] Recv command 0x46574c44
1,281,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,069 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,244 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,585 >>> mbox cmd response: success
2,824,713 UART: [afmc] ++
2,824,881 UART: [afmc] CDI.KEYID = 6
2,825,244 UART: [afmc] SUBJECT.KEYID = 7
2,825,670 UART: [afmc] AUTHORITY.KEYID = 5
2,860,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,876,960 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,709 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,419 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,300 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,001 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,664 UART: [afmc] --
2,903,669 UART: [cold-reset] --
2,904,243 UART: [state] Locking Datavault
2,905,638 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,242 UART: [state] Locking ICCM
2,906,880 UART: [exit] Launching FMC @ 0x40000130
2,912,210 UART:
2,912,226 UART: Running Caliptra FMC ...
2,912,634 UART:
2,912,688 UART: [state] CFI Enabled
2,923,288 UART: [fht] FMC Alias Private Key: 7
3,042,054 UART: [art] Extend RT PCRs Done
3,042,482 UART: [art] Lock RT PCRs Done
3,044,132 UART: [art] Populate DV Done
3,052,691 UART: [fht] FMC Alias Private Key: 7
3,053,793 UART: [art] Derive CDI
3,054,073 UART: [art] Store in slot 0x4
3,139,950 UART: [art] Derive Key Pair
3,140,310 UART: [art] Store priv key in slot 0x5
3,153,548 UART: [art] Derive Key Pair - Done
3,168,613 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,567 UART: [art] PUB.X = 14BF940A026B3DF93CA2D2732AB198BA1CA6D6254E34BB842C95AC2817BC84BAC7B637BA630B907F8E8B4556FAD66D5F
3,191,344 UART: [art] PUB.Y = 796EC308D816230980F29AB897A18AEA530EF9B5263895406394C27B4AAEC594B62C627AF6A28C26A36A4E08A06FAF3C
3,198,286 UART: [art] SIG.R = CC454C6B621FC02B19EEAE9F753E0EE7AB516018C6FC15EE569F68E9F8988442C4F1BD9BC45AD87E362E595680C73681
3,205,063 UART: [art] SIG.S = 1A59F20E3AE386223E74AFD34DDE245EE032D185C9A1A4D2AF8626957F9B99E58E44FEFDB7BED02BC670D9859A0DEA17
3,229,467 UART: Caliptra RT
3,229,718 UART: [state] CFI Enabled
3,349,569 UART: [rt] RT listening for mailbox commands...
3,350,239 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,225 UART: [rt]cmd =0x41544d4e, len=14344
3,783,478 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,966 ready_for_fw is high
1,058,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,380 >>> mbox cmd response: success
2,738,503 UART:
2,738,519 UART: Running Caliptra FMC ...
2,738,927 UART:
2,738,981 UART: [state] CFI Enabled
2,749,789 UART: [fht] FMC Alias Private Key: 7
2,868,981 UART: [art] Extend RT PCRs Done
2,869,409 UART: [art] Lock RT PCRs Done
2,871,145 UART: [art] Populate DV Done
2,879,472 UART: [fht] FMC Alias Private Key: 7
2,880,586 UART: [art] Derive CDI
2,880,866 UART: [art] Store in slot 0x4
2,966,583 UART: [art] Derive Key Pair
2,966,943 UART: [art] Store priv key in slot 0x5
2,980,205 UART: [art] Derive Key Pair - Done
2,995,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,226 UART: [art] PUB.X = 9B1946D9E26ADDACCD22B627CB13954E5656D6A113E033BD30BD6C198547E6582B84B25D96D60B4A9D6E9B27A34D8A77
3,018,001 UART: [art] PUB.Y = 6F2FC46169688674604B2FC5C45603674B08260374BC25C048FB12CB3C9066407A207BDBED2D1AC554F1894FB844965F
3,024,938 UART: [art] SIG.R = D2B54F9C2AB70817D67148521E81A41D5C2C6BFA7539F5E770D1D4B88B1E8CA2145F9D04C58EBCB80EDE715167E6790C
3,031,706 UART: [art] SIG.S = 919B68A80530E60F460E8228087DA5BBBBC56D027F2AB56756AE4FD5D7387C283E9B85EB3E84D58393BBA52103DB35DC
3,055,742 UART: Caliptra RT
3,055,993 UART: [state] CFI Enabled
3,175,135 UART: [rt] RT listening for mailbox commands...
3,175,805 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,845 UART: [rt]cmd =0x41544d4e, len=14344
3,609,174 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,131 UART: [state] LifecycleState = Unprovisioned
85,786 UART: [state] DebugLocked = No
86,484 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,224 UART: [kat] SHA2-512-ACC
906,125 UART: [kat] ECC-384
915,856 UART: [kat] HMAC-384Kdf
920,520 UART: [kat] LMS
1,168,832 UART: [kat] --
1,169,529 UART: [cold-reset] ++
1,169,963 UART: [fht] FHT @ 0x50003400
1,172,635 UART: [idev] ++
1,172,803 UART: [idev] CDI.KEYID = 6
1,173,164 UART: [idev] SUBJECT.KEYID = 7
1,173,589 UART: [idev] UDS.KEYID = 0
1,173,935 ready_for_fw is high
1,173,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,082 UART: [idev] Erasing UDS.KEYID = 0
1,197,942 UART: [idev] Sha1 KeyId Algorithm
1,206,808 UART: [idev] --
1,207,785 UART: [ldev] ++
1,207,953 UART: [ldev] CDI.KEYID = 6
1,208,317 UART: [ldev] SUBJECT.KEYID = 5
1,208,744 UART: [ldev] AUTHORITY.KEYID = 7
1,209,207 UART: [ldev] FE.KEYID = 1
1,214,289 UART: [ldev] Erasing FE.KEYID = 1
1,240,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,329 UART: [ldev] --
1,279,700 UART: [fwproc] Wait for Commands...
1,280,313 UART: [fwproc] Recv command 0x46574c44
1,281,046 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,339 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,487 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,868 >>> mbox cmd response: success
2,825,976 UART: [afmc] ++
2,826,144 UART: [afmc] CDI.KEYID = 6
2,826,507 UART: [afmc] SUBJECT.KEYID = 7
2,826,933 UART: [afmc] AUTHORITY.KEYID = 5
2,863,092 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,208 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,500 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,353 UART: [afmc] --
2,906,392 UART: [cold-reset] --
2,907,116 UART: [state] Locking Datavault
2,908,663 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,267 UART: [state] Locking ICCM
2,909,817 UART: [exit] Launching FMC @ 0x40000130
2,915,147 UART:
2,915,163 UART: Running Caliptra FMC ...
2,915,571 UART:
2,915,714 UART: [state] CFI Enabled
2,926,194 UART: [fht] FMC Alias Private Key: 7
3,045,984 UART: [art] Extend RT PCRs Done
3,046,412 UART: [art] Lock RT PCRs Done
3,047,758 UART: [art] Populate DV Done
3,055,943 UART: [fht] FMC Alias Private Key: 7
3,056,909 UART: [art] Derive CDI
3,057,189 UART: [art] Store in slot 0x4
3,143,066 UART: [art] Derive Key Pair
3,143,426 UART: [art] Store priv key in slot 0x5
3,156,850 UART: [art] Derive Key Pair - Done
3,171,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,337 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,102 UART: [art] PUB.X = 04C2A8B7AD46EA5DAD8AD1116BBE68983DCA40D40814B965180C8CEBC6AD89B677A3FD164C26C5E3BC9965AE09AD2D0A
3,194,879 UART: [art] PUB.Y = E274F3A121FD3F2D8B0674E316D440793EE8DAE25532C965E88CDA1C40B7B135623112C3A06AEC4E7A0F65E6E03B246D
3,201,831 UART: [art] SIG.R = 320C7BB506383EDB3B5DD848685719479D42683A356B61DF8B1200D2A3106C0F597A9CBEFB966DB885FF311AE702FF4C
3,208,573 UART: [art] SIG.S = F1D26890A25EE088B943028B2C9094D180CA2E630A02574301E3E8342B1624E8FA2361DED90243BB8887D75798CB4729
3,232,234 UART: Caliptra RT
3,232,577 UART: [state] CFI Enabled
3,352,616 UART: [rt] RT listening for mailbox commands...
3,353,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,422 UART: [rt]cmd =0x41544d4e, len=14344
3,786,167 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,701 ready_for_fw is high
1,059,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,827 >>> mbox cmd response: success
2,742,830 UART:
2,742,846 UART: Running Caliptra FMC ...
2,743,254 UART:
2,743,397 UART: [state] CFI Enabled
2,754,149 UART: [fht] FMC Alias Private Key: 7
2,873,199 UART: [art] Extend RT PCRs Done
2,873,627 UART: [art] Lock RT PCRs Done
2,875,203 UART: [art] Populate DV Done
2,883,428 UART: [fht] FMC Alias Private Key: 7
2,884,406 UART: [art] Derive CDI
2,884,686 UART: [art] Store in slot 0x4
2,970,631 UART: [art] Derive Key Pair
2,970,991 UART: [art] Store priv key in slot 0x5
2,984,689 UART: [art] Derive Key Pair - Done
2,999,300 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,981 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,746 UART: [art] PUB.X = A2845B57BB5F6BC3621C9C75EA3F3AED56EE85813C438449C45D69C9E7B8CC8E634C9FA12E9059EF2FFC1F547CCFE538
3,022,534 UART: [art] PUB.Y = B7861E9064A7BC9F8DAB5DFB6CBA54FDD102C3DB8732867BD3F746E8328CC0A72C42D17ECEDBD7F2979C2AECA246BC3D
3,029,509 UART: [art] SIG.R = 9B7BA9C61AC0B24BEDB72D7CCA6BFD771B4DB1177B5F80AC7161EB66F30561C6124EAC0393786C4A9BB8913EDBB6CE45
3,036,295 UART: [art] SIG.S = B8F19B0E680D89203C00FF09F0FB598A92BC7DF9CA5770598CA673E277B27D741D47C9DD3A17EFD282725C019E7B9F96
3,060,137 UART: Caliptra RT
3,060,480 UART: [state] CFI Enabled
3,179,950 UART: [rt] RT listening for mailbox commands...
3,180,620 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,880 UART: [rt]cmd =0x41544d4e, len=14344
3,614,391 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,522 UART: [state] LifecycleState = Unprovisioned
86,177 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
88,024 UART: [kat] SHA2-256
893,674 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,799 UART: [kat] ++
897,951 UART: [kat] sha1
902,229 UART: [kat] SHA2-256
904,169 UART: [kat] SHA2-384
906,982 UART: [kat] SHA2-512-ACC
908,883 UART: [kat] ECC-384
918,678 UART: [kat] HMAC-384Kdf
923,264 UART: [kat] LMS
1,171,592 UART: [kat] --
1,172,435 UART: [cold-reset] ++
1,172,929 UART: [fht] FHT @ 0x50003400
1,175,596 UART: [idev] ++
1,175,764 UART: [idev] CDI.KEYID = 6
1,176,124 UART: [idev] SUBJECT.KEYID = 7
1,176,548 UART: [idev] UDS.KEYID = 0
1,176,893 ready_for_fw is high
1,176,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,722 UART: [idev] Erasing UDS.KEYID = 0
1,201,663 UART: [idev] Sha1 KeyId Algorithm
1,210,031 UART: [idev] --
1,211,001 UART: [ldev] ++
1,211,169 UART: [ldev] CDI.KEYID = 6
1,211,532 UART: [ldev] SUBJECT.KEYID = 5
1,211,958 UART: [ldev] AUTHORITY.KEYID = 7
1,212,421 UART: [ldev] FE.KEYID = 1
1,217,571 UART: [ldev] Erasing FE.KEYID = 1
1,243,674 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,639 UART: [ldev] --
1,283,030 UART: [fwproc] Wait for Commands...
1,283,790 UART: [fwproc] Recv command 0x46574c44
1,284,518 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,732 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,902 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,143 >>> mbox cmd response: success
2,828,369 UART: [afmc] ++
2,828,537 UART: [afmc] CDI.KEYID = 6
2,828,899 UART: [afmc] SUBJECT.KEYID = 7
2,829,324 UART: [afmc] AUTHORITY.KEYID = 5
2,865,049 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,120 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,868 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,577 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,460 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,161 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,177 UART: [afmc] --
2,908,251 UART: [cold-reset] --
2,909,237 UART: [state] Locking Datavault
2,910,632 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,236 UART: [state] Locking ICCM
2,911,786 UART: [exit] Launching FMC @ 0x40000130
2,917,116 UART:
2,917,132 UART: Running Caliptra FMC ...
2,917,540 UART:
2,917,594 UART: [state] CFI Enabled
2,928,348 UART: [fht] FMC Alias Private Key: 7
3,047,434 UART: [art] Extend RT PCRs Done
3,047,862 UART: [art] Lock RT PCRs Done
3,049,510 UART: [art] Populate DV Done
3,057,617 UART: [fht] FMC Alias Private Key: 7
3,058,587 UART: [art] Derive CDI
3,058,867 UART: [art] Store in slot 0x4
3,144,974 UART: [art] Derive Key Pair
3,145,334 UART: [art] Store priv key in slot 0x5
3,158,850 UART: [art] Derive Key Pair - Done
3,173,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,741 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,506 UART: [art] PUB.X = AD1E07CC91512C19E7B4B6202CFD662AFBF366923363AA29740EC7AA467093A38BA07AD423010F63A3F2F015C733742B
3,197,268 UART: [art] PUB.Y = BEB3A733907ECD18DB262947FF947B1F4986E4B1EB3A6D877E0717673AC6CE31B95DD234BBAC43F6FED4F1347B6CBF0A
3,204,232 UART: [art] SIG.R = 09EF82D8BD0084189BA5D34C47EE0A31B9CB7E2B4892575A15FB06DF5763AD39408EDEF288447816D7DC5AD7C58CB3D8
3,210,983 UART: [art] SIG.S = A641C38439B54702C252B152F5857941FB812DD08BD389F182FF32963F8151B68FFF8425531BEABEBA87454D467A59D8
3,235,022 UART: Caliptra RT
3,235,273 UART: [state] CFI Enabled
3,354,616 UART: [rt] RT listening for mailbox commands...
3,355,286 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,372 UART: [rt]cmd =0x41544d4e, len=14344
3,788,707 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 ready_for_fw is high
1,060,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,628 >>> mbox cmd response: success
2,738,809 UART:
2,738,825 UART: Running Caliptra FMC ...
2,739,233 UART:
2,739,287 UART: [state] CFI Enabled
2,749,519 UART: [fht] FMC Alias Private Key: 7
2,868,489 UART: [art] Extend RT PCRs Done
2,868,917 UART: [art] Lock RT PCRs Done
2,870,633 UART: [art] Populate DV Done
2,878,904 UART: [fht] FMC Alias Private Key: 7
2,879,992 UART: [art] Derive CDI
2,880,272 UART: [art] Store in slot 0x4
2,966,101 UART: [art] Derive Key Pair
2,966,461 UART: [art] Store priv key in slot 0x5
2,980,043 UART: [art] Derive Key Pair - Done
2,994,574 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,087 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,852 UART: [art] PUB.X = B2D9873CCED691B7719B070A74FD051187410DCB4953F7BA24051C71ECDF43738BFFF7A5221B938D5A41EFC95645A779
3,017,613 UART: [art] PUB.Y = 9B58DADCBA3242A54E79B6553C656614976E0CD3E006D09516CC9F6DE22F56CBA86497FABF46B4D350E7455F43A26DA1
3,024,567 UART: [art] SIG.R = E62AC6593C93DA84BB43501C07A1699C7EECA50234CA2B166D0673CCB578BFF7D09EEACAC8E26A07A2B6B7209E76D8E5
3,031,343 UART: [art] SIG.S = C2593BABB484D1F9F6DE60DACEE3E5201F2E1D3F6A03213AF8C09576D407DC8D896D4117B0917AE37B08D1451E19458A
3,055,190 UART: Caliptra RT
3,055,441 UART: [state] CFI Enabled
3,174,929 UART: [rt] RT listening for mailbox commands...
3,175,599 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,298,739 UART: [rt]cmd =0x41544d4e, len=14344
3,608,814 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,177 UART: [state] LifecycleState = Unprovisioned
85,832 UART: [state] DebugLocked = No
86,518 UART: [state] WD Timer not started. Device not locked for debugging
87,629 UART: [kat] SHA2-256
893,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,404 UART: [kat] ++
897,556 UART: [kat] sha1
901,820 UART: [kat] SHA2-256
903,760 UART: [kat] SHA2-384
906,447 UART: [kat] SHA2-512-ACC
908,348 UART: [kat] ECC-384
917,845 UART: [kat] HMAC-384Kdf
922,503 UART: [kat] LMS
1,170,831 UART: [kat] --
1,171,844 UART: [cold-reset] ++
1,172,224 UART: [fht] FHT @ 0x50003400
1,174,757 UART: [idev] ++
1,174,925 UART: [idev] CDI.KEYID = 6
1,175,285 UART: [idev] SUBJECT.KEYID = 7
1,175,709 UART: [idev] UDS.KEYID = 0
1,176,054 ready_for_fw is high
1,176,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,054 UART: [idev] Sha1 KeyId Algorithm
1,209,586 UART: [idev] --
1,210,542 UART: [ldev] ++
1,210,710 UART: [ldev] CDI.KEYID = 6
1,211,073 UART: [ldev] SUBJECT.KEYID = 5
1,211,499 UART: [ldev] AUTHORITY.KEYID = 7
1,211,962 UART: [ldev] FE.KEYID = 1
1,217,276 UART: [ldev] Erasing FE.KEYID = 1
1,244,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,824 UART: [ldev] --
1,283,153 UART: [fwproc] Wait for Commands...
1,283,823 UART: [fwproc] Recv command 0x46574c44
1,284,551 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,643 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,002 >>> mbox cmd response: success
2,828,146 UART: [afmc] ++
2,828,314 UART: [afmc] CDI.KEYID = 6
2,828,676 UART: [afmc] SUBJECT.KEYID = 7
2,829,101 UART: [afmc] AUTHORITY.KEYID = 5
2,864,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,759 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,099 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,800 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,680 UART: [afmc] --
2,907,666 UART: [cold-reset] --
2,908,642 UART: [state] Locking Datavault
2,909,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,505 UART: [state] Locking ICCM
2,911,071 UART: [exit] Launching FMC @ 0x40000130
2,916,401 UART:
2,916,417 UART: Running Caliptra FMC ...
2,916,825 UART:
2,916,968 UART: [state] CFI Enabled
2,927,716 UART: [fht] FMC Alias Private Key: 7
3,046,338 UART: [art] Extend RT PCRs Done
3,046,766 UART: [art] Lock RT PCRs Done
3,048,572 UART: [art] Populate DV Done
3,056,791 UART: [fht] FMC Alias Private Key: 7
3,057,935 UART: [art] Derive CDI
3,058,215 UART: [art] Store in slot 0x4
3,144,428 UART: [art] Derive Key Pair
3,144,788 UART: [art] Store priv key in slot 0x5
3,157,132 UART: [art] Derive Key Pair - Done
3,171,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,525 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,290 UART: [art] PUB.X = 15BF21334C01F3CACCD2D4735E35A53DEFAB599C78A00D1221956127CA4070E2BDFA3D8BA104CA6F6067D36A6626D6A0
3,195,063 UART: [art] PUB.Y = 6F1E5B689438D2432FF5BB44AFAB558BB7759715F550FC6F908F7196BBB52EFA968AC48FB958D74AB296518A7958FA50
3,202,021 UART: [art] SIG.R = DDCAAEE91CC25879D60B859E8CE98D922D4629D06BF662F33786341567C0E830915A6848AA358B3A43D5E04F8CBDE14F
3,208,796 UART: [art] SIG.S = 1C258B36F5C9B7886A03A7675E7169174178081543CC3BBDE9A5B926C2AAFA05798A8F9979DAEDB31A65FF0BD73421D9
3,232,748 UART: Caliptra RT
3,233,091 UART: [state] CFI Enabled
3,351,928 UART: [rt] RT listening for mailbox commands...
3,352,598 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,564 UART: [rt]cmd =0x41544d4e, len=14344
3,784,493 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.39s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,232 ready_for_fw is high
1,060,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,691 >>> mbox cmd response: success
2,743,982 UART:
2,743,998 UART: Running Caliptra FMC ...
2,744,406 UART:
2,744,549 UART: [state] CFI Enabled
2,755,207 UART: [fht] FMC Alias Private Key: 7
2,874,235 UART: [art] Extend RT PCRs Done
2,874,663 UART: [art] Lock RT PCRs Done
2,876,311 UART: [art] Populate DV Done
2,884,724 UART: [fht] FMC Alias Private Key: 7
2,885,792 UART: [art] Derive CDI
2,886,072 UART: [art] Store in slot 0x4
2,971,963 UART: [art] Derive Key Pair
2,972,323 UART: [art] Store priv key in slot 0x5
2,985,567 UART: [art] Derive Key Pair - Done
3,000,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,898 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,663 UART: [art] PUB.X = 2D4F9D7DA464E1EF71B3A4BEEC2EE57C4FDD64D3B936B6CD1FB5DEA4C3B189CF006DE8B8417CFFC833ED8A296F81FF49
3,023,443 UART: [art] PUB.Y = 91F56BCCC7A4531B89A5E1977F1B9A244782AFC69C6B5AAC2D66F372068155F90181F1315C0017DBB6B51A5EE94386A2
3,030,369 UART: [art] SIG.R = DB9404C049F2A0F8CA0F325179185F6FC88743216CEE22301C7D3F29C32480D21AE49E0633267B5F3124A2C89AC15B71
3,037,128 UART: [art] SIG.S = 67CE571194AE0ABE7C10261C2EB8AA761BCEB4CBF6A3CA86B47744251D37EF74C62F6368C5177C40EB5085D012668A4C
3,061,057 UART: Caliptra RT
3,061,400 UART: [state] CFI Enabled
3,181,235 UART: [rt] RT listening for mailbox commands...
3,181,905 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,651 UART: [rt]cmd =0x41544d4e, len=14344
3,614,702 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,247 UART:
192,587 UART: Running Caliptra ROM ...
193,778 UART:
193,931 UART: [state] CFI Enabled
264,976 UART: [state] LifecycleState = Unprovisioned
266,966 UART: [state] DebugLocked = No
269,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,815 UART: [kat] SHA2-256
443,580 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,032 UART: [kat] ++
454,637 UART: [kat] sha1
465,462 UART: [kat] SHA2-256
468,101 UART: [kat] SHA2-384
473,822 UART: [kat] SHA2-512-ACC
476,191 UART: [kat] ECC-384
2,767,290 UART: [kat] HMAC-384Kdf
2,799,717 UART: [kat] LMS
3,990,023 UART: [kat] --
3,992,202 UART: [cold-reset] ++
3,993,931 UART: [fht] Storing FHT @ 0x50003400
4,004,838 UART: [idev] ++
4,005,476 UART: [idev] CDI.KEYID = 6
4,006,412 UART: [idev] SUBJECT.KEYID = 7
4,007,593 UART: [idev] UDS.KEYID = 0
4,008,669 ready_for_fw is high
4,008,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,942 UART: [idev] Erasing UDS.KEYID = 0
7,342,791 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,918 UART: [idev] --
7,367,832 UART: [ldev] ++
7,368,454 UART: [ldev] CDI.KEYID = 6
7,369,334 UART: [ldev] SUBJECT.KEYID = 5
7,370,601 UART: [ldev] AUTHORITY.KEYID = 7
7,371,830 UART: [ldev] FE.KEYID = 1
7,420,099 UART: [ldev] Erasing FE.KEYID = 1
10,753,358 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,263 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,843 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,025 UART: [ldev] --
13,135,272 UART: [fwproc] Waiting for Commands...
13,136,934 UART: [fwproc] Received command 0x46574c44
13,139,125 UART: [fwproc] Received Image of size 118548 bytes
22,224,872 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,309,375 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,382,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,710,373 >>> mbox cmd response: success
22,714,617 UART: [afmc] ++
22,715,239 UART: [afmc] CDI.KEYID = 6
22,716,320 UART: [afmc] SUBJECT.KEYID = 7
22,717,425 UART: [afmc] AUTHORITY.KEYID = 5
26,078,879 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,381,713 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,384,034 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,398,507 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,413,278 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,427,670 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,449,608 UART: [afmc] --
28,453,251 UART: [cold-reset] --
28,456,946 UART: [state] Locking Datavault
28,462,615 UART: [state] Locking PCR0, PCR1 and PCR31
28,464,398 UART: [state] Locking ICCM
28,466,744 UART: [exit] Launching FMC @ 0x40000130
28,475,138 UART:
28,475,374 UART: Running Caliptra FMC ...
28,476,477 UART:
28,476,640 UART: [state] CFI Enabled
28,538,743 UART: [fht] FMC Alias Private Key: 7
30,878,927 UART: [art] Extend RT PCRs Done
30,880,169 UART: [art] Lock RT PCRs Done
30,881,584 UART: [art] Populate DV Done
30,887,159 UART: [fht] FMC Alias Private Key: 7
30,888,860 UART: [art] Derive CDI
30,889,675 UART: [art] Store in slot 0x4
30,947,108 UART: [art] Derive Key Pair
30,948,144 UART: [art] Store priv key in slot 0x5
34,241,485 UART: [art] Derive Key Pair - Done
34,254,376 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,542,605 UART: [art] Erasing AUTHORITY.KEYID = 7
36,544,109 UART: [art] PUB.X = BB6D54AD7795420CDD4F8F511AFD7B4C7A77C01AE3349B2F0FB71B14A0AFCAB1CBA66809A7BF9B122499F17308BA398D
36,551,404 UART: [art] PUB.Y = E7167F12AC9132344A1573A260149D7D77133165E3A9CAFF34AE5E2C1E8D3458584D2CA63F35E9FDE2F0392FF502D16F
36,558,637 UART: [art] SIG.R = 103795D7D39C743677422C644E9097008D3382B9CAB7F65CB145F76BF7AAAA46A69D5EF2B8BD25E96C35DD86CEE4FC23
36,566,019 UART: [art] SIG.S = C311796879BD9F955E958B82498A9532F093B08BA64B1DE5CC651E89DEACCD0CFE3A7BE52441451950DAFF7E1053271F
37,871,555 UART: Caliptra RT
37,872,276 UART: [state] CFI Enabled
38,047,887 UART: [rt] RT listening for mailbox commands...
38,050,213 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,205,783 UART: [rt]cmd =0x41544d4e, len=14344
42,356,292 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
3,805,770 ready_for_fw is high
3,806,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,094,236 >>> mbox cmd response: success
27,788,686 UART:
27,789,084 UART: Running Caliptra FMC ...
27,790,235 UART:
27,790,395 UART: [state] CFI Enabled
27,858,939 UART: [fht] FMC Alias Private Key: 7
30,199,019 UART: [art] Extend RT PCRs Done
30,200,251 UART: [art] Lock RT PCRs Done
30,201,664 UART: [art] Populate DV Done
30,206,973 UART: [fht] FMC Alias Private Key: 7
30,208,634 UART: [art] Derive CDI
30,209,454 UART: [art] Store in slot 0x4
30,267,961 UART: [art] Derive Key Pair
30,269,023 UART: [art] Store priv key in slot 0x5
33,561,677 UART: [art] Derive Key Pair - Done
33,574,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,862,789 UART: [art] Erasing AUTHORITY.KEYID = 7
35,864,299 UART: [art] PUB.X = F9A019801D47DB90037E08D27F27470A74E83539E424864ED64E44C675E5DBFEC5162AA98B26533696A7B5322A4DD116
35,871,612 UART: [art] PUB.Y = EE6E9E01620DCFEBCC737F82D68281B1E612B2C4556031C984F4FF9B7EB1100BFD6487FDDFAD6A34A07976EB442BBE42
35,878,821 UART: [art] SIG.R = 9F263732578608F2C31BB4DC8EB8529067CD229211CC45A7C7763C3C9012EA3259698481252EA2AB9B1F9617D289427E
35,886,219 UART: [art] SIG.S = 4B744F26335A5187F3F1D45E880393B143D0746A878AB28F98BD7BADBF858989B483035C21AD28378CC46C0AF23DEB51
37,191,256 UART: Caliptra RT
37,191,974 UART: [state] CFI Enabled
37,367,942 UART: [rt] RT listening for mailbox commands...
37,370,246 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,525,506 UART: [rt]cmd =0x41544d4e, len=14344
41,702,497 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,354 UART:
192,704 UART: Running Caliptra ROM ...
193,831 UART:
603,716 UART: [state] CFI Enabled
615,317 UART: [state] LifecycleState = Unprovisioned
617,194 UART: [state] DebugLocked = No
619,359 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,995 UART: [kat] SHA2-256
793,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,295 UART: [kat] ++
804,817 UART: [kat] sha1
815,127 UART: [kat] SHA2-256
817,837 UART: [kat] SHA2-384
824,389 UART: [kat] SHA2-512-ACC
826,758 UART: [kat] ECC-384
3,109,599 UART: [kat] HMAC-384Kdf
3,120,685 UART: [kat] LMS
4,310,821 UART: [kat] --
4,315,478 UART: [cold-reset] ++
4,316,840 UART: [fht] Storing FHT @ 0x50003400
4,327,183 UART: [idev] ++
4,327,746 UART: [idev] CDI.KEYID = 6
4,328,621 UART: [idev] SUBJECT.KEYID = 7
4,329,928 UART: [idev] UDS.KEYID = 0
4,330,921 ready_for_fw is high
4,331,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,959 UART: [idev] Erasing UDS.KEYID = 0
7,615,894 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,211 UART: [idev] --
7,640,876 UART: [ldev] ++
7,641,449 UART: [ldev] CDI.KEYID = 6
7,642,426 UART: [ldev] SUBJECT.KEYID = 5
7,643,580 UART: [ldev] AUTHORITY.KEYID = 7
7,645,135 UART: [ldev] FE.KEYID = 1
7,655,873 UART: [ldev] Erasing FE.KEYID = 1
10,947,969 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,915 UART: [ldev] --
13,311,896 UART: [fwproc] Waiting for Commands...
13,314,951 UART: [fwproc] Received command 0x46574c44
13,317,121 UART: [fwproc] Received Image of size 118548 bytes
22,801,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,888,275 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,961,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,290,187 >>> mbox cmd response: success
23,294,719 UART: [afmc] ++
23,295,321 UART: [afmc] CDI.KEYID = 6
23,296,202 UART: [afmc] SUBJECT.KEYID = 7
23,297,465 UART: [afmc] AUTHORITY.KEYID = 5
26,606,822 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,900,272 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,902,526 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,916,991 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,931,804 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,946,203 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,967,390 UART: [afmc] --
28,971,144 UART: [cold-reset] --
28,975,378 UART: [state] Locking Datavault
28,979,967 UART: [state] Locking PCR0, PCR1 and PCR31
28,981,709 UART: [state] Locking ICCM
28,983,423 UART: [exit] Launching FMC @ 0x40000130
28,991,812 UART:
28,992,048 UART: Running Caliptra FMC ...
28,993,149 UART:
28,993,298 UART: [state] CFI Enabled
29,001,340 UART: [fht] FMC Alias Private Key: 7
31,341,451 UART: [art] Extend RT PCRs Done
31,342,665 UART: [art] Lock RT PCRs Done
31,344,262 UART: [art] Populate DV Done
31,349,829 UART: [fht] FMC Alias Private Key: 7
31,351,572 UART: [art] Derive CDI
31,352,302 UART: [art] Store in slot 0x4
31,394,994 UART: [art] Derive Key Pair
31,395,987 UART: [art] Store priv key in slot 0x5
34,638,357 UART: [art] Derive Key Pair - Done
34,651,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,931,985 UART: [art] Erasing AUTHORITY.KEYID = 7
36,933,491 UART: [art] PUB.X = D8D23BE0999FCDA2198466902037FF6862E64C53ED6F99E48FDA6CF2D7C2DA5330C913A915DED4EAA2D2CFEB8DF16C91
36,940,791 UART: [art] PUB.Y = C6EAEBC55BFD704650D3825E62B23D0AD85139F6A87D52BF78C8C73C00128CDEF23F2159EA6164409B1B811687911FEA
36,948,017 UART: [art] SIG.R = FC0A19BFE2B367690737A3826CF1B10C7DE8729B9165A492D56C5AF5503861932A2E07FAB96E31E7E2EA8F8CC6860C42
36,955,397 UART: [art] SIG.S = 0775B803F5465042EF68BAF7C19C3799678F01627DB038C58A0D38D6438CE8EC510010B800B121DBDC45DE3E93827C28
38,260,392 UART: Caliptra RT
38,261,105 UART: [state] CFI Enabled
38,392,987 UART: [rt] RT listening for mailbox commands...
38,395,316 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,550,400 UART: [rt]cmd =0x41544d4e, len=14344
42,752,844 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,248 writing to cptra_bootfsm_go
4,129,184 ready_for_fw is high
4,129,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,272,897 >>> mbox cmd response: success
27,913,551 UART:
27,913,949 UART: Running Caliptra FMC ...
27,915,097 UART:
27,915,262 UART: [state] CFI Enabled
27,923,021 UART: [fht] FMC Alias Private Key: 7
30,263,535 UART: [art] Extend RT PCRs Done
30,264,758 UART: [art] Lock RT PCRs Done
30,266,327 UART: [art] Populate DV Done
30,271,509 UART: [fht] FMC Alias Private Key: 7
30,273,207 UART: [art] Derive CDI
30,274,075 UART: [art] Store in slot 0x4
30,316,922 UART: [art] Derive Key Pair
30,317,917 UART: [art] Store priv key in slot 0x5
33,559,917 UART: [art] Derive Key Pair - Done
33,572,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,853,231 UART: [art] Erasing AUTHORITY.KEYID = 7
35,854,737 UART: [art] PUB.X = A069BA91DD8C9A597A3B8F55BFC92AB58B539160D3A32891C2F71861F7681A11389C956643584FB7CB2B1E306149C007
35,861,982 UART: [art] PUB.Y = DCD70D9CAB101B1EFF2639A6C7FD316C85F78E06C93D9C5DEED0519F5519C345483C02E9CCBEBADE197BD345E437B752
35,869,258 UART: [art] SIG.R = B36689C9DD6918287830545B67F9BF674891FCF1F6793CA05D32FF0DA4689AB97BB3AA6E4613180FC5EFDF6B44A3CE52
35,876,655 UART: [art] SIG.S = 405629BF547A076A28978CC98EF17A479545792AE018340F3ACC3EDE95DE64E735D0AE43C2963855D0F69AA7EEB6BAAB
37,182,007 UART: Caliptra RT
37,182,718 UART: [state] CFI Enabled
37,315,672 UART: [rt] RT listening for mailbox commands...
37,317,986 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,473,271 UART: [rt]cmd =0x41544d4e, len=14344
41,650,168 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,423 UART:
192,767 UART: Running Caliptra ROM ...
193,960 UART:
194,111 UART: [state] CFI Enabled
263,318 UART: [state] LifecycleState = Unprovisioned
265,309 UART: [state] DebugLocked = No
266,907 UART: [state] WD Timer not started. Device not locked for debugging
270,724 UART: [kat] SHA2-256
450,365 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,105 UART: [kat] ++
461,621 UART: [kat] sha1
471,371 UART: [kat] SHA2-256
474,034 UART: [kat] SHA2-384
479,648 UART: [kat] SHA2-512-ACC
482,016 UART: [kat] ECC-384
2,926,327 UART: [kat] HMAC-384Kdf
2,950,637 UART: [kat] LMS
3,427,123 UART: [kat] --
3,431,923 UART: [cold-reset] ++
3,432,930 UART: [fht] FHT @ 0x50003400
3,445,595 UART: [idev] ++
3,446,176 UART: [idev] CDI.KEYID = 6
3,447,085 UART: [idev] SUBJECT.KEYID = 7
3,448,324 UART: [idev] UDS.KEYID = 0
3,449,367 ready_for_fw is high
3,449,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,723 UART: [idev] Erasing UDS.KEYID = 0
5,967,343 UART: [idev] Sha1 KeyId Algorithm
5,991,317 UART: [idev] --
5,997,024 UART: [ldev] ++
5,997,648 UART: [ldev] CDI.KEYID = 6
5,998,564 UART: [ldev] SUBJECT.KEYID = 5
5,999,720 UART: [ldev] AUTHORITY.KEYID = 7
6,001,003 UART: [ldev] FE.KEYID = 1
6,037,289 UART: [ldev] Erasing FE.KEYID = 1
8,542,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,241 UART: [ldev] --
10,354,343 UART: [fwproc] Wait for Commands...
10,357,403 UART: [fwproc] Recv command 0x46574c44
10,359,403 UART: [fwproc] Recv'd Img size: 118548 bytes
14,897,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,979,758 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,052,817 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,381,058 >>> mbox cmd response: success
15,384,425 UART: [afmc] ++
15,385,010 UART: [afmc] CDI.KEYID = 6
15,385,983 UART: [afmc] SUBJECT.KEYID = 7
15,387,192 UART: [afmc] AUTHORITY.KEYID = 5
17,916,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,641,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,644,202 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,660,045 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,675,973 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,691,642 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,715,716 UART: [afmc] --
19,719,713 UART: [cold-reset] --
19,724,655 UART: [state] Locking Datavault
19,728,599 UART: [state] Locking PCR0, PCR1 and PCR31
19,730,347 UART: [state] Locking ICCM
19,732,090 UART: [exit] Launching FMC @ 0x40000130
19,740,480 UART:
19,740,709 UART: Running Caliptra FMC ...
19,741,731 UART:
19,741,874 UART: [state] CFI Enabled
19,798,183 UART: [fht] FMC Alias Private Key: 7
21,564,873 UART: [art] Extend RT PCRs Done
21,566,094 UART: [art] Lock RT PCRs Done
21,567,802 UART: [art] Populate DV Done
21,573,341 UART: [fht] FMC Alias Private Key: 7
21,574,874 UART: [art] Derive CDI
21,575,690 UART: [art] Store in slot 0x4
21,630,590 UART: [art] Derive Key Pair
21,631,623 UART: [art] Store priv key in slot 0x5
24,095,101 UART: [art] Derive Key Pair - Done
24,108,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,821,200 UART: [art] Erasing AUTHORITY.KEYID = 7
25,822,685 UART: [art] PUB.X = 7B9574E1033B3E66A2FADDC42898D8A048B8195ECBDE76D0B4E0DE4C99DE83190D054EAC1DD6256D41990A70C5DB90B6
25,829,980 UART: [art] PUB.Y = B16157B1D9CCFD79736D7503ADE3F18969D89F21B3904D253C226C521467408A14680456404690641758236B358DAEBA
25,837,180 UART: [art] SIG.R = D695E727B290877275A1AF9C9055827FFEB4D9FBC7A100C04FC3EB9AD9F3827BEB62C7AFD470A759344D3A766A01C860
25,844,588 UART: [art] SIG.S = CEF7DC0B1F33586DB1BD922B4160348F61C632CEB0216E391D745B637D39A2994A24C4F9289878445906E3397AF443F4
26,823,521 UART: Caliptra RT
26,824,229 UART: [state] CFI Enabled
27,005,976 UART: [rt] RT listening for mailbox commands...
27,008,325 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,163,588 UART: [rt]cmd =0x41544d4e, len=14344
29,584,146 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
3,458,819 ready_for_fw is high
3,459,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,398,288 >>> mbox cmd response: success
19,684,397 UART:
19,684,848 UART: Running Caliptra FMC ...
19,685,972 UART:
19,686,126 UART: [state] CFI Enabled
19,755,182 UART: [fht] FMC Alias Private Key: 7
21,521,562 UART: [art] Extend RT PCRs Done
21,522,787 UART: [art] Lock RT PCRs Done
21,524,520 UART: [art] Populate DV Done
21,529,882 UART: [fht] FMC Alias Private Key: 7
21,531,580 UART: [art] Derive CDI
21,532,394 UART: [art] Store in slot 0x4
21,588,167 UART: [art] Derive Key Pair
21,589,234 UART: [art] Store priv key in slot 0x5
24,052,156 UART: [art] Derive Key Pair - Done
24,065,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,777,848 UART: [art] Erasing AUTHORITY.KEYID = 7
25,779,347 UART: [art] PUB.X = 55AB531E43BB0C508A221C3C4B3F2426647EAF9EB9860C82C0CFFB4B0809896EA840991A26E595887B0FBF5E45D36A74
25,786,596 UART: [art] PUB.Y = 1F99E19BE258365905132B29A60FA07D7E40857A0DF9D07EA9BC7BDDE1D6773C13FB36FB627E8EECA7EA68C357677C7D
25,793,885 UART: [art] SIG.R = C2BDD53D5CB6B3BE7CB69AEC407D6D66B523FA461E128DD318FEF57E700C2C7E7B0D7409D70734908EC64FCD4399CEA6
25,801,295 UART: [art] SIG.S = 2DC45B749EE8EE93A2197E44DBD118561A5E06115777C95208D117FCD7D2867854F1B227D196BC783DA4DC86E8AC73C1
26,780,416 UART: Caliptra RT
26,781,120 UART: [state] CFI Enabled
26,961,630 UART: [rt] RT listening for mailbox commands...
26,963,934 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,119,192 UART: [rt]cmd =0x41544d4e, len=14344
29,550,718 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,608 UART:
192,961 UART: Running Caliptra ROM ...
194,180 UART:
603,627 UART: [state] CFI Enabled
617,643 UART: [state] LifecycleState = Unprovisioned
619,581 UART: [state] DebugLocked = No
621,845 UART: [state] WD Timer not started. Device not locked for debugging
625,790 UART: [kat] SHA2-256
805,455 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,204 UART: [kat] ++
816,697 UART: [kat] sha1
827,573 UART: [kat] SHA2-256
830,302 UART: [kat] SHA2-384
837,145 UART: [kat] SHA2-512-ACC
839,522 UART: [kat] ECC-384
3,279,629 UART: [kat] HMAC-384Kdf
3,291,817 UART: [kat] LMS
3,768,317 UART: [kat] --
3,773,899 UART: [cold-reset] ++
3,776,052 UART: [fht] FHT @ 0x50003400
3,787,536 UART: [idev] ++
3,788,102 UART: [idev] CDI.KEYID = 6
3,789,153 UART: [idev] SUBJECT.KEYID = 7
3,790,262 UART: [idev] UDS.KEYID = 0
3,791,313 ready_for_fw is high
3,791,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,487 UART: [idev] Erasing UDS.KEYID = 0
6,266,280 UART: [idev] Sha1 KeyId Algorithm
6,289,875 UART: [idev] --
6,296,131 UART: [ldev] ++
6,296,703 UART: [ldev] CDI.KEYID = 6
6,297,767 UART: [ldev] SUBJECT.KEYID = 5
6,298,877 UART: [ldev] AUTHORITY.KEYID = 7
6,300,113 UART: [ldev] FE.KEYID = 1
6,311,574 UART: [ldev] Erasing FE.KEYID = 1
8,792,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,076 UART: [ldev] --
10,585,347 UART: [fwproc] Wait for Commands...
10,587,280 UART: [fwproc] Recv command 0x46574c44
10,589,272 UART: [fwproc] Recv'd Img size: 118548 bytes
15,126,946 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,216,354 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,289,410 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,618,148 >>> mbox cmd response: success
15,622,022 UART: [afmc] ++
15,622,678 UART: [afmc] CDI.KEYID = 6
15,623,593 UART: [afmc] SUBJECT.KEYID = 7
15,624,810 UART: [afmc] AUTHORITY.KEYID = 5
18,126,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,848,406 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,850,650 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,866,480 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,882,401 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,898,091 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,921,591 UART: [afmc] --
19,924,765 UART: [cold-reset] --
19,928,795 UART: [state] Locking Datavault
19,934,907 UART: [state] Locking PCR0, PCR1 and PCR31
19,936,603 UART: [state] Locking ICCM
19,938,836 UART: [exit] Launching FMC @ 0x40000130
19,947,234 UART:
19,947,471 UART: Running Caliptra FMC ...
19,948,498 UART:
19,948,649 UART: [state] CFI Enabled
19,956,860 UART: [fht] FMC Alias Private Key: 7
21,723,159 UART: [art] Extend RT PCRs Done
21,724,402 UART: [art] Lock RT PCRs Done
21,726,213 UART: [art] Populate DV Done
21,731,842 UART: [fht] FMC Alias Private Key: 7
21,733,381 UART: [art] Derive CDI
21,734,115 UART: [art] Store in slot 0x4
21,777,244 UART: [art] Derive Key Pair
21,778,285 UART: [art] Store priv key in slot 0x5
24,205,114 UART: [art] Derive Key Pair - Done
24,218,174 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,924,519 UART: [art] Erasing AUTHORITY.KEYID = 7
25,926,027 UART: [art] PUB.X = F09D4144096DF04ECBCD5E8C526F17244B5D09FDD30579F5C46E6075895FCCB4A867167C7456733EDDAF8EB9E4419848
25,933,278 UART: [art] PUB.Y = 9FB7CFFB5259023675351F816EF9203315B1D27861DF3204DF33832E936CEB64131F1A392EDBD5813F0F30088471A2DC
25,940,522 UART: [art] SIG.R = D28C8C4EAD9A5E95A1889693ACEBAB1B5D9D47AF710F328EF8443954A02970E0125ADE80DBEE09DB1AA6CC758C62BE3D
25,947,917 UART: [art] SIG.S = BEE3B0A548B16EAB19BB7723F97BE447E812DC1B84DFCEA0EA16A392F30BD1082D3A17171E8E1651BA2F540AD981939A
26,926,949 UART: Caliptra RT
26,927,669 UART: [state] CFI Enabled
27,060,814 UART: [rt] RT listening for mailbox commands...
27,063,110 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,218,423 UART: [rt]cmd =0x41544d4e, len=14344
29,635,855 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,778,354 ready_for_fw is high
3,778,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,596,606 >>> mbox cmd response: success
19,850,204 UART:
19,850,589 UART: Running Caliptra FMC ...
19,851,904 UART:
19,852,077 UART: [state] CFI Enabled
19,859,549 UART: [fht] FMC Alias Private Key: 7
21,625,240 UART: [art] Extend RT PCRs Done
21,626,458 UART: [art] Lock RT PCRs Done
21,628,224 UART: [art] Populate DV Done
21,633,654 UART: [fht] FMC Alias Private Key: 7
21,635,325 UART: [art] Derive CDI
21,636,066 UART: [art] Store in slot 0x4
21,678,774 UART: [art] Derive Key Pair
21,679,780 UART: [art] Store priv key in slot 0x5
24,106,751 UART: [art] Derive Key Pair - Done
24,119,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,825,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,827,480 UART: [art] PUB.X = 48D65D4134765707E39FB4433670E08CDB9A910BFC5A7CD9C5AC09A51AF0B2184AFD657F83FF816FE8C1B5B24D2C61BB
25,834,790 UART: [art] PUB.Y = 95E76693A238167C5C610E7A62606D58641FD38BF20C05DE9ED55B4D7792C4A0C40CC802B9E3CE1365306CE638D2FB0E
25,842,023 UART: [art] SIG.R = 6F627500B48636588EFC4A2F7993BE92EBD95C99F9B9F8C3055EE4051763DDCF7CE4DB213D77A5014DFEAC038B020278
25,849,465 UART: [art] SIG.S = 54C1F648F86D6A795F6B773F3813325079201F0CB533F1D23DC5A309175102A249A5F5D54F02955D5628680D7FCB33EE
26,828,632 UART: Caliptra RT
26,829,322 UART: [state] CFI Enabled
26,961,983 UART: [rt] RT listening for mailbox commands...
26,964,275 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,120,277 UART: [rt]cmd =0x41544d4e, len=14344
29,538,191 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.80s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,161 UART:
192,526 UART: Running Caliptra ROM ...
193,723 UART:
193,876 UART: [state] CFI Enabled
264,766 UART: [state] LifecycleState = Unprovisioned
267,187 UART: [state] DebugLocked = No
268,581 UART: [state] WD Timer not started. Device not locked for debugging
272,956 UART: [kat] SHA2-256
462,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,648 UART: [kat] ++
474,100 UART: [kat] sha1
485,395 UART: [kat] SHA2-256
488,398 UART: [kat] SHA2-384
494,876 UART: [kat] SHA2-512-ACC
497,453 UART: [kat] ECC-384
2,945,944 UART: [kat] HMAC-384Kdf
2,973,320 UART: [kat] LMS
3,505,086 UART: [kat] --
3,510,576 UART: [cold-reset] ++
3,513,074 UART: [fht] FHT @ 0x50003400
3,524,194 UART: [idev] ++
3,524,892 UART: [idev] CDI.KEYID = 6
3,525,882 UART: [idev] SUBJECT.KEYID = 7
3,526,970 UART: [idev] UDS.KEYID = 0
3,528,017 ready_for_fw is high
3,528,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,904 UART: [idev] Erasing UDS.KEYID = 0
6,048,168 UART: [idev] Sha1 KeyId Algorithm
6,069,870 UART: [idev] --
6,074,016 UART: [ldev] ++
6,074,703 UART: [ldev] CDI.KEYID = 6
6,075,618 UART: [ldev] SUBJECT.KEYID = 5
6,076,776 UART: [ldev] AUTHORITY.KEYID = 7
6,077,975 UART: [ldev] FE.KEYID = 1
6,124,095 UART: [ldev] Erasing FE.KEYID = 1
8,629,389 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,380,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,461 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,282 UART: [ldev] --
10,436,327 UART: [fwproc] Wait for Commands...
10,439,168 UART: [fwproc] Recv command 0x46574c44
10,441,470 UART: [fwproc] Recv'd Img size: 118548 bytes
15,089,657 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,170,207 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,293,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,853,478 >>> mbox cmd response: success
15,856,700 UART: [afmc] ++
15,857,440 UART: [afmc] CDI.KEYID = 6
15,858,634 UART: [afmc] SUBJECT.KEYID = 7
15,860,071 UART: [afmc] AUTHORITY.KEYID = 5
18,387,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,110,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,112,495 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,127,549 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,142,817 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,157,816 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,181,360 UART: [afmc] --
20,185,708 UART: [cold-reset] --
20,190,703 UART: [state] Locking Datavault
20,196,229 UART: [state] Locking PCR0, PCR1 and PCR31
20,198,371 UART: [state] Locking ICCM
20,200,462 UART: [exit] Launching FMC @ 0x40000130
20,209,141 UART:
20,209,392 UART: Running Caliptra FMC ...
20,210,492 UART:
20,210,645 UART: [state] CFI Enabled
20,268,037 UART: [fht] FMC Alias Private Key: 7
22,055,777 UART: [art] Extend RT PCRs Done
22,056,992 UART: [art] Lock RT PCRs Done
22,058,449 UART: [art] Populate DV Done
22,063,639 UART: [fht] FMC Alias Private Key: 7
22,065,120 UART: [art] Derive CDI
22,065,881 UART: [art] Store in slot 0x4
22,122,311 UART: [art] Derive Key Pair
22,123,304 UART: [art] Store priv key in slot 0x5
24,586,260 UART: [art] Derive Key Pair - Done
24,599,316 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,312,276 UART: [art] Erasing AUTHORITY.KEYID = 7
26,313,768 UART: [art] PUB.X = B45562716577E184D3D0468FEB394E7888D7F0C5079097E417D8383114076261B3BC21F52488EE7ECD4496DF03990382
26,321,039 UART: [art] PUB.Y = 7F345B55E26E26E4DCBB66580D737E94E0958E1E0D21B9EA26059EDB3B9897B7802CBE62FB8ADCF5B576BC9F8E406497
26,328,319 UART: [art] SIG.R = 6F4A3C0F90FED437F840E1B12018B246AFB6668302ACD3A5DAE49EE21663FCC40175044DAFA638BD1BD509820C736338
26,335,666 UART: [art] SIG.S = 0ADA964080F2F9B5E40C04663485E370A8D44AE5BE69E42BB53EC80E432C3F1744F1121649C9420F9851BB09E299F868
27,314,726 UART: Caliptra RT
27,315,435 UART: [state] CFI Enabled
27,496,272 UART: [rt] RT listening for mailbox commands...
27,498,556 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,653,787 UART: [rt]cmd =0x41544d4e, len=14344
30,083,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,419,018 ready_for_fw is high
3,419,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,915,521 >>> mbox cmd response: success
20,196,461 UART:
20,196,875 UART: Running Caliptra FMC ...
20,198,076 UART:
20,198,247 UART: [state] CFI Enabled
20,266,557 UART: [fht] FMC Alias Private Key: 7
22,032,451 UART: [art] Extend RT PCRs Done
22,033,695 UART: [art] Lock RT PCRs Done
22,035,350 UART: [art] Populate DV Done
22,040,818 UART: [fht] FMC Alias Private Key: 7
22,042,304 UART: [art] Derive CDI
22,043,067 UART: [art] Store in slot 0x4
22,099,032 UART: [art] Derive Key Pair
22,100,072 UART: [art] Store priv key in slot 0x5
24,563,891 UART: [art] Derive Key Pair - Done
24,577,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,290,094 UART: [art] Erasing AUTHORITY.KEYID = 7
26,291,604 UART: [art] PUB.X = C1BF63CCE8D95D31CE5A80200CF65DF82068EC84AC64E12B3A7A30581F8621566892ED0F7E85689DF8C9A6CF35A5CF07
26,298,856 UART: [art] PUB.Y = AF8B6A81039173F7FCB17B585FA78A9F5A8CE224E3F8EE3D712C7F6625345302984CE9693DC8FF3E191C4103EC575485
26,306,095 UART: [art] SIG.R = B869098C59ABF227E03CCCCE041C71A6C512C0EC334E33CB9F09F937414AE1F148858483A3BB2DFA2ECB0C194E6AE55C
26,313,531 UART: [art] SIG.S = 0CCF99BCAF55C33BA7279E9739CB27FFF636B648330AB32D8BC64C0696E79112853D16A533CFFF9C99BB6BF2B8524A1F
27,292,312 UART: Caliptra RT
27,293,005 UART: [state] CFI Enabled
27,472,981 UART: [rt] RT listening for mailbox commands...
27,475,294 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,630,555 UART: [rt]cmd =0x41544d4e, len=14344
30,048,448 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,324 UART:
192,683 UART: Running Caliptra ROM ...
193,880 UART:
603,625 UART: [state] CFI Enabled
618,097 UART: [state] LifecycleState = Unprovisioned
620,519 UART: [state] DebugLocked = No
623,403 UART: [state] WD Timer not started. Device not locked for debugging
627,171 UART: [kat] SHA2-256
817,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,794 UART: [kat] ++
828,398 UART: [kat] sha1
840,068 UART: [kat] SHA2-256
843,086 UART: [kat] SHA2-384
848,441 UART: [kat] SHA2-512-ACC
851,028 UART: [kat] ECC-384
3,293,926 UART: [kat] HMAC-384Kdf
3,306,445 UART: [kat] LMS
3,838,318 UART: [kat] --
3,841,836 UART: [cold-reset] ++
3,844,154 UART: [fht] FHT @ 0x50003400
3,855,778 UART: [idev] ++
3,856,446 UART: [idev] CDI.KEYID = 6
3,857,484 UART: [idev] SUBJECT.KEYID = 7
3,858,590 UART: [idev] UDS.KEYID = 0
3,859,855 ready_for_fw is high
3,860,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,964 UART: [idev] Erasing UDS.KEYID = 0
6,333,561 UART: [idev] Sha1 KeyId Algorithm
6,356,574 UART: [idev] --
6,362,624 UART: [ldev] ++
6,363,306 UART: [ldev] CDI.KEYID = 6
6,364,383 UART: [ldev] SUBJECT.KEYID = 5
6,365,498 UART: [ldev] AUTHORITY.KEYID = 7
6,366,676 UART: [ldev] FE.KEYID = 1
6,377,706 UART: [ldev] Erasing FE.KEYID = 1
8,851,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,002 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,304 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,132 UART: [ldev] --
10,643,453 UART: [fwproc] Wait for Commands...
10,645,858 UART: [fwproc] Recv command 0x46574c44
10,648,124 UART: [fwproc] Recv'd Img size: 118548 bytes
15,316,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,402,035 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,525,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,086,051 >>> mbox cmd response: success
16,091,004 UART: [afmc] ++
16,091,692 UART: [afmc] CDI.KEYID = 6
16,092,893 UART: [afmc] SUBJECT.KEYID = 7
16,094,344 UART: [afmc] AUTHORITY.KEYID = 5
18,598,922 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,319,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,321,367 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,336,222 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,351,457 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,366,512 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,390,773 UART: [afmc] --
20,394,414 UART: [cold-reset] --
20,399,439 UART: [state] Locking Datavault
20,406,278 UART: [state] Locking PCR0, PCR1 and PCR31
20,408,463 UART: [state] Locking ICCM
20,410,761 UART: [exit] Launching FMC @ 0x40000130
20,419,401 UART:
20,419,642 UART: Running Caliptra FMC ...
20,420,674 UART:
20,420,825 UART: [state] CFI Enabled
20,428,844 UART: [fht] FMC Alias Private Key: 7
22,195,398 UART: [art] Extend RT PCRs Done
22,197,258 UART: [art] Lock RT PCRs Done
22,198,289 UART: [art] Populate DV Done
22,203,573 UART: [fht] FMC Alias Private Key: 7
22,205,173 UART: [art] Derive CDI
22,205,961 UART: [art] Store in slot 0x4
22,248,663 UART: [art] Derive Key Pair
22,250,028 UART: [art] Store priv key in slot 0x5
24,676,871 UART: [art] Derive Key Pair - Done
24,689,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,395,966 UART: [art] Erasing AUTHORITY.KEYID = 7
26,397,481 UART: [art] PUB.X = ACCC5CCF95DE21CBCFCE378118F0E837F467D9F788FB1C7ED4C433BF7D4745D522E3804B6CDA5C19F51EA6877642D3F3
26,404,775 UART: [art] PUB.Y = 1D5936EAE114E975BCEB618222A89F5EA361528D5F4834914DB15685FB41368F5ED0DC2541D37713BB01AB7D6558A193
26,411,989 UART: [art] SIG.R = 50DD424E2849E08A582F0D0BC8CAB2B49E9BFED9F700C9FB70A47B4CE9DE883365384CACCBFF720916EF588358C156A2
26,419,410 UART: [art] SIG.S = 47277D0F530135764A08AFC2C2675F64A9D6ECF882F1F366963B235A8E01F1D98E19032818402D3C0B2B89C1793E5AFA
27,397,836 UART: Caliptra RT
27,398,545 UART: [state] CFI Enabled
27,531,704 UART: [rt] RT listening for mailbox commands...
27,534,086 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,689,530 UART: [rt]cmd =0x41544d4e, len=14344
30,115,529 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,359 writing to cptra_bootfsm_go
3,756,637 ready_for_fw is high
3,757,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,167,484 >>> mbox cmd response: success
20,416,291 UART:
20,416,684 UART: Running Caliptra FMC ...
20,417,889 UART:
20,418,064 UART: [state] CFI Enabled
20,425,987 UART: [fht] FMC Alias Private Key: 7
22,191,474 UART: [art] Extend RT PCRs Done
22,192,704 UART: [art] Lock RT PCRs Done
22,194,362 UART: [art] Populate DV Done
22,199,894 UART: [fht] FMC Alias Private Key: 7
22,201,547 UART: [art] Derive CDI
22,202,376 UART: [art] Store in slot 0x4
22,245,213 UART: [art] Derive Key Pair
22,246,257 UART: [art] Store priv key in slot 0x5
24,673,021 UART: [art] Derive Key Pair - Done
24,686,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,392,432 UART: [art] Erasing AUTHORITY.KEYID = 7
26,393,942 UART: [art] PUB.X = 6A69BD628DC3E28975861AC18B26EEE295F08A05A37BADC4AF346DE278C3556F7EDCCD273AD5E4B81CBCAED6442A0B4E
26,401,283 UART: [art] PUB.Y = A716F052D9C41E4B4B1B7BF9D1DBD089D70229C55ABE724893DA368577855BC207612C6E60D240228EA208747325E577
26,408,480 UART: [art] SIG.R = 851F3E79562E154A4A25E12023369D6988285351B6C083C1CD13CAF497C0B1476F7E310CBB6D5AC8DD3BDA79E3008CB3
26,415,845 UART: [art] SIG.S = 885C51352A35192D418A137AF6046E8CBD2CA081ADFD8274972E736EABBFE0C19FA7B5E47279CC4406336CBE8108421F
27,394,853 UART: Caliptra RT
27,395,568 UART: [state] CFI Enabled
27,528,690 UART: [rt] RT listening for mailbox commands...
27,531,000 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,686,262 UART: [rt]cmd =0x41544d4e, len=14344
30,098,820 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,543 UART: [kat] SHA2-256
882,474 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,589 UART: [kat] ++
886,741 UART: [kat] sha1
890,789 UART: [kat] SHA2-256
892,727 UART: [kat] SHA2-384
895,340 UART: [kat] SHA2-512-ACC
897,241 UART: [kat] ECC-384
902,702 UART: [kat] HMAC-384Kdf
907,124 UART: [kat] LMS
1,475,320 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,655 UART: [fht] Storing FHT @ 0x50003400
1,479,440 UART: [idev] ++
1,479,608 UART: [idev] CDI.KEYID = 6
1,479,968 UART: [idev] SUBJECT.KEYID = 7
1,480,392 UART: [idev] UDS.KEYID = 0
1,480,737 ready_for_fw is high
1,480,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,322 UART: [idev] Erasing UDS.KEYID = 0
1,504,014 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,562 UART: [idev] --
1,513,489 UART: [ldev] ++
1,513,657 UART: [ldev] CDI.KEYID = 6
1,514,020 UART: [ldev] SUBJECT.KEYID = 5
1,514,446 UART: [ldev] AUTHORITY.KEYID = 7
1,514,909 UART: [ldev] FE.KEYID = 1
1,520,129 UART: [ldev] Erasing FE.KEYID = 1
1,546,208 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,100 UART: [ldev] --
1,585,547 UART: [fwproc] Waiting for Commands...
1,586,374 UART: [fwproc] Received command 0x46574c44
1,587,165 UART: [fwproc] Received Image of size 118548 bytes
5,167,406 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,195,506 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,226,724 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,366,987 >>> mbox cmd response: success
5,368,163 UART: [afmc] ++
5,368,331 UART: [afmc] CDI.KEYID = 6
5,368,693 UART: [afmc] SUBJECT.KEYID = 7
5,369,118 UART: [afmc] AUTHORITY.KEYID = 5
5,403,753 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,419,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,420,683 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,426,389 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,432,268 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,437,981 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,445,892 UART: [afmc] --
5,446,940 UART: [cold-reset] --
5,447,666 UART: [state] Locking Datavault
5,448,689 UART: [state] Locking PCR0, PCR1 and PCR31
5,449,293 UART: [state] Locking ICCM
5,449,765 UART: [exit] Launching FMC @ 0x40000130
5,455,095 UART:
5,455,111 UART: Running Caliptra FMC ...
5,455,519 UART:
5,455,573 UART: [state] CFI Enabled
5,466,213 UART: [fht] FMC Alias Private Key: 7
5,584,991 UART: [art] Extend RT PCRs Done
5,585,419 UART: [art] Lock RT PCRs Done
5,586,905 UART: [art] Populate DV Done
5,595,180 UART: [fht] FMC Alias Private Key: 7
5,596,152 UART: [art] Derive CDI
5,596,432 UART: [art] Store in slot 0x4
5,682,172 UART: [art] Derive Key Pair
5,682,532 UART: [art] Store priv key in slot 0x5
5,695,891 UART: [art] Derive Key Pair - Done
5,710,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,725,633 UART: [art] Erasing AUTHORITY.KEYID = 7
5,726,398 UART: [art] PUB.X = 3A7F0E2D078BB4D91E9F49E0E5D8FA5CD914E70A5599E49EF15D2C40D4CCBAB0E3A05CC0E96194609981607B5CB5A71F
5,733,175 UART: [art] PUB.Y = C252E4C769AF779B14AEA570A549FBBE7909FD0FD5F8151395847216172E9EAE4BDBD706556A84A9C69FF27F4B4C7BD9
5,740,128 UART: [art] SIG.R = 4C9AADCAF8A1F95F2FD656B8BFEC782FEA50C8BBB9DE96001FEB1A7237CF7B3EF2F17478503FCCE9B8261C1A2EE2FCF1
5,746,910 UART: [art] SIG.S = 2EF7974A30F7EF53B884CEC68A4403594C69F4A772BB428C0B092034D3727F212D7713CF73AED8FEFFFD2D8808F98510
5,770,660 UART: Caliptra RT
5,770,911 UART: [state] CFI Enabled
5,891,578 UART: [rt] RT listening for mailbox commands...
5,892,248 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,364 UART: [rt]cmd =0x41544d4e, len=14344
8,443,100 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,109 ready_for_fw is high
1,363,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,140,693 >>> mbox cmd response: success
5,201,948 UART:
5,201,964 UART: Running Caliptra FMC ...
5,202,372 UART:
5,202,426 UART: [state] CFI Enabled
5,212,730 UART: [fht] FMC Alias Private Key: 7
5,332,174 UART: [art] Extend RT PCRs Done
5,332,602 UART: [art] Lock RT PCRs Done
5,334,154 UART: [art] Populate DV Done
5,342,425 UART: [fht] FMC Alias Private Key: 7
5,343,529 UART: [art] Derive CDI
5,343,809 UART: [art] Store in slot 0x4
5,429,911 UART: [art] Derive Key Pair
5,430,271 UART: [art] Store priv key in slot 0x5
5,443,824 UART: [art] Derive Key Pair - Done
5,458,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,474,158 UART: [art] Erasing AUTHORITY.KEYID = 7
5,474,923 UART: [art] PUB.X = DCFB5261F84F73674387332FCFAC530FAE453F2408AE37B26815F1A0881CAE7761DEEFE317B7A3F8E3C69C790CD97B1F
5,481,698 UART: [art] PUB.Y = 9A31EB4D3EFBC0CFCDD16691A3E78E14D651C1F8067EE1ED74436D6CA6E09C52635C2E22FF1601674AAB9D4AB0641D2E
5,488,660 UART: [art] SIG.R = 1B4704247C2A2CF600A111876AEC47AE45CD3031D35D5F3F5F416DE46EAADB5659FCE04554F1C722BE7BB428F27ADF04
5,495,416 UART: [art] SIG.S = 0572BD7111EC92F0BE30CB15AAB243A78E608B9F85C7E6B28B9BDFEB8192D53030541A5780492942696DDBCF6B634677
5,519,583 UART: Caliptra RT
5,519,834 UART: [state] CFI Enabled
5,639,409 UART: [rt] RT listening for mailbox commands...
5,640,079 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,762,901 UART: [rt]cmd =0x41544d4e, len=14344
8,266,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.99s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,874 UART: [kat] SHA2-256
881,805 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,920 UART: [kat] ++
886,072 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
894,907 UART: [kat] SHA2-512-ACC
896,808 UART: [kat] ECC-384
902,491 UART: [kat] HMAC-384Kdf
907,203 UART: [kat] LMS
1,475,399 UART: [kat] --
1,476,134 UART: [cold-reset] ++
1,476,568 UART: [fht] Storing FHT @ 0x50003400
1,479,219 UART: [idev] ++
1,479,387 UART: [idev] CDI.KEYID = 6
1,479,747 UART: [idev] SUBJECT.KEYID = 7
1,480,171 UART: [idev] UDS.KEYID = 0
1,480,516 ready_for_fw is high
1,480,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,103 UART: [idev] Erasing UDS.KEYID = 0
1,504,889 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,577 UART: [idev] --
1,514,664 UART: [ldev] ++
1,514,832 UART: [ldev] CDI.KEYID = 6
1,515,195 UART: [ldev] SUBJECT.KEYID = 5
1,515,621 UART: [ldev] AUTHORITY.KEYID = 7
1,516,084 UART: [ldev] FE.KEYID = 1
1,521,562 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,171 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,055 UART: [ldev] --
1,586,396 UART: [fwproc] Waiting for Commands...
1,587,081 UART: [fwproc] Received command 0x46574c44
1,587,872 UART: [fwproc] Received Image of size 118548 bytes
5,470,543 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,498,353 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,529,571 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,669,928 >>> mbox cmd response: success
5,671,006 UART: [afmc] ++
5,671,174 UART: [afmc] CDI.KEYID = 6
5,671,536 UART: [afmc] SUBJECT.KEYID = 7
5,671,961 UART: [afmc] AUTHORITY.KEYID = 5
5,707,044 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,723,210 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,723,990 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,729,696 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,735,575 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,741,288 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,749,245 UART: [afmc] --
5,750,263 UART: [cold-reset] --
5,751,101 UART: [state] Locking Datavault
5,752,180 UART: [state] Locking PCR0, PCR1 and PCR31
5,752,784 UART: [state] Locking ICCM
5,753,212 UART: [exit] Launching FMC @ 0x40000130
5,758,542 UART:
5,758,558 UART: Running Caliptra FMC ...
5,758,966 UART:
5,759,109 UART: [state] CFI Enabled
5,769,643 UART: [fht] FMC Alias Private Key: 7
5,888,203 UART: [art] Extend RT PCRs Done
5,888,631 UART: [art] Lock RT PCRs Done
5,890,211 UART: [art] Populate DV Done
5,898,692 UART: [fht] FMC Alias Private Key: 7
5,899,808 UART: [art] Derive CDI
5,900,088 UART: [art] Store in slot 0x4
5,985,480 UART: [art] Derive Key Pair
5,985,840 UART: [art] Store priv key in slot 0x5
5,998,781 UART: [art] Derive Key Pair - Done
6,013,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,029,629 UART: [art] Erasing AUTHORITY.KEYID = 7
6,030,394 UART: [art] PUB.X = 33CFC86752B83266942624E2BA17292B1668BD86B2B45AD1F5AC0EFE30BBA73EE407A192A857FF57DD759F06DD1068E9
6,037,163 UART: [art] PUB.Y = 9A7967972E4209904022C5F49F3BDC1FD619EBA59B9B0B164E57484FA1D44BABA175CBA119237E9EDA2C1073FB7E0927
6,044,112 UART: [art] SIG.R = CCFAEED901A31DD015072946D710993196412487BE00D86E2A0C655D97C798AE228893E86BACA5E3EAC4011977FF9896
6,050,850 UART: [art] SIG.S = 7F734F0314D662256B5726DE187F74CD5CFDF28E435C5C433583CBCEFDDD26A1C270A23BE2D5D0D45C152B1A912CA406
6,075,000 UART: Caliptra RT
6,075,343 UART: [state] CFI Enabled
6,194,841 UART: [rt] RT listening for mailbox commands...
6,195,511 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,318,355 UART: [rt]cmd =0x41544d4e, len=14344
8,860,162 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 ready_for_fw is high
1,362,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,671 >>> mbox cmd response: success
5,393,784 UART:
5,393,800 UART: Running Caliptra FMC ...
5,394,208 UART:
5,394,351 UART: [state] CFI Enabled
5,405,031 UART: [fht] FMC Alias Private Key: 7
5,524,305 UART: [art] Extend RT PCRs Done
5,524,733 UART: [art] Lock RT PCRs Done
5,526,197 UART: [art] Populate DV Done
5,534,384 UART: [fht] FMC Alias Private Key: 7
5,535,402 UART: [art] Derive CDI
5,535,682 UART: [art] Store in slot 0x4
5,621,240 UART: [art] Derive Key Pair
5,621,600 UART: [art] Store priv key in slot 0x5
5,634,557 UART: [art] Derive Key Pair - Done
5,649,131 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,664,224 UART: [art] Erasing AUTHORITY.KEYID = 7
5,664,989 UART: [art] PUB.X = 60A93F1D3C1B69674E786C3A64611107531A7765B418551B99430716290C4ED106D10474CA61CE921A31392E008779AE
5,671,706 UART: [art] PUB.Y = B4CEE8AE0B65FB87F5A4CA125C8AB5DDB7356629D22FCA5B327970570458D28128AF8CCF500236C935DF22A5B8D34658
5,678,657 UART: [art] SIG.R = FE3C5041C7E2C5604A37F49A07CF9A151B8A09C1681B173C414C74F5909EBEBEB101785CC32AC5124431336EE4496308
5,685,415 UART: [art] SIG.S = F5FE1E40A95742BEE5B33457313AF1EAF65523F4D377A48426363C13128C3A5E7A7D1FA4F5C24D0D35521F78DF1A2192
5,709,382 UART: Caliptra RT
5,709,725 UART: [state] CFI Enabled
5,830,592 UART: [rt] RT listening for mailbox commands...
5,831,262 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,954,518 UART: [rt]cmd =0x41544d4e, len=14344
8,268,982 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,726 UART: [state] LifecycleState = Unprovisioned
86,381 UART: [state] DebugLocked = No
86,939 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
891,602 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,706 UART: [kat] ++
895,858 UART: [kat] sha1
900,094 UART: [kat] SHA2-256
902,034 UART: [kat] SHA2-384
904,753 UART: [kat] SHA2-512-ACC
906,654 UART: [kat] ECC-384
916,095 UART: [kat] HMAC-384Kdf
920,513 UART: [kat] LMS
1,168,825 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,296 UART: [fht] FHT @ 0x50003400
1,172,812 UART: [idev] ++
1,172,980 UART: [idev] CDI.KEYID = 6
1,173,341 UART: [idev] SUBJECT.KEYID = 7
1,173,766 UART: [idev] UDS.KEYID = 0
1,174,112 ready_for_fw is high
1,174,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,721 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,299 UART: [idev] --
1,208,468 UART: [ldev] ++
1,208,636 UART: [ldev] CDI.KEYID = 6
1,209,000 UART: [ldev] SUBJECT.KEYID = 5
1,209,427 UART: [ldev] AUTHORITY.KEYID = 7
1,209,890 UART: [ldev] FE.KEYID = 1
1,215,092 UART: [ldev] Erasing FE.KEYID = 1
1,241,375 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,258 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,210 UART: [fwproc] Recv command 0x46574c44
1,281,943 UART: [fwproc] Recv'd Img size: 118548 bytes
3,178,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,237,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,377,369 >>> mbox cmd response: success
3,378,503 UART: [afmc] ++
3,378,671 UART: [afmc] CDI.KEYID = 6
3,379,034 UART: [afmc] SUBJECT.KEYID = 7
3,379,460 UART: [afmc] AUTHORITY.KEYID = 5
3,414,943 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,431,534 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,432,283 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,437,990 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,443,867 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,449,577 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,457,365 UART: [afmc] --
3,458,328 UART: [cold-reset] --
3,459,234 UART: [state] Locking Datavault
3,460,455 UART: [state] Locking PCR0, PCR1 and PCR31
3,461,059 UART: [state] Locking ICCM
3,461,487 UART: [exit] Launching FMC @ 0x40000130
3,466,817 UART:
3,466,833 UART: Running Caliptra FMC ...
3,467,241 UART:
3,467,295 UART: [state] CFI Enabled
3,477,733 UART: [fht] FMC Alias Private Key: 7
3,597,243 UART: [art] Extend RT PCRs Done
3,597,671 UART: [art] Lock RT PCRs Done
3,599,075 UART: [art] Populate DV Done
3,607,526 UART: [fht] FMC Alias Private Key: 7
3,608,468 UART: [art] Derive CDI
3,608,748 UART: [art] Store in slot 0x4
3,694,407 UART: [art] Derive Key Pair
3,694,767 UART: [art] Store priv key in slot 0x5
3,707,795 UART: [art] Derive Key Pair - Done
3,722,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,738,315 UART: [art] PUB.X = DF1F6B9B0E448435F0243B4348E8838FF756750D457D26E409B8A7B35D45B3B1C2DCF8BF2CFB2676261CB0F6E5A3B0EE
3,745,088 UART: [art] PUB.Y = 1272D346D4FF0AB2B50C55864540B329A5D196C867F751176D38050EF59F7909869E9FD1A9781B6C9A1904401798B643
3,752,008 UART: [art] SIG.R = 1B0691B90BD029323B1BBCC13C61EAD356FC909016BB57FF316EF319E005C660E1E196953ECC894F32B6A067DF61A55E
3,758,777 UART: [art] SIG.S = AB2AEC735D4959F9063FA7B5FA7B56A6EA809F10431EAF9D6E99CBD0A1FB401C997B61D6968B18E205C52A003B2340C6
3,782,667 UART: Caliptra RT
3,782,918 UART: [state] CFI Enabled
3,902,280 UART: [rt] RT listening for mailbox commands...
3,902,950 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,025,942 UART: [rt]cmd =0x41544d4e, len=14344
4,700,565 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,886 ready_for_fw is high
1,059,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,573 >>> mbox cmd response: success
3,278,684 UART:
3,278,700 UART: Running Caliptra FMC ...
3,279,108 UART:
3,279,162 UART: [state] CFI Enabled
3,289,220 UART: [fht] FMC Alias Private Key: 7
3,408,374 UART: [art] Extend RT PCRs Done
3,408,802 UART: [art] Lock RT PCRs Done
3,410,266 UART: [art] Populate DV Done
3,418,633 UART: [fht] FMC Alias Private Key: 7
3,419,681 UART: [art] Derive CDI
3,419,961 UART: [art] Store in slot 0x4
3,505,922 UART: [art] Derive Key Pair
3,506,282 UART: [art] Store priv key in slot 0x5
3,519,768 UART: [art] Derive Key Pair - Done
3,534,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,599 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,364 UART: [art] PUB.X = ACD398FEE44C26A56A65F0342CADEC2193340685731BEF5E76761E181A52B91BFA4F06C90AE9037084787051B66209E7
3,558,119 UART: [art] PUB.Y = 592020E566CB15DD79BA3A7284C02C754617008C7CA458AE140A8CEAA20DED470FBA07F973D9312EF552FF202783D9CE
3,565,043 UART: [art] SIG.R = CB93F16E03E793E1FDE122E0E15DA749EB8ED95A831BC5D8EA2530076E0D70D0595D0C02BCBF38C01D488A788AB29FE1
3,571,814 UART: [art] SIG.S = C394EAF3537CDCBD6841DC99A59FE15F2B929307600ADDC01D884C907810CAE6DD9473E28C011FF6AFED5F583D8D961F
3,595,625 UART: Caliptra RT
3,595,876 UART: [state] CFI Enabled
3,715,399 UART: [rt] RT listening for mailbox commands...
3,716,069 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,839,319 UART: [rt]cmd =0x41544d4e, len=14344
4,505,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,839 UART: [kat] SHA2-256
891,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,493 UART: [kat] ++
895,645 UART: [kat] sha1
899,791 UART: [kat] SHA2-256
901,731 UART: [kat] SHA2-384
904,312 UART: [kat] SHA2-512-ACC
906,213 UART: [kat] ECC-384
915,744 UART: [kat] HMAC-384Kdf
920,190 UART: [kat] LMS
1,168,502 UART: [kat] --
1,169,533 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,173,777 ready_for_fw is high
1,173,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,002 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,135 UART: [ldev] ++
1,209,303 UART: [ldev] CDI.KEYID = 6
1,209,667 UART: [ldev] SUBJECT.KEYID = 5
1,210,094 UART: [ldev] AUTHORITY.KEYID = 7
1,210,557 UART: [ldev] FE.KEYID = 1
1,215,837 UART: [ldev] Erasing FE.KEYID = 1
1,242,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,847 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 118548 bytes
3,166,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,195,232 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,226,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,366,698 >>> mbox cmd response: success
3,367,878 UART: [afmc] ++
3,368,046 UART: [afmc] CDI.KEYID = 6
3,368,409 UART: [afmc] SUBJECT.KEYID = 7
3,368,835 UART: [afmc] AUTHORITY.KEYID = 5
3,404,520 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,421,167 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,421,916 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,427,623 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,433,500 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,439,210 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,446,874 UART: [afmc] --
3,447,707 UART: [cold-reset] --
3,448,529 UART: [state] Locking Datavault
3,449,484 UART: [state] Locking PCR0, PCR1 and PCR31
3,450,088 UART: [state] Locking ICCM
3,450,612 UART: [exit] Launching FMC @ 0x40000130
3,455,942 UART:
3,455,958 UART: Running Caliptra FMC ...
3,456,366 UART:
3,456,509 UART: [state] CFI Enabled
3,467,405 UART: [fht] FMC Alias Private Key: 7
3,586,833 UART: [art] Extend RT PCRs Done
3,587,261 UART: [art] Lock RT PCRs Done
3,589,055 UART: [art] Populate DV Done
3,597,192 UART: [fht] FMC Alias Private Key: 7
3,598,152 UART: [art] Derive CDI
3,598,432 UART: [art] Store in slot 0x4
3,683,991 UART: [art] Derive Key Pair
3,684,351 UART: [art] Store priv key in slot 0x5
3,697,891 UART: [art] Derive Key Pair - Done
3,712,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,728,041 UART: [art] Erasing AUTHORITY.KEYID = 7
3,728,806 UART: [art] PUB.X = A55D6AA2E4FCBA32F7E4071857758061E9AB64E4FB6F1582C47B21158EB036080FEEB93292CFCF4D57D4109F8FAD2EDA
3,735,583 UART: [art] PUB.Y = C340E2449BD2B867C5BE39F1809B35B7B7212E1BBDA7EC83D9B4F8713936FA0E126D863A52D50F0BC896F99AC023F82C
3,742,534 UART: [art] SIG.R = 00B047BB67B5C8650C8FAF5C46D6144F9E77D86D77B22251E5953E6B0E007F463C5A320DCFAF32032751944B9D769AFC
3,749,252 UART: [art] SIG.S = FA9E54D8D93DFBA12C64761CB294E0D2A7F5EF581872B68FBB9EEF366A1656D37BC4302A8462D71BDB40EE7F5A3B937B
3,773,052 UART: Caliptra RT
3,773,395 UART: [state] CFI Enabled
3,893,110 UART: [rt] RT listening for mailbox commands...
3,893,780 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,016,696 UART: [rt]cmd =0x41544d4e, len=14344
4,688,470 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,247 ready_for_fw is high
1,059,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,262 >>> mbox cmd response: success
3,291,427 UART:
3,291,443 UART: Running Caliptra FMC ...
3,291,851 UART:
3,291,994 UART: [state] CFI Enabled
3,302,542 UART: [fht] FMC Alias Private Key: 7
3,422,050 UART: [art] Extend RT PCRs Done
3,422,478 UART: [art] Lock RT PCRs Done
3,424,058 UART: [art] Populate DV Done
3,432,493 UART: [fht] FMC Alias Private Key: 7
3,433,437 UART: [art] Derive CDI
3,433,717 UART: [art] Store in slot 0x4
3,519,254 UART: [art] Derive Key Pair
3,519,614 UART: [art] Store priv key in slot 0x5
3,533,090 UART: [art] Derive Key Pair - Done
3,548,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,305 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,070 UART: [art] PUB.X = 26624AA58E5F82EA8FD1E3779080F4B3270F9D0FF51755E72F7019BE17DBA50A8A15D37D61D21F05D98505A7E7D9F990
3,570,829 UART: [art] PUB.Y = DF1540DAB13696E90EF272F0CA998EDAD1A3494FBC8E6A575334A385CAE4F2041502E5D41C98723FAECDCAE881DB2649
3,577,786 UART: [art] SIG.R = BAAB56A5500058D337DF344BAE5C7F260F6A581AC4D084FE72876B346FD7C26DDD36898764AABAFCFC4A28845B68696E
3,584,545 UART: [art] SIG.S = FF8B1B3D4D2A4B74EECE617F00FF85D3FE99EA659CB1B6D491B99369DDA4C37451EA2B6260B588F33C3C7695EFEE2486
3,607,889 UART: Caliptra RT
3,608,232 UART: [state] CFI Enabled
3,728,735 UART: [rt] RT listening for mailbox commands...
3,729,405 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,327 UART: [rt]cmd =0x41544d4e, len=14344
4,526,794 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,147 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
893,116 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,241 UART: [kat] ++
897,393 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,378 UART: [kat] SHA2-512-ACC
908,279 UART: [kat] ECC-384
918,164 UART: [kat] HMAC-384Kdf
922,698 UART: [kat] LMS
1,171,026 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,174,958 UART: [idev] ++
1,175,126 UART: [idev] CDI.KEYID = 6
1,175,486 UART: [idev] SUBJECT.KEYID = 7
1,175,910 UART: [idev] UDS.KEYID = 0
1,176,255 ready_for_fw is high
1,176,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,806 UART: [idev] Erasing UDS.KEYID = 0
1,200,663 UART: [idev] Sha1 KeyId Algorithm
1,209,125 UART: [idev] --
1,210,205 UART: [ldev] ++
1,210,373 UART: [ldev] CDI.KEYID = 6
1,210,736 UART: [ldev] SUBJECT.KEYID = 5
1,211,162 UART: [ldev] AUTHORITY.KEYID = 7
1,211,625 UART: [ldev] FE.KEYID = 1
1,216,869 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,639 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,682 UART: [fwproc] Recv command 0x46574c44
1,283,410 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,362,563 >>> mbox cmd response: success
3,363,643 UART: [afmc] ++
3,363,811 UART: [afmc] CDI.KEYID = 6
3,364,173 UART: [afmc] SUBJECT.KEYID = 7
3,364,598 UART: [afmc] AUTHORITY.KEYID = 5
3,400,385 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,416,816 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,417,564 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,423,270 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,429,149 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,434,859 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,442,684 UART: [afmc] --
3,443,796 UART: [cold-reset] --
3,444,336 UART: [state] Locking Datavault
3,445,337 UART: [state] Locking PCR0, PCR1 and PCR31
3,445,941 UART: [state] Locking ICCM
3,446,393 UART: [exit] Launching FMC @ 0x40000130
3,451,723 UART:
3,451,739 UART: Running Caliptra FMC ...
3,452,147 UART:
3,452,201 UART: [state] CFI Enabled
3,462,807 UART: [fht] FMC Alias Private Key: 7
3,582,105 UART: [art] Extend RT PCRs Done
3,582,533 UART: [art] Lock RT PCRs Done
3,584,115 UART: [art] Populate DV Done
3,592,252 UART: [fht] FMC Alias Private Key: 7
3,593,294 UART: [art] Derive CDI
3,593,574 UART: [art] Store in slot 0x4
3,679,601 UART: [art] Derive Key Pair
3,679,961 UART: [art] Store priv key in slot 0x5
3,693,215 UART: [art] Derive Key Pair - Done
3,708,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,723,719 UART: [art] Erasing AUTHORITY.KEYID = 7
3,724,484 UART: [art] PUB.X = D06BC6D25C501F04C954A6305A6BBF3A5242154813555E04C2FC2B29796C70926149100BC96D17903D27D94BE9B11086
3,731,237 UART: [art] PUB.Y = D3F6DA2A1B73E43AF0925081669D9C657F713079F352FBF8019049D2CDFDF56E47D1DA80EFFC87A84664954876D8EA35
3,738,190 UART: [art] SIG.R = 541ECEADDE5975C7AE6FA11918622C10BDCDD08A8A4798528764B9952126DCBA94FFD9CA10288EC161C161B7C402627B
3,744,967 UART: [art] SIG.S = E3B06337138EF31E8462D77AA44B1F23F9F0BAD07B222061095E292BB5AD541C7C81A34D78AFD9ACDAA0CF1E42F3C22D
3,768,892 UART: Caliptra RT
3,769,143 UART: [state] CFI Enabled
3,889,837 UART: [rt] RT listening for mailbox commands...
3,890,507 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,013,591 UART: [rt]cmd =0x41544d4e, len=14344
4,674,729 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,117 ready_for_fw is high
1,060,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,223,824 >>> mbox cmd response: success
3,285,881 UART:
3,285,897 UART: Running Caliptra FMC ...
3,286,305 UART:
3,286,359 UART: [state] CFI Enabled
3,296,919 UART: [fht] FMC Alias Private Key: 7
3,416,211 UART: [art] Extend RT PCRs Done
3,416,639 UART: [art] Lock RT PCRs Done
3,418,087 UART: [art] Populate DV Done
3,426,396 UART: [fht] FMC Alias Private Key: 7
3,427,378 UART: [art] Derive CDI
3,427,658 UART: [art] Store in slot 0x4
3,513,563 UART: [art] Derive Key Pair
3,513,923 UART: [art] Store priv key in slot 0x5
3,527,835 UART: [art] Derive Key Pair - Done
3,542,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,558,366 UART: [art] Erasing AUTHORITY.KEYID = 7
3,559,131 UART: [art] PUB.X = 2EA27FB0BAB570930597F74720C6F68A1A814101AA455326D0D6B265173F41A23CA3E4CEADD35EB3D04F75D5851C08E7
3,565,898 UART: [art] PUB.Y = C1D5E9A30781C329C884B46BE071633C33714F589E971FDC44FACB51E3C6AE72F0B04BCB65B9F64424ED1D04EDF996A3
3,572,854 UART: [art] SIG.R = EB224E1128EDD0448408D87872545A3780294EB5C5219C9472E14AEF38C1CB4245A2098EC5DFBE6CB44C094AC77E8612
3,579,617 UART: [art] SIG.S = DEAFF2258A337170518D1DF220E672ED909AA808A54B739819668B1D325FF769FD96ECC50B9B934E6667A0220D255E42
3,603,396 UART: Caliptra RT
3,603,647 UART: [state] CFI Enabled
3,723,698 UART: [rt] RT listening for mailbox commands...
3,724,368 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,696 UART: [rt]cmd =0x41544d4e, len=14344
4,526,573 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,823 UART: [kat] SHA2-256
893,473 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,598 UART: [kat] ++
897,750 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,781 UART: [kat] SHA2-512-ACC
908,682 UART: [kat] ECC-384
918,681 UART: [kat] HMAC-384Kdf
923,517 UART: [kat] LMS
1,171,845 UART: [kat] --
1,172,728 UART: [cold-reset] ++
1,173,218 UART: [fht] FHT @ 0x50003400
1,175,983 UART: [idev] ++
1,176,151 UART: [idev] CDI.KEYID = 6
1,176,511 UART: [idev] SUBJECT.KEYID = 7
1,176,935 UART: [idev] UDS.KEYID = 0
1,177,280 ready_for_fw is high
1,177,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,691 UART: [idev] Erasing UDS.KEYID = 0
1,201,354 UART: [idev] Sha1 KeyId Algorithm
1,209,926 UART: [idev] --
1,211,158 UART: [ldev] ++
1,211,326 UART: [ldev] CDI.KEYID = 6
1,211,689 UART: [ldev] SUBJECT.KEYID = 5
1,212,115 UART: [ldev] AUTHORITY.KEYID = 7
1,212,578 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,762 UART: [ldev] --
1,284,167 UART: [fwproc] Wait for Commands...
1,284,853 UART: [fwproc] Recv command 0x46574c44
1,285,581 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,566 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,423 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,988 >>> mbox cmd response: success
3,376,104 UART: [afmc] ++
3,376,272 UART: [afmc] CDI.KEYID = 6
3,376,634 UART: [afmc] SUBJECT.KEYID = 7
3,377,059 UART: [afmc] AUTHORITY.KEYID = 5
3,412,654 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,841 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,547 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,426 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,136 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,785 UART: [afmc] --
3,455,809 UART: [cold-reset] --
3,456,579 UART: [state] Locking Datavault
3,458,038 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,642 UART: [state] Locking ICCM
3,459,158 UART: [exit] Launching FMC @ 0x40000130
3,464,488 UART:
3,464,504 UART: Running Caliptra FMC ...
3,464,912 UART:
3,465,055 UART: [state] CFI Enabled
3,475,343 UART: [fht] FMC Alias Private Key: 7
3,594,221 UART: [art] Extend RT PCRs Done
3,594,649 UART: [art] Lock RT PCRs Done
3,596,329 UART: [art] Populate DV Done
3,604,332 UART: [fht] FMC Alias Private Key: 7
3,605,468 UART: [art] Derive CDI
3,605,748 UART: [art] Store in slot 0x4
3,691,097 UART: [art] Derive Key Pair
3,691,457 UART: [art] Store priv key in slot 0x5
3,705,083 UART: [art] Derive Key Pair - Done
3,719,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,272 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,037 UART: [art] PUB.X = 9860CFC3934EF7FC3652C249CC84024ED3A26F52891A0232CF39310CC24C95979E48A54AC28E7897AB0CFA7F36737861
3,742,795 UART: [art] PUB.Y = 14064B92F524DAFFD3976E47E9B329C2143234931B6A3CEEC3C6FFB849081AB283FE8277D75E758AF41BEC6A12D52C65
3,749,747 UART: [art] SIG.R = 2C65E7A7D4CA7541A818BAAF422E8E6FB3EE8EC09402BD19B8262238359FAA240D908A15E932B9BEAA1615248FD6703D
3,756,521 UART: [art] SIG.S = DE487CC50147B55E5ACB688103AF7AFE24B782DA0582551CFB2FBB57891725FF315BB822DAFAE0927B1E44E8CD9BED2A
3,780,536 UART: Caliptra RT
3,780,879 UART: [state] CFI Enabled
3,900,071 UART: [rt] RT listening for mailbox commands...
3,900,741 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,717 UART: [rt]cmd =0x41544d4e, len=14344
4,687,988 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,770 ready_for_fw is high
1,060,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,228,628 >>> mbox cmd response: success
3,291,727 UART:
3,291,743 UART: Running Caliptra FMC ...
3,292,151 UART:
3,292,294 UART: [state] CFI Enabled
3,302,782 UART: [fht] FMC Alias Private Key: 7
3,421,858 UART: [art] Extend RT PCRs Done
3,422,286 UART: [art] Lock RT PCRs Done
3,423,586 UART: [art] Populate DV Done
3,431,935 UART: [fht] FMC Alias Private Key: 7
3,432,877 UART: [art] Derive CDI
3,433,157 UART: [art] Store in slot 0x4
3,519,062 UART: [art] Derive Key Pair
3,519,422 UART: [art] Store priv key in slot 0x5
3,533,064 UART: [art] Derive Key Pair - Done
3,547,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,563,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,564,146 UART: [art] PUB.X = A51528FFA2FDC276D9A943E743BC141330797865A81E3836E18AF9E74D18A0F607B7ED8F8335EABE37D7CABBEC70A0B6
3,570,927 UART: [art] PUB.Y = 80E3E30C48753B044E82E149819571C7B21D24D7DCCB295F124D4165B215A41FED6E31618A2D079CED376B0C0D5C46CD
3,577,866 UART: [art] SIG.R = 6E8162F9A38D9BBC17F910528B29C60D334F95303C28B33A74759FD48049546F5CCB16CDE19DDD55D798956366E03C7F
3,584,633 UART: [art] SIG.S = D540327416D7E326E9AE6BFAEAE3E73B95656490D865DFC68777FCAFE6610C7E8915214F6C9BE9BAC270DF72905B799B
3,607,676 UART: Caliptra RT
3,608,019 UART: [state] CFI Enabled
3,728,651 UART: [rt] RT listening for mailbox commands...
3,729,321 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,852,403 UART: [rt]cmd =0x41544d4e, len=14344
4,505,940 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_ecc_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,211 UART:
192,665 UART: Running Caliptra ROM ...
193,812 UART:
193,963 UART: [state] CFI Enabled
264,253 UART: [state] LifecycleState = Unprovisioned
266,189 UART: [state] DebugLocked = No
268,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,080 UART: [kat] SHA2-256
442,810 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,357 UART: [kat] ++
453,853 UART: [kat] sha1
465,156 UART: [kat] SHA2-256
467,813 UART: [kat] SHA2-384
474,015 UART: [kat] SHA2-512-ACC
476,399 UART: [kat] ECC-384
2,767,515 UART: [kat] HMAC-384Kdf
2,800,364 UART: [kat] LMS
3,990,637 UART: [kat] --
3,995,922 UART: [cold-reset] ++
3,997,289 UART: [fht] Storing FHT @ 0x50003400
4,009,191 UART: [idev] ++
4,009,760 UART: [idev] CDI.KEYID = 6
4,010,673 UART: [idev] SUBJECT.KEYID = 7
4,011,922 UART: [idev] UDS.KEYID = 0
4,012,994 ready_for_fw is high
4,013,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,335 UART: [idev] Erasing UDS.KEYID = 0
7,347,381 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,511 UART: [idev] --
7,372,373 UART: [ldev] ++
7,372,949 UART: [ldev] CDI.KEYID = 6
7,373,913 UART: [ldev] SUBJECT.KEYID = 5
7,375,130 UART: [ldev] AUTHORITY.KEYID = 7
7,376,364 UART: [ldev] FE.KEYID = 1
7,422,827 UART: [ldev] Erasing FE.KEYID = 1
10,754,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,128 UART: [ldev] --
13,113,852 UART: [fwproc] Waiting for Commands...
13,116,335 UART: [fwproc] Received command 0x46574c44
13,118,528 UART: [fwproc] Received Image of size 118548 bytes
22,285,013 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,365,724 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,438,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,766,942 >>> mbox cmd response: success
22,770,802 UART: [afmc] ++
22,771,417 UART: [afmc] CDI.KEYID = 6
22,772,330 UART: [afmc] SUBJECT.KEYID = 7
22,773,547 UART: [afmc] AUTHORITY.KEYID = 5
26,148,886 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,451,433 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,453,745 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,468,211 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,482,987 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,497,389 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,518,508 UART: [afmc] --
28,522,684 UART: [cold-reset] --
28,525,906 UART: [state] Locking Datavault
28,533,150 UART: [state] Locking PCR0, PCR1 and PCR31
28,534,907 UART: [state] Locking ICCM
28,537,306 UART: [exit] Launching FMC @ 0x40000130
28,545,694 UART:
28,545,928 UART: Running Caliptra FMC ...
28,547,027 UART:
28,547,193 UART: [state] CFI Enabled
28,610,969 UART: [fht] FMC Alias Private Key: 7
30,951,406 UART: [art] Extend RT PCRs Done
30,952,632 UART: [art] Lock RT PCRs Done
30,953,983 UART: [art] Populate DV Done
30,959,501 UART: [fht] FMC Alias Private Key: 7
30,961,090 UART: [art] Derive CDI
30,961,927 UART: [art] Store in slot 0x4
31,019,672 UART: [art] Derive Key Pair
31,020,708 UART: [art] Store priv key in slot 0x5
34,313,385 UART: [art] Derive Key Pair - Done
34,326,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,615,121 UART: [art] Erasing AUTHORITY.KEYID = 7
36,616,626 UART: [art] PUB.X = 9C7C7669407C65384F5249DCD6689010D39B79E0ADDC1BA87F088DFDE403B2769F9ACCDA5D99FA6E09732EA17338F287
36,623,891 UART: [art] PUB.Y = A550B162C68DD881BDD29B2F403F1DE11A8EE06430FC31C01AEEF1F67B554B6BC41B3DBB72E53E4C1D797080455FBBBC
36,631,186 UART: [art] SIG.R = 4F6BAB043AF382E8A414D1B8CE214283E272FBD2BB4D3A0589B22231D2C4DE13999A7543511FF262F572F3274F3B5622
36,638,576 UART: [art] SIG.S = 6CCF0898F72A0C1A13A09CB84630CF1F48DA6837E3529DF577B51E86CD8E0001C544CE9D1DB09ED8AA44F16FD287787D
37,944,097 UART: Caliptra RT
37,944,810 UART: [state] CFI Enabled
38,121,197 UART: [rt] RT listening for mailbox commands...
38,123,521 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
38,279,004 UART: [rt]cmd =0x41544d4e, len=14344
43,821,445 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,805,611 ready_for_fw is high
3,806,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,029,968 >>> mbox cmd response: success
27,731,771 UART:
27,732,170 UART: Running Caliptra FMC ...
27,733,379 UART:
27,733,548 UART: [state] CFI Enabled
27,797,807 UART: [fht] FMC Alias Private Key: 7
30,138,283 UART: [art] Extend RT PCRs Done
30,139,507 UART: [art] Lock RT PCRs Done
30,141,161 UART: [art] Populate DV Done
30,146,567 UART: [fht] FMC Alias Private Key: 7
30,148,270 UART: [art] Derive CDI
30,149,006 UART: [art] Store in slot 0x4
30,206,227 UART: [art] Derive Key Pair
30,207,277 UART: [art] Store priv key in slot 0x5
33,500,183 UART: [art] Derive Key Pair - Done
33,513,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,801,409 UART: [art] Erasing AUTHORITY.KEYID = 7
35,802,946 UART: [art] PUB.X = A2BB6FB34B5666DE42161749303D24FC3F14D3EAEFFC87451BEF90C60C37122CBAC38FB45AE14B358C84998AF9309828
35,810,228 UART: [art] PUB.Y = 738E44D770CC1407B80E1DB29D794FEFB36AAB2AB6CF54E87D5A2110B539C78560FDB27D4774AF9754D8C6CF20408F12
35,817,444 UART: [art] SIG.R = 1625B6EA6EE069F52E471D8278F8C54175C5E3E5BE044AAF943504013278B5F61602F7452D90226B82001793883DCF0A
35,824,854 UART: [art] SIG.S = 415219D075A5CB3D3078227B745F5F2469313720B5205B196C1D5A7750F34CB2BD8B88CD4A7E7709662BD4B6451E13BF
37,129,902 UART: Caliptra RT
37,130,604 UART: [state] CFI Enabled
37,306,651 UART: [rt] RT listening for mailbox commands...
37,308,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,464,786 UART: [rt]cmd =0x41544d4e, len=14344
42,878,464 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,519 UART:
192,879 UART: Running Caliptra ROM ...
194,091 UART:
603,824 UART: [state] CFI Enabled
619,547 UART: [state] LifecycleState = Unprovisioned
621,411 UART: [state] DebugLocked = No
623,993 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,626 UART: [kat] SHA2-256
798,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,930 UART: [kat] ++
809,406 UART: [kat] sha1
820,751 UART: [kat] SHA2-256
823,439 UART: [kat] SHA2-384
828,656 UART: [kat] SHA2-512-ACC
831,021 UART: [kat] ECC-384
3,114,480 UART: [kat] HMAC-384Kdf
3,126,003 UART: [kat] LMS
4,316,131 UART: [kat] --
4,321,163 UART: [cold-reset] ++
4,322,241 UART: [fht] Storing FHT @ 0x50003400
4,334,356 UART: [idev] ++
4,334,991 UART: [idev] CDI.KEYID = 6
4,335,896 UART: [idev] SUBJECT.KEYID = 7
4,337,129 UART: [idev] UDS.KEYID = 0
4,338,185 ready_for_fw is high
4,338,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,238 UART: [idev] Erasing UDS.KEYID = 0
7,626,921 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,207 UART: [idev] --
7,653,304 UART: [ldev] ++
7,653,869 UART: [ldev] CDI.KEYID = 6
7,654,826 UART: [ldev] SUBJECT.KEYID = 5
7,656,032 UART: [ldev] AUTHORITY.KEYID = 7
7,657,313 UART: [ldev] FE.KEYID = 1
7,669,914 UART: [ldev] Erasing FE.KEYID = 1
10,957,453 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,827 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,798 UART: [ldev] --
13,320,228 UART: [fwproc] Waiting for Commands...
13,322,368 UART: [fwproc] Received command 0x46574c44
13,324,541 UART: [fwproc] Received Image of size 118548 bytes
22,097,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,181,326 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,254,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,582,528 >>> mbox cmd response: success
22,586,999 UART: [afmc] ++
22,587,584 UART: [afmc] CDI.KEYID = 6
22,588,482 UART: [afmc] SUBJECT.KEYID = 7
22,589,748 UART: [afmc] AUTHORITY.KEYID = 5
25,904,310 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,200,266 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,202,530 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
28,217,050 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
28,231,820 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
28,246,211 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
28,268,921 UART: [afmc] --
28,273,667 UART: [cold-reset] --
28,277,690 UART: [state] Locking Datavault
28,281,905 UART: [state] Locking PCR0, PCR1 and PCR31
28,283,659 UART: [state] Locking ICCM
28,286,155 UART: [exit] Launching FMC @ 0x40000130
28,294,597 UART:
28,294,823 UART: Running Caliptra FMC ...
28,295,860 UART:
28,296,006 UART: [state] CFI Enabled
28,304,002 UART: [fht] FMC Alias Private Key: 7
30,643,973 UART: [art] Extend RT PCRs Done
30,645,193 UART: [art] Lock RT PCRs Done
30,646,792 UART: [art] Populate DV Done
30,652,034 UART: [fht] FMC Alias Private Key: 7
30,653,689 UART: [art] Derive CDI
30,654,423 UART: [art] Store in slot 0x4
30,696,891 UART: [art] Derive Key Pair
30,697,942 UART: [art] Store priv key in slot 0x5
33,939,917 UART: [art] Derive Key Pair - Done
33,952,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,233,445 UART: [art] Erasing AUTHORITY.KEYID = 7
36,234,959 UART: [art] PUB.X = BC410DA090F69EE75E85BA1914D30A635FE315F517EA41A2476AD67823641339D52379A4E9B00CAD333CB78D69CAFDD9
36,242,197 UART: [art] PUB.Y = 6467F19F954A6CDE5BEAF887222B7716E80E2E442D20E25A1F5AF8B230A3EAE31B51D5A178620B721FA9FF923E1FE60A
36,249,492 UART: [art] SIG.R = ADAB727B014ECF34444B42136EFAEA0753E46F38FC09FADDC9DD2A521D7F59491596EE2F8ABD9B427B5F39782DC89FEA
36,256,883 UART: [art] SIG.S = D710B890D274B0D127185D3510A9921CF6E60A8B7A3B88831A5A04B7115ACB94B982471F93C484C8717C06796840C921
37,561,908 UART: Caliptra RT
37,562,622 UART: [state] CFI Enabled
37,696,859 UART: [rt] RT listening for mailbox commands...
37,699,279 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,854,951 UART: [rt]cmd =0x41544d4e, len=14344
43,345,246 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.49s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,633 writing to cptra_bootfsm_go
4,130,409 ready_for_fw is high
4,130,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,556,838 >>> mbox cmd response: success
28,198,052 UART:
28,198,451 UART: Running Caliptra FMC ...
28,199,552 UART:
28,199,702 UART: [state] CFI Enabled
28,207,733 UART: [fht] FMC Alias Private Key: 7
30,547,929 UART: [art] Extend RT PCRs Done
30,549,149 UART: [art] Lock RT PCRs Done
30,550,853 UART: [art] Populate DV Done
30,556,258 UART: [fht] FMC Alias Private Key: 7
30,557,959 UART: [art] Derive CDI
30,558,768 UART: [art] Store in slot 0x4
30,600,926 UART: [art] Derive Key Pair
30,601,921 UART: [art] Store priv key in slot 0x5
33,843,445 UART: [art] Derive Key Pair - Done
33,856,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,136,801 UART: [art] Erasing AUTHORITY.KEYID = 7
36,138,304 UART: [art] PUB.X = C6E5392E87778EDD77C333FEA8704663FD92D3D19EEDCEC1AD73A30C56EAA75E43C7B60E27F4BB68E6B829DD99296C20
36,145,635 UART: [art] PUB.Y = 2BAAAEC83A867A2DAFB6094E41342593EA9DBF2A63D39FAC37FD1E6ABE4821D0B54E186CDEDAD907DBD957B7FA248005
36,152,926 UART: [art] SIG.R = 0934CEF5DC88338AE376DBAEA9CA8F2D8054327F823B9AED0CE6C0521F5E974C6383DADE337BA1CC3A9B032821554FA4
36,160,322 UART: [art] SIG.S = 0F30B012D1B4FDAFB89BCEC4442651D8EE075867E216C39CD68730FC1DB12EF9BB271182E7217F895B47D10C1418A290
37,465,666 UART: Caliptra RT
37,466,346 UART: [state] CFI Enabled
37,599,852 UART: [rt] RT listening for mailbox commands...
37,602,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
37,757,446 UART: [rt]cmd =0x41544d4e, len=14344
43,119,339 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.48s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,116 UART:
192,489 UART: Running Caliptra ROM ...
193,637 UART:
193,788 UART: [state] CFI Enabled
267,018 UART: [state] LifecycleState = Unprovisioned
269,021 UART: [state] DebugLocked = No
271,549 UART: [state] WD Timer not started. Device not locked for debugging
275,869 UART: [kat] SHA2-256
455,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,306 UART: [kat] ++
466,784 UART: [kat] sha1
478,408 UART: [kat] SHA2-256
481,054 UART: [kat] SHA2-384
488,037 UART: [kat] SHA2-512-ACC
490,419 UART: [kat] ECC-384
2,948,251 UART: [kat] HMAC-384Kdf
2,971,228 UART: [kat] LMS
3,447,668 UART: [kat] --
3,452,666 UART: [cold-reset] ++
3,454,907 UART: [fht] FHT @ 0x50003400
3,467,165 UART: [idev] ++
3,467,801 UART: [idev] CDI.KEYID = 6
3,468,703 UART: [idev] SUBJECT.KEYID = 7
3,469,942 UART: [idev] UDS.KEYID = 0
3,470,930 ready_for_fw is high
3,471,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,289 UART: [idev] Erasing UDS.KEYID = 0
5,987,738 UART: [idev] Sha1 KeyId Algorithm
6,012,344 UART: [idev] --
6,018,215 UART: [ldev] ++
6,018,873 UART: [ldev] CDI.KEYID = 6
6,019,788 UART: [ldev] SUBJECT.KEYID = 5
6,020,945 UART: [ldev] AUTHORITY.KEYID = 7
6,022,232 UART: [ldev] FE.KEYID = 1
6,057,879 UART: [ldev] Erasing FE.KEYID = 1
8,563,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,186 UART: [ldev] --
10,374,956 UART: [fwproc] Wait for Commands...
10,377,476 UART: [fwproc] Recv command 0x46574c44
10,379,453 UART: [fwproc] Recv'd Img size: 118548 bytes
14,930,398 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,014,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,087,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,415,681 >>> mbox cmd response: success
15,419,105 UART: [afmc] ++
15,419,754 UART: [afmc] CDI.KEYID = 6
15,420,662 UART: [afmc] SUBJECT.KEYID = 7
15,421,873 UART: [afmc] AUTHORITY.KEYID = 5
17,963,621 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,707,769 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,709,951 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,725,783 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,741,713 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,757,427 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,783,009 UART: [afmc] --
19,787,379 UART: [cold-reset] --
19,789,778 UART: [state] Locking Datavault
19,795,831 UART: [state] Locking PCR0, PCR1 and PCR31
19,797,607 UART: [state] Locking ICCM
19,799,969 UART: [exit] Launching FMC @ 0x40000130
19,808,415 UART:
19,808,648 UART: Running Caliptra FMC ...
19,809,744 UART:
19,809,902 UART: [state] CFI Enabled
19,863,187 UART: [fht] FMC Alias Private Key: 7
21,630,541 UART: [art] Extend RT PCRs Done
21,631,766 UART: [art] Lock RT PCRs Done
21,633,278 UART: [art] Populate DV Done
21,638,796 UART: [fht] FMC Alias Private Key: 7
21,640,277 UART: [art] Derive CDI
21,641,030 UART: [art] Store in slot 0x4
21,696,611 UART: [art] Derive Key Pair
21,697,645 UART: [art] Store priv key in slot 0x5
24,160,704 UART: [art] Derive Key Pair - Done
24,173,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,886,795 UART: [art] Erasing AUTHORITY.KEYID = 7
25,888,307 UART: [art] PUB.X = 489071EC22027DBEF73950BF29707B215D7692550392A5A46CB8EC3CB446446472B75E9E9FE2A85D7D7925FFC4CF78D0
25,895,555 UART: [art] PUB.Y = 5B0A3E0127B34E7FA61BCFB86D5432ECA06A6795CBBA45EB6BA5B66C1E2309153171B7A6D40CFF0BCBE71791530C27CE
25,902,847 UART: [art] SIG.R = A4F155136A6C3042CACB971D2802EA0B6C2B6881D4E7EAB8DFC4A243DB3F6DB2FD36B3B4E0644630A779279C8CB42E89
25,910,234 UART: [art] SIG.S = 78A05F1F13F1A7DD63156CFC192A9B1ABD2FA947149DBCCC6BEF9651DDF84FC09012547EC1C1081DB5085970EF887FDA
26,889,098 UART: Caliptra RT
26,889,806 UART: [state] CFI Enabled
27,069,999 UART: [rt] RT listening for mailbox commands...
27,072,302 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,227,539 UART: [rt]cmd =0x41544d4e, len=14344
30,607,510 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
3,465,565 ready_for_fw is high
3,465,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,375,746 >>> mbox cmd response: success
19,665,836 UART:
19,666,213 UART: Running Caliptra FMC ...
19,667,414 UART:
19,667,578 UART: [state] CFI Enabled
19,735,346 UART: [fht] FMC Alias Private Key: 7
21,522,430 UART: [art] Extend RT PCRs Done
21,523,649 UART: [art] Lock RT PCRs Done
21,525,385 UART: [art] Populate DV Done
21,530,964 UART: [fht] FMC Alias Private Key: 7
21,532,554 UART: [art] Derive CDI
21,533,367 UART: [art] Store in slot 0x4
21,589,080 UART: [art] Derive Key Pair
21,590,119 UART: [art] Store priv key in slot 0x5
24,053,700 UART: [art] Derive Key Pair - Done
24,066,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,779,754 UART: [art] Erasing AUTHORITY.KEYID = 7
25,781,256 UART: [art] PUB.X = FB5EB543C2B473CDB65D907DD926CC36B4C1BB9052C57D6D14B73F661B2E5EC71C3B2F6A697051285E5B2F2F0088EC82
25,788,510 UART: [art] PUB.Y = B4213ACE252906807CE416987300BB2AF7265D2E6AD509DCF1EF2B104DB2692886C7AAE5B8F92263B1443356FDD3B3EB
25,795,781 UART: [art] SIG.R = C250567752E335EF777E51F4CDD7FB1F3006F1D3E0431B586228DA3698A989A1B291D1845E02B3E24BE4B764D4BFD15B
25,803,151 UART: [art] SIG.S = D4345C1D42132DAB10C97E4B277C853F68AE55819C6D9AF9B7963CAA04795BA2B8FAC511779F88BC26081B56650880FE
26,782,183 UART: Caliptra RT
26,782,889 UART: [state] CFI Enabled
26,963,309 UART: [rt] RT listening for mailbox commands...
26,965,635 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,120,899 UART: [rt]cmd =0x41544d4e, len=14344
30,498,828 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,314 UART:
192,660 UART: Running Caliptra ROM ...
193,869 UART:
603,576 UART: [state] CFI Enabled
618,178 UART: [state] LifecycleState = Unprovisioned
620,080 UART: [state] DebugLocked = No
622,889 UART: [state] WD Timer not started. Device not locked for debugging
626,639 UART: [kat] SHA2-256
806,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,101 UART: [kat] ++
817,550 UART: [kat] sha1
829,345 UART: [kat] SHA2-256
832,000 UART: [kat] SHA2-384
837,096 UART: [kat] SHA2-512-ACC
839,475 UART: [kat] ECC-384
3,281,740 UART: [kat] HMAC-384Kdf
3,294,613 UART: [kat] LMS
3,771,090 UART: [kat] --
3,776,165 UART: [cold-reset] ++
3,778,381 UART: [fht] FHT @ 0x50003400
3,790,068 UART: [idev] ++
3,790,644 UART: [idev] CDI.KEYID = 6
3,791,675 UART: [idev] SUBJECT.KEYID = 7
3,792,856 UART: [idev] UDS.KEYID = 0
3,793,796 ready_for_fw is high
3,793,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,834 UART: [idev] Erasing UDS.KEYID = 0
6,273,425 UART: [idev] Sha1 KeyId Algorithm
6,296,652 UART: [idev] --
6,301,409 UART: [ldev] ++
6,301,996 UART: [ldev] CDI.KEYID = 6
6,303,083 UART: [ldev] SUBJECT.KEYID = 5
6,304,197 UART: [ldev] AUTHORITY.KEYID = 7
6,305,375 UART: [ldev] FE.KEYID = 1
6,317,103 UART: [ldev] Erasing FE.KEYID = 1
8,795,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,859 UART: [ldev] --
10,589,185 UART: [fwproc] Wait for Commands...
10,591,657 UART: [fwproc] Recv command 0x46574c44
10,593,699 UART: [fwproc] Recv'd Img size: 118548 bytes
15,139,582 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,223,183 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,296,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,624,605 >>> mbox cmd response: success
15,628,322 UART: [afmc] ++
15,628,934 UART: [afmc] CDI.KEYID = 6
15,629,829 UART: [afmc] SUBJECT.KEYID = 7
15,631,049 UART: [afmc] AUTHORITY.KEYID = 5
18,138,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,858,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,861,173 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,877,053 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,892,972 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,908,677 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,933,320 UART: [afmc] --
19,937,250 UART: [cold-reset] --
19,943,489 UART: [state] Locking Datavault
19,949,459 UART: [state] Locking PCR0, PCR1 and PCR31
19,951,218 UART: [state] Locking ICCM
19,953,183 UART: [exit] Launching FMC @ 0x40000130
19,961,591 UART:
19,961,828 UART: Running Caliptra FMC ...
19,962,854 UART:
19,963,002 UART: [state] CFI Enabled
19,971,007 UART: [fht] FMC Alias Private Key: 7
21,736,773 UART: [art] Extend RT PCRs Done
21,737,975 UART: [art] Lock RT PCRs Done
21,739,438 UART: [art] Populate DV Done
21,744,961 UART: [fht] FMC Alias Private Key: 7
21,746,499 UART: [art] Derive CDI
21,747,317 UART: [art] Store in slot 0x4
21,789,915 UART: [art] Derive Key Pair
21,790,919 UART: [art] Store priv key in slot 0x5
24,217,713 UART: [art] Derive Key Pair - Done
24,230,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,936,359 UART: [art] Erasing AUTHORITY.KEYID = 7
25,937,876 UART: [art] PUB.X = 1ABAF70AC2B0AF3B2DEDFCE0ACC0AAB92913C103938CC26BD907F0B3A425638264B20BF1CF3C82E0FF62206C7DF7AC5D
25,945,177 UART: [art] PUB.Y = 537BC5B6E9A7CC83065DC595791DA1B834A050BF9FEE03C549F09108DC972E7E0CCCF9D1D6E229FA9EC675A5C0EF7B7D
25,952,474 UART: [art] SIG.R = 4F6242309A06CF281DEAFCA579B7B967F102E6E4A08C755DA7C6A5EF4256A1133E7E407FC5348B5152ED1F812AE87972
25,959,815 UART: [art] SIG.S = B46A186623633F34A8BA5167A2808A88C52A5FBBF157193A402975D8AD4F5779B760ACDCFAC09868930F15EB118F6F76
26,938,429 UART: Caliptra RT
26,939,138 UART: [state] CFI Enabled
27,072,074 UART: [rt] RT listening for mailbox commands...
27,074,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,229,845 UART: [rt]cmd =0x41544d4e, len=14344
30,609,004 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,297 writing to cptra_bootfsm_go
3,780,948 ready_for_fw is high
3,781,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,638,033 >>> mbox cmd response: success
19,884,636 UART:
19,885,021 UART: Running Caliptra FMC ...
19,886,222 UART:
19,886,416 UART: [state] CFI Enabled
19,894,259 UART: [fht] FMC Alias Private Key: 7
21,660,476 UART: [art] Extend RT PCRs Done
21,661,703 UART: [art] Lock RT PCRs Done
21,663,291 UART: [art] Populate DV Done
21,668,878 UART: [fht] FMC Alias Private Key: 7
21,670,606 UART: [art] Derive CDI
21,671,426 UART: [art] Store in slot 0x4
21,714,143 UART: [art] Derive Key Pair
21,715,184 UART: [art] Store priv key in slot 0x5
24,142,551 UART: [art] Derive Key Pair - Done
24,155,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,861,103 UART: [art] Erasing AUTHORITY.KEYID = 7
25,862,603 UART: [art] PUB.X = 9BEDB3CFB439E5A44B27FF301A407BC68170E54115E0B50F4EDD714D592062A77117AA56A99DB5E2230C86AEFFE9C155
25,869,865 UART: [art] PUB.Y = 6A549F37B4B0B0E75CAB1E6C54FC98B33C9D27DB1691392CF792997E7BA04E58EBC3FBFF4779E74E83C94DD19331FB5C
25,877,171 UART: [art] SIG.R = 1E4CA10B743CED78EABA6737BF2C6291E47E2398B31ABC15AC62853671965733D5648B36D51C866C6D750C0A876AD3C8
25,884,584 UART: [art] SIG.S = 075516925754D681D48A068F9722D3B491F5667BA2D59CCAFD14B3F00D1D1E7EB6E21ECC6176325C4D1FB6FB4E537515
26,863,721 UART: Caliptra RT
26,864,440 UART: [state] CFI Enabled
26,996,642 UART: [rt] RT listening for mailbox commands...
26,998,940 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,154,196 UART: [rt]cmd =0x41544d4e, len=14344
30,540,772 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
192,053 UART:
192,435 UART: Running Caliptra ROM ...
193,622 UART:
193,779 UART: [state] CFI Enabled
263,906 UART: [state] LifecycleState = Unprovisioned
266,257 UART: [state] DebugLocked = No
268,574 UART: [state] WD Timer not started. Device not locked for debugging
272,460 UART: [kat] SHA2-256
462,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,156 UART: [kat] ++
473,604 UART: [kat] sha1
484,474 UART: [kat] SHA2-256
487,491 UART: [kat] SHA2-384
494,543 UART: [kat] SHA2-512-ACC
497,180 UART: [kat] ECC-384
2,948,404 UART: [kat] HMAC-384Kdf
2,971,293 UART: [kat] LMS
3,503,044 UART: [kat] --
3,507,638 UART: [cold-reset] ++
3,508,512 UART: [fht] FHT @ 0x50003400
3,520,341 UART: [idev] ++
3,521,049 UART: [idev] CDI.KEYID = 6
3,522,080 UART: [idev] SUBJECT.KEYID = 7
3,523,179 UART: [idev] UDS.KEYID = 0
3,524,119 ready_for_fw is high
3,524,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,358 UART: [idev] Erasing UDS.KEYID = 0
6,026,018 UART: [idev] Sha1 KeyId Algorithm
6,049,931 UART: [idev] --
6,054,952 UART: [ldev] ++
6,055,639 UART: [ldev] CDI.KEYID = 6
6,056,654 UART: [ldev] SUBJECT.KEYID = 5
6,057,756 UART: [ldev] AUTHORITY.KEYID = 7
6,058,986 UART: [ldev] FE.KEYID = 1
6,099,772 UART: [ldev] Erasing FE.KEYID = 1
8,608,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,364,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,379,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,394,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,428 UART: [ldev] --
10,420,188 UART: [fwproc] Wait for Commands...
10,422,121 UART: [fwproc] Recv command 0x46574c44
10,424,376 UART: [fwproc] Recv'd Img size: 118548 bytes
15,097,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,173,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,296,836 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,857,709 >>> mbox cmd response: success
15,861,468 UART: [afmc] ++
15,862,193 UART: [afmc] CDI.KEYID = 6
15,863,386 UART: [afmc] SUBJECT.KEYID = 7
15,864,821 UART: [afmc] AUTHORITY.KEYID = 5
18,394,647 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,120,628 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,122,539 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,137,638 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,152,894 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,167,921 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,190,385 UART: [afmc] --
20,193,185 UART: [cold-reset] --
20,198,747 UART: [state] Locking Datavault
20,202,926 UART: [state] Locking PCR0, PCR1 and PCR31
20,205,116 UART: [state] Locking ICCM
20,206,357 UART: [exit] Launching FMC @ 0x40000130
20,215,044 UART:
20,215,282 UART: Running Caliptra FMC ...
20,216,377 UART:
20,216,536 UART: [state] CFI Enabled
20,278,628 UART: [fht] FMC Alias Private Key: 7
22,044,311 UART: [art] Extend RT PCRs Done
22,045,531 UART: [art] Lock RT PCRs Done
22,047,315 UART: [art] Populate DV Done
22,052,939 UART: [fht] FMC Alias Private Key: 7
22,054,648 UART: [art] Derive CDI
22,055,462 UART: [art] Store in slot 0x4
22,111,903 UART: [art] Derive Key Pair
22,112,957 UART: [art] Store priv key in slot 0x5
24,575,537 UART: [art] Derive Key Pair - Done
24,588,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,301,722 UART: [art] Erasing AUTHORITY.KEYID = 7
26,303,228 UART: [art] PUB.X = 23933E54A74DF0E3BD53A2A647EE51570CF6353B3A1C6A67DA68BBD01B82735050DA933F25FDB090EE5492DC09756A38
26,310,487 UART: [art] PUB.Y = 68C2C80F204AFB4949CB75D505E4E7DC39BCCBBBBC99FE7B7390D75081F5CC6D48B9316DA44701DC4C7FC93E80BFAF96
26,317,777 UART: [art] SIG.R = 5D644D1258EBCEEE69EB6195CF67EF2D40CEEC9522EB2CB61BA99E865B0ABD175EEFD2CFC165592C1BF3EF7472A55F9E
26,325,179 UART: [art] SIG.S = 0E9378BFADC9D01D17BCF55F375D8D265621C6937C1081388FCDFDE6191651C0F964C26ECC19A5D0FCA718B5122FA615
27,304,168 UART: Caliptra RT
27,304,855 UART: [state] CFI Enabled
27,485,026 UART: [rt] RT listening for mailbox commands...
27,487,619 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,643,300 UART: [rt]cmd =0x41544d4e, len=14344
31,028,552 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,415,899 ready_for_fw is high
3,416,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,879,290 >>> mbox cmd response: success
20,160,649 UART:
20,161,053 UART: Running Caliptra FMC ...
20,162,164 UART:
20,162,317 UART: [state] CFI Enabled
20,226,635 UART: [fht] FMC Alias Private Key: 7
21,993,025 UART: [art] Extend RT PCRs Done
21,994,238 UART: [art] Lock RT PCRs Done
21,995,665 UART: [art] Populate DV Done
22,000,861 UART: [fht] FMC Alias Private Key: 7
22,002,297 UART: [art] Derive CDI
22,003,062 UART: [art] Store in slot 0x4
22,059,937 UART: [art] Derive Key Pair
22,060,937 UART: [art] Store priv key in slot 0x5
24,524,057 UART: [art] Derive Key Pair - Done
24,536,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,249,941 UART: [art] Erasing AUTHORITY.KEYID = 7
26,251,458 UART: [art] PUB.X = 5E4B5CEEE2EBB96EB4FDA04446D2AB2B1BBC3B04EC6F985BE448B7120ECA895E1D6B5D7B30CDBA4F497B266AAF5F11B2
26,258,733 UART: [art] PUB.Y = B2231E02A9608A3259F4D873CF8ED82AD24E04A1B503CD559BF203CCAA8837B8FD0B396FE900F86DE24E75D0051A1C40
26,266,036 UART: [art] SIG.R = 385CCBB0068F323CCD79A68D855A3ABCD532E321C03374146A309865265B798EDB60DA989373AD7278E8CB11CBB9A768
26,273,405 UART: [art] SIG.S = 4AFE96FE3749973FD2A5F6E79A53959BCEC2D4D5CB40C5F7100D8FD2330FEBB654C46A457264171FA8211E148679813E
27,251,817 UART: Caliptra RT
27,252,509 UART: [state] CFI Enabled
27,433,448 UART: [rt] RT listening for mailbox commands...
27,435,762 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,591,140 UART: [rt]cmd =0x41544d4e, len=14344
30,978,719 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,526 UART:
192,894 UART: Running Caliptra ROM ...
194,033 UART:
603,773 UART: [state] CFI Enabled
620,847 UART: [state] LifecycleState = Unprovisioned
623,239 UART: [state] DebugLocked = No
625,202 UART: [state] WD Timer not started. Device not locked for debugging
629,387 UART: [kat] SHA2-256
819,325 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,101 UART: [kat] ++
830,725 UART: [kat] sha1
842,608 UART: [kat] SHA2-256
845,620 UART: [kat] SHA2-384
852,894 UART: [kat] SHA2-512-ACC
855,489 UART: [kat] ECC-384
3,296,586 UART: [kat] HMAC-384Kdf
3,310,351 UART: [kat] LMS
3,842,186 UART: [kat] --
3,847,505 UART: [cold-reset] ++
3,848,661 UART: [fht] FHT @ 0x50003400
3,860,059 UART: [idev] ++
3,860,785 UART: [idev] CDI.KEYID = 6
3,861,701 UART: [idev] SUBJECT.KEYID = 7
3,862,883 UART: [idev] UDS.KEYID = 0
3,863,812 ready_for_fw is high
3,864,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,010 UART: [idev] Erasing UDS.KEYID = 0
6,342,459 UART: [idev] Sha1 KeyId Algorithm
6,365,150 UART: [idev] --
6,371,036 UART: [ldev] ++
6,371,727 UART: [ldev] CDI.KEYID = 6
6,372,644 UART: [ldev] SUBJECT.KEYID = 5
6,373,808 UART: [ldev] AUTHORITY.KEYID = 7
6,375,043 UART: [ldev] FE.KEYID = 1
6,387,694 UART: [ldev] Erasing FE.KEYID = 1
8,864,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,119 UART: [ldev] --
10,657,926 UART: [fwproc] Wait for Commands...
10,660,950 UART: [fwproc] Recv command 0x46574c44
10,663,263 UART: [fwproc] Recv'd Img size: 118548 bytes
15,346,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,427,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,550,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,109,761 >>> mbox cmd response: success
16,113,873 UART: [afmc] ++
16,114,607 UART: [afmc] CDI.KEYID = 6
16,115,806 UART: [afmc] SUBJECT.KEYID = 7
16,117,259 UART: [afmc] AUTHORITY.KEYID = 5
18,623,314 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,345,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,347,144 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,362,196 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,377,454 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,392,505 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,417,739 UART: [afmc] --
20,421,492 UART: [cold-reset] --
20,424,677 UART: [state] Locking Datavault
20,430,112 UART: [state] Locking PCR0, PCR1 and PCR31
20,432,275 UART: [state] Locking ICCM
20,434,511 UART: [exit] Launching FMC @ 0x40000130
20,443,201 UART:
20,443,441 UART: Running Caliptra FMC ...
20,444,549 UART:
20,444,708 UART: [state] CFI Enabled
20,452,922 UART: [fht] FMC Alias Private Key: 7
22,219,277 UART: [art] Extend RT PCRs Done
22,220,504 UART: [art] Lock RT PCRs Done
22,222,379 UART: [art] Populate DV Done
22,228,014 UART: [fht] FMC Alias Private Key: 7
22,229,741 UART: [art] Derive CDI
22,230,486 UART: [art] Store in slot 0x4
22,273,244 UART: [art] Derive Key Pair
22,274,292 UART: [art] Store priv key in slot 0x5
24,700,237 UART: [art] Derive Key Pair - Done
24,713,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,419,229 UART: [art] Erasing AUTHORITY.KEYID = 7
26,420,749 UART: [art] PUB.X = 55C95F2D461D8819E6248A1C52475D19E3E688EA39DB8A40685EB54E43BB53C26018E5CA6239E6C321E13CE7A1A32CC2
26,427,974 UART: [art] PUB.Y = 5AC655E8F39DA57E454773E5A824695E5FA89C510BD1528E9DAB25D48D0378A8031577426C819F7B451998998633EFA2
26,435,237 UART: [art] SIG.R = 283FDCA19C9D74E51C79A1228EE143F21405C5E42DDF901C8C536584C2D537B17B7F15E9772ACDC8ABFA722143F74A02
26,442,670 UART: [art] SIG.S = 13B28034B0CC1F8B2CEA2D904AF94C498C4798AEE4C3EE19271D9842D4D1CCB9739F46DD388F856BF16F66CA4B6B885A
27,421,323 UART: Caliptra RT
27,422,020 UART: [state] CFI Enabled
27,555,624 UART: [rt] RT listening for mailbox commands...
27,557,953 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,713,328 UART: [rt]cmd =0x41544d4e, len=14344
31,096,417 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,756,960 ready_for_fw is high
3,757,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,153,392 >>> mbox cmd response: success
20,410,483 UART:
20,410,871 UART: Running Caliptra FMC ...
20,412,075 UART:
20,412,248 UART: [state] CFI Enabled
20,420,458 UART: [fht] FMC Alias Private Key: 7
22,185,736 UART: [art] Extend RT PCRs Done
22,187,020 UART: [art] Lock RT PCRs Done
22,188,473 UART: [art] Populate DV Done
22,194,107 UART: [fht] FMC Alias Private Key: 7
22,195,761 UART: [art] Derive CDI
22,196,501 UART: [art] Store in slot 0x4
22,239,191 UART: [art] Derive Key Pair
22,240,206 UART: [art] Store priv key in slot 0x5
24,667,110 UART: [art] Derive Key Pair - Done
24,680,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,386,619 UART: [art] Erasing AUTHORITY.KEYID = 7
26,388,131 UART: [art] PUB.X = 6CEC3A460A23B921FFD233C0B4CF7ED878C714B5EB2E6BCD65411FB35FBDC84A18F34D01D91309012B1824313ED23BE2
26,395,407 UART: [art] PUB.Y = B2E124EDEBCE1D53B5EDF1E7F88EB6E5B7034C6CB62A49371A15D61BF81EADD873B50DE4A8418BED218217BA4D05F1B3
26,402,655 UART: [art] SIG.R = 9F60949905EF8DE3C789021349866E54A32C9DE15CC6D4273D2A6189F2B3F46D49A372809E0280F1E2E0A7A57E2667F4
26,410,077 UART: [art] SIG.S = 90CA731A030720F89D3FCCBD3D89FB3DFB0FDB605BEAB2F60B7031AFA3F9F799023684176EC67183C56EFE99C31282BE
27,388,622 UART: Caliptra RT
27,389,330 UART: [state] CFI Enabled
27,522,792 UART: [rt] RT listening for mailbox commands...
27,525,105 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
27,680,793 UART: [rt]cmd =0x41544d4e, len=14344
31,057,951 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,335 UART: [kat] SHA2-256
892,273 UART: [kat] SHA2-384
894,970 UART: [kat] SHA2-512-ACC
896,871 UART: [kat] ECC-384
902,188 UART: [kat] HMAC-384Kdf
906,802 UART: [kat] LMS
1,474,998 UART: [kat] --
1,475,759 UART: [cold-reset] ++
1,476,149 UART: [fht] Storing FHT @ 0x50003400
1,478,820 UART: [idev] ++
1,478,988 UART: [idev] CDI.KEYID = 6
1,479,348 UART: [idev] SUBJECT.KEYID = 7
1,479,772 UART: [idev] UDS.KEYID = 0
1,480,117 ready_for_fw is high
1,480,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,286 UART: [idev] Erasing UDS.KEYID = 0
1,503,842 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,516 UART: [idev] --
1,513,585 UART: [ldev] ++
1,513,753 UART: [ldev] CDI.KEYID = 6
1,514,116 UART: [ldev] SUBJECT.KEYID = 5
1,514,542 UART: [ldev] AUTHORITY.KEYID = 7
1,515,005 UART: [ldev] FE.KEYID = 1
1,520,155 UART: [ldev] Erasing FE.KEYID = 1
1,545,130 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,345 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,236 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,948 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,824 UART: [ldev] --
1,584,179 UART: [fwproc] Waiting for Commands...
1,585,034 UART: [fwproc] Received command 0x46574c44
1,585,825 UART: [fwproc] Received Image of size 118548 bytes
5,166,236 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,194,130 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,225,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,365,645 >>> mbox cmd response: success
5,366,669 UART: [afmc] ++
5,366,837 UART: [afmc] CDI.KEYID = 6
5,367,199 UART: [afmc] SUBJECT.KEYID = 7
5,367,624 UART: [afmc] AUTHORITY.KEYID = 5
5,402,847 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,419,255 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,420,035 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,425,741 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,431,620 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,437,333 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,445,094 UART: [afmc] --
5,446,150 UART: [cold-reset] --
5,446,962 UART: [state] Locking Datavault
5,448,115 UART: [state] Locking PCR0, PCR1 and PCR31
5,448,719 UART: [state] Locking ICCM
5,449,377 UART: [exit] Launching FMC @ 0x40000130
5,454,707 UART:
5,454,723 UART: Running Caliptra FMC ...
5,455,131 UART:
5,455,185 UART: [state] CFI Enabled
5,465,849 UART: [fht] FMC Alias Private Key: 7
5,584,271 UART: [art] Extend RT PCRs Done
5,584,699 UART: [art] Lock RT PCRs Done
5,586,339 UART: [art] Populate DV Done
5,594,670 UART: [fht] FMC Alias Private Key: 7
5,595,620 UART: [art] Derive CDI
5,595,900 UART: [art] Store in slot 0x4
5,681,616 UART: [art] Derive Key Pair
5,681,976 UART: [art] Store priv key in slot 0x5
5,695,543 UART: [art] Derive Key Pair - Done
5,710,168 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,725,277 UART: [art] Erasing AUTHORITY.KEYID = 7
5,726,042 UART: [art] PUB.X = 675C40D2C0FD0F95A6D55B321E5210D0CA1AFC8A78407A17A2F6B9CFFBF6CE568E87A7CBC0CFE728BA665FBEC73FF847
5,732,835 UART: [art] PUB.Y = E08EC02A1D1B5C8E04B37D27A343C4481736707FC9BD770A4BC7DED142B7A7AEEC1ADC9AD81250F82E87EF1B1D3BF1A7
5,739,801 UART: [art] SIG.R = A53C5D41CE8F997E05A4875B182E81E9B3D8E86C7DDE2E01A6A1BC364E225C3B4F291BD7F6CD8094DE609E6F3E75758A
5,746,579 UART: [art] SIG.S = 60D6A26FF2B0E5CF285606698E5EA78D1883F064C9F2CAD8B40E823327EEDFA2CA8A522E83BBD040E99AD73A75AE3E8C
5,770,519 UART: Caliptra RT
5,770,770 UART: [state] CFI Enabled
5,890,348 UART: [rt] RT listening for mailbox commands...
5,891,018 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,014,116 UART: [rt]cmd =0x41544d4e, len=14344
8,482,345 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,685 ready_for_fw is high
1,362,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,329,704 >>> mbox cmd response: success
5,391,929 UART:
5,391,945 UART: Running Caliptra FMC ...
5,392,353 UART:
5,392,407 UART: [state] CFI Enabled
5,402,811 UART: [fht] FMC Alias Private Key: 7
5,521,531 UART: [art] Extend RT PCRs Done
5,521,959 UART: [art] Lock RT PCRs Done
5,523,585 UART: [art] Populate DV Done
5,531,796 UART: [fht] FMC Alias Private Key: 7
5,532,906 UART: [art] Derive CDI
5,533,186 UART: [art] Store in slot 0x4
5,619,056 UART: [art] Derive Key Pair
5,619,416 UART: [art] Store priv key in slot 0x5
5,632,641 UART: [art] Derive Key Pair - Done
5,647,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,663,152 UART: [art] Erasing AUTHORITY.KEYID = 7
5,663,917 UART: [art] PUB.X = D0A0385AC3FD90B7A909D03D1667250B6B50B9CEE15FC61A6485A5F12B58591F62F8869A1AFCAA292FED451A9D2924EB
5,670,693 UART: [art] PUB.Y = D83A0490C7267A07AA75FE8AA1E351323CA25AAF20A317E07C40B4A4E1AFAD38BFD9B32BDA2A13D7E841B68500B5DD0F
5,677,632 UART: [art] SIG.R = 257CC3BD904212CAD3A029F020792C6DE0B0C1507F86A03FB692D36255DFB4CCC75DA8213E8C396C239F78552283C25E
5,684,406 UART: [art] SIG.S = 707DF52FBB90EBC76291292FFAD40071AF708E5B0BE38231441DC5AC04133793C726A7C7301F751AE80C4BD7EFE2D6DE
5,707,063 UART: Caliptra RT
5,707,314 UART: [state] CFI Enabled
5,827,831 UART: [rt] RT listening for mailbox commands...
5,828,501 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,951,549 UART: [rt]cmd =0x41544d4e, len=14344
8,570,644 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,191 UART: [state] LifecycleState = Unprovisioned
85,846 UART: [state] DebugLocked = No
86,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,034 UART: [kat] SHA2-256
881,965 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,080 UART: [kat] ++
886,232 UART: [kat] sha1
890,570 UART: [kat] SHA2-256
892,508 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,689 UART: [kat] HMAC-384Kdf
907,289 UART: [kat] LMS
1,475,485 UART: [kat] --
1,476,174 UART: [cold-reset] ++
1,476,614 UART: [fht] Storing FHT @ 0x50003400
1,479,517 UART: [idev] ++
1,479,685 UART: [idev] CDI.KEYID = 6
1,480,045 UART: [idev] SUBJECT.KEYID = 7
1,480,469 UART: [idev] UDS.KEYID = 0
1,480,814 ready_for_fw is high
1,480,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,585 UART: [idev] Erasing UDS.KEYID = 0
1,505,327 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,943 UART: [idev] --
1,515,078 UART: [ldev] ++
1,515,246 UART: [ldev] CDI.KEYID = 6
1,515,609 UART: [ldev] SUBJECT.KEYID = 5
1,516,035 UART: [ldev] AUTHORITY.KEYID = 7
1,516,498 UART: [ldev] FE.KEYID = 1
1,521,488 UART: [ldev] Erasing FE.KEYID = 1
1,547,647 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,521 UART: [ldev] --
1,586,822 UART: [fwproc] Waiting for Commands...
1,587,475 UART: [fwproc] Received command 0x46574c44
1,588,266 UART: [fwproc] Received Image of size 118548 bytes
5,320,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,348,095 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,379,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,519,570 >>> mbox cmd response: success
5,520,820 UART: [afmc] ++
5,520,988 UART: [afmc] CDI.KEYID = 6
5,521,350 UART: [afmc] SUBJECT.KEYID = 7
5,521,775 UART: [afmc] AUTHORITY.KEYID = 5
5,556,966 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,573,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,573,862 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,579,568 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,585,447 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,591,160 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,599,037 UART: [afmc] --
5,599,997 UART: [cold-reset] --
5,600,739 UART: [state] Locking Datavault
5,601,990 UART: [state] Locking PCR0, PCR1 and PCR31
5,602,594 UART: [state] Locking ICCM
5,603,234 UART: [exit] Launching FMC @ 0x40000130
5,608,564 UART:
5,608,580 UART: Running Caliptra FMC ...
5,608,988 UART:
5,609,131 UART: [state] CFI Enabled
5,619,845 UART: [fht] FMC Alias Private Key: 7
5,738,851 UART: [art] Extend RT PCRs Done
5,739,279 UART: [art] Lock RT PCRs Done
5,741,001 UART: [art] Populate DV Done
5,749,124 UART: [fht] FMC Alias Private Key: 7
5,750,204 UART: [art] Derive CDI
5,750,484 UART: [art] Store in slot 0x4
5,836,314 UART: [art] Derive Key Pair
5,836,674 UART: [art] Store priv key in slot 0x5
5,850,227 UART: [art] Derive Key Pair - Done
5,865,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,881,054 UART: [art] Erasing AUTHORITY.KEYID = 7
5,881,819 UART: [art] PUB.X = 57EDDAD48524CDF1A4FEC3B8DD1DB1CF2E05E1EAA346655BB2288DB44C71B1AC16E49F79601BED153A4F8186F8C19621
5,888,606 UART: [art] PUB.Y = 075C9A6CE37ECC1107A26B74E3C615A6C6BA9866A504394B084BCB1124BD99B45168954E84478C547A800284FDF7678C
5,895,539 UART: [art] SIG.R = B8B7A5AF4DE937D1395A38DCDCE66CAECFC006D2B8514F104AC3D0A352415AC97E6479AFF5D39EA34DF6950DEFB63C7C
5,902,329 UART: [art] SIG.S = B0E110E0B9B78EB6F6F79E9BF716D8E00655B9A448BC0E0A14C7814B52D827B27472667FC87825F1D0C5D560A5361DDC
5,925,778 UART: Caliptra RT
5,926,121 UART: [state] CFI Enabled
6,046,558 UART: [rt] RT listening for mailbox commands...
6,047,228 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,170,060 UART: [rt]cmd =0x41544d4e, len=14344
8,524,052 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,864 ready_for_fw is high
1,362,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,331,701 >>> mbox cmd response: success
5,393,978 UART:
5,393,994 UART: Running Caliptra FMC ...
5,394,402 UART:
5,394,545 UART: [state] CFI Enabled
5,405,205 UART: [fht] FMC Alias Private Key: 7
5,524,009 UART: [art] Extend RT PCRs Done
5,524,437 UART: [art] Lock RT PCRs Done
5,526,065 UART: [art] Populate DV Done
5,534,224 UART: [fht] FMC Alias Private Key: 7
5,535,314 UART: [art] Derive CDI
5,535,594 UART: [art] Store in slot 0x4
5,621,396 UART: [art] Derive Key Pair
5,621,756 UART: [art] Store priv key in slot 0x5
5,634,885 UART: [art] Derive Key Pair - Done
5,649,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,665,237 UART: [art] Erasing AUTHORITY.KEYID = 7
5,666,002 UART: [art] PUB.X = 533FC2DEEB8CC6195CB1C1474153EA70489C31EA337CDE23003A047EBDAFACACFA31205B31F37602996E8160DD9F6346
5,672,756 UART: [art] PUB.Y = 8BCE6AE43FA293EA78BAC6DB22733B244002F25971B2BF7CFBBE7ECDA80AA33FD7F16E40FAF6429EF02D0B3A7381012F
5,679,718 UART: [art] SIG.R = 313FD010CBDF9F058578BD6466ABD84FA9DC8FAEDE9AB3AB73A5C1E368626BBDD4C744844B15C5F765087DFD1BFA2474
5,686,504 UART: [art] SIG.S = AFA422EAED5356AFAFB164FAF09ECCF52E2099C881C5706A1899F18102290768A89BD46D11B2EB1C46CBF741F5630809
5,709,682 UART: Caliptra RT
5,710,025 UART: [state] CFI Enabled
5,831,079 UART: [rt] RT listening for mailbox commands...
5,831,749 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,954,793 UART: [rt]cmd =0x41544d4e, len=14344
8,308,740 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,838 UART: [state] LifecycleState = Unprovisioned
85,493 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,306 UART: [kat] SHA2-256
890,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,960 UART: [kat] ++
895,112 UART: [kat] sha1
899,404 UART: [kat] SHA2-256
901,344 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
915,737 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,718 UART: [cold-reset] ++
1,170,180 UART: [fht] FHT @ 0x50003400
1,172,996 UART: [idev] ++
1,173,164 UART: [idev] CDI.KEYID = 6
1,173,525 UART: [idev] SUBJECT.KEYID = 7
1,173,950 UART: [idev] UDS.KEYID = 0
1,174,296 ready_for_fw is high
1,174,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,191 UART: [idev] Sha1 KeyId Algorithm
1,207,125 UART: [idev] --
1,207,984 UART: [ldev] ++
1,208,152 UART: [ldev] CDI.KEYID = 6
1,208,516 UART: [ldev] SUBJECT.KEYID = 5
1,208,943 UART: [ldev] AUTHORITY.KEYID = 7
1,209,406 UART: [ldev] FE.KEYID = 1
1,214,624 UART: [ldev] Erasing FE.KEYID = 1
1,240,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,932 UART: [ldev] --
1,280,377 UART: [fwproc] Wait for Commands...
1,280,952 UART: [fwproc] Recv command 0x46574c44
1,281,685 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,202,114 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,233,289 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,373,444 >>> mbox cmd response: success
3,374,604 UART: [afmc] ++
3,374,772 UART: [afmc] CDI.KEYID = 6
3,375,135 UART: [afmc] SUBJECT.KEYID = 7
3,375,561 UART: [afmc] AUTHORITY.KEYID = 5
3,411,140 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,427,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,428,034 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,433,741 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,439,618 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,445,328 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,453,014 UART: [afmc] --
3,453,901 UART: [cold-reset] --
3,454,533 UART: [state] Locking Datavault
3,455,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,456,358 UART: [state] Locking ICCM
3,456,838 UART: [exit] Launching FMC @ 0x40000130
3,462,168 UART:
3,462,184 UART: Running Caliptra FMC ...
3,462,592 UART:
3,462,646 UART: [state] CFI Enabled
3,473,516 UART: [fht] FMC Alias Private Key: 7
3,593,118 UART: [art] Extend RT PCRs Done
3,593,546 UART: [art] Lock RT PCRs Done
3,595,500 UART: [art] Populate DV Done
3,603,725 UART: [fht] FMC Alias Private Key: 7
3,604,849 UART: [art] Derive CDI
3,605,129 UART: [art] Store in slot 0x4
3,690,980 UART: [art] Derive Key Pair
3,691,340 UART: [art] Store priv key in slot 0x5
3,704,308 UART: [art] Derive Key Pair - Done
3,718,903 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,734,626 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,391 UART: [art] PUB.X = 3305DB9ED886902FB57E639818754A498AEF9314ED80813670FA828AE173D9F603066D842315B178F5EE8FD7D36A4020
3,742,146 UART: [art] PUB.Y = F6C9D54705AE5F5D83240B91C55655340DF22CB271485DBD15AD45B9A4BF339B754372DD7ACFFE7DB640131220E706EB
3,749,092 UART: [art] SIG.R = 23BA4CEFEB89629E035E45D112A617DDF92482D0FABB72DE7D439BCCBEF0E6214ABFD48B18F73BE52741EA3CD96571F7
3,755,881 UART: [art] SIG.S = 609A590AFA71DC6D9A5E0D1CB054CC35E4CE6913645BDC48C934204AA4B33E6AFCEB8A47CE87843106887E825081A9F8
3,779,196 UART: Caliptra RT
3,779,447 UART: [state] CFI Enabled
3,899,729 UART: [rt] RT listening for mailbox commands...
3,900,399 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,023,369 UART: [rt]cmd =0x41544d4e, len=14344
4,699,600 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,524 ready_for_fw is high
1,059,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,663 >>> mbox cmd response: success
3,290,038 UART:
3,290,054 UART: Running Caliptra FMC ...
3,290,462 UART:
3,290,516 UART: [state] CFI Enabled
3,300,624 UART: [fht] FMC Alias Private Key: 7
3,419,764 UART: [art] Extend RT PCRs Done
3,420,192 UART: [art] Lock RT PCRs Done
3,421,936 UART: [art] Populate DV Done
3,430,123 UART: [fht] FMC Alias Private Key: 7
3,431,179 UART: [art] Derive CDI
3,431,459 UART: [art] Store in slot 0x4
3,517,528 UART: [art] Derive Key Pair
3,517,888 UART: [art] Store priv key in slot 0x5
3,531,644 UART: [art] Derive Key Pair - Done
3,546,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,561,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,562,350 UART: [art] PUB.X = 928ED4DAEB280CEB6E58CB7B5D655724075F8BB9D60145F8E83C94F263085DCBE90B9FEB2F0FC2D4E00730F50962CF57
3,569,110 UART: [art] PUB.Y = 0BED0120F9A6C5FFF05060AF83592F7EE1DE284AA6BB8639716C26D90903DE45446794479CF4AE9B8BE7A0F45AFEBE78
3,576,062 UART: [art] SIG.R = 4C6DDC1A86CADE3DDF10A7B380C938F92DA425E45EA30D2BE6A898430863E1136502EAB878916D00EB65A96D0874791D
3,582,806 UART: [art] SIG.S = 9C0CE7B216189007189155E2C30F47FCA5F23AEF1A5BAD8400300F4873D4B818E762EE8E7F9925A82F1791ABF5BA5518
3,606,256 UART: Caliptra RT
3,606,507 UART: [state] CFI Enabled
3,725,669 UART: [rt] RT listening for mailbox commands...
3,726,339 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,849,147 UART: [rt]cmd =0x41544d4e, len=14344
4,522,863 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,783 UART: [kat] SHA2-256
891,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,437 UART: [kat] ++
895,589 UART: [kat] sha1
899,933 UART: [kat] SHA2-256
901,873 UART: [kat] SHA2-384
904,590 UART: [kat] SHA2-512-ACC
906,491 UART: [kat] ECC-384
915,992 UART: [kat] HMAC-384Kdf
920,494 UART: [kat] LMS
1,168,806 UART: [kat] --
1,169,623 UART: [cold-reset] ++
1,170,001 UART: [fht] FHT @ 0x50003400
1,172,671 UART: [idev] ++
1,172,839 UART: [idev] CDI.KEYID = 6
1,173,200 UART: [idev] SUBJECT.KEYID = 7
1,173,625 UART: [idev] UDS.KEYID = 0
1,173,971 ready_for_fw is high
1,173,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,626 UART: [idev] Erasing UDS.KEYID = 0
1,199,074 UART: [idev] Sha1 KeyId Algorithm
1,208,106 UART: [idev] --
1,209,115 UART: [ldev] ++
1,209,283 UART: [ldev] CDI.KEYID = 6
1,209,647 UART: [ldev] SUBJECT.KEYID = 5
1,210,074 UART: [ldev] AUTHORITY.KEYID = 7
1,210,537 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,242,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,149 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,185 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 118548 bytes
3,163,551 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,191,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,222,635 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,362,916 >>> mbox cmd response: success
3,364,142 UART: [afmc] ++
3,364,310 UART: [afmc] CDI.KEYID = 6
3,364,673 UART: [afmc] SUBJECT.KEYID = 7
3,365,099 UART: [afmc] AUTHORITY.KEYID = 5
3,401,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,417,913 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,418,662 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,424,369 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,430,246 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,435,956 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,443,918 UART: [afmc] --
3,444,969 UART: [cold-reset] --
3,445,667 UART: [state] Locking Datavault
3,446,754 UART: [state] Locking PCR0, PCR1 and PCR31
3,447,358 UART: [state] Locking ICCM
3,447,928 UART: [exit] Launching FMC @ 0x40000130
3,453,258 UART:
3,453,274 UART: Running Caliptra FMC ...
3,453,682 UART:
3,453,825 UART: [state] CFI Enabled
3,464,541 UART: [fht] FMC Alias Private Key: 7
3,583,177 UART: [art] Extend RT PCRs Done
3,583,605 UART: [art] Lock RT PCRs Done
3,585,207 UART: [art] Populate DV Done
3,593,490 UART: [fht] FMC Alias Private Key: 7
3,594,658 UART: [art] Derive CDI
3,594,938 UART: [art] Store in slot 0x4
3,680,535 UART: [art] Derive Key Pair
3,680,895 UART: [art] Store priv key in slot 0x5
3,694,411 UART: [art] Derive Key Pair - Done
3,709,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,724,856 UART: [art] Erasing AUTHORITY.KEYID = 7
3,725,621 UART: [art] PUB.X = BDCBFAAF1F61DFEA7027B4F8363537542F9809AE2135FB0ABA887CA9AB13A99882E40CCC70715B6C3ABF426BC8371EDA
3,732,404 UART: [art] PUB.Y = 4ED1EF35BDE78BEBBDF6E5C99242024C6B1D3ABBC0C91F65F0F4787F4BF5F6BE933BD4484E1C63C6E2835A78BA61E34C
3,739,375 UART: [art] SIG.R = C8D6A7B45B67B006147925D1241A0D90FD3C33D09B9C2CB45236BFCC1595D0360A79F555A5165AF99F89961FA0EEC6AD
3,746,144 UART: [art] SIG.S = 4E10EF80E90C29B21D601D2BC21C1B0B9BAF4E04E10BF6935353D7B61CC71FA42306D17BE54236B354E4BB9C288B5DB5
3,770,003 UART: Caliptra RT
3,770,346 UART: [state] CFI Enabled
3,890,240 UART: [rt] RT listening for mailbox commands...
3,890,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,014,058 UART: [rt]cmd =0x41544d4e, len=14344
4,672,400 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,837 ready_for_fw is high
1,059,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,245 >>> mbox cmd response: success
3,277,310 UART:
3,277,326 UART: Running Caliptra FMC ...
3,277,734 UART:
3,277,877 UART: [state] CFI Enabled
3,288,871 UART: [fht] FMC Alias Private Key: 7
3,408,125 UART: [art] Extend RT PCRs Done
3,408,553 UART: [art] Lock RT PCRs Done
3,410,037 UART: [art] Populate DV Done
3,418,158 UART: [fht] FMC Alias Private Key: 7
3,419,092 UART: [art] Derive CDI
3,419,372 UART: [art] Store in slot 0x4
3,505,189 UART: [art] Derive Key Pair
3,505,549 UART: [art] Store priv key in slot 0x5
3,519,091 UART: [art] Derive Key Pair - Done
3,533,977 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,549,550 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,315 UART: [art] PUB.X = CC329D8547EB39F57A39BCF2D4E1ADD3F493D665B4CF9BE836746FB5F23483886F7B6B5352A01D701B9C039EC2421ED6
3,557,092 UART: [art] PUB.Y = 6FD163576D780099260F16C80270FA230C27E2CCAD2D570420D2D861E63ABFDF9DA05D8FBE29B33B272B4AA4E725A0B0
3,564,018 UART: [art] SIG.R = C508D5E8A0493BAD1E1B84D6D8AE3E14EB6500C1CE33B0767DD67A2760C618912C1DAB2BAFCD6388F5E6DA6B387E80F3
3,570,781 UART: [art] SIG.S = A608AE56E99493844880E2F218B195427582D3EEA6D2607BAE61E289B5388B1F80472B4BB5251515DE475E97DA77942F
3,594,898 UART: Caliptra RT
3,595,241 UART: [state] CFI Enabled
3,715,272 UART: [rt] RT listening for mailbox commands...
3,715,942 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,816 UART: [rt]cmd =0x41544d4e, len=14344
4,507,022 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,226 UART: [state] LifecycleState = Unprovisioned
85,881 UART: [state] DebugLocked = No
86,415 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,528 UART: [kat] HMAC-384Kdf
922,034 UART: [kat] LMS
1,170,362 UART: [kat] --
1,171,127 UART: [cold-reset] ++
1,171,693 UART: [fht] FHT @ 0x50003400
1,174,254 UART: [idev] ++
1,174,422 UART: [idev] CDI.KEYID = 6
1,174,782 UART: [idev] SUBJECT.KEYID = 7
1,175,206 UART: [idev] UDS.KEYID = 0
1,175,551 ready_for_fw is high
1,175,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,412 UART: [idev] Erasing UDS.KEYID = 0
1,200,301 UART: [idev] Sha1 KeyId Algorithm
1,208,687 UART: [idev] --
1,209,739 UART: [ldev] ++
1,209,907 UART: [ldev] CDI.KEYID = 6
1,210,270 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,101 UART: [ldev] Erasing FE.KEYID = 1
1,241,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,183 UART: [ldev] --
1,280,650 UART: [fwproc] Wait for Commands...
1,281,446 UART: [fwproc] Recv command 0x46574c44
1,282,174 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,205,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,236,256 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,376,469 >>> mbox cmd response: success
3,377,703 UART: [afmc] ++
3,377,871 UART: [afmc] CDI.KEYID = 6
3,378,233 UART: [afmc] SUBJECT.KEYID = 7
3,378,658 UART: [afmc] AUTHORITY.KEYID = 5
3,414,113 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,430,472 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,431,220 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,436,926 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,442,805 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,448,515 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,456,232 UART: [afmc] --
3,457,354 UART: [cold-reset] --
3,458,108 UART: [state] Locking Datavault
3,459,369 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,973 UART: [state] Locking ICCM
3,460,641 UART: [exit] Launching FMC @ 0x40000130
3,465,971 UART:
3,465,987 UART: Running Caliptra FMC ...
3,466,395 UART:
3,466,449 UART: [state] CFI Enabled
3,477,045 UART: [fht] FMC Alias Private Key: 7
3,595,735 UART: [art] Extend RT PCRs Done
3,596,163 UART: [art] Lock RT PCRs Done
3,597,889 UART: [art] Populate DV Done
3,606,240 UART: [fht] FMC Alias Private Key: 7
3,607,302 UART: [art] Derive CDI
3,607,582 UART: [art] Store in slot 0x4
3,693,233 UART: [art] Derive Key Pair
3,693,593 UART: [art] Store priv key in slot 0x5
3,707,453 UART: [art] Derive Key Pair - Done
3,722,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,737,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,737,851 UART: [art] PUB.X = 274053A04AF6A54F08D5B0B1733869CB01613A47588F5E4044938B64FA44F6E000F73AFE30D0D0DEA90391245A202F50
3,744,586 UART: [art] PUB.Y = 7905FCFEC7645B9E84F9B305F309D5C29A082F098D64AE963D934F617384C280774AA799C8E23870E77D049F5B4AC4F7
3,751,518 UART: [art] SIG.R = 66F5E5F11E8FBF494AFA146755EC92AB8FC2694EB4054438AC4D0EE07C32FE14136A830550015291B7EF5BFDC1634590
3,758,282 UART: [art] SIG.S = AC368B6C3FFE90313DE8A6908D7D805FC0E187DA1B0E4421D8A21F22C71D5164ACC3E024409520E8DA8685BA941657AC
3,781,351 UART: Caliptra RT
3,781,602 UART: [state] CFI Enabled
3,900,308 UART: [rt] RT listening for mailbox commands...
3,900,978 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,024,142 UART: [rt]cmd =0x41544d4e, len=14344
4,695,625 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 ready_for_fw is high
1,060,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,217,476 >>> mbox cmd response: success
3,279,075 UART:
3,279,091 UART: Running Caliptra FMC ...
3,279,499 UART:
3,279,553 UART: [state] CFI Enabled
3,289,965 UART: [fht] FMC Alias Private Key: 7
3,409,575 UART: [art] Extend RT PCRs Done
3,410,003 UART: [art] Lock RT PCRs Done
3,411,611 UART: [art] Populate DV Done
3,419,968 UART: [fht] FMC Alias Private Key: 7
3,420,958 UART: [art] Derive CDI
3,421,238 UART: [art] Store in slot 0x4
3,506,917 UART: [art] Derive Key Pair
3,507,277 UART: [art] Store priv key in slot 0x5
3,520,515 UART: [art] Derive Key Pair - Done
3,535,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,396 UART: [art] PUB.X = 76896EE7C56A4D48D71229366D5C0A53187E6F0D0E0AD703DFD65DFF765BC701B75D592742A64E9CF7C0688DA2E47038
3,558,152 UART: [art] PUB.Y = A903B9C8887E65519A907066209C064048F6B9E6D0B457B489C8F67FF818D223A0343A77F5D6227ABF27FD91F2D8004F
3,565,070 UART: [art] SIG.R = 3560DE3EDE26D8827CF66B3B1AB2B40C9DCD6DD65E3E9D0C11F8FF800A17A5992D2F2C2B7E65589963CFBF83DCB75D63
3,571,851 UART: [art] SIG.S = BB4B937822B5F9517940CF5DE7D263A6F73C3C693DF388F797B1DED510DE2BFFF36479CF775777B47FF1D40596D9ABEB
3,595,414 UART: Caliptra RT
3,595,665 UART: [state] CFI Enabled
3,715,359 UART: [rt] RT listening for mailbox commands...
3,716,029 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,875 UART: [rt]cmd =0x41544d4e, len=14344
4,507,631 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
88,051 UART: [kat] SHA2-256
893,701 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,826 UART: [kat] ++
897,978 UART: [kat] sha1
902,254 UART: [kat] SHA2-256
904,194 UART: [kat] SHA2-384
907,103 UART: [kat] SHA2-512-ACC
909,004 UART: [kat] ECC-384
918,765 UART: [kat] HMAC-384Kdf
923,211 UART: [kat] LMS
1,171,539 UART: [kat] --
1,172,152 UART: [cold-reset] ++
1,172,580 UART: [fht] FHT @ 0x50003400
1,175,309 UART: [idev] ++
1,175,477 UART: [idev] CDI.KEYID = 6
1,175,837 UART: [idev] SUBJECT.KEYID = 7
1,176,261 UART: [idev] UDS.KEYID = 0
1,176,606 ready_for_fw is high
1,176,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,363 UART: [idev] Erasing UDS.KEYID = 0
1,201,618 UART: [idev] Sha1 KeyId Algorithm
1,209,956 UART: [idev] --
1,211,054 UART: [ldev] ++
1,211,222 UART: [ldev] CDI.KEYID = 6
1,211,585 UART: [ldev] SUBJECT.KEYID = 5
1,212,011 UART: [ldev] AUTHORITY.KEYID = 7
1,212,474 UART: [ldev] FE.KEYID = 1
1,217,936 UART: [ldev] Erasing FE.KEYID = 1
1,244,655 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,308 UART: [ldev] --
1,283,669 UART: [fwproc] Wait for Commands...
1,284,255 UART: [fwproc] Recv command 0x46574c44
1,284,983 UART: [fwproc] Recv'd Img size: 118548 bytes
3,184,198 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,212,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,243,341 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,383,640 >>> mbox cmd response: success
3,384,860 UART: [afmc] ++
3,385,028 UART: [afmc] CDI.KEYID = 6
3,385,390 UART: [afmc] SUBJECT.KEYID = 7
3,385,815 UART: [afmc] AUTHORITY.KEYID = 5
3,421,646 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,437,737 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,438,485 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,444,191 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,450,070 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,455,780 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,463,477 UART: [afmc] --
3,464,503 UART: [cold-reset] --
3,465,291 UART: [state] Locking Datavault
3,466,326 UART: [state] Locking PCR0, PCR1 and PCR31
3,466,930 UART: [state] Locking ICCM
3,467,450 UART: [exit] Launching FMC @ 0x40000130
3,472,780 UART:
3,472,796 UART: Running Caliptra FMC ...
3,473,204 UART:
3,473,347 UART: [state] CFI Enabled
3,484,133 UART: [fht] FMC Alias Private Key: 7
3,603,521 UART: [art] Extend RT PCRs Done
3,603,949 UART: [art] Lock RT PCRs Done
3,605,607 UART: [art] Populate DV Done
3,613,804 UART: [fht] FMC Alias Private Key: 7
3,614,776 UART: [art] Derive CDI
3,615,056 UART: [art] Store in slot 0x4
3,700,585 UART: [art] Derive Key Pair
3,700,945 UART: [art] Store priv key in slot 0x5
3,714,427 UART: [art] Derive Key Pair - Done
3,729,427 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,745,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,745,867 UART: [art] PUB.X = CD171DD1AF60D70F81BD01F1C82EB5FB9541F995AF9BB4B42BCF8AAA5E9F6B08B923556753B4EB11D4E3F6DF9B81EE22
3,752,652 UART: [art] PUB.Y = 91E8B94ECF4359A9CFA12017269D187E0320A202DD7E9CF9FEFFACCBE2657811CEC9456CF480B4D6D30798B5D9CA7E68
3,759,609 UART: [art] SIG.R = B599EAFB6187BCD30124FA883EB4676818FE2B14B95DAFC36D0D8299DE03CC184C45A756FAC8F7AE0FC009A4E8272A01
3,766,377 UART: [art] SIG.S = 3CE0F35DC8172360904C58CD523EE5CF8B8392C3DDCFF2657321786C87AC917C59C11A8E7456FA1C0547372DC622F8A6
3,790,800 UART: Caliptra RT
3,791,143 UART: [state] CFI Enabled
3,910,855 UART: [rt] RT listening for mailbox commands...
3,911,525 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,627 UART: [rt]cmd =0x41544d4e, len=14344
4,707,931 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,048 ready_for_fw is high
1,061,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,335 >>> mbox cmd response: success
3,288,266 UART:
3,288,282 UART: Running Caliptra FMC ...
3,288,690 UART:
3,288,833 UART: [state] CFI Enabled
3,299,395 UART: [fht] FMC Alias Private Key: 7
3,417,613 UART: [art] Extend RT PCRs Done
3,418,041 UART: [art] Lock RT PCRs Done
3,419,497 UART: [art] Populate DV Done
3,427,820 UART: [fht] FMC Alias Private Key: 7
3,428,938 UART: [art] Derive CDI
3,429,218 UART: [art] Store in slot 0x4
3,514,927 UART: [art] Derive Key Pair
3,515,287 UART: [art] Store priv key in slot 0x5
3,528,977 UART: [art] Derive Key Pair - Done
3,544,071 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,559,994 UART: [art] Erasing AUTHORITY.KEYID = 7
3,560,759 UART: [art] PUB.X = 13B27D459843324651D422198669C22DAA4DB9E6EB07989E75777EFEF5746E64DD787B147D9E9264E9A8BA23F857A472
3,567,522 UART: [art] PUB.Y = 81011828ECB67F0A5C3507381A447C7ED8E71479AFAB48C22940CC4875D5AC0C7DCE99E59049FE1FA10AA0ACA160944D
3,574,467 UART: [art] SIG.R = 5809B376C4258D514F7E6E44CF0D52CC0A19C316DB80DA4A34BB68B66C473A8CEA0732CA6D864B599C134FD15D5FD74B
3,581,237 UART: [art] SIG.S = 78E4A9DE526FBB441147EBF2FFF3EBE31872133F2FA630ACE9CDA771E8577FEF34F7F5D7A430EC0F0DC60C8565B4BC3B
3,605,912 UART: Caliptra RT
3,606,255 UART: [state] CFI Enabled
3,726,617 UART: [rt] RT listening for mailbox commands...
3,727,287 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,850,559 UART: [rt]cmd =0x41544d4e, len=14344
4,517,570 >>> mbox cmd response: failed
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,023 writing to cptra_bootfsm_go
192,143 UART:
192,509 UART: Running Caliptra ROM ...
193,716 UART:
193,875 UART: [state] CFI Enabled
264,834 UART: [state] LifecycleState = Unprovisioned
266,829 UART: [state] DebugLocked = No
268,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,793 UART: [kat] SHA2-256
443,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,951 UART: [kat] ++
454,557 UART: [kat] sha1
464,952 UART: [kat] SHA2-256
467,657 UART: [kat] SHA2-384
474,005 UART: [kat] SHA2-512-ACC
476,381 UART: [kat] ECC-384
2,766,961 UART: [kat] HMAC-384Kdf
2,798,114 UART: [kat] LMS
3,988,435 UART: [kat] --
3,992,524 UART: [cold-reset] ++
3,994,031 UART: [fht] Storing FHT @ 0x50003400
4,006,506 UART: [idev] ++
4,007,091 UART: [idev] CDI.KEYID = 6
4,008,130 UART: [idev] SUBJECT.KEYID = 7
4,009,318 UART: [idev] UDS.KEYID = 0
4,010,394 ready_for_fw is high
4,010,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,673 UART: [idev] Erasing UDS.KEYID = 0
7,346,175 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,323 UART: [idev] --
7,373,154 UART: [ldev] ++
7,373,775 UART: [ldev] CDI.KEYID = 6
7,374,790 UART: [ldev] SUBJECT.KEYID = 5
7,375,949 UART: [ldev] AUTHORITY.KEYID = 7
7,377,211 UART: [ldev] FE.KEYID = 1
7,422,402 UART: [ldev] Erasing FE.KEYID = 1
10,751,340 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,309 UART: [ldev] --
13,115,731 UART: [fwproc] Waiting for Commands...
13,117,446 UART: [fwproc] Received command 0x46574c44
13,119,636 UART: [fwproc] Received Image of size 118548 bytes
17,225,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,180 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,181 >>> mbox cmd response: success
17,708,216 UART: [afmc] ++
17,708,828 UART: [afmc] CDI.KEYID = 6
17,709,722 UART: [afmc] SUBJECT.KEYID = 7
17,710,939 UART: [afmc] AUTHORITY.KEYID = 5
21,071,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,323 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,578 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,387,001 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,731 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,416,140 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,995 UART: [afmc] --
23,441,678 UART: [cold-reset] --
23,444,566 UART: [state] Locking Datavault
23,449,438 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,198 UART: [state] Locking ICCM
23,453,001 UART: [exit] Launching FMC @ 0x40000130
23,461,397 UART:
23,461,631 UART: Running Caliptra FMC ...
23,462,728 UART:
23,462,891 UART: [state] CFI Enabled
23,531,885 UART: [fht] FMC Alias Private Key: 7
25,871,962 UART: [art] Extend RT PCRs Done
25,873,187 UART: [art] Lock RT PCRs Done
25,875,027 UART: [art] Populate DV Done
25,880,761 UART: [fht] FMC Alias Private Key: 7
25,882,402 UART: [art] Derive CDI
25,883,214 UART: [art] Store in slot 0x4
25,940,960 UART: [art] Derive Key Pair
25,941,998 UART: [art] Store priv key in slot 0x5
29,234,866 UART: [art] Derive Key Pair - Done
29,247,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,874 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,378 UART: [art] PUB.X = E8BFAA8CB082D2BB4053D37AB57D2F1D0347675247CD73D886A4C764211122F9D211C6BDDEF6FA41D1698393879AFF01
31,545,680 UART: [art] PUB.Y = 367A499824E393BB104979616FD58D5185DC739FFB960249A46A4EC3887ACCF8826D519F57E428107254A2101E03E056
31,552,908 UART: [art] SIG.R = 28DA67F182F537BA12FA9F33FC6616E1F6377BE4232A1836F3260FE5A1A7B642CA284B80D51CAD6674782FA246AAD555
31,560,289 UART: [art] SIG.S = 60CEC27F5C3E4735F0E0D1268888EE9D6AB113BB07178EEE789A251D56344C0D459F66008C8337CD4B972048505B03B7
32,864,970 UART: Caliptra RT
32,865,695 UART: [state] CFI Enabled
33,044,925 UART: [rt] RT listening for mailbox commands...
33,047,256 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,202,517 UART: [rt]cmd =0x41544d4e, len=14344
38,503,383 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,804,700 ready_for_fw is high
3,805,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,993,832 >>> mbox cmd response: success
23,695,248 UART:
23,695,687 UART: Running Caliptra FMC ...
23,696,795 UART:
23,696,959 UART: [state] CFI Enabled
23,764,374 UART: [fht] FMC Alias Private Key: 7
26,104,651 UART: [art] Extend RT PCRs Done
26,105,885 UART: [art] Lock RT PCRs Done
26,107,458 UART: [art] Populate DV Done
26,112,612 UART: [fht] FMC Alias Private Key: 7
26,114,284 UART: [art] Derive CDI
26,115,110 UART: [art] Store in slot 0x4
26,172,586 UART: [art] Derive Key Pair
26,173,630 UART: [art] Store priv key in slot 0x5
29,466,051 UART: [art] Derive Key Pair - Done
29,479,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,766,771 UART: [art] Erasing AUTHORITY.KEYID = 7
31,768,283 UART: [art] PUB.X = 7684EC27B8BE0937F69546B42F182A3ACF5EAB1EF6BAE2F59E9FBD09259023C8EE098C100277ACD23D7D232CC47305B3
31,775,547 UART: [art] PUB.Y = 02693889646DF04178EA13526B6223B1DE177851B6FFDF547BE1B7BDD76E2F592122ACD48EEDA01E9DAB734C29F21E03
31,782,798 UART: [art] SIG.R = 447DCAC41839674A60115FC77AD51B0B67453A9A240B71329751DFA74658A161079675B1512EF113D2D0BD298F07DA92
31,790,193 UART: [art] SIG.S = C8F1A2CAF665EC101CEB91BFFD69F7AF4722F5936189B06FEAA69613EC976E533796FBA2EBB7B6E689E085F9EFA46723
33,095,435 UART: Caliptra RT
33,096,142 UART: [state] CFI Enabled
33,292,764 UART: [rt] RT listening for mailbox commands...
33,295,124 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,450,548 UART: [rt]cmd =0x41544d4e, len=14344
38,751,012 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,425 UART:
192,793 UART: Running Caliptra ROM ...
193,914 UART:
603,747 UART: [state] CFI Enabled
620,421 UART: [state] LifecycleState = Unprovisioned
622,320 UART: [state] DebugLocked = No
623,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,616 UART: [kat] SHA2-256
799,411 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,936 UART: [kat] ++
810,381 UART: [kat] sha1
822,244 UART: [kat] SHA2-256
824,967 UART: [kat] SHA2-384
831,181 UART: [kat] SHA2-512-ACC
833,547 UART: [kat] ECC-384
3,117,518 UART: [kat] HMAC-384Kdf
3,128,113 UART: [kat] LMS
4,318,281 UART: [kat] --
4,322,719 UART: [cold-reset] ++
4,323,652 UART: [fht] Storing FHT @ 0x50003400
4,334,414 UART: [idev] ++
4,334,970 UART: [idev] CDI.KEYID = 6
4,335,943 UART: [idev] SUBJECT.KEYID = 7
4,337,184 UART: [idev] UDS.KEYID = 0
4,338,245 ready_for_fw is high
4,338,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,281 UART: [idev] Erasing UDS.KEYID = 0
7,625,207 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,578 UART: [idev] --
7,649,866 UART: [ldev] ++
7,650,495 UART: [ldev] CDI.KEYID = 6
7,651,401 UART: [ldev] SUBJECT.KEYID = 5
7,652,611 UART: [ldev] AUTHORITY.KEYID = 7
7,653,890 UART: [ldev] FE.KEYID = 1
7,665,230 UART: [ldev] Erasing FE.KEYID = 1
10,949,980 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,543 UART: [ldev] --
13,309,559 UART: [fwproc] Waiting for Commands...
13,311,265 UART: [fwproc] Received command 0x46574c44
13,313,437 UART: [fwproc] Received Image of size 118548 bytes
17,423,604 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,692 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,125 >>> mbox cmd response: success
17,904,438 UART: [afmc] ++
17,905,052 UART: [afmc] CDI.KEYID = 6
17,905,962 UART: [afmc] SUBJECT.KEYID = 7
17,907,227 UART: [afmc] AUTHORITY.KEYID = 5
21,223,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,517,395 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,656 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,802 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,189 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,584,043 UART: [afmc] --
23,587,489 UART: [cold-reset] --
23,591,077 UART: [state] Locking Datavault
23,596,024 UART: [state] Locking PCR0, PCR1 and PCR31
23,597,723 UART: [state] Locking ICCM
23,598,877 UART: [exit] Launching FMC @ 0x40000130
23,607,319 UART:
23,607,547 UART: Running Caliptra FMC ...
23,608,588 UART:
23,608,731 UART: [state] CFI Enabled
23,616,989 UART: [fht] FMC Alias Private Key: 7
25,957,455 UART: [art] Extend RT PCRs Done
25,958,680 UART: [art] Lock RT PCRs Done
25,960,249 UART: [art] Populate DV Done
25,965,655 UART: [fht] FMC Alias Private Key: 7
25,967,277 UART: [art] Derive CDI
25,968,206 UART: [art] Store in slot 0x4
26,010,910 UART: [art] Derive Key Pair
26,011,911 UART: [art] Store priv key in slot 0x5
29,254,145 UART: [art] Derive Key Pair - Done
29,267,143 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,547,299 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,801 UART: [art] PUB.X = 3307FA5278781761365BBAA229705AF87CE39EFF707BBA892348E7F7548F76D8E68AB487A7F7E9308AEE507573BE98FA
31,556,091 UART: [art] PUB.Y = EE4814DCDDDB084DB7111395FD89BFDCC1ACF5113FB09BCC795A23BA8F57CAB2C2483BE1E3B15115A11FBC2489AFEBC9
31,563,372 UART: [art] SIG.R = 72BEF90C6C4C7C4DE805DE4890AB6EEEBC20AA2DC36AE49A920B21975DF3B3C25247D220A8376759250FF4782F48E382
31,570,793 UART: [art] SIG.S = 9DB3B20C8693BFFBA1CF98492E9D430FE8EA44BBF99ED11CAB939FD568CBA100CC5ADBFEA10E0418D9D70F4CEB5FDA91
32,875,850 UART: Caliptra RT
32,876,560 UART: [state] CFI Enabled
33,009,653 UART: [rt] RT listening for mailbox commands...
33,011,977 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,167,541 UART: [rt]cmd =0x41544d4e, len=14344
38,468,183 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,124,201 ready_for_fw is high
4,124,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,071 >>> mbox cmd response: success
23,792,773 UART:
23,793,180 UART: Running Caliptra FMC ...
23,794,299 UART:
23,794,453 UART: [state] CFI Enabled
23,802,583 UART: [fht] FMC Alias Private Key: 7
26,142,163 UART: [art] Extend RT PCRs Done
26,143,392 UART: [art] Lock RT PCRs Done
26,144,773 UART: [art] Populate DV Done
26,150,405 UART: [fht] FMC Alias Private Key: 7
26,151,943 UART: [art] Derive CDI
26,152,702 UART: [art] Store in slot 0x4
26,195,396 UART: [art] Derive Key Pair
26,196,437 UART: [art] Store priv key in slot 0x5
29,438,958 UART: [art] Derive Key Pair - Done
29,452,135 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,732,620 UART: [art] Erasing AUTHORITY.KEYID = 7
31,734,125 UART: [art] PUB.X = 302232440BF8E2003C442A50BD6935DA5BEA0B1003CE407741E58510B275C53B2C2E6544544A896CF22407DFF5D9D576
31,741,379 UART: [art] PUB.Y = 19A979AB45F77ED0764FE5ACE387E9C574E60EDEA91DCA0BBBDEDB76D9B1862A36C575CEBBBB75270187B0EC534BA099
31,748,645 UART: [art] SIG.R = F2082DF9EBB5B33F7E8326940E0729480972DACD6AB5809BADC5B4C2E74B503037CE8785ACDF3D490B5DECAFA10DD8CD
31,756,038 UART: [art] SIG.S = 6A2AE1BF2B27B9E52C9D20063A51F324AC50312137A35E82937422705499B393F8C96460883FBE5CE93A3006209FCE1B
33,060,974 UART: Caliptra RT
33,061,667 UART: [state] CFI Enabled
33,195,472 UART: [rt] RT listening for mailbox commands...
33,197,791 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
33,353,576 UART: [rt]cmd =0x41544d4e, len=14344
38,654,258 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,183 UART:
192,550 UART: Running Caliptra ROM ...
193,757 UART:
193,908 UART: [state] CFI Enabled
262,507 UART: [state] LifecycleState = Unprovisioned
264,495 UART: [state] DebugLocked = No
266,018 UART: [state] WD Timer not started. Device not locked for debugging
269,690 UART: [kat] SHA2-256
449,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,120 UART: [kat] ++
460,645 UART: [kat] sha1
471,685 UART: [kat] SHA2-256
474,381 UART: [kat] SHA2-384
479,588 UART: [kat] SHA2-512-ACC
481,949 UART: [kat] ECC-384
2,927,481 UART: [kat] HMAC-384Kdf
2,950,631 UART: [kat] LMS
3,427,145 UART: [kat] --
3,431,551 UART: [cold-reset] ++
3,432,583 UART: [fht] FHT @ 0x50003400
3,443,498 UART: [idev] ++
3,444,126 UART: [idev] CDI.KEYID = 6
3,445,049 UART: [idev] SUBJECT.KEYID = 7
3,446,289 UART: [idev] UDS.KEYID = 0
3,447,334 ready_for_fw is high
3,447,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,781 UART: [idev] Erasing UDS.KEYID = 0
5,966,828 UART: [idev] Sha1 KeyId Algorithm
5,991,382 UART: [idev] --
5,996,547 UART: [ldev] ++
5,997,176 UART: [ldev] CDI.KEYID = 6
5,998,058 UART: [ldev] SUBJECT.KEYID = 5
5,999,290 UART: [ldev] AUTHORITY.KEYID = 7
6,000,520 UART: [ldev] FE.KEYID = 1
6,036,354 UART: [ldev] Erasing FE.KEYID = 1
8,543,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,423 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,530 UART: [ldev] --
10,355,385 UART: [fwproc] Wait for Commands...
10,358,066 UART: [fwproc] Recv command 0x46574c44
10,360,099 UART: [fwproc] Recv'd Img size: 118548 bytes
13,848,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,997,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,326,170 >>> mbox cmd response: success
14,330,275 UART: [afmc] ++
14,330,866 UART: [afmc] CDI.KEYID = 6
14,331,753 UART: [afmc] SUBJECT.KEYID = 7
14,333,016 UART: [afmc] AUTHORITY.KEYID = 5
16,874,361 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,793 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,622 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,218 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,036 UART: [afmc] --
18,694,574 UART: [cold-reset] --
18,698,596 UART: [state] Locking Datavault
18,703,731 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,427 UART: [state] Locking ICCM
18,707,733 UART: [exit] Launching FMC @ 0x40000130
18,716,116 UART:
18,716,383 UART: Running Caliptra FMC ...
18,717,485 UART:
18,717,643 UART: [state] CFI Enabled
18,775,234 UART: [fht] FMC Alias Private Key: 7
20,542,274 UART: [art] Extend RT PCRs Done
20,543,490 UART: [art] Lock RT PCRs Done
20,545,061 UART: [art] Populate DV Done
20,550,633 UART: [fht] FMC Alias Private Key: 7
20,552,151 UART: [art] Derive CDI
20,552,916 UART: [art] Store in slot 0x4
20,608,812 UART: [art] Derive Key Pair
20,609,808 UART: [art] Store priv key in slot 0x5
23,072,197 UART: [art] Derive Key Pair - Done
23,085,144 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,512 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,023 UART: [art] PUB.X = E74EB70B1A687D2B215D99985E4B255F6435A4E46AB3026E54FC6C8D5A02499CF15391CB7DD1754A4C94D3B52AE04749
24,807,327 UART: [art] PUB.Y = 4D3A98DB6EE6FDE33B9A32311290451E0B639886A17E8D11C6D7F23E03131D0705FF9F0474D5AA7D21F73A2E03176B04
24,814,560 UART: [art] SIG.R = ECA6C2AB34E7A23AE2FBAC83CD598E1C61B13E3A9C22E738481DF5DDF35911F1C7CC3A34AE915C25D375D6B232CC0873
24,821,956 UART: [art] SIG.S = 5508A69EF0A0C9513B9771CF441981BDE03BF68FD47EFC10B05C8CD5FFEBD4393390ACFBB55E4C9A7E413C6AE419F6B3
25,800,606 UART: Caliptra RT
25,801,313 UART: [state] CFI Enabled
25,983,255 UART: [rt] RT listening for mailbox commands...
25,985,568 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,140,887 UART: [rt]cmd =0x41544d4e, len=14344
30,136,676 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
3,460,723 ready_for_fw is high
3,461,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,662 >>> mbox cmd response: success
18,537,973 UART:
18,538,356 UART: Running Caliptra FMC ...
18,539,547 UART:
18,539,718 UART: [state] CFI Enabled
18,601,703 UART: [fht] FMC Alias Private Key: 7
20,368,549 UART: [art] Extend RT PCRs Done
20,369,780 UART: [art] Lock RT PCRs Done
20,371,244 UART: [art] Populate DV Done
20,376,564 UART: [fht] FMC Alias Private Key: 7
20,378,262 UART: [art] Derive CDI
20,378,997 UART: [art] Store in slot 0x4
20,434,628 UART: [art] Derive Key Pair
20,435,629 UART: [art] Store priv key in slot 0x5
22,898,378 UART: [art] Derive Key Pair - Done
22,911,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,695 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,219 UART: [art] PUB.X = F6AEDE2A93AE775C5FD28D51664F55A18053A54F43FF1AA4DA8896FCA3A57F583995844BCAD7FEE700028C552CF36AF7
24,633,479 UART: [art] PUB.Y = 98EFB962185214CB38C145943879555D9FFBA7BB52E781511AFC7E7EC826124EB37EA4D89E2690576F1C03E6836B980C
24,640,764 UART: [art] SIG.R = B3D7CDFCFFF341A505232F72473422FFB5C7578614DB9EC34C158E0DED5D1629CFEF2E03DC410530FC0A60BD58CA91E7
24,648,168 UART: [art] SIG.S = FADEF57832E3BC366AE87A582B4F87AFA4DF7B16B9D9A800834D40BAD6689DCF872282C9E966FF3F1985306258011DC8
25,626,560 UART: Caliptra RT
25,627,276 UART: [state] CFI Enabled
25,809,024 UART: [rt] RT listening for mailbox commands...
25,811,910 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,967,328 UART: [rt]cmd =0x41544d4e, len=14344
29,962,561 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,394 UART:
192,760 UART: Running Caliptra ROM ...
193,901 UART:
603,455 UART: [state] CFI Enabled
616,496 UART: [state] LifecycleState = Unprovisioned
618,363 UART: [state] DebugLocked = No
620,312 UART: [state] WD Timer not started. Device not locked for debugging
623,562 UART: [kat] SHA2-256
803,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,955 UART: [kat] ++
814,406 UART: [kat] sha1
825,664 UART: [kat] SHA2-256
828,392 UART: [kat] SHA2-384
834,882 UART: [kat] SHA2-512-ACC
837,277 UART: [kat] ECC-384
3,280,297 UART: [kat] HMAC-384Kdf
3,293,470 UART: [kat] LMS
3,769,995 UART: [kat] --
3,776,632 UART: [cold-reset] ++
3,778,643 UART: [fht] FHT @ 0x50003400
3,790,203 UART: [idev] ++
3,790,803 UART: [idev] CDI.KEYID = 6
3,791,692 UART: [idev] SUBJECT.KEYID = 7
3,793,007 UART: [idev] UDS.KEYID = 0
3,793,914 ready_for_fw is high
3,794,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,817 UART: [idev] Erasing UDS.KEYID = 0
6,270,994 UART: [idev] Sha1 KeyId Algorithm
6,294,701 UART: [idev] --
6,298,912 UART: [ldev] ++
6,299,484 UART: [ldev] CDI.KEYID = 6
6,300,397 UART: [ldev] SUBJECT.KEYID = 5
6,301,632 UART: [ldev] AUTHORITY.KEYID = 7
6,302,870 UART: [ldev] FE.KEYID = 1
6,315,187 UART: [ldev] Erasing FE.KEYID = 1
8,793,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,605 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,226 UART: [ldev] --
10,586,947 UART: [fwproc] Wait for Commands...
10,588,561 UART: [fwproc] Recv command 0x46574c44
10,590,657 UART: [fwproc] Recv'd Img size: 118548 bytes
14,067,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,892 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,908 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,457 >>> mbox cmd response: success
14,553,922 UART: [afmc] ++
14,554,538 UART: [afmc] CDI.KEYID = 6
14,555,479 UART: [afmc] SUBJECT.KEYID = 7
14,556,699 UART: [afmc] AUTHORITY.KEYID = 5
17,061,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,037 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,223 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,138 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,705 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,013 UART: [afmc] --
18,865,370 UART: [cold-reset] --
18,870,307 UART: [state] Locking Datavault
18,874,211 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,911 UART: [state] Locking ICCM
18,877,655 UART: [exit] Launching FMC @ 0x40000130
18,886,070 UART:
18,886,312 UART: Running Caliptra FMC ...
18,887,416 UART:
18,887,577 UART: [state] CFI Enabled
18,895,898 UART: [fht] FMC Alias Private Key: 7
20,661,905 UART: [art] Extend RT PCRs Done
20,663,118 UART: [art] Lock RT PCRs Done
20,664,716 UART: [art] Populate DV Done
20,670,064 UART: [fht] FMC Alias Private Key: 7
20,671,642 UART: [art] Derive CDI
20,672,385 UART: [art] Store in slot 0x4
20,714,818 UART: [art] Derive Key Pair
20,715,819 UART: [art] Store priv key in slot 0x5
23,142,565 UART: [art] Derive Key Pair - Done
23,155,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,341 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,865 UART: [art] PUB.X = D3632E581BA7A861F86C64422030D926E392C6F49A48DB151565C4EFA649B10AA4FE3EBA3B1702F378D9B26224C81E03
24,871,122 UART: [art] PUB.Y = BDBB2CBA9F0B436CDD41CDE9FFAC28B1ABB338BEDABA722E4E1BDFA412EB3C5BE428EFC60FB1A6A701CDA63A54FE788B
24,878,461 UART: [art] SIG.R = B828B8568F990F5A2567A07881AE5743F8863635140003F019644594CD51CFE38F16BAD541F11A025C67A636B95CA43C
24,885,807 UART: [art] SIG.S = CA5F933658F6805A7717AA5278306729F386AB912D654C1D89A6AC8FB02380679E79AB857F5D95E60162F0A449E639A0
25,864,963 UART: Caliptra RT
25,865,672 UART: [state] CFI Enabled
25,997,817 UART: [rt] RT listening for mailbox commands...
26,000,150 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,155,569 UART: [rt]cmd =0x41544d4e, len=14344
30,151,423 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.83s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,778,144 ready_for_fw is high
3,778,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,445,997 >>> mbox cmd response: success
18,699,874 UART:
18,700,301 UART: Running Caliptra FMC ...
18,701,455 UART:
18,701,628 UART: [state] CFI Enabled
18,709,482 UART: [fht] FMC Alias Private Key: 7
20,475,037 UART: [art] Extend RT PCRs Done
20,476,266 UART: [art] Lock RT PCRs Done
20,478,168 UART: [art] Populate DV Done
20,483,865 UART: [fht] FMC Alias Private Key: 7
20,485,526 UART: [art] Derive CDI
20,486,373 UART: [art] Store in slot 0x4
20,529,252 UART: [art] Derive Key Pair
20,530,256 UART: [art] Store priv key in slot 0x5
22,956,944 UART: [art] Derive Key Pair - Done
22,969,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,676,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,742 UART: [art] PUB.X = 78E4665C18D8DF93EA6A67D0C27DEEFEFB2CBA59A1F23CC70D1D892A074B4525A78F759BEE9C79545864B4C2F4DC6071
24,685,060 UART: [art] PUB.Y = 24E0988B2777464832607936F014414FAA84BC7E85EECC600135636B5A1C66C577149C48015A6E2EBFA561DA66C03B0D
24,692,297 UART: [art] SIG.R = 2ACFE4793F14C6B9E2088323ED05765526CCA2879347130E2770278774C27CFD4F3F4EE9048CC3C2816180503965CA6C
24,699,664 UART: [art] SIG.S = 048860C44CADBC406DDA217FE95176BFF3070A2728397CDE9DA63E9C2B43E9FEB0EE2708C5AC01A593B8BE9F84E24714
25,679,466 UART: Caliptra RT
25,680,160 UART: [state] CFI Enabled
25,812,124 UART: [rt] RT listening for mailbox commands...
25,814,469 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
25,969,873 UART: [rt]cmd =0x41544d4e, len=14344
29,965,734 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,096 UART:
192,476 UART: Running Caliptra ROM ...
193,581 UART:
193,726 UART: [state] CFI Enabled
264,932 UART: [state] LifecycleState = Unprovisioned
267,283 UART: [state] DebugLocked = No
269,742 UART: [state] WD Timer not started. Device not locked for debugging
274,478 UART: [kat] SHA2-256
464,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,141 UART: [kat] ++
475,594 UART: [kat] sha1
487,245 UART: [kat] SHA2-256
490,244 UART: [kat] SHA2-384
497,147 UART: [kat] SHA2-512-ACC
499,728 UART: [kat] ECC-384
2,947,274 UART: [kat] HMAC-384Kdf
2,970,101 UART: [kat] LMS
3,501,883 UART: [kat] --
3,506,306 UART: [cold-reset] ++
3,507,525 UART: [fht] FHT @ 0x50003400
3,519,213 UART: [idev] ++
3,519,921 UART: [idev] CDI.KEYID = 6
3,520,869 UART: [idev] SUBJECT.KEYID = 7
3,522,107 UART: [idev] UDS.KEYID = 0
3,523,000 ready_for_fw is high
3,523,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,258 UART: [idev] Erasing UDS.KEYID = 0
6,028,245 UART: [idev] Sha1 KeyId Algorithm
6,051,532 UART: [idev] --
6,056,821 UART: [ldev] ++
6,057,497 UART: [ldev] CDI.KEYID = 6
6,058,380 UART: [ldev] SUBJECT.KEYID = 5
6,059,591 UART: [ldev] AUTHORITY.KEYID = 7
6,060,822 UART: [ldev] FE.KEYID = 1
6,098,618 UART: [ldev] Erasing FE.KEYID = 1
8,605,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,347 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,057 UART: [ldev] --
10,415,454 UART: [fwproc] Wait for Commands...
10,417,555 UART: [fwproc] Recv command 0x46574c44
10,419,809 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,254 >>> mbox cmd response: success
14,680,463 UART: [afmc] ++
14,681,190 UART: [afmc] CDI.KEYID = 6
14,682,376 UART: [afmc] SUBJECT.KEYID = 7
14,683,814 UART: [afmc] AUTHORITY.KEYID = 5
17,208,629 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,935,867 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,937,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,952,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,031 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,074 UART: [afmc] --
19,010,080 UART: [cold-reset] --
19,013,353 UART: [state] Locking Datavault
19,020,339 UART: [state] Locking PCR0, PCR1 and PCR31
19,022,542 UART: [state] Locking ICCM
19,024,858 UART: [exit] Launching FMC @ 0x40000130
19,033,515 UART:
19,033,780 UART: Running Caliptra FMC ...
19,034,889 UART:
19,035,045 UART: [state] CFI Enabled
19,091,999 UART: [fht] FMC Alias Private Key: 7
20,858,878 UART: [art] Extend RT PCRs Done
20,860,103 UART: [art] Lock RT PCRs Done
20,861,812 UART: [art] Populate DV Done
20,866,896 UART: [fht] FMC Alias Private Key: 7
20,868,540 UART: [art] Derive CDI
20,869,290 UART: [art] Store in slot 0x4
20,924,435 UART: [art] Derive Key Pair
20,925,436 UART: [art] Store priv key in slot 0x5
23,388,341 UART: [art] Derive Key Pair - Done
23,401,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,113,678 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,184 UART: [art] PUB.X = 5F9EDD2C1F64833C38EAB2A491F4F1B8A26076345FBC7B7E81548EA9EA8C92A21B92359C28D8536FAC634D450DF51D7E
25,122,496 UART: [art] PUB.Y = FDF0E1EE8F61A4CD329ACECD5ECD80E3723A0A5746ACF1A69333D652A3A33EDD99F21C07294526ECFCCB605B0E8F084F
25,129,791 UART: [art] SIG.R = 3BEEB610CB11E1DA35BDBAD31C8C5000212A8163A94F4528F92BF7F992BA7008F5C9A750C9C25711418DCFA6D433E7D5
25,137,140 UART: [art] SIG.S = 14D3243B81B66BBB6AC2462B640AE9535F38D6C8C8133A33995EB74DC530EC4B04C20D00CC1B805EC42AF8BF97346A39
26,115,965 UART: Caliptra RT
26,116,681 UART: [state] CFI Enabled
26,296,117 UART: [rt] RT listening for mailbox commands...
26,298,432 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,453,911 UART: [rt]cmd =0x41544d4e, len=14344
30,450,188 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,860 writing to cptra_bootfsm_go
3,438,212 ready_for_fw is high
3,438,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,836,093 >>> mbox cmd response: success
19,151,439 UART:
19,151,881 UART: Running Caliptra FMC ...
19,153,013 UART:
19,153,175 UART: [state] CFI Enabled
19,222,882 UART: [fht] FMC Alias Private Key: 7
20,989,022 UART: [art] Extend RT PCRs Done
20,990,254 UART: [art] Lock RT PCRs Done
20,991,609 UART: [art] Populate DV Done
20,997,190 UART: [fht] FMC Alias Private Key: 7
20,998,838 UART: [art] Derive CDI
20,999,652 UART: [art] Store in slot 0x4
21,055,713 UART: [art] Derive Key Pair
21,056,744 UART: [art] Store priv key in slot 0x5
23,519,832 UART: [art] Derive Key Pair - Done
23,532,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,035 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,554 UART: [art] PUB.X = 2407004C5739496E05ACB1579417941E6EA2D7AA82BF68C60E8668E93F0E88E34D080417357BC88A189C5154E94A1B0A
25,254,785 UART: [art] PUB.Y = CFDF4A63683F1B6C13480FFC49D18880853E76A057AD1ACD4868BA92FF6E54263ED209FADAE72E37901F3C859210548C
25,262,032 UART: [art] SIG.R = 6820F132DFDD63137584DAD807EA8948661812C1A2230D8EE253FA36691FF0BA97DB35C7B118E6BF1CF3ECAB8DA9047B
25,269,450 UART: [art] SIG.S = F1F615A2EC5A0DCAC8F9B9A2D915364ED4295A653855358C36CC94C3FC8BDBC64604946D8C8B9BA8DABD29AB0F82E0F5
26,248,909 UART: Caliptra RT
26,249,605 UART: [state] CFI Enabled
26,429,362 UART: [rt] RT listening for mailbox commands...
26,431,651 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,586,798 UART: [rt]cmd =0x41544d4e, len=14344
30,582,678 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,380 UART:
192,746 UART: Running Caliptra ROM ...
193,953 UART:
603,476 UART: [state] CFI Enabled
619,421 UART: [state] LifecycleState = Unprovisioned
621,802 UART: [state] DebugLocked = No
623,622 UART: [state] WD Timer not started. Device not locked for debugging
627,528 UART: [kat] SHA2-256
817,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,206 UART: [kat] ++
828,762 UART: [kat] sha1
839,073 UART: [kat] SHA2-256
842,114 UART: [kat] SHA2-384
849,105 UART: [kat] SHA2-512-ACC
851,691 UART: [kat] ECC-384
3,291,846 UART: [kat] HMAC-384Kdf
3,304,079 UART: [kat] LMS
3,835,915 UART: [kat] --
3,840,307 UART: [cold-reset] ++
3,841,248 UART: [fht] FHT @ 0x50003400
3,853,151 UART: [idev] ++
3,853,857 UART: [idev] CDI.KEYID = 6
3,854,816 UART: [idev] SUBJECT.KEYID = 7
3,855,989 UART: [idev] UDS.KEYID = 0
3,856,892 ready_for_fw is high
3,857,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,025 UART: [idev] Erasing UDS.KEYID = 0
6,336,091 UART: [idev] Sha1 KeyId Algorithm
6,358,916 UART: [idev] --
6,363,826 UART: [ldev] ++
6,364,513 UART: [ldev] CDI.KEYID = 6
6,365,434 UART: [ldev] SUBJECT.KEYID = 5
6,366,595 UART: [ldev] AUTHORITY.KEYID = 7
6,367,827 UART: [ldev] FE.KEYID = 1
6,378,961 UART: [ldev] Erasing FE.KEYID = 1
8,854,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,828 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,235 UART: [ldev] --
10,645,570 UART: [fwproc] Wait for Commands...
10,647,077 UART: [fwproc] Recv command 0x46574c44
10,649,394 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,089 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,322 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,048 >>> mbox cmd response: success
14,912,534 UART: [afmc] ++
14,913,259 UART: [afmc] CDI.KEYID = 6
14,914,458 UART: [afmc] SUBJECT.KEYID = 7
14,915,913 UART: [afmc] AUTHORITY.KEYID = 5
17,417,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,152 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,256 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,268 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,061 UART: [afmc] --
19,215,788 UART: [cold-reset] --
19,220,665 UART: [state] Locking Datavault
19,225,508 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,672 UART: [state] Locking ICCM
19,229,458 UART: [exit] Launching FMC @ 0x40000130
19,238,152 UART:
19,238,393 UART: Running Caliptra FMC ...
19,239,503 UART:
19,239,664 UART: [state] CFI Enabled
19,247,769 UART: [fht] FMC Alias Private Key: 7
21,013,612 UART: [art] Extend RT PCRs Done
21,014,852 UART: [art] Lock RT PCRs Done
21,016,460 UART: [art] Populate DV Done
21,021,930 UART: [fht] FMC Alias Private Key: 7
21,023,436 UART: [art] Derive CDI
21,024,209 UART: [art] Store in slot 0x4
21,066,924 UART: [art] Derive Key Pair
21,067,994 UART: [art] Store priv key in slot 0x5
23,494,550 UART: [art] Derive Key Pair - Done
23,507,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,739 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,248 UART: [art] PUB.X = 95CF1666482ECEDBDB644F34013ACBC7D8E07DC0C19F908C9C43B34A1D7941F6FB4A7F4C2FC87104C4AFC59401554C4B
25,222,571 UART: [art] PUB.Y = 17BF99C56D04BADE6AF1B953D7A49B6F875E9375E7BDF90A77B87A80D84F4034FE351AE98472447C4A57D9E9F9A5CF91
25,229,829 UART: [art] SIG.R = FCFA306B703D63E043C78CFD162D392E8567C6B243A8CA8EAC701E66F52675329408A1535806C2F2A6ADE4186ED44C66
25,237,210 UART: [art] SIG.S = 1CE9A101AFDEB04DCD8ADE669E9306E7EFEC12A7DB813EE3816292737BB0877E629DB9F8203B34BAA1E6393D5B051C55
26,216,410 UART: Caliptra RT
26,217,125 UART: [state] CFI Enabled
26,349,430 UART: [rt] RT listening for mailbox commands...
26,351,738 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,506,945 UART: [rt]cmd =0x41544d4e, len=14344
30,502,428 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,750,129 ready_for_fw is high
3,750,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,063,556 >>> mbox cmd response: success
19,313,573 UART:
19,313,980 UART: Running Caliptra FMC ...
19,315,275 UART:
19,315,444 UART: [state] CFI Enabled
19,323,175 UART: [fht] FMC Alias Private Key: 7
21,089,991 UART: [art] Extend RT PCRs Done
21,091,221 UART: [art] Lock RT PCRs Done
21,092,658 UART: [art] Populate DV Done
21,098,187 UART: [fht] FMC Alias Private Key: 7
21,099,847 UART: [art] Derive CDI
21,100,670 UART: [art] Store in slot 0x4
21,143,434 UART: [art] Derive Key Pair
21,144,429 UART: [art] Store priv key in slot 0x5
23,571,388 UART: [art] Derive Key Pair - Done
23,584,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,452 UART: [art] Erasing AUTHORITY.KEYID = 7
25,291,958 UART: [art] PUB.X = AC6EBC9635C7015F2946BE5945BA25693EE5071300F0AEA04E0FF32274E26DF5DEA10458755A274E29A21EAFE6BED205
25,299,231 UART: [art] PUB.Y = 9336E7724ECA210E83F0548984DA3E9F8BAE6973582EE67FDE3F66CCD1019AA605DEAA3075D4CBFB5C4F8DC8E7E54D96
25,306,508 UART: [art] SIG.R = 156D1DD0019FCCBA0FAC862DFC141C4BB69C0729ED5FAF14FE2DD9834036DFEED3883EAE1928749BE13030D86B5F3E6E
25,313,929 UART: [art] SIG.S = 889EE6AD7D12FACCDE4085A7A2D64936627865636B4E853D68EF1C228B74461B044C18C46B80F0B84D93E32E7B0F6A33
26,293,040 UART: Caliptra RT
26,293,749 UART: [state] CFI Enabled
26,427,233 UART: [rt] RT listening for mailbox commands...
26,429,572 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
26,584,953 UART: [rt]cmd =0x41544d4e, len=14344
30,580,848 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,435 UART: [kat] SHA2-256
892,373 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,208 UART: [kat] HMAC-384Kdf
906,680 UART: [kat] LMS
1,474,876 UART: [kat] --
1,475,881 UART: [cold-reset] ++
1,476,367 UART: [fht] Storing FHT @ 0x50003400
1,479,008 UART: [idev] ++
1,479,176 UART: [idev] CDI.KEYID = 6
1,479,536 UART: [idev] SUBJECT.KEYID = 7
1,479,960 UART: [idev] UDS.KEYID = 0
1,480,305 ready_for_fw is high
1,480,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,448 UART: [idev] Erasing UDS.KEYID = 0
1,504,838 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,586 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,441 UART: [ldev] Erasing FE.KEYID = 1
1,547,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,026 UART: [ldev] --
1,586,525 UART: [fwproc] Waiting for Commands...
1,587,240 UART: [fwproc] Received command 0x46574c44
1,588,031 UART: [fwproc] Received Image of size 118548 bytes
2,932,565 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,039 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,257 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,630 >>> mbox cmd response: success
3,132,686 UART: [afmc] ++
3,132,854 UART: [afmc] CDI.KEYID = 6
3,133,216 UART: [afmc] SUBJECT.KEYID = 7
3,133,641 UART: [afmc] AUTHORITY.KEYID = 5
3,168,400 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,416 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,099 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,199 UART: [afmc] --
3,211,079 UART: [cold-reset] --
3,211,841 UART: [state] Locking Datavault
3,213,194 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,798 UART: [state] Locking ICCM
3,214,372 UART: [exit] Launching FMC @ 0x40000130
3,219,702 UART:
3,219,718 UART: Running Caliptra FMC ...
3,220,126 UART:
3,220,180 UART: [state] CFI Enabled
3,230,076 UART: [fht] FMC Alias Private Key: 7
3,349,052 UART: [art] Extend RT PCRs Done
3,349,480 UART: [art] Lock RT PCRs Done
3,350,964 UART: [art] Populate DV Done
3,358,929 UART: [fht] FMC Alias Private Key: 7
3,360,055 UART: [art] Derive CDI
3,360,335 UART: [art] Store in slot 0x4
3,446,357 UART: [art] Derive Key Pair
3,446,717 UART: [art] Store priv key in slot 0x5
3,459,860 UART: [art] Derive Key Pair - Done
3,474,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,089 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,854 UART: [art] PUB.X = 14740494D1AD23BE7D7474F507C3BFAD252FBE99D0952E347DDFABE40802585AD0E438B15D9CF140AB063AA02324E0A9
3,497,619 UART: [art] PUB.Y = ABAE9752734BC9557F76F0890C764A455DA8C8204B223EFE5E1EBE8F09300CCB40621D11F0FA6E645AE42CF3180A4FB3
3,504,569 UART: [art] SIG.R = D618DDAAE5F120063FA4177A6F41DE729BCC4044B4E3C203D9813FADDEBFAF9FBAE94EF93CBC3EF1142F536B4C9E83E9
3,511,361 UART: [art] SIG.S = 6434D277FF9ED4FF73DBD8A0EC3612EDC019885DD3E87F69B27502A1E98E4A861652772FDDBE234745A8AABCF9FC088D
3,535,507 UART: Caliptra RT
3,535,758 UART: [state] CFI Enabled
3,656,038 UART: [rt] RT listening for mailbox commands...
3,656,708 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,746 UART: [rt]cmd =0x41544d4e, len=14344
4,089,511 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,517 ready_for_fw is high
1,362,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,060 >>> mbox cmd response: success
3,043,413 UART:
3,043,429 UART: Running Caliptra FMC ...
3,043,837 UART:
3,043,891 UART: [state] CFI Enabled
3,053,991 UART: [fht] FMC Alias Private Key: 7
3,172,717 UART: [art] Extend RT PCRs Done
3,173,145 UART: [art] Lock RT PCRs Done
3,174,565 UART: [art] Populate DV Done
3,182,662 UART: [fht] FMC Alias Private Key: 7
3,183,608 UART: [art] Derive CDI
3,183,888 UART: [art] Store in slot 0x4
3,269,524 UART: [art] Derive Key Pair
3,269,884 UART: [art] Store priv key in slot 0x5
3,283,207 UART: [art] Derive Key Pair - Done
3,297,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,635 UART: [art] PUB.X = D276E5DD20BE5EA8B781C17D70151CC0AA8557823971052F9919414521BC46FC9CF8D7090121AFB0C2639936BAF2F8AF
3,320,400 UART: [art] PUB.Y = 87B17BB4F5F65CB5FBC4081B9975332A88301E5ECD92BB3C1090BE91D86CC5F6C9D9FD13CE72E4E2158246436D0418EB
3,327,354 UART: [art] SIG.R = 2B227DC0C4B2DC5C3ED1072DB05684106F5DA5085B319679792782E678AD36BA643C508AE5A728C72ECC292702693BE9
3,334,115 UART: [art] SIG.S = 6A9F0C6876C7F80DD595AFBAA396593CAFA64BA7FC557B3CDF5A878FC363371B7A9B87C13A66BE2F7A4E3226521C1182
3,358,169 UART: Caliptra RT
3,358,420 UART: [state] CFI Enabled
3,478,547 UART: [rt] RT listening for mailbox commands...
3,479,217 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,041 UART: [rt]cmd =0x41544d4e, len=14344
3,911,674 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,368 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,880 UART: [kat] SHA2-256
881,811 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,926 UART: [kat] ++
886,078 UART: [kat] sha1
890,220 UART: [kat] SHA2-256
892,158 UART: [kat] SHA2-384
894,843 UART: [kat] SHA2-512-ACC
896,744 UART: [kat] ECC-384
902,553 UART: [kat] HMAC-384Kdf
907,135 UART: [kat] LMS
1,475,331 UART: [kat] --
1,476,116 UART: [cold-reset] ++
1,476,600 UART: [fht] Storing FHT @ 0x50003400
1,479,615 UART: [idev] ++
1,479,783 UART: [idev] CDI.KEYID = 6
1,480,143 UART: [idev] SUBJECT.KEYID = 7
1,480,567 UART: [idev] UDS.KEYID = 0
1,480,912 ready_for_fw is high
1,480,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,805 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,738 UART: [ldev] ++
1,515,906 UART: [ldev] CDI.KEYID = 6
1,516,269 UART: [ldev] SUBJECT.KEYID = 5
1,516,695 UART: [ldev] AUTHORITY.KEYID = 7
1,517,158 UART: [ldev] FE.KEYID = 1
1,522,498 UART: [ldev] Erasing FE.KEYID = 1
1,548,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,449 UART: [ldev] --
1,587,922 UART: [fwproc] Waiting for Commands...
1,588,779 UART: [fwproc] Received command 0x46574c44
1,589,570 UART: [fwproc] Received Image of size 118548 bytes
2,935,422 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,963,386 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,994,604 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,909 >>> mbox cmd response: success
3,136,007 UART: [afmc] ++
3,136,175 UART: [afmc] CDI.KEYID = 6
3,136,537 UART: [afmc] SUBJECT.KEYID = 7
3,136,962 UART: [afmc] AUTHORITY.KEYID = 5
3,173,025 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,189,691 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,190,471 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,196,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,202,063 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,207,746 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,215,742 UART: [afmc] --
3,216,730 UART: [cold-reset] --
3,217,600 UART: [state] Locking Datavault
3,218,763 UART: [state] Locking PCR0, PCR1 and PCR31
3,219,367 UART: [state] Locking ICCM
3,219,935 UART: [exit] Launching FMC @ 0x40000130
3,225,265 UART:
3,225,281 UART: Running Caliptra FMC ...
3,225,689 UART:
3,225,832 UART: [state] CFI Enabled
3,236,462 UART: [fht] FMC Alias Private Key: 7
3,355,084 UART: [art] Extend RT PCRs Done
3,355,512 UART: [art] Lock RT PCRs Done
3,356,778 UART: [art] Populate DV Done
3,365,163 UART: [fht] FMC Alias Private Key: 7
3,366,287 UART: [art] Derive CDI
3,366,567 UART: [art] Store in slot 0x4
3,452,883 UART: [art] Derive Key Pair
3,453,243 UART: [art] Store priv key in slot 0x5
3,466,942 UART: [art] Derive Key Pair - Done
3,481,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,496,946 UART: [art] Erasing AUTHORITY.KEYID = 7
3,497,711 UART: [art] PUB.X = 3A1467D5213CC23B5E355D44A3A97F332CAA470C52076D9565A3D84E6D5778B67001099E025373261AF46E43AEF73983
3,504,458 UART: [art] PUB.Y = F37C832769B2BE6A71D4F906BA8730423E5F9A58F0E9D8BD5C5B23D208008BC2A2C628D84F3C0AFD835918C40A40588B
3,511,380 UART: [art] SIG.R = 9801D7591ED0D30CA546B7EB90B04B280FF03E1E1A91DE896DADA48656E8372281407C431B5DC3CE1616A32F51F962EE
3,518,147 UART: [art] SIG.S = D801D0963A2C7E54423BBBD1808A9AA545A94E9FE582E0A64B078B4C537CDE9D29CEB9A690FFE3C2151986E18FB49467
3,541,811 UART: Caliptra RT
3,542,154 UART: [state] CFI Enabled
3,662,343 UART: [rt] RT listening for mailbox commands...
3,663,013 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,786,057 UART: [rt]cmd =0x41544d4e, len=14344
4,096,206 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,320 ready_for_fw is high
1,363,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,115 >>> mbox cmd response: success
3,044,132 UART:
3,044,148 UART: Running Caliptra FMC ...
3,044,556 UART:
3,044,699 UART: [state] CFI Enabled
3,055,535 UART: [fht] FMC Alias Private Key: 7
3,174,415 UART: [art] Extend RT PCRs Done
3,174,843 UART: [art] Lock RT PCRs Done
3,176,027 UART: [art] Populate DV Done
3,184,230 UART: [fht] FMC Alias Private Key: 7
3,185,180 UART: [art] Derive CDI
3,185,460 UART: [art] Store in slot 0x4
3,271,476 UART: [art] Derive Key Pair
3,271,836 UART: [art] Store priv key in slot 0x5
3,284,781 UART: [art] Derive Key Pair - Done
3,299,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,530 UART: [art] PUB.X = D4F6E5F61F759D157B9C866CD255370D2AD4870C2A50A91FDB40194E0C2B196735441D50DEFFB8D3C4E0B705434C89F7
3,322,294 UART: [art] PUB.Y = DFA35D561BE55BA638DF9D024D50F6880D7BE97BFE68D9726A7044E5801016C71BCFFC03D6D92E0B23F63263C44C080E
3,329,236 UART: [art] SIG.R = 3C6B136AD1B21329F0C76B8336EA5D9F9FB6B16650CFFEC299B1374133A35DDA4D9CC18D21DC183BA508FE7F2ABDEFF1
3,336,025 UART: [art] SIG.S = 73770D14C7744400655885A952BC4D6DC2D6BAF22B1CC3A87A1705300A911E88EF61B798FC099AB0C7F444FD09ADD022
3,360,320 UART: Caliptra RT
3,360,663 UART: [state] CFI Enabled
3,480,992 UART: [rt] RT listening for mailbox commands...
3,481,662 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,472 UART: [rt]cmd =0x41544d4e, len=14344
3,913,961 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,515 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,640 UART: [kat] SHA2-256
901,580 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
915,869 UART: [kat] HMAC-384Kdf
920,483 UART: [kat] LMS
1,168,795 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,128 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 ready_for_fw is high
1,174,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,665 UART: [idev] Erasing UDS.KEYID = 0
1,198,539 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,272 UART: [ldev] ++
1,208,440 UART: [ldev] CDI.KEYID = 6
1,208,804 UART: [ldev] SUBJECT.KEYID = 5
1,209,231 UART: [ldev] AUTHORITY.KEYID = 7
1,209,694 UART: [ldev] FE.KEYID = 1
1,214,840 UART: [ldev] Erasing FE.KEYID = 1
1,240,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,849 UART: [fwproc] Wait for Commands...
1,280,668 UART: [fwproc] Recv command 0x46574c44
1,281,401 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,576 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,961 >>> mbox cmd response: success
2,825,015 UART: [afmc] ++
2,825,183 UART: [afmc] CDI.KEYID = 6
2,825,546 UART: [afmc] SUBJECT.KEYID = 7
2,825,972 UART: [afmc] AUTHORITY.KEYID = 5
2,861,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,558 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,017 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,898 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,599 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,308 UART: [afmc] --
2,904,237 UART: [cold-reset] --
2,905,281 UART: [state] Locking Datavault
2,906,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,994 UART: [state] Locking ICCM
2,907,636 UART: [exit] Launching FMC @ 0x40000130
2,912,966 UART:
2,912,982 UART: Running Caliptra FMC ...
2,913,390 UART:
2,913,444 UART: [state] CFI Enabled
2,923,956 UART: [fht] FMC Alias Private Key: 7
3,042,908 UART: [art] Extend RT PCRs Done
3,043,336 UART: [art] Lock RT PCRs Done
3,044,744 UART: [art] Populate DV Done
3,053,039 UART: [fht] FMC Alias Private Key: 7
3,054,015 UART: [art] Derive CDI
3,054,295 UART: [art] Store in slot 0x4
3,140,260 UART: [art] Derive Key Pair
3,140,620 UART: [art] Store priv key in slot 0x5
3,154,232 UART: [art] Derive Key Pair - Done
3,168,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,956 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,721 UART: [art] PUB.X = 98E2359E5B231B56804D8DEDE3582EE313BA40E8E788B6B8CABA25AA50AB10A5A6DA4517D0ADA0ADF7B7E74580466AD7
3,191,509 UART: [art] PUB.Y = 41A27D3506DF3D785D846D675084F0C4839C0B939916A89FA537B1E6E02CCD49A6A33CDDDA6A40A0D883537F0CC3D3A6
3,198,458 UART: [art] SIG.R = 32E6C3F1AFD58863ECD48867B821C49D0380833F67BF6F6EFBF2D5F75E58C84FBCA4ACC99D4E128D3567866DA9E6F03E
3,205,241 UART: [art] SIG.S = D2052E6DDE7F2ADC838DAC16110BCE8CFBAAE0CC7A192753804A22B189BDD020EECE8A4799FB015FC9AD20B853F269E1
3,229,276 UART: Caliptra RT
3,229,527 UART: [state] CFI Enabled
3,349,000 UART: [rt] RT listening for mailbox commands...
3,349,670 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,478 UART: [rt]cmd =0x41544d4e, len=14344
3,782,685 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,928 ready_for_fw is high
1,058,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,354 >>> mbox cmd response: success
2,741,063 UART:
2,741,079 UART: Running Caliptra FMC ...
2,741,487 UART:
2,741,541 UART: [state] CFI Enabled
2,752,039 UART: [fht] FMC Alias Private Key: 7
2,870,567 UART: [art] Extend RT PCRs Done
2,870,995 UART: [art] Lock RT PCRs Done
2,872,461 UART: [art] Populate DV Done
2,881,086 UART: [fht] FMC Alias Private Key: 7
2,882,172 UART: [art] Derive CDI
2,882,452 UART: [art] Store in slot 0x4
2,968,053 UART: [art] Derive Key Pair
2,968,413 UART: [art] Store priv key in slot 0x5
2,981,791 UART: [art] Derive Key Pair - Done
2,996,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,681 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,446 UART: [art] PUB.X = 8714B1EF452F86DD7D3E58D283E4482DEE4F706BF75A520274716BA3F91091BA1AE407E0E719CD797562459E36F13CBE
3,019,214 UART: [art] PUB.Y = 7B7F59F541880206CC2ACD81353623EB17BD34377F8997D6F9759A9E781F9883F283ECC5AD62B3123F7502D9B56E4EC0
3,026,155 UART: [art] SIG.R = 94BC20EF88A56631A378482774A37745148B554FE8514411F9093DBD74C9D6512B868E1DC0385E717D1B046D88453B27
3,032,907 UART: [art] SIG.S = D009441B9EF06B5CAA548538092D621BE350B45F0A1FF3C6F9CB862E5C6D18C13FCC388A3CBB574DC707992A040D4291
3,056,339 UART: Caliptra RT
3,056,590 UART: [state] CFI Enabled
3,176,798 UART: [rt] RT listening for mailbox commands...
3,177,468 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,632 UART: [rt]cmd =0x41544d4e, len=14344
3,610,155 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,340 UART: [state] WD Timer not started. Device not locked for debugging
87,639 UART: [kat] SHA2-256
891,189 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,293 UART: [kat] ++
895,445 UART: [kat] sha1
899,625 UART: [kat] SHA2-256
901,565 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
915,936 UART: [kat] HMAC-384Kdf
920,574 UART: [kat] LMS
1,168,886 UART: [kat] --
1,169,745 UART: [cold-reset] ++
1,170,209 UART: [fht] FHT @ 0x50003400
1,173,051 UART: [idev] ++
1,173,219 UART: [idev] CDI.KEYID = 6
1,173,580 UART: [idev] SUBJECT.KEYID = 7
1,174,005 UART: [idev] UDS.KEYID = 0
1,174,351 ready_for_fw is high
1,174,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,102 UART: [idev] Erasing UDS.KEYID = 0
1,199,096 UART: [idev] Sha1 KeyId Algorithm
1,208,090 UART: [idev] --
1,209,029 UART: [ldev] ++
1,209,197 UART: [ldev] CDI.KEYID = 6
1,209,561 UART: [ldev] SUBJECT.KEYID = 5
1,209,988 UART: [ldev] AUTHORITY.KEYID = 7
1,210,451 UART: [ldev] FE.KEYID = 1
1,215,983 UART: [ldev] Erasing FE.KEYID = 1
1,242,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,551 UART: [ldev] --
1,281,972 UART: [fwproc] Wait for Commands...
1,282,665 UART: [fwproc] Recv command 0x46574c44
1,283,398 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,973 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,096 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,271 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,538 >>> mbox cmd response: success
2,827,726 UART: [afmc] ++
2,827,894 UART: [afmc] CDI.KEYID = 6
2,828,257 UART: [afmc] SUBJECT.KEYID = 7
2,828,683 UART: [afmc] AUTHORITY.KEYID = 5
2,864,470 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,552 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,262 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,143 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,844 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,649 UART: [afmc] --
2,907,604 UART: [cold-reset] --
2,908,624 UART: [state] Locking Datavault
2,909,695 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,299 UART: [state] Locking ICCM
2,910,801 UART: [exit] Launching FMC @ 0x40000130
2,916,131 UART:
2,916,147 UART: Running Caliptra FMC ...
2,916,555 UART:
2,916,698 UART: [state] CFI Enabled
2,927,402 UART: [fht] FMC Alias Private Key: 7
3,046,182 UART: [art] Extend RT PCRs Done
3,046,610 UART: [art] Lock RT PCRs Done
3,048,366 UART: [art] Populate DV Done
3,056,683 UART: [fht] FMC Alias Private Key: 7
3,057,775 UART: [art] Derive CDI
3,058,055 UART: [art] Store in slot 0x4
3,143,600 UART: [art] Derive Key Pair
3,143,960 UART: [art] Store priv key in slot 0x5
3,157,744 UART: [art] Derive Key Pair - Done
3,172,412 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,882 UART: [art] PUB.X = 5B870B7D622244EFEFAC470D1FF4432057A68BF587026C327D05070ED7FCAF5E051B59DE56C26242A73AF13C6ADED272
3,195,641 UART: [art] PUB.Y = 3F545FF6A741597F8C201CBE3F68BB454025CB9A4A9F03419A89DB62882D512891B82533AD23C064E49B2BA8EEE306B6
3,202,589 UART: [art] SIG.R = 8C38F11DD1874CF517A282374BAC89F138E62709CA54692C1335A7572E0FEA0779605AF267A7391BA2C45E392D7A4AC6
3,209,350 UART: [art] SIG.S = 50A2F8E4D39DD99D8EF26051DDFA59F2AC92392F60EB06E2A9851CB2594E9BE39329AC925C42209A93638B03E32E0155
3,232,661 UART: Caliptra RT
3,233,004 UART: [state] CFI Enabled
3,352,485 UART: [rt] RT listening for mailbox commands...
3,353,155 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,476,045 UART: [rt]cmd =0x41544d4e, len=14344
3,786,054 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,653 ready_for_fw is high
1,059,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,351 >>> mbox cmd response: success
2,742,338 UART:
2,742,354 UART: Running Caliptra FMC ...
2,742,762 UART:
2,742,905 UART: [state] CFI Enabled
2,753,567 UART: [fht] FMC Alias Private Key: 7
2,872,745 UART: [art] Extend RT PCRs Done
2,873,173 UART: [art] Lock RT PCRs Done
2,874,805 UART: [art] Populate DV Done
2,883,096 UART: [fht] FMC Alias Private Key: 7
2,884,216 UART: [art] Derive CDI
2,884,496 UART: [art] Store in slot 0x4
2,970,233 UART: [art] Derive Key Pair
2,970,593 UART: [art] Store priv key in slot 0x5
2,984,137 UART: [art] Derive Key Pair - Done
2,999,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,235 UART: [art] PUB.X = 7A5E053C0881F915ADC3CE4BE3A6C9EE75CFABE6429211AE1B4759DBAD7B3259FD4DA12248D2109832FBC7D48FD9150B
3,022,014 UART: [art] PUB.Y = 8BEE5FA699F0D805821A7E648D8DC78A578DE6F5741A6963F533A01C6CD77985D4A03B1662BB102BE91C9BFDFF54A915
3,028,971 UART: [art] SIG.R = D6664B5F29BEFE1E41039A0E001DC1350AD2BC4DD8AD0D0FFB74565CD3518D587441BB1F1E38C0F674EBC2CF00FD0BE8
3,035,701 UART: [art] SIG.S = 6966D306F509ED6E8ED1C0B26FDDD59492F0879481FE3A0D5FF8C8BE149CBEFD195FB6730C10C048C3C3697D28610F6F
3,058,752 UART: Caliptra RT
3,059,095 UART: [state] CFI Enabled
3,179,596 UART: [rt] RT listening for mailbox commands...
3,180,266 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,303,288 UART: [rt]cmd =0x41544d4e, len=14344
3,613,447 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,277 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,759 UART: [kat] SHA2-256
903,699 UART: [kat] SHA2-384
906,386 UART: [kat] SHA2-512-ACC
908,287 UART: [kat] ECC-384
918,004 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,172,041 UART: [fht] FHT @ 0x50003400
1,174,552 UART: [idev] ++
1,174,720 UART: [idev] CDI.KEYID = 6
1,175,080 UART: [idev] SUBJECT.KEYID = 7
1,175,504 UART: [idev] UDS.KEYID = 0
1,175,849 ready_for_fw is high
1,175,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,520 UART: [idev] Erasing UDS.KEYID = 0
1,200,309 UART: [idev] Sha1 KeyId Algorithm
1,208,821 UART: [idev] --
1,209,673 UART: [ldev] ++
1,209,841 UART: [ldev] CDI.KEYID = 6
1,210,204 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,904 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,939 UART: [ldev] --
1,281,444 UART: [fwproc] Wait for Commands...
1,282,050 UART: [fwproc] Recv command 0x46574c44
1,282,778 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,286 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,517 >>> mbox cmd response: success
2,825,671 UART: [afmc] ++
2,825,839 UART: [afmc] CDI.KEYID = 6
2,826,201 UART: [afmc] SUBJECT.KEYID = 7
2,826,626 UART: [afmc] AUTHORITY.KEYID = 5
2,862,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,244 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,584 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,285 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,113 UART: [afmc] --
2,906,005 UART: [cold-reset] --
2,906,817 UART: [state] Locking Datavault
2,907,608 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,212 UART: [state] Locking ICCM
2,908,660 UART: [exit] Launching FMC @ 0x40000130
2,913,990 UART:
2,914,006 UART: Running Caliptra FMC ...
2,914,414 UART:
2,914,468 UART: [state] CFI Enabled
2,924,834 UART: [fht] FMC Alias Private Key: 7
3,044,440 UART: [art] Extend RT PCRs Done
3,044,868 UART: [art] Lock RT PCRs Done
3,046,576 UART: [art] Populate DV Done
3,054,829 UART: [fht] FMC Alias Private Key: 7
3,055,827 UART: [art] Derive CDI
3,056,107 UART: [art] Store in slot 0x4
3,142,096 UART: [art] Derive Key Pair
3,142,456 UART: [art] Store priv key in slot 0x5
3,155,494 UART: [art] Derive Key Pair - Done
3,170,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,341 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,106 UART: [art] PUB.X = D10C065FBA45AAB321F50E466768056479775FBE788DDD1334BC6A14FC24BF88325900609E45AD830E1B8C93D0F793F0
3,192,841 UART: [art] PUB.Y = B74CA609F643E6961CD862341F365A163982C42D87ECF9ECAEDB1EDA1D03C793510C28773F0AA8C2AD846F1DAD8116A9
3,199,791 UART: [art] SIG.R = E43279590E6BA1EBBB5C54242B3FE5605EB5136AA094D0DF79CBDF690D70D3ACA159B11C099AD0359A57BE88838BD966
3,206,564 UART: [art] SIG.S = 023C7C0B21A7EC7B56FAD4F3C85245F67DC762924E5A37601EDBAF8EFDF35CB2C9E7CADDF0759AF495BAFDCDAA8AFA5E
3,230,196 UART: Caliptra RT
3,230,447 UART: [state] CFI Enabled
3,350,528 UART: [rt] RT listening for mailbox commands...
3,351,198 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,474,124 UART: [rt]cmd =0x41544d4e, len=14344
3,784,085 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,225 ready_for_fw is high
1,060,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,558 >>> mbox cmd response: success
2,740,449 UART:
2,740,465 UART: Running Caliptra FMC ...
2,740,873 UART:
2,740,927 UART: [state] CFI Enabled
2,751,485 UART: [fht] FMC Alias Private Key: 7
2,870,391 UART: [art] Extend RT PCRs Done
2,870,819 UART: [art] Lock RT PCRs Done
2,872,521 UART: [art] Populate DV Done
2,880,930 UART: [fht] FMC Alias Private Key: 7
2,882,052 UART: [art] Derive CDI
2,882,332 UART: [art] Store in slot 0x4
2,968,073 UART: [art] Derive Key Pair
2,968,433 UART: [art] Store priv key in slot 0x5
2,981,381 UART: [art] Derive Key Pair - Done
2,996,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,009 UART: [art] PUB.X = 8612531F8422351DA7156C689021639B1F23079BD74804573FD7726A58CE6458C2170F657D6E476B5BAE156D20B4F1A7
3,018,758 UART: [art] PUB.Y = 941C1EC13B815A9DD13AB6C3DC818C49DCB04AEBED13A411C7A95139195B4938C36ADB6244AA22BBB2B9F3591AE41683
3,025,722 UART: [art] SIG.R = 61AE44E1FF276FACBC8F4CC3D22659AF74FF3B1F8FAA093FBA6830FB2DF5C79610F99AF3B14393A8A827BF373817478C
3,032,507 UART: [art] SIG.S = 7C068E11A157B4BF7CEACDAC3E53A2D0823FF7DEEA686246096B5B5ABA73C9673660D1092DF7E26ECEC5A21B2487F6B4
3,056,520 UART: Caliptra RT
3,056,771 UART: [state] CFI Enabled
3,177,091 UART: [rt] RT listening for mailbox commands...
3,177,761 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,300,607 UART: [rt]cmd =0x41544d4e, len=14344
3,610,546 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.34s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,499 UART: [state] LifecycleState = Unprovisioned
86,154 UART: [state] DebugLocked = No
86,782 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
893,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,834 UART: [kat] ++
897,986 UART: [kat] sha1
902,216 UART: [kat] SHA2-256
904,156 UART: [kat] SHA2-384
906,873 UART: [kat] SHA2-512-ACC
908,774 UART: [kat] ECC-384
918,253 UART: [kat] HMAC-384Kdf
922,811 UART: [kat] LMS
1,171,139 UART: [kat] --
1,171,986 UART: [cold-reset] ++
1,172,524 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 ready_for_fw is high
1,176,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,491 UART: [idev] Erasing UDS.KEYID = 0
1,201,380 UART: [idev] Sha1 KeyId Algorithm
1,209,804 UART: [idev] --
1,210,880 UART: [ldev] ++
1,211,048 UART: [ldev] CDI.KEYID = 6
1,211,411 UART: [ldev] SUBJECT.KEYID = 5
1,211,837 UART: [ldev] AUTHORITY.KEYID = 7
1,212,300 UART: [ldev] FE.KEYID = 1
1,217,394 UART: [ldev] Erasing FE.KEYID = 1
1,244,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,186 UART: [ldev] --
1,283,533 UART: [fwproc] Wait for Commands...
1,284,157 UART: [fwproc] Recv command 0x46574c44
1,284,885 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,945 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,115 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,282 >>> mbox cmd response: success
2,831,292 UART: [afmc] ++
2,831,460 UART: [afmc] CDI.KEYID = 6
2,831,822 UART: [afmc] SUBJECT.KEYID = 7
2,832,247 UART: [afmc] AUTHORITY.KEYID = 5
2,868,238 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,523 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,271 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,564 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,552 UART: [afmc] --
2,911,470 UART: [cold-reset] --
2,912,140 UART: [state] Locking Datavault
2,913,139 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,743 UART: [state] Locking ICCM
2,914,277 UART: [exit] Launching FMC @ 0x40000130
2,919,607 UART:
2,919,623 UART: Running Caliptra FMC ...
2,920,031 UART:
2,920,174 UART: [state] CFI Enabled
2,930,896 UART: [fht] FMC Alias Private Key: 7
3,050,168 UART: [art] Extend RT PCRs Done
3,050,596 UART: [art] Lock RT PCRs Done
3,052,058 UART: [art] Populate DV Done
3,060,253 UART: [fht] FMC Alias Private Key: 7
3,061,397 UART: [art] Derive CDI
3,061,677 UART: [art] Store in slot 0x4
3,147,684 UART: [art] Derive Key Pair
3,148,044 UART: [art] Store priv key in slot 0x5
3,161,646 UART: [art] Derive Key Pair - Done
3,176,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,818 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,583 UART: [art] PUB.X = 88DDE0530ED0CA79578CEA14722977F35A3489984B2DD09E1FB45A590362D3DFCE88B527F19CA916BBA6BB528E32A666
3,199,355 UART: [art] PUB.Y = AA2BBB903D73912831BDFE7F6CD9B32FC464134DCF86F3F99CB98F16BD5C866ADD9802BE3C4F46D4EB285E05F116C495
3,206,317 UART: [art] SIG.R = FAC15F9A2152712F43D835474F0D93C320395326791F4F21E5434C321DE5038CBF2B00A9FB58ED0E66CA8849110D9F6D
3,213,053 UART: [art] SIG.S = 9D0616FDC7E082866C66701E2666499E3A5F9FA550DB56844EEF84769A8DD0DFD43BD964711E103633F21BF0F201D620
3,236,925 UART: Caliptra RT
3,237,268 UART: [state] CFI Enabled
3,356,888 UART: [rt] RT listening for mailbox commands...
3,357,558 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,890 UART: [rt]cmd =0x41544d4e, len=14344
3,790,953 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.36s
running 1 test
Vendor TBS sha384 is:
f3e14f5b 68bf5b6d 37566a1e 27683da7 294715fc eed6e5b8 78c89f8d f19c735e 5a688a6b c415139 e9154f7a 41a3cbeb
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,104 ready_for_fw is high
1,061,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,269 >>> mbox cmd response: success
2,743,612 UART:
2,743,628 UART: Running Caliptra FMC ...
2,744,036 UART:
2,744,179 UART: [state] CFI Enabled
2,754,975 UART: [fht] FMC Alias Private Key: 7
2,873,699 UART: [art] Extend RT PCRs Done
2,874,127 UART: [art] Lock RT PCRs Done
2,875,595 UART: [art] Populate DV Done
2,883,976 UART: [fht] FMC Alias Private Key: 7
2,885,092 UART: [art] Derive CDI
2,885,372 UART: [art] Store in slot 0x4
2,971,775 UART: [art] Derive Key Pair
2,972,135 UART: [art] Store priv key in slot 0x5
2,985,357 UART: [art] Derive Key Pair - Done
2,999,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,587 UART: [art] PUB.X = 7EDBB4245A53DC70D37F8A70E7194544EAFBBE0033E806B8E26B62790934CD0C9448F1BB27FF0862F7BC7B900C35DFFB
3,023,334 UART: [art] PUB.Y = 0F1E451B78C00D6A42670CE7C4FC45E2A1025F2D503A0F11ADF2E9BAA50BF3610352A2198998FCC5C477A1C6FBFBD4C6
3,030,279 UART: [art] SIG.R = 06835EC6DBDACF14EC9C2C40E0360905FFE36F27D7A18EB7DBC16ECB3FD886D34C42CDECB95A3702BC6704D909728BDF
3,037,055 UART: [art] SIG.S = C4B7E0A6BF45C3D08C9587099FDF7F4B788D350962D1797777BD9AE093EC0BD1F86D1B40570E20E6D76F5EEA8620023E
3,061,050 UART: Caliptra RT
3,061,393 UART: [state] CFI Enabled
3,181,738 UART: [rt] RT listening for mailbox commands...
3,182,408 <<< Executing mbox cmd 0x41544d4e (14344 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,305,382 UART: [rt]cmd =0x41544d4e, len=14344
3,615,093 >>> mbox cmd response data (8 bytes)
test test_set_auth_manifest::test_set_auth_manifest_invalid_vendor_metadata_lms_sig_no_lms ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
192,023 UART:
192,398 UART: Running Caliptra ROM ...
193,509 UART:
193,652 UART: [state] CFI Enabled
264,638 UART: [state] LifecycleState = Unprovisioned
266,555 UART: [state] DebugLocked = No
269,019 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,118 UART: [kat] SHA2-256
442,781 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,288 UART: [kat] ++
453,772 UART: [kat] sha1
464,792 UART: [kat] SHA2-256
467,524 UART: [kat] SHA2-384
472,520 UART: [kat] SHA2-512-ACC
474,888 UART: [kat] ECC-384
2,767,897 UART: [kat] HMAC-384Kdf
2,798,816 UART: [kat] LMS
3,989,109 UART: [kat] --
3,994,733 UART: [cold-reset] ++
3,996,234 UART: [fht] Storing FHT @ 0x50003400
4,009,055 UART: [idev] ++
4,009,632 UART: [idev] CDI.KEYID = 6
4,010,568 UART: [idev] SUBJECT.KEYID = 7
4,011,818 UART: [idev] UDS.KEYID = 0
4,012,868 ready_for_fw is high
4,013,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,169 UART: [idev] Erasing UDS.KEYID = 0
7,343,985 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,116 UART: [idev] --
7,369,413 UART: [ldev] ++
7,369,981 UART: [ldev] CDI.KEYID = 6
7,370,945 UART: [ldev] SUBJECT.KEYID = 5
7,372,159 UART: [ldev] AUTHORITY.KEYID = 7
7,373,443 UART: [ldev] FE.KEYID = 1
7,421,091 UART: [ldev] Erasing FE.KEYID = 1
10,759,274 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,403 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,498 UART: [ldev] --
13,135,495 UART: [fwproc] Waiting for Commands...
13,137,319 UART: [fwproc] Received command 0x46574c44
13,139,501 UART: [fwproc] Received Image of size 118548 bytes
17,246,114 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,323,323 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,396,502 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,467 >>> mbox cmd response: success
17,730,000 UART: [afmc] ++
17,730,638 UART: [afmc] CDI.KEYID = 6
17,731,561 UART: [afmc] SUBJECT.KEYID = 7
17,732,778 UART: [afmc] AUTHORITY.KEYID = 5
21,090,248 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,130 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,604 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,291 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,688 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,038 UART: [afmc] --
23,462,446 UART: [cold-reset] --
23,465,603 UART: [state] Locking Datavault
23,471,118 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,819 UART: [state] Locking ICCM
23,474,594 UART: [exit] Launching FMC @ 0x40000130
23,482,928 UART:
23,483,172 UART: Running Caliptra FMC ...
23,484,274 UART:
23,484,439 UART: [state] CFI Enabled
23,551,243 UART: [fht] FMC Alias Private Key: 7
25,891,573 UART: [art] Extend RT PCRs Done
25,892,809 UART: [art] Lock RT PCRs Done
25,894,350 UART: [art] Populate DV Done
25,899,759 UART: [fht] FMC Alias Private Key: 7
25,901,347 UART: [art] Derive CDI
25,902,082 UART: [art] Store in slot 0x4
25,959,984 UART: [art] Derive Key Pair
25,961,016 UART: [art] Store priv key in slot 0x5
29,253,592 UART: [art] Derive Key Pair - Done
29,266,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,276 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,781 UART: [art] PUB.X = 4C8707C78CBFAA0397AC846B2C03928BDA31442C5FEF0533FE276FD9A1290885CC4A00E7ED36113CD6DB445904F5177C
31,565,084 UART: [art] PUB.Y = 8DA944B2F5BBF40ACFA261B502ACF21F297F3E5983D34888D8B28768D5E6B23CB40EDB52B52F7EF07BC4F922DEFC6060
31,572,309 UART: [art] SIG.R = FCA9D94DEABB8D9E4A89B92848E53AFF5EE165DEC8C72B957E171CD93FDAD60280E9F96EAC6912529BEB0181D0970F9B
31,579,752 UART: [art] SIG.S = B36EB8F048C0E8A73137C3AB6EC04B1F8101446118F2DD83AB3F6785B98939467EEAE2E17346B6049BD07D488D0CB28F
32,885,318 UART: Caliptra RT
32,886,016 UART: [state] CFI Enabled
33,062,748 UART: [rt] RT listening for mailbox commands...
33,065,109 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,095,952 UART: [rt]cmd =0x44504543, len=96
38,866,060 >>> mbox cmd response data (6236 bytes)
38,895,145 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,925,865 UART: [rt]cmd =0x53574545, len=84
44,511,706 >>> mbox cmd response data (200 bytes)
44,899,519 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,929,602 UART: [rt]cmd =0x4453424c, len=4
48,240,726 >>> mbox cmd response data (8 bytes)
48,241,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,271,764 UART: [rt]cmd =0x53574545, len=84
53,855,852 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,805,635 ready_for_fw is high
3,806,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,776 >>> mbox cmd response: success
23,634,550 UART:
23,634,937 UART: Running Caliptra FMC ...
23,636,057 UART:
23,636,220 UART: [state] CFI Enabled
23,705,474 UART: [fht] FMC Alias Private Key: 7
26,046,618 UART: [art] Extend RT PCRs Done
26,047,842 UART: [art] Lock RT PCRs Done
26,049,551 UART: [art] Populate DV Done
26,055,094 UART: [fht] FMC Alias Private Key: 7
26,056,805 UART: [art] Derive CDI
26,057,622 UART: [art] Store in slot 0x4
26,114,854 UART: [art] Derive Key Pair
26,115,892 UART: [art] Store priv key in slot 0x5
29,408,692 UART: [art] Derive Key Pair - Done
29,421,415 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,710,712 UART: [art] Erasing AUTHORITY.KEYID = 7
31,712,214 UART: [art] PUB.X = 126BAAE60128EF13A99B74BB629A3191FD5DF2DC0E9B26EC0B3D95A0E1C3B01A4010C493380F468B95EA7CCD18D10B7B
31,719,514 UART: [art] PUB.Y = 5D0A67401C8AF7763DEE724D4D09012B00ED74EBC6C797AAE4201AC344CFF5E9FCEC636CE658422BFD5264958C532F30
31,726,766 UART: [art] SIG.R = E39E4116CF1C457684538EA4DF136B30E1C7B7A312FC750CB11BE78391C4DC87574DD4EFA3F3B02A54DB5108BA7291DC
31,734,156 UART: [art] SIG.S = 0854884181CF8DE00B548936AA0EBB5345EAB71080A6C3CD5534C37C6D4028C735B42EEE506BCABF41B99DC62F79ABBB
33,038,969 UART: Caliptra RT
33,039,685 UART: [state] CFI Enabled
33,217,062 UART: [rt] RT listening for mailbox commands...
33,219,385 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,249,958 UART: [rt]cmd =0x44504543, len=96
39,020,147 >>> mbox cmd response data (6236 bytes)
39,049,199 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,079,926 UART: [rt]cmd =0x53574545, len=84
44,665,221 >>> mbox cmd response data (200 bytes)
45,047,786 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,078,161 UART: [rt]cmd =0x4453424c, len=4
48,392,033 >>> mbox cmd response data (8 bytes)
48,393,242 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,423,764 UART: [rt]cmd =0x53574545, len=84
54,006,768 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
192,465 UART:
192,824 UART: Running Caliptra ROM ...
193,958 UART:
603,726 UART: [state] CFI Enabled
620,268 UART: [state] LifecycleState = Unprovisioned
622,172 UART: [state] DebugLocked = No
624,985 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,982 UART: [kat] SHA2-256
799,751 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,264 UART: [kat] ++
810,705 UART: [kat] sha1
822,146 UART: [kat] SHA2-256
824,813 UART: [kat] SHA2-384
831,432 UART: [kat] SHA2-512-ACC
833,792 UART: [kat] ECC-384
3,118,869 UART: [kat] HMAC-384Kdf
3,130,803 UART: [kat] LMS
4,320,910 UART: [kat] --
4,324,832 UART: [cold-reset] ++
4,326,119 UART: [fht] Storing FHT @ 0x50003400
4,338,086 UART: [idev] ++
4,338,656 UART: [idev] CDI.KEYID = 6
4,339,630 UART: [idev] SUBJECT.KEYID = 7
4,340,868 UART: [idev] UDS.KEYID = 0
4,341,841 ready_for_fw is high
4,342,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,250 UART: [idev] Erasing UDS.KEYID = 0
7,629,200 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,747 UART: [idev] --
7,654,910 UART: [ldev] ++
7,655,472 UART: [ldev] CDI.KEYID = 6
7,656,426 UART: [ldev] SUBJECT.KEYID = 5
7,657,633 UART: [ldev] AUTHORITY.KEYID = 7
7,658,913 UART: [ldev] FE.KEYID = 1
7,668,850 UART: [ldev] Erasing FE.KEYID = 1
10,956,556 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,012 UART: [ldev] --
13,316,900 UART: [fwproc] Waiting for Commands...
13,318,665 UART: [fwproc] Received command 0x46574c44
13,320,892 UART: [fwproc] Received Image of size 118548 bytes
17,425,222 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,491,948 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,565,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,893,752 >>> mbox cmd response: success
17,898,088 UART: [afmc] ++
17,898,708 UART: [afmc] CDI.KEYID = 6
17,899,805 UART: [afmc] SUBJECT.KEYID = 7
17,900,933 UART: [afmc] AUTHORITY.KEYID = 5
21,211,975 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,505,473 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,724 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,522,131 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,536,857 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,551,302 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,572,312 UART: [afmc] --
23,577,034 UART: [cold-reset] --
23,581,779 UART: [state] Locking Datavault
23,586,742 UART: [state] Locking PCR0, PCR1 and PCR31
23,588,507 UART: [state] Locking ICCM
23,589,790 UART: [exit] Launching FMC @ 0x40000130
23,598,180 UART:
23,598,411 UART: Running Caliptra FMC ...
23,599,503 UART:
23,599,658 UART: [state] CFI Enabled
23,607,757 UART: [fht] FMC Alias Private Key: 7
25,947,818 UART: [art] Extend RT PCRs Done
25,949,042 UART: [art] Lock RT PCRs Done
25,950,786 UART: [art] Populate DV Done
25,956,250 UART: [fht] FMC Alias Private Key: 7
25,957,737 UART: [art] Derive CDI
25,958,495 UART: [art] Store in slot 0x4
26,001,138 UART: [art] Derive Key Pair
26,002,203 UART: [art] Store priv key in slot 0x5
29,244,611 UART: [art] Derive Key Pair - Done
29,257,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,552 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,075 UART: [art] PUB.X = AD9AA2AEBF0A0D392877FD0343C165C85D6A6000627A1D59F38740C3F8DCFB944A789754A6009C97DA2CA622F57FAE33
31,546,317 UART: [art] PUB.Y = 80F924813868670E40C8065295CABFF677EAAC873EABC6D2BC781D21224F0744429D98B9847F6DC1B505ECD1E442AC75
31,553,535 UART: [art] SIG.R = 2C5EE6E8DC66C46DF7C3F59A7EBE5D26B79FB05143CE1C8806305664FA26665F1BB2831FB86F974668C216B582A6220B
31,560,923 UART: [art] SIG.S = FFC70F5582A2AF31EBD6287432614DD2FF863FFC6B0AA4C0F1EAF3D3BBB591AD8C74045DC44E760AC6BD46229673837C
32,865,881 UART: Caliptra RT
32,866,578 UART: [state] CFI Enabled
32,999,886 UART: [rt] RT listening for mailbox commands...
33,002,214 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,032,946 UART: [rt]cmd =0x44504543, len=96
38,707,368 >>> mbox cmd response data (6236 bytes)
38,736,440 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,766,828 UART: [rt]cmd =0x53574545, len=84
44,291,410 >>> mbox cmd response data (200 bytes)
44,673,934 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,704,107 UART: [rt]cmd =0x4453424c, len=4
47,949,979 >>> mbox cmd response data (8 bytes)
47,950,515 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
47,980,776 UART: [rt]cmd =0x53574545, len=84
53,505,787 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,123,155 ready_for_fw is high
4,123,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,423 >>> mbox cmd response: success
23,805,023 UART:
23,805,439 UART: Running Caliptra FMC ...
23,806,580 UART:
23,806,739 UART: [state] CFI Enabled
23,814,684 UART: [fht] FMC Alias Private Key: 7
26,154,600 UART: [art] Extend RT PCRs Done
26,155,845 UART: [art] Lock RT PCRs Done
26,157,742 UART: [art] Populate DV Done
26,163,480 UART: [fht] FMC Alias Private Key: 7
26,165,125 UART: [art] Derive CDI
26,165,934 UART: [art] Store in slot 0x4
26,208,871 UART: [art] Derive Key Pair
26,209,866 UART: [art] Store priv key in slot 0x5
29,451,431 UART: [art] Derive Key Pair - Done
29,464,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,476 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,989 UART: [art] PUB.X = DDE66E3A080CDDD5C35F8E0B2F6123BD73B3BDA2C8F891941780199495EE863FBC985174B4FB2B62A18E622E6CB2FE0A
31,753,289 UART: [art] PUB.Y = 24F7C86AB86C4FD240D8E6D26B373E0972EEDA07E5517CF4F3D650ABCFE85629FE102AA7315DB97F34BF463AEF5B756A
31,760,556 UART: [art] SIG.R = 91D55B45889931DABC37736E6C5A617DDCC8F3E26738024A0E6ADF7BE9DFB72CD01DB2CD73475330358E69F8C8EC084F
31,768,003 UART: [art] SIG.S = 296064CBED92FF8840240091829AF5064B40AEEA82D51F4EF2CC32820B2512F1A02D553D3718500A18173319C7DDB202
33,073,271 UART: Caliptra RT
33,073,983 UART: [state] CFI Enabled
33,206,612 UART: [rt] RT listening for mailbox commands...
33,208,947 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,239,761 UART: [rt]cmd =0x44504543, len=96
38,913,533 >>> mbox cmd response data (6236 bytes)
38,942,569 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,973,199 UART: [rt]cmd =0x53574545, len=84
44,498,222 >>> mbox cmd response data (200 bytes)
44,885,090 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
44,915,030 UART: [rt]cmd =0x4453424c, len=4
48,160,828 >>> mbox cmd response data (8 bytes)
48,161,359 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
48,191,727 UART: [rt]cmd =0x53574545, len=84
53,717,223 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,230 UART:
192,587 UART: Running Caliptra ROM ...
193,762 UART:
193,927 UART: [state] CFI Enabled
265,102 UART: [state] LifecycleState = Unprovisioned
267,080 UART: [state] DebugLocked = No
269,252 UART: [state] WD Timer not started. Device not locked for debugging
273,141 UART: [kat] SHA2-256
452,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,577 UART: [kat] ++
464,177 UART: [kat] sha1
475,480 UART: [kat] SHA2-256
478,198 UART: [kat] SHA2-384
484,229 UART: [kat] SHA2-512-ACC
486,538 UART: [kat] ECC-384
2,948,688 UART: [kat] HMAC-384Kdf
2,971,103 UART: [kat] LMS
3,447,590 UART: [kat] --
3,453,220 UART: [cold-reset] ++
3,455,788 UART: [fht] FHT @ 0x50003400
3,466,971 UART: [idev] ++
3,467,524 UART: [idev] CDI.KEYID = 6
3,468,549 UART: [idev] SUBJECT.KEYID = 7
3,469,719 UART: [idev] UDS.KEYID = 0
3,470,668 ready_for_fw is high
3,470,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,898 UART: [idev] Erasing UDS.KEYID = 0
5,984,305 UART: [idev] Sha1 KeyId Algorithm
6,009,727 UART: [idev] --
6,014,950 UART: [ldev] ++
6,015,533 UART: [ldev] CDI.KEYID = 6
6,016,417 UART: [ldev] SUBJECT.KEYID = 5
6,017,631 UART: [ldev] AUTHORITY.KEYID = 7
6,018,915 UART: [ldev] FE.KEYID = 1
6,055,755 UART: [ldev] Erasing FE.KEYID = 1
8,561,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,758 UART: [ldev] --
10,369,477 UART: [fwproc] Wait for Commands...
10,372,753 UART: [fwproc] Recv command 0x46574c44
10,374,738 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,010,035 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,017 >>> mbox cmd response: success
14,342,372 UART: [afmc] ++
14,342,989 UART: [afmc] CDI.KEYID = 6
14,343,898 UART: [afmc] SUBJECT.KEYID = 7
14,345,111 UART: [afmc] AUTHORITY.KEYID = 5
16,874,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,911 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,148 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,016 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,577 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,837 UART: [afmc] --
18,695,422 UART: [cold-reset] --
18,699,331 UART: [state] Locking Datavault
18,704,909 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,659 UART: [state] Locking ICCM
18,708,652 UART: [exit] Launching FMC @ 0x40000130
18,717,046 UART:
18,717,283 UART: Running Caliptra FMC ...
18,718,380 UART:
18,718,735 UART: [state] CFI Enabled
18,774,235 UART: [fht] FMC Alias Private Key: 7
20,540,582 UART: [art] Extend RT PCRs Done
20,541,805 UART: [art] Lock RT PCRs Done
20,543,536 UART: [art] Populate DV Done
20,548,961 UART: [fht] FMC Alias Private Key: 7
20,550,450 UART: [art] Derive CDI
20,551,209 UART: [art] Store in slot 0x4
20,607,162 UART: [art] Derive Key Pair
20,608,200 UART: [art] Store priv key in slot 0x5
23,071,196 UART: [art] Derive Key Pair - Done
23,084,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,036 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,685 UART: [art] PUB.X = 23C18C0D0272ECEAB96B1EC1B6B92CA4D26EBFF618D825E9A553775B67A17A40280809CD83D78912CBB2F323D395C2F3
24,805,840 UART: [art] PUB.Y = 1E91CEA6C0DA7EA334B5753BDBEB1874D18E5AE3D19B0CF45FD39766877DDA16CE8F6A6DE38A2A7DCDDEA4A02E9FCA86
24,813,131 UART: [art] SIG.R = E78075A754364E36FAE781BDAAFC0D293A463758F9753E22578B56A7E6C639630EA52208203B0E5D1226621E17BBBA4A
24,820,469 UART: [art] SIG.S = 1B73B1086F66D70E953B3E4CE0C91961DBAF636B352A8AC9FD02DB76AB727579367CB43CB3293B1EE9A52CA28AE70BAB
25,799,726 UART: Caliptra RT
25,800,439 UART: [state] CFI Enabled
25,981,807 UART: [rt] RT listening for mailbox commands...
25,984,042 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,014,794 UART: [rt]cmd =0x44504543, len=96
30,378,481 >>> mbox cmd response data (6236 bytes)
30,407,750 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,438,204 UART: [rt]cmd =0x53574545, len=84
34,615,922 >>> mbox cmd response data (200 bytes)
34,999,757 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,030,049 UART: [rt]cmd =0x4453424c, len=4
37,511,063 >>> mbox cmd response data (8 bytes)
37,511,610 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,542,203 UART: [rt]cmd =0x53574545, len=84
41,717,384 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,460,162 ready_for_fw is high
3,460,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,220,612 >>> mbox cmd response: success
18,516,224 UART:
18,516,644 UART: Running Caliptra FMC ...
18,517,773 UART:
18,517,932 UART: [state] CFI Enabled
18,584,126 UART: [fht] FMC Alias Private Key: 7
20,349,909 UART: [art] Extend RT PCRs Done
20,351,132 UART: [art] Lock RT PCRs Done
20,352,645 UART: [art] Populate DV Done
20,358,338 UART: [fht] FMC Alias Private Key: 7
20,359,930 UART: [art] Derive CDI
20,360,688 UART: [art] Store in slot 0x4
20,417,136 UART: [art] Derive Key Pair
20,418,181 UART: [art] Store priv key in slot 0x5
22,880,736 UART: [art] Derive Key Pair - Done
22,893,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,606,844 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,345 UART: [art] PUB.X = D389058C3EBCF663C76282350E4F1B36F6A326C6CD16D96B3E6FD5BEA09C4356DF6AF5BD7E818CBDAD39CFAE46933A7C
24,615,657 UART: [art] PUB.Y = 578F45DE8C117AF59CDB44A9A84A9A909AB98CD593D5A2E11577A79FC400D86C9DE545A2931B1E662A801AC25CA01E2C
24,622,908 UART: [art] SIG.R = F477589D74FF927D9CD4A4BDC02A05624646508FCDC52163729E582A6EC1B1BBFD7BE6AD7B6433C1FEB16EE8A68120C2
24,630,300 UART: [art] SIG.S = CF5E3DD6C0E15D56C1FA45947E6ECDDA034C4DA86D2E47C9D85547ECD68FEEF355D6D80038FABE99AA115DB292E6E5CA
25,609,445 UART: Caliptra RT
25,610,164 UART: [state] CFI Enabled
25,790,580 UART: [rt] RT listening for mailbox commands...
25,792,851 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,823,530 UART: [rt]cmd =0x44504543, len=96
30,188,054 >>> mbox cmd response data (6236 bytes)
30,217,118 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,247,887 UART: [rt]cmd =0x53574545, len=84
34,426,786 >>> mbox cmd response data (200 bytes)
34,810,513 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,840,547 UART: [rt]cmd =0x4453424c, len=4
37,322,593 >>> mbox cmd response data (8 bytes)
37,323,125 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,353,280 UART: [rt]cmd =0x53574545, len=84
41,529,342 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
192,415 UART:
192,798 UART: Running Caliptra ROM ...
193,903 UART:
603,463 UART: [state] CFI Enabled
620,114 UART: [state] LifecycleState = Unprovisioned
621,998 UART: [state] DebugLocked = No
623,367 UART: [state] WD Timer not started. Device not locked for debugging
626,909 UART: [kat] SHA2-256
806,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,396 UART: [kat] ++
817,879 UART: [kat] sha1
828,614 UART: [kat] SHA2-256
831,264 UART: [kat] SHA2-384
837,540 UART: [kat] SHA2-512-ACC
839,908 UART: [kat] ECC-384
3,280,780 UART: [kat] HMAC-384Kdf
3,293,662 UART: [kat] LMS
3,770,137 UART: [kat] --
3,775,272 UART: [cold-reset] ++
3,777,735 UART: [fht] FHT @ 0x50003400
3,788,584 UART: [idev] ++
3,789,154 UART: [idev] CDI.KEYID = 6
3,790,066 UART: [idev] SUBJECT.KEYID = 7
3,791,319 UART: [idev] UDS.KEYID = 0
3,792,242 ready_for_fw is high
3,792,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,753 UART: [idev] Erasing UDS.KEYID = 0
6,269,592 UART: [idev] Sha1 KeyId Algorithm
6,294,059 UART: [idev] --
6,299,408 UART: [ldev] ++
6,299,978 UART: [ldev] CDI.KEYID = 6
6,300,891 UART: [ldev] SUBJECT.KEYID = 5
6,302,106 UART: [ldev] AUTHORITY.KEYID = 7
6,303,339 UART: [ldev] FE.KEYID = 1
6,315,606 UART: [ldev] Erasing FE.KEYID = 1
8,796,354 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,670 UART: [ldev] --
10,587,370 UART: [fwproc] Wait for Commands...
10,589,523 UART: [fwproc] Recv command 0x46574c44
10,591,573 UART: [fwproc] Recv'd Img size: 118548 bytes
14,082,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,234,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,562,225 >>> mbox cmd response: success
14,567,149 UART: [afmc] ++
14,567,744 UART: [afmc] CDI.KEYID = 6
14,568,659 UART: [afmc] SUBJECT.KEYID = 7
14,569,877 UART: [afmc] AUTHORITY.KEYID = 5
17,069,397 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,789,836 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,035 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,807,860 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,823,929 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,839,496 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,909 UART: [afmc] --
18,866,778 UART: [cold-reset] --
18,869,562 UART: [state] Locking Datavault
18,875,567 UART: [state] Locking PCR0, PCR1 and PCR31
18,877,331 UART: [state] Locking ICCM
18,878,404 UART: [exit] Launching FMC @ 0x40000130
18,886,806 UART:
18,887,045 UART: Running Caliptra FMC ...
18,888,152 UART:
18,888,311 UART: [state] CFI Enabled
18,896,257 UART: [fht] FMC Alias Private Key: 7
20,662,081 UART: [art] Extend RT PCRs Done
20,663,307 UART: [art] Lock RT PCRs Done
20,664,985 UART: [art] Populate DV Done
20,670,456 UART: [fht] FMC Alias Private Key: 7
20,672,072 UART: [art] Derive CDI
20,672,898 UART: [art] Store in slot 0x4
20,715,339 UART: [art] Derive Key Pair
20,716,337 UART: [art] Store priv key in slot 0x5
23,142,921 UART: [art] Derive Key Pair - Done
23,155,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,648 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,150 UART: [art] PUB.X = 324544D39B778E72435033F5A706C83C24ECAF1D6BD070FB713FAE7F397E2889608C787CFFDB2C6D37FB472E248AAE5E
24,870,447 UART: [art] PUB.Y = 53DFD95CF92EFEB988BCFDC5B0873E545C88C7A055CD7ECFBDE8FE28EEA6690786CD2385A0A7BC740465A0EDB4DE2AB7
24,877,739 UART: [art] SIG.R = 89FD1C665ED5BF15A0029338FA234240902079C5FB094B782F1FE58C94FB7A8E6093408072CE863F521050099C4E5A3E
24,885,133 UART: [art] SIG.S = 2B2C98EE49EEB46C76359B139E803F236264C7D3F55215E6B40CA7729C52F7CAC96141A0932293B4BA55EDDE2E7C0B12
25,864,075 UART: Caliptra RT
25,864,774 UART: [state] CFI Enabled
25,998,060 UART: [rt] RT listening for mailbox commands...
26,000,468 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,031,146 UART: [rt]cmd =0x44504543, len=96
30,316,096 >>> mbox cmd response data (6236 bytes)
30,345,342 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,375,960 UART: [rt]cmd =0x53574545, len=84
34,511,884 >>> mbox cmd response data (200 bytes)
34,896,394 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,926,337 UART: [rt]cmd =0x4453424c, len=4
37,356,741 >>> mbox cmd response data (8 bytes)
37,357,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,387,730 UART: [rt]cmd =0x53574545, len=84
41,523,372 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,781,715 ready_for_fw is high
3,782,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,059 >>> mbox cmd response: success
18,690,302 UART:
18,690,713 UART: Running Caliptra FMC ...
18,691,823 UART:
18,691,982 UART: [state] CFI Enabled
18,699,717 UART: [fht] FMC Alias Private Key: 7
20,466,235 UART: [art] Extend RT PCRs Done
20,467,459 UART: [art] Lock RT PCRs Done
20,469,220 UART: [art] Populate DV Done
20,474,700 UART: [fht] FMC Alias Private Key: 7
20,476,237 UART: [art] Derive CDI
20,476,981 UART: [art] Store in slot 0x4
20,519,686 UART: [art] Derive Key Pair
20,520,707 UART: [art] Store priv key in slot 0x5
22,947,323 UART: [art] Derive Key Pair - Done
22,960,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,666,784 UART: [art] Erasing AUTHORITY.KEYID = 7
24,668,285 UART: [art] PUB.X = FBD6AA116DA35B05FD99390D5BFE7ECCB558FBE6FA5C42C4DF298EE61F0131CE043A67215262852F62CCACC4535C2348
24,675,598 UART: [art] PUB.Y = 5D7535E17927557C26D4DC5E3656B6B3476F08B2FFE0D6FC10E12973FE626272A93206EB670708553DC463660265E5AD
24,682,813 UART: [art] SIG.R = 7FB4E5ADB5A0D4E273CEACA29A9E3EABA8B76035B2A718FD26A81D9822B84D87C0ED29C12E68D68CB681755E1BFC2A54
24,690,228 UART: [art] SIG.S = ECCE8D9144F0EE528D0FA70B1B241542F87D711011A9027215D77EC35D827C30B7E95A6E932DEE009600A0810AFF5CAF
25,669,084 UART: Caliptra RT
25,669,791 UART: [state] CFI Enabled
25,802,206 UART: [rt] RT listening for mailbox commands...
25,804,617 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,835,199 UART: [rt]cmd =0x44504543, len=96
30,120,653 >>> mbox cmd response data (6236 bytes)
30,149,698 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,180,551 UART: [rt]cmd =0x53574545, len=84
34,315,935 >>> mbox cmd response data (200 bytes)
34,701,684 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
34,732,059 UART: [rt]cmd =0x4453424c, len=4
37,162,891 >>> mbox cmd response data (8 bytes)
37,163,432 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,193,813 UART: [rt]cmd =0x53574545, len=84
41,329,440 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,117 UART:
192,492 UART: Running Caliptra ROM ...
193,685 UART:
193,838 UART: [state] CFI Enabled
265,444 UART: [state] LifecycleState = Unprovisioned
267,850 UART: [state] DebugLocked = No
269,024 UART: [state] WD Timer not started. Device not locked for debugging
271,995 UART: [kat] SHA2-256
461,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,601 UART: [kat] ++
473,137 UART: [kat] sha1
483,164 UART: [kat] SHA2-256
486,183 UART: [kat] SHA2-384
491,026 UART: [kat] SHA2-512-ACC
493,605 UART: [kat] ECC-384
2,951,157 UART: [kat] HMAC-384Kdf
2,972,551 UART: [kat] LMS
3,504,317 UART: [kat] --
3,509,609 UART: [cold-reset] ++
3,511,685 UART: [fht] FHT @ 0x50003400
3,524,790 UART: [idev] ++
3,525,495 UART: [idev] CDI.KEYID = 6
3,526,520 UART: [idev] SUBJECT.KEYID = 7
3,527,621 UART: [idev] UDS.KEYID = 0
3,528,548 ready_for_fw is high
3,528,735 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,805 UART: [idev] Erasing UDS.KEYID = 0
6,049,451 UART: [idev] Sha1 KeyId Algorithm
6,071,773 UART: [idev] --
6,076,525 UART: [ldev] ++
6,077,202 UART: [ldev] CDI.KEYID = 6
6,078,085 UART: [ldev] SUBJECT.KEYID = 5
6,079,243 UART: [ldev] AUTHORITY.KEYID = 7
6,080,529 UART: [ldev] FE.KEYID = 1
6,121,886 UART: [ldev] Erasing FE.KEYID = 1
8,631,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,395,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,410,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,415 UART: [ldev] --
10,436,733 UART: [fwproc] Wait for Commands...
10,438,978 UART: [fwproc] Recv command 0x46574c44
10,441,237 UART: [fwproc] Recv'd Img size: 118548 bytes
13,927,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,128,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,689,602 >>> mbox cmd response: success
14,693,116 UART: [afmc] ++
14,693,840 UART: [afmc] CDI.KEYID = 6
14,695,030 UART: [afmc] SUBJECT.KEYID = 7
14,696,466 UART: [afmc] AUTHORITY.KEYID = 5
17,235,568 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,935 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,849 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,949 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,097 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,033 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,277 UART: [afmc] --
19,033,487 UART: [cold-reset] --
19,037,488 UART: [state] Locking Datavault
19,042,908 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,051 UART: [state] Locking ICCM
19,047,961 UART: [exit] Launching FMC @ 0x40000130
19,056,583 UART:
19,056,824 UART: Running Caliptra FMC ...
19,057,926 UART:
19,058,085 UART: [state] CFI Enabled
19,114,929 UART: [fht] FMC Alias Private Key: 7
20,881,168 UART: [art] Extend RT PCRs Done
20,882,392 UART: [art] Lock RT PCRs Done
20,884,232 UART: [art] Populate DV Done
20,889,636 UART: [fht] FMC Alias Private Key: 7
20,891,277 UART: [art] Derive CDI
20,892,086 UART: [art] Store in slot 0x4
20,947,721 UART: [art] Derive Key Pair
20,948,780 UART: [art] Store priv key in slot 0x5
23,411,684 UART: [art] Derive Key Pair - Done
23,424,778 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,022 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,529 UART: [art] PUB.X = A654741734110EF4A76ACA43A8D878755D231EC66761F378D14B292761B39C13B59D504488DBFCB967D2E84EABE1D50A
25,146,781 UART: [art] PUB.Y = 78423D4FCA4AB2756440E880B4C7C23768E66F1D95048D99AAD703FC66F860C18EFA187E420BA20165DCAE814756182F
25,154,023 UART: [art] SIG.R = 356238EA23E40A8111F6A7465CD4F4CCF5604766D5F7F98F68F8DD3DB0DD8E0B30996D9DC4DFED031382B96280056CEB
25,161,484 UART: [art] SIG.S = 6A517B0AAFF1AE8259EC3CA12D28EF08936A38F12A329E1A974A488483E5F040DF0BB8A753035CD17F0A53BCEB0DEF81
26,140,250 UART: Caliptra RT
26,140,936 UART: [state] CFI Enabled
26,321,449 UART: [rt] RT listening for mailbox commands...
26,323,648 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,354,266 UART: [rt]cmd =0x44504543, len=96
30,718,550 >>> mbox cmd response data (6236 bytes)
30,747,627 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,778,138 UART: [rt]cmd =0x53574545, len=84
34,955,230 >>> mbox cmd response data (200 bytes)
35,336,970 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,367,096 UART: [rt]cmd =0x4453424c, len=4
37,851,809 >>> mbox cmd response data (8 bytes)
37,852,333 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,882,642 UART: [rt]cmd =0x53574545, len=84
42,056,722 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,441,474 ready_for_fw is high
3,441,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,005 >>> mbox cmd response: success
19,095,166 UART:
19,095,562 UART: Running Caliptra FMC ...
19,096,666 UART:
19,096,822 UART: [state] CFI Enabled
19,162,178 UART: [fht] FMC Alias Private Key: 7
20,928,490 UART: [art] Extend RT PCRs Done
20,929,708 UART: [art] Lock RT PCRs Done
20,931,253 UART: [art] Populate DV Done
20,936,618 UART: [fht] FMC Alias Private Key: 7
20,938,314 UART: [art] Derive CDI
20,939,048 UART: [art] Store in slot 0x4
20,995,005 UART: [art] Derive Key Pair
20,996,052 UART: [art] Store priv key in slot 0x5
23,459,035 UART: [art] Derive Key Pair - Done
23,471,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,185,054 UART: [art] Erasing AUTHORITY.KEYID = 7
25,186,571 UART: [art] PUB.X = F9228B3162A0CAAFAC190743B48D83F35AA45820AD589C522B3D27AB4DF52719B20D97B4EE1BB4155067711D3E52BCB7
25,193,804 UART: [art] PUB.Y = 10E9A076BCFB89D4C01A0828CA06F41B046906A7439AD7A0D0969C771A03CDD0FE346C0DEB121B02FAE3BC654DF984E9
25,201,097 UART: [art] SIG.R = 5895B3437042D8DE48F315427D337D8A3E613A2A11D8D43E03680F78463F3EA992A9843E6E50CAC09DAB79B4C7213520
25,208,538 UART: [art] SIG.S = BF7C4E01FB2ED70EDD547D639A6FF23303D8E20795F89DB5AB20EA4FC1C0B9E3F5D8C1FA553C849BF972A62A297CE965
26,187,718 UART: Caliptra RT
26,188,452 UART: [state] CFI Enabled
26,369,994 UART: [rt] RT listening for mailbox commands...
26,372,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,403,120 UART: [rt]cmd =0x44504543, len=96
30,766,596 >>> mbox cmd response data (6236 bytes)
30,795,772 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,826,303 UART: [rt]cmd =0x53574545, len=84
35,005,187 >>> mbox cmd response data (200 bytes)
35,388,155 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,418,015 UART: [rt]cmd =0x4453424c, len=4
37,902,144 >>> mbox cmd response data (8 bytes)
37,902,696 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,933,248 UART: [rt]cmd =0x53574545, len=84
42,108,915 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
192,259 UART:
192,638 UART: Running Caliptra ROM ...
193,856 UART:
603,621 UART: [state] CFI Enabled
615,540 UART: [state] LifecycleState = Unprovisioned
617,927 UART: [state] DebugLocked = No
619,245 UART: [state] WD Timer not started. Device not locked for debugging
624,653 UART: [kat] SHA2-256
814,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,329 UART: [kat] ++
825,938 UART: [kat] sha1
837,034 UART: [kat] SHA2-256
840,058 UART: [kat] SHA2-384
845,630 UART: [kat] SHA2-512-ACC
848,219 UART: [kat] ECC-384
3,294,095 UART: [kat] HMAC-384Kdf
3,306,974 UART: [kat] LMS
3,838,839 UART: [kat] --
3,842,147 UART: [cold-reset] ++
3,844,296 UART: [fht] FHT @ 0x50003400
3,856,057 UART: [idev] ++
3,856,775 UART: [idev] CDI.KEYID = 6
3,857,838 UART: [idev] SUBJECT.KEYID = 7
3,858,945 UART: [idev] UDS.KEYID = 0
3,859,879 ready_for_fw is high
3,860,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,014 UART: [idev] Erasing UDS.KEYID = 0
6,335,815 UART: [idev] Sha1 KeyId Algorithm
6,359,098 UART: [idev] --
6,363,911 UART: [ldev] ++
6,364,646 UART: [ldev] CDI.KEYID = 6
6,365,558 UART: [ldev] SUBJECT.KEYID = 5
6,366,717 UART: [ldev] AUTHORITY.KEYID = 7
6,367,953 UART: [ldev] FE.KEYID = 1
6,379,164 UART: [ldev] Erasing FE.KEYID = 1
8,855,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,659 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,842 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,106 UART: [ldev] --
10,648,955 UART: [fwproc] Wait for Commands...
10,651,438 UART: [fwproc] Recv command 0x46574c44
10,653,692 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,473 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,071 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,921,785 >>> mbox cmd response: success
14,926,558 UART: [afmc] ++
14,927,268 UART: [afmc] CDI.KEYID = 6
14,928,484 UART: [afmc] SUBJECT.KEYID = 7
14,929,933 UART: [afmc] AUTHORITY.KEYID = 5
17,431,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,153,134 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,155,115 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,170,219 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,185,357 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,200,261 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,224,521 UART: [afmc] --
19,228,665 UART: [cold-reset] --
19,232,115 UART: [state] Locking Datavault
19,240,193 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,357 UART: [state] Locking ICCM
19,244,682 UART: [exit] Launching FMC @ 0x40000130
19,253,379 UART:
19,253,624 UART: Running Caliptra FMC ...
19,254,751 UART:
19,254,915 UART: [state] CFI Enabled
19,262,859 UART: [fht] FMC Alias Private Key: 7
21,029,545 UART: [art] Extend RT PCRs Done
21,030,772 UART: [art] Lock RT PCRs Done
21,032,256 UART: [art] Populate DV Done
21,037,573 UART: [fht] FMC Alias Private Key: 7
21,039,166 UART: [art] Derive CDI
21,039,990 UART: [art] Store in slot 0x4
21,082,647 UART: [art] Derive Key Pair
21,083,653 UART: [art] Store priv key in slot 0x5
23,510,030 UART: [art] Derive Key Pair - Done
23,522,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,311 UART: [art] PUB.X = 0DF5F267B9DE95BA1FBAD692AFAA87F74A187DF1743814529433E5FB41C2C09F13D40F28FB748BFFC65B9DAE2BA62FF0
25,238,638 UART: [art] PUB.Y = BB1098E033354CF38923C390A40F43E47C5673069725418371996A9C2F403AE757C5CF530D51C6765A7B97893125B6DF
25,245,857 UART: [art] SIG.R = A3F8FB24A98ED56DFA35FD05913403C80D1D62A0B52E9A5CA34C0D8E7B99CF0FAE08FC24469C6EB85EC3D8DFBA94A14E
25,253,285 UART: [art] SIG.S = ED9CE6D5B87A66987D5B8CE342FEA6D25D702C817B35DE0104577056CD67B83DF75398AD6623FE2F76C77C52C5EB898B
26,232,343 UART: Caliptra RT
26,233,061 UART: [state] CFI Enabled
26,365,953 UART: [rt] RT listening for mailbox commands...
26,368,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,398,951 UART: [rt]cmd =0x44504543, len=96
30,684,256 >>> mbox cmd response data (6236 bytes)
30,713,512 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,744,126 UART: [rt]cmd =0x53574545, len=84
34,879,197 >>> mbox cmd response data (200 bytes)
35,259,333 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,289,506 UART: [rt]cmd =0x4453424c, len=4
37,720,166 >>> mbox cmd response data (8 bytes)
37,720,677 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,750,836 UART: [rt]cmd =0x53574545, len=84
41,886,051 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,752,926 ready_for_fw is high
3,753,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,687 >>> mbox cmd response: success
19,287,182 UART:
19,287,580 UART: Running Caliptra FMC ...
19,288,792 UART:
19,288,971 UART: [state] CFI Enabled
19,296,768 UART: [fht] FMC Alias Private Key: 7
21,063,341 UART: [art] Extend RT PCRs Done
21,064,571 UART: [art] Lock RT PCRs Done
21,066,266 UART: [art] Populate DV Done
21,071,863 UART: [fht] FMC Alias Private Key: 7
21,073,516 UART: [art] Derive CDI
21,074,339 UART: [art] Store in slot 0x4
21,116,890 UART: [art] Derive Key Pair
21,117,896 UART: [art] Store priv key in slot 0x5
23,545,044 UART: [art] Derive Key Pair - Done
23,557,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,263,938 UART: [art] Erasing AUTHORITY.KEYID = 7
25,265,446 UART: [art] PUB.X = 817E95840236358E98E4D053A8B88137223B187FCED45784D713EA18B7B992C3EA337984EEA7056D46BAB7D5CD7E5F0D
25,272,715 UART: [art] PUB.Y = F994D4AB147039677CBEA0C48B494D20C691DE84B647ABBB7EABC2818804132B77ECB0C9A92F81121B2B8CCC6BB4307B
25,279,987 UART: [art] SIG.R = 4DFB932366323D6FAF6495D6ABF372C9481B86025A7AE3354B641F16FC70CB131C5BE6B9227BA0F752F781EC4DEF52A8
25,287,416 UART: [art] SIG.S = 48F60E6DFA6E43C06BC2519CB3A6B9927BE77DAEC644DD44B8FAB7FD57629DA097E62CB6DAAA7DE7D7221835EE515D3B
26,266,171 UART: Caliptra RT
26,266,867 UART: [state] CFI Enabled
26,399,583 UART: [rt] RT listening for mailbox commands...
26,401,992 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,432,402 UART: [rt]cmd =0x44504543, len=96
30,717,524 >>> mbox cmd response data (6236 bytes)
30,746,745 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,777,420 UART: [rt]cmd =0x53574545, len=84
34,913,920 >>> mbox cmd response data (200 bytes)
35,300,379 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
35,330,301 UART: [rt]cmd =0x4453424c, len=4
37,761,187 >>> mbox cmd response data (8 bytes)
37,761,701 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
37,792,056 UART: [rt]cmd =0x53574545, len=84
41,927,290 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,639 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
895,180 UART: [kat] SHA2-512-ACC
897,081 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,332 UART: [kat] LMS
1,475,528 UART: [kat] --
1,476,149 UART: [cold-reset] ++
1,476,479 UART: [fht] Storing FHT @ 0x50003400
1,479,190 UART: [idev] ++
1,479,358 UART: [idev] CDI.KEYID = 6
1,479,718 UART: [idev] SUBJECT.KEYID = 7
1,480,142 UART: [idev] UDS.KEYID = 0
1,480,487 ready_for_fw is high
1,480,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,008 UART: [idev] Erasing UDS.KEYID = 0
1,504,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,092 UART: [idev] --
1,514,095 UART: [ldev] ++
1,514,263 UART: [ldev] CDI.KEYID = 6
1,514,626 UART: [ldev] SUBJECT.KEYID = 5
1,515,052 UART: [ldev] AUTHORITY.KEYID = 7
1,515,515 UART: [ldev] FE.KEYID = 1
1,520,407 UART: [ldev] Erasing FE.KEYID = 1
1,545,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,542 UART: [ldev] --
1,584,901 UART: [fwproc] Waiting for Commands...
1,585,742 UART: [fwproc] Received command 0x46574c44
1,586,533 UART: [fwproc] Received Image of size 118548 bytes
2,931,668 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,002 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,220 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,567 >>> mbox cmd response: success
3,131,715 UART: [afmc] ++
3,131,883 UART: [afmc] CDI.KEYID = 6
3,132,245 UART: [afmc] SUBJECT.KEYID = 7
3,132,670 UART: [afmc] AUTHORITY.KEYID = 5
3,167,159 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,337 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,117 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,826 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,709 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,392 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,152 UART: [afmc] --
3,210,074 UART: [cold-reset] --
3,211,114 UART: [state] Locking Datavault
3,212,387 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,991 UART: [state] Locking ICCM
3,213,571 UART: [exit] Launching FMC @ 0x40000130
3,218,901 UART:
3,218,917 UART: Running Caliptra FMC ...
3,219,325 UART:
3,219,379 UART: [state] CFI Enabled
3,229,735 UART: [fht] FMC Alias Private Key: 7
3,348,187 UART: [art] Extend RT PCRs Done
3,348,615 UART: [art] Lock RT PCRs Done
3,350,039 UART: [art] Populate DV Done
3,358,000 UART: [fht] FMC Alias Private Key: 7
3,359,024 UART: [art] Derive CDI
3,359,304 UART: [art] Store in slot 0x4
3,444,780 UART: [art] Derive Key Pair
3,445,140 UART: [art] Store priv key in slot 0x5
3,458,035 UART: [art] Derive Key Pair - Done
3,472,698 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,875 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,640 UART: [art] PUB.X = 580C4330D0A1E98C038EAD6BE0F3CA7B4A21A97DEA1C8A3B69C7F60DD00A994B5BE32C6631E14F6F180C1E7E9085B942
3,495,409 UART: [art] PUB.Y = 40ED1C2477E1E667DF73C3C5A0BA3032892EB17FB85D2CEC9ACE8FBCF3C59C463076E8E87111A4049FC055586EDBB6EA
3,502,374 UART: [art] SIG.R = D67C414F96061E9B632CF5BF00C5B10576FF74CED8B9EA7A59086202233C6E9C754B480C684FFE18EBA3E06CED3BA53D
3,509,121 UART: [art] SIG.S = 8AF923C94DE7C1C8C23803AE025FCC66BE5EF791873B53B75C1C747D390D17ABD41F6D3B49C104F1521489BD3C5B8EF7
3,532,465 UART: Caliptra RT
3,532,716 UART: [state] CFI Enabled
3,653,215 UART: [rt] RT listening for mailbox commands...
3,653,885 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,159 UART: [rt]cmd =0x44504543, len=96
3,866,699 >>> mbox cmd response data (6236 bytes)
3,866,700 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,896,577 UART: [rt]cmd =0x53574545, len=84
3,921,792 >>> mbox cmd response data (200 bytes)
3,921,793 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,951,110 UART: [rt]cmd =0x4453424c, len=4
3,968,276 >>> mbox cmd response data (8 bytes)
3,968,277 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,158 UART: [rt]cmd =0x53574545, len=84
4,024,565 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,257 ready_for_fw is high
1,362,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,312 >>> mbox cmd response: success
3,041,923 UART:
3,041,939 UART: Running Caliptra FMC ...
3,042,347 UART:
3,042,401 UART: [state] CFI Enabled
3,052,739 UART: [fht] FMC Alias Private Key: 7
3,172,271 UART: [art] Extend RT PCRs Done
3,172,699 UART: [art] Lock RT PCRs Done
3,174,049 UART: [art] Populate DV Done
3,182,066 UART: [fht] FMC Alias Private Key: 7
3,183,140 UART: [art] Derive CDI
3,183,420 UART: [art] Store in slot 0x4
3,269,340 UART: [art] Derive Key Pair
3,269,700 UART: [art] Store priv key in slot 0x5
3,283,561 UART: [art] Derive Key Pair - Done
3,298,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,466 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,231 UART: [art] PUB.X = FFE400D004943C05DB94C1DCD7D0FAFC5F9C83DBB1E727B2B0CEB48BBAB27E3FE0FEDFB6D05D1DA019A768D83177B914
3,321,003 UART: [art] PUB.Y = 810AF2883CF34CAD4F7092831D2FE68155184A202FCE60A32AF5E2B3A3C0F3AE1D88911F80CA2CB1EC52468B54EC82C3
3,327,962 UART: [art] SIG.R = 27714E2FB6442D259A6DD5C45606F77E451486F5CAB098003F5A07CC5C0BBF396CC14584C697458F217926BFF9B6EA15
3,334,703 UART: [art] SIG.S = C4CDBDB5904B723BAE4D27E3B57B24CFD22551D1D9AC1B9B0DBC8AE87397D458C63DD55030333F7FC94362340A7424B2
3,358,729 UART: Caliptra RT
3,358,980 UART: [state] CFI Enabled
3,477,932 UART: [rt] RT listening for mailbox commands...
3,478,602 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,006 UART: [rt]cmd =0x44504543, len=96
3,691,191 >>> mbox cmd response data (6236 bytes)
3,691,192 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,979 UART: [rt]cmd =0x53574545, len=84
3,747,232 >>> mbox cmd response data (200 bytes)
3,747,233 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,778 UART: [rt]cmd =0x4453424c, len=4
3,794,364 >>> mbox cmd response data (8 bytes)
3,794,365 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,958 UART: [rt]cmd =0x53574545, len=84
3,849,771 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,651 UART: [state] LifecycleState = Unprovisioned
86,306 UART: [state] DebugLocked = No
86,950 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,824 UART: [kat] SHA2-256
892,762 UART: [kat] SHA2-384
895,527 UART: [kat] SHA2-512-ACC
897,428 UART: [kat] ECC-384
903,283 UART: [kat] HMAC-384Kdf
907,925 UART: [kat] LMS
1,476,121 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,606 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 ready_for_fw is high
1,481,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,621 UART: [idev] Erasing UDS.KEYID = 0
1,506,333 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,137 UART: [idev] --
1,516,116 UART: [ldev] ++
1,516,284 UART: [ldev] CDI.KEYID = 6
1,516,647 UART: [ldev] SUBJECT.KEYID = 5
1,517,073 UART: [ldev] AUTHORITY.KEYID = 7
1,517,536 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,548,071 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,151 UART: [ldev] --
1,587,586 UART: [fwproc] Waiting for Commands...
1,588,279 UART: [fwproc] Received command 0x46574c44
1,589,070 UART: [fwproc] Received Image of size 118548 bytes
2,932,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,695 >>> mbox cmd response: success
3,132,863 UART: [afmc] ++
3,133,031 UART: [afmc] CDI.KEYID = 6
3,133,393 UART: [afmc] SUBJECT.KEYID = 7
3,133,818 UART: [afmc] AUTHORITY.KEYID = 5
3,168,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,181 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,670 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,553 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,236 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,148 UART: [afmc] --
3,212,266 UART: [cold-reset] --
3,213,192 UART: [state] Locking Datavault
3,214,273 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,877 UART: [state] Locking ICCM
3,215,379 UART: [exit] Launching FMC @ 0x40000130
3,220,709 UART:
3,220,725 UART: Running Caliptra FMC ...
3,221,133 UART:
3,221,276 UART: [state] CFI Enabled
3,232,102 UART: [fht] FMC Alias Private Key: 7
3,351,172 UART: [art] Extend RT PCRs Done
3,351,600 UART: [art] Lock RT PCRs Done
3,353,152 UART: [art] Populate DV Done
3,361,243 UART: [fht] FMC Alias Private Key: 7
3,362,425 UART: [art] Derive CDI
3,362,705 UART: [art] Store in slot 0x4
3,448,137 UART: [art] Derive Key Pair
3,448,497 UART: [art] Store priv key in slot 0x5
3,461,914 UART: [art] Derive Key Pair - Done
3,476,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,102 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,867 UART: [art] PUB.X = B0463F249AF6083B0E3CFBFFFB0D6AD70B3B3BC7B52BB42FF297212C8C353C4ADFCC1F07C488F8E4A2CD17C1968E2BB7
3,499,648 UART: [art] PUB.Y = AF739D2A63717D65C210BB6753CAE5C8FDEBCF67B3CB78A13ACA9A4C9FDF163899F6C1F935DE0DC56A017D61C1FFD475
3,506,616 UART: [art] SIG.R = 0A649267F54DCA4B2D7EC47ED42AFE53087C5CBF35F93951FF99F5A76A39AFB5BCAAB5DB96E952A2D2E1F22FAF9A3BF6
3,513,408 UART: [art] SIG.S = 07706E8046D0FC68C3FABB89C8784EB077ACC20C6A41C2A5AE51A5CA6705949B33F0EF23E6E650AEDAAA9A53398509B7
3,536,798 UART: Caliptra RT
3,537,141 UART: [state] CFI Enabled
3,658,102 UART: [rt] RT listening for mailbox commands...
3,658,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,906 UART: [rt]cmd =0x44504543, len=96
3,871,056 >>> mbox cmd response data (6236 bytes)
3,871,057 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,076 UART: [rt]cmd =0x53574545, len=84
3,927,301 >>> mbox cmd response data (200 bytes)
3,927,302 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,956,609 UART: [rt]cmd =0x4453424c, len=4
3,973,917 >>> mbox cmd response data (8 bytes)
3,973,918 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,003,805 UART: [rt]cmd =0x53574545, len=84
4,029,660 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,206 ready_for_fw is high
1,363,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,339 >>> mbox cmd response: success
3,045,606 UART:
3,045,622 UART: Running Caliptra FMC ...
3,046,030 UART:
3,046,173 UART: [state] CFI Enabled
3,056,963 UART: [fht] FMC Alias Private Key: 7
3,175,873 UART: [art] Extend RT PCRs Done
3,176,301 UART: [art] Lock RT PCRs Done
3,177,979 UART: [art] Populate DV Done
3,186,118 UART: [fht] FMC Alias Private Key: 7
3,187,184 UART: [art] Derive CDI
3,187,464 UART: [art] Store in slot 0x4
3,273,122 UART: [art] Derive Key Pair
3,273,482 UART: [art] Store priv key in slot 0x5
3,286,657 UART: [art] Derive Key Pair - Done
3,301,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,278 UART: [art] PUB.X = F7DF5935A3AD842BCEBAAD0FB3FB71905E262BA3B5D05E6AB91BAFE5DEFA43A184826F6D79A96AB2EC08CDEE6EAF5778
3,324,076 UART: [art] PUB.Y = 635FFB2F1DC74AFEBFB9E3AF6B1AF005A444C2B56C69F580DE417BD21E0AC1EF04B128D48C653FE69A0FB50EA3414F67
3,331,035 UART: [art] SIG.R = 01058FADA7A41967D69E39A57978C63C58680931AB218CA0B07BF69124151520D87A767D8BED491039C969E31B0FD02C
3,337,789 UART: [art] SIG.S = CB8444A13488E896236D84A73175134B2A18BC5BA4BAD5E0E3F976E6E8417A65848197065710552AA2F1701762CDC0C4
3,361,390 UART: Caliptra RT
3,361,733 UART: [state] CFI Enabled
3,482,559 UART: [rt] RT listening for mailbox commands...
3,483,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,521 UART: [rt]cmd =0x44504543, len=96
3,695,518 >>> mbox cmd response data (6236 bytes)
3,695,519 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,454 UART: [rt]cmd =0x53574545, len=84
3,750,909 >>> mbox cmd response data (200 bytes)
3,750,910 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,780,303 UART: [rt]cmd =0x4453424c, len=4
3,797,447 >>> mbox cmd response data (8 bytes)
3,797,448 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,827,251 UART: [rt]cmd =0x53574545, len=84
3,853,288 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,491 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
891,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,262 UART: [kat] ++
895,414 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,329 UART: [kat] SHA2-512-ACC
906,230 UART: [kat] ECC-384
915,685 UART: [kat] HMAC-384Kdf
920,273 UART: [kat] LMS
1,168,585 UART: [kat] --
1,169,518 UART: [cold-reset] ++
1,169,978 UART: [fht] FHT @ 0x50003400
1,172,642 UART: [idev] ++
1,172,810 UART: [idev] CDI.KEYID = 6
1,173,171 UART: [idev] SUBJECT.KEYID = 7
1,173,596 UART: [idev] UDS.KEYID = 0
1,173,942 ready_for_fw is high
1,173,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,563 UART: [idev] Erasing UDS.KEYID = 0
1,197,933 UART: [idev] Sha1 KeyId Algorithm
1,206,899 UART: [idev] --
1,208,066 UART: [ldev] ++
1,208,234 UART: [ldev] CDI.KEYID = 6
1,208,598 UART: [ldev] SUBJECT.KEYID = 5
1,209,025 UART: [ldev] AUTHORITY.KEYID = 7
1,209,488 UART: [ldev] FE.KEYID = 1
1,214,688 UART: [ldev] Erasing FE.KEYID = 1
1,240,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,255 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,971 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,648 UART: [ldev] --
1,279,889 UART: [fwproc] Wait for Commands...
1,280,546 UART: [fwproc] Recv command 0x46574c44
1,281,279 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,689 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,864 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,165 >>> mbox cmd response: success
2,824,353 UART: [afmc] ++
2,824,521 UART: [afmc] CDI.KEYID = 6
2,824,884 UART: [afmc] SUBJECT.KEYID = 7
2,825,310 UART: [afmc] AUTHORITY.KEYID = 5
2,860,521 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,763 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,473 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,354 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,055 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,698 UART: [afmc] --
2,903,751 UART: [cold-reset] --
2,904,517 UART: [state] Locking Datavault
2,905,694 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,298 UART: [state] Locking ICCM
2,906,736 UART: [exit] Launching FMC @ 0x40000130
2,912,066 UART:
2,912,082 UART: Running Caliptra FMC ...
2,912,490 UART:
2,912,544 UART: [state] CFI Enabled
2,923,158 UART: [fht] FMC Alias Private Key: 7
3,042,174 UART: [art] Extend RT PCRs Done
3,042,602 UART: [art] Lock RT PCRs Done
3,044,022 UART: [art] Populate DV Done
3,052,403 UART: [fht] FMC Alias Private Key: 7
3,053,469 UART: [art] Derive CDI
3,053,749 UART: [art] Store in slot 0x4
3,139,724 UART: [art] Derive Key Pair
3,140,084 UART: [art] Store priv key in slot 0x5
3,153,672 UART: [art] Derive Key Pair - Done
3,168,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,485 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,250 UART: [art] PUB.X = E52C69F97A6D1AED80A7F4E73ACC220031D0EA5B226C83DA252CC743867856FC9D698D5A49DB38A6671CC81477EB8D7B
3,191,010 UART: [art] PUB.Y = D7FB2E4A2B7A79967AD8F037B1A7A59802F749353817EBB5B3AD28E1143D9C33312AD3CE74D43087EC4D725375BF3948
3,197,961 UART: [art] SIG.R = 73C20EFE5725420FE12A5592FEE9731E3B0C6BD533D24B21FDE3AEC5142AC4DA73CF57EE9EA3B518294E04363A038BA0
3,204,730 UART: [art] SIG.S = E9B03FF92D576F3DABF6C9431763A29358FFEB2978C6D0B2E8154EA46D44AF705F06D878F5992B2D19A87FC5AC7EBC8A
3,228,985 UART: Caliptra RT
3,229,236 UART: [state] CFI Enabled
3,348,347 UART: [rt] RT listening for mailbox commands...
3,349,017 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,393 UART: [rt]cmd =0x44504543, len=96
3,561,998 >>> mbox cmd response data (6236 bytes)
3,561,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,591,888 UART: [rt]cmd =0x53574545, len=84
3,617,070 >>> mbox cmd response data (200 bytes)
3,617,071 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,646,558 UART: [rt]cmd =0x4453424c, len=4
3,663,670 >>> mbox cmd response data (8 bytes)
3,663,671 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,734 UART: [rt]cmd =0x53574545, len=84
3,719,706 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,720 ready_for_fw is high
1,058,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,414 >>> mbox cmd response: success
2,739,407 UART:
2,739,423 UART: Running Caliptra FMC ...
2,739,831 UART:
2,739,885 UART: [state] CFI Enabled
2,750,297 UART: [fht] FMC Alias Private Key: 7
2,869,027 UART: [art] Extend RT PCRs Done
2,869,455 UART: [art] Lock RT PCRs Done
2,870,631 UART: [art] Populate DV Done
2,878,688 UART: [fht] FMC Alias Private Key: 7
2,879,686 UART: [art] Derive CDI
2,879,966 UART: [art] Store in slot 0x4
2,965,709 UART: [art] Derive Key Pair
2,966,069 UART: [art] Store priv key in slot 0x5
2,978,973 UART: [art] Derive Key Pair - Done
2,993,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,634 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,399 UART: [art] PUB.X = DA36CA25A5C688D7DDF2C05E71BA7AFACF2B5B98242BA4A0CD85DBE6BEE971890BDF4D9D7FA9C20D2A7085D4EC249564
3,017,191 UART: [art] PUB.Y = 92AD99FC905B13CF3D48D02F71B50617B2883969EACE59B70846539041300AFB96410E02087B0D00C28FF00D9BFD0CDE
3,024,096 UART: [art] SIG.R = 979F459542DC643A2A9DB29DA9408872D141B765B1A9782C4323D92572F701E7390C5F71E460F023B1E96E31D776F81B
3,030,852 UART: [art] SIG.S = 3598876FE59972C9DDC80EDD8D65F6603DFA7460D460E4F995174C1D2C70B59363C8572279D2FFDB87857C1392E38C75
3,054,493 UART: Caliptra RT
3,054,744 UART: [state] CFI Enabled
3,174,505 UART: [rt] RT listening for mailbox commands...
3,175,175 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,567 UART: [rt]cmd =0x44504543, len=96
3,387,455 >>> mbox cmd response data (6236 bytes)
3,387,456 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,255 UART: [rt]cmd =0x53574545, len=84
3,442,191 >>> mbox cmd response data (200 bytes)
3,442,192 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,471,469 UART: [rt]cmd =0x4453424c, len=4
3,488,643 >>> mbox cmd response data (8 bytes)
3,488,644 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,518,463 UART: [rt]cmd =0x53574545, len=84
3,544,023 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,336 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,464 UART: [kat] SHA2-512-ACC
906,365 UART: [kat] ECC-384
915,884 UART: [kat] HMAC-384Kdf
920,524 UART: [kat] LMS
1,168,836 UART: [kat] --
1,169,821 UART: [cold-reset] ++
1,170,401 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,174,319 ready_for_fw is high
1,174,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,524 UART: [idev] Sha1 KeyId Algorithm
1,208,494 UART: [idev] --
1,209,347 UART: [ldev] ++
1,209,515 UART: [ldev] CDI.KEYID = 6
1,209,879 UART: [ldev] SUBJECT.KEYID = 5
1,210,306 UART: [ldev] AUTHORITY.KEYID = 7
1,210,769 UART: [ldev] FE.KEYID = 1
1,216,275 UART: [ldev] Erasing FE.KEYID = 1
1,241,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,102 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,703 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,835 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,281,867 UART: [fwproc] Recv command 0x46574c44
1,282,600 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,831 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,871 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,136 >>> mbox cmd response: success
2,826,242 UART: [afmc] ++
2,826,410 UART: [afmc] CDI.KEYID = 6
2,826,773 UART: [afmc] SUBJECT.KEYID = 7
2,827,199 UART: [afmc] AUTHORITY.KEYID = 5
2,862,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,991 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,740 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,450 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,032 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,861 UART: [afmc] --
2,905,918 UART: [cold-reset] --
2,906,680 UART: [state] Locking Datavault
2,907,965 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,569 UART: [state] Locking ICCM
2,909,205 UART: [exit] Launching FMC @ 0x40000130
2,914,535 UART:
2,914,551 UART: Running Caliptra FMC ...
2,914,959 UART:
2,915,102 UART: [state] CFI Enabled
2,925,912 UART: [fht] FMC Alias Private Key: 7
3,044,698 UART: [art] Extend RT PCRs Done
3,045,126 UART: [art] Lock RT PCRs Done
3,046,568 UART: [art] Populate DV Done
3,054,781 UART: [fht] FMC Alias Private Key: 7
3,055,755 UART: [art] Derive CDI
3,056,035 UART: [art] Store in slot 0x4
3,141,508 UART: [art] Derive Key Pair
3,141,868 UART: [art] Store priv key in slot 0x5
3,155,228 UART: [art] Derive Key Pair - Done
3,169,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,407 UART: [art] PUB.X = CCC11D091490114990C4CCF6B10E2E5A5D665292B0B617AB6B43F805C4BF8FF22B222DE93F9012BA55D9536358BB2572
3,193,172 UART: [art] PUB.Y = A555349F2F8AB6F63CD99F8BB0E3A1BF03DA893143E2648A6827CD04918EA28942E8EFC6F6DA97F2BAF6D32569FC32C4
3,200,130 UART: [art] SIG.R = CD6EA9E536A7ED2D1357AAA42D5EA3D4AB8299A5697DBC98F3AEB50DD07A97D2F24534CCA0BDA1AAD4728DBE47E7C2D3
3,206,927 UART: [art] SIG.S = B3949DFD9D672711C44A3A8C8108A7A46A184EAEC611C03F6D654B8E5079F669DCD68EFBE452353AA15B30285859A12C
3,230,686 UART: Caliptra RT
3,231,029 UART: [state] CFI Enabled
3,351,007 UART: [rt] RT listening for mailbox commands...
3,351,677 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,113 UART: [rt]cmd =0x44504543, len=96
3,564,021 >>> mbox cmd response data (6236 bytes)
3,564,022 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,829 UART: [rt]cmd =0x53574545, len=84
3,619,705 >>> mbox cmd response data (200 bytes)
3,619,706 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,067 UART: [rt]cmd =0x4453424c, len=4
3,666,479 >>> mbox cmd response data (8 bytes)
3,666,480 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,207 UART: [rt]cmd =0x53574545, len=84
3,721,821 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,479 ready_for_fw is high
1,060,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,911 >>> mbox cmd response: success
2,743,012 UART:
2,743,028 UART: Running Caliptra FMC ...
2,743,436 UART:
2,743,579 UART: [state] CFI Enabled
2,754,273 UART: [fht] FMC Alias Private Key: 7
2,872,999 UART: [art] Extend RT PCRs Done
2,873,427 UART: [art] Lock RT PCRs Done
2,874,747 UART: [art] Populate DV Done
2,883,010 UART: [fht] FMC Alias Private Key: 7
2,884,132 UART: [art] Derive CDI
2,884,412 UART: [art] Store in slot 0x4
2,969,981 UART: [art] Derive Key Pair
2,970,341 UART: [art] Store priv key in slot 0x5
2,983,821 UART: [art] Derive Key Pair - Done
2,998,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,204 UART: [art] PUB.X = E2C1CD457D3D08C8DE014D8A671A2ADAA2BA0B4DD2658ED0C326E37415D272074826F4BAF0825D1EB226769E1B9D76B2
3,021,974 UART: [art] PUB.Y = BBCE0814DCCF048705AF6B989E853A1072AD374A285B798061BE775B44EE4900930CCDC0E8C0473BEFCE34A90A103081
3,028,895 UART: [art] SIG.R = 6F5B7CB6C0AF26BA2C1E2801D21488F8BC6EFB09CE55E7E00D9DFA8EF7DAC4DF0CB2AF5D8B2441D52891D10F1C3EBA51
3,035,680 UART: [art] SIG.S = 7848F57829C358A049C4627604AB4C4DAD6F31FD9A44C0FBD1F826D01729A117E99F97647DEB392C68DC396CE32CCC69
3,059,787 UART: Caliptra RT
3,060,130 UART: [state] CFI Enabled
3,179,410 UART: [rt] RT listening for mailbox commands...
3,180,080 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,758 UART: [rt]cmd =0x44504543, len=96
3,394,247 >>> mbox cmd response data (6236 bytes)
3,394,248 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,923 UART: [rt]cmd =0x53574545, len=84
3,449,505 >>> mbox cmd response data (200 bytes)
3,449,506 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,791 UART: [rt]cmd =0x4453424c, len=4
3,496,221 >>> mbox cmd response data (8 bytes)
3,496,222 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,526,209 UART: [rt]cmd =0x53574545, len=84
3,551,381 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
893,668 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,793 UART: [kat] ++
897,945 UART: [kat] sha1
902,189 UART: [kat] SHA2-256
904,129 UART: [kat] SHA2-384
906,744 UART: [kat] SHA2-512-ACC
908,645 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,758 UART: [kat] LMS
1,171,086 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,707 UART: [fht] FHT @ 0x50003400
1,175,370 UART: [idev] ++
1,175,538 UART: [idev] CDI.KEYID = 6
1,175,898 UART: [idev] SUBJECT.KEYID = 7
1,176,322 UART: [idev] UDS.KEYID = 0
1,176,667 ready_for_fw is high
1,176,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,334 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,571 UART: [idev] --
1,210,783 UART: [ldev] ++
1,210,951 UART: [ldev] CDI.KEYID = 6
1,211,314 UART: [ldev] SUBJECT.KEYID = 5
1,211,740 UART: [ldev] AUTHORITY.KEYID = 7
1,212,203 UART: [ldev] FE.KEYID = 1
1,217,153 UART: [ldev] Erasing FE.KEYID = 1
1,243,146 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,786 UART: [fwproc] Wait for Commands...
1,283,504 UART: [fwproc] Recv command 0x46574c44
1,284,232 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,687 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,322 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,492 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,689 >>> mbox cmd response: success
2,828,793 UART: [afmc] ++
2,828,961 UART: [afmc] CDI.KEYID = 6
2,829,323 UART: [afmc] SUBJECT.KEYID = 7
2,829,748 UART: [afmc] AUTHORITY.KEYID = 5
2,864,837 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,394 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,734 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,435 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,105 UART: [afmc] --
2,908,163 UART: [cold-reset] --
2,908,803 UART: [state] Locking Datavault
2,909,920 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,524 UART: [state] Locking ICCM
2,911,188 UART: [exit] Launching FMC @ 0x40000130
2,916,518 UART:
2,916,534 UART: Running Caliptra FMC ...
2,916,942 UART:
2,916,996 UART: [state] CFI Enabled
2,927,326 UART: [fht] FMC Alias Private Key: 7
3,046,262 UART: [art] Extend RT PCRs Done
3,046,690 UART: [art] Lock RT PCRs Done
3,048,124 UART: [art] Populate DV Done
3,056,321 UART: [fht] FMC Alias Private Key: 7
3,057,289 UART: [art] Derive CDI
3,057,569 UART: [art] Store in slot 0x4
3,143,346 UART: [art] Derive Key Pair
3,143,706 UART: [art] Store priv key in slot 0x5
3,156,964 UART: [art] Derive Key Pair - Done
3,171,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,247 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,012 UART: [art] PUB.X = D92CEAC7EC4F00617D17D8EBE8BA1CF4B4E3D1DEA6C7830CC0329E020103CF0BFEFB1E13C1D7B470CFA4F8887CA9759A
3,194,773 UART: [art] PUB.Y = FB00033255CED5ADBCAE77BE156C8B9C637819BAE684DD07FBA548EEB33FA6D510468AA040BF734EEE0F7E0FEC0DA387
3,201,712 UART: [art] SIG.R = BCC57B4379A62E82A1EE8A677C2F4EE31FAEA2A325298FC6EA868E51926338B0EC477AE6B43549E467ED247255EC7DAF
3,208,496 UART: [art] SIG.S = 079ABC41280E99992C9EC4D68C8749C8E376E64139557EF9AE899FB24AB6FDE26A953C007275CB66D2C3335836E2FDC0
3,232,086 UART: Caliptra RT
3,232,337 UART: [state] CFI Enabled
3,350,806 UART: [rt] RT listening for mailbox commands...
3,351,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,768 UART: [rt]cmd =0x44504543, len=96
3,563,083 >>> mbox cmd response data (6236 bytes)
3,563,084 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,841 UART: [rt]cmd =0x53574545, len=84
3,618,971 >>> mbox cmd response data (200 bytes)
3,618,972 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,648,269 UART: [rt]cmd =0x4453424c, len=4
3,665,169 >>> mbox cmd response data (8 bytes)
3,665,170 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,695,051 UART: [rt]cmd =0x53574545, len=84
3,721,159 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,383 ready_for_fw is high
1,060,383 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,960 >>> mbox cmd response: success
2,742,131 UART:
2,742,147 UART: Running Caliptra FMC ...
2,742,555 UART:
2,742,609 UART: [state] CFI Enabled
2,753,153 UART: [fht] FMC Alias Private Key: 7
2,872,077 UART: [art] Extend RT PCRs Done
2,872,505 UART: [art] Lock RT PCRs Done
2,874,061 UART: [art] Populate DV Done
2,882,428 UART: [fht] FMC Alias Private Key: 7
2,883,460 UART: [art] Derive CDI
2,883,740 UART: [art] Store in slot 0x4
2,969,367 UART: [art] Derive Key Pair
2,969,727 UART: [art] Store priv key in slot 0x5
2,983,081 UART: [art] Derive Key Pair - Done
2,997,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,085 UART: [art] PUB.X = 7865A02E3666055C64FDA067F997A7AFC2A1B53577ED274AE565B61624BCA3D4B90E3089B4D909665E89CCB7A5DD1089
3,020,850 UART: [art] PUB.Y = 256FD9EF82C39B4EA8502BBDD6C3864F5C3DF2E24086EFD458EF4E725CCEFF86CB2094579D13664386B2FFB1DBFA38B6
3,027,820 UART: [art] SIG.R = 4FE6691F8A861EE9AA889FC66AA4726B94B403026FADC2056C310E17F30C548AD7475D573126B1CD82FFD00DC87ACDF2
3,034,584 UART: [art] SIG.S = 123C385722855AE170573122FDCC2BA071DB0F33782A68DE49AC2C29844365086786FF5219D6B445CC4508497452F685
3,058,403 UART: Caliptra RT
3,058,654 UART: [state] CFI Enabled
3,178,448 UART: [rt] RT listening for mailbox commands...
3,179,118 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,686 UART: [rt]cmd =0x44504543, len=96
3,391,923 >>> mbox cmd response data (6236 bytes)
3,391,924 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,587 UART: [rt]cmd =0x53574545, len=84
3,446,345 >>> mbox cmd response data (200 bytes)
3,446,346 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,475,845 UART: [rt]cmd =0x4453424c, len=4
3,493,245 >>> mbox cmd response data (8 bytes)
3,493,246 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,941 UART: [rt]cmd =0x53574545, len=84
3,548,505 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,797 UART: [state] LifecycleState = Unprovisioned
86,452 UART: [state] DebugLocked = No
86,978 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,124 UART: [kat] SHA2-256
904,064 UART: [kat] SHA2-384
906,809 UART: [kat] SHA2-512-ACC
908,710 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,319 UART: [kat] LMS
1,171,647 UART: [kat] --
1,172,594 UART: [cold-reset] ++
1,172,954 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 ready_for_fw is high
1,176,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,357 UART: [idev] Erasing UDS.KEYID = 0
1,201,192 UART: [idev] Sha1 KeyId Algorithm
1,209,684 UART: [idev] --
1,210,690 UART: [ldev] ++
1,210,858 UART: [ldev] CDI.KEYID = 6
1,211,221 UART: [ldev] SUBJECT.KEYID = 5
1,211,647 UART: [ldev] AUTHORITY.KEYID = 7
1,212,110 UART: [ldev] FE.KEYID = 1
1,217,472 UART: [ldev] Erasing FE.KEYID = 1
1,243,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,669 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,464 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,461 UART: [fwproc] Recv command 0x46574c44
1,284,189 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,330 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,845 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,015 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,352 >>> mbox cmd response: success
2,829,526 UART: [afmc] ++
2,829,694 UART: [afmc] CDI.KEYID = 6
2,830,056 UART: [afmc] SUBJECT.KEYID = 7
2,830,481 UART: [afmc] AUTHORITY.KEYID = 5
2,866,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,471 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,063 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,764 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,576 UART: [afmc] --
2,909,672 UART: [cold-reset] --
2,910,384 UART: [state] Locking Datavault
2,911,459 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,063 UART: [state] Locking ICCM
2,912,665 UART: [exit] Launching FMC @ 0x40000130
2,917,995 UART:
2,918,011 UART: Running Caliptra FMC ...
2,918,419 UART:
2,918,562 UART: [state] CFI Enabled
2,929,056 UART: [fht] FMC Alias Private Key: 7
3,047,688 UART: [art] Extend RT PCRs Done
3,048,116 UART: [art] Lock RT PCRs Done
3,049,578 UART: [art] Populate DV Done
3,057,815 UART: [fht] FMC Alias Private Key: 7
3,058,899 UART: [art] Derive CDI
3,059,179 UART: [art] Store in slot 0x4
3,144,666 UART: [art] Derive Key Pair
3,145,026 UART: [art] Store priv key in slot 0x5
3,158,968 UART: [art] Derive Key Pair - Done
3,173,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,917 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,682 UART: [art] PUB.X = 76FF3E140B4F27E93E7133D4CE0B8504AF8DDD5BEDF0C5793F14CF3CEBB501D2FA5C475D3D00C7D0B088566CD4C71117
3,196,436 UART: [art] PUB.Y = 948AB380836214023195C80808F2BD17333E40280F5E0407EE94F9BA0E12D98C57A716B8901DFF0F63ACFEF7B7D7B8D7
3,203,364 UART: [art] SIG.R = A72916A0A05466F641CDEA8BF8DA81B35544C1C1E46507D381E53CA7E1606BDED2D9627EADC274BC2E3DB3E15B076A5A
3,210,144 UART: [art] SIG.S = 6F5079EAAA9F0690028F828474B0C5AD15202B9E2FFFB59B29848375A4AD27F0EFADB75456F236E1E2CDF3E1DD54F6AA
3,234,512 UART: Caliptra RT
3,234,855 UART: [state] CFI Enabled
3,354,636 UART: [rt] RT listening for mailbox commands...
3,355,306 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,040 UART: [rt]cmd =0x44504543, len=96
3,567,888 >>> mbox cmd response data (6236 bytes)
3,567,889 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,648 UART: [rt]cmd =0x53574545, len=84
3,623,264 >>> mbox cmd response data (200 bytes)
3,623,265 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,652,536 UART: [rt]cmd =0x4453424c, len=4
3,670,038 >>> mbox cmd response data (8 bytes)
3,670,039 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,666 UART: [rt]cmd =0x53574545, len=84
3,725,042 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,632 ready_for_fw is high
1,060,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,309 >>> mbox cmd response: success
2,744,170 UART:
2,744,186 UART: Running Caliptra FMC ...
2,744,594 UART:
2,744,737 UART: [state] CFI Enabled
2,755,313 UART: [fht] FMC Alias Private Key: 7
2,874,629 UART: [art] Extend RT PCRs Done
2,875,057 UART: [art] Lock RT PCRs Done
2,876,571 UART: [art] Populate DV Done
2,884,698 UART: [fht] FMC Alias Private Key: 7
2,885,842 UART: [art] Derive CDI
2,886,122 UART: [art] Store in slot 0x4
2,971,551 UART: [art] Derive Key Pair
2,971,911 UART: [art] Store priv key in slot 0x5
2,985,553 UART: [art] Derive Key Pair - Done
3,000,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,378 UART: [art] PUB.X = 4AFC0A779162DF441AA93C913CC9CA1210654CC5725138AD1CD0588707A368736D3304F6EC1B2039D523449A71C25234
3,023,133 UART: [art] PUB.Y = E3131B451711EC64B0EF26BDB39A162252262EDF8909F0F62C7E472B58FCCC7DAFDDF3665DA20BF66BBD04C403060DF8
3,030,081 UART: [art] SIG.R = 05A06C3D307910B43B52AB91572AC87B630EFEEDDA2F93B9064C0B022A2BFB55564966C7ED201B3E63A17D17972AF303
3,036,839 UART: [art] SIG.S = ED2C9EABE7C5BAD813D59B30AD53897B61920C19F27711CE4E73FD00706180D5AA6368A150ABC49C36541BA5DB080E78
3,060,980 UART: Caliptra RT
3,061,323 UART: [state] CFI Enabled
3,180,782 UART: [rt] RT listening for mailbox commands...
3,181,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,870 UART: [rt]cmd =0x44504543, len=96
3,393,703 >>> mbox cmd response data (6236 bytes)
3,393,704 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,567 UART: [rt]cmd =0x53574545, len=84
3,449,209 >>> mbox cmd response data (200 bytes)
3,449,210 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,503 UART: [rt]cmd =0x4453424c, len=4
3,496,021 >>> mbox cmd response data (8 bytes)
3,496,022 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,801 UART: [rt]cmd =0x53574545, len=84
3,551,289 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_disabled_attestation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,119 UART:
192,481 UART: Running Caliptra ROM ...
193,637 UART:
193,790 UART: [state] CFI Enabled
267,427 UART: [state] LifecycleState = Unprovisioned
269,381 UART: [state] DebugLocked = No
271,703 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,218 UART: [kat] SHA2-256
446,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,434 UART: [kat] ++
457,885 UART: [kat] sha1
469,608 UART: [kat] SHA2-256
472,332 UART: [kat] SHA2-384
479,320 UART: [kat] SHA2-512-ACC
481,684 UART: [kat] ECC-384
2,767,628 UART: [kat] HMAC-384Kdf
2,780,628 UART: [kat] LMS
3,970,914 UART: [kat] --
3,975,518 UART: [cold-reset] ++
3,978,166 UART: [fht] Storing FHT @ 0x50003400
3,990,279 UART: [idev] ++
3,990,842 UART: [idev] CDI.KEYID = 6
3,991,871 UART: [idev] SUBJECT.KEYID = 7
3,993,044 UART: [idev] UDS.KEYID = 0
3,994,117 ready_for_fw is high
3,994,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,493 UART: [idev] Erasing UDS.KEYID = 0
7,327,149 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,607 UART: [idev] --
7,353,214 UART: [ldev] ++
7,353,795 UART: [ldev] CDI.KEYID = 6
7,354,736 UART: [ldev] SUBJECT.KEYID = 5
7,355,953 UART: [ldev] AUTHORITY.KEYID = 7
7,357,189 UART: [ldev] FE.KEYID = 1
7,404,716 UART: [ldev] Erasing FE.KEYID = 1
10,740,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,120 UART: [ldev] --
13,118,743 UART: [fwproc] Waiting for Commands...
13,121,380 UART: [fwproc] Received command 0x46574c44
13,123,565 UART: [fwproc] Received Image of size 118548 bytes
17,219,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,711 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,868 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,698,183 >>> mbox cmd response: success
17,701,861 UART: [afmc] ++
17,702,475 UART: [afmc] CDI.KEYID = 6
17,703,383 UART: [afmc] SUBJECT.KEYID = 7
17,704,657 UART: [afmc] AUTHORITY.KEYID = 5
21,073,315 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,502 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,765 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,949 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,357 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,441,155 UART: [afmc] --
23,445,240 UART: [cold-reset] --
23,448,350 UART: [state] Locking Datavault
23,453,703 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,456 UART: [state] Locking ICCM
23,456,751 UART: [exit] Launching FMC @ 0x40000130
23,465,150 UART:
23,465,395 UART: Running Caliptra FMC ...
23,466,516 UART:
23,466,673 UART: [state] CFI Enabled
23,533,992 UART: [fht] FMC Alias Private Key: 7
25,874,041 UART: [art] Extend RT PCRs Done
25,875,269 UART: [art] Lock RT PCRs Done
25,876,569 UART: [art] Populate DV Done
25,882,036 UART: [fht] FMC Alias Private Key: 7
25,883,722 UART: [art] Derive CDI
25,884,495 UART: [art] Store in slot 0x4
25,942,079 UART: [art] Derive Key Pair
25,943,086 UART: [art] Store priv key in slot 0x5
29,235,722 UART: [art] Derive Key Pair - Done
29,248,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,428 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,946 UART: [art] PUB.X = E1FB0A30CC3F15FFBD35A4208E2776ECFA41F5C15570A09893365B41F9D60E0F42ACEDBBEB7859374A4E3AAB1C0359F2
31,546,244 UART: [art] PUB.Y = EFAF5718FB17FA8DF757C5297DA90E93C21E676E38E5CE2E508D0D7DF36A7A009A9969BF3EC1178EB571A7E43C2C31C2
31,553,486 UART: [art] SIG.R = EAEAF0B7722D23978229CF76A7893EB814E28B3BEC2AB1DB6C37A9EA558E2664855C5EB075D05866713EC868CE218E19
31,560,878 UART: [art] SIG.S = 6835B9C86E2EE89812A82D47963723FFB91764836AD6AA62AC8B6D7BC6541584AC95C2CC0B5A74010497B0E2EC1848DF
32,865,458 UART: Caliptra RT
32,866,175 UART: [state] CFI Enabled
33,042,671 UART: [rt] RT listening for mailbox commands...
33,044,615 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,075,106 UART: [rt]cmd =0x44504543, len=96
38,856,561 >>> mbox cmd response data (6236 bytes)
38,886,030 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,916,435 UART: [rt]cmd =0x53574545, len=84
44,490,945 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,898 writing to cptra_bootfsm_go
3,804,891 ready_for_fw is high
3,805,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,985,874 >>> mbox cmd response: success
23,675,877 UART:
23,676,259 UART: Running Caliptra FMC ...
23,677,416 UART:
23,677,578 UART: [state] CFI Enabled
23,747,265 UART: [fht] FMC Alias Private Key: 7
26,087,083 UART: [art] Extend RT PCRs Done
26,088,325 UART: [art] Lock RT PCRs Done
26,089,872 UART: [art] Populate DV Done
26,095,189 UART: [fht] FMC Alias Private Key: 7
26,096,735 UART: [art] Derive CDI
26,097,473 UART: [art] Store in slot 0x4
26,155,731 UART: [art] Derive Key Pair
26,156,785 UART: [art] Store priv key in slot 0x5
29,449,300 UART: [art] Derive Key Pair - Done
29,462,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,879 UART: [art] PUB.X = D9FED0C58C4F9DA91648F1AF556535CFA818A34E59F39428CA1FB31359487687553603EF8F98DDE0C43BAE1AF510FC83
31,759,969 UART: [art] PUB.Y = DE34714B97A7CFD919B07C1EE448CAF458F82722EC13436FC8C375E88B9AF55D2F5D914D1B80D524A3F18278D4995AED
31,767,209 UART: [art] SIG.R = 1DFCBF6279E3D47D02030DDCC679E0782A194E9247CEE779E1844CB2C8F2C2E78638D83F03B2EB3E9304A639979E5BC5
31,774,605 UART: [art] SIG.S = B1172567B8547E9A81BF072221EC12085ED0F65D7963C2ECB1263D298D823264C5D423B19CDE398C808A487CE5E0E359
33,079,908 UART: Caliptra RT
33,080,625 UART: [state] CFI Enabled
33,267,143 UART: [rt] RT listening for mailbox commands...
33,269,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,299,858 UART: [rt]cmd =0x44504543, len=96
39,080,857 >>> mbox cmd response data (6236 bytes)
39,110,646 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,141,221 UART: [rt]cmd =0x53574545, len=84
44,713,739 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
192,298 UART:
192,677 UART: Running Caliptra ROM ...
193,791 UART:
603,654 UART: [state] CFI Enabled
618,752 UART: [state] LifecycleState = Unprovisioned
620,695 UART: [state] DebugLocked = No
622,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,988 UART: [kat] SHA2-256
797,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,289 UART: [kat] ++
808,765 UART: [kat] sha1
819,279 UART: [kat] SHA2-256
822,004 UART: [kat] SHA2-384
826,579 UART: [kat] SHA2-512-ACC
828,951 UART: [kat] ECC-384
3,114,011 UART: [kat] HMAC-384Kdf
3,125,409 UART: [kat] LMS
4,315,514 UART: [kat] --
4,319,532 UART: [cold-reset] ++
4,321,746 UART: [fht] Storing FHT @ 0x50003400
4,333,390 UART: [idev] ++
4,334,002 UART: [idev] CDI.KEYID = 6
4,334,919 UART: [idev] SUBJECT.KEYID = 7
4,336,162 UART: [idev] UDS.KEYID = 0
4,337,148 ready_for_fw is high
4,337,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,205 UART: [idev] Erasing UDS.KEYID = 0
7,624,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,273 UART: [idev] --
7,650,504 UART: [ldev] ++
7,651,070 UART: [ldev] CDI.KEYID = 6
7,652,033 UART: [ldev] SUBJECT.KEYID = 5
7,653,240 UART: [ldev] AUTHORITY.KEYID = 7
7,654,486 UART: [ldev] FE.KEYID = 1
7,665,344 UART: [ldev] Erasing FE.KEYID = 1
10,954,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,220 UART: [ldev] --
13,313,642 UART: [fwproc] Waiting for Commands...
13,316,003 UART: [fwproc] Received command 0x46574c44
13,318,186 UART: [fwproc] Received Image of size 118548 bytes
17,431,368 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,571 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,722 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,906,866 >>> mbox cmd response: success
17,911,287 UART: [afmc] ++
17,911,920 UART: [afmc] CDI.KEYID = 6
17,912,834 UART: [afmc] SUBJECT.KEYID = 7
17,914,050 UART: [afmc] AUTHORITY.KEYID = 5
21,227,339 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,293 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,556 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,980 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,716 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,114 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,110 UART: [afmc] --
23,594,833 UART: [cold-reset] --
23,599,064 UART: [state] Locking Datavault
23,603,177 UART: [state] Locking PCR0, PCR1 and PCR31
23,604,878 UART: [state] Locking ICCM
23,606,230 UART: [exit] Launching FMC @ 0x40000130
23,614,444 UART:
23,614,699 UART: Running Caliptra FMC ...
23,615,799 UART:
23,615,950 UART: [state] CFI Enabled
23,623,881 UART: [fht] FMC Alias Private Key: 7
25,963,564 UART: [art] Extend RT PCRs Done
25,964,787 UART: [art] Lock RT PCRs Done
25,966,840 UART: [art] Populate DV Done
25,972,086 UART: [fht] FMC Alias Private Key: 7
25,973,682 UART: [art] Derive CDI
25,974,495 UART: [art] Store in slot 0x4
26,016,765 UART: [art] Derive Key Pair
26,017,805 UART: [art] Store priv key in slot 0x5
29,260,227 UART: [art] Derive Key Pair - Done
29,273,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,422 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,935 UART: [art] PUB.X = 9F91D2C77595E1154FBFC002242D036CBA514B50B4411277A377456C1DF0006DFF6418CF5174A2A09B62DF40DA985C7F
31,562,197 UART: [art] PUB.Y = F8A032355D762A295C59D8DAD8F36C3BA24E54007A4065BB47698F1A8A4718E501D205938A479CB73BADFA17E2677F48
31,569,418 UART: [art] SIG.R = 1A3E84B45FE868C1870FD53880214CA61EEF02E2A36A93C5324C50E1764EC76349675D6FE0C5BA14FC51203407B9E94F
31,576,808 UART: [art] SIG.S = 5E6CD6C0A930F15445F9EE83B6D8E981713DABC35B9C732BD3C60CA85B7C1C2A49A5B55FFC048EFBA4BF8E583B4E5F89
32,882,227 UART: Caliptra RT
32,882,931 UART: [state] CFI Enabled
33,016,428 UART: [rt] RT listening for mailbox commands...
33,018,340 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,048,807 UART: [rt]cmd =0x44504543, len=96
38,731,953 >>> mbox cmd response data (6236 bytes)
38,762,485 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,793,096 UART: [rt]cmd =0x53574545, len=84
44,318,185 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
4,131,653 ready_for_fw is high
4,132,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,166,934 >>> mbox cmd response: success
23,805,560 UART:
23,805,946 UART: Running Caliptra FMC ...
23,807,307 UART:
23,807,482 UART: [state] CFI Enabled
23,815,174 UART: [fht] FMC Alias Private Key: 7
26,154,854 UART: [art] Extend RT PCRs Done
26,156,081 UART: [art] Lock RT PCRs Done
26,157,490 UART: [art] Populate DV Done
26,162,741 UART: [fht] FMC Alias Private Key: 7
26,164,225 UART: [art] Derive CDI
26,164,983 UART: [art] Store in slot 0x4
26,208,115 UART: [art] Derive Key Pair
26,209,152 UART: [art] Store priv key in slot 0x5
29,450,657 UART: [art] Derive Key Pair - Done
29,464,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,744,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,667 UART: [art] PUB.X = 3B8DDD7E634B61F3C71BE9BAE645453288665E7261F6736F87426FD959BB90A109AAB862E27D9F40015D5EF4ABC38591
31,752,922 UART: [art] PUB.Y = 5215278B4FD2C0ADEBA68D44EFE2C843951B3C6568E45250651A77EFDDFE25FC277A13E6C07ACA73D5D342709782D93D
31,760,183 UART: [art] SIG.R = 258FBC8BCABB79FE5297985F7C261B8BBCABFF837C8A5B08FEB4DDE524A0B8DF7756D013A68FC563EFF67BAC976A04F3
31,767,645 UART: [art] SIG.S = D4B4514434AF2597E39471D2262646C5E9C4474C14AEC62E807563A259B86547EC4BD46E64234488A203265ED823C377
33,073,012 UART: Caliptra RT
33,073,737 UART: [state] CFI Enabled
33,207,516 UART: [rt] RT listening for mailbox commands...
33,209,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,239,982 UART: [rt]cmd =0x44504543, len=96
38,923,166 >>> mbox cmd response data (6236 bytes)
38,952,868 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,983,438 UART: [rt]cmd =0x53574545, len=84
44,508,278 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,001 UART:
192,362 UART: Running Caliptra ROM ...
193,548 UART:
193,701 UART: [state] CFI Enabled
262,142 UART: [state] LifecycleState = Unprovisioned
264,116 UART: [state] DebugLocked = No
266,640 UART: [state] WD Timer not started. Device not locked for debugging
271,239 UART: [kat] SHA2-256
450,860 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,672 UART: [kat] ++
462,201 UART: [kat] sha1
473,007 UART: [kat] SHA2-256
475,728 UART: [kat] SHA2-384
481,285 UART: [kat] SHA2-512-ACC
483,650 UART: [kat] ECC-384
2,948,406 UART: [kat] HMAC-384Kdf
2,970,447 UART: [kat] LMS
3,446,922 UART: [kat] --
3,451,343 UART: [cold-reset] ++
3,453,763 UART: [fht] FHT @ 0x50003400
3,464,731 UART: [idev] ++
3,465,293 UART: [idev] CDI.KEYID = 6
3,466,246 UART: [idev] SUBJECT.KEYID = 7
3,467,481 UART: [idev] UDS.KEYID = 0
3,468,522 ready_for_fw is high
3,468,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,769 UART: [idev] Erasing UDS.KEYID = 0
5,987,229 UART: [idev] Sha1 KeyId Algorithm
6,010,836 UART: [idev] --
6,016,559 UART: [ldev] ++
6,017,132 UART: [ldev] CDI.KEYID = 6
6,018,039 UART: [ldev] SUBJECT.KEYID = 5
6,019,251 UART: [ldev] AUTHORITY.KEYID = 7
6,020,484 UART: [ldev] FE.KEYID = 1
6,057,988 UART: [ldev] Erasing FE.KEYID = 1
8,565,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,113 UART: [ldev] --
10,374,086 UART: [fwproc] Wait for Commands...
10,376,452 UART: [fwproc] Recv command 0x46574c44
10,378,435 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,525 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,342,178 >>> mbox cmd response: success
14,345,721 UART: [afmc] ++
14,346,336 UART: [afmc] CDI.KEYID = 6
14,347,260 UART: [afmc] SUBJECT.KEYID = 7
14,348,470 UART: [afmc] AUTHORITY.KEYID = 5
16,888,820 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,097 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,277 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,114 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,154 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,694 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,628 UART: [afmc] --
18,689,720 UART: [cold-reset] --
18,694,660 UART: [state] Locking Datavault
18,700,549 UART: [state] Locking PCR0, PCR1 and PCR31
18,702,293 UART: [state] Locking ICCM
18,704,725 UART: [exit] Launching FMC @ 0x40000130
18,713,178 UART:
18,713,412 UART: Running Caliptra FMC ...
18,714,508 UART:
18,714,668 UART: [state] CFI Enabled
18,769,566 UART: [fht] FMC Alias Private Key: 7
20,556,683 UART: [art] Extend RT PCRs Done
20,557,965 UART: [art] Lock RT PCRs Done
20,559,564 UART: [art] Populate DV Done
20,565,086 UART: [fht] FMC Alias Private Key: 7
20,566,785 UART: [art] Derive CDI
20,567,595 UART: [art] Store in slot 0x4
20,623,167 UART: [art] Derive Key Pair
20,624,208 UART: [art] Store priv key in slot 0x5
23,086,723 UART: [art] Derive Key Pair - Done
23,099,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,812,690 UART: [art] Erasing AUTHORITY.KEYID = 7
24,814,199 UART: [art] PUB.X = 5703B71DF1AAD7DA3C966CA25B951DE4479FCCCC034C81746C72FFC5F5D73C4D8D2E3883981EF712981CB3943AD1E70B
24,821,451 UART: [art] PUB.Y = 51B59E6279AA8F98E26D1778A1A23C328E4BFDD1AC27FD8D6EB3C9962A8A082A47B1F122898B6EC69D8543F1ACA682C8
24,828,742 UART: [art] SIG.R = 47878A717C18CB3FD18CBB4BB69297D3B2CCAA45037D4C420A85B47CFE3D376C46A66EE1A475A12438C37BCFF46D18CD
24,836,186 UART: [art] SIG.S = 94B59DC92ABEE58BE613A232A7DC94749D66288A253FDA759F55E6A242C1AC837A060AE196BF3C22369AF7C2F3BEA586
25,815,108 UART: Caliptra RT
25,815,819 UART: [state] CFI Enabled
25,996,701 UART: [rt] RT listening for mailbox commands...
25,998,631 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,029,169 UART: [rt]cmd =0x44504543, len=96
30,403,439 >>> mbox cmd response data (6236 bytes)
30,433,145 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,463,611 UART: [rt]cmd =0x53574545, len=84
34,631,137 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,987 writing to cptra_bootfsm_go
3,461,777 ready_for_fw is high
3,462,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,598 >>> mbox cmd response: success
18,535,425 UART:
18,535,834 UART: Running Caliptra FMC ...
18,536,987 UART:
18,537,151 UART: [state] CFI Enabled
18,603,790 UART: [fht] FMC Alias Private Key: 7
20,370,044 UART: [art] Extend RT PCRs Done
20,371,270 UART: [art] Lock RT PCRs Done
20,372,789 UART: [art] Populate DV Done
20,378,201 UART: [fht] FMC Alias Private Key: 7
20,379,903 UART: [art] Derive CDI
20,380,718 UART: [art] Store in slot 0x4
20,436,522 UART: [art] Derive Key Pair
20,437,562 UART: [art] Store priv key in slot 0x5
22,900,595 UART: [art] Derive Key Pair - Done
22,913,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,307 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,810 UART: [art] PUB.X = C50C39FD5DC5CE7E8CFD9985138CB90D00E12FA2FB708748788C6FF3B5302540916EE8310754E4D05CA62D536EE230A1
24,635,065 UART: [art] PUB.Y = DFDE17A4FDF2CCB28475C8F70AE5C6DB1524A16570BB83F85AA76712E9501AF1C9A60608CFDB3243DFFF518E0E1B09DD
24,642,321 UART: [art] SIG.R = E2911F933AE262D5BC2A21A255B39DFEB526A6FF748BF91B89BAA36B3915002C8EC1B65138FE98D2309801C870779D8A
24,649,681 UART: [art] SIG.S = 8AB292F4A8BF562A818B72D008CC70EC04DC577251CCFC1264AFF0D17D0895A69C7BC3D264CF48534CF6DAFA0463767B
25,628,722 UART: Caliptra RT
25,629,427 UART: [state] CFI Enabled
25,809,053 UART: [rt] RT listening for mailbox commands...
25,810,960 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,841,421 UART: [rt]cmd =0x44504543, len=96
30,217,669 >>> mbox cmd response data (6236 bytes)
30,247,340 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,277,911 UART: [rt]cmd =0x53574545, len=84
34,444,208 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,370 UART:
192,741 UART: Running Caliptra ROM ...
193,925 UART:
603,772 UART: [state] CFI Enabled
619,018 UART: [state] LifecycleState = Unprovisioned
620,970 UART: [state] DebugLocked = No
623,347 UART: [state] WD Timer not started. Device not locked for debugging
628,079 UART: [kat] SHA2-256
807,731 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,538 UART: [kat] ++
818,988 UART: [kat] sha1
828,938 UART: [kat] SHA2-256
831,592 UART: [kat] SHA2-384
838,859 UART: [kat] SHA2-512-ACC
841,164 UART: [kat] ECC-384
3,283,736 UART: [kat] HMAC-384Kdf
3,294,371 UART: [kat] LMS
3,770,895 UART: [kat] --
3,775,241 UART: [cold-reset] ++
3,776,817 UART: [fht] FHT @ 0x50003400
3,788,082 UART: [idev] ++
3,788,650 UART: [idev] CDI.KEYID = 6
3,789,609 UART: [idev] SUBJECT.KEYID = 7
3,790,850 UART: [idev] UDS.KEYID = 0
3,791,748 ready_for_fw is high
3,791,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,877 UART: [idev] Erasing UDS.KEYID = 0
6,262,940 UART: [idev] Sha1 KeyId Algorithm
6,286,290 UART: [idev] --
6,291,744 UART: [ldev] ++
6,292,321 UART: [ldev] CDI.KEYID = 6
6,293,258 UART: [ldev] SUBJECT.KEYID = 5
6,294,488 UART: [ldev] AUTHORITY.KEYID = 7
6,295,727 UART: [ldev] FE.KEYID = 1
6,307,049 UART: [ldev] Erasing FE.KEYID = 1
8,783,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,958 UART: [ldev] --
10,576,692 UART: [fwproc] Wait for Commands...
10,579,920 UART: [fwproc] Recv command 0x46574c44
10,581,904 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,141,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,214,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,028 >>> mbox cmd response: success
14,547,301 UART: [afmc] ++
14,547,897 UART: [afmc] CDI.KEYID = 6
14,548,921 UART: [afmc] SUBJECT.KEYID = 7
14,550,086 UART: [afmc] AUTHORITY.KEYID = 5
17,057,423 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,777,727 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,779,906 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,795,732 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,811,802 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,827,400 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,218 UART: [afmc] --
18,854,761 UART: [cold-reset] --
18,857,539 UART: [state] Locking Datavault
18,862,031 UART: [state] Locking PCR0, PCR1 and PCR31
18,863,785 UART: [state] Locking ICCM
18,866,567 UART: [exit] Launching FMC @ 0x40000130
18,874,982 UART:
18,875,231 UART: Running Caliptra FMC ...
18,876,333 UART:
18,876,491 UART: [state] CFI Enabled
18,884,541 UART: [fht] FMC Alias Private Key: 7
20,650,212 UART: [art] Extend RT PCRs Done
20,651,439 UART: [art] Lock RT PCRs Done
20,653,198 UART: [art] Populate DV Done
20,658,613 UART: [fht] FMC Alias Private Key: 7
20,660,203 UART: [art] Derive CDI
20,660,944 UART: [art] Store in slot 0x4
20,703,595 UART: [art] Derive Key Pair
20,704,592 UART: [art] Store priv key in slot 0x5
23,131,492 UART: [art] Derive Key Pair - Done
23,144,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,850,792 UART: [art] Erasing AUTHORITY.KEYID = 7
24,852,318 UART: [art] PUB.X = 8BD25007C5190A409446E47513D001BC51CFEE3D6A033A4F76B65119E3D241C0828E37E84D720BEBCC969ABDFEC6F79E
24,859,567 UART: [art] PUB.Y = 23489A7BB53CD7A82E36DEB3A813F2CB233A4FB20F643453DB16DA39CF46378540E2B488951C599CD0970D9BBC17E0A7
24,866,853 UART: [art] SIG.R = 46B6FD2AF6E533F9D83877D16BB42A9F825F9EA6598599A272E88FDA80C73CA997E3984E7324E868A85CC9FDC07CE345
24,874,253 UART: [art] SIG.S = 5241BE05F13751976C7D091E817CD7CFF220A84B00ED6D9228E0B8CF5833DDED76CE4326A5DC343B7A999DA67FFD772A
25,853,951 UART: Caliptra RT
25,854,656 UART: [state] CFI Enabled
25,987,166 UART: [rt] RT listening for mailbox commands...
25,989,065 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,019,617 UART: [rt]cmd =0x44504543, len=96
30,314,655 >>> mbox cmd response data (6236 bytes)
30,344,296 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,374,864 UART: [rt]cmd =0x53574545, len=84
34,511,269 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,783,394 ready_for_fw is high
3,783,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,464,764 >>> mbox cmd response: success
18,720,291 UART:
18,720,714 UART: Running Caliptra FMC ...
18,721,921 UART:
18,722,110 UART: [state] CFI Enabled
18,729,728 UART: [fht] FMC Alias Private Key: 7
20,495,792 UART: [art] Extend RT PCRs Done
20,497,014 UART: [art] Lock RT PCRs Done
20,498,865 UART: [art] Populate DV Done
20,504,130 UART: [fht] FMC Alias Private Key: 7
20,505,836 UART: [art] Derive CDI
20,506,656 UART: [art] Store in slot 0x4
20,549,229 UART: [art] Derive Key Pair
20,550,225 UART: [art] Store priv key in slot 0x5
22,977,675 UART: [art] Derive Key Pair - Done
22,990,632 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,696,934 UART: [art] Erasing AUTHORITY.KEYID = 7
24,698,437 UART: [art] PUB.X = A186A50BD9917433246162068607F4C49068C28B04DDC3711E3A7EA4CDCA0EF4EDD325A28327F4420BBBE7E4627FD5D0
24,705,719 UART: [art] PUB.Y = 72BDFCAD6878BA11503709A9FAF3FC4A8EBFE835775C985FC5A127F686B872FF562D6419AA753F775CEA7F0DF93CA4AB
24,712,934 UART: [art] SIG.R = 63FF0B0254784AC4804A2FBEDD6E74B483DFC4D65047E46A9DFD9B30E25ED52C5DA8AFC97D38FBF633AE09368AF51B55
24,720,393 UART: [art] SIG.S = 80409CD57337271F0A50124526F56257890CAB567C0ACA7F0B11A5AC4CC2880CA1FA508F08F3F9E70D182259E3714FEA
25,699,415 UART: Caliptra RT
25,700,132 UART: [state] CFI Enabled
25,832,483 UART: [rt] RT listening for mailbox commands...
25,834,408 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,865,057 UART: [rt]cmd =0x44504543, len=96
30,159,849 >>> mbox cmd response data (6236 bytes)
30,189,838 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,220,300 UART: [rt]cmd =0x53574545, len=84
34,355,422 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,080 UART:
192,457 UART: Running Caliptra ROM ...
193,667 UART:
193,824 UART: [state] CFI Enabled
268,774 UART: [state] LifecycleState = Unprovisioned
271,186 UART: [state] DebugLocked = No
273,573 UART: [state] WD Timer not started. Device not locked for debugging
278,113 UART: [kat] SHA2-256
468,039 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,774 UART: [kat] ++
479,252 UART: [kat] sha1
492,057 UART: [kat] SHA2-256
495,111 UART: [kat] SHA2-384
501,036 UART: [kat] SHA2-512-ACC
503,617 UART: [kat] ECC-384
2,949,253 UART: [kat] HMAC-384Kdf
2,972,388 UART: [kat] LMS
3,504,116 UART: [kat] --
3,508,247 UART: [cold-reset] ++
3,509,250 UART: [fht] FHT @ 0x50003400
3,519,579 UART: [idev] ++
3,520,204 UART: [idev] CDI.KEYID = 6
3,521,154 UART: [idev] SUBJECT.KEYID = 7
3,522,390 UART: [idev] UDS.KEYID = 0
3,523,308 ready_for_fw is high
3,523,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,568 UART: [idev] Erasing UDS.KEYID = 0
6,031,634 UART: [idev] Sha1 KeyId Algorithm
6,053,508 UART: [idev] --
6,058,395 UART: [ldev] ++
6,059,136 UART: [ldev] CDI.KEYID = 6
6,060,050 UART: [ldev] SUBJECT.KEYID = 5
6,061,208 UART: [ldev] AUTHORITY.KEYID = 7
6,062,436 UART: [ldev] FE.KEYID = 1
6,100,219 UART: [ldev] Erasing FE.KEYID = 1
8,602,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,766 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,063 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,470 UART: [ldev] --
10,409,739 UART: [fwproc] Wait for Commands...
10,411,983 UART: [fwproc] Recv command 0x46574c44
10,414,249 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,676,605 >>> mbox cmd response: success
14,680,725 UART: [afmc] ++
14,681,450 UART: [afmc] CDI.KEYID = 6
14,682,559 UART: [afmc] SUBJECT.KEYID = 7
14,684,105 UART: [afmc] AUTHORITY.KEYID = 5
17,213,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,903 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,813 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,068 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,008 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,977 UART: [afmc] --
19,011,097 UART: [cold-reset] --
19,013,996 UART: [state] Locking Datavault
19,019,791 UART: [state] Locking PCR0, PCR1 and PCR31
19,021,938 UART: [state] Locking ICCM
19,023,556 UART: [exit] Launching FMC @ 0x40000130
19,032,241 UART:
19,032,478 UART: Running Caliptra FMC ...
19,033,517 UART:
19,033,667 UART: [state] CFI Enabled
19,094,743 UART: [fht] FMC Alias Private Key: 7
20,861,488 UART: [art] Extend RT PCRs Done
20,862,704 UART: [art] Lock RT PCRs Done
20,864,512 UART: [art] Populate DV Done
20,869,829 UART: [fht] FMC Alias Private Key: 7
20,871,480 UART: [art] Derive CDI
20,872,288 UART: [art] Store in slot 0x4
20,928,062 UART: [art] Derive Key Pair
20,929,100 UART: [art] Store priv key in slot 0x5
23,392,922 UART: [art] Derive Key Pair - Done
23,405,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,118,550 UART: [art] Erasing AUTHORITY.KEYID = 7
25,120,053 UART: [art] PUB.X = C45C2CD8A7ABCA9660002A0098DB90B5D69C021A14083DD5EBEDBDF2D25A5B5416D01EFF8F43639F91B9BDCA103E5C90
25,127,319 UART: [art] PUB.Y = 1F1D6B4CC28C3284ECAE9E19BF183E6E738F6BA5CA3489F2201F77BE3FFCD38D85AF24FE314E0BAE696D558E40E84617
25,134,592 UART: [art] SIG.R = 8A227BFEBAF82AA792E9E66F9D423B884C2613CA14FC259DEAF4DF429D65FC0EF5D0FE967D22EDC4283AC19B19444E4C
25,142,015 UART: [art] SIG.S = 668AB8311DB9AE50BA79A1B89D2344E872A3B8BA7E1EF9D8623EFAE56A00831D6823C9BC7F8151E991ED969A1B80BCFD
26,120,465 UART: Caliptra RT
26,121,150 UART: [state] CFI Enabled
26,302,469 UART: [rt] RT listening for mailbox commands...
26,304,388 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,334,616 UART: [rt]cmd =0x44504543, len=96
30,710,412 >>> mbox cmd response data (6236 bytes)
30,740,130 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,770,685 UART: [rt]cmd =0x53574545, len=84
34,936,911 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,437,767 ready_for_fw is high
3,438,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,809,809 >>> mbox cmd response: success
19,089,292 UART:
19,089,684 UART: Running Caliptra FMC ...
19,090,787 UART:
19,090,943 UART: [state] CFI Enabled
19,158,838 UART: [fht] FMC Alias Private Key: 7
20,925,188 UART: [art] Extend RT PCRs Done
20,926,408 UART: [art] Lock RT PCRs Done
20,928,007 UART: [art] Populate DV Done
20,933,274 UART: [fht] FMC Alias Private Key: 7
20,934,866 UART: [art] Derive CDI
20,935,600 UART: [art] Store in slot 0x4
20,992,099 UART: [art] Derive Key Pair
20,993,139 UART: [art] Store priv key in slot 0x5
23,456,079 UART: [art] Derive Key Pair - Done
23,468,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,183,192 UART: [art] Erasing AUTHORITY.KEYID = 7
25,184,700 UART: [art] PUB.X = D64DA8D900C2B497511E31651DE076A241CC8C9A2B5282FDEA3E17543A1A0512A4E64FDAE8D0C3145F4E2584B12026F7
25,191,935 UART: [art] PUB.Y = F349738C61E36AEE8BD278E6B1702617A557882981AEF495958BD9806018F2A0E8B9E0F1B20C02270D1455533EA042DF
25,199,163 UART: [art] SIG.R = 1E10B5E7E29F6A6E185F87E76234AA2C3FE3264DFDA659EEB5BFDE4DA3AEF14C93BEDEC63C58EE20EB60E04047BBD3B0
25,206,618 UART: [art] SIG.S = 7A7B7642C0443AD34DBA5738F5D6E813F09F858EEE70AE8A17A29AD3A9F12DAFE3BB00A622BBA7D4426D35707402B19C
26,185,920 UART: Caliptra RT
26,186,604 UART: [state] CFI Enabled
26,365,748 UART: [rt] RT listening for mailbox commands...
26,367,680 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,398,558 UART: [rt]cmd =0x44504543, len=96
30,774,569 >>> mbox cmd response data (6236 bytes)
30,804,146 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,834,566 UART: [rt]cmd =0x53574545, len=84
35,002,302 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,395 UART:
192,771 UART: Running Caliptra ROM ...
193,875 UART:
603,728 UART: [state] CFI Enabled
615,778 UART: [state] LifecycleState = Unprovisioned
618,170 UART: [state] DebugLocked = No
620,709 UART: [state] WD Timer not started. Device not locked for debugging
624,833 UART: [kat] SHA2-256
814,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,553 UART: [kat] ++
826,091 UART: [kat] sha1
836,129 UART: [kat] SHA2-256
839,145 UART: [kat] SHA2-384
846,659 UART: [kat] SHA2-512-ACC
849,285 UART: [kat] ECC-384
3,288,732 UART: [kat] HMAC-384Kdf
3,303,107 UART: [kat] LMS
3,834,923 UART: [kat] --
3,839,561 UART: [cold-reset] ++
3,841,003 UART: [fht] FHT @ 0x50003400
3,851,289 UART: [idev] ++
3,851,944 UART: [idev] CDI.KEYID = 6
3,852,900 UART: [idev] SUBJECT.KEYID = 7
3,854,148 UART: [idev] UDS.KEYID = 0
3,855,048 ready_for_fw is high
3,855,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,112 UART: [idev] Erasing UDS.KEYID = 0
6,330,479 UART: [idev] Sha1 KeyId Algorithm
6,352,662 UART: [idev] --
6,358,501 UART: [ldev] ++
6,359,185 UART: [ldev] CDI.KEYID = 6
6,360,076 UART: [ldev] SUBJECT.KEYID = 5
6,361,540 UART: [ldev] AUTHORITY.KEYID = 7
6,362,739 UART: [ldev] FE.KEYID = 1
6,372,209 UART: [ldev] Erasing FE.KEYID = 1
8,853,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,541 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,368 UART: [ldev] --
10,642,472 UART: [fwproc] Wait for Commands...
10,645,701 UART: [fwproc] Recv command 0x46574c44
10,648,010 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,019 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,230 >>> mbox cmd response: success
14,907,958 UART: [afmc] ++
14,908,638 UART: [afmc] CDI.KEYID = 6
14,909,764 UART: [afmc] SUBJECT.KEYID = 7
14,911,327 UART: [afmc] AUTHORITY.KEYID = 5
17,416,315 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,496 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,469 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,576 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,742 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,542 UART: [afmc] --
19,213,205 UART: [cold-reset] --
19,215,838 UART: [state] Locking Datavault
19,220,620 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,786 UART: [state] Locking ICCM
19,225,219 UART: [exit] Launching FMC @ 0x40000130
19,233,911 UART:
19,234,149 UART: Running Caliptra FMC ...
19,235,258 UART:
19,235,418 UART: [state] CFI Enabled
19,243,472 UART: [fht] FMC Alias Private Key: 7
21,009,236 UART: [art] Extend RT PCRs Done
21,010,455 UART: [art] Lock RT PCRs Done
21,012,300 UART: [art] Populate DV Done
21,017,826 UART: [fht] FMC Alias Private Key: 7
21,019,371 UART: [art] Derive CDI
21,020,196 UART: [art] Store in slot 0x4
21,063,119 UART: [art] Derive Key Pair
21,064,126 UART: [art] Store priv key in slot 0x5
23,491,194 UART: [art] Derive Key Pair - Done
23,504,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,210,633 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,137 UART: [art] PUB.X = A3BDE9A2F02186A04F9DCA3B242405D479EC02894C1BF5F27CDC5EFE5E4B270954BD27B7BD5C6D726B19FD4D87FBFD2B
25,219,400 UART: [art] PUB.Y = 3C454D4A45CD1B12E5B963C0D043BBF070F8E7D968616965C1FA33BD231891441D6FB36FC87B99ADDED31E10C5E48969
25,226,667 UART: [art] SIG.R = AD36CB5A2E0B905FD97EB223FD879F7188E3DDCA2104F30BA74BB4238FB1C13E47CB45EBBB55702BEC80E90448FB94DD
25,234,091 UART: [art] SIG.S = AEC8E4BB0A645656B06F5A36A9ADF416F377726CF480D291E72F8560CF89AE4E5666B9E14F9FD9856258A790AAEBB190
26,212,637 UART: Caliptra RT
26,213,348 UART: [state] CFI Enabled
26,345,423 UART: [rt] RT listening for mailbox commands...
26,347,343 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,377,945 UART: [rt]cmd =0x44504543, len=96
30,672,305 >>> mbox cmd response data (6236 bytes)
30,702,111 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,732,740 UART: [rt]cmd =0x53574545, len=84
34,868,516 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
3,759,942 ready_for_fw is high
3,760,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,032,509 >>> mbox cmd response: success
19,285,046 UART:
19,285,442 UART: Running Caliptra FMC ...
19,286,560 UART:
19,286,719 UART: [state] CFI Enabled
19,294,656 UART: [fht] FMC Alias Private Key: 7
21,061,306 UART: [art] Extend RT PCRs Done
21,062,537 UART: [art] Lock RT PCRs Done
21,063,930 UART: [art] Populate DV Done
21,069,253 UART: [fht] FMC Alias Private Key: 7
21,070,748 UART: [art] Derive CDI
21,071,489 UART: [art] Store in slot 0x4
21,114,047 UART: [art] Derive Key Pair
21,115,092 UART: [art] Store priv key in slot 0x5
23,542,173 UART: [art] Derive Key Pair - Done
23,555,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,261,043 UART: [art] Erasing AUTHORITY.KEYID = 7
25,262,576 UART: [art] PUB.X = D2F8BD1644B0DFC3A24BC8A2AC5FFF3A5624B694984ABD3DD1D3AC42D7DB828F06860FBA89D5C51B1F5E1DE0E58DF196
25,269,907 UART: [art] PUB.Y = ACAAF5F8A53F49073BCCEE4C68929134662316AABB5C2FD3E0D1079A627AB0A2B78D2713EC713D437C2FDB54B30F8078
25,277,127 UART: [art] SIG.R = B2546FBE385EC3F9FF73351248474DEF5969809BB1739C4C79054EC72EE5FA60057FCCB388B90231661C72BC73075CA5
25,284,496 UART: [art] SIG.S = 923917BC49FF12DCB01A4FD4D4E78E57382C45A2714CF3352C29EEEC5603D4ED6477FCD7BA86AE76B5B0D2D00DC9698B
26,262,696 UART: Caliptra RT
26,263,396 UART: [state] CFI Enabled
26,396,005 UART: [rt] RT listening for mailbox commands...
26,398,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,428,422 UART: [rt]cmd =0x44504543, len=96
30,724,551 >>> mbox cmd response data (6236 bytes)
30,754,310 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,784,925 UART: [rt]cmd =0x53574545, len=84
34,920,650 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,450 UART: [state] LifecycleState = Unprovisioned
86,105 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
906,924 UART: [kat] LMS
1,475,120 UART: [kat] --
1,475,905 UART: [cold-reset] ++
1,476,241 UART: [fht] Storing FHT @ 0x50003400
1,478,920 UART: [idev] ++
1,479,088 UART: [idev] CDI.KEYID = 6
1,479,448 UART: [idev] SUBJECT.KEYID = 7
1,479,872 UART: [idev] UDS.KEYID = 0
1,480,217 ready_for_fw is high
1,480,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,956 UART: [idev] Erasing UDS.KEYID = 0
1,504,740 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,302 UART: [idev] --
1,514,277 UART: [ldev] ++
1,514,445 UART: [ldev] CDI.KEYID = 6
1,514,808 UART: [ldev] SUBJECT.KEYID = 5
1,515,234 UART: [ldev] AUTHORITY.KEYID = 7
1,515,697 UART: [ldev] FE.KEYID = 1
1,520,707 UART: [ldev] Erasing FE.KEYID = 1
1,545,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,246 UART: [ldev] --
1,584,729 UART: [fwproc] Waiting for Commands...
1,585,436 UART: [fwproc] Received command 0x46574c44
1,586,227 UART: [fwproc] Received Image of size 118548 bytes
2,931,855 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,797 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,015 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,262 >>> mbox cmd response: success
3,131,514 UART: [afmc] ++
3,131,682 UART: [afmc] CDI.KEYID = 6
3,132,044 UART: [afmc] SUBJECT.KEYID = 7
3,132,469 UART: [afmc] AUTHORITY.KEYID = 5
3,167,736 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,178 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,958 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,667 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,550 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,233 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,975 UART: [afmc] --
3,210,897 UART: [cold-reset] --
3,211,627 UART: [state] Locking Datavault
3,212,938 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,542 UART: [state] Locking ICCM
3,214,184 UART: [exit] Launching FMC @ 0x40000130
3,219,514 UART:
3,219,530 UART: Running Caliptra FMC ...
3,219,938 UART:
3,219,992 UART: [state] CFI Enabled
3,230,176 UART: [fht] FMC Alias Private Key: 7
3,349,120 UART: [art] Extend RT PCRs Done
3,349,548 UART: [art] Lock RT PCRs Done
3,351,302 UART: [art] Populate DV Done
3,359,609 UART: [fht] FMC Alias Private Key: 7
3,360,647 UART: [art] Derive CDI
3,360,927 UART: [art] Store in slot 0x4
3,446,801 UART: [art] Derive Key Pair
3,447,161 UART: [art] Store priv key in slot 0x5
3,460,736 UART: [art] Derive Key Pair - Done
3,475,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,647 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,412 UART: [art] PUB.X = 36321B298551E6C0127FC9D8D9E78D75013D85440B4A4E69E5442BA1A3A5956C3D1CB77CF098999C1D9E469CDB9C251D
3,498,178 UART: [art] PUB.Y = 3DC841FF08BBA801A389E833CA3C9216426122CBC39845823B57673F5717D4A06FDEB95873002DE8DD50120264FAF6F2
3,505,097 UART: [art] SIG.R = 6FD7712FC6D9316E196659372433A54A372A765E5D56E737B21BCEA59C163EC67E80367132F6C293B77A75020C39064E
3,511,850 UART: [art] SIG.S = 0E3B0FE64ABC906EDFC74FB7E40E45159C8BC3F9E7C3D7305E41DCC85690599CC1DC9DB114D3DA5A961D4355B80F7A82
3,535,878 UART: Caliptra RT
3,536,129 UART: [state] CFI Enabled
3,656,554 UART: [rt] RT listening for mailbox commands...
3,657,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,726 UART: [rt]cmd =0x44504543, len=96
3,880,154 >>> mbox cmd response data (6236 bytes)
3,880,155 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,152 UART: [rt]cmd =0x53574545, len=84
3,935,953 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,881 ready_for_fw is high
1,361,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,484 >>> mbox cmd response: success
3,039,267 UART:
3,039,283 UART: Running Caliptra FMC ...
3,039,691 UART:
3,039,745 UART: [state] CFI Enabled
3,050,297 UART: [fht] FMC Alias Private Key: 7
3,168,737 UART: [art] Extend RT PCRs Done
3,169,165 UART: [art] Lock RT PCRs Done
3,170,553 UART: [art] Populate DV Done
3,178,526 UART: [fht] FMC Alias Private Key: 7
3,179,666 UART: [art] Derive CDI
3,179,946 UART: [art] Store in slot 0x4
3,265,590 UART: [art] Derive Key Pair
3,265,950 UART: [art] Store priv key in slot 0x5
3,279,195 UART: [art] Derive Key Pair - Done
3,294,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,129 UART: [art] Erasing AUTHORITY.KEYID = 7
3,310,894 UART: [art] PUB.X = 85BCB1B373CB25D6A448C42F5786ABCF0CA4C494E60AF23548300FFF6ECFAB646ABC0EF541888FDA2B870DB2146C35A9
3,317,669 UART: [art] PUB.Y = C76679DA61FF4816B04DDCD5DCCDEE56242E53227CA44AD11EE58D7E1019E43D7EA14E18DE6F570B3BBCF51497BCC6BC
3,324,640 UART: [art] SIG.R = F9579CA7A100A0D21E382A733696850F5173548E46E78004C7B69ED0A62E4923F1B12B3A1289B351BC8FC8F1A778B137
3,331,378 UART: [art] SIG.S = 0A0D750B28E53D4DD0B0FED798B5049E0723CD773BC5AD35A3BD9A3F751B5494636D01A8D62E5AE3331C95C5A57273EA
3,355,188 UART: Caliptra RT
3,355,439 UART: [state] CFI Enabled
3,475,267 UART: [rt] RT listening for mailbox commands...
3,475,937 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,506,115 UART: [rt]cmd =0x44504543, len=96
3,698,088 >>> mbox cmd response data (6236 bytes)
3,698,089 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,882 UART: [rt]cmd =0x53574545, len=84
3,753,151 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,502 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,090 UART: [kat] SHA2-256
882,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,136 UART: [kat] ++
886,288 UART: [kat] sha1
890,398 UART: [kat] SHA2-256
892,336 UART: [kat] SHA2-384
895,117 UART: [kat] SHA2-512-ACC
897,018 UART: [kat] ECC-384
902,869 UART: [kat] HMAC-384Kdf
907,427 UART: [kat] LMS
1,475,623 UART: [kat] --
1,476,334 UART: [cold-reset] ++
1,476,818 UART: [fht] Storing FHT @ 0x50003400
1,479,731 UART: [idev] ++
1,479,899 UART: [idev] CDI.KEYID = 6
1,480,259 UART: [idev] SUBJECT.KEYID = 7
1,480,683 UART: [idev] UDS.KEYID = 0
1,481,028 ready_for_fw is high
1,481,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,675 UART: [idev] Erasing UDS.KEYID = 0
1,505,937 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,619 UART: [idev] --
1,515,586 UART: [ldev] ++
1,515,754 UART: [ldev] CDI.KEYID = 6
1,516,117 UART: [ldev] SUBJECT.KEYID = 5
1,516,543 UART: [ldev] AUTHORITY.KEYID = 7
1,517,006 UART: [ldev] FE.KEYID = 1
1,522,534 UART: [ldev] Erasing FE.KEYID = 1
1,547,593 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,905 UART: [ldev] --
1,587,176 UART: [fwproc] Waiting for Commands...
1,587,851 UART: [fwproc] Received command 0x46574c44
1,588,642 UART: [fwproc] Received Image of size 118548 bytes
2,933,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,354 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,953 >>> mbox cmd response: success
3,134,163 UART: [afmc] ++
3,134,331 UART: [afmc] CDI.KEYID = 6
3,134,693 UART: [afmc] SUBJECT.KEYID = 7
3,135,118 UART: [afmc] AUTHORITY.KEYID = 5
3,170,161 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,555 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,335 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,927 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,610 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,402 UART: [afmc] --
3,213,466 UART: [cold-reset] --
3,214,090 UART: [state] Locking Datavault
3,215,089 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,693 UART: [state] Locking ICCM
3,216,275 UART: [exit] Launching FMC @ 0x40000130
3,221,605 UART:
3,221,621 UART: Running Caliptra FMC ...
3,222,029 UART:
3,222,172 UART: [state] CFI Enabled
3,232,952 UART: [fht] FMC Alias Private Key: 7
3,352,116 UART: [art] Extend RT PCRs Done
3,352,544 UART: [art] Lock RT PCRs Done
3,354,056 UART: [art] Populate DV Done
3,362,189 UART: [fht] FMC Alias Private Key: 7
3,363,149 UART: [art] Derive CDI
3,363,429 UART: [art] Store in slot 0x4
3,449,223 UART: [art] Derive Key Pair
3,449,583 UART: [art] Store priv key in slot 0x5
3,462,464 UART: [art] Derive Key Pair - Done
3,477,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,155 UART: [art] PUB.X = C68933B583751133075AE27929E89883FC22136DFC341CE1DA1B7D5D3DBB7267B30C882CCE3070BFD9365639D6677FF4
3,500,919 UART: [art] PUB.Y = 4E069D485DDED60B44E77FCEADA93181A24A50F598D7EAA40C33A179D8B2DA38BAF916527DF2B074C8422760451D9AD5
3,507,872 UART: [art] SIG.R = DAAF0FF346A9ACF7BE04D174E9639FAF7BB0B7E12E9C1A4B281AB6754BC66A1184555F70D2DCD84EDDAD9A94A79CBBAC
3,514,668 UART: [art] SIG.S = 511837780740877DC782C56D8B8C95F045AE273D6404C51F554084AAE770A8005695470F383DEF5768EB479A0D9CBED1
3,538,512 UART: Caliptra RT
3,538,855 UART: [state] CFI Enabled
3,658,325 UART: [rt] RT listening for mailbox commands...
3,658,995 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,435 UART: [rt]cmd =0x44504543, len=96
3,882,203 >>> mbox cmd response data (6236 bytes)
3,882,204 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,912,193 UART: [rt]cmd =0x53574545, len=84
3,938,124 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,542 ready_for_fw is high
1,362,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,931 >>> mbox cmd response: success
3,042,002 UART:
3,042,018 UART: Running Caliptra FMC ...
3,042,426 UART:
3,042,569 UART: [state] CFI Enabled
3,053,257 UART: [fht] FMC Alias Private Key: 7
3,172,363 UART: [art] Extend RT PCRs Done
3,172,791 UART: [art] Lock RT PCRs Done
3,174,391 UART: [art] Populate DV Done
3,182,744 UART: [fht] FMC Alias Private Key: 7
3,183,822 UART: [art] Derive CDI
3,184,102 UART: [art] Store in slot 0x4
3,269,776 UART: [art] Derive Key Pair
3,270,136 UART: [art] Store priv key in slot 0x5
3,283,519 UART: [art] Derive Key Pair - Done
3,298,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,732 UART: [art] PUB.X = 220065F11E86EE59EE91E7EB74DBA7DC134A427D35661BFDE8D61C622A4EBF46AEEB3E69148C2FA0CA7FC756E39000A6
3,321,476 UART: [art] PUB.Y = AE6ACC673F9E857EBAE2FC099B56942F988578023495775D9F292F27C85B9A3CD51BE2CD460292B4E480EDE64C8332FB
3,328,425 UART: [art] SIG.R = 2D5B96FAD12D5BE571946C421AD8366D82E135D861372C7C485C248BC28BE986165AD202BEBDFEBADDB1C43651C2C649
3,335,204 UART: [art] SIG.S = 08A2388979C0C18826D8071D9042D9322A7739B18DA6F39D502103C7B055B2E5741D5FC3BC3EF3581BD5826D56812306
3,359,388 UART: Caliptra RT
3,359,731 UART: [state] CFI Enabled
3,479,936 UART: [rt] RT listening for mailbox commands...
3,480,606 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,298 UART: [rt]cmd =0x44504543, len=96
3,703,349 >>> mbox cmd response data (6236 bytes)
3,703,350 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,203 UART: [rt]cmd =0x53574545, len=84
3,759,350 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,191 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
890,918 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,022 UART: [kat] ++
895,174 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
904,351 UART: [kat] SHA2-512-ACC
906,252 UART: [kat] ECC-384
916,031 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,860 UART: [cold-reset] ++
1,170,324 UART: [fht] FHT @ 0x50003400
1,172,878 UART: [idev] ++
1,173,046 UART: [idev] CDI.KEYID = 6
1,173,407 UART: [idev] SUBJECT.KEYID = 7
1,173,832 UART: [idev] UDS.KEYID = 0
1,174,178 ready_for_fw is high
1,174,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,625 UART: [idev] Erasing UDS.KEYID = 0
1,198,897 UART: [idev] Sha1 KeyId Algorithm
1,207,635 UART: [idev] --
1,208,858 UART: [ldev] ++
1,209,026 UART: [ldev] CDI.KEYID = 6
1,209,390 UART: [ldev] SUBJECT.KEYID = 5
1,209,817 UART: [ldev] AUTHORITY.KEYID = 7
1,210,280 UART: [ldev] FE.KEYID = 1
1,215,156 UART: [ldev] Erasing FE.KEYID = 1
1,241,423 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,281 UART: [fwproc] Wait for Commands...
1,280,998 UART: [fwproc] Recv command 0x46574c44
1,281,731 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,806 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,929 >>> mbox cmd response: success
2,824,943 UART: [afmc] ++
2,825,111 UART: [afmc] CDI.KEYID = 6
2,825,474 UART: [afmc] SUBJECT.KEYID = 7
2,825,900 UART: [afmc] AUTHORITY.KEYID = 5
2,860,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,122 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,581 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,462 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,163 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,104 UART: [afmc] --
2,904,135 UART: [cold-reset] --
2,904,863 UART: [state] Locking Datavault
2,905,792 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,396 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,070 UART: [fht] FMC Alias Private Key: 7
3,041,926 UART: [art] Extend RT PCRs Done
3,042,354 UART: [art] Lock RT PCRs Done
3,043,516 UART: [art] Populate DV Done
3,051,637 UART: [fht] FMC Alias Private Key: 7
3,052,737 UART: [art] Derive CDI
3,053,017 UART: [art] Store in slot 0x4
3,138,588 UART: [art] Derive Key Pair
3,138,948 UART: [art] Store priv key in slot 0x5
3,152,420 UART: [art] Derive Key Pair - Done
3,167,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,858 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,623 UART: [art] PUB.X = 5F635BACDB33C082E761D6FDC91218702FCA39F4584003647E3AC5C759773A25AB1C3AEF2543D2CE1DE341B6F1327380
3,190,396 UART: [art] PUB.Y = 1C754783E4085CA1862BE7EFFDB2FF9CE5EEB84C6ACC1C6EC1584553A89A2038A7789B33D5E71630F3A0D1C9AAD05A3B
3,197,361 UART: [art] SIG.R = 3C8F10166E59C4BBF1440C632C823E1A142553EA7A83DBA08E31178447A90A1281D45D78CA85D135E347F9FE589CE0DD
3,204,129 UART: [art] SIG.S = 7F096E61845CB8911BCA026D4C9863248E22D54862E95FC35AF5FF0554F8141AAD00E65986AF8D29CA60D1BE5F039B51
3,227,691 UART: Caliptra RT
3,227,942 UART: [state] CFI Enabled
3,347,310 UART: [rt] RT listening for mailbox commands...
3,347,980 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,690 UART: [rt]cmd =0x44504543, len=96
3,570,816 >>> mbox cmd response data (6236 bytes)
3,570,817 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,600,506 UART: [rt]cmd =0x53574545, len=84
3,625,512 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,694 ready_for_fw is high
1,058,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,822 >>> mbox cmd response: success
2,741,105 UART:
2,741,121 UART: Running Caliptra FMC ...
2,741,529 UART:
2,741,583 UART: [state] CFI Enabled
2,752,133 UART: [fht] FMC Alias Private Key: 7
2,871,341 UART: [art] Extend RT PCRs Done
2,871,769 UART: [art] Lock RT PCRs Done
2,873,461 UART: [art] Populate DV Done
2,881,528 UART: [fht] FMC Alias Private Key: 7
2,882,688 UART: [art] Derive CDI
2,882,968 UART: [art] Store in slot 0x4
2,968,683 UART: [art] Derive Key Pair
2,969,043 UART: [art] Store priv key in slot 0x5
2,982,349 UART: [art] Derive Key Pair - Done
2,997,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,689 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,454 UART: [art] PUB.X = C7C02328B694D6AE61A1E25D09FD65F517E3204C108B36918970DBDF2134BB72A8F4766AA17F91F564244EB999EF8FF4
3,020,225 UART: [art] PUB.Y = 7E7C08BDD1CD42BAE9EDC31108D85000EFB735495949095A2F7C5E54075920255B87F2BC8C8C75E366346140E593F994
3,027,139 UART: [art] SIG.R = BE669C6F3AA12F76260E9F0B8FF95956B816F742278AFE8CA67A33352F1EE6C2A7C4142263F0A4ED5E06779269BF424F
3,033,906 UART: [art] SIG.S = D57E815C8EFAED00C5BC5FF549AECC61CCCD7DD516B5819C09A76333B2A51CA2004ADB652ACA7D508CC4A8A242BF12C2
3,057,675 UART: Caliptra RT
3,057,926 UART: [state] CFI Enabled
3,177,938 UART: [rt] RT listening for mailbox commands...
3,178,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,982 UART: [rt]cmd =0x44504543, len=96
3,401,297 >>> mbox cmd response data (6236 bytes)
3,401,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,285 UART: [rt]cmd =0x53574545, len=84
3,457,151 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,885 UART: [kat] SHA2-256
891,435 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,539 UART: [kat] ++
895,691 UART: [kat] sha1
899,853 UART: [kat] SHA2-256
901,793 UART: [kat] SHA2-384
904,558 UART: [kat] SHA2-512-ACC
906,459 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,742 UART: [kat] LMS
1,169,054 UART: [kat] --
1,169,637 UART: [cold-reset] ++
1,170,065 UART: [fht] FHT @ 0x50003400
1,172,599 UART: [idev] ++
1,172,767 UART: [idev] CDI.KEYID = 6
1,173,128 UART: [idev] SUBJECT.KEYID = 7
1,173,553 UART: [idev] UDS.KEYID = 0
1,173,899 ready_for_fw is high
1,173,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,380 UART: [idev] Erasing UDS.KEYID = 0
1,198,666 UART: [idev] Sha1 KeyId Algorithm
1,207,712 UART: [idev] --
1,208,745 UART: [ldev] ++
1,208,913 UART: [ldev] CDI.KEYID = 6
1,209,277 UART: [ldev] SUBJECT.KEYID = 5
1,209,704 UART: [ldev] AUTHORITY.KEYID = 7
1,210,167 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,902 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,223 UART: [ldev] --
1,281,554 UART: [fwproc] Wait for Commands...
1,282,227 UART: [fwproc] Recv command 0x46574c44
1,282,960 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,959 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,011 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,306 >>> mbox cmd response: success
2,826,388 UART: [afmc] ++
2,826,556 UART: [afmc] CDI.KEYID = 6
2,826,919 UART: [afmc] SUBJECT.KEYID = 7
2,827,345 UART: [afmc] AUTHORITY.KEYID = 5
2,863,398 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,729 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,478 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,069 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,770 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,645 UART: [afmc] --
2,906,626 UART: [cold-reset] --
2,907,554 UART: [state] Locking Datavault
2,908,755 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,359 UART: [state] Locking ICCM
2,909,821 UART: [exit] Launching FMC @ 0x40000130
2,915,151 UART:
2,915,167 UART: Running Caliptra FMC ...
2,915,575 UART:
2,915,718 UART: [state] CFI Enabled
2,926,422 UART: [fht] FMC Alias Private Key: 7
3,045,942 UART: [art] Extend RT PCRs Done
3,046,370 UART: [art] Lock RT PCRs Done
3,048,078 UART: [art] Populate DV Done
3,056,449 UART: [fht] FMC Alias Private Key: 7
3,057,501 UART: [art] Derive CDI
3,057,781 UART: [art] Store in slot 0x4
3,143,662 UART: [art] Derive Key Pair
3,144,022 UART: [art] Store priv key in slot 0x5
3,157,366 UART: [art] Derive Key Pair - Done
3,172,337 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,819 UART: [art] PUB.X = 9FC3819FDAD6C8E65CE31D6B8FBBC19E3B91647B43F00C4B7D9B1F6CFE866BA500DE217A61FB890762378BA9DDFB96F0
3,195,583 UART: [art] PUB.Y = A61BC190BCD91D76F23C95971709B9AE2749816AA5F3368A2B523C7D3A3CA770A2589442030475996CB0132140D518DC
3,202,518 UART: [art] SIG.R = 1369917FED01ABB193AA8E7D7CE2433D467507E43347987C149B2563D1E37A7FEB3E0E508538A3AB6987C75414417AAB
3,209,279 UART: [art] SIG.S = DC20EC52BF3F5D5A0AFA637E7F563C7F6E4248D5F3CF71A6CF143552F72102ABE139B4D003034177DEC51BBF3DC5D1E2
3,232,803 UART: Caliptra RT
3,233,146 UART: [state] CFI Enabled
3,353,145 UART: [rt] RT listening for mailbox commands...
3,353,815 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,443 UART: [rt]cmd =0x44504543, len=96
3,575,859 >>> mbox cmd response data (6236 bytes)
3,575,860 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,687 UART: [rt]cmd =0x53574545, len=84
3,632,075 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,999 ready_for_fw is high
1,058,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,597 >>> mbox cmd response: success
2,741,716 UART:
2,741,732 UART: Running Caliptra FMC ...
2,742,140 UART:
2,742,283 UART: [state] CFI Enabled
2,753,317 UART: [fht] FMC Alias Private Key: 7
2,872,085 UART: [art] Extend RT PCRs Done
2,872,513 UART: [art] Lock RT PCRs Done
2,874,331 UART: [art] Populate DV Done
2,882,680 UART: [fht] FMC Alias Private Key: 7
2,883,698 UART: [art] Derive CDI
2,883,978 UART: [art] Store in slot 0x4
2,969,793 UART: [art] Derive Key Pair
2,970,153 UART: [art] Store priv key in slot 0x5
2,983,305 UART: [art] Derive Key Pair - Done
2,997,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,607 UART: [art] PUB.X = 6DD84597C0910719F007F280E985840E106FC4035AB85140212D39223069D4EE543EF4FCDA70A5D80DA299B5324866A4
3,020,354 UART: [art] PUB.Y = 209D789DEF71F073CCBDF6F3B4F4163BC61F37A6CD8B289A6BDD35ADA3F463B3ECFFD147425A00F5625A669846D7DAF7
3,027,302 UART: [art] SIG.R = F71D7AF548A69470A74DBF61B866FF7BBA526F92FA4805114C64D1EE8CE8AC0502B8C7A0F235EA5E64F385CA4FDAC2BE
3,034,085 UART: [art] SIG.S = 604170F2AB2C8A20183EE0534CE003ECF737D0591B61F8FF639BB55A7B7B1DEE8A398A6B578EBCAA05EA612818B66AF0
3,057,863 UART: Caliptra RT
3,058,206 UART: [state] CFI Enabled
3,177,997 UART: [rt] RT listening for mailbox commands...
3,178,667 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,209 UART: [rt]cmd =0x44504543, len=96
3,402,722 >>> mbox cmd response data (6236 bytes)
3,402,723 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,546 UART: [rt]cmd =0x53574545, len=84
3,458,336 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
893,330 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,455 UART: [kat] ++
897,607 UART: [kat] sha1
901,771 UART: [kat] SHA2-256
903,711 UART: [kat] SHA2-384
906,292 UART: [kat] SHA2-512-ACC
908,193 UART: [kat] ECC-384
917,506 UART: [kat] HMAC-384Kdf
921,994 UART: [kat] LMS
1,170,322 UART: [kat] --
1,171,153 UART: [cold-reset] ++
1,171,683 UART: [fht] FHT @ 0x50003400
1,174,182 UART: [idev] ++
1,174,350 UART: [idev] CDI.KEYID = 6
1,174,710 UART: [idev] SUBJECT.KEYID = 7
1,175,134 UART: [idev] UDS.KEYID = 0
1,175,479 ready_for_fw is high
1,175,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,070 UART: [idev] Erasing UDS.KEYID = 0
1,200,427 UART: [idev] Sha1 KeyId Algorithm
1,208,987 UART: [idev] --
1,209,981 UART: [ldev] ++
1,210,149 UART: [ldev] CDI.KEYID = 6
1,210,512 UART: [ldev] SUBJECT.KEYID = 5
1,210,938 UART: [ldev] AUTHORITY.KEYID = 7
1,211,401 UART: [ldev] FE.KEYID = 1
1,216,467 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,342 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,191 UART: [ldev] --
1,281,558 UART: [fwproc] Wait for Commands...
1,282,210 UART: [fwproc] Recv command 0x46574c44
1,282,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,275 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,879 >>> mbox cmd response: success
2,826,933 UART: [afmc] ++
2,827,101 UART: [afmc] CDI.KEYID = 6
2,827,463 UART: [afmc] SUBJECT.KEYID = 7
2,827,888 UART: [afmc] AUTHORITY.KEYID = 5
2,863,135 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,630 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,378 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,970 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,671 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,641 UART: [afmc] --
2,906,615 UART: [cold-reset] --
2,907,491 UART: [state] Locking Datavault
2,908,774 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,378 UART: [state] Locking ICCM
2,909,814 UART: [exit] Launching FMC @ 0x40000130
2,915,144 UART:
2,915,160 UART: Running Caliptra FMC ...
2,915,568 UART:
2,915,622 UART: [state] CFI Enabled
2,926,080 UART: [fht] FMC Alias Private Key: 7
3,045,020 UART: [art] Extend RT PCRs Done
3,045,448 UART: [art] Lock RT PCRs Done
3,047,034 UART: [art] Populate DV Done
3,055,309 UART: [fht] FMC Alias Private Key: 7
3,056,329 UART: [art] Derive CDI
3,056,609 UART: [art] Store in slot 0x4
3,142,354 UART: [art] Derive Key Pair
3,142,714 UART: [art] Store priv key in slot 0x5
3,155,836 UART: [art] Derive Key Pair - Done
3,170,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,900 UART: [art] PUB.X = 2EAC739E227845C559978F9AC2E607485EA8D5315E141F72990826BFE131F2BD34A4F14D458D4B66A4142B45CB48C1E1
3,193,664 UART: [art] PUB.Y = 6EF0C74424438126C7312642B31C6646152496D2EF907D26BDDE37C4D1CA384F78CFF12ACE7BD5DFE887EC79311CB386
3,200,620 UART: [art] SIG.R = 82403604CE7FA41AA2E251696EEC0405BBDD9154D12B3AF1E165B7BD99AFA5DF138E4698C5107195B11BBC2E13826931
3,207,387 UART: [art] SIG.S = 553221A4EF4410C52F60A3C8A7BA477A4E58F92DF0BB43945F6077BBA1B7F5AC0DACC09C8B2B9E2F424241EC01C78857
3,230,695 UART: Caliptra RT
3,230,946 UART: [state] CFI Enabled
3,349,839 UART: [rt] RT listening for mailbox commands...
3,350,509 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,029 UART: [rt]cmd =0x44504543, len=96
3,572,160 >>> mbox cmd response data (6236 bytes)
3,572,161 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,601,826 UART: [rt]cmd =0x53574545, len=84
3,628,202 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,397 ready_for_fw is high
1,060,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,062 >>> mbox cmd response: success
2,741,771 UART:
2,741,787 UART: Running Caliptra FMC ...
2,742,195 UART:
2,742,249 UART: [state] CFI Enabled
2,752,925 UART: [fht] FMC Alias Private Key: 7
2,871,463 UART: [art] Extend RT PCRs Done
2,871,891 UART: [art] Lock RT PCRs Done
2,873,545 UART: [art] Populate DV Done
2,881,470 UART: [fht] FMC Alias Private Key: 7
2,882,504 UART: [art] Derive CDI
2,882,784 UART: [art] Store in slot 0x4
2,968,775 UART: [art] Derive Key Pair
2,969,135 UART: [art] Store priv key in slot 0x5
2,982,763 UART: [art] Derive Key Pair - Done
2,997,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,954 UART: [art] PUB.X = 26B28194B33305BEAE6E89677DE78859539DE8212B974FAD91CD297734E4CA5E679DCD7F4A92151DA5A8DE7246852C7E
3,020,725 UART: [art] PUB.Y = 67B70CBC3766416AB786EF826518EE5EF26E7E995155DC2636036DB7DA012793CC90737BCA91DB165B2D1ADFAA64AF20
3,027,676 UART: [art] SIG.R = 2FAE6166B644B287BF21741A4648661166FBC29B599A09FCBF77090AA04E028992843348C33F9BF5F5C580EF8FC542E5
3,034,434 UART: [art] SIG.S = 18AAAE7D6E253BAECF1ABB0106A7F3D5A5A9D8E8E658798A5ADF89FA46F38064A3DD482B7629D012EAA8BF9E87D7ADDD
3,058,364 UART: Caliptra RT
3,058,615 UART: [state] CFI Enabled
3,178,141 UART: [rt] RT listening for mailbox commands...
3,178,811 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,159 UART: [rt]cmd =0x44504543, len=96
3,401,371 >>> mbox cmd response data (6236 bytes)
3,401,372 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,431,057 UART: [rt]cmd =0x53574545, len=84
3,456,535 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,742 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
893,595 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,720 UART: [kat] ++
897,872 UART: [kat] sha1
902,106 UART: [kat] SHA2-256
904,046 UART: [kat] SHA2-384
906,919 UART: [kat] SHA2-512-ACC
908,820 UART: [kat] ECC-384
918,511 UART: [kat] HMAC-384Kdf
923,225 UART: [kat] LMS
1,171,553 UART: [kat] --
1,172,204 UART: [cold-reset] ++
1,172,724 UART: [fht] FHT @ 0x50003400
1,175,563 UART: [idev] ++
1,175,731 UART: [idev] CDI.KEYID = 6
1,176,091 UART: [idev] SUBJECT.KEYID = 7
1,176,515 UART: [idev] UDS.KEYID = 0
1,176,860 ready_for_fw is high
1,176,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,681 UART: [idev] Erasing UDS.KEYID = 0
1,201,934 UART: [idev] Sha1 KeyId Algorithm
1,210,558 UART: [idev] --
1,211,670 UART: [ldev] ++
1,211,838 UART: [ldev] CDI.KEYID = 6
1,212,201 UART: [ldev] SUBJECT.KEYID = 5
1,212,627 UART: [ldev] AUTHORITY.KEYID = 7
1,213,090 UART: [ldev] FE.KEYID = 1
1,218,378 UART: [ldev] Erasing FE.KEYID = 1
1,245,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,834 UART: [ldev] --
1,284,137 UART: [fwproc] Wait for Commands...
1,284,875 UART: [fwproc] Recv command 0x46574c44
1,285,603 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,384 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,891 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,176 >>> mbox cmd response: success
2,830,266 UART: [afmc] ++
2,830,434 UART: [afmc] CDI.KEYID = 6
2,830,796 UART: [afmc] SUBJECT.KEYID = 7
2,831,221 UART: [afmc] AUTHORITY.KEYID = 5
2,867,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,137 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,885 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,178 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,048 UART: [afmc] --
2,911,150 UART: [cold-reset] --
2,911,960 UART: [state] Locking Datavault
2,912,977 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,581 UART: [state] Locking ICCM
2,914,223 UART: [exit] Launching FMC @ 0x40000130
2,919,553 UART:
2,919,569 UART: Running Caliptra FMC ...
2,919,977 UART:
2,920,120 UART: [state] CFI Enabled
2,930,324 UART: [fht] FMC Alias Private Key: 7
3,049,528 UART: [art] Extend RT PCRs Done
3,049,956 UART: [art] Lock RT PCRs Done
3,051,478 UART: [art] Populate DV Done
3,059,843 UART: [fht] FMC Alias Private Key: 7
3,060,795 UART: [art] Derive CDI
3,061,075 UART: [art] Store in slot 0x4
3,146,490 UART: [art] Derive Key Pair
3,146,850 UART: [art] Store priv key in slot 0x5
3,159,754 UART: [art] Derive Key Pair - Done
3,174,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,887 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,652 UART: [art] PUB.X = F9E7A542A9ED10EC1EE11E0DFF84B2B93DC2F0DF31D193790FC399094D5428595C173BF91EFB7C630293A223FE143E0A
3,198,419 UART: [art] PUB.Y = D9048371C798EDC5CC592AB7E4DA04927E4BA7A2675C5D712301C6E2A04610B25B90D444DB71F69E4F7D5EB2DB49FDBA
3,205,374 UART: [art] SIG.R = 90AA7AE28EF99215A093BEEBFE631A2677E1991F43B5A018673590D1B48A3285B8A05E9AC62B1CC16950EF65349A764F
3,212,148 UART: [art] SIG.S = B025D4BD581300F556F8AAFEB99327C60969ED1D14E3229EE6FE76CB9304C2DF5D40CB937DC04235DEC3CD19AC4C4DB1
3,236,744 UART: Caliptra RT
3,237,087 UART: [state] CFI Enabled
3,355,751 UART: [rt] RT listening for mailbox commands...
3,356,421 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,813 UART: [rt]cmd =0x44504543, len=96
3,578,723 >>> mbox cmd response data (6236 bytes)
3,578,724 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,289 UART: [rt]cmd =0x53574545, len=84
3,634,511 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,490 ready_for_fw is high
1,060,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,435 >>> mbox cmd response: success
2,742,498 UART:
2,742,514 UART: Running Caliptra FMC ...
2,742,922 UART:
2,743,065 UART: [state] CFI Enabled
2,753,465 UART: [fht] FMC Alias Private Key: 7
2,872,297 UART: [art] Extend RT PCRs Done
2,872,725 UART: [art] Lock RT PCRs Done
2,874,025 UART: [art] Populate DV Done
2,882,298 UART: [fht] FMC Alias Private Key: 7
2,883,422 UART: [art] Derive CDI
2,883,702 UART: [art] Store in slot 0x4
2,969,103 UART: [art] Derive Key Pair
2,969,463 UART: [art] Store priv key in slot 0x5
2,982,729 UART: [art] Derive Key Pair - Done
2,997,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,936 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,701 UART: [art] PUB.X = 2CFC6C92250968FB815DD6C5A70B3411385752E14D3593C7A551C704EA904F138FC1151B1654C308266120E8965471BD
3,020,449 UART: [art] PUB.Y = 551DA7CA3E1FF000595D0D5017E424F225256CE05434ACC43CB647ADF7D05CABCED92B6FCB13160D24ADCD280D35D569
3,027,384 UART: [art] SIG.R = DEC8E0E60E1B6ABFEDF566B35101F5425C00EC36AC33294E45811D66A98BB10898908AE52131726FECCC3E6EAA43D895
3,034,135 UART: [art] SIG.S = A77A9F55AFB7F58B5B737250AA67547E0166BAAB552F9E265B6F7BAB41E41B6B8D2605DCC086BA01ED2A5901FC648817
3,057,937 UART: Caliptra RT
3,058,280 UART: [state] CFI Enabled
3,178,368 UART: [rt] RT listening for mailbox commands...
3,179,038 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,514 UART: [rt]cmd =0x44504543, len=96
3,403,066 >>> mbox cmd response data (6236 bytes)
3,403,067 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,432,926 UART: [rt]cmd =0x53574545, len=84
3,458,776 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,890 writing to cptra_bootfsm_go
191,992 UART:
192,353 UART: Running Caliptra ROM ...
193,473 UART:
193,614 UART: [state] CFI Enabled
262,033 UART: [state] LifecycleState = Unprovisioned
264,031 UART: [state] DebugLocked = No
266,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,419 UART: [kat] SHA2-256
441,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,644 UART: [kat] ++
452,094 UART: [kat] sha1
464,180 UART: [kat] SHA2-256
466,840 UART: [kat] SHA2-384
473,682 UART: [kat] SHA2-512-ACC
476,066 UART: [kat] ECC-384
2,766,156 UART: [kat] HMAC-384Kdf
2,778,009 UART: [kat] LMS
3,968,322 UART: [kat] --
3,974,165 UART: [cold-reset] ++
3,975,462 UART: [fht] Storing FHT @ 0x50003400
3,986,671 UART: [idev] ++
3,987,239 UART: [idev] CDI.KEYID = 6
3,988,159 UART: [idev] SUBJECT.KEYID = 7
3,989,406 UART: [idev] UDS.KEYID = 0
3,990,490 ready_for_fw is high
3,990,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,876 UART: [idev] Erasing UDS.KEYID = 0
7,325,035 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,151 UART: [idev] --
7,349,712 UART: [ldev] ++
7,350,277 UART: [ldev] CDI.KEYID = 6
7,351,214 UART: [ldev] SUBJECT.KEYID = 5
7,352,477 UART: [ldev] AUTHORITY.KEYID = 7
7,353,703 UART: [ldev] FE.KEYID = 1
7,383,259 UART: [ldev] Erasing FE.KEYID = 1
10,714,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,517 UART: [ldev] --
13,096,655 UART: [fwproc] Waiting for Commands...
13,099,243 UART: [fwproc] Received command 0x46574c44
13,101,487 UART: [fwproc] Received Image of size 118548 bytes
17,212,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,292,317 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,365,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,693,640 >>> mbox cmd response: success
17,697,446 UART: [afmc] ++
17,698,062 UART: [afmc] CDI.KEYID = 6
17,698,952 UART: [afmc] SUBJECT.KEYID = 7
17,700,224 UART: [afmc] AUTHORITY.KEYID = 5
21,074,808 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,807 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,217 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,631 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,464 UART: [afmc] --
23,443,117 UART: [cold-reset] --
23,447,574 UART: [state] Locking Datavault
23,451,582 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,334 UART: [state] Locking ICCM
23,455,860 UART: [exit] Launching FMC @ 0x40000130
23,464,267 UART:
23,464,504 UART: Running Caliptra FMC ...
23,465,606 UART:
23,465,763 UART: [state] CFI Enabled
23,533,484 UART: [fht] FMC Alias Private Key: 7
25,873,815 UART: [art] Extend RT PCRs Done
25,875,038 UART: [art] Lock RT PCRs Done
25,876,611 UART: [art] Populate DV Done
25,882,218 UART: [fht] FMC Alias Private Key: 7
25,883,977 UART: [art] Derive CDI
25,884,800 UART: [art] Store in slot 0x4
25,942,272 UART: [art] Derive Key Pair
25,943,273 UART: [art] Store priv key in slot 0x5
29,236,637 UART: [art] Derive Key Pair - Done
29,249,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,144 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,651 UART: [art] PUB.X = F4A4B3F0C6BE587F3BA9281A8F4177FBFF0FE25C558086179F95DB8ED64AA959D7EF34DE363F596E5AC695CF05CE7F33
31,547,948 UART: [art] PUB.Y = ECE17045367DA77F82B2FF59BEC501F7E6417C5111A42FBC631F10BCBA22A7A9476D30F965FBC372952DCA32CBA4734F
31,555,185 UART: [art] SIG.R = 04AF381767406B82A93E50744C8264ED36D0B77E3D62B8C46A0EB0F1D7ABA83087C7C3B57F4A247DB39FA81BBC5FB989
31,562,604 UART: [art] SIG.S = BBE3D7860A7A2D9E742AE3095108F915331910B7E3A7D0839DE11EFCFC4B408A2F8B7726E97300BE6BB3750033744A47
32,867,836 UART: Caliptra RT
32,868,561 UART: [state] CFI Enabled
33,044,588 UART: [rt] RT listening for mailbox commands...
33,046,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,077,244 UART: [rt]cmd =0x44504543, len=96
38,845,317 >>> mbox cmd response data (6236 bytes)
38,874,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,905,289 UART: [rt]cmd =0x44504543, len=96
38,936,139 >>> mbox cmd response data (56 bytes)
38,936,904 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,966,982 UART: [rt]cmd =0x52564348, len=36
38,970,222 >>> mbox cmd response data (8 bytes)
38,970,767 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,001,327 UART: [rt]cmd =0x44504543, len=96
44,774,835 >>> mbox cmd response data (6236 bytes)
44,803,655 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,834,416 UART: [rt]cmd =0x53574545, len=84
50,419,833 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,781,801 ready_for_fw is high
3,782,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,789 >>> mbox cmd response: success
23,635,722 UART:
23,636,118 UART: Running Caliptra FMC ...
23,637,267 UART:
23,637,434 UART: [state] CFI Enabled
23,703,868 UART: [fht] FMC Alias Private Key: 7
26,043,881 UART: [art] Extend RT PCRs Done
26,045,112 UART: [art] Lock RT PCRs Done
26,046,341 UART: [art] Populate DV Done
26,051,490 UART: [fht] FMC Alias Private Key: 7
26,053,193 UART: [art] Derive CDI
26,053,931 UART: [art] Store in slot 0x4
26,112,824 UART: [art] Derive Key Pair
26,113,856 UART: [art] Store priv key in slot 0x5
29,406,731 UART: [art] Derive Key Pair - Done
29,419,768 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,707,270 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,778 UART: [art] PUB.X = E0634BD21B16321307FCA6CE65D338FB25763BE58144EC47409B4F25DE78702C4FBFBB157D3E81E3B262E3480A6FBE25
31,716,091 UART: [art] PUB.Y = F3E186D8F82A06B081FA0E13A5E4BA6EFAF181CE59A6FB7B19B64C5564C73FED2BA88908A119093715DFC207A1DDEF8D
31,723,341 UART: [art] SIG.R = 4A9BF091E53DB57C57698252B961BFA2388CF2EAD1EF2EB18B7F76C4FA41056EAFF22FCB9D4EA848B5492C8C91F12BB2
31,730,790 UART: [art] SIG.S = CAAC9335AD971F292EFE07C547954A8077FBFA75AD15DE57811E92FD5F06AE4D26C85BCA69321752487DF3F3652B9552
33,036,575 UART: Caliptra RT
33,037,279 UART: [state] CFI Enabled
33,232,666 UART: [rt] RT listening for mailbox commands...
33,234,957 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,265,569 UART: [rt]cmd =0x44504543, len=96
39,035,365 >>> mbox cmd response data (6236 bytes)
39,064,497 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,095,239 UART: [rt]cmd =0x44504543, len=96
39,127,248 >>> mbox cmd response data (56 bytes)
39,127,963 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,158,099 UART: [rt]cmd =0x52564348, len=36
39,161,414 >>> mbox cmd response data (8 bytes)
39,161,955 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,192,526 UART: [rt]cmd =0x44504543, len=96
44,965,836 >>> mbox cmd response data (6236 bytes)
44,994,654 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,025,090 UART: [rt]cmd =0x53574545, len=84
50,610,618 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,341 UART:
192,710 UART: Running Caliptra ROM ...
193,802 UART:
603,541 UART: [state] CFI Enabled
618,195 UART: [state] LifecycleState = Unprovisioned
620,149 UART: [state] DebugLocked = No
622,873 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,936 UART: [kat] SHA2-256
797,732 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,250 UART: [kat] ++
808,697 UART: [kat] sha1
819,849 UART: [kat] SHA2-256
822,562 UART: [kat] SHA2-384
829,540 UART: [kat] SHA2-512-ACC
831,901 UART: [kat] ECC-384
3,115,984 UART: [kat] HMAC-384Kdf
3,127,259 UART: [kat] LMS
4,317,370 UART: [kat] --
4,321,093 UART: [cold-reset] ++
4,322,389 UART: [fht] Storing FHT @ 0x50003400
4,334,849 UART: [idev] ++
4,335,500 UART: [idev] CDI.KEYID = 6
4,336,411 UART: [idev] SUBJECT.KEYID = 7
4,337,652 UART: [idev] UDS.KEYID = 0
4,338,722 ready_for_fw is high
4,338,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,849 UART: [idev] Erasing UDS.KEYID = 0
7,623,231 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,488 UART: [idev] --
7,649,192 UART: [ldev] ++
7,649,768 UART: [ldev] CDI.KEYID = 6
7,650,780 UART: [ldev] SUBJECT.KEYID = 5
7,651,930 UART: [ldev] AUTHORITY.KEYID = 7
7,653,204 UART: [ldev] FE.KEYID = 1
7,665,197 UART: [ldev] Erasing FE.KEYID = 1
10,951,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,310 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,695 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,934 UART: [ldev] --
13,312,953 UART: [fwproc] Waiting for Commands...
13,315,569 UART: [fwproc] Received command 0x46574c44
13,317,754 UART: [fwproc] Received Image of size 118548 bytes
17,423,882 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,380 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,574,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,903,941 >>> mbox cmd response: success
17,907,447 UART: [afmc] ++
17,908,062 UART: [afmc] CDI.KEYID = 6
17,908,950 UART: [afmc] SUBJECT.KEYID = 7
17,910,221 UART: [afmc] AUTHORITY.KEYID = 5
21,221,845 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,753 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,516,009 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,545,204 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,638 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,694 UART: [afmc] --
23,583,614 UART: [cold-reset] --
23,587,627 UART: [state] Locking Datavault
23,590,925 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,671 UART: [state] Locking ICCM
23,594,600 UART: [exit] Launching FMC @ 0x40000130
23,602,991 UART:
23,603,224 UART: Running Caliptra FMC ...
23,604,319 UART:
23,604,474 UART: [state] CFI Enabled
23,612,734 UART: [fht] FMC Alias Private Key: 7
25,952,041 UART: [art] Extend RT PCRs Done
25,953,262 UART: [art] Lock RT PCRs Done
25,955,399 UART: [art] Populate DV Done
25,960,693 UART: [fht] FMC Alias Private Key: 7
25,962,386 UART: [art] Derive CDI
25,963,196 UART: [art] Store in slot 0x4
26,006,159 UART: [art] Derive Key Pair
26,007,148 UART: [art] Store priv key in slot 0x5
29,249,604 UART: [art] Derive Key Pair - Done
29,262,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,542,772 UART: [art] Erasing AUTHORITY.KEYID = 7
31,544,264 UART: [art] PUB.X = BB205ED8F9844C6698200716BBDBED1AAE1EEE84AEF05E0BD9BB88D2DF7A9F9E1EAED5253B15FD598746DDDAD0D7A190
31,551,577 UART: [art] PUB.Y = 64532E199E0DCC8E7D87BA08404699951F98EE6C1B985F24441917A73359B9AD2E5AB4EF8828CDE0028C452B06211558
31,558,789 UART: [art] SIG.R = 028AC4B274EC6986AA3C4F2C7E860FCBE69B59D3A90E8E19DF470FB11727EAC3DC72820B9FE936E2D70401B5C96CD959
31,566,223 UART: [art] SIG.S = 2FFBCD35A105A2A67EEDC2F728D0FB24C2902919260CAB96AEE6DC471FAEA99C8DAD51C32615D64DE18818ABF15F3839
32,871,465 UART: Caliptra RT
32,872,195 UART: [state] CFI Enabled
33,005,568 UART: [rt] RT listening for mailbox commands...
33,007,886 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,038,559 UART: [rt]cmd =0x44504543, len=96
38,713,228 >>> mbox cmd response data (6236 bytes)
38,742,397 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,773,268 UART: [rt]cmd =0x44504543, len=96
38,804,691 >>> mbox cmd response data (56 bytes)
38,805,426 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
38,835,511 UART: [rt]cmd =0x52564348, len=36
38,838,136 >>> mbox cmd response data (8 bytes)
38,838,688 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,869,388 UART: [rt]cmd =0x44504543, len=96
44,543,228 >>> mbox cmd response data (6236 bytes)
44,572,044 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,602,590 UART: [rt]cmd =0x53574545, len=84
50,127,511 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
4,124,955 ready_for_fw is high
4,125,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,945 >>> mbox cmd response: success
23,793,748 UART:
23,794,147 UART: Running Caliptra FMC ...
23,795,316 UART:
23,795,479 UART: [state] CFI Enabled
23,803,056 UART: [fht] FMC Alias Private Key: 7
26,143,292 UART: [art] Extend RT PCRs Done
26,144,523 UART: [art] Lock RT PCRs Done
26,146,364 UART: [art] Populate DV Done
26,151,623 UART: [fht] FMC Alias Private Key: 7
26,153,170 UART: [art] Derive CDI
26,153,982 UART: [art] Store in slot 0x4
26,196,312 UART: [art] Derive Key Pair
26,197,352 UART: [art] Store priv key in slot 0x5
29,439,779 UART: [art] Derive Key Pair - Done
29,452,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,733,598 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,106 UART: [art] PUB.X = 32D1846883D32A7FC851DDC5895941748CBE38989D0891CBB209CFCDC8B284F11D4E1A6395B4695B9DABB6E31B6F3D7A
31,742,410 UART: [art] PUB.Y = B8F6178530D0248C754B5A3B3A0D8E4E359DAB5F0FF4C174E5700E349328A6AC58CDD2B19A9D50059BABD9C5A7EB750C
31,749,668 UART: [art] SIG.R = CC29079DB6E27BC04B97370CF577FF429278F2F8CEEA99585B4EF5ECC94E1C62139F3704A6A97DB36B54527F72B10EA0
31,757,077 UART: [art] SIG.S = 9BBC9A9EBDBE03D930F5A2A2FE3E5837506BD8C35C7A909AF860AAD454E6E64F6E0C9BBFC1D08A393057C993DF25BDC2
33,062,404 UART: Caliptra RT
33,063,122 UART: [state] CFI Enabled
33,196,296 UART: [rt] RT listening for mailbox commands...
33,198,608 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,229,373 UART: [rt]cmd =0x44504543, len=96
38,903,135 >>> mbox cmd response data (6236 bytes)
38,932,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
38,963,057 UART: [rt]cmd =0x44504543, len=96
38,995,489 >>> mbox cmd response data (56 bytes)
38,996,251 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
39,026,321 UART: [rt]cmd =0x52564348, len=36
39,029,400 >>> mbox cmd response data (8 bytes)
39,029,882 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
39,060,310 UART: [rt]cmd =0x44504543, len=96
44,734,538 >>> mbox cmd response data (6236 bytes)
44,763,596 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,793,988 UART: [rt]cmd =0x53574545, len=84
50,318,927 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,101 UART:
192,460 UART: Running Caliptra ROM ...
193,592 UART:
193,734 UART: [state] CFI Enabled
264,031 UART: [state] LifecycleState = Unprovisioned
265,972 UART: [state] DebugLocked = No
268,656 UART: [state] WD Timer not started. Device not locked for debugging
271,912 UART: [kat] SHA2-256
451,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,358 UART: [kat] ++
462,832 UART: [kat] sha1
474,054 UART: [kat] SHA2-256
476,773 UART: [kat] SHA2-384
483,826 UART: [kat] SHA2-512-ACC
486,258 UART: [kat] ECC-384
2,949,145 UART: [kat] HMAC-384Kdf
2,972,042 UART: [kat] LMS
3,448,573 UART: [kat] --
3,452,988 UART: [cold-reset] ++
3,454,982 UART: [fht] FHT @ 0x50003400
3,465,526 UART: [idev] ++
3,466,080 UART: [idev] CDI.KEYID = 6
3,467,054 UART: [idev] SUBJECT.KEYID = 7
3,468,300 UART: [idev] UDS.KEYID = 0
3,469,195 ready_for_fw is high
3,469,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,462 UART: [idev] Erasing UDS.KEYID = 0
5,987,810 UART: [idev] Sha1 KeyId Algorithm
6,011,693 UART: [idev] --
6,016,723 UART: [ldev] ++
6,017,299 UART: [ldev] CDI.KEYID = 6
6,018,208 UART: [ldev] SUBJECT.KEYID = 5
6,019,424 UART: [ldev] AUTHORITY.KEYID = 7
6,020,707 UART: [ldev] FE.KEYID = 1
6,057,127 UART: [ldev] Erasing FE.KEYID = 1
8,562,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,529 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,416 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,824 UART: [ldev] --
10,372,687 UART: [fwproc] Wait for Commands...
10,374,344 UART: [fwproc] Recv command 0x46574c44
10,376,381 UART: [fwproc] Recv'd Img size: 118548 bytes
13,864,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,939,298 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,012,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,520 >>> mbox cmd response: success
14,345,366 UART: [afmc] ++
14,345,985 UART: [afmc] CDI.KEYID = 6
14,346,905 UART: [afmc] SUBJECT.KEYID = 7
14,348,117 UART: [afmc] AUTHORITY.KEYID = 5
16,896,417 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,507 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,287 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,338 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,953 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,974 UART: [afmc] --
18,716,995 UART: [cold-reset] --
18,719,933 UART: [state] Locking Datavault
18,727,011 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,760 UART: [state] Locking ICCM
18,730,040 UART: [exit] Launching FMC @ 0x40000130
18,738,433 UART:
18,738,664 UART: Running Caliptra FMC ...
18,739,759 UART:
18,739,920 UART: [state] CFI Enabled
18,795,851 UART: [fht] FMC Alias Private Key: 7
20,562,065 UART: [art] Extend RT PCRs Done
20,563,307 UART: [art] Lock RT PCRs Done
20,565,198 UART: [art] Populate DV Done
20,570,872 UART: [fht] FMC Alias Private Key: 7
20,572,579 UART: [art] Derive CDI
20,573,387 UART: [art] Store in slot 0x4
20,628,747 UART: [art] Derive Key Pair
20,629,784 UART: [art] Store priv key in slot 0x5
23,092,211 UART: [art] Derive Key Pair - Done
23,105,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,080 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,592 UART: [art] PUB.X = 1F5AD215A1E8CDDCFC6E20A3B44E73ABA05239C6358D3DF9B42443DA2969DE9D9E35D556E291D167132BF98536183520
24,827,847 UART: [art] PUB.Y = 72F75AE2C201AA3724940B27C9FA8AA3E1059CB892B6E4AE87D33F706B373361EC6D1DD692882110EF0A176CA97C439D
24,835,117 UART: [art] SIG.R = 751CDCA5ECD3A120A8719BF523027D31B886505CF5858E7AD45D65BC65BAEE998F2B419075123FEA5BAEAF5577D88CE7
24,842,520 UART: [art] SIG.S = 8BB5E260386D81C86FB789E34308D175E0D7146E1227B563F057499092B4C1F7115FDED8D75E65F8EE1AA0DE5067DE42
25,821,506 UART: Caliptra RT
25,822,205 UART: [state] CFI Enabled
26,003,509 UART: [rt] RT listening for mailbox commands...
26,005,757 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,036,526 UART: [rt]cmd =0x44504543, len=96
30,400,176 >>> mbox cmd response data (6236 bytes)
30,429,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,460,258 UART: [rt]cmd =0x44504543, len=96
30,491,990 >>> mbox cmd response data (56 bytes)
30,492,720 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,522,816 UART: [rt]cmd =0x52564348, len=36
30,525,867 >>> mbox cmd response data (8 bytes)
30,526,416 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,556,955 UART: [rt]cmd =0x44504543, len=96
34,922,850 >>> mbox cmd response data (6236 bytes)
34,951,672 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,982,139 UART: [rt]cmd =0x53574545, len=84
39,161,831 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,461,365 ready_for_fw is high
3,461,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,249,383 >>> mbox cmd response: success
18,533,321 UART:
18,533,724 UART: Running Caliptra FMC ...
18,534,835 UART:
18,535,010 UART: [state] CFI Enabled
18,605,293 UART: [fht] FMC Alias Private Key: 7
20,371,777 UART: [art] Extend RT PCRs Done
20,373,008 UART: [art] Lock RT PCRs Done
20,374,920 UART: [art] Populate DV Done
20,380,391 UART: [fht] FMC Alias Private Key: 7
20,381,981 UART: [art] Derive CDI
20,382,719 UART: [art] Store in slot 0x4
20,437,920 UART: [art] Derive Key Pair
20,438,916 UART: [art] Store priv key in slot 0x5
22,901,583 UART: [art] Derive Key Pair - Done
22,914,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,281 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,792 UART: [art] PUB.X = 81EB107AC563EA5783202FB9DA9ACBE82CB007D634B0286C28265D5402FA04822874E7E76CFBEE4A80A20A7E70B44BD8
24,637,043 UART: [art] PUB.Y = 3130E714F694CA0F31A8020A3E616925C6B9A84DB7DF7DE21723C3CA60124007AE3353451ACD9FBD696C4EA8F65F64DC
24,644,328 UART: [art] SIG.R = 94BECBA227EA7F340B76F57F58F905A65AB5778BF89666871232A506F170C515EBE04C0ECC80B91707EE7FAC126894EB
24,651,749 UART: [art] SIG.S = 119611CED9F204F2ABA14400473BAF01034E4D11DDF9C344A57F62D9D843119F085DA12DC66D409D5DCB0FE0C0F50728
25,630,762 UART: Caliptra RT
25,631,467 UART: [state] CFI Enabled
25,812,356 UART: [rt] RT listening for mailbox commands...
25,814,747 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,676 UART: [rt]cmd =0x44504543, len=96
30,209,966 >>> mbox cmd response data (6236 bytes)
30,239,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,269,790 UART: [rt]cmd =0x44504543, len=96
30,301,033 >>> mbox cmd response data (56 bytes)
30,301,796 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,331,711 UART: [rt]cmd =0x52564348, len=36
30,334,941 >>> mbox cmd response data (8 bytes)
30,335,483 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,366,131 UART: [rt]cmd =0x44504543, len=96
34,732,469 >>> mbox cmd response data (6236 bytes)
34,761,298 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,791,798 UART: [rt]cmd =0x53574545, len=84
38,969,800 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
192,428 UART:
192,811 UART: Running Caliptra ROM ...
193,942 UART:
603,421 UART: [state] CFI Enabled
618,449 UART: [state] LifecycleState = Unprovisioned
620,398 UART: [state] DebugLocked = No
622,502 UART: [state] WD Timer not started. Device not locked for debugging
626,188 UART: [kat] SHA2-256
805,869 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,601 UART: [kat] ++
817,150 UART: [kat] sha1
829,113 UART: [kat] SHA2-256
831,808 UART: [kat] SHA2-384
837,520 UART: [kat] SHA2-512-ACC
839,892 UART: [kat] ECC-384
3,279,105 UART: [kat] HMAC-384Kdf
3,291,970 UART: [kat] LMS
3,768,432 UART: [kat] --
3,774,863 UART: [cold-reset] ++
3,776,727 UART: [fht] FHT @ 0x50003400
3,787,934 UART: [idev] ++
3,788,546 UART: [idev] CDI.KEYID = 6
3,789,461 UART: [idev] SUBJECT.KEYID = 7
3,790,710 UART: [idev] UDS.KEYID = 0
3,791,636 ready_for_fw is high
3,791,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,539 UART: [idev] Erasing UDS.KEYID = 0
6,266,716 UART: [idev] Sha1 KeyId Algorithm
6,290,579 UART: [idev] --
6,295,601 UART: [ldev] ++
6,296,171 UART: [ldev] CDI.KEYID = 6
6,297,139 UART: [ldev] SUBJECT.KEYID = 5
6,298,296 UART: [ldev] AUTHORITY.KEYID = 7
6,299,601 UART: [ldev] FE.KEYID = 1
6,310,035 UART: [ldev] Erasing FE.KEYID = 1
8,791,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,837 UART: [ldev] --
10,586,913 UART: [fwproc] Wait for Commands...
10,590,127 UART: [fwproc] Recv command 0x46574c44
10,592,176 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,692 >>> mbox cmd response: success
14,560,036 UART: [afmc] ++
14,560,677 UART: [afmc] CDI.KEYID = 6
14,561,595 UART: [afmc] SUBJECT.KEYID = 7
14,562,819 UART: [afmc] AUTHORITY.KEYID = 5
17,068,693 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,012 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,789 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,873 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,508 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,531 UART: [afmc] --
18,868,866 UART: [cold-reset] --
18,873,376 UART: [state] Locking Datavault
18,878,466 UART: [state] Locking PCR0, PCR1 and PCR31
18,880,219 UART: [state] Locking ICCM
18,882,911 UART: [exit] Launching FMC @ 0x40000130
18,891,319 UART:
18,891,580 UART: Running Caliptra FMC ...
18,892,687 UART:
18,892,846 UART: [state] CFI Enabled
18,900,946 UART: [fht] FMC Alias Private Key: 7
20,667,600 UART: [art] Extend RT PCRs Done
20,668,821 UART: [art] Lock RT PCRs Done
20,670,505 UART: [art] Populate DV Done
20,676,139 UART: [fht] FMC Alias Private Key: 7
20,677,873 UART: [art] Derive CDI
20,678,737 UART: [art] Store in slot 0x4
20,721,503 UART: [art] Derive Key Pair
20,722,499 UART: [art] Store priv key in slot 0x5
23,149,466 UART: [art] Derive Key Pair - Done
23,162,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,639 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,145 UART: [art] PUB.X = B054222C6B5F8BE3CC248BCF3318FB7F6121A88FC566EAE6AD261E70582F23FB53767D4A82171495210526B3592251DF
24,877,414 UART: [art] PUB.Y = E4758936447A3245EABF2A2C1AE9673A0B58F930807207E15789F84480BF70DC7265E39825740E8280BF90833AB1C392
24,884,651 UART: [art] SIG.R = 114DFDFA92D05255F1137F25D0D145DCD452A72758F408DFFAC3C7C83DB72BE7A1E384BBFD063AA04A3113965890DD53
24,892,050 UART: [art] SIG.S = 1AE2743C531C6F50F4348F77A38201929D11E981CF878C13B7AA90206B2502A2318F058707FF6BFE9B1F5057CEF1CDE9
25,871,480 UART: Caliptra RT
25,872,179 UART: [state] CFI Enabled
26,006,362 UART: [rt] RT listening for mailbox commands...
26,008,655 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,039,349 UART: [rt]cmd =0x44504543, len=96
30,324,027 >>> mbox cmd response data (6236 bytes)
30,353,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,384,193 UART: [rt]cmd =0x44504543, len=96
30,415,633 >>> mbox cmd response data (56 bytes)
30,416,364 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,446,253 UART: [rt]cmd =0x52564348, len=36
30,449,096 >>> mbox cmd response data (8 bytes)
30,449,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,480,125 UART: [rt]cmd =0x44504543, len=96
34,765,321 >>> mbox cmd response data (6236 bytes)
34,794,142 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,824,625 UART: [rt]cmd =0x53574545, len=84
38,960,263 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,780,964 ready_for_fw is high
3,781,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,457,148 >>> mbox cmd response: success
18,702,749 UART:
18,703,134 UART: Running Caliptra FMC ...
18,704,329 UART:
18,704,512 UART: [state] CFI Enabled
18,712,606 UART: [fht] FMC Alias Private Key: 7
20,479,122 UART: [art] Extend RT PCRs Done
20,480,351 UART: [art] Lock RT PCRs Done
20,481,884 UART: [art] Populate DV Done
20,487,305 UART: [fht] FMC Alias Private Key: 7
20,488,899 UART: [art] Derive CDI
20,489,717 UART: [art] Store in slot 0x4
20,532,479 UART: [art] Derive Key Pair
20,533,517 UART: [art] Store priv key in slot 0x5
22,960,370 UART: [art] Derive Key Pair - Done
22,973,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,482 UART: [art] PUB.X = 22C13166CA72D4E06ACB63B3396063F150D203F4FC3893B2CE8A4B73573E089A2A36DA1D3D9C943240ED85B9152A33FC
24,688,697 UART: [art] PUB.Y = 856916CAA7E4732513257710C453581A23AAD04283D7EE2EC77ADB98388FA875AEEF0FF78CAF7E6DDBF6D88E1B6FD481
24,695,997 UART: [art] SIG.R = 3EDDDDECBF3532ECBF481CA35A666CDF353653FA0412B6F1AA2CC50A274AEE5A22C7B7E114F01CF6E30662AF0EE1CE16
24,703,410 UART: [art] SIG.S = 2189F3DDD79C32C0D347F578C16F77CB9B4982488A17247104552E91270463213E9EDBDAE1780F727D24E975C93CA4DC
25,682,218 UART: Caliptra RT
25,682,924 UART: [state] CFI Enabled
25,815,590 UART: [rt] RT listening for mailbox commands...
25,817,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,848,553 UART: [rt]cmd =0x44504543, len=96
30,134,877 >>> mbox cmd response data (6236 bytes)
30,164,762 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,195,425 UART: [rt]cmd =0x44504543, len=96
30,226,929 >>> mbox cmd response data (56 bytes)
30,227,807 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,258,167 UART: [rt]cmd =0x52564348, len=36
30,260,871 >>> mbox cmd response data (8 bytes)
30,261,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,291,932 UART: [rt]cmd =0x44504543, len=96
34,577,787 >>> mbox cmd response data (6236 bytes)
34,606,594 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,637,086 UART: [rt]cmd =0x53574545, len=84
38,772,678 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,008 UART:
192,370 UART: Running Caliptra ROM ...
193,471 UART:
193,616 UART: [state] CFI Enabled
263,239 UART: [state] LifecycleState = Unprovisioned
265,666 UART: [state] DebugLocked = No
267,624 UART: [state] WD Timer not started. Device not locked for debugging
272,720 UART: [kat] SHA2-256
462,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,400 UART: [kat] ++
473,853 UART: [kat] sha1
486,809 UART: [kat] SHA2-256
489,822 UART: [kat] SHA2-384
495,163 UART: [kat] SHA2-512-ACC
497,735 UART: [kat] ECC-384
2,947,547 UART: [kat] HMAC-384Kdf
2,970,207 UART: [kat] LMS
3,501,986 UART: [kat] --
3,506,921 UART: [cold-reset] ++
3,508,505 UART: [fht] FHT @ 0x50003400
3,519,355 UART: [idev] ++
3,519,988 UART: [idev] CDI.KEYID = 6
3,521,015 UART: [idev] SUBJECT.KEYID = 7
3,522,192 UART: [idev] UDS.KEYID = 0
3,523,119 ready_for_fw is high
3,523,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,447 UART: [idev] Erasing UDS.KEYID = 0
6,027,201 UART: [idev] Sha1 KeyId Algorithm
6,050,110 UART: [idev] --
6,054,487 UART: [ldev] ++
6,055,206 UART: [ldev] CDI.KEYID = 6
6,056,125 UART: [ldev] SUBJECT.KEYID = 5
6,057,287 UART: [ldev] AUTHORITY.KEYID = 7
6,058,516 UART: [ldev] FE.KEYID = 1
6,098,704 UART: [ldev] Erasing FE.KEYID = 1
8,604,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,335 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,899 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,590 UART: [ldev] --
10,413,563 UART: [fwproc] Wait for Commands...
10,415,273 UART: [fwproc] Recv command 0x46574c44
10,417,573 UART: [fwproc] Recv'd Img size: 118548 bytes
13,909,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,986 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,652 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,898 >>> mbox cmd response: success
14,674,177 UART: [afmc] ++
14,674,905 UART: [afmc] CDI.KEYID = 6
14,676,097 UART: [afmc] SUBJECT.KEYID = 7
14,677,534 UART: [afmc] AUTHORITY.KEYID = 5
17,211,378 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,849 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,993 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,910 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,120 UART: [afmc] --
19,011,258 UART: [cold-reset] --
19,014,751 UART: [state] Locking Datavault
19,021,726 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,881 UART: [state] Locking ICCM
19,026,846 UART: [exit] Launching FMC @ 0x40000130
19,035,522 UART:
19,035,755 UART: Running Caliptra FMC ...
19,036,851 UART:
19,037,007 UART: [state] CFI Enabled
19,092,836 UART: [fht] FMC Alias Private Key: 7
20,858,845 UART: [art] Extend RT PCRs Done
20,860,063 UART: [art] Lock RT PCRs Done
20,861,685 UART: [art] Populate DV Done
20,867,194 UART: [fht] FMC Alias Private Key: 7
20,868,781 UART: [art] Derive CDI
20,869,590 UART: [art] Store in slot 0x4
20,925,380 UART: [art] Derive Key Pair
20,926,374 UART: [art] Store priv key in slot 0x5
23,388,605 UART: [art] Derive Key Pair - Done
23,401,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,114,264 UART: [art] Erasing AUTHORITY.KEYID = 7
25,115,770 UART: [art] PUB.X = 34B1F5797F5CDBDFFA24919A1765B01CDD762E419C7C1A524F07922F5AB66CBA3BBC6DBB87C8A6479F171912E4F3580C
25,123,081 UART: [art] PUB.Y = FDDA8CE1978D57CD10DAFE35A6A8F3BA3E1CBD5FC78272CBA0C4B8BAEC384AEB40895A0751BE189124DF62535A431CB7
25,130,382 UART: [art] SIG.R = DC0574A4DAAD9FB00B8D75C76E41747F30096D6AF8D78A0B25D47291533116E49A5F6A423D72901F23BC9300A95B0DF5
25,137,730 UART: [art] SIG.S = 1C9648C758F2A8A308B586604BC6110585DCE0C4A4BB9C70C0B89E4EDD3F6E53D8D1F75016A3DB5FFC227C0FCEDA6D17
26,116,876 UART: Caliptra RT
26,117,583 UART: [state] CFI Enabled
26,297,733 UART: [rt] RT listening for mailbox commands...
26,300,007 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,330,514 UART: [rt]cmd =0x44504543, len=96
30,694,315 >>> mbox cmd response data (6236 bytes)
30,723,486 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,754,262 UART: [rt]cmd =0x44504543, len=96
30,786,093 >>> mbox cmd response data (56 bytes)
30,786,857 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,816,719 UART: [rt]cmd =0x52564348, len=36
30,819,783 >>> mbox cmd response data (8 bytes)
30,820,318 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,850,852 UART: [rt]cmd =0x44504543, len=96
35,216,772 >>> mbox cmd response data (6236 bytes)
35,245,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,276,095 UART: [rt]cmd =0x53574545, len=84
39,454,263 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
3,437,235 ready_for_fw is high
3,437,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,821,370 >>> mbox cmd response: success
19,110,681 UART:
19,111,076 UART: Running Caliptra FMC ...
19,112,281 UART:
19,112,467 UART: [state] CFI Enabled
19,177,936 UART: [fht] FMC Alias Private Key: 7
20,944,268 UART: [art] Extend RT PCRs Done
20,945,500 UART: [art] Lock RT PCRs Done
20,947,261 UART: [art] Populate DV Done
20,952,896 UART: [fht] FMC Alias Private Key: 7
20,954,502 UART: [art] Derive CDI
20,955,259 UART: [art] Store in slot 0x4
21,010,251 UART: [art] Derive Key Pair
21,011,258 UART: [art] Store priv key in slot 0x5
23,473,659 UART: [art] Derive Key Pair - Done
23,486,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,758 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,266 UART: [art] PUB.X = 35CB2A50C959F842D238F1897A9AA0C442AEA68ABBC17CD36E847D75421B5348181B79A91A55A8BD2198407DE65889CB
25,208,508 UART: [art] PUB.Y = 16434AD8BD8AD98BF557A4CE2C45A403C7A3A310597382968E35C205D275075FDD412F1F1559E56290B70A780FAF7AE3
25,215,762 UART: [art] SIG.R = E729B85F0A862085DEDEDBED00B628B3F0A9EF95EF67536C070031D5F85AD55CEE35715CB90A6A38FF820438C5C4BE81
25,223,140 UART: [art] SIG.S = 5378EFC1096A95F043B7F185C58CAEF0894F41D3D85064DEDB5E066E760385C7EAFC61BE3638DFC777E99CD619951732
26,201,680 UART: Caliptra RT
26,202,370 UART: [state] CFI Enabled
26,382,712 UART: [rt] RT listening for mailbox commands...
26,384,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,415,735 UART: [rt]cmd =0x44504543, len=96
30,780,197 >>> mbox cmd response data (6236 bytes)
30,809,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,840,218 UART: [rt]cmd =0x44504543, len=96
30,871,659 >>> mbox cmd response data (56 bytes)
30,872,367 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,902,369 UART: [rt]cmd =0x52564348, len=36
30,905,216 >>> mbox cmd response data (8 bytes)
30,905,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,936,364 UART: [rt]cmd =0x44504543, len=96
35,300,227 >>> mbox cmd response data (6236 bytes)
35,329,043 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,359,478 UART: [rt]cmd =0x53574545, len=84
39,538,048 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,378 UART:
192,758 UART: Running Caliptra ROM ...
193,903 UART:
603,545 UART: [state] CFI Enabled
619,987 UART: [state] LifecycleState = Unprovisioned
622,370 UART: [state] DebugLocked = No
623,535 UART: [state] WD Timer not started. Device not locked for debugging
629,011 UART: [kat] SHA2-256
818,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,664 UART: [kat] ++
830,193 UART: [kat] sha1
840,998 UART: [kat] SHA2-256
844,014 UART: [kat] SHA2-384
849,950 UART: [kat] SHA2-512-ACC
852,537 UART: [kat] ECC-384
3,295,856 UART: [kat] HMAC-384Kdf
3,308,381 UART: [kat] LMS
3,840,236 UART: [kat] --
3,843,350 UART: [cold-reset] ++
3,845,017 UART: [fht] FHT @ 0x50003400
3,856,670 UART: [idev] ++
3,857,392 UART: [idev] CDI.KEYID = 6
3,858,306 UART: [idev] SUBJECT.KEYID = 7
3,859,555 UART: [idev] UDS.KEYID = 0
3,860,772 ready_for_fw is high
3,860,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,863 UART: [idev] Erasing UDS.KEYID = 0
6,340,431 UART: [idev] Sha1 KeyId Algorithm
6,361,983 UART: [idev] --
6,366,191 UART: [ldev] ++
6,366,927 UART: [ldev] CDI.KEYID = 6
6,367,838 UART: [ldev] SUBJECT.KEYID = 5
6,369,000 UART: [ldev] AUTHORITY.KEYID = 7
6,370,241 UART: [ldev] FE.KEYID = 1
6,381,000 UART: [ldev] Erasing FE.KEYID = 1
8,864,258 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,602 UART: [ldev] --
10,653,157 UART: [fwproc] Wait for Commands...
10,654,725 UART: [fwproc] Recv command 0x46574c44
10,656,981 UART: [fwproc] Recv'd Img size: 118548 bytes
14,162,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,794 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,926,635 >>> mbox cmd response: success
14,931,378 UART: [afmc] ++
14,932,109 UART: [afmc] CDI.KEYID = 6
14,933,311 UART: [afmc] SUBJECT.KEYID = 7
14,934,762 UART: [afmc] AUTHORITY.KEYID = 5
17,437,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,156,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,158,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,174,030 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,189,195 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,204,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,228,431 UART: [afmc] --
19,232,312 UART: [cold-reset] --
19,234,948 UART: [state] Locking Datavault
19,240,163 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,325 UART: [state] Locking ICCM
19,243,787 UART: [exit] Launching FMC @ 0x40000130
19,252,481 UART:
19,252,727 UART: Running Caliptra FMC ...
19,253,833 UART:
19,253,993 UART: [state] CFI Enabled
19,262,154 UART: [fht] FMC Alias Private Key: 7
21,028,171 UART: [art] Extend RT PCRs Done
21,029,407 UART: [art] Lock RT PCRs Done
21,031,012 UART: [art] Populate DV Done
21,036,456 UART: [fht] FMC Alias Private Key: 7
21,038,060 UART: [art] Derive CDI
21,038,809 UART: [art] Store in slot 0x4
21,080,975 UART: [art] Derive Key Pair
21,082,019 UART: [art] Store priv key in slot 0x5
23,508,920 UART: [art] Derive Key Pair - Done
23,521,755 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,228,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,655 UART: [art] PUB.X = EE782395D926414A5ACE00C175036EF1C180398829AB02C9721AC7EFB28667B124AD4DBAF855B16ABDB58646183910C6
25,236,878 UART: [art] PUB.Y = AABA16E5ABB2E7169A3E702CAC751075DF7D506E76F09F9E7625F5301361E69D0305B43072194B642410603E9A6E5C30
25,244,141 UART: [art] SIG.R = 365A17FB9BEFCD72309958CB5E76ED2CB28A897014997C7DAF2BF86B119F664ACEF2C8D91CA404B2D6C3E2FC71739B18
25,251,515 UART: [art] SIG.S = 3881B3A723AF38ADF508AEEF1BFBF24B894692A8D72425ABDB95F154C7CD675432F3C2F781D41780F967281F4FE15495
26,230,733 UART: Caliptra RT
26,231,426 UART: [state] CFI Enabled
26,364,055 UART: [rt] RT listening for mailbox commands...
26,366,355 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,396,925 UART: [rt]cmd =0x44504543, len=96
30,683,070 >>> mbox cmd response data (6236 bytes)
30,712,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,742,677 UART: [rt]cmd =0x44504543, len=96
30,774,382 >>> mbox cmd response data (56 bytes)
30,775,119 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,805,169 UART: [rt]cmd =0x52564348, len=36
30,807,957 >>> mbox cmd response data (8 bytes)
30,808,531 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,839,099 UART: [rt]cmd =0x44504543, len=96
35,123,610 >>> mbox cmd response data (6236 bytes)
35,152,570 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,183,067 UART: [rt]cmd =0x53574545, len=84
39,319,391 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,758,750 ready_for_fw is high
3,759,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,426 >>> mbox cmd response: success
19,294,726 UART:
19,295,105 UART: Running Caliptra FMC ...
19,296,305 UART:
19,296,478 UART: [state] CFI Enabled
19,304,268 UART: [fht] FMC Alias Private Key: 7
21,070,077 UART: [art] Extend RT PCRs Done
21,071,306 UART: [art] Lock RT PCRs Done
21,073,216 UART: [art] Populate DV Done
21,078,619 UART: [fht] FMC Alias Private Key: 7
21,080,173 UART: [art] Derive CDI
21,080,996 UART: [art] Store in slot 0x4
21,123,598 UART: [art] Derive Key Pair
21,124,604 UART: [art] Store priv key in slot 0x5
23,551,306 UART: [art] Derive Key Pair - Done
23,564,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,568 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,090 UART: [art] PUB.X = F2A510FE7632EAFA6AA879908DF360F172033C42BEBE91382187E0A78EF9EE9EC614155B4B5A2B165F18508BC094BC38
25,279,374 UART: [art] PUB.Y = 2C431514F90393EA426844C4AD9E68630CD864160F7624A9B9FC3C5118F3B96782747630D55965B0B895AC6EB04448DF
25,286,583 UART: [art] SIG.R = 7AB412B853D2B40DC809D2A96181077F7A94B1C8A60E2B734E75CB3ABCAFE1D2FFB27954F4153891B750A05D986366E1
25,293,965 UART: [art] SIG.S = 91C09A9FD4D944B8A7B869304373956D3F6150B497F04434DEEE8D0C96109E45DB0E3A4996F746FB9A2F6C52FCAA26E6
26,273,265 UART: Caliptra RT
26,273,978 UART: [state] CFI Enabled
26,407,781 UART: [rt] RT listening for mailbox commands...
26,410,106 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,440,750 UART: [rt]cmd =0x44504543, len=96
30,726,667 >>> mbox cmd response data (6236 bytes)
30,755,994 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,786,797 UART: [rt]cmd =0x44504543, len=96
30,818,068 >>> mbox cmd response data (56 bytes)
30,818,797 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
30,848,634 UART: [rt]cmd =0x52564348, len=36
30,851,314 >>> mbox cmd response data (8 bytes)
30,851,860 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
30,882,399 UART: [rt]cmd =0x44504543, len=96
35,167,796 >>> mbox cmd response data (6236 bytes)
35,196,602 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,227,040 UART: [rt]cmd =0x53574545, len=84
39,362,806 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,392 UART: [state] LifecycleState = Unprovisioned
86,047 UART: [state] DebugLocked = No
86,665 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,223 UART: [kat] SHA2-256
882,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,269 UART: [kat] ++
886,421 UART: [kat] sha1
890,685 UART: [kat] SHA2-256
892,623 UART: [kat] SHA2-384
895,548 UART: [kat] SHA2-512-ACC
897,449 UART: [kat] ECC-384
902,926 UART: [kat] HMAC-384Kdf
907,614 UART: [kat] LMS
1,475,810 UART: [kat] --
1,476,705 UART: [cold-reset] ++
1,477,191 UART: [fht] Storing FHT @ 0x50003400
1,480,094 UART: [idev] ++
1,480,262 UART: [idev] CDI.KEYID = 6
1,480,622 UART: [idev] SUBJECT.KEYID = 7
1,481,046 UART: [idev] UDS.KEYID = 0
1,481,391 ready_for_fw is high
1,481,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,280 UART: [idev] Erasing UDS.KEYID = 0
1,505,410 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,056 UART: [idev] --
1,515,195 UART: [ldev] ++
1,515,363 UART: [ldev] CDI.KEYID = 6
1,515,726 UART: [ldev] SUBJECT.KEYID = 5
1,516,152 UART: [ldev] AUTHORITY.KEYID = 7
1,516,615 UART: [ldev] FE.KEYID = 1
1,522,011 UART: [ldev] Erasing FE.KEYID = 1
1,547,616 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,462 UART: [ldev] --
1,586,947 UART: [fwproc] Waiting for Commands...
1,587,684 UART: [fwproc] Received command 0x46574c44
1,588,475 UART: [fwproc] Received Image of size 118548 bytes
2,932,457 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,867 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,085 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,448 >>> mbox cmd response: success
3,132,474 UART: [afmc] ++
3,132,642 UART: [afmc] CDI.KEYID = 6
3,133,004 UART: [afmc] SUBJECT.KEYID = 7
3,133,429 UART: [afmc] AUTHORITY.KEYID = 5
3,168,708 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,282 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,771 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,654 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,337 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,259 UART: [afmc] --
3,212,237 UART: [cold-reset] --
3,213,071 UART: [state] Locking Datavault
3,214,240 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,844 UART: [state] Locking ICCM
3,215,298 UART: [exit] Launching FMC @ 0x40000130
3,220,628 UART:
3,220,644 UART: Running Caliptra FMC ...
3,221,052 UART:
3,221,106 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,974 UART: [art] Extend RT PCRs Done
3,351,402 UART: [art] Lock RT PCRs Done
3,353,076 UART: [art] Populate DV Done
3,361,203 UART: [fht] FMC Alias Private Key: 7
3,362,153 UART: [art] Derive CDI
3,362,433 UART: [art] Store in slot 0x4
3,448,399 UART: [art] Derive Key Pair
3,448,759 UART: [art] Store priv key in slot 0x5
3,462,138 UART: [art] Derive Key Pair - Done
3,476,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,967 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,732 UART: [art] PUB.X = FEEECFD48613CB1A5F8F79C62BC69283943814077C23F869447075FC8AE043B2AD7EAF35E42DAD69306E6220D383810E
3,499,502 UART: [art] PUB.Y = E59F80F4A68D314843BAE20E3556BDD6FB70A8227310CFADEFBEACC7EEB0A068D836C9350143E248CDB2A9541423D3F6
3,506,462 UART: [art] SIG.R = 0D3D15F40C8405AAC17A7B3A7B6AC3A4853B0AA27D92BB4E237FF51889FAD4FC049C9E9C36A9E7B1EE1D61691791AA3D
3,513,235 UART: [art] SIG.S = ACF836FF15E62B59B16F6FA0C2A3E1436A0032B95C375E9190327156A83C50492DCB99FBDBA7544CD32A8DB420727075
3,537,417 UART: Caliptra RT
3,537,668 UART: [state] CFI Enabled
3,658,330 UART: [rt] RT listening for mailbox commands...
3,659,000 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,174 UART: [rt]cmd =0x44504543, len=96
3,870,900 >>> mbox cmd response data (6236 bytes)
3,870,901 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,902 UART: [rt]cmd =0x44504543, len=96
3,932,813 >>> mbox cmd response data (56 bytes)
3,932,814 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,407 UART: [rt]cmd =0x52564348, len=36
3,965,069 >>> mbox cmd response data (8 bytes)
3,965,070 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,999 UART: [rt]cmd =0x44504543, len=96
4,176,782 >>> mbox cmd response data (6236 bytes)
4,176,783 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,206,648 UART: [rt]cmd =0x53574545, len=84
4,232,385 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,599 ready_for_fw is high
1,362,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,742 >>> mbox cmd response: success
3,042,195 UART:
3,042,211 UART: Running Caliptra FMC ...
3,042,619 UART:
3,042,673 UART: [state] CFI Enabled
3,053,527 UART: [fht] FMC Alias Private Key: 7
3,172,921 UART: [art] Extend RT PCRs Done
3,173,349 UART: [art] Lock RT PCRs Done
3,175,259 UART: [art] Populate DV Done
3,183,576 UART: [fht] FMC Alias Private Key: 7
3,184,716 UART: [art] Derive CDI
3,184,996 UART: [art] Store in slot 0x4
3,270,698 UART: [art] Derive Key Pair
3,271,058 UART: [art] Store priv key in slot 0x5
3,283,763 UART: [art] Derive Key Pair - Done
3,298,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,727 UART: [art] PUB.X = 116EAF4244BDB012210BCFF18B1712B387F9C29264FE0158633204719F69C27CB99FB16441A8EF8265C61D09192453AC
3,321,481 UART: [art] PUB.Y = 670D55F2B92AEC7B56019BFCE5800AEA06EE6C9E53F7CF40BA2F9335A3D1949317B4CE11BB3B665FE33FB3A9832B2E2C
3,328,437 UART: [art] SIG.R = 8E9E5186F57EFA489B918C6C6204BFCFF9629005A081AD06B07D8D2B03A42615DF9E95C6F58B059FB65F7ED77745C973
3,335,198 UART: [art] SIG.S = 841E340803B0DC10DA5C35AB476CD1BEE21F21AF9C7378E670344DAE4A9162C87D6D080A0E7C41254A0B4D39F668570B
3,359,067 UART: Caliptra RT
3,359,318 UART: [state] CFI Enabled
3,478,983 UART: [rt] RT listening for mailbox commands...
3,479,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,379 UART: [rt]cmd =0x44504543, len=96
3,692,009 >>> mbox cmd response data (6236 bytes)
3,692,010 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,943 UART: [rt]cmd =0x44504543, len=96
3,753,964 >>> mbox cmd response data (56 bytes)
3,753,965 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,388 UART: [rt]cmd =0x52564348, len=36
3,785,708 >>> mbox cmd response data (8 bytes)
3,785,709 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,815,550 UART: [rt]cmd =0x44504543, len=96
3,997,871 >>> mbox cmd response data (6236 bytes)
3,997,872 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,027,761 UART: [rt]cmd =0x53574545, len=84
4,053,840 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,195 UART: [state] LifecycleState = Unprovisioned
85,850 UART: [state] DebugLocked = No
86,364 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,066 UART: [kat] SHA2-256
881,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,112 UART: [kat] ++
886,264 UART: [kat] sha1
890,480 UART: [kat] SHA2-256
892,418 UART: [kat] SHA2-384
895,073 UART: [kat] SHA2-512-ACC
896,974 UART: [kat] ECC-384
902,671 UART: [kat] HMAC-384Kdf
907,377 UART: [kat] LMS
1,475,573 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,104 UART: [fht] Storing FHT @ 0x50003400
1,480,039 UART: [idev] ++
1,480,207 UART: [idev] CDI.KEYID = 6
1,480,567 UART: [idev] SUBJECT.KEYID = 7
1,480,991 UART: [idev] UDS.KEYID = 0
1,481,336 ready_for_fw is high
1,481,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,797 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,761 UART: [idev] --
1,514,640 UART: [ldev] ++
1,514,808 UART: [ldev] CDI.KEYID = 6
1,515,171 UART: [ldev] SUBJECT.KEYID = 5
1,515,597 UART: [ldev] AUTHORITY.KEYID = 7
1,516,060 UART: [ldev] FE.KEYID = 1
1,521,478 UART: [ldev] Erasing FE.KEYID = 1
1,546,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,675 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,407 UART: [ldev] --
1,585,736 UART: [fwproc] Waiting for Commands...
1,586,531 UART: [fwproc] Received command 0x46574c44
1,587,322 UART: [fwproc] Received Image of size 118548 bytes
2,932,336 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,890 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,108 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,537 >>> mbox cmd response: success
3,132,763 UART: [afmc] ++
3,132,931 UART: [afmc] CDI.KEYID = 6
3,133,293 UART: [afmc] SUBJECT.KEYID = 7
3,133,718 UART: [afmc] AUTHORITY.KEYID = 5
3,167,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,279 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,059 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,768 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,651 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,334 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,132 UART: [afmc] --
3,211,246 UART: [cold-reset] --
3,212,306 UART: [state] Locking Datavault
3,213,345 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,949 UART: [state] Locking ICCM
3,214,585 UART: [exit] Launching FMC @ 0x40000130
3,219,915 UART:
3,219,931 UART: Running Caliptra FMC ...
3,220,339 UART:
3,220,482 UART: [state] CFI Enabled
3,230,970 UART: [fht] FMC Alias Private Key: 7
3,350,258 UART: [art] Extend RT PCRs Done
3,350,686 UART: [art] Lock RT PCRs Done
3,352,114 UART: [art] Populate DV Done
3,360,441 UART: [fht] FMC Alias Private Key: 7
3,361,521 UART: [art] Derive CDI
3,361,801 UART: [art] Store in slot 0x4
3,447,237 UART: [art] Derive Key Pair
3,447,597 UART: [art] Store priv key in slot 0x5
3,460,466 UART: [art] Derive Key Pair - Done
3,475,106 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,759 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,524 UART: [art] PUB.X = AE1A69FD6CE4EA54E830F10F2845DAF150954D7F01F6BAD1FEFE716EEE5EF0AF86B91A4C134FF16CD211CC1A02A71442
3,498,309 UART: [art] PUB.Y = 6E918628ECBFC6361A2C369D0AC6FED184F8B3296F55FB5779794972D2D683360A5072F6CEF5A241DA9CF6FE1073BCB0
3,505,263 UART: [art] SIG.R = D6342E21DDDA4EFA8553CB8FBDE9E025D9C3C841076C1CD3AED1FDA52DB9EB42E86DC39FE6B0840F8096C1257DF6F727
3,512,051 UART: [art] SIG.S = CB8644913F727DAC6AB80A52961226CF48A7FAD58AE290F012CD6413E47EF0E04699552C6BF69608BA1CA20052A2BEF5
3,535,687 UART: Caliptra RT
3,536,030 UART: [state] CFI Enabled
3,656,621 UART: [rt] RT listening for mailbox commands...
3,657,291 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,793 UART: [rt]cmd =0x44504543, len=96
3,870,478 >>> mbox cmd response data (6236 bytes)
3,870,479 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,614 UART: [rt]cmd =0x44504543, len=96
3,933,081 >>> mbox cmd response data (56 bytes)
3,933,082 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,962,735 UART: [rt]cmd =0x52564348, len=36
3,965,003 >>> mbox cmd response data (8 bytes)
3,965,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,994,661 UART: [rt]cmd =0x44504543, len=96
4,176,159 >>> mbox cmd response data (6236 bytes)
4,176,160 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,205,839 UART: [rt]cmd =0x53574545, len=84
4,231,934 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,058 ready_for_fw is high
1,362,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,351 >>> mbox cmd response: success
3,043,302 UART:
3,043,318 UART: Running Caliptra FMC ...
3,043,726 UART:
3,043,869 UART: [state] CFI Enabled
3,054,529 UART: [fht] FMC Alias Private Key: 7
3,174,301 UART: [art] Extend RT PCRs Done
3,174,729 UART: [art] Lock RT PCRs Done
3,176,227 UART: [art] Populate DV Done
3,184,356 UART: [fht] FMC Alias Private Key: 7
3,185,364 UART: [art] Derive CDI
3,185,644 UART: [art] Store in slot 0x4
3,271,216 UART: [art] Derive Key Pair
3,271,576 UART: [art] Store priv key in slot 0x5
3,285,327 UART: [art] Derive Key Pair - Done
3,299,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,202 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,967 UART: [art] PUB.X = 599ADAB893E235DF45E4CED0A525DF204F35DAE7E9EA9F72C93BA6826AEFEF937284055C13FB56FDA021803380B787B9
3,322,748 UART: [art] PUB.Y = 2A669316C0ECE9F9A1E8C38D3FE624F88AE93AD6E61F9EC116F6D50100662E6DBA42EB55D8D84E211311E207B001A1D5
3,329,677 UART: [art] SIG.R = BF91266ABAF21393ECCAA0695B1C29BD2146853F5AD7B8B2813135A04B95E3EBE7E7C1D10F5DEAD5E6850651DE29D03E
3,336,457 UART: [art] SIG.S = 4F69AC7E93C59CB5AEC5F6031C238F3940BCE113819AE89730E731A05B23D3621956C86B05F676EDFC300AB3D3ACDDDB
3,359,918 UART: Caliptra RT
3,360,261 UART: [state] CFI Enabled
3,480,869 UART: [rt] RT listening for mailbox commands...
3,481,539 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,899 UART: [rt]cmd =0x44504543, len=96
3,693,228 >>> mbox cmd response data (6236 bytes)
3,693,229 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,108 UART: [rt]cmd =0x44504543, len=96
3,754,811 >>> mbox cmd response data (56 bytes)
3,754,812 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,784,367 UART: [rt]cmd =0x52564348, len=36
3,787,235 >>> mbox cmd response data (8 bytes)
3,787,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,115 UART: [rt]cmd =0x44504543, len=96
3,998,867 >>> mbox cmd response data (6236 bytes)
3,998,868 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,028,845 UART: [rt]cmd =0x53574545, len=84
4,055,032 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,460 UART: [state] LifecycleState = Unprovisioned
86,115 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
891,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,580 UART: [kat] ++
895,732 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,785 UART: [kat] SHA2-512-ACC
906,686 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,913 UART: [kat] LMS
1,169,225 UART: [kat] --
1,170,110 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 ready_for_fw is high
1,174,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,947 UART: [idev] Erasing UDS.KEYID = 0
1,198,923 UART: [idev] Sha1 KeyId Algorithm
1,207,859 UART: [idev] --
1,208,786 UART: [ldev] ++
1,208,954 UART: [ldev] CDI.KEYID = 6
1,209,318 UART: [ldev] SUBJECT.KEYID = 5
1,209,745 UART: [ldev] AUTHORITY.KEYID = 7
1,210,208 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,241,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,704 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,728 UART: [fwproc] Recv command 0x46574c44
1,282,461 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,803 >>> mbox cmd response: success
2,826,897 UART: [afmc] ++
2,827,065 UART: [afmc] CDI.KEYID = 6
2,827,428 UART: [afmc] SUBJECT.KEYID = 7
2,827,854 UART: [afmc] AUTHORITY.KEYID = 5
2,863,089 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,701 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,411 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,292 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,993 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,588 UART: [afmc] --
2,906,449 UART: [cold-reset] --
2,907,121 UART: [state] Locking Datavault
2,908,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,024 UART: [state] Locking ICCM
2,909,538 UART: [exit] Launching FMC @ 0x40000130
2,914,868 UART:
2,914,884 UART: Running Caliptra FMC ...
2,915,292 UART:
2,915,346 UART: [state] CFI Enabled
2,925,582 UART: [fht] FMC Alias Private Key: 7
3,044,678 UART: [art] Extend RT PCRs Done
3,045,106 UART: [art] Lock RT PCRs Done
3,046,974 UART: [art] Populate DV Done
3,055,023 UART: [fht] FMC Alias Private Key: 7
3,056,049 UART: [art] Derive CDI
3,056,329 UART: [art] Store in slot 0x4
3,142,520 UART: [art] Derive Key Pair
3,142,880 UART: [art] Store priv key in slot 0x5
3,155,926 UART: [art] Derive Key Pair - Done
3,171,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,718 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,483 UART: [art] PUB.X = 389067D5D9BCDBF8656834881EC0FCE6F5B5DBA1769D3EE5DEBED2161840F08E7603FEEABDFFA7F53213E1F5302B0BD3
3,194,269 UART: [art] PUB.Y = 15ADC8B81C0F37DEA2F9310F143ED93CC746FC088A89124EFB1E4CAAF93DD2CE869986FF14A4CE9C71E8336CB72CBF19
3,201,232 UART: [art] SIG.R = FAB4614BCC2B27179E0110B988BB015AB01DBF6788BF5C4A9182EBA41926273D4B761A869B56EE9142098385A5E29812
3,207,993 UART: [art] SIG.S = 027F81F0067B621BC800E9B6B87072AE26CC9BE138974A836698C9FCEA4E9C8925EE37893D94712E83539A1D4AE46FF5
3,232,213 UART: Caliptra RT
3,232,464 UART: [state] CFI Enabled
3,352,485 UART: [rt] RT listening for mailbox commands...
3,353,155 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,447 UART: [rt]cmd =0x44504543, len=96
3,564,694 >>> mbox cmd response data (6236 bytes)
3,564,695 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,498 UART: [rt]cmd =0x44504543, len=96
3,626,013 >>> mbox cmd response data (56 bytes)
3,626,014 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,381 UART: [rt]cmd =0x52564348, len=36
3,658,017 >>> mbox cmd response data (8 bytes)
3,658,018 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,099 UART: [rt]cmd =0x44504543, len=96
3,869,725 >>> mbox cmd response data (6236 bytes)
3,869,726 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,859 UART: [rt]cmd =0x53574545, len=84
3,926,003 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,878 ready_for_fw is high
1,058,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,982 >>> mbox cmd response: success
2,739,149 UART:
2,739,165 UART: Running Caliptra FMC ...
2,739,573 UART:
2,739,627 UART: [state] CFI Enabled
2,750,171 UART: [fht] FMC Alias Private Key: 7
2,869,491 UART: [art] Extend RT PCRs Done
2,869,919 UART: [art] Lock RT PCRs Done
2,871,539 UART: [art] Populate DV Done
2,879,876 UART: [fht] FMC Alias Private Key: 7
2,880,924 UART: [art] Derive CDI
2,881,204 UART: [art] Store in slot 0x4
2,966,517 UART: [art] Derive Key Pair
2,966,877 UART: [art] Store priv key in slot 0x5
2,980,489 UART: [art] Derive Key Pair - Done
2,995,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,212 UART: [art] PUB.X = 19F2CA13E9A9FBD0FB2346EA50C5BDEA653DDCBB7B2EA6EC014BD14CE788A33789B59300C2B3D10B06C6F99AD8543692
3,017,971 UART: [art] PUB.Y = 9AD5C06301B4F744A1A942A14FC5958F100D8A8F872BDAE29B2F325060241095AAE8F008CC45A964E8367D76EA58C158
3,024,914 UART: [art] SIG.R = F75F26E8DAD15D95BFC546E920BC8DE5BC5AF94027E7D1C9E39A9D66340BBB5DCFCDE23BBD4E9D750F7FB6C0BFFBB485
3,031,712 UART: [art] SIG.S = 32A50A24711FA59D2A44F7CA40BA3CD54E793EFACBD6FBFA1EBB374BA2693ED911278CDD36D5D292EC6A94A338CD3A9A
3,055,855 UART: Caliptra RT
3,056,106 UART: [state] CFI Enabled
3,175,297 UART: [rt] RT listening for mailbox commands...
3,175,967 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,549 UART: [rt]cmd =0x44504543, len=96
3,388,253 >>> mbox cmd response data (6236 bytes)
3,388,254 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,283 UART: [rt]cmd =0x44504543, len=96
3,451,168 >>> mbox cmd response data (56 bytes)
3,451,169 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,606 UART: [rt]cmd =0x52564348, len=36
3,483,226 >>> mbox cmd response data (8 bytes)
3,483,227 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,220 UART: [rt]cmd =0x44504543, len=96
3,695,667 >>> mbox cmd response data (6236 bytes)
3,695,668 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,699 UART: [rt]cmd =0x53574545, len=84
3,751,443 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,807 UART: [state] LifecycleState = Unprovisioned
86,462 UART: [state] DebugLocked = No
86,992 UART: [state] WD Timer not started. Device not locked for debugging
88,285 UART: [kat] SHA2-256
891,835 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,939 UART: [kat] ++
896,091 UART: [kat] sha1
900,269 UART: [kat] SHA2-256
902,209 UART: [kat] SHA2-384
905,116 UART: [kat] SHA2-512-ACC
907,017 UART: [kat] ECC-384
916,876 UART: [kat] HMAC-384Kdf
921,518 UART: [kat] LMS
1,169,830 UART: [kat] --
1,170,721 UART: [cold-reset] ++
1,171,141 UART: [fht] FHT @ 0x50003400
1,173,907 UART: [idev] ++
1,174,075 UART: [idev] CDI.KEYID = 6
1,174,436 UART: [idev] SUBJECT.KEYID = 7
1,174,861 UART: [idev] UDS.KEYID = 0
1,175,207 ready_for_fw is high
1,175,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,576 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,228 UART: [idev] --
1,209,161 UART: [ldev] ++
1,209,329 UART: [ldev] CDI.KEYID = 6
1,209,693 UART: [ldev] SUBJECT.KEYID = 5
1,210,120 UART: [ldev] AUTHORITY.KEYID = 7
1,210,583 UART: [ldev] FE.KEYID = 1
1,215,809 UART: [ldev] Erasing FE.KEYID = 1
1,241,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,647 UART: [ldev] --
1,280,998 UART: [fwproc] Wait for Commands...
1,281,767 UART: [fwproc] Recv command 0x46574c44
1,282,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,134 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,309 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,592 >>> mbox cmd response: success
2,826,654 UART: [afmc] ++
2,826,822 UART: [afmc] CDI.KEYID = 6
2,827,185 UART: [afmc] SUBJECT.KEYID = 7
2,827,611 UART: [afmc] AUTHORITY.KEYID = 5
2,863,460 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,718 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,428 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,309 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,010 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,637 UART: [afmc] --
2,906,566 UART: [cold-reset] --
2,907,344 UART: [state] Locking Datavault
2,908,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,051 UART: [state] Locking ICCM
2,909,659 UART: [exit] Launching FMC @ 0x40000130
2,914,989 UART:
2,915,005 UART: Running Caliptra FMC ...
2,915,413 UART:
2,915,556 UART: [state] CFI Enabled
2,926,096 UART: [fht] FMC Alias Private Key: 7
3,045,172 UART: [art] Extend RT PCRs Done
3,045,600 UART: [art] Lock RT PCRs Done
3,047,342 UART: [art] Populate DV Done
3,055,399 UART: [fht] FMC Alias Private Key: 7
3,056,361 UART: [art] Derive CDI
3,056,641 UART: [art] Store in slot 0x4
3,142,422 UART: [art] Derive Key Pair
3,142,782 UART: [art] Store priv key in slot 0x5
3,156,200 UART: [art] Derive Key Pair - Done
3,170,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,085 UART: [art] PUB.X = E58EBDD170ECB6114CACA88C32745B0C9466F946F113457E037CBF1ED7C69365E376AA9C98F8A31486F87F1ECBCD4F04
3,193,860 UART: [art] PUB.Y = 48646B97EBFA65827F818AB0F2059D4D83705F5B663801063AC3D3D98613EA424B6B35064F7C475CB275182C0D4969C8
3,200,789 UART: [art] SIG.R = 85E5FBDBF4544F6713377ABB0C7A889B6D037550C9B981DB8E3E22A2EE5857E676602DDBBA3436CB01171E1F32294BC6
3,207,558 UART: [art] SIG.S = F7D3A7EF98FE56B69B0EE53F9B9059076CA96DE70E1014B8FC914330C9AC0B568DDD2EB2A6A324A049C2BEE29F60D7CA
3,232,162 UART: Caliptra RT
3,232,505 UART: [state] CFI Enabled
3,351,979 UART: [rt] RT listening for mailbox commands...
3,352,649 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,149 UART: [rt]cmd =0x44504543, len=96
3,564,677 >>> mbox cmd response data (6236 bytes)
3,564,678 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,587 UART: [rt]cmd =0x44504543, len=96
3,627,004 >>> mbox cmd response data (56 bytes)
3,627,005 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,542 UART: [rt]cmd =0x52564348, len=36
3,659,352 >>> mbox cmd response data (8 bytes)
3,659,353 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,484 UART: [rt]cmd =0x44504543, len=96
3,872,507 >>> mbox cmd response data (6236 bytes)
3,872,508 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,695 UART: [rt]cmd =0x53574545, len=84
3,928,943 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,165 ready_for_fw is high
1,060,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,767 >>> mbox cmd response: success
2,739,704 UART:
2,739,720 UART: Running Caliptra FMC ...
2,740,128 UART:
2,740,271 UART: [state] CFI Enabled
2,750,661 UART: [fht] FMC Alias Private Key: 7
2,870,517 UART: [art] Extend RT PCRs Done
2,870,945 UART: [art] Lock RT PCRs Done
2,872,655 UART: [art] Populate DV Done
2,880,838 UART: [fht] FMC Alias Private Key: 7
2,881,778 UART: [art] Derive CDI
2,882,058 UART: [art] Store in slot 0x4
2,967,895 UART: [art] Derive Key Pair
2,968,255 UART: [art] Store priv key in slot 0x5
2,981,661 UART: [art] Derive Key Pair - Done
2,996,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,264 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,029 UART: [art] PUB.X = 92EF68C5BF8F5EF7773C3F483799125AF0B9D624CD9930CB9FB94BA228155695B0FC245CBC506DC8747839F28FC6B5DC
3,019,809 UART: [art] PUB.Y = 4018AA4C07FBC03EADA3C6C85FDC5B62DBE2046050AE7E2B3ABA2AC3682ECA7B8AD5350C26EDD29D9A2604156C7B8159
3,026,769 UART: [art] SIG.R = C24AD411956BDD7714F4B4ADD0A1E09F0B697B499133EF12D11A21A329F25AD1845A0DFFACFB6073492E8838C0E95561
3,033,541 UART: [art] SIG.S = FECFDC99F5922FEC491427610A9AC305A015DD432019C3541DDE3AD5A3E27956E34C69885EFB49EB939DA0265A54D9C7
3,057,135 UART: Caliptra RT
3,057,478 UART: [state] CFI Enabled
3,177,244 UART: [rt] RT listening for mailbox commands...
3,177,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,746 UART: [rt]cmd =0x44504543, len=96
3,390,891 >>> mbox cmd response data (6236 bytes)
3,390,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,891 UART: [rt]cmd =0x44504543, len=96
3,452,558 >>> mbox cmd response data (56 bytes)
3,452,559 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,174 UART: [rt]cmd =0x52564348, len=36
3,484,888 >>> mbox cmd response data (8 bytes)
3,484,889 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,010 UART: [rt]cmd =0x44504543, len=96
3,697,636 >>> mbox cmd response data (6236 bytes)
3,697,637 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,506 UART: [rt]cmd =0x53574545, len=84
3,753,958 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,027 UART: [kat] SHA2-256
903,967 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,062 UART: [kat] HMAC-384Kdf
922,550 UART: [kat] LMS
1,170,878 UART: [kat] --
1,171,809 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,175,016 UART: [idev] ++
1,175,184 UART: [idev] CDI.KEYID = 6
1,175,544 UART: [idev] SUBJECT.KEYID = 7
1,175,968 UART: [idev] UDS.KEYID = 0
1,176,313 ready_for_fw is high
1,176,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,200,971 UART: [idev] Sha1 KeyId Algorithm
1,209,311 UART: [idev] --
1,210,345 UART: [ldev] ++
1,210,513 UART: [ldev] CDI.KEYID = 6
1,210,876 UART: [ldev] SUBJECT.KEYID = 5
1,211,302 UART: [ldev] AUTHORITY.KEYID = 7
1,211,765 UART: [ldev] FE.KEYID = 1
1,217,005 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,519 UART: [ldev] --
1,283,022 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,442 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,941 >>> mbox cmd response: success
2,828,145 UART: [afmc] ++
2,828,313 UART: [afmc] CDI.KEYID = 6
2,828,675 UART: [afmc] SUBJECT.KEYID = 7
2,829,100 UART: [afmc] AUTHORITY.KEYID = 5
2,864,017 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,974 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,722 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,431 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,314 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,037 UART: [afmc] --
2,908,135 UART: [cold-reset] --
2,909,039 UART: [state] Locking Datavault
2,910,500 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,104 UART: [state] Locking ICCM
2,911,730 UART: [exit] Launching FMC @ 0x40000130
2,917,060 UART:
2,917,076 UART: Running Caliptra FMC ...
2,917,484 UART:
2,917,538 UART: [state] CFI Enabled
2,927,672 UART: [fht] FMC Alias Private Key: 7
3,047,076 UART: [art] Extend RT PCRs Done
3,047,504 UART: [art] Lock RT PCRs Done
3,048,804 UART: [art] Populate DV Done
3,056,991 UART: [fht] FMC Alias Private Key: 7
3,058,037 UART: [art] Derive CDI
3,058,317 UART: [art] Store in slot 0x4
3,144,458 UART: [art] Derive Key Pair
3,144,818 UART: [art] Store priv key in slot 0x5
3,158,112 UART: [art] Derive Key Pair - Done
3,172,811 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,428 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,193 UART: [art] PUB.X = D0D25F0FF2714A4C09A841FE242D29864AD9B482FCE583AD46785AAEFAE899F0FCB699B3EC2128BAA1E9C7FDECA6A737
3,195,981 UART: [art] PUB.Y = 1B555E3A4C4CF2ACB6C0D2A03FC47B45420122666B1DF504254A61860654EAF9D19C988066AD7EB48138867CDE71D47F
3,202,926 UART: [art] SIG.R = 8FA5C333B692AB33375468326D08587B93C6EA87BEB59545CAF00A0E10D6F88BF78B2F2E9F5D16D6689CC6B0A936A68C
3,209,695 UART: [art] SIG.S = D1649ACAE16D959D60E52D406FB50CC52D22D734CFC5DA3A359AB9E970304871F9E26B0F3E6E94FFF0E03B136ECBE6E9
3,233,387 UART: Caliptra RT
3,233,638 UART: [state] CFI Enabled
3,353,628 UART: [rt] RT listening for mailbox commands...
3,354,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,610 UART: [rt]cmd =0x44504543, len=96
3,566,233 >>> mbox cmd response data (6236 bytes)
3,566,234 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,325 UART: [rt]cmd =0x44504543, len=96
3,628,620 >>> mbox cmd response data (56 bytes)
3,628,621 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,272 UART: [rt]cmd =0x52564348, len=36
3,660,550 >>> mbox cmd response data (8 bytes)
3,660,551 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,512 UART: [rt]cmd =0x44504543, len=96
3,872,486 >>> mbox cmd response data (6236 bytes)
3,872,487 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,308 UART: [rt]cmd =0x53574545, len=84
3,928,460 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,441 ready_for_fw is high
1,060,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,836 >>> mbox cmd response: success
2,742,543 UART:
2,742,559 UART: Running Caliptra FMC ...
2,742,967 UART:
2,743,021 UART: [state] CFI Enabled
2,753,291 UART: [fht] FMC Alias Private Key: 7
2,872,735 UART: [art] Extend RT PCRs Done
2,873,163 UART: [art] Lock RT PCRs Done
2,874,489 UART: [art] Populate DV Done
2,882,878 UART: [fht] FMC Alias Private Key: 7
2,883,870 UART: [art] Derive CDI
2,884,150 UART: [art] Store in slot 0x4
2,969,955 UART: [art] Derive Key Pair
2,970,315 UART: [art] Store priv key in slot 0x5
2,983,447 UART: [art] Derive Key Pair - Done
2,998,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,359 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,124 UART: [art] PUB.X = BE3B4EC95EBA9A67761A9DBE15FAEC166247CB99EC7608D55CEE31E78A12C4F4BB49B4F5D97AE293A384A83BB38EC7FB
3,020,917 UART: [art] PUB.Y = FBABF7E9D9B353658D7D2A7F6970B534320CC7E6B7235671E6822B5E1719AD3C0E80250B9D81A23AB4811652BD9E5094
3,027,860 UART: [art] SIG.R = A4465930D6243E9CC10FC33AC89E2F2E7265B880F6C6E86D6AAA583975CB9FCA13389CAB19C056290062865F12417C68
3,034,605 UART: [art] SIG.S = 25794C7DCF6D4F57D746BAE7D8669526FD9C0EAA400AC37D8DA2FB783093F6A570E68B566A0A5A5483782EB63EAD2E2C
3,058,914 UART: Caliptra RT
3,059,165 UART: [state] CFI Enabled
3,179,394 UART: [rt] RT listening for mailbox commands...
3,180,064 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,352 UART: [rt]cmd =0x44504543, len=96
3,391,862 >>> mbox cmd response data (6236 bytes)
3,391,863 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,642 UART: [rt]cmd =0x44504543, len=96
3,453,317 >>> mbox cmd response data (56 bytes)
3,453,318 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,895 UART: [rt]cmd =0x52564348, len=36
3,485,559 >>> mbox cmd response data (8 bytes)
3,485,560 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,503 UART: [rt]cmd =0x44504543, len=96
3,697,081 >>> mbox cmd response data (6236 bytes)
3,697,082 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,726,961 UART: [rt]cmd =0x53574545, len=84
3,752,851 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,218 UART: [state] WD Timer not started. Device not locked for debugging
87,439 UART: [kat] SHA2-256
893,089 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,214 UART: [kat] ++
897,366 UART: [kat] sha1
901,422 UART: [kat] SHA2-256
903,362 UART: [kat] SHA2-384
906,113 UART: [kat] SHA2-512-ACC
908,014 UART: [kat] ECC-384
917,617 UART: [kat] HMAC-384Kdf
922,235 UART: [kat] LMS
1,170,563 UART: [kat] --
1,171,382 UART: [cold-reset] ++
1,171,896 UART: [fht] FHT @ 0x50003400
1,174,611 UART: [idev] ++
1,174,779 UART: [idev] CDI.KEYID = 6
1,175,139 UART: [idev] SUBJECT.KEYID = 7
1,175,563 UART: [idev] UDS.KEYID = 0
1,175,908 ready_for_fw is high
1,175,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,451 UART: [idev] Erasing UDS.KEYID = 0
1,200,792 UART: [idev] Sha1 KeyId Algorithm
1,209,294 UART: [idev] --
1,210,414 UART: [ldev] ++
1,210,582 UART: [ldev] CDI.KEYID = 6
1,210,945 UART: [ldev] SUBJECT.KEYID = 5
1,211,371 UART: [ldev] AUTHORITY.KEYID = 7
1,211,834 UART: [ldev] FE.KEYID = 1
1,217,102 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,500 UART: [ldev] --
1,282,865 UART: [fwproc] Wait for Commands...
1,283,553 UART: [fwproc] Recv command 0x46574c44
1,284,281 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,733 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,934 >>> mbox cmd response: success
2,827,010 UART: [afmc] ++
2,827,178 UART: [afmc] CDI.KEYID = 6
2,827,540 UART: [afmc] SUBJECT.KEYID = 7
2,827,965 UART: [afmc] AUTHORITY.KEYID = 5
2,863,916 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,305 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,762 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,645 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,346 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,068 UART: [afmc] --
2,907,160 UART: [cold-reset] --
2,907,928 UART: [state] Locking Datavault
2,909,223 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,827 UART: [state] Locking ICCM
2,910,263 UART: [exit] Launching FMC @ 0x40000130
2,915,593 UART:
2,915,609 UART: Running Caliptra FMC ...
2,916,017 UART:
2,916,160 UART: [state] CFI Enabled
2,926,718 UART: [fht] FMC Alias Private Key: 7
3,045,582 UART: [art] Extend RT PCRs Done
3,046,010 UART: [art] Lock RT PCRs Done
3,047,580 UART: [art] Populate DV Done
3,055,885 UART: [fht] FMC Alias Private Key: 7
3,056,929 UART: [art] Derive CDI
3,057,209 UART: [art] Store in slot 0x4
3,142,880 UART: [art] Derive Key Pair
3,143,240 UART: [art] Store priv key in slot 0x5
3,156,694 UART: [art] Derive Key Pair - Done
3,171,758 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,036 UART: [art] PUB.X = 946A4C55A42E7E123D32D54C4B9ECF65CB1A6EC7C912C49A317BC00C1A07FACABD16F42D662B149F87F1885F4C968F10
3,194,814 UART: [art] PUB.Y = E2E56A3BB0F1854A8FE6A82525932602256E4066B11EF03BA67940B9DDA5006263DE2E4ADE4F0064E9A80858EFDFDAEC
3,201,726 UART: [art] SIG.R = 558AE3FED06D40DFF43615DCDA4FD104A9286B7894A2B232B27A3DD9F35F4A5B721581D78D8A47A02E731ECBEEFE7C24
3,208,511 UART: [art] SIG.S = 5AD193BD75918622F56FAC91C915331924B204749E047B5CE1900B8F15D90E8B922AAB9A5F8AF8B2AF681C662512F504
3,232,686 UART: Caliptra RT
3,233,029 UART: [state] CFI Enabled
3,352,915 UART: [rt] RT listening for mailbox commands...
3,353,585 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,019 UART: [rt]cmd =0x44504543, len=96
3,566,034 >>> mbox cmd response data (6236 bytes)
3,566,035 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,596,064 UART: [rt]cmd =0x44504543, len=96
3,627,401 >>> mbox cmd response data (56 bytes)
3,627,402 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,047 UART: [rt]cmd =0x52564348, len=36
3,659,379 >>> mbox cmd response data (8 bytes)
3,659,380 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,187 UART: [rt]cmd =0x44504543, len=96
3,872,349 >>> mbox cmd response data (6236 bytes)
3,872,350 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,279 UART: [rt]cmd =0x53574545, len=84
3,927,833 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,330 ready_for_fw is high
1,060,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,611 >>> mbox cmd response: success
2,743,972 UART:
2,743,988 UART: Running Caliptra FMC ...
2,744,396 UART:
2,744,539 UART: [state] CFI Enabled
2,755,121 UART: [fht] FMC Alias Private Key: 7
2,874,445 UART: [art] Extend RT PCRs Done
2,874,873 UART: [art] Lock RT PCRs Done
2,876,537 UART: [art] Populate DV Done
2,884,694 UART: [fht] FMC Alias Private Key: 7
2,885,806 UART: [art] Derive CDI
2,886,086 UART: [art] Store in slot 0x4
2,972,123 UART: [art] Derive Key Pair
2,972,483 UART: [art] Store priv key in slot 0x5
2,986,119 UART: [art] Derive Key Pair - Done
3,000,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,990 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,755 UART: [art] PUB.X = 3ECDD75BE70A97768BF5915BD5C62A2207D73C45B4B6000B5D64E414B948D9E97C3DB1FCCB2F2EFD8090EC3D6B85D0AA
3,023,514 UART: [art] PUB.Y = B1FD73029A079709EB4931DA4ABB8E9DB3CF6511E84B12FAF084DA7D751B0321FB0CFF2668CD99DFCD43779025E51280
3,030,461 UART: [art] SIG.R = 948C4AAD2B78A02C63A68A9F951CD0C29F25D04FCAE7B158C3CFABAE0B38552F203067F39A3FEEDA345D7341C9C44398
3,037,244 UART: [art] SIG.S = D061EAF322F035810681505EE1912480CD5169E50A402993B1387011DE8D7A339602E9046D57D07791666D8B29F82C06
3,061,627 UART: Caliptra RT
3,061,970 UART: [state] CFI Enabled
3,181,850 UART: [rt] RT listening for mailbox commands...
3,182,520 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,852 UART: [rt]cmd =0x44504543, len=96
3,394,750 >>> mbox cmd response data (6236 bytes)
3,394,751 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,424,756 UART: [rt]cmd =0x44504543, len=96
3,457,167 >>> mbox cmd response data (56 bytes)
3,457,168 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,486,995 UART: [rt]cmd =0x52564348, len=36
3,489,699 >>> mbox cmd response data (8 bytes)
3,489,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,693 UART: [rt]cmd =0x44504543, len=96
3,702,038 >>> mbox cmd response data (6236 bytes)
3,702,039 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,688 UART: [rt]cmd =0x53574545, len=84
3,757,266 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,174 UART:
192,579 UART: Running Caliptra ROM ...
193,719 UART:
193,892 UART: [state] CFI Enabled
265,865 UART: [state] LifecycleState = Unprovisioned
267,796 UART: [state] DebugLocked = No
269,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,995 UART: [kat] SHA2-256
443,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,236 UART: [kat] ++
454,720 UART: [kat] sha1
465,978 UART: [kat] SHA2-256
468,671 UART: [kat] SHA2-384
475,591 UART: [kat] SHA2-512-ACC
477,969 UART: [kat] ECC-384
2,764,625 UART: [kat] HMAC-384Kdf
2,777,168 UART: [kat] LMS
3,967,454 UART: [kat] --
3,973,158 UART: [cold-reset] ++
3,974,114 UART: [fht] Storing FHT @ 0x50003400
3,984,973 UART: [idev] ++
3,985,574 UART: [idev] CDI.KEYID = 6
3,986,613 UART: [idev] SUBJECT.KEYID = 7
3,987,788 UART: [idev] UDS.KEYID = 0
3,988,837 ready_for_fw is high
3,989,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,578 UART: [idev] Erasing UDS.KEYID = 0
7,325,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,725 UART: [idev] --
7,351,129 UART: [ldev] ++
7,351,706 UART: [ldev] CDI.KEYID = 6
7,352,640 UART: [ldev] SUBJECT.KEYID = 5
7,353,850 UART: [ldev] AUTHORITY.KEYID = 7
7,355,133 UART: [ldev] FE.KEYID = 1
7,399,804 UART: [ldev] Erasing FE.KEYID = 1
10,733,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,770 UART: [ldev] --
13,114,127 UART: [fwproc] Waiting for Commands...
13,116,329 UART: [fwproc] Received command 0x46574c44
13,118,510 UART: [fwproc] Received Image of size 118548 bytes
17,233,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,312,202 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,385,374 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,714,393 >>> mbox cmd response: success
17,718,705 UART: [afmc] ++
17,719,321 UART: [afmc] CDI.KEYID = 6
17,720,239 UART: [afmc] SUBJECT.KEYID = 7
17,721,480 UART: [afmc] AUTHORITY.KEYID = 5
21,092,002 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,371 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,690 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,112 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,824 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,234 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,305 UART: [afmc] --
23,461,313 UART: [cold-reset] --
23,466,741 UART: [state] Locking Datavault
23,471,500 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,252 UART: [state] Locking ICCM
23,475,561 UART: [exit] Launching FMC @ 0x40000130
23,483,954 UART:
23,484,196 UART: Running Caliptra FMC ...
23,485,298 UART:
23,485,472 UART: [state] CFI Enabled
23,549,248 UART: [fht] FMC Alias Private Key: 7
25,910,760 UART: [art] Extend RT PCRs Done
25,911,985 UART: [art] Lock RT PCRs Done
25,913,797 UART: [art] Populate DV Done
25,919,209 UART: [fht] FMC Alias Private Key: 7
25,920,693 UART: [art] Derive CDI
25,921,452 UART: [art] Store in slot 0x4
25,978,333 UART: [art] Derive Key Pair
25,979,367 UART: [art] Store priv key in slot 0x5
29,271,705 UART: [art] Derive Key Pair - Done
29,284,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,573,055 UART: [art] Erasing AUTHORITY.KEYID = 7
31,574,566 UART: [art] PUB.X = EC3F0B7F92723C1F6CF63C9FA564C6400926D8F68717B2A795B7D807AB6CD5ADBC69D301CE75DC074195A8374A23C926
31,581,869 UART: [art] PUB.Y = 8B67F1B2D5A43E3F0611A06FE41E1CDCBE5B6911264C306C798FD9CD7F9746FA9E31E207ED8D1F70792CD727D2D9E870
31,589,102 UART: [art] SIG.R = B532B4D19C4A7A186359845B24469563D65E2A77C12C2C896C42DD0B22E198D7C4B6AAA82DFFE237CE6D87F46236697A
31,596,524 UART: [art] SIG.S = 57CFAF32D8806413491DF62F861CFD6E0086A3398E6B7F754BAA004F1BFCAFAD63AA56EDCB85384187062438A4286784
32,901,524 UART: Caliptra RT
32,902,222 UART: [state] CFI Enabled
33,078,074 UART: [rt] RT listening for mailbox commands...
33,080,390 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,111,070 UART: [rt]cmd =0x44504543, len=96
38,879,572 >>> mbox cmd response data (6236 bytes)
38,908,716 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,939,182 UART: [rt]cmd =0x53574545, len=84
44,524,688 >>> mbox cmd response data (200 bytes)
44,909,676 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,940,554 UART: [rt]cmd =0x44504543, len=96
44,972,045 >>> mbox cmd response data (56 bytes)
44,972,838 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,003,332 UART: [rt]cmd =0x44504543, len=96
45,053,441 >>> mbox cmd response data (24 bytes)
45,054,033 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,084,340 UART: [rt]cmd =0x53574545, len=84
50,666,255 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,784,254 ready_for_fw is high
3,784,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,935,918 >>> mbox cmd response: success
23,630,905 UART:
23,631,298 UART: Running Caliptra FMC ...
23,632,501 UART:
23,632,674 UART: [state] CFI Enabled
23,697,996 UART: [fht] FMC Alias Private Key: 7
26,038,907 UART: [art] Extend RT PCRs Done
26,040,133 UART: [art] Lock RT PCRs Done
26,041,985 UART: [art] Populate DV Done
26,047,634 UART: [fht] FMC Alias Private Key: 7
26,049,161 UART: [art] Derive CDI
26,049,934 UART: [art] Store in slot 0x4
26,105,568 UART: [art] Derive Key Pair
26,106,561 UART: [art] Store priv key in slot 0x5
29,399,347 UART: [art] Derive Key Pair - Done
29,412,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,699,969 UART: [art] Erasing AUTHORITY.KEYID = 7
31,701,494 UART: [art] PUB.X = 205885B757BECE6C698B79787563393C96E87BF37F96C50FDEF8FA978FAE5A14CCE6C53655EC3C2370169EC79EFCCDF4
31,708,752 UART: [art] PUB.Y = 074FFFFCC665B71ED67E9B2F1F776E2369F4F43E124F9B9A76DC3A5638556FBD58EADBD69E82B3A937BD38DA353E8D7B
31,716,063 UART: [art] SIG.R = AF6873FD87B9A5FF3BCF54366F1E712ABD8592C4B2EE0C51880979D578D7FBD518144C34649DBDCD77607ED9DFB9C615
31,723,455 UART: [art] SIG.S = 6ED05AAAE9339E96E08C9FC9681CDE9112F3B40F48B9750C78BCD535D1F308BC90DA9133B8440ABC5CB5A8BBD5C9E56E
33,028,614 UART: Caliptra RT
33,029,333 UART: [state] CFI Enabled
33,204,704 UART: [rt] RT listening for mailbox commands...
33,207,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,237,627 UART: [rt]cmd =0x44504543, len=96
39,006,096 >>> mbox cmd response data (6236 bytes)
39,035,255 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,065,806 UART: [rt]cmd =0x53574545, len=84
44,650,988 >>> mbox cmd response data (200 bytes)
45,036,513 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,067,535 UART: [rt]cmd =0x44504543, len=96
45,098,667 >>> mbox cmd response data (56 bytes)
45,099,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
45,129,791 UART: [rt]cmd =0x44504543, len=96
45,181,230 >>> mbox cmd response data (24 bytes)
45,181,825 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,212,070 UART: [rt]cmd =0x53574545, len=84
50,794,229 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,427 UART:
192,789 UART: Running Caliptra ROM ...
193,889 UART:
603,716 UART: [state] CFI Enabled
617,539 UART: [state] LifecycleState = Unprovisioned
619,487 UART: [state] DebugLocked = No
622,215 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,501 UART: [kat] SHA2-256
796,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,768 UART: [kat] ++
807,211 UART: [kat] sha1
818,152 UART: [kat] SHA2-256
820,868 UART: [kat] SHA2-384
825,544 UART: [kat] SHA2-512-ACC
827,961 UART: [kat] ECC-384
3,112,979 UART: [kat] HMAC-384Kdf
3,124,568 UART: [kat] LMS
4,314,698 UART: [kat] --
4,319,399 UART: [cold-reset] ++
4,320,753 UART: [fht] Storing FHT @ 0x50003400
4,333,080 UART: [idev] ++
4,333,652 UART: [idev] CDI.KEYID = 6
4,334,599 UART: [idev] SUBJECT.KEYID = 7
4,335,837 UART: [idev] UDS.KEYID = 0
4,336,815 ready_for_fw is high
4,337,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,866 UART: [idev] Erasing UDS.KEYID = 0
7,625,375 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,664 UART: [idev] --
7,651,878 UART: [ldev] ++
7,652,440 UART: [ldev] CDI.KEYID = 6
7,653,368 UART: [ldev] SUBJECT.KEYID = 5
7,654,626 UART: [ldev] AUTHORITY.KEYID = 7
7,655,827 UART: [ldev] FE.KEYID = 1
7,666,164 UART: [ldev] Erasing FE.KEYID = 1
10,954,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,855 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,233 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,414 UART: [ldev] --
13,314,364 UART: [fwproc] Waiting for Commands...
13,316,940 UART: [fwproc] Received command 0x46574c44
13,319,119 UART: [fwproc] Received Image of size 118548 bytes
17,421,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,099 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,568,273 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,412 >>> mbox cmd response: success
17,902,138 UART: [afmc] ++
17,902,752 UART: [afmc] CDI.KEYID = 6
17,903,639 UART: [afmc] SUBJECT.KEYID = 7
17,904,907 UART: [afmc] AUTHORITY.KEYID = 5
21,217,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,513,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,515,738 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,530,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,544,876 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,559,287 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,544 UART: [afmc] --
23,584,164 UART: [cold-reset] --
23,587,426 UART: [state] Locking Datavault
23,593,858 UART: [state] Locking PCR0, PCR1 and PCR31
23,595,550 UART: [state] Locking ICCM
23,597,640 UART: [exit] Launching FMC @ 0x40000130
23,606,033 UART:
23,606,273 UART: Running Caliptra FMC ...
23,607,366 UART:
23,607,522 UART: [state] CFI Enabled
23,615,345 UART: [fht] FMC Alias Private Key: 7
25,955,198 UART: [art] Extend RT PCRs Done
25,956,418 UART: [art] Lock RT PCRs Done
25,957,822 UART: [art] Populate DV Done
25,963,361 UART: [fht] FMC Alias Private Key: 7
25,964,897 UART: [art] Derive CDI
25,965,654 UART: [art] Store in slot 0x4
26,008,620 UART: [art] Derive Key Pair
26,009,622 UART: [art] Store priv key in slot 0x5
29,251,726 UART: [art] Derive Key Pair - Done
29,264,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,938 UART: [art] Erasing AUTHORITY.KEYID = 7
31,546,437 UART: [art] PUB.X = 615C02C2A819BB43C58437CC5DD01932AE1E8967C4FE7FFAAFDC963B54137476CAD1706ECF9480099158726E615D4888
31,553,728 UART: [art] PUB.Y = 19E15A85EDD7554A81E72945DF6F3114616FAA65A5B47372CAFD8FEDD5B379387FDD2192F19B2E0D67122ACA08A30796
31,561,001 UART: [art] SIG.R = E3D982D783C1AF373047352CB50177494B2532D2CECF51D95E1C21F4EE96A671B4CE66014C71E5EDC9D7A19365E4B338
31,568,388 UART: [art] SIG.S = B1F676D5E760F37B5099227C378DF08D0056DBEE3704A857DF33F797EF0C564AE86C55EE19FAD923B7A129D5A4707E13
32,873,513 UART: Caliptra RT
32,874,230 UART: [state] CFI Enabled
33,007,679 UART: [rt] RT listening for mailbox commands...
33,010,012 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,040,808 UART: [rt]cmd =0x44504543, len=96
38,715,415 >>> mbox cmd response data (6236 bytes)
38,744,743 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,775,251 UART: [rt]cmd =0x53574545, len=84
44,299,063 >>> mbox cmd response data (200 bytes)
44,683,488 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,714,504 UART: [rt]cmd =0x44504543, len=96
44,745,787 >>> mbox cmd response data (56 bytes)
44,746,570 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,777,103 UART: [rt]cmd =0x44504543, len=96
44,815,981 >>> mbox cmd response data (24 bytes)
44,816,546 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,847,024 UART: [rt]cmd =0x53574545, len=84
50,372,071 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
4,127,777 ready_for_fw is high
4,128,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,164,400 >>> mbox cmd response: success
23,812,062 UART:
23,812,453 UART: Running Caliptra FMC ...
23,813,583 UART:
23,813,734 UART: [state] CFI Enabled
23,821,685 UART: [fht] FMC Alias Private Key: 7
26,161,302 UART: [art] Extend RT PCRs Done
26,162,525 UART: [art] Lock RT PCRs Done
26,163,987 UART: [art] Populate DV Done
26,169,461 UART: [fht] FMC Alias Private Key: 7
26,171,159 UART: [art] Derive CDI
26,171,964 UART: [art] Store in slot 0x4
26,214,823 UART: [art] Derive Key Pair
26,215,818 UART: [art] Store priv key in slot 0x5
29,457,658 UART: [art] Derive Key Pair - Done
29,470,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,741 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,258 UART: [art] PUB.X = A1585724AC6E729BE8509E850878849B1D42590F710B6510EEDAD4BF0BA714E057997D765A78B0F49730C139ADBF0F2F
31,759,513 UART: [art] PUB.Y = E35C97A876ED236CF9D51CF72BA2CFAF9C36F6FEF23928AB06440BA97DCE1B0DDC0EEB94DC8D2C787278DC0218F709D6
31,766,758 UART: [art] SIG.R = E68F73AEC9C48978A671F3546079C5C437E72658AD6BA3F7601BDA3B0959CB90F0B38974E08AF01823B9B55E02F09A4D
31,774,150 UART: [art] SIG.S = CF124FDAC44B3425B0666FC6A09F8236850EE6295360EB4AD68174F6243F2794FC42E4ACF98B08A5F689BFE80B38903B
33,079,961 UART: Caliptra RT
33,080,678 UART: [state] CFI Enabled
33,214,455 UART: [rt] RT listening for mailbox commands...
33,216,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,247,508 UART: [rt]cmd =0x44504543, len=96
38,922,699 >>> mbox cmd response data (6236 bytes)
38,951,979 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,982,597 UART: [rt]cmd =0x53574545, len=84
44,507,448 >>> mbox cmd response data (200 bytes)
44,893,151 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,923,963 UART: [rt]cmd =0x44504543, len=96
44,955,829 >>> mbox cmd response data (56 bytes)
44,956,619 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,987,373 UART: [rt]cmd =0x44504543, len=96
45,025,852 >>> mbox cmd response data (24 bytes)
45,026,441 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,056,792 UART: [rt]cmd =0x53574545, len=84
50,582,118 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,067 UART:
192,444 UART: Running Caliptra ROM ...
193,650 UART:
193,809 UART: [state] CFI Enabled
264,002 UART: [state] LifecycleState = Unprovisioned
265,911 UART: [state] DebugLocked = No
267,796 UART: [state] WD Timer not started. Device not locked for debugging
272,262 UART: [kat] SHA2-256
451,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,672 UART: [kat] ++
463,149 UART: [kat] sha1
473,667 UART: [kat] SHA2-256
476,396 UART: [kat] SHA2-384
482,878 UART: [kat] SHA2-512-ACC
485,235 UART: [kat] ECC-384
2,947,686 UART: [kat] HMAC-384Kdf
2,971,523 UART: [kat] LMS
3,448,042 UART: [kat] --
3,453,148 UART: [cold-reset] ++
3,455,307 UART: [fht] FHT @ 0x50003400
3,467,421 UART: [idev] ++
3,467,982 UART: [idev] CDI.KEYID = 6
3,469,009 UART: [idev] SUBJECT.KEYID = 7
3,470,183 UART: [idev] UDS.KEYID = 0
3,471,223 ready_for_fw is high
3,471,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,469 UART: [idev] Erasing UDS.KEYID = 0
5,986,883 UART: [idev] Sha1 KeyId Algorithm
6,009,730 UART: [idev] --
6,015,440 UART: [ldev] ++
6,016,021 UART: [ldev] CDI.KEYID = 6
6,016,914 UART: [ldev] SUBJECT.KEYID = 5
6,018,125 UART: [ldev] AUTHORITY.KEYID = 7
6,019,350 UART: [ldev] FE.KEYID = 1
6,057,263 UART: [ldev] Erasing FE.KEYID = 1
8,562,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,286 UART: [ldev] --
10,373,271 UART: [fwproc] Wait for Commands...
10,375,040 UART: [fwproc] Recv command 0x46574c44
10,377,084 UART: [fwproc] Recv'd Img size: 118548 bytes
13,859,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,928,043 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,001,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,329,583 >>> mbox cmd response: success
14,333,823 UART: [afmc] ++
14,334,432 UART: [afmc] CDI.KEYID = 6
14,335,335 UART: [afmc] SUBJECT.KEYID = 7
14,336,610 UART: [afmc] AUTHORITY.KEYID = 5
16,869,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,593,653 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,595,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,611,620 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,627,701 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,643,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,226 UART: [afmc] --
18,672,851 UART: [cold-reset] --
18,676,921 UART: [state] Locking Datavault
18,683,681 UART: [state] Locking PCR0, PCR1 and PCR31
18,685,423 UART: [state] Locking ICCM
18,687,488 UART: [exit] Launching FMC @ 0x40000130
18,695,930 UART:
18,696,158 UART: Running Caliptra FMC ...
18,697,205 UART:
18,697,355 UART: [state] CFI Enabled
18,751,063 UART: [fht] FMC Alias Private Key: 7
20,517,781 UART: [art] Extend RT PCRs Done
20,519,013 UART: [art] Lock RT PCRs Done
20,520,833 UART: [art] Populate DV Done
20,526,360 UART: [fht] FMC Alias Private Key: 7
20,527,896 UART: [art] Derive CDI
20,528,707 UART: [art] Store in slot 0x4
20,584,006 UART: [art] Derive Key Pair
20,585,038 UART: [art] Store priv key in slot 0x5
23,048,298 UART: [art] Derive Key Pair - Done
23,061,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,773,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,774,815 UART: [art] PUB.X = 39915A4836BDA78A0E29DF555BC6C707ED09D66BF1D6ABE1B0318CB85CBDE4A520E3415ED9F7925C4B0942F994709BC2
24,782,118 UART: [art] PUB.Y = 17764695D63D42ACE58D216CA364B2B337222CE8ADC6176AC3948AB9FB050237723A6547C94C0E9E15946A98B853D3F8
24,789,373 UART: [art] SIG.R = 389D9F78748B874650F95532505E78B8E0AAA80D686276CA2F7C9FF692481D5EDA53C14CD6C5805CC1614C8159375084
24,796,706 UART: [art] SIG.S = 5C9F66D83A9C8628100CCE90D194BE8AEA7C39CE9152C60F0A2EF222627FCD00589675A628617C3B131BD57DEC330B16
25,775,818 UART: Caliptra RT
25,776,496 UART: [state] CFI Enabled
25,956,193 UART: [rt] RT listening for mailbox commands...
25,958,456 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,989,118 UART: [rt]cmd =0x44504543, len=96
30,353,519 >>> mbox cmd response data (6236 bytes)
30,382,739 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,413,500 UART: [rt]cmd =0x53574545, len=84
34,592,737 >>> mbox cmd response data (200 bytes)
34,976,772 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,007,773 UART: [rt]cmd =0x44504543, len=96
35,038,599 >>> mbox cmd response data (56 bytes)
35,039,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,069,795 UART: [rt]cmd =0x44504543, len=96
35,121,899 >>> mbox cmd response data (24 bytes)
35,122,465 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,152,736 UART: [rt]cmd =0x53574545, len=84
39,328,814 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,461,830 ready_for_fw is high
3,462,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,256,402 >>> mbox cmd response: success
18,537,140 UART:
18,537,520 UART: Running Caliptra FMC ...
18,538,651 UART:
18,538,809 UART: [state] CFI Enabled
18,602,685 UART: [fht] FMC Alias Private Key: 7
20,368,737 UART: [art] Extend RT PCRs Done
20,369,961 UART: [art] Lock RT PCRs Done
20,371,820 UART: [art] Populate DV Done
20,377,179 UART: [fht] FMC Alias Private Key: 7
20,378,755 UART: [art] Derive CDI
20,379,573 UART: [art] Store in slot 0x4
20,435,476 UART: [art] Derive Key Pair
20,436,472 UART: [art] Store priv key in slot 0x5
22,899,588 UART: [art] Derive Key Pair - Done
22,912,394 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,989 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,493 UART: [art] PUB.X = C085F3B8298A325E46C6E23CE3B6B8DF943D3888D76613AF90E122D8BA5D07940F287444CC6D396C8F5725F10E9B830C
24,633,752 UART: [art] PUB.Y = 3888C4EAAFBD5206ECCCA2E2D78E22ED0310AF474B44C33F1A38EBA8220F800972B1F977B6EE7EA9AF57D0AF786B4376
24,641,005 UART: [art] SIG.R = A572E487DC83840B98D0BFD9407EA15324C35FD6F9F42AEA8494DD7D1C468FFA6E6D0BF1F009279C044EC55CD3F00B4E
24,648,420 UART: [art] SIG.S = C40D33A3156665F167A9DE510FDA1E358D4FB5604D0776323FBEE706FEC24D5B8B514CE0A56DA62C2F2429C389CA00BB
25,626,886 UART: Caliptra RT
25,627,599 UART: [state] CFI Enabled
25,807,510 UART: [rt] RT listening for mailbox commands...
25,809,816 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,840,440 UART: [rt]cmd =0x44504543, len=96
30,205,017 >>> mbox cmd response data (6236 bytes)
30,234,379 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,264,943 UART: [rt]cmd =0x53574545, len=84
34,443,554 >>> mbox cmd response data (200 bytes)
34,828,230 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,859,161 UART: [rt]cmd =0x44504543, len=96
34,891,088 >>> mbox cmd response data (56 bytes)
34,891,862 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,922,506 UART: [rt]cmd =0x44504543, len=96
34,972,094 >>> mbox cmd response data (24 bytes)
34,972,696 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,002,943 UART: [rt]cmd =0x53574545, len=84
39,179,549 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,482 UART:
192,851 UART: Running Caliptra ROM ...
193,935 UART:
603,766 UART: [state] CFI Enabled
615,609 UART: [state] LifecycleState = Unprovisioned
617,514 UART: [state] DebugLocked = No
619,251 UART: [state] WD Timer not started. Device not locked for debugging
622,935 UART: [kat] SHA2-256
802,647 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,385 UART: [kat] ++
813,835 UART: [kat] sha1
824,070 UART: [kat] SHA2-256
826,734 UART: [kat] SHA2-384
833,298 UART: [kat] SHA2-512-ACC
835,670 UART: [kat] ECC-384
3,275,625 UART: [kat] HMAC-384Kdf
3,288,166 UART: [kat] LMS
3,764,627 UART: [kat] --
3,770,116 UART: [cold-reset] ++
3,771,477 UART: [fht] FHT @ 0x50003400
3,782,406 UART: [idev] ++
3,782,975 UART: [idev] CDI.KEYID = 6
3,783,933 UART: [idev] SUBJECT.KEYID = 7
3,785,185 UART: [idev] UDS.KEYID = 0
3,786,178 ready_for_fw is high
3,786,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,378 UART: [idev] Erasing UDS.KEYID = 0
6,262,718 UART: [idev] Sha1 KeyId Algorithm
6,286,229 UART: [idev] --
6,290,119 UART: [ldev] ++
6,290,748 UART: [ldev] CDI.KEYID = 6
6,291,847 UART: [ldev] SUBJECT.KEYID = 5
6,292,976 UART: [ldev] AUTHORITY.KEYID = 7
6,294,163 UART: [ldev] FE.KEYID = 1
6,306,917 UART: [ldev] Erasing FE.KEYID = 1
8,786,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,205 UART: [ldev] --
10,579,477 UART: [fwproc] Wait for Commands...
10,581,848 UART: [fwproc] Recv command 0x46574c44
10,583,834 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,146,741 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,219,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,142 >>> mbox cmd response: success
14,552,786 UART: [afmc] ++
14,553,401 UART: [afmc] CDI.KEYID = 6
14,554,380 UART: [afmc] SUBJECT.KEYID = 7
14,555,547 UART: [afmc] AUTHORITY.KEYID = 5
17,059,229 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,399 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,583 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,410 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,504 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,039 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,291 UART: [afmc] --
18,859,573 UART: [cold-reset] --
18,863,931 UART: [state] Locking Datavault
18,869,940 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,695 UART: [state] Locking ICCM
18,873,792 UART: [exit] Launching FMC @ 0x40000130
18,882,194 UART:
18,882,444 UART: Running Caliptra FMC ...
18,883,550 UART:
18,883,709 UART: [state] CFI Enabled
18,891,710 UART: [fht] FMC Alias Private Key: 7
20,658,085 UART: [art] Extend RT PCRs Done
20,659,293 UART: [art] Lock RT PCRs Done
20,660,593 UART: [art] Populate DV Done
20,666,350 UART: [fht] FMC Alias Private Key: 7
20,667,840 UART: [art] Derive CDI
20,668,657 UART: [art] Store in slot 0x4
20,711,212 UART: [art] Derive Key Pair
20,712,275 UART: [art] Store priv key in slot 0x5
23,138,525 UART: [art] Derive Key Pair - Done
23,151,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,199 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,697 UART: [art] PUB.X = 23DEFF95B9F28E1A3DA6AE75280A7B33B4DD067006ACBDFCA0BCF156ED360C8429EB9E294E7CEF0345DA93E5A38B207E
24,866,054 UART: [art] PUB.Y = CB3103F40266BE3A9FFC508D7215F83826F1F80D32EFB8CAD2D87E2C505D7E4C772EC6C69809FF31053A05AC71139B03
24,873,288 UART: [art] SIG.R = EA9DB01C2E06890FF77DAF36CCE8BD9D4EAD821717AED73C73C9E3ABD0482DF2FB13C550334E5D3385EC380B08AE2460
24,880,690 UART: [art] SIG.S = D0FB67C43934A2B9E3C50F6A7284F6E166F07527D52F66FF0536F3C5AD371B9B1CF8F1746CE3BC8C873CB10C43A9A094
25,859,695 UART: Caliptra RT
25,860,403 UART: [state] CFI Enabled
25,993,520 UART: [rt] RT listening for mailbox commands...
25,995,841 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,026,632 UART: [rt]cmd =0x44504543, len=96
30,311,847 >>> mbox cmd response data (6236 bytes)
30,340,999 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,371,572 UART: [rt]cmd =0x53574545, len=84
34,507,086 >>> mbox cmd response data (200 bytes)
34,890,365 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,921,345 UART: [rt]cmd =0x44504543, len=96
34,953,074 >>> mbox cmd response data (56 bytes)
34,953,883 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,984,529 UART: [rt]cmd =0x44504543, len=96
35,023,004 >>> mbox cmd response data (24 bytes)
35,023,624 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,054,311 UART: [rt]cmd =0x53574545, len=84
39,189,858 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
3,780,008 ready_for_fw is high
3,780,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,461 >>> mbox cmd response: success
18,699,662 UART:
18,700,058 UART: Running Caliptra FMC ...
18,701,176 UART:
18,701,331 UART: [state] CFI Enabled
18,709,275 UART: [fht] FMC Alias Private Key: 7
20,476,117 UART: [art] Extend RT PCRs Done
20,477,342 UART: [art] Lock RT PCRs Done
20,478,837 UART: [art] Populate DV Done
20,484,523 UART: [fht] FMC Alias Private Key: 7
20,486,172 UART: [art] Derive CDI
20,486,910 UART: [art] Store in slot 0x4
20,529,836 UART: [art] Derive Key Pair
20,530,878 UART: [art] Store priv key in slot 0x5
22,958,070 UART: [art] Derive Key Pair - Done
22,970,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,677,016 UART: [art] Erasing AUTHORITY.KEYID = 7
24,678,525 UART: [art] PUB.X = AD160C0EF04FFD1405AF0347E1FB3E5F0915ADDBA20022BB980E81FF1F0305B8EEDDABFC2ABF616C8E79EFEAB050C1E2
24,685,834 UART: [art] PUB.Y = 95ABFC616C0EF7DB957A45D36A1ACB9E1ED7178AF7C91FC9F34AE7925973F99A05B188B2856A3ABCA630CEC305788189
24,693,098 UART: [art] SIG.R = 3C79680B4F83CE6D076E7D162C7697B42E50D17C52026D1E6E7E760F17444E47C43D428B120562169829DE4F5A7EF385
24,700,453 UART: [art] SIG.S = C13A582D3F53646F981D36191C4963A704683D78A2BF361A59C63440B584080CFD92DEF469480D65E316344D13647FCE
25,679,434 UART: Caliptra RT
25,680,136 UART: [state] CFI Enabled
25,813,182 UART: [rt] RT listening for mailbox commands...
25,815,487 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,846,043 UART: [rt]cmd =0x44504543, len=96
30,131,598 >>> mbox cmd response data (6236 bytes)
30,160,735 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,191,388 UART: [rt]cmd =0x53574545, len=84
34,326,630 >>> mbox cmd response data (200 bytes)
34,709,138 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,740,079 UART: [rt]cmd =0x44504543, len=96
34,771,259 >>> mbox cmd response data (56 bytes)
34,772,082 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,802,521 UART: [rt]cmd =0x44504543, len=96
34,841,108 >>> mbox cmd response data (24 bytes)
34,841,719 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,872,404 UART: [rt]cmd =0x53574545, len=84
39,007,204 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,168 UART:
192,531 UART: Running Caliptra ROM ...
193,725 UART:
193,881 UART: [state] CFI Enabled
264,496 UART: [state] LifecycleState = Unprovisioned
266,895 UART: [state] DebugLocked = No
268,493 UART: [state] WD Timer not started. Device not locked for debugging
273,659 UART: [kat] SHA2-256
463,601 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,357 UART: [kat] ++
474,838 UART: [kat] sha1
486,492 UART: [kat] SHA2-256
489,515 UART: [kat] SHA2-384
496,824 UART: [kat] SHA2-512-ACC
499,378 UART: [kat] ECC-384
2,951,019 UART: [kat] HMAC-384Kdf
2,973,004 UART: [kat] LMS
3,504,805 UART: [kat] --
3,508,869 UART: [cold-reset] ++
3,511,293 UART: [fht] FHT @ 0x50003400
3,523,688 UART: [idev] ++
3,524,403 UART: [idev] CDI.KEYID = 6
3,525,310 UART: [idev] SUBJECT.KEYID = 7
3,526,550 UART: [idev] UDS.KEYID = 0
3,527,470 ready_for_fw is high
3,527,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,739 UART: [idev] Erasing UDS.KEYID = 0
6,029,514 UART: [idev] Sha1 KeyId Algorithm
6,051,393 UART: [idev] --
6,056,732 UART: [ldev] ++
6,057,413 UART: [ldev] CDI.KEYID = 6
6,058,318 UART: [ldev] SUBJECT.KEYID = 5
6,059,474 UART: [ldev] AUTHORITY.KEYID = 7
6,060,705 UART: [ldev] FE.KEYID = 1
6,101,817 UART: [ldev] Erasing FE.KEYID = 1
8,610,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,938 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,141 UART: [ldev] --
10,413,924 UART: [fwproc] Wait for Commands...
10,415,733 UART: [fwproc] Recv command 0x46574c44
10,418,054 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,378 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,994 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,677,492 >>> mbox cmd response: success
14,681,188 UART: [afmc] ++
14,681,906 UART: [afmc] CDI.KEYID = 6
14,683,093 UART: [afmc] SUBJECT.KEYID = 7
14,684,529 UART: [afmc] AUTHORITY.KEYID = 5
17,216,035 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,940,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,942,938 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,957,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,973,149 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,988,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,383 UART: [afmc] --
19,013,109 UART: [cold-reset] --
19,017,619 UART: [state] Locking Datavault
19,022,879 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,029 UART: [state] Locking ICCM
19,026,682 UART: [exit] Launching FMC @ 0x40000130
19,035,363 UART:
19,035,599 UART: Running Caliptra FMC ...
19,036,698 UART:
19,036,855 UART: [state] CFI Enabled
19,097,755 UART: [fht] FMC Alias Private Key: 7
20,864,357 UART: [art] Extend RT PCRs Done
20,865,582 UART: [art] Lock RT PCRs Done
20,867,399 UART: [art] Populate DV Done
20,872,858 UART: [fht] FMC Alias Private Key: 7
20,874,553 UART: [art] Derive CDI
20,875,283 UART: [art] Store in slot 0x4
20,930,995 UART: [art] Derive Key Pair
20,932,026 UART: [art] Store priv key in slot 0x5
23,394,822 UART: [art] Derive Key Pair - Done
23,407,612 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,120 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,621 UART: [art] PUB.X = BFDFF906BA17D14EC65EFC437A98D0C8DF0C08E0CE527809B181D9FFAB59E99814B074132FBDF7BED36E8C9F5317C5B1
25,128,883 UART: [art] PUB.Y = B99DF77D0C46657F7718932DBBF03955B2F0FC6ED9F318474719111AE94086BC9BCF335431CCE05F62FA3025D40CF4E3
25,136,154 UART: [art] SIG.R = E19A9632AA3E371915F3B5C19DFEE173BA23C9D63EF4C44A53CDE5F9E6F642D363E14D316FD25E6617A474EE994AA91F
25,143,572 UART: [art] SIG.S = 37C705FFF09D6A93C1C285930158C2B3E49A4E4EF12434BC299DE41B60D530916CB39BBB11B45DDFBF59F0D5AAEB6624
26,122,313 UART: Caliptra RT
26,123,019 UART: [state] CFI Enabled
26,304,587 UART: [rt] RT listening for mailbox commands...
26,306,844 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,337,473 UART: [rt]cmd =0x44504543, len=96
30,700,901 >>> mbox cmd response data (6236 bytes)
30,730,086 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,760,812 UART: [rt]cmd =0x53574545, len=84
34,939,756 >>> mbox cmd response data (200 bytes)
35,322,171 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,352,821 UART: [rt]cmd =0x44504543, len=96
35,384,633 >>> mbox cmd response data (56 bytes)
35,385,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,415,865 UART: [rt]cmd =0x44504543, len=96
35,468,740 >>> mbox cmd response data (24 bytes)
35,469,324 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,499,840 UART: [rt]cmd =0x53574545, len=84
39,676,978 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,439,888 ready_for_fw is high
3,440,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,420 >>> mbox cmd response: success
19,112,040 UART:
19,112,422 UART: Running Caliptra FMC ...
19,113,626 UART:
19,113,795 UART: [state] CFI Enabled
19,182,368 UART: [fht] FMC Alias Private Key: 7
20,948,687 UART: [art] Extend RT PCRs Done
20,949,908 UART: [art] Lock RT PCRs Done
20,951,531 UART: [art] Populate DV Done
20,957,059 UART: [fht] FMC Alias Private Key: 7
20,958,549 UART: [art] Derive CDI
20,959,284 UART: [art] Store in slot 0x4
21,015,188 UART: [art] Derive Key Pair
21,016,232 UART: [art] Store priv key in slot 0x5
23,478,827 UART: [art] Derive Key Pair - Done
23,491,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,206,413 UART: [art] PUB.X = 4E330A4A5584BABAFC1A84740268BA752F188D490A2BACD5836EC7D1126C9E67C1047D4729B5487CB9E3FE1150A4ACDA
25,213,703 UART: [art] PUB.Y = 89D514CEBEA710C2F72CC694B8DA96EFC43D672B018AB95EB3026E8BD3363F088AFC19BD7822ACA1BC46C28FFD0D8391
25,220,997 UART: [art] SIG.R = B9DC62F995B6516C2EE3E0E2E816F8DBBB0B95C77B8781D225F2ABAC6CAFD8D1F959D3B55E48BAEB08EA0B94370A5C0F
25,228,417 UART: [art] SIG.S = 2FC03146BA320265ECF02C3535D6341483EF3F473A0522B90FB337226E647EB680CE4104B63CA21C65E81CB2DF2C43FD
26,207,518 UART: Caliptra RT
26,208,239 UART: [state] CFI Enabled
26,386,547 UART: [rt] RT listening for mailbox commands...
26,388,878 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,419,551 UART: [rt]cmd =0x44504543, len=96
30,783,345 >>> mbox cmd response data (6236 bytes)
30,812,487 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,843,190 UART: [rt]cmd =0x53574545, len=84
35,020,935 >>> mbox cmd response data (200 bytes)
35,403,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,434,301 UART: [rt]cmd =0x44504543, len=96
35,465,972 >>> mbox cmd response data (56 bytes)
35,466,726 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,497,329 UART: [rt]cmd =0x44504543, len=96
35,549,332 >>> mbox cmd response data (24 bytes)
35,549,920 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,580,435 UART: [rt]cmd =0x53574545, len=84
39,756,854 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,498 UART:
192,874 UART: Running Caliptra ROM ...
194,065 UART:
603,658 UART: [state] CFI Enabled
620,662 UART: [state] LifecycleState = Unprovisioned
623,047 UART: [state] DebugLocked = No
625,229 UART: [state] WD Timer not started. Device not locked for debugging
629,780 UART: [kat] SHA2-256
819,713 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,460 UART: [kat] ++
831,064 UART: [kat] sha1
841,244 UART: [kat] SHA2-256
844,315 UART: [kat] SHA2-384
851,313 UART: [kat] SHA2-512-ACC
853,899 UART: [kat] ECC-384
3,295,538 UART: [kat] HMAC-384Kdf
3,308,298 UART: [kat] LMS
3,840,170 UART: [kat] --
3,845,450 UART: [cold-reset] ++
3,846,750 UART: [fht] FHT @ 0x50003400
3,859,124 UART: [idev] ++
3,859,774 UART: [idev] CDI.KEYID = 6
3,860,811 UART: [idev] SUBJECT.KEYID = 7
3,861,920 UART: [idev] UDS.KEYID = 0
3,862,849 ready_for_fw is high
3,863,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,878 UART: [idev] Erasing UDS.KEYID = 0
6,340,398 UART: [idev] Sha1 KeyId Algorithm
6,363,475 UART: [idev] --
6,369,092 UART: [ldev] ++
6,369,828 UART: [ldev] CDI.KEYID = 6
6,370,752 UART: [ldev] SUBJECT.KEYID = 5
6,371,930 UART: [ldev] AUTHORITY.KEYID = 7
6,373,107 UART: [ldev] FE.KEYID = 1
6,384,678 UART: [ldev] Erasing FE.KEYID = 1
8,863,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,652,647 UART: [ldev] --
10,657,358 UART: [fwproc] Wait for Commands...
10,658,869 UART: [fwproc] Recv command 0x46574c44
10,661,185 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,020 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,647 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,504 >>> mbox cmd response: success
14,918,091 UART: [afmc] ++
14,918,778 UART: [afmc] CDI.KEYID = 6
14,919,980 UART: [afmc] SUBJECT.KEYID = 7
14,921,430 UART: [afmc] AUTHORITY.KEYID = 5
17,420,241 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,570 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,677 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,818 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,737 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,836 UART: [afmc] --
19,216,059 UART: [cold-reset] --
19,220,438 UART: [state] Locking Datavault
19,227,654 UART: [state] Locking PCR0, PCR1 and PCR31
19,229,819 UART: [state] Locking ICCM
19,232,417 UART: [exit] Launching FMC @ 0x40000130
19,241,079 UART:
19,241,332 UART: Running Caliptra FMC ...
19,242,363 UART:
19,242,515 UART: [state] CFI Enabled
19,250,783 UART: [fht] FMC Alias Private Key: 7
21,017,458 UART: [art] Extend RT PCRs Done
21,018,682 UART: [art] Lock RT PCRs Done
21,020,125 UART: [art] Populate DV Done
21,025,274 UART: [fht] FMC Alias Private Key: 7
21,026,977 UART: [art] Derive CDI
21,027,715 UART: [art] Store in slot 0x4
21,070,745 UART: [art] Derive Key Pair
21,071,788 UART: [art] Store priv key in slot 0x5
23,498,428 UART: [art] Derive Key Pair - Done
23,511,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,545 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,075 UART: [art] PUB.X = D513CA845F509689C3095645CA80D850F9B3F55DF43D01E2947AB10965AA926CFDF633CBAFB580CFDA08951C72EB2FDA
25,226,349 UART: [art] PUB.Y = FCDB463BF63439608B157C906C7FF2004E9CB4600E6705430220BF40524715167C487DC44061316999B934C137C6C6BD
25,233,550 UART: [art] SIG.R = 58B51F453EC13C40F7FA3FD3CB2D7B1ADEE261ED63F65FB85CD843952457A25E19223977E0953919FAE2E5FB06F8C372
25,240,928 UART: [art] SIG.S = FAA10F075FCE8B61AF95CFA16AD6E2B7721C8C524DB796A5E3A1AD7E8916CF3732CB1169EB90F5C965016EAC68ED3E68
26,220,003 UART: Caliptra RT
26,220,722 UART: [state] CFI Enabled
26,353,495 UART: [rt] RT listening for mailbox commands...
26,355,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,386,210 UART: [rt]cmd =0x44504543, len=96
30,671,778 >>> mbox cmd response data (6236 bytes)
30,700,933 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,731,297 UART: [rt]cmd =0x53574545, len=84
34,866,682 >>> mbox cmd response data (200 bytes)
35,252,449 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,283,382 UART: [rt]cmd =0x44504543, len=96
35,315,155 >>> mbox cmd response data (56 bytes)
35,315,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,346,460 UART: [rt]cmd =0x44504543, len=96
35,385,042 >>> mbox cmd response data (24 bytes)
35,385,636 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,415,945 UART: [rt]cmd =0x53574545, len=84
39,551,727 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,748,954 ready_for_fw is high
3,749,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,797 >>> mbox cmd response: success
19,298,346 UART:
19,298,742 UART: Running Caliptra FMC ...
19,299,868 UART:
19,300,028 UART: [state] CFI Enabled
19,308,080 UART: [fht] FMC Alias Private Key: 7
21,073,782 UART: [art] Extend RT PCRs Done
21,075,008 UART: [art] Lock RT PCRs Done
21,076,566 UART: [art] Populate DV Done
21,081,730 UART: [fht] FMC Alias Private Key: 7
21,083,439 UART: [art] Derive CDI
21,084,180 UART: [art] Store in slot 0x4
21,126,667 UART: [art] Derive Key Pair
21,127,712 UART: [art] Store priv key in slot 0x5
23,554,837 UART: [art] Derive Key Pair - Done
23,567,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,976 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,485 UART: [art] PUB.X = A786C52C303A99302AEFB7007ECA5E2E47175DB02D7555DAB3DDA95DB79D2C61F81644290AC0B10C108310B47DD9841D
25,282,758 UART: [art] PUB.Y = 4E26488BB47352121E3101686880FDBD1558BB3B94CB3089EE8DE203507026C9507925EA908FC484B11A1A8DC4753C67
25,289,971 UART: [art] SIG.R = C820103EA081787398DED2BFCB575C5B5B26F9362766532883E7486574AD5D99E69181AC244D4698395B27F3DB85C1FD
25,297,348 UART: [art] SIG.S = 4907A8980B5CB7B5AD031D6667C58F947054D243721E8F3880039A149302B0C3A8A923501D59D562AF3EC5A46348B79D
26,276,739 UART: Caliptra RT
26,277,448 UART: [state] CFI Enabled
26,410,200 UART: [rt] RT listening for mailbox commands...
26,412,541 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,443,324 UART: [rt]cmd =0x44504543, len=96
30,729,543 >>> mbox cmd response data (6236 bytes)
30,758,715 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,789,342 UART: [rt]cmd =0x53574545, len=84
34,924,108 >>> mbox cmd response data (200 bytes)
35,306,052 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,337,215 UART: [rt]cmd =0x44504543, len=96
35,368,638 >>> mbox cmd response data (56 bytes)
35,369,403 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,399,832 UART: [rt]cmd =0x44504543, len=96
35,438,465 >>> mbox cmd response data (24 bytes)
35,439,070 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,469,326 UART: [rt]cmd =0x53574545, len=84
39,605,344 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,205 UART: [kat] SHA2-256
882,136 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,251 UART: [kat] ++
886,403 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,050 UART: [kat] SHA2-512-ACC
896,951 UART: [kat] ECC-384
902,272 UART: [kat] HMAC-384Kdf
906,810 UART: [kat] LMS
1,475,006 UART: [kat] --
1,475,705 UART: [cold-reset] ++
1,476,079 UART: [fht] Storing FHT @ 0x50003400
1,478,670 UART: [idev] ++
1,478,838 UART: [idev] CDI.KEYID = 6
1,479,198 UART: [idev] SUBJECT.KEYID = 7
1,479,622 UART: [idev] UDS.KEYID = 0
1,479,967 ready_for_fw is high
1,479,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,418 UART: [idev] Erasing UDS.KEYID = 0
1,503,994 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,738 UART: [idev] --
1,513,891 UART: [ldev] ++
1,514,059 UART: [ldev] CDI.KEYID = 6
1,514,422 UART: [ldev] SUBJECT.KEYID = 5
1,514,848 UART: [ldev] AUTHORITY.KEYID = 7
1,515,311 UART: [ldev] FE.KEYID = 1
1,520,395 UART: [ldev] Erasing FE.KEYID = 1
1,545,878 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,208 UART: [ldev] --
1,585,653 UART: [fwproc] Waiting for Commands...
1,586,306 UART: [fwproc] Received command 0x46574c44
1,587,097 UART: [fwproc] Received Image of size 118548 bytes
2,932,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,377 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,595 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,818 >>> mbox cmd response: success
3,132,056 UART: [afmc] ++
3,132,224 UART: [afmc] CDI.KEYID = 6
3,132,586 UART: [afmc] SUBJECT.KEYID = 7
3,133,011 UART: [afmc] AUTHORITY.KEYID = 5
3,167,956 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,240 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,612 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,295 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,165 UART: [afmc] --
3,211,287 UART: [cold-reset] --
3,212,251 UART: [state] Locking Datavault
3,213,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,662 UART: [state] Locking ICCM
3,214,312 UART: [exit] Launching FMC @ 0x40000130
3,219,642 UART:
3,219,658 UART: Running Caliptra FMC ...
3,220,066 UART:
3,220,120 UART: [state] CFI Enabled
3,230,708 UART: [fht] FMC Alias Private Key: 7
3,349,370 UART: [art] Extend RT PCRs Done
3,349,798 UART: [art] Lock RT PCRs Done
3,351,360 UART: [art] Populate DV Done
3,359,673 UART: [fht] FMC Alias Private Key: 7
3,360,759 UART: [art] Derive CDI
3,361,039 UART: [art] Store in slot 0x4
3,447,205 UART: [art] Derive Key Pair
3,447,565 UART: [art] Store priv key in slot 0x5
3,461,470 UART: [art] Derive Key Pair - Done
3,476,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,572 UART: [art] PUB.X = A1C28E4088CB5BE21C65C9DE3EDB03AAAC339E74F7384E94B63E86DA11593966851345A78897C9C545F28393B613A66B
3,499,341 UART: [art] PUB.Y = 044A1389C5A8FD4991BAE9E7F04C109B82D00773ACBBC08D53444A6C7253B380B783A6F938245562B57F1682AC590F84
3,506,280 UART: [art] SIG.R = 4FC1DE2340A64222519E322660FE6995ADF090725D48500D319B5E013F2ED263CB0433C023960EB2AA471F190246B05A
3,513,029 UART: [art] SIG.S = CDCE2B22BBC9F654DEE5D613043A099A0FC3F5376795A088C3492DFD0E13872E7680AB6C841A401195340EBF76D4554B
3,536,920 UART: Caliptra RT
3,537,171 UART: [state] CFI Enabled
3,657,533 UART: [rt] RT listening for mailbox commands...
3,658,203 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,521 UART: [rt]cmd =0x44504543, len=96
3,871,303 >>> mbox cmd response data (6236 bytes)
3,871,304 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,901,149 UART: [rt]cmd =0x53574545, len=84
3,926,598 >>> mbox cmd response data (200 bytes)
3,926,599 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,956,442 UART: [rt]cmd =0x44504543, len=96
3,988,889 >>> mbox cmd response data (56 bytes)
3,988,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,795 UART: [rt]cmd =0x44504543, len=96
4,059,059 >>> mbox cmd response data (24 bytes)
4,059,060 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,088,949 UART: [rt]cmd =0x53574545, len=84
4,114,604 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,029 ready_for_fw is high
1,363,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,884 >>> mbox cmd response: success
3,041,425 UART:
3,041,441 UART: Running Caliptra FMC ...
3,041,849 UART:
3,041,903 UART: [state] CFI Enabled
3,052,439 UART: [fht] FMC Alias Private Key: 7
3,171,311 UART: [art] Extend RT PCRs Done
3,171,739 UART: [art] Lock RT PCRs Done
3,173,265 UART: [art] Populate DV Done
3,181,608 UART: [fht] FMC Alias Private Key: 7
3,182,572 UART: [art] Derive CDI
3,182,852 UART: [art] Store in slot 0x4
3,268,358 UART: [art] Derive Key Pair
3,268,718 UART: [art] Store priv key in slot 0x5
3,281,655 UART: [art] Derive Key Pair - Done
3,296,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,168 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,933 UART: [art] PUB.X = 043F4ED92F50E6E0CDE1750C5E574AA332AF96C55A2D0133358138FF68FF7B139B66797B3F9ACBAFBF901324D5228A0F
3,319,701 UART: [art] PUB.Y = 51A55861657FBA69647E10C2FFC8F5251CEE6A345BA25875E5173F255D7FB141F64D1E9A7C4B138A2499D7342AD4CB09
3,326,652 UART: [art] SIG.R = AEA8D2E077D4FEBEE2B9DDD5430B2DFD7D74B07C1700AABC7888B8144A30783B259772ABF78E4DE97512517A705BD58E
3,333,413 UART: [art] SIG.S = 8EFD42ABBE36289312983ED9BBEC8E51B76AB0AEC238DBBCBD69F9FB85C63E873E4D5B8800D07BA8D38EED45E4AEEC36
3,357,471 UART: Caliptra RT
3,357,722 UART: [state] CFI Enabled
3,478,433 UART: [rt] RT listening for mailbox commands...
3,479,103 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,621 UART: [rt]cmd =0x44504543, len=96
3,691,376 >>> mbox cmd response data (6236 bytes)
3,691,377 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,430 UART: [rt]cmd =0x53574545, len=84
3,746,615 >>> mbox cmd response data (200 bytes)
3,746,616 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,776,699 UART: [rt]cmd =0x44504543, len=96
3,808,148 >>> mbox cmd response data (56 bytes)
3,808,149 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,838,090 UART: [rt]cmd =0x44504543, len=96
3,877,932 >>> mbox cmd response data (24 bytes)
3,877,933 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,907,772 UART: [rt]cmd =0x53574545, len=84
3,933,205 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,902 UART: [kat] SHA2-256
892,840 UART: [kat] SHA2-384
895,583 UART: [kat] SHA2-512-ACC
897,484 UART: [kat] ECC-384
903,221 UART: [kat] HMAC-384Kdf
907,933 UART: [kat] LMS
1,476,129 UART: [kat] --
1,477,124 UART: [cold-reset] ++
1,477,652 UART: [fht] Storing FHT @ 0x50003400
1,480,453 UART: [idev] ++
1,480,621 UART: [idev] CDI.KEYID = 6
1,480,981 UART: [idev] SUBJECT.KEYID = 7
1,481,405 UART: [idev] UDS.KEYID = 0
1,481,750 ready_for_fw is high
1,481,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,427 UART: [idev] Erasing UDS.KEYID = 0
1,506,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,317 UART: [idev] --
1,516,300 UART: [ldev] ++
1,516,468 UART: [ldev] CDI.KEYID = 6
1,516,831 UART: [ldev] SUBJECT.KEYID = 5
1,517,257 UART: [ldev] AUTHORITY.KEYID = 7
1,517,720 UART: [ldev] FE.KEYID = 1
1,522,784 UART: [ldev] Erasing FE.KEYID = 1
1,547,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,984 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,829 UART: [ldev] --
1,587,210 UART: [fwproc] Waiting for Commands...
1,587,925 UART: [fwproc] Received command 0x46574c44
1,588,716 UART: [fwproc] Received Image of size 118548 bytes
2,932,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,844 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,062 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,437 >>> mbox cmd response: success
3,133,553 UART: [afmc] ++
3,133,721 UART: [afmc] CDI.KEYID = 6
3,134,083 UART: [afmc] SUBJECT.KEYID = 7
3,134,508 UART: [afmc] AUTHORITY.KEYID = 5
3,169,663 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,607 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,979 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,662 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,358 UART: [afmc] --
3,212,298 UART: [cold-reset] --
3,213,202 UART: [state] Locking Datavault
3,214,355 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,959 UART: [state] Locking ICCM
3,215,457 UART: [exit] Launching FMC @ 0x40000130
3,220,787 UART:
3,220,803 UART: Running Caliptra FMC ...
3,221,211 UART:
3,221,354 UART: [state] CFI Enabled
3,232,020 UART: [fht] FMC Alias Private Key: 7
3,351,476 UART: [art] Extend RT PCRs Done
3,351,904 UART: [art] Lock RT PCRs Done
3,353,382 UART: [art] Populate DV Done
3,361,501 UART: [fht] FMC Alias Private Key: 7
3,362,581 UART: [art] Derive CDI
3,362,861 UART: [art] Store in slot 0x4
3,448,671 UART: [art] Derive Key Pair
3,449,031 UART: [art] Store priv key in slot 0x5
3,462,514 UART: [art] Derive Key Pair - Done
3,477,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,425 UART: [art] PUB.X = 58813A42DC409DE10A55D83EEF757C6F3C44D9478343A6018EDA6C47619703B6C1CCD6FD12E3DD285FC4B88F5ADDBEE0
3,500,202 UART: [art] PUB.Y = 8B47033E749969864EAF02070F624B9592094854B5817E6D1058C607AE3D6D9CD981814F3F134FF56854AFB79937E34D
3,507,124 UART: [art] SIG.R = 0A53A0220923F737ADB8F0990969803177380DC81A7BF510E44FA9ABE092C095FD1DC159231B062DAF91B00FBFBC6EC3
3,513,884 UART: [art] SIG.S = 1574E1B1FBDAE4DD88F2116FFB41950440DD78E8596902F181B35F92F5D304AEC424A69D3394C764EFA4DA7A695AB9CE
3,537,843 UART: Caliptra RT
3,538,186 UART: [state] CFI Enabled
3,658,041 UART: [rt] RT listening for mailbox commands...
3,658,711 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,341 UART: [rt]cmd =0x44504543, len=96
3,872,519 >>> mbox cmd response data (6236 bytes)
3,872,520 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,902,361 UART: [rt]cmd =0x53574545, len=84
3,927,802 >>> mbox cmd response data (200 bytes)
3,927,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,957,534 UART: [rt]cmd =0x44504543, len=96
3,988,913 >>> mbox cmd response data (56 bytes)
3,988,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,018,903 UART: [rt]cmd =0x44504543, len=96
4,059,411 >>> mbox cmd response data (24 bytes)
4,059,412 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,089,275 UART: [rt]cmd =0x53574545, len=84
4,115,682 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,642 ready_for_fw is high
1,362,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,979 >>> mbox cmd response: success
3,042,996 UART:
3,043,012 UART: Running Caliptra FMC ...
3,043,420 UART:
3,043,563 UART: [state] CFI Enabled
3,054,009 UART: [fht] FMC Alias Private Key: 7
3,173,123 UART: [art] Extend RT PCRs Done
3,173,551 UART: [art] Lock RT PCRs Done
3,175,243 UART: [art] Populate DV Done
3,183,510 UART: [fht] FMC Alias Private Key: 7
3,184,576 UART: [art] Derive CDI
3,184,856 UART: [art] Store in slot 0x4
3,270,612 UART: [art] Derive Key Pair
3,270,972 UART: [art] Store priv key in slot 0x5
3,284,571 UART: [art] Derive Key Pair - Done
3,299,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,004 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,769 UART: [art] PUB.X = 2CFB03AFA22B5252955F6AB06BC3EF795B9072D769629C0BF0C27E722ABDABFCF76018E41F41CDF5BD9E08878F74732C
3,322,546 UART: [art] PUB.Y = 8BCDF0A0E2A1F895CCEFA71F5CAF77A8AA6DBC44AA3F38ED7F70B98B01622BEABA405E7B2D47FDF072B0911D616FFC82
3,329,525 UART: [art] SIG.R = 5855C690BE253FD1AE4AE1985C3DDD219A84894F8F5054F730A3438D991F68E1D3693599DEB4BC10CE683CF0CC4A8D5C
3,336,305 UART: [art] SIG.S = 0D09AFFB3D26953F8E634B8E68105A0FEDD29978A122A6DBC5B1DCEAF64A91A7803FE0ED05D0880A234992F268488334
3,360,190 UART: Caliptra RT
3,360,533 UART: [state] CFI Enabled
3,481,036 UART: [rt] RT listening for mailbox commands...
3,481,706 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,100 UART: [rt]cmd =0x44504543, len=96
3,693,687 >>> mbox cmd response data (6236 bytes)
3,693,688 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,723,649 UART: [rt]cmd =0x53574545, len=84
3,749,872 >>> mbox cmd response data (200 bytes)
3,749,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,779,614 UART: [rt]cmd =0x44504543, len=96
3,811,279 >>> mbox cmd response data (56 bytes)
3,811,280 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,841,141 UART: [rt]cmd =0x44504543, len=96
3,881,513 >>> mbox cmd response data (24 bytes)
3,881,514 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,159 UART: [rt]cmd =0x53574545, len=84
3,937,142 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,713 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
900,124 UART: [kat] SHA2-256
902,064 UART: [kat] SHA2-384
904,711 UART: [kat] SHA2-512-ACC
906,612 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,095 UART: [kat] LMS
1,169,407 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,538 UART: [fht] FHT @ 0x50003400
1,173,278 UART: [idev] ++
1,173,446 UART: [idev] CDI.KEYID = 6
1,173,807 UART: [idev] SUBJECT.KEYID = 7
1,174,232 UART: [idev] UDS.KEYID = 0
1,174,578 ready_for_fw is high
1,174,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,123 UART: [idev] Erasing UDS.KEYID = 0
1,199,169 UART: [idev] Sha1 KeyId Algorithm
1,208,003 UART: [idev] --
1,209,114 UART: [ldev] ++
1,209,282 UART: [ldev] CDI.KEYID = 6
1,209,646 UART: [ldev] SUBJECT.KEYID = 5
1,210,073 UART: [ldev] AUTHORITY.KEYID = 7
1,210,536 UART: [ldev] FE.KEYID = 1
1,215,638 UART: [ldev] Erasing FE.KEYID = 1
1,241,427 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,271 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,908 UART: [ldev] --
1,280,201 UART: [fwproc] Wait for Commands...
1,280,924 UART: [fwproc] Recv command 0x46574c44
1,281,657 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,302 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,403 >>> mbox cmd response: success
2,825,439 UART: [afmc] ++
2,825,607 UART: [afmc] CDI.KEYID = 6
2,825,970 UART: [afmc] SUBJECT.KEYID = 7
2,826,396 UART: [afmc] AUTHORITY.KEYID = 5
2,861,681 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,194 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,943 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,653 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,534 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,235 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,974 UART: [afmc] --
2,905,009 UART: [cold-reset] --
2,905,875 UART: [state] Locking Datavault
2,907,108 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,712 UART: [state] Locking ICCM
2,908,266 UART: [exit] Launching FMC @ 0x40000130
2,913,596 UART:
2,913,612 UART: Running Caliptra FMC ...
2,914,020 UART:
2,914,074 UART: [state] CFI Enabled
2,924,616 UART: [fht] FMC Alias Private Key: 7
3,043,738 UART: [art] Extend RT PCRs Done
3,044,166 UART: [art] Lock RT PCRs Done
3,045,700 UART: [art] Populate DV Done
3,053,717 UART: [fht] FMC Alias Private Key: 7
3,054,767 UART: [art] Derive CDI
3,055,047 UART: [art] Store in slot 0x4
3,140,740 UART: [art] Derive Key Pair
3,141,100 UART: [art] Store priv key in slot 0x5
3,154,762 UART: [art] Derive Key Pair - Done
3,169,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,835 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,600 UART: [art] PUB.X = 105B689F5187166D1644F77AD9DF5B153767B7A13221EC7446999A6D46024AD81841EC04D91C9C953ED5318807464499
3,192,347 UART: [art] PUB.Y = 0DBB75555738931D3736EB46299714AB91B043070C97C4818699F437AD5828AE4BA0EE9ACA525617644CEA553920EAA3
3,199,284 UART: [art] SIG.R = 288EE588FAA5010B2482D200E0A8EB7F22481F489E1D5620D54B5DDC1020ACEFA2E07740946587C8621C6BF6A5937539
3,206,026 UART: [art] SIG.S = 3C7E4237797E31D231408505E8EBF8EE84F3ABFEAE919E2C431B3D899C6DC592C8DFAA6E069436EF38BBA9A8626BD06B
3,230,846 UART: Caliptra RT
3,231,097 UART: [state] CFI Enabled
3,350,117 UART: [rt] RT listening for mailbox commands...
3,350,787 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,293 UART: [rt]cmd =0x44504543, len=96
3,563,042 >>> mbox cmd response data (6236 bytes)
3,563,043 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,132 UART: [rt]cmd =0x53574545, len=84
3,619,020 >>> mbox cmd response data (200 bytes)
3,619,021 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,132 UART: [rt]cmd =0x44504543, len=96
3,681,483 >>> mbox cmd response data (56 bytes)
3,681,484 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,449 UART: [rt]cmd =0x44504543, len=96
3,751,701 >>> mbox cmd response data (24 bytes)
3,751,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,677 UART: [rt]cmd =0x53574545, len=84
3,807,505 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,206 ready_for_fw is high
1,059,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,270 >>> mbox cmd response: success
2,739,003 UART:
2,739,019 UART: Running Caliptra FMC ...
2,739,427 UART:
2,739,481 UART: [state] CFI Enabled
2,749,887 UART: [fht] FMC Alias Private Key: 7
2,869,175 UART: [art] Extend RT PCRs Done
2,869,603 UART: [art] Lock RT PCRs Done
2,870,969 UART: [art] Populate DV Done
2,879,156 UART: [fht] FMC Alias Private Key: 7
2,880,310 UART: [art] Derive CDI
2,880,590 UART: [art] Store in slot 0x4
2,966,167 UART: [art] Derive Key Pair
2,966,527 UART: [art] Store priv key in slot 0x5
2,980,121 UART: [art] Derive Key Pair - Done
2,994,619 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,329 UART: [art] PUB.X = 25CF25E522FB67E121D3B2FBF866E8ED987BAA4854B63801A351D2646AFC4999260034D77AA9AE73187718D19068CEE7
3,017,076 UART: [art] PUB.Y = 6476C3BFB52E88C2C5B5CD237642E240C6AE87CB96C5E608593373C14FD61002467C4AFAD0D651A11584B320F199E652
3,024,020 UART: [art] SIG.R = DF57E3F090D048E0FCB4E40BCBE37CF23334710C6059E1E3F8D46BBB57C0413560821A6363D36F5F8AFEC6E86F852AB4
3,030,796 UART: [art] SIG.S = 26E6D58936884A37689DDB266969A10A7EC01ABB1C3586E76E72576DCDBA6F6BBE0411DE087053CBC623FB2197BFB03E
3,054,555 UART: Caliptra RT
3,054,806 UART: [state] CFI Enabled
3,174,143 UART: [rt] RT listening for mailbox commands...
3,174,813 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,249 UART: [rt]cmd =0x44504543, len=96
3,386,356 >>> mbox cmd response data (6236 bytes)
3,386,357 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,210 UART: [rt]cmd =0x53574545, len=84
3,442,256 >>> mbox cmd response data (200 bytes)
3,442,257 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,472,338 UART: [rt]cmd =0x44504543, len=96
3,504,113 >>> mbox cmd response data (56 bytes)
3,504,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,533,975 UART: [rt]cmd =0x44504543, len=96
3,574,675 >>> mbox cmd response data (24 bytes)
3,574,676 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,604,397 UART: [rt]cmd =0x53574545, len=84
3,629,977 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,111 UART: [state] LifecycleState = Unprovisioned
85,766 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,755 UART: [kat] SHA2-256
891,305 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,409 UART: [kat] ++
895,561 UART: [kat] sha1
899,685 UART: [kat] SHA2-256
901,625 UART: [kat] SHA2-384
904,462 UART: [kat] SHA2-512-ACC
906,363 UART: [kat] ECC-384
916,038 UART: [kat] HMAC-384Kdf
920,752 UART: [kat] LMS
1,169,064 UART: [kat] --
1,169,761 UART: [cold-reset] ++
1,170,307 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,174,155 ready_for_fw is high
1,174,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,908 UART: [idev] Erasing UDS.KEYID = 0
1,199,160 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,241,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,975 UART: [ldev] --
1,281,358 UART: [fwproc] Wait for Commands...
1,281,949 UART: [fwproc] Recv command 0x46574c44
1,282,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,379 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,392 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,567 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,888 >>> mbox cmd response: success
2,826,018 UART: [afmc] ++
2,826,186 UART: [afmc] CDI.KEYID = 6
2,826,549 UART: [afmc] SUBJECT.KEYID = 7
2,826,975 UART: [afmc] AUTHORITY.KEYID = 5
2,862,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,641 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,100 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,981 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,682 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,559 UART: [afmc] --
2,906,378 UART: [cold-reset] --
2,907,166 UART: [state] Locking Datavault
2,908,401 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,005 UART: [state] Locking ICCM
2,909,515 UART: [exit] Launching FMC @ 0x40000130
2,914,845 UART:
2,914,861 UART: Running Caliptra FMC ...
2,915,269 UART:
2,915,412 UART: [state] CFI Enabled
2,925,906 UART: [fht] FMC Alias Private Key: 7
3,045,120 UART: [art] Extend RT PCRs Done
3,045,548 UART: [art] Lock RT PCRs Done
3,047,182 UART: [art] Populate DV Done
3,055,709 UART: [fht] FMC Alias Private Key: 7
3,056,829 UART: [art] Derive CDI
3,057,109 UART: [art] Store in slot 0x4
3,142,756 UART: [art] Derive Key Pair
3,143,116 UART: [art] Store priv key in slot 0x5
3,155,796 UART: [art] Derive Key Pair - Done
3,170,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,994 UART: [art] PUB.X = A8311AE4D420A31AEE0E00FF6184F4EB145F97923E3AEB4A8A5D8D3807979640919A4339087F27EB2083D44B81867143
3,193,729 UART: [art] PUB.Y = 1E5A546D38046E1A640337D337C99223D168142E767D2F0D11C626DCE10B258B0FBE39CD8873C09898736BEE876AB9FD
3,200,664 UART: [art] SIG.R = 9B692F31990D76E18A48AC5780083538FA978B385A0BFD087C46B9D1EC155DDE12D41210D4479174F397C821A119861E
3,207,416 UART: [art] SIG.S = CC14498A5E2779755D94C6A736374DFC353C972663E93D3E4498802BB453EFC1AB4C46C9FF1A65CE082EE937518102CF
3,231,108 UART: Caliptra RT
3,231,451 UART: [state] CFI Enabled
3,351,487 UART: [rt] RT listening for mailbox commands...
3,352,157 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,717 UART: [rt]cmd =0x44504543, len=96
3,564,533 >>> mbox cmd response data (6236 bytes)
3,564,534 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,594,369 UART: [rt]cmd =0x53574545, len=84
3,619,911 >>> mbox cmd response data (200 bytes)
3,619,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,649,973 UART: [rt]cmd =0x44504543, len=96
3,681,636 >>> mbox cmd response data (56 bytes)
3,681,637 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,488 UART: [rt]cmd =0x44504543, len=96
3,751,626 >>> mbox cmd response data (24 bytes)
3,751,627 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,781,442 UART: [rt]cmd =0x53574545, len=84
3,807,354 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,475 ready_for_fw is high
1,059,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,789 >>> mbox cmd response: success
2,741,020 UART:
2,741,036 UART: Running Caliptra FMC ...
2,741,444 UART:
2,741,587 UART: [state] CFI Enabled
2,752,131 UART: [fht] FMC Alias Private Key: 7
2,871,121 UART: [art] Extend RT PCRs Done
2,871,549 UART: [art] Lock RT PCRs Done
2,873,085 UART: [art] Populate DV Done
2,881,216 UART: [fht] FMC Alias Private Key: 7
2,882,370 UART: [art] Derive CDI
2,882,650 UART: [art] Store in slot 0x4
2,968,367 UART: [art] Derive Key Pair
2,968,727 UART: [art] Store priv key in slot 0x5
2,982,189 UART: [art] Derive Key Pair - Done
2,997,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,519 UART: [art] PUB.X = CB93D6786DF33AFCB833839A6C1B3B1A20EB2452159A13EEBE13D3F61088C5F0CB99E5B1C81B33CDE26B5D89CBBACCE0
3,020,313 UART: [art] PUB.Y = D9AE1C731DD242225201DCB3DA1C88B1460910A3B36BB9F1D82CA299D4CB4C1F384CA88F0F2B7FE85AC94E9D6127B569
3,027,268 UART: [art] SIG.R = 737813646791249C40C37E1B36D884EC72B2830504C7B7664BB934AD239DBF1AEEC7B2ED26FCEEB762DDA3825083A9E8
3,034,038 UART: [art] SIG.S = D84B88D50ACA874F1403B7CA84E8489FFB07B4453FDEADD433522EB787B6D93804C3DB87EFE7E312B754447E1AB725B8
3,058,062 UART: Caliptra RT
3,058,405 UART: [state] CFI Enabled
3,178,518 UART: [rt] RT listening for mailbox commands...
3,179,188 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,478 UART: [rt]cmd =0x44504543, len=96
3,391,609 >>> mbox cmd response data (6236 bytes)
3,391,610 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,421,385 UART: [rt]cmd =0x53574545, len=84
3,447,697 >>> mbox cmd response data (200 bytes)
3,447,698 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,477,575 UART: [rt]cmd =0x44504543, len=96
3,509,976 >>> mbox cmd response data (56 bytes)
3,509,977 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,030 UART: [rt]cmd =0x44504543, len=96
3,580,182 >>> mbox cmd response data (24 bytes)
3,580,183 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,008 UART: [rt]cmd =0x53574545, len=84
3,636,006 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,858 UART: [state] LifecycleState = Unprovisioned
85,513 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,256 UART: [kat] SHA2-512-ACC
908,157 UART: [kat] ECC-384
918,076 UART: [kat] HMAC-384Kdf
922,648 UART: [kat] LMS
1,170,976 UART: [kat] --
1,172,075 UART: [cold-reset] ++
1,172,627 UART: [fht] FHT @ 0x50003400
1,175,362 UART: [idev] ++
1,175,530 UART: [idev] CDI.KEYID = 6
1,175,890 UART: [idev] SUBJECT.KEYID = 7
1,176,314 UART: [idev] UDS.KEYID = 0
1,176,659 ready_for_fw is high
1,176,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,100 UART: [idev] Erasing UDS.KEYID = 0
1,201,625 UART: [idev] Sha1 KeyId Algorithm
1,210,263 UART: [idev] --
1,211,491 UART: [ldev] ++
1,211,659 UART: [ldev] CDI.KEYID = 6
1,212,022 UART: [ldev] SUBJECT.KEYID = 5
1,212,448 UART: [ldev] AUTHORITY.KEYID = 7
1,212,911 UART: [ldev] FE.KEYID = 1
1,217,985 UART: [ldev] Erasing FE.KEYID = 1
1,244,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,933 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,649 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,252 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,924 UART: [fwproc] Wait for Commands...
1,283,530 UART: [fwproc] Recv command 0x46574c44
1,284,258 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,661 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,208 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,419 >>> mbox cmd response: success
2,827,571 UART: [afmc] ++
2,827,739 UART: [afmc] CDI.KEYID = 6
2,828,101 UART: [afmc] SUBJECT.KEYID = 7
2,828,526 UART: [afmc] AUTHORITY.KEYID = 5
2,863,967 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,720 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,468 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,177 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,060 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,761 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,599 UART: [afmc] --
2,907,687 UART: [cold-reset] --
2,908,549 UART: [state] Locking Datavault
2,909,866 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,470 UART: [state] Locking ICCM
2,911,052 UART: [exit] Launching FMC @ 0x40000130
2,916,382 UART:
2,916,398 UART: Running Caliptra FMC ...
2,916,806 UART:
2,916,860 UART: [state] CFI Enabled
2,927,274 UART: [fht] FMC Alias Private Key: 7
3,046,930 UART: [art] Extend RT PCRs Done
3,047,358 UART: [art] Lock RT PCRs Done
3,049,046 UART: [art] Populate DV Done
3,057,185 UART: [fht] FMC Alias Private Key: 7
3,058,337 UART: [art] Derive CDI
3,058,617 UART: [art] Store in slot 0x4
3,144,006 UART: [art] Derive Key Pair
3,144,366 UART: [art] Store priv key in slot 0x5
3,156,844 UART: [art] Derive Key Pair - Done
3,171,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,217 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,982 UART: [art] PUB.X = 4ED5B5FF3AAF46A541C0955F62BECE9B472D88EB8D0D40F0EBD89F65A877A18AB1C9671D60398487F12E9EBA67FD641C
3,194,767 UART: [art] PUB.Y = 01D9BE1EFE41DD50CE753514C42C6BB15EAD89B10B4AB14A045659336E8D123663E687FCC7A1B8DCE68D21BB2ACBE7D7
3,201,728 UART: [art] SIG.R = 7EDD2058058DF4447E9682CA961864509C5FF79039F0F959BCF2508C0EE87AFBB7C6D6F93EA039C7D39E34DEEAEA6AAC
3,208,510 UART: [art] SIG.S = 122EAFA5903925C71A5649437CDADDEE2B7ECFAFEF4F08A05E874D677BC12661C48180D6B58CD2D334689E02F4F734F0
3,232,856 UART: Caliptra RT
3,233,107 UART: [state] CFI Enabled
3,352,397 UART: [rt] RT listening for mailbox commands...
3,353,067 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,803 UART: [rt]cmd =0x44504543, len=96
3,565,815 >>> mbox cmd response data (6236 bytes)
3,565,816 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,915 UART: [rt]cmd =0x53574545, len=84
3,621,969 >>> mbox cmd response data (200 bytes)
3,621,970 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,849 UART: [rt]cmd =0x44504543, len=96
3,683,960 >>> mbox cmd response data (56 bytes)
3,683,961 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,852 UART: [rt]cmd =0x44504543, len=96
3,754,202 >>> mbox cmd response data (24 bytes)
3,754,203 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,783,894 UART: [rt]cmd =0x53574545, len=84
3,809,600 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 ready_for_fw is high
1,060,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,916 >>> mbox cmd response: success
2,740,983 UART:
2,740,999 UART: Running Caliptra FMC ...
2,741,407 UART:
2,741,461 UART: [state] CFI Enabled
2,751,827 UART: [fht] FMC Alias Private Key: 7
2,870,515 UART: [art] Extend RT PCRs Done
2,870,943 UART: [art] Lock RT PCRs Done
2,872,249 UART: [art] Populate DV Done
2,880,400 UART: [fht] FMC Alias Private Key: 7
2,881,378 UART: [art] Derive CDI
2,881,658 UART: [art] Store in slot 0x4
2,966,995 UART: [art] Derive Key Pair
2,967,355 UART: [art] Store priv key in slot 0x5
2,980,985 UART: [art] Derive Key Pair - Done
2,995,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,904 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,669 UART: [art] PUB.X = 561499C2EAB79851432B8DA9996A4E3A3215B8E579719E49AE57514E39070A374D74D75F02D2B68587567814F2277FEE
3,018,420 UART: [art] PUB.Y = A9E23F0CDAAA77DCE49179B7DFE3194F3419C38C5BD5AEEC151CA512174022207498F03CEAA9EF7FEF34F492DA6F1E01
3,025,384 UART: [art] SIG.R = F43783DF399512C1EBB03D5CBAC1FF5AB6C1BCAAD3A6E909664A21BB3A20FCAA2BE2F22C4C0540B7A416A2059FDB4D13
3,032,171 UART: [art] SIG.S = 7B210E1DD84607801B98F30DA7C3A06C60BAFDB084A81B92CE7301ABF8BEFE70D4EC52F705E288CD0C77D21F46E25E8D
3,055,861 UART: Caliptra RT
3,056,112 UART: [state] CFI Enabled
3,175,211 UART: [rt] RT listening for mailbox commands...
3,175,881 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,085 UART: [rt]cmd =0x44504543, len=96
3,388,275 >>> mbox cmd response data (6236 bytes)
3,388,276 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,418,259 UART: [rt]cmd =0x53574545, len=84
3,444,143 >>> mbox cmd response data (200 bytes)
3,444,144 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,473,841 UART: [rt]cmd =0x44504543, len=96
3,505,872 >>> mbox cmd response data (56 bytes)
3,505,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,535,578 UART: [rt]cmd =0x44504543, len=96
3,576,012 >>> mbox cmd response data (24 bytes)
3,576,013 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,958 UART: [rt]cmd =0x53574545, len=84
3,631,076 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,909 UART: [state] LifecycleState = Unprovisioned
85,564 UART: [state] DebugLocked = No
86,106 UART: [state] WD Timer not started. Device not locked for debugging
87,271 UART: [kat] SHA2-256
892,921 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,046 UART: [kat] ++
897,198 UART: [kat] sha1
901,470 UART: [kat] SHA2-256
903,410 UART: [kat] SHA2-384
906,099 UART: [kat] SHA2-512-ACC
908,000 UART: [kat] ECC-384
917,575 UART: [kat] HMAC-384Kdf
922,183 UART: [kat] LMS
1,170,511 UART: [kat] --
1,171,322 UART: [cold-reset] ++
1,171,844 UART: [fht] FHT @ 0x50003400
1,174,467 UART: [idev] ++
1,174,635 UART: [idev] CDI.KEYID = 6
1,174,995 UART: [idev] SUBJECT.KEYID = 7
1,175,419 UART: [idev] UDS.KEYID = 0
1,175,764 ready_for_fw is high
1,175,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,729 UART: [idev] Erasing UDS.KEYID = 0
1,200,714 UART: [idev] Sha1 KeyId Algorithm
1,209,142 UART: [idev] --
1,210,038 UART: [ldev] ++
1,210,206 UART: [ldev] CDI.KEYID = 6
1,210,569 UART: [ldev] SUBJECT.KEYID = 5
1,210,995 UART: [ldev] AUTHORITY.KEYID = 7
1,211,458 UART: [ldev] FE.KEYID = 1
1,217,092 UART: [ldev] Erasing FE.KEYID = 1
1,243,449 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,393 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,440 UART: [ldev] --
1,282,935 UART: [fwproc] Wait for Commands...
1,283,583 UART: [fwproc] Recv command 0x46574c44
1,284,311 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,383 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,553 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,808 >>> mbox cmd response: success
2,827,824 UART: [afmc] ++
2,827,992 UART: [afmc] CDI.KEYID = 6
2,828,354 UART: [afmc] SUBJECT.KEYID = 7
2,828,779 UART: [afmc] AUTHORITY.KEYID = 5
2,864,228 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,123 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,832 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,416 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,202 UART: [afmc] --
2,907,220 UART: [cold-reset] --
2,907,820 UART: [state] Locking Datavault
2,909,001 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,605 UART: [state] Locking ICCM
2,910,237 UART: [exit] Launching FMC @ 0x40000130
2,915,567 UART:
2,915,583 UART: Running Caliptra FMC ...
2,915,991 UART:
2,916,134 UART: [state] CFI Enabled
2,927,138 UART: [fht] FMC Alias Private Key: 7
3,045,526 UART: [art] Extend RT PCRs Done
3,045,954 UART: [art] Lock RT PCRs Done
3,047,538 UART: [art] Populate DV Done
3,055,951 UART: [fht] FMC Alias Private Key: 7
3,056,997 UART: [art] Derive CDI
3,057,277 UART: [art] Store in slot 0x4
3,143,482 UART: [art] Derive Key Pair
3,143,842 UART: [art] Store priv key in slot 0x5
3,156,678 UART: [art] Derive Key Pair - Done
3,171,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,741 UART: [art] PUB.X = BB5D69BEE936F99D74474951FD39716C98351AA9A0A74627D0CAB46B5350985C3E4BB3842E117CE700A00374AA3C2D33
3,194,488 UART: [art] PUB.Y = E21A392F7F0CDA2D93FD37076418B4D16AADF5910FDCA144FA224286787725F4207C50C148D6A1E512E6ADB27B3C66D8
3,201,437 UART: [art] SIG.R = 9DEF748F8554EF600931F129523ECD1A667F1527F15273A2675728D94C5A1CB6159759911B977463396ACF6298C700BF
3,208,172 UART: [art] SIG.S = 2B452E4015E386C7B02AEA76AB0ED7B896F1DF3A058B59379AABC6D9F5DA9FEC62FD8450BF1C0CD95AFBE674577FCD80
3,232,801 UART: Caliptra RT
3,233,144 UART: [state] CFI Enabled
3,352,619 UART: [rt] RT listening for mailbox commands...
3,353,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,785 UART: [rt]cmd =0x44504543, len=96
3,565,834 >>> mbox cmd response data (6236 bytes)
3,565,835 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,595,770 UART: [rt]cmd =0x53574545, len=84
3,621,914 >>> mbox cmd response data (200 bytes)
3,621,915 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,651,814 UART: [rt]cmd =0x44504543, len=96
3,683,235 >>> mbox cmd response data (56 bytes)
3,683,236 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,713,207 UART: [rt]cmd =0x44504543, len=96
3,752,521 >>> mbox cmd response data (24 bytes)
3,752,522 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,782,453 UART: [rt]cmd =0x53574545, len=84
3,807,943 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,218 ready_for_fw is high
1,060,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,381 >>> mbox cmd response: success
2,743,624 UART:
2,743,640 UART: Running Caliptra FMC ...
2,744,048 UART:
2,744,191 UART: [state] CFI Enabled
2,754,885 UART: [fht] FMC Alias Private Key: 7
2,873,475 UART: [art] Extend RT PCRs Done
2,873,903 UART: [art] Lock RT PCRs Done
2,875,359 UART: [art] Populate DV Done
2,883,706 UART: [fht] FMC Alias Private Key: 7
2,884,796 UART: [art] Derive CDI
2,885,076 UART: [art] Store in slot 0x4
2,970,901 UART: [art] Derive Key Pair
2,971,261 UART: [art] Store priv key in slot 0x5
2,984,901 UART: [art] Derive Key Pair - Done
2,999,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,066 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,831 UART: [art] PUB.X = 83E58C3E41F98D9EFF4A066A84EDA975BB5DA16C4B071FC830517B399FF93280C47C1C64F352D94BF3D853EF70A9155E
3,022,605 UART: [art] PUB.Y = D7765BC45B9D90C796AFACE4885AB7339F490A5DBBFDE3839C3CF9CC2B5C5DDE8EA67B96905D6CE55A71429C282AE2E0
3,029,574 UART: [art] SIG.R = EEB8D1080E06014FF8846160A072E9AAA7242819F44706F7EA3546D79725F68CF41ED146D3B6B4FAF81C73A605A589E6
3,036,328 UART: [art] SIG.S = 0B93C51CDFA96B347010CABBACE0064F4904369D22E9415D1BA048927921AB12FB49FD0391033A7619833CBDB4D98553
3,060,981 UART: Caliptra RT
3,061,324 UART: [state] CFI Enabled
3,180,795 UART: [rt] RT listening for mailbox commands...
3,181,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,867 UART: [rt]cmd =0x44504543, len=96
3,393,854 >>> mbox cmd response data (6236 bytes)
3,393,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,660 UART: [rt]cmd =0x53574545, len=84
3,448,602 >>> mbox cmd response data (200 bytes)
3,448,603 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,478,410 UART: [rt]cmd =0x44504543, len=96
3,510,507 >>> mbox cmd response data (56 bytes)
3,510,508 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,487 UART: [rt]cmd =0x44504543, len=96
3,580,001 >>> mbox cmd response data (24 bytes)
3,580,002 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,015 UART: [rt]cmd =0x53574545, len=84
3,636,417 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_measurement_update_duplicate_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,367 UART:
192,728 UART: Running Caliptra ROM ...
193,942 UART:
194,101 UART: [state] CFI Enabled
262,655 UART: [state] LifecycleState = Unprovisioned
264,651 UART: [state] DebugLocked = No
266,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,693 UART: [kat] SHA2-256
441,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,918 UART: [kat] ++
452,364 UART: [kat] sha1
463,520 UART: [kat] SHA2-256
466,240 UART: [kat] SHA2-384
472,814 UART: [kat] SHA2-512-ACC
475,226 UART: [kat] ECC-384
2,767,383 UART: [kat] HMAC-384Kdf
2,799,595 UART: [kat] LMS
3,989,882 UART: [kat] --
3,995,833 UART: [cold-reset] ++
3,997,275 UART: [fht] Storing FHT @ 0x50003400
4,009,252 UART: [idev] ++
4,009,825 UART: [idev] CDI.KEYID = 6
4,010,859 UART: [idev] SUBJECT.KEYID = 7
4,012,038 UART: [idev] UDS.KEYID = 0
4,013,083 ready_for_fw is high
4,013,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,358 UART: [idev] Erasing UDS.KEYID = 0
7,343,687 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,887 UART: [idev] --
7,369,723 UART: [ldev] ++
7,370,302 UART: [ldev] CDI.KEYID = 6
7,371,321 UART: [ldev] SUBJECT.KEYID = 5
7,372,428 UART: [ldev] AUTHORITY.KEYID = 7
7,373,717 UART: [ldev] FE.KEYID = 1
7,420,949 UART: [ldev] Erasing FE.KEYID = 1
10,755,495 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,551 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,957 UART: [ldev] --
13,135,272 UART: [fwproc] Waiting for Commands...
13,137,577 UART: [fwproc] Received command 0x46574c44
13,139,810 UART: [fwproc] Received Image of size 118548 bytes
17,242,798 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,318,163 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,378 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,720,132 >>> mbox cmd response: success
17,723,953 UART: [afmc] ++
17,724,576 UART: [afmc] CDI.KEYID = 6
17,725,530 UART: [afmc] SUBJECT.KEYID = 7
17,726,700 UART: [afmc] AUTHORITY.KEYID = 5
21,091,349 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,086 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,822 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,286 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,195 UART: [afmc] --
23,463,874 UART: [cold-reset] --
23,469,626 UART: [state] Locking Datavault
23,476,436 UART: [state] Locking PCR0, PCR1 and PCR31
23,478,187 UART: [state] Locking ICCM
23,479,446 UART: [exit] Launching FMC @ 0x40000130
23,487,846 UART:
23,488,082 UART: Running Caliptra FMC ...
23,489,203 UART:
23,489,365 UART: [state] CFI Enabled
23,551,028 UART: [fht] FMC Alias Private Key: 7
25,892,162 UART: [art] Extend RT PCRs Done
25,893,388 UART: [art] Lock RT PCRs Done
25,894,664 UART: [art] Populate DV Done
25,899,911 UART: [fht] FMC Alias Private Key: 7
25,901,556 UART: [art] Derive CDI
25,902,370 UART: [art] Store in slot 0x4
25,960,472 UART: [art] Derive Key Pair
25,961,542 UART: [art] Store priv key in slot 0x5
29,254,286 UART: [art] Derive Key Pair - Done
29,267,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,556,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,521 UART: [art] PUB.X = C2A86C76FBF4F36DF9669A32EFE5C41D18A3487D7BF4B6E12CC067E8FE2B631E1B66BAA99AECDB263BCAF0FCD2F788DD
31,564,817 UART: [art] PUB.Y = 76765F413FD504CDAF773032F0EE38DE0F607336F43AD1B8551EF2985BC927CBD2EA9A3CA58DBEE35AA35CF0316EA915
31,572,065 UART: [art] SIG.R = 1DAA1D988FA689532582E6F43945C0AA39E9DF803359BA37EAE6F7F164124D17B1AC548BEC0E9C39B818F196FA9CFD9C
31,579,463 UART: [art] SIG.S = DA3C33A55C49FF71C0AE26FACB7DC8E6B6BB8696D20D0CD8824A8C52F160E0507E5B8FCCE360629331A452EED5D9AF4D
32,884,789 UART: Caliptra RT
32,885,503 UART: [state] CFI Enabled
33,061,629 UART: [rt] RT listening for mailbox commands...
33,063,547 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,094,199 UART: [rt]cmd =0x44504543, len=96
38,864,998 >>> mbox cmd response data (6236 bytes)
38,894,913 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,925,325 UART: [rt]cmd =0x53574545, len=84
44,510,148 >>> mbox cmd response data (200 bytes)
46,973,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,124,983 UART:
47,125,381 UART: Running Caliptra ROM ...
47,126,436 UART:
47,126,589 UART: [state] CFI Enabled
47,191,065 UART: [state] LifecycleState = Unprovisioned
47,193,006 UART: [state] DebugLocked = No
47,195,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,199,542 UART: [kat] SHA2-256
47,369,266 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,379,768 UART: [kat] ++
47,380,224 UART: [kat] sha1
47,391,810 UART: [kat] SHA2-256
47,394,511 UART: [kat] SHA2-384
47,401,418 UART: [kat] SHA2-512-ACC
47,403,766 UART: [kat] ECC-384
49,694,887 UART: [kat] HMAC-384Kdf
49,706,633 UART: [kat] LMS
50,896,945 UART: [kat] --
50,903,213 UART: [update-reset] ++
55,104,257 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,108,681 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,506,416 >>> mbox cmd response: success
55,506,853 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,507,243 UART: [update-reset] Copying MAN_2 To MAN_1
55,529,412 UART: [update-reset Success] --
55,533,219 UART: [state] Locking Datavault
55,536,697 UART: [state] Locking PCR0, PCR1 and PCR31
55,538,451 UART: [state] Locking ICCM
55,541,114 UART: [exit] Launching FMC @ 0x40000130
55,549,559 UART:
55,549,798 UART: Running Caliptra FMC ...
55,550,823 UART:
55,550,969 UART: [state] CFI Enabled
55,649,147 UART: [art] Extend RT PCRs Done
55,650,331 UART: [art] Lock RT PCRs Done
55,651,811 UART: [art] Populate DV Done
55,657,376 UART: [fht] FMC Alias Private Key: 7
55,658,998 UART: [art] Derive CDI
55,659,764 UART: [art] Store in slot 0x4
55,718,837 UART: [art] Derive Key Pair
55,719,876 UART: [art] Store priv key in slot 0x5
59,012,730 UART: [art] Derive Key Pair - Done
59,025,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,314,488 UART: [art] Erasing AUTHORITY.KEYID = 7
61,315,993 UART: [art] PUB.X = A7EDC96B1F0BC589776B2F9631E34804C44AFEA6A38F98B973C98E44AE745C5EDA2C758C29A4D4D39BBDC5886DABB0E7
61,323,294 UART: [art] PUB.Y = 04C605B23B28CC31DC8EF377DCE9D5C443A617D970B12D5E63426E70BFA9AFEEFCD07C79EEF3C0105BCE015BD5D5E707
61,330,624 UART: [art] SIG.R = 32B2D0CBDADE52425D2C854E69567EC148D8B9750A1536873024BB3882A1DC6F4DBC096B5866CE4F52DF083AC15F5BEB
61,338,012 UART: [art] SIG.S = CD654E27335C8944406C97DDCD4DD9872E221085122AD88AA9B6EEB966796A35D000643F5937B6D0E02DB9AB587C167C
62,643,039 UART: Caliptra RT
62,643,756 UART: [state] CFI Enabled
63,067,529 UART: [rt] RT listening for mailbox commands...
63,099,436 UART: [rt]cmd =0x53574545, len=84
68,680,904 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,785,105 ready_for_fw is high
3,785,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,947,059 >>> mbox cmd response: success
23,629,819 UART:
23,630,221 UART: Running Caliptra FMC ...
23,631,390 UART:
23,631,567 UART: [state] CFI Enabled
23,699,818 UART: [fht] FMC Alias Private Key: 7
26,040,452 UART: [art] Extend RT PCRs Done
26,041,670 UART: [art] Lock RT PCRs Done
26,043,306 UART: [art] Populate DV Done
26,048,518 UART: [fht] FMC Alias Private Key: 7
26,050,119 UART: [art] Derive CDI
26,050,867 UART: [art] Store in slot 0x4
26,108,791 UART: [art] Derive Key Pair
26,109,838 UART: [art] Store priv key in slot 0x5
29,402,552 UART: [art] Derive Key Pair - Done
29,415,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,059 UART: [art] Erasing AUTHORITY.KEYID = 7
31,705,572 UART: [art] PUB.X = 89D30AC4E03CF375DFBF39182579119118A8F069F5C782CDB52DF0C8B867EDEF53A74247D6B7712EB504B70786ED535A
31,712,820 UART: [art] PUB.Y = EE8B6D4A22BCB410514DA58243BCF7803BFE40A874760C912B4BCC70DB269D9AA19B304344A83B3DADA6A59812808C03
31,720,083 UART: [art] SIG.R = C8C4423BB0E0FD51582356FBAB18C8351000574598C144A3F6F35456412A2052896F371C911A27340524659B8A30C774
31,727,438 UART: [art] SIG.S = C246365A6CB021617B65B2DC1B9B66B36F128948182B4004881C0D8A9628BD267FC71137C8AEDB0DF028B0A6BD7538ED
33,032,345 UART: Caliptra RT
33,033,066 UART: [state] CFI Enabled
33,208,563 UART: [rt] RT listening for mailbox commands...
33,210,498 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,314 UART: [rt]cmd =0x44504543, len=96
39,011,489 >>> mbox cmd response data (6236 bytes)
39,041,145 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,071,782 UART: [rt]cmd =0x53574545, len=84
44,656,677 >>> mbox cmd response data (200 bytes)
47,117,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,949,282 >>> mbox cmd response: success
55,949,883 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,984,357 UART:
55,984,639 UART: Running Caliptra FMC ...
55,985,677 UART:
55,985,825 UART: [state] CFI Enabled
56,092,836 UART: [art] Extend RT PCRs Done
56,094,143 UART: [art] Lock RT PCRs Done
56,095,688 UART: [art] Populate DV Done
56,101,471 UART: [fht] FMC Alias Private Key: 7
56,103,001 UART: [art] Derive CDI
56,103,937 UART: [art] Store in slot 0x4
56,161,662 UART: [art] Derive Key Pair
56,162,667 UART: [art] Store priv key in slot 0x5
59,455,032 UART: [art] Derive Key Pair - Done
59,468,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,755,908 UART: [art] Erasing AUTHORITY.KEYID = 7
61,757,421 UART: [art] PUB.X = 93608193C7932AD1B0555FB60191886D0DD24B35A7C087045E8E5287D6B9E0F6E0064EC79CCB22631BD7E93A34E066FA
61,764,671 UART: [art] PUB.Y = F106DDFB17B4F63B72030D64DD7F5A5DCE3A780CF7F1DD973F579349BE092FC838802CB06248E5478557A33B8FD0EF37
61,771,901 UART: [art] SIG.R = 9ACB81BF4ADC17729FC51C53769B20504023669FFCA81BE61FCD8EAED67D953A8306672C680B1C5C2F90EB13AF530F59
61,779,444 UART: [art] SIG.S = FACCEF0A2C5CA098A7DFE33FA026D8B2B9A6440E9B26C973D07C7F208D4E4D79F74BCBA86B2D4F4ED35DBE22FE249294
63,083,772 UART: Caliptra RT
63,084,478 UART: [state] CFI Enabled
63,497,175 UART: [rt] RT listening for mailbox commands...
63,529,029 UART: [rt]cmd =0x53574545, len=84
69,098,135 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,384 UART:
192,748 UART: Running Caliptra ROM ...
193,851 UART:
603,450 UART: [state] CFI Enabled
615,702 UART: [state] LifecycleState = Unprovisioned
617,564 UART: [state] DebugLocked = No
619,650 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,865 UART: [kat] SHA2-256
794,598 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,181 UART: [kat] ++
805,627 UART: [kat] sha1
817,155 UART: [kat] SHA2-256
819,848 UART: [kat] SHA2-384
826,408 UART: [kat] SHA2-512-ACC
828,771 UART: [kat] ECC-384
3,114,347 UART: [kat] HMAC-384Kdf
3,125,294 UART: [kat] LMS
4,315,433 UART: [kat] --
4,319,991 UART: [cold-reset] ++
4,322,341 UART: [fht] Storing FHT @ 0x50003400
4,334,164 UART: [idev] ++
4,334,726 UART: [idev] CDI.KEYID = 6
4,335,675 UART: [idev] SUBJECT.KEYID = 7
4,337,363 UART: [idev] UDS.KEYID = 0
4,338,334 ready_for_fw is high
4,338,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,246 UART: [idev] Erasing UDS.KEYID = 0
7,626,190 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,977 UART: [idev] --
7,651,919 UART: [ldev] ++
7,652,487 UART: [ldev] CDI.KEYID = 6
7,653,438 UART: [ldev] SUBJECT.KEYID = 5
7,654,644 UART: [ldev] AUTHORITY.KEYID = 7
7,655,924 UART: [ldev] FE.KEYID = 1
7,668,214 UART: [ldev] Erasing FE.KEYID = 1
10,953,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,148 UART: [ldev] --
13,315,046 UART: [fwproc] Waiting for Commands...
13,317,571 UART: [fwproc] Received command 0x46574c44
13,319,746 UART: [fwproc] Received Image of size 118548 bytes
17,428,736 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,401 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,387 >>> mbox cmd response: success
17,904,103 UART: [afmc] ++
17,904,693 UART: [afmc] CDI.KEYID = 6
17,905,571 UART: [afmc] SUBJECT.KEYID = 7
17,906,833 UART: [afmc] AUTHORITY.KEYID = 5
21,219,023 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,652 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,373 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,128 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,556,526 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,072 UART: [afmc] --
23,582,336 UART: [cold-reset] --
23,586,674 UART: [state] Locking Datavault
23,590,299 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,045 UART: [state] Locking ICCM
23,593,353 UART: [exit] Launching FMC @ 0x40000130
23,601,746 UART:
23,601,976 UART: Running Caliptra FMC ...
23,603,068 UART:
23,603,226 UART: [state] CFI Enabled
23,611,320 UART: [fht] FMC Alias Private Key: 7
25,951,525 UART: [art] Extend RT PCRs Done
25,952,744 UART: [art] Lock RT PCRs Done
25,954,280 UART: [art] Populate DV Done
25,959,687 UART: [fht] FMC Alias Private Key: 7
25,961,216 UART: [art] Derive CDI
25,962,020 UART: [art] Store in slot 0x4
26,004,444 UART: [art] Derive Key Pair
26,005,443 UART: [art] Store priv key in slot 0x5
29,247,268 UART: [art] Derive Key Pair - Done
29,260,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,886 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,396 UART: [art] PUB.X = 143B84D1E5FA9CB3DDC2D56222FB6475681130D9DD6C02F6C4C89B0A8E302150B14F5F9AD81C4CA40CB81BD7F8E40471
31,549,636 UART: [art] PUB.Y = 2FA8B0879C86398C8B71BB123248AB773CFAA8C11F1E3FD9D012DA7599F6C22AA55398259D03F4578433D7A9E4857FD5
31,556,917 UART: [art] SIG.R = F9930B83E4467A40FFDA45887EAD60013CEFC57DC560654C1098C4B960D4E79479DF17696F856ADB66F93BCF08F408AA
31,564,297 UART: [art] SIG.S = 99CBCCA5F77E2D16F2D3B72377792ED5795509DDC7181DA6A6A59C5154D07A072112B60CEA0DEDD65B5451EB3FC8F190
32,869,689 UART: Caliptra RT
32,870,380 UART: [state] CFI Enabled
33,002,628 UART: [rt] RT listening for mailbox commands...
33,004,550 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,035,033 UART: [rt]cmd =0x44504543, len=96
38,709,863 >>> mbox cmd response data (6236 bytes)
38,739,927 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,770,625 UART: [rt]cmd =0x53574545, len=84
44,295,674 >>> mbox cmd response data (200 bytes)
46,753,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
46,904,358 UART:
46,904,736 UART: Running Caliptra ROM ...
46,905,829 UART:
46,905,991 UART: [state] CFI Enabled
46,918,485 UART: [state] LifecycleState = Unprovisioned
46,920,368 UART: [state] DebugLocked = No
46,923,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,927,221 UART: [kat] SHA2-256
47,096,951 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,107,485 UART: [kat] ++
47,107,933 UART: [kat] sha1
47,118,654 UART: [kat] SHA2-256
47,121,338 UART: [kat] SHA2-384
47,126,344 UART: [kat] SHA2-512-ACC
47,128,736 UART: [kat] ECC-384
49,412,826 UART: [kat] HMAC-384Kdf
49,424,469 UART: [kat] LMS
50,614,522 UART: [kat] --
50,621,563 UART: [update-reset] ++
54,813,379 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,816,684 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,214,437 >>> mbox cmd response: success
55,214,887 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,216,139 UART: [update-reset] Copying MAN_2 To MAN_1
55,238,560 UART: [update-reset Success] --
55,244,362 UART: [state] Locking Datavault
55,247,066 UART: [state] Locking PCR0, PCR1 and PCR31
55,248,816 UART: [state] Locking ICCM
55,250,282 UART: [exit] Launching FMC @ 0x40000130
55,258,732 UART:
55,258,961 UART: Running Caliptra FMC ...
55,259,979 UART:
55,260,118 UART: [state] CFI Enabled
55,304,286 UART: [art] Extend RT PCRs Done
55,305,474 UART: [art] Lock RT PCRs Done
55,306,949 UART: [art] Populate DV Done
55,312,188 UART: [fht] FMC Alias Private Key: 7
55,313,896 UART: [art] Derive CDI
55,314,652 UART: [art] Store in slot 0x4
55,357,400 UART: [art] Derive Key Pair
55,358,391 UART: [art] Store priv key in slot 0x5
58,600,051 UART: [art] Derive Key Pair - Done
58,613,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,893,469 UART: [art] Erasing AUTHORITY.KEYID = 7
60,894,984 UART: [art] PUB.X = F7FAA5CA3AA05CCB2243A23152EBF7A11609233FC77680A5705F37E6497F7749BAC0979D2DB306F821220BB3DFC231BB
60,902,311 UART: [art] PUB.Y = 40AA85B9FFE157D648DC7FF02DDED84C1ADF1407E9330B56C074F96A24AE3835EE242DB6ECFE5FB64C79E96AFD32FC0F
60,909,550 UART: [art] SIG.R = 4C80C935BEAF23DAF2F1B54931E0C2C777180D008C8B523AFB857B5B54857EEDBB5357A68BF79E1BC8D3F7A721A5A948
60,916,943 UART: [art] SIG.S = 45E0B514240CF8CCD0F44AE1442372827AAFFD256A22504C906EA31000E67F95F7F4D7AA0F6832C8EB1D15152FC14187
62,222,287 UART: Caliptra RT
62,222,986 UART: [state] CFI Enabled
62,594,809 UART: [rt] RT listening for mailbox commands...
62,626,353 UART: [rt]cmd =0x53574545, len=84
68,151,405 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
4,124,483 ready_for_fw is high
4,124,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,142,023 >>> mbox cmd response: success
23,781,478 UART:
23,781,879 UART: Running Caliptra FMC ...
23,782,984 UART:
23,783,132 UART: [state] CFI Enabled
23,790,992 UART: [fht] FMC Alias Private Key: 7
26,131,063 UART: [art] Extend RT PCRs Done
26,132,295 UART: [art] Lock RT PCRs Done
26,133,742 UART: [art] Populate DV Done
26,139,230 UART: [fht] FMC Alias Private Key: 7
26,140,763 UART: [art] Derive CDI
26,141,499 UART: [art] Store in slot 0x4
26,184,523 UART: [art] Derive Key Pair
26,185,519 UART: [art] Store priv key in slot 0x5
29,426,949 UART: [art] Derive Key Pair - Done
29,439,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,247 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,753 UART: [art] PUB.X = A35A1C8CE073898141E3BA45E890A36E91952BAFE3806D32B95AC97C9209EB9DB19ED508C0B421F0A9A3922241090408
31,729,006 UART: [art] PUB.Y = AF29380CB82D7C920C0E7CA7D562DA36A634804628596DE8E4DC5B4A49E580C0365B48FD85861C18E05B42AE06210D09
31,736,255 UART: [art] SIG.R = 75F6C692B8783CFBDA139E45D69524CE65C31AD8CF2ACA99A3EB67A1EE1ADC5288F456EC3DD286DDF57FFD978F05A1E6
31,743,691 UART: [art] SIG.S = AD02BEFAC9596AC51E8687759E7768833E080D887D2802D648CF89F97A44441FA31BF91D34CAA71CB9F80DF846BDBD06
33,048,572 UART: Caliptra RT
33,049,287 UART: [state] CFI Enabled
33,182,900 UART: [rt] RT listening for mailbox commands...
33,184,822 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,215,233 UART: [rt]cmd =0x44504543, len=96
38,889,935 >>> mbox cmd response data (6236 bytes)
38,919,767 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,950,561 UART: [rt]cmd =0x53574545, len=84
44,475,004 >>> mbox cmd response data (200 bytes)
46,935,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,700,014 >>> mbox cmd response: success
55,700,655 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,733,672 UART:
55,733,952 UART: Running Caliptra FMC ...
55,734,984 UART:
55,735,128 UART: [state] CFI Enabled
55,779,497 UART: [art] Extend RT PCRs Done
55,780,826 UART: [art] Lock RT PCRs Done
55,782,044 UART: [art] Populate DV Done
55,787,356 UART: [fht] FMC Alias Private Key: 7
55,789,051 UART: [art] Derive CDI
55,789,806 UART: [art] Store in slot 0x4
55,832,565 UART: [art] Derive Key Pair
55,833,631 UART: [art] Store priv key in slot 0x5
59,075,426 UART: [art] Derive Key Pair - Done
59,088,439 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,369,010 UART: [art] Erasing AUTHORITY.KEYID = 7
61,370,529 UART: [art] PUB.X = 1441E4AC805F2AEE5DDE77157CE58C50A0E5F827885375426E6A1ABBBAD457827CECBF45F26336F818131FB02FC9EF75
61,377,780 UART: [art] PUB.Y = 7C69061A2CF5D2E98E562F5DC23AB4FCF1B59FC12D9DB99A73270BBFEBABE59CA26ADF9DE200986850ABD351E7116E19
61,385,058 UART: [art] SIG.R = DC2B995273593A7C8C3268081E2F302D8C4FA1AFF354C652CB744CBA48B685D0D85B2E0DB8D4BA82234449008A87B422
61,392,401 UART: [art] SIG.S = 77843995BFB86A340B71B162543B1873B0A10A2C4AAD8750312A60C939C90306AFD8B1C8B5838B3FDD3148F2D0F4EC81
62,697,963 UART: Caliptra RT
62,698,678 UART: [state] CFI Enabled
63,069,672 UART: [rt] RT listening for mailbox commands...
63,101,520 UART: [rt]cmd =0x53574545, len=84
68,626,606 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
192,155 UART:
192,519 UART: Running Caliptra ROM ...
193,700 UART:
193,849 UART: [state] CFI Enabled
266,328 UART: [state] LifecycleState = Unprovisioned
268,327 UART: [state] DebugLocked = No
270,071 UART: [state] WD Timer not started. Device not locked for debugging
274,820 UART: [kat] SHA2-256
454,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,235 UART: [kat] ++
465,712 UART: [kat] sha1
476,726 UART: [kat] SHA2-256
479,441 UART: [kat] SHA2-384
485,991 UART: [kat] SHA2-512-ACC
488,430 UART: [kat] ECC-384
2,947,137 UART: [kat] HMAC-384Kdf
2,971,015 UART: [kat] LMS
3,447,519 UART: [kat] --
3,452,650 UART: [cold-reset] ++
3,453,791 UART: [fht] FHT @ 0x50003400
3,465,469 UART: [idev] ++
3,466,034 UART: [idev] CDI.KEYID = 6
3,467,012 UART: [idev] SUBJECT.KEYID = 7
3,468,256 UART: [idev] UDS.KEYID = 0
3,469,198 ready_for_fw is high
3,469,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,541 UART: [idev] Erasing UDS.KEYID = 0
5,989,282 UART: [idev] Sha1 KeyId Algorithm
6,013,961 UART: [idev] --
6,020,335 UART: [ldev] ++
6,020,969 UART: [ldev] CDI.KEYID = 6
6,021,877 UART: [ldev] SUBJECT.KEYID = 5
6,023,095 UART: [ldev] AUTHORITY.KEYID = 7
6,024,329 UART: [ldev] FE.KEYID = 1
6,059,154 UART: [ldev] Erasing FE.KEYID = 1
8,568,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,332 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,533 UART: [ldev] --
10,377,763 UART: [fwproc] Wait for Commands...
10,380,593 UART: [fwproc] Recv command 0x46574c44
10,382,577 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,350,550 >>> mbox cmd response: success
14,355,346 UART: [afmc] ++
14,355,965 UART: [afmc] CDI.KEYID = 6
14,356,876 UART: [afmc] SUBJECT.KEYID = 7
14,358,091 UART: [afmc] AUTHORITY.KEYID = 5
16,897,154 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,619 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,403 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,460 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,667,020 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,334 UART: [afmc] --
18,695,651 UART: [cold-reset] --
18,700,082 UART: [state] Locking Datavault
18,704,686 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,441 UART: [state] Locking ICCM
18,707,506 UART: [exit] Launching FMC @ 0x40000130
18,715,956 UART:
18,716,190 UART: Running Caliptra FMC ...
18,717,235 UART:
18,717,384 UART: [state] CFI Enabled
18,767,822 UART: [fht] FMC Alias Private Key: 7
20,534,309 UART: [art] Extend RT PCRs Done
20,535,688 UART: [art] Lock RT PCRs Done
20,537,392 UART: [art] Populate DV Done
20,542,879 UART: [fht] FMC Alias Private Key: 7
20,544,626 UART: [art] Derive CDI
20,545,363 UART: [art] Store in slot 0x4
20,600,723 UART: [art] Derive Key Pair
20,601,715 UART: [art] Store priv key in slot 0x5
23,064,588 UART: [art] Derive Key Pair - Done
23,077,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,790,618 UART: [art] Erasing AUTHORITY.KEYID = 7
24,792,116 UART: [art] PUB.X = 2F3E74546D2790FA778D5145550943DE949430EBFC630513966C7CE9A64BFD2AE122BECC360A7BD3FFCC01E7FA56F5BD
24,799,412 UART: [art] PUB.Y = 42999C04797FD2D333858622DC9B995BD360520E3E69741C341F81C82E0DD7A04BE77ABB209F787C2E0743F315977F10
24,806,640 UART: [art] SIG.R = B5AAE499D8B01DFB237E4AA2387E38B0D33E9FD4A00B655872D7D952EEA761F13ED4D2BBEED94ED4DCC84F5260FC04E4
24,814,086 UART: [art] SIG.S = 1E323E2F8F4744901C1EE43BCC8A69E4EB206BFE5A7C903ADF640C39425798B3FC5F165CD50C77207299F0049DC2AFB5
25,792,628 UART: Caliptra RT
25,793,340 UART: [state] CFI Enabled
25,972,477 UART: [rt] RT listening for mailbox commands...
25,974,395 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,004,915 UART: [rt]cmd =0x44504543, len=96
30,370,408 >>> mbox cmd response data (6236 bytes)
30,400,350 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,431,092 UART: [rt]cmd =0x53574545, len=84
34,607,601 >>> mbox cmd response data (200 bytes)
37,057,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,208,060 UART:
37,208,456 UART: Running Caliptra ROM ...
37,209,593 UART:
37,209,763 UART: [state] CFI Enabled
37,268,172 UART: [state] LifecycleState = Unprovisioned
37,270,101 UART: [state] DebugLocked = No
37,272,462 UART: [state] WD Timer not started. Device not locked for debugging
37,276,304 UART: [kat] SHA2-256
37,455,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,466,741 UART: [kat] ++
37,467,201 UART: [kat] sha1
37,477,812 UART: [kat] SHA2-256
37,480,514 UART: [kat] SHA2-384
37,485,580 UART: [kat] SHA2-512-ACC
37,487,982 UART: [kat] ECC-384
39,947,242 UART: [kat] HMAC-384Kdf
39,973,228 UART: [kat] LMS
40,449,672 UART: [kat] --
40,453,277 UART: [update-reset] ++
43,947,246 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,951,432 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,349,053 >>> mbox cmd response: success
44,349,503 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,350,980 UART: [update-reset] Copying MAN_2 To MAN_1
44,388,149 UART: [update-reset Success] --
44,391,447 UART: [state] Locking Datavault
44,395,241 UART: [state] Locking PCR0, PCR1 and PCR31
44,396,941 UART: [state] Locking ICCM
44,399,794 UART: [exit] Launching FMC @ 0x40000130
44,408,186 UART:
44,408,421 UART: Running Caliptra FMC ...
44,409,516 UART:
44,409,693 UART: [state] CFI Enabled
44,504,961 UART: [art] Extend RT PCRs Done
44,506,148 UART: [art] Lock RT PCRs Done
44,507,601 UART: [art] Populate DV Done
44,513,272 UART: [fht] FMC Alias Private Key: 7
44,514,802 UART: [art] Derive CDI
44,515,611 UART: [art] Store in slot 0x4
44,573,808 UART: [art] Derive Key Pair
44,574,851 UART: [art] Store priv key in slot 0x5
47,037,692 UART: [art] Derive Key Pair - Done
47,050,854 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,763,313 UART: [art] Erasing AUTHORITY.KEYID = 7
48,764,819 UART: [art] PUB.X = 748B66BB3DE634C998E3B3470CF020A46A6E99E8ADFCD46B86DFB1C3CB4C06053E33B6E66A236812C8806BC83A54CB1F
48,772,130 UART: [art] PUB.Y = C70045565479B3C2A3001AF27EA3C1CA738CCC2A9D3012A5F9CA55B34D341613F4EDB1F0A2DA272BF2C484F1E5A72AB9
48,779,397 UART: [art] SIG.R = 207983CFB795ADF36556D9881285C4FC40344869C407621539C681E15B71157F91D3070B09A60531C0791182E9CC0F13
48,786,752 UART: [art] SIG.S = 86B87914369BA2CE5D5EA11D4574C4C7F43C76BB816F98DD0E1A2562EBCC7395659054A7935A1DCB478187112534ED43
49,765,755 UART: Caliptra RT
49,766,456 UART: [state] CFI Enabled
50,190,217 UART: [rt] RT listening for mailbox commands...
50,221,979 UART: [rt]cmd =0x53574545, len=84
54,402,241 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,461,935 ready_for_fw is high
3,462,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,252 >>> mbox cmd response: success
18,536,771 UART:
18,537,183 UART: Running Caliptra FMC ...
18,538,400 UART:
18,538,571 UART: [state] CFI Enabled
18,603,370 UART: [fht] FMC Alias Private Key: 7
20,370,017 UART: [art] Extend RT PCRs Done
20,371,247 UART: [art] Lock RT PCRs Done
20,373,094 UART: [art] Populate DV Done
20,378,617 UART: [fht] FMC Alias Private Key: 7
20,380,262 UART: [art] Derive CDI
20,381,075 UART: [art] Store in slot 0x4
20,435,751 UART: [art] Derive Key Pair
20,436,795 UART: [art] Store priv key in slot 0x5
22,899,472 UART: [art] Derive Key Pair - Done
22,912,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,829 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,313 UART: [art] PUB.X = 4C5E89F099F931DDFC3D0CDEE10B58407710D46A4FDF1AC17449339C06BCA2EAE1434584FCAA3DD0529796C7D0B53695
24,633,567 UART: [art] PUB.Y = 733FB7B9B97645F04D4518A7B1A78F0C8E78DF21D3B2D9F48CBF4BF566674A7267EC3C7103AFB9CC210001B019860993
24,640,839 UART: [art] SIG.R = 38B6A7C27CDC4994ACBA0B66D4CB42DC159932D1CF1C5EA8E934996F55D9C99FA449137F827BC4C5BD72BDE142507908
24,648,243 UART: [art] SIG.S = CB7484D1C169DF1A1C65170D91340F6AA05DA27203CA460102DDCB34233D832929DCBD5DF3082D60E92A801F0B1CD749
25,626,657 UART: Caliptra RT
25,627,375 UART: [state] CFI Enabled
25,806,429 UART: [rt] RT listening for mailbox commands...
25,808,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,839,009 UART: [rt]cmd =0x44504543, len=96
30,204,086 >>> mbox cmd response data (6236 bytes)
30,233,691 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,264,267 UART: [rt]cmd =0x53574545, len=84
34,441,623 >>> mbox cmd response data (200 bytes)
36,884,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,194,372 >>> mbox cmd response: success
44,195,066 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,227,349 UART:
44,227,638 UART: Running Caliptra FMC ...
44,228,756 UART:
44,228,913 UART: [state] CFI Enabled
44,316,742 UART: [art] Extend RT PCRs Done
44,318,064 UART: [art] Lock RT PCRs Done
44,319,372 UART: [art] Populate DV Done
44,325,271 UART: [fht] FMC Alias Private Key: 7
44,326,821 UART: [art] Derive CDI
44,327,630 UART: [art] Store in slot 0x4
44,386,223 UART: [art] Derive Key Pair
44,387,262 UART: [art] Store priv key in slot 0x5
46,849,986 UART: [art] Derive Key Pair - Done
46,862,990 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,575,031 UART: [art] Erasing AUTHORITY.KEYID = 7
48,576,555 UART: [art] PUB.X = 4CB9A390B73494F8C3EA41F5A9736867663EED712D087D5C9CAF4BB3601054777EF5085D808F706C432BC7D08497A004
48,583,753 UART: [art] PUB.Y = 16F2D78DAC9ADC96684406B65973CA3B6370966C19339E58B82578C04DA93E00673CFE4F2E0F5B5A060DA6F260F66689
48,590,985 UART: [art] SIG.R = 860041DB6B71F310CCE52FA7EE3006A04EADFDABEAA734CB95AA7F0ECA52CD9852A0A60A34807D9E486E933F678A631D
48,598,378 UART: [art] SIG.S = C02C03F30307DF5289EDEF6982F97F5661F2A87C7EA45C04B1774A99E8A55EE6E71280EF2217772F9B222F4F92A0653A
49,577,575 UART: Caliptra RT
49,578,275 UART: [state] CFI Enabled
49,998,420 UART: [rt] RT listening for mailbox commands...
50,030,182 UART: [rt]cmd =0x53574545, len=84
54,211,235 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
192,430 UART:
192,778 UART: Running Caliptra ROM ...
193,966 UART:
603,780 UART: [state] CFI Enabled
619,881 UART: [state] LifecycleState = Unprovisioned
621,834 UART: [state] DebugLocked = No
623,436 UART: [state] WD Timer not started. Device not locked for debugging
626,982 UART: [kat] SHA2-256
806,632 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,437 UART: [kat] ++
817,972 UART: [kat] sha1
829,440 UART: [kat] SHA2-256
832,171 UART: [kat] SHA2-384
838,801 UART: [kat] SHA2-512-ACC
841,173 UART: [kat] ECC-384
3,285,064 UART: [kat] HMAC-384Kdf
3,298,160 UART: [kat] LMS
3,774,647 UART: [kat] --
3,778,808 UART: [cold-reset] ++
3,781,109 UART: [fht] FHT @ 0x50003400
3,792,157 UART: [idev] ++
3,792,724 UART: [idev] CDI.KEYID = 6
3,793,636 UART: [idev] SUBJECT.KEYID = 7
3,794,886 UART: [idev] UDS.KEYID = 0
3,795,933 ready_for_fw is high
3,796,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,063 UART: [idev] Erasing UDS.KEYID = 0
6,273,107 UART: [idev] Sha1 KeyId Algorithm
6,296,335 UART: [idev] --
6,300,820 UART: [ldev] ++
6,301,393 UART: [ldev] CDI.KEYID = 6
6,302,359 UART: [ldev] SUBJECT.KEYID = 5
6,303,524 UART: [ldev] AUTHORITY.KEYID = 7
6,304,815 UART: [ldev] FE.KEYID = 1
6,315,410 UART: [ldev] Erasing FE.KEYID = 1
8,793,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,131 UART: [ldev] --
10,586,801 UART: [fwproc] Wait for Commands...
10,590,028 UART: [fwproc] Recv command 0x46574c44
10,592,090 UART: [fwproc] Recv'd Img size: 118548 bytes
14,078,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,494 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,560,587 >>> mbox cmd response: success
14,564,288 UART: [afmc] ++
14,564,881 UART: [afmc] CDI.KEYID = 6
14,565,792 UART: [afmc] SUBJECT.KEYID = 7
14,567,011 UART: [afmc] AUTHORITY.KEYID = 5
17,070,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,790,420 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,792,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,808,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,824,522 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,840,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,864,919 UART: [afmc] --
18,868,163 UART: [cold-reset] --
18,871,816 UART: [state] Locking Datavault
18,876,693 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,493 UART: [state] Locking ICCM
18,881,196 UART: [exit] Launching FMC @ 0x40000130
18,889,598 UART:
18,889,836 UART: Running Caliptra FMC ...
18,890,941 UART:
18,891,103 UART: [state] CFI Enabled
18,899,151 UART: [fht] FMC Alias Private Key: 7
20,665,245 UART: [art] Extend RT PCRs Done
20,666,461 UART: [art] Lock RT PCRs Done
20,668,114 UART: [art] Populate DV Done
20,673,905 UART: [fht] FMC Alias Private Key: 7
20,675,552 UART: [art] Derive CDI
20,676,365 UART: [art] Store in slot 0x4
20,719,313 UART: [art] Derive Key Pair
20,720,350 UART: [art] Store priv key in slot 0x5
23,147,348 UART: [art] Derive Key Pair - Done
23,160,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,820 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,329 UART: [art] PUB.X = DACF99FB44E5B6954790A7D550DB2E5D978196ACFE538186CFE4A3E1565BA424BC27B1FC45C16EA8EEDCC3B628F695A8
24,875,630 UART: [art] PUB.Y = C1108BFAA06E154AA8840DCCB7EB0D075968FF24BEE1050D611910186AE1F69375D2F18D7DDD994AD555A33DD31F068D
24,882,886 UART: [art] SIG.R = 036FB7BD62F6E9228C36DEC98F1AE18AFF130A826843A0EFECC83C49948365BCE0ECDB4357C3AF30865D96A22661AE88
24,890,290 UART: [art] SIG.S = A03F790B8896D676FCF7DEBF516B2B0F2C5C09CE032AC616F9B3701C32013D7C89411E5D2984D642B55B161A26AFE533
25,869,005 UART: Caliptra RT
25,869,701 UART: [state] CFI Enabled
26,001,728 UART: [rt] RT listening for mailbox commands...
26,003,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,034,187 UART: [rt]cmd =0x44504543, len=96
30,318,874 >>> mbox cmd response data (6236 bytes)
30,348,598 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,379,073 UART: [rt]cmd =0x53574545, len=84
34,514,258 >>> mbox cmd response data (200 bytes)
36,969,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,120,610 UART:
37,120,991 UART: Running Caliptra ROM ...
37,122,044 UART:
37,122,224 UART: [state] CFI Enabled
37,134,778 UART: [state] LifecycleState = Unprovisioned
37,136,726 UART: [state] DebugLocked = No
37,139,435 UART: [state] WD Timer not started. Device not locked for debugging
37,143,926 UART: [kat] SHA2-256
37,323,622 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,334,379 UART: [kat] ++
37,334,835 UART: [kat] sha1
37,345,992 UART: [kat] SHA2-256
37,348,690 UART: [kat] SHA2-384
37,354,788 UART: [kat] SHA2-512-ACC
37,357,150 UART: [kat] ECC-384
39,797,857 UART: [kat] HMAC-384Kdf
39,811,388 UART: [kat] LMS
40,287,836 UART: [kat] --
40,292,025 UART: [update-reset] ++
43,795,413 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,799,658 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,197,305 >>> mbox cmd response: success
44,197,742 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,198,354 UART: [update-reset] Copying MAN_2 To MAN_1
44,235,434 UART: [update-reset Success] --
44,238,569 UART: [state] Locking Datavault
44,240,808 UART: [state] Locking PCR0, PCR1 and PCR31
44,242,515 UART: [state] Locking ICCM
44,244,893 UART: [exit] Launching FMC @ 0x40000130
44,253,242 UART:
44,253,479 UART: Running Caliptra FMC ...
44,254,536 UART:
44,254,690 UART: [state] CFI Enabled
44,298,927 UART: [art] Extend RT PCRs Done
44,300,078 UART: [art] Lock RT PCRs Done
44,301,523 UART: [art] Populate DV Done
44,307,093 UART: [fht] FMC Alias Private Key: 7
44,308,632 UART: [art] Derive CDI
44,309,369 UART: [art] Store in slot 0x4
44,352,341 UART: [art] Derive Key Pair
44,353,381 UART: [art] Store priv key in slot 0x5
46,780,504 UART: [art] Derive Key Pair - Done
46,793,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,499,035 UART: [art] Erasing AUTHORITY.KEYID = 7
48,500,542 UART: [art] PUB.X = 09BBFD401654C668CABD894AD916B13708B47BAFB5A35EAA8A2A13B6A3E73DCC56D4A9227A87A4DD02D94E73B71205CD
48,507,848 UART: [art] PUB.Y = F41C758A23528027542A96654A1899306D7F632A26837BE80E3D67CEE8951E0CA77CCFA4E43F7230D9645855923FBD19
48,515,091 UART: [art] SIG.R = 362CD724DDEC823BF37F2724D1C63AF0A3BA53EDFB5DE2F94ACC669799CFCEF96F03C7D1A855ED83E66AD1C5D733F148
48,522,486 UART: [art] SIG.S = 113C180CF792A8B474E8229FDD800C93B27C7EA068E9099E65592B682395DC3085B01DD5B88E2BE11CC5A1F594FA433C
49,500,798 UART: Caliptra RT
49,501,505 UART: [state] CFI Enabled
49,876,309 UART: [rt] RT listening for mailbox commands...
49,908,141 UART: [rt]cmd =0x53574545, len=84
54,043,650 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,151 writing to cptra_bootfsm_go
3,774,839 ready_for_fw is high
3,775,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,857 >>> mbox cmd response: success
18,688,171 UART:
18,688,577 UART: Running Caliptra FMC ...
18,689,781 UART:
18,689,978 UART: [state] CFI Enabled
18,697,678 UART: [fht] FMC Alias Private Key: 7
20,464,064 UART: [art] Extend RT PCRs Done
20,465,282 UART: [art] Lock RT PCRs Done
20,466,915 UART: [art] Populate DV Done
20,472,079 UART: [fht] FMC Alias Private Key: 7
20,473,693 UART: [art] Derive CDI
20,474,513 UART: [art] Store in slot 0x4
20,517,168 UART: [art] Derive Key Pair
20,518,211 UART: [art] Store priv key in slot 0x5
22,944,568 UART: [art] Derive Key Pair - Done
22,957,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,663,662 UART: [art] Erasing AUTHORITY.KEYID = 7
24,665,147 UART: [art] PUB.X = 0427FBE247322A5A06681F5F414F45017964E7FB6620484651D760684D24C68A2FBD6F68F1623B71D9F27673212A435D
24,672,353 UART: [art] PUB.Y = 13179384DB31CE4115AE2250733233ED144A50833EA6C2EE3BDA75A13E0421D05ED502AB6AD15572A52C977C5F293F2C
24,679,609 UART: [art] SIG.R = 91DE6660C7E12CFCCD1ECE7F9B142AB9BE80D88A9592B533355425C13F0F00DEA7359517CA4B3A70508F3C102674DA3E
24,687,043 UART: [art] SIG.S = B5A9C2D489E9738A0670DA572F52F856844BD1EC64CFB2A2D287B5CEE60DE97F89168613F3482ADB030042EA0EDE94FE
25,665,226 UART: Caliptra RT
25,665,938 UART: [state] CFI Enabled
25,798,410 UART: [rt] RT listening for mailbox commands...
25,800,330 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,831,034 UART: [rt]cmd =0x44504543, len=96
30,117,269 >>> mbox cmd response data (6236 bytes)
30,147,128 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,177,723 UART: [rt]cmd =0x53574545, len=84
34,313,305 >>> mbox cmd response data (200 bytes)
36,758,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,986,158 >>> mbox cmd response: success
43,986,769 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,021,274 UART:
44,021,598 UART: Running Caliptra FMC ...
44,022,725 UART:
44,022,892 UART: [state] CFI Enabled
44,067,343 UART: [art] Extend RT PCRs Done
44,068,598 UART: [art] Lock RT PCRs Done
44,070,010 UART: [art] Populate DV Done
44,075,481 UART: [fht] FMC Alias Private Key: 7
44,077,128 UART: [art] Derive CDI
44,077,969 UART: [art] Store in slot 0x4
44,120,583 UART: [art] Derive Key Pair
44,121,631 UART: [art] Store priv key in slot 0x5
46,548,767 UART: [art] Derive Key Pair - Done
46,561,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,267,754 UART: [art] Erasing AUTHORITY.KEYID = 7
48,269,265 UART: [art] PUB.X = 34C21D1046A492EFD8A54B0343BA7C427F75AEE7F0E70E14A8560373283A47686E9E195399878715D3C2E7E1C65A5199
48,276,475 UART: [art] PUB.Y = 0952C77868153B8357EA4198C6F06749B4A971725781E8C1BC1D2761E2C86521DA04B58D5205D53F6F862BA745F1C2E4
48,283,722 UART: [art] SIG.R = 8E1D2B4F3184AD977BD3B65DFE975B2ED404DDB0C5F967CF079CB0641D9F1ED35BF72AC938D45C6ADF9BA586F3DACF8D
48,291,123 UART: [art] SIG.S = C8DAD0E9FC239F9E08C8FC4B0A2F009A54AD9EC0669A28A45B715C3B57060CA5C39701435A578708293A83093FF3861C
49,270,039 UART: Caliptra RT
49,270,788 UART: [state] CFI Enabled
49,644,475 UART: [rt] RT listening for mailbox commands...
49,676,000 UART: [rt]cmd =0x53574545, len=84
53,812,541 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,250 UART:
192,596 UART: Running Caliptra ROM ...
193,776 UART:
193,948 UART: [state] CFI Enabled
264,902 UART: [state] LifecycleState = Unprovisioned
267,306 UART: [state] DebugLocked = No
269,685 UART: [state] WD Timer not started. Device not locked for debugging
275,067 UART: [kat] SHA2-256
464,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,719 UART: [kat] ++
476,178 UART: [kat] sha1
487,150 UART: [kat] SHA2-256
490,154 UART: [kat] SHA2-384
496,067 UART: [kat] SHA2-512-ACC
498,647 UART: [kat] ECC-384
2,949,296 UART: [kat] HMAC-384Kdf
2,971,404 UART: [kat] LMS
3,503,181 UART: [kat] --
3,507,101 UART: [cold-reset] ++
3,508,763 UART: [fht] FHT @ 0x50003400
3,519,871 UART: [idev] ++
3,520,587 UART: [idev] CDI.KEYID = 6
3,521,494 UART: [idev] SUBJECT.KEYID = 7
3,522,733 UART: [idev] UDS.KEYID = 0
3,523,655 ready_for_fw is high
3,523,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,985 UART: [idev] Erasing UDS.KEYID = 0
6,028,796 UART: [idev] Sha1 KeyId Algorithm
6,051,763 UART: [idev] --
6,055,964 UART: [ldev] ++
6,056,637 UART: [ldev] CDI.KEYID = 6
6,057,520 UART: [ldev] SUBJECT.KEYID = 5
6,058,728 UART: [ldev] AUTHORITY.KEYID = 7
6,059,958 UART: [ldev] FE.KEYID = 1
6,099,098 UART: [ldev] Erasing FE.KEYID = 1
8,607,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,475 UART: [ldev] --
10,416,449 UART: [fwproc] Wait for Commands...
10,418,217 UART: [fwproc] Recv command 0x46574c44
10,420,522 UART: [fwproc] Recv'd Img size: 118548 bytes
13,922,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,998 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,354 >>> mbox cmd response: success
14,687,684 UART: [afmc] ++
14,688,410 UART: [afmc] CDI.KEYID = 6
14,689,520 UART: [afmc] SUBJECT.KEYID = 7
14,691,083 UART: [afmc] AUTHORITY.KEYID = 5
17,237,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,768 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,862 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,011,008 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,909 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,049,686 UART: [afmc] --
19,052,535 UART: [cold-reset] --
19,057,749 UART: [state] Locking Datavault
19,061,492 UART: [state] Locking PCR0, PCR1 and PCR31
19,063,700 UART: [state] Locking ICCM
19,064,993 UART: [exit] Launching FMC @ 0x40000130
19,073,675 UART:
19,073,917 UART: Running Caliptra FMC ...
19,075,019 UART:
19,075,202 UART: [state] CFI Enabled
19,135,957 UART: [fht] FMC Alias Private Key: 7
20,902,043 UART: [art] Extend RT PCRs Done
20,903,266 UART: [art] Lock RT PCRs Done
20,905,100 UART: [art] Populate DV Done
20,910,776 UART: [fht] FMC Alias Private Key: 7
20,912,249 UART: [art] Derive CDI
20,913,004 UART: [art] Store in slot 0x4
20,968,529 UART: [art] Derive Key Pair
20,969,566 UART: [art] Store priv key in slot 0x5
23,432,115 UART: [art] Derive Key Pair - Done
23,444,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,157,880 UART: [art] Erasing AUTHORITY.KEYID = 7
25,159,395 UART: [art] PUB.X = BFE3069FA86C688C43945D29E13F9F4A707C1AB120173623F28C00CF3434DFFD74A4506DF8694AA9C44D137E727888D3
25,166,596 UART: [art] PUB.Y = 2667CD26CBE8B0416F1342D8A19E7B4A6FF22499D324C445AE77B208870D66F4E91C4A7DE590A55024D18C1CD1666537
25,173,833 UART: [art] SIG.R = 62911C1D5399F40BFA64AEDA4B66671D19F8C9E1D34D596182C57486067D6657B96F30F817FCA31741381C8E2A268928
25,181,254 UART: [art] SIG.S = 6A60FC0E35EA9CC984E780F19BAADF7F9B5FE35748444C6CB96D4A1D3ADD350877672217C83CBFF5AB26D8EE6CAFC319
26,160,678 UART: Caliptra RT
26,161,394 UART: [state] CFI Enabled
26,340,502 UART: [rt] RT listening for mailbox commands...
26,342,426 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,373,077 UART: [rt]cmd =0x44504543, len=96
30,737,456 >>> mbox cmd response data (6236 bytes)
30,767,161 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,797,895 UART: [rt]cmd =0x53574545, len=84
34,974,587 >>> mbox cmd response data (200 bytes)
37,420,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,570,841 UART:
37,571,226 UART: Running Caliptra ROM ...
37,572,272 UART:
37,572,421 UART: [state] CFI Enabled
37,632,196 UART: [state] LifecycleState = Unprovisioned
37,634,291 UART: [state] DebugLocked = No
37,636,244 UART: [state] WD Timer not started. Device not locked for debugging
37,641,166 UART: [kat] SHA2-256
37,831,061 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,841,787 UART: [kat] ++
37,842,261 UART: [kat] sha1
37,853,526 UART: [kat] SHA2-256
37,856,535 UART: [kat] SHA2-384
37,862,083 UART: [kat] SHA2-512-ACC
37,864,650 UART: [kat] ECC-384
40,315,063 UART: [kat] HMAC-384Kdf
40,338,809 UART: [kat] LMS
40,870,368 UART: [kat] --
40,875,337 UART: [update-reset] ++
44,381,993 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,384,720 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,014,457 >>> mbox cmd response: success
45,014,919 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,015,315 UART: [update-reset] Copying MAN_2 To MAN_1
45,052,407 UART: [update-reset Success] --
45,057,546 UART: [state] Locking Datavault
45,061,803 UART: [state] Locking PCR0, PCR1 and PCR31
45,063,993 UART: [state] Locking ICCM
45,066,358 UART: [exit] Launching FMC @ 0x40000130
45,075,020 UART:
45,075,256 UART: Running Caliptra FMC ...
45,076,358 UART:
45,076,516 UART: [state] CFI Enabled
45,170,103 UART: [art] Extend RT PCRs Done
45,171,294 UART: [art] Lock RT PCRs Done
45,172,584 UART: [art] Populate DV Done
45,178,039 UART: [fht] FMC Alias Private Key: 7
45,179,623 UART: [art] Derive CDI
45,180,433 UART: [art] Store in slot 0x4
45,238,684 UART: [art] Derive Key Pair
45,239,720 UART: [art] Store priv key in slot 0x5
47,702,584 UART: [art] Derive Key Pair - Done
47,715,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,427,972 UART: [art] Erasing AUTHORITY.KEYID = 7
49,429,617 UART: [art] PUB.X = 5618A3FF38B9C6B8CC1647722385CF84E3CFB00D4EB13C8E656CEEB3EF14504FAC97C981FF936AC8B47DF7A066A63063
49,436,763 UART: [art] PUB.Y = 1B50BA4F9CD73F5808505D0D2657C58ECF955B5EB990B09DA5F38B4153A31747CE3F100D9296585CCD314B1EDABF0CCA
49,444,003 UART: [art] SIG.R = 0792450775101525CF8AAF4629B88A157299B4A19F550976208873F55A832DF694AD27A4AB555D77981DD1B5FDB84954
49,451,394 UART: [art] SIG.S = 7F2DAD4D28718FC65C64E8C97D4044C79960424361CFD0C711AF09065DBA77F34FE39E65B76AE8D341031E7659BF62A3
50,430,315 UART: Caliptra RT
50,431,000 UART: [state] CFI Enabled
50,855,425 UART: [rt] RT listening for mailbox commands...
50,887,033 UART: [rt]cmd =0x53574545, len=84
55,065,483 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
3,438,682 ready_for_fw is high
3,439,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,585 >>> mbox cmd response: success
19,135,489 UART:
19,135,879 UART: Running Caliptra FMC ...
19,137,017 UART:
19,137,178 UART: [state] CFI Enabled
19,205,057 UART: [fht] FMC Alias Private Key: 7
20,971,525 UART: [art] Extend RT PCRs Done
20,972,758 UART: [art] Lock RT PCRs Done
20,974,328 UART: [art] Populate DV Done
20,979,580 UART: [fht] FMC Alias Private Key: 7
20,981,234 UART: [art] Derive CDI
20,982,051 UART: [art] Store in slot 0x4
21,037,898 UART: [art] Derive Key Pair
21,038,900 UART: [art] Store priv key in slot 0x5
23,501,440 UART: [art] Derive Key Pair - Done
23,514,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,504 UART: [art] Erasing AUTHORITY.KEYID = 7
25,229,017 UART: [art] PUB.X = A8230EE2A5050EB7769F085BEB45D7C626104D866169B2F58435FBBF27258DADDAF61E58AB1D93C2DBA0F8E800F5959A
25,236,264 UART: [art] PUB.Y = 4197B7B475DE440D637577EA1DF47F0B927F694D51E83F57A52101D5F60BAC141E92E4240E9CFAAF77B230547050147E
25,243,524 UART: [art] SIG.R = 7962278188386C3023B498FCFAED7A8F62892B3F84CA3C86D5B023EF50ED559713E56CC1FADA1DAFE9F601CF1C892A1D
25,250,935 UART: [art] SIG.S = 8413AA90B614589119893A34EFFCFC8882BD6FD73F05A94C82490BF1840F11A9ED6FB2AF69920ACE1CFE7B27DC063503
26,230,184 UART: Caliptra RT
26,230,899 UART: [state] CFI Enabled
26,409,962 UART: [rt] RT listening for mailbox commands...
26,411,890 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,442,488 UART: [rt]cmd =0x44504543, len=96
30,807,143 >>> mbox cmd response data (6236 bytes)
30,836,998 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,867,515 UART: [rt]cmd =0x53574545, len=84
35,044,580 >>> mbox cmd response data (200 bytes)
37,493,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,395,873 >>> mbox cmd response: success
45,396,474 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,429,331 UART:
45,429,619 UART: Running Caliptra FMC ...
45,430,656 UART:
45,430,806 UART: [state] CFI Enabled
45,518,814 UART: [art] Extend RT PCRs Done
45,520,127 UART: [art] Lock RT PCRs Done
45,521,458 UART: [art] Populate DV Done
45,526,925 UART: [fht] FMC Alias Private Key: 7
45,528,575 UART: [art] Derive CDI
45,529,347 UART: [art] Store in slot 0x4
45,587,534 UART: [art] Derive Key Pair
45,588,541 UART: [art] Store priv key in slot 0x5
48,052,152 UART: [art] Derive Key Pair - Done
48,065,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,777,748 UART: [art] Erasing AUTHORITY.KEYID = 7
49,779,247 UART: [art] PUB.X = B29A683EE285854011CBC8BAF651E1600E90FBCE5CA6097D58AEE5E718CAE381356D60DCD46D78FE5EC3B914442FE847
49,786,542 UART: [art] PUB.Y = D79AD0CC0420319AD6E8055C05E10A3FD075F5B0FF88EF8BF130599CD9F591AE5D312246547C0CB02103373115F3C59B
49,793,825 UART: [art] SIG.R = D9E1D5941039918C73F3DE088F56A99779B88644E5EE7E54E334F8209C9C23DF978D27BF512E660622FB24C7855006AF
49,801,153 UART: [art] SIG.S = 7B2E2EF1A77B48B9E6F4F703B388C2999273886685C3753D9FD2052477B06C67D6668F9AE1EC4DF505DDFDECC7D8454B
50,780,464 UART: Caliptra RT
50,781,180 UART: [state] CFI Enabled
51,203,747 UART: [rt] RT listening for mailbox commands...
51,235,209 UART: [rt]cmd =0x53574545, len=84
55,416,516 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
192,563 UART:
192,932 UART: Running Caliptra ROM ...
194,034 UART:
603,760 UART: [state] CFI Enabled
611,891 UART: [state] LifecycleState = Unprovisioned
613,911 UART: [state] DebugLocked = No
615,650 UART: [state] WD Timer not started. Device not locked for debugging
620,410 UART: [kat] SHA2-256
810,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
821,054 UART: [kat] ++
821,582 UART: [kat] sha1
833,331 UART: [kat] SHA2-256
836,350 UART: [kat] SHA2-384
841,778 UART: [kat] SHA2-512-ACC
844,370 UART: [kat] ECC-384
3,287,226 UART: [kat] HMAC-384Kdf
3,299,792 UART: [kat] LMS
3,831,651 UART: [kat] --
3,834,158 UART: [cold-reset] ++
3,836,165 UART: [fht] FHT @ 0x50003400
3,848,567 UART: [idev] ++
3,849,276 UART: [idev] CDI.KEYID = 6
3,850,192 UART: [idev] SUBJECT.KEYID = 7
3,851,443 UART: [idev] UDS.KEYID = 0
3,852,757 ready_for_fw is high
3,852,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,001,785 UART: [idev] Erasing UDS.KEYID = 0
6,326,586 UART: [idev] Sha1 KeyId Algorithm
6,348,927 UART: [idev] --
6,352,683 UART: [ldev] ++
6,353,431 UART: [ldev] CDI.KEYID = 6
6,354,345 UART: [ldev] SUBJECT.KEYID = 5
6,355,506 UART: [ldev] AUTHORITY.KEYID = 7
6,356,638 UART: [ldev] FE.KEYID = 1
6,369,390 UART: [ldev] Erasing FE.KEYID = 1
8,846,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,168 UART: [ldev] --
10,638,456 UART: [fwproc] Wait for Commands...
10,641,576 UART: [fwproc] Recv command 0x46574c44
10,643,854 UART: [fwproc] Recv'd Img size: 118548 bytes
14,139,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,344,136 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,624 >>> mbox cmd response: success
14,907,579 UART: [afmc] ++
14,908,308 UART: [afmc] CDI.KEYID = 6
14,909,510 UART: [afmc] SUBJECT.KEYID = 7
14,910,961 UART: [afmc] AUTHORITY.KEYID = 5
17,410,751 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,131,085 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,133,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,148,128 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,163,272 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,178,194 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,202,237 UART: [afmc] --
19,206,612 UART: [cold-reset] --
19,211,082 UART: [state] Locking Datavault
19,217,169 UART: [state] Locking PCR0, PCR1 and PCR31
19,219,342 UART: [state] Locking ICCM
19,221,272 UART: [exit] Launching FMC @ 0x40000130
19,229,957 UART:
19,230,193 UART: Running Caliptra FMC ...
19,231,221 UART:
19,231,372 UART: [state] CFI Enabled
19,239,531 UART: [fht] FMC Alias Private Key: 7
21,005,242 UART: [art] Extend RT PCRs Done
21,006,471 UART: [art] Lock RT PCRs Done
21,008,245 UART: [art] Populate DV Done
21,014,105 UART: [fht] FMC Alias Private Key: 7
21,015,715 UART: [art] Derive CDI
21,016,541 UART: [art] Store in slot 0x4
21,059,319 UART: [art] Derive Key Pair
21,060,393 UART: [art] Store priv key in slot 0x5
23,487,753 UART: [art] Derive Key Pair - Done
23,501,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,207,439 UART: [art] Erasing AUTHORITY.KEYID = 7
25,208,944 UART: [art] PUB.X = D29208945E73F42064C49CBB6FD6487452F8AC3E1492E9562CA633509A7E7D6621085FD6022528238FC8A7E3734C88E5
25,216,224 UART: [art] PUB.Y = D82F5C05226A60C73E6C3CA1E5B7F896DC1DF5FEB8230A247876F56BEE28202EC608FDE61569336854CA018B233A475F
25,223,440 UART: [art] SIG.R = 6130F931DD9CEF16FD5AA4C5CC26C9076D6CA05EBF198C5B149B555FFD76CA5266AB066409509355D15ED71679F25116
25,230,869 UART: [art] SIG.S = 03F1B03FCC680304CBACEF63CA7B2E1B30D38AD64F73DA99DC56CD48509EED1B176C582BC0BF4EE42532D512F306BC3A
26,209,755 UART: Caliptra RT
26,210,463 UART: [state] CFI Enabled
26,343,147 UART: [rt] RT listening for mailbox commands...
26,345,071 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,375,720 UART: [rt]cmd =0x44504543, len=96
30,661,448 >>> mbox cmd response data (6236 bytes)
30,691,166 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,721,959 UART: [rt]cmd =0x53574545, len=84
34,857,085 >>> mbox cmd response data (200 bytes)
37,311,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,462,656 UART:
37,463,030 UART: Running Caliptra ROM ...
37,464,157 UART:
37,464,325 UART: [state] CFI Enabled
37,475,201 UART: [state] LifecycleState = Unprovisioned
37,477,046 UART: [state] DebugLocked = No
37,479,526 UART: [state] WD Timer not started. Device not locked for debugging
37,483,676 UART: [kat] SHA2-256
37,673,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,684,288 UART: [kat] ++
37,684,885 UART: [kat] sha1
37,697,697 UART: [kat] SHA2-256
37,700,707 UART: [kat] SHA2-384
37,707,523 UART: [kat] SHA2-512-ACC
37,710,100 UART: [kat] ECC-384
40,155,992 UART: [kat] HMAC-384Kdf
40,168,555 UART: [kat] LMS
40,700,163 UART: [kat] --
40,703,925 UART: [update-reset] ++
44,211,377 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,215,453 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,845,200 >>> mbox cmd response: success
44,845,656 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,846,101 UART: [update-reset] Copying MAN_2 To MAN_1
44,883,681 UART: [update-reset Success] --
44,887,766 UART: [state] Locking Datavault
44,890,057 UART: [state] Locking PCR0, PCR1 and PCR31
44,892,210 UART: [state] Locking ICCM
44,893,738 UART: [exit] Launching FMC @ 0x40000130
44,902,390 UART:
44,902,644 UART: Running Caliptra FMC ...
44,903,758 UART:
44,903,922 UART: [state] CFI Enabled
44,947,940 UART: [art] Extend RT PCRs Done
44,949,111 UART: [art] Lock RT PCRs Done
44,950,616 UART: [art] Populate DV Done
44,956,079 UART: [fht] FMC Alias Private Key: 7
44,957,731 UART: [art] Derive CDI
44,958,545 UART: [art] Store in slot 0x4
45,001,089 UART: [art] Derive Key Pair
45,002,202 UART: [art] Store priv key in slot 0x5
47,429,240 UART: [art] Derive Key Pair - Done
47,442,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,148,281 UART: [art] Erasing AUTHORITY.KEYID = 7
49,149,782 UART: [art] PUB.X = 4F4B34FE7103697D729E32C15892952502F02E3D9D9DEC438EECF2BEA4C23E4F3BBD93A6B6AF7F830D7D7A6F5217DFDF
49,157,104 UART: [art] PUB.Y = B3708D718C13708CE6F5A4940BABD2DB644DE49B1F6A2D51FA294BA21986D4580C5D587F23C44D9321CCDAA0BC1604F0
49,164,338 UART: [art] SIG.R = B091E054AA0472F8783551B1EBD56D7838E8B5AD298B4B9F784A9AA912CDCBF4398292F82F73667A3D5BAC2640A2B360
49,171,761 UART: [art] SIG.S = 4DDCE04B561C61BC6058E12D375A9B8B6CB5961D6AD52C9DF7BB463CED4A88EAFCB117B2B646961EAEC4EB0F8FA33431
50,150,743 UART: Caliptra RT
50,151,448 UART: [state] CFI Enabled
50,525,110 UART: [rt] RT listening for mailbox commands...
50,556,744 UART: [rt]cmd =0x53574545, len=84
54,692,508 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,757,289 ready_for_fw is high
3,757,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,500 >>> mbox cmd response: success
19,302,203 UART:
19,302,608 UART: Running Caliptra FMC ...
19,303,753 UART:
19,303,919 UART: [state] CFI Enabled
19,311,884 UART: [fht] FMC Alias Private Key: 7
21,078,440 UART: [art] Extend RT PCRs Done
21,079,680 UART: [art] Lock RT PCRs Done
21,081,427 UART: [art] Populate DV Done
21,086,887 UART: [fht] FMC Alias Private Key: 7
21,088,492 UART: [art] Derive CDI
21,089,238 UART: [art] Store in slot 0x4
21,131,730 UART: [art] Derive Key Pair
21,132,735 UART: [art] Store priv key in slot 0x5
23,559,643 UART: [art] Derive Key Pair - Done
23,572,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,755 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,268 UART: [art] PUB.X = D325F5842397D937671DC25D5072BA1D131712EED991920BF83E7831E4F3AABB36383BD72D4895ADAE250F9CC84558A3
25,287,527 UART: [art] PUB.Y = 4FC0E56951983D6423F0A7ECA8B5839A99E8F4FB04237E3AA80BB91B924485F90E795C3991E74467C25E23561FB2C3FF
25,294,738 UART: [art] SIG.R = C6BF826E7C0143DBE79AF4213EF07D738C43F91D4FA1EAEEC963DA2626E59F0180C59FF83D0106E6442A13BD737CD488
25,302,360 UART: [art] SIG.S = 34EE392A7E4284C3B27B134A1EB9EB54B5253AA505095EE3E6235058B42A784F27142962E02E992234E9C2269793F5D1
26,281,147 UART: Caliptra RT
26,281,860 UART: [state] CFI Enabled
26,414,363 UART: [rt] RT listening for mailbox commands...
26,416,288 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,446,913 UART: [rt]cmd =0x44504543, len=96
30,733,110 >>> mbox cmd response data (6236 bytes)
30,762,965 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,793,647 UART: [rt]cmd =0x53574545, len=84
34,929,617 >>> mbox cmd response data (200 bytes)
37,385,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,208,938 >>> mbox cmd response: success
45,209,489 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,242,307 UART:
45,242,639 UART: Running Caliptra FMC ...
45,243,684 UART:
45,243,836 UART: [state] CFI Enabled
45,287,975 UART: [art] Extend RT PCRs Done
45,289,233 UART: [art] Lock RT PCRs Done
45,290,570 UART: [art] Populate DV Done
45,295,823 UART: [fht] FMC Alias Private Key: 7
45,297,577 UART: [art] Derive CDI
45,298,314 UART: [art] Store in slot 0x4
45,340,762 UART: [art] Derive Key Pair
45,341,806 UART: [art] Store priv key in slot 0x5
47,768,329 UART: [art] Derive Key Pair - Done
47,781,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,488,049 UART: [art] Erasing AUTHORITY.KEYID = 7
49,489,562 UART: [art] PUB.X = 1CF2C2EC3E83579BED6A43BE0CED8936CF172EB98431D3B50F37851BD9DCE7548B00793BE66781089C414AB7C6DBF4C6
49,496,840 UART: [art] PUB.Y = 3CD8F52D78B3DD7CB484B5757C9F8758FEFFDB82EA1D62005636A4359F9220BEAF726CF4C238AC7D076E9006A163A1C5
49,504,090 UART: [art] SIG.R = 47D8A1F33CEC1F0D8049C4F1A218690B0B1B541D7D379F4BB7DA298C36DB7989A9264B9C12A5EFD9B8FAF8369EB7F750
49,511,450 UART: [art] SIG.S = 1C6BFD22EB4B3A78E1C7B92E273E11EEA92ED5DDD75E8DE2E1F15C1E7E03A7803909739FD4A243C6A59358B370E65E98
50,490,293 UART: Caliptra RT
50,491,027 UART: [state] CFI Enabled
50,864,566 UART: [rt] RT listening for mailbox commands...
50,896,365 UART: [rt]cmd =0x53574545, len=84
55,032,143 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,336 UART: [state] LifecycleState = Unprovisioned
85,991 UART: [state] DebugLocked = No
86,635 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,115 UART: [kat] SHA2-256
882,046 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,161 UART: [kat] ++
886,313 UART: [kat] sha1
890,495 UART: [kat] SHA2-256
892,433 UART: [kat] SHA2-384
895,150 UART: [kat] SHA2-512-ACC
897,051 UART: [kat] ECC-384
902,822 UART: [kat] HMAC-384Kdf
907,636 UART: [kat] LMS
1,475,832 UART: [kat] --
1,476,765 UART: [cold-reset] ++
1,477,127 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 ready_for_fw is high
1,481,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,036 UART: [idev] Erasing UDS.KEYID = 0
1,505,688 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,448 UART: [idev] --
1,515,421 UART: [ldev] ++
1,515,589 UART: [ldev] CDI.KEYID = 6
1,515,952 UART: [ldev] SUBJECT.KEYID = 5
1,516,378 UART: [ldev] AUTHORITY.KEYID = 7
1,516,841 UART: [ldev] FE.KEYID = 1
1,521,957 UART: [ldev] Erasing FE.KEYID = 1
1,547,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,214 UART: [ldev] --
1,586,523 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 118548 bytes
2,931,583 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,159 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,784 >>> mbox cmd response: success
3,131,006 UART: [afmc] ++
3,131,174 UART: [afmc] CDI.KEYID = 6
3,131,536 UART: [afmc] SUBJECT.KEYID = 7
3,131,961 UART: [afmc] AUTHORITY.KEYID = 5
3,166,470 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,644 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,016 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,699 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,625 UART: [afmc] --
3,209,723 UART: [cold-reset] --
3,210,823 UART: [state] Locking Datavault
3,212,166 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,770 UART: [state] Locking ICCM
3,213,360 UART: [exit] Launching FMC @ 0x40000130
3,218,690 UART:
3,218,706 UART: Running Caliptra FMC ...
3,219,114 UART:
3,219,168 UART: [state] CFI Enabled
3,229,870 UART: [fht] FMC Alias Private Key: 7
3,348,480 UART: [art] Extend RT PCRs Done
3,348,908 UART: [art] Lock RT PCRs Done
3,350,370 UART: [art] Populate DV Done
3,358,419 UART: [fht] FMC Alias Private Key: 7
3,359,425 UART: [art] Derive CDI
3,359,705 UART: [art] Store in slot 0x4
3,445,357 UART: [art] Derive Key Pair
3,445,717 UART: [art] Store priv key in slot 0x5
3,458,950 UART: [art] Derive Key Pair - Done
3,473,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,641 UART: [art] PUB.X = 6741A33824F2DB6B0AEB34CF75BCAFBFD62DE916A53771B8EE842FE7A6281924A5F65781347B78FEB0CE5BF498AC4E82
3,496,424 UART: [art] PUB.Y = 08929E3AF2F4559DBA1CA07F30DF90CE507162B7946D65D4AF66D38649EA6B217A37AB168A821A5F29966A02E3D593F1
3,503,372 UART: [art] SIG.R = 5C1AB27227DD9A1901E88FABE0B5FBB1D7FE935B091EAE6FA334936E115E59DBADA241FC614275B56D5938F1E9375BAF
3,510,154 UART: [art] SIG.S = 51A1F184F3F40C361C74167CD5A09A341A01E3DC0A7FA5D6AA9757561E61712C342B8D2D3B420FFA0EE068906D800107
3,534,951 UART: Caliptra RT
3,535,202 UART: [state] CFI Enabled
3,655,765 UART: [rt] RT listening for mailbox commands...
3,656,435 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,743 UART: [rt]cmd =0x44504543, len=96
3,868,197 >>> mbox cmd response data (6236 bytes)
3,868,198 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,961 UART: [rt]cmd =0x53574545, len=84
3,924,538 >>> mbox cmd response data (200 bytes)
3,924,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,925,433 UART:
3,925,449 UART: Running Caliptra ROM ...
3,925,857 UART:
3,925,911 UART: [state] CFI Enabled
3,928,367 UART: [state] LifecycleState = Unprovisioned
3,929,022 UART: [state] DebugLocked = No
3,929,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,931,033 UART: [kat] SHA2-256
4,724,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,729,079 UART: [kat] ++
4,729,231 UART: [kat] sha1
4,733,635 UART: [kat] SHA2-256
4,735,573 UART: [kat] SHA2-384
4,738,204 UART: [kat] SHA2-512-ACC
4,740,104 UART: [kat] ECC-384
4,745,773 UART: [kat] HMAC-384Kdf
4,750,199 UART: [kat] LMS
5,318,395 UART: [kat] --
5,319,364 UART: [update-reset] ++
6,699,796 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,700,980 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,856,247 >>> mbox cmd response: success
6,856,247 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,856,468 UART: [update-reset] Copying MAN_2 To MAN_1
6,864,482 UART: [update-reset Success] --
6,865,529 UART: [state] Locking Datavault
6,866,385 UART: [state] Locking PCR0, PCR1 and PCR31
6,866,989 UART: [state] Locking ICCM
6,867,469 UART: [exit] Launching FMC @ 0x40000130
6,872,799 UART:
6,872,815 UART: Running Caliptra FMC ...
6,873,223 UART:
6,873,277 UART: [state] CFI Enabled
6,962,122 UART: [art] Extend RT PCRs Done
6,962,550 UART: [art] Lock RT PCRs Done
6,964,027 UART: [art] Populate DV Done
6,972,262 UART: [fht] FMC Alias Private Key: 7
6,973,418 UART: [art] Derive CDI
6,973,698 UART: [art] Store in slot 0x4
7,059,726 UART: [art] Derive Key Pair
7,060,086 UART: [art] Store priv key in slot 0x5
7,073,213 UART: [art] Derive Key Pair - Done
7,087,628 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,103,055 UART: [art] Erasing AUTHORITY.KEYID = 7
7,103,820 UART: [art] PUB.X = CAAEACFF7D319DC7D152DFB0C3988B018D7C41CD3E080230D4815FAA5B28FFFAC44D7335DBA84C3EAF37CB2A816B288D
7,110,609 UART: [art] PUB.Y = 2D19854B19853C7F31756185A463BBF51797BC7368893622DAAD0FE1A717A246F3C2B281200E1A43AAD4482AEE9A80C6
7,117,553 UART: [art] SIG.R = B5ADAB0C0C19D2444241DC5C2F9057FF01F0E27D3A06D68BBCDABC89F61995FDC55045564CF85CDA68C4B2E48AE60D04
7,124,325 UART: [art] SIG.S = 9FD7E7EB03C66CA6AA15E27C79707D0B17C49BCB93D208141301DE7E239CD66654E86D77F0276EC953E14E4D971B2B19
7,147,795 UART: Caliptra RT
7,148,046 UART: [state] CFI Enabled
7,515,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,545,481 UART: [rt]cmd =0x53574545, len=84
7,571,538 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.61s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,185 ready_for_fw is high
1,362,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,670 >>> mbox cmd response: success
3,042,425 UART:
3,042,441 UART: Running Caliptra FMC ...
3,042,849 UART:
3,042,903 UART: [state] CFI Enabled
3,053,297 UART: [fht] FMC Alias Private Key: 7
3,172,641 UART: [art] Extend RT PCRs Done
3,173,069 UART: [art] Lock RT PCRs Done
3,174,453 UART: [art] Populate DV Done
3,182,758 UART: [fht] FMC Alias Private Key: 7
3,183,856 UART: [art] Derive CDI
3,184,136 UART: [art] Store in slot 0x4
3,269,648 UART: [art] Derive Key Pair
3,270,008 UART: [art] Store priv key in slot 0x5
3,283,113 UART: [art] Derive Key Pair - Done
3,297,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,306 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,071 UART: [art] PUB.X = F023AD7CD24DE395E5DC10EF3B9B36D4CC85425636F588EA8B710C66B1ED003506021102B113CB10E5C398B080622EEF
3,320,813 UART: [art] PUB.Y = 218F2E08FCA47EDA141EF73173DBE2C42D7349C6A50BC1A055D56186DCCAF6EDAF6E6F7A5177F7967C596536B25CB0D8
3,327,773 UART: [art] SIG.R = 58EF5FD9E8A2AED68312C749D680EB9EC3BEBD5FDCB6EFBF5818601277547E2CC7EFF864598D1489DD3DEB0F7EB1AA74
3,334,566 UART: [art] SIG.S = BB9A1041C8890C73C860FBB875C8D6ADD2D9EC177D99049E11876B516C2971AC166EFC3939AEFF2757A2944381956AB2
3,358,956 UART: Caliptra RT
3,359,207 UART: [state] CFI Enabled
3,478,821 UART: [rt] RT listening for mailbox commands...
3,479,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,005 UART: [rt]cmd =0x44504543, len=96
3,691,646 >>> mbox cmd response data (6236 bytes)
3,691,647 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,721,340 UART: [rt]cmd =0x53574545, len=84
3,746,643 >>> mbox cmd response data (200 bytes)
3,746,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,560,960 >>> mbox cmd response: success
6,560,960 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,574,366 UART:
6,574,382 UART: Running Caliptra FMC ...
6,574,790 UART:
6,574,844 UART: [state] CFI Enabled
6,663,979 UART: [art] Extend RT PCRs Done
6,664,407 UART: [art] Lock RT PCRs Done
6,666,000 UART: [art] Populate DV Done
6,673,967 UART: [fht] FMC Alias Private Key: 7
6,675,067 UART: [art] Derive CDI
6,675,347 UART: [art] Store in slot 0x4
6,760,887 UART: [art] Derive Key Pair
6,761,247 UART: [art] Store priv key in slot 0x5
6,774,662 UART: [art] Derive Key Pair - Done
6,789,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,805,026 UART: [art] Erasing AUTHORITY.KEYID = 7
6,805,791 UART: [art] PUB.X = D40D2749C7DDCD2D25309DE75846AB48AD841F5844621514DE1CFE5628B0C982427473C8DACF45089DD8322D4B89C6A3
6,812,559 UART: [art] PUB.Y = E54574526DE7B02584A6B528D59DC5BC3966C3E8B3AFD563E5C3339993CA27058B2143659D5D6EB3C02C5E14BBE34F54
6,819,510 UART: [art] SIG.R = 0DEF929B4AFF0A45E23F3FDF3BC465C6FD530CFDA252DC3C8ED750B89634877EA5DE8752F44E9DE35577FB7857086C45
6,826,284 UART: [art] SIG.S = 3DA26CCCF07B356021C1B43790C7B605B823756799B97D9D46D4779E15FF24C6FAC366EFCDBD5B8A45E5FAA15611F67F
6,849,883 UART: Caliptra RT
6,850,134 UART: [state] CFI Enabled
7,214,784 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,245,437 UART: [rt]cmd =0x53574545, len=84
7,271,480 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,159 UART: [state] LifecycleState = Unprovisioned
86,814 UART: [state] DebugLocked = No
87,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,948 UART: [kat] SHA2-256
882,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,994 UART: [kat] ++
887,146 UART: [kat] sha1
891,434 UART: [kat] SHA2-256
893,372 UART: [kat] SHA2-384
896,185 UART: [kat] SHA2-512-ACC
898,086 UART: [kat] ECC-384
903,513 UART: [kat] HMAC-384Kdf
908,223 UART: [kat] LMS
1,476,419 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,756 UART: [fht] Storing FHT @ 0x50003400
1,480,467 UART: [idev] ++
1,480,635 UART: [idev] CDI.KEYID = 6
1,480,995 UART: [idev] SUBJECT.KEYID = 7
1,481,419 UART: [idev] UDS.KEYID = 0
1,481,764 ready_for_fw is high
1,481,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,629 UART: [idev] Erasing UDS.KEYID = 0
1,505,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,161 UART: [idev] --
1,515,162 UART: [ldev] ++
1,515,330 UART: [ldev] CDI.KEYID = 6
1,515,693 UART: [ldev] SUBJECT.KEYID = 5
1,516,119 UART: [ldev] AUTHORITY.KEYID = 7
1,516,582 UART: [ldev] FE.KEYID = 1
1,521,706 UART: [ldev] Erasing FE.KEYID = 1
1,547,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,001 UART: [ldev] --
1,586,356 UART: [fwproc] Waiting for Commands...
1,587,207 UART: [fwproc] Received command 0x46574c44
1,587,998 UART: [fwproc] Received Image of size 118548 bytes
2,931,820 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,484 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,702 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,133 >>> mbox cmd response: success
3,133,361 UART: [afmc] ++
3,133,529 UART: [afmc] CDI.KEYID = 6
3,133,891 UART: [afmc] SUBJECT.KEYID = 7
3,134,316 UART: [afmc] AUTHORITY.KEYID = 5
3,169,793 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,049 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,829 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,538 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,421 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,104 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,036 UART: [afmc] --
3,213,134 UART: [cold-reset] --
3,214,024 UART: [state] Locking Datavault
3,215,301 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,905 UART: [state] Locking ICCM
3,216,567 UART: [exit] Launching FMC @ 0x40000130
3,221,897 UART:
3,221,913 UART: Running Caliptra FMC ...
3,222,321 UART:
3,222,464 UART: [state] CFI Enabled
3,233,228 UART: [fht] FMC Alias Private Key: 7
3,351,396 UART: [art] Extend RT PCRs Done
3,351,824 UART: [art] Lock RT PCRs Done
3,353,316 UART: [art] Populate DV Done
3,361,355 UART: [fht] FMC Alias Private Key: 7
3,362,465 UART: [art] Derive CDI
3,362,745 UART: [art] Store in slot 0x4
3,448,479 UART: [art] Derive Key Pair
3,448,839 UART: [art] Store priv key in slot 0x5
3,462,012 UART: [art] Derive Key Pair - Done
3,476,729 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,042 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,807 UART: [art] PUB.X = 0EA638759C391E3F658F83C0A96058BD3009321E3710837822C32C8C3E54D9056992D7AE22B8A938A5762673556EF7D4
3,499,556 UART: [art] PUB.Y = 0F2375E44C63CF820C551F3E31AA622387634715A9DF3A1AE100B4FC77901B8ABF734FA2AE5F262A84BBF40904F71464
3,506,476 UART: [art] SIG.R = 0E8EC32318F47F2FC523E54C34B9B096F96A249B31BBB0CF8DD631A0DF68BFE52E84DD356AFB277FB0C87DBF0DEE184E
3,513,264 UART: [art] SIG.S = BB1E51FC936EAC833B6F9C66A4EF00209F529EEF4EECA2452E50ADF93B353B4D7B2F6750064DB46E81E77F6B6FA45696
3,537,375 UART: Caliptra RT
3,537,718 UART: [state] CFI Enabled
3,658,224 UART: [rt] RT listening for mailbox commands...
3,658,894 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,050 UART: [rt]cmd =0x44504543, len=96
3,870,883 >>> mbox cmd response data (6236 bytes)
3,870,884 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,900,525 UART: [rt]cmd =0x53574545, len=84
3,926,928 >>> mbox cmd response data (200 bytes)
3,926,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,927,895 UART:
3,927,911 UART: Running Caliptra ROM ...
3,928,319 UART:
3,928,460 UART: [state] CFI Enabled
3,931,612 UART: [state] LifecycleState = Unprovisioned
3,932,267 UART: [state] DebugLocked = No
3,932,833 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,934,472 UART: [kat] SHA2-256
4,728,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,732,518 UART: [kat] ++
4,732,670 UART: [kat] sha1
4,736,870 UART: [kat] SHA2-256
4,738,808 UART: [kat] SHA2-384
4,741,629 UART: [kat] SHA2-512-ACC
4,743,529 UART: [kat] ECC-384
4,749,324 UART: [kat] HMAC-384Kdf
4,754,154 UART: [kat] LMS
5,322,350 UART: [kat] --
5,323,213 UART: [update-reset] ++
6,704,027 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,705,107 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,860,374 >>> mbox cmd response: success
6,860,374 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,860,601 UART: [update-reset] Copying MAN_2 To MAN_1
6,868,615 UART: [update-reset Success] --
6,869,666 UART: [state] Locking Datavault
6,870,670 UART: [state] Locking PCR0, PCR1 and PCR31
6,871,274 UART: [state] Locking ICCM
6,871,704 UART: [exit] Launching FMC @ 0x40000130
6,877,034 UART:
6,877,050 UART: Running Caliptra FMC ...
6,877,458 UART:
6,877,601 UART: [state] CFI Enabled
6,966,398 UART: [art] Extend RT PCRs Done
6,966,826 UART: [art] Lock RT PCRs Done
6,967,927 UART: [art] Populate DV Done
6,976,120 UART: [fht] FMC Alias Private Key: 7
6,977,266 UART: [art] Derive CDI
6,977,546 UART: [art] Store in slot 0x4
7,062,942 UART: [art] Derive Key Pair
7,063,302 UART: [art] Store priv key in slot 0x5
7,077,015 UART: [art] Derive Key Pair - Done
7,091,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,107,016 UART: [art] Erasing AUTHORITY.KEYID = 7
7,107,781 UART: [art] PUB.X = 6CB67F5725D86B2D699F6CD684CD82998E38EC7F1A48D161C35F9C60D771DF1ABA4AF71CD01F6B1303130780CDD501C9
7,114,552 UART: [art] PUB.Y = 2F3C80759F1D620A87E3741609D43832159F9402E8CD43B27B55AF387B17650405FC2D802120465988A8615CFCF65088
7,121,473 UART: [art] SIG.R = 4C320CE9406F9C8E1C2DC67AB5F0472B3F8F4304A4384C891E064A45718EF440DAA407C0B3EB3A9CC2887914DFC25541
7,128,237 UART: [art] SIG.S = 212DBDA8D5FBDE3006404BE89D71F77248548621B785A01E63EE5B41DBEA68BF55AB9235CDBA4BB3FD3CE1CC60FA8D5A
7,151,978 UART: Caliptra RT
7,152,321 UART: [state] CFI Enabled
7,520,707 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,551,526 UART: [rt]cmd =0x53574545, len=84
7,576,931 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 ready_for_fw is high
1,362,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,271 >>> mbox cmd response: success
3,041,444 UART:
3,041,460 UART: Running Caliptra FMC ...
3,041,868 UART:
3,042,011 UART: [state] CFI Enabled
3,052,945 UART: [fht] FMC Alias Private Key: 7
3,171,805 UART: [art] Extend RT PCRs Done
3,172,233 UART: [art] Lock RT PCRs Done
3,173,773 UART: [art] Populate DV Done
3,182,256 UART: [fht] FMC Alias Private Key: 7
3,183,310 UART: [art] Derive CDI
3,183,590 UART: [art] Store in slot 0x4
3,269,258 UART: [art] Derive Key Pair
3,269,618 UART: [art] Store priv key in slot 0x5
3,283,515 UART: [art] Derive Key Pair - Done
3,298,035 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,299 UART: [art] PUB.X = 40FC7B028FF29A32F66B73AADAEF8A9E4C6689EC2E00FD92F4A5782456B20C6A16E9C9873FB1A3CD570A62546F698A77
3,321,050 UART: [art] PUB.Y = D607AD10FBD4C65849C421A6C1BC8F63CB31B7379E4A0C7A31C33C62C08FA2119E99CF577D3FBB97333FEBD553D0BC91
3,328,010 UART: [art] SIG.R = 7FB2009A5CA9BDB366C0F340DD559E66235DC1A930684492F59C241696D556E61FC76A18AB651D5518D5466145A18B5C
3,334,756 UART: [art] SIG.S = AD32A35D0C912FCACDA04EA986E94DB60D55008D726130D0642EE47DD2A5FB4B8464E3205428CE0EE8760EFCC6E02306
3,358,523 UART: Caliptra RT
3,358,866 UART: [state] CFI Enabled
3,479,454 UART: [rt] RT listening for mailbox commands...
3,480,124 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,376 UART: [rt]cmd =0x44504543, len=96
3,692,765 >>> mbox cmd response data (6236 bytes)
3,692,766 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,611 UART: [rt]cmd =0x53574545, len=84
3,748,646 >>> mbox cmd response data (200 bytes)
3,748,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,563,594 >>> mbox cmd response: success
6,563,594 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,576,878 UART:
6,576,894 UART: Running Caliptra FMC ...
6,577,302 UART:
6,577,445 UART: [state] CFI Enabled
6,666,838 UART: [art] Extend RT PCRs Done
6,667,266 UART: [art] Lock RT PCRs Done
6,668,375 UART: [art] Populate DV Done
6,676,336 UART: [fht] FMC Alias Private Key: 7
6,677,304 UART: [art] Derive CDI
6,677,584 UART: [art] Store in slot 0x4
6,763,424 UART: [art] Derive Key Pair
6,763,784 UART: [art] Store priv key in slot 0x5
6,776,927 UART: [art] Derive Key Pair - Done
6,792,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,808,146 UART: [art] Erasing AUTHORITY.KEYID = 7
6,808,911 UART: [art] PUB.X = 38EB7B62B99B5C3EC712F1396320550A05A2328B0A02B28D6B44E9C065E21D5A67B095BC738F55263DB065C350D51779
6,815,665 UART: [art] PUB.Y = 1A9AB588194F9682BD61E79ABC00E2620C8BCC1EF73073A8B58B05A5F198C62A009A0E677F719C222EA70C4927644697
6,822,559 UART: [art] SIG.R = B1299E1786A233FE6AF7CC8276B50E587438FF627DA1C39DF8F5F1D33715C5D757AAF5F68D498CACF7E215626BF53ED5
6,829,338 UART: [art] SIG.S = CE536DF58F19E90C3BF4BC09703358B58413791794401B9812FA0BB34FB71E710A8D495C4F657F85CA33381AC2262541
6,852,820 UART: Caliptra RT
6,853,163 UART: [state] CFI Enabled
7,212,019 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,242,720 UART: [rt]cmd =0x53574545, len=84
7,268,499 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,800 UART: [state] LifecycleState = Unprovisioned
85,455 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,236 UART: [kat] SHA2-256
890,786 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,890 UART: [kat] ++
895,042 UART: [kat] sha1
899,180 UART: [kat] SHA2-256
901,120 UART: [kat] SHA2-384
903,921 UART: [kat] SHA2-512-ACC
905,822 UART: [kat] ECC-384
915,465 UART: [kat] HMAC-384Kdf
920,015 UART: [kat] LMS
1,168,327 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,806 UART: [fht] FHT @ 0x50003400
1,172,432 UART: [idev] ++
1,172,600 UART: [idev] CDI.KEYID = 6
1,172,961 UART: [idev] SUBJECT.KEYID = 7
1,173,386 UART: [idev] UDS.KEYID = 0
1,173,732 ready_for_fw is high
1,173,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,198,579 UART: [idev] Sha1 KeyId Algorithm
1,207,401 UART: [idev] --
1,208,402 UART: [ldev] ++
1,208,570 UART: [ldev] CDI.KEYID = 6
1,208,934 UART: [ldev] SUBJECT.KEYID = 5
1,209,361 UART: [ldev] AUTHORITY.KEYID = 7
1,209,824 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,242,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,736 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,786 UART: [fwproc] Recv command 0x46574c44
1,282,519 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,234 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,453 >>> mbox cmd response: success
2,826,599 UART: [afmc] ++
2,826,767 UART: [afmc] CDI.KEYID = 6
2,827,130 UART: [afmc] SUBJECT.KEYID = 7
2,827,556 UART: [afmc] AUTHORITY.KEYID = 5
2,863,271 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,476 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,225 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,935 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,816 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,517 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,294 UART: [afmc] --
2,906,113 UART: [cold-reset] --
2,907,119 UART: [state] Locking Datavault
2,908,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,920 UART: [state] Locking ICCM
2,909,470 UART: [exit] Launching FMC @ 0x40000130
2,914,800 UART:
2,914,816 UART: Running Caliptra FMC ...
2,915,224 UART:
2,915,278 UART: [state] CFI Enabled
2,925,714 UART: [fht] FMC Alias Private Key: 7
3,044,768 UART: [art] Extend RT PCRs Done
3,045,196 UART: [art] Lock RT PCRs Done
3,046,940 UART: [art] Populate DV Done
3,055,131 UART: [fht] FMC Alias Private Key: 7
3,056,083 UART: [art] Derive CDI
3,056,363 UART: [art] Store in slot 0x4
3,142,294 UART: [art] Derive Key Pair
3,142,654 UART: [art] Store priv key in slot 0x5
3,156,080 UART: [art] Derive Key Pair - Done
3,170,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,698 UART: [art] PUB.X = 2F86A036CB8B8EC877B7503B45A4D4BEF8AFEA8283547EA1065F57A09DFF670EF10BEC436E36098F92309D8AC494DB97
3,193,468 UART: [art] PUB.Y = 276BB0F1242B775281611F4AE92892DFB3EAB7E5ED79A189D66360A70B8FA1D0DBA28CE285868D1524AD10D0F0D61313
3,200,421 UART: [art] SIG.R = C43B18C66F28DA493E6EB24D885A26F8FE941CE00645871B980DA340661E4BAA7A63D02B2BC1724D0C880EF0DF6FEF6D
3,207,193 UART: [art] SIG.S = 8C4D647A716EF37457BA1431F1F2B59F8BA3221FD989FFB0C1CF410791FEF6EC65AA250256BC24C4140509544E5B8757
3,230,737 UART: Caliptra RT
3,230,988 UART: [state] CFI Enabled
3,349,668 UART: [rt] RT listening for mailbox commands...
3,350,338 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,034 UART: [rt]cmd =0x44504543, len=96
3,563,092 >>> mbox cmd response data (6236 bytes)
3,563,093 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,928 UART: [rt]cmd =0x53574545, len=84
3,619,052 >>> mbox cmd response data (200 bytes)
3,619,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,619,784 UART:
3,619,800 UART: Running Caliptra ROM ...
3,620,208 UART:
3,620,263 UART: [state] CFI Enabled
3,622,843 UART: [state] LifecycleState = Unprovisioned
3,623,498 UART: [state] DebugLocked = No
3,624,082 UART: [state] WD Timer not started. Device not locked for debugging
3,625,284 UART: [kat] SHA2-256
4,428,834 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,432,938 UART: [kat] ++
4,433,090 UART: [kat] sha1
4,437,184 UART: [kat] SHA2-256
4,439,124 UART: [kat] SHA2-384
4,441,911 UART: [kat] SHA2-512-ACC
4,443,811 UART: [kat] ECC-384
4,453,814 UART: [kat] HMAC-384Kdf
4,458,472 UART: [kat] LMS
4,706,784 UART: [kat] --
4,707,436 UART: [update-reset] ++
6,066,437 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,067,498 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,222,713 >>> mbox cmd response: success
6,222,713 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,223,024 UART: [update-reset] Copying MAN_2 To MAN_1
6,231,038 UART: [update-reset Success] --
6,231,883 UART: [state] Locking Datavault
6,232,521 UART: [state] Locking PCR0, PCR1 and PCR31
6,233,125 UART: [state] Locking ICCM
6,233,657 UART: [exit] Launching FMC @ 0x40000130
6,238,987 UART:
6,239,003 UART: Running Caliptra FMC ...
6,239,411 UART:
6,239,465 UART: [state] CFI Enabled
6,328,720 UART: [art] Extend RT PCRs Done
6,329,148 UART: [art] Lock RT PCRs Done
6,330,261 UART: [art] Populate DV Done
6,338,784 UART: [fht] FMC Alias Private Key: 7
6,339,814 UART: [art] Derive CDI
6,340,094 UART: [art] Store in slot 0x4
6,426,061 UART: [art] Derive Key Pair
6,426,421 UART: [art] Store priv key in slot 0x5
6,439,665 UART: [art] Derive Key Pair - Done
6,454,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,469,751 UART: [art] Erasing AUTHORITY.KEYID = 7
6,470,516 UART: [art] PUB.X = D1C2E69C7DB7B578F11570CC1DF13757223D7CCF926520E1F18D68F1B25BE5853ADDAB0A8E38FDA193C94FCB662214D1
6,477,297 UART: [art] PUB.Y = 30C092058DDA4B3A92C515EEED1347932A4E45475A0C1B1C52B334A245EA9A558BD5C1DA6806C188D38347760A62DA45
6,484,237 UART: [art] SIG.R = 72631A79FB7029FA0BE6F5CAAC7FD258F5C8D0169A355B8869A47C86FCB9BAB548EA5695A100DBBD19727156B7B73CED
6,490,998 UART: [art] SIG.S = 087B9247730DCD7A7ADF5B05DA7640E6816B242141586A6C4A6FE82613DD8A897C208E83D93C5E1468920F68C4E7092F
6,514,519 UART: Caliptra RT
6,514,770 UART: [state] CFI Enabled
6,883,609 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,914,076 UART: [rt]cmd =0x53574545, len=84
6,939,480 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,716 ready_for_fw is high
1,059,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,304 >>> mbox cmd response: success
2,742,325 UART:
2,742,341 UART: Running Caliptra FMC ...
2,742,749 UART:
2,742,803 UART: [state] CFI Enabled
2,753,223 UART: [fht] FMC Alias Private Key: 7
2,872,477 UART: [art] Extend RT PCRs Done
2,872,905 UART: [art] Lock RT PCRs Done
2,874,315 UART: [art] Populate DV Done
2,882,448 UART: [fht] FMC Alias Private Key: 7
2,883,502 UART: [art] Derive CDI
2,883,782 UART: [art] Store in slot 0x4
2,969,459 UART: [art] Derive Key Pair
2,969,819 UART: [art] Store priv key in slot 0x5
2,983,095 UART: [art] Derive Key Pair - Done
2,997,995 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,176 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,941 UART: [art] PUB.X = 757DB303722F282260B44AC7B95FC3650597D20A265C85097637EC28DED803034D6011DF3BB93156058B4303602FED59
3,020,677 UART: [art] PUB.Y = 1EAB648E4A516DD090C33BAADEA91860EE4128BDC91971F00AA3C596971819121985E39075C63B70C431BB72B39937F2
3,027,624 UART: [art] SIG.R = 42AC51E4D94F429BE865C04295CBB70CBAFB50E58D12C629B5F5372C645286E8E8C03155A08834E13587E60ED7BD7475
3,034,390 UART: [art] SIG.S = DAAAC63277FB1A674EDE00C642A4813E0A58F71C418C39EF3F719D5D6C8950C33CE3E023619B68811C526EDE50F85702
3,058,012 UART: Caliptra RT
3,058,263 UART: [state] CFI Enabled
3,177,210 UART: [rt] RT listening for mailbox commands...
3,177,880 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,352 UART: [rt]cmd =0x44504543, len=96
3,391,114 >>> mbox cmd response data (6236 bytes)
3,391,115 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,686 UART: [rt]cmd =0x53574545, len=84
3,446,736 >>> mbox cmd response data (200 bytes)
3,446,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,934,429 >>> mbox cmd response: success
5,934,429 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,947,610 UART:
5,947,626 UART: Running Caliptra FMC ...
5,948,034 UART:
5,948,088 UART: [state] CFI Enabled
6,037,259 UART: [art] Extend RT PCRs Done
6,037,687 UART: [art] Lock RT PCRs Done
6,038,996 UART: [art] Populate DV Done
6,047,149 UART: [fht] FMC Alias Private Key: 7
6,048,109 UART: [art] Derive CDI
6,048,389 UART: [art] Store in slot 0x4
6,134,228 UART: [art] Derive Key Pair
6,134,588 UART: [art] Store priv key in slot 0x5
6,147,438 UART: [art] Derive Key Pair - Done
6,162,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,178,250 UART: [art] Erasing AUTHORITY.KEYID = 7
6,179,015 UART: [art] PUB.X = 45FEFDF950CDD2F865ED70D94569E436FE99106A05741ABA766E5CE646F368ECDE3A2CD59C50201BAE59561BD71DE227
6,185,796 UART: [art] PUB.Y = 7C160BA2AFFE9830DE484A2A2EE4F8AC1449F6A529ABC5492CA38D200408CB68E09EDDF254D38D900ACD04433C1050C2
6,192,745 UART: [art] SIG.R = 0141762B5E90AB4845B4C28BB01AE733D4367FFE529A29554DBB05A8EC8CCE8A3E7719F04E499F6004515EBD1324BFCB
6,199,516 UART: [art] SIG.S = 5D30D41D8D20E087149656EE4B68DA59230A7E28C29451500AE7DDAED9B0EC96B0DBBB17A2A46AD238E1B5D9578D6748
6,223,548 UART: Caliptra RT
6,223,799 UART: [state] CFI Enabled
6,587,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,618,335 UART: [rt]cmd =0x53574545, len=84
6,643,987 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,703 UART: [kat] SHA2-256
891,253 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,357 UART: [kat] ++
895,509 UART: [kat] sha1
899,705 UART: [kat] SHA2-256
901,645 UART: [kat] SHA2-384
904,176 UART: [kat] SHA2-512-ACC
906,077 UART: [kat] ECC-384
915,928 UART: [kat] HMAC-384Kdf
920,662 UART: [kat] LMS
1,168,974 UART: [kat] --
1,169,829 UART: [cold-reset] ++
1,170,179 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,174,155 ready_for_fw is high
1,174,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,760 UART: [idev] Erasing UDS.KEYID = 0
1,198,754 UART: [idev] Sha1 KeyId Algorithm
1,207,572 UART: [idev] --
1,208,673 UART: [ldev] ++
1,208,841 UART: [ldev] CDI.KEYID = 6
1,209,205 UART: [ldev] SUBJECT.KEYID = 5
1,209,632 UART: [ldev] AUTHORITY.KEYID = 7
1,210,095 UART: [ldev] FE.KEYID = 1
1,215,301 UART: [ldev] Erasing FE.KEYID = 1
1,241,362 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,826 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,542 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,079 UART: [ldev] --
1,280,320 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,334 >>> mbox cmd response: success
2,825,476 UART: [afmc] ++
2,825,644 UART: [afmc] CDI.KEYID = 6
2,826,007 UART: [afmc] SUBJECT.KEYID = 7
2,826,433 UART: [afmc] AUTHORITY.KEYID = 5
2,861,644 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,999 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,748 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,458 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,339 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,040 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,993 UART: [afmc] --
2,904,830 UART: [cold-reset] --
2,905,602 UART: [state] Locking Datavault
2,906,859 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,463 UART: [state] Locking ICCM
2,907,891 UART: [exit] Launching FMC @ 0x40000130
2,913,221 UART:
2,913,237 UART: Running Caliptra FMC ...
2,913,645 UART:
2,913,788 UART: [state] CFI Enabled
2,924,592 UART: [fht] FMC Alias Private Key: 7
3,043,378 UART: [art] Extend RT PCRs Done
3,043,806 UART: [art] Lock RT PCRs Done
3,045,276 UART: [art] Populate DV Done
3,053,477 UART: [fht] FMC Alias Private Key: 7
3,054,455 UART: [art] Derive CDI
3,054,735 UART: [art] Store in slot 0x4
3,140,904 UART: [art] Derive Key Pair
3,141,264 UART: [art] Store priv key in slot 0x5
3,154,494 UART: [art] Derive Key Pair - Done
3,169,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,655 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,420 UART: [art] PUB.X = 76D9AF95E8A4C76D504439E8F9685B74F21FB288DEDCB679E4F3A4306E0D00F8B22CF39EC8E849862E44264F34370B3F
3,192,168 UART: [art] PUB.Y = 34240DE2BBA8D8DBDC08445995FA81749A1FB20D3637967B6A04B6186D10A9E0473AB085DB562853E0968FCAD20F4753
3,199,105 UART: [art] SIG.R = 480A901D7E55A619F0E28CF360B2D282FD30F1890CBA6ED4752B81075EA13DC1A0ED9431EFB4F5884FDEAE0264BF9D7A
3,205,879 UART: [art] SIG.S = 7BB7EE3DDE6AD7D8CDB0FF89F7653D492FC906AF9FA2E94B571616722C7939D7CDF7917835AE84B2DF0D51A4A2B249C5
3,230,125 UART: Caliptra RT
3,230,468 UART: [state] CFI Enabled
3,349,630 UART: [rt] RT listening for mailbox commands...
3,350,300 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,754 UART: [rt]cmd =0x44504543, len=96
3,563,269 >>> mbox cmd response data (6236 bytes)
3,563,270 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,593,021 UART: [rt]cmd =0x53574545, len=84
3,618,563 >>> mbox cmd response data (200 bytes)
3,618,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,619,409 UART:
3,619,425 UART: Running Caliptra ROM ...
3,619,833 UART:
3,619,975 UART: [state] CFI Enabled
3,623,051 UART: [state] LifecycleState = Unprovisioned
3,623,706 UART: [state] DebugLocked = No
3,624,372 UART: [state] WD Timer not started. Device not locked for debugging
3,625,628 UART: [kat] SHA2-256
4,429,178 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,433,282 UART: [kat] ++
4,433,434 UART: [kat] sha1
4,437,608 UART: [kat] SHA2-256
4,439,548 UART: [kat] SHA2-384
4,442,335 UART: [kat] SHA2-512-ACC
4,444,235 UART: [kat] ECC-384
4,453,774 UART: [kat] HMAC-384Kdf
4,458,528 UART: [kat] LMS
4,706,840 UART: [kat] --
4,707,608 UART: [update-reset] ++
6,066,221 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,067,300 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,222,515 >>> mbox cmd response: success
6,222,515 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,222,858 UART: [update-reset] Copying MAN_2 To MAN_1
6,230,872 UART: [update-reset Success] --
6,231,983 UART: [state] Locking Datavault
6,232,919 UART: [state] Locking PCR0, PCR1 and PCR31
6,233,523 UART: [state] Locking ICCM
6,234,177 UART: [exit] Launching FMC @ 0x40000130
6,239,507 UART:
6,239,523 UART: Running Caliptra FMC ...
6,239,931 UART:
6,240,074 UART: [state] CFI Enabled
6,329,325 UART: [art] Extend RT PCRs Done
6,329,753 UART: [art] Lock RT PCRs Done
6,331,150 UART: [art] Populate DV Done
6,339,501 UART: [fht] FMC Alias Private Key: 7
6,340,499 UART: [art] Derive CDI
6,340,779 UART: [art] Store in slot 0x4
6,426,526 UART: [art] Derive Key Pair
6,426,886 UART: [art] Store priv key in slot 0x5
6,440,604 UART: [art] Derive Key Pair - Done
6,455,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,470,875 UART: [art] Erasing AUTHORITY.KEYID = 7
6,471,640 UART: [art] PUB.X = ECE6690B997FB330E063364F218A26AE967F62B42E8C54988ACDA1C14A052F1EC1ED6DC9C77208B03614F8C6A71CA008
6,478,406 UART: [art] PUB.Y = C8CCDD3BA68CA812C6FDCFF2F36A9CAC40FEE8478209A70F1508059E1D71E7EB9F17E8261116D20A462F1F6CCA2F7499
6,485,359 UART: [art] SIG.R = E76BC744DAF51283E4E9BA238A9BE1D5F4562E0E3618A0CF2DDAF8395759A7219A63B7AB033DCA4F71700EE1853A6186
6,492,130 UART: [art] SIG.S = 8227852DA6E1A866D342F3FA66BCAA5409FA0893FF52DD8F78B9DC1A783C5693A7A360019C4B2E05989A741B3524A5E1
6,516,320 UART: Caliptra RT
6,516,663 UART: [state] CFI Enabled
6,882,580 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,913,397 UART: [rt]cmd =0x53574545, len=84
6,939,319 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,339 ready_for_fw is high
1,060,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,443 >>> mbox cmd response: success
2,741,092 UART:
2,741,108 UART: Running Caliptra FMC ...
2,741,516 UART:
2,741,659 UART: [state] CFI Enabled
2,752,557 UART: [fht] FMC Alias Private Key: 7
2,871,565 UART: [art] Extend RT PCRs Done
2,871,993 UART: [art] Lock RT PCRs Done
2,873,335 UART: [art] Populate DV Done
2,881,348 UART: [fht] FMC Alias Private Key: 7
2,882,422 UART: [art] Derive CDI
2,882,702 UART: [art] Store in slot 0x4
2,968,137 UART: [art] Derive Key Pair
2,968,497 UART: [art] Store priv key in slot 0x5
2,982,079 UART: [art] Derive Key Pair - Done
2,996,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,005 UART: [art] PUB.X = BBDE9F419535C9CC308DD3BB51D833518D585B441ECAB011D6DFFD030F8D214012748C59446EF1A05137475E99E9DFE4
3,019,777 UART: [art] PUB.Y = 73A4624388797F2BAAB0D120CE3A3C8EA67CDCA6CC65FFDC8C457F5E87BD0D03A6521AC8E9AEDDD09C4D9B5042D97E37
3,026,745 UART: [art] SIG.R = 85CB8E62D285BDE144C2D3135BE02C3D6B171FFE34BBCFA958C0D6697BB25DC62FF89B9D434BBAF6D6CBAE555B682F8E
3,033,541 UART: [art] SIG.S = 22130C622F107285084ACC0A0FF9E5359AE55C8D8349042B9EB002F0A666675A2B63A123B64A0EE404617A445659EE94
3,056,963 UART: Caliptra RT
3,057,306 UART: [state] CFI Enabled
3,177,003 UART: [rt] RT listening for mailbox commands...
3,177,673 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,949 UART: [rt]cmd =0x44504543, len=96
3,390,005 >>> mbox cmd response data (6236 bytes)
3,390,006 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,419,589 UART: [rt]cmd =0x53574545, len=84
3,446,425 >>> mbox cmd response data (200 bytes)
3,446,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,315 >>> mbox cmd response: success
5,935,315 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,948,422 UART:
5,948,438 UART: Running Caliptra FMC ...
5,948,846 UART:
5,948,989 UART: [state] CFI Enabled
6,038,238 UART: [art] Extend RT PCRs Done
6,038,666 UART: [art] Lock RT PCRs Done
6,039,891 UART: [art] Populate DV Done
6,048,128 UART: [fht] FMC Alias Private Key: 7
6,049,282 UART: [art] Derive CDI
6,049,562 UART: [art] Store in slot 0x4
6,135,349 UART: [art] Derive Key Pair
6,135,709 UART: [art] Store priv key in slot 0x5
6,148,891 UART: [art] Derive Key Pair - Done
6,163,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,179,288 UART: [art] Erasing AUTHORITY.KEYID = 7
6,180,053 UART: [art] PUB.X = DDAE0E4DD70AC47EB263DC7FAEF9863419174A906CF1B50C2FD48F310AF28D70CD3AD39667D493D520860D38066921D3
6,186,815 UART: [art] PUB.Y = 7D52B0A0BF17C621CDCE9120948499F0B07F6C8B79DF4E135CDAE0B99EF18AE445E8BE0E3B776510EC47CB320EC432A8
6,193,775 UART: [art] SIG.R = 264B67BB51681736A5769112A28644F1706116B5A03ED937E19211CF9CA09DC95B3759CFD9826C24A2262FFA7D47B383
6,200,539 UART: [art] SIG.S = FF4F578BEB3F11314A1573214724A7F052B7D6365110528102A28FE37695FF679D564B7318969D58269E60458640CE21
6,223,790 UART: Caliptra RT
6,224,133 UART: [state] CFI Enabled
6,585,473 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,616,192 UART: [rt]cmd =0x53574545, len=84
6,642,420 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,867 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
893,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,947 UART: [kat] ++
898,099 UART: [kat] sha1
902,529 UART: [kat] SHA2-256
904,469 UART: [kat] SHA2-384
907,200 UART: [kat] SHA2-512-ACC
909,101 UART: [kat] ECC-384
918,534 UART: [kat] HMAC-384Kdf
922,926 UART: [kat] LMS
1,171,254 UART: [kat] --
1,172,065 UART: [cold-reset] ++
1,172,633 UART: [fht] FHT @ 0x50003400
1,175,464 UART: [idev] ++
1,175,632 UART: [idev] CDI.KEYID = 6
1,175,992 UART: [idev] SUBJECT.KEYID = 7
1,176,416 UART: [idev] UDS.KEYID = 0
1,176,761 ready_for_fw is high
1,176,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,088 UART: [idev] Erasing UDS.KEYID = 0
1,201,051 UART: [idev] Sha1 KeyId Algorithm
1,209,387 UART: [idev] --
1,210,497 UART: [ldev] ++
1,210,665 UART: [ldev] CDI.KEYID = 6
1,211,028 UART: [ldev] SUBJECT.KEYID = 5
1,211,454 UART: [ldev] AUTHORITY.KEYID = 7
1,211,917 UART: [ldev] FE.KEYID = 1
1,217,203 UART: [ldev] Erasing FE.KEYID = 1
1,243,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,893 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,473 UART: [ldev] --
1,282,764 UART: [fwproc] Wait for Commands...
1,283,486 UART: [fwproc] Recv command 0x46574c44
1,284,214 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,951 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,384 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,731 >>> mbox cmd response: success
2,827,819 UART: [afmc] ++
2,827,987 UART: [afmc] CDI.KEYID = 6
2,828,349 UART: [afmc] SUBJECT.KEYID = 7
2,828,774 UART: [afmc] AUTHORITY.KEYID = 5
2,864,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,966 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,714 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,306 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,007 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,721 UART: [afmc] --
2,907,603 UART: [cold-reset] --
2,908,311 UART: [state] Locking Datavault
2,909,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,046 UART: [state] Locking ICCM
2,910,496 UART: [exit] Launching FMC @ 0x40000130
2,915,826 UART:
2,915,842 UART: Running Caliptra FMC ...
2,916,250 UART:
2,916,304 UART: [state] CFI Enabled
2,926,492 UART: [fht] FMC Alias Private Key: 7
3,044,958 UART: [art] Extend RT PCRs Done
3,045,386 UART: [art] Lock RT PCRs Done
3,046,748 UART: [art] Populate DV Done
3,055,287 UART: [fht] FMC Alias Private Key: 7
3,056,295 UART: [art] Derive CDI
3,056,575 UART: [art] Store in slot 0x4
3,142,258 UART: [art] Derive Key Pair
3,142,618 UART: [art] Store priv key in slot 0x5
3,155,916 UART: [art] Derive Key Pair - Done
3,170,609 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,841 UART: [art] PUB.X = FF5ABA81E46053DF4512F3E4506FCA6E1423B7493ABD195AB1E6F7A474BEEFE7D2FF273A6088E1E133BB1AB18ECA7865
3,193,631 UART: [art] PUB.Y = 81D5855C946D212BA02B35CF699C6AF56113375060F50B61176F1651E231110C5B917E666295730FD5E59EAA783073A2
3,200,560 UART: [art] SIG.R = E8184D132763C06EBC7753357A23E4DDC102AB79A2EB95824D0790666637F1E136F27FB7103C6F27091548C07F6B0BA0
3,207,314 UART: [art] SIG.S = 2D2531DE070C718387DE0E23B6362A3A63CA67582AD85E3817DCFCEB17DA0A372E6974EB975FC9C04FD7B1E33FD71CF5
3,231,260 UART: Caliptra RT
3,231,511 UART: [state] CFI Enabled
3,350,546 UART: [rt] RT listening for mailbox commands...
3,351,216 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,608 UART: [rt]cmd =0x44504543, len=96
3,562,571 >>> mbox cmd response data (6236 bytes)
3,562,572 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,592,531 UART: [rt]cmd =0x53574545, len=84
3,618,259 >>> mbox cmd response data (200 bytes)
3,618,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,619,173 UART:
3,619,189 UART: Running Caliptra ROM ...
3,619,597 UART:
3,619,652 UART: [state] CFI Enabled
3,622,392 UART: [state] LifecycleState = Unprovisioned
3,623,047 UART: [state] DebugLocked = No
3,623,655 UART: [state] WD Timer not started. Device not locked for debugging
3,624,987 UART: [kat] SHA2-256
4,430,637 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,434,762 UART: [kat] ++
4,434,914 UART: [kat] sha1
4,439,088 UART: [kat] SHA2-256
4,441,028 UART: [kat] SHA2-384
4,443,563 UART: [kat] SHA2-512-ACC
4,445,463 UART: [kat] ECC-384
4,455,354 UART: [kat] HMAC-384Kdf
4,459,926 UART: [kat] LMS
4,708,254 UART: [kat] --
4,708,846 UART: [update-reset] ++
6,068,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,069,141 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,224,356 >>> mbox cmd response: success
6,224,356 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,224,583 UART: [update-reset] Copying MAN_2 To MAN_1
6,232,597 UART: [update-reset Success] --
6,233,728 UART: [state] Locking Datavault
6,234,706 UART: [state] Locking PCR0, PCR1 and PCR31
6,235,310 UART: [state] Locking ICCM
6,235,980 UART: [exit] Launching FMC @ 0x40000130
6,241,310 UART:
6,241,326 UART: Running Caliptra FMC ...
6,241,734 UART:
6,241,788 UART: [state] CFI Enabled
6,330,949 UART: [art] Extend RT PCRs Done
6,331,377 UART: [art] Lock RT PCRs Done
6,332,698 UART: [art] Populate DV Done
6,340,859 UART: [fht] FMC Alias Private Key: 7
6,341,849 UART: [art] Derive CDI
6,342,129 UART: [art] Store in slot 0x4
6,427,770 UART: [art] Derive Key Pair
6,428,130 UART: [art] Store priv key in slot 0x5
6,441,420 UART: [art] Derive Key Pair - Done
6,456,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,471,689 UART: [art] Erasing AUTHORITY.KEYID = 7
6,472,454 UART: [art] PUB.X = EFE8986C323556F8B100CC080CBF2281388E8618C4D7DFF7E44D30E89F691EA88EF9E43CC7F8866F5F6D35B41FD40DA8
6,479,205 UART: [art] PUB.Y = 9DA38046EE6A510EC6C9E680FE48FD61D9AB7EA975E407A6D480609B5C7F35FBC3BEC6872DF20DEE40A207575DFD600A
6,486,158 UART: [art] SIG.R = BF7F0C8DC494059F3BBFF6FCB4DFAC939875BEB069F2AA52902D7ED1D6B54B045D326610A746FCF6CE59FBBD843FAA3A
6,492,947 UART: [art] SIG.S = AB663B2CC501F13826D40834B92BECC2AA0C7F4794E62A31A9A60ACCA86892851EBF465EE91FCEC3CAA8B0169E485E73
6,517,137 UART: Caliptra RT
6,517,388 UART: [state] CFI Enabled
6,883,491 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,914,312 UART: [rt]cmd =0x53574545, len=84
6,939,676 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 ready_for_fw is high
1,059,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,332 >>> mbox cmd response: success
2,741,425 UART:
2,741,441 UART: Running Caliptra FMC ...
2,741,849 UART:
2,741,903 UART: [state] CFI Enabled
2,752,135 UART: [fht] FMC Alias Private Key: 7
2,871,085 UART: [art] Extend RT PCRs Done
2,871,513 UART: [art] Lock RT PCRs Done
2,872,889 UART: [art] Populate DV Done
2,881,294 UART: [fht] FMC Alias Private Key: 7
2,882,394 UART: [art] Derive CDI
2,882,674 UART: [art] Store in slot 0x4
2,968,101 UART: [art] Derive Key Pair
2,968,461 UART: [art] Store priv key in slot 0x5
2,981,923 UART: [art] Derive Key Pair - Done
2,996,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,560 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,325 UART: [art] PUB.X = 1AACE12464F6F6AB449EA77EA8783AB5CC4656829314D1BB3C936D2044DB88EE81E8DB9CF0B94D33AFF037553583C4B6
3,020,107 UART: [art] PUB.Y = 0338257A1845EF6939A65057124E120B380EA1CBA350DD93C8114FD77178DE794C97E2985B925ABCE35640CCEA2DF44A
3,027,050 UART: [art] SIG.R = E7D6AA7B443B650ECA61033718F76E412A02F57BBB4C859C45A8452D49D9A377ADCDF9479DBBF48FE19B421543A11AE8
3,033,823 UART: [art] SIG.S = 2788CDFE63C071EFA8AF23F44FB16D8B4B29A8EE335CD8A60A589A88F12CE05C7011BE8D561FFADF22D0DAEDDA8EB897
3,057,496 UART: Caliptra RT
3,057,747 UART: [state] CFI Enabled
3,177,130 UART: [rt] RT listening for mailbox commands...
3,177,800 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,322 UART: [rt]cmd =0x44504543, len=96
3,391,099 >>> mbox cmd response data (6236 bytes)
3,391,100 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,420,999 UART: [rt]cmd =0x53574545, len=84
3,446,565 >>> mbox cmd response data (200 bytes)
3,446,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,937,855 >>> mbox cmd response: success
5,937,855 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,951,172 UART:
5,951,188 UART: Running Caliptra FMC ...
5,951,596 UART:
5,951,650 UART: [state] CFI Enabled
6,040,771 UART: [art] Extend RT PCRs Done
6,041,199 UART: [art] Lock RT PCRs Done
6,042,374 UART: [art] Populate DV Done
6,050,641 UART: [fht] FMC Alias Private Key: 7
6,051,657 UART: [art] Derive CDI
6,051,937 UART: [art] Store in slot 0x4
6,137,644 UART: [art] Derive Key Pair
6,138,004 UART: [art] Store priv key in slot 0x5
6,151,140 UART: [art] Derive Key Pair - Done
6,166,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,180,971 UART: [art] Erasing AUTHORITY.KEYID = 7
6,181,736 UART: [art] PUB.X = B97596155B66FE3D582E842A152B7B75221B574644FC334BC451713E73BA6FF3D03ECE0277E8E1092EBAD82BD1F6EEE6
6,188,508 UART: [art] PUB.Y = C722186D5CC9B0EDDAB4695C8191106E5553C61762786E3891F58695EA643646F9ECC8E07EBF36BEF3B3A64BBAC43683
6,195,464 UART: [art] SIG.R = 853906C9648623C61D277D099D85ABF2B3F5B0EF1CCE0D23FEA809E5B44455B31D972901EC41371A2DB5036AF03A3469
6,202,218 UART: [art] SIG.S = 5F5A6000CDA36885ABF0697F78BA900239949FC627B506186723FE055AB2727B9058B5FAC9A3D2DAFDEECE51E66F2405
6,225,804 UART: Caliptra RT
6,226,055 UART: [state] CFI Enabled
6,593,187 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,624,068 UART: [rt]cmd =0x53574545, len=84
6,649,430 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
901,860 UART: [kat] SHA2-256
903,800 UART: [kat] SHA2-384
906,443 UART: [kat] SHA2-512-ACC
908,344 UART: [kat] ECC-384
917,857 UART: [kat] HMAC-384Kdf
922,631 UART: [kat] LMS
1,170,959 UART: [kat] --
1,172,022 UART: [cold-reset] ++
1,172,472 UART: [fht] FHT @ 0x50003400
1,175,045 UART: [idev] ++
1,175,213 UART: [idev] CDI.KEYID = 6
1,175,573 UART: [idev] SUBJECT.KEYID = 7
1,175,997 UART: [idev] UDS.KEYID = 0
1,176,342 ready_for_fw is high
1,176,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,365 UART: [idev] Erasing UDS.KEYID = 0
1,201,108 UART: [idev] Sha1 KeyId Algorithm
1,209,672 UART: [idev] --
1,210,658 UART: [ldev] ++
1,210,826 UART: [ldev] CDI.KEYID = 6
1,211,189 UART: [ldev] SUBJECT.KEYID = 5
1,211,615 UART: [ldev] AUTHORITY.KEYID = 7
1,212,078 UART: [ldev] FE.KEYID = 1
1,217,344 UART: [ldev] Erasing FE.KEYID = 1
1,244,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,172 UART: [ldev] --
1,283,609 UART: [fwproc] Wait for Commands...
1,284,289 UART: [fwproc] Recv command 0x46574c44
1,285,017 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,295 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,474 >>> mbox cmd response: success
2,828,622 UART: [afmc] ++
2,828,790 UART: [afmc] CDI.KEYID = 6
2,829,152 UART: [afmc] SUBJECT.KEYID = 7
2,829,577 UART: [afmc] AUTHORITY.KEYID = 5
2,864,952 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,459 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,916 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,500 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,318 UART: [afmc] --
2,908,234 UART: [cold-reset] --
2,909,176 UART: [state] Locking Datavault
2,910,357 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,961 UART: [state] Locking ICCM
2,911,485 UART: [exit] Launching FMC @ 0x40000130
2,916,815 UART:
2,916,831 UART: Running Caliptra FMC ...
2,917,239 UART:
2,917,382 UART: [state] CFI Enabled
2,928,050 UART: [fht] FMC Alias Private Key: 7
3,047,212 UART: [art] Extend RT PCRs Done
3,047,640 UART: [art] Lock RT PCRs Done
3,049,242 UART: [art] Populate DV Done
3,057,523 UART: [fht] FMC Alias Private Key: 7
3,058,657 UART: [art] Derive CDI
3,058,937 UART: [art] Store in slot 0x4
3,144,556 UART: [art] Derive Key Pair
3,144,916 UART: [art] Store priv key in slot 0x5
3,158,100 UART: [art] Derive Key Pair - Done
3,172,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,935 UART: [art] PUB.X = B95F5CD2C8575D80379F1A408109D05C7D827F94962BA2DE8F2AE2E821FCE02225C8BB83995A08179CF518FA2998D787
3,195,701 UART: [art] PUB.Y = FCC299420935EEB126B53B16DF93A431C2342A9CB04A24B8B2695579E047A2E34B5E175A1CD8EDDFC50C45C41B3DD094
3,202,655 UART: [art] SIG.R = 2754B9B3AA93F0E513408826877B0FD4CF39BB246946CB5A053D8F2446AA03E71E7D57F9DB06BA53459CD118E57D5856
3,209,415 UART: [art] SIG.S = 30D16345AA29A7F5DC4B5B7E5A32A5E55A6DE4B43E4D67D4924ED7D063C117D174FF13CCA2CE9A32EFB860409199E62C
3,233,337 UART: Caliptra RT
3,233,680 UART: [state] CFI Enabled
3,353,918 UART: [rt] RT listening for mailbox commands...
3,354,588 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,092 UART: [rt]cmd =0x44504543, len=96
3,567,367 >>> mbox cmd response data (6236 bytes)
3,567,368 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,597,241 UART: [rt]cmd =0x53574545, len=84
3,622,861 >>> mbox cmd response data (200 bytes)
3,622,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,623,561 UART:
3,623,577 UART: Running Caliptra ROM ...
3,623,985 UART:
3,624,127 UART: [state] CFI Enabled
3,626,961 UART: [state] LifecycleState = Unprovisioned
3,627,616 UART: [state] DebugLocked = No
3,628,278 UART: [state] WD Timer not started. Device not locked for debugging
3,629,586 UART: [kat] SHA2-256
4,435,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,439,361 UART: [kat] ++
4,439,513 UART: [kat] sha1
4,443,829 UART: [kat] SHA2-256
4,445,769 UART: [kat] SHA2-384
4,448,422 UART: [kat] SHA2-512-ACC
4,450,322 UART: [kat] ECC-384
4,460,587 UART: [kat] HMAC-384Kdf
4,465,025 UART: [kat] LMS
4,713,353 UART: [kat] --
4,714,445 UART: [update-reset] ++
6,073,291 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,074,438 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,229,653 >>> mbox cmd response: success
6,229,653 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,230,004 UART: [update-reset] Copying MAN_2 To MAN_1
6,238,018 UART: [update-reset Success] --
6,239,123 UART: [state] Locking Datavault
6,239,871 UART: [state] Locking PCR0, PCR1 and PCR31
6,240,475 UART: [state] Locking ICCM
6,240,973 UART: [exit] Launching FMC @ 0x40000130
6,246,303 UART:
6,246,319 UART: Running Caliptra FMC ...
6,246,727 UART:
6,246,870 UART: [state] CFI Enabled
6,336,317 UART: [art] Extend RT PCRs Done
6,336,745 UART: [art] Lock RT PCRs Done
6,338,008 UART: [art] Populate DV Done
6,346,157 UART: [fht] FMC Alias Private Key: 7
6,347,319 UART: [art] Derive CDI
6,347,599 UART: [art] Store in slot 0x4
6,433,698 UART: [art] Derive Key Pair
6,434,058 UART: [art] Store priv key in slot 0x5
6,447,512 UART: [art] Derive Key Pair - Done
6,462,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,477,756 UART: [art] Erasing AUTHORITY.KEYID = 7
6,478,521 UART: [art] PUB.X = 1E26E3C5DCD2D5F808A56BD0097DD9C6FA641C4B4C616ACF4AAC95B4BEE492BD277785DA5202A45F5EC33AA442E5FD22
6,485,304 UART: [art] PUB.Y = F253199ACEE720FE4DA35AABBA2F73BA4F1BD0312D1CCA073FA0D0306D360A6A0567957A7596500839765404548788C6
6,492,241 UART: [art] SIG.R = E327886A463B771EBC738A652C8E91D5963E52BC1C960AA5432CB1C62DA178B2F60A1C385561B8601EDFD586B3DE2E90
6,499,011 UART: [art] SIG.S = 15D6C99B1E9DA280DABEB27CB25A109D9B9BFDD065887ABD639ED31D81383A7862F03D952635213A114A51918B4703BE
6,522,030 UART: Caliptra RT
6,522,373 UART: [state] CFI Enabled
6,889,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,920,092 UART: [rt]cmd =0x53574545, len=84
6,946,136 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 ready_for_fw is high
1,060,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,939 >>> mbox cmd response: success
2,743,656 UART:
2,743,672 UART: Running Caliptra FMC ...
2,744,080 UART:
2,744,223 UART: [state] CFI Enabled
2,754,719 UART: [fht] FMC Alias Private Key: 7
2,873,869 UART: [art] Extend RT PCRs Done
2,874,297 UART: [art] Lock RT PCRs Done
2,875,823 UART: [art] Populate DV Done
2,883,800 UART: [fht] FMC Alias Private Key: 7
2,884,740 UART: [art] Derive CDI
2,885,020 UART: [art] Store in slot 0x4
2,970,699 UART: [art] Derive Key Pair
2,971,059 UART: [art] Store priv key in slot 0x5
2,984,119 UART: [art] Derive Key Pair - Done
2,998,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,267 UART: [art] PUB.X = 7434B9D6A6FA2B4DA6A9AD52B8874B3F478818D1D4D9924EC14FCD489EDB13B8F75393BD89401907F7497B458109DC20
3,022,035 UART: [art] PUB.Y = 443A7E93EE35C0A24808F7DC583B0433E36BE2E8844C4FA2554F5399CF40E6BA0FAAF0966F340E6D5F9D4EB3FAC69B75
3,028,987 UART: [art] SIG.R = 7798558B318246D1488E53F874C3EBCED8911E1BEB8258D1629035E84E01019EB41027F8CB0521E44A2129DEE1E79F39
3,035,744 UART: [art] SIG.S = 679A5D30C1898E630F4D0F90E7548534CAFF67602080025D658052F1CA8F7A8B126BA797E4919AF7F42AADAA32360D4C
3,059,270 UART: Caliptra RT
3,059,613 UART: [state] CFI Enabled
3,180,037 UART: [rt] RT listening for mailbox commands...
3,180,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,985 UART: [rt]cmd =0x44504543, len=96
3,393,202 >>> mbox cmd response data (6236 bytes)
3,393,203 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,423,276 UART: [rt]cmd =0x53574545, len=84
3,448,862 >>> mbox cmd response data (200 bytes)
3,448,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,939,433 >>> mbox cmd response: success
5,939,433 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
5,952,790 UART:
5,952,806 UART: Running Caliptra FMC ...
5,953,214 UART:
5,953,357 UART: [state] CFI Enabled
6,042,604 UART: [art] Extend RT PCRs Done
6,043,032 UART: [art] Lock RT PCRs Done
6,044,099 UART: [art] Populate DV Done
6,052,040 UART: [fht] FMC Alias Private Key: 7
6,053,036 UART: [art] Derive CDI
6,053,316 UART: [art] Store in slot 0x4
6,138,969 UART: [art] Derive Key Pair
6,139,329 UART: [art] Store priv key in slot 0x5
6,152,401 UART: [art] Derive Key Pair - Done
6,166,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,182,634 UART: [art] Erasing AUTHORITY.KEYID = 7
6,183,399 UART: [art] PUB.X = C475F6DB1D8EBA6FD27FA9D0C0B2D0427BB1B0E22EE5AD546C4EE6629B87C8D1623BC63C5D913DA18366F89BB356168F
6,190,187 UART: [art] PUB.Y = A6F5E1409BF983D783BD55D100D282DEE61F54ADCDFB73E77C34D3A87E42CD0518BF797FD2CAB40D71CD0C6F1FD39C80
6,197,128 UART: [art] SIG.R = 32D9BADE7CFC21DFAD149AF7DD2D6E98791592F21EFE452AA75D7ED5FE1B42459017825F9ADAB156DCC963EE8EA9CCBB
6,203,928 UART: [art] SIG.S = 4A320904A76A69F1172A54545896635997DD11FFCF05A085B19E5E2B723A4D1F2EE5847FEEEE071FE0023D0B4AEBA93E
6,228,090 UART: Caliptra RT
6,228,433 UART: [state] CFI Enabled
6,595,242 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,625,775 UART: [rt]cmd =0x53574545, len=84
6,652,057 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,098 writing to cptra_bootfsm_go
192,225 UART:
192,578 UART: Running Caliptra ROM ...
193,764 UART:
193,940 UART: [state] CFI Enabled
264,192 UART: [state] LifecycleState = Unprovisioned
266,119 UART: [state] DebugLocked = No
268,722 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,809 UART: [kat] SHA2-256
443,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,044 UART: [kat] ++
454,508 UART: [kat] sha1
465,101 UART: [kat] SHA2-256
467,833 UART: [kat] SHA2-384
473,897 UART: [kat] SHA2-512-ACC
476,262 UART: [kat] ECC-384
2,768,850 UART: [kat] HMAC-384Kdf
2,800,136 UART: [kat] LMS
3,990,410 UART: [kat] --
3,993,714 UART: [cold-reset] ++
3,995,807 UART: [fht] Storing FHT @ 0x50003400
4,006,860 UART: [idev] ++
4,007,441 UART: [idev] CDI.KEYID = 6
4,008,357 UART: [idev] SUBJECT.KEYID = 7
4,009,604 UART: [idev] UDS.KEYID = 0
4,010,648 ready_for_fw is high
4,010,852 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,922 UART: [idev] Erasing UDS.KEYID = 0
7,347,388 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,326 UART: [idev] --
7,371,942 UART: [ldev] ++
7,372,513 UART: [ldev] CDI.KEYID = 6
7,373,474 UART: [ldev] SUBJECT.KEYID = 5
7,374,689 UART: [ldev] AUTHORITY.KEYID = 7
7,375,918 UART: [ldev] FE.KEYID = 1
7,422,389 UART: [ldev] Erasing FE.KEYID = 1
10,753,637 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,983 UART: [ldev] --
13,115,766 UART: [fwproc] Waiting for Commands...
13,118,395 UART: [fwproc] Received command 0x46574c44
13,120,628 UART: [fwproc] Received Image of size 118548 bytes
17,228,777 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,302,738 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,375,899 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,703,991 >>> mbox cmd response: success
17,708,708 UART: [afmc] ++
17,709,321 UART: [afmc] CDI.KEYID = 6
17,710,211 UART: [afmc] SUBJECT.KEYID = 7
17,711,503 UART: [afmc] AUTHORITY.KEYID = 5
21,069,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,330 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,758 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,547 UART: [afmc] --
23,441,005 UART: [cold-reset] --
23,444,328 UART: [state] Locking Datavault
23,449,256 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,012 UART: [state] Locking ICCM
23,453,495 UART: [exit] Launching FMC @ 0x40000130
23,461,900 UART:
23,462,132 UART: Running Caliptra FMC ...
23,463,232 UART:
23,463,412 UART: [state] CFI Enabled
23,528,950 UART: [fht] FMC Alias Private Key: 7
25,868,957 UART: [art] Extend RT PCRs Done
25,870,185 UART: [art] Lock RT PCRs Done
25,872,052 UART: [art] Populate DV Done
25,877,404 UART: [fht] FMC Alias Private Key: 7
25,879,052 UART: [art] Derive CDI
25,879,794 UART: [art] Store in slot 0x4
25,938,882 UART: [art] Derive Key Pair
25,939,920 UART: [art] Store priv key in slot 0x5
29,232,658 UART: [art] Derive Key Pair - Done
29,245,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,683 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,183 UART: [art] PUB.X = DAAE37ADCE7521A01F7DDAF17B6C46125B9A9B69B60E21D7591011A1E814CD9B444EC5D8E9DCCE30141481DE37133ED1
31,543,488 UART: [art] PUB.Y = 609B42501925373C285F42928829D5AD01739322D8FCD8A3CC62A59FF804216BE90603E8EEA2AF92BFEC37497AED68B8
31,550,708 UART: [art] SIG.R = 1FBF83D68A6DEEA75046FAEBEF265F45F47B484907AC31CE80A64EEB534CF2E8D062B174BEB4AED8DEDDDA96558F9859
31,558,163 UART: [art] SIG.S = CE3B6AA3BE2FAEB1F85ABD589D0602C0413DEED95DE9E164FDABC5975A63019FA73D38D8FA3FEC365A483B1913DBB410
32,863,742 UART: Caliptra RT
32,864,454 UART: [state] CFI Enabled
33,060,277 UART: [rt] RT listening for mailbox commands...
33,062,469 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,092,634 UART: [rt]cmd =0x44504543, len=40
33,141,080 >>> mbox cmd response data (40 bytes)
33,142,040 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,172,845 UART: [rt]cmd =0x44504543, len=96
33,232,738 >>> mbox cmd response data (56 bytes)
33,233,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,264,313 UART: [rt]cmd =0x44504543, len=96
39,032,812 >>> mbox cmd response data (6236 bytes)
39,062,119 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,092,781 UART: [rt]cmd =0x53574545, len=84
44,678,154 >>> mbox cmd response data (200 bytes)
47,140,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,291,061 UART:
47,291,495 UART: Running Caliptra ROM ...
47,292,572 UART:
47,292,735 UART: [state] CFI Enabled
47,355,233 UART: [state] LifecycleState = Unprovisioned
47,357,173 UART: [state] DebugLocked = No
47,359,866 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,365,090 UART: [kat] SHA2-256
47,534,789 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,545,266 UART: [kat] ++
47,545,721 UART: [kat] sha1
47,555,958 UART: [kat] SHA2-256
47,558,646 UART: [kat] SHA2-384
47,563,660 UART: [kat] SHA2-512-ACC
47,566,007 UART: [kat] ECC-384
49,860,699 UART: [kat] HMAC-384Kdf
49,893,116 UART: [kat] LMS
51,083,291 UART: [kat] --
51,089,490 UART: [update-reset] ++
55,290,277 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,294,308 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,692,071 >>> mbox cmd response: success
55,692,534 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,693,790 UART: [update-reset] Copying MAN_2 To MAN_1
55,716,221 UART: [update-reset Success] --
55,721,420 UART: [state] Locking Datavault
55,724,397 UART: [state] Locking PCR0, PCR1 and PCR31
55,726,148 UART: [state] Locking ICCM
55,728,651 UART: [exit] Launching FMC @ 0x40000130
55,737,061 UART:
55,737,340 UART: Running Caliptra FMC ...
55,738,370 UART:
55,738,521 UART: [state] CFI Enabled
55,834,983 UART: [art] Extend RT PCRs Done
55,836,169 UART: [art] Lock RT PCRs Done
55,837,398 UART: [art] Populate DV Done
55,842,678 UART: [fht] FMC Alias Private Key: 7
55,844,325 UART: [art] Derive CDI
55,845,058 UART: [art] Store in slot 0x4
55,904,017 UART: [art] Derive Key Pair
55,905,062 UART: [art] Store priv key in slot 0x5
59,197,416 UART: [art] Derive Key Pair - Done
59,210,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,498,255 UART: [art] Erasing AUTHORITY.KEYID = 7
61,499,759 UART: [art] PUB.X = 000BD3905A295D0148B18A029B630F8515D902260F5511FD497ED207B30B21C5A5FE16FA92E969B423D497F84C4621DF
61,507,007 UART: [art] PUB.Y = 14A8235ABAA70D94A73372429AFCEBC2409EA47F984CB8A3FC6F99E038408C2B1796089F11BACDDBF32299A7C8CA4713
61,514,294 UART: [art] SIG.R = 6EE9E3ACC7C5C58E362AC558BB16910ED11EAA6F13C02BBEBE284BAB3367785291C23DB21F44F8AE4F35FF641678C901
61,521,676 UART: [art] SIG.S = 49562B6DD30DB32CB27D9B8349640280E62C99B74A83E0349976EF69F7DFD9E39E6066727FB859CD4011B80095DDE823
62,827,749 UART: Caliptra RT
62,828,464 UART: [state] CFI Enabled
63,263,259 UART: [rt] RT listening for mailbox commands...
63,294,952 UART: [rt]cmd =0x53574545, len=84
68,862,741 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
3,804,566 ready_for_fw is high
3,804,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,289 >>> mbox cmd response: success
23,638,832 UART:
23,639,241 UART: Running Caliptra FMC ...
23,640,386 UART:
23,640,550 UART: [state] CFI Enabled
23,697,482 UART: [fht] FMC Alias Private Key: 7
26,038,128 UART: [art] Extend RT PCRs Done
26,039,354 UART: [art] Lock RT PCRs Done
26,041,149 UART: [art] Populate DV Done
26,046,840 UART: [fht] FMC Alias Private Key: 7
26,048,395 UART: [art] Derive CDI
26,049,221 UART: [art] Store in slot 0x4
26,106,171 UART: [art] Derive Key Pair
26,107,213 UART: [art] Store priv key in slot 0x5
29,400,255 UART: [art] Derive Key Pair - Done
29,413,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,701,597 UART: [art] Erasing AUTHORITY.KEYID = 7
31,703,101 UART: [art] PUB.X = 8D7B496651AC09E6CCD2DF9E3DC9EDF1EA00618787CA1081A403B3D64CE6BEB4E583B3BC3443A04F97AEF34540B87228
31,710,408 UART: [art] PUB.Y = EBAEB40ADBB35E60201FB6FB4284F5A704EA24C545EDCEC8FEAF1A6EEFE2090687F0940CFEA04C47E46F8247C4D13413
31,717,665 UART: [art] SIG.R = 6DB0F241035CC9FD53E3DDA3932773B0C14283271E159D2A18AA5FAE1BA775A5A82CE91045920B555301139490B98378
31,725,060 UART: [art] SIG.S = 700B41DF765345DB32B45DA424A092AB44D3948CE4AE1869DCFEF436BE9A0052A065BA5B0B15CE69CB3546FB50399A46
33,030,256 UART: Caliptra RT
33,030,980 UART: [state] CFI Enabled
33,206,530 UART: [rt] RT listening for mailbox commands...
33,208,842 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,239,046 UART: [rt]cmd =0x44504543, len=40
33,287,792 >>> mbox cmd response data (40 bytes)
33,288,700 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,319,243 UART: [rt]cmd =0x44504543, len=96
33,379,429 >>> mbox cmd response data (56 bytes)
33,380,321 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,410,880 UART: [rt]cmd =0x44504543, len=96
39,180,706 >>> mbox cmd response data (6236 bytes)
39,210,140 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,240,810 UART: [rt]cmd =0x53574545, len=84
44,824,563 >>> mbox cmd response data (200 bytes)
47,285,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
56,112,936 >>> mbox cmd response: success
56,113,513 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
56,147,622 UART:
56,147,946 UART: Running Caliptra FMC ...
56,149,091 UART:
56,149,250 UART: [state] CFI Enabled
56,256,480 UART: [art] Extend RT PCRs Done
56,257,679 UART: [art] Lock RT PCRs Done
56,259,272 UART: [art] Populate DV Done
56,264,904 UART: [fht] FMC Alias Private Key: 7
56,266,559 UART: [art] Derive CDI
56,267,299 UART: [art] Store in slot 0x4
56,325,186 UART: [art] Derive Key Pair
56,326,231 UART: [art] Store priv key in slot 0x5
59,619,340 UART: [art] Derive Key Pair - Done
59,632,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,920,166 UART: [art] Erasing AUTHORITY.KEYID = 7
61,921,678 UART: [art] PUB.X = 7F71D093E294E33E94A3C77CA737CD96C860AEA2E04287D8C1359DCC25BC3AA6215B46D49DDBD2D549AC1E1C1CDCABD7
61,928,984 UART: [art] PUB.Y = D78AF3A2871F9BC1ABC149D6119667A8EF65D7D1EA83DA53F6CE9FFACEFFD96C9C3DD7A99B8EADA149A0C0A33D9A6197
61,936,264 UART: [art] SIG.R = 1B02DF0C4E0D67D90CF3ECA1EF452A7DD94A1C9E7C414FC5959BEEF02DE35B1527F0A1350DED0BECCA653211C929DA23
61,943,652 UART: [art] SIG.S = 8684DCFB8266FB8F4D66BCA884CEBC92661FF4A2AAA44851B211F5A1E8FB63753D56E17CA1295C35F0C69DE6F745C5A7
63,248,767 UART: Caliptra RT
63,249,474 UART: [state] CFI Enabled
63,660,538 UART: [rt] RT listening for mailbox commands...
63,692,271 UART: [rt]cmd =0x53574545, len=84
69,262,538 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.60s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,529 UART:
192,894 UART: Running Caliptra ROM ...
193,990 UART:
603,645 UART: [state] CFI Enabled
619,035 UART: [state] LifecycleState = Unprovisioned
620,971 UART: [state] DebugLocked = No
622,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,713 UART: [kat] SHA2-256
797,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,039 UART: [kat] ++
808,487 UART: [kat] sha1
819,992 UART: [kat] SHA2-256
822,734 UART: [kat] SHA2-384
828,153 UART: [kat] SHA2-512-ACC
830,515 UART: [kat] ECC-384
3,114,597 UART: [kat] HMAC-384Kdf
3,127,461 UART: [kat] LMS
4,317,544 UART: [kat] --
4,319,922 UART: [cold-reset] ++
4,321,920 UART: [fht] Storing FHT @ 0x50003400
4,334,523 UART: [idev] ++
4,335,076 UART: [idev] CDI.KEYID = 6
4,336,002 UART: [idev] SUBJECT.KEYID = 7
4,337,246 UART: [idev] UDS.KEYID = 0
4,338,301 ready_for_fw is high
4,338,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,439 UART: [idev] Erasing UDS.KEYID = 0
7,624,267 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,329 UART: [idev] --
7,650,057 UART: [ldev] ++
7,650,668 UART: [ldev] CDI.KEYID = 6
7,651,583 UART: [ldev] SUBJECT.KEYID = 5
7,652,794 UART: [ldev] AUTHORITY.KEYID = 7
7,654,076 UART: [ldev] FE.KEYID = 1
7,663,835 UART: [ldev] Erasing FE.KEYID = 1
10,947,906 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,471 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,265 UART: [ldev] --
13,306,222 UART: [fwproc] Waiting for Commands...
13,308,794 UART: [fwproc] Received command 0x46574c44
13,310,966 UART: [fwproc] Received Image of size 118548 bytes
17,412,413 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,485,351 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,558,506 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,887,805 >>> mbox cmd response: success
17,892,072 UART: [afmc] ++
17,892,711 UART: [afmc] CDI.KEYID = 6
17,893,602 UART: [afmc] SUBJECT.KEYID = 7
17,894,872 UART: [afmc] AUTHORITY.KEYID = 5
21,208,063 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,500,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,503,133 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,517,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,532,274 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,546,670 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,567,504 UART: [afmc] --
23,570,734 UART: [cold-reset] --
23,574,543 UART: [state] Locking Datavault
23,580,926 UART: [state] Locking PCR0, PCR1 and PCR31
23,582,672 UART: [state] Locking ICCM
23,584,849 UART: [exit] Launching FMC @ 0x40000130
23,593,234 UART:
23,593,460 UART: Running Caliptra FMC ...
23,594,552 UART:
23,594,704 UART: [state] CFI Enabled
23,602,937 UART: [fht] FMC Alias Private Key: 7
25,943,536 UART: [art] Extend RT PCRs Done
25,944,760 UART: [art] Lock RT PCRs Done
25,946,435 UART: [art] Populate DV Done
25,951,844 UART: [fht] FMC Alias Private Key: 7
25,953,538 UART: [art] Derive CDI
25,954,343 UART: [art] Store in slot 0x4
25,996,936 UART: [art] Derive Key Pair
25,997,988 UART: [art] Store priv key in slot 0x5
29,239,759 UART: [art] Derive Key Pair - Done
29,252,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,053 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,556 UART: [art] PUB.X = BB7982D9F95C40DC01396F9F870C49834F339C2626CA63B6F387D45AA1667FCC47E3CB6298464D6A93D8DA0831478B57
31,541,787 UART: [art] PUB.Y = 645345E82607B5AF6D9FED4E6D1ADD7DC2297175C1F57B08B08B6FAF6E707B1D843E42CB8C5E7BB35F8626B02DF78283
31,549,059 UART: [art] SIG.R = EB32071C4B43E878D7F42063BAA667A6FC9CB1718AD3EA29C0A2EAB0585F954596F4DB529D052D07A9B67578907B158B
31,556,439 UART: [art] SIG.S = 5CA081A6DE99FAADA04712A78522FD7BB43EE19D44936C69B79447CA92345BE826906660E0D925EF05E28986B5D78585
32,861,904 UART: Caliptra RT
32,862,616 UART: [state] CFI Enabled
32,996,473 UART: [rt] RT listening for mailbox commands...
32,998,824 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,029,087 UART: [rt]cmd =0x44504543, len=40
33,056,720 >>> mbox cmd response data (40 bytes)
33,057,687 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,088,730 UART: [rt]cmd =0x44504543, len=96
33,131,818 >>> mbox cmd response data (56 bytes)
33,132,669 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,163,258 UART: [rt]cmd =0x44504543, len=96
38,836,948 >>> mbox cmd response data (6236 bytes)
38,866,415 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,897,031 UART: [rt]cmd =0x53574545, len=84
44,421,783 >>> mbox cmd response data (200 bytes)
46,880,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
47,030,860 UART:
47,031,230 UART: Running Caliptra ROM ...
47,032,332 UART:
47,032,492 UART: [state] CFI Enabled
47,046,067 UART: [state] LifecycleState = Unprovisioned
47,048,015 UART: [state] DebugLocked = No
47,049,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,054,828 UART: [kat] SHA2-256
47,224,533 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,235,080 UART: [kat] ++
47,235,543 UART: [kat] sha1
47,247,231 UART: [kat] SHA2-256
47,249,922 UART: [kat] SHA2-384
47,255,585 UART: [kat] SHA2-512-ACC
47,257,942 UART: [kat] ECC-384
49,543,657 UART: [kat] HMAC-384Kdf
49,556,873 UART: [kat] LMS
50,746,932 UART: [kat] --
50,749,986 UART: [update-reset] ++
54,936,830 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,941,366 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,339,127 >>> mbox cmd response: success
55,339,563 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,340,872 UART: [update-reset] Copying MAN_2 To MAN_1
55,363,300 UART: [update-reset Success] --
55,367,142 UART: [state] Locking Datavault
55,371,044 UART: [state] Locking PCR0, PCR1 and PCR31
55,372,743 UART: [state] Locking ICCM
55,374,108 UART: [exit] Launching FMC @ 0x40000130
55,382,565 UART:
55,382,793 UART: Running Caliptra FMC ...
55,383,816 UART:
55,383,958 UART: [state] CFI Enabled
55,427,966 UART: [art] Extend RT PCRs Done
55,429,152 UART: [art] Lock RT PCRs Done
55,430,780 UART: [art] Populate DV Done
55,436,462 UART: [fht] FMC Alias Private Key: 7
55,437,993 UART: [art] Derive CDI
55,438,725 UART: [art] Store in slot 0x4
55,481,193 UART: [art] Derive Key Pair
55,482,184 UART: [art] Store priv key in slot 0x5
58,724,530 UART: [art] Derive Key Pair - Done
58,737,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,017,763 UART: [art] Erasing AUTHORITY.KEYID = 7
61,019,277 UART: [art] PUB.X = 110479B2DDE8B6577CCB95EFFEF7FDA60BCB2609751B9A311B4B809E672C494FE4CD227FDE171ABCC30017558710EA77
61,026,598 UART: [art] PUB.Y = 7EA0DCB35F44CEC82512FC338F7E4C3F47D8EB45A6F22FC90F5EB58121846210032A589A6E0EDDDBDA8E46BA4FD8CB6F
61,033,827 UART: [art] SIG.R = 6A28AFE9BDAB1C67C843A4CD44174DB6FDABED08B4C473BD161D48D8E57E75D53E0E0198E7AD394CF5555F23B719A03D
61,041,264 UART: [art] SIG.S = 758D0F87090B81812FE6F6D7C39C1C884497E0E715545FCA1849E86ED76A5032B7F5AAF42D6A55723AD13C66EE61EFFE
62,346,734 UART: Caliptra RT
62,347,428 UART: [state] CFI Enabled
62,723,396 UART: [rt] RT listening for mailbox commands...
62,755,077 UART: [rt]cmd =0x53574545, len=84
68,279,317 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.55s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,127,296 ready_for_fw is high
4,127,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,157 >>> mbox cmd response: success
23,799,469 UART:
23,799,935 UART: Running Caliptra FMC ...
23,801,060 UART:
23,801,227 UART: [state] CFI Enabled
23,809,030 UART: [fht] FMC Alias Private Key: 7
26,149,029 UART: [art] Extend RT PCRs Done
26,150,270 UART: [art] Lock RT PCRs Done
26,151,872 UART: [art] Populate DV Done
26,157,078 UART: [fht] FMC Alias Private Key: 7
26,158,729 UART: [art] Derive CDI
26,159,490 UART: [art] Store in slot 0x4
26,202,526 UART: [art] Derive Key Pair
26,203,564 UART: [art] Store priv key in slot 0x5
29,445,743 UART: [art] Derive Key Pair - Done
29,458,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,794 UART: [art] Erasing AUTHORITY.KEYID = 7
31,740,299 UART: [art] PUB.X = 5CC2965AC543BB895D7362B22515240CF379D8F7CA8990CD28A291581B2BB6C63DA614A9A989244906AD475C2061A783
31,747,551 UART: [art] PUB.Y = 47E164821D7B9875E36815AB716EEA902AF451F822A99EE6C64F55707E12E5AF79AB2EEDA7743FF49691D5F495CA84D3
31,754,805 UART: [art] SIG.R = E060267DF360A8665AC6E96F0C95E984AB4F74A988EFD224ECB56270DD1BAEFC39431FDFD7D5E361D54F8F5FFE62D5EF
31,762,258 UART: [art] SIG.S = FDE6C0C68989982A9CC17B2F2FD2F9EC74DD8B65CF3D9F50492B16BFA77F9D614FFC0D3BF9D4686FEB08EB5B43E00CEA
33,067,434 UART: Caliptra RT
33,068,153 UART: [state] CFI Enabled
33,202,017 UART: [rt] RT listening for mailbox commands...
33,204,410 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
33,234,482 UART: [rt]cmd =0x44504543, len=40
33,261,797 >>> mbox cmd response data (40 bytes)
33,262,681 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,293,279 UART: [rt]cmd =0x44504543, len=96
33,335,420 >>> mbox cmd response data (56 bytes)
33,336,298 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,367,003 UART: [rt]cmd =0x44504543, len=96
39,041,332 >>> mbox cmd response data (6236 bytes)
39,070,733 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,101,350 UART: [rt]cmd =0x53574545, len=84
44,626,352 >>> mbox cmd response data (200 bytes)
47,082,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
55,825,717 >>> mbox cmd response: success
55,826,274 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
55,858,913 UART:
55,859,179 UART: Running Caliptra FMC ...
55,860,386 UART:
55,860,548 UART: [state] CFI Enabled
55,903,901 UART: [art] Extend RT PCRs Done
55,905,089 UART: [art] Lock RT PCRs Done
55,906,513 UART: [art] Populate DV Done
55,911,813 UART: [fht] FMC Alias Private Key: 7
55,913,340 UART: [art] Derive CDI
55,914,147 UART: [art] Store in slot 0x4
55,956,738 UART: [art] Derive Key Pair
55,957,768 UART: [art] Store priv key in slot 0x5
59,199,790 UART: [art] Derive Key Pair - Done
59,212,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
61,493,113 UART: [art] Erasing AUTHORITY.KEYID = 7
61,494,623 UART: [art] PUB.X = 4145F90BF78A7EF534AD5697E8F3FA658E1164016D1FDC79685729D94829AE25BFC2F1C07D362DC0B956BB2D209E9629
61,501,872 UART: [art] PUB.Y = 5C219C8C65F58EC771F3C4A54510E5C3641B3A15D65D80FD604B72916EE2DD290438DEB93F1D66E8BE4EB0900065031E
61,509,100 UART: [art] SIG.R = A8309D8FECF1BA3842A625350AC02BD394B8A322E5F294EB2E4E50058DA84DE56A7643F55C5CA689574DEF3641E25C5D
61,516,485 UART: [art] SIG.S = FBF15ED74F44E25AB25C6213316997C7D60394C1B776C45690EF9A96591AEB1DFD0CDC537FBDE4D4AA503E658BF4F39B
62,821,983 UART: Caliptra RT
62,822,703 UART: [state] CFI Enabled
63,194,756 UART: [rt] RT listening for mailbox commands...
63,226,630 UART: [rt]cmd =0x53574545, len=84
68,751,121 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
192,258 UART:
192,628 UART: Running Caliptra ROM ...
193,821 UART:
193,989 UART: [state] CFI Enabled
266,435 UART: [state] LifecycleState = Unprovisioned
268,367 UART: [state] DebugLocked = No
270,709 UART: [state] WD Timer not started. Device not locked for debugging
274,966 UART: [kat] SHA2-256
454,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,355 UART: [kat] ++
465,961 UART: [kat] sha1
476,928 UART: [kat] SHA2-256
479,568 UART: [kat] SHA2-384
485,406 UART: [kat] SHA2-512-ACC
487,773 UART: [kat] ECC-384
2,946,505 UART: [kat] HMAC-384Kdf
2,970,396 UART: [kat] LMS
3,446,916 UART: [kat] --
3,450,365 UART: [cold-reset] ++
3,452,010 UART: [fht] FHT @ 0x50003400
3,463,491 UART: [idev] ++
3,464,055 UART: [idev] CDI.KEYID = 6
3,465,009 UART: [idev] SUBJECT.KEYID = 7
3,466,255 UART: [idev] UDS.KEYID = 0
3,467,221 ready_for_fw is high
3,467,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,459 UART: [idev] Erasing UDS.KEYID = 0
5,986,191 UART: [idev] Sha1 KeyId Algorithm
6,009,936 UART: [idev] --
6,015,945 UART: [ldev] ++
6,016,516 UART: [ldev] CDI.KEYID = 6
6,017,436 UART: [ldev] SUBJECT.KEYID = 5
6,018,651 UART: [ldev] AUTHORITY.KEYID = 7
6,019,881 UART: [ldev] FE.KEYID = 1
6,058,930 UART: [ldev] Erasing FE.KEYID = 1
8,565,247 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,011 UART: [ldev] --
10,376,184 UART: [fwproc] Wait for Commands...
10,378,967 UART: [fwproc] Recv command 0x46574c44
10,381,029 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,941,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,014,775 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,887 >>> mbox cmd response: success
14,348,233 UART: [afmc] ++
14,348,840 UART: [afmc] CDI.KEYID = 6
14,349,755 UART: [afmc] SUBJECT.KEYID = 7
14,350,973 UART: [afmc] AUTHORITY.KEYID = 5
16,895,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,457 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,474 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,524 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,081 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,070 UART: [afmc] --
18,694,657 UART: [cold-reset] --
18,698,239 UART: [state] Locking Datavault
18,703,814 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,565 UART: [state] Locking ICCM
18,706,825 UART: [exit] Launching FMC @ 0x40000130
18,715,213 UART:
18,715,444 UART: Running Caliptra FMC ...
18,716,467 UART:
18,716,615 UART: [state] CFI Enabled
18,775,473 UART: [fht] FMC Alias Private Key: 7
20,541,595 UART: [art] Extend RT PCRs Done
20,542,800 UART: [art] Lock RT PCRs Done
20,544,656 UART: [art] Populate DV Done
20,550,224 UART: [fht] FMC Alias Private Key: 7
20,551,918 UART: [art] Derive CDI
20,552,653 UART: [art] Store in slot 0x4
20,608,349 UART: [art] Derive Key Pair
20,609,344 UART: [art] Store priv key in slot 0x5
23,072,455 UART: [art] Derive Key Pair - Done
23,085,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,158 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,640 UART: [art] PUB.X = AAE824840573B92C4CB71EFC07FA143CCC477381E3D679E56B17D4090F7C3780A808D08B72D2F936E2EACAE0635B86E0
24,806,940 UART: [art] PUB.Y = CD0C4A0A9146CF1B3DEB9447B2E6EFFE5C52DBDBE742F4B9400F66F3B7D8B033BE097DE4B6A1394EECA8455D8527FE37
24,814,232 UART: [art] SIG.R = A82765BE638C41FAAC524939CC56827EE42043568F6DE7C8A3F981A59B9E3E8339D12CA2E01BAF772A619348CCFCE199
24,821,623 UART: [art] SIG.S = 03C6379C2FD93413F430FCA5898C1C831362576215DD6A0F48B4B975D1BB74A8732ADEFD48D2EDD9588BD6F540E5EB8B
25,800,528 UART: Caliptra RT
25,801,252 UART: [state] CFI Enabled
25,982,429 UART: [rt] RT listening for mailbox commands...
25,984,747 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,015,067 UART: [rt]cmd =0x44504543, len=40
26,063,331 >>> mbox cmd response data (40 bytes)
26,064,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,095,104 UART: [rt]cmd =0x44504543, len=96
26,154,808 >>> mbox cmd response data (56 bytes)
26,155,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,186,397 UART: [rt]cmd =0x44504543, len=96
30,549,663 >>> mbox cmd response data (6236 bytes)
30,578,984 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,609,808 UART: [rt]cmd =0x53574545, len=84
34,786,453 >>> mbox cmd response data (200 bytes)
37,232,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,383,785 UART:
37,384,200 UART: Running Caliptra ROM ...
37,385,291 UART:
37,385,452 UART: [state] CFI Enabled
37,444,200 UART: [state] LifecycleState = Unprovisioned
37,446,144 UART: [state] DebugLocked = No
37,447,610 UART: [state] WD Timer not started. Device not locked for debugging
37,451,943 UART: [kat] SHA2-256
37,631,607 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,642,384 UART: [kat] ++
37,642,843 UART: [kat] sha1
37,652,754 UART: [kat] SHA2-256
37,655,416 UART: [kat] SHA2-384
37,660,735 UART: [kat] SHA2-512-ACC
37,663,084 UART: [kat] ECC-384
40,107,635 UART: [kat] HMAC-384Kdf
40,130,394 UART: [kat] LMS
40,606,886 UART: [kat] --
40,612,007 UART: [update-reset] ++
44,108,622 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,112,548 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,510,207 >>> mbox cmd response: success
44,510,662 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,511,921 UART: [update-reset] Copying MAN_2 To MAN_1
44,549,022 UART: [update-reset Success] --
44,553,723 UART: [state] Locking Datavault
44,556,219 UART: [state] Locking PCR0, PCR1 and PCR31
44,557,970 UART: [state] Locking ICCM
44,559,036 UART: [exit] Launching FMC @ 0x40000130
44,567,449 UART:
44,567,695 UART: Running Caliptra FMC ...
44,568,796 UART:
44,568,951 UART: [state] CFI Enabled
44,664,595 UART: [art] Extend RT PCRs Done
44,665,783 UART: [art] Lock RT PCRs Done
44,667,125 UART: [art] Populate DV Done
44,672,474 UART: [fht] FMC Alias Private Key: 7
44,674,172 UART: [art] Derive CDI
44,674,980 UART: [art] Store in slot 0x4
44,733,585 UART: [art] Derive Key Pair
44,734,630 UART: [art] Store priv key in slot 0x5
47,197,302 UART: [art] Derive Key Pair - Done
47,210,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,923,251 UART: [art] Erasing AUTHORITY.KEYID = 7
48,924,759 UART: [art] PUB.X = 5804877B52C72F9E4C3A17314C23DF903EBEA6A579870143D672A519F34A97E4E6A13FDDDF11088FDC39702A08679DCC
48,932,091 UART: [art] PUB.Y = 2687581E76087024405EE29B8777EC6B40116153B1C3C772E78D1487A84BE2922D08C8CF07A83A2831EFE0ABDB7D8108
48,939,311 UART: [art] SIG.R = 3DE1ACC5D9FFFD57C2C19502B57E99C7EC22CC0DA50A7945F3B908058A4852DE73FAEB3A08B54344CB9F851E3CB24C49
48,946,717 UART: [art] SIG.S = CE43B2AE8537D886D59A9DF62E103D045DAEF4497D29D8BDA81173C2D9D634762A264A41F330A5B2C5589815B48B2625
49,925,080 UART: Caliptra RT
49,925,802 UART: [state] CFI Enabled
50,347,371 UART: [rt] RT listening for mailbox commands...
50,379,048 UART: [rt]cmd =0x53574545, len=84
54,560,174 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,459,885 ready_for_fw is high
3,460,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,960 >>> mbox cmd response: success
18,534,105 UART:
18,534,516 UART: Running Caliptra FMC ...
18,535,709 UART:
18,535,875 UART: [state] CFI Enabled
18,602,346 UART: [fht] FMC Alias Private Key: 7
20,367,888 UART: [art] Extend RT PCRs Done
20,369,244 UART: [art] Lock RT PCRs Done
20,370,929 UART: [art] Populate DV Done
20,376,398 UART: [fht] FMC Alias Private Key: 7
20,377,939 UART: [art] Derive CDI
20,378,671 UART: [art] Store in slot 0x4
20,434,619 UART: [art] Derive Key Pair
20,435,616 UART: [art] Store priv key in slot 0x5
22,898,962 UART: [art] Derive Key Pair - Done
22,912,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,721 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,224 UART: [art] PUB.X = 8C4F0B9F138155218143E64D98E8207470EFD9B700CAFBD3A1B7A3C08183C61E0FEBF546DD1A74FB6EB8548AF3254525
24,633,499 UART: [art] PUB.Y = 73EE139A74C5C58F2230E6608DCE040F8592165F0B0D4F0199FA0C2C097DF42C2F775F797A935071348443E7CE6F3059
24,640,702 UART: [art] SIG.R = 4CC07A3578E1AE4F5717E7618E31F350867085CE31A42663776D7AE50D6951875CAC92E1B95084A09378BD9F1A6B8FB5
24,648,100 UART: [art] SIG.S = 3DE6008F8C481C8AA85AFBBEC4FDBDF2A5710C3682A5EB05C15C3DF10B4AA86F9B566954493A37DB793DA25D00C51060
25,626,594 UART: Caliptra RT
25,627,298 UART: [state] CFI Enabled
25,807,849 UART: [rt] RT listening for mailbox commands...
25,810,224 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,840,436 UART: [rt]cmd =0x44504543, len=40
25,888,792 >>> mbox cmd response data (40 bytes)
25,889,729 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,920,384 UART: [rt]cmd =0x44504543, len=96
25,980,573 >>> mbox cmd response data (56 bytes)
25,981,465 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,012,171 UART: [rt]cmd =0x44504543, len=96
30,375,865 >>> mbox cmd response data (6236 bytes)
30,405,204 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,435,950 UART: [rt]cmd =0x53574545, len=84
34,613,626 >>> mbox cmd response data (200 bytes)
37,056,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,367,078 >>> mbox cmd response: success
44,368,061 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,399,658 UART:
44,399,978 UART: Running Caliptra FMC ...
44,401,273 UART:
44,401,438 UART: [state] CFI Enabled
44,491,655 UART: [art] Extend RT PCRs Done
44,492,841 UART: [art] Lock RT PCRs Done
44,494,132 UART: [art] Populate DV Done
44,499,426 UART: [fht] FMC Alias Private Key: 7
44,501,118 UART: [art] Derive CDI
44,501,923 UART: [art] Store in slot 0x4
44,560,612 UART: [art] Derive Key Pair
44,561,646 UART: [art] Store priv key in slot 0x5
47,023,544 UART: [art] Derive Key Pair - Done
47,036,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,750,042 UART: [art] Erasing AUTHORITY.KEYID = 7
48,751,534 UART: [art] PUB.X = 398BDECB5693467E3DCCF3C51B70966CD59A7F114D5714979EF2C799D8D41E416EE236A300F790D0114EE12C41FA3FD8
48,758,840 UART: [art] PUB.Y = 039262283F0F3ED78A871AE7B048B315B25518097C78D1725DBC419CDE0A9E7E616B63202C7E8E76318A9A85410DE2CD
48,766,091 UART: [art] SIG.R = 159E91ACF8034A181C1A616508B8BE76F466CA305F898419893B91A08C7023AF2D62948F76CAA2A938D59B2B212100DD
48,773,482 UART: [art] SIG.S = D88E98314A5187C7A61F01B2F8CC9F258569322FED9148B3C5D986894F2CDDD398A1A3A15B1DB6BCEA4BBA4CD5F76166
49,752,286 UART: Caliptra RT
49,752,997 UART: [state] CFI Enabled
50,174,558 UART: [rt] RT listening for mailbox commands...
50,206,368 UART: [rt]cmd =0x53574545, len=84
54,367,879 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,399 UART:
192,755 UART: Running Caliptra ROM ...
193,940 UART:
603,641 UART: [state] CFI Enabled
617,176 UART: [state] LifecycleState = Unprovisioned
619,120 UART: [state] DebugLocked = No
621,348 UART: [state] WD Timer not started. Device not locked for debugging
624,393 UART: [kat] SHA2-256
803,983 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,807 UART: [kat] ++
815,256 UART: [kat] sha1
827,196 UART: [kat] SHA2-256
829,852 UART: [kat] SHA2-384
836,415 UART: [kat] SHA2-512-ACC
838,794 UART: [kat] ECC-384
3,280,331 UART: [kat] HMAC-384Kdf
3,293,405 UART: [kat] LMS
3,769,894 UART: [kat] --
3,773,343 UART: [cold-reset] ++
3,775,705 UART: [fht] FHT @ 0x50003400
3,788,035 UART: [idev] ++
3,788,605 UART: [idev] CDI.KEYID = 6
3,789,599 UART: [idev] SUBJECT.KEYID = 7
3,790,860 UART: [idev] UDS.KEYID = 0
3,791,787 ready_for_fw is high
3,792,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,126 UART: [idev] Erasing UDS.KEYID = 0
6,267,944 UART: [idev] Sha1 KeyId Algorithm
6,291,808 UART: [idev] --
6,297,558 UART: [ldev] ++
6,298,140 UART: [ldev] CDI.KEYID = 6
6,299,056 UART: [ldev] SUBJECT.KEYID = 5
6,300,275 UART: [ldev] AUTHORITY.KEYID = 7
6,301,511 UART: [ldev] FE.KEYID = 1
6,312,754 UART: [ldev] Erasing FE.KEYID = 1
8,789,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,152 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,960 UART: [ldev] --
10,582,192 UART: [fwproc] Wait for Commands...
10,585,100 UART: [fwproc] Recv command 0x46574c44
10,587,093 UART: [fwproc] Recv'd Img size: 118548 bytes
14,072,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,491 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,522 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,558,038 >>> mbox cmd response: success
14,561,899 UART: [afmc] ++
14,562,507 UART: [afmc] CDI.KEYID = 6
14,563,422 UART: [afmc] SUBJECT.KEYID = 7
14,564,583 UART: [afmc] AUTHORITY.KEYID = 5
17,070,223 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,819 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,848 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,456 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,312 UART: [afmc] --
18,870,459 UART: [cold-reset] --
18,876,060 UART: [state] Locking Datavault
18,882,286 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,040 UART: [state] Locking ICCM
18,885,577 UART: [exit] Launching FMC @ 0x40000130
18,893,973 UART:
18,894,214 UART: Running Caliptra FMC ...
18,895,254 UART:
18,895,403 UART: [state] CFI Enabled
18,903,513 UART: [fht] FMC Alias Private Key: 7
20,669,530 UART: [art] Extend RT PCRs Done
20,670,747 UART: [art] Lock RT PCRs Done
20,672,491 UART: [art] Populate DV Done
20,678,018 UART: [fht] FMC Alias Private Key: 7
20,679,581 UART: [art] Derive CDI
20,680,403 UART: [art] Store in slot 0x4
20,723,161 UART: [art] Derive Key Pair
20,724,202 UART: [art] Store priv key in slot 0x5
23,150,828 UART: [art] Derive Key Pair - Done
23,163,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,735 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,239 UART: [art] PUB.X = 464A5151CFAE94FF13F4E4B2F0E0D1D5A108CA996E0C56BB69BD53671CF15E7D2CCB548B76A20E1955586408AC70944E
24,878,542 UART: [art] PUB.Y = 2B94025E1ED6AB5897A039193D6F3127BDAF6138B6D1BC78F0EB9B828A87D47E02989B38C8BC14347E88445D42D8364A
24,885,781 UART: [art] SIG.R = 382FFC503CBBFF5DC1DC1EF125907BB020CE948E109105047114D165B6188AF35A177411B06F2CB3912E996317FE91E2
24,893,184 UART: [art] SIG.S = 9E426260C4F13FE620B8F95478B2BEF7BDB7FC7982A92698F52EA9338E4AE7BF84EB4760B13CF89AA18E636DAEDD321A
25,872,869 UART: Caliptra RT
25,873,568 UART: [state] CFI Enabled
26,007,151 UART: [rt] RT listening for mailbox commands...
26,009,467 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,039,574 UART: [rt]cmd =0x44504543, len=40
26,067,226 >>> mbox cmd response data (40 bytes)
26,068,201 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,098,807 UART: [rt]cmd =0x44504543, len=96
26,142,098 >>> mbox cmd response data (56 bytes)
26,143,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,173,611 UART: [rt]cmd =0x44504543, len=96
30,458,319 >>> mbox cmd response data (6236 bytes)
30,487,679 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,518,336 UART: [rt]cmd =0x53574545, len=84
34,652,558 >>> mbox cmd response data (200 bytes)
37,094,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,244,806 UART:
37,245,164 UART: Running Caliptra ROM ...
37,246,257 UART:
37,246,421 UART: [state] CFI Enabled
37,257,847 UART: [state] LifecycleState = Unprovisioned
37,259,795 UART: [state] DebugLocked = No
37,261,397 UART: [state] WD Timer not started. Device not locked for debugging
37,264,763 UART: [kat] SHA2-256
37,444,459 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,455,276 UART: [kat] ++
37,455,737 UART: [kat] sha1
37,466,425 UART: [kat] SHA2-256
37,469,124 UART: [kat] SHA2-384
37,474,949 UART: [kat] SHA2-512-ACC
37,477,355 UART: [kat] ECC-384
39,916,897 UART: [kat] HMAC-384Kdf
39,929,948 UART: [kat] LMS
40,406,453 UART: [kat] --
40,410,309 UART: [update-reset] ++
43,907,769 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,911,147 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,308,747 >>> mbox cmd response: success
44,309,180 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,309,576 UART: [update-reset] Copying MAN_2 To MAN_1
44,346,426 UART: [update-reset Success] --
44,350,384 UART: [state] Locking Datavault
44,353,857 UART: [state] Locking PCR0, PCR1 and PCR31
44,355,578 UART: [state] Locking ICCM
44,357,975 UART: [exit] Launching FMC @ 0x40000130
44,366,376 UART:
44,366,653 UART: Running Caliptra FMC ...
44,367,684 UART:
44,367,834 UART: [state] CFI Enabled
44,412,331 UART: [art] Extend RT PCRs Done
44,413,477 UART: [art] Lock RT PCRs Done
44,414,957 UART: [art] Populate DV Done
44,420,358 UART: [fht] FMC Alias Private Key: 7
44,422,003 UART: [art] Derive CDI
44,422,826 UART: [art] Store in slot 0x4
44,465,737 UART: [art] Derive Key Pair
44,466,782 UART: [art] Store priv key in slot 0x5
46,893,131 UART: [art] Derive Key Pair - Done
46,906,235 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,612,605 UART: [art] Erasing AUTHORITY.KEYID = 7
48,614,109 UART: [art] PUB.X = 32EEFEBC4893AAC72AC8CADB4B0389666E188891890B06892E00A1572A7980F2AEB0FAF1F36E7D70D6ABE65D263187EC
48,621,412 UART: [art] PUB.Y = 1F375A89B858B18860EC957335E5D1A5FCCF7FB33A768EF9052C4CA370BD3499CFF2E58834758AF8FE4283A40C7641EF
48,628,651 UART: [art] SIG.R = F5C588E670431A820E08E18AAB1875F11D2D995B847F0BF9CF279490087D6F4E8C9785044A7FE8EAAED42ED8EA865FA7
48,636,050 UART: [art] SIG.S = D065145B54AABD1ABB2E2F05AB4C98CB6BBD43988A686B9600113FF7C8D853646F6C0086EA1A110407F91EE2926B7197
49,615,100 UART: Caliptra RT
49,615,809 UART: [state] CFI Enabled
49,990,011 UART: [rt] RT listening for mailbox commands...
50,021,498 UART: [rt]cmd =0x53574545, len=84
54,157,209 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,776,417 ready_for_fw is high
3,777,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,438,407 >>> mbox cmd response: success
18,685,682 UART:
18,686,084 UART: Running Caliptra FMC ...
18,687,302 UART:
18,687,498 UART: [state] CFI Enabled
18,695,388 UART: [fht] FMC Alias Private Key: 7
20,461,503 UART: [art] Extend RT PCRs Done
20,462,743 UART: [art] Lock RT PCRs Done
20,464,541 UART: [art] Populate DV Done
20,469,855 UART: [fht] FMC Alias Private Key: 7
20,471,562 UART: [art] Derive CDI
20,472,381 UART: [art] Store in slot 0x4
20,515,205 UART: [art] Derive Key Pair
20,516,245 UART: [art] Store priv key in slot 0x5
22,942,969 UART: [art] Derive Key Pair - Done
22,955,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,662,255 UART: [art] Erasing AUTHORITY.KEYID = 7
24,663,762 UART: [art] PUB.X = 387D48926F00B10B5D9B9294818CEE289232A5A98019137FE4043854971CD26A3FFB83E03568FF6DF45BC83F49ECEA20
24,671,029 UART: [art] PUB.Y = 7881190400BC379B451A16A8457A052C8ABA06D5F76AAC709C30501A165AAAC2A2265548B23EDE0717D444B0A8A1BA79
24,678,214 UART: [art] SIG.R = CC166091C106E99ECE851F09AA823806247D8AF1CD16BB3E8ECC86611090E6056126A3FCF34F64C9B846C4A9CEEF6B56
24,685,646 UART: [art] SIG.S = 788CA9987D514F25C41F34457FFEFB3CDE7871E0254A4F54E6E4D5C69702CC4C503F808C0E187D8BB6E169C36F88CC50
25,664,903 UART: Caliptra RT
25,665,602 UART: [state] CFI Enabled
25,798,772 UART: [rt] RT listening for mailbox commands...
25,801,048 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
25,831,047 UART: [rt]cmd =0x44504543, len=40
25,858,388 >>> mbox cmd response data (40 bytes)
25,859,260 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,889,606 UART: [rt]cmd =0x44504543, len=96
25,932,793 >>> mbox cmd response data (56 bytes)
25,933,653 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,964,103 UART: [rt]cmd =0x44504543, len=96
30,248,388 >>> mbox cmd response data (6236 bytes)
30,277,780 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,308,396 UART: [rt]cmd =0x53574545, len=84
34,444,593 >>> mbox cmd response data (200 bytes)
36,887,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
44,107,682 >>> mbox cmd response: success
44,108,332 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,139,969 UART:
44,140,296 UART: Running Caliptra FMC ...
44,141,553 UART:
44,141,739 UART: [state] CFI Enabled
44,186,087 UART: [art] Extend RT PCRs Done
44,187,243 UART: [art] Lock RT PCRs Done
44,188,643 UART: [art] Populate DV Done
44,194,217 UART: [fht] FMC Alias Private Key: 7
44,195,775 UART: [art] Derive CDI
44,196,520 UART: [art] Store in slot 0x4
44,238,897 UART: [art] Derive Key Pair
44,239,897 UART: [art] Store priv key in slot 0x5
46,666,272 UART: [art] Derive Key Pair - Done
46,679,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,385,768 UART: [art] Erasing AUTHORITY.KEYID = 7
48,387,276 UART: [art] PUB.X = F75BD93419B71178877D418CF125D7EDE659CC3BDD7D99F6466A87B7CBE73158A2BC233B33C984CAE3FF2C4084BBC2A2
48,394,545 UART: [art] PUB.Y = 6B1ABCFE34DB2F4EC6AA4A25E5C50ED9363EB4C6432356711EAFCF9C88738E726E9350093C48E9516BCECA4EE4F821B3
48,401,840 UART: [art] SIG.R = 5D81D2FCC2CC854E89902661F37075881FFC17E6B85168C830A15AE480657A2D5231034C45E8A3E4B424265790B4ACF6
48,409,183 UART: [art] SIG.S = 46ECF034F0E1586F139433367CD921DB09197EE4BCD6AD1B3BBCDA3C7D0A6264A9D9E7E7F116C42772177656CF9EC89A
49,388,227 UART: Caliptra RT
49,388,936 UART: [state] CFI Enabled
49,759,750 UART: [rt] RT listening for mailbox commands...
49,791,397 UART: [rt]cmd =0x53574545, len=84
53,926,561 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,986 writing to cptra_bootfsm_go
193,173 UART:
193,538 UART: Running Caliptra ROM ...
194,639 UART:
194,785 UART: [state] CFI Enabled
264,629 UART: [state] LifecycleState = Unprovisioned
267,063 UART: [state] DebugLocked = No
269,442 UART: [state] WD Timer not started. Device not locked for debugging
274,749 UART: [kat] SHA2-256
464,582 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,385 UART: [kat] ++
475,830 UART: [kat] sha1
486,791 UART: [kat] SHA2-256
489,761 UART: [kat] SHA2-384
495,112 UART: [kat] SHA2-512-ACC
497,700 UART: [kat] ECC-384
2,948,034 UART: [kat] HMAC-384Kdf
2,972,153 UART: [kat] LMS
3,503,942 UART: [kat] --
3,508,075 UART: [cold-reset] ++
3,509,227 UART: [fht] FHT @ 0x50003400
3,520,485 UART: [idev] ++
3,521,335 UART: [idev] CDI.KEYID = 6
3,522,273 UART: [idev] SUBJECT.KEYID = 7
3,523,381 UART: [idev] UDS.KEYID = 0
3,524,304 ready_for_fw is high
3,524,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,392 UART: [idev] Erasing UDS.KEYID = 0
6,028,607 UART: [idev] Sha1 KeyId Algorithm
6,050,759 UART: [idev] --
6,055,617 UART: [ldev] ++
6,056,346 UART: [ldev] CDI.KEYID = 6
6,057,227 UART: [ldev] SUBJECT.KEYID = 5
6,058,434 UART: [ldev] AUTHORITY.KEYID = 7
6,059,560 UART: [ldev] FE.KEYID = 1
6,098,993 UART: [ldev] Erasing FE.KEYID = 1
8,605,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,606 UART: [ldev] --
10,413,691 UART: [fwproc] Wait for Commands...
10,416,384 UART: [fwproc] Recv command 0x46574c44
10,418,690 UART: [fwproc] Recv'd Img size: 118548 bytes
13,918,852 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,448 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,079 >>> mbox cmd response: success
14,686,755 UART: [afmc] ++
14,687,486 UART: [afmc] CDI.KEYID = 6
14,688,682 UART: [afmc] SUBJECT.KEYID = 7
14,690,179 UART: [afmc] AUTHORITY.KEYID = 5
17,237,295 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,978,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,287 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,995,394 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,010,530 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,025,445 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,048,671 UART: [afmc] --
19,051,433 UART: [cold-reset] --
19,055,843 UART: [state] Locking Datavault
19,061,582 UART: [state] Locking PCR0, PCR1 and PCR31
19,063,730 UART: [state] Locking ICCM
19,065,508 UART: [exit] Launching FMC @ 0x40000130
19,074,184 UART:
19,074,428 UART: Running Caliptra FMC ...
19,075,529 UART:
19,075,687 UART: [state] CFI Enabled
19,135,611 UART: [fht] FMC Alias Private Key: 7
20,923,022 UART: [art] Extend RT PCRs Done
20,924,236 UART: [art] Lock RT PCRs Done
20,925,912 UART: [art] Populate DV Done
20,931,318 UART: [fht] FMC Alias Private Key: 7
20,932,904 UART: [art] Derive CDI
20,933,713 UART: [art] Store in slot 0x4
20,990,425 UART: [art] Derive Key Pair
20,991,463 UART: [art] Store priv key in slot 0x5
23,453,996 UART: [art] Derive Key Pair - Done
23,466,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,180,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,181,832 UART: [art] PUB.X = A11DDB2506C2679310A93925D5834F054E26C26E24773894E1A101602CC9311C67CA15FFC902530173885BBA0A295731
25,189,051 UART: [art] PUB.Y = 8A0C445F1C2EF43F68DFC6A1E11B8BF3E541945C388461E3C0750C287EE4978F95CFB1B7125436112726871C9A47FCA8
25,196,294 UART: [art] SIG.R = 907130B30F1283DC5133B7FDD7EBD08B352C638F3F2574DB459060A2525EECAF76A6D6F7E0B34CE105271D03B2799AAA
25,203,679 UART: [art] SIG.S = A6FC73A65099661FCD07340233FDF76C4BA084B41208426B0F2FCFEA179FD41AEFFF9C47867841DEE6BD01287EF6DD58
26,182,798 UART: Caliptra RT
26,183,500 UART: [state] CFI Enabled
26,363,775 UART: [rt] RT listening for mailbox commands...
26,365,875 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,395,811 UART: [rt]cmd =0x44504543, len=40
26,423,943 >>> mbox cmd response data (40 bytes)
26,424,916 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,455,360 UART: [rt]cmd =0x44504543, len=96
26,516,418 >>> mbox cmd response data (56 bytes)
26,517,310 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,547,746 UART: [rt]cmd =0x44504543, len=96
30,911,843 >>> mbox cmd response data (6236 bytes)
30,941,103 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,971,734 UART: [rt]cmd =0x53574545, len=84
35,148,931 >>> mbox cmd response data (200 bytes)
37,596,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,747,609 UART:
37,747,981 UART: Running Caliptra ROM ...
37,749,037 UART:
37,749,194 UART: [state] CFI Enabled
37,807,546 UART: [state] LifecycleState = Unprovisioned
37,809,639 UART: [state] DebugLocked = No
37,812,318 UART: [state] WD Timer not started. Device not locked for debugging
37,816,218 UART: [kat] SHA2-256
38,006,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
38,016,854 UART: [kat] ++
38,017,312 UART: [kat] sha1
38,027,660 UART: [kat] SHA2-256
38,030,669 UART: [kat] SHA2-384
38,036,826 UART: [kat] SHA2-512-ACC
38,039,388 UART: [kat] ECC-384
40,493,405 UART: [kat] HMAC-384Kdf
40,512,668 UART: [kat] LMS
41,044,196 UART: [kat] --
41,048,678 UART: [update-reset] ++
44,552,614 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,555,337 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,185,091 >>> mbox cmd response: success
45,185,553 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,186,044 UART: [update-reset] Copying MAN_2 To MAN_1
45,223,617 UART: [update-reset Success] --
45,228,159 UART: [state] Locking Datavault
45,231,958 UART: [state] Locking PCR0, PCR1 and PCR31
45,234,143 UART: [state] Locking ICCM
45,236,615 UART: [exit] Launching FMC @ 0x40000130
45,245,282 UART:
45,245,512 UART: Running Caliptra FMC ...
45,246,537 UART:
45,246,682 UART: [state] CFI Enabled
45,345,851 UART: [art] Extend RT PCRs Done
45,347,026 UART: [art] Lock RT PCRs Done
45,348,513 UART: [art] Populate DV Done
45,354,237 UART: [fht] FMC Alias Private Key: 7
45,355,768 UART: [art] Derive CDI
45,356,515 UART: [art] Store in slot 0x4
45,415,003 UART: [art] Derive Key Pair
45,416,052 UART: [art] Store priv key in slot 0x5
47,878,845 UART: [art] Derive Key Pair - Done
47,891,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,605,125 UART: [art] Erasing AUTHORITY.KEYID = 7
49,606,607 UART: [art] PUB.X = 782AA207B7FBDD3ABB3A0263A5CE25AC20CC71F3BA80DF4865A382257C3AF4FB045E4974F2B1D1EB1747596C21854B3F
49,613,957 UART: [art] PUB.Y = 3ED1238690F59A0F6CCF1D316E3F712D0DF3878E485D7444887E87E4804B863413B7BD1D5CA6C3094780E275F5918CC4
49,621,185 UART: [art] SIG.R = F3F601A16F7BAB31DFFEF2770BADBC51E34168D57BB3A9910ECC11CF7E396EF96D2D290B765ADFBFF4C7D6AAAB71CD22
49,628,623 UART: [art] SIG.S = 24DB52F7D78BFBA996C55F2BAF1D90F71DC93E760D8EEEB94F21AFF3E27A256BCEF43C39BE04A550BDC45E162435F0AA
50,607,742 UART: Caliptra RT
50,608,455 UART: [state] CFI Enabled
51,023,451 UART: [rt] RT listening for mailbox commands...
51,055,148 UART: [rt]cmd =0x53574545, len=84
55,221,787 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,440,211 ready_for_fw is high
3,440,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,805,561 >>> mbox cmd response: success
19,114,180 UART:
19,114,569 UART: Running Caliptra FMC ...
19,115,770 UART:
19,115,937 UART: [state] CFI Enabled
19,182,945 UART: [fht] FMC Alias Private Key: 7
20,949,135 UART: [art] Extend RT PCRs Done
20,950,364 UART: [art] Lock RT PCRs Done
20,951,993 UART: [art] Populate DV Done
20,957,198 UART: [fht] FMC Alias Private Key: 7
20,958,903 UART: [art] Derive CDI
20,959,722 UART: [art] Store in slot 0x4
21,016,059 UART: [art] Derive Key Pair
21,017,061 UART: [art] Store priv key in slot 0x5
23,479,747 UART: [art] Derive Key Pair - Done
23,492,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,206,038 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,547 UART: [art] PUB.X = 59CBD398A67956ADB23BCD9230ED4D60D9C371E2124C4BAFC80EC70006F832020ADFF095D768559F0D0779EEA11AEE7D
25,214,860 UART: [art] PUB.Y = B4644CFC479CE11D647165A41A5979FBE9B39DF221EFE05476B996EFBFC0931159989E8241DC31B9D632DFD7C36F07C7
25,222,095 UART: [art] SIG.R = 78C8E8B39A6590B71E2FDE758D87B8D61FF2FD1630B8D9F9786B0B4A72AA83EF954606C05CDEF3D257E60A71C1949261
25,229,465 UART: [art] SIG.S = B9DB564B27A05A6654B09D1381B5FF4E0387A7511CAA0A8B5FEAEF62C74F5CC8500DE15779775700A11BB683E9A4B053
26,208,319 UART: Caliptra RT
26,209,009 UART: [state] CFI Enabled
26,389,564 UART: [rt] RT listening for mailbox commands...
26,391,827 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,421,933 UART: [rt]cmd =0x44504543, len=40
26,450,024 >>> mbox cmd response data (40 bytes)
26,450,908 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,481,367 UART: [rt]cmd =0x44504543, len=96
26,542,334 >>> mbox cmd response data (56 bytes)
26,543,197 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,573,654 UART: [rt]cmd =0x44504543, len=96
30,938,057 >>> mbox cmd response data (6236 bytes)
30,967,451 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,997,884 UART: [rt]cmd =0x53574545, len=84
35,175,354 >>> mbox cmd response data (200 bytes)
37,622,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,526,772 >>> mbox cmd response: success
45,527,442 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,562,438 UART:
45,562,734 UART: Running Caliptra FMC ...
45,563,961 UART:
45,564,124 UART: [state] CFI Enabled
45,652,796 UART: [art] Extend RT PCRs Done
45,654,018 UART: [art] Lock RT PCRs Done
45,655,320 UART: [art] Populate DV Done
45,660,842 UART: [fht] FMC Alias Private Key: 7
45,662,430 UART: [art] Derive CDI
45,663,240 UART: [art] Store in slot 0x4
45,721,200 UART: [art] Derive Key Pair
45,722,247 UART: [art] Store priv key in slot 0x5
48,185,058 UART: [art] Derive Key Pair - Done
48,198,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,910,641 UART: [art] Erasing AUTHORITY.KEYID = 7
49,912,150 UART: [art] PUB.X = B2E15D09202F16D14A31069D3910336604318C30F20E1B4F49958DCE3C247C9910C5B4DEC6E423689F4151DBCFBAAB49
49,919,410 UART: [art] PUB.Y = 2B087AEC7BA25E186C3AF9F769CFA26CB385E44B6F50C6CD64AD2EE79305420CAD206C38688B19B686EB94EEB42F3E42
49,926,698 UART: [art] SIG.R = 8D3F56BE9E3E4AC188284043AF5D0ADAEF71293E964C0104CD363313FD344A30C4618EB63DF901E58B7018FE70D4EA7A
49,934,083 UART: [art] SIG.S = A9102FE4247C49BEB31974FEA31568EC0492C774BBF10684D76C1C38BAB012B3F2C9B9946813E734B691A703FABD3BED
50,912,598 UART: Caliptra RT
50,913,291 UART: [state] CFI Enabled
51,329,724 UART: [rt] RT listening for mailbox commands...
51,361,507 UART: [rt]cmd =0x53574545, len=84
55,526,982 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,068 writing to cptra_bootfsm_go
194,220 UART:
194,564 UART: Running Caliptra ROM ...
195,758 UART:
605,271 UART: [state] CFI Enabled
617,904 UART: [state] LifecycleState = Unprovisioned
620,228 UART: [state] DebugLocked = No
622,045 UART: [state] WD Timer not started. Device not locked for debugging
626,747 UART: [kat] SHA2-256
816,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,374 UART: [kat] ++
827,917 UART: [kat] sha1
839,507 UART: [kat] SHA2-256
842,519 UART: [kat] SHA2-384
848,661 UART: [kat] SHA2-512-ACC
851,247 UART: [kat] ECC-384
3,292,443 UART: [kat] HMAC-384Kdf
3,304,888 UART: [kat] LMS
3,836,745 UART: [kat] --
3,839,466 UART: [cold-reset] ++
3,841,326 UART: [fht] FHT @ 0x50003400
3,853,287 UART: [idev] ++
3,854,009 UART: [idev] CDI.KEYID = 6
3,855,000 UART: [idev] SUBJECT.KEYID = 7
3,856,184 UART: [idev] UDS.KEYID = 0
3,857,112 ready_for_fw is high
3,857,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,199 UART: [idev] Erasing UDS.KEYID = 0
6,332,054 UART: [idev] Sha1 KeyId Algorithm
6,353,661 UART: [idev] --
6,358,795 UART: [ldev] ++
6,359,485 UART: [ldev] CDI.KEYID = 6
6,360,404 UART: [ldev] SUBJECT.KEYID = 5
6,361,565 UART: [ldev] AUTHORITY.KEYID = 7
6,362,798 UART: [ldev] FE.KEYID = 1
6,372,483 UART: [ldev] Erasing FE.KEYID = 1
8,850,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,283 UART: [ldev] --
10,642,246 UART: [fwproc] Wait for Commands...
10,645,214 UART: [fwproc] Recv command 0x46574c44
10,647,543 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,662 >>> mbox cmd response: success
14,911,319 UART: [afmc] ++
14,912,028 UART: [afmc] CDI.KEYID = 6
14,913,229 UART: [afmc] SUBJECT.KEYID = 7
14,914,676 UART: [afmc] AUTHORITY.KEYID = 5
17,415,941 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,926 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,879 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,981 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,119 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,187,046 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,993 UART: [afmc] --
19,214,842 UART: [cold-reset] --
19,219,060 UART: [state] Locking Datavault
19,224,556 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,719 UART: [state] Locking ICCM
19,229,477 UART: [exit] Launching FMC @ 0x40000130
19,238,118 UART:
19,238,364 UART: Running Caliptra FMC ...
19,239,466 UART:
19,239,633 UART: [state] CFI Enabled
19,247,786 UART: [fht] FMC Alias Private Key: 7
21,014,248 UART: [art] Extend RT PCRs Done
21,015,472 UART: [art] Lock RT PCRs Done
21,017,105 UART: [art] Populate DV Done
21,022,480 UART: [fht] FMC Alias Private Key: 7
21,024,082 UART: [art] Derive CDI
21,024,925 UART: [art] Store in slot 0x4
21,067,650 UART: [art] Derive Key Pair
21,068,698 UART: [art] Store priv key in slot 0x5
23,495,207 UART: [art] Derive Key Pair - Done
23,507,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,705 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,216 UART: [art] PUB.X = 50FC095337DF18223F51320A6B45E2E322AFA30927A7E65E04CBEE48924F2C2120BCCB1E4BAD6B07EF18DCA8E8308C5F
25,222,490 UART: [art] PUB.Y = 94744DFAD723E9DA16CDA208A86066280B7C015C6AA6782A9B24939A2EA34B9C87C6C66205340337F6965934EB0467B1
25,229,750 UART: [art] SIG.R = 3DF44DBB4F29B3C3420C401F40638C14B0A65B4A1CBCF8FE49327D86AD589CCC3F914904020FB413DE181250C0A784A3
25,237,133 UART: [art] SIG.S = FF858B367189BCA8CF932B645CB456D34D7325721571C762B3D574EBC43D1DDA90448CF0E9C7FA1124F9FD131BBED3CE
26,215,177 UART: Caliptra RT
26,215,891 UART: [state] CFI Enabled
26,347,667 UART: [rt] RT listening for mailbox commands...
26,349,811 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,379,712 UART: [rt]cmd =0x44504543, len=40
26,406,903 >>> mbox cmd response data (40 bytes)
26,407,896 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,637 UART: [rt]cmd =0x44504543, len=96
26,481,965 >>> mbox cmd response data (56 bytes)
26,483,005 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,513,571 UART: [rt]cmd =0x44504543, len=96
30,798,060 >>> mbox cmd response data (6236 bytes)
30,827,453 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,857,959 UART: [rt]cmd =0x53574545, len=84
34,993,803 >>> mbox cmd response data (200 bytes)
37,445,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,596,290 UART:
37,596,667 UART: Running Caliptra ROM ...
37,597,773 UART:
37,597,933 UART: [state] CFI Enabled
37,610,751 UART: [state] LifecycleState = Unprovisioned
37,612,643 UART: [state] DebugLocked = No
37,615,546 UART: [state] WD Timer not started. Device not locked for debugging
37,619,965 UART: [kat] SHA2-256
37,809,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,820,620 UART: [kat] ++
37,821,219 UART: [kat] sha1
37,833,106 UART: [kat] SHA2-256
37,836,130 UART: [kat] SHA2-384
37,842,662 UART: [kat] SHA2-512-ACC
37,845,169 UART: [kat] ECC-384
40,286,789 UART: [kat] HMAC-384Kdf
40,299,734 UART: [kat] LMS
40,831,323 UART: [kat] --
40,833,697 UART: [update-reset] ++
44,345,720 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,349,540 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,979,298 >>> mbox cmd response: success
44,979,792 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,980,840 UART: [update-reset] Copying MAN_2 To MAN_1
45,018,409 UART: [update-reset Success] --
45,024,283 UART: [state] Locking Datavault
45,029,278 UART: [state] Locking PCR0, PCR1 and PCR31
45,031,455 UART: [state] Locking ICCM
45,033,790 UART: [exit] Launching FMC @ 0x40000130
45,042,478 UART:
45,042,970 UART: Running Caliptra FMC ...
45,044,091 UART:
45,044,262 UART: [state] CFI Enabled
45,087,745 UART: [art] Extend RT PCRs Done
45,088,889 UART: [art] Lock RT PCRs Done
45,090,397 UART: [art] Populate DV Done
45,095,754 UART: [fht] FMC Alias Private Key: 7
45,097,410 UART: [art] Derive CDI
45,098,229 UART: [art] Store in slot 0x4
45,141,022 UART: [art] Derive Key Pair
45,142,077 UART: [art] Store priv key in slot 0x5
47,569,312 UART: [art] Derive Key Pair - Done
47,582,262 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,288,372 UART: [art] Erasing AUTHORITY.KEYID = 7
49,289,885 UART: [art] PUB.X = D683143771EBBD1B14DF08865956F6921EF49D68B7681AA9D4CBFE9BD413EB57EAB3C4BB4449A066EBAA2198895C64AB
49,297,164 UART: [art] PUB.Y = 5FBD7F0E6742E91BB29B1760EFCF20491256CEF3C801A1970006C2F399CACB0E997122F5C5CF1E9DB3F09E0E85C82FF0
49,304,467 UART: [art] SIG.R = E0339E9BA194C5B06F199946CA4C0BDF1C557D7BBE51B141AF25CA8325A604437A08E96030C13DAD31B4882F11FDB0AC
49,311,836 UART: [art] SIG.S = C81C0E6A535D76DAC4B60C9B8CB48F03280467180A8A687C52DC2A9F8F5DEB62CFFA3125249C8085BDD6E2F8E55AC528
50,290,538 UART: Caliptra RT
50,291,243 UART: [state] CFI Enabled
50,662,823 UART: [rt] RT listening for mailbox commands...
50,694,479 UART: [rt]cmd =0x53574545, len=84
54,829,529 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,758,861 ready_for_fw is high
3,759,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,582 >>> mbox cmd response: success
19,299,044 UART:
19,299,449 UART: Running Caliptra FMC ...
19,300,594 UART:
19,300,754 UART: [state] CFI Enabled
19,308,737 UART: [fht] FMC Alias Private Key: 7
21,074,825 UART: [art] Extend RT PCRs Done
21,076,050 UART: [art] Lock RT PCRs Done
21,077,662 UART: [art] Populate DV Done
21,083,079 UART: [fht] FMC Alias Private Key: 7
21,084,638 UART: [art] Derive CDI
21,085,381 UART: [art] Store in slot 0x4
21,128,196 UART: [art] Derive Key Pair
21,129,239 UART: [art] Store priv key in slot 0x5
23,555,367 UART: [art] Derive Key Pair - Done
23,568,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,902 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,413 UART: [art] PUB.X = 450C988E33A9681F59FAA0B06A6F251A757C9408FA44240EAF7F37BB3822FA058AB550CF29735EB23A782F0858ECFE28
25,283,685 UART: [art] PUB.Y = 0E1AD6E59BF461746CC9AA1F014A8EF8A592C65BEA72C740AEE143F8EF7B06C09A8BCE17056FEEF189E43BE22CCB49A4
25,290,947 UART: [art] SIG.R = B85FFD401FE87D3C6CD0197F0C38899DED90C22D60826F3729AC7C6049C0EF22DF4825A615E407041E5AF87A2CFD2B3E
25,298,363 UART: [art] SIG.S = 390E1C136296C72A48C06690ACD0081A9C227814686F1B7884404E7FF85027C19F990002E8EFBD25119DC88E944DA9A4
26,276,768 UART: Caliptra RT
26,277,485 UART: [state] CFI Enabled
26,410,108 UART: [rt] RT listening for mailbox commands...
26,412,482 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
26,442,318 UART: [rt]cmd =0x44504543, len=40
26,470,122 >>> mbox cmd response data (40 bytes)
26,471,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,501,519 UART: [rt]cmd =0x44504543, len=96
26,544,922 >>> mbox cmd response data (56 bytes)
26,545,828 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,576,606 UART: [rt]cmd =0x44504543, len=96
30,861,585 >>> mbox cmd response data (6236 bytes)
30,890,812 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,921,466 UART: [rt]cmd =0x53574545, len=84
35,056,872 >>> mbox cmd response data (200 bytes)
37,506,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
45,330,954 >>> mbox cmd response: success
45,331,604 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,368,211 UART:
45,368,537 UART: Running Caliptra FMC ...
45,369,706 UART:
45,369,863 UART: [state] CFI Enabled
45,413,842 UART: [art] Extend RT PCRs Done
45,414,998 UART: [art] Lock RT PCRs Done
45,416,639 UART: [art] Populate DV Done
45,422,324 UART: [fht] FMC Alias Private Key: 7
45,423,906 UART: [art] Derive CDI
45,424,653 UART: [art] Store in slot 0x4
45,467,092 UART: [art] Derive Key Pair
45,468,103 UART: [art] Store priv key in slot 0x5
47,894,875 UART: [art] Derive Key Pair - Done
47,907,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,613,940 UART: [art] Erasing AUTHORITY.KEYID = 7
49,615,448 UART: [art] PUB.X = B31159C47023E24990961BFED2A2EF16C3ABCC132DB67A1043523ED8D7609AA44BC1CFC3C4782FDF860650876728A4EB
49,622,719 UART: [art] PUB.Y = 1660EEEFA3792E63D356B5D1078BA4C204D6700987BF5FB79E08EFBE2D0920D2745062E59675F961F90839F441CA8CB9
49,629,973 UART: [art] SIG.R = B9F0FAC15A6C02E6B19C0A6B9B561EE268E9F45412C36863D45FB713D2FAEF9FB147C00A542602106D37D1D8C8E3694A
49,637,385 UART: [art] SIG.S = 5019C6991E8193A1AE036CB8F903195C84F4768F0B9289D26E4625246782E0F890E158EC3B10DAADC8972982C868CC78
50,616,052 UART: Caliptra RT
50,616,750 UART: [state] CFI Enabled
50,996,124 UART: [rt] RT listening for mailbox commands...
51,027,897 UART: [rt]cmd =0x53574545, len=84
55,163,824 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,641 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,229 UART: [kat] SHA2-256
882,160 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,275 UART: [kat] ++
886,427 UART: [kat] sha1
890,765 UART: [kat] SHA2-256
892,703 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,542 UART: [kat] LMS
1,475,738 UART: [kat] --
1,476,365 UART: [cold-reset] ++
1,476,751 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 ready_for_fw is high
1,480,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,230 UART: [idev] Erasing UDS.KEYID = 0
1,505,304 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,070 UART: [idev] --
1,515,057 UART: [ldev] ++
1,515,225 UART: [ldev] CDI.KEYID = 6
1,515,588 UART: [ldev] SUBJECT.KEYID = 5
1,516,014 UART: [ldev] AUTHORITY.KEYID = 7
1,516,477 UART: [ldev] FE.KEYID = 1
1,521,647 UART: [ldev] Erasing FE.KEYID = 1
1,547,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,268 UART: [ldev] --
1,586,559 UART: [fwproc] Waiting for Commands...
1,587,386 UART: [fwproc] Received command 0x46574c44
1,588,177 UART: [fwproc] Received Image of size 118548 bytes
2,932,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,415 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,633 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,946 >>> mbox cmd response: success
3,133,020 UART: [afmc] ++
3,133,188 UART: [afmc] CDI.KEYID = 6
3,133,550 UART: [afmc] SUBJECT.KEYID = 7
3,133,975 UART: [afmc] AUTHORITY.KEYID = 5
3,168,680 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,100 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,880 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,589 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,472 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,155 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,233 UART: [afmc] --
3,212,211 UART: [cold-reset] --
3,212,893 UART: [state] Locking Datavault
3,213,808 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,412 UART: [state] Locking ICCM
3,214,870 UART: [exit] Launching FMC @ 0x40000130
3,220,200 UART:
3,220,216 UART: Running Caliptra FMC ...
3,220,624 UART:
3,220,678 UART: [state] CFI Enabled
3,231,304 UART: [fht] FMC Alias Private Key: 7
3,350,598 UART: [art] Extend RT PCRs Done
3,351,026 UART: [art] Lock RT PCRs Done
3,352,652 UART: [art] Populate DV Done
3,361,159 UART: [fht] FMC Alias Private Key: 7
3,362,309 UART: [art] Derive CDI
3,362,589 UART: [art] Store in slot 0x4
3,448,021 UART: [art] Derive Key Pair
3,448,381 UART: [art] Store priv key in slot 0x5
3,461,220 UART: [art] Derive Key Pair - Done
3,475,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,547 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,312 UART: [art] PUB.X = 6DB3A85988CE9C3A287E8CE0A761A59DBDEFBA5F93B399E6D2EC907BF072E424B4B76D72506DF117BD35C8940E08E6C0
3,499,092 UART: [art] PUB.Y = 6CB69CA1FC116D1A8F93F9D0E7B1042C05407B7F438233FF61A68C2C44E24E548E0B949979D11FD92803A1A7F2B20D2D
3,506,033 UART: [art] SIG.R = 45F07AEFFBC4A725BD18290DFB7EAC4F486AA2CC99261CEEA4974D85B85CF3E1C7185CB76DB55677573FF3678CAF1036
3,512,818 UART: [art] SIG.S = CD035A6D17778284D665847B2580FBEE851D3F8DCCF1396C3727E6A37646666C6F56D03747DC078783DCC63D19998CA2
3,536,590 UART: Caliptra RT
3,536,841 UART: [state] CFI Enabled
3,657,427 UART: [rt] RT listening for mailbox commands...
3,658,097 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,057 UART: [rt]cmd =0x44504543, len=40
3,715,649 >>> mbox cmd response data (40 bytes)
3,715,650 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,745,359 UART: [rt]cmd =0x44504543, len=96
3,787,713 >>> mbox cmd response data (56 bytes)
3,787,714 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,621 UART: [rt]cmd =0x44504543, len=96
3,999,857 >>> mbox cmd response data (6236 bytes)
3,999,858 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,029,693 UART: [rt]cmd =0x53574545, len=84
4,056,166 >>> mbox cmd response data (200 bytes)
4,056,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,056,747 UART:
4,056,763 UART: Running Caliptra ROM ...
4,057,171 UART:
4,057,225 UART: [state] CFI Enabled
4,060,491 UART: [state] LifecycleState = Unprovisioned
4,061,146 UART: [state] DebugLocked = No
4,061,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,063,281 UART: [kat] SHA2-256
4,857,212 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,861,327 UART: [kat] ++
4,861,479 UART: [kat] sha1
4,865,895 UART: [kat] SHA2-256
4,867,833 UART: [kat] SHA2-384
4,870,728 UART: [kat] SHA2-512-ACC
4,872,628 UART: [kat] ECC-384
4,878,053 UART: [kat] HMAC-384Kdf
4,882,625 UART: [kat] LMS
5,450,821 UART: [kat] --
5,451,698 UART: [update-reset] ++
6,833,106 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,834,160 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,989,427 >>> mbox cmd response: success
6,989,427 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,989,708 UART: [update-reset] Copying MAN_2 To MAN_1
6,997,722 UART: [update-reset Success] --
6,998,509 UART: [state] Locking Datavault
6,999,379 UART: [state] Locking PCR0, PCR1 and PCR31
6,999,983 UART: [state] Locking ICCM
7,000,519 UART: [exit] Launching FMC @ 0x40000130
7,005,849 UART:
7,005,865 UART: Running Caliptra FMC ...
7,006,273 UART:
7,006,327 UART: [state] CFI Enabled
7,095,838 UART: [art] Extend RT PCRs Done
7,096,266 UART: [art] Lock RT PCRs Done
7,097,481 UART: [art] Populate DV Done
7,105,436 UART: [fht] FMC Alias Private Key: 7
7,106,492 UART: [art] Derive CDI
7,106,772 UART: [art] Store in slot 0x4
7,192,592 UART: [art] Derive Key Pair
7,192,952 UART: [art] Store priv key in slot 0x5
7,205,973 UART: [art] Derive Key Pair - Done
7,220,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,235,843 UART: [art] Erasing AUTHORITY.KEYID = 7
7,236,608 UART: [art] PUB.X = AFA415B633CF5B831375BF84691212620B1509AB40FA030FE471BD2A84F6AEDC33F02D50B2B79E4E4114136F78147FC1
7,243,370 UART: [art] PUB.Y = 77EA38A6D0A8912893078CDBD0117431C89BCA3BE29DDFAD0A54F93949C9B76567EB7177EE6720D6AB0A4DDEEEDF19C3
7,250,329 UART: [art] SIG.R = 0EC41FC5E4DA4A9E4E66C24DEC014E41CAF60220CDCC92EFECA9BE3FC3CCEDD90CCF749BE904A8FA644D7D4A515BFD50
7,257,122 UART: [art] SIG.S = 97F77D10A2DA4142DF9EA6DA54D1F49316FB599BB12AFB21B2336C1CEE3207924843ABF7ECDFA9AFD6401EDCD1BC2B7C
7,281,033 UART: Caliptra RT
7,281,284 UART: [state] CFI Enabled
7,644,559 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,675,284 UART: [rt]cmd =0x53574545, len=84
7,701,261 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 ready_for_fw is high
1,362,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,318 >>> mbox cmd response: success
3,040,915 UART:
3,040,931 UART: Running Caliptra FMC ...
3,041,339 UART:
3,041,393 UART: [state] CFI Enabled
3,051,933 UART: [fht] FMC Alias Private Key: 7
3,170,659 UART: [art] Extend RT PCRs Done
3,171,087 UART: [art] Lock RT PCRs Done
3,172,767 UART: [art] Populate DV Done
3,180,886 UART: [fht] FMC Alias Private Key: 7
3,181,930 UART: [art] Derive CDI
3,182,210 UART: [art] Store in slot 0x4
3,267,788 UART: [art] Derive Key Pair
3,268,148 UART: [art] Store priv key in slot 0x5
3,281,633 UART: [art] Derive Key Pair - Done
3,296,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,451 UART: [art] PUB.X = 722F0ADB316FEC8695605C97EF23FEA6958CDD272BC80ACF2285AF51974036E5520AD750354309F02AE1801CD2CD7895
3,319,213 UART: [art] PUB.Y = A0AE070624E7EA9106186EE66FB74A24D6AC61643B6D818E1AE131EEE105B0F47D67C4B949CDBC49182F8B758B6FDBBF
3,326,167 UART: [art] SIG.R = E884128E49CE015FF0FFC0DE00503225FC4039351856F067099FCF01D0FA5086418F355224E4EF9E7C51ACE8D85010DE
3,332,908 UART: [art] SIG.S = AD0D3DBF9B4F02EB58D05931848D2F04B8142C2204351612C5570EC6883DE801382EE2829035AA91F64141CD8069C0A3
3,356,462 UART: Caliptra RT
3,356,713 UART: [state] CFI Enabled
3,476,438 UART: [rt] RT listening for mailbox commands...
3,477,108 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,234 UART: [rt]cmd =0x44504543, len=40
3,534,696 >>> mbox cmd response data (40 bytes)
3,534,697 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,564,802 UART: [rt]cmd =0x44504543, len=96
3,607,100 >>> mbox cmd response data (56 bytes)
3,607,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,636,890 UART: [rt]cmd =0x44504543, len=96
3,818,242 >>> mbox cmd response data (6236 bytes)
3,818,243 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,847,948 UART: [rt]cmd =0x53574545, len=84
3,874,555 >>> mbox cmd response data (200 bytes)
3,874,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,689,136 >>> mbox cmd response: success
6,689,136 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,702,606 UART:
6,702,622 UART: Running Caliptra FMC ...
6,703,030 UART:
6,703,084 UART: [state] CFI Enabled
6,792,319 UART: [art] Extend RT PCRs Done
6,792,747 UART: [art] Lock RT PCRs Done
6,793,984 UART: [art] Populate DV Done
6,802,435 UART: [fht] FMC Alias Private Key: 7
6,803,383 UART: [art] Derive CDI
6,803,663 UART: [art] Store in slot 0x4
6,888,765 UART: [art] Derive Key Pair
6,889,125 UART: [art] Store priv key in slot 0x5
6,902,046 UART: [art] Derive Key Pair - Done
6,916,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,932,378 UART: [art] Erasing AUTHORITY.KEYID = 7
6,933,143 UART: [art] PUB.X = 44E308936DBD35599DC1AD10D7D7AB88E45E05328D534735E4E75683007482670F46B25CB173CE1DC7D05F022B6B083B
6,939,874 UART: [art] PUB.Y = FF13EC57A7B32269553CCB2A1E0F2C651EE5ABBE061B384C4FA5BCEB3ED03938428490ED4209BCE7CD6641137F6F5C68
6,946,831 UART: [art] SIG.R = 470CB5CE9B03BE3B22DC94A7A97290C4AD9D246ED90B6FD58CC0D1F474AF3A1644E16320EA97430A14C1E15EA7ADBE9B
6,953,609 UART: [art] SIG.S = CE953DF1BB43376AA916E17ADCE880948A089C5298EBFF3473A6DEB9D84D2A8A6C2D6605342C14D2190B41F6E23186D7
6,977,900 UART: Caliptra RT
6,978,151 UART: [state] CFI Enabled
7,339,438 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,370,087 UART: [rt]cmd =0x53574545, len=84
7,396,788 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Unprovisioned
85,602 UART: [state] DebugLocked = No
86,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,716 UART: [kat] SHA2-256
881,647 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,762 UART: [kat] ++
885,914 UART: [kat] sha1
890,160 UART: [kat] SHA2-256
892,098 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,709 UART: [kat] HMAC-384Kdf
907,389 UART: [kat] LMS
1,475,585 UART: [kat] --
1,476,738 UART: [cold-reset] ++
1,477,114 UART: [fht] Storing FHT @ 0x50003400
1,479,957 UART: [idev] ++
1,480,125 UART: [idev] CDI.KEYID = 6
1,480,485 UART: [idev] SUBJECT.KEYID = 7
1,480,909 UART: [idev] UDS.KEYID = 0
1,481,254 ready_for_fw is high
1,481,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,113 UART: [idev] Erasing UDS.KEYID = 0
1,505,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,625 UART: [idev] --
1,515,646 UART: [ldev] ++
1,515,814 UART: [ldev] CDI.KEYID = 6
1,516,177 UART: [ldev] SUBJECT.KEYID = 5
1,516,603 UART: [ldev] AUTHORITY.KEYID = 7
1,517,066 UART: [ldev] FE.KEYID = 1
1,522,056 UART: [ldev] Erasing FE.KEYID = 1
1,547,673 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,773 UART: [ldev] --
1,587,226 UART: [fwproc] Waiting for Commands...
1,588,063 UART: [fwproc] Received command 0x46574c44
1,588,854 UART: [fwproc] Received Image of size 118548 bytes
2,933,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,704 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,922 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,145 >>> mbox cmd response: success
3,133,327 UART: [afmc] ++
3,133,495 UART: [afmc] CDI.KEYID = 6
3,133,857 UART: [afmc] SUBJECT.KEYID = 7
3,134,282 UART: [afmc] AUTHORITY.KEYID = 5
3,169,773 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,943 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,723 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,432 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,315 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,998 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,026 UART: [afmc] --
3,212,914 UART: [cold-reset] --
3,213,894 UART: [state] Locking Datavault
3,214,879 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,483 UART: [state] Locking ICCM
3,216,123 UART: [exit] Launching FMC @ 0x40000130
3,221,453 UART:
3,221,469 UART: Running Caliptra FMC ...
3,221,877 UART:
3,222,020 UART: [state] CFI Enabled
3,232,374 UART: [fht] FMC Alias Private Key: 7
3,351,258 UART: [art] Extend RT PCRs Done
3,351,686 UART: [art] Lock RT PCRs Done
3,353,390 UART: [art] Populate DV Done
3,361,525 UART: [fht] FMC Alias Private Key: 7
3,362,535 UART: [art] Derive CDI
3,362,815 UART: [art] Store in slot 0x4
3,448,747 UART: [art] Derive Key Pair
3,449,107 UART: [art] Store priv key in slot 0x5
3,462,578 UART: [art] Derive Key Pair - Done
3,477,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,660 UART: [art] PUB.X = DD4EB47AB6C978527BD21B3D58A2C5B772F2EDA201B9F1C80DA664E1A1B9B89B7C7720FDA863DBC3252ECC142A6FB22E
3,500,446 UART: [art] PUB.Y = D791B083113C38C48C1B87B95EE255C8C230E7928B3DD1D8A68934FE5BBCABC9A87134740FD32097406985E2E1195B5D
3,507,395 UART: [art] SIG.R = 5476A0F009BBABEF5040741D41CBA1341B6E5D513459A956CB82A06E018C195DDE6769A2E2D02E7899582D1A4585F316
3,514,159 UART: [art] SIG.S = 609A3A7542EF00BE42745BF448AFE1638B8F2848DCB5B163AABAEB48D5F21E4FD85CBE6C31C0C5C3FB6F1BAE2CE81CE8
3,538,313 UART: Caliptra RT
3,538,656 UART: [state] CFI Enabled
3,659,365 UART: [rt] RT listening for mailbox commands...
3,660,035 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,987 UART: [rt]cmd =0x44504543, len=40
3,717,113 >>> mbox cmd response data (40 bytes)
3,717,114 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,747,017 UART: [rt]cmd =0x44504543, len=96
3,790,351 >>> mbox cmd response data (56 bytes)
3,790,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,337 UART: [rt]cmd =0x44504543, len=96
4,002,177 >>> mbox cmd response data (6236 bytes)
4,002,178 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,032,093 UART: [rt]cmd =0x53574545, len=84
4,057,694 >>> mbox cmd response data (200 bytes)
4,057,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,058,511 UART:
4,058,527 UART: Running Caliptra ROM ...
4,058,935 UART:
4,059,076 UART: [state] CFI Enabled
4,061,816 UART: [state] LifecycleState = Unprovisioned
4,062,471 UART: [state] DebugLocked = No
4,063,185 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,064,898 UART: [kat] SHA2-256
4,858,829 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,862,944 UART: [kat] ++
4,863,096 UART: [kat] sha1
4,867,360 UART: [kat] SHA2-256
4,869,298 UART: [kat] SHA2-384
4,871,885 UART: [kat] SHA2-512-ACC
4,873,785 UART: [kat] ECC-384
4,879,408 UART: [kat] HMAC-384Kdf
4,883,900 UART: [kat] LMS
5,452,096 UART: [kat] --
5,452,915 UART: [update-reset] ++
6,834,405 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,835,605 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,990,872 >>> mbox cmd response: success
6,990,872 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,991,159 UART: [update-reset] Copying MAN_2 To MAN_1
6,999,173 UART: [update-reset Success] --
7,000,086 UART: [state] Locking Datavault
7,000,804 UART: [state] Locking PCR0, PCR1 and PCR31
7,001,408 UART: [state] Locking ICCM
7,001,846 UART: [exit] Launching FMC @ 0x40000130
7,007,176 UART:
7,007,192 UART: Running Caliptra FMC ...
7,007,600 UART:
7,007,743 UART: [state] CFI Enabled
7,097,126 UART: [art] Extend RT PCRs Done
7,097,554 UART: [art] Lock RT PCRs Done
7,098,739 UART: [art] Populate DV Done
7,107,110 UART: [fht] FMC Alias Private Key: 7
7,108,212 UART: [art] Derive CDI
7,108,492 UART: [art] Store in slot 0x4
7,194,496 UART: [art] Derive Key Pair
7,194,856 UART: [art] Store priv key in slot 0x5
7,208,159 UART: [art] Derive Key Pair - Done
7,223,023 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,238,930 UART: [art] Erasing AUTHORITY.KEYID = 7
7,239,695 UART: [art] PUB.X = FDB6CEF0EC68C054E3FDE3B74C274F574C963EC7E66040916C7BB7808E0B389FD0E8137F06D16BE806BB0A5FF2B850BB
7,246,471 UART: [art] PUB.Y = A0482AF9E5D01A8C5E5092BDEAF3CF9894245081721CB8869D408393BAFD38D333B733934BCC6837DE29D74BB62472D0
7,253,425 UART: [art] SIG.R = 828751ED13B3D818BA019F76984CAFBB8AB3651F0CA16F381C829C1FDAEFF2BBCE1AB30675C12D30D62F0A2E22F5C003
7,260,198 UART: [art] SIG.S = 1918B2191B484CE7955D19737E700BB0C23C0FFD051E340873C1F60BD54CBA958D6BE374C8E354F7C695B87BF464E81B
7,283,793 UART: Caliptra RT
7,284,136 UART: [state] CFI Enabled
7,647,255 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,677,988 UART: [rt]cmd =0x53574545, len=84
7,704,077 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,924 ready_for_fw is high
1,361,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,857 >>> mbox cmd response: success
3,041,780 UART:
3,041,796 UART: Running Caliptra FMC ...
3,042,204 UART:
3,042,347 UART: [state] CFI Enabled
3,053,239 UART: [fht] FMC Alias Private Key: 7
3,172,521 UART: [art] Extend RT PCRs Done
3,172,949 UART: [art] Lock RT PCRs Done
3,174,595 UART: [art] Populate DV Done
3,182,998 UART: [fht] FMC Alias Private Key: 7
3,183,956 UART: [art] Derive CDI
3,184,236 UART: [art] Store in slot 0x4
3,269,804 UART: [art] Derive Key Pair
3,270,164 UART: [art] Store priv key in slot 0x5
3,283,445 UART: [art] Derive Key Pair - Done
3,298,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,009 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,774 UART: [art] PUB.X = 0BF8379F7D912146806AFC0300FDCF28F8411D41F56825A91E7781C6D017CA46E0538F2D71EF9E7D8AE59DCF3F995BD4
3,321,524 UART: [art] PUB.Y = EBE47834F4567FDE5A7CC98F2EAF3AAEB858F2CDFB7A97390256E8C05B68F35346A2BFA8032C54CD0C2C54E01139B9BD
3,328,485 UART: [art] SIG.R = D963CCC3AB9911F5898CB13BBEB507BC2E22A7FB1DB066B17019499BE4B49B0BF469F3B5872B13C7E54CF7768B2B4D08
3,335,260 UART: [art] SIG.S = 40FA7DBACFC282D8515C2EB4F7CE187CAE8587F839DE4D1B385E1FA66BEC37D2E23C6B88A12188FE60FBD20EDF855CA4
3,359,617 UART: Caliptra RT
3,359,960 UART: [state] CFI Enabled
3,479,576 UART: [rt] RT listening for mailbox commands...
3,480,246 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,326 UART: [rt]cmd =0x44504543, len=40
3,537,404 >>> mbox cmd response data (40 bytes)
3,537,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,567,478 UART: [rt]cmd =0x44504543, len=96
3,610,048 >>> mbox cmd response data (56 bytes)
3,610,049 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,639,884 UART: [rt]cmd =0x44504543, len=96
3,821,661 >>> mbox cmd response data (6236 bytes)
3,821,662 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,851,551 UART: [rt]cmd =0x53574545, len=84
3,877,366 >>> mbox cmd response data (200 bytes)
3,877,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,691,538 >>> mbox cmd response: success
6,691,538 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,704,968 UART:
6,704,984 UART: Running Caliptra FMC ...
6,705,392 UART:
6,705,535 UART: [state] CFI Enabled
6,794,662 UART: [art] Extend RT PCRs Done
6,795,090 UART: [art] Lock RT PCRs Done
6,796,527 UART: [art] Populate DV Done
6,804,640 UART: [fht] FMC Alias Private Key: 7
6,805,700 UART: [art] Derive CDI
6,805,980 UART: [art] Store in slot 0x4
6,891,526 UART: [art] Derive Key Pair
6,891,886 UART: [art] Store priv key in slot 0x5
6,904,271 UART: [art] Derive Key Pair - Done
6,919,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,934,212 UART: [art] Erasing AUTHORITY.KEYID = 7
6,934,977 UART: [art] PUB.X = 0984A078C0CA90CF736A53D4B50D96122556B4AC5DFDDF6049CA2EE00452F36D887C0F78D8E49F674338D4FFDCA3BED6
6,941,749 UART: [art] PUB.Y = 94B985F14E45755F5D7E9149BF5B257E09B4FA83608E33B4640F83AF62A6951EC9A3A27A9EBCC5D8347AFEAFF9BC7D62
6,948,707 UART: [art] SIG.R = 9FD8085EF449FD475DF652306DB88E96576723D85474928C0738EAE83301556B651AC2BB5A38564930524EB6A0565390
6,955,456 UART: [art] SIG.S = 3AD863547947C99412320AD9AEE5519CAC82102EB174F6E04CF25C15E387C75A1CFA1E84E1103A0F62F43A7CBC49A189
6,979,358 UART: Caliptra RT
6,979,701 UART: [state] CFI Enabled
7,344,742 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,375,471 UART: [rt]cmd =0x53574545, len=84
7,401,454 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,123 UART: [state] WD Timer not started. Device not locked for debugging
87,260 UART: [kat] SHA2-256
890,810 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,914 UART: [kat] ++
895,066 UART: [kat] sha1
899,256 UART: [kat] SHA2-256
901,196 UART: [kat] SHA2-384
903,857 UART: [kat] SHA2-512-ACC
905,758 UART: [kat] ECC-384
915,513 UART: [kat] HMAC-384Kdf
920,083 UART: [kat] LMS
1,168,395 UART: [kat] --
1,169,240 UART: [cold-reset] ++
1,169,568 UART: [fht] FHT @ 0x50003400
1,172,334 UART: [idev] ++
1,172,502 UART: [idev] CDI.KEYID = 6
1,172,863 UART: [idev] SUBJECT.KEYID = 7
1,173,288 UART: [idev] UDS.KEYID = 0
1,173,634 ready_for_fw is high
1,173,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,595 UART: [idev] Erasing UDS.KEYID = 0
1,197,727 UART: [idev] Sha1 KeyId Algorithm
1,206,483 UART: [idev] --
1,207,688 UART: [ldev] ++
1,207,856 UART: [ldev] CDI.KEYID = 6
1,208,220 UART: [ldev] SUBJECT.KEYID = 5
1,208,647 UART: [ldev] AUTHORITY.KEYID = 7
1,209,110 UART: [ldev] FE.KEYID = 1
1,214,342 UART: [ldev] Erasing FE.KEYID = 1
1,241,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,665 UART: [fwproc] Wait for Commands...
1,281,332 UART: [fwproc] Recv command 0x46574c44
1,282,065 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,042 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,528 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,759 >>> mbox cmd response: success
2,825,999 UART: [afmc] ++
2,826,167 UART: [afmc] CDI.KEYID = 6
2,826,530 UART: [afmc] SUBJECT.KEYID = 7
2,826,956 UART: [afmc] AUTHORITY.KEYID = 5
2,862,221 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,658 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,998 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,699 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,390 UART: [afmc] --
2,905,275 UART: [cold-reset] --
2,905,997 UART: [state] Locking Datavault
2,907,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,740 UART: [state] Locking ICCM
2,908,202 UART: [exit] Launching FMC @ 0x40000130
2,913,532 UART:
2,913,548 UART: Running Caliptra FMC ...
2,913,956 UART:
2,914,010 UART: [state] CFI Enabled
2,924,584 UART: [fht] FMC Alias Private Key: 7
3,043,130 UART: [art] Extend RT PCRs Done
3,043,558 UART: [art] Lock RT PCRs Done
3,045,042 UART: [art] Populate DV Done
3,053,333 UART: [fht] FMC Alias Private Key: 7
3,054,411 UART: [art] Derive CDI
3,054,691 UART: [art] Store in slot 0x4
3,140,090 UART: [art] Derive Key Pair
3,140,450 UART: [art] Store priv key in slot 0x5
3,153,486 UART: [art] Derive Key Pair - Done
3,168,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,076 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,841 UART: [art] PUB.X = CF167AAA9AE948032AEB418ED30F04A2491692F980635FF60940D23F3B93511473725682C494941731552F5ECCEFE81B
3,191,595 UART: [art] PUB.Y = 4A199AAEC1E318287629B94D596373909EB15367F743A847B075CDA47CB865F582B72839B3C9E52B17069795B6075989
3,198,527 UART: [art] SIG.R = 9CBDB7450D4344046321B2A1F6A23434BDAA03D22521789342FCE0EBF6571F65B8C49579504D0B8E91DFAC395437164B
3,205,285 UART: [art] SIG.S = 3040947970B5C66E937F095E66EE34219CC28D0E6CF69458B9839A616AE2F249625BF32F917BFEA403D9866474D281A4
3,228,956 UART: Caliptra RT
3,229,207 UART: [state] CFI Enabled
3,348,612 UART: [rt] RT listening for mailbox commands...
3,349,282 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,294 UART: [rt]cmd =0x44504543, len=40
3,406,236 >>> mbox cmd response data (40 bytes)
3,406,237 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,436,210 UART: [rt]cmd =0x44504543, len=96
3,478,872 >>> mbox cmd response data (56 bytes)
3,478,873 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,914 UART: [rt]cmd =0x44504543, len=96
3,689,942 >>> mbox cmd response data (6236 bytes)
3,689,943 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,854 UART: [rt]cmd =0x53574545, len=84
3,745,480 >>> mbox cmd response data (200 bytes)
3,745,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,746,288 UART:
3,746,304 UART: Running Caliptra ROM ...
3,746,712 UART:
3,746,767 UART: [state] CFI Enabled
3,749,439 UART: [state] LifecycleState = Unprovisioned
3,750,094 UART: [state] DebugLocked = No
3,750,652 UART: [state] WD Timer not started. Device not locked for debugging
3,751,888 UART: [kat] SHA2-256
4,555,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,559,542 UART: [kat] ++
4,559,694 UART: [kat] sha1
4,563,974 UART: [kat] SHA2-256
4,565,914 UART: [kat] SHA2-384
4,568,477 UART: [kat] SHA2-512-ACC
4,570,377 UART: [kat] ECC-384
4,579,688 UART: [kat] HMAC-384Kdf
4,584,294 UART: [kat] LMS
4,832,606 UART: [kat] --
4,833,368 UART: [update-reset] ++
6,190,513 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,191,632 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,346,847 >>> mbox cmd response: success
6,346,847 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,347,100 UART: [update-reset] Copying MAN_2 To MAN_1
6,355,114 UART: [update-reset Success] --
6,355,929 UART: [state] Locking Datavault
6,356,657 UART: [state] Locking PCR0, PCR1 and PCR31
6,357,261 UART: [state] Locking ICCM
6,357,825 UART: [exit] Launching FMC @ 0x40000130
6,363,155 UART:
6,363,171 UART: Running Caliptra FMC ...
6,363,579 UART:
6,363,633 UART: [state] CFI Enabled
6,452,556 UART: [art] Extend RT PCRs Done
6,452,984 UART: [art] Lock RT PCRs Done
6,454,243 UART: [art] Populate DV Done
6,462,498 UART: [fht] FMC Alias Private Key: 7
6,463,554 UART: [art] Derive CDI
6,463,834 UART: [art] Store in slot 0x4
6,549,547 UART: [art] Derive Key Pair
6,549,907 UART: [art] Store priv key in slot 0x5
6,563,039 UART: [art] Derive Key Pair - Done
6,577,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,592,596 UART: [art] Erasing AUTHORITY.KEYID = 7
6,593,361 UART: [art] PUB.X = C16C41C2CE0DE0867975CE934051B997D54767990158256BF6B755C51779323B6925421311835322C2EDB2715C647F7F
6,600,109 UART: [art] PUB.Y = FB8246D10841DDA6B41887607AF64CD29F3E83B2F0543444084641B61EA8C2105214F32332842268711375DA130664E0
6,607,034 UART: [art] SIG.R = 9E4B394BE2DB6100966DFA4A472B915F8C0FDADB077560F072F2F441BCD8F52698C2CD52714004FF5613146EF816949C
6,613,777 UART: [art] SIG.S = C290E742667780C254218A37E4D8B82C67A19A4E688FDA95BD42092D117D41A1D5EA31ED7FF8B2D193F2F48F83E8B5E3
6,638,238 UART: Caliptra RT
6,638,489 UART: [state] CFI Enabled
7,002,546 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,033,507 UART: [rt]cmd =0x53574545, len=84
7,059,349 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,546 ready_for_fw is high
1,058,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,016 >>> mbox cmd response: success
2,739,451 UART:
2,739,467 UART: Running Caliptra FMC ...
2,739,875 UART:
2,739,929 UART: [state] CFI Enabled
2,749,921 UART: [fht] FMC Alias Private Key: 7
2,868,971 UART: [art] Extend RT PCRs Done
2,869,399 UART: [art] Lock RT PCRs Done
2,870,921 UART: [art] Populate DV Done
2,879,288 UART: [fht] FMC Alias Private Key: 7
2,880,224 UART: [art] Derive CDI
2,880,504 UART: [art] Store in slot 0x4
2,966,139 UART: [art] Derive Key Pair
2,966,499 UART: [art] Store priv key in slot 0x5
2,979,677 UART: [art] Derive Key Pair - Done
2,994,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,738 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,503 UART: [art] PUB.X = 64579A8E3444112E9C6EA42745C37AB6917906E9CF1F50A04408FA84D0B7A86046A9D613C5815430E461470CDE92DCE9
3,017,260 UART: [art] PUB.Y = AA43D98944FF8CCD9B2B5E5B41EC0FE1E8A458E2A39B57AFAAA61DE9A7CE510F07C475F6979E5888087D1EC269A9BC5B
3,024,220 UART: [art] SIG.R = C0A6A72BF1EDBB1D5D8006B46B10BB2E1699F71EF1BD5AD3DDB4DCADCE8BC39594534DE997272901118E4CE0DDCE621B
3,031,010 UART: [art] SIG.S = 3B3F304CB2A04871B34CC10D4978925D239D7AAA7D307C9F7741199E5650F19C304572E5AB04E729814979A641977E91
3,055,542 UART: Caliptra RT
3,055,793 UART: [state] CFI Enabled
3,175,776 UART: [rt] RT listening for mailbox commands...
3,176,446 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,238 UART: [rt]cmd =0x44504543, len=40
3,233,684 >>> mbox cmd response data (40 bytes)
3,233,685 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,808 UART: [rt]cmd =0x44504543, len=96
3,306,118 >>> mbox cmd response data (56 bytes)
3,306,119 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,276 UART: [rt]cmd =0x44504543, len=96
3,517,493 >>> mbox cmd response data (6236 bytes)
3,517,494 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,547,399 UART: [rt]cmd =0x53574545, len=84
3,573,225 >>> mbox cmd response data (200 bytes)
3,573,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,062,056 >>> mbox cmd response: success
6,062,056 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,075,781 UART:
6,075,797 UART: Running Caliptra FMC ...
6,076,205 UART:
6,076,259 UART: [state] CFI Enabled
6,165,548 UART: [art] Extend RT PCRs Done
6,165,976 UART: [art] Lock RT PCRs Done
6,167,141 UART: [art] Populate DV Done
6,175,474 UART: [fht] FMC Alias Private Key: 7
6,176,502 UART: [art] Derive CDI
6,176,782 UART: [art] Store in slot 0x4
6,262,607 UART: [art] Derive Key Pair
6,262,967 UART: [art] Store priv key in slot 0x5
6,276,703 UART: [art] Derive Key Pair - Done
6,291,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,306,358 UART: [art] Erasing AUTHORITY.KEYID = 7
6,307,123 UART: [art] PUB.X = 55D4FB7C8ED5B9A3630F4635FC6439DAD4409A5651BA4964333689E0403C6C277D72A91753C04B9B42D41C3838D5B6D3
6,313,888 UART: [art] PUB.Y = 30AEDBE82F4728BF3D4026C2951F8DF2508264BAA757404A602568666EF9AEB71E10E6F91916852A0AB5C00ACD060393
6,320,828 UART: [art] SIG.R = 5AFA9A4C32F5369CD9B11FC881A173DB6F91C41A8765C7E17EE85DFABCB0048DB215521D66A03AE944B08BE9E5F7DF0B
6,327,612 UART: [art] SIG.S = D495D7A9127B9754686BFD190A747C4E042AC2886E150E2CBB69447CF93789D8C8627BCEF5123A7D443E3FBFC99839E0
6,350,609 UART: Caliptra RT
6,350,860 UART: [state] CFI Enabled
6,714,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,745,581 UART: [rt]cmd =0x53574545, len=84
6,771,397 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,726 UART: [state] WD Timer not started. Device not locked for debugging
88,031 UART: [kat] SHA2-256
891,581 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,685 UART: [kat] ++
895,837 UART: [kat] sha1
900,195 UART: [kat] SHA2-256
902,135 UART: [kat] SHA2-384
904,886 UART: [kat] SHA2-512-ACC
906,787 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,184 UART: [kat] LMS
1,169,496 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,493 UART: [idev] ++
1,173,661 UART: [idev] CDI.KEYID = 6
1,174,022 UART: [idev] SUBJECT.KEYID = 7
1,174,447 UART: [idev] UDS.KEYID = 0
1,174,793 ready_for_fw is high
1,174,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,452 UART: [idev] Erasing UDS.KEYID = 0
1,199,692 UART: [idev] Sha1 KeyId Algorithm
1,208,462 UART: [idev] --
1,209,533 UART: [ldev] ++
1,209,701 UART: [ldev] CDI.KEYID = 6
1,210,065 UART: [ldev] SUBJECT.KEYID = 5
1,210,492 UART: [ldev] AUTHORITY.KEYID = 7
1,210,955 UART: [ldev] FE.KEYID = 1
1,216,173 UART: [ldev] Erasing FE.KEYID = 1
1,242,976 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,603 UART: [ldev] --
1,281,890 UART: [fwproc] Wait for Commands...
1,282,475 UART: [fwproc] Recv command 0x46574c44
1,283,208 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,278 >>> mbox cmd response: success
2,827,434 UART: [afmc] ++
2,827,602 UART: [afmc] CDI.KEYID = 6
2,827,965 UART: [afmc] SUBJECT.KEYID = 7
2,828,391 UART: [afmc] AUTHORITY.KEYID = 5
2,864,604 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,201 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,950 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,660 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,541 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,242 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,031 UART: [afmc] --
2,907,948 UART: [cold-reset] --
2,908,904 UART: [state] Locking Datavault
2,910,031 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,635 UART: [state] Locking ICCM
2,911,223 UART: [exit] Launching FMC @ 0x40000130
2,916,553 UART:
2,916,569 UART: Running Caliptra FMC ...
2,916,977 UART:
2,917,120 UART: [state] CFI Enabled
2,927,340 UART: [fht] FMC Alias Private Key: 7
3,046,366 UART: [art] Extend RT PCRs Done
3,046,794 UART: [art] Lock RT PCRs Done
3,048,334 UART: [art] Populate DV Done
3,056,799 UART: [fht] FMC Alias Private Key: 7
3,057,829 UART: [art] Derive CDI
3,058,109 UART: [art] Store in slot 0x4
3,143,616 UART: [art] Derive Key Pair
3,143,976 UART: [art] Store priv key in slot 0x5
3,156,906 UART: [art] Derive Key Pair - Done
3,171,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,111 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,876 UART: [art] PUB.X = D129118D25DEA30AA408289D14F436F5C13375EFF5A5CB1591C3E8CECA9A4A0F7B0FA493DE115D7A87B099E25D900422
3,194,641 UART: [art] PUB.Y = 2AD51AF63C5F2B51FF952F5C68000C1E147F495E74A674C7F82416FFB2B5546F9884A322A298861524C687DD98CDBCBE
3,201,572 UART: [art] SIG.R = FD807B29C1433ADD0FF476CE516093F1D897383C914DE236AA56D52F46A1223B27E8FA19BAFEB98E2C529199F56B3894
3,208,345 UART: [art] SIG.S = 73AFDCB2C7F561F27F4AE8D9357F7E08DA6C221FED21C9650E044012EE55CA52255592BDBB4CF4E0EE0031AA72CC850C
3,232,023 UART: Caliptra RT
3,232,366 UART: [state] CFI Enabled
3,352,793 UART: [rt] RT listening for mailbox commands...
3,353,463 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,739 UART: [rt]cmd =0x44504543, len=40
3,411,231 >>> mbox cmd response data (40 bytes)
3,411,232 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,279 UART: [rt]cmd =0x44504543, len=96
3,484,003 >>> mbox cmd response data (56 bytes)
3,484,004 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,849 UART: [rt]cmd =0x44504543, len=96
3,695,862 >>> mbox cmd response data (6236 bytes)
3,695,863 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,725,596 UART: [rt]cmd =0x53574545, len=84
3,751,170 >>> mbox cmd response data (200 bytes)
3,751,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,906 UART:
3,751,922 UART: Running Caliptra ROM ...
3,752,330 UART:
3,752,472 UART: [state] CFI Enabled
3,755,364 UART: [state] LifecycleState = Unprovisioned
3,756,019 UART: [state] DebugLocked = No
3,756,729 UART: [state] WD Timer not started. Device not locked for debugging
3,757,935 UART: [kat] SHA2-256
4,561,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,565,589 UART: [kat] ++
4,565,741 UART: [kat] sha1
4,570,087 UART: [kat] SHA2-256
4,572,027 UART: [kat] SHA2-384
4,574,636 UART: [kat] SHA2-512-ACC
4,576,536 UART: [kat] ECC-384
4,586,005 UART: [kat] HMAC-384Kdf
4,590,563 UART: [kat] LMS
4,838,875 UART: [kat] --
4,839,595 UART: [update-reset] ++
6,197,909 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,198,914 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,354,129 >>> mbox cmd response: success
6,354,129 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,354,260 UART: [update-reset] Copying MAN_2 To MAN_1
6,362,274 UART: [update-reset Success] --
6,363,287 UART: [state] Locking Datavault
6,364,169 UART: [state] Locking PCR0, PCR1 and PCR31
6,364,773 UART: [state] Locking ICCM
6,365,323 UART: [exit] Launching FMC @ 0x40000130
6,370,653 UART:
6,370,669 UART: Running Caliptra FMC ...
6,371,077 UART:
6,371,220 UART: [state] CFI Enabled
6,460,365 UART: [art] Extend RT PCRs Done
6,460,793 UART: [art] Lock RT PCRs Done
6,461,990 UART: [art] Populate DV Done
6,470,353 UART: [fht] FMC Alias Private Key: 7
6,471,475 UART: [art] Derive CDI
6,471,755 UART: [art] Store in slot 0x4
6,557,668 UART: [art] Derive Key Pair
6,558,028 UART: [art] Store priv key in slot 0x5
6,570,828 UART: [art] Derive Key Pair - Done
6,585,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,600,697 UART: [art] Erasing AUTHORITY.KEYID = 7
6,601,462 UART: [art] PUB.X = 601B122857D86C72EF8B7845C69CB907D56E5E940C72A6AC1B0289AEA80D8C1C84D3F9A3FFEE4118980E3AB1E79D90A5
6,608,227 UART: [art] PUB.Y = 5E97CFFCB036DE367DDCEF714D6D96ABBC7F8E23C8A9B29B4BA49D9E5DD4AFEE7534FAF682636710697A8EB41F7513E8
6,615,201 UART: [art] SIG.R = 4719A879C4FC2C19A1D88A4B8AC710C4DF9D247AA709B17972ADFAB20AA2C63E9ADBDFCE3310381859EADA7F8C38FA93
6,621,987 UART: [art] SIG.S = B966E0F976703DE7C85296F77F18CB08F688D7788C2ECD7E70A63308A044C198485AEE962F7CC26D1039048ECC921620
6,645,792 UART: Caliptra RT
6,646,135 UART: [state] CFI Enabled
7,007,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,038,416 UART: [rt]cmd =0x53574545, len=84
7,064,430 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,993 ready_for_fw is high
1,060,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,683,431 >>> mbox cmd response: success
2,745,508 UART:
2,745,524 UART: Running Caliptra FMC ...
2,745,932 UART:
2,746,075 UART: [state] CFI Enabled
2,756,577 UART: [fht] FMC Alias Private Key: 7
2,875,331 UART: [art] Extend RT PCRs Done
2,875,759 UART: [art] Lock RT PCRs Done
2,877,487 UART: [art] Populate DV Done
2,885,666 UART: [fht] FMC Alias Private Key: 7
2,886,826 UART: [art] Derive CDI
2,887,106 UART: [art] Store in slot 0x4
2,973,047 UART: [art] Derive Key Pair
2,973,407 UART: [art] Store priv key in slot 0x5
2,986,145 UART: [art] Derive Key Pair - Done
3,001,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,730 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,495 UART: [art] PUB.X = CADD7259A8042F42B53245883DAB0C068EAC354C448658090A71B36425330C765AB8ACF698BA521C3E7798A5E390F952
3,024,245 UART: [art] PUB.Y = 1C292D041F4199ED070BED43860C2CE2EB24B0601B6BC6ED6006A0D48F318A1C9693EE5F9D5B7B6A35687E3EF775C56D
3,031,190 UART: [art] SIG.R = E9C23B0E4C6E6F379872563934617D6ADCEF3EDF9CBD927C159B1DB8EDCC9BEFCDAE96433F3FB875DECC6B5DA4DEBDFE
3,037,995 UART: [art] SIG.S = D940CB09C0454861962DF00B8FC56D377E39595FC0AA11A4B40C332192BD1F5BA19AAA6CE8C7A536C30E8AFE5C6F0E8E
3,061,746 UART: Caliptra RT
3,062,089 UART: [state] CFI Enabled
3,182,139 UART: [rt] RT listening for mailbox commands...
3,182,809 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,683 UART: [rt]cmd =0x44504543, len=40
3,240,371 >>> mbox cmd response data (40 bytes)
3,240,372 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,270,337 UART: [rt]cmd =0x44504543, len=96
3,313,531 >>> mbox cmd response data (56 bytes)
3,313,532 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,343,405 UART: [rt]cmd =0x44504543, len=96
3,525,111 >>> mbox cmd response data (6236 bytes)
3,525,112 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,554,891 UART: [rt]cmd =0x53574545, len=84
3,581,539 >>> mbox cmd response data (200 bytes)
3,581,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,071,201 >>> mbox cmd response: success
6,071,201 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,084,490 UART:
6,084,506 UART: Running Caliptra FMC ...
6,084,914 UART:
6,085,057 UART: [state] CFI Enabled
6,174,878 UART: [art] Extend RT PCRs Done
6,175,306 UART: [art] Lock RT PCRs Done
6,176,551 UART: [art] Populate DV Done
6,184,592 UART: [fht] FMC Alias Private Key: 7
6,185,588 UART: [art] Derive CDI
6,185,868 UART: [art] Store in slot 0x4
6,271,171 UART: [art] Derive Key Pair
6,271,531 UART: [art] Store priv key in slot 0x5
6,284,747 UART: [art] Derive Key Pair - Done
6,299,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,314,953 UART: [art] Erasing AUTHORITY.KEYID = 7
6,315,718 UART: [art] PUB.X = 7BAE6D9EC543982EADE4CE022E1D8586D909241C97868EAF0C384A395A799011610B9A412BADCDABDC404ABAF8658490
6,322,488 UART: [art] PUB.Y = 8BCAEE101D335DB22062782EE089932FB51EC6510FA2883AB2ACCE75F6D8432D80A0066885EB2377727E957379DDCE72
6,329,436 UART: [art] SIG.R = 82791B92857F1EEA0FF43247ADA63E145352399D07EF962E8406C854E19FC9D8BDE4EBB9D678BEA1B2DCFC58DE1E2A33
6,336,213 UART: [art] SIG.S = 707AFEAB748854FA0DF44FE827921EC2B95B87C8BA2B84764F00402BE3D5655A432872FE7A9C8544D9E689A964EBD365
6,359,648 UART: Caliptra RT
6,359,991 UART: [state] CFI Enabled
6,724,465 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,755,150 UART: [rt]cmd =0x53574545, len=84
6,780,914 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,842 UART: [state] LifecycleState = Unprovisioned
85,497 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
893,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,203 UART: [kat] ++
897,355 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,476 UART: [kat] SHA2-512-ACC
908,377 UART: [kat] ECC-384
918,346 UART: [kat] HMAC-384Kdf
922,840 UART: [kat] LMS
1,171,168 UART: [kat] --
1,172,079 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,320 UART: [idev] ++
1,175,488 UART: [idev] CDI.KEYID = 6
1,175,848 UART: [idev] SUBJECT.KEYID = 7
1,176,272 UART: [idev] UDS.KEYID = 0
1,176,617 ready_for_fw is high
1,176,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,078 UART: [idev] Erasing UDS.KEYID = 0
1,201,607 UART: [idev] Sha1 KeyId Algorithm
1,210,097 UART: [idev] --
1,211,109 UART: [ldev] ++
1,211,277 UART: [ldev] CDI.KEYID = 6
1,211,640 UART: [ldev] SUBJECT.KEYID = 5
1,212,066 UART: [ldev] AUTHORITY.KEYID = 7
1,212,529 UART: [ldev] FE.KEYID = 1
1,217,783 UART: [ldev] Erasing FE.KEYID = 1
1,244,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,477 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,817 UART: [ldev] --
1,283,132 UART: [fwproc] Wait for Commands...
1,283,714 UART: [fwproc] Recv command 0x46574c44
1,284,442 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,363 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,674 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,844 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,055 >>> mbox cmd response: success
2,828,187 UART: [afmc] ++
2,828,355 UART: [afmc] CDI.KEYID = 6
2,828,717 UART: [afmc] SUBJECT.KEYID = 7
2,829,142 UART: [afmc] AUTHORITY.KEYID = 5
2,864,541 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,880 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,628 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,337 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,220 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,921 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,797 UART: [afmc] --
2,907,889 UART: [cold-reset] --
2,908,707 UART: [state] Locking Datavault
2,910,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,858 UART: [state] Locking ICCM
2,911,518 UART: [exit] Launching FMC @ 0x40000130
2,916,848 UART:
2,916,864 UART: Running Caliptra FMC ...
2,917,272 UART:
2,917,326 UART: [state] CFI Enabled
2,927,278 UART: [fht] FMC Alias Private Key: 7
3,045,978 UART: [art] Extend RT PCRs Done
3,046,406 UART: [art] Lock RT PCRs Done
3,048,006 UART: [art] Populate DV Done
3,056,177 UART: [fht] FMC Alias Private Key: 7
3,057,325 UART: [art] Derive CDI
3,057,605 UART: [art] Store in slot 0x4
3,143,870 UART: [art] Derive Key Pair
3,144,230 UART: [art] Store priv key in slot 0x5
3,157,752 UART: [art] Derive Key Pair - Done
3,172,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,975 UART: [art] PUB.X = C59998A3CA0D90EEA3D9C8F726B62A4F269606E1912A745B6FDAE08C40EF3969621E5B03DE9875022022E1449C403B50
3,195,733 UART: [art] PUB.Y = E3C5201A0090CFF28C22836931D6E1B203AA0101ACF1850C8D1E8926BB59A062A8CA4DB23A0889A406E82A964D724091
3,202,643 UART: [art] SIG.R = 090B303281A340A95CC96978003D0946B06841E035AB6F7B3B67CF8F863FB3E80DB9C71E070143772707F32617966B79
3,209,358 UART: [art] SIG.S = CBCEF2468E254218FDD52980632EEA9F68E5A1C9101C40DD98700A35353A5B7C800A871DBEE70E8909A588D0EE1371FD
3,233,306 UART: Caliptra RT
3,233,557 UART: [state] CFI Enabled
3,353,266 UART: [rt] RT listening for mailbox commands...
3,353,936 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,988 UART: [rt]cmd =0x44504543, len=40
3,411,366 >>> mbox cmd response data (40 bytes)
3,411,367 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,441,346 UART: [rt]cmd =0x44504543, len=96
3,483,076 >>> mbox cmd response data (56 bytes)
3,483,077 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,074 UART: [rt]cmd =0x44504543, len=96
3,694,916 >>> mbox cmd response data (6236 bytes)
3,694,917 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,724,828 UART: [rt]cmd =0x53574545, len=84
3,750,370 >>> mbox cmd response data (200 bytes)
3,750,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,751,066 UART:
3,751,082 UART: Running Caliptra ROM ...
3,751,490 UART:
3,751,545 UART: [state] CFI Enabled
3,754,181 UART: [state] LifecycleState = Unprovisioned
3,754,836 UART: [state] DebugLocked = No
3,755,478 UART: [state] WD Timer not started. Device not locked for debugging
3,756,778 UART: [kat] SHA2-256
4,562,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,566,553 UART: [kat] ++
4,566,705 UART: [kat] sha1
4,571,155 UART: [kat] SHA2-256
4,573,095 UART: [kat] SHA2-384
4,575,826 UART: [kat] SHA2-512-ACC
4,577,726 UART: [kat] ECC-384
4,587,711 UART: [kat] HMAC-384Kdf
4,592,275 UART: [kat] LMS
4,840,603 UART: [kat] --
4,841,445 UART: [update-reset] ++
6,199,121 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,200,264 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,355,479 >>> mbox cmd response: success
6,355,479 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,355,682 UART: [update-reset] Copying MAN_2 To MAN_1
6,363,696 UART: [update-reset Success] --
6,364,439 UART: [state] Locking Datavault
6,365,213 UART: [state] Locking PCR0, PCR1 and PCR31
6,365,817 UART: [state] Locking ICCM
6,366,295 UART: [exit] Launching FMC @ 0x40000130
6,371,625 UART:
6,371,641 UART: Running Caliptra FMC ...
6,372,049 UART:
6,372,103 UART: [state] CFI Enabled
6,460,986 UART: [art] Extend RT PCRs Done
6,461,414 UART: [art] Lock RT PCRs Done
6,462,867 UART: [art] Populate DV Done
6,470,864 UART: [fht] FMC Alias Private Key: 7
6,471,950 UART: [art] Derive CDI
6,472,230 UART: [art] Store in slot 0x4
6,557,745 UART: [art] Derive Key Pair
6,558,105 UART: [art] Store priv key in slot 0x5
6,571,745 UART: [art] Derive Key Pair - Done
6,586,503 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,602,150 UART: [art] Erasing AUTHORITY.KEYID = 7
6,602,915 UART: [art] PUB.X = 8F7CF772884B2E397E5FED8699DBA98D7AC7336658E52F82BB961B675DE77DACE9D3B12A70A620B19DA601681CA4DA8D
6,609,696 UART: [art] PUB.Y = 042799D3C180F09A26080C34DE3120ABB5BBAF54E57CBD754A61D63B347E2B02DF060C2EE287C0126A22D11A1D08E713
6,616,631 UART: [art] SIG.R = B0DE51017C81056CD96E1BA4FACB3FB8B2D1B304E110F4BC9F6D1BB43632B3BBF1EF684C7ED8C0C088B1FB8B66F4B187
6,623,416 UART: [art] SIG.S = 53955ADF910DB0B721B94AAC2C3DF948C5A8EF25FEE32096749C6C65463B3E2DF411CF99304ED689BF24045471334C59
6,647,056 UART: Caliptra RT
6,647,307 UART: [state] CFI Enabled
7,011,693 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,042,424 UART: [rt]cmd =0x53574545, len=84
7,068,664 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.50s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,679 ready_for_fw is high
1,060,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,530 >>> mbox cmd response: success
2,740,055 UART:
2,740,071 UART: Running Caliptra FMC ...
2,740,479 UART:
2,740,533 UART: [state] CFI Enabled
2,750,985 UART: [fht] FMC Alias Private Key: 7
2,869,779 UART: [art] Extend RT PCRs Done
2,870,207 UART: [art] Lock RT PCRs Done
2,871,483 UART: [art] Populate DV Done
2,879,516 UART: [fht] FMC Alias Private Key: 7
2,880,500 UART: [art] Derive CDI
2,880,780 UART: [art] Store in slot 0x4
2,966,663 UART: [art] Derive Key Pair
2,967,023 UART: [art] Store priv key in slot 0x5
2,980,253 UART: [art] Derive Key Pair - Done
2,995,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,879 UART: [art] PUB.X = 6744F1C3D8A8090E4791CED881B0EF7D92C67CD1665A58EDBD8C901F6CB99E13AEA4CA3616D8DD0FB4BB39379E8049D1
3,018,656 UART: [art] PUB.Y = 294C5F4F6061C260C34D97F8F9A76F59DC41187CA77CB396DC862BADD223091A6019DAF0957870BBF6DC3F2967CA9966
3,025,609 UART: [art] SIG.R = 889361E0616266753ECF21499DD62B0BCC01CFB8AC50A2BB196C469A5C154152F650773549EB6BA98648B3ACA803B625
3,032,370 UART: [art] SIG.S = 9F41E5EB15D949E66A103F6A5B2F83B93FE2977589F2F833F86363AAC41CD7FACCE362E8B0B371B2AB136D295F6B13D3
3,055,742 UART: Caliptra RT
3,055,993 UART: [state] CFI Enabled
3,175,625 UART: [rt] RT listening for mailbox commands...
3,176,295 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,299 UART: [rt]cmd =0x44504543, len=40
3,233,489 >>> mbox cmd response data (40 bytes)
3,233,490 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,263,531 UART: [rt]cmd =0x44504543, len=96
3,306,375 >>> mbox cmd response data (56 bytes)
3,306,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,336,065 UART: [rt]cmd =0x44504543, len=96
3,517,896 >>> mbox cmd response data (6236 bytes)
3,517,897 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,548,028 UART: [rt]cmd =0x53574545, len=84
3,573,770 >>> mbox cmd response data (200 bytes)
3,573,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,780 >>> mbox cmd response: success
6,064,780 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,078,167 UART:
6,078,183 UART: Running Caliptra FMC ...
6,078,591 UART:
6,078,645 UART: [state] CFI Enabled
6,168,098 UART: [art] Extend RT PCRs Done
6,168,526 UART: [art] Lock RT PCRs Done
6,169,739 UART: [art] Populate DV Done
6,177,978 UART: [fht] FMC Alias Private Key: 7
6,178,998 UART: [art] Derive CDI
6,179,278 UART: [art] Store in slot 0x4
6,265,065 UART: [art] Derive Key Pair
6,265,425 UART: [art] Store priv key in slot 0x5
6,278,877 UART: [art] Derive Key Pair - Done
6,293,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,309,305 UART: [art] Erasing AUTHORITY.KEYID = 7
6,310,070 UART: [art] PUB.X = FAA707A87EE775975D3C844115D371AE59C7C058E3AD71BAB1C1AD42DEEE1357DAB92435CFCF5970B2A02EEF9F786967
6,316,853 UART: [art] PUB.Y = 6CA575A41FE026B77384248783ADC6AE3D587411DF496B50A9ECA564DA86F41D83356A9B1F13738FEB9FA51D2915E227
6,323,807 UART: [art] SIG.R = 175F19B72E29ECF6D7B3092B5CBBAF19BFE3CDE5866F086A6E77584377699990D1A291BF630F42285D79526506E416D4
6,330,565 UART: [art] SIG.S = 6B67485635887F385D78A0541FDBCA044A44CD0641D5B3431F6BD1E4AB689BD4DF3D2E58636E88DC12106E48C8A1113C
6,354,291 UART: Caliptra RT
6,354,542 UART: [state] CFI Enabled
6,718,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,749,006 UART: [rt]cmd =0x53574545, len=84
6,774,986 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,830 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,192 UART: [kat] SHA2-256
904,132 UART: [kat] SHA2-384
906,711 UART: [kat] SHA2-512-ACC
908,612 UART: [kat] ECC-384
918,083 UART: [kat] HMAC-384Kdf
922,623 UART: [kat] LMS
1,170,951 UART: [kat] --
1,172,104 UART: [cold-reset] ++
1,172,566 UART: [fht] FHT @ 0x50003400
1,175,225 UART: [idev] ++
1,175,393 UART: [idev] CDI.KEYID = 6
1,175,753 UART: [idev] SUBJECT.KEYID = 7
1,176,177 UART: [idev] UDS.KEYID = 0
1,176,522 ready_for_fw is high
1,176,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,297 UART: [idev] Erasing UDS.KEYID = 0
1,201,596 UART: [idev] Sha1 KeyId Algorithm
1,209,944 UART: [idev] --
1,211,118 UART: [ldev] ++
1,211,286 UART: [ldev] CDI.KEYID = 6
1,211,649 UART: [ldev] SUBJECT.KEYID = 5
1,212,075 UART: [ldev] AUTHORITY.KEYID = 7
1,212,538 UART: [ldev] FE.KEYID = 1
1,217,762 UART: [ldev] Erasing FE.KEYID = 1
1,243,777 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,515 UART: [fwproc] Wait for Commands...
1,284,131 UART: [fwproc] Recv command 0x46574c44
1,284,859 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,815 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,140 >>> mbox cmd response: success
2,829,188 UART: [afmc] ++
2,829,356 UART: [afmc] CDI.KEYID = 6
2,829,718 UART: [afmc] SUBJECT.KEYID = 7
2,830,143 UART: [afmc] AUTHORITY.KEYID = 5
2,865,680 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,973 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,721 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,313 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,014 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,894 UART: [afmc] --
2,908,864 UART: [cold-reset] --
2,909,664 UART: [state] Locking Datavault
2,910,905 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,509 UART: [state] Locking ICCM
2,911,931 UART: [exit] Launching FMC @ 0x40000130
2,917,261 UART:
2,917,277 UART: Running Caliptra FMC ...
2,917,685 UART:
2,917,828 UART: [state] CFI Enabled
2,928,552 UART: [fht] FMC Alias Private Key: 7
3,047,984 UART: [art] Extend RT PCRs Done
3,048,412 UART: [art] Lock RT PCRs Done
3,049,516 UART: [art] Populate DV Done
3,057,735 UART: [fht] FMC Alias Private Key: 7
3,058,851 UART: [art] Derive CDI
3,059,131 UART: [art] Store in slot 0x4
3,144,962 UART: [art] Derive Key Pair
3,145,322 UART: [art] Store priv key in slot 0x5
3,158,862 UART: [art] Derive Key Pair - Done
3,173,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,922 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,687 UART: [art] PUB.X = 43CD0DFB354C06A0119DB3EEF463BE4EF55CC1C8BD02DCFFF85745FCA34AD63A584FABE3F388FC190400AE6261AA41DC
3,196,451 UART: [art] PUB.Y = 48DD16F5ED0ED3C120FD284BF8625FB167C63EA4C06016EB1F1516967566FCA230A1C8238622F0FFD154479E26597F2D
3,203,402 UART: [art] SIG.R = BDFF2DC9466D029C1CB1C5D0FEC884649A03AF11A358D7FFD5AC3611CB3E337C501C5BF23BD810D303E45A626E2B0155
3,210,176 UART: [art] SIG.S = 7D80FF62FC5F6B149F63591F41F8E491A7D4367DEB11C53295E694F6BF50570761373F33C4228558648B3D34A6357EB8
3,234,391 UART: Caliptra RT
3,234,734 UART: [state] CFI Enabled
3,355,297 UART: [rt] RT listening for mailbox commands...
3,355,967 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,399 UART: [rt]cmd =0x44504543, len=40
3,413,731 >>> mbox cmd response data (40 bytes)
3,413,732 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,443,793 UART: [rt]cmd =0x44504543, len=96
3,486,373 >>> mbox cmd response data (56 bytes)
3,486,374 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,387 UART: [rt]cmd =0x44504543, len=96
3,697,912 >>> mbox cmd response data (6236 bytes)
3,697,913 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,727,898 UART: [rt]cmd =0x53574545, len=84
3,754,030 >>> mbox cmd response data (200 bytes)
3,754,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,158 UART:
3,755,174 UART: Running Caliptra ROM ...
3,755,582 UART:
3,755,724 UART: [state] CFI Enabled
3,758,698 UART: [state] LifecycleState = Unprovisioned
3,759,353 UART: [state] DebugLocked = No
3,759,921 UART: [state] WD Timer not started. Device not locked for debugging
3,761,151 UART: [kat] SHA2-256
4,566,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,570,926 UART: [kat] ++
4,571,078 UART: [kat] sha1
4,575,294 UART: [kat] SHA2-256
4,577,234 UART: [kat] SHA2-384
4,580,023 UART: [kat] SHA2-512-ACC
4,581,923 UART: [kat] ECC-384
4,591,536 UART: [kat] HMAC-384Kdf
4,596,206 UART: [kat] LMS
4,844,534 UART: [kat] --
4,845,392 UART: [update-reset] ++
6,203,916 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
6,205,023 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
6,360,238 >>> mbox cmd response: success
6,360,238 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,360,431 UART: [update-reset] Copying MAN_2 To MAN_1
6,368,445 UART: [update-reset Success] --
6,369,470 UART: [state] Locking Datavault
6,370,266 UART: [state] Locking PCR0, PCR1 and PCR31
6,370,870 UART: [state] Locking ICCM
6,371,358 UART: [exit] Launching FMC @ 0x40000130
6,376,688 UART:
6,376,704 UART: Running Caliptra FMC ...
6,377,112 UART:
6,377,255 UART: [state] CFI Enabled
6,466,596 UART: [art] Extend RT PCRs Done
6,467,024 UART: [art] Lock RT PCRs Done
6,468,149 UART: [art] Populate DV Done
6,476,208 UART: [fht] FMC Alias Private Key: 7
6,477,266 UART: [art] Derive CDI
6,477,546 UART: [art] Store in slot 0x4
6,563,437 UART: [art] Derive Key Pair
6,563,797 UART: [art] Store priv key in slot 0x5
6,576,647 UART: [art] Derive Key Pair - Done
6,591,547 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,607,104 UART: [art] Erasing AUTHORITY.KEYID = 7
6,607,869 UART: [art] PUB.X = 97429DBCF8426966912DAD2E498D596713B6A7EDD8DF9BFA244D0E86D6B8914F7302ACE18476967B55BB6E76DED4C6D2
6,614,643 UART: [art] PUB.Y = B2BD2F5A51F01F4CDCA2C0DA471DFB7E16055FBE3670CF40D0EFC2C22314AC00AC1F5FCCC89D763E79FF313B597DF178
6,621,594 UART: [art] SIG.R = 51BB3022168849E2FA6774A46A8B2A52AADFBECC74100B00F3503592C22B876F319A793371EBB32E75EA2BED349FD429
6,628,345 UART: [art] SIG.S = 7FB73E73CFCB98C17759F9D5FD6CA252224F0ACAE58265C3027FA5956D772336BA38985DB980E18B5B53ECD99B7EA919
6,651,687 UART: Caliptra RT
6,652,030 UART: [state] CFI Enabled
7,017,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,048,358 UART: [rt]cmd =0x53574545, len=84
7,074,602 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,404 ready_for_fw is high
1,060,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,872 >>> mbox cmd response: success
2,744,377 UART:
2,744,393 UART: Running Caliptra FMC ...
2,744,801 UART:
2,744,944 UART: [state] CFI Enabled
2,755,654 UART: [fht] FMC Alias Private Key: 7
2,874,856 UART: [art] Extend RT PCRs Done
2,875,284 UART: [art] Lock RT PCRs Done
2,877,108 UART: [art] Populate DV Done
2,885,205 UART: [fht] FMC Alias Private Key: 7
2,886,217 UART: [art] Derive CDI
2,886,497 UART: [art] Store in slot 0x4
2,972,580 UART: [art] Derive Key Pair
2,972,940 UART: [art] Store priv key in slot 0x5
2,987,222 UART: [art] Derive Key Pair - Done
3,002,108 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,633 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,398 UART: [art] PUB.X = 8BE240693E3AFE22677A9A27817585C47AC11DEB708192F4712E0F0F8F9B4A605C1CB1A1AF6C4DC1B3B245F03D33AFD8
3,025,174 UART: [art] PUB.Y = E4A5999B2E8FE48409578DC5B29F680AC1A296FA4707CEAF9A510924DA6CAEE57B6473F0E3CC66EA5A28EE8D2969C685
3,032,126 UART: [art] SIG.R = 5E1048CF535D707D7C506406EFA8DAD4E6F7C9CB2D40B1C0FEC05C696B8C72573FA916A6F63F1C549E5C2E36AE4666C2
3,038,907 UART: [art] SIG.S = 0C34DF143052A5462BF241D8611161110BBD32AFCD32AE130B9DC6DB7A8651DFE7A1A6F653DB03F099ECA0E61A5A64EE
3,062,469 UART: Caliptra RT
3,062,812 UART: [state] CFI Enabled
3,183,258 UART: [rt] RT listening for mailbox commands...
3,183,928 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,214,074 UART: [rt]cmd =0x44504543, len=40
3,241,720 >>> mbox cmd response data (40 bytes)
3,241,721 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,271,664 UART: [rt]cmd =0x44504543, len=96
3,314,310 >>> mbox cmd response data (56 bytes)
3,314,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,344,388 UART: [rt]cmd =0x44504543, len=96
3,526,677 >>> mbox cmd response data (6236 bytes)
3,526,678 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,556,877 UART: [rt]cmd =0x53574545, len=84
3,583,383 >>> mbox cmd response data (200 bytes)
3,583,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,073,510 >>> mbox cmd response: success
6,073,510 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
6,087,009 UART:
6,087,025 UART: Running Caliptra FMC ...
6,087,433 UART:
6,087,576 UART: [state] CFI Enabled
6,177,073 UART: [art] Extend RT PCRs Done
6,177,501 UART: [art] Lock RT PCRs Done
6,178,684 UART: [art] Populate DV Done
6,186,827 UART: [fht] FMC Alias Private Key: 7
6,187,791 UART: [art] Derive CDI
6,188,071 UART: [art] Store in slot 0x4
6,273,956 UART: [art] Derive Key Pair
6,274,316 UART: [art] Store priv key in slot 0x5
6,287,412 UART: [art] Derive Key Pair - Done
6,302,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,317,708 UART: [art] Erasing AUTHORITY.KEYID = 7
6,318,473 UART: [art] PUB.X = 82DB7DB16071EC67482EF27AD9FE91BAE30F2E53DB32F864D767C3CEB3AA48EE31091AFB759B6C1A6CBF65F254392274
6,325,253 UART: [art] PUB.Y = F0DD1715C1799FA54306E7B5BA708CB0C03367A85DCD4CDA927321050533C1057BB196C8A4A969A25BBABD7E43BC5A8B
6,332,203 UART: [art] SIG.R = A8792EB7F2F8EC76C13B734A02FE31BF7ECBF33F129EB30F6711EB0AE538D2E4C5BD92394ED149A206B7BC6F44BA3072
6,338,979 UART: [art] SIG.S = 22DAD5876EF04E9661916880CE9101814DABFF8EE5939B900336F04F6DCAF093312255FD40F22534EEFE3EF2692A7305
6,362,840 UART: Caliptra RT
6,363,183 UART: [state] CFI Enabled
6,724,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,754,584 UART: [rt]cmd =0x53574545, len=84
6,780,638 >>> mbox cmd response data (200 bytes)
test test_sign_with_export_ecdsa::test_sign_with_exported_cdi_warm_reset_parent ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.40s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,889 writing to cptra_bootfsm_go
191,986 UART:
192,342 UART: Running Caliptra ROM ...
193,478 UART:
193,622 UART: [state] CFI Enabled
266,539 UART: [state] LifecycleState = Unprovisioned
268,537 UART: [state] DebugLocked = No
270,347 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,865 UART: [kat] SHA2-256
444,554 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,099 UART: [kat] ++
455,557 UART: [kat] sha1
466,791 UART: [kat] SHA2-256
469,446 UART: [kat] SHA2-384
474,794 UART: [kat] SHA2-512-ACC
477,162 UART: [kat] ECC-384
2,769,261 UART: [kat] HMAC-384Kdf
2,802,597 UART: [kat] LMS
3,992,934 UART: [kat] --
3,996,639 UART: [cold-reset] ++
3,997,931 UART: [fht] Storing FHT @ 0x50003400
4,009,986 UART: [idev] ++
4,010,556 UART: [idev] CDI.KEYID = 6
4,011,484 UART: [idev] SUBJECT.KEYID = 7
4,012,732 UART: [idev] UDS.KEYID = 0
4,013,816 ready_for_fw is high
4,014,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,153 UART: [idev] Erasing UDS.KEYID = 0
7,350,590 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,861 UART: [idev] --
7,376,342 UART: [ldev] ++
7,376,913 UART: [ldev] CDI.KEYID = 6
7,377,889 UART: [ldev] SUBJECT.KEYID = 5
7,379,098 UART: [ldev] AUTHORITY.KEYID = 7
7,380,495 UART: [ldev] FE.KEYID = 1
7,427,142 UART: [ldev] Erasing FE.KEYID = 1
10,760,849 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,075,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,089,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,104,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,119,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,138,376 UART: [ldev] --
13,142,676 UART: [fwproc] Waiting for Commands...
13,144,275 UART: [fwproc] Received command 0x46574c44
13,146,522 UART: [fwproc] Received Image of size 118548 bytes
17,250,644 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,653 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,397,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,725,973 >>> mbox cmd response: success
17,729,292 UART: [afmc] ++
17,729,910 UART: [afmc] CDI.KEYID = 6
17,730,843 UART: [afmc] SUBJECT.KEYID = 7
17,732,060 UART: [afmc] AUTHORITY.KEYID = 5
21,098,381 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,398,517 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,400,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,415,253 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,429,983 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,444,385 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,464,545 UART: [afmc] --
23,467,920 UART: [cold-reset] --
23,471,414 UART: [state] Locking Datavault
23,476,232 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,936 UART: [state] Locking ICCM
23,480,571 UART: [exit] Launching FMC @ 0x40000130
23,488,986 UART:
23,489,221 UART: Running Caliptra FMC ...
23,490,344 UART:
23,490,508 UART: [state] CFI Enabled
23,559,053 UART: [fht] FMC Alias Private Key: 7
25,900,108 UART: [art] Extend RT PCRs Done
25,901,329 UART: [art] Lock RT PCRs Done
25,902,903 UART: [art] Populate DV Done
25,908,308 UART: [fht] FMC Alias Private Key: 7
25,909,787 UART: [art] Derive CDI
25,910,547 UART: [art] Store in slot 0x4
25,968,024 UART: [art] Derive Key Pair
25,969,066 UART: [art] Store priv key in slot 0x5
29,262,284 UART: [art] Derive Key Pair - Done
29,275,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,276 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,782 UART: [art] PUB.X = 178247BC6AB7418BE02B934FBAF4C6A926ADE7A40F0EF1D825A6E5AB62FAB43AD00713F3A6C16960B6AF84BEE6F10027
31,572,027 UART: [art] PUB.Y = 6D7A80CECD0B6A7BFBEF8618B8AF39A6B17E24AD7EF64F19965B2C528D15E872F6E08A3C981ECF66452A5C81E2489450
31,579,336 UART: [art] SIG.R = 4CF12C090FF87CA94A769C82A10D38BC209D2B1FFD9253043CE61D26FC15204C1F68ECD2F4DF3AB8611E7831CDC4201B
31,586,721 UART: [art] SIG.S = 19CD51AC99245517A8B2BFB79EA3CB907234E18B954ECDCB7071F06A527A580E8659295AC26088D4C66B0940F0D4B8EA
32,891,641 UART: Caliptra RT
32,892,345 UART: [state] CFI Enabled
33,069,775 UART: [rt] RT listening for mailbox commands...
33,071,707 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,102,458 UART: [rt]cmd =0x44504543, len=96
38,882,119 >>> mbox cmd response data (6236 bytes)
38,911,551 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,942,163 UART: [rt]cmd =0x53574545, len=84
38,946,093 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,787,972 ready_for_fw is high
3,788,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,690 >>> mbox cmd response: success
23,673,039 UART:
23,673,432 UART: Running Caliptra FMC ...
23,674,555 UART:
23,674,709 UART: [state] CFI Enabled
23,741,965 UART: [fht] FMC Alias Private Key: 7
26,082,740 UART: [art] Extend RT PCRs Done
26,083,985 UART: [art] Lock RT PCRs Done
26,085,592 UART: [art] Populate DV Done
26,091,124 UART: [fht] FMC Alias Private Key: 7
26,092,775 UART: [art] Derive CDI
26,093,515 UART: [art] Store in slot 0x4
26,150,995 UART: [art] Derive Key Pair
26,152,043 UART: [art] Store priv key in slot 0x5
29,444,690 UART: [art] Derive Key Pair - Done
29,457,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,823 UART: [art] Erasing AUTHORITY.KEYID = 7
31,748,355 UART: [art] PUB.X = C0AC790AA1E6E897FC2127BFC713C1EA7F3127888D5E21ED288B85DA99BF7630B48A00B75CAB452C2EE2A1A58B0480F5
31,755,609 UART: [art] PUB.Y = 2BEB0A027B4B141E0ED5EBFC18698923804EA720443C322C8A333D3BF733656C8392D11F9215773B2D34FCCC5B089442
31,762,818 UART: [art] SIG.R = A708CF712F73BD7C3AAEF4CF6ACE7998B1F7666A70A0EF88AADFD1F5103B8989199266B9D4819DF3935BC9CE298EB52C
31,770,277 UART: [art] SIG.S = 3120A1E273A312BF8E0022ADECD508F0511DA0D208F7AD6F69B06E08AE66A63EEBFAD55E02CE2807B94A3954E2DC200B
33,075,759 UART: Caliptra RT
33,076,461 UART: [state] CFI Enabled
33,272,338 UART: [rt] RT listening for mailbox commands...
33,274,265 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,305,025 UART: [rt]cmd =0x44504543, len=96
39,084,334 >>> mbox cmd response data (6236 bytes)
39,113,741 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,144,175 UART: [rt]cmd =0x53574545, len=84
39,147,768 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
192,475 UART:
192,837 UART: Running Caliptra ROM ...
194,038 UART:
603,614 UART: [state] CFI Enabled
617,546 UART: [state] LifecycleState = Unprovisioned
619,530 UART: [state] DebugLocked = No
621,972 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,333 UART: [kat] SHA2-256
797,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,650 UART: [kat] ++
808,114 UART: [kat] sha1
818,983 UART: [kat] SHA2-256
821,698 UART: [kat] SHA2-384
828,671 UART: [kat] SHA2-512-ACC
831,027 UART: [kat] ECC-384
3,116,789 UART: [kat] HMAC-384Kdf
3,128,279 UART: [kat] LMS
4,318,376 UART: [kat] --
4,323,786 UART: [cold-reset] ++
4,324,854 UART: [fht] Storing FHT @ 0x50003400
4,337,893 UART: [idev] ++
4,338,451 UART: [idev] CDI.KEYID = 6
4,339,475 UART: [idev] SUBJECT.KEYID = 7
4,340,643 UART: [idev] UDS.KEYID = 0
4,341,708 ready_for_fw is high
4,341,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,862 UART: [idev] Erasing UDS.KEYID = 0
7,625,120 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,636 UART: [idev] --
7,652,444 UART: [ldev] ++
7,653,102 UART: [ldev] CDI.KEYID = 6
7,654,034 UART: [ldev] SUBJECT.KEYID = 5
7,655,189 UART: [ldev] AUTHORITY.KEYID = 7
7,656,471 UART: [ldev] FE.KEYID = 1
7,666,247 UART: [ldev] Erasing FE.KEYID = 1
10,952,581 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,380 UART: [ldev] --
13,310,510 UART: [fwproc] Waiting for Commands...
13,313,752 UART: [fwproc] Received command 0x46574c44
13,315,929 UART: [fwproc] Received Image of size 118548 bytes
17,418,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,714 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,893 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,559 >>> mbox cmd response: success
17,903,093 UART: [afmc] ++
17,903,677 UART: [afmc] CDI.KEYID = 6
17,904,614 UART: [afmc] SUBJECT.KEYID = 7
17,905,874 UART: [afmc] AUTHORITY.KEYID = 5
21,221,865 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,801 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,519,110 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,513 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,548,243 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,633 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,850 UART: [afmc] --
23,586,131 UART: [cold-reset] --
23,590,260 UART: [state] Locking Datavault
23,596,902 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,645 UART: [state] Locking ICCM
23,600,006 UART: [exit] Launching FMC @ 0x40000130
23,608,403 UART:
23,608,629 UART: Running Caliptra FMC ...
23,609,723 UART:
23,609,891 UART: [state] CFI Enabled
23,617,889 UART: [fht] FMC Alias Private Key: 7
25,958,362 UART: [art] Extend RT PCRs Done
25,959,582 UART: [art] Lock RT PCRs Done
25,961,287 UART: [art] Populate DV Done
25,966,643 UART: [fht] FMC Alias Private Key: 7
25,968,231 UART: [art] Derive CDI
25,968,982 UART: [art] Store in slot 0x4
26,011,684 UART: [art] Derive Key Pair
26,012,727 UART: [art] Store priv key in slot 0x5
29,254,632 UART: [art] Derive Key Pair - Done
29,267,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,154 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,659 UART: [art] PUB.X = B25EF4474883D9A5F681ED1D73B78476E9D8965565A2EF12218DF9F029011BB0DB30303550D830AA132ADEBD6EDAA367
31,556,896 UART: [art] PUB.Y = 2A2B589DD9EB20DA1B46F465529088CD8C20F68E62E26AEB43E5D0817980559ED146DAF590DBE381BBF1768E19AE919D
31,564,168 UART: [art] SIG.R = CA3C36EE4005BE316D082870B50E84CFB47A23B34501CA83568CD42F1BD75425570AC13524526703F625AF232943EEEA
31,571,549 UART: [art] SIG.S = 7DEF8D3952BCAAE674054FCBAF9F942ABF1B8A6C0D3B729C89BCBBD953A938BF7AB7C1FCFDB52B9C68F0F4CE1BB7EEBD
32,877,225 UART: Caliptra RT
32,877,942 UART: [state] CFI Enabled
33,011,981 UART: [rt] RT listening for mailbox commands...
33,013,912 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,044,510 UART: [rt]cmd =0x44504543, len=96
38,728,819 >>> mbox cmd response data (6236 bytes)
38,757,984 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,788,651 UART: [rt]cmd =0x53574545, len=84
38,792,813 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
4,126,878 ready_for_fw is high
4,127,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,170,753 >>> mbox cmd response: success
23,811,670 UART:
23,812,096 UART: Running Caliptra FMC ...
23,813,240 UART:
23,813,397 UART: [state] CFI Enabled
23,821,066 UART: [fht] FMC Alias Private Key: 7
26,161,292 UART: [art] Extend RT PCRs Done
26,162,520 UART: [art] Lock RT PCRs Done
26,164,056 UART: [art] Populate DV Done
26,169,543 UART: [fht] FMC Alias Private Key: 7
26,171,133 UART: [art] Derive CDI
26,171,944 UART: [art] Store in slot 0x4
26,214,435 UART: [art] Derive Key Pair
26,215,477 UART: [art] Store priv key in slot 0x5
29,457,974 UART: [art] Derive Key Pair - Done
29,471,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,186 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,699 UART: [art] PUB.X = 6E110BD26F7C2AB7B0AC7C1DB9402C1DBB6E34EF1B6DC42D2F6A07254E2479C85BF1BA6354C30D807481E7E9AB26AD83
31,759,954 UART: [art] PUB.Y = D58A548E50FAC8DF12208B9011E1136D688E840B20735A3755DDB653C62ED162A7E04C8FF874E09B98BD06C4152062C7
31,767,204 UART: [art] SIG.R = A8472B7D821B32E71B2E041A46E2EA3BA087E2A746A22B23B59F315D59DC9964C729C3FFF13DB865132812027875482A
31,774,607 UART: [art] SIG.S = F5037EA5CB4E62D32F45B6DACC8B2735363A6EAA687C699C1D164AB758DD041DAA168AFC027145C10EB3F8913B4DE077
33,079,691 UART: Caliptra RT
33,080,411 UART: [state] CFI Enabled
33,213,826 UART: [rt] RT listening for mailbox commands...
33,215,745 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,246,587 UART: [rt]cmd =0x44504543, len=96
38,931,157 >>> mbox cmd response data (6236 bytes)
38,960,581 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,991,071 UART: [rt]cmd =0x53574545, len=84
38,995,218 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,485 UART:
192,848 UART: Running Caliptra ROM ...
193,983 UART:
194,126 UART: [state] CFI Enabled
263,961 UART: [state] LifecycleState = Unprovisioned
265,867 UART: [state] DebugLocked = No
267,611 UART: [state] WD Timer not started. Device not locked for debugging
271,157 UART: [kat] SHA2-256
450,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,577 UART: [kat] ++
462,111 UART: [kat] sha1
471,851 UART: [kat] SHA2-256
474,562 UART: [kat] SHA2-384
480,400 UART: [kat] SHA2-512-ACC
482,707 UART: [kat] ECC-384
2,926,393 UART: [kat] HMAC-384Kdf
2,949,946 UART: [kat] LMS
3,426,504 UART: [kat] --
3,428,575 UART: [cold-reset] ++
3,429,727 UART: [fht] FHT @ 0x50003400
3,441,826 UART: [idev] ++
3,442,379 UART: [idev] CDI.KEYID = 6
3,443,328 UART: [idev] SUBJECT.KEYID = 7
3,444,560 UART: [idev] UDS.KEYID = 0
3,445,526 ready_for_fw is high
3,445,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,595,153 UART: [idev] Erasing UDS.KEYID = 0
5,965,221 UART: [idev] Sha1 KeyId Algorithm
5,989,516 UART: [idev] --
5,993,536 UART: [ldev] ++
5,994,132 UART: [ldev] CDI.KEYID = 6
5,995,038 UART: [ldev] SUBJECT.KEYID = 5
5,996,197 UART: [ldev] AUTHORITY.KEYID = 7
5,997,479 UART: [ldev] FE.KEYID = 1
6,034,371 UART: [ldev] Erasing FE.KEYID = 1
8,541,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,811 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,345,635 UART: [ldev] --
10,350,679 UART: [fwproc] Wait for Commands...
10,352,884 UART: [fwproc] Recv command 0x46574c44
10,354,916 UART: [fwproc] Recv'd Img size: 118548 bytes
13,838,994 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,924,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,997,153 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,325,552 >>> mbox cmd response: success
14,329,251 UART: [afmc] ++
14,329,865 UART: [afmc] CDI.KEYID = 6
14,330,930 UART: [afmc] SUBJECT.KEYID = 7
14,332,035 UART: [afmc] AUTHORITY.KEYID = 5
16,872,320 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,576 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,809 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,593 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,636 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,180 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,804 UART: [afmc] --
18,695,711 UART: [cold-reset] --
18,699,715 UART: [state] Locking Datavault
18,704,805 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,574 UART: [state] Locking ICCM
18,708,559 UART: [exit] Launching FMC @ 0x40000130
18,716,955 UART:
18,717,186 UART: Running Caliptra FMC ...
18,718,296 UART:
18,718,456 UART: [state] CFI Enabled
18,773,032 UART: [fht] FMC Alias Private Key: 7
20,540,309 UART: [art] Extend RT PCRs Done
20,541,520 UART: [art] Lock RT PCRs Done
20,543,002 UART: [art] Populate DV Done
20,548,577 UART: [fht] FMC Alias Private Key: 7
20,550,049 UART: [art] Derive CDI
20,550,781 UART: [art] Store in slot 0x4
20,607,436 UART: [art] Derive Key Pair
20,608,433 UART: [art] Store priv key in slot 0x5
23,071,362 UART: [art] Derive Key Pair - Done
23,084,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,650 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,157 UART: [art] PUB.X = 9BF3B90AC39E39719A18F084DDE3E6DF94FB97DA3CAE10FC7482EA2D0F2CEF9A7E97AFC1B59C3467947F4D0C04E78321
24,805,405 UART: [art] PUB.Y = F51FC0AB057180C21852C2860FF95608477FD451973E738F0C3D81F37A389528900F16C34A33F37D1E16D212EA617260
24,812,631 UART: [art] SIG.R = B15DB05FE9ECB77A228331A88BE10EBBE3BDC2C665FCAAF71B79CF0FC97B51DE2134A0B0AC98CE65077DCA788DF7F1E6
24,820,070 UART: [art] SIG.S = 54296657E042CDEDBADCA056EE7422EA032E3521317E4E3D16825ABA7FBFBE82128CA9857BA3A95B7AB3811305B6D8AD
25,798,955 UART: Caliptra RT
25,799,653 UART: [state] CFI Enabled
25,980,441 UART: [rt] RT listening for mailbox commands...
25,982,348 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,013,161 UART: [rt]cmd =0x44504543, len=96
30,387,510 >>> mbox cmd response data (6236 bytes)
30,416,808 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,447,514 UART: [rt]cmd =0x53574545, len=84
30,451,277 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,961 writing to cptra_bootfsm_go
3,461,871 ready_for_fw is high
3,462,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,943 >>> mbox cmd response: success
18,536,374 UART:
18,536,772 UART: Running Caliptra FMC ...
18,537,979 UART:
18,538,151 UART: [state] CFI Enabled
18,606,927 UART: [fht] FMC Alias Private Key: 7
20,374,021 UART: [art] Extend RT PCRs Done
20,375,268 UART: [art] Lock RT PCRs Done
20,376,956 UART: [art] Populate DV Done
20,381,951 UART: [fht] FMC Alias Private Key: 7
20,383,490 UART: [art] Derive CDI
20,384,305 UART: [art] Store in slot 0x4
20,440,293 UART: [art] Derive Key Pair
20,441,326 UART: [art] Store priv key in slot 0x5
22,903,417 UART: [art] Derive Key Pair - Done
22,916,212 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,629,974 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,501 UART: [art] PUB.X = A36DEFCA8866D29CBDB0BF54E93CA43228658ADF39456FD57AD90B0D1DEB764C4AA32E1D529C8B92DDB3436346829CEA
24,638,763 UART: [art] PUB.Y = 1E5BE2217E98DCA8CB6495D19AC7EE8C401C06397BB341E1F11EA4A160218A5FDF998ED55E88B15483C6841712DE06B4
24,646,059 UART: [art] SIG.R = 3A2A94EBED4873FC32DA4A2C45A7275CF930FD8C2AC3C44AFD737FBA4D11005D28788D9DCFC534B063FD422F7F403C79
24,653,481 UART: [art] SIG.S = 17D4E6E67832EF81A55F4FE189FC13667D53F555A5A251B9550388F3F12DF35249AF34FF21EC16A5851C1231BBB4A30E
25,631,841 UART: Caliptra RT
25,632,560 UART: [state] CFI Enabled
25,813,549 UART: [rt] RT listening for mailbox commands...
25,815,463 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,845,852 UART: [rt]cmd =0x44504543, len=96
30,221,162 >>> mbox cmd response data (6236 bytes)
30,250,583 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,280,923 UART: [rt]cmd =0x53574545, len=84
30,284,562 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
192,383 UART:
192,744 UART: Running Caliptra ROM ...
193,935 UART:
603,465 UART: [state] CFI Enabled
615,571 UART: [state] LifecycleState = Unprovisioned
617,472 UART: [state] DebugLocked = No
619,292 UART: [state] WD Timer not started. Device not locked for debugging
623,260 UART: [kat] SHA2-256
802,937 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,757 UART: [kat] ++
814,294 UART: [kat] sha1
824,750 UART: [kat] SHA2-256
827,398 UART: [kat] SHA2-384
833,394 UART: [kat] SHA2-512-ACC
835,767 UART: [kat] ECC-384
3,275,930 UART: [kat] HMAC-384Kdf
3,288,790 UART: [kat] LMS
3,765,297 UART: [kat] --
3,769,735 UART: [cold-reset] ++
3,771,742 UART: [fht] FHT @ 0x50003400
3,783,643 UART: [idev] ++
3,784,283 UART: [idev] CDI.KEYID = 6
3,785,194 UART: [idev] SUBJECT.KEYID = 7
3,786,440 UART: [idev] UDS.KEYID = 0
3,787,372 ready_for_fw is high
3,787,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,936,449 UART: [idev] Erasing UDS.KEYID = 0
6,258,681 UART: [idev] Sha1 KeyId Algorithm
6,282,587 UART: [idev] --
6,287,942 UART: [ldev] ++
6,288,710 UART: [ldev] CDI.KEYID = 6
6,289,638 UART: [ldev] SUBJECT.KEYID = 5
6,290,745 UART: [ldev] AUTHORITY.KEYID = 7
6,291,871 UART: [ldev] FE.KEYID = 1
6,303,375 UART: [ldev] Erasing FE.KEYID = 1
8,782,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,573 UART: [ldev] --
10,578,263 UART: [fwproc] Wait for Commands...
10,580,961 UART: [fwproc] Recv command 0x46574c44
10,583,004 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,489 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,549,487 >>> mbox cmd response: success
14,554,186 UART: [afmc] ++
14,554,794 UART: [afmc] CDI.KEYID = 6
14,555,710 UART: [afmc] SUBJECT.KEYID = 7
14,556,934 UART: [afmc] AUTHORITY.KEYID = 5
17,062,536 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,995 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,176 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,088 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,646 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,711 UART: [afmc] --
18,863,994 UART: [cold-reset] --
18,868,034 UART: [state] Locking Datavault
18,873,181 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,879 UART: [state] Locking ICCM
18,877,519 UART: [exit] Launching FMC @ 0x40000130
18,885,918 UART:
18,886,235 UART: Running Caliptra FMC ...
18,887,296 UART:
18,887,459 UART: [state] CFI Enabled
18,895,668 UART: [fht] FMC Alias Private Key: 7
20,661,875 UART: [art] Extend RT PCRs Done
20,663,089 UART: [art] Lock RT PCRs Done
20,664,563 UART: [art] Populate DV Done
20,669,922 UART: [fht] FMC Alias Private Key: 7
20,671,544 UART: [art] Derive CDI
20,672,366 UART: [art] Store in slot 0x4
20,714,753 UART: [art] Derive Key Pair
20,715,790 UART: [art] Store priv key in slot 0x5
23,142,934 UART: [art] Derive Key Pair - Done
23,155,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,245 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,749 UART: [art] PUB.X = 0E079B4DD9E5F31CFF9605F304A733C2772E06D0595C71B0A9AD5A50F2C363E4E8B9551C3E1BA9C5A6EB5C7BF09AB044
24,871,052 UART: [art] PUB.Y = F1E4A923051ECDBBA3FD7DC32A1C8B116D4C6E9B9D5316CCE7DEF52A208A32DCBD5FDC2B9FA7D68373F2F8B9D626C3A1
24,878,337 UART: [art] SIG.R = 9763F659BE8B7E7971FEBBEEAC4CFD3613C463CBE34780799788800F38E67F3CB4DFF1CD42B8ABBB41CFFF18AFD907FD
24,885,736 UART: [art] SIG.S = 922BB6B24600C2E26D4EB1952761651BDA77B9B490402B7D1DCA66A730FECB91A1B016B9EF7F787803BE7B9422AAA840
25,864,973 UART: Caliptra RT
25,865,672 UART: [state] CFI Enabled
25,998,087 UART: [rt] RT listening for mailbox commands...
26,000,002 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,030,550 UART: [rt]cmd =0x44504543, len=96
30,326,181 >>> mbox cmd response data (6236 bytes)
30,355,552 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,386,165 UART: [rt]cmd =0x53574545, len=84
30,389,959 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,778,506 ready_for_fw is high
3,778,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,596 >>> mbox cmd response: success
18,697,135 UART:
18,697,536 UART: Running Caliptra FMC ...
18,698,642 UART:
18,698,796 UART: [state] CFI Enabled
18,707,168 UART: [fht] FMC Alias Private Key: 7
20,473,876 UART: [art] Extend RT PCRs Done
20,475,088 UART: [art] Lock RT PCRs Done
20,476,964 UART: [art] Populate DV Done
20,482,228 UART: [fht] FMC Alias Private Key: 7
20,483,774 UART: [art] Derive CDI
20,484,592 UART: [art] Store in slot 0x4
20,527,406 UART: [art] Derive Key Pair
20,528,629 UART: [art] Store priv key in slot 0x5
22,954,385 UART: [art] Derive Key Pair - Done
22,967,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,673,653 UART: [art] Erasing AUTHORITY.KEYID = 7
24,675,134 UART: [art] PUB.X = D92F4DBDAF24FFD606AAC688B4A368F7D7DD0C0131B0B909932CD6BF4AB4DBA9C48B4B023BD9DA96CD5AF579DF456DD2
24,682,497 UART: [art] PUB.Y = 3B08E6E35B5C38A2E12B40F1775490C23C2EB6DAD244A7CC696ADE7EF4BDC4968023906CF854615A156FAC1910BC3085
24,689,724 UART: [art] SIG.R = 0F62BC9481916A879339EA7086144E1035F256706FCB56F629AD2139D283D86324574D84AE6DE46C03C0A16B25739C1B
24,697,134 UART: [art] SIG.S = 46B609361BA5B9624BD597019DFD38C813551C5EED546FD880B6F91F09A18E49243DDF14E9CD7E8EFE1974743D71D8FF
25,675,644 UART: Caliptra RT
25,676,355 UART: [state] CFI Enabled
25,809,205 UART: [rt] RT listening for mailbox commands...
25,811,136 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,841,896 UART: [rt]cmd =0x44504543, len=96
30,137,431 >>> mbox cmd response data (6236 bytes)
30,166,805 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,197,422 UART: [rt]cmd =0x53574545, len=84
30,201,696 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,145 UART:
192,658 UART: Running Caliptra ROM ...
193,786 UART:
193,928 UART: [state] CFI Enabled
266,830 UART: [state] LifecycleState = Unprovisioned
269,234 UART: [state] DebugLocked = No
271,198 UART: [state] WD Timer not started. Device not locked for debugging
275,139 UART: [kat] SHA2-256
465,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,786 UART: [kat] ++
476,263 UART: [kat] sha1
488,129 UART: [kat] SHA2-256
491,138 UART: [kat] SHA2-384
497,062 UART: [kat] SHA2-512-ACC
499,653 UART: [kat] ECC-384
2,948,499 UART: [kat] HMAC-384Kdf
2,972,002 UART: [kat] LMS
3,503,776 UART: [kat] --
3,507,353 UART: [cold-reset] ++
3,508,999 UART: [fht] FHT @ 0x50003400
3,521,887 UART: [idev] ++
3,522,602 UART: [idev] CDI.KEYID = 6
3,523,511 UART: [idev] SUBJECT.KEYID = 7
3,524,748 UART: [idev] UDS.KEYID = 0
3,525,671 ready_for_fw is high
3,525,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,961 UART: [idev] Erasing UDS.KEYID = 0
6,032,351 UART: [idev] Sha1 KeyId Algorithm
6,054,989 UART: [idev] --
6,060,441 UART: [ldev] ++
6,061,125 UART: [ldev] CDI.KEYID = 6
6,062,063 UART: [ldev] SUBJECT.KEYID = 5
6,063,243 UART: [ldev] AUTHORITY.KEYID = 7
6,064,479 UART: [ldev] FE.KEYID = 1
6,101,565 UART: [ldev] Erasing FE.KEYID = 1
8,608,272 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,043 UART: [ldev] --
10,413,884 UART: [fwproc] Wait for Commands...
10,416,340 UART: [fwproc] Recv command 0x46574c44
10,418,657 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,909 >>> mbox cmd response: success
14,686,441 UART: [afmc] ++
14,687,166 UART: [afmc] CDI.KEYID = 6
14,688,274 UART: [afmc] SUBJECT.KEYID = 7
14,689,820 UART: [afmc] AUTHORITY.KEYID = 5
17,217,404 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,704 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,711 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,969,847 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,791 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,179 UART: [afmc] --
19,012,261 UART: [cold-reset] --
19,015,531 UART: [state] Locking Datavault
19,021,378 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,522 UART: [state] Locking ICCM
19,026,461 UART: [exit] Launching FMC @ 0x40000130
19,035,155 UART:
19,035,390 UART: Running Caliptra FMC ...
19,036,490 UART:
19,036,649 UART: [state] CFI Enabled
19,096,318 UART: [fht] FMC Alias Private Key: 7
20,863,073 UART: [art] Extend RT PCRs Done
20,864,300 UART: [art] Lock RT PCRs Done
20,865,731 UART: [art] Populate DV Done
20,871,196 UART: [fht] FMC Alias Private Key: 7
20,872,781 UART: [art] Derive CDI
20,873,514 UART: [art] Store in slot 0x4
20,929,087 UART: [art] Derive Key Pair
20,930,130 UART: [art] Store priv key in slot 0x5
23,392,653 UART: [art] Derive Key Pair - Done
23,405,324 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,928 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,459 UART: [art] PUB.X = EB6D2397B3246157FDC2BA4512F99BD41ABCD92E29AA11EF116E9F327A02E99343309B2749E80D395D8308AB06285410
25,126,728 UART: [art] PUB.Y = CB720395B3A37DF39592C115A6B777CCF8344D5413177FB0EE13D2A06D8ADEA8CFCF9EF6CD44AD4498765C4D130C5F96
25,133,953 UART: [art] SIG.R = C3DAE95DADF304FD1FB6545068D6906C8F2EAA9B6CA017B8C5A6E1646F2D1730628DD061B3B794A266FB0D5E8385FCD8
25,141,371 UART: [art] SIG.S = D6AB0DA20282E5210FBA4E6E4D535E4DAC5F3D3A3C15004773D3E00F07E42D13AED927047495EC264979CB7DAD211A14
26,120,409 UART: Caliptra RT
26,121,117 UART: [state] CFI Enabled
26,300,430 UART: [rt] RT listening for mailbox commands...
26,302,352 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,333,194 UART: [rt]cmd =0x44504543, len=96
30,708,561 >>> mbox cmd response data (6236 bytes)
30,738,013 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,768,633 UART: [rt]cmd =0x53574545, len=84
30,772,620 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,438,895 ready_for_fw is high
3,439,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,260 >>> mbox cmd response: success
19,111,441 UART:
19,111,822 UART: Running Caliptra FMC ...
19,112,926 UART:
19,113,077 UART: [state] CFI Enabled
19,179,904 UART: [fht] FMC Alias Private Key: 7
20,967,785 UART: [art] Extend RT PCRs Done
20,969,018 UART: [art] Lock RT PCRs Done
20,970,870 UART: [art] Populate DV Done
20,976,176 UART: [fht] FMC Alias Private Key: 7
20,977,669 UART: [art] Derive CDI
20,978,431 UART: [art] Store in slot 0x4
21,034,638 UART: [art] Derive Key Pair
21,035,691 UART: [art] Store priv key in slot 0x5
23,497,774 UART: [art] Derive Key Pair - Done
23,510,781 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,669 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,332 UART: [art] PUB.X = 8D68ABF27EE4FE46FC22E2BBC2ED4B7765FA4C3F7C5A7E4102F8E51C3006AD40763215C9FFA7FB388EBE19127C89243A
25,233,480 UART: [art] PUB.Y = EE1C569E26F199BB2CEB1B84C5F610306FC39C8F6020879244AD2D4F62FA7D6365633C435E56B90A54B1C20741DD6314
25,240,710 UART: [art] SIG.R = 7D3C8B738CCA5611908DA0ACA05C02CD5F83887E973872001D1B0D0F82953A481675D915E77EE07ED6FF9250D5C1B790
25,248,094 UART: [art] SIG.S = 5046516D45B65CB72F74471D2B18087C79384908727A101F1E121B211FB78D0EBE7C733113C31761F054865FD9C784F4
26,227,242 UART: Caliptra RT
26,227,950 UART: [state] CFI Enabled
26,408,588 UART: [rt] RT listening for mailbox commands...
26,410,521 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,441,069 UART: [rt]cmd =0x44504543, len=96
30,816,379 >>> mbox cmd response data (6236 bytes)
30,846,098 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,876,620 UART: [rt]cmd =0x53574545, len=84
30,880,555 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
192,450 UART:
192,830 UART: Running Caliptra ROM ...
193,927 UART:
603,562 UART: [state] CFI Enabled
616,245 UART: [state] LifecycleState = Unprovisioned
618,649 UART: [state] DebugLocked = No
621,397 UART: [state] WD Timer not started. Device not locked for debugging
626,518 UART: [kat] SHA2-256
816,353 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,166 UART: [kat] ++
827,775 UART: [kat] sha1
839,014 UART: [kat] SHA2-256
842,035 UART: [kat] SHA2-384
848,039 UART: [kat] SHA2-512-ACC
850,628 UART: [kat] ECC-384
3,293,570 UART: [kat] HMAC-384Kdf
3,306,491 UART: [kat] LMS
3,838,341 UART: [kat] --
3,842,646 UART: [cold-reset] ++
3,843,523 UART: [fht] FHT @ 0x50003400
3,855,213 UART: [idev] ++
3,855,942 UART: [idev] CDI.KEYID = 6
3,856,864 UART: [idev] SUBJECT.KEYID = 7
3,858,117 UART: [idev] UDS.KEYID = 0
3,859,063 ready_for_fw is high
3,859,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,332 UART: [idev] Erasing UDS.KEYID = 0
6,335,194 UART: [idev] Sha1 KeyId Algorithm
6,358,521 UART: [idev] --
6,363,576 UART: [ldev] ++
6,364,324 UART: [ldev] CDI.KEYID = 6
6,365,212 UART: [ldev] SUBJECT.KEYID = 5
6,366,314 UART: [ldev] AUTHORITY.KEYID = 7
6,367,597 UART: [ldev] FE.KEYID = 1
6,379,088 UART: [ldev] Erasing FE.KEYID = 1
8,856,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,949 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,583 UART: [ldev] --
10,649,224 UART: [fwproc] Wait for Commands...
10,651,426 UART: [fwproc] Recv command 0x46574c44
10,653,681 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,230,612 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,354,213 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,212 >>> mbox cmd response: success
14,917,809 UART: [afmc] ++
14,918,534 UART: [afmc] CDI.KEYID = 6
14,919,653 UART: [afmc] SUBJECT.KEYID = 7
14,921,209 UART: [afmc] AUTHORITY.KEYID = 5
17,424,904 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,430 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,640 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,566 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,132 UART: [afmc] --
19,221,629 UART: [cold-reset] --
19,224,908 UART: [state] Locking Datavault
19,231,623 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,793 UART: [state] Locking ICCM
19,235,526 UART: [exit] Launching FMC @ 0x40000130
19,244,226 UART:
19,244,465 UART: Running Caliptra FMC ...
19,245,528 UART:
19,245,685 UART: [state] CFI Enabled
19,253,499 UART: [fht] FMC Alias Private Key: 7
21,019,669 UART: [art] Extend RT PCRs Done
21,020,903 UART: [art] Lock RT PCRs Done
21,022,836 UART: [art] Populate DV Done
21,028,146 UART: [fht] FMC Alias Private Key: 7
21,029,691 UART: [art] Derive CDI
21,030,461 UART: [art] Store in slot 0x4
21,073,380 UART: [art] Derive Key Pair
21,074,426 UART: [art] Store priv key in slot 0x5
23,502,394 UART: [art] Derive Key Pair - Done
23,515,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,071 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,586 UART: [art] PUB.X = 8162B9FEF0CE002469A626A98C4378E9E4DF4676FF3D685F9CDC9881C1590C72BDBB1018F71A8ABBC8DC9BF3BBD60401
25,229,867 UART: [art] PUB.Y = 61F4CF4D253B488ADAD316A48BB469EB6F9C2C5993BEE17B1E62C51D38E3FA69D01712D6856E1EB253DA6CD6508536C5
25,237,088 UART: [art] SIG.R = E7A79C0C1810B59CF727C0D75FCEE19E02BDF2031885F2DBC9B7EF6C33409ADB8062AFDAAA885B3BABE2F80CDE62DC45
25,244,513 UART: [art] SIG.S = E82A9F01C2B41A39CCDAD4FC64629C864D3819985EF5441FBE88D30280F87E53277CFC5942F6BBCB362F15C0684159A1
26,223,254 UART: Caliptra RT
26,224,497 UART: [state] CFI Enabled
26,356,566 UART: [rt] RT listening for mailbox commands...
26,358,528 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,197 UART: [rt]cmd =0x44504543, len=96
30,684,358 >>> mbox cmd response data (6236 bytes)
30,714,227 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,744,606 UART: [rt]cmd =0x53574545, len=84
30,748,584 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,749,525 ready_for_fw is high
3,750,133 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,041,693 >>> mbox cmd response: success
19,294,532 UART:
19,294,905 UART: Running Caliptra FMC ...
19,296,111 UART:
19,296,283 UART: [state] CFI Enabled
19,304,287 UART: [fht] FMC Alias Private Key: 7
21,070,444 UART: [art] Extend RT PCRs Done
21,071,667 UART: [art] Lock RT PCRs Done
21,073,299 UART: [art] Populate DV Done
21,078,619 UART: [fht] FMC Alias Private Key: 7
21,080,110 UART: [art] Derive CDI
21,080,857 UART: [art] Store in slot 0x4
21,123,772 UART: [art] Derive Key Pair
21,124,805 UART: [art] Store priv key in slot 0x5
23,551,746 UART: [art] Derive Key Pair - Done
23,564,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,270,834 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,345 UART: [art] PUB.X = C7E0BAA0C4430DB4F6C37A807FF8AF793919BDE7DDF32CDEC5358E8AEAB2F4C470F3577050ACB437E40A55FD84DC065E
25,279,668 UART: [art] PUB.Y = 627B8FC5C0A70FE7979E942B012B9B0DFC3C0784FE4F29129ED20FCF8551FFD2C23FC05E20110EFF6117B5406DA307BE
25,286,905 UART: [art] SIG.R = 59CA854C8B4E30906DB19EECBD88B9F482E2E182A070FFF2C64A16F95A9F8A8C4267AB875A9D0BB54533DB56C7E28E0C
25,294,326 UART: [art] SIG.S = 4D79283B6D77D79E2F4A608E9A1BF8EE06A2D6806049D2B9D7B0C1C2973279B12A3FC0F068D104593F59D29DB7C9CAB4
26,273,767 UART: Caliptra RT
26,274,464 UART: [state] CFI Enabled
26,407,254 UART: [rt] RT listening for mailbox commands...
26,409,177 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,439,782 UART: [rt]cmd =0x44504543, len=96
30,734,387 >>> mbox cmd response data (6236 bytes)
30,763,627 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,794,193 UART: [rt]cmd =0x53574545, len=84
30,798,105 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,712 UART: [state] LifecycleState = Unprovisioned
86,367 UART: [state] DebugLocked = No
87,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,599 UART: [kat] SHA2-256
882,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,645 UART: [kat] ++
886,797 UART: [kat] sha1
890,945 UART: [kat] SHA2-256
892,883 UART: [kat] SHA2-384
895,640 UART: [kat] SHA2-512-ACC
897,541 UART: [kat] ECC-384
902,810 UART: [kat] HMAC-384Kdf
907,352 UART: [kat] LMS
1,475,548 UART: [kat] --
1,476,207 UART: [cold-reset] ++
1,476,645 UART: [fht] Storing FHT @ 0x50003400
1,479,352 UART: [idev] ++
1,479,520 UART: [idev] CDI.KEYID = 6
1,479,880 UART: [idev] SUBJECT.KEYID = 7
1,480,304 UART: [idev] UDS.KEYID = 0
1,480,649 ready_for_fw is high
1,480,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,114 UART: [idev] Erasing UDS.KEYID = 0
1,504,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,295 UART: [ldev] ++
1,514,463 UART: [ldev] CDI.KEYID = 6
1,514,826 UART: [ldev] SUBJECT.KEYID = 5
1,515,252 UART: [ldev] AUTHORITY.KEYID = 7
1,515,715 UART: [ldev] FE.KEYID = 1
1,521,065 UART: [ldev] Erasing FE.KEYID = 1
1,545,982 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,056 UART: [ldev] --
1,585,549 UART: [fwproc] Waiting for Commands...
1,586,178 UART: [fwproc] Received command 0x46574c44
1,586,969 UART: [fwproc] Received Image of size 118548 bytes
2,931,439 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,183 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,401 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,684 >>> mbox cmd response: success
3,130,922 UART: [afmc] ++
3,131,090 UART: [afmc] CDI.KEYID = 6
3,131,452 UART: [afmc] SUBJECT.KEYID = 7
3,131,877 UART: [afmc] AUTHORITY.KEYID = 5
3,166,916 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,160 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,940 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,649 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,532 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,215 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,097 UART: [afmc] --
3,209,991 UART: [cold-reset] --
3,210,943 UART: [state] Locking Datavault
3,212,168 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,772 UART: [state] Locking ICCM
3,213,348 UART: [exit] Launching FMC @ 0x40000130
3,218,678 UART:
3,218,694 UART: Running Caliptra FMC ...
3,219,102 UART:
3,219,156 UART: [state] CFI Enabled
3,230,040 UART: [fht] FMC Alias Private Key: 7
3,349,182 UART: [art] Extend RT PCRs Done
3,349,610 UART: [art] Lock RT PCRs Done
3,351,208 UART: [art] Populate DV Done
3,359,441 UART: [fht] FMC Alias Private Key: 7
3,360,559 UART: [art] Derive CDI
3,360,839 UART: [art] Store in slot 0x4
3,446,545 UART: [art] Derive Key Pair
3,446,905 UART: [art] Store priv key in slot 0x5
3,459,738 UART: [art] Derive Key Pair - Done
3,474,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,190 UART: [art] PUB.X = 228189D9EB792EA4FE923DD050F4AF48E737173C9AD1320B3DDB3B6DC6AB198E9E02B072ACA1C3582A0A1CD76297C099
3,497,963 UART: [art] PUB.Y = 570FF6940882EF2106AB5AF2AA263D9A2CB7DF50F1D7606C084F1CFECFE005F9C142F16347C49C276B1EA1344963F3D7
3,504,908 UART: [art] SIG.R = 7C7BED9E42EA4B0F734042C4FFB3474669489756807FDE081EACB2113F70836D2498CE754007D681690E673BBC3BD8FD
3,511,670 UART: [art] SIG.S = 68AA663066B08876F83BEA7BB2EDDABE608493DAB9C16E4AB560D9CD91B7D5E3B76D7A5880FEED64D9E3CEB357589DA2
3,535,134 UART: Caliptra RT
3,535,385 UART: [state] CFI Enabled
3,655,620 UART: [rt] RT listening for mailbox commands...
3,656,290 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,554 UART: [rt]cmd =0x44504543, len=96
3,879,150 >>> mbox cmd response data (6236 bytes)
3,879,151 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,909,084 UART: [rt]cmd =0x53574545, len=84
3,912,552 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,777 ready_for_fw is high
1,362,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,016 >>> mbox cmd response: success
3,043,435 UART:
3,043,451 UART: Running Caliptra FMC ...
3,043,859 UART:
3,043,913 UART: [state] CFI Enabled
3,054,475 UART: [fht] FMC Alias Private Key: 7
3,173,251 UART: [art] Extend RT PCRs Done
3,173,679 UART: [art] Lock RT PCRs Done
3,174,781 UART: [art] Populate DV Done
3,182,848 UART: [fht] FMC Alias Private Key: 7
3,183,978 UART: [art] Derive CDI
3,184,258 UART: [art] Store in slot 0x4
3,270,158 UART: [art] Derive Key Pair
3,270,518 UART: [art] Store priv key in slot 0x5
3,283,825 UART: [art] Derive Key Pair - Done
3,298,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,135 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,900 UART: [art] PUB.X = F0558D1458C7DF4ED2C272EC3BD52DAC8287C0639C0C1A47CBF06DF4BF760701ADEBABA4695EE460B6497682C41D4626
3,321,675 UART: [art] PUB.Y = F595B478352426D1FEC3B78F56E442CD93FA55A194E25D413491BB41F625982BFDA18B9E3CD8A870D776D57381BA37E8
3,328,629 UART: [art] SIG.R = 5382E04CBBC4EBC763DB215A74F6B82A1878FDF40DDB08F58E64E86EFD2201FCE182011D553F704A5761759509712D6E
3,335,390 UART: [art] SIG.S = 72CC72D672F71CFA3BB6C8295DB71F447986E24966E175749C5C401A0E8012D0F43B2042995A444FD74356C60CE1DFFD
3,359,146 UART: Caliptra RT
3,359,397 UART: [state] CFI Enabled
3,479,540 UART: [rt] RT listening for mailbox commands...
3,480,210 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,538 UART: [rt]cmd =0x44504543, len=96
3,701,932 >>> mbox cmd response data (6236 bytes)
3,701,933 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,802 UART: [rt]cmd =0x53574545, len=84
3,735,276 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,422 UART: [kat] SHA2-256
882,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,468 UART: [kat] ++
886,620 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,189 UART: [kat] SHA2-512-ACC
897,090 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,275 UART: [kat] LMS
1,475,471 UART: [kat] --
1,476,368 UART: [cold-reset] ++
1,476,870 UART: [fht] Storing FHT @ 0x50003400
1,479,517 UART: [idev] ++
1,479,685 UART: [idev] CDI.KEYID = 6
1,480,045 UART: [idev] SUBJECT.KEYID = 7
1,480,469 UART: [idev] UDS.KEYID = 0
1,480,814 ready_for_fw is high
1,480,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,667 UART: [idev] Erasing UDS.KEYID = 0
1,505,639 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,224 UART: [ldev] ++
1,515,392 UART: [ldev] CDI.KEYID = 6
1,515,755 UART: [ldev] SUBJECT.KEYID = 5
1,516,181 UART: [ldev] AUTHORITY.KEYID = 7
1,516,644 UART: [ldev] FE.KEYID = 1
1,521,750 UART: [ldev] Erasing FE.KEYID = 1
1,546,739 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,718 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,434 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,047 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,321 UART: [fwproc] Received command 0x46574c44
1,588,112 UART: [fwproc] Received Image of size 118548 bytes
2,931,504 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,320 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,538 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,947 >>> mbox cmd response: success
3,132,135 UART: [afmc] ++
3,132,303 UART: [afmc] CDI.KEYID = 6
3,132,665 UART: [afmc] SUBJECT.KEYID = 7
3,133,090 UART: [afmc] AUTHORITY.KEYID = 5
3,168,115 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,303 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,083 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,792 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,675 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,358 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,154 UART: [afmc] --
3,211,088 UART: [cold-reset] --
3,211,882 UART: [state] Locking Datavault
3,213,023 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,627 UART: [state] Locking ICCM
3,214,133 UART: [exit] Launching FMC @ 0x40000130
3,219,463 UART:
3,219,479 UART: Running Caliptra FMC ...
3,219,887 UART:
3,220,030 UART: [state] CFI Enabled
3,230,538 UART: [fht] FMC Alias Private Key: 7
3,350,386 UART: [art] Extend RT PCRs Done
3,350,814 UART: [art] Lock RT PCRs Done
3,352,264 UART: [art] Populate DV Done
3,360,549 UART: [fht] FMC Alias Private Key: 7
3,361,619 UART: [art] Derive CDI
3,361,899 UART: [art] Store in slot 0x4
3,447,865 UART: [art] Derive Key Pair
3,448,225 UART: [art] Store priv key in slot 0x5
3,461,292 UART: [art] Derive Key Pair - Done
3,476,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,582 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,347 UART: [art] PUB.X = A9175020BC01986048D0A13BCC43902F91BC88B2BFACE0DE27390B8CE8FCBE7EBE40FC2F9B651AA1A3FCE5D75EB675F1
3,499,135 UART: [art] PUB.Y = 96E689EBC6A9C51DA31A92EEFCB871A434C46D73F0BF956E7F422A19C76A8908AB0C715A1177EC9E8F599DA4433FDAA8
3,506,095 UART: [art] SIG.R = 67ECAA918CEA4A93A890DE8BC25E719F4D19F5D3EB3BE63199EEB4BB1A34F927676A0D2D88815F256F46D90E7C2753E9
3,512,873 UART: [art] SIG.S = AB969F7493338E189CCF89971E629D044F3281274FF432B221B39A8FF7DD0CF2607BB9D289B97DBF17A4B35CCB6275AF
3,536,547 UART: Caliptra RT
3,536,890 UART: [state] CFI Enabled
3,658,110 UART: [rt] RT listening for mailbox commands...
3,658,780 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,084 UART: [rt]cmd =0x44504543, len=96
3,881,022 >>> mbox cmd response data (6236 bytes)
3,881,023 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,036 UART: [rt]cmd =0x53574545, len=84
3,914,438 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,798 ready_for_fw is high
1,362,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,995 >>> mbox cmd response: success
3,042,256 UART:
3,042,272 UART: Running Caliptra FMC ...
3,042,680 UART:
3,042,823 UART: [state] CFI Enabled
3,053,521 UART: [fht] FMC Alias Private Key: 7
3,172,577 UART: [art] Extend RT PCRs Done
3,173,005 UART: [art] Lock RT PCRs Done
3,174,547 UART: [art] Populate DV Done
3,182,946 UART: [fht] FMC Alias Private Key: 7
3,184,094 UART: [art] Derive CDI
3,184,374 UART: [art] Store in slot 0x4
3,269,968 UART: [art] Derive Key Pair
3,270,328 UART: [art] Store priv key in slot 0x5
3,283,529 UART: [art] Derive Key Pair - Done
3,298,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,876 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,641 UART: [art] PUB.X = 5E2A50EB86B1A4AE59BDA55209DB5F75D026AD2A015C71CBC7D85118442D373A0A016BE711F931189973CB7C98581DF0
3,321,405 UART: [art] PUB.Y = 53A5F295B106B72D73D5BED574F86210E9C689E579FB7E69F269F8152F999B651F4CC96DE752D464D40D796D43571E1F
3,328,349 UART: [art] SIG.R = 5546E7328EBCC94D3192A0EDA6614657993093E573FB24E6514935E9B5579A8D5AE37BF9686C3A8F759681C12714B97A
3,335,113 UART: [art] SIG.S = A3ACEEA4BFB8DA45C57DDF6AF8F37850935BBAC177F9F3A5D7F5A3B74EEAB7727EC6551E2AD5F34FCAD1640BF90D090C
3,359,337 UART: Caliptra RT
3,359,680 UART: [state] CFI Enabled
3,479,958 UART: [rt] RT listening for mailbox commands...
3,480,628 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,814 UART: [rt]cmd =0x44504543, len=96
3,702,063 >>> mbox cmd response data (6236 bytes)
3,702,064 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,731,885 UART: [rt]cmd =0x53574545, len=84
3,735,283 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,523 UART: [state] WD Timer not started. Device not locked for debugging
87,674 UART: [kat] SHA2-256
891,224 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,328 UART: [kat] ++
895,480 UART: [kat] sha1
899,910 UART: [kat] SHA2-256
901,850 UART: [kat] SHA2-384
904,667 UART: [kat] SHA2-512-ACC
906,568 UART: [kat] ECC-384
916,643 UART: [kat] HMAC-384Kdf
921,173 UART: [kat] LMS
1,169,485 UART: [kat] --
1,170,262 UART: [cold-reset] ++
1,170,740 UART: [fht] FHT @ 0x50003400
1,173,414 UART: [idev] ++
1,173,582 UART: [idev] CDI.KEYID = 6
1,173,943 UART: [idev] SUBJECT.KEYID = 7
1,174,368 UART: [idev] UDS.KEYID = 0
1,174,714 ready_for_fw is high
1,174,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,235 UART: [idev] Erasing UDS.KEYID = 0
1,199,445 UART: [idev] Sha1 KeyId Algorithm
1,208,383 UART: [idev] --
1,209,446 UART: [ldev] ++
1,209,614 UART: [ldev] CDI.KEYID = 6
1,209,978 UART: [ldev] SUBJECT.KEYID = 5
1,210,405 UART: [ldev] AUTHORITY.KEYID = 7
1,210,868 UART: [ldev] FE.KEYID = 1
1,216,138 UART: [ldev] Erasing FE.KEYID = 1
1,243,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,678 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,848 UART: [ldev] --
1,282,303 UART: [fwproc] Wait for Commands...
1,283,006 UART: [fwproc] Recv command 0x46574c44
1,283,739 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,562 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,637 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,029 >>> mbox cmd response: success
2,827,115 UART: [afmc] ++
2,827,283 UART: [afmc] CDI.KEYID = 6
2,827,646 UART: [afmc] SUBJECT.KEYID = 7
2,828,072 UART: [afmc] AUTHORITY.KEYID = 5
2,863,689 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,964 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,304 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,005 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,772 UART: [afmc] --
2,906,773 UART: [cold-reset] --
2,907,703 UART: [state] Locking Datavault
2,909,034 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,638 UART: [state] Locking ICCM
2,910,136 UART: [exit] Launching FMC @ 0x40000130
2,915,466 UART:
2,915,482 UART: Running Caliptra FMC ...
2,915,890 UART:
2,915,944 UART: [state] CFI Enabled
2,926,362 UART: [fht] FMC Alias Private Key: 7
3,045,530 UART: [art] Extend RT PCRs Done
3,045,958 UART: [art] Lock RT PCRs Done
3,047,348 UART: [art] Populate DV Done
3,055,499 UART: [fht] FMC Alias Private Key: 7
3,056,553 UART: [art] Derive CDI
3,056,833 UART: [art] Store in slot 0x4
3,142,410 UART: [art] Derive Key Pair
3,142,770 UART: [art] Store priv key in slot 0x5
3,156,112 UART: [art] Derive Key Pair - Done
3,170,881 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,300 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,065 UART: [art] PUB.X = F62C4196871486581F0CED1353D6B936054EF185B7C0ADEA1E06F0F94D2F04771A5CDCA96242D8AD02380A2106B32D39
3,193,816 UART: [art] PUB.Y = C5B130A22A269206D69870D7A3CACB6AA9234642EE82D45A8B6BD9315542AEB6599C8FD35037538440630A35F2D1B579
3,200,758 UART: [art] SIG.R = B47C694BC8444DEF0066A5D595348CC2C4E9BA2BA2A50A60249BFB1E0FE05DFCB8461B221E49D8CCC560EBD885D85709
3,207,513 UART: [art] SIG.S = 56E43CE81E5447248C8D3716B285719F004A9E4DA39FB1CF816CD561AF0244CA18016F2715070A409F7F0F7FCFEEB7FF
3,231,368 UART: Caliptra RT
3,231,619 UART: [state] CFI Enabled
3,350,972 UART: [rt] RT listening for mailbox commands...
3,351,642 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,152 UART: [rt]cmd =0x44504543, len=96
3,575,425 >>> mbox cmd response data (6236 bytes)
3,575,426 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,271 UART: [rt]cmd =0x53574545, len=84
3,609,093 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,536 ready_for_fw is high
1,058,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,742 >>> mbox cmd response: success
2,738,271 UART:
2,738,287 UART: Running Caliptra FMC ...
2,738,695 UART:
2,738,749 UART: [state] CFI Enabled
2,749,389 UART: [fht] FMC Alias Private Key: 7
2,869,007 UART: [art] Extend RT PCRs Done
2,869,435 UART: [art] Lock RT PCRs Done
2,870,995 UART: [art] Populate DV Done
2,879,184 UART: [fht] FMC Alias Private Key: 7
2,880,340 UART: [art] Derive CDI
2,880,620 UART: [art] Store in slot 0x4
2,966,507 UART: [art] Derive Key Pair
2,966,867 UART: [art] Store priv key in slot 0x5
2,980,445 UART: [art] Derive Key Pair - Done
2,995,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,059 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,824 UART: [art] PUB.X = 94CA5A9C6F23FB6BEAE1F1C67911BD25B226E0CD07F18CCA725F6C4754EF4EE2C2E0F58FAA84BFD7F51DBEA45E214CB5
3,018,621 UART: [art] PUB.Y = 4C6AD309407743B2BFA213C7CD8BD43008C62C3898FC0D3B650F5218F38CC38A7604B9587CE97ADFF7BA6A2748E9F31A
3,025,566 UART: [art] SIG.R = 3E82E7F5D9EDFD60F16855B1790D59E21BFECDA854D918AFD48D94FD20ED321E7C256353DF9A1ED54A855D4B6324B45F
3,032,349 UART: [art] SIG.S = E10A37375FD082FA59C8CC2C571BFC6BD13A9CEBFBAA0A1DF8ED49F4B04C40291A6648DF279DD8156AB1B1BC288E6011
3,055,663 UART: Caliptra RT
3,055,914 UART: [state] CFI Enabled
3,175,921 UART: [rt] RT listening for mailbox commands...
3,176,591 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,849 UART: [rt]cmd =0x44504543, len=96
3,399,403 >>> mbox cmd response data (6236 bytes)
3,399,404 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,413 UART: [rt]cmd =0x53574545, len=84
3,432,991 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,398 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
891,193 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,297 UART: [kat] ++
895,449 UART: [kat] sha1
899,515 UART: [kat] SHA2-256
901,455 UART: [kat] SHA2-384
904,130 UART: [kat] SHA2-512-ACC
906,031 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,323 UART: [cold-reset] ++
1,170,793 UART: [fht] FHT @ 0x50003400
1,173,531 UART: [idev] ++
1,173,699 UART: [idev] CDI.KEYID = 6
1,174,060 UART: [idev] SUBJECT.KEYID = 7
1,174,485 UART: [idev] UDS.KEYID = 0
1,174,831 ready_for_fw is high
1,174,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,560 UART: [idev] Erasing UDS.KEYID = 0
1,199,626 UART: [idev] Sha1 KeyId Algorithm
1,208,366 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,646 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,784 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,385 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,721 UART: [fwproc] Recv command 0x46574c44
1,283,454 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,664 >>> mbox cmd response: success
2,827,892 UART: [afmc] ++
2,828,060 UART: [afmc] CDI.KEYID = 6
2,828,423 UART: [afmc] SUBJECT.KEYID = 7
2,828,849 UART: [afmc] AUTHORITY.KEYID = 5
2,865,174 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,156 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,866 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,747 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,448 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,385 UART: [afmc] --
2,908,196 UART: [cold-reset] --
2,909,230 UART: [state] Locking Datavault
2,910,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,161 UART: [state] Locking ICCM
2,911,747 UART: [exit] Launching FMC @ 0x40000130
2,917,077 UART:
2,917,093 UART: Running Caliptra FMC ...
2,917,501 UART:
2,917,644 UART: [state] CFI Enabled
2,928,584 UART: [fht] FMC Alias Private Key: 7
3,047,310 UART: [art] Extend RT PCRs Done
3,047,738 UART: [art] Lock RT PCRs Done
3,049,582 UART: [art] Populate DV Done
3,057,751 UART: [fht] FMC Alias Private Key: 7
3,058,897 UART: [art] Derive CDI
3,059,177 UART: [art] Store in slot 0x4
3,144,528 UART: [art] Derive Key Pair
3,144,888 UART: [art] Store priv key in slot 0x5
3,158,210 UART: [art] Derive Key Pair - Done
3,172,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,271 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,036 UART: [art] PUB.X = 5E3BF84E100F0248D485323A06D4EC9FAF90F19FB1F86D12020BF5F653A1B33ED9D2C43E3D07CF2402C8A30C4738BE73
3,195,792 UART: [art] PUB.Y = 63480B4D731D55A77942E658CC74C5521462D6FE82381FCF0B50241256A437DCACAC0E0524793C936A3130F7E758B4D6
3,202,726 UART: [art] SIG.R = 9B885B8BBE1DA400F2C95AD6D85490BF23E7604C6B17172FCA1C5ECDD476A2E28AD339EEDD089D8DE5DBD6617BF386E4
3,209,493 UART: [art] SIG.S = 7D5B81F9E6EBCA4DEE35AF0483A2021BB26CE2BB809752FD4B31EE4935A9786E094CF176A755A3A7BB0592D0C3424104
3,233,532 UART: Caliptra RT
3,233,875 UART: [state] CFI Enabled
3,354,696 UART: [rt] RT listening for mailbox commands...
3,355,366 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,932 UART: [rt]cmd =0x44504543, len=96
3,578,698 >>> mbox cmd response data (6236 bytes)
3,578,699 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,590 UART: [rt]cmd =0x53574545, len=84
3,611,748 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,471 ready_for_fw is high
1,059,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,557 >>> mbox cmd response: success
2,742,714 UART:
2,742,730 UART: Running Caliptra FMC ...
2,743,138 UART:
2,743,281 UART: [state] CFI Enabled
2,754,325 UART: [fht] FMC Alias Private Key: 7
2,873,273 UART: [art] Extend RT PCRs Done
2,873,701 UART: [art] Lock RT PCRs Done
2,875,297 UART: [art] Populate DV Done
2,883,940 UART: [fht] FMC Alias Private Key: 7
2,884,932 UART: [art] Derive CDI
2,885,212 UART: [art] Store in slot 0x4
2,971,257 UART: [art] Derive Key Pair
2,971,617 UART: [art] Store priv key in slot 0x5
2,984,303 UART: [art] Derive Key Pair - Done
2,998,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,273 UART: [art] PUB.X = 9598704CC6ED87066C7AD587CE4377C87702F288907F8EE5DD7A40D3E9A68385221B11E97C94D44DAB549B37B6125933
3,022,033 UART: [art] PUB.Y = 1CC74BF6CB12EB49AE43B7040A4F0E0D50E504CBE006E13F792D47D0468997A3A87DC5C9666F5C5C8C70E78EB0BE50A9
3,028,979 UART: [art] SIG.R = FDF2E8945DC7AF3410E0E466AD5ADC87E6B29BF08B0462CE4699151297D3BA813AF4AF2666E6B8087CD36A9C7872B750
3,035,753 UART: [art] SIG.S = F343963877016845EA99B0BAF910F0DC49DEE46275154C36412BBC38FAFEC66A97E4B13F191EDD06EB74620E591B25FF
3,059,326 UART: Caliptra RT
3,059,669 UART: [state] CFI Enabled
3,179,657 UART: [rt] RT listening for mailbox commands...
3,180,327 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,515 UART: [rt]cmd =0x44504543, len=96
3,405,017 >>> mbox cmd response data (6236 bytes)
3,405,018 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,867 UART: [rt]cmd =0x53574545, len=84
3,438,117 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
893,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,371 UART: [kat] ++
897,523 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,482 UART: [kat] SHA2-512-ACC
908,383 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,980 UART: [kat] LMS
1,171,308 UART: [kat] --
1,171,763 UART: [cold-reset] ++
1,172,285 UART: [fht] FHT @ 0x50003400
1,174,908 UART: [idev] ++
1,175,076 UART: [idev] CDI.KEYID = 6
1,175,436 UART: [idev] SUBJECT.KEYID = 7
1,175,860 UART: [idev] UDS.KEYID = 0
1,176,205 ready_for_fw is high
1,176,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,965 UART: [idev] Sha1 KeyId Algorithm
1,209,593 UART: [idev] --
1,210,707 UART: [ldev] ++
1,210,875 UART: [ldev] CDI.KEYID = 6
1,211,238 UART: [ldev] SUBJECT.KEYID = 5
1,211,664 UART: [ldev] AUTHORITY.KEYID = 7
1,212,127 UART: [ldev] FE.KEYID = 1
1,217,023 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,448 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,245 UART: [ldev] --
1,282,568 UART: [fwproc] Wait for Commands...
1,283,370 UART: [fwproc] Recv command 0x46574c44
1,284,098 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,560 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,730 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,091 >>> mbox cmd response: success
2,829,221 UART: [afmc] ++
2,829,389 UART: [afmc] CDI.KEYID = 6
2,829,751 UART: [afmc] SUBJECT.KEYID = 7
2,830,176 UART: [afmc] AUTHORITY.KEYID = 5
2,866,461 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,076 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,416 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,117 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,907 UART: [afmc] --
2,909,851 UART: [cold-reset] --
2,910,555 UART: [state] Locking Datavault
2,911,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,422 UART: [state] Locking ICCM
2,913,000 UART: [exit] Launching FMC @ 0x40000130
2,918,330 UART:
2,918,346 UART: Running Caliptra FMC ...
2,918,754 UART:
2,918,808 UART: [state] CFI Enabled
2,929,092 UART: [fht] FMC Alias Private Key: 7
3,047,930 UART: [art] Extend RT PCRs Done
3,048,358 UART: [art] Lock RT PCRs Done
3,049,664 UART: [art] Populate DV Done
3,057,817 UART: [fht] FMC Alias Private Key: 7
3,058,823 UART: [art] Derive CDI
3,059,103 UART: [art] Store in slot 0x4
3,144,194 UART: [art] Derive Key Pair
3,144,554 UART: [art] Store priv key in slot 0x5
3,157,592 UART: [art] Derive Key Pair - Done
3,172,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,196 UART: [art] PUB.X = 893A45D56FAE2127B649B6245001760E2553E888F9908FD65422B9022637625AC4FA783625B01181817B7A6FB3E786D3
3,194,943 UART: [art] PUB.Y = 15F71873696CE99A517147F9FD1FFAD5C3EAA67AE98ED89826DDF2481C58565F7D847AE2FDD52A4BF0EF7C29DA6B727C
3,201,911 UART: [art] SIG.R = 200741F3A7B16D054A0D39AB6A3C43B8600353BC6AE3D2E75353B9D73E853E30C42A93776E8E5797F8C5E08E41F79560
3,208,667 UART: [art] SIG.S = BA00F5635212F88BCA3AC263FFE321557445C0E3A1F637573CBB21E968A7500CAB6B9E3D23BA5BA852BEBB2028CBF1F5
3,232,418 UART: Caliptra RT
3,232,669 UART: [state] CFI Enabled
3,352,484 UART: [rt] RT listening for mailbox commands...
3,353,154 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,666 UART: [rt]cmd =0x44504543, len=96
3,575,639 >>> mbox cmd response data (6236 bytes)
3,575,640 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,421 UART: [rt]cmd =0x53574545, len=84
3,608,771 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 ready_for_fw is high
1,059,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,454 >>> mbox cmd response: success
2,740,495 UART:
2,740,511 UART: Running Caliptra FMC ...
2,740,919 UART:
2,740,973 UART: [state] CFI Enabled
2,751,329 UART: [fht] FMC Alias Private Key: 7
2,870,149 UART: [art] Extend RT PCRs Done
2,870,577 UART: [art] Lock RT PCRs Done
2,872,097 UART: [art] Populate DV Done
2,880,206 UART: [fht] FMC Alias Private Key: 7
2,881,270 UART: [art] Derive CDI
2,881,550 UART: [art] Store in slot 0x4
2,967,137 UART: [art] Derive Key Pair
2,967,497 UART: [art] Store priv key in slot 0x5
2,980,765 UART: [art] Derive Key Pair - Done
2,995,183 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,322 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,087 UART: [art] PUB.X = 7FAC5A33224A0769FCC7B5DBF6A729BFAFD5F699BF0131E7308FADB3BFC750EA09172765DD529E2D7DC68993BBB8404C
3,017,868 UART: [art] PUB.Y = 9E4BF244E4C68F139B5CC29771619EDB732C32A877922F4B6C8BC5232059B8B183977C881A6C59080CD1E12F8B13B7AC
3,024,814 UART: [art] SIG.R = CA2FCE0C03786BC9EC656756A79D7A908312BDEB16FC52A899552A2E58AE2560A6C793537C986AB90FB9F336A7F81350
3,031,581 UART: [art] SIG.S = 5CE8D3AB87F26CCC49FB3E39056A5EB2C0EFACFB921C74432F9145213AB011D013F71E6FD6A39C3FB2F2235540785888
3,055,544 UART: Caliptra RT
3,055,795 UART: [state] CFI Enabled
3,175,060 UART: [rt] RT listening for mailbox commands...
3,175,730 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,406 UART: [rt]cmd =0x44504543, len=96
3,397,785 >>> mbox cmd response data (6236 bytes)
3,397,786 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,461 UART: [rt]cmd =0x53574545, len=84
3,430,425 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,445 UART: [state] LifecycleState = Unprovisioned
86,100 UART: [state] DebugLocked = No
86,756 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
901,980 UART: [kat] SHA2-256
903,920 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,675 UART: [kat] HMAC-384Kdf
923,145 UART: [kat] LMS
1,171,473 UART: [kat] --
1,172,330 UART: [cold-reset] ++
1,172,862 UART: [fht] FHT @ 0x50003400
1,175,647 UART: [idev] ++
1,175,815 UART: [idev] CDI.KEYID = 6
1,176,175 UART: [idev] SUBJECT.KEYID = 7
1,176,599 UART: [idev] UDS.KEYID = 0
1,176,944 ready_for_fw is high
1,176,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,667 UART: [idev] Erasing UDS.KEYID = 0
1,201,590 UART: [idev] Sha1 KeyId Algorithm
1,209,984 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,904 UART: [ldev] Erasing FE.KEYID = 1
1,244,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,512 UART: [ldev] --
1,283,955 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,162 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,068 >>> mbox cmd response: success
2,830,138 UART: [afmc] ++
2,830,306 UART: [afmc] CDI.KEYID = 6
2,830,668 UART: [afmc] SUBJECT.KEYID = 7
2,831,093 UART: [afmc] AUTHORITY.KEYID = 5
2,866,450 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,969 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,426 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,309 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,010 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,690 UART: [afmc] --
2,909,610 UART: [cold-reset] --
2,910,262 UART: [state] Locking Datavault
2,911,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,939 UART: [state] Locking ICCM
2,912,399 UART: [exit] Launching FMC @ 0x40000130
2,917,729 UART:
2,917,745 UART: Running Caliptra FMC ...
2,918,153 UART:
2,918,296 UART: [state] CFI Enabled
2,928,810 UART: [fht] FMC Alias Private Key: 7
3,047,974 UART: [art] Extend RT PCRs Done
3,048,402 UART: [art] Lock RT PCRs Done
3,050,172 UART: [art] Populate DV Done
3,058,307 UART: [fht] FMC Alias Private Key: 7
3,059,277 UART: [art] Derive CDI
3,059,557 UART: [art] Store in slot 0x4
3,145,318 UART: [art] Derive Key Pair
3,145,678 UART: [art] Store priv key in slot 0x5
3,159,210 UART: [art] Derive Key Pair - Done
3,174,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,608 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,373 UART: [art] PUB.X = 81EF9E153FE394E2B206466E66BF856994FAC964E87322936788D515B7FE132A4B3B95FA58A1793C6CB00DE1F8108B18
3,197,137 UART: [art] PUB.Y = DA6475FE825260E692CC52740AB5165B5B6079CEAC2659E39C23946F15D2FA915D224C5F21D9C6CF688841CC31785395
3,204,082 UART: [art] SIG.R = C9EEB05CA68FCD38BE3BB9494F1E2402A83BD002D1953FB6B8B640F3B84E0905B7EBCCA9CF5C06844EAA3CD305396BD4
3,210,856 UART: [art] SIG.S = D92B56F733D0CA9E439CBC877EE394395BE7AF53510689F765D69622EEA96E11D5B928961290A09FC616A50386ACB3AF
3,234,472 UART: Caliptra RT
3,234,815 UART: [state] CFI Enabled
3,355,115 UART: [rt] RT listening for mailbox commands...
3,355,785 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,073 UART: [rt]cmd =0x44504543, len=96
3,578,782 >>> mbox cmd response data (6236 bytes)
3,578,783 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,608,662 UART: [rt]cmd =0x53574545, len=84
3,611,870 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,738 ready_for_fw is high
1,061,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,681 >>> mbox cmd response: success
2,742,990 UART:
2,743,006 UART: Running Caliptra FMC ...
2,743,414 UART:
2,743,557 UART: [state] CFI Enabled
2,754,335 UART: [fht] FMC Alias Private Key: 7
2,873,667 UART: [art] Extend RT PCRs Done
2,874,095 UART: [art] Lock RT PCRs Done
2,875,713 UART: [art] Populate DV Done
2,884,076 UART: [fht] FMC Alias Private Key: 7
2,885,160 UART: [art] Derive CDI
2,885,440 UART: [art] Store in slot 0x4
2,971,631 UART: [art] Derive Key Pair
2,971,991 UART: [art] Store priv key in slot 0x5
2,985,795 UART: [art] Derive Key Pair - Done
3,000,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,476 UART: [art] PUB.X = B3AA15E480F53FFBC7DA24EDCBDDCCCE5DAEA220064C1D8F9075A75F307094E8D4EEC508D362601BC33F0F19D996E446
3,024,259 UART: [art] PUB.Y = ABE4E9C54EF0A14385B3798C622D1D9F076324032CFAFD16B3A6E2B8CEECBFF8EF638D56A5067AF6B3540849CDCC73CA
3,031,219 UART: [art] SIG.R = A6737CB2D7FEE6C9B4F05DF0D0D960163B669B39C40FC8AA7336FA0B37E8CA4534544FA8C1F0E2539E568BA695C3D884
3,037,995 UART: [art] SIG.S = 6E7E5D7B78C690462F3B9BB70F1E4B29032B0DE9003D94384528966AF9AC49EE7383B803491EAFA440DF51D5312F8C9A
3,061,695 UART: Caliptra RT
3,062,038 UART: [state] CFI Enabled
3,181,223 UART: [rt] RT listening for mailbox commands...
3,181,893 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,219 UART: [rt]cmd =0x44504543, len=96
3,404,701 >>> mbox cmd response data (6236 bytes)
3,404,702 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,434,449 UART: [rt]cmd =0x53574545, len=84
3,437,801 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_incorrect_cdi_handle ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,928 writing to cptra_bootfsm_go
192,131 UART:
192,485 UART: Running Caliptra ROM ...
193,692 UART:
193,854 UART: [state] CFI Enabled
262,088 UART: [state] LifecycleState = Unprovisioned
263,996 UART: [state] DebugLocked = No
266,029 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,394 UART: [kat] SHA2-256
441,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,609 UART: [kat] ++
452,100 UART: [kat] sha1
463,757 UART: [kat] SHA2-256
466,477 UART: [kat] SHA2-384
471,927 UART: [kat] SHA2-512-ACC
474,299 UART: [kat] ECC-384
2,781,250 UART: [kat] HMAC-384Kdf
2,811,944 UART: [kat] LMS
4,002,267 UART: [kat] --
4,007,567 UART: [cold-reset] ++
4,009,860 UART: [fht] Storing FHT @ 0x50003400
4,021,776 UART: [idev] ++
4,022,412 UART: [idev] CDI.KEYID = 6
4,023,336 UART: [idev] SUBJECT.KEYID = 7
4,024,582 UART: [idev] UDS.KEYID = 0
4,025,668 ready_for_fw is high
4,025,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,070 UART: [idev] Erasing UDS.KEYID = 0
7,360,554 UART: [idev] Using Sha1 for KeyId Algorithm
7,382,416 UART: [idev] --
7,386,211 UART: [ldev] ++
7,386,786 UART: [ldev] CDI.KEYID = 6
7,387,751 UART: [ldev] SUBJECT.KEYID = 5
7,388,963 UART: [ldev] AUTHORITY.KEYID = 7
7,390,248 UART: [ldev] FE.KEYID = 1
7,434,335 UART: [ldev] Erasing FE.KEYID = 1
10,765,876 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,080,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,095,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,109,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,124,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,144,421 UART: [ldev] --
13,149,467 UART: [fwproc] Waiting for Commands...
13,151,451 UART: [fwproc] Received command 0x46574c44
13,153,629 UART: [fwproc] Received Image of size 118548 bytes
17,258,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,332,293 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,405,463 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,733,840 >>> mbox cmd response: success
17,738,276 UART: [afmc] ++
17,738,890 UART: [afmc] CDI.KEYID = 6
17,739,808 UART: [afmc] SUBJECT.KEYID = 7
17,741,079 UART: [afmc] AUTHORITY.KEYID = 5
21,102,604 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,401,744 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,403,993 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,418,444 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,433,131 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,447,573 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,469,350 UART: [afmc] --
23,472,940 UART: [cold-reset] --
23,476,966 UART: [state] Locking Datavault
23,483,752 UART: [state] Locking PCR0, PCR1 and PCR31
23,485,490 UART: [state] Locking ICCM
23,486,949 UART: [exit] Launching FMC @ 0x40000130
23,495,349 UART:
23,495,595 UART: Running Caliptra FMC ...
23,496,697 UART:
23,496,858 UART: [state] CFI Enabled
23,561,053 UART: [fht] FMC Alias Private Key: 7
25,901,861 UART: [art] Extend RT PCRs Done
25,903,091 UART: [art] Lock RT PCRs Done
25,904,555 UART: [art] Populate DV Done
25,909,962 UART: [fht] FMC Alias Private Key: 7
25,911,665 UART: [art] Derive CDI
25,912,478 UART: [art] Store in slot 0x4
25,968,709 UART: [art] Derive Key Pair
25,969,751 UART: [art] Store priv key in slot 0x5
29,261,609 UART: [art] Derive Key Pair - Done
29,274,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,038 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,566 UART: [art] PUB.X = B651D08D4806AB7E2CA79FCED4BE03974D37255E75DB495CB1BAE3E0C29554D10FFAC3B52C1494AEDE6DFE4784D19B73
31,572,810 UART: [art] PUB.Y = 33B2FB0FB9CA1A153A470AAC1B9A00DBE4233D7F3B7C8CCDAADC972152B9E5C13719E232A895D6D3287391DFEF13E4B1
31,580,091 UART: [art] SIG.R = 869B88F62867D237DDE5B93DC83BB7ECD986264F8B3779276DD60C7496A6BB5654A4D1144DB81BF72D5BF417CD53FE91
31,587,474 UART: [art] SIG.S = 775C8CC23627C9897C2EC7BAEC433D176359AB0FD997E22E9F86B845AC8EED0DF267FDC4486E258867BC0049469CF675
32,892,516 UART: Caliptra RT
32,893,232 UART: [state] CFI Enabled
33,070,398 UART: [rt] RT listening for mailbox commands...
33,072,305 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,102,746 UART: [rt]cmd =0x53574545, len=84
33,106,161 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,808,139 ready_for_fw is high
3,808,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,963,054 >>> mbox cmd response: success
23,658,028 UART:
23,658,448 UART: Running Caliptra FMC ...
23,659,653 UART:
23,659,821 UART: [state] CFI Enabled
23,721,941 UART: [fht] FMC Alias Private Key: 7
26,062,144 UART: [art] Extend RT PCRs Done
26,063,373 UART: [art] Lock RT PCRs Done
26,064,738 UART: [art] Populate DV Done
26,070,288 UART: [fht] FMC Alias Private Key: 7
26,071,963 UART: [art] Derive CDI
26,072,784 UART: [art] Store in slot 0x4
26,130,486 UART: [art] Derive Key Pair
26,131,531 UART: [art] Store priv key in slot 0x5
29,424,250 UART: [art] Derive Key Pair - Done
29,437,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,392 UART: [art] Erasing AUTHORITY.KEYID = 7
31,726,899 UART: [art] PUB.X = 71B2A5D887FC8FBD7B24F36B69CA27FA9C5CC952B5832D46250D49AD0130158200A3891B037C31B77549644A5B8E635B
31,734,149 UART: [art] PUB.Y = 7C84797AB3A5EC4C1F9BCFEFA78C9F5DE1EBB33E1269879BFA307717714CB5AB9DBA245459ADC60BB35062F694EC5636
31,741,444 UART: [art] SIG.R = 1BA52066C574FDB2E158DE32E89573BF118DB6F4A86C324C65E9AC9926971BDFB3209D62E3985F618B2BCF8640836F6E
31,748,794 UART: [art] SIG.S = 8DA8DC22853C9D99D223825172B4DEF947EA597CF75F7189A5C0E1085940632AA176F903EDF9DA0E346533261601D41A
33,053,851 UART: Caliptra RT
33,054,562 UART: [state] CFI Enabled
33,232,486 UART: [rt] RT listening for mailbox commands...
33,234,391 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,265,074 UART: [rt]cmd =0x53574545, len=84
33,268,962 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,468 UART:
192,831 UART: Running Caliptra ROM ...
193,920 UART:
603,592 UART: [state] CFI Enabled
620,046 UART: [state] LifecycleState = Unprovisioned
621,997 UART: [state] DebugLocked = No
623,585 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,926 UART: [kat] SHA2-256
798,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,200 UART: [kat] ++
809,718 UART: [kat] sha1
819,807 UART: [kat] SHA2-256
822,531 UART: [kat] SHA2-384
828,303 UART: [kat] SHA2-512-ACC
830,662 UART: [kat] ECC-384
3,115,084 UART: [kat] HMAC-384Kdf
3,126,244 UART: [kat] LMS
4,316,407 UART: [kat] --
4,319,265 UART: [cold-reset] ++
4,321,543 UART: [fht] Storing FHT @ 0x50003400
4,333,581 UART: [idev] ++
4,334,135 UART: [idev] CDI.KEYID = 6
4,335,081 UART: [idev] SUBJECT.KEYID = 7
4,336,392 UART: [idev] UDS.KEYID = 0
4,337,393 ready_for_fw is high
4,337,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,904 UART: [idev] Erasing UDS.KEYID = 0
7,624,210 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,100 UART: [idev] --
7,648,876 UART: [ldev] ++
7,649,494 UART: [ldev] CDI.KEYID = 6
7,650,425 UART: [ldev] SUBJECT.KEYID = 5
7,651,629 UART: [ldev] AUTHORITY.KEYID = 7
7,652,907 UART: [ldev] FE.KEYID = 1
7,661,952 UART: [ldev] Erasing FE.KEYID = 1
10,952,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,936 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,860 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,618 UART: [ldev] --
13,317,088 UART: [fwproc] Waiting for Commands...
13,318,968 UART: [fwproc] Received command 0x46574c44
13,321,162 UART: [fwproc] Received Image of size 118548 bytes
17,423,816 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,910 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,102 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,806 >>> mbox cmd response: success
17,911,618 UART: [afmc] ++
17,912,215 UART: [afmc] CDI.KEYID = 6
17,913,124 UART: [afmc] SUBJECT.KEYID = 7
17,914,390 UART: [afmc] AUTHORITY.KEYID = 5
21,228,988 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,522,832 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,525,088 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,539,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,554,251 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,568,643 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,590,320 UART: [afmc] --
23,594,168 UART: [cold-reset] --
23,596,951 UART: [state] Locking Datavault
23,601,011 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,761 UART: [state] Locking ICCM
23,605,174 UART: [exit] Launching FMC @ 0x40000130
23,613,562 UART:
23,613,799 UART: Running Caliptra FMC ...
23,614,895 UART:
23,615,047 UART: [state] CFI Enabled
23,623,039 UART: [fht] FMC Alias Private Key: 7
25,963,444 UART: [art] Extend RT PCRs Done
25,964,660 UART: [art] Lock RT PCRs Done
25,966,389 UART: [art] Populate DV Done
25,972,081 UART: [fht] FMC Alias Private Key: 7
25,973,724 UART: [art] Derive CDI
25,974,532 UART: [art] Store in slot 0x4
26,016,689 UART: [art] Derive Key Pair
26,017,731 UART: [art] Store priv key in slot 0x5
29,260,021 UART: [art] Derive Key Pair - Done
29,272,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,750 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,264 UART: [art] PUB.X = 1B1D608D0339A034C709D621272EC507B1CD326095F77A6B95081620F5BF71EA426D9F57F08691870C5A8DEBE9C6D3BB
31,561,513 UART: [art] PUB.Y = 2630214E9356B2C3FD7DC41A2BACBDE9EF64F96383358D9699727731961584C59376A73FF3C8A8EAA1B235A1672791AD
31,568,735 UART: [art] SIG.R = AAFE7F5978D6C3B52A6461021C13154C6FB29BBA5451BC3D8485A78BA474D8FA1E492E8DE43A16626B36C6A0B6AC3613
31,576,171 UART: [art] SIG.S = E214AB5D76ECDD4E45E839B71BA9927E8459ED0004CA23617138771A030250FB8C4FBCD3CE56801942E272D796B40480
32,881,576 UART: Caliptra RT
32,882,279 UART: [state] CFI Enabled
33,015,805 UART: [rt] RT listening for mailbox commands...
33,017,682 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,048,104 UART: [rt]cmd =0x53574545, len=84
33,052,164 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
4,133,367 ready_for_fw is high
4,133,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,169,255 >>> mbox cmd response: success
23,811,285 UART:
23,811,681 UART: Running Caliptra FMC ...
23,812,786 UART:
23,812,940 UART: [state] CFI Enabled
23,820,717 UART: [fht] FMC Alias Private Key: 7
26,161,174 UART: [art] Extend RT PCRs Done
26,162,394 UART: [art] Lock RT PCRs Done
26,163,992 UART: [art] Populate DV Done
26,169,421 UART: [fht] FMC Alias Private Key: 7
26,171,104 UART: [art] Derive CDI
26,171,843 UART: [art] Store in slot 0x4
26,214,544 UART: [art] Derive Key Pair
26,215,542 UART: [art] Store priv key in slot 0x5
29,457,359 UART: [art] Derive Key Pair - Done
29,470,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,991 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,514 UART: [art] PUB.X = FC9F42DFC47FB710ACF55D7DEDF861A4DECAD52C455FEDA05F2A88F8A6C1EC3C6A4743955C5693CD3AEB7EBA8A488259
31,759,839 UART: [art] PUB.Y = 49E798AB0558E96C78BAB05FA185380D38A046AD259D1FBF2A3C2F8157D9DA110462928EFC3BD4DF2E8FAF84920831EE
31,767,068 UART: [art] SIG.R = 3828159934B0B0CE52565136D6DDB05263104A75FCFC096395C5F31A2001A7F603455DF79339FC8AF2820E09E3E76686
31,774,464 UART: [art] SIG.S = ED3953A411CBC513A26E076629B00A425813AFDE08D61A94C246663BBAA1CE81A98B757D74A00429FE43A92A7F8DB92B
33,079,904 UART: Caliptra RT
33,080,609 UART: [state] CFI Enabled
33,214,271 UART: [rt] RT listening for mailbox commands...
33,216,158 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
33,246,959 UART: [rt]cmd =0x53574545, len=84
33,250,718 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,222 UART:
192,576 UART: Running Caliptra ROM ...
193,757 UART:
193,925 UART: [state] CFI Enabled
266,925 UART: [state] LifecycleState = Unprovisioned
268,928 UART: [state] DebugLocked = No
271,744 UART: [state] WD Timer not started. Device not locked for debugging
275,076 UART: [kat] SHA2-256
454,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,527 UART: [kat] ++
466,023 UART: [kat] sha1
475,980 UART: [kat] SHA2-256
478,708 UART: [kat] SHA2-384
484,338 UART: [kat] SHA2-512-ACC
486,698 UART: [kat] ECC-384
2,947,276 UART: [kat] HMAC-384Kdf
2,970,377 UART: [kat] LMS
3,446,921 UART: [kat] --
3,451,735 UART: [cold-reset] ++
3,453,906 UART: [fht] FHT @ 0x50003400
3,465,376 UART: [idev] ++
3,465,931 UART: [idev] CDI.KEYID = 6
3,466,882 UART: [idev] SUBJECT.KEYID = 7
3,468,189 UART: [idev] UDS.KEYID = 0
3,469,081 ready_for_fw is high
3,469,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,418 UART: [idev] Erasing UDS.KEYID = 0
5,987,832 UART: [idev] Sha1 KeyId Algorithm
6,013,062 UART: [idev] --
6,019,324 UART: [ldev] ++
6,019,890 UART: [ldev] CDI.KEYID = 6
6,020,823 UART: [ldev] SUBJECT.KEYID = 5
6,022,030 UART: [ldev] AUTHORITY.KEYID = 7
6,023,311 UART: [ldev] FE.KEYID = 1
6,055,695 UART: [ldev] Erasing FE.KEYID = 1
8,563,313 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,329 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,718 UART: [ldev] --
10,372,243 UART: [fwproc] Wait for Commands...
10,374,659 UART: [fwproc] Recv command 0x46574c44
10,376,638 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,229 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,067 >>> mbox cmd response: success
14,341,837 UART: [afmc] ++
14,342,450 UART: [afmc] CDI.KEYID = 6
14,343,362 UART: [afmc] SUBJECT.KEYID = 7
14,344,594 UART: [afmc] AUTHORITY.KEYID = 5
16,875,999 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,595,365 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,597,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,613,381 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,629,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,644,979 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,668,942 UART: [afmc] --
18,672,636 UART: [cold-reset] --
18,675,627 UART: [state] Locking Datavault
18,682,380 UART: [state] Locking PCR0, PCR1 and PCR31
18,684,071 UART: [state] Locking ICCM
18,686,034 UART: [exit] Launching FMC @ 0x40000130
18,694,476 UART:
18,694,706 UART: Running Caliptra FMC ...
18,695,801 UART:
18,695,979 UART: [state] CFI Enabled
18,753,535 UART: [fht] FMC Alias Private Key: 7
20,519,932 UART: [art] Extend RT PCRs Done
20,521,151 UART: [art] Lock RT PCRs Done
20,522,612 UART: [art] Populate DV Done
20,528,180 UART: [fht] FMC Alias Private Key: 7
20,529,713 UART: [art] Derive CDI
20,530,468 UART: [art] Store in slot 0x4
20,586,802 UART: [art] Derive Key Pair
20,587,841 UART: [art] Store priv key in slot 0x5
23,050,175 UART: [art] Derive Key Pair - Done
23,063,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,776,803 UART: [art] Erasing AUTHORITY.KEYID = 7
24,778,312 UART: [art] PUB.X = EF02AE44B8C6CF9E93381FE02F96D03C1AB5152CB98CA3AD2721566F47BDDD8CC5E1EED379C2B2C697B596B5EC951212
24,785,588 UART: [art] PUB.Y = D3ED667085A9D9E9E532F17D87D74A32F6C3062ABF5EBA7D4BAF28F3FE6E820B8A4BDA2F7DB85CE0C89DBA0177D56F07
24,792,831 UART: [art] SIG.R = 527CA86EAEB0072E886507E67E8AC1299C80F9E29FAEE9C41F6B6F4705443BDE233C2A2666F0870DE2FA1278A8A279C2
24,800,293 UART: [art] SIG.S = 99964486BCD4DA5C12507A14E8409C8AFAE5A872FDE944C54F31F809F1088DE4E208F653C4A699B33411D11B6656D411
25,779,291 UART: Caliptra RT
25,780,004 UART: [state] CFI Enabled
25,960,402 UART: [rt] RT listening for mailbox commands...
25,962,283 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,992,800 UART: [rt]cmd =0x53574545, len=84
25,996,150 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,459,356 ready_for_fw is high
3,459,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,241,727 >>> mbox cmd response: success
18,534,132 UART:
18,534,513 UART: Running Caliptra FMC ...
18,535,613 UART:
18,535,770 UART: [state] CFI Enabled
18,601,864 UART: [fht] FMC Alias Private Key: 7
20,368,364 UART: [art] Extend RT PCRs Done
20,369,591 UART: [art] Lock RT PCRs Done
20,371,129 UART: [art] Populate DV Done
20,376,595 UART: [fht] FMC Alias Private Key: 7
20,378,305 UART: [art] Derive CDI
20,379,043 UART: [art] Store in slot 0x4
20,433,704 UART: [art] Derive Key Pair
20,434,696 UART: [art] Store priv key in slot 0x5
22,897,902 UART: [art] Derive Key Pair - Done
22,910,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,623,960 UART: [art] Erasing AUTHORITY.KEYID = 7
24,625,471 UART: [art] PUB.X = D60429F363BA4AA5B3564CD5B50BF166091B408C6DE2CBB18551B97DFB233F259DA558C5A27CC6E3C844AF966754C5F4
24,632,737 UART: [art] PUB.Y = 0FBAE038CE4D78B2576DB2F0B7ADD89D7E63D6C16E68D54D187999E1C6E7ED4DDA3575FBD6A3B1B16BD818C28B8DCB85
24,639,988 UART: [art] SIG.R = 54F5DF035841E6C4A8B941621B35347A291D3D844DA2F9A4411B133A29E43C9B12FE67BC2CFBC061231E3AD5BAE49713
24,647,435 UART: [art] SIG.S = 222F17F2714A7C8D55EA43C3AD57292A330E917B4B864B5D931883FDCB23F7ACA99889066060887ED470DE05BE1A3FB9
25,625,908 UART: Caliptra RT
25,626,643 UART: [state] CFI Enabled
25,807,493 UART: [rt] RT listening for mailbox commands...
25,809,385 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,839,904 UART: [rt]cmd =0x53574545, len=84
25,843,285 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,434 UART:
192,791 UART: Running Caliptra ROM ...
193,979 UART:
603,485 UART: [state] CFI Enabled
618,287 UART: [state] LifecycleState = Unprovisioned
620,236 UART: [state] DebugLocked = No
622,765 UART: [state] WD Timer not started. Device not locked for debugging
626,164 UART: [kat] SHA2-256
805,845 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,580 UART: [kat] ++
817,104 UART: [kat] sha1
827,623 UART: [kat] SHA2-256
830,347 UART: [kat] SHA2-384
836,765 UART: [kat] SHA2-512-ACC
839,089 UART: [kat] ECC-384
3,283,615 UART: [kat] HMAC-384Kdf
3,295,791 UART: [kat] LMS
3,772,262 UART: [kat] --
3,775,694 UART: [cold-reset] ++
3,777,977 UART: [fht] FHT @ 0x50003400
3,790,588 UART: [idev] ++
3,791,160 UART: [idev] CDI.KEYID = 6
3,792,192 UART: [idev] SUBJECT.KEYID = 7
3,793,374 UART: [idev] UDS.KEYID = 0
3,794,305 ready_for_fw is high
3,794,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,494 UART: [idev] Erasing UDS.KEYID = 0
6,274,670 UART: [idev] Sha1 KeyId Algorithm
6,299,520 UART: [idev] --
6,304,457 UART: [ldev] ++
6,305,042 UART: [ldev] CDI.KEYID = 6
6,306,130 UART: [ldev] SUBJECT.KEYID = 5
6,307,243 UART: [ldev] AUTHORITY.KEYID = 7
6,308,421 UART: [ldev] FE.KEYID = 1
6,319,012 UART: [ldev] Erasing FE.KEYID = 1
8,795,925 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,208 UART: [ldev] --
10,588,450 UART: [fwproc] Wait for Commands...
10,590,438 UART: [fwproc] Recv command 0x46574c44
10,592,426 UART: [fwproc] Recv'd Img size: 118548 bytes
14,081,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,184 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,564,914 >>> mbox cmd response: success
14,568,847 UART: [afmc] ++
14,569,495 UART: [afmc] CDI.KEYID = 6
14,570,410 UART: [afmc] SUBJECT.KEYID = 7
14,571,635 UART: [afmc] AUTHORITY.KEYID = 5
17,077,701 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,251 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,252 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,338 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,914 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,184 UART: [afmc] --
18,877,270 UART: [cold-reset] --
18,882,799 UART: [state] Locking Datavault
18,887,942 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,703 UART: [state] Locking ICCM
18,891,985 UART: [exit] Launching FMC @ 0x40000130
18,900,393 UART:
18,900,631 UART: Running Caliptra FMC ...
18,901,734 UART:
18,901,893 UART: [state] CFI Enabled
18,910,103 UART: [fht] FMC Alias Private Key: 7
20,676,772 UART: [art] Extend RT PCRs Done
20,677,996 UART: [art] Lock RT PCRs Done
20,679,618 UART: [art] Populate DV Done
20,684,885 UART: [fht] FMC Alias Private Key: 7
20,686,535 UART: [art] Derive CDI
20,687,352 UART: [art] Store in slot 0x4
20,729,850 UART: [art] Derive Key Pair
20,730,853 UART: [art] Store priv key in slot 0x5
23,157,265 UART: [art] Derive Key Pair - Done
23,170,007 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,645 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,149 UART: [art] PUB.X = 2D2DDCB135052EA826DB53751AE85F00A61FEE1EB6146F06D25A67513B3F3900ECA501B93F00268D3657A5DF022E0652
24,885,403 UART: [art] PUB.Y = 2E93E6A91842B87E0C054D3FD18D8688F9C2137601BDAFE4904A698F4F3ECA4938045853F6954A3F80E24038492CF96F
24,892,637 UART: [art] SIG.R = ADE6C4EA40EE300A4C3668DF7C55B5F1EFACDCBF41216E22BF1FF7425E38C01F45C314964ED633EBAC6ABAA178053CA9
24,900,031 UART: [art] SIG.S = FA1CC75237D4176A68F5B0DF067F718276C869F71487CC450A739EA8CD7740EA2EB1EA40AA147891ACC92C68481B9557
25,879,141 UART: Caliptra RT
25,879,843 UART: [state] CFI Enabled
26,011,716 UART: [rt] RT listening for mailbox commands...
26,013,611 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,044,137 UART: [rt]cmd =0x53574545, len=84
26,047,552 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,758 writing to cptra_bootfsm_go
3,785,649 ready_for_fw is high
3,786,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,201 >>> mbox cmd response: success
18,705,695 UART:
18,706,108 UART: Running Caliptra FMC ...
18,707,228 UART:
18,707,383 UART: [state] CFI Enabled
18,715,366 UART: [fht] FMC Alias Private Key: 7
20,481,216 UART: [art] Extend RT PCRs Done
20,482,551 UART: [art] Lock RT PCRs Done
20,484,042 UART: [art] Populate DV Done
20,489,579 UART: [fht] FMC Alias Private Key: 7
20,491,283 UART: [art] Derive CDI
20,492,020 UART: [art] Store in slot 0x4
20,534,829 UART: [art] Derive Key Pair
20,535,833 UART: [art] Store priv key in slot 0x5
22,962,642 UART: [art] Derive Key Pair - Done
22,975,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,541 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,044 UART: [art] PUB.X = 82121BD6F9809CA1DF930744D5C35502BF0B2EB777E9641A06A0F01082D036C264CB4E6701EA7FCFF84B439CCD3A87D4
24,691,362 UART: [art] PUB.Y = 19B0A2F5AE4F7D13AE2812B860F9A15CCD737CEB055DF728E80A96D75348791679244EE6C291F765F78DE880FBE45D5F
24,698,620 UART: [art] SIG.R = 33D53721FBFEF876BC5A44369C4C085D6F3F309BC709752D377E8937383B3D58940C8719B19160F36ECC4CDA0B5635A0
24,705,964 UART: [art] SIG.S = 9CF7BBEA262CE2368724687351EB9ECEBB1B3E16AB008E34CA1649CD1B4A7AC22AF7CF50A1B6CE73F3842492576EF825
25,685,261 UART: Caliptra RT
25,685,968 UART: [state] CFI Enabled
25,819,540 UART: [rt] RT listening for mailbox commands...
25,821,429 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
25,851,847 UART: [rt]cmd =0x53574545, len=84
25,855,253 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,109 UART:
192,471 UART: Running Caliptra ROM ...
193,573 UART:
193,713 UART: [state] CFI Enabled
259,796 UART: [state] LifecycleState = Unprovisioned
261,861 UART: [state] DebugLocked = No
263,664 UART: [state] WD Timer not started. Device not locked for debugging
267,770 UART: [kat] SHA2-256
457,634 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,393 UART: [kat] ++
468,840 UART: [kat] sha1
480,703 UART: [kat] SHA2-256
483,711 UART: [kat] SHA2-384
489,198 UART: [kat] SHA2-512-ACC
491,794 UART: [kat] ECC-384
2,944,526 UART: [kat] HMAC-384Kdf
2,970,465 UART: [kat] LMS
3,502,207 UART: [kat] --
3,508,464 UART: [cold-reset] ++
3,509,818 UART: [fht] FHT @ 0x50003400
3,521,565 UART: [idev] ++
3,522,199 UART: [idev] CDI.KEYID = 6
3,523,173 UART: [idev] SUBJECT.KEYID = 7
3,524,413 UART: [idev] UDS.KEYID = 0
3,525,332 ready_for_fw is high
3,525,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,567 UART: [idev] Erasing UDS.KEYID = 0
6,051,945 UART: [idev] Sha1 KeyId Algorithm
6,073,500 UART: [idev] --
6,078,656 UART: [ldev] ++
6,079,413 UART: [ldev] CDI.KEYID = 6
6,080,298 UART: [ldev] SUBJECT.KEYID = 5
6,081,455 UART: [ldev] AUTHORITY.KEYID = 7
6,082,687 UART: [ldev] FE.KEYID = 1
6,120,042 UART: [ldev] Erasing FE.KEYID = 1
8,628,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,361,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,376,389 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,391,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,406,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,427,287 UART: [ldev] --
10,432,654 UART: [fwproc] Wait for Commands...
10,435,555 UART: [fwproc] Recv command 0x46574c44
10,437,865 UART: [fwproc] Recv'd Img size: 118548 bytes
13,927,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,001,193 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,813 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,685,661 >>> mbox cmd response: success
14,689,535 UART: [afmc] ++
14,690,257 UART: [afmc] CDI.KEYID = 6
14,691,452 UART: [afmc] SUBJECT.KEYID = 7
14,692,902 UART: [afmc] AUTHORITY.KEYID = 5
17,233,587 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,757 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,304 UART: [afmc] --
19,034,179 UART: [cold-reset] --
19,039,031 UART: [state] Locking Datavault
19,045,531 UART: [state] Locking PCR0, PCR1 and PCR31
19,047,755 UART: [state] Locking ICCM
19,050,718 UART: [exit] Launching FMC @ 0x40000130
19,059,393 UART:
19,059,635 UART: Running Caliptra FMC ...
19,060,741 UART:
19,060,907 UART: [state] CFI Enabled
19,117,756 UART: [fht] FMC Alias Private Key: 7
20,884,329 UART: [art] Extend RT PCRs Done
20,885,553 UART: [art] Lock RT PCRs Done
20,887,236 UART: [art] Populate DV Done
20,892,210 UART: [fht] FMC Alias Private Key: 7
20,893,961 UART: [art] Derive CDI
20,894,774 UART: [art] Store in slot 0x4
20,950,518 UART: [art] Derive Key Pair
20,951,565 UART: [art] Store priv key in slot 0x5
23,427,017 UART: [art] Derive Key Pair - Done
23,439,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,825 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,369 UART: [art] PUB.X = D896EFE8E8219EE0DB7FE335AA7C42DA81F135B5C371AC15AE730A502E492A55C4B1C66186A9AF0D4FD1A43365B6F0DE
25,161,632 UART: [art] PUB.Y = D9204D9BDAB04C20766C5CF30D503A4324CDBD003E0FCE4D9C1701C8AF2856A107BD4E9A1E40F006728B4AEEDFEB2D78
25,168,881 UART: [art] SIG.R = 6077EF0BD9434972A8B35EB4F28C0B9473DBC65615E8E9D3BDAEBE5AA027A4EE51695E3BD653823F2F3D5B61FE1DB8F6
25,176,306 UART: [art] SIG.S = A11D68BFC6086B0B61E70D5CBFF74E01825E69F3DC08C226D568EF836400D79D645CADC1658B4A1DD2508E1E92FE01CD
26,155,379 UART: Caliptra RT
26,156,065 UART: [state] CFI Enabled
26,335,036 UART: [rt] RT listening for mailbox commands...
26,336,930 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,367,580 UART: [rt]cmd =0x53574545, len=84
26,371,494 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,436,731 ready_for_fw is high
3,437,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,858 >>> mbox cmd response: success
19,136,758 UART:
19,137,192 UART: Running Caliptra FMC ...
19,138,335 UART:
19,138,497 UART: [state] CFI Enabled
19,203,111 UART: [fht] FMC Alias Private Key: 7
20,969,337 UART: [art] Extend RT PCRs Done
20,970,562 UART: [art] Lock RT PCRs Done
20,972,083 UART: [art] Populate DV Done
20,977,451 UART: [fht] FMC Alias Private Key: 7
20,978,990 UART: [art] Derive CDI
20,979,801 UART: [art] Store in slot 0x4
21,035,601 UART: [art] Derive Key Pair
21,036,646 UART: [art] Store priv key in slot 0x5
23,499,716 UART: [art] Derive Key Pair - Done
23,512,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,864 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,372 UART: [art] PUB.X = 1588394A756668E1D3720D7F77DD45453D8F7F9059321369F7988BEE30AFEEF58AB77F0B9AF0E7CFA0DFA63C011764FB
25,233,682 UART: [art] PUB.Y = A1B3B9CD0EB9555FE33CCFA97461856E239D36EED0D87256D8EAE969F104B8FBD8592A217D7287DB0A9417FF47BE7C1B
25,240,934 UART: [art] SIG.R = 4CE1AB6E719190E6B702DE78DC89084C9BCC0C99DE796111188F718AC8CDEFF286A4C18EA83C16BD669BB4D2C37352BC
25,248,300 UART: [art] SIG.S = CAC62E78A9AB275FAB078400842C54FC37F2CBAD9C8D6FB39783525C66F96E544F5DA5C0F44E7FBA628244F16394D7C3
26,227,158 UART: Caliptra RT
26,227,847 UART: [state] CFI Enabled
26,407,429 UART: [rt] RT listening for mailbox commands...
26,409,360 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,439,948 UART: [rt]cmd =0x53574545, len=84
26,443,486 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,493 UART:
192,865 UART: Running Caliptra ROM ...
194,064 UART:
603,674 UART: [state] CFI Enabled
621,010 UART: [state] LifecycleState = Unprovisioned
623,350 UART: [state] DebugLocked = No
625,250 UART: [state] WD Timer not started. Device not locked for debugging
629,031 UART: [kat] SHA2-256
818,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,692 UART: [kat] ++
830,218 UART: [kat] sha1
841,943 UART: [kat] SHA2-256
844,957 UART: [kat] SHA2-384
850,667 UART: [kat] SHA2-512-ACC
853,252 UART: [kat] ECC-384
3,293,327 UART: [kat] HMAC-384Kdf
3,305,419 UART: [kat] LMS
3,837,210 UART: [kat] --
3,840,479 UART: [cold-reset] ++
3,842,696 UART: [fht] FHT @ 0x50003400
3,854,173 UART: [idev] ++
3,854,947 UART: [idev] CDI.KEYID = 6
3,855,879 UART: [idev] SUBJECT.KEYID = 7
3,857,004 UART: [idev] UDS.KEYID = 0
3,857,962 ready_for_fw is high
3,858,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,972 UART: [idev] Erasing UDS.KEYID = 0
6,335,318 UART: [idev] Sha1 KeyId Algorithm
6,357,794 UART: [idev] --
6,362,655 UART: [ldev] ++
6,363,338 UART: [ldev] CDI.KEYID = 6
6,364,220 UART: [ldev] SUBJECT.KEYID = 5
6,365,431 UART: [ldev] AUTHORITY.KEYID = 7
6,366,667 UART: [ldev] FE.KEYID = 1
6,378,103 UART: [ldev] Erasing FE.KEYID = 1
8,858,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,299 UART: [ldev] --
10,651,322 UART: [fwproc] Wait for Commands...
10,653,467 UART: [fwproc] Recv command 0x46574c44
10,655,828 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,337 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,983 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,916,771 >>> mbox cmd response: success
14,920,457 UART: [afmc] ++
14,921,186 UART: [afmc] CDI.KEYID = 6
14,922,387 UART: [afmc] SUBJECT.KEYID = 7
14,923,836 UART: [afmc] AUTHORITY.KEYID = 5
17,424,206 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,764 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,739 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,175,007 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,887 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,213,096 UART: [afmc] --
19,215,846 UART: [cold-reset] --
19,219,709 UART: [state] Locking Datavault
19,223,583 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,745 UART: [state] Locking ICCM
19,227,945 UART: [exit] Launching FMC @ 0x40000130
19,236,633 UART:
19,236,869 UART: Running Caliptra FMC ...
19,237,898 UART:
19,238,051 UART: [state] CFI Enabled
19,245,999 UART: [fht] FMC Alias Private Key: 7
21,012,414 UART: [art] Extend RT PCRs Done
21,013,641 UART: [art] Lock RT PCRs Done
21,015,624 UART: [art] Populate DV Done
21,021,168 UART: [fht] FMC Alias Private Key: 7
21,022,657 UART: [art] Derive CDI
21,023,399 UART: [art] Store in slot 0x4
21,066,482 UART: [art] Derive Key Pair
21,067,526 UART: [art] Store priv key in slot 0x5
23,494,342 UART: [art] Derive Key Pair - Done
23,507,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,014 UART: [art] PUB.X = FD0C22B3A9D645228A2DA1860D80E6CEB88A0BC07DC08FDD8A9009B2EA742512D54250B0330C5A5EFAAA7C954F7C70AC
25,222,173 UART: [art] PUB.Y = 21FD71CB7F15F9281E0DF55CA8D435A37723FBE30786CC6EAD4D702C354CC8CF49D31374993D058DD736DF013C892D39
25,229,442 UART: [art] SIG.R = 440C15CFF45ED0401338B351F8AAF533C0DBC7E114CC43D7855AE3A70FDAA9B03CEDFEDAAF616BEF4D67EBB1AD79933F
25,236,869 UART: [art] SIG.S = C55210FC994BC95B7F21F1971ECB9375705D588541B6C2C85B9278DDCF09D70F88478DE312E33C398A7AC6AD3769ABDC
26,215,411 UART: Caliptra RT
26,216,122 UART: [state] CFI Enabled
26,349,561 UART: [rt] RT listening for mailbox commands...
26,351,453 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,381,907 UART: [rt]cmd =0x53574545, len=84
26,385,721 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,753,159 ready_for_fw is high
3,753,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,054,037 >>> mbox cmd response: success
19,303,814 UART:
19,304,279 UART: Running Caliptra FMC ...
19,305,395 UART:
19,305,581 UART: [state] CFI Enabled
19,313,366 UART: [fht] FMC Alias Private Key: 7
21,079,682 UART: [art] Extend RT PCRs Done
21,080,914 UART: [art] Lock RT PCRs Done
21,082,552 UART: [art] Populate DV Done
21,088,257 UART: [fht] FMC Alias Private Key: 7
21,089,922 UART: [art] Derive CDI
21,090,746 UART: [art] Store in slot 0x4
21,133,790 UART: [art] Derive Key Pair
21,134,834 UART: [art] Store priv key in slot 0x5
23,561,683 UART: [art] Derive Key Pair - Done
23,574,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,931 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,434 UART: [art] PUB.X = EE75C7DF293F998E7ADF598581A633DBC384BA1080887F5355A79216367194237E1389B942880DDB7578D8BC85A58861
25,289,702 UART: [art] PUB.Y = EE36D921A858DCD4FBF8F70B991A71A79634E3F53F41D1BDC556A8AC459EABE8F622871AD9DB34EC23FC1D2948993809
25,296,923 UART: [art] SIG.R = FE3ECFD5A6F340CA33A2A92664F0702CEC4944394497E8313094DE8332E045258EBE540F72F0BE9C426D609DC69AF8DC
25,304,347 UART: [art] SIG.S = 63E5E43A0DE866A2B5011691BF61F82CB19F92D33D3FA4A7FD4E9915A8B1652D04D13C2D0AB3B293DBC7645305C5C885
26,283,076 UART: Caliptra RT
26,283,775 UART: [state] CFI Enabled
26,416,494 UART: [rt] RT listening for mailbox commands...
26,418,398 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
26,448,989 UART: [rt]cmd =0x53574545, len=84
26,452,533 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,594 UART: [kat] HMAC-384Kdf
907,196 UART: [kat] LMS
1,475,392 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,476,813 UART: [fht] Storing FHT @ 0x50003400
1,479,712 UART: [idev] ++
1,479,880 UART: [idev] CDI.KEYID = 6
1,480,240 UART: [idev] SUBJECT.KEYID = 7
1,480,664 UART: [idev] UDS.KEYID = 0
1,481,009 ready_for_fw is high
1,481,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,466 UART: [idev] Erasing UDS.KEYID = 0
1,504,968 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,556 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,520,933 UART: [ldev] Erasing FE.KEYID = 1
1,546,706 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,310 UART: [ldev] --
1,585,745 UART: [fwproc] Waiting for Commands...
1,586,392 UART: [fwproc] Received command 0x46574c44
1,587,183 UART: [fwproc] Received Image of size 118548 bytes
2,931,453 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,239 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,457 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,798 >>> mbox cmd response: success
3,130,836 UART: [afmc] ++
3,131,004 UART: [afmc] CDI.KEYID = 6
3,131,366 UART: [afmc] SUBJECT.KEYID = 7
3,131,791 UART: [afmc] AUTHORITY.KEYID = 5
3,166,830 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,066 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,658 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,341 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,041 UART: [afmc] --
3,209,959 UART: [cold-reset] --
3,210,655 UART: [state] Locking Datavault
3,211,780 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,384 UART: [state] Locking ICCM
3,212,926 UART: [exit] Launching FMC @ 0x40000130
3,218,256 UART:
3,218,272 UART: Running Caliptra FMC ...
3,218,680 UART:
3,218,734 UART: [state] CFI Enabled
3,229,508 UART: [fht] FMC Alias Private Key: 7
3,347,800 UART: [art] Extend RT PCRs Done
3,348,228 UART: [art] Lock RT PCRs Done
3,349,700 UART: [art] Populate DV Done
3,357,863 UART: [fht] FMC Alias Private Key: 7
3,358,981 UART: [art] Derive CDI
3,359,261 UART: [art] Store in slot 0x4
3,445,197 UART: [art] Derive Key Pair
3,445,557 UART: [art] Store priv key in slot 0x5
3,458,898 UART: [art] Derive Key Pair - Done
3,473,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,906 UART: [art] PUB.X = 41053B8563F72E11484807EF83934242690383227CD0EC6DE613298F7F3765F738096FAC276B81C346E173861E7CCEBC
3,496,654 UART: [art] PUB.Y = B4F20F34B4139BE640A5BCF78719DFF4FB045887E44F20084E27995466C6F0D41F94E4B733843CBCA41FDDFCC4227853
3,503,601 UART: [art] SIG.R = 2E93A6F5B8ED159E23AAE7371EED95DA9B912AFFC24888EEB91E46D995F1B87E0754F362B19606F1B4410E067259E734
3,510,365 UART: [art] SIG.S = 09A56363FAECF4619D62FD71894D88FBE05095CD3F975BD72BF48D8DCE1037291FC89F778512B431EC9DD24D4E20F926
3,534,444 UART: Caliptra RT
3,534,695 UART: [state] CFI Enabled
3,655,492 UART: [rt] RT listening for mailbox commands...
3,656,162 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,336 UART: [rt]cmd =0x53574545, len=84
3,689,387 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,617 ready_for_fw is high
1,362,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,000 >>> mbox cmd response: success
3,041,691 UART:
3,041,707 UART: Running Caliptra FMC ...
3,042,115 UART:
3,042,169 UART: [state] CFI Enabled
3,052,199 UART: [fht] FMC Alias Private Key: 7
3,170,673 UART: [art] Extend RT PCRs Done
3,171,101 UART: [art] Lock RT PCRs Done
3,172,541 UART: [art] Populate DV Done
3,180,856 UART: [fht] FMC Alias Private Key: 7
3,181,836 UART: [art] Derive CDI
3,182,116 UART: [art] Store in slot 0x4
3,267,518 UART: [art] Derive Key Pair
3,267,878 UART: [art] Store priv key in slot 0x5
3,281,367 UART: [art] Derive Key Pair - Done
3,295,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,945 UART: [art] PUB.X = 54B581A15D66A2821B137F5F3500585855B8BF3B5F7D02FF2D82E0007FCEB3BB6352CA2AB3DA514E4895B47D7003EC9B
3,318,673 UART: [art] PUB.Y = FB8BCDFC1380DC3A6CDD1C790937CDE2EA73152F5BF10FF4ECD285147F9AC45E68DBF4FDE1F367F430968C90F786BCA6
3,325,643 UART: [art] SIG.R = 95E2AD8618B9AD2C3312EDEF860DDDBD9A094C2596A7A534C401EAFF0189C93DA7A06B9C05A5A7CE991A0E45FBE2C043
3,332,415 UART: [art] SIG.S = 43EE6618FD18E3E7A0BC01D3D52798514755C230AB91017F9F10F4C356BEB346E00FD500502290C42F7DD30D2D2E2188
3,356,259 UART: Caliptra RT
3,356,510 UART: [state] CFI Enabled
3,476,818 UART: [rt] RT listening for mailbox commands...
3,477,488 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,836 UART: [rt]cmd =0x53574545, len=84
3,510,847 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,484 UART: [kat] SHA2-256
882,415 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,530 UART: [kat] ++
886,682 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,607 UART: [kat] SHA2-512-ACC
897,508 UART: [kat] ECC-384
902,697 UART: [kat] HMAC-384Kdf
907,315 UART: [kat] LMS
1,475,511 UART: [kat] --
1,476,574 UART: [cold-reset] ++
1,477,044 UART: [fht] Storing FHT @ 0x50003400
1,479,919 UART: [idev] ++
1,480,087 UART: [idev] CDI.KEYID = 6
1,480,447 UART: [idev] SUBJECT.KEYID = 7
1,480,871 UART: [idev] UDS.KEYID = 0
1,481,216 ready_for_fw is high
1,481,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,859 UART: [idev] Erasing UDS.KEYID = 0
1,505,915 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,599 UART: [idev] --
1,515,448 UART: [ldev] ++
1,515,616 UART: [ldev] CDI.KEYID = 6
1,515,979 UART: [ldev] SUBJECT.KEYID = 5
1,516,405 UART: [ldev] AUTHORITY.KEYID = 7
1,516,868 UART: [ldev] FE.KEYID = 1
1,522,084 UART: [ldev] Erasing FE.KEYID = 1
1,547,625 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,397 UART: [ldev] --
1,586,710 UART: [fwproc] Waiting for Commands...
1,587,557 UART: [fwproc] Received command 0x46574c44
1,588,348 UART: [fwproc] Received Image of size 118548 bytes
2,932,358 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,368 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,586 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,997 >>> mbox cmd response: success
3,132,041 UART: [afmc] ++
3,132,209 UART: [afmc] CDI.KEYID = 6
3,132,571 UART: [afmc] SUBJECT.KEYID = 7
3,132,996 UART: [afmc] AUTHORITY.KEYID = 5
3,167,827 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,085 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,457 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,140 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,216 UART: [afmc] --
3,211,230 UART: [cold-reset] --
3,212,256 UART: [state] Locking Datavault
3,213,237 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,841 UART: [state] Locking ICCM
3,214,429 UART: [exit] Launching FMC @ 0x40000130
3,219,759 UART:
3,219,775 UART: Running Caliptra FMC ...
3,220,183 UART:
3,220,326 UART: [state] CFI Enabled
3,231,016 UART: [fht] FMC Alias Private Key: 7
3,348,948 UART: [art] Extend RT PCRs Done
3,349,376 UART: [art] Lock RT PCRs Done
3,350,984 UART: [art] Populate DV Done
3,359,227 UART: [fht] FMC Alias Private Key: 7
3,360,327 UART: [art] Derive CDI
3,360,607 UART: [art] Store in slot 0x4
3,446,543 UART: [art] Derive Key Pair
3,446,903 UART: [art] Store priv key in slot 0x5
3,460,512 UART: [art] Derive Key Pair - Done
3,475,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,782 UART: [art] PUB.X = EA95798B1DDF5D42DC3239D646BBAEDA4B6632A80B2EDF0493F114769976849D9E9FE86D7F1EFB1B8440A3DCD5B7EE2B
3,498,566 UART: [art] PUB.Y = 8617BBC3A3122E90C44BA27F572B78A7BC06D2B7AD5CD131336027DDB9A0C5E8107186CACD9C6B8620B305E9B41578EA
3,505,520 UART: [art] SIG.R = 89252C3459FFC43836E12CA8319AC8F05A439B0F67C2231B5135D7705C1F9BE70A5CED3E0166E562A2F1BC682693AB62
3,512,283 UART: [art] SIG.S = FF6C1A74718A8F3C92A1DD56F35860737555EC29493F1C860B4399AFADD559524F582B9ECCFA89E18D2C18711EBA4403
3,535,831 UART: Caliptra RT
3,536,174 UART: [state] CFI Enabled
3,655,373 UART: [rt] RT listening for mailbox commands...
3,656,043 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,425 UART: [rt]cmd =0x53574545, len=84
3,689,604 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,948 ready_for_fw is high
1,361,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,461 >>> mbox cmd response: success
3,042,874 UART:
3,042,890 UART: Running Caliptra FMC ...
3,043,298 UART:
3,043,441 UART: [state] CFI Enabled
3,054,055 UART: [fht] FMC Alias Private Key: 7
3,172,699 UART: [art] Extend RT PCRs Done
3,173,127 UART: [art] Lock RT PCRs Done
3,174,597 UART: [art] Populate DV Done
3,182,718 UART: [fht] FMC Alias Private Key: 7
3,183,746 UART: [art] Derive CDI
3,184,026 UART: [art] Store in slot 0x4
3,270,006 UART: [art] Derive Key Pair
3,270,366 UART: [art] Store priv key in slot 0x5
3,283,751 UART: [art] Derive Key Pair - Done
3,298,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,787 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,552 UART: [art] PUB.X = 5432F0258A568D57D6D95C911025BB4BAE90953509E2B5E53F1EF8DC8A007684CA556F190C72DE344BB7E3F9AC08350F
3,321,292 UART: [art] PUB.Y = DD9E55DB323719F3D5CAA0140EE2FD02468F62B39E539FD330221BF90853F2CE8CFF56E42AA7E6F77328CD1F559306D9
3,328,240 UART: [art] SIG.R = 8B8A9DB587789B4B49480C9522F25000D7EE148FB1F0754F694A7CF1DED6ACD5F092C8C29880AD2B4F8CE36DD40369C9
3,334,992 UART: [art] SIG.S = B2A6ECB5531A105D0B6952EA9DE2832E95E81E04B050D2CF189103A802091C03FD86CCF4A1CD3B261064041F34BF8AD0
3,359,223 UART: Caliptra RT
3,359,566 UART: [state] CFI Enabled
3,480,649 UART: [rt] RT listening for mailbox commands...
3,481,319 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,635 UART: [rt]cmd =0x53574545, len=84
3,514,298 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
891,024 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,128 UART: [kat] ++
895,280 UART: [kat] sha1
899,576 UART: [kat] SHA2-256
901,516 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,965 UART: [kat] HMAC-384Kdf
920,655 UART: [kat] LMS
1,168,967 UART: [kat] --
1,169,986 UART: [cold-reset] ++
1,170,558 UART: [fht] FHT @ 0x50003400
1,173,252 UART: [idev] ++
1,173,420 UART: [idev] CDI.KEYID = 6
1,173,781 UART: [idev] SUBJECT.KEYID = 7
1,174,206 UART: [idev] UDS.KEYID = 0
1,174,552 ready_for_fw is high
1,174,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,315 UART: [idev] Erasing UDS.KEYID = 0
1,198,811 UART: [idev] Sha1 KeyId Algorithm
1,207,551 UART: [idev] --
1,208,444 UART: [ldev] ++
1,208,612 UART: [ldev] CDI.KEYID = 6
1,208,976 UART: [ldev] SUBJECT.KEYID = 5
1,209,403 UART: [ldev] AUTHORITY.KEYID = 7
1,209,866 UART: [ldev] FE.KEYID = 1
1,215,352 UART: [ldev] Erasing FE.KEYID = 1
1,241,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,946 UART: [ldev] --
1,280,233 UART: [fwproc] Wait for Commands...
1,280,872 UART: [fwproc] Recv command 0x46574c44
1,281,605 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,057 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,232 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,589 >>> mbox cmd response: success
2,825,735 UART: [afmc] ++
2,825,903 UART: [afmc] CDI.KEYID = 6
2,826,266 UART: [afmc] SUBJECT.KEYID = 7
2,826,692 UART: [afmc] AUTHORITY.KEYID = 5
2,862,259 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,341 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,051 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,633 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,648 UART: [afmc] --
2,905,699 UART: [cold-reset] --
2,906,595 UART: [state] Locking Datavault
2,907,740 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,344 UART: [state] Locking ICCM
2,908,988 UART: [exit] Launching FMC @ 0x40000130
2,914,318 UART:
2,914,334 UART: Running Caliptra FMC ...
2,914,742 UART:
2,914,796 UART: [state] CFI Enabled
2,925,484 UART: [fht] FMC Alias Private Key: 7
3,044,086 UART: [art] Extend RT PCRs Done
3,044,514 UART: [art] Lock RT PCRs Done
3,046,012 UART: [art] Populate DV Done
3,054,233 UART: [fht] FMC Alias Private Key: 7
3,055,395 UART: [art] Derive CDI
3,055,675 UART: [art] Store in slot 0x4
3,141,326 UART: [art] Derive Key Pair
3,141,686 UART: [art] Store priv key in slot 0x5
3,155,146 UART: [art] Derive Key Pair - Done
3,170,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,191 UART: [art] PUB.X = FE28A738D634E7B8FFBC3124FB41276243AAD235F60ADF34D952C418FBD9A8F95175CC96C0BD0A6164374B03F57868D0
3,192,960 UART: [art] PUB.Y = 6E0447FF84D5BCD3582F438EB8997DFD0E6B36BC84DBB82BA84710EA9F22B7E490B177B372B6BFDE7CAB9D23E05F98DB
3,199,926 UART: [art] SIG.R = C40765A8B1D1B7EC89DAF2B2E64EA51FEC6AA79BBC153100FB66B8B2142308C036E433EDEDC39091E3699F36DCCA9E46
3,206,686 UART: [art] SIG.S = 29F18D09B0C3F8C351953E0A25066C4E04D4035AEE8307FBE99B30FF7A945EE511D69F8D31B2A979EAAF31C7A745EE41
3,230,580 UART: Caliptra RT
3,230,831 UART: [state] CFI Enabled
3,350,766 UART: [rt] RT listening for mailbox commands...
3,351,436 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,972 UART: [rt]cmd =0x53574545, len=84
3,384,637 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,056 ready_for_fw is high
1,059,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,362 >>> mbox cmd response: success
2,740,449 UART:
2,740,465 UART: Running Caliptra FMC ...
2,740,873 UART:
2,740,927 UART: [state] CFI Enabled
2,751,607 UART: [fht] FMC Alias Private Key: 7
2,870,475 UART: [art] Extend RT PCRs Done
2,870,903 UART: [art] Lock RT PCRs Done
2,872,855 UART: [art] Populate DV Done
2,880,862 UART: [fht] FMC Alias Private Key: 7
2,881,962 UART: [art] Derive CDI
2,882,242 UART: [art] Store in slot 0x4
2,968,001 UART: [art] Derive Key Pair
2,968,361 UART: [art] Store priv key in slot 0x5
2,981,487 UART: [art] Derive Key Pair - Done
2,996,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,707 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,472 UART: [art] PUB.X = 33F4C98DC2666A4759935466F9E987233E32AECEC3C1BBBCF4B05D583756CF7F153B58AA0B1631D33DE573DF28B2FF2F
3,019,251 UART: [art] PUB.Y = 5416A0F62A57D7EE9B335DC578F81676625F577CE6D29C1D6A982EEF7E483ED1B88B4BD5E80A0B7C477A1021901126EB
3,026,201 UART: [art] SIG.R = EA2AC386EA5D8664D3E5BC11D26640DB46440840D3F7B36D34F1C034D1A9451F1721191972856BEAADB25D5342B7FBC1
3,032,974 UART: [art] SIG.S = 3EFD9E07494D65167FB347FEFF7ED63E5F4A8120AFC903D5850413F3BFA133329D0C2BE9951C227510706AE9FD0AC187
3,056,745 UART: Caliptra RT
3,056,996 UART: [state] CFI Enabled
3,177,443 UART: [rt] RT listening for mailbox commands...
3,178,113 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,445 UART: [rt]cmd =0x53574545, len=84
3,211,300 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,887 UART: [kat] SHA2-256
901,827 UART: [kat] SHA2-384
904,668 UART: [kat] SHA2-512-ACC
906,569 UART: [kat] ECC-384
916,790 UART: [kat] HMAC-384Kdf
921,512 UART: [kat] LMS
1,169,824 UART: [kat] --
1,170,881 UART: [cold-reset] ++
1,171,377 UART: [fht] FHT @ 0x50003400
1,174,113 UART: [idev] ++
1,174,281 UART: [idev] CDI.KEYID = 6
1,174,642 UART: [idev] SUBJECT.KEYID = 7
1,175,067 UART: [idev] UDS.KEYID = 0
1,175,413 ready_for_fw is high
1,175,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,060 UART: [idev] Erasing UDS.KEYID = 0
1,200,062 UART: [idev] Sha1 KeyId Algorithm
1,208,834 UART: [idev] --
1,209,831 UART: [ldev] ++
1,209,999 UART: [ldev] CDI.KEYID = 6
1,210,363 UART: [ldev] SUBJECT.KEYID = 5
1,210,790 UART: [ldev] AUTHORITY.KEYID = 7
1,211,253 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,632 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,360 UART: [fwproc] Wait for Commands...
1,283,029 UART: [fwproc] Recv command 0x46574c44
1,283,762 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,917 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,284 >>> mbox cmd response: success
2,828,544 UART: [afmc] ++
2,828,712 UART: [afmc] CDI.KEYID = 6
2,829,075 UART: [afmc] SUBJECT.KEYID = 7
2,829,501 UART: [afmc] AUTHORITY.KEYID = 5
2,865,486 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,661 UART: [afmc] --
2,908,568 UART: [cold-reset] --
2,909,392 UART: [state] Locking Datavault
2,910,583 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,187 UART: [state] Locking ICCM
2,911,849 UART: [exit] Launching FMC @ 0x40000130
2,917,179 UART:
2,917,195 UART: Running Caliptra FMC ...
2,917,603 UART:
2,917,746 UART: [state] CFI Enabled
2,928,196 UART: [fht] FMC Alias Private Key: 7
3,047,082 UART: [art] Extend RT PCRs Done
3,047,510 UART: [art] Lock RT PCRs Done
3,048,948 UART: [art] Populate DV Done
3,056,997 UART: [fht] FMC Alias Private Key: 7
3,058,003 UART: [art] Derive CDI
3,058,283 UART: [art] Store in slot 0x4
3,143,990 UART: [art] Derive Key Pair
3,144,350 UART: [art] Store priv key in slot 0x5
3,157,496 UART: [art] Derive Key Pair - Done
3,171,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,543 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,308 UART: [art] PUB.X = F5DBFD15980925D16BFD5C1021EB7000709E3875E4EC588DA804DC6FA0DB2615D2514D6ADAA260CB857C1138120A1296
3,195,053 UART: [art] PUB.Y = E00282AE359E55C540431800EA7DAA028873B20E4D9B1FB21E4ECE66A72EC96E4952381FD9954F3BECF95E91DDEE4200
3,201,960 UART: [art] SIG.R = 77D34A41FBCF717B9E19D774C3DCDE81A172CC2BE82D6CD6A52524FD81D68CDC5B978300F6FC35E122C50CE29F403F12
3,208,721 UART: [art] SIG.S = D3FE34F52B84C80897D0BEC76E75B83F9D8F138150B63681FB9F1C7C1D652B25C8142FAC6935959B59778C09D392CA6D
3,232,821 UART: Caliptra RT
3,233,164 UART: [state] CFI Enabled
3,352,071 UART: [rt] RT listening for mailbox commands...
3,352,741 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,919 UART: [rt]cmd =0x53574545, len=84
3,386,482 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,507 ready_for_fw is high
1,059,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,491 >>> mbox cmd response: success
2,743,916 UART:
2,743,932 UART: Running Caliptra FMC ...
2,744,340 UART:
2,744,483 UART: [state] CFI Enabled
2,755,385 UART: [fht] FMC Alias Private Key: 7
2,874,319 UART: [art] Extend RT PCRs Done
2,874,747 UART: [art] Lock RT PCRs Done
2,876,209 UART: [art] Populate DV Done
2,884,592 UART: [fht] FMC Alias Private Key: 7
2,885,558 UART: [art] Derive CDI
2,885,838 UART: [art] Store in slot 0x4
2,971,765 UART: [art] Derive Key Pair
2,972,125 UART: [art] Store priv key in slot 0x5
2,985,255 UART: [art] Derive Key Pair - Done
2,999,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,795 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,560 UART: [art] PUB.X = 450612BCD7A9225A50BEB4D93214C30CADF6EA4DE3A19CC67BFAED14402FE293253269982B9894718A6BD18FF5F3F1D6
3,023,336 UART: [art] PUB.Y = F023FC957CFFB39186990159B2FEF9E6F9B0454070590994E52B7B7FA8B3487A9897357FA796A551CD2D5483FDF851CE
3,030,282 UART: [art] SIG.R = FEB60BAFB0A4AD8C50958574426E5343A3C4FD8858973143A773EC16C17131C414866CBD7D1EA4CFD2FE8DD33CDBF3E5
3,037,065 UART: [art] SIG.S = 3B014E92A52897D07EEB0E1446209430B15F7D58F414669E8120EA7DFE6F4BA62B2074CECE7752F7E138585C9026E634
3,061,439 UART: Caliptra RT
3,061,782 UART: [state] CFI Enabled
3,182,117 UART: [rt] RT listening for mailbox commands...
3,182,787 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,961 UART: [rt]cmd =0x53574545, len=84
3,215,954 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,788 UART: [state] LifecycleState = Unprovisioned
85,443 UART: [state] DebugLocked = No
85,989 UART: [state] WD Timer not started. Device not locked for debugging
87,234 UART: [kat] SHA2-256
892,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,009 UART: [kat] ++
897,161 UART: [kat] sha1
901,371 UART: [kat] SHA2-256
903,311 UART: [kat] SHA2-384
906,042 UART: [kat] SHA2-512-ACC
907,943 UART: [kat] ECC-384
917,502 UART: [kat] HMAC-384Kdf
922,156 UART: [kat] LMS
1,170,484 UART: [kat] --
1,171,079 UART: [cold-reset] ++
1,171,483 UART: [fht] FHT @ 0x50003400
1,174,038 UART: [idev] ++
1,174,206 UART: [idev] CDI.KEYID = 6
1,174,566 UART: [idev] SUBJECT.KEYID = 7
1,174,990 UART: [idev] UDS.KEYID = 0
1,175,335 ready_for_fw is high
1,175,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,674 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,119 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,626 UART: [ldev] SUBJECT.KEYID = 5
1,210,052 UART: [ldev] AUTHORITY.KEYID = 7
1,210,515 UART: [ldev] FE.KEYID = 1
1,215,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,094 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,563 UART: [ldev] --
1,281,978 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,452 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,636 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,841 >>> mbox cmd response: success
2,827,879 UART: [afmc] ++
2,828,047 UART: [afmc] CDI.KEYID = 6
2,828,409 UART: [afmc] SUBJECT.KEYID = 7
2,828,834 UART: [afmc] AUTHORITY.KEYID = 5
2,864,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,176 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,633 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,516 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,217 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,135 UART: [afmc] --
2,908,081 UART: [cold-reset] --
2,908,983 UART: [state] Locking Datavault
2,910,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,790 UART: [state] Locking ICCM
2,911,448 UART: [exit] Launching FMC @ 0x40000130
2,916,778 UART:
2,916,794 UART: Running Caliptra FMC ...
2,917,202 UART:
2,917,256 UART: [state] CFI Enabled
2,927,858 UART: [fht] FMC Alias Private Key: 7
3,046,712 UART: [art] Extend RT PCRs Done
3,047,140 UART: [art] Lock RT PCRs Done
3,048,796 UART: [art] Populate DV Done
3,057,041 UART: [fht] FMC Alias Private Key: 7
3,058,029 UART: [art] Derive CDI
3,058,309 UART: [art] Store in slot 0x4
3,143,910 UART: [art] Derive Key Pair
3,144,270 UART: [art] Store priv key in slot 0x5
3,157,424 UART: [art] Derive Key Pair - Done
3,172,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,377 UART: [art] PUB.X = B6F3D79B9825274CD6886AEF5999A76B4824BF6B015BF78FAC5BD89AC9BC50B89800D700C233D293FFA08EFF69E19939
3,195,110 UART: [art] PUB.Y = E04662A6FBB7ED622B1C69203FE8E19989D301B1B3C333134DCA3CD720719D3BB31EFF12192385A90F2BE06F18CB7A79
3,202,062 UART: [art] SIG.R = 61E176F47ED80F972BE481432D3DA8604AD8BC24F259CDE5F47FD8B0BE5F29E8BC82FB2AA3477EAAF12D34E89002DD87
3,208,844 UART: [art] SIG.S = 6B448F8F21FC2AD1906368EADB19203635DBC779691CEF913D81B319749462DC72C315E23FC2A7C7A5F4AD4A3017E780
3,232,644 UART: Caliptra RT
3,232,895 UART: [state] CFI Enabled
3,352,629 UART: [rt] RT listening for mailbox commands...
3,353,299 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,657 UART: [rt]cmd =0x53574545, len=84
3,386,972 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,241 ready_for_fw is high
1,060,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,584 >>> mbox cmd response: success
2,740,549 UART:
2,740,565 UART: Running Caliptra FMC ...
2,740,973 UART:
2,741,027 UART: [state] CFI Enabled
2,751,195 UART: [fht] FMC Alias Private Key: 7
2,870,407 UART: [art] Extend RT PCRs Done
2,870,835 UART: [art] Lock RT PCRs Done
2,872,481 UART: [art] Populate DV Done
2,880,750 UART: [fht] FMC Alias Private Key: 7
2,881,854 UART: [art] Derive CDI
2,882,134 UART: [art] Store in slot 0x4
2,968,271 UART: [art] Derive Key Pair
2,968,631 UART: [art] Store priv key in slot 0x5
2,981,855 UART: [art] Derive Key Pair - Done
2,996,640 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,939 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,704 UART: [art] PUB.X = 0BD7C20D716C1258663190018F3F2DB4BCFB7B77A2199A8C7489EADC1A6779919C5125D47C3FA88AB78AE06393D30B08
3,019,463 UART: [art] PUB.Y = 677505BD5316636A1B6310DCFFF8180D4EB8CF7E282B927E014594D2CE0594FCDEF4208A470A9BCC562CBD9EFDAC29C7
3,026,414 UART: [art] SIG.R = 8D6A3DB8217052421F680A55C95F7610EE6126E7A42AC68AA7A4729C8DAA64C3EBEBB4BAE787A0A19D64D0CB32D67891
3,033,193 UART: [art] SIG.S = 9D88767201C94091375D0C8A1072659DC9DDC1C5D8F7C318DE3D84A5B75741D643643F1089B56832F906892875411BD5
3,057,458 UART: Caliptra RT
3,057,709 UART: [state] CFI Enabled
3,178,137 UART: [rt] RT listening for mailbox commands...
3,178,807 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,215 UART: [rt]cmd =0x53574545, len=84
3,212,672 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,822 UART: [kat] SHA2-256
903,762 UART: [kat] SHA2-384
906,359 UART: [kat] SHA2-512-ACC
908,260 UART: [kat] ECC-384
918,047 UART: [kat] HMAC-384Kdf
922,643 UART: [kat] LMS
1,170,971 UART: [kat] --
1,171,578 UART: [cold-reset] ++
1,172,118 UART: [fht] FHT @ 0x50003400
1,174,707 UART: [idev] ++
1,174,875 UART: [idev] CDI.KEYID = 6
1,175,235 UART: [idev] SUBJECT.KEYID = 7
1,175,659 UART: [idev] UDS.KEYID = 0
1,176,004 ready_for_fw is high
1,176,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,821 UART: [idev] Erasing UDS.KEYID = 0
1,200,856 UART: [idev] Sha1 KeyId Algorithm
1,209,420 UART: [idev] --
1,210,462 UART: [ldev] ++
1,210,630 UART: [ldev] CDI.KEYID = 6
1,210,993 UART: [ldev] SUBJECT.KEYID = 5
1,211,419 UART: [ldev] AUTHORITY.KEYID = 7
1,211,882 UART: [ldev] FE.KEYID = 1
1,217,032 UART: [ldev] Erasing FE.KEYID = 1
1,243,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,692 UART: [ldev] --
1,282,205 UART: [fwproc] Wait for Commands...
1,282,781 UART: [fwproc] Recv command 0x46574c44
1,283,509 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,742 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,007 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,486 >>> mbox cmd response: success
2,828,550 UART: [afmc] ++
2,828,718 UART: [afmc] CDI.KEYID = 6
2,829,080 UART: [afmc] SUBJECT.KEYID = 7
2,829,505 UART: [afmc] AUTHORITY.KEYID = 5
2,864,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,145 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,893 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,602 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,485 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,186 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,956 UART: [afmc] --
2,908,074 UART: [cold-reset] --
2,908,658 UART: [state] Locking Datavault
2,909,635 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,239 UART: [state] Locking ICCM
2,910,799 UART: [exit] Launching FMC @ 0x40000130
2,916,129 UART:
2,916,145 UART: Running Caliptra FMC ...
2,916,553 UART:
2,916,696 UART: [state] CFI Enabled
2,927,088 UART: [fht] FMC Alias Private Key: 7
3,045,642 UART: [art] Extend RT PCRs Done
3,046,070 UART: [art] Lock RT PCRs Done
3,047,588 UART: [art] Populate DV Done
3,055,845 UART: [fht] FMC Alias Private Key: 7
3,057,015 UART: [art] Derive CDI
3,057,295 UART: [art] Store in slot 0x4
3,142,650 UART: [art] Derive Key Pair
3,143,010 UART: [art] Store priv key in slot 0x5
3,155,746 UART: [art] Derive Key Pair - Done
3,170,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,160 UART: [art] PUB.X = B46686897F9A6C1550D6E142F9B26408E8AE585EAB48384A24DBC4BDB590502821011C8C5269539D3593340D7FC62BA3
3,192,917 UART: [art] PUB.Y = FD05400E7389F42B71F495B0A7C2340C210B2F4AEF0E83E08905FA9E0FB29BA8ACA773A9AB53E16D957C5E931099AFC4
3,199,858 UART: [art] SIG.R = EEDD0CE0DAFB67BCD4FBB9195A53B5D9C0BE0E5B0559226166CFF62F488FE48B545E684FDC120C375A440E5F5EC66D1B
3,206,637 UART: [art] SIG.S = 48ED308E3E8DDBC86B5D1A7639FF4259030A835E4A8FD5D357BF39ECBBD8DF364ACFB30E69557D7ECDB0E9DB661AD4C1
3,230,794 UART: Caliptra RT
3,231,137 UART: [state] CFI Enabled
3,350,126 UART: [rt] RT listening for mailbox commands...
3,350,796 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,356 UART: [rt]cmd =0x53574545, len=84
3,384,385 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,612 ready_for_fw is high
1,060,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,653 >>> mbox cmd response: success
2,744,662 UART:
2,744,678 UART: Running Caliptra FMC ...
2,745,086 UART:
2,745,229 UART: [state] CFI Enabled
2,756,091 UART: [fht] FMC Alias Private Key: 7
2,875,595 UART: [art] Extend RT PCRs Done
2,876,023 UART: [art] Lock RT PCRs Done
2,877,825 UART: [art] Populate DV Done
2,886,012 UART: [fht] FMC Alias Private Key: 7
2,887,004 UART: [art] Derive CDI
2,887,284 UART: [art] Store in slot 0x4
2,973,261 UART: [art] Derive Key Pair
2,973,621 UART: [art] Store priv key in slot 0x5
2,986,547 UART: [art] Derive Key Pair - Done
3,001,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,969 UART: [art] PUB.X = AED0F542FEF2673921CC000D9BD94AE2BCA383D2041C1553E534836FECE72FADB499E953C2F904F15372EB814C35EB6A
3,024,722 UART: [art] PUB.Y = ECE11F510FB794C6A4CDF8F752A9D889F53ECFCA203CE98EB0801CF9318DC142DC9671C0AF343EC2D9F9228E3A046177
3,031,682 UART: [art] SIG.R = 42707D94B2639B5BA2C8B31F10DF374A7513CB074B286A09B42771FCB74D5A25770682F55E577DD73FB6CB71BF34680A
3,038,442 UART: [art] SIG.S = 23EB96FBB4D935A2156A454088309597FBF6196981B91F61BE67C983FF8F5BBF8A9D7DF0FB17F9334282E3E4DDDC8643
3,062,574 UART: Caliptra RT
3,062,917 UART: [state] CFI Enabled
3,182,037 UART: [rt] RT listening for mailbox commands...
3,182,707 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,783 UART: [rt]cmd =0x53574545, len=84
3,215,682 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_exported_never_derived ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,211 UART:
193,221 UART: Running Caliptra ROM ...
194,355 UART:
194,505 UART: [state] CFI Enabled
254,043 UART: [state] LifecycleState = Unprovisioned
256,382 UART: [state] DebugLocked = No
258,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,907 UART: [kat] SHA2-256
432,594 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,107 UART: [kat] ++
443,597 UART: [kat] sha1
454,963 UART: [kat] SHA2-256
457,627 UART: [kat] SHA2-384
463,057 UART: [kat] SHA2-512-ACC
465,460 UART: [kat] ECC-384
2,760,556 UART: [kat] HMAC-384Kdf
2,773,034 UART: [kat] LMS
3,963,328 UART: [kat] --
3,970,106 UART: [cold-reset] ++
3,971,125 UART: [fht] Storing FHT @ 0x50003400
3,982,889 UART: [idev] ++
3,983,447 UART: [idev] CDI.KEYID = 6
3,984,429 UART: [idev] SUBJECT.KEYID = 7
3,985,596 UART: [idev] UDS.KEYID = 0
3,986,614 ready_for_fw is high
3,986,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,041 UART: [idev] Erasing UDS.KEYID = 0
7,317,441 UART: [idev] Using Sha1 for KeyId Algorithm
7,338,914 UART: [idev] --
7,343,462 UART: [ldev] ++
7,344,033 UART: [ldev] CDI.KEYID = 6
7,345,016 UART: [ldev] SUBJECT.KEYID = 5
7,346,180 UART: [ldev] AUTHORITY.KEYID = 7
7,347,469 UART: [ldev] FE.KEYID = 1
7,374,443 UART: [ldev] Erasing FE.KEYID = 1
10,704,857 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
12,998,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,012,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,027,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,042,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,061,853 UART: [ldev] --
13,065,986 UART: [fwproc] Waiting for Commands...
13,068,464 UART: [fwproc] Received command 0x46574c44
13,070,646 UART: [fwproc] Received Image of size 118548 bytes
17,166,903 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,242,278 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,315,407 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,643,828 >>> mbox cmd response: success
17,647,133 UART: [afmc] ++
17,647,755 UART: [afmc] CDI.KEYID = 6
17,648,681 UART: [afmc] SUBJECT.KEYID = 7
17,649,897 UART: [afmc] AUTHORITY.KEYID = 5
21,018,156 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,317,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,319,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,334,133 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,348,863 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,363,298 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,383,528 UART: [afmc] --
23,387,445 UART: [cold-reset] --
23,391,363 UART: [state] Locking Datavault
23,396,346 UART: [state] Locking PCR0, PCR1 and PCR31
23,398,098 UART: [state] Locking ICCM
23,400,741 UART: [exit] Launching FMC @ 0x40000130
23,409,137 UART:
23,409,372 UART: Running Caliptra FMC ...
23,410,475 UART:
23,410,636 UART: [state] CFI Enabled
23,479,343 UART: [fht] FMC Alias Private Key: 7
25,819,992 UART: [art] Extend RT PCRs Done
25,821,239 UART: [art] Lock RT PCRs Done
25,822,731 UART: [art] Populate DV Done
25,828,094 UART: [fht] FMC Alias Private Key: 7
25,829,816 UART: [art] Derive CDI
25,830,591 UART: [art] Store in slot 0x4
25,887,415 UART: [art] Derive Key Pair
25,888,414 UART: [art] Store priv key in slot 0x5
29,180,642 UART: [art] Derive Key Pair - Done
29,193,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,480,555 UART: [art] Erasing AUTHORITY.KEYID = 7
31,482,058 UART: [art] PUB.X = 3D39B53B957DBACADF06875D36962269C7C8355118207DF07B4C7BCF422082D109242F20DAA91042F8E2C278B81150A1
31,489,302 UART: [art] PUB.Y = 9F9921C2A9B6E27C11F17EB589A9EC11833383FC380B46D215BA1DF4B386017D6647355D646305C048DB70236F7D0AD5
31,496,528 UART: [art] SIG.R = A26871F09DBDEE77A4777815DC6A53CB0D1092F943C25176D0AA44D532E9DBB0AB40FD786AD722504EE5514F98FEDC6B
31,503,914 UART: [art] SIG.S = 4965B4B227775B6406D8B32736768E1B08AE99B9A033B8CBF40FD41596A97468BAB61DBA4897FAD95B0C26629BE934CF
32,809,368 UART: Caliptra RT
32,810,074 UART: [state] CFI Enabled
33,006,717 UART: [rt] RT listening for mailbox commands...
33,009,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,039,990 UART: [rt]cmd =0x44504543, len=96
38,820,375 >>> mbox cmd response data (6236 bytes)
38,849,557 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,880,238 UART: [rt]cmd =0x53574545, len=84
44,452,955 >>> mbox cmd response data (200 bytes)
44,839,225 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,869,737 UART: [rt]cmd =0x52564348, len=36
44,872,612 >>> mbox cmd response data (8 bytes)
44,872,967 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,903,343 UART: [rt]cmd =0x53574545, len=84
44,907,331 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,785,674 ready_for_fw is high
3,786,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,941,000 >>> mbox cmd response: success
23,635,830 UART:
23,636,290 UART: Running Caliptra FMC ...
23,637,426 UART:
23,637,588 UART: [state] CFI Enabled
23,705,427 UART: [fht] FMC Alias Private Key: 7
26,045,015 UART: [art] Extend RT PCRs Done
26,046,259 UART: [art] Lock RT PCRs Done
26,047,951 UART: [art] Populate DV Done
26,053,220 UART: [fht] FMC Alias Private Key: 7
26,054,977 UART: [art] Derive CDI
26,055,794 UART: [art] Store in slot 0x4
26,114,614 UART: [art] Derive Key Pair
26,115,614 UART: [art] Store priv key in slot 0x5
29,408,325 UART: [art] Derive Key Pair - Done
29,421,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,710,692 UART: [art] Erasing AUTHORITY.KEYID = 7
31,712,199 UART: [art] PUB.X = 8087B0F7FB8326D15D5ED0281AA7CC92B02941E4B34E8260F2BF0CE710F9B999D3565503FED5E5F97EA19A67C0A139D8
31,719,635 UART: [art] PUB.Y = 3015311F78F2F4C93D1C49DC32F38AC19782C72B5C92DA29194BA44AC660EF3A2E65F5B78F9F6C4400BEEC6D34D27845
31,726,742 UART: [art] SIG.R = 9BF93ABC5FBC489ABBB71B5C72A633A8C5A6C716A1D21A5CB25FAA15415A3A492F656F100C1F0A697271A6F7F55F8469
31,734,144 UART: [art] SIG.S = 7562A7ED6787D11F6517B3465117CFBF2C35B2C426FFCE2D54BCB2B2D28780B3531C8B310BEDBA2EE116F453251B3126
33,038,804 UART: Caliptra RT
33,039,518 UART: [state] CFI Enabled
33,219,162 UART: [rt] RT listening for mailbox commands...
33,221,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,252,088 UART: [rt]cmd =0x44504543, len=96
39,031,862 >>> mbox cmd response data (6236 bytes)
39,061,119 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
39,091,816 UART: [rt]cmd =0x53574545, len=84
44,666,293 >>> mbox cmd response data (200 bytes)
45,052,160 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
45,082,607 UART: [rt]cmd =0x52564348, len=36
45,085,757 >>> mbox cmd response data (8 bytes)
45,086,214 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
45,116,570 UART: [rt]cmd =0x53574545, len=84
45,120,441 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,367 writing to cptra_bootfsm_go
192,537 UART:
192,896 UART: Running Caliptra ROM ...
194,094 UART:
603,687 UART: [state] CFI Enabled
614,034 UART: [state] LifecycleState = Unprovisioned
615,991 UART: [state] DebugLocked = No
617,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
621,645 UART: [kat] SHA2-256
791,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
801,901 UART: [kat] ++
802,346 UART: [kat] sha1
814,492 UART: [kat] SHA2-256
817,208 UART: [kat] SHA2-384
822,907 UART: [kat] SHA2-512-ACC
825,273 UART: [kat] ECC-384
3,108,449 UART: [kat] HMAC-384Kdf
3,121,605 UART: [kat] LMS
4,311,727 UART: [kat] --
4,315,091 UART: [cold-reset] ++
4,317,373 UART: [fht] Storing FHT @ 0x50003400
4,327,352 UART: [idev] ++
4,327,989 UART: [idev] CDI.KEYID = 6
4,328,893 UART: [idev] SUBJECT.KEYID = 7
4,330,150 UART: [idev] UDS.KEYID = 0
4,331,117 ready_for_fw is high
4,331,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,153 UART: [idev] Erasing UDS.KEYID = 0
7,619,503 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,399 UART: [idev] --
7,645,147 UART: [ldev] ++
7,645,711 UART: [ldev] CDI.KEYID = 6
7,646,675 UART: [ldev] SUBJECT.KEYID = 5
7,647,880 UART: [ldev] AUTHORITY.KEYID = 7
7,649,106 UART: [ldev] FE.KEYID = 1
7,659,300 UART: [ldev] Erasing FE.KEYID = 1
10,948,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,621 UART: [ldev] --
13,311,935 UART: [fwproc] Waiting for Commands...
13,314,668 UART: [fwproc] Received command 0x46574c44
13,316,841 UART: [fwproc] Received Image of size 118548 bytes
17,417,760 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,487 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,624 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,964 >>> mbox cmd response: success
17,902,923 UART: [afmc] ++
17,903,519 UART: [afmc] CDI.KEYID = 6
17,904,487 UART: [afmc] SUBJECT.KEYID = 7
17,905,693 UART: [afmc] AUTHORITY.KEYID = 5
21,216,963 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,249 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,527,936 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,542,661 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,048 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,454 UART: [afmc] --
23,581,874 UART: [cold-reset] --
23,584,928 UART: [state] Locking Datavault
23,589,800 UART: [state] Locking PCR0, PCR1 and PCR31
23,591,493 UART: [state] Locking ICCM
23,592,555 UART: [exit] Launching FMC @ 0x40000130
23,600,949 UART:
23,601,186 UART: Running Caliptra FMC ...
23,602,286 UART:
23,602,447 UART: [state] CFI Enabled
23,610,543 UART: [fht] FMC Alias Private Key: 7
25,950,316 UART: [art] Extend RT PCRs Done
25,951,535 UART: [art] Lock RT PCRs Done
25,953,014 UART: [art] Populate DV Done
25,958,211 UART: [fht] FMC Alias Private Key: 7
25,959,903 UART: [art] Derive CDI
25,960,708 UART: [art] Store in slot 0x4
26,003,348 UART: [art] Derive Key Pair
26,004,437 UART: [art] Store priv key in slot 0x5
29,246,274 UART: [art] Derive Key Pair - Done
29,259,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,539,860 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,364 UART: [art] PUB.X = 5A5D37AFFD83723403FC7AC2E93DDBFFECDE64316FF141AABC43B7FD566B6837EC7A5AE4CFFEBD457F847CDC41ADA9B7
31,548,661 UART: [art] PUB.Y = A0F378766A9F1802D2DE7BF69740DAF4A0F9F990B6C5C20BB3B10543659AC0F0A2C796392C5BD47697CBCD3505BA834F
31,555,931 UART: [art] SIG.R = 96A56EE1FB722FB16BF46753E3E47B61B24A44B13C9F5A6437D1225DAE2513AA4745A5BC15BCC07E0A5984046FD6AF94
31,563,366 UART: [art] SIG.S = 6A8084CD04B99927BEBC2F20889615A9C55BB43FD0EF130CB882480A34ACE7A7D05E9888E0CB69598FFBCC4C0D2C8DE4
32,868,985 UART: Caliptra RT
32,869,707 UART: [state] CFI Enabled
33,002,645 UART: [rt] RT listening for mailbox commands...
33,005,097 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,035,982 UART: [rt]cmd =0x44504543, len=96
38,720,304 >>> mbox cmd response data (6236 bytes)
38,749,497 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,779,911 UART: [rt]cmd =0x53574545, len=84
44,304,733 >>> mbox cmd response data (200 bytes)
44,691,880 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,722,384 UART: [rt]cmd =0x52564348, len=36
44,725,755 >>> mbox cmd response data (8 bytes)
44,726,195 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,756,430 UART: [rt]cmd =0x53574545, len=84
44,760,316 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,165 writing to cptra_bootfsm_go
4,129,220 ready_for_fw is high
4,129,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,088 >>> mbox cmd response: success
23,807,093 UART:
23,807,485 UART: Running Caliptra FMC ...
23,808,594 UART:
23,808,744 UART: [state] CFI Enabled
23,816,477 UART: [fht] FMC Alias Private Key: 7
26,156,254 UART: [art] Extend RT PCRs Done
26,157,477 UART: [art] Lock RT PCRs Done
26,159,457 UART: [art] Populate DV Done
26,164,712 UART: [fht] FMC Alias Private Key: 7
26,166,301 UART: [art] Derive CDI
26,167,040 UART: [art] Store in slot 0x4
26,209,804 UART: [art] Derive Key Pair
26,210,844 UART: [art] Store priv key in slot 0x5
29,452,809 UART: [art] Derive Key Pair - Done
29,465,664 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,778 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,285 UART: [art] PUB.X = 3D3C623E5EE21FBEA01ECBC9593B342179C3E747D6A9FAA5F4D307692F4323542600D6CF05A624559BF3C5BA33DE0BE1
31,754,591 UART: [art] PUB.Y = 0BC072F69768E93131C6E10BBA160926075C9326AC57F560BA249DFD896D94DBF5F7BC96C4E973EA38704681F6C2A546
31,761,840 UART: [art] SIG.R = 08F82FFAC6F849022210D34D05ABF720038BCCC49B7F9CFA060DA2C659833B2F24BE5875D73E9B9846BC23C2F89CAEE0
31,769,227 UART: [art] SIG.S = E5598F1F7C434836E92ABFB89CCB308DC4FC65E96D90E4FB453781923F61F12CE394B0F3DE09E660740D8D43AEE5173F
33,074,731 UART: Caliptra RT
33,075,444 UART: [state] CFI Enabled
33,209,020 UART: [rt] RT listening for mailbox commands...
33,211,311 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,241,880 UART: [rt]cmd =0x44504543, len=96
38,925,796 >>> mbox cmd response data (6236 bytes)
38,954,973 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
38,985,683 UART: [rt]cmd =0x53574545, len=84
44,509,837 >>> mbox cmd response data (200 bytes)
44,895,896 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
44,926,135 UART: [rt]cmd =0x52564348, len=36
44,928,698 >>> mbox cmd response data (8 bytes)
44,929,044 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
44,959,505 UART: [rt]cmd =0x53574545, len=84
44,963,156 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.36s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,448 UART:
192,807 UART: Running Caliptra ROM ...
193,990 UART:
194,140 UART: [state] CFI Enabled
264,546 UART: [state] LifecycleState = Unprovisioned
266,442 UART: [state] DebugLocked = No
267,904 UART: [state] WD Timer not started. Device not locked for debugging
272,005 UART: [kat] SHA2-256
451,612 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,419 UART: [kat] ++
462,867 UART: [kat] sha1
473,171 UART: [kat] SHA2-256
475,911 UART: [kat] SHA2-384
480,903 UART: [kat] SHA2-512-ACC
483,260 UART: [kat] ECC-384
2,925,238 UART: [kat] HMAC-384Kdf
2,950,686 UART: [kat] LMS
3,427,209 UART: [kat] --
3,431,779 UART: [cold-reset] ++
3,433,500 UART: [fht] FHT @ 0x50003400
3,444,616 UART: [idev] ++
3,445,172 UART: [idev] CDI.KEYID = 6
3,446,153 UART: [idev] SUBJECT.KEYID = 7
3,447,393 UART: [idev] UDS.KEYID = 0
3,448,314 ready_for_fw is high
3,448,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,633 UART: [idev] Erasing UDS.KEYID = 0
5,967,454 UART: [idev] Sha1 KeyId Algorithm
5,990,444 UART: [idev] --
5,995,938 UART: [ldev] ++
5,996,512 UART: [ldev] CDI.KEYID = 6
5,997,420 UART: [ldev] SUBJECT.KEYID = 5
5,998,631 UART: [ldev] AUTHORITY.KEYID = 7
5,999,915 UART: [ldev] FE.KEYID = 1
6,037,833 UART: [ldev] Erasing FE.KEYID = 1
8,545,308 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,297,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,313,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,350,781 UART: [ldev] --
10,356,739 UART: [fwproc] Wait for Commands...
10,360,011 UART: [fwproc] Recv command 0x46574c44
10,361,991 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,930,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,003,924 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,331,276 >>> mbox cmd response: success
14,335,019 UART: [afmc] ++
14,335,633 UART: [afmc] CDI.KEYID = 6
14,336,658 UART: [afmc] SUBJECT.KEYID = 7
14,337,815 UART: [afmc] AUTHORITY.KEYID = 5
16,878,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,550 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,142 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,586 UART: [afmc] --
18,695,948 UART: [cold-reset] --
18,700,586 UART: [state] Locking Datavault
18,706,315 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,063 UART: [state] Locking ICCM
18,710,429 UART: [exit] Launching FMC @ 0x40000130
18,718,821 UART:
18,719,049 UART: Running Caliptra FMC ...
18,720,148 UART:
18,720,302 UART: [state] CFI Enabled
18,778,169 UART: [fht] FMC Alias Private Key: 7
20,544,737 UART: [art] Extend RT PCRs Done
20,545,960 UART: [art] Lock RT PCRs Done
20,547,368 UART: [art] Populate DV Done
20,552,722 UART: [fht] FMC Alias Private Key: 7
20,554,361 UART: [art] Derive CDI
20,555,170 UART: [art] Store in slot 0x4
20,611,335 UART: [art] Derive Key Pair
20,612,395 UART: [art] Store priv key in slot 0x5
23,075,879 UART: [art] Derive Key Pair - Done
23,088,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,801,153 UART: [art] Erasing AUTHORITY.KEYID = 7
24,802,674 UART: [art] PUB.X = A2F105FC5B4B1FA8B25E3F7B06DD5609C0F5CC3878C26A50749D779E9C8D13D53D272E8FE56A88D0291E43D2BC66517E
24,809,924 UART: [art] PUB.Y = 45724231078C7E6C4C3D517C1A6E952880012D02B792897F07246EFB98FE0CBBA2FFAC99266D20244CC676039D5FA966
24,817,158 UART: [art] SIG.R = F44C18B22D3876C55FDFD8FA15BF5D33023AA5784D1EA910E493EEE0EEFEA1332DC3C41B2E7BD1C91D43379E37BADF3B
24,824,600 UART: [art] SIG.S = ADB79F472798E783C31F262DDBACCD5EF7485619A4F65BBF51E29CB250EDBC539CD573B7DC35373A0E58BBAC6FD7E14E
25,802,799 UART: Caliptra RT
25,803,708 UART: [state] CFI Enabled
25,986,609 UART: [rt] RT listening for mailbox commands...
25,989,179 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,019,816 UART: [rt]cmd =0x44504543, len=96
30,393,482 >>> mbox cmd response data (6236 bytes)
30,422,843 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,453,473 UART: [rt]cmd =0x53574545, len=84
34,621,095 >>> mbox cmd response data (200 bytes)
35,005,753 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,036,416 UART: [rt]cmd =0x52564348, len=36
35,039,461 >>> mbox cmd response data (8 bytes)
35,039,917 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,070,281 UART: [rt]cmd =0x53574545, len=84
35,073,668 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,464,079 ready_for_fw is high
3,464,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,245,384 >>> mbox cmd response: success
18,532,342 UART:
18,532,741 UART: Running Caliptra FMC ...
18,533,882 UART:
18,534,040 UART: [state] CFI Enabled
18,601,292 UART: [fht] FMC Alias Private Key: 7
20,368,398 UART: [art] Extend RT PCRs Done
20,369,625 UART: [art] Lock RT PCRs Done
20,371,304 UART: [art] Populate DV Done
20,376,829 UART: [fht] FMC Alias Private Key: 7
20,378,524 UART: [art] Derive CDI
20,379,340 UART: [art] Store in slot 0x4
20,433,603 UART: [art] Derive Key Pair
20,434,646 UART: [art] Store priv key in slot 0x5
22,897,300 UART: [art] Derive Key Pair - Done
22,910,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,959 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,472 UART: [art] PUB.X = 0DEDD62897F5780FEC24E5D379A145A61FFBF2CA9704F9CBEC6D8DB7043B5DF7E707F51AAE7E3D9A9307400DE709D2E7
24,631,733 UART: [art] PUB.Y = B07F481ECB90FF0B02283E16EA78FA78528B160D3163CBAFC3869993BA169039BEFD18E5AC80DE7FD2F877E8DCE6601A
24,639,010 UART: [art] SIG.R = A3D074315ABA88FE79895732EC9D78449E2B2DCBD70AB18A565BFF9187EB21649834EC3117088D9E518F6FCB7BE70794
24,646,426 UART: [art] SIG.S = E80553C71A5B5F0A8E55C93B132A796BFF2B658FF68929447BE373C55E01C78C225FE37DAEA04A81DEBFD860987C186C
25,624,599 UART: Caliptra RT
25,625,320 UART: [state] CFI Enabled
25,806,102 UART: [rt] RT listening for mailbox commands...
25,808,376 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,839,205 UART: [rt]cmd =0x44504543, len=96
30,214,477 >>> mbox cmd response data (6236 bytes)
30,243,654 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,274,245 UART: [rt]cmd =0x53574545, len=84
34,441,831 >>> mbox cmd response data (200 bytes)
34,823,656 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,854,144 UART: [rt]cmd =0x52564348, len=36
34,857,449 >>> mbox cmd response data (8 bytes)
34,857,890 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,888,243 UART: [rt]cmd =0x53574545, len=84
34,891,997 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,370 UART:
192,746 UART: Running Caliptra ROM ...
193,886 UART:
603,695 UART: [state] CFI Enabled
616,964 UART: [state] LifecycleState = Unprovisioned
618,876 UART: [state] DebugLocked = No
621,766 UART: [state] WD Timer not started. Device not locked for debugging
625,308 UART: [kat] SHA2-256
804,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,713 UART: [kat] ++
816,320 UART: [kat] sha1
827,413 UART: [kat] SHA2-256
830,137 UART: [kat] SHA2-384
835,344 UART: [kat] SHA2-512-ACC
837,715 UART: [kat] ECC-384
3,280,680 UART: [kat] HMAC-384Kdf
3,294,140 UART: [kat] LMS
3,770,650 UART: [kat] --
3,775,071 UART: [cold-reset] ++
3,776,010 UART: [fht] FHT @ 0x50003400
3,788,054 UART: [idev] ++
3,788,628 UART: [idev] CDI.KEYID = 6
3,789,661 UART: [idev] SUBJECT.KEYID = 7
3,790,838 UART: [idev] UDS.KEYID = 0
3,791,765 ready_for_fw is high
3,791,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,810 UART: [idev] Erasing UDS.KEYID = 0
6,266,202 UART: [idev] Sha1 KeyId Algorithm
6,290,269 UART: [idev] --
6,294,367 UART: [ldev] ++
6,294,947 UART: [ldev] CDI.KEYID = 6
6,295,833 UART: [ldev] SUBJECT.KEYID = 5
6,297,067 UART: [ldev] AUTHORITY.KEYID = 7
6,298,311 UART: [ldev] FE.KEYID = 1
6,309,177 UART: [ldev] Erasing FE.KEYID = 1
8,791,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,930 UART: [ldev] --
10,585,605 UART: [fwproc] Wait for Commands...
10,588,079 UART: [fwproc] Recv command 0x46574c44
10,590,120 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,859 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,596 >>> mbox cmd response: success
14,553,440 UART: [afmc] ++
14,554,038 UART: [afmc] CDI.KEYID = 6
14,555,014 UART: [afmc] SUBJECT.KEYID = 7
14,556,229 UART: [afmc] AUTHORITY.KEYID = 5
17,057,594 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,075 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,261 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,163 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,830,698 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,854,740 UART: [afmc] --
18,858,906 UART: [cold-reset] --
18,863,908 UART: [state] Locking Datavault
18,871,757 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,514 UART: [state] Locking ICCM
18,876,128 UART: [exit] Launching FMC @ 0x40000130
18,884,545 UART:
18,884,787 UART: Running Caliptra FMC ...
18,885,816 UART:
18,885,966 UART: [state] CFI Enabled
18,893,908 UART: [fht] FMC Alias Private Key: 7
20,660,845 UART: [art] Extend RT PCRs Done
20,662,054 UART: [art] Lock RT PCRs Done
20,663,876 UART: [art] Populate DV Done
20,669,507 UART: [fht] FMC Alias Private Key: 7
20,671,216 UART: [art] Derive CDI
20,672,030 UART: [art] Store in slot 0x4
20,714,733 UART: [art] Derive Key Pair
20,715,770 UART: [art] Store priv key in slot 0x5
23,142,155 UART: [art] Derive Key Pair - Done
23,155,586 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,613 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,119 UART: [art] PUB.X = 133FC57FE3C2A66039C0F99B85F8E139E8270F7C802ECA260676E87B6FF289E1C709169C057F7551AE7B2559CF8F457E
24,870,420 UART: [art] PUB.Y = 997105B8C2063740D12227325E5DCF39E32D186A177532DB0D4D4FDB5A9A6C1B8F4BCB05BE4CCAF23F693DF59FF3C73E
24,877,652 UART: [art] SIG.R = E930876BC01CE4852C45973566153BF21B5928CFC387C5B0EAA20AF96B31A4DB6CC066CB70711C64B94EB4B8E483844C
24,885,050 UART: [art] SIG.S = B4B0DF1762C777E7B708F05CF6FD114EDDAAA64085B509F1BC7CDFD2F50CDF323C27819C20E09FA1242888E95E99C84D
25,863,659 UART: Caliptra RT
25,864,365 UART: [state] CFI Enabled
25,998,028 UART: [rt] RT listening for mailbox commands...
26,000,447 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,031,145 UART: [rt]cmd =0x44504543, len=96
30,327,287 >>> mbox cmd response data (6236 bytes)
30,356,467 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,387,100 UART: [rt]cmd =0x53574545, len=84
34,522,847 >>> mbox cmd response data (200 bytes)
34,907,199 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,937,584 UART: [rt]cmd =0x52564348, len=36
34,940,567 >>> mbox cmd response data (8 bytes)
34,941,022 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,971,387 UART: [rt]cmd =0x53574545, len=84
34,974,882 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
3,780,359 ready_for_fw is high
3,780,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,563 >>> mbox cmd response: success
18,703,289 UART:
18,703,683 UART: Running Caliptra FMC ...
18,704,822 UART:
18,704,989 UART: [state] CFI Enabled
18,712,806 UART: [fht] FMC Alias Private Key: 7
20,478,601 UART: [art] Extend RT PCRs Done
20,479,834 UART: [art] Lock RT PCRs Done
20,481,736 UART: [art] Populate DV Done
20,487,150 UART: [fht] FMC Alias Private Key: 7
20,488,798 UART: [art] Derive CDI
20,489,616 UART: [art] Store in slot 0x4
20,532,168 UART: [art] Derive Key Pair
20,533,203 UART: [art] Store priv key in slot 0x5
22,960,047 UART: [art] Derive Key Pair - Done
22,972,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,297 UART: [art] PUB.X = 9D573211BD8F25C6A8EC9C6C5DF642E0C31D6C23CA3102C7CEDA000C190BC4AB1EEA8220752BAE2841D923161D0C8921
24,688,583 UART: [art] PUB.Y = 23C28345C1249594F21C90BC68A116B6B6DE30AFE238FB7F9C57B627622B39A321108A22994CF5797605BAEA8ACDE4C0
24,695,793 UART: [art] SIG.R = 396EBAA15A72ABFE1A9D6A2594C776E11AFB9997C9714428F419262E3B0EAB9B245B516113EBD21920F1EDB33A58828B
24,703,203 UART: [art] SIG.S = 3AA3A066E14CB6B18FF3C5DB2CA577AF0127478746F14D9C4D73A17FB212261D03F93719AECA79C7A9A073EA95EBD928
25,682,148 UART: Caliptra RT
25,682,851 UART: [state] CFI Enabled
25,815,700 UART: [rt] RT listening for mailbox commands...
25,818,169 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,848,667 UART: [rt]cmd =0x44504543, len=96
30,143,253 >>> mbox cmd response data (6236 bytes)
30,172,411 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,202,905 UART: [rt]cmd =0x53574545, len=84
34,338,324 >>> mbox cmd response data (200 bytes)
34,721,977 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
34,752,405 UART: [rt]cmd =0x52564348, len=36
34,755,574 >>> mbox cmd response data (8 bytes)
34,756,014 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
34,786,355 UART: [rt]cmd =0x53574545, len=84
34,789,990 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,271 UART:
192,654 UART: Running Caliptra ROM ...
193,808 UART:
193,951 UART: [state] CFI Enabled
267,975 UART: [state] LifecycleState = Unprovisioned
270,372 UART: [state] DebugLocked = No
271,839 UART: [state] WD Timer not started. Device not locked for debugging
276,967 UART: [kat] SHA2-256
466,869 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,624 UART: [kat] ++
478,071 UART: [kat] sha1
490,369 UART: [kat] SHA2-256
493,373 UART: [kat] SHA2-384
500,851 UART: [kat] SHA2-512-ACC
503,433 UART: [kat] ECC-384
2,948,179 UART: [kat] HMAC-384Kdf
2,973,691 UART: [kat] LMS
3,505,521 UART: [kat] --
3,508,591 UART: [cold-reset] ++
3,509,949 UART: [fht] FHT @ 0x50003400
3,522,268 UART: [idev] ++
3,522,966 UART: [idev] CDI.KEYID = 6
3,523,992 UART: [idev] SUBJECT.KEYID = 7
3,525,108 UART: [idev] UDS.KEYID = 0
3,526,033 ready_for_fw is high
3,526,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,289 UART: [idev] Erasing UDS.KEYID = 0
6,029,716 UART: [idev] Sha1 KeyId Algorithm
6,052,839 UART: [idev] --
6,058,020 UART: [ldev] ++
6,058,700 UART: [ldev] CDI.KEYID = 6
6,059,611 UART: [ldev] SUBJECT.KEYID = 5
6,060,767 UART: [ldev] AUTHORITY.KEYID = 7
6,061,992 UART: [ldev] FE.KEYID = 1
6,100,345 UART: [ldev] Erasing FE.KEYID = 1
8,609,838 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,072 UART: [ldev] --
10,413,719 UART: [fwproc] Wait for Commands...
10,416,888 UART: [fwproc] Recv command 0x46574c44
10,419,191 UART: [fwproc] Recv'd Img size: 118548 bytes
13,916,629 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,993,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,117,549 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,450 >>> mbox cmd response: success
14,682,388 UART: [afmc] ++
14,683,092 UART: [afmc] CDI.KEYID = 6
14,684,279 UART: [afmc] SUBJECT.KEYID = 7
14,685,766 UART: [afmc] AUTHORITY.KEYID = 5
17,216,210 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,775 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,901 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,840 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,627 UART: [afmc] --
19,032,707 UART: [cold-reset] --
19,037,059 UART: [state] Locking Datavault
19,042,317 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,516 UART: [state] Locking ICCM
19,046,940 UART: [exit] Launching FMC @ 0x40000130
19,055,620 UART:
19,055,853 UART: Running Caliptra FMC ...
19,056,956 UART:
19,057,116 UART: [state] CFI Enabled
19,116,835 UART: [fht] FMC Alias Private Key: 7
20,883,445 UART: [art] Extend RT PCRs Done
20,884,653 UART: [art] Lock RT PCRs Done
20,886,401 UART: [art] Populate DV Done
20,891,810 UART: [fht] FMC Alias Private Key: 7
20,893,299 UART: [art] Derive CDI
20,894,032 UART: [art] Store in slot 0x4
20,949,765 UART: [art] Derive Key Pair
20,950,801 UART: [art] Store priv key in slot 0x5
23,413,285 UART: [art] Derive Key Pair - Done
23,426,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,769 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,266 UART: [art] PUB.X = 87E10C05D8F55A12B989D840F1A851FF3F85C323F1B7DA026E51500EFEAFC2B1AC44A0F11C13E80AB5F2806DDA669FE0
25,148,597 UART: [art] PUB.Y = 4F4631AFE9E2CEC2D64B5940D259089AAD3B0FBCD4DBDD17ED1B78EFB69EE686419D1F4A7DDC100D65B5A3E417CB63F1
25,155,855 UART: [art] SIG.R = 5FA988A1B5070282B0E7732509E9DACAE2E3D3B3ACB2279026AF67F46D08B7AC411274A05805D939B7CBD955646D1C70
25,163,207 UART: [art] SIG.S = EDA8C52898DA2B42F1E419A100CF418B3925C7FC1EFC720531F28173699A4B5E490807C41334115C81BEDE8AF7CB0772
26,142,223 UART: Caliptra RT
26,142,914 UART: [state] CFI Enabled
26,324,280 UART: [rt] RT listening for mailbox commands...
26,326,644 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,357,147 UART: [rt]cmd =0x44504543, len=96
30,730,758 >>> mbox cmd response data (6236 bytes)
30,760,152 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,790,878 UART: [rt]cmd =0x53574545, len=84
34,959,772 >>> mbox cmd response data (200 bytes)
35,340,208 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,370,551 UART: [rt]cmd =0x52564348, len=36
35,373,440 >>> mbox cmd response data (8 bytes)
35,373,779 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,404,222 UART: [rt]cmd =0x53574545, len=84
35,407,563 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
3,419,874 ready_for_fw is high
3,420,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,804,114 >>> mbox cmd response: success
19,094,118 UART:
19,094,517 UART: Running Caliptra FMC ...
19,095,629 UART:
19,095,786 UART: [state] CFI Enabled
19,158,334 UART: [fht] FMC Alias Private Key: 7
20,924,442 UART: [art] Extend RT PCRs Done
20,925,678 UART: [art] Lock RT PCRs Done
20,927,145 UART: [art] Populate DV Done
20,932,889 UART: [fht] FMC Alias Private Key: 7
20,934,452 UART: [art] Derive CDI
20,935,267 UART: [art] Store in slot 0x4
20,991,292 UART: [art] Derive Key Pair
20,992,334 UART: [art] Store priv key in slot 0x5
23,455,034 UART: [art] Derive Key Pair - Done
23,467,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,247 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,765 UART: [art] PUB.X = 5C593AEA04728AA7E6D46497EB8DDC1953C51A99031E5DA3B6EE81733D4A8E058ED8FA1D7CE282932F4E793A0F6A545C
25,189,999 UART: [art] PUB.Y = 99DB21B5F98A3D4E66F9C3E66597FD969E14DE1FAD984686F7181A970FF394F4C035320A62EF31F2792C777D78D1AB26
25,197,303 UART: [art] SIG.R = CC53A7416485EFBB6B2CF3FCC006829C6859AC835E5D4118AB0E53783B5410CF5A0399128C24C21A5C7DFF0DB6D552C7
25,204,662 UART: [art] SIG.S = 89EC1133F0BC0BD4EE2AE1B1002078EBA7758429506C9EE59A3FA9B6F275BFB3B2798582FE3D3322405838B0C4B92DC6
26,183,591 UART: Caliptra RT
26,184,305 UART: [state] CFI Enabled
26,364,348 UART: [rt] RT listening for mailbox commands...
26,366,754 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,397,497 UART: [rt]cmd =0x44504543, len=96
30,772,632 >>> mbox cmd response data (6236 bytes)
30,801,800 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,832,413 UART: [rt]cmd =0x53574545, len=84
34,999,007 >>> mbox cmd response data (200 bytes)
35,381,702 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,412,009 UART: [rt]cmd =0x52564348, len=36
35,415,317 >>> mbox cmd response data (8 bytes)
35,415,768 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,446,179 UART: [rt]cmd =0x53574545, len=84
35,449,834 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
192,559 UART:
192,935 UART: Running Caliptra ROM ...
194,038 UART:
603,649 UART: [state] CFI Enabled
615,770 UART: [state] LifecycleState = Unprovisioned
618,159 UART: [state] DebugLocked = No
620,122 UART: [state] WD Timer not started. Device not locked for debugging
625,444 UART: [kat] SHA2-256
815,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,146 UART: [kat] ++
826,751 UART: [kat] sha1
839,054 UART: [kat] SHA2-256
842,121 UART: [kat] SHA2-384
848,920 UART: [kat] SHA2-512-ACC
851,518 UART: [kat] ECC-384
3,289,652 UART: [kat] HMAC-384Kdf
3,301,914 UART: [kat] LMS
3,833,759 UART: [kat] --
3,838,957 UART: [cold-reset] ++
3,840,317 UART: [fht] FHT @ 0x50003400
3,850,306 UART: [idev] ++
3,851,021 UART: [idev] CDI.KEYID = 6
3,851,945 UART: [idev] SUBJECT.KEYID = 7
3,853,120 UART: [idev] UDS.KEYID = 0
3,854,049 ready_for_fw is high
3,854,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,124 UART: [idev] Erasing UDS.KEYID = 0
6,328,790 UART: [idev] Sha1 KeyId Algorithm
6,351,658 UART: [idev] --
6,355,500 UART: [ldev] ++
6,356,186 UART: [ldev] CDI.KEYID = 6
6,357,111 UART: [ldev] SUBJECT.KEYID = 5
6,358,290 UART: [ldev] AUTHORITY.KEYID = 7
6,359,468 UART: [ldev] FE.KEYID = 1
6,371,113 UART: [ldev] Erasing FE.KEYID = 1
8,848,460 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,026 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,326 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,980 UART: [ldev] --
10,642,412 UART: [fwproc] Wait for Commands...
10,645,274 UART: [fwproc] Recv command 0x46574c44
10,647,586 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,770 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,425 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,252 >>> mbox cmd response: success
14,921,889 UART: [afmc] ++
14,922,649 UART: [afmc] CDI.KEYID = 6
14,923,855 UART: [afmc] SUBJECT.KEYID = 7
14,925,306 UART: [afmc] AUTHORITY.KEYID = 5
17,424,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,146,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,148,841 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,163,961 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,179,122 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,193,990 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,217,638 UART: [afmc] --
19,221,723 UART: [cold-reset] --
19,225,656 UART: [state] Locking Datavault
19,230,224 UART: [state] Locking PCR0, PCR1 and PCR31
19,232,383 UART: [state] Locking ICCM
19,235,409 UART: [exit] Launching FMC @ 0x40000130
19,244,073 UART:
19,244,363 UART: Running Caliptra FMC ...
19,245,476 UART:
19,245,642 UART: [state] CFI Enabled
19,253,531 UART: [fht] FMC Alias Private Key: 7
21,019,461 UART: [art] Extend RT PCRs Done
21,020,687 UART: [art] Lock RT PCRs Done
21,022,426 UART: [art] Populate DV Done
21,027,688 UART: [fht] FMC Alias Private Key: 7
21,029,283 UART: [art] Derive CDI
21,030,101 UART: [art] Store in slot 0x4
21,073,185 UART: [art] Derive Key Pair
21,074,190 UART: [art] Store priv key in slot 0x5
23,501,459 UART: [art] Derive Key Pair - Done
23,514,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,865 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,395 UART: [art] PUB.X = FB2851CEB596548B497184E282EA0CDA2C2D03FC3CFDBB9982467BF9CE8452F4B2807C6E02CA1DCB314E67FB6147B10C
25,229,671 UART: [art] PUB.Y = 140D1E8623F9537822E6D7F47D608C6BCE2C49BB7F0527E44747759C07BE1C17ED79516DBCDBC2C53F7B877CB9570378
25,236,934 UART: [art] SIG.R = C6FF2DAA2ABBC10AA69189B67187857C0D56902667481A954E83467DF27B9B5CDC7C0ED747F63C4A34FBB70AC4D99938
25,244,334 UART: [art] SIG.S = 4A1079C0CBDB15508D2048D7FA340693045C729E7740FC3248E0C97669B7325B84083FE965661C6C06EBFE69B886D3A8
26,223,458 UART: Caliptra RT
26,224,147 UART: [state] CFI Enabled
26,357,137 UART: [rt] RT listening for mailbox commands...
26,359,433 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,389,852 UART: [rt]cmd =0x44504543, len=96
30,684,352 >>> mbox cmd response data (6236 bytes)
30,713,582 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,743,921 UART: [rt]cmd =0x53574545, len=84
34,879,273 >>> mbox cmd response data (200 bytes)
35,263,162 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,293,340 UART: [rt]cmd =0x52564348, len=36
35,296,132 >>> mbox cmd response data (8 bytes)
35,296,569 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,327,207 UART: [rt]cmd =0x53574545, len=84
35,330,924 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,755,829 ready_for_fw is high
3,756,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,863 >>> mbox cmd response: success
19,294,476 UART:
19,294,865 UART: Running Caliptra FMC ...
19,296,010 UART:
19,296,176 UART: [state] CFI Enabled
19,303,965 UART: [fht] FMC Alias Private Key: 7
21,070,330 UART: [art] Extend RT PCRs Done
21,071,558 UART: [art] Lock RT PCRs Done
21,073,256 UART: [art] Populate DV Done
21,078,843 UART: [fht] FMC Alias Private Key: 7
21,080,498 UART: [art] Derive CDI
21,081,340 UART: [art] Store in slot 0x4
21,124,049 UART: [art] Derive Key Pair
21,125,062 UART: [art] Store priv key in slot 0x5
23,551,873 UART: [art] Derive Key Pair - Done
23,564,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,304 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,816 UART: [art] PUB.X = C8BF5AA6A37EC6E988F734463378F4DBDC1F867E01D4E0A7B26791F08140213F4672E3C5E98DA80AEB6D440C5E54D7E1
25,280,042 UART: [art] PUB.Y = 05A6506F6248DC39348D396BA25C2F4EA25987EB9200B13FC569ADE18F3F2B4CA8012F2DCF7E726CB24D0099F4D7E873
25,287,269 UART: [art] SIG.R = A0F59BBF2F850E29D6E065116A3487EFD383EB8C99D0719345AA72104DDB1C6F218C8F00D16D39E81B9B66EBC8997C46
25,294,639 UART: [art] SIG.S = 185A559D3DCA6898BB4FBDE76F04D3353F9D64F28C5C97824FE1746B6EB2809F9A3CAE6B612AB60449B1277FBBDAD6A8
26,273,263 UART: Caliptra RT
26,273,956 UART: [state] CFI Enabled
26,406,167 UART: [rt] RT listening for mailbox commands...
26,408,452 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,438,917 UART: [rt]cmd =0x44504543, len=96
30,734,479 >>> mbox cmd response data (6236 bytes)
30,763,839 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
30,794,614 UART: [rt]cmd =0x53574545, len=84
34,931,059 >>> mbox cmd response data (200 bytes)
35,315,085 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
35,345,714 UART: [rt]cmd =0x52564348, len=36
35,348,877 >>> mbox cmd response data (8 bytes)
35,349,319 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
35,379,894 UART: [rt]cmd =0x53574545, len=84
35,383,233 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,221 UART: [kat] SHA2-256
882,152 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,267 UART: [kat] ++
886,419 UART: [kat] sha1
890,679 UART: [kat] SHA2-256
892,617 UART: [kat] SHA2-384
895,406 UART: [kat] SHA2-512-ACC
897,307 UART: [kat] ECC-384
902,840 UART: [kat] HMAC-384Kdf
907,554 UART: [kat] LMS
1,475,750 UART: [kat] --
1,476,671 UART: [cold-reset] ++
1,476,997 UART: [fht] Storing FHT @ 0x50003400
1,479,720 UART: [idev] ++
1,479,888 UART: [idev] CDI.KEYID = 6
1,480,248 UART: [idev] SUBJECT.KEYID = 7
1,480,672 UART: [idev] UDS.KEYID = 0
1,481,017 ready_for_fw is high
1,481,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,650 UART: [idev] Erasing UDS.KEYID = 0
1,505,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,200 UART: [idev] --
1,515,371 UART: [ldev] ++
1,515,539 UART: [ldev] CDI.KEYID = 6
1,515,902 UART: [ldev] SUBJECT.KEYID = 5
1,516,328 UART: [ldev] AUTHORITY.KEYID = 7
1,516,791 UART: [ldev] FE.KEYID = 1
1,521,713 UART: [ldev] Erasing FE.KEYID = 1
1,546,898 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,239 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,558 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,658 UART: [ldev] --
1,586,109 UART: [fwproc] Waiting for Commands...
1,586,748 UART: [fwproc] Received command 0x46574c44
1,587,539 UART: [fwproc] Received Image of size 118548 bytes
2,933,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,399 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,617 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,910 >>> mbox cmd response: success
3,133,024 UART: [afmc] ++
3,133,192 UART: [afmc] CDI.KEYID = 6
3,133,554 UART: [afmc] SUBJECT.KEYID = 7
3,133,979 UART: [afmc] AUTHORITY.KEYID = 5
3,169,884 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,074 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,446 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,129 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,027 UART: [afmc] --
3,213,123 UART: [cold-reset] --
3,213,901 UART: [state] Locking Datavault
3,215,138 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,742 UART: [state] Locking ICCM
3,216,278 UART: [exit] Launching FMC @ 0x40000130
3,221,608 UART:
3,221,624 UART: Running Caliptra FMC ...
3,222,032 UART:
3,222,086 UART: [state] CFI Enabled
3,232,680 UART: [fht] FMC Alias Private Key: 7
3,351,222 UART: [art] Extend RT PCRs Done
3,351,650 UART: [art] Lock RT PCRs Done
3,353,452 UART: [art] Populate DV Done
3,361,701 UART: [fht] FMC Alias Private Key: 7
3,362,725 UART: [art] Derive CDI
3,363,005 UART: [art] Store in slot 0x4
3,449,179 UART: [art] Derive Key Pair
3,449,539 UART: [art] Store priv key in slot 0x5
3,463,044 UART: [art] Derive Key Pair - Done
3,478,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,529 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,294 UART: [art] PUB.X = 71DDF22FBED759CBA635212EFCCC8BCB2A3A7033E645D1EA817A66EBB212414988782F19931A29934D0B09EFD984ED4B
3,501,072 UART: [art] PUB.Y = AAB76410DB21D7022A719CBDBF598999F51BD03C50C8C70C7A54F388FFF0A5F63BE3375E6167247FFBDB05CF597AE563
3,508,027 UART: [art] SIG.R = 61AFD655D7B0EC5346EE64ECD58B8A9DC2E6A0D5031BE38D29D0C7B674ECCA3AD8E812D3CC1936997BE25B8FAF453FA4
3,514,818 UART: [art] SIG.S = 77668AFF1690F1A201C32FDB7365685AEE657DF4E7E6982685C38CB751461F875C31A47A807BD8EA7F0E9A5A8D0320AF
3,537,975 UART: Caliptra RT
3,538,226 UART: [state] CFI Enabled
3,658,113 UART: [rt] RT listening for mailbox commands...
3,658,783 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,329 UART: [rt]cmd =0x44504543, len=96
3,881,793 >>> mbox cmd response data (6236 bytes)
3,881,794 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,911,847 UART: [rt]cmd =0x53574545, len=84
3,937,476 >>> mbox cmd response data (200 bytes)
3,937,477 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,966,974 UART: [rt]cmd =0x52564348, len=36
3,969,496 >>> mbox cmd response data (8 bytes)
3,969,497 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,999,296 UART: [rt]cmd =0x53574545, len=84
4,002,625 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,757 ready_for_fw is high
1,362,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,060 >>> mbox cmd response: success
3,043,823 UART:
3,043,839 UART: Running Caliptra FMC ...
3,044,247 UART:
3,044,301 UART: [state] CFI Enabled
3,054,543 UART: [fht] FMC Alias Private Key: 7
3,174,233 UART: [art] Extend RT PCRs Done
3,174,661 UART: [art] Lock RT PCRs Done
3,176,077 UART: [art] Populate DV Done
3,184,114 UART: [fht] FMC Alias Private Key: 7
3,185,062 UART: [art] Derive CDI
3,185,342 UART: [art] Store in slot 0x4
3,271,154 UART: [art] Derive Key Pair
3,271,514 UART: [art] Store priv key in slot 0x5
3,284,851 UART: [art] Derive Key Pair - Done
3,299,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,761 UART: [art] PUB.X = 8A31323C5DBE13780C3FDFC8142C48391464ED1E73A7536F7DDFD55DEC41988F7079D08B5BA26CF169A32DDCA74FDD2F
3,322,544 UART: [art] PUB.Y = 081EC630C16D57FF1C8768F6D79E219D184BB4986F13C9C372589C61AFB45731CFF5D2C8BB91B41E3C0DFA45DD546FFC
3,329,502 UART: [art] SIG.R = EEFAC72B08DB589DB6CC0DB753057356B535C09FE0BE1AE5E907846BE61B483DBE0D87AAEBD62397471F53D7AA063231
3,336,270 UART: [art] SIG.S = 2B8CF4077E3ABDCC515E95D4C9ABC79F77721400D1BE02025CE3EFD881C291A5F56A0D705D8D8CBA336BB0A376278549
3,360,182 UART: Caliptra RT
3,360,433 UART: [state] CFI Enabled
3,481,735 UART: [rt] RT listening for mailbox commands...
3,482,405 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,061 UART: [rt]cmd =0x44504543, len=96
3,704,063 >>> mbox cmd response data (6236 bytes)
3,704,064 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,733,937 UART: [rt]cmd =0x53574545, len=84
3,758,730 >>> mbox cmd response data (200 bytes)
3,758,731 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,316 UART: [rt]cmd =0x52564348, len=36
3,790,896 >>> mbox cmd response data (8 bytes)
3,790,897 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,820,732 UART: [rt]cmd =0x53574545, len=84
3,823,845 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,645 UART: [state] LifecycleState = Unprovisioned
86,300 UART: [state] DebugLocked = No
86,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,370 UART: [kat] SHA2-256
882,301 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,416 UART: [kat] ++
886,568 UART: [kat] sha1
890,634 UART: [kat] SHA2-256
892,572 UART: [kat] SHA2-384
895,257 UART: [kat] SHA2-512-ACC
897,158 UART: [kat] ECC-384
902,663 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,322 UART: [cold-reset] ++
1,476,724 UART: [fht] Storing FHT @ 0x50003400
1,479,645 UART: [idev] ++
1,479,813 UART: [idev] CDI.KEYID = 6
1,480,173 UART: [idev] SUBJECT.KEYID = 7
1,480,597 UART: [idev] UDS.KEYID = 0
1,480,942 ready_for_fw is high
1,480,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,691 UART: [idev] Erasing UDS.KEYID = 0
1,504,969 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,497 UART: [idev] --
1,514,564 UART: [ldev] ++
1,514,732 UART: [ldev] CDI.KEYID = 6
1,515,095 UART: [ldev] SUBJECT.KEYID = 5
1,515,521 UART: [ldev] AUTHORITY.KEYID = 7
1,515,984 UART: [ldev] FE.KEYID = 1
1,521,196 UART: [ldev] Erasing FE.KEYID = 1
1,546,539 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,040 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,756 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,493 UART: [ldev] --
1,585,940 UART: [fwproc] Waiting for Commands...
1,586,575 UART: [fwproc] Received command 0x46574c44
1,587,366 UART: [fwproc] Received Image of size 118548 bytes
2,932,126 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,448 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,666 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,979 >>> mbox cmd response: success
3,132,161 UART: [afmc] ++
3,132,329 UART: [afmc] CDI.KEYID = 6
3,132,691 UART: [afmc] SUBJECT.KEYID = 7
3,133,116 UART: [afmc] AUTHORITY.KEYID = 5
3,169,327 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,769 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,258 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,141 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,824 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,550 UART: [afmc] --
3,212,652 UART: [cold-reset] --
3,213,640 UART: [state] Locking Datavault
3,214,663 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,267 UART: [state] Locking ICCM
3,215,929 UART: [exit] Launching FMC @ 0x40000130
3,221,259 UART:
3,221,275 UART: Running Caliptra FMC ...
3,221,683 UART:
3,221,826 UART: [state] CFI Enabled
3,232,324 UART: [fht] FMC Alias Private Key: 7
3,351,008 UART: [art] Extend RT PCRs Done
3,351,436 UART: [art] Lock RT PCRs Done
3,352,960 UART: [art] Populate DV Done
3,361,183 UART: [fht] FMC Alias Private Key: 7
3,362,297 UART: [art] Derive CDI
3,362,577 UART: [art] Store in slot 0x4
3,448,369 UART: [art] Derive Key Pair
3,448,729 UART: [art] Store priv key in slot 0x5
3,461,880 UART: [art] Derive Key Pair - Done
3,476,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,038 UART: [art] PUB.X = 3AC46664B2B8BFB0FC84BFD5789FBFEA210048A6E8E0C10B095659E361B34CEB79D54DAC457266EEF458012F30169CB9
3,499,789 UART: [art] PUB.Y = 265504018438AC5077BBEBE460D8AE64AF747044136FC9EBD9020956161F4DC5F6DC8A29894AF117ACC19F9EB89417E6
3,506,731 UART: [art] SIG.R = 51D0F62DDFE1E490F0D7EF34688A51A747A279CF076F8CF1BD3733CDB4CB41D1B591856E722389D68FA186AE98FA81C5
3,513,510 UART: [art] SIG.S = E96D0F28E8DB5B58E19953D1D043E8A646933F1D2C3F10058FC57F0F76D3C754CCA8D83D43580AB56F011A2372C62CFC
3,537,307 UART: Caliptra RT
3,537,650 UART: [state] CFI Enabled
3,658,240 UART: [rt] RT listening for mailbox commands...
3,658,910 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,064 UART: [rt]cmd =0x44504543, len=96
3,880,891 >>> mbox cmd response data (6236 bytes)
3,880,892 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,531 UART: [rt]cmd =0x53574545, len=84
3,935,984 >>> mbox cmd response data (200 bytes)
3,935,985 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,965,378 UART: [rt]cmd =0x52564348, len=36
3,968,202 >>> mbox cmd response data (8 bytes)
3,968,203 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,998,070 UART: [rt]cmd =0x53574545, len=84
4,001,299 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,112 ready_for_fw is high
1,363,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,999 >>> mbox cmd response: success
3,043,078 UART:
3,043,094 UART: Running Caliptra FMC ...
3,043,502 UART:
3,043,645 UART: [state] CFI Enabled
3,054,411 UART: [fht] FMC Alias Private Key: 7
3,173,343 UART: [art] Extend RT PCRs Done
3,173,771 UART: [art] Lock RT PCRs Done
3,175,413 UART: [art] Populate DV Done
3,183,878 UART: [fht] FMC Alias Private Key: 7
3,184,860 UART: [art] Derive CDI
3,185,140 UART: [art] Store in slot 0x4
3,270,628 UART: [art] Derive Key Pair
3,270,988 UART: [art] Store priv key in slot 0x5
3,283,803 UART: [art] Derive Key Pair - Done
3,298,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,082 UART: [art] PUB.X = 28521FDAC67A841B7C5F0B73CFC2FFFED6A524DC4681D5BC85C1B986FEC3BD20BF96C2DC61827B1E03BCE492754C2C11
3,321,868 UART: [art] PUB.Y = 190DF43E6CF87B07508BAFBF83F77DAD22F845CE082EC39D8767045C51BA29FCC86F5322B8D3145E6474D7A10717DAF6
3,328,813 UART: [art] SIG.R = DBFA8FA579ECA9E156C09E836FB38A016A62D285EE87621A785241241A8FD395AB3F174E19B10A09C09BD5D8B381A9AC
3,335,586 UART: [art] SIG.S = 659CCA92766AF034AA6480C921859E5AE3B80D57FBE060C3CFADEBA54AFA6B807BCFB9ADDE0B2784C6D838536F1BFCBE
3,360,126 UART: Caliptra RT
3,360,469 UART: [state] CFI Enabled
3,480,435 UART: [rt] RT listening for mailbox commands...
3,481,105 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,887 UART: [rt]cmd =0x44504543, len=96
3,705,751 >>> mbox cmd response data (6236 bytes)
3,705,752 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,735,887 UART: [rt]cmd =0x53574545, len=84
3,761,538 >>> mbox cmd response data (200 bytes)
3,761,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,791,078 UART: [rt]cmd =0x52564348, len=36
3,793,298 >>> mbox cmd response data (8 bytes)
3,793,299 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,823,206 UART: [rt]cmd =0x53574545, len=84
3,826,277 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,478 UART: [kat] SHA2-256
891,028 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,132 UART: [kat] ++
895,284 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,337 UART: [kat] SHA2-512-ACC
906,238 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,112 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
1,174,488 ready_for_fw is high
1,174,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,883 UART: [idev] Erasing UDS.KEYID = 0
1,198,325 UART: [idev] Sha1 KeyId Algorithm
1,207,017 UART: [idev] --
1,208,154 UART: [ldev] ++
1,208,322 UART: [ldev] CDI.KEYID = 6
1,208,686 UART: [ldev] SUBJECT.KEYID = 5
1,209,113 UART: [ldev] AUTHORITY.KEYID = 7
1,209,576 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,687 UART: [fwproc] Wait for Commands...
1,281,502 UART: [fwproc] Recv command 0x46574c44
1,282,235 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,055 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,230 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,603 >>> mbox cmd response: success
2,827,703 UART: [afmc] ++
2,827,871 UART: [afmc] CDI.KEYID = 6
2,828,234 UART: [afmc] SUBJECT.KEYID = 7
2,828,660 UART: [afmc] AUTHORITY.KEYID = 5
2,864,175 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,264 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,723 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,604 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,305 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,994 UART: [afmc] --
2,906,881 UART: [cold-reset] --
2,907,693 UART: [state] Locking Datavault
2,908,748 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,352 UART: [state] Locking ICCM
2,909,996 UART: [exit] Launching FMC @ 0x40000130
2,915,326 UART:
2,915,342 UART: Running Caliptra FMC ...
2,915,750 UART:
2,915,804 UART: [state] CFI Enabled
2,926,342 UART: [fht] FMC Alias Private Key: 7
3,044,900 UART: [art] Extend RT PCRs Done
3,045,328 UART: [art] Lock RT PCRs Done
3,046,960 UART: [art] Populate DV Done
3,055,155 UART: [fht] FMC Alias Private Key: 7
3,056,113 UART: [art] Derive CDI
3,056,393 UART: [art] Store in slot 0x4
3,141,964 UART: [art] Derive Key Pair
3,142,324 UART: [art] Store priv key in slot 0x5
3,155,824 UART: [art] Derive Key Pair - Done
3,170,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,067 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,832 UART: [art] PUB.X = D5DFB5C19119C5E43E44032163A4FB73A22B3BBB9419C241C11D5847F2FFD96449BDF4D44BB81D5BE5B254EFFDFD3F4F
3,193,619 UART: [art] PUB.Y = 7C0A1835E812C07A8B3F0C70411D9ECB18A75AE65A5930A6C50217FF17998DA052C10016ACE96D4FE14E43810B06844D
3,200,534 UART: [art] SIG.R = 914DFA75141C0D480364FE66F4B51C8DB9844FF87216FF211A1540943A8081CEA6ECB991412BC2A4214FB534D1D0AA9D
3,207,304 UART: [art] SIG.S = 35C640116F52D236A59B828F2B1FBD9AA2A3EAB327244A8934711F691421CF1154BEEF46AFB5EC1F5A55F31FFA2213C5
3,230,702 UART: Caliptra RT
3,230,953 UART: [state] CFI Enabled
3,350,294 UART: [rt] RT listening for mailbox commands...
3,350,964 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,284 UART: [rt]cmd =0x44504543, len=96
3,572,982 >>> mbox cmd response data (6236 bytes)
3,572,983 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,602,776 UART: [rt]cmd =0x53574545, len=84
3,627,846 >>> mbox cmd response data (200 bytes)
3,627,847 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,384 UART: [rt]cmd =0x52564348, len=36
3,660,246 >>> mbox cmd response data (8 bytes)
3,660,247 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,082 UART: [rt]cmd =0x53574545, len=84
3,692,881 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,648 ready_for_fw is high
1,059,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,046 >>> mbox cmd response: success
2,738,985 UART:
2,739,001 UART: Running Caliptra FMC ...
2,739,409 UART:
2,739,463 UART: [state] CFI Enabled
2,750,241 UART: [fht] FMC Alias Private Key: 7
2,869,483 UART: [art] Extend RT PCRs Done
2,869,911 UART: [art] Lock RT PCRs Done
2,871,377 UART: [art] Populate DV Done
2,879,386 UART: [fht] FMC Alias Private Key: 7
2,880,346 UART: [art] Derive CDI
2,880,626 UART: [art] Store in slot 0x4
2,966,539 UART: [art] Derive Key Pair
2,966,899 UART: [art] Store priv key in slot 0x5
2,980,217 UART: [art] Derive Key Pair - Done
2,995,055 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,088 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,853 UART: [art] PUB.X = 6648F0EDB22D1EAD00082F56DF10A3E0EE7D5B6DDA9307FE9CABD551E6A047B1FF8A94AB8B37ECDB364D90DE7216CF32
3,017,621 UART: [art] PUB.Y = DCD0DEC92EEAEE82800A849CCB6C7ABCDB1EB5CE726DB8B27C52D23222492329C796F381D7FFC6001B0E37FDAC9229B5
3,024,567 UART: [art] SIG.R = 707FD4AD7DC0A237EBAD8CE275F2080051978CF683E9A8D63FAE9B4129D52CBFCB4877615653E276799A79BA48202FDE
3,031,322 UART: [art] SIG.S = CC3A88D93D50E214CB5F452A60C1B59950517A77D4010B67CCD2F3DD5ED3BA92C5F878DABE250B75145CE5E4DFD157DB
3,055,373 UART: Caliptra RT
3,055,624 UART: [state] CFI Enabled
3,174,251 UART: [rt] RT listening for mailbox commands...
3,174,921 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,629 UART: [rt]cmd =0x44504543, len=96
3,397,746 >>> mbox cmd response data (6236 bytes)
3,397,747 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,427,622 UART: [rt]cmd =0x53574545, len=84
3,453,538 >>> mbox cmd response data (200 bytes)
3,453,539 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,854 UART: [rt]cmd =0x52564348, len=36
3,485,270 >>> mbox cmd response data (8 bytes)
3,485,271 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,060 UART: [rt]cmd =0x53574545, len=84
3,518,203 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,281 UART: [state] LifecycleState = Unprovisioned
85,936 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,791 UART: [kat] SHA2-256
891,341 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,445 UART: [kat] ++
895,597 UART: [kat] sha1
899,911 UART: [kat] SHA2-256
901,851 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,778 UART: [kat] HMAC-384Kdf
921,336 UART: [kat] LMS
1,169,648 UART: [kat] --
1,170,445 UART: [cold-reset] ++
1,170,917 UART: [fht] FHT @ 0x50003400
1,173,511 UART: [idev] ++
1,173,679 UART: [idev] CDI.KEYID = 6
1,174,040 UART: [idev] SUBJECT.KEYID = 7
1,174,465 UART: [idev] UDS.KEYID = 0
1,174,811 ready_for_fw is high
1,174,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,448 UART: [idev] Erasing UDS.KEYID = 0
1,200,156 UART: [idev] Sha1 KeyId Algorithm
1,209,060 UART: [idev] --
1,210,149 UART: [ldev] ++
1,210,317 UART: [ldev] CDI.KEYID = 6
1,210,681 UART: [ldev] SUBJECT.KEYID = 5
1,211,108 UART: [ldev] AUTHORITY.KEYID = 7
1,211,571 UART: [ldev] FE.KEYID = 1
1,217,331 UART: [ldev] Erasing FE.KEYID = 1
1,243,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,751 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,851 UART: [ldev] --
1,283,196 UART: [fwproc] Wait for Commands...
1,283,907 UART: [fwproc] Recv command 0x46574c44
1,284,640 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,252 >>> mbox cmd response: success
2,829,380 UART: [afmc] ++
2,829,548 UART: [afmc] CDI.KEYID = 6
2,829,911 UART: [afmc] SUBJECT.KEYID = 7
2,830,337 UART: [afmc] AUTHORITY.KEYID = 5
2,865,674 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,179 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,928 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,638 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,519 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,220 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,977 UART: [afmc] --
2,908,984 UART: [cold-reset] --
2,909,850 UART: [state] Locking Datavault
2,911,285 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,889 UART: [state] Locking ICCM
2,912,465 UART: [exit] Launching FMC @ 0x40000130
2,917,795 UART:
2,917,811 UART: Running Caliptra FMC ...
2,918,219 UART:
2,918,362 UART: [state] CFI Enabled
2,929,014 UART: [fht] FMC Alias Private Key: 7
3,047,434 UART: [art] Extend RT PCRs Done
3,047,862 UART: [art] Lock RT PCRs Done
3,049,392 UART: [art] Populate DV Done
3,057,575 UART: [fht] FMC Alias Private Key: 7
3,058,665 UART: [art] Derive CDI
3,058,945 UART: [art] Store in slot 0x4
3,144,928 UART: [art] Derive Key Pair
3,145,288 UART: [art] Store priv key in slot 0x5
3,158,396 UART: [art] Derive Key Pair - Done
3,173,197 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,710 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,475 UART: [art] PUB.X = 2E4A3F2B1DB5582FA74BE00E3A0AA7C53615FF23A0CA7B54E4C5C2C2D0F485C949CB4E730C82FC46441E3AC5B39CB194
3,196,254 UART: [art] PUB.Y = B52D85CFF82EBDDF5130A9B53E8F1A3638187A135D1D92518909EF58EC57B91E1ECF451A487FF4CA759DC31372F7A914
3,203,211 UART: [art] SIG.R = A7902CE2644DA2DBB9C87E270279887FE0C8E8EE72E1EB40478FFD1FDB183C1EFFC569197036AADA92075E785B52F602
3,209,984 UART: [art] SIG.S = D35DF7181BCC0D42FB0A3F3A48D05B59BFDE18C828A08DC6392B420FCEFD06A7D56C93BEE5559D36BD7D1F3DAF8B0724
3,233,659 UART: Caliptra RT
3,234,002 UART: [state] CFI Enabled
3,353,734 UART: [rt] RT listening for mailbox commands...
3,354,404 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,968 UART: [rt]cmd =0x44504543, len=96
3,576,682 >>> mbox cmd response data (6236 bytes)
3,576,683 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,466 UART: [rt]cmd =0x53574545, len=84
3,633,154 >>> mbox cmd response data (200 bytes)
3,633,155 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,662,754 UART: [rt]cmd =0x52564348, len=36
3,665,018 >>> mbox cmd response data (8 bytes)
3,665,019 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,874 UART: [rt]cmd =0x53574545, len=84
3,698,015 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 ready_for_fw is high
1,059,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,173 >>> mbox cmd response: success
2,740,034 UART:
2,740,050 UART: Running Caliptra FMC ...
2,740,458 UART:
2,740,601 UART: [state] CFI Enabled
2,751,301 UART: [fht] FMC Alias Private Key: 7
2,870,027 UART: [art] Extend RT PCRs Done
2,870,455 UART: [art] Lock RT PCRs Done
2,872,095 UART: [art] Populate DV Done
2,880,216 UART: [fht] FMC Alias Private Key: 7
2,881,396 UART: [art] Derive CDI
2,881,676 UART: [art] Store in slot 0x4
2,967,507 UART: [art] Derive Key Pair
2,967,867 UART: [art] Store priv key in slot 0x5
2,980,583 UART: [art] Derive Key Pair - Done
2,995,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,153 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,918 UART: [art] PUB.X = 810D85B05239AE3479BFC834563FC354E6EF007A919B38A8CE487196CE6ABE30EA322B034A524722CD919076AD104623
3,018,658 UART: [art] PUB.Y = F2F365F8BD43D315BB918B7D19E82E047CE8A5A5E319E4DCC89791AECBF79E1A88DAC642BB1C076BBA61AC8F113667D7
3,025,622 UART: [art] SIG.R = 4ECFA36D5234853FA1EDC6C2034EA3EE68C3DE50D8A14B89DF0A1DAB13A892AB730263B93B16F9BAE4D735863CCBEA70
3,032,405 UART: [art] SIG.S = 9C362981C2D3A33773C75CF6D5E7D09D7DACE1603E57C935E88A38F806F90B6094F80B5265E4A97F3EF6A7EBE606F3FD
3,056,169 UART: Caliptra RT
3,056,512 UART: [state] CFI Enabled
3,176,431 UART: [rt] RT listening for mailbox commands...
3,177,101 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,405 UART: [rt]cmd =0x44504543, len=96
3,399,961 >>> mbox cmd response data (6236 bytes)
3,399,962 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,719 UART: [rt]cmd =0x53574545, len=84
3,455,637 >>> mbox cmd response data (200 bytes)
3,455,638 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,243 UART: [rt]cmd =0x52564348, len=36
3,487,759 >>> mbox cmd response data (8 bytes)
3,487,760 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,583 UART: [rt]cmd =0x53574545, len=84
3,521,100 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,325 UART: [state] WD Timer not started. Device not locked for debugging
87,552 UART: [kat] SHA2-256
893,202 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,327 UART: [kat] ++
897,479 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,374 UART: [kat] SHA2-512-ACC
908,275 UART: [kat] ECC-384
917,916 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,612 UART: [idev] ++
1,174,780 UART: [idev] CDI.KEYID = 6
1,175,140 UART: [idev] SUBJECT.KEYID = 7
1,175,564 UART: [idev] UDS.KEYID = 0
1,175,909 ready_for_fw is high
1,175,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,993 UART: [idev] Sha1 KeyId Algorithm
1,209,525 UART: [idev] --
1,210,597 UART: [ldev] ++
1,210,765 UART: [ldev] CDI.KEYID = 6
1,211,128 UART: [ldev] SUBJECT.KEYID = 5
1,211,554 UART: [ldev] AUTHORITY.KEYID = 7
1,212,017 UART: [ldev] FE.KEYID = 1
1,217,127 UART: [ldev] Erasing FE.KEYID = 1
1,243,010 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,187 UART: [ldev] --
1,282,634 UART: [fwproc] Wait for Commands...
1,283,204 UART: [fwproc] Recv command 0x46574c44
1,283,932 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,918 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,088 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,259 >>> mbox cmd response: success
2,828,323 UART: [afmc] ++
2,828,491 UART: [afmc] CDI.KEYID = 6
2,828,853 UART: [afmc] SUBJECT.KEYID = 7
2,829,278 UART: [afmc] AUTHORITY.KEYID = 5
2,865,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,079 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,962 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,663 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,433 UART: [afmc] --
2,908,389 UART: [cold-reset] --
2,909,429 UART: [state] Locking Datavault
2,910,442 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,046 UART: [state] Locking ICCM
2,911,468 UART: [exit] Launching FMC @ 0x40000130
2,916,798 UART:
2,916,814 UART: Running Caliptra FMC ...
2,917,222 UART:
2,917,276 UART: [state] CFI Enabled
2,927,876 UART: [fht] FMC Alias Private Key: 7
3,047,130 UART: [art] Extend RT PCRs Done
3,047,558 UART: [art] Lock RT PCRs Done
3,049,004 UART: [art] Populate DV Done
3,057,329 UART: [fht] FMC Alias Private Key: 7
3,058,273 UART: [art] Derive CDI
3,058,553 UART: [art] Store in slot 0x4
3,144,268 UART: [art] Derive Key Pair
3,144,628 UART: [art] Store priv key in slot 0x5
3,157,756 UART: [art] Derive Key Pair - Done
3,172,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,230 UART: [art] PUB.X = E19928E077363493CA74503EA061936C6CA9CC50A9B2F1DB7DC09E5E2974A5A6349F3232003700A702933120B7FE0CA5
3,194,946 UART: [art] PUB.Y = B5EAC52EB2F8BF1C2AA5DA392644A18D71377E07D9EC8B0401310C8DD6A70EB1F5845AE7A812F1693927F911D2F29C88
3,201,891 UART: [art] SIG.R = 18AC65BA8F0F33ACBEF9C4221755AFFB3220CAA3F1BEC35F69F19A00931E25D7BB7AE8A3FBA873E0A2F8352EEAA1CA3C
3,208,666 UART: [art] SIG.S = FA11E3C4A6C46995DA623C38C758C6C6BF732159A35B83A0A93D1CE692C8FE458A0659A9EAFD7B788CC6ACFC2EC95E85
3,232,877 UART: Caliptra RT
3,233,128 UART: [state] CFI Enabled
3,353,445 UART: [rt] RT listening for mailbox commands...
3,354,115 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,421 UART: [rt]cmd =0x44504543, len=96
3,576,985 >>> mbox cmd response data (6236 bytes)
3,576,986 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,606,857 UART: [rt]cmd =0x53574545, len=84
3,632,155 >>> mbox cmd response data (200 bytes)
3,632,156 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,661,685 UART: [rt]cmd =0x52564348, len=36
3,664,315 >>> mbox cmd response data (8 bytes)
3,664,316 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,694,081 UART: [rt]cmd =0x53574545, len=84
3,697,024 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,779 ready_for_fw is high
1,059,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,740 >>> mbox cmd response: success
2,741,569 UART:
2,741,585 UART: Running Caliptra FMC ...
2,741,993 UART:
2,742,047 UART: [state] CFI Enabled
2,752,777 UART: [fht] FMC Alias Private Key: 7
2,871,517 UART: [art] Extend RT PCRs Done
2,871,945 UART: [art] Lock RT PCRs Done
2,873,403 UART: [art] Populate DV Done
2,881,658 UART: [fht] FMC Alias Private Key: 7
2,882,686 UART: [art] Derive CDI
2,882,966 UART: [art] Store in slot 0x4
2,968,505 UART: [art] Derive Key Pair
2,968,865 UART: [art] Store priv key in slot 0x5
2,982,503 UART: [art] Derive Key Pair - Done
2,997,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,112 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,877 UART: [art] PUB.X = ED52BA965E699E28F90E1A02118598688ED7503CAA1A7B6E906A7E6BE6FA4345E3C7960E4B67C99E56CE056692F83F68
3,020,639 UART: [art] PUB.Y = 7AD9B31E88228B62974F07A7698710B23A298EDCF2B127C21968F58E3EE4EB508CC101FCB8605967D026AD6480C92CF8
3,027,585 UART: [art] SIG.R = 8E88E027B8C4D6F9F422386A5704CC8EC9F42751041BF672A2056C65B764B73E137DC91884695D5635E167089390B6B3
3,034,333 UART: [art] SIG.S = 4071063728D77DF255FA3165B2E007872C8C157C0302A5948F879B828218CFBCADD89FA78C822934C5FC3AA93ABFF1BE
3,057,625 UART: Caliptra RT
3,057,876 UART: [state] CFI Enabled
3,177,835 UART: [rt] RT listening for mailbox commands...
3,178,505 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,809 UART: [rt]cmd =0x44504543, len=96
3,399,389 >>> mbox cmd response data (6236 bytes)
3,399,390 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,429,475 UART: [rt]cmd =0x53574545, len=84
3,454,773 >>> mbox cmd response data (200 bytes)
3,454,774 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,187 UART: [rt]cmd =0x52564348, len=36
3,486,537 >>> mbox cmd response data (8 bytes)
3,486,538 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,516,659 UART: [rt]cmd =0x53574545, len=84
3,519,700 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
902,034 UART: [kat] SHA2-256
903,974 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
918,083 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,172,166 UART: [cold-reset] ++
1,172,648 UART: [fht] FHT @ 0x50003400
1,175,175 UART: [idev] ++
1,175,343 UART: [idev] CDI.KEYID = 6
1,175,703 UART: [idev] SUBJECT.KEYID = 7
1,176,127 UART: [idev] UDS.KEYID = 0
1,176,472 ready_for_fw is high
1,176,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,847 UART: [idev] Erasing UDS.KEYID = 0
1,200,760 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,238 UART: [ldev] ++
1,210,406 UART: [ldev] CDI.KEYID = 6
1,210,769 UART: [ldev] SUBJECT.KEYID = 5
1,211,195 UART: [ldev] AUTHORITY.KEYID = 7
1,211,658 UART: [ldev] FE.KEYID = 1
1,216,900 UART: [ldev] Erasing FE.KEYID = 1
1,243,091 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,292 UART: [ldev] --
1,282,737 UART: [fwproc] Wait for Commands...
1,283,443 UART: [fwproc] Recv command 0x46574c44
1,284,171 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,548 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,975 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,358 >>> mbox cmd response: success
2,828,472 UART: [afmc] ++
2,828,640 UART: [afmc] CDI.KEYID = 6
2,829,002 UART: [afmc] SUBJECT.KEYID = 7
2,829,427 UART: [afmc] AUTHORITY.KEYID = 5
2,865,338 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,531 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,871 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,572 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,298 UART: [afmc] --
2,908,408 UART: [cold-reset] --
2,909,244 UART: [state] Locking Datavault
2,910,439 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,043 UART: [state] Locking ICCM
2,911,717 UART: [exit] Launching FMC @ 0x40000130
2,917,047 UART:
2,917,063 UART: Running Caliptra FMC ...
2,917,471 UART:
2,917,614 UART: [state] CFI Enabled
2,928,250 UART: [fht] FMC Alias Private Key: 7
3,047,068 UART: [art] Extend RT PCRs Done
3,047,496 UART: [art] Lock RT PCRs Done
3,048,620 UART: [art] Populate DV Done
3,056,871 UART: [fht] FMC Alias Private Key: 7
3,057,931 UART: [art] Derive CDI
3,058,211 UART: [art] Store in slot 0x4
3,144,074 UART: [art] Derive Key Pair
3,144,434 UART: [art] Store priv key in slot 0x5
3,157,592 UART: [art] Derive Key Pair - Done
3,172,319 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,465 UART: [art] PUB.X = C9573E5E48CC05E0E1BD90E150242289A56C8B79A891AD884AC1FE01F418C0AFC68B497C8F50C9932A951A36DCA5EE60
3,195,239 UART: [art] PUB.Y = 304F53567123090196FD47B95B26D19ACF64C3E17D046A146DCA17E4862A53481CC54A2118B29E005B3E6509E222B1D7
3,202,149 UART: [art] SIG.R = 10C0DEEEA82F06C92C2AF98558C46BBB3962459B5BFF8BE008F085274E40008AE54302F1F002901B727B02DCEB80FB9B
3,208,892 UART: [art] SIG.S = 7AB4132620BEC9C02AFD0E4BFA195F2E29C68824F4CC5DC645ED68C78A9A8DDF3D45819CBBB299F2E466E4984DFEEAE5
3,233,303 UART: Caliptra RT
3,233,646 UART: [state] CFI Enabled
3,352,870 UART: [rt] RT listening for mailbox commands...
3,353,540 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,862 UART: [rt]cmd =0x44504543, len=96
3,576,230 >>> mbox cmd response data (6236 bytes)
3,576,231 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,605,922 UART: [rt]cmd =0x53574545, len=84
3,631,216 >>> mbox cmd response data (200 bytes)
3,631,217 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,660,962 UART: [rt]cmd =0x52564348, len=36
3,663,730 >>> mbox cmd response data (8 bytes)
3,663,731 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,693,766 UART: [rt]cmd =0x53574545, len=84
3,697,159 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,928 ready_for_fw is high
1,059,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,445 >>> mbox cmd response: success
2,740,380 UART:
2,740,396 UART: Running Caliptra FMC ...
2,740,804 UART:
2,740,947 UART: [state] CFI Enabled
2,751,767 UART: [fht] FMC Alias Private Key: 7
2,869,701 UART: [art] Extend RT PCRs Done
2,870,129 UART: [art] Lock RT PCRs Done
2,871,859 UART: [art] Populate DV Done
2,880,208 UART: [fht] FMC Alias Private Key: 7
2,881,302 UART: [art] Derive CDI
2,881,582 UART: [art] Store in slot 0x4
2,967,503 UART: [art] Derive Key Pair
2,967,863 UART: [art] Store priv key in slot 0x5
2,980,775 UART: [art] Derive Key Pair - Done
2,995,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,524 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,289 UART: [art] PUB.X = 9C0FE1F17F99F2FCA58862EB881A3101B3D32FE87EB6FD8FFD3D1417F9933609F6BD320C9E2714D1BE6473EE3954F617
3,018,057 UART: [art] PUB.Y = 76F362CB2B5B154E152D4030FD46B2CC79C46047408F100088559568A96D57F2D409A154A8251361867421BBBE6D259C
3,024,972 UART: [art] SIG.R = 874B86116FCEA2FF1C5B7A43BDCEDF19F6612214F05A2AF77E077FB158F0829F74409ECC91706F81070C737F0BC1EC59
3,031,740 UART: [art] SIG.S = 539995A75D5F367540BCF4AFE1FB7A13D57957F36239E3A1E1D8D7E8AD77D98F966EC921F0D144C103D7AA7F877CF8AB
3,055,561 UART: Caliptra RT
3,055,904 UART: [state] CFI Enabled
3,175,723 UART: [rt] RT listening for mailbox commands...
3,176,393 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,627 UART: [rt]cmd =0x44504543, len=96
3,399,237 >>> mbox cmd response data (6236 bytes)
3,399,238 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,428,951 UART: [rt]cmd =0x53574545, len=84
3,455,301 >>> mbox cmd response data (200 bytes)
3,455,302 <<< Executing mbox cmd 0x52564348 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,484,965 UART: [rt]cmd =0x52564348, len=36
3,487,463 >>> mbox cmd response data (8 bytes)
3,487,464 <<< Executing mbox cmd 0x53574545 (84 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,517,307 UART: [rt]cmd =0x53574545, len=84
3,520,834 >>> mbox cmd response: failed
test test_sign_with_export_ecdsa::test_sign_with_revoked_exported_cdi ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.29s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,068,943 UART: [ldev] --
13,073,909 UART: [fwproc] Waiting for Commands...
13,075,794 UART: [fwproc] Received command 0x46574c44
13,078,035 UART: [fwproc] Received Image of size 82832 bytes
16,751,978 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,827,673 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,900,795 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,104,590 >>> mbox cmd response: success
17,105,084 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,109,401 UART: [afmc] ++
17,109,976 UART: [afmc] CDI.KEYID = 6
17,111,100 UART: [afmc] SUBJECT.KEYID = 7
17,112,211 UART: [afmc] AUTHORITY.KEYID = 5
20,475,752 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,771,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,773,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,788,301 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,803,047 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,817,446 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,839,057 UART: [afmc] --
22,843,677 UART: [cold-reset] --
22,846,575 UART: [state] Locking Datavault
22,852,996 UART: [state] Locking PCR0, PCR1 and PCR31
22,854,703 UART: [state] Locking ICCM
22,857,072 UART: [exit] Launching FMC @ 0x40000130
22,865,466 UART:
22,865,708 UART: Running Caliptra FMC ...
22,866,809 UART:
22,866,976 UART: [state] CFI Enabled
22,932,208 UART: [fht] FMC Alias Private Key: 7
25,273,404 UART: [art] Extend RT PCRs Done
25,274,629 UART: [art] Lock RT PCRs Done
25,276,533 UART: [art] Populate DV Done
25,281,851 UART: [fht] FMC Alias Private Key: 7
25,283,550 UART: [art] Derive CDI
25,284,360 UART: [art] Store in slot 0x4
25,340,734 UART: [art] Derive Key Pair
25,341,779 UART: [art] Store priv key in slot 0x5
28,625,485 UART: [art] Derive Key Pair - Done
28,638,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,927,721 UART: [art] Erasing AUTHORITY.KEYID = 7
30,929,232 UART: [art] PUB.X = CA94D037637677493A96F86BB80856884A3D2132201EEA669D24AD85EBF87E9574EB35F721BEEAC3D93A361C38564FF5
30,936,529 UART: [art] PUB.Y = 1898FAB2C1B13B40918D486797CB0F5123EFB74EE41D23704BD04841188FBBA5A3F6A2447343C96A15DADF05B9FB9A84
30,943,754 UART: [art] SIG.R = 181092383941BA9C3442C0708E8FED0ACF6D4846AC7BABFD5EF6697ACC93261A1343FA4534235D9ADE72A641D7AA1533
30,951,193 UART: [art] SIG.S = 4B0B6AEC4DB9FE64674450A5363249D17B5E7C4CA1FE830EDA7CB5FF80CA1A50F0AC3CFD2072B4284B965D300352879B
32,255,956 UART: mbox::rt_entry...
32,256,920 UART: ____ _ _ _ ____ _____
32,258,829 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,260,835 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,262,753 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,264,689 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,266,566 UART: |_|
32,267,395 UART:
32,398,729 UART: [rt] Runtime listening for mailbox commands...
32,400,913 >>> mbox cmd response data (48 bytes)
34,476,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,626,071 UART:
34,626,467 UART: Running Caliptra ROM ...
34,627,522 UART:
34,627,695 UART: [state] CFI Enabled
34,702,958 UART: [state] LifecycleState = Unprovisioned
34,704,896 UART: [state] DebugLocked = No
34,707,607 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,712,182 UART: [kat] SHA2-256
34,881,875 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,892,407 UART: [kat] ++
34,892,866 UART: [kat] sha1
34,903,532 UART: [kat] SHA2-256
34,906,225 UART: [kat] SHA2-384
34,911,190 UART: [kat] SHA2-512-ACC
34,913,593 UART: [kat] ECC-384
37,204,818 UART: [kat] HMAC-384Kdf
37,235,863 UART: [kat] LMS
38,426,187 UART: [kat] --
38,431,935 UART: [update-reset] ++
42,628,431 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,631,890 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,029,613 >>> mbox cmd response: success
43,030,009 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,031,670 UART: [update-reset] Copying MAN_2 To MAN_1
43,054,050 UART: [update-reset Success] --
43,056,233 UART: [state] Locking Datavault
43,058,897 UART: [state] Locking PCR0, PCR1 and PCR31
43,060,735 UART: [state] Locking ICCM
43,062,757 UART: [exit] Launching FMC @ 0x40000130
43,071,207 UART:
43,071,440 UART: Running Caliptra FMC ...
43,072,465 UART:
43,072,613 UART: [state] CFI Enabled
43,176,918 UART: [art] Extend RT PCRs Done
43,178,109 UART: [art] Lock RT PCRs Done
43,179,505 UART: [art] Populate DV Done
43,185,023 UART: [fht] FMC Alias Private Key: 7
43,186,730 UART: [art] Derive CDI
43,187,545 UART: [art] Store in slot 0x4
43,246,020 UART: [art] Derive Key Pair
43,247,059 UART: [art] Store priv key in slot 0x5
46,539,761 UART: [art] Derive Key Pair - Done
46,553,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,841,939 UART: [art] Erasing AUTHORITY.KEYID = 7
48,843,449 UART: [art] PUB.X = 4EF8ED8379F882310ED521A44ED549BDB0199EDF4E1989135E1F76E8DF17ED30D40991E6BC56E61D139EE156E90C9EF5
48,850,785 UART: [art] PUB.Y = 5A4669AFF687808DDEAC88CFC7E4CB8DFF69F85FEA1E6B824803EFD309BFAFC261BEAC8A5CEC7B218C780816B325B6C9
48,858,024 UART: [art] SIG.R = 017BF2A08923334C70B3143EA8748C7CACB2CC1450F8F9054A48DFAFC06EB2512AA61B2A9B7E37259595973565404905
48,865,413 UART: [art] SIG.S = CBE9298E6ADAC9F3A34756161FFD83AEBF63CDE6FD9CA0E82A96DCA392ED60344A53111BC93B1C27DE863ACCCD1B2A17
50,171,067 UART: Caliptra RT
50,171,785 UART: [state] CFI Enabled
50,587,941 UART: [rt] RT listening for mailbox commands...
50,619,860 UART: [rt]cmd =0x4d454153, len=108
50,638,502 >>> mbox cmd response data (12 bytes)
52,699,003 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,804,819 UART:
52,805,187 UART: Running Caliptra ROM ...
52,806,237 UART:
52,806,387 UART: [state] CFI Enabled
52,873,070 UART: [state] LifecycleState = Unprovisioned
52,875,016 UART: [state] DebugLocked = No
52,877,569 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,883,225 UART: [kat] SHA2-256
53,052,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,063,448 UART: [kat] ++
53,063,908 UART: [kat] sha1
53,075,306 UART: [kat] SHA2-256
53,077,995 UART: [kat] SHA2-384
53,083,169 UART: [kat] SHA2-512-ACC
53,085,572 UART: [kat] ECC-384
55,375,073 UART: [kat] HMAC-384Kdf
55,407,230 UART: [kat] LMS
56,597,593 UART: [kat] --
56,602,027 UART: [update-reset] ++
60,362,151 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,365,841 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,638,212 >>> mbox cmd response: success
62,698,663 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,803,379 UART: [update-reset] Copying MAN_2 To MAN_1
62,805,085 UART: [update-reset Success] --
62,806,256 UART: [state] Locking Datavault
62,807,403 UART: [state] Locking PCR0, PCR1 and PCR31
62,808,935 UART: [state] Locking ICCM
62,809,859 UART: [exit] Launching FMC @ 0x40000130
62,811,284 UART:
62,811,448 UART: Running Caliptra FMC ...
62,812,545 UART:
62,812,703 UART: [state] CFI Enabled
62,813,618 UART: [art] Extend RT PCRs Done
62,814,753 UART: [art] Lock RT PCRs Done
62,815,770 UART: [art] Populate DV Done
62,816,716 UART: [fht] FMC Alias Private Key: 7
62,818,037 UART: [art] Derive CDI
62,818,777 UART: [art] Store in slot 0x4
62,819,834 UART: [art] Derive Key Pair
62,820,845 UART: [art] Store priv key in slot 0x5
64,136,090 UART: [art] Derive Key Pair - Done
64,148,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,438,578 UART: [art] Erasing AUTHORITY.KEYID = 7
66,440,095 UART: [art] PUB.X = 2EBE7582B6F0A913D8C8D8A1BA81D782ABBE35B7D2F8DA87F2906C282D6B1D2D01AA568C121E2127ABFD448A37402529
66,447,423 UART: [art] PUB.Y = 51FB87D66E8C04AFDD66F95D2003CD50FBD5EC66E107452C79213D9248B51AF988932FFCD69CC32339AE0F27F691A470
66,454,661 UART: [art] SIG.R = 23DB3315C5DFD4A81299CDB422D8C969326025BE848540F980D54888718773618AA3A29CF23B35080C3C63A272ED37F1
66,461,992 UART: [art] SIG.S = 2406C2559169ABC7EF03E7D6E938BC5CC2CC5F6CE5C95E2D8E36B0445720725A4D3E53F864FABF5FB7DF3BB2221B6589
67,766,965 UART: mbox::rt_entry...
67,767,935 UART: ____ _ _ _ ____ _____
67,770,034 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,772,043 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,773,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,775,902 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,777,830 UART: |_|
67,778,661 UART:
68,151,118 UART: [rt] Runtime listening for mailbox commands...
68,153,237 UART:
68,153,406 UART: Running Caliptra ROM ...
68,154,514 UART:
68,154,673 UART: [state] CFI Enabled
68,227,199 UART: [state] LifecycleState = Unprovisioned
68,229,125 UART: [state] DebugLocked = No
68,231,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
68,236,433 UART: [kat] SHA2-256
68,406,155 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
68,416,618 UART: [kat] ++
68,417,071 UART: [kat] sha1
68,427,472 UART: [kat] SHA2-256
68,430,154 UART: [kat] SHA2-384
68,436,893 UART: [kat] SHA2-512-ACC
68,439,250 UART: [kat] ECC-384
70,731,860 UART: [kat] HMAC-384Kdf
70,764,445 UART: [kat] LMS
71,954,774 UART: [kat] --
71,959,373 UART: [update-reset] ++
75,721,660 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,724,788 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
75,997,549 >>> mbox cmd response: success
75,997,894 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,998,977 UART: [update-reset] Copying MAN_2 To MAN_1
76,021,352 UART: [update-reset Success] --
76,026,721 UART: [state] Locking Datavault
76,029,329 UART: [state] Locking PCR0, PCR1 and PCR31
76,031,087 UART: [state] Locking ICCM
76,032,754 UART: [exit] Launching FMC @ 0x40000130
76,041,206 UART:
76,041,442 UART: Running Caliptra FMC ...
76,042,567 UART:
76,042,728 UART: [state] CFI Enabled
76,149,472 UART: [art] Extend RT PCRs Done
76,150,663 UART: [art] Lock RT PCRs Done
76,152,281 UART: [art] Populate DV Done
76,157,423 UART: [fht] FMC Alias Private Key: 7
76,158,956 UART: [art] Derive CDI
76,159,767 UART: [art] Store in slot 0x4
76,218,780 UART: [art] Derive Key Pair
76,219,820 UART: [art] Store priv key in slot 0x5
79,512,155 UART: [art] Derive Key Pair - Done
79,525,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,812,846 UART: [art] Erasing AUTHORITY.KEYID = 7
81,814,355 UART: [art] PUB.X = D538C28CC80B6E2813CE82E689A5E8711129C6D184E48491D28C977AC1284D55CDE921F767388107024C4F75F68B8E66
81,821,601 UART: [art] PUB.Y = 5B47EFDA534F621B739F0609BE085EEA42AA983E4AC99A0227226D380369EFD2A16AE2060EA1B8EF1AEB6C5CA8CB9D88
81,828,888 UART: [art] SIG.R = 4E8B853E2AD3DA1AA7560DCE00A0BC564F0D9B37C5F8E1DB5DCB432F3FF2A254D28EB1B104B896E2D2857B76F12BD5E5
81,836,287 UART: [art] SIG.S = A2A83500E976F3F9FD259E57C830B1761728880D27A555D22B5E949087E3A11B2CD0DED0B6B3B7DC748B8BE30EA5EBFA
83,140,459 UART: mbox::rt_entry...
83,141,434 UART: ____ _ _ _ ____ _____
83,143,420 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,145,350 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,147,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,149,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,151,071 UART: |_|
83,151,883 UART:
83,525,686 UART: [rt] Runtime listening for mailbox commands...
83,527,877 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,786,858 ready_for_fw is high
3,787,257 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,214,519 >>> mbox cmd response: success
17,215,272 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
22,907,389 UART:
22,907,829 UART: Running Caliptra FMC ...
22,908,963 UART:
22,909,124 UART: [state] CFI Enabled
22,978,224 UART: [fht] FMC Alias Private Key: 7
25,318,119 UART: [art] Extend RT PCRs Done
25,319,804 UART: [art] Lock RT PCRs Done
25,321,032 UART: [art] Populate DV Done
25,326,215 UART: [fht] FMC Alias Private Key: 7
25,327,748 UART: [art] Derive CDI
25,328,527 UART: [art] Store in slot 0x4
25,387,479 UART: [art] Derive Key Pair
25,388,489 UART: [art] Store priv key in slot 0x5
28,681,899 UART: [art] Derive Key Pair - Done
28,695,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,983,040 UART: [art] Erasing AUTHORITY.KEYID = 7
30,984,555 UART: [art] PUB.X = C092655C6BD908D4FAD12C90817461DD9799D0C8D97B84B73F24AF0194D0EB0C635B03576C3B28429A351CAE243897B5
30,991,830 UART: [art] PUB.Y = 70DBE632DD0DCDCA96F3CFE7B24DFE37B9147A89FF901C00BE3EC9E3E224CFDAEC7CC358FF0DB0D35E1C7C4987F7CC07
30,999,111 UART: [art] SIG.R = 70DB0986C37ACDBBFFAA647F17FE4535F8A415553477789C25282225D04562CA7EEF8154C40DEBB3ED108212ABC4F87C
31,006,547 UART: [art] SIG.S = 145965CCEB75BED645EE1A675116B18F8549C5F0FD3368BEE490E9D6E27670F260F3FF953FB34FA09AA97C40FF0EDA97
32,310,663 UART: mbox::rt_entry...
32,311,612 UART: ____ _ _ _ ____ _____
32,313,543 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,315,549 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,317,480 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,319,474 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,321,403 UART: |_|
32,322,232 UART:
32,453,035 UART: [rt] Runtime listening for mailbox commands...
32,455,223 >>> mbox cmd response data (48 bytes)
34,528,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,334,448 >>> mbox cmd response: success
43,335,051 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,369,466 UART:
43,369,744 UART: Running Caliptra FMC ...
43,370,778 UART:
43,370,930 UART: [state] CFI Enabled
43,469,859 UART: [art] Extend RT PCRs Done
43,471,051 UART: [art] Lock RT PCRs Done
43,472,649 UART: [art] Populate DV Done
43,478,267 UART: [fht] FMC Alias Private Key: 7
43,480,016 UART: [art] Derive CDI
43,480,757 UART: [art] Store in slot 0x4
43,539,296 UART: [art] Derive Key Pair
43,540,362 UART: [art] Store priv key in slot 0x5
46,832,870 UART: [art] Derive Key Pair - Done
46,846,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,133,467 UART: [art] Erasing AUTHORITY.KEYID = 7
49,134,979 UART: [art] PUB.X = 602D1F546B7DA5675EA91D2796B8389287535865AF77DA73B5C0C194A63840A03633A32594B63673ADDA7B72D9654BC9
49,142,232 UART: [art] PUB.Y = F7C74D3A34371CDF53E0510DB642B85D29EBFE0FE6E744517EF64AB2E43C03F7D92EFBA4B270BDDF00B8C843E74AFDC3
49,149,511 UART: [art] SIG.R = 7DC1A88ED181E8513F61FBEB321579D2D37BEF399D63C1D8F18F5565B66E5F56D0A5AE6335F1A7AA4AE216E7AC4BFCC5
49,156,959 UART: [art] SIG.S = 7E149CB504F1EB5BC56DFE75846ED5CA5B357FF492A7D67E2F4E1CED41BB39DA8DE8EE50233C78642784141CA710BC41
50,461,826 UART: Caliptra RT
50,462,539 UART: [state] CFI Enabled
50,879,991 UART: [rt] RT listening for mailbox commands...
50,912,329 UART: [rt]cmd =0x4d454153, len=108
50,931,870 >>> mbox cmd response data (12 bytes)
52,994,801 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
61,051,434 >>> mbox cmd response: success
63,111,071 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
63,215,726 UART:
63,216,099 UART: Running Caliptra FMC ...
63,217,149 UART:
63,217,305 UART: [state] CFI Enabled
63,218,146 UART: [art] Extend RT PCRs Done
63,219,293 UART: [art] Lock RT PCRs Done
63,220,280 UART: [art] Populate DV Done
63,221,223 UART: [fht] FMC Alias Private Key: 7
63,222,537 UART: [art] Derive CDI
63,223,270 UART: [art] Store in slot 0x4
63,224,247 UART: [art] Derive Key Pair
63,225,245 UART: [art] Store priv key in slot 0x5
64,551,802 UART: [art] Derive Key Pair - Done
64,564,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,852,964 UART: [art] Erasing AUTHORITY.KEYID = 7
66,854,469 UART: [art] PUB.X = 5084C66142A404F388AB758B52EB56CE7DB0D4C194B9A9F5DA66AD464C0A3D92EF29D650FA239443E6C35372C94A3E79
66,861,717 UART: [art] PUB.Y = 6C27F65C51B0619776919C43E0C227A7D580B63B19A135DE9AFF353C513A1817912EE6348962E034AAB026F35192EFF7
66,868,945 UART: [art] SIG.R = ECFC054FA45E1BD54E4AAE4DFDC32905FE5B927E2E7B48AF4C7716C5E8B3DFF8FE47680004F26E1EDC11444546296E95
66,876,338 UART: [art] SIG.S = 8722EC8AE3EBA24D9AEA8587CF7F931571141B285A93E71FB3616ECE54AB46FFAD1D89970D5C74BC78AEBC5684E9779C
68,180,578 UART: mbox::rt_entry...
68,181,534 UART: ____ _ _ _ ____ _____
68,183,464 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,185,470 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,187,399 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,189,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,191,256 UART: |_|
68,192,239 UART:
68,555,255 UART: [rt] Runtime listening for mailbox commands...
76,491,486 >>> mbox cmd response: success
76,491,877 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,524,888 UART:
76,525,149 UART: Running Caliptra FMC ...
76,526,352 UART:
76,526,507 UART: [state] CFI Enabled
76,631,275 UART: [art] Extend RT PCRs Done
76,632,468 UART: [art] Lock RT PCRs Done
76,633,549 UART: [art] Populate DV Done
76,638,905 UART: [fht] FMC Alias Private Key: 7
76,640,442 UART: [art] Derive CDI
76,641,254 UART: [art] Store in slot 0x4
76,700,207 UART: [art] Derive Key Pair
76,701,243 UART: [art] Store priv key in slot 0x5
79,993,686 UART: [art] Derive Key Pair - Done
80,006,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
82,295,117 UART: [art] Erasing AUTHORITY.KEYID = 7
82,296,626 UART: [art] PUB.X = 3EFDE15C1728B2EF13C9B41A218D80EA65B2F0788C1B33CFDBBEB803702347B1AA5ECC2A318D776063E70289703BFE09
82,303,897 UART: [art] PUB.Y = 9E0141DB55315C776BF1F528D1D3930064210F293E2FAA1A0900092D2A4A7CA1FAAD734084C258B9439919FA4E8B5A27
82,311,084 UART: [art] SIG.R = 7F1399354164661D4094125D35868EA7142CA859E5D1C28E5200628D59F7E3A506A5F09BBD18D7BAB6289CC1335FFAA0
82,318,424 UART: [art] SIG.S = 8B51308A6F89FF61465F67039C14FC10337EA622D8EC1F140BE2954BFF5442A20CDFDA92777A9A9820C60399C49EC39F
83,622,819 UART: mbox::rt_entry...
83,623,778 UART: ____ _ _ _ ____ _____
83,625,761 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,627,877 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,629,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,631,747 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,633,675 UART: |_|
83,634,485 UART:
84,000,920 UART: [rt] Runtime listening for mailbox commands...
84,003,153 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.32s
Truncated 2539 bytes from beginning
ED2387A2A26F6449C41B5D86AD0
13,305,043 UART: [ldev] --
13,309,293 UART: [fwproc] Waiting for Commands...
13,311,543 UART: [fwproc] Received command 0x46574c44
13,313,774 UART: [fwproc] Received Image of size 82832 bytes
16,981,603 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,053,409 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,126,581 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,329,924 >>> mbox cmd response: success
17,330,940 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,334,198 UART: [afmc] ++
17,334,802 UART: [afmc] CDI.KEYID = 6
17,335,706 UART: [afmc] SUBJECT.KEYID = 7
17,336,917 UART: [afmc] AUTHORITY.KEYID = 5
20,650,802 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,941,665 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,943,922 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,958,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,973,110 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,987,542 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,007,925 UART: [afmc] --
23,011,959 UART: [cold-reset] --
23,016,520 UART: [state] Locking Datavault
23,021,063 UART: [state] Locking PCR0, PCR1 and PCR31
23,022,811 UART: [state] Locking ICCM
23,024,201 UART: [exit] Launching FMC @ 0x40000130
23,032,586 UART:
23,032,847 UART: Running Caliptra FMC ...
23,033,951 UART:
23,034,108 UART: [state] CFI Enabled
23,042,205 UART: [fht] FMC Alias Private Key: 7
25,381,343 UART: [art] Extend RT PCRs Done
25,382,561 UART: [art] Lock RT PCRs Done
25,384,181 UART: [art] Populate DV Done
25,389,589 UART: [fht] FMC Alias Private Key: 7
25,391,065 UART: [art] Derive CDI
25,391,823 UART: [art] Store in slot 0x4
25,434,512 UART: [art] Derive Key Pair
25,435,507 UART: [art] Store priv key in slot 0x5
28,677,967 UART: [art] Derive Key Pair - Done
28,690,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,970,526 UART: [art] Erasing AUTHORITY.KEYID = 7
30,972,033 UART: [art] PUB.X = 00AAB624C06F79C2304E56AA8387C407EF641867EDAA66C1FA00FFB1504DE322C6F1CCF5B0A9BA6DD13EFC975DB6AA34
30,979,300 UART: [art] PUB.Y = 81C9880C2D1D89D21C961720EECE5757D41ADE4EABC526A642675D4DFA1D67A614DAF3D3F3BAE8310C7125A3766A124B
30,986,559 UART: [art] SIG.R = FD2B07E022415A0EC4BC87DF69E1D0B398BE77CFBBF2725F903E01DC14EF2EA319E0C4768578BD8791CCD7B9EF27994A
30,993,952 UART: [art] SIG.S = 1DD4240F729E786FA1F70ABF97A26390D2636180A22640891AC8B3A3FC3DC166B81A002BB30CE8F9878D8B05DE1E2E95
32,298,165 UART: mbox::rt_entry...
32,299,125 UART: ____ _ _ _ ____ _____
32,301,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,303,103 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,305,025 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,306,948 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,308,866 UART: |_|
32,309,671 UART:
32,441,651 UART: [rt] Runtime listening for mailbox commands...
32,443,841 >>> mbox cmd response data (48 bytes)
34,515,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,665,327 UART:
34,665,691 UART: Running Caliptra ROM ...
34,666,821 UART:
34,666,990 UART: [state] CFI Enabled
34,679,583 UART: [state] LifecycleState = Unprovisioned
34,681,518 UART: [state] DebugLocked = No
34,682,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,687,405 UART: [kat] SHA2-256
34,857,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,867,669 UART: [kat] ++
34,868,149 UART: [kat] sha1
34,880,760 UART: [kat] SHA2-256
34,883,473 UART: [kat] SHA2-384
34,889,029 UART: [kat] SHA2-512-ACC
34,891,379 UART: [kat] ECC-384
37,174,993 UART: [kat] HMAC-384Kdf
37,187,071 UART: [kat] LMS
38,377,146 UART: [kat] --
38,381,317 UART: [update-reset] ++
42,575,831 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,580,312 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
42,978,081 >>> mbox cmd response: success
42,978,477 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,979,530 UART: [update-reset] Copying MAN_2 To MAN_1
43,001,936 UART: [update-reset Success] --
43,006,722 UART: [state] Locking Datavault
43,010,677 UART: [state] Locking PCR0, PCR1 and PCR31
43,012,520 UART: [state] Locking ICCM
43,013,559 UART: [exit] Launching FMC @ 0x40000130
43,021,964 UART:
43,022,201 UART: Running Caliptra FMC ...
43,023,300 UART:
43,023,452 UART: [state] CFI Enabled
43,067,635 UART: [art] Extend RT PCRs Done
43,068,825 UART: [art] Lock RT PCRs Done
43,070,445 UART: [art] Populate DV Done
43,075,903 UART: [fht] FMC Alias Private Key: 7
43,077,432 UART: [art] Derive CDI
43,078,194 UART: [art] Store in slot 0x4
43,120,778 UART: [art] Derive Key Pair
43,121,774 UART: [art] Store priv key in slot 0x5
46,363,548 UART: [art] Derive Key Pair - Done
46,376,719 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,657,342 UART: [art] Erasing AUTHORITY.KEYID = 7
48,658,879 UART: [art] PUB.X = 0DE97AA6E7340F9E321B89FFD6F41A587964DB1AFB79E8BF7856AE67936C9032BB8A25D63FB6B8C8CE3D928206B3CD1E
48,666,202 UART: [art] PUB.Y = 3BCC6EB0006A78396FC54C78E69F2309324D24EDEF776CA747B5095239BC646AFDF26B85ED203D2F24130B04499269AD
48,673,377 UART: [art] SIG.R = 29FB9126AAFA611FEC812B3C810AF7A494C84AD4815E9E364AE0795FE91F1CD1F191207BB992AF6A71A2A602EE6A2989
48,680,821 UART: [art] SIG.S = 2EF74EC4AF713E42DC5CB93D420E3B5D3D4ED58A7446838AAC6EB1F17579232E095412BF257A417CD60445F997E68E95
49,986,176 UART: Caliptra RT
49,986,878 UART: [state] CFI Enabled
50,363,627 UART: [rt] RT listening for mailbox commands...
50,395,819 UART: [rt]cmd =0x4d454153, len=108
50,414,261 >>> mbox cmd response data (12 bytes)
52,472,547 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,578,336 UART:
52,578,696 UART: Running Caliptra ROM ...
52,579,747 UART:
52,580,005 UART: [state] CFI Enabled
52,595,533 UART: [state] LifecycleState = Unprovisioned
52,597,495 UART: [state] DebugLocked = No
52,600,310 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,605,095 UART: [kat] SHA2-256
52,774,783 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,785,305 UART: [kat] ++
52,785,813 UART: [kat] sha1
52,796,207 UART: [kat] SHA2-256
52,798,951 UART: [kat] SHA2-384
52,805,529 UART: [kat] SHA2-512-ACC
52,807,924 UART: [kat] ECC-384
55,091,741 UART: [kat] HMAC-384Kdf
55,102,680 UART: [kat] LMS
56,292,762 UART: [kat] --
56,294,263 UART: [update-reset] ++
60,049,398 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,053,743 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,326,530 >>> mbox cmd response: success
62,383,045 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,487,699 UART: [update-reset] Copying MAN_2 To MAN_1
62,489,374 UART: [update-reset Success] --
62,490,530 UART: [state] Locking Datavault
62,491,675 UART: [state] Locking PCR0, PCR1 and PCR31
62,493,209 UART: [state] Locking ICCM
62,494,086 UART: [exit] Launching FMC @ 0x40000130
62,495,430 UART:
62,495,572 UART: Running Caliptra FMC ...
62,496,626 UART:
62,496,767 UART: [state] CFI Enabled
62,497,643 UART: [art] Extend RT PCRs Done
62,498,787 UART: [art] Lock RT PCRs Done
62,499,852 UART: [art] Populate DV Done
62,501,012 UART: [fht] FMC Alias Private Key: 7
62,502,349 UART: [art] Derive CDI
62,503,076 UART: [art] Store in slot 0x4
62,504,053 UART: [art] Derive Key Pair
62,505,039 UART: [art] Store priv key in slot 0x5
63,712,786 UART: [art] Derive Key Pair - Done
63,725,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,006,421 UART: [art] Erasing AUTHORITY.KEYID = 7
66,007,938 UART: [art] PUB.X = 1309792D10FFBD2B0D3F4409C04D113A90F8EA2454821E829F31A6B96E4873E41931743D3D1C000D44631334D8D70FF0
66,015,188 UART: [art] PUB.Y = C0F6C735C6193F48569292B42BBE469B571D9A054884B53867271DACC8321B92EFBF2B6576821A4EE21665023AF275DA
66,022,398 UART: [art] SIG.R = B67B8EF3447701270D19320480ACB560D3506E95E16F3F06A064F1F3925DF976113028F788C043251837C5627A3B67BB
66,029,796 UART: [art] SIG.S = 5792CCEBF20AD53F6A91DA48A6AF3589F8C566B7A54B9083EAE91D676FAEA05E11396CA9C487A8F93F3CBBA07AE2E944
67,335,074 UART: mbox::rt_entry...
67,336,065 UART: ____ _ _ _ ____ _____
67,338,054 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,340,053 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,341,975 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,343,893 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,345,812 UART: |_|
67,346,612 UART:
67,714,551 UART: [rt] Runtime listening for mailbox commands...
67,716,662 UART:
67,716,822 UART: Running Caliptra ROM ...
67,717,921 UART:
67,718,297 UART: [state] CFI Enabled
67,732,605 UART: [state] LifecycleState = Unprovisioned
67,734,477 UART: [state] DebugLocked = No
67,736,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
67,742,238 UART: [kat] SHA2-256
67,911,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
67,922,444 UART: [kat] ++
67,922,976 UART: [kat] sha1
67,934,668 UART: [kat] SHA2-256
67,937,421 UART: [kat] SHA2-384
67,943,678 UART: [kat] SHA2-512-ACC
67,946,058 UART: [kat] ECC-384
70,229,061 UART: [kat] HMAC-384Kdf
70,240,812 UART: [kat] LMS
71,430,867 UART: [kat] --
71,435,027 UART: [update-reset] ++
75,191,956 UART: [update-reset] Image verified using Vendor ECC Key Index 0
75,196,327 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
75,469,077 >>> mbox cmd response: success
75,469,462 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
75,470,984 UART: [update-reset] Copying MAN_2 To MAN_1
75,493,432 UART: [update-reset Success] --
75,496,305 UART: [state] Locking Datavault
75,500,791 UART: [state] Locking PCR0, PCR1 and PCR31
75,502,540 UART: [state] Locking ICCM
75,504,850 UART: [exit] Launching FMC @ 0x40000130
75,513,292 UART:
75,513,522 UART: Running Caliptra FMC ...
75,514,615 UART:
75,514,765 UART: [state] CFI Enabled
75,558,991 UART: [art] Extend RT PCRs Done
75,560,164 UART: [art] Lock RT PCRs Done
75,561,771 UART: [art] Populate DV Done
75,567,020 UART: [fht] FMC Alias Private Key: 7
75,568,721 UART: [art] Derive CDI
75,569,452 UART: [art] Store in slot 0x4
75,612,144 UART: [art] Derive Key Pair
75,613,156 UART: [art] Store priv key in slot 0x5
78,854,929 UART: [art] Derive Key Pair - Done
78,867,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,147,922 UART: [art] Erasing AUTHORITY.KEYID = 7
81,149,430 UART: [art] PUB.X = 9AD655FA6668E011F8DF46D86FE529198201FB4694256E9F079E14F975F89CCAD72E009C41538460407D45A6B01336F9
81,156,611 UART: [art] PUB.Y = 907DAE0A20691F3D3C4585A18720E5F328CB12531F979F1A8357737C11FAA903C9773C9A9C6851D4AE8BA432125544C0
81,163,859 UART: [art] SIG.R = 7627FA47B19978B53ECE8BEC46717F8941A63BC2A051B0E6697B3D44EB6BB5193FD188ABDD6A8C718408B5EAE0566041
81,171,294 UART: [art] SIG.S = AAE131149CD3CE6BE63E74894523B731FF5E75DE9B9364F242D3A21F30F8069E23578063E9234B2D7D6ADFC443232A1E
82,475,621 UART: mbox::rt_entry...
82,476,588 UART: ____ _ _ _ ____ _____
82,478,512 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
82,480,512 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
82,482,361 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
82,484,288 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
82,486,176 UART: |_|
82,486,995 UART:
82,856,671 UART: [rt] Runtime listening for mailbox commands...
82,858,843 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,127,858 ready_for_fw is high
4,128,409 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,445,689 >>> mbox cmd response: success
17,447,035 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
23,086,539 UART:
23,086,919 UART: Running Caliptra FMC ...
23,088,123 UART:
23,088,492 UART: [state] CFI Enabled
23,096,035 UART: [fht] FMC Alias Private Key: 7
25,436,212 UART: [art] Extend RT PCRs Done
25,437,549 UART: [art] Lock RT PCRs Done
25,438,613 UART: [art] Populate DV Done
25,444,233 UART: [fht] FMC Alias Private Key: 7
25,445,878 UART: [art] Derive CDI
25,446,694 UART: [art] Store in slot 0x4
25,489,423 UART: [art] Derive Key Pair
25,490,456 UART: [art] Store priv key in slot 0x5
28,732,660 UART: [art] Derive Key Pair - Done
28,745,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,025,702 UART: [art] Erasing AUTHORITY.KEYID = 7
31,027,212 UART: [art] PUB.X = 081769D32E2E9FA8BC94AC07B73B111CDDD556423D82C9B908C5B690D94C092CB8E11BB777FFE9992F4479B7571D5B20
31,034,470 UART: [art] PUB.Y = 2146048236EC2F98C87604766FB186AD0DA7B1483FEB2634FE18C1E3834688BE81DF2F472CF660E6E85460D2F98C5D18
31,041,711 UART: [art] SIG.R = 3B2CBD4EDFC2DD37C981B5EC4E73A0BC63B157C76F758C0015BA9ABF6DE7F76367E09FB67DC7BE2E4A4520B5F4626648
31,049,161 UART: [art] SIG.S = 8B0E2D293EF64AA3230E6CD7153EC3B88A9276889F979F1948EF031A764AE0A5B0411F68B220B6EA118B474349FE8AB1
32,354,233 UART: mbox::rt_entry...
32,355,274 UART: ____ _ _ _ ____ _____
32,357,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,359,265 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,361,188 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,363,173 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,365,104 UART: |_|
32,365,909 UART:
32,497,157 UART: [rt] Runtime listening for mailbox commands...
32,499,328 >>> mbox cmd response data (48 bytes)
34,568,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,310,076 >>> mbox cmd response: success
43,310,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
43,345,613 UART:
43,345,922 UART: Running Caliptra FMC ...
43,346,966 UART:
43,347,110 UART: [state] CFI Enabled
43,391,614 UART: [art] Extend RT PCRs Done
43,392,757 UART: [art] Lock RT PCRs Done
43,394,389 UART: [art] Populate DV Done
43,400,054 UART: [fht] FMC Alias Private Key: 7
43,401,745 UART: [art] Derive CDI
43,402,476 UART: [art] Store in slot 0x4
43,445,286 UART: [art] Derive Key Pair
43,446,324 UART: [art] Store priv key in slot 0x5
46,688,684 UART: [art] Derive Key Pair - Done
46,701,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,982,050 UART: [art] Erasing AUTHORITY.KEYID = 7
48,983,569 UART: [art] PUB.X = B0A80886AC931E384531784D2F6582ECE8FEC92A8060C53CCDE7BB70A308A44E74BF8A5F1D2CCB86869DC187C3431020
48,990,835 UART: [art] PUB.Y = D03CECF97534DA0D66BE02BE208A6D23876C7FDDE3F3EB741BB9DA35DC6F614A26ACBF996D3CCBA8994C0E1395875DE2
48,998,120 UART: [art] SIG.R = 6DA1ACF6BCBC2E53EC21DF6D8349DB120122A7BC403F6682166BEDB7D013314DB4A866FB9E194548DD27B594D0580712
49,005,517 UART: [art] SIG.S = 73E954D74264C6E145B0CD030D82A79BAC795E06B0FEA8C39D3A40C19282879185DEDD84F594A0C84573F5C37473B767
50,310,793 UART: Caliptra RT
50,311,506 UART: [state] CFI Enabled
50,679,374 UART: [rt] RT listening for mailbox commands...
50,711,214 UART: [rt]cmd =0x4d454153, len=108
50,730,246 >>> mbox cmd response data (12 bytes)
52,789,426 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,760,509 >>> mbox cmd response: success
62,818,748 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
62,923,365 UART:
62,923,731 UART: Running Caliptra FMC ...
62,924,780 UART:
62,924,929 UART: [state] CFI Enabled
62,925,806 UART: [art] Extend RT PCRs Done
62,926,861 UART: [art] Lock RT PCRs Done
62,927,925 UART: [art] Populate DV Done
62,929,126 UART: [fht] FMC Alias Private Key: 7
62,930,459 UART: [art] Derive CDI
62,931,191 UART: [art] Store in slot 0x4
62,932,167 UART: [art] Derive Key Pair
62,933,152 UART: [art] Store priv key in slot 0x5
64,137,489 UART: [art] Derive Key Pair - Done
64,150,328 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,430,510 UART: [art] Erasing AUTHORITY.KEYID = 7
66,432,041 UART: [art] PUB.X = 2AFD1055638D674E8829E8F7A0D8A96D756F6EAA2EBE8FC0C38AB1BED68B6A81D9B95F6F65DFE1BB5C568334F3783D0D
66,439,297 UART: [art] PUB.Y = 6D030666F0052CFC44F856553675E87418A244525A8E0887B2C063B81D8C34E63DC10A23CD18A0C40C783723CAB47192
66,446,520 UART: [art] SIG.R = 3D1471308F34BDD71D28F17E3D05E25B5020B26FFFB9781291410778D83D634E6F02E2D5929A1CB9F1716DD9F69DDED6
66,453,964 UART: [art] SIG.S = 66B857EF4813EE82C8835959E56B2E3BF4CCB157BDEC9B1AEE51E024E84D303632CE7F3B05BCE81ADE76AD373AC04444
67,758,556 UART: mbox::rt_entry...
67,759,525 UART: ____ _ _ _ ____ _____
67,761,454 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,763,462 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,765,389 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,767,312 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,769,233 UART: |_|
67,770,061 UART:
68,136,566 UART: [rt] Runtime listening for mailbox commands...
76,002,126 >>> mbox cmd response: success
76,002,544 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
76,036,154 UART:
76,036,436 UART: Running Caliptra FMC ...
76,037,466 UART:
76,037,611 UART: [state] CFI Enabled
76,081,689 UART: [art] Extend RT PCRs Done
76,082,876 UART: [art] Lock RT PCRs Done
76,084,360 UART: [art] Populate DV Done
76,089,761 UART: [fht] FMC Alias Private Key: 7
76,091,290 UART: [art] Derive CDI
76,092,022 UART: [art] Store in slot 0x4
76,134,860 UART: [art] Derive Key Pair
76,135,888 UART: [art] Store priv key in slot 0x5
79,377,553 UART: [art] Derive Key Pair - Done
79,390,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
81,670,515 UART: [art] Erasing AUTHORITY.KEYID = 7
81,672,019 UART: [art] PUB.X = E8C69FDDB73D41EFABD179441FE661D3A1594F17D9DC668CC310728644FA250A1C8CFF22FF11AC62EE87DD42FBBFD891
81,679,329 UART: [art] PUB.Y = 560441CDFD012F05E8C9B44115227199ECA1FB2FF31B8FA2F9A647C47871529786836756F9C1ADE424E05F6204E4A36A
81,686,570 UART: [art] SIG.R = CC909184283269678435D78DB6598F37E889D68C25FF9C203BB607A8F4C494D91CFB43C2EA664AE3DDC8019520812243
81,693,897 UART: [art] SIG.S = 11B8B850A87E9A2CFDD515674AFA2A69BC863454A123E1A29830E0D27D9C1095B5A2CDBE95F1C45C890BA294A5CA05F8
82,998,646 UART: mbox::rt_entry...
82,999,609 UART: ____ _ _ _ ____ _____
83,001,536 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
83,003,602 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
83,005,658 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
83,007,588 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
83,009,649 UART: |_|
83,010,495 UART:
83,380,636 UART: [rt] Runtime listening for mailbox commands...
83,382,809 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 4.28s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,340,496 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,361,850 UART: [ldev] --
10,366,680 UART: [fwproc] Wait for Commands...
10,368,624 UART: [fwproc] Recv command 0x46574c44
10,370,603 UART: [fwproc] Recv'd Img size: 82832 bytes
13,416,020 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,569,461 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,772,525 >>> mbox cmd response: success
13,773,711 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,776,497 UART: [afmc] ++
13,777,080 UART: [afmc] CDI.KEYID = 6
13,778,054 UART: [afmc] SUBJECT.KEYID = 7
13,779,133 UART: [afmc] AUTHORITY.KEYID = 5
16,312,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,055,115 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,057,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,073,129 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,089,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,104,773 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,129,050 UART: [afmc] --
18,132,744 UART: [cold-reset] --
18,136,381 UART: [state] Locking Datavault
18,141,783 UART: [state] Locking PCR0, PCR1 and PCR31
18,143,542 UART: [state] Locking ICCM
18,144,557 UART: [exit] Launching FMC @ 0x40000130
18,153,003 UART:
18,153,239 UART: Running Caliptra FMC ...
18,154,331 UART:
18,154,490 UART: [state] CFI Enabled
18,211,691 UART: [fht] FMC Alias Private Key: 7
19,978,054 UART: [art] Extend RT PCRs Done
19,979,280 UART: [art] Lock RT PCRs Done
19,981,333 UART: [art] Populate DV Done
19,986,741 UART: [fht] FMC Alias Private Key: 7
19,988,307 UART: [art] Derive CDI
19,989,065 UART: [art] Store in slot 0x4
20,043,718 UART: [art] Derive Key Pair
20,044,764 UART: [art] Store priv key in slot 0x5
22,507,506 UART: [art] Derive Key Pair - Done
22,520,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,232,976 UART: [art] Erasing AUTHORITY.KEYID = 7
24,234,495 UART: [art] PUB.X = 3318D3F3E1DB630A5B4D5E7679268E10695F82C007545DCC9C9D1E24F22F02870F485B9E3401B8206B121A0EDA9E7E40
24,241,768 UART: [art] PUB.Y = 3945B1874CC58D03F5AD19AFB9C468E7C720C1998514A16294C6B61225C7201FD48D00A1DA8BFCDAFED9739A6EDE0460
24,248,963 UART: [art] SIG.R = E366F65D1762D315313AF00A5F55579BF19189F43549FA6F5688C352651C3C8493FBCF0B49F4D2104CA17325DA37E3B9
24,256,358 UART: [art] SIG.S = 359F1C40D90DE617B0A8D5295F884A0BAB93FDEDCEC1217C1BC5B778FC7A7BD65413731F9C85F29D8DE8AF9449B11A59
25,234,725 UART: mbox::rt_entry...
25,235,682 UART: ____ _ _ _ ____ _____
25,237,661 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,239,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,241,592 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,243,539 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,245,466 UART: |_|
25,246,274 UART:
25,377,408 UART: [rt] Runtime listening for mailbox commands...
25,379,580 >>> mbox cmd response data (48 bytes)
27,444,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,594,331 UART:
27,594,702 UART: Running Caliptra ROM ...
27,595,834 UART:
27,596,011 UART: [state] CFI Enabled
27,663,004 UART: [state] LifecycleState = Unprovisioned
27,664,932 UART: [state] DebugLocked = No
27,667,475 UART: [state] WD Timer not started. Device not locked for debugging
27,671,261 UART: [kat] SHA2-256
27,850,899 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,861,672 UART: [kat] ++
27,862,170 UART: [kat] sha1
27,873,536 UART: [kat] SHA2-256
27,876,221 UART: [kat] SHA2-384
27,881,986 UART: [kat] SHA2-512-ACC
27,884,328 UART: [kat] ECC-384
30,348,995 UART: [kat] HMAC-384Kdf
30,370,968 UART: [kat] LMS
30,847,432 UART: [kat] --
30,852,557 UART: [update-reset] ++
34,349,884 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,352,680 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,750,282 >>> mbox cmd response: success
34,750,681 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,752,231 UART: [update-reset] Copying MAN_2 To MAN_1
34,789,347 UART: [update-reset Success] --
34,793,570 UART: [state] Locking Datavault
34,797,092 UART: [state] Locking PCR0, PCR1 and PCR31
34,799,008 UART: [state] Locking ICCM
34,801,579 UART: [exit] Launching FMC @ 0x40000130
34,809,971 UART:
34,810,204 UART: Running Caliptra FMC ...
34,811,230 UART:
34,811,373 UART: [state] CFI Enabled
34,906,401 UART: [art] Extend RT PCRs Done
34,907,598 UART: [art] Lock RT PCRs Done
34,909,292 UART: [art] Populate DV Done
34,914,717 UART: [fht] FMC Alias Private Key: 7
34,916,306 UART: [art] Derive CDI
34,917,066 UART: [art] Store in slot 0x4
34,975,140 UART: [art] Derive Key Pair
34,976,183 UART: [art] Store priv key in slot 0x5
37,438,642 UART: [art] Derive Key Pair - Done
37,451,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,164,118 UART: [art] Erasing AUTHORITY.KEYID = 7
39,165,625 UART: [art] PUB.X = 95C86AEEB03959CE418FB0F5BFF3A6FBD3F03BD180A3554FD292974B14ECBD28BD928475CFD4D82D360E60CC124065AC
39,172,928 UART: [art] PUB.Y = 16D1DA0167B12D010B0D6D1C0FC24A6758C05B247714CFCE36A9D4A749D4C281EBC6A17B88C8FF06135881C394F981E5
39,180,168 UART: [art] SIG.R = CDFBF2827ABA882C39F7208461D252CEAAA2F9B2853F741D2C51CF14E208457E342AB401896F1EC3022B7F22F231803F
39,187,554 UART: [art] SIG.S = FE34E8E9AAFDD23CAE70DA0F17AB05EBA0ABF560BD15BCB29B4976ACAEBCB968D95348C238000E56470AD133A4FDA445
40,165,870 UART: Caliptra RT
40,166,571 UART: [state] CFI Enabled
40,585,577 UART: [rt] RT listening for mailbox commands...
40,617,663 UART: [rt]cmd =0x4d454153, len=108
40,635,857 >>> mbox cmd response data (12 bytes)
42,685,160 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,791,035 UART:
42,791,405 UART: Running Caliptra ROM ...
42,792,464 UART:
42,792,616 UART: [state] CFI Enabled
42,848,759 UART: [state] LifecycleState = Unprovisioned
42,850,691 UART: [state] DebugLocked = No
42,851,943 UART: [state] WD Timer not started. Device not locked for debugging
42,855,352 UART: [kat] SHA2-256
43,035,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,045,806 UART: [kat] ++
43,046,261 UART: [kat] sha1
43,058,012 UART: [kat] SHA2-256
43,060,725 UART: [kat] SHA2-384
43,066,175 UART: [kat] SHA2-512-ACC
43,068,523 UART: [kat] ECC-384
45,512,750 UART: [kat] HMAC-384Kdf
45,535,144 UART: [kat] LMS
46,011,550 UART: [kat] --
46,016,192 UART: [update-reset] ++
49,075,474 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,078,972 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,351,592 >>> mbox cmd response: success
51,396,549 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,501,237 UART: [update-reset] Copying MAN_2 To MAN_1
51,502,935 UART: [update-reset Success] --
51,504,103 UART: [state] Locking Datavault
51,505,266 UART: [state] Locking PCR0, PCR1 and PCR31
51,506,800 UART: [state] Locking ICCM
51,507,710 UART: [exit] Launching FMC @ 0x40000130
51,509,132 UART:
51,509,296 UART: Running Caliptra FMC ...
51,510,392 UART:
51,510,542 UART: [state] CFI Enabled
51,511,458 UART: [art] Extend RT PCRs Done
51,512,592 UART: [art] Lock RT PCRs Done
51,513,653 UART: [art] Populate DV Done
51,514,678 UART: [fht] FMC Alias Private Key: 7
51,515,993 UART: [art] Derive CDI
51,516,725 UART: [art] Store in slot 0x4
51,517,783 UART: [art] Derive Key Pair
51,518,993 UART: [art] Store priv key in slot 0x5
52,046,903 UART: [art] Derive Key Pair - Done
52,059,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,774,918 UART: [art] Erasing AUTHORITY.KEYID = 7
53,776,467 UART: [art] PUB.X = C4DE90592A6AEA1744951632D1657DF1E57AB851D0F4C3A990B2E759B4FDBB74C2C0BD39E627434A22F992EF71E28870
53,783,670 UART: [art] PUB.Y = 7DC31B78A1E80E40DA6F7E15525A12B19CC31CEBC87C76F38E0061B26C39C3082B6969915F1DE3A43EDA86264E21151D
53,790,902 UART: [art] SIG.R = CFDDCE247226817F405C4FADCC91374C5394769C42B81149E77F01E6DDF710AE5CB9C27133D4D1BE4A1E505EC2CAA3AB
53,798,353 UART: [art] SIG.S = BA8E9C380381D563173ACD7EE2B1A34B11391B3770BC620F2FE75ED4638ADB0C772379011FC90E5741191FE39DA7714C
54,776,423 UART: mbox::rt_entry...
54,777,369 UART: ____ _ _ _ ____ _____
54,779,351 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,781,348 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,783,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,785,198 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,787,126 UART: |_|
54,787,934 UART:
55,162,850 UART: [rt] Runtime listening for mailbox commands...
55,164,934 UART:
55,165,125 UART: Running Caliptra ROM ...
55,166,235 UART:
55,166,390 UART: [state] CFI Enabled
55,223,570 UART: [state] LifecycleState = Unprovisioned
55,225,499 UART: [state] DebugLocked = No
55,228,126 UART: [state] WD Timer not started. Device not locked for debugging
55,231,536 UART: [kat] SHA2-256
55,411,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,422,026 UART: [kat] ++
55,422,488 UART: [kat] sha1
55,432,453 UART: [kat] SHA2-256
55,435,151 UART: [kat] SHA2-384
55,441,569 UART: [kat] SHA2-512-ACC
55,443,955 UART: [kat] ECC-384
57,908,991 UART: [kat] HMAC-384Kdf
57,930,014 UART: [kat] LMS
58,406,482 UART: [kat] --
58,410,200 UART: [update-reset] ++
61,476,570 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,479,733 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,752,371 >>> mbox cmd response: success
61,752,742 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,754,224 UART: [update-reset] Copying MAN_2 To MAN_1
61,791,373 UART: [update-reset Success] --
61,796,552 UART: [state] Locking Datavault
61,799,105 UART: [state] Locking PCR0, PCR1 and PCR31
61,800,856 UART: [state] Locking ICCM
61,802,729 UART: [exit] Launching FMC @ 0x40000130
61,811,125 UART:
61,811,356 UART: Running Caliptra FMC ...
61,812,452 UART:
61,812,606 UART: [state] CFI Enabled
61,908,914 UART: [art] Extend RT PCRs Done
61,910,104 UART: [art] Lock RT PCRs Done
61,911,391 UART: [art] Populate DV Done
61,916,799 UART: [fht] FMC Alias Private Key: 7
61,918,437 UART: [art] Derive CDI
61,919,449 UART: [art] Store in slot 0x4
61,977,747 UART: [art] Derive Key Pair
61,978,748 UART: [art] Store priv key in slot 0x5
64,441,637 UART: [art] Derive Key Pair - Done
64,454,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,167,972 UART: [art] Erasing AUTHORITY.KEYID = 7
66,169,480 UART: [art] PUB.X = F2927AE4ED8DD90E4711488E2577A29DC54DFE367E808900E381E1B0112BF735CA632587F4480A79022161E7DB7C0E29
66,176,725 UART: [art] PUB.Y = E5BD119A22DB9CD760491A7CC6E354434C9D84BE72647A2248D64A212932ED7D6EF1A2122AFA730CCAE5F16665C1CED2
66,184,007 UART: [art] SIG.R = 7571C5BA964B4EB38CC9679351BBAA94FC0808CEF981B166478AA2786FA00B4D673964D31FB559B4655CB33D37B760BD
66,191,409 UART: [art] SIG.S = 27BA9A50F02D0CE0324C54811C98D3594C3EF25CBA54B41AF3B7ACB4F80C32883E761DF00EE3C4F31885BDDE7BD34649
67,169,743 UART: mbox::rt_entry...
67,170,718 UART: ____ _ _ _ ____ _____
67,172,646 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,174,653 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,176,508 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,178,430 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,180,308 UART: |_|
67,181,193 UART:
67,551,039 UART: [rt] Runtime listening for mailbox commands...
67,553,215 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.49s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,916 writing to cptra_bootfsm_go
3,461,390 ready_for_fw is high
3,461,798 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,664,372 >>> mbox cmd response: success
13,665,763 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
17,966,298 UART:
17,966,703 UART: Running Caliptra FMC ...
17,967,809 UART:
17,967,965 UART: [state] CFI Enabled
18,030,699 UART: [fht] FMC Alias Private Key: 7
19,798,000 UART: [art] Extend RT PCRs Done
19,799,226 UART: [art] Lock RT PCRs Done
19,800,957 UART: [art] Populate DV Done
19,806,105 UART: [fht] FMC Alias Private Key: 7
19,807,754 UART: [art] Derive CDI
19,808,567 UART: [art] Store in slot 0x4
19,863,830 UART: [art] Derive Key Pair
19,864,877 UART: [art] Store priv key in slot 0x5
22,327,265 UART: [art] Derive Key Pair - Done
22,340,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,053,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,055,261 UART: [art] PUB.X = 746860D180F72C1544503AB546F3548B41B4D00B816BB00F64FFFE1411BB30BEB24A0E6CD19723253E4AC417BA6E37BF
24,062,568 UART: [art] PUB.Y = B59F91CABFB3539E01BFA609B1307AE5D38F6AC5536790E4C9C6A52674EB4D6E2F27B74ED7AA1BD2A112A1A7EB9B3478
24,069,819 UART: [art] SIG.R = 8B6FFCB544EA77F0EAD6503E2C648479FF4741BB6F09546440D1248D27D3B5E423ED0F521FB8FC73018E463494FDE0EE
24,077,221 UART: [art] SIG.S = E58CE4F078B713FC60035BBD8FBF96C70BD002EE2F6D88C22F743AF3C2ECC1E16E923D6B469F9D01B01EA114D2F6B02F
25,055,912 UART: mbox::rt_entry...
25,056,867 UART: ____ _ _ _ ____ _____
25,058,799 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,060,802 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,062,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,064,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,066,657 UART: |_|
25,067,513 UART:
25,197,772 UART: [rt] Runtime listening for mailbox commands...
25,199,942 >>> mbox cmd response data (48 bytes)
27,259,711 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,566,335 >>> mbox cmd response: success
34,566,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,599,227 UART:
34,599,516 UART: Running Caliptra FMC ...
34,600,628 UART:
34,600,789 UART: [state] CFI Enabled
34,706,792 UART: [art] Extend RT PCRs Done
34,707,982 UART: [art] Lock RT PCRs Done
34,709,390 UART: [art] Populate DV Done
34,714,746 UART: [fht] FMC Alias Private Key: 7
34,716,283 UART: [art] Derive CDI
34,717,099 UART: [art] Store in slot 0x4
34,775,420 UART: [art] Derive Key Pair
34,776,460 UART: [art] Store priv key in slot 0x5
37,239,030 UART: [art] Derive Key Pair - Done
37,252,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,964,890 UART: [art] Erasing AUTHORITY.KEYID = 7
38,966,402 UART: [art] PUB.X = 60475410B6A8A48930A6A08C146A9E3F031F8828343CA59AB19F2C3F7E08DD057A799852BE6D9EBB16BA87E7BD5658CD
38,973,655 UART: [art] PUB.Y = 8EC72D6F38F2B4364C418CCDDAA75DC69494A3EC3C8C75A8857BAFB4C82D1BE310E4E24AD2BF1AE78D2D5C031FF3A39A
38,980,949 UART: [art] SIG.R = D6466205D5DC8E8DEE7BD2F0D3834550126283AA181EDDAF64BDFA8B6314AED8280CFA96E1F89956389867DC269B841B
38,988,338 UART: [art] SIG.S = 9C1F29A48EDE63AD8CB4551BB60777E63D922BF8C9E917D6527AE838BDF8BDBD64936E29ED86875F02C18CF3CB5539DD
39,967,101 UART: Caliptra RT
39,967,819 UART: [state] CFI Enabled
40,386,127 UART: [rt] RT listening for mailbox commands...
40,418,259 UART: [rt]cmd =0x4d454153, len=108
40,436,214 >>> mbox cmd response data (12 bytes)
42,484,372 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,175,231 >>> mbox cmd response: success
51,220,977 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,325,641 UART:
51,326,008 UART: Running Caliptra FMC ...
51,327,070 UART:
51,327,247 UART: [state] CFI Enabled
51,328,184 UART: [art] Extend RT PCRs Done
51,329,330 UART: [art] Lock RT PCRs Done
51,330,317 UART: [art] Populate DV Done
51,331,343 UART: [fht] FMC Alias Private Key: 7
51,332,579 UART: [art] Derive CDI
51,333,305 UART: [art] Store in slot 0x4
51,334,363 UART: [art] Derive Key Pair
51,335,270 UART: [art] Store priv key in slot 0x5
51,849,851 UART: [art] Derive Key Pair - Done
51,862,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,575,241 UART: [art] Erasing AUTHORITY.KEYID = 7
53,576,756 UART: [art] PUB.X = AD09902D6B0E015BA54B904EBFCD2BC5497A3471B061E0518EAFFD0ADB94EE82D5F008F488893905F5D9114DD801A0C1
53,584,005 UART: [art] PUB.Y = 0F8A2E4734F82AA88B13C0DEDC41DD7975B1E6D667ED618BE401A55AD15AEF040CD6F46939AAD3862401AFB2DA82FC3D
53,591,294 UART: [art] SIG.R = C1C5282E0682AE41111AA58BB386E47F80A0A1CCB87A44532C97677C4CFC6496386535D44CBA99718213C490ED0E815D
53,598,637 UART: [art] SIG.S = 809D7CA87F93ADB7CE8F1CADD15EA01B5FBB92F0EEC7E086C8F11582B0572227C36D952D4F1422E6C47CEE8ACB3A0E61
54,577,383 UART: mbox::rt_entry...
54,578,352 UART: ____ _ _ _ ____ _____
54,580,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,582,340 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,584,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,586,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,588,110 UART: |_|
54,588,915 UART:
54,965,955 UART: [rt] Runtime listening for mailbox commands...
61,563,156 >>> mbox cmd response: success
61,563,551 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,596,834 UART:
61,597,093 UART: Running Caliptra FMC ...
61,598,206 UART:
61,598,365 UART: [state] CFI Enabled
61,686,906 UART: [art] Extend RT PCRs Done
61,688,120 UART: [art] Lock RT PCRs Done
61,689,522 UART: [art] Populate DV Done
61,695,203 UART: [fht] FMC Alias Private Key: 7
61,696,893 UART: [art] Derive CDI
61,697,706 UART: [art] Store in slot 0x4
61,756,073 UART: [art] Derive Key Pair
61,757,074 UART: [art] Store priv key in slot 0x5
64,220,143 UART: [art] Derive Key Pair - Done
64,233,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,946,761 UART: [art] Erasing AUTHORITY.KEYID = 7
65,948,263 UART: [art] PUB.X = D3153C1D9DE365DA4D3E00E1BB4C2A9D42956CECFF71B9BC86A40E8969EF847765321895C879A3CB6AED11D4D78767D1
65,955,510 UART: [art] PUB.Y = 69F1C02F96022792BFE6118E9ADD142A423538E5333CB9FD27660AF13E459504B706955803CFF25657F48514696B809E
65,962,744 UART: [art] SIG.R = 81A03BEAF2B61738BF97CCEA8411607F8EAB5651D6505B8BE9DF02F0909BF6F3821AC1847B99508E9635EA7A7EA61EC9
65,970,138 UART: [art] SIG.S = 3536F40B057D258BDD1F8D64C43E929BB9028885F3FAFEFD4A078A0523622BCF66A1AC3E5F62D7DCE157B823E289C59F
66,948,932 UART: mbox::rt_entry...
66,949,880 UART: ____ _ _ _ ____ _____
66,951,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,953,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,955,845 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,957,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,959,690 UART: |_|
66,960,523 UART:
67,330,354 UART: [rt] Runtime listening for mailbox commands...
67,332,550 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.48s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,543,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,565,082 UART: [ldev] --
10,569,975 UART: [fwproc] Wait for Commands...
10,571,640 UART: [fwproc] Recv command 0x46574c44
10,573,694 UART: [fwproc] Recv'd Img size: 82832 bytes
13,618,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,698,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,771,681 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,975,138 >>> mbox cmd response: success
13,975,661 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
13,979,034 UART: [afmc] ++
13,979,614 UART: [afmc] CDI.KEYID = 6
13,980,556 UART: [afmc] SUBJECT.KEYID = 7
13,981,769 UART: [afmc] AUTHORITY.KEYID = 5
16,483,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,208,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,210,210 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,226,059 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,242,146 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,257,679 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,282,699 UART: [afmc] --
18,287,219 UART: [cold-reset] --
18,291,350 UART: [state] Locking Datavault
18,298,174 UART: [state] Locking PCR0, PCR1 and PCR31
18,299,873 UART: [state] Locking ICCM
18,302,432 UART: [exit] Launching FMC @ 0x40000130
18,310,827 UART:
18,311,062 UART: Running Caliptra FMC ...
18,312,090 UART:
18,312,242 UART: [state] CFI Enabled
18,320,562 UART: [fht] FMC Alias Private Key: 7
20,086,588 UART: [art] Extend RT PCRs Done
20,087,977 UART: [art] Lock RT PCRs Done
20,089,529 UART: [art] Populate DV Done
20,094,986 UART: [fht] FMC Alias Private Key: 7
20,096,605 UART: [art] Derive CDI
20,097,365 UART: [art] Store in slot 0x4
20,140,064 UART: [art] Derive Key Pair
20,141,089 UART: [art] Store priv key in slot 0x5
22,568,057 UART: [art] Derive Key Pair - Done
22,581,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,287,132 UART: [art] Erasing AUTHORITY.KEYID = 7
24,288,634 UART: [art] PUB.X = 87D214B7CE0D2C02BFEF867BE75482C0E92B07CDF05730142E12283DCEDFB362F733C15AACD9CCAE869313F6F9F58B21
24,295,934 UART: [art] PUB.Y = E343BAD398BE1773CD2CEDB4CCC0E25AC3B031E36A73E6641B3F237005B9CD1B73FF5BFD99781CCF9918ABEA9095BB76
24,303,219 UART: [art] SIG.R = 17AE55C34A8DBF31DCBBDC4F2E9C8070663CC3440CF52CB86DDF73FE8939BCE5F04AB4623825A5EA4809227882D8543C
24,310,618 UART: [art] SIG.S = DFB89253B995374B6E15A0E527F65EEE651A407A390B1AEA47E18BA82557714E9E58045D35C18AC8D9B24BAC642DF0D2
25,288,607 UART: mbox::rt_entry...
25,289,557 UART: ____ _ _ _ ____ _____
25,291,540 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,293,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,295,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,297,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,299,495 UART: |_|
25,300,308 UART:
25,430,596 UART: [rt] Runtime listening for mailbox commands...
25,432,760 >>> mbox cmd response data (48 bytes)
27,493,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,643,782 UART:
27,644,151 UART: Running Caliptra ROM ...
27,645,305 UART:
27,645,488 UART: [state] CFI Enabled
27,660,029 UART: [state] LifecycleState = Unprovisioned
27,661,919 UART: [state] DebugLocked = No
27,664,333 UART: [state] WD Timer not started. Device not locked for debugging
27,668,030 UART: [kat] SHA2-256
27,847,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,858,546 UART: [kat] ++
27,859,069 UART: [kat] sha1
27,870,126 UART: [kat] SHA2-256
27,872,829 UART: [kat] SHA2-384
27,879,084 UART: [kat] SHA2-512-ACC
27,881,438 UART: [kat] ECC-384
30,325,336 UART: [kat] HMAC-384Kdf
30,337,890 UART: [kat] LMS
30,814,328 UART: [kat] --
30,819,147 UART: [update-reset] ++
34,315,877 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,319,458 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,717,097 >>> mbox cmd response: success
34,717,514 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,718,532 UART: [update-reset] Copying MAN_2 To MAN_1
34,755,659 UART: [update-reset Success] --
34,759,008 UART: [state] Locking Datavault
34,760,766 UART: [state] Locking PCR0, PCR1 and PCR31
34,762,523 UART: [state] Locking ICCM
34,763,812 UART: [exit] Launching FMC @ 0x40000130
34,772,207 UART:
34,772,445 UART: Running Caliptra FMC ...
34,773,548 UART:
34,773,707 UART: [state] CFI Enabled
34,817,787 UART: [art] Extend RT PCRs Done
34,819,274 UART: [art] Lock RT PCRs Done
34,820,361 UART: [art] Populate DV Done
34,825,714 UART: [fht] FMC Alias Private Key: 7
34,827,357 UART: [art] Derive CDI
34,828,172 UART: [art] Store in slot 0x4
34,871,195 UART: [art] Derive Key Pair
34,872,198 UART: [art] Store priv key in slot 0x5
37,299,300 UART: [art] Derive Key Pair - Done
37,312,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,019,057 UART: [art] Erasing AUTHORITY.KEYID = 7
39,020,569 UART: [art] PUB.X = 2256A5FEB8B72A14AAF42C2ADF9EA401B6E5134FCD29B8C2ABF64175CD72CDD2144C2995A12F67CCC8BB097C107DE546
39,027,825 UART: [art] PUB.Y = D902F693865369B3988B5F87867C792EBC3D2BA87CFF0A97739A0AB1F8E8A91736261341C579ADF3A86C2EB7324D14DE
39,035,071 UART: [art] SIG.R = C5D7BEA3B4C6706FA4B809EDDE83F83AA6F146CE2729ED84AC995F5BF5C99F120291696E51D08570979D0FD1C53AB855
39,042,471 UART: [art] SIG.S = 3061D570261ECB4028D0AD63A68B586DCC1E8A12FE32DCDA861122A1D1F063C681A5BBD0F8BA7644A09F966B2A37544D
40,021,499 UART: Caliptra RT
40,022,201 UART: [state] CFI Enabled
40,390,801 UART: [rt] RT listening for mailbox commands...
40,422,979 UART: [rt]cmd =0x4d454153, len=108
40,441,715 >>> mbox cmd response data (12 bytes)
42,488,656 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,594,253 UART:
42,594,618 UART: Running Caliptra ROM ...
42,595,750 UART:
42,595,927 UART: [state] CFI Enabled
42,609,340 UART: [state] LifecycleState = Unprovisioned
42,611,277 UART: [state] DebugLocked = No
42,613,877 UART: [state] WD Timer not started. Device not locked for debugging
42,617,834 UART: [kat] SHA2-256
42,797,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,808,326 UART: [kat] ++
42,808,801 UART: [kat] sha1
42,819,444 UART: [kat] SHA2-256
42,822,147 UART: [kat] SHA2-384
42,827,609 UART: [kat] SHA2-512-ACC
42,829,972 UART: [kat] ECC-384
45,271,628 UART: [kat] HMAC-384Kdf
45,284,289 UART: [kat] LMS
45,760,758 UART: [kat] --
45,766,092 UART: [update-reset] ++
48,828,326 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,831,216 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,103,808 >>> mbox cmd response: success
51,152,987 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,257,665 UART: [update-reset] Copying MAN_2 To MAN_1
51,259,395 UART: [update-reset Success] --
51,260,567 UART: [state] Locking Datavault
51,261,729 UART: [state] Locking PCR0, PCR1 and PCR31
51,263,200 UART: [state] Locking ICCM
51,264,078 UART: [exit] Launching FMC @ 0x40000130
51,265,469 UART:
51,265,625 UART: Running Caliptra FMC ...
51,266,730 UART:
51,266,888 UART: [state] CFI Enabled
51,267,816 UART: [art] Extend RT PCRs Done
51,268,955 UART: [art] Lock RT PCRs Done
51,270,022 UART: [art] Populate DV Done
51,271,057 UART: [fht] FMC Alias Private Key: 7
51,272,381 UART: [art] Derive CDI
51,273,117 UART: [art] Store in slot 0x4
51,274,181 UART: [art] Derive Key Pair
51,275,140 UART: [art] Store priv key in slot 0x5
51,690,467 UART: [art] Derive Key Pair - Done
51,703,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,409,707 UART: [art] Erasing AUTHORITY.KEYID = 7
53,411,220 UART: [art] PUB.X = 1D75731B5E491B46CD73B555CD12415D95F54F464E49F9DE14076E65C4BFAACC9F9389E0391C9CFB442E6A384726C843
53,418,476 UART: [art] PUB.Y = 9EFA4B4ED245E7CED7AD15C27123EE68F93374F18C375C166104D3E9CE1155E17390E4D487483C8D07CA8F459BED814C
53,425,763 UART: [art] SIG.R = A4402ECA0C2FC343891B654F2E08F0DFDF642DB0BF3C94242F0D25EECF64DC05FFA546E984C38456C70F4EE1131CCF7C
53,433,156 UART: [art] SIG.S = DA70250810CF6859DD3DC212216E07A04E125A5FCDAD260BC65BAB51AF53BF1DA1C53D18BCC35C64E9E500345454B347
54,412,247 UART: mbox::rt_entry...
54,413,191 UART: ____ _ _ _ ____ _____
54,415,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,417,178 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,419,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,421,246 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,423,103 UART: |_|
54,423,930 UART:
54,794,196 UART: [rt] Runtime listening for mailbox commands...
54,796,261 UART:
54,796,427 UART: Running Caliptra ROM ...
54,797,450 UART:
54,797,872 UART: [state] CFI Enabled
54,810,684 UART: [state] LifecycleState = Unprovisioned
54,812,629 UART: [state] DebugLocked = No
54,814,925 UART: [state] WD Timer not started. Device not locked for debugging
54,818,772 UART: [kat] SHA2-256
54,998,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
55,009,264 UART: [kat] ++
55,009,811 UART: [kat] sha1
55,020,764 UART: [kat] SHA2-256
55,023,461 UART: [kat] SHA2-384
55,029,987 UART: [kat] SHA2-512-ACC
55,032,338 UART: [kat] ECC-384
57,473,241 UART: [kat] HMAC-384Kdf
57,486,017 UART: [kat] LMS
57,962,461 UART: [kat] --
57,965,689 UART: [update-reset] ++
61,022,808 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,025,804 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
61,298,414 >>> mbox cmd response: success
61,298,782 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,300,416 UART: [update-reset] Copying MAN_2 To MAN_1
61,337,531 UART: [update-reset Success] --
61,340,030 UART: [state] Locking Datavault
61,343,876 UART: [state] Locking PCR0, PCR1 and PCR31
61,345,584 UART: [state] Locking ICCM
61,347,710 UART: [exit] Launching FMC @ 0x40000130
61,356,104 UART:
61,356,343 UART: Running Caliptra FMC ...
61,357,466 UART:
61,357,627 UART: [state] CFI Enabled
61,401,968 UART: [art] Extend RT PCRs Done
61,403,157 UART: [art] Lock RT PCRs Done
61,404,507 UART: [art] Populate DV Done
61,410,131 UART: [fht] FMC Alias Private Key: 7
61,411,780 UART: [art] Derive CDI
61,412,594 UART: [art] Store in slot 0x4
61,455,079 UART: [art] Derive Key Pair
61,456,084 UART: [art] Store priv key in slot 0x5
63,882,515 UART: [art] Derive Key Pair - Done
63,895,836 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,602,410 UART: [art] Erasing AUTHORITY.KEYID = 7
65,603,902 UART: [art] PUB.X = ED15B6206349F8BCE198B026B6680AE2201434579469A31D71DA395A219837DC6CE126D498A18DD123AD8D7F43640515
65,611,144 UART: [art] PUB.Y = 6CD15C765F749EF6D0B0EDB2A8AEC861EC0A9E6BCA287E74601B15FE1CB40836E7B47768C5ABF303618D4FC8CAD7C276
65,618,564 UART: [art] SIG.R = A6A7D30A68A6E44D0A4CB370044EECF64A95C0E29CCCBD1FD0669CA8D484ACCFDEA05E8C7305F42DC61FCD74C51A9619
65,625,885 UART: [art] SIG.S = D1867E8C8B181FE03A9D386AF76BE26BCE982EA8BB7616C9BBBE7BD4939FC01265ECB7DF6803B86EDC7F68F40BAD0404
66,604,699 UART: mbox::rt_entry...
66,605,664 UART: ____ _ _ _ ____ _____
66,607,648 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,609,609 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,611,537 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,613,419 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,615,342 UART: |_|
66,616,153 UART:
66,980,886 UART: [rt] Runtime listening for mailbox commands...
66,983,055 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.47s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,780,615 ready_for_fw is high
3,781,017 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,869,310 >>> mbox cmd response: success
13,870,068 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,119,938 UART:
18,120,325 UART: Running Caliptra FMC ...
18,121,458 UART:
18,121,620 UART: [state] CFI Enabled
18,129,856 UART: [fht] FMC Alias Private Key: 7
19,895,363 UART: [art] Extend RT PCRs Done
19,896,589 UART: [art] Lock RT PCRs Done
19,898,219 UART: [art] Populate DV Done
19,903,641 UART: [fht] FMC Alias Private Key: 7
19,905,345 UART: [art] Derive CDI
19,906,164 UART: [art] Store in slot 0x4
19,948,708 UART: [art] Derive Key Pair
19,949,727 UART: [art] Store priv key in slot 0x5
22,376,657 UART: [art] Derive Key Pair - Done
22,389,598 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,095,874 UART: [art] Erasing AUTHORITY.KEYID = 7
24,097,389 UART: [art] PUB.X = 4314582364F38E6658950FEBF1ED8EFABBE32EBC460D0FAAE422E38B8B4F6A7FD2569545B382063EA7B7EBD8B64D10BC
24,104,646 UART: [art] PUB.Y = 0A3CB55E50B445C0C73B8892FB898F82D1C28D56CB0B79D4F90FF874E1D1E1FC580ED2666B69941134EC62A87C14909B
24,111,894 UART: [art] SIG.R = A155192CF9C214DC0036CAE97F0E23544623502BE2F88F3F64C4811D940E9439C9CB3152942303B88ED870E7590BBDD3
24,119,236 UART: [art] SIG.S = 46216A7220518A21C6CF31D306D0974BA55287462A9F6D5618BA00159880C38696DD4E974BC12C9E7951231600B36245
25,097,602 UART: mbox::rt_entry...
25,098,565 UART: ____ _ _ _ ____ _____
25,100,501 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,102,510 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,104,441 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,106,438 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,108,373 UART: |_|
25,109,208 UART:
25,240,356 UART: [rt] Runtime listening for mailbox commands...
25,242,524 >>> mbox cmd response data (48 bytes)
27,298,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,524,106 >>> mbox cmd response: success
34,524,660 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
34,557,230 UART:
34,557,556 UART: Running Caliptra FMC ...
34,558,682 UART:
34,558,867 UART: [state] CFI Enabled
34,602,245 UART: [art] Extend RT PCRs Done
34,603,418 UART: [art] Lock RT PCRs Done
34,604,819 UART: [art] Populate DV Done
34,610,341 UART: [fht] FMC Alias Private Key: 7
34,611,917 UART: [art] Derive CDI
34,612,743 UART: [art] Store in slot 0x4
34,655,559 UART: [art] Derive Key Pair
34,656,561 UART: [art] Store priv key in slot 0x5
37,083,233 UART: [art] Derive Key Pair - Done
37,096,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,802,614 UART: [art] Erasing AUTHORITY.KEYID = 7
38,804,119 UART: [art] PUB.X = 8A89DD236F8C229078DA66D44C070E6F313F94C9FD590DA0D7CDF1A4952DAFF3EA1BAE20113DA1BB405AB4341CADC70D
38,811,437 UART: [art] PUB.Y = 06F285682B1D87F33172855F432532214B85B5F227815BD25934B81166A88DB07F22867E11BC1D237A8F25A828BA1146
38,818,629 UART: [art] SIG.R = 47F2369D0E4B843B11007EF563AC33D8E074A950F0A9E58C4F8C97E1C40987E7D7E1AF56F22494B981403C5E1A5B1FB9
38,826,026 UART: [art] SIG.S = E4420D104102B137B3C612A0338A9F0BE72C51C3057DE87BBB8F9E736B2C2C1373F6E265213E3DEA9459BF8C453A37CA
39,804,443 UART: Caliptra RT
39,805,160 UART: [state] CFI Enabled
40,181,897 UART: [rt] RT listening for mailbox commands...
40,214,166 UART: [rt]cmd =0x4d454153, len=108
40,233,030 >>> mbox cmd response data (12 bytes)
42,278,748 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,888,694 >>> mbox cmd response: success
50,940,980 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
51,045,682 UART:
51,046,038 UART: Running Caliptra FMC ...
51,047,097 UART:
51,047,256 UART: [state] CFI Enabled
51,048,213 UART: [art] Extend RT PCRs Done
51,049,366 UART: [art] Lock RT PCRs Done
51,050,393 UART: [art] Populate DV Done
51,051,432 UART: [fht] FMC Alias Private Key: 7
51,052,677 UART: [art] Derive CDI
51,053,411 UART: [art] Store in slot 0x4
51,054,482 UART: [art] Derive Key Pair
51,055,397 UART: [art] Store priv key in slot 0x5
51,450,111 UART: [art] Derive Key Pair - Done
51,463,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,169,370 UART: [art] Erasing AUTHORITY.KEYID = 7
53,170,895 UART: [art] PUB.X = 17CFFDB88D37BAF50DF6D482DAA489588CB9668B25B9B3708C6C4468E725E9A331126CF62CE74BF03F501EFAF67E26DB
53,178,168 UART: [art] PUB.Y = 76BCAB3AFE59A7D9473F2B4DA398836532C5711475BCEB8685DFD033ADDBFE065EC7BF0D2BDA3C3C6F2DF1BE3C3D7869
53,185,411 UART: [art] SIG.R = AB41AED235D9ACFE4C52B3A14A4AF244277C276B052F0770895C160A51340C7FFB7650C51682EED75813837BFAA5CC46
53,192,807 UART: [art] SIG.S = E212EA182D25568A884B6E1DD4BEE551027AB430411A8DC8F472C6E6D397DCFA1CB7B80908E84B362FEE9BEDADC2898F
54,171,255 UART: mbox::rt_entry...
54,172,218 UART: ____ _ _ _ ____ _____
54,174,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,176,161 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,178,019 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,179,950 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,181,808 UART: |_|
54,182,635 UART:
54,552,581 UART: [rt] Runtime listening for mailbox commands...
61,051,341 >>> mbox cmd response: success
61,051,733 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
61,087,840 UART:
61,088,140 UART: Running Caliptra FMC ...
61,089,273 UART:
61,089,437 UART: [state] CFI Enabled
61,133,780 UART: [art] Extend RT PCRs Done
61,134,932 UART: [art] Lock RT PCRs Done
61,136,241 UART: [art] Populate DV Done
61,141,919 UART: [fht] FMC Alias Private Key: 7
61,143,401 UART: [art] Derive CDI
61,144,166 UART: [art] Store in slot 0x4
61,186,760 UART: [art] Derive Key Pair
61,187,800 UART: [art] Store priv key in slot 0x5
63,614,891 UART: [art] Derive Key Pair - Done
63,627,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,334,253 UART: [art] Erasing AUTHORITY.KEYID = 7
65,335,754 UART: [art] PUB.X = 62F887A2C53F157099228EBEF4AFDBA189B1DFB2BBA21737EF72DDCB71FC8981155F46B392F8AABDA353EDC3A26A97E9
65,343,071 UART: [art] PUB.Y = 0AEA5FF6ACD28A7DDBE4F46B43F41ACC5A8D4AB3FCA4F156F783530B483EF78861C210B01417CF49BCCB22A257E0A375
65,350,367 UART: [art] SIG.R = 48F350DF6EB83773277B7F387271C323F358FC58B34FBD81F8676801777FDBCDD7E757B35682DC8269B99DAADF7216BF
65,357,712 UART: [art] SIG.S = 9B796210688E6DC17E8553557DC31469A9ACA3B6F7C88F9F3BEE2CD7E07212FD585ABF8F282DF1394AD1436F2D2DEFCC
66,336,121 UART: mbox::rt_entry...
66,337,066 UART: ____ _ _ _ ____ _____
66,338,998 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
66,341,093 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
66,342,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
66,344,908 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
66,346,785 UART: |_|
66,347,617 UART:
66,717,745 UART: [rt] Runtime listening for mailbox commands...
66,719,933 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.45s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,389,201 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,036 UART: [ldev] --
10,415,177 UART: [fwproc] Wait for Commands...
10,416,790 UART: [fwproc] Recv command 0x46574c44
10,419,044 UART: [fwproc] Recv'd Img size: 82832 bytes
13,477,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,556,107 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,679,767 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,025,835 >>> mbox cmd response: success
14,026,364 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,029,309 UART: [afmc] ++
14,030,001 UART: [afmc] CDI.KEYID = 6
14,031,113 UART: [afmc] SUBJECT.KEYID = 7
14,032,648 UART: [afmc] AUTHORITY.KEYID = 5
16,577,437 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,299,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,301,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,316,997 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,332,156 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,347,076 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,370,673 UART: [afmc] --
18,374,158 UART: [cold-reset] --
18,377,711 UART: [state] Locking Datavault
18,383,984 UART: [state] Locking PCR0, PCR1 and PCR31
18,386,163 UART: [state] Locking ICCM
18,388,068 UART: [exit] Launching FMC @ 0x40000130
18,396,777 UART:
18,397,010 UART: Running Caliptra FMC ...
18,398,036 UART:
18,398,183 UART: [state] CFI Enabled
18,456,065 UART: [fht] FMC Alias Private Key: 7
20,222,791 UART: [art] Extend RT PCRs Done
20,224,016 UART: [art] Lock RT PCRs Done
20,225,344 UART: [art] Populate DV Done
20,230,700 UART: [fht] FMC Alias Private Key: 7
20,232,392 UART: [art] Derive CDI
20,233,131 UART: [art] Store in slot 0x4
20,288,524 UART: [art] Derive Key Pair
20,289,585 UART: [art] Store priv key in slot 0x5
22,752,288 UART: [art] Derive Key Pair - Done
22,765,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,477,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,479,033 UART: [art] PUB.X = 8F594628A146EE5ADD00D38022DD94D6E63FDA1D06006F206ADB8697C38A03CD255574ABBB5B8E9532B28DB1C757C803
24,486,281 UART: [art] PUB.Y = 9A0C2478393C58ED8FB704754F38982885D01617DCFB021AEEBA91ECDF4E3E6D6AADF9BB1BC297E751848CC9D03A8079
24,493,541 UART: [art] SIG.R = 9B9EC1F49FEEEB4560FA477430374EB218C4A0E8F16EE61FB99CE5FAA76C19F366CB520D68CFD3A36706A48AD320606A
24,500,938 UART: [art] SIG.S = 7D15847DDC5A6D47787CF9D6A09BFCB23E801C2B6FAB91E474E6F5DC2D5DDB70A108BD3251F66719EB7DEF2B7641E236
25,478,761 UART: mbox::rt_entry...
25,479,726 UART: ____ _ _ _ ____ _____
25,481,656 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,654 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,523 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,314 UART: |_|
25,490,193 UART:
25,621,106 UART: [rt] Runtime listening for mailbox commands...
25,623,276 >>> mbox cmd response data (48 bytes)
27,690,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,840,558 UART:
27,840,918 UART: Running Caliptra ROM ...
27,842,061 UART:
27,842,235 UART: [state] CFI Enabled
27,913,493 UART: [state] LifecycleState = Unprovisioned
27,915,593 UART: [state] DebugLocked = No
27,917,298 UART: [state] WD Timer not started. Device not locked for debugging
27,922,573 UART: [kat] SHA2-256
28,112,417 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,123,194 UART: [kat] ++
28,123,679 UART: [kat] sha1
28,135,700 UART: [kat] SHA2-256
28,138,721 UART: [kat] SHA2-384
28,143,842 UART: [kat] SHA2-512-ACC
28,146,402 UART: [kat] ECC-384
30,593,673 UART: [kat] HMAC-384Kdf
30,617,281 UART: [kat] LMS
31,148,857 UART: [kat] --
31,152,974 UART: [update-reset] ++
34,666,360 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,669,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,299,598 >>> mbox cmd response: success
35,300,028 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,300,755 UART: [update-reset] Copying MAN_2 To MAN_1
35,338,328 UART: [update-reset Success] --
35,342,885 UART: [state] Locking Datavault
35,346,734 UART: [state] Locking PCR0, PCR1 and PCR31
35,348,917 UART: [state] Locking ICCM
35,351,498 UART: [exit] Launching FMC @ 0x40000130
35,360,162 UART:
35,360,393 UART: Running Caliptra FMC ...
35,361,491 UART:
35,361,648 UART: [state] CFI Enabled
35,451,634 UART: [art] Extend RT PCRs Done
35,452,831 UART: [art] Lock RT PCRs Done
35,454,392 UART: [art] Populate DV Done
35,459,795 UART: [fht] FMC Alias Private Key: 7
35,461,539 UART: [art] Derive CDI
35,462,358 UART: [art] Store in slot 0x4
35,519,882 UART: [art] Derive Key Pair
35,520,884 UART: [art] Store priv key in slot 0x5
37,983,694 UART: [art] Derive Key Pair - Done
37,996,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,709,469 UART: [art] Erasing AUTHORITY.KEYID = 7
39,710,977 UART: [art] PUB.X = 9AE41A949EAF6BC2E0A623C76B32A2C65EE7C9186C5AEF5E5AFF43A07486FE18FBF6806CA982EA8F8B12F0F7AE82EFDF
39,718,278 UART: [art] PUB.Y = AEA631C79D96F13BA5518C7BF7046B58C0A28918ADA1D142CE77B85DF67E9F4C1FD541C61418366C3AA0DB1D6E6C78FF
39,725,545 UART: [art] SIG.R = AB604D18796150636EA5275FCA90701D488400E135ABD1F0980B69FBBC71942A73CFA4D3B9217406272E69242DBBDD70
39,732,898 UART: [art] SIG.S = 35D74671A130EC6A8E026718125E914AA2709AF39B61888DE75474442AD61F9008F60E030F0A4AF645CBD783234B6426
40,711,652 UART: Caliptra RT
40,712,364 UART: [state] CFI Enabled
41,130,078 UART: [rt] RT listening for mailbox commands...
41,161,983 UART: [rt]cmd =0x4d454153, len=108
41,180,690 >>> mbox cmd response data (12 bytes)
43,232,480 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,338,837 UART:
43,339,225 UART: Running Caliptra ROM ...
43,340,368 UART:
43,340,542 UART: [state] CFI Enabled
43,399,558 UART: [state] LifecycleState = Unprovisioned
43,401,656 UART: [state] DebugLocked = No
43,402,829 UART: [state] WD Timer not started. Device not locked for debugging
43,406,456 UART: [kat] SHA2-256
43,596,295 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,607,055 UART: [kat] ++
43,607,539 UART: [kat] sha1
43,618,748 UART: [kat] SHA2-256
43,621,805 UART: [kat] SHA2-384
43,626,168 UART: [kat] SHA2-512-ACC
43,628,782 UART: [kat] ECC-384
46,082,798 UART: [kat] HMAC-384Kdf
46,108,575 UART: [kat] LMS
46,640,161 UART: [kat] --
46,644,146 UART: [update-reset] ++
49,709,901 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,712,851 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,128,285 >>> mbox cmd response: success
52,181,865 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,286,656 UART: [update-reset] Copying MAN_2 To MAN_1
52,288,358 UART: [update-reset Success] --
52,289,466 UART: [state] Locking Datavault
52,290,610 UART: [state] Locking PCR0, PCR1 and PCR31
52,292,146 UART: [state] Locking ICCM
52,293,067 UART: [exit] Launching FMC @ 0x40000130
52,294,497 UART:
52,294,663 UART: Running Caliptra FMC ...
52,295,757 UART:
52,295,912 UART: [state] CFI Enabled
52,296,825 UART: [art] Extend RT PCRs Done
52,297,957 UART: [art] Lock RT PCRs Done
52,299,024 UART: [art] Populate DV Done
52,300,052 UART: [fht] FMC Alias Private Key: 7
52,301,370 UART: [art] Derive CDI
52,302,104 UART: [art] Store in slot 0x4
52,303,156 UART: [art] Derive Key Pair
52,304,094 UART: [art] Store priv key in slot 0x5
52,810,291 UART: [art] Derive Key Pair - Done
52,823,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,536,559 UART: [art] Erasing AUTHORITY.KEYID = 7
54,538,088 UART: [art] PUB.X = 805B62E0E951020DD0E29D2E046FE50E4ED4BFB8CE5332B5A855B0F14CB28EF16FD4915C84AB8AFDC1983D445B1C13AA
54,545,343 UART: [art] PUB.Y = 1691ADB1B091CEEF37262559835E7DADF0A0C7FFD8EE8361006491D1452028CD511168CD86810C8ADD7DEEC53EB39F44
54,552,628 UART: [art] SIG.R = F1D745D45A58072F168B83300DFC93E0A54DBC40CEF5EE8E3BA793EE99DB92525D7E0375580663BB48101FC6F07EAAC0
54,560,031 UART: [art] SIG.S = FDF8A6D37466A6366E66EEC50B83D30F2BAB0702108C331B3271C3FA38BDD40FF90A6DC6361EC71DDEC5462C3B0D546D
55,538,306 UART: mbox::rt_entry...
55,539,264 UART: ____ _ _ _ ____ _____
55,541,241 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,543,242 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,545,172 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,547,098 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,549,029 UART: |_|
55,549,838 UART:
55,922,628 UART: [rt] Runtime listening for mailbox commands...
55,924,765 UART:
55,924,932 UART: Running Caliptra ROM ...
55,926,036 UART:
55,926,215 UART: [state] CFI Enabled
55,981,576 UART: [state] LifecycleState = Unprovisioned
55,983,665 UART: [state] DebugLocked = No
55,985,045 UART: [state] WD Timer not started. Device not locked for debugging
55,989,107 UART: [kat] SHA2-256
56,178,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
56,189,696 UART: [kat] ++
56,190,178 UART: [kat] sha1
56,201,656 UART: [kat] SHA2-256
56,204,663 UART: [kat] SHA2-384
56,210,482 UART: [kat] SHA2-512-ACC
56,213,104 UART: [kat] ECC-384
58,669,370 UART: [kat] HMAC-384Kdf
58,692,663 UART: [kat] LMS
59,224,239 UART: [kat] --
59,228,066 UART: [update-reset] ++
62,299,975 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
62,304,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,719,428 >>> mbox cmd response: success
62,719,787 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,720,066 UART: [update-reset] Copying MAN_2 To MAN_1
62,757,245 UART: [update-reset Success] --
62,762,109 UART: [state] Locking Datavault
62,764,823 UART: [state] Locking PCR0, PCR1 and PCR31
62,766,954 UART: [state] Locking ICCM
62,770,019 UART: [exit] Launching FMC @ 0x40000130
62,778,679 UART:
62,778,916 UART: Running Caliptra FMC ...
62,780,012 UART:
62,780,173 UART: [state] CFI Enabled
62,883,376 UART: [art] Extend RT PCRs Done
62,884,559 UART: [art] Lock RT PCRs Done
62,885,979 UART: [art] Populate DV Done
62,891,601 UART: [fht] FMC Alias Private Key: 7
62,893,064 UART: [art] Derive CDI
62,893,830 UART: [art] Store in slot 0x4
62,952,299 UART: [art] Derive Key Pair
62,953,300 UART: [art] Store priv key in slot 0x5
65,416,450 UART: [art] Derive Key Pair - Done
65,429,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,142,082 UART: [art] Erasing AUTHORITY.KEYID = 7
67,143,594 UART: [art] PUB.X = C8C9F5413B8C9BCAF1BA148F8E097778444F5C9386851812A4EF2C3281887BD88490D926D62A1E94FDE91AE61D0E785B
67,150,840 UART: [art] PUB.Y = 64155BE6E7F60E5105D5F87D7266EA420A02E8078E9A0727AE86E52C6DC311A3B5873A54D44516C9C4DAD83071054F8E
67,158,079 UART: [art] SIG.R = 3E78ABCDBE2BF8C957459C3358F30F329BB70C82871B64A93AE2CF8A6178CBC4AECBDE1A15059E60BB7F2F6ED68DF44E
67,165,472 UART: [art] SIG.S = 6D7861E6177ABA2C0043F8FF1D63DCDF909981C61A716718FE75CC5565F14F89E8B616DFD5A58E353D5D4836FF7B1194
68,144,073 UART: mbox::rt_entry...
68,145,018 UART: ____ _ _ _ ____ _____
68,146,997 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,149,020 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,150,998 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,152,857 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,154,779 UART: |_|
68,155,586 UART:
68,524,265 UART: [rt] Runtime listening for mailbox commands...
68,526,454 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,864 writing to cptra_bootfsm_go
3,437,687 ready_for_fw is high
3,438,163 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,054,368 >>> mbox cmd response: success
14,054,960 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,344,912 UART:
18,345,284 UART: Running Caliptra FMC ...
18,346,483 UART:
18,346,649 UART: [state] CFI Enabled
18,410,655 UART: [fht] FMC Alias Private Key: 7
20,177,415 UART: [art] Extend RT PCRs Done
20,178,633 UART: [art] Lock RT PCRs Done
20,180,257 UART: [art] Populate DV Done
20,185,609 UART: [fht] FMC Alias Private Key: 7
20,187,256 UART: [art] Derive CDI
20,188,071 UART: [art] Store in slot 0x4
20,243,040 UART: [art] Derive Key Pair
20,244,079 UART: [art] Store priv key in slot 0x5
22,706,601 UART: [art] Derive Key Pair - Done
22,719,770 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,432,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,433,721 UART: [art] PUB.X = E5126569805A7D42325FC0126D794D7735BEC5A68B9980845AFABCAA222B3F0CE6FD8CF049B22F385F0AC4DE6BA160FF
24,441,041 UART: [art] PUB.Y = 2B9702A8CA5FE01F254189432A1500364B3973D857FEA014055C356F5B6836BF1E8239484C34BC441D6B052072C7A753
24,448,239 UART: [art] SIG.R = 1CB8F9BFF339EA58224F539837B176DC1C30A0C6B26EAADB116C50E613FB5C01E53D22500F472010DAE2F1FFD280C2B5
24,455,633 UART: [art] SIG.S = E3FF06CE73B7867A11DC2DEB97BEB2A5836E7282D1D7D963DDBE34D72F5D4D04114A4D5C194296845C3064F45BCD57C5
25,434,377 UART: mbox::rt_entry...
25,435,338 UART: ____ _ _ _ ____ _____
25,437,239 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,439,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,441,189 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,443,179 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,445,110 UART: |_|
25,445,951 UART:
25,576,284 UART: [rt] Runtime listening for mailbox commands...
25,578,426 >>> mbox cmd response data (48 bytes)
27,642,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,560,960 >>> mbox cmd response: success
35,561,519 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,596,994 UART:
35,597,285 UART: Running Caliptra FMC ...
35,598,407 UART:
35,598,564 UART: [state] CFI Enabled
35,701,941 UART: [art] Extend RT PCRs Done
35,703,122 UART: [art] Lock RT PCRs Done
35,704,608 UART: [art] Populate DV Done
35,710,281 UART: [fht] FMC Alias Private Key: 7
35,711,843 UART: [art] Derive CDI
35,712,579 UART: [art] Store in slot 0x4
35,770,896 UART: [art] Derive Key Pair
35,771,940 UART: [art] Store priv key in slot 0x5
38,234,811 UART: [art] Derive Key Pair - Done
38,247,814 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,960,662 UART: [art] Erasing AUTHORITY.KEYID = 7
39,962,169 UART: [art] PUB.X = 000A2A2DCA13992EEDBF59B9BE582B383317F650F3156FFC4A2BC4741F63860E19C69E81E5DBCFEDEFDE3C2A6428DE3E
39,969,416 UART: [art] PUB.Y = 75C7B20D6D221F918C989E7A9B2C443AA4A07929AE2E9E44CE63DA3693A7EC41ED78EF226A787C87A86C3824FF912AF2
39,976,694 UART: [art] SIG.R = 1BFADADA85B7C3C9F167DE52E6054F065241656339D6432A8D581B475E4FD1C41024C8E830A87733529ED9DDC43C9243
39,984,075 UART: [art] SIG.S = CE599BF2C8AEDDA54D07EF2C5F9F29AFB4130E6339DFA6A1AD26DCE89A8CB4A10958A2F5BDE60E8230AEE748D7735371
40,963,212 UART: Caliptra RT
40,963,922 UART: [state] CFI Enabled
41,384,343 UART: [rt] RT listening for mailbox commands...
41,416,665 UART: [rt]cmd =0x4d454153, len=108
41,434,977 >>> mbox cmd response data (12 bytes)
43,495,849 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,598,030 >>> mbox cmd response: success
52,647,826 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,752,509 UART:
52,752,875 UART: Running Caliptra FMC ...
52,754,014 UART:
52,754,191 UART: [state] CFI Enabled
52,755,115 UART: [art] Extend RT PCRs Done
52,756,254 UART: [art] Lock RT PCRs Done
52,757,564 UART: [art] Populate DV Done
52,758,644 UART: [fht] FMC Alias Private Key: 7
52,759,968 UART: [art] Derive CDI
52,760,704 UART: [art] Store in slot 0x4
52,761,683 UART: [art] Derive Key Pair
52,762,617 UART: [art] Store priv key in slot 0x5
53,270,093 UART: [art] Derive Key Pair - Done
53,282,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,995,825 UART: [art] Erasing AUTHORITY.KEYID = 7
54,997,456 UART: [art] PUB.X = 05004BBAFBB83DF7FBFC7C0ABCF5C74922A7679F4645ADBE7966DE903784FC6A75A0C3D4E05086EC291DAD6350E066B3
55,004,604 UART: [art] PUB.Y = 14D52E68BAE98E3AF8B1F8B4B287B23854814896E95E9852F8D9C036555EC5C4C9C4F724A5CEDB386651BB8A8FE79069
55,011,839 UART: [art] SIG.R = ED3EC22845335ABB24D6D5C71AC2E1B4D9E5BF0DF4B0B76665BADE2670FB292F7A6A8077B4277C3370F2D9854C40C464
55,019,227 UART: [art] SIG.S = A467493B11236FFDE5BC14F9E50AFC0F670B0CC03C6EB0336134F70D9837F67D7DA10DFD2F1B213361A1FB84BE7FE4B8
55,997,991 UART: mbox::rt_entry...
55,998,961 UART: ____ _ _ _ ____ _____
56,000,893 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
56,002,902 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
56,004,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
56,006,714 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
56,008,605 UART: |_|
56,009,433 UART:
56,384,395 UART: [rt] Runtime listening for mailbox commands...
63,365,666 >>> mbox cmd response: success
63,366,059 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
63,400,171 UART:
63,400,484 UART: Running Caliptra FMC ...
63,401,552 UART:
63,401,706 UART: [state] CFI Enabled
63,490,228 UART: [art] Extend RT PCRs Done
63,491,416 UART: [art] Lock RT PCRs Done
63,492,661 UART: [art] Populate DV Done
63,498,070 UART: [fht] FMC Alias Private Key: 7
63,499,669 UART: [art] Derive CDI
63,500,451 UART: [art] Store in slot 0x4
63,560,005 UART: [art] Derive Key Pair
63,561,054 UART: [art] Store priv key in slot 0x5
66,023,649 UART: [art] Derive Key Pair - Done
66,036,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,749,154 UART: [art] Erasing AUTHORITY.KEYID = 7
67,750,657 UART: [art] PUB.X = 3E1DDF5B466B80977634805B384B8B8D19DBA74D21743D30D366942ED1349D0D5A0E9D6896B7F633C13C9E18C3A0E166
67,757,903 UART: [art] PUB.Y = 5A4385F0014B72A08351B2A46CA3CF4F56D854AF102D83681271EE0ECB04D71E880355DC3B5EA94ED67F8A822DEC50A7
67,765,183 UART: [art] SIG.R = 5A6E2476BB92B964FFEC649EAA16C66E314791CDBDC24BC53B800120AD8ECE7D433D06C11651BCABA1E5213AC80068A4
67,772,567 UART: [art] SIG.S = A28F3E33B483823C8DF321E6DD89D78DD4FC4F477419037F38053F2725BDA3C2FE3390600328225925ADA63865ED11B5
68,751,658 UART: mbox::rt_entry...
68,752,602 UART: ____ _ _ _ ____ _____
68,754,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,756,648 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,758,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,760,707 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,762,658 UART: |_|
68,763,490 UART:
69,138,330 UART: [rt] Runtime listening for mailbox commands...
69,140,507 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.57s
Truncated 2373 bytes from beginning
2B4B8088EE01D6CD5710
10,612,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,775 UART: [ldev] --
10,638,396 UART: [fwproc] Wait for Commands...
10,641,135 UART: [fwproc] Recv command 0x46574c44
10,643,409 UART: [fwproc] Recv'd Img size: 82832 bytes
13,702,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,778,077 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,901,677 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,248,254 >>> mbox cmd response: success
14,248,759 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
14,251,649 UART: [afmc] ++
14,252,345 UART: [afmc] CDI.KEYID = 6
14,253,593 UART: [afmc] SUBJECT.KEYID = 7
14,255,040 UART: [afmc] AUTHORITY.KEYID = 5
16,765,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,487,490 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,489,460 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,504,551 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,519,685 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,534,598 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,558,575 UART: [afmc] --
18,561,504 UART: [cold-reset] --
18,565,921 UART: [state] Locking Datavault
18,572,863 UART: [state] Locking PCR0, PCR1 and PCR31
18,575,007 UART: [state] Locking ICCM
18,576,664 UART: [exit] Launching FMC @ 0x40000130
18,585,335 UART:
18,585,571 UART: Running Caliptra FMC ...
18,586,612 UART:
18,586,765 UART: [state] CFI Enabled
18,594,815 UART: [fht] FMC Alias Private Key: 7
20,360,843 UART: [art] Extend RT PCRs Done
20,362,062 UART: [art] Lock RT PCRs Done
20,363,720 UART: [art] Populate DV Done
20,369,350 UART: [fht] FMC Alias Private Key: 7
20,370,895 UART: [art] Derive CDI
20,371,630 UART: [art] Store in slot 0x4
20,414,655 UART: [art] Derive Key Pair
20,415,696 UART: [art] Store priv key in slot 0x5
22,842,682 UART: [art] Derive Key Pair - Done
22,856,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,562,292 UART: [art] Erasing AUTHORITY.KEYID = 7
24,563,794 UART: [art] PUB.X = 3BF4A7D5D5485D55A03EE640343A99C4638B436A45EA41B662370227910B1543C537309A6BE1763C09AB7C9EB8471D6F
24,571,057 UART: [art] PUB.Y = F9022C560F43AE60A99DCD51B96DFAEA9E78A5070D4FD4CC2539DB8C67E70EDB493E1476A8309C460019DD216C283FE3
24,578,307 UART: [art] SIG.R = 12A528E227A16EFC315416146A14960B3F0135D544032614501FA2B22F0857304D249D0D34A056989ACCE29DCC76BDC3
24,585,671 UART: [art] SIG.S = 0F5D1478395190EEC3767DB28A79679DF0F57E08D879BCF94FC5C3AF7F8ED26EF3247209FE13BD531969726F0D19F809
25,564,072 UART: mbox::rt_entry...
25,565,059 UART: ____ _ _ _ ____ _____
25,567,005 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,569,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,570,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,572,891 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,574,823 UART: |_|
25,575,658 UART:
25,707,266 UART: [rt] Runtime listening for mailbox commands...
25,709,436 >>> mbox cmd response data (48 bytes)
27,779,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,929,083 UART:
27,929,470 UART: Running Caliptra ROM ...
27,930,539 UART:
27,930,696 UART: [state] CFI Enabled
27,944,329 UART: [state] LifecycleState = Unprovisioned
27,946,228 UART: [state] DebugLocked = No
27,949,151 UART: [state] WD Timer not started. Device not locked for debugging
27,953,344 UART: [kat] SHA2-256
28,143,214 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,153,984 UART: [kat] ++
28,154,530 UART: [kat] sha1
28,165,374 UART: [kat] SHA2-256
28,168,387 UART: [kat] SHA2-384
28,174,390 UART: [kat] SHA2-512-ACC
28,176,975 UART: [kat] ECC-384
30,619,038 UART: [kat] HMAC-384Kdf
30,631,892 UART: [kat] LMS
31,163,494 UART: [kat] --
31,167,858 UART: [update-reset] ++
34,670,560 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,674,694 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,304,460 >>> mbox cmd response: success
35,304,882 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,305,951 UART: [update-reset] Copying MAN_2 To MAN_1
35,343,525 UART: [update-reset Success] --
35,348,199 UART: [state] Locking Datavault
35,352,701 UART: [state] Locking PCR0, PCR1 and PCR31
35,354,899 UART: [state] Locking ICCM
35,356,975 UART: [exit] Launching FMC @ 0x40000130
35,365,640 UART:
35,365,895 UART: Running Caliptra FMC ...
35,366,924 UART:
35,367,092 UART: [state] CFI Enabled
35,411,104 UART: [art] Extend RT PCRs Done
35,412,256 UART: [art] Lock RT PCRs Done
35,413,738 UART: [art] Populate DV Done
35,419,252 UART: [fht] FMC Alias Private Key: 7
35,420,844 UART: [art] Derive CDI
35,421,584 UART: [art] Store in slot 0x4
35,464,012 UART: [art] Derive Key Pair
35,465,056 UART: [art] Store priv key in slot 0x5
37,891,934 UART: [art] Derive Key Pair - Done
37,904,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,611,140 UART: [art] Erasing AUTHORITY.KEYID = 7
39,612,643 UART: [art] PUB.X = 18B30ACADAB15F6E7EF6B7F87E64DF8C13A35B308C2A2F75217FE2AFAECBA9504D1225690A918FDAB8AB7FACEE1E717D
39,619,962 UART: [art] PUB.Y = 712DEA3B5FFE36F3CF45570D588069A980094670019D6F52AD6FC406619589A503810C97C836A606A784912FAF75D16B
39,627,173 UART: [art] SIG.R = CDC181E29144E0F8A927E8EE8AA6564147088568B6F5EA7EAB1DB31727E9A54AD81744CD25CA6DB6506374A12F227CB3
39,634,588 UART: [art] SIG.S = 3B10E3B7A6D759546185694C93CC95A07B4673F533842B8BFAC7D6E6848B58FDBF5D0BA3863D3627D26035B5D4FC6C2F
40,613,743 UART: Caliptra RT
40,614,462 UART: [state] CFI Enabled
40,984,751 UART: [rt] RT listening for mailbox commands...
41,017,251 UART: [rt]cmd =0x4d454153, len=108
41,035,489 >>> mbox cmd response data (12 bytes)
43,089,014 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,194,906 UART:
43,195,274 UART: Running Caliptra ROM ...
43,196,335 UART:
43,196,487 UART: [state] CFI Enabled
43,214,572 UART: [state] LifecycleState = Unprovisioned
43,216,462 UART: [state] DebugLocked = No
43,218,799 UART: [state] WD Timer not started. Device not locked for debugging
43,223,266 UART: [kat] SHA2-256
43,413,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,423,878 UART: [kat] ++
43,424,390 UART: [kat] sha1
43,435,603 UART: [kat] SHA2-256
43,438,621 UART: [kat] SHA2-384
43,444,339 UART: [kat] SHA2-512-ACC
43,446,973 UART: [kat] ECC-384
45,890,136 UART: [kat] HMAC-384Kdf
45,903,680 UART: [kat] LMS
46,435,273 UART: [kat] --
46,437,448 UART: [update-reset] ++
49,509,612 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,512,771 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,928,215 >>> mbox cmd response: success
51,982,847 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,087,717 UART: [update-reset] Copying MAN_2 To MAN_1
52,089,426 UART: [update-reset Success] --
52,090,513 UART: [state] Locking Datavault
52,091,675 UART: [state] Locking PCR0, PCR1 and PCR31
52,093,221 UART: [state] Locking ICCM
52,094,104 UART: [exit] Launching FMC @ 0x40000130
52,095,459 UART:
52,095,613 UART: Running Caliptra FMC ...
52,096,717 UART:
52,096,875 UART: [state] CFI Enabled
52,097,712 UART: [art] Extend RT PCRs Done
52,098,814 UART: [art] Lock RT PCRs Done
52,099,802 UART: [art] Populate DV Done
52,100,786 UART: [fht] FMC Alias Private Key: 7
52,102,136 UART: [art] Derive CDI
52,102,883 UART: [art] Store in slot 0x4
52,103,954 UART: [art] Derive Key Pair
52,104,875 UART: [art] Store priv key in slot 0x5
52,514,216 UART: [art] Derive Key Pair - Done
52,527,264 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,233,504 UART: [art] Erasing AUTHORITY.KEYID = 7
54,234,988 UART: [art] PUB.X = FBB97F2759B418169BEC1DC9A6E2B83D8493375A0505F03C058AB20F801465C3FAD7A85B4E2085C2F49F7AE3E55770E9
54,242,269 UART: [art] PUB.Y = 1719655C873DFED37F62E457B20172181E10D6FF96EE60F17FEAE720555F7A93BD49073ED2F9C42EF7A130A508932717
54,249,527 UART: [art] SIG.R = 93B394E75424A341F37BC0EF8A87DB2AA71C1CEF35311505B4E852419B35238CDE29304F81C314B04D0EA81E2B1FA9FF
54,256,887 UART: [art] SIG.S = 521569F0C5CB414283C041E09DCDFE3BBED36BD9D811396C84BD72246BA26A91383299C1856A2A33025B0A08039EFE34
55,235,197 UART: mbox::rt_entry...
55,236,171 UART: ____ _ _ _ ____ _____
55,238,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,240,177 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,242,109 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,244,060 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,246,006 UART: |_|
55,246,853 UART:
55,620,501 UART: [rt] Runtime listening for mailbox commands...
55,622,619 UART:
55,622,786 UART: Running Caliptra ROM ...
55,623,897 UART:
55,624,221 UART: [state] CFI Enabled
55,637,737 UART: [state] LifecycleState = Unprovisioned
55,639,623 UART: [state] DebugLocked = No
55,641,685 UART: [state] WD Timer not started. Device not locked for debugging
55,646,257 UART: [kat] SHA2-256
55,836,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
55,846,918 UART: [kat] ++
55,847,382 UART: [kat] sha1
55,857,789 UART: [kat] SHA2-256
55,860,831 UART: [kat] SHA2-384
55,866,121 UART: [kat] SHA2-512-ACC
55,868,695 UART: [kat] ECC-384
58,309,981 UART: [kat] HMAC-384Kdf
58,322,748 UART: [kat] LMS
58,854,366 UART: [kat] --
58,858,213 UART: [update-reset] ++
61,935,021 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
61,938,019 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
62,353,462 >>> mbox cmd response: success
62,353,830 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,354,107 UART: [update-reset] Copying MAN_2 To MAN_1
62,391,298 UART: [update-reset Success] --
62,395,216 UART: [state] Locking Datavault
62,398,099 UART: [state] Locking PCR0, PCR1 and PCR31
62,400,317 UART: [state] Locking ICCM
62,401,610 UART: [exit] Launching FMC @ 0x40000130
62,410,301 UART:
62,410,540 UART: Running Caliptra FMC ...
62,411,570 UART:
62,411,717 UART: [state] CFI Enabled
62,456,110 UART: [art] Extend RT PCRs Done
62,457,255 UART: [art] Lock RT PCRs Done
62,458,675 UART: [art] Populate DV Done
62,464,132 UART: [fht] FMC Alias Private Key: 7
62,465,665 UART: [art] Derive CDI
62,466,399 UART: [art] Store in slot 0x4
62,508,929 UART: [art] Derive Key Pair
62,509,999 UART: [art] Store priv key in slot 0x5
64,936,674 UART: [art] Derive Key Pair - Done
64,949,831 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,656,573 UART: [art] Erasing AUTHORITY.KEYID = 7
66,658,097 UART: [art] PUB.X = 894AAC00B9E479CEFC7C79B873CACEF698AD8B8272D4E9DC5609B4D591CC42EA8D98C76BEF11E36DE3455DCB349C8BB0
66,665,359 UART: [art] PUB.Y = 05E6DCD67D983C703A2DBFD737C6B9FC931956F4ED88763698445CE042A6BD6221EC4A9A14CC68D78AD88F8B209B1833
66,672,667 UART: [art] SIG.R = B5474D4FD84CAD96125DD1803D05DAFDEC567DA2C0BEF92BACF8EEB41EC576D0FC76DED82B70A2C2A8DB156EFACEA75B
66,680,081 UART: [art] SIG.S = E4A519D92F68D303805995E3720D40873A5AA20623A2AF8FD03D1CD3C43A37C745692282742D1F6E94FCC3DC4F703BD8
67,659,087 UART: mbox::rt_entry...
67,660,061 UART: ____ _ _ _ ____ _____
67,661,974 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,663,986 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,665,923 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,667,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,669,796 UART: |_|
67,670,606 UART:
68,041,031 UART: [rt] Runtime listening for mailbox commands...
68,043,211 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,758,078 ready_for_fw is high
3,758,692 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,291,119 >>> mbox cmd response: success
14,291,742 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
18,544,287 UART:
18,544,668 UART: Running Caliptra FMC ...
18,545,780 UART:
18,545,937 UART: [state] CFI Enabled
18,553,893 UART: [fht] FMC Alias Private Key: 7
20,320,288 UART: [art] Extend RT PCRs Done
20,321,517 UART: [art] Lock RT PCRs Done
20,323,168 UART: [art] Populate DV Done
20,328,558 UART: [fht] FMC Alias Private Key: 7
20,330,164 UART: [art] Derive CDI
20,330,904 UART: [art] Store in slot 0x4
20,373,559 UART: [art] Derive Key Pair
20,374,602 UART: [art] Store priv key in slot 0x5
22,801,995 UART: [art] Derive Key Pair - Done
22,815,475 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,522,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,523,795 UART: [art] PUB.X = 723762F3C77653E59E9044EFDD10454DCBB00DB16BBA74D0DB35EEE317B1D8942A9C61D71D85312F69DB0E8921DE5366
24,531,063 UART: [art] PUB.Y = D2854298A1FAFB7BD908BFA1A445A2F8611D3F2FC5CDFA0B0A6E250F3647A59564675A0F8BD940262816B5809A9B8FBA
24,538,334 UART: [art] SIG.R = E86FAABA0FD76259A97AFEEB31E8FCED6593BE1F54B7CF38CABCEC8A62CFA8C53A372C66CDF5506B0EAE963CA9B8F5F8
24,545,801 UART: [art] SIG.S = 303752F1EB94C2A1B8ECAB6984CDD7F7E77650B0B46BDC72526F40CF22E3DA2DE302F10F117D5D19E15219BF4FE38B9B
25,524,452 UART: mbox::rt_entry...
25,525,413 UART: ____ _ _ _ ____ _____
25,527,400 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,529,408 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,531,358 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,533,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,535,290 UART: |_|
25,536,133 UART:
25,666,565 UART: [rt] Runtime listening for mailbox commands...
25,668,743 >>> mbox cmd response data (48 bytes)
27,736,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,558,087 >>> mbox cmd response: success
35,558,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
35,591,878 UART:
35,592,173 UART: Running Caliptra FMC ...
35,593,296 UART:
35,593,480 UART: [state] CFI Enabled
35,637,250 UART: [art] Extend RT PCRs Done
35,638,439 UART: [art] Lock RT PCRs Done
35,639,851 UART: [art] Populate DV Done
35,645,479 UART: [fht] FMC Alias Private Key: 7
35,647,017 UART: [art] Derive CDI
35,647,837 UART: [art] Store in slot 0x4
35,690,167 UART: [art] Derive Key Pair
35,691,172 UART: [art] Store priv key in slot 0x5
38,118,337 UART: [art] Derive Key Pair - Done
38,131,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,838,115 UART: [art] Erasing AUTHORITY.KEYID = 7
39,839,617 UART: [art] PUB.X = E1D06F005FCE15DE8BC8791CEEB3B03E9678CA0F5E4BA2F19EE6435097252EFEB0CD85000B8C486FE09A5D1E9C93E31B
39,846,897 UART: [art] PUB.Y = AABE8333453A318C19E9B1F204DEFFB3B23C03F38B45A67B1B6102A683789975B874001615DF7E315CD335B224D2E752
39,854,095 UART: [art] SIG.R = 30CF0363433EE8E05BA7827DCD85B11D752B91B37E714E89DDD0DF6A8A87CF17BF5BC2B2C4BABC453F8824F22C12E864
39,861,508 UART: [art] SIG.S = 9988C34CFCF8D3D0E6C53960C7CF1026DC31652F1B9371886F381A24A886876CB244FE669C35178B6652EB9F3676F944
40,840,386 UART: Caliptra RT
40,841,100 UART: [state] CFI Enabled
41,220,898 UART: [rt] RT listening for mailbox commands...
41,253,226 UART: [rt]cmd =0x4d454153, len=108
41,272,691 >>> mbox cmd response data (12 bytes)
43,327,628 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,343,720 >>> mbox cmd response: success
52,396,644 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,501,291 UART:
52,501,671 UART: Running Caliptra FMC ...
52,502,745 UART:
52,503,103 UART: [state] CFI Enabled
52,504,088 UART: [art] Extend RT PCRs Done
52,505,251 UART: [art] Lock RT PCRs Done
52,506,328 UART: [art] Populate DV Done
52,507,363 UART: [fht] FMC Alias Private Key: 7
52,508,682 UART: [art] Derive CDI
52,509,423 UART: [art] Store in slot 0x4
52,510,486 UART: [art] Derive Key Pair
52,511,435 UART: [art] Store priv key in slot 0x5
52,907,189 UART: [art] Derive Key Pair - Done
52,920,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,626,512 UART: [art] Erasing AUTHORITY.KEYID = 7
54,628,018 UART: [art] PUB.X = B5082781C60731C0BB5B3B7671AD8CA6597A95CA8E9F613373D3A90C40A8B761F05E0E20D890F03474923E370413DA65
54,635,235 UART: [art] PUB.Y = 7227D1B0A7B5E7B397B6714EE111BCAF2597063294455CC04E44A1722C4ABA0D0DE32185834EC6ACDE1B46856D06E0AA
54,642,486 UART: [art] SIG.R = A694FCBB1F86ACC55B23E5A346DBC7019BDB66A54DF25948CA36ED458981878DC8BCB1CAC4F3AA35BDEF0DB341E6B916
54,649,974 UART: [art] SIG.S = 34A2EE097955065A9C10CB9FDBAC9B6D31C5A11341587EF7206C81D76ED48AA3A0A31B7179F0B7446019DDE32D4248A5
55,628,986 UART: mbox::rt_entry...
55,629,959 UART: ____ _ _ _ ____ _____
55,631,889 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,633,898 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,635,757 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,637,684 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,639,571 UART: |_|
55,640,459 UART:
56,007,161 UART: [rt] Runtime listening for mailbox commands...
62,922,070 >>> mbox cmd response: success
62,922,466 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
62,958,240 UART:
62,958,498 UART: Running Caliptra FMC ...
62,959,616 UART:
62,959,785 UART: [state] CFI Enabled
63,003,837 UART: [art] Extend RT PCRs Done
63,005,027 UART: [art] Lock RT PCRs Done
63,006,387 UART: [art] Populate DV Done
63,011,809 UART: [fht] FMC Alias Private Key: 7
63,013,348 UART: [art] Derive CDI
63,014,171 UART: [art] Store in slot 0x4
63,056,827 UART: [art] Derive Key Pair
63,057,826 UART: [art] Store priv key in slot 0x5
65,484,307 UART: [art] Derive Key Pair - Done
65,497,420 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
67,203,732 UART: [art] Erasing AUTHORITY.KEYID = 7
67,205,235 UART: [art] PUB.X = 3B23560D42429048EC6B67AE52F2E5A115CC2B88A4BDF9F147AB70697133E023029C306E67066F63B0F7091B0D992499
67,212,452 UART: [art] PUB.Y = 724BEE93E870E4418B1D2CA47B7B5458165D996AA3D8CBE7D47C0182F84BD3C2D7BE72C9158F63432D02E1A68390B01E
67,219,702 UART: [art] SIG.R = C9AB3622566C9CC4CB7A7D7D490B0C7455722AC24FF694CF3D025835F950652C55D0EDE1F69E59332023FC305F56B946
67,227,100 UART: [art] SIG.S = 7E2C3299D18D60F2C0F7CE86E8AA1E5E9945F351A7C8274C02E0502B9CED19566137B4B7A416649B9EC78C0F809E2D50
68,205,351 UART: mbox::rt_entry...
68,206,338 UART: ____ _ _ _ ____ _____
68,208,249 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,210,310 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,212,200 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,214,129 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,216,012 UART: |_|
68,216,903 UART:
68,586,696 UART: [rt] Runtime listening for mailbox commands...
68,588,921 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
Truncated 2584 bytes from beginning
,587,096 UART: [fwproc] Received command 0x46574c44
1,587,887 UART: [fwproc] Received Image of size 82832 bytes
2,523,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,539 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,542 >>> mbox cmd response: success
2,668,542 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,669,722 UART: [afmc] ++
2,669,890 UART: [afmc] CDI.KEYID = 6
2,670,252 UART: [afmc] SUBJECT.KEYID = 7
2,670,677 UART: [afmc] AUTHORITY.KEYID = 5
2,705,674 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,838 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,618 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,327 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,210 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,893 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,805 UART: [afmc] --
2,748,919 UART: [cold-reset] --
2,749,971 UART: [state] Locking Datavault
2,751,466 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,070 UART: [state] Locking ICCM
2,752,580 UART: [exit] Launching FMC @ 0x40000130
2,757,910 UART:
2,757,926 UART: Running Caliptra FMC ...
2,758,334 UART:
2,758,388 UART: [state] CFI Enabled
2,769,334 UART: [fht] FMC Alias Private Key: 7
2,888,396 UART: [art] Extend RT PCRs Done
2,888,824 UART: [art] Lock RT PCRs Done
2,890,476 UART: [art] Populate DV Done
2,898,505 UART: [fht] FMC Alias Private Key: 7
2,899,661 UART: [art] Derive CDI
2,899,941 UART: [art] Store in slot 0x4
2,985,645 UART: [art] Derive Key Pair
2,986,005 UART: [art] Store priv key in slot 0x5
2,999,624 UART: [art] Derive Key Pair - Done
3,014,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,698 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,463 UART: [art] PUB.X = 5566A4CF8C23724D0555BFCF3ABAB8A866CA73CEAA5558851E28907A464A2FCB6D8D56EEC0AB5F03C873745D45091BBB
3,037,240 UART: [art] PUB.Y = E3F953F5D54FC532AF608685CD663EEE24142C1DB34F78AA65E6FBAEC2518545C251B8F2A9AA78DFD771C65236F6F882
3,044,202 UART: [art] SIG.R = A0CA7575569D08C20695354C50D5C5D00B33E1C7403F93AC2C43F6D5B26D3DFA61E04849358064B22E229C44C9DA6A29
3,050,963 UART: [art] SIG.S = 49EF11AC903E4C53EAC792613F9241641AAC8613026DE2C1D92F82AB627EC00C2FAD21626E99CBAC7C8DD77651FC0C64
3,074,476 UART: mbox::rt_entry...
3,074,848 UART: ____ _ _ _ ____ _____
3,075,632 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,432 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,200 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,968 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,736 UART: |_|
3,079,048 UART:
3,197,139 UART: [rt] Runtime listening for mailbox commands...
3,198,334 >>> mbox cmd response data (48 bytes)
3,198,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,449 UART:
3,198,465 UART: Running Caliptra ROM ...
3,198,873 UART:
3,198,927 UART: [state] CFI Enabled
3,201,503 UART: [state] LifecycleState = Unprovisioned
3,202,158 UART: [state] DebugLocked = No
3,202,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,204,317 UART: [kat] SHA2-256
3,998,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,002,363 UART: [kat] ++
4,002,515 UART: [kat] sha1
4,006,615 UART: [kat] SHA2-256
4,008,553 UART: [kat] SHA2-384
4,011,250 UART: [kat] SHA2-512-ACC
4,013,150 UART: [kat] ECC-384
4,018,777 UART: [kat] HMAC-384Kdf
4,023,311 UART: [kat] LMS
4,591,507 UART: [kat] --
4,592,538 UART: [update-reset] ++
5,974,562 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,975,666 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,130,933 >>> mbox cmd response: success
6,130,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,131,216 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,230 UART: [update-reset Success] --
6,140,311 UART: [state] Locking Datavault
6,141,087 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,691 UART: [state] Locking ICCM
6,142,141 UART: [exit] Launching FMC @ 0x40000130
6,147,471 UART:
6,147,487 UART: Running Caliptra FMC ...
6,147,895 UART:
6,147,949 UART: [state] CFI Enabled
6,237,174 UART: [art] Extend RT PCRs Done
6,237,602 UART: [art] Lock RT PCRs Done
6,238,685 UART: [art] Populate DV Done
6,246,938 UART: [fht] FMC Alias Private Key: 7
6,247,874 UART: [art] Derive CDI
6,248,154 UART: [art] Store in slot 0x4
6,333,976 UART: [art] Derive Key Pair
6,334,336 UART: [art] Store priv key in slot 0x5
6,347,549 UART: [art] Derive Key Pair - Done
6,362,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,377,586 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,351 UART: [art] PUB.X = 6FE4E9BBEA7DAE1C1D0A93C4E48754219D95D4B747AA4F5B62ECACF5E524C545029CC7CA67360400060ACFB911822924
6,385,096 UART: [art] PUB.Y = E69855331AD818C16B01E7D72E0A39E45C417AAF51E5BBC3E4F26453873647168B0B76732D2E94308E54BEFD6073C874
6,392,035 UART: [art] SIG.R = 5E0D995E790273A488CCC769AE018A0D4501010F355193E7163C5FBD826B0E06510FA37EC2D35FE1BDDFA1C56FC2B765
6,398,783 UART: [art] SIG.S = 3FAB663F2179B6C64E41DDD25BDD1A496515C52D9B8472D5869E0D169E6966CCE8824EFF31E897F13C80F742B52B8317
6,422,462 UART: Caliptra RT
6,422,713 UART: [state] CFI Enabled
6,786,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,818,179 UART: [rt]cmd =0x4d454153, len=108
6,839,225 >>> mbox cmd response data (12 bytes)
6,839,226 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,840,128 UART:
6,840,144 UART: Running Caliptra ROM ...
6,840,552 UART:
6,840,606 UART: [state] CFI Enabled
6,843,632 UART: [state] LifecycleState = Unprovisioned
6,844,287 UART: [state] DebugLocked = No
6,845,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,846,560 UART: [kat] SHA2-256
7,640,491 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,644,606 UART: [kat] ++
7,644,758 UART: [kat] sha1
7,649,078 UART: [kat] SHA2-256
7,651,016 UART: [kat] SHA2-384
7,653,641 UART: [kat] SHA2-512-ACC
7,655,541 UART: [kat] ECC-384
7,660,946 UART: [kat] HMAC-384Kdf
7,665,652 UART: [kat] LMS
8,233,848 UART: [kat] --
8,234,823 UART: [update-reset] ++
9,207,486 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,208,726 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,310,419 >>> mbox cmd response: success
9,310,419 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,310,556 UART: [update-reset] Copying MAN_2 To MAN_1
9,318,570 UART: [update-reset Success] --
9,319,561 UART: [state] Locking Datavault
9,320,341 UART: [state] Locking PCR0, PCR1 and PCR31
9,320,945 UART: [state] Locking ICCM
9,321,391 UART: [exit] Launching FMC @ 0x40000130
9,326,721 UART:
9,326,737 UART: Running Caliptra FMC ...
9,327,145 UART:
9,327,199 UART: [state] CFI Enabled
9,416,296 UART: [art] Extend RT PCRs Done
9,416,724 UART: [art] Lock RT PCRs Done
9,418,023 UART: [art] Populate DV Done
9,426,244 UART: [fht] FMC Alias Private Key: 7
9,427,424 UART: [art] Derive CDI
9,427,704 UART: [art] Store in slot 0x4
9,513,848 UART: [art] Derive Key Pair
9,514,208 UART: [art] Store priv key in slot 0x5
9,527,347 UART: [art] Derive Key Pair - Done
9,542,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,557,614 UART: [art] Erasing AUTHORITY.KEYID = 7
9,558,379 UART: [art] PUB.X = 05B4A1AD8C383BBA27C78A5AA814B254388AB345E4AD14DDD473F06E15BA453BD749A34B5C92633809E904E319B55750
9,565,144 UART: [art] PUB.Y = 9CC931395C689B2D6A4A6B88397DC6109016E972D3D4FF9E1C760E0625A3D4457A5047D59DD301C08E3D4843D9D7EECB
9,572,089 UART: [art] SIG.R = 56F9B1C957976507FBB05A97FCA3979B9E24F72ECCCB136E24BA7994D2B4E4EADB363240FB767624F0DE265BD65B9B29
9,578,868 UART: [art] SIG.S = C0B1FB6748388C9165AF95DB29C8BABDC423453AB461F2DA5BDEF9DB5513EE90D54ECF8F7D5AF50DD588E84F3ADCA9AA
9,602,461 UART: mbox::rt_entry...
9,602,833 UART: ____ _ _ _ ____ _____
9,603,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,604,417 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,605,185 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,605,953 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,606,721 UART: |_|
9,607,033 UART:
9,973,436 UART: [rt] Runtime listening for mailbox commands...
9,974,409 UART:
9,974,425 UART: Running Caliptra ROM ...
9,974,833 UART:
9,974,887 UART: [state] CFI Enabled
9,977,659 UART: [state] LifecycleState = Unprovisioned
9,978,314 UART: [state] DebugLocked = No
9,979,016 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,980,635 UART: [kat] SHA2-256
10,774,566 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,778,681 UART: [kat] ++
10,778,833 UART: [kat] sha1
10,783,043 UART: [kat] SHA2-256
10,784,981 UART: [kat] SHA2-384
10,787,752 UART: [kat] SHA2-512-ACC
10,789,652 UART: [kat] ECC-384
10,795,221 UART: [kat] HMAC-384Kdf
10,799,697 UART: [kat] LMS
11,367,893 UART: [kat] --
11,368,886 UART: [update-reset] ++
12,341,855 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,343,025 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,444,718 >>> mbox cmd response: success
12,444,718 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,445,043 UART: [update-reset] Copying MAN_2 To MAN_1
12,453,057 UART: [update-reset Success] --
12,453,970 UART: [state] Locking Datavault
12,454,724 UART: [state] Locking PCR0, PCR1 and PCR31
12,455,328 UART: [state] Locking ICCM
12,455,956 UART: [exit] Launching FMC @ 0x40000130
12,461,286 UART:
12,461,302 UART: Running Caliptra FMC ...
12,461,710 UART:
12,461,764 UART: [state] CFI Enabled
12,550,869 UART: [art] Extend RT PCRs Done
12,551,297 UART: [art] Lock RT PCRs Done
12,552,650 UART: [art] Populate DV Done
12,561,075 UART: [fht] FMC Alias Private Key: 7
12,562,137 UART: [art] Derive CDI
12,562,417 UART: [art] Store in slot 0x4
12,648,193 UART: [art] Derive Key Pair
12,648,553 UART: [art] Store priv key in slot 0x5
12,661,534 UART: [art] Derive Key Pair - Done
12,675,834 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,691,093 UART: [art] Erasing AUTHORITY.KEYID = 7
12,691,858 UART: [art] PUB.X = 1862CA5786BACF728E81ED151BE0C2E548BF1B54770AD3C8C6186F3DF71F9B13B58A1FBCE92D094A5F83AD1DEBADA9B6
12,698,646 UART: [art] PUB.Y = F98C6A3E33A7D89423EC116D1A44CADCB4E7964E710CBFC2281E3FD2C4A4AF81733A5F64614B0AF4370A4B784C711414
12,705,597 UART: [art] SIG.R = C554D2C3163F4FB1B3DCC88422567F555AA1379AB31411F34525F487E02B4E80246D460A75160117B5F3794E17DA9C45
12,712,355 UART: [art] SIG.S = 092559A29BE280A6E37C822CC6E7550E7569E3E4E0BEAA858D65802BE04C97A5AC72739F33A6F597E3A12EDACBE07B52
12,736,185 UART: mbox::rt_entry...
12,736,557 UART: ____ _ _ _ ____ _____
12,737,341 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,738,141 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,738,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,739,677 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,740,445 UART: |_|
12,740,757 UART:
13,102,712 UART: [rt] Runtime listening for mailbox commands...
13,103,916 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,639 ready_for_fw is high
1,361,639 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,516,895 >>> mbox cmd response: success
2,516,895 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,578,396 UART:
2,578,412 UART: Running Caliptra FMC ...
2,578,820 UART:
2,578,874 UART: [state] CFI Enabled
2,589,414 UART: [fht] FMC Alias Private Key: 7
2,708,166 UART: [art] Extend RT PCRs Done
2,708,594 UART: [art] Lock RT PCRs Done
2,710,012 UART: [art] Populate DV Done
2,718,451 UART: [fht] FMC Alias Private Key: 7
2,719,465 UART: [art] Derive CDI
2,719,745 UART: [art] Store in slot 0x4
2,805,493 UART: [art] Derive Key Pair
2,805,853 UART: [art] Store priv key in slot 0x5
2,820,012 UART: [art] Derive Key Pair - Done
2,834,577 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,836 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,601 UART: [art] PUB.X = E97DB25B8971442F1894BDA4324A3144690DAA565C7D9D1C9BFE8D68456475D0C8732F781DAD6B2D2FA6E0D4200D2D90
2,857,371 UART: [art] PUB.Y = 2B7C53A5B508622CF85B95BED26EAD8B52813EAF32A01074A8A7FE42A38AFC7455A43459888348CAD6C54780CA25C2F7
2,864,326 UART: [art] SIG.R = CEC6BDB6D95FE6C702DEFAEA1C3E705FEB3C9691E998F29175F1CD2E55792A0955151316EF6AC831449EEEFA0D96E36E
2,871,107 UART: [art] SIG.S = 8C1224B4269C659C73D83F74F6CB5F1835AC9FB663FDC78D5BE92E5CBC2B976A1BB04E9A5F09123BD2D9572FCBA1F888
2,894,704 UART: mbox::rt_entry...
2,895,076 UART: ____ _ _ _ ____ _____
2,895,860 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,660 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,428 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,196 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,964 UART: |_|
2,899,276 UART:
3,018,474 UART: [rt] Runtime listening for mailbox commands...
3,019,669 >>> mbox cmd response data (48 bytes)
3,019,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,832,722 >>> mbox cmd response: success
5,832,722 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,845,940 UART:
5,845,956 UART: Running Caliptra FMC ...
5,846,364 UART:
5,846,418 UART: [state] CFI Enabled
5,935,819 UART: [art] Extend RT PCRs Done
5,936,247 UART: [art] Lock RT PCRs Done
5,937,740 UART: [art] Populate DV Done
5,945,807 UART: [fht] FMC Alias Private Key: 7
5,946,839 UART: [art] Derive CDI
5,947,119 UART: [art] Store in slot 0x4
6,033,113 UART: [art] Derive Key Pair
6,033,473 UART: [art] Store priv key in slot 0x5
6,046,500 UART: [art] Derive Key Pair - Done
6,060,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,076,490 UART: [art] Erasing AUTHORITY.KEYID = 7
6,077,255 UART: [art] PUB.X = 525D02DF790A7F7182D69BF1215C0962B6E4C86642E9CB137E899051FDB60F1BAFDCB3B6401B5C26A27261EB20A4D221
6,084,019 UART: [art] PUB.Y = 3B33088B011163DB735DE81B3A4801FB73955EBD3CA762379A2DDEAD41563A16EE23A8CC736424938C9ED391649D1974
6,090,960 UART: [art] SIG.R = 25D4B9A60B07FDB4B9E9E0F1B10BCCF172D73C187D9E75CAFFD373B7F9D35C81F7A0F25650C33D3B76E2E371894DD35D
6,097,739 UART: [art] SIG.S = BDCBC7551E65D958D0C68D40AB22BA179D4A5810DA46E851CB7B2B6D083365CB3EECCBA264E83BD3CB741B6C65BD78AD
6,121,428 UART: Caliptra RT
6,121,679 UART: [state] CFI Enabled
6,488,472 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,519,918 UART: [rt]cmd =0x4d454153, len=108
6,539,564 >>> mbox cmd response data (12 bytes)
6,539,565 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,891,752 >>> mbox cmd response: success
8,891,752 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,905,312 UART:
8,905,328 UART: Running Caliptra FMC ...
8,905,736 UART:
8,905,790 UART: [state] CFI Enabled
8,994,919 UART: [art] Extend RT PCRs Done
8,995,347 UART: [art] Lock RT PCRs Done
8,996,486 UART: [art] Populate DV Done
9,004,721 UART: [fht] FMC Alias Private Key: 7
9,005,779 UART: [art] Derive CDI
9,006,059 UART: [art] Store in slot 0x4
9,091,567 UART: [art] Derive Key Pair
9,091,927 UART: [art] Store priv key in slot 0x5
9,104,876 UART: [art] Derive Key Pair - Done
9,119,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,135,046 UART: [art] Erasing AUTHORITY.KEYID = 7
9,135,811 UART: [art] PUB.X = 11961C7FFE520466F5FDCFE7EFF572183902627E52473D4B82222FE89EA9DB6C9C95D537E01DE1473A0A5F970173726F
9,142,571 UART: [art] PUB.Y = 4C3EBC10E61C1C44E0F48FEC5F8C32918A273033571B81573675D6E4A62EEECF89BFF3E9DDD51D642E247D1BD1886F20
9,149,533 UART: [art] SIG.R = 15B99401AFFB37905208F61E2321455F97B1605B4DECF7418E4F805284DEB1AA68B083F947B2AAD94612942B22A5D213
9,156,295 UART: [art] SIG.S = B1870C27833843521C87E3D4F438BBE9C81A84AD5D2BA59B2312DACC60B28A5CBF729B312E0A5419653D220B2528DD1F
9,180,118 UART: mbox::rt_entry...
9,180,490 UART: ____ _ _ _ ____ _____
9,181,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,182,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,182,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,183,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,184,378 UART: |_|
9,184,690 UART:
9,549,331 UART: [rt] Runtime listening for mailbox commands...
11,901,267 >>> mbox cmd response: success
11,901,267 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,914,557 UART:
11,914,573 UART: Running Caliptra FMC ...
11,914,981 UART:
11,915,035 UART: [state] CFI Enabled
12,004,142 UART: [art] Extend RT PCRs Done
12,004,570 UART: [art] Lock RT PCRs Done
12,005,667 UART: [art] Populate DV Done
12,014,050 UART: [fht] FMC Alias Private Key: 7
12,015,030 UART: [art] Derive CDI
12,015,310 UART: [art] Store in slot 0x4
12,100,844 UART: [art] Derive Key Pair
12,101,204 UART: [art] Store priv key in slot 0x5
12,114,341 UART: [art] Derive Key Pair - Done
12,128,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,143,981 UART: [art] Erasing AUTHORITY.KEYID = 7
12,144,746 UART: [art] PUB.X = 709DD0684DF7DE9E05CA279139F774ED19F6DD1817BD35AE5027BB07277FE702F3453A83CF541E7B205DAD5D8F4D6F44
12,151,517 UART: [art] PUB.Y = 2342EAAE8B00388F878970F5CA686F0456FF9F08964EB79575F149897F838718012FF6600B4FCACACB4BD4D69E475D9D
12,158,437 UART: [art] SIG.R = 7AA5A67A0DC3F17E9EE434F365B17668B498FA604FB0E685F55A4B449D1E59C1F064A9C4DFA6A8F963A881DCF8102EAC
12,165,220 UART: [art] SIG.S = 099B3A5084A578D24AF8211289AE43DF6DF0751893EA71942AD5D8C7297178B58F3096E5A46291F3C79090D611E1F6A7
12,189,049 UART: mbox::rt_entry...
12,189,421 UART: ____ _ _ _ ____ _____
12,190,205 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,191,005 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,191,773 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,192,541 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,193,309 UART: |_|
12,193,621 UART:
12,557,243 UART: [rt] Runtime listening for mailbox commands...
12,558,447 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.01s
Truncated 2584 bytes from beginning
,588,817 UART: [fwproc] Received command 0x46574c44
1,589,608 UART: [fwproc] Received Image of size 82832 bytes
2,525,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,361 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,670,272 >>> mbox cmd response: success
2,670,272 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,671,472 UART: [afmc] ++
2,671,640 UART: [afmc] CDI.KEYID = 6
2,672,002 UART: [afmc] SUBJECT.KEYID = 7
2,672,427 UART: [afmc] AUTHORITY.KEYID = 5
2,708,152 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,724,498 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,725,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,736,870 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,742,553 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,750,513 UART: [afmc] --
2,751,397 UART: [cold-reset] --
2,752,065 UART: [state] Locking Datavault
2,753,242 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,846 UART: [state] Locking ICCM
2,754,318 UART: [exit] Launching FMC @ 0x40000130
2,759,648 UART:
2,759,664 UART: Running Caliptra FMC ...
2,760,072 UART:
2,760,215 UART: [state] CFI Enabled
2,770,889 UART: [fht] FMC Alias Private Key: 7
2,890,217 UART: [art] Extend RT PCRs Done
2,890,645 UART: [art] Lock RT PCRs Done
2,892,029 UART: [art] Populate DV Done
2,900,040 UART: [fht] FMC Alias Private Key: 7
2,900,972 UART: [art] Derive CDI
2,901,252 UART: [art] Store in slot 0x4
2,987,032 UART: [art] Derive Key Pair
2,987,392 UART: [art] Store priv key in slot 0x5
3,000,641 UART: [art] Derive Key Pair - Done
3,015,302 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,574 UART: [art] PUB.X = FCCB1E765E11104B3E165EF9CFC4837BC3DAAC43FDD0ED495D743B971F0E7406E7368D53D0E6B2CA59CEC7FDD4454C8D
3,038,362 UART: [art] PUB.Y = 9C0CDD544D467DE8B741B288A9CB96EF1D9D0FAAE0645ABC5808B69D7AE4D693D342160C3E36330FCBC3615AE72ED850
3,045,313 UART: [art] SIG.R = A6F9F701BB87E48FE5F16F10ECFB0CC7E89780766265ADDD37970BD34C4B523FC43734EECAADF2769E8847888A2EF92B
3,052,090 UART: [art] SIG.S = B29D601FDF376AEB15112ABA9A5FAAE6F325AECE5E79DD00236CC1F2FD78C6BDF8027850DCC592941154608D569DE7E0
3,075,443 UART: mbox::rt_entry...
3,075,815 UART: ____ _ _ _ ____ _____
3,076,599 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,399 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,167 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,935 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,703 UART: |_|
3,080,015 UART:
3,199,687 UART: [rt] Runtime listening for mailbox commands...
3,200,882 >>> mbox cmd response data (48 bytes)
3,200,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,997 UART:
3,201,013 UART: Running Caliptra ROM ...
3,201,421 UART:
3,201,562 UART: [state] CFI Enabled
3,204,234 UART: [state] LifecycleState = Unprovisioned
3,204,889 UART: [state] DebugLocked = No
3,205,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,207,178 UART: [kat] SHA2-256
4,001,109 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,005,224 UART: [kat] ++
4,005,376 UART: [kat] sha1
4,009,598 UART: [kat] SHA2-256
4,011,536 UART: [kat] SHA2-384
4,014,321 UART: [kat] SHA2-512-ACC
4,016,221 UART: [kat] ECC-384
4,021,680 UART: [kat] HMAC-384Kdf
4,026,348 UART: [kat] LMS
4,594,544 UART: [kat] --
4,595,517 UART: [update-reset] ++
5,976,941 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,978,219 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,133,486 >>> mbox cmd response: success
6,133,486 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
6,133,757 UART: [update-reset] Copying MAN_2 To MAN_1
6,141,771 UART: [update-reset Success] --
6,142,922 UART: [state] Locking Datavault
6,143,754 UART: [state] Locking PCR0, PCR1 and PCR31
6,144,358 UART: [state] Locking ICCM
6,144,870 UART: [exit] Launching FMC @ 0x40000130
6,150,200 UART:
6,150,216 UART: Running Caliptra FMC ...
6,150,624 UART:
6,150,767 UART: [state] CFI Enabled
6,240,374 UART: [art] Extend RT PCRs Done
6,240,802 UART: [art] Lock RT PCRs Done
6,241,959 UART: [art] Populate DV Done
6,250,164 UART: [fht] FMC Alias Private Key: 7
6,251,324 UART: [art] Derive CDI
6,251,604 UART: [art] Store in slot 0x4
6,337,382 UART: [art] Derive Key Pair
6,337,742 UART: [art] Store priv key in slot 0x5
6,351,453 UART: [art] Derive Key Pair - Done
6,366,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,381,674 UART: [art] Erasing AUTHORITY.KEYID = 7
6,382,439 UART: [art] PUB.X = C6C129C85CAD4590F2896B5027BFE025DE3C9660D7F009574F1BA01A07AA90842B0CE02591985D875638E70FEC84F883
6,389,197 UART: [art] PUB.Y = 123D781C02A8E851CCBDF1402886D10033E6B229D718AEEF694119A51B0E32C761363E3F415C3732F1F83549A3B0649D
6,396,115 UART: [art] SIG.R = 608F39EDC57E5AE67D0D7012E154FAE2E62BF38181A94C1995F6663D5A8078303FBF4974BF0A6E4FB8542CF7A1404A30
6,402,885 UART: [art] SIG.S = 970F74684582C38213D0F34E5D03A0AB1DFF9D602A9B2FD390C59868EC216D29D6A0C5C309DBBD5956030BBE65637AFF
6,426,516 UART: Caliptra RT
6,426,859 UART: [state] CFI Enabled
6,793,894 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,825,258 UART: [rt]cmd =0x4d454153, len=108
6,845,692 >>> mbox cmd response data (12 bytes)
6,845,693 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,846,177 UART:
6,846,193 UART: Running Caliptra ROM ...
6,846,601 UART:
6,846,742 UART: [state] CFI Enabled
6,849,644 UART: [state] LifecycleState = Unprovisioned
6,850,299 UART: [state] DebugLocked = No
6,851,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,852,546 UART: [kat] SHA2-256
7,646,477 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,650,592 UART: [kat] ++
7,650,744 UART: [kat] sha1
7,655,092 UART: [kat] SHA2-256
7,657,030 UART: [kat] SHA2-384
7,659,907 UART: [kat] SHA2-512-ACC
7,661,807 UART: [kat] ECC-384
7,667,630 UART: [kat] HMAC-384Kdf
7,672,306 UART: [kat] LMS
8,240,502 UART: [kat] --
8,241,247 UART: [update-reset] ++
9,212,682 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,213,722 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,315,415 >>> mbox cmd response: success
9,315,415 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
9,315,638 UART: [update-reset] Copying MAN_2 To MAN_1
9,323,652 UART: [update-reset Success] --
9,324,687 UART: [state] Locking Datavault
9,325,547 UART: [state] Locking PCR0, PCR1 and PCR31
9,326,151 UART: [state] Locking ICCM
9,326,645 UART: [exit] Launching FMC @ 0x40000130
9,331,975 UART:
9,331,991 UART: Running Caliptra FMC ...
9,332,399 UART:
9,332,542 UART: [state] CFI Enabled
9,421,663 UART: [art] Extend RT PCRs Done
9,422,091 UART: [art] Lock RT PCRs Done
9,423,352 UART: [art] Populate DV Done
9,431,449 UART: [fht] FMC Alias Private Key: 7
9,432,519 UART: [art] Derive CDI
9,432,799 UART: [art] Store in slot 0x4
9,518,633 UART: [art] Derive Key Pair
9,518,993 UART: [art] Store priv key in slot 0x5
9,532,794 UART: [art] Derive Key Pair - Done
9,547,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,563,284 UART: [art] Erasing AUTHORITY.KEYID = 7
9,564,049 UART: [art] PUB.X = 0CF6FC9882A27D70479B0D1F8278FD681F6166987C4D21B09631C55A74942F02F3FC1A135056A68259F88D3507BAC2F1
9,570,803 UART: [art] PUB.Y = 27E52628027252973485F4EC26EFBCEBDA76197BFF6B9276E5CE3AEE0853505F977C769C8319E068486C7C6394F8111F
9,577,745 UART: [art] SIG.R = 917DA745283DC9C30602C4387B14C6D3A307284A58850232F58A81D559CC0A2948F21E7942E4E50B2A0A04D866C66254
9,584,481 UART: [art] SIG.S = E7A4623713C3DC707B58C5079EFC69BF240D49326E0CF67769B6B12ADBA37F6F55F4DCD2DF7BCADAEA20C87F58072445
9,608,171 UART: mbox::rt_entry...
9,608,543 UART: ____ _ _ _ ____ _____
9,609,327 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,610,127 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,610,895 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,611,663 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,612,431 UART: |_|
9,612,743 UART:
9,978,183 UART: [rt] Runtime listening for mailbox commands...
9,979,156 UART:
9,979,172 UART: Running Caliptra ROM ...
9,979,580 UART:
9,979,721 UART: [state] CFI Enabled
9,982,435 UART: [state] LifecycleState = Unprovisioned
9,983,090 UART: [state] DebugLocked = No
9,983,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
9,985,417 UART: [kat] SHA2-256
10,779,348 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
10,783,463 UART: [kat] ++
10,783,615 UART: [kat] sha1
10,787,835 UART: [kat] SHA2-256
10,789,773 UART: [kat] SHA2-384
10,792,494 UART: [kat] SHA2-512-ACC
10,794,394 UART: [kat] ECC-384
10,800,141 UART: [kat] HMAC-384Kdf
10,804,573 UART: [kat] LMS
11,372,769 UART: [kat] --
11,373,430 UART: [update-reset] ++
12,346,641 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,347,759 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
12,449,452 >>> mbox cmd response: success
12,449,452 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
12,449,743 UART: [update-reset] Copying MAN_2 To MAN_1
12,457,757 UART: [update-reset Success] --
12,458,718 UART: [state] Locking Datavault
12,459,478 UART: [state] Locking PCR0, PCR1 and PCR31
12,460,082 UART: [state] Locking ICCM
12,460,748 UART: [exit] Launching FMC @ 0x40000130
12,466,078 UART:
12,466,094 UART: Running Caliptra FMC ...
12,466,502 UART:
12,466,645 UART: [state] CFI Enabled
12,555,806 UART: [art] Extend RT PCRs Done
12,556,234 UART: [art] Lock RT PCRs Done
12,557,449 UART: [art] Populate DV Done
12,565,480 UART: [fht] FMC Alias Private Key: 7
12,566,534 UART: [art] Derive CDI
12,566,814 UART: [art] Store in slot 0x4
12,652,502 UART: [art] Derive Key Pair
12,652,862 UART: [art] Store priv key in slot 0x5
12,665,945 UART: [art] Derive Key Pair - Done
12,680,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,696,517 UART: [art] Erasing AUTHORITY.KEYID = 7
12,697,282 UART: [art] PUB.X = F1A327400DB0209C5C7ED2A6ED8385E75B15F3F2152D63E0D79301BB8DC9F1427D85CFFB31F02D795BAA2F30722CC8B4
12,704,058 UART: [art] PUB.Y = DE43CF4C9141C69640BF1891F07D6B6E25DF9C12D4E3C63870F55468B5EBAD032829D49E7428AC491F0140DB83B91A34
12,711,006 UART: [art] SIG.R = 7A5E78DCE28FE0C0357856711DD05C60A1B1E0339B4E15D7D5B7DD798606347CD740C2D70547EC25DAA84D92F53343E5
12,717,774 UART: [art] SIG.S = 17E162A7252581EB6C295BE4A486AF38486C44269614B75A85A277DD7E509A488FAFDA97FCA94A808BBED8D8DCAFB6FA
12,740,948 UART: mbox::rt_entry...
12,741,320 UART: ____ _ _ _ ____ _____
12,742,104 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,742,904 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,743,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,744,440 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,745,208 UART: |_|
12,745,520 UART:
13,107,196 UART: [rt] Runtime listening for mailbox commands...
13,108,400 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,536 ready_for_fw is high
1,362,536 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,414 >>> mbox cmd response: success
2,517,414 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,578,605 UART:
2,578,621 UART: Running Caliptra FMC ...
2,579,029 UART:
2,579,172 UART: [state] CFI Enabled
2,589,874 UART: [fht] FMC Alias Private Key: 7
2,708,634 UART: [art] Extend RT PCRs Done
2,709,062 UART: [art] Lock RT PCRs Done
2,710,898 UART: [art] Populate DV Done
2,719,097 UART: [fht] FMC Alias Private Key: 7
2,720,149 UART: [art] Derive CDI
2,720,429 UART: [art] Store in slot 0x4
2,805,987 UART: [art] Derive Key Pair
2,806,347 UART: [art] Store priv key in slot 0x5
2,819,886 UART: [art] Derive Key Pair - Done
2,834,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,406 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,171 UART: [art] PUB.X = 7A360BBEE25849EE69EBEF6913C4241EA82255A8E1875D6607037DBD16F59FB16115EE99342910A6163B7BE34AD8E5B7
2,856,936 UART: [art] PUB.Y = 8ECD8633B56F21C74B238476687E9B700641B098B713B67D182178F10A55EE4EB167DCBD416D3CC59B0D6A7289F2EA36
2,863,879 UART: [art] SIG.R = FFDA61FD735B4DFE5EAEE59A87F034C7AFD3CD59C214E04ED70AC57D680E32E1B8F8A523CDBF4B9F00386A1CD34A9D10
2,870,649 UART: [art] SIG.S = FE7C21CFCBC7830CC1F23C5CA589184A82AF012338BF245CD289C578D7984DE384A2BE90B6F9031E8EE0E99C9228372A
2,894,748 UART: mbox::rt_entry...
2,895,120 UART: ____ _ _ _ ____ _____
2,895,904 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,704 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,472 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,240 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,008 UART: |_|
2,899,320 UART:
3,018,356 UART: [rt] Runtime listening for mailbox commands...
3,019,551 >>> mbox cmd response data (48 bytes)
3,019,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,831,077 >>> mbox cmd response: success
5,831,077 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,844,543 UART:
5,844,559 UART: Running Caliptra FMC ...
5,844,967 UART:
5,845,110 UART: [state] CFI Enabled
5,934,361 UART: [art] Extend RT PCRs Done
5,934,789 UART: [art] Lock RT PCRs Done
5,935,898 UART: [art] Populate DV Done
5,944,117 UART: [fht] FMC Alias Private Key: 7
5,945,137 UART: [art] Derive CDI
5,945,417 UART: [art] Store in slot 0x4
6,031,071 UART: [art] Derive Key Pair
6,031,431 UART: [art] Store priv key in slot 0x5
6,044,776 UART: [art] Derive Key Pair - Done
6,059,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,074,774 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,539 UART: [art] PUB.X = FAF1D684EDEEBB9A89F1E223CBDD203AE521AB67902C5127FAE8C2B858391F7B6950619616B4EB63B3C65293C0C6D7B3
6,082,323 UART: [art] PUB.Y = 83CCEAC65F0300F2531D51CC92E9B1F3534A3EEAB05F9CCBF7EB68F89CCFF404C95A88E6FB18285C45B63753830930A9
6,089,256 UART: [art] SIG.R = 72825D2B71B8A93AC43F4363B2316C23CDFD860D6CC163002570685A7F96F49F6A6B34A12DBEDCC1BF621814196D580C
6,096,002 UART: [art] SIG.S = FA7A6D0A005D29EB37630B9155244EF3A9A32D86E75A5D26BF4D4738F9168DC732FC6E6FFC80D8E9D656A5E57F7F2A1E
6,120,058 UART: Caliptra RT
6,120,401 UART: [state] CFI Enabled
6,488,238 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,519,460 UART: [rt]cmd =0x4d454153, len=108
6,539,602 >>> mbox cmd response data (12 bytes)
6,539,603 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,892,005 >>> mbox cmd response: success
8,892,005 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,905,161 UART:
8,905,177 UART: Running Caliptra FMC ...
8,905,585 UART:
8,905,728 UART: [state] CFI Enabled
8,994,941 UART: [art] Extend RT PCRs Done
8,995,369 UART: [art] Lock RT PCRs Done
8,996,572 UART: [art] Populate DV Done
9,004,687 UART: [fht] FMC Alias Private Key: 7
9,005,839 UART: [art] Derive CDI
9,006,119 UART: [art] Store in slot 0x4
9,091,887 UART: [art] Derive Key Pair
9,092,247 UART: [art] Store priv key in slot 0x5
9,105,842 UART: [art] Derive Key Pair - Done
9,120,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,136,375 UART: [art] Erasing AUTHORITY.KEYID = 7
9,137,140 UART: [art] PUB.X = B6EFFB23F9A88FAE4632F49F64BF9F25633FC07F5CF40E2288F1BD489F61FCA39B826F3469B5B3544740D1D884357E8F
9,143,917 UART: [art] PUB.Y = DB83840DB6BA14908EC1C46613277D75DE457B799DD13B02D671DF4ADD562415FA5FDEA9C9955CB9779F16A001FBB877
9,150,868 UART: [art] SIG.R = 15941EC627A057DEE67CA98862AD426E31747CB0866303002812AF48021DF7B450113BF30BC286FFF166A2A5B7B48943
9,157,603 UART: [art] SIG.S = 7CEBC9594AFD5EB61077F0E7EB7D02CF3B9C440BA3015CB58F53E04306CD9421F3DE1D3517B1BFD0BB30B80F8D45663D
9,180,790 UART: mbox::rt_entry...
9,181,162 UART: ____ _ _ _ ____ _____
9,181,946 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,182,746 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,183,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,184,282 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,185,050 UART: |_|
9,185,362 UART:
9,554,436 UART: [rt] Runtime listening for mailbox commands...
11,907,273 >>> mbox cmd response: success
11,907,273 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,920,689 UART:
11,920,705 UART: Running Caliptra FMC ...
11,921,113 UART:
11,921,256 UART: [state] CFI Enabled
12,010,735 UART: [art] Extend RT PCRs Done
12,011,163 UART: [art] Lock RT PCRs Done
12,012,444 UART: [art] Populate DV Done
12,020,623 UART: [fht] FMC Alias Private Key: 7
12,021,645 UART: [art] Derive CDI
12,021,925 UART: [art] Store in slot 0x4
12,107,943 UART: [art] Derive Key Pair
12,108,303 UART: [art] Store priv key in slot 0x5
12,121,840 UART: [art] Derive Key Pair - Done
12,136,783 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
12,152,404 UART: [art] Erasing AUTHORITY.KEYID = 7
12,153,169 UART: [art] PUB.X = 993FB873C4406CC40EA8A8E1CDE4B6D9D55C91A265191D0594BE2081BE9A66AFA3FE5F0C247397E54B83EBDB614D8C4B
12,159,946 UART: [art] PUB.Y = 40827D48473F0AA7C6952EDFBEEF45F662FD534C248987F9D952EFEE5133244AFC4A14BD5E96CD1DFEE006C9406742AF
12,166,904 UART: [art] SIG.R = F3436FBA4FBED6B2F3384CEE6FB08BC3E76BFC079D0ADAA09C42DE900F00BB75C5AD03DF5C01B519A72D27B51A20B341
12,173,663 UART: [art] SIG.S = C3225ECF9FB1DF4D4EE3FB2DBD84981E135DEF3A463DD2E83BEC44089E8517033DE7F6F5FC52490775F037D3FC0F3D53
12,197,131 UART: mbox::rt_entry...
12,197,503 UART: ____ _ _ _ ____ _____
12,198,287 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
12,199,087 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
12,199,855 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
12,200,623 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
12,201,391 UART: |_|
12,201,703 UART:
12,565,335 UART: [rt] Runtime listening for mailbox commands...
12,566,539 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.16s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,020 UART: [ldev] --
1,279,231 UART: [fwproc] Wait for Commands...
1,279,866 UART: [fwproc] Recv command 0x46574c44
1,280,599 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,274,189 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,360,918 >>> mbox cmd response: success
2,360,918 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,362,146 UART: [afmc] ++
2,362,314 UART: [afmc] CDI.KEYID = 6
2,362,677 UART: [afmc] SUBJECT.KEYID = 7
2,363,103 UART: [afmc] AUTHORITY.KEYID = 5
2,398,476 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,414,503 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,415,252 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,420,962 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,426,843 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,432,544 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,440,341 UART: [afmc] --
2,441,224 UART: [cold-reset] --
2,442,158 UART: [state] Locking Datavault
2,443,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,443,751 UART: [state] Locking ICCM
2,444,303 UART: [exit] Launching FMC @ 0x40000130
2,449,633 UART:
2,449,649 UART: Running Caliptra FMC ...
2,450,057 UART:
2,450,111 UART: [state] CFI Enabled
2,460,711 UART: [fht] FMC Alias Private Key: 7
2,579,443 UART: [art] Extend RT PCRs Done
2,579,871 UART: [art] Lock RT PCRs Done
2,581,109 UART: [art] Populate DV Done
2,589,190 UART: [fht] FMC Alias Private Key: 7
2,590,348 UART: [art] Derive CDI
2,590,628 UART: [art] Store in slot 0x4
2,676,113 UART: [art] Derive Key Pair
2,676,473 UART: [art] Store priv key in slot 0x5
2,690,573 UART: [art] Derive Key Pair - Done
2,705,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,721,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,722,118 UART: [art] PUB.X = D0C12B450A92A403BB7119E79E65B9F1ADF685FF1F9380D39D13FA28F6AD257B3ED6655CD791A79B0495327FBA234ADB
2,728,891 UART: [art] PUB.Y = 5A87309678A48428377589E7F71C431D03B960336254BC6D1E426F44EDFCF803D0EBE2CA3882049A5864C58613A53C81
2,735,824 UART: [art] SIG.R = 2FA99EF016C33FCE540BE82A0841C686D794936B03FD5A3EF352BD93A208A07491DAA1C7D5F22023BD555604F1646958
2,742,581 UART: [art] SIG.S = E1AE8E9C0AA996FC62DA3DDE9D37F8989AEA0BA7950EE79FF0B853ACE3F02CED387E7D98F10C38B65BBAFE70003CF3C3
2,765,473 UART: mbox::rt_entry...
2,765,845 UART: ____ _ _ _ ____ _____
2,766,629 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,767,429 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,768,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,768,965 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,769,733 UART: |_|
2,770,045 UART:
2,888,299 UART: [rt] Runtime listening for mailbox commands...
2,889,494 >>> mbox cmd response data (48 bytes)
2,889,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,889,606 UART:
2,889,622 UART: Running Caliptra ROM ...
2,890,030 UART:
2,890,085 UART: [state] CFI Enabled
2,892,641 UART: [state] LifecycleState = Unprovisioned
2,893,296 UART: [state] DebugLocked = No
2,893,830 UART: [state] WD Timer not started. Device not locked for debugging
2,894,950 UART: [kat] SHA2-256
3,698,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,702,604 UART: [kat] ++
3,702,756 UART: [kat] sha1
3,707,162 UART: [kat] SHA2-256
3,709,102 UART: [kat] SHA2-384
3,711,739 UART: [kat] SHA2-512-ACC
3,713,639 UART: [kat] ECC-384
3,723,490 UART: [kat] HMAC-384Kdf
3,728,080 UART: [kat] LMS
3,976,392 UART: [kat] --
3,977,208 UART: [update-reset] ++
5,335,985 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,337,090 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,492,305 >>> mbox cmd response: success
5,492,305 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,492,652 UART: [update-reset] Copying MAN_2 To MAN_1
5,500,666 UART: [update-reset Success] --
5,501,733 UART: [state] Locking Datavault
5,502,485 UART: [state] Locking PCR0, PCR1 and PCR31
5,503,089 UART: [state] Locking ICCM
5,503,725 UART: [exit] Launching FMC @ 0x40000130
5,509,055 UART:
5,509,071 UART: Running Caliptra FMC ...
5,509,479 UART:
5,509,533 UART: [state] CFI Enabled
5,598,764 UART: [art] Extend RT PCRs Done
5,599,192 UART: [art] Lock RT PCRs Done
5,600,777 UART: [art] Populate DV Done
5,609,210 UART: [fht] FMC Alias Private Key: 7
5,610,342 UART: [art] Derive CDI
5,610,622 UART: [art] Store in slot 0x4
5,696,641 UART: [art] Derive Key Pair
5,697,001 UART: [art] Store priv key in slot 0x5
5,710,925 UART: [art] Derive Key Pair - Done
5,725,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,362 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,127 UART: [art] PUB.X = A99A76BF2DD59CE66E05800CD6EC31C283BAD89E01BF758FBBB85A9885387B08A30D2D64E52A9A012C9DCD8D2D96D7DF
5,748,899 UART: [art] PUB.Y = 2C2C0DFBBBAE15A6A3DAD2C32D8E24203B1A806830E2A40EB633C39C69628DEE2702F3A8B74AA615CF6E5708EF1067F2
5,755,853 UART: [art] SIG.R = 7B9CD0EC27C2814B2949A7B39E0921A05B7A1C516666F4320ECF51CAF616C85FB6ED38F0DA5D2C4E326D8EB68CD417FC
5,762,633 UART: [art] SIG.S = B1A5B9E30C54322522F91E62BCDEE82BDA672712CE7E17EAC58205BF1CD4304B309B41EF20408249889A5E06C77EB1F8
5,786,936 UART: Caliptra RT
5,787,187 UART: [state] CFI Enabled
6,155,705 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,187,081 UART: [rt]cmd =0x4d454153, len=108
6,208,263 >>> mbox cmd response data (12 bytes)
6,208,264 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,209,061 UART:
6,209,077 UART: Running Caliptra ROM ...
6,209,485 UART:
6,209,540 UART: [state] CFI Enabled
6,212,488 UART: [state] LifecycleState = Unprovisioned
6,213,143 UART: [state] DebugLocked = No
6,213,853 UART: [state] WD Timer not started. Device not locked for debugging
6,215,007 UART: [kat] SHA2-256
7,018,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,022,661 UART: [kat] ++
7,022,813 UART: [kat] sha1
7,026,945 UART: [kat] SHA2-256
7,028,885 UART: [kat] SHA2-384
7,031,552 UART: [kat] SHA2-512-ACC
7,033,452 UART: [kat] ECC-384
7,043,129 UART: [kat] HMAC-384Kdf
7,047,695 UART: [kat] LMS
7,296,007 UART: [kat] --
7,297,057 UART: [update-reset] ++
8,246,811 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,247,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,349,563 >>> mbox cmd response: success
8,349,563 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,349,906 UART: [update-reset] Copying MAN_2 To MAN_1
8,357,920 UART: [update-reset Success] --
8,359,051 UART: [state] Locking Datavault
8,359,701 UART: [state] Locking PCR0, PCR1 and PCR31
8,360,305 UART: [state] Locking ICCM
8,360,967 UART: [exit] Launching FMC @ 0x40000130
8,366,297 UART:
8,366,313 UART: Running Caliptra FMC ...
8,366,721 UART:
8,366,775 UART: [state] CFI Enabled
8,455,758 UART: [art] Extend RT PCRs Done
8,456,186 UART: [art] Lock RT PCRs Done
8,457,623 UART: [art] Populate DV Done
8,465,962 UART: [fht] FMC Alias Private Key: 7
8,466,938 UART: [art] Derive CDI
8,467,218 UART: [art] Store in slot 0x4
8,552,781 UART: [art] Derive Key Pair
8,553,141 UART: [art] Store priv key in slot 0x5
8,566,909 UART: [art] Derive Key Pair - Done
8,581,549 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,596,986 UART: [art] Erasing AUTHORITY.KEYID = 7
8,597,751 UART: [art] PUB.X = B80E5BBCDA2568259EC9AB43C53750F5683814A5DD497AC58F68B1245C62DF158EAE52DC8CA6AACEE60F7B5791B7E288
8,604,531 UART: [art] PUB.Y = 542759BFBAF469F1EAB098E4B921259D3D94E4F5546333F0CDD67E97CED7533E5A559E15EDB517109282D0CB716B2554
8,611,485 UART: [art] SIG.R = 08727EE04D0F002E95B8D05B158B7AA922AF73B02F52430EB356AE9EEBC9063853FB891E8D798E0DCD046EF50629B1A9
8,618,220 UART: [art] SIG.S = 0D68E4A6EFD443F7197D01B713390792BE66987F389E1B81AE1B3A1B01BDFA34A8EC6180DF1AFB00FDAA3E0151B6222F
8,641,977 UART: mbox::rt_entry...
8,642,349 UART: ____ _ _ _ ____ _____
8,643,133 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,933 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,644,701 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,645,469 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,646,237 UART: |_|
8,646,549 UART:
9,007,740 UART: [rt] Runtime listening for mailbox commands...
9,008,710 UART:
9,008,726 UART: Running Caliptra ROM ...
9,009,134 UART:
9,009,189 UART: [state] CFI Enabled
9,011,715 UART: [state] LifecycleState = Unprovisioned
9,012,370 UART: [state] DebugLocked = No
9,012,966 UART: [state] WD Timer not started. Device not locked for debugging
9,014,138 UART: [kat] SHA2-256
9,817,688 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,821,792 UART: [kat] ++
9,821,944 UART: [kat] sha1
9,826,272 UART: [kat] SHA2-256
9,828,212 UART: [kat] SHA2-384
9,831,073 UART: [kat] SHA2-512-ACC
9,832,973 UART: [kat] ECC-384
9,842,548 UART: [kat] HMAC-384Kdf
9,847,016 UART: [kat] LMS
10,095,328 UART: [kat] --
10,096,000 UART: [update-reset] ++
11,045,646 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,046,785 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,148,426 >>> mbox cmd response: success
11,148,426 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,148,669 UART: [update-reset] Copying MAN_2 To MAN_1
11,156,683 UART: [update-reset Success] --
11,157,670 UART: [state] Locking Datavault
11,158,536 UART: [state] Locking PCR0, PCR1 and PCR31
11,159,140 UART: [state] Locking ICCM
11,159,594 UART: [exit] Launching FMC @ 0x40000130
11,164,924 UART:
11,164,940 UART: Running Caliptra FMC ...
11,165,348 UART:
11,165,402 UART: [state] CFI Enabled
11,254,465 UART: [art] Extend RT PCRs Done
11,254,893 UART: [art] Lock RT PCRs Done
11,255,756 UART: [art] Populate DV Done
11,263,875 UART: [fht] FMC Alias Private Key: 7
11,264,963 UART: [art] Derive CDI
11,265,243 UART: [art] Store in slot 0x4
11,350,952 UART: [art] Derive Key Pair
11,351,312 UART: [art] Store priv key in slot 0x5
11,364,566 UART: [art] Derive Key Pair - Done
11,379,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,394,290 UART: [art] Erasing AUTHORITY.KEYID = 7
11,395,055 UART: [art] PUB.X = E7982BE684F1415275D8D888EA8A8B9C6EA50412680DD5B86CF51C59505627C02BF3C847F2ACF49131D5749D473E1F6C
11,401,821 UART: [art] PUB.Y = 20DAA627732822AEFCB54888B3DEF2880B3BA0915357C4429D5C33AA7D1F1FE62180A1AEBDB7C6FF3DD2960B9A35821C
11,408,779 UART: [art] SIG.R = B07C083A15C88BDFDC517DD8C028EF1F387CADD1B9FD4349041B3708EE2399EB398D2ABC29F60D7D8DC4A09382EDB585
11,415,555 UART: [art] SIG.S = 4BF3F99D94FB75B7824CFB5FA75BCFB55647F3638DF389EFBE7AEBF554825F0B2091049D36C73BBE4E775EDC90ED47A2
11,439,217 UART: mbox::rt_entry...
11,439,589 UART: ____ _ _ _ ____ _____
11,440,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,441,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,441,941 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,442,709 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,443,477 UART: |_|
11,443,789 UART:
11,803,169 UART: [rt] Runtime listening for mailbox commands...
11,804,373 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,748 ready_for_fw is high
1,058,748 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,213,881 >>> mbox cmd response: success
2,213,881 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,275,698 UART:
2,275,714 UART: Running Caliptra FMC ...
2,276,122 UART:
2,276,176 UART: [state] CFI Enabled
2,287,202 UART: [fht] FMC Alias Private Key: 7
2,405,850 UART: [art] Extend RT PCRs Done
2,406,278 UART: [art] Lock RT PCRs Done
2,408,016 UART: [art] Populate DV Done
2,415,907 UART: [fht] FMC Alias Private Key: 7
2,417,081 UART: [art] Derive CDI
2,417,361 UART: [art] Store in slot 0x4
2,502,986 UART: [art] Derive Key Pair
2,503,346 UART: [art] Store priv key in slot 0x5
2,517,098 UART: [art] Derive Key Pair - Done
2,531,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,294 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,059 UART: [art] PUB.X = C83F9A7BA6B8FD392ECA8402C7E2B6D6C79FF347B9FBF49478E5C57C56960D4631B69A3BE7C45C15D719AF2CFEA9AB4B
2,554,845 UART: [art] PUB.Y = 96E07BA21582BB76FA4ABDBE7059A59E14D554023A68EA200E0AB735EBCBAB4625AE0C69FC5D5F9A46EAF12BB9810EB2
2,561,802 UART: [art] SIG.R = A36773509834BF63B39E5B8D24C6A144255D560EA055003CFD8298209BA3CB3FE83F166DB7CF556A580C0CF7C18065E4
2,568,543 UART: [art] SIG.S = 2A74E9B776EEF0799F7E9724B2193F96DCD1979DAF290B4D18145B255305B1A4EDFB483DDE6B67F601DDFEBCFF0A796E
2,592,441 UART: mbox::rt_entry...
2,592,813 UART: ____ _ _ _ ____ _____
2,593,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,165 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,595,933 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,701 UART: |_|
2,597,013 UART:
2,715,759 UART: [rt] Runtime listening for mailbox commands...
2,716,954 >>> mbox cmd response data (48 bytes)
2,716,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,204,069 >>> mbox cmd response: success
5,204,069 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,217,200 UART:
5,217,216 UART: Running Caliptra FMC ...
5,217,624 UART:
5,217,678 UART: [state] CFI Enabled
5,307,099 UART: [art] Extend RT PCRs Done
5,307,527 UART: [art] Lock RT PCRs Done
5,308,858 UART: [art] Populate DV Done
5,316,805 UART: [fht] FMC Alias Private Key: 7
5,317,739 UART: [art] Derive CDI
5,318,019 UART: [art] Store in slot 0x4
5,403,734 UART: [art] Derive Key Pair
5,404,094 UART: [art] Store priv key in slot 0x5
5,416,952 UART: [art] Derive Key Pair - Done
5,432,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,447,426 UART: [art] Erasing AUTHORITY.KEYID = 7
5,448,191 UART: [art] PUB.X = 9FD53122908908118B93D4FBD816F9137E0F12D0D6371234E2F45AD7467D7CC4C70BC59F88588A0B4C4ACFC047960C84
5,454,946 UART: [art] PUB.Y = 9C7E4868A607160993C3D8BF3C3A3404E0F9D750643D168211FBF1FE7EC8AA030884209CE68D2948AFF231D2ACCBF618
5,461,887 UART: [art] SIG.R = 5FB852530056AFB254215CC4A93DB98100CFE21E62A92D2ECEFBDF44CEB8934ED364CC5CBBDF72279E923EFB67063025
5,468,626 UART: [art] SIG.S = 1EC25B643113587BEEC90C32D32CA9BF0DE2316CA1E946FB3B8ABF71B4863F1299A884809EE5933625422055C4D52977
5,492,636 UART: Caliptra RT
5,492,887 UART: [state] CFI Enabled
5,861,024 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,892,218 UART: [rt]cmd =0x4d454153, len=108
5,912,106 >>> mbox cmd response data (12 bytes)
5,912,107 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,937,828 >>> mbox cmd response: success
7,937,828 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,951,505 UART:
7,951,521 UART: Running Caliptra FMC ...
7,951,929 UART:
7,951,983 UART: [state] CFI Enabled
8,040,316 UART: [art] Extend RT PCRs Done
8,040,744 UART: [art] Lock RT PCRs Done
8,041,775 UART: [art] Populate DV Done
8,049,956 UART: [fht] FMC Alias Private Key: 7
8,050,926 UART: [art] Derive CDI
8,051,206 UART: [art] Store in slot 0x4
8,136,629 UART: [art] Derive Key Pair
8,136,989 UART: [art] Store priv key in slot 0x5
8,150,219 UART: [art] Derive Key Pair - Done
8,165,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,180,044 UART: [art] Erasing AUTHORITY.KEYID = 7
8,180,809 UART: [art] PUB.X = 53F40CAE56BF86C0BBC5A13C370E78F4F2048266001D25E95A232B76671B48747AACD34C5EAD4F35018A6612D9DEC1EA
8,187,555 UART: [art] PUB.Y = 51338CFF5F4190FF176923D191CDCED348B375111881DB811460456BFB3B97A5A006335236EBA46791E99E467C573290
8,194,494 UART: [art] SIG.R = 4EA47F2B7226CDA1E05BA5A12376B282A7929DD2687F4FF21FD2418E443D1330F11117FD9B29519418BBADE4583A3943
8,201,266 UART: [art] SIG.S = E1FB13D72EF6E138D8C676AA22A33436B6EB55970C2483744348ECB1433DAD234AFDC5A7F9986497061BE5C16A049815
8,225,353 UART: mbox::rt_entry...
8,225,725 UART: ____ _ _ _ ____ _____
8,226,509 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,227,309 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,228,077 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,228,845 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,229,613 UART: |_|
8,229,925 UART:
8,591,891 UART: [rt] Runtime listening for mailbox commands...
10,619,187 >>> mbox cmd response: success
10,619,187 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,632,702 UART:
10,632,718 UART: Running Caliptra FMC ...
10,633,126 UART:
10,633,180 UART: [state] CFI Enabled
10,722,013 UART: [art] Extend RT PCRs Done
10,722,441 UART: [art] Lock RT PCRs Done
10,723,342 UART: [art] Populate DV Done
10,731,613 UART: [fht] FMC Alias Private Key: 7
10,732,561 UART: [art] Derive CDI
10,732,841 UART: [art] Store in slot 0x4
10,818,504 UART: [art] Derive Key Pair
10,818,864 UART: [art] Store priv key in slot 0x5
10,831,818 UART: [art] Derive Key Pair - Done
10,846,527 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,862,036 UART: [art] Erasing AUTHORITY.KEYID = 7
10,862,801 UART: [art] PUB.X = 4D5364DA63F66B4227E5F1EAE8BD7FFFDC2C51D350F224BF5EC221470115BFA2B82230E05C7AE047543AC137476A1956
10,869,576 UART: [art] PUB.Y = 9B30BDAE30AC23FD199F31FDD86BB644678A0BACAB06A33ADDDA584FD6127BE68768E9868D2A9C42CC40F12E39713706
10,876,533 UART: [art] SIG.R = 21150C794C351F2B9031B16F85F336D0602C55E1F68D3437273687771D2D3B67AD095F81D1DFA5601385310A1D2D5137
10,883,282 UART: [art] SIG.S = 57170D14F94AFD5AAB64CFFFE623ED4BC75A4EE63E1001C21D357516C68C12E613AA56BF6DBF2799B45DEC77F159F3A6
10,907,712 UART: mbox::rt_entry...
10,908,084 UART: ____ _ _ _ ____ _____
10,908,868 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,909,668 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,910,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,911,204 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,911,972 UART: |_|
10,912,284 UART:
11,273,145 UART: [rt] Runtime listening for mailbox commands...
11,274,349 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.66s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,283 UART: [ldev] --
1,282,574 UART: [fwproc] Wait for Commands...
1,283,351 UART: [fwproc] Recv command 0x46574c44
1,284,084 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,068 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,827 >>> mbox cmd response: success
2,363,827 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,365,089 UART: [afmc] ++
2,365,257 UART: [afmc] CDI.KEYID = 6
2,365,620 UART: [afmc] SUBJECT.KEYID = 7
2,366,046 UART: [afmc] AUTHORITY.KEYID = 5
2,402,037 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,514 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,973 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,854 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,555 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,354 UART: [afmc] --
2,445,311 UART: [cold-reset] --
2,446,215 UART: [state] Locking Datavault
2,447,404 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,008 UART: [state] Locking ICCM
2,448,676 UART: [exit] Launching FMC @ 0x40000130
2,454,006 UART:
2,454,022 UART: Running Caliptra FMC ...
2,454,430 UART:
2,454,573 UART: [state] CFI Enabled
2,465,523 UART: [fht] FMC Alias Private Key: 7
2,584,393 UART: [art] Extend RT PCRs Done
2,584,821 UART: [art] Lock RT PCRs Done
2,586,253 UART: [art] Populate DV Done
2,594,246 UART: [fht] FMC Alias Private Key: 7
2,595,214 UART: [art] Derive CDI
2,595,494 UART: [art] Store in slot 0x4
2,681,573 UART: [art] Derive Key Pair
2,681,933 UART: [art] Store priv key in slot 0x5
2,695,443 UART: [art] Derive Key Pair - Done
2,710,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,989 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,754 UART: [art] PUB.X = 54070D0FB494159A7967DDFFAA0CE2C7D187E4D86AFF5B2D2C4D24CD47C202749BD3198B0DB66DFEA48BC63DAE7C7916
2,733,526 UART: [art] PUB.Y = 29F2E2A5AAA4FF63E5CA9F475CBD4719D6C1B7F7CB83EFB44716CBCB9D225C14C96B3A8F6D10F77A2E05A124B59A5ECA
2,740,499 UART: [art] SIG.R = 0D934599247FFC0F0491AEBD6275A3ED0DC70E3E9EFCA0F9519F8029AFBFF48F81A7ECEDA04B13485C0447741E60A2E6
2,747,267 UART: [art] SIG.S = 650A15D137E7F1A2F9BDEF54381BF442CFCB12E7684C4DBC6017032D90F9677B0D91AA9E951672048F80872FB11479F5
2,770,925 UART: mbox::rt_entry...
2,771,297 UART: ____ _ _ _ ____ _____
2,772,081 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,649 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,417 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,185 UART: |_|
2,775,497 UART:
2,893,442 UART: [rt] Runtime listening for mailbox commands...
2,894,637 >>> mbox cmd response data (48 bytes)
2,894,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,894,749 UART:
2,894,765 UART: Running Caliptra ROM ...
2,895,173 UART:
2,895,315 UART: [state] CFI Enabled
2,898,437 UART: [state] LifecycleState = Unprovisioned
2,899,092 UART: [state] DebugLocked = No
2,899,822 UART: [state] WD Timer not started. Device not locked for debugging
2,900,936 UART: [kat] SHA2-256
3,704,486 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,708,590 UART: [kat] ++
3,708,742 UART: [kat] sha1
3,712,850 UART: [kat] SHA2-256
3,714,790 UART: [kat] SHA2-384
3,717,495 UART: [kat] SHA2-512-ACC
3,719,395 UART: [kat] ECC-384
3,729,410 UART: [kat] HMAC-384Kdf
3,734,080 UART: [kat] LMS
3,982,392 UART: [kat] --
3,983,322 UART: [update-reset] ++
5,342,037 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,343,146 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,498,361 >>> mbox cmd response: success
5,498,361 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,498,506 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,520 UART: [update-reset Success] --
5,507,569 UART: [state] Locking Datavault
5,508,203 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,807 UART: [state] Locking ICCM
5,509,473 UART: [exit] Launching FMC @ 0x40000130
5,514,803 UART:
5,514,819 UART: Running Caliptra FMC ...
5,515,227 UART:
5,515,370 UART: [state] CFI Enabled
5,605,173 UART: [art] Extend RT PCRs Done
5,605,601 UART: [art] Lock RT PCRs Done
5,606,898 UART: [art] Populate DV Done
5,615,047 UART: [fht] FMC Alias Private Key: 7
5,616,153 UART: [art] Derive CDI
5,616,433 UART: [art] Store in slot 0x4
5,702,288 UART: [art] Derive Key Pair
5,702,648 UART: [art] Store priv key in slot 0x5
5,716,842 UART: [art] Derive Key Pair - Done
5,731,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,747,007 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,772 UART: [art] PUB.X = 06864742A14D96D0789EF680A08A7CFFB837AE82955D03F8017000C3607856BF5694189B4329A78934C84174A81987AF
5,754,497 UART: [art] PUB.Y = 301EF3BDC12203B2A330EF52635D13A4E269D5CEAC561D48F2291E6BFA93C4E160C07D3F85D733FF7DBA14D2C83627B2
5,761,456 UART: [art] SIG.R = 3B791321E20DD88143151EAE95199174D6B67D3AC1C475A44FE49670EE44B1186FBA572755C8E70D4C8F9B49B2FAE4F1
5,768,224 UART: [art] SIG.S = 5C0DFD75B1AB7646924F4C5EB64B3D3092F64AA0232C0796BC408353787D9A035B8D9B9585730A25BE3D0376A8DD7057
5,792,465 UART: Caliptra RT
5,792,808 UART: [state] CFI Enabled
6,161,209 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,192,511 UART: [rt]cmd =0x4d454153, len=108
6,213,105 >>> mbox cmd response data (12 bytes)
6,213,106 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,213,865 UART:
6,213,881 UART: Running Caliptra ROM ...
6,214,289 UART:
6,214,431 UART: [state] CFI Enabled
6,217,237 UART: [state] LifecycleState = Unprovisioned
6,217,892 UART: [state] DebugLocked = No
6,218,460 UART: [state] WD Timer not started. Device not locked for debugging
6,219,752 UART: [kat] SHA2-256
7,023,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,027,406 UART: [kat] ++
7,027,558 UART: [kat] sha1
7,031,820 UART: [kat] SHA2-256
7,033,760 UART: [kat] SHA2-384
7,036,603 UART: [kat] SHA2-512-ACC
7,038,503 UART: [kat] ECC-384
7,048,158 UART: [kat] HMAC-384Kdf
7,052,678 UART: [kat] LMS
7,300,990 UART: [kat] --
7,301,962 UART: [update-reset] ++
8,253,074 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,254,075 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,355,716 >>> mbox cmd response: success
8,355,716 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,355,921 UART: [update-reset] Copying MAN_2 To MAN_1
8,363,935 UART: [update-reset Success] --
8,365,008 UART: [state] Locking Datavault
8,365,670 UART: [state] Locking PCR0, PCR1 and PCR31
8,366,274 UART: [state] Locking ICCM
8,366,704 UART: [exit] Launching FMC @ 0x40000130
8,372,034 UART:
8,372,050 UART: Running Caliptra FMC ...
8,372,458 UART:
8,372,601 UART: [state] CFI Enabled
8,461,680 UART: [art] Extend RT PCRs Done
8,462,108 UART: [art] Lock RT PCRs Done
8,463,343 UART: [art] Populate DV Done
8,471,470 UART: [fht] FMC Alias Private Key: 7
8,472,402 UART: [art] Derive CDI
8,472,682 UART: [art] Store in slot 0x4
8,558,655 UART: [art] Derive Key Pair
8,559,015 UART: [art] Store priv key in slot 0x5
8,571,923 UART: [art] Derive Key Pair - Done
8,586,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,602,456 UART: [art] Erasing AUTHORITY.KEYID = 7
8,603,221 UART: [art] PUB.X = 76E8D8C90C41DB38BA8E86B67A3837C3F167B9DB89B4668D6FBB2E84C22F46BAED34DE29E380E9C64BB3247319A827E7
8,610,000 UART: [art] PUB.Y = 86BC1CE3B32CEA2C544A9DE0CE5F70185F49C4AABEF218EA305A5E75F1E5161FC6B0202897C689519743101EFE7B4518
8,616,960 UART: [art] SIG.R = DA68CED513DEA640CE75CE93844249D54B3BB2CD7CB85A2E51DFC0DA2653B7E0045BB41A160F49A697E83136A19CDD86
8,623,740 UART: [art] SIG.S = B8EDE95FA6C4A7FCEAD12A65931D3E187CBB06C9CC32A1CF4C0A34AF6A29C7C51ED4780149A2D2D24770B9B0CCD56164
8,647,277 UART: mbox::rt_entry...
8,647,649 UART: ____ _ _ _ ____ _____
8,648,433 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,649,233 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,650,001 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,769 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,651,537 UART: |_|
8,651,849 UART:
9,013,420 UART: [rt] Runtime listening for mailbox commands...
9,014,390 UART:
9,014,406 UART: Running Caliptra ROM ...
9,014,814 UART:
9,014,956 UART: [state] CFI Enabled
9,017,900 UART: [state] LifecycleState = Unprovisioned
9,018,555 UART: [state] DebugLocked = No
9,019,125 UART: [state] WD Timer not started. Device not locked for debugging
9,020,297 UART: [kat] SHA2-256
9,823,847 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,827,951 UART: [kat] ++
9,828,103 UART: [kat] sha1
9,832,485 UART: [kat] SHA2-256
9,834,425 UART: [kat] SHA2-384
9,836,944 UART: [kat] SHA2-512-ACC
9,838,844 UART: [kat] ECC-384
9,848,893 UART: [kat] HMAC-384Kdf
9,853,437 UART: [kat] LMS
10,101,749 UART: [kat] --
10,102,719 UART: [update-reset] ++
11,052,907 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,053,920 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,155,561 >>> mbox cmd response: success
11,155,561 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,155,684 UART: [update-reset] Copying MAN_2 To MAN_1
11,163,698 UART: [update-reset Success] --
11,164,605 UART: [state] Locking Datavault
11,165,489 UART: [state] Locking PCR0, PCR1 and PCR31
11,166,093 UART: [state] Locking ICCM
11,166,685 UART: [exit] Launching FMC @ 0x40000130
11,172,015 UART:
11,172,031 UART: Running Caliptra FMC ...
11,172,439 UART:
11,172,582 UART: [state] CFI Enabled
11,261,679 UART: [art] Extend RT PCRs Done
11,262,107 UART: [art] Lock RT PCRs Done
11,263,474 UART: [art] Populate DV Done
11,271,467 UART: [fht] FMC Alias Private Key: 7
11,272,485 UART: [art] Derive CDI
11,272,765 UART: [art] Store in slot 0x4
11,358,450 UART: [art] Derive Key Pair
11,358,810 UART: [art] Store priv key in slot 0x5
11,372,346 UART: [art] Derive Key Pair - Done
11,386,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,402,369 UART: [art] Erasing AUTHORITY.KEYID = 7
11,403,134 UART: [art] PUB.X = C364A33F8188D726CE10E6DCFB0D547BB4446FE48A669CBC642F6D10EF7CB9D8C338AFE618DA93DB694102D9856F4B76
11,409,912 UART: [art] PUB.Y = 2A7D0D58395B64834C9A58FF6128FC36903197BB3486100052C61A6ECBD10AB093730D161A0EF92D6F6F203E88CA3E6D
11,416,830 UART: [art] SIG.R = 5C8BD157505B4341D95A19E9B37E5ADAD17B1A3A75A941930A77824648ACC1CCA92DD9109EB893FBBC0CBEAB9D74B301
11,423,607 UART: [art] SIG.S = 060121DCC2B9627ABE9DE19C6080266AAE681FA354DF723DC902FD0A5489CA391FAA2FC01938B364AEE3AC8D8A20D07C
11,447,059 UART: mbox::rt_entry...
11,447,431 UART: ____ _ _ _ ____ _____
11,448,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,449,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,449,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,450,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,451,319 UART: |_|
11,451,631 UART:
11,817,376 UART: [rt] Runtime listening for mailbox commands...
11,818,580 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 ready_for_fw is high
1,060,483 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,142 >>> mbox cmd response: success
2,218,142 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,280,209 UART:
2,280,225 UART: Running Caliptra FMC ...
2,280,633 UART:
2,280,776 UART: [state] CFI Enabled
2,291,612 UART: [fht] FMC Alias Private Key: 7
2,411,282 UART: [art] Extend RT PCRs Done
2,411,710 UART: [art] Lock RT PCRs Done
2,413,348 UART: [art] Populate DV Done
2,421,557 UART: [fht] FMC Alias Private Key: 7
2,422,677 UART: [art] Derive CDI
2,422,957 UART: [art] Store in slot 0x4
2,508,696 UART: [art] Derive Key Pair
2,509,056 UART: [art] Store priv key in slot 0x5
2,522,520 UART: [art] Derive Key Pair - Done
2,537,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,223 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,988 UART: [art] PUB.X = DEA64217CB222CFDD8A6159C9675EEDC9F16329865F9E45C7F98EEB5ED23BEDF6BBD02A65960280B01E09BC3A94027E8
2,560,765 UART: [art] PUB.Y = 540090DB5E618BF84DA6CC64D09CB67827117316DCF203EE2677E7406B5811BE35B7E89A2E47AEE794C55DFA117A1765
2,567,694 UART: [art] SIG.R = BE5F9364FADC4C109F65F1097C3235A90C7C050B24F316CE3C995CDAB0666E428F1261F234738303F818581AFB9FFC2F
2,574,455 UART: [art] SIG.S = 6B7C1C3C406DC29CB20F00A837802500386330FB69F5CD054A5B9D7C4E802D70D7F5508C75F23904F80547B2A745E5B7
2,598,931 UART: mbox::rt_entry...
2,599,303 UART: ____ _ _ _ ____ _____
2,600,087 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,887 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,655 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,423 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,191 UART: |_|
2,603,503 UART:
2,722,229 UART: [rt] Runtime listening for mailbox commands...
2,723,424 >>> mbox cmd response data (48 bytes)
2,723,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,210,284 >>> mbox cmd response: success
5,210,284 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,223,521 UART:
5,223,537 UART: Running Caliptra FMC ...
5,223,945 UART:
5,224,088 UART: [state] CFI Enabled
5,313,485 UART: [art] Extend RT PCRs Done
5,313,913 UART: [art] Lock RT PCRs Done
5,315,036 UART: [art] Populate DV Done
5,323,137 UART: [fht] FMC Alias Private Key: 7
5,324,291 UART: [art] Derive CDI
5,324,571 UART: [art] Store in slot 0x4
5,410,008 UART: [art] Derive Key Pair
5,410,368 UART: [art] Store priv key in slot 0x5
5,423,522 UART: [art] Derive Key Pair - Done
5,438,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,712 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,477 UART: [art] PUB.X = E3B5ABA30FE2C774FA909E53ECBC6088CE2A323F19BD2A229B6F7279F35702346AABE7DB30E5842865C57345FEED7D97
5,461,255 UART: [art] PUB.Y = D4C604ECE8C053DEDBD8C535FC19976E2FA902D159FAFC12E33FFFEB1386B0312B83232CDF91741AF9036AF981BF4312
5,468,212 UART: [art] SIG.R = 2C3BA43D4E42915BE1A5DDF7050F66AAC7C2F0F6F629313B0ED335840BE1B433035D98BDEC13CB0BA1D456F7910FB9A3
5,474,977 UART: [art] SIG.S = 6D07361A865F07EFEDA9DF6E04D45EE770786016CACEAAC31CADA239B792B0216943DD3DF821D3A11DC3532F25E8908A
5,498,852 UART: Caliptra RT
5,499,195 UART: [state] CFI Enabled
5,863,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,894,904 UART: [rt]cmd =0x4d454153, len=108
5,915,298 >>> mbox cmd response data (12 bytes)
5,915,299 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,940,947 >>> mbox cmd response: success
7,940,947 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,954,126 UART:
7,954,142 UART: Running Caliptra FMC ...
7,954,550 UART:
7,954,693 UART: [state] CFI Enabled
8,044,070 UART: [art] Extend RT PCRs Done
8,044,498 UART: [art] Lock RT PCRs Done
8,045,811 UART: [art] Populate DV Done
8,054,062 UART: [fht] FMC Alias Private Key: 7
8,055,012 UART: [art] Derive CDI
8,055,292 UART: [art] Store in slot 0x4
8,141,039 UART: [art] Derive Key Pair
8,141,399 UART: [art] Store priv key in slot 0x5
8,155,147 UART: [art] Derive Key Pair - Done
8,169,968 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,185,525 UART: [art] Erasing AUTHORITY.KEYID = 7
8,186,290 UART: [art] PUB.X = B2665BE29B1AF5F784D5E749489C27E45A93E362F0671618B68E9B7F8F3C649DD848D484AB64C23DBB9A4E2136DD45F8
8,193,066 UART: [art] PUB.Y = C0D469AD2DCD00C28BB48C7A11962B363BF2E8FB3AA9CF05B7F81F0B3418C03580508409DE7C8018727A96A1F551D46C
8,199,993 UART: [art] SIG.R = 125105F9ACC5D8B9A7E228324C1F90CFECAC4DB330447E5A416C32E443AB3488793C1365F4BE2574EEAB30D0047EA764
8,206,765 UART: [art] SIG.S = 1992528411270FEC61F82EE8F9AB5D1A0AF6F5E69994C87D446484371CBA871A1197B6F1DB7F20A20A0047CFE9E0B5E7
8,230,622 UART: mbox::rt_entry...
8,230,994 UART: ____ _ _ _ ____ _____
8,231,778 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,232,578 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,233,346 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,234,114 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,234,882 UART: |_|
8,235,194 UART:
8,595,483 UART: [rt] Runtime listening for mailbox commands...
10,622,380 >>> mbox cmd response: success
10,622,380 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,635,557 UART:
10,635,573 UART: Running Caliptra FMC ...
10,635,981 UART:
10,636,124 UART: [state] CFI Enabled
10,724,901 UART: [art] Extend RT PCRs Done
10,725,329 UART: [art] Lock RT PCRs Done
10,726,582 UART: [art] Populate DV Done
10,734,975 UART: [fht] FMC Alias Private Key: 7
10,735,933 UART: [art] Derive CDI
10,736,213 UART: [art] Store in slot 0x4
10,822,228 UART: [art] Derive Key Pair
10,822,588 UART: [art] Store priv key in slot 0x5
10,835,724 UART: [art] Derive Key Pair - Done
10,850,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,865,463 UART: [art] Erasing AUTHORITY.KEYID = 7
10,866,228 UART: [art] PUB.X = AF4E5ED2BA708F3636C381E73D553A8FD3C2EF2DA95CF5F1F2269568F4150A456111E4DB90543EFAC82AF837263385E3
10,873,003 UART: [art] PUB.Y = 3E15F042B4533A6C93F531972EA4C0AE7EDF77323E829AFB7CFF0DB56F12583A8935730BE6CB15CB11B1A8DE6B754BEF
10,879,963 UART: [art] SIG.R = F237B15A5A2CE1140E8388225D6A88624D5A260733A29FD95F9E14D288DA1553A032F96C8C0A693582F421B90A830322
10,886,710 UART: [art] SIG.S = B6C3633A3A57DF80CAC27F6C39AFEED14E64FBAA957CE3FD23ECA84F00A430710C5B26789FF37981D52528AA2F7DDFE1
10,909,713 UART: mbox::rt_entry...
10,910,085 UART: ____ _ _ _ ____ _____
10,910,869 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,911,669 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,912,437 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,913,205 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,913,973 UART: |_|
10,914,285 UART:
11,282,016 UART: [rt] Runtime listening for mailbox commands...
11,283,220 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.92s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,564 UART: [fwproc] Recv command 0x46574c44
1,282,292 UART: [fwproc] Recv'd Img size: 82832 bytes
2,216,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,243,997 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,167 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,361,772 >>> mbox cmd response: success
2,361,772 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,362,918 UART: [afmc] ++
2,363,086 UART: [afmc] CDI.KEYID = 6
2,363,448 UART: [afmc] SUBJECT.KEYID = 7
2,363,873 UART: [afmc] AUTHORITY.KEYID = 5
2,399,522 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,415,639 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,416,387 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,422,096 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,427,979 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,433,680 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,441,686 UART: [afmc] --
2,442,794 UART: [cold-reset] --
2,443,720 UART: [state] Locking Datavault
2,444,883 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,487 UART: [state] Locking ICCM
2,446,155 UART: [exit] Launching FMC @ 0x40000130
2,451,485 UART:
2,451,501 UART: Running Caliptra FMC ...
2,451,909 UART:
2,451,963 UART: [state] CFI Enabled
2,462,695 UART: [fht] FMC Alias Private Key: 7
2,581,903 UART: [art] Extend RT PCRs Done
2,582,331 UART: [art] Lock RT PCRs Done
2,584,139 UART: [art] Populate DV Done
2,592,650 UART: [fht] FMC Alias Private Key: 7
2,593,768 UART: [art] Derive CDI
2,594,048 UART: [art] Store in slot 0x4
2,680,517 UART: [art] Derive Key Pair
2,680,877 UART: [art] Store priv key in slot 0x5
2,693,867 UART: [art] Derive Key Pair - Done
2,708,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,936 UART: [art] PUB.X = BC2BB59E97526C872D0F17F1DC0540854D1C826AF63736BE705E482185CFD462FC8896189BF60B3F5F7B0FB694BEA36E
2,731,702 UART: [art] PUB.Y = 109B1E377A9457B78553DED5E94AB81ED20C67A66638CA6CB015400A70E7B08C93642FDDC95DB453839433C262BD1137
2,738,646 UART: [art] SIG.R = 9AAD4FDFC0B608649B79975CAD9681414D91ED71880BBD1FC04A5B508FA0E46B13101386C6A07730EDE10B235661EF8B
2,745,415 UART: [art] SIG.S = 8EEC2C051AB3EE87DE2882E3668340DC2910EF8D3C6EC6A3408A4A10F5CEEC425EA344D9CEF9B92066A34B91676823B7
2,769,118 UART: mbox::rt_entry...
2,769,490 UART: ____ _ _ _ ____ _____
2,770,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,378 UART: |_|
2,773,690 UART:
2,891,969 UART: [rt] Runtime listening for mailbox commands...
2,893,164 >>> mbox cmd response data (48 bytes)
2,893,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,276 UART:
2,893,292 UART: Running Caliptra ROM ...
2,893,700 UART:
2,893,755 UART: [state] CFI Enabled
2,896,621 UART: [state] LifecycleState = Unprovisioned
2,897,276 UART: [state] DebugLocked = No
2,897,842 UART: [state] WD Timer not started. Device not locked for debugging
2,899,196 UART: [kat] SHA2-256
3,704,846 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,971 UART: [kat] ++
3,709,123 UART: [kat] sha1
3,713,209 UART: [kat] SHA2-256
3,715,149 UART: [kat] SHA2-384
3,717,896 UART: [kat] SHA2-512-ACC
3,719,796 UART: [kat] ECC-384
3,729,587 UART: [kat] HMAC-384Kdf
3,734,187 UART: [kat] LMS
3,982,515 UART: [kat] --
3,983,469 UART: [update-reset] ++
5,343,799 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,344,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,500,137 >>> mbox cmd response: success
5,500,137 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,500,392 UART: [update-reset] Copying MAN_2 To MAN_1
5,508,406 UART: [update-reset Success] --
5,509,429 UART: [state] Locking Datavault
5,510,271 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,875 UART: [state] Locking ICCM
5,511,425 UART: [exit] Launching FMC @ 0x40000130
5,516,755 UART:
5,516,771 UART: Running Caliptra FMC ...
5,517,179 UART:
5,517,233 UART: [state] CFI Enabled
5,606,248 UART: [art] Extend RT PCRs Done
5,606,676 UART: [art] Lock RT PCRs Done
5,607,799 UART: [art] Populate DV Done
5,616,094 UART: [fht] FMC Alias Private Key: 7
5,617,244 UART: [art] Derive CDI
5,617,524 UART: [art] Store in slot 0x4
5,702,967 UART: [art] Derive Key Pair
5,703,327 UART: [art] Store priv key in slot 0x5
5,716,663 UART: [art] Derive Key Pair - Done
5,731,404 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,947 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,712 UART: [art] PUB.X = 4B9C07B74239FB71ACBE06FCDDD86B0A9471BE17B372DD372A55047D7DAC208D09D1777EBBBDD1C0BEDB998ABD583A93
5,754,491 UART: [art] PUB.Y = BF05007EA81852A61564F95619DA7C8EB816EB1E79AA196F8FEB359D15EC34DB76BD54F5180125B0897EF517B32B65F1
5,761,419 UART: [art] SIG.R = E73E8175E75EAE4786DE147CB4E87567D1FFBE5C5C43F1F12E4B13107F9DEA55C30E12433122431AB53137996A95F397
5,768,188 UART: [art] SIG.S = 9F8DAA08E72B50FE53BBB3E100DC7FC08DD9260610819B9FD07218A546967F9C7E0E207364B89DBB75184CFB57FD45D9
5,792,143 UART: Caliptra RT
5,792,394 UART: [state] CFI Enabled
6,153,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,185,213 UART: [rt]cmd =0x4d454153, len=108
6,205,737 >>> mbox cmd response data (12 bytes)
6,205,738 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,206,727 UART:
6,206,743 UART: Running Caliptra ROM ...
6,207,151 UART:
6,207,206 UART: [state] CFI Enabled
6,209,708 UART: [state] LifecycleState = Unprovisioned
6,210,363 UART: [state] DebugLocked = No
6,211,007 UART: [state] WD Timer not started. Device not locked for debugging
6,212,223 UART: [kat] SHA2-256
7,017,873 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,021,998 UART: [kat] ++
7,022,150 UART: [kat] sha1
7,026,436 UART: [kat] SHA2-256
7,028,376 UART: [kat] SHA2-384
7,031,099 UART: [kat] SHA2-512-ACC
7,032,999 UART: [kat] ECC-384
7,042,548 UART: [kat] HMAC-384Kdf
7,047,090 UART: [kat] LMS
7,295,418 UART: [kat] --
7,296,260 UART: [update-reset] ++
8,246,009 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,247,006 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,348,647 >>> mbox cmd response: success
8,348,647 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,348,918 UART: [update-reset] Copying MAN_2 To MAN_1
8,356,932 UART: [update-reset Success] --
8,357,935 UART: [state] Locking Datavault
8,358,741 UART: [state] Locking PCR0, PCR1 and PCR31
8,359,345 UART: [state] Locking ICCM
8,359,967 UART: [exit] Launching FMC @ 0x40000130
8,365,297 UART:
8,365,313 UART: Running Caliptra FMC ...
8,365,721 UART:
8,365,775 UART: [state] CFI Enabled
8,455,624 UART: [art] Extend RT PCRs Done
8,456,052 UART: [art] Lock RT PCRs Done
8,457,095 UART: [art] Populate DV Done
8,465,518 UART: [fht] FMC Alias Private Key: 7
8,466,536 UART: [art] Derive CDI
8,466,816 UART: [art] Store in slot 0x4
8,552,627 UART: [art] Derive Key Pair
8,552,987 UART: [art] Store priv key in slot 0x5
8,565,247 UART: [art] Derive Key Pair - Done
8,580,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,595,864 UART: [art] Erasing AUTHORITY.KEYID = 7
8,596,629 UART: [art] PUB.X = 9543714F2A262CE5D95CCAB403BF9DF966749A03EBAEBD3EF2DDA4379B3E29C2CB90CB697A4684AC0639A5D3F0BC9069
8,603,408 UART: [art] PUB.Y = 8C74C5525E7E2B9260137CDD0600688F7A0857E1A4CEF10E77FB8934110D05EF229A5F2DD93A50FE696470C07DEBFFCE
8,610,331 UART: [art] SIG.R = CCE3F4046220F599D4CDFFC1AADFAE42C38FA6A4E3D4A00905525656837FE64B10785B8EFB6666CAA377DEF4F4CCE7D4
8,617,114 UART: [art] SIG.S = F0E615FEAB1453B98114C790EED34E020B2D270FA6B6C9B6BDB9F6FFA0136F552ADB733131C4C9EEBB96F035A9780945
8,641,268 UART: mbox::rt_entry...
8,641,640 UART: ____ _ _ _ ____ _____
8,642,424 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,643,224 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,643,992 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,644,760 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,645,528 UART: |_|
8,645,840 UART:
9,005,899 UART: [rt] Runtime listening for mailbox commands...
9,006,869 UART:
9,006,885 UART: Running Caliptra ROM ...
9,007,293 UART:
9,007,348 UART: [state] CFI Enabled
9,009,942 UART: [state] LifecycleState = Unprovisioned
9,010,597 UART: [state] DebugLocked = No
9,011,291 UART: [state] WD Timer not started. Device not locked for debugging
9,012,529 UART: [kat] SHA2-256
9,818,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,822,304 UART: [kat] ++
9,822,456 UART: [kat] sha1
9,826,656 UART: [kat] SHA2-256
9,828,596 UART: [kat] SHA2-384
9,831,577 UART: [kat] SHA2-512-ACC
9,833,477 UART: [kat] ECC-384
9,842,832 UART: [kat] HMAC-384Kdf
9,847,430 UART: [kat] LMS
10,095,758 UART: [kat] --
10,096,348 UART: [update-reset] ++
11,047,143 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,048,152 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,149,793 >>> mbox cmd response: success
11,149,793 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,149,896 UART: [update-reset] Copying MAN_2 To MAN_1
11,157,910 UART: [update-reset Success] --
11,159,021 UART: [state] Locking Datavault
11,159,801 UART: [state] Locking PCR0, PCR1 and PCR31
11,160,405 UART: [state] Locking ICCM
11,160,859 UART: [exit] Launching FMC @ 0x40000130
11,166,189 UART:
11,166,205 UART: Running Caliptra FMC ...
11,166,613 UART:
11,166,667 UART: [state] CFI Enabled
11,255,934 UART: [art] Extend RT PCRs Done
11,256,362 UART: [art] Lock RT PCRs Done
11,257,713 UART: [art] Populate DV Done
11,266,050 UART: [fht] FMC Alias Private Key: 7
11,267,196 UART: [art] Derive CDI
11,267,476 UART: [art] Store in slot 0x4
11,352,855 UART: [art] Derive Key Pair
11,353,215 UART: [art] Store priv key in slot 0x5
11,366,125 UART: [art] Derive Key Pair - Done
11,381,091 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,396,442 UART: [art] Erasing AUTHORITY.KEYID = 7
11,397,207 UART: [art] PUB.X = F1FD98097366BF9FABEF9BAE874E2EDFC59E1B9B3FC144000E829D6CA47238F1CEF228634D767E7317DB9FB0EEE41478
11,403,967 UART: [art] PUB.Y = 3E834D1FCEAF7CA94695201547B635BDE07336107CB16CA8ED1182509B9A38126C49D277B044265EAE30C8BD3B917248
11,410,917 UART: [art] SIG.R = 0216EB81AC28981AC9E99266B644E94AD745DA860CC88B77972BC4901A63702EA7AC488E72CC76C49B15E34746EB6447
11,417,681 UART: [art] SIG.S = 4F9CADAF5113D21D6C548BA64F7F2EF2D393DE518DB63DDB07ABD1C3C09A1C2074AE0A3D1DF9629D167EB7AC6EA2F5F9
11,441,269 UART: mbox::rt_entry...
11,441,641 UART: ____ _ _ _ ____ _____
11,442,425 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,443,225 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,443,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,444,761 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,445,529 UART: |_|
11,445,841 UART:
11,811,460 UART: [rt] Runtime listening for mailbox commands...
11,812,664 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,975 ready_for_fw is high
1,059,975 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,505 >>> mbox cmd response: success
2,216,505 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,278,384 UART:
2,278,400 UART: Running Caliptra FMC ...
2,278,808 UART:
2,278,862 UART: [state] CFI Enabled
2,289,480 UART: [fht] FMC Alias Private Key: 7
2,408,284 UART: [art] Extend RT PCRs Done
2,408,712 UART: [art] Lock RT PCRs Done
2,410,466 UART: [art] Populate DV Done
2,418,689 UART: [fht] FMC Alias Private Key: 7
2,419,803 UART: [art] Derive CDI
2,420,083 UART: [art] Store in slot 0x4
2,506,048 UART: [art] Derive Key Pair
2,506,408 UART: [art] Store priv key in slot 0x5
2,519,748 UART: [art] Derive Key Pair - Done
2,534,398 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,549,137 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,902 UART: [art] PUB.X = 14E14307409EE247D7F1827E64235C4746C728CA4A212407C58543E4D1B0199999BF030E751B6650B3D7F5E8ADE46ED4
2,556,654 UART: [art] PUB.Y = 37A107B1797A26CCEC6B9EAADE607E3E36C2DF9A61EDAA7CC44624ACE9755E4C1A3C38C2BE8AC9E5845E7DDAAB2C4E10
2,563,631 UART: [art] SIG.R = DB67135BCA151C3598B9CE52DE61D0D5ADC97D9AC2A2275813B610CDA9BAFD38CA68261A20D0A1EE626E0AE3C5708A1B
2,570,418 UART: [art] SIG.S = 38C1D73698C8A8940154AABF073907D682C936E9F0E88C9EE89C3B829F9C31CED7C42F6C655E1560FD982AFD6DA5F87D
2,594,009 UART: mbox::rt_entry...
2,594,381 UART: ____ _ _ _ ____ _____
2,595,165 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,595,965 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,733 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,501 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,269 UART: |_|
2,598,581 UART:
2,715,901 UART: [rt] Runtime listening for mailbox commands...
2,717,096 >>> mbox cmd response data (48 bytes)
2,717,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,396 >>> mbox cmd response: success
5,206,396 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,219,695 UART:
5,219,711 UART: Running Caliptra FMC ...
5,220,119 UART:
5,220,173 UART: [state] CFI Enabled
5,309,522 UART: [art] Extend RT PCRs Done
5,309,950 UART: [art] Lock RT PCRs Done
5,311,195 UART: [art] Populate DV Done
5,319,448 UART: [fht] FMC Alias Private Key: 7
5,320,432 UART: [art] Derive CDI
5,320,712 UART: [art] Store in slot 0x4
5,406,207 UART: [art] Derive Key Pair
5,406,567 UART: [art] Store priv key in slot 0x5
5,419,775 UART: [art] Derive Key Pair - Done
5,434,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,449,846 UART: [art] Erasing AUTHORITY.KEYID = 7
5,450,611 UART: [art] PUB.X = 0AAC9F113E576DE9B7930E727177DB88E12D8D25E5CD74AD5E7DC5023C9315F8F44EF78DFC9D9DBDE6EC2AB4A6F712BA
5,457,396 UART: [art] PUB.Y = 78E6AA6C047D998E8D0460D686BEF055D6743950B030DAFEEAA0DBC57FF2012BA0F3AC3D8A564E2D8BD855BAA1294B92
5,464,355 UART: [art] SIG.R = E835B72343F1B4FEC89F9EC4F052AEAD38DE36BE10B84D2AD1E4CCADCA7B8BF0A535C00C346A4A206AD43B35453F7329
5,471,144 UART: [art] SIG.S = F29323F178594E2A1369A485F4CC2C21DE2DF0B6E4BE6C2D29ECCC56978D2E3D784D46B3C7630CFCC17626BDD535E486
5,494,629 UART: Caliptra RT
5,494,880 UART: [state] CFI Enabled
5,860,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,892,013 UART: [rt]cmd =0x4d454153, len=108
5,912,563 >>> mbox cmd response data (12 bytes)
5,912,564 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,939,982 >>> mbox cmd response: success
7,939,982 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,953,721 UART:
7,953,737 UART: Running Caliptra FMC ...
7,954,145 UART:
7,954,199 UART: [state] CFI Enabled
8,043,474 UART: [art] Extend RT PCRs Done
8,043,902 UART: [art] Lock RT PCRs Done
8,045,251 UART: [art] Populate DV Done
8,053,304 UART: [fht] FMC Alias Private Key: 7
8,054,302 UART: [art] Derive CDI
8,054,582 UART: [art] Store in slot 0x4
8,140,529 UART: [art] Derive Key Pair
8,140,889 UART: [art] Store priv key in slot 0x5
8,153,999 UART: [art] Derive Key Pair - Done
8,168,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,184,432 UART: [art] Erasing AUTHORITY.KEYID = 7
8,185,197 UART: [art] PUB.X = EE16C13A0AFAE36CC8073B32A615A4EBE208D06C0BBFE535F38D6B177006A9811708EA5CBDA3177EE9608492B3F61059
8,191,959 UART: [art] PUB.Y = 8F4D49E859090ACAA057F357499C191322D566DCC5867AC7DF65FE4B142C5162108AEFFC1626B33C0D1D9CC45F8EC7E9
8,198,910 UART: [art] SIG.R = 8B3FD52DDB888C2C82295F181C7D8F878ACBB0C891E46C4746E80D3D8A810C50E469CF569830C7EB8E0BF21FA030FBE6
8,205,685 UART: [art] SIG.S = F56678EA8C1F3EB8566BF1F5386AAC4274CB59FA8B3D49D3E9431A221460EA0D731394322A7B79888CD3E3A0F44E6ADB
8,229,460 UART: mbox::rt_entry...
8,229,832 UART: ____ _ _ _ ____ _____
8,230,616 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,231,416 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,232,184 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,232,952 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,233,720 UART: |_|
8,234,032 UART:
8,595,513 UART: [rt] Runtime listening for mailbox commands...
10,622,436 >>> mbox cmd response: success
10,622,436 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,635,965 UART:
10,635,981 UART: Running Caliptra FMC ...
10,636,389 UART:
10,636,443 UART: [state] CFI Enabled
10,725,588 UART: [art] Extend RT PCRs Done
10,726,016 UART: [art] Lock RT PCRs Done
10,727,257 UART: [art] Populate DV Done
10,735,308 UART: [fht] FMC Alias Private Key: 7
10,736,298 UART: [art] Derive CDI
10,736,578 UART: [art] Store in slot 0x4
10,822,171 UART: [art] Derive Key Pair
10,822,531 UART: [art] Store priv key in slot 0x5
10,836,381 UART: [art] Derive Key Pair - Done
10,851,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,867,146 UART: [art] Erasing AUTHORITY.KEYID = 7
10,867,911 UART: [art] PUB.X = C05EB4D877F7AB832D8B7C99280579D49F41968E284D0B65ADB1E259773E6507FEBC575831E43E7659A39072BD313AA3
10,874,672 UART: [art] PUB.Y = 490E4775A4F85661F0B32E8CCD15687B5B7073B1BB623DF82FB83D925D1EE28C17EA0984AB0A8FB78C0C4C3E4EE7C5FA
10,881,626 UART: [art] SIG.R = 82E244ABEBD5DE717495349C6417D559AD1DE49A4331C64E417D9D526E436DF659C5BD75BFAE1146261A4E711A5BDF37
10,888,404 UART: [art] SIG.S = 40314BFBD59D8029278A549A1376C9F4624D5F462C086BB6A883DA9CD3789ABB2076D37EE4B331F96150D4BA25E7EE25
10,911,695 UART: mbox::rt_entry...
10,912,067 UART: ____ _ _ _ ____ _____
10,912,851 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,913,651 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,914,419 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,915,187 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,915,955 UART: |_|
10,916,267 UART:
11,284,571 UART: [rt] Runtime listening for mailbox commands...
11,285,775 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.87s
Truncated 2418 bytes from beginning
135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,346 UART: [ldev] --
1,283,825 UART: [fwproc] Wait for Commands...
1,284,583 UART: [fwproc] Recv command 0x46574c44
1,285,311 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,469 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,778 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,459 >>> mbox cmd response: success
2,366,459 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,367,647 UART: [afmc] ++
2,367,815 UART: [afmc] CDI.KEYID = 6
2,368,177 UART: [afmc] SUBJECT.KEYID = 7
2,368,602 UART: [afmc] AUTHORITY.KEYID = 5
2,403,635 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,038 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,786 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,378 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,079 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,949 UART: [afmc] --
2,446,899 UART: [cold-reset] --
2,447,713 UART: [state] Locking Datavault
2,448,854 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,458 UART: [state] Locking ICCM
2,450,066 UART: [exit] Launching FMC @ 0x40000130
2,455,396 UART:
2,455,412 UART: Running Caliptra FMC ...
2,455,820 UART:
2,455,963 UART: [state] CFI Enabled
2,466,745 UART: [fht] FMC Alias Private Key: 7
2,585,797 UART: [art] Extend RT PCRs Done
2,586,225 UART: [art] Lock RT PCRs Done
2,587,725 UART: [art] Populate DV Done
2,596,006 UART: [fht] FMC Alias Private Key: 7
2,597,058 UART: [art] Derive CDI
2,597,338 UART: [art] Store in slot 0x4
2,683,045 UART: [art] Derive Key Pair
2,683,405 UART: [art] Store priv key in slot 0x5
2,696,251 UART: [art] Derive Key Pair - Done
2,710,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,528 UART: [art] Erasing AUTHORITY.KEYID = 7
2,727,293 UART: [art] PUB.X = A27D59984A2E1CCC66E6AF7A70DAD19EE97FBC818613BE2B4A83B14D3082A10CE3FB2B63345B40520CE139F14D7B1F80
2,734,071 UART: [art] PUB.Y = 3F37A5B287EA3BB9BAD951BD56B0785FD9BCAFEF6BC0AEA8B6B5246623DC28608E4E70B87C00076359AD2D5CD0EBB68F
2,741,020 UART: [art] SIG.R = 60DE85AFD7DDE662D69D3856A082DA56A6DF2A269E0E64D100E61552EA1FD87CEAE6366A7307F9274F53AFC4EF0F9CEA
2,747,779 UART: [art] SIG.S = A55CAB03DEB673D3D892987FD3CC5A6ABF00EA328C16237021790E0928242C3D6DC94EBB9A2CC86DFD2629C62C6FA25C
2,772,364 UART: mbox::rt_entry...
2,772,736 UART: ____ _ _ _ ____ _____
2,773,520 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,320 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,088 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,856 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,624 UART: |_|
2,776,936 UART:
2,895,504 UART: [rt] Runtime listening for mailbox commands...
2,896,699 >>> mbox cmd response data (48 bytes)
2,896,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,896,811 UART:
2,896,827 UART: Running Caliptra ROM ...
2,897,235 UART:
2,897,377 UART: [state] CFI Enabled
2,899,845 UART: [state] LifecycleState = Unprovisioned
2,900,500 UART: [state] DebugLocked = No
2,901,022 UART: [state] WD Timer not started. Device not locked for debugging
2,902,294 UART: [kat] SHA2-256
3,707,944 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,712,069 UART: [kat] ++
3,712,221 UART: [kat] sha1
3,716,421 UART: [kat] SHA2-256
3,718,361 UART: [kat] SHA2-384
3,721,090 UART: [kat] SHA2-512-ACC
3,722,990 UART: [kat] ECC-384
3,732,739 UART: [kat] HMAC-384Kdf
3,737,365 UART: [kat] LMS
3,985,693 UART: [kat] --
3,986,575 UART: [update-reset] ++
5,346,123 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,347,236 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,502,451 >>> mbox cmd response: success
5,502,451 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,502,590 UART: [update-reset] Copying MAN_2 To MAN_1
5,510,604 UART: [update-reset Success] --
5,511,463 UART: [state] Locking Datavault
5,512,421 UART: [state] Locking PCR0, PCR1 and PCR31
5,513,025 UART: [state] Locking ICCM
5,513,547 UART: [exit] Launching FMC @ 0x40000130
5,518,877 UART:
5,518,893 UART: Running Caliptra FMC ...
5,519,301 UART:
5,519,444 UART: [state] CFI Enabled
5,608,491 UART: [art] Extend RT PCRs Done
5,608,919 UART: [art] Lock RT PCRs Done
5,610,410 UART: [art] Populate DV Done
5,618,577 UART: [fht] FMC Alias Private Key: 7
5,619,709 UART: [art] Derive CDI
5,619,989 UART: [art] Store in slot 0x4
5,705,464 UART: [art] Derive Key Pair
5,705,824 UART: [art] Store priv key in slot 0x5
5,718,618 UART: [art] Derive Key Pair - Done
5,733,436 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,748,885 UART: [art] Erasing AUTHORITY.KEYID = 7
5,749,650 UART: [art] PUB.X = 47C4602EE2910D07C96804FBBAC33F875AE253FBAE9FA681626AF1BFFF6B64EC0971A4D5F46B2E4B2BDA7F34B300B48C
5,756,406 UART: [art] PUB.Y = F377DF82A573DAB655BA434B9C3267B3C746D122BA05B5F3489B9A2CBEF3EB67AD9E1EE5903B1BA247EADE6C766D39BF
5,763,375 UART: [art] SIG.R = 6361F385263C2EE968CE3625BCA95AFB14BEB53E1935C6B0B7B9C01607F7C442C962AB3B829D07377D8EA556A58394B1
5,770,143 UART: [art] SIG.S = 46E9E7EB599F2B833F8F092B0E0B617876825B228BE05CD64A0583269FBCDAE40C21E49EE0BFF16EF2BF7E9C02FA62CC
5,792,973 UART: Caliptra RT
5,793,316 UART: [state] CFI Enabled
6,165,433 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,196,769 UART: [rt]cmd =0x4d454153, len=108
6,217,899 >>> mbox cmd response data (12 bytes)
6,217,900 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,218,711 UART:
6,218,727 UART: Running Caliptra ROM ...
6,219,135 UART:
6,219,277 UART: [state] CFI Enabled
6,222,447 UART: [state] LifecycleState = Unprovisioned
6,223,102 UART: [state] DebugLocked = No
6,223,814 UART: [state] WD Timer not started. Device not locked for debugging
6,225,080 UART: [kat] SHA2-256
7,030,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,034,855 UART: [kat] ++
7,035,007 UART: [kat] sha1
7,039,249 UART: [kat] SHA2-256
7,041,189 UART: [kat] SHA2-384
7,044,108 UART: [kat] SHA2-512-ACC
7,046,008 UART: [kat] ECC-384
7,055,735 UART: [kat] HMAC-384Kdf
7,060,451 UART: [kat] LMS
7,308,779 UART: [kat] --
7,309,479 UART: [update-reset] ++
8,259,224 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,260,213 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,361,854 >>> mbox cmd response: success
8,361,854 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,362,093 UART: [update-reset] Copying MAN_2 To MAN_1
8,370,107 UART: [update-reset Success] --
8,370,990 UART: [state] Locking Datavault
8,371,960 UART: [state] Locking PCR0, PCR1 and PCR31
8,372,564 UART: [state] Locking ICCM
8,373,180 UART: [exit] Launching FMC @ 0x40000130
8,378,510 UART:
8,378,526 UART: Running Caliptra FMC ...
8,378,934 UART:
8,379,077 UART: [state] CFI Enabled
8,468,860 UART: [art] Extend RT PCRs Done
8,469,288 UART: [art] Lock RT PCRs Done
8,470,625 UART: [art] Populate DV Done
8,478,876 UART: [fht] FMC Alias Private Key: 7
8,479,846 UART: [art] Derive CDI
8,480,126 UART: [art] Store in slot 0x4
8,565,631 UART: [art] Derive Key Pair
8,565,991 UART: [art] Store priv key in slot 0x5
8,579,463 UART: [art] Derive Key Pair - Done
8,594,030 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,610,009 UART: [art] Erasing AUTHORITY.KEYID = 7
8,610,774 UART: [art] PUB.X = 8D28AD3069764E1DD56059BAF092DFC0B9DF00188B5FD283CDA9880AB97EE850970A606123110F26CEA4A49C1ED1CA73
8,617,523 UART: [art] PUB.Y = 6C89E17667AE5ABDA9E0E16B7F296632B3B4B548F91A48E35A062D1BDB79A81AD4E4B989814378BD632277703FDD54C2
8,624,476 UART: [art] SIG.R = BA9BBD3EF2DE23F0C4000EC7CF39E20108228C22B230656C7D8963BB1DD03AB1AFE115832D82FD2D213E75F7270B8F99
8,631,224 UART: [art] SIG.S = 7E77342919D85309B6376F0E4151080017E0EC3E4E5D9952AA866A9184F130E18917C087A0A1A0CA57C398042DB150DF
8,654,674 UART: mbox::rt_entry...
8,655,046 UART: ____ _ _ _ ____ _____
8,655,830 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,656,630 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,657,398 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,658,166 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,658,934 UART: |_|
8,659,246 UART:
9,018,446 UART: [rt] Runtime listening for mailbox commands...
9,019,416 UART:
9,019,432 UART: Running Caliptra ROM ...
9,019,840 UART:
9,019,982 UART: [state] CFI Enabled
9,022,684 UART: [state] LifecycleState = Unprovisioned
9,023,339 UART: [state] DebugLocked = No
9,023,903 UART: [state] WD Timer not started. Device not locked for debugging
9,025,155 UART: [kat] SHA2-256
9,830,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,834,930 UART: [kat] ++
9,835,082 UART: [kat] sha1
9,839,314 UART: [kat] SHA2-256
9,841,254 UART: [kat] SHA2-384
9,843,869 UART: [kat] SHA2-512-ACC
9,845,769 UART: [kat] ECC-384
9,855,438 UART: [kat] HMAC-384Kdf
9,859,868 UART: [kat] LMS
10,108,196 UART: [kat] --
10,109,100 UART: [update-reset] ++
11,058,955 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
11,060,092 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
11,161,733 >>> mbox cmd response: success
11,161,733 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
11,162,002 UART: [update-reset] Copying MAN_2 To MAN_1
11,170,016 UART: [update-reset Success] --
11,171,035 UART: [state] Locking Datavault
11,171,749 UART: [state] Locking PCR0, PCR1 and PCR31
11,172,353 UART: [state] Locking ICCM
11,172,793 UART: [exit] Launching FMC @ 0x40000130
11,178,123 UART:
11,178,139 UART: Running Caliptra FMC ...
11,178,547 UART:
11,178,690 UART: [state] CFI Enabled
11,268,113 UART: [art] Extend RT PCRs Done
11,268,541 UART: [art] Lock RT PCRs Done
11,269,626 UART: [art] Populate DV Done
11,277,955 UART: [fht] FMC Alias Private Key: 7
11,279,011 UART: [art] Derive CDI
11,279,291 UART: [art] Store in slot 0x4
11,364,692 UART: [art] Derive Key Pair
11,365,052 UART: [art] Store priv key in slot 0x5
11,378,250 UART: [art] Derive Key Pair - Done
11,393,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,408,551 UART: [art] Erasing AUTHORITY.KEYID = 7
11,409,316 UART: [art] PUB.X = 8AA7877E08B67409230EE988F26B603630A45E1832520708B4CB16C12E3AFE75B56518408F223CA065C8C54324CD265D
11,416,063 UART: [art] PUB.Y = 7930E3C3BCD3680F46618A57CD47CDD0F8F725D5379B6F8583A982F8A0094CD64E5A97ADBAF533C20AFA4BAD15D260E4
11,423,018 UART: [art] SIG.R = E55728F1687EC82E5F431CBF63A7265F7B7F5602151CF417A963A0F8525259293E1EE9E619A3EBE05FEFF7B784598891
11,429,785 UART: [art] SIG.S = E534EC9916BEF91514873948603C434F4AAC9A6A75D7EFAA2BD54783C5EA2811CCC4686DDAC2F9013220BCE7FC64366B
11,454,188 UART: mbox::rt_entry...
11,454,560 UART: ____ _ _ _ ____ _____
11,455,344 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
11,456,144 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
11,456,912 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
11,457,680 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
11,458,448 UART: |_|
11,458,760 UART:
11,825,515 UART: [rt] Runtime listening for mailbox commands...
11,826,719 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 4.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,000 ready_for_fw is high
1,060,000 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,730 >>> mbox cmd response: success
2,217,730 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
2,280,939 UART:
2,280,955 UART: Running Caliptra FMC ...
2,281,363 UART:
2,281,506 UART: [state] CFI Enabled
2,292,454 UART: [fht] FMC Alias Private Key: 7
2,411,248 UART: [art] Extend RT PCRs Done
2,411,676 UART: [art] Lock RT PCRs Done
2,412,872 UART: [art] Populate DV Done
2,421,149 UART: [fht] FMC Alias Private Key: 7
2,422,125 UART: [art] Derive CDI
2,422,405 UART: [art] Store in slot 0x4
2,508,102 UART: [art] Derive Key Pair
2,508,462 UART: [art] Store priv key in slot 0x5
2,521,820 UART: [art] Derive Key Pair - Done
2,536,738 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,165 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,930 UART: [art] PUB.X = 419D5D9B70539A4BEEBF698F7ACBE9415B316E553689C6B7802B6A7F779E57936C7138E5FF17E768FCD79829655FD4F6
2,559,704 UART: [art] PUB.Y = 91DAADB98299F66E53387EC4A5B10E5E4CDD76432C8F531F8ABEF41D1B2A6DA1ADB2FECA003C2445AAFEF9003099341E
2,566,629 UART: [art] SIG.R = FFFAD25FF808E1D524C18BA0F41A2DA43AA6A3CB0867E536D6B67D4B99634AB36E3179C19E37ECDAF321F734DF1AD074
2,573,413 UART: [art] SIG.S = 94ECDF33B9F2B3418E7E9375270473E4172C2EB9C416DABE0CAB33CCCD345FFEC687DA69C1F885831BEC4420D0638FE6
2,597,255 UART: mbox::rt_entry...
2,597,627 UART: ____ _ _ _ ____ _____
2,598,411 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,211 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,979 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,747 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,515 UART: |_|
2,601,827 UART:
2,720,226 UART: [rt] Runtime listening for mailbox commands...
2,721,421 >>> mbox cmd response data (48 bytes)
2,721,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,210,042 >>> mbox cmd response: success
5,210,042 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
5,223,147 UART:
5,223,163 UART: Running Caliptra FMC ...
5,223,571 UART:
5,223,714 UART: [state] CFI Enabled
5,312,871 UART: [art] Extend RT PCRs Done
5,313,299 UART: [art] Lock RT PCRs Done
5,314,730 UART: [art] Populate DV Done
5,322,699 UART: [fht] FMC Alias Private Key: 7
5,323,691 UART: [art] Derive CDI
5,323,971 UART: [art] Store in slot 0x4
5,409,900 UART: [art] Derive Key Pair
5,410,260 UART: [art] Store priv key in slot 0x5
5,422,938 UART: [art] Derive Key Pair - Done
5,437,822 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,063 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,828 UART: [art] PUB.X = 579C137B4D76DD2A7527F5DE852A8A4D894F18742589D58D4452C346D758E76648E05DC95A8DF1670323105C00F2D001
5,460,562 UART: [art] PUB.Y = 649AB7F6D4140C2948005A92CCCFBA45CA779AFE2F3DFDD08D2EBB6A9FA0E02C4C3BB53C057C091198A94DA0EF4A89FF
5,467,507 UART: [art] SIG.R = E82D23FB4319DF61484718F330CD6716F60AE08360F179280FA15DF39F0E08EC06D665CB16A663134400DF9B3BA40612
5,474,235 UART: [art] SIG.S = 0E397203E292D4C963FC52130DF06B533877B3492D1DE976E7615892F77C65653EA0AAA60929A1B4DC69D92460ACAC71
5,497,751 UART: Caliptra RT
5,498,094 UART: [state] CFI Enabled
5,861,548 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,892,670 UART: [rt]cmd =0x4d454153, len=108
5,913,812 >>> mbox cmd response data (12 bytes)
5,913,813 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,941,180 >>> mbox cmd response: success
7,941,180 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,954,565 UART:
7,954,581 UART: Running Caliptra FMC ...
7,954,989 UART:
7,955,132 UART: [state] CFI Enabled
8,044,745 UART: [art] Extend RT PCRs Done
8,045,173 UART: [art] Lock RT PCRs Done
8,046,430 UART: [art] Populate DV Done
8,054,725 UART: [fht] FMC Alias Private Key: 7
8,055,891 UART: [art] Derive CDI
8,056,171 UART: [art] Store in slot 0x4
8,142,132 UART: [art] Derive Key Pair
8,142,492 UART: [art] Store priv key in slot 0x5
8,155,358 UART: [art] Derive Key Pair - Done
8,169,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,185,084 UART: [art] Erasing AUTHORITY.KEYID = 7
8,185,849 UART: [art] PUB.X = 4F8962535353D756D74D1FFB7C8585E7F949B7F5B45CAECD82B30C95B411D7F7B5B632F35835E07A191C3F249C880592
8,192,613 UART: [art] PUB.Y = 5A837EC39461E517A74483D44C0DC06C0922B7B4C06FD84243C53B71AC7219B8E8CC6A7B3A868FAE820D9C2F75E29026
8,199,558 UART: [art] SIG.R = 563C574AEFAAD03176FDDEDC1FBC4B720F42A4656354147CA714E36CDF5F9DB77C448611B9F05ADA6DC99A1B8585CCF6
8,206,345 UART: [art] SIG.S = BBD3F4B82ABFE6CD26E5C6C516F6B87181CAFD712DA09F680067C1D14F3C9986B4C4CBAD2B0AAC180AFB1F49EA421A53
8,229,297 UART: mbox::rt_entry...
8,229,669 UART: ____ _ _ _ ____ _____
8,230,453 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,231,253 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,232,021 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,232,789 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,233,557 UART: |_|
8,233,869 UART:
8,595,819 UART: [rt] Runtime listening for mailbox commands...
10,624,725 >>> mbox cmd response: success
10,624,725 <<< Executing mbox cmd 0x50000000 (0 bytes) from SoC
10,638,140 UART:
10,638,156 UART: Running Caliptra FMC ...
10,638,564 UART:
10,638,707 UART: [state] CFI Enabled
10,728,174 UART: [art] Extend RT PCRs Done
10,728,602 UART: [art] Lock RT PCRs Done
10,729,589 UART: [art] Populate DV Done
10,737,726 UART: [fht] FMC Alias Private Key: 7
10,738,812 UART: [art] Derive CDI
10,739,092 UART: [art] Store in slot 0x4
10,824,263 UART: [art] Derive Key Pair
10,824,623 UART: [art] Store priv key in slot 0x5
10,837,451 UART: [art] Derive Key Pair - Done
10,852,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
10,867,409 UART: [art] Erasing AUTHORITY.KEYID = 7
10,868,174 UART: [art] PUB.X = 0FAF8B1E2ED6152E3E726311C0DB6F4957349E408ED7C40F5376C559FD3AF42517F73866C2BAFF72326A22DB2B572C03
10,874,941 UART: [art] PUB.Y = 34141669EB26C95FEFDC9091C211CAE7A4E6A6AD453DD6C8E3E8FE8CA969EA7E53CFE141C35FFEF6A070652D4BB0C7A2
10,881,915 UART: [art] SIG.R = 392A773A9B61EF0494CB134E96A6E2DB4BBB9238666D445762E708A5A8A686E38232943E05D782C34133265CBCC1EB9F
10,888,676 UART: [art] SIG.S = 3AE68C25B7A701354B46F861C89E96B10F546A078B19B2368E8BF28923F983BCF55DEFC49A2975B207904D54A419A2CF
10,911,964 UART: mbox::rt_entry...
10,912,336 UART: ____ _ _ _ ____ _____
10,913,120 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,913,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,914,688 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,915,456 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,916,224 UART: |_|
10,916,536 UART:
11,278,729 UART: [rt] Runtime listening for mailbox commands...
11,279,933 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_pcr31_extended_upon_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
192,155 UART:
192,520 UART: Running Caliptra ROM ...
193,714 UART:
193,874 UART: [state] CFI Enabled
264,968 UART: [state] LifecycleState = Unprovisioned
266,966 UART: [state] DebugLocked = No
268,365 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,238 UART: [kat] SHA2-256
442,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,480 UART: [kat] ++
453,964 UART: [kat] sha1
464,557 UART: [kat] SHA2-256
467,288 UART: [kat] SHA2-384
474,056 UART: [kat] SHA2-512-ACC
476,442 UART: [kat] ECC-384
2,766,597 UART: [kat] HMAC-384Kdf
2,800,146 UART: [kat] LMS
3,990,474 UART: [kat] --
3,995,281 UART: [cold-reset] ++
3,996,574 UART: [fht] Storing FHT @ 0x50003400
4,007,635 UART: [idev] ++
4,008,218 UART: [idev] CDI.KEYID = 6
4,009,113 UART: [idev] SUBJECT.KEYID = 7
4,010,358 UART: [idev] UDS.KEYID = 0
4,011,365 ready_for_fw is high
4,011,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,160,753 UART: [idev] Erasing UDS.KEYID = 0
7,343,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,931 UART: [idev] --
7,368,437 UART: [ldev] ++
7,369,015 UART: [ldev] CDI.KEYID = 6
7,369,958 UART: [ldev] SUBJECT.KEYID = 5
7,371,170 UART: [ldev] AUTHORITY.KEYID = 7
7,372,456 UART: [ldev] FE.KEYID = 1
7,421,318 UART: [ldev] Erasing FE.KEYID = 1
10,755,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,202 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,193 UART: [ldev] --
13,137,183 UART: [fwproc] Waiting for Commands...
13,140,199 UART: [fwproc] Received command 0x46574c44
13,142,380 UART: [fwproc] Received Image of size 118548 bytes
17,236,860 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,896 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,382,107 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,711,357 >>> mbox cmd response: success
17,715,436 UART: [afmc] ++
17,716,065 UART: [afmc] CDI.KEYID = 6
17,716,964 UART: [afmc] SUBJECT.KEYID = 7
17,718,181 UART: [afmc] AUTHORITY.KEYID = 5
21,088,112 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,390,663 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,392,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,407,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,102 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,436,505 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,111 UART: [afmc] --
23,462,623 UART: [cold-reset] --
23,466,321 UART: [state] Locking Datavault
23,472,000 UART: [state] Locking PCR0, PCR1 and PCR31
23,473,757 UART: [state] Locking ICCM
23,476,508 UART: [exit] Launching FMC @ 0x40000130
23,484,889 UART:
23,485,133 UART: Running Caliptra FMC ...
23,486,235 UART:
23,486,391 UART: [state] CFI Enabled
23,549,186 UART: [fht] FMC Alias Private Key: 7
25,890,005 UART: [art] Extend RT PCRs Done
25,891,233 UART: [art] Lock RT PCRs Done
25,893,096 UART: [art] Populate DV Done
25,898,399 UART: [fht] FMC Alias Private Key: 7
25,899,876 UART: [art] Derive CDI
25,900,610 UART: [art] Store in slot 0x4
25,956,779 UART: [art] Derive Key Pair
25,957,820 UART: [art] Store priv key in slot 0x5
29,250,828 UART: [art] Derive Key Pair - Done
29,263,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,552,553 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,069 UART: [art] PUB.X = 5BA84BAD3AC968BC29914A3A3295616FD09E528F6897FEB4A269BBAF497F23FB80506A233800926009D2E8CBB32581CF
31,561,334 UART: [art] PUB.Y = 709BEE7EFCABCD65C83113635D07FD160672EDF651BDCA246FD7B450943338A794D7AFCFB572D2FE64373B0AA96D6710
31,568,571 UART: [art] SIG.R = 81DE75EC5FB43FCE10EB1E48AF873D6898755B16F3ABDC08A2BB64F30F7F5D7617D4690489B979857C4D746DFAF35820
31,576,025 UART: [art] SIG.S = D545AFCE795AB49793FCA6005356A056B2312485442D2B201DA412864C71379C3FB5DD4027D1882B4ABC1199D472E087
32,880,748 UART: Caliptra RT
32,881,462 UART: [state] CFI Enabled
33,056,756 UART: [rt] RT listening for mailbox commands...
33,059,071 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,089,768 UART: [rt]cmd =0x4d454153, len=108
33,108,049 >>> mbox cmd response data (12 bytes)
35,182,209 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,287,937 UART:
35,288,294 UART: Running Caliptra ROM ...
35,289,353 UART:
35,289,509 UART: [state] CFI Enabled
35,347,339 UART: [state] LifecycleState = Unprovisioned
35,349,277 UART: [state] DebugLocked = No
35,350,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,356,476 UART: [kat] SHA2-256
35,526,222 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,536,695 UART: [kat] ++
35,537,149 UART: [kat] sha1
35,547,490 UART: [kat] SHA2-256
35,550,182 UART: [kat] SHA2-384
35,556,328 UART: [kat] SHA2-512-ACC
35,558,720 UART: [kat] ECC-384
37,849,213 UART: [kat] HMAC-384Kdf
37,881,154 UART: [kat] LMS
39,071,477 UART: [kat] --
39,076,048 UART: [update-reset] ++
42,833,376 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,837,231 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,109,931 >>> mbox cmd response: success
43,110,303 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,111,238 UART: [update-reset] Copying MAN_2 To MAN_1
43,133,676 UART: [update-reset Success] --
43,138,936 UART: [state] Locking Datavault
43,142,783 UART: [state] Locking PCR0, PCR1 and PCR31
43,144,538 UART: [state] Locking ICCM
43,145,714 UART: [exit] Launching FMC @ 0x40000130
43,154,166 UART:
43,154,403 UART: Running Caliptra FMC ...
43,155,662 UART:
43,155,823 UART: [state] CFI Enabled
43,246,208 UART: [art] Extend RT PCRs Done
43,247,394 UART: [art] Lock RT PCRs Done
43,248,685 UART: [art] Populate DV Done
43,254,044 UART: [fht] FMC Alias Private Key: 7
43,255,645 UART: [art] Derive CDI
43,256,547 UART: [art] Store in slot 0x4
43,315,400 UART: [art] Derive Key Pair
43,316,463 UART: [art] Store priv key in slot 0x5
46,608,782 UART: [art] Derive Key Pair - Done
46,621,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,909,429 UART: [art] Erasing AUTHORITY.KEYID = 7
48,910,947 UART: [art] PUB.X = 0977CC4DA4257DA4CB9C73B4C7055149E6A918310AD7EFBD1973BF4F743F53587574FC60D32B8ADD12B0D104A40186E2
48,918,259 UART: [art] PUB.Y = 324F64B6ACA3C9E05D75CFC3250A9F285DBB2574C7991FD69BB32E3B8E84396FE60BE8EA4C0948B5ECE377F02BF5E6E5
48,925,451 UART: [art] SIG.R = 46BA189597796E733DA02F6ACC4B33066DF05990BDCEC27AE0D000770EE824A7BB7A4E183ADD1E58699E437EE5B7D3DE
48,932,840 UART: [art] SIG.S = A510E43B2CCFB9D71C17AA8009ED165733404900EBBEDF80F582A1069203F200F4DE904CB573ACC4CFE3C0555E648DE6
50,237,954 UART: mbox::rt_entry...
50,238,927 UART: ____ _ _ _ ____ _____
50,240,917 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,242,920 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,244,847 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,246,774 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,248,716 UART: |_|
50,249,525 UART:
50,619,344 UART: [rt] Runtime listening for mailbox commands...
50,621,515 >>> mbox cmd response data (48 bytes)
50,622,078 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,624,399 >>> mbox cmd response data (48 bytes)
50,625,283 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,642,148 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,781,629 ready_for_fw is high
3,782,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,935,674 >>> mbox cmd response: success
23,632,506 UART:
23,632,950 UART: Running Caliptra FMC ...
23,634,105 UART:
23,634,262 UART: [state] CFI Enabled
23,698,567 UART: [fht] FMC Alias Private Key: 7
26,038,749 UART: [art] Extend RT PCRs Done
26,039,975 UART: [art] Lock RT PCRs Done
26,041,847 UART: [art] Populate DV Done
26,047,056 UART: [fht] FMC Alias Private Key: 7
26,048,826 UART: [art] Derive CDI
26,049,600 UART: [art] Store in slot 0x4
26,107,420 UART: [art] Derive Key Pair
26,108,426 UART: [art] Store priv key in slot 0x5
29,401,898 UART: [art] Derive Key Pair - Done
29,414,681 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,704,572 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,080 UART: [art] PUB.X = 41576D8956FA3B95C1441955C7F92C3DA398D9ECAD05449C8D0AD22EE263D3839D7C01DAC7FF7C96597B01B2CDE64DB7
31,713,343 UART: [art] PUB.Y = F7B18DBC571E16B6F9EE48AC0CB50243B0F2B9301D1A112ACDEE3A7A59ED3AC564044F6AFADC5D9A19FAC8F2EB419AAC
31,720,658 UART: [art] SIG.R = B8EC409D0AFD09F24B80D3C0290428794DCD17EE2821B7BEDFF8099DFA036AB49DC230F42F45946600248B61A6B23CE5
31,728,060 UART: [art] SIG.S = 388ADB6F5BAFDD60BB505731554A1BB87BDB024DA67DBFEF78876269AFEBACAE5309CFD3ACCFE1ABB34A480E8F47710C
33,033,353 UART: Caliptra RT
33,034,077 UART: [state] CFI Enabled
33,210,644 UART: [rt] RT listening for mailbox commands...
33,212,943 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,243,730 UART: [rt]cmd =0x4d454153, len=108
33,262,749 >>> mbox cmd response data (12 bytes)
35,335,633 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,375,143 >>> mbox cmd response: success
43,375,669 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,410,975 UART:
43,411,314 UART: Running Caliptra FMC ...
43,412,442 UART:
43,412,606 UART: [state] CFI Enabled
43,511,019 UART: [art] Extend RT PCRs Done
43,512,210 UART: [art] Lock RT PCRs Done
43,513,675 UART: [art] Populate DV Done
43,519,038 UART: [fht] FMC Alias Private Key: 7
43,520,635 UART: [art] Derive CDI
43,521,447 UART: [art] Store in slot 0x4
43,580,037 UART: [art] Derive Key Pair
43,581,085 UART: [art] Store priv key in slot 0x5
46,873,775 UART: [art] Derive Key Pair - Done
46,886,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,175,697 UART: [art] Erasing AUTHORITY.KEYID = 7
49,177,208 UART: [art] PUB.X = 9163881D277CEFE5FD249AEACDA500DE72C8BF0D212651491CCF2F3F8B7AE2BA6E981FE8ADE0DAD3EAEB7E7FB38718BF
49,184,459 UART: [art] PUB.Y = 2017D5D12901B0A25A3A30B7A17F4FBAE339D1FE75B785B7C293BD3E8F39C59F622BF11E2A7720E49FC3C2B1B5614787
49,191,769 UART: [art] SIG.R = 6F5000F0D55E74DC7FD07DB841B28C62B102D2A96F41FE436DF31A9C4F631B0D13EBB6C371DB9B80C6CC99E9FF54F33F
49,199,161 UART: [art] SIG.S = AAED9F96BA25455457BAFC7A0B7876BE17FD5A654D0C6388ACF2D7370425A7AB46D13607EDAB5047D18B14DC0F0F6098
50,503,954 UART: mbox::rt_entry...
50,504,920 UART: ____ _ _ _ ____ _____
50,506,862 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,508,869 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,510,723 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,512,653 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,514,507 UART: |_|
50,515,331 UART:
50,882,285 UART: [rt] Runtime listening for mailbox commands...
50,884,437 >>> mbox cmd response data (48 bytes)
50,885,009 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,887,394 >>> mbox cmd response data (48 bytes)
50,888,268 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,905,177 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,444 UART:
192,801 UART: Running Caliptra ROM ...
193,934 UART:
603,776 UART: [state] CFI Enabled
619,881 UART: [state] LifecycleState = Unprovisioned
621,753 UART: [state] DebugLocked = No
623,280 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,861 UART: [kat] SHA2-256
797,592 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,108 UART: [kat] ++
808,552 UART: [kat] sha1
819,775 UART: [kat] SHA2-256
822,493 UART: [kat] SHA2-384
829,703 UART: [kat] SHA2-512-ACC
832,069 UART: [kat] ECC-384
3,114,458 UART: [kat] HMAC-384Kdf
3,126,255 UART: [kat] LMS
4,316,415 UART: [kat] --
4,320,619 UART: [cold-reset] ++
4,322,976 UART: [fht] Storing FHT @ 0x50003400
4,333,383 UART: [idev] ++
4,333,938 UART: [idev] CDI.KEYID = 6
4,335,074 UART: [idev] SUBJECT.KEYID = 7
4,336,173 UART: [idev] UDS.KEYID = 0
4,337,228 ready_for_fw is high
4,337,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,771 UART: [idev] Erasing UDS.KEYID = 0
7,627,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,843 UART: [idev] --
7,653,533 UART: [ldev] ++
7,654,120 UART: [ldev] CDI.KEYID = 6
7,655,088 UART: [ldev] SUBJECT.KEYID = 5
7,656,298 UART: [ldev] AUTHORITY.KEYID = 7
7,657,579 UART: [ldev] FE.KEYID = 1
7,669,139 UART: [ldev] Erasing FE.KEYID = 1
10,958,042 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,633 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,422 UART: [ldev] --
13,319,270 UART: [fwproc] Waiting for Commands...
13,322,018 UART: [fwproc] Received command 0x46574c44
13,324,204 UART: [fwproc] Received Image of size 118548 bytes
17,427,446 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,503,731 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,576,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,905,130 >>> mbox cmd response: success
17,909,552 UART: [afmc] ++
17,910,184 UART: [afmc] CDI.KEYID = 6
17,911,102 UART: [afmc] SUBJECT.KEYID = 7
17,912,319 UART: [afmc] AUTHORITY.KEYID = 5
21,230,974 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,743 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,528,005 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,557,188 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,594 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,991 UART: [afmc] --
23,597,125 UART: [cold-reset] --
23,600,439 UART: [state] Locking Datavault
23,604,996 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,744 UART: [state] Locking ICCM
23,609,106 UART: [exit] Launching FMC @ 0x40000130
23,617,498 UART:
23,617,726 UART: Running Caliptra FMC ...
23,618,818 UART:
23,618,970 UART: [state] CFI Enabled
23,626,686 UART: [fht] FMC Alias Private Key: 7
25,966,330 UART: [art] Extend RT PCRs Done
25,967,548 UART: [art] Lock RT PCRs Done
25,969,255 UART: [art] Populate DV Done
25,974,715 UART: [fht] FMC Alias Private Key: 7
25,976,186 UART: [art] Derive CDI
25,976,912 UART: [art] Store in slot 0x4
26,019,441 UART: [art] Derive Key Pair
26,020,436 UART: [art] Store priv key in slot 0x5
29,262,388 UART: [art] Derive Key Pair - Done
29,275,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,859 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,368 UART: [art] PUB.X = 991F2E848B69715144DDE6C0933D064E2DB13B31ACE118046813CEEEF3435061DB481D191F50473059457636558EDC3F
31,564,615 UART: [art] PUB.Y = 2ED0609334600BDC1AE6913E77E973706FA15C9F7D4AE6C9D6D67BF7CB0DC1971A2F730738C82334D67EDF22C64B7E11
31,571,895 UART: [art] SIG.R = 08DE59CB8CE2DCC22C97684FAC5E9E80BAA5B15DA260CFFFA461A413FCE1B03DA24CA064AE7AF1FB9858DB86B5D6AC5D
31,579,329 UART: [art] SIG.S = 18B335C829C82BCAEED87088A43F2DAE0EBB57847CADE728430E66F27A6C148064455ABA1DB365581A0D2F5484353456
32,884,138 UART: Caliptra RT
32,884,835 UART: [state] CFI Enabled
33,017,997 UART: [rt] RT listening for mailbox commands...
33,020,257 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,051,031 UART: [rt]cmd =0x4d454153, len=108
33,069,389 >>> mbox cmd response data (12 bytes)
35,147,746 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,254,178 UART:
35,254,540 UART: Running Caliptra ROM ...
35,255,590 UART:
35,255,795 UART: [state] CFI Enabled
35,268,071 UART: [state] LifecycleState = Unprovisioned
35,269,958 UART: [state] DebugLocked = No
35,271,960 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,277,610 UART: [kat] SHA2-256
35,447,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,457,804 UART: [kat] ++
35,458,347 UART: [kat] sha1
35,468,853 UART: [kat] SHA2-256
35,471,596 UART: [kat] SHA2-384
35,476,128 UART: [kat] SHA2-512-ACC
35,478,538 UART: [kat] ECC-384
37,762,796 UART: [kat] HMAC-384Kdf
37,774,975 UART: [kat] LMS
38,965,045 UART: [kat] --
38,968,985 UART: [update-reset] ++
42,726,586 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,730,326 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,003,077 >>> mbox cmd response: success
43,003,444 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,003,884 UART: [update-reset] Copying MAN_2 To MAN_1
43,026,327 UART: [update-reset Success] --
43,031,588 UART: [state] Locking Datavault
43,034,843 UART: [state] Locking PCR0, PCR1 and PCR31
43,036,539 UART: [state] Locking ICCM
43,038,826 UART: [exit] Launching FMC @ 0x40000130
43,047,271 UART:
43,047,521 UART: Running Caliptra FMC ...
43,048,618 UART:
43,048,776 UART: [state] CFI Enabled
43,092,552 UART: [art] Extend RT PCRs Done
43,093,729 UART: [art] Lock RT PCRs Done
43,095,451 UART: [art] Populate DV Done
43,100,799 UART: [fht] FMC Alias Private Key: 7
43,102,429 UART: [art] Derive CDI
43,103,441 UART: [art] Store in slot 0x4
43,145,907 UART: [art] Derive Key Pair
43,146,920 UART: [art] Store priv key in slot 0x5
46,389,451 UART: [art] Derive Key Pair - Done
46,402,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,682,649 UART: [art] Erasing AUTHORITY.KEYID = 7
48,684,148 UART: [art] PUB.X = 6F0EBC14C40E4BB17D0EFE156E64429329193F0DCFDD72EE8B5A4C0614DF4671A3EE381080ABE53DB3A25628FD2C9533
48,691,442 UART: [art] PUB.Y = 4DF64781F9E7D53C58DF950553DE8AB488C86E435A0A2EF654DCB0BEAC37FDE349AF7F4790ADEA1BDCA39F68F1899C54
48,698,691 UART: [art] SIG.R = 478F0AD4042CBAA1B9014EB641313A5A7DCBBFB2615D683C65BD30BA6A9FE105CBD06BC9BCB0E61EDB61F06D10D70B44
48,706,134 UART: [art] SIG.S = 20E3FDDF59B26C7589998487C5F48125A5C720890DCE3E11AA01AC966A1B0DBD470D117D00E3971843D826125F401324
50,010,403 UART: mbox::rt_entry...
50,011,357 UART: ____ _ _ _ ____ _____
50,013,286 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,015,298 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,017,227 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,019,151 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,021,072 UART: |_|
50,021,903 UART:
50,388,469 UART: [rt] Runtime listening for mailbox commands...
50,390,662 >>> mbox cmd response data (48 bytes)
50,391,229 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,393,539 >>> mbox cmd response data (48 bytes)
50,394,420 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,411,328 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
4,126,287 ready_for_fw is high
4,126,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,152,089 >>> mbox cmd response: success
23,788,923 UART:
23,789,330 UART: Running Caliptra FMC ...
23,790,463 UART:
23,790,616 UART: [state] CFI Enabled
23,798,250 UART: [fht] FMC Alias Private Key: 7
26,137,876 UART: [art] Extend RT PCRs Done
26,139,104 UART: [art] Lock RT PCRs Done
26,140,681 UART: [art] Populate DV Done
26,145,936 UART: [fht] FMC Alias Private Key: 7
26,147,416 UART: [art] Derive CDI
26,148,172 UART: [art] Store in slot 0x4
26,191,582 UART: [art] Derive Key Pair
26,192,643 UART: [art] Store priv key in slot 0x5
29,434,201 UART: [art] Derive Key Pair - Done
29,447,261 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,290 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,802 UART: [art] PUB.X = 5D414536FEF800462C49C6FB7F45CF9A297D102E4661949305FF928C501E7778224E181EE40AB4516CA723D691DCCE39
31,735,999 UART: [art] PUB.Y = 1B84A32084D4EEDD3B210AD1455C3C975DFD4AC3458BEA9040E1DCD84C10E5216A534D3C8804E92B14A140AD0CDE61C6
31,743,307 UART: [art] SIG.R = 42BF340CC46A28F106DA3A8A128C553C9B10F976DD387C3E377469EE76EB6358B501F189A6B01EAAFD0FFD8DD615B615
31,750,700 UART: [art] SIG.S = 42C8AC6AA1DBDB1DF4FA270B15C4CFFBD0D903635EEF6E6B15C567C32C29FBF8FDD269B948073224D69E84CCA58098BF
33,056,102 UART: Caliptra RT
33,056,823 UART: [state] CFI Enabled
33,189,275 UART: [rt] RT listening for mailbox commands...
33,191,532 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,222,598 UART: [rt]cmd =0x4d454153, len=108
33,240,605 >>> mbox cmd response data (12 bytes)
35,315,387 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,295,226 >>> mbox cmd response: success
43,295,842 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,327,800 UART:
43,328,124 UART: Running Caliptra FMC ...
43,329,245 UART:
43,329,402 UART: [state] CFI Enabled
43,373,688 UART: [art] Extend RT PCRs Done
43,374,832 UART: [art] Lock RT PCRs Done
43,376,041 UART: [art] Populate DV Done
43,381,507 UART: [fht] FMC Alias Private Key: 7
43,383,098 UART: [art] Derive CDI
43,383,874 UART: [art] Store in slot 0x4
43,426,357 UART: [art] Derive Key Pair
43,427,372 UART: [art] Store priv key in slot 0x5
46,669,412 UART: [art] Derive Key Pair - Done
46,682,422 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,962,884 UART: [art] Erasing AUTHORITY.KEYID = 7
48,964,393 UART: [art] PUB.X = 777727E2932B2FD3568EB2954E7FA8E504EA24E5567DA700C7FD60F1ED1ADBD65E4276E8B45ADE2C352F95BE84BF4511
48,971,687 UART: [art] PUB.Y = DF350D09F7B417890D409D60359130E7456B46F37F6F2F48F81FDFDFA8105B289EF4B54498BE066F2B90994E096832FD
48,978,918 UART: [art] SIG.R = 728A06177127DF523C23EEE7AEE10E74EB0F594CAE871C3E8518206C0A5115B307072BCE89F45F8C153DDA46E6BD2C51
48,986,342 UART: [art] SIG.S = 6877414287B9319BE119C146B990C27E87CD4D31EFAB8CD427BEF8985D2080BEDE392B1A5F9BAEED639DB52C591D4329
50,291,121 UART: mbox::rt_entry...
50,292,085 UART: ____ _ _ _ ____ _____
50,294,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,296,024 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,297,952 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,299,884 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,301,811 UART: |_|
50,302,798 UART:
50,668,807 UART: [rt] Runtime listening for mailbox commands...
50,671,012 >>> mbox cmd response data (48 bytes)
50,671,590 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
50,673,987 >>> mbox cmd response data (48 bytes)
50,674,848 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
50,691,732 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,080 UART:
192,463 UART: Running Caliptra ROM ...
193,646 UART:
193,801 UART: [state] CFI Enabled
256,062 UART: [state] LifecycleState = Unprovisioned
258,161 UART: [state] DebugLocked = No
260,127 UART: [state] WD Timer not started. Device not locked for debugging
264,095 UART: [kat] SHA2-256
443,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,521 UART: [kat] ++
455,122 UART: [kat] sha1
466,921 UART: [kat] SHA2-256
469,633 UART: [kat] SHA2-384
476,533 UART: [kat] SHA2-512-ACC
478,903 UART: [kat] ECC-384
2,934,351 UART: [kat] HMAC-384Kdf
2,959,160 UART: [kat] LMS
3,435,614 UART: [kat] --
3,439,749 UART: [cold-reset] ++
3,441,957 UART: [fht] FHT @ 0x50003400
3,454,556 UART: [idev] ++
3,455,119 UART: [idev] CDI.KEYID = 6
3,456,066 UART: [idev] SUBJECT.KEYID = 7
3,457,513 UART: [idev] UDS.KEYID = 0
3,458,418 ready_for_fw is high
3,458,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,607,534 UART: [idev] Erasing UDS.KEYID = 0
5,975,963 UART: [idev] Sha1 KeyId Algorithm
6,000,053 UART: [idev] --
6,004,809 UART: [ldev] ++
6,005,380 UART: [ldev] CDI.KEYID = 6
6,006,264 UART: [ldev] SUBJECT.KEYID = 5
6,007,473 UART: [ldev] AUTHORITY.KEYID = 7
6,008,761 UART: [ldev] FE.KEYID = 1
6,044,448 UART: [ldev] Erasing FE.KEYID = 1
8,553,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,288,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,304,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,319,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,335,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,356,751 UART: [ldev] --
10,362,478 UART: [fwproc] Wait for Commands...
10,364,737 UART: [fwproc] Recv command 0x46574c44
10,366,769 UART: [fwproc] Recv'd Img size: 118548 bytes
13,854,501 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,542 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,546 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,336,581 >>> mbox cmd response: success
14,340,387 UART: [afmc] ++
14,341,021 UART: [afmc] CDI.KEYID = 6
14,341,914 UART: [afmc] SUBJECT.KEYID = 7
14,343,136 UART: [afmc] AUTHORITY.KEYID = 5
16,884,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,627,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,629,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,645,417 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,661,477 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,677,044 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,699,996 UART: [afmc] --
18,703,388 UART: [cold-reset] --
18,706,652 UART: [state] Locking Datavault
18,711,517 UART: [state] Locking PCR0, PCR1 and PCR31
18,713,266 UART: [state] Locking ICCM
18,715,316 UART: [exit] Launching FMC @ 0x40000130
18,723,761 UART:
18,724,004 UART: Running Caliptra FMC ...
18,725,110 UART:
18,725,272 UART: [state] CFI Enabled
18,785,535 UART: [fht] FMC Alias Private Key: 7
20,573,409 UART: [art] Extend RT PCRs Done
20,574,616 UART: [art] Lock RT PCRs Done
20,576,452 UART: [art] Populate DV Done
20,582,067 UART: [fht] FMC Alias Private Key: 7
20,583,512 UART: [art] Derive CDI
20,584,431 UART: [art] Store in slot 0x4
20,639,199 UART: [art] Derive Key Pair
20,640,198 UART: [art] Store priv key in slot 0x5
23,103,339 UART: [art] Derive Key Pair - Done
23,116,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,829,028 UART: [art] Erasing AUTHORITY.KEYID = 7
24,830,533 UART: [art] PUB.X = 861EF93E9B81BAE9E261424EC9FED9AAEBF560A8303FC34F08AA3AB8EDBB0A9A925D3F74CE2318FCE5BD53ECDF3DE66C
24,837,826 UART: [art] PUB.Y = 860F4BB16DF749CC6E9E5C70BA24DFBAA5686D0DCD01ACCAEADF06EB976FA8AB3F8F112B065FD69B1A1E4FB3F3B0D6C1
24,845,118 UART: [art] SIG.R = 9A4327CAB86FFA1B85F07703AFE13C58A9D5FC8B23A03527920518F788DA2AD42003F7B550D93B17277197F39D3D0764
24,852,502 UART: [art] SIG.S = B74F7403085E0BD176EAA6F8620FA08C225F8C96B9AB17C34482163740EFF5DBC0B3039B145479B187C6D0ABDA066D6E
25,831,786 UART: Caliptra RT
25,832,475 UART: [state] CFI Enabled
26,013,034 UART: [rt] RT listening for mailbox commands...
26,015,318 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,046,004 UART: [rt]cmd =0x4d454153, len=108
26,064,290 >>> mbox cmd response data (12 bytes)
28,123,823 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,229,614 UART:
28,229,985 UART: Running Caliptra ROM ...
28,231,079 UART:
28,231,251 UART: [state] CFI Enabled
28,304,186 UART: [state] LifecycleState = Unprovisioned
28,306,124 UART: [state] DebugLocked = No
28,309,023 UART: [state] WD Timer not started. Device not locked for debugging
28,312,063 UART: [kat] SHA2-256
28,491,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,502,482 UART: [kat] ++
28,502,943 UART: [kat] sha1
28,514,044 UART: [kat] SHA2-256
28,516,739 UART: [kat] SHA2-384
28,522,943 UART: [kat] SHA2-512-ACC
28,525,286 UART: [kat] ECC-384
30,986,484 UART: [kat] HMAC-384Kdf
31,011,380 UART: [kat] LMS
31,487,809 UART: [kat] --
31,493,921 UART: [update-reset] ++
34,549,281 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,552,201 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,824,821 >>> mbox cmd response: success
34,825,201 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,826,200 UART: [update-reset] Copying MAN_2 To MAN_1
34,863,331 UART: [update-reset Success] --
34,869,043 UART: [state] Locking Datavault
34,871,925 UART: [state] Locking PCR0, PCR1 and PCR31
34,873,676 UART: [state] Locking ICCM
34,876,214 UART: [exit] Launching FMC @ 0x40000130
34,884,609 UART:
34,884,842 UART: Running Caliptra FMC ...
34,885,940 UART:
34,886,097 UART: [state] CFI Enabled
34,989,419 UART: [art] Extend RT PCRs Done
34,990,613 UART: [art] Lock RT PCRs Done
34,992,124 UART: [art] Populate DV Done
34,997,906 UART: [fht] FMC Alias Private Key: 7
34,999,447 UART: [art] Derive CDI
35,000,262 UART: [art] Store in slot 0x4
35,059,006 UART: [art] Derive Key Pair
35,060,055 UART: [art] Store priv key in slot 0x5
37,522,521 UART: [art] Derive Key Pair - Done
37,535,325 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,261,406 UART: [art] Erasing AUTHORITY.KEYID = 7
39,262,919 UART: [art] PUB.X = D5947C88076D5ACE2A753F645A9062A2BED65160DF74C6EEBD387E70307805982B67F031AA6EF34DF9647AFF2DD129E9
39,270,173 UART: [art] PUB.Y = 30A5943D9C35418F032048075BC5867D4DBD829EC12C912E02182EF0114045C3BE9E8295BB96D2D8865AF21EE4ED3FCF
39,277,416 UART: [art] SIG.R = 16DF64968305DE33D7122938722BBAB378D8F69962F820B36BAE1C93BC406E5C6AE1E074477889030339594674B8322A
39,284,810 UART: [art] SIG.S = 795FFF6D53704FF132C4B53E9B5C98D661E49EB92F466AB2BFADCA649A11FAE140EB652AC2F658142C4318C7F21E2181
40,263,610 UART: mbox::rt_entry...
40,264,581 UART: ____ _ _ _ ____ _____
40,266,566 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,268,568 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,270,496 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,272,426 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,274,350 UART: |_|
40,275,159 UART:
40,642,802 UART: [rt] Runtime listening for mailbox commands...
40,644,989 >>> mbox cmd response data (48 bytes)
40,645,571 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,647,897 >>> mbox cmd response data (48 bytes)
40,648,783 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,665,666 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,463,135 ready_for_fw is high
3,463,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,218,860 >>> mbox cmd response: success
18,512,483 UART:
18,512,884 UART: Running Caliptra FMC ...
18,514,023 UART:
18,514,190 UART: [state] CFI Enabled
18,581,694 UART: [fht] FMC Alias Private Key: 7
20,348,107 UART: [art] Extend RT PCRs Done
20,349,317 UART: [art] Lock RT PCRs Done
20,351,076 UART: [art] Populate DV Done
20,356,440 UART: [fht] FMC Alias Private Key: 7
20,358,091 UART: [art] Derive CDI
20,358,908 UART: [art] Store in slot 0x4
20,414,455 UART: [art] Derive Key Pair
20,415,492 UART: [art] Store priv key in slot 0x5
22,878,366 UART: [art] Derive Key Pair - Done
22,891,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,045 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,558 UART: [art] PUB.X = D5ED7467A01C418D092A5E59DD0F0CF50634040833B064526A2AD1A81F602B3A3F2EA6EA0CA4991E1748F2F23F4A7FF6
24,612,813 UART: [art] PUB.Y = 372010CB04EE9BAB228D3F2FF12FD3EA7036A30CAC3DCAC56C195A9878F2A65010F1A96017C324CCBC4C398E2DF70781
24,620,117 UART: [art] SIG.R = BF27456B9AB200A811D3901BBEF2F6027FB9E72587A1EAAD1BB0146CDFFBD8DC86C01BB6D6B13A17D10B6CAD899906CA
24,627,521 UART: [art] SIG.S = C589FFD992C42C36375CFE238247EA1F6147D8C625B3006BC6EB6350B79B77C29E5892933E035D30F6046C76FC2BE10F
25,606,549 UART: Caliptra RT
25,607,270 UART: [state] CFI Enabled
25,787,314 UART: [rt] RT listening for mailbox commands...
25,789,564 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,820,070 UART: [rt]cmd =0x4d454153, len=108
25,838,593 >>> mbox cmd response data (12 bytes)
27,895,074 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,581,498 >>> mbox cmd response: success
34,581,988 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,616,037 UART:
34,616,314 UART: Running Caliptra FMC ...
34,617,424 UART:
34,617,583 UART: [state] CFI Enabled
34,722,920 UART: [art] Extend RT PCRs Done
34,724,106 UART: [art] Lock RT PCRs Done
34,725,710 UART: [art] Populate DV Done
34,731,406 UART: [fht] FMC Alias Private Key: 7
34,732,887 UART: [art] Derive CDI
34,733,821 UART: [art] Store in slot 0x4
34,791,559 UART: [art] Derive Key Pair
34,792,563 UART: [art] Store priv key in slot 0x5
37,255,315 UART: [art] Derive Key Pair - Done
37,268,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,980,838 UART: [art] Erasing AUTHORITY.KEYID = 7
38,982,329 UART: [art] PUB.X = 74108A833C62AE9B1DDB27E90A933D7781D742799743592B3EECF22406E7CD1CF8B3ECCBC2463E634872EC685B3C9EA1
38,989,573 UART: [art] PUB.Y = 5B57EB91223B2764B6D326AB010FF611329E9DAE217EB95B719B9B0299BD57770EE7EEBF4164E59272847023135DA68D
38,996,856 UART: [art] SIG.R = A50BB65B120CC247BF961157FF499B307DA47BB4A15A9F820E82F5D7134A42D665F478D98F43AD8CA700E49008112078
39,004,193 UART: [art] SIG.S = E3A6180E29192DBA6D213FA36C269B9FB1832D6610D99F0617B95C83C10AD475433E9668ACCD2448203F63B97BDD012D
39,982,911 UART: mbox::rt_entry...
39,983,876 UART: ____ _ _ _ ____ _____
39,985,855 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,987,855 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,989,781 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,991,704 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,993,625 UART: |_|
39,994,479 UART:
40,365,290 UART: [rt] Runtime listening for mailbox commands...
40,367,503 >>> mbox cmd response data (48 bytes)
40,368,086 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,370,409 >>> mbox cmd response data (48 bytes)
40,371,299 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,388,156 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,373 UART:
192,732 UART: Running Caliptra ROM ...
194,049 UART:
603,792 UART: [state] CFI Enabled
618,391 UART: [state] LifecycleState = Unprovisioned
620,272 UART: [state] DebugLocked = No
622,718 UART: [state] WD Timer not started. Device not locked for debugging
626,899 UART: [kat] SHA2-256
806,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,352 UART: [kat] ++
817,812 UART: [kat] sha1
827,977 UART: [kat] SHA2-256
830,664 UART: [kat] SHA2-384
836,426 UART: [kat] SHA2-512-ACC
838,770 UART: [kat] ECC-384
3,280,439 UART: [kat] HMAC-384Kdf
3,292,355 UART: [kat] LMS
3,768,925 UART: [kat] --
3,772,526 UART: [cold-reset] ++
3,774,389 UART: [fht] FHT @ 0x50003400
3,786,148 UART: [idev] ++
3,786,722 UART: [idev] CDI.KEYID = 6
3,787,756 UART: [idev] SUBJECT.KEYID = 7
3,788,938 UART: [idev] UDS.KEYID = 0
3,789,876 ready_for_fw is high
3,790,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,140 UART: [idev] Erasing UDS.KEYID = 0
6,268,250 UART: [idev] Sha1 KeyId Algorithm
6,292,562 UART: [idev] --
6,298,526 UART: [ldev] ++
6,299,111 UART: [ldev] CDI.KEYID = 6
6,300,029 UART: [ldev] SUBJECT.KEYID = 5
6,301,258 UART: [ldev] AUTHORITY.KEYID = 7
6,302,490 UART: [ldev] FE.KEYID = 1
6,315,085 UART: [ldev] Erasing FE.KEYID = 1
8,791,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,331 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,324 UART: [ldev] --
10,585,651 UART: [fwproc] Wait for Commands...
10,587,907 UART: [fwproc] Recv command 0x46574c44
10,589,892 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,156,031 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,229,064 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,556,900 >>> mbox cmd response: success
14,561,041 UART: [afmc] ++
14,561,670 UART: [afmc] CDI.KEYID = 6
14,562,594 UART: [afmc] SUBJECT.KEYID = 7
14,563,754 UART: [afmc] AUTHORITY.KEYID = 5
17,069,723 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,793,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,811,315 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,405 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,843,036 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,671 UART: [afmc] --
18,870,627 UART: [cold-reset] --
18,874,296 UART: [state] Locking Datavault
18,879,280 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,040 UART: [state] Locking ICCM
18,882,171 UART: [exit] Launching FMC @ 0x40000130
18,890,627 UART:
18,890,861 UART: Running Caliptra FMC ...
18,891,965 UART:
18,892,135 UART: [state] CFI Enabled
18,900,027 UART: [fht] FMC Alias Private Key: 7
20,665,845 UART: [art] Extend RT PCRs Done
20,667,064 UART: [art] Lock RT PCRs Done
20,668,884 UART: [art] Populate DV Done
20,674,420 UART: [fht] FMC Alias Private Key: 7
20,676,055 UART: [art] Derive CDI
20,676,887 UART: [art] Store in slot 0x4
20,719,436 UART: [art] Derive Key Pair
20,720,463 UART: [art] Store priv key in slot 0x5
23,147,446 UART: [art] Derive Key Pair - Done
23,160,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,866,618 UART: [art] Erasing AUTHORITY.KEYID = 7
24,868,123 UART: [art] PUB.X = BE924EA736265DD6FFA715514B1143B90C89D56D8615640EFC6CEE0D4DA4888AC4E67EE638F86300F0B4FE7CCB37E23B
24,875,421 UART: [art] PUB.Y = 062D502801BD6FF42150D6A570364BE6569BBA1BCB087C4355FA10F1DDB7ED5F1A1FF9ADF34C14BFDBEB721D4C78A9E2
24,882,714 UART: [art] SIG.R = 4C41A48716347531613C7A00593F99AA2A9D29EEB1AB99509333CB01B7FD5493E8EC90CF675603347E08BE0187C3316E
24,890,045 UART: [art] SIG.S = 6BE135D0457A2F6EDCEEF1A13F187678AC806E018B251947D4114D9F3863284A0E7EDD206DABE8C8BF2E82C29BAB64F4
25,869,149 UART: Caliptra RT
25,869,842 UART: [state] CFI Enabled
26,002,272 UART: [rt] RT listening for mailbox commands...
26,004,643 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,035,301 UART: [rt]cmd =0x4d454153, len=108
26,054,344 >>> mbox cmd response data (12 bytes)
28,114,388 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,220,582 UART:
28,220,935 UART: Running Caliptra ROM ...
28,221,982 UART:
28,222,247 UART: [state] CFI Enabled
28,236,798 UART: [state] LifecycleState = Unprovisioned
28,238,695 UART: [state] DebugLocked = No
28,240,268 UART: [state] WD Timer not started. Device not locked for debugging
28,244,924 UART: [kat] SHA2-256
28,424,611 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,435,440 UART: [kat] ++
28,435,905 UART: [kat] sha1
28,447,121 UART: [kat] SHA2-256
28,449,817 UART: [kat] SHA2-384
28,454,370 UART: [kat] SHA2-512-ACC
28,456,720 UART: [kat] ECC-384
30,898,412 UART: [kat] HMAC-384Kdf
30,911,571 UART: [kat] LMS
31,388,045 UART: [kat] --
31,393,984 UART: [update-reset] ++
34,456,107 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,460,021 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,732,639 >>> mbox cmd response: success
34,733,002 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,734,258 UART: [update-reset] Copying MAN_2 To MAN_1
34,771,342 UART: [update-reset Success] --
34,774,587 UART: [state] Locking Datavault
34,777,846 UART: [state] Locking PCR0, PCR1 and PCR31
34,779,545 UART: [state] Locking ICCM
34,781,182 UART: [exit] Launching FMC @ 0x40000130
34,789,606 UART:
34,789,845 UART: Running Caliptra FMC ...
34,790,874 UART:
34,791,021 UART: [state] CFI Enabled
34,835,259 UART: [art] Extend RT PCRs Done
34,836,439 UART: [art] Lock RT PCRs Done
34,837,762 UART: [art] Populate DV Done
34,843,008 UART: [fht] FMC Alias Private Key: 7
34,844,550 UART: [art] Derive CDI
34,845,367 UART: [art] Store in slot 0x4
34,888,285 UART: [art] Derive Key Pair
34,889,289 UART: [art] Store priv key in slot 0x5
37,316,132 UART: [art] Derive Key Pair - Done
37,329,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,035,875 UART: [art] Erasing AUTHORITY.KEYID = 7
39,037,379 UART: [art] PUB.X = 00181C1DB7281B0CD891450F563C6BEAA538E32C17D52616F58E3DD6C1D3194A91CC5CBC2440BA4D3F3A3626F89F54AF
39,044,653 UART: [art] PUB.Y = 49005B9FD17A6B50E6319B2032A58559DE13590A5FCC5AB5CCAA2330F7BC9B698C543A678164C710F272BD9072059A52
39,051,837 UART: [art] SIG.R = F42266A4D6192A4C77896CEEDC12DE57242558C8D60BEFE9902BB4EFEC0A6F1B680E0F6E037B0EC7A109512AC55F4A31
39,059,243 UART: [art] SIG.S = F8B46D126A71623F878D107084B2C3A5F8CE2B54045D03D430FD9074D68C35D29CC0FFD9037EF222EDDBCA87B7302A3E
40,037,897 UART: mbox::rt_entry...
40,038,844 UART: ____ _ _ _ ____ _____
40,040,831 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,042,841 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,044,787 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,046,730 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,048,588 UART: |_|
40,049,391 UART:
40,418,840 UART: [rt] Runtime listening for mailbox commands...
40,421,011 >>> mbox cmd response data (48 bytes)
40,421,570 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,423,946 >>> mbox cmd response data (48 bytes)
40,424,808 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,441,704 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,777,879 ready_for_fw is high
3,778,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,443,808 >>> mbox cmd response: success
18,694,891 UART:
18,695,274 UART: Running Caliptra FMC ...
18,696,479 UART:
18,696,664 UART: [state] CFI Enabled
18,704,446 UART: [fht] FMC Alias Private Key: 7
20,470,822 UART: [art] Extend RT PCRs Done
20,472,039 UART: [art] Lock RT PCRs Done
20,473,741 UART: [art] Populate DV Done
20,479,164 UART: [fht] FMC Alias Private Key: 7
20,480,688 UART: [art] Derive CDI
20,481,461 UART: [art] Store in slot 0x4
20,524,446 UART: [art] Derive Key Pair
20,525,494 UART: [art] Store priv key in slot 0x5
22,952,384 UART: [art] Derive Key Pair - Done
22,965,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,373 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,878 UART: [art] PUB.X = 263B7EEB0EF9A9563F5265EE5FB92BF8F45F32C008FF4DF9612D52FFC24DD340DBB1249A2979C3EA7F1788FAAB271D64
24,680,195 UART: [art] PUB.Y = 6E7AB5DB7E09B9009469AB7AFD3094F2E82CC55F53129755E41A61C35C1B6D479EC3CFB46024A8AF79FA4C0EC7084147
24,687,454 UART: [art] SIG.R = 605754FF25E61F8CBFC186D4486AA75DC2B8C2F585F1D39EC56BFAC7BD495B607726CD88CEE12C50E95E8CE587473A43
24,694,863 UART: [art] SIG.S = 9A1C78B76BDB0A45E50248B632199714A9339C71C2A34BDD90809D013209C9C4F83860E6E05ED1D554919B79DA2C84AD
25,673,205 UART: Caliptra RT
25,673,920 UART: [state] CFI Enabled
25,807,071 UART: [rt] RT listening for mailbox commands...
25,809,296 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
25,840,025 UART: [rt]cmd =0x4d454153, len=108
25,858,568 >>> mbox cmd response data (12 bytes)
27,917,700 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,523,304 >>> mbox cmd response: success
34,523,827 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,556,644 UART:
34,556,941 UART: Running Caliptra FMC ...
34,558,066 UART:
34,558,229 UART: [state] CFI Enabled
34,602,582 UART: [art] Extend RT PCRs Done
34,603,778 UART: [art] Lock RT PCRs Done
34,604,981 UART: [art] Populate DV Done
34,610,446 UART: [fht] FMC Alias Private Key: 7
34,612,072 UART: [art] Derive CDI
34,612,900 UART: [art] Store in slot 0x4
34,655,661 UART: [art] Derive Key Pair
34,656,663 UART: [art] Store priv key in slot 0x5
37,083,760 UART: [art] Derive Key Pair - Done
37,096,818 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,803,609 UART: [art] Erasing AUTHORITY.KEYID = 7
38,805,119 UART: [art] PUB.X = 078F91D87346A5F7B0EB234279F1376BED8C496BA821396C9540A5B9BBBCF136C352F0F07776AB8AB5A8BF95BF08D53C
38,812,438 UART: [art] PUB.Y = A5E207A6D648EB0DE104D64B38167620A31221B500F95AFF488F94D66F8F01069B2D239D2B0658414738084ADB8CBF11
38,819,628 UART: [art] SIG.R = 0DF9A8E1D6D7F4FE3BC4098C3766AACE291CA7198031736BC415A6303A19295266C0976FD4AC4CEB8B178694D4D709B2
38,827,075 UART: [art] SIG.S = D8D71927783028CED1B0D82EF4AFBA6819D038D87E4CFF8CE8AC55A0D150EDC6ECD93844D8B2A732C1E699974576C1A4
39,805,312 UART: mbox::rt_entry...
39,806,278 UART: ____ _ _ _ ____ _____
39,808,262 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,810,270 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,812,215 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,814,172 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,816,029 UART: |_|
39,816,919 UART:
40,186,252 UART: [rt] Runtime listening for mailbox commands...
40,188,453 >>> mbox cmd response data (48 bytes)
40,189,022 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
40,191,355 >>> mbox cmd response data (48 bytes)
40,192,230 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
40,209,094 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,172 UART:
192,530 UART: Running Caliptra ROM ...
193,707 UART:
193,859 UART: [state] CFI Enabled
265,109 UART: [state] LifecycleState = Unprovisioned
267,453 UART: [state] DebugLocked = No
270,047 UART: [state] WD Timer not started. Device not locked for debugging
274,226 UART: [kat] SHA2-256
464,155 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,923 UART: [kat] ++
475,372 UART: [kat] sha1
487,665 UART: [kat] SHA2-256
490,661 UART: [kat] SHA2-384
495,222 UART: [kat] SHA2-512-ACC
497,792 UART: [kat] ECC-384
2,948,408 UART: [kat] HMAC-384Kdf
2,970,323 UART: [kat] LMS
3,502,060 UART: [kat] --
3,503,952 UART: [cold-reset] ++
3,505,396 UART: [fht] FHT @ 0x50003400
3,516,368 UART: [idev] ++
3,517,077 UART: [idev] CDI.KEYID = 6
3,518,106 UART: [idev] SUBJECT.KEYID = 7
3,519,271 UART: [idev] UDS.KEYID = 0
3,520,209 ready_for_fw is high
3,520,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,669,474 UART: [idev] Erasing UDS.KEYID = 0
6,022,981 UART: [idev] Sha1 KeyId Algorithm
6,046,209 UART: [idev] --
6,051,172 UART: [ldev] ++
6,051,853 UART: [ldev] CDI.KEYID = 6
6,052,762 UART: [ldev] SUBJECT.KEYID = 5
6,053,918 UART: [ldev] AUTHORITY.KEYID = 7
6,055,153 UART: [ldev] FE.KEYID = 1
6,099,239 UART: [ldev] Erasing FE.KEYID = 1
8,604,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,001 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,224 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,862 UART: [ldev] --
10,411,250 UART: [fwproc] Wait for Commands...
10,412,915 UART: [fwproc] Recv command 0x46574c44
10,415,163 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,145 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,713 >>> mbox cmd response: success
14,679,285 UART: [afmc] ++
14,680,011 UART: [afmc] CDI.KEYID = 6
14,681,257 UART: [afmc] SUBJECT.KEYID = 7
14,682,695 UART: [afmc] AUTHORITY.KEYID = 5
17,213,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,881 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,967,129 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,982,066 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,004,820 UART: [afmc] --
19,007,554 UART: [cold-reset] --
19,011,798 UART: [state] Locking Datavault
19,016,618 UART: [state] Locking PCR0, PCR1 and PCR31
19,018,639 UART: [state] Locking ICCM
19,020,017 UART: [exit] Launching FMC @ 0x40000130
19,028,697 UART:
19,028,927 UART: Running Caliptra FMC ...
19,029,951 UART:
19,030,100 UART: [state] CFI Enabled
19,094,033 UART: [fht] FMC Alias Private Key: 7
20,881,586 UART: [art] Extend RT PCRs Done
20,882,804 UART: [art] Lock RT PCRs Done
20,884,455 UART: [art] Populate DV Done
20,889,703 UART: [fht] FMC Alias Private Key: 7
20,891,308 UART: [art] Derive CDI
20,892,044 UART: [art] Store in slot 0x4
20,947,776 UART: [art] Derive Key Pair
20,948,817 UART: [art] Store priv key in slot 0x5
23,411,453 UART: [art] Derive Key Pair - Done
23,424,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,733 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,235 UART: [art] PUB.X = 5B5D8EB0301F511A6DD1BFB8D2EC992BE4A71BED014F24C91694EB795A4C69BB9C05B900470E7D0BCCBD9B16A26B2388
25,146,543 UART: [art] PUB.Y = AB687AE8B81838386E0DD9FF5324B8C39B6E2C56A30DF3DF202061AE3949DF26EC71FBFB318A7729C622CBE562564ABE
25,153,786 UART: [art] SIG.R = 6BF116AE0BF7AA0439B1228874233BCDD15A291B7F7C53A64729F29E78302E263B6CEA3C2A1F586D93DB11DB8630A21C
25,161,193 UART: [art] SIG.S = 882616C29A803F3BA2C0B31A9F869A82C2816DE56BD32743E5983DC1AB519D7FC256FB20AB4BC01539A29260A05F5C29
26,139,749 UART: Caliptra RT
26,140,453 UART: [state] CFI Enabled
26,320,357 UART: [rt] RT listening for mailbox commands...
26,322,584 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,353,364 UART: [rt]cmd =0x4d454153, len=108
26,371,997 >>> mbox cmd response data (12 bytes)
28,437,417 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,543,412 UART:
28,543,773 UART: Running Caliptra ROM ...
28,544,834 UART:
28,544,987 UART: [state] CFI Enabled
28,610,945 UART: [state] LifecycleState = Unprovisioned
28,612,992 UART: [state] DebugLocked = No
28,615,255 UART: [state] WD Timer not started. Device not locked for debugging
28,619,251 UART: [kat] SHA2-256
28,809,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,819,879 UART: [kat] ++
28,820,435 UART: [kat] sha1
28,832,569 UART: [kat] SHA2-256
28,835,585 UART: [kat] SHA2-384
28,841,347 UART: [kat] SHA2-512-ACC
28,843,960 UART: [kat] ECC-384
31,295,991 UART: [kat] HMAC-384Kdf
31,319,019 UART: [kat] LMS
31,850,628 UART: [kat] --
31,855,858 UART: [update-reset] ++
34,928,943 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,932,530 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,347,970 >>> mbox cmd response: success
35,348,315 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,348,588 UART: [update-reset] Copying MAN_2 To MAN_1
35,385,877 UART: [update-reset Success] --
35,388,590 UART: [state] Locking Datavault
35,391,910 UART: [state] Locking PCR0, PCR1 and PCR31
35,394,089 UART: [state] Locking ICCM
35,396,384 UART: [exit] Launching FMC @ 0x40000130
35,405,089 UART:
35,405,319 UART: Running Caliptra FMC ...
35,406,341 UART:
35,406,482 UART: [state] CFI Enabled
35,510,026 UART: [art] Extend RT PCRs Done
35,511,219 UART: [art] Lock RT PCRs Done
35,512,542 UART: [art] Populate DV Done
35,518,170 UART: [fht] FMC Alias Private Key: 7
35,519,698 UART: [art] Derive CDI
35,520,428 UART: [art] Store in slot 0x4
35,578,892 UART: [art] Derive Key Pair
35,579,930 UART: [art] Store priv key in slot 0x5
38,042,635 UART: [art] Derive Key Pair - Done
38,056,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,766,989 UART: [art] Erasing AUTHORITY.KEYID = 7
39,768,497 UART: [art] PUB.X = A9F085EEE0635F2D100FF9896C6D627845C387C5580A2AFBE5BA6FAE48C404EF36BCE0F93CCDBA1C8250915F5CE6C9AC
39,775,808 UART: [art] PUB.Y = 718B30E2E62200F4046E08990F43031F6BA9D12D723CEBD45114134D2B1EAAFFA6D92D64285EA1FE78C8289D14424CA7
39,783,038 UART: [art] SIG.R = 77DA947A4A4A13EF3F73117AC806498C4926A4953FA91DAAC910B1ECAE51582BF70D43B60D94B114BF993E008ADC7457
39,790,372 UART: [art] SIG.S = 6E53F00A7368AC9E416E8CB19ABE4577EBDD61554D1F5AB91FD3B3FCAD88B6217FCDD526DC040651F562CED85A5C5CB2
40,768,761 UART: mbox::rt_entry...
40,769,721 UART: ____ _ _ _ ____ _____
40,771,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,773,648 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,775,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,777,626 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,779,521 UART: |_|
40,780,350 UART:
41,149,843 UART: [rt] Runtime listening for mailbox commands...
41,152,064 >>> mbox cmd response data (48 bytes)
41,152,662 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,154,984 >>> mbox cmd response data (48 bytes)
41,155,853 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,172,715 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,862 writing to cptra_bootfsm_go
3,439,628 ready_for_fw is high
3,440,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,824,163 >>> mbox cmd response: success
19,130,570 UART:
19,130,948 UART: Running Caliptra FMC ...
19,132,139 UART:
19,132,308 UART: [state] CFI Enabled
19,198,888 UART: [fht] FMC Alias Private Key: 7
20,965,335 UART: [art] Extend RT PCRs Done
20,966,564 UART: [art] Lock RT PCRs Done
20,968,162 UART: [art] Populate DV Done
20,973,590 UART: [fht] FMC Alias Private Key: 7
20,975,303 UART: [art] Derive CDI
20,976,117 UART: [art] Store in slot 0x4
21,033,747 UART: [art] Derive Key Pair
21,034,787 UART: [art] Store priv key in slot 0x5
23,498,073 UART: [art] Derive Key Pair - Done
23,511,184 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,770 UART: [art] PUB.X = CA025EFAFE708B70018A5F84EE7F33327618AA4AAD389D92469291CD68393FB8EB3207FBC1E26777B7F45D9F65E5F2B9
25,232,075 UART: [art] PUB.Y = B94DE569C60150DECEFA81876B35F71A9C49EA773EDEA6B910DD8DC4E528A6947B131F0F37006C507C1D0DCC417E1B83
25,239,306 UART: [art] SIG.R = 5BDF4FB7F9D9E05EF2FBBF04B6096DB433949BA685DAAB284A7E617249F0E7C5B7F9C70C9FA68C99E153A70B396CA615
25,246,746 UART: [art] SIG.S = C9A3051A3FA3F5B9E70A3BD2B3213CC81ED87F69BADBBDB22EAFBCDC0EA278574C6654AC109053E910BE707077AC50CE
26,225,614 UART: Caliptra RT
26,226,304 UART: [state] CFI Enabled
26,407,862 UART: [rt] RT listening for mailbox commands...
26,410,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,440,811 UART: [rt]cmd =0x4d454153, len=108
26,459,739 >>> mbox cmd response data (12 bytes)
28,524,491 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,624,946 >>> mbox cmd response: success
35,625,486 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,658,675 UART:
35,658,961 UART: Running Caliptra FMC ...
35,660,079 UART:
35,660,264 UART: [state] CFI Enabled
35,747,077 UART: [art] Extend RT PCRs Done
35,748,266 UART: [art] Lock RT PCRs Done
35,749,622 UART: [art] Populate DV Done
35,754,980 UART: [fht] FMC Alias Private Key: 7
35,756,467 UART: [art] Derive CDI
35,757,244 UART: [art] Store in slot 0x4
35,815,828 UART: [art] Derive Key Pair
35,816,889 UART: [art] Store priv key in slot 0x5
38,280,179 UART: [art] Derive Key Pair - Done
38,293,289 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,006,438 UART: [art] Erasing AUTHORITY.KEYID = 7
40,007,949 UART: [art] PUB.X = 28B33E1C9BC1E1DEE775559F0190943620A8DF28F571636177292C318756BE4037F430464FC16D85DD7191422DCACB2D
40,015,210 UART: [art] PUB.Y = 147FE86B80DDA3B9AD3101480A2226D44A7130DEEC631718FC8BC7D4A89935DBE6A872DBC3079DE782F6FB62AF128497
40,022,468 UART: [art] SIG.R = 8D04F9274BC5CC8515868065E66BC3ECA7516E09A9CFFC0BD1B2587A381C65E37170675D490E6823BCB835B1F92D6913
40,029,811 UART: [art] SIG.S = 05820637FC90D1B85BA443840F55512093395CEDD9EB0D7DA18311CA5DA765A285E9D7BB20BF423A02D397946C7A44C1
41,008,775 UART: mbox::rt_entry...
41,009,758 UART: ____ _ _ _ ____ _____
41,011,750 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
41,013,755 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
41,015,686 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
41,017,614 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
41,019,541 UART: |_|
41,020,351 UART:
41,393,063 UART: [rt] Runtime listening for mailbox commands...
41,395,246 >>> mbox cmd response data (48 bytes)
41,395,808 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,398,155 >>> mbox cmd response data (48 bytes)
41,399,038 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,415,904 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,402 UART:
192,802 UART: Running Caliptra ROM ...
194,146 UART:
603,772 UART: [state] CFI Enabled
617,965 UART: [state] LifecycleState = Unprovisioned
620,278 UART: [state] DebugLocked = No
622,314 UART: [state] WD Timer not started. Device not locked for debugging
627,654 UART: [kat] SHA2-256
817,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,351 UART: [kat] ++
828,873 UART: [kat] sha1
839,909 UART: [kat] SHA2-256
842,896 UART: [kat] SHA2-384
848,185 UART: [kat] SHA2-512-ACC
850,772 UART: [kat] ECC-384
3,294,628 UART: [kat] HMAC-384Kdf
3,307,788 UART: [kat] LMS
3,839,617 UART: [kat] --
3,841,648 UART: [cold-reset] ++
3,842,591 UART: [fht] FHT @ 0x50003400
3,854,564 UART: [idev] ++
3,855,278 UART: [idev] CDI.KEYID = 6
3,856,165 UART: [idev] SUBJECT.KEYID = 7
3,857,410 UART: [idev] UDS.KEYID = 0
3,858,316 ready_for_fw is high
3,858,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,409 UART: [idev] Erasing UDS.KEYID = 0
6,331,541 UART: [idev] Sha1 KeyId Algorithm
6,354,128 UART: [idev] --
6,358,369 UART: [ldev] ++
6,359,116 UART: [ldev] CDI.KEYID = 6
6,360,042 UART: [ldev] SUBJECT.KEYID = 5
6,361,155 UART: [ldev] AUTHORITY.KEYID = 7
6,362,407 UART: [ldev] FE.KEYID = 1
6,374,297 UART: [ldev] Erasing FE.KEYID = 1
8,850,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,979 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,030 UART: [ldev] --
10,642,651 UART: [fwproc] Wait for Commands...
10,645,660 UART: [fwproc] Recv command 0x46574c44
10,647,968 UART: [fwproc] Recv'd Img size: 118548 bytes
14,138,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,348,300 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,836 >>> mbox cmd response: success
14,911,650 UART: [afmc] ++
14,912,402 UART: [afmc] CDI.KEYID = 6
14,913,549 UART: [afmc] SUBJECT.KEYID = 7
14,915,036 UART: [afmc] AUTHORITY.KEYID = 5
17,417,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,142,055 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,144,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,159,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,174,250 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,189,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,914 UART: [afmc] --
19,215,085 UART: [cold-reset] --
19,217,669 UART: [state] Locking Datavault
19,223,855 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,074 UART: [state] Locking ICCM
19,227,652 UART: [exit] Launching FMC @ 0x40000130
19,236,302 UART:
19,236,621 UART: Running Caliptra FMC ...
19,237,752 UART:
19,237,917 UART: [state] CFI Enabled
19,245,761 UART: [fht] FMC Alias Private Key: 7
21,011,829 UART: [art] Extend RT PCRs Done
21,013,085 UART: [art] Lock RT PCRs Done
21,014,404 UART: [art] Populate DV Done
21,019,662 UART: [fht] FMC Alias Private Key: 7
21,021,152 UART: [art] Derive CDI
21,021,921 UART: [art] Store in slot 0x4
21,064,841 UART: [art] Derive Key Pair
21,065,842 UART: [art] Store priv key in slot 0x5
23,492,554 UART: [art] Derive Key Pair - Done
23,505,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,830 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,329 UART: [art] PUB.X = 3C11B8078B18E2FFD4F37BFC70265943A3A712A1EEEFE55A1384D914A069AD5AFB28D771F3AD9E7BB968187544BE5654
25,220,675 UART: [art] PUB.Y = 2998BC4A038A69A88225531F5136C7CD99C8C8071C3E4BC43D3C0440F91F824D22647EEAA92F13B58003AACD97CF9F3E
25,227,883 UART: [art] SIG.R = 695E451C33645792F3EACB842E883AC3BEC09AC38776594DEDC565C1BD4FDDF5C971E5C123964F7E4D09E85D5CE7E2E3
25,235,332 UART: [art] SIG.S = D1EFBC7B41AAD4B30571B342EB82A72DAD8901DAC5937D3462E281D1FF22658964BC87236B79F27E46736B5B46849B95
26,214,651 UART: Caliptra RT
26,215,363 UART: [state] CFI Enabled
26,349,277 UART: [rt] RT listening for mailbox commands...
26,351,343 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,382,200 UART: [rt]cmd =0x4d454153, len=108
26,400,642 >>> mbox cmd response data (12 bytes)
28,467,120 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,572,811 UART:
28,573,157 UART: Running Caliptra ROM ...
28,574,264 UART:
28,574,432 UART: [state] CFI Enabled
28,586,611 UART: [state] LifecycleState = Unprovisioned
28,588,449 UART: [state] DebugLocked = No
28,589,670 UART: [state] WD Timer not started. Device not locked for debugging
28,593,257 UART: [kat] SHA2-256
28,783,097 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,793,864 UART: [kat] ++
28,794,323 UART: [kat] sha1
28,806,353 UART: [kat] SHA2-256
28,809,371 UART: [kat] SHA2-384
28,815,254 UART: [kat] SHA2-512-ACC
28,817,825 UART: [kat] ECC-384
31,259,723 UART: [kat] HMAC-384Kdf
31,273,146 UART: [kat] LMS
31,804,772 UART: [kat] --
31,807,826 UART: [update-reset] ++
34,886,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,889,408 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,304,857 >>> mbox cmd response: success
35,305,231 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,305,512 UART: [update-reset] Copying MAN_2 To MAN_1
35,342,866 UART: [update-reset Success] --
35,348,116 UART: [state] Locking Datavault
35,351,981 UART: [state] Locking PCR0, PCR1 and PCR31
35,354,134 UART: [state] Locking ICCM
35,356,451 UART: [exit] Launching FMC @ 0x40000130
35,365,133 UART:
35,365,371 UART: Running Caliptra FMC ...
35,366,476 UART:
35,366,640 UART: [state] CFI Enabled
35,410,602 UART: [art] Extend RT PCRs Done
35,411,809 UART: [art] Lock RT PCRs Done
35,413,268 UART: [art] Populate DV Done
35,418,680 UART: [fht] FMC Alias Private Key: 7
35,420,441 UART: [art] Derive CDI
35,421,257 UART: [art] Store in slot 0x4
35,464,073 UART: [art] Derive Key Pair
35,465,086 UART: [art] Store priv key in slot 0x5
37,892,285 UART: [art] Derive Key Pair - Done
37,905,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,612,020 UART: [art] Erasing AUTHORITY.KEYID = 7
39,613,531 UART: [art] PUB.X = AA36EC0474820096DD94D34E491FAF1E9E6054DCAE541B563148F7BD1813689F562FF9FA8897DFE7E9A68F613CE48D8B
39,620,756 UART: [art] PUB.Y = 0A6013C7163B2BCBC13E65CA06AA927B6666CBFDA81011B7D1021E32024E0578508AB20A159F1CA8C6FBE22DD5868D58
39,628,064 UART: [art] SIG.R = 9A541E94452B64A752CFC70089BC582649F6E7DC4BA61E23F6E1E9EAADEB4DD89F159BE0C2E9DA3667A0653766388728
39,635,455 UART: [art] SIG.S = FE8DBA9CD08C68D683D01C20AB2876820FBAF4C3F3E80D583177B50F2E999E697D3F19800751AA36B51526C4317719BA
40,614,101 UART: mbox::rt_entry...
40,615,078 UART: ____ _ _ _ ____ _____
40,617,041 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,619,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,620,965 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,622,903 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,624,763 UART: |_|
40,625,651 UART:
40,996,455 UART: [rt] Runtime listening for mailbox commands...
40,998,685 >>> mbox cmd response data (48 bytes)
40,999,288 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,001,609 >>> mbox cmd response data (48 bytes)
41,002,493 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,019,364 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,756,380 ready_for_fw is high
3,756,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,858 >>> mbox cmd response: success
19,301,845 UART:
19,302,242 UART: Running Caliptra FMC ...
19,303,390 UART:
19,303,557 UART: [state] CFI Enabled
19,311,275 UART: [fht] FMC Alias Private Key: 7
21,077,008 UART: [art] Extend RT PCRs Done
21,078,232 UART: [art] Lock RT PCRs Done
21,079,915 UART: [art] Populate DV Done
21,085,552 UART: [fht] FMC Alias Private Key: 7
21,087,105 UART: [art] Derive CDI
21,087,926 UART: [art] Store in slot 0x4
21,130,636 UART: [art] Derive Key Pair
21,131,685 UART: [art] Store priv key in slot 0x5
23,558,779 UART: [art] Derive Key Pair - Done
23,571,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,277,790 UART: [art] Erasing AUTHORITY.KEYID = 7
25,279,416 UART: [art] PUB.X = 7528B41EBB7BF6DDD0F823922D363B7E058EDE81E2D5AFCC359C7B89683895306F72B8E8ACAD02744A5E9C80B6694CA0
25,286,584 UART: [art] PUB.Y = 25EF2380F7B3B0D490E8ED3133ECEDEB170F3973D49F66D0CB255DE2ACB368EB8FFAA98E9E95B1E8CB415A27EFE525E6
25,293,855 UART: [art] SIG.R = 54942D4451C46687A5E93CF69AE82189479CAEAD086883DB29241D39423E6D309E58515D780C24CA827781A03CF67A97
25,301,220 UART: [art] SIG.S = FCA3CBC36D41CC137AD74D37E4FA37C9B8EF27ACB96C9139509EEDC7C895DBBBB7F4B77200C5B325533004418E36668F
26,279,612 UART: Caliptra RT
26,280,325 UART: [state] CFI Enabled
26,412,636 UART: [rt] RT listening for mailbox commands...
26,414,853 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
26,445,638 UART: [rt]cmd =0x4d454153, len=108
26,464,430 >>> mbox cmd response data (12 bytes)
28,532,490 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,552,125 >>> mbox cmd response: success
35,552,600 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,586,269 UART:
35,586,556 UART: Running Caliptra FMC ...
35,587,594 UART:
35,587,746 UART: [state] CFI Enabled
35,632,542 UART: [art] Extend RT PCRs Done
35,633,735 UART: [art] Lock RT PCRs Done
35,635,220 UART: [art] Populate DV Done
35,640,536 UART: [fht] FMC Alias Private Key: 7
35,642,185 UART: [art] Derive CDI
35,642,928 UART: [art] Store in slot 0x4
35,685,637 UART: [art] Derive Key Pair
35,686,681 UART: [art] Store priv key in slot 0x5
38,113,997 UART: [art] Derive Key Pair - Done
38,126,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,833,649 UART: [art] Erasing AUTHORITY.KEYID = 7
39,835,137 UART: [art] PUB.X = 3ED474C510A171BD538533BD0090C30785FCF0031896AF232CE1DFFC1E40FD4D274265573BBAAF0BAD6E4F9F2A518423
39,842,468 UART: [art] PUB.Y = 5BBCF03D3913CC8512FBE4F61C1F033E81A71175390F4DE4AF94043B888936BBDDCB66DE442C6D50624CD121F4146182
39,849,679 UART: [art] SIG.R = 14AEC955E2C1016F7811FFD4CE3CF6C31EA49143AD038F5AAD9AEDCB39948113157F1CA7CC38B10304A23DBEC29BDB8E
39,857,098 UART: [art] SIG.S = AA3FF609BBF9EF59E6253B0C2CA75C0A3712218CC8C0FCDA7BF6629C44CDC400BB48FEE3CCFF8F40CA62740B2D83EF1D
40,835,527 UART: mbox::rt_entry...
40,836,493 UART: ____ _ _ _ ____ _____
40,838,485 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,840,494 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,842,428 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,844,360 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,846,293 UART: |_|
40,847,107 UART:
41,220,176 UART: [rt] Runtime listening for mailbox commands...
41,222,367 >>> mbox cmd response data (48 bytes)
41,222,967 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
41,225,385 >>> mbox cmd response data (48 bytes)
41,226,267 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
41,243,130 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,715 UART: [kat] SHA2-256
881,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,761 UART: [kat] ++
885,913 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
894,682 UART: [kat] SHA2-512-ACC
896,583 UART: [kat] ECC-384
901,884 UART: [kat] HMAC-384Kdf
906,492 UART: [kat] LMS
1,474,688 UART: [kat] --
1,475,693 UART: [cold-reset] ++
1,476,187 UART: [fht] Storing FHT @ 0x50003400
1,478,964 UART: [idev] ++
1,479,132 UART: [idev] CDI.KEYID = 6
1,479,492 UART: [idev] SUBJECT.KEYID = 7
1,479,916 UART: [idev] UDS.KEYID = 0
1,480,261 ready_for_fw is high
1,480,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,098 UART: [idev] Erasing UDS.KEYID = 0
1,504,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,446 UART: [idev] --
1,514,483 UART: [ldev] ++
1,514,651 UART: [ldev] CDI.KEYID = 6
1,515,014 UART: [ldev] SUBJECT.KEYID = 5
1,515,440 UART: [ldev] AUTHORITY.KEYID = 7
1,515,903 UART: [ldev] FE.KEYID = 1
1,521,401 UART: [ldev] Erasing FE.KEYID = 1
1,546,250 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,250 UART: [ldev] --
1,585,689 UART: [fwproc] Waiting for Commands...
1,586,334 UART: [fwproc] Received command 0x46574c44
1,587,125 UART: [fwproc] Received Image of size 118548 bytes
2,932,359 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,551 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,769 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,970 >>> mbox cmd response: success
3,132,176 UART: [afmc] ++
3,132,344 UART: [afmc] CDI.KEYID = 6
3,132,706 UART: [afmc] SUBJECT.KEYID = 7
3,133,131 UART: [afmc] AUTHORITY.KEYID = 5
3,168,612 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,560 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,340 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,049 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,932 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,615 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,407 UART: [afmc] --
3,211,361 UART: [cold-reset] --
3,212,117 UART: [state] Locking Datavault
3,213,512 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,116 UART: [state] Locking ICCM
3,214,756 UART: [exit] Launching FMC @ 0x40000130
3,220,086 UART:
3,220,102 UART: Running Caliptra FMC ...
3,220,510 UART:
3,220,564 UART: [state] CFI Enabled
3,230,798 UART: [fht] FMC Alias Private Key: 7
3,349,736 UART: [art] Extend RT PCRs Done
3,350,164 UART: [art] Lock RT PCRs Done
3,351,554 UART: [art] Populate DV Done
3,359,657 UART: [fht] FMC Alias Private Key: 7
3,360,697 UART: [art] Derive CDI
3,360,977 UART: [art] Store in slot 0x4
3,446,503 UART: [art] Derive Key Pair
3,446,863 UART: [art] Store priv key in slot 0x5
3,459,824 UART: [art] Derive Key Pair - Done
3,475,008 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,818 UART: [art] PUB.X = 1BAE405361740F965EF549A2FE2DD7391C9F7431BAE5B18BFEEEFD7F30FC75C2808DCF06C3348E6884D364384BD34CE5
3,498,596 UART: [art] PUB.Y = A786AF915A1CE4FC2BDC7B0C4461A501AC388C76BB7E378F4D3DEC6CBF61935058BDBC0E6F678F84B771A7B9DC822AD5
3,505,559 UART: [art] SIG.R = BDCE6BF1A1ADAB08371A2996682DDD5C0102CFF61563E16B42107792DF162524EDFFA1F0C588A91C47A96CC103B1014B
3,512,326 UART: [art] SIG.S = FCD9E6DC462D8F1F7BAAC76272AA0AE5110AE835D8AAECBAA031E41E7B4B04BEC31B9CD8389E6C1740EF36DBDD64A28F
3,536,085 UART: Caliptra RT
3,536,336 UART: [state] CFI Enabled
3,656,941 UART: [rt] RT listening for mailbox commands...
3,657,611 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,149 UART: [rt]cmd =0x4d454153, len=108
3,708,633 >>> mbox cmd response data (12 bytes)
3,708,634 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,709,384 UART:
3,709,400 UART: Running Caliptra ROM ...
3,709,808 UART:
3,709,862 UART: [state] CFI Enabled
3,712,460 UART: [state] LifecycleState = Unprovisioned
3,713,115 UART: [state] DebugLocked = No
3,713,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,715,408 UART: [kat] SHA2-256
4,509,339 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,513,454 UART: [kat] ++
4,513,606 UART: [kat] sha1
4,517,736 UART: [kat] SHA2-256
4,519,674 UART: [kat] SHA2-384
4,522,259 UART: [kat] SHA2-512-ACC
4,524,159 UART: [kat] ECC-384
4,529,814 UART: [kat] HMAC-384Kdf
4,534,400 UART: [kat] LMS
5,102,596 UART: [kat] --
5,103,145 UART: [update-reset] ++
6,075,302 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,076,460 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,178,153 >>> mbox cmd response: success
6,178,153 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,178,346 UART: [update-reset] Copying MAN_2 To MAN_1
6,186,360 UART: [update-reset Success] --
6,187,443 UART: [state] Locking Datavault
6,188,269 UART: [state] Locking PCR0, PCR1 and PCR31
6,188,873 UART: [state] Locking ICCM
6,189,323 UART: [exit] Launching FMC @ 0x40000130
6,194,653 UART:
6,194,669 UART: Running Caliptra FMC ...
6,195,077 UART:
6,195,131 UART: [state] CFI Enabled
6,283,994 UART: [art] Extend RT PCRs Done
6,284,422 UART: [art] Lock RT PCRs Done
6,285,615 UART: [art] Populate DV Done
6,293,760 UART: [fht] FMC Alias Private Key: 7
6,294,800 UART: [art] Derive CDI
6,295,080 UART: [art] Store in slot 0x4
6,380,482 UART: [art] Derive Key Pair
6,380,842 UART: [art] Store priv key in slot 0x5
6,393,731 UART: [art] Derive Key Pair - Done
6,408,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,423,800 UART: [art] Erasing AUTHORITY.KEYID = 7
6,424,565 UART: [art] PUB.X = 4345A96FABC3B7BAC6011D8231ECDEDF92BFEAA18BF382E70A7E30A7B7814DBA7351F18CD04F2748BF4F345E81D4648A
6,431,349 UART: [art] PUB.Y = BA482F80722B9F0619416CCA294DCE1DA1D0E4A26858F7874693607B36217DEE83CCA5037215BD625E2C895FDEF676DF
6,438,299 UART: [art] SIG.R = 991C59411FD5959A37DF8BAED07733803E73F5F3F8FA2E1E04FFCB0290F8C2DF97C0B546B76F7493C17670DA0B1F8B2E
6,445,072 UART: [art] SIG.S = 3B98CB4CE156E34745717D3BCDE7CB17A68016E1A494F955D99F6E375F660FA9BCF5C953BE9AEA94505F8EE340484DC6
6,468,589 UART: mbox::rt_entry...
6,468,961 UART: ____ _ _ _ ____ _____
6,469,745 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,470,545 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,471,313 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,472,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,472,849 UART: |_|
6,473,161 UART:
6,839,832 UART: [rt] Runtime listening for mailbox commands...
6,841,030 >>> mbox cmd response data (48 bytes)
6,841,031 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,843,818 >>> mbox cmd response data (48 bytes)
6,843,819 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,861,964 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,433 ready_for_fw is high
1,362,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,432 >>> mbox cmd response: success
3,043,791 UART:
3,043,807 UART: Running Caliptra FMC ...
3,044,215 UART:
3,044,269 UART: [state] CFI Enabled
3,054,905 UART: [fht] FMC Alias Private Key: 7
3,173,639 UART: [art] Extend RT PCRs Done
3,174,067 UART: [art] Lock RT PCRs Done
3,175,499 UART: [art] Populate DV Done
3,183,680 UART: [fht] FMC Alias Private Key: 7
3,184,652 UART: [art] Derive CDI
3,184,932 UART: [art] Store in slot 0x4
3,270,840 UART: [art] Derive Key Pair
3,271,200 UART: [art] Store priv key in slot 0x5
3,284,611 UART: [art] Derive Key Pair - Done
3,299,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,233 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,998 UART: [art] PUB.X = 4483CA74CC9AD7D464E0C1142B22B4E68EE2652F864D17C12BD46E80C08F3F02FEAB527D83636EE8F1989C72450C446B
3,322,768 UART: [art] PUB.Y = E7FFD72E4E4702C1F94782482A1A36FC9264BF5517CEA101D0F8328BA588D223836C3FB57412E0CEF16F338B1B0D4600
3,329,691 UART: [art] SIG.R = 08975BAE81FEA77B055AAF61906F037C388EC1C9919804715284B255BCF8A89A1D30F7FE16BD65165D2DEEBF94DC6E45
3,336,459 UART: [art] SIG.S = BB5416AE90234E03CBCB94F3F0D8B555B8841A2BF404A42215C37FB70DD81860204217C92E537EB904E30FB941231A27
3,360,342 UART: Caliptra RT
3,360,593 UART: [state] CFI Enabled
3,481,075 UART: [rt] RT listening for mailbox commands...
3,481,745 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,237 UART: [rt]cmd =0x4d454153, len=108
3,534,025 >>> mbox cmd response data (12 bytes)
3,534,026 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,885,975 >>> mbox cmd response: success
5,885,975 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,899,575 UART:
5,899,591 UART: Running Caliptra FMC ...
5,899,999 UART:
5,900,053 UART: [state] CFI Enabled
5,989,444 UART: [art] Extend RT PCRs Done
5,989,872 UART: [art] Lock RT PCRs Done
5,990,829 UART: [art] Populate DV Done
5,999,110 UART: [fht] FMC Alias Private Key: 7
6,000,156 UART: [art] Derive CDI
6,000,436 UART: [art] Store in slot 0x4
6,086,010 UART: [art] Derive Key Pair
6,086,370 UART: [art] Store priv key in slot 0x5
6,099,717 UART: [art] Derive Key Pair - Done
6,114,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,129,998 UART: [art] Erasing AUTHORITY.KEYID = 7
6,130,763 UART: [art] PUB.X = 7CE75AA64024ECEFD3E216A738D0FE8283D2E0B06766E1C72760F5CAC3C81F2449276D3A3296F07BD0C59AA58AF064C2
6,137,543 UART: [art] PUB.Y = 140B5565B68193125EF8EC599545E2D838AECEF7C28662F75F40163F70DF6B96A687FACC95904633CADB08E9C289E810
6,144,489 UART: [art] SIG.R = BF41C2371A2E1F65B16FB052E74CADD1D3A32E2CEB432B089621AB32814E599FA1EDF378DC5607AF01E9EF2F7189B85F
6,151,266 UART: [art] SIG.S = DAC1C1B3EDB9CEA511C63A0BB5E7AA4B7B9EE4DE15F38FE7C6E39600F6FBA1E1E61A187722802C70EEF01CF25D60A8ED
6,174,613 UART: mbox::rt_entry...
6,174,985 UART: ____ _ _ _ ____ _____
6,175,769 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,176,569 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,177,337 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,178,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,178,873 UART: |_|
6,179,185 UART:
6,538,455 UART: [rt] Runtime listening for mailbox commands...
6,539,653 >>> mbox cmd response data (48 bytes)
6,539,654 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,542,441 >>> mbox cmd response data (48 bytes)
6,542,442 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,560,587 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,278 UART: [kat] SHA2-256
882,209 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,324 UART: [kat] ++
886,476 UART: [kat] sha1
890,612 UART: [kat] SHA2-256
892,550 UART: [kat] SHA2-384
895,399 UART: [kat] SHA2-512-ACC
897,300 UART: [kat] ECC-384
903,053 UART: [kat] HMAC-384Kdf
907,495 UART: [kat] LMS
1,475,691 UART: [kat] --
1,476,734 UART: [cold-reset] ++
1,477,252 UART: [fht] Storing FHT @ 0x50003400
1,480,025 UART: [idev] ++
1,480,193 UART: [idev] CDI.KEYID = 6
1,480,553 UART: [idev] SUBJECT.KEYID = 7
1,480,977 UART: [idev] UDS.KEYID = 0
1,481,322 ready_for_fw is high
1,481,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,951 UART: [idev] Erasing UDS.KEYID = 0
1,506,005 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,852 UART: [ldev] ++
1,516,020 UART: [ldev] CDI.KEYID = 6
1,516,383 UART: [ldev] SUBJECT.KEYID = 5
1,516,809 UART: [ldev] AUTHORITY.KEYID = 7
1,517,272 UART: [ldev] FE.KEYID = 1
1,522,534 UART: [ldev] Erasing FE.KEYID = 1
1,548,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,395 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,265 UART: [ldev] --
1,587,688 UART: [fwproc] Waiting for Commands...
1,588,329 UART: [fwproc] Received command 0x46574c44
1,589,120 UART: [fwproc] Received Image of size 118548 bytes
2,933,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,860 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,515 >>> mbox cmd response: success
3,133,683 UART: [afmc] ++
3,133,851 UART: [afmc] CDI.KEYID = 6
3,134,213 UART: [afmc] SUBJECT.KEYID = 7
3,134,638 UART: [afmc] AUTHORITY.KEYID = 5
3,169,683 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,241 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,021 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,730 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,613 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,296 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,942 UART: [afmc] --
3,212,930 UART: [cold-reset] --
3,213,694 UART: [state] Locking Datavault
3,214,957 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,561 UART: [state] Locking ICCM
3,216,085 UART: [exit] Launching FMC @ 0x40000130
3,221,415 UART:
3,221,431 UART: Running Caliptra FMC ...
3,221,839 UART:
3,221,982 UART: [state] CFI Enabled
3,232,718 UART: [fht] FMC Alias Private Key: 7
3,351,212 UART: [art] Extend RT PCRs Done
3,351,640 UART: [art] Lock RT PCRs Done
3,352,914 UART: [art] Populate DV Done
3,361,291 UART: [fht] FMC Alias Private Key: 7
3,362,239 UART: [art] Derive CDI
3,362,519 UART: [art] Store in slot 0x4
3,448,555 UART: [art] Derive Key Pair
3,448,915 UART: [art] Store priv key in slot 0x5
3,462,536 UART: [art] Derive Key Pair - Done
3,477,269 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,507 UART: [art] PUB.X = 5AABE90D9FD9FC18DF264BDA5E0C25F0CAD06B3C40758B4CB98B2B0D624A2A557166E9FCB3BFFE23626D3D789B8242B0
3,500,290 UART: [art] PUB.Y = D5E954D25814296D8B5994B918390508F0D83482EB3C161995FC72CDD5E6C568A4E424D34CE096556C8D49F4EC0FDA27
3,507,231 UART: [art] SIG.R = C7F0CCABEE2ED531F9232F5A5707938ACEB9E3B70730A333F218529D8A5150B4EF4343EDE0858DE81CCA67D627E8CD25
3,514,009 UART: [art] SIG.S = 956C66982450CC4A291A4D8CC3B27CF63D86EBAB8462E71A8E4B3E2CD1DC1A9E453D79E185F267AE8774233B3156BCEF
3,537,755 UART: Caliptra RT
3,538,098 UART: [state] CFI Enabled
3,658,733 UART: [rt] RT listening for mailbox commands...
3,659,403 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,965 UART: [rt]cmd =0x4d454153, len=108
3,709,773 >>> mbox cmd response data (12 bytes)
3,709,774 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,710,686 UART:
3,710,702 UART: Running Caliptra ROM ...
3,711,110 UART:
3,711,251 UART: [state] CFI Enabled
3,714,179 UART: [state] LifecycleState = Unprovisioned
3,714,834 UART: [state] DebugLocked = No
3,715,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,717,015 UART: [kat] SHA2-256
4,510,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,515,061 UART: [kat] ++
4,515,213 UART: [kat] sha1
4,519,307 UART: [kat] SHA2-256
4,521,245 UART: [kat] SHA2-384
4,524,084 UART: [kat] SHA2-512-ACC
4,525,984 UART: [kat] ECC-384
4,531,909 UART: [kat] HMAC-384Kdf
4,536,619 UART: [kat] LMS
5,104,815 UART: [kat] --
5,105,638 UART: [update-reset] ++
6,077,179 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,078,381 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,180,074 >>> mbox cmd response: success
6,180,074 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,180,187 UART: [update-reset] Copying MAN_2 To MAN_1
6,188,201 UART: [update-reset Success] --
6,189,210 UART: [state] Locking Datavault
6,190,032 UART: [state] Locking PCR0, PCR1 and PCR31
6,190,636 UART: [state] Locking ICCM
6,191,128 UART: [exit] Launching FMC @ 0x40000130
6,196,458 UART:
6,196,474 UART: Running Caliptra FMC ...
6,196,882 UART:
6,197,025 UART: [state] CFI Enabled
6,285,874 UART: [art] Extend RT PCRs Done
6,286,302 UART: [art] Lock RT PCRs Done
6,287,519 UART: [art] Populate DV Done
6,295,894 UART: [fht] FMC Alias Private Key: 7
6,296,956 UART: [art] Derive CDI
6,297,236 UART: [art] Store in slot 0x4
6,382,682 UART: [art] Derive Key Pair
6,383,042 UART: [art] Store priv key in slot 0x5
6,396,485 UART: [art] Derive Key Pair - Done
6,411,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,426,926 UART: [art] Erasing AUTHORITY.KEYID = 7
6,427,691 UART: [art] PUB.X = 95D939BB074A829CECDA9DBF885BA6B634B97093E8ADE61224455B5D0648E01E9201CE5E8755E114C6F263F7FB2D41C2
6,434,460 UART: [art] PUB.Y = 4862BD90A543C84DF5F6EA818C0A8D0675816CBF3932B689C63ED802C4EF5A731790B36AD5CE1435D7245E6D82894FDF
6,441,407 UART: [art] SIG.R = 3B2AFAC637282B88D550886A11B6E9435A5E4286C467BBB53FF43B20DB4C94A2566F2B2DA7B4CC3BE5ACEEA84ED17452
6,448,193 UART: [art] SIG.S = E251054CBED0F79304B77502D54658B116C56A7EABE3296ABEF27145406B613EEF8A1D5BA7D6D793B40D972FD63B0925
6,472,182 UART: mbox::rt_entry...
6,472,554 UART: ____ _ _ _ ____ _____
6,473,338 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,474,138 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,474,906 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,475,674 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,476,442 UART: |_|
6,476,754 UART:
6,836,871 UART: [rt] Runtime listening for mailbox commands...
6,838,069 >>> mbox cmd response data (48 bytes)
6,838,070 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,840,857 >>> mbox cmd response data (48 bytes)
6,840,858 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,859,003 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,172 ready_for_fw is high
1,363,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,769 >>> mbox cmd response: success
3,043,868 UART:
3,043,884 UART: Running Caliptra FMC ...
3,044,292 UART:
3,044,435 UART: [state] CFI Enabled
3,055,273 UART: [fht] FMC Alias Private Key: 7
3,174,243 UART: [art] Extend RT PCRs Done
3,174,671 UART: [art] Lock RT PCRs Done
3,176,435 UART: [art] Populate DV Done
3,184,732 UART: [fht] FMC Alias Private Key: 7
3,185,684 UART: [art] Derive CDI
3,185,964 UART: [art] Store in slot 0x4
3,271,782 UART: [art] Derive Key Pair
3,272,142 UART: [art] Store priv key in slot 0x5
3,284,873 UART: [art] Derive Key Pair - Done
3,299,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,114 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,879 UART: [art] PUB.X = 1FF9A60AE4ED24CEB6A1086CC6E7903185FEF798A8063DF9FAEA5BE21D2BD048F02E4A6AEF988174330CF64D4ADB362E
3,322,659 UART: [art] PUB.Y = 370BFCB3DCC8A7C15ED37CBABD4CC34B3166D54F9019A7A847300D450E2C3F017FBCD00F0E7501C5C6C8C1109792E485
3,329,602 UART: [art] SIG.R = 37241EBA07BE2EF6C1208D8FB4CABBF52DA5FF31EA7707799CFA433F4BF54E807801C1FF54820CACF229079099E75EED
3,336,375 UART: [art] SIG.S = F7A4E9D2516BD0248BBC224ADBED84E0674DDC192CA0F5DECD2AB036D5563C0CC87A4786BDA91B6EF1E673E4774F093E
3,360,731 UART: Caliptra RT
3,361,074 UART: [state] CFI Enabled
3,481,202 UART: [rt] RT listening for mailbox commands...
3,481,872 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,352 UART: [rt]cmd =0x4d454153, len=108
3,532,782 >>> mbox cmd response data (12 bytes)
3,532,783 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,885,781 >>> mbox cmd response: success
5,885,781 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,898,917 UART:
5,898,933 UART: Running Caliptra FMC ...
5,899,341 UART:
5,899,484 UART: [state] CFI Enabled
5,989,103 UART: [art] Extend RT PCRs Done
5,989,531 UART: [art] Lock RT PCRs Done
5,990,838 UART: [art] Populate DV Done
5,999,115 UART: [fht] FMC Alias Private Key: 7
6,000,169 UART: [art] Derive CDI
6,000,449 UART: [art] Store in slot 0x4
6,086,223 UART: [art] Derive Key Pair
6,086,583 UART: [art] Store priv key in slot 0x5
6,100,084 UART: [art] Derive Key Pair - Done
6,114,857 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,130,268 UART: [art] Erasing AUTHORITY.KEYID = 7
6,131,033 UART: [art] PUB.X = D3304B31291D7547F38399EB303F55758E15442745C09D1857341CEF82B154A4BA46DB307162CDFE4FB2108CF720E639
6,137,797 UART: [art] PUB.Y = F681B085102252C4D760149C0240E864965C70F5E64CF3375106A817BDA39867C1FDB8FFA787BFA5BC644CECE7B958E3
6,144,745 UART: [art] SIG.R = 06A9B3C617F053FCB22EDA9294C8804EDE50A803ACD255087EFCC31D3DA8CA3B7A206C3F2E66B2076AE949F83AD01B9E
6,151,521 UART: [art] SIG.S = BDB4D08DBFB51C115D6BDEA3424F38890DE8E17CCB8C95756F9CA957C084060E2C7CA55BBEE0EDBB319C7D1D027151CE
6,174,951 UART: mbox::rt_entry...
6,175,323 UART: ____ _ _ _ ____ _____
6,176,107 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,176,907 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,177,675 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,178,443 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,179,211 UART: |_|
6,179,523 UART:
6,546,132 UART: [rt] Runtime listening for mailbox commands...
6,547,330 >>> mbox cmd response data (48 bytes)
6,547,331 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,550,118 >>> mbox cmd response data (48 bytes)
6,550,119 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,568,264 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,092 UART: [state] LifecycleState = Unprovisioned
85,747 UART: [state] DebugLocked = No
86,231 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,040 UART: [kat] ++
895,192 UART: [kat] sha1
899,476 UART: [kat] SHA2-256
901,416 UART: [kat] SHA2-384
904,273 UART: [kat] SHA2-512-ACC
906,174 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,289 UART: [kat] LMS
1,168,601 UART: [kat] --
1,169,340 UART: [cold-reset] ++
1,169,904 UART: [fht] FHT @ 0x50003400
1,172,490 UART: [idev] ++
1,172,658 UART: [idev] CDI.KEYID = 6
1,173,019 UART: [idev] SUBJECT.KEYID = 7
1,173,444 UART: [idev] UDS.KEYID = 0
1,173,790 ready_for_fw is high
1,173,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,197,817 UART: [idev] Sha1 KeyId Algorithm
1,206,681 UART: [idev] --
1,207,754 UART: [ldev] ++
1,207,922 UART: [ldev] CDI.KEYID = 6
1,208,286 UART: [ldev] SUBJECT.KEYID = 5
1,208,713 UART: [ldev] AUTHORITY.KEYID = 7
1,209,176 UART: [ldev] FE.KEYID = 1
1,214,034 UART: [ldev] Erasing FE.KEYID = 1
1,240,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,236 UART: [ldev] --
1,279,629 UART: [fwproc] Wait for Commands...
1,280,280 UART: [fwproc] Recv command 0x46574c44
1,281,013 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,525 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,700 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,867 >>> mbox cmd response: success
2,824,955 UART: [afmc] ++
2,825,123 UART: [afmc] CDI.KEYID = 6
2,825,486 UART: [afmc] SUBJECT.KEYID = 7
2,825,912 UART: [afmc] AUTHORITY.KEYID = 5
2,861,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,564 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,313 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,023 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,605 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,560 UART: [afmc] --
2,904,435 UART: [cold-reset] --
2,905,085 UART: [state] Locking Datavault
2,906,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,688 UART: [state] Locking ICCM
2,907,290 UART: [exit] Launching FMC @ 0x40000130
2,912,620 UART:
2,912,636 UART: Running Caliptra FMC ...
2,913,044 UART:
2,913,098 UART: [state] CFI Enabled
2,923,294 UART: [fht] FMC Alias Private Key: 7
3,041,960 UART: [art] Extend RT PCRs Done
3,042,388 UART: [art] Lock RT PCRs Done
3,043,674 UART: [art] Populate DV Done
3,051,959 UART: [fht] FMC Alias Private Key: 7
3,052,965 UART: [art] Derive CDI
3,053,245 UART: [art] Store in slot 0x4
3,139,392 UART: [art] Derive Key Pair
3,139,752 UART: [art] Store priv key in slot 0x5
3,153,226 UART: [art] Derive Key Pair - Done
3,168,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,935 UART: [art] PUB.X = 6ABBFA55530D613237E0316A7C96E0939D896B5AA3A382BCDF4A341C40BD8413FB500FF216539D321E85953372696133
3,191,695 UART: [art] PUB.Y = D68D0F36C79C4196DEEC564A6AA6449CA90546F76BA933A55927BC1ECDE137F5212E79A87FA91EB5C0D68F1A1FEC4168
3,198,653 UART: [art] SIG.R = 8F57275277C1E61FC53A7F5DBAC9026A390DB156506F7864C5787BE4899B24873A91CED9FA288C933596EAC6DC90A7CF
3,205,423 UART: [art] SIG.S = C0C45D07BB8CC7C0B8953FACDC96B2B104822F3D8CF11FAD2571B3C19A7DA95AC4616247A52DC3C6771A0DF9744211F2
3,229,446 UART: Caliptra RT
3,229,697 UART: [state] CFI Enabled
3,349,047 UART: [rt] RT listening for mailbox commands...
3,349,717 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,117 UART: [rt]cmd =0x4d454153, len=108
3,401,207 >>> mbox cmd response data (12 bytes)
3,401,208 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,401,869 UART:
3,401,885 UART: Running Caliptra ROM ...
3,402,293 UART:
3,402,348 UART: [state] CFI Enabled
3,405,278 UART: [state] LifecycleState = Unprovisioned
3,405,933 UART: [state] DebugLocked = No
3,406,507 UART: [state] WD Timer not started. Device not locked for debugging
3,407,835 UART: [kat] SHA2-256
4,211,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,215,489 UART: [kat] ++
4,215,641 UART: [kat] sha1
4,219,911 UART: [kat] SHA2-256
4,221,851 UART: [kat] SHA2-384
4,224,560 UART: [kat] SHA2-512-ACC
4,226,460 UART: [kat] ECC-384
4,236,057 UART: [kat] HMAC-384Kdf
4,240,675 UART: [kat] LMS
4,488,987 UART: [kat] --
4,490,099 UART: [update-reset] ++
5,440,075 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,441,258 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,542,899 >>> mbox cmd response: success
5,542,899 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,543,188 UART: [update-reset] Copying MAN_2 To MAN_1
5,551,202 UART: [update-reset Success] --
5,552,463 UART: [state] Locking Datavault
5,553,039 UART: [state] Locking PCR0, PCR1 and PCR31
5,553,643 UART: [state] Locking ICCM
5,554,157 UART: [exit] Launching FMC @ 0x40000130
5,559,487 UART:
5,559,503 UART: Running Caliptra FMC ...
5,559,911 UART:
5,559,965 UART: [state] CFI Enabled
5,649,270 UART: [art] Extend RT PCRs Done
5,649,698 UART: [art] Lock RT PCRs Done
5,650,871 UART: [art] Populate DV Done
5,659,194 UART: [fht] FMC Alias Private Key: 7
5,660,284 UART: [art] Derive CDI
5,660,564 UART: [art] Store in slot 0x4
5,745,973 UART: [art] Derive Key Pair
5,746,333 UART: [art] Store priv key in slot 0x5
5,759,569 UART: [art] Derive Key Pair - Done
5,774,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,789,754 UART: [art] Erasing AUTHORITY.KEYID = 7
5,790,519 UART: [art] PUB.X = 69A4837270981AEE07B28D765B77FF7898455AF3FD0B5ACE4CD871B30AE96F2340EEC3A7FD98F07701704665BDDF203B
5,797,285 UART: [art] PUB.Y = 75E8C3FB1602107DA3F37144FF97A6BDD5D6EC827C868BE2F0B80D11159BCE86D36378CEFEC1CAF62B9BDD2FB3409CC0
5,804,251 UART: [art] SIG.R = 635DF6C6707B6541D59B929F149AFC3CF45E2B544358F0EB7A1AAFC32D28D1A3B74AEE06EFF47C1F7E36E5B3B3A72A3D
5,811,038 UART: [art] SIG.S = 7D45CC442A040FF7A5C797FA235E1D0CB39FF9B623D978070AA4370A5357D046E7388585E0821BBF17E486F67F2814D0
5,834,522 UART: mbox::rt_entry...
5,834,894 UART: ____ _ _ _ ____ _____
5,835,678 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,836,478 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,837,246 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,838,014 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,838,782 UART: |_|
5,839,094 UART:
6,198,863 UART: [rt] Runtime listening for mailbox commands...
6,200,061 >>> mbox cmd response data (48 bytes)
6,200,062 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,202,849 >>> mbox cmd response data (48 bytes)
6,202,850 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,220,995 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,980 ready_for_fw is high
1,059,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,786 >>> mbox cmd response: success
2,741,713 UART:
2,741,729 UART: Running Caliptra FMC ...
2,742,137 UART:
2,742,191 UART: [state] CFI Enabled
2,752,471 UART: [fht] FMC Alias Private Key: 7
2,871,087 UART: [art] Extend RT PCRs Done
2,871,515 UART: [art] Lock RT PCRs Done
2,873,029 UART: [art] Populate DV Done
2,881,336 UART: [fht] FMC Alias Private Key: 7
2,882,426 UART: [art] Derive CDI
2,882,706 UART: [art] Store in slot 0x4
2,968,481 UART: [art] Derive Key Pair
2,968,841 UART: [art] Store priv key in slot 0x5
2,982,015 UART: [art] Derive Key Pair - Done
2,996,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,392 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,157 UART: [art] PUB.X = 44EB2D25FFEC1BEC9630AF1638B3FC12552FACC5138E92CE67C17A956A34D70A3FC1F752B6C170BB04817F690761E626
3,019,928 UART: [art] PUB.Y = 9E02CF64CEDAEB247FA1F04392B2ED51119DC18647A6027D5C972F3A83698957BFEAA82970B0C09FBA26500B09339087
3,026,870 UART: [art] SIG.R = 4D5BEE1C0256C9E229304AFCAF8CC4A9F22B5319FC5F724D07D19F36C2DD78BC76F8B99508C9509DD76A59516D8E924B
3,033,643 UART: [art] SIG.S = CCF3E21248EA3729FB8292946F466EEB18DCFDFB2A8CEFF279F7BB414977C1BE56B8F484EAD1D127169831DC40C7CBC9
3,058,109 UART: Caliptra RT
3,058,360 UART: [state] CFI Enabled
3,178,513 UART: [rt] RT listening for mailbox commands...
3,179,183 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,703 UART: [rt]cmd =0x4d454153, len=108
3,229,579 >>> mbox cmd response data (12 bytes)
3,229,580 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,255,633 >>> mbox cmd response: success
5,255,633 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,269,294 UART:
5,269,310 UART: Running Caliptra FMC ...
5,269,718 UART:
5,269,772 UART: [state] CFI Enabled
5,359,121 UART: [art] Extend RT PCRs Done
5,359,549 UART: [art] Lock RT PCRs Done
5,360,990 UART: [art] Populate DV Done
5,369,333 UART: [fht] FMC Alias Private Key: 7
5,370,353 UART: [art] Derive CDI
5,370,633 UART: [art] Store in slot 0x4
5,456,746 UART: [art] Derive Key Pair
5,457,106 UART: [art] Store priv key in slot 0x5
5,470,360 UART: [art] Derive Key Pair - Done
5,485,175 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,500,422 UART: [art] Erasing AUTHORITY.KEYID = 7
5,501,187 UART: [art] PUB.X = 07B2749D84ED206B66820C0A0A6FFEF35B3D221FCFC3B240E2F95D6C9EBC3E152E1E3A9A53ED77B9AD011AB5393A4B3B
5,507,962 UART: [art] PUB.Y = 9E24A8FB6801A4F35DDD513779A1EF6B25609C69E34B860E19C642869B9B43FE6B115E61226FBF2DDE1D21E642E79990
5,514,910 UART: [art] SIG.R = C9BF054B26F11B29308D46256FD9B2CB166B84C76AF75E19DDDB71A121265DE7AE7C9094088E2A16B96D582868C643EF
5,521,680 UART: [art] SIG.S = EA59EF7BA16E0234024B62F95F148359D5C0B40005BACEA2E9C7233D797AE25AF7CDB0BA694E6663919972AD212373E7
5,544,859 UART: mbox::rt_entry...
5,545,231 UART: ____ _ _ _ ____ _____
5,546,015 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,546,815 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,547,583 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,548,351 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,549,119 UART: |_|
5,549,431 UART:
5,912,110 UART: [rt] Runtime listening for mailbox commands...
5,913,308 >>> mbox cmd response data (48 bytes)
5,913,309 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,916,096 >>> mbox cmd response data (48 bytes)
5,916,097 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,934,242 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,427 UART: [state] LifecycleState = Unprovisioned
86,082 UART: [state] DebugLocked = No
86,592 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
891,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,387 UART: [kat] ++
895,539 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
915,914 UART: [kat] HMAC-384Kdf
920,458 UART: [kat] LMS
1,168,770 UART: [kat] --
1,169,853 UART: [cold-reset] ++
1,170,219 UART: [fht] FHT @ 0x50003400
1,172,739 UART: [idev] ++
1,172,907 UART: [idev] CDI.KEYID = 6
1,173,268 UART: [idev] SUBJECT.KEYID = 7
1,173,693 UART: [idev] UDS.KEYID = 0
1,174,039 ready_for_fw is high
1,174,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,750 UART: [idev] Erasing UDS.KEYID = 0
1,198,614 UART: [idev] Sha1 KeyId Algorithm
1,207,546 UART: [idev] --
1,208,417 UART: [ldev] ++
1,208,585 UART: [ldev] CDI.KEYID = 6
1,208,949 UART: [ldev] SUBJECT.KEYID = 5
1,209,376 UART: [ldev] AUTHORITY.KEYID = 7
1,209,839 UART: [ldev] FE.KEYID = 1
1,215,123 UART: [ldev] Erasing FE.KEYID = 1
1,241,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,483 UART: [ldev] --
1,280,808 UART: [fwproc] Wait for Commands...
1,281,417 UART: [fwproc] Recv command 0x46574c44
1,282,150 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,823 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,587 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,766 >>> mbox cmd response: success
2,825,862 UART: [afmc] ++
2,826,030 UART: [afmc] CDI.KEYID = 6
2,826,393 UART: [afmc] SUBJECT.KEYID = 7
2,826,819 UART: [afmc] AUTHORITY.KEYID = 5
2,862,218 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,363 UART: [afmc] --
2,905,256 UART: [cold-reset] --
2,906,212 UART: [state] Locking Datavault
2,907,421 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,025 UART: [state] Locking ICCM
2,908,495 UART: [exit] Launching FMC @ 0x40000130
2,913,825 UART:
2,913,841 UART: Running Caliptra FMC ...
2,914,249 UART:
2,914,392 UART: [state] CFI Enabled
2,925,036 UART: [fht] FMC Alias Private Key: 7
3,043,880 UART: [art] Extend RT PCRs Done
3,044,308 UART: [art] Lock RT PCRs Done
3,045,940 UART: [art] Populate DV Done
3,054,491 UART: [fht] FMC Alias Private Key: 7
3,055,423 UART: [art] Derive CDI
3,055,703 UART: [art] Store in slot 0x4
3,141,358 UART: [art] Derive Key Pair
3,141,718 UART: [art] Store priv key in slot 0x5
3,154,822 UART: [art] Derive Key Pair - Done
3,169,418 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,331 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,096 UART: [art] PUB.X = 583614F1DAE28115B1EB68E939E492ED0920B072BF68C01A5BE2CE3187192AF406C079F1844BE89EBE1ED2E85EB1FCFF
3,192,874 UART: [art] PUB.Y = 9EE2E69760383072B1D7416F05439B5641DCCC56380E949789D61A5E7356D26059B39F6D1EFFA7DE17D4A201D05AD588
3,199,813 UART: [art] SIG.R = 18108587646497A16076B3DA2A41FADC7B8C0ABD3F410EA30E40E792460ACD2217106F552872FDA19775860DE59224BC
3,206,566 UART: [art] SIG.S = 53806145D017F99DC734A02263A98562B2073EA4E1191287A029541E5B610E34BC2B0761E5638B413883B2BFE54C598E
3,230,339 UART: Caliptra RT
3,230,682 UART: [state] CFI Enabled
3,349,764 UART: [rt] RT listening for mailbox commands...
3,350,434 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,708 UART: [rt]cmd =0x4d454153, len=108
3,401,976 >>> mbox cmd response data (12 bytes)
3,401,977 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,402,924 UART:
3,402,940 UART: Running Caliptra ROM ...
3,403,348 UART:
3,403,490 UART: [state] CFI Enabled
3,406,482 UART: [state] LifecycleState = Unprovisioned
3,407,137 UART: [state] DebugLocked = No
3,407,835 UART: [state] WD Timer not started. Device not locked for debugging
3,408,941 UART: [kat] SHA2-256
4,212,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,216,595 UART: [kat] ++
4,216,747 UART: [kat] sha1
4,221,007 UART: [kat] SHA2-256
4,222,947 UART: [kat] SHA2-384
4,225,844 UART: [kat] SHA2-512-ACC
4,227,744 UART: [kat] ECC-384
4,237,207 UART: [kat] HMAC-384Kdf
4,241,925 UART: [kat] LMS
4,490,237 UART: [kat] --
4,491,323 UART: [update-reset] ++
5,441,655 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,442,796 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,544,437 >>> mbox cmd response: success
5,544,437 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,544,626 UART: [update-reset] Copying MAN_2 To MAN_1
5,552,640 UART: [update-reset Success] --
5,553,509 UART: [state] Locking Datavault
5,554,417 UART: [state] Locking PCR0, PCR1 and PCR31
5,555,021 UART: [state] Locking ICCM
5,555,547 UART: [exit] Launching FMC @ 0x40000130
5,560,877 UART:
5,560,893 UART: Running Caliptra FMC ...
5,561,301 UART:
5,561,444 UART: [state] CFI Enabled
5,650,711 UART: [art] Extend RT PCRs Done
5,651,139 UART: [art] Lock RT PCRs Done
5,652,722 UART: [art] Populate DV Done
5,661,127 UART: [fht] FMC Alias Private Key: 7
5,662,295 UART: [art] Derive CDI
5,662,575 UART: [art] Store in slot 0x4
5,748,568 UART: [art] Derive Key Pair
5,748,928 UART: [art] Store priv key in slot 0x5
5,762,806 UART: [art] Derive Key Pair - Done
5,777,810 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,793,459 UART: [art] Erasing AUTHORITY.KEYID = 7
5,794,224 UART: [art] PUB.X = 63C597A29D2951405B691E2F75EFF6D6A31BA6C2CD6554214C924C5C8050C321B06B264E9809591CDA3FCCA7BEA840E1
5,800,997 UART: [art] PUB.Y = 292B7F2D9B5E8A2A4E79AD261037CEB4995BC87F20747B007056C59EEE0131791A5082BC8A808E3562CA3216CD5F1D12
5,807,924 UART: [art] SIG.R = CA030AD679BF9FAD252CB6218EC7F8DA2F691F81BE90C3E07C3A5118BD11D41464519CB021B783430BD8F55BFECE4F51
5,814,701 UART: [art] SIG.S = 28E81A24824B66E83C09F7D888537652018E1DF89B4CC835348BC5CA5F7FCFCB0DDB7288D43FEEC44EF9DE489DAC1DAD
5,838,832 UART: mbox::rt_entry...
5,839,204 UART: ____ _ _ _ ____ _____
5,839,988 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,840,788 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,841,556 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,842,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,843,092 UART: |_|
5,843,404 UART:
6,207,974 UART: [rt] Runtime listening for mailbox commands...
6,209,172 >>> mbox cmd response data (48 bytes)
6,209,173 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,211,960 >>> mbox cmd response data (48 bytes)
6,211,961 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,230,106 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,955 ready_for_fw is high
1,058,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,349 >>> mbox cmd response: success
2,739,158 UART:
2,739,174 UART: Running Caliptra FMC ...
2,739,582 UART:
2,739,725 UART: [state] CFI Enabled
2,750,519 UART: [fht] FMC Alias Private Key: 7
2,869,761 UART: [art] Extend RT PCRs Done
2,870,189 UART: [art] Lock RT PCRs Done
2,872,041 UART: [art] Populate DV Done
2,880,408 UART: [fht] FMC Alias Private Key: 7
2,881,348 UART: [art] Derive CDI
2,881,628 UART: [art] Store in slot 0x4
2,967,595 UART: [art] Derive Key Pair
2,967,955 UART: [art] Store priv key in slot 0x5
2,981,223 UART: [art] Derive Key Pair - Done
2,995,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,375 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,140 UART: [art] PUB.X = A13CBD9557A47C21A8D550C7C36FA9CD8BA2D89D86010CE4D28601F833D434B36DB791731C0BE2871C21F3985DE648E1
3,018,904 UART: [art] PUB.Y = 32964AAD7043B212B3E16144FFFBA5E7AC95831EFA57624DD86844ED5ED4E80D8F0A6055B671E932221B882B10371EF0
3,025,852 UART: [art] SIG.R = 3BCD7AACDA78D914BFFBF8F7FDB94D81EFCADB90132BBE585C7106EAA82966A45ADBF3D3E67607803A1A796D263213D7
3,032,640 UART: [art] SIG.S = 804C78726896B032DC9C9763C345745AFB8FEBD0BA14ECB02A4298BE1BF36B1BF6D8BD214625A3F8CE251C1224B4A916
3,056,258 UART: Caliptra RT
3,056,601 UART: [state] CFI Enabled
3,176,190 UART: [rt] RT listening for mailbox commands...
3,176,860 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,760 UART: [rt]cmd =0x4d454153, len=108
3,228,946 >>> mbox cmd response data (12 bytes)
3,228,947 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,254,541 >>> mbox cmd response: success
5,254,541 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,268,200 UART:
5,268,216 UART: Running Caliptra FMC ...
5,268,624 UART:
5,268,767 UART: [state] CFI Enabled
5,358,270 UART: [art] Extend RT PCRs Done
5,358,698 UART: [art] Lock RT PCRs Done
5,360,239 UART: [art] Populate DV Done
5,368,426 UART: [fht] FMC Alias Private Key: 7
5,369,378 UART: [art] Derive CDI
5,369,658 UART: [art] Store in slot 0x4
5,455,163 UART: [art] Derive Key Pair
5,455,523 UART: [art] Store priv key in slot 0x5
5,468,365 UART: [art] Derive Key Pair - Done
5,482,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,498,437 UART: [art] Erasing AUTHORITY.KEYID = 7
5,499,202 UART: [art] PUB.X = 0EDE0C42CC133655405E08D5492C57B36BFBA23FAA37F417AC2FAA23A490B006E97D6C9684F6CCF99537DB6C8FED67B8
5,505,976 UART: [art] PUB.Y = 176F294D5B9D701896F994988B49A762EA98917C2B94D72802811927A3574E7C7FA2CE3BFD2D1C6A766FB155ED8B7C15
5,512,923 UART: [art] SIG.R = CFA87663563CB57D15A01DFB05B1083666CC6F1685936CDE47B2ADBC4A3D4ACB4E44897B6233EA403CD99D3E30ADED63
5,519,703 UART: [art] SIG.S = F30141A45F89522550B0F9C5F7C993800F676570A07A507DE18DB9C2C8A768424B67F31FE6875C53E7067192E187F01F
5,543,286 UART: mbox::rt_entry...
5,543,658 UART: ____ _ _ _ ____ _____
5,544,442 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,545,242 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,546,010 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,546,778 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,547,546 UART: |_|
5,547,858 UART:
5,908,457 UART: [rt] Runtime listening for mailbox commands...
5,909,655 >>> mbox cmd response data (48 bytes)
5,909,656 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,912,443 >>> mbox cmd response data (48 bytes)
5,912,444 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,930,589 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
902,015 UART: [kat] SHA2-256
903,955 UART: [kat] SHA2-384
906,712 UART: [kat] SHA2-512-ACC
908,613 UART: [kat] ECC-384
918,418 UART: [kat] HMAC-384Kdf
922,866 UART: [kat] LMS
1,171,194 UART: [kat] --
1,171,855 UART: [cold-reset] ++
1,172,393 UART: [fht] FHT @ 0x50003400
1,174,974 UART: [idev] ++
1,175,142 UART: [idev] CDI.KEYID = 6
1,175,502 UART: [idev] SUBJECT.KEYID = 7
1,175,926 UART: [idev] UDS.KEYID = 0
1,176,271 ready_for_fw is high
1,176,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,728 UART: [idev] Erasing UDS.KEYID = 0
1,200,373 UART: [idev] Sha1 KeyId Algorithm
1,208,787 UART: [idev] --
1,209,857 UART: [ldev] ++
1,210,025 UART: [ldev] CDI.KEYID = 6
1,210,388 UART: [ldev] SUBJECT.KEYID = 5
1,210,814 UART: [ldev] AUTHORITY.KEYID = 7
1,211,277 UART: [ldev] FE.KEYID = 1
1,216,261 UART: [ldev] Erasing FE.KEYID = 1
1,242,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,329 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,932 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,011 UART: [ldev] --
1,281,356 UART: [fwproc] Wait for Commands...
1,281,990 UART: [fwproc] Recv command 0x46574c44
1,282,718 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,604 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,867 >>> mbox cmd response: success
2,828,011 UART: [afmc] ++
2,828,179 UART: [afmc] CDI.KEYID = 6
2,828,541 UART: [afmc] SUBJECT.KEYID = 7
2,828,966 UART: [afmc] AUTHORITY.KEYID = 5
2,864,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,758 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,506 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,215 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,098 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,799 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,669 UART: [afmc] --
2,907,749 UART: [cold-reset] --
2,908,603 UART: [state] Locking Datavault
2,909,678 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,282 UART: [state] Locking ICCM
2,910,710 UART: [exit] Launching FMC @ 0x40000130
2,916,040 UART:
2,916,056 UART: Running Caliptra FMC ...
2,916,464 UART:
2,916,518 UART: [state] CFI Enabled
2,927,310 UART: [fht] FMC Alias Private Key: 7
3,046,728 UART: [art] Extend RT PCRs Done
3,047,156 UART: [art] Lock RT PCRs Done
3,048,710 UART: [art] Populate DV Done
3,056,947 UART: [fht] FMC Alias Private Key: 7
3,057,927 UART: [art] Derive CDI
3,058,207 UART: [art] Store in slot 0x4
3,143,664 UART: [art] Derive Key Pair
3,144,024 UART: [art] Store priv key in slot 0x5
3,158,062 UART: [art] Derive Key Pair - Done
3,172,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,851 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,616 UART: [art] PUB.X = 1DC9B69D4F00DA9CBBD66820CA7AF22167191790A91626ED40584DA2632904949315E4D58534B60594B6D9E80B5E3812
3,195,349 UART: [art] PUB.Y = E989BC3C1B04EBCBCDD3F5D499CF178B2D79F7052DC749AE5D544C4AC5FAB68E1FEC70C44F4494919D0A1D59D0FB00DF
3,202,294 UART: [art] SIG.R = 10B3B3F61B8DA3433F2B37592A3176F5DCACD4F3520CA807670538C651AE8FC3116A8B5FDB4A02A9897DCBB774910BBE
3,209,061 UART: [art] SIG.S = 9AD359AEB8E6BB36F1B5D1D729ACF4873D7CA990318D689303F105FA5E5020AACA3B12A5A2050FD073F925649BA15F08
3,233,350 UART: Caliptra RT
3,233,601 UART: [state] CFI Enabled
3,353,684 UART: [rt] RT listening for mailbox commands...
3,354,354 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,122 UART: [rt]cmd =0x4d454153, len=108
3,405,882 >>> mbox cmd response data (12 bytes)
3,405,883 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,922 UART:
3,406,938 UART: Running Caliptra ROM ...
3,407,346 UART:
3,407,401 UART: [state] CFI Enabled
3,410,307 UART: [state] LifecycleState = Unprovisioned
3,410,962 UART: [state] DebugLocked = No
3,411,608 UART: [state] WD Timer not started. Device not locked for debugging
3,412,802 UART: [kat] SHA2-256
4,218,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,222,577 UART: [kat] ++
4,222,729 UART: [kat] sha1
4,226,871 UART: [kat] SHA2-256
4,228,811 UART: [kat] SHA2-384
4,231,536 UART: [kat] SHA2-512-ACC
4,233,436 UART: [kat] ECC-384
4,242,607 UART: [kat] HMAC-384Kdf
4,247,229 UART: [kat] LMS
4,495,557 UART: [kat] --
4,496,581 UART: [update-reset] ++
5,445,200 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,446,235 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,547,876 >>> mbox cmd response: success
5,547,876 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,548,203 UART: [update-reset] Copying MAN_2 To MAN_1
5,556,217 UART: [update-reset Success] --
5,557,014 UART: [state] Locking Datavault
5,557,922 UART: [state] Locking PCR0, PCR1 and PCR31
5,558,526 UART: [state] Locking ICCM
5,558,968 UART: [exit] Launching FMC @ 0x40000130
5,564,298 UART:
5,564,314 UART: Running Caliptra FMC ...
5,564,722 UART:
5,564,776 UART: [state] CFI Enabled
5,653,729 UART: [art] Extend RT PCRs Done
5,654,157 UART: [art] Lock RT PCRs Done
5,655,594 UART: [art] Populate DV Done
5,663,489 UART: [fht] FMC Alias Private Key: 7
5,664,487 UART: [art] Derive CDI
5,664,767 UART: [art] Store in slot 0x4
5,750,762 UART: [art] Derive Key Pair
5,751,122 UART: [art] Store priv key in slot 0x5
5,764,144 UART: [art] Derive Key Pair - Done
5,778,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,794,557 UART: [art] Erasing AUTHORITY.KEYID = 7
5,795,322 UART: [art] PUB.X = 27B6D1049E0CA854F9BC85DBE5534D41AE534A9960F0AFA60B19723D4A1DB0D3045B73B2193BBE3BB70AD3464FEA80A1
5,802,091 UART: [art] PUB.Y = EE0ECA4764FD36AFCB427E2C5F996CB7B3B91747D37F16FC646B6303A43DD4CA6B487FBC507674BA8C13AFCAE752CA2E
5,809,059 UART: [art] SIG.R = 7F1378CEA88221574CCACCBB580D786F755D1C622F9E2C4D0BA78C78234EB736243C65BC37218A546958F950E97CBF2E
5,815,829 UART: [art] SIG.S = F02D47CE2B4245A3FCC8E9C2DAD621977F09FAC06F8DB6D11885319706F0498C39CB70751424209C65F94DF4F13B00F1
5,839,549 UART: mbox::rt_entry...
5,839,921 UART: ____ _ _ _ ____ _____
5,840,705 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,841,505 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,842,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,843,041 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,843,809 UART: |_|
5,844,121 UART:
6,204,761 UART: [rt] Runtime listening for mailbox commands...
6,205,959 >>> mbox cmd response data (48 bytes)
6,205,960 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,208,747 >>> mbox cmd response data (48 bytes)
6,208,748 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,226,893 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,065 ready_for_fw is high
1,060,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,144 >>> mbox cmd response: success
2,739,707 UART:
2,739,723 UART: Running Caliptra FMC ...
2,740,131 UART:
2,740,185 UART: [state] CFI Enabled
2,750,557 UART: [fht] FMC Alias Private Key: 7
2,869,429 UART: [art] Extend RT PCRs Done
2,869,857 UART: [art] Lock RT PCRs Done
2,871,005 UART: [art] Populate DV Done
2,879,080 UART: [fht] FMC Alias Private Key: 7
2,880,128 UART: [art] Derive CDI
2,880,408 UART: [art] Store in slot 0x4
2,966,307 UART: [art] Derive Key Pair
2,966,667 UART: [art] Store priv key in slot 0x5
2,979,565 UART: [art] Derive Key Pair - Done
2,994,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,518 UART: [art] PUB.X = D146C2DE6CF3A92AA5B2D57DD156561A34678953062ECB4CACE6DBD4CFA230A86C37381552D76240D2061435320BE94E
3,017,285 UART: [art] PUB.Y = AAF74BBA013CC0478E4A2E287CADFD18C00FCF003436233BCD01D2DB4562F37A74C877FC0E991932B00E5A254E190780
3,024,205 UART: [art] SIG.R = 10011976C9A77BE043B58B1FE5191740A244CC524639145CA34D100B8FA61D468583499F1E16DED630F6A901518B704E
3,030,958 UART: [art] SIG.S = F1EC97F203657806306AF47DA19D9181C95FC5BD1BE2D368AC7323DC811FECEBC68AC8BC1FFED3CC2D47B63C53523E32
3,054,984 UART: Caliptra RT
3,055,235 UART: [state] CFI Enabled
3,175,010 UART: [rt] RT listening for mailbox commands...
3,175,680 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,934 UART: [rt]cmd =0x4d454153, len=108
3,226,166 >>> mbox cmd response data (12 bytes)
3,226,167 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,253,343 >>> mbox cmd response: success
5,253,343 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,266,844 UART:
5,266,860 UART: Running Caliptra FMC ...
5,267,268 UART:
5,267,322 UART: [state] CFI Enabled
5,356,199 UART: [art] Extend RT PCRs Done
5,356,627 UART: [art] Lock RT PCRs Done
5,357,868 UART: [art] Populate DV Done
5,366,069 UART: [fht] FMC Alias Private Key: 7
5,367,145 UART: [art] Derive CDI
5,367,425 UART: [art] Store in slot 0x4
5,453,144 UART: [art] Derive Key Pair
5,453,504 UART: [art] Store priv key in slot 0x5
5,466,924 UART: [art] Derive Key Pair - Done
5,481,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,497,051 UART: [art] Erasing AUTHORITY.KEYID = 7
5,497,816 UART: [art] PUB.X = 58CD727C25314A8812E11D0D151B6E2917D90C270EA9F6B2D02BA675099D6A4DBFA7C1E73B6365BAD1FC71D0A13A10D8
5,504,584 UART: [art] PUB.Y = 02409C5E738F16C7C8D1ECA6B6DA148EC159D74C0E977FA66C1E36C6404E4A4DFFBD03B781B279EA292346C6EB058A83
5,511,534 UART: [art] SIG.R = D7D780BA9DAD484A03BCF8682F089C521A62506CB23004B2E7233F0C4D301BCAFD1EEE7D9040B46A0B835D3B7248F579
5,518,299 UART: [art] SIG.S = 82A64DDF68AE5D50A2FD8AE220923EE2D22943684F3FEAFC7E04980912D1BC6EDC825FA4CAF81B7EEB93376422684BA4
5,541,709 UART: mbox::rt_entry...
5,542,081 UART: ____ _ _ _ ____ _____
5,542,865 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,543,665 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,544,433 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,545,201 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,545,969 UART: |_|
5,546,281 UART:
5,906,260 UART: [rt] Runtime listening for mailbox commands...
5,907,458 >>> mbox cmd response data (48 bytes)
5,907,459 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,910,246 >>> mbox cmd response data (48 bytes)
5,910,247 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,928,392 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,533 UART: [kat] SHA2-256
893,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,308 UART: [kat] ++
897,460 UART: [kat] sha1
901,690 UART: [kat] SHA2-256
903,630 UART: [kat] SHA2-384
906,157 UART: [kat] SHA2-512-ACC
908,058 UART: [kat] ECC-384
917,643 UART: [kat] HMAC-384Kdf
922,243 UART: [kat] LMS
1,170,571 UART: [kat] --
1,171,738 UART: [cold-reset] ++
1,172,086 UART: [fht] FHT @ 0x50003400
1,174,655 UART: [idev] ++
1,174,823 UART: [idev] CDI.KEYID = 6
1,175,183 UART: [idev] SUBJECT.KEYID = 7
1,175,607 UART: [idev] UDS.KEYID = 0
1,175,952 ready_for_fw is high
1,175,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,587 UART: [idev] Erasing UDS.KEYID = 0
1,200,828 UART: [idev] Sha1 KeyId Algorithm
1,209,486 UART: [idev] --
1,210,594 UART: [ldev] ++
1,210,762 UART: [ldev] CDI.KEYID = 6
1,211,125 UART: [ldev] SUBJECT.KEYID = 5
1,211,551 UART: [ldev] AUTHORITY.KEYID = 7
1,212,014 UART: [ldev] FE.KEYID = 1
1,217,092 UART: [ldev] Erasing FE.KEYID = 1
1,244,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,424 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,031 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,743 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,864 UART: [ldev] --
1,283,221 UART: [fwproc] Wait for Commands...
1,283,925 UART: [fwproc] Recv command 0x46574c44
1,284,653 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,872 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,411 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,734 >>> mbox cmd response: success
2,828,982 UART: [afmc] ++
2,829,150 UART: [afmc] CDI.KEYID = 6
2,829,512 UART: [afmc] SUBJECT.KEYID = 7
2,829,937 UART: [afmc] AUTHORITY.KEYID = 5
2,865,532 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,211 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,959 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,668 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,551 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,252 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,202 UART: [afmc] --
2,909,182 UART: [cold-reset] --
2,910,024 UART: [state] Locking Datavault
2,911,077 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,681 UART: [state] Locking ICCM
2,912,149 UART: [exit] Launching FMC @ 0x40000130
2,917,479 UART:
2,917,495 UART: Running Caliptra FMC ...
2,917,903 UART:
2,918,046 UART: [state] CFI Enabled
2,928,638 UART: [fht] FMC Alias Private Key: 7
3,047,676 UART: [art] Extend RT PCRs Done
3,048,104 UART: [art] Lock RT PCRs Done
3,049,768 UART: [art] Populate DV Done
3,057,789 UART: [fht] FMC Alias Private Key: 7
3,058,819 UART: [art] Derive CDI
3,059,099 UART: [art] Store in slot 0x4
3,144,712 UART: [art] Derive Key Pair
3,145,072 UART: [art] Store priv key in slot 0x5
3,158,314 UART: [art] Derive Key Pair - Done
3,173,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,548 UART: [art] PUB.X = 1AB0145CE8B1185D0A8F8137DE568744BA34601CFACC6F5F2430C6054126B5D93C7E400E9298179C6C83DFBCADB799FE
3,196,319 UART: [art] PUB.Y = C2AB50AB076854B3437D0E09E366832215CC2CCD79009F72A8C5BF2AB622E7E4C2D815A2BE4F159A14C8FC00FA532DB5
3,203,228 UART: [art] SIG.R = D8BE23783AD0F98882F4BFF54F5A9B81D7E8C062DBF90E53187A8883E377C62E37C479C780876E609D630B16B6DB0778
3,209,991 UART: [art] SIG.S = A0F3AC5F11927C14DCE67EB1CC746083BF1F0B5861B2D569721A5D77C29A8E3A16BDC7AE6DABF84B2DA027F122BEA87C
3,233,780 UART: Caliptra RT
3,234,123 UART: [state] CFI Enabled
3,354,603 UART: [rt] RT listening for mailbox commands...
3,355,273 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,703 UART: [rt]cmd =0x4d454153, len=108
3,406,601 >>> mbox cmd response data (12 bytes)
3,406,602 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,219 UART:
3,407,235 UART: Running Caliptra ROM ...
3,407,643 UART:
3,407,785 UART: [state] CFI Enabled
3,410,855 UART: [state] LifecycleState = Unprovisioned
3,411,510 UART: [state] DebugLocked = No
3,412,214 UART: [state] WD Timer not started. Device not locked for debugging
3,413,384 UART: [kat] SHA2-256
4,219,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,223,159 UART: [kat] ++
4,223,311 UART: [kat] sha1
4,227,495 UART: [kat] SHA2-256
4,229,435 UART: [kat] SHA2-384
4,232,394 UART: [kat] SHA2-512-ACC
4,234,294 UART: [kat] ECC-384
4,243,901 UART: [kat] HMAC-384Kdf
4,248,323 UART: [kat] LMS
4,496,651 UART: [kat] --
4,497,619 UART: [update-reset] ++
5,447,662 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,448,823 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,550,464 >>> mbox cmd response: success
5,550,464 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,550,605 UART: [update-reset] Copying MAN_2 To MAN_1
5,558,619 UART: [update-reset Success] --
5,559,792 UART: [state] Locking Datavault
5,560,678 UART: [state] Locking PCR0, PCR1 and PCR31
5,561,282 UART: [state] Locking ICCM
5,561,876 UART: [exit] Launching FMC @ 0x40000130
5,567,206 UART:
5,567,222 UART: Running Caliptra FMC ...
5,567,630 UART:
5,567,773 UART: [state] CFI Enabled
5,657,076 UART: [art] Extend RT PCRs Done
5,657,504 UART: [art] Lock RT PCRs Done
5,658,823 UART: [art] Populate DV Done
5,667,166 UART: [fht] FMC Alias Private Key: 7
5,668,158 UART: [art] Derive CDI
5,668,438 UART: [art] Store in slot 0x4
5,754,479 UART: [art] Derive Key Pair
5,754,839 UART: [art] Store priv key in slot 0x5
5,768,653 UART: [art] Derive Key Pair - Done
5,783,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,798,810 UART: [art] Erasing AUTHORITY.KEYID = 7
5,799,575 UART: [art] PUB.X = 17B3AC3C667B50C4E844932FFC4B36A77C82A69B1ED05096AF2AEBF82D13E5148D849C8B5673740303C07201884E2A60
5,806,336 UART: [art] PUB.Y = 563E893171034B71C8EBE358D046C4942262DE2F5C2BB0356B2CFBA66EE5CA4A7D88920D50D0005536A3CF42667B0FE2
5,813,259 UART: [art] SIG.R = 20B99E6583E1CE646FD3C3B592AFE6B904F2DD4DADEA3474F114595889117A934ED0456A4B56213FE494FB7DEA7C2465
5,820,034 UART: [art] SIG.S = 5A222196CF656377478D8F9BBED2AA1029B23214724A907B4FA6E26641C58C49CEBB1E0765C5C363A01A6CA96A0FE9CD
5,843,550 UART: mbox::rt_entry...
5,843,922 UART: ____ _ _ _ ____ _____
5,844,706 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,845,506 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,846,274 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,847,042 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,847,810 UART: |_|
5,848,122 UART:
6,212,371 UART: [rt] Runtime listening for mailbox commands...
6,213,569 >>> mbox cmd response data (48 bytes)
6,213,570 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
6,216,357 >>> mbox cmd response data (48 bytes)
6,216,358 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
6,234,503 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,708 ready_for_fw is high
1,060,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,191 >>> mbox cmd response: success
2,744,004 UART:
2,744,020 UART: Running Caliptra FMC ...
2,744,428 UART:
2,744,571 UART: [state] CFI Enabled
2,755,771 UART: [fht] FMC Alias Private Key: 7
2,874,825 UART: [art] Extend RT PCRs Done
2,875,253 UART: [art] Lock RT PCRs Done
2,877,005 UART: [art] Populate DV Done
2,885,104 UART: [fht] FMC Alias Private Key: 7
2,886,102 UART: [art] Derive CDI
2,886,382 UART: [art] Store in slot 0x4
2,972,341 UART: [art] Derive Key Pair
2,972,701 UART: [art] Store priv key in slot 0x5
2,986,437 UART: [art] Derive Key Pair - Done
3,001,069 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,016,376 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,141 UART: [art] PUB.X = A8838505CFC9115804F32F5D4C93425682BC9A11676BDD861071F2C21B36A1793A640BD87A73F7D9E014F40A86A9DDA8
3,023,899 UART: [art] PUB.Y = 8A4A23DBA4F3DFB3C523F1496BBA54E49316A3E4AAB283413A228D4754D4BBDA026ADECF0442D8F72D56E0C24232B672
3,030,857 UART: [art] SIG.R = D3DF9E5EDF82A584470FAD8DDBE7BE707473BB9D4C534C7873E394EC982E42F24E16B28CD4B701F6D9CA41BA407F1495
3,037,637 UART: [art] SIG.S = 6BC2D308B6F1BB719D150B5CA14730BEAB3A90B27CE694C2606ED02A98926A73335F0DE4C8B028CF81CDF4FEDAC6C720
3,061,900 UART: Caliptra RT
3,062,243 UART: [state] CFI Enabled
3,182,208 UART: [rt] RT listening for mailbox commands...
3,182,878 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,298 UART: [rt]cmd =0x4d454153, len=108
3,234,884 >>> mbox cmd response data (12 bytes)
3,234,885 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,263,538 >>> mbox cmd response: success
5,263,538 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,276,599 UART:
5,276,615 UART: Running Caliptra FMC ...
5,277,023 UART:
5,277,166 UART: [state] CFI Enabled
5,366,713 UART: [art] Extend RT PCRs Done
5,367,141 UART: [art] Lock RT PCRs Done
5,368,198 UART: [art] Populate DV Done
5,376,221 UART: [fht] FMC Alias Private Key: 7
5,377,399 UART: [art] Derive CDI
5,377,679 UART: [art] Store in slot 0x4
5,463,552 UART: [art] Derive Key Pair
5,463,912 UART: [art] Store priv key in slot 0x5
5,477,114 UART: [art] Derive Key Pair - Done
5,491,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,506,822 UART: [art] Erasing AUTHORITY.KEYID = 7
5,507,587 UART: [art] PUB.X = 386E30D4548683B4B7B0459B7689CCAD24DA67BC54976068BDF6B073722DAB1F7019EA779A265F1402A30C981460CC7B
5,514,351 UART: [art] PUB.Y = FCCCC6D24C1F780B6218F89A7BA6482F1B0F12F0860D9B66F424641E477159284FA46EB1B081631B60341A030C704BD8
5,521,286 UART: [art] SIG.R = FF4439255624C44FAD8588135781F25643C992640E7C0A31A636A2A65DFFA7C9218706928F90510678A6F35CA1D4E332
5,528,034 UART: [art] SIG.S = 335921C9CFFFDC630C08CEC3517D79BF0215FAD822B3DB033BB34F90629E3159CBAD64C2E09FAA8C186BD3BFD8DB3F3B
5,551,368 UART: mbox::rt_entry...
5,551,740 UART: ____ _ _ _ ____ _____
5,552,524 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,553,324 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,554,092 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,554,860 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,555,628 UART: |_|
5,555,940 UART:
5,915,490 UART: [rt] Runtime listening for mailbox commands...
5,916,688 >>> mbox cmd response data (48 bytes)
5,916,689 <<< Executing mbox cmd 0x20000000 (0 bytes) from SoC
5,919,476 >>> mbox cmd response data (48 bytes)
5,919,477 <<< Executing mbox cmd 0x30000000 (0 bytes) from SoC
5,937,622 >>> mbox cmd response data (48 bytes)
test test_stash_measurement::test_stash_measurement ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
192,105 UART:
192,463 UART: Running Caliptra ROM ...
193,603 UART:
193,755 UART: [state] CFI Enabled
264,109 UART: [state] LifecycleState = Unprovisioned
266,084 UART: [state] DebugLocked = No
267,826 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,070 UART: [kat] SHA2-256
442,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,292 UART: [kat] ++
453,741 UART: [kat] sha1
464,758 UART: [kat] SHA2-256
467,417 UART: [kat] SHA2-384
473,620 UART: [kat] SHA2-512-ACC
475,985 UART: [kat] ECC-384
2,769,407 UART: [kat] HMAC-384Kdf
2,799,841 UART: [kat] LMS
3,990,178 UART: [kat] --
3,992,683 UART: [cold-reset] ++
3,994,969 UART: [fht] Storing FHT @ 0x50003400
4,006,089 UART: [idev] ++
4,006,675 UART: [idev] CDI.KEYID = 6
4,007,716 UART: [idev] SUBJECT.KEYID = 7
4,008,915 UART: [idev] UDS.KEYID = 0
4,009,966 ready_for_fw is high
4,010,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,270 UART: [idev] Erasing UDS.KEYID = 0
7,345,208 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,361 UART: [idev] --
7,372,517 UART: [ldev] ++
7,373,143 UART: [ldev] CDI.KEYID = 6
7,374,112 UART: [ldev] SUBJECT.KEYID = 5
7,375,271 UART: [ldev] AUTHORITY.KEYID = 7
7,376,553 UART: [ldev] FE.KEYID = 1
7,422,380 UART: [ldev] Erasing FE.KEYID = 1
10,753,736 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,261 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,883 UART: [ldev] --
13,116,960 UART: [fwproc] Waiting for Commands...
13,119,536 UART: [fwproc] Received command 0x46574c44
13,121,714 UART: [fwproc] Received Image of size 118548 bytes
17,231,620 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,556 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,716 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,710,040 >>> mbox cmd response: success
17,711,072 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,714,628 UART: [afmc] ++
17,715,224 UART: [afmc] CDI.KEYID = 6
17,716,135 UART: [afmc] SUBJECT.KEYID = 7
17,717,352 UART: [afmc] AUTHORITY.KEYID = 5
21,074,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,586 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,061 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,788 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,198 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,762 UART: [afmc] --
23,442,925 UART: [cold-reset] --
23,445,545 UART: [state] Locking Datavault
23,449,979 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,731 UART: [state] Locking ICCM
23,454,288 UART: [exit] Launching FMC @ 0x40000130
23,462,678 UART:
23,462,918 UART: Running Caliptra FMC ...
23,464,020 UART:
23,464,181 UART: [state] CFI Enabled
23,533,764 UART: [fht] FMC Alias Private Key: 7
25,874,525 UART: [art] Extend RT PCRs Done
25,875,764 UART: [art] Lock RT PCRs Done
25,877,519 UART: [art] Populate DV Done
25,882,810 UART: [fht] FMC Alias Private Key: 7
25,884,408 UART: [art] Derive CDI
25,885,146 UART: [art] Store in slot 0x4
25,942,164 UART: [art] Derive Key Pair
25,943,159 UART: [art] Store priv key in slot 0x5
29,235,720 UART: [art] Derive Key Pair - Done
29,248,715 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,806 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,323 UART: [art] PUB.X = 4DC487B89F457E9D99CCB49342156113764306916FFC467E9D264EEDECF97632F46C7A3A323A9582DED392F7C5B71A51
31,545,568 UART: [art] PUB.Y = 2EABCA6C78004861CD9EEBECFBE26382CC814C91B607C195BF17BD11E3B53A1607B3B4D22B4C459250615F1C1B0F7380
31,552,794 UART: [art] SIG.R = 9D591CF721585C618B76865AD41D85111F8D73FABBD9D9660DC794446C65F9D86663547B89E31AEE101EDC15F7BCD527
31,560,210 UART: [art] SIG.S = 4222760C375357B4F37B8A01B2DB82D4BA15E9AB3B77D7F1D53244BF6ACF9DD8ACF5867BDCFDB262EB3C95B1EE66E110
32,865,333 UART: Caliptra RT
32,866,052 UART: [state] CFI Enabled
33,042,413 UART: [rt] RT listening for mailbox commands...
33,073,784 UART: [rt]cmd =0x54514754, len=24
33,076,641 >>> mbox cmd response data (8 bytes)
33,077,156 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,107,105 UART: [rt]cmd =0x54514754, len=24
33,108,821 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,804,772 ready_for_fw is high
3,805,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,969,375 >>> mbox cmd response: success
17,970,940 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,668,616 UART:
23,669,016 UART: Running Caliptra FMC ...
23,670,128 UART:
23,670,279 UART: [state] CFI Enabled
23,740,661 UART: [fht] FMC Alias Private Key: 7
26,082,018 UART: [art] Extend RT PCRs Done
26,083,247 UART: [art] Lock RT PCRs Done
26,085,013 UART: [art] Populate DV Done
26,090,333 UART: [fht] FMC Alias Private Key: 7
26,091,822 UART: [art] Derive CDI
26,092,595 UART: [art] Store in slot 0x4
26,150,002 UART: [art] Derive Key Pair
26,151,049 UART: [art] Store priv key in slot 0x5
29,443,880 UART: [art] Derive Key Pair - Done
29,456,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,159 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,667 UART: [art] PUB.X = 6C664B2B649CCE0448EA910E2168E4362F0BD9FC7DBE99047073105A1E07C7C13FBD380356173F637E2B49542AC52BE9
31,753,910 UART: [art] PUB.Y = 058E8F0FCE62834857C9B989068D497CEA4F741D84CA4A6F7AF3B6E1E85ADD1B937BA29108E3C8A8E2CD82E52D1BCC43
31,761,202 UART: [art] SIG.R = 649162BB47BAC44C6E4D5CA58552FF61C665C1C0670C726D096EB5A307F544C6094C7C3067FA171660D77E6BC5150352
31,768,537 UART: [art] SIG.S = C958709E0F9E51809C03189AB8EB8214198FCFA62102E33EEB43AB93AB62D1C8283814E03A2C908CCDFEA19CD388090B
33,072,883 UART: Caliptra RT
33,073,603 UART: [state] CFI Enabled
33,249,601 UART: [rt] RT listening for mailbox commands...
33,281,502 UART: [rt]cmd =0x54514754, len=24
33,284,199 >>> mbox cmd response data (8 bytes)
33,284,613 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,314,621 UART: [rt]cmd =0x54514754, len=24
33,316,412 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,399 UART:
192,772 UART: Running Caliptra ROM ...
193,873 UART:
603,370 UART: [state] CFI Enabled
619,457 UART: [state] LifecycleState = Unprovisioned
621,322 UART: [state] DebugLocked = No
623,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,427 UART: [kat] SHA2-256
797,143 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,730 UART: [kat] ++
808,213 UART: [kat] sha1
818,182 UART: [kat] SHA2-256
820,875 UART: [kat] SHA2-384
826,441 UART: [kat] SHA2-512-ACC
828,871 UART: [kat] ECC-384
3,112,336 UART: [kat] HMAC-384Kdf
3,122,518 UART: [kat] LMS
4,312,630 UART: [kat] --
4,316,287 UART: [cold-reset] ++
4,317,217 UART: [fht] Storing FHT @ 0x50003400
4,328,045 UART: [idev] ++
4,328,607 UART: [idev] CDI.KEYID = 6
4,329,508 UART: [idev] SUBJECT.KEYID = 7
4,330,740 UART: [idev] UDS.KEYID = 0
4,331,778 ready_for_fw is high
4,331,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,817 UART: [idev] Erasing UDS.KEYID = 0
7,617,125 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,138 UART: [idev] --
7,642,699 UART: [ldev] ++
7,643,267 UART: [ldev] CDI.KEYID = 6
7,644,194 UART: [ldev] SUBJECT.KEYID = 5
7,645,415 UART: [ldev] AUTHORITY.KEYID = 7
7,646,696 UART: [ldev] FE.KEYID = 1
7,660,177 UART: [ldev] Erasing FE.KEYID = 1
10,947,378 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,459 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,916 UART: [ldev] --
13,308,024 UART: [fwproc] Waiting for Commands...
13,310,658 UART: [fwproc] Received command 0x46574c44
13,312,832 UART: [fwproc] Received Image of size 118548 bytes
17,421,133 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,495,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,897,418 >>> mbox cmd response: success
17,897,963 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,901,201 UART: [afmc] ++
17,901,780 UART: [afmc] CDI.KEYID = 6
17,902,707 UART: [afmc] SUBJECT.KEYID = 7
17,903,966 UART: [afmc] AUTHORITY.KEYID = 5
21,216,104 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,507,808 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,510,111 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,524,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,539,267 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,553,669 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,574,248 UART: [afmc] --
23,578,427 UART: [cold-reset] --
23,582,329 UART: [state] Locking Datavault
23,587,942 UART: [state] Locking PCR0, PCR1 and PCR31
23,589,685 UART: [state] Locking ICCM
23,591,877 UART: [exit] Launching FMC @ 0x40000130
23,600,259 UART:
23,600,489 UART: Running Caliptra FMC ...
23,601,578 UART:
23,601,732 UART: [state] CFI Enabled
23,609,988 UART: [fht] FMC Alias Private Key: 7
25,950,905 UART: [art] Extend RT PCRs Done
25,952,123 UART: [art] Lock RT PCRs Done
25,953,873 UART: [art] Populate DV Done
25,959,433 UART: [fht] FMC Alias Private Key: 7
25,960,967 UART: [art] Derive CDI
25,961,697 UART: [art] Store in slot 0x4
26,004,709 UART: [art] Derive Key Pair
26,005,704 UART: [art] Store priv key in slot 0x5
29,247,417 UART: [art] Derive Key Pair - Done
29,260,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,562 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,069 UART: [art] PUB.X = B9266E7D419CD418015535842E98E0451CE372472CC50BF2CB64595A8B0F6B811C8E4E7270B7C912E147836B4A1F01B5
31,549,311 UART: [art] PUB.Y = 0B1757A2853D76D0C5D3F62B9570E4F854EB9BA48A6F603EC71B0E8A3733EA3C137319DB20B8C229E4EA1E6D982E9F3A
31,556,585 UART: [art] SIG.R = FFEF2C732E522317399DEA43A6EDF5876CEF605E922FE87F050A2086A52851B7ADAA75462600853C2A8DE6F101486EA6
31,563,972 UART: [art] SIG.S = 0BBE38F12200AA15863F554394138344F248236126102E53DC6FDDA15C6F750E95EB10487C1521A485F776C8D692A9A5
32,869,528 UART: Caliptra RT
32,870,237 UART: [state] CFI Enabled
33,003,807 UART: [rt] RT listening for mailbox commands...
33,035,335 UART: [rt]cmd =0x54514754, len=24
33,038,135 >>> mbox cmd response data (8 bytes)
33,038,611 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,068,517 UART: [rt]cmd =0x54514754, len=24
33,070,363 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,240 writing to cptra_bootfsm_go
4,132,609 ready_for_fw is high
4,133,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,567 >>> mbox cmd response: success
18,163,484 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,802,552 UART:
23,802,951 UART: Running Caliptra FMC ...
23,804,097 UART:
23,804,260 UART: [state] CFI Enabled
23,812,028 UART: [fht] FMC Alias Private Key: 7
26,151,963 UART: [art] Extend RT PCRs Done
26,153,193 UART: [art] Lock RT PCRs Done
26,154,766 UART: [art] Populate DV Done
26,160,236 UART: [fht] FMC Alias Private Key: 7
26,161,877 UART: [art] Derive CDI
26,162,707 UART: [art] Store in slot 0x4
26,205,577 UART: [art] Derive Key Pair
26,206,621 UART: [art] Store priv key in slot 0x5
29,448,587 UART: [art] Derive Key Pair - Done
29,461,483 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,741,661 UART: [art] Erasing AUTHORITY.KEYID = 7
31,743,172 UART: [art] PUB.X = 72986FB44EF816932B5834A76351E90F4C577DB919D907C68D6EFCBD4899CAD2C5B7E5A0F6AD9D94DF3DD4463AA30524
31,750,423 UART: [art] PUB.Y = 578B84A526900BBFA5B479C972C9C1F4D06D226FAC16ADA59D65FECAF02B029794E9E8609F757ADE09511BD00AA62421
31,757,731 UART: [art] SIG.R = 9C74354B7788E4CD46AAB4BFCFF689E2B142DB3A4E414123D87B2367060EF4BFF754AA52C44D94BBA78F66363EF57CF1
31,765,126 UART: [art] SIG.S = E5222461640397BCFF24EF17DFB29EF1726C44C6EA92319AE4DFBD0DBC8CEFA26440759497C6504078D8811CD30253B3
33,069,988 UART: Caliptra RT
33,070,704 UART: [state] CFI Enabled
33,203,992 UART: [rt] RT listening for mailbox commands...
33,235,782 UART: [rt]cmd =0x54514754, len=24
33,238,424 >>> mbox cmd response data (8 bytes)
33,238,904 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,268,931 UART: [rt]cmd =0x54514754, len=24
33,270,782 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,252 UART:
192,638 UART: Running Caliptra ROM ...
193,779 UART:
193,925 UART: [state] CFI Enabled
267,742 UART: [state] LifecycleState = Unprovisioned
269,724 UART: [state] DebugLocked = No
271,117 UART: [state] WD Timer not started. Device not locked for debugging
275,859 UART: [kat] SHA2-256
455,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,318 UART: [kat] ++
466,849 UART: [kat] sha1
479,074 UART: [kat] SHA2-256
481,799 UART: [kat] SHA2-384
488,421 UART: [kat] SHA2-512-ACC
490,780 UART: [kat] ECC-384
2,951,379 UART: [kat] HMAC-384Kdf
2,972,216 UART: [kat] LMS
3,448,729 UART: [kat] --
3,452,967 UART: [cold-reset] ++
3,455,106 UART: [fht] FHT @ 0x50003400
3,466,219 UART: [idev] ++
3,466,846 UART: [idev] CDI.KEYID = 6
3,467,822 UART: [idev] SUBJECT.KEYID = 7
3,468,992 UART: [idev] UDS.KEYID = 0
3,470,035 ready_for_fw is high
3,470,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,375 UART: [idev] Erasing UDS.KEYID = 0
5,991,035 UART: [idev] Sha1 KeyId Algorithm
6,014,548 UART: [idev] --
6,019,035 UART: [ldev] ++
6,019,604 UART: [ldev] CDI.KEYID = 6
6,020,486 UART: [ldev] SUBJECT.KEYID = 5
6,021,746 UART: [ldev] AUTHORITY.KEYID = 7
6,022,943 UART: [ldev] FE.KEYID = 1
6,058,786 UART: [ldev] Erasing FE.KEYID = 1
8,570,238 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,360 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,255 UART: [ldev] --
10,377,556 UART: [fwproc] Wait for Commands...
10,380,143 UART: [fwproc] Recv command 0x46574c44
10,382,126 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,949,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,022,167 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,349,624 >>> mbox cmd response: success
14,350,813 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,354,520 UART: [afmc] ++
14,355,115 UART: [afmc] CDI.KEYID = 6
14,355,994 UART: [afmc] SUBJECT.KEYID = 7
14,357,266 UART: [afmc] AUTHORITY.KEYID = 5
16,898,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,144 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,158 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,244 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,816 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,713,417 UART: [afmc] --
18,716,955 UART: [cold-reset] --
18,720,983 UART: [state] Locking Datavault
18,725,414 UART: [state] Locking PCR0, PCR1 and PCR31
18,727,161 UART: [state] Locking ICCM
18,728,875 UART: [exit] Launching FMC @ 0x40000130
18,737,284 UART:
18,737,521 UART: Running Caliptra FMC ...
18,738,623 UART:
18,738,774 UART: [state] CFI Enabled
18,795,872 UART: [fht] FMC Alias Private Key: 7
20,562,846 UART: [art] Extend RT PCRs Done
20,564,049 UART: [art] Lock RT PCRs Done
20,565,776 UART: [art] Populate DV Done
20,571,078 UART: [fht] FMC Alias Private Key: 7
20,572,616 UART: [art] Derive CDI
20,573,373 UART: [art] Store in slot 0x4
20,628,545 UART: [art] Derive Key Pair
20,629,582 UART: [art] Store priv key in slot 0x5
23,092,442 UART: [art] Derive Key Pair - Done
23,105,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,818 UART: [art] PUB.X = 1225CD0B6C9D55CDDC9758C03BBF72D2070D7525437869B5BEB33D81875C5323B90A6BC975D3186B944FBD4BC858E187
24,826,058 UART: [art] PUB.Y = 65B838408EBBA1F9486499EE9AFE610E2245F157C32049CCBF5F51CFED768687F21986246899747824FC64BB0E89B38F
24,833,290 UART: [art] SIG.R = 36EF730C7B825291C7199A884AAC12A7C3EBFAE2D9AAE0F2ACEB555C007773301A0767F01EBE31BA219A81617FCBAE24
24,840,691 UART: [art] SIG.S = 745306B9F4344A77D4A22E46014330C72CF2EC250FD5BDBD4D5340F8B3FB86F2CC1C7D4815B0364611C5DD83557F2A6F
25,820,050 UART: Caliptra RT
25,820,759 UART: [state] CFI Enabled
26,001,842 UART: [rt] RT listening for mailbox commands...
26,033,373 UART: [rt]cmd =0x54514754, len=24
26,036,062 >>> mbox cmd response data (8 bytes)
26,036,592 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,066,719 UART: [rt]cmd =0x54514754, len=24
26,068,453 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
3,464,538 ready_for_fw is high
3,465,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,222,886 >>> mbox cmd response: success
14,224,274 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,509,662 UART:
18,510,086 UART: Running Caliptra FMC ...
18,511,202 UART:
18,511,368 UART: [state] CFI Enabled
18,577,610 UART: [fht] FMC Alias Private Key: 7
20,344,138 UART: [art] Extend RT PCRs Done
20,345,354 UART: [art] Lock RT PCRs Done
20,347,357 UART: [art] Populate DV Done
20,352,667 UART: [fht] FMC Alias Private Key: 7
20,354,176 UART: [art] Derive CDI
20,354,938 UART: [art] Store in slot 0x4
20,410,458 UART: [art] Derive Key Pair
20,411,499 UART: [art] Store priv key in slot 0x5
22,874,404 UART: [art] Derive Key Pair - Done
22,887,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,600,935 UART: [art] Erasing AUTHORITY.KEYID = 7
24,602,426 UART: [art] PUB.X = BA7FAC79324DC8774DD628803502A277510B8F9CF9A806EEBF1DB7F29C35C70ABD24E3139EC76109A916A01CA0D23489
24,609,725 UART: [art] PUB.Y = 8C1E59B96840358E88D6F3227187776A0A1C7E5B4959354088CBF49A797B82EA8E58CCFEC8D63751899904876A6744E1
24,616,932 UART: [art] SIG.R = 6C582F88C7BAB065B21BF80DB31A4BB7994C879C48951DDE9EE0EB1C2AD18DE146302A1CDCC8DFD6141A98D1B519DC1A
24,624,327 UART: [art] SIG.S = 4C475424664E00844760243E8D6579D358381FB4510202167982B3CC964F7622F96665E066ED45A76E657655AFAFC6DE
25,602,821 UART: Caliptra RT
25,603,537 UART: [state] CFI Enabled
25,784,864 UART: [rt] RT listening for mailbox commands...
25,816,337 UART: [rt]cmd =0x54514754, len=24
25,819,191 >>> mbox cmd response data (8 bytes)
25,819,662 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,849,575 UART: [rt]cmd =0x54514754, len=24
25,851,159 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
192,272 UART:
192,639 UART: Running Caliptra ROM ...
193,834 UART:
603,635 UART: [state] CFI Enabled
617,251 UART: [state] LifecycleState = Unprovisioned
619,139 UART: [state] DebugLocked = No
621,528 UART: [state] WD Timer not started. Device not locked for debugging
624,646 UART: [kat] SHA2-256
804,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,132 UART: [kat] ++
815,587 UART: [kat] sha1
827,206 UART: [kat] SHA2-256
829,871 UART: [kat] SHA2-384
835,302 UART: [kat] SHA2-512-ACC
837,634 UART: [kat] ECC-384
3,279,785 UART: [kat] HMAC-384Kdf
3,292,177 UART: [kat] LMS
3,768,704 UART: [kat] --
3,773,670 UART: [cold-reset] ++
3,775,259 UART: [fht] FHT @ 0x50003400
3,786,954 UART: [idev] ++
3,787,595 UART: [idev] CDI.KEYID = 6
3,788,662 UART: [idev] SUBJECT.KEYID = 7
3,789,774 UART: [idev] UDS.KEYID = 0
3,790,704 ready_for_fw is high
3,790,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,864 UART: [idev] Erasing UDS.KEYID = 0
6,267,454 UART: [idev] Sha1 KeyId Algorithm
6,290,038 UART: [idev] --
6,295,588 UART: [ldev] ++
6,296,169 UART: [ldev] CDI.KEYID = 6
6,297,086 UART: [ldev] SUBJECT.KEYID = 5
6,298,274 UART: [ldev] AUTHORITY.KEYID = 7
6,299,566 UART: [ldev] FE.KEYID = 1
6,312,054 UART: [ldev] Erasing FE.KEYID = 1
8,792,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,915 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,052 UART: [ldev] --
10,583,331 UART: [fwproc] Wait for Commands...
10,585,051 UART: [fwproc] Recv command 0x46574c44
10,587,043 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,001 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,708 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,714 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,327 >>> mbox cmd response: success
14,553,924 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,556,790 UART: [afmc] ++
14,557,371 UART: [afmc] CDI.KEYID = 6
14,558,397 UART: [afmc] SUBJECT.KEYID = 7
14,559,556 UART: [afmc] AUTHORITY.KEYID = 5
17,067,051 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,291 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,477 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,310 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,395 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,962 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,725 UART: [afmc] --
18,865,681 UART: [cold-reset] --
18,867,602 UART: [state] Locking Datavault
18,873,288 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,042 UART: [state] Locking ICCM
18,877,323 UART: [exit] Launching FMC @ 0x40000130
18,885,724 UART:
18,885,970 UART: Running Caliptra FMC ...
18,887,073 UART:
18,887,241 UART: [state] CFI Enabled
18,895,375 UART: [fht] FMC Alias Private Key: 7
20,661,284 UART: [art] Extend RT PCRs Done
20,662,489 UART: [art] Lock RT PCRs Done
20,663,949 UART: [art] Populate DV Done
20,669,582 UART: [fht] FMC Alias Private Key: 7
20,671,174 UART: [art] Derive CDI
20,671,991 UART: [art] Store in slot 0x4
20,715,188 UART: [art] Derive Key Pair
20,716,245 UART: [art] Store priv key in slot 0x5
23,143,158 UART: [art] Derive Key Pair - Done
23,156,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,936 UART: [art] Erasing AUTHORITY.KEYID = 7
24,864,446 UART: [art] PUB.X = 23C165BE65A37E345AC9C1C930800FDEF17A4C7DF9ED21537DF797F7478C0CE89C3CFC7F22CB49007F5A989C672FBE91
24,871,691 UART: [art] PUB.Y = 880F1CE3D96613F6916717CD005A2EA27EC4DE251650208BB99A7742027E3358C70AA06CF9C61557BF4F30BA1F593957
24,878,919 UART: [art] SIG.R = 1604B2F11E04126B0FADEC80EB7F66506B80BE07E6A965782B94047C6C50D14F4CAC89D83327F3D831FC3ECCDD59AA72
24,886,311 UART: [art] SIG.S = 24EEBE7C173AD7011613C2C7155557F594308EDDB294A45C9E4E6C425B7A5ADF2B930A177963C6805CC3D4DDF285E923
25,865,009 UART: Caliptra RT
25,865,721 UART: [state] CFI Enabled
25,997,758 UART: [rt] RT listening for mailbox commands...
26,029,066 UART: [rt]cmd =0x54514754, len=24
26,031,664 >>> mbox cmd response data (8 bytes)
26,032,117 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,062,249 UART: [rt]cmd =0x54514754, len=24
26,063,826 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,778,458 ready_for_fw is high
3,778,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,293 >>> mbox cmd response: success
14,443,177 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,695,865 UART:
18,696,249 UART: Running Caliptra FMC ...
18,697,361 UART:
18,697,516 UART: [state] CFI Enabled
18,705,312 UART: [fht] FMC Alias Private Key: 7
20,471,583 UART: [art] Extend RT PCRs Done
20,472,809 UART: [art] Lock RT PCRs Done
20,474,659 UART: [art] Populate DV Done
20,480,082 UART: [fht] FMC Alias Private Key: 7
20,481,581 UART: [art] Derive CDI
20,482,346 UART: [art] Store in slot 0x4
20,524,671 UART: [art] Derive Key Pair
20,525,669 UART: [art] Store priv key in slot 0x5
22,952,486 UART: [art] Derive Key Pair - Done
22,965,651 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,950 UART: [art] Erasing AUTHORITY.KEYID = 7
24,673,472 UART: [art] PUB.X = 8B70D8CF91742B608200B87BEC4D391D35B8474992B2239D86887BAC68B3C3A851823672E96EB1D66DDD0F6253697ACE
24,680,673 UART: [art] PUB.Y = FD2B3A6010970BD6AA1AAB1673B47CF96DE306DA08A296EDB16BF319015ADF3820D8BA1777CBD5EE2E2931BDD39A09B8
24,687,985 UART: [art] SIG.R = 85E5EAABA3F6664E246C624A21E2B2D8384EFC91549AABD0F52D6913FAA16ADB1CF018C0E698AC78BF724CC9554F1687
24,695,428 UART: [art] SIG.S = 451E9F93F8301D164E696B7450673B14935E76D3D9E618D8091144834F95F2D6282165434C0DF6DE9DF14AD157C88911
25,674,053 UART: Caliptra RT
25,674,761 UART: [state] CFI Enabled
25,807,699 UART: [rt] RT listening for mailbox commands...
25,839,354 UART: [rt]cmd =0x54514754, len=24
25,841,791 >>> mbox cmd response data (8 bytes)
25,842,294 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,872,359 UART: [rt]cmd =0x54514754, len=24
25,874,061 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
191,949 UART:
192,313 UART: Running Caliptra ROM ...
193,458 UART:
193,604 UART: [state] CFI Enabled
263,274 UART: [state] LifecycleState = Unprovisioned
265,696 UART: [state] DebugLocked = No
268,156 UART: [state] WD Timer not started. Device not locked for debugging
273,398 UART: [kat] SHA2-256
463,299 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,105 UART: [kat] ++
474,581 UART: [kat] sha1
485,805 UART: [kat] SHA2-256
488,813 UART: [kat] SHA2-384
496,173 UART: [kat] SHA2-512-ACC
498,791 UART: [kat] ECC-384
2,950,532 UART: [kat] HMAC-384Kdf
2,972,433 UART: [kat] LMS
3,504,210 UART: [kat] --
3,509,983 UART: [cold-reset] ++
3,511,483 UART: [fht] FHT @ 0x50003400
3,523,806 UART: [idev] ++
3,524,516 UART: [idev] CDI.KEYID = 6
3,525,421 UART: [idev] SUBJECT.KEYID = 7
3,526,658 UART: [idev] UDS.KEYID = 0
3,527,575 ready_for_fw is high
3,527,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,820 UART: [idev] Erasing UDS.KEYID = 0
6,051,434 UART: [idev] Sha1 KeyId Algorithm
6,072,542 UART: [idev] --
6,078,052 UART: [ldev] ++
6,078,739 UART: [ldev] CDI.KEYID = 6
6,079,666 UART: [ldev] SUBJECT.KEYID = 5
6,080,826 UART: [ldev] AUTHORITY.KEYID = 7
6,082,056 UART: [ldev] FE.KEYID = 1
6,122,175 UART: [ldev] Erasing FE.KEYID = 1
8,628,262 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,363,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,378,882 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,155 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,431,540 UART: [ldev] --
10,437,623 UART: [fwproc] Wait for Commands...
10,439,937 UART: [fwproc] Recv command 0x46574c44
10,442,246 UART: [fwproc] Recv'd Img size: 118548 bytes
13,938,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,014,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,118 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,081 >>> mbox cmd response: success
14,699,227 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,702,156 UART: [afmc] ++
14,702,853 UART: [afmc] CDI.KEYID = 6
14,704,013 UART: [afmc] SUBJECT.KEYID = 7
14,705,546 UART: [afmc] AUTHORITY.KEYID = 5
17,229,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,958,384 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,960,297 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,975,413 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,540 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,442 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,442 UART: [afmc] --
19,031,275 UART: [cold-reset] --
19,034,485 UART: [state] Locking Datavault
19,039,408 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,621 UART: [state] Locking ICCM
19,044,423 UART: [exit] Launching FMC @ 0x40000130
19,053,083 UART:
19,053,320 UART: Running Caliptra FMC ...
19,054,635 UART:
19,054,803 UART: [state] CFI Enabled
19,114,757 UART: [fht] FMC Alias Private Key: 7
20,901,972 UART: [art] Extend RT PCRs Done
20,903,196 UART: [art] Lock RT PCRs Done
20,904,899 UART: [art] Populate DV Done
20,910,413 UART: [fht] FMC Alias Private Key: 7
20,911,949 UART: [art] Derive CDI
20,912,680 UART: [art] Store in slot 0x4
20,968,710 UART: [art] Derive Key Pair
20,969,702 UART: [art] Store priv key in slot 0x5
23,432,697 UART: [art] Derive Key Pair - Done
23,445,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,639 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,149 UART: [art] PUB.X = A44DA355058D84BA05A6B7E4B1A0B9A3DD387A70E38A8EFC5999EC145C3C756F71A5BB574CD14A61714D0709C18BDCF9
25,167,454 UART: [art] PUB.Y = F5FA0E7D8F13DAF1B48825D1A17BEDA5147145BEDB04C59A0257376EB27BF3F86492D6880F5343A44DB5CF15C8003446
25,174,685 UART: [art] SIG.R = B740528E7733ADA34243BD7596F9B1CE37F56A055A02C0ECB9B84E25327252859987BE556F8928E21254CC967B26B8C7
25,182,081 UART: [art] SIG.S = CE94D323FAFCB0901CC6AAB0E7D4FBDA671F3D29D57D2538201E8C9D6AC9F18ED16D89716712B771CB678316A006FEC2
26,160,962 UART: Caliptra RT
26,161,651 UART: [state] CFI Enabled
26,342,992 UART: [rt] RT listening for mailbox commands...
26,374,623 UART: [rt]cmd =0x54514754, len=24
26,377,206 >>> mbox cmd response data (8 bytes)
26,377,633 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,407,470 UART: [rt]cmd =0x54514754, len=24
26,409,277 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,437,695 ready_for_fw is high
3,438,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,818,068 >>> mbox cmd response: success
14,819,347 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,113,412 UART:
19,113,830 UART: Running Caliptra FMC ...
19,114,965 UART:
19,115,121 UART: [state] CFI Enabled
19,181,623 UART: [fht] FMC Alias Private Key: 7
20,947,410 UART: [art] Extend RT PCRs Done
20,948,632 UART: [art] Lock RT PCRs Done
20,950,231 UART: [art] Populate DV Done
20,955,867 UART: [fht] FMC Alias Private Key: 7
20,957,406 UART: [art] Derive CDI
20,958,141 UART: [art] Store in slot 0x4
21,014,394 UART: [art] Derive Key Pair
21,015,442 UART: [art] Store priv key in slot 0x5
23,478,679 UART: [art] Derive Key Pair - Done
23,491,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,273 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,778 UART: [art] PUB.X = 891A8A75DC6AB3CDDEA4B4E7CB90F802BA86B5BA861A97770F97D358F15B81539971D1632F9429351A3E0AB761E52BE4
25,213,025 UART: [art] PUB.Y = 26C3BE7ECB020D081495499DFC4A512E01EAEAE06374C64C608C408B99D012C5164C7576DFEC111882890C42A194A534
25,220,289 UART: [art] SIG.R = 57A7E0E077638E21B25323419B64A7A74C9823577BFEFB188FC01CFB15670C553C25C248CEEE4121CE881BF3FEA79222
25,227,690 UART: [art] SIG.S = BFE9AB9BA94A1AC87A5E6B468FF61CA6ABB8C1E3A30482BD6C8674E62A059ED46D448F91B9DD40DE03BC52FE2DC768BF
26,206,582 UART: Caliptra RT
26,207,302 UART: [state] CFI Enabled
26,388,017 UART: [rt] RT listening for mailbox commands...
26,419,704 UART: [rt]cmd =0x54514754, len=24
26,422,230 >>> mbox cmd response data (8 bytes)
26,422,727 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,452,574 UART: [rt]cmd =0x54514754, len=24
26,454,300 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,533 UART:
192,890 UART: Running Caliptra ROM ...
194,046 UART:
603,805 UART: [state] CFI Enabled
615,589 UART: [state] LifecycleState = Unprovisioned
618,005 UART: [state] DebugLocked = No
620,832 UART: [state] WD Timer not started. Device not locked for debugging
625,020 UART: [kat] SHA2-256
814,898 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,708 UART: [kat] ++
826,312 UART: [kat] sha1
836,414 UART: [kat] SHA2-256
839,432 UART: [kat] SHA2-384
845,069 UART: [kat] SHA2-512-ACC
847,656 UART: [kat] ECC-384
3,292,141 UART: [kat] HMAC-384Kdf
3,305,111 UART: [kat] LMS
3,836,913 UART: [kat] --
3,840,289 UART: [cold-reset] ++
3,842,295 UART: [fht] FHT @ 0x50003400
3,854,556 UART: [idev] ++
3,855,261 UART: [idev] CDI.KEYID = 6
3,856,188 UART: [idev] SUBJECT.KEYID = 7
3,857,369 UART: [idev] UDS.KEYID = 0
3,858,296 ready_for_fw is high
3,858,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,472 UART: [idev] Erasing UDS.KEYID = 0
6,333,047 UART: [idev] Sha1 KeyId Algorithm
6,355,642 UART: [idev] --
6,359,689 UART: [ldev] ++
6,360,368 UART: [ldev] CDI.KEYID = 6
6,361,270 UART: [ldev] SUBJECT.KEYID = 5
6,362,485 UART: [ldev] AUTHORITY.KEYID = 7
6,363,619 UART: [ldev] FE.KEYID = 1
6,375,965 UART: [ldev] Erasing FE.KEYID = 1
8,856,121 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,253 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,656 UART: [ldev] --
10,647,732 UART: [fwproc] Wait for Commands...
10,649,935 UART: [fwproc] Recv command 0x46574c44
10,652,246 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,599 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,229,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,353,551 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,914,738 >>> mbox cmd response: success
14,915,826 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,918,582 UART: [afmc] ++
14,919,282 UART: [afmc] CDI.KEYID = 6
14,920,469 UART: [afmc] SUBJECT.KEYID = 7
14,921,909 UART: [afmc] AUTHORITY.KEYID = 5
17,424,411 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,892 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,859 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,178,109 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,905 UART: [afmc] --
19,221,201 UART: [cold-reset] --
19,225,554 UART: [state] Locking Datavault
19,229,622 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,850 UART: [state] Locking ICCM
19,233,465 UART: [exit] Launching FMC @ 0x40000130
19,242,096 UART:
19,242,337 UART: Running Caliptra FMC ...
19,243,446 UART:
19,243,605 UART: [state] CFI Enabled
19,251,842 UART: [fht] FMC Alias Private Key: 7
21,018,186 UART: [art] Extend RT PCRs Done
21,019,416 UART: [art] Lock RT PCRs Done
21,020,992 UART: [art] Populate DV Done
21,026,517 UART: [fht] FMC Alias Private Key: 7
21,028,059 UART: [art] Derive CDI
21,028,880 UART: [art] Store in slot 0x4
21,071,586 UART: [art] Derive Key Pair
21,072,590 UART: [art] Store priv key in slot 0x5
23,499,656 UART: [art] Derive Key Pair - Done
23,512,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,694 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,195 UART: [art] PUB.X = 384F4F6E22136CA424B7F24E8D09F408A614016106BE6B74161CEDDADFF01C306468F72DE5B814C69A5325F5D2DBC1E8
25,227,523 UART: [art] PUB.Y = D191F1FE4FB06097AA064379E551FC8015D9B193F923D3E7B205881DE815B452C205A836B0312071547064FBF817D091
25,234,723 UART: [art] SIG.R = CE6C52A14AF8A3E267887970F1371A36EE9763EC671679A218373BADA23F1906B6B32758BBFC0B699254E344BB96A5BD
25,242,080 UART: [art] SIG.S = 0891C297CF376438C23617CD33BE36CB4063973C7E0167907A539D9D6E9EE7757CAE4902616205B23D6E4A19F62D44A6
26,221,340 UART: Caliptra RT
26,222,029 UART: [state] CFI Enabled
26,354,103 UART: [rt] RT listening for mailbox commands...
26,385,669 UART: [rt]cmd =0x54514754, len=24
26,388,510 >>> mbox cmd response data (8 bytes)
26,389,036 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,418,953 UART: [rt]cmd =0x54514754, len=24
26,420,718 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
3,758,873 ready_for_fw is high
3,759,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,059,104 >>> mbox cmd response: success
15,060,599 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,316,280 UART:
19,316,673 UART: Running Caliptra FMC ...
19,318,023 UART:
19,318,197 UART: [state] CFI Enabled
19,325,851 UART: [fht] FMC Alias Private Key: 7
21,092,068 UART: [art] Extend RT PCRs Done
21,093,287 UART: [art] Lock RT PCRs Done
21,095,047 UART: [art] Populate DV Done
21,100,531 UART: [fht] FMC Alias Private Key: 7
21,102,142 UART: [art] Derive CDI
21,102,963 UART: [art] Store in slot 0x4
21,145,348 UART: [art] Derive Key Pair
21,146,349 UART: [art] Store priv key in slot 0x5
23,572,874 UART: [art] Derive Key Pair - Done
23,585,495 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,291,878 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,374 UART: [art] PUB.X = 3084FE646CC5279BECCD8B51240015DD911238BFB7550D9EF3B1AABA42405C0B3D059EE0784D27BE4219D45D39B3D2A5
25,300,704 UART: [art] PUB.Y = 6BE0F092629EBA56A41FAEA44D7E9079029F27CED044161A151CE08B4B890BA0BDEBF7FDC03FA4595CC35F58C90C566E
25,307,969 UART: [art] SIG.R = 50E70191D054215D55278D8012C18F5B87344C7C7F1AA83DDAE722181C667FBE706DAF7ACFDC7F9DEF132053795C7BDC
25,315,329 UART: [art] SIG.S = 434EB9A59292AB46610CEA66AEA221E6A67C59CA0C00BCC88E2D678B24C7FA28ADA07CB084B952D1A144C818CDD0CA04
26,294,829 UART: Caliptra RT
26,295,522 UART: [state] CFI Enabled
26,428,757 UART: [rt] RT listening for mailbox commands...
26,460,123 UART: [rt]cmd =0x54514754, len=24
26,463,068 >>> mbox cmd response data (8 bytes)
26,463,612 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,493,470 UART: [rt]cmd =0x54514754, len=24
26,495,279 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,605 UART: [kat] SHA2-256
892,543 UART: [kat] SHA2-384
895,192 UART: [kat] SHA2-512-ACC
897,093 UART: [kat] ECC-384
902,800 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,499 UART: [cold-reset] ++
1,477,057 UART: [fht] Storing FHT @ 0x50003400
1,479,802 UART: [idev] ++
1,479,970 UART: [idev] CDI.KEYID = 6
1,480,330 UART: [idev] SUBJECT.KEYID = 7
1,480,754 UART: [idev] UDS.KEYID = 0
1,481,099 ready_for_fw is high
1,481,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,694 UART: [idev] Erasing UDS.KEYID = 0
1,504,964 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,662 UART: [idev] --
1,514,729 UART: [ldev] ++
1,514,897 UART: [ldev] CDI.KEYID = 6
1,515,260 UART: [ldev] SUBJECT.KEYID = 5
1,515,686 UART: [ldev] AUTHORITY.KEYID = 7
1,516,149 UART: [ldev] FE.KEYID = 1
1,521,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,264 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,448 UART: [ldev] --
1,585,885 UART: [fwproc] Waiting for Commands...
1,586,748 UART: [fwproc] Received command 0x46574c44
1,587,539 UART: [fwproc] Received Image of size 118548 bytes
2,932,069 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,927 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,145 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,376 >>> mbox cmd response: success
3,130,376 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,516 UART: [afmc] ++
3,131,684 UART: [afmc] CDI.KEYID = 6
3,132,046 UART: [afmc] SUBJECT.KEYID = 7
3,132,471 UART: [afmc] AUTHORITY.KEYID = 5
3,167,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,608 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,388 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,980 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,663 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,543 UART: [afmc] --
3,210,619 UART: [cold-reset] --
3,211,397 UART: [state] Locking Datavault
3,212,504 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,108 UART: [state] Locking ICCM
3,213,548 UART: [exit] Launching FMC @ 0x40000130
3,218,878 UART:
3,218,894 UART: Running Caliptra FMC ...
3,219,302 UART:
3,219,356 UART: [state] CFI Enabled
3,229,814 UART: [fht] FMC Alias Private Key: 7
3,348,872 UART: [art] Extend RT PCRs Done
3,349,300 UART: [art] Lock RT PCRs Done
3,351,150 UART: [art] Populate DV Done
3,359,513 UART: [fht] FMC Alias Private Key: 7
3,360,695 UART: [art] Derive CDI
3,360,975 UART: [art] Store in slot 0x4
3,446,843 UART: [art] Derive Key Pair
3,447,203 UART: [art] Store priv key in slot 0x5
3,460,552 UART: [art] Derive Key Pair - Done
3,475,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,731 UART: [art] PUB.X = B3E46E77E550127B311B91175C099047A3654020C0F5D86BFE621E90923AE4D7385BCE69A4D694641E2651B99E817D00
3,498,468 UART: [art] PUB.Y = 1FE16CAD45915496207BDD5B3BC43D054D24E1F901195EE137EB8DF3AC6A9C6CE1FF4F4A986CF208BF68F5AE0FA0DB0F
3,505,427 UART: [art] SIG.R = 9F6F54518CFF8A650C1914ED078352C4FA11A7A62F7C973ADF13D2AA02E10A47D8AEA8D8382645E6256B56939BC353C3
3,512,191 UART: [art] SIG.S = F16397E603E20C2621DB168C2658BC98539EBBF2E85A2BF909AC1CC090D59BEA6C9EC9C5F71E43978228DC36D5473892
3,536,240 UART: Caliptra RT
3,536,491 UART: [state] CFI Enabled
3,656,288 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,090 UART: [rt]cmd =0x54514754, len=24
3,689,339 >>> mbox cmd response data (8 bytes)
3,689,340 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,845 UART: [rt]cmd =0x54514754, len=24
3,720,165 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,147 ready_for_fw is high
1,362,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,752 >>> mbox cmd response: success
2,981,752 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,195 UART:
3,043,211 UART: Running Caliptra FMC ...
3,043,619 UART:
3,043,673 UART: [state] CFI Enabled
3,054,339 UART: [fht] FMC Alias Private Key: 7
3,173,563 UART: [art] Extend RT PCRs Done
3,173,991 UART: [art] Lock RT PCRs Done
3,175,431 UART: [art] Populate DV Done
3,183,696 UART: [fht] FMC Alias Private Key: 7
3,184,842 UART: [art] Derive CDI
3,185,122 UART: [art] Store in slot 0x4
3,270,700 UART: [art] Derive Key Pair
3,271,060 UART: [art] Store priv key in slot 0x5
3,284,171 UART: [art] Derive Key Pair - Done
3,298,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,317 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,082 UART: [art] PUB.X = 6267AE854868297E690F0A89C2F30C00689C919DAD3D0E81ACC33A3A3EB9F02893D30EFAD7F0BE3A4697A451938E498D
3,321,821 UART: [art] PUB.Y = 8F74AEA35202B4090A3B2A38FD16B703C8889C86C8C56ADC76FADF3601191D5259643AF90244F6C3A40E70B29D5CE842
3,328,754 UART: [art] SIG.R = B602932BE16B6B236128CD194FF46CF07848C8A5A581FDE53588D09E65145C0BCCC4F4E865A8FAC4D3A42D1E45DE7C65
3,335,530 UART: [art] SIG.S = 38D317FB3F87CC2CD2404CD0B65137DB6D9468B8D80989B5D5DF01E19A266EE29AE8B20C8052E62F27551B873BEC7262
3,359,759 UART: Caliptra RT
3,360,010 UART: [state] CFI Enabled
3,479,476 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,954 UART: [rt]cmd =0x54514754, len=24
3,512,355 >>> mbox cmd response data (8 bytes)
3,512,356 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,783 UART: [rt]cmd =0x54514754, len=24
3,543,157 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,629 UART: [state] LifecycleState = Unprovisioned
86,284 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,988 UART: [kat] SHA2-256
892,926 UART: [kat] SHA2-384
895,577 UART: [kat] SHA2-512-ACC
897,478 UART: [kat] ECC-384
903,239 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,095 UART: [idev] ++
1,480,263 UART: [idev] CDI.KEYID = 6
1,480,623 UART: [idev] SUBJECT.KEYID = 7
1,481,047 UART: [idev] UDS.KEYID = 0
1,481,392 ready_for_fw is high
1,481,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,847 UART: [idev] Erasing UDS.KEYID = 0
1,505,835 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,676 UART: [ldev] ++
1,515,844 UART: [ldev] CDI.KEYID = 6
1,516,207 UART: [ldev] SUBJECT.KEYID = 5
1,516,633 UART: [ldev] AUTHORITY.KEYID = 7
1,517,096 UART: [ldev] FE.KEYID = 1
1,522,620 UART: [ldev] Erasing FE.KEYID = 1
1,547,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,815 UART: [ldev] --
1,587,190 UART: [fwproc] Waiting for Commands...
1,587,997 UART: [fwproc] Received command 0x46574c44
1,588,788 UART: [fwproc] Received Image of size 118548 bytes
2,934,018 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,175 >>> mbox cmd response: success
3,133,175 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,134,191 UART: [afmc] ++
3,134,359 UART: [afmc] CDI.KEYID = 6
3,134,721 UART: [afmc] SUBJECT.KEYID = 7
3,135,146 UART: [afmc] AUTHORITY.KEYID = 5
3,170,081 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,023 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,512 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,395 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,078 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,080 UART: [afmc] --
3,212,970 UART: [cold-reset] --
3,213,920 UART: [state] Locking Datavault
3,215,113 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,717 UART: [state] Locking ICCM
3,216,169 UART: [exit] Launching FMC @ 0x40000130
3,221,499 UART:
3,221,515 UART: Running Caliptra FMC ...
3,221,923 UART:
3,222,066 UART: [state] CFI Enabled
3,232,926 UART: [fht] FMC Alias Private Key: 7
3,351,740 UART: [art] Extend RT PCRs Done
3,352,168 UART: [art] Lock RT PCRs Done
3,353,544 UART: [art] Populate DV Done
3,361,771 UART: [fht] FMC Alias Private Key: 7
3,362,917 UART: [art] Derive CDI
3,363,197 UART: [art] Store in slot 0x4
3,448,925 UART: [art] Derive Key Pair
3,449,285 UART: [art] Store priv key in slot 0x5
3,463,132 UART: [art] Derive Key Pair - Done
3,477,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,016 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,781 UART: [art] PUB.X = 09CCBA6DCE1C82E34EE1C76600431B0B913118AD5B48E41D8E13618893DF080A6294846E2FC5505DE66FCCAF4FD02605
3,500,522 UART: [art] PUB.Y = 50F54FFEC484056C817A4F9D59A520DB1DC36174B00F071BA0C819EDC80458554859AEA5811DB767FD2DDB029603A975
3,507,458 UART: [art] SIG.R = 38F0949E282D7A29FB6315FC71EED01B4E705A6C166E11F157AAEA293CFA2F3A1A30B9DB62DC2192C568ACF9563AA6C3
3,514,244 UART: [art] SIG.S = 84AC77806F2F9A548239A0CE80CB925A3B4A56DC1828CB2C18652DB05293AD3112C56773E52C9EFEA626F23975DC19B0
3,537,806 UART: Caliptra RT
3,538,149 UART: [state] CFI Enabled
3,659,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,425 UART: [rt]cmd =0x54514754, len=24
3,692,446 >>> mbox cmd response data (8 bytes)
3,692,447 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,008 UART: [rt]cmd =0x54514754, len=24
3,723,462 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,176 ready_for_fw is high
1,362,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,005 >>> mbox cmd response: success
2,981,005 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,962 UART:
3,041,978 UART: Running Caliptra FMC ...
3,042,386 UART:
3,042,529 UART: [state] CFI Enabled
3,053,305 UART: [fht] FMC Alias Private Key: 7
3,172,553 UART: [art] Extend RT PCRs Done
3,172,981 UART: [art] Lock RT PCRs Done
3,174,551 UART: [art] Populate DV Done
3,182,594 UART: [fht] FMC Alias Private Key: 7
3,183,720 UART: [art] Derive CDI
3,184,000 UART: [art] Store in slot 0x4
3,269,634 UART: [art] Derive Key Pair
3,269,994 UART: [art] Store priv key in slot 0x5
3,283,129 UART: [art] Derive Key Pair - Done
3,297,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,469 UART: [art] PUB.X = D6789C55005F3A5D0F11C7F771A81547544CDC7C6BD382087BA24C45333898B6AA4E49DBC816D1703D6FA8A75EBA1EB8
3,320,219 UART: [art] PUB.Y = 9B7A201F4798D409397EDB68CA916975C0D15A73F06EE2EC4B3EEB917DDF6E7CD5E1D0E98421D8BBBEDF28AA8CB130B5
3,327,188 UART: [art] SIG.R = 56753CF8052EC102C352F53CC1CAE889677AADA04B6C33221B18A6D67B5577293F855946861FB053B2B7F579673A2A13
3,333,948 UART: [art] SIG.S = 7693865EC613DDED307473002553413020047A4CA69E0DF55BB7D4FD895841FBCD9FD37A6042A2DC5C29AC7F6C202CA5
3,357,636 UART: Caliptra RT
3,357,979 UART: [state] CFI Enabled
3,477,736 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,600 UART: [rt]cmd =0x54514754, len=24
3,510,877 >>> mbox cmd response data (8 bytes)
3,510,878 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,257 UART: [rt]cmd =0x54514754, len=24
3,541,463 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,698 UART: [state] LifecycleState = Unprovisioned
85,353 UART: [state] DebugLocked = No
85,969 UART: [state] WD Timer not started. Device not locked for debugging
87,108 UART: [kat] SHA2-256
890,658 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,762 UART: [kat] ++
894,914 UART: [kat] sha1
899,234 UART: [kat] SHA2-256
901,174 UART: [kat] SHA2-384
903,779 UART: [kat] SHA2-512-ACC
905,680 UART: [kat] ECC-384
915,085 UART: [kat] HMAC-384Kdf
919,813 UART: [kat] LMS
1,168,125 UART: [kat] --
1,168,744 UART: [cold-reset] ++
1,169,124 UART: [fht] FHT @ 0x50003400
1,171,784 UART: [idev] ++
1,171,952 UART: [idev] CDI.KEYID = 6
1,172,313 UART: [idev] SUBJECT.KEYID = 7
1,172,738 UART: [idev] UDS.KEYID = 0
1,173,084 ready_for_fw is high
1,173,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,815 UART: [idev] Erasing UDS.KEYID = 0
1,197,861 UART: [idev] Sha1 KeyId Algorithm
1,206,715 UART: [idev] --
1,207,700 UART: [ldev] ++
1,207,868 UART: [ldev] CDI.KEYID = 6
1,208,232 UART: [ldev] SUBJECT.KEYID = 5
1,208,659 UART: [ldev] AUTHORITY.KEYID = 7
1,209,122 UART: [ldev] FE.KEYID = 1
1,214,222 UART: [ldev] Erasing FE.KEYID = 1
1,240,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,602 UART: [ldev] --
1,279,871 UART: [fwproc] Wait for Commands...
1,280,486 UART: [fwproc] Recv command 0x46574c44
1,281,219 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,554 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,992 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,209 >>> mbox cmd response: success
2,824,209 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,265 UART: [afmc] ++
2,825,433 UART: [afmc] CDI.KEYID = 6
2,825,796 UART: [afmc] SUBJECT.KEYID = 7
2,826,222 UART: [afmc] AUTHORITY.KEYID = 5
2,862,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,822 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,571 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,281 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,162 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,863 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,646 UART: [afmc] --
2,905,671 UART: [cold-reset] --
2,906,617 UART: [state] Locking Datavault
2,907,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,478 UART: [state] Locking ICCM
2,909,062 UART: [exit] Launching FMC @ 0x40000130
2,914,392 UART:
2,914,408 UART: Running Caliptra FMC ...
2,914,816 UART:
2,914,870 UART: [state] CFI Enabled
2,925,584 UART: [fht] FMC Alias Private Key: 7
3,044,152 UART: [art] Extend RT PCRs Done
3,044,580 UART: [art] Lock RT PCRs Done
3,046,170 UART: [art] Populate DV Done
3,054,271 UART: [fht] FMC Alias Private Key: 7
3,055,331 UART: [art] Derive CDI
3,055,611 UART: [art] Store in slot 0x4
3,141,284 UART: [art] Derive Key Pair
3,141,644 UART: [art] Store priv key in slot 0x5
3,154,834 UART: [art] Derive Key Pair - Done
3,169,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,605 UART: [art] PUB.X = F1923BA948641510B12222CAE2AE93DF8B182CDBDBA17D51976383943D2D9D6487969A82EE51F417CF7044DF17C4B609
3,192,374 UART: [art] PUB.Y = ED4C47F3B004B9A0B8A8F3E25ADD06AA4EC27EFBF2483AFC5D44C59792E7888AEB186E28262391064F6ECA8E19B9CA23
3,199,333 UART: [art] SIG.R = 723DD443E99DC6886468DA280C0667EC486E1F2D3DC3F210BA5AF59151CC858350A81E4E9D008D90E2CDFBDE26280789
3,206,078 UART: [art] SIG.S = DAC5C7B129F443E61A44E766A967188530B61363635D2C60F9FADB93DDCB274AB067A85F4F2368B7D58A9293C6F7C5E8
3,229,602 UART: Caliptra RT
3,229,853 UART: [state] CFI Enabled
3,350,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,878 UART: [rt]cmd =0x54514754, len=24
3,383,139 >>> mbox cmd response data (8 bytes)
3,383,140 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,759 UART: [rt]cmd =0x54514754, len=24
3,414,209 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,732 ready_for_fw is high
1,058,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,116 >>> mbox cmd response: success
2,677,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,738,723 UART:
2,738,739 UART: Running Caliptra FMC ...
2,739,147 UART:
2,739,201 UART: [state] CFI Enabled
2,749,757 UART: [fht] FMC Alias Private Key: 7
2,868,859 UART: [art] Extend RT PCRs Done
2,869,287 UART: [art] Lock RT PCRs Done
2,871,053 UART: [art] Populate DV Done
2,879,222 UART: [fht] FMC Alias Private Key: 7
2,880,224 UART: [art] Derive CDI
2,880,504 UART: [art] Store in slot 0x4
2,966,479 UART: [art] Derive Key Pair
2,966,839 UART: [art] Store priv key in slot 0x5
2,979,873 UART: [art] Derive Key Pair - Done
2,994,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,209 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,974 UART: [art] PUB.X = 5321B914305E3ECF8D9FBA5F1817666AF0C1D5DF5527FDFE0E8AF37F3802DDD7FED824489982D1206F3C69AAB6C118DB
3,017,754 UART: [art] PUB.Y = 0D4985BE9C06AC65BD3F0E90195DB53E3DE9F1797BD9286E45D66418A77FBF50ED5F22804FF7C181D7C2C298F8DE4885
3,024,705 UART: [art] SIG.R = 96DA628633AEECC3C720644B2E5C878E5D34CECA2C15C76B606B3B4DEB2BD5DEE0C60C5181AB10B0C93D01EB6D1A32E2
3,031,491 UART: [art] SIG.S = 6BDA6B8A239BFC6C57C14E8CC53589011961CCA055C35931A9DA846BAED1393658221E546CD9A3525E3FF1C457B9BC8A
3,055,478 UART: Caliptra RT
3,055,729 UART: [state] CFI Enabled
3,174,712 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,340 UART: [rt]cmd =0x54514754, len=24
3,207,745 >>> mbox cmd response data (8 bytes)
3,207,746 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,209 UART: [rt]cmd =0x54514754, len=24
3,238,675 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,264 UART: [state] WD Timer not started. Device not locked for debugging
87,535 UART: [kat] SHA2-256
891,085 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,189 UART: [kat] ++
895,341 UART: [kat] sha1
899,437 UART: [kat] SHA2-256
901,377 UART: [kat] SHA2-384
904,020 UART: [kat] SHA2-512-ACC
905,921 UART: [kat] ECC-384
915,284 UART: [kat] HMAC-384Kdf
919,894 UART: [kat] LMS
1,168,206 UART: [kat] --
1,169,069 UART: [cold-reset] ++
1,169,517 UART: [fht] FHT @ 0x50003400
1,172,299 UART: [idev] ++
1,172,467 UART: [idev] CDI.KEYID = 6
1,172,828 UART: [idev] SUBJECT.KEYID = 7
1,173,253 UART: [idev] UDS.KEYID = 0
1,173,599 ready_for_fw is high
1,173,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,226 UART: [idev] Erasing UDS.KEYID = 0
1,198,972 UART: [idev] Sha1 KeyId Algorithm
1,207,904 UART: [idev] --
1,208,871 UART: [ldev] ++
1,209,039 UART: [ldev] CDI.KEYID = 6
1,209,403 UART: [ldev] SUBJECT.KEYID = 5
1,209,830 UART: [ldev] AUTHORITY.KEYID = 7
1,210,293 UART: [ldev] FE.KEYID = 1
1,215,519 UART: [ldev] Erasing FE.KEYID = 1
1,241,956 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,203 UART: [ldev] --
1,281,488 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,600 >>> mbox cmd response: success
2,826,600 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,854 UART: [afmc] ++
2,828,022 UART: [afmc] CDI.KEYID = 6
2,828,385 UART: [afmc] SUBJECT.KEYID = 7
2,828,811 UART: [afmc] AUTHORITY.KEYID = 5
2,864,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,371 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,711 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,412 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,271 UART: [afmc] --
2,907,166 UART: [cold-reset] --
2,908,086 UART: [state] Locking Datavault
2,909,089 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,693 UART: [state] Locking ICCM
2,910,121 UART: [exit] Launching FMC @ 0x40000130
2,915,451 UART:
2,915,467 UART: Running Caliptra FMC ...
2,915,875 UART:
2,916,018 UART: [state] CFI Enabled
2,926,338 UART: [fht] FMC Alias Private Key: 7
3,045,306 UART: [art] Extend RT PCRs Done
3,045,734 UART: [art] Lock RT PCRs Done
3,047,290 UART: [art] Populate DV Done
3,055,511 UART: [fht] FMC Alias Private Key: 7
3,056,681 UART: [art] Derive CDI
3,056,961 UART: [art] Store in slot 0x4
3,142,620 UART: [art] Derive Key Pair
3,142,980 UART: [art] Store priv key in slot 0x5
3,156,556 UART: [art] Derive Key Pair - Done
3,171,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,651 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,416 UART: [art] PUB.X = BB96D016F606057F47D8941EEE8ECD13FD48FE0396D62C153AF3A0D0B294BAFCBB55963666C4A04FA6CA8C1578C5D578
3,194,191 UART: [art] PUB.Y = AF2B6F1E82C25D3BF4081F183CA95005778DDEF2E34DB8F13B0D2496E82FEE64C8C7CDB9A85E31B607A9E8702073DBFF
3,201,147 UART: [art] SIG.R = 67C2030D9C0CAA7F5EACFBB2ECDC29CDE7C092AF69196DA7071B320F904F40E0C8E2DD80E241D9250C3C1EF67E9D75D3
3,207,921 UART: [art] SIG.S = 6B605CC9EB48AD702AEADEF685D19474F8500599314602FD3BFE04FE89F775F299DBE5C193110176DDEB093C0329F30A
3,231,042 UART: Caliptra RT
3,231,385 UART: [state] CFI Enabled
3,350,953 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,823 UART: [rt]cmd =0x54514754, len=24
3,384,022 >>> mbox cmd response data (8 bytes)
3,384,023 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,342 UART: [rt]cmd =0x54514754, len=24
3,414,610 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,197 ready_for_fw is high
1,059,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,309 >>> mbox cmd response: success
2,677,309 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,798 UART:
2,739,814 UART: Running Caliptra FMC ...
2,740,222 UART:
2,740,365 UART: [state] CFI Enabled
2,751,051 UART: [fht] FMC Alias Private Key: 7
2,869,685 UART: [art] Extend RT PCRs Done
2,870,113 UART: [art] Lock RT PCRs Done
2,871,921 UART: [art] Populate DV Done
2,880,232 UART: [fht] FMC Alias Private Key: 7
2,881,360 UART: [art] Derive CDI
2,881,640 UART: [art] Store in slot 0x4
2,967,741 UART: [art] Derive Key Pair
2,968,101 UART: [art] Store priv key in slot 0x5
2,981,255 UART: [art] Derive Key Pair - Done
2,995,708 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,394 UART: [art] PUB.X = 1FB7690ACE9506D0D5A0591C41B1B7779A081BA5FAE83D2063AC0F59DECC812EBB07154DFFA7AE29ECF375621FB4AF1E
3,019,171 UART: [art] PUB.Y = EB69956F513AC5FDE35FFA4283CC80467E85197CFDF4C90C0A9BF281E9BA84E042D376C57E887238092A3485D43E0805
3,026,110 UART: [art] SIG.R = 646459AF88653807BF67EAAFA1ACA60485EDFA418CCB96FDC994AEB524FB1CF6C11CFC0BD0F04011D4F25F9B90018F49
3,032,888 UART: [art] SIG.S = 3C85E34E416ACB6BAEEB02933536F3B1C8CF85D11F89758D0488CC7354397BE1480647E8490C5A2672C3E20B2BE88461
3,056,727 UART: Caliptra RT
3,057,070 UART: [state] CFI Enabled
3,176,368 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,984 UART: [rt]cmd =0x54514754, len=24
3,209,079 >>> mbox cmd response data (8 bytes)
3,209,080 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,391 UART: [rt]cmd =0x54514754, len=24
3,239,751 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,233 UART: [state] WD Timer not started. Device not locked for debugging
87,464 UART: [kat] SHA2-256
893,114 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,239 UART: [kat] ++
897,391 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,488 UART: [kat] SHA2-512-ACC
908,389 UART: [kat] ECC-384
918,326 UART: [kat] HMAC-384Kdf
922,830 UART: [kat] LMS
1,171,158 UART: [kat] --
1,172,229 UART: [cold-reset] ++
1,172,573 UART: [fht] FHT @ 0x50003400
1,175,204 UART: [idev] ++
1,175,372 UART: [idev] CDI.KEYID = 6
1,175,732 UART: [idev] SUBJECT.KEYID = 7
1,176,156 UART: [idev] UDS.KEYID = 0
1,176,501 ready_for_fw is high
1,176,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,154 UART: [idev] Erasing UDS.KEYID = 0
1,200,849 UART: [idev] Sha1 KeyId Algorithm
1,209,307 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,080 UART: [ldev] SUBJECT.KEYID = 5
1,211,506 UART: [ldev] AUTHORITY.KEYID = 7
1,211,969 UART: [ldev] FE.KEYID = 1
1,217,037 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,322 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,401 UART: [ldev] --
1,282,902 UART: [fwproc] Wait for Commands...
1,283,658 UART: [fwproc] Recv command 0x46574c44
1,284,386 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,452 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,693 >>> mbox cmd response: success
2,826,693 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,779 UART: [afmc] ++
2,827,947 UART: [afmc] CDI.KEYID = 6
2,828,309 UART: [afmc] SUBJECT.KEYID = 7
2,828,734 UART: [afmc] AUTHORITY.KEYID = 5
2,864,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,453 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,336 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,981 UART: [afmc] --
2,908,017 UART: [cold-reset] --
2,908,871 UART: [state] Locking Datavault
2,910,284 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,888 UART: [state] Locking ICCM
2,911,492 UART: [exit] Launching FMC @ 0x40000130
2,916,822 UART:
2,916,838 UART: Running Caliptra FMC ...
2,917,246 UART:
2,917,300 UART: [state] CFI Enabled
2,928,056 UART: [fht] FMC Alias Private Key: 7
3,047,396 UART: [art] Extend RT PCRs Done
3,047,824 UART: [art] Lock RT PCRs Done
3,049,066 UART: [art] Populate DV Done
3,057,205 UART: [fht] FMC Alias Private Key: 7
3,058,243 UART: [art] Derive CDI
3,058,523 UART: [art] Store in slot 0x4
3,144,600 UART: [art] Derive Key Pair
3,144,960 UART: [art] Store priv key in slot 0x5
3,158,198 UART: [art] Derive Key Pair - Done
3,172,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,048 UART: [art] PUB.X = D5B8595B9ACFEACE7D7BEA1DB7AF84425341F290975D626B40EA93E10B42A0C6FAFB833D2698184FC85D1CEBA3C9FA81
3,195,837 UART: [art] PUB.Y = 53B19521D3001DFBAFB21E5E207BFA80C804D0795B21F2F33569ECF8865B3743F14C60B47EBA36A326A6224758B81B4F
3,202,766 UART: [art] SIG.R = 52B9CB0C28EA87BEC77D73047A455593AA0F17310CDEE10FCBAC4A5E883B29EC8FF95BEFF7E35965BC0EB363B48C3343
3,209,538 UART: [art] SIG.S = 6C2F3BDE83D7E8128EC718313E0E0BDB41AED456853BAADA9AFDD933BB06BBE7BA1B263299080675A437A8C3BD74FB7F
3,233,413 UART: Caliptra RT
3,233,664 UART: [state] CFI Enabled
3,354,088 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,670 UART: [rt]cmd =0x54514754, len=24
3,387,053 >>> mbox cmd response data (8 bytes)
3,387,054 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,737 UART: [rt]cmd =0x54514754, len=24
3,418,303 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,231 ready_for_fw is high
1,060,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,376 >>> mbox cmd response: success
2,677,376 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,515 UART:
2,739,531 UART: Running Caliptra FMC ...
2,739,939 UART:
2,739,993 UART: [state] CFI Enabled
2,750,835 UART: [fht] FMC Alias Private Key: 7
2,869,369 UART: [art] Extend RT PCRs Done
2,869,797 UART: [art] Lock RT PCRs Done
2,871,529 UART: [art] Populate DV Done
2,879,582 UART: [fht] FMC Alias Private Key: 7
2,880,584 UART: [art] Derive CDI
2,880,864 UART: [art] Store in slot 0x4
2,966,761 UART: [art] Derive Key Pair
2,967,121 UART: [art] Store priv key in slot 0x5
2,980,145 UART: [art] Derive Key Pair - Done
2,994,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,548 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,313 UART: [art] PUB.X = 6AB190A4ECE78F758D32C850527AE8503E0B85CBB8930E1B05509E60052576828BFBF9D231B5F95EEDCDDF3BBB863951
3,018,081 UART: [art] PUB.Y = 992476AAF62F59D31771AA5A9AD792226B0EBF038164BDE48C50CCE1C136978A6A7612F38B918DDCBA8DD8364FBCFEEE
3,025,043 UART: [art] SIG.R = 17905DBCAA76D978E0F04577F27094047487AE495824EDCA11DE215E7678C9B52221E4F094772D6C332B07269810244C
3,031,797 UART: [art] SIG.S = 2C786E2E4DBB149B7EDC55C7B153599297601FE1D7F00EB3393630F35F531FC3878E0020D0EECE204EBF0BC2426B4EA9
3,055,519 UART: Caliptra RT
3,055,770 UART: [state] CFI Enabled
3,174,390 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,750 UART: [rt]cmd =0x54514754, len=24
3,206,837 >>> mbox cmd response data (8 bytes)
3,206,838 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,263 UART: [rt]cmd =0x54514754, len=24
3,237,871 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,925 UART: [state] LifecycleState = Unprovisioned
85,580 UART: [state] DebugLocked = No
86,166 UART: [state] WD Timer not started. Device not locked for debugging
87,403 UART: [kat] SHA2-256
893,053 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,178 UART: [kat] ++
897,330 UART: [kat] sha1
901,720 UART: [kat] SHA2-256
903,660 UART: [kat] SHA2-384
906,213 UART: [kat] SHA2-512-ACC
908,114 UART: [kat] ECC-384
918,047 UART: [kat] HMAC-384Kdf
922,535 UART: [kat] LMS
1,170,863 UART: [kat] --
1,171,994 UART: [cold-reset] ++
1,172,506 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 ready_for_fw is high
1,176,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,613 UART: [idev] Erasing UDS.KEYID = 0
1,201,108 UART: [idev] Sha1 KeyId Algorithm
1,209,758 UART: [idev] --
1,210,654 UART: [ldev] ++
1,210,822 UART: [ldev] CDI.KEYID = 6
1,211,185 UART: [ldev] SUBJECT.KEYID = 5
1,211,611 UART: [ldev] AUTHORITY.KEYID = 7
1,212,074 UART: [ldev] FE.KEYID = 1
1,217,190 UART: [ldev] Erasing FE.KEYID = 1
1,243,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,996 UART: [ldev] --
1,282,369 UART: [fwproc] Wait for Commands...
1,282,963 UART: [fwproc] Recv command 0x46574c44
1,283,691 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,633 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,803 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,186 >>> mbox cmd response: success
2,826,186 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,270 UART: [afmc] ++
2,827,438 UART: [afmc] CDI.KEYID = 6
2,827,800 UART: [afmc] SUBJECT.KEYID = 7
2,828,225 UART: [afmc] AUTHORITY.KEYID = 5
2,863,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,703 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,412 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,295 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,960 UART: [afmc] --
2,906,996 UART: [cold-reset] --
2,907,884 UART: [state] Locking Datavault
2,908,963 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,567 UART: [state] Locking ICCM
2,910,025 UART: [exit] Launching FMC @ 0x40000130
2,915,355 UART:
2,915,371 UART: Running Caliptra FMC ...
2,915,779 UART:
2,915,922 UART: [state] CFI Enabled
2,926,782 UART: [fht] FMC Alias Private Key: 7
3,046,072 UART: [art] Extend RT PCRs Done
3,046,500 UART: [art] Lock RT PCRs Done
3,048,480 UART: [art] Populate DV Done
3,056,645 UART: [fht] FMC Alias Private Key: 7
3,057,603 UART: [art] Derive CDI
3,057,883 UART: [art] Store in slot 0x4
3,143,870 UART: [art] Derive Key Pair
3,144,230 UART: [art] Store priv key in slot 0x5
3,158,130 UART: [art] Derive Key Pair - Done
3,172,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,840 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,605 UART: [art] PUB.X = 315FFED3858D5E5DF796CA5AF809EF204CB7535E6766889DE47E7EE64593F5A942F5280FF0DB63FC0BC0AFE97C878478
3,196,378 UART: [art] PUB.Y = 4E24FED2E8DE49B6CF12E630673025C52A01CEF106AD050405A6B342B2570FA9AA574DB0001D4D3309C314F41CA8A03B
3,203,293 UART: [art] SIG.R = A09F09A7BC79A66A983DC88C956602019493EACCA59EAADCE9A71195DC5EDC15F1D012BB31E3EBA2504D4CA8C980151D
3,210,072 UART: [art] SIG.S = 659E116727EF4210E6E4FD026B275B85EFFD80556C53B150E4E51EAF4C28E78ED272BC4367629F9B202C7E7C6A437E7F
3,234,443 UART: Caliptra RT
3,234,786 UART: [state] CFI Enabled
3,354,655 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,519 UART: [rt]cmd =0x54514754, len=24
3,387,804 >>> mbox cmd response data (8 bytes)
3,387,805 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,024 UART: [rt]cmd =0x54514754, len=24
3,418,378 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,748 ready_for_fw is high
1,060,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,981 >>> mbox cmd response: success
2,680,981 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,208 UART:
2,743,224 UART: Running Caliptra FMC ...
2,743,632 UART:
2,743,775 UART: [state] CFI Enabled
2,754,465 UART: [fht] FMC Alias Private Key: 7
2,873,777 UART: [art] Extend RT PCRs Done
2,874,205 UART: [art] Lock RT PCRs Done
2,875,631 UART: [art] Populate DV Done
2,883,864 UART: [fht] FMC Alias Private Key: 7
2,884,952 UART: [art] Derive CDI
2,885,232 UART: [art] Store in slot 0x4
2,970,879 UART: [art] Derive Key Pair
2,971,239 UART: [art] Store priv key in slot 0x5
2,984,441 UART: [art] Derive Key Pair - Done
2,999,243 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,054 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,819 UART: [art] PUB.X = 5A4B8AB3B9237603010ACB14EF744055194B7F3764075F519C075871D534D4BE4B7B50611C9A9196A4190666507A4538
3,022,557 UART: [art] PUB.Y = AD9964D14846EFAC8F6830C735525AACCAB3E58D32A3B773245271D7A264C03191834A1FFFEB7C471EE9A4631E193518
3,029,511 UART: [art] SIG.R = 8893487B6E7EF1159E02F7878B2F38D2E0B788070F5DAEB0C588E141D0F8979FA770990E6BFC5B6984E52D5CF3F69E4C
3,036,275 UART: [art] SIG.S = EB1141955208E029CE7313C70AE39120DB062CE80AA3489D1A9E85B714ED604599D88874BC9245065AD1911BAC3FEBAC
3,059,760 UART: Caliptra RT
3,060,103 UART: [state] CFI Enabled
3,180,763 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,475 UART: [rt]cmd =0x54514754, len=24
3,213,428 >>> mbox cmd response data (8 bytes)
3,213,429 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,930 UART: [rt]cmd =0x54514754, len=24
3,244,666 >>> mbox cmd response: failed
test test_tagging::test_duplicate_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,040 UART:
192,407 UART: Running Caliptra ROM ...
193,542 UART:
193,693 UART: [state] CFI Enabled
264,801 UART: [state] LifecycleState = Unprovisioned
266,777 UART: [state] DebugLocked = No
268,457 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,315 UART: [kat] SHA2-256
442,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,476 UART: [kat] ++
453,960 UART: [kat] sha1
464,911 UART: [kat] SHA2-256
467,634 UART: [kat] SHA2-384
472,914 UART: [kat] SHA2-512-ACC
475,281 UART: [kat] ECC-384
2,767,042 UART: [kat] HMAC-384Kdf
2,797,942 UART: [kat] LMS
3,988,252 UART: [kat] --
3,989,825 UART: [cold-reset] ++
3,991,618 UART: [fht] Storing FHT @ 0x50003400
4,004,464 UART: [idev] ++
4,005,036 UART: [idev] CDI.KEYID = 6
4,006,003 UART: [idev] SUBJECT.KEYID = 7
4,007,254 UART: [idev] UDS.KEYID = 0
4,008,251 ready_for_fw is high
4,008,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,157,621 UART: [idev] Erasing UDS.KEYID = 0
7,345,075 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,537 UART: [idev] --
7,369,412 UART: [ldev] ++
7,369,987 UART: [ldev] CDI.KEYID = 6
7,370,925 UART: [ldev] SUBJECT.KEYID = 5
7,372,154 UART: [ldev] AUTHORITY.KEYID = 7
7,373,385 UART: [ldev] FE.KEYID = 1
7,400,160 UART: [ldev] Erasing FE.KEYID = 1
10,733,826 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,205 UART: [ldev] --
13,094,213 UART: [fwproc] Waiting for Commands...
13,096,591 UART: [fwproc] Received command 0x46574c44
13,098,775 UART: [fwproc] Received Image of size 118548 bytes
17,201,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,279,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,352,514 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,680,606 >>> mbox cmd response: success
17,681,734 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,684,040 UART: [afmc] ++
17,684,626 UART: [afmc] CDI.KEYID = 6
17,685,643 UART: [afmc] SUBJECT.KEYID = 7
17,686,812 UART: [afmc] AUTHORITY.KEYID = 5
21,049,549 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,876 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,350,138 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,364,547 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,379,320 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,393,713 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,415,515 UART: [afmc] --
23,419,094 UART: [cold-reset] --
23,424,256 UART: [state] Locking Datavault
23,428,637 UART: [state] Locking PCR0, PCR1 and PCR31
23,430,385 UART: [state] Locking ICCM
23,432,957 UART: [exit] Launching FMC @ 0x40000130
23,441,356 UART:
23,441,593 UART: Running Caliptra FMC ...
23,442,646 UART:
23,442,795 UART: [state] CFI Enabled
23,508,640 UART: [fht] FMC Alias Private Key: 7
25,848,952 UART: [art] Extend RT PCRs Done
25,850,172 UART: [art] Lock RT PCRs Done
25,851,898 UART: [art] Populate DV Done
25,857,473 UART: [fht] FMC Alias Private Key: 7
25,859,169 UART: [art] Derive CDI
25,859,979 UART: [art] Store in slot 0x4
25,917,210 UART: [art] Derive Key Pair
25,918,249 UART: [art] Store priv key in slot 0x5
29,210,898 UART: [art] Derive Key Pair - Done
29,224,065 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,512,697 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,202 UART: [art] PUB.X = 7BF44CEB967F590CF55E442617957186E5089B65E73D5132A9F28069F69D731BA990DD9808F829B5BA573FA2650B45A5
31,521,437 UART: [art] PUB.Y = D60CD46F5F30A0B4B36162A1E06300FDF610DB94BAC9C1759C0E7731BA8337920F3F606BA80B600F93BEA13DE9BE5522
31,528,721 UART: [art] SIG.R = 521228F77AA07E8402CF61BDE52C49EFCAAFA40836E91E0ACAA322D103C6E78EEDA8DC8921E0016EC1F7F9690E5A5991
31,536,105 UART: [art] SIG.S = 481D2743B705E65E02F94E2C63AA2FC786FFF4ED481377247D1A8F142311767B5E47E3B387768685163F243F6BB6607D
32,841,246 UART: Caliptra RT
32,841,958 UART: [state] CFI Enabled
33,017,112 UART: [rt] RT listening for mailbox commands...
33,048,855 UART: [rt]cmd =0x47544744, len=8
33,050,741 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,803,966 ready_for_fw is high
3,804,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,936,878 >>> mbox cmd response: success
17,938,027 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,629,544 UART:
23,629,932 UART: Running Caliptra FMC ...
23,631,046 UART:
23,631,206 UART: [state] CFI Enabled
23,700,469 UART: [fht] FMC Alias Private Key: 7
26,041,049 UART: [art] Extend RT PCRs Done
26,042,277 UART: [art] Lock RT PCRs Done
26,044,002 UART: [art] Populate DV Done
26,049,290 UART: [fht] FMC Alias Private Key: 7
26,050,891 UART: [art] Derive CDI
26,051,706 UART: [art] Store in slot 0x4
26,110,077 UART: [art] Derive Key Pair
26,111,115 UART: [art] Store priv key in slot 0x5
29,403,547 UART: [art] Derive Key Pair - Done
29,416,667 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,599 UART: [art] Erasing AUTHORITY.KEYID = 7
31,707,104 UART: [art] PUB.X = 9A97FEF4D5B7ABA4ADAF98DB415B7148F0DEA0F4420EC7E422A52635424B2FF9D30237C8AD35180F3A5BDC5742372E18
31,714,403 UART: [art] PUB.Y = CB09CCB7D10C07E4B46626BB631A9D248453D81B9EC9084EB69A990E064EBBA45EC538435E184526DE780BC21DF1029D
31,721,640 UART: [art] SIG.R = FBB39541923BA9CA06E2F718276A78AF7CBFD9F6D53A6355AE9A86AFA44F7E5C01D8EA656BFDC036F660929D3CE565C7
31,729,090 UART: [art] SIG.S = 5AAD0CD9BB86FD428B965E1AE4078CF3302E227728E1BD4378B65222CCAD5338839B7AF08881426A1E0AFFB29AD24131
33,034,054 UART: Caliptra RT
33,034,761 UART: [state] CFI Enabled
33,212,656 UART: [rt] RT listening for mailbox commands...
33,244,015 UART: [rt]cmd =0x47544744, len=8
33,246,024 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,432 UART:
192,801 UART: Running Caliptra ROM ...
193,926 UART:
603,489 UART: [state] CFI Enabled
616,030 UART: [state] LifecycleState = Unprovisioned
617,907 UART: [state] DebugLocked = No
619,152 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,373 UART: [kat] SHA2-256
793,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,604 UART: [kat] ++
804,076 UART: [kat] sha1
815,749 UART: [kat] SHA2-256
818,409 UART: [kat] SHA2-384
824,462 UART: [kat] SHA2-512-ACC
826,829 UART: [kat] ECC-384
3,111,847 UART: [kat] HMAC-384Kdf
3,123,785 UART: [kat] LMS
4,313,916 UART: [kat] --
4,317,701 UART: [cold-reset] ++
4,319,206 UART: [fht] Storing FHT @ 0x50003400
4,332,168 UART: [idev] ++
4,332,759 UART: [idev] CDI.KEYID = 6
4,333,643 UART: [idev] SUBJECT.KEYID = 7
4,334,879 UART: [idev] UDS.KEYID = 0
4,335,892 ready_for_fw is high
4,336,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,003 UART: [idev] Erasing UDS.KEYID = 0
7,623,274 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,635 UART: [idev] --
7,648,006 UART: [ldev] ++
7,648,575 UART: [ldev] CDI.KEYID = 6
7,649,552 UART: [ldev] SUBJECT.KEYID = 5
7,650,764 UART: [ldev] AUTHORITY.KEYID = 7
7,651,992 UART: [ldev] FE.KEYID = 1
7,665,925 UART: [ldev] Erasing FE.KEYID = 1
10,953,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,740 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,355 UART: [ldev] --
13,314,614 UART: [fwproc] Waiting for Commands...
13,316,646 UART: [fwproc] Received command 0x46574c44
13,318,820 UART: [fwproc] Received Image of size 118548 bytes
17,427,450 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,972 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,132 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,904,294 >>> mbox cmd response: success
17,904,833 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
17,908,810 UART: [afmc] ++
17,909,384 UART: [afmc] CDI.KEYID = 6
17,910,351 UART: [afmc] SUBJECT.KEYID = 7
17,911,669 UART: [afmc] AUTHORITY.KEYID = 5
21,227,186 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,792 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,524,043 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,553,220 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,605 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,243 UART: [afmc] --
23,592,330 UART: [cold-reset] --
23,596,929 UART: [state] Locking Datavault
23,600,825 UART: [state] Locking PCR0, PCR1 and PCR31
23,602,594 UART: [state] Locking ICCM
23,603,987 UART: [exit] Launching FMC @ 0x40000130
23,612,379 UART:
23,612,607 UART: Running Caliptra FMC ...
23,613,699 UART:
23,613,851 UART: [state] CFI Enabled
23,621,995 UART: [fht] FMC Alias Private Key: 7
25,962,050 UART: [art] Extend RT PCRs Done
25,963,278 UART: [art] Lock RT PCRs Done
25,965,056 UART: [art] Populate DV Done
25,970,521 UART: [fht] FMC Alias Private Key: 7
25,972,004 UART: [art] Derive CDI
25,972,768 UART: [art] Store in slot 0x4
26,015,074 UART: [art] Derive Key Pair
26,016,109 UART: [art] Store priv key in slot 0x5
29,258,121 UART: [art] Derive Key Pair - Done
29,271,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,550,919 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,419 UART: [art] PUB.X = FF92A375EA94E6864B1FAE63CC0398C1E3C753ABB74074AC8A1078D876889AC2F3240E59F427D66145EAE04A902BBE82
31,559,705 UART: [art] PUB.Y = 61AB6638D0A5CC678DAC16660BBC3DC0C988C3A6D767CFBD7A7C40F6C9DC081317EAB9021055F204205ED26793EA038B
31,566,972 UART: [art] SIG.R = E10EA81F1D54A9CB0C47D3A87EFFF678CF0547EDF2C99BFAD7516A269438D75787547145E59FA947A10082C31C144A6C
31,574,347 UART: [art] SIG.S = 4F5A7D7993FFF49FCBA070EAB776330464FE67CD6438D0B70CBE1B431DDE3FD4F5DEC5CA03C422F0C48955B194864B95
32,879,375 UART: Caliptra RT
32,880,070 UART: [state] CFI Enabled
33,014,355 UART: [rt] RT listening for mailbox commands...
33,045,707 UART: [rt]cmd =0x47544744, len=8
33,047,732 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,126,436 ready_for_fw is high
4,126,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,612 >>> mbox cmd response: success
18,157,291 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
23,804,046 UART:
23,804,434 UART: Running Caliptra FMC ...
23,805,544 UART:
23,805,703 UART: [state] CFI Enabled
23,813,661 UART: [fht] FMC Alias Private Key: 7
26,153,762 UART: [art] Extend RT PCRs Done
26,154,984 UART: [art] Lock RT PCRs Done
26,156,610 UART: [art] Populate DV Done
26,162,023 UART: [fht] FMC Alias Private Key: 7
26,163,726 UART: [art] Derive CDI
26,164,539 UART: [art] Store in slot 0x4
26,207,150 UART: [art] Derive Key Pair
26,208,147 UART: [art] Store priv key in slot 0x5
29,450,348 UART: [art] Derive Key Pair - Done
29,463,451 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,992 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,494 UART: [art] PUB.X = 2F20B1353481EC55A00899054B1010B689E3D681799F8D5DA0FB005F710B4B4FD26117EF8E40C585F3E2E588FD47A526
31,752,751 UART: [art] PUB.Y = F857BBF6D8AA51546E632C7ABECA15CAFFCD78575E378E5746B7F6EC95B5AB80586EAD35F14F52067B8EA88660FC6A6F
31,760,047 UART: [art] SIG.R = E33B1186A1644F72CEF17CADC8F167F9E9A479D62A8EC492F5A875641029BCE4576205891CB3CBD061C4F68B07303711
31,767,380 UART: [art] SIG.S = 14F6F007C68E66F0B56C8A75AC20B1AD5712224849B3E938DFD9B985F8CFFC8FEEDFBC2511F27D38E0E4DBB8977F2D42
33,072,761 UART: Caliptra RT
33,073,478 UART: [state] CFI Enabled
33,207,850 UART: [rt] RT listening for mailbox commands...
33,239,125 UART: [rt]cmd =0x47544744, len=8
33,241,066 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,997 UART:
192,365 UART: Running Caliptra ROM ...
193,491 UART:
193,638 UART: [state] CFI Enabled
265,558 UART: [state] LifecycleState = Unprovisioned
267,413 UART: [state] DebugLocked = No
270,460 UART: [state] WD Timer not started. Device not locked for debugging
275,088 UART: [kat] SHA2-256
454,714 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,514 UART: [kat] ++
465,958 UART: [kat] sha1
475,974 UART: [kat] SHA2-256
478,617 UART: [kat] SHA2-384
483,604 UART: [kat] SHA2-512-ACC
485,965 UART: [kat] ECC-384
2,949,822 UART: [kat] HMAC-384Kdf
2,973,226 UART: [kat] LMS
3,449,726 UART: [kat] --
3,452,105 UART: [cold-reset] ++
3,454,254 UART: [fht] FHT @ 0x50003400
3,465,581 UART: [idev] ++
3,466,218 UART: [idev] CDI.KEYID = 6
3,467,099 UART: [idev] SUBJECT.KEYID = 7
3,468,423 UART: [idev] UDS.KEYID = 0
3,469,349 ready_for_fw is high
3,469,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,486 UART: [idev] Erasing UDS.KEYID = 0
5,987,009 UART: [idev] Sha1 KeyId Algorithm
6,009,923 UART: [idev] --
6,013,970 UART: [ldev] ++
6,014,544 UART: [ldev] CDI.KEYID = 6
6,015,431 UART: [ldev] SUBJECT.KEYID = 5
6,016,696 UART: [ldev] AUTHORITY.KEYID = 7
6,017,933 UART: [ldev] FE.KEYID = 1
6,061,100 UART: [ldev] Erasing FE.KEYID = 1
8,567,550 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,685 UART: [ldev] --
10,378,218 UART: [fwproc] Wait for Commands...
10,381,175 UART: [fwproc] Recv command 0x46574c44
10,383,156 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,890 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,339,663 >>> mbox cmd response: success
14,340,876 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,343,618 UART: [afmc] ++
14,344,192 UART: [afmc] CDI.KEYID = 6
14,345,136 UART: [afmc] SUBJECT.KEYID = 7
14,346,343 UART: [afmc] AUTHORITY.KEYID = 5
16,873,578 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,600,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,602,290 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,618,151 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,634,194 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,649,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,673,972 UART: [afmc] --
18,677,978 UART: [cold-reset] --
18,682,546 UART: [state] Locking Datavault
18,687,793 UART: [state] Locking PCR0, PCR1 and PCR31
18,689,547 UART: [state] Locking ICCM
18,691,913 UART: [exit] Launching FMC @ 0x40000130
18,700,302 UART:
18,700,532 UART: Running Caliptra FMC ...
18,701,629 UART:
18,701,784 UART: [state] CFI Enabled
18,754,168 UART: [fht] FMC Alias Private Key: 7
20,521,672 UART: [art] Extend RT PCRs Done
20,522,892 UART: [art] Lock RT PCRs Done
20,524,369 UART: [art] Populate DV Done
20,529,726 UART: [fht] FMC Alias Private Key: 7
20,531,421 UART: [art] Derive CDI
20,532,235 UART: [art] Store in slot 0x4
20,586,764 UART: [art] Derive Key Pair
20,587,763 UART: [art] Store priv key in slot 0x5
23,050,738 UART: [art] Derive Key Pair - Done
23,064,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,903 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,407 UART: [art] PUB.X = 30A3E441649F43AC071766DC306828785CB891A5A8E3B4F93BEF1980979D32A2883938141D50516DC357BA68EB771B74
24,784,655 UART: [art] PUB.Y = ED15FCB79E82951F34FBD43A6F088889C6A01B3416C5AF77D9C460FFAFCB8EE03C132B6EDE2BB9D991E693696EF2D9AB
24,791,949 UART: [art] SIG.R = 9812C748A46B8C953DC40D5A7AF0CE6C24C06D5D33EA00E65539CC7935B03F0F631FBD1C7F198A38C2B5BC0C66C759CE
24,799,333 UART: [art] SIG.S = 0EE961057913775DB6390C748C1E87DF78BCA36BBDCA3B2EBC05C1850FCC3718323681624BAC395DE202BD5B1B73817A
25,778,489 UART: Caliptra RT
25,779,190 UART: [state] CFI Enabled
25,959,511 UART: [rt] RT listening for mailbox commands...
25,991,050 UART: [rt]cmd =0x47544744, len=8
25,992,991 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,464,150 ready_for_fw is high
3,464,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,224,442 >>> mbox cmd response: success
14,225,714 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,511,931 UART:
18,512,319 UART: Running Caliptra FMC ...
18,513,504 UART:
18,513,666 UART: [state] CFI Enabled
18,582,532 UART: [fht] FMC Alias Private Key: 7
20,369,796 UART: [art] Extend RT PCRs Done
20,371,028 UART: [art] Lock RT PCRs Done
20,372,686 UART: [art] Populate DV Done
20,378,118 UART: [fht] FMC Alias Private Key: 7
20,379,698 UART: [art] Derive CDI
20,380,461 UART: [art] Store in slot 0x4
20,436,498 UART: [art] Derive Key Pair
20,437,499 UART: [art] Store priv key in slot 0x5
22,900,160 UART: [art] Derive Key Pair - Done
22,913,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,626,159 UART: [art] Erasing AUTHORITY.KEYID = 7
24,627,660 UART: [art] PUB.X = 7D53AC1BA903E37589A53DB7671A8299230FC4205263E1541F9553722E9E306CBD21B7D5CD895020B8A548A79A14A224
24,634,906 UART: [art] PUB.Y = 591E3AC7C22674FAF8FFABB9D738CFC18CEEE510AF0E2B35DBE8EF295A124065F6E261C98D5F3B0F520AE4EB90317C98
24,642,212 UART: [art] SIG.R = EE7A16529285D507350C095446FDA0805BF3996123A166908259181B0E2913159968FD59F0AD64A4734BA1822C04EFE3
24,649,560 UART: [art] SIG.S = 99FF3DF76CD164F2DA1AEE88C44C05D45F2099BABAFA31FA2ECC96C58ED4030FDAFF033B58453AC01EF38F3C51DB924B
25,628,587 UART: Caliptra RT
25,629,288 UART: [state] CFI Enabled
25,810,197 UART: [rt] RT listening for mailbox commands...
25,841,624 UART: [rt]cmd =0x47544744, len=8
25,843,484 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,514 UART:
192,879 UART: Running Caliptra ROM ...
194,065 UART:
603,840 UART: [state] CFI Enabled
617,235 UART: [state] LifecycleState = Unprovisioned
619,178 UART: [state] DebugLocked = No
621,131 UART: [state] WD Timer not started. Device not locked for debugging
624,807 UART: [kat] SHA2-256
804,428 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,235 UART: [kat] ++
815,686 UART: [kat] sha1
826,934 UART: [kat] SHA2-256
829,632 UART: [kat] SHA2-384
835,843 UART: [kat] SHA2-512-ACC
838,215 UART: [kat] ECC-384
3,281,343 UART: [kat] HMAC-384Kdf
3,293,870 UART: [kat] LMS
3,770,390 UART: [kat] --
3,774,669 UART: [cold-reset] ++
3,776,955 UART: [fht] FHT @ 0x50003400
3,789,583 UART: [idev] ++
3,790,184 UART: [idev] CDI.KEYID = 6
3,791,110 UART: [idev] SUBJECT.KEYID = 7
3,792,362 UART: [idev] UDS.KEYID = 0
3,793,310 ready_for_fw is high
3,793,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,402 UART: [idev] Erasing UDS.KEYID = 0
6,270,769 UART: [idev] Sha1 KeyId Algorithm
6,293,802 UART: [idev] --
6,300,283 UART: [ldev] ++
6,300,917 UART: [ldev] CDI.KEYID = 6
6,301,835 UART: [ldev] SUBJECT.KEYID = 5
6,303,002 UART: [ldev] AUTHORITY.KEYID = 7
6,304,299 UART: [ldev] FE.KEYID = 1
6,315,762 UART: [ldev] Erasing FE.KEYID = 1
8,795,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,901 UART: [ldev] --
10,588,468 UART: [fwproc] Wait for Commands...
10,590,065 UART: [fwproc] Recv command 0x46574c44
10,592,067 UART: [fwproc] Recv'd Img size: 118548 bytes
14,076,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,072 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,108 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,785 >>> mbox cmd response: success
14,556,975 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,559,597 UART: [afmc] ++
14,560,178 UART: [afmc] CDI.KEYID = 6
14,561,201 UART: [afmc] SUBJECT.KEYID = 7
14,562,365 UART: [afmc] AUTHORITY.KEYID = 5
17,065,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,788,187 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,264 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,891 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,862,436 UART: [afmc] --
18,866,145 UART: [cold-reset] --
18,869,795 UART: [state] Locking Datavault
18,876,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,878,362 UART: [state] Locking ICCM
18,880,617 UART: [exit] Launching FMC @ 0x40000130
18,889,022 UART:
18,889,262 UART: Running Caliptra FMC ...
18,890,366 UART:
18,890,524 UART: [state] CFI Enabled
18,898,351 UART: [fht] FMC Alias Private Key: 7
20,664,415 UART: [art] Extend RT PCRs Done
20,665,769 UART: [art] Lock RT PCRs Done
20,667,363 UART: [art] Populate DV Done
20,673,209 UART: [fht] FMC Alias Private Key: 7
20,674,911 UART: [art] Derive CDI
20,675,727 UART: [art] Store in slot 0x4
20,718,491 UART: [art] Derive Key Pair
20,719,491 UART: [art] Store priv key in slot 0x5
23,146,608 UART: [art] Derive Key Pair - Done
23,159,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,865,706 UART: [art] Erasing AUTHORITY.KEYID = 7
24,867,211 UART: [art] PUB.X = 90B3C7F02FA3D51B445548EC60A1B74F24F7BF3EA486C7E822FE4EFAD850936F7409654E63643BBCA26A2A90DCF65053
24,874,510 UART: [art] PUB.Y = 75E2D60D638CF708121076923A4245CB649CD6E7A67E1527ED185679546D81628B70D4D2B31996310ECF60A1758AAF7E
24,881,745 UART: [art] SIG.R = 11BCF3E85142011004E6FCAE472634FE6D25A5465BB612473A6323F15B13CD2AA3009A67E981F32F8982FBCC9D071695
24,889,079 UART: [art] SIG.S = 870D2DF55B89492CDBC82EA0D6544CF8E7837A2E026D3C8B6B2175FBFF8D98DDC6ADC62999386118F1AD18D92ED6389F
25,868,232 UART: Caliptra RT
25,868,932 UART: [state] CFI Enabled
26,001,387 UART: [rt] RT listening for mailbox commands...
26,032,623 UART: [rt]cmd =0x47544744, len=8
26,034,666 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
3,779,493 ready_for_fw is high
3,779,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,453,778 >>> mbox cmd response: success
14,455,297 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
18,700,154 UART:
18,700,538 UART: Running Caliptra FMC ...
18,701,736 UART:
18,701,912 UART: [state] CFI Enabled
18,709,819 UART: [fht] FMC Alias Private Key: 7
20,475,447 UART: [art] Extend RT PCRs Done
20,476,665 UART: [art] Lock RT PCRs Done
20,478,452 UART: [art] Populate DV Done
20,483,712 UART: [fht] FMC Alias Private Key: 7
20,485,377 UART: [art] Derive CDI
20,486,409 UART: [art] Store in slot 0x4
20,528,656 UART: [art] Derive Key Pair
20,529,662 UART: [art] Store priv key in slot 0x5
22,956,552 UART: [art] Derive Key Pair - Done
22,969,389 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,635 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,136 UART: [art] PUB.X = F88CD78FF9D8A00D05D0E7348B9157122FA1D033DF0AEBEE96C32A44F1AD048BB2DF829D5F35B4473CF38F7BF5BF3A1F
24,684,446 UART: [art] PUB.Y = D261F9708958AA41D81E0EBC995BF14CC802581AFD1D6F0D9DDD7D5F1CF82201286058E4FFAF87AB62412FEF9C63EE30
24,691,703 UART: [art] SIG.R = 05C4EC853D8DCBB57C0175ACFD87054353939BBA516318B669E7F65DAC68C4F8F49E01F4D5B2B15778331A3E59ACE713
24,699,111 UART: [art] SIG.S = C6EDA84CDCED3D72F17004E645E45CAD81C79E84E3DEF3629ED03D9EC96E5BFBA4C1CFF315A12B6C80B42BA225B4E13C
25,677,604 UART: Caliptra RT
25,678,317 UART: [state] CFI Enabled
25,812,451 UART: [rt] RT listening for mailbox commands...
25,843,759 UART: [rt]cmd =0x47544744, len=8
25,845,870 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,067 UART:
192,438 UART: Running Caliptra ROM ...
193,627 UART:
193,780 UART: [state] CFI Enabled
264,032 UART: [state] LifecycleState = Unprovisioned
266,425 UART: [state] DebugLocked = No
267,811 UART: [state] WD Timer not started. Device not locked for debugging
272,268 UART: [kat] SHA2-256
462,203 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,957 UART: [kat] ++
473,447 UART: [kat] sha1
485,028 UART: [kat] SHA2-256
488,046 UART: [kat] SHA2-384
494,424 UART: [kat] SHA2-512-ACC
497,062 UART: [kat] ECC-384
2,953,180 UART: [kat] HMAC-384Kdf
2,975,368 UART: [kat] LMS
3,507,130 UART: [kat] --
3,511,761 UART: [cold-reset] ++
3,513,829 UART: [fht] FHT @ 0x50003400
3,524,872 UART: [idev] ++
3,525,582 UART: [idev] CDI.KEYID = 6
3,526,488 UART: [idev] SUBJECT.KEYID = 7
3,527,729 UART: [idev] UDS.KEYID = 0
3,528,646 ready_for_fw is high
3,528,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,889 UART: [idev] Erasing UDS.KEYID = 0
6,033,230 UART: [idev] Sha1 KeyId Algorithm
6,054,582 UART: [idev] --
6,060,089 UART: [ldev] ++
6,060,847 UART: [ldev] CDI.KEYID = 6
6,061,770 UART: [ldev] SUBJECT.KEYID = 5
6,062,874 UART: [ldev] AUTHORITY.KEYID = 7
6,064,105 UART: [ldev] FE.KEYID = 1
6,104,245 UART: [ldev] Erasing FE.KEYID = 1
8,607,553 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,673 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,805 UART: [ldev] --
10,417,136 UART: [fwproc] Wait for Commands...
10,418,784 UART: [fwproc] Recv command 0x46574c44
10,421,043 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,156 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,667,105 >>> mbox cmd response: success
14,668,226 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,671,833 UART: [afmc] ++
14,672,525 UART: [afmc] CDI.KEYID = 6
14,673,764 UART: [afmc] SUBJECT.KEYID = 7
14,675,200 UART: [afmc] AUTHORITY.KEYID = 5
17,220,831 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,943,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,945,450 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,960,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,975,674 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,990,585 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,014,876 UART: [afmc] --
19,017,876 UART: [cold-reset] --
19,021,518 UART: [state] Locking Datavault
19,026,247 UART: [state] Locking PCR0, PCR1 and PCR31
19,028,435 UART: [state] Locking ICCM
19,030,208 UART: [exit] Launching FMC @ 0x40000130
19,038,869 UART:
19,039,101 UART: Running Caliptra FMC ...
19,040,202 UART:
19,040,360 UART: [state] CFI Enabled
19,100,775 UART: [fht] FMC Alias Private Key: 7
20,867,422 UART: [art] Extend RT PCRs Done
20,868,632 UART: [art] Lock RT PCRs Done
20,870,579 UART: [art] Populate DV Done
20,876,198 UART: [fht] FMC Alias Private Key: 7
20,877,894 UART: [art] Derive CDI
20,878,700 UART: [art] Store in slot 0x4
20,933,329 UART: [art] Derive Key Pair
20,934,371 UART: [art] Store priv key in slot 0x5
23,397,495 UART: [art] Derive Key Pair - Done
23,410,710 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,122,741 UART: [art] Erasing AUTHORITY.KEYID = 7
25,124,256 UART: [art] PUB.X = FB1635045AE6FF7697F7269CABAD84D3589C5C472CE4310E925B0A267FC8343876DE9BE6B11741F07BC8A7083ABDB9B1
25,131,499 UART: [art] PUB.Y = 531D170A2410989E75348F0EE195A09DE4CBB3FF45BFE88EC78F77A97120F36B67CD722DACEFD12AFF5784C1062810FA
25,138,815 UART: [art] SIG.R = 4C215E3EB624FEF75DC01BA87B7A5EEA268AF22DEB1B74C18FFF59D12149F80E6D8351A20625501F2141D7B3FA787411
25,146,222 UART: [art] SIG.S = 25332B97D9145A714D8F1D14A061AC5A34CEF480626373DBDB9648D06B5627DC9D234E8D90C99598C3EEAC720C0B2F6A
26,125,283 UART: Caliptra RT
26,125,973 UART: [state] CFI Enabled
26,305,746 UART: [rt] RT listening for mailbox commands...
26,337,136 UART: [rt]cmd =0x47544744, len=8
26,339,416 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,437,574 ready_for_fw is high
3,437,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,808 >>> mbox cmd response: success
14,824,195 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,136,060 UART:
19,136,448 UART: Running Caliptra FMC ...
19,137,592 UART:
19,137,751 UART: [state] CFI Enabled
19,201,714 UART: [fht] FMC Alias Private Key: 7
20,968,289 UART: [art] Extend RT PCRs Done
20,969,518 UART: [art] Lock RT PCRs Done
20,970,989 UART: [art] Populate DV Done
20,976,369 UART: [fht] FMC Alias Private Key: 7
20,978,127 UART: [art] Derive CDI
20,978,944 UART: [art] Store in slot 0x4
21,034,047 UART: [art] Derive Key Pair
21,035,055 UART: [art] Store priv key in slot 0x5
23,498,114 UART: [art] Derive Key Pair - Done
23,511,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,970 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,481 UART: [art] PUB.X = 08F24B4435FEFC5A1CB5ABCF0795D4D0B977B80F2A2211493B423DADE9861835201CEE9BF5F3B0D09AF00CC3D7AFA5CF
25,232,729 UART: [art] PUB.Y = B7ACDEF8F3D372C3E89EF4803C68674056602C8B4558B930E64FEE3572C8374EBF255F031967A84F6BB0EDFBCC8709BF
25,239,969 UART: [art] SIG.R = 29B73E0D6734A5478CBB2F1DF7AE7C10C58CFFFC171CEFA1BF9091426018C7FAD9D14E1A422CE447E2701B42846E5404
25,247,416 UART: [art] SIG.S = E93B14A2CE56F92CB924D584E7AD36F0150D4E261624CEA6B3F0CF342182585AEBF5D3DCCF56A211ACB625D5D975E9EA
26,226,179 UART: Caliptra RT
26,226,897 UART: [state] CFI Enabled
26,407,156 UART: [rt] RT listening for mailbox commands...
26,438,698 UART: [rt]cmd =0x47544744, len=8
26,440,667 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,699 UART:
193,062 UART: Running Caliptra ROM ...
194,210 UART:
603,852 UART: [state] CFI Enabled
617,102 UART: [state] LifecycleState = Unprovisioned
619,491 UART: [state] DebugLocked = No
620,873 UART: [state] WD Timer not started. Device not locked for debugging
624,636 UART: [kat] SHA2-256
814,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,366 UART: [kat] ++
825,815 UART: [kat] sha1
838,039 UART: [kat] SHA2-256
841,020 UART: [kat] SHA2-384
845,637 UART: [kat] SHA2-512-ACC
848,237 UART: [kat] ECC-384
3,287,871 UART: [kat] HMAC-384Kdf
3,300,889 UART: [kat] LMS
3,832,746 UART: [kat] --
3,837,003 UART: [cold-reset] ++
3,839,230 UART: [fht] FHT @ 0x50003400
3,851,276 UART: [idev] ++
3,851,921 UART: [idev] CDI.KEYID = 6
3,852,958 UART: [idev] SUBJECT.KEYID = 7
3,854,063 UART: [idev] UDS.KEYID = 0
3,855,021 ready_for_fw is high
3,855,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,004,162 UART: [idev] Erasing UDS.KEYID = 0
6,326,090 UART: [idev] Sha1 KeyId Algorithm
6,348,947 UART: [idev] --
6,354,456 UART: [ldev] ++
6,355,189 UART: [ldev] CDI.KEYID = 6
6,356,102 UART: [ldev] SUBJECT.KEYID = 5
6,357,277 UART: [ldev] AUTHORITY.KEYID = 7
6,358,460 UART: [ldev] FE.KEYID = 1
6,371,955 UART: [ldev] Erasing FE.KEYID = 1
8,847,057 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,175 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,436 UART: [ldev] --
10,643,675 UART: [fwproc] Wait for Commands...
10,646,852 UART: [fwproc] Recv command 0x46574c44
10,649,161 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,878 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,475 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,906,008 >>> mbox cmd response: success
14,907,062 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
14,910,869 UART: [afmc] ++
14,911,572 UART: [afmc] CDI.KEYID = 6
14,912,821 UART: [afmc] SUBJECT.KEYID = 7
14,914,257 UART: [afmc] AUTHORITY.KEYID = 5
17,418,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,140,925 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,142,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,016 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,181 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,361 UART: [afmc] --
19,215,847 UART: [cold-reset] --
19,219,441 UART: [state] Locking Datavault
19,224,325 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,470 UART: [state] Locking ICCM
19,227,820 UART: [exit] Launching FMC @ 0x40000130
19,236,499 UART:
19,236,734 UART: Running Caliptra FMC ...
19,237,839 UART:
19,237,999 UART: [state] CFI Enabled
19,246,304 UART: [fht] FMC Alias Private Key: 7
21,011,944 UART: [art] Extend RT PCRs Done
21,013,181 UART: [art] Lock RT PCRs Done
21,014,790 UART: [art] Populate DV Done
21,020,210 UART: [fht] FMC Alias Private Key: 7
21,021,753 UART: [art] Derive CDI
21,022,572 UART: [art] Store in slot 0x4
21,065,118 UART: [art] Derive Key Pair
21,066,117 UART: [art] Store priv key in slot 0x5
23,492,626 UART: [art] Derive Key Pair - Done
23,505,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,212,344 UART: [art] Erasing AUTHORITY.KEYID = 7
25,213,851 UART: [art] PUB.X = E5B54D2F95AF1D62DB9899D3681EE187E7A0147872B9BB82987411E9D38D584283C3BFA477115C81EFE1FC244075624E
25,221,128 UART: [art] PUB.Y = 294D22DC5F5A1760654E08A1A915722E8762056F2F6A19AD088BB37E456B99F165BD2B1A73A0545B54B63C77CE24D651
25,228,379 UART: [art] SIG.R = 0DE36C91E9C90E4F02605EE0268D8799AEC531232DC45E9CB8706503F8ABAA2C0AD35E5C83A11C32A8BF1EDBFDD688A1
25,235,737 UART: [art] SIG.S = 0A5669F1CEB5CC474D63BF223B7CEB0F16D8E221C6A14225986CB72931EDE2C06B5E30050919C0B014C0305AA71C4732
26,214,695 UART: Caliptra RT
26,215,408 UART: [state] CFI Enabled
26,349,483 UART: [rt] RT listening for mailbox commands...
26,381,069 UART: [rt]cmd =0x47544744, len=8
26,382,935 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,757,502 ready_for_fw is high
3,757,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,521 >>> mbox cmd response: success
15,038,106 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
19,289,576 UART:
19,289,978 UART: Running Caliptra FMC ...
19,291,123 UART:
19,291,286 UART: [state] CFI Enabled
19,299,369 UART: [fht] FMC Alias Private Key: 7
21,065,625 UART: [art] Extend RT PCRs Done
21,066,856 UART: [art] Lock RT PCRs Done
21,068,328 UART: [art] Populate DV Done
21,073,696 UART: [fht] FMC Alias Private Key: 7
21,075,197 UART: [art] Derive CDI
21,075,967 UART: [art] Store in slot 0x4
21,118,622 UART: [art] Derive Key Pair
21,119,660 UART: [art] Store priv key in slot 0x5
23,546,685 UART: [art] Derive Key Pair - Done
23,559,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,265,716 UART: [art] Erasing AUTHORITY.KEYID = 7
25,267,227 UART: [art] PUB.X = A1A54BCADDAEEBA006F23276E2B8276A7A0BF8F5A22158A66CA267A2190BF152F02CC99CB0EEA577279D0FF078BAE391
25,274,499 UART: [art] PUB.Y = 1911A916868B76D99EA0C226DA94F2209AB2DD438E962195255526A0A0264C02CF030FE21CD27058CED79B57CFDEC62F
25,281,763 UART: [art] SIG.R = 436801891407CF5D56150A0D387D54BA84D05DB646A5C532BE65ED0E5897DB9C87BB82C68C069CC0F17441A8951DD97F
25,289,136 UART: [art] SIG.S = E9CC95C589C262894C535B57775ED2C7D70A516CACBE5903B1678348E4198E2CE7C7532CE16EC0BC76785AE49DB721B0
26,268,611 UART: Caliptra RT
26,269,300 UART: [state] CFI Enabled
26,401,005 UART: [rt] RT listening for mailbox commands...
26,432,260 UART: [rt]cmd =0x47544744, len=8
26,434,305 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,498 UART: [state] LifecycleState = Unprovisioned
86,153 UART: [state] DebugLocked = No
86,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,355 UART: [kat] SHA2-256
882,286 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,401 UART: [kat] ++
886,553 UART: [kat] sha1
890,939 UART: [kat] SHA2-256
892,877 UART: [kat] SHA2-384
895,550 UART: [kat] SHA2-512-ACC
897,451 UART: [kat] ECC-384
903,236 UART: [kat] HMAC-384Kdf
907,746 UART: [kat] LMS
1,475,942 UART: [kat] --
1,476,889 UART: [cold-reset] ++
1,477,223 UART: [fht] Storing FHT @ 0x50003400
1,480,072 UART: [idev] ++
1,480,240 UART: [idev] CDI.KEYID = 6
1,480,600 UART: [idev] SUBJECT.KEYID = 7
1,481,024 UART: [idev] UDS.KEYID = 0
1,481,369 ready_for_fw is high
1,481,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,048 UART: [idev] Erasing UDS.KEYID = 0
1,505,588 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,366 UART: [idev] --
1,515,431 UART: [ldev] ++
1,515,599 UART: [ldev] CDI.KEYID = 6
1,515,962 UART: [ldev] SUBJECT.KEYID = 5
1,516,388 UART: [ldev] AUTHORITY.KEYID = 7
1,516,851 UART: [ldev] FE.KEYID = 1
1,521,741 UART: [ldev] Erasing FE.KEYID = 1
1,547,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,451 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,058 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,770 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,680 UART: [ldev] --
1,586,075 UART: [fwproc] Waiting for Commands...
1,586,914 UART: [fwproc] Received command 0x46574c44
1,587,705 UART: [fwproc] Received Image of size 118548 bytes
2,932,239 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,249 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,467 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,866 >>> mbox cmd response: success
3,131,866 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,133,120 UART: [afmc] ++
3,133,288 UART: [afmc] CDI.KEYID = 6
3,133,650 UART: [afmc] SUBJECT.KEYID = 7
3,134,075 UART: [afmc] AUTHORITY.KEYID = 5
3,169,058 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,370 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,859 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,742 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,425 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,237 UART: [afmc] --
3,212,117 UART: [cold-reset] --
3,212,963 UART: [state] Locking Datavault
3,214,388 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,992 UART: [state] Locking ICCM
3,215,600 UART: [exit] Launching FMC @ 0x40000130
3,220,930 UART:
3,220,946 UART: Running Caliptra FMC ...
3,221,354 UART:
3,221,408 UART: [state] CFI Enabled
3,231,898 UART: [fht] FMC Alias Private Key: 7
3,350,640 UART: [art] Extend RT PCRs Done
3,351,068 UART: [art] Lock RT PCRs Done
3,352,652 UART: [art] Populate DV Done
3,360,681 UART: [fht] FMC Alias Private Key: 7
3,361,797 UART: [art] Derive CDI
3,362,077 UART: [art] Store in slot 0x4
3,448,065 UART: [art] Derive Key Pair
3,448,425 UART: [art] Store priv key in slot 0x5
3,461,790 UART: [art] Derive Key Pair - Done
3,476,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,844 UART: [art] PUB.X = A824999A6A88329B16379F7776E0A06E352DFB0235604BCAEA99CFA29E80DF9AD3D5F33A80CCAA321CCA8F20DA6BE76D
3,499,629 UART: [art] PUB.Y = 7B730F3F90EDDCC0D6F21877EFA7D54E9C9B8F6B1C0C71FF4343575C1BB4C76000F5FC85B0CC252CEE7963DEF7EC2D7F
3,506,575 UART: [art] SIG.R = 870DB178729CFF8886A9A82646E778C1C15A9AB5CA78BF8B34673699736E5B6FA169544537788EE6DBD20BDD9765AE3C
3,513,343 UART: [art] SIG.S = 325934F60CE9DC12A383C659766428306D2B5985B7AC3FA39EA5B68E725982D62F24B366FA070C2D01971DB6E7F97753
3,536,891 UART: Caliptra RT
3,537,142 UART: [state] CFI Enabled
3,657,614 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,158 UART: [rt]cmd =0x47544744, len=8
3,689,991 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,343 ready_for_fw is high
1,362,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,634 >>> mbox cmd response: success
2,979,634 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,041,419 UART:
3,041,435 UART: Running Caliptra FMC ...
3,041,843 UART:
3,041,897 UART: [state] CFI Enabled
3,052,443 UART: [fht] FMC Alias Private Key: 7
3,171,269 UART: [art] Extend RT PCRs Done
3,171,697 UART: [art] Lock RT PCRs Done
3,173,367 UART: [art] Populate DV Done
3,181,820 UART: [fht] FMC Alias Private Key: 7
3,182,894 UART: [art] Derive CDI
3,183,174 UART: [art] Store in slot 0x4
3,268,724 UART: [art] Derive Key Pair
3,269,084 UART: [art] Store priv key in slot 0x5
3,282,417 UART: [art] Derive Key Pair - Done
3,296,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,786 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,551 UART: [art] PUB.X = BE4A369BD2C377512A3240F0300C0D2C685DFB2938FFD86BDED71983192047A5121AAEF222074CFCB7692045916ECEDA
3,320,320 UART: [art] PUB.Y = A26DBE8AD1618805CEE13AE3AF75438B37BEA54C781756832DCE5EB01B7E4755AEF6BAE450EE64D1ACF00CC02EC531FF
3,327,288 UART: [art] SIG.R = BA322839ED95DB349AADB6023DA42695053436E7083573EEE9214A606717D0C75E00676F5ABFEFFA350F49C38F16F65D
3,334,028 UART: [art] SIG.S = AFD5B4621738CC9B6F2738246348D2ABB19839F305C9B312841B056F9AAB145DB46A7612341868A1123089C7F22CEEC3
3,357,720 UART: Caliptra RT
3,357,971 UART: [state] CFI Enabled
3,478,526 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,002 UART: [rt]cmd =0x47544744, len=8
3,510,535 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,486 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,036 UART: [kat] SHA2-256
881,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,082 UART: [kat] ++
886,234 UART: [kat] sha1
890,314 UART: [kat] SHA2-256
892,252 UART: [kat] SHA2-384
895,061 UART: [kat] SHA2-512-ACC
896,962 UART: [kat] ECC-384
902,849 UART: [kat] HMAC-384Kdf
907,509 UART: [kat] LMS
1,475,705 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,860 UART: [fht] Storing FHT @ 0x50003400
1,479,717 UART: [idev] ++
1,479,885 UART: [idev] CDI.KEYID = 6
1,480,245 UART: [idev] SUBJECT.KEYID = 7
1,480,669 UART: [idev] UDS.KEYID = 0
1,481,014 ready_for_fw is high
1,481,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,845 UART: [idev] Erasing UDS.KEYID = 0
1,505,551 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,097 UART: [idev] --
1,515,268 UART: [ldev] ++
1,515,436 UART: [ldev] CDI.KEYID = 6
1,515,799 UART: [ldev] SUBJECT.KEYID = 5
1,516,225 UART: [ldev] AUTHORITY.KEYID = 7
1,516,688 UART: [ldev] FE.KEYID = 1
1,521,946 UART: [ldev] Erasing FE.KEYID = 1
1,547,491 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,078 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,858 UART: [fwproc] Waiting for Commands...
1,587,661 UART: [fwproc] Received command 0x46574c44
1,588,452 UART: [fwproc] Received Image of size 118548 bytes
2,932,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,098 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,316 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,625 >>> mbox cmd response: success
3,130,625 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,131,811 UART: [afmc] ++
3,131,979 UART: [afmc] CDI.KEYID = 6
3,132,341 UART: [afmc] SUBJECT.KEYID = 7
3,132,766 UART: [afmc] AUTHORITY.KEYID = 5
3,167,937 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,125 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,905 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,614 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,497 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,180 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,984 UART: [afmc] --
3,211,000 UART: [cold-reset] --
3,211,948 UART: [state] Locking Datavault
3,213,303 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,907 UART: [state] Locking ICCM
3,214,457 UART: [exit] Launching FMC @ 0x40000130
3,219,787 UART:
3,219,803 UART: Running Caliptra FMC ...
3,220,211 UART:
3,220,354 UART: [state] CFI Enabled
3,231,346 UART: [fht] FMC Alias Private Key: 7
3,350,590 UART: [art] Extend RT PCRs Done
3,351,018 UART: [art] Lock RT PCRs Done
3,352,678 UART: [art] Populate DV Done
3,360,923 UART: [fht] FMC Alias Private Key: 7
3,361,973 UART: [art] Derive CDI
3,362,253 UART: [art] Store in slot 0x4
3,447,921 UART: [art] Derive Key Pair
3,448,281 UART: [art] Store priv key in slot 0x5
3,461,210 UART: [art] Derive Key Pair - Done
3,476,159 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,862 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,627 UART: [art] PUB.X = ACAB583D87F136512043E157460AA39000671665C3C3EAFF7B76CEE43FDC9374957B5509AB318C019D17E80B44AB491C
3,499,365 UART: [art] PUB.Y = D47059B35C983BB8985BDE22935E13550CB0D507CCE6C82B30B89AAEDF4D93A36FD1EE6605F795E869B3A5D49EC746F9
3,506,318 UART: [art] SIG.R = DB6F9D96C9826B12208D8055401376A9B3ABB1B7D8E540F9E79DCBA6A08CDBAFD7CAB2F3AA9FCEDF6254B181367DE555
3,513,110 UART: [art] SIG.S = 3BDA901A877B6D7E7E1B5ED10CA756E4E0C50F4A910D2CE91C72553FCBCCC8C84FDF8BEA4B78AC6E55E11BABDB71F4FD
3,536,473 UART: Caliptra RT
3,536,816 UART: [state] CFI Enabled
3,656,280 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,762 UART: [rt]cmd =0x47544744, len=8
3,688,311 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,468 ready_for_fw is high
1,362,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,029 >>> mbox cmd response: success
2,980,029 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
3,042,016 UART:
3,042,032 UART: Running Caliptra FMC ...
3,042,440 UART:
3,042,583 UART: [state] CFI Enabled
3,053,283 UART: [fht] FMC Alias Private Key: 7
3,172,569 UART: [art] Extend RT PCRs Done
3,172,997 UART: [art] Lock RT PCRs Done
3,174,435 UART: [art] Populate DV Done
3,182,928 UART: [fht] FMC Alias Private Key: 7
3,183,856 UART: [art] Derive CDI
3,184,136 UART: [art] Store in slot 0x4
3,269,886 UART: [art] Derive Key Pair
3,270,246 UART: [art] Store priv key in slot 0x5
3,282,893 UART: [art] Derive Key Pair - Done
3,297,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,085 UART: [art] PUB.X = D2A819A2B48BFDE0C9576CA811759A2EBDBDD4662360D29947EA4329F0C1F0E592C0D2CB798B341FDB667D8024879A3B
3,320,865 UART: [art] PUB.Y = CA27551B8474E303A8CD04931F0D284A848C49552CBDB96F7E7872F733F6AD4014C097083511E2CB97FD6283198EA694
3,327,799 UART: [art] SIG.R = D3A1F30B8C518599CF8AC25120F99D056CE51785B71CFF6BD1F7B07662956A9B71A47AD5C1D86B62AFB8D61A91935296
3,334,569 UART: [art] SIG.S = AA6C85E07CE843F40A9E9C4CBE6ABCB27EBB77F518A6647632C0B1D851A50D386EEFA3542E83A32D6BBA740545DE03FE
3,358,113 UART: Caliptra RT
3,358,456 UART: [state] CFI Enabled
3,478,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,913 UART: [rt]cmd =0x47544744, len=8
3,510,592 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,524 UART: [kat] SHA2-256
901,464 UART: [kat] SHA2-384
904,353 UART: [kat] SHA2-512-ACC
906,254 UART: [kat] ECC-384
915,827 UART: [kat] HMAC-384Kdf
920,389 UART: [kat] LMS
1,168,701 UART: [kat] --
1,169,614 UART: [cold-reset] ++
1,170,110 UART: [fht] FHT @ 0x50003400
1,172,698 UART: [idev] ++
1,172,866 UART: [idev] CDI.KEYID = 6
1,173,227 UART: [idev] SUBJECT.KEYID = 7
1,173,652 UART: [idev] UDS.KEYID = 0
1,173,998 ready_for_fw is high
1,173,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,833 UART: [idev] Erasing UDS.KEYID = 0
1,198,547 UART: [idev] Sha1 KeyId Algorithm
1,207,283 UART: [idev] --
1,208,144 UART: [ldev] ++
1,208,312 UART: [ldev] CDI.KEYID = 6
1,208,676 UART: [ldev] SUBJECT.KEYID = 5
1,209,103 UART: [ldev] AUTHORITY.KEYID = 7
1,209,566 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,177 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,893 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,792 UART: [ldev] --
1,280,213 UART: [fwproc] Wait for Commands...
1,281,014 UART: [fwproc] Recv command 0x46574c44
1,281,747 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,010 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,113 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,487 >>> mbox cmd response: success
2,825,487 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,826,539 UART: [afmc] ++
2,826,707 UART: [afmc] CDI.KEYID = 6
2,827,070 UART: [afmc] SUBJECT.KEYID = 7
2,827,496 UART: [afmc] AUTHORITY.KEYID = 5
2,863,495 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,680 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,139 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,020 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,721 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,644 UART: [afmc] --
2,906,641 UART: [cold-reset] --
2,907,545 UART: [state] Locking Datavault
2,908,412 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,016 UART: [state] Locking ICCM
2,909,566 UART: [exit] Launching FMC @ 0x40000130
2,914,896 UART:
2,914,912 UART: Running Caliptra FMC ...
2,915,320 UART:
2,915,374 UART: [state] CFI Enabled
2,925,654 UART: [fht] FMC Alias Private Key: 7
3,044,730 UART: [art] Extend RT PCRs Done
3,045,158 UART: [art] Lock RT PCRs Done
3,046,570 UART: [art] Populate DV Done
3,054,775 UART: [fht] FMC Alias Private Key: 7
3,055,803 UART: [art] Derive CDI
3,056,083 UART: [art] Store in slot 0x4
3,141,392 UART: [art] Derive Key Pair
3,141,752 UART: [art] Store priv key in slot 0x5
3,154,876 UART: [art] Derive Key Pair - Done
3,169,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,954 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,719 UART: [art] PUB.X = BDBA76D1E6120E399B61E34FEC0DC6127D78E1F9AC6A3BE1E2A5E3E9F19AC764D5D82FB838CFF2577601EB94FF2E27D5
3,192,502 UART: [art] PUB.Y = C9A4900AFE48A6B8C96B27DB1E8003793B9F918D91BF4E7C5D9C185ADA4B5DB02FB069D9A631FBC7702366610430828C
3,199,451 UART: [art] SIG.R = 901D4150BFF791F1E74EB94E1F5929FFAD247F4A976503A857FE906AFEA90A17F77E9AC77B41750642D2DD436F1101E2
3,206,215 UART: [art] SIG.S = 3D8E2CFF77E9E2EDE6B72E7A05B7BC43F6D4DAEB41D748FD2C91D7B022BE1FD9815044009B512F4E537961824B188671
3,230,156 UART: Caliptra RT
3,230,407 UART: [state] CFI Enabled
3,351,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,734 UART: [rt]cmd =0x47544744, len=8
3,383,531 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,168 ready_for_fw is high
1,059,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,868 >>> mbox cmd response: success
2,676,868 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,738,287 UART:
2,738,303 UART: Running Caliptra FMC ...
2,738,711 UART:
2,738,765 UART: [state] CFI Enabled
2,749,543 UART: [fht] FMC Alias Private Key: 7
2,868,725 UART: [art] Extend RT PCRs Done
2,869,153 UART: [art] Lock RT PCRs Done
2,870,371 UART: [art] Populate DV Done
2,878,652 UART: [fht] FMC Alias Private Key: 7
2,879,634 UART: [art] Derive CDI
2,879,914 UART: [art] Store in slot 0x4
2,965,739 UART: [art] Derive Key Pair
2,966,099 UART: [art] Store priv key in slot 0x5
2,979,203 UART: [art] Derive Key Pair - Done
2,994,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,349 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,114 UART: [art] PUB.X = 52A6CEA625B8ADA20FF22AEB43130D66147339439F77C2B9861F3E3E929869D318C2F1031A54BEED2B4ACADE5A559614
3,016,883 UART: [art] PUB.Y = 3F6EC5C9049BD5769E64512EDDF8A46358410DCE0439CA16D42F133D7E840862CB8C7479C15C0CEBD7C8A6D1645F6607
3,023,821 UART: [art] SIG.R = B5FEBCA45295BDAFEA15FB849E6FA41CCF04654417E2E224D7A497EE8F39381EEF6C6D4399C78CD40C0CAF7C211DC4CF
3,030,608 UART: [art] SIG.S = B6561F161B1BAB0ABED713AA02364AE4ECB24889165EFEF0B4D3CCC0C56970B3F9E4479BBE8F90AB156CCBD1B65A48FD
3,054,214 UART: Caliptra RT
3,054,465 UART: [state] CFI Enabled
3,173,195 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,431 UART: [rt]cmd =0x47544744, len=8
3,205,162 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,705 UART: [state] LifecycleState = Unprovisioned
86,360 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,097 UART: [kat] SHA2-256
902,037 UART: [kat] SHA2-384
904,900 UART: [kat] SHA2-512-ACC
906,801 UART: [kat] ECC-384
916,672 UART: [kat] HMAC-384Kdf
921,282 UART: [kat] LMS
1,169,594 UART: [kat] --
1,170,519 UART: [cold-reset] ++
1,171,085 UART: [fht] FHT @ 0x50003400
1,173,807 UART: [idev] ++
1,173,975 UART: [idev] CDI.KEYID = 6
1,174,336 UART: [idev] SUBJECT.KEYID = 7
1,174,761 UART: [idev] UDS.KEYID = 0
1,175,107 ready_for_fw is high
1,175,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,764 UART: [idev] Erasing UDS.KEYID = 0
1,200,104 UART: [idev] Sha1 KeyId Algorithm
1,208,978 UART: [idev] --
1,209,921 UART: [ldev] ++
1,210,089 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,880 UART: [ldev] AUTHORITY.KEYID = 7
1,211,343 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,242,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,688 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,404 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,282 UART: [fwproc] Wait for Commands...
1,282,949 UART: [fwproc] Recv command 0x46574c44
1,283,682 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,934 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,109 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,350 >>> mbox cmd response: success
2,826,350 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,827,598 UART: [afmc] ++
2,827,766 UART: [afmc] CDI.KEYID = 6
2,828,129 UART: [afmc] SUBJECT.KEYID = 7
2,828,555 UART: [afmc] AUTHORITY.KEYID = 5
2,864,686 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,414 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,295 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,996 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,799 UART: [afmc] --
2,907,736 UART: [cold-reset] --
2,908,770 UART: [state] Locking Datavault
2,909,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,601 UART: [state] Locking ICCM
2,911,185 UART: [exit] Launching FMC @ 0x40000130
2,916,515 UART:
2,916,531 UART: Running Caliptra FMC ...
2,916,939 UART:
2,917,082 UART: [state] CFI Enabled
2,927,780 UART: [fht] FMC Alias Private Key: 7
3,047,132 UART: [art] Extend RT PCRs Done
3,047,560 UART: [art] Lock RT PCRs Done
3,049,044 UART: [art] Populate DV Done
3,057,249 UART: [fht] FMC Alias Private Key: 7
3,058,239 UART: [art] Derive CDI
3,058,519 UART: [art] Store in slot 0x4
3,144,274 UART: [art] Derive Key Pair
3,144,634 UART: [art] Store priv key in slot 0x5
3,158,086 UART: [art] Derive Key Pair - Done
3,173,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,052 UART: [art] PUB.X = 1FDA6071C4F2E0258E829E78A197046A3C02DA54CB87214212AD3C128748A3EB67ECCC086137673BAA8860CC1C85373D
3,195,815 UART: [art] PUB.Y = 2C21C893E3941B5C5E5F8B51BD46734825339BEF27B6BEA7F3AA5CF27510FB17F50550411A9022CBBC817F7500A5720B
3,202,741 UART: [art] SIG.R = 50DFC6EC014FC0EA8F78823A9F0707B6D7BFB39D89F92DE155EC3F2015D3E2D9BD3C700055125DBE5EC8C1F8E1BB0776
3,209,495 UART: [art] SIG.S = B6A857247B9776B8C44F35784D9ACC5BB42925C1300557E840666632FBA257A4D91DD9D2653D17C29EEBCF9AF2C506F8
3,233,429 UART: Caliptra RT
3,233,772 UART: [state] CFI Enabled
3,353,069 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,475 UART: [rt]cmd =0x47544744, len=8
3,384,978 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,471 ready_for_fw is high
1,059,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,625 >>> mbox cmd response: success
2,678,625 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,741,048 UART:
2,741,064 UART: Running Caliptra FMC ...
2,741,472 UART:
2,741,615 UART: [state] CFI Enabled
2,752,111 UART: [fht] FMC Alias Private Key: 7
2,871,091 UART: [art] Extend RT PCRs Done
2,871,519 UART: [art] Lock RT PCRs Done
2,873,161 UART: [art] Populate DV Done
2,881,498 UART: [fht] FMC Alias Private Key: 7
2,882,668 UART: [art] Derive CDI
2,882,948 UART: [art] Store in slot 0x4
2,969,049 UART: [art] Derive Key Pair
2,969,409 UART: [art] Store priv key in slot 0x5
2,983,033 UART: [art] Derive Key Pair - Done
2,997,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,925 UART: [art] PUB.X = 911301D887927338E41B0681BA18AF1790ACCB18829662A49DD7C728EA6AC3F0370C3DD82FB6F14002785B47A7F404B8
3,020,678 UART: [art] PUB.Y = C617BBBFCA87A5124E577D8A59D46F3E9806B1CE90587FBB561C509E4190959B3C17C51F424FAC0AA8FDD1DA207F6EB3
3,027,638 UART: [art] SIG.R = 7DD27166A7516FFB8F2822AAA63C7C97155CE3695AE5528269C0FA30F79607DBCF60BF44B31A1D6A4072AF0CD16FC852
3,034,412 UART: [art] SIG.S = 5B7CB4C72FD8B505CCB04E0F670BC18D15853E64AE9D277C598B604A3AEB4A1A40364AC765B70422B98D8644EB3406E7
3,057,867 UART: Caliptra RT
3,058,210 UART: [state] CFI Enabled
3,177,824 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,432 UART: [rt]cmd =0x47544744, len=8
3,210,183 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,578 UART: [kat] SHA2-256
893,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,353 UART: [kat] ++
897,505 UART: [kat] sha1
901,803 UART: [kat] SHA2-256
903,743 UART: [kat] SHA2-384
906,564 UART: [kat] SHA2-512-ACC
908,465 UART: [kat] ECC-384
918,210 UART: [kat] HMAC-384Kdf
922,780 UART: [kat] LMS
1,171,108 UART: [kat] --
1,171,999 UART: [cold-reset] ++
1,172,429 UART: [fht] FHT @ 0x50003400
1,174,998 UART: [idev] ++
1,175,166 UART: [idev] CDI.KEYID = 6
1,175,526 UART: [idev] SUBJECT.KEYID = 7
1,175,950 UART: [idev] UDS.KEYID = 0
1,176,295 ready_for_fw is high
1,176,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,958 UART: [idev] Erasing UDS.KEYID = 0
1,200,893 UART: [idev] Sha1 KeyId Algorithm
1,209,379 UART: [idev] --
1,210,479 UART: [ldev] ++
1,210,647 UART: [ldev] CDI.KEYID = 6
1,211,010 UART: [ldev] SUBJECT.KEYID = 5
1,211,436 UART: [ldev] AUTHORITY.KEYID = 7
1,211,899 UART: [ldev] FE.KEYID = 1
1,216,993 UART: [ldev] Erasing FE.KEYID = 1
1,242,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,615 UART: [ldev] --
1,282,048 UART: [fwproc] Wait for Commands...
1,282,770 UART: [fwproc] Recv command 0x46574c44
1,283,498 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,164 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,341 >>> mbox cmd response: success
2,825,341 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,826,373 UART: [afmc] ++
2,826,541 UART: [afmc] CDI.KEYID = 6
2,826,903 UART: [afmc] SUBJECT.KEYID = 7
2,827,328 UART: [afmc] AUTHORITY.KEYID = 5
2,862,663 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,026 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,774 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,483 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,067 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,985 UART: [afmc] --
2,905,989 UART: [cold-reset] --
2,907,103 UART: [state] Locking Datavault
2,908,228 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,832 UART: [state] Locking ICCM
2,909,330 UART: [exit] Launching FMC @ 0x40000130
2,914,660 UART:
2,914,676 UART: Running Caliptra FMC ...
2,915,084 UART:
2,915,138 UART: [state] CFI Enabled
2,925,698 UART: [fht] FMC Alias Private Key: 7
3,044,832 UART: [art] Extend RT PCRs Done
3,045,260 UART: [art] Lock RT PCRs Done
3,046,730 UART: [art] Populate DV Done
3,054,931 UART: [fht] FMC Alias Private Key: 7
3,056,069 UART: [art] Derive CDI
3,056,349 UART: [art] Store in slot 0x4
3,142,252 UART: [art] Derive Key Pair
3,142,612 UART: [art] Store priv key in slot 0x5
3,155,544 UART: [art] Derive Key Pair - Done
3,170,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,513 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,278 UART: [art] PUB.X = B63F68B9CD3E005E57E91CDA2204220831D787F1CD1ED403075F8AFC994DA69CA64FCF7FC5C9FE9CA029806CCC23699D
3,193,030 UART: [art] PUB.Y = 88898527E27D81DB7316785C2F040CE6241ECDC42BAE8A446958616559DC38EB604E6E258112F74AC195C2897A8D9ABF
3,199,974 UART: [art] SIG.R = 5B0ADE068A91A2A612AA40493AC926A4CD726F3896CE776565C99BCC0ABC035F781902FE7A3177E6F9B27305225D9DF1
3,206,732 UART: [art] SIG.S = B0BF1C431EEC700BA38D00E46C90DC41C810FB0547624983D5E8AD5EF44AF3417A3FAC1CF5E41911ED45DF5B2628632D
3,230,046 UART: Caliptra RT
3,230,297 UART: [state] CFI Enabled
3,349,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,460 UART: [rt]cmd =0x47544744, len=8
3,382,325 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,083 ready_for_fw is high
1,061,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,808 >>> mbox cmd response: success
2,679,808 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,742,109 UART:
2,742,125 UART: Running Caliptra FMC ...
2,742,533 UART:
2,742,587 UART: [state] CFI Enabled
2,753,243 UART: [fht] FMC Alias Private Key: 7
2,872,317 UART: [art] Extend RT PCRs Done
2,872,745 UART: [art] Lock RT PCRs Done
2,873,951 UART: [art] Populate DV Done
2,882,330 UART: [fht] FMC Alias Private Key: 7
2,883,444 UART: [art] Derive CDI
2,883,724 UART: [art] Store in slot 0x4
2,969,465 UART: [art] Derive Key Pair
2,969,825 UART: [art] Store priv key in slot 0x5
2,983,043 UART: [art] Derive Key Pair - Done
2,998,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,076 UART: [art] PUB.X = C1C19C205A1F157CB0AEDD9BA084206903D7EC1AF8D2DCD81606A1D9A205C432808598D1501C1AAE4E2AC11C37665F7B
3,020,849 UART: [art] PUB.Y = 60D1F7E31A49E605C584A037B9E5164E6511F27E1182018F8522934F4A6317DA4FE3A8622814D9B9CFF9AF5B5C29102B
3,027,791 UART: [art] SIG.R = 43F9A54573FC9363A1B5CB739A25A8C2B568BEAECDF850FF6BF362BA0A549B8CF8C7AAFCFEA6E6C978DDF79E300FF618
3,034,583 UART: [art] SIG.S = 51FB3A4D7EA94E414FA599812CCEED9CD5E335C6A2F08990DCD8860C33FC9C4736CC5FD700F52D5C72DD995347F258DF
3,058,348 UART: Caliptra RT
3,058,599 UART: [state] CFI Enabled
3,178,353 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,901 UART: [rt]cmd =0x47544744, len=8
3,210,508 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,245 UART: [state] LifecycleState = Unprovisioned
85,900 UART: [state] DebugLocked = No
86,404 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
893,233 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,358 UART: [kat] ++
897,510 UART: [kat] sha1
901,742 UART: [kat] SHA2-256
903,682 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,653 UART: [kat] HMAC-384Kdf
923,257 UART: [kat] LMS
1,171,585 UART: [kat] --
1,172,504 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,489 UART: [idev] ++
1,175,657 UART: [idev] CDI.KEYID = 6
1,176,017 UART: [idev] SUBJECT.KEYID = 7
1,176,441 UART: [idev] UDS.KEYID = 0
1,176,786 ready_for_fw is high
1,176,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,379 UART: [idev] Erasing UDS.KEYID = 0
1,201,756 UART: [idev] Sha1 KeyId Algorithm
1,210,356 UART: [idev] --
1,211,424 UART: [ldev] ++
1,211,592 UART: [ldev] CDI.KEYID = 6
1,211,955 UART: [ldev] SUBJECT.KEYID = 5
1,212,381 UART: [ldev] AUTHORITY.KEYID = 7
1,212,844 UART: [ldev] FE.KEYID = 1
1,218,140 UART: [ldev] Erasing FE.KEYID = 1
1,244,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,905 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,617 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,592 UART: [ldev] --
1,283,999 UART: [fwproc] Wait for Commands...
1,284,793 UART: [fwproc] Recv command 0x46574c44
1,285,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,374 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,295 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,626 >>> mbox cmd response: success
2,828,626 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,829,838 UART: [afmc] ++
2,830,006 UART: [afmc] CDI.KEYID = 6
2,830,368 UART: [afmc] SUBJECT.KEYID = 7
2,830,793 UART: [afmc] AUTHORITY.KEYID = 5
2,866,022 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,888 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,771 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,472 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,074 UART: [afmc] --
2,909,164 UART: [cold-reset] --
2,910,370 UART: [state] Locking Datavault
2,911,547 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,151 UART: [state] Locking ICCM
2,912,691 UART: [exit] Launching FMC @ 0x40000130
2,918,021 UART:
2,918,037 UART: Running Caliptra FMC ...
2,918,445 UART:
2,918,588 UART: [state] CFI Enabled
2,929,126 UART: [fht] FMC Alias Private Key: 7
3,048,432 UART: [art] Extend RT PCRs Done
3,048,860 UART: [art] Lock RT PCRs Done
3,050,086 UART: [art] Populate DV Done
3,058,213 UART: [fht] FMC Alias Private Key: 7
3,059,267 UART: [art] Derive CDI
3,059,547 UART: [art] Store in slot 0x4
3,146,018 UART: [art] Derive Key Pair
3,146,378 UART: [art] Store priv key in slot 0x5
3,159,498 UART: [art] Derive Key Pair - Done
3,174,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,774 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,539 UART: [art] PUB.X = D67B0FEF77F16B1C4329712858AF1FB80C94BCBD802BD1D6DED2BCE4CD268ADFF2CB94B347F8C1C91EBDC38301CAE624
3,197,328 UART: [art] PUB.Y = 2B4EFE2615AB455EC384E5117414BD2FC8997FF266ABD15384DCC45F52CE8B4E7355487E788D8550D9453A27AD63CEEC
3,204,288 UART: [art] SIG.R = 76F66ADC91FE6E5513E3985317CEF140D9FDBE70383234C060ED80D40590844BA3C62ECC100B3BB26B20B7E6FF6C9706
3,211,057 UART: [art] SIG.S = 909586087E58D310C8B60F92DE31B4D9282DD23F618DBB6AA4F2CCCFC3FDC931F3D7796E94C224830367375DE6E6D00A
3,235,023 UART: Caliptra RT
3,235,366 UART: [state] CFI Enabled
3,354,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,461 UART: [rt]cmd =0x47544744, len=8
3,387,012 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,306 ready_for_fw is high
1,061,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,034 >>> mbox cmd response: success
2,681,034 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
2,743,779 UART:
2,743,795 UART: Running Caliptra FMC ...
2,744,203 UART:
2,744,346 UART: [state] CFI Enabled
2,754,968 UART: [fht] FMC Alias Private Key: 7
2,873,754 UART: [art] Extend RT PCRs Done
2,874,182 UART: [art] Lock RT PCRs Done
2,875,640 UART: [art] Populate DV Done
2,883,891 UART: [fht] FMC Alias Private Key: 7
2,885,051 UART: [art] Derive CDI
2,885,331 UART: [art] Store in slot 0x4
2,971,294 UART: [art] Derive Key Pair
2,971,654 UART: [art] Store priv key in slot 0x5
2,985,182 UART: [art] Derive Key Pair - Done
3,000,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,579 UART: [art] PUB.X = 4BF71C966839E6E590E266F432F13025D7CD507774F9900CE8B064B582DD4DF4EBF89A5B025F68CA2859AE12161ACF03
3,023,344 UART: [art] PUB.Y = 21E189E0D034F895BCE7F2B15283F10D8CB65470FB605233BDC39B64259FAA9CD9E71D2AACF822497181B2588441D00E
3,030,292 UART: [art] SIG.R = 0582A85430372CD8DCB4C61B6709E83C4ACE8F8112113C688CD24D20612BE82A8884A47BC96817322E61DFB409E7B9D2
3,037,053 UART: [art] SIG.S = 47840957F72F7EE1906DF25C0307D1BEC44437BFD3D1A4B7D52FCBB7CA3627DDF705C3ED019DA7F153BB470890C80C43
3,061,104 UART: Caliptra RT
3,061,447 UART: [state] CFI Enabled
3,181,621 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,975 UART: [rt]cmd =0x47544744, len=8
3,213,728 >>> mbox cmd response: failed
test test_tagging::test_get_tagged_tci_on_non_existent_tag ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,421 UART:
192,771 UART: Running Caliptra ROM ...
193,959 UART:
194,123 UART: [state] CFI Enabled
265,069 UART: [state] LifecycleState = Unprovisioned
267,051 UART: [state] DebugLocked = No
269,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,812 UART: [kat] SHA2-256
444,573 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,045 UART: [kat] ++
455,550 UART: [kat] sha1
465,293 UART: [kat] SHA2-256
467,948 UART: [kat] SHA2-384
473,227 UART: [kat] SHA2-512-ACC
475,599 UART: [kat] ECC-384
2,767,710 UART: [kat] HMAC-384Kdf
2,779,590 UART: [kat] LMS
3,969,875 UART: [kat] --
3,973,534 UART: [cold-reset] ++
3,975,462 UART: [fht] Storing FHT @ 0x50003400
3,987,368 UART: [idev] ++
3,987,930 UART: [idev] CDI.KEYID = 6
3,988,961 UART: [idev] SUBJECT.KEYID = 7
3,990,137 UART: [idev] UDS.KEYID = 0
3,991,116 ready_for_fw is high
3,991,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,418 UART: [idev] Erasing UDS.KEYID = 0
7,322,545 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,521 UART: [idev] --
7,348,681 UART: [ldev] ++
7,349,251 UART: [ldev] CDI.KEYID = 6
7,350,270 UART: [ldev] SUBJECT.KEYID = 5
7,351,427 UART: [ldev] AUTHORITY.KEYID = 7
7,352,653 UART: [ldev] FE.KEYID = 1
7,400,722 UART: [ldev] Erasing FE.KEYID = 1
10,730,472 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,424 UART: [ldev] --
13,094,993 UART: [fwproc] Waiting for Commands...
13,098,242 UART: [fwproc] Received command 0x46574c44
13,100,437 UART: [fwproc] Received Image of size 118548 bytes
17,207,795 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,068 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,356,195 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,684,705 >>> mbox cmd response: success
17,685,894 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,688,513 UART: [afmc] ++
17,689,101 UART: [afmc] CDI.KEYID = 6
17,690,025 UART: [afmc] SUBJECT.KEYID = 7
17,691,243 UART: [afmc] AUTHORITY.KEYID = 5
21,046,181 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,347,392 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,349,645 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,364,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,378,785 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,393,249 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,415,328 UART: [afmc] --
23,419,415 UART: [cold-reset] --
23,425,066 UART: [state] Locking Datavault
23,430,581 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,333 UART: [state] Locking ICCM
23,434,219 UART: [exit] Launching FMC @ 0x40000130
23,442,612 UART:
23,442,857 UART: Running Caliptra FMC ...
23,443,959 UART:
23,444,118 UART: [state] CFI Enabled
23,506,230 UART: [fht] FMC Alias Private Key: 7
25,846,678 UART: [art] Extend RT PCRs Done
25,847,898 UART: [art] Lock RT PCRs Done
25,849,303 UART: [art] Populate DV Done
25,854,761 UART: [fht] FMC Alias Private Key: 7
25,856,368 UART: [art] Derive CDI
25,857,182 UART: [art] Store in slot 0x4
25,914,790 UART: [art] Derive Key Pair
25,915,832 UART: [art] Store priv key in slot 0x5
29,208,540 UART: [art] Derive Key Pair - Done
29,221,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,510,765 UART: [art] Erasing AUTHORITY.KEYID = 7
31,512,270 UART: [art] PUB.X = AB8792A20534F1C5D80C624071F6CC332508D522B5FF73C80394B3FD4B66D39A9BF618B0B53B61EEB944A3D400451FF2
31,519,508 UART: [art] PUB.Y = BB6E53FB4E6FB0F72529C7FC164E61E6E3A56D4E2AF55313833A5E65F249B6EE92F3E769652D6AD31B94915E1B0CAD1E
31,526,783 UART: [art] SIG.R = 8FFEB76A0C6757F69EBC20D0FA9FEBE237D1632E2C5EF62F646CE2C58970F64A3C2EE684C7150749EDC4C17EEDDD6432
31,534,231 UART: [art] SIG.S = 97BD1A222999F54D4F39BF32ACDF8F4A56133DFB3D99B1F8EA24F5B67F16DD289BAC928BA2B975CA9B7661C1D37E4179
32,839,200 UART: Caliptra RT
32,839,906 UART: [state] CFI Enabled
33,018,209 UART: [rt] RT listening for mailbox commands...
33,050,060 UART: [rt]cmd =0x54514754, len=24
33,052,715 >>> mbox cmd response data (8 bytes)
33,053,194 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,082,900 UART: [rt]cmd =0x54514754, len=24
33,085,517 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,803,856 ready_for_fw is high
3,804,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,966,829 >>> mbox cmd response: success
17,968,213 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,648,762 UART:
23,649,146 UART: Running Caliptra FMC ...
23,650,260 UART:
23,650,413 UART: [state] CFI Enabled
23,720,917 UART: [fht] FMC Alias Private Key: 7
26,060,975 UART: [art] Extend RT PCRs Done
26,062,204 UART: [art] Lock RT PCRs Done
26,063,534 UART: [art] Populate DV Done
26,068,850 UART: [fht] FMC Alias Private Key: 7
26,070,555 UART: [art] Derive CDI
26,071,294 UART: [art] Store in slot 0x4
26,129,173 UART: [art] Derive Key Pair
26,130,214 UART: [art] Store priv key in slot 0x5
29,423,640 UART: [art] Derive Key Pair - Done
29,436,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,504 UART: [art] PUB.X = 60B4A5764B23AC130A18353C11164AB91CB999794325B7C19F3432133131FACB8EF7CD29E47F302E03D904A5F2E62631
31,732,752 UART: [art] PUB.Y = 08335C9751CE816217F8A09990A0EC89D96FD887EE7B719F0223C9FA15A6619F54E87CD8EE9D4658C10919E471535387
31,739,989 UART: [art] SIG.R = 039FEF8955E2AAC8F1C7B9A2C655BE13262A431362E604602708A733A34F96040BDB2F917BFC88B2FD5DB18CCBA2FF24
31,747,377 UART: [art] SIG.S = 219D68510BA8BB49001E50D78363D6B8227CEACC012AC367410373C175254939E2B678ABC1B55F8A799CCFE56DCAD867
33,052,859 UART: Caliptra RT
33,053,557 UART: [state] CFI Enabled
33,249,782 UART: [rt] RT listening for mailbox commands...
33,281,047 UART: [rt]cmd =0x54514754, len=24
33,283,851 >>> mbox cmd response data (8 bytes)
33,284,355 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,314,328 UART: [rt]cmd =0x54514754, len=24
33,317,034 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,612 UART:
193,374 UART: Running Caliptra ROM ...
194,624 UART:
603,934 UART: [state] CFI Enabled
617,351 UART: [state] LifecycleState = Unprovisioned
619,305 UART: [state] DebugLocked = No
622,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,511 UART: [kat] SHA2-256
797,297 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,847 UART: [kat] ++
808,308 UART: [kat] sha1
818,255 UART: [kat] SHA2-256
820,987 UART: [kat] SHA2-384
826,834 UART: [kat] SHA2-512-ACC
829,267 UART: [kat] ECC-384
3,113,814 UART: [kat] HMAC-384Kdf
3,125,407 UART: [kat] LMS
4,315,486 UART: [kat] --
4,320,799 UART: [cold-reset] ++
4,322,736 UART: [fht] Storing FHT @ 0x50003400
4,334,140 UART: [idev] ++
4,334,700 UART: [idev] CDI.KEYID = 6
4,335,604 UART: [idev] SUBJECT.KEYID = 7
4,336,840 UART: [idev] UDS.KEYID = 0
4,337,947 ready_for_fw is high
4,338,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,193 UART: [idev] Erasing UDS.KEYID = 0
7,621,737 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,935 UART: [idev] --
7,646,572 UART: [ldev] ++
7,647,187 UART: [ldev] CDI.KEYID = 6
7,648,138 UART: [ldev] SUBJECT.KEYID = 5
7,649,339 UART: [ldev] AUTHORITY.KEYID = 7
7,650,620 UART: [ldev] FE.KEYID = 1
7,662,541 UART: [ldev] Erasing FE.KEYID = 1
10,951,464 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,032 UART: [ldev] --
13,312,942 UART: [fwproc] Waiting for Commands...
13,314,811 UART: [fwproc] Received command 0x46574c44
13,316,986 UART: [fwproc] Received Image of size 118548 bytes
17,422,862 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,493,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,566,805 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,894,798 >>> mbox cmd response: success
17,895,350 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,899,875 UART: [afmc] ++
17,900,446 UART: [afmc] CDI.KEYID = 6
17,901,407 UART: [afmc] SUBJECT.KEYID = 7
17,902,617 UART: [afmc] AUTHORITY.KEYID = 5
21,218,779 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,047 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,307 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,715 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,438 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,880 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,578,245 UART: [afmc] --
23,581,556 UART: [cold-reset] --
23,586,771 UART: [state] Locking Datavault
23,590,449 UART: [state] Locking PCR0, PCR1 and PCR31
23,592,214 UART: [state] Locking ICCM
23,594,682 UART: [exit] Launching FMC @ 0x40000130
23,603,084 UART:
23,603,321 UART: Running Caliptra FMC ...
23,604,414 UART:
23,604,568 UART: [state] CFI Enabled
23,612,284 UART: [fht] FMC Alias Private Key: 7
25,952,085 UART: [art] Extend RT PCRs Done
25,953,307 UART: [art] Lock RT PCRs Done
25,954,760 UART: [art] Populate DV Done
25,960,223 UART: [fht] FMC Alias Private Key: 7
25,961,861 UART: [art] Derive CDI
25,962,671 UART: [art] Store in slot 0x4
26,004,835 UART: [art] Derive Key Pair
26,005,882 UART: [art] Store priv key in slot 0x5
29,247,550 UART: [art] Derive Key Pair - Done
29,260,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,945 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,454 UART: [art] PUB.X = C6304DA414D4804E1A6417BA6373D584A4AC7724866DF96B5D04B743E718A68A9396ACB3E9AD3203BD940ADFFBC1E4FC
31,549,694 UART: [art] PUB.Y = 0CBD97C63401696ADEA0E6760FEB55B1D1AB2C7AB09EFF2BB2120505040B2FBF1F3F501DDB2DF8D91E98BF367EC2714F
31,557,024 UART: [art] SIG.R = 7B54924E652050C49BACD24F7B304AA08C1876F6D0E826398A3FC57996FB594C8E773595B79DE9F827D55F51C985BDAE
31,564,411 UART: [art] SIG.S = 8C60F93F2C8E74C87F59F3EAE57CBD577E77121569B65AB01BAC9AA8AEF5CF7BE735146C180CF090539777C45DA81BFC
32,870,047 UART: Caliptra RT
32,870,744 UART: [state] CFI Enabled
33,004,218 UART: [rt] RT listening for mailbox commands...
33,036,115 UART: [rt]cmd =0x54514754, len=24
33,038,539 >>> mbox cmd response data (8 bytes)
33,038,989 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,068,937 UART: [rt]cmd =0x54514754, len=24
33,071,398 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,097 writing to cptra_bootfsm_go
4,132,257 ready_for_fw is high
4,132,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,154,003 >>> mbox cmd response: success
18,154,973 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,793,705 UART:
23,794,101 UART: Running Caliptra FMC ...
23,795,208 UART:
23,795,357 UART: [state] CFI Enabled
23,803,494 UART: [fht] FMC Alias Private Key: 7
26,144,161 UART: [art] Extend RT PCRs Done
26,145,386 UART: [art] Lock RT PCRs Done
26,147,199 UART: [art] Populate DV Done
26,152,832 UART: [fht] FMC Alias Private Key: 7
26,154,365 UART: [art] Derive CDI
26,155,093 UART: [art] Store in slot 0x4
26,197,854 UART: [art] Derive Key Pair
26,198,894 UART: [art] Store priv key in slot 0x5
29,440,786 UART: [art] Derive Key Pair - Done
29,454,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,227 UART: [art] Erasing AUTHORITY.KEYID = 7
31,735,730 UART: [art] PUB.X = C363EEEB9865CAD03B010B22FC7AA2194280F0A0A1275EA90AA5A739DA7DB1FA632FBCF8F83CD42D366FE5EB54DD7558
31,743,039 UART: [art] PUB.Y = AAC917C5DCAA6957AD80EDEB2F9B664F1DED00343D22133C9A53E56004B1EE597432A384D225B393ACF2DDC5E1278000
31,750,285 UART: [art] SIG.R = 67F2F2652F18E086DDC3CE9D8BCA0F31C3EA92A13E6FCDB58D1D533B26286FB58E558BD914BB31B2C3A202E3A52010CB
31,757,673 UART: [art] SIG.S = 9ED789873D5AADB6D74385E2FFA74959567B3F1007654E29FA7A4CDF2C90CA1503EE6CB022E83608B0CA9050450FBFDB
33,063,039 UART: Caliptra RT
33,063,759 UART: [state] CFI Enabled
33,197,556 UART: [rt] RT listening for mailbox commands...
33,229,228 UART: [rt]cmd =0x54514754, len=24
33,231,739 >>> mbox cmd response data (8 bytes)
33,232,252 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,261,985 UART: [rt]cmd =0x54514754, len=24
33,264,276 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,164 UART:
192,534 UART: Running Caliptra ROM ...
193,822 UART:
193,976 UART: [state] CFI Enabled
265,244 UART: [state] LifecycleState = Unprovisioned
267,136 UART: [state] DebugLocked = No
269,881 UART: [state] WD Timer not started. Device not locked for debugging
272,839 UART: [kat] SHA2-256
452,474 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,273 UART: [kat] ++
463,801 UART: [kat] sha1
474,180 UART: [kat] SHA2-256
476,889 UART: [kat] SHA2-384
483,862 UART: [kat] SHA2-512-ACC
486,294 UART: [kat] ECC-384
2,948,179 UART: [kat] HMAC-384Kdf
2,971,430 UART: [kat] LMS
3,447,912 UART: [kat] --
3,450,582 UART: [cold-reset] ++
3,452,805 UART: [fht] FHT @ 0x50003400
3,463,355 UART: [idev] ++
3,463,941 UART: [idev] CDI.KEYID = 6
3,464,973 UART: [idev] SUBJECT.KEYID = 7
3,466,144 UART: [idev] UDS.KEYID = 0
3,467,063 ready_for_fw is high
3,467,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,335 UART: [idev] Erasing UDS.KEYID = 0
5,987,309 UART: [idev] Sha1 KeyId Algorithm
6,010,166 UART: [idev] --
6,014,662 UART: [ldev] ++
6,015,282 UART: [ldev] CDI.KEYID = 6
6,016,203 UART: [ldev] SUBJECT.KEYID = 5
6,017,367 UART: [ldev] AUTHORITY.KEYID = 7
6,018,597 UART: [ldev] FE.KEYID = 1
6,057,919 UART: [ldev] Erasing FE.KEYID = 1
8,564,819 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,165 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,644 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,372 UART: [ldev] --
10,374,605 UART: [fwproc] Wait for Commands...
10,376,584 UART: [fwproc] Recv command 0x46574c44
10,378,617 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,658 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,860 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,916 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,351,749 >>> mbox cmd response: success
14,352,986 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,355,432 UART: [afmc] ++
14,356,061 UART: [afmc] CDI.KEYID = 6
14,356,965 UART: [afmc] SUBJECT.KEYID = 7
14,358,194 UART: [afmc] AUTHORITY.KEYID = 5
16,895,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,984 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,171 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,954 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,033 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,627 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,615 UART: [afmc] --
18,697,959 UART: [cold-reset] --
18,700,519 UART: [state] Locking Datavault
18,707,055 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,801 UART: [state] Locking ICCM
18,711,267 UART: [exit] Launching FMC @ 0x40000130
18,719,709 UART:
18,719,940 UART: Running Caliptra FMC ...
18,721,036 UART:
18,721,219 UART: [state] CFI Enabled
18,775,713 UART: [fht] FMC Alias Private Key: 7
20,542,190 UART: [art] Extend RT PCRs Done
20,543,405 UART: [art] Lock RT PCRs Done
20,545,186 UART: [art] Populate DV Done
20,550,374 UART: [fht] FMC Alias Private Key: 7
20,552,079 UART: [art] Derive CDI
20,552,890 UART: [art] Store in slot 0x4
20,608,709 UART: [art] Derive Key Pair
20,609,742 UART: [art] Store priv key in slot 0x5
23,072,748 UART: [art] Derive Key Pair - Done
23,085,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,199 UART: [art] PUB.X = 8AEB2D965FB4109D44DAB7F12A6E7DED0770DF96C730B0E6E297A63FD4EE84F048FB6657AB6DBCC65BFAA1A3A41F9776
24,807,548 UART: [art] PUB.Y = 46089CD302C8F5A965D27C3F74F6281AC1FDCBE4F6A6512C72BC2637C132C258B83D78B451226FB9071ECEA83627B90C
24,814,765 UART: [art] SIG.R = 667D67E375A9536232BD96767FC10B90DFF290F58146591FC4E0E740519211667815BC8F1776DE949ACECEC73F707605
24,822,189 UART: [art] SIG.S = 7E9B3A4EDA3A3A7B0C1A41F975C55CBEE01120F5854ECC75E4073D7E4EAD59F52635F2D3E2A33071168F8643125DD1EB
25,800,581 UART: Caliptra RT
25,801,282 UART: [state] CFI Enabled
25,982,366 UART: [rt] RT listening for mailbox commands...
26,013,704 UART: [rt]cmd =0x54514754, len=24
26,016,640 >>> mbox cmd response data (8 bytes)
26,017,195 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,047,266 UART: [rt]cmd =0x54514754, len=24
26,049,622 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,465,704 ready_for_fw is high
3,466,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,854 >>> mbox cmd response: success
14,262,436 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,556,304 UART:
18,556,693 UART: Running Caliptra FMC ...
18,557,803 UART:
18,557,954 UART: [state] CFI Enabled
18,625,591 UART: [fht] FMC Alias Private Key: 7
20,391,771 UART: [art] Extend RT PCRs Done
20,393,010 UART: [art] Lock RT PCRs Done
20,394,938 UART: [art] Populate DV Done
20,400,469 UART: [fht] FMC Alias Private Key: 7
20,402,064 UART: [art] Derive CDI
20,402,800 UART: [art] Store in slot 0x4
20,458,092 UART: [art] Derive Key Pair
20,459,139 UART: [art] Store priv key in slot 0x5
22,922,432 UART: [art] Derive Key Pair - Done
22,935,326 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,647,979 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,494 UART: [art] PUB.X = 472B5E652275F9D5AF2FF77D96B7109404BE50C646C2EFEB27569E47BD90D8DA8561A697638CEE5A88259CBB0CF7CB39
24,656,762 UART: [art] PUB.Y = BCC483AD415E60C18089386851FA1F3EB6DDAAA62BC217288FFFC1D355463DBE40D7FFF5B8F8B8CAD5351BEC4FA08031
24,664,074 UART: [art] SIG.R = 28D2A4C2979EDAFA9BC8046E365B78A8878E9AB0F65E801813FB1BC567DD2244E4792D9EC6123EE8FF5DAADBFCA59B6E
24,671,471 UART: [art] SIG.S = 967F298F41B210F9934B26EDDFC7462C44F4ACA0D5A4E07128A14FF722EA6FF1D7DDB093D722E21822E8E0E6ABD3E449
25,650,724 UART: Caliptra RT
25,651,427 UART: [state] CFI Enabled
25,833,109 UART: [rt] RT listening for mailbox commands...
25,864,848 UART: [rt]cmd =0x54514754, len=24
25,867,541 >>> mbox cmd response data (8 bytes)
25,867,963 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,897,925 UART: [rt]cmd =0x54514754, len=24
25,900,364 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,411 writing to cptra_bootfsm_go
192,545 UART:
192,914 UART: Running Caliptra ROM ...
194,002 UART:
603,639 UART: [state] CFI Enabled
616,756 UART: [state] LifecycleState = Unprovisioned
618,661 UART: [state] DebugLocked = No
621,407 UART: [state] WD Timer not started. Device not locked for debugging
624,672 UART: [kat] SHA2-256
804,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,105 UART: [kat] ++
815,555 UART: [kat] sha1
826,219 UART: [kat] SHA2-256
828,879 UART: [kat] SHA2-384
835,297 UART: [kat] SHA2-512-ACC
837,666 UART: [kat] ECC-384
3,278,568 UART: [kat] HMAC-384Kdf
3,290,021 UART: [kat] LMS
3,766,546 UART: [kat] --
3,772,193 UART: [cold-reset] ++
3,773,633 UART: [fht] FHT @ 0x50003400
3,784,967 UART: [idev] ++
3,785,537 UART: [idev] CDI.KEYID = 6
3,786,510 UART: [idev] SUBJECT.KEYID = 7
3,787,761 UART: [idev] UDS.KEYID = 0
3,788,667 ready_for_fw is high
3,788,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,702 UART: [idev] Erasing UDS.KEYID = 0
6,262,932 UART: [idev] Sha1 KeyId Algorithm
6,286,349 UART: [idev] --
6,291,043 UART: [ldev] ++
6,291,621 UART: [ldev] CDI.KEYID = 6
6,292,560 UART: [ldev] SUBJECT.KEYID = 5
6,293,721 UART: [ldev] AUTHORITY.KEYID = 7
6,295,097 UART: [ldev] FE.KEYID = 1
6,305,889 UART: [ldev] Erasing FE.KEYID = 1
8,783,505 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,611 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,251 UART: [ldev] --
10,577,434 UART: [fwproc] Wait for Commands...
10,580,505 UART: [fwproc] Recv command 0x46574c44
10,582,488 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,679 >>> mbox cmd response: success
14,555,909 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,558,617 UART: [afmc] ++
14,559,210 UART: [afmc] CDI.KEYID = 6
14,560,153 UART: [afmc] SUBJECT.KEYID = 7
14,561,371 UART: [afmc] AUTHORITY.KEYID = 5
17,064,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,786,709 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,788,890 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,804,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,820,795 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,836,381 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,458 UART: [afmc] --
18,864,938 UART: [cold-reset] --
18,867,941 UART: [state] Locking Datavault
18,873,407 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,110 UART: [state] Locking ICCM
18,876,856 UART: [exit] Launching FMC @ 0x40000130
18,885,305 UART:
18,885,541 UART: Running Caliptra FMC ...
18,886,644 UART:
18,886,806 UART: [state] CFI Enabled
18,895,127 UART: [fht] FMC Alias Private Key: 7
20,661,212 UART: [art] Extend RT PCRs Done
20,662,441 UART: [art] Lock RT PCRs Done
20,664,293 UART: [art] Populate DV Done
20,669,599 UART: [fht] FMC Alias Private Key: 7
20,671,191 UART: [art] Derive CDI
20,671,930 UART: [art] Store in slot 0x4
20,714,750 UART: [art] Derive Key Pair
20,715,795 UART: [art] Store priv key in slot 0x5
23,142,814 UART: [art] Derive Key Pair - Done
23,155,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,019 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,522 UART: [art] PUB.X = 7F2476AE1C9E771BA94B811DA430DBD30F692C3CA4045BBF2EFFAB548B385BB96AE4484071340155F0056D18FE19BA59
24,870,767 UART: [art] PUB.Y = FBF4D9259B75E3AF3D78380FE15373BDBBF6540925AD85C75455ED5943C5671D0E4969342DCA6E92BE7688CFFE26E352
24,878,057 UART: [art] SIG.R = F385349A710DFEDEDDE835BAB4E3B09B3648FB71DB26539BD7DC11A481902D39270DC61C9337C00B1555C317BE3D2CC2
24,885,451 UART: [art] SIG.S = F903A716B32A624C2A8B625F9765C3248D66B150DCD50187D8323C1F9515F9447E795CB8D0DE198CE595693A6C4550C2
25,864,827 UART: Caliptra RT
25,865,561 UART: [state] CFI Enabled
25,998,206 UART: [rt] RT listening for mailbox commands...
26,029,818 UART: [rt]cmd =0x54514754, len=24
26,032,364 >>> mbox cmd response data (8 bytes)
26,032,893 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,062,647 UART: [rt]cmd =0x54514754, len=24
26,065,079 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
3,784,983 ready_for_fw is high
3,785,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,454,040 >>> mbox cmd response: success
14,455,177 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,706,366 UART:
18,706,825 UART: Running Caliptra FMC ...
18,707,938 UART:
18,708,095 UART: [state] CFI Enabled
18,716,217 UART: [fht] FMC Alias Private Key: 7
20,482,897 UART: [art] Extend RT PCRs Done
20,484,122 UART: [art] Lock RT PCRs Done
20,485,827 UART: [art] Populate DV Done
20,490,977 UART: [fht] FMC Alias Private Key: 7
20,492,625 UART: [art] Derive CDI
20,493,364 UART: [art] Store in slot 0x4
20,535,745 UART: [art] Derive Key Pair
20,536,790 UART: [art] Store priv key in slot 0x5
22,963,554 UART: [art] Derive Key Pair - Done
22,976,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,042 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,546 UART: [art] PUB.X = 46C372CCD4EEA357F985B4B9052333B25D110D624441A96BE07A11AACD7C4B688D3A68F5B1A18FC285CDE5ADDAA34C83
24,691,833 UART: [art] PUB.Y = 5DEF809F743FDE8DE47C17BB4457A6FE8BC7850FF32F31FFB29BFADB16683DEDFBF1C74E4BB4AF041F9BB871873F932B
24,699,092 UART: [art] SIG.R = 6A8E5E572279CFC79D79AC77F2AAA7BF83F79C3BBE0ACCA5BE14E3D94E412F7416E61C3D4CD6810BD0D03ACA8DDA1D43
24,706,551 UART: [art] SIG.S = 7CC5C4BA87C9CFFBDB8E089DC05B3D8B8C7119D61632CA202AE83F7893151A6EB62984FB9DF2479E47B3DA2A8968B267
25,685,119 UART: Caliptra RT
25,685,831 UART: [state] CFI Enabled
25,819,327 UART: [rt] RT listening for mailbox commands...
25,850,848 UART: [rt]cmd =0x54514754, len=24
25,853,542 >>> mbox cmd response data (8 bytes)
25,854,071 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,883,948 UART: [rt]cmd =0x54514754, len=24
25,886,401 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
191,990 UART:
192,376 UART: Running Caliptra ROM ...
193,574 UART:
193,725 UART: [state] CFI Enabled
266,173 UART: [state] LifecycleState = Unprovisioned
268,509 UART: [state] DebugLocked = No
271,248 UART: [state] WD Timer not started. Device not locked for debugging
275,992 UART: [kat] SHA2-256
465,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,669 UART: [kat] ++
477,118 UART: [kat] sha1
489,940 UART: [kat] SHA2-256
492,917 UART: [kat] SHA2-384
498,980 UART: [kat] SHA2-512-ACC
501,563 UART: [kat] ECC-384
2,949,185 UART: [kat] HMAC-384Kdf
2,973,297 UART: [kat] LMS
3,505,058 UART: [kat] --
3,509,343 UART: [cold-reset] ++
3,511,909 UART: [fht] FHT @ 0x50003400
3,523,308 UART: [idev] ++
3,523,947 UART: [idev] CDI.KEYID = 6
3,524,926 UART: [idev] SUBJECT.KEYID = 7
3,526,167 UART: [idev] UDS.KEYID = 0
3,527,093 ready_for_fw is high
3,527,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,787 UART: [idev] Erasing UDS.KEYID = 0
6,029,845 UART: [idev] Sha1 KeyId Algorithm
6,051,790 UART: [idev] --
6,057,678 UART: [ldev] ++
6,058,420 UART: [ldev] CDI.KEYID = 6
6,059,333 UART: [ldev] SUBJECT.KEYID = 5
6,060,489 UART: [ldev] AUTHORITY.KEYID = 7
6,061,722 UART: [ldev] FE.KEYID = 1
6,101,323 UART: [ldev] Erasing FE.KEYID = 1
8,611,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,658 UART: [ldev] --
10,412,868 UART: [fwproc] Wait for Commands...
10,415,180 UART: [fwproc] Recv command 0x46574c44
10,417,482 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,680 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,106 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,678,651 >>> mbox cmd response: success
14,679,802 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,682,735 UART: [afmc] ++
14,683,487 UART: [afmc] CDI.KEYID = 6
14,684,586 UART: [afmc] SUBJECT.KEYID = 7
14,686,116 UART: [afmc] AUTHORITY.KEYID = 5
17,213,575 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,934,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,936,079 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,951,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,966,350 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,981,298 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,005,108 UART: [afmc] --
19,008,158 UART: [cold-reset] --
19,012,615 UART: [state] Locking Datavault
19,016,237 UART: [state] Locking PCR0, PCR1 and PCR31
19,018,374 UART: [state] Locking ICCM
19,019,714 UART: [exit] Launching FMC @ 0x40000130
19,028,427 UART:
19,028,660 UART: Running Caliptra FMC ...
19,029,756 UART:
19,029,915 UART: [state] CFI Enabled
19,092,778 UART: [fht] FMC Alias Private Key: 7
20,860,160 UART: [art] Extend RT PCRs Done
20,861,383 UART: [art] Lock RT PCRs Done
20,863,186 UART: [art] Populate DV Done
20,868,667 UART: [fht] FMC Alias Private Key: 7
20,870,255 UART: [art] Derive CDI
20,871,065 UART: [art] Store in slot 0x4
20,925,191 UART: [art] Derive Key Pair
20,926,222 UART: [art] Store priv key in slot 0x5
23,389,364 UART: [art] Derive Key Pair - Done
23,401,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,353 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,859 UART: [art] PUB.X = 3BC91A3E5BF2308EFD0A2D79B1EB291933294B422D0AFE136B85604EBDB02BF35D9B0D9FF509024476C8AF80515C1614
25,124,112 UART: [art] PUB.Y = 9C8DADDF51656AB30D67890D023290603AA0EFD3308FFB147F14A89835BC7F6373CE4A6BA75F034EABCE00BE0A91E36E
25,131,376 UART: [art] SIG.R = 74C51425DE735653B2331C1D41FAAC6E50B59A1F3453F502BAE0551A47E57E1A2E76211B6356DC1C7E4943C1FF7D49C5
25,138,775 UART: [art] SIG.S = 4AADB850CF8C34B1B6E3D3038163693831D1B58041C01B70DD6E62F17E84021AF434E84F63647C8BB58D97015966CDA5
26,118,018 UART: Caliptra RT
26,118,743 UART: [state] CFI Enabled
26,299,048 UART: [rt] RT listening for mailbox commands...
26,330,534 UART: [rt]cmd =0x54514754, len=24
26,333,213 >>> mbox cmd response data (8 bytes)
26,333,844 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,363,675 UART: [rt]cmd =0x54514754, len=24
26,366,174 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,437,669 ready_for_fw is high
3,438,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,825,940 >>> mbox cmd response: success
14,827,266 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,111,649 UART:
19,112,039 UART: Running Caliptra FMC ...
19,113,237 UART:
19,113,401 UART: [state] CFI Enabled
19,177,298 UART: [fht] FMC Alias Private Key: 7
20,943,286 UART: [art] Extend RT PCRs Done
20,944,510 UART: [art] Lock RT PCRs Done
20,946,081 UART: [art] Populate DV Done
20,951,445 UART: [fht] FMC Alias Private Key: 7
20,953,101 UART: [art] Derive CDI
20,953,919 UART: [art] Store in slot 0x4
21,009,747 UART: [art] Derive Key Pair
21,010,750 UART: [art] Store priv key in slot 0x5
23,473,458 UART: [art] Derive Key Pair - Done
23,486,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,712 UART: [art] Erasing AUTHORITY.KEYID = 7
25,200,218 UART: [art] PUB.X = E6DA0527D4F8F53E84CA65281E2FAF36A70A32D8B61C6209FE4FB123EAEAA019F5EFAC21B676C200D1F529D01FDA4D51
25,207,474 UART: [art] PUB.Y = C4C294A4E8F3266C9DEB672DB94E904B222057BC7C13FE8262B9096C9EF851E657FD3875F1DC66366EC791127200A8C7
25,214,713 UART: [art] SIG.R = 996752F12EF217FAF4EA901FCB70A0C004C8660F799D3BE63D83CFDCA8CBFCE36883E65A1720B2F280E8B88820688033
25,222,104 UART: [art] SIG.S = 62F06096CF79ACCD1FCF2CCBB5B88D99652CEDF3C0E47D8DCEB06685D365A26A25F64F58B3F38E1C384CC3D7D092AB02
26,200,677 UART: Caliptra RT
26,201,392 UART: [state] CFI Enabled
26,381,175 UART: [rt] RT listening for mailbox commands...
26,412,664 UART: [rt]cmd =0x54514754, len=24
26,415,470 >>> mbox cmd response data (8 bytes)
26,415,949 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,445,959 UART: [rt]cmd =0x54514754, len=24
26,448,470 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,413 writing to cptra_bootfsm_go
192,572 UART:
192,929 UART: Running Caliptra ROM ...
194,042 UART:
603,532 UART: [state] CFI Enabled
616,711 UART: [state] LifecycleState = Unprovisioned
619,147 UART: [state] DebugLocked = No
621,328 UART: [state] WD Timer not started. Device not locked for debugging
625,104 UART: [kat] SHA2-256
814,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,503 UART: [kat] ++
826,106 UART: [kat] sha1
837,487 UART: [kat] SHA2-256
840,503 UART: [kat] SHA2-384
846,709 UART: [kat] SHA2-512-ACC
849,298 UART: [kat] ECC-384
3,292,913 UART: [kat] HMAC-384Kdf
3,306,345 UART: [kat] LMS
3,838,171 UART: [kat] --
3,842,167 UART: [cold-reset] ++
3,843,108 UART: [fht] FHT @ 0x50003400
3,854,657 UART: [idev] ++
3,855,310 UART: [idev] CDI.KEYID = 6
3,856,272 UART: [idev] SUBJECT.KEYID = 7
3,857,519 UART: [idev] UDS.KEYID = 0
3,858,425 ready_for_fw is high
3,858,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,640 UART: [idev] Erasing UDS.KEYID = 0
6,339,744 UART: [idev] Sha1 KeyId Algorithm
6,363,353 UART: [idev] --
6,367,785 UART: [ldev] ++
6,368,521 UART: [ldev] CDI.KEYID = 6
6,369,412 UART: [ldev] SUBJECT.KEYID = 5
6,370,558 UART: [ldev] AUTHORITY.KEYID = 7
6,371,796 UART: [ldev] FE.KEYID = 1
6,384,154 UART: [ldev] Erasing FE.KEYID = 1
8,862,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,628,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,840 UART: [ldev] --
10,654,597 UART: [fwproc] Wait for Commands...
10,657,073 UART: [fwproc] Recv command 0x46574c44
10,659,333 UART: [fwproc] Recv'd Img size: 118548 bytes
14,158,620 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,356,438 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,423 >>> mbox cmd response: success
14,918,675 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,920,909 UART: [afmc] ++
14,921,617 UART: [afmc] CDI.KEYID = 6
14,922,788 UART: [afmc] SUBJECT.KEYID = 7
14,924,284 UART: [afmc] AUTHORITY.KEYID = 5
17,425,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,147,815 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,149,785 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,164,887 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,180,059 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,194,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,218,909 UART: [afmc] --
19,223,094 UART: [cold-reset] --
19,227,831 UART: [state] Locking Datavault
19,233,786 UART: [state] Locking PCR0, PCR1 and PCR31
19,235,933 UART: [state] Locking ICCM
19,238,271 UART: [exit] Launching FMC @ 0x40000130
19,246,902 UART:
19,247,144 UART: Running Caliptra FMC ...
19,248,251 UART:
19,248,410 UART: [state] CFI Enabled
19,256,622 UART: [fht] FMC Alias Private Key: 7
21,022,829 UART: [art] Extend RT PCRs Done
21,024,057 UART: [art] Lock RT PCRs Done
21,025,715 UART: [art] Populate DV Done
21,031,240 UART: [fht] FMC Alias Private Key: 7
21,032,890 UART: [art] Derive CDI
21,033,639 UART: [art] Store in slot 0x4
21,076,559 UART: [art] Derive Key Pair
21,077,564 UART: [art] Store priv key in slot 0x5
23,504,311 UART: [art] Derive Key Pair - Done
23,517,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,251 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,761 UART: [art] PUB.X = 28EA999472741FE3F0C66A4951786145393374E8008CE675D94E6149BA99C0015A441568353EAED5A2069159C43FE18E
25,231,979 UART: [art] PUB.Y = 5DE127321D063C22123BF669E0CFEF6B3BF323255CF1D1965F2D4D528D84B41E481B8BD26797882B5D3D23A37F5BD103
25,239,233 UART: [art] SIG.R = 797BFC7E6A23694DC584F61D3E6478251A4988279DF895BF132D56B4835245622497BE0B89DEE3FDD6040775944ECAC8
25,246,600 UART: [art] SIG.S = 8DCE2320EAF40DA848945C46DC4C017D2C47C91FD049AEE5328692A8B49F44ACD6D525D325459EB2E2525B823C99D788
26,225,783 UART: Caliptra RT
26,226,496 UART: [state] CFI Enabled
26,358,949 UART: [rt] RT listening for mailbox commands...
26,390,187 UART: [rt]cmd =0x54514754, len=24
26,392,801 >>> mbox cmd response data (8 bytes)
26,393,343 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,423,409 UART: [rt]cmd =0x54514754, len=24
26,425,926 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,758,071 ready_for_fw is high
3,758,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,061,672 >>> mbox cmd response: success
15,063,062 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,318,427 UART:
19,318,819 UART: Running Caliptra FMC ...
19,319,941 UART:
19,320,097 UART: [state] CFI Enabled
19,328,390 UART: [fht] FMC Alias Private Key: 7
21,094,524 UART: [art] Extend RT PCRs Done
21,095,768 UART: [art] Lock RT PCRs Done
21,097,243 UART: [art] Populate DV Done
21,102,619 UART: [fht] FMC Alias Private Key: 7
21,104,272 UART: [art] Derive CDI
21,105,096 UART: [art] Store in slot 0x4
21,147,656 UART: [art] Derive Key Pair
21,148,717 UART: [art] Store priv key in slot 0x5
23,575,432 UART: [art] Derive Key Pair - Done
23,588,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,294,624 UART: [art] Erasing AUTHORITY.KEYID = 7
25,296,131 UART: [art] PUB.X = 15E050D5185DD764B2E09C142FD9DB75A4500D0E1174ACFCBD51ABE22EC0E87C87CDF483C050663184982D8CF913356B
25,303,401 UART: [art] PUB.Y = 9CF51180C4BE032C4D965FBF6877623DA368D80183A995CF3D734114271E229CFDC84A38D43B35990320913DAC3657FA
25,310,661 UART: [art] SIG.R = 5A316F67F67E609DEF7DBF23BF0C1D05939E380CDDB7F40BF0AC2B180B58F90D887798C6AD2EFFDFCCAA6B08ED899060
25,318,076 UART: [art] SIG.S = C552421C3EF603803866FA3EDE8E34A1053D88FFC9DE9F8E32C3BF86F44617DF9BA7B1E305A4EC3613C5607490AAB30F
26,296,809 UART: Caliptra RT
26,297,510 UART: [state] CFI Enabled
26,429,571 UART: [rt] RT listening for mailbox commands...
26,460,991 UART: [rt]cmd =0x54514754, len=24
26,464,070 >>> mbox cmd response data (8 bytes)
26,464,584 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,494,614 UART: [rt]cmd =0x54514754, len=24
26,496,993 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,111 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,633 UART: [kat] SHA2-256
881,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,679 UART: [kat] ++
885,831 UART: [kat] sha1
890,163 UART: [kat] SHA2-256
892,101 UART: [kat] SHA2-384
894,824 UART: [kat] SHA2-512-ACC
896,725 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,344 UART: [kat] LMS
1,475,540 UART: [kat] --
1,476,443 UART: [cold-reset] ++
1,476,887 UART: [fht] Storing FHT @ 0x50003400
1,479,576 UART: [idev] ++
1,479,744 UART: [idev] CDI.KEYID = 6
1,480,104 UART: [idev] SUBJECT.KEYID = 7
1,480,528 UART: [idev] UDS.KEYID = 0
1,480,873 ready_for_fw is high
1,480,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,312 UART: [idev] Erasing UDS.KEYID = 0
1,504,506 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,278 UART: [idev] --
1,514,309 UART: [ldev] ++
1,514,477 UART: [ldev] CDI.KEYID = 6
1,514,840 UART: [ldev] SUBJECT.KEYID = 5
1,515,266 UART: [ldev] AUTHORITY.KEYID = 7
1,515,729 UART: [ldev] FE.KEYID = 1
1,521,007 UART: [ldev] Erasing FE.KEYID = 1
1,546,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,102 UART: [ldev] --
1,585,531 UART: [fwproc] Waiting for Commands...
1,586,182 UART: [fwproc] Received command 0x46574c44
1,586,973 UART: [fwproc] Received Image of size 118548 bytes
2,932,763 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,964 >>> mbox cmd response: success
3,130,964 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,210 UART: [afmc] ++
3,132,378 UART: [afmc] CDI.KEYID = 6
3,132,740 UART: [afmc] SUBJECT.KEYID = 7
3,133,165 UART: [afmc] AUTHORITY.KEYID = 5
3,168,358 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,490 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,270 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,862 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,545 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,447 UART: [afmc] --
3,211,569 UART: [cold-reset] --
3,212,587 UART: [state] Locking Datavault
3,213,910 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,514 UART: [state] Locking ICCM
3,215,184 UART: [exit] Launching FMC @ 0x40000130
3,220,514 UART:
3,220,530 UART: Running Caliptra FMC ...
3,220,938 UART:
3,220,992 UART: [state] CFI Enabled
3,231,722 UART: [fht] FMC Alias Private Key: 7
3,350,730 UART: [art] Extend RT PCRs Done
3,351,158 UART: [art] Lock RT PCRs Done
3,352,518 UART: [art] Populate DV Done
3,360,895 UART: [fht] FMC Alias Private Key: 7
3,361,997 UART: [art] Derive CDI
3,362,277 UART: [art] Store in slot 0x4
3,448,489 UART: [art] Derive Key Pair
3,448,849 UART: [art] Store priv key in slot 0x5
3,462,104 UART: [art] Derive Key Pair - Done
3,477,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,711 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,476 UART: [art] PUB.X = 355C13BD093D1654DF6C1264B43A874FDA7F7164502C517756B0932A0A426923A6405D0DA81B85FBA2EC44F3637786E4
3,500,233 UART: [art] PUB.Y = 8426F4B85BA909B6E0C8C03659E5712BC766D606C16E5F057A389E63C5ED95F2050A93EFD3FF3AD7BB5AA6E7AB7AA673
3,507,182 UART: [art] SIG.R = 5713B712FE00147A6452BFCC854F09123532CF5E8E825534DE6D589B4FDD953E685B3AA87F4C3F434C568E2E43C5D8EF
3,513,933 UART: [art] SIG.S = CA61CC3A1F4BB4A46014949BD7263EB3822B802D228220CC6DC755C547854645D000352AE938EA45D52107B2283D6D95
3,537,214 UART: Caliptra RT
3,537,465 UART: [state] CFI Enabled
3,657,619 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,171 UART: [rt]cmd =0x54514754, len=24
3,690,328 >>> mbox cmd response data (8 bytes)
3,690,329 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,850 UART: [rt]cmd =0x54514754, len=24
3,721,819 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,511 ready_for_fw is high
1,362,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,240 >>> mbox cmd response: success
2,980,240 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,041,109 UART:
3,041,125 UART: Running Caliptra FMC ...
3,041,533 UART:
3,041,587 UART: [state] CFI Enabled
3,051,749 UART: [fht] FMC Alias Private Key: 7
3,170,287 UART: [art] Extend RT PCRs Done
3,170,715 UART: [art] Lock RT PCRs Done
3,172,205 UART: [art] Populate DV Done
3,180,428 UART: [fht] FMC Alias Private Key: 7
3,181,460 UART: [art] Derive CDI
3,181,740 UART: [art] Store in slot 0x4
3,267,364 UART: [art] Derive Key Pair
3,267,724 UART: [art] Store priv key in slot 0x5
3,280,675 UART: [art] Derive Key Pair - Done
3,295,855 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,674 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,439 UART: [art] PUB.X = 000FEC06D431AD35CDE0AA964528C03B34A763A77EB3A62BAFF8172AEFBCA9A3686B480099C9472E1E67673F575F2AF4
3,319,171 UART: [art] PUB.Y = 1CA42E7E97EFC2950FFA0130DAF0556966BCFF7A596505D513E64E736C3239A6C175FB6D96CAD7CC9547F24E7754DF50
3,326,122 UART: [art] SIG.R = FE0C3192E5EA2E71756C4BC94FE52E109A85218B319794764E62790CFD7B223DC52E37BEFBF2D57DD81FFAE8F964656C
3,332,898 UART: [art] SIG.S = 8045D8A7D4630F2A10EF28B00C55BA6EFA30678E6C7D7A73B7BC99FE90D5FB4664074F6F56B95B9536BD878B29D6A4F7
3,356,251 UART: Caliptra RT
3,356,502 UART: [state] CFI Enabled
3,477,313 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,739 UART: [rt]cmd =0x54514754, len=24
3,509,906 >>> mbox cmd response data (8 bytes)
3,509,907 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,380 UART: [rt]cmd =0x54514754, len=24
3,541,697 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,274 UART: [kat] SHA2-256
882,205 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,320 UART: [kat] ++
886,472 UART: [kat] sha1
890,694 UART: [kat] SHA2-256
892,632 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
902,647 UART: [kat] HMAC-384Kdf
907,167 UART: [kat] LMS
1,475,363 UART: [kat] --
1,476,302 UART: [cold-reset] ++
1,476,638 UART: [fht] Storing FHT @ 0x50003400
1,479,505 UART: [idev] ++
1,479,673 UART: [idev] CDI.KEYID = 6
1,480,033 UART: [idev] SUBJECT.KEYID = 7
1,480,457 UART: [idev] UDS.KEYID = 0
1,480,802 ready_for_fw is high
1,480,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,485 UART: [idev] Erasing UDS.KEYID = 0
1,504,929 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,447 UART: [idev] --
1,514,610 UART: [ldev] ++
1,514,778 UART: [ldev] CDI.KEYID = 6
1,515,141 UART: [ldev] SUBJECT.KEYID = 5
1,515,567 UART: [ldev] AUTHORITY.KEYID = 7
1,516,030 UART: [ldev] FE.KEYID = 1
1,521,116 UART: [ldev] Erasing FE.KEYID = 1
1,546,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,577 UART: [ldev] --
1,586,042 UART: [fwproc] Waiting for Commands...
1,586,805 UART: [fwproc] Received command 0x46574c44
1,587,596 UART: [fwproc] Received Image of size 118548 bytes
2,933,582 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,860 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,078 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,413 >>> mbox cmd response: success
3,132,413 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,537 UART: [afmc] ++
3,133,705 UART: [afmc] CDI.KEYID = 6
3,134,067 UART: [afmc] SUBJECT.KEYID = 7
3,134,492 UART: [afmc] AUTHORITY.KEYID = 5
3,169,687 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,877 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,657 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,366 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,249 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,932 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,900 UART: [afmc] --
3,212,862 UART: [cold-reset] --
3,213,642 UART: [state] Locking Datavault
3,214,813 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,417 UART: [state] Locking ICCM
3,215,997 UART: [exit] Launching FMC @ 0x40000130
3,221,327 UART:
3,221,343 UART: Running Caliptra FMC ...
3,221,751 UART:
3,221,894 UART: [state] CFI Enabled
3,232,236 UART: [fht] FMC Alias Private Key: 7
3,351,444 UART: [art] Extend RT PCRs Done
3,351,872 UART: [art] Lock RT PCRs Done
3,353,352 UART: [art] Populate DV Done
3,361,733 UART: [fht] FMC Alias Private Key: 7
3,362,845 UART: [art] Derive CDI
3,363,125 UART: [art] Store in slot 0x4
3,449,143 UART: [art] Derive Key Pair
3,449,503 UART: [art] Store priv key in slot 0x5
3,463,200 UART: [art] Derive Key Pair - Done
3,477,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,442 UART: [art] PUB.X = 3C883B40DE15D9326C557E432EE2926CA99F42E9B97AA5D5835AA30A3743CCDDAC19675320C862779638AF1FBC40ACC0
3,500,217 UART: [art] PUB.Y = 15791B072F97C66A947C9E6E7BB64370E3198E7328365729EF83CE811D190332709F0D7604611918841879E1F045943F
3,507,135 UART: [art] SIG.R = 4972B7B010707F03B9B60987C77475B2D4CAD18F4D73605F8A96D6CACFED7C49894B8140AF3AE4A0ADCF87036D57CDD7
3,513,908 UART: [art] SIG.S = C4CB9054C8BD0A7748C9A48DC6114A3F769869579F64C6DA65376B58A547456BC63AA35E686C4C95A6754DA1B65BDF08
3,537,394 UART: Caliptra RT
3,537,737 UART: [state] CFI Enabled
3,656,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,427 UART: [rt]cmd =0x54514754, len=24
3,689,804 >>> mbox cmd response data (8 bytes)
3,689,805 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,204 UART: [rt]cmd =0x54514754, len=24
3,721,549 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,446 ready_for_fw is high
1,362,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,031 >>> mbox cmd response: success
2,982,031 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,992 UART:
3,043,008 UART: Running Caliptra FMC ...
3,043,416 UART:
3,043,559 UART: [state] CFI Enabled
3,054,601 UART: [fht] FMC Alias Private Key: 7
3,173,349 UART: [art] Extend RT PCRs Done
3,173,777 UART: [art] Lock RT PCRs Done
3,175,413 UART: [art] Populate DV Done
3,183,530 UART: [fht] FMC Alias Private Key: 7
3,184,460 UART: [art] Derive CDI
3,184,740 UART: [art] Store in slot 0x4
3,270,362 UART: [art] Derive Key Pair
3,270,722 UART: [art] Store priv key in slot 0x5
3,284,175 UART: [art] Derive Key Pair - Done
3,299,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,658 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,423 UART: [art] PUB.X = 1591C1AE5B4D640343B23375BDE2A7025E95059E25A711F02C443FE4648A9C9F54649554CA0A42D6B65E4EDE5C6ACD2A
3,322,187 UART: [art] PUB.Y = 6D09BAB430F4C2B091B8C1611DCD10FAF82E37EEFA81D619DB2CF405733D1E950596E4AE2DC3998F0BF8FC2112779522
3,329,137 UART: [art] SIG.R = F41CB30F3DB99279DA520E9E882CB649407A438B8B8DC15DE4FF8FFA4D20FFEC5D77D3FC7DF58CCF3D043337397065A3
3,335,916 UART: [art] SIG.S = 9CE7BB7D226E72E92162F2D3DB7548EE1277EF5B5639864BA550482525E330DD39F5F6C411A38B820CB477528D1A3E89
3,359,545 UART: Caliptra RT
3,359,888 UART: [state] CFI Enabled
3,480,271 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,861 UART: [rt]cmd =0x54514754, len=24
3,513,056 >>> mbox cmd response data (8 bytes)
3,513,057 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,458 UART: [rt]cmd =0x54514754, len=24
3,544,561 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,886 UART: [kat] SHA2-256
891,436 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,540 UART: [kat] ++
895,692 UART: [kat] sha1
899,894 UART: [kat] SHA2-256
901,834 UART: [kat] SHA2-384
904,615 UART: [kat] SHA2-512-ACC
906,516 UART: [kat] ECC-384
916,431 UART: [kat] HMAC-384Kdf
920,829 UART: [kat] LMS
1,169,141 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,422 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 ready_for_fw is high
1,174,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,199 UART: [idev] Erasing UDS.KEYID = 0
1,199,051 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,209,134 UART: [ldev] ++
1,209,302 UART: [ldev] CDI.KEYID = 6
1,209,666 UART: [ldev] SUBJECT.KEYID = 5
1,210,093 UART: [ldev] AUTHORITY.KEYID = 7
1,210,556 UART: [ldev] FE.KEYID = 1
1,215,454 UART: [ldev] Erasing FE.KEYID = 1
1,241,931 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,013 UART: [fwproc] Wait for Commands...
1,281,614 UART: [fwproc] Recv command 0x46574c44
1,282,347 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,683 >>> mbox cmd response: success
2,824,683 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,873 UART: [afmc] ++
2,826,041 UART: [afmc] CDI.KEYID = 6
2,826,404 UART: [afmc] SUBJECT.KEYID = 7
2,826,830 UART: [afmc] AUTHORITY.KEYID = 5
2,862,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,706 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,455 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,165 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,046 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,747 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,318 UART: [afmc] --
2,905,257 UART: [cold-reset] --
2,906,177 UART: [state] Locking Datavault
2,907,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,860 UART: [state] Locking ICCM
2,908,374 UART: [exit] Launching FMC @ 0x40000130
2,913,704 UART:
2,913,720 UART: Running Caliptra FMC ...
2,914,128 UART:
2,914,182 UART: [state] CFI Enabled
2,924,688 UART: [fht] FMC Alias Private Key: 7
3,044,360 UART: [art] Extend RT PCRs Done
3,044,788 UART: [art] Lock RT PCRs Done
3,045,918 UART: [art] Populate DV Done
3,054,125 UART: [fht] FMC Alias Private Key: 7
3,055,145 UART: [art] Derive CDI
3,055,425 UART: [art] Store in slot 0x4
3,140,938 UART: [art] Derive Key Pair
3,141,298 UART: [art] Store priv key in slot 0x5
3,154,456 UART: [art] Derive Key Pair - Done
3,169,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,726 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,491 UART: [art] PUB.X = D5CA2051AC14AD3267B0E3110A2D5AD12C0B69776DEDDDDA7EE2B9C13E08C8EE8CC6ED52E209BE0A615D54FE923F8EB6
3,192,272 UART: [art] PUB.Y = DEF12DF95943B2DFAF8B069B61844B3BABE7BEFA2A8E467950C9A41CD8FE2BF80AC2DE93BC7129DB3AEF4B3337E8446E
3,199,244 UART: [art] SIG.R = 345F54A2A7ACE9CAA8FE417CA5504C8DAB8CEF288BB94BFC4F95D318C8065370281B22EDD7CDDDD570FC86BB84A7CEAD
3,206,041 UART: [art] SIG.S = 4CA4204BCCB0450C353290ACFC60B5768E10502FB3A7FF8081B049B9C0B69FD8074FE2A71E7CD27A564997929A85FD70
3,229,681 UART: Caliptra RT
3,229,932 UART: [state] CFI Enabled
3,350,354 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,942 UART: [rt]cmd =0x54514754, len=24
3,383,259 >>> mbox cmd response data (8 bytes)
3,383,260 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,679 UART: [rt]cmd =0x54514754, len=24
3,414,512 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,170 ready_for_fw is high
1,059,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,976 >>> mbox cmd response: success
2,678,976 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,740,305 UART:
2,740,321 UART: Running Caliptra FMC ...
2,740,729 UART:
2,740,783 UART: [state] CFI Enabled
2,751,335 UART: [fht] FMC Alias Private Key: 7
2,870,379 UART: [art] Extend RT PCRs Done
2,870,807 UART: [art] Lock RT PCRs Done
2,872,257 UART: [art] Populate DV Done
2,880,486 UART: [fht] FMC Alias Private Key: 7
2,881,656 UART: [art] Derive CDI
2,881,936 UART: [art] Store in slot 0x4
2,967,901 UART: [art] Derive Key Pair
2,968,261 UART: [art] Store priv key in slot 0x5
2,980,977 UART: [art] Derive Key Pair - Done
2,995,806 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,844 UART: [art] PUB.X = 6862DC09828C4E30BAE4319BD4999733BCC471342B6553F1E5C001DE6E00EFC61B776EA62DBD3245BD2BF63D01B0D91E
3,018,593 UART: [art] PUB.Y = 840DBA977E15624291B1D4DCB097AAAF55A52DEFD50F78644A60588239D39BE6069F4B90294A9A56703CC1070295D032
3,025,526 UART: [art] SIG.R = 1C1C1265C186DAA7FAF29765619E572688164ECFF3F41613E54E58BC2E22D080FBDBCBD7D3C23D3284B6867B06FB347E
3,032,303 UART: [art] SIG.S = 31AC4DAC111BB41F8D21B8F5950F2EA9934B47C95780ECED193C4C19B00184EB53733757C2162411D8D5CC5EF1BDB065
3,057,057 UART: Caliptra RT
3,057,308 UART: [state] CFI Enabled
3,176,756 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,394 UART: [rt]cmd =0x54514754, len=24
3,209,643 >>> mbox cmd response data (8 bytes)
3,209,644 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,143 UART: [rt]cmd =0x54514754, len=24
3,241,114 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,474 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,551 UART: [kat] SHA2-256
901,491 UART: [kat] SHA2-384
904,328 UART: [kat] SHA2-512-ACC
906,229 UART: [kat] ECC-384
915,802 UART: [kat] HMAC-384Kdf
920,436 UART: [kat] LMS
1,168,748 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,169,977 UART: [fht] FHT @ 0x50003400
1,172,553 UART: [idev] ++
1,172,721 UART: [idev] CDI.KEYID = 6
1,173,082 UART: [idev] SUBJECT.KEYID = 7
1,173,507 UART: [idev] UDS.KEYID = 0
1,173,853 ready_for_fw is high
1,173,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,494 UART: [idev] Erasing UDS.KEYID = 0
1,198,416 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,477 UART: [ldev] ++
1,208,645 UART: [ldev] CDI.KEYID = 6
1,209,009 UART: [ldev] SUBJECT.KEYID = 5
1,209,436 UART: [ldev] AUTHORITY.KEYID = 7
1,209,899 UART: [ldev] FE.KEYID = 1
1,215,063 UART: [ldev] Erasing FE.KEYID = 1
1,242,060 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,394 UART: [fwproc] Wait for Commands...
1,282,053 UART: [fwproc] Recv command 0x46574c44
1,282,786 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,552 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,010 >>> mbox cmd response: success
2,825,010 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,098 UART: [afmc] ++
2,826,266 UART: [afmc] CDI.KEYID = 6
2,826,629 UART: [afmc] SUBJECT.KEYID = 7
2,827,055 UART: [afmc] AUTHORITY.KEYID = 5
2,862,490 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,049 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,389 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,090 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,779 UART: [afmc] --
2,905,688 UART: [cold-reset] --
2,906,464 UART: [state] Locking Datavault
2,907,643 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,247 UART: [state] Locking ICCM
2,908,737 UART: [exit] Launching FMC @ 0x40000130
2,914,067 UART:
2,914,083 UART: Running Caliptra FMC ...
2,914,491 UART:
2,914,634 UART: [state] CFI Enabled
2,925,106 UART: [fht] FMC Alias Private Key: 7
3,043,614 UART: [art] Extend RT PCRs Done
3,044,042 UART: [art] Lock RT PCRs Done
3,045,704 UART: [art] Populate DV Done
3,053,911 UART: [fht] FMC Alias Private Key: 7
3,055,055 UART: [art] Derive CDI
3,055,335 UART: [art] Store in slot 0x4
3,141,666 UART: [art] Derive Key Pair
3,142,026 UART: [art] Store priv key in slot 0x5
3,154,718 UART: [art] Derive Key Pair - Done
3,169,588 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,167 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,932 UART: [art] PUB.X = 484B505372FAC97B56B527E82B7B6253050A9159C6096C86F259ED99E4CF24A3DF883C59A51C1AEC97E7187BAB54BE1B
3,192,699 UART: [art] PUB.Y = 52680E0430845584D7F41B108458536AB68B2CF090E80595A79150AA340D51C0B706EF6329722C7C3F8FBC944B86EEF9
3,199,628 UART: [art] SIG.R = 956D7EADAF6C509CAB2507C1EA33E84CDA6D1D25707581672224B0D225298A92E42F8CDCD521BA04676A45391BB82C36
3,206,398 UART: [art] SIG.S = 0BC59A007801D52AC37E8CA51D5E09F63CF0F152DC8C1CFA5DEB13A31EA0625276582669062F496902E590127259D113
3,230,431 UART: Caliptra RT
3,230,774 UART: [state] CFI Enabled
3,350,361 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,209 UART: [rt]cmd =0x54514754, len=24
3,383,528 >>> mbox cmd response data (8 bytes)
3,383,529 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,028 UART: [rt]cmd =0x54514754, len=24
3,415,267 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,479 ready_for_fw is high
1,059,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,967 >>> mbox cmd response: success
2,678,967 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,302 UART:
2,741,318 UART: Running Caliptra FMC ...
2,741,726 UART:
2,741,869 UART: [state] CFI Enabled
2,752,529 UART: [fht] FMC Alias Private Key: 7
2,871,197 UART: [art] Extend RT PCRs Done
2,871,625 UART: [art] Lock RT PCRs Done
2,873,337 UART: [art] Populate DV Done
2,881,642 UART: [fht] FMC Alias Private Key: 7
2,882,746 UART: [art] Derive CDI
2,883,026 UART: [art] Store in slot 0x4
2,968,947 UART: [art] Derive Key Pair
2,969,307 UART: [art] Store priv key in slot 0x5
2,982,805 UART: [art] Derive Key Pair - Done
2,997,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,873 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,638 UART: [art] PUB.X = 0121519CB62FE0E09243C07807D755A0B986A285FADBBAD414974A3AD5D292A707C98476EC6ABCA6A5130C2043F514E2
3,020,400 UART: [art] PUB.Y = D5D8BC17C646168595A6B72D0E30E672A1A9DF8BE9FD8C521F3591D21E5A76BB54D7880195A5AE2BF401F310F3C70C48
3,027,346 UART: [art] SIG.R = 8548D72D144F87C0951B76315A9354988F1311DED22AA880422E0CDC0F04E7D200AD938F084515AC723F9BABAF54F7C8
3,034,084 UART: [art] SIG.S = 916178F69D13DC54D3CA86E42C71E5A6FE031F5019164E608755A2CA7FEB110F1EE366AD027AB7B2637327E792CB3BB2
3,057,629 UART: Caliptra RT
3,057,972 UART: [state] CFI Enabled
3,177,844 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,470 UART: [rt]cmd =0x54514754, len=24
3,210,511 >>> mbox cmd response data (8 bytes)
3,210,512 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,031 UART: [rt]cmd =0x54514754, len=24
3,242,056 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,307 UART: [state] WD Timer not started. Device not locked for debugging
87,562 UART: [kat] SHA2-256
893,212 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,337 UART: [kat] ++
897,489 UART: [kat] sha1
901,849 UART: [kat] SHA2-256
903,789 UART: [kat] SHA2-384
906,596 UART: [kat] SHA2-512-ACC
908,497 UART: [kat] ECC-384
918,340 UART: [kat] HMAC-384Kdf
922,806 UART: [kat] LMS
1,171,134 UART: [kat] --
1,172,227 UART: [cold-reset] ++
1,172,685 UART: [fht] FHT @ 0x50003400
1,175,494 UART: [idev] ++
1,175,662 UART: [idev] CDI.KEYID = 6
1,176,022 UART: [idev] SUBJECT.KEYID = 7
1,176,446 UART: [idev] UDS.KEYID = 0
1,176,791 ready_for_fw is high
1,176,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,444 UART: [idev] Erasing UDS.KEYID = 0
1,201,377 UART: [idev] Sha1 KeyId Algorithm
1,209,873 UART: [idev] --
1,211,079 UART: [ldev] ++
1,211,247 UART: [ldev] CDI.KEYID = 6
1,211,610 UART: [ldev] SUBJECT.KEYID = 5
1,212,036 UART: [ldev] AUTHORITY.KEYID = 7
1,212,499 UART: [ldev] FE.KEYID = 1
1,217,451 UART: [ldev] Erasing FE.KEYID = 1
1,243,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,578 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,685 UART: [ldev] --
1,283,108 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,077 >>> mbox cmd response: success
2,828,077 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,253 UART: [afmc] ++
2,829,421 UART: [afmc] CDI.KEYID = 6
2,829,783 UART: [afmc] SUBJECT.KEYID = 7
2,830,208 UART: [afmc] AUTHORITY.KEYID = 5
2,865,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,864 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,612 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,321 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,204 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,905 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,771 UART: [afmc] --
2,908,805 UART: [cold-reset] --
2,909,727 UART: [state] Locking Datavault
2,910,780 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,384 UART: [state] Locking ICCM
2,912,044 UART: [exit] Launching FMC @ 0x40000130
2,917,374 UART:
2,917,390 UART: Running Caliptra FMC ...
2,917,798 UART:
2,917,852 UART: [state] CFI Enabled
2,928,052 UART: [fht] FMC Alias Private Key: 7
3,047,384 UART: [art] Extend RT PCRs Done
3,047,812 UART: [art] Lock RT PCRs Done
3,049,390 UART: [art] Populate DV Done
3,057,997 UART: [fht] FMC Alias Private Key: 7
3,059,087 UART: [art] Derive CDI
3,059,367 UART: [art] Store in slot 0x4
3,145,522 UART: [art] Derive Key Pair
3,145,882 UART: [art] Store priv key in slot 0x5
3,159,126 UART: [art] Derive Key Pair - Done
3,173,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,447 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,212 UART: [art] PUB.X = 5A086BC4AE30CC3C5C9569947C59970C201B3296288FCD832F4159AD65596F4B150B2489020939990ADA3BA06F73D757
3,196,958 UART: [art] PUB.Y = 2CE229C841E8FF81DFD8C8B1C03FCD268500893795842F6C4B11DC117C7B42A40183990D425D1E67CD387B0B7CAE3E22
3,203,883 UART: [art] SIG.R = 984F87E00B76B3403B6A2ABE78D1CBDEDEF70ED2C63FEE7F48170C49E54AA83F3506601AF2D97224FC4988BC75BE0EAB
3,210,658 UART: [art] SIG.S = A8C33C18D55192E458AFDDC932CBF2D5F8F00D7B0F1C100F6024CFB887F155930857CB44702C7C9EF72B568567C3AECE
3,234,630 UART: Caliptra RT
3,234,881 UART: [state] CFI Enabled
3,354,443 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,085 UART: [rt]cmd =0x54514754, len=24
3,387,050 >>> mbox cmd response data (8 bytes)
3,387,051 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,620 UART: [rt]cmd =0x54514754, len=24
3,418,483 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,041 ready_for_fw is high
1,060,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,348 >>> mbox cmd response: success
2,680,348 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,511 UART:
2,741,527 UART: Running Caliptra FMC ...
2,741,935 UART:
2,741,989 UART: [state] CFI Enabled
2,752,689 UART: [fht] FMC Alias Private Key: 7
2,871,327 UART: [art] Extend RT PCRs Done
2,871,755 UART: [art] Lock RT PCRs Done
2,873,247 UART: [art] Populate DV Done
2,881,674 UART: [fht] FMC Alias Private Key: 7
2,882,650 UART: [art] Derive CDI
2,882,930 UART: [art] Store in slot 0x4
2,968,619 UART: [art] Derive Key Pair
2,968,979 UART: [art] Store priv key in slot 0x5
2,982,045 UART: [art] Derive Key Pair - Done
2,996,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,377 UART: [art] PUB.X = CFFCE596501AE3D2DEB380AE6C928847EDA0F620CCB1D366E7710F9648600B719B10914F81F19796AFFBAFB28EBA2D42
3,020,157 UART: [art] PUB.Y = D51BF75D094B612D233CEE44698F53D5C60594012CD8EBEFA9092D9FE5BD5763B616B1681D8A459C844BBFBB5DCFBB3C
3,027,113 UART: [art] SIG.R = 91294C30A3F7A63C7029AF2C206A58F2BF15E02659631BAB9F6B9D1F755D07E9D7AFDBEFAE81F02A0A24FC2D7BB31A71
3,033,895 UART: [art] SIG.S = AFE1C686616384E9A26F187C5807B42335E4B20C2FDF6FFA81039DF74127DCCE568C056C2302B350BA97B91D1DF8E169
3,057,170 UART: Caliptra RT
3,057,421 UART: [state] CFI Enabled
3,177,095 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,679 UART: [rt]cmd =0x54514754, len=24
3,209,930 >>> mbox cmd response data (8 bytes)
3,209,931 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,618 UART: [rt]cmd =0x54514754, len=24
3,241,597 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,051 UART: [state] LifecycleState = Unprovisioned
86,706 UART: [state] DebugLocked = No
87,386 UART: [state] WD Timer not started. Device not locked for debugging
88,567 UART: [kat] SHA2-256
894,217 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,342 UART: [kat] ++
898,494 UART: [kat] sha1
902,922 UART: [kat] SHA2-256
904,862 UART: [kat] SHA2-384
907,507 UART: [kat] SHA2-512-ACC
909,408 UART: [kat] ECC-384
919,611 UART: [kat] HMAC-384Kdf
924,435 UART: [kat] LMS
1,172,763 UART: [kat] --
1,173,802 UART: [cold-reset] ++
1,174,156 UART: [fht] FHT @ 0x50003400
1,176,735 UART: [idev] ++
1,176,903 UART: [idev] CDI.KEYID = 6
1,177,263 UART: [idev] SUBJECT.KEYID = 7
1,177,687 UART: [idev] UDS.KEYID = 0
1,178,032 ready_for_fw is high
1,178,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,047 UART: [idev] Erasing UDS.KEYID = 0
1,202,692 UART: [idev] Sha1 KeyId Algorithm
1,211,094 UART: [idev] --
1,212,070 UART: [ldev] ++
1,212,238 UART: [ldev] CDI.KEYID = 6
1,212,601 UART: [ldev] SUBJECT.KEYID = 5
1,213,027 UART: [ldev] AUTHORITY.KEYID = 7
1,213,490 UART: [ldev] FE.KEYID = 1
1,218,998 UART: [ldev] Erasing FE.KEYID = 1
1,246,219 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,271,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,277,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,284,060 UART: [ldev] --
1,285,349 UART: [fwproc] Wait for Commands...
1,286,107 UART: [fwproc] Recv command 0x46574c44
1,286,835 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,545 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,715 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,982 >>> mbox cmd response: success
2,828,982 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,830,074 UART: [afmc] ++
2,830,242 UART: [afmc] CDI.KEYID = 6
2,830,604 UART: [afmc] SUBJECT.KEYID = 7
2,831,029 UART: [afmc] AUTHORITY.KEYID = 5
2,866,620 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,105 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,853 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,445 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,146 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,854 UART: [afmc] --
2,909,956 UART: [cold-reset] --
2,910,562 UART: [state] Locking Datavault
2,911,975 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,579 UART: [state] Locking ICCM
2,913,247 UART: [exit] Launching FMC @ 0x40000130
2,918,577 UART:
2,918,593 UART: Running Caliptra FMC ...
2,919,001 UART:
2,919,144 UART: [state] CFI Enabled
2,930,160 UART: [fht] FMC Alias Private Key: 7
3,049,684 UART: [art] Extend RT PCRs Done
3,050,112 UART: [art] Lock RT PCRs Done
3,051,364 UART: [art] Populate DV Done
3,059,725 UART: [fht] FMC Alias Private Key: 7
3,060,765 UART: [art] Derive CDI
3,061,045 UART: [art] Store in slot 0x4
3,146,682 UART: [art] Derive Key Pair
3,147,042 UART: [art] Store priv key in slot 0x5
3,159,756 UART: [art] Derive Key Pair - Done
3,174,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,667 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,432 UART: [art] PUB.X = F94BE45C69EE83B5FDB8DC1C20458F7A41030ED9B260428CD4B7DAB25F6C8F72913DA72E70705B4BE040A0611BD75763
3,197,206 UART: [art] PUB.Y = 3AC39F757CC4A3DBC35F2550E98270F72F605A1CB95DD7B26EAE84262AE3C1C7DBF435F177E8239B6AD8D0CF7C3D6CE5
3,204,176 UART: [art] SIG.R = 47E2B6204CC8303C39AFA2F2904EFC2CA710DCB0DCFF7CEC675F5D75567D48A55A70780F3633BE3DA93092B51BB22FAD
3,210,961 UART: [art] SIG.S = 86A3B25B0B1F8D9D7915F32E923B6B5AEE361D41529ABDBEF0D271A55EB083FF7E7227DA6948790DD2BB64C99250C8D3
3,234,411 UART: Caliptra RT
3,234,754 UART: [state] CFI Enabled
3,355,331 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,137 UART: [rt]cmd =0x54514754, len=24
3,388,506 >>> mbox cmd response data (8 bytes)
3,388,507 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,990 UART: [rt]cmd =0x54514754, len=24
3,419,941 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,960 ready_for_fw is high
1,060,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,103 >>> mbox cmd response: success
2,682,103 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,744,310 UART:
2,744,326 UART: Running Caliptra FMC ...
2,744,734 UART:
2,744,877 UART: [state] CFI Enabled
2,755,351 UART: [fht] FMC Alias Private Key: 7
2,874,775 UART: [art] Extend RT PCRs Done
2,875,203 UART: [art] Lock RT PCRs Done
2,876,769 UART: [art] Populate DV Done
2,885,118 UART: [fht] FMC Alias Private Key: 7
2,886,180 UART: [art] Derive CDI
2,886,460 UART: [art] Store in slot 0x4
2,972,071 UART: [art] Derive Key Pair
2,972,431 UART: [art] Store priv key in slot 0x5
2,986,673 UART: [art] Derive Key Pair - Done
3,001,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,105 UART: [art] Erasing AUTHORITY.KEYID = 7
3,017,870 UART: [art] PUB.X = 41D7518D1495FD46D2CD379E1E03E2E140D497E0256B01BCD77140BE7B30738BBF6BA3DC6BDEC5E9B3B098D426028425
3,024,639 UART: [art] PUB.Y = C0FF4D7E0E32F15B41CA1682BABB3C5BFF44792436AC7C8DC8E304E10DC86624466AC7CD8B2CA1EADD3CB0BCD134C1A7
3,031,608 UART: [art] SIG.R = DBE2F8B211971DECFFF01C38BE9AE530574AEDA970476EB579C355F232DDE17F29A9D1474200926B5CCE3F15B67D0881
3,038,365 UART: [art] SIG.S = CC009872B259AA3CFB85790488B6811FDE916C8014CB968459FBEF7B92387664CDE0F282015172CA6617793843A45227
3,061,713 UART: Caliptra RT
3,062,056 UART: [state] CFI Enabled
3,181,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,212,308 UART: [rt]cmd =0x54514754, len=24
3,214,269 >>> mbox cmd response data (8 bytes)
3,214,270 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,243,973 UART: [rt]cmd =0x54514754, len=24
3,245,816 >>> mbox cmd response: failed
test test_tagging::test_tagging_a_tagged_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,192 UART:
192,536 UART: Running Caliptra ROM ...
193,728 UART:
193,884 UART: [state] CFI Enabled
265,411 UART: [state] LifecycleState = Unprovisioned
267,335 UART: [state] DebugLocked = No
270,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,026 UART: [kat] SHA2-256
443,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,275 UART: [kat] ++
454,729 UART: [kat] sha1
466,172 UART: [kat] SHA2-256
468,908 UART: [kat] SHA2-384
475,041 UART: [kat] SHA2-512-ACC
477,413 UART: [kat] ECC-384
2,767,389 UART: [kat] HMAC-384Kdf
2,780,066 UART: [kat] LMS
3,970,364 UART: [kat] --
3,974,505 UART: [cold-reset] ++
3,976,438 UART: [fht] Storing FHT @ 0x50003400
3,987,986 UART: [idev] ++
3,988,619 UART: [idev] CDI.KEYID = 6
3,989,545 UART: [idev] SUBJECT.KEYID = 7
3,990,788 UART: [idev] UDS.KEYID = 0
3,991,871 ready_for_fw is high
3,992,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,658 UART: [idev] Erasing UDS.KEYID = 0
7,328,648 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,431 UART: [idev] --
7,354,453 UART: [ldev] ++
7,355,022 UART: [ldev] CDI.KEYID = 6
7,355,992 UART: [ldev] SUBJECT.KEYID = 5
7,357,206 UART: [ldev] AUTHORITY.KEYID = 7
7,358,567 UART: [ldev] FE.KEYID = 1
7,403,786 UART: [ldev] Erasing FE.KEYID = 1
10,736,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,507 UART: [ldev] --
13,097,853 UART: [fwproc] Waiting for Commands...
13,100,919 UART: [fwproc] Received command 0x46574c44
13,103,101 UART: [fwproc] Received Image of size 118548 bytes
17,203,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,282,487 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,355,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,684,466 >>> mbox cmd response: success
17,685,574 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,689,347 UART: [afmc] ++
17,689,926 UART: [afmc] CDI.KEYID = 6
17,690,835 UART: [afmc] SUBJECT.KEYID = 7
17,692,105 UART: [afmc] AUTHORITY.KEYID = 5
21,055,049 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,286 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,545 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,369,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,765 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,169 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,371 UART: [afmc] --
23,422,560 UART: [cold-reset] --
23,426,526 UART: [state] Locking Datavault
23,430,150 UART: [state] Locking PCR0, PCR1 and PCR31
23,431,905 UART: [state] Locking ICCM
23,434,221 UART: [exit] Launching FMC @ 0x40000130
23,442,628 UART:
23,442,937 UART: Running Caliptra FMC ...
23,444,000 UART:
23,444,166 UART: [state] CFI Enabled
23,514,161 UART: [fht] FMC Alias Private Key: 7
25,854,431 UART: [art] Extend RT PCRs Done
25,855,651 UART: [art] Lock RT PCRs Done
25,857,349 UART: [art] Populate DV Done
25,862,765 UART: [fht] FMC Alias Private Key: 7
25,864,366 UART: [art] Derive CDI
25,865,182 UART: [art] Store in slot 0x4
25,923,120 UART: [art] Derive Key Pair
25,924,150 UART: [art] Store priv key in slot 0x5
29,216,958 UART: [art] Derive Key Pair - Done
29,229,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,518,383 UART: [art] Erasing AUTHORITY.KEYID = 7
31,519,893 UART: [art] PUB.X = 9AA401CD66BAD66AA3DB4BA36EC8347DD72380569F8B0F52119D9A6E46BECADA64FB114F6D87B740BB68C70EC52BDDE9
31,527,192 UART: [art] PUB.Y = 77ED9FECFAC16212BEF4AC2A5A2FD9EA848D195C6F76C364A91C9E17EEBF33F5E72107EAA38112D0D97BC4694AD04602
31,534,468 UART: [art] SIG.R = 762A67753BA10224799388F4DAA13E2C4822052CB3A45F0D98C6E96A516F9C718432A95BFF53143DB8A977921DD71877
31,541,794 UART: [art] SIG.S = 45BF7124591B1D6DCAF2EEF522BBA9B33BA690DA7E182E7F3F717A62837F7E53B8F761B2ECF74BDD22B4C184A7773E9D
32,847,335 UART: Caliptra RT
32,848,049 UART: [state] CFI Enabled
33,023,180 UART: [rt] RT listening for mailbox commands...
33,054,549 UART: [rt]cmd =0x54514754, len=24
33,057,277 >>> mbox cmd response data (8 bytes)
33,057,723 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,087,702 UART: [rt]cmd =0x47544744, len=8
33,090,584 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,806,009 ready_for_fw is high
3,806,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,960,894 >>> mbox cmd response: success
17,962,019 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,653,063 UART:
23,653,447 UART: Running Caliptra FMC ...
23,654,658 UART:
23,654,827 UART: [state] CFI Enabled
23,723,117 UART: [fht] FMC Alias Private Key: 7
26,062,759 UART: [art] Extend RT PCRs Done
26,063,978 UART: [art] Lock RT PCRs Done
26,065,338 UART: [art] Populate DV Done
26,070,543 UART: [fht] FMC Alias Private Key: 7
26,072,116 UART: [art] Derive CDI
26,072,868 UART: [art] Store in slot 0x4
26,131,027 UART: [art] Derive Key Pair
26,132,029 UART: [art] Store priv key in slot 0x5
29,424,587 UART: [art] Derive Key Pair - Done
29,437,526 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,618 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,133 UART: [art] PUB.X = 3EB5FFD246E55983B965C83189E723FD53CD2AFD94796A7B86EF68CD54E3174D652294EAB486074BC59F0DF70C5B8232
31,734,377 UART: [art] PUB.Y = 13D2FCBAD74E214879F87451AB1862DD8373AF63FCA669778A9D833647D74B7B53306BE76AE712B045D4410E1865990B
31,741,649 UART: [art] SIG.R = 6E95FE62A8CC8CC5D27BD2436CB5A06E0FEE16C5A557AD80FED73EA64E1067CAF37031E904E6DE3031D85B0C25B0A8B4
31,749,042 UART: [art] SIG.S = 7AEA8FFF8F2B2ED6520C6140757676A73F2B7ECBBAB17CC481418F1F42F6927A733C7B8D14922C5F108F7B37C08351C8
33,054,454 UART: Caliptra RT
33,055,175 UART: [state] CFI Enabled
33,231,135 UART: [rt] RT listening for mailbox commands...
33,262,931 UART: [rt]cmd =0x54514754, len=24
33,265,476 >>> mbox cmd response data (8 bytes)
33,265,888 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,295,499 UART: [rt]cmd =0x47544744, len=8
33,298,405 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,435 UART:
192,811 UART: Running Caliptra ROM ...
193,895 UART:
603,748 UART: [state] CFI Enabled
616,652 UART: [state] LifecycleState = Unprovisioned
618,587 UART: [state] DebugLocked = No
621,254 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,401 UART: [kat] SHA2-256
795,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,658 UART: [kat] ++
806,176 UART: [kat] sha1
817,414 UART: [kat] SHA2-256
820,129 UART: [kat] SHA2-384
826,340 UART: [kat] SHA2-512-ACC
828,707 UART: [kat] ECC-384
3,112,320 UART: [kat] HMAC-384Kdf
3,123,057 UART: [kat] LMS
4,313,132 UART: [kat] --
4,315,442 UART: [cold-reset] ++
4,316,940 UART: [fht] Storing FHT @ 0x50003400
4,328,849 UART: [idev] ++
4,329,407 UART: [idev] CDI.KEYID = 6
4,330,429 UART: [idev] SUBJECT.KEYID = 7
4,331,595 UART: [idev] UDS.KEYID = 0
4,332,583 ready_for_fw is high
4,332,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,772 UART: [idev] Erasing UDS.KEYID = 0
7,621,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,749 UART: [idev] --
7,646,910 UART: [ldev] ++
7,647,477 UART: [ldev] CDI.KEYID = 6
7,648,485 UART: [ldev] SUBJECT.KEYID = 5
7,649,635 UART: [ldev] AUTHORITY.KEYID = 7
7,650,908 UART: [ldev] FE.KEYID = 1
7,663,060 UART: [ldev] Erasing FE.KEYID = 1
10,952,058 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,288 UART: [ldev] --
13,311,511 UART: [fwproc] Waiting for Commands...
13,313,112 UART: [fwproc] Received command 0x46574c44
13,315,288 UART: [fwproc] Received Image of size 118548 bytes
17,425,268 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,315 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,451 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,601 >>> mbox cmd response: success
17,901,690 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,904,844 UART: [afmc] ++
17,905,431 UART: [afmc] CDI.KEYID = 6
17,906,313 UART: [afmc] SUBJECT.KEYID = 7
17,907,577 UART: [afmc] AUTHORITY.KEYID = 5
21,215,482 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,467 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,529,150 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,852 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,558,257 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,862 UART: [afmc] --
23,584,163 UART: [cold-reset] --
23,588,830 UART: [state] Locking Datavault
23,594,498 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,244 UART: [state] Locking ICCM
23,597,771 UART: [exit] Launching FMC @ 0x40000130
23,606,154 UART:
23,606,381 UART: Running Caliptra FMC ...
23,607,402 UART:
23,607,545 UART: [state] CFI Enabled
23,615,851 UART: [fht] FMC Alias Private Key: 7
25,956,295 UART: [art] Extend RT PCRs Done
25,957,518 UART: [art] Lock RT PCRs Done
25,959,056 UART: [art] Populate DV Done
25,964,467 UART: [fht] FMC Alias Private Key: 7
25,966,056 UART: [art] Derive CDI
25,966,813 UART: [art] Store in slot 0x4
26,009,357 UART: [art] Derive Key Pair
26,010,364 UART: [art] Store priv key in slot 0x5
29,252,522 UART: [art] Derive Key Pair - Done
29,265,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,580 UART: [art] Erasing AUTHORITY.KEYID = 7
31,547,345 UART: [art] PUB.X = 93141181BE4D791FFA15758A267818C52F37893522A81B28E2630DFB9665ADD4B800CFF5FAEFDAB10F14CD34877EC2CC
31,554,371 UART: [art] PUB.Y = 5380A4152C5C60D8BE001996D9953CD0E562A33C1A5C8EBA44FCA4A00B932960F1842BBD96A887C4CA5B2EAEB6074821
31,561,603 UART: [art] SIG.R = 79BB87DF94559FACAE881F1BA0CC949D23335826DDAB3E5AF685AF5B7EFF6B0374EB961A346111C13404A9499F3B098B
31,569,042 UART: [art] SIG.S = 8D7396C22ACA97429AD56F1B8A25A91FAA03FD6FE4DE7F30320A825C27DD385804E3E787F0CADD963CFD10159EA64E9E
32,874,482 UART: Caliptra RT
32,875,189 UART: [state] CFI Enabled
33,008,583 UART: [rt] RT listening for mailbox commands...
33,039,955 UART: [rt]cmd =0x54514754, len=24
33,042,923 >>> mbox cmd response data (8 bytes)
33,043,530 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,073,331 UART: [rt]cmd =0x47544744, len=8
33,076,583 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
4,122,967 ready_for_fw is high
4,123,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,944 >>> mbox cmd response: success
18,159,038 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,797,274 UART:
23,797,676 UART: Running Caliptra FMC ...
23,798,803 UART:
23,798,960 UART: [state] CFI Enabled
23,806,920 UART: [fht] FMC Alias Private Key: 7
26,147,534 UART: [art] Extend RT PCRs Done
26,148,771 UART: [art] Lock RT PCRs Done
26,150,208 UART: [art] Populate DV Done
26,155,624 UART: [fht] FMC Alias Private Key: 7
26,157,269 UART: [art] Derive CDI
26,158,002 UART: [art] Store in slot 0x4
26,200,761 UART: [art] Derive Key Pair
26,201,802 UART: [art] Store priv key in slot 0x5
29,443,714 UART: [art] Derive Key Pair - Done
29,456,604 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,199 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,709 UART: [art] PUB.X = AC1998219AC1E23A3F3BE086BB7CD4682F2DB5EAC1EB62D2E46393B2BA91230652D77F49342DEF2A9A1D2CBC09CE2EBC
31,746,009 UART: [art] PUB.Y = F56A4475F2D26FFDF1535A5CA67419DA2ECCF1F76B1ABE3AAD9903CE5512C0B62628347622571FAE6A82E9BD6B0256E1
31,753,268 UART: [art] SIG.R = 404FCA9B58C8C8265066E821525F7FB46DE154BA96CB878C83EF87B005EB798A98E7D282A67848C7DE52A07771F656FB
31,760,671 UART: [art] SIG.S = 40E6236C58499DA79EF3E9EF8A03BB0425C498ED75F209B59BB0B54F21CE802F95EC457CA3D3BDBAA89B2810712C9745
33,065,968 UART: Caliptra RT
33,066,677 UART: [state] CFI Enabled
33,199,407 UART: [rt] RT listening for mailbox commands...
33,231,087 UART: [rt]cmd =0x54514754, len=24
33,233,702 >>> mbox cmd response data (8 bytes)
33,234,205 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,264,192 UART: [rt]cmd =0x47544744, len=8
33,267,273 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,217 UART:
192,606 UART: Running Caliptra ROM ...
193,738 UART:
193,885 UART: [state] CFI Enabled
264,138 UART: [state] LifecycleState = Unprovisioned
266,058 UART: [state] DebugLocked = No
268,099 UART: [state] WD Timer not started. Device not locked for debugging
271,430 UART: [kat] SHA2-256
451,121 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,856 UART: [kat] ++
462,371 UART: [kat] sha1
472,031 UART: [kat] SHA2-256
474,752 UART: [kat] SHA2-384
481,185 UART: [kat] SHA2-512-ACC
483,550 UART: [kat] ECC-384
2,948,448 UART: [kat] HMAC-384Kdf
2,972,542 UART: [kat] LMS
3,449,093 UART: [kat] --
3,453,588 UART: [cold-reset] ++
3,455,159 UART: [fht] FHT @ 0x50003400
3,467,421 UART: [idev] ++
3,468,020 UART: [idev] CDI.KEYID = 6
3,468,935 UART: [idev] SUBJECT.KEYID = 7
3,470,178 UART: [idev] UDS.KEYID = 0
3,471,222 ready_for_fw is high
3,471,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,574 UART: [idev] Erasing UDS.KEYID = 0
5,987,603 UART: [idev] Sha1 KeyId Algorithm
6,011,064 UART: [idev] --
6,015,790 UART: [ldev] ++
6,016,418 UART: [ldev] CDI.KEYID = 6
6,017,480 UART: [ldev] SUBJECT.KEYID = 5
6,018,586 UART: [ldev] AUTHORITY.KEYID = 7
6,019,966 UART: [ldev] FE.KEYID = 1
6,059,099 UART: [ldev] Erasing FE.KEYID = 1
8,565,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,022 UART: [ldev] --
10,375,443 UART: [fwproc] Wait for Commands...
10,377,915 UART: [fwproc] Recv command 0x46574c44
10,379,945 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,539 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,579 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,337,335 >>> mbox cmd response: success
14,338,536 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,341,813 UART: [afmc] ++
14,342,424 UART: [afmc] CDI.KEYID = 6
14,343,314 UART: [afmc] SUBJECT.KEYID = 7
14,344,527 UART: [afmc] AUTHORITY.KEYID = 5
16,871,997 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,598,154 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,600,384 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,616,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,632,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,647,798 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,323 UART: [afmc] --
18,675,435 UART: [cold-reset] --
18,678,445 UART: [state] Locking Datavault
18,684,983 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,734 UART: [state] Locking ICCM
18,687,883 UART: [exit] Launching FMC @ 0x40000130
18,696,271 UART:
18,696,500 UART: Running Caliptra FMC ...
18,697,605 UART:
18,697,755 UART: [state] CFI Enabled
18,753,396 UART: [fht] FMC Alias Private Key: 7
20,519,536 UART: [art] Extend RT PCRs Done
20,520,734 UART: [art] Lock RT PCRs Done
20,522,727 UART: [art] Populate DV Done
20,528,020 UART: [fht] FMC Alias Private Key: 7
20,529,772 UART: [art] Derive CDI
20,530,582 UART: [art] Store in slot 0x4
20,586,014 UART: [art] Derive Key Pair
20,587,077 UART: [art] Store priv key in slot 0x5
23,049,764 UART: [art] Derive Key Pair - Done
23,062,543 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,775,551 UART: [art] Erasing AUTHORITY.KEYID = 7
24,777,066 UART: [art] PUB.X = B9B86AD0465CF89930E1FA8B07DC67ACA6222BDBCB9351395859F68DD62CF530CAC6A6D9BB918E6BA27758AB9DA641FA
24,784,328 UART: [art] PUB.Y = E50500DE46E020ADA306A92CB882A2BE00F3134E42C8E9B72908789988F008A769F23105CE437BEA9FBA53FFBAE6EA0F
24,791,552 UART: [art] SIG.R = 2D9021C6B8A4D274F264F21863762352107626AD5766AB3AF4F7105D808C89C0D5063EB59A1F588723E14356E9FA7520
24,798,939 UART: [art] SIG.S = 8ED24A2A9331E5F6186523DED27C8A6D809E1206DBC47E1051107BD97614DBB317E3FEDC7BB98D7B100B3304FAA076D5
25,776,994 UART: Caliptra RT
25,777,708 UART: [state] CFI Enabled
25,959,551 UART: [rt] RT listening for mailbox commands...
25,991,028 UART: [rt]cmd =0x54514754, len=24
25,993,663 >>> mbox cmd response data (8 bytes)
25,994,200 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,024,208 UART: [rt]cmd =0x47544744, len=8
26,027,109 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,464,433 ready_for_fw is high
3,464,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,193,476 >>> mbox cmd response: success
14,195,001 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,474,422 UART:
18,474,809 UART: Running Caliptra FMC ...
18,475,914 UART:
18,476,064 UART: [state] CFI Enabled
18,543,864 UART: [fht] FMC Alias Private Key: 7
20,310,609 UART: [art] Extend RT PCRs Done
20,311,837 UART: [art] Lock RT PCRs Done
20,313,434 UART: [art] Populate DV Done
20,318,635 UART: [fht] FMC Alias Private Key: 7
20,320,174 UART: [art] Derive CDI
20,320,940 UART: [art] Store in slot 0x4
20,376,932 UART: [art] Derive Key Pair
20,377,972 UART: [art] Store priv key in slot 0x5
22,840,831 UART: [art] Derive Key Pair - Done
22,853,877 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,566,720 UART: [art] Erasing AUTHORITY.KEYID = 7
24,568,224 UART: [art] PUB.X = 22B5C4F0FC8D9090AFA033DEF7FC0F89B7F43B2B3B8744FA48CFB26229C22A4FB210A8DBD989212AFB46D81120B3E91C
24,575,529 UART: [art] PUB.Y = 274653E422268BE029054DBEB34AC3682FF286C05931AD71FAD4A725671821E002164E8E55F2EAA84AACCA8AD4AE8504
24,582,783 UART: [art] SIG.R = 7CA0202036C48F6E21D682FEF4FFB4ADD44A499B75368FBE572B89DF9019EC32B851DD4C14A2DEED8FAC91ECCE2ECAFC
24,590,179 UART: [art] SIG.S = 703C45FDAD84AA715B8C252F0A8B14A5C352C9168AFD6E332DDC719FDDA49357B60CD7EFE701ED1E02CEFF46F3E866EF
25,569,065 UART: Caliptra RT
25,569,804 UART: [state] CFI Enabled
25,751,489 UART: [rt] RT listening for mailbox commands...
25,783,018 UART: [rt]cmd =0x54514754, len=24
25,785,818 >>> mbox cmd response data (8 bytes)
25,786,251 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,815,922 UART: [rt]cmd =0x47544744, len=8
25,818,778 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
192,472 UART:
192,996 UART: Running Caliptra ROM ...
194,091 UART:
603,763 UART: [state] CFI Enabled
615,096 UART: [state] LifecycleState = Unprovisioned
617,055 UART: [state] DebugLocked = No
618,309 UART: [state] WD Timer not started. Device not locked for debugging
622,781 UART: [kat] SHA2-256
802,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,208 UART: [kat] ++
813,689 UART: [kat] sha1
824,854 UART: [kat] SHA2-256
827,577 UART: [kat] SHA2-384
834,156 UART: [kat] SHA2-512-ACC
836,590 UART: [kat] ECC-384
3,277,910 UART: [kat] HMAC-384Kdf
3,290,848 UART: [kat] LMS
3,767,354 UART: [kat] --
3,773,193 UART: [cold-reset] ++
3,774,913 UART: [fht] FHT @ 0x50003400
3,786,034 UART: [idev] ++
3,786,603 UART: [idev] CDI.KEYID = 6
3,787,636 UART: [idev] SUBJECT.KEYID = 7
3,788,812 UART: [idev] UDS.KEYID = 0
3,789,740 ready_for_fw is high
3,789,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,794 UART: [idev] Erasing UDS.KEYID = 0
6,263,744 UART: [idev] Sha1 KeyId Algorithm
6,287,290 UART: [idev] --
6,290,992 UART: [ldev] ++
6,291,594 UART: [ldev] CDI.KEYID = 6
6,292,511 UART: [ldev] SUBJECT.KEYID = 5
6,293,670 UART: [ldev] AUTHORITY.KEYID = 7
6,294,959 UART: [ldev] FE.KEYID = 1
6,306,905 UART: [ldev] Erasing FE.KEYID = 1
8,781,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,499,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,546,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,567,869 UART: [ldev] --
10,573,292 UART: [fwproc] Wait for Commands...
10,576,527 UART: [fwproc] Recv command 0x46574c44
10,578,514 UART: [fwproc] Recv'd Img size: 118548 bytes
14,059,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,138,573 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,211,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,539,410 >>> mbox cmd response: success
14,540,700 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,544,164 UART: [afmc] ++
14,544,751 UART: [afmc] CDI.KEYID = 6
14,545,690 UART: [afmc] SUBJECT.KEYID = 7
14,546,906 UART: [afmc] AUTHORITY.KEYID = 5
17,055,634 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,778,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,780,741 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,796,574 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,812,648 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,828,235 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,851,781 UART: [afmc] --
18,854,960 UART: [cold-reset] --
18,858,289 UART: [state] Locking Datavault
18,862,804 UART: [state] Locking PCR0, PCR1 and PCR31
18,864,563 UART: [state] Locking ICCM
18,867,014 UART: [exit] Launching FMC @ 0x40000130
18,875,426 UART:
18,875,662 UART: Running Caliptra FMC ...
18,876,693 UART:
18,876,842 UART: [state] CFI Enabled
18,885,162 UART: [fht] FMC Alias Private Key: 7
20,651,735 UART: [art] Extend RT PCRs Done
20,652,950 UART: [art] Lock RT PCRs Done
20,654,552 UART: [art] Populate DV Done
20,659,752 UART: [fht] FMC Alias Private Key: 7
20,661,399 UART: [art] Derive CDI
20,662,218 UART: [art] Store in slot 0x4
20,704,550 UART: [art] Derive Key Pair
20,705,595 UART: [art] Store priv key in slot 0x5
23,132,003 UART: [art] Derive Key Pair - Done
23,145,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,657 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,166 UART: [art] PUB.X = 85309EEDD57DC741C61DA00641E07AFBED9CA54420F113FFAD3838AFFECE64A0C2C2B0ADE24F43549F5D3911153CDA04
24,860,470 UART: [art] PUB.Y = DFA295D2772632DF3C7B2B308367680AA4890C206A0C4F14D164F9E7DC365C0AE8B69178902BC13FA7746B848A7F56B8
24,867,709 UART: [art] SIG.R = D147C233F24E4BA1597D75806179163929ACC8A7D1D0704BE872454B96431BE997417693CE005583765C104A03BB0E7D
24,875,044 UART: [art] SIG.S = E7B139AEC657B81BE491B603BA498A15DC98ACA2BDC6301AF2D5971030E7B1022293FD4F899838E8DA6072AECD1A5267
25,853,970 UART: Caliptra RT
25,854,656 UART: [state] CFI Enabled
25,987,380 UART: [rt] RT listening for mailbox commands...
26,019,147 UART: [rt]cmd =0x54514754, len=24
26,021,854 >>> mbox cmd response data (8 bytes)
26,022,397 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,052,144 UART: [rt]cmd =0x47544744, len=8
26,054,844 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,778,346 ready_for_fw is high
3,778,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,989 >>> mbox cmd response: success
14,453,188 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,700,809 UART:
18,701,189 UART: Running Caliptra FMC ...
18,702,334 UART:
18,702,499 UART: [state] CFI Enabled
18,710,404 UART: [fht] FMC Alias Private Key: 7
20,476,178 UART: [art] Extend RT PCRs Done
20,477,398 UART: [art] Lock RT PCRs Done
20,479,025 UART: [art] Populate DV Done
20,484,500 UART: [fht] FMC Alias Private Key: 7
20,486,154 UART: [art] Derive CDI
20,486,996 UART: [art] Store in slot 0x4
20,529,656 UART: [art] Derive Key Pair
20,530,662 UART: [art] Store priv key in slot 0x5
22,957,007 UART: [art] Derive Key Pair - Done
22,969,748 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,791 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,301 UART: [art] PUB.X = C9031DF6E72C33CA2AD38599327F40A5AE6805816DABB9C5B7F11D535F50A1FF4E7A28B7880AF142E32399247391581D
24,684,562 UART: [art] PUB.Y = 48E7AAD3B05D4C45FAD8595971279C21AF448AA92A98D4E01DDC9EBC050AD043D2E7B72749E1E8C32171E70EFEC61D3B
24,691,833 UART: [art] SIG.R = ECC045DFCD2B6859FAF7B79E557C32E903B718169233C2FAB5D8A15C011F07A5E7982DA7CDE858BE9389FD985C6601BF
24,699,236 UART: [art] SIG.S = 77CDBA8C2A4876A79519693285987D1C5E9CB1AD1E344760E7F2E1778A4FF92FE8B5316FF4EB8200CD1782AD2D419091
25,678,094 UART: Caliptra RT
25,678,804 UART: [state] CFI Enabled
25,810,882 UART: [rt] RT listening for mailbox commands...
25,842,429 UART: [rt]cmd =0x54514754, len=24
25,844,839 >>> mbox cmd response data (8 bytes)
25,845,261 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,874,947 UART: [rt]cmd =0x47544744, len=8
25,878,043 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,016 UART:
192,391 UART: Running Caliptra ROM ...
193,573 UART:
193,731 UART: [state] CFI Enabled
263,906 UART: [state] LifecycleState = Unprovisioned
266,304 UART: [state] DebugLocked = No
268,176 UART: [state] WD Timer not started. Device not locked for debugging
272,852 UART: [kat] SHA2-256
462,704 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,489 UART: [kat] ++
473,957 UART: [kat] sha1
485,683 UART: [kat] SHA2-256
488,701 UART: [kat] SHA2-384
496,040 UART: [kat] SHA2-512-ACC
498,620 UART: [kat] ECC-384
2,947,765 UART: [kat] HMAC-384Kdf
2,970,527 UART: [kat] LMS
3,502,324 UART: [kat] --
3,505,134 UART: [cold-reset] ++
3,507,558 UART: [fht] FHT @ 0x50003400
3,519,520 UART: [idev] ++
3,520,219 UART: [idev] CDI.KEYID = 6
3,521,169 UART: [idev] SUBJECT.KEYID = 7
3,522,405 UART: [idev] UDS.KEYID = 0
3,523,297 ready_for_fw is high
3,523,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,572 UART: [idev] Erasing UDS.KEYID = 0
6,027,107 UART: [idev] Sha1 KeyId Algorithm
6,050,059 UART: [idev] --
6,054,414 UART: [ldev] ++
6,055,106 UART: [ldev] CDI.KEYID = 6
6,056,022 UART: [ldev] SUBJECT.KEYID = 5
6,057,181 UART: [ldev] AUTHORITY.KEYID = 7
6,058,412 UART: [ldev] FE.KEYID = 1
6,100,546 UART: [ldev] Erasing FE.KEYID = 1
8,603,813 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,878 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,812 UART: [ldev] --
10,416,449 UART: [fwproc] Wait for Commands...
10,418,826 UART: [fwproc] Recv command 0x46574c44
10,421,076 UART: [fwproc] Recv'd Img size: 118548 bytes
13,919,424 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,683,783 >>> mbox cmd response: success
14,684,297 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,687,698 UART: [afmc] ++
14,688,392 UART: [afmc] CDI.KEYID = 6
14,689,784 UART: [afmc] SUBJECT.KEYID = 7
14,691,015 UART: [afmc] AUTHORITY.KEYID = 5
17,239,910 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,032 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,983,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,999,021 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,014,221 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,029,110 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,053,892 UART: [afmc] --
19,056,567 UART: [cold-reset] --
19,059,727 UART: [state] Locking Datavault
19,063,789 UART: [state] Locking PCR0, PCR1 and PCR31
19,065,982 UART: [state] Locking ICCM
19,068,650 UART: [exit] Launching FMC @ 0x40000130
19,077,306 UART:
19,077,542 UART: Running Caliptra FMC ...
19,078,642 UART:
19,078,802 UART: [state] CFI Enabled
19,139,089 UART: [fht] FMC Alias Private Key: 7
20,905,969 UART: [art] Extend RT PCRs Done
20,907,190 UART: [art] Lock RT PCRs Done
20,908,681 UART: [art] Populate DV Done
20,914,357 UART: [fht] FMC Alias Private Key: 7
20,915,962 UART: [art] Derive CDI
20,916,709 UART: [art] Store in slot 0x4
20,972,371 UART: [art] Derive Key Pair
20,973,410 UART: [art] Store priv key in slot 0x5
23,436,560 UART: [art] Derive Key Pair - Done
23,449,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,162,627 UART: [art] Erasing AUTHORITY.KEYID = 7
25,164,133 UART: [art] PUB.X = 2DAFF5E12FE12DA61DEF4FB1400A82748A3AA86A29DFCC602604D510D811C2FC90D7351DC70F1656890784A8E52C50E7
25,171,391 UART: [art] PUB.Y = 4872A11759899BC3B21AE1E312C8603D83D82ABAF9FA1C9EE5F5F5BF929C8E06FE1C313397E4879CCA3BD23725CC7755
25,178,628 UART: [art] SIG.R = 63575B458CE7D3057E04852C93BDAA23D70316C23F991983D6E71C10ED1CB7E8D2777EA3AD1A9ECB39A2D7899F586026
25,186,022 UART: [art] SIG.S = F68B3C2242376C2B54844506392F77422B64AC14721B4CACFD5A78AD7BAB11A45F0D80321F3F5B232FBB032E622C459A
26,164,935 UART: Caliptra RT
26,165,626 UART: [state] CFI Enabled
26,347,002 UART: [rt] RT listening for mailbox commands...
26,378,821 UART: [rt]cmd =0x54514754, len=24
26,381,757 >>> mbox cmd response data (8 bytes)
26,382,293 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,412,385 UART: [rt]cmd =0x47544744, len=8
26,415,423 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,438,961 ready_for_fw is high
3,439,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,820,499 >>> mbox cmd response: success
14,821,547 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,114,796 UART:
19,115,199 UART: Running Caliptra FMC ...
19,116,306 UART:
19,116,456 UART: [state] CFI Enabled
19,182,143 UART: [fht] FMC Alias Private Key: 7
20,948,418 UART: [art] Extend RT PCRs Done
20,949,641 UART: [art] Lock RT PCRs Done
20,951,350 UART: [art] Populate DV Done
20,956,825 UART: [fht] FMC Alias Private Key: 7
20,958,540 UART: [art] Derive CDI
20,959,357 UART: [art] Store in slot 0x4
21,014,610 UART: [art] Derive Key Pair
21,015,658 UART: [art] Store priv key in slot 0x5
23,479,187 UART: [art] Derive Key Pair - Done
23,492,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,472 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,975 UART: [art] PUB.X = C6416859347EF6A009D267A467B63488F5FD4BEF3402B7F1E0F2883EA024973926528EDC8EE13460CFEAB3AEA2EB3935
25,213,275 UART: [art] PUB.Y = AB281CEE1D3C354166AE123FBA16ECF0F17A103EC93F9F3913E117CFACC2E0B30268E9393766C31F3C47F2A89AA7F578
25,220,512 UART: [art] SIG.R = 1C52C3F7AF884215F452379BFD9AE50DC8666416A8ED098AD57878D2CB3D1641C78DFC7909173EE7051E52B3E473C623
25,227,948 UART: [art] SIG.S = D9B2E454F0686F642DB50300E5E2788BDB93E2609FF03A78F0BF4C45C3860A7BFC0A94D6C7AB5E29A221F7178A1706E4
26,206,925 UART: Caliptra RT
26,207,616 UART: [state] CFI Enabled
26,401,540 UART: [rt] RT listening for mailbox commands...
26,432,726 UART: [rt]cmd =0x54514754, len=24
26,435,550 >>> mbox cmd response data (8 bytes)
26,435,970 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,465,852 UART: [rt]cmd =0x47544744, len=8
26,468,884 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,459 UART:
192,818 UART: Running Caliptra ROM ...
193,921 UART:
603,656 UART: [state] CFI Enabled
616,066 UART: [state] LifecycleState = Unprovisioned
618,487 UART: [state] DebugLocked = No
620,011 UART: [state] WD Timer not started. Device not locked for debugging
624,493 UART: [kat] SHA2-256
814,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,140 UART: [kat] ++
825,663 UART: [kat] sha1
836,325 UART: [kat] SHA2-256
839,343 UART: [kat] SHA2-384
844,064 UART: [kat] SHA2-512-ACC
846,658 UART: [kat] ECC-384
3,288,869 UART: [kat] HMAC-384Kdf
3,301,409 UART: [kat] LMS
3,833,226 UART: [kat] --
3,837,152 UART: [cold-reset] ++
3,839,439 UART: [fht] FHT @ 0x50003400
3,850,348 UART: [idev] ++
3,851,063 UART: [idev] CDI.KEYID = 6
3,851,952 UART: [idev] SUBJECT.KEYID = 7
3,853,200 UART: [idev] UDS.KEYID = 0
3,854,123 ready_for_fw is high
3,854,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,003,191 UART: [idev] Erasing UDS.KEYID = 0
6,331,613 UART: [idev] Sha1 KeyId Algorithm
6,355,103 UART: [idev] --
6,359,702 UART: [ldev] ++
6,360,387 UART: [ldev] CDI.KEYID = 6
6,361,321 UART: [ldev] SUBJECT.KEYID = 5
6,362,486 UART: [ldev] AUTHORITY.KEYID = 7
6,363,665 UART: [ldev] FE.KEYID = 1
6,375,730 UART: [ldev] Erasing FE.KEYID = 1
8,855,795 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,127 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,870 UART: [ldev] --
10,646,189 UART: [fwproc] Wait for Commands...
10,648,993 UART: [fwproc] Recv command 0x46574c44
10,651,306 UART: [fwproc] Recv'd Img size: 118548 bytes
14,150,494 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,228,148 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,351,760 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,912,482 >>> mbox cmd response: success
14,913,045 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,915,807 UART: [afmc] ++
14,916,505 UART: [afmc] CDI.KEYID = 6
14,917,753 UART: [afmc] SUBJECT.KEYID = 7
14,919,196 UART: [afmc] AUTHORITY.KEYID = 5
17,424,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,145,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,147,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,162,257 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,177,370 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,192,291 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,910 UART: [afmc] --
19,218,774 UART: [cold-reset] --
19,223,934 UART: [state] Locking Datavault
19,229,133 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,334 UART: [state] Locking ICCM
19,232,949 UART: [exit] Launching FMC @ 0x40000130
19,241,630 UART:
19,241,871 UART: Running Caliptra FMC ...
19,242,980 UART:
19,243,141 UART: [state] CFI Enabled
19,251,091 UART: [fht] FMC Alias Private Key: 7
21,017,426 UART: [art] Extend RT PCRs Done
21,018,662 UART: [art] Lock RT PCRs Done
21,020,720 UART: [art] Populate DV Done
21,025,927 UART: [fht] FMC Alias Private Key: 7
21,027,577 UART: [art] Derive CDI
21,028,318 UART: [art] Store in slot 0x4
21,071,078 UART: [art] Derive Key Pair
21,072,087 UART: [art] Store priv key in slot 0x5
23,499,281 UART: [art] Derive Key Pair - Done
23,512,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,371 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,881 UART: [art] PUB.X = 12A8D160985AD88A89B474DA4D01492CE679FBEA3087304C98F7CFA19113C707496482E5F9B5ED97FD4B9914D6C99882
25,227,155 UART: [art] PUB.Y = A9E1E26A9C71C8217AD4D5431A295673844BAB8F03177A104B14EB6820EB204BAB9596D70759B29EFC2C0098D3AEC3D2
25,234,407 UART: [art] SIG.R = 1AF9CF8835767D0DEA77828F25845040590338EDB18794005DEFE63CE1398D978B3EB10329CD2E44786867016A1F80B5
25,241,769 UART: [art] SIG.S = CCF21C15D164D7FC87A1C8AE902D9FA25CBE4EE82EA7FA32AD1D63C721D659095F7A4AD1ED638C97B506DA25C0C5987C
26,220,312 UART: Caliptra RT
26,221,028 UART: [state] CFI Enabled
26,353,055 UART: [rt] RT listening for mailbox commands...
26,384,704 UART: [rt]cmd =0x54514754, len=24
26,387,275 >>> mbox cmd response data (8 bytes)
26,387,822 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,417,576 UART: [rt]cmd =0x47544744, len=8
26,420,349 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,755,559 ready_for_fw is high
3,755,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,037,317 >>> mbox cmd response: success
15,038,409 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,291,497 UART:
19,291,869 UART: Running Caliptra FMC ...
19,293,045 UART:
19,293,216 UART: [state] CFI Enabled
19,301,279 UART: [fht] FMC Alias Private Key: 7
21,067,661 UART: [art] Extend RT PCRs Done
21,068,891 UART: [art] Lock RT PCRs Done
21,070,311 UART: [art] Populate DV Done
21,075,848 UART: [fht] FMC Alias Private Key: 7
21,077,406 UART: [art] Derive CDI
21,078,230 UART: [art] Store in slot 0x4
21,120,767 UART: [art] Derive Key Pair
21,121,809 UART: [art] Store priv key in slot 0x5
23,548,756 UART: [art] Derive Key Pair - Done
23,562,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,268,273 UART: [art] Erasing AUTHORITY.KEYID = 7
25,269,788 UART: [art] PUB.X = 8153E62744EFCA1DC945AB6BE7EA98D6C13E5234856CAFE35F53FF5783FE098E621CECA6FB28CF81BB149FDB234E0EC0
25,277,109 UART: [art] PUB.Y = D99811B1C9CA68D8AC47CD417D547BCB3C889D1B8A3B1DEE68D94522D216F91E9B5E5A13998EF79C16061B53127BE515
25,284,337 UART: [art] SIG.R = 53A9A2061AECF3656E6E983CF0BCA9F22BBB2CF8734381E2A31DA20EA5A541F1283127E4F3AB274A3C1951DF114F0916
25,291,758 UART: [art] SIG.S = ABD7EFEC24953BD431238C08BB1B2A06A51698D0AA8EDA48C30F5C43FB3CB3B02F875FE79550C4D3FFDD8899B721495B
26,270,850 UART: Caliptra RT
26,271,561 UART: [state] CFI Enabled
26,405,700 UART: [rt] RT listening for mailbox commands...
26,437,237 UART: [rt]cmd =0x54514754, len=24
26,440,100 >>> mbox cmd response data (8 bytes)
26,440,605 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,470,562 UART: [rt]cmd =0x47544744, len=8
26,473,470 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,198 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,061 UART: [kat] SHA2-256
881,992 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,107 UART: [kat] ++
886,259 UART: [kat] sha1
890,499 UART: [kat] SHA2-256
892,437 UART: [kat] SHA2-384
895,144 UART: [kat] SHA2-512-ACC
897,045 UART: [kat] ECC-384
902,728 UART: [kat] HMAC-384Kdf
907,354 UART: [kat] LMS
1,475,550 UART: [kat] --
1,476,327 UART: [cold-reset] ++
1,476,743 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 ready_for_fw is high
1,480,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,296 UART: [idev] Erasing UDS.KEYID = 0
1,504,852 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,480 UART: [idev] --
1,514,349 UART: [ldev] ++
1,514,517 UART: [ldev] CDI.KEYID = 6
1,514,880 UART: [ldev] SUBJECT.KEYID = 5
1,515,306 UART: [ldev] AUTHORITY.KEYID = 7
1,515,769 UART: [ldev] FE.KEYID = 1
1,520,881 UART: [ldev] Erasing FE.KEYID = 1
1,546,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,632 UART: [ldev] --
1,586,073 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 118548 bytes
2,932,463 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,463 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,681 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,922 >>> mbox cmd response: success
3,131,922 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,096 UART: [afmc] ++
3,133,264 UART: [afmc] CDI.KEYID = 6
3,133,626 UART: [afmc] SUBJECT.KEYID = 7
3,134,051 UART: [afmc] AUTHORITY.KEYID = 5
3,169,448 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,044 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,824 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,533 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,416 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,099 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,825 UART: [afmc] --
3,212,847 UART: [cold-reset] --
3,213,723 UART: [state] Locking Datavault
3,215,230 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,834 UART: [state] Locking ICCM
3,216,460 UART: [exit] Launching FMC @ 0x40000130
3,221,790 UART:
3,221,806 UART: Running Caliptra FMC ...
3,222,214 UART:
3,222,268 UART: [state] CFI Enabled
3,232,614 UART: [fht] FMC Alias Private Key: 7
3,351,922 UART: [art] Extend RT PCRs Done
3,352,350 UART: [art] Lock RT PCRs Done
3,353,730 UART: [art] Populate DV Done
3,361,829 UART: [fht] FMC Alias Private Key: 7
3,362,987 UART: [art] Derive CDI
3,363,267 UART: [art] Store in slot 0x4
3,448,485 UART: [art] Derive Key Pair
3,448,845 UART: [art] Store priv key in slot 0x5
3,462,022 UART: [art] Derive Key Pair - Done
3,476,641 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,890 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,655 UART: [art] PUB.X = 47E485C0A8E04E6289908DE3B31829565614A26B8081A7B032289EB8D078D7D142CC654CC682A4ECC4769D561D2503CD
3,499,418 UART: [art] PUB.Y = F2D103EA2CBA81EA76E2650EFB6D1D61C8DC300B5B05F8593C3EA62513154956842AD843E78330290246DFE907AF62D4
3,506,354 UART: [art] SIG.R = A8BA11F6BD1C29275C246B26F57E1CEC5981726FAAA27BB2D4EC5EE6C99822794B30574F673CC95980DE3B449717A4F5
3,513,132 UART: [art] SIG.S = F90A73B109447956B051DE1AE0FC52A3DDA3AA30DD97D15CC5D0297E6A50E143285CF0460EE207BFB97BB625725F7413
3,537,502 UART: Caliptra RT
3,537,753 UART: [state] CFI Enabled
3,657,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,944 UART: [rt]cmd =0x54514754, len=24
3,690,135 >>> mbox cmd response data (8 bytes)
3,690,136 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,719,483 UART: [rt]cmd =0x47544744, len=8
3,722,259 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 ready_for_fw is high
1,362,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,288 >>> mbox cmd response: success
2,979,288 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,040,323 UART:
3,040,339 UART: Running Caliptra FMC ...
3,040,747 UART:
3,040,801 UART: [state] CFI Enabled
3,051,209 UART: [fht] FMC Alias Private Key: 7
3,170,045 UART: [art] Extend RT PCRs Done
3,170,473 UART: [art] Lock RT PCRs Done
3,172,085 UART: [art] Populate DV Done
3,180,216 UART: [fht] FMC Alias Private Key: 7
3,181,330 UART: [art] Derive CDI
3,181,610 UART: [art] Store in slot 0x4
3,267,596 UART: [art] Derive Key Pair
3,267,956 UART: [art] Store priv key in slot 0x5
3,281,855 UART: [art] Derive Key Pair - Done
3,296,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,350 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,115 UART: [art] PUB.X = 6A389E4DB0A44B592F4C6F8AAD24D4439275FB5EF0177F86D63BD869FD3A8DD805F025D54532E9776C9DC903E2B6A584
3,319,887 UART: [art] PUB.Y = A3145611C3663E09B32F68B188DFA63123972FC6D10E7069D9294978CB59705539051363CC3CAC850FC9177868965E2C
3,326,813 UART: [art] SIG.R = 9EAEAD0DB1F5689389798DA6FFEF208E387BDC3101263A2489FDB0E6A3B5378E05C7C08215F9E900FFEF9B0B2BEA530E
3,333,564 UART: [art] SIG.S = C644C0FD009D0288FFA34BB4F26266AB4317A63A87D8E300FC8E3C10EFD979A18DEA26B2B65FF17D7BAF1657F968D56B
3,357,427 UART: Caliptra RT
3,357,678 UART: [state] CFI Enabled
3,477,749 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,267 UART: [rt]cmd =0x54514754, len=24
3,510,412 >>> mbox cmd response data (8 bytes)
3,510,413 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,539,764 UART: [rt]cmd =0x47544744, len=8
3,542,466 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Unprovisioned
86,314 UART: [state] DebugLocked = No
87,050 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,532 UART: [kat] SHA2-256
882,463 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,578 UART: [kat] ++
886,730 UART: [kat] sha1
890,890 UART: [kat] SHA2-256
892,828 UART: [kat] SHA2-384
895,595 UART: [kat] SHA2-512-ACC
897,496 UART: [kat] ECC-384
903,097 UART: [kat] HMAC-384Kdf
907,817 UART: [kat] LMS
1,476,013 UART: [kat] --
1,476,822 UART: [cold-reset] ++
1,477,256 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 ready_for_fw is high
1,481,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,025 UART: [idev] Erasing UDS.KEYID = 0
1,506,219 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,936 UART: [ldev] ++
1,516,104 UART: [ldev] CDI.KEYID = 6
1,516,467 UART: [ldev] SUBJECT.KEYID = 5
1,516,893 UART: [ldev] AUTHORITY.KEYID = 7
1,517,356 UART: [ldev] FE.KEYID = 1
1,522,784 UART: [ldev] Erasing FE.KEYID = 1
1,548,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,766 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,482 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,055 UART: [ldev] --
1,587,440 UART: [fwproc] Waiting for Commands...
1,588,239 UART: [fwproc] Received command 0x46574c44
1,589,030 UART: [fwproc] Received Image of size 118548 bytes
2,933,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,990 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,208 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,451 >>> mbox cmd response: success
3,132,451 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,607 UART: [afmc] ++
3,133,775 UART: [afmc] CDI.KEYID = 6
3,134,137 UART: [afmc] SUBJECT.KEYID = 7
3,134,562 UART: [afmc] AUTHORITY.KEYID = 5
3,169,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,183 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,963 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,672 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,555 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,238 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,016 UART: [afmc] --
3,212,998 UART: [cold-reset] --
3,213,898 UART: [state] Locking Datavault
3,215,085 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,689 UART: [state] Locking ICCM
3,216,171 UART: [exit] Launching FMC @ 0x40000130
3,221,501 UART:
3,221,517 UART: Running Caliptra FMC ...
3,221,925 UART:
3,222,068 UART: [state] CFI Enabled
3,232,760 UART: [fht] FMC Alias Private Key: 7
3,351,470 UART: [art] Extend RT PCRs Done
3,351,898 UART: [art] Lock RT PCRs Done
3,353,690 UART: [art] Populate DV Done
3,362,043 UART: [fht] FMC Alias Private Key: 7
3,363,033 UART: [art] Derive CDI
3,363,313 UART: [art] Store in slot 0x4
3,449,275 UART: [art] Derive Key Pair
3,449,635 UART: [art] Store priv key in slot 0x5
3,462,970 UART: [art] Derive Key Pair - Done
3,477,506 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,097 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,862 UART: [art] PUB.X = 5B3448CF5F43C7C93053973EC8C9D3E9FD05654AC327F8B79D940CD74A79B9CD6E1E06E36F52BE3C6D5300B2091E1AE4
3,500,608 UART: [art] PUB.Y = 1527CA1F44DCA5BC24837B55504BD0CF38E5804D474D64FF3274D7C29DFDFC6E3DB316FD8602D5B6E356B9986568A2B2
3,507,565 UART: [art] SIG.R = F57D6174DAB8BACF3D0031F45897F1F5F33A30068DEC75DE997FE3C5D633D1D3409B7F349862B82F5EF26257F7087AB7
3,514,315 UART: [art] SIG.S = 0E24A6A558B9FBA82237DCC7E946077609D63D769F9347EB36184720625467870DFEB01A8C29F702B43A18B671F7B4E9
3,538,424 UART: Caliptra RT
3,538,767 UART: [state] CFI Enabled
3,659,771 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,445 UART: [rt]cmd =0x54514754, len=24
3,692,586 >>> mbox cmd response data (8 bytes)
3,692,587 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,722,056 UART: [rt]cmd =0x47544744, len=8
3,724,450 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,128 ready_for_fw is high
1,363,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,667 >>> mbox cmd response: success
2,981,667 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,790 UART:
3,043,806 UART: Running Caliptra FMC ...
3,044,214 UART:
3,044,357 UART: [state] CFI Enabled
3,054,725 UART: [fht] FMC Alias Private Key: 7
3,173,773 UART: [art] Extend RT PCRs Done
3,174,201 UART: [art] Lock RT PCRs Done
3,176,045 UART: [art] Populate DV Done
3,183,958 UART: [fht] FMC Alias Private Key: 7
3,184,934 UART: [art] Derive CDI
3,185,214 UART: [art] Store in slot 0x4
3,270,800 UART: [art] Derive Key Pair
3,271,160 UART: [art] Store priv key in slot 0x5
3,284,481 UART: [art] Derive Key Pair - Done
3,299,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,794 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,559 UART: [art] PUB.X = F0DF8448BE24E23DE989B9A8FF85F617ABA08B6316CEFB766F9A96F53B3AB1FC8055B57F0CB787AA70F709E0D8D8190F
3,322,338 UART: [art] PUB.Y = BD657CA4314958A6F0CFD72229ADAD41A0491B827BDA7DFA4EB5517D5CD663B83CA57C99D0FAA649A414727D9BD711F3
3,329,304 UART: [art] SIG.R = CBF56FF4ACDBA413A93BB695557871ED860882D1A89C199A2B0B82181E83A97BF253C31A74FAD78004CAFB652ED52FBC
3,336,081 UART: [art] SIG.S = 0E3AAB92E47AEE5C3443EB010D4771B2671E6C4EAED0F3B49B1CF2F2C36B1127C6DADAA9E31ABEF3F23A7EF06B44F72A
3,359,672 UART: Caliptra RT
3,360,015 UART: [state] CFI Enabled
3,479,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,615 UART: [rt]cmd =0x54514754, len=24
3,512,746 >>> mbox cmd response data (8 bytes)
3,512,747 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,542,382 UART: [rt]cmd =0x47544744, len=8
3,544,928 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,550 UART: [state] LifecycleState = Unprovisioned
86,205 UART: [state] DebugLocked = No
86,763 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
900,148 UART: [kat] SHA2-256
902,088 UART: [kat] SHA2-384
904,865 UART: [kat] SHA2-512-ACC
906,766 UART: [kat] ECC-384
916,719 UART: [kat] HMAC-384Kdf
921,307 UART: [kat] LMS
1,169,619 UART: [kat] --
1,170,564 UART: [cold-reset] ++
1,170,980 UART: [fht] FHT @ 0x50003400
1,173,820 UART: [idev] ++
1,173,988 UART: [idev] CDI.KEYID = 6
1,174,349 UART: [idev] SUBJECT.KEYID = 7
1,174,774 UART: [idev] UDS.KEYID = 0
1,175,120 ready_for_fw is high
1,175,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,607 UART: [idev] Erasing UDS.KEYID = 0
1,199,495 UART: [idev] Sha1 KeyId Algorithm
1,208,513 UART: [idev] --
1,209,532 UART: [ldev] ++
1,209,700 UART: [ldev] CDI.KEYID = 6
1,210,064 UART: [ldev] SUBJECT.KEYID = 5
1,210,491 UART: [ldev] AUTHORITY.KEYID = 7
1,210,954 UART: [ldev] FE.KEYID = 1
1,216,140 UART: [ldev] Erasing FE.KEYID = 1
1,242,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,822 UART: [ldev] --
1,282,207 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,597 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,478 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,769 >>> mbox cmd response: success
2,827,769 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,975 UART: [afmc] ++
2,829,143 UART: [afmc] CDI.KEYID = 6
2,829,506 UART: [afmc] SUBJECT.KEYID = 7
2,829,932 UART: [afmc] AUTHORITY.KEYID = 5
2,865,499 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,736 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,485 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,195 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,076 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,777 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,532 UART: [afmc] --
2,908,567 UART: [cold-reset] --
2,909,371 UART: [state] Locking Datavault
2,910,434 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,038 UART: [state] Locking ICCM
2,911,656 UART: [exit] Launching FMC @ 0x40000130
2,916,986 UART:
2,917,002 UART: Running Caliptra FMC ...
2,917,410 UART:
2,917,464 UART: [state] CFI Enabled
2,927,800 UART: [fht] FMC Alias Private Key: 7
3,046,138 UART: [art] Extend RT PCRs Done
3,046,566 UART: [art] Lock RT PCRs Done
3,047,882 UART: [art] Populate DV Done
3,056,321 UART: [fht] FMC Alias Private Key: 7
3,057,315 UART: [art] Derive CDI
3,057,595 UART: [art] Store in slot 0x4
3,143,406 UART: [art] Derive Key Pair
3,143,766 UART: [art] Store priv key in slot 0x5
3,157,376 UART: [art] Derive Key Pair - Done
3,172,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,931 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,696 UART: [art] PUB.X = 6E1B3B92DA17BD721B5846CD0AA46CBCDD13A92F5BCCA59E4462EC2F8AEE1EC30BFD98529D2E7F55F4FD15AB3B9BD08B
3,195,492 UART: [art] PUB.Y = 914D831680BD4258466A2D3CBA4ABD9B500E13FCD9AE82295E1608AEDDA2DB23981921C59933D9372F11E7F83801E7BF
3,202,439 UART: [art] SIG.R = B38FBEE31C15E9AC3DF4D17AB05F9A37F7EBEB14C6FDD79375F7CA8D26544FE1EB83966A0BB6173F62BCAFEBDC3C4DB8
3,209,240 UART: [art] SIG.S = 15A5CA5325BDC037BA0C6E8D5F896A9000ADBCE937539146A74791180520A6549A9098C6CD7195D1F460250CC286AC49
3,232,701 UART: Caliptra RT
3,232,952 UART: [state] CFI Enabled
3,352,683 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,199 UART: [rt]cmd =0x54514754, len=24
3,385,118 >>> mbox cmd response data (8 bytes)
3,385,119 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,578 UART: [rt]cmd =0x47544744, len=8
3,417,252 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,228 ready_for_fw is high
1,059,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,690 >>> mbox cmd response: success
2,676,690 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,738,211 UART:
2,738,227 UART: Running Caliptra FMC ...
2,738,635 UART:
2,738,689 UART: [state] CFI Enabled
2,749,121 UART: [fht] FMC Alias Private Key: 7
2,868,193 UART: [art] Extend RT PCRs Done
2,868,621 UART: [art] Lock RT PCRs Done
2,870,061 UART: [art] Populate DV Done
2,878,014 UART: [fht] FMC Alias Private Key: 7
2,878,952 UART: [art] Derive CDI
2,879,232 UART: [art] Store in slot 0x4
2,964,881 UART: [art] Derive Key Pair
2,965,241 UART: [art] Store priv key in slot 0x5
2,978,841 UART: [art] Derive Key Pair - Done
2,993,895 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,241 UART: [art] PUB.X = 8A55272F2153DB43058D995F13E31D319DCB7BC61E107E3A9F67E7330F7039DD5DBAA9F0D2E24C3750368D45CAA308EE
3,017,010 UART: [art] PUB.Y = E320B1BF2906E20759A45CAB088FE6FC3FB8B03AA38C553F9A31C1DD248AD5EA9BDEBA115242B2DF03E5A5472F6165C1
3,023,966 UART: [art] SIG.R = 75BB5271918B2A4206C6941F304C6DF0668A5EDF1E44B9203D2E090909C2F7AC5341EB30EC2686A9B7FC0444B325DB3F
3,030,725 UART: [art] SIG.S = 1581B53352ABEBC8341B0CE7C1CACF454EE8E23974ED8CB87CDA03DDCCF7FD7EB220E1FBBC47588093A1F9CE1B7FC64A
3,054,313 UART: Caliptra RT
3,054,564 UART: [state] CFI Enabled
3,174,216 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,914 UART: [rt]cmd =0x54514754, len=24
3,206,885 >>> mbox cmd response data (8 bytes)
3,206,886 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,205 UART: [rt]cmd =0x47544744, len=8
3,238,365 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,915 UART: [state] LifecycleState = Unprovisioned
86,570 UART: [state] DebugLocked = No
87,266 UART: [state] WD Timer not started. Device not locked for debugging
88,533 UART: [kat] SHA2-256
892,083 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,187 UART: [kat] ++
896,339 UART: [kat] sha1
900,609 UART: [kat] SHA2-256
902,549 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
917,276 UART: [kat] HMAC-384Kdf
922,012 UART: [kat] LMS
1,170,324 UART: [kat] --
1,171,103 UART: [cold-reset] ++
1,171,553 UART: [fht] FHT @ 0x50003400
1,174,167 UART: [idev] ++
1,174,335 UART: [idev] CDI.KEYID = 6
1,174,696 UART: [idev] SUBJECT.KEYID = 7
1,175,121 UART: [idev] UDS.KEYID = 0
1,175,467 ready_for_fw is high
1,175,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,286 UART: [idev] Erasing UDS.KEYID = 0
1,200,908 UART: [idev] Sha1 KeyId Algorithm
1,209,730 UART: [idev] --
1,210,655 UART: [ldev] ++
1,210,823 UART: [ldev] CDI.KEYID = 6
1,211,187 UART: [ldev] SUBJECT.KEYID = 5
1,211,614 UART: [ldev] AUTHORITY.KEYID = 7
1,212,077 UART: [ldev] FE.KEYID = 1
1,217,463 UART: [ldev] Erasing FE.KEYID = 1
1,243,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,467 UART: [ldev] --
1,282,844 UART: [fwproc] Wait for Commands...
1,283,611 UART: [fwproc] Recv command 0x46574c44
1,284,344 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,581 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,736 >>> mbox cmd response: success
2,827,736 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,962 UART: [afmc] ++
2,829,130 UART: [afmc] CDI.KEYID = 6
2,829,493 UART: [afmc] SUBJECT.KEYID = 7
2,829,919 UART: [afmc] AUTHORITY.KEYID = 5
2,865,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,832 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,045 UART: [afmc] --
2,909,034 UART: [cold-reset] --
2,909,944 UART: [state] Locking Datavault
2,910,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,489 UART: [state] Locking ICCM
2,912,025 UART: [exit] Launching FMC @ 0x40000130
2,917,355 UART:
2,917,371 UART: Running Caliptra FMC ...
2,917,779 UART:
2,917,922 UART: [state] CFI Enabled
2,928,580 UART: [fht] FMC Alias Private Key: 7
3,047,834 UART: [art] Extend RT PCRs Done
3,048,262 UART: [art] Lock RT PCRs Done
3,049,822 UART: [art] Populate DV Done
3,058,079 UART: [fht] FMC Alias Private Key: 7
3,059,163 UART: [art] Derive CDI
3,059,443 UART: [art] Store in slot 0x4
3,145,382 UART: [art] Derive Key Pair
3,145,742 UART: [art] Store priv key in slot 0x5
3,158,466 UART: [art] Derive Key Pair - Done
3,173,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,942 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,707 UART: [art] PUB.X = B280A2F6CE5EE9DC5707D1A2C974E50881D5C318BED2BE539217EFE22427709BD58B67D998411136B63B7FFC5925B877
3,196,475 UART: [art] PUB.Y = AA8074DE8FDD13F9579DA7BEBD38DE854ADFFF2B39A6E0369B4D75ADA2302EB3F03793DCA6E889AE397D46BF126D5DE7
3,203,451 UART: [art] SIG.R = 4E7F004F288BBF23C2BC12BB5B36C4259033E71DE00148B9AA51B85B7D1062200746CF6F96ED7EFD3BC5F181DD11E988
3,210,203 UART: [art] SIG.S = A86319B8311F25095FD9A802F038B5E9ABC23AE64A1869B7F808B1088DCEB9C30389B1FE85BBF7256DF13301F30E273E
3,234,054 UART: Caliptra RT
3,234,397 UART: [state] CFI Enabled
3,354,124 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,040 UART: [rt]cmd =0x54514754, len=24
3,387,319 >>> mbox cmd response data (8 bytes)
3,387,320 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,416,653 UART: [rt]cmd =0x47544744, len=8
3,419,193 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,507 ready_for_fw is high
1,059,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,235 >>> mbox cmd response: success
2,678,235 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,966 UART:
2,739,982 UART: Running Caliptra FMC ...
2,740,390 UART:
2,740,533 UART: [state] CFI Enabled
2,751,237 UART: [fht] FMC Alias Private Key: 7
2,870,559 UART: [art] Extend RT PCRs Done
2,870,987 UART: [art] Lock RT PCRs Done
2,872,427 UART: [art] Populate DV Done
2,880,588 UART: [fht] FMC Alias Private Key: 7
2,881,668 UART: [art] Derive CDI
2,881,948 UART: [art] Store in slot 0x4
2,967,581 UART: [art] Derive Key Pair
2,967,941 UART: [art] Store priv key in slot 0x5
2,981,007 UART: [art] Derive Key Pair - Done
2,995,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,193 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,958 UART: [art] PUB.X = 3BADA614CDC29A2BBBA1526FDF195147E07532980C621E5D698A342DA89234832B572C0035C53A8A26D97CF0F843B388
3,018,705 UART: [art] PUB.Y = 13BBFDE0BF2842282B622B48DF604888B37CB9C8BBA6348E8B1DF3260292BA45133A02A703BA23182523D896A5D4E9C4
3,025,650 UART: [art] SIG.R = 6B57F40656C8EB98B4724C143881E9E76BD8A7016D4B569FE3A2663CEDBBF9A781E103EDC9A92717627C654B2EFF6162
3,032,417 UART: [art] SIG.S = 66615A8E5C6A6F54CE96A09CE1D4F4B0C72B7B30B3773E510A38999CB398660148EAD3ED26F33DE1EE6C45EC7FF5E66A
3,056,037 UART: Caliptra RT
3,056,380 UART: [state] CFI Enabled
3,176,806 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,714 UART: [rt]cmd =0x54514754, len=24
3,209,953 >>> mbox cmd response data (8 bytes)
3,209,954 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,393 UART: [rt]cmd =0x47544744, len=8
3,242,031 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,182 UART: [state] LifecycleState = Unprovisioned
85,837 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,644 UART: [kat] SHA2-512-ACC
908,545 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,916 UART: [kat] LMS
1,171,244 UART: [kat] --
1,171,989 UART: [cold-reset] ++
1,172,545 UART: [fht] FHT @ 0x50003400
1,175,026 UART: [idev] ++
1,175,194 UART: [idev] CDI.KEYID = 6
1,175,554 UART: [idev] SUBJECT.KEYID = 7
1,175,978 UART: [idev] UDS.KEYID = 0
1,176,323 ready_for_fw is high
1,176,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,676 UART: [idev] Erasing UDS.KEYID = 0
1,200,083 UART: [idev] Sha1 KeyId Algorithm
1,208,369 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,970 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,216,147 UART: [ldev] Erasing FE.KEYID = 1
1,242,848 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,032 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,935 UART: [ldev] --
1,282,408 UART: [fwproc] Wait for Commands...
1,283,058 UART: [fwproc] Recv command 0x46574c44
1,283,786 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,203 >>> mbox cmd response: success
2,828,203 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,397 UART: [afmc] ++
2,829,565 UART: [afmc] CDI.KEYID = 6
2,829,927 UART: [afmc] SUBJECT.KEYID = 7
2,830,352 UART: [afmc] AUTHORITY.KEYID = 5
2,864,993 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,432 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,180 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,889 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,772 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,473 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,283 UART: [afmc] --
2,908,247 UART: [cold-reset] --
2,909,237 UART: [state] Locking Datavault
2,910,362 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,966 UART: [state] Locking ICCM
2,911,500 UART: [exit] Launching FMC @ 0x40000130
2,916,830 UART:
2,916,846 UART: Running Caliptra FMC ...
2,917,254 UART:
2,917,308 UART: [state] CFI Enabled
2,927,962 UART: [fht] FMC Alias Private Key: 7
3,046,606 UART: [art] Extend RT PCRs Done
3,047,034 UART: [art] Lock RT PCRs Done
3,048,530 UART: [art] Populate DV Done
3,056,783 UART: [fht] FMC Alias Private Key: 7
3,057,843 UART: [art] Derive CDI
3,058,123 UART: [art] Store in slot 0x4
3,143,844 UART: [art] Derive Key Pair
3,144,204 UART: [art] Store priv key in slot 0x5
3,157,554 UART: [art] Derive Key Pair - Done
3,172,286 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,378 UART: [art] PUB.X = B59E3FE60C221B7EC538A2B4B0BFF9F5E7C11BFC4858A2EC55727E8E51379B056EB5DA086CF95703A3B236AE5C7A909E
3,195,152 UART: [art] PUB.Y = FD0D0D70115DD9955AD702F8966D37013981FB26ECD7C1EC1B9A1045E3CCA65D66DD7BDB7DFA5760C05A77B2449DDA1D
3,202,108 UART: [art] SIG.R = EC1955B974ADC4E5CE34877C101DB2E3B6E7336C7EA855B5E99C5EA459ACBEC977716279621E4DD42206FC086E8AA062
3,208,882 UART: [art] SIG.S = 30525046D491F9B8BC07675A28C14B642EBD9E0F9D94A830F288EA23AD29B05C7A27453A7DE5B619AF2C3F965F142E91
3,232,214 UART: Caliptra RT
3,232,465 UART: [state] CFI Enabled
3,351,914 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,756 UART: [rt]cmd =0x54514754, len=24
3,384,797 >>> mbox cmd response data (8 bytes)
3,384,798 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,303 UART: [rt]cmd =0x47544744, len=8
3,417,105 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,839 ready_for_fw is high
1,060,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,032 >>> mbox cmd response: success
2,681,032 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,743,569 UART:
2,743,585 UART: Running Caliptra FMC ...
2,743,993 UART:
2,744,047 UART: [state] CFI Enabled
2,754,919 UART: [fht] FMC Alias Private Key: 7
2,874,611 UART: [art] Extend RT PCRs Done
2,875,039 UART: [art] Lock RT PCRs Done
2,876,837 UART: [art] Populate DV Done
2,885,172 UART: [fht] FMC Alias Private Key: 7
2,886,244 UART: [art] Derive CDI
2,886,524 UART: [art] Store in slot 0x4
2,972,677 UART: [art] Derive Key Pair
2,973,037 UART: [art] Store priv key in slot 0x5
2,987,015 UART: [art] Derive Key Pair - Done
3,001,786 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,017,319 UART: [art] Erasing AUTHORITY.KEYID = 7
3,018,084 UART: [art] PUB.X = 3A13486B526389D0D03F12D0DF7FEC5BA903563209189DB071A2A4AF062F7700B91F09B94F26A85863F0D0828914969C
3,024,814 UART: [art] PUB.Y = 2376979D52937AB4C08D974F22191CACAD46E996E7158D954EDD846060B2FCE3560D53EC0123A4D47C0D0BCF9A6629CF
3,031,758 UART: [art] SIG.R = 4F05F0BCEECD3E0CCCD688CC9F5C586702D5BD3088B5FF5AD37D0210DDC70E9D771BC56B8873AE517347C7C5D8027C40
3,038,528 UART: [art] SIG.S = CD3DAB5DC52F5D62EADC7EEAF03EEA2456D414E2A9A715BD49CF50AD7A084F1B1307B9A75E02D77EE8B29E33DD5D76FB
3,062,073 UART: Caliptra RT
3,062,324 UART: [state] CFI Enabled
3,182,213 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,213,207 UART: [rt]cmd =0x54514754, len=24
3,215,404 >>> mbox cmd response data (8 bytes)
3,215,405 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,244,744 UART: [rt]cmd =0x47544744, len=8
3,247,174 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
87,959 UART: [kat] SHA2-256
893,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,734 UART: [kat] ++
897,886 UART: [kat] sha1
902,004 UART: [kat] SHA2-256
903,944 UART: [kat] SHA2-384
906,643 UART: [kat] SHA2-512-ACC
908,544 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,228 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,261 UART: [idev] ++
1,175,429 UART: [idev] CDI.KEYID = 6
1,175,789 UART: [idev] SUBJECT.KEYID = 7
1,176,213 UART: [idev] UDS.KEYID = 0
1,176,558 ready_for_fw is high
1,176,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,155 UART: [idev] Erasing UDS.KEYID = 0
1,201,110 UART: [idev] Sha1 KeyId Algorithm
1,209,572 UART: [idev] --
1,210,590 UART: [ldev] ++
1,210,758 UART: [ldev] CDI.KEYID = 6
1,211,121 UART: [ldev] SUBJECT.KEYID = 5
1,211,547 UART: [ldev] AUTHORITY.KEYID = 7
1,212,010 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,243,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,872 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,475 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,440 UART: [ldev] --
1,282,821 UART: [fwproc] Wait for Commands...
1,283,631 UART: [fwproc] Recv command 0x46574c44
1,284,359 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,972 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,722 >>> mbox cmd response: success
2,828,722 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,829,816 UART: [afmc] ++
2,829,984 UART: [afmc] CDI.KEYID = 6
2,830,346 UART: [afmc] SUBJECT.KEYID = 7
2,830,771 UART: [afmc] AUTHORITY.KEYID = 5
2,865,854 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,731 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,188 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,071 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,772 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,814 UART: [afmc] --
2,909,798 UART: [cold-reset] --
2,910,420 UART: [state] Locking Datavault
2,911,599 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,203 UART: [state] Locking ICCM
2,912,871 UART: [exit] Launching FMC @ 0x40000130
2,918,201 UART:
2,918,217 UART: Running Caliptra FMC ...
2,918,625 UART:
2,918,768 UART: [state] CFI Enabled
2,929,388 UART: [fht] FMC Alias Private Key: 7
3,048,596 UART: [art] Extend RT PCRs Done
3,049,024 UART: [art] Lock RT PCRs Done
3,050,526 UART: [art] Populate DV Done
3,058,819 UART: [fht] FMC Alias Private Key: 7
3,059,841 UART: [art] Derive CDI
3,060,121 UART: [art] Store in slot 0x4
3,146,186 UART: [art] Derive Key Pair
3,146,546 UART: [art] Store priv key in slot 0x5
3,159,460 UART: [art] Derive Key Pair - Done
3,174,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,950 UART: [art] PUB.X = F06484CBCEE0ABC7E793DB0845F8F6F3BE9D34C26AA3E0189F9C48E9F0DBAED6A9AA893C8128BE52371EC8B2D44A1A00
3,197,719 UART: [art] PUB.Y = 66FC1101450D3F22EA78A2A924304B8CF9E340DB151935CE764F8ED73890399B23ACE6069C0A4562A1A9EA5836BD9032
3,204,657 UART: [art] SIG.R = 1926AB4E807E938DCCB57AAA0F110557AF8DDC1C21F32EA8374806CB962A6E1E91DDCC801B45AB6EDAB12FE5AD48D324
3,211,440 UART: [art] SIG.S = 6B86D41C66A19A6D0C742DF197A1B4CACE572CB75DE7E00389FCE86A48B51BD0B9281D1127DA9E002EDD81F445E6A261
3,235,484 UART: Caliptra RT
3,235,827 UART: [state] CFI Enabled
3,355,403 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,929 UART: [rt]cmd =0x54514754, len=24
3,388,174 >>> mbox cmd response data (8 bytes)
3,388,175 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,417,548 UART: [rt]cmd =0x47544744, len=8
3,420,238 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,846 ready_for_fw is high
1,060,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,229 >>> mbox cmd response: success
2,680,229 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,982 UART:
2,742,998 UART: Running Caliptra FMC ...
2,743,406 UART:
2,743,549 UART: [state] CFI Enabled
2,754,251 UART: [fht] FMC Alias Private Key: 7
2,873,101 UART: [art] Extend RT PCRs Done
2,873,529 UART: [art] Lock RT PCRs Done
2,875,219 UART: [art] Populate DV Done
2,883,512 UART: [fht] FMC Alias Private Key: 7
2,884,604 UART: [art] Derive CDI
2,884,884 UART: [art] Store in slot 0x4
2,970,491 UART: [art] Derive Key Pair
2,970,851 UART: [art] Store priv key in slot 0x5
2,984,077 UART: [art] Derive Key Pair - Done
2,998,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,698 UART: [art] PUB.X = B6F815927619001657360435BBCD23A398C91C68BAF46CE04F66BE21647209C18C3B9956963EBA1E226461537AA97F17
3,021,432 UART: [art] PUB.Y = 6A00DC8C6B447772A71C84875199847735D7CAB4317C093C8BBCE151FEE60E167D99E7F8E0975238598D706F623A6C26
3,028,350 UART: [art] SIG.R = 458AF1BEAEA6520581FD50BA56D75F4389C0868EE201DDB340368A01D31C1662247E4A3ECF7A982326A81164741A6261
3,035,109 UART: [art] SIG.S = 090C1C2F69B191403DF75F43B88D43F6C568CC555FF7F98D28148536362BA157808ED94F6BA897E87052C8AA7B5BCF90
3,058,955 UART: Caliptra RT
3,059,298 UART: [state] CFI Enabled
3,179,228 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,834 UART: [rt]cmd =0x54514754, len=24
3,211,673 >>> mbox cmd response data (8 bytes)
3,211,674 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,241,123 UART: [rt]cmd =0x47544744, len=8
3,243,601 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_default_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
192,044 UART:
192,416 UART: Running Caliptra ROM ...
193,510 UART:
193,653 UART: [state] CFI Enabled
263,103 UART: [state] LifecycleState = Unprovisioned
264,981 UART: [state] DebugLocked = No
267,857 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,018 UART: [kat] SHA2-256
442,701 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,167 UART: [kat] ++
453,702 UART: [kat] sha1
464,363 UART: [kat] SHA2-256
467,020 UART: [kat] SHA2-384
472,449 UART: [kat] SHA2-512-ACC
474,828 UART: [kat] ECC-384
2,766,545 UART: [kat] HMAC-384Kdf
2,778,142 UART: [kat] LMS
3,968,461 UART: [kat] --
3,972,875 UART: [cold-reset] ++
3,975,299 UART: [fht] Storing FHT @ 0x50003400
3,987,208 UART: [idev] ++
3,987,771 UART: [idev] CDI.KEYID = 6
3,988,752 UART: [idev] SUBJECT.KEYID = 7
3,990,000 UART: [idev] UDS.KEYID = 0
3,991,065 ready_for_fw is high
3,991,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,352 UART: [idev] Erasing UDS.KEYID = 0
7,324,284 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,209 UART: [idev] --
7,350,470 UART: [ldev] ++
7,351,039 UART: [ldev] CDI.KEYID = 6
7,352,066 UART: [ldev] SUBJECT.KEYID = 5
7,353,177 UART: [ldev] AUTHORITY.KEYID = 7
7,354,460 UART: [ldev] FE.KEYID = 1
7,401,582 UART: [ldev] Erasing FE.KEYID = 1
10,735,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,315 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,361 UART: [ldev] --
13,115,821 UART: [fwproc] Waiting for Commands...
13,117,592 UART: [fwproc] Received command 0x46574c44
13,119,838 UART: [fwproc] Received Image of size 118548 bytes
17,218,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,294,774 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,950 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,696,582 >>> mbox cmd response: success
17,697,740 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,700,892 UART: [afmc] ++
17,701,479 UART: [afmc] CDI.KEYID = 6
17,702,363 UART: [afmc] SUBJECT.KEYID = 7
17,703,626 UART: [afmc] AUTHORITY.KEYID = 5
21,068,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,684 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,928 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,115 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,889 UART: [afmc] --
23,444,024 UART: [cold-reset] --
23,449,016 UART: [state] Locking Datavault
23,454,748 UART: [state] Locking PCR0, PCR1 and PCR31
23,456,496 UART: [state] Locking ICCM
23,457,856 UART: [exit] Launching FMC @ 0x40000130
23,466,244 UART:
23,466,478 UART: Running Caliptra FMC ...
23,467,503 UART:
23,467,650 UART: [state] CFI Enabled
23,531,732 UART: [fht] FMC Alias Private Key: 7
25,872,666 UART: [art] Extend RT PCRs Done
25,873,876 UART: [art] Lock RT PCRs Done
25,875,462 UART: [art] Populate DV Done
25,880,818 UART: [fht] FMC Alias Private Key: 7
25,882,351 UART: [art] Derive CDI
25,883,162 UART: [art] Store in slot 0x4
25,940,769 UART: [art] Derive Key Pair
25,941,762 UART: [art] Store priv key in slot 0x5
29,234,490 UART: [art] Derive Key Pair - Done
29,247,581 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,534,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,536,387 UART: [art] PUB.X = E2557533987E75C27606BFB1D682D6FEC10256F9374481AD7DE0FEE721D17B80E9424289DDC57FFBE8EFE97DCE7F114E
31,543,677 UART: [art] PUB.Y = 589D6D58CD892EDAD2B1685ACFEF7131BFF8F513294FD45A68E4135C8B88AEB2E63799AFEEA4E0BC010C2E34CB1D5286
31,550,976 UART: [art] SIG.R = A4021FE49736BE1D24F2226534C5D66DE8D59AB537D41EFC49F51E5DFE89451E3FDAF2E7DAB0F4981EC4AB53A8AF592B
31,558,434 UART: [art] SIG.S = 0A5276AF70F25F917DC596A12B53CAAF984051E2A6C05B5548A98249A3C98FB518B37D47B45F47241AF8DFDDEE3D26F4
32,863,101 UART: Caliptra RT
32,863,799 UART: [state] CFI Enabled
33,042,544 UART: [rt] RT listening for mailbox commands...
33,074,250 UART: [rt]cmd =0x54514754, len=24
33,076,922 >>> mbox cmd response data (8 bytes)
33,077,814 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,107,727 UART: [rt]cmd =0x44504543, len=36
33,147,527 >>> mbox cmd response data (24 bytes)
33,148,126 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,178,033 UART: [rt]cmd =0x47544744, len=8
33,180,069 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,784,631 ready_for_fw is high
3,785,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,060 >>> mbox cmd response: success
17,959,268 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,648,484 UART:
23,648,925 UART: Running Caliptra FMC ...
23,650,062 UART:
23,650,245 UART: [state] CFI Enabled
23,700,551 UART: [fht] FMC Alias Private Key: 7
26,041,010 UART: [art] Extend RT PCRs Done
26,042,238 UART: [art] Lock RT PCRs Done
26,044,165 UART: [art] Populate DV Done
26,049,871 UART: [fht] FMC Alias Private Key: 7
26,051,363 UART: [art] Derive CDI
26,052,131 UART: [art] Store in slot 0x4
26,109,588 UART: [art] Derive Key Pair
26,110,633 UART: [art] Store priv key in slot 0x5
29,403,194 UART: [art] Derive Key Pair - Done
29,416,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,705,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,706,755 UART: [art] PUB.X = 5123BEF20ED6AC50CAD5DC9A5FA631B29659FDD35A4FF6115508EB5DA8A0B0F534434375944CAB385333B6691BB071A0
31,714,050 UART: [art] PUB.Y = AAD3B4C1FB90916CA3BA3289461466F062C6EBC0D4C8C2DEE376B7DDB1CDF303175D9B7385458C529C6FCC6C48FFDC86
31,721,345 UART: [art] SIG.R = 893D6EDC1D9BE1938C1BBEF658A8A3F703BD41110F3892DBF57DEE00B1CC434EA44C886488C0EFB78E55B9030641E04C
31,728,709 UART: [art] SIG.S = 0671EA75444AD446297439A12F126D4AD298938BDF881288D29A5EED26316232E6E87D369B0A49B6AAFD32061FE2A3AA
33,033,398 UART: Caliptra RT
33,034,116 UART: [state] CFI Enabled
33,211,525 UART: [rt] RT listening for mailbox commands...
33,243,315 UART: [rt]cmd =0x54514754, len=24
33,246,063 >>> mbox cmd response data (8 bytes)
33,246,841 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,276,633 UART: [rt]cmd =0x44504543, len=36
33,316,525 >>> mbox cmd response data (24 bytes)
33,317,147 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,347,041 UART: [rt]cmd =0x47544744, len=8
33,349,018 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,376 UART:
192,746 UART: Running Caliptra ROM ...
193,934 UART:
603,669 UART: [state] CFI Enabled
616,637 UART: [state] LifecycleState = Unprovisioned
618,574 UART: [state] DebugLocked = No
621,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,827 UART: [kat] SHA2-256
795,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,102 UART: [kat] ++
806,620 UART: [kat] sha1
817,488 UART: [kat] SHA2-256
820,209 UART: [kat] SHA2-384
824,861 UART: [kat] SHA2-512-ACC
827,221 UART: [kat] ECC-384
3,111,019 UART: [kat] HMAC-384Kdf
3,121,620 UART: [kat] LMS
4,311,676 UART: [kat] --
4,315,526 UART: [cold-reset] ++
4,317,594 UART: [fht] Storing FHT @ 0x50003400
4,328,144 UART: [idev] ++
4,328,697 UART: [idev] CDI.KEYID = 6
4,329,718 UART: [idev] SUBJECT.KEYID = 7
4,330,887 UART: [idev] UDS.KEYID = 0
4,331,867 ready_for_fw is high
4,332,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,906 UART: [idev] Erasing UDS.KEYID = 0
7,621,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,983 UART: [idev] --
7,646,267 UART: [ldev] ++
7,646,839 UART: [ldev] CDI.KEYID = 6
7,647,805 UART: [ldev] SUBJECT.KEYID = 5
7,649,007 UART: [ldev] AUTHORITY.KEYID = 7
7,650,289 UART: [ldev] FE.KEYID = 1
7,662,286 UART: [ldev] Erasing FE.KEYID = 1
10,949,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,156 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,912 UART: [ldev] --
13,310,515 UART: [fwproc] Waiting for Commands...
13,313,624 UART: [fwproc] Received command 0x46574c44
13,315,851 UART: [fwproc] Received Image of size 118548 bytes
17,423,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,501,960 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,141 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,841 >>> mbox cmd response: success
17,903,990 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,907,190 UART: [afmc] ++
17,907,782 UART: [afmc] CDI.KEYID = 6
17,908,657 UART: [afmc] SUBJECT.KEYID = 7
17,909,926 UART: [afmc] AUTHORITY.KEYID = 5
21,227,061 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,520,327 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,635 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,537,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,766 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,566,145 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,587,590 UART: [afmc] --
23,591,032 UART: [cold-reset] --
23,595,990 UART: [state] Locking Datavault
23,601,339 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,081 UART: [state] Locking ICCM
23,605,686 UART: [exit] Launching FMC @ 0x40000130
23,614,070 UART:
23,614,309 UART: Running Caliptra FMC ...
23,615,402 UART:
23,615,555 UART: [state] CFI Enabled
23,623,429 UART: [fht] FMC Alias Private Key: 7
25,963,032 UART: [art] Extend RT PCRs Done
25,964,254 UART: [art] Lock RT PCRs Done
25,965,795 UART: [art] Populate DV Done
25,971,155 UART: [fht] FMC Alias Private Key: 7
25,972,736 UART: [art] Derive CDI
25,973,463 UART: [art] Store in slot 0x4
26,015,945 UART: [art] Derive Key Pair
26,017,007 UART: [art] Store priv key in slot 0x5
29,258,639 UART: [art] Derive Key Pair - Done
29,271,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,515 UART: [art] Erasing AUTHORITY.KEYID = 7
31,553,018 UART: [art] PUB.X = A62716BAFBF36B3C32582EEF0DD8D77D34B065DD94266FDF91C8FC44F70A6842FAE0F7E92F98D76C4C55CCA2299AD101
31,560,321 UART: [art] PUB.Y = 38FD2A03FFC5A3C3DB767CE3AD679F978C7BDEC06067A512FD67984299F3C3D559CC21D72F7A5BDCA5D2D6CC5176A2EC
31,567,595 UART: [art] SIG.R = DFC5732F1E888EFF773A7EB0B7943F0557ABC1F3A6699ABA45ACAD75A52E89C8BF1CA4EF704540DA7AA2A4C9BE81E67A
31,575,026 UART: [art] SIG.S = 3E7C5EB568BBFBA9C865988BA54E9EA1604B15234B91F12A709690828316BC790B3C6DA33480F208033A1E28603C20A5
32,880,200 UART: Caliptra RT
32,880,908 UART: [state] CFI Enabled
33,013,902 UART: [rt] RT listening for mailbox commands...
33,045,140 UART: [rt]cmd =0x54514754, len=24
33,047,914 >>> mbox cmd response data (8 bytes)
33,048,880 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,078,901 UART: [rt]cmd =0x44504543, len=36
33,119,530 >>> mbox cmd response data (24 bytes)
33,120,193 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,149,740 UART: [rt]cmd =0x47544744, len=8
33,151,737 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
4,123,964 ready_for_fw is high
4,124,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,707 >>> mbox cmd response: success
18,164,908 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,804,281 UART:
23,804,657 UART: Running Caliptra FMC ...
23,805,853 UART:
23,806,020 UART: [state] CFI Enabled
23,813,769 UART: [fht] FMC Alias Private Key: 7
26,153,710 UART: [art] Extend RT PCRs Done
26,154,938 UART: [art] Lock RT PCRs Done
26,156,669 UART: [art] Populate DV Done
26,161,976 UART: [fht] FMC Alias Private Key: 7
26,163,567 UART: [art] Derive CDI
26,164,376 UART: [art] Store in slot 0x4
26,207,234 UART: [art] Derive Key Pair
26,208,242 UART: [art] Store priv key in slot 0x5
29,450,205 UART: [art] Derive Key Pair - Done
29,463,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,508 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,050 UART: [art] PUB.X = F4AC4CF497A029305297E5F34DA95A273D401B085D516D287754667DC4BBB8EA80EA66AE988B461197D3F3747481084D
31,752,260 UART: [art] PUB.Y = AA2B3E6C100E1C03DEB42123B869EBA7A6037D271349074978E71A64F800D5786B2BE34020699542340DBE12CF2AD29D
31,759,455 UART: [art] SIG.R = 77A0229DAF46B94CD68F4B659F8AB04CFEDAFAD40CAF23808F305B58A383A2D3806B65ECAEFEBC5A9A1D5E9893EEE533
31,766,901 UART: [art] SIG.S = 527D2AD6E9E493D4858A782D1E586D79E17C8F98D7EF6871FABC66B88D13BA5FAAFF01614A264A507A8DA191C4C7DFEB
33,072,397 UART: Caliptra RT
33,073,111 UART: [state] CFI Enabled
33,206,024 UART: [rt] RT listening for mailbox commands...
33,237,279 UART: [rt]cmd =0x54514754, len=24
33,239,915 >>> mbox cmd response data (8 bytes)
33,240,808 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
33,270,767 UART: [rt]cmd =0x44504543, len=36
33,310,275 >>> mbox cmd response data (24 bytes)
33,310,893 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,340,532 UART: [rt]cmd =0x47544744, len=8
33,342,560 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,963 UART:
192,325 UART: Running Caliptra ROM ...
193,406 UART:
193,545 UART: [state] CFI Enabled
264,236 UART: [state] LifecycleState = Unprovisioned
266,137 UART: [state] DebugLocked = No
268,082 UART: [state] WD Timer not started. Device not locked for debugging
272,187 UART: [kat] SHA2-256
451,797 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,622 UART: [kat] ++
463,068 UART: [kat] sha1
474,869 UART: [kat] SHA2-256
477,589 UART: [kat] SHA2-384
483,804 UART: [kat] SHA2-512-ACC
486,165 UART: [kat] ECC-384
2,949,137 UART: [kat] HMAC-384Kdf
2,970,538 UART: [kat] LMS
3,447,001 UART: [kat] --
3,452,487 UART: [cold-reset] ++
3,454,411 UART: [fht] FHT @ 0x50003400
3,466,230 UART: [idev] ++
3,466,785 UART: [idev] CDI.KEYID = 6
3,467,818 UART: [idev] SUBJECT.KEYID = 7
3,468,985 UART: [idev] UDS.KEYID = 0
3,469,918 ready_for_fw is high
3,470,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,156 UART: [idev] Erasing UDS.KEYID = 0
5,988,682 UART: [idev] Sha1 KeyId Algorithm
6,012,832 UART: [idev] --
6,019,223 UART: [ldev] ++
6,019,798 UART: [ldev] CDI.KEYID = 6
6,020,684 UART: [ldev] SUBJECT.KEYID = 5
6,021,895 UART: [ldev] AUTHORITY.KEYID = 7
6,023,182 UART: [ldev] FE.KEYID = 1
6,057,631 UART: [ldev] Erasing FE.KEYID = 1
8,562,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,557 UART: [ldev] --
10,375,349 UART: [fwproc] Wait for Commands...
10,378,471 UART: [fwproc] Recv command 0x46574c44
10,380,502 UART: [fwproc] Recv'd Img size: 118548 bytes
13,866,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,805 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,050 >>> mbox cmd response: success
14,347,179 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,349,618 UART: [afmc] ++
14,350,194 UART: [afmc] CDI.KEYID = 6
14,351,209 UART: [afmc] SUBJECT.KEYID = 7
14,352,360 UART: [afmc] AUTHORITY.KEYID = 5
16,896,572 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,640,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,642,475 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,658,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,674,345 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,930 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,312 UART: [afmc] --
18,719,338 UART: [cold-reset] --
18,723,757 UART: [state] Locking Datavault
18,729,359 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,114 UART: [state] Locking ICCM
18,732,777 UART: [exit] Launching FMC @ 0x40000130
18,741,219 UART:
18,741,450 UART: Running Caliptra FMC ...
18,742,548 UART:
18,742,708 UART: [state] CFI Enabled
18,796,513 UART: [fht] FMC Alias Private Key: 7
20,562,880 UART: [art] Extend RT PCRs Done
20,564,112 UART: [art] Lock RT PCRs Done
20,565,736 UART: [art] Populate DV Done
20,571,038 UART: [fht] FMC Alias Private Key: 7
20,572,519 UART: [art] Derive CDI
20,573,275 UART: [art] Store in slot 0x4
20,629,157 UART: [art] Derive Key Pair
20,630,220 UART: [art] Store priv key in slot 0x5
23,093,500 UART: [art] Derive Key Pair - Done
23,106,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,490 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,021 UART: [art] PUB.X = D782F3D6140B6FA31F9154A75FBD6D329860C30F6C098949F5B8A16BC1D81C24A6BC2DAD366E0D3307B4D749DEAD4FFE
24,827,266 UART: [art] PUB.Y = C4405FD68D263D0EF31932A4FB377227C08A888B9EEFC1672BAE2AE83137ACBA28D41D37913D45C8FAB780A90BCDFE17
24,834,543 UART: [art] SIG.R = 2FA4AEE22C9B6E5965E2F5A0B1CD5AF23256F15E1735404000EF38B68E1FAF8DF852B41B72B090EF61C6C2CC4B1469F2
24,841,986 UART: [art] SIG.S = 5E9A34B87AA20E5AAEC49A73B6D3E3DFD0A61F563F488F86811D6A43EB3A91DEB8D4CC2907D9653EAE27DD4F8DC3AAF3
25,821,364 UART: Caliptra RT
25,822,057 UART: [state] CFI Enabled
26,002,142 UART: [rt] RT listening for mailbox commands...
26,033,822 UART: [rt]cmd =0x54514754, len=24
26,036,510 >>> mbox cmd response data (8 bytes)
26,037,565 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,067,797 UART: [rt]cmd =0x44504543, len=36
26,108,645 >>> mbox cmd response data (24 bytes)
26,109,273 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,139,129 UART: [rt]cmd =0x47544744, len=8
26,141,106 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,459,480 ready_for_fw is high
3,459,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,247,860 >>> mbox cmd response: success
14,249,300 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,535,445 UART:
18,535,826 UART: Running Caliptra FMC ...
18,537,014 UART:
18,537,185 UART: [state] CFI Enabled
18,605,778 UART: [fht] FMC Alias Private Key: 7
20,372,441 UART: [art] Extend RT PCRs Done
20,373,657 UART: [art] Lock RT PCRs Done
20,375,504 UART: [art] Populate DV Done
20,380,816 UART: [fht] FMC Alias Private Key: 7
20,382,514 UART: [art] Derive CDI
20,383,324 UART: [art] Store in slot 0x4
20,438,340 UART: [art] Derive Key Pair
20,439,329 UART: [art] Store priv key in slot 0x5
22,902,325 UART: [art] Derive Key Pair - Done
22,915,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,628,439 UART: [art] Erasing AUTHORITY.KEYID = 7
24,629,946 UART: [art] PUB.X = 7E6AA7954ACB6E73793EA96196DAE6BDEF2F7F6AD8BA471DC97F2DFD07EA7844F0F485BA262CCC6BB1D1643E44DAA0B2
24,637,191 UART: [art] PUB.Y = 83C72BBD6FADD34F3068DC9FDF83B2E2C15B68246E73DAD1B01B2C342A5716C72F0F9564B39474475AA18E7EB1834EC8
24,644,505 UART: [art] SIG.R = E6A63304861867791E67EDC182CA2AD1F1A75A1B6CD3AEE17DEE95272B50564A0EE32A6489771AABDC37E159BDFE3B55
24,651,899 UART: [art] SIG.S = AEA443B8E373A720FD07099E85C4570FD05F8E95B1840CAF1BB7E3307AC721F0837359806CFFE571FA3EEFD96EB187EE
25,630,485 UART: Caliptra RT
25,631,201 UART: [state] CFI Enabled
25,812,807 UART: [rt] RT listening for mailbox commands...
25,844,216 UART: [rt]cmd =0x54514754, len=24
25,846,900 >>> mbox cmd response data (8 bytes)
25,847,791 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,877,840 UART: [rt]cmd =0x44504543, len=36
25,918,514 >>> mbox cmd response data (24 bytes)
25,919,161 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,948,875 UART: [rt]cmd =0x47544744, len=8
25,950,917 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,467 UART:
192,822 UART: Running Caliptra ROM ...
194,003 UART:
603,514 UART: [state] CFI Enabled
619,968 UART: [state] LifecycleState = Unprovisioned
621,917 UART: [state] DebugLocked = No
623,452 UART: [state] WD Timer not started. Device not locked for debugging
628,201 UART: [kat] SHA2-256
807,887 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,693 UART: [kat] ++
819,228 UART: [kat] sha1
831,532 UART: [kat] SHA2-256
834,258 UART: [kat] SHA2-384
840,845 UART: [kat] SHA2-512-ACC
843,257 UART: [kat] ECC-384
3,282,989 UART: [kat] HMAC-384Kdf
3,295,998 UART: [kat] LMS
3,772,450 UART: [kat] --
3,777,582 UART: [cold-reset] ++
3,779,298 UART: [fht] FHT @ 0x50003400
3,790,703 UART: [idev] ++
3,791,280 UART: [idev] CDI.KEYID = 6
3,792,197 UART: [idev] SUBJECT.KEYID = 7
3,793,443 UART: [idev] UDS.KEYID = 0
3,794,497 ready_for_fw is high
3,794,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,549 UART: [idev] Erasing UDS.KEYID = 0
6,266,773 UART: [idev] Sha1 KeyId Algorithm
6,290,746 UART: [idev] --
6,296,235 UART: [ldev] ++
6,296,820 UART: [ldev] CDI.KEYID = 6
6,297,752 UART: [ldev] SUBJECT.KEYID = 5
6,298,971 UART: [ldev] AUTHORITY.KEYID = 7
6,300,206 UART: [ldev] FE.KEYID = 1
6,312,091 UART: [ldev] Erasing FE.KEYID = 1
8,789,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,892 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,989 UART: [ldev] --
10,581,763 UART: [fwproc] Wait for Commands...
10,583,758 UART: [fwproc] Recv command 0x46574c44
10,585,740 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,147,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,220,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,721 >>> mbox cmd response: success
14,549,805 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,553,002 UART: [afmc] ++
14,553,599 UART: [afmc] CDI.KEYID = 6
14,554,484 UART: [afmc] SUBJECT.KEYID = 7
14,555,759 UART: [afmc] AUTHORITY.KEYID = 5
17,058,851 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,780,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,782,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,798,318 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,814,382 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,968 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,676 UART: [afmc] --
18,857,599 UART: [cold-reset] --
18,859,945 UART: [state] Locking Datavault
18,863,626 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,399 UART: [state] Locking ICCM
18,866,933 UART: [exit] Launching FMC @ 0x40000130
18,875,381 UART:
18,875,619 UART: Running Caliptra FMC ...
18,876,720 UART:
18,876,880 UART: [state] CFI Enabled
18,885,088 UART: [fht] FMC Alias Private Key: 7
20,652,149 UART: [art] Extend RT PCRs Done
20,653,371 UART: [art] Lock RT PCRs Done
20,655,215 UART: [art] Populate DV Done
20,660,629 UART: [fht] FMC Alias Private Key: 7
20,662,114 UART: [art] Derive CDI
20,662,875 UART: [art] Store in slot 0x4
20,705,263 UART: [art] Derive Key Pair
20,706,308 UART: [art] Store priv key in slot 0x5
23,132,900 UART: [art] Derive Key Pair - Done
23,145,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,851,599 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,104 UART: [art] PUB.X = 7E8FE8A49FB8D8AFAF690DA6AEDEDD11F248BDB78E67866F237F7B446F20D33E3955DFDBE30D330503ECDF6B071D562E
24,860,414 UART: [art] PUB.Y = 2A9071CBDEFD9EB07B384A13A7531F5E52413F440836F6A04211A15A92AEF04AFE23CB980BDABF531B7F4E5F874197C1
24,867,697 UART: [art] SIG.R = F8CB496DB2F59D01B135D87273C7F7781DC3D9552C1CD88AC1EE1FE7460E848895B648AB2AACC206290A491D9B1D5563
24,875,089 UART: [art] SIG.S = A50C01A52EC895EF8DE8B61298A7B0D307A165B456B9ED30BDBC6FA22131F46CA3587542B6BEA636FE311376F16484DD
25,853,975 UART: Caliptra RT
25,854,684 UART: [state] CFI Enabled
25,986,483 UART: [rt] RT listening for mailbox commands...
26,018,336 UART: [rt]cmd =0x54514754, len=24
26,021,153 >>> mbox cmd response data (8 bytes)
26,022,067 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,052,404 UART: [rt]cmd =0x44504543, len=36
26,093,429 >>> mbox cmd response data (24 bytes)
26,094,051 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,123,793 UART: [rt]cmd =0x47544744, len=8
26,125,952 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,775,185 ready_for_fw is high
3,775,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,426,049 >>> mbox cmd response: success
14,427,252 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,671,141 UART:
18,671,530 UART: Running Caliptra FMC ...
18,672,636 UART:
18,672,793 UART: [state] CFI Enabled
18,680,956 UART: [fht] FMC Alias Private Key: 7
20,447,787 UART: [art] Extend RT PCRs Done
20,449,004 UART: [art] Lock RT PCRs Done
20,450,665 UART: [art] Populate DV Done
20,456,243 UART: [fht] FMC Alias Private Key: 7
20,457,796 UART: [art] Derive CDI
20,458,616 UART: [art] Store in slot 0x4
20,501,113 UART: [art] Derive Key Pair
20,502,160 UART: [art] Store priv key in slot 0x5
22,928,506 UART: [art] Derive Key Pair - Done
22,941,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,648,301 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,792 UART: [art] PUB.X = CDBE35B4320AACBD9AD57BBDE5758BC378EA6E940A0AB3A53D2D701D0335AD74C7AB8F3B905BC423F9430ED7306CEFD7
24,657,099 UART: [art] PUB.Y = B7D6D850F234C5CB6605AB818557C21B3B257AC4FCDA708B231978C406D48CC27D3A211DA7073B420E548F2A0432C322
24,664,349 UART: [art] SIG.R = 568842DD5C2AFC90DD7D0A8D53F74336295AE8235520C350CAC2600BA31D607E00F4724954CC588EDC55CD7EDC386904
24,671,704 UART: [art] SIG.S = E9171D251165ED1DC31DC408A7E56FDDF12DA5F0F12D2AA007560E443B07BD861EC21E3C7491B4EC604981D81FA5F374
25,649,886 UART: Caliptra RT
25,650,622 UART: [state] CFI Enabled
25,783,959 UART: [rt] RT listening for mailbox commands...
25,815,699 UART: [rt]cmd =0x54514754, len=24
25,818,235 >>> mbox cmd response data (8 bytes)
25,819,145 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
25,849,301 UART: [rt]cmd =0x44504543, len=36
25,889,943 >>> mbox cmd response data (24 bytes)
25,890,559 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
25,920,463 UART: [rt]cmd =0x47544744, len=8
25,922,550 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
192,074 UART:
192,441 UART: Running Caliptra ROM ...
193,544 UART:
193,688 UART: [state] CFI Enabled
265,493 UART: [state] LifecycleState = Unprovisioned
267,905 UART: [state] DebugLocked = No
270,502 UART: [state] WD Timer not started. Device not locked for debugging
274,888 UART: [kat] SHA2-256
464,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,495 UART: [kat] ++
475,981 UART: [kat] sha1
487,345 UART: [kat] SHA2-256
490,351 UART: [kat] SHA2-384
496,974 UART: [kat] SHA2-512-ACC
499,621 UART: [kat] ECC-384
2,947,436 UART: [kat] HMAC-384Kdf
2,972,603 UART: [kat] LMS
3,504,397 UART: [kat] --
3,509,405 UART: [cold-reset] ++
3,510,281 UART: [fht] FHT @ 0x50003400
3,522,819 UART: [idev] ++
3,523,451 UART: [idev] CDI.KEYID = 6
3,524,479 UART: [idev] SUBJECT.KEYID = 7
3,525,650 UART: [idev] UDS.KEYID = 0
3,526,591 ready_for_fw is high
3,526,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,857 UART: [idev] Erasing UDS.KEYID = 0
6,028,514 UART: [idev] Sha1 KeyId Algorithm
6,049,848 UART: [idev] --
6,053,764 UART: [ldev] ++
6,054,448 UART: [ldev] CDI.KEYID = 6
6,055,337 UART: [ldev] SUBJECT.KEYID = 5
6,056,497 UART: [ldev] AUTHORITY.KEYID = 7
6,057,649 UART: [ldev] FE.KEYID = 1
6,101,262 UART: [ldev] Erasing FE.KEYID = 1
8,606,097 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,800 UART: [ldev] --
10,414,986 UART: [fwproc] Wait for Commands...
10,417,512 UART: [fwproc] Recv command 0x46574c44
10,419,766 UART: [fwproc] Recv'd Img size: 118548 bytes
13,915,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,477 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,100 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,675,080 >>> mbox cmd response: success
14,676,121 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,678,602 UART: [afmc] ++
14,679,294 UART: [afmc] CDI.KEYID = 6
14,680,524 UART: [afmc] SUBJECT.KEYID = 7
14,681,959 UART: [afmc] AUTHORITY.KEYID = 5
17,209,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,937,875 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,939,797 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,954,948 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,984,973 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,008,719 UART: [afmc] --
19,012,792 UART: [cold-reset] --
19,016,335 UART: [state] Locking Datavault
19,021,141 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,273 UART: [state] Locking ICCM
19,024,969 UART: [exit] Launching FMC @ 0x40000130
19,033,634 UART:
19,033,871 UART: Running Caliptra FMC ...
19,034,973 UART:
19,035,130 UART: [state] CFI Enabled
19,094,972 UART: [fht] FMC Alias Private Key: 7
20,861,192 UART: [art] Extend RT PCRs Done
20,862,414 UART: [art] Lock RT PCRs Done
20,863,867 UART: [art] Populate DV Done
20,869,227 UART: [fht] FMC Alias Private Key: 7
20,870,925 UART: [art] Derive CDI
20,871,735 UART: [art] Store in slot 0x4
20,927,774 UART: [art] Derive Key Pair
20,928,806 UART: [art] Store priv key in slot 0x5
23,391,580 UART: [art] Derive Key Pair - Done
23,404,627 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,237 UART: [art] Erasing AUTHORITY.KEYID = 7
25,118,744 UART: [art] PUB.X = BCF2E92E657D36987F6CA40FA86559040B9923B6FA0EBE14AB3EA61E912F50A7A1FD77A7D3DF846898768176A8778477
25,125,990 UART: [art] PUB.Y = F9CECF5D5B6374EC9041AC523514794160E8C7C5C81DAC55D7D1674FB1B854D612632D2927BAD623566A1C69414DAF69
25,133,274 UART: [art] SIG.R = A380C1AB23618A19EC2A68DAA657C8BBA5BDC95D92EE9E63B4E1A6180943A0B2574C217B0DC269FE4AC658E32672A643
25,140,656 UART: [art] SIG.S = F95D7AABD12FDD86BF6B911B1456F8AAF6FBB9532A702141B735655BD071BFC5F70069EBE57B1E0C14512313B06690D6
26,119,729 UART: Caliptra RT
26,120,442 UART: [state] CFI Enabled
26,300,826 UART: [rt] RT listening for mailbox commands...
26,332,480 UART: [rt]cmd =0x54514754, len=24
26,335,010 >>> mbox cmd response data (8 bytes)
26,335,866 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,365,908 UART: [rt]cmd =0x44504543, len=36
26,404,981 >>> mbox cmd response data (24 bytes)
26,405,612 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,435,385 UART: [rt]cmd =0x47544744, len=8
26,437,275 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,874 writing to cptra_bootfsm_go
3,419,444 ready_for_fw is high
3,419,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,801,594 >>> mbox cmd response: success
14,802,977 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,110,146 UART:
19,110,533 UART: Running Caliptra FMC ...
19,111,678 UART:
19,111,838 UART: [state] CFI Enabled
19,176,851 UART: [fht] FMC Alias Private Key: 7
20,943,305 UART: [art] Extend RT PCRs Done
20,944,536 UART: [art] Lock RT PCRs Done
20,946,271 UART: [art] Populate DV Done
20,951,685 UART: [fht] FMC Alias Private Key: 7
20,953,232 UART: [art] Derive CDI
20,953,994 UART: [art] Store in slot 0x4
21,009,181 UART: [art] Derive Key Pair
21,010,223 UART: [art] Store priv key in slot 0x5
23,472,718 UART: [art] Derive Key Pair - Done
23,485,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,198,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,199,846 UART: [art] PUB.X = 373C4A6AB8F75A95C97F6D592AD55FF08647A2AB25F86C81A8091C02FC8C99FBADA176C425210A27AF2A0B8FBBF5E58F
25,207,141 UART: [art] PUB.Y = C75C32E3510CFC53A47516A583E96288116F8665E7D41EB58773D16B66A63F7DACD46626F070415CC08CF2F863AFA1E8
25,214,386 UART: [art] SIG.R = 13AC90FADD9DCB0876576CB4809F23EE507267992C54C8EC88A31F9C0CFF9239DC44E9F1284831E8D94C88D11CD695C3
25,221,773 UART: [art] SIG.S = 161B2EE1C4A2BFCB665793A685D31F45C6B1E6A4B7FD060E3D1DA88E851D744228C432822ADB31EBFF847933B91B418C
26,201,056 UART: Caliptra RT
26,201,777 UART: [state] CFI Enabled
26,380,275 UART: [rt] RT listening for mailbox commands...
26,411,803 UART: [rt]cmd =0x54514754, len=24
26,414,659 >>> mbox cmd response data (8 bytes)
26,415,625 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,445,957 UART: [rt]cmd =0x44504543, len=36
26,486,501 >>> mbox cmd response data (24 bytes)
26,487,122 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,516,838 UART: [rt]cmd =0x47544744, len=8
26,518,859 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,493 UART:
192,865 UART: Running Caliptra ROM ...
194,011 UART:
603,619 UART: [state] CFI Enabled
617,224 UART: [state] LifecycleState = Unprovisioned
619,604 UART: [state] DebugLocked = No
622,200 UART: [state] WD Timer not started. Device not locked for debugging
625,964 UART: [kat] SHA2-256
815,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,477 UART: [kat] ++
826,953 UART: [kat] sha1
838,044 UART: [kat] SHA2-256
841,062 UART: [kat] SHA2-384
848,110 UART: [kat] SHA2-512-ACC
850,720 UART: [kat] ECC-384
3,295,767 UART: [kat] HMAC-384Kdf
3,308,436 UART: [kat] LMS
3,840,252 UART: [kat] --
3,843,610 UART: [cold-reset] ++
3,845,618 UART: [fht] FHT @ 0x50003400
3,857,525 UART: [idev] ++
3,858,234 UART: [idev] CDI.KEYID = 6
3,859,145 UART: [idev] SUBJECT.KEYID = 7
3,860,390 UART: [idev] UDS.KEYID = 0
3,861,318 ready_for_fw is high
3,861,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,381 UART: [idev] Erasing UDS.KEYID = 0
6,337,888 UART: [idev] Sha1 KeyId Algorithm
6,360,683 UART: [idev] --
6,365,830 UART: [ldev] ++
6,366,609 UART: [ldev] CDI.KEYID = 6
6,367,530 UART: [ldev] SUBJECT.KEYID = 5
6,368,684 UART: [ldev] AUTHORITY.KEYID = 7
6,369,875 UART: [ldev] FE.KEYID = 1
6,380,337 UART: [ldev] Erasing FE.KEYID = 1
8,855,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,714 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,485 UART: [ldev] --
10,646,189 UART: [fwproc] Wait for Commands...
10,649,147 UART: [fwproc] Recv command 0x46574c44
10,651,458 UART: [fwproc] Recv'd Img size: 118548 bytes
14,140,211 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,221,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,345,022 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,905,168 >>> mbox cmd response: success
14,905,731 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,909,023 UART: [afmc] ++
14,909,726 UART: [afmc] CDI.KEYID = 6
14,910,973 UART: [afmc] SUBJECT.KEYID = 7
14,912,412 UART: [afmc] AUTHORITY.KEYID = 5
17,417,615 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,823 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,796 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,892 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,172,001 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,970 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,547 UART: [afmc] --
19,212,333 UART: [cold-reset] --
19,215,927 UART: [state] Locking Datavault
19,220,430 UART: [state] Locking PCR0, PCR1 and PCR31
19,222,594 UART: [state] Locking ICCM
19,224,426 UART: [exit] Launching FMC @ 0x40000130
19,233,057 UART:
19,233,299 UART: Running Caliptra FMC ...
19,234,403 UART:
19,234,566 UART: [state] CFI Enabled
19,242,567 UART: [fht] FMC Alias Private Key: 7
21,008,582 UART: [art] Extend RT PCRs Done
21,009,807 UART: [art] Lock RT PCRs Done
21,011,334 UART: [art] Populate DV Done
21,016,589 UART: [fht] FMC Alias Private Key: 7
21,018,186 UART: [art] Derive CDI
21,018,959 UART: [art] Store in slot 0x4
21,061,449 UART: [art] Derive Key Pair
21,062,455 UART: [art] Store priv key in slot 0x5
23,489,193 UART: [art] Derive Key Pair - Done
23,502,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,208,606 UART: [art] Erasing AUTHORITY.KEYID = 7
25,210,112 UART: [art] PUB.X = 54E7D3958A58118DA076F1AB84E9EA6EB2D8C0F185692B5555AD874A80434E2AED50709D3922A730BE45AA4A240B6845
25,217,391 UART: [art] PUB.Y = DAD1CEF50ACE6C1E7B73957E426FD0390D47616586620E6B73363CF3D192992E6BEF1E4C7957E15AEDE4FBC73C44AF81
25,224,639 UART: [art] SIG.R = EEC82949A0F7E55DBE14F386D26ADB55F7B6B89071BE6DBFA3F8B59A31554710526B09CE884F7E00CC75366ABE203559
25,231,996 UART: [art] SIG.S = 66C6127847CCBD608F0AEE1151AE6DA8F7942D26418E8BC1F4FA30E585591FCC53CA24C694CA72FF424C39ACDE7A1DE2
26,210,988 UART: Caliptra RT
26,211,675 UART: [state] CFI Enabled
26,344,398 UART: [rt] RT listening for mailbox commands...
26,376,012 UART: [rt]cmd =0x54514754, len=24
26,378,848 >>> mbox cmd response data (8 bytes)
26,379,942 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,410,169 UART: [rt]cmd =0x44504543, len=36
26,451,122 >>> mbox cmd response data (24 bytes)
26,451,762 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,481,707 UART: [rt]cmd =0x47544744, len=8
26,483,933 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,758,851 ready_for_fw is high
3,759,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,914 >>> mbox cmd response: success
15,054,558 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,306,880 UART:
19,307,272 UART: Running Caliptra FMC ...
19,308,385 UART:
19,308,541 UART: [state] CFI Enabled
19,316,501 UART: [fht] FMC Alias Private Key: 7
21,083,013 UART: [art] Extend RT PCRs Done
21,084,237 UART: [art] Lock RT PCRs Done
21,085,790 UART: [art] Populate DV Done
21,091,372 UART: [fht] FMC Alias Private Key: 7
21,093,024 UART: [art] Derive CDI
21,093,770 UART: [art] Store in slot 0x4
21,136,682 UART: [art] Derive Key Pair
21,137,726 UART: [art] Store priv key in slot 0x5
23,564,773 UART: [art] Derive Key Pair - Done
23,577,553 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,914 UART: [art] Erasing AUTHORITY.KEYID = 7
25,285,410 UART: [art] PUB.X = 9283717633C6B52F19591280A0B9E6F1EC2C64D53155BB44980F4A8474BADE07702EF7AB0451FEBAED106DDF69C2CAB5
25,292,691 UART: [art] PUB.Y = 5C2C2CD32466418519E67E8DAC6C5E7A5E134462BEEE7E648DE0F78963ECCFFB62B5D583D9882D5C369B59780682A615
25,299,963 UART: [art] SIG.R = 817AEC4199F9783E298F72814E7AAF27AC8965AB24588F232D000F4F20D7D787BDAA03FC0D10DE1CA16A5651757FB779
25,307,321 UART: [art] SIG.S = 28C6A51D510F729FC097F86A632A9F3133903BFC8C451F13E14EE33173FAB977C6FDDC3538B7F928654A62BA31B38086
26,286,094 UART: Caliptra RT
26,286,803 UART: [state] CFI Enabled
26,420,665 UART: [rt] RT listening for mailbox commands...
26,452,293 UART: [rt]cmd =0x54514754, len=24
26,455,045 >>> mbox cmd response data (8 bytes)
26,455,867 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
26,485,904 UART: [rt]cmd =0x44504543, len=36
26,525,837 >>> mbox cmd response data (24 bytes)
26,526,482 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,556,321 UART: [rt]cmd =0x47544744, len=8
26,558,486 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,197 UART: [kat] SHA2-256
892,135 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,652 UART: [kat] HMAC-384Kdf
907,120 UART: [kat] LMS
1,475,316 UART: [kat] --
1,476,381 UART: [cold-reset] ++
1,476,843 UART: [fht] Storing FHT @ 0x50003400
1,479,568 UART: [idev] ++
1,479,736 UART: [idev] CDI.KEYID = 6
1,480,096 UART: [idev] SUBJECT.KEYID = 7
1,480,520 UART: [idev] UDS.KEYID = 0
1,480,865 ready_for_fw is high
1,480,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,414 UART: [idev] Erasing UDS.KEYID = 0
1,504,828 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,507 UART: [ldev] ++
1,514,675 UART: [ldev] CDI.KEYID = 6
1,515,038 UART: [ldev] SUBJECT.KEYID = 5
1,515,464 UART: [ldev] AUTHORITY.KEYID = 7
1,515,927 UART: [ldev] FE.KEYID = 1
1,521,247 UART: [ldev] Erasing FE.KEYID = 1
1,546,722 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,622 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,322 UART: [ldev] --
1,585,799 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 118548 bytes
2,931,719 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,753 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,971 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,254 >>> mbox cmd response: success
3,130,254 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,384 UART: [afmc] ++
3,131,552 UART: [afmc] CDI.KEYID = 6
3,131,914 UART: [afmc] SUBJECT.KEYID = 7
3,132,339 UART: [afmc] AUTHORITY.KEYID = 5
3,166,984 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,593 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,476 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,159 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,035 UART: [afmc] --
3,209,925 UART: [cold-reset] --
3,210,715 UART: [state] Locking Datavault
3,211,720 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,324 UART: [state] Locking ICCM
3,212,970 UART: [exit] Launching FMC @ 0x40000130
3,218,300 UART:
3,218,316 UART: Running Caliptra FMC ...
3,218,724 UART:
3,218,778 UART: [state] CFI Enabled
3,229,442 UART: [fht] FMC Alias Private Key: 7
3,348,614 UART: [art] Extend RT PCRs Done
3,349,042 UART: [art] Lock RT PCRs Done
3,350,412 UART: [art] Populate DV Done
3,358,751 UART: [fht] FMC Alias Private Key: 7
3,359,897 UART: [art] Derive CDI
3,360,177 UART: [art] Store in slot 0x4
3,446,137 UART: [art] Derive Key Pair
3,446,497 UART: [art] Store priv key in slot 0x5
3,459,850 UART: [art] Derive Key Pair - Done
3,474,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,106 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,871 UART: [art] PUB.X = BAF49C143C03CD400CFD3AD95D929389890346EB3A7D881DDE683882997828507E564BC90F670C61303D057C0075EA45
3,497,597 UART: [art] PUB.Y = 65A9A9C4AFA454214F90B77A042D99697692FFFA9EC4CDE52BC20DC86D5FF101008D3B57AF77833C0C8C23C0C4DA8B9E
3,504,529 UART: [art] SIG.R = F89E3581AFBFEAC4A3DAD9F59DF0DC9948F303CEE994B61195C4BC893A86CD37399E6688B3C7B2030633787312F12E5C
3,511,300 UART: [art] SIG.S = 2F96F1CBE04AD3481E207B501409A46B3240FFA216985424A0BBD1D6614AD418400D9467D6CFC42A823B8FF7A6A606B8
3,534,627 UART: Caliptra RT
3,534,878 UART: [state] CFI Enabled
3,655,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,170 UART: [rt]cmd =0x54514754, len=24
3,688,281 >>> mbox cmd response data (8 bytes)
3,688,282 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,717,825 UART: [rt]cmd =0x44504543, len=36
3,758,848 >>> mbox cmd response data (24 bytes)
3,758,849 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,438 UART: [rt]cmd =0x47544744, len=8
3,790,069 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,437 ready_for_fw is high
1,363,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,140 >>> mbox cmd response: success
2,981,140 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,891 UART:
3,042,907 UART: Running Caliptra FMC ...
3,043,315 UART:
3,043,369 UART: [state] CFI Enabled
3,054,269 UART: [fht] FMC Alias Private Key: 7
3,172,867 UART: [art] Extend RT PCRs Done
3,173,295 UART: [art] Lock RT PCRs Done
3,174,787 UART: [art] Populate DV Done
3,182,928 UART: [fht] FMC Alias Private Key: 7
3,183,968 UART: [art] Derive CDI
3,184,248 UART: [art] Store in slot 0x4
3,269,656 UART: [art] Derive Key Pair
3,270,016 UART: [art] Store priv key in slot 0x5
3,282,575 UART: [art] Derive Key Pair - Done
3,297,573 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,120 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,885 UART: [art] PUB.X = F5B7379E1F83259647AE30085632BDCA35E674786343F437A7DED1E1EAC427C860D55834394CD9925F11D74D23A8CB0B
3,320,649 UART: [art] PUB.Y = B880786B4F8FF9D3BFBAF929B90C256235B594DC9FC65CEE7109B6419A5D10B9DE38FAE80E834CFD38710052BE46E9C1
3,327,582 UART: [art] SIG.R = 3665B82F30D010CF01B068F7D3CA9C121BCE45AE1A379E244CB8A35AF2C4185E1B079C4CA84C46C96C5194DA1EF93004
3,334,353 UART: [art] SIG.S = 598ECB85BCE08548AF2CF2D2DE1DAD69ED9A1EEBCC9992F3FBC1EF7F54B3CC00A249C8A3B8D4DEA6D6CDFB923104B3F6
3,358,210 UART: Caliptra RT
3,358,461 UART: [state] CFI Enabled
3,478,498 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,494 UART: [rt]cmd =0x54514754, len=24
3,511,423 >>> mbox cmd response data (8 bytes)
3,511,424 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,540,809 UART: [rt]cmd =0x44504543, len=36
3,580,838 >>> mbox cmd response data (24 bytes)
3,580,839 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,610,188 UART: [rt]cmd =0x47544744, len=8
3,611,897 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,906 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,622 UART: [kat] SHA2-256
882,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,668 UART: [kat] ++
886,820 UART: [kat] sha1
891,032 UART: [kat] SHA2-256
892,970 UART: [kat] SHA2-384
895,679 UART: [kat] SHA2-512-ACC
897,580 UART: [kat] ECC-384
903,157 UART: [kat] HMAC-384Kdf
907,981 UART: [kat] LMS
1,476,177 UART: [kat] --
1,477,134 UART: [cold-reset] ++
1,477,678 UART: [fht] Storing FHT @ 0x50003400
1,480,517 UART: [idev] ++
1,480,685 UART: [idev] CDI.KEYID = 6
1,481,045 UART: [idev] SUBJECT.KEYID = 7
1,481,469 UART: [idev] UDS.KEYID = 0
1,481,814 ready_for_fw is high
1,481,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,531 UART: [idev] Erasing UDS.KEYID = 0
1,506,251 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,849 UART: [idev] --
1,515,820 UART: [ldev] ++
1,515,988 UART: [ldev] CDI.KEYID = 6
1,516,351 UART: [ldev] SUBJECT.KEYID = 5
1,516,777 UART: [ldev] AUTHORITY.KEYID = 7
1,517,240 UART: [ldev] FE.KEYID = 1
1,522,300 UART: [ldev] Erasing FE.KEYID = 1
1,547,335 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,365 UART: [ldev] --
1,586,880 UART: [fwproc] Waiting for Commands...
1,587,513 UART: [fwproc] Received command 0x46574c44
1,588,304 UART: [fwproc] Received Image of size 118548 bytes
2,932,964 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,052 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,270 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,651 >>> mbox cmd response: success
3,131,651 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,132,895 UART: [afmc] ++
3,133,063 UART: [afmc] CDI.KEYID = 6
3,133,425 UART: [afmc] SUBJECT.KEYID = 7
3,133,850 UART: [afmc] AUTHORITY.KEYID = 5
3,169,293 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,815 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,595 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,304 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,187 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,870 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,690 UART: [afmc] --
3,212,806 UART: [cold-reset] --
3,213,610 UART: [state] Locking Datavault
3,214,831 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,435 UART: [state] Locking ICCM
3,215,909 UART: [exit] Launching FMC @ 0x40000130
3,221,239 UART:
3,221,255 UART: Running Caliptra FMC ...
3,221,663 UART:
3,221,806 UART: [state] CFI Enabled
3,232,432 UART: [fht] FMC Alias Private Key: 7
3,350,992 UART: [art] Extend RT PCRs Done
3,351,420 UART: [art] Lock RT PCRs Done
3,352,754 UART: [art] Populate DV Done
3,360,735 UART: [fht] FMC Alias Private Key: 7
3,361,785 UART: [art] Derive CDI
3,362,065 UART: [art] Store in slot 0x4
3,447,847 UART: [art] Derive Key Pair
3,448,207 UART: [art] Store priv key in slot 0x5
3,461,644 UART: [art] Derive Key Pair - Done
3,476,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,559 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,324 UART: [art] PUB.X = F6F837EF71D72E17D92952878CAE13CAD5C9035D6C1BD2AC3EFF43A4D2E3C10A7B8AA566555C63855F72F015EE9B76E0
3,499,102 UART: [art] PUB.Y = 62C5818CE85E227258789CAF4FA18704393D9CF83F6E6FD167784D7F3D112D33BC05329DBC0098875310A774B723408C
3,506,018 UART: [art] SIG.R = 92A63406107D7C24F6B99B3BB8A1B7D6B1BB7151947A3F5FFA2963B58A5BE82CE8A00CFCB7965C9A1CC8EC7256635107
3,512,789 UART: [art] SIG.S = 824AFDE208E689932E65C45338F9CC4454E170B43C4FE72F62B8750A910CBB3D2FAFE4144697CC209B755FFE563472F6
3,535,988 UART: Caliptra RT
3,536,331 UART: [state] CFI Enabled
3,656,940 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,366 UART: [rt]cmd =0x54514754, len=24
3,689,267 >>> mbox cmd response data (8 bytes)
3,689,268 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,718,779 UART: [rt]cmd =0x44504543, len=36
3,758,558 >>> mbox cmd response data (24 bytes)
3,758,559 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,788,020 UART: [rt]cmd =0x47544744, len=8
3,790,119 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,474 ready_for_fw is high
1,362,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,821 >>> mbox cmd response: success
2,981,821 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,116 UART:
3,043,132 UART: Running Caliptra FMC ...
3,043,540 UART:
3,043,683 UART: [state] CFI Enabled
3,054,023 UART: [fht] FMC Alias Private Key: 7
3,172,735 UART: [art] Extend RT PCRs Done
3,173,163 UART: [art] Lock RT PCRs Done
3,174,591 UART: [art] Populate DV Done
3,182,914 UART: [fht] FMC Alias Private Key: 7
3,184,016 UART: [art] Derive CDI
3,184,296 UART: [art] Store in slot 0x4
3,269,956 UART: [art] Derive Key Pair
3,270,316 UART: [art] Store priv key in slot 0x5
3,283,277 UART: [art] Derive Key Pair - Done
3,298,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,289 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,054 UART: [art] PUB.X = 11F84807A37205F4BCDECEF6615ACB22DB886294A572280FFAF8057F1CF6D8ACF40D00C54CE9D0AD71EB2F0C05AFDC1C
3,320,805 UART: [art] PUB.Y = D729E1078791065612D6658CA1B4CDCC36834C865AC23980388B5C00A4CB85505D94C20ED9F62A3A888065A536B63EA0
3,327,720 UART: [art] SIG.R = 95420B1853D32A498C6C2D741C30D4FDE92A08B1D5368F79AA2E747BC8CA7040757C1B42362C97C34437D4EA17BB39BD
3,334,488 UART: [art] SIG.S = 18E8D3CBB1DAF757E08AC9A54DFEE65715A8C901914DA8A5E6908116A56FA9F0B81DC0368459FEC7E9107EDB83BE3326
3,358,389 UART: Caliptra RT
3,358,732 UART: [state] CFI Enabled
3,479,454 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,136 UART: [rt]cmd =0x54514754, len=24
3,512,349 >>> mbox cmd response data (8 bytes)
3,512,350 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,861 UART: [rt]cmd =0x44504543, len=36
3,582,460 >>> mbox cmd response data (24 bytes)
3,582,461 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,024 UART: [rt]cmd =0x47544744, len=8
3,613,551 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,834 UART: [state] LifecycleState = Unprovisioned
85,489 UART: [state] DebugLocked = No
86,201 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,966 UART: [kat] ++
895,118 UART: [kat] sha1
899,546 UART: [kat] SHA2-256
901,486 UART: [kat] SHA2-384
904,061 UART: [kat] SHA2-512-ACC
905,962 UART: [kat] ECC-384
915,365 UART: [kat] HMAC-384Kdf
919,979 UART: [kat] LMS
1,168,291 UART: [kat] --
1,169,062 UART: [cold-reset] ++
1,169,440 UART: [fht] FHT @ 0x50003400
1,172,160 UART: [idev] ++
1,172,328 UART: [idev] CDI.KEYID = 6
1,172,689 UART: [idev] SUBJECT.KEYID = 7
1,173,114 UART: [idev] UDS.KEYID = 0
1,173,460 ready_for_fw is high
1,173,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,137 UART: [idev] Erasing UDS.KEYID = 0
1,198,497 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,344 UART: [ldev] ++
1,208,512 UART: [ldev] CDI.KEYID = 6
1,208,876 UART: [ldev] SUBJECT.KEYID = 5
1,209,303 UART: [ldev] AUTHORITY.KEYID = 7
1,209,766 UART: [ldev] FE.KEYID = 1
1,214,866 UART: [ldev] Erasing FE.KEYID = 1
1,240,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,704 UART: [ldev] --
1,280,061 UART: [fwproc] Wait for Commands...
1,280,840 UART: [fwproc] Recv command 0x46574c44
1,281,573 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,384 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,589 >>> mbox cmd response: success
2,823,589 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,824,747 UART: [afmc] ++
2,824,915 UART: [afmc] CDI.KEYID = 6
2,825,278 UART: [afmc] SUBJECT.KEYID = 7
2,825,704 UART: [afmc] AUTHORITY.KEYID = 5
2,861,609 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,683 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,274 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,975 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,710 UART: [afmc] --
2,904,683 UART: [cold-reset] --
2,905,549 UART: [state] Locking Datavault
2,906,716 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,320 UART: [state] Locking ICCM
2,907,984 UART: [exit] Launching FMC @ 0x40000130
2,913,314 UART:
2,913,330 UART: Running Caliptra FMC ...
2,913,738 UART:
2,913,792 UART: [state] CFI Enabled
2,923,854 UART: [fht] FMC Alias Private Key: 7
3,043,148 UART: [art] Extend RT PCRs Done
3,043,576 UART: [art] Lock RT PCRs Done
3,044,944 UART: [art] Populate DV Done
3,053,185 UART: [fht] FMC Alias Private Key: 7
3,054,289 UART: [art] Derive CDI
3,054,569 UART: [art] Store in slot 0x4
3,140,268 UART: [art] Derive Key Pair
3,140,628 UART: [art] Store priv key in slot 0x5
3,153,400 UART: [art] Derive Key Pair - Done
3,168,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,409 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,174 UART: [art] PUB.X = ED274820620D2DB8C1CAD71EF756BAE042744BCD2A78145041611324F335AC8E547388DD0D170E4BC176217A0C14A84E
3,190,934 UART: [art] PUB.Y = 53EC7985B153261C2BD6697549FA7F621A4C5E2A75956A8D7AEFE9EA5211C4B4309B7F90F88220818806AAA41C8CF8C8
3,197,885 UART: [art] SIG.R = 1E0190B6A35ADCE88387B922909F75ACD520E6F2B692E947D434EF697064A48C7E063BDFF26252BCF1E7B4BA47751FCC
3,204,659 UART: [art] SIG.S = 3C250EA5EEFF10A8186C48E4165ACEA18374FFC7B1789FE4FFE2273FD88832CBCE3123EB67CA9AC06E015CAD6130569B
3,228,379 UART: Caliptra RT
3,228,630 UART: [state] CFI Enabled
3,348,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,379,338 UART: [rt]cmd =0x54514754, len=24
3,381,539 >>> mbox cmd response data (8 bytes)
3,381,540 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,410,959 UART: [rt]cmd =0x44504543, len=36
3,451,046 >>> mbox cmd response data (24 bytes)
3,451,047 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,480,700 UART: [rt]cmd =0x47544744, len=8
3,482,389 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,262 ready_for_fw is high
1,059,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,068 >>> mbox cmd response: success
2,676,068 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,738,543 UART:
2,738,559 UART: Running Caliptra FMC ...
2,738,967 UART:
2,739,021 UART: [state] CFI Enabled
2,749,699 UART: [fht] FMC Alias Private Key: 7
2,868,885 UART: [art] Extend RT PCRs Done
2,869,313 UART: [art] Lock RT PCRs Done
2,870,891 UART: [art] Populate DV Done
2,879,378 UART: [fht] FMC Alias Private Key: 7
2,880,372 UART: [art] Derive CDI
2,880,652 UART: [art] Store in slot 0x4
2,965,815 UART: [art] Derive Key Pair
2,966,175 UART: [art] Store priv key in slot 0x5
2,979,567 UART: [art] Derive Key Pair - Done
2,994,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,428 UART: [art] PUB.X = 600D0CC53934DC25175BDBDF24E6BEBE5D4BB82CA2AC4C2EE8D142F07938237C6614933575EC96370D8E2DB3FD1DF952
3,017,203 UART: [art] PUB.Y = E07F9B27CC6445AD8DDD0634E6D9C1ABB8C26D9C698093FACE4BADB56CC6D4843997C3C2D797AA0404CD1CA9CDB143AC
3,024,170 UART: [art] SIG.R = 9B33E6C78A9B521CE62CED914673DCC846FB00E0B2D6F03D30B73C2BCBD6A9C8495D6E27DB993C6C2994DFBE74EBF181
3,030,938 UART: [art] SIG.S = 4F7C3BBF3229233A483BA7D7D28309AD63D2CC19FA9BF18B20D6234AB42ED169E870D6BBCBA9ADA7D8AA87364D112B99
3,054,059 UART: Caliptra RT
3,054,310 UART: [state] CFI Enabled
3,173,893 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,391 UART: [rt]cmd =0x54514754, len=24
3,206,632 >>> mbox cmd response data (8 bytes)
3,206,633 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,272 UART: [rt]cmd =0x44504543, len=36
3,277,093 >>> mbox cmd response data (24 bytes)
3,277,094 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,607 UART: [rt]cmd =0x47544744, len=8
3,308,168 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,637 UART: [state] LifecycleState = Unprovisioned
86,292 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,273 UART: [kat] SHA2-256
891,823 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,927 UART: [kat] ++
896,079 UART: [kat] sha1
900,323 UART: [kat] SHA2-256
902,263 UART: [kat] SHA2-384
905,104 UART: [kat] SHA2-512-ACC
907,005 UART: [kat] ECC-384
916,568 UART: [kat] HMAC-384Kdf
921,274 UART: [kat] LMS
1,169,586 UART: [kat] --
1,170,557 UART: [cold-reset] ++
1,171,119 UART: [fht] FHT @ 0x50003400
1,173,677 UART: [idev] ++
1,173,845 UART: [idev] CDI.KEYID = 6
1,174,206 UART: [idev] SUBJECT.KEYID = 7
1,174,631 UART: [idev] UDS.KEYID = 0
1,174,977 ready_for_fw is high
1,174,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,722 UART: [idev] Erasing UDS.KEYID = 0
1,199,560 UART: [idev] Sha1 KeyId Algorithm
1,208,424 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,027 UART: [ldev] Erasing FE.KEYID = 1
1,242,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,898 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,441 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,421 UART: [fwproc] Recv command 0x46574c44
1,283,154 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,067 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,183 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,394 >>> mbox cmd response: success
2,826,394 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,464 UART: [afmc] ++
2,827,632 UART: [afmc] CDI.KEYID = 6
2,827,995 UART: [afmc] SUBJECT.KEYID = 7
2,828,421 UART: [afmc] AUTHORITY.KEYID = 5
2,863,938 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,181 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,930 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,640 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,521 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,222 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,997 UART: [afmc] --
2,906,860 UART: [cold-reset] --
2,907,566 UART: [state] Locking Datavault
2,908,835 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,439 UART: [state] Locking ICCM
2,909,995 UART: [exit] Launching FMC @ 0x40000130
2,915,325 UART:
2,915,341 UART: Running Caliptra FMC ...
2,915,749 UART:
2,915,892 UART: [state] CFI Enabled
2,926,616 UART: [fht] FMC Alias Private Key: 7
3,046,124 UART: [art] Extend RT PCRs Done
3,046,552 UART: [art] Lock RT PCRs Done
3,047,810 UART: [art] Populate DV Done
3,055,749 UART: [fht] FMC Alias Private Key: 7
3,056,709 UART: [art] Derive CDI
3,056,989 UART: [art] Store in slot 0x4
3,142,708 UART: [art] Derive Key Pair
3,143,068 UART: [art] Store priv key in slot 0x5
3,156,514 UART: [art] Derive Key Pair - Done
3,171,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,867 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,632 UART: [art] PUB.X = 868AD0BA627850D32E11A1F98C8607FCDC1ACCA18512D5EA830E609349773AB2F885A31959A6645A71DAAB766186F826
3,194,398 UART: [art] PUB.Y = 64E9FD16E11DD47D21E48B8846E298563BE822BDD042AFCED6D54A7ADD3535DAAAFCD4DE55F219BE5CCF40B894B0D638
3,201,372 UART: [art] SIG.R = 9DFC6A205FD0EA5A12DDBFD26FCCB953D3DCD4E37B868644BE1C405CA7597C3C7613654270417B7972828DA36CBBFA6E
3,208,160 UART: [art] SIG.S = 5F3CB4ED48A2CC1649946BDF5CFBD57E88BACC17754DE3672C6146F2806610BB6B6660E48C1808A01F05A8308D926809
3,233,019 UART: Caliptra RT
3,233,362 UART: [state] CFI Enabled
3,352,829 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,529 UART: [rt]cmd =0x54514754, len=24
3,385,610 >>> mbox cmd response data (8 bytes)
3,385,611 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,415,300 UART: [rt]cmd =0x44504543, len=36
3,454,669 >>> mbox cmd response data (24 bytes)
3,454,670 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,791 UART: [rt]cmd =0x47544744, len=8
3,485,574 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,835 ready_for_fw is high
1,058,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,775 >>> mbox cmd response: success
2,679,775 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,942 UART:
2,741,958 UART: Running Caliptra FMC ...
2,742,366 UART:
2,742,509 UART: [state] CFI Enabled
2,753,039 UART: [fht] FMC Alias Private Key: 7
2,872,507 UART: [art] Extend RT PCRs Done
2,872,935 UART: [art] Lock RT PCRs Done
2,874,569 UART: [art] Populate DV Done
2,882,790 UART: [fht] FMC Alias Private Key: 7
2,883,894 UART: [art] Derive CDI
2,884,174 UART: [art] Store in slot 0x4
2,969,593 UART: [art] Derive Key Pair
2,969,953 UART: [art] Store priv key in slot 0x5
2,983,077 UART: [art] Derive Key Pair - Done
2,997,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,056 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,821 UART: [art] PUB.X = F7AE61243FBA142F7A23125007A2CF8B45AB075EA91A48FA64A6A3132912AD588E779CED030C74FB5D5823DF1B4114D9
3,020,587 UART: [art] PUB.Y = F7F2990327826A8754D34042C2D9B7024063B6E6188E5D41DCF1F0F59264B47AD128EF6C6C2EBB7F5ADA64D8495BBEDF
3,027,541 UART: [art] SIG.R = 796EC691047CAF470BC01BDA1459FAF60F6282B2DCCEDF65DE64BE0C4D38DC4AA498DFA8732024006914D07871988A46
3,034,287 UART: [art] SIG.S = 8E0CC1CA3B325E80F4BBC4F247C0756E1BADFABE9EBC4956B0A28CE0FE9C536370C4819E091988ED49DF72F972182FFA
3,058,893 UART: Caliptra RT
3,059,236 UART: [state] CFI Enabled
3,178,819 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,263 UART: [rt]cmd =0x54514754, len=24
3,211,346 >>> mbox cmd response data (8 bytes)
3,211,347 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,240,930 UART: [rt]cmd =0x44504543, len=36
3,281,449 >>> mbox cmd response data (24 bytes)
3,281,450 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,310,613 UART: [rt]cmd =0x47544744, len=8
3,312,188 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,608 UART: [kat] SHA2-256
893,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,383 UART: [kat] ++
897,535 UART: [kat] sha1
901,681 UART: [kat] SHA2-256
903,621 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,700 UART: [kat] LMS
1,171,028 UART: [kat] --
1,171,749 UART: [cold-reset] ++
1,172,233 UART: [fht] FHT @ 0x50003400
1,174,860 UART: [idev] ++
1,175,028 UART: [idev] CDI.KEYID = 6
1,175,388 UART: [idev] SUBJECT.KEYID = 7
1,175,812 UART: [idev] UDS.KEYID = 0
1,176,157 ready_for_fw is high
1,176,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,582 UART: [idev] Erasing UDS.KEYID = 0
1,200,531 UART: [idev] Sha1 KeyId Algorithm
1,208,985 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,450 UART: [ldev] SUBJECT.KEYID = 5
1,210,876 UART: [ldev] AUTHORITY.KEYID = 7
1,211,339 UART: [ldev] FE.KEYID = 1
1,216,453 UART: [ldev] Erasing FE.KEYID = 1
1,243,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,463 UART: [ldev] --
1,281,940 UART: [fwproc] Wait for Commands...
1,282,596 UART: [fwproc] Recv command 0x46574c44
1,283,324 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,416 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,783 >>> mbox cmd response: success
2,825,783 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,967 UART: [afmc] ++
2,827,135 UART: [afmc] CDI.KEYID = 6
2,827,497 UART: [afmc] SUBJECT.KEYID = 7
2,827,922 UART: [afmc] AUTHORITY.KEYID = 5
2,862,739 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,110 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,858 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,567 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,450 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,151 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,161 UART: [afmc] --
2,906,185 UART: [cold-reset] --
2,907,063 UART: [state] Locking Datavault
2,908,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,858 UART: [state] Locking ICCM
2,909,418 UART: [exit] Launching FMC @ 0x40000130
2,914,748 UART:
2,914,764 UART: Running Caliptra FMC ...
2,915,172 UART:
2,915,226 UART: [state] CFI Enabled
2,925,872 UART: [fht] FMC Alias Private Key: 7
3,044,412 UART: [art] Extend RT PCRs Done
3,044,840 UART: [art] Lock RT PCRs Done
3,046,534 UART: [art] Populate DV Done
3,054,849 UART: [fht] FMC Alias Private Key: 7
3,055,787 UART: [art] Derive CDI
3,056,067 UART: [art] Store in slot 0x4
3,142,070 UART: [art] Derive Key Pair
3,142,430 UART: [art] Store priv key in slot 0x5
3,156,288 UART: [art] Derive Key Pair - Done
3,171,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,311 UART: [art] PUB.X = F3EDC98D54296AD5EB6F0CA60C43C40934AFA231898B8B6C7202CD0BB337E24400D9051C682FDF3DB2C0692CC49FC4F3
3,194,055 UART: [art] PUB.Y = A02FB8FE0E412E9C7D6CBE5E8EBD177248B050465D0CDF93D75D2A488D5E295D79986898725D5BE9C47E2B705751B580
3,201,005 UART: [art] SIG.R = 0D3FA3811AABB19941155533F41B7258602CA4A935D9E54225ABB7CFD451BF0D298A7D8AAA2A6FC64BAB5EF7A9B29200
3,207,761 UART: [art] SIG.S = 3F11693DA1DCB16A1C16D4EB47BF17E0A418DB0E1F431E350780550229E549CAE791D6EC1E85BBFF7555B2B80873D920
3,231,765 UART: Caliptra RT
3,232,016 UART: [state] CFI Enabled
3,350,918 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,756 UART: [rt]cmd =0x54514754, len=24
3,384,057 >>> mbox cmd response data (8 bytes)
3,384,058 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,343 UART: [rt]cmd =0x44504543, len=36
3,454,330 >>> mbox cmd response data (24 bytes)
3,454,331 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,854 UART: [rt]cmd =0x47544744, len=8
3,485,585 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,445 ready_for_fw is high
1,060,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,810 >>> mbox cmd response: success
2,678,810 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,309 UART:
2,739,325 UART: Running Caliptra FMC ...
2,739,733 UART:
2,739,787 UART: [state] CFI Enabled
2,749,991 UART: [fht] FMC Alias Private Key: 7
2,869,665 UART: [art] Extend RT PCRs Done
2,870,093 UART: [art] Lock RT PCRs Done
2,871,391 UART: [art] Populate DV Done
2,879,756 UART: [fht] FMC Alias Private Key: 7
2,880,744 UART: [art] Derive CDI
2,881,024 UART: [art] Store in slot 0x4
2,966,733 UART: [art] Derive Key Pair
2,967,093 UART: [art] Store priv key in slot 0x5
2,979,605 UART: [art] Derive Key Pair - Done
2,994,365 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,652 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,417 UART: [art] PUB.X = EAC0374F0699758E7DC4CAB603348FD865329833B9A02BB15CC5F6B2687152E17AAF69F988ED1FB2FDE4179FC1949955
3,017,187 UART: [art] PUB.Y = 2D587D8C42197E45956D472FA8329EB5EEFCDCDA12335DB22AC97D50205C5540412EAD982750E3C4CF0F702B08818E15
3,024,135 UART: [art] SIG.R = 9C0153211A9ABBB7FA925E9DA092018AA036DC84ADBD3B0FF6210DD1686DB5385E3788DB9804D906A1E3499D7FD2ED27
3,030,899 UART: [art] SIG.S = C5CDA61613353AEDB9F294F4281E68506CF7C91A8DF653B0A33EAB6F95F81A2AEEF30DAEF4B3AF3B5472038C198CCDF5
3,054,491 UART: Caliptra RT
3,054,742 UART: [state] CFI Enabled
3,174,260 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,580 UART: [rt]cmd =0x54514754, len=24
3,206,883 >>> mbox cmd response data (8 bytes)
3,206,884 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,236,375 UART: [rt]cmd =0x44504543, len=36
3,277,508 >>> mbox cmd response data (24 bytes)
3,277,509 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,306,860 UART: [rt]cmd =0x47544744, len=8
3,308,539 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
88,037 UART: [kat] SHA2-256
893,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,812 UART: [kat] ++
897,964 UART: [kat] sha1
902,044 UART: [kat] SHA2-256
903,984 UART: [kat] SHA2-384
906,817 UART: [kat] SHA2-512-ACC
908,718 UART: [kat] ECC-384
918,439 UART: [kat] HMAC-384Kdf
923,197 UART: [kat] LMS
1,171,525 UART: [kat] --
1,172,448 UART: [cold-reset] ++
1,172,876 UART: [fht] FHT @ 0x50003400
1,175,693 UART: [idev] ++
1,175,861 UART: [idev] CDI.KEYID = 6
1,176,221 UART: [idev] SUBJECT.KEYID = 7
1,176,645 UART: [idev] UDS.KEYID = 0
1,176,990 ready_for_fw is high
1,176,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,518 UART: [idev] --
1,210,398 UART: [ldev] ++
1,210,566 UART: [ldev] CDI.KEYID = 6
1,210,929 UART: [ldev] SUBJECT.KEYID = 5
1,211,355 UART: [ldev] AUTHORITY.KEYID = 7
1,211,818 UART: [ldev] FE.KEYID = 1
1,217,018 UART: [ldev] Erasing FE.KEYID = 1
1,243,667 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,578 UART: [ldev] --
1,283,065 UART: [fwproc] Wait for Commands...
1,283,669 UART: [fwproc] Recv command 0x46574c44
1,284,397 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,083 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,253 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,420 >>> mbox cmd response: success
2,827,420 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,828,458 UART: [afmc] ++
2,828,626 UART: [afmc] CDI.KEYID = 6
2,828,988 UART: [afmc] SUBJECT.KEYID = 7
2,829,413 UART: [afmc] AUTHORITY.KEYID = 5
2,864,814 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,648 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,531 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,232 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,088 UART: [afmc] --
2,908,058 UART: [cold-reset] --
2,908,938 UART: [state] Locking Datavault
2,910,119 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,723 UART: [state] Locking ICCM
2,911,277 UART: [exit] Launching FMC @ 0x40000130
2,916,607 UART:
2,916,623 UART: Running Caliptra FMC ...
2,917,031 UART:
2,917,174 UART: [state] CFI Enabled
2,927,888 UART: [fht] FMC Alias Private Key: 7
3,046,536 UART: [art] Extend RT PCRs Done
3,046,964 UART: [art] Lock RT PCRs Done
3,047,976 UART: [art] Populate DV Done
3,056,221 UART: [fht] FMC Alias Private Key: 7
3,057,161 UART: [art] Derive CDI
3,057,441 UART: [art] Store in slot 0x4
3,143,682 UART: [art] Derive Key Pair
3,144,042 UART: [art] Store priv key in slot 0x5
3,157,416 UART: [art] Derive Key Pair - Done
3,172,282 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,556 UART: [art] PUB.X = 71491C815ADFD5B5590CD4F25B330E97B5FEBE2A45931BAF5B31418E2F304265A3A5DCB77DDA1AAE790ECFFB5C831F71
3,195,337 UART: [art] PUB.Y = B67DF99187AFD79208C05AEBC7BB6B45DB531A0700195F5A1279C74EF200232D83C6B85B07302258B5AD699588C5C7D4
3,202,236 UART: [art] SIG.R = 75BA082398CA225975AD0EAE087121A3EB666449A5A6942F738D71677942EB5A88B9C38E3B3FD9326556F08B38DF511F
3,208,995 UART: [art] SIG.S = 7C47444650342247D39B1F544D80FE25F9FF5F164B15F2D6EC9F6A1DF6FD08E0E1800C26A9F89C2160E8B49C257FC130
3,232,771 UART: Caliptra RT
3,233,114 UART: [state] CFI Enabled
3,352,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,076 UART: [rt]cmd =0x54514754, len=24
3,385,081 >>> mbox cmd response data (8 bytes)
3,385,082 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,605 UART: [rt]cmd =0x44504543, len=36
3,455,754 >>> mbox cmd response data (24 bytes)
3,455,755 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,485,184 UART: [rt]cmd =0x47544744, len=8
3,486,911 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,978 ready_for_fw is high
1,059,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,383 >>> mbox cmd response: success
2,679,383 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,420 UART:
2,742,436 UART: Running Caliptra FMC ...
2,742,844 UART:
2,742,987 UART: [state] CFI Enabled
2,753,499 UART: [fht] FMC Alias Private Key: 7
2,872,679 UART: [art] Extend RT PCRs Done
2,873,107 UART: [art] Lock RT PCRs Done
2,874,953 UART: [art] Populate DV Done
2,883,482 UART: [fht] FMC Alias Private Key: 7
2,884,556 UART: [art] Derive CDI
2,884,836 UART: [art] Store in slot 0x4
2,970,559 UART: [art] Derive Key Pair
2,970,919 UART: [art] Store priv key in slot 0x5
2,984,565 UART: [art] Derive Key Pair - Done
2,999,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,675 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,440 UART: [art] PUB.X = 7D07A150F30C9B88F43D5A078826B6EF48638B0DFD040D8AACC088DF606F289C1CEF30C6E2A9F025625DD9A63D3F4D5A
3,022,206 UART: [art] PUB.Y = 3682AF95259D656B5FA7720D36DB9951836DAA32087DD5BC5C2E56B8B58F43F63FE903EF2E3CD8894F71389E34856B8A
3,029,151 UART: [art] SIG.R = BA69D84D59A2A3109D4DFD11B53CCD0F8F46DF4BC41EF97FA27006B1DE9BA74AC40E73E48F7D69E30CC74013202EA8AC
3,035,931 UART: [art] SIG.S = 81D3F0F74A1CAAD052565DF4BE4BDF28A8FDB8DAC15A344236D159D4FCE4BF17E08A922BBA076679C66EFC3763392E12
3,059,684 UART: Caliptra RT
3,060,027 UART: [state] CFI Enabled
3,180,243 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,737 UART: [rt]cmd =0x54514754, len=24
3,212,906 >>> mbox cmd response data (8 bytes)
3,212,907 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,242,250 UART: [rt]cmd =0x44504543, len=36
3,283,263 >>> mbox cmd response data (24 bytes)
3,283,264 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,312,643 UART: [rt]cmd =0x47544744, len=8
3,314,226 >>> mbox cmd response: failed
test test_tagging::test_tagging_destroyed_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,037 writing to cptra_bootfsm_go
192,144 UART:
192,495 UART: Running Caliptra ROM ...
193,683 UART:
193,840 UART: [state] CFI Enabled
263,449 UART: [state] LifecycleState = Unprovisioned
265,446 UART: [state] DebugLocked = No
268,260 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,988 UART: [kat] SHA2-256
442,673 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,151 UART: [kat] ++
453,711 UART: [kat] sha1
465,441 UART: [kat] SHA2-256
468,098 UART: [kat] SHA2-384
475,161 UART: [kat] SHA2-512-ACC
477,537 UART: [kat] ECC-384
2,769,813 UART: [kat] HMAC-384Kdf
2,798,348 UART: [kat] LMS
3,988,600 UART: [kat] --
3,993,540 UART: [cold-reset] ++
3,994,834 UART: [fht] Storing FHT @ 0x50003400
4,005,625 UART: [idev] ++
4,006,196 UART: [idev] CDI.KEYID = 6
4,007,232 UART: [idev] SUBJECT.KEYID = 7
4,008,408 UART: [idev] UDS.KEYID = 0
4,009,452 ready_for_fw is high
4,009,654 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,755 UART: [idev] Erasing UDS.KEYID = 0
7,347,387 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,999 UART: [idev] --
7,373,406 UART: [ldev] ++
7,373,975 UART: [ldev] CDI.KEYID = 6
7,374,939 UART: [ldev] SUBJECT.KEYID = 5
7,376,159 UART: [ldev] AUTHORITY.KEYID = 7
7,377,396 UART: [ldev] FE.KEYID = 1
7,421,877 UART: [ldev] Erasing FE.KEYID = 1
10,752,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,555 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,106 UART: [ldev] --
13,115,161 UART: [fwproc] Waiting for Commands...
13,117,848 UART: [fwproc] Received command 0x46574c44
13,120,029 UART: [fwproc] Received Image of size 118548 bytes
17,221,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,208 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,358 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,694,220 >>> mbox cmd response: success
17,695,241 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,698,779 UART: [afmc] ++
17,699,367 UART: [afmc] CDI.KEYID = 6
17,700,333 UART: [afmc] SUBJECT.KEYID = 7
17,701,570 UART: [afmc] AUTHORITY.KEYID = 5
21,069,625 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,488 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,374,803 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,217 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,403,936 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,363 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,463 UART: [afmc] --
23,444,383 UART: [cold-reset] --
23,448,998 UART: [state] Locking Datavault
23,455,967 UART: [state] Locking PCR0, PCR1 and PCR31
23,457,718 UART: [state] Locking ICCM
23,460,242 UART: [exit] Launching FMC @ 0x40000130
23,468,645 UART:
23,468,880 UART: Running Caliptra FMC ...
23,469,983 UART:
23,470,165 UART: [state] CFI Enabled
23,531,943 UART: [fht] FMC Alias Private Key: 7
25,872,773 UART: [art] Extend RT PCRs Done
25,873,993 UART: [art] Lock RT PCRs Done
25,875,832 UART: [art] Populate DV Done
25,881,406 UART: [fht] FMC Alias Private Key: 7
25,883,108 UART: [art] Derive CDI
25,883,918 UART: [art] Store in slot 0x4
25,940,669 UART: [art] Derive Key Pair
25,941,708 UART: [art] Store priv key in slot 0x5
29,234,735 UART: [art] Derive Key Pair - Done
29,247,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,048 UART: [art] Erasing AUTHORITY.KEYID = 7
31,538,556 UART: [art] PUB.X = DAD15BC5520803A6FC5E8311C03B51DCB229E02CBC9D7F1710D06E71C07307D5B906557674DCE09C34B9B4993777CBBE
31,545,794 UART: [art] PUB.Y = 8260656DCCD7F76881AE3DEA3FE26214BA5400C157887C7EFB2E0F5F342CEE92548C9B6B43327FD4F01D2FC956336D8A
31,553,067 UART: [art] SIG.R = 8B649A18385ADAFD783A9BCCEC0B8D187B45B9F8C8A4F88B61FB26643999DD326DBCA0738537B16AC8EF2830D0DADC84
31,560,480 UART: [art] SIG.S = 848C83DD8B4F45D65F0AEC26D305E65442006A7D4B6CAD1C3C5BADC147A7FD5C45809F34FA33716ACDB3BB5055884348
32,865,655 UART: Caliptra RT
32,866,352 UART: [state] CFI Enabled
33,043,493 UART: [rt] RT listening for mailbox commands...
33,075,037 UART: [rt]cmd =0x54514754, len=24
33,077,289 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,781,401 ready_for_fw is high
3,781,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,946,143 >>> mbox cmd response: success
17,947,504 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,636,769 UART:
23,637,180 UART: Running Caliptra FMC ...
23,638,293 UART:
23,638,444 UART: [state] CFI Enabled
23,703,801 UART: [fht] FMC Alias Private Key: 7
26,044,638 UART: [art] Extend RT PCRs Done
26,045,866 UART: [art] Lock RT PCRs Done
26,047,413 UART: [art] Populate DV Done
26,052,779 UART: [fht] FMC Alias Private Key: 7
26,054,323 UART: [art] Derive CDI
26,055,061 UART: [art] Store in slot 0x4
26,112,088 UART: [art] Derive Key Pair
26,113,136 UART: [art] Store priv key in slot 0x5
29,405,982 UART: [art] Derive Key Pair - Done
29,418,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,706,899 UART: [art] Erasing AUTHORITY.KEYID = 7
31,708,409 UART: [art] PUB.X = 6F57B75A7D48B0BFAF132FC38370B906FC60AB3325EA78E859E005EBE12B48D67E7687F4719266461B2C39C992A1E857
31,715,660 UART: [art] PUB.Y = C7079E7207E2AEAB4E09EDE2A0735A310869E956531A2A5C0E68D9E3443000AD83AA0996E1DB147F81FAA8B08E114BAF
31,722,900 UART: [art] SIG.R = 3C7C546C23C137E099590A179F1038E5545CA0B447B6C2A5EA5239C53400167C9D8E4448AA278EAE88DC2D7E458BAD79
31,730,285 UART: [art] SIG.S = 46EA4E25695748008D7207ADA469DD93AB8FA4D8C0EA8C75982461B847D509505BE14C4875D3488837B53EB0722D2F10
33,036,012 UART: Caliptra RT
33,036,746 UART: [state] CFI Enabled
33,232,144 UART: [rt] RT listening for mailbox commands...
33,263,728 UART: [rt]cmd =0x54514754, len=24
33,266,184 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
192,283 UART:
192,645 UART: Running Caliptra ROM ...
193,956 UART:
603,654 UART: [state] CFI Enabled
620,142 UART: [state] LifecycleState = Unprovisioned
622,090 UART: [state] DebugLocked = No
624,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,476 UART: [kat] SHA2-256
799,199 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,788 UART: [kat] ++
810,312 UART: [kat] sha1
821,189 UART: [kat] SHA2-256
823,907 UART: [kat] SHA2-384
828,992 UART: [kat] SHA2-512-ACC
831,251 UART: [kat] ECC-384
3,117,631 UART: [kat] HMAC-384Kdf
3,128,810 UART: [kat] LMS
4,318,908 UART: [kat] --
4,324,754 UART: [cold-reset] ++
4,326,192 UART: [fht] Storing FHT @ 0x50003400
4,336,316 UART: [idev] ++
4,336,872 UART: [idev] CDI.KEYID = 6
4,337,789 UART: [idev] SUBJECT.KEYID = 7
4,339,027 UART: [idev] UDS.KEYID = 0
4,340,069 ready_for_fw is high
4,340,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,612 UART: [idev] Erasing UDS.KEYID = 0
7,624,936 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,807 UART: [idev] --
7,649,084 UART: [ldev] ++
7,649,663 UART: [ldev] CDI.KEYID = 6
7,650,625 UART: [ldev] SUBJECT.KEYID = 5
7,651,858 UART: [ldev] AUTHORITY.KEYID = 7
7,653,086 UART: [ldev] FE.KEYID = 1
7,662,703 UART: [ldev] Erasing FE.KEYID = 1
10,949,154 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,724 UART: [ldev] --
13,310,236 UART: [fwproc] Waiting for Commands...
13,313,288 UART: [fwproc] Received command 0x46574c44
13,315,528 UART: [fwproc] Received Image of size 118548 bytes
17,421,185 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,497,615 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,570,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,784 >>> mbox cmd response: success
17,900,894 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
17,904,845 UART: [afmc] ++
17,905,423 UART: [afmc] CDI.KEYID = 6
17,906,330 UART: [afmc] SUBJECT.KEYID = 7
17,907,596 UART: [afmc] AUTHORITY.KEYID = 5
21,221,380 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,343 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,999 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,772 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,208 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,908 UART: [afmc] --
23,586,392 UART: [cold-reset] --
23,590,895 UART: [state] Locking Datavault
23,596,949 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,702 UART: [state] Locking ICCM
23,600,919 UART: [exit] Launching FMC @ 0x40000130
23,609,309 UART:
23,609,537 UART: Running Caliptra FMC ...
23,610,628 UART:
23,610,778 UART: [state] CFI Enabled
23,619,030 UART: [fht] FMC Alias Private Key: 7
25,959,178 UART: [art] Extend RT PCRs Done
25,960,390 UART: [art] Lock RT PCRs Done
25,962,225 UART: [art] Populate DV Done
25,967,790 UART: [fht] FMC Alias Private Key: 7
25,969,495 UART: [art] Derive CDI
25,970,309 UART: [art] Store in slot 0x4
26,012,422 UART: [art] Derive Key Pair
26,013,424 UART: [art] Store priv key in slot 0x5
29,255,452 UART: [art] Derive Key Pair - Done
29,268,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,549,746 UART: [art] PUB.X = A59CA25F59654630E27E895D8821C886905E9F6A320599B9187FBCB48A2EE2E1DFC3954B0F02086879C7B10684538870
31,556,829 UART: [art] PUB.Y = C171314D1612FE759B5E6174B48CE1DB66A841B2A0448CAE79BECC72860FE9125A7661F1787D695A6099A0DC229283AA
31,564,051 UART: [art] SIG.R = AD731EFB6BAEC7EF7FF1B388A3F5AF5D36201923B1CD33917B9007FEAE944BECFCFD3DC6CA72499671FC05314C41CB4E
31,571,496 UART: [art] SIG.S = 934FC10CC8A733549A97EAC25A7BF0C241E1FEC2A615974FA47AC94150080C2272A125322C24351ABAD7C0DAB8CE4F82
32,876,520 UART: Caliptra RT
32,877,223 UART: [state] CFI Enabled
33,009,959 UART: [rt] RT listening for mailbox commands...
33,041,438 UART: [rt]cmd =0x54514754, len=24
33,043,945 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,174 writing to cptra_bootfsm_go
4,126,288 ready_for_fw is high
4,126,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,143,355 >>> mbox cmd response: success
18,144,735 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
23,780,672 UART:
23,781,048 UART: Running Caliptra FMC ...
23,782,187 UART:
23,782,362 UART: [state] CFI Enabled
23,789,881 UART: [fht] FMC Alias Private Key: 7
26,130,925 UART: [art] Extend RT PCRs Done
26,132,140 UART: [art] Lock RT PCRs Done
26,134,150 UART: [art] Populate DV Done
26,139,513 UART: [fht] FMC Alias Private Key: 7
26,141,102 UART: [art] Derive CDI
26,141,913 UART: [art] Store in slot 0x4
26,184,648 UART: [art] Derive Key Pair
26,185,683 UART: [art] Store priv key in slot 0x5
29,427,455 UART: [art] Derive Key Pair - Done
29,440,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,472 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,977 UART: [art] PUB.X = 564075ED15BF0BF0AD3EC24C112A4C28802D930CEEECD092F8DF3CC9E16EC6F615E3C55671974EB971EDD200E9A31B7F
31,729,226 UART: [art] PUB.Y = 44A234621A66EA921CFD4AC1BC47446206A0B6800B726F81A8D7D6C997CE8BBBECC7A5F399B86910F165FFA65823CBD2
31,736,471 UART: [art] SIG.R = FD47D3D834E16C2BA49BA1021A3D188A074C2AB0CA1F5B2F48511ADA016279A2FC7DF7DBAA64E0138E655E71C71AE500
31,743,887 UART: [art] SIG.S = C095404D24D8C5C0C7F2709A7C287DF60AC122ABF8F530630DF87BA768F62547C6C07E70C15C5CC0887A8C8912D4192F
33,048,814 UART: Caliptra RT
33,049,526 UART: [state] CFI Enabled
33,182,905 UART: [rt] RT listening for mailbox commands...
33,214,689 UART: [rt]cmd =0x54514754, len=24
33,217,144 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,150 UART:
192,507 UART: Running Caliptra ROM ...
193,682 UART:
193,833 UART: [state] CFI Enabled
262,780 UART: [state] LifecycleState = Unprovisioned
264,764 UART: [state] DebugLocked = No
266,939 UART: [state] WD Timer not started. Device not locked for debugging
270,695 UART: [kat] SHA2-256
450,343 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,177 UART: [kat] ++
461,713 UART: [kat] sha1
473,672 UART: [kat] SHA2-256
476,380 UART: [kat] SHA2-384
481,794 UART: [kat] SHA2-512-ACC
484,157 UART: [kat] ECC-384
2,945,205 UART: [kat] HMAC-384Kdf
2,970,735 UART: [kat] LMS
3,447,233 UART: [kat] --
3,451,829 UART: [cold-reset] ++
3,453,335 UART: [fht] FHT @ 0x50003400
3,464,521 UART: [idev] ++
3,465,148 UART: [idev] CDI.KEYID = 6
3,466,051 UART: [idev] SUBJECT.KEYID = 7
3,467,291 UART: [idev] UDS.KEYID = 0
3,468,337 ready_for_fw is high
3,468,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,609 UART: [idev] Erasing UDS.KEYID = 0
5,987,799 UART: [idev] Sha1 KeyId Algorithm
6,012,076 UART: [idev] --
6,016,191 UART: [ldev] ++
6,016,776 UART: [ldev] CDI.KEYID = 6
6,017,693 UART: [ldev] SUBJECT.KEYID = 5
6,018,903 UART: [ldev] AUTHORITY.KEYID = 7
6,020,135 UART: [ldev] FE.KEYID = 1
6,058,539 UART: [ldev] Erasing FE.KEYID = 1
8,568,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,938 UART: [ldev] --
10,374,970 UART: [fwproc] Wait for Commands...
10,377,823 UART: [fwproc] Recv command 0x46574c44
10,379,877 UART: [fwproc] Recv'd Img size: 118548 bytes
13,869,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,177 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,357,094 >>> mbox cmd response: success
14,358,197 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,361,192 UART: [afmc] ++
14,361,817 UART: [afmc] CDI.KEYID = 6
14,362,729 UART: [afmc] SUBJECT.KEYID = 7
14,363,939 UART: [afmc] AUTHORITY.KEYID = 5
16,894,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,213 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,638,395 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,278 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,685,837 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,008 UART: [afmc] --
18,715,358 UART: [cold-reset] --
18,718,832 UART: [state] Locking Datavault
18,724,930 UART: [state] Locking PCR0, PCR1 and PCR31
18,726,628 UART: [state] Locking ICCM
18,729,045 UART: [exit] Launching FMC @ 0x40000130
18,737,492 UART:
18,737,722 UART: Running Caliptra FMC ...
18,738,817 UART:
18,738,974 UART: [state] CFI Enabled
18,795,093 UART: [fht] FMC Alias Private Key: 7
20,582,521 UART: [art] Extend RT PCRs Done
20,583,739 UART: [art] Lock RT PCRs Done
20,585,132 UART: [art] Populate DV Done
20,590,593 UART: [fht] FMC Alias Private Key: 7
20,592,240 UART: [art] Derive CDI
20,593,069 UART: [art] Store in slot 0x4
20,648,738 UART: [art] Derive Key Pair
20,649,776 UART: [art] Store priv key in slot 0x5
23,113,039 UART: [art] Derive Key Pair - Done
23,125,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,839,327 UART: [art] Erasing AUTHORITY.KEYID = 7
24,840,985 UART: [art] PUB.X = CDA1954953B202E6EE04367CC65C69E4BE11F05FF5AC4CA0895ACB03048710F57840B38D8B98FA298C090EEC6B9149B7
24,848,140 UART: [art] PUB.Y = 76CF11CF3E426FE4EF12AAFFD133E6B94271CC3731FA02DEB9412EC9CB0CE158411FB15F529C7DAE1D6415716629F015
24,855,373 UART: [art] SIG.R = EDBB03D9808944791C730018325CC338048CC0AB4BE35038AB3E3A928F70C7469266F24E6923813F20269FC2CA69EA0D
24,862,708 UART: [art] SIG.S = EA600225E04DA4B1AF726877AB979747D7ADBE9435F1C781C0E93EA2ABE752145855BD9AFF114AA110C27D616211FF08
25,841,584 UART: Caliptra RT
25,842,316 UART: [state] CFI Enabled
26,024,690 UART: [rt] RT listening for mailbox commands...
26,056,213 UART: [rt]cmd =0x54514754, len=24
26,058,974 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,465,620 ready_for_fw is high
3,466,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,242,660 >>> mbox cmd response: success
14,243,832 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,537,865 UART:
18,538,258 UART: Running Caliptra FMC ...
18,539,398 UART:
18,539,561 UART: [state] CFI Enabled
18,607,678 UART: [fht] FMC Alias Private Key: 7
20,374,479 UART: [art] Extend RT PCRs Done
20,375,707 UART: [art] Lock RT PCRs Done
20,377,382 UART: [art] Populate DV Done
20,382,743 UART: [fht] FMC Alias Private Key: 7
20,384,444 UART: [art] Derive CDI
20,385,260 UART: [art] Store in slot 0x4
20,439,955 UART: [art] Derive Key Pair
20,440,989 UART: [art] Store priv key in slot 0x5
22,903,643 UART: [art] Derive Key Pair - Done
22,916,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,630,367 UART: [art] Erasing AUTHORITY.KEYID = 7
24,631,906 UART: [art] PUB.X = 5C3C4C43088B7BBF968323C4AD50F90218AA6122EA8D6B1471A8D21FAC98554419B56ED26178302575366539444F30D0
24,639,115 UART: [art] PUB.Y = 47530F41E27A7AB8DCDE94559FD0C97369DEF58BA1D8F3477A02A5032A9E15EDE6E21A0856E1593C30AAEC1EA33F04B8
24,646,427 UART: [art] SIG.R = A75D7622A92D5DB96572B65E45C6023594D4A6BDC6E31E00CEF18083EEA9CC7887B93D4B40BCD35168DEDD29899FA507
24,653,847 UART: [art] SIG.S = 802B1A995ABBFD4B7171CE85EF642D51F2B46BA48A9753FAEBFB8C23DED5A4AF108D0371189E2765998EA2D44CADE986
25,632,879 UART: Caliptra RT
25,633,599 UART: [state] CFI Enabled
25,814,202 UART: [rt] RT listening for mailbox commands...
25,846,106 UART: [rt]cmd =0x54514754, len=24
25,848,450 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,385 UART:
192,871 UART: Running Caliptra ROM ...
194,020 UART:
603,535 UART: [state] CFI Enabled
618,887 UART: [state] LifecycleState = Unprovisioned
620,851 UART: [state] DebugLocked = No
623,510 UART: [state] WD Timer not started. Device not locked for debugging
628,262 UART: [kat] SHA2-256
807,945 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,756 UART: [kat] ++
819,205 UART: [kat] sha1
829,940 UART: [kat] SHA2-256
832,595 UART: [kat] SHA2-384
838,678 UART: [kat] SHA2-512-ACC
840,982 UART: [kat] ECC-384
3,280,426 UART: [kat] HMAC-384Kdf
3,292,660 UART: [kat] LMS
3,769,158 UART: [kat] --
3,773,742 UART: [cold-reset] ++
3,775,679 UART: [fht] FHT @ 0x50003400
3,787,650 UART: [idev] ++
3,788,218 UART: [idev] CDI.KEYID = 6
3,789,176 UART: [idev] SUBJECT.KEYID = 7
3,790,422 UART: [idev] UDS.KEYID = 0
3,791,322 ready_for_fw is high
3,791,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,478 UART: [idev] Erasing UDS.KEYID = 0
6,267,033 UART: [idev] Sha1 KeyId Algorithm
6,292,038 UART: [idev] --
6,297,869 UART: [ldev] ++
6,298,445 UART: [ldev] CDI.KEYID = 6
6,299,387 UART: [ldev] SUBJECT.KEYID = 5
6,300,603 UART: [ldev] AUTHORITY.KEYID = 7
6,301,838 UART: [ldev] FE.KEYID = 1
6,311,100 UART: [ldev] Erasing FE.KEYID = 1
8,788,333 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,725 UART: [ldev] --
10,583,208 UART: [fwproc] Wait for Commands...
10,585,030 UART: [fwproc] Recv command 0x46574c44
10,587,025 UART: [fwproc] Recv'd Img size: 118548 bytes
14,077,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,540 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,559 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,555,412 >>> mbox cmd response: success
14,556,574 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,559,219 UART: [afmc] ++
14,559,798 UART: [afmc] CDI.KEYID = 6
14,560,776 UART: [afmc] SUBJECT.KEYID = 7
14,561,940 UART: [afmc] AUTHORITY.KEYID = 5
17,067,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,791,539 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,793,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,809,605 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,825,636 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,841,223 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,865,362 UART: [afmc] --
18,868,374 UART: [cold-reset] --
18,872,309 UART: [state] Locking Datavault
18,879,610 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,362 UART: [state] Locking ICCM
18,882,652 UART: [exit] Launching FMC @ 0x40000130
18,891,105 UART:
18,891,342 UART: Running Caliptra FMC ...
18,892,447 UART:
18,892,611 UART: [state] CFI Enabled
18,900,605 UART: [fht] FMC Alias Private Key: 7
20,666,545 UART: [art] Extend RT PCRs Done
20,667,779 UART: [art] Lock RT PCRs Done
20,669,464 UART: [art] Populate DV Done
20,674,823 UART: [fht] FMC Alias Private Key: 7
20,676,418 UART: [art] Derive CDI
20,677,233 UART: [art] Store in slot 0x4
20,720,096 UART: [art] Derive Key Pair
20,721,162 UART: [art] Store priv key in slot 0x5
23,148,136 UART: [art] Derive Key Pair - Done
23,161,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,867,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,126 UART: [art] PUB.X = A47C00E741B2BE196AFB93BE9B7FDFCC7C75CA4A7C513D9BBAA2173D55120B8B766067A00811C275CA72C44C2F8ED7AD
24,876,427 UART: [art] PUB.Y = 5742111E7A4443048357AF3BDC375EC0837EBD690A11F6FDD996C1248D96BB400EC6CCE7E40892C5FC933A06FC989692
24,883,664 UART: [art] SIG.R = 2752958BC0C0C978170E2111C5367816079C5472421E8E2EC14ED9736EDF823C00AE24DA636D62AB809390A56B93D609
24,891,003 UART: [art] SIG.S = 3DBCF9A0144F507C9D4B86FC93F1042C66F7377AD45C5582071E3E6E78F65376946D4708B1D5C5628CEB28983DB7FC5C
25,869,395 UART: Caliptra RT
25,870,096 UART: [state] CFI Enabled
26,002,896 UART: [rt] RT listening for mailbox commands...
26,034,426 UART: [rt]cmd =0x54514754, len=24
26,037,055 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,775,506 ready_for_fw is high
3,776,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,449,972 >>> mbox cmd response: success
14,451,185 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
18,701,954 UART:
18,702,340 UART: Running Caliptra FMC ...
18,703,441 UART:
18,703,594 UART: [state] CFI Enabled
18,711,497 UART: [fht] FMC Alias Private Key: 7
20,477,318 UART: [art] Extend RT PCRs Done
20,478,542 UART: [art] Lock RT PCRs Done
20,480,104 UART: [art] Populate DV Done
20,485,322 UART: [fht] FMC Alias Private Key: 7
20,486,866 UART: [art] Derive CDI
20,487,639 UART: [art] Store in slot 0x4
20,530,119 UART: [art] Derive Key Pair
20,531,122 UART: [art] Store priv key in slot 0x5
22,958,160 UART: [art] Derive Key Pair - Done
22,971,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,678,166 UART: [art] Erasing AUTHORITY.KEYID = 7
24,679,667 UART: [art] PUB.X = 7DD2CB7046B1CB26FFCCD32B060B484DEE1347DC4C2DDED3BB1B97AE28B465C36D8CA1BAD43DC96324EF4A1188AB2670
24,686,972 UART: [art] PUB.Y = B5F2734FA48EDE90635D0B7A471969AF25AA8F7D17A185B909A052FCA7D0B3485F331A2D9708C24436B440E117D22C25
24,694,233 UART: [art] SIG.R = 351D414208E516084D9E27BFBE40938A39783B12430A799A5323D8CC66ECB95A76AD462E3C58B0BB5DF1CD71A2E733D1
24,701,620 UART: [art] SIG.S = F133C9F63319415A50BA751B75E6E57B5C357F1CDB7C5385C6A1410B46AA0EFAA1D378E06EE558BAD00EEACA0D7EBC31
25,680,496 UART: Caliptra RT
25,681,190 UART: [state] CFI Enabled
25,814,180 UART: [rt] RT listening for mailbox commands...
25,845,566 UART: [rt]cmd =0x54514754, len=24
25,848,033 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
191,968 UART:
192,328 UART: Running Caliptra ROM ...
193,528 UART:
193,681 UART: [state] CFI Enabled
262,614 UART: [state] LifecycleState = Unprovisioned
265,010 UART: [state] DebugLocked = No
266,631 UART: [state] WD Timer not started. Device not locked for debugging
271,665 UART: [kat] SHA2-256
461,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,312 UART: [kat] ++
472,760 UART: [kat] sha1
484,767 UART: [kat] SHA2-256
487,782 UART: [kat] SHA2-384
494,344 UART: [kat] SHA2-512-ACC
496,931 UART: [kat] ECC-384
2,949,307 UART: [kat] HMAC-384Kdf
2,973,648 UART: [kat] LMS
3,505,401 UART: [kat] --
3,508,831 UART: [cold-reset] ++
3,509,839 UART: [fht] FHT @ 0x50003400
3,521,022 UART: [idev] ++
3,521,656 UART: [idev] CDI.KEYID = 6
3,522,683 UART: [idev] SUBJECT.KEYID = 7
3,523,852 UART: [idev] UDS.KEYID = 0
3,524,777 ready_for_fw is high
3,524,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,414 UART: [idev] Erasing UDS.KEYID = 0
6,032,967 UART: [idev] Sha1 KeyId Algorithm
6,054,981 UART: [idev] --
6,060,973 UART: [ldev] ++
6,061,650 UART: [ldev] CDI.KEYID = 6
6,062,561 UART: [ldev] SUBJECT.KEYID = 5
6,063,716 UART: [ldev] AUTHORITY.KEYID = 7
6,064,945 UART: [ldev] FE.KEYID = 1
6,102,489 UART: [ldev] Erasing FE.KEYID = 1
8,608,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,620 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,807 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,132 UART: [ldev] --
10,416,342 UART: [fwproc] Wait for Commands...
10,417,948 UART: [fwproc] Recv command 0x46574c44
10,420,201 UART: [fwproc] Recv'd Img size: 118548 bytes
13,911,829 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,102 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,112,734 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,242 >>> mbox cmd response: success
14,674,293 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,677,268 UART: [afmc] ++
14,678,021 UART: [afmc] CDI.KEYID = 6
14,679,204 UART: [afmc] SUBJECT.KEYID = 7
14,680,684 UART: [afmc] AUTHORITY.KEYID = 5
17,217,749 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,942,842 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,944,755 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,959,838 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,975,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,989,956 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,013,277 UART: [afmc] --
19,015,979 UART: [cold-reset] --
19,019,412 UART: [state] Locking Datavault
19,025,790 UART: [state] Locking PCR0, PCR1 and PCR31
19,027,971 UART: [state] Locking ICCM
19,029,423 UART: [exit] Launching FMC @ 0x40000130
19,038,090 UART:
19,038,327 UART: Running Caliptra FMC ...
19,039,428 UART:
19,039,586 UART: [state] CFI Enabled
19,098,197 UART: [fht] FMC Alias Private Key: 7
20,864,748 UART: [art] Extend RT PCRs Done
20,865,978 UART: [art] Lock RT PCRs Done
20,868,113 UART: [art] Populate DV Done
20,873,302 UART: [fht] FMC Alias Private Key: 7
20,874,954 UART: [art] Derive CDI
20,875,769 UART: [art] Store in slot 0x4
20,931,029 UART: [art] Derive Key Pair
20,932,073 UART: [art] Store priv key in slot 0x5
23,395,238 UART: [art] Derive Key Pair - Done
23,407,914 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,742 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,249 UART: [art] PUB.X = 2C6BF851A34083C490A2C1FEBD742242A57DFB11AEE2E091CD179C3274FBC6FED4395CDCADCB2517E98EB86AE5CA363B
25,129,547 UART: [art] PUB.Y = 785DBD155A9B8EE3513B8389C15CE07A1BB61675B9C29880DBD874635B9048D71F4A794F3684763922F8C3543159B43E
25,136,788 UART: [art] SIG.R = CE9F2B24F9B15264141A440426086B3A8AEA5E0A7892D3145A1F0718711D425DDD730C85BBCCC9F454074E93559DAC59
25,144,352 UART: [art] SIG.S = 8FEC7B6AC9B83066AF1B2697E4707036AA6D73DBFAB464522F37E4F5E843DCCF767489DAC0CA1EC34E08EADAE9A73776
26,123,178 UART: Caliptra RT
26,123,863 UART: [state] CFI Enabled
26,303,092 UART: [rt] RT listening for mailbox commands...
26,334,614 UART: [rt]cmd =0x54514754, len=24
26,337,066 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
3,436,858 ready_for_fw is high
3,437,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,828,182 >>> mbox cmd response: success
14,829,314 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,110,303 UART:
19,110,683 UART: Running Caliptra FMC ...
19,111,827 UART:
19,111,983 UART: [state] CFI Enabled
19,178,486 UART: [fht] FMC Alias Private Key: 7
20,944,797 UART: [art] Extend RT PCRs Done
20,946,032 UART: [art] Lock RT PCRs Done
20,947,583 UART: [art] Populate DV Done
20,952,677 UART: [fht] FMC Alias Private Key: 7
20,954,165 UART: [art] Derive CDI
20,954,927 UART: [art] Store in slot 0x4
21,010,756 UART: [art] Derive Key Pair
21,011,807 UART: [art] Store priv key in slot 0x5
23,474,652 UART: [art] Derive Key Pair - Done
23,487,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,200,168 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,678 UART: [art] PUB.X = FF225E6B3AC5287AFE8DE1A00F63B51896D9F932BF14D8AED492241E741D8A66E97EC452D1D2649539E610066910E01C
25,208,979 UART: [art] PUB.Y = 4D10CAAB8755D6AD4A1410E791915952CF9BC29A4F32E4150A2249564D838B3063562265D896B8022BE4E23CF2FA3827
25,216,200 UART: [art] SIG.R = 62FC493BBD75717DF0A269E697BEA3EC5A75C1FF4695723E367B737FA6F4DDFE29BD9A14205ACBC3446E88EF321EB825
25,223,614 UART: [art] SIG.S = 73621397AB6837DB40841C53F13503D7CD335A4ECF6AA827295D6D5AD2AAB02020313EB972080A9A05ABB44CA9A0E4C9
26,202,421 UART: Caliptra RT
26,203,129 UART: [state] CFI Enabled
26,382,744 UART: [rt] RT listening for mailbox commands...
26,414,096 UART: [rt]cmd =0x54514754, len=24
26,416,537 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,488 UART:
192,854 UART: Running Caliptra ROM ...
193,995 UART:
603,629 UART: [state] CFI Enabled
616,992 UART: [state] LifecycleState = Unprovisioned
619,415 UART: [state] DebugLocked = No
621,723 UART: [state] WD Timer not started. Device not locked for debugging
625,705 UART: [kat] SHA2-256
815,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,339 UART: [kat] ++
826,939 UART: [kat] sha1
837,893 UART: [kat] SHA2-256
840,900 UART: [kat] SHA2-384
846,775 UART: [kat] SHA2-512-ACC
849,402 UART: [kat] ECC-384
3,290,155 UART: [kat] HMAC-384Kdf
3,302,901 UART: [kat] LMS
3,834,737 UART: [kat] --
3,837,909 UART: [cold-reset] ++
3,839,212 UART: [fht] FHT @ 0x50003400
3,849,504 UART: [idev] ++
3,850,145 UART: [idev] CDI.KEYID = 6
3,851,105 UART: [idev] SUBJECT.KEYID = 7
3,852,281 UART: [idev] UDS.KEYID = 0
3,853,187 ready_for_fw is high
3,853,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,002,255 UART: [idev] Erasing UDS.KEYID = 0
6,325,515 UART: [idev] Sha1 KeyId Algorithm
6,348,741 UART: [idev] --
6,353,063 UART: [ldev] ++
6,353,747 UART: [ldev] CDI.KEYID = 6
6,354,636 UART: [ldev] SUBJECT.KEYID = 5
6,355,851 UART: [ldev] AUTHORITY.KEYID = 7
6,357,029 UART: [ldev] FE.KEYID = 1
6,367,770 UART: [ldev] Erasing FE.KEYID = 1
8,847,173 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,597,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,612,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,382 UART: [ldev] --
10,638,440 UART: [fwproc] Wait for Commands...
10,639,939 UART: [fwproc] Recv command 0x46574c44
10,642,253 UART: [fwproc] Recv'd Img size: 118548 bytes
14,133,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,209,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,333,246 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,893,860 >>> mbox cmd response: success
14,895,385 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
14,897,424 UART: [afmc] ++
14,898,097 UART: [afmc] CDI.KEYID = 6
14,899,353 UART: [afmc] SUBJECT.KEYID = 7
14,900,814 UART: [afmc] AUTHORITY.KEYID = 5
17,400,451 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,119,354 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,121,276 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,136,391 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,151,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,166,535 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,190,340 UART: [afmc] --
19,193,781 UART: [cold-reset] --
19,197,918 UART: [state] Locking Datavault
19,203,069 UART: [state] Locking PCR0, PCR1 and PCR31
19,205,220 UART: [state] Locking ICCM
19,206,726 UART: [exit] Launching FMC @ 0x40000130
19,215,348 UART:
19,215,590 UART: Running Caliptra FMC ...
19,216,694 UART:
19,216,877 UART: [state] CFI Enabled
19,225,089 UART: [fht] FMC Alias Private Key: 7
20,991,173 UART: [art] Extend RT PCRs Done
20,992,393 UART: [art] Lock RT PCRs Done
20,993,668 UART: [art] Populate DV Done
20,999,190 UART: [fht] FMC Alias Private Key: 7
21,000,671 UART: [art] Derive CDI
21,001,414 UART: [art] Store in slot 0x4
21,044,339 UART: [art] Derive Key Pair
21,045,389 UART: [art] Store priv key in slot 0x5
23,472,456 UART: [art] Derive Key Pair - Done
23,485,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,191,619 UART: [art] Erasing AUTHORITY.KEYID = 7
25,193,137 UART: [art] PUB.X = 03C8CD67776DE53E642F53564102C11DB369E8B58E3B4D1A214F6DD53F0F0AD98CCC828CAB6CBAD2966848376C8D590B
25,200,349 UART: [art] PUB.Y = BD653846FDB6766388FA61DEB5B95D229BD9C429275C363F89A500BA44407E1EFDEC3DC387EBDA4022C7824B27AA1D7A
25,207,598 UART: [art] SIG.R = 8D237CECA1ADACE785BE3B5BE4D3F96D6CFC43E09136E91A14AEE6E893DF444EFFE8E28A0BBD69D8984982644B185C64
25,215,087 UART: [art] SIG.S = AA1F90D3FC78B70C146ECE8AED12C22466CEF35D736FE75F939C347B4835C3C0065EF5EF3CBC3E95B42A438B808DD576
26,194,296 UART: Caliptra RT
26,194,994 UART: [state] CFI Enabled
26,327,637 UART: [rt] RT listening for mailbox commands...
26,359,346 UART: [rt]cmd =0x54514754, len=24
26,361,813 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
3,758,629 ready_for_fw is high
3,759,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,311 >>> mbox cmd response: success
15,047,605 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
19,301,364 UART:
19,301,760 UART: Running Caliptra FMC ...
19,303,092 UART:
19,303,272 UART: [state] CFI Enabled
19,311,147 UART: [fht] FMC Alias Private Key: 7
21,076,498 UART: [art] Extend RT PCRs Done
21,077,730 UART: [art] Lock RT PCRs Done
21,079,204 UART: [art] Populate DV Done
21,084,641 UART: [fht] FMC Alias Private Key: 7
21,086,247 UART: [art] Derive CDI
21,087,071 UART: [art] Store in slot 0x4
21,129,640 UART: [art] Derive Key Pair
21,130,649 UART: [art] Store priv key in slot 0x5
23,557,965 UART: [art] Derive Key Pair - Done
23,570,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,276,941 UART: [art] Erasing AUTHORITY.KEYID = 7
25,278,451 UART: [art] PUB.X = F409C69742131AF841FCE96DAF701B723730A591611567063FB49E8C9B5B1354507A883D5F61E22186DD42C917957A7A
25,285,672 UART: [art] PUB.Y = 523A96AEFBDE24C6610DF01A4CDFAE47899EC9F2905349FDE50657AF6036D7084E2FAC437AB6EBAD1A657B21409203A1
25,292,936 UART: [art] SIG.R = F3B712EFC28BFA8FA5A167B7D41FF4CFE4E72388ABB62E5BB4F7800FBEE27B6C5F1041266769A126147A57C3B0CE6BFC
25,300,349 UART: [art] SIG.S = DA629FCF39A860DFED684029B489BF20E5CB0352C46EF728E1F1C547580E12654AD70584329052434C5572646C24F3C5
26,279,539 UART: Caliptra RT
26,280,226 UART: [state] CFI Enabled
26,412,943 UART: [rt] RT listening for mailbox commands...
26,444,579 UART: [rt]cmd =0x54514754, len=24
26,447,202 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,683 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,247 UART: [kat] SHA2-256
882,178 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,293 UART: [kat] ++
886,445 UART: [kat] sha1
890,621 UART: [kat] SHA2-256
892,559 UART: [kat] SHA2-384
895,444 UART: [kat] SHA2-512-ACC
897,345 UART: [kat] ECC-384
902,874 UART: [kat] HMAC-384Kdf
907,478 UART: [kat] LMS
1,475,674 UART: [kat] --
1,476,699 UART: [cold-reset] ++
1,477,271 UART: [fht] Storing FHT @ 0x50003400
1,480,104 UART: [idev] ++
1,480,272 UART: [idev] CDI.KEYID = 6
1,480,632 UART: [idev] SUBJECT.KEYID = 7
1,481,056 UART: [idev] UDS.KEYID = 0
1,481,401 ready_for_fw is high
1,481,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,742 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,678 UART: [idev] --
1,514,799 UART: [ldev] ++
1,514,967 UART: [ldev] CDI.KEYID = 6
1,515,330 UART: [ldev] SUBJECT.KEYID = 5
1,515,756 UART: [ldev] AUTHORITY.KEYID = 7
1,516,219 UART: [ldev] FE.KEYID = 1
1,521,825 UART: [ldev] Erasing FE.KEYID = 1
1,546,554 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,328 UART: [ldev] --
1,585,777 UART: [fwproc] Waiting for Commands...
1,586,486 UART: [fwproc] Received command 0x46574c44
1,587,277 UART: [fwproc] Received Image of size 118548 bytes
2,931,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,255 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,473 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,832 >>> mbox cmd response: success
3,130,832 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,131,922 UART: [afmc] ++
3,132,090 UART: [afmc] CDI.KEYID = 6
3,132,452 UART: [afmc] SUBJECT.KEYID = 7
3,132,877 UART: [afmc] AUTHORITY.KEYID = 5
3,167,570 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,760 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,540 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,249 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,132 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,815 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,751 UART: [afmc] --
3,210,735 UART: [cold-reset] --
3,211,517 UART: [state] Locking Datavault
3,212,574 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,178 UART: [state] Locking ICCM
3,213,740 UART: [exit] Launching FMC @ 0x40000130
3,219,070 UART:
3,219,086 UART: Running Caliptra FMC ...
3,219,494 UART:
3,219,548 UART: [state] CFI Enabled
3,229,930 UART: [fht] FMC Alias Private Key: 7
3,349,390 UART: [art] Extend RT PCRs Done
3,349,818 UART: [art] Lock RT PCRs Done
3,351,424 UART: [art] Populate DV Done
3,359,789 UART: [fht] FMC Alias Private Key: 7
3,360,939 UART: [art] Derive CDI
3,361,219 UART: [art] Store in slot 0x4
3,446,843 UART: [art] Derive Key Pair
3,447,203 UART: [art] Store priv key in slot 0x5
3,460,398 UART: [art] Derive Key Pair - Done
3,475,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,029 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,794 UART: [art] PUB.X = FD4A6B2DE2EA4E0A5B5CF97A30DC03842F409D49FFE9F9FBC4EFAF14016DF7232B07F675AC033E723A69922AA73CF86F
3,498,571 UART: [art] PUB.Y = 3A901E4206CCD2867551F290A532094FE86DD4D5F9687F7D125D693C76806665B04BA8156BCFC7E9BF56C4E5C6AE85C1
3,505,519 UART: [art] SIG.R = B89F89372BB9097B49D5EDF31C0960519C5467461176D7B300B192B185071D3C9241F96721FDAD5016082245351C9862
3,512,239 UART: [art] SIG.S = 33F217750913106063F737BB29DC718C0575E56A06B8CB20A99DCC76377495294E38CF864FA2871C85440BF564404244
3,536,421 UART: Caliptra RT
3,536,672 UART: [state] CFI Enabled
3,656,150 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,716 UART: [rt]cmd =0x54514754, len=24
3,688,854 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,667 ready_for_fw is high
1,362,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,348 >>> mbox cmd response: success
2,981,348 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,042,449 UART:
3,042,465 UART: Running Caliptra FMC ...
3,042,873 UART:
3,042,927 UART: [state] CFI Enabled
3,053,335 UART: [fht] FMC Alias Private Key: 7
3,172,459 UART: [art] Extend RT PCRs Done
3,172,887 UART: [art] Lock RT PCRs Done
3,174,507 UART: [art] Populate DV Done
3,182,728 UART: [fht] FMC Alias Private Key: 7
3,183,766 UART: [art] Derive CDI
3,184,046 UART: [art] Store in slot 0x4
3,270,296 UART: [art] Derive Key Pair
3,270,656 UART: [art] Store priv key in slot 0x5
3,283,745 UART: [art] Derive Key Pair - Done
3,298,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,882 UART: [art] PUB.X = C45BDF5D165A46451E76403DCE2F701268F3261A90BBBDA1335D5AE48106332471E3977AF80B6D44CBC019758AC61377
3,320,646 UART: [art] PUB.Y = E2B1AE749873B3D23BD5147D35D807C5A82BAF2D268A270480E1B0B9D99F05108CEFDDF79B7FCE506B3632AC6E0F9CD6
3,327,600 UART: [art] SIG.R = 5D4720D8545698526047F9D9ED8715BBE0DB780E7D72677F873ACBB5943FB386A8E3B095EEF6CB4E99418D632583685F
3,334,367 UART: [art] SIG.S = A7CA3166F261810F3A3C616D8ED5B83B4BC2BEC825B45957828DA5A8A7E968DB549343DACC4D277AE7CE9F1F234E54ED
3,358,160 UART: Caliptra RT
3,358,411 UART: [state] CFI Enabled
3,478,601 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,139 UART: [rt]cmd =0x54514754, len=24
3,511,271 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,007 UART: [state] LifecycleState = Unprovisioned
85,662 UART: [state] DebugLocked = No
86,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,860 UART: [kat] SHA2-256
881,791 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,906 UART: [kat] ++
886,058 UART: [kat] sha1
890,356 UART: [kat] SHA2-256
892,294 UART: [kat] SHA2-384
894,923 UART: [kat] SHA2-512-ACC
896,824 UART: [kat] ECC-384
902,789 UART: [kat] HMAC-384Kdf
907,523 UART: [kat] LMS
1,475,719 UART: [kat] --
1,476,614 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,809 UART: [idev] Erasing UDS.KEYID = 0
1,505,205 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,849 UART: [idev] --
1,514,998 UART: [ldev] ++
1,515,166 UART: [ldev] CDI.KEYID = 6
1,515,529 UART: [ldev] SUBJECT.KEYID = 5
1,515,955 UART: [ldev] AUTHORITY.KEYID = 7
1,516,418 UART: [ldev] FE.KEYID = 1
1,521,660 UART: [ldev] Erasing FE.KEYID = 1
1,547,301 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,451 UART: [ldev] --
1,586,738 UART: [fwproc] Waiting for Commands...
1,587,529 UART: [fwproc] Received command 0x46574c44
1,588,320 UART: [fwproc] Received Image of size 118548 bytes
2,933,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,580 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,798 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,077 >>> mbox cmd response: success
3,132,077 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,133,157 UART: [afmc] ++
3,133,325 UART: [afmc] CDI.KEYID = 6
3,133,687 UART: [afmc] SUBJECT.KEYID = 7
3,134,112 UART: [afmc] AUTHORITY.KEYID = 5
3,168,433 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,601 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,090 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,973 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,656 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,698 UART: [afmc] --
3,211,642 UART: [cold-reset] --
3,212,658 UART: [state] Locking Datavault
3,213,713 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,317 UART: [state] Locking ICCM
3,214,905 UART: [exit] Launching FMC @ 0x40000130
3,220,235 UART:
3,220,251 UART: Running Caliptra FMC ...
3,220,659 UART:
3,220,802 UART: [state] CFI Enabled
3,231,488 UART: [fht] FMC Alias Private Key: 7
3,350,446 UART: [art] Extend RT PCRs Done
3,350,874 UART: [art] Lock RT PCRs Done
3,352,590 UART: [art] Populate DV Done
3,360,853 UART: [fht] FMC Alias Private Key: 7
3,361,971 UART: [art] Derive CDI
3,362,251 UART: [art] Store in slot 0x4
3,447,875 UART: [art] Derive Key Pair
3,448,235 UART: [art] Store priv key in slot 0x5
3,461,972 UART: [art] Derive Key Pair - Done
3,476,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,926 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,691 UART: [art] PUB.X = D6FB79B207979312F549140B85057022170E1AEFC1138910287FA280C0219700EB48B10BF6AE046C6588514265D7AD61
3,499,409 UART: [art] PUB.Y = B93D699C7F9B107B76CABA32D52EEE65B6E41624416D4631160D663FE94E0EE361BCD3FD3E5DF9E1365D6009BCBD6684
3,506,362 UART: [art] SIG.R = 25EF0A10973A37B6E89C11B1FDC2CB78D31E5871D4690F2085A3D1C1577219C8E4390E20AFD39AE2AE04EA32D9404D40
3,513,126 UART: [art] SIG.S = 8653F89BBDE2CC978C7AFC217BBE6E04B119462DD4188722B3D084A140E90B2F89ACA0C59D809599648ACA324AC837BD
3,536,950 UART: Caliptra RT
3,537,293 UART: [state] CFI Enabled
3,657,739 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,249 UART: [rt]cmd =0x54514754, len=24
3,690,301 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 ready_for_fw is high
1,362,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,421 >>> mbox cmd response: success
2,982,421 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
3,043,584 UART:
3,043,600 UART: Running Caliptra FMC ...
3,044,008 UART:
3,044,151 UART: [state] CFI Enabled
3,054,751 UART: [fht] FMC Alias Private Key: 7
3,174,353 UART: [art] Extend RT PCRs Done
3,174,781 UART: [art] Lock RT PCRs Done
3,176,407 UART: [art] Populate DV Done
3,184,502 UART: [fht] FMC Alias Private Key: 7
3,185,482 UART: [art] Derive CDI
3,185,762 UART: [art] Store in slot 0x4
3,271,834 UART: [art] Derive Key Pair
3,272,194 UART: [art] Store priv key in slot 0x5
3,285,275 UART: [art] Derive Key Pair - Done
3,300,157 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,486 UART: [art] Erasing AUTHORITY.KEYID = 7
3,316,251 UART: [art] PUB.X = 428383A4711BFE6FAEDDB1D5D27FEE5D9E0BC2050B4AD884DBD793786DFD114EB39313FD901C5947B6CC158640388DD5
3,323,026 UART: [art] PUB.Y = 807EA2939FF8DFD976E2C42FDC91303046C7A41FE5C635F2D271FD62211B4CDF9657658D16DFE012A370E7BB78D4A71D
3,329,986 UART: [art] SIG.R = 39A64D343AD6C55695ADDD6D460CB78125813D9862ADD262886E7E2A8EDA505D4C31D81B868985540E479BC2E23AD47B
3,336,754 UART: [art] SIG.S = DDBF2C1B099889DA35B3482CCE722DEFD275810ED98F50F7F7777866EA6B57E70929DF90B3D373C24A083989ABD076B0
3,360,986 UART: Caliptra RT
3,361,329 UART: [state] CFI Enabled
3,482,183 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,905 UART: [rt]cmd =0x54514754, len=24
3,514,777 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,754 UART: [state] LifecycleState = Unprovisioned
85,409 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,346 UART: [kat] SHA2-256
901,286 UART: [kat] SHA2-384
904,201 UART: [kat] SHA2-512-ACC
906,102 UART: [kat] ECC-384
915,669 UART: [kat] HMAC-384Kdf
920,147 UART: [kat] LMS
1,168,459 UART: [kat] --
1,169,432 UART: [cold-reset] ++
1,169,800 UART: [fht] FHT @ 0x50003400
1,172,542 UART: [idev] ++
1,172,710 UART: [idev] CDI.KEYID = 6
1,173,071 UART: [idev] SUBJECT.KEYID = 7
1,173,496 UART: [idev] UDS.KEYID = 0
1,173,842 ready_for_fw is high
1,173,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,381 UART: [idev] Erasing UDS.KEYID = 0
1,198,625 UART: [idev] Sha1 KeyId Algorithm
1,207,327 UART: [idev] --
1,208,202 UART: [ldev] ++
1,208,370 UART: [ldev] CDI.KEYID = 6
1,208,734 UART: [ldev] SUBJECT.KEYID = 5
1,209,161 UART: [ldev] AUTHORITY.KEYID = 7
1,209,624 UART: [ldev] FE.KEYID = 1
1,214,816 UART: [ldev] Erasing FE.KEYID = 1
1,241,117 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,486 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,192 UART: [ldev] --
1,280,461 UART: [fwproc] Wait for Commands...
1,281,060 UART: [fwproc] Recv command 0x46574c44
1,281,793 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,067 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,507 >>> mbox cmd response: success
2,825,507 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,613 UART: [afmc] ++
2,826,781 UART: [afmc] CDI.KEYID = 6
2,827,144 UART: [afmc] SUBJECT.KEYID = 7
2,827,570 UART: [afmc] AUTHORITY.KEYID = 5
2,862,825 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,200 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,949 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,659 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,540 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,241 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,162 UART: [afmc] --
2,906,037 UART: [cold-reset] --
2,906,629 UART: [state] Locking Datavault
2,908,000 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,604 UART: [state] Locking ICCM
2,909,162 UART: [exit] Launching FMC @ 0x40000130
2,914,492 UART:
2,914,508 UART: Running Caliptra FMC ...
2,914,916 UART:
2,914,970 UART: [state] CFI Enabled
2,925,316 UART: [fht] FMC Alias Private Key: 7
3,044,674 UART: [art] Extend RT PCRs Done
3,045,102 UART: [art] Lock RT PCRs Done
3,046,624 UART: [art] Populate DV Done
3,054,865 UART: [fht] FMC Alias Private Key: 7
3,055,947 UART: [art] Derive CDI
3,056,227 UART: [art] Store in slot 0x4
3,142,530 UART: [art] Derive Key Pair
3,142,890 UART: [art] Store priv key in slot 0x5
3,155,364 UART: [art] Derive Key Pair - Done
3,170,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,260 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,025 UART: [art] PUB.X = 043EA0FB31ED0C24FB440515C5469C8FC6A7C6A9B2FADA6F1CCBBF579AB513A374B4444979A200EBF4191CBEF54CB30A
3,193,783 UART: [art] PUB.Y = 2CCFB61F7F397F09272FFDC33EB42B11AABFF5DDE377DDFD6CD56E9458DF69291869524B29E8C92A3C968D8D7E81D2F1
3,200,750 UART: [art] SIG.R = 21273771523C5A344F652DBD3ED5913C172B26A8202D6831125AC2FD46BAC0AC505B4D96EC6962FCE0EFD26034D81916
3,207,522 UART: [art] SIG.S = 6FB66A012AEB23A6FEE1089EECA27DC23C5A3A03348196A81551607A58021796D6BF32A258614BC45F5F8483F5C49FDE
3,231,412 UART: Caliptra RT
3,231,663 UART: [state] CFI Enabled
3,351,377 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,455 UART: [rt]cmd =0x54514754, len=24
3,384,599 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,064 ready_for_fw is high
1,059,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,412 >>> mbox cmd response: success
2,679,412 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,785 UART:
2,741,801 UART: Running Caliptra FMC ...
2,742,209 UART:
2,742,263 UART: [state] CFI Enabled
2,752,845 UART: [fht] FMC Alias Private Key: 7
2,871,793 UART: [art] Extend RT PCRs Done
2,872,221 UART: [art] Lock RT PCRs Done
2,873,773 UART: [art] Populate DV Done
2,882,298 UART: [fht] FMC Alias Private Key: 7
2,883,300 UART: [art] Derive CDI
2,883,580 UART: [art] Store in slot 0x4
2,969,683 UART: [art] Derive Key Pair
2,970,043 UART: [art] Store priv key in slot 0x5
2,982,901 UART: [art] Derive Key Pair - Done
2,998,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,886 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,651 UART: [art] PUB.X = A6EA30E8065E236D875F4DF47E2FBD44A0DA26CBB02EFC03BBBBA92092BC23C6187398F61B57FC578E61A6402334E7CF
3,021,431 UART: [art] PUB.Y = A09CD3C8A76609711AF8F34B3434F00B0FB1B75E6E666FE98AAFA48F2BF31731982865A8415536EF7919C75075C74DC1
3,028,374 UART: [art] SIG.R = 06B8A5F9BD68252C6532A8BFC73CF4EF53E7C278596C5ADCAC1BA3FB717DCAE6BCBFD257AB2F0C9E1A903BEED982EF57
3,035,170 UART: [art] SIG.S = C89CF42132F2D2F6E580F3D9DEE1BD1C6B1131F46017711197A29572DB94D6FF08ABEA65722F1DC3DA82ECF7EE9AE450
3,058,985 UART: Caliptra RT
3,059,236 UART: [state] CFI Enabled
3,178,737 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,589 UART: [rt]cmd =0x54514754, len=24
3,211,599 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Unprovisioned
85,954 UART: [state] DebugLocked = No
86,528 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,378 UART: [kat] SHA2-512-ACC
906,279 UART: [kat] ECC-384
916,390 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,483 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 ready_for_fw is high
1,174,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,092 UART: [idev] Erasing UDS.KEYID = 0
1,198,946 UART: [idev] Sha1 KeyId Algorithm
1,207,808 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,621 UART: [ldev] Erasing FE.KEYID = 1
1,241,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,147 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,839 UART: [ldev] --
1,281,266 UART: [fwproc] Wait for Commands...
1,282,043 UART: [fwproc] Recv command 0x46574c44
1,282,776 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,483 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,104 >>> mbox cmd response: success
2,824,104 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,825,298 UART: [afmc] ++
2,825,466 UART: [afmc] CDI.KEYID = 6
2,825,829 UART: [afmc] SUBJECT.KEYID = 7
2,826,255 UART: [afmc] AUTHORITY.KEYID = 5
2,861,812 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,081 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,830 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,540 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,421 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,122 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,917 UART: [afmc] --
2,904,820 UART: [cold-reset] --
2,905,596 UART: [state] Locking Datavault
2,907,015 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,619 UART: [state] Locking ICCM
2,908,059 UART: [exit] Launching FMC @ 0x40000130
2,913,389 UART:
2,913,405 UART: Running Caliptra FMC ...
2,913,813 UART:
2,913,956 UART: [state] CFI Enabled
2,924,562 UART: [fht] FMC Alias Private Key: 7
3,044,270 UART: [art] Extend RT PCRs Done
3,044,698 UART: [art] Lock RT PCRs Done
3,046,414 UART: [art] Populate DV Done
3,054,875 UART: [fht] FMC Alias Private Key: 7
3,055,987 UART: [art] Derive CDI
3,056,267 UART: [art] Store in slot 0x4
3,141,954 UART: [art] Derive Key Pair
3,142,314 UART: [art] Store priv key in slot 0x5
3,155,794 UART: [art] Derive Key Pair - Done
3,170,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,370 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,135 UART: [art] PUB.X = C8994F90E35ECAFA230B46AECE58765CC5E4C62917A8645D0DD72AC6CAF63F2BED0E850D49F75CD5CD256A98B802DF7E
3,192,912 UART: [art] PUB.Y = CF07C76A718E82E9C48083EE372219116CD7157BD5D2ECF9764C7B0FA864AC603F6007DFE7D973358DF5DAB85A27365B
3,199,861 UART: [art] SIG.R = C0CF9AEE563CCDE6F2506A9A5099F8D24844BD07BB8013B877C8357157D249A2656370FB4D5D452353E1B01EEC121849
3,206,630 UART: [art] SIG.S = 3F08700FBA9B9D35C1A722AC072D12F9F8DC17A80340D71474BD697A7B00F082439DC60E2F013107F7E362A76AC2CB40
3,230,281 UART: Caliptra RT
3,230,624 UART: [state] CFI Enabled
3,350,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,167 UART: [rt]cmd =0x54514754, len=24
3,383,233 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 ready_for_fw is high
1,060,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,366 >>> mbox cmd response: success
2,679,366 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,742,009 UART:
2,742,025 UART: Running Caliptra FMC ...
2,742,433 UART:
2,742,576 UART: [state] CFI Enabled
2,752,910 UART: [fht] FMC Alias Private Key: 7
2,871,874 UART: [art] Extend RT PCRs Done
2,872,302 UART: [art] Lock RT PCRs Done
2,873,836 UART: [art] Populate DV Done
2,882,309 UART: [fht] FMC Alias Private Key: 7
2,883,339 UART: [art] Derive CDI
2,883,619 UART: [art] Store in slot 0x4
2,969,480 UART: [art] Derive Key Pair
2,969,840 UART: [art] Store priv key in slot 0x5
2,983,576 UART: [art] Derive Key Pair - Done
2,997,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,328 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,093 UART: [art] PUB.X = 53CBB8010A5CA22820FB56BCCFFA4997F648356F7AEB1F71C6F0F50F9F0A635A3D7D9BADA3DA52F73D0B2F8ADB3D5D6F
3,020,876 UART: [art] PUB.Y = F4EB2CF4973D2A670C50871F44AEB83F2C1A8C2FA1215586F09CF058AD3F5995009512645B5B77154316F25886F7DA65
3,027,799 UART: [art] SIG.R = E319DDC4F41AA9AC32AADBE491494C80D03A736E541CCC36233A533E9DAB7020FF48060600DC2EFA381D4CA0B6E0AC2B
3,034,561 UART: [art] SIG.S = A7E62A9DDA6807C80E5533C1505A79E29D9FAADE7F1880DD6B03CD5A82B4EE2714DB36F6EBD02588E1DC3626B8677C7C
3,058,282 UART: Caliptra RT
3,058,625 UART: [state] CFI Enabled
3,177,741 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,593 UART: [rt]cmd =0x54514754, len=24
3,210,771 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,644 UART: [state] LifecycleState = Unprovisioned
85,299 UART: [state] DebugLocked = No
85,827 UART: [state] WD Timer not started. Device not locked for debugging
87,184 UART: [kat] SHA2-256
892,834 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,959 UART: [kat] ++
897,111 UART: [kat] sha1
901,453 UART: [kat] SHA2-256
903,393 UART: [kat] SHA2-384
906,156 UART: [kat] SHA2-512-ACC
908,057 UART: [kat] ECC-384
917,638 UART: [kat] HMAC-384Kdf
922,080 UART: [kat] LMS
1,170,408 UART: [kat] --
1,171,135 UART: [cold-reset] ++
1,171,715 UART: [fht] FHT @ 0x50003400
1,174,354 UART: [idev] ++
1,174,522 UART: [idev] CDI.KEYID = 6
1,174,882 UART: [idev] SUBJECT.KEYID = 7
1,175,306 UART: [idev] UDS.KEYID = 0
1,175,651 ready_for_fw is high
1,175,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,124 UART: [idev] Erasing UDS.KEYID = 0
1,200,157 UART: [idev] Sha1 KeyId Algorithm
1,208,567 UART: [idev] --
1,209,777 UART: [ldev] ++
1,209,945 UART: [ldev] CDI.KEYID = 6
1,210,308 UART: [ldev] SUBJECT.KEYID = 5
1,210,734 UART: [ldev] AUTHORITY.KEYID = 7
1,211,197 UART: [ldev] FE.KEYID = 1
1,216,463 UART: [ldev] Erasing FE.KEYID = 1
1,242,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,966 UART: [fwproc] Wait for Commands...
1,282,744 UART: [fwproc] Recv command 0x46574c44
1,283,472 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,380 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,550 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,925 >>> mbox cmd response: success
2,824,925 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,826,019 UART: [afmc] ++
2,826,187 UART: [afmc] CDI.KEYID = 6
2,826,549 UART: [afmc] SUBJECT.KEYID = 7
2,826,974 UART: [afmc] AUTHORITY.KEYID = 5
2,863,101 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,749 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,632 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,333 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,237 UART: [afmc] --
2,906,285 UART: [cold-reset] --
2,907,133 UART: [state] Locking Datavault
2,908,316 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,920 UART: [state] Locking ICCM
2,909,374 UART: [exit] Launching FMC @ 0x40000130
2,914,704 UART:
2,914,720 UART: Running Caliptra FMC ...
2,915,128 UART:
2,915,182 UART: [state] CFI Enabled
2,926,152 UART: [fht] FMC Alias Private Key: 7
3,045,152 UART: [art] Extend RT PCRs Done
3,045,580 UART: [art] Lock RT PCRs Done
3,046,916 UART: [art] Populate DV Done
3,055,251 UART: [fht] FMC Alias Private Key: 7
3,056,255 UART: [art] Derive CDI
3,056,535 UART: [art] Store in slot 0x4
3,142,484 UART: [art] Derive Key Pair
3,142,844 UART: [art] Store priv key in slot 0x5
3,156,080 UART: [art] Derive Key Pair - Done
3,170,942 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,190 UART: [art] PUB.X = 37C622312D4B5579022E15930A49D35E7F31ED7A5B2E44D0C87FF4D92F0A596D4170A251FE6FD6A4FCB673B8FB218531
3,193,955 UART: [art] PUB.Y = 3BD74960E8629FB4E1DA9C3A9CEB9EDF9675D99C441282C93BD88A37F353BA0CEB1A5029CA19749BF27BAF4A3854E780
3,200,916 UART: [art] SIG.R = 16BDD09BC10BD230135687E7CD02E0D18C648AE7ECC07BE0A4567D741D6F018C9182BC2CC870EC120CDC00DC6B4CD135
3,207,668 UART: [art] SIG.S = D8BBF1FEA1504F64F9C195E297AE9514C80F89ABC5519F57ACAB1FC06166880D309F97086F54AE60C9B0DC85A612F2B4
3,231,219 UART: Caliptra RT
3,231,470 UART: [state] CFI Enabled
3,351,293 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,223 UART: [rt]cmd =0x54514754, len=24
3,384,231 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 ready_for_fw is high
1,059,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,854 >>> mbox cmd response: success
2,679,854 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,741,839 UART:
2,741,855 UART: Running Caliptra FMC ...
2,742,263 UART:
2,742,317 UART: [state] CFI Enabled
2,752,771 UART: [fht] FMC Alias Private Key: 7
2,871,387 UART: [art] Extend RT PCRs Done
2,871,815 UART: [art] Lock RT PCRs Done
2,873,437 UART: [art] Populate DV Done
2,881,942 UART: [fht] FMC Alias Private Key: 7
2,882,978 UART: [art] Derive CDI
2,883,258 UART: [art] Store in slot 0x4
2,969,069 UART: [art] Derive Key Pair
2,969,429 UART: [art] Store priv key in slot 0x5
2,982,425 UART: [art] Derive Key Pair - Done
2,997,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,654 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,419 UART: [art] PUB.X = 0AD1632641DFD2BB5E4E0029CB0289341BFE6881390A6D2A933CDFF34F4F2DF17128E765BD225686CDCF2FB32E95EE64
3,020,170 UART: [art] PUB.Y = F68E10084AE77D93A285EF9623F341BF97D9C739C9E54C25DB83C0CCB12C8828FFFA3E432CC8CDE96AC383488481DA4F
3,027,131 UART: [art] SIG.R = C1F004E05FB6522DD1DEE0900234E4C9C3DB81F0CDB01D94BA511B17E64F2A285BF5C7E003D6F7E1B09BA92164865D18
3,033,904 UART: [art] SIG.S = 759413D60CB15966AD901B18A8242A89AA9EF35B084C93CE7CEB4CF11A57D77FF446507225B0D67649C4BF6131CE2CCA
3,057,716 UART: Caliptra RT
3,057,967 UART: [state] CFI Enabled
3,177,644 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,210 UART: [rt]cmd =0x54514754, len=24
3,210,136 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,733 UART: [state] LifecycleState = Unprovisioned
86,388 UART: [state] DebugLocked = No
86,984 UART: [state] WD Timer not started. Device not locked for debugging
88,165 UART: [kat] SHA2-256
893,815 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,940 UART: [kat] ++
898,092 UART: [kat] sha1
902,134 UART: [kat] SHA2-256
904,074 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,577 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,284 UART: [cold-reset] ++
1,172,680 UART: [fht] FHT @ 0x50003400
1,175,375 UART: [idev] ++
1,175,543 UART: [idev] CDI.KEYID = 6
1,175,903 UART: [idev] SUBJECT.KEYID = 7
1,176,327 UART: [idev] UDS.KEYID = 0
1,176,672 ready_for_fw is high
1,176,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,097 UART: [idev] Erasing UDS.KEYID = 0
1,200,934 UART: [idev] Sha1 KeyId Algorithm
1,209,416 UART: [idev] --
1,210,398 UART: [ldev] ++
1,210,566 UART: [ldev] CDI.KEYID = 6
1,210,929 UART: [ldev] SUBJECT.KEYID = 5
1,211,355 UART: [ldev] AUTHORITY.KEYID = 7
1,211,818 UART: [ldev] FE.KEYID = 1
1,216,994 UART: [ldev] Erasing FE.KEYID = 1
1,243,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,890 UART: [ldev] --
1,282,319 UART: [fwproc] Wait for Commands...
1,283,005 UART: [fwproc] Recv command 0x46574c44
1,283,733 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,313 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,464 >>> mbox cmd response: success
2,826,464 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,827,514 UART: [afmc] ++
2,827,682 UART: [afmc] CDI.KEYID = 6
2,828,044 UART: [afmc] SUBJECT.KEYID = 7
2,828,469 UART: [afmc] AUTHORITY.KEYID = 5
2,864,656 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,505 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,253 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,962 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,845 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,546 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,404 UART: [afmc] --
2,908,478 UART: [cold-reset] --
2,909,474 UART: [state] Locking Datavault
2,910,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,393 UART: [state] Locking ICCM
2,911,847 UART: [exit] Launching FMC @ 0x40000130
2,917,177 UART:
2,917,193 UART: Running Caliptra FMC ...
2,917,601 UART:
2,917,744 UART: [state] CFI Enabled
2,928,464 UART: [fht] FMC Alias Private Key: 7
3,047,224 UART: [art] Extend RT PCRs Done
3,047,652 UART: [art] Lock RT PCRs Done
3,048,938 UART: [art] Populate DV Done
3,057,213 UART: [fht] FMC Alias Private Key: 7
3,058,167 UART: [art] Derive CDI
3,058,447 UART: [art] Store in slot 0x4
3,144,488 UART: [art] Derive Key Pair
3,144,848 UART: [art] Store priv key in slot 0x5
3,158,404 UART: [art] Derive Key Pair - Done
3,173,006 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,462 UART: [art] PUB.X = 42F6042D71DD0F8647B704E653F5F86720536A75493068661B58DA62537E1BE3F58B1E4024DAED1F818139E4D69D10E9
3,196,217 UART: [art] PUB.Y = EBF6D3160D4D767640F9978E261143324C4A87C7713B69E7E2F0E25A7003656AB7495DA9933D2E965DA45A90556608E3
3,203,150 UART: [art] SIG.R = DB267F503453EE1313C5155A20CFD3484F2CAB96A6E17A5056D4338725B46645ED3AA33C00AA531E2D1EFCC0D2BFB4DB
3,209,912 UART: [art] SIG.S = F834924B943B60F0878863C3710F991AA21CB49EE46DB97565C02E65A7F2C383D411A1472C5A4CD858495324BF48CF88
3,233,461 UART: Caliptra RT
3,233,804 UART: [state] CFI Enabled
3,353,920 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,786 UART: [rt]cmd =0x54514754, len=24
3,387,010 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 ready_for_fw is high
1,060,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,277 >>> mbox cmd response: success
2,678,277 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
2,739,548 UART:
2,739,564 UART: Running Caliptra FMC ...
2,739,972 UART:
2,740,115 UART: [state] CFI Enabled
2,750,345 UART: [fht] FMC Alias Private Key: 7
2,869,377 UART: [art] Extend RT PCRs Done
2,869,805 UART: [art] Lock RT PCRs Done
2,871,679 UART: [art] Populate DV Done
2,879,764 UART: [fht] FMC Alias Private Key: 7
2,880,712 UART: [art] Derive CDI
2,880,992 UART: [art] Store in slot 0x4
2,966,353 UART: [art] Derive Key Pair
2,966,713 UART: [art] Store priv key in slot 0x5
2,980,729 UART: [art] Derive Key Pair - Done
2,995,695 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,095 UART: [art] PUB.X = 1EA70739644AA0B247CFACB0A0FFE14CB1CC4898F79733F4A2D680F9F6D01B0B366FD935E62138082D4BFEB41E107EA7
3,018,870 UART: [art] PUB.Y = D8785C5A37002F11E44F00CFC76B6A6BD96CC709B6716AA18179047A91969C5E090D39C803D025339CA68ABBD9B7AAFA
3,025,769 UART: [art] SIG.R = 85FEB5819A96A02E356B976880CCA71429771E809A280E36746C77AF8C8B274DFED0048956AFAA4468D8E038C789DD35
3,032,533 UART: [art] SIG.S = A7B05FD52FB92F5CFDA4A831CE56F40B944F7B49D133039E6E2A5050FF96A07F5EE4D65619BEFD74E6B8E1B9A1D489E0
3,056,523 UART: Caliptra RT
3,056,866 UART: [state] CFI Enabled
3,177,086 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,684 UART: [rt]cmd =0x54514754, len=24
3,209,542 >>> mbox cmd response: failed
test test_tagging::test_tagging_inactive_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
191,989 UART:
192,347 UART: Running Caliptra ROM ...
193,452 UART:
193,615 UART: [state] CFI Enabled
264,335 UART: [state] LifecycleState = Unprovisioned
266,556 UART: [state] DebugLocked = No
268,935 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,661 UART: [kat] SHA2-256
444,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,922 UART: [kat] ++
455,369 UART: [kat] sha1
466,028 UART: [kat] SHA2-256
468,693 UART: [kat] SHA2-384
473,121 UART: [kat] SHA2-512-ACC
475,489 UART: [kat] ECC-384
2,767,606 UART: [kat] HMAC-384Kdf
2,779,703 UART: [kat] LMS
3,969,983 UART: [kat] --
3,975,645 UART: [cold-reset] ++
3,978,312 UART: [fht] Storing FHT @ 0x50003400
3,990,361 UART: [idev] ++
3,990,928 UART: [idev] CDI.KEYID = 6
3,991,840 UART: [idev] SUBJECT.KEYID = 7
3,993,084 UART: [idev] UDS.KEYID = 0
3,994,241 ready_for_fw is high
3,994,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,583 UART: [idev] Erasing UDS.KEYID = 0
7,326,666 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,675 UART: [idev] --
7,353,506 UART: [ldev] ++
7,354,129 UART: [ldev] CDI.KEYID = 6
7,355,096 UART: [ldev] SUBJECT.KEYID = 5
7,356,265 UART: [ldev] AUTHORITY.KEYID = 7
7,357,554 UART: [ldev] FE.KEYID = 1
7,403,463 UART: [ldev] Erasing FE.KEYID = 1
10,735,169 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,632 UART: [ldev] --
13,099,250 UART: [fwproc] Waiting for Commands...
13,100,966 UART: [fwproc] Received command 0x46574c44
13,103,156 UART: [fwproc] Received Image of size 118548 bytes
17,208,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,286,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,359,398 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,687,120 >>> mbox cmd response: success
17,688,302 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,690,562 UART: [afmc] ++
17,691,149 UART: [afmc] CDI.KEYID = 6
17,692,079 UART: [afmc] SUBJECT.KEYID = 7
17,693,306 UART: [afmc] AUTHORITY.KEYID = 5
21,051,632 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,494 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,970 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,689 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,398,123 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,420,120 UART: [afmc] --
23,423,709 UART: [cold-reset] --
23,426,320 UART: [state] Locking Datavault
23,432,153 UART: [state] Locking PCR0, PCR1 and PCR31
23,433,899 UART: [state] Locking ICCM
23,435,480 UART: [exit] Launching FMC @ 0x40000130
23,443,867 UART:
23,444,100 UART: Running Caliptra FMC ...
23,445,149 UART:
23,445,298 UART: [state] CFI Enabled
23,510,971 UART: [fht] FMC Alias Private Key: 7
25,872,400 UART: [art] Extend RT PCRs Done
25,873,621 UART: [art] Lock RT PCRs Done
25,875,515 UART: [art] Populate DV Done
25,880,978 UART: [fht] FMC Alias Private Key: 7
25,882,575 UART: [art] Derive CDI
25,883,391 UART: [art] Store in slot 0x4
25,940,245 UART: [art] Derive Key Pair
25,941,242 UART: [art] Store priv key in slot 0x5
29,234,113 UART: [art] Derive Key Pair - Done
29,246,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,109 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,618 UART: [art] PUB.X = D54C42D1103A5ADA32813B3C4FB055509A3F568CA60EDE496F6835801E6C1B50F5E64E7165499A6E24F21DC5390D0706
31,544,868 UART: [art] PUB.Y = D97A3E8A66F65B98A37B3627C289E1D4DC20A53C165A2A650A04CF08148317EABD1CB3E8933B85256B947BB0E3B73E11
31,552,148 UART: [art] SIG.R = F839D1AA7418F4FD9303505169F3FC38EB4CBF7972B08FE011BB4300B0BC902B1A688B771948AA1A12C3085BC2132150
31,559,547 UART: [art] SIG.S = E9055F612738548E31717C5CAEFA050B27CC85793C3759F84F4337AE5F8E5A5319C45D4E5FBE64EF9F782016D266C168
32,865,598 UART: Caliptra RT
32,866,307 UART: [state] CFI Enabled
33,043,049 UART: [rt] RT listening for mailbox commands...
33,075,034 UART: [rt]cmd =0x44504543, len=96
33,129,553 >>> mbox cmd response data (56 bytes)
33,130,849 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,160,999 UART: [rt]cmd =0x54514754, len=24
33,163,390 >>> mbox cmd response: failed
33,163,829 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,193,765 UART: [rt]cmd =0x54514754, len=24
33,196,089 >>> mbox cmd response data (8 bytes)
33,196,661 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,227,233 UART: [rt]cmd =0x44504543, len=96
33,279,225 >>> mbox cmd response data (56 bytes)
33,279,937 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,309,669 UART: [rt]cmd =0x47544744, len=8
33,312,903 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,784,068 ready_for_fw is high
3,784,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,294 >>> mbox cmd response: success
17,957,554 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,652,548 UART:
23,652,931 UART: Running Caliptra FMC ...
23,654,033 UART:
23,654,211 UART: [state] CFI Enabled
23,723,220 UART: [fht] FMC Alias Private Key: 7
26,063,697 UART: [art] Extend RT PCRs Done
26,064,927 UART: [art] Lock RT PCRs Done
26,066,472 UART: [art] Populate DV Done
26,072,054 UART: [fht] FMC Alias Private Key: 7
26,073,545 UART: [art] Derive CDI
26,074,282 UART: [art] Store in slot 0x4
26,131,203 UART: [art] Derive Key Pair
26,132,244 UART: [art] Store priv key in slot 0x5
29,425,020 UART: [art] Derive Key Pair - Done
29,438,074 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,725,978 UART: [art] Erasing AUTHORITY.KEYID = 7
31,727,486 UART: [art] PUB.X = 3C42374D0627164E0CE02D948C458F610144A1F660E5FED043607C45FC108232A174ACD20ED12B0732F9EA00B9BF956B
31,734,731 UART: [art] PUB.Y = F167994F84BE6002EC546D0D6717A9715BB2F173EFAA712B73D0E72C8C5A7C404CF4C88698BFC5D65BB8247971BAD438
31,741,974 UART: [art] SIG.R = C4A7BE1A091FFE9B65AF6E39CFA5B3EDED9DE102E3BAFD8D6880F4FDA4AA783ACBCFA36B1F54F4B6DB268DEE74237610
31,749,433 UART: [art] SIG.S = 1BE9A3490F61A997C409A840C954221576F8DD30D22666A6771C553C337B33F8FE01B07E3B1C0AB111C899E2A8597751
33,054,168 UART: Caliptra RT
33,054,872 UART: [state] CFI Enabled
33,231,722 UART: [rt] RT listening for mailbox commands...
33,263,916 UART: [rt]cmd =0x44504543, len=96
33,318,785 >>> mbox cmd response data (56 bytes)
33,320,088 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,350,067 UART: [rt]cmd =0x54514754, len=24
33,352,489 >>> mbox cmd response: failed
33,352,910 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,382,823 UART: [rt]cmd =0x54514754, len=24
33,385,559 >>> mbox cmd response data (8 bytes)
33,386,025 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,416,506 UART: [rt]cmd =0x44504543, len=96
33,468,590 >>> mbox cmd response data (56 bytes)
33,469,312 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,499,050 UART: [rt]cmd =0x47544744, len=8
33,501,889 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,398 UART:
192,759 UART: Running Caliptra ROM ...
193,866 UART:
603,450 UART: [state] CFI Enabled
615,427 UART: [state] LifecycleState = Unprovisioned
617,296 UART: [state] DebugLocked = No
618,681 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,114 UART: [kat] SHA2-256
792,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,435 UART: [kat] ++
803,879 UART: [kat] sha1
814,678 UART: [kat] SHA2-256
817,405 UART: [kat] SHA2-384
823,959 UART: [kat] SHA2-512-ACC
826,489 UART: [kat] ECC-384
3,109,257 UART: [kat] HMAC-384Kdf
3,120,649 UART: [kat] LMS
4,310,746 UART: [kat] --
4,316,319 UART: [cold-reset] ++
4,317,903 UART: [fht] Storing FHT @ 0x50003400
4,329,374 UART: [idev] ++
4,330,000 UART: [idev] CDI.KEYID = 6
4,330,909 UART: [idev] SUBJECT.KEYID = 7
4,332,090 UART: [idev] UDS.KEYID = 0
4,333,206 ready_for_fw is high
4,333,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,278 UART: [idev] Erasing UDS.KEYID = 0
7,617,230 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,396 UART: [idev] --
7,644,277 UART: [ldev] ++
7,644,910 UART: [ldev] CDI.KEYID = 6
7,645,830 UART: [ldev] SUBJECT.KEYID = 5
7,647,040 UART: [ldev] AUTHORITY.KEYID = 7
7,648,331 UART: [ldev] FE.KEYID = 1
7,660,407 UART: [ldev] Erasing FE.KEYID = 1
10,947,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,742 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,585 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,169 UART: [ldev] --
13,310,620 UART: [fwproc] Waiting for Commands...
13,313,351 UART: [fwproc] Received command 0x46574c44
13,315,537 UART: [fwproc] Received Image of size 118548 bytes
17,423,071 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,496,295 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,569,479 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,898,865 >>> mbox cmd response: success
17,900,092 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
17,903,545 UART: [afmc] ++
17,904,133 UART: [afmc] CDI.KEYID = 6
17,905,147 UART: [afmc] SUBJECT.KEYID = 7
17,906,297 UART: [afmc] AUTHORITY.KEYID = 5
21,216,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,512,000 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,514,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,690 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,423 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,851 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,804 UART: [afmc] --
23,583,986 UART: [cold-reset] --
23,586,435 UART: [state] Locking Datavault
23,591,791 UART: [state] Locking PCR0, PCR1 and PCR31
23,593,494 UART: [state] Locking ICCM
23,596,209 UART: [exit] Launching FMC @ 0x40000130
23,604,597 UART:
23,604,826 UART: Running Caliptra FMC ...
23,605,845 UART:
23,605,990 UART: [state] CFI Enabled
23,614,136 UART: [fht] FMC Alias Private Key: 7
25,953,913 UART: [art] Extend RT PCRs Done
25,955,139 UART: [art] Lock RT PCRs Done
25,956,948 UART: [art] Populate DV Done
25,962,372 UART: [fht] FMC Alias Private Key: 7
25,964,067 UART: [art] Derive CDI
25,964,804 UART: [art] Store in slot 0x4
26,007,606 UART: [art] Derive Key Pair
26,008,608 UART: [art] Store priv key in slot 0x5
29,250,874 UART: [art] Derive Key Pair - Done
29,263,707 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,544,077 UART: [art] Erasing AUTHORITY.KEYID = 7
31,545,586 UART: [art] PUB.X = C90433A4F622342A1513B5854F3700718EF44906D304291EEF9E6D5BCCFBD0758F4076823B959CA294F3B7A09EC14651
31,552,845 UART: [art] PUB.Y = A2801FE0C0CB5D6046E828ADCEB0A2ACA23B21B4C3708C364C11BFB33B37B0425355EF235C6B338B84B21A4DD092EDD9
31,560,086 UART: [art] SIG.R = D1DF676B7A6AEAC651639619AED4C15FB58F324D4B2703FD69D0A07C45625F5EEFBCE5A8B6090787FDF41A4591F9C7D3
31,567,527 UART: [art] SIG.S = 1405F5ABF965DDD3C76FC6C41CF9C8B63092B4AA105726396BB950C38DB4126A781B003866196D403393B5998CBE5BDA
32,872,773 UART: Caliptra RT
32,873,483 UART: [state] CFI Enabled
33,006,007 UART: [rt] RT listening for mailbox commands...
33,038,032 UART: [rt]cmd =0x44504543, len=96
33,075,630 >>> mbox cmd response data (56 bytes)
33,077,009 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,107,107 UART: [rt]cmd =0x54514754, len=24
33,109,521 >>> mbox cmd response: failed
33,110,012 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,140,020 UART: [rt]cmd =0x54514754, len=24
33,142,610 >>> mbox cmd response data (8 bytes)
33,143,107 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,173,804 UART: [rt]cmd =0x44504543, len=96
33,211,264 >>> mbox cmd response data (56 bytes)
33,211,954 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,241,688 UART: [rt]cmd =0x47544744, len=8
33,244,705 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
4,126,060 ready_for_fw is high
4,126,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,157,742 >>> mbox cmd response: success
18,159,022 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
23,798,517 UART:
23,798,902 UART: Running Caliptra FMC ...
23,800,045 UART:
23,800,209 UART: [state] CFI Enabled
23,808,230 UART: [fht] FMC Alias Private Key: 7
26,148,138 UART: [art] Extend RT PCRs Done
26,149,369 UART: [art] Lock RT PCRs Done
26,151,103 UART: [art] Populate DV Done
26,156,359 UART: [fht] FMC Alias Private Key: 7
26,157,843 UART: [art] Derive CDI
26,158,578 UART: [art] Store in slot 0x4
26,201,651 UART: [art] Derive Key Pair
26,202,648 UART: [art] Store priv key in slot 0x5
29,444,310 UART: [art] Derive Key Pair - Done
29,457,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,653 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,163 UART: [art] PUB.X = 22D486977A6D63B4C86ED8FD98695DC948EFE6F8A1A6AED626BE620E5C0BE4F18C4241791CFB70989D9DD4037F217762
31,746,482 UART: [art] PUB.Y = 5A2875F56A3489507487ABF9A39789BF2D95507CE2E940A5EEEE74A4CD5A51D9BA1E1B704D16A0CFF7F8397DCDAF2F49
31,753,743 UART: [art] SIG.R = 592034BA5B747FC30E65BF475F9C898C4627B01F46E01F245FD15CC26249E8B68FD27EBB39531DDC1A219091BAE8F33F
31,761,136 UART: [art] SIG.S = 3913832EC635FD550A41348CE84647BACD976ECAC17E9E8016AEFCD3E5C4CE88A8B5BF684F0B3B7AD884C318C3345F86
33,066,411 UART: Caliptra RT
33,067,115 UART: [state] CFI Enabled
33,200,613 UART: [rt] RT listening for mailbox commands...
33,233,164 UART: [rt]cmd =0x44504543, len=96
33,270,363 >>> mbox cmd response data (56 bytes)
33,271,621 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,301,800 UART: [rt]cmd =0x54514754, len=24
33,304,151 >>> mbox cmd response: failed
33,304,632 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,334,635 UART: [rt]cmd =0x54514754, len=24
33,337,281 >>> mbox cmd response data (8 bytes)
33,337,817 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
33,368,369 UART: [rt]cmd =0x44504543, len=96
33,405,230 >>> mbox cmd response data (56 bytes)
33,405,929 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,435,759 UART: [rt]cmd =0x47544744, len=8
33,438,649 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,030 UART:
192,410 UART: Running Caliptra ROM ...
193,491 UART:
193,635 UART: [state] CFI Enabled
263,091 UART: [state] LifecycleState = Unprovisioned
265,001 UART: [state] DebugLocked = No
266,313 UART: [state] WD Timer not started. Device not locked for debugging
269,994 UART: [kat] SHA2-256
449,674 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,438 UART: [kat] ++
460,972 UART: [kat] sha1
472,984 UART: [kat] SHA2-256
475,639 UART: [kat] SHA2-384
482,971 UART: [kat] SHA2-512-ACC
485,333 UART: [kat] ECC-384
2,949,302 UART: [kat] HMAC-384Kdf
2,971,376 UART: [kat] LMS
3,447,872 UART: [kat] --
3,452,222 UART: [cold-reset] ++
3,454,506 UART: [fht] FHT @ 0x50003400
3,465,548 UART: [idev] ++
3,466,186 UART: [idev] CDI.KEYID = 6
3,467,112 UART: [idev] SUBJECT.KEYID = 7
3,468,353 UART: [idev] UDS.KEYID = 0
3,469,271 ready_for_fw is high
3,469,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,708 UART: [idev] Erasing UDS.KEYID = 0
5,986,525 UART: [idev] Sha1 KeyId Algorithm
6,009,861 UART: [idev] --
6,014,775 UART: [ldev] ++
6,015,400 UART: [ldev] CDI.KEYID = 6
6,016,309 UART: [ldev] SUBJECT.KEYID = 5
6,017,516 UART: [ldev] AUTHORITY.KEYID = 7
6,018,763 UART: [ldev] FE.KEYID = 1
6,058,413 UART: [ldev] Erasing FE.KEYID = 1
8,571,508 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,571 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,145 UART: [ldev] --
10,377,384 UART: [fwproc] Wait for Commands...
10,380,286 UART: [fwproc] Recv command 0x46574c44
10,382,261 UART: [fwproc] Recv'd Img size: 118548 bytes
13,860,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,778 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,340,157 >>> mbox cmd response: success
14,341,333 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,344,303 UART: [afmc] ++
14,344,886 UART: [afmc] CDI.KEYID = 6
14,345,847 UART: [afmc] SUBJECT.KEYID = 7
14,347,058 UART: [afmc] AUTHORITY.KEYID = 5
16,875,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,596,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,598,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,614,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,630,520 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,646,120 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,672,187 UART: [afmc] --
18,675,674 UART: [cold-reset] --
18,678,448 UART: [state] Locking Datavault
18,684,875 UART: [state] Locking PCR0, PCR1 and PCR31
18,686,586 UART: [state] Locking ICCM
18,687,818 UART: [exit] Launching FMC @ 0x40000130
18,696,231 UART:
18,696,477 UART: Running Caliptra FMC ...
18,697,572 UART:
18,697,730 UART: [state] CFI Enabled
18,756,584 UART: [fht] FMC Alias Private Key: 7
20,523,165 UART: [art] Extend RT PCRs Done
20,524,374 UART: [art] Lock RT PCRs Done
20,525,938 UART: [art] Populate DV Done
20,531,670 UART: [fht] FMC Alias Private Key: 7
20,533,254 UART: [art] Derive CDI
20,534,062 UART: [art] Store in slot 0x4
20,589,401 UART: [art] Derive Key Pair
20,590,388 UART: [art] Store priv key in slot 0x5
23,054,207 UART: [art] Derive Key Pair - Done
23,067,153 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,779,476 UART: [art] Erasing AUTHORITY.KEYID = 7
24,780,999 UART: [art] PUB.X = A6E09862BB90FCB9C257EEC5E63905524FCD9BFB464BA7AE96AE89D442F3EF48AD251F598925E7252D4B3AF8C24BBD89
24,788,242 UART: [art] PUB.Y = 180D3CB96A8438CFCB29E4CEFB6C9C6C63FC8418C555B0B5159324F805DED9478917E827175B1CF3F3A30CED1E72F7A5
24,795,530 UART: [art] SIG.R = E01EE1B263770F397A169A52C33CBE6FCEF679921ADEC070FB71A90F65E481928C74671CC2EC2842349760661A9254CB
24,802,917 UART: [art] SIG.S = 40BCA528EEB2BC3D936D6A7E2AF61D6B07CFE967243BB101283CF15B4424BFC58B2A125C461A9284975CE29442CAE31D
25,781,779 UART: Caliptra RT
25,782,491 UART: [state] CFI Enabled
25,963,086 UART: [rt] RT listening for mailbox commands...
25,995,202 UART: [rt]cmd =0x44504543, len=96
26,050,871 >>> mbox cmd response data (56 bytes)
26,052,219 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,082,425 UART: [rt]cmd =0x54514754, len=24
26,084,791 >>> mbox cmd response: failed
26,085,217 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,115,109 UART: [rt]cmd =0x54514754, len=24
26,117,642 >>> mbox cmd response data (8 bytes)
26,118,111 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,148,963 UART: [rt]cmd =0x44504543, len=96
26,199,817 >>> mbox cmd response data (56 bytes)
26,200,542 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,230,477 UART: [rt]cmd =0x47544744, len=8
26,233,568 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,460,765 ready_for_fw is high
3,461,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,753 >>> mbox cmd response: success
14,234,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,514,663 UART:
18,515,049 UART: Running Caliptra FMC ...
18,516,204 UART:
18,516,361 UART: [state] CFI Enabled
18,583,870 UART: [fht] FMC Alias Private Key: 7
20,350,324 UART: [art] Extend RT PCRs Done
20,351,545 UART: [art] Lock RT PCRs Done
20,353,220 UART: [art] Populate DV Done
20,358,530 UART: [fht] FMC Alias Private Key: 7
20,360,072 UART: [art] Derive CDI
20,360,891 UART: [art] Store in slot 0x4
20,417,481 UART: [art] Derive Key Pair
20,418,523 UART: [art] Store priv key in slot 0x5
22,881,726 UART: [art] Derive Key Pair - Done
22,894,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,607,077 UART: [art] Erasing AUTHORITY.KEYID = 7
24,608,569 UART: [art] PUB.X = 82CE425964963896FE53CED5E6BA75A57817352D5489244B445DD28304368CF6F9F35194B29048DE6465D1D60BF2E930
24,615,868 UART: [art] PUB.Y = F1651AEEDE2AF6EA847D0D86CC736C92BE2E21618F84CC5AA6CC52FEC460F494F39BDED097C37736DDD18CCEE88DA7D3
24,623,135 UART: [art] SIG.R = EF9FA1C4621B5A10FD6FCD5E2D570DAF08B61F552B629B1C6FD0F6A6F84BAD2289C89C202BB0CECFD9532E47D48F10A7
24,630,636 UART: [art] SIG.S = 64A6B0E134B97C00396276FE63021F3B446E8141A96301DF6E76662A103361ED81A72E1C0904FB29B5E49CD9EF5143B7
25,609,304 UART: Caliptra RT
25,610,022 UART: [state] CFI Enabled
25,791,272 UART: [rt] RT listening for mailbox commands...
25,823,121 UART: [rt]cmd =0x44504543, len=96
25,878,735 >>> mbox cmd response data (56 bytes)
25,880,057 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,910,315 UART: [rt]cmd =0x54514754, len=24
25,912,862 >>> mbox cmd response: failed
25,913,365 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,943,375 UART: [rt]cmd =0x54514754, len=24
25,945,807 >>> mbox cmd response data (8 bytes)
25,946,349 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,976,882 UART: [rt]cmd =0x44504543, len=96
26,028,596 >>> mbox cmd response data (56 bytes)
26,029,343 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,059,119 UART: [rt]cmd =0x47544744, len=8
26,062,029 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,502 UART:
192,866 UART: Running Caliptra ROM ...
193,997 UART:
603,634 UART: [state] CFI Enabled
619,235 UART: [state] LifecycleState = Unprovisioned
621,239 UART: [state] DebugLocked = No
622,639 UART: [state] WD Timer not started. Device not locked for debugging
625,756 UART: [kat] SHA2-256
805,428 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,227 UART: [kat] ++
816,675 UART: [kat] sha1
828,045 UART: [kat] SHA2-256
830,707 UART: [kat] SHA2-384
836,700 UART: [kat] SHA2-512-ACC
839,068 UART: [kat] ECC-384
3,282,658 UART: [kat] HMAC-384Kdf
3,294,121 UART: [kat] LMS
3,770,583 UART: [kat] --
3,775,526 UART: [cold-reset] ++
3,776,902 UART: [fht] FHT @ 0x50003400
3,789,232 UART: [idev] ++
3,789,889 UART: [idev] CDI.KEYID = 6
3,790,802 UART: [idev] SUBJECT.KEYID = 7
3,792,051 UART: [idev] UDS.KEYID = 0
3,792,979 ready_for_fw is high
3,793,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,149 UART: [idev] Erasing UDS.KEYID = 0
6,273,947 UART: [idev] Sha1 KeyId Algorithm
6,297,917 UART: [idev] --
6,301,511 UART: [ldev] ++
6,302,089 UART: [ldev] CDI.KEYID = 6
6,303,109 UART: [ldev] SUBJECT.KEYID = 5
6,304,217 UART: [ldev] AUTHORITY.KEYID = 7
6,305,504 UART: [ldev] FE.KEYID = 1
6,315,667 UART: [ldev] Erasing FE.KEYID = 1
8,791,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,307 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,049 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,954 UART: [ldev] --
10,588,082 UART: [fwproc] Wait for Commands...
10,589,639 UART: [fwproc] Recv command 0x46574c44
10,591,630 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,929 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,152,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,225,061 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,553,425 >>> mbox cmd response: success
14,554,031 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,556,711 UART: [afmc] ++
14,557,296 UART: [afmc] CDI.KEYID = 6
14,558,372 UART: [afmc] SUBJECT.KEYID = 7
14,559,479 UART: [afmc] AUTHORITY.KEYID = 5
17,061,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,789 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,971 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,800,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,880 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,832,409 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,857,086 UART: [afmc] --
18,861,507 UART: [cold-reset] --
18,864,292 UART: [state] Locking Datavault
18,869,598 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,354 UART: [state] Locking ICCM
18,872,425 UART: [exit] Launching FMC @ 0x40000130
18,880,881 UART:
18,881,117 UART: Running Caliptra FMC ...
18,882,219 UART:
18,882,378 UART: [state] CFI Enabled
18,890,368 UART: [fht] FMC Alias Private Key: 7
20,656,527 UART: [art] Extend RT PCRs Done
20,657,747 UART: [art] Lock RT PCRs Done
20,659,400 UART: [art] Populate DV Done
20,664,975 UART: [fht] FMC Alias Private Key: 7
20,666,675 UART: [art] Derive CDI
20,667,491 UART: [art] Store in slot 0x4
20,710,302 UART: [art] Derive Key Pair
20,711,344 UART: [art] Store priv key in slot 0x5
23,138,118 UART: [art] Derive Key Pair - Done
23,151,009 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,859,369 UART: [art] PUB.X = 95DEFF0C7EFAB1257368A277B7C772D6EE4B2DF6E6BEF51028A2A2C454C4D3C0AC8CB3E375060D803990CEE28DBC5764
24,866,668 UART: [art] PUB.Y = 81EC10C2EFAAEE103BDE0F4CC9ADB92D605ED2ADCFFD4688715464C91F7754516998F91997F726B7E2E46608F2EE5CF6
24,873,910 UART: [art] SIG.R = 7E1A0A7C56FB66C1215B1626FFE5834268A112ACC125878E6AB0BFB64B4B95D4FD8292846F54DF89C150F8F8BCB3E1B8
24,881,307 UART: [art] SIG.S = F511CE1A822E930B4099A171E50ED6538987FD541ECBDD65E9723B96647E4441CB1870D663F22D869E714E3EEE0B07E8
25,859,986 UART: Caliptra RT
25,860,695 UART: [state] CFI Enabled
25,993,784 UART: [rt] RT listening for mailbox commands...
26,025,795 UART: [rt]cmd =0x44504543, len=96
26,062,835 >>> mbox cmd response data (56 bytes)
26,064,188 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,094,498 UART: [rt]cmd =0x54514754, len=24
26,096,919 >>> mbox cmd response: failed
26,097,409 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,127,449 UART: [rt]cmd =0x54514754, len=24
26,130,237 >>> mbox cmd response data (8 bytes)
26,130,802 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,161,342 UART: [rt]cmd =0x44504543, len=96
26,199,148 >>> mbox cmd response data (56 bytes)
26,199,839 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,229,557 UART: [rt]cmd =0x47544744, len=8
26,232,402 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,779,138 ready_for_fw is high
3,779,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,452,738 >>> mbox cmd response: success
14,453,341 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
18,709,179 UART:
18,709,558 UART: Running Caliptra FMC ...
18,710,776 UART:
18,710,945 UART: [state] CFI Enabled
18,718,656 UART: [fht] FMC Alias Private Key: 7
20,484,878 UART: [art] Extend RT PCRs Done
20,486,202 UART: [art] Lock RT PCRs Done
20,487,707 UART: [art] Populate DV Done
20,493,249 UART: [fht] FMC Alias Private Key: 7
20,494,740 UART: [art] Derive CDI
20,495,514 UART: [art] Store in slot 0x4
20,538,058 UART: [art] Derive Key Pair
20,539,110 UART: [art] Store priv key in slot 0x5
22,966,558 UART: [art] Derive Key Pair - Done
22,979,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,685,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,687,337 UART: [art] PUB.X = B261DC55E7634F7BD46954E2BC31CB4B277CDB161AFE2A158EA8E4E148FF6A12BD05132096E09995F6F6B8A0F2A6E3A3
24,694,595 UART: [art] PUB.Y = E07FE40A82999C49CF1C14C15651BE948ABD431802F619631667B6A4791F73569BBF10D08B3BC4C11EF8446A00AFDC28
24,701,822 UART: [art] SIG.R = D08D9FDD82268CE57BE9CB8D83F4AEAC9ABA7650B6A09D7394217335A075B40590E6398D2AC0B563F16229391E605D25
24,709,230 UART: [art] SIG.S = 7E1DA7302E059FD4040FDCB4306384823DEC4C748E1721F83E9F41C310CB87CD63DBB3F4FF04A18708CB7C99E6CBF1B3
25,688,332 UART: Caliptra RT
25,689,035 UART: [state] CFI Enabled
25,821,879 UART: [rt] RT listening for mailbox commands...
25,853,891 UART: [rt]cmd =0x44504543, len=96
25,891,941 >>> mbox cmd response data (56 bytes)
25,893,440 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,923,585 UART: [rt]cmd =0x54514754, len=24
25,926,102 >>> mbox cmd response: failed
25,926,595 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,956,683 UART: [rt]cmd =0x54514754, len=24
25,959,472 >>> mbox cmd response data (8 bytes)
25,960,073 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
25,990,561 UART: [rt]cmd =0x44504543, len=96
26,028,662 >>> mbox cmd response data (56 bytes)
26,029,440 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,059,174 UART: [rt]cmd =0x47544744, len=8
26,062,311 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,049 UART:
192,433 UART: Running Caliptra ROM ...
193,524 UART:
193,667 UART: [state] CFI Enabled
264,210 UART: [state] LifecycleState = Unprovisioned
266,627 UART: [state] DebugLocked = No
267,934 UART: [state] WD Timer not started. Device not locked for debugging
273,394 UART: [kat] SHA2-256
463,296 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,031 UART: [kat] ++
474,483 UART: [kat] sha1
485,921 UART: [kat] SHA2-256
488,989 UART: [kat] SHA2-384
495,681 UART: [kat] SHA2-512-ACC
498,252 UART: [kat] ECC-384
2,949,542 UART: [kat] HMAC-384Kdf
2,972,020 UART: [kat] LMS
3,503,804 UART: [kat] --
3,508,463 UART: [cold-reset] ++
3,509,975 UART: [fht] FHT @ 0x50003400
3,520,888 UART: [idev] ++
3,521,593 UART: [idev] CDI.KEYID = 6
3,522,505 UART: [idev] SUBJECT.KEYID = 7
3,523,745 UART: [idev] UDS.KEYID = 0
3,524,667 ready_for_fw is high
3,524,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,997 UART: [idev] Erasing UDS.KEYID = 0
6,032,155 UART: [idev] Sha1 KeyId Algorithm
6,054,742 UART: [idev] --
6,060,032 UART: [ldev] ++
6,060,715 UART: [ldev] CDI.KEYID = 6
6,061,617 UART: [ldev] SUBJECT.KEYID = 5
6,062,835 UART: [ldev] AUTHORITY.KEYID = 7
6,063,963 UART: [ldev] FE.KEYID = 1
6,099,822 UART: [ldev] Erasing FE.KEYID = 1
8,607,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,970 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,600 UART: [ldev] --
10,412,274 UART: [fwproc] Wait for Commands...
10,415,494 UART: [fwproc] Recv command 0x46574c44
10,417,744 UART: [fwproc] Recv'd Img size: 118548 bytes
13,907,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,982,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,308 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,666,513 >>> mbox cmd response: success
14,667,691 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,670,968 UART: [afmc] ++
14,671,669 UART: [afmc] CDI.KEYID = 6
14,672,769 UART: [afmc] SUBJECT.KEYID = 7
14,674,302 UART: [afmc] AUTHORITY.KEYID = 5
17,212,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,990 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,898 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,977 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,150 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,090 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,217 UART: [afmc] --
19,013,003 UART: [cold-reset] --
19,017,191 UART: [state] Locking Datavault
19,023,028 UART: [state] Locking PCR0, PCR1 and PCR31
19,025,178 UART: [state] Locking ICCM
19,027,628 UART: [exit] Launching FMC @ 0x40000130
19,036,297 UART:
19,036,536 UART: Running Caliptra FMC ...
19,037,637 UART:
19,037,797 UART: [state] CFI Enabled
19,094,617 UART: [fht] FMC Alias Private Key: 7
20,861,099 UART: [art] Extend RT PCRs Done
20,862,330 UART: [art] Lock RT PCRs Done
20,863,928 UART: [art] Populate DV Done
20,869,439 UART: [fht] FMC Alias Private Key: 7
20,871,134 UART: [art] Derive CDI
20,871,869 UART: [art] Store in slot 0x4
20,928,934 UART: [art] Derive Key Pair
20,929,970 UART: [art] Store priv key in slot 0x5
23,392,473 UART: [art] Derive Key Pair - Done
23,405,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,117,800 UART: [art] Erasing AUTHORITY.KEYID = 7
25,119,305 UART: [art] PUB.X = 6F54B5EF9C55C91E8B6A7F8E6136DD1FB9BF0FB4BB6A1852ADA3754711807FA01C90ADAF0F7B133FFDB57BC38439F9E5
25,126,545 UART: [art] PUB.Y = 05A5F6CAC847F125A031D51AD68ABF454C71B3CFC7707D845C85D94E9560A300E6DE783F9F8675D4CDDB523470BAAF6E
25,133,835 UART: [art] SIG.R = D64EE4AC8244A1D7EA711A8AD73D1DA23C1743E026C8A783F26ED65B6F70B742EEED5C6ECF4A0F1195586FDDC9EB0A40
25,141,411 UART: [art] SIG.S = 3EACEB0BFA92B1034F7470E80260362BB0E50936A2BCEDB05D90235E1627075666A9C178343AF6FB63440BA8F5632278
26,120,283 UART: Caliptra RT
26,120,971 UART: [state] CFI Enabled
26,300,362 UART: [rt] RT listening for mailbox commands...
26,332,578 UART: [rt]cmd =0x44504543, len=96
26,388,510 >>> mbox cmd response data (56 bytes)
26,389,762 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,419,783 UART: [rt]cmd =0x54514754, len=24
26,422,114 >>> mbox cmd response: failed
26,422,642 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,452,327 UART: [rt]cmd =0x54514754, len=24
26,455,106 >>> mbox cmd response data (8 bytes)
26,455,664 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,486,200 UART: [rt]cmd =0x44504543, len=96
26,537,420 >>> mbox cmd response data (56 bytes)
26,538,151 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,567,868 UART: [rt]cmd =0x47544744, len=8
26,570,906 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,437,289 ready_for_fw is high
3,437,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,829,585 >>> mbox cmd response: success
14,830,719 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,114,519 UART:
19,114,904 UART: Running Caliptra FMC ...
19,116,002 UART:
19,116,161 UART: [state] CFI Enabled
19,182,333 UART: [fht] FMC Alias Private Key: 7
20,949,016 UART: [art] Extend RT PCRs Done
20,950,244 UART: [art] Lock RT PCRs Done
20,952,167 UART: [art] Populate DV Done
20,957,862 UART: [fht] FMC Alias Private Key: 7
20,959,511 UART: [art] Derive CDI
20,960,328 UART: [art] Store in slot 0x4
21,015,343 UART: [art] Derive Key Pair
21,016,390 UART: [art] Store priv key in slot 0x5
23,478,986 UART: [art] Derive Key Pair - Done
23,492,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,620 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,265 UART: [art] PUB.X = 863ED14B461C9A96F3900E431CF767EE520708FAD3A7BA5BE8C62379F98B5F111F6C8F75EBC6D319CA65D1CE033BC21D
25,214,403 UART: [art] PUB.Y = F9050A400F8C620F76D9DF5A14A725A27F8608343E2ED21B7A362C27CD7D5C6F6580CBDE2ED3F97F3060E7DEEE89284C
25,221,690 UART: [art] SIG.R = D20B7C902B0ED32F6D812014D819E2DA2C54D3A7B3ACE5A91D4D8B5733604706860286E31A0248A595FCCE43EA7D394F
25,229,022 UART: [art] SIG.S = 96D77D08CC09DCCD74430B53E24222ACC2DB83439BA07BEF4CE33B3AA35CDC6A5707C845C6BF6D129A88F14C82CE095F
26,208,332 UART: Caliptra RT
26,209,046 UART: [state] CFI Enabled
26,390,392 UART: [rt] RT listening for mailbox commands...
26,422,498 UART: [rt]cmd =0x44504543, len=96
26,477,127 >>> mbox cmd response data (56 bytes)
26,478,310 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,508,301 UART: [rt]cmd =0x54514754, len=24
26,510,916 >>> mbox cmd response: failed
26,511,384 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,541,232 UART: [rt]cmd =0x54514754, len=24
26,544,003 >>> mbox cmd response data (8 bytes)
26,544,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,575,075 UART: [rt]cmd =0x44504543, len=96
26,626,472 >>> mbox cmd response data (56 bytes)
26,627,178 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,657,074 UART: [rt]cmd =0x47544744, len=8
26,659,626 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,150 writing to cptra_bootfsm_go
192,443 UART:
192,814 UART: Running Caliptra ROM ...
193,997 UART:
603,485 UART: [state] CFI Enabled
615,260 UART: [state] LifecycleState = Unprovisioned
617,646 UART: [state] DebugLocked = No
619,112 UART: [state] WD Timer not started. Device not locked for debugging
623,163 UART: [kat] SHA2-256
813,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,817 UART: [kat] ++
824,338 UART: [kat] sha1
835,779 UART: [kat] SHA2-256
838,791 UART: [kat] SHA2-384
845,848 UART: [kat] SHA2-512-ACC
848,373 UART: [kat] ECC-384
3,291,206 UART: [kat] HMAC-384Kdf
3,303,578 UART: [kat] LMS
3,835,373 UART: [kat] --
3,840,727 UART: [cold-reset] ++
3,843,160 UART: [fht] FHT @ 0x50003400
3,855,216 UART: [idev] ++
3,855,893 UART: [idev] CDI.KEYID = 6
3,856,812 UART: [idev] SUBJECT.KEYID = 7
3,858,062 UART: [idev] UDS.KEYID = 0
3,858,992 ready_for_fw is high
3,859,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,945 UART: [idev] Erasing UDS.KEYID = 0
6,336,563 UART: [idev] Sha1 KeyId Algorithm
6,358,083 UART: [idev] --
6,362,090 UART: [ldev] ++
6,362,780 UART: [ldev] CDI.KEYID = 6
6,363,697 UART: [ldev] SUBJECT.KEYID = 5
6,364,863 UART: [ldev] AUTHORITY.KEYID = 7
6,366,096 UART: [ldev] FE.KEYID = 1
6,377,615 UART: [ldev] Erasing FE.KEYID = 1
8,858,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,038 UART: [ldev] --
10,650,554 UART: [fwproc] Wait for Commands...
10,653,015 UART: [fwproc] Recv command 0x46574c44
10,655,341 UART: [fwproc] Recv'd Img size: 118548 bytes
14,151,651 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,227,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,350,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,577 >>> mbox cmd response: success
14,911,172 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
14,914,261 UART: [afmc] ++
14,914,962 UART: [afmc] CDI.KEYID = 6
14,916,157 UART: [afmc] SUBJECT.KEYID = 7
14,917,654 UART: [afmc] AUTHORITY.KEYID = 5
17,421,396 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,206 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,186 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,388 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,390 UART: [afmc] --
19,218,427 UART: [cold-reset] --
19,221,496 UART: [state] Locking Datavault
19,228,265 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,464 UART: [state] Locking ICCM
19,233,486 UART: [exit] Launching FMC @ 0x40000130
19,242,115 UART:
19,242,361 UART: Running Caliptra FMC ...
19,243,395 UART:
19,243,548 UART: [state] CFI Enabled
19,251,301 UART: [fht] FMC Alias Private Key: 7
21,017,238 UART: [art] Extend RT PCRs Done
21,018,467 UART: [art] Lock RT PCRs Done
21,020,076 UART: [art] Populate DV Done
21,025,524 UART: [fht] FMC Alias Private Key: 7
21,027,020 UART: [art] Derive CDI
21,027,793 UART: [art] Store in slot 0x4
21,070,754 UART: [art] Derive Key Pair
21,071,793 UART: [art] Store priv key in slot 0x5
23,499,144 UART: [art] Derive Key Pair - Done
23,511,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,243 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,754 UART: [art] PUB.X = 611F4D8F7F555095053EFBAEDE1ABEDD277D7941C412BF9D469552A2530C3F9732FB5CC96A5D186104047A560D9CF47C
25,227,020 UART: [art] PUB.Y = 2DD07DD0E2C63E38C34F8035A012F25D3A33086A6C25E8AD42756A793103147CDDDD6358ACD007F06DE5D6F24C5D6A27
25,234,274 UART: [art] SIG.R = 355B6CA95778B395CA03B0AEAC5D4A62F521ACFDF7D3E393A8351E42A9488EDDFA62925284D99F94394A49C5F011CEF0
25,241,692 UART: [art] SIG.S = 7427EE6696C60DD340886FF3DCD162DB01FFE4EC844105B2775F20140CE33BACF21635F5B0C28299C0A0E731DA131B65
26,220,991 UART: Caliptra RT
26,221,685 UART: [state] CFI Enabled
26,355,018 UART: [rt] RT listening for mailbox commands...
26,387,266 UART: [rt]cmd =0x44504543, len=96
26,424,196 >>> mbox cmd response data (56 bytes)
26,425,375 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,455,356 UART: [rt]cmd =0x54514754, len=24
26,457,923 >>> mbox cmd response: failed
26,458,415 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,488,317 UART: [rt]cmd =0x54514754, len=24
26,490,961 >>> mbox cmd response data (8 bytes)
26,491,548 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,521,765 UART: [rt]cmd =0x44504543, len=96
26,559,079 >>> mbox cmd response data (56 bytes)
26,559,775 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,589,566 UART: [rt]cmd =0x47544744, len=8
26,592,585 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,754,317 ready_for_fw is high
3,754,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,699 >>> mbox cmd response: success
15,045,425 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
19,300,728 UART:
19,301,104 UART: Running Caliptra FMC ...
19,302,242 UART:
19,302,398 UART: [state] CFI Enabled
19,310,725 UART: [fht] FMC Alias Private Key: 7
21,076,972 UART: [art] Extend RT PCRs Done
21,078,192 UART: [art] Lock RT PCRs Done
21,079,725 UART: [art] Populate DV Done
21,085,365 UART: [fht] FMC Alias Private Key: 7
21,086,968 UART: [art] Derive CDI
21,087,790 UART: [art] Store in slot 0x4
21,130,826 UART: [art] Derive Key Pair
21,131,862 UART: [art] Store priv key in slot 0x5
23,558,825 UART: [art] Derive Key Pair - Done
23,571,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,278,493 UART: [art] Erasing AUTHORITY.KEYID = 7
25,280,013 UART: [art] PUB.X = E4F65E52139090E5F457564A0B63EAFB5ADC5E3C09D093202ADC4A05FC87668FC22022FC1CA4052F88CE5820EF568B8E
25,287,235 UART: [art] PUB.Y = D40DF365D813472CAD471F69F3DE33E723CEC92CAC0445BE6076C4EB52A90735ED39CC93DAA8FC3D5818A941733BEA22
25,294,539 UART: [art] SIG.R = BC102AE0C7632627A8DBB96BCD5B636D198F72620D72F17360FC5286DE0F24194567A53EAD15FF1B1F5249972B64D3A3
25,301,905 UART: [art] SIG.S = 08EF7D653561C00A6767F633E350E9AE48201313B7EF2170E5AE9BF5D7DC99A33ADEB71AF76ADB6AF5B54E5F503EFE37
26,281,127 UART: Caliptra RT
26,281,837 UART: [state] CFI Enabled
26,414,422 UART: [rt] RT listening for mailbox commands...
26,446,497 UART: [rt]cmd =0x44504543, len=96
26,484,230 >>> mbox cmd response data (56 bytes)
26,485,570 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,515,537 UART: [rt]cmd =0x54514754, len=24
26,517,950 >>> mbox cmd response: failed
26,518,449 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,548,491 UART: [rt]cmd =0x54514754, len=24
26,550,963 >>> mbox cmd response data (8 bytes)
26,551,523 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
26,581,902 UART: [rt]cmd =0x44504543, len=96
26,620,087 >>> mbox cmd response data (56 bytes)
26,620,800 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
26,650,493 UART: [rt]cmd =0x47544744, len=8
26,653,438 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,895 UART: [kat] SHA2-256
881,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,941 UART: [kat] ++
886,093 UART: [kat] sha1
890,277 UART: [kat] SHA2-256
892,215 UART: [kat] SHA2-384
894,892 UART: [kat] SHA2-512-ACC
896,793 UART: [kat] ECC-384
902,234 UART: [kat] HMAC-384Kdf
906,678 UART: [kat] LMS
1,474,874 UART: [kat] --
1,475,541 UART: [cold-reset] ++
1,476,117 UART: [fht] Storing FHT @ 0x50003400
1,478,938 UART: [idev] ++
1,479,106 UART: [idev] CDI.KEYID = 6
1,479,466 UART: [idev] SUBJECT.KEYID = 7
1,479,890 UART: [idev] UDS.KEYID = 0
1,480,235 ready_for_fw is high
1,480,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,670 UART: [idev] Erasing UDS.KEYID = 0
1,504,130 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,948 UART: [idev] --
1,513,829 UART: [ldev] ++
1,513,997 UART: [ldev] CDI.KEYID = 6
1,514,360 UART: [ldev] SUBJECT.KEYID = 5
1,514,786 UART: [ldev] AUTHORITY.KEYID = 7
1,515,249 UART: [ldev] FE.KEYID = 1
1,520,439 UART: [ldev] Erasing FE.KEYID = 1
1,545,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,416 UART: [ldev] --
1,584,831 UART: [fwproc] Waiting for Commands...
1,585,628 UART: [fwproc] Received command 0x46574c44
1,586,419 UART: [fwproc] Received Image of size 118548 bytes
2,931,819 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,581 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,799 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,120 >>> mbox cmd response: success
3,131,120 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,132,310 UART: [afmc] ++
3,132,478 UART: [afmc] CDI.KEYID = 6
3,132,840 UART: [afmc] SUBJECT.KEYID = 7
3,133,265 UART: [afmc] AUTHORITY.KEYID = 5
3,168,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,918 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,698 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,290 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,973 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,883 UART: [afmc] --
3,211,893 UART: [cold-reset] --
3,212,679 UART: [state] Locking Datavault
3,213,996 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,600 UART: [state] Locking ICCM
3,215,262 UART: [exit] Launching FMC @ 0x40000130
3,220,592 UART:
3,220,608 UART: Running Caliptra FMC ...
3,221,016 UART:
3,221,070 UART: [state] CFI Enabled
3,231,736 UART: [fht] FMC Alias Private Key: 7
3,350,774 UART: [art] Extend RT PCRs Done
3,351,202 UART: [art] Lock RT PCRs Done
3,352,754 UART: [art] Populate DV Done
3,360,727 UART: [fht] FMC Alias Private Key: 7
3,361,717 UART: [art] Derive CDI
3,361,997 UART: [art] Store in slot 0x4
3,446,999 UART: [art] Derive Key Pair
3,447,359 UART: [art] Store priv key in slot 0x5
3,460,562 UART: [art] Derive Key Pair - Done
3,474,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,616 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,381 UART: [art] PUB.X = 0AF08F458F66626D3EBB80248D7BC29AE0DCC61A653E454077C8FBC5EFB6B63211F5B1FFA679FA3662404F1F16F478E0
3,498,160 UART: [art] PUB.Y = 97E0AB35EF39235B8B779D10EE2861173AA5155C9CC3300393852AF14032DC82614FC0C790368C6AC948BCBD56DB369D
3,505,109 UART: [art] SIG.R = 594E2779AEDCA368AF78A4690AF06283B3B43A6878EF189F43D159AAD938A43003B5AAEC16BD4C2F3BF27DACAC5C2834
3,511,889 UART: [art] SIG.S = BA5F722F6E0A2448D70FEE670E49336EB3C6797F628F76EE68F614AD96998B2A924B193A75C79C2091918121A7E48235
3,536,004 UART: Caliptra RT
3,536,255 UART: [state] CFI Enabled
3,656,831 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,179 UART: [rt]cmd =0x44504543, len=96
3,726,538 >>> mbox cmd response data (56 bytes)
3,726,539 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,755,978 UART: [rt]cmd =0x54514754, len=24
3,757,998 >>> mbox cmd response: failed
3,757,998 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,787,354 UART: [rt]cmd =0x54514754, len=24
3,789,726 >>> mbox cmd response data (8 bytes)
3,789,727 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,819,732 UART: [rt]cmd =0x44504543, len=96
3,857,011 >>> mbox cmd response data (56 bytes)
3,857,012 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,886,319 UART: [rt]cmd =0x47544744, len=8
3,888,701 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,731 ready_for_fw is high
1,362,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,764 >>> mbox cmd response: success
2,980,764 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,042,053 UART:
3,042,069 UART: Running Caliptra FMC ...
3,042,477 UART:
3,042,531 UART: [state] CFI Enabled
3,052,905 UART: [fht] FMC Alias Private Key: 7
3,171,263 UART: [art] Extend RT PCRs Done
3,171,691 UART: [art] Lock RT PCRs Done
3,173,153 UART: [art] Populate DV Done
3,181,474 UART: [fht] FMC Alias Private Key: 7
3,182,570 UART: [art] Derive CDI
3,182,850 UART: [art] Store in slot 0x4
3,269,078 UART: [art] Derive Key Pair
3,269,438 UART: [art] Store priv key in slot 0x5
3,282,543 UART: [art] Derive Key Pair - Done
3,297,534 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,093 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,858 UART: [art] PUB.X = 7F657F4CCB0432FBD22A917C8751871C9D3043002BF26BA0B7CEF5AFDA1C8DE6255740A4C9C4367FB8C5AE2E6D7DBFB8
3,320,623 UART: [art] PUB.Y = 63C637D1A121B848FBE5ED26CFDCC256C9735655A1996FBBFCE7868C422A92D7094ADCA298B2A4235AF771A39378D982
3,327,578 UART: [art] SIG.R = AC6A2AAEEE32AA91ABBFCF3B4BD51463C46BEAE34F2FA99A624C01D2C194260C35F3B6616FA748A3A8E13D0A5CCBFC47
3,334,369 UART: [art] SIG.S = 72E49497A3381E2F476C5878A00D157B785C62C2A074522702EF843537F32AD272474140892C8CBB03DE1256858B98E4
3,357,766 UART: Caliptra RT
3,358,017 UART: [state] CFI Enabled
3,477,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,759 UART: [rt]cmd =0x44504543, len=96
3,546,876 >>> mbox cmd response data (56 bytes)
3,546,877 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,576,352 UART: [rt]cmd =0x54514754, len=24
3,578,222 >>> mbox cmd response: failed
3,578,222 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,607,940 UART: [rt]cmd =0x54514754, len=24
3,610,412 >>> mbox cmd response data (8 bytes)
3,610,413 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,640,334 UART: [rt]cmd =0x44504543, len=96
3,678,261 >>> mbox cmd response data (56 bytes)
3,678,262 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,707,681 UART: [rt]cmd =0x47544744, len=8
3,710,315 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,724 UART: [kat] SHA2-256
882,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,770 UART: [kat] ++
886,922 UART: [kat] sha1
891,292 UART: [kat] SHA2-256
893,230 UART: [kat] SHA2-384
895,757 UART: [kat] SHA2-512-ACC
897,658 UART: [kat] ECC-384
903,381 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,477,310 UART: [cold-reset] ++
1,477,868 UART: [fht] Storing FHT @ 0x50003400
1,480,621 UART: [idev] ++
1,480,789 UART: [idev] CDI.KEYID = 6
1,481,149 UART: [idev] SUBJECT.KEYID = 7
1,481,573 UART: [idev] UDS.KEYID = 0
1,481,918 ready_for_fw is high
1,481,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,819 UART: [idev] Erasing UDS.KEYID = 0
1,506,059 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,783 UART: [idev] --
1,515,684 UART: [ldev] ++
1,515,852 UART: [ldev] CDI.KEYID = 6
1,516,215 UART: [ldev] SUBJECT.KEYID = 5
1,516,641 UART: [ldev] AUTHORITY.KEYID = 7
1,517,104 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,548,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,897 UART: [ldev] --
1,588,222 UART: [fwproc] Waiting for Commands...
1,588,917 UART: [fwproc] Received command 0x46574c44
1,589,708 UART: [fwproc] Received Image of size 118548 bytes
2,934,362 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,872 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,090 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,491 >>> mbox cmd response: success
3,133,491 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,134,527 UART: [afmc] ++
3,134,695 UART: [afmc] CDI.KEYID = 6
3,135,057 UART: [afmc] SUBJECT.KEYID = 7
3,135,482 UART: [afmc] AUTHORITY.KEYID = 5
3,170,525 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,725 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,505 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,214 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,097 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,780 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,616 UART: [afmc] --
3,213,712 UART: [cold-reset] --
3,214,492 UART: [state] Locking Datavault
3,215,749 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,353 UART: [state] Locking ICCM
3,216,867 UART: [exit] Launching FMC @ 0x40000130
3,222,197 UART:
3,222,213 UART: Running Caliptra FMC ...
3,222,621 UART:
3,222,764 UART: [state] CFI Enabled
3,233,438 UART: [fht] FMC Alias Private Key: 7
3,352,490 UART: [art] Extend RT PCRs Done
3,352,918 UART: [art] Lock RT PCRs Done
3,354,332 UART: [art] Populate DV Done
3,362,279 UART: [fht] FMC Alias Private Key: 7
3,363,409 UART: [art] Derive CDI
3,363,689 UART: [art] Store in slot 0x4
3,449,681 UART: [art] Derive Key Pair
3,450,041 UART: [art] Store priv key in slot 0x5
3,463,198 UART: [art] Derive Key Pair - Done
3,478,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,338 UART: [art] PUB.X = 5D0C710EFF8278D50DE3F5DD2A8DF269B35CD37EAB5A9DBD9E9661F13AFC7E7F15154A3D3487A2D81651CD46FDF6520D
3,501,116 UART: [art] PUB.Y = 9AF1D92A4717206A38673F5A25AE57CA86207BC8CF77E4BAB823BF30129C41C8B59E9EF68529E691782924B64E01F544
3,508,063 UART: [art] SIG.R = 2BA812A7961DDF7C49E7262BBBDC696D6C07E009D04FACE21AA4C79D303F5C9DCDE4FE7C2835D0A7F77A6DCDE9F58A22
3,514,853 UART: [art] SIG.S = 0AC8B37E30DE3564646A4D24C3542A9746F6C973EDF30BF0AFFA5262C5B68F8ADC60BFA0395E200954A9EC607EE6859E
3,538,854 UART: Caliptra RT
3,539,197 UART: [state] CFI Enabled
3,659,378 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,414 UART: [rt]cmd =0x44504543, len=96
3,728,311 >>> mbox cmd response data (56 bytes)
3,728,312 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,757,813 UART: [rt]cmd =0x54514754, len=24
3,759,601 >>> mbox cmd response: failed
3,759,601 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,789,127 UART: [rt]cmd =0x54514754, len=24
3,791,281 >>> mbox cmd response data (8 bytes)
3,791,282 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,821,073 UART: [rt]cmd =0x44504543, len=96
3,859,004 >>> mbox cmd response data (56 bytes)
3,859,005 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,888,374 UART: [rt]cmd =0x47544744, len=8
3,890,662 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,160 ready_for_fw is high
1,363,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,133 >>> mbox cmd response: success
2,983,133 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
3,045,102 UART:
3,045,118 UART: Running Caliptra FMC ...
3,045,526 UART:
3,045,669 UART: [state] CFI Enabled
3,056,201 UART: [fht] FMC Alias Private Key: 7
3,174,961 UART: [art] Extend RT PCRs Done
3,175,389 UART: [art] Lock RT PCRs Done
3,176,897 UART: [art] Populate DV Done
3,185,260 UART: [fht] FMC Alias Private Key: 7
3,186,322 UART: [art] Derive CDI
3,186,602 UART: [art] Store in slot 0x4
3,272,152 UART: [art] Derive Key Pair
3,272,512 UART: [art] Store priv key in slot 0x5
3,285,753 UART: [art] Derive Key Pair - Done
3,300,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,371 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,136 UART: [art] PUB.X = CB949C114E5EE46B436A468491B36BA8034319217B8B4EA3478FC7B856B99ACC996CC8B8B16441B0C50A903FA9130E8C
3,323,901 UART: [art] PUB.Y = A5CCA1EB2E17BA18C5027105843720396210B51498E823B7F5A17900CFD22CC0B3D03E2C31C97A3E9AABFFB945BFCA87
3,330,835 UART: [art] SIG.R = FCDB8BF9E4466F1A93FFA9B9577740A1DD90BE6303799837738729A57BCF50E5D8C55DF21CF53E9C303A10B5F93E1328
3,337,610 UART: [art] SIG.S = 2E2BD7138F376EAAC35C353D8DC01139F93CF4027CE48197B5DC7D93EBA973FFA2EE27816347A90F8502CB36CCFBC950
3,361,363 UART: Caliptra RT
3,361,706 UART: [state] CFI Enabled
3,481,820 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,512,936 UART: [rt]cmd =0x44504543, len=96
3,551,073 >>> mbox cmd response data (56 bytes)
3,551,074 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,647 UART: [rt]cmd =0x54514754, len=24
3,582,739 >>> mbox cmd response: failed
3,582,739 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,612,343 UART: [rt]cmd =0x54514754, len=24
3,614,707 >>> mbox cmd response data (8 bytes)
3,614,708 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,644,469 UART: [rt]cmd =0x44504543, len=96
3,682,652 >>> mbox cmd response data (56 bytes)
3,682,653 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,711,980 UART: [rt]cmd =0x47544744, len=8
3,714,138 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,022 UART: [state] LifecycleState = Unprovisioned
85,677 UART: [state] DebugLocked = No
86,323 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,602 UART: [kat] SHA2-256
901,542 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
916,063 UART: [kat] HMAC-384Kdf
920,675 UART: [kat] LMS
1,168,987 UART: [kat] --
1,169,786 UART: [cold-reset] ++
1,170,164 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 ready_for_fw is high
1,174,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,615 UART: [idev] Erasing UDS.KEYID = 0
1,198,797 UART: [idev] Sha1 KeyId Algorithm
1,207,773 UART: [idev] --
1,208,782 UART: [ldev] ++
1,208,950 UART: [ldev] CDI.KEYID = 6
1,209,314 UART: [ldev] SUBJECT.KEYID = 5
1,209,741 UART: [ldev] AUTHORITY.KEYID = 7
1,210,204 UART: [ldev] FE.KEYID = 1
1,215,338 UART: [ldev] Erasing FE.KEYID = 1
1,241,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,372 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,382 UART: [ldev] --
1,280,685 UART: [fwproc] Wait for Commands...
1,281,308 UART: [fwproc] Recv command 0x46574c44
1,282,041 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,462 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,897 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,072 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,437 >>> mbox cmd response: success
2,826,437 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,491 UART: [afmc] ++
2,827,659 UART: [afmc] CDI.KEYID = 6
2,828,022 UART: [afmc] SUBJECT.KEYID = 7
2,828,448 UART: [afmc] AUTHORITY.KEYID = 5
2,863,955 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,343 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,040 UART: [afmc] --
2,906,937 UART: [cold-reset] --
2,907,727 UART: [state] Locking Datavault
2,908,802 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,406 UART: [state] Locking ICCM
2,909,932 UART: [exit] Launching FMC @ 0x40000130
2,915,262 UART:
2,915,278 UART: Running Caliptra FMC ...
2,915,686 UART:
2,915,740 UART: [state] CFI Enabled
2,926,528 UART: [fht] FMC Alias Private Key: 7
3,045,078 UART: [art] Extend RT PCRs Done
3,045,506 UART: [art] Lock RT PCRs Done
3,047,266 UART: [art] Populate DV Done
3,055,411 UART: [fht] FMC Alias Private Key: 7
3,056,391 UART: [art] Derive CDI
3,056,671 UART: [art] Store in slot 0x4
3,142,362 UART: [art] Derive Key Pair
3,142,722 UART: [art] Store priv key in slot 0x5
3,155,278 UART: [art] Derive Key Pair - Done
3,170,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,268 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,033 UART: [art] PUB.X = F4AEAB60528A6D551F8B51AA753659C1E6F87E9CC5C54134E1E93D90F57CA99DB0353536622B7152325E59A8C2EB73CF
3,192,809 UART: [art] PUB.Y = D22AAC90B8135A57D5986E90AF14FC7298F25710D0473043352E1BC740F2D5ED95D7B7D07D073F9FA492E6BAD149A378
3,199,760 UART: [art] SIG.R = 8E8D9C24F5B710863BCC0669C2D66E9658BEDD7D7E36CFBDF1D9E09303C3A88C7D82318DCD36F1515CD11C61BB33D74D
3,206,540 UART: [art] SIG.S = F55B81DC8D1A60C1E5F25BF8902CDB228F00F4EF16315165594807633D31F2E885F0B5299A8E7B6A451C42DA747F432E
3,230,029 UART: Caliptra RT
3,230,280 UART: [state] CFI Enabled
3,348,850 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,138 UART: [rt]cmd =0x44504543, len=96
3,418,479 >>> mbox cmd response data (56 bytes)
3,418,480 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,448,067 UART: [rt]cmd =0x54514754, len=24
3,449,891 >>> mbox cmd response: failed
3,449,891 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,479,641 UART: [rt]cmd =0x54514754, len=24
3,481,913 >>> mbox cmd response data (8 bytes)
3,481,914 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,965 UART: [rt]cmd =0x44504543, len=96
3,549,448 >>> mbox cmd response data (56 bytes)
3,549,449 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,578,798 UART: [rt]cmd =0x47544744, len=8
3,581,260 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,904 ready_for_fw is high
1,058,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,492 >>> mbox cmd response: success
2,677,492 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,739,825 UART:
2,739,841 UART: Running Caliptra FMC ...
2,740,249 UART:
2,740,303 UART: [state] CFI Enabled
2,750,959 UART: [fht] FMC Alias Private Key: 7
2,869,845 UART: [art] Extend RT PCRs Done
2,870,273 UART: [art] Lock RT PCRs Done
2,871,957 UART: [art] Populate DV Done
2,880,130 UART: [fht] FMC Alias Private Key: 7
2,881,240 UART: [art] Derive CDI
2,881,520 UART: [art] Store in slot 0x4
2,967,347 UART: [art] Derive Key Pair
2,967,707 UART: [art] Store priv key in slot 0x5
2,980,905 UART: [art] Derive Key Pair - Done
2,995,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,134 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,899 UART: [art] PUB.X = C2EBDDFD22ECE2D76D4542A1F54BD4902AFE6B15D7668EA5EE5439A6DE0C99D9DFA0789FF153097598680EA85521A9B6
3,018,676 UART: [art] PUB.Y = 5E0F82AB1D5DE135BE20A070C3AC399DFA46C3A79EB66299F25EDFE1D8B21AA847EAF26F8CE0EBF9E87F55320924E777
3,025,640 UART: [art] SIG.R = 9C4708CD181708B12E4CF4A291DB124733C04884C74136FC320A513325FAE0EE1A991DBD20F306D27F56E102604A538A
3,032,393 UART: [art] SIG.S = E1192DAC39ACF8621337819799AAA319651A6EB995514B844BFA009A3536B9E3BE745DCACD1849335A440E6A7EE000F4
3,056,480 UART: Caliptra RT
3,056,731 UART: [state] CFI Enabled
3,176,119 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,993 UART: [rt]cmd =0x44504543, len=96
3,244,284 >>> mbox cmd response data (56 bytes)
3,244,285 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,273,686 UART: [rt]cmd =0x54514754, len=24
3,275,606 >>> mbox cmd response: failed
3,275,606 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,304,972 UART: [rt]cmd =0x54514754, len=24
3,307,094 >>> mbox cmd response data (8 bytes)
3,307,095 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,337,090 UART: [rt]cmd =0x44504543, len=96
3,375,029 >>> mbox cmd response data (56 bytes)
3,375,030 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,404,399 UART: [rt]cmd =0x47544744, len=8
3,406,753 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
891,543 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,647 UART: [kat] ++
895,799 UART: [kat] sha1
900,051 UART: [kat] SHA2-256
901,991 UART: [kat] SHA2-384
904,546 UART: [kat] SHA2-512-ACC
906,447 UART: [kat] ECC-384
915,852 UART: [kat] HMAC-384Kdf
920,578 UART: [kat] LMS
1,168,890 UART: [kat] --
1,169,663 UART: [cold-reset] ++
1,170,019 UART: [fht] FHT @ 0x50003400
1,172,551 UART: [idev] ++
1,172,719 UART: [idev] CDI.KEYID = 6
1,173,080 UART: [idev] SUBJECT.KEYID = 7
1,173,505 UART: [idev] UDS.KEYID = 0
1,173,851 ready_for_fw is high
1,173,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,610 UART: [idev] Erasing UDS.KEYID = 0
1,199,120 UART: [idev] Sha1 KeyId Algorithm
1,208,124 UART: [idev] --
1,209,047 UART: [ldev] ++
1,209,215 UART: [ldev] CDI.KEYID = 6
1,209,579 UART: [ldev] SUBJECT.KEYID = 5
1,210,006 UART: [ldev] AUTHORITY.KEYID = 7
1,210,469 UART: [ldev] FE.KEYID = 1
1,215,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,649 UART: [ldev] --
1,281,876 UART: [fwproc] Wait for Commands...
1,282,577 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,773 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,990 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,165 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,454 >>> mbox cmd response: success
2,826,454 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,827,542 UART: [afmc] ++
2,827,710 UART: [afmc] CDI.KEYID = 6
2,828,073 UART: [afmc] SUBJECT.KEYID = 7
2,828,499 UART: [afmc] AUTHORITY.KEYID = 5
2,863,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,453 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,202 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,912 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,494 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,181 UART: [afmc] --
2,907,064 UART: [cold-reset] --
2,908,200 UART: [state] Locking Datavault
2,909,341 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,945 UART: [state] Locking ICCM
2,910,401 UART: [exit] Launching FMC @ 0x40000130
2,915,731 UART:
2,915,747 UART: Running Caliptra FMC ...
2,916,155 UART:
2,916,298 UART: [state] CFI Enabled
2,926,952 UART: [fht] FMC Alias Private Key: 7
3,045,878 UART: [art] Extend RT PCRs Done
3,046,306 UART: [art] Lock RT PCRs Done
3,047,668 UART: [art] Populate DV Done
3,055,827 UART: [fht] FMC Alias Private Key: 7
3,056,989 UART: [art] Derive CDI
3,057,269 UART: [art] Store in slot 0x4
3,142,862 UART: [art] Derive Key Pair
3,143,222 UART: [art] Store priv key in slot 0x5
3,156,692 UART: [art] Derive Key Pair - Done
3,171,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,959 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,724 UART: [art] PUB.X = 14896775AD14F0C9C08E3371D4931C7CCBE24074A6E43B9C5CBC2B10FB2908E5221A17CA79D4BDA80B096F40C97E8FD3
3,194,495 UART: [art] PUB.Y = 229CE19D85B4BC4921D75EB840D780A1DD0B7EA4F38A657025C7661B1FA2E3A3D5F0511069E4907E8BAF3A81D6F5B26D
3,201,452 UART: [art] SIG.R = 6663147E5AE64F1663DFEFE31F291922E2F23449CD6071436FA368BE60F8DF9008EDCCEC8CC180318F890D6D80B90C24
3,208,219 UART: [art] SIG.S = 2C14B0E451331BAEAEF3854B98C3584B60AD941F144BE3124394E05BD2080DEE66F495176E56598625B5F51887029DC8
3,232,004 UART: Caliptra RT
3,232,347 UART: [state] CFI Enabled
3,352,863 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,981 UART: [rt]cmd =0x44504543, len=96
3,421,878 >>> mbox cmd response data (56 bytes)
3,421,879 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,451,246 UART: [rt]cmd =0x54514754, len=24
3,453,254 >>> mbox cmd response: failed
3,453,254 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,956 UART: [rt]cmd =0x54514754, len=24
3,485,252 >>> mbox cmd response data (8 bytes)
3,485,253 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,226 UART: [rt]cmd =0x44504543, len=96
3,553,561 >>> mbox cmd response data (56 bytes)
3,553,562 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,582,835 UART: [rt]cmd =0x47544744, len=8
3,585,139 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,591 ready_for_fw is high
1,059,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,553 >>> mbox cmd response: success
2,679,553 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,686 UART:
2,741,702 UART: Running Caliptra FMC ...
2,742,110 UART:
2,742,253 UART: [state] CFI Enabled
2,753,183 UART: [fht] FMC Alias Private Key: 7
2,872,531 UART: [art] Extend RT PCRs Done
2,872,959 UART: [art] Lock RT PCRs Done
2,874,423 UART: [art] Populate DV Done
2,882,750 UART: [fht] FMC Alias Private Key: 7
2,883,848 UART: [art] Derive CDI
2,884,128 UART: [art] Store in slot 0x4
2,969,659 UART: [art] Derive Key Pair
2,970,019 UART: [art] Store priv key in slot 0x5
2,982,873 UART: [art] Derive Key Pair - Done
2,997,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,057 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,822 UART: [art] PUB.X = A599E9142C97BC173524559405DD7F6DE6E76F0371966161CA2DAE285FB5DE60D002BAE4FBAEC78A9E200F05D228220B
3,020,582 UART: [art] PUB.Y = 9CFBB89BEC8309B346E3BB2F3EE5A1E48F804618EEFC4A8C528A44D1D0B8F2A8E0CBF48B3B39C159EF9EACD4DFE1BAAD
3,027,565 UART: [art] SIG.R = C2CA6FA86F56EB2BC1DFE7A831FF59D0D371FC4DE4A5FD6955DFF1B8816412516B32C2D7311042C090FC3D9CA91848A0
3,034,351 UART: [art] SIG.S = EF7426BC0855F907AE1C73DD54DA8A80470BBE366DB2D23373E208C3E45F6F6237076CAB63AB36BD4B411FF125F0E107
3,058,031 UART: Caliptra RT
3,058,374 UART: [state] CFI Enabled
3,178,660 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,856 UART: [rt]cmd =0x44504543, len=96
3,247,859 >>> mbox cmd response data (56 bytes)
3,247,860 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,277,437 UART: [rt]cmd =0x54514754, len=24
3,279,417 >>> mbox cmd response: failed
3,279,417 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,907 UART: [rt]cmd =0x54514754, len=24
3,311,075 >>> mbox cmd response data (8 bytes)
3,311,076 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,341,021 UART: [rt]cmd =0x44504543, len=96
3,379,688 >>> mbox cmd response data (56 bytes)
3,379,689 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,409,018 UART: [rt]cmd =0x47544744, len=8
3,411,286 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,689 UART: [kat] SHA2-256
903,629 UART: [kat] SHA2-384
906,420 UART: [kat] SHA2-512-ACC
908,321 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,544 UART: [kat] LMS
1,170,872 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,205 UART: [fht] FHT @ 0x50003400
1,174,960 UART: [idev] ++
1,175,128 UART: [idev] CDI.KEYID = 6
1,175,488 UART: [idev] SUBJECT.KEYID = 7
1,175,912 UART: [idev] UDS.KEYID = 0
1,176,257 ready_for_fw is high
1,176,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,236 UART: [idev] Erasing UDS.KEYID = 0
1,201,041 UART: [idev] Sha1 KeyId Algorithm
1,209,353 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,216,771 UART: [ldev] Erasing FE.KEYID = 1
1,243,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,621 UART: [ldev] --
1,281,886 UART: [fwproc] Wait for Commands...
1,282,640 UART: [fwproc] Recv command 0x46574c44
1,283,368 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,345 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,726 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,003 >>> mbox cmd response: success
2,827,003 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,083 UART: [afmc] ++
2,828,251 UART: [afmc] CDI.KEYID = 6
2,828,613 UART: [afmc] SUBJECT.KEYID = 7
2,829,038 UART: [afmc] AUTHORITY.KEYID = 5
2,864,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,051 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,635 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,449 UART: [afmc] --
2,908,455 UART: [cold-reset] --
2,909,151 UART: [state] Locking Datavault
2,910,294 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,898 UART: [state] Locking ICCM
2,911,388 UART: [exit] Launching FMC @ 0x40000130
2,916,718 UART:
2,916,734 UART: Running Caliptra FMC ...
2,917,142 UART:
2,917,196 UART: [state] CFI Enabled
2,927,548 UART: [fht] FMC Alias Private Key: 7
3,046,212 UART: [art] Extend RT PCRs Done
3,046,640 UART: [art] Lock RT PCRs Done
3,048,182 UART: [art] Populate DV Done
3,056,233 UART: [fht] FMC Alias Private Key: 7
3,057,373 UART: [art] Derive CDI
3,057,653 UART: [art] Store in slot 0x4
3,143,294 UART: [art] Derive Key Pair
3,143,654 UART: [art] Store priv key in slot 0x5
3,157,248 UART: [art] Derive Key Pair - Done
3,172,072 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,299 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,064 UART: [art] PUB.X = 7977C91A7EF2C156742D35A4AF7D927F5D26D95415B9CA3E860945598C5DD7F3755D39C6C686C3221E879E789D7D18BF
3,194,831 UART: [art] PUB.Y = D41B60FC1E53F015F22374C523AC711B976AFA8F88DCF76474C3882DEF284A585B6013ACF973D9F246DB5A4086C27BA4
3,201,789 UART: [art] SIG.R = 876EC3D45E4E42CEF236E246A4E5FA031C78F5B76D1CE27E7236627184D698D27276774EFBAAD9B10536F4F59CE9CF3F
3,208,563 UART: [art] SIG.S = B2C3853B366FDA6E0E668896B92E6973BB2B1029EBC737FA77E927B471627A0BA977869A99C945D4ECA6CC4414068558
3,232,412 UART: Caliptra RT
3,232,663 UART: [state] CFI Enabled
3,351,905 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,891 UART: [rt]cmd =0x44504543, len=96
3,421,446 >>> mbox cmd response data (56 bytes)
3,421,447 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,450,784 UART: [rt]cmd =0x54514754, len=24
3,452,784 >>> mbox cmd response: failed
3,452,784 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,482,382 UART: [rt]cmd =0x54514754, len=24
3,484,324 >>> mbox cmd response data (8 bytes)
3,484,325 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,514,208 UART: [rt]cmd =0x44504543, len=96
3,551,483 >>> mbox cmd response data (56 bytes)
3,551,484 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,580,811 UART: [rt]cmd =0x47544744, len=8
3,583,319 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,671 ready_for_fw is high
1,060,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,428 >>> mbox cmd response: success
2,679,428 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,741,517 UART:
2,741,533 UART: Running Caliptra FMC ...
2,741,941 UART:
2,741,995 UART: [state] CFI Enabled
2,752,521 UART: [fht] FMC Alias Private Key: 7
2,871,493 UART: [art] Extend RT PCRs Done
2,871,921 UART: [art] Lock RT PCRs Done
2,873,533 UART: [art] Populate DV Done
2,881,918 UART: [fht] FMC Alias Private Key: 7
2,882,880 UART: [art] Derive CDI
2,883,160 UART: [art] Store in slot 0x4
2,968,733 UART: [art] Derive Key Pair
2,969,093 UART: [art] Store priv key in slot 0x5
2,982,633 UART: [art] Derive Key Pair - Done
2,997,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,307 UART: [art] PUB.X = B5439FAC5A14632832B7A3E18974EDE87C588531C92E28D2405125BD495A54A3E379EE169DCBBD9F039DC36442262C25
3,020,074 UART: [art] PUB.Y = 5C205BD586F038AAFBBCAF2B2161637C4AA3CF2A8436404CE9ED34BA692EB721CCF9C0215BE38D6B9E107492AFE65E23
3,027,042 UART: [art] SIG.R = 5C80DBB2445436FF5FA255FC716846C2B684E71CB3B7C26D9EE959216C4F6456CA06028CD5B442156D9ECB44AAF49F03
3,033,811 UART: [art] SIG.S = 09476D6B8D2BB1F3513D31F062CCC87E1B92DF7660CA60AA453E38A915B7D7EA12F63C6A1E0F7A48EA2AEE890898B294
3,057,912 UART: Caliptra RT
3,058,163 UART: [state] CFI Enabled
3,177,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,425 UART: [rt]cmd =0x44504543, len=96
3,246,298 >>> mbox cmd response data (56 bytes)
3,246,299 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,275,832 UART: [rt]cmd =0x54514754, len=24
3,277,980 >>> mbox cmd response: failed
3,277,980 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,307,616 UART: [rt]cmd =0x54514754, len=24
3,309,894 >>> mbox cmd response data (8 bytes)
3,309,895 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,339,890 UART: [rt]cmd =0x44504543, len=96
3,377,745 >>> mbox cmd response data (56 bytes)
3,377,746 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,406,927 UART: [rt]cmd =0x47544744, len=8
3,409,487 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,049 UART: [state] LifecycleState = Unprovisioned
86,704 UART: [state] DebugLocked = No
87,298 UART: [state] WD Timer not started. Device not locked for debugging
88,527 UART: [kat] SHA2-256
894,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,302 UART: [kat] ++
898,454 UART: [kat] sha1
902,610 UART: [kat] SHA2-256
904,550 UART: [kat] SHA2-384
907,313 UART: [kat] SHA2-512-ACC
909,214 UART: [kat] ECC-384
919,055 UART: [kat] HMAC-384Kdf
923,787 UART: [kat] LMS
1,172,115 UART: [kat] --
1,173,110 UART: [cold-reset] ++
1,173,560 UART: [fht] FHT @ 0x50003400
1,176,095 UART: [idev] ++
1,176,263 UART: [idev] CDI.KEYID = 6
1,176,623 UART: [idev] SUBJECT.KEYID = 7
1,177,047 UART: [idev] UDS.KEYID = 0
1,177,392 ready_for_fw is high
1,177,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,842 UART: [idev] Sha1 KeyId Algorithm
1,210,336 UART: [idev] --
1,211,474 UART: [ldev] ++
1,211,642 UART: [ldev] CDI.KEYID = 6
1,212,005 UART: [ldev] SUBJECT.KEYID = 5
1,212,431 UART: [ldev] AUTHORITY.KEYID = 7
1,212,894 UART: [ldev] FE.KEYID = 1
1,218,170 UART: [ldev] Erasing FE.KEYID = 1
1,244,953 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,544 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,151 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,790 UART: [ldev] --
1,284,073 UART: [fwproc] Wait for Commands...
1,284,765 UART: [fwproc] Recv command 0x46574c44
1,285,493 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,430 >>> mbox cmd response: success
2,827,430 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,828,522 UART: [afmc] ++
2,828,690 UART: [afmc] CDI.KEYID = 6
2,829,052 UART: [afmc] SUBJECT.KEYID = 7
2,829,477 UART: [afmc] AUTHORITY.KEYID = 5
2,865,224 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,819 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,567 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,276 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,159 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,860 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,730 UART: [afmc] --
2,908,838 UART: [cold-reset] --
2,909,648 UART: [state] Locking Datavault
2,910,991 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,595 UART: [state] Locking ICCM
2,912,249 UART: [exit] Launching FMC @ 0x40000130
2,917,579 UART:
2,917,595 UART: Running Caliptra FMC ...
2,918,003 UART:
2,918,146 UART: [state] CFI Enabled
2,928,872 UART: [fht] FMC Alias Private Key: 7
3,047,746 UART: [art] Extend RT PCRs Done
3,048,174 UART: [art] Lock RT PCRs Done
3,049,782 UART: [art] Populate DV Done
3,057,757 UART: [fht] FMC Alias Private Key: 7
3,058,869 UART: [art] Derive CDI
3,059,149 UART: [art] Store in slot 0x4
3,144,994 UART: [art] Derive Key Pair
3,145,354 UART: [art] Store priv key in slot 0x5
3,159,000 UART: [art] Derive Key Pair - Done
3,173,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,897 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,662 UART: [art] PUB.X = C5A077DDB089ED00645899771BD57337BB6DB2DB3CCF64E2FE3DEFBEAD2095D618916D3266626872E970565BEC99326A
3,196,418 UART: [art] PUB.Y = 1CE8FF9C932F137405045F0E70ED115ED8EB090FA08CD2C8A3CCAD707D9EFB029DBA6B06F8652F019A2CDA15244ADF4C
3,203,366 UART: [art] SIG.R = CE5C6388D4B3BE100FE0AD8EAF8772C207129E2716AE179168FE79BFDCBDB437FAD6870E86F9857B26500AD45D6B8006
3,210,133 UART: [art] SIG.S = 92CF2F1518A2B71B6602BA54D820A3F346AB548BCFA6033B0A88CA8659743544C4871DE43FE31686E1C3D1885D9F42D3
3,234,150 UART: Caliptra RT
3,234,493 UART: [state] CFI Enabled
3,354,495 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,747 UART: [rt]cmd =0x44504543, len=96
3,422,740 >>> mbox cmd response data (56 bytes)
3,422,741 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,452,112 UART: [rt]cmd =0x54514754, len=24
3,454,266 >>> mbox cmd response: failed
3,454,266 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,483,920 UART: [rt]cmd =0x54514754, len=24
3,485,972 >>> mbox cmd response data (8 bytes)
3,485,973 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,515,814 UART: [rt]cmd =0x44504543, len=96
3,553,659 >>> mbox cmd response data (56 bytes)
3,553,660 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,583,149 UART: [rt]cmd =0x47544744, len=8
3,585,477 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,218 ready_for_fw is high
1,060,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,181 >>> mbox cmd response: success
2,678,181 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
2,740,376 UART:
2,740,392 UART: Running Caliptra FMC ...
2,740,800 UART:
2,740,943 UART: [state] CFI Enabled
2,751,119 UART: [fht] FMC Alias Private Key: 7
2,870,127 UART: [art] Extend RT PCRs Done
2,870,555 UART: [art] Lock RT PCRs Done
2,872,253 UART: [art] Populate DV Done
2,880,388 UART: [fht] FMC Alias Private Key: 7
2,881,562 UART: [art] Derive CDI
2,881,842 UART: [art] Store in slot 0x4
2,967,797 UART: [art] Derive Key Pair
2,968,157 UART: [art] Store priv key in slot 0x5
2,981,907 UART: [art] Derive Key Pair - Done
2,996,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,276 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,041 UART: [art] PUB.X = 3F2775F08E95E52408A5CA95DE69FFFA1CC61FD1924858AB2E87DF6887CF9B6D9D88B0B0685727A096B12FB0BACE9593
3,019,820 UART: [art] PUB.Y = 65EEFA7EE60BD6B59587CA162D502A7ED310655E4850B09B93F6CAE3BAE06F00E0ACA2BABFA06C3EA272B6CFAFFC0E83
3,026,772 UART: [art] SIG.R = 724E263E6847EC3EFCC2D155468DA49882ED5D17918AF5D1F3CD02E8B6CA73DFC5F127DC8A3B01B03BEFE80DF995088A
3,033,548 UART: [art] SIG.S = D788DFC9F83EFF4AE2D78EAFE5BD6293C6E003FAAC0EED1374C07E602B4596BAF14601CB6F1A10ED51568CCF369379BC
3,057,837 UART: Caliptra RT
3,058,180 UART: [state] CFI Enabled
3,178,063 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,289 UART: [rt]cmd =0x44504543, len=96
3,246,826 >>> mbox cmd response data (56 bytes)
3,246,827 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,276,168 UART: [rt]cmd =0x54514754, len=24
3,278,372 >>> mbox cmd response: failed
3,278,372 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,308,058 UART: [rt]cmd =0x54514754, len=24
3,310,386 >>> mbox cmd response data (8 bytes)
3,310,387 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,340,198 UART: [rt]cmd =0x44504543, len=96
3,378,049 >>> mbox cmd response data (56 bytes)
3,378,050 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,407,571 UART: [rt]cmd =0x47544744, len=8
3,410,003 >>> mbox cmd response data (104 bytes)
test test_tagging::test_tagging_retired_context ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,881 writing to cptra_bootfsm_go
192,075 UART:
192,434 UART: Running Caliptra ROM ...
193,573 UART:
193,722 UART: [state] CFI Enabled
266,754 UART: [state] LifecycleState = Unprovisioned
268,673 UART: [state] DebugLocked = No
270,142 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,577 UART: [kat] SHA2-256
444,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,843 UART: [kat] ++
455,324 UART: [kat] sha1
467,199 UART: [kat] SHA2-256
469,849 UART: [kat] SHA2-384
474,911 UART: [kat] SHA2-512-ACC
477,288 UART: [kat] ECC-384
2,769,043 UART: [kat] HMAC-384Kdf
2,800,402 UART: [kat] LMS
3,990,671 UART: [kat] --
3,997,173 UART: [cold-reset] ++
3,998,477 UART: [fht] Storing FHT @ 0x50003400
4,008,489 UART: [idev] ++
4,009,058 UART: [idev] CDI.KEYID = 6
4,010,299 UART: [idev] SUBJECT.KEYID = 7
4,011,426 UART: [idev] UDS.KEYID = 0
4,012,479 ready_for_fw is high
4,012,678 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,116,966 UART: [idev] Erasing UDS.KEYID = 0
7,346,750 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,556 UART: [idev] --
7,372,839 UART: [ldev] ++
7,373,457 UART: [ldev] CDI.KEYID = 6
7,374,371 UART: [ldev] SUBJECT.KEYID = 5
7,375,591 UART: [ldev] AUTHORITY.KEYID = 7
7,376,828 UART: [ldev] FE.KEYID = 1
7,422,364 UART: [ldev] Erasing FE.KEYID = 1
10,749,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,600 UART: [ldev] --
13,116,054 UART: [fwproc] Waiting for Commands...
13,119,282 UART: [fwproc] Received command 0x46574c44
13,121,466 UART: [fwproc] Received Image of size 82832 bytes
16,792,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,865,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,938,333 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,142,492 >>> mbox cmd response: success
17,142,987 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,147,304 UART: [afmc] ++
17,147,887 UART: [afmc] CDI.KEYID = 6
17,148,906 UART: [afmc] SUBJECT.KEYID = 7
17,150,084 UART: [afmc] AUTHORITY.KEYID = 5
20,514,855 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,818,932 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,821,182 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,835,650 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,850,377 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,864,771 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,886,219 UART: [afmc] --
22,890,780 UART: [cold-reset] --
22,893,822 UART: [state] Locking Datavault
22,898,157 UART: [state] Locking PCR0, PCR1 and PCR31
22,899,911 UART: [state] Locking ICCM
22,901,247 UART: [exit] Launching FMC @ 0x40000130
22,909,645 UART:
22,909,881 UART: Running Caliptra FMC ...
22,910,930 UART:
22,911,098 UART: [state] CFI Enabled
22,976,681 UART: [fht] FMC Alias Private Key: 7
25,317,609 UART: [art] Extend RT PCRs Done
25,318,831 UART: [art] Lock RT PCRs Done
25,320,320 UART: [art] Populate DV Done
25,325,571 UART: [fht] FMC Alias Private Key: 7
25,327,060 UART: [art] Derive CDI
25,327,797 UART: [art] Store in slot 0x4
25,385,135 UART: [art] Derive Key Pair
25,386,170 UART: [art] Store priv key in slot 0x5
28,679,286 UART: [art] Derive Key Pair - Done
28,692,177 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,979,665 UART: [art] Erasing AUTHORITY.KEYID = 7
30,981,171 UART: [art] PUB.X = 161E7A461B95D4090D005C3FF4CFFAFC6ABBECF511A4E3BCB9F964BAB700B4363F1436863EBB15871283C8EC4ED72A42
30,988,418 UART: [art] PUB.Y = 0AA9555056C85586AEDAA62A4CA8E13E270155416FDE0C12F473556F096E5C1AB3BB7F424BCD9A2D105367C45CE9DA3E
30,995,697 UART: [art] SIG.R = 3800C6F929433DB9829C9CBAC9D28FD8DA4AE98E57179B150DA4FC95D8D5240007A08040A6190537139A616018159392
31,003,040 UART: [art] SIG.S = 52F5643A77FF8E47E56E16AA556A4021B93435DBC80AF65605CDB402DF4C28261F019530A168E8E2A313EEE390D508E6
32,307,872 UART: mbox::rt_entry...
32,308,838 UART: ____ _ _ _ ____ _____
32,310,823 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,312,827 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,314,757 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,316,690 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,318,543 UART: |_|
32,319,394 UART:
32,450,692 UART: [rt] Runtime listening for mailbox commands...
32,452,718 >>> mbox cmd response data (0 bytes)
34,524,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,674,428 UART:
34,674,793 UART: Running Caliptra ROM ...
34,675,925 UART:
34,676,105 UART: [state] CFI Enabled
34,728,882 UART: [state] LifecycleState = Unprovisioned
34,730,825 UART: [state] DebugLocked = No
34,733,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,739,243 UART: [kat] SHA2-256
34,908,937 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,919,399 UART: [kat] ++
34,919,999 UART: [kat] sha1
34,931,863 UART: [kat] SHA2-256
34,934,557 UART: [kat] SHA2-384
34,941,082 UART: [kat] SHA2-512-ACC
34,943,450 UART: [kat] ECC-384
37,235,391 UART: [kat] HMAC-384Kdf
37,268,207 UART: [kat] LMS
38,458,554 UART: [kat] --
38,464,407 UART: [update-reset] ++
42,654,189 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,658,784 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,056,514 >>> mbox cmd response: success
43,061,180 UART: [update-reset] Copying MAN_2 To MAN_1
43,079,757 UART: [update-reset Success] --
43,084,663 UART: [state] Locking Datavault
43,088,026 UART: [state] Locking PCR0, PCR1 and PCR31
43,089,898 UART: [state] Locking ICCM
43,091,598 UART: [exit] Launching FMC @ 0x40000130
43,099,998 UART:
43,100,236 UART: Running Caliptra FMC ...
43,101,263 UART:
43,101,412 UART: [state] CFI Enabled
43,188,796 UART: [art] Extend RT PCRs Done
43,189,989 UART: [art] Lock RT PCRs Done
43,191,098 UART: [art] Populate DV Done
43,196,563 UART: [fht] FMC Alias Private Key: 7
43,198,044 UART: [art] Derive CDI
43,198,781 UART: [art] Store in slot 0x4
43,258,337 UART: [art] Derive Key Pair
43,259,385 UART: [art] Store priv key in slot 0x5
46,551,563 UART: [art] Derive Key Pair - Done
46,564,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,853,783 UART: [art] Erasing AUTHORITY.KEYID = 7
48,855,308 UART: [art] PUB.X = 9A8E98B48394B15A0FB838184F515009A82635F41504B49DA8801A8F211EF6C19AB244647EC608645039DAC9607DEE6F
48,862,565 UART: [art] PUB.Y = 95BDC9340E53185E82DDC5FCBD97472AA3E62129F674593EBD94F8F325EA3805F009D8B4E9BFC3EB957118AD6730DF51
48,869,809 UART: [art] SIG.R = 0D116ECB436C9A2E0CF07300A8E0E180A670EE6DB186D26B88C5BACEFC3EE1A89AB2A51268574B6A7BEBC6FE7503375F
48,877,217 UART: [art] SIG.S = 04BB38A56D39971E4C31EE7666EE6A377C0A9F9A1D04C60D93E7EC009A1D2886C0CA805CD6BB450DA34422A3BA158BDB
50,182,288 UART: Caliptra RT
50,183,004 UART: [state] CFI Enabled
50,595,487 UART: [rt] RT failed reset flow
50,596,681 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,804,027 ready_for_fw is high
3,804,415 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,238,457 >>> mbox cmd response: success
17,239,196 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
22,921,078 UART:
22,921,456 UART: Running Caliptra FMC ...
22,922,665 UART:
22,922,828 UART: [state] CFI Enabled
22,989,597 UART: [fht] FMC Alias Private Key: 7
25,351,773 UART: [art] Extend RT PCRs Done
25,352,999 UART: [art] Lock RT PCRs Done
25,354,682 UART: [art] Populate DV Done
25,359,998 UART: [fht] FMC Alias Private Key: 7
25,361,539 UART: [art] Derive CDI
25,362,307 UART: [art] Store in slot 0x4
25,418,482 UART: [art] Derive Key Pair
25,419,528 UART: [art] Store priv key in slot 0x5
28,712,375 UART: [art] Derive Key Pair - Done
28,725,220 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,013,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,015,018 UART: [art] PUB.X = 9156417440D88BD529A1F95D0E0106005005DB8A19DEDD52E4B87F3EEA3C3E68648A20B3233F56E79206E11FCD5AE884
31,022,249 UART: [art] PUB.Y = 81A9C55985C644F187ED2B592545AE98600A4F68AA6B6AC8C7B3AA404F338B1C6942D13BE7AB0F7D779EB9301156F79B
31,029,471 UART: [art] SIG.R = 7E4B4DBC78B372B2B9326A68A05EFD50ACDE7BC9DB8FF44A4B5019B580D3A46516C7663A697A4E87042A137741C0D386
31,036,866 UART: [art] SIG.S = 6E668C6DFEF6CE441DC68ED6651198DAF6B1A9FD80C1E028AD8F8ADFE3F47472C5BF30ADA7E42ACC4FB841EBE213FBE6
32,341,287 UART: mbox::rt_entry...
32,342,255 UART: ____ _ _ _ ____ _____
32,344,239 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,346,248 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,348,174 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,350,161 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,352,090 UART: |_|
32,352,961 UART:
32,483,784 UART: [rt] Runtime listening for mailbox commands...
32,485,797 >>> mbox cmd response data (0 bytes)
34,559,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,402,378 >>> mbox cmd response: success
43,438,386 UART:
43,438,715 UART: Running Caliptra FMC ...
43,439,768 UART:
43,439,918 UART: [state] CFI Enabled
43,538,211 UART: [art] Extend RT PCRs Done
43,539,397 UART: [art] Lock RT PCRs Done
43,541,058 UART: [art] Populate DV Done
43,546,811 UART: [fht] FMC Alias Private Key: 7
43,548,560 UART: [art] Derive CDI
43,549,296 UART: [art] Store in slot 0x4
43,607,138 UART: [art] Derive Key Pair
43,608,180 UART: [art] Store priv key in slot 0x5
46,901,388 UART: [art] Derive Key Pair - Done
46,913,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,203,344 UART: [art] Erasing AUTHORITY.KEYID = 7
49,204,859 UART: [art] PUB.X = AEB4D15E13BB70DA45168264F50D9C46CC59BEA67E4B90E10394013F0F209CDEB10CEC04FECBDA1389E0796D980BDDC8
49,212,174 UART: [art] PUB.Y = 5C3E818A9082DE4D463B4D47A8D2B2D928F50AC1F115E9457C73507843FC45B4DD9BFC1BB6FCC2158457D48F48EA7F53
49,219,434 UART: [art] SIG.R = 02DA976F9D5EA457D33ED2C0670C1AD3A4CEEC6BF082A40C9A53FF06552862AD84D11D8AAA45169829972A975256969A
49,226,792 UART: [art] SIG.S = 3689DB84ABBCBC8BBABD343B24DA60CFDFD043D0016AC4635E4F60376FC5395402C7B70EB2AEEAE3A82D0BC9D7D64C83
50,532,189 UART: Caliptra RT
50,532,902 UART: [state] CFI Enabled
50,948,359 UART: [rt] RT failed reset flow
50,949,587 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,365 UART:
192,730 UART: Running Caliptra ROM ...
193,878 UART:
603,724 UART: [state] CFI Enabled
617,318 UART: [state] LifecycleState = Unprovisioned
619,247 UART: [state] DebugLocked = No
621,628 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,856 UART: [kat] SHA2-256
796,586 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,106 UART: [kat] ++
807,702 UART: [kat] sha1
818,931 UART: [kat] SHA2-256
821,574 UART: [kat] SHA2-384
827,480 UART: [kat] SHA2-512-ACC
829,838 UART: [kat] ECC-384
3,113,676 UART: [kat] HMAC-384Kdf
3,124,917 UART: [kat] LMS
4,315,045 UART: [kat] --
4,318,989 UART: [cold-reset] ++
4,321,344 UART: [fht] Storing FHT @ 0x50003400
4,332,605 UART: [idev] ++
4,333,160 UART: [idev] CDI.KEYID = 6
4,334,101 UART: [idev] SUBJECT.KEYID = 7
4,335,360 UART: [idev] UDS.KEYID = 0
4,336,316 ready_for_fw is high
4,336,507 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,440,553 UART: [idev] Erasing UDS.KEYID = 0
7,625,434 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,620 UART: [idev] --
7,650,624 UART: [ldev] ++
7,651,238 UART: [ldev] CDI.KEYID = 6
7,652,166 UART: [ldev] SUBJECT.KEYID = 5
7,653,367 UART: [ldev] AUTHORITY.KEYID = 7
7,654,644 UART: [ldev] FE.KEYID = 1
7,665,534 UART: [ldev] Erasing FE.KEYID = 1
10,955,211 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,214 UART: [ldev] --
13,316,342 UART: [fwproc] Waiting for Commands...
13,318,917 UART: [fwproc] Received command 0x46574c44
13,321,088 UART: [fwproc] Received Image of size 82832 bytes
16,991,233 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,065,678 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,138,869 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,342,378 >>> mbox cmd response: success
17,343,388 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,346,384 UART: [afmc] ++
17,346,998 UART: [afmc] CDI.KEYID = 6
17,347,910 UART: [afmc] SUBJECT.KEYID = 7
17,349,117 UART: [afmc] AUTHORITY.KEYID = 5
20,665,988 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,959,032 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,961,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,975,720 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,990,488 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,004,878 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,026,122 UART: [afmc] --
23,030,577 UART: [cold-reset] --
23,034,497 UART: [state] Locking Datavault
23,042,063 UART: [state] Locking PCR0, PCR1 and PCR31
23,043,824 UART: [state] Locking ICCM
23,046,402 UART: [exit] Launching FMC @ 0x40000130
23,054,793 UART:
23,055,027 UART: Running Caliptra FMC ...
23,056,123 UART:
23,056,277 UART: [state] CFI Enabled
23,064,424 UART: [fht] FMC Alias Private Key: 7
25,404,686 UART: [art] Extend RT PCRs Done
25,405,925 UART: [art] Lock RT PCRs Done
25,407,524 UART: [art] Populate DV Done
25,412,712 UART: [fht] FMC Alias Private Key: 7
25,414,305 UART: [art] Derive CDI
25,415,052 UART: [art] Store in slot 0x4
25,457,752 UART: [art] Derive Key Pair
25,458,792 UART: [art] Store priv key in slot 0x5
28,701,198 UART: [art] Derive Key Pair - Done
28,714,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,994,263 UART: [art] Erasing AUTHORITY.KEYID = 7
30,995,769 UART: [art] PUB.X = 2B8932FF3BED49F7D65B1CC9C4091E295612D01FE0C8836AA415C78B26DDF0349008EBCDEAD33D665DF40BD6BA82D337
31,003,062 UART: [art] PUB.Y = 27D8327D0A7829306A84D9CC68A7D09F50099EDFE46C11528346136C103732968C0E361ED6CA951CEF37592210A522B9
31,010,293 UART: [art] SIG.R = 5E5E111BAE67255A2C04CBCBF3A232E621345489997B837F2E5F7F64CFE20904F2071B14000B4EFE7B2319726A08B7B4
31,017,673 UART: [art] SIG.S = E11DC2942C69345F8876041F46F87161498650C418044477DE462DC1F09C06A0599C19DA5F19057C25FB111596355BA5
32,322,457 UART: mbox::rt_entry...
32,323,395 UART: ____ _ _ _ ____ _____
32,325,386 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,327,387 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,329,311 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,331,236 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,333,156 UART: |_|
32,333,954 UART:
32,466,152 UART: [rt] Runtime listening for mailbox commands...
32,468,179 >>> mbox cmd response data (0 bytes)
34,547,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,696,824 UART:
34,697,188 UART: Running Caliptra ROM ...
34,698,321 UART:
34,698,489 UART: [state] CFI Enabled
34,713,593 UART: [state] LifecycleState = Unprovisioned
34,715,543 UART: [state] DebugLocked = No
34,718,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,723,310 UART: [kat] SHA2-256
34,893,074 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,903,565 UART: [kat] ++
34,904,051 UART: [kat] sha1
34,914,234 UART: [kat] SHA2-256
34,916,927 UART: [kat] SHA2-384
34,923,390 UART: [kat] SHA2-512-ACC
34,925,728 UART: [kat] ECC-384
37,210,301 UART: [kat] HMAC-384Kdf
37,220,745 UART: [kat] LMS
38,410,863 UART: [kat] --
38,415,942 UART: [update-reset] ++
42,611,461 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,614,437 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,012,221 >>> mbox cmd response: success
43,016,903 UART: [update-reset] Copying MAN_2 To MAN_1
43,035,850 UART: [update-reset Success] --
43,041,218 UART: [state] Locking Datavault
43,045,182 UART: [state] Locking PCR0, PCR1 and PCR31
43,046,979 UART: [state] Locking ICCM
43,048,082 UART: [exit] Launching FMC @ 0x40000130
43,056,482 UART:
43,056,734 UART: Running Caliptra FMC ...
43,057,834 UART:
43,057,990 UART: [state] CFI Enabled
43,102,269 UART: [art] Extend RT PCRs Done
43,103,405 UART: [art] Lock RT PCRs Done
43,105,017 UART: [art] Populate DV Done
43,110,007 UART: [fht] FMC Alias Private Key: 7
43,111,719 UART: [art] Derive CDI
43,112,527 UART: [art] Store in slot 0x4
43,155,276 UART: [art] Derive Key Pair
43,156,272 UART: [art] Store priv key in slot 0x5
46,398,626 UART: [art] Derive Key Pair - Done
46,411,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,691,732 UART: [art] Erasing AUTHORITY.KEYID = 7
48,693,242 UART: [art] PUB.X = 1F7190122412977EBB0424DE84C6A01A2FC3D79AD389BA987A9F86BC0B42B2395F6225F48A45A45F2EF1127A94AF13E8
48,700,492 UART: [art] PUB.Y = 6FC27886336B383931571D06D5E23FA8D92DC89AA680C407FC7ABABF3490809560F11FC90D7034834388224CB62EA070
48,707,731 UART: [art] SIG.R = C1A4223EBF57F4B9190F7DDFB771B9DFA936BA862388F423DB23639D0CFD084A38C34669616644EF7131133683C80BFE
48,715,149 UART: [art] SIG.S = BE971F145C857A2E4E2C9C3D7E11A72A8B55AF68046AE97C14AE38CA7E3D7E4839F6EF12389D2D6FCF2344E21EEFE3BD
50,020,292 UART: Caliptra RT
50,021,009 UART: [state] CFI Enabled
50,396,996 UART: [rt] RT failed reset flow
50,398,187 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,019 writing to cptra_bootfsm_go
4,126,101 ready_for_fw is high
4,126,494 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,437,994 >>> mbox cmd response: success
17,439,339 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
23,071,086 UART:
23,071,489 UART: Running Caliptra FMC ...
23,072,605 UART:
23,072,760 UART: [state] CFI Enabled
23,080,978 UART: [fht] FMC Alias Private Key: 7
25,420,788 UART: [art] Extend RT PCRs Done
25,422,018 UART: [art] Lock RT PCRs Done
25,423,779 UART: [art] Populate DV Done
25,429,247 UART: [fht] FMC Alias Private Key: 7
25,430,784 UART: [art] Derive CDI
25,431,548 UART: [art] Store in slot 0x4
25,473,735 UART: [art] Derive Key Pair
25,474,779 UART: [art] Store priv key in slot 0x5
28,717,330 UART: [art] Derive Key Pair - Done
28,730,114 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,010,488 UART: [art] Erasing AUTHORITY.KEYID = 7
31,012,019 UART: [art] PUB.X = C6FAE10C9551B86D2A7E6D3E6D07AC09778412D951CEFF95934C07907E537AFBD7D85E97D05854273CEA729D563CC12E
31,019,272 UART: [art] PUB.Y = 8F64C2668D31D065F2DBD82B14E10A654387808ED4DC65F8C73554E5094489615DD1A1F6D898122E07F29B3740ECE484
31,026,511 UART: [art] SIG.R = CACB44409C271497AE6153ED84E4CA0C7C2B4C5D33D3C403F77A9CBFC9DAFE226BFEEB554FCDB033CE2F91CB112B2857
31,033,903 UART: [art] SIG.S = 83A38E17F44E904BE960E369256307F384BD01AA9799C125268CAEFAC9DECE834EB3D6A52515742D831F1A6778F1F9E2
32,338,105 UART: mbox::rt_entry...
32,339,085 UART: ____ _ _ _ ____ _____
32,341,076 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,343,110 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,345,089 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,347,093 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,348,954 UART: |_|
32,349,751 UART:
32,481,922 UART: [rt] Runtime listening for mailbox commands...
32,483,934 >>> mbox cmd response data (0 bytes)
34,559,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,308,408 >>> mbox cmd response: success
43,343,333 UART:
43,343,638 UART: Running Caliptra FMC ...
43,344,698 UART:
43,344,856 UART: [state] CFI Enabled
43,388,612 UART: [art] Extend RT PCRs Done
43,389,799 UART: [art] Lock RT PCRs Done
43,391,152 UART: [art] Populate DV Done
43,396,395 UART: [fht] FMC Alias Private Key: 7
43,398,046 UART: [art] Derive CDI
43,398,858 UART: [art] Store in slot 0x4
43,441,559 UART: [art] Derive Key Pair
43,442,590 UART: [art] Store priv key in slot 0x5
46,684,514 UART: [art] Derive Key Pair - Done
46,697,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,977,195 UART: [art] Erasing AUTHORITY.KEYID = 7
48,978,706 UART: [art] PUB.X = ABBBC8ABA12184117119512DE1A770F0B2DC43C8474955F2C65C829FA25F5E47D7DCE6055C5652CB02403BFC10B19E20
48,985,960 UART: [art] PUB.Y = 848909C3FCFCA87AFD031A160867C30B076470032EE22E5143030758D0D43236FC69374154C2BF2FACDE2A0AE36F43F3
48,993,241 UART: [art] SIG.R = A67792591F95232D23AD9D2B2FEF16680002F9A8A94DC0E7C8C0D1B47892637C3CF7A1719833D5FC5CA7902D7DB2E5C3
49,000,579 UART: [art] SIG.S = 3CED8BA64CE9CB8A16E9ECF97D167C55E3160DCBCB66AEA75EE1E5DD5C7C19C97D8FE7FF000CEF85B1FD1AAE7CDDCA6D
50,305,190 UART: Caliptra RT
50,305,893 UART: [state] CFI Enabled
50,676,267 UART: [rt] RT failed reset flow
50,677,489 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,066 UART:
192,450 UART: Running Caliptra ROM ...
193,627 UART:
193,777 UART: [state] CFI Enabled
266,910 UART: [state] LifecycleState = Unprovisioned
268,895 UART: [state] DebugLocked = No
271,002 UART: [state] WD Timer not started. Device not locked for debugging
275,392 UART: [kat] SHA2-256
455,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,883 UART: [kat] ++
466,415 UART: [kat] sha1
476,722 UART: [kat] SHA2-256
479,361 UART: [kat] SHA2-384
484,487 UART: [kat] SHA2-512-ACC
486,849 UART: [kat] ECC-384
2,951,361 UART: [kat] HMAC-384Kdf
2,971,976 UART: [kat] LMS
3,448,461 UART: [kat] --
3,452,834 UART: [cold-reset] ++
3,454,840 UART: [fht] FHT @ 0x50003400
3,467,730 UART: [idev] ++
3,468,367 UART: [idev] CDI.KEYID = 6
3,469,273 UART: [idev] SUBJECT.KEYID = 7
3,470,514 UART: [idev] UDS.KEYID = 0
3,471,438 ready_for_fw is high
3,471,651 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,576,109 UART: [idev] Erasing UDS.KEYID = 0
5,986,053 UART: [idev] Sha1 KeyId Algorithm
6,009,307 UART: [idev] --
6,014,983 UART: [ldev] ++
6,015,558 UART: [ldev] CDI.KEYID = 6
6,016,467 UART: [ldev] SUBJECT.KEYID = 5
6,017,699 UART: [ldev] AUTHORITY.KEYID = 7
6,018,934 UART: [ldev] FE.KEYID = 1
6,059,343 UART: [ldev] Erasing FE.KEYID = 1
8,566,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,652 UART: [ldev] --
10,376,897 UART: [fwproc] Wait for Commands...
10,378,718 UART: [fwproc] Recv command 0x46574c44
10,380,695 UART: [fwproc] Recv'd Img size: 82832 bytes
13,423,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,034 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,575,106 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,777,912 >>> mbox cmd response: success
13,779,061 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
13,782,313 UART: [afmc] ++
13,782,958 UART: [afmc] CDI.KEYID = 6
13,783,847 UART: [afmc] SUBJECT.KEYID = 7
13,785,002 UART: [afmc] AUTHORITY.KEYID = 5
16,320,804 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,055,435 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,057,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,073,450 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,089,496 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,105,099 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,129,014 UART: [afmc] --
18,131,894 UART: [cold-reset] --
18,138,082 UART: [state] Locking Datavault
18,145,488 UART: [state] Locking PCR0, PCR1 and PCR31
18,147,193 UART: [state] Locking ICCM
18,149,146 UART: [exit] Launching FMC @ 0x40000130
18,157,593 UART:
18,157,827 UART: Running Caliptra FMC ...
18,158,923 UART:
18,159,078 UART: [state] CFI Enabled
18,210,850 UART: [fht] FMC Alias Private Key: 7
19,977,076 UART: [art] Extend RT PCRs Done
19,978,294 UART: [art] Lock RT PCRs Done
19,980,241 UART: [art] Populate DV Done
19,985,649 UART: [fht] FMC Alias Private Key: 7
19,987,342 UART: [art] Derive CDI
19,988,153 UART: [art] Store in slot 0x4
20,043,872 UART: [art] Derive Key Pair
20,044,910 UART: [art] Store priv key in slot 0x5
22,507,761 UART: [art] Derive Key Pair - Done
22,520,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,233,853 UART: [art] Erasing AUTHORITY.KEYID = 7
24,235,359 UART: [art] PUB.X = D1568499898A9562ECF6F41E35F47D758CA14976C944F2E487B019E723A533A8A746666116E5E9ABDBF518BEDAD56C49
24,242,606 UART: [art] PUB.Y = 800F7A46C0192AA9FDC4005D475D7D592B935296029E848E9AE0B86A442216710802D630BAD09E8B0E1824A1C7BD557F
24,249,849 UART: [art] SIG.R = 1CB75CD794E8EF9CECB114ED019D80F1857C23E77DB41FC74057802B8DD6B23A506CB6A01032E6650BD3DC7471FB739F
24,257,287 UART: [art] SIG.S = 736DFAB07A34FD9809C9A007A4CF6A91F0768FE38D69AF521C8711E812120819FE1007C40103E538169F1C5C1E84F20E
25,236,088 UART: mbox::rt_entry...
25,237,073 UART: ____ _ _ _ ____ _____
25,239,068 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,241,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,243,261 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,245,212 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,247,141 UART: |_|
25,247,949 UART:
25,378,896 UART: [rt] Runtime listening for mailbox commands...
25,380,902 >>> mbox cmd response data (0 bytes)
27,441,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,591,542 UART:
27,591,910 UART: Running Caliptra ROM ...
27,593,044 UART:
27,593,219 UART: [state] CFI Enabled
27,667,722 UART: [state] LifecycleState = Unprovisioned
27,669,658 UART: [state] DebugLocked = No
27,671,101 UART: [state] WD Timer not started. Device not locked for debugging
27,674,357 UART: [kat] SHA2-256
27,854,014 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,864,818 UART: [kat] ++
27,865,377 UART: [kat] sha1
27,877,725 UART: [kat] SHA2-256
27,880,414 UART: [kat] SHA2-384
27,885,537 UART: [kat] SHA2-512-ACC
27,887,922 UART: [kat] ECC-384
30,349,874 UART: [kat] HMAC-384Kdf
30,373,619 UART: [kat] LMS
30,850,090 UART: [kat] --
30,853,276 UART: [update-reset] ++
34,349,245 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,351,957 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,749,587 >>> mbox cmd response: success
34,754,201 UART: [update-reset] Copying MAN_2 To MAN_1
34,787,102 UART: [update-reset Success] --
34,792,095 UART: [state] Locking Datavault
34,795,471 UART: [state] Locking PCR0, PCR1 and PCR31
34,797,231 UART: [state] Locking ICCM
34,799,711 UART: [exit] Launching FMC @ 0x40000130
34,808,052 UART:
34,808,286 UART: Running Caliptra FMC ...
34,809,382 UART:
34,809,547 UART: [state] CFI Enabled
34,907,807 UART: [art] Extend RT PCRs Done
34,909,012 UART: [art] Lock RT PCRs Done
34,910,473 UART: [art] Populate DV Done
34,915,983 UART: [fht] FMC Alias Private Key: 7
34,917,621 UART: [art] Derive CDI
34,918,429 UART: [art] Store in slot 0x4
34,976,336 UART: [art] Derive Key Pair
34,977,385 UART: [art] Store priv key in slot 0x5
37,440,012 UART: [art] Derive Key Pair - Done
37,453,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,165,847 UART: [art] Erasing AUTHORITY.KEYID = 7
39,167,354 UART: [art] PUB.X = B6B3AA63B2103AEA67F2DF4A0B817A139ED622061B1490FC398C78164715859D3B2B5F94EC0B031E53627878E3DC5AE8
39,174,617 UART: [art] PUB.Y = 5221422B510ACBEDB4E7758FF3160E6D74C7ADB7175A4EC41E0D66CE703095BCB506E5A1A4E8612FAE8A32C58057BA70
39,181,916 UART: [art] SIG.R = 2963176725E35DEA6E8DF0F8FB3245E68D7D9D88881A41F6FF2026E6E510DE1976875095E68EABFFD51228219A2106CB
39,189,309 UART: [art] SIG.S = 7D2565576B28B183B13A8F4F6EC47E9E74EBA022D0DEA4F47DF83C68F37B416406348ED327373FCFC808B10DAC9D7781
40,168,684 UART: Caliptra RT
40,169,388 UART: [state] CFI Enabled
40,591,672 UART: [rt] RT failed reset flow
40,592,865 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,441,375 ready_for_fw is high
3,441,990 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,642,734 >>> mbox cmd response: success
13,644,098 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
17,948,000 UART:
17,948,418 UART: Running Caliptra FMC ...
17,949,522 UART:
17,949,670 UART: [state] CFI Enabled
18,017,912 UART: [fht] FMC Alias Private Key: 7
19,784,478 UART: [art] Extend RT PCRs Done
19,785,720 UART: [art] Lock RT PCRs Done
19,787,295 UART: [art] Populate DV Done
19,792,875 UART: [fht] FMC Alias Private Key: 7
19,794,369 UART: [art] Derive CDI
19,795,127 UART: [art] Store in slot 0x4
19,850,771 UART: [art] Derive Key Pair
19,851,810 UART: [art] Store priv key in slot 0x5
22,314,726 UART: [art] Derive Key Pair - Done
22,327,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,040,539 UART: [art] Erasing AUTHORITY.KEYID = 7
24,042,044 UART: [art] PUB.X = C0B412433D17C38D269058182268F0BF945DD614A48E956EB2F649718007BB9D02C71E6E5E444905B2C3F8E8F8273451
24,049,301 UART: [art] PUB.Y = 7CB4F754644FC2EED0759455BEBF4817B7C783BD6518D66FD0C805A98CE0AAD86FCAB523FCCF15B19990654DA8312566
24,056,544 UART: [art] SIG.R = 8CB519188AD1952751E64306D2B1FBFF56803AA2DD934ED6B2D2292A17D60F878C48795DCA4FC80999677B267B852F8E
24,063,937 UART: [art] SIG.S = C2BBB5DD435DF5F595BF6C3ADFFF0FF89D4F7C3841316DB03537E38A873D8248E1E22FB07FFDF4C261BD03FB29A8DA27
25,043,080 UART: mbox::rt_entry...
25,044,062 UART: ____ _ _ _ ____ _____
25,046,278 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,048,302 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,050,282 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,052,293 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,054,226 UART: |_|
25,055,220 UART:
25,185,217 UART: [rt] Runtime listening for mailbox commands...
25,187,217 >>> mbox cmd response data (0 bytes)
27,250,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,570,512 >>> mbox cmd response: success
34,606,927 UART:
34,607,235 UART: Running Caliptra FMC ...
34,608,353 UART:
34,608,520 UART: [state] CFI Enabled
34,714,558 UART: [art] Extend RT PCRs Done
34,715,752 UART: [art] Lock RT PCRs Done
34,717,154 UART: [art] Populate DV Done
34,722,886 UART: [fht] FMC Alias Private Key: 7
34,724,701 UART: [art] Derive CDI
34,725,556 UART: [art] Store in slot 0x4
34,784,009 UART: [art] Derive Key Pair
34,785,010 UART: [art] Store priv key in slot 0x5
37,247,976 UART: [art] Derive Key Pair - Done
37,260,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,973,588 UART: [art] Erasing AUTHORITY.KEYID = 7
38,975,101 UART: [art] PUB.X = 3BD601CE0FC1AE26AA022B1FF3AF5FB43917A1EA81AD54E8B197F50795C579BA605DA91889EEB0D435F8D5B220D42D7B
38,982,435 UART: [art] PUB.Y = 2066393321CE55153E40D5F3AA0008D2BF12F49BA9ABC62046A671534367993CA6952CE5D12CEF2A688BE355256FDE57
38,989,624 UART: [art] SIG.R = 936522629C2235FB4827A95E2C7015D884C1329ADED3FD906B472FFE971BDB0555E9FF6DFCE9E505EAE077EBDE6249EB
38,997,021 UART: [art] SIG.S = 9920A6625680EB41D279135EB21A4F2439E1AD7FA23179F78A2B480952DD0FAF698BD8600CBC49F12C3F5DA5205B94CA
39,975,917 UART: Caliptra RT
39,976,639 UART: [state] CFI Enabled
40,398,758 UART: [rt] RT failed reset flow
40,399,952 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
192,564 UART:
192,939 UART: Running Caliptra ROM ...
194,135 UART:
603,628 UART: [state] CFI Enabled
617,514 UART: [state] LifecycleState = Unprovisioned
619,388 UART: [state] DebugLocked = No
621,278 UART: [state] WD Timer not started. Device not locked for debugging
625,382 UART: [kat] SHA2-256
805,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,824 UART: [kat] ++
816,274 UART: [kat] sha1
826,959 UART: [kat] SHA2-256
829,686 UART: [kat] SHA2-384
834,751 UART: [kat] SHA2-512-ACC
837,121 UART: [kat] ECC-384
3,280,493 UART: [kat] HMAC-384Kdf
3,291,947 UART: [kat] LMS
3,768,409 UART: [kat] --
3,772,972 UART: [cold-reset] ++
3,775,050 UART: [fht] FHT @ 0x50003400
3,786,527 UART: [idev] ++
3,787,092 UART: [idev] CDI.KEYID = 6
3,788,132 UART: [idev] SUBJECT.KEYID = 7
3,789,309 UART: [idev] UDS.KEYID = 0
3,790,243 ready_for_fw is high
3,790,459 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,894,755 UART: [idev] Erasing UDS.KEYID = 0
6,264,835 UART: [idev] Sha1 KeyId Algorithm
6,288,405 UART: [idev] --
6,293,351 UART: [ldev] ++
6,293,977 UART: [ldev] CDI.KEYID = 6
6,294,864 UART: [ldev] SUBJECT.KEYID = 5
6,296,077 UART: [ldev] AUTHORITY.KEYID = 7
6,297,321 UART: [ldev] FE.KEYID = 1
6,307,509 UART: [ldev] Erasing FE.KEYID = 1
8,788,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,062 UART: [ldev] --
10,582,059 UART: [fwproc] Wait for Commands...
10,583,777 UART: [fwproc] Recv command 0x46574c44
10,585,788 UART: [fwproc] Recv'd Img size: 82832 bytes
13,631,656 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,707,353 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,780,415 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,984,151 >>> mbox cmd response: success
13,984,664 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
13,988,557 UART: [afmc] ++
13,989,136 UART: [afmc] CDI.KEYID = 6
13,990,076 UART: [afmc] SUBJECT.KEYID = 7
13,991,292 UART: [afmc] AUTHORITY.KEYID = 5
16,493,873 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,214,312 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,216,546 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,232,367 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,248,398 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,263,978 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,288,256 UART: [afmc] --
18,291,891 UART: [cold-reset] --
18,294,518 UART: [state] Locking Datavault
18,300,148 UART: [state] Locking PCR0, PCR1 and PCR31
18,301,901 UART: [state] Locking ICCM
18,303,966 UART: [exit] Launching FMC @ 0x40000130
18,312,371 UART:
18,312,604 UART: Running Caliptra FMC ...
18,313,630 UART:
18,313,776 UART: [state] CFI Enabled
18,322,082 UART: [fht] FMC Alias Private Key: 7
20,088,058 UART: [art] Extend RT PCRs Done
20,089,443 UART: [art] Lock RT PCRs Done
20,090,869 UART: [art] Populate DV Done
20,096,206 UART: [fht] FMC Alias Private Key: 7
20,097,922 UART: [art] Derive CDI
20,098,722 UART: [art] Store in slot 0x4
20,141,456 UART: [art] Derive Key Pair
20,142,497 UART: [art] Store priv key in slot 0x5
22,569,614 UART: [art] Derive Key Pair - Done
22,582,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,288,888 UART: [art] Erasing AUTHORITY.KEYID = 7
24,290,388 UART: [art] PUB.X = 9CCE8AEB355FF4A57E17C6BEDA4B86AF4CACA7090D3B13950CE9EF4177B90A61C0777479EBC9986EAE71E5A1F34E641F
24,297,691 UART: [art] PUB.Y = 190CED0A4203EB98EAB13A85767A3E04665986AA5DBD437C05E815FAD2B3B87F4FF0DB3B83D0E8D45CB42481B0907360
24,304,988 UART: [art] SIG.R = DF1CE2AFAA821E367919BEFE5EE3DC96B2D4DC08C814722EBB2C1C508AC9BE76630F0A724CDB0C1A73CF62A09EF9CF62
24,312,381 UART: [art] SIG.S = 97BE0465FEFF6359D726719CF234347316A96369BEC63F691A25206D24F7998DC2397BDC842C076F88BAA5056572B1AE
25,291,194 UART: mbox::rt_entry...
25,292,153 UART: ____ _ _ _ ____ _____
25,294,139 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,296,148 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,298,081 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,300,015 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,301,970 UART: |_|
25,302,808 UART:
25,433,130 UART: [rt] Runtime listening for mailbox commands...
25,435,127 >>> mbox cmd response data (0 bytes)
27,494,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,644,697 UART:
27,645,057 UART: Running Caliptra ROM ...
27,646,192 UART:
27,646,363 UART: [state] CFI Enabled
27,661,331 UART: [state] LifecycleState = Unprovisioned
27,663,250 UART: [state] DebugLocked = No
27,665,181 UART: [state] WD Timer not started. Device not locked for debugging
27,669,483 UART: [kat] SHA2-256
27,849,223 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,860,003 UART: [kat] ++
27,860,463 UART: [kat] sha1
27,872,268 UART: [kat] SHA2-256
27,874,961 UART: [kat] SHA2-384
27,881,546 UART: [kat] SHA2-512-ACC
27,883,947 UART: [kat] ECC-384
30,328,613 UART: [kat] HMAC-384Kdf
30,340,680 UART: [kat] LMS
30,817,145 UART: [kat] --
30,820,872 UART: [update-reset] ++
34,323,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,327,263 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,724,877 >>> mbox cmd response: success
34,729,567 UART: [update-reset] Copying MAN_2 To MAN_1
34,763,061 UART: [update-reset Success] --
34,767,734 UART: [state] Locking Datavault
34,769,867 UART: [state] Locking PCR0, PCR1 and PCR31
34,771,636 UART: [state] Locking ICCM
34,773,687 UART: [exit] Launching FMC @ 0x40000130
34,782,088 UART:
34,782,331 UART: Running Caliptra FMC ...
34,783,434 UART:
34,783,594 UART: [state] CFI Enabled
34,827,706 UART: [art] Extend RT PCRs Done
34,828,888 UART: [art] Lock RT PCRs Done
34,830,449 UART: [art] Populate DV Done
34,835,966 UART: [fht] FMC Alias Private Key: 7
34,837,504 UART: [art] Derive CDI
34,838,319 UART: [art] Store in slot 0x4
34,881,056 UART: [art] Derive Key Pair
34,882,115 UART: [art] Store priv key in slot 0x5
37,309,104 UART: [art] Derive Key Pair - Done
37,321,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,027,958 UART: [art] Erasing AUTHORITY.KEYID = 7
39,029,470 UART: [art] PUB.X = D7F9CB25F5696FAE6F148C1F0B44C24F830CFB86BB1859F970CAFB61A6515C5A303BE1865F23B80B5E491C9B475C5C94
39,036,726 UART: [art] PUB.Y = CC2FD9788B22DF7142EBCE0ABF7DD05021A5D240E577A2794AB7CE405C63CBF114F0B21C866403489FCD70CD3BB369A7
39,044,072 UART: [art] SIG.R = AB9F5721D0E595DA1344B4FDCA46053F00262EAE53B3256A39871D885FC9056E19C6B9F4E4C5687D9AA8C94662523A38
39,051,468 UART: [art] SIG.S = 3DF3F65262B40EDF92E685E0AD60F82E546BA83DD185F2206EB8D144B7FD191AE1F60E03EC3D09364524E604641A33D7
40,029,952 UART: Caliptra RT
40,030,665 UART: [state] CFI Enabled
40,407,592 UART: [rt] RT failed reset flow
40,408,790 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,780,538 ready_for_fw is high
3,781,131 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,878,742 >>> mbox cmd response: success
13,879,342 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,133,585 UART:
18,133,984 UART: Running Caliptra FMC ...
18,135,098 UART:
18,135,259 UART: [state] CFI Enabled
18,142,906 UART: [fht] FMC Alias Private Key: 7
19,908,801 UART: [art] Extend RT PCRs Done
19,910,005 UART: [art] Lock RT PCRs Done
19,911,771 UART: [art] Populate DV Done
19,917,079 UART: [fht] FMC Alias Private Key: 7
19,918,627 UART: [art] Derive CDI
19,919,447 UART: [art] Store in slot 0x4
19,962,480 UART: [art] Derive Key Pair
19,963,481 UART: [art] Store priv key in slot 0x5
22,390,470 UART: [art] Derive Key Pair - Done
22,403,762 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,110,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,111,705 UART: [art] PUB.X = 81E4CC2F4B95BDA0FA3AF4E6872863EC1C294463C16528D895B9AC2DEEBF2585C5FAFB9C1B29433D4B714CE6FFAF418B
24,119,015 UART: [art] PUB.Y = 6831A69648D22458DED59A1849F182210247C189C972C89AF717344A288D0972F354CA072A103D7B24F9B50B647D64C3
24,126,223 UART: [art] SIG.R = 5541FD697462C714B2C49735CEC25AAB6A5AA063A997878FF88311E7CCA274B7583A2118AA7C416D5FF5E760974A8C11
24,133,667 UART: [art] SIG.S = 3A6EFCD9CDA3C6B67CDFACCEF983A4672A18FA5988D734DCB06613E047A4B1533A59892C10941771A5ECE175A21CA4F6
25,111,940 UART: mbox::rt_entry...
25,112,909 UART: ____ _ _ _ ____ _____
25,114,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,116,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,118,852 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,120,851 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,122,711 UART: |_|
25,123,553 UART:
25,255,123 UART: [rt] Runtime listening for mailbox commands...
25,257,134 >>> mbox cmd response data (0 bytes)
27,311,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,535,764 >>> mbox cmd response: success
34,572,538 UART:
34,572,842 UART: Running Caliptra FMC ...
34,573,965 UART:
34,574,133 UART: [state] CFI Enabled
34,618,150 UART: [art] Extend RT PCRs Done
34,619,362 UART: [art] Lock RT PCRs Done
34,620,573 UART: [art] Populate DV Done
34,625,934 UART: [fht] FMC Alias Private Key: 7
34,627,602 UART: [art] Derive CDI
34,628,370 UART: [art] Store in slot 0x4
34,670,977 UART: [art] Derive Key Pair
34,671,984 UART: [art] Store priv key in slot 0x5
37,099,451 UART: [art] Derive Key Pair - Done
37,112,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,818,778 UART: [art] Erasing AUTHORITY.KEYID = 7
38,820,286 UART: [art] PUB.X = 1AFD1A91DA4027B36F8C190420B60085629C80609EA485911D43BE89A7A2C279C9AE11190CC1524C95A6B7552D9352CF
38,827,556 UART: [art] PUB.Y = 8BBC517C7CAE8E1C2D3D7F6D04EA31A07D7AB1C83D9D8697925A1ED417CE54491973883F5F9C08B6ACCEA124802D6D27
38,834,797 UART: [art] SIG.R = E085F9A948899BF2724EE28893E614B3D082BDF564173BD48B339F6BB82C5B7481384BB9E1A6CACEE524B983E25B143F
38,842,206 UART: [art] SIG.S = ACE94EED80F02BF7A1C5536E865CEDA08C077A3CE429A03BF19F7AF5173A183AF180AF990F3CD5794A621EC683D82D87
39,821,425 UART: Caliptra RT
39,822,131 UART: [state] CFI Enabled
40,192,138 UART: [rt] RT failed reset flow
40,193,333 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,998 UART:
192,370 UART: Running Caliptra ROM ...
193,458 UART:
193,604 UART: [state] CFI Enabled
265,911 UART: [state] LifecycleState = Unprovisioned
268,307 UART: [state] DebugLocked = No
270,677 UART: [state] WD Timer not started. Device not locked for debugging
274,770 UART: [kat] SHA2-256
464,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,388 UART: [kat] ++
475,837 UART: [kat] sha1
488,003 UART: [kat] SHA2-256
491,021 UART: [kat] SHA2-384
496,233 UART: [kat] SHA2-512-ACC
498,810 UART: [kat] ECC-384
2,945,476 UART: [kat] HMAC-384Kdf
2,970,931 UART: [kat] LMS
3,502,653 UART: [kat] --
3,508,014 UART: [cold-reset] ++
3,510,451 UART: [fht] FHT @ 0x50003400
3,521,208 UART: [idev] ++
3,521,921 UART: [idev] CDI.KEYID = 6
3,522,850 UART: [idev] SUBJECT.KEYID = 7
3,524,020 UART: [idev] UDS.KEYID = 0
3,524,942 ready_for_fw is high
3,525,141 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,459 UART: [idev] Erasing UDS.KEYID = 0
6,028,162 UART: [idev] Sha1 KeyId Algorithm
6,052,311 UART: [idev] --
6,057,637 UART: [ldev] ++
6,058,331 UART: [ldev] CDI.KEYID = 6
6,059,249 UART: [ldev] SUBJECT.KEYID = 5
6,060,408 UART: [ldev] AUTHORITY.KEYID = 7
6,061,641 UART: [ldev] FE.KEYID = 1
6,099,182 UART: [ldev] Erasing FE.KEYID = 1
8,607,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,426 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,305 UART: [ldev] --
10,413,163 UART: [fwproc] Wait for Commands...
10,414,605 UART: [fwproc] Recv command 0x46574c44
10,416,927 UART: [fwproc] Recv'd Img size: 82832 bytes
13,477,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,553,103 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,676,721 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,022,951 >>> mbox cmd response: success
14,024,025 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,026,895 UART: [afmc] ++
14,027,593 UART: [afmc] CDI.KEYID = 6
14,028,828 UART: [afmc] SUBJECT.KEYID = 7
14,030,254 UART: [afmc] AUTHORITY.KEYID = 5
16,570,300 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,297,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,299,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,314,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,329,293 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,344,178 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,368,493 UART: [afmc] --
18,372,077 UART: [cold-reset] --
18,376,437 UART: [state] Locking Datavault
18,382,325 UART: [state] Locking PCR0, PCR1 and PCR31
18,384,450 UART: [state] Locking ICCM
18,387,221 UART: [exit] Launching FMC @ 0x40000130
18,395,893 UART:
18,396,130 UART: Running Caliptra FMC ...
18,397,229 UART:
18,397,388 UART: [state] CFI Enabled
18,454,102 UART: [fht] FMC Alias Private Key: 7
20,220,563 UART: [art] Extend RT PCRs Done
20,221,780 UART: [art] Lock RT PCRs Done
20,223,187 UART: [art] Populate DV Done
20,228,649 UART: [fht] FMC Alias Private Key: 7
20,230,184 UART: [art] Derive CDI
20,230,962 UART: [art] Store in slot 0x4
20,286,728 UART: [art] Derive Key Pair
20,287,749 UART: [art] Store priv key in slot 0x5
22,750,700 UART: [art] Derive Key Pair - Done
22,763,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,476,712 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,211 UART: [art] PUB.X = D07F6EAD4B22B9FCA120B0FFEB4C448671606C1FAB32C8BD802863737B8A51A8FB89D011F15E7E66E3E24C7795D76525
24,485,451 UART: [art] PUB.Y = D0EF283615B4720785C78EC7506A4D0E3C26C3F9F26E47F8C42AC719141C357D8AACB21E60BDF13430CD4E7F36383075
24,492,741 UART: [art] SIG.R = 2961C6E9860DF901734BC9F1D93722B6749AE6C598D9D5FB46B437BE353A64BC46624C336FB527C03FC7E38A936E5EBF
24,500,125 UART: [art] SIG.S = 10BCE175796BD1E5D057989E42E52FD17A6FDDE4D331AD963531DE58821E1104EC2F72D903AC0691B13D3C7BE65EFDE8
25,478,672 UART: mbox::rt_entry...
25,479,623 UART: ____ _ _ _ ____ _____
25,481,724 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,593 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,511 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,380 UART: |_|
25,490,177 UART:
25,620,733 UART: [rt] Runtime listening for mailbox commands...
25,622,729 >>> mbox cmd response data (0 bytes)
27,686,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,836,750 UART:
27,837,139 UART: Running Caliptra ROM ...
27,838,191 UART:
27,838,338 UART: [state] CFI Enabled
27,911,653 UART: [state] LifecycleState = Unprovisioned
27,913,726 UART: [state] DebugLocked = No
27,915,355 UART: [state] WD Timer not started. Device not locked for debugging
27,919,717 UART: [kat] SHA2-256
28,109,574 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,120,315 UART: [kat] ++
28,120,766 UART: [kat] sha1
28,132,602 UART: [kat] SHA2-256
28,135,627 UART: [kat] SHA2-384
28,142,208 UART: [kat] SHA2-512-ACC
28,144,783 UART: [kat] ECC-384
30,595,598 UART: [kat] HMAC-384Kdf
30,617,186 UART: [kat] LMS
31,148,763 UART: [kat] --
31,153,076 UART: [update-reset] ++
34,663,491 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,666,067 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,295,776 >>> mbox cmd response: success
35,300,404 UART: [update-reset] Copying MAN_2 To MAN_1
35,333,596 UART: [update-reset Success] --
35,339,714 UART: [state] Locking Datavault
35,342,609 UART: [state] Locking PCR0, PCR1 and PCR31
35,344,761 UART: [state] Locking ICCM
35,346,099 UART: [exit] Launching FMC @ 0x40000130
35,354,780 UART:
35,355,012 UART: Running Caliptra FMC ...
35,356,113 UART:
35,356,272 UART: [state] CFI Enabled
35,450,150 UART: [art] Extend RT PCRs Done
35,451,353 UART: [art] Lock RT PCRs Done
35,452,807 UART: [art] Populate DV Done
35,458,424 UART: [fht] FMC Alias Private Key: 7
35,460,118 UART: [art] Derive CDI
35,460,926 UART: [art] Store in slot 0x4
35,519,266 UART: [art] Derive Key Pair
35,520,298 UART: [art] Store priv key in slot 0x5
37,983,241 UART: [art] Derive Key Pair - Done
37,996,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,709,255 UART: [art] Erasing AUTHORITY.KEYID = 7
39,710,758 UART: [art] PUB.X = 688CE6E789CB2CD6467107840CA3E46C840979FC28E084A298813FB9223CC9AEAEFADE8F5393B4F557FF30F8B918837E
39,718,048 UART: [art] PUB.Y = 37F1AE8FE973E75D67D5A03AEADF453A905AEB8E0F1EDB69C969B58E93AC984CCBDA4D9AD93C952643A1689FD8A492E5
39,725,325 UART: [art] SIG.R = BE9FDF57E223431EB42AA616CCED6B205178E69B8FC26D3F14AC9196401A3B823EB035FE1F544F3945EBDAE307A3903E
39,732,755 UART: [art] SIG.S = 356C5C9AE99EF031849A2854AB6F001B4CCEDAAE32239276CD0561ACC67843319EB66FBA6E39601D69011FE0A318913C
40,712,082 UART: Caliptra RT
40,712,790 UART: [state] CFI Enabled
41,132,495 UART: [rt] RT failed reset flow
41,133,696 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,437,474 ready_for_fw is high
3,437,912 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,057,478 >>> mbox cmd response: success
14,058,632 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,365,254 UART:
18,365,633 UART: Running Caliptra FMC ...
18,366,831 UART:
18,366,997 UART: [state] CFI Enabled
18,435,166 UART: [fht] FMC Alias Private Key: 7
20,221,957 UART: [art] Extend RT PCRs Done
20,223,183 UART: [art] Lock RT PCRs Done
20,225,026 UART: [art] Populate DV Done
20,230,345 UART: [fht] FMC Alias Private Key: 7
20,231,988 UART: [art] Derive CDI
20,232,806 UART: [art] Store in slot 0x4
20,288,853 UART: [art] Derive Key Pair
20,289,886 UART: [art] Store priv key in slot 0x5
22,753,056 UART: [art] Derive Key Pair - Done
22,765,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,478,797 UART: [art] Erasing AUTHORITY.KEYID = 7
24,480,307 UART: [art] PUB.X = 3CB6716000FFDFF1EDCAE16F8320BE9D31423F09AD8C26368C29DD098B92B86773703B42D821EA169ED1F86ADDB3CD12
24,487,606 UART: [art] PUB.Y = A8C901BA0CD79B7B40154CC453DA1FE48B4850DF613F439762B6C6B3AB8BCF59D401C53C1A77BBF6903AAEC9656DD835
24,494,850 UART: [art] SIG.R = 56656B9A4904F0F938F5B33626A3C874560A5FE9DBEAD111719B298A5CBFB845521BE5576EB6BF16541D2AD1AED450CD
24,502,395 UART: [art] SIG.S = 06B9DDC60CEEBAA85FED59A8EE3956978E70026BFC4FCD75DDDE8455830530F3F7212058A7EE8C0EC1E606C730622180
25,480,932 UART: mbox::rt_entry...
25,481,898 UART: ____ _ _ _ ____ _____
25,483,833 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,485,845 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,487,774 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,489,763 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,491,696 UART: |_|
25,492,527 UART:
25,622,746 UART: [rt] Runtime listening for mailbox commands...
25,624,757 >>> mbox cmd response data (0 bytes)
27,688,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,610,483 >>> mbox cmd response: success
35,646,482 UART:
35,646,821 UART: Running Caliptra FMC ...
35,647,951 UART:
35,648,117 UART: [state] CFI Enabled
35,749,237 UART: [art] Extend RT PCRs Done
35,750,413 UART: [art] Lock RT PCRs Done
35,751,546 UART: [art] Populate DV Done
35,756,898 UART: [fht] FMC Alias Private Key: 7
35,758,596 UART: [art] Derive CDI
35,759,402 UART: [art] Store in slot 0x4
35,818,092 UART: [art] Derive Key Pair
35,819,134 UART: [art] Store priv key in slot 0x5
38,282,448 UART: [art] Derive Key Pair - Done
38,295,392 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,008,414 UART: [art] Erasing AUTHORITY.KEYID = 7
40,009,929 UART: [art] PUB.X = 3F88A313B1BE09CCDF8ED2643554A4487F313F9A004077973F0963D3E4AC76BC7F57502DF0866ACC6A67AEAC0BAA17ED
40,017,169 UART: [art] PUB.Y = F62DBE1C7369F8B3893D95B6936E7E0BCC07EDCA11DA5ADAFB2C3FD9DC22A27810D1F4A289AE868BDE446BCDCB019D33
40,024,419 UART: [art] SIG.R = 774580DF0F97FDDF54F4D390094512C6DD550B497992A377E9444966CB7A16EAABE97EDCF2540E012D335CC2322952D5
40,031,815 UART: [art] SIG.S = 3DBFDE3242E224ADE3D1F421516604B33100F03DD3578183CAAF3298CBD2EABDC7DB669E7B95013752B9FD768A98F501
41,011,124 UART: Caliptra RT
41,011,816 UART: [state] CFI Enabled
41,430,256 UART: [rt] RT failed reset flow
41,431,445 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,458 UART:
192,821 UART: Running Caliptra ROM ...
194,035 UART:
603,761 UART: [state] CFI Enabled
615,823 UART: [state] LifecycleState = Unprovisioned
618,212 UART: [state] DebugLocked = No
619,604 UART: [state] WD Timer not started. Device not locked for debugging
624,650 UART: [kat] SHA2-256
814,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,345 UART: [kat] ++
825,951 UART: [kat] sha1
838,184 UART: [kat] SHA2-256
841,187 UART: [kat] SHA2-384
847,249 UART: [kat] SHA2-512-ACC
849,862 UART: [kat] ECC-384
3,291,128 UART: [kat] HMAC-384Kdf
3,304,921 UART: [kat] LMS
3,836,821 UART: [kat] --
3,839,964 UART: [cold-reset] ++
3,841,898 UART: [fht] FHT @ 0x50003400
3,853,166 UART: [idev] ++
3,853,886 UART: [idev] CDI.KEYID = 6
3,854,775 UART: [idev] SUBJECT.KEYID = 7
3,856,020 UART: [idev] UDS.KEYID = 0
3,856,963 ready_for_fw is high
3,857,152 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,961,231 UART: [idev] Erasing UDS.KEYID = 0
6,333,944 UART: [idev] Sha1 KeyId Algorithm
6,357,769 UART: [idev] --
6,361,010 UART: [ldev] ++
6,361,714 UART: [ldev] CDI.KEYID = 6
6,362,628 UART: [ldev] SUBJECT.KEYID = 5
6,363,790 UART: [ldev] AUTHORITY.KEYID = 7
6,364,974 UART: [ldev] FE.KEYID = 1
6,374,976 UART: [ldev] Erasing FE.KEYID = 1
8,850,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,856 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,264 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,835 UART: [ldev] --
10,639,462 UART: [fwproc] Wait for Commands...
10,641,327 UART: [fwproc] Recv command 0x46574c44
10,643,595 UART: [fwproc] Recv'd Img size: 82832 bytes
13,697,419 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,771,386 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,894,994 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,241,768 >>> mbox cmd response: success
14,242,712 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
14,245,085 UART: [afmc] ++
14,245,794 UART: [afmc] CDI.KEYID = 6
14,246,990 UART: [afmc] SUBJECT.KEYID = 7
14,248,497 UART: [afmc] AUTHORITY.KEYID = 5
16,752,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,473,687 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,475,608 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,490,736 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,505,886 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,520,740 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,543,902 UART: [afmc] --
18,548,366 UART: [cold-reset] --
18,553,157 UART: [state] Locking Datavault
18,558,447 UART: [state] Locking PCR0, PCR1 and PCR31
18,560,639 UART: [state] Locking ICCM
18,563,027 UART: [exit] Launching FMC @ 0x40000130
18,571,719 UART:
18,571,967 UART: Running Caliptra FMC ...
18,573,073 UART:
18,573,240 UART: [state] CFI Enabled
18,581,408 UART: [fht] FMC Alias Private Key: 7
20,347,744 UART: [art] Extend RT PCRs Done
20,348,965 UART: [art] Lock RT PCRs Done
20,350,433 UART: [art] Populate DV Done
20,355,916 UART: [fht] FMC Alias Private Key: 7
20,357,567 UART: [art] Derive CDI
20,358,395 UART: [art] Store in slot 0x4
20,401,160 UART: [art] Derive Key Pair
20,402,197 UART: [art] Store priv key in slot 0x5
22,829,038 UART: [art] Derive Key Pair - Done
22,842,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,548,723 UART: [art] Erasing AUTHORITY.KEYID = 7
24,550,231 UART: [art] PUB.X = 4949B8D4FF2C2BE837A520B5AF9D7D6928A64C0CEC9977E1E217E10E9E317D10FD8903BEFA647AFDC28F04503AE6680E
24,557,509 UART: [art] PUB.Y = A37493743162CD275C1547282A677FC1FE1E210F22219FBC9258A3DDB305751B6B9480877EC0A98DEE11B45737564B3F
24,564,777 UART: [art] SIG.R = 38FAADE3C1792911705E32E2C43EA376BE381486CB86932E9224D005936367311E368A6B4BD3E620567603259840B214
24,572,095 UART: [art] SIG.S = 5486A8E5B8A7DD3B21C11C9951F18CB8C7290918A9F55F6804EEAA6F908D99042F4A1310BD1081B7B732F281CE649BB5
25,550,856 UART: mbox::rt_entry...
25,551,831 UART: ____ _ _ _ ____ _____
25,553,819 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,555,831 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,557,763 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,559,693 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,561,624 UART: |_|
25,562,458 UART:
25,694,016 UART: [rt] Runtime listening for mailbox commands...
25,696,043 >>> mbox cmd response data (0 bytes)
27,759,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,908,821 UART:
27,909,169 UART: Running Caliptra ROM ...
27,910,309 UART:
27,910,483 UART: [state] CFI Enabled
27,921,686 UART: [state] LifecycleState = Unprovisioned
27,923,628 UART: [state] DebugLocked = No
27,925,445 UART: [state] WD Timer not started. Device not locked for debugging
27,930,539 UART: [kat] SHA2-256
28,120,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,131,155 UART: [kat] ++
28,131,756 UART: [kat] sha1
28,142,763 UART: [kat] SHA2-256
28,145,780 UART: [kat] SHA2-384
28,151,393 UART: [kat] SHA2-512-ACC
28,153,982 UART: [kat] ECC-384
30,596,630 UART: [kat] HMAC-384Kdf
30,609,051 UART: [kat] LMS
31,140,709 UART: [kat] --
31,146,809 UART: [update-reset] ++
34,657,919 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,661,410 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,291,178 >>> mbox cmd response: success
35,295,840 UART: [update-reset] Copying MAN_2 To MAN_1
35,330,564 UART: [update-reset Success] --
35,335,113 UART: [state] Locking Datavault
35,338,124 UART: [state] Locking PCR0, PCR1 and PCR31
35,340,294 UART: [state] Locking ICCM
35,342,024 UART: [exit] Launching FMC @ 0x40000130
35,350,666 UART:
35,350,918 UART: Running Caliptra FMC ...
35,352,026 UART:
35,352,194 UART: [state] CFI Enabled
35,396,133 UART: [art] Extend RT PCRs Done
35,397,335 UART: [art] Lock RT PCRs Done
35,398,635 UART: [art] Populate DV Done
35,404,105 UART: [fht] FMC Alias Private Key: 7
35,405,719 UART: [art] Derive CDI
35,406,539 UART: [art] Store in slot 0x4
35,449,286 UART: [art] Derive Key Pair
35,450,338 UART: [art] Store priv key in slot 0x5
37,877,180 UART: [art] Derive Key Pair - Done
37,890,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,596,705 UART: [art] Erasing AUTHORITY.KEYID = 7
39,598,340 UART: [art] PUB.X = D56152B1342E3BA71C8D6AB90F8A4CF0325659979935600AA062FE3114D3470010826059D30AAD597E703D0E9E06705F
39,605,461 UART: [art] PUB.Y = 8C14AB51A4590424F5B87BB2D9412BC8BBDA1D977A66E7F25CD643E7CA088B6DA4C0C621CCCEE4B4896E16B1BB203C42
39,612,717 UART: [art] SIG.R = C0B683B458AAFDE2E934B37B2FE6D4F252F5A9898D97313806A4B8C1C3E4733302FD3635DD543604BF17EB63A1F027C4
39,620,088 UART: [art] SIG.S = 2C43D8C6162534C288E862DF1FBCE501F67643522D81F0B2010BD33AB9CFA84B3A016E2007C1FFCA27A9DF6E4C3754F8
40,599,606 UART: Caliptra RT
40,600,309 UART: [state] CFI Enabled
40,975,134 UART: [rt] RT failed reset flow
40,976,361 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,757,846 ready_for_fw is high
3,758,389 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,265,050 >>> mbox cmd response: success
14,266,184 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
18,508,993 UART:
18,509,378 UART: Running Caliptra FMC ...
18,510,591 UART:
18,510,761 UART: [state] CFI Enabled
18,518,657 UART: [fht] FMC Alias Private Key: 7
20,284,038 UART: [art] Extend RT PCRs Done
20,285,270 UART: [art] Lock RT PCRs Done
20,286,797 UART: [art] Populate DV Done
20,291,945 UART: [fht] FMC Alias Private Key: 7
20,293,540 UART: [art] Derive CDI
20,294,357 UART: [art] Store in slot 0x4
20,337,125 UART: [art] Derive Key Pair
20,338,167 UART: [art] Store priv key in slot 0x5
22,765,307 UART: [art] Derive Key Pair - Done
22,778,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,484,947 UART: [art] Erasing AUTHORITY.KEYID = 7
24,486,462 UART: [art] PUB.X = 17F717DA411092610611C39BBD52C02305023F0550109ACE07639D76BF1CB6AC2BAA20CAC55BE0B2FB74A12D00E24CB0
24,493,734 UART: [art] PUB.Y = EB41610B4A6766F7E5BFF4138B5D0CC0DFB2EF5F3C80A7BAFA969D7A9C14669C7CE8A776F639DB3744B0DF45CD334DAD
24,500,992 UART: [art] SIG.R = 05F20F56124150B1559EBEBCA9F30A8C43E8A8372D0901287B573984E636BA1D4C76A7D34F5CC0B9AF1F251CB08F3B1D
24,508,407 UART: [art] SIG.S = 524477F92137282C904AB91767411BDCB26200F8B228AFBF5B9EEA3D3C27C0E1F8B7D5ECDE42442C44F2554196D6E826
25,486,739 UART: mbox::rt_entry...
25,487,709 UART: ____ _ _ _ ____ _____
25,489,699 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,491,705 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,493,636 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,495,629 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,497,564 UART: |_|
25,498,378 UART:
25,628,645 UART: [rt] Runtime listening for mailbox commands...
25,630,659 >>> mbox cmd response data (0 bytes)
27,696,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,522,951 >>> mbox cmd response: success
35,558,496 UART:
35,558,816 UART: Running Caliptra FMC ...
35,559,864 UART:
35,560,019 UART: [state] CFI Enabled
35,604,280 UART: [art] Extend RT PCRs Done
35,605,472 UART: [art] Lock RT PCRs Done
35,606,693 UART: [art] Populate DV Done
35,612,111 UART: [fht] FMC Alias Private Key: 7
35,613,656 UART: [art] Derive CDI
35,614,394 UART: [art] Store in slot 0x4
35,657,425 UART: [art] Derive Key Pair
35,658,442 UART: [art] Store priv key in slot 0x5
38,086,020 UART: [art] Derive Key Pair - Done
38,098,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,805,002 UART: [art] Erasing AUTHORITY.KEYID = 7
39,806,499 UART: [art] PUB.X = 71C2A4CB79FB0C8E497B7142CEDF661E3382BC3B171EA712ADD6375310860EA5B240B41E06D60DFE373C845CA540C6B9
39,813,777 UART: [art] PUB.Y = B6C564C640FB48258A16E9FAFCCD1A0ED5A786A01F22EC91389DFDBDAD44FD958C53F7E310C6CA31D83257111F674278
39,821,032 UART: [art] SIG.R = 3D626A8AFB55785F76FD4D17590825060E8B306BA8CB6ECE0802F88C14F97C6E47C57CEC7E0D8913E48FFF7A9E3CAA59
39,828,480 UART: [art] SIG.S = 649BCAD02C7A5C4D7D7751E74365E12F36C35AE49779B24DFA3E347A574BB4CA59C4EF3EE06543584F6632451DD17486
40,807,468 UART: Caliptra RT
40,808,166 UART: [state] CFI Enabled
41,182,195 UART: [rt] RT failed reset flow
41,183,389 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,299 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,873 UART: [kat] SHA2-256
881,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,919 UART: [kat] ++
886,071 UART: [kat] sha1
890,113 UART: [kat] SHA2-256
892,051 UART: [kat] SHA2-384
894,724 UART: [kat] SHA2-512-ACC
896,625 UART: [kat] ECC-384
902,150 UART: [kat] HMAC-384Kdf
906,726 UART: [kat] LMS
1,474,922 UART: [kat] --
1,475,787 UART: [cold-reset] ++
1,476,121 UART: [fht] Storing FHT @ 0x50003400
1,478,992 UART: [idev] ++
1,479,160 UART: [idev] CDI.KEYID = 6
1,479,520 UART: [idev] SUBJECT.KEYID = 7
1,479,944 UART: [idev] UDS.KEYID = 0
1,480,289 ready_for_fw is high
1,480,289 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,054 UART: [idev] Erasing UDS.KEYID = 0
1,505,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,820 UART: [idev] --
1,515,005 UART: [ldev] ++
1,515,173 UART: [ldev] CDI.KEYID = 6
1,515,536 UART: [ldev] SUBJECT.KEYID = 5
1,515,962 UART: [ldev] AUTHORITY.KEYID = 7
1,516,425 UART: [ldev] FE.KEYID = 1
1,521,453 UART: [ldev] Erasing FE.KEYID = 1
1,546,458 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,140 UART: [ldev] --
1,585,401 UART: [fwproc] Waiting for Commands...
1,586,194 UART: [fwproc] Received command 0x46574c44
1,586,985 UART: [fwproc] Received Image of size 82832 bytes
2,523,568 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,462 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,379 >>> mbox cmd response: success
2,669,379 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,670,517 UART: [afmc] ++
2,670,685 UART: [afmc] CDI.KEYID = 6
2,671,047 UART: [afmc] SUBJECT.KEYID = 7
2,671,472 UART: [afmc] AUTHORITY.KEYID = 5
2,707,279 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,585 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,724,365 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,730,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,957 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,640 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,494 UART: [afmc] --
2,750,590 UART: [cold-reset] --
2,751,486 UART: [state] Locking Datavault
2,752,493 UART: [state] Locking PCR0, PCR1 and PCR31
2,753,097 UART: [state] Locking ICCM
2,753,601 UART: [exit] Launching FMC @ 0x40000130
2,758,931 UART:
2,758,947 UART: Running Caliptra FMC ...
2,759,355 UART:
2,759,409 UART: [state] CFI Enabled
2,769,777 UART: [fht] FMC Alias Private Key: 7
2,888,833 UART: [art] Extend RT PCRs Done
2,889,261 UART: [art] Lock RT PCRs Done
2,890,661 UART: [art] Populate DV Done
2,898,904 UART: [fht] FMC Alias Private Key: 7
2,899,896 UART: [art] Derive CDI
2,900,176 UART: [art] Store in slot 0x4
2,985,808 UART: [art] Derive Key Pair
2,986,168 UART: [art] Store priv key in slot 0x5
2,999,695 UART: [art] Derive Key Pair - Done
3,014,117 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,646 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,411 UART: [art] PUB.X = 6524764E6CFC2717A057C0ED60105C9ACFEEB9E88F9CA85653A92D04BC965286CB7C0CB8286575D9070D474C5B02FD40
3,037,172 UART: [art] PUB.Y = 10DA47494565B61C6E28F9BC975AEB08AE775D0C885204779A2B5CD6B5FD8EB8081C625015287EE3A47DB0357CBBFC01
3,044,115 UART: [art] SIG.R = A12F3FF94C85EA76E8D5B451144093CAA770061D50C57AB3983C9A80B74ECB2A923E72E3029D543B8A45563FD9B7845E
3,050,883 UART: [art] SIG.S = 273E0EF970979F67589BC17C92BD14E49F2CC5D12CB5C12DC362F019F1847E262FAB88FF73577637FDD4A4040910FA01
3,074,795 UART: mbox::rt_entry...
3,075,167 UART: ____ _ _ _ ____ _____
3,075,951 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,751 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,287 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,055 UART: |_|
3,079,367 UART:
3,197,546 UART: [rt] Runtime listening for mailbox commands...
3,198,496 >>> mbox cmd response data (0 bytes)
3,198,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,611 UART:
3,198,627 UART: Running Caliptra ROM ...
3,199,035 UART:
3,199,089 UART: [state] CFI Enabled
3,201,713 UART: [state] LifecycleState = Unprovisioned
3,202,368 UART: [state] DebugLocked = No
3,203,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,204,759 UART: [kat] SHA2-256
3,998,690 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,002,805 UART: [kat] ++
4,002,957 UART: [kat] sha1
4,007,165 UART: [kat] SHA2-256
4,009,103 UART: [kat] SHA2-384
4,011,726 UART: [kat] SHA2-512-ACC
4,013,626 UART: [kat] ECC-384
4,019,491 UART: [kat] HMAC-384Kdf
4,024,211 UART: [kat] LMS
4,592,407 UART: [kat] --
4,593,174 UART: [update-reset] ++
5,975,416 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,548 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,815 >>> mbox cmd response: success
6,131,976 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,990 UART: [update-reset Success] --
6,141,145 UART: [state] Locking Datavault
6,141,993 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,597 UART: [state] Locking ICCM
6,143,205 UART: [exit] Launching FMC @ 0x40000130
6,148,535 UART:
6,148,551 UART: Running Caliptra FMC ...
6,148,959 UART:
6,149,013 UART: [state] CFI Enabled
6,238,082 UART: [art] Extend RT PCRs Done
6,238,510 UART: [art] Lock RT PCRs Done
6,239,839 UART: [art] Populate DV Done
6,248,356 UART: [fht] FMC Alias Private Key: 7
6,249,474 UART: [art] Derive CDI
6,249,754 UART: [art] Store in slot 0x4
6,335,484 UART: [art] Derive Key Pair
6,335,844 UART: [art] Store priv key in slot 0x5
6,348,827 UART: [art] Derive Key Pair - Done
6,363,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,379,161 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,926 UART: [art] PUB.X = 88FCB31074AC23A2D45A557BE45855FB25BD75D0EB5D31DAC814BBA3F53AA60308DC1E78385644E79E53BD99679EFAFA
6,386,706 UART: [art] PUB.Y = 974F3A3C2BA2D01F39257C350F43B8AFB2FF66AFE1AFD78FAF674A57160263905B70143C2F093BDB02187E668566982B
6,393,648 UART: [art] SIG.R = 0D67AD37A34A2D04E566B7743453F6E329B3095876909C6A1E09BA7014FECB17FCA5AE7BA53DC49D39350072348C216B
6,400,386 UART: [art] SIG.S = E84F44530019F2CC6A82C9E61B473E0F35E4099834F789EE6C2B34DC339BB5243F363E520842A2D075746F2A2019BE46
6,423,985 UART: Caliptra RT
6,424,236 UART: [state] CFI Enabled
6,788,124 UART: [rt] RT failed reset flow
6,788,555 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,103 ready_for_fw is high
1,363,103 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,233 >>> mbox cmd response: success
2,518,233 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,579,962 UART:
2,579,978 UART: Running Caliptra FMC ...
2,580,386 UART:
2,580,440 UART: [state] CFI Enabled
2,591,198 UART: [fht] FMC Alias Private Key: 7
2,710,128 UART: [art] Extend RT PCRs Done
2,710,556 UART: [art] Lock RT PCRs Done
2,712,270 UART: [art] Populate DV Done
2,720,745 UART: [fht] FMC Alias Private Key: 7
2,721,757 UART: [art] Derive CDI
2,722,037 UART: [art] Store in slot 0x4
2,807,525 UART: [art] Derive Key Pair
2,807,885 UART: [art] Store priv key in slot 0x5
2,821,172 UART: [art] Derive Key Pair - Done
2,835,935 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,222 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,987 UART: [art] PUB.X = C240FF02FFD4A23CE76634ECB05F03BC9AB0AEFB5D2AA189892C854EB70A2B14DB5937CC3612FC6FF6E237686C297FBD
2,858,770 UART: [art] PUB.Y = A6E2EA8212FC9FB0A349EF258E88A1B1981C1F8DBFE8A9E5BA053A10601EA5295638700D758784D318FE1C6E503DB60B
2,865,721 UART: [art] SIG.R = 7B394C6013FAAEA15A8C381312CF8B4BE0695A37AD71F97CF64178BC49ABB4C0355F98BF2900FC67B80C1FF869BC2C50
2,872,480 UART: [art] SIG.S = 587FB1EE4F448CFDBF1B84A63BF5A1378F1CB6E23870BDA7A1CF376832D2202EDFDDCB95F5364DC1D812D8965BFDF65C
2,896,636 UART: mbox::rt_entry...
2,897,008 UART: ____ _ _ _ ____ _____
2,897,792 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,592 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,360 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,128 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,896 UART: |_|
2,901,208 UART:
3,020,698 UART: [rt] Runtime listening for mailbox commands...
3,021,648 >>> mbox cmd response data (0 bytes)
3,021,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,835,737 >>> mbox cmd response: success
5,848,891 UART:
5,848,907 UART: Running Caliptra FMC ...
5,849,315 UART:
5,849,369 UART: [state] CFI Enabled
5,938,508 UART: [art] Extend RT PCRs Done
5,938,936 UART: [art] Lock RT PCRs Done
5,940,099 UART: [art] Populate DV Done
5,948,348 UART: [fht] FMC Alias Private Key: 7
5,949,414 UART: [art] Derive CDI
5,949,694 UART: [art] Store in slot 0x4
6,035,318 UART: [art] Derive Key Pair
6,035,678 UART: [art] Store priv key in slot 0x5
6,048,553 UART: [art] Derive Key Pair - Done
6,063,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,078,469 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,234 UART: [art] PUB.X = E8A0931F6FC6861C5157A309E36B4FFD365308E29C3F4E730011BD315E2D5D2D0EAC577BB561409251707B36177DF4E2
6,085,973 UART: [art] PUB.Y = E7F056FF746563009182C20863CA8BC1E1F88C50380981BA34CA40DB63D573476D39D2B138643EAA6114818D8B6EA1F1
6,092,893 UART: [art] SIG.R = 388F16EAD8E44A0DC7196AB0F02F62D308D0F6AD09E6F9C568E20742C04833372A1250D7F611FC6E7690F2A5D26EF03D
6,099,657 UART: [art] SIG.S = AE5604578B4C0BD6DFB9A64EA530EBA7006B09B5BBF1897F93EB1A5A529CEDCBF44836758A297155DF930A0B434EC753
6,123,362 UART: Caliptra RT
6,123,613 UART: [state] CFI Enabled
6,491,483 UART: [rt] RT failed reset flow
6,491,914 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,766 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,640 UART: [kat] SHA2-256
892,578 UART: [kat] SHA2-384
895,221 UART: [kat] SHA2-512-ACC
897,122 UART: [kat] ECC-384
902,967 UART: [kat] HMAC-384Kdf
907,543 UART: [kat] LMS
1,475,739 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,820 UART: [fht] Storing FHT @ 0x50003400
1,479,577 UART: [idev] ++
1,479,745 UART: [idev] CDI.KEYID = 6
1,480,105 UART: [idev] SUBJECT.KEYID = 7
1,480,529 UART: [idev] UDS.KEYID = 0
1,480,874 ready_for_fw is high
1,480,874 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,391 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,077 UART: [idev] --
1,515,216 UART: [ldev] ++
1,515,384 UART: [ldev] CDI.KEYID = 6
1,515,747 UART: [ldev] SUBJECT.KEYID = 5
1,516,173 UART: [ldev] AUTHORITY.KEYID = 7
1,516,636 UART: [ldev] FE.KEYID = 1
1,522,028 UART: [ldev] Erasing FE.KEYID = 1
1,547,745 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,828 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,431 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,665 UART: [ldev] --
1,587,068 UART: [fwproc] Waiting for Commands...
1,587,895 UART: [fwproc] Received command 0x46574c44
1,588,686 UART: [fwproc] Received Image of size 82832 bytes
2,523,337 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,085 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,954 >>> mbox cmd response: success
2,667,954 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,669,122 UART: [afmc] ++
2,669,290 UART: [afmc] CDI.KEYID = 6
2,669,652 UART: [afmc] SUBJECT.KEYID = 7
2,670,077 UART: [afmc] AUTHORITY.KEYID = 5
2,704,978 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,234 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,917 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,739 UART: [afmc] --
2,747,769 UART: [cold-reset] --
2,748,725 UART: [state] Locking Datavault
2,749,504 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,108 UART: [state] Locking ICCM
2,750,776 UART: [exit] Launching FMC @ 0x40000130
2,756,106 UART:
2,756,122 UART: Running Caliptra FMC ...
2,756,530 UART:
2,756,673 UART: [state] CFI Enabled
2,767,553 UART: [fht] FMC Alias Private Key: 7
2,886,745 UART: [art] Extend RT PCRs Done
2,887,173 UART: [art] Lock RT PCRs Done
2,888,231 UART: [art] Populate DV Done
2,896,442 UART: [fht] FMC Alias Private Key: 7
2,897,482 UART: [art] Derive CDI
2,897,762 UART: [art] Store in slot 0x4
2,983,534 UART: [art] Derive Key Pair
2,983,894 UART: [art] Store priv key in slot 0x5
2,997,771 UART: [art] Derive Key Pair - Done
3,012,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,243 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,008 UART: [art] PUB.X = EC03DF6205DB536E3C40388B05C2038713BBE5C00CFEBAA9B2C7B987063852E8C98A8E1C731D751C619B703C7561D76B
3,035,766 UART: [art] PUB.Y = A0C71C44F9C449A330F36D143A1E47D5C63CEB479338B6A514F797327B78A23988DCE0CB7E0F57AE94AD37225122D833
3,042,715 UART: [art] SIG.R = 21D4A63B5F5AC399A93E7C8F82EFF6973294689832E232AFDBB1543C39F402C02688898BB22A146FB1E7ED111FAD7590
3,049,486 UART: [art] SIG.S = DEA4E00CB1EF08A7548454E0290A70F673B1DFCD9DFDFAE0C9887551CAFFDFAE717112989C56FFF588C239EC193D789D
3,073,061 UART: mbox::rt_entry...
3,073,433 UART: ____ _ _ _ ____ _____
3,074,217 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,075,017 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,075,785 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,076,553 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,321 UART: |_|
3,077,633 UART:
3,196,396 UART: [rt] Runtime listening for mailbox commands...
3,197,346 >>> mbox cmd response data (0 bytes)
3,197,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,197,461 UART:
3,197,477 UART: Running Caliptra ROM ...
3,197,885 UART:
3,198,026 UART: [state] CFI Enabled
3,201,252 UART: [state] LifecycleState = Unprovisioned
3,201,907 UART: [state] DebugLocked = No
3,202,553 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,204,220 UART: [kat] SHA2-256
3,998,151 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,002,266 UART: [kat] ++
4,002,418 UART: [kat] sha1
4,006,836 UART: [kat] SHA2-256
4,008,774 UART: [kat] SHA2-384
4,011,501 UART: [kat] SHA2-512-ACC
4,013,401 UART: [kat] ECC-384
4,018,976 UART: [kat] HMAC-384Kdf
4,023,636 UART: [kat] LMS
4,591,832 UART: [kat] --
4,592,465 UART: [update-reset] ++
5,974,205 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,975,463 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,130,730 >>> mbox cmd response: success
6,131,037 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,051 UART: [update-reset Success] --
6,140,156 UART: [state] Locking Datavault
6,140,930 UART: [state] Locking PCR0, PCR1 and PCR31
6,141,534 UART: [state] Locking ICCM
6,142,106 UART: [exit] Launching FMC @ 0x40000130
6,147,436 UART:
6,147,452 UART: Running Caliptra FMC ...
6,147,860 UART:
6,148,003 UART: [state] CFI Enabled
6,237,070 UART: [art] Extend RT PCRs Done
6,237,498 UART: [art] Lock RT PCRs Done
6,238,593 UART: [art] Populate DV Done
6,246,960 UART: [fht] FMC Alias Private Key: 7
6,248,116 UART: [art] Derive CDI
6,248,396 UART: [art] Store in slot 0x4
6,334,200 UART: [art] Derive Key Pair
6,334,560 UART: [art] Store priv key in slot 0x5
6,347,429 UART: [art] Derive Key Pair - Done
6,362,409 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,377,628 UART: [art] Erasing AUTHORITY.KEYID = 7
6,378,393 UART: [art] PUB.X = 753674A63B1BBE1E453A153116A9119AAF8EAEFE1C84258F9012069B968720B6205F2F8FD9113F77121A952728D31419
6,385,152 UART: [art] PUB.Y = A67DE7243238113A1970C6D111E36F3B56B64A082957AB1BB702C2320691C6B879ECC4D2F97F6751C6E91FBDE7D4F157
6,392,095 UART: [art] SIG.R = 93A3DCCE410D3C99E97BFCA8D89EE4B33102546B72AAD6BC2C48484FD5AF92E94A115421DECF4AB05FB2BA599A87636A
6,398,879 UART: [art] SIG.S = BCC4610F420788827ADE3834A5504DEC25C6C2A3317C79F954BB995F8971F10E6ED4C8AAB79AE4978BDFD9585DF37FCB
6,423,032 UART: Caliptra RT
6,423,375 UART: [state] CFI Enabled
6,787,506 UART: [rt] RT failed reset flow
6,787,937 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,518 ready_for_fw is high
1,362,518 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,656 >>> mbox cmd response: success
2,517,656 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,579,561 UART:
2,579,577 UART: Running Caliptra FMC ...
2,579,985 UART:
2,580,128 UART: [state] CFI Enabled
2,590,706 UART: [fht] FMC Alias Private Key: 7
2,709,584 UART: [art] Extend RT PCRs Done
2,710,012 UART: [art] Lock RT PCRs Done
2,711,336 UART: [art] Populate DV Done
2,719,381 UART: [fht] FMC Alias Private Key: 7
2,720,471 UART: [art] Derive CDI
2,720,751 UART: [art] Store in slot 0x4
2,806,637 UART: [art] Derive Key Pair
2,806,997 UART: [art] Store priv key in slot 0x5
2,820,652 UART: [art] Derive Key Pair - Done
2,835,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,130 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,895 UART: [art] PUB.X = 8322360BFFCF5139DA71B8882CD9BFA7B2D780C19EAACC9BFAEE0531667114CD33AC698999B2D5B20E3429DA797401E7
2,858,665 UART: [art] PUB.Y = AB44C1067EFC5B0314861270A15164354D3A2D4603E1D40B64E6B32994DA23A7FF6D6EB4960541DBEA2E50FCD14774A3
2,865,604 UART: [art] SIG.R = 36C039C82C2C78B303E8063716AFE728B8CB34101A51F6150D2A7AA1DC40C99CAE9F00371C1F3AF949AC61B552780F34
2,872,344 UART: [art] SIG.S = 9EFB21F8861495F59294A5D5CEF5D90B75480B036AC2E647823BB483762F693BF3E2DDEBF9925D241712A8F77759A39C
2,896,099 UART: mbox::rt_entry...
2,896,471 UART: ____ _ _ _ ____ _____
2,897,255 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,055 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,823 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,359 UART: |_|
2,900,671 UART:
3,019,822 UART: [rt] Runtime listening for mailbox commands...
3,020,772 >>> mbox cmd response data (0 bytes)
3,020,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,835,172 >>> mbox cmd response: success
5,848,724 UART:
5,848,740 UART: Running Caliptra FMC ...
5,849,148 UART:
5,849,291 UART: [state] CFI Enabled
5,938,146 UART: [art] Extend RT PCRs Done
5,938,574 UART: [art] Lock RT PCRs Done
5,939,881 UART: [art] Populate DV Done
5,948,230 UART: [fht] FMC Alias Private Key: 7
5,949,204 UART: [art] Derive CDI
5,949,484 UART: [art] Store in slot 0x4
6,034,798 UART: [art] Derive Key Pair
6,035,158 UART: [art] Store priv key in slot 0x5
6,048,059 UART: [art] Derive Key Pair - Done
6,062,890 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,078,353 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,118 UART: [art] PUB.X = 728701A2F6A11B0A9C72A7810BC301E1FF281D4D4C1D6CEAE9AF7C471AE24194115A8495381650125D53A34C4F162C53
6,085,876 UART: [art] PUB.Y = CBEA0E00C0BA9D60BAA242C0C6949EB278DA0A30A331092B27BD0A86E44CD6DCD93839ACA9E3975F08B7440AFAFDED31
6,092,810 UART: [art] SIG.R = 9AA1096963D07544473A56EC454D404F17E027DA90A48157FCC882840AB155502C2E27C28E7C38D904193727B5773304
6,099,554 UART: [art] SIG.S = D6DF93FB8E1F6E175DC47A294176190FEB3D5938F68B71D66F86CC2D01CB491062BB67508DC7CDC518E2135D9917C554
6,123,444 UART: Caliptra RT
6,123,787 UART: [state] CFI Enabled
6,488,304 UART: [rt] RT failed reset flow
6,488,735 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
891,382 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,486 UART: [kat] ++
895,638 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,075 UART: [kat] HMAC-384Kdf
920,501 UART: [kat] LMS
1,168,813 UART: [kat] --
1,169,520 UART: [cold-reset] ++
1,170,024 UART: [fht] FHT @ 0x50003400
1,172,552 UART: [idev] ++
1,172,720 UART: [idev] CDI.KEYID = 6
1,173,081 UART: [idev] SUBJECT.KEYID = 7
1,173,506 UART: [idev] UDS.KEYID = 0
1,173,852 ready_for_fw is high
1,173,852 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,465 UART: [idev] Erasing UDS.KEYID = 0
1,198,627 UART: [idev] Sha1 KeyId Algorithm
1,207,679 UART: [idev] --
1,208,670 UART: [ldev] ++
1,208,838 UART: [ldev] CDI.KEYID = 6
1,209,202 UART: [ldev] SUBJECT.KEYID = 5
1,209,629 UART: [ldev] AUTHORITY.KEYID = 7
1,210,092 UART: [ldev] FE.KEYID = 1
1,215,040 UART: [ldev] Erasing FE.KEYID = 1
1,241,949 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,324 UART: [ldev] --
1,281,575 UART: [fwproc] Wait for Commands...
1,282,168 UART: [fwproc] Recv command 0x46574c44
1,282,901 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,217 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,714 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,889 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,714 >>> mbox cmd response: success
2,364,714 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,365,818 UART: [afmc] ++
2,365,986 UART: [afmc] CDI.KEYID = 6
2,366,349 UART: [afmc] SUBJECT.KEYID = 7
2,366,775 UART: [afmc] AUTHORITY.KEYID = 5
2,401,436 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,485 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,234 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,944 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,825 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,526 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,289 UART: [afmc] --
2,444,142 UART: [cold-reset] --
2,444,902 UART: [state] Locking Datavault
2,445,847 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,451 UART: [state] Locking ICCM
2,446,971 UART: [exit] Launching FMC @ 0x40000130
2,452,301 UART:
2,452,317 UART: Running Caliptra FMC ...
2,452,725 UART:
2,452,779 UART: [state] CFI Enabled
2,463,567 UART: [fht] FMC Alias Private Key: 7
2,581,837 UART: [art] Extend RT PCRs Done
2,582,265 UART: [art] Lock RT PCRs Done
2,583,919 UART: [art] Populate DV Done
2,591,928 UART: [fht] FMC Alias Private Key: 7
2,593,104 UART: [art] Derive CDI
2,593,384 UART: [art] Store in slot 0x4
2,678,773 UART: [art] Derive Key Pair
2,679,133 UART: [art] Store priv key in slot 0x5
2,691,847 UART: [art] Derive Key Pair - Done
2,707,047 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,544 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,309 UART: [art] PUB.X = D6E926955C92B85C498CCE1F9C5E0264799BBFEDBC8CF1D5C3A28C5BCFB85CE39342E9B3DC161E77BA406F89447FF914
2,730,094 UART: [art] PUB.Y = D64252905FC634578DDECDC572DE737520B3175BBA76C3BDD21CFBAFB851F732DD85248B68148A2D346D0B7F8A661E7B
2,737,053 UART: [art] SIG.R = BA19B39D5BC366FF5CDAA7A1BC708CB4B475438272741B80D364FCAABAE8540EED511769809347F6C4C03CEAD7FAF21A
2,743,840 UART: [art] SIG.S = A6E908DB7D4E678F137A260686C128DF004830C6F29540DC5C167BFAB5BD1786C54768B495DAC0FBCAFCA6A40A6D4957
2,767,757 UART: mbox::rt_entry...
2,768,129 UART: ____ _ _ _ ____ _____
2,768,913 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,481 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,249 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,017 UART: |_|
2,772,329 UART:
2,890,366 UART: [rt] Runtime listening for mailbox commands...
2,891,316 >>> mbox cmd response data (0 bytes)
2,891,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,891,428 UART:
2,891,444 UART: Running Caliptra ROM ...
2,891,852 UART:
2,891,907 UART: [state] CFI Enabled
2,894,273 UART: [state] LifecycleState = Unprovisioned
2,894,928 UART: [state] DebugLocked = No
2,895,522 UART: [state] WD Timer not started. Device not locked for debugging
2,896,842 UART: [kat] SHA2-256
3,700,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,704,496 UART: [kat] ++
3,704,648 UART: [kat] sha1
3,708,846 UART: [kat] SHA2-256
3,710,786 UART: [kat] SHA2-384
3,713,403 UART: [kat] SHA2-512-ACC
3,715,303 UART: [kat] ECC-384
3,725,092 UART: [kat] HMAC-384Kdf
3,729,590 UART: [kat] LMS
3,977,902 UART: [kat] --
3,978,754 UART: [update-reset] ++
5,337,081 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,338,136 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,493,351 >>> mbox cmd response: success
5,493,488 UART: [update-reset] Copying MAN_2 To MAN_1
5,501,502 UART: [update-reset Success] --
5,502,577 UART: [state] Locking Datavault
5,503,391 UART: [state] Locking PCR0, PCR1 and PCR31
5,503,995 UART: [state] Locking ICCM
5,504,665 UART: [exit] Launching FMC @ 0x40000130
5,509,995 UART:
5,510,011 UART: Running Caliptra FMC ...
5,510,419 UART:
5,510,473 UART: [state] CFI Enabled
5,599,514 UART: [art] Extend RT PCRs Done
5,599,942 UART: [art] Lock RT PCRs Done
5,601,387 UART: [art] Populate DV Done
5,609,460 UART: [fht] FMC Alias Private Key: 7
5,610,464 UART: [art] Derive CDI
5,610,744 UART: [art] Store in slot 0x4
5,696,281 UART: [art] Derive Key Pair
5,696,641 UART: [art] Store priv key in slot 0x5
5,710,733 UART: [art] Derive Key Pair - Done
5,725,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,740,980 UART: [art] Erasing AUTHORITY.KEYID = 7
5,741,745 UART: [art] PUB.X = C0F5E88759E6E364D43F2A4258FABDA726A4B8EAA2C88E0160DB73109463F7B5607E419759ED50707B049908C48654F7
5,748,504 UART: [art] PUB.Y = C454A1902036997857E6ADC7EEC62FAB70C7FBA697DC9ED3C688C7ECA7658C13AAF1BBAE3427A3206CAB8F3AA3E9FCB9
5,755,480 UART: [art] SIG.R = 31C34FEEB01358B7D233E2FF06D0DFA2EBC97B19D238ABDAB3B5E1ECEAD1E5AF91B442B7E8390DF53B9974603C312095
5,762,264 UART: [art] SIG.S = 8CFEF8B0A274FD11618AD4A86D10DBE0C29EC27841BC7D8FE85164E1320BC2AB6D6EF35169ADF7A3332EA92482483EF0
5,786,593 UART: Caliptra RT
5,786,844 UART: [state] CFI Enabled
6,150,561 UART: [rt] RT failed reset flow
6,150,992 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,630 ready_for_fw is high
1,059,630 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,825 >>> mbox cmd response: success
2,215,825 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,278,056 UART:
2,278,072 UART: Running Caliptra FMC ...
2,278,480 UART:
2,278,534 UART: [state] CFI Enabled
2,288,708 UART: [fht] FMC Alias Private Key: 7
2,408,120 UART: [art] Extend RT PCRs Done
2,408,548 UART: [art] Lock RT PCRs Done
2,410,092 UART: [art] Populate DV Done
2,418,481 UART: [fht] FMC Alias Private Key: 7
2,419,619 UART: [art] Derive CDI
2,419,899 UART: [art] Store in slot 0x4
2,505,838 UART: [art] Derive Key Pair
2,506,198 UART: [art] Store priv key in slot 0x5
2,519,498 UART: [art] Derive Key Pair - Done
2,534,318 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,437 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,202 UART: [art] PUB.X = 235CC000CE36F2ADEF634BFC344A0BB9CC3A497348BE9585F708F01947BF87E8CF1CBBC29F9E39DB6F77CB17B43E615E
2,557,964 UART: [art] PUB.Y = 627F4DDE1E6C2614C2E7D99A239DE99E21447487A4E3F4D5393DCF3B717CC26CA267D3503C22467CA08F25CF0BB3D016
2,564,919 UART: [art] SIG.R = 416CEF6E70C0012F77D3F5C9E942D2491047E59430194218DD388B2215A1A35C4737D1E5C3BF02F2CADCE9FFEB4DB803
2,571,688 UART: [art] SIG.S = 97F4117CEE2D7024A06FE86D11D31C1B904985FA26C6412E701A92B76572BC8EDDE015C3E6967A046370BCBE877E2F98
2,595,571 UART: mbox::rt_entry...
2,595,943 UART: ____ _ _ _ ____ _____
2,596,727 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,527 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,063 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,831 UART: |_|
2,600,143 UART:
2,719,687 UART: [rt] Runtime listening for mailbox commands...
2,720,637 >>> mbox cmd response data (0 bytes)
2,720,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,828 >>> mbox cmd response: success
5,222,999 UART:
5,223,015 UART: Running Caliptra FMC ...
5,223,423 UART:
5,223,477 UART: [state] CFI Enabled
5,313,568 UART: [art] Extend RT PCRs Done
5,313,996 UART: [art] Lock RT PCRs Done
5,315,309 UART: [art] Populate DV Done
5,323,436 UART: [fht] FMC Alias Private Key: 7
5,324,380 UART: [art] Derive CDI
5,324,660 UART: [art] Store in slot 0x4
5,410,663 UART: [art] Derive Key Pair
5,411,023 UART: [art] Store priv key in slot 0x5
5,424,435 UART: [art] Derive Key Pair - Done
5,439,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,454,640 UART: [art] Erasing AUTHORITY.KEYID = 7
5,455,405 UART: [art] PUB.X = F27986E0CA5441ABE39CF66531ED1461A94C01C4DD2309289D99C7DEE005F516725606C385CD1C5171F8EE4904131A67
5,462,158 UART: [art] PUB.Y = 1DB23E07CC007D248C98EB118F2FA2081BA8961C73358DE668E16B6B04E699E03AB5A4C9CF10B78EF4E29BDF9510152E
5,469,087 UART: [art] SIG.R = E723044C44581E309C6AA2119BAD4A86B61BBE00FBC47C251BF74D06E1936E5AFBED620D03AE796A86C65D3A71D0E8CE
5,475,839 UART: [art] SIG.S = 5DC55292C276B00C18CC27AB6AC7EAEF416B63D2640B96483674D1E1877231812D7960B84BB666D8069790891E94A209
5,499,159 UART: Caliptra RT
5,499,410 UART: [state] CFI Enabled
5,862,211 UART: [rt] RT failed reset flow
5,862,642 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,575 UART: [kat] SHA2-256
891,125 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,229 UART: [kat] ++
895,381 UART: [kat] sha1
899,659 UART: [kat] SHA2-256
901,599 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,692 UART: [kat] LMS
1,169,004 UART: [kat] --
1,169,643 UART: [cold-reset] ++
1,170,041 UART: [fht] FHT @ 0x50003400
1,172,529 UART: [idev] ++
1,172,697 UART: [idev] CDI.KEYID = 6
1,173,058 UART: [idev] SUBJECT.KEYID = 7
1,173,483 UART: [idev] UDS.KEYID = 0
1,173,829 ready_for_fw is high
1,173,829 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,720 UART: [idev] Erasing UDS.KEYID = 0
1,198,926 UART: [idev] Sha1 KeyId Algorithm
1,207,648 UART: [idev] --
1,208,741 UART: [ldev] ++
1,208,909 UART: [ldev] CDI.KEYID = 6
1,209,273 UART: [ldev] SUBJECT.KEYID = 5
1,209,700 UART: [ldev] AUTHORITY.KEYID = 7
1,210,163 UART: [ldev] FE.KEYID = 1
1,215,679 UART: [ldev] Erasing FE.KEYID = 1
1,242,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,130 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,683 UART: [ldev] --
1,282,014 UART: [fwproc] Wait for Commands...
1,282,763 UART: [fwproc] Recv command 0x46574c44
1,283,496 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,234 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,959 >>> mbox cmd response: success
2,362,959 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,364,079 UART: [afmc] ++
2,364,247 UART: [afmc] CDI.KEYID = 6
2,364,610 UART: [afmc] SUBJECT.KEYID = 7
2,365,036 UART: [afmc] AUTHORITY.KEYID = 5
2,400,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,930 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,389 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,270 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,971 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,920 UART: [afmc] --
2,443,765 UART: [cold-reset] --
2,444,515 UART: [state] Locking Datavault
2,445,680 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,284 UART: [state] Locking ICCM
2,446,768 UART: [exit] Launching FMC @ 0x40000130
2,452,098 UART:
2,452,114 UART: Running Caliptra FMC ...
2,452,522 UART:
2,452,665 UART: [state] CFI Enabled
2,463,215 UART: [fht] FMC Alias Private Key: 7
2,582,663 UART: [art] Extend RT PCRs Done
2,583,091 UART: [art] Lock RT PCRs Done
2,585,011 UART: [art] Populate DV Done
2,593,398 UART: [fht] FMC Alias Private Key: 7
2,594,344 UART: [art] Derive CDI
2,594,624 UART: [art] Store in slot 0x4
2,680,673 UART: [art] Derive Key Pair
2,681,033 UART: [art] Store priv key in slot 0x5
2,694,779 UART: [art] Derive Key Pair - Done
2,709,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,079 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,844 UART: [art] PUB.X = 5EFE7C0AD198AB682E23D4975C147F7FA35D79237258B6E4B37075A37EBB5FBFB306ADA08252CCB199C72B1BE7051F32
2,732,617 UART: [art] PUB.Y = F6C63A1FBE3CD10EB1B34AE275AE8163BEB640BB64C618E9DD9F22567ADC05021EBE7A5E33BDF7702AB01606513A2E16
2,739,573 UART: [art] SIG.R = E783B86066426CD3E292138C34F4DF85861C7C7DEEE61FB3B4F6666589F0B2530D08E2FE2AB8F1486E0D1FCDF389BA2B
2,746,346 UART: [art] SIG.S = 6CD6C806DB083A332527ABDBF4BB58B85BDCD7A2CB5DC3CC091FDF63366F25F41C32003E1851310E67D861D7E64B3BB3
2,769,602 UART: mbox::rt_entry...
2,769,974 UART: ____ _ _ _ ____ _____
2,770,758 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,558 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,326 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,094 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,862 UART: |_|
2,774,174 UART:
2,892,384 UART: [rt] Runtime listening for mailbox commands...
2,893,334 >>> mbox cmd response data (0 bytes)
2,893,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,446 UART:
2,893,462 UART: Running Caliptra ROM ...
2,893,870 UART:
2,894,012 UART: [state] CFI Enabled
2,896,982 UART: [state] LifecycleState = Unprovisioned
2,897,637 UART: [state] DebugLocked = No
2,898,135 UART: [state] WD Timer not started. Device not locked for debugging
2,899,383 UART: [kat] SHA2-256
3,702,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,707,037 UART: [kat] ++
3,707,189 UART: [kat] sha1
3,711,383 UART: [kat] SHA2-256
3,713,323 UART: [kat] SHA2-384
3,716,000 UART: [kat] SHA2-512-ACC
3,717,900 UART: [kat] ECC-384
3,727,969 UART: [kat] HMAC-384Kdf
3,732,471 UART: [kat] LMS
3,980,783 UART: [kat] --
3,981,707 UART: [update-reset] ++
5,339,778 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,340,813 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,496,028 >>> mbox cmd response: success
5,496,187 UART: [update-reset] Copying MAN_2 To MAN_1
5,504,201 UART: [update-reset Success] --
5,505,430 UART: [state] Locking Datavault
5,506,214 UART: [state] Locking PCR0, PCR1 and PCR31
5,506,818 UART: [state] Locking ICCM
5,507,368 UART: [exit] Launching FMC @ 0x40000130
5,512,698 UART:
5,512,714 UART: Running Caliptra FMC ...
5,513,122 UART:
5,513,265 UART: [state] CFI Enabled
5,603,040 UART: [art] Extend RT PCRs Done
5,603,468 UART: [art] Lock RT PCRs Done
5,604,725 UART: [art] Populate DV Done
5,612,970 UART: [fht] FMC Alias Private Key: 7
5,614,134 UART: [art] Derive CDI
5,614,414 UART: [art] Store in slot 0x4
5,700,163 UART: [art] Derive Key Pair
5,700,523 UART: [art] Store priv key in slot 0x5
5,713,399 UART: [art] Derive Key Pair - Done
5,728,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,743,368 UART: [art] Erasing AUTHORITY.KEYID = 7
5,744,133 UART: [art] PUB.X = 109A1038AD7DB3AAF950BB6D0B770C74339D130D23786EE508BE2A635CA02B3B3CF0B7E2093B759DD643448081B8C073
5,750,892 UART: [art] PUB.Y = 2377B8E5BE4A167F2EA11ADE691039C04F137701FE720C4A923E68AC39A6713A387BE8CAFA75003FE68972B0A661F25D
5,757,820 UART: [art] SIG.R = 848F2FA7482A1C22D3047F712502A7C13B5E02D4072D9B2DC002CDC76C562923E307551C8AE170816B268DEA3E9B04B2
5,764,569 UART: [art] SIG.S = 3672ABB037340802B0F6505EBB6E19CFA9964175455413B8458BD9DD2DAA0A09359786D607CE101D61ECE2B30D77FE28
5,787,739 UART: Caliptra RT
5,788,082 UART: [state] CFI Enabled
6,146,925 UART: [rt] RT failed reset flow
6,147,356 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,127 ready_for_fw is high
1,059,127 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,308 >>> mbox cmd response: success
2,217,308 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,279,007 UART:
2,279,023 UART: Running Caliptra FMC ...
2,279,431 UART:
2,279,574 UART: [state] CFI Enabled
2,289,950 UART: [fht] FMC Alias Private Key: 7
2,409,526 UART: [art] Extend RT PCRs Done
2,409,954 UART: [art] Lock RT PCRs Done
2,411,580 UART: [art] Populate DV Done
2,419,753 UART: [fht] FMC Alias Private Key: 7
2,420,701 UART: [art] Derive CDI
2,420,981 UART: [art] Store in slot 0x4
2,506,724 UART: [art] Derive Key Pair
2,507,084 UART: [art] Store priv key in slot 0x5
2,520,154 UART: [art] Derive Key Pair - Done
2,534,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,420 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,185 UART: [art] PUB.X = EFB8619EAB3156DE394ADFEF220B4DC5731B3ED25B977B00907F2E074CDBE63F5E78BCA92FF188FFE1018ED404252940
2,557,937 UART: [art] PUB.Y = 1BCBC64BD95CEE9B1FDCF23DFE4161020FBA640411AD8FC7F651E531CA5865265BFF54764B3CA7046C39D63C2ACDC128
2,564,895 UART: [art] SIG.R = C023D75DC1B1C251536019D2E952760735C46B420D293A8487C749C085FFACD972A9AD5C914CFBB2B97289BD8608E653
2,571,656 UART: [art] SIG.S = 5CF7EDC06AA2FFB65B2EDB32B3543DDC1004C95B8E70043597A4E86815174A6CDF38EDF5075D7991447CA8228E835B27
2,595,183 UART: mbox::rt_entry...
2,595,555 UART: ____ _ _ _ ____ _____
2,596,339 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,907 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,675 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,443 UART: |_|
2,599,755 UART:
2,717,815 UART: [rt] Runtime listening for mailbox commands...
2,718,765 >>> mbox cmd response data (0 bytes)
2,718,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,597 >>> mbox cmd response: success
5,219,920 UART:
5,219,936 UART: Running Caliptra FMC ...
5,220,344 UART:
5,220,487 UART: [state] CFI Enabled
5,309,726 UART: [art] Extend RT PCRs Done
5,310,154 UART: [art] Lock RT PCRs Done
5,311,567 UART: [art] Populate DV Done
5,319,702 UART: [fht] FMC Alias Private Key: 7
5,320,768 UART: [art] Derive CDI
5,321,048 UART: [art] Store in slot 0x4
5,407,125 UART: [art] Derive Key Pair
5,407,485 UART: [art] Store priv key in slot 0x5
5,420,707 UART: [art] Derive Key Pair - Done
5,435,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,505 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,270 UART: [art] PUB.X = 6A645417D7E92F732ECE80FE28790015F6EBF8EBEAA1DFF263210F534B143CB5F685821BAB7030F537FBD1C3FA4C2B10
5,458,029 UART: [art] PUB.Y = 4A3F086601F02D288C3BDB320F885DF53726D0DBC073ADA642FDC8DECC8946501F56971058038615BB8AD1E088272BEB
5,464,973 UART: [art] SIG.R = D15DE9351742A04008CA1568500F035E8F372EF7210754689E7589295325137CDB7D34AAC053F62FF4C4CEF22E6A869B
5,471,727 UART: [art] SIG.S = 24248B830646B7CA42EE80AB0AB6C97F8363F910EDC84ECCDABA91E4FE5914D8A10E116058D1FC50CE29126810DD17D4
5,495,284 UART: Caliptra RT
5,495,627 UART: [state] CFI Enabled
5,858,786 UART: [rt] RT failed reset flow
5,859,217 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,414 UART: [state] LifecycleState = Unprovisioned
86,069 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
88,058 UART: [kat] SHA2-256
893,708 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,833 UART: [kat] ++
897,985 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,778 UART: [kat] SHA2-512-ACC
908,679 UART: [kat] ECC-384
918,472 UART: [kat] HMAC-384Kdf
923,096 UART: [kat] LMS
1,171,424 UART: [kat] --
1,172,413 UART: [cold-reset] ++
1,172,761 UART: [fht] FHT @ 0x50003400
1,175,330 UART: [idev] ++
1,175,498 UART: [idev] CDI.KEYID = 6
1,175,858 UART: [idev] SUBJECT.KEYID = 7
1,176,282 UART: [idev] UDS.KEYID = 0
1,176,627 ready_for_fw is high
1,176,627 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,358 UART: [idev] Erasing UDS.KEYID = 0
1,201,345 UART: [idev] Sha1 KeyId Algorithm
1,209,919 UART: [idev] --
1,210,987 UART: [ldev] ++
1,211,155 UART: [ldev] CDI.KEYID = 6
1,211,518 UART: [ldev] SUBJECT.KEYID = 5
1,211,944 UART: [ldev] AUTHORITY.KEYID = 7
1,212,407 UART: [ldev] FE.KEYID = 1
1,217,833 UART: [ldev] Erasing FE.KEYID = 1
1,244,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,857 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,573 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,464 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,271 UART: [ldev] --
1,283,630 UART: [fwproc] Wait for Commands...
1,284,378 UART: [fwproc] Recv command 0x46574c44
1,285,106 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,140 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,867 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,680 >>> mbox cmd response: success
2,366,680 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,367,846 UART: [afmc] ++
2,368,014 UART: [afmc] CDI.KEYID = 6
2,368,376 UART: [afmc] SUBJECT.KEYID = 7
2,368,801 UART: [afmc] AUTHORITY.KEYID = 5
2,403,918 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,329 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,077 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,786 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,669 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,370 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,070 UART: [afmc] --
2,447,036 UART: [cold-reset] --
2,448,052 UART: [state] Locking Datavault
2,449,377 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,981 UART: [state] Locking ICCM
2,450,535 UART: [exit] Launching FMC @ 0x40000130
2,455,865 UART:
2,455,881 UART: Running Caliptra FMC ...
2,456,289 UART:
2,456,343 UART: [state] CFI Enabled
2,466,873 UART: [fht] FMC Alias Private Key: 7
2,585,177 UART: [art] Extend RT PCRs Done
2,585,605 UART: [art] Lock RT PCRs Done
2,587,189 UART: [art] Populate DV Done
2,595,330 UART: [fht] FMC Alias Private Key: 7
2,596,292 UART: [art] Derive CDI
2,596,572 UART: [art] Store in slot 0x4
2,682,377 UART: [art] Derive Key Pair
2,682,737 UART: [art] Store priv key in slot 0x5
2,696,487 UART: [art] Derive Key Pair - Done
2,711,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,598 UART: [art] Erasing AUTHORITY.KEYID = 7
2,727,363 UART: [art] PUB.X = 0AF37548E4631C7EFBCE5DD70D2068E0EEE739346015A6C1B53AE026DFC85BCCE1DB81A07729F0551F17183B705A17A1
2,734,137 UART: [art] PUB.Y = B341F9A8072FF4B3280A68A9DE4E0C7F4F4B5DFF31141587ABF73801BC9FBEB5FC37D4D5013CD155DC1B1DDD5949AE90
2,741,092 UART: [art] SIG.R = 6BC879133DC59B04218CD90148BEB8E2F9A49D12C23D68AF06B641907ABAD87E08D30C423E8AC22C49A31DABF694A8D6
2,747,859 UART: [art] SIG.S = 09393EC343743DB5ADF03786C7E12208600DB39F1126121F2E2A6225168E305AD2378949C0BAEB075EFB523BE5AE4D8C
2,771,845 UART: mbox::rt_entry...
2,772,217 UART: ____ _ _ _ ____ _____
2,773,001 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,773,801 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,569 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,337 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,105 UART: |_|
2,776,417 UART:
2,894,914 UART: [rt] Runtime listening for mailbox commands...
2,895,864 >>> mbox cmd response data (0 bytes)
2,895,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,895,976 UART:
2,895,992 UART: Running Caliptra ROM ...
2,896,400 UART:
2,896,455 UART: [state] CFI Enabled
2,899,249 UART: [state] LifecycleState = Unprovisioned
2,899,904 UART: [state] DebugLocked = No
2,900,422 UART: [state] WD Timer not started. Device not locked for debugging
2,901,538 UART: [kat] SHA2-256
3,707,188 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,711,313 UART: [kat] ++
3,711,465 UART: [kat] sha1
3,715,739 UART: [kat] SHA2-256
3,717,679 UART: [kat] SHA2-384
3,720,266 UART: [kat] SHA2-512-ACC
3,722,166 UART: [kat] ECC-384
3,731,785 UART: [kat] HMAC-384Kdf
3,736,381 UART: [kat] LMS
3,984,709 UART: [kat] --
3,985,569 UART: [update-reset] ++
5,344,593 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,345,672 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,500,887 >>> mbox cmd response: success
5,501,198 UART: [update-reset] Copying MAN_2 To MAN_1
5,509,212 UART: [update-reset Success] --
5,510,175 UART: [state] Locking Datavault
5,510,783 UART: [state] Locking PCR0, PCR1 and PCR31
5,511,387 UART: [state] Locking ICCM
5,512,021 UART: [exit] Launching FMC @ 0x40000130
5,517,351 UART:
5,517,367 UART: Running Caliptra FMC ...
5,517,775 UART:
5,517,829 UART: [state] CFI Enabled
5,607,564 UART: [art] Extend RT PCRs Done
5,607,992 UART: [art] Lock RT PCRs Done
5,609,011 UART: [art] Populate DV Done
5,617,436 UART: [fht] FMC Alias Private Key: 7
5,618,612 UART: [art] Derive CDI
5,618,892 UART: [art] Store in slot 0x4
5,704,481 UART: [art] Derive Key Pair
5,704,841 UART: [art] Store priv key in slot 0x5
5,718,605 UART: [art] Derive Key Pair - Done
5,733,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,748,460 UART: [art] Erasing AUTHORITY.KEYID = 7
5,749,225 UART: [art] PUB.X = FC904D2DED4126C693524850CCBA88B9503267A4B1FA660F1E36D4EE7DE51E7D4FC5A499CE4C3AB750FD120EA1429575
5,756,001 UART: [art] PUB.Y = 289EF5C8F868DFF41B12B7840BF45E6012592D65DE196CD164A8D8FA798E398ED16DA13A66A13AED4F252AD5581422FF
5,762,958 UART: [art] SIG.R = 1A41C6F1B2D778F0651B018CD11978145683BB202604A9EB0A9D72F881E4D82CE84703928D45791A02FEC0E72B2974F6
5,769,709 UART: [art] SIG.S = C0A9B0E19935399A0083F6CC023F71910A2E2BA4587E279D2FAF819E10FF377BB89E770A1E55E139B7977C6317E4B045
5,793,212 UART: Caliptra RT
5,793,463 UART: [state] CFI Enabled
6,153,288 UART: [rt] RT failed reset flow
6,153,719 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,691 ready_for_fw is high
1,060,691 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,565 >>> mbox cmd response: success
2,216,565 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,278,964 UART:
2,278,980 UART: Running Caliptra FMC ...
2,279,388 UART:
2,279,442 UART: [state] CFI Enabled
2,289,984 UART: [fht] FMC Alias Private Key: 7
2,409,354 UART: [art] Extend RT PCRs Done
2,409,782 UART: [art] Lock RT PCRs Done
2,411,462 UART: [art] Populate DV Done
2,419,419 UART: [fht] FMC Alias Private Key: 7
2,420,391 UART: [art] Derive CDI
2,420,671 UART: [art] Store in slot 0x4
2,506,234 UART: [art] Derive Key Pair
2,506,594 UART: [art] Store priv key in slot 0x5
2,519,936 UART: [art] Derive Key Pair - Done
2,534,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,460 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,225 UART: [art] PUB.X = C1B1915419C1E101519199E2158799349480FE1AE77700AB811B84409C2CA4DE366CC7FFF72040301928FE23AA67C839
2,557,962 UART: [art] PUB.Y = 078D20A3E1EA0EF09A78E4A01982B61DC65D9EDA9B277C20A937CB23D0F0789B89A2E93E879FB7E1A25698BCA20BF2D8
2,564,917 UART: [art] SIG.R = FE9786E145CBFBA2CB1435469414B72659D0F48BB8A428323E034560CC6585407BB57B21A63255102C9F853313181E72
2,571,674 UART: [art] SIG.S = CE7377BEB15CA01D3310417406A6D4A3C35BAFEADE01761988FDC143C4FF2171E8231CE363FE5DA4CA1C51F3A97753A9
2,595,958 UART: mbox::rt_entry...
2,596,330 UART: ____ _ _ _ ____ _____
2,597,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,914 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,682 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,450 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,218 UART: |_|
2,600,530 UART:
2,717,953 UART: [rt] Runtime listening for mailbox commands...
2,718,903 >>> mbox cmd response data (0 bytes)
2,718,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,208,537 >>> mbox cmd response: success
5,221,820 UART:
5,221,836 UART: Running Caliptra FMC ...
5,222,244 UART:
5,222,298 UART: [state] CFI Enabled
5,311,069 UART: [art] Extend RT PCRs Done
5,311,497 UART: [art] Lock RT PCRs Done
5,312,746 UART: [art] Populate DV Done
5,321,363 UART: [fht] FMC Alias Private Key: 7
5,322,545 UART: [art] Derive CDI
5,322,825 UART: [art] Store in slot 0x4
5,408,432 UART: [art] Derive Key Pair
5,408,792 UART: [art] Store priv key in slot 0x5
5,421,946 UART: [art] Derive Key Pair - Done
5,436,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,210 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,975 UART: [art] PUB.X = 9B3DBCFB86BCA9D11C6F30425E5910AC58E4F23703408B0F7073DD4EBB2463CF8DE00B77F8BE7B817E7AE4D96242F20D
5,459,749 UART: [art] PUB.Y = ED4FBD426795B13E42EB4D26E82AC28A91897278543BC959F329E6D064D92BB612924492549CF1BA3B1CB155134A5790
5,466,697 UART: [art] SIG.R = 10036E11343BCDEC7C57AB8225F9B010D200BA39125E8818134C955DBDD9E90BC9726A48445D83DA00D0E53AC4559D6D
5,473,421 UART: [art] SIG.S = 2CDA39BF96BD60FAA33ADC0E6E2348367F46BD4730941580175521BC5961C59172901452848531EA4517D918FF979A89
5,496,998 UART: Caliptra RT
5,497,249 UART: [state] CFI Enabled
5,863,185 UART: [rt] RT failed reset flow
5,863,616 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,565 UART: [state] LifecycleState = Unprovisioned
86,220 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,225 UART: [kat] SHA2-256
893,875 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,000 UART: [kat] ++
898,152 UART: [kat] sha1
902,450 UART: [kat] SHA2-256
904,390 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,593 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,614 UART: [cold-reset] ++
1,173,026 UART: [fht] FHT @ 0x50003400
1,175,731 UART: [idev] ++
1,175,899 UART: [idev] CDI.KEYID = 6
1,176,259 UART: [idev] SUBJECT.KEYID = 7
1,176,683 UART: [idev] UDS.KEYID = 0
1,177,028 ready_for_fw is high
1,177,028 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,731 UART: [idev] Erasing UDS.KEYID = 0
1,201,514 UART: [idev] Sha1 KeyId Algorithm
1,209,998 UART: [idev] --
1,211,014 UART: [ldev] ++
1,211,182 UART: [ldev] CDI.KEYID = 6
1,211,545 UART: [ldev] SUBJECT.KEYID = 5
1,211,971 UART: [ldev] AUTHORITY.KEYID = 7
1,212,434 UART: [ldev] FE.KEYID = 1
1,217,768 UART: [ldev] Erasing FE.KEYID = 1
1,244,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,280 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,887 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,710 UART: [ldev] --
1,284,159 UART: [fwproc] Wait for Commands...
1,284,803 UART: [fwproc] Recv command 0x46574c44
1,285,531 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,250,178 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,281,348 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,368,161 >>> mbox cmd response: success
2,368,161 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,369,247 UART: [afmc] ++
2,369,415 UART: [afmc] CDI.KEYID = 6
2,369,777 UART: [afmc] SUBJECT.KEYID = 7
2,370,202 UART: [afmc] AUTHORITY.KEYID = 5
2,405,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,422,308 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,423,056 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,765 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,648 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,440,349 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,448,355 UART: [afmc] --
2,449,471 UART: [cold-reset] --
2,450,245 UART: [state] Locking Datavault
2,451,772 UART: [state] Locking PCR0, PCR1 and PCR31
2,452,376 UART: [state] Locking ICCM
2,453,042 UART: [exit] Launching FMC @ 0x40000130
2,458,372 UART:
2,458,388 UART: Running Caliptra FMC ...
2,458,796 UART:
2,458,939 UART: [state] CFI Enabled
2,469,427 UART: [fht] FMC Alias Private Key: 7
2,588,947 UART: [art] Extend RT PCRs Done
2,589,375 UART: [art] Lock RT PCRs Done
2,591,199 UART: [art] Populate DV Done
2,599,484 UART: [fht] FMC Alias Private Key: 7
2,600,540 UART: [art] Derive CDI
2,600,820 UART: [art] Store in slot 0x4
2,687,117 UART: [art] Derive Key Pair
2,687,477 UART: [art] Store priv key in slot 0x5
2,701,171 UART: [art] Derive Key Pair - Done
2,715,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,731,353 UART: [art] Erasing AUTHORITY.KEYID = 7
2,732,118 UART: [art] PUB.X = 488D45CD207604128150934B29D7F0818F530B904D72A8CF0B729900DA1D382DDF05BF0AEC51BC4FC5A2715110B24C93
2,738,851 UART: [art] PUB.Y = 483D7070E3EBE86E7EFDB61A579D877566D38C559582C940A1D90C002BC056D2E653D35FA605A82EDD8EA37B5398CB70
2,745,779 UART: [art] SIG.R = 89DC04BABAFEFEDB9AB45F03A62832C825E2CFA5FFBBF8CD7AACF66B2AAF1FCB8339E7C997C378C1A4225BC1748926B3
2,752,575 UART: [art] SIG.S = D4B25C1629F888C57CF68D68CD3D635A11A3B145DEFB9C6D0D99978D838F402FED2E2C4C820369E28872DA57229D9123
2,775,957 UART: mbox::rt_entry...
2,776,329 UART: ____ _ _ _ ____ _____
2,777,113 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,777,913 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,778,681 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,779,449 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,780,217 UART: |_|
2,780,529 UART:
2,898,016 UART: [rt] Runtime listening for mailbox commands...
2,898,966 >>> mbox cmd response data (0 bytes)
2,898,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,899,078 UART:
2,899,094 UART: Running Caliptra ROM ...
2,899,502 UART:
2,899,644 UART: [state] CFI Enabled
2,902,354 UART: [state] LifecycleState = Unprovisioned
2,903,009 UART: [state] DebugLocked = No
2,903,679 UART: [state] WD Timer not started. Device not locked for debugging
2,905,039 UART: [kat] SHA2-256
3,710,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,714,814 UART: [kat] ++
3,714,966 UART: [kat] sha1
3,719,186 UART: [kat] SHA2-256
3,721,126 UART: [kat] SHA2-384
3,724,003 UART: [kat] SHA2-512-ACC
3,725,903 UART: [kat] ECC-384
3,735,592 UART: [kat] HMAC-384Kdf
3,740,256 UART: [kat] LMS
3,988,584 UART: [kat] --
3,989,664 UART: [update-reset] ++
5,348,118 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,349,187 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,504,402 >>> mbox cmd response: success
5,504,641 UART: [update-reset] Copying MAN_2 To MAN_1
5,512,655 UART: [update-reset Success] --
5,513,624 UART: [state] Locking Datavault
5,514,378 UART: [state] Locking PCR0, PCR1 and PCR31
5,514,982 UART: [state] Locking ICCM
5,515,650 UART: [exit] Launching FMC @ 0x40000130
5,520,980 UART:
5,520,996 UART: Running Caliptra FMC ...
5,521,404 UART:
5,521,547 UART: [state] CFI Enabled
5,610,448 UART: [art] Extend RT PCRs Done
5,610,876 UART: [art] Lock RT PCRs Done
5,612,067 UART: [art] Populate DV Done
5,620,360 UART: [fht] FMC Alias Private Key: 7
5,621,520 UART: [art] Derive CDI
5,621,800 UART: [art] Store in slot 0x4
5,707,391 UART: [art] Derive Key Pair
5,707,751 UART: [art] Store priv key in slot 0x5
5,721,241 UART: [art] Derive Key Pair - Done
5,736,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,751,850 UART: [art] Erasing AUTHORITY.KEYID = 7
5,752,615 UART: [art] PUB.X = 4551593579F857DD24C64AA28CB7C22B3AE7B156DDCA8E461A364C6106A0B518ADD41984DB5BCBF44206DF28B0D41E05
5,759,386 UART: [art] PUB.Y = 47707BDCF837CFB469FE033D78474B785A600A36FD8FD810E1ABD8C22441B14275985D5101D98628DFE7584A589A1706
5,766,322 UART: [art] SIG.R = DC77A9F79553C01001A4DF514B1C2B3157A9E09C972C031CCF982BB091F56101CEA8F1960295F70FED4A74FB56C85EB4
5,773,085 UART: [art] SIG.S = 11E5AF1DC8D5D64D935EF6EBBAAB0971E8FD9E231912AC83F180E841EFD21EA27E60BEE53838B9C3E0F7C5CC11D1D962
5,796,582 UART: Caliptra RT
5,796,925 UART: [state] CFI Enabled
6,159,456 UART: [rt] RT failed reset flow
6,159,887 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,318 ready_for_fw is high
1,061,318 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,848 >>> mbox cmd response: success
2,217,848 <<< Executing mbox cmd 0x90000000 (32 bytes) from SoC
2,280,475 UART:
2,280,491 UART: Running Caliptra FMC ...
2,280,899 UART:
2,281,042 UART: [state] CFI Enabled
2,291,644 UART: [fht] FMC Alias Private Key: 7
2,410,342 UART: [art] Extend RT PCRs Done
2,410,770 UART: [art] Lock RT PCRs Done
2,412,390 UART: [art] Populate DV Done
2,420,381 UART: [fht] FMC Alias Private Key: 7
2,421,439 UART: [art] Derive CDI
2,421,719 UART: [art] Store in slot 0x4
2,507,548 UART: [art] Derive Key Pair
2,507,908 UART: [art] Store priv key in slot 0x5
2,521,104 UART: [art] Derive Key Pair - Done
2,535,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,087 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,852 UART: [art] PUB.X = 84D6E6F156D9C932C45977D7B928CFC7330D3DB0405A72D099A259F772BC69D08CEDDD28A7DDBEB8D9FCBDA8F7AD80EE
2,558,643 UART: [art] PUB.Y = 5D2AC569E160E3D1A3E076700F346A77C9CE178FB71C1206A505C72049918FE8E9A4AAD0F27A985BEA3DDB7CACE76BD2
2,565,600 UART: [art] SIG.R = 09D9B26CC20701FAAB2042251C5F728A755B8EA7F5637D482D70C4F22046D523D165129AD4AFC6B36B880F5D26176A5E
2,572,360 UART: [art] SIG.S = 92BE8592374E06181CA4964E6B06C0EE697435213DB368CFD692404FC62C5D2AED4CA852B96DF37F29D2FC7AA2CDA6FF
2,596,034 UART: mbox::rt_entry...
2,596,406 UART: ____ _ _ _ ____ _____
2,597,190 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,990 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,758 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,526 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,294 UART: |_|
2,600,606 UART:
2,718,372 UART: [rt] Runtime listening for mailbox commands...
2,719,322 >>> mbox cmd response data (0 bytes)
2,719,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,209,335 >>> mbox cmd response: success
5,222,786 UART:
5,222,802 UART: Running Caliptra FMC ...
5,223,210 UART:
5,223,353 UART: [state] CFI Enabled
5,312,328 UART: [art] Extend RT PCRs Done
5,312,756 UART: [art] Lock RT PCRs Done
5,314,089 UART: [art] Populate DV Done
5,322,266 UART: [fht] FMC Alias Private Key: 7
5,323,424 UART: [art] Derive CDI
5,323,704 UART: [art] Store in slot 0x4
5,409,599 UART: [art] Derive Key Pair
5,409,959 UART: [art] Store priv key in slot 0x5
5,423,287 UART: [art] Derive Key Pair - Done
5,437,885 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,118 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,883 UART: [art] PUB.X = 1B0740591CB9348BD1AA48D5FC1621C84C81AB5711DF51D954A35A6ABC47B620ED28A99120103F79BFAE1ECB465FCFF0
5,460,664 UART: [art] PUB.Y = D8988CCDF9C0B61FD0B63A0F916FA22BEAE66F6664B57111C19209904B5FEB5CAB670EFF4B3B86CAA44A592CD559E392
5,467,623 UART: [art] SIG.R = AD1118C89D7FC09FB0C4D0291A3F3081C478C7A7E5FF4EB37138C406AF268759D61D3C7F7A9B746EB4D74A80E1F9C629
5,474,400 UART: [art] SIG.S = B10762A7BA97EB5ED26EC13BA4ED77DA9AC12163011C53DD14288A12B1AEA14ECB263077AF226C516C0498BCB538BA27
5,498,899 UART: Caliptra RT
5,499,242 UART: [state] CFI Enabled
5,871,388 UART: [rt] RT failed reset flow
5,871,819 UART: Fatal Error: 0x000E002F
test test_update_reset::test_context_has_tag_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,142 UART:
192,496 UART: Running Caliptra ROM ...
193,697 UART:
193,850 UART: [state] CFI Enabled
263,869 UART: [state] LifecycleState = Unprovisioned
265,865 UART: [state] DebugLocked = No
267,617 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,554 UART: [kat] SHA2-256
442,250 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,780 UART: [kat] ++
453,265 UART: [kat] sha1
464,442 UART: [kat] SHA2-256
467,138 UART: [kat] SHA2-384
473,351 UART: [kat] SHA2-512-ACC
475,731 UART: [kat] ECC-384
2,767,236 UART: [kat] HMAC-384Kdf
2,798,812 UART: [kat] LMS
3,989,109 UART: [kat] --
3,993,623 UART: [cold-reset] ++
3,996,202 UART: [fht] Storing FHT @ 0x50003400
4,007,051 UART: [idev] ++
4,007,688 UART: [idev] CDI.KEYID = 6
4,008,586 UART: [idev] SUBJECT.KEYID = 7
4,009,842 UART: [idev] UDS.KEYID = 0
4,010,833 ready_for_fw is high
4,011,023 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,115,313 UART: [idev] Erasing UDS.KEYID = 0
7,344,664 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,688 UART: [idev] --
7,369,403 UART: [ldev] ++
7,369,968 UART: [ldev] CDI.KEYID = 6
7,370,947 UART: [ldev] SUBJECT.KEYID = 5
7,372,109 UART: [ldev] AUTHORITY.KEYID = 7
7,373,395 UART: [ldev] FE.KEYID = 1
7,401,749 UART: [ldev] Erasing FE.KEYID = 1
10,736,110 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,660 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,074 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,744 UART: [ldev] --
13,115,127 UART: [fwproc] Waiting for Commands...
13,117,988 UART: [fwproc] Received command 0x46574c44
13,120,170 UART: [fwproc] Received Image of size 82832 bytes
16,791,093 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,869,544 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,942,689 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,145,488 >>> mbox cmd response: success
17,146,557 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,149,328 UART: [afmc] ++
17,149,906 UART: [afmc] CDI.KEYID = 6
17,150,817 UART: [afmc] SUBJECT.KEYID = 7
17,152,086 UART: [afmc] AUTHORITY.KEYID = 5
20,517,385 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,816,370 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,818,625 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,833,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,847,817 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,862,236 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,882,998 UART: [afmc] --
22,887,286 UART: [cold-reset] --
22,891,682 UART: [state] Locking Datavault
22,899,028 UART: [state] Locking PCR0, PCR1 and PCR31
22,900,782 UART: [state] Locking ICCM
22,902,040 UART: [exit] Launching FMC @ 0x40000130
22,910,432 UART:
22,910,675 UART: Running Caliptra FMC ...
22,911,697 UART:
22,911,842 UART: [state] CFI Enabled
22,974,243 UART: [fht] FMC Alias Private Key: 7
25,314,190 UART: [art] Extend RT PCRs Done
25,315,412 UART: [art] Lock RT PCRs Done
25,316,535 UART: [art] Populate DV Done
25,322,113 UART: [fht] FMC Alias Private Key: 7
25,323,707 UART: [art] Derive CDI
25,324,446 UART: [art] Store in slot 0x4
25,383,026 UART: [art] Derive Key Pair
25,384,069 UART: [art] Store priv key in slot 0x5
28,676,159 UART: [art] Derive Key Pair - Done
28,688,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,977,616 UART: [art] Erasing AUTHORITY.KEYID = 7
30,979,125 UART: [art] PUB.X = EB258FE1267F26D0875C293EC1CBCEFB09BFCCB7DA5595E889096F6F0D9248976C046CB125983CC1F87EAD39815D495A
30,986,373 UART: [art] PUB.Y = 6D9D89E4011EC72D6B5B72E532ACB1BD4BE0BA8F186336FD8547616B34E1036FA68A9FED43AA83EEC246603429573DEE
30,993,657 UART: [art] SIG.R = AC8BABA3160F375F4DBAF60FBE678853108075B62B2CA44DCAB57210D79AD323AE0D92DEB5B0E448190619DA665EF03E
31,001,040 UART: [art] SIG.S = E98B0BABB909FFA32CE531EEA20DE2853080A026301D2F09304A55F96F2E70195995A36B2560DCDC201721C05A39D589
32,305,344 UART: mbox::rt_entry...
32,306,288 UART: ____ _ _ _ ____ _____
32,308,217 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,310,222 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,312,076 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,314,011 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,315,870 UART: |_|
32,316,760 UART:
32,448,821 UART: [rt] Runtime listening for mailbox commands...
32,451,216 >>> mbox cmd response data (0 bytes)
34,527,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,677,146 UART:
34,677,508 UART: Running Caliptra ROM ...
34,678,569 UART:
34,678,720 UART: [state] CFI Enabled
34,751,071 UART: [state] LifecycleState = Unprovisioned
34,753,022 UART: [state] DebugLocked = No
34,755,086 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,759,903 UART: [kat] SHA2-256
34,929,595 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,940,087 UART: [kat] ++
34,940,642 UART: [kat] sha1
34,950,937 UART: [kat] SHA2-256
34,953,607 UART: [kat] SHA2-384
34,959,544 UART: [kat] SHA2-512-ACC
34,961,895 UART: [kat] ECC-384
37,254,834 UART: [kat] HMAC-384Kdf
37,268,418 UART: [kat] LMS
38,458,783 UART: [kat] --
38,464,388 UART: [update-reset] ++
42,653,390 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,656,525 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,054,258 >>> mbox cmd response: success
43,058,892 UART: [update-reset] Copying MAN_2 To MAN_1
43,077,950 UART: [update-reset Success] --
43,083,775 UART: [state] Locking Datavault
43,087,639 UART: [state] Locking PCR0, PCR1 and PCR31
43,089,495 UART: [state] Locking ICCM
43,091,896 UART: [exit] Launching FMC @ 0x40000130
43,100,303 UART:
43,100,543 UART: Running Caliptra FMC ...
43,102,055 UART:
43,102,228 UART: [state] CFI Enabled
43,188,154 UART: [art] Extend RT PCRs Done
43,189,339 UART: [art] Lock RT PCRs Done
43,190,629 UART: [art] Populate DV Done
43,196,142 UART: [fht] FMC Alias Private Key: 7
43,197,731 UART: [art] Derive CDI
43,198,542 UART: [art] Store in slot 0x4
43,257,310 UART: [art] Derive Key Pair
43,258,312 UART: [art] Store priv key in slot 0x5
46,550,877 UART: [art] Derive Key Pair - Done
46,564,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,851,965 UART: [art] Erasing AUTHORITY.KEYID = 7
48,853,490 UART: [art] PUB.X = B12B995F2166AB1B528E7FBF2A45F3A79B0C454205CCB297EFCDFD46082C05DCA4E5680724A021609F29D16231544FAD
48,860,789 UART: [art] PUB.Y = 184780B81D09A1BBF6837DD51D0C721056F9CE940384D7CC232202E19B4146EF22AF7BE67DB16B0D271AE561043D5EC6
48,868,051 UART: [art] SIG.R = 600F5CF7E4E0CB04F03DF4A95FE538A5388855FEEC16ADC179F3F771499A09BB71E0305747DA09C622CDE16D054BB16A
48,875,406 UART: [art] SIG.S = A4733B7C54E5D7DA62A0139A2BAE8CB4215B926E7F4938F401722E9A06E3BCD4E38F5AB24A6376A9375034B56798102F
50,180,283 UART: Caliptra RT
50,181,751 UART: [state] CFI Enabled
50,602,582 UART: [rt] RT failed reset flow
50,604,431 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,782,261 ready_for_fw is high
3,782,789 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,221,099 >>> mbox cmd response: success
17,222,327 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
22,904,523 UART:
22,904,910 UART: Running Caliptra FMC ...
22,906,031 UART:
22,906,191 UART: [state] CFI Enabled
22,972,325 UART: [fht] FMC Alias Private Key: 7
25,312,669 UART: [art] Extend RT PCRs Done
25,313,911 UART: [art] Lock RT PCRs Done
25,315,561 UART: [art] Populate DV Done
25,321,136 UART: [fht] FMC Alias Private Key: 7
25,322,675 UART: [art] Derive CDI
25,323,405 UART: [art] Store in slot 0x4
25,379,942 UART: [art] Derive Key Pair
25,380,989 UART: [art] Store priv key in slot 0x5
28,673,431 UART: [art] Derive Key Pair - Done
28,686,377 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,974,694 UART: [art] Erasing AUTHORITY.KEYID = 7
30,976,209 UART: [art] PUB.X = D2F9FB2018CD50A2DA03CCDBEB4FD4AB0AB8CCE27A8580938CFEE6E68C02668D4A6CA982823AEB3F5B0858078BCF2557
30,983,511 UART: [art] PUB.Y = 80E903C32C700BE6EF7DE5D354FE6BD578D0B6C8654C70AD4AF3DC23665F12C868BE00DA2A585A5171802B8D8B4468BA
30,990,807 UART: [art] SIG.R = 106E28684E4ED7119E88BE5AD0D1D4B37C3662F307A4E1D2EF58B6F4EE540C18BDF990F2A79CA67D19894DED5C0B6B33
30,998,202 UART: [art] SIG.S = 496FD7698C7CE1CC67B62931CF5869A2FE27EED16462358FCCD52CA4C81A8C3C24AD3D27A066B1CDEAE20E1A7921CA84
32,303,126 UART: mbox::rt_entry...
32,304,087 UART: ____ _ _ _ ____ _____
32,306,045 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,308,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,309,999 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,312,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,314,129 UART: |_|
32,314,967 UART:
32,447,416 UART: [rt] Runtime listening for mailbox commands...
32,449,752 >>> mbox cmd response data (0 bytes)
34,525,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,365,064 >>> mbox cmd response: success
43,399,323 UART:
43,399,627 UART: Running Caliptra FMC ...
43,400,769 UART:
43,400,937 UART: [state] CFI Enabled
43,496,499 UART: [art] Extend RT PCRs Done
43,497,688 UART: [art] Lock RT PCRs Done
43,499,205 UART: [art] Populate DV Done
43,504,771 UART: [fht] FMC Alias Private Key: 7
43,506,525 UART: [art] Derive CDI
43,507,340 UART: [art] Store in slot 0x4
43,566,497 UART: [art] Derive Key Pair
43,567,538 UART: [art] Store priv key in slot 0x5
46,860,087 UART: [art] Derive Key Pair - Done
46,873,085 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,161,260 UART: [art] Erasing AUTHORITY.KEYID = 7
49,162,769 UART: [art] PUB.X = 2CB4F96FF1B4C0A6C49ED807C3E7571E65D38FFCFAB18B6C0DCD74E79DF8B6DD4600173E511F0970BD61B91C726FBA6B
49,170,018 UART: [art] PUB.Y = 24A040D7CC2A5F7AAA5FED8D5A482A77F47B95E93B836A6930CC04EE1C625A83518ED273690B47899EE8E7575A225809
49,177,257 UART: [art] SIG.R = 14592E158CA6A056C9107488F48D080F591FF955C5B825D2767983B168CE9D3DE4875AFA7153CEAA718AE71636845201
49,184,669 UART: [art] SIG.S = A92CC6F4F1B3710B793BE2A39CE1CCA9728723B6825C60E715744D76C1FD593279AB76DB6B9CA60DB7841FEA0FF3EDA3
50,490,203 UART: Caliptra RT
50,490,918 UART: [state] CFI Enabled
50,904,352 UART: [rt] RT failed reset flow
50,905,544 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,297 writing to cptra_bootfsm_go
193,471 UART:
193,823 UART: Running Caliptra ROM ...
195,001 UART:
604,543 UART: [state] CFI Enabled
614,528 UART: [state] LifecycleState = Unprovisioned
616,467 UART: [state] DebugLocked = No
618,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,320 UART: [kat] SHA2-256
793,075 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,602 UART: [kat] ++
804,051 UART: [kat] sha1
813,933 UART: [kat] SHA2-256
816,593 UART: [kat] SHA2-384
821,298 UART: [kat] SHA2-512-ACC
823,658 UART: [kat] ECC-384
3,109,132 UART: [kat] HMAC-384Kdf
3,121,357 UART: [kat] LMS
4,311,526 UART: [kat] --
4,315,239 UART: [cold-reset] ++
4,316,667 UART: [fht] Storing FHT @ 0x50003400
4,329,222 UART: [idev] ++
4,329,823 UART: [idev] CDI.KEYID = 6
4,330,708 UART: [idev] SUBJECT.KEYID = 7
4,332,019 UART: [idev] UDS.KEYID = 0
4,333,002 ready_for_fw is high
4,333,199 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,437,262 UART: [idev] Erasing UDS.KEYID = 0
7,619,992 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,796 UART: [idev] --
7,646,114 UART: [ldev] ++
7,646,679 UART: [ldev] CDI.KEYID = 6
7,647,613 UART: [ldev] SUBJECT.KEYID = 5
7,648,869 UART: [ldev] AUTHORITY.KEYID = 7
7,650,143 UART: [ldev] FE.KEYID = 1
7,663,567 UART: [ldev] Erasing FE.KEYID = 1
10,951,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,513 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,334 UART: [ldev] --
13,310,946 UART: [fwproc] Waiting for Commands...
13,312,925 UART: [fwproc] Received command 0x46574c44
13,315,098 UART: [fwproc] Received Image of size 82832 bytes
16,977,179 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,052,962 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,126,091 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,330,489 >>> mbox cmd response: success
17,331,616 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,335,308 UART: [afmc] ++
17,335,940 UART: [afmc] CDI.KEYID = 6
17,336,845 UART: [afmc] SUBJECT.KEYID = 7
17,338,105 UART: [afmc] AUTHORITY.KEYID = 5
20,655,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,949,105 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,951,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,965,830 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,980,515 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,994,911 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,017,218 UART: [afmc] --
23,020,781 UART: [cold-reset] --
23,025,021 UART: [state] Locking Datavault
23,027,516 UART: [state] Locking PCR0, PCR1 and PCR31
23,029,266 UART: [state] Locking ICCM
23,031,734 UART: [exit] Launching FMC @ 0x40000130
23,040,122 UART:
23,040,360 UART: Running Caliptra FMC ...
23,041,406 UART:
23,041,557 UART: [state] CFI Enabled
23,049,920 UART: [fht] FMC Alias Private Key: 7
25,390,059 UART: [art] Extend RT PCRs Done
25,391,295 UART: [art] Lock RT PCRs Done
25,392,786 UART: [art] Populate DV Done
25,398,035 UART: [fht] FMC Alias Private Key: 7
25,399,677 UART: [art] Derive CDI
25,400,484 UART: [art] Store in slot 0x4
25,443,040 UART: [art] Derive Key Pair
25,444,087 UART: [art] Store priv key in slot 0x5
28,686,147 UART: [art] Derive Key Pair - Done
28,699,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,979,599 UART: [art] Erasing AUTHORITY.KEYID = 7
30,981,125 UART: [art] PUB.X = E567C9E96638E5CBC5CF1B3F98BCEF76FFAD1160F4CCC4F7DDE1347B84FEEFFD4A0EC2D39E70BAD252F6F0A1E3108C4C
30,988,430 UART: [art] PUB.Y = EE77C8FE76F73B6C7B2A97BEC0BA7EE5F42A5847B8D3AC45C3BD6158434A6204788ACDDFE8E13FBADC1D6F58AD443AB7
30,995,703 UART: [art] SIG.R = F4ABC936030F7B8E91695F4423AE57A7F12296FE021D6D2AEDE67E2B8F37DECD24F5222421205D0078D936BB7E45A269
31,003,082 UART: [art] SIG.S = F54EA688B1BAC544B32C4F2C95E070C5162775F4181028661879AD7C634D36528833FE5254422F875C9AB886A5B5C950
32,308,505 UART: mbox::rt_entry...
32,309,464 UART: ____ _ _ _ ____ _____
32,311,385 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,313,385 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,315,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,317,192 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,319,037 UART: |_|
32,319,938 UART:
32,450,792 UART: [rt] Runtime listening for mailbox commands...
32,453,134 >>> mbox cmd response data (0 bytes)
34,527,646 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,677,536 UART:
34,677,898 UART: Running Caliptra ROM ...
34,678,943 UART:
34,679,145 UART: [state] CFI Enabled
34,693,207 UART: [state] LifecycleState = Unprovisioned
34,695,101 UART: [state] DebugLocked = No
34,696,802 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,701,119 UART: [kat] SHA2-256
34,870,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,881,409 UART: [kat] ++
34,882,156 UART: [kat] sha1
34,892,057 UART: [kat] SHA2-256
34,894,779 UART: [kat] SHA2-384
34,899,203 UART: [kat] SHA2-512-ACC
34,901,599 UART: [kat] ECC-384
37,188,312 UART: [kat] HMAC-384Kdf
37,199,680 UART: [kat] LMS
38,389,779 UART: [kat] --
38,394,277 UART: [update-reset] ++
42,593,202 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,597,258 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
42,995,022 >>> mbox cmd response: success
42,999,568 UART: [update-reset] Copying MAN_2 To MAN_1
43,018,414 UART: [update-reset Success] --
43,023,738 UART: [state] Locking Datavault
43,027,154 UART: [state] Locking PCR0, PCR1 and PCR31
43,028,958 UART: [state] Locking ICCM
43,031,465 UART: [exit] Launching FMC @ 0x40000130
43,039,916 UART:
43,040,152 UART: Running Caliptra FMC ...
43,041,177 UART:
43,041,322 UART: [state] CFI Enabled
43,084,977 UART: [art] Extend RT PCRs Done
43,086,141 UART: [art] Lock RT PCRs Done
43,087,666 UART: [art] Populate DV Done
43,093,127 UART: [fht] FMC Alias Private Key: 7
43,094,821 UART: [art] Derive CDI
43,095,629 UART: [art] Store in slot 0x4
43,138,052 UART: [art] Derive Key Pair
43,139,101 UART: [art] Store priv key in slot 0x5
46,380,584 UART: [art] Derive Key Pair - Done
46,393,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,673,969 UART: [art] Erasing AUTHORITY.KEYID = 7
48,675,477 UART: [art] PUB.X = 4CF5F4F4C782454D2155A21D0F735FE05949E2719A8C29AF511E09C4B4D9275749F7F35CA06704882927E322219F7D4C
48,682,675 UART: [art] PUB.Y = 6C09FAE2A3471F8877631B015DA5859BACB707B68FAC0409B0DD7EC8E80BB553673962B603D3D9BE2BDF277E0DF23E33
48,689,949 UART: [art] SIG.R = 2AB0387F03E889BCDA3D0CC62017A57980BE4344B7E4E6F23C2A810DA7C2F28D6966CFA626067F57646F6C61F25391F9
48,697,329 UART: [art] SIG.S = A2D295A6168F183CD0905642466F7E3EFDFD108252E9D42C5FD04ABAC0B867340AEE2D8B82765D7561E6A1F6FCDB1393
50,002,284 UART: Caliptra RT
50,002,998 UART: [state] CFI Enabled
50,376,754 UART: [rt] RT failed reset flow
50,377,968 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
4,124,939 ready_for_fw is high
4,125,507 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,421,997 >>> mbox cmd response: success
17,423,162 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
23,064,837 UART:
23,065,234 UART: Running Caliptra FMC ...
23,066,376 UART:
23,066,533 UART: [state] CFI Enabled
23,074,136 UART: [fht] FMC Alias Private Key: 7
25,414,274 UART: [art] Extend RT PCRs Done
25,415,514 UART: [art] Lock RT PCRs Done
25,417,234 UART: [art] Populate DV Done
25,422,527 UART: [fht] FMC Alias Private Key: 7
25,424,177 UART: [art] Derive CDI
25,424,934 UART: [art] Store in slot 0x4
25,467,847 UART: [art] Derive Key Pair
25,468,843 UART: [art] Store priv key in slot 0x5
28,710,748 UART: [art] Derive Key Pair - Done
28,723,858 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,004,069 UART: [art] Erasing AUTHORITY.KEYID = 7
31,005,584 UART: [art] PUB.X = 5C9508B2EB734B97218CAE2FD5DAE127AA353AC8BCDAA222945407F268BF253E01DF2B0EFD763331EAEBB781B834EC51
31,012,834 UART: [art] PUB.Y = E57DF38BACA6869322F0B653351A620C3E72DFE9678B2BC58666758745FF4AA49CB07843A9EA99604A9450113DE99A26
31,020,100 UART: [art] SIG.R = 6A8952685A2D1CCD04EEB66CF6918227F8C49E4B2D0A85C6BD68959ED6FBF941BFB061788C9E81F2C4D88902878B0975
31,027,517 UART: [art] SIG.S = 49A8208ACDCE7F20AB95DD5F017799220C9ECF4FCC492DA4906CBE832D19945FFC6CD02678838B9A7F5E240D5E5B783A
32,332,316 UART: mbox::rt_entry...
32,333,280 UART: ____ _ _ _ ____ _____
32,335,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,337,271 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,339,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,341,020 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,342,972 UART: |_|
32,343,822 UART:
32,475,656 UART: [rt] Runtime listening for mailbox commands...
32,477,953 >>> mbox cmd response data (0 bytes)
34,550,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,299,032 >>> mbox cmd response: success
43,335,581 UART:
43,336,029 UART: Running Caliptra FMC ...
43,337,498 UART:
43,337,683 UART: [state] CFI Enabled
43,381,622 UART: [art] Extend RT PCRs Done
43,382,820 UART: [art] Lock RT PCRs Done
43,384,247 UART: [art] Populate DV Done
43,389,926 UART: [fht] FMC Alias Private Key: 7
43,391,624 UART: [art] Derive CDI
43,392,435 UART: [art] Store in slot 0x4
43,435,048 UART: [art] Derive Key Pair
43,436,203 UART: [art] Store priv key in slot 0x5
46,678,061 UART: [art] Derive Key Pair - Done
46,691,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,971,791 UART: [art] Erasing AUTHORITY.KEYID = 7
48,973,819 UART: [art] PUB.X = DF6B939B5C4DDAE5DB364A7741E7BDFA6DFA55568A2B63F2A92E7AFCCE4F333C8CB6C55691F1700D45FB3D1B9FDD0146
48,980,594 UART: [art] PUB.Y = 4728A18BC67A502B964544E52A83A6EFE941793898F1D2115D1C7EF97836FBE30B825074F2DCAD607F3E52689C943677
48,987,833 UART: [art] SIG.R = 7AD48098294624E1B501E7B5062A8267E295004941AB9D43E149D4A1654523D8DBD81AE10F62C1039F97DA3D1B8CE81D
48,995,168 UART: [art] SIG.S = 6A8CA5C45CD70FC0DB028653C9CB8C57513BFF3929042970896EDADFFB0D8CF066CB94B99F3D21F31A3FEF5437CBD28F
50,300,541 UART: Caliptra RT
50,301,256 UART: [state] CFI Enabled
50,677,611 UART: [rt] RT failed reset flow
50,678,841 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,050 UART:
192,410 UART: Running Caliptra ROM ...
193,503 UART:
193,644 UART: [state] CFI Enabled
263,258 UART: [state] LifecycleState = Unprovisioned
265,229 UART: [state] DebugLocked = No
267,245 UART: [state] WD Timer not started. Device not locked for debugging
271,704 UART: [kat] SHA2-256
451,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,121 UART: [kat] ++
462,642 UART: [kat] sha1
473,314 UART: [kat] SHA2-256
476,013 UART: [kat] SHA2-384
481,513 UART: [kat] SHA2-512-ACC
483,874 UART: [kat] ECC-384
2,946,310 UART: [kat] HMAC-384Kdf
2,969,151 UART: [kat] LMS
3,445,626 UART: [kat] --
3,450,473 UART: [cold-reset] ++
3,452,897 UART: [fht] FHT @ 0x50003400
3,464,368 UART: [idev] ++
3,464,934 UART: [idev] CDI.KEYID = 6
3,465,909 UART: [idev] SUBJECT.KEYID = 7
3,467,149 UART: [idev] UDS.KEYID = 0
3,468,092 ready_for_fw is high
3,468,282 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,572,545 UART: [idev] Erasing UDS.KEYID = 0
5,986,351 UART: [idev] Sha1 KeyId Algorithm
6,011,068 UART: [idev] --
6,016,066 UART: [ldev] ++
6,016,701 UART: [ldev] CDI.KEYID = 6
6,017,611 UART: [ldev] SUBJECT.KEYID = 5
6,018,826 UART: [ldev] AUTHORITY.KEYID = 7
6,020,059 UART: [ldev] FE.KEYID = 1
6,056,309 UART: [ldev] Erasing FE.KEYID = 1
8,562,269 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,895 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,767 UART: [ldev] --
10,372,084 UART: [fwproc] Wait for Commands...
10,374,769 UART: [fwproc] Recv command 0x46574c44
10,376,750 UART: [fwproc] Recv'd Img size: 82832 bytes
13,422,293 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,511,448 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,584,470 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,786,940 >>> mbox cmd response: success
13,787,998 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
13,791,914 UART: [afmc] ++
13,792,489 UART: [afmc] CDI.KEYID = 6
13,793,449 UART: [afmc] SUBJECT.KEYID = 7
13,794,655 UART: [afmc] AUTHORITY.KEYID = 5
16,338,657 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,063,838 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,066,020 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,081,850 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,097,905 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,113,447 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,137,402 UART: [afmc] --
18,141,968 UART: [cold-reset] --
18,145,229 UART: [state] Locking Datavault
18,150,531 UART: [state] Locking PCR0, PCR1 and PCR31
18,152,318 UART: [state] Locking ICCM
18,154,687 UART: [exit] Launching FMC @ 0x40000130
18,163,080 UART:
18,163,315 UART: Running Caliptra FMC ...
18,164,413 UART:
18,164,574 UART: [state] CFI Enabled
18,220,314 UART: [fht] FMC Alias Private Key: 7
19,986,894 UART: [art] Extend RT PCRs Done
19,988,113 UART: [art] Lock RT PCRs Done
19,989,505 UART: [art] Populate DV Done
19,994,880 UART: [fht] FMC Alias Private Key: 7
19,996,368 UART: [art] Derive CDI
19,997,127 UART: [art] Store in slot 0x4
20,053,540 UART: [art] Derive Key Pair
20,054,544 UART: [art] Store priv key in slot 0x5
22,518,014 UART: [art] Derive Key Pair - Done
22,531,031 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,243,805 UART: [art] Erasing AUTHORITY.KEYID = 7
24,245,311 UART: [art] PUB.X = 0FE66F384BB9820868A8D211A9B47C9CC9BC6D0705A8CE258328F51BFC7DC1C5579916C16F3D72485B0E2F0CFC8CF597
24,252,617 UART: [art] PUB.Y = 45D3E18FF81CDF51C02331798ECB1C60DD52527D9DFA6DFA746CF8815FD2A3983B920B69A02CDC2EF921E9C0DC6526A6
24,259,851 UART: [art] SIG.R = AE06EA1082C3B06CF3035CFF36F1133B545F519E4AE8F7B2002146FE2D978040C84D97CC94D6645E7CF607B1DBCDD65A
24,267,237 UART: [art] SIG.S = 3FC4C086933ED79747E2FC0272BC9E7D186E2FFD83EED9E81ED280AA002385F7FFD7F477595DF472DCD3BC51174DFF48
25,245,923 UART: mbox::rt_entry...
25,246,891 UART: ____ _ _ _ ____ _____
25,248,874 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,250,893 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,252,821 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,254,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,256,666 UART: |_|
25,257,473 UART:
25,387,513 UART: [rt] Runtime listening for mailbox commands...
25,389,842 >>> mbox cmd response data (0 bytes)
27,462,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,612,399 UART:
27,612,800 UART: Running Caliptra ROM ...
27,613,948 UART:
27,614,119 UART: [state] CFI Enabled
27,676,191 UART: [state] LifecycleState = Unprovisioned
27,678,135 UART: [state] DebugLocked = No
27,681,141 UART: [state] WD Timer not started. Device not locked for debugging
27,684,185 UART: [kat] SHA2-256
27,863,849 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,874,637 UART: [kat] ++
27,875,118 UART: [kat] sha1
27,886,544 UART: [kat] SHA2-256
27,889,227 UART: [kat] SHA2-384
27,894,293 UART: [kat] SHA2-512-ACC
27,896,634 UART: [kat] ECC-384
30,362,574 UART: [kat] HMAC-384Kdf
30,383,361 UART: [kat] LMS
30,859,828 UART: [kat] --
30,865,134 UART: [update-reset] ++
34,366,100 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,369,533 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,767,110 >>> mbox cmd response: success
34,771,584 UART: [update-reset] Copying MAN_2 To MAN_1
34,805,333 UART: [update-reset Success] --
34,809,398 UART: [state] Locking Datavault
34,813,272 UART: [state] Locking PCR0, PCR1 and PCR31
34,815,030 UART: [state] Locking ICCM
34,816,913 UART: [exit] Launching FMC @ 0x40000130
34,825,310 UART:
34,825,543 UART: Running Caliptra FMC ...
34,826,660 UART:
34,826,819 UART: [state] CFI Enabled
34,918,572 UART: [art] Extend RT PCRs Done
34,919,778 UART: [art] Lock RT PCRs Done
34,921,558 UART: [art] Populate DV Done
34,927,287 UART: [fht] FMC Alias Private Key: 7
34,928,976 UART: [art] Derive CDI
34,929,782 UART: [art] Store in slot 0x4
34,987,606 UART: [art] Derive Key Pair
34,988,644 UART: [art] Store priv key in slot 0x5
37,451,151 UART: [art] Derive Key Pair - Done
37,464,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,177,541 UART: [art] Erasing AUTHORITY.KEYID = 7
39,179,026 UART: [art] PUB.X = 674AF8167ED1CB4F6C998513C5217B81B2C3674EFE66B7177EC844548CD1A0950D63DB422D71203EF6FF686288F6030F
39,186,279 UART: [art] PUB.Y = EFD3141BF13F7A8289AEFA4A66E242E85CD9055513C9572405F3777A9804AD6578ED0846A6380742D23A60E3DB817E01
39,193,559 UART: [art] SIG.R = 78C1F1722419DA5F40BC6508FBF15EB926225DB01AD34BDB8FC066345668698BB34AF32B558F8B204BCF974EF49B6521
39,200,930 UART: [art] SIG.S = 56293121D5F1826D239A033775B7F3D408281D96E145980FB93E1A16B867A990D7EE15614C75D665ABF0FB2E8D8B729E
40,179,769 UART: Caliptra RT
40,180,492 UART: [state] CFI Enabled
40,604,556 UART: [rt] RT failed reset flow
40,605,752 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
3,460,918 ready_for_fw is high
3,461,313 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,652,236 >>> mbox cmd response: success
13,653,370 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
17,959,018 UART:
17,959,421 UART: Running Caliptra FMC ...
17,960,553 UART:
17,960,713 UART: [state] CFI Enabled
18,028,022 UART: [fht] FMC Alias Private Key: 7
19,795,354 UART: [art] Extend RT PCRs Done
19,796,575 UART: [art] Lock RT PCRs Done
19,798,310 UART: [art] Populate DV Done
19,803,665 UART: [fht] FMC Alias Private Key: 7
19,805,255 UART: [art] Derive CDI
19,806,067 UART: [art] Store in slot 0x4
19,861,420 UART: [art] Derive Key Pair
19,862,460 UART: [art] Store priv key in slot 0x5
22,325,466 UART: [art] Derive Key Pair - Done
22,338,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,051,099 UART: [art] Erasing AUTHORITY.KEYID = 7
24,052,619 UART: [art] PUB.X = D7EB747C1778B2DEB28DD77FEFBC2A2B1DDEDB4C7DE45383BEC742B2EF6A5EA824AD402672D3AF09F1BE1FA21F6530C9
24,059,953 UART: [art] PUB.Y = 9572D9A096AC61DB9E5CBB9C947E11D3DB03B32F3230C251F588A78F4AEACD2C08C3D2426AEBCF65C99358EA6B3D3F2B
24,067,191 UART: [art] SIG.R = 9594FE775722ED6106E7B6113F2559EBDD37D58B08E16D48E15E9E2D4AF18A915AE44BD2E54B1E2147092C1DDEC2B309
24,074,639 UART: [art] SIG.S = E6E0B7AE59FB95A0DD77A6AAE68C33D2E40CDA2D315C0CF6BBB75622ED558A3BF65186353423D5A98BFEDE3CD9EBC87E
25,053,291 UART: mbox::rt_entry...
25,054,285 UART: ____ _ _ _ ____ _____
25,056,289 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,058,300 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,060,231 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,062,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,064,153 UART: |_|
25,064,990 UART:
25,195,773 UART: [rt] Runtime listening for mailbox commands...
25,198,060 >>> mbox cmd response data (0 bytes)
27,268,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,577,663 >>> mbox cmd response: success
34,611,645 UART:
34,611,949 UART: Running Caliptra FMC ...
34,612,986 UART:
34,613,135 UART: [state] CFI Enabled
34,702,394 UART: [art] Extend RT PCRs Done
34,703,580 UART: [art] Lock RT PCRs Done
34,705,113 UART: [art] Populate DV Done
34,710,354 UART: [fht] FMC Alias Private Key: 7
34,711,995 UART: [art] Derive CDI
34,712,931 UART: [art] Store in slot 0x4
34,771,503 UART: [art] Derive Key Pair
34,772,523 UART: [art] Store priv key in slot 0x5
37,235,216 UART: [art] Derive Key Pair - Done
37,247,846 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,961,189 UART: [art] Erasing AUTHORITY.KEYID = 7
38,962,704 UART: [art] PUB.X = 02DC9D107D27E1F6B99780099250C22D63406A9EAD31C4D43F81A7B3913157B03D80E62694D2B163CB99490A1EB5AC20
38,969,924 UART: [art] PUB.Y = 080D7570903293188B6D564FCF9E2492A502D14FAD6AEBBEB58FAABA431CB5CA3164BA004357BD7C25EB539ED266E5EE
38,977,188 UART: [art] SIG.R = 812825EA89BC186332C204BF69A7E5DA61E50B4DFD5ED77840C2C69C24B20354D090DCD93D3A968CEFC4ABF4F41B25FB
38,984,598 UART: [art] SIG.S = 7511BD0C64A914FC4C26062135686323BEED7E07F630B92CDD823843A3213CFDCF757CD99AEBE6246686242E05B74321
39,963,299 UART: Caliptra RT
39,964,012 UART: [state] CFI Enabled
40,382,321 UART: [rt] RT failed reset flow
40,383,511 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
192,393 UART:
192,765 UART: Running Caliptra ROM ...
193,879 UART:
603,425 UART: [state] CFI Enabled
616,392 UART: [state] LifecycleState = Unprovisioned
618,340 UART: [state] DebugLocked = No
620,661 UART: [state] WD Timer not started. Device not locked for debugging
625,051 UART: [kat] SHA2-256
804,741 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,555 UART: [kat] ++
816,014 UART: [kat] sha1
826,465 UART: [kat] SHA2-256
829,190 UART: [kat] SHA2-384
834,397 UART: [kat] SHA2-512-ACC
836,763 UART: [kat] ECC-384
3,278,661 UART: [kat] HMAC-384Kdf
3,291,255 UART: [kat] LMS
3,767,765 UART: [kat] --
3,772,263 UART: [cold-reset] ++
3,773,870 UART: [fht] FHT @ 0x50003400
3,785,070 UART: [idev] ++
3,785,644 UART: [idev] CDI.KEYID = 6
3,786,701 UART: [idev] SUBJECT.KEYID = 7
3,787,878 UART: [idev] UDS.KEYID = 0
3,788,807 ready_for_fw is high
3,789,001 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,893,136 UART: [idev] Erasing UDS.KEYID = 0
6,265,114 UART: [idev] Sha1 KeyId Algorithm
6,289,688 UART: [idev] --
6,294,168 UART: [ldev] ++
6,294,745 UART: [ldev] CDI.KEYID = 6
6,295,662 UART: [ldev] SUBJECT.KEYID = 5
6,296,873 UART: [ldev] AUTHORITY.KEYID = 7
6,298,106 UART: [ldev] FE.KEYID = 1
6,309,346 UART: [ldev] Erasing FE.KEYID = 1
8,791,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,608 UART: [ldev] --
10,587,501 UART: [fwproc] Wait for Commands...
10,589,213 UART: [fwproc] Recv command 0x46574c44
10,591,204 UART: [fwproc] Recv'd Img size: 82832 bytes
13,634,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,719,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,792,144 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,996,245 >>> mbox cmd response: success
13,997,233 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,000,981 UART: [afmc] ++
14,001,574 UART: [afmc] CDI.KEYID = 6
14,002,469 UART: [afmc] SUBJECT.KEYID = 7
14,003,686 UART: [afmc] AUTHORITY.KEYID = 5
16,509,038 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,233,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,235,744 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,251,598 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,267,638 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,283,223 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,307,488 UART: [afmc] --
18,311,843 UART: [cold-reset] --
18,315,866 UART: [state] Locking Datavault
18,321,710 UART: [state] Locking PCR0, PCR1 and PCR31
18,323,462 UART: [state] Locking ICCM
18,325,396 UART: [exit] Launching FMC @ 0x40000130
18,333,804 UART:
18,334,081 UART: Running Caliptra FMC ...
18,335,199 UART:
18,335,360 UART: [state] CFI Enabled
18,343,736 UART: [fht] FMC Alias Private Key: 7
20,110,262 UART: [art] Extend RT PCRs Done
20,111,568 UART: [art] Lock RT PCRs Done
20,113,278 UART: [art] Populate DV Done
20,118,694 UART: [fht] FMC Alias Private Key: 7
20,120,451 UART: [art] Derive CDI
20,121,272 UART: [art] Store in slot 0x4
20,163,897 UART: [art] Derive Key Pair
20,164,897 UART: [art] Store priv key in slot 0x5
22,592,045 UART: [art] Derive Key Pair - Done
22,604,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,311,970 UART: [art] Erasing AUTHORITY.KEYID = 7
24,313,466 UART: [art] PUB.X = 100C1C8B9298CB3F6CC7C0748097DCBED728959650C920D067683A50E18A6DB45D64839F31D883C797241AE0AA327326
24,320,712 UART: [art] PUB.Y = 4D1F9C78335AC575EBF93183AC2FA75246FCF465078E24EEA391A0F4FA599802867006E816E36E65B03713898D718CDC
24,327,950 UART: [art] SIG.R = A8753B8DF1C712920A394BCE427C947D81B60CBF2C57A00340CA086CF03D4B9EC854EB7C777527F204979BC86D699659
24,335,390 UART: [art] SIG.S = 2A92473B7AABAC23CACA9B0B8991D9415CCC2FC2F889B19D5FFE04D6922CE23CDB99CAB6432D35B746F63863E3E537F4
25,313,947 UART: mbox::rt_entry...
25,314,924 UART: ____ _ _ _ ____ _____
25,316,857 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,318,868 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,320,724 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,322,654 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,324,589 UART: |_|
25,325,582 UART:
25,457,373 UART: [rt] Runtime listening for mailbox commands...
25,459,709 >>> mbox cmd response data (0 bytes)
27,520,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,670,562 UART:
27,670,933 UART: Running Caliptra ROM ...
27,671,993 UART:
27,672,197 UART: [state] CFI Enabled
27,685,828 UART: [state] LifecycleState = Unprovisioned
27,687,787 UART: [state] DebugLocked = No
27,689,035 UART: [state] WD Timer not started. Device not locked for debugging
27,693,440 UART: [kat] SHA2-256
27,873,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,883,951 UART: [kat] ++
27,884,409 UART: [kat] sha1
27,896,267 UART: [kat] SHA2-256
27,898,966 UART: [kat] SHA2-384
27,903,768 UART: [kat] SHA2-512-ACC
27,906,119 UART: [kat] ECC-384
30,346,592 UART: [kat] HMAC-384Kdf
30,359,024 UART: [kat] LMS
30,835,513 UART: [kat] --
30,838,855 UART: [update-reset] ++
34,341,742 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,345,345 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,742,964 >>> mbox cmd response: success
34,747,576 UART: [update-reset] Copying MAN_2 To MAN_1
34,780,527 UART: [update-reset Success] --
34,784,843 UART: [state] Locking Datavault
34,788,487 UART: [state] Locking PCR0, PCR1 and PCR31
34,790,246 UART: [state] Locking ICCM
34,792,296 UART: [exit] Launching FMC @ 0x40000130
34,800,662 UART:
34,800,902 UART: Running Caliptra FMC ...
34,802,012 UART:
34,802,187 UART: [state] CFI Enabled
34,846,148 UART: [art] Extend RT PCRs Done
34,847,352 UART: [art] Lock RT PCRs Done
34,848,714 UART: [art] Populate DV Done
34,854,454 UART: [fht] FMC Alias Private Key: 7
34,856,165 UART: [art] Derive CDI
34,856,984 UART: [art] Store in slot 0x4
34,899,630 UART: [art] Derive Key Pair
34,900,683 UART: [art] Store priv key in slot 0x5
37,327,361 UART: [art] Derive Key Pair - Done
37,340,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,046,754 UART: [art] Erasing AUTHORITY.KEYID = 7
39,048,277 UART: [art] PUB.X = A4494F9F5AE1AA102390E25D519E36C51B5C438B7624B1B0E59883E9F93B77BC84A0E1349C25C8A1AE3DB8771E31E3A5
39,055,539 UART: [art] PUB.Y = 3ED92E7E8D903D88D694DD657094C4452AD097AD584FCD86E1B0AFB316631A5DA0B2354820C57EE16E0A5C3639DEB41C
39,062,794 UART: [art] SIG.R = 08CE37516610D89B615F72BF052AF9CE13CF8DB29DDF7F38D885F3548BCCF385BFE3EC67B6BF8D8747EB4357880B97C4
39,070,202 UART: [art] SIG.S = A87B0D5E393C6BDC255B4F081CA08CBB03D0C79E7F2EF32714D3CCB3903D9F8BB9996BA7DCBF6ADEAD597FF2EC945D89
40,049,623 UART: Caliptra RT
40,050,353 UART: [state] CFI Enabled
40,420,141 UART: [rt] RT failed reset flow
40,421,347 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,779,300 ready_for_fw is high
3,779,710 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,882,987 >>> mbox cmd response: success
13,884,087 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,137,494 UART:
18,137,877 UART: Running Caliptra FMC ...
18,139,072 UART:
18,139,250 UART: [state] CFI Enabled
18,147,153 UART: [fht] FMC Alias Private Key: 7
19,913,811 UART: [art] Extend RT PCRs Done
19,915,031 UART: [art] Lock RT PCRs Done
19,916,613 UART: [art] Populate DV Done
19,922,245 UART: [fht] FMC Alias Private Key: 7
19,923,686 UART: [art] Derive CDI
19,924,449 UART: [art] Store in slot 0x4
19,966,899 UART: [art] Derive Key Pair
19,967,960 UART: [art] Store priv key in slot 0x5
22,394,323 UART: [art] Derive Key Pair - Done
22,407,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,113,962 UART: [art] Erasing AUTHORITY.KEYID = 7
24,115,468 UART: [art] PUB.X = 18655C58E6CF998BAFD42500B7B6F8403B5BC1B1D433827AC90AEA2BA2CECED03FEA9601D8CDF2AC72CCA8E391404B5D
24,122,780 UART: [art] PUB.Y = E9EFCB400B269E0CB945E5ABF1A2F734B6A3CE6AA9871AE5861C6B6CB6E8FAEF1221EC77A36203ABA7E58795CE0FA8B5
24,130,031 UART: [art] SIG.R = CB7A3437EA2A06C93A880D6E1B8C6CAE00C3E123D114A07BCAB2D01DD80846FA12022BAEE79FCDB2F5A2AB32014ECEE7
24,137,429 UART: [art] SIG.S = AF5AA7AB56309ED2C1F84B926EE717D98A605CF55742F4E86879EEAE81932F23D87ED28735B7478354B6FB5378A778A5
25,115,610 UART: mbox::rt_entry...
25,116,561 UART: ____ _ _ _ ____ _____
25,118,489 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,120,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,122,434 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,124,427 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,126,367 UART: |_|
25,127,223 UART:
25,258,655 UART: [rt] Runtime listening for mailbox commands...
25,260,988 >>> mbox cmd response data (0 bytes)
27,335,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,570,932 >>> mbox cmd response: success
34,606,984 UART:
34,607,313 UART: Running Caliptra FMC ...
34,608,444 UART:
34,608,616 UART: [state] CFI Enabled
34,652,475 UART: [art] Extend RT PCRs Done
34,653,644 UART: [art] Lock RT PCRs Done
34,655,047 UART: [art] Populate DV Done
34,660,628 UART: [fht] FMC Alias Private Key: 7
34,662,210 UART: [art] Derive CDI
34,663,040 UART: [art] Store in slot 0x4
34,705,917 UART: [art] Derive Key Pair
34,706,924 UART: [art] Store priv key in slot 0x5
37,133,526 UART: [art] Derive Key Pair - Done
37,146,737 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,853,233 UART: [art] Erasing AUTHORITY.KEYID = 7
38,854,739 UART: [art] PUB.X = AF6B8FF7622A9175598EDC4891E99B42269F27F736DD0571B5A0AA2D77ABB5D4868A89B7F2F204B840F6981E303AF294
38,862,000 UART: [art] PUB.Y = D872056BBB9E86769E0781C8D82AB3C034A6C3D45FE06C02E076251C7B23B3ECC71365E7808CDCF4CC0BEA1E601B813E
38,869,244 UART: [art] SIG.R = E35F699EE9448DC2F9ACD4BF1EAD865EF0A92828120BA959F94AE69594871ED26C842AE8C140E8CEDE90D221C6625971
38,876,636 UART: [art] SIG.S = 2D07E0C059F09EB63FD0F7C9B2AE4AAF29B96B85407AA62A121624C992CFBB5A4EF07E1F6F46FF90DCB10B9284464EE5
39,855,451 UART: Caliptra RT
39,856,157 UART: [state] CFI Enabled
40,226,793 UART: [rt] RT failed reset flow
40,227,990 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,106 UART:
192,483 UART: Running Caliptra ROM ...
193,673 UART:
193,824 UART: [state] CFI Enabled
265,912 UART: [state] LifecycleState = Unprovisioned
268,330 UART: [state] DebugLocked = No
270,929 UART: [state] WD Timer not started. Device not locked for debugging
274,668 UART: [kat] SHA2-256
464,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,133 UART: [kat] ++
475,613 UART: [kat] sha1
487,406 UART: [kat] SHA2-256
490,482 UART: [kat] SHA2-384
497,245 UART: [kat] SHA2-512-ACC
499,820 UART: [kat] ECC-384
2,948,055 UART: [kat] HMAC-384Kdf
2,970,449 UART: [kat] LMS
3,502,195 UART: [kat] --
3,507,322 UART: [cold-reset] ++
3,508,895 UART: [fht] FHT @ 0x50003400
3,521,213 UART: [idev] ++
3,521,914 UART: [idev] CDI.KEYID = 6
3,522,858 UART: [idev] SUBJECT.KEYID = 7
3,524,094 UART: [idev] UDS.KEYID = 0
3,524,993 ready_for_fw is high
3,525,183 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,441 UART: [idev] Erasing UDS.KEYID = 0
6,027,399 UART: [idev] Sha1 KeyId Algorithm
6,050,298 UART: [idev] --
6,054,595 UART: [ldev] ++
6,055,285 UART: [ldev] CDI.KEYID = 6
6,056,218 UART: [ldev] SUBJECT.KEYID = 5
6,057,377 UART: [ldev] AUTHORITY.KEYID = 7
6,058,609 UART: [ldev] FE.KEYID = 1
6,098,750 UART: [ldev] Erasing FE.KEYID = 1
8,607,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,877 UART: [ldev] --
10,411,983 UART: [fwproc] Wait for Commands...
10,414,722 UART: [fwproc] Recv command 0x46574c44
10,417,027 UART: [fwproc] Recv'd Img size: 82832 bytes
13,474,416 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,545,260 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,668,879 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,014,595 >>> mbox cmd response: success
14,015,065 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,018,052 UART: [afmc] ++
14,018,798 UART: [afmc] CDI.KEYID = 6
14,019,907 UART: [afmc] SUBJECT.KEYID = 7
14,021,448 UART: [afmc] AUTHORITY.KEYID = 5
16,552,220 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,295,732 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,297,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,312,729 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,327,904 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,342,802 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,366,918 UART: [afmc] --
18,371,035 UART: [cold-reset] --
18,373,233 UART: [state] Locking Datavault
18,378,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,380,841 UART: [state] Locking ICCM
18,382,393 UART: [exit] Launching FMC @ 0x40000130
18,391,052 UART:
18,391,286 UART: Running Caliptra FMC ...
18,392,382 UART:
18,392,538 UART: [state] CFI Enabled
18,453,213 UART: [fht] FMC Alias Private Key: 7
20,219,723 UART: [art] Extend RT PCRs Done
20,220,944 UART: [art] Lock RT PCRs Done
20,222,723 UART: [art] Populate DV Done
20,228,185 UART: [fht] FMC Alias Private Key: 7
20,229,829 UART: [art] Derive CDI
20,230,640 UART: [art] Store in slot 0x4
20,286,150 UART: [art] Derive Key Pair
20,287,187 UART: [art] Store priv key in slot 0x5
22,750,335 UART: [art] Derive Key Pair - Done
22,763,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,476,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,477,801 UART: [art] PUB.X = 72C380E2D81F1DC43265DD91242CADF81C972BDA1F032260DB11FC6929AF20C5FB1DDDEA708BA594F760D07FAECDBC29
24,485,054 UART: [art] PUB.Y = D425034A8FC69665FD1EE727469B8748BCD2548783A858179EC4CF144BA307DBFEB80CD19FCA47A7A3ED778807E57BCF
24,492,343 UART: [art] SIG.R = 07AA4A139B74E3FC3B915746A4B001AEFE7FAEC6F0AF692C0A3238B165955135284ED6E690A46381E6B540A4CA63C7B5
24,499,736 UART: [art] SIG.S = E6241A1AFCB636F2EC8CF693E746CCC23DD8A429ABC0E1BAE127F281A3317CC79836A2504C38CAF21DC0D19502957AC6
25,478,211 UART: mbox::rt_entry...
25,479,180 UART: ____ _ _ _ ____ _____
25,481,345 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,359 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,295 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,224 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,150 UART: |_|
25,489,984 UART:
25,620,604 UART: [rt] Runtime listening for mailbox commands...
25,622,927 >>> mbox cmd response data (0 bytes)
27,689,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,839,938 UART:
27,840,327 UART: Running Caliptra ROM ...
27,841,415 UART:
27,841,577 UART: [state] CFI Enabled
27,909,639 UART: [state] LifecycleState = Unprovisioned
27,911,690 UART: [state] DebugLocked = No
27,913,296 UART: [state] WD Timer not started. Device not locked for debugging
27,917,174 UART: [kat] SHA2-256
28,107,056 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,117,806 UART: [kat] ++
28,118,348 UART: [kat] sha1
28,128,135 UART: [kat] SHA2-256
28,131,141 UART: [kat] SHA2-384
28,137,411 UART: [kat] SHA2-512-ACC
28,139,980 UART: [kat] ECC-384
30,593,004 UART: [kat] HMAC-384Kdf
30,616,415 UART: [kat] LMS
31,148,033 UART: [kat] --
31,155,100 UART: [update-reset] ++
34,666,086 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,668,657 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,298,320 >>> mbox cmd response: success
35,302,984 UART: [update-reset] Copying MAN_2 To MAN_1
35,336,740 UART: [update-reset Success] --
35,340,293 UART: [state] Locking Datavault
35,343,303 UART: [state] Locking PCR0, PCR1 and PCR31
35,345,509 UART: [state] Locking ICCM
35,347,126 UART: [exit] Launching FMC @ 0x40000130
35,355,756 UART:
35,355,987 UART: Running Caliptra FMC ...
35,357,021 UART:
35,357,171 UART: [state] CFI Enabled
35,450,448 UART: [art] Extend RT PCRs Done
35,451,644 UART: [art] Lock RT PCRs Done
35,453,291 UART: [art] Populate DV Done
35,458,695 UART: [fht] FMC Alias Private Key: 7
35,460,171 UART: [art] Derive CDI
35,460,926 UART: [art] Store in slot 0x4
35,519,776 UART: [art] Derive Key Pair
35,520,825 UART: [art] Store priv key in slot 0x5
37,983,573 UART: [art] Derive Key Pair - Done
37,996,793 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,708,570 UART: [art] Erasing AUTHORITY.KEYID = 7
39,710,080 UART: [art] PUB.X = 969BF0209D6FB6E7FFB30423FAC07A05DB064C09A0F93B95A3B6A9C3A14592F47505E6A7D8A27E5A950CA0EC4831AFB9
39,717,375 UART: [art] PUB.Y = 2A840142D27E7E2C2F7F94C5F414F9051431EE4D5187AEAC2367A63B8A3E1889BC11EED2A5C81CA4078A602F2ED40B17
39,724,612 UART: [art] SIG.R = F007D3DF13A7C976B478663F869A8C6009897A5835D139A4E6E65165C284459A19E2636EFC50D11971AAF3D09893ADA0
39,731,993 UART: [art] SIG.S = E25EE96D3BEC720D2C82D2B78C781085E1680C9C30989FC9A778AA3D7075B96C8707A6D947E709DC6C7F85F946D78E7C
40,711,423 UART: Caliptra RT
40,712,121 UART: [state] CFI Enabled
41,129,695 UART: [rt] RT failed reset flow
41,130,886 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,896 writing to cptra_bootfsm_go
3,440,084 ready_for_fw is high
3,440,506 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,058,427 >>> mbox cmd response: success
14,059,132 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,345,428 UART:
18,345,839 UART: Running Caliptra FMC ...
18,346,972 UART:
18,347,128 UART: [state] CFI Enabled
18,412,589 UART: [fht] FMC Alias Private Key: 7
20,178,355 UART: [art] Extend RT PCRs Done
20,179,586 UART: [art] Lock RT PCRs Done
20,181,429 UART: [art] Populate DV Done
20,187,138 UART: [fht] FMC Alias Private Key: 7
20,188,789 UART: [art] Derive CDI
20,189,604 UART: [art] Store in slot 0x4
20,245,657 UART: [art] Derive Key Pair
20,246,700 UART: [art] Store priv key in slot 0x5
22,709,513 UART: [art] Derive Key Pair - Done
22,722,568 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,435,725 UART: [art] Erasing AUTHORITY.KEYID = 7
24,437,234 UART: [art] PUB.X = 52545450656055E783169719B76CD7A352E085693D5228B0C03B7E0D5C8E88F69F42631D161E8CBFB2E28E9169A6C205
24,444,532 UART: [art] PUB.Y = 9E24B9EE4D8D41F5C549CE0EFD300F8615698E1C5090873AE6312D41A580922EF5DF25DF6A1C51F697001B4026E33815
24,451,719 UART: [art] SIG.R = 66E2C929767C9A71D4661CACE9899370A0E3EB3FDD4DB2EAA492918A2D46E30AEAB296DDCD2634CFDFA28F968A6E04A2
24,459,178 UART: [art] SIG.S = 8EE86E1A5EF9959A959530218A62A211398BA1EDE648DED01280C5474ABD3B6BAE7E6607A3203C932F86F0DA61D09F60
25,437,543 UART: mbox::rt_entry...
25,438,498 UART: ____ _ _ _ ____ _____
25,440,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,442,429 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,444,305 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,446,295 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,448,181 UART: |_|
25,449,007 UART:
25,580,675 UART: [rt] Runtime listening for mailbox commands...
25,582,974 >>> mbox cmd response data (0 bytes)
27,649,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,561,814 >>> mbox cmd response: success
35,596,079 UART:
35,596,429 UART: Running Caliptra FMC ...
35,597,475 UART:
35,597,625 UART: [state] CFI Enabled
35,684,363 UART: [art] Extend RT PCRs Done
35,685,556 UART: [art] Lock RT PCRs Done
35,687,040 UART: [art] Populate DV Done
35,692,450 UART: [fht] FMC Alias Private Key: 7
35,694,039 UART: [art] Derive CDI
35,694,777 UART: [art] Store in slot 0x4
35,754,028 UART: [art] Derive Key Pair
35,755,071 UART: [art] Store priv key in slot 0x5
38,218,350 UART: [art] Derive Key Pair - Done
38,231,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,943,532 UART: [art] Erasing AUTHORITY.KEYID = 7
39,945,032 UART: [art] PUB.X = BB059B2F983AA0E5B82CC038F473D38AD06F9C4EF43FA15B6AE01A013FA839EEA7E795AEF58E6E5335E51E0EB5FF0C6C
39,952,345 UART: [art] PUB.Y = B24CB249E9E5BD451A306FB210703EEA14CCFB43CDE3289DC2C59E869745F8CBAB194F0BA0D2035B2BA51522BC704AE8
39,959,641 UART: [art] SIG.R = A756AB89306CF27DCBF7D75308F415D8A706C29E20879609234A1A6A51596E229A728601B90074D91DE8E807D926710D
39,966,999 UART: [art] SIG.S = CA5D32470E4D7A056533BF8B656BD0A4695D163E28C778556EE70788A7FFC989C1D146AEFD57550DC8AFA5E41ABABDA8
40,946,253 UART: Caliptra RT
40,946,985 UART: [state] CFI Enabled
41,369,409 UART: [rt] RT failed reset flow
41,370,602 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,525 writing to cptra_bootfsm_go
193,832 UART:
194,199 UART: Running Caliptra ROM ...
195,387 UART:
605,067 UART: [state] CFI Enabled
622,207 UART: [state] LifecycleState = Unprovisioned
624,589 UART: [state] DebugLocked = No
626,750 UART: [state] WD Timer not started. Device not locked for debugging
631,362 UART: [kat] SHA2-256
821,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,084 UART: [kat] ++
832,538 UART: [kat] sha1
842,989 UART: [kat] SHA2-256
846,001 UART: [kat] SHA2-384
852,358 UART: [kat] SHA2-512-ACC
854,953 UART: [kat] ECC-384
3,296,957 UART: [kat] HMAC-384Kdf
3,310,288 UART: [kat] LMS
3,842,076 UART: [kat] --
3,847,589 UART: [cold-reset] ++
3,850,094 UART: [fht] FHT @ 0x50003400
3,862,648 UART: [idev] ++
3,863,358 UART: [idev] CDI.KEYID = 6
3,864,272 UART: [idev] SUBJECT.KEYID = 7
3,865,518 UART: [idev] UDS.KEYID = 0
3,866,444 ready_for_fw is high
3,866,655 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,970,703 UART: [idev] Erasing UDS.KEYID = 0
6,345,513 UART: [idev] Sha1 KeyId Algorithm
6,367,295 UART: [idev] --
6,372,539 UART: [ldev] ++
6,373,218 UART: [ldev] CDI.KEYID = 6
6,374,136 UART: [ldev] SUBJECT.KEYID = 5
6,375,318 UART: [ldev] AUTHORITY.KEYID = 7
6,376,501 UART: [ldev] FE.KEYID = 1
6,386,645 UART: [ldev] Erasing FE.KEYID = 1
8,862,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,205 UART: [ldev] --
10,653,085 UART: [fwproc] Wait for Commands...
10,656,050 UART: [fwproc] Recv command 0x46574c44
10,658,314 UART: [fwproc] Recv'd Img size: 82832 bytes
13,709,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,789,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,912,749 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,258,781 >>> mbox cmd response: success
14,259,927 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
14,263,518 UART: [afmc] ++
14,264,218 UART: [afmc] CDI.KEYID = 6
14,265,366 UART: [afmc] SUBJECT.KEYID = 7
14,266,860 UART: [afmc] AUTHORITY.KEYID = 5
16,768,823 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,489,665 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,491,638 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,506,728 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,521,921 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,536,776 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,561,177 UART: [afmc] --
18,565,190 UART: [cold-reset] --
18,568,850 UART: [state] Locking Datavault
18,572,492 UART: [state] Locking PCR0, PCR1 and PCR31
18,574,700 UART: [state] Locking ICCM
18,577,577 UART: [exit] Launching FMC @ 0x40000130
18,586,259 UART:
18,586,494 UART: Running Caliptra FMC ...
18,587,599 UART:
18,587,763 UART: [state] CFI Enabled
18,596,027 UART: [fht] FMC Alias Private Key: 7
20,362,322 UART: [art] Extend RT PCRs Done
20,363,543 UART: [art] Lock RT PCRs Done
20,364,950 UART: [art] Populate DV Done
20,370,404 UART: [fht] FMC Alias Private Key: 7
20,372,163 UART: [art] Derive CDI
20,372,907 UART: [art] Store in slot 0x4
20,415,612 UART: [art] Derive Key Pair
20,416,652 UART: [art] Store priv key in slot 0x5
22,842,946 UART: [art] Derive Key Pair - Done
22,855,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,562,513 UART: [art] Erasing AUTHORITY.KEYID = 7
24,564,021 UART: [art] PUB.X = 735093541BCCEE1D5828EF8BFE01DF37693A29DE5A11E3BBD5AE1DA9939DA150E2233DAA7624BBD7C7E9CB852E5A2A9D
24,571,301 UART: [art] PUB.Y = 2CC6C92FEAB5677676D54CB21685321CEB8E19F6BD3981ABF87F88DF99186C9BC6F9D721FA2FF4321488E0F560308F18
24,578,554 UART: [art] SIG.R = 94A2200023CD062D7E8DD8AEC4CEB0897007852DC1822CAF6200DD002C02753CF5190583C1BC647BDF9C270959788136
24,585,915 UART: [art] SIG.S = 4D83696A794D2AA412B654F9AFE7F922653629A6F3A45F846AA5FEF30DD5AC93945A969495E4AFA8841B797BCB1F364E
25,565,089 UART: mbox::rt_entry...
25,566,050 UART: ____ _ _ _ ____ _____
25,567,984 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,569,994 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,571,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,573,854 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,575,780 UART: |_|
25,576,614 UART:
25,707,149 UART: [rt] Runtime listening for mailbox commands...
25,709,537 >>> mbox cmd response data (0 bytes)
27,781,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,931,026 UART:
27,931,431 UART: Running Caliptra ROM ...
27,932,495 UART:
27,932,649 UART: [state] CFI Enabled
27,945,148 UART: [state] LifecycleState = Unprovisioned
27,947,055 UART: [state] DebugLocked = No
27,948,926 UART: [state] WD Timer not started. Device not locked for debugging
27,954,287 UART: [kat] SHA2-256
28,144,190 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,154,942 UART: [kat] ++
28,155,564 UART: [kat] sha1
28,166,832 UART: [kat] SHA2-256
28,169,840 UART: [kat] SHA2-384
28,176,608 UART: [kat] SHA2-512-ACC
28,179,194 UART: [kat] ECC-384
30,621,563 UART: [kat] HMAC-384Kdf
30,634,624 UART: [kat] LMS
31,166,266 UART: [kat] --
31,170,418 UART: [update-reset] ++
34,680,784 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,683,511 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,313,267 >>> mbox cmd response: success
35,317,916 UART: [update-reset] Copying MAN_2 To MAN_1
35,351,945 UART: [update-reset Success] --
35,355,782 UART: [state] Locking Datavault
35,360,569 UART: [state] Locking PCR0, PCR1 and PCR31
35,362,791 UART: [state] Locking ICCM
35,364,968 UART: [exit] Launching FMC @ 0x40000130
35,373,667 UART:
35,373,915 UART: Running Caliptra FMC ...
35,375,027 UART:
35,375,195 UART: [state] CFI Enabled
35,419,254 UART: [art] Extend RT PCRs Done
35,420,412 UART: [art] Lock RT PCRs Done
35,421,542 UART: [art] Populate DV Done
35,427,116 UART: [fht] FMC Alias Private Key: 7
35,428,815 UART: [art] Derive CDI
35,429,632 UART: [art] Store in slot 0x4
35,472,343 UART: [art] Derive Key Pair
35,473,399 UART: [art] Store priv key in slot 0x5
37,900,244 UART: [art] Derive Key Pair - Done
37,913,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,619,507 UART: [art] Erasing AUTHORITY.KEYID = 7
39,621,019 UART: [art] PUB.X = 88CE29D54686E2D9E185DE2C8A0F67C290833CC82378D72A805E388E51539AE90E859D9CB2EDC2347F7230795A3C3041
39,628,247 UART: [art] PUB.Y = B6245E231DE949971A8AFE6E3746253D1A02218DAD638BFCC94E885A44369BF4EACCBF38B4E02C67540677202141AE05
39,635,503 UART: [art] SIG.R = 40354826D60F55D3F3D678752E23294C9C9DC2EC958B12C9617E10C5706134D5EEE738D85527614CC2F2B604100DB0A3
39,642,874 UART: [art] SIG.S = E971601313C3E75E4FF6E8B54959FFA9A3B79BB02163357AE8ADD908E9410CE31347ECE448BE43CD19AFD70CCEAA0789
40,621,789 UART: Caliptra RT
40,622,495 UART: [state] CFI Enabled
40,996,312 UART: [rt] RT failed reset flow
40,997,529 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,755,041 ready_for_fw is high
3,755,492 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,267,423 >>> mbox cmd response: success
14,268,456 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
18,526,179 UART:
18,526,570 UART: Running Caliptra FMC ...
18,527,725 UART:
18,527,890 UART: [state] CFI Enabled
18,535,849 UART: [fht] FMC Alias Private Key: 7
20,301,738 UART: [art] Extend RT PCRs Done
20,302,958 UART: [art] Lock RT PCRs Done
20,304,643 UART: [art] Populate DV Done
20,310,139 UART: [fht] FMC Alias Private Key: 7
20,311,635 UART: [art] Derive CDI
20,312,375 UART: [art] Store in slot 0x4
20,355,348 UART: [art] Derive Key Pair
20,356,394 UART: [art] Store priv key in slot 0x5
22,782,798 UART: [art] Derive Key Pair - Done
22,795,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,502,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,503,863 UART: [art] PUB.X = B84D6EA28F7A72F9343DEE29A49CDE3DFECE0B8B49BAE3291D69EB55BD5DC5EBFDEDF5C3A68B5CF3572607F4028DEBB4
24,511,186 UART: [art] PUB.Y = F4F889D6EE015158895A4075B0E1C813A25AA7E08D34C9BD8CDF7B0AE2D1914E4E2B9778213FCB2F7F9699F9581A1A27
24,518,444 UART: [art] SIG.R = 4985B6803C25F64E158A6D28CB740246701B76376E504084E82BE0217FF246B954230A972392D0EBBE8BB0359A6843F3
24,525,811 UART: [art] SIG.S = 6D506ACCE746EC7440E4C70C27A81DC1DC62FE9306B0798395214CE367CDE4A77323D108095663CF631D70C5A08B9E25
25,504,499 UART: mbox::rt_entry...
25,505,469 UART: ____ _ _ _ ____ _____
25,507,458 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,509,464 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,511,416 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,513,407 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,515,342 UART: |_|
25,516,183 UART:
25,647,544 UART: [rt] Runtime listening for mailbox commands...
25,649,884 >>> mbox cmd response data (0 bytes)
27,719,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,537,561 >>> mbox cmd response: success
35,570,981 UART:
35,571,293 UART: Running Caliptra FMC ...
35,572,340 UART:
35,572,492 UART: [state] CFI Enabled
35,617,100 UART: [art] Extend RT PCRs Done
35,618,301 UART: [art] Lock RT PCRs Done
35,619,366 UART: [art] Populate DV Done
35,624,623 UART: [fht] FMC Alias Private Key: 7
35,626,272 UART: [art] Derive CDI
35,627,016 UART: [art] Store in slot 0x4
35,669,610 UART: [art] Derive Key Pair
35,670,612 UART: [art] Store priv key in slot 0x5
38,098,514 UART: [art] Derive Key Pair - Done
38,111,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,817,772 UART: [art] Erasing AUTHORITY.KEYID = 7
39,819,279 UART: [art] PUB.X = AB1DEC4D396D75BEC95287DEAC43CF38C449635836BFFEE70D44D1DE89F246A74018EB7B49181D6C67A231EDCF505446
39,826,530 UART: [art] PUB.Y = 9542DA9A91B5C84D4F644CA8C776573880071CD3E216B0A13ED1600E5B7F45C72A38D446B31383A68ACF3D5B6334FB86
39,833,838 UART: [art] SIG.R = 693139B9DDC7A21AEF9CC59DB5D0A8C9DF648DD601379117D240203F97D10403DF874C1A2E51655472BF9C285EFA59EC
39,841,208 UART: [art] SIG.S = 9D2FEEFD799D641621393FD08893F8565CEEB77148B070B9F25231D4F0CFC2B52B3FC57B2E53DB5BE91B19A514FE9EA9
40,819,549 UART: Caliptra RT
40,820,295 UART: [state] CFI Enabled
41,197,668 UART: [rt] RT failed reset flow
41,198,869 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,630 UART: [state] LifecycleState = Unprovisioned
86,285 UART: [state] DebugLocked = No
86,869 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,537 UART: [kat] SHA2-256
882,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,583 UART: [kat] ++
886,735 UART: [kat] sha1
890,877 UART: [kat] SHA2-256
892,815 UART: [kat] SHA2-384
895,474 UART: [kat] SHA2-512-ACC
897,375 UART: [kat] ECC-384
902,808 UART: [kat] HMAC-384Kdf
907,386 UART: [kat] LMS
1,475,582 UART: [kat] --
1,476,731 UART: [cold-reset] ++
1,477,183 UART: [fht] Storing FHT @ 0x50003400
1,479,966 UART: [idev] ++
1,480,134 UART: [idev] CDI.KEYID = 6
1,480,494 UART: [idev] SUBJECT.KEYID = 7
1,480,918 UART: [idev] UDS.KEYID = 0
1,481,263 ready_for_fw is high
1,481,263 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,774 UART: [idev] Erasing UDS.KEYID = 0
1,505,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,010 UART: [idev] --
1,515,115 UART: [ldev] ++
1,515,283 UART: [ldev] CDI.KEYID = 6
1,515,646 UART: [ldev] SUBJECT.KEYID = 5
1,516,072 UART: [ldev] AUTHORITY.KEYID = 7
1,516,535 UART: [ldev] FE.KEYID = 1
1,521,411 UART: [ldev] Erasing FE.KEYID = 1
1,546,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,370 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,280 UART: [ldev] --
1,585,697 UART: [fwproc] Waiting for Commands...
1,586,542 UART: [fwproc] Received command 0x46574c44
1,587,333 UART: [fwproc] Received Image of size 82832 bytes
2,522,932 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,022 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,667,867 >>> mbox cmd response: success
2,667,867 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,669,011 UART: [afmc] ++
2,669,179 UART: [afmc] CDI.KEYID = 6
2,669,541 UART: [afmc] SUBJECT.KEYID = 7
2,669,966 UART: [afmc] AUTHORITY.KEYID = 5
2,704,837 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,927 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,707 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,299 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,982 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,738 UART: [afmc] --
2,747,850 UART: [cold-reset] --
2,748,792 UART: [state] Locking Datavault
2,750,007 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,611 UART: [state] Locking ICCM
2,751,091 UART: [exit] Launching FMC @ 0x40000130
2,756,421 UART:
2,756,437 UART: Running Caliptra FMC ...
2,756,845 UART:
2,756,899 UART: [state] CFI Enabled
2,767,461 UART: [fht] FMC Alias Private Key: 7
2,886,115 UART: [art] Extend RT PCRs Done
2,886,543 UART: [art] Lock RT PCRs Done
2,888,059 UART: [art] Populate DV Done
2,896,226 UART: [fht] FMC Alias Private Key: 7
2,897,314 UART: [art] Derive CDI
2,897,594 UART: [art] Store in slot 0x4
2,983,226 UART: [art] Derive Key Pair
2,983,586 UART: [art] Store priv key in slot 0x5
2,996,759 UART: [art] Derive Key Pair - Done
3,011,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,470 UART: [art] PUB.X = D0AF40E2C028B350C5E849BD223E3D77004F2E6F93B025E9457BAC537D581F2BAD53FE7914A969B9992D0CEC78D416A3
3,034,223 UART: [art] PUB.Y = 0A6779E0FEF0B608345F506665972455ECA4E120098719B29689199AB1BA87C40BD9CEBCE31FA9A1E9D791DE16E9BDA9
3,041,169 UART: [art] SIG.R = 524349296B443551FEF5E5DF2DDCFAFACF2EF1D937048CCA73D93660CB01FC94FE61BBADF33BEBCE1018372CD834FBC0
3,047,959 UART: [art] SIG.S = B8B6E1E4ABFD20623211C6AEDBDF6D0C9F9E07E1B19EE19EC81725DC8420A5F5FAAB41D97CA7AF44B8229E69D834FF61
3,071,399 UART: mbox::rt_entry...
3,071,771 UART: ____ _ _ _ ____ _____
3,072,555 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,073,355 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,074,123 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,074,891 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,075,659 UART: |_|
3,075,971 UART:
3,195,356 UART: [rt] Runtime listening for mailbox commands...
3,196,595 >>> mbox cmd response data (0 bytes)
3,196,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,196,711 UART:
3,196,727 UART: Running Caliptra ROM ...
3,197,135 UART:
3,197,189 UART: [state] CFI Enabled
3,199,421 UART: [state] LifecycleState = Unprovisioned
3,200,076 UART: [state] DebugLocked = No
3,200,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,202,197 UART: [kat] SHA2-256
3,996,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,000,243 UART: [kat] ++
4,000,395 UART: [kat] sha1
4,004,647 UART: [kat] SHA2-256
4,006,585 UART: [kat] SHA2-384
4,009,402 UART: [kat] SHA2-512-ACC
4,011,302 UART: [kat] ECC-384
4,016,991 UART: [kat] HMAC-384Kdf
4,021,587 UART: [kat] LMS
4,589,783 UART: [kat] --
4,590,500 UART: [update-reset] ++
5,971,156 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,972,216 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,127,483 >>> mbox cmd response: success
6,127,674 UART: [update-reset] Copying MAN_2 To MAN_1
6,135,688 UART: [update-reset Success] --
6,136,585 UART: [state] Locking Datavault
6,137,439 UART: [state] Locking PCR0, PCR1 and PCR31
6,138,043 UART: [state] Locking ICCM
6,138,479 UART: [exit] Launching FMC @ 0x40000130
6,143,809 UART:
6,143,825 UART: Running Caliptra FMC ...
6,144,233 UART:
6,144,287 UART: [state] CFI Enabled
6,233,658 UART: [art] Extend RT PCRs Done
6,234,086 UART: [art] Lock RT PCRs Done
6,235,409 UART: [art] Populate DV Done
6,243,420 UART: [fht] FMC Alias Private Key: 7
6,244,484 UART: [art] Derive CDI
6,244,764 UART: [art] Store in slot 0x4
6,329,786 UART: [art] Derive Key Pair
6,330,146 UART: [art] Store priv key in slot 0x5
6,344,077 UART: [art] Derive Key Pair - Done
6,359,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,374,333 UART: [art] Erasing AUTHORITY.KEYID = 7
6,375,098 UART: [art] PUB.X = 6EFE72EC28EB932A5907B7B27DA04F3D6BA571BA6E5528A883EDDFC0475F748EF05607E4AC534DEDC15EE8D9EB852EFE
6,381,886 UART: [art] PUB.Y = 5094EE8A2B4E098DD0E9C856B304383DD9993C9CBCAC159E5EC0A8A72776BE21FA2E68B212CE6F048E9F5ADCD99FF9C0
6,388,847 UART: [art] SIG.R = FA2C114B6B2F4647ED4564CC7CD01A2FCF78F3A7B3042C8F99A98854FDE9E244CB4C2F34E9178118A2D2593F34B33670
6,395,622 UART: [art] SIG.S = A8147CE275C9901FEFFE52827C0CEFA746B271442636C748828AF0BEB31B4D029461F460EB7BCA1967B89EFB47692DA7
6,419,016 UART: Caliptra RT
6,419,267 UART: [state] CFI Enabled
6,786,396 UART: [rt] RT failed reset flow
6,786,827 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,345 ready_for_fw is high
1,362,345 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,669 >>> mbox cmd response: success
2,517,669 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,579,266 UART:
2,579,282 UART: Running Caliptra FMC ...
2,579,690 UART:
2,579,744 UART: [state] CFI Enabled
2,590,220 UART: [fht] FMC Alias Private Key: 7
2,709,540 UART: [art] Extend RT PCRs Done
2,709,968 UART: [art] Lock RT PCRs Done
2,711,238 UART: [art] Populate DV Done
2,719,449 UART: [fht] FMC Alias Private Key: 7
2,720,609 UART: [art] Derive CDI
2,720,889 UART: [art] Store in slot 0x4
2,806,935 UART: [art] Derive Key Pair
2,807,295 UART: [art] Store priv key in slot 0x5
2,820,148 UART: [art] Derive Key Pair - Done
2,834,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,277 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,042 UART: [art] PUB.X = DFF412388594F0F570A30C65B6068CE3C4A6FEF7FD29448AFF60D2021279BBED2D2CB866B30E39DCD270AD88D2146D86
2,857,812 UART: [art] PUB.Y = 560C746590664343B6C52F59B01BA782915298948B48AD7E70B912BABFEB8BE78DAFC9B04E63E2C8424CEF00E2552A54
2,864,741 UART: [art] SIG.R = 53940D20463F1506A9CEE6A881F4EEA8FCFB04BFEE8AAD765D523EA24F613511A91F90BE9443853A3224C2D2F4018A6B
2,871,509 UART: [art] SIG.S = 63421855500E237DD8D7ED82E18B2B1BBCB2050289528E7A62D5D43EAA385DAA6DBE2BF79C569177E56955340F9D033C
2,895,036 UART: mbox::rt_entry...
2,895,408 UART: ____ _ _ _ ____ _____
2,896,192 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,992 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,760 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,898,528 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,296 UART: |_|
2,899,608 UART:
3,018,460 UART: [rt] Runtime listening for mailbox commands...
3,019,699 >>> mbox cmd response data (0 bytes)
3,019,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,833,975 >>> mbox cmd response: success
5,847,287 UART:
5,847,303 UART: Running Caliptra FMC ...
5,847,711 UART:
5,847,765 UART: [state] CFI Enabled
5,936,726 UART: [art] Extend RT PCRs Done
5,937,154 UART: [art] Lock RT PCRs Done
5,938,477 UART: [art] Populate DV Done
5,946,988 UART: [fht] FMC Alias Private Key: 7
5,947,918 UART: [art] Derive CDI
5,948,198 UART: [art] Store in slot 0x4
6,033,810 UART: [art] Derive Key Pair
6,034,170 UART: [art] Store priv key in slot 0x5
6,047,883 UART: [art] Derive Key Pair - Done
6,062,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,077,744 UART: [art] Erasing AUTHORITY.KEYID = 7
6,078,509 UART: [art] PUB.X = 966EBEB4207399C19FFD0F659534EFDE24D3A717097E24E74068E3F0EEE6BF0BE6FFB7885261020E1699A22F94CF1655
6,085,270 UART: [art] PUB.Y = AC857E00BC4EBBCA6B7FFBA5BB9AC3B78459203B3E64A6576EAC550861BDD0E7DBCF447E9307F027A7F866F0F19A116B
6,092,214 UART: [art] SIG.R = 8231F6E885921CA8D6E1EB0AD9E583CD430B127C2D9C17680E051B4BD083A18E89180F6B03B81C2F7E5F6B813D7E9AD5
6,098,974 UART: [art] SIG.S = A7C419DFC01F9676B2CB52B282AFE919FC970A44EA4F44E4A81456BE205F111C5D12DC964FEE2B908C87FEAE55C19A05
6,122,778 UART: Caliptra RT
6,123,029 UART: [state] CFI Enabled
6,489,076 UART: [rt] RT failed reset flow
6,489,507 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,736 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,090 UART: [kat] SHA2-256
882,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,136 UART: [kat] ++
886,288 UART: [kat] sha1
890,486 UART: [kat] SHA2-256
892,424 UART: [kat] SHA2-384
895,177 UART: [kat] SHA2-512-ACC
897,078 UART: [kat] ECC-384
902,627 UART: [kat] HMAC-384Kdf
907,195 UART: [kat] LMS
1,475,391 UART: [kat] --
1,476,158 UART: [cold-reset] ++
1,476,498 UART: [fht] Storing FHT @ 0x50003400
1,479,417 UART: [idev] ++
1,479,585 UART: [idev] CDI.KEYID = 6
1,479,945 UART: [idev] SUBJECT.KEYID = 7
1,480,369 UART: [idev] UDS.KEYID = 0
1,480,714 ready_for_fw is high
1,480,714 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,135 UART: [idev] Erasing UDS.KEYID = 0
1,504,893 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,425 UART: [idev] --
1,514,490 UART: [ldev] ++
1,514,658 UART: [ldev] CDI.KEYID = 6
1,515,021 UART: [ldev] SUBJECT.KEYID = 5
1,515,447 UART: [ldev] AUTHORITY.KEYID = 7
1,515,910 UART: [ldev] FE.KEYID = 1
1,521,234 UART: [ldev] Erasing FE.KEYID = 1
1,546,487 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,711 UART: [ldev] --
1,586,060 UART: [fwproc] Waiting for Commands...
1,586,923 UART: [fwproc] Received command 0x46574c44
1,587,714 UART: [fwproc] Received Image of size 82832 bytes
2,523,539 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,013 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,231 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,930 >>> mbox cmd response: success
2,668,930 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,670,086 UART: [afmc] ++
2,670,254 UART: [afmc] CDI.KEYID = 6
2,670,616 UART: [afmc] SUBJECT.KEYID = 7
2,671,041 UART: [afmc] AUTHORITY.KEYID = 5
2,706,230 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,242 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,022 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,614 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,297 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,163 UART: [afmc] --
2,749,151 UART: [cold-reset] --
2,749,867 UART: [state] Locking Datavault
2,751,002 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,606 UART: [state] Locking ICCM
2,752,196 UART: [exit] Launching FMC @ 0x40000130
2,757,526 UART:
2,757,542 UART: Running Caliptra FMC ...
2,757,950 UART:
2,758,093 UART: [state] CFI Enabled
2,768,703 UART: [fht] FMC Alias Private Key: 7
2,887,643 UART: [art] Extend RT PCRs Done
2,888,071 UART: [art] Lock RT PCRs Done
2,889,299 UART: [art] Populate DV Done
2,897,748 UART: [fht] FMC Alias Private Key: 7
2,898,816 UART: [art] Derive CDI
2,899,096 UART: [art] Store in slot 0x4
2,984,574 UART: [art] Derive Key Pair
2,984,934 UART: [art] Store priv key in slot 0x5
2,998,785 UART: [art] Derive Key Pair - Done
3,013,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,695 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,460 UART: [art] PUB.X = DB6CFE4B78F5B14DAB0E059B8EBB4334D6F84589A34A10CBA29AF6B8DF35E0A25E79B091CBB08FE52DF6D1C8AB6E6798
3,037,250 UART: [art] PUB.Y = 8DF3C8F05A164259780A9EAA87AE6613285DD212E0C6A87A3BE2A63E7DA194C0AE2419CBF1E27606AFFC7702B47CC56E
3,044,205 UART: [art] SIG.R = 657067E09493A0A9B1BC3DE4BCE2D210892C42796F602BE2BFC396C1ED72F98195A09B8501D21F7B6F2E65A809529E49
3,050,971 UART: [art] SIG.S = C05B3F6F108EF01627FBC744162B3D4A737F8BE5317FC490896F047C1389D292D1535A456378F74883329644A22F16F4
3,075,082 UART: mbox::rt_entry...
3,075,454 UART: ____ _ _ _ ____ _____
3,076,238 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,038 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,806 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,574 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,342 UART: |_|
3,079,654 UART:
3,198,491 UART: [rt] Runtime listening for mailbox commands...
3,199,730 >>> mbox cmd response data (0 bytes)
3,199,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,199,846 UART:
3,199,862 UART: Running Caliptra ROM ...
3,200,270 UART:
3,200,411 UART: [state] CFI Enabled
3,203,007 UART: [state] LifecycleState = Unprovisioned
3,203,662 UART: [state] DebugLocked = No
3,204,352 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,205,997 UART: [kat] SHA2-256
3,999,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,004,043 UART: [kat] ++
4,004,195 UART: [kat] sha1
4,008,489 UART: [kat] SHA2-256
4,010,427 UART: [kat] SHA2-384
4,013,158 UART: [kat] SHA2-512-ACC
4,015,058 UART: [kat] ECC-384
4,021,015 UART: [kat] HMAC-384Kdf
4,025,609 UART: [kat] LMS
4,593,805 UART: [kat] --
4,594,628 UART: [update-reset] ++
5,975,330 UART: [update-reset] Image verified using Vendor ECC Key Index 0
5,976,496 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,131,763 >>> mbox cmd response: success
6,131,958 UART: [update-reset] Copying MAN_2 To MAN_1
6,139,972 UART: [update-reset Success] --
6,141,019 UART: [state] Locking Datavault
6,141,737 UART: [state] Locking PCR0, PCR1 and PCR31
6,142,341 UART: [state] Locking ICCM
6,142,809 UART: [exit] Launching FMC @ 0x40000130
6,148,139 UART:
6,148,155 UART: Running Caliptra FMC ...
6,148,563 UART:
6,148,706 UART: [state] CFI Enabled
6,237,983 UART: [art] Extend RT PCRs Done
6,238,411 UART: [art] Lock RT PCRs Done
6,239,468 UART: [art] Populate DV Done
6,247,787 UART: [fht] FMC Alias Private Key: 7
6,248,823 UART: [art] Derive CDI
6,249,103 UART: [art] Store in slot 0x4
6,334,881 UART: [art] Derive Key Pair
6,335,241 UART: [art] Store priv key in slot 0x5
6,348,534 UART: [art] Derive Key Pair - Done
6,363,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,378,698 UART: [art] Erasing AUTHORITY.KEYID = 7
6,379,463 UART: [art] PUB.X = 802721131A734A882D28FFEF6D48406C0C867F190B50C14FEAF7EE18E6872C473F07C929BB7E5FDEC0528C2BFA5428D4
6,386,232 UART: [art] PUB.Y = D62253FF3EA347B9E9A107891AE8DE1155EFBCB712FE2B76916C687F994BDDBCA50FA93669FC5EC67506959CB4C8FACE
6,393,193 UART: [art] SIG.R = B2E93699011CEE42A77D0294864C1A34BF2279A97F745A5E6977975CD2CD6C13B502598E73FA9F8752F3D2422AB1743F
6,399,952 UART: [art] SIG.S = 7A38CE40F47FAAE1A3574EF5DAF68762EC7A8F8E4F496FD24862C94E2B38D25C8C5A3A2BBC476F42AEC962A65F7D11D1
6,423,430 UART: Caliptra RT
6,423,773 UART: [state] CFI Enabled
6,782,873 UART: [rt] RT failed reset flow
6,783,304 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,056 ready_for_fw is high
1,363,056 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,519,046 >>> mbox cmd response: success
2,519,046 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,580,941 UART:
2,580,957 UART: Running Caliptra FMC ...
2,581,365 UART:
2,581,508 UART: [state] CFI Enabled
2,591,740 UART: [fht] FMC Alias Private Key: 7
2,710,836 UART: [art] Extend RT PCRs Done
2,711,264 UART: [art] Lock RT PCRs Done
2,713,024 UART: [art] Populate DV Done
2,721,233 UART: [fht] FMC Alias Private Key: 7
2,722,237 UART: [art] Derive CDI
2,722,517 UART: [art] Store in slot 0x4
2,808,391 UART: [art] Derive Key Pair
2,808,751 UART: [art] Store priv key in slot 0x5
2,821,524 UART: [art] Derive Key Pair - Done
2,836,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,852,240 UART: [art] Erasing AUTHORITY.KEYID = 7
2,853,005 UART: [art] PUB.X = 9468565FE4AB5BA967F89D861AC8FA7BF8BBC6A2D7CDFFDCA8B6D201AE52D63916475CA7334EDD034211E8C328FD6D8D
2,859,791 UART: [art] PUB.Y = 584873C3D030116CFDD1C3673531D59B9ADA0D427F4435775883143672C10E4A4A7BDD2E3D6BC4603FEC854FE2AE26D7
2,866,739 UART: [art] SIG.R = 7B5C14D372DB35B7055AEB910D81829E5B803294D870D7DC03A073AE3972049C4F39441092ADCA7C9B748B84C35E7DFF
2,873,501 UART: [art] SIG.S = 9D45689957C0D579E9F591ABD3A5811D59DE758552A77D931FF1F65F7D11C7C9B3FFDAEA03B84FCD4A142E87568AFC39
2,896,844 UART: mbox::rt_entry...
2,897,216 UART: ____ _ _ _ ____ _____
2,898,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,800 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,568 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,336 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,104 UART: |_|
2,901,416 UART:
3,020,411 UART: [rt] Runtime listening for mailbox commands...
3,021,650 >>> mbox cmd response data (0 bytes)
3,021,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,835,395 >>> mbox cmd response: success
5,848,849 UART:
5,848,865 UART: Running Caliptra FMC ...
5,849,273 UART:
5,849,416 UART: [state] CFI Enabled
5,938,801 UART: [art] Extend RT PCRs Done
5,939,229 UART: [art] Lock RT PCRs Done
5,940,458 UART: [art] Populate DV Done
5,948,551 UART: [fht] FMC Alias Private Key: 7
5,949,709 UART: [art] Derive CDI
5,949,989 UART: [art] Store in slot 0x4
6,035,915 UART: [art] Derive Key Pair
6,036,275 UART: [art] Store priv key in slot 0x5
6,049,470 UART: [art] Derive Key Pair - Done
6,064,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,080,043 UART: [art] Erasing AUTHORITY.KEYID = 7
6,080,808 UART: [art] PUB.X = 4E722CA6E5DDF81C852EFF0DCFF53853C7CF9E0B18ED14B0A0558C85223FA18248C568C876BA29DF81664EC54E95DB08
6,087,583 UART: [art] PUB.Y = 58B49AE53C1F42107D1083910627C0490762287101DC51681313818A13EC679B2E2D452026305CE9CBC5D1F926AF453C
6,094,512 UART: [art] SIG.R = 16E8D1139E50C4E385E8FDDA021A490B8869D48F2BB6F85A1BE35B220CB96BFB810E6000B5A3ED66507C02C7783AE686
6,101,253 UART: [art] SIG.S = 105D53E245B558128904794A3030A731B9ACF7C2379171BEBBEC3FD1A1990B58C8B544531AC86BA7C7D1E62D62116B5B
6,124,953 UART: Caliptra RT
6,125,296 UART: [state] CFI Enabled
6,493,507 UART: [rt] RT failed reset flow
6,493,938 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,203 UART: [state] WD Timer not started. Device not locked for debugging
87,312 UART: [kat] SHA2-256
890,862 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,966 UART: [kat] ++
895,118 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,227 UART: [kat] SHA2-512-ACC
906,128 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,465 UART: [kat] LMS
1,168,777 UART: [kat] --
1,169,690 UART: [cold-reset] ++
1,170,036 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 ready_for_fw is high
1,173,916 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,533 UART: [idev] Erasing UDS.KEYID = 0
1,198,945 UART: [idev] Sha1 KeyId Algorithm
1,207,767 UART: [idev] --
1,208,992 UART: [ldev] ++
1,209,160 UART: [ldev] CDI.KEYID = 6
1,209,524 UART: [ldev] SUBJECT.KEYID = 5
1,209,951 UART: [ldev] AUTHORITY.KEYID = 7
1,210,414 UART: [ldev] FE.KEYID = 1
1,215,984 UART: [ldev] Erasing FE.KEYID = 1
1,242,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,872 UART: [ldev] --
1,281,135 UART: [fwproc] Wait for Commands...
1,281,898 UART: [fwproc] Recv command 0x46574c44
1,282,631 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,771 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,618 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,793 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,586 >>> mbox cmd response: success
2,363,586 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,768 UART: [afmc] ++
2,364,936 UART: [afmc] CDI.KEYID = 6
2,365,299 UART: [afmc] SUBJECT.KEYID = 7
2,365,725 UART: [afmc] AUTHORITY.KEYID = 5
2,401,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,323 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,782 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,663 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,364 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,197 UART: [afmc] --
2,444,164 UART: [cold-reset] --
2,444,750 UART: [state] Locking Datavault
2,445,943 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,547 UART: [state] Locking ICCM
2,447,215 UART: [exit] Launching FMC @ 0x40000130
2,452,545 UART:
2,452,561 UART: Running Caliptra FMC ...
2,452,969 UART:
2,453,023 UART: [state] CFI Enabled
2,463,621 UART: [fht] FMC Alias Private Key: 7
2,582,729 UART: [art] Extend RT PCRs Done
2,583,157 UART: [art] Lock RT PCRs Done
2,584,595 UART: [art] Populate DV Done
2,592,542 UART: [fht] FMC Alias Private Key: 7
2,593,578 UART: [art] Derive CDI
2,593,858 UART: [art] Store in slot 0x4
2,679,913 UART: [art] Derive Key Pair
2,680,273 UART: [art] Store priv key in slot 0x5
2,693,215 UART: [art] Derive Key Pair - Done
2,708,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,685 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,450 UART: [art] PUB.X = 0E1D4F6E06EBC40F0F27BFF47849D2155606C77E5CBC55C91B57008C1D7D90CF38ED258BEF472F9213DE2754341F0574
2,731,186 UART: [art] PUB.Y = D2102624DD340A6900BC66E609DCDD2DBA26E828F322A34B8EAB2FCF47C440A16FA8C3BB22307DACA613CEAC481D21EA
2,738,130 UART: [art] SIG.R = 9C136E8EAFD02AAB955033ED3937C4693852BD6DA12F75A017B48266C8A6B53EB9C93C170D695D157D307B408E474AF2
2,744,901 UART: [art] SIG.S = D537E67ED5A8CCEF24D90991F6945FABE6B2804486367C824EDCCD137A231952F029DA171569F5FE493B715815BF7877
2,768,786 UART: mbox::rt_entry...
2,769,158 UART: ____ _ _ _ ____ _____
2,769,942 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,742 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,278 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,046 UART: |_|
2,773,358 UART:
2,891,659 UART: [rt] Runtime listening for mailbox commands...
2,892,898 >>> mbox cmd response data (0 bytes)
2,892,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,893,011 UART:
2,893,027 UART: Running Caliptra ROM ...
2,893,435 UART:
2,893,490 UART: [state] CFI Enabled
2,896,372 UART: [state] LifecycleState = Unprovisioned
2,897,027 UART: [state] DebugLocked = No
2,897,605 UART: [state] WD Timer not started. Device not locked for debugging
2,898,803 UART: [kat] SHA2-256
3,702,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,706,457 UART: [kat] ++
3,706,609 UART: [kat] sha1
3,711,071 UART: [kat] SHA2-256
3,713,011 UART: [kat] SHA2-384
3,715,812 UART: [kat] SHA2-512-ACC
3,717,712 UART: [kat] ECC-384
3,727,507 UART: [kat] HMAC-384Kdf
3,732,125 UART: [kat] LMS
3,980,437 UART: [kat] --
3,981,101 UART: [update-reset] ++
5,340,746 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,341,757 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,496,972 >>> mbox cmd response: success
5,497,205 UART: [update-reset] Copying MAN_2 To MAN_1
5,505,219 UART: [update-reset Success] --
5,506,156 UART: [state] Locking Datavault
5,507,024 UART: [state] Locking PCR0, PCR1 and PCR31
5,507,628 UART: [state] Locking ICCM
5,508,054 UART: [exit] Launching FMC @ 0x40000130
5,513,384 UART:
5,513,400 UART: Running Caliptra FMC ...
5,513,808 UART:
5,513,862 UART: [state] CFI Enabled
5,602,653 UART: [art] Extend RT PCRs Done
5,603,081 UART: [art] Lock RT PCRs Done
5,604,504 UART: [art] Populate DV Done
5,613,061 UART: [fht] FMC Alias Private Key: 7
5,614,209 UART: [art] Derive CDI
5,614,489 UART: [art] Store in slot 0x4
5,700,330 UART: [art] Derive Key Pair
5,700,690 UART: [art] Store priv key in slot 0x5
5,713,974 UART: [art] Derive Key Pair - Done
5,728,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,744,169 UART: [art] Erasing AUTHORITY.KEYID = 7
5,744,934 UART: [art] PUB.X = 59E671588931E5D05403B25F3EC93132D60386BF2B44DDE229895E43D77D5A0730E8D1CA4C62DFD2F0E711DBEBBCE0C4
5,751,705 UART: [art] PUB.Y = 17C9DB5C8326ED2B3870257DE121207391DED082035BE4EFADD5D2E58E04510FE702E64378DE7CC208EE154BD9FAB71F
5,758,652 UART: [art] SIG.R = F064C98D59C76F4F929637EC9F9AAA137C11A69E493C152D401034D80E1F90F55F12590B99A53941DB722782356B827C
5,765,410 UART: [art] SIG.S = 31F42BB0FF15F11ADD32E1BCCD7DA188AC708848E4CD62F81AB9F0F17180A03C27EA0FBC107BAE66BDD69CA28CB4C115
5,789,149 UART: Caliptra RT
5,789,400 UART: [state] CFI Enabled
6,157,875 UART: [rt] RT failed reset flow
6,158,306 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,868 ready_for_fw is high
1,058,868 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,601 >>> mbox cmd response: success
2,217,601 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,279,968 UART:
2,279,984 UART: Running Caliptra FMC ...
2,280,392 UART:
2,280,446 UART: [state] CFI Enabled
2,290,722 UART: [fht] FMC Alias Private Key: 7
2,409,924 UART: [art] Extend RT PCRs Done
2,410,352 UART: [art] Lock RT PCRs Done
2,411,692 UART: [art] Populate DV Done
2,419,627 UART: [fht] FMC Alias Private Key: 7
2,420,745 UART: [art] Derive CDI
2,421,025 UART: [art] Store in slot 0x4
2,506,882 UART: [art] Derive Key Pair
2,507,242 UART: [art] Store priv key in slot 0x5
2,520,384 UART: [art] Derive Key Pair - Done
2,535,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,257 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,022 UART: [art] PUB.X = 061EA4079C7A3F440A74DF684C06F3EA869FB0F7B1ACF09A25DD8ACA4C28F249FE2885E6D5FB7B935063503396328DB5
2,557,790 UART: [art] PUB.Y = 6004E4CA5E3894AD2E3239D3741A20A8E9BA79DB23F4FE7863F677F0C3DAB85A08412F3DEC80D013E82FF43F6AB219B2
2,564,746 UART: [art] SIG.R = E238238EEDB8A59C61FDDE1AC9E4ED71667E079A4F51ACA016B9DC500EBC80F44A4BE3421F7DCD5916DEFB7FC86C7A79
2,571,536 UART: [art] SIG.S = 421796061C10D3CE13AD86B4846EBC5741116610AF903AD10C49EA40560C0FF9D0C097E49822AE25068952AE35306055
2,595,089 UART: mbox::rt_entry...
2,595,461 UART: ____ _ _ _ ____ _____
2,596,245 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,045 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,597,813 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,581 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,349 UART: |_|
2,599,661 UART:
2,718,209 UART: [rt] Runtime listening for mailbox commands...
2,719,448 >>> mbox cmd response data (0 bytes)
2,719,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,838 >>> mbox cmd response: success
5,220,455 UART:
5,220,471 UART: Running Caliptra FMC ...
5,220,879 UART:
5,220,933 UART: [state] CFI Enabled
5,310,174 UART: [art] Extend RT PCRs Done
5,310,602 UART: [art] Lock RT PCRs Done
5,311,541 UART: [art] Populate DV Done
5,319,856 UART: [fht] FMC Alias Private Key: 7
5,320,914 UART: [art] Derive CDI
5,321,194 UART: [art] Store in slot 0x4
5,406,993 UART: [art] Derive Key Pair
5,407,353 UART: [art] Store priv key in slot 0x5
5,420,645 UART: [art] Derive Key Pair - Done
5,435,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,888 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,653 UART: [art] PUB.X = 2A7524A5FD792B2220C58BB4CDB36169B9979C18E4BDA57C35D1F00070647904DCE75A3F13ED427E8CA71CE3F1126228
5,458,402 UART: [art] PUB.Y = 13BCFF3B33EA8201342246BF3641D4ABAA9EE865445F89149A26A33DC3D88ADF5E5982304D1079F04EC8300808D12E99
5,465,345 UART: [art] SIG.R = 1125A7407210BA6BE5A8B08F02451B940A1CC5FC60ED5E79D594F53F939A6C8F7D5BF7890765F9CFEE55BE6607C0229B
5,472,111 UART: [art] SIG.S = 4CA70099144188DC88C412F2BCBE5B8FCC610599DEF9B16E3A43E0418D7D377CAC9CFBDDB95AA57D8DB597538434C278
5,495,200 UART: Caliptra RT
5,495,451 UART: [state] CFI Enabled
5,857,629 UART: [rt] RT failed reset flow
5,858,060 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,582 UART: [kat] SHA2-512-ACC
906,483 UART: [kat] ECC-384
916,410 UART: [kat] HMAC-384Kdf
921,034 UART: [kat] LMS
1,169,346 UART: [kat] --
1,170,257 UART: [cold-reset] ++
1,170,619 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 ready_for_fw is high
1,174,489 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,280 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,208,748 UART: [idev] --
1,209,817 UART: [ldev] ++
1,209,985 UART: [ldev] CDI.KEYID = 6
1,210,349 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,583 UART: [ldev] Erasing FE.KEYID = 1
1,242,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,665 UART: [ldev] --
1,281,878 UART: [fwproc] Wait for Commands...
1,282,481 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,684 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,337 >>> mbox cmd response: success
2,363,337 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,539 UART: [afmc] ++
2,364,707 UART: [afmc] CDI.KEYID = 6
2,365,070 UART: [afmc] SUBJECT.KEYID = 7
2,365,496 UART: [afmc] AUTHORITY.KEYID = 5
2,401,465 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,292 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,041 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,751 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,632 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,333 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,008 UART: [afmc] --
2,444,973 UART: [cold-reset] --
2,445,711 UART: [state] Locking Datavault
2,446,814 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,418 UART: [state] Locking ICCM
2,448,018 UART: [exit] Launching FMC @ 0x40000130
2,453,348 UART:
2,453,364 UART: Running Caliptra FMC ...
2,453,772 UART:
2,453,915 UART: [state] CFI Enabled
2,464,351 UART: [fht] FMC Alias Private Key: 7
2,583,621 UART: [art] Extend RT PCRs Done
2,584,049 UART: [art] Lock RT PCRs Done
2,585,965 UART: [art] Populate DV Done
2,594,116 UART: [fht] FMC Alias Private Key: 7
2,595,126 UART: [art] Derive CDI
2,595,406 UART: [art] Store in slot 0x4
2,681,715 UART: [art] Derive Key Pair
2,682,075 UART: [art] Store priv key in slot 0x5
2,695,703 UART: [art] Derive Key Pair - Done
2,710,425 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,046 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,811 UART: [art] PUB.X = 1D8B2330C6301EE955C65D77C36E0DFA8AB172DDEC2AFD2655A12011F085B5B7A37E9C38550821CC479AD41F67CAE128
2,733,585 UART: [art] PUB.Y = A8412D044AE5CF6031BE85EF5483E5E601F738BEA8323CEF0007C2A1B7EFF2581D82537D8CC5A60BFD9D461031CC3A1D
2,740,515 UART: [art] SIG.R = 8CCB7DFC710E695C1FCF795F1D2AD6195849F729D626A630148DEA4D0C4877A589C59B4CC6AF34782D8BE71FD5A92DA3
2,747,293 UART: [art] SIG.S = 0FC55696685CB6FCF6BB49B1EBFB47C40CE14FFE8747791049E45F5F602DCB6D6F09BBD7DC8D07CC440AE63E723AD962
2,770,894 UART: mbox::rt_entry...
2,771,266 UART: ____ _ _ _ ____ _____
2,772,050 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,850 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,154 UART: |_|
2,775,466 UART:
2,893,456 UART: [rt] Runtime listening for mailbox commands...
2,894,695 >>> mbox cmd response data (0 bytes)
2,894,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,894,808 UART:
2,894,824 UART: Running Caliptra ROM ...
2,895,232 UART:
2,895,374 UART: [state] CFI Enabled
2,898,432 UART: [state] LifecycleState = Unprovisioned
2,899,087 UART: [state] DebugLocked = No
2,899,707 UART: [state] WD Timer not started. Device not locked for debugging
2,901,031 UART: [kat] SHA2-256
3,704,581 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,708,685 UART: [kat] ++
3,708,837 UART: [kat] sha1
3,713,079 UART: [kat] SHA2-256
3,715,019 UART: [kat] SHA2-384
3,717,618 UART: [kat] SHA2-512-ACC
3,719,518 UART: [kat] ECC-384
3,729,563 UART: [kat] HMAC-384Kdf
3,734,201 UART: [kat] LMS
3,982,513 UART: [kat] --
3,983,321 UART: [update-reset] ++
5,342,732 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,343,915 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,499,130 >>> mbox cmd response: success
5,499,451 UART: [update-reset] Copying MAN_2 To MAN_1
5,507,465 UART: [update-reset Success] --
5,508,590 UART: [state] Locking Datavault
5,509,422 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,026 UART: [state] Locking ICCM
5,510,542 UART: [exit] Launching FMC @ 0x40000130
5,515,872 UART:
5,515,888 UART: Running Caliptra FMC ...
5,516,296 UART:
5,516,439 UART: [state] CFI Enabled
5,605,716 UART: [art] Extend RT PCRs Done
5,606,144 UART: [art] Lock RT PCRs Done
5,607,481 UART: [art] Populate DV Done
5,615,706 UART: [fht] FMC Alias Private Key: 7
5,616,670 UART: [art] Derive CDI
5,616,950 UART: [art] Store in slot 0x4
5,702,791 UART: [art] Derive Key Pair
5,703,151 UART: [art] Store priv key in slot 0x5
5,716,213 UART: [art] Derive Key Pair - Done
5,730,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,208 UART: [art] Erasing AUTHORITY.KEYID = 7
5,746,973 UART: [art] PUB.X = 1695F6E7C93F619301E498081641003A3D7BBE758C7A8E8F64A9BE57F746A8D994F413A7BF1584BFEC54C8A70D15BAB8
5,753,718 UART: [art] PUB.Y = B90CC6A20E8F3D7E23C5B8C8C55729170B0F9DE64FF3B89C929D0308A0B0EB8CC22BAB0471A5FC2EB7EA7C62F838080C
5,760,659 UART: [art] SIG.R = 9AFEC9091E9752145D0365BA7D150B6CB8840420E7CBB4302A40CB112B30CEE037FBDF9476B2963894F26B51A75C7BF6
5,767,423 UART: [art] SIG.S = C52F8DD0072549B5C0DFA2DF0CDC5F690FF55223EEF757389657557FF075FBC498B205A7994A0F128CC81EB571650BF7
5,791,201 UART: Caliptra RT
5,791,544 UART: [state] CFI Enabled
6,154,826 UART: [rt] RT failed reset flow
6,155,257 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,743 ready_for_fw is high
1,059,743 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,638 >>> mbox cmd response: success
2,216,638 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,278,961 UART:
2,278,977 UART: Running Caliptra FMC ...
2,279,385 UART:
2,279,528 UART: [state] CFI Enabled
2,290,414 UART: [fht] FMC Alias Private Key: 7
2,409,154 UART: [art] Extend RT PCRs Done
2,409,582 UART: [art] Lock RT PCRs Done
2,410,838 UART: [art] Populate DV Done
2,418,833 UART: [fht] FMC Alias Private Key: 7
2,419,929 UART: [art] Derive CDI
2,420,209 UART: [art] Store in slot 0x4
2,506,374 UART: [art] Derive Key Pair
2,506,734 UART: [art] Store priv key in slot 0x5
2,520,054 UART: [art] Derive Key Pair - Done
2,534,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,550 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,315 UART: [art] PUB.X = 314DC665B6E8D4D91A4172EF65BDC4EEBE6A8D08985C5C4BDA8054A87BDBB27D50589DBCE3AFD61E1FF7FDACB744A50C
2,558,109 UART: [art] PUB.Y = 60062F2812DF2F509D7F4F6C0596EE0FF4EF252EACAF022ABCDB6E2FC05ADD0562F220669752F6B7CF90F1023ACC7D4C
2,565,061 UART: [art] SIG.R = 6978814FB2942C02940B426DA646BE9AD7FA3EC1729A6C222311A01197F823E8154FBCEBA17235A08C1146F272BF1868
2,571,823 UART: [art] SIG.S = AC70623B94B48FFC0C6E95D49570A7689CFAA3D281E38FFBF5BD79AB392420EE8D53E04F6AF6CF168F0B33E2179A96C7
2,595,467 UART: mbox::rt_entry...
2,595,839 UART: ____ _ _ _ ____ _____
2,596,623 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,191 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,598,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,727 UART: |_|
2,600,039 UART:
2,717,629 UART: [rt] Runtime listening for mailbox commands...
2,718,868 >>> mbox cmd response data (0 bytes)
2,718,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,206,720 >>> mbox cmd response: success
5,219,963 UART:
5,219,979 UART: Running Caliptra FMC ...
5,220,387 UART:
5,220,530 UART: [state] CFI Enabled
5,309,797 UART: [art] Extend RT PCRs Done
5,310,225 UART: [art] Lock RT PCRs Done
5,311,702 UART: [art] Populate DV Done
5,319,747 UART: [fht] FMC Alias Private Key: 7
5,320,915 UART: [art] Derive CDI
5,321,195 UART: [art] Store in slot 0x4
5,406,806 UART: [art] Derive Key Pair
5,407,166 UART: [art] Store priv key in slot 0x5
5,420,400 UART: [art] Derive Key Pair - Done
5,435,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,450,932 UART: [art] Erasing AUTHORITY.KEYID = 7
5,451,697 UART: [art] PUB.X = CCA10091FA5EC711340CE0BDB1BDCD8EE11713DDA5686873E4E73D8EFAB96D518EE56D7855E4884E5B10936807DF395D
5,458,453 UART: [art] PUB.Y = A7CF4E1A84DDED80571F3139A4B336D614CC6CAEDE911A1F354798C7B438AEC49222B227E1FEA80AC85F6AE7270C9F1A
5,465,415 UART: [art] SIG.R = 023FF2CAD1B523FF33CF946CD966B3CD800046F0B5AF456A5B5C74D05AEBBA861AADEA08FF823CD3B17E83FFA0675817
5,472,179 UART: [art] SIG.S = B03F748525DEA23CF116F84EB6ABAE57B8AD77EF1EB0C0CA2DBE7DED91018038AFE8458B90BCDBC34CE58249681A389D
5,495,936 UART: Caliptra RT
5,496,279 UART: [state] CFI Enabled
5,853,878 UART: [rt] RT failed reset flow
5,854,309 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,438 UART: [state] LifecycleState = Unprovisioned
86,093 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [kat] SHA2-256
893,686 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,811 UART: [kat] ++
897,963 UART: [kat] sha1
902,153 UART: [kat] SHA2-256
904,093 UART: [kat] SHA2-384
906,898 UART: [kat] SHA2-512-ACC
908,799 UART: [kat] ECC-384
918,500 UART: [kat] HMAC-384Kdf
922,948 UART: [kat] LMS
1,171,276 UART: [kat] --
1,172,255 UART: [cold-reset] ++
1,172,649 UART: [fht] FHT @ 0x50003400
1,175,124 UART: [idev] ++
1,175,292 UART: [idev] CDI.KEYID = 6
1,175,652 UART: [idev] SUBJECT.KEYID = 7
1,176,076 UART: [idev] UDS.KEYID = 0
1,176,421 ready_for_fw is high
1,176,421 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,776 UART: [idev] Erasing UDS.KEYID = 0
1,200,887 UART: [idev] Sha1 KeyId Algorithm
1,209,185 UART: [idev] --
1,210,373 UART: [ldev] ++
1,210,541 UART: [ldev] CDI.KEYID = 6
1,210,904 UART: [ldev] SUBJECT.KEYID = 5
1,211,330 UART: [ldev] AUTHORITY.KEYID = 7
1,211,793 UART: [ldev] FE.KEYID = 1
1,216,993 UART: [ldev] Erasing FE.KEYID = 1
1,243,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,825 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,541 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,432 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,109 UART: [ldev] --
1,282,416 UART: [fwproc] Wait for Commands...
1,283,214 UART: [fwproc] Recv command 0x46574c44
1,283,942 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,312 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,843 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,450 >>> mbox cmd response: success
2,363,450 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,364,604 UART: [afmc] ++
2,364,772 UART: [afmc] CDI.KEYID = 6
2,365,134 UART: [afmc] SUBJECT.KEYID = 7
2,365,559 UART: [afmc] AUTHORITY.KEYID = 5
2,400,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,695 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,988 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,740 UART: [afmc] --
2,443,840 UART: [cold-reset] --
2,444,704 UART: [state] Locking Datavault
2,445,801 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,405 UART: [state] Locking ICCM
2,446,949 UART: [exit] Launching FMC @ 0x40000130
2,452,279 UART:
2,452,295 UART: Running Caliptra FMC ...
2,452,703 UART:
2,452,757 UART: [state] CFI Enabled
2,463,155 UART: [fht] FMC Alias Private Key: 7
2,582,453 UART: [art] Extend RT PCRs Done
2,582,881 UART: [art] Lock RT PCRs Done
2,584,681 UART: [art] Populate DV Done
2,592,834 UART: [fht] FMC Alias Private Key: 7
2,593,860 UART: [art] Derive CDI
2,594,140 UART: [art] Store in slot 0x4
2,679,957 UART: [art] Derive Key Pair
2,680,317 UART: [art] Store priv key in slot 0x5
2,693,623 UART: [art] Derive Key Pair - Done
2,708,310 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,503 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,268 UART: [art] PUB.X = 95DF4CF92D3BC3E5E27CD4E345FA4AA5739F9843817319A9858107824407CF28C9109207E959FECF6A1E98E6DB48621E
2,731,031 UART: [art] PUB.Y = E9999504B81A1CFD74D5F44DC1BD1100EFF5385F4F1338CF5169092D42422E618B4202BC5779474623C84F03E9927504
2,737,936 UART: [art] SIG.R = 0A9A2AC9709597BC3427CF52F474C1FCC38DC550C9E695DC3AA29CDC137E02CD8888B1E3F28FDE39A6197526AB4DB0B8
2,744,716 UART: [art] SIG.S = 0B61470ECB3C03A08D1EDFA72322F7E28DF6BEFA9776A9D1F55A62B614AE708F6FA39130B1D8ABBE9BEFA099E3CB69EA
2,768,531 UART: mbox::rt_entry...
2,768,903 UART: ____ _ _ _ ____ _____
2,769,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,791 UART: |_|
2,773,103 UART:
2,891,338 UART: [rt] Runtime listening for mailbox commands...
2,892,577 >>> mbox cmd response data (0 bytes)
2,892,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,892,690 UART:
2,892,706 UART: Running Caliptra ROM ...
2,893,114 UART:
2,893,169 UART: [state] CFI Enabled
2,896,153 UART: [state] LifecycleState = Unprovisioned
2,896,808 UART: [state] DebugLocked = No
2,897,486 UART: [state] WD Timer not started. Device not locked for debugging
2,898,672 UART: [kat] SHA2-256
3,704,322 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,708,447 UART: [kat] ++
3,708,599 UART: [kat] sha1
3,713,041 UART: [kat] SHA2-256
3,714,981 UART: [kat] SHA2-384
3,717,728 UART: [kat] SHA2-512-ACC
3,719,628 UART: [kat] ECC-384
3,729,315 UART: [kat] HMAC-384Kdf
3,733,963 UART: [kat] LMS
3,982,291 UART: [kat] --
3,983,261 UART: [update-reset] ++
5,341,519 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,342,688 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,497,903 >>> mbox cmd response: success
5,498,120 UART: [update-reset] Copying MAN_2 To MAN_1
5,506,134 UART: [update-reset Success] --
5,507,051 UART: [state] Locking Datavault
5,507,925 UART: [state] Locking PCR0, PCR1 and PCR31
5,508,529 UART: [state] Locking ICCM
5,509,117 UART: [exit] Launching FMC @ 0x40000130
5,514,447 UART:
5,514,463 UART: Running Caliptra FMC ...
5,514,871 UART:
5,514,925 UART: [state] CFI Enabled
5,603,794 UART: [art] Extend RT PCRs Done
5,604,222 UART: [art] Lock RT PCRs Done
5,605,285 UART: [art] Populate DV Done
5,613,498 UART: [fht] FMC Alias Private Key: 7
5,614,668 UART: [art] Derive CDI
5,614,948 UART: [art] Store in slot 0x4
5,700,943 UART: [art] Derive Key Pair
5,701,303 UART: [art] Store priv key in slot 0x5
5,714,177 UART: [art] Derive Key Pair - Done
5,728,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,743,638 UART: [art] Erasing AUTHORITY.KEYID = 7
5,744,403 UART: [art] PUB.X = 569EDA1BA2641081F6C671F208E3E57FBB73207A1BD8916E66AC56F18ADB658B7B54BC65B6C24781B2ABAA54096C0917
5,751,172 UART: [art] PUB.Y = 631885118A165A19E55D41D935823C51AACFA64EEA5A9B766B69A569A0C3B8605CF22B0212E61C8B6D553325A5A07A78
5,758,119 UART: [art] SIG.R = 68F9393AACC460C807533721F4C8EDCBD30208EBF5D953391B866F16C549F53ED12045CF0777EB1A5A70FD69CCC6DAE2
5,764,889 UART: [art] SIG.S = F0390E66B276C77EC96DFF245644FB9125D9B28318EB89C7E1D27114143581CE608AD901124879F31F4921E7E8A3652E
5,788,813 UART: Caliptra RT
5,789,064 UART: [state] CFI Enabled
6,149,555 UART: [rt] RT failed reset flow
6,149,986 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,893 ready_for_fw is high
1,060,893 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,220,355 >>> mbox cmd response: success
2,220,355 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,282,108 UART:
2,282,124 UART: Running Caliptra FMC ...
2,282,532 UART:
2,282,586 UART: [state] CFI Enabled
2,292,856 UART: [fht] FMC Alias Private Key: 7
2,411,856 UART: [art] Extend RT PCRs Done
2,412,284 UART: [art] Lock RT PCRs Done
2,413,964 UART: [art] Populate DV Done
2,422,133 UART: [fht] FMC Alias Private Key: 7
2,423,211 UART: [art] Derive CDI
2,423,491 UART: [art] Store in slot 0x4
2,509,072 UART: [art] Derive Key Pair
2,509,432 UART: [art] Store priv key in slot 0x5
2,523,062 UART: [art] Derive Key Pair - Done
2,537,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,916 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,681 UART: [art] PUB.X = D21F863C0EB52B4B26D2B8906C99706500F0918B706DA9019F10BF9BF75E65C896092A9922794025ACB873DF0F8FDC8D
2,560,419 UART: [art] PUB.Y = 1E83C795D52B44CA5CD15CF363A52F5BE413CEEC11B7245C77016C35E76921377AB3FDB2211B765945B61034252DA1DF
2,567,370 UART: [art] SIG.R = C70288D1505D5C80D8F01A03372CD06993895EA89981601F2338EA8015663F8F8C626B49E2C1721DC60D1F3AFCE2A48B
2,574,129 UART: [art] SIG.S = 1C6825C99BC8BEB1AE7A429DD4D59FB15E627D3AA0F2D5E0DB25788F2FCF292EB4479954F7C7C739997BE309E889FC48
2,597,968 UART: mbox::rt_entry...
2,598,340 UART: ____ _ _ _ ____ _____
2,599,124 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,924 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,692 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,601,460 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,602,228 UART: |_|
2,602,540 UART:
2,720,424 UART: [rt] Runtime listening for mailbox commands...
2,721,663 >>> mbox cmd response data (0 bytes)
2,721,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,210,872 >>> mbox cmd response: success
5,224,301 UART:
5,224,317 UART: Running Caliptra FMC ...
5,224,725 UART:
5,224,779 UART: [state] CFI Enabled
5,313,704 UART: [art] Extend RT PCRs Done
5,314,132 UART: [art] Lock RT PCRs Done
5,315,291 UART: [art] Populate DV Done
5,323,788 UART: [fht] FMC Alias Private Key: 7
5,324,916 UART: [art] Derive CDI
5,325,196 UART: [art] Store in slot 0x4
5,410,981 UART: [art] Derive Key Pair
5,411,341 UART: [art] Store priv key in slot 0x5
5,424,751 UART: [art] Derive Key Pair - Done
5,439,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,453,844 UART: [art] Erasing AUTHORITY.KEYID = 7
5,454,609 UART: [art] PUB.X = FEBED3B2F5B2E35637C558457393FB30E76847A23FA965F1A223FA3C56CE86EBACFD6599C03D97BD8A588BDC25AB0130
5,461,392 UART: [art] PUB.Y = 962F3167F537DCA1DCF4BA13ED1376047FC0934FCD63D29E354F1A4577B454E291CE8AB3A96BD78816669F073FEA6ABF
5,468,348 UART: [art] SIG.R = CCA81EF63318E9C34892299DD4B39FF1BA3CECCAC1F397CE567DD6070B6A5F9B0AF4B1C02E4CE8048A98587B773DA067
5,475,124 UART: [art] SIG.S = AF2FA888721B3A4376B32D4A1D576FE6877F8361B8F4D74292E30381E053DC9AC45C083EC8A544E2012B0A6AC4408615
5,498,948 UART: Caliptra RT
5,499,199 UART: [state] CFI Enabled
5,865,551 UART: [rt] RT failed reset flow
5,865,982 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,808 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
893,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,834 UART: [kat] ++
897,986 UART: [kat] sha1
902,414 UART: [kat] SHA2-256
904,354 UART: [kat] SHA2-384
907,149 UART: [kat] SHA2-512-ACC
909,050 UART: [kat] ECC-384
918,847 UART: [kat] HMAC-384Kdf
923,469 UART: [kat] LMS
1,171,797 UART: [kat] --
1,172,606 UART: [cold-reset] ++
1,172,980 UART: [fht] FHT @ 0x50003400
1,175,625 UART: [idev] ++
1,175,793 UART: [idev] CDI.KEYID = 6
1,176,153 UART: [idev] SUBJECT.KEYID = 7
1,176,577 UART: [idev] UDS.KEYID = 0
1,176,922 ready_for_fw is high
1,176,922 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,455 UART: [idev] Erasing UDS.KEYID = 0
1,201,264 UART: [idev] Sha1 KeyId Algorithm
1,209,590 UART: [idev] --
1,210,696 UART: [ldev] ++
1,210,864 UART: [ldev] CDI.KEYID = 6
1,211,227 UART: [ldev] SUBJECT.KEYID = 5
1,211,653 UART: [ldev] AUTHORITY.KEYID = 7
1,212,116 UART: [ldev] FE.KEYID = 1
1,217,336 UART: [ldev] Erasing FE.KEYID = 1
1,244,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,503 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,215 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,685 UART: [fwproc] Wait for Commands...
1,284,399 UART: [fwproc] Recv command 0x46574c44
1,285,127 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,393 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,184 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,354 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,063 >>> mbox cmd response: success
2,366,063 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,367,297 UART: [afmc] ++
2,367,465 UART: [afmc] CDI.KEYID = 6
2,367,827 UART: [afmc] SUBJECT.KEYID = 7
2,368,252 UART: [afmc] AUTHORITY.KEYID = 5
2,404,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,624 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,421,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,427,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,964 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,665 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,446,601 UART: [afmc] --
2,447,623 UART: [cold-reset] --
2,448,673 UART: [state] Locking Datavault
2,449,976 UART: [state] Locking PCR0, PCR1 and PCR31
2,450,580 UART: [state] Locking ICCM
2,451,130 UART: [exit] Launching FMC @ 0x40000130
2,456,460 UART:
2,456,476 UART: Running Caliptra FMC ...
2,456,884 UART:
2,457,027 UART: [state] CFI Enabled
2,467,383 UART: [fht] FMC Alias Private Key: 7
2,585,809 UART: [art] Extend RT PCRs Done
2,586,237 UART: [art] Lock RT PCRs Done
2,587,557 UART: [art] Populate DV Done
2,595,988 UART: [fht] FMC Alias Private Key: 7
2,597,120 UART: [art] Derive CDI
2,597,400 UART: [art] Store in slot 0x4
2,683,225 UART: [art] Derive Key Pair
2,683,585 UART: [art] Store priv key in slot 0x5
2,697,015 UART: [art] Derive Key Pair - Done
2,711,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,522 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,287 UART: [art] PUB.X = C1C7A337A9227703F80EA9DF2719BF5BDAB4D10227B21D5D4B0E7512537D7032F22144FFE481C7A59EEBFF2C3FF1F165
2,735,057 UART: [art] PUB.Y = 26A5A01974B6AE8CCCFC54CD53295BD6FAA0877003AF724BC3CF0192C6AFD914EEBF4D62CE76D7AB7755C093F6A204EC
2,742,020 UART: [art] SIG.R = DAFF5DD9383BDEA698E6DE1FDC19778FC09284B63738D2CBE5BA53F53E0F6E8E9A29EDC90E3B584898E9560DA3780313
2,748,794 UART: [art] SIG.S = AAACB3FBC634E85BD96BD7232EB9EB95E216AD47DAE48CFDFC311EF6BF305550BA72D719BFB175BBF9DFBBCD877CAAD4
2,771,876 UART: mbox::rt_entry...
2,772,248 UART: ____ _ _ _ ____ _____
2,773,032 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,773,832 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,600 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,368 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,136 UART: |_|
2,776,448 UART:
2,893,547 UART: [rt] Runtime listening for mailbox commands...
2,894,786 >>> mbox cmd response data (0 bytes)
2,894,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,894,899 UART:
2,894,915 UART: Running Caliptra ROM ...
2,895,323 UART:
2,895,465 UART: [state] CFI Enabled
2,898,215 UART: [state] LifecycleState = Unprovisioned
2,898,870 UART: [state] DebugLocked = No
2,899,382 UART: [state] WD Timer not started. Device not locked for debugging
2,900,652 UART: [kat] SHA2-256
3,706,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,710,427 UART: [kat] ++
3,710,579 UART: [kat] sha1
3,714,857 UART: [kat] SHA2-256
3,716,797 UART: [kat] SHA2-384
3,719,580 UART: [kat] SHA2-512-ACC
3,721,480 UART: [kat] ECC-384
3,731,243 UART: [kat] HMAC-384Kdf
3,735,927 UART: [kat] LMS
3,984,255 UART: [kat] --
3,985,319 UART: [update-reset] ++
5,345,115 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,346,228 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,501,443 >>> mbox cmd response: success
5,501,766 UART: [update-reset] Copying MAN_2 To MAN_1
5,509,780 UART: [update-reset Success] --
5,510,807 UART: [state] Locking Datavault
5,511,649 UART: [state] Locking PCR0, PCR1 and PCR31
5,512,253 UART: [state] Locking ICCM
5,512,761 UART: [exit] Launching FMC @ 0x40000130
5,518,091 UART:
5,518,107 UART: Running Caliptra FMC ...
5,518,515 UART:
5,518,658 UART: [state] CFI Enabled
5,608,319 UART: [art] Extend RT PCRs Done
5,608,747 UART: [art] Lock RT PCRs Done
5,609,886 UART: [art] Populate DV Done
5,618,197 UART: [fht] FMC Alias Private Key: 7
5,619,265 UART: [art] Derive CDI
5,619,545 UART: [art] Store in slot 0x4
5,705,404 UART: [art] Derive Key Pair
5,705,764 UART: [art] Store priv key in slot 0x5
5,719,198 UART: [art] Derive Key Pair - Done
5,733,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,749,125 UART: [art] Erasing AUTHORITY.KEYID = 7
5,749,890 UART: [art] PUB.X = 1FAF88C04B010FFE2F205D632795A3532371614AD845FF478C22D0883E897868E43E2802529CAB73E7C7C2B198AEB2AD
5,756,653 UART: [art] PUB.Y = 4A2B5D2877161FFC282AB83DDAA7AF8B4D8182FAC51F0ECEA0E2CE514F4D0ED9E471CABC805D7A3329902E4ED881F59A
5,763,621 UART: [art] SIG.R = 10AA8CF7F3F7B91C2F8493C8687EFEB1636C8957364A6342FABD4C7A014C00959959F6C6D7FD991017081E3E4C38EC8F
5,770,369 UART: [art] SIG.S = 578F5EFBD6965F3AB49EF97A889B4FD5F3892D507D94E92F44CCC93E334B04284F69601D33BA52C6F7F4D60370643592
5,794,351 UART: Caliptra RT
5,794,694 UART: [state] CFI Enabled
6,162,066 UART: [rt] RT failed reset flow
6,162,497 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,214 ready_for_fw is high
1,060,214 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,232 >>> mbox cmd response: success
2,218,232 <<< Executing mbox cmd 0x80000000 (128 bytes) from SoC
2,281,127 UART:
2,281,143 UART: Running Caliptra FMC ...
2,281,551 UART:
2,281,694 UART: [state] CFI Enabled
2,292,698 UART: [fht] FMC Alias Private Key: 7
2,412,282 UART: [art] Extend RT PCRs Done
2,412,710 UART: [art] Lock RT PCRs Done
2,414,354 UART: [art] Populate DV Done
2,422,513 UART: [fht] FMC Alias Private Key: 7
2,423,599 UART: [art] Derive CDI
2,423,879 UART: [art] Store in slot 0x4
2,509,456 UART: [art] Derive Key Pair
2,509,816 UART: [art] Store priv key in slot 0x5
2,523,916 UART: [art] Derive Key Pair - Done
2,538,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,553,978 UART: [art] Erasing AUTHORITY.KEYID = 7
2,554,743 UART: [art] PUB.X = CD58EF91FEFF6DDA8B594539135819649D619A222E1C75CC4DAB74F647BCA4A4F79935A7CE6A0C8BE778CBBEA641B833
2,561,528 UART: [art] PUB.Y = BADC9D58607D2B00E71EA6E3AFA94E02A55F6364B07AA38935F64BECBBFB4B2335FB0531B76410E50B360A6946804BC5
2,568,456 UART: [art] SIG.R = 7BFF15F153D7FEC776DBA97B4CB93863CF2C66BC35FE5BA41C224AC55A2F54166C3509D994D617CC0ACBC884534BAA68
2,575,238 UART: [art] SIG.S = C921BAED1DFA4933B28A2BA4E5EF2AA96764551CFB714C9E95FBC69EC1E24DDCB00408F8ACBFE4A27A06E75BEDB28C9C
2,598,873 UART: mbox::rt_entry...
2,599,245 UART: ____ _ _ _ ____ _____
2,600,029 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,600,829 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,601,597 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,602,365 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,603,133 UART: |_|
2,603,445 UART:
2,722,325 UART: [rt] Runtime listening for mailbox commands...
2,723,564 >>> mbox cmd response data (0 bytes)
2,723,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,213,788 >>> mbox cmd response: success
5,227,069 UART:
5,227,085 UART: Running Caliptra FMC ...
5,227,493 UART:
5,227,636 UART: [state] CFI Enabled
5,316,897 UART: [art] Extend RT PCRs Done
5,317,325 UART: [art] Lock RT PCRs Done
5,318,730 UART: [art] Populate DV Done
5,326,919 UART: [fht] FMC Alias Private Key: 7
5,327,933 UART: [art] Derive CDI
5,328,213 UART: [art] Store in slot 0x4
5,414,092 UART: [art] Derive Key Pair
5,414,452 UART: [art] Store priv key in slot 0x5
5,428,056 UART: [art] Derive Key Pair - Done
5,442,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,458,007 UART: [art] Erasing AUTHORITY.KEYID = 7
5,458,772 UART: [art] PUB.X = 58B44BE83B44CD2C87ED57B6EC98DF72EA79E4089B6DAA01D8BD96B66A58C9E760E60856E4F67B634C83FBE16A103041
5,465,545 UART: [art] PUB.Y = 381CCE85B1D0B082F798EF73D03FA1718C70D79BC90CC58755EE98A4072F17732C25C1D7E05F5E6878993684CAD5770B
5,472,488 UART: [art] SIG.R = 86FDA227BA28BCA666D75B58D9CA7F93D9AD7DB53DFE533F14F89AAB35E3D19D250856A2E7ECFAC527CCDD89BE837BD7
5,479,283 UART: [art] SIG.S = E28D9EEB951FAC79A04BE05545809892AFB791A128540B24AD2E6070B075337DDDC71D6BAE37A547B370A7D33EB2AC10
5,502,634 UART: Caliptra RT
5,502,977 UART: [state] CFI Enabled
5,867,637 UART: [rt] RT failed reset flow
5,868,068 UART: Fatal Error: 0x000E0025
test test_update_reset::test_context_tags_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,224 UART:
192,576 UART: Running Caliptra ROM ...
193,775 UART:
193,933 UART: [state] CFI Enabled
263,764 UART: [state] LifecycleState = Unprovisioned
265,688 UART: [state] DebugLocked = No
267,718 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,243 UART: [kat] SHA2-256
441,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,411 UART: [kat] ++
452,907 UART: [kat] sha1
464,657 UART: [kat] SHA2-256
467,289 UART: [kat] SHA2-384
471,796 UART: [kat] SHA2-512-ACC
474,162 UART: [kat] ECC-384
2,767,881 UART: [kat] HMAC-384Kdf
2,798,616 UART: [kat] LMS
3,988,907 UART: [kat] --
3,992,919 UART: [cold-reset] ++
3,995,062 UART: [fht] Storing FHT @ 0x50003400
4,006,044 UART: [idev] ++
4,006,635 UART: [idev] CDI.KEYID = 6
4,007,565 UART: [idev] SUBJECT.KEYID = 7
4,008,816 UART: [idev] UDS.KEYID = 0
4,009,899 ready_for_fw is high
4,010,118 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,114,462 UART: [idev] Erasing UDS.KEYID = 0
7,346,257 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,912 UART: [idev] --
7,373,145 UART: [ldev] ++
7,373,713 UART: [ldev] CDI.KEYID = 6
7,374,675 UART: [ldev] SUBJECT.KEYID = 5
7,375,896 UART: [ldev] AUTHORITY.KEYID = 7
7,377,130 UART: [ldev] FE.KEYID = 1
7,422,209 UART: [ldev] Erasing FE.KEYID = 1
10,755,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,568 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,915 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,785 UART: [ldev] --
13,114,087 UART: [fwproc] Waiting for Commands...
13,117,161 UART: [fwproc] Received command 0x46574c44
13,119,342 UART: [fwproc] Received Image of size 82832 bytes
16,789,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,868,713 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,941,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,145,004 >>> mbox cmd response: success
17,146,059 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,149,168 UART: [afmc] ++
17,149,815 UART: [afmc] CDI.KEYID = 6
17,150,725 UART: [afmc] SUBJECT.KEYID = 7
17,151,943 UART: [afmc] AUTHORITY.KEYID = 5
20,524,000 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,837,788 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,840,053 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,854,475 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,869,229 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,883,640 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,904,440 UART: [afmc] --
22,907,490 UART: [cold-reset] --
22,911,451 UART: [state] Locking Datavault
22,916,152 UART: [state] Locking PCR0, PCR1 and PCR31
22,917,896 UART: [state] Locking ICCM
22,919,694 UART: [exit] Launching FMC @ 0x40000130
22,928,084 UART:
22,928,322 UART: Running Caliptra FMC ...
22,929,421 UART:
22,929,577 UART: [state] CFI Enabled
22,999,100 UART: [fht] FMC Alias Private Key: 7
25,340,212 UART: [art] Extend RT PCRs Done
25,341,435 UART: [art] Lock RT PCRs Done
25,342,795 UART: [art] Populate DV Done
25,348,042 UART: [fht] FMC Alias Private Key: 7
25,349,584 UART: [art] Derive CDI
25,350,397 UART: [art] Store in slot 0x4
25,408,222 UART: [art] Derive Key Pair
25,409,220 UART: [art] Store priv key in slot 0x5
28,702,345 UART: [art] Derive Key Pair - Done
28,715,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,003,652 UART: [art] Erasing AUTHORITY.KEYID = 7
31,005,165 UART: [art] PUB.X = 7869E352E8B3CA945BCE90E244FE4EE8BD722869745B606EE678446FCD4E5134784CA5C45DEA184F081A4839BAF56604
31,012,464 UART: [art] PUB.Y = 747C6F3319430EB6637347A45B534B99462A070796A61CC08FCB06EB9936C8DA9B3350A7BED648B969F2D710298ADBAA
31,019,719 UART: [art] SIG.R = B4F877CBC5E6B36B515F23C475EF44DCAA09B891F547E079F8CF211E7E552ED829A8B1B0444CA81C887D5DAD851506AF
31,027,116 UART: [art] SIG.S = 922A9F6F729920BF34C1DA1D4E770E2190A622F5379159943ED27D172D683BF549D2B7F4D569BC42947AD10EF284F967
32,331,803 UART: mbox::rt_entry...
32,332,748 UART: ____ _ _ _ ____ _____
32,334,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,336,731 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,338,660 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,340,591 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,342,517 UART: |_|
32,343,406 UART:
32,474,301 UART: [rt] Runtime listening for mailbox commands...
32,481,513 >>> mbox cmd response data (4360 bytes)
32,502,105 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,546,476 >>> mbox cmd response data (0 bytes)
34,627,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,777,876 UART:
34,778,251 UART: Running Caliptra ROM ...
34,779,301 UART:
34,779,458 UART: [state] CFI Enabled
34,857,564 UART: [state] LifecycleState = Unprovisioned
34,859,529 UART: [state] DebugLocked = No
34,861,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,866,394 UART: [kat] SHA2-256
35,036,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,046,601 UART: [kat] ++
35,047,060 UART: [kat] sha1
35,058,437 UART: [kat] SHA2-256
35,061,091 UART: [kat] SHA2-384
35,065,544 UART: [kat] SHA2-512-ACC
35,067,956 UART: [kat] ECC-384
37,357,499 UART: [kat] HMAC-384Kdf
37,371,035 UART: [kat] LMS
38,561,361 UART: [kat] --
38,563,946 UART: [update-reset] ++
42,764,017 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,767,644 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,165,398 >>> mbox cmd response: success
43,170,056 UART: [update-reset] Copying MAN_2 To MAN_1
43,189,132 UART: [update-reset Success] --
43,194,619 UART: [state] Locking Datavault
43,197,861 UART: [state] Locking PCR0, PCR1 and PCR31
43,199,636 UART: [state] Locking ICCM
43,201,278 UART: [exit] Launching FMC @ 0x40000130
43,209,678 UART:
43,209,910 UART: Running Caliptra FMC ...
43,210,934 UART:
43,211,080 UART: [state] CFI Enabled
43,311,633 UART: [art] Extend RT PCRs Done
43,312,825 UART: [art] Lock RT PCRs Done
43,314,258 UART: [art] Populate DV Done
43,319,885 UART: [fht] FMC Alias Private Key: 7
43,321,537 UART: [art] Derive CDI
43,322,274 UART: [art] Store in slot 0x4
43,380,520 UART: [art] Derive Key Pair
43,381,563 UART: [art] Store priv key in slot 0x5
46,673,779 UART: [art] Derive Key Pair - Done
46,686,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,974,944 UART: [art] Erasing AUTHORITY.KEYID = 7
48,976,447 UART: [art] PUB.X = 389C5A26A3EF783C33EF599DF569E4E5531796C45B47DB58A7E5E7B87E06A0A5977FB48C9F25833DDD95CC6FF2C31451
48,983,751 UART: [art] PUB.Y = 0CE6AE00F9807C04FF72939F511B67ADE4DA0ADA21C585C4AC21B253C48F74A13A09B130DCC59B876C88DB8CB168FB18
48,991,030 UART: [art] SIG.R = 40F946B7C2473EDE0245AC9AFE44FDDD972BC7B28B0A8AECF26390B30197FC27443DD0EF24BF2CC1D581F40B832C4EDF
48,998,417 UART: [art] SIG.S = 65E324C2E3A1BCA862CBC5E27575D237FA13E689F942D644D048B1572D26AC13F1CBE900A9572BB9BB1E67D878AB6DD7
50,303,839 UART: Caliptra RT
50,305,019 UART: [state] CFI Enabled
54,013,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,014,451 UART: [rt] RT listening for mailbox commands...
54,046,026 UART: [rt]cmd =0x494e464f, len=4
54,050,411 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
3,784,616 ready_for_fw is high
3,785,091 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,239,312 >>> mbox cmd response: success
17,240,586 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,928,110 UART:
22,928,512 UART: Running Caliptra FMC ...
22,929,658 UART:
22,929,818 UART: [state] CFI Enabled
22,997,336 UART: [fht] FMC Alias Private Key: 7
25,338,026 UART: [art] Extend RT PCRs Done
25,339,261 UART: [art] Lock RT PCRs Done
25,340,831 UART: [art] Populate DV Done
25,346,460 UART: [fht] FMC Alias Private Key: 7
25,348,052 UART: [art] Derive CDI
25,348,867 UART: [art] Store in slot 0x4
25,406,367 UART: [art] Derive Key Pair
25,407,362 UART: [art] Store priv key in slot 0x5
28,699,928 UART: [art] Derive Key Pair - Done
28,712,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,002,397 UART: [art] Erasing AUTHORITY.KEYID = 7
31,003,919 UART: [art] PUB.X = 40124470EF2F689A8660BA8DDA41047F61ECBDF89C5C6ECEFB3B7E586AA7548B15C8B3DD1C09D708BFA2F4710D79034F
31,011,190 UART: [art] PUB.Y = DF78C515FA580764FC632AC013B98E38E2CD70EAD8C12E02A7765D9DB437750D75E5E678BAA472DBFDD5028433B0DBBB
31,018,467 UART: [art] SIG.R = 5EAF704F2D2F4DDBB9EB6D9ABC5C228FF9FA94B610DEF27878F3F50211AFCAB7A5FB4C6ADE855C2BAFC6510AF89FFE1C
31,025,880 UART: [art] SIG.S = F650C11785C2223AE69D9A374B9C593BC8FB0BD322861182EE028192646B0C1914921079204CBDB49F86023C466C3DC3
32,330,455 UART: mbox::rt_entry...
32,331,413 UART: ____ _ _ _ ____ _____
32,333,397 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,335,414 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,337,354 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,339,346 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,341,200 UART: |_|
32,341,999 UART:
32,472,274 UART: [rt] Runtime listening for mailbox commands...
32,479,440 >>> mbox cmd response data (4360 bytes)
32,500,036 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,544,423 >>> mbox cmd response data (0 bytes)
34,625,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,427,754 >>> mbox cmd response: success
43,460,353 UART:
43,460,665 UART: Running Caliptra FMC ...
43,461,789 UART:
43,461,969 UART: [state] CFI Enabled
43,556,396 UART: [art] Extend RT PCRs Done
43,557,605 UART: [art] Lock RT PCRs Done
43,559,072 UART: [art] Populate DV Done
43,564,597 UART: [fht] FMC Alias Private Key: 7
43,566,134 UART: [art] Derive CDI
43,566,898 UART: [art] Store in slot 0x4
43,625,751 UART: [art] Derive Key Pair
43,626,812 UART: [art] Store priv key in slot 0x5
46,919,701 UART: [art] Derive Key Pair - Done
46,933,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,221,371 UART: [art] Erasing AUTHORITY.KEYID = 7
49,222,883 UART: [art] PUB.X = 0232C9B614A0E2CAFAD3F115E437AA2BCE8E0E77E83CB7DA4A898C2DF73245A4A43E37015B8C1BD0323708E31D7E9523
49,230,199 UART: [art] PUB.Y = 24558BF96EEE038134C88A92E54D206767BE62E2AEDE55086CA848FD18513F43721F848E4D9B8C438B0C3222EF2C10B6
49,237,385 UART: [art] SIG.R = ED223C777B905731C55918DA3B379F10D2CD6073D04F3B36A35E95684A9E5D0AB6BE6D3B0F995E353B39A40D05FE662C
49,244,774 UART: [art] SIG.S = C5676840A75F86F0FF2F361B193619E71889B7F680EEAC734221D28086573B80CC97C45AD49974D42E8EFE20578D0380
50,549,895 UART: Caliptra RT
50,550,613 UART: [state] CFI Enabled
54,257,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,259,136 UART: [rt] RT listening for mailbox commands...
54,290,311 UART: [rt]cmd =0x494e464f, len=4
54,294,652 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,326 UART:
192,692 UART: Running Caliptra ROM ...
193,815 UART:
603,311 UART: [state] CFI Enabled
617,749 UART: [state] LifecycleState = Unprovisioned
619,692 UART: [state] DebugLocked = No
621,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,787 UART: [kat] SHA2-256
795,514 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,024 UART: [kat] ++
806,504 UART: [kat] sha1
816,094 UART: [kat] SHA2-256
818,825 UART: [kat] SHA2-384
824,669 UART: [kat] SHA2-512-ACC
827,027 UART: [kat] ECC-384
3,110,606 UART: [kat] HMAC-384Kdf
3,121,486 UART: [kat] LMS
4,311,616 UART: [kat] --
4,315,011 UART: [cold-reset] ++
4,317,447 UART: [fht] Storing FHT @ 0x50003400
4,328,988 UART: [idev] ++
4,329,542 UART: [idev] CDI.KEYID = 6
4,330,442 UART: [idev] SUBJECT.KEYID = 7
4,331,674 UART: [idev] UDS.KEYID = 0
4,332,667 ready_for_fw is high
4,332,867 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,437,151 UART: [idev] Erasing UDS.KEYID = 0
7,615,145 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,647 UART: [idev] --
7,642,322 UART: [ldev] ++
7,642,895 UART: [ldev] CDI.KEYID = 6
7,643,905 UART: [ldev] SUBJECT.KEYID = 5
7,645,056 UART: [ldev] AUTHORITY.KEYID = 7
7,646,334 UART: [ldev] FE.KEYID = 1
7,655,046 UART: [ldev] Erasing FE.KEYID = 1
10,941,551 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,874 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,835 UART: [ldev] --
13,303,657 UART: [fwproc] Waiting for Commands...
13,306,928 UART: [fwproc] Received command 0x46574c44
13,309,107 UART: [fwproc] Received Image of size 82832 bytes
16,975,704 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,047,892 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,121,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,323,720 >>> mbox cmd response: success
17,324,769 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,327,665 UART: [afmc] ++
17,328,258 UART: [afmc] CDI.KEYID = 6
17,329,272 UART: [afmc] SUBJECT.KEYID = 7
17,330,427 UART: [afmc] AUTHORITY.KEYID = 5
20,647,032 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,939,147 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,941,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,955,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,970,573 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,984,965 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,007,553 UART: [afmc] --
23,011,913 UART: [cold-reset] --
23,017,446 UART: [state] Locking Datavault
23,023,127 UART: [state] Locking PCR0, PCR1 and PCR31
23,024,879 UART: [state] Locking ICCM
23,026,376 UART: [exit] Launching FMC @ 0x40000130
23,034,768 UART:
23,035,015 UART: Running Caliptra FMC ...
23,036,115 UART:
23,036,275 UART: [state] CFI Enabled
23,044,372 UART: [fht] FMC Alias Private Key: 7
25,384,078 UART: [art] Extend RT PCRs Done
25,385,298 UART: [art] Lock RT PCRs Done
25,386,921 UART: [art] Populate DV Done
25,392,223 UART: [fht] FMC Alias Private Key: 7
25,393,746 UART: [art] Derive CDI
25,394,508 UART: [art] Store in slot 0x4
25,437,627 UART: [art] Derive Key Pair
25,438,616 UART: [art] Store priv key in slot 0x5
28,680,337 UART: [art] Derive Key Pair - Done
28,693,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,973,306 UART: [art] Erasing AUTHORITY.KEYID = 7
30,974,816 UART: [art] PUB.X = F46E36F1997B44616B7C4AC2D28527558BBB59DAAED9D24D08005C4A4D58151A358A91C520C1CD5A170A53C7DD03F40F
30,982,069 UART: [art] PUB.Y = 38F67B05768C7C84D99F7BC5A4B0BEA19328108E03594C04F5BF3E2FA8B7A8221A9158F6C0561972D5109421B090E96A
30,989,476 UART: [art] SIG.R = 1E64EAEFE2761F20D67F2845040C335121688CCF70E4F429418925912CDAD8205DD0CC04DE36E7124F0F6C2598A39C4E
30,996,720 UART: [art] SIG.S = 8352D74E054710343E78C20DF3E78601BD48AAEEE68835FC8A9AAC895E11C2D0629FC466AB0C3EDEC6D174D03F49617B
32,301,070 UART: mbox::rt_entry...
32,302,038 UART: ____ _ _ _ ____ _____
32,303,957 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,305,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,307,891 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,309,818 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,311,738 UART: |_|
32,312,543 UART:
32,443,523 UART: [rt] Runtime listening for mailbox commands...
32,450,740 >>> mbox cmd response data (4360 bytes)
32,471,281 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,515,650 >>> mbox cmd response data (0 bytes)
34,588,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,738,889 UART:
34,739,244 UART: Running Caliptra ROM ...
34,740,327 UART:
34,740,540 UART: [state] CFI Enabled
34,756,767 UART: [state] LifecycleState = Unprovisioned
34,758,693 UART: [state] DebugLocked = No
34,760,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,765,733 UART: [kat] SHA2-256
34,935,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,945,971 UART: [kat] ++
34,946,448 UART: [kat] sha1
34,956,845 UART: [kat] SHA2-256
34,959,535 UART: [kat] SHA2-384
34,965,087 UART: [kat] SHA2-512-ACC
34,967,434 UART: [kat] ECC-384
37,250,607 UART: [kat] HMAC-384Kdf
37,260,992 UART: [kat] LMS
38,451,057 UART: [kat] --
38,456,631 UART: [update-reset] ++
42,648,977 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,653,180 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,050,917 >>> mbox cmd response: success
43,055,602 UART: [update-reset] Copying MAN_2 To MAN_1
43,074,704 UART: [update-reset Success] --
43,078,403 UART: [state] Locking Datavault
43,082,258 UART: [state] Locking PCR0, PCR1 and PCR31
43,084,013 UART: [state] Locking ICCM
43,086,551 UART: [exit] Launching FMC @ 0x40000130
43,094,958 UART:
43,095,193 UART: Running Caliptra FMC ...
43,096,292 UART:
43,096,444 UART: [state] CFI Enabled
43,140,992 UART: [art] Extend RT PCRs Done
43,142,129 UART: [art] Lock RT PCRs Done
43,143,627 UART: [art] Populate DV Done
43,148,970 UART: [fht] FMC Alias Private Key: 7
43,150,595 UART: [art] Derive CDI
43,151,339 UART: [art] Store in slot 0x4
43,193,945 UART: [art] Derive Key Pair
43,194,947 UART: [art] Store priv key in slot 0x5
46,437,432 UART: [art] Derive Key Pair - Done
46,450,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,731,304 UART: [art] Erasing AUTHORITY.KEYID = 7
48,732,811 UART: [art] PUB.X = 53C8A2E8F49A66416E554D4F64C883DCDECEC59222393B7F0DF0E048430D3772D8EA853FA1B892978029771D76E17F53
48,740,065 UART: [art] PUB.Y = BB2C246F555A6C8AB8697CC4354F50EFBD808059B13BF97D438720ECA55064F245571B48A3A8144623C691B704D2C98C
48,747,317 UART: [art] SIG.R = F0EE7489EBF443706A8CFD7A93AC314470F1E82D0C63D2961F86331DBC32C5B2B23715D1B312FB5667680F25B0C0EF3A
48,754,756 UART: [art] SIG.S = 0A5CE25DED97849C8813AA6444F53EE2264A28AC960834BC5D3A0ECDE2764AEBB9DB5A6466E438386671AE32282E8957
50,060,014 UART: Caliptra RT
50,060,735 UART: [state] CFI Enabled
53,671,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,673,223 UART: [rt] RT listening for mailbox commands...
53,704,497 UART: [rt]cmd =0x494e464f, len=4
53,709,030 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
4,126,759 ready_for_fw is high
4,127,195 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,436,939 >>> mbox cmd response: success
17,438,043 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,079,072 UART:
23,079,463 UART: Running Caliptra FMC ...
23,080,594 UART:
23,080,752 UART: [state] CFI Enabled
23,088,607 UART: [fht] FMC Alias Private Key: 7
25,429,256 UART: [art] Extend RT PCRs Done
25,430,479 UART: [art] Lock RT PCRs Done
25,432,373 UART: [art] Populate DV Done
25,437,575 UART: [fht] FMC Alias Private Key: 7
25,439,214 UART: [art] Derive CDI
25,440,023 UART: [art] Store in slot 0x4
25,482,891 UART: [art] Derive Key Pair
25,483,925 UART: [art] Store priv key in slot 0x5
28,725,216 UART: [art] Derive Key Pair - Done
28,738,169 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,018,400 UART: [art] Erasing AUTHORITY.KEYID = 7
31,019,916 UART: [art] PUB.X = 278C71925E3765FABF2888F950846FFA88DE507D376BF3BB4CD28E6D91A402C758235CE253BD3DD9D4EC5BB3844F7954
31,027,162 UART: [art] PUB.Y = 9E161D9AE4A80902FF6530B8F3145901DA52A7FDA0677D3C53DE558A7F9C1DBDBA01829633CB80F92B538C120F29B365
31,034,441 UART: [art] SIG.R = 6732F0FBBC5B644CDEF71487C26A3734CFC1DC121AC15F74C3FD11EE9AD6BE16B5A2B040524B5AA858C4A5FAB88625BE
31,041,844 UART: [art] SIG.S = AFA5B7340C56E26007D9C3D43E508364B47C51C5979735D10570AF31E72BF07874D97C6C4B3DB312DCA4C105F84E2C54
32,346,928 UART: mbox::rt_entry...
32,347,884 UART: ____ _ _ _ ____ _____
32,349,864 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,351,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,353,785 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,356,053 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,357,998 UART: |_|
32,358,804 UART:
32,489,968 UART: [rt] Runtime listening for mailbox commands...
32,497,173 >>> mbox cmd response data (4360 bytes)
32,517,910 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,562,280 >>> mbox cmd response data (0 bytes)
34,632,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,387,549 >>> mbox cmd response: success
43,420,659 UART:
43,420,985 UART: Running Caliptra FMC ...
43,422,036 UART:
43,422,187 UART: [state] CFI Enabled
43,466,048 UART: [art] Extend RT PCRs Done
43,467,199 UART: [art] Lock RT PCRs Done
43,468,726 UART: [art] Populate DV Done
43,474,177 UART: [fht] FMC Alias Private Key: 7
43,475,871 UART: [art] Derive CDI
43,476,633 UART: [art] Store in slot 0x4
43,519,346 UART: [art] Derive Key Pair
43,520,346 UART: [art] Store priv key in slot 0x5
46,762,224 UART: [art] Derive Key Pair - Done
46,775,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,055,227 UART: [art] Erasing AUTHORITY.KEYID = 7
49,056,767 UART: [art] PUB.X = 4361A9F3416EE5485BE28DC71985A2CC73BDC975ECD3BD6B120E8579FC020BE08C80099D6CFF1788C9E6524C812D931E
49,064,026 UART: [art] PUB.Y = 192BD1245A01615160C73DA581A6F5FE95B72D6D9EEA66E655D652101D56780D3720C5F5BC7804118C754F66D9D969A3
49,071,268 UART: [art] SIG.R = 65FAABFC9A49F4E738753019BB00A486B11C0BD8E30E30EB761033405B0247026E193BFAF692F3A32F42D8DF7B74CE6F
49,078,644 UART: [art] SIG.S = 59CB25AD2C9CE2BB467838B23CCDF9C3FFBE10C5E32E9767217FA7FAF541EAA9B718D28DD05C33E37F868F2F349D3075
50,383,910 UART: Caliptra RT
50,384,621 UART: [state] CFI Enabled
53,992,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,994,220 UART: [rt] RT listening for mailbox commands...
54,025,773 UART: [rt]cmd =0x494e464f, len=4
54,029,962 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,314 UART:
192,688 UART: Running Caliptra ROM ...
193,859 UART:
194,010 UART: [state] CFI Enabled
264,809 UART: [state] LifecycleState = Unprovisioned
266,721 UART: [state] DebugLocked = No
268,468 UART: [state] WD Timer not started. Device not locked for debugging
272,496 UART: [kat] SHA2-256
452,154 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,893 UART: [kat] ++
463,335 UART: [kat] sha1
474,276 UART: [kat] SHA2-256
476,992 UART: [kat] SHA2-384
482,052 UART: [kat] SHA2-512-ACC
484,413 UART: [kat] ECC-384
2,947,529 UART: [kat] HMAC-384Kdf
2,972,747 UART: [kat] LMS
3,449,210 UART: [kat] --
3,454,277 UART: [cold-reset] ++
3,456,025 UART: [fht] FHT @ 0x50003400
3,466,730 UART: [idev] ++
3,467,298 UART: [idev] CDI.KEYID = 6
3,468,276 UART: [idev] SUBJECT.KEYID = 7
3,469,521 UART: [idev] UDS.KEYID = 0
3,470,439 ready_for_fw is high
3,470,620 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,893 UART: [idev] Erasing UDS.KEYID = 0
5,989,745 UART: [idev] Sha1 KeyId Algorithm
6,012,940 UART: [idev] --
6,017,627 UART: [ldev] ++
6,018,203 UART: [ldev] CDI.KEYID = 6
6,019,116 UART: [ldev] SUBJECT.KEYID = 5
6,020,352 UART: [ldev] AUTHORITY.KEYID = 7
6,021,593 UART: [ldev] FE.KEYID = 1
6,060,161 UART: [ldev] Erasing FE.KEYID = 1
8,565,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,582 UART: [ldev] --
10,377,892 UART: [fwproc] Wait for Commands...
10,380,411 UART: [fwproc] Recv command 0x46574c44
10,382,385 UART: [fwproc] Recv'd Img size: 82832 bytes
13,423,792 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,502,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,575,760 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,779,492 >>> mbox cmd response: success
13,780,713 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,783,731 UART: [afmc] ++
13,784,374 UART: [afmc] CDI.KEYID = 6
13,785,255 UART: [afmc] SUBJECT.KEYID = 7
13,786,520 UART: [afmc] AUTHORITY.KEYID = 5
16,322,948 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,066,786 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,068,965 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,084,812 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,100,831 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,116,391 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,141,653 UART: [afmc] --
18,145,618 UART: [cold-reset] --
18,149,149 UART: [state] Locking Datavault
18,153,575 UART: [state] Locking PCR0, PCR1 and PCR31
18,155,320 UART: [state] Locking ICCM
18,157,406 UART: [exit] Launching FMC @ 0x40000130
18,165,847 UART:
18,166,088 UART: Running Caliptra FMC ...
18,167,188 UART:
18,167,346 UART: [state] CFI Enabled
18,222,388 UART: [fht] FMC Alias Private Key: 7
19,989,146 UART: [art] Extend RT PCRs Done
19,990,368 UART: [art] Lock RT PCRs Done
19,991,747 UART: [art] Populate DV Done
19,997,374 UART: [fht] FMC Alias Private Key: 7
19,998,957 UART: [art] Derive CDI
19,999,689 UART: [art] Store in slot 0x4
20,055,511 UART: [art] Derive Key Pair
20,056,556 UART: [art] Store priv key in slot 0x5
22,519,794 UART: [art] Derive Key Pair - Done
22,532,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,245,633 UART: [art] Erasing AUTHORITY.KEYID = 7
24,247,147 UART: [art] PUB.X = E307B09092FE9BF1267A18B5F82F7F612A7664E63B358141C8F2ADE4F1A559E0C583F88E40C84CEADD63DB5B89A1911A
24,254,456 UART: [art] PUB.Y = CEDC41127D8D98840DB1B5610B50A7A875B940A7F69A95416B861A326B2DB486DBE421AA51D35286B7323210D99D3DCB
24,261,699 UART: [art] SIG.R = 4A7A3B9041AEAF3D36049E497CDEFFB8FD63067069A6B224C724BB5BC12262604F7725DF8449D2721A94E1571C139851
24,269,097 UART: [art] SIG.S = 18765C3B013C2F6BD3236D2014AB9150696E4CD905A19FF301824C541F57927F4F6CEF8E7C182E8E1BCF588284A0FA57
25,247,247 UART: mbox::rt_entry...
25,248,195 UART: ____ _ _ _ ____ _____
25,250,172 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,252,172 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,254,103 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,256,031 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,257,884 UART: |_|
25,258,688 UART:
25,389,365 UART: [rt] Runtime listening for mailbox commands...
25,396,575 >>> mbox cmd response data (4360 bytes)
25,417,207 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,461,559 >>> mbox cmd response data (0 bytes)
27,533,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,683,627 UART:
27,684,011 UART: Running Caliptra ROM ...
27,685,059 UART:
27,685,209 UART: [state] CFI Enabled
27,763,937 UART: [state] LifecycleState = Unprovisioned
27,765,864 UART: [state] DebugLocked = No
27,767,975 UART: [state] WD Timer not started. Device not locked for debugging
27,771,287 UART: [kat] SHA2-256
27,950,896 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,961,707 UART: [kat] ++
27,962,161 UART: [kat] sha1
27,973,312 UART: [kat] SHA2-256
27,975,996 UART: [kat] SHA2-384
27,982,356 UART: [kat] SHA2-512-ACC
27,984,697 UART: [kat] ECC-384
30,444,085 UART: [kat] HMAC-384Kdf
30,466,527 UART: [kat] LMS
30,942,955 UART: [kat] --
30,948,453 UART: [update-reset] ++
34,441,234 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,443,857 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,841,444 >>> mbox cmd response: success
34,846,049 UART: [update-reset] Copying MAN_2 To MAN_1
34,880,231 UART: [update-reset Success] --
34,883,343 UART: [state] Locking Datavault
34,886,701 UART: [state] Locking PCR0, PCR1 and PCR31
34,888,446 UART: [state] Locking ICCM
34,890,375 UART: [exit] Launching FMC @ 0x40000130
34,898,760 UART:
34,899,024 UART: Running Caliptra FMC ...
34,900,133 UART:
34,900,290 UART: [state] CFI Enabled
35,001,320 UART: [art] Extend RT PCRs Done
35,002,518 UART: [art] Lock RT PCRs Done
35,003,922 UART: [art] Populate DV Done
35,009,707 UART: [fht] FMC Alias Private Key: 7
35,011,313 UART: [art] Derive CDI
35,012,127 UART: [art] Store in slot 0x4
35,070,573 UART: [art] Derive Key Pair
35,071,616 UART: [art] Store priv key in slot 0x5
37,534,363 UART: [art] Derive Key Pair - Done
37,547,592 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,260,052 UART: [art] Erasing AUTHORITY.KEYID = 7
39,261,560 UART: [art] PUB.X = 111D58B2570DD5DB2D8B45BEE7E4D096254057995B01A3663A1274DCA3C00D3A5FA73878A83C4D3886F69024DA815030
39,268,810 UART: [art] PUB.Y = 747B1B9DB4E6C1B2F16E8A4EB56395FDB59ABFCEB92A0B18CFE597DAAA228FCC18FF4988C816D091AA8F706A062EDBAE
39,276,146 UART: [art] SIG.R = A63AAC8085047DA6EF00CCAC17EC54AD2ABCBA86B326C617ACC8FB23F10454EF3759E7AA57C99FE6CCA408032EAD0658
39,283,493 UART: [art] SIG.S = 66872CF3A4888EEA3D31E29AB7468B210D2209A5E67623BEBFFFBF44CF0CAD3E450A8BF77FFD1F8B3206A9A009E287BD
40,262,657 UART: Caliptra RT
40,263,351 UART: [state] CFI Enabled
43,144,185 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,145,677 UART: [rt] RT listening for mailbox commands...
43,176,909 UART: [rt]cmd =0x494e464f, len=4
43,181,195 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,461,477 ready_for_fw is high
3,461,883 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,654,626 >>> mbox cmd response: success
13,656,009 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,938,468 UART:
17,938,860 UART: Running Caliptra FMC ...
17,939,962 UART:
17,940,110 UART: [state] CFI Enabled
18,005,321 UART: [fht] FMC Alias Private Key: 7
19,771,052 UART: [art] Extend RT PCRs Done
19,772,261 UART: [art] Lock RT PCRs Done
19,774,136 UART: [art] Populate DV Done
19,779,385 UART: [fht] FMC Alias Private Key: 7
19,780,921 UART: [art] Derive CDI
19,781,655 UART: [art] Store in slot 0x4
19,837,864 UART: [art] Derive Key Pair
19,838,905 UART: [art] Store priv key in slot 0x5
22,301,416 UART: [art] Derive Key Pair - Done
22,314,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,027,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,028,706 UART: [art] PUB.X = 1926448BF515466098F1FF4512ED8EAF9322F5C1D3E6DA634C43F4686A563DDFA521343CA5556A3897A000AA6A7D0200
24,035,905 UART: [art] PUB.Y = 6917A6369E8A6E4E37FA842DF7FE60C96D97F4B54B21BC9C2F9C2282CACE7FBAF2B1122B9529467903A1540353A0DD06
24,043,206 UART: [art] SIG.R = C94A0200AAA1228E8CBFAF266D531969F5D6D9A4E13A5B9784B73D8AA372DE72B8D42D99499BC688007D85C194A07BFA
24,050,546 UART: [art] SIG.S = 4F6BB32BE270A3B6DB41AE209F0A1692A904C72B8EB79BB250CF489A106E74A770C5B1C64B43803A9C661BF6A2577361
25,029,351 UART: mbox::rt_entry...
25,030,346 UART: ____ _ _ _ ____ _____
25,032,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,034,345 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,036,491 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,038,506 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,040,441 UART: |_|
25,041,275 UART:
25,172,187 UART: [rt] Runtime listening for mailbox commands...
25,179,395 >>> mbox cmd response data (4360 bytes)
25,200,230 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,244,616 >>> mbox cmd response data (0 bytes)
27,307,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,622,624 >>> mbox cmd response: success
34,656,744 UART:
34,657,090 UART: Running Caliptra FMC ...
34,658,226 UART:
34,658,393 UART: [state] CFI Enabled
34,763,447 UART: [art] Extend RT PCRs Done
34,764,631 UART: [art] Lock RT PCRs Done
34,766,197 UART: [art] Populate DV Done
34,771,771 UART: [fht] FMC Alias Private Key: 7
34,773,416 UART: [art] Derive CDI
34,774,230 UART: [art] Store in slot 0x4
34,833,001 UART: [art] Derive Key Pair
34,834,048 UART: [art] Store priv key in slot 0x5
37,297,175 UART: [art] Derive Key Pair - Done
37,310,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,022,326 UART: [art] Erasing AUTHORITY.KEYID = 7
39,023,839 UART: [art] PUB.X = 963AF2376D3E643F1FD349B96DCFCE04543587AEA2E29495503FF1D54DD4149BEB13FF3DE61249A7B723B234B6493710
39,031,097 UART: [art] PUB.Y = BB872F9961B4D95801E7D2C9F7DBDFC2C4F78D3D4B297658F320B527220A2DF6ADC633C92F3D56F96359E5526127F693
39,038,375 UART: [art] SIG.R = 4E88B3BB8EA94D06FA25C1867B0960DC0417FE336CE9B6033C0E70ECB9E77DF641019992326161AA01A4422B35FB2AF5
39,045,740 UART: [art] SIG.S = 6BFC2186984030F8068DD5CCAFF994C31D7024E45E604AD1FF7A32787A55C654043B3AA1AAA65397DA3FDDEF945856FC
40,024,831 UART: Caliptra RT
40,025,532 UART: [state] CFI Enabled
42,907,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,908,510 UART: [rt] RT listening for mailbox commands...
42,939,793 UART: [rt]cmd =0x494e464f, len=4
42,944,095 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,572 UART:
192,931 UART: Running Caliptra ROM ...
194,131 UART:
603,688 UART: [state] CFI Enabled
619,044 UART: [state] LifecycleState = Unprovisioned
620,988 UART: [state] DebugLocked = No
623,017 UART: [state] WD Timer not started. Device not locked for debugging
626,261 UART: [kat] SHA2-256
805,931 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,669 UART: [kat] ++
817,159 UART: [kat] sha1
828,250 UART: [kat] SHA2-256
830,911 UART: [kat] SHA2-384
836,498 UART: [kat] SHA2-512-ACC
838,871 UART: [kat] ECC-384
3,281,605 UART: [kat] HMAC-384Kdf
3,293,409 UART: [kat] LMS
3,769,938 UART: [kat] --
3,774,352 UART: [cold-reset] ++
3,775,357 UART: [fht] FHT @ 0x50003400
3,787,179 UART: [idev] ++
3,787,750 UART: [idev] CDI.KEYID = 6
3,788,705 UART: [idev] SUBJECT.KEYID = 7
3,789,953 UART: [idev] UDS.KEYID = 0
3,790,863 ready_for_fw is high
3,791,053 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,895,107 UART: [idev] Erasing UDS.KEYID = 0
6,270,134 UART: [idev] Sha1 KeyId Algorithm
6,292,769 UART: [idev] --
6,297,649 UART: [ldev] ++
6,298,224 UART: [ldev] CDI.KEYID = 6
6,299,138 UART: [ldev] SUBJECT.KEYID = 5
6,300,352 UART: [ldev] AUTHORITY.KEYID = 7
6,301,584 UART: [ldev] FE.KEYID = 1
6,310,992 UART: [ldev] Erasing FE.KEYID = 1
8,788,110 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,131 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,016 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,435 UART: [ldev] --
10,581,729 UART: [fwproc] Wait for Commands...
10,583,995 UART: [fwproc] Recv command 0x46574c44
10,586,037 UART: [fwproc] Recv'd Img size: 82832 bytes
13,625,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,701,624 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,774,641 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,977,930 >>> mbox cmd response: success
13,979,057 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,982,696 UART: [afmc] ++
13,983,276 UART: [afmc] CDI.KEYID = 6
13,984,243 UART: [afmc] SUBJECT.KEYID = 7
13,985,458 UART: [afmc] AUTHORITY.KEYID = 5
16,490,685 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,215,234 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,217,419 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,233,264 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,249,349 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,264,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,289,002 UART: [afmc] --
18,292,111 UART: [cold-reset] --
18,297,723 UART: [state] Locking Datavault
18,302,387 UART: [state] Locking PCR0, PCR1 and PCR31
18,304,090 UART: [state] Locking ICCM
18,306,473 UART: [exit] Launching FMC @ 0x40000130
18,314,857 UART:
18,315,104 UART: Running Caliptra FMC ...
18,316,211 UART:
18,316,380 UART: [state] CFI Enabled
18,324,434 UART: [fht] FMC Alias Private Key: 7
20,090,440 UART: [art] Extend RT PCRs Done
20,091,849 UART: [art] Lock RT PCRs Done
20,093,655 UART: [art] Populate DV Done
20,099,026 UART: [fht] FMC Alias Private Key: 7
20,100,685 UART: [art] Derive CDI
20,101,458 UART: [art] Store in slot 0x4
20,144,139 UART: [art] Derive Key Pair
20,145,152 UART: [art] Store priv key in slot 0x5
22,572,045 UART: [art] Derive Key Pair - Done
22,585,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,291,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,293,074 UART: [art] PUB.X = 51851495ACA7645E68AF989129DB890F31BADDC49FF2E6629F5D39E4A1C4CFA03242175C2842F9221A028F35B6A0FFA8
24,300,332 UART: [art] PUB.Y = FE8ACCB8E7719E8CFA8BECEF6D1559AA4E855B09E9F3E870F2AF1F6485A9991F3A61D7BAED0AA94E3F4DF42CE9CC1B36
24,307,646 UART: [art] SIG.R = 675C27B98C7F64689E46843E362D5571BE62E5A953AFB6EC0D9691126935E0A7FF3825F0B4AF06FCFDB13C62669B5EF0
24,315,044 UART: [art] SIG.S = EBA18568B151A229D7A4F5D2EC9F75A5405278A0C17AFC19D047BBD740D5967EAEA91750E6B9015BB26A6B9BC00D350C
25,293,627 UART: mbox::rt_entry...
25,294,587 UART: ____ _ _ _ ____ _____
25,296,576 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,298,583 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,300,514 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,302,442 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,304,370 UART: |_|
25,305,179 UART:
25,435,894 UART: [rt] Runtime listening for mailbox commands...
25,443,157 >>> mbox cmd response data (4360 bytes)
25,463,749 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,508,161 >>> mbox cmd response data (0 bytes)
27,566,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,716,410 UART:
27,716,806 UART: Running Caliptra ROM ...
27,717,868 UART:
27,718,021 UART: [state] CFI Enabled
27,731,556 UART: [state] LifecycleState = Unprovisioned
27,733,462 UART: [state] DebugLocked = No
27,735,037 UART: [state] WD Timer not started. Device not locked for debugging
27,738,833 UART: [kat] SHA2-256
27,918,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,929,370 UART: [kat] ++
27,929,828 UART: [kat] sha1
27,942,335 UART: [kat] SHA2-256
27,945,033 UART: [kat] SHA2-384
27,951,077 UART: [kat] SHA2-512-ACC
27,953,480 UART: [kat] ECC-384
30,398,465 UART: [kat] HMAC-384Kdf
30,411,233 UART: [kat] LMS
30,887,708 UART: [kat] --
30,890,837 UART: [update-reset] ++
34,393,853 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,397,025 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,794,637 >>> mbox cmd response: success
34,799,240 UART: [update-reset] Copying MAN_2 To MAN_1
34,833,528 UART: [update-reset Success] --
34,836,594 UART: [state] Locking Datavault
34,840,989 UART: [state] Locking PCR0, PCR1 and PCR31
34,842,746 UART: [state] Locking ICCM
34,845,496 UART: [exit] Launching FMC @ 0x40000130
34,853,902 UART:
34,854,141 UART: Running Caliptra FMC ...
34,855,247 UART:
34,855,407 UART: [state] CFI Enabled
34,899,205 UART: [art] Extend RT PCRs Done
34,900,424 UART: [art] Lock RT PCRs Done
34,901,782 UART: [art] Populate DV Done
34,907,044 UART: [fht] FMC Alias Private Key: 7
34,908,759 UART: [art] Derive CDI
34,909,577 UART: [art] Store in slot 0x4
34,952,486 UART: [art] Derive Key Pair
34,953,537 UART: [art] Store priv key in slot 0x5
37,380,174 UART: [art] Derive Key Pair - Done
37,393,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,099,850 UART: [art] Erasing AUTHORITY.KEYID = 7
39,101,345 UART: [art] PUB.X = 7CA5D1733397F20F6DD992C2A7A7536CE23622B27CC9DFAE0D42EC91380AFA3F92ED393749F36CC02F5495227DBC26FD
39,108,668 UART: [art] PUB.Y = 19194061EDFF13FA0EE76609CC9ED947DF5026D66EA29BD29025D6148190CD6DFA88E08550749C233E111F7F48B3AE92
39,115,918 UART: [art] SIG.R = 681FA3D66A21ADB6A3E72CAE60EC4193A9835E24BA7B53FB7E3190E5D752282087EF6B1804456B202EC8408FD088EB46
39,123,321 UART: [art] SIG.S = 6A9597954AC4C304DCF29362863212EDE3FA857AA2B31D277F4881D61DD8C2698D59E73B928EF919A9A10C5B16F62370
40,102,497 UART: Caliptra RT
40,103,210 UART: [state] CFI Enabled
42,890,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,892,136 UART: [rt] RT listening for mailbox commands...
42,923,525 UART: [rt]cmd =0x494e464f, len=4
42,927,742 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,780,189 ready_for_fw is high
3,780,668 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,890,778 >>> mbox cmd response: success
13,892,206 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,139,858 UART:
18,140,252 UART: Running Caliptra FMC ...
18,141,451 UART:
18,141,618 UART: [state] CFI Enabled
18,149,462 UART: [fht] FMC Alias Private Key: 7
19,915,722 UART: [art] Extend RT PCRs Done
19,916,939 UART: [art] Lock RT PCRs Done
19,918,352 UART: [art] Populate DV Done
19,923,659 UART: [fht] FMC Alias Private Key: 7
19,925,144 UART: [art] Derive CDI
19,925,910 UART: [art] Store in slot 0x4
19,969,038 UART: [art] Derive Key Pair
19,970,098 UART: [art] Store priv key in slot 0x5
22,396,819 UART: [art] Derive Key Pair - Done
22,409,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,116,124 UART: [art] Erasing AUTHORITY.KEYID = 7
24,117,623 UART: [art] PUB.X = BFE483542238E8FF4FED7F3EB5B9870817B4DCA698B8240764E3FE3C2582EE4B6D6136FF17B05C684C26BD7FA706281C
24,124,884 UART: [art] PUB.Y = B022EF6FE548DB8EC33C96C848C396127D1647C2BACE21A850B5220763FD5ED6D2E48A06A02B7C9732F62242637EF561
24,132,139 UART: [art] SIG.R = 31BD95ABD2A15633DA9D37D63AE6A8BBF47528220BD74A8DBB89C8A00406CB0E60EA3D8DFE6D93E153459C9479087FD3
24,139,543 UART: [art] SIG.S = 6EF96633F97BFC1ECED3A0D5F5B52C10C1DBF91B0F028E0166D5E7FE09F42C5021262910A32777993321DC61ECBBA58A
25,117,523 UART: mbox::rt_entry...
25,118,490 UART: ____ _ _ _ ____ _____
25,120,478 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,122,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,124,427 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,126,434 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,128,291 UART: |_|
25,129,197 UART:
25,259,854 UART: [rt] Runtime listening for mailbox commands...
25,267,068 >>> mbox cmd response data (4360 bytes)
25,287,623 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,331,978 >>> mbox cmd response data (0 bytes)
27,388,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,613,756 >>> mbox cmd response: success
34,646,549 UART:
34,646,850 UART: Running Caliptra FMC ...
34,647,974 UART:
34,648,148 UART: [state] CFI Enabled
34,691,967 UART: [art] Extend RT PCRs Done
34,693,152 UART: [art] Lock RT PCRs Done
34,694,558 UART: [art] Populate DV Done
34,700,038 UART: [fht] FMC Alias Private Key: 7
34,701,702 UART: [art] Derive CDI
34,702,523 UART: [art] Store in slot 0x4
34,745,228 UART: [art] Derive Key Pair
34,746,232 UART: [art] Store priv key in slot 0x5
37,173,402 UART: [art] Derive Key Pair - Done
37,186,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,892,961 UART: [art] Erasing AUTHORITY.KEYID = 7
38,894,468 UART: [art] PUB.X = A4ACF1CE727527414D02C54CA7FEB94AE25BED70049437B528213CEBDBA0BE2309D7257570472AA2202656B42AF568A5
38,901,781 UART: [art] PUB.Y = AFD958BA8C157613FE677EB7CD827EAF70859CBC3FB2811E188B30E7E08B5547661028E3314BB4D580AA660A5BDA7C5F
38,909,033 UART: [art] SIG.R = 1B0152E3CD3A2D8534BA2C0789CDF90B0324D1CD57C6AA1DB67123501C567EB01593856C2C38B5C9C9B52B9CCAEA81D9
38,916,477 UART: [art] SIG.S = 64BD8A98D268383720E27F20D2594B9564A71FA881744CE75B8FE7C6A8E14AE766C924EC0412E3E984E435468B190A57
39,895,951 UART: Caliptra RT
39,896,649 UART: [state] CFI Enabled
42,684,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,685,679 UART: [rt] RT listening for mailbox commands...
42,717,041 UART: [rt]cmd =0x494e464f, len=4
42,721,219 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
192,121 UART:
192,495 UART: Running Caliptra ROM ...
193,677 UART:
193,838 UART: [state] CFI Enabled
263,263 UART: [state] LifecycleState = Unprovisioned
265,663 UART: [state] DebugLocked = No
267,539 UART: [state] WD Timer not started. Device not locked for debugging
272,276 UART: [kat] SHA2-256
462,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,982 UART: [kat] ++
473,448 UART: [kat] sha1
484,814 UART: [kat] SHA2-256
487,822 UART: [kat] SHA2-384
493,737 UART: [kat] SHA2-512-ACC
496,314 UART: [kat] ECC-384
2,949,232 UART: [kat] HMAC-384Kdf
2,974,180 UART: [kat] LMS
3,505,904 UART: [kat] --
3,511,411 UART: [cold-reset] ++
3,512,354 UART: [fht] FHT @ 0x50003400
3,522,261 UART: [idev] ++
3,522,974 UART: [idev] CDI.KEYID = 6
3,523,972 UART: [idev] SUBJECT.KEYID = 7
3,525,082 UART: [idev] UDS.KEYID = 0
3,526,343 ready_for_fw is high
3,526,541 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,821 UART: [idev] Erasing UDS.KEYID = 0
6,031,341 UART: [idev] Sha1 KeyId Algorithm
6,054,186 UART: [idev] --
6,058,973 UART: [ldev] ++
6,059,659 UART: [ldev] CDI.KEYID = 6
6,060,627 UART: [ldev] SUBJECT.KEYID = 5
6,061,789 UART: [ldev] AUTHORITY.KEYID = 7
6,062,966 UART: [ldev] FE.KEYID = 1
6,102,451 UART: [ldev] Erasing FE.KEYID = 1
8,608,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,862 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,382 UART: [ldev] --
10,414,914 UART: [fwproc] Wait for Commands...
10,416,591 UART: [fwproc] Recv command 0x46574c44
10,418,894 UART: [fwproc] Recv'd Img size: 82832 bytes
13,465,430 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,542,812 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,666,402 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,012,618 >>> mbox cmd response: success
14,013,713 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,017,364 UART: [afmc] ++
14,018,057 UART: [afmc] CDI.KEYID = 6
14,019,293 UART: [afmc] SUBJECT.KEYID = 7
14,020,722 UART: [afmc] AUTHORITY.KEYID = 5
16,555,079 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,280,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,282,068 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,297,182 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,312,319 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,327,240 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,350,547 UART: [afmc] --
18,354,365 UART: [cold-reset] --
18,357,957 UART: [state] Locking Datavault
18,363,579 UART: [state] Locking PCR0, PCR1 and PCR31
18,365,759 UART: [state] Locking ICCM
18,368,458 UART: [exit] Launching FMC @ 0x40000130
18,377,087 UART:
18,377,331 UART: Running Caliptra FMC ...
18,378,431 UART:
18,378,590 UART: [state] CFI Enabled
18,438,511 UART: [fht] FMC Alias Private Key: 7
20,205,208 UART: [art] Extend RT PCRs Done
20,206,549 UART: [art] Lock RT PCRs Done
20,208,343 UART: [art] Populate DV Done
20,213,865 UART: [fht] FMC Alias Private Key: 7
20,215,541 UART: [art] Derive CDI
20,216,357 UART: [art] Store in slot 0x4
20,271,912 UART: [art] Derive Key Pair
20,272,903 UART: [art] Store priv key in slot 0x5
22,735,869 UART: [art] Derive Key Pair - Done
22,748,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,460,848 UART: [art] Erasing AUTHORITY.KEYID = 7
24,462,353 UART: [art] PUB.X = 8EC1F8B6D6E5B02263027900821EA25D0360CFCF2B6EE713C14DF11A260B204014C6062214E5D94B6BC1E0C08FA83216
24,469,597 UART: [art] PUB.Y = CEB5D40EFF1CA100412F13318ECC224F57BEEE2D65FB3903C31AC0C53DEA591C752A061C05C1A41D5757705766C2ADB3
24,476,831 UART: [art] SIG.R = 8506313E6190651D68414646521BC8EDB0D73ED09C1AD84D87377E6F35FF76DAFFD641222607FDDC932A66D52684D830
24,484,218 UART: [art] SIG.S = 6B9ABA2522B8536C0D401D74A96AFC8A7AEFAFB2ABF814DEBF735260402333C95A6ACFA1415DD731F2117B0EDA4198FB
25,462,947 UART: mbox::rt_entry...
25,463,901 UART: ____ _ _ _ ____ _____
25,465,885 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,467,886 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,469,812 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,471,760 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,473,690 UART: |_|
25,474,525 UART:
25,604,991 UART: [rt] Runtime listening for mailbox commands...
25,612,197 >>> mbox cmd response data (4360 bytes)
25,632,816 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,677,191 >>> mbox cmd response data (0 bytes)
27,741,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,891,370 UART:
27,891,740 UART: Running Caliptra ROM ...
27,892,902 UART:
27,893,075 UART: [state] CFI Enabled
27,961,617 UART: [state] LifecycleState = Unprovisioned
27,963,668 UART: [state] DebugLocked = No
27,965,693 UART: [state] WD Timer not started. Device not locked for debugging
27,969,745 UART: [kat] SHA2-256
28,159,626 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,170,417 UART: [kat] ++
28,170,956 UART: [kat] sha1
28,183,035 UART: [kat] SHA2-256
28,186,000 UART: [kat] SHA2-384
28,192,638 UART: [kat] SHA2-512-ACC
28,195,250 UART: [kat] ECC-384
30,645,206 UART: [kat] HMAC-384Kdf
30,665,268 UART: [kat] LMS
31,196,830 UART: [kat] --
31,202,342 UART: [update-reset] ++
34,717,709 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,721,730 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,351,493 >>> mbox cmd response: success
35,356,104 UART: [update-reset] Copying MAN_2 To MAN_1
35,390,344 UART: [update-reset Success] --
35,395,607 UART: [state] Locking Datavault
35,399,367 UART: [state] Locking PCR0, PCR1 and PCR31
35,401,515 UART: [state] Locking ICCM
35,403,614 UART: [exit] Launching FMC @ 0x40000130
35,412,294 UART:
35,412,574 UART: Running Caliptra FMC ...
35,413,704 UART:
35,413,861 UART: [state] CFI Enabled
35,518,463 UART: [art] Extend RT PCRs Done
35,519,654 UART: [art] Lock RT PCRs Done
35,521,003 UART: [art] Populate DV Done
35,526,303 UART: [fht] FMC Alias Private Key: 7
35,527,834 UART: [art] Derive CDI
35,528,640 UART: [art] Store in slot 0x4
35,588,172 UART: [art] Derive Key Pair
35,589,212 UART: [art] Store priv key in slot 0x5
38,052,409 UART: [art] Derive Key Pair - Done
38,065,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,778,121 UART: [art] Erasing AUTHORITY.KEYID = 7
39,779,631 UART: [art] PUB.X = 34C901E8A982300E2AF1176BC876E22C07E18C18C13D873DBF6920996A62EBD88CDBC07E54D6B349BF23246F584272AA
39,786,909 UART: [art] PUB.Y = 3D281C39D828318051EA88EEE8492408C9F9DA9F6A80FF5FBCA2BA61E10A3591301761BAD285ABB9462E52CCB129D2F7
39,794,164 UART: [art] SIG.R = 525A88DB64285CC3752FD7CC9AECE01A4C70D61A13450C351FCE03112AF0FF75167EB9CF0E66620A7594C2D4A45EC719
39,801,601 UART: [art] SIG.S = 04E0563F89FD957A81F126E9F78C57FE66B2C3B65F4A6B1DBBC252B9ED52A24F911D01A36A6E2004CC1D6408A1CB108F
40,780,853 UART: Caliptra RT
40,781,559 UART: [state] CFI Enabled
43,663,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,664,971 UART: [rt] RT listening for mailbox commands...
43,696,417 UART: [rt]cmd =0x494e464f, len=4
43,700,740 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,437,150 ready_for_fw is high
3,437,655 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,035,359 >>> mbox cmd response: success
14,036,489 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,324,209 UART:
18,324,637 UART: Running Caliptra FMC ...
18,325,773 UART:
18,325,928 UART: [state] CFI Enabled
18,392,311 UART: [fht] FMC Alias Private Key: 7
20,158,380 UART: [art] Extend RT PCRs Done
20,159,595 UART: [art] Lock RT PCRs Done
20,161,407 UART: [art] Populate DV Done
20,166,824 UART: [fht] FMC Alias Private Key: 7
20,168,466 UART: [art] Derive CDI
20,169,277 UART: [art] Store in slot 0x4
20,225,314 UART: [art] Derive Key Pair
20,226,345 UART: [art] Store priv key in slot 0x5
22,689,713 UART: [art] Derive Key Pair - Done
22,702,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,415,612 UART: [art] Erasing AUTHORITY.KEYID = 7
24,417,130 UART: [art] PUB.X = 36CFD4E317B5B95B98FFAA22525A5FEA91291E0ED2C553180B205F2AB134C4462F9AB7776A18A70995F2B21AF8BBAFBD
24,424,374 UART: [art] PUB.Y = 8FA20764B0E48BD79D04CBFECC241C23096D60818D65905E369B52C0546B54986B19F9DB278954CC0666989D977D817C
24,431,615 UART: [art] SIG.R = C92DAFABFEC8EC9E6C3E65CE74DD06C2AF436E3A801CA961B4CE2CBEC418D78EE4DE10941C0C8F0E36B40426371DDD3B
24,439,060 UART: [art] SIG.S = DB84B2F34B8115F08642A02172ECCCE148DBA27E377C903F80B253A3EE4A02BD06ACD3EE77A42A194B454EEB1E64B11E
25,416,903 UART: mbox::rt_entry...
25,417,879 UART: ____ _ _ _ ____ _____
25,420,055 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,422,073 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,424,008 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,426,003 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,427,862 UART: |_|
25,428,741 UART:
25,559,747 UART: [rt] Runtime listening for mailbox commands...
25,566,953 >>> mbox cmd response data (4360 bytes)
25,587,737 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,632,114 >>> mbox cmd response data (0 bytes)
27,695,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,610,041 >>> mbox cmd response: success
35,646,036 UART:
35,646,349 UART: Running Caliptra FMC ...
35,647,394 UART:
35,647,542 UART: [state] CFI Enabled
35,751,307 UART: [art] Extend RT PCRs Done
35,752,503 UART: [art] Lock RT PCRs Done
35,753,883 UART: [art] Populate DV Done
35,759,349 UART: [fht] FMC Alias Private Key: 7
35,760,879 UART: [art] Derive CDI
35,761,613 UART: [art] Store in slot 0x4
35,820,272 UART: [art] Derive Key Pair
35,821,310 UART: [art] Store priv key in slot 0x5
38,283,986 UART: [art] Derive Key Pair - Done
38,296,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,010,231 UART: [art] Erasing AUTHORITY.KEYID = 7
40,011,742 UART: [art] PUB.X = 3B4448C39576D8043433F85EC924AB3E925B62AC171588E1911B4C7757B759684B8F2A3CBFABF8528F050BA2DADE714A
40,018,990 UART: [art] PUB.Y = 66FF120C5ED65CC004E467814B91B924751179D07E2803EE29FF9566CE5F2DDE8CBEDC599BD0EE329BF3D5780BC0F914
40,026,261 UART: [art] SIG.R = A002D34EF1158EC1B64DE5750A1F1F224A7F82327C096F5540935279C1E1272423610D27D285D6F5638A0E344BB436EA
40,033,613 UART: [art] SIG.S = 88F85C0BFDD3EF5CAF84F22B6F41B83A50967297586316AC04BE419E9A6FBDBFAD6C17BAF235613A8B93B6548C1507E6
41,012,694 UART: Caliptra RT
41,013,387 UART: [state] CFI Enabled
43,895,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,896,770 UART: [rt] RT listening for mailbox commands...
43,928,273 UART: [rt]cmd =0x494e464f, len=4
43,932,795 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
192,373 UART:
192,751 UART: Running Caliptra ROM ...
193,957 UART:
603,349 UART: [state] CFI Enabled
618,659 UART: [state] LifecycleState = Unprovisioned
620,992 UART: [state] DebugLocked = No
623,528 UART: [state] WD Timer not started. Device not locked for debugging
627,435 UART: [kat] SHA2-256
817,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,148 UART: [kat] ++
828,597 UART: [kat] sha1
840,183 UART: [kat] SHA2-256
843,194 UART: [kat] SHA2-384
849,213 UART: [kat] SHA2-512-ACC
851,775 UART: [kat] ECC-384
3,295,464 UART: [kat] HMAC-384Kdf
3,307,857 UART: [kat] LMS
3,839,715 UART: [kat] --
3,843,735 UART: [cold-reset] ++
3,846,235 UART: [fht] FHT @ 0x50003400
3,857,503 UART: [idev] ++
3,858,216 UART: [idev] CDI.KEYID = 6
3,859,104 UART: [idev] SUBJECT.KEYID = 7
3,860,353 UART: [idev] UDS.KEYID = 0
3,861,258 ready_for_fw is high
3,861,462 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,965,610 UART: [idev] Erasing UDS.KEYID = 0
6,334,330 UART: [idev] Sha1 KeyId Algorithm
6,357,075 UART: [idev] --
6,361,265 UART: [ldev] ++
6,361,949 UART: [ldev] CDI.KEYID = 6
6,362,862 UART: [ldev] SUBJECT.KEYID = 5
6,364,031 UART: [ldev] AUTHORITY.KEYID = 7
6,365,267 UART: [ldev] FE.KEYID = 1
6,374,134 UART: [ldev] Erasing FE.KEYID = 1
8,848,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,545 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,611,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,632,179 UART: [ldev] --
10,637,769 UART: [fwproc] Wait for Commands...
10,640,628 UART: [fwproc] Recv command 0x46574c44
10,642,938 UART: [fwproc] Recv'd Img size: 82832 bytes
13,702,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,782,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,905,987 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,251,272 >>> mbox cmd response: success
14,252,384 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,254,463 UART: [afmc] ++
14,255,171 UART: [afmc] CDI.KEYID = 6
14,256,280 UART: [afmc] SUBJECT.KEYID = 7
14,257,831 UART: [afmc] AUTHORITY.KEYID = 5
16,757,980 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,481,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,483,390 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,498,493 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,513,628 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,528,548 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,552,604 UART: [afmc] --
18,555,622 UART: [cold-reset] --
18,559,459 UART: [state] Locking Datavault
18,564,070 UART: [state] Locking PCR0, PCR1 and PCR31
18,566,233 UART: [state] Locking ICCM
18,567,526 UART: [exit] Launching FMC @ 0x40000130
18,576,207 UART:
18,576,448 UART: Running Caliptra FMC ...
18,577,558 UART:
18,577,734 UART: [state] CFI Enabled
18,585,680 UART: [fht] FMC Alias Private Key: 7
20,351,544 UART: [art] Extend RT PCRs Done
20,352,764 UART: [art] Lock RT PCRs Done
20,354,603 UART: [art] Populate DV Done
20,360,127 UART: [fht] FMC Alias Private Key: 7
20,361,774 UART: [art] Derive CDI
20,362,514 UART: [art] Store in slot 0x4
20,405,272 UART: [art] Derive Key Pair
20,406,337 UART: [art] Store priv key in slot 0x5
22,832,936 UART: [art] Derive Key Pair - Done
22,845,780 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,552,134 UART: [art] Erasing AUTHORITY.KEYID = 7
24,553,640 UART: [art] PUB.X = A92FBFBEAA7B1D4CD801EC1F0DC8F68BB564E8E43C473FE701DA5F09C58409BF32C4CC79AC4A46CC9E42F79043436569
24,560,916 UART: [art] PUB.Y = 394A2A35F94BE81C03D4EF19D12F4E0F493C7A31F396D371BDC37827E7478E66FEED02E372E6D113BE95D524F2962C3A
24,568,170 UART: [art] SIG.R = D4618CA3727B6D4B78E23F7B5CB42877A50A8021D3F4E0BBC3496F592651F4876350353B78A1EEB2AA5B464FD47986BA
24,575,587 UART: [art] SIG.S = D3E2A8B25B64E3E4BEA23E65634107A3B66D06BB31F87AF29CD46ED9DBE5C942E2DFE20EED8EDA4914A0061315D3650D
25,554,007 UART: mbox::rt_entry...
25,554,966 UART: ____ _ _ _ ____ _____
25,556,900 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,558,911 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,560,773 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,562,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,564,584 UART: |_|
25,565,470 UART:
25,696,414 UART: [rt] Runtime listening for mailbox commands...
25,703,632 >>> mbox cmd response data (4360 bytes)
25,724,194 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,768,577 >>> mbox cmd response data (0 bytes)
27,841,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,991,528 UART:
27,991,895 UART: Running Caliptra ROM ...
27,993,039 UART:
27,993,220 UART: [state] CFI Enabled
28,006,692 UART: [state] LifecycleState = Unprovisioned
28,008,566 UART: [state] DebugLocked = No
28,010,176 UART: [state] WD Timer not started. Device not locked for debugging
28,014,334 UART: [kat] SHA2-256
28,204,199 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,215,001 UART: [kat] ++
28,215,467 UART: [kat] sha1
28,227,061 UART: [kat] SHA2-256
28,230,088 UART: [kat] SHA2-384
28,234,741 UART: [kat] SHA2-512-ACC
28,237,315 UART: [kat] ECC-384
30,678,965 UART: [kat] HMAC-384Kdf
30,692,131 UART: [kat] LMS
31,223,759 UART: [kat] --
31,228,127 UART: [update-reset] ++
34,738,956 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,742,556 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,372,267 >>> mbox cmd response: success
35,376,964 UART: [update-reset] Copying MAN_2 To MAN_1
35,411,327 UART: [update-reset Success] --
35,415,631 UART: [state] Locking Datavault
35,419,023 UART: [state] Locking PCR0, PCR1 and PCR31
35,421,201 UART: [state] Locking ICCM
35,423,802 UART: [exit] Launching FMC @ 0x40000130
35,432,440 UART:
35,432,681 UART: Running Caliptra FMC ...
35,433,788 UART:
35,433,948 UART: [state] CFI Enabled
35,477,926 UART: [art] Extend RT PCRs Done
35,479,101 UART: [art] Lock RT PCRs Done
35,480,878 UART: [art] Populate DV Done
35,486,456 UART: [fht] FMC Alias Private Key: 7
35,488,167 UART: [art] Derive CDI
35,488,985 UART: [art] Store in slot 0x4
35,531,369 UART: [art] Derive Key Pair
35,532,426 UART: [art] Store priv key in slot 0x5
37,959,548 UART: [art] Derive Key Pair - Done
37,972,514 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,678,873 UART: [art] Erasing AUTHORITY.KEYID = 7
39,680,385 UART: [art] PUB.X = 5A83D1A810FBB7EAA2F625274B0EE32EF4520BBF6273B6DBB234FB8818B3F1010CFFF88163399E9A952545111320E3AC
39,687,664 UART: [art] PUB.Y = AB45C2F4B6FFDDC3BC9F79F3362A38A56AA03DAB0536EF3025FFEB4801607700A77F02AC73730FE05B91A13C1B4328DF
39,694,918 UART: [art] SIG.R = 4BABCFD3FA31A44C6137E680AAB38A96DEF8A21B42C8C1C19DF36A753B9DC99103AC231A2EADFD60405034235B02BF55
39,702,337 UART: [art] SIG.S = 46047DB18EFDF5E68D7631C2BC238E6948151DBC3B9F4C258F27D89E9307AC00B82C1D211B0A4208D809F1BCEDBD39F5
40,681,577 UART: Caliptra RT
40,682,281 UART: [state] CFI Enabled
43,473,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,475,069 UART: [rt] RT listening for mailbox commands...
43,506,430 UART: [rt]cmd =0x494e464f, len=4
43,510,747 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,757,004 ready_for_fw is high
3,757,643 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,279,566 >>> mbox cmd response: success
14,280,737 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,534,730 UART:
18,535,126 UART: Running Caliptra FMC ...
18,536,330 UART:
18,536,522 UART: [state] CFI Enabled
18,544,469 UART: [fht] FMC Alias Private Key: 7
20,310,343 UART: [art] Extend RT PCRs Done
20,311,564 UART: [art] Lock RT PCRs Done
20,313,251 UART: [art] Populate DV Done
20,318,840 UART: [fht] FMC Alias Private Key: 7
20,320,437 UART: [art] Derive CDI
20,321,256 UART: [art] Store in slot 0x4
20,363,868 UART: [art] Derive Key Pair
20,364,915 UART: [art] Store priv key in slot 0x5
22,791,478 UART: [art] Derive Key Pair - Done
22,804,380 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,510,793 UART: [art] Erasing AUTHORITY.KEYID = 7
24,512,301 UART: [art] PUB.X = 7A21699D1BA744BB4C6969068B3167FC4E6DD735D1AE2C6AF22FA973A5FBAF0D36E25E4437D6D23F662890945614F173
24,519,526 UART: [art] PUB.Y = EEE3E303022632E39FB8F6B29C01470E93552CAF9AEF1168512241DF6409E9015C39CAA7C711F71B0DF990840883AEED
24,526,793 UART: [art] SIG.R = E278C9D7FBC536CB5F31870D9CD227D904FB6708B8040727F5527AB0098EBAA96F019F27687AB6125A9C1F5E9B3EA589
24,534,176 UART: [art] SIG.S = 9FEC63011334DBEAABD9817B240A192D732FF4B1622AF6A85995672BAFDD1D2F8B5C51CBFF26F97CA9D6B6247DB13822
25,512,109 UART: mbox::rt_entry...
25,513,082 UART: ____ _ _ _ ____ _____
25,515,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,517,101 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,519,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,521,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,522,988 UART: |_|
25,523,976 UART:
25,654,205 UART: [rt] Runtime listening for mailbox commands...
25,661,420 >>> mbox cmd response data (4360 bytes)
25,681,991 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,726,367 >>> mbox cmd response data (0 bytes)
27,792,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,617,376 >>> mbox cmd response: success
35,651,662 UART:
35,652,006 UART: Running Caliptra FMC ...
35,653,150 UART:
35,653,325 UART: [state] CFI Enabled
35,697,407 UART: [art] Extend RT PCRs Done
35,698,563 UART: [art] Lock RT PCRs Done
35,699,853 UART: [art] Populate DV Done
35,705,263 UART: [fht] FMC Alias Private Key: 7
35,706,908 UART: [art] Derive CDI
35,707,939 UART: [art] Store in slot 0x4
35,750,721 UART: [art] Derive Key Pair
35,751,730 UART: [art] Store priv key in slot 0x5
38,178,441 UART: [art] Derive Key Pair - Done
38,191,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,898,240 UART: [art] Erasing AUTHORITY.KEYID = 7
39,899,753 UART: [art] PUB.X = 13873C58A05119D60C6B3094D129839AF33BF756D9E85CB333DBD0625089240490061DE82CF763DC5F9281EC6988DC44
39,906,992 UART: [art] PUB.Y = 8DD70FBC1C2DA0505BDB2B0A25F2913C77A6FB5587C48BEEA582DCE3E8FAD04727B716E6D99C827E17ABBF7C4D8D321D
39,914,306 UART: [art] SIG.R = 32E9E7C29B03B42D7ADC3980DE26A0C45841B3BAA80786D1549F611678A40DC93A917B2817CB36C826D409B803865D99
39,921,679 UART: [art] SIG.S = EFCC645A999387990D0410FFF8E92772EE2055323F6BC3A18F1759442F8763FB5B4E9144EAA4F342F35C61605B08A820
40,900,119 UART: Caliptra RT
40,900,836 UART: [state] CFI Enabled
43,692,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,694,208 UART: [rt] RT listening for mailbox commands...
43,725,836 UART: [rt]cmd =0x494e464f, len=4
43,730,172 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,317 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,519 UART: [kat] SHA2-256
892,457 UART: [kat] SHA2-384
895,396 UART: [kat] SHA2-512-ACC
897,297 UART: [kat] ECC-384
903,016 UART: [kat] HMAC-384Kdf
907,700 UART: [kat] LMS
1,475,896 UART: [kat] --
1,476,775 UART: [cold-reset] ++
1,477,151 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 ready_for_fw is high
1,481,031 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,504,820 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,436 UART: [idev] --
1,514,441 UART: [ldev] ++
1,514,609 UART: [ldev] CDI.KEYID = 6
1,514,972 UART: [ldev] SUBJECT.KEYID = 5
1,515,398 UART: [ldev] AUTHORITY.KEYID = 7
1,515,861 UART: [ldev] FE.KEYID = 1
1,521,243 UART: [ldev] Erasing FE.KEYID = 1
1,546,198 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,994 UART: [ldev] --
1,585,383 UART: [fwproc] Waiting for Commands...
1,586,054 UART: [fwproc] Received command 0x46574c44
1,586,845 UART: [fwproc] Received Image of size 82832 bytes
2,522,976 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,108 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,326 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,005 >>> mbox cmd response: success
2,668,005 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,087 UART: [afmc] ++
2,669,255 UART: [afmc] CDI.KEYID = 6
2,669,617 UART: [afmc] SUBJECT.KEYID = 7
2,670,042 UART: [afmc] AUTHORITY.KEYID = 5
2,704,895 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,720,919 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,721,699 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,727,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,733,291 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,738,974 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,746,876 UART: [afmc] --
2,747,842 UART: [cold-reset] --
2,748,788 UART: [state] Locking Datavault
2,750,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,637 UART: [state] Locking ICCM
2,751,059 UART: [exit] Launching FMC @ 0x40000130
2,756,389 UART:
2,756,405 UART: Running Caliptra FMC ...
2,756,813 UART:
2,756,867 UART: [state] CFI Enabled
2,767,267 UART: [fht] FMC Alias Private Key: 7
2,886,647 UART: [art] Extend RT PCRs Done
2,887,075 UART: [art] Lock RT PCRs Done
2,888,467 UART: [art] Populate DV Done
2,896,688 UART: [fht] FMC Alias Private Key: 7
2,897,806 UART: [art] Derive CDI
2,898,086 UART: [art] Store in slot 0x4
2,983,726 UART: [art] Derive Key Pair
2,984,086 UART: [art] Store priv key in slot 0x5
2,997,159 UART: [art] Derive Key Pair - Done
3,011,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,086 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,851 UART: [art] PUB.X = 9181E7F6244267D50D38CFC51F2DB270CEDB325CF096BD5E7396C48524BC16DDB651272D520E0E392BE28A625BDC1147
3,034,618 UART: [art] PUB.Y = DBA590330747640797016A2E57B2E4FB5E1F6474F23ABB588CB6E427124FE92AEC60299B4044D2A7E7A5EA8C2A92C520
3,041,563 UART: [art] SIG.R = 93889944A527B7E9177868C2BB88A7F94220D55BD71A8DD35E924C90A9822E260A49CCB970D5DF2AB85D70E0B32AE26A
3,048,334 UART: [art] SIG.S = EBA68034971365B50788901901B1C6FDA9032727EA2239F51DD556DB24D559126AD28DD91511611D0E39B9D2964B933E
3,071,894 UART: mbox::rt_entry...
3,072,266 UART: ____ _ _ _ ____ _____
3,073,050 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,073,850 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,074,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,075,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,076,154 UART: |_|
3,076,466 UART:
3,196,352 UART: [rt] Runtime listening for mailbox commands...
3,202,686 >>> mbox cmd response data (4360 bytes)
3,202,687 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,233,469 >>> mbox cmd response data (0 bytes)
3,233,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,591 UART:
3,233,607 UART: Running Caliptra ROM ...
3,234,015 UART:
3,234,069 UART: [state] CFI Enabled
3,236,973 UART: [state] LifecycleState = Unprovisioned
3,237,628 UART: [state] DebugLocked = No
3,238,136 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,239,629 UART: [kat] SHA2-256
4,033,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,037,675 UART: [kat] ++
4,037,827 UART: [kat] sha1
4,042,021 UART: [kat] SHA2-256
4,043,959 UART: [kat] SHA2-384
4,046,802 UART: [kat] SHA2-512-ACC
4,048,702 UART: [kat] ECC-384
4,054,127 UART: [kat] HMAC-384Kdf
4,058,841 UART: [kat] LMS
4,627,037 UART: [kat] --
4,628,020 UART: [update-reset] ++
6,010,258 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,478 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,166,745 >>> mbox cmd response: success
6,166,944 UART: [update-reset] Copying MAN_2 To MAN_1
6,174,958 UART: [update-reset Success] --
6,175,981 UART: [state] Locking Datavault
6,176,905 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,509 UART: [state] Locking ICCM
6,178,033 UART: [exit] Launching FMC @ 0x40000130
6,183,363 UART:
6,183,379 UART: Running Caliptra FMC ...
6,183,787 UART:
6,183,841 UART: [state] CFI Enabled
6,272,598 UART: [art] Extend RT PCRs Done
6,273,026 UART: [art] Lock RT PCRs Done
6,274,191 UART: [art] Populate DV Done
6,282,294 UART: [fht] FMC Alias Private Key: 7
6,283,224 UART: [art] Derive CDI
6,283,504 UART: [art] Store in slot 0x4
6,369,546 UART: [art] Derive Key Pair
6,369,906 UART: [art] Store priv key in slot 0x5
6,382,819 UART: [art] Derive Key Pair - Done
6,397,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,413,059 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,824 UART: [art] PUB.X = F66384834E705C0FAB6B6D000A1CC2F7756B208432B7C39AAF9AF7B55F0C905EEE6A3AE62A5FD87E859E41E5F8A3C21D
6,420,579 UART: [art] PUB.Y = 87F16D1B317FE0A99D5DE64D2A4C3207AA7A4A6186A9CDCA0E8CCDF6F20C0B58154A53FC8660F0A78634171C4335FFB2
6,427,531 UART: [art] SIG.R = 0B89F64A19103314E0BC410023BDC8B30927C219AF599C264D6A41A7532E93B784624218056A42FA771927DA611340AC
6,434,260 UART: [art] SIG.S = 378CCE783C9D64E5032AB1716335CBA640EFF06F7E8088A03087ED57233726385246E018C7AAC3CE4B54BAA81DF6F6EB
6,457,915 UART: Caliptra RT
6,458,166 UART: [state] CFI Enabled
6,822,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,823,941 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,854,589 UART: [rt]cmd =0x494e464f, len=4
6,858,283 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,575 ready_for_fw is high
1,362,575 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,013 >>> mbox cmd response: success
2,518,013 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,002 UART:
2,580,018 UART: Running Caliptra FMC ...
2,580,426 UART:
2,580,480 UART: [state] CFI Enabled
2,591,034 UART: [fht] FMC Alias Private Key: 7
2,709,570 UART: [art] Extend RT PCRs Done
2,709,998 UART: [art] Lock RT PCRs Done
2,711,458 UART: [art] Populate DV Done
2,719,867 UART: [fht] FMC Alias Private Key: 7
2,720,875 UART: [art] Derive CDI
2,721,155 UART: [art] Store in slot 0x4
2,806,671 UART: [art] Derive Key Pair
2,807,031 UART: [art] Store priv key in slot 0x5
2,820,180 UART: [art] Derive Key Pair - Done
2,834,843 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,850,640 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,405 UART: [art] PUB.X = 9D55773B08CE5C07B56BDD900A85071E1EB5977B39C35C43C4083192EC5AC109CB846D79170D58F5100BE74100673131
2,858,123 UART: [art] PUB.Y = 52418634C237AC5F7701FD929E9CB41D044DA2EC5B33C40809D10850E1FEFE4655975D0805242C2BDE11D5E4AC6E5575
2,865,054 UART: [art] SIG.R = 56C5C60B5A69C7E99E62A8D0BA71B2FA8E3CF9973F7E89D689FF7824EC45D0E616EFDBB00DB1847744F85E7A723ED790
2,871,832 UART: [art] SIG.S = AADB50BF1B10587AD6949002F42FB0185DAA218ECEE07599CDE2040EEBAD2C6487169E4E98CFFAE03A04D1934A015096
2,895,721 UART: mbox::rt_entry...
2,896,093 UART: ____ _ _ _ ____ _____
2,896,877 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,897,677 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,898,445 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,213 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,899,981 UART: |_|
2,900,293 UART:
3,019,496 UART: [rt] Runtime listening for mailbox commands...
3,025,830 >>> mbox cmd response data (4360 bytes)
3,025,831 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,056,613 >>> mbox cmd response data (0 bytes)
3,056,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,870,295 >>> mbox cmd response: success
5,883,655 UART:
5,883,671 UART: Running Caliptra FMC ...
5,884,079 UART:
5,884,133 UART: [state] CFI Enabled
5,973,902 UART: [art] Extend RT PCRs Done
5,974,330 UART: [art] Lock RT PCRs Done
5,975,455 UART: [art] Populate DV Done
5,983,674 UART: [fht] FMC Alias Private Key: 7
5,984,848 UART: [art] Derive CDI
5,985,128 UART: [art] Store in slot 0x4
6,070,974 UART: [art] Derive Key Pair
6,071,334 UART: [art] Store priv key in slot 0x5
6,084,961 UART: [art] Derive Key Pair - Done
6,099,637 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,115,054 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,819 UART: [art] PUB.X = FDB536D3E667AD1E281EFCDE716B4E597BB7D1752E1117093453E228913049708FC986F43FB69881B65586AD77BB15BC
6,122,588 UART: [art] PUB.Y = C6306AED8442FDBBC53F29EB867FCD350599551A320ADA26961B18AD7629C50DFDDC3C66081F64300E7D2FD04760B894
6,129,531 UART: [art] SIG.R = 2F3AC77D6226234FE533044B07274CBF3569C051B729B815CE8584CB332177B837B390DF92F23D88A12E3974EB297CD0
6,136,291 UART: [art] SIG.S = 05D9D5478EF644F5D46FB12A7D46DC31AF01ED1BF9E94844DF57DF2357474DBD4BC87629EA57786C5514469650248E6D
6,159,927 UART: Caliptra RT
6,160,178 UART: [state] CFI Enabled
6,529,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,530,595 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,560,985 UART: [rt]cmd =0x494e464f, len=4
6,564,785 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,359 UART: [kat] SHA2-512-ACC
897,260 UART: [kat] ECC-384
902,611 UART: [kat] HMAC-384Kdf
907,323 UART: [kat] LMS
1,475,519 UART: [kat] --
1,476,580 UART: [cold-reset] ++
1,477,048 UART: [fht] Storing FHT @ 0x50003400
1,479,819 UART: [idev] ++
1,479,987 UART: [idev] CDI.KEYID = 6
1,480,347 UART: [idev] SUBJECT.KEYID = 7
1,480,771 UART: [idev] UDS.KEYID = 0
1,481,116 ready_for_fw is high
1,481,116 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,751 UART: [idev] Erasing UDS.KEYID = 0
1,505,615 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,239 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,522,040 UART: [ldev] Erasing FE.KEYID = 1
1,547,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,981 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,817 UART: [ldev] --
1,586,260 UART: [fwproc] Waiting for Commands...
1,587,017 UART: [fwproc] Received command 0x46574c44
1,587,808 UART: [fwproc] Received Image of size 82832 bytes
2,523,491 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,813 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,900 >>> mbox cmd response: success
2,668,900 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,952 UART: [afmc] ++
2,670,120 UART: [afmc] CDI.KEYID = 6
2,670,482 UART: [afmc] SUBJECT.KEYID = 7
2,670,907 UART: [afmc] AUTHORITY.KEYID = 5
2,705,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,236 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,016 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,725 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,608 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,291 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,193 UART: [afmc] --
2,749,083 UART: [cold-reset] --
2,749,705 UART: [state] Locking Datavault
2,750,786 UART: [state] Locking PCR0, PCR1 and PCR31
2,751,390 UART: [state] Locking ICCM
2,752,046 UART: [exit] Launching FMC @ 0x40000130
2,757,376 UART:
2,757,392 UART: Running Caliptra FMC ...
2,757,800 UART:
2,757,943 UART: [state] CFI Enabled
2,768,431 UART: [fht] FMC Alias Private Key: 7
2,887,433 UART: [art] Extend RT PCRs Done
2,887,861 UART: [art] Lock RT PCRs Done
2,889,253 UART: [art] Populate DV Done
2,897,570 UART: [fht] FMC Alias Private Key: 7
2,898,574 UART: [art] Derive CDI
2,898,854 UART: [art] Store in slot 0x4
2,984,728 UART: [art] Derive Key Pair
2,985,088 UART: [art] Store priv key in slot 0x5
2,997,815 UART: [art] Derive Key Pair - Done
3,012,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,244 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,009 UART: [art] PUB.X = AC98E99FB1487641ED64BD22DFA4266A3D541E198BC4975AA21DBC64122382CD82771CC8268C26EBC1E418AEE0C31B61
3,035,789 UART: [art] PUB.Y = 7AD3046F8A01ECC7E3CAFB7EA564B7AD933D15D9435809E4D16F67364DE09E9A74925792C6951349A8955D2D1334B124
3,042,730 UART: [art] SIG.R = 0619ED5EA0210A31BB0EBC6C5B1BB2779A18A475222E54D98DB63B4ACFA575CB487FDD0BFD9CE03EB433DB314A94FD85
3,049,510 UART: [art] SIG.S = 57A74AFC2AD771E615A5B595A070F9263E29CA0E3F6F4A65029C32CE3B4D248D7C844A269B9FD45CB0A846F7E306F4B4
3,073,517 UART: mbox::rt_entry...
3,073,889 UART: ____ _ _ _ ____ _____
3,074,673 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,075,473 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,076,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,009 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,077,777 UART: |_|
3,078,089 UART:
3,196,915 UART: [rt] Runtime listening for mailbox commands...
3,203,249 >>> mbox cmd response data (4360 bytes)
3,203,250 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,234,032 >>> mbox cmd response data (0 bytes)
3,234,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,234,154 UART:
3,234,170 UART: Running Caliptra ROM ...
3,234,578 UART:
3,234,719 UART: [state] CFI Enabled
3,237,293 UART: [state] LifecycleState = Unprovisioned
3,237,948 UART: [state] DebugLocked = No
3,238,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,240,141 UART: [kat] SHA2-256
4,034,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,038,187 UART: [kat] ++
4,038,339 UART: [kat] sha1
4,042,521 UART: [kat] SHA2-256
4,044,459 UART: [kat] SHA2-384
4,047,284 UART: [kat] SHA2-512-ACC
4,049,184 UART: [kat] ECC-384
4,054,563 UART: [kat] HMAC-384Kdf
4,059,303 UART: [kat] LMS
4,627,499 UART: [kat] --
4,628,286 UART: [update-reset] ++
6,008,650 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,009,912 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,165,179 >>> mbox cmd response: success
6,165,312 UART: [update-reset] Copying MAN_2 To MAN_1
6,173,326 UART: [update-reset Success] --
6,174,311 UART: [state] Locking Datavault
6,175,071 UART: [state] Locking PCR0, PCR1 and PCR31
6,175,675 UART: [state] Locking ICCM
6,176,195 UART: [exit] Launching FMC @ 0x40000130
6,181,525 UART:
6,181,541 UART: Running Caliptra FMC ...
6,181,949 UART:
6,182,092 UART: [state] CFI Enabled
6,271,103 UART: [art] Extend RT PCRs Done
6,271,531 UART: [art] Lock RT PCRs Done
6,272,828 UART: [art] Populate DV Done
6,280,937 UART: [fht] FMC Alias Private Key: 7
6,281,931 UART: [art] Derive CDI
6,282,211 UART: [art] Store in slot 0x4
6,367,617 UART: [art] Derive Key Pair
6,367,977 UART: [art] Store priv key in slot 0x5
6,381,614 UART: [art] Derive Key Pair - Done
6,396,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,412,293 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,058 UART: [art] PUB.X = CC2DB52C51B60E774BFA142F3E097EF9F0729EFB55608D7232975A8C2D496E361FE6CB95004923E8ADF3FD116032F85C
6,419,808 UART: [art] PUB.Y = AD225645213EB3431E1C1736FC40B9E877AADA39ACE46714E58BF4E5FD1847BBE67A0A703FB5F445AF213D0F7468F236
6,426,762 UART: [art] SIG.R = EFC0CB7D6E76378F13B06D4CDE1E06A77909BFA5119BE57A8494DB5772227A405E813567FDB8FB212ADFA11A1BEE0833
6,433,537 UART: [art] SIG.S = E683356CDF4B582C9BEA8BFC2E2EDF5CD585F19A1602E86CCBD8B61491DBE9D86B5EC7C382815A685086F463308038A2
6,457,266 UART: Caliptra RT
6,457,609 UART: [state] CFI Enabled
6,824,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,825,568 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,855,994 UART: [rt]cmd =0x494e464f, len=4
6,859,782 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,320 ready_for_fw is high
1,363,320 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,520,308 >>> mbox cmd response: success
2,520,308 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,582,769 UART:
2,582,785 UART: Running Caliptra FMC ...
2,583,193 UART:
2,583,336 UART: [state] CFI Enabled
2,593,704 UART: [fht] FMC Alias Private Key: 7
2,712,342 UART: [art] Extend RT PCRs Done
2,712,770 UART: [art] Lock RT PCRs Done
2,714,228 UART: [art] Populate DV Done
2,722,343 UART: [fht] FMC Alias Private Key: 7
2,723,485 UART: [art] Derive CDI
2,723,765 UART: [art] Store in slot 0x4
2,809,743 UART: [art] Derive Key Pair
2,810,103 UART: [art] Store priv key in slot 0x5
2,823,844 UART: [art] Derive Key Pair - Done
2,838,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,853,843 UART: [art] Erasing AUTHORITY.KEYID = 7
2,854,608 UART: [art] PUB.X = BBB769CD706FB1D55F205F7B818A9F6B565135CDB46474925AF74578639BD429E4A7DE3B7419EBA8537C262D976A6570
2,861,380 UART: [art] PUB.Y = 167DEF2CEB435FCA67631C670CBFC19CC9272B46A89128D7E3A34728375D93E8F3B98AA8660702F406446EBE0697951E
2,868,317 UART: [art] SIG.R = FB95A28AE14F90808B05BF520C3F89C845A3BDF246995E959DA5338254AD4909656DE3D14BCB3AB9627D669DFEB7EA75
2,875,088 UART: [art] SIG.S = E56D0DEBF2ABB4A87BAC47009BB28F1ECE8C9EE9D5A5D40BC9666B9E2C2288E481C73D9A269D38709D45B6F01A8171F9
2,898,520 UART: mbox::rt_entry...
2,898,892 UART: ____ _ _ _ ____ _____
2,899,676 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,900,476 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,901,244 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,902,012 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,902,780 UART: |_|
2,903,092 UART:
3,021,308 UART: [rt] Runtime listening for mailbox commands...
3,027,642 >>> mbox cmd response data (4360 bytes)
3,027,643 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,058,425 >>> mbox cmd response data (0 bytes)
3,058,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,872,406 >>> mbox cmd response: success
5,886,364 UART:
5,886,380 UART: Running Caliptra FMC ...
5,886,788 UART:
5,886,931 UART: [state] CFI Enabled
5,976,552 UART: [art] Extend RT PCRs Done
5,976,980 UART: [art] Lock RT PCRs Done
5,978,601 UART: [art] Populate DV Done
5,986,712 UART: [fht] FMC Alias Private Key: 7
5,987,652 UART: [art] Derive CDI
5,987,932 UART: [art] Store in slot 0x4
6,073,538 UART: [art] Derive Key Pair
6,073,898 UART: [art] Store priv key in slot 0x5
6,087,075 UART: [art] Derive Key Pair - Done
6,102,064 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,117,767 UART: [art] Erasing AUTHORITY.KEYID = 7
6,118,532 UART: [art] PUB.X = 5916938FBDFF938758F1B6CC7C804397CDD089263F9D1860F0B095FBB534B98F44DE2E5DB2C256287728E4693623F6CC
6,125,304 UART: [art] PUB.Y = 9A58A777F9BB3310C32D202EB50B5AECF3BDF023F141546D8726CDDB170E8BCC4AD90F54F872E50795F81C2F82DA83CE
6,132,258 UART: [art] SIG.R = 1125E7049E199CBB0407034E7115DD8C73E565AEBE15A74F414F88666128D02478C6FFEBCC7CE38042BDBBB9CD8CC31E
6,139,028 UART: [art] SIG.S = 2510E7059225151D0CF40DCB25F8B007EA6DC0FC659CF46311298225C34B8FB7C38D61663E1A087834537272B0695EE8
6,162,655 UART: Caliptra RT
6,162,998 UART: [state] CFI Enabled
6,531,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,532,835 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,563,213 UART: [rt]cmd =0x494e464f, len=4
6,566,875 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,592 UART: [kat] SHA2-256
901,532 UART: [kat] SHA2-384
904,505 UART: [kat] SHA2-512-ACC
906,406 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,550 UART: [cold-reset] ++
1,169,986 UART: [fht] FHT @ 0x50003400
1,172,710 UART: [idev] ++
1,172,878 UART: [idev] CDI.KEYID = 6
1,173,239 UART: [idev] SUBJECT.KEYID = 7
1,173,664 UART: [idev] UDS.KEYID = 0
1,174,010 ready_for_fw is high
1,174,010 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,889 UART: [idev] Erasing UDS.KEYID = 0
1,199,441 UART: [idev] Sha1 KeyId Algorithm
1,208,165 UART: [idev] --
1,209,350 UART: [ldev] ++
1,209,518 UART: [ldev] CDI.KEYID = 6
1,209,882 UART: [ldev] SUBJECT.KEYID = 5
1,210,309 UART: [ldev] AUTHORITY.KEYID = 7
1,210,772 UART: [ldev] FE.KEYID = 1
1,216,118 UART: [ldev] Erasing FE.KEYID = 1
1,242,649 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,772 UART: [ldev] --
1,282,099 UART: [fwproc] Wait for Commands...
1,282,914 UART: [fwproc] Recv command 0x46574c44
1,283,647 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,987 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,050 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,225 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,852 >>> mbox cmd response: success
2,365,852 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,367,024 UART: [afmc] ++
2,367,192 UART: [afmc] CDI.KEYID = 6
2,367,555 UART: [afmc] SUBJECT.KEYID = 7
2,367,981 UART: [afmc] AUTHORITY.KEYID = 5
2,403,286 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,963 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,712 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,422 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,004 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,757 UART: [afmc] --
2,446,762 UART: [cold-reset] --
2,447,534 UART: [state] Locking Datavault
2,448,873 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,477 UART: [state] Locking ICCM
2,450,147 UART: [exit] Launching FMC @ 0x40000130
2,455,477 UART:
2,455,493 UART: Running Caliptra FMC ...
2,455,901 UART:
2,455,955 UART: [state] CFI Enabled
2,466,489 UART: [fht] FMC Alias Private Key: 7
2,585,571 UART: [art] Extend RT PCRs Done
2,585,999 UART: [art] Lock RT PCRs Done
2,587,415 UART: [art] Populate DV Done
2,595,784 UART: [fht] FMC Alias Private Key: 7
2,596,844 UART: [art] Derive CDI
2,597,124 UART: [art] Store in slot 0x4
2,682,895 UART: [art] Derive Key Pair
2,683,255 UART: [art] Store priv key in slot 0x5
2,696,293 UART: [art] Derive Key Pair - Done
2,710,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,878 UART: [art] Erasing AUTHORITY.KEYID = 7
2,726,643 UART: [art] PUB.X = 343508F243D7021B6548A8DBC1A913E0754266A228F7224A7F33956518611648745C63D9D8F7A4260CDF2A9E1FA77AC2
2,733,396 UART: [art] PUB.Y = C383047CD7D5CCFDC70720343F859CC4533F34F07AB79A9944CE49B60FB9C14F6CFF8195D932713C5DEE2CC9ECFDBBAF
2,740,359 UART: [art] SIG.R = 8AAED77DDA9FEF45522879AF74326AB740E38C5F09F6EF8D791D45511766FED5283CF5573A13C8F2E8B6C3DF475D71C2
2,747,138 UART: [art] SIG.S = EF73436D5062C0D2C5BB830751C373B9BE2FA8257469340E95229051E78C124218811E9671C37B2724F10C1E63C70B2C
2,770,132 UART: mbox::rt_entry...
2,770,504 UART: ____ _ _ _ ____ _____
2,771,288 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,088 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,624 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,392 UART: |_|
2,774,704 UART:
2,892,511 UART: [rt] Runtime listening for mailbox commands...
2,898,845 >>> mbox cmd response data (4360 bytes)
2,898,846 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,929,628 >>> mbox cmd response data (0 bytes)
2,929,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,747 UART:
2,929,763 UART: Running Caliptra ROM ...
2,930,171 UART:
2,930,226 UART: [state] CFI Enabled
2,932,792 UART: [state] LifecycleState = Unprovisioned
2,933,447 UART: [state] DebugLocked = No
2,934,159 UART: [state] WD Timer not started. Device not locked for debugging
2,935,513 UART: [kat] SHA2-256
3,739,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,743,167 UART: [kat] ++
3,743,319 UART: [kat] sha1
3,747,603 UART: [kat] SHA2-256
3,749,543 UART: [kat] SHA2-384
3,752,244 UART: [kat] SHA2-512-ACC
3,754,144 UART: [kat] ECC-384
3,764,251 UART: [kat] HMAC-384Kdf
3,768,967 UART: [kat] LMS
4,017,279 UART: [kat] --
4,018,207 UART: [update-reset] ++
5,376,548 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,377,621 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,532,836 >>> mbox cmd response: success
5,533,065 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,079 UART: [update-reset Success] --
5,542,228 UART: [state] Locking Datavault
5,543,100 UART: [state] Locking PCR0, PCR1 and PCR31
5,543,704 UART: [state] Locking ICCM
5,544,224 UART: [exit] Launching FMC @ 0x40000130
5,549,554 UART:
5,549,570 UART: Running Caliptra FMC ...
5,549,978 UART:
5,550,032 UART: [state] CFI Enabled
5,639,035 UART: [art] Extend RT PCRs Done
5,639,463 UART: [art] Lock RT PCRs Done
5,640,896 UART: [art] Populate DV Done
5,649,007 UART: [fht] FMC Alias Private Key: 7
5,650,061 UART: [art] Derive CDI
5,650,341 UART: [art] Store in slot 0x4
5,736,082 UART: [art] Derive Key Pair
5,736,442 UART: [art] Store priv key in slot 0x5
5,749,722 UART: [art] Derive Key Pair - Done
5,764,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,779,937 UART: [art] Erasing AUTHORITY.KEYID = 7
5,780,702 UART: [art] PUB.X = 19AEB7E38003907BB198D06B65DF373EB43F8BFB3B4213DDE2BC8EEEE605EA5E3EC71E40F60D6E837A7F41E0F3EB926A
5,787,485 UART: [art] PUB.Y = 946F4378C4C1AACC0EF5B2E9081444DD41339652341B793CC433A9DE36881A1E285A0BB2D1501E665411E254F05F4A14
5,794,424 UART: [art] SIG.R = 9BA522B34DF9BF8618D097C9C92D4CB493243AF61B80048A13848EC6ACC7917F38ED3DD697B786F9F6A53CC4BF4B43C1
5,801,203 UART: [art] SIG.S = 6272739C7918D9DE67443A2D27E1F0AF84538715EFFFDB06A4DD5016AA8DCF6DC3E2CE005C82A14160C6224AAB075B77
5,825,017 UART: Caliptra RT
5,825,268 UART: [state] CFI Enabled
6,193,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,195,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,225,669 UART: [rt]cmd =0x494e464f, len=4
6,229,295 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,140 ready_for_fw is high
1,060,140 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,401 >>> mbox cmd response: success
2,216,401 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,496 UART:
2,278,512 UART: Running Caliptra FMC ...
2,278,920 UART:
2,278,974 UART: [state] CFI Enabled
2,289,342 UART: [fht] FMC Alias Private Key: 7
2,408,228 UART: [art] Extend RT PCRs Done
2,408,656 UART: [art] Lock RT PCRs Done
2,410,356 UART: [art] Populate DV Done
2,418,597 UART: [fht] FMC Alias Private Key: 7
2,419,735 UART: [art] Derive CDI
2,420,015 UART: [art] Store in slot 0x4
2,505,792 UART: [art] Derive Key Pair
2,506,152 UART: [art] Store priv key in slot 0x5
2,519,210 UART: [art] Derive Key Pair - Done
2,533,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,917 UART: [art] Erasing AUTHORITY.KEYID = 7
2,549,682 UART: [art] PUB.X = 969A69C1558374523EBB970F9CD5B50AD6C8777E9F175F2DE3BEA9835DDAF1B0F243A791CFEA07E7E8E89445635190C1
2,556,451 UART: [art] PUB.Y = 2BA1EF84435E8760C3DF26E90E586797176036E9203B4B49AF24512DB976BEF8406877BD26ABA436C0178701B0AFE652
2,563,393 UART: [art] SIG.R = 5BB4EE815DA1F5A35016EA0B3BA4C78966E9104879F41D149F00B1A84B06CB3822BDE6BF41BCECDAB0B06F9B393E52BF
2,570,155 UART: [art] SIG.S = 4C7AFDF07589E12E5BE3EC6EA6384C5100107980D2BE22F554ADCACBE3780717CB21EA6C65173BB3D4BC053995A2EEC6
2,594,219 UART: mbox::rt_entry...
2,594,591 UART: ____ _ _ _ ____ _____
2,595,375 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,596,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,596,943 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,597,711 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,598,479 UART: |_|
2,598,791 UART:
2,717,264 UART: [rt] Runtime listening for mailbox commands...
2,723,598 >>> mbox cmd response data (4360 bytes)
2,723,599 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,754,381 >>> mbox cmd response data (0 bytes)
2,754,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,593 >>> mbox cmd response: success
5,256,000 UART:
5,256,016 UART: Running Caliptra FMC ...
5,256,424 UART:
5,256,478 UART: [state] CFI Enabled
5,345,635 UART: [art] Extend RT PCRs Done
5,346,063 UART: [art] Lock RT PCRs Done
5,347,332 UART: [art] Populate DV Done
5,355,745 UART: [fht] FMC Alias Private Key: 7
5,356,921 UART: [art] Derive CDI
5,357,201 UART: [art] Store in slot 0x4
5,443,134 UART: [art] Derive Key Pair
5,443,494 UART: [art] Store priv key in slot 0x5
5,456,744 UART: [art] Derive Key Pair - Done
5,471,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,487,218 UART: [art] Erasing AUTHORITY.KEYID = 7
5,487,983 UART: [art] PUB.X = C2ABC4862CEA2ED17AF47D1CCDA66EB43437E298C741E122CFE722E343579BED2B90F4FFA3438B72449E52CA62E7951F
5,494,769 UART: [art] PUB.Y = FA8E234F8A75A1CCDD16045F74A16E7C0157F4D04C803700C584775491DE651E7E74DA1553069130FA11EB5FB5B78B53
5,501,690 UART: [art] SIG.R = 8608B4DC0474E728542F2B7050E8197B23BFA46462F95EEE8D1F0A23F23F8ACA3E7DC60748F414523373A379285505B7
5,508,441 UART: [art] SIG.S = FA59CB7873F9463A4C35D326AE0398EB6906BC9B8AF60CAA1E0BCA4C116E86F363C7A2006C8B9CB7EFA3806FE4BB3347
5,532,195 UART: Caliptra RT
5,532,446 UART: [state] CFI Enabled
5,897,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,899,636 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,929,938 UART: [rt]cmd =0x494e464f, len=4
5,933,742 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
900,107 UART: [kat] SHA2-256
902,047 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,202 UART: [kat] HMAC-384Kdf
920,792 UART: [kat] LMS
1,169,104 UART: [kat] --
1,169,791 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,653 UART: [idev] ++
1,172,821 UART: [idev] CDI.KEYID = 6
1,173,182 UART: [idev] SUBJECT.KEYID = 7
1,173,607 UART: [idev] UDS.KEYID = 0
1,173,953 ready_for_fw is high
1,173,953 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,622 UART: [idev] Erasing UDS.KEYID = 0
1,199,284 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,289 UART: [ldev] ++
1,209,457 UART: [ldev] CDI.KEYID = 6
1,209,821 UART: [ldev] SUBJECT.KEYID = 5
1,210,248 UART: [ldev] AUTHORITY.KEYID = 7
1,210,711 UART: [ldev] FE.KEYID = 1
1,216,137 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,149 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,229 UART: [fwproc] Recv command 0x46574c44
1,283,962 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,431 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,606 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,253 >>> mbox cmd response: success
2,363,253 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,489 UART: [afmc] ++
2,364,657 UART: [afmc] CDI.KEYID = 6
2,365,020 UART: [afmc] SUBJECT.KEYID = 7
2,365,446 UART: [afmc] AUTHORITY.KEYID = 5
2,402,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,418,884 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,419,633 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,425,343 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,224 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,925 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,522 UART: [afmc] --
2,445,517 UART: [cold-reset] --
2,446,301 UART: [state] Locking Datavault
2,447,420 UART: [state] Locking PCR0, PCR1 and PCR31
2,448,024 UART: [state] Locking ICCM
2,448,466 UART: [exit] Launching FMC @ 0x40000130
2,453,796 UART:
2,453,812 UART: Running Caliptra FMC ...
2,454,220 UART:
2,454,363 UART: [state] CFI Enabled
2,464,755 UART: [fht] FMC Alias Private Key: 7
2,584,027 UART: [art] Extend RT PCRs Done
2,584,455 UART: [art] Lock RT PCRs Done
2,585,779 UART: [art] Populate DV Done
2,594,058 UART: [fht] FMC Alias Private Key: 7
2,595,164 UART: [art] Derive CDI
2,595,444 UART: [art] Store in slot 0x4
2,681,537 UART: [art] Derive Key Pair
2,681,897 UART: [art] Store priv key in slot 0x5
2,694,737 UART: [art] Derive Key Pair - Done
2,709,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,195 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,960 UART: [art] PUB.X = 88A736FBDF42D973428B9FC037A10A72457A50526E7EC14B507B44AD546AB53F95F4CA4ABC691C3E6E06796A4ABA2069
2,732,732 UART: [art] PUB.Y = E93576BDB40628D89D8CCFC485B57F3202FCC444D9F1FD578AA71A1918373D8C470A88EFC26AE78A9665FC9F3241A21F
2,739,683 UART: [art] SIG.R = 1AA0D56E05304A69F7C2EF5330811E7A4D49B0A49A19DE17887BFD523553E4E894BF4FE1D70261DC820BE94F77E0828A
2,746,450 UART: [art] SIG.S = 35EAE9F79359555A1FC7CC6DE8F22F135061101E79067591B827CB208485313DE95F9BCF6E5EA1C004AF0F239571483A
2,770,441 UART: mbox::rt_entry...
2,770,813 UART: ____ _ _ _ ____ _____
2,771,597 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,165 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,933 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,701 UART: |_|
2,775,013 UART:
2,892,968 UART: [rt] Runtime listening for mailbox commands...
2,899,302 >>> mbox cmd response data (4360 bytes)
2,899,303 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,085 >>> mbox cmd response data (0 bytes)
2,930,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,930,204 UART:
2,930,220 UART: Running Caliptra ROM ...
2,930,628 UART:
2,930,770 UART: [state] CFI Enabled
2,933,608 UART: [state] LifecycleState = Unprovisioned
2,934,263 UART: [state] DebugLocked = No
2,934,881 UART: [state] WD Timer not started. Device not locked for debugging
2,936,033 UART: [kat] SHA2-256
3,739,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,743,687 UART: [kat] ++
3,743,839 UART: [kat] sha1
3,748,123 UART: [kat] SHA2-256
3,750,063 UART: [kat] SHA2-384
3,752,778 UART: [kat] SHA2-512-ACC
3,754,678 UART: [kat] ECC-384
3,764,669 UART: [kat] HMAC-384Kdf
3,769,319 UART: [kat] LMS
4,017,631 UART: [kat] --
4,018,557 UART: [update-reset] ++
5,377,542 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,378,613 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,533,828 >>> mbox cmd response: success
5,533,937 UART: [update-reset] Copying MAN_2 To MAN_1
5,541,951 UART: [update-reset Success] --
5,542,934 UART: [state] Locking Datavault
5,543,780 UART: [state] Locking PCR0, PCR1 and PCR31
5,544,384 UART: [state] Locking ICCM
5,544,958 UART: [exit] Launching FMC @ 0x40000130
5,550,288 UART:
5,550,304 UART: Running Caliptra FMC ...
5,550,712 UART:
5,550,855 UART: [state] CFI Enabled
5,639,896 UART: [art] Extend RT PCRs Done
5,640,324 UART: [art] Lock RT PCRs Done
5,641,833 UART: [art] Populate DV Done
5,650,268 UART: [fht] FMC Alias Private Key: 7
5,651,244 UART: [art] Derive CDI
5,651,524 UART: [art] Store in slot 0x4
5,737,741 UART: [art] Derive Key Pair
5,738,101 UART: [art] Store priv key in slot 0x5
5,750,851 UART: [art] Derive Key Pair - Done
5,765,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,100 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,865 UART: [art] PUB.X = 986FAFB0CD95A43FA25F8D97E1C9FC08D6B848C7591B34DD9B97D846E7EF701039048A476E63F07879592BA3457C6C79
5,788,633 UART: [art] PUB.Y = 8AD534A9205E2A59115DE3A864ED2337D11CF19B5432ACB7C0C3C2B6076588395D0F750D0E61BA48B50B6AF05A3EC644
5,795,574 UART: [art] SIG.R = 4FD94A1E3500E5FC1D571C04E66A7E5463F66347E709ED5FF88D4098E567E47C260EA86566659B4156FF66CE39F6EBD5
5,802,317 UART: [art] SIG.S = CEE49BF42FA12993BDE0098F9280C2E4CF29C5A7CC73DA70526D1FABB4D5FC87B72140FEB18B3AEB5417E8B823420A4B
5,825,795 UART: Caliptra RT
5,826,138 UART: [state] CFI Enabled
6,195,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,196,885 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,227,523 UART: [rt]cmd =0x494e464f, len=4
6,231,315 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 ready_for_fw is high
1,059,885 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,738 >>> mbox cmd response: success
2,218,738 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,280,715 UART:
2,280,731 UART: Running Caliptra FMC ...
2,281,139 UART:
2,281,282 UART: [state] CFI Enabled
2,292,176 UART: [fht] FMC Alias Private Key: 7
2,411,002 UART: [art] Extend RT PCRs Done
2,411,430 UART: [art] Lock RT PCRs Done
2,413,308 UART: [art] Populate DV Done
2,421,591 UART: [fht] FMC Alias Private Key: 7
2,422,617 UART: [art] Derive CDI
2,422,897 UART: [art] Store in slot 0x4
2,508,634 UART: [art] Derive Key Pair
2,508,994 UART: [art] Store priv key in slot 0x5
2,522,662 UART: [art] Derive Key Pair - Done
2,537,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,440 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,205 UART: [art] PUB.X = 1DB7B6314A256972EEB6F1EDE81B1C89F57BD624D7CF066F9EEF75DEC80D22BDC50B1B76D2E33BAB2AADD0A53563A494
2,559,990 UART: [art] PUB.Y = FC101AD107EFE6A99DFB64204F1747E2207734A597F9907BC31708EE509F925EA61F118E9347F31F78E9827D25680EDC
2,566,931 UART: [art] SIG.R = 7C60A5DF44B710F4EFFB20E213F3821057B13972D78C2DEA35236A1B25F5159B883F51C5EDE7000644F86E7160348395
2,573,672 UART: [art] SIG.S = 857455DE8B2322B10E0440E2F610736B40DE4DFF785F46CE4FA04887AA63D5A7E29C6E14ABB76B538C817B7F18A1AF53
2,596,768 UART: mbox::rt_entry...
2,597,140 UART: ____ _ _ _ ____ _____
2,597,924 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,724 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,492 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,260 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,028 UART: |_|
2,601,340 UART:
2,720,278 UART: [rt] Runtime listening for mailbox commands...
2,726,612 >>> mbox cmd response data (4360 bytes)
2,726,613 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,757,395 >>> mbox cmd response data (0 bytes)
2,757,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,244,949 >>> mbox cmd response: success
5,258,104 UART:
5,258,120 UART: Running Caliptra FMC ...
5,258,528 UART:
5,258,671 UART: [state] CFI Enabled
5,347,688 UART: [art] Extend RT PCRs Done
5,348,116 UART: [art] Lock RT PCRs Done
5,349,313 UART: [art] Populate DV Done
5,357,658 UART: [fht] FMC Alias Private Key: 7
5,358,588 UART: [art] Derive CDI
5,358,868 UART: [art] Store in slot 0x4
5,445,021 UART: [art] Derive Key Pair
5,445,381 UART: [art] Store priv key in slot 0x5
5,458,951 UART: [art] Derive Key Pair - Done
5,473,825 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,489,486 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,251 UART: [art] PUB.X = D5455618DAE9644253026150529475D5875CD5DFAAC1BF67F507AD2AAB4A7E55146A87AE9CE3875DCAA42199DE420B75
5,497,018 UART: [art] PUB.Y = A8E76C3A74D1D6F40FF72AD4C18A04A2C612B0B33D5027734D40F10AE06271B2190C28CEEB602416A168B9F145CC0AAD
5,503,963 UART: [art] SIG.R = 3B2FC5FE771F3744766EFDE895FEB6CFEB05341D64B1E6B8E3591B6A7A51DDCE3A0C2628FDDF8FBB708E91E8CEA86CC8
5,510,755 UART: [art] SIG.S = CBF22E9CA75E9127C4C969BA6FFBBBFFCB1B4616E0CA8FDA36071C11B2309B75157B1AE4A2DDE646468B1B0BC9DF67D0
5,534,371 UART: Caliptra RT
5,534,714 UART: [state] CFI Enabled
5,903,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,904,439 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,934,747 UART: [rt]cmd =0x494e464f, len=4
5,938,299 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,500 UART: [state] LifecycleState = Unprovisioned
86,155 UART: [state] DebugLocked = No
86,879 UART: [state] WD Timer not started. Device not locked for debugging
88,166 UART: [kat] SHA2-256
893,816 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,941 UART: [kat] ++
898,093 UART: [kat] sha1
902,343 UART: [kat] SHA2-256
904,283 UART: [kat] SHA2-384
907,138 UART: [kat] SHA2-512-ACC
909,039 UART: [kat] ECC-384
918,596 UART: [kat] HMAC-384Kdf
923,058 UART: [kat] LMS
1,171,386 UART: [kat] --
1,172,193 UART: [cold-reset] ++
1,172,521 UART: [fht] FHT @ 0x50003400
1,175,144 UART: [idev] ++
1,175,312 UART: [idev] CDI.KEYID = 6
1,175,672 UART: [idev] SUBJECT.KEYID = 7
1,176,096 UART: [idev] UDS.KEYID = 0
1,176,441 ready_for_fw is high
1,176,441 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,236 UART: [idev] Erasing UDS.KEYID = 0
1,201,091 UART: [idev] Sha1 KeyId Algorithm
1,209,437 UART: [idev] --
1,210,305 UART: [ldev] ++
1,210,473 UART: [ldev] CDI.KEYID = 6
1,210,836 UART: [ldev] SUBJECT.KEYID = 5
1,211,262 UART: [ldev] AUTHORITY.KEYID = 7
1,211,725 UART: [ldev] FE.KEYID = 1
1,217,109 UART: [ldev] Erasing FE.KEYID = 1
1,243,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,147 UART: [ldev] --
1,283,628 UART: [fwproc] Wait for Commands...
1,284,370 UART: [fwproc] Recv command 0x46574c44
1,285,098 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,418 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,248,317 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,279,487 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,366,110 >>> mbox cmd response: success
2,366,110 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,367,216 UART: [afmc] ++
2,367,384 UART: [afmc] CDI.KEYID = 6
2,367,746 UART: [afmc] SUBJECT.KEYID = 7
2,368,171 UART: [afmc] AUTHORITY.KEYID = 5
2,403,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,827 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,536 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,419 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,120 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,924 UART: [afmc] --
2,446,934 UART: [cold-reset] --
2,447,922 UART: [state] Locking Datavault
2,448,945 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,549 UART: [state] Locking ICCM
2,450,087 UART: [exit] Launching FMC @ 0x40000130
2,455,417 UART:
2,455,433 UART: Running Caliptra FMC ...
2,455,841 UART:
2,455,895 UART: [state] CFI Enabled
2,466,745 UART: [fht] FMC Alias Private Key: 7
2,585,841 UART: [art] Extend RT PCRs Done
2,586,269 UART: [art] Lock RT PCRs Done
2,587,977 UART: [art] Populate DV Done
2,596,066 UART: [fht] FMC Alias Private Key: 7
2,597,224 UART: [art] Derive CDI
2,597,504 UART: [art] Store in slot 0x4
2,683,509 UART: [art] Derive Key Pair
2,683,869 UART: [art] Store priv key in slot 0x5
2,697,611 UART: [art] Derive Key Pair - Done
2,712,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,365 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,130 UART: [art] PUB.X = C22D1B1982A0B6D37E91D8FC8E6721BDB859FF0A2959F1A9CD759BA73941406DE6B0252B72F1A6ABC5E0DB1008EEE474
2,734,908 UART: [art] PUB.Y = 0A6F0318F66C36039FE5A56C51558557915E69CD5BDE3142D49D4615A4BAD97700B1A3B5DE9802CAE923973339105C6A
2,741,822 UART: [art] SIG.R = 19F96F6E2233BD5919F24D8357D1B0033DAB2199550C7B65DCAB00DA3BBBAD6639047CFA884C5B62A6F33DADA35A6BE2
2,748,577 UART: [art] SIG.S = 9961B7CA11CB3B53017FFB911EE2191F7714B9537776F8415738815883EEE15FC40F4E9704C2E86129477BE43AA14BB2
2,772,280 UART: mbox::rt_entry...
2,772,652 UART: ____ _ _ _ ____ _____
2,773,436 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,774,236 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,004 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,772 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,776,540 UART: |_|
2,776,852 UART:
2,895,674 UART: [rt] Runtime listening for mailbox commands...
2,902,008 >>> mbox cmd response data (4360 bytes)
2,902,009 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,932,791 >>> mbox cmd response data (0 bytes)
2,932,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,932,910 UART:
2,932,926 UART: Running Caliptra ROM ...
2,933,334 UART:
2,933,389 UART: [state] CFI Enabled
2,935,845 UART: [state] LifecycleState = Unprovisioned
2,936,500 UART: [state] DebugLocked = No
2,937,066 UART: [state] WD Timer not started. Device not locked for debugging
2,938,372 UART: [kat] SHA2-256
3,744,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,748,147 UART: [kat] ++
3,748,299 UART: [kat] sha1
3,752,581 UART: [kat] SHA2-256
3,754,521 UART: [kat] SHA2-384
3,757,104 UART: [kat] SHA2-512-ACC
3,759,004 UART: [kat] ECC-384
3,768,771 UART: [kat] HMAC-384Kdf
3,773,395 UART: [kat] LMS
4,021,723 UART: [kat] --
4,022,697 UART: [update-reset] ++
5,382,341 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,383,352 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,538,567 >>> mbox cmd response: success
5,538,750 UART: [update-reset] Copying MAN_2 To MAN_1
5,546,764 UART: [update-reset Success] --
5,547,719 UART: [state] Locking Datavault
5,548,569 UART: [state] Locking PCR0, PCR1 and PCR31
5,549,173 UART: [state] Locking ICCM
5,549,779 UART: [exit] Launching FMC @ 0x40000130
5,555,109 UART:
5,555,125 UART: Running Caliptra FMC ...
5,555,533 UART:
5,555,587 UART: [state] CFI Enabled
5,645,114 UART: [art] Extend RT PCRs Done
5,645,542 UART: [art] Lock RT PCRs Done
5,646,897 UART: [art] Populate DV Done
5,655,146 UART: [fht] FMC Alias Private Key: 7
5,656,076 UART: [art] Derive CDI
5,656,356 UART: [art] Store in slot 0x4
5,741,961 UART: [art] Derive Key Pair
5,742,321 UART: [art] Store priv key in slot 0x5
5,756,105 UART: [art] Derive Key Pair - Done
5,771,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,786,397 UART: [art] Erasing AUTHORITY.KEYID = 7
5,787,162 UART: [art] PUB.X = B8BD8B54CA53F227A2DF110B3ED1B3BA9BEC903560BA67D2E83961D90C03B10FB774A71B170E6CBFD09AFCC621100FCE
5,793,936 UART: [art] PUB.Y = 3F07416D3F8138FCF417BEEE39AE120168FFF9B7B75284FDDEF9C72DACF930A47CE51F528746436CC067ED13DFC2B99D
5,800,898 UART: [art] SIG.R = 048F7E6F162485765A1CA6C23E38C2FD03BE50D9C3E90256512C4887D4007BDCC05B2CC774DE60389B4248C569EB8748
5,807,637 UART: [art] SIG.S = ABB271A49B4777F45B2566A716513059C0461A8C74216741AB6DBCFA61615F38EF57DD734DF8A6A1AA5108D7C0C1B449
5,831,570 UART: Caliptra RT
5,831,821 UART: [state] CFI Enabled
6,198,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,199,562 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,229,698 UART: [rt]cmd =0x494e464f, len=4
6,233,392 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,625 ready_for_fw is high
1,060,625 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,365 >>> mbox cmd response: success
2,217,365 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,998 UART:
2,280,014 UART: Running Caliptra FMC ...
2,280,422 UART:
2,280,476 UART: [state] CFI Enabled
2,291,384 UART: [fht] FMC Alias Private Key: 7
2,410,036 UART: [art] Extend RT PCRs Done
2,410,464 UART: [art] Lock RT PCRs Done
2,412,184 UART: [art] Populate DV Done
2,420,545 UART: [fht] FMC Alias Private Key: 7
2,421,569 UART: [art] Derive CDI
2,421,849 UART: [art] Store in slot 0x4
2,507,416 UART: [art] Derive Key Pair
2,507,776 UART: [art] Store priv key in slot 0x5
2,520,574 UART: [art] Derive Key Pair - Done
2,535,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,994 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,759 UART: [art] PUB.X = E1DF1A3A25265512279251D66467A4D897A63C77844380CB65BE534D2C3ED55EDF45256CAC0E8EF871B0283F61B0E152
2,558,526 UART: [art] PUB.Y = 89BAD894FC19E26F54DF5DA02057FDC36256ED337327174899F3224356B22EA72D226AD36B773DF9825D6AA910A424C2
2,565,476 UART: [art] SIG.R = 8A18197F1EEF94AEE71B7411D704D210C144BEA46ABE1E040FD7DEC288FCAE81991D89A7F4085C4F7056F69E35597C60
2,572,244 UART: [art] SIG.S = C18B903ADCCC2AF90BB62D926248AF482309CDB1BC947AC3A463202F12F902D9AAEFA79BECFD7BA77167D646A7F03BB7
2,595,707 UART: mbox::rt_entry...
2,596,079 UART: ____ _ _ _ ____ _____
2,596,863 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,663 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,431 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,199 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,967 UART: |_|
2,600,279 UART:
2,717,672 UART: [rt] Runtime listening for mailbox commands...
2,724,006 >>> mbox cmd response data (4360 bytes)
2,724,007 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,754,789 >>> mbox cmd response data (0 bytes)
2,754,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,244,796 >>> mbox cmd response: success
5,258,271 UART:
5,258,287 UART: Running Caliptra FMC ...
5,258,695 UART:
5,258,749 UART: [state] CFI Enabled
5,348,206 UART: [art] Extend RT PCRs Done
5,348,634 UART: [art] Lock RT PCRs Done
5,349,773 UART: [art] Populate DV Done
5,357,974 UART: [fht] FMC Alias Private Key: 7
5,359,134 UART: [art] Derive CDI
5,359,414 UART: [art] Store in slot 0x4
5,445,225 UART: [art] Derive Key Pair
5,445,585 UART: [art] Store priv key in slot 0x5
5,458,941 UART: [art] Derive Key Pair - Done
5,473,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,745 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,510 UART: [art] PUB.X = 82BB631CD155832CA527A6A63A97529C6039B06019E7B529BDD91CC6700627E17922CF864171FFDDC983150E1CED8C2F
5,496,276 UART: [art] PUB.Y = 5F8055DA78E00D6E2FFA2C85618361FCA994B4CCBB26DC96F020862C68FBEE77977030CF2EBAAA81D748086B8E479186
5,503,230 UART: [art] SIG.R = 68B02E24548BB14C26C70A2637E7971F2035EBBB79BB57D0B6CE07860CEF2647BF0D939964506BA4F292B42D6FEA1392
5,509,992 UART: [art] SIG.S = E52160B41A5E0A232A10D8BEF09A475589DD08C5033088FEDABD09BA7005E867C982CAAAFFBD1673EE46FD6759137651
5,533,337 UART: Caliptra RT
5,533,588 UART: [state] CFI Enabled
5,904,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,905,565 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,935,875 UART: [rt]cmd =0x494e464f, len=4
5,939,581 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,071 UART: [state] LifecycleState = Unprovisioned
85,726 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,547 UART: [kat] SHA2-256
893,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,322 UART: [kat] ++
897,474 UART: [kat] sha1
901,746 UART: [kat] SHA2-256
903,686 UART: [kat] SHA2-384
906,457 UART: [kat] SHA2-512-ACC
908,358 UART: [kat] ECC-384
918,141 UART: [kat] HMAC-384Kdf
922,647 UART: [kat] LMS
1,170,975 UART: [kat] --
1,172,144 UART: [cold-reset] ++
1,172,486 UART: [fht] FHT @ 0x50003400
1,175,179 UART: [idev] ++
1,175,347 UART: [idev] CDI.KEYID = 6
1,175,707 UART: [idev] SUBJECT.KEYID = 7
1,176,131 UART: [idev] UDS.KEYID = 0
1,176,476 ready_for_fw is high
1,176,476 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,103 UART: [idev] Erasing UDS.KEYID = 0
1,200,676 UART: [idev] Sha1 KeyId Algorithm
1,209,022 UART: [idev] --
1,210,228 UART: [ldev] ++
1,210,396 UART: [ldev] CDI.KEYID = 6
1,210,759 UART: [ldev] SUBJECT.KEYID = 5
1,211,185 UART: [ldev] AUTHORITY.KEYID = 7
1,211,648 UART: [ldev] FE.KEYID = 1
1,217,006 UART: [ldev] Erasing FE.KEYID = 1
1,243,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,184 UART: [ldev] --
1,282,475 UART: [fwproc] Wait for Commands...
1,283,271 UART: [fwproc] Recv command 0x46574c44
1,283,999 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,426 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,364,159 >>> mbox cmd response: success
2,364,159 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,365,171 UART: [afmc] ++
2,365,339 UART: [afmc] CDI.KEYID = 6
2,365,701 UART: [afmc] SUBJECT.KEYID = 7
2,366,126 UART: [afmc] AUTHORITY.KEYID = 5
2,401,415 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,972 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,720 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,424,429 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,430,312 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,436,013 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,444,013 UART: [afmc] --
2,445,121 UART: [cold-reset] --
2,445,963 UART: [state] Locking Datavault
2,447,158 UART: [state] Locking PCR0, PCR1 and PCR31
2,447,762 UART: [state] Locking ICCM
2,448,204 UART: [exit] Launching FMC @ 0x40000130
2,453,534 UART:
2,453,550 UART: Running Caliptra FMC ...
2,453,958 UART:
2,454,101 UART: [state] CFI Enabled
2,464,915 UART: [fht] FMC Alias Private Key: 7
2,583,763 UART: [art] Extend RT PCRs Done
2,584,191 UART: [art] Lock RT PCRs Done
2,585,643 UART: [art] Populate DV Done
2,593,916 UART: [fht] FMC Alias Private Key: 7
2,594,908 UART: [art] Derive CDI
2,595,188 UART: [art] Store in slot 0x4
2,681,717 UART: [art] Derive Key Pair
2,682,077 UART: [art] Store priv key in slot 0x5
2,695,175 UART: [art] Derive Key Pair - Done
2,709,582 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,029 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,794 UART: [art] PUB.X = FCCA1318FB5313BD1631F73B6275895141B7B921416F66B6EA6B2B86A5D1DCBD23F2E730CCCF5CDB3CF514C88B34713D
2,732,578 UART: [art] PUB.Y = 5FE1D4E74596069CFB0F555EDC43515099283B2A17BE17DA703B3082599176FD9A3B5F41D044FEAAC488DFFEBEC8E686
2,739,534 UART: [art] SIG.R = E7BF0E3BF5FC4350F55E8D32F548A0F5FEC28E6F5880FB9EFADF2DF65D5758B1E6EA06C62B05E8B2F0FDE2CCFC9B3249
2,746,325 UART: [art] SIG.S = 42951E9C57B68FB5E1D6FBDE698C8E372A5A93294B745DDFB1C9BCE315A23AF9001DA5C8C129813C8BB7E24D0E380C39
2,770,063 UART: mbox::rt_entry...
2,770,435 UART: ____ _ _ _ ____ _____
2,771,219 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,019 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,787 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,555 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,323 UART: |_|
2,774,635 UART:
2,893,061 UART: [rt] Runtime listening for mailbox commands...
2,899,395 >>> mbox cmd response data (4360 bytes)
2,899,396 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,178 >>> mbox cmd response data (0 bytes)
2,930,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,930,297 UART:
2,930,313 UART: Running Caliptra ROM ...
2,930,721 UART:
2,930,863 UART: [state] CFI Enabled
2,933,533 UART: [state] LifecycleState = Unprovisioned
2,934,188 UART: [state] DebugLocked = No
2,934,858 UART: [state] WD Timer not started. Device not locked for debugging
2,936,052 UART: [kat] SHA2-256
3,741,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,745,827 UART: [kat] ++
3,745,979 UART: [kat] sha1
3,750,063 UART: [kat] SHA2-256
3,752,003 UART: [kat] SHA2-384
3,754,816 UART: [kat] SHA2-512-ACC
3,756,716 UART: [kat] ECC-384
3,766,459 UART: [kat] HMAC-384Kdf
3,771,109 UART: [kat] LMS
4,019,437 UART: [kat] --
4,020,267 UART: [update-reset] ++
5,379,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,380,256 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,471 >>> mbox cmd response: success
5,535,634 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,648 UART: [update-reset Success] --
5,544,809 UART: [state] Locking Datavault
5,545,729 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,333 UART: [state] Locking ICCM
5,546,999 UART: [exit] Launching FMC @ 0x40000130
5,552,329 UART:
5,552,345 UART: Running Caliptra FMC ...
5,552,753 UART:
5,552,896 UART: [state] CFI Enabled
5,642,111 UART: [art] Extend RT PCRs Done
5,642,539 UART: [art] Lock RT PCRs Done
5,643,742 UART: [art] Populate DV Done
5,652,059 UART: [fht] FMC Alias Private Key: 7
5,653,215 UART: [art] Derive CDI
5,653,495 UART: [art] Store in slot 0x4
5,739,294 UART: [art] Derive Key Pair
5,739,654 UART: [art] Store priv key in slot 0x5
5,752,618 UART: [art] Derive Key Pair - Done
5,767,207 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,782,732 UART: [art] Erasing AUTHORITY.KEYID = 7
5,783,497 UART: [art] PUB.X = E6ED0F700D85261F216092D79F504DD7B5F37AC8FB494F7E58671447CD0426BABB81048C343CE44CEF875A447924748B
5,790,257 UART: [art] PUB.Y = F4FDFB2815E613F6A5E8FF159B697BD28C1B2DD2E5DB49522146A09D5B8AA6A46532B5001BC7A4A97571A722E5DACE47
5,797,199 UART: [art] SIG.R = 07F4B481631DD490C376B236EC7DEF92382C53F9DCA34364DE8F73599DAFC753F05817B625E3DB7141340CF027260BE7
5,803,962 UART: [art] SIG.S = 7F31B61C9485592DD5FC510A539E0BEB94815DFA4C8A347698F784BDF4B1C20C30A89E4157D9B676AF45B3A35FDBC66E
5,827,739 UART: Caliptra RT
5,828,082 UART: [state] CFI Enabled
6,196,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,197,532 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,227,822 UART: [rt]cmd =0x494e464f, len=4
6,231,534 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,730 ready_for_fw is high
1,060,730 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,466 >>> mbox cmd response: success
2,217,466 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,981 UART:
2,279,997 UART: Running Caliptra FMC ...
2,280,405 UART:
2,280,548 UART: [state] CFI Enabled
2,291,516 UART: [fht] FMC Alias Private Key: 7
2,410,854 UART: [art] Extend RT PCRs Done
2,411,282 UART: [art] Lock RT PCRs Done
2,412,600 UART: [art] Populate DV Done
2,420,811 UART: [fht] FMC Alias Private Key: 7
2,421,793 UART: [art] Derive CDI
2,422,073 UART: [art] Store in slot 0x4
2,507,878 UART: [art] Derive Key Pair
2,508,238 UART: [art] Store priv key in slot 0x5
2,521,572 UART: [art] Derive Key Pair - Done
2,536,720 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,283 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,048 UART: [art] PUB.X = B3DFAF2E62B435F3279092FC027930EF0EB4C42C8598B7CDF7B8C54F4763D4EB118BD343C9439438713A2E639D0F0446
2,559,810 UART: [art] PUB.Y = 24748238987D5154A298107F4E3DA6739C8E1237490AF057888D7C724229C7E3E7D65443A11E06DE937CBAEDA5DEEBED
2,566,756 UART: [art] SIG.R = EF7047580CE8B8AD6D75F3C5DB61F64A5ABBE16B826801201AEBC5D16497E0FA119B69DF1A9CA765309FC22745DAF0A1
2,573,536 UART: [art] SIG.S = 69DAF17C088BC76D69F07D15C9179F3D5073F67CA7A0B1F39DA00713580E98DD2650E24425699D5452E8C0780A4EAED6
2,597,008 UART: mbox::rt_entry...
2,597,380 UART: ____ _ _ _ ____ _____
2,598,164 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,964 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,732 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,500 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,268 UART: |_|
2,601,580 UART:
2,720,924 UART: [rt] Runtime listening for mailbox commands...
2,727,258 >>> mbox cmd response data (4360 bytes)
2,727,259 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,758,041 >>> mbox cmd response data (0 bytes)
2,758,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,249,015 >>> mbox cmd response: success
5,262,646 UART:
5,262,662 UART: Running Caliptra FMC ...
5,263,070 UART:
5,263,213 UART: [state] CFI Enabled
5,352,370 UART: [art] Extend RT PCRs Done
5,352,798 UART: [art] Lock RT PCRs Done
5,353,941 UART: [art] Populate DV Done
5,361,980 UART: [fht] FMC Alias Private Key: 7
5,363,130 UART: [art] Derive CDI
5,363,410 UART: [art] Store in slot 0x4
5,448,991 UART: [art] Derive Key Pair
5,449,351 UART: [art] Store priv key in slot 0x5
5,462,297 UART: [art] Derive Key Pair - Done
5,477,049 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,492,492 UART: [art] Erasing AUTHORITY.KEYID = 7
5,493,257 UART: [art] PUB.X = 564787A57F5EB899C167ABB387201E657853F61C441B682E68177598D8CE915F362E47E6B2CC26FFD9F1617769C26EAD
5,500,025 UART: [art] PUB.Y = BD62FB1D3A8504EB8DA0EEAB4555AD87A385B5D822AC15B090377001CDDCEE1F564C823744388BFE6DD78B0D0BFC380A
5,506,980 UART: [art] SIG.R = AFB10C69FD3E39D21C7E93C114C82DF7E5633F081EF34AC3F5FBE4A4D75EBE197B97A3324615C92A15798E2EA4A88621
5,513,756 UART: [art] SIG.S = 1C3602A7F6A6AF1BE8E4E5DA1E5DA4F6C75299C81BC9D1003D44F0BC6A71284DAECEC8F24CCEA973E3CD266159C90097
5,537,041 UART: Caliptra RT
5,537,384 UART: [state] CFI Enabled
5,904,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,905,607 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,936,147 UART: [rt]cmd =0x494e464f, len=4
5,939,827 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_deformed_structure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
192,073 UART:
192,439 UART: Running Caliptra ROM ...
193,584 UART:
193,734 UART: [state] CFI Enabled
261,432 UART: [state] LifecycleState = Unprovisioned
263,335 UART: [state] DebugLocked = No
266,288 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,957 UART: [kat] SHA2-256
440,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,211 UART: [kat] ++
451,693 UART: [kat] sha1
462,211 UART: [kat] SHA2-256
464,932 UART: [kat] SHA2-384
471,843 UART: [kat] SHA2-512-ACC
474,207 UART: [kat] ECC-384
2,768,238 UART: [kat] HMAC-384Kdf
2,799,233 UART: [kat] LMS
3,989,521 UART: [kat] --
3,995,239 UART: [cold-reset] ++
3,997,811 UART: [fht] Storing FHT @ 0x50003400
4,009,500 UART: [idev] ++
4,010,077 UART: [idev] CDI.KEYID = 6
4,010,994 UART: [idev] SUBJECT.KEYID = 7
4,012,260 UART: [idev] UDS.KEYID = 0
4,013,291 ready_for_fw is high
4,013,494 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,117,907 UART: [idev] Erasing UDS.KEYID = 0
7,345,111 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,952 UART: [idev] --
7,371,358 UART: [ldev] ++
7,371,927 UART: [ldev] CDI.KEYID = 6
7,372,906 UART: [ldev] SUBJECT.KEYID = 5
7,374,121 UART: [ldev] AUTHORITY.KEYID = 7
7,375,352 UART: [ldev] FE.KEYID = 1
7,402,313 UART: [ldev] Erasing FE.KEYID = 1
10,735,343 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,661 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,482 UART: [ldev] --
13,118,556 UART: [fwproc] Waiting for Commands...
13,121,027 UART: [fwproc] Received command 0x46574c44
13,123,206 UART: [fwproc] Received Image of size 82832 bytes
16,793,790 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,866,180 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,939,361 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,142,727 >>> mbox cmd response: success
17,143,827 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,146,656 UART: [afmc] ++
17,147,297 UART: [afmc] CDI.KEYID = 6
17,148,205 UART: [afmc] SUBJECT.KEYID = 7
17,149,419 UART: [afmc] AUTHORITY.KEYID = 5
20,516,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,815,320 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,817,596 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,832,092 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,846,777 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,861,174 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,882,780 UART: [afmc] --
22,885,782 UART: [cold-reset] --
22,890,937 UART: [state] Locking Datavault
22,896,772 UART: [state] Locking PCR0, PCR1 and PCR31
22,898,521 UART: [state] Locking ICCM
22,899,916 UART: [exit] Launching FMC @ 0x40000130
22,908,352 UART:
22,908,606 UART: Running Caliptra FMC ...
22,909,707 UART:
22,909,869 UART: [state] CFI Enabled
22,976,085 UART: [fht] FMC Alias Private Key: 7
25,316,722 UART: [art] Extend RT PCRs Done
25,317,978 UART: [art] Lock RT PCRs Done
25,319,528 UART: [art] Populate DV Done
25,325,048 UART: [fht] FMC Alias Private Key: 7
25,326,752 UART: [art] Derive CDI
25,327,563 UART: [art] Store in slot 0x4
25,378,147 UART: [art] Derive Key Pair
25,379,146 UART: [art] Store priv key in slot 0x5
28,671,759 UART: [art] Derive Key Pair - Done
28,684,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,973,199 UART: [art] Erasing AUTHORITY.KEYID = 7
30,974,714 UART: [art] PUB.X = 1FF01CD533992DFBE6C9A0643B693BF712F07B3F7D6B0ADF89E8312A6DE43E3C3629A24C60EA653E7C47CB988DFD5BB1
30,981,978 UART: [art] PUB.Y = 4C7E9482E4854190C1B5F1595416AF850DFF885DFCEADA27ED29DFEE0EECD3F521138B7594AAEE090A3F81B470F8A200
30,989,217 UART: [art] SIG.R = 2A02127D19FA5383216B812B0261827BF9A243BBCA3063ACD8C036A714DCB896FA042A3A6B445C6D5E3480146C63D5E6
30,996,605 UART: [art] SIG.S = 08CB828C7F559529F21A8D985FED2B4DBF17E2C179346264F055F8270B91020D36E9385CEC9C73629B079779FD73EEB2
32,301,716 UART: mbox::rt_entry...
32,302,684 UART: ____ _ _ _ ____ _____
32,304,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,306,706 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,308,641 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,310,573 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,312,432 UART: |_|
32,313,311 UART:
32,444,918 UART: [rt] Runtime listening for mailbox commands...
32,452,143 >>> mbox cmd response data (4360 bytes)
32,472,839 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,517,240 >>> mbox cmd response data (0 bytes)
34,590,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,740,421 UART:
34,740,800 UART: Running Caliptra ROM ...
34,741,899 UART:
34,742,069 UART: [state] CFI Enabled
34,807,721 UART: [state] LifecycleState = Unprovisioned
34,809,675 UART: [state] DebugLocked = No
34,811,327 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,815,367 UART: [kat] SHA2-256
34,985,102 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,995,587 UART: [kat] ++
34,996,124 UART: [kat] sha1
35,006,256 UART: [kat] SHA2-256
35,008,958 UART: [kat] SHA2-384
35,013,547 UART: [kat] SHA2-512-ACC
35,015,897 UART: [kat] ECC-384
37,313,433 UART: [kat] HMAC-384Kdf
37,346,299 UART: [kat] LMS
38,536,675 UART: [kat] --
38,539,328 UART: [update-reset] ++
42,726,673 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,730,826 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,128,570 >>> mbox cmd response: success
43,133,021 UART: [update-reset] Copying MAN_2 To MAN_1
43,151,492 UART: [update-reset Success] --
43,156,003 UART: [state] Locking Datavault
43,159,328 UART: [state] Locking PCR0, PCR1 and PCR31
43,161,100 UART: [state] Locking ICCM
43,163,608 UART: [exit] Launching FMC @ 0x40000130
43,172,013 UART:
43,172,252 UART: Running Caliptra FMC ...
43,173,352 UART:
43,173,513 UART: [state] CFI Enabled
43,266,477 UART: [art] Extend RT PCRs Done
43,267,670 UART: [art] Lock RT PCRs Done
43,269,239 UART: [art] Populate DV Done
43,274,754 UART: [fht] FMC Alias Private Key: 7
43,276,396 UART: [art] Derive CDI
43,277,207 UART: [art] Store in slot 0x4
43,335,634 UART: [art] Derive Key Pair
43,336,674 UART: [art] Store priv key in slot 0x5
46,629,445 UART: [art] Derive Key Pair - Done
46,642,512 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,930,471 UART: [art] Erasing AUTHORITY.KEYID = 7
48,932,000 UART: [art] PUB.X = 62EB702BA6A5851B7F010810798846BE2EA5F8517892362E6B68C9293277AE4BA122A5BF532E59C37648EF36CD51E936
48,939,277 UART: [art] PUB.Y = BAB3ADD475B0F2039C9C2C0C4FDA73246F6BC3FB1CFE77EF7108DF58044941226CCA6C58A4379B86F28866E8655ABB2F
48,946,505 UART: [art] SIG.R = FF1C0AED8D6AEAA928F278D47336893DC634D010CFDF0E0B60C80216555D25B49531D033C46D1E69460B648FEED00FF9
48,953,854 UART: [art] SIG.S = B0FE0357BA56CFFE94E6533FE9D5E55ECAE4C232E90AFCE86E073334DE1680FDDDF0CC1EAB4B85FDBFDE32F8AE7179E3
50,258,769 UART: Caliptra RT
50,259,581 UART: [state] CFI Enabled
53,668,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,669,602 UART: [rt] RT listening for mailbox commands...
53,701,214 UART: [rt]cmd =0x494e464f, len=4
53,705,573 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,808,007 ready_for_fw is high
3,808,619 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,248,057 >>> mbox cmd response: success
17,250,036 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,935,774 UART:
22,936,175 UART: Running Caliptra FMC ...
22,937,325 UART:
22,937,482 UART: [state] CFI Enabled
23,004,946 UART: [fht] FMC Alias Private Key: 7
25,345,620 UART: [art] Extend RT PCRs Done
25,346,855 UART: [art] Lock RT PCRs Done
25,348,455 UART: [art] Populate DV Done
25,354,029 UART: [fht] FMC Alias Private Key: 7
25,355,577 UART: [art] Derive CDI
25,356,342 UART: [art] Store in slot 0x4
25,413,639 UART: [art] Derive Key Pair
25,414,684 UART: [art] Store priv key in slot 0x5
28,708,028 UART: [art] Derive Key Pair - Done
28,720,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,009,993 UART: [art] Erasing AUTHORITY.KEYID = 7
31,011,505 UART: [art] PUB.X = 9E982E77743AF8B5DBCDD921CEE9D2DC87D6D66AA1943EE115C235CF4CB2918CEAA8C06FA825BB6245B54CB2F9F4CB63
31,018,755 UART: [art] PUB.Y = 391604E34C538768773B4684F2A7051D985B1DF260720025A824DEBB93B1455BF6DBFF4A98C3A107A2E73096668C2921
31,025,998 UART: [art] SIG.R = B7FFD1942937717AEA4853F3B0984FEA8F1A8216538A1855E44FFBF6892402BF9E0C2AACB651F7305AB36D180FD29E66
31,033,402 UART: [art] SIG.S = 43F1FA044F77200BAB8202FA5876783B33915D239E0AC1D9C924F653C6F3915820899A28ABBBD530911D496983E94125
32,338,161 UART: mbox::rt_entry...
32,339,131 UART: ____ _ _ _ ____ _____
32,341,113 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,343,118 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,345,045 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,347,039 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,348,973 UART: |_|
32,349,962 UART:
32,481,770 UART: [rt] Runtime listening for mailbox commands...
32,488,985 >>> mbox cmd response data (4360 bytes)
32,509,780 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,554,170 >>> mbox cmd response data (0 bytes)
34,628,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,443,319 >>> mbox cmd response: success
43,479,223 UART:
43,479,560 UART: Running Caliptra FMC ...
43,480,692 UART:
43,480,872 UART: [state] CFI Enabled
43,582,037 UART: [art] Extend RT PCRs Done
43,583,236 UART: [art] Lock RT PCRs Done
43,584,542 UART: [art] Populate DV Done
43,589,961 UART: [fht] FMC Alias Private Key: 7
43,591,494 UART: [art] Derive CDI
43,592,258 UART: [art] Store in slot 0x4
43,651,834 UART: [art] Derive Key Pair
43,652,881 UART: [art] Store priv key in slot 0x5
46,945,419 UART: [art] Derive Key Pair - Done
46,958,260 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,245,617 UART: [art] Erasing AUTHORITY.KEYID = 7
49,247,148 UART: [art] PUB.X = 04E21A0F57271772FED43F1EB263CF985F236DAD8313377955E874072F13D076DEB8DE5216158459770CDE514A9E05CE
49,254,412 UART: [art] PUB.Y = 8D28DBBEC742A3E8F85DF5A6CCE0341C3C70B82FE1A0BDF92962FE60CC64F3B29E9E1732436E8B9556B81AF70E48C9BF
49,261,642 UART: [art] SIG.R = C734C20ADB1BF866D9AE9B80535580B0792D45ECD0498CF80EF7A32DADDD833EE829B840BFEBC55DCE1988FB8F53C01D
49,269,084 UART: [art] SIG.S = 012D7D3DD07A9AF323A8A23F3C97CD31CAA83E254850D5832E8D308F9B454EDA0749F04CCD7ECA10ED02BDD60A2ED515
50,574,006 UART: Caliptra RT
50,574,726 UART: [state] CFI Enabled
53,983,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,984,704 UART: [rt] RT listening for mailbox commands...
54,015,992 UART: [rt]cmd =0x494e464f, len=4
54,020,267 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
192,584 UART:
192,978 UART: Running Caliptra ROM ...
194,119 UART:
603,687 UART: [state] CFI Enabled
616,129 UART: [state] LifecycleState = Unprovisioned
618,064 UART: [state] DebugLocked = No
620,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,940 UART: [kat] SHA2-256
794,734 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,241 UART: [kat] ++
805,712 UART: [kat] sha1
817,879 UART: [kat] SHA2-256
820,563 UART: [kat] SHA2-384
827,478 UART: [kat] SHA2-512-ACC
829,864 UART: [kat] ECC-384
3,114,012 UART: [kat] HMAC-384Kdf
3,126,526 UART: [kat] LMS
4,316,687 UART: [kat] --
4,320,699 UART: [cold-reset] ++
4,322,569 UART: [fht] Storing FHT @ 0x50003400
4,333,633 UART: [idev] ++
4,334,229 UART: [idev] CDI.KEYID = 6
4,335,257 UART: [idev] SUBJECT.KEYID = 7
4,336,426 UART: [idev] UDS.KEYID = 0
4,337,400 ready_for_fw is high
4,337,581 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,441,643 UART: [idev] Erasing UDS.KEYID = 0
7,625,633 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,678 UART: [idev] --
7,650,122 UART: [ldev] ++
7,650,701 UART: [ldev] CDI.KEYID = 6
7,651,711 UART: [ldev] SUBJECT.KEYID = 5
7,652,862 UART: [ldev] AUTHORITY.KEYID = 7
7,654,146 UART: [ldev] FE.KEYID = 1
7,665,542 UART: [ldev] Erasing FE.KEYID = 1
10,953,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,607 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,702 UART: [ldev] --
13,314,805 UART: [fwproc] Waiting for Commands...
13,316,461 UART: [fwproc] Received command 0x46574c44
13,318,696 UART: [fwproc] Received Image of size 82832 bytes
16,988,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,063,834 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,136,976 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,340,896 >>> mbox cmd response: success
17,342,076 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,344,213 UART: [afmc] ++
17,344,793 UART: [afmc] CDI.KEYID = 6
17,345,754 UART: [afmc] SUBJECT.KEYID = 7
17,346,959 UART: [afmc] AUTHORITY.KEYID = 5
20,664,635 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,958,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,960,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,975,312 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,990,047 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,004,436 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,025,142 UART: [afmc] --
23,028,677 UART: [cold-reset] --
23,031,836 UART: [state] Locking Datavault
23,038,991 UART: [state] Locking PCR0, PCR1 and PCR31
23,040,742 UART: [state] Locking ICCM
23,043,485 UART: [exit] Launching FMC @ 0x40000130
23,051,882 UART:
23,052,158 UART: Running Caliptra FMC ...
23,053,266 UART:
23,053,426 UART: [state] CFI Enabled
23,061,416 UART: [fht] FMC Alias Private Key: 7
25,401,318 UART: [art] Extend RT PCRs Done
25,402,548 UART: [art] Lock RT PCRs Done
25,404,113 UART: [art] Populate DV Done
25,409,354 UART: [fht] FMC Alias Private Key: 7
25,410,885 UART: [art] Derive CDI
25,411,694 UART: [art] Store in slot 0x4
25,454,276 UART: [art] Derive Key Pair
25,455,312 UART: [art] Store priv key in slot 0x5
28,697,342 UART: [art] Derive Key Pair - Done
28,710,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,990,274 UART: [art] Erasing AUTHORITY.KEYID = 7
30,991,772 UART: [art] PUB.X = 0BADCB999389E38DBD5915DB67EF9925ED98D5FED86B4FF08BC43001760BDD8A07B195B445D91DBEAFE5F93E7F8832C6
30,999,069 UART: [art] PUB.Y = 07025C54B5975E68914AF79486BE813CB1764FC6B077AE8C772505FD6CFDFA62B1B7DB04A2635D125DF018FD9F2B6211
31,006,342 UART: [art] SIG.R = 9C8FB8E3AD601B466CA276610E2BAA531B13FE64D0829B5EBD6B0E61384F8D9CE14D291B5B47ED3CB3A5262D0ED68445
31,013,726 UART: [art] SIG.S = 30440FEEEB47D5FD41FA262CB55148EE94CB41DF6295AA61CEAD6210E92A91B595E8EB8A28364ACFC40E92F06F680719
32,318,738 UART: mbox::rt_entry...
32,319,696 UART: ____ _ _ _ ____ _____
32,321,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,323,675 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,325,522 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,327,362 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,329,279 UART: |_|
32,330,284 UART:
32,461,205 UART: [rt] Runtime listening for mailbox commands...
32,468,427 >>> mbox cmd response data (4360 bytes)
32,488,973 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,533,515 >>> mbox cmd response data (0 bytes)
34,605,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,755,108 UART:
34,755,481 UART: Running Caliptra ROM ...
34,756,528 UART:
34,756,728 UART: [state] CFI Enabled
34,771,922 UART: [state] LifecycleState = Unprovisioned
34,773,817 UART: [state] DebugLocked = No
34,776,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,780,412 UART: [kat] SHA2-256
34,950,083 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,960,626 UART: [kat] ++
34,961,076 UART: [kat] sha1
34,972,388 UART: [kat] SHA2-256
34,975,063 UART: [kat] SHA2-384
34,981,646 UART: [kat] SHA2-512-ACC
34,983,992 UART: [kat] ECC-384
37,269,550 UART: [kat] HMAC-384Kdf
37,282,774 UART: [kat] LMS
38,472,841 UART: [kat] --
38,477,340 UART: [update-reset] ++
42,669,316 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,673,628 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,071,384 >>> mbox cmd response: success
43,075,999 UART: [update-reset] Copying MAN_2 To MAN_1
43,094,648 UART: [update-reset Success] --
43,098,788 UART: [state] Locking Datavault
43,101,563 UART: [state] Locking PCR0, PCR1 and PCR31
43,103,333 UART: [state] Locking ICCM
43,105,864 UART: [exit] Launching FMC @ 0x40000130
43,114,311 UART:
43,114,542 UART: Running Caliptra FMC ...
43,115,634 UART:
43,115,784 UART: [state] CFI Enabled
43,159,396 UART: [art] Extend RT PCRs Done
43,160,576 UART: [art] Lock RT PCRs Done
43,161,887 UART: [art] Populate DV Done
43,167,453 UART: [fht] FMC Alias Private Key: 7
43,169,090 UART: [art] Derive CDI
43,169,899 UART: [art] Store in slot 0x4
43,212,399 UART: [art] Derive Key Pair
43,213,439 UART: [art] Store priv key in slot 0x5
46,455,869 UART: [art] Derive Key Pair - Done
46,468,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,749,119 UART: [art] Erasing AUTHORITY.KEYID = 7
48,750,626 UART: [art] PUB.X = 7E0BB2A1E97C7F230DE289B6BB262BC13EF95F90F60A8BA5C901E26A53B39A88CFD86B39AF2AA7AD4F91D540E4566885
48,757,929 UART: [art] PUB.Y = DC64DB86530859D75DE3E1825D4CB868D3A249FB2637766CA8B4F33FE4757470EF4DFFB5074674C7D436E7C477391E68
48,765,170 UART: [art] SIG.R = 8C0D7C92BC2C1AEC74CF30F0A6034F8BD3E0997207288E8A817627DB050C07C9688D7FF8F24AA6C668FDBA8D35A27713
48,772,557 UART: [art] SIG.S = 7D1AE7E0B7496242B2B37D00F78994F29D1F1B0A8FB763E5014D99C9453766E4BD38AB1C0AF215CE318A8D20341055D7
50,078,362 UART: Caliptra RT
50,079,073 UART: [state] CFI Enabled
53,376,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,377,640 UART: [rt] RT listening for mailbox commands...
53,409,032 UART: [rt]cmd =0x494e464f, len=4
53,413,296 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,145 writing to cptra_bootfsm_go
4,128,762 ready_for_fw is high
4,129,341 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,446,173 >>> mbox cmd response: success
17,447,404 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,089,881 UART:
23,090,307 UART: Running Caliptra FMC ...
23,091,428 UART:
23,091,585 UART: [state] CFI Enabled
23,099,069 UART: [fht] FMC Alias Private Key: 7
25,438,874 UART: [art] Extend RT PCRs Done
25,440,103 UART: [art] Lock RT PCRs Done
25,441,928 UART: [art] Populate DV Done
25,447,513 UART: [fht] FMC Alias Private Key: 7
25,449,147 UART: [art] Derive CDI
25,449,887 UART: [art] Store in slot 0x4
25,492,856 UART: [art] Derive Key Pair
25,493,850 UART: [art] Store priv key in slot 0x5
28,735,655 UART: [art] Derive Key Pair - Done
28,748,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,029,026 UART: [art] Erasing AUTHORITY.KEYID = 7
31,030,539 UART: [art] PUB.X = 0AE52B0741DA820BA1018BDB566DFE5BAC8D570524D5A352C103CC48E09DD3A316678AC4D1607764F49C0E7DB28EA760
31,037,843 UART: [art] PUB.Y = 0CCD095ECFE01747CC38722250EDFB6257014C17A8973F1E9F743C5DD23EF08E29097923B73FFC322D613E27A83E2858
31,045,082 UART: [art] SIG.R = B7EA631588BE6C8C9A61D66F83E5E8B40A033EC42813361B604AFA00E02ECB7281E3CCD8612E3BBB41DF42D51834F5C7
31,052,522 UART: [art] SIG.S = 74A2AC9FDA129980DD7E765CA3586FCF95C30DF50E795D4DDA6E655F3EB7CC51E5E17A26DC41013B5A05DDC97479BF8A
32,357,899 UART: mbox::rt_entry...
32,358,862 UART: ____ _ _ _ ____ _____
32,360,841 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,362,845 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,364,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,366,756 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,368,681 UART: |_|
32,369,480 UART:
32,501,537 UART: [rt] Runtime listening for mailbox commands...
32,508,758 >>> mbox cmd response data (4360 bytes)
32,529,394 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,573,718 >>> mbox cmd response data (0 bytes)
34,647,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,398,540 >>> mbox cmd response: success
43,432,740 UART:
43,433,037 UART: Running Caliptra FMC ...
43,434,075 UART:
43,434,235 UART: [state] CFI Enabled
43,479,245 UART: [art] Extend RT PCRs Done
43,480,436 UART: [art] Lock RT PCRs Done
43,481,978 UART: [art] Populate DV Done
43,487,437 UART: [fht] FMC Alias Private Key: 7
43,489,160 UART: [art] Derive CDI
43,489,895 UART: [art] Store in slot 0x4
43,532,972 UART: [art] Derive Key Pair
43,534,014 UART: [art] Store priv key in slot 0x5
46,776,048 UART: [art] Derive Key Pair - Done
46,788,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,069,663 UART: [art] Erasing AUTHORITY.KEYID = 7
49,071,175 UART: [art] PUB.X = 1C76A13DF81F8EF5F7DCD942193CC1842309BBB658DB1AA7CBD62756C86067CACBC51BE1EFC9318329BAE58D977E04A1
49,078,434 UART: [art] PUB.Y = 895988EBE66930DB9453E62C8F99DF406700AB368D56D784D4EEF0044A8D81BD595F3B658B756E7445EEF422B8E21E06
49,085,720 UART: [art] SIG.R = 7B1FD2C3FF70029D791B609C0B84B1A6EA88D9A86FC93308176779D69C37C8CA54285DE1A87DB6A872FC9D1A2132F1C7
49,093,053 UART: [art] SIG.S = 53BCD7163594B6B750220C1C8CA6332F7954A71B6D588CCA16E157D341092A463150F34F941DACA3517E07B72D7B2435
50,398,197 UART: Caliptra RT
50,398,899 UART: [state] CFI Enabled
53,696,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,698,247 UART: [rt] RT listening for mailbox commands...
53,729,848 UART: [rt]cmd =0x494e464f, len=4
53,734,201 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,043 UART:
192,420 UART: Running Caliptra ROM ...
193,554 UART:
193,699 UART: [state] CFI Enabled
259,883 UART: [state] LifecycleState = Unprovisioned
261,865 UART: [state] DebugLocked = No
264,745 UART: [state] WD Timer not started. Device not locked for debugging
268,849 UART: [kat] SHA2-256
448,539 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,298 UART: [kat] ++
459,774 UART: [kat] sha1
471,423 UART: [kat] SHA2-256
474,098 UART: [kat] SHA2-384
480,661 UART: [kat] SHA2-512-ACC
483,037 UART: [kat] ECC-384
2,947,511 UART: [kat] HMAC-384Kdf
2,970,905 UART: [kat] LMS
3,447,378 UART: [kat] --
3,452,228 UART: [cold-reset] ++
3,454,153 UART: [fht] FHT @ 0x50003400
3,465,680 UART: [idev] ++
3,466,253 UART: [idev] CDI.KEYID = 6
3,467,134 UART: [idev] SUBJECT.KEYID = 7
3,468,445 UART: [idev] UDS.KEYID = 0
3,469,345 ready_for_fw is high
3,469,530 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,573,803 UART: [idev] Erasing UDS.KEYID = 0
5,983,049 UART: [idev] Sha1 KeyId Algorithm
6,005,355 UART: [idev] --
6,009,667 UART: [ldev] ++
6,010,246 UART: [ldev] CDI.KEYID = 6
6,011,162 UART: [ldev] SUBJECT.KEYID = 5
6,012,374 UART: [ldev] AUTHORITY.KEYID = 7
6,013,605 UART: [ldev] FE.KEYID = 1
6,055,487 UART: [ldev] Erasing FE.KEYID = 1
8,563,980 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,308 UART: [ldev] --
10,370,032 UART: [fwproc] Wait for Commands...
10,373,319 UART: [fwproc] Recv command 0x46574c44
10,375,303 UART: [fwproc] Recv'd Img size: 82832 bytes
13,417,407 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,496,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,569,185 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,772,974 >>> mbox cmd response: success
13,774,091 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,776,812 UART: [afmc] ++
13,777,481 UART: [afmc] CDI.KEYID = 6
13,778,389 UART: [afmc] SUBJECT.KEYID = 7
13,779,601 UART: [afmc] AUTHORITY.KEYID = 5
16,318,029 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,042,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,044,532 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,060,368 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,076,413 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,091,960 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,115,566 UART: [afmc] --
18,119,674 UART: [cold-reset] --
18,124,238 UART: [state] Locking Datavault
18,128,670 UART: [state] Locking PCR0, PCR1 and PCR31
18,130,423 UART: [state] Locking ICCM
18,131,973 UART: [exit] Launching FMC @ 0x40000130
18,140,418 UART:
18,140,653 UART: Running Caliptra FMC ...
18,141,748 UART:
18,141,905 UART: [state] CFI Enabled
18,197,199 UART: [fht] FMC Alias Private Key: 7
19,963,922 UART: [art] Extend RT PCRs Done
19,965,154 UART: [art] Lock RT PCRs Done
19,966,730 UART: [art] Populate DV Done
19,972,516 UART: [fht] FMC Alias Private Key: 7
19,974,048 UART: [art] Derive CDI
19,974,863 UART: [art] Store in slot 0x4
20,029,847 UART: [art] Derive Key Pair
20,030,895 UART: [art] Store priv key in slot 0x5
22,493,943 UART: [art] Derive Key Pair - Done
22,506,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,219,265 UART: [art] Erasing AUTHORITY.KEYID = 7
24,220,772 UART: [art] PUB.X = 61867DA91479F4B5B1B83D5DD0742B211A86C3E8382BF7DE0E5FC751535DD97D6B9479916CBF788E66743D26612319FC
24,228,071 UART: [art] PUB.Y = 6379795850F26CDFB20BEA9CF2E53BAC77EFBC67066589146AC9BFE495189C2953B6DEDB3D3670756564C4E8D9D28751
24,235,319 UART: [art] SIG.R = 4829AD021C70A50A0FFC35877C0386AF954BDCB91E56716DE491906A95E6AF9DB53D217ECD94FAA17241E524CFA712D9
24,242,707 UART: [art] SIG.S = 173EE39D53B3B153CD03CB9DFFEE5D872819D13339DA476DE516DE258EBB746879A802D2C806C466BACA3038FC615BA2
25,221,426 UART: mbox::rt_entry...
25,222,376 UART: ____ _ _ _ ____ _____
25,224,352 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,226,276 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,228,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,230,071 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,232,000 UART: |_|
25,232,830 UART:
25,363,733 UART: [rt] Runtime listening for mailbox commands...
25,370,962 >>> mbox cmd response data (4360 bytes)
25,391,815 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,436,199 >>> mbox cmd response data (0 bytes)
27,497,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,647,345 UART:
27,647,723 UART: Running Caliptra ROM ...
27,648,813 UART:
27,648,974 UART: [state] CFI Enabled
27,714,090 UART: [state] LifecycleState = Unprovisioned
27,716,034 UART: [state] DebugLocked = No
27,717,937 UART: [state] WD Timer not started. Device not locked for debugging
27,722,325 UART: [kat] SHA2-256
27,901,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,912,725 UART: [kat] ++
27,913,176 UART: [kat] sha1
27,923,898 UART: [kat] SHA2-256
27,926,596 UART: [kat] SHA2-384
27,931,387 UART: [kat] SHA2-512-ACC
27,933,729 UART: [kat] ECC-384
30,398,755 UART: [kat] HMAC-384Kdf
30,420,600 UART: [kat] LMS
30,897,029 UART: [kat] --
30,901,503 UART: [update-reset] ++
34,394,755 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,398,425 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,796,020 >>> mbox cmd response: success
34,800,509 UART: [update-reset] Copying MAN_2 To MAN_1
34,834,244 UART: [update-reset Success] --
34,838,485 UART: [state] Locking Datavault
34,841,262 UART: [state] Locking PCR0, PCR1 and PCR31
34,843,024 UART: [state] Locking ICCM
34,844,204 UART: [exit] Launching FMC @ 0x40000130
34,852,598 UART:
34,852,835 UART: Running Caliptra FMC ...
34,853,935 UART:
34,854,094 UART: [state] CFI Enabled
34,954,622 UART: [art] Extend RT PCRs Done
34,955,823 UART: [art] Lock RT PCRs Done
34,957,336 UART: [art] Populate DV Done
34,963,016 UART: [fht] FMC Alias Private Key: 7
34,964,502 UART: [art] Derive CDI
34,965,260 UART: [art] Store in slot 0x4
35,024,065 UART: [art] Derive Key Pair
35,025,112 UART: [art] Store priv key in slot 0x5
37,488,006 UART: [art] Derive Key Pair - Done
37,500,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,214,031 UART: [art] Erasing AUTHORITY.KEYID = 7
39,215,689 UART: [art] PUB.X = F3C1A6A202C2396EFBF25D9EF7F046E7E0C749FDD9CB13DAA5E5108D84F50529A3D47A4E3BE1DA1A9853C03CE85A3882
39,222,846 UART: [art] PUB.Y = 3A06E42E3913C55F04E9DF14057ED3235CEB811F98F5A4C7A881A3EAEFADCB236C21689C42B4826B9EFEC796E0952F07
39,230,091 UART: [art] SIG.R = 1BA3343C361051815DC52C8D718FCC5BF828DAB03E7A96A0E101332E00F003E9ADA57D8A52EA5F07FDC6880597D6912D
39,237,437 UART: [art] SIG.S = 728715A20579747E878AD15B05465942674DE776B899BF6FCB75E705BA97AEA9F71C1510A3120622526D96D3D6D30359
40,216,614 UART: Caliptra RT
40,217,347 UART: [state] CFI Enabled
42,800,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,801,825 UART: [rt] RT listening for mailbox commands...
42,833,374 UART: [rt]cmd =0x494e464f, len=4
42,837,683 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,462,191 ready_for_fw is high
3,462,583 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,638,536 >>> mbox cmd response: success
13,639,667 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,912,481 UART:
17,912,857 UART: Running Caliptra FMC ...
17,914,060 UART:
17,914,234 UART: [state] CFI Enabled
17,983,406 UART: [fht] FMC Alias Private Key: 7
19,771,778 UART: [art] Extend RT PCRs Done
19,773,003 UART: [art] Lock RT PCRs Done
19,774,309 UART: [art] Populate DV Done
19,779,721 UART: [fht] FMC Alias Private Key: 7
19,781,272 UART: [art] Derive CDI
19,782,032 UART: [art] Store in slot 0x4
19,837,412 UART: [art] Derive Key Pair
19,838,467 UART: [art] Store priv key in slot 0x5
22,301,743 UART: [art] Derive Key Pair - Done
22,314,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,027,278 UART: [art] Erasing AUTHORITY.KEYID = 7
24,028,779 UART: [art] PUB.X = C9F9804B4F4C0F5CF842E6E9E707C612E9A9B72690D5DBB1C8456BDB1E734121A7663AB2B578AD5C2966F67FF5C5DD2F
24,036,096 UART: [art] PUB.Y = ED67F636840A94C8B3C8D4D9A7E96FEADA27FCA7B0A2E9BAE81A91090C8DA6E30B1AF22804DE3254866D96C17F42457D
24,043,343 UART: [art] SIG.R = 1701CA238D160121468C30CA44FDDF7B1C3EC56AF104A924F1FC7529C47634E027F5A134EEAE92C6420E0DF13C537C15
24,050,735 UART: [art] SIG.S = E2A85B4872507FD0BDFE1BF95A437CA5620786C7D5499EEA8DBC184A289FB97EA90E028014515590FCEBBE0C85517F6C
25,029,204 UART: mbox::rt_entry...
25,030,174 UART: ____ _ _ _ ____ _____
25,032,165 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,034,175 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,036,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,038,105 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,039,965 UART: |_|
25,040,766 UART:
25,171,066 UART: [rt] Runtime listening for mailbox commands...
25,178,287 >>> mbox cmd response data (4360 bytes)
25,199,115 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,243,503 >>> mbox cmd response data (0 bytes)
27,301,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,615,236 >>> mbox cmd response: success
34,648,805 UART:
34,649,153 UART: Running Caliptra FMC ...
34,650,283 UART:
34,650,450 UART: [state] CFI Enabled
34,743,911 UART: [art] Extend RT PCRs Done
34,745,125 UART: [art] Lock RT PCRs Done
34,746,637 UART: [art] Populate DV Done
34,751,987 UART: [fht] FMC Alias Private Key: 7
34,753,477 UART: [art] Derive CDI
34,754,241 UART: [art] Store in slot 0x4
34,813,176 UART: [art] Derive Key Pair
34,814,213 UART: [art] Store priv key in slot 0x5
37,276,993 UART: [art] Derive Key Pair - Done
37,289,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,003,157 UART: [art] Erasing AUTHORITY.KEYID = 7
39,004,680 UART: [art] PUB.X = 3FABD9C7DFF5E467012C983BC7075F51C0E1733585F56CEB7D66D769FAE0C6A422EBDF226B38A5FC8E9ED3CE02DA3FEC
39,012,004 UART: [art] PUB.Y = 8419D061502D69B120FF84C49F84F8DDED6AC2A369E5DFF1C7D68601344B8C4D502246016DE1806264DCB1205250ED9F
39,019,247 UART: [art] SIG.R = CC83A65E8E0340B53E56A22A4E91455D291FF8AAFAB1C6913BF9DC22A4B88574BD712A96E0D08AAD41CECAC100921158
39,026,685 UART: [art] SIG.S = F12DDA1CB9C30E78F120A215AF6E8C6571E5406E4657D9E8AC4468807341F028A152DFE19DF7F024C7E2E0C46B8FD20E
40,005,505 UART: Caliptra RT
40,006,226 UART: [state] CFI Enabled
42,589,087 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,590,323 UART: [rt] RT listening for mailbox commands...
42,621,602 UART: [rt]cmd =0x494e464f, len=4
42,626,091 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,132 writing to cptra_bootfsm_go
192,413 UART:
192,771 UART: Running Caliptra ROM ...
193,989 UART:
603,668 UART: [state] CFI Enabled
614,497 UART: [state] LifecycleState = Unprovisioned
616,436 UART: [state] DebugLocked = No
618,743 UART: [state] WD Timer not started. Device not locked for debugging
623,085 UART: [kat] SHA2-256
802,717 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,528 UART: [kat] ++
814,008 UART: [kat] sha1
825,303 UART: [kat] SHA2-256
828,002 UART: [kat] SHA2-384
833,727 UART: [kat] SHA2-512-ACC
836,103 UART: [kat] ECC-384
3,277,441 UART: [kat] HMAC-384Kdf
3,290,392 UART: [kat] LMS
3,766,904 UART: [kat] --
3,772,460 UART: [cold-reset] ++
3,774,388 UART: [fht] FHT @ 0x50003400
3,786,922 UART: [idev] ++
3,787,483 UART: [idev] CDI.KEYID = 6
3,788,398 UART: [idev] SUBJECT.KEYID = 7
3,789,662 UART: [idev] UDS.KEYID = 0
3,790,594 ready_for_fw is high
3,790,812 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,894,997 UART: [idev] Erasing UDS.KEYID = 0
6,260,496 UART: [idev] Sha1 KeyId Algorithm
6,284,591 UART: [idev] --
6,289,883 UART: [ldev] ++
6,290,453 UART: [ldev] CDI.KEYID = 6
6,291,365 UART: [ldev] SUBJECT.KEYID = 5
6,292,620 UART: [ldev] AUTHORITY.KEYID = 7
6,293,853 UART: [ldev] FE.KEYID = 1
6,305,425 UART: [ldev] Erasing FE.KEYID = 1
8,782,481 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,526 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,570,464 UART: [ldev] --
10,575,148 UART: [fwproc] Wait for Commands...
10,576,978 UART: [fwproc] Recv command 0x46574c44
10,578,968 UART: [fwproc] Recv'd Img size: 82832 bytes
13,624,390 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,703,701 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,776,751 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,980,292 >>> mbox cmd response: success
13,981,352 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,984,360 UART: [afmc] ++
13,984,950 UART: [afmc] CDI.KEYID = 6
13,985,829 UART: [afmc] SUBJECT.KEYID = 7
13,987,098 UART: [afmc] AUTHORITY.KEYID = 5
16,491,213 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,214,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,216,315 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,232,128 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,248,212 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,263,759 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,288,357 UART: [afmc] --
18,291,631 UART: [cold-reset] --
18,295,219 UART: [state] Locking Datavault
18,300,465 UART: [state] Locking PCR0, PCR1 and PCR31
18,302,226 UART: [state] Locking ICCM
18,303,837 UART: [exit] Launching FMC @ 0x40000130
18,312,235 UART:
18,312,469 UART: Running Caliptra FMC ...
18,313,573 UART:
18,313,737 UART: [state] CFI Enabled
18,321,286 UART: [fht] FMC Alias Private Key: 7
20,087,362 UART: [art] Extend RT PCRs Done
20,088,805 UART: [art] Lock RT PCRs Done
20,090,344 UART: [art] Populate DV Done
20,096,032 UART: [fht] FMC Alias Private Key: 7
20,097,549 UART: [art] Derive CDI
20,098,318 UART: [art] Store in slot 0x4
20,140,458 UART: [art] Derive Key Pair
20,141,451 UART: [art] Store priv key in slot 0x5
22,568,447 UART: [art] Derive Key Pair - Done
22,581,118 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,287,620 UART: [art] Erasing AUTHORITY.KEYID = 7
24,289,126 UART: [art] PUB.X = 4EEB5ABE6474095AB14BAC19A16858E195B76E59236CBF4896EBE7984482321A81FF23E24FFB6A94D301F5389FFC487A
24,296,372 UART: [art] PUB.Y = 35E2F6C7FB03DE8F1EF9B2CA0F1713361CCBB8C754E7DB0900D2BDC9123FF5D9D354F630D0F9FCA40BBBFB10150A2F2E
24,303,668 UART: [art] SIG.R = 6F430E7F8216AE493D3A0C9EE7FF7183EC8C35497DB67E10102354D792835EFEA6878E6AB91879EC13BDFD74098E79FA
24,311,061 UART: [art] SIG.S = 929A18FEBEF80089566827A931381080AD1653B92C5E6323E1A8D5081CF49EF3FE9D980679DCC1DF274AF6220CA0DB24
25,288,795 UART: mbox::rt_entry...
25,289,778 UART: ____ _ _ _ ____ _____
25,291,819 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,293,833 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,295,768 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,297,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,299,560 UART: |_|
25,300,391 UART:
25,432,046 UART: [rt] Runtime listening for mailbox commands...
25,439,294 >>> mbox cmd response data (4360 bytes)
25,460,044 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,504,412 >>> mbox cmd response data (0 bytes)
27,563,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,713,328 UART:
27,713,710 UART: Running Caliptra ROM ...
27,714,764 UART:
27,714,970 UART: [state] CFI Enabled
27,726,389 UART: [state] LifecycleState = Unprovisioned
27,728,276 UART: [state] DebugLocked = No
27,729,900 UART: [state] WD Timer not started. Device not locked for debugging
27,734,125 UART: [kat] SHA2-256
27,913,872 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,924,648 UART: [kat] ++
27,925,158 UART: [kat] sha1
27,936,371 UART: [kat] SHA2-256
27,939,068 UART: [kat] SHA2-384
27,945,169 UART: [kat] SHA2-512-ACC
27,947,521 UART: [kat] ECC-384
30,389,264 UART: [kat] HMAC-384Kdf
30,400,640 UART: [kat] LMS
30,877,089 UART: [kat] --
30,880,970 UART: [update-reset] ++
34,374,345 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,377,842 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,775,468 >>> mbox cmd response: success
34,780,187 UART: [update-reset] Copying MAN_2 To MAN_1
34,814,286 UART: [update-reset Success] --
34,820,303 UART: [state] Locking Datavault
34,824,434 UART: [state] Locking PCR0, PCR1 and PCR31
34,826,144 UART: [state] Locking ICCM
34,828,427 UART: [exit] Launching FMC @ 0x40000130
34,836,781 UART:
34,837,021 UART: Running Caliptra FMC ...
34,838,129 UART:
34,838,293 UART: [state] CFI Enabled
34,882,386 UART: [art] Extend RT PCRs Done
34,883,585 UART: [art] Lock RT PCRs Done
34,884,833 UART: [art] Populate DV Done
34,890,197 UART: [fht] FMC Alias Private Key: 7
34,891,848 UART: [art] Derive CDI
34,892,668 UART: [art] Store in slot 0x4
34,935,430 UART: [art] Derive Key Pair
34,936,432 UART: [art] Store priv key in slot 0x5
37,363,222 UART: [art] Derive Key Pair - Done
37,376,341 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,083,224 UART: [art] Erasing AUTHORITY.KEYID = 7
39,084,735 UART: [art] PUB.X = 193A3704C9F9A9AC2D5A2C2B5CBCBD75D202B79686E1E16C57626BB6ECB79780E3916A71362CCA9FA587E56FBCB43A02
39,092,035 UART: [art] PUB.Y = 39A277CF8A3AD826E9F14A304516CFB18D39A4B4643C5848604B10ABDADB1535B2E5D82BF254C7F60855920FBE6B7A4A
39,099,320 UART: [art] SIG.R = 76B4D26A0649A8FB5863C82F0C41A6D08048C37E4717883DF866A0FE404ADF2F04EBF88E93570E851CE8E1DE2442EFE8
39,106,720 UART: [art] SIG.S = 59C6FFF5182ED865F8AB7F195B8D58EEE4528ADE0DB3B3AA54FA377DA4242FC5A9F35553BC7F653218B81CC73A14FAD5
40,086,193 UART: Caliptra RT
40,086,906 UART: [state] CFI Enabled
42,567,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,569,408 UART: [rt] RT listening for mailbox commands...
42,600,803 UART: [rt]cmd =0x494e464f, len=4
42,605,289 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,773,404 ready_for_fw is high
3,773,990 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,872,290 >>> mbox cmd response: success
13,873,466 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,124,167 UART:
18,124,552 UART: Running Caliptra FMC ...
18,125,697 UART:
18,125,856 UART: [state] CFI Enabled
18,133,805 UART: [fht] FMC Alias Private Key: 7
19,899,232 UART: [art] Extend RT PCRs Done
19,900,456 UART: [art] Lock RT PCRs Done
19,902,109 UART: [art] Populate DV Done
19,907,620 UART: [fht] FMC Alias Private Key: 7
19,909,333 UART: [art] Derive CDI
19,910,155 UART: [art] Store in slot 0x4
19,952,861 UART: [art] Derive Key Pair
19,953,862 UART: [art] Store priv key in slot 0x5
22,380,748 UART: [art] Derive Key Pair - Done
22,393,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,100,226 UART: [art] Erasing AUTHORITY.KEYID = 7
24,101,729 UART: [art] PUB.X = DB1A1D990CB1ADB0B7705372B412F46AFC0640E47C29AABE9BA57C5A64E64E06AFF6451F742BD9C7CE320F6A7A6C30B2
24,109,035 UART: [art] PUB.Y = D1BB026CFBCAC588EDBF732E3324498EA64122269B213F7323614EC531141286A6BA95EB28BCD1E92C8D38ED48EE7EFF
24,116,302 UART: [art] SIG.R = 9C1B477F481498CC721F755B2C86696F33DFAA30694A9E15B82B4DEE06E8B7BFA118997386D231D22A3700CC59579047
24,123,691 UART: [art] SIG.S = 671BFA2C9C4D5D1410C61BE0C359B4522F4ACB9B3C726389F0AC1096A44DA80B05AE83CAE5591C09BA3A578CE173A641
25,101,895 UART: mbox::rt_entry...
25,102,858 UART: ____ _ _ _ ____ _____
25,104,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,106,797 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,108,677 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,110,673 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,112,555 UART: |_|
25,113,361 UART:
25,244,059 UART: [rt] Runtime listening for mailbox commands...
25,251,276 >>> mbox cmd response data (4360 bytes)
25,271,828 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,316,191 >>> mbox cmd response data (0 bytes)
27,371,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,599,842 >>> mbox cmd response: success
34,633,909 UART:
34,634,218 UART: Running Caliptra FMC ...
34,635,343 UART:
34,635,522 UART: [state] CFI Enabled
34,679,747 UART: [art] Extend RT PCRs Done
34,680,932 UART: [art] Lock RT PCRs Done
34,682,504 UART: [art] Populate DV Done
34,688,026 UART: [fht] FMC Alias Private Key: 7
34,689,518 UART: [art] Derive CDI
34,690,304 UART: [art] Store in slot 0x4
34,732,684 UART: [art] Derive Key Pair
34,733,681 UART: [art] Store priv key in slot 0x5
37,160,640 UART: [art] Derive Key Pair - Done
37,173,985 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,880,093 UART: [art] Erasing AUTHORITY.KEYID = 7
38,881,598 UART: [art] PUB.X = 5BAF804D729C049AAFEE83116F0A8D5C4990AC081DC0CCC9A3F7B8CDC72501665690D1726110370203092D6ADB265933
38,888,873 UART: [art] PUB.Y = 81D6EED90E08C2E4E44D860C9F48F7D8D944B5BD3AFA2D35111C28205866C8DC252A804B97C7077E2CE73F9A7F15E3A1
38,896,116 UART: [art] SIG.R = 6A131889B7D8E37EB0E9BBA1FAE0540821D0ABFCFEF1F1800B2153E002E962DA6519BB6070510D5247B51508C9C7DD8F
38,903,523 UART: [art] SIG.S = 1F2BDCDB8DD9F9BBF680850A410466A19E81702753221E9AD6705DBAF2B2E5DFDF184B6AC39CF9A8739DDCB5F2010348
39,882,189 UART: Caliptra RT
39,882,903 UART: [state] CFI Enabled
42,364,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,365,869 UART: [rt] RT listening for mailbox commands...
42,397,265 UART: [rt]cmd =0x494e464f, len=4
42,401,495 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.24s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,244 UART:
192,610 UART: Running Caliptra ROM ...
193,733 UART:
193,879 UART: [state] CFI Enabled
266,487 UART: [state] LifecycleState = Unprovisioned
268,892 UART: [state] DebugLocked = No
271,703 UART: [state] WD Timer not started. Device not locked for debugging
277,151 UART: [kat] SHA2-256
467,023 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,788 UART: [kat] ++
478,273 UART: [kat] sha1
491,058 UART: [kat] SHA2-256
494,142 UART: [kat] SHA2-384
500,273 UART: [kat] SHA2-512-ACC
502,847 UART: [kat] ECC-384
2,949,295 UART: [kat] HMAC-384Kdf
2,972,178 UART: [kat] LMS
3,503,976 UART: [kat] --
3,508,125 UART: [cold-reset] ++
3,509,271 UART: [fht] FHT @ 0x50003400
3,519,671 UART: [idev] ++
3,520,302 UART: [idev] CDI.KEYID = 6
3,521,326 UART: [idev] SUBJECT.KEYID = 7
3,522,493 UART: [idev] UDS.KEYID = 0
3,523,415 ready_for_fw is high
3,523,602 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,627,872 UART: [idev] Erasing UDS.KEYID = 0
6,030,266 UART: [idev] Sha1 KeyId Algorithm
6,052,735 UART: [idev] --
6,057,455 UART: [ldev] ++
6,058,141 UART: [ldev] CDI.KEYID = 6
6,059,069 UART: [ldev] SUBJECT.KEYID = 5
6,060,231 UART: [ldev] AUTHORITY.KEYID = 7
6,061,461 UART: [ldev] FE.KEYID = 1
6,100,352 UART: [ldev] Erasing FE.KEYID = 1
8,606,664 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,736 UART: [ldev] --
10,412,785 UART: [fwproc] Wait for Commands...
10,414,712 UART: [fwproc] Recv command 0x46574c44
10,416,959 UART: [fwproc] Recv'd Img size: 82832 bytes
13,479,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,559,430 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,683,040 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,029,766 >>> mbox cmd response: success
14,030,793 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,034,235 UART: [afmc] ++
14,034,945 UART: [afmc] CDI.KEYID = 6
14,036,191 UART: [afmc] SUBJECT.KEYID = 7
14,037,543 UART: [afmc] AUTHORITY.KEYID = 5
16,572,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,296,857 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,298,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,313,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,329,026 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,343,882 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,368,277 UART: [afmc] --
18,372,559 UART: [cold-reset] --
18,377,134 UART: [state] Locking Datavault
18,382,918 UART: [state] Locking PCR0, PCR1 and PCR31
18,385,124 UART: [state] Locking ICCM
18,387,596 UART: [exit] Launching FMC @ 0x40000130
18,396,311 UART:
18,396,548 UART: Running Caliptra FMC ...
18,397,644 UART:
18,397,800 UART: [state] CFI Enabled
18,454,422 UART: [fht] FMC Alias Private Key: 7
20,221,304 UART: [art] Extend RT PCRs Done
20,222,520 UART: [art] Lock RT PCRs Done
20,223,924 UART: [art] Populate DV Done
20,229,326 UART: [fht] FMC Alias Private Key: 7
20,230,965 UART: [art] Derive CDI
20,231,772 UART: [art] Store in slot 0x4
20,287,324 UART: [art] Derive Key Pair
20,288,352 UART: [art] Store priv key in slot 0x5
22,751,758 UART: [art] Derive Key Pair - Done
22,764,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,476,580 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,084 UART: [art] PUB.X = 0ECC4E0B3B52F3835042716BE43312B73E5567B57DA78412D7CB75CD9E5EE474AA581A5D136A408994D79621D54DD400
24,485,333 UART: [art] PUB.Y = 4A77D5485F6BA1E65CAED54A46B2CA5FC0C9BB80ED4D900CE0EE7F7E8D892D225E86EC7CFDAE1BADF3F4CC393F6A929E
24,492,672 UART: [art] SIG.R = 90327A5F71A872926C8CC294BBAF9FDCA428E01451D7C59D200757079D20AA2F9C49E14DD8D0231E3555BA789295AB16
24,500,008 UART: [art] SIG.S = 96B69E09095EACF8254751B4D0E58C7589BD625BC4437007DAC06021779F50BBCF95F0042B4DC25F849A5B3C6B3A7C02
25,478,565 UART: mbox::rt_entry...
25,479,521 UART: ____ _ _ _ ____ _____
25,481,495 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,483,498 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,485,425 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,487,560 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,499 UART: |_|
25,490,306 UART:
25,621,672 UART: [rt] Runtime listening for mailbox commands...
25,628,923 >>> mbox cmd response data (4360 bytes)
25,649,683 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,694,049 >>> mbox cmd response data (0 bytes)
27,757,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,907,812 UART:
27,908,181 UART: Running Caliptra ROM ...
27,909,321 UART:
27,909,492 UART: [state] CFI Enabled
27,974,153 UART: [state] LifecycleState = Unprovisioned
27,976,185 UART: [state] DebugLocked = No
27,978,706 UART: [state] WD Timer not started. Device not locked for debugging
27,983,879 UART: [kat] SHA2-256
28,173,755 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,184,513 UART: [kat] ++
28,185,000 UART: [kat] sha1
28,196,709 UART: [kat] SHA2-256
28,199,732 UART: [kat] SHA2-384
28,204,362 UART: [kat] SHA2-512-ACC
28,206,980 UART: [kat] ECC-384
30,657,509 UART: [kat] HMAC-384Kdf
30,680,390 UART: [kat] LMS
31,211,958 UART: [kat] --
31,214,057 UART: [update-reset] ++
34,717,465 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,721,150 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,350,865 >>> mbox cmd response: success
35,355,385 UART: [update-reset] Copying MAN_2 To MAN_1
35,390,048 UART: [update-reset Success] --
35,393,487 UART: [state] Locking Datavault
35,396,587 UART: [state] Locking PCR0, PCR1 and PCR31
35,398,738 UART: [state] Locking ICCM
35,401,541 UART: [exit] Launching FMC @ 0x40000130
35,410,159 UART:
35,410,441 UART: Running Caliptra FMC ...
35,411,502 UART:
35,411,657 UART: [state] CFI Enabled
35,514,934 UART: [art] Extend RT PCRs Done
35,516,124 UART: [art] Lock RT PCRs Done
35,517,421 UART: [art] Populate DV Done
35,523,113 UART: [fht] FMC Alias Private Key: 7
35,524,753 UART: [art] Derive CDI
35,525,561 UART: [art] Store in slot 0x4
35,583,924 UART: [art] Derive Key Pair
35,584,965 UART: [art] Store priv key in slot 0x5
38,048,042 UART: [art] Derive Key Pair - Done
38,061,000 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,773,555 UART: [art] Erasing AUTHORITY.KEYID = 7
39,775,064 UART: [art] PUB.X = 9F31E284697C75507F597710501D8045E655DD83C0322BF87D99DA01429B153C2BA3734C8FD946B4D3E1C02CEC7C804B
39,782,288 UART: [art] PUB.Y = FE275127B726190F41ABCBC5D8A2BB4E3A5FC5BB9FA77967B0C605521A3A96EFECD7D73BFFEC9E3CFF7A104554977E9D
39,789,607 UART: [art] SIG.R = 2D60774E115E9890D3E5F45A52C4B8F1A598AAD00F1DF5B5305E28DC0CA66752C3288B468073954DCD58027FB9A7CB36
39,796,974 UART: [art] SIG.S = 7F2F0AE73D0DCC2798E8CD6A299B4AE68AAF3C9922F951D77947944610B6429E92805B056AE5F85BE1FC1092D2DC2621
40,775,443 UART: Caliptra RT
40,776,135 UART: [state] CFI Enabled
43,359,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,360,723 UART: [rt] RT listening for mailbox commands...
43,392,083 UART: [rt]cmd =0x494e464f, len=4
43,396,246 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
3,437,920 ready_for_fw is high
3,438,297 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,056,937 >>> mbox cmd response: success
14,058,327 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,342,896 UART:
18,343,283 UART: Running Caliptra FMC ...
18,344,479 UART:
18,344,649 UART: [state] CFI Enabled
18,412,114 UART: [fht] FMC Alias Private Key: 7
20,178,618 UART: [art] Extend RT PCRs Done
20,179,834 UART: [art] Lock RT PCRs Done
20,181,351 UART: [art] Populate DV Done
20,186,604 UART: [fht] FMC Alias Private Key: 7
20,188,258 UART: [art] Derive CDI
20,189,071 UART: [art] Store in slot 0x4
20,245,890 UART: [art] Derive Key Pair
20,246,948 UART: [art] Store priv key in slot 0x5
22,709,708 UART: [art] Derive Key Pair - Done
22,722,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,435,433 UART: [art] Erasing AUTHORITY.KEYID = 7
24,436,919 UART: [art] PUB.X = 36BB62DED44180D3504C52D5E1D90616120AD0F876249F38EB021F7F9D1A0DDBBED1C50C871260D5BE3431D635213D39
24,444,209 UART: [art] PUB.Y = 447313815ED58CB2C6E605B8C7914C3088E5E63FCF0EE215CD1399CD6CB544E823370D2B3B6F2A7686922AE78E72DB7C
24,451,432 UART: [art] SIG.R = ADF5AF9D3914D62EA3064CADDB338B40D80CB45AC63D9DA47D8C5A98D8BD26875652233258F9F34E2104C86D23E9C96D
24,458,879 UART: [art] SIG.S = DA689E7FC3F7796A172BFAB808FCE22AB829ACBAB328BDD7AAE9B1E14D5E7B7BD66856BAD45B6E7C87EE2D79B6BA7B5D
25,437,836 UART: mbox::rt_entry...
25,438,805 UART: ____ _ _ _ ____ _____
25,440,735 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,442,743 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,444,672 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,446,652 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,448,581 UART: |_|
25,449,414 UART:
25,579,638 UART: [rt] Runtime listening for mailbox commands...
25,586,841 >>> mbox cmd response data (4360 bytes)
25,607,573 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,651,950 >>> mbox cmd response data (0 bytes)
27,716,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,617,183 >>> mbox cmd response: success
35,653,453 UART:
35,653,757 UART: Running Caliptra FMC ...
35,654,800 UART:
35,654,950 UART: [state] CFI Enabled
35,746,524 UART: [art] Extend RT PCRs Done
35,747,715 UART: [art] Lock RT PCRs Done
35,749,274 UART: [art] Populate DV Done
35,754,733 UART: [fht] FMC Alias Private Key: 7
35,756,382 UART: [art] Derive CDI
35,757,117 UART: [art] Store in slot 0x4
35,815,777 UART: [art] Derive Key Pair
35,816,780 UART: [art] Store priv key in slot 0x5
38,279,201 UART: [art] Derive Key Pair - Done
38,292,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,004,674 UART: [art] Erasing AUTHORITY.KEYID = 7
40,006,188 UART: [art] PUB.X = 43591E53E3D919B9409D882E2D8FED99C74E98BE794BAC371951AEFD60878531FB4DFE06143572989BF674823FAD7F2F
40,013,425 UART: [art] PUB.Y = F25F6F4CA39644613BBE5A8F395106ED491CD50595011E7A615EAE892D25E8983EE444E478E546E9EBE755D79C956D91
40,020,710 UART: [art] SIG.R = ACBA82C54721FA2BE233E23C8D9BE4CA5307594919F8CAA2EB21CB226EC73361A336913B3DEA1D074230D71D095F09F9
40,028,062 UART: [art] SIG.S = D4D6BF6596E83BF47F4369ECF1337A39BF3AF6CB1B4465C10DF3FDF9B6FBA6C12F1D3166918CE8421C66B0F9EF4EFFC1
41,007,215 UART: Caliptra RT
41,007,908 UART: [state] CFI Enabled
43,589,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,591,410 UART: [rt] RT listening for mailbox commands...
43,622,635 UART: [rt]cmd =0x494e464f, len=4
43,627,000 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,563 UART:
192,931 UART: Running Caliptra ROM ...
194,116 UART:
603,846 UART: [state] CFI Enabled
617,647 UART: [state] LifecycleState = Unprovisioned
620,027 UART: [state] DebugLocked = No
621,922 UART: [state] WD Timer not started. Device not locked for debugging
626,887 UART: [kat] SHA2-256
816,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,577 UART: [kat] ++
828,188 UART: [kat] sha1
841,221 UART: [kat] SHA2-256
844,243 UART: [kat] SHA2-384
849,672 UART: [kat] SHA2-512-ACC
852,260 UART: [kat] ECC-384
3,293,221 UART: [kat] HMAC-384Kdf
3,304,891 UART: [kat] LMS
3,836,747 UART: [kat] --
3,839,473 UART: [cold-reset] ++
3,840,763 UART: [fht] FHT @ 0x50003400
3,852,900 UART: [idev] ++
3,853,574 UART: [idev] CDI.KEYID = 6
3,854,472 UART: [idev] SUBJECT.KEYID = 7
3,855,731 UART: [idev] UDS.KEYID = 0
3,856,672 ready_for_fw is high
3,856,866 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,960,921 UART: [idev] Erasing UDS.KEYID = 0
6,329,661 UART: [idev] Sha1 KeyId Algorithm
6,352,074 UART: [idev] --
6,356,667 UART: [ldev] ++
6,357,396 UART: [ldev] CDI.KEYID = 6
6,358,279 UART: [ldev] SUBJECT.KEYID = 5
6,359,493 UART: [ldev] AUTHORITY.KEYID = 7
6,360,673 UART: [ldev] FE.KEYID = 1
6,371,731 UART: [ldev] Erasing FE.KEYID = 1
8,850,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,087 UART: [ldev] --
10,639,089 UART: [fwproc] Wait for Commands...
10,640,918 UART: [fwproc] Recv command 0x46574c44
10,643,196 UART: [fwproc] Recv'd Img size: 82832 bytes
13,701,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,780,651 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,904,263 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,250,267 >>> mbox cmd response: success
14,251,511 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,254,420 UART: [afmc] ++
14,255,129 UART: [afmc] CDI.KEYID = 6
14,256,238 UART: [afmc] SUBJECT.KEYID = 7
14,257,789 UART: [afmc] AUTHORITY.KEYID = 5
16,764,083 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,488,079 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,490,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,505,184 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,520,329 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,535,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,557,698 UART: [afmc] --
18,561,459 UART: [cold-reset] --
18,564,784 UART: [state] Locking Datavault
18,571,017 UART: [state] Locking PCR0, PCR1 and PCR31
18,573,209 UART: [state] Locking ICCM
18,575,841 UART: [exit] Launching FMC @ 0x40000130
18,584,520 UART:
18,584,759 UART: Running Caliptra FMC ...
18,585,864 UART:
18,586,023 UART: [state] CFI Enabled
18,594,292 UART: [fht] FMC Alias Private Key: 7
20,361,030 UART: [art] Extend RT PCRs Done
20,362,255 UART: [art] Lock RT PCRs Done
20,363,889 UART: [art] Populate DV Done
20,369,466 UART: [fht] FMC Alias Private Key: 7
20,371,007 UART: [art] Derive CDI
20,371,848 UART: [art] Store in slot 0x4
20,414,660 UART: [art] Derive Key Pair
20,415,705 UART: [art] Store priv key in slot 0x5
22,843,112 UART: [art] Derive Key Pair - Done
22,856,165 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,562,438 UART: [art] Erasing AUTHORITY.KEYID = 7
24,563,977 UART: [art] PUB.X = 894103AC5A39869F02AB8EFF99FB86FC03464EEECD99ADD10842380467479D006188BF3E4261C3304953D34343FD0103
24,571,250 UART: [art] PUB.Y = ADA89824A7D91BAF742EA18A003109C818641EEA4EA8F575FEF5681818CDB831C64C7993354EB990F390E960F353B853
24,578,422 UART: [art] SIG.R = 7D0BBFCEF3A87D3F5F379D1A950067C3CBCAF1A07261FE1D86013BA9A37F4A5BF8CE7A1EDD0D7B450DB81A3ACDDB4C54
24,585,839 UART: [art] SIG.S = BC5EBA5FD3EAB139022FD5E9671065AF81EE32C26811F1DA6F1FEDB1B9329168E7B70D914DEC595BB8BCFDFCC94DADD1
25,564,078 UART: mbox::rt_entry...
25,565,036 UART: ____ _ _ _ ____ _____
25,567,021 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,569,033 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,570,974 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,572,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,574,985 UART: |_|
25,575,806 UART:
25,706,357 UART: [rt] Runtime listening for mailbox commands...
25,713,578 >>> mbox cmd response data (4360 bytes)
25,734,284 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,778,675 >>> mbox cmd response data (0 bytes)
27,845,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,995,587 UART:
27,996,037 UART: Running Caliptra ROM ...
27,997,159 UART:
27,997,353 UART: [state] CFI Enabled
28,009,314 UART: [state] LifecycleState = Unprovisioned
28,011,326 UART: [state] DebugLocked = No
28,014,024 UART: [state] WD Timer not started. Device not locked for debugging
28,017,861 UART: [kat] SHA2-256
28,207,744 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,218,531 UART: [kat] ++
28,219,055 UART: [kat] sha1
28,230,815 UART: [kat] SHA2-256
28,233,789 UART: [kat] SHA2-384
28,240,654 UART: [kat] SHA2-512-ACC
28,243,232 UART: [kat] ECC-384
30,687,091 UART: [kat] HMAC-384Kdf
30,701,110 UART: [kat] LMS
31,232,731 UART: [kat] --
31,238,443 UART: [update-reset] ++
34,752,224 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,756,416 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,386,115 >>> mbox cmd response: success
35,390,828 UART: [update-reset] Copying MAN_2 To MAN_1
35,424,792 UART: [update-reset Success] --
35,430,147 UART: [state] Locking Datavault
35,434,938 UART: [state] Locking PCR0, PCR1 and PCR31
35,437,103 UART: [state] Locking ICCM
35,439,861 UART: [exit] Launching FMC @ 0x40000130
35,448,504 UART:
35,448,743 UART: Running Caliptra FMC ...
35,449,846 UART:
35,450,028 UART: [state] CFI Enabled
35,494,749 UART: [art] Extend RT PCRs Done
35,495,914 UART: [art] Lock RT PCRs Done
35,497,423 UART: [art] Populate DV Done
35,502,674 UART: [fht] FMC Alias Private Key: 7
35,504,220 UART: [art] Derive CDI
35,505,037 UART: [art] Store in slot 0x4
35,548,211 UART: [art] Derive Key Pair
35,549,261 UART: [art] Store priv key in slot 0x5
37,976,227 UART: [art] Derive Key Pair - Done
37,989,336 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,695,721 UART: [art] Erasing AUTHORITY.KEYID = 7
39,697,233 UART: [art] PUB.X = 6A536338EF3727BB8DF52B8575CD7229032EA6AF3EB399609B5D1E49099AD3CBB31CF97E67F64057DFDF35345FAFAE51
39,704,502 UART: [art] PUB.Y = E2FA8B7522808C5F97F2CF0975B54EC33A1CF58E029973BAC405949BBA320B68B8FC86A1AF2CECA4EB98E1378A15DBE7
39,711,809 UART: [art] SIG.R = E1163C53CB47451538106533D8C0369311B084D2B94B5E56B32A22D390D0719D5CC457BFC0B5577330AAF54F99728267
39,719,186 UART: [art] SIG.S = D07C9AAF73B714A15302E7167F1DF895426BC02EFD21D3A0B8EC4E4A5A7650CF71949EE1B22ADD145BB8866C2D21E608
40,698,281 UART: Caliptra RT
40,698,989 UART: [state] CFI Enabled
43,179,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,181,117 UART: [rt] RT listening for mailbox commands...
43,212,565 UART: [rt]cmd =0x494e464f, len=4
43,216,880 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,751,770 ready_for_fw is high
3,752,144 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,275,944 >>> mbox cmd response: success
14,277,307 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,530,177 UART:
18,530,573 UART: Running Caliptra FMC ...
18,531,684 UART:
18,531,840 UART: [state] CFI Enabled
18,539,962 UART: [fht] FMC Alias Private Key: 7
20,306,017 UART: [art] Extend RT PCRs Done
20,307,256 UART: [art] Lock RT PCRs Done
20,309,072 UART: [art] Populate DV Done
20,314,582 UART: [fht] FMC Alias Private Key: 7
20,316,116 UART: [art] Derive CDI
20,316,895 UART: [art] Store in slot 0x4
20,359,761 UART: [art] Derive Key Pair
20,360,763 UART: [art] Store priv key in slot 0x5
22,787,274 UART: [art] Derive Key Pair - Done
22,800,150 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,506,448 UART: [art] Erasing AUTHORITY.KEYID = 7
24,507,948 UART: [art] PUB.X = C163BD5A0B3E7E7C827445D3337803EE7878320B9755E9D0E6AD91122030C48125DCA1BA7743C04B4B92A9FFA6247C30
24,515,168 UART: [art] PUB.Y = 6DE6B834B98627A2079EACBE2E93E5ACFF46973F7FCFBFE7ADEFBEFD5D6836FC848A33ADD2A7DC712AA054756238C32B
24,522,477 UART: [art] SIG.R = C522D8E083D5B026AA221080DCF77F4550D584CDD03C4C6784F826CACC0304281DB499BFD175F94B4CDAC9A5CF8A8BB9
24,529,891 UART: [art] SIG.S = AD4E7576F5A1A7EADF898794D0EAAF3DE94AF00ACA05615B4E0707D06476BEA6C7CC10B4E711AC690FDC1CB1F3B73FED
25,507,678 UART: mbox::rt_entry...
25,508,662 UART: ____ _ _ _ ____ _____
25,510,649 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,512,607 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,514,738 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,516,690 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,518,628 UART: |_|
25,519,437 UART:
25,649,785 UART: [rt] Runtime listening for mailbox commands...
25,656,990 >>> mbox cmd response data (4360 bytes)
25,677,746 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,722,133 >>> mbox cmd response data (0 bytes)
27,788,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,610,299 >>> mbox cmd response: success
35,648,130 UART:
35,648,464 UART: Running Caliptra FMC ...
35,649,601 UART:
35,649,773 UART: [state] CFI Enabled
35,694,028 UART: [art] Extend RT PCRs Done
35,695,229 UART: [art] Lock RT PCRs Done
35,696,634 UART: [art] Populate DV Done
35,701,992 UART: [fht] FMC Alias Private Key: 7
35,703,585 UART: [art] Derive CDI
35,704,402 UART: [art] Store in slot 0x4
35,747,266 UART: [art] Derive Key Pair
35,748,262 UART: [art] Store priv key in slot 0x5
38,174,996 UART: [art] Derive Key Pair - Done
38,188,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,894,361 UART: [art] Erasing AUTHORITY.KEYID = 7
39,895,887 UART: [art] PUB.X = 513CF3392D6ED527F3622BE248D934DCA72C223B1A8F269D6E9BADC32C00847D82CCABEE6D79A4E8BEF6B7C0F0FF170F
39,903,113 UART: [art] PUB.Y = 8A309E26D86688929299119782F3974AF1A7FB02C96A6D2164D762517AEFF25F5E53D1BEABA6F22261C5425E8FC2CDC0
39,910,369 UART: [art] SIG.R = 50EF7410185FDA18CBCAD7669B1D78026FE3ED8C23F57425975D867F7C8BEF1541CAFECEBDD62B6EF41E7F6773CA5038
39,917,815 UART: [art] SIG.S = 41809EE391E77B9033EB03B11FA4B45D8CFDE7BAFC4CE58C1E18FB18DFCFAC422061EDB5F98FF8BC9CC1F8E9DA9697F6
40,895,995 UART: Caliptra RT
40,896,684 UART: [state] CFI Enabled
43,378,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,380,019 UART: [rt] RT listening for mailbox commands...
43,411,256 UART: [rt]cmd =0x494e464f, len=4
43,415,422 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,952 UART: [state] LifecycleState = Unprovisioned
85,607 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,665 UART: [kat] SHA2-256
881,596 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,711 UART: [kat] ++
885,863 UART: [kat] sha1
890,221 UART: [kat] SHA2-256
892,159 UART: [kat] SHA2-384
894,804 UART: [kat] SHA2-512-ACC
896,705 UART: [kat] ECC-384
902,300 UART: [kat] HMAC-384Kdf
906,888 UART: [kat] LMS
1,475,084 UART: [kat] --
1,476,099 UART: [cold-reset] ++
1,476,597 UART: [fht] Storing FHT @ 0x50003400
1,479,236 UART: [idev] ++
1,479,404 UART: [idev] CDI.KEYID = 6
1,479,764 UART: [idev] SUBJECT.KEYID = 7
1,480,188 UART: [idev] UDS.KEYID = 0
1,480,533 ready_for_fw is high
1,480,533 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,292 UART: [idev] Erasing UDS.KEYID = 0
1,505,320 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,930 UART: [idev] --
1,515,177 UART: [ldev] ++
1,515,345 UART: [ldev] CDI.KEYID = 6
1,515,708 UART: [ldev] SUBJECT.KEYID = 5
1,516,134 UART: [ldev] AUTHORITY.KEYID = 7
1,516,597 UART: [ldev] FE.KEYID = 1
1,521,779 UART: [ldev] Erasing FE.KEYID = 1
1,547,194 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,182 UART: [ldev] --
1,586,497 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 82832 bytes
2,524,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,552,290 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,670,373 >>> mbox cmd response: success
2,670,373 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,671,545 UART: [afmc] ++
2,671,713 UART: [afmc] CDI.KEYID = 6
2,672,075 UART: [afmc] SUBJECT.KEYID = 7
2,672,500 UART: [afmc] AUTHORITY.KEYID = 5
2,707,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,723,045 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,825 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,534 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,417 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,100 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,749,034 UART: [afmc] --
2,750,142 UART: [cold-reset] --
2,750,978 UART: [state] Locking Datavault
2,752,393 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,997 UART: [state] Locking ICCM
2,753,621 UART: [exit] Launching FMC @ 0x40000130
2,758,951 UART:
2,758,967 UART: Running Caliptra FMC ...
2,759,375 UART:
2,759,429 UART: [state] CFI Enabled
2,770,149 UART: [fht] FMC Alias Private Key: 7
2,889,563 UART: [art] Extend RT PCRs Done
2,889,991 UART: [art] Lock RT PCRs Done
2,891,571 UART: [art] Populate DV Done
2,899,572 UART: [fht] FMC Alias Private Key: 7
2,900,638 UART: [art] Derive CDI
2,900,918 UART: [art] Store in slot 0x4
2,986,564 UART: [art] Derive Key Pair
2,986,924 UART: [art] Store priv key in slot 0x5
3,000,447 UART: [art] Derive Key Pair - Done
3,015,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,474 UART: [art] Erasing AUTHORITY.KEYID = 7
3,031,239 UART: [art] PUB.X = C43434BD32491E52DAC0F93060A4DCE4A2738D201912249604B2FD0BBAE911A607FA4C896E6EE3EB25B00BCBAAE9CFEF
3,038,017 UART: [art] PUB.Y = 99387A71EB6E0113CDC20B970123A04907FE95823D74A20040E0D2A4D56C11134629F573FEBEE46541A776E8FA1C184F
3,044,931 UART: [art] SIG.R = 27FF02B4908EB3DCB9B3BA9D3C0251D8B695F3BFE327CC810E7B69A086A73042C6389EB8C7DCACCB21996982280AD6E4
3,051,703 UART: [art] SIG.S = 29E35901E1BA68B7A667F32054C634462EF56AF44BD867221A6F479972917F2E41B11921A2D1E7AE9F022317622BFD2F
3,075,731 UART: mbox::rt_entry...
3,076,103 UART: ____ _ _ _ ____ _____
3,076,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,077,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,078,455 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,079,223 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,079,991 UART: |_|
3,080,303 UART:
3,199,215 UART: [rt] Runtime listening for mailbox commands...
3,205,549 >>> mbox cmd response data (4360 bytes)
3,205,550 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,236,332 >>> mbox cmd response data (0 bytes)
3,236,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,236,454 UART:
3,236,470 UART: Running Caliptra ROM ...
3,236,878 UART:
3,236,932 UART: [state] CFI Enabled
3,239,344 UART: [state] LifecycleState = Unprovisioned
3,239,999 UART: [state] DebugLocked = No
3,240,495 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,242,132 UART: [kat] SHA2-256
4,036,063 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,040,178 UART: [kat] ++
4,040,330 UART: [kat] sha1
4,044,744 UART: [kat] SHA2-256
4,046,682 UART: [kat] SHA2-384
4,049,317 UART: [kat] SHA2-512-ACC
4,051,217 UART: [kat] ECC-384
4,056,814 UART: [kat] HMAC-384Kdf
4,061,416 UART: [kat] LMS
4,629,612 UART: [kat] --
4,630,485 UART: [update-reset] ++
6,010,601 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,767 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,034 >>> mbox cmd response: success
6,167,301 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,315 UART: [update-reset Success] --
6,176,152 UART: [state] Locking Datavault
6,177,002 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,606 UART: [state] Locking ICCM
6,178,276 UART: [exit] Launching FMC @ 0x40000130
6,183,606 UART:
6,183,622 UART: Running Caliptra FMC ...
6,184,030 UART:
6,184,084 UART: [state] CFI Enabled
6,272,933 UART: [art] Extend RT PCRs Done
6,273,361 UART: [art] Lock RT PCRs Done
6,274,212 UART: [art] Populate DV Done
6,282,337 UART: [fht] FMC Alias Private Key: 7
6,283,345 UART: [art] Derive CDI
6,283,625 UART: [art] Store in slot 0x4
6,369,573 UART: [art] Derive Key Pair
6,369,933 UART: [art] Store priv key in slot 0x5
6,382,836 UART: [art] Derive Key Pair - Done
6,397,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,412,579 UART: [art] Erasing AUTHORITY.KEYID = 7
6,413,344 UART: [art] PUB.X = E7F0A95CFEE59F76F93F2CD9858A1D6053FA3D4F5256E6C464A75871C2F2A69C1A2FD605A191FE463D3167F21F3061C3
6,420,119 UART: [art] PUB.Y = 15D542F6C02AA112D0F264FCEE650C12793DCC0BA4DC93E6E315FDCB7076E97574CC83847014F0C6C23FD47BBA4F5426
6,427,075 UART: [art] SIG.R = 968172F8A46824B822CD35D248B2F58457D041C3D40CFDB1F7ACD7B44187378861767331642B64EB2B24DA7E61D7292B
6,433,838 UART: [art] SIG.S = 016FF33CF6286F79E200BC7DF499C250DE0B05C2C30112AFBF34BFF1FC26644EE02BA3FB6E1D8F59B24653F3F2FF943B
6,457,624 UART: Caliptra RT
6,457,875 UART: [state] CFI Enabled
6,525,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,526,611 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,557,069 UART: [rt]cmd =0x494e464f, len=4
6,560,983 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,477 ready_for_fw is high
1,362,477 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,323 >>> mbox cmd response: success
2,518,323 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,670 UART:
2,580,686 UART: Running Caliptra FMC ...
2,581,094 UART:
2,581,148 UART: [state] CFI Enabled
2,591,756 UART: [fht] FMC Alias Private Key: 7
2,711,042 UART: [art] Extend RT PCRs Done
2,711,470 UART: [art] Lock RT PCRs Done
2,712,694 UART: [art] Populate DV Done
2,720,967 UART: [fht] FMC Alias Private Key: 7
2,722,119 UART: [art] Derive CDI
2,722,399 UART: [art] Store in slot 0x4
2,807,727 UART: [art] Derive Key Pair
2,808,087 UART: [art] Store priv key in slot 0x5
2,821,066 UART: [art] Derive Key Pair - Done
2,835,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,028 UART: [art] Erasing AUTHORITY.KEYID = 7
2,851,793 UART: [art] PUB.X = 3A9FDBA2518E28B2C966E1CA760165CA0B842AF72A756B4C84F526425405D06DEEBF21CCC6A33E8AFDB625854AEE28CC
2,858,572 UART: [art] PUB.Y = 122873EE5344BE2E48E300B7DE9D0DAB2F33ADAC6D06FFC0AECBA0BFE3CF4322ACC065DD49F8F5318AE5D75489C25396
2,865,518 UART: [art] SIG.R = 96A99BEC887011E4E45E9A9EB43D7F2DCBEF28397CDEF0550B1AB8CD651070B72653F084D0AA6C9D59D30586D73C0351
2,872,289 UART: [art] SIG.S = 8D7ABFACAC5D31B882360487EC9B0EA94671865442038B507866B07B1BEB839175A1FC7344BD0A69AEF9FA7454572CB6
2,896,351 UART: mbox::rt_entry...
2,896,723 UART: ____ _ _ _ ____ _____
2,897,507 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,307 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,075 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,899,843 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,900,611 UART: |_|
2,900,923 UART:
3,019,191 UART: [rt] Runtime listening for mailbox commands...
3,025,525 >>> mbox cmd response data (4360 bytes)
3,025,526 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,056,308 >>> mbox cmd response data (0 bytes)
3,056,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,868,362 >>> mbox cmd response: success
5,881,880 UART:
5,881,896 UART: Running Caliptra FMC ...
5,882,304 UART:
5,882,358 UART: [state] CFI Enabled
5,971,089 UART: [art] Extend RT PCRs Done
5,971,517 UART: [art] Lock RT PCRs Done
5,972,476 UART: [art] Populate DV Done
5,980,585 UART: [fht] FMC Alias Private Key: 7
5,981,629 UART: [art] Derive CDI
5,981,909 UART: [art] Store in slot 0x4
6,067,985 UART: [art] Derive Key Pair
6,068,345 UART: [art] Store priv key in slot 0x5
6,081,786 UART: [art] Derive Key Pair - Done
6,096,702 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,112,129 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,894 UART: [art] PUB.X = 087C9E219D7D08FE3BBE2F3C84DB0CF7F5F87BD36BA9471D6A97D8F535D2AAF07D2A081B9E5E9D69473D4D3A3FDB516F
6,119,674 UART: [art] PUB.Y = D18A1E9FF7288C50A79652589BCBA2BBFC8480AA636D9D4CCDA51D5BB2ABCDE7CA0BC6081F76BCB78B45F06C8EAC5EDD
6,126,652 UART: [art] SIG.R = D2B5874F31A829B9CAE11FE3D74E3C3F627F5AD47EE1F1B2C2934FA4C8D9D9A80DB8310F41C562FEC55CEF428538C988
6,133,432 UART: [art] SIG.S = 82FF2FAE73EBACADAB2D5C87E9B2FDC3256BFC55E6B043828F814707C45DC1D7EB179915BB321492E465D8948327E82B
6,157,673 UART: Caliptra RT
6,157,924 UART: [state] CFI Enabled
6,224,909 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,226,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,256,823 UART: [rt]cmd =0x494e464f, len=4
6,260,763 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,872 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,522 UART: [kat] SHA2-256
882,453 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,568 UART: [kat] ++
886,720 UART: [kat] sha1
891,110 UART: [kat] SHA2-256
893,048 UART: [kat] SHA2-384
895,767 UART: [kat] SHA2-512-ACC
897,668 UART: [kat] ECC-384
903,355 UART: [kat] HMAC-384Kdf
907,885 UART: [kat] LMS
1,476,081 UART: [kat] --
1,477,124 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,245 UART: [idev] ++
1,480,413 UART: [idev] CDI.KEYID = 6
1,480,773 UART: [idev] SUBJECT.KEYID = 7
1,481,197 UART: [idev] UDS.KEYID = 0
1,481,542 ready_for_fw is high
1,481,542 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,255 UART: [idev] Erasing UDS.KEYID = 0
1,505,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,489 UART: [idev] --
1,515,622 UART: [ldev] ++
1,515,790 UART: [ldev] CDI.KEYID = 6
1,516,153 UART: [ldev] SUBJECT.KEYID = 5
1,516,579 UART: [ldev] AUTHORITY.KEYID = 7
1,517,042 UART: [ldev] FE.KEYID = 1
1,522,474 UART: [ldev] Erasing FE.KEYID = 1
1,548,403 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,748 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,355 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,067 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,143 UART: [ldev] --
1,587,498 UART: [fwproc] Waiting for Commands...
1,588,195 UART: [fwproc] Received command 0x46574c44
1,588,986 UART: [fwproc] Received Image of size 82832 bytes
2,524,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,887 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,583,105 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,946 >>> mbox cmd response: success
2,669,946 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,671,054 UART: [afmc] ++
2,671,222 UART: [afmc] CDI.KEYID = 6
2,671,584 UART: [afmc] SUBJECT.KEYID = 7
2,672,009 UART: [afmc] AUTHORITY.KEYID = 5
2,706,666 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,772 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,481 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,364 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,741,047 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,867 UART: [afmc] --
2,749,763 UART: [cold-reset] --
2,750,567 UART: [state] Locking Datavault
2,751,520 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,124 UART: [state] Locking ICCM
2,752,640 UART: [exit] Launching FMC @ 0x40000130
2,757,970 UART:
2,757,986 UART: Running Caliptra FMC ...
2,758,394 UART:
2,758,537 UART: [state] CFI Enabled
2,769,383 UART: [fht] FMC Alias Private Key: 7
2,887,969 UART: [art] Extend RT PCRs Done
2,888,397 UART: [art] Lock RT PCRs Done
2,890,165 UART: [art] Populate DV Done
2,898,594 UART: [fht] FMC Alias Private Key: 7
2,899,694 UART: [art] Derive CDI
2,899,974 UART: [art] Store in slot 0x4
2,985,686 UART: [art] Derive Key Pair
2,986,046 UART: [art] Store priv key in slot 0x5
2,999,467 UART: [art] Derive Key Pair - Done
3,014,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,029,453 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,218 UART: [art] PUB.X = 62F2418BF5BB05F196E9B7921248BB58E77F4609A694098F81DA43997F28EEEC758BC6E7639DEA001C2D589105C71921
3,036,952 UART: [art] PUB.Y = 204B5A13B63094630FF4418C41AB907B209443ED36C7C0C09B6A8E741EF09BDA622DFC01F30141C296A669A325F25790
3,043,891 UART: [art] SIG.R = 17600432756A4560B753805D87E31153319117E6F50C2BF56E457311966921F6DC5BBA76568629B66B9B1017439B7AF8
3,050,637 UART: [art] SIG.S = C6F62880BEE2EBB0FB4D823009B51A6180383CAB9D68252B62A3FE426DF660D5A4AE1C37C4975C2D8166FE687A366C40
3,074,680 UART: mbox::rt_entry...
3,075,052 UART: ____ _ _ _ ____ _____
3,075,836 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,636 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,404 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,078,172 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,940 UART: |_|
3,079,252 UART:
3,198,495 UART: [rt] Runtime listening for mailbox commands...
3,204,829 >>> mbox cmd response data (4360 bytes)
3,204,830 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,612 >>> mbox cmd response data (0 bytes)
3,235,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,734 UART:
3,235,750 UART: Running Caliptra ROM ...
3,236,158 UART:
3,236,299 UART: [state] CFI Enabled
3,238,939 UART: [state] LifecycleState = Unprovisioned
3,239,594 UART: [state] DebugLocked = No
3,240,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,875 UART: [kat] SHA2-256
4,035,806 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,921 UART: [kat] ++
4,040,073 UART: [kat] sha1
4,044,125 UART: [kat] SHA2-256
4,046,063 UART: [kat] SHA2-384
4,048,606 UART: [kat] SHA2-512-ACC
4,050,506 UART: [kat] ECC-384
4,055,809 UART: [kat] HMAC-384Kdf
4,060,229 UART: [kat] LMS
4,628,425 UART: [kat] --
4,629,096 UART: [update-reset] ++
6,010,472 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,704 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,166,971 >>> mbox cmd response: success
6,167,188 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,202 UART: [update-reset Success] --
6,176,191 UART: [state] Locking Datavault
6,176,935 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,539 UART: [state] Locking ICCM
6,178,073 UART: [exit] Launching FMC @ 0x40000130
6,183,403 UART:
6,183,419 UART: Running Caliptra FMC ...
6,183,827 UART:
6,183,970 UART: [state] CFI Enabled
6,273,489 UART: [art] Extend RT PCRs Done
6,273,917 UART: [art] Lock RT PCRs Done
6,275,230 UART: [art] Populate DV Done
6,283,515 UART: [fht] FMC Alias Private Key: 7
6,284,595 UART: [art] Derive CDI
6,284,875 UART: [art] Store in slot 0x4
6,370,785 UART: [art] Derive Key Pair
6,371,145 UART: [art] Store priv key in slot 0x5
6,384,152 UART: [art] Derive Key Pair - Done
6,399,040 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,461 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,226 UART: [art] PUB.X = A660C235EDAEBC62FA204E7D005EE32431861C47FABC5ED06BB4C13BB343DAD3EA035A6C1CBDF9B6ABCCD02BD54FB673
6,422,003 UART: [art] PUB.Y = 2CB118460B1D3339149FA4A859A7E5473FF18B1DCAFED31CD7156133EB334EF5E32167BC270CDE59F931090E397F2F24
6,428,947 UART: [art] SIG.R = E6ED0E7261943236CE269EB6CDE0A6349194C4481DC55E3AF8D54C84C6799302ED7644EB74B79585E3A886A71F338AF6
6,435,713 UART: [art] SIG.S = F0146DFFBBE08179825454892BA2136AA052340F46F3374D6BCFFBD879FC2CE955AD223498EB26AF2F6D94A6D3391C78
6,459,716 UART: Caliptra RT
6,460,059 UART: [state] CFI Enabled
6,528,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,529,534 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,560,502 UART: [rt]cmd =0x494e464f, len=4
6,564,246 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,466 ready_for_fw is high
1,362,466 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,518,474 >>> mbox cmd response: success
2,518,474 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,580,605 UART:
2,580,621 UART: Running Caliptra FMC ...
2,581,029 UART:
2,581,172 UART: [state] CFI Enabled
2,591,628 UART: [fht] FMC Alias Private Key: 7
2,710,914 UART: [art] Extend RT PCRs Done
2,711,342 UART: [art] Lock RT PCRs Done
2,713,082 UART: [art] Populate DV Done
2,721,359 UART: [fht] FMC Alias Private Key: 7
2,722,469 UART: [art] Derive CDI
2,722,749 UART: [art] Store in slot 0x4
2,808,475 UART: [art] Derive Key Pair
2,808,835 UART: [art] Store priv key in slot 0x5
2,821,590 UART: [art] Derive Key Pair - Done
2,836,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,851,794 UART: [art] Erasing AUTHORITY.KEYID = 7
2,852,559 UART: [art] PUB.X = 6F38D8953FCFD41329C382FBA6A0BDC88BA99E8BEEA9E962C7CCC6976E506EF2821BECC5C8C3262F296AC92C64F3855E
2,859,349 UART: [art] PUB.Y = 070BF94A31348DDE2D055F072E6A1E54DA873E952F61F29F46E26BA7B2002E01021F03A078FA6D8A2A4BE15018271C24
2,866,258 UART: [art] SIG.R = E427594AA89D6DE6DAA4B97CAF8F35390AFDD94F0BE48E7DBCA891BB0A2DCF9932720C2CBE53FA811ACF7190CBA1C0AA
2,873,048 UART: [art] SIG.S = 0A1F492FAE8E0AC06573FF19AF20484C50F9FFBC945BAE8C090F7D72AC1573C45959E125B1CA99D10BA9E96A937DEBC4
2,896,863 UART: mbox::rt_entry...
2,897,235 UART: ____ _ _ _ ____ _____
2,898,019 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,898,819 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,899,587 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,900,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,901,123 UART: |_|
2,901,435 UART:
3,020,978 UART: [rt] Runtime listening for mailbox commands...
3,027,312 >>> mbox cmd response data (4360 bytes)
3,027,313 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,058,095 >>> mbox cmd response data (0 bytes)
3,058,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,871,108 >>> mbox cmd response: success
5,884,798 UART:
5,884,814 UART: Running Caliptra FMC ...
5,885,222 UART:
5,885,365 UART: [state] CFI Enabled
5,974,500 UART: [art] Extend RT PCRs Done
5,974,928 UART: [art] Lock RT PCRs Done
5,975,943 UART: [art] Populate DV Done
5,983,906 UART: [fht] FMC Alias Private Key: 7
5,985,062 UART: [art] Derive CDI
5,985,342 UART: [art] Store in slot 0x4
6,071,378 UART: [art] Derive Key Pair
6,071,738 UART: [art] Store priv key in slot 0x5
6,084,691 UART: [art] Derive Key Pair - Done
6,099,567 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,114,822 UART: [art] Erasing AUTHORITY.KEYID = 7
6,115,587 UART: [art] PUB.X = 9DAA72B2D736A0738E60357D52768ECDE7B29E4AFA69CCCBD6BB1C0A45DF4EE89A146BE51251437B72F390525BDAAA40
6,122,372 UART: [art] PUB.Y = 002C0DBF24949A9F354DB8953ED9573BE3E97E328FEEDA7307E76C7C4E73D53AD3A89D480EF32E084F66D1D2287B8C41
6,129,298 UART: [art] SIG.R = 0C934E50069FF8C8634D3A673898EF16FB0E788298E0F9533B54974ED8C5DEACD377906E3674B470A8661734E84EEE27
6,136,057 UART: [art] SIG.S = 3E1DA2A3154CBEFC7A507D4843F311A38F388E743FB0778EBAE3EADF07F2CF37A15C2CD42205D06725410D6714FF6E2F
6,160,374 UART: Caliptra RT
6,160,717 UART: [state] CFI Enabled
6,227,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,228,982 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,259,412 UART: [rt]cmd =0x494e464f, len=4
6,263,102 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,374 UART: [state] LifecycleState = Unprovisioned
86,029 UART: [state] DebugLocked = No
86,511 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,960 UART: [kat] SHA2-256
901,900 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
916,257 UART: [kat] HMAC-384Kdf
920,979 UART: [kat] LMS
1,169,291 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,566 UART: [fht] FHT @ 0x50003400
1,173,156 UART: [idev] ++
1,173,324 UART: [idev] CDI.KEYID = 6
1,173,685 UART: [idev] SUBJECT.KEYID = 7
1,174,110 UART: [idev] UDS.KEYID = 0
1,174,456 ready_for_fw is high
1,174,456 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,057 UART: [idev] Erasing UDS.KEYID = 0
1,199,071 UART: [idev] Sha1 KeyId Algorithm
1,207,937 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,392 UART: [ldev] Erasing FE.KEYID = 1
1,241,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,728 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,480 UART: [ldev] --
1,280,855 UART: [fwproc] Wait for Commands...
1,281,482 UART: [fwproc] Recv command 0x46574c44
1,282,215 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,038 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,213 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,032 >>> mbox cmd response: success
2,363,032 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,146 UART: [afmc] ++
2,364,314 UART: [afmc] CDI.KEYID = 6
2,364,677 UART: [afmc] SUBJECT.KEYID = 7
2,365,103 UART: [afmc] AUTHORITY.KEYID = 5
2,400,188 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,416,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,417,552 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,262 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,143 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,434,844 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,442,477 UART: [afmc] --
2,443,370 UART: [cold-reset] --
2,444,220 UART: [state] Locking Datavault
2,445,449 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,053 UART: [state] Locking ICCM
2,446,475 UART: [exit] Launching FMC @ 0x40000130
2,451,805 UART:
2,451,821 UART: Running Caliptra FMC ...
2,452,229 UART:
2,452,283 UART: [state] CFI Enabled
2,462,507 UART: [fht] FMC Alias Private Key: 7
2,580,791 UART: [art] Extend RT PCRs Done
2,581,219 UART: [art] Lock RT PCRs Done
2,582,871 UART: [art] Populate DV Done
2,590,984 UART: [fht] FMC Alias Private Key: 7
2,591,942 UART: [art] Derive CDI
2,592,222 UART: [art] Store in slot 0x4
2,677,781 UART: [art] Derive Key Pair
2,678,141 UART: [art] Store priv key in slot 0x5
2,691,823 UART: [art] Derive Key Pair - Done
2,706,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,722,480 UART: [art] Erasing AUTHORITY.KEYID = 7
2,723,245 UART: [art] PUB.X = B6F69F4B68DA6B79CAD7B585E6B50480B6043D2AB670B2C0BE55237F84EB79FE0E5337E2EF02B9A8B145B0283C0E2FF0
2,730,014 UART: [art] PUB.Y = AC5B5B36747CD7435E151E1054B2DB2FB6EADC4046D7102A0D867DE3F0454AFF7A559B25E69CE6AC3653BA4F0B8E7F4D
2,736,976 UART: [art] SIG.R = 19B54265512B0D48A5E4F9ECDA99E9F88569609127B92B3B73B555C862E1304E99F936062D01B98612A8B9D4FF00E2C0
2,743,711 UART: [art] SIG.S = 59B36CF3AEDA249C6EC23AC710BA408AF17563A2D4470CFAE60B1766E31C0B9BE21AB5F82B6F2FE6B638BFA8949B9A07
2,767,095 UART: mbox::rt_entry...
2,767,467 UART: ____ _ _ _ ____ _____
2,768,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,051 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,769,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,770,587 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,771,355 UART: |_|
2,771,667 UART:
2,890,646 UART: [rt] Runtime listening for mailbox commands...
2,896,980 >>> mbox cmd response data (4360 bytes)
2,896,981 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,927,763 >>> mbox cmd response data (0 bytes)
2,927,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,927,882 UART:
2,927,898 UART: Running Caliptra ROM ...
2,928,306 UART:
2,928,361 UART: [state] CFI Enabled
2,930,917 UART: [state] LifecycleState = Unprovisioned
2,931,572 UART: [state] DebugLocked = No
2,932,278 UART: [state] WD Timer not started. Device not locked for debugging
2,933,408 UART: [kat] SHA2-256
3,736,958 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,062 UART: [kat] ++
3,741,214 UART: [kat] sha1
3,745,478 UART: [kat] SHA2-256
3,747,418 UART: [kat] SHA2-384
3,750,295 UART: [kat] SHA2-512-ACC
3,752,195 UART: [kat] ECC-384
3,762,222 UART: [kat] HMAC-384Kdf
3,766,786 UART: [kat] LMS
4,015,098 UART: [kat] --
4,016,088 UART: [update-reset] ++
5,374,207 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,375,334 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,530,549 >>> mbox cmd response: success
5,530,762 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,776 UART: [update-reset Success] --
5,539,923 UART: [state] Locking Datavault
5,540,955 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,559 UART: [state] Locking ICCM
5,542,135 UART: [exit] Launching FMC @ 0x40000130
5,547,465 UART:
5,547,481 UART: Running Caliptra FMC ...
5,547,889 UART:
5,547,943 UART: [state] CFI Enabled
5,636,840 UART: [art] Extend RT PCRs Done
5,637,268 UART: [art] Lock RT PCRs Done
5,638,661 UART: [art] Populate DV Done
5,647,124 UART: [fht] FMC Alias Private Key: 7
5,648,156 UART: [art] Derive CDI
5,648,436 UART: [art] Store in slot 0x4
5,733,989 UART: [art] Derive Key Pair
5,734,349 UART: [art] Store priv key in slot 0x5
5,747,403 UART: [art] Derive Key Pair - Done
5,762,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,777,606 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,371 UART: [art] PUB.X = D6A775225FD74104D3B5F71FA5024FB01310EF97B5C616094E4B44D7C26AA46788C2A9F4F47EEB2886A54B8D77F070A9
5,785,136 UART: [art] PUB.Y = E09EC6AF79D466704077378251898DF0749D9C95C3AF4D1EA9CF1B320D7BEBE8468686EC079891B199417C5BA7FEBF1E
5,792,088 UART: [art] SIG.R = 18596704D7C73CDC34ED2636EC9B204AFE41B05AFE52CB58ABA6257B6786B8BECA0FA11553E9DC7A8BDEA5FBAB38A940
5,798,876 UART: [art] SIG.S = 077EBEE3A120131421974ECD3FBAC5CBF15D95D98EE4B54C73CB1512FF26DB1C802C2216197C516AB3615B162F5F70F5
5,822,607 UART: Caliptra RT
5,822,858 UART: [state] CFI Enabled
5,889,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,890,822 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,921,136 UART: [rt]cmd =0x494e464f, len=4
5,924,756 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,266 ready_for_fw is high
1,059,266 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,553 >>> mbox cmd response: success
2,215,553 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,276,974 UART:
2,276,990 UART: Running Caliptra FMC ...
2,277,398 UART:
2,277,452 UART: [state] CFI Enabled
2,287,766 UART: [fht] FMC Alias Private Key: 7
2,406,110 UART: [art] Extend RT PCRs Done
2,406,538 UART: [art] Lock RT PCRs Done
2,407,996 UART: [art] Populate DV Done
2,416,491 UART: [fht] FMC Alias Private Key: 7
2,417,499 UART: [art] Derive CDI
2,417,779 UART: [art] Store in slot 0x4
2,503,890 UART: [art] Derive Key Pair
2,504,250 UART: [art] Store priv key in slot 0x5
2,518,050 UART: [art] Derive Key Pair - Done
2,532,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,547,818 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,583 UART: [art] PUB.X = F438DF8EA62ACA15083DF3FE32790F320A7A578E5F7FBFB52BB71CCCD4FBDCA183B344E51FA305B84997703447F03808
2,555,352 UART: [art] PUB.Y = 06DD01B0448F1C8DD015B2C7EBE2AF6D78EE3D1665A2A3928A499152B9B5CB12876583E3C7D91DEB3D8611EB75A0E0E4
2,562,308 UART: [art] SIG.R = 1FEB51D651671C0270759BD233C2451C4FE3DCD3BD7C391391323F05AAD9F3D026D134FE06177D8FC0C78EDF8667D0BD
2,569,079 UART: [art] SIG.S = 9FB6A03644A5951196ADCC73912E230F0AB531E1C1557DB30F5E38A39FF07A9AAE422F2A5E7E505B5620FA204378B23D
2,592,614 UART: mbox::rt_entry...
2,592,986 UART: ____ _ _ _ ____ _____
2,593,770 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,338 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,106 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,596,874 UART: |_|
2,597,186 UART:
2,715,514 UART: [rt] Runtime listening for mailbox commands...
2,721,848 >>> mbox cmd response data (4360 bytes)
2,721,849 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,752,631 >>> mbox cmd response data (0 bytes)
2,752,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,239,357 >>> mbox cmd response: success
5,253,026 UART:
5,253,042 UART: Running Caliptra FMC ...
5,253,450 UART:
5,253,504 UART: [state] CFI Enabled
5,342,919 UART: [art] Extend RT PCRs Done
5,343,347 UART: [art] Lock RT PCRs Done
5,344,720 UART: [art] Populate DV Done
5,353,183 UART: [fht] FMC Alias Private Key: 7
5,354,215 UART: [art] Derive CDI
5,354,495 UART: [art] Store in slot 0x4
5,440,664 UART: [art] Derive Key Pair
5,441,024 UART: [art] Store priv key in slot 0x5
5,454,280 UART: [art] Derive Key Pair - Done
5,468,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,484,118 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,883 UART: [art] PUB.X = 63C9818039CDB54E3768B5CA18BB8E4BCAD22DABE0A29CB5172C3334D5820ABB834D9FA5DA4B1EF71C3537D640917C1B
5,491,666 UART: [art] PUB.Y = B3409C68A4438A756A6E20D93C5F6C9F5225807F1E200685DD4EB9E11441A1AA344089F9220A6E53D5BE70C0DD2B8865
5,498,610 UART: [art] SIG.R = 663B68BD44189FB7F9913D7BE94D7CF27F5248A057A90188E3AE25E3073FFEDF1CBD7BD6D7B20793C569722E577AC1E8
5,505,381 UART: [art] SIG.S = 0B90CE51DCBEE5AC7A33734C08573A1B14F291D5CF8DF5FD381B6B5657532C7500338A2A812AFDE605D7F74B5D7A12A5
5,528,852 UART: Caliptra RT
5,529,103 UART: [state] CFI Enabled
5,594,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,596,567 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,627,101 UART: [rt]cmd =0x494e464f, len=4
5,630,691 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,788 UART: [state] WD Timer not started. Device not locked for debugging
88,001 UART: [kat] SHA2-256
891,551 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,655 UART: [kat] ++
895,807 UART: [kat] sha1
900,077 UART: [kat] SHA2-256
902,017 UART: [kat] SHA2-384
904,574 UART: [kat] SHA2-512-ACC
906,475 UART: [kat] ECC-384
916,102 UART: [kat] HMAC-384Kdf
920,774 UART: [kat] LMS
1,169,086 UART: [kat] --
1,170,157 UART: [cold-reset] ++
1,170,489 UART: [fht] FHT @ 0x50003400
1,173,155 UART: [idev] ++
1,173,323 UART: [idev] CDI.KEYID = 6
1,173,684 UART: [idev] SUBJECT.KEYID = 7
1,174,109 UART: [idev] UDS.KEYID = 0
1,174,455 ready_for_fw is high
1,174,455 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,192 UART: [idev] Erasing UDS.KEYID = 0
1,199,428 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,313 UART: [ldev] ++
1,209,481 UART: [ldev] CDI.KEYID = 6
1,209,845 UART: [ldev] SUBJECT.KEYID = 5
1,210,272 UART: [ldev] AUTHORITY.KEYID = 7
1,210,735 UART: [ldev] FE.KEYID = 1
1,215,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,018 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,801 UART: [ldev] --
1,282,030 UART: [fwproc] Wait for Commands...
1,282,811 UART: [fwproc] Recv command 0x46574c44
1,283,544 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,246,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,277,268 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,885 >>> mbox cmd response: success
2,363,885 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,927 UART: [afmc] ++
2,365,095 UART: [afmc] CDI.KEYID = 6
2,365,458 UART: [afmc] SUBJECT.KEYID = 7
2,365,884 UART: [afmc] AUTHORITY.KEYID = 5
2,401,099 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,456 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,915 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,796 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,497 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,296 UART: [afmc] --
2,444,309 UART: [cold-reset] --
2,445,031 UART: [state] Locking Datavault
2,446,386 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,990 UART: [state] Locking ICCM
2,447,532 UART: [exit] Launching FMC @ 0x40000130
2,452,862 UART:
2,452,878 UART: Running Caliptra FMC ...
2,453,286 UART:
2,453,429 UART: [state] CFI Enabled
2,464,545 UART: [fht] FMC Alias Private Key: 7
2,583,497 UART: [art] Extend RT PCRs Done
2,583,925 UART: [art] Lock RT PCRs Done
2,585,353 UART: [art] Populate DV Done
2,593,682 UART: [fht] FMC Alias Private Key: 7
2,594,852 UART: [art] Derive CDI
2,595,132 UART: [art] Store in slot 0x4
2,681,001 UART: [art] Derive Key Pair
2,681,361 UART: [art] Store priv key in slot 0x5
2,694,881 UART: [art] Derive Key Pair - Done
2,709,583 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,725,208 UART: [art] Erasing AUTHORITY.KEYID = 7
2,725,973 UART: [art] PUB.X = 0BCC0F36556694BFBD1CEF14F088A7E949AA165A9BE2243AC7D0BAC9F94193DE8F6C0097F5FCCC630246893078CB7637
2,732,724 UART: [art] PUB.Y = F804705F07713870014FAC62F79408D756DE92B4B9CADC761C8AE1C182AB627DADBB4F0AD7CBE3190C07E3948484347F
2,739,661 UART: [art] SIG.R = 02BCE9B37492D6B559AE29E7D2995839F9404D5A781923DF95870CD577B0C5C84B2DEAC545AE0775CB350320C51FD8BF
2,746,425 UART: [art] SIG.S = F17D0E8E3D7BD3C908FA6C9B2746183C1202EDA8167D955AFF8C9D2B224C83D5683FABB1B3E76870626ECF240E505C46
2,769,593 UART: mbox::rt_entry...
2,769,965 UART: ____ _ _ _ ____ _____
2,770,749 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,771,549 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,772,317 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,773,085 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,773,853 UART: |_|
2,774,165 UART:
2,893,971 UART: [rt] Runtime listening for mailbox commands...
2,900,305 >>> mbox cmd response data (4360 bytes)
2,900,306 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,931,088 >>> mbox cmd response data (0 bytes)
2,931,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,207 UART:
2,931,223 UART: Running Caliptra ROM ...
2,931,631 UART:
2,931,773 UART: [state] CFI Enabled
2,934,413 UART: [state] LifecycleState = Unprovisioned
2,935,068 UART: [state] DebugLocked = No
2,935,796 UART: [state] WD Timer not started. Device not locked for debugging
2,936,974 UART: [kat] SHA2-256
3,740,524 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,744,628 UART: [kat] ++
3,744,780 UART: [kat] sha1
3,748,948 UART: [kat] SHA2-256
3,750,888 UART: [kat] SHA2-384
3,753,725 UART: [kat] SHA2-512-ACC
3,755,625 UART: [kat] ECC-384
3,765,176 UART: [kat] HMAC-384Kdf
3,769,876 UART: [kat] LMS
4,018,188 UART: [kat] --
4,019,220 UART: [update-reset] ++
5,378,155 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,379,126 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,534,341 >>> mbox cmd response: success
5,534,608 UART: [update-reset] Copying MAN_2 To MAN_1
5,542,622 UART: [update-reset Success] --
5,543,761 UART: [state] Locking Datavault
5,544,593 UART: [state] Locking PCR0, PCR1 and PCR31
5,545,197 UART: [state] Locking ICCM
5,545,699 UART: [exit] Launching FMC @ 0x40000130
5,551,029 UART:
5,551,045 UART: Running Caliptra FMC ...
5,551,453 UART:
5,551,596 UART: [state] CFI Enabled
5,640,653 UART: [art] Extend RT PCRs Done
5,641,081 UART: [art] Lock RT PCRs Done
5,642,150 UART: [art] Populate DV Done
5,650,379 UART: [fht] FMC Alias Private Key: 7
5,651,399 UART: [art] Derive CDI
5,651,679 UART: [art] Store in slot 0x4
5,737,546 UART: [art] Derive Key Pair
5,737,906 UART: [art] Store priv key in slot 0x5
5,751,220 UART: [art] Derive Key Pair - Done
5,765,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,653 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,418 UART: [art] PUB.X = A516EA48A53396DA58ED9FB7A64243308A18C565D9396D6F206D81F536B0CB4817109167F8E4F440E59B57D594693BE8
5,789,184 UART: [art] PUB.Y = F1F3F8C6BC4F7B6EF00C0D1CF75FB65CF5D7D69395F884627A6DCAB783B5BAC354410D64F57AB1916355E61CAFCE1BB4
5,796,147 UART: [art] SIG.R = 79E1E235346E9530770520083002AB430E6122A74D70D41BBB01213693CF9C56DB53E96ED1AB90E075328634E0BE92E9
5,802,894 UART: [art] SIG.S = 3044140484A1EAAB60D0D704505B338EE10A1BD19D01F75FB30CCD4720A064A84E37AA8437AAC7CA0062A17AC39AB84E
5,826,593 UART: Caliptra RT
5,826,936 UART: [state] CFI Enabled
5,893,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,894,664 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,925,450 UART: [rt]cmd =0x494e464f, len=4
5,929,038 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,311 ready_for_fw is high
1,059,311 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,216,370 >>> mbox cmd response: success
2,216,370 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,811 UART:
2,278,827 UART: Running Caliptra FMC ...
2,279,235 UART:
2,279,378 UART: [state] CFI Enabled
2,290,150 UART: [fht] FMC Alias Private Key: 7
2,408,908 UART: [art] Extend RT PCRs Done
2,409,336 UART: [art] Lock RT PCRs Done
2,410,976 UART: [art] Populate DV Done
2,419,447 UART: [fht] FMC Alias Private Key: 7
2,420,625 UART: [art] Derive CDI
2,420,905 UART: [art] Store in slot 0x4
2,507,032 UART: [art] Derive Key Pair
2,507,392 UART: [art] Store priv key in slot 0x5
2,521,416 UART: [art] Derive Key Pair - Done
2,536,187 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,338 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,103 UART: [art] PUB.X = 86166E4A3DF3A8F5A3CD6DD59679D7D325608D2BAE6A39FD0EF2EB709E60E03F163C497CDAB42C44FCB9AC830C4B0A79
2,558,884 UART: [art] PUB.Y = FA24F89BAA39951C0E019630B8B1EF9624CE29AFC4D551BBC71B9B126BAA16EB9DEC475C83DD7993085A282099490E8A
2,565,834 UART: [art] SIG.R = 1B63493D21246F3B02E03047D0A944E01AD722539F00D542AC03EC98AFEBC1ACB9F1AE69E9CFC2C764554A1F0F53C7D3
2,572,585 UART: [art] SIG.S = 5E53CAB05BFD9257E395104DBCB67BCFDBB273815FEBFC8E7EABEDB999556DD9FFCFAB349652A7E1C22B9065980B450C
2,596,119 UART: mbox::rt_entry...
2,596,491 UART: ____ _ _ _ ____ _____
2,597,275 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,075 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,843 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,611 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,379 UART: |_|
2,600,691 UART:
2,719,514 UART: [rt] Runtime listening for mailbox commands...
2,725,848 >>> mbox cmd response data (4360 bytes)
2,725,849 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,756,631 >>> mbox cmd response data (0 bytes)
2,756,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,245,562 >>> mbox cmd response: success
5,258,761 UART:
5,258,777 UART: Running Caliptra FMC ...
5,259,185 UART:
5,259,328 UART: [state] CFI Enabled
5,347,727 UART: [art] Extend RT PCRs Done
5,348,155 UART: [art] Lock RT PCRs Done
5,349,484 UART: [art] Populate DV Done
5,357,871 UART: [fht] FMC Alias Private Key: 7
5,358,961 UART: [art] Derive CDI
5,359,241 UART: [art] Store in slot 0x4
5,445,336 UART: [art] Derive Key Pair
5,445,696 UART: [art] Store priv key in slot 0x5
5,458,342 UART: [art] Derive Key Pair - Done
5,473,050 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,707 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,472 UART: [art] PUB.X = C4F0A1F620C23D9A41471D16A1E83D0ED984FA6D0AFA4EA3F27E226B2498463621E5B523D29F9C9C20E403161C182518
5,496,235 UART: [art] PUB.Y = 9A88595C29E9F78D6BE434C3166A99DA50A16E17F17E654AF7DF0211579BBF4B98EF927EA1225B598E9121381DAC659F
5,503,186 UART: [art] SIG.R = D7E7D894DADE9755CCCAC7F597DD82E83093FE43B896A292C60C04B058CFE9A6917FCC84856FDCA3BEB5ECD4B06F4F2A
5,509,976 UART: [art] SIG.S = C0F55EB767911EDBAB7C73E94B9B7CB52D3E77F52BEF1B75366DDAFE53597EBC500E630CD7EF53E0D46BFFF34DE6283E
5,533,468 UART: Caliptra RT
5,533,811 UART: [state] CFI Enabled
5,600,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,601,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,632,545 UART: [rt]cmd =0x494e464f, len=4
5,636,335 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,569 UART: [state] WD Timer not started. Device not locked for debugging
87,818 UART: [kat] SHA2-256
893,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,593 UART: [kat] ++
897,745 UART: [kat] sha1
902,023 UART: [kat] SHA2-256
903,963 UART: [kat] SHA2-384
906,664 UART: [kat] SHA2-512-ACC
908,565 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,238 UART: [kat] LMS
1,171,566 UART: [kat] --
1,172,555 UART: [cold-reset] ++
1,173,023 UART: [fht] FHT @ 0x50003400
1,175,576 UART: [idev] ++
1,175,744 UART: [idev] CDI.KEYID = 6
1,176,104 UART: [idev] SUBJECT.KEYID = 7
1,176,528 UART: [idev] UDS.KEYID = 0
1,176,873 ready_for_fw is high
1,176,873 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,776 UART: [idev] Erasing UDS.KEYID = 0
1,201,685 UART: [idev] Sha1 KeyId Algorithm
1,210,157 UART: [idev] --
1,211,199 UART: [ldev] ++
1,211,367 UART: [ldev] CDI.KEYID = 6
1,211,730 UART: [ldev] SUBJECT.KEYID = 5
1,212,156 UART: [ldev] AUTHORITY.KEYID = 7
1,212,619 UART: [ldev] FE.KEYID = 1
1,218,125 UART: [ldev] Erasing FE.KEYID = 1
1,244,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,197 UART: [ldev] --
1,283,536 UART: [fwproc] Wait for Commands...
1,284,150 UART: [fwproc] Recv command 0x46574c44
1,284,878 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,455 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,625 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,314 >>> mbox cmd response: success
2,365,314 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,454 UART: [afmc] ++
2,366,622 UART: [afmc] CDI.KEYID = 6
2,366,984 UART: [afmc] SUBJECT.KEYID = 7
2,367,409 UART: [afmc] AUTHORITY.KEYID = 5
2,402,974 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,419,547 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,295 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,004 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,431,887 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,437,588 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,338 UART: [afmc] --
2,446,404 UART: [cold-reset] --
2,447,394 UART: [state] Locking Datavault
2,448,557 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,161 UART: [state] Locking ICCM
2,449,581 UART: [exit] Launching FMC @ 0x40000130
2,454,911 UART:
2,454,927 UART: Running Caliptra FMC ...
2,455,335 UART:
2,455,389 UART: [state] CFI Enabled
2,465,901 UART: [fht] FMC Alias Private Key: 7
2,584,799 UART: [art] Extend RT PCRs Done
2,585,227 UART: [art] Lock RT PCRs Done
2,586,597 UART: [art] Populate DV Done
2,594,974 UART: [fht] FMC Alias Private Key: 7
2,595,994 UART: [art] Derive CDI
2,596,274 UART: [art] Store in slot 0x4
2,682,163 UART: [art] Derive Key Pair
2,682,523 UART: [art] Store priv key in slot 0x5
2,696,053 UART: [art] Derive Key Pair - Done
2,711,112 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,311 UART: [art] Erasing AUTHORITY.KEYID = 7
2,727,076 UART: [art] PUB.X = EF9B8950E5DD9BC98613AFDC18190EC36F9C310B966B84B48EDEBCA673931586363C7EC026DE3358C55E483C1C11C52E
2,733,850 UART: [art] PUB.Y = 0C73E2DE355ABB73DA0696CBD6696680DC514C9EE87E4E13DB08DA08341022180901D09DFF86760B0DF61D036A8B217A
2,740,779 UART: [art] SIG.R = B44CDCDB44FD8B3D4A40CB1F3DA22448554715F48E5F38DAA49D3782820751C3B4787C4635347277A4F3232C2E3FC759
2,747,548 UART: [art] SIG.S = 8E334C8EE6A78FFE2820A43309AA0514B116AE108081A475968D255949EAFBEF3C3D0CFBE19062E7980B42821E19A967
2,770,642 UART: mbox::rt_entry...
2,771,014 UART: ____ _ _ _ ____ _____
2,771,798 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,772,598 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,773,366 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,774,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,774,902 UART: |_|
2,775,214 UART:
2,893,863 UART: [rt] Runtime listening for mailbox commands...
2,900,197 >>> mbox cmd response data (4360 bytes)
2,900,198 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,980 >>> mbox cmd response data (0 bytes)
2,930,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,931,099 UART:
2,931,115 UART: Running Caliptra ROM ...
2,931,523 UART:
2,931,578 UART: [state] CFI Enabled
2,934,396 UART: [state] LifecycleState = Unprovisioned
2,935,051 UART: [state] DebugLocked = No
2,935,595 UART: [state] WD Timer not started. Device not locked for debugging
2,936,955 UART: [kat] SHA2-256
3,742,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,746,730 UART: [kat] ++
3,746,882 UART: [kat] sha1
3,751,004 UART: [kat] SHA2-256
3,752,944 UART: [kat] SHA2-384
3,755,741 UART: [kat] SHA2-512-ACC
3,757,641 UART: [kat] ECC-384
3,767,110 UART: [kat] HMAC-384Kdf
3,771,466 UART: [kat] LMS
4,019,794 UART: [kat] --
4,020,482 UART: [update-reset] ++
5,379,232 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,380,229 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,535,444 >>> mbox cmd response: success
5,535,635 UART: [update-reset] Copying MAN_2 To MAN_1
5,543,649 UART: [update-reset Success] --
5,544,842 UART: [state] Locking Datavault
5,545,742 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,346 UART: [state] Locking ICCM
5,546,856 UART: [exit] Launching FMC @ 0x40000130
5,552,186 UART:
5,552,202 UART: Running Caliptra FMC ...
5,552,610 UART:
5,552,664 UART: [state] CFI Enabled
5,641,551 UART: [art] Extend RT PCRs Done
5,641,979 UART: [art] Lock RT PCRs Done
5,643,202 UART: [art] Populate DV Done
5,651,355 UART: [fht] FMC Alias Private Key: 7
5,652,337 UART: [art] Derive CDI
5,652,617 UART: [art] Store in slot 0x4
5,738,390 UART: [art] Derive Key Pair
5,738,750 UART: [art] Store priv key in slot 0x5
5,751,816 UART: [art] Derive Key Pair - Done
5,766,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,781,801 UART: [art] Erasing AUTHORITY.KEYID = 7
5,782,566 UART: [art] PUB.X = B08AD56D921FEEC38DE2F64C39F32DA1B623907C19844A1CF1A8B765959A8741F04588EF9EEACBD822024588E5ED10CE
5,789,345 UART: [art] PUB.Y = 08D972F00B8BB7B3CAE43E063EFE2BCA92C5B33D325338C60068CA51075D10DC77EF128D42B204180FC4FEDC28F7F0D0
5,796,269 UART: [art] SIG.R = A5FE2F2C88E22F82B39AA33210F33EEFC646D67C30969570075C7EF9B8B6833ACA469FDC70B410AB42DEF1CCEB8B7BCC
5,803,058 UART: [art] SIG.S = E27173FD0180F580074568DCFE52BA5057A28EBE7A0A402E1B00DDE6A58CEB2044332336C4CF886D7485CD1D35BB9E92
5,826,623 UART: Caliptra RT
5,826,874 UART: [state] CFI Enabled
5,893,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,895,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,925,766 UART: [rt]cmd =0x494e464f, len=4
5,929,526 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,037 ready_for_fw is high
1,061,037 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,215,771 >>> mbox cmd response: success
2,215,771 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,277,008 UART:
2,277,024 UART: Running Caliptra FMC ...
2,277,432 UART:
2,277,486 UART: [state] CFI Enabled
2,287,914 UART: [fht] FMC Alias Private Key: 7
2,407,114 UART: [art] Extend RT PCRs Done
2,407,542 UART: [art] Lock RT PCRs Done
2,409,264 UART: [art] Populate DV Done
2,417,511 UART: [fht] FMC Alias Private Key: 7
2,418,651 UART: [art] Derive CDI
2,418,931 UART: [art] Store in slot 0x4
2,504,978 UART: [art] Derive Key Pair
2,505,338 UART: [art] Store priv key in slot 0x5
2,518,002 UART: [art] Derive Key Pair - Done
2,532,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,548,180 UART: [art] Erasing AUTHORITY.KEYID = 7
2,548,945 UART: [art] PUB.X = CF9B8C5CCB53913EBB23E9417A6888CBFABFE02E0200670F2D43E93FE32C8FE4E3D6669537FEB14DA5F16E99035C8480
2,555,698 UART: [art] PUB.Y = E2E9A223467F947AF1CCA585F64D397D930B7E63A48C89122BBBDA4F04F83D1441DFFC530998D91F9E83C2C91DB7F8E3
2,562,651 UART: [art] SIG.R = 34890D28C651025A2D7A29846FEC979614A49FE18DEDCEAB3035F3F568F96B116E6B107536EA155687B8000CDA7FAEE5
2,569,396 UART: [art] SIG.S = 5104E930C14493073AE1FA594E1CF456A62FD8F233981AB7F431506F66408B47AEE9B229AC7814FA9F1C3ECD6E40AD87
2,592,986 UART: mbox::rt_entry...
2,593,358 UART: ____ _ _ _ ____ _____
2,594,142 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,594,942 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,595,710 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,596,478 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,597,246 UART: |_|
2,597,558 UART:
2,716,423 UART: [rt] Runtime listening for mailbox commands...
2,722,757 >>> mbox cmd response data (4360 bytes)
2,722,758 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,753,540 >>> mbox cmd response data (0 bytes)
2,753,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,242,191 >>> mbox cmd response: success
5,255,476 UART:
5,255,492 UART: Running Caliptra FMC ...
5,255,900 UART:
5,255,954 UART: [state] CFI Enabled
5,345,313 UART: [art] Extend RT PCRs Done
5,345,741 UART: [art] Lock RT PCRs Done
5,347,132 UART: [art] Populate DV Done
5,355,085 UART: [fht] FMC Alias Private Key: 7
5,356,133 UART: [art] Derive CDI
5,356,413 UART: [art] Store in slot 0x4
5,442,132 UART: [art] Derive Key Pair
5,442,492 UART: [art] Store priv key in slot 0x5
5,455,430 UART: [art] Derive Key Pair - Done
5,470,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,486,002 UART: [art] Erasing AUTHORITY.KEYID = 7
5,486,767 UART: [art] PUB.X = 38C5F98A64C0A0E30B58CEE4DB2B76337019DAB17BF1AC34DC9AECA8FB16DFA3A7B5C13B2527ED2F33D329A1AB3C0848
5,493,555 UART: [art] PUB.Y = 83060868BFCB030A4D99DAF23529BD7E202AB0D09EE8A38F7AE3E74226E59395ABDB2E84CA7379D23DE225456B07F5E2
5,500,500 UART: [art] SIG.R = 9ECFD0A8BA4B9FCA2658F0654629272739F455E560B2FCD08E5B1B53ACEB7B0F504E702953910D5DEE6A46C525FC47E7
5,507,276 UART: [art] SIG.S = CF821563A2EA4946E4F5E0C72E86A8653064AB394BE3EB9A20AE42AFEB03B84012A96F88B4C42CA438B93FD1A59C6CDC
5,530,927 UART: Caliptra RT
5,531,178 UART: [state] CFI Enabled
5,596,958 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,598,486 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,629,084 UART: [rt]cmd =0x494e464f, len=4
5,632,812 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,357 UART: [state] LifecycleState = Unprovisioned
86,012 UART: [state] DebugLocked = No
86,530 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,683 UART: [kat] SHA2-512-ACC
908,584 UART: [kat] ECC-384
918,481 UART: [kat] HMAC-384Kdf
923,083 UART: [kat] LMS
1,171,411 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,588 UART: [fht] FHT @ 0x50003400
1,175,295 UART: [idev] ++
1,175,463 UART: [idev] CDI.KEYID = 6
1,175,823 UART: [idev] SUBJECT.KEYID = 7
1,176,247 UART: [idev] UDS.KEYID = 0
1,176,592 ready_for_fw is high
1,176,592 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,431 UART: [idev] Erasing UDS.KEYID = 0
1,201,800 UART: [idev] Sha1 KeyId Algorithm
1,210,166 UART: [idev] --
1,211,226 UART: [ldev] ++
1,211,394 UART: [ldev] CDI.KEYID = 6
1,211,757 UART: [ldev] SUBJECT.KEYID = 5
1,212,183 UART: [ldev] AUTHORITY.KEYID = 7
1,212,646 UART: [ldev] FE.KEYID = 1
1,218,066 UART: [ldev] Erasing FE.KEYID = 1
1,244,749 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,780 UART: [ldev] --
1,284,075 UART: [fwproc] Wait for Commands...
1,284,701 UART: [fwproc] Recv command 0x46574c44
1,285,429 UART: [fwproc] Recv'd Img size: 82832 bytes
2,220,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,247,466 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,278,636 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,365,345 >>> mbox cmd response: success
2,365,345 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,366,555 UART: [afmc] ++
2,366,723 UART: [afmc] CDI.KEYID = 6
2,367,085 UART: [afmc] SUBJECT.KEYID = 7
2,367,510 UART: [afmc] AUTHORITY.KEYID = 5
2,403,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,420,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,420,814 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,426,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,432,406 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,438,107 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,445,845 UART: [afmc] --
2,446,801 UART: [cold-reset] --
2,447,831 UART: [state] Locking Datavault
2,449,012 UART: [state] Locking PCR0, PCR1 and PCR31
2,449,616 UART: [state] Locking ICCM
2,450,124 UART: [exit] Launching FMC @ 0x40000130
2,455,454 UART:
2,455,470 UART: Running Caliptra FMC ...
2,455,878 UART:
2,456,021 UART: [state] CFI Enabled
2,466,879 UART: [fht] FMC Alias Private Key: 7
2,586,443 UART: [art] Extend RT PCRs Done
2,586,871 UART: [art] Lock RT PCRs Done
2,588,273 UART: [art] Populate DV Done
2,596,474 UART: [fht] FMC Alias Private Key: 7
2,597,566 UART: [art] Derive CDI
2,597,846 UART: [art] Store in slot 0x4
2,683,239 UART: [art] Derive Key Pair
2,683,599 UART: [art] Store priv key in slot 0x5
2,696,849 UART: [art] Derive Key Pair - Done
2,711,544 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,726,899 UART: [art] Erasing AUTHORITY.KEYID = 7
2,727,664 UART: [art] PUB.X = 97D0830D56B20621010A8F3923BEC2ED6382BB22A6E058B2CF6FDA2C71C3623F7603D6FBD312EDA875284F2B4A3D4E35
2,734,427 UART: [art] PUB.Y = 6D74FC6A98C26E5554F6079F7553940670B8188C9884CA71C73232325E9FB6FAAFAA658650B9AE15115BF26DC5FC4833
2,741,371 UART: [art] SIG.R = 26C3CABE4C8536ED90F604E3ED2955B35D4668DA9E6140E7587374466A760963437D043612585A8114002D4E80CEB061
2,748,100 UART: [art] SIG.S = D90EEB3176E0AEF6094AE75F7A064ABA923DAD236CDB6CDD895B4CCBDF96337371846C0B3259E7C835F288FC997E4212
2,771,590 UART: mbox::rt_entry...
2,771,962 UART: ____ _ _ _ ____ _____
2,772,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,773,546 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,774,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,775,082 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,775,850 UART: |_|
2,776,162 UART:
2,893,568 UART: [rt] Runtime listening for mailbox commands...
2,899,902 >>> mbox cmd response data (4360 bytes)
2,899,903 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,930,685 >>> mbox cmd response data (0 bytes)
2,930,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,930,804 UART:
2,930,820 UART: Running Caliptra ROM ...
2,931,228 UART:
2,931,370 UART: [state] CFI Enabled
2,934,006 UART: [state] LifecycleState = Unprovisioned
2,934,661 UART: [state] DebugLocked = No
2,935,263 UART: [state] WD Timer not started. Device not locked for debugging
2,936,521 UART: [kat] SHA2-256
3,742,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,746,296 UART: [kat] ++
3,746,448 UART: [kat] sha1
3,750,688 UART: [kat] SHA2-256
3,752,628 UART: [kat] SHA2-384
3,755,141 UART: [kat] SHA2-512-ACC
3,757,041 UART: [kat] ECC-384
3,766,910 UART: [kat] HMAC-384Kdf
3,771,442 UART: [kat] LMS
4,019,770 UART: [kat] --
4,020,990 UART: [update-reset] ++
5,379,784 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,380,817 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,536,032 >>> mbox cmd response: success
5,536,229 UART: [update-reset] Copying MAN_2 To MAN_1
5,544,243 UART: [update-reset Success] --
5,545,266 UART: [state] Locking Datavault
5,546,016 UART: [state] Locking PCR0, PCR1 and PCR31
5,546,620 UART: [state] Locking ICCM
5,547,046 UART: [exit] Launching FMC @ 0x40000130
5,552,376 UART:
5,552,392 UART: Running Caliptra FMC ...
5,552,800 UART:
5,552,943 UART: [state] CFI Enabled
5,641,606 UART: [art] Extend RT PCRs Done
5,642,034 UART: [art] Lock RT PCRs Done
5,643,345 UART: [art] Populate DV Done
5,651,610 UART: [fht] FMC Alias Private Key: 7
5,652,632 UART: [art] Derive CDI
5,652,912 UART: [art] Store in slot 0x4
5,738,497 UART: [art] Derive Key Pair
5,738,857 UART: [art] Store priv key in slot 0x5
5,752,369 UART: [art] Derive Key Pair - Done
5,766,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,782,982 UART: [art] Erasing AUTHORITY.KEYID = 7
5,783,747 UART: [art] PUB.X = 00C59B3F77310D311E83BADC5A78CB8F13206407FC1933FB30E7C89C68EC834BB3C76333A0A8AFC5CBDB5725D63E3559
5,790,499 UART: [art] PUB.Y = 443201B4B7DC5E50F30DFA5B7A82327ECDDAB169D7AB76646FFD7396DA8870AD85217FCC36FABAB8A2A8510941F23EEE
5,797,460 UART: [art] SIG.R = 29D3EB5B20D3C8C940769FD037197A5CB1317AD367A676554835DD4226A7EDE545AAAA44BC3B0571BB9493E8678D69B5
5,804,231 UART: [art] SIG.S = B5543530ADAAAF5A94B4CDCAB64B51CEED75CC131F96D9FA0F549D29CA08D8E3821CCA3DD6CD54060BFB813FAE495B4C
5,828,541 UART: Caliptra RT
5,828,884 UART: [state] CFI Enabled
5,895,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,896,647 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,927,163 UART: [rt]cmd =0x494e464f, len=4
5,930,767 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 ready_for_fw is high
1,061,062 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,218,450 >>> mbox cmd response: success
2,218,450 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,280,721 UART:
2,280,737 UART: Running Caliptra FMC ...
2,281,145 UART:
2,281,288 UART: [state] CFI Enabled
2,291,842 UART: [fht] FMC Alias Private Key: 7
2,410,544 UART: [art] Extend RT PCRs Done
2,410,972 UART: [art] Lock RT PCRs Done
2,412,306 UART: [art] Populate DV Done
2,420,535 UART: [fht] FMC Alias Private Key: 7
2,421,471 UART: [art] Derive CDI
2,421,751 UART: [art] Store in slot 0x4
2,507,568 UART: [art] Derive Key Pair
2,507,928 UART: [art] Store priv key in slot 0x5
2,521,850 UART: [art] Derive Key Pair - Done
2,536,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,552,718 UART: [art] Erasing AUTHORITY.KEYID = 7
2,553,483 UART: [art] PUB.X = EA72FAD7A26B97F27F4818BD42C91FEAD5CEB1585BAFC04A551CCCE12196ACE86833164F814586BD329E7BA6071A9581
2,560,264 UART: [art] PUB.Y = 90C753FE573CF24CBD22E9A758BA001B0EDF90C3341DEC1AF8BB8FDBCE643ECB97C83AB53E70A593B9501CC8E2F517DF
2,567,215 UART: [art] SIG.R = 2621EB235AEF16EB98D178ABC019D16C6282186B9E5F65DBD0E28A6885F47D130A4A89DA5271382C443CC61213FB49C2
2,573,986 UART: [art] SIG.S = 51F68E6B3481F609BE205013A665C0F39ABC3AE53B06F841B77F95AE1C6D9D452A203473C4C9C3F59217CEC974676DEB
2,597,494 UART: mbox::rt_entry...
2,597,866 UART: ____ _ _ _ ____ _____
2,598,650 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,599,450 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,600,218 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,986 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,754 UART: |_|
2,602,066 UART:
2,720,671 UART: [rt] Runtime listening for mailbox commands...
2,727,005 >>> mbox cmd response data (4360 bytes)
2,727,006 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,757,788 >>> mbox cmd response data (0 bytes)
2,757,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,245,734 >>> mbox cmd response: success
5,258,729 UART:
5,258,745 UART: Running Caliptra FMC ...
5,259,153 UART:
5,259,296 UART: [state] CFI Enabled
5,348,459 UART: [art] Extend RT PCRs Done
5,348,887 UART: [art] Lock RT PCRs Done
5,350,008 UART: [art] Populate DV Done
5,358,283 UART: [fht] FMC Alias Private Key: 7
5,359,249 UART: [art] Derive CDI
5,359,529 UART: [art] Store in slot 0x4
5,445,268 UART: [art] Derive Key Pair
5,445,628 UART: [art] Store priv key in slot 0x5
5,459,638 UART: [art] Derive Key Pair - Done
5,474,497 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,489,998 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,763 UART: [art] PUB.X = 2F40ECE2D1ECD3A5094BC6306BCCFFC40DAA62E227F167809C70D9A52515488345312688689667E0566B7856F2954A34
5,497,523 UART: [art] PUB.Y = E42FD685E7BEDA79823432640077B0B4FAF5419C144C2FA61474F756F31ED51346002F31DF9E8367ACCB9BCB8D90C50F
5,504,434 UART: [art] SIG.R = E6D6831A8C4017C2F918C54B1C63AEA738075D1777C5EC54D00C4C2E59B4067AE1D458316CB1F96FF7EFB6FBC8DDF312
5,511,209 UART: [art] SIG.S = 1889C06124660DF2F9D126F054FCB25E57AD0E88E3D3DBF0B89A0956FCEB7A3863D547F1C3C196BB722989670520A384
5,534,639 UART: Caliptra RT
5,534,982 UART: [state] CFI Enabled
5,602,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,604,147 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,634,609 UART: [rt]cmd =0x494e464f, len=4
5,638,299 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_illegal_state ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,009 UART:
192,370 UART: Running Caliptra ROM ...
193,562 UART:
193,716 UART: [state] CFI Enabled
263,950 UART: [state] LifecycleState = Unprovisioned
265,855 UART: [state] DebugLocked = No
267,186 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,713 UART: [kat] SHA2-256
441,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,987 UART: [kat] ++
452,437 UART: [kat] sha1
463,099 UART: [kat] SHA2-256
465,835 UART: [kat] SHA2-384
472,398 UART: [kat] SHA2-512-ACC
474,767 UART: [kat] ECC-384
2,768,796 UART: [kat] HMAC-384Kdf
2,800,155 UART: [kat] LMS
3,990,507 UART: [kat] --
3,994,584 UART: [cold-reset] ++
3,996,730 UART: [fht] Storing FHT @ 0x50003400
4,007,301 UART: [idev] ++
4,007,916 UART: [idev] CDI.KEYID = 6
4,008,818 UART: [idev] SUBJECT.KEYID = 7
4,010,098 UART: [idev] UDS.KEYID = 0
4,011,103 ready_for_fw is high
4,011,303 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,115,609 UART: [idev] Erasing UDS.KEYID = 0
7,346,594 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,137 UART: [idev] --
7,372,005 UART: [ldev] ++
7,372,594 UART: [ldev] CDI.KEYID = 6
7,373,508 UART: [ldev] SUBJECT.KEYID = 5
7,374,720 UART: [ldev] AUTHORITY.KEYID = 7
7,376,005 UART: [ldev] FE.KEYID = 1
7,423,009 UART: [ldev] Erasing FE.KEYID = 1
10,759,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,627 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,330 UART: [ldev] --
13,136,528 UART: [fwproc] Waiting for Commands...
13,138,839 UART: [fwproc] Received command 0x46574c44
13,141,018 UART: [fwproc] Received Image of size 82832 bytes
16,811,092 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,884,076 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,957,209 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,160,351 >>> mbox cmd response: success
17,161,562 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,164,092 UART: [afmc] ++
17,164,728 UART: [afmc] CDI.KEYID = 6
17,165,616 UART: [afmc] SUBJECT.KEYID = 7
17,166,825 UART: [afmc] AUTHORITY.KEYID = 5
20,540,656 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,835,861 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,838,080 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,852,555 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,867,282 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
22,881,676 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
22,902,825 UART: [afmc] --
22,906,439 UART: [cold-reset] --
22,909,871 UART: [state] Locking Datavault
22,916,252 UART: [state] Locking PCR0, PCR1 and PCR31
22,918,004 UART: [state] Locking ICCM
22,920,160 UART: [exit] Launching FMC @ 0x40000130
22,928,562 UART:
22,928,802 UART: Running Caliptra FMC ...
22,929,901 UART:
22,930,056 UART: [state] CFI Enabled
22,997,574 UART: [fht] FMC Alias Private Key: 7
25,337,709 UART: [art] Extend RT PCRs Done
25,338,949 UART: [art] Lock RT PCRs Done
25,340,821 UART: [art] Populate DV Done
25,346,282 UART: [fht] FMC Alias Private Key: 7
25,347,762 UART: [art] Derive CDI
25,348,493 UART: [art] Store in slot 0x4
25,405,884 UART: [art] Derive Key Pair
25,406,931 UART: [art] Store priv key in slot 0x5
28,699,491 UART: [art] Derive Key Pair - Done
28,712,443 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,000,880 UART: [art] Erasing AUTHORITY.KEYID = 7
31,002,395 UART: [art] PUB.X = C1E679B0A9FBB4D7EEBE4E37DCEA8F62695264B3438DB9AA183B6B2B4B9C0EEC6EC2BB2DA97D7CFB595FFA8959EDEF67
31,009,701 UART: [art] PUB.Y = 8E7B797B3ABC39E40DF428A220DF79D050E27963B856AD30F9206D1F186698E8EDB05675D735E44ACDADFC2B71D5971B
31,016,991 UART: [art] SIG.R = 77858F5DC6967CFAD2EE5491E9F53ADFB5818DA3A2BFA2047961A4594F3A9C2701819A435BA5E92BB5308C992108AE36
31,024,380 UART: [art] SIG.S = 3E419101E11B1F644F00A56F465C93E410BF5C20244A41382A34FA29B5F3F58883779A8BE4B6E8C899E0ED72CF6D7D2C
32,329,531 UART: mbox::rt_entry...
32,330,494 UART: ____ _ _ _ ____ _____
32,332,444 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,334,454 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,336,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,338,241 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,340,134 UART: |_|
32,341,019 UART:
32,472,551 UART: [rt] Runtime listening for mailbox commands...
32,479,767 >>> mbox cmd response data (4360 bytes)
32,500,638 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,545,011 >>> mbox cmd response data (0 bytes)
34,626,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,776,325 UART:
34,776,697 UART: Running Caliptra ROM ...
34,777,757 UART:
34,777,910 UART: [state] CFI Enabled
34,843,615 UART: [state] LifecycleState = Unprovisioned
34,845,555 UART: [state] DebugLocked = No
34,848,374 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,853,112 UART: [kat] SHA2-256
35,022,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,033,333 UART: [kat] ++
35,033,795 UART: [kat] sha1
35,044,355 UART: [kat] SHA2-256
35,047,006 UART: [kat] SHA2-384
35,051,371 UART: [kat] SHA2-512-ACC
35,053,729 UART: [kat] ECC-384
37,343,017 UART: [kat] HMAC-384Kdf
37,374,617 UART: [kat] LMS
38,564,972 UART: [kat] --
38,570,061 UART: [update-reset] ++
42,771,561 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,775,723 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,173,501 >>> mbox cmd response: success
43,178,033 UART: [update-reset] Copying MAN_2 To MAN_1
43,196,184 UART: [update-reset Success] --
43,200,430 UART: [state] Locking Datavault
43,202,893 UART: [state] Locking PCR0, PCR1 and PCR31
43,204,656 UART: [state] Locking ICCM
43,206,242 UART: [exit] Launching FMC @ 0x40000130
43,214,633 UART:
43,214,884 UART: Running Caliptra FMC ...
43,215,989 UART:
43,216,146 UART: [state] CFI Enabled
43,314,832 UART: [art] Extend RT PCRs Done
43,316,022 UART: [art] Lock RT PCRs Done
43,317,593 UART: [art] Populate DV Done
43,322,946 UART: [fht] FMC Alias Private Key: 7
43,324,643 UART: [art] Derive CDI
43,325,454 UART: [art] Store in slot 0x4
43,384,423 UART: [art] Derive Key Pair
43,385,466 UART: [art] Store priv key in slot 0x5
46,676,920 UART: [art] Derive Key Pair - Done
46,689,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,978,530 UART: [art] Erasing AUTHORITY.KEYID = 7
48,980,077 UART: [art] PUB.X = E69EC56FB60F1C4CB33068913803963CBFF348F632381C38B66D26A3BCA4334822E33229756118CD4A28FC8BE2601F1C
48,987,280 UART: [art] PUB.Y = 27D349E9AEB5E6AB876CB66D1AF0BF9D0F6F03BF17EC466F6FC7C1313BC83CCDCE3405C3E31A6E3B8A42761E921D3B41
48,994,562 UART: [art] SIG.R = 2840C81F70AC157FA556E5DBD63364F372211F301B5C5AA1734C827FA3130255C1B942564A69C861BFD7C24C9C88B63C
49,001,948 UART: [art] SIG.S = 90F8AF9C0236E29BA12AAB3867F3448AD611279D477FC17F9E52748AC4E658FE1413522942C524F6713FC6A5C621C587
50,307,190 UART: Caliptra RT
50,307,896 UART: [state] CFI Enabled
54,077,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,078,789 UART: [rt] RT listening for mailbox commands...
54,110,028 UART: [rt]cmd =0x494e464f, len=4
54,114,506 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,185 writing to cptra_bootfsm_go
3,810,711 ready_for_fw is high
3,811,108 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,261,515 >>> mbox cmd response: success
17,263,331 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
22,947,766 UART:
22,948,170 UART: Running Caliptra FMC ...
22,949,273 UART:
22,949,432 UART: [state] CFI Enabled
23,020,086 UART: [fht] FMC Alias Private Key: 7
25,360,641 UART: [art] Extend RT PCRs Done
25,361,863 UART: [art] Lock RT PCRs Done
25,363,683 UART: [art] Populate DV Done
25,369,101 UART: [fht] FMC Alias Private Key: 7
25,370,704 UART: [art] Derive CDI
25,371,525 UART: [art] Store in slot 0x4
25,428,700 UART: [art] Derive Key Pair
25,429,700 UART: [art] Store priv key in slot 0x5
28,722,342 UART: [art] Derive Key Pair - Done
28,735,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,023,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,024,827 UART: [art] PUB.X = EFCABFF7B011F4FAA0AE47915A5F7C0074A141F5BB6CE1E53F4CEB2B305E0D742E64AB865D8D09A90CB34F1BE91FF46A
31,032,081 UART: [art] PUB.Y = 14F9F504A06AFE4D242A43D305F173C9162AF87A842862D1174E9EF8B082DF3E8E4F83DC03F6A0F359A0C941153D9921
31,039,327 UART: [art] SIG.R = B000196E69F8360B7263FC6F44F75E67762D80404360279D2D0B1400C8B7CEDBCF2F3E83CD5D7045C7675392A4F28390
31,046,704 UART: [art] SIG.S = F0E788B386DEBEA275ABA2B8F32393E9A791DD8F772DA134CCE74FAA72FDED8D5B835B85FE6A945A24D948FAE0202C51
32,351,404 UART: mbox::rt_entry...
32,352,359 UART: ____ _ _ _ ____ _____
32,354,344 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,356,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,358,297 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,360,285 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,362,215 UART: |_|
32,363,201 UART:
32,494,406 UART: [rt] Runtime listening for mailbox commands...
32,501,635 >>> mbox cmd response data (4360 bytes)
32,522,283 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,566,661 >>> mbox cmd response data (0 bytes)
34,646,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,474,329 >>> mbox cmd response: success
43,507,236 UART:
43,507,543 UART: Running Caliptra FMC ...
43,508,690 UART:
43,508,859 UART: [state] CFI Enabled
43,596,546 UART: [art] Extend RT PCRs Done
43,597,739 UART: [art] Lock RT PCRs Done
43,599,093 UART: [art] Populate DV Done
43,604,512 UART: [fht] FMC Alias Private Key: 7
43,606,091 UART: [art] Derive CDI
43,606,918 UART: [art] Store in slot 0x4
43,666,064 UART: [art] Derive Key Pair
43,667,071 UART: [art] Store priv key in slot 0x5
46,959,650 UART: [art] Derive Key Pair - Done
46,972,520 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,260,422 UART: [art] Erasing AUTHORITY.KEYID = 7
49,261,925 UART: [art] PUB.X = 1B403A3368FEDC8FD944DB3E1AF92E5AC683F6BD2229D83795AA4E98F5ED9C9934A647B508368664AA8EC5EB777D5522
49,269,229 UART: [art] PUB.Y = D153F584D353EB27408EEDB27D63C69E29BBFBCFA19793D1F9B68945465C9320E6FA321E0C1CFD90B46000FB106A0373
49,276,464 UART: [art] SIG.R = A49177B1AD404730ED837D699E87339E05EA9298C3E23F279CBA33426A8C425DD9B98F6E210D660B74929A9ACC15F1B9
49,283,908 UART: [art] SIG.S = 919B236E6E51154026ECD1C6AC1CF1CA922F95AD179179DCD7ED2D56CBAA437B3885DE8B3DF6C4590B8073B179358B31
50,588,558 UART: Caliptra RT
50,589,261 UART: [state] CFI Enabled
54,359,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,360,916 UART: [rt] RT listening for mailbox commands...
54,392,469 UART: [rt]cmd =0x494e464f, len=4
54,396,772 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,642 UART:
192,999 UART: Running Caliptra ROM ...
194,172 UART:
603,705 UART: [state] CFI Enabled
619,614 UART: [state] LifecycleState = Unprovisioned
621,526 UART: [state] DebugLocked = No
623,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,979 UART: [kat] SHA2-256
798,716 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,304 UART: [kat] ++
809,836 UART: [kat] sha1
820,284 UART: [kat] SHA2-256
823,004 UART: [kat] SHA2-384
830,057 UART: [kat] SHA2-512-ACC
832,421 UART: [kat] ECC-384
3,116,191 UART: [kat] HMAC-384Kdf
3,127,603 UART: [kat] LMS
4,317,658 UART: [kat] --
4,321,028 UART: [cold-reset] ++
4,322,686 UART: [fht] Storing FHT @ 0x50003400
4,332,597 UART: [idev] ++
4,333,153 UART: [idev] CDI.KEYID = 6
4,334,141 UART: [idev] SUBJECT.KEYID = 7
4,335,247 UART: [idev] UDS.KEYID = 0
4,336,363 ready_for_fw is high
4,336,582 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,440,723 UART: [idev] Erasing UDS.KEYID = 0
7,625,973 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,673 UART: [idev] --
7,652,259 UART: [ldev] ++
7,653,020 UART: [ldev] CDI.KEYID = 6
7,653,942 UART: [ldev] SUBJECT.KEYID = 5
7,655,002 UART: [ldev] AUTHORITY.KEYID = 7
7,656,290 UART: [ldev] FE.KEYID = 1
7,667,640 UART: [ldev] Erasing FE.KEYID = 1
10,954,676 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,760 UART: [ldev] --
13,314,418 UART: [fwproc] Waiting for Commands...
13,316,504 UART: [fwproc] Received command 0x46574c44
13,318,678 UART: [fwproc] Received Image of size 82832 bytes
16,996,558 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,072,457 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,145,630 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,348,971 >>> mbox cmd response: success
17,349,474 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,352,248 UART: [afmc] ++
17,352,874 UART: [afmc] CDI.KEYID = 6
17,353,783 UART: [afmc] SUBJECT.KEYID = 7
17,355,049 UART: [afmc] AUTHORITY.KEYID = 5
20,667,717 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,962,747 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,965,064 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
22,979,423 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
22,994,195 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,008,581 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,029,803 UART: [afmc] --
23,034,062 UART: [cold-reset] --
23,036,630 UART: [state] Locking Datavault
23,043,174 UART: [state] Locking PCR0, PCR1 and PCR31
23,044,926 UART: [state] Locking ICCM
23,046,688 UART: [exit] Launching FMC @ 0x40000130
23,055,088 UART:
23,055,327 UART: Running Caliptra FMC ...
23,056,422 UART:
23,056,580 UART: [state] CFI Enabled
23,064,676 UART: [fht] FMC Alias Private Key: 7
25,404,533 UART: [art] Extend RT PCRs Done
25,405,758 UART: [art] Lock RT PCRs Done
25,407,184 UART: [art] Populate DV Done
25,412,321 UART: [fht] FMC Alias Private Key: 7
25,414,004 UART: [art] Derive CDI
25,414,750 UART: [art] Store in slot 0x4
25,457,440 UART: [art] Derive Key Pair
25,458,431 UART: [art] Store priv key in slot 0x5
28,700,579 UART: [art] Derive Key Pair - Done
28,713,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,993,002 UART: [art] Erasing AUTHORITY.KEYID = 7
30,994,514 UART: [art] PUB.X = 660086484009BB0E741AF65A25C61D74B59797AC2FE76235E8C18338A012A69C192425FDF4E625AD5841AD830A4B34DE
31,001,752 UART: [art] PUB.Y = 8135BA474CA357F3CA1784B7C791BF90DB718D59F6820580C59C3742F839818520996BC0D91374BF82884462A6717DCB
31,008,976 UART: [art] SIG.R = AF49D608EE551DA0B10E54E5DD4B0B5B2CE6192B9C3E28DA9FBE131BDAC730D6935320ED559199B9775BE93E211A162B
31,016,398 UART: [art] SIG.S = 145BFA7ECD770530612B554F9D65D1B4E054FEB6D85B82EF1C24B54340DB06AB3F9263AB35F262F6ED3D0DDC2EFB697F
32,322,467 UART: mbox::rt_entry...
32,323,403 UART: ____ _ _ _ ____ _____
32,325,384 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,327,385 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,329,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,331,228 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,333,146 UART: |_|
32,333,946 UART:
32,464,902 UART: [rt] Runtime listening for mailbox commands...
32,472,122 >>> mbox cmd response data (4360 bytes)
32,492,947 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,537,351 >>> mbox cmd response data (0 bytes)
34,624,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,774,612 UART:
34,774,989 UART: Running Caliptra ROM ...
34,776,063 UART:
34,776,225 UART: [state] CFI Enabled
34,789,147 UART: [state] LifecycleState = Unprovisioned
34,791,030 UART: [state] DebugLocked = No
34,792,409 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
34,797,189 UART: [kat] SHA2-256
34,966,912 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
34,977,452 UART: [kat] ++
34,977,936 UART: [kat] sha1
34,988,168 UART: [kat] SHA2-256
34,990,861 UART: [kat] SHA2-384
34,997,226 UART: [kat] SHA2-512-ACC
34,999,564 UART: [kat] ECC-384
37,283,276 UART: [kat] HMAC-384Kdf
37,296,424 UART: [kat] LMS
38,486,456 UART: [kat] --
38,491,916 UART: [update-reset] ++
42,690,441 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,694,485 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
43,092,247 >>> mbox cmd response: success
43,097,090 UART: [update-reset] Copying MAN_2 To MAN_1
43,115,524 UART: [update-reset Success] --
43,119,386 UART: [state] Locking Datavault
43,122,794 UART: [state] Locking PCR0, PCR1 and PCR31
43,124,558 UART: [state] Locking ICCM
43,127,224 UART: [exit] Launching FMC @ 0x40000130
43,135,607 UART:
43,135,837 UART: Running Caliptra FMC ...
43,136,931 UART:
43,137,086 UART: [state] CFI Enabled
43,181,585 UART: [art] Extend RT PCRs Done
43,182,775 UART: [art] Lock RT PCRs Done
43,184,444 UART: [art] Populate DV Done
43,190,113 UART: [fht] FMC Alias Private Key: 7
43,191,823 UART: [art] Derive CDI
43,192,632 UART: [art] Store in slot 0x4
43,235,000 UART: [art] Derive Key Pair
43,235,989 UART: [art] Store priv key in slot 0x5
46,478,164 UART: [art] Derive Key Pair - Done
46,491,338 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,771,627 UART: [art] Erasing AUTHORITY.KEYID = 7
48,773,266 UART: [art] PUB.X = 6D28A49E660258E0BB85DEA8C02B612E7C7BD9367D477E51536953A77A1B44CB92A97B1F4A36C6FE41B236B03E1BA572
48,780,366 UART: [art] PUB.Y = 238C3A20DCA472756982B7947BAEFFAB7BD50A919271B3E9CB983BC27BDA792B74ADF751CAD063ACEF615AF797710490
48,787,652 UART: [art] SIG.R = DD356F13CA62A696CFBAFAEAD34257296CA110603CE51509BF2E69C2C9D4BE44D35AE4635B19B962F297DCF16915CD49
48,795,090 UART: [art] SIG.S = AC13DE4DC08EE407A1029D31F871F23445D2AF213934259FD758EACC17B03AE5D705969BCC0DE71D936D957EA9C2CBE1
50,099,906 UART: Caliptra RT
50,100,627 UART: [state] CFI Enabled
53,769,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
53,770,967 UART: [rt] RT listening for mailbox commands...
53,802,412 UART: [rt]cmd =0x494e464f, len=4
53,806,646 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,152 writing to cptra_bootfsm_go
4,128,332 ready_for_fw is high
4,128,744 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,425,302 >>> mbox cmd response: success
17,426,433 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
23,067,562 UART:
23,067,977 UART: Running Caliptra FMC ...
23,069,141 UART:
23,069,295 UART: [state] CFI Enabled
23,077,139 UART: [fht] FMC Alias Private Key: 7
25,416,841 UART: [art] Extend RT PCRs Done
25,418,067 UART: [art] Lock RT PCRs Done
25,419,902 UART: [art] Populate DV Done
25,425,370 UART: [fht] FMC Alias Private Key: 7
25,426,850 UART: [art] Derive CDI
25,427,605 UART: [art] Store in slot 0x4
25,470,510 UART: [art] Derive Key Pair
25,471,492 UART: [art] Store priv key in slot 0x5
28,713,779 UART: [art] Derive Key Pair - Done
28,726,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,007,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,008,624 UART: [art] PUB.X = 602CA97D7260AC5E46B1DAC2DC7E4D9D53325DCC229520D6224026D16E7A0C2D5D45877CF348D78205F84506F647955A
31,015,877 UART: [art] PUB.Y = FA93A15B3E887B046CFF6734AA1E5EB35592994A2C4B43F6C122C614A9FC2EF5ADDD9A3DDA81D4F2673E5ABC0C4A91F4
31,023,168 UART: [art] SIG.R = A1F7683A4FB559C9ABCB1E9F908E02EBC55D1DFBFB3A70896D8C3DDF16F8D65F7B47FE33907F3A8E15355D2E337C4D5D
31,030,624 UART: [art] SIG.S = 3D20F3F787A3CC112D7498FFCBEEE418AF60EB48222228A8EB26061BC40BBE0CB962FF5F444ADD58ECAD2DF1744D59C3
32,334,952 UART: mbox::rt_entry...
32,335,898 UART: ____ _ _ _ ____ _____
32,337,872 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,339,888 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,341,810 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,343,785 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,345,713 UART: |_|
32,346,519 UART:
32,477,376 UART: [rt] Runtime listening for mailbox commands...
32,484,592 >>> mbox cmd response data (4360 bytes)
32,505,535 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
32,549,867 >>> mbox cmd response data (0 bytes)
34,627,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
43,378,150 >>> mbox cmd response: success
43,411,326 UART:
43,411,662 UART: Running Caliptra FMC ...
43,412,782 UART:
43,412,950 UART: [state] CFI Enabled
43,456,860 UART: [art] Extend RT PCRs Done
43,458,008 UART: [art] Lock RT PCRs Done
43,459,297 UART: [art] Populate DV Done
43,464,916 UART: [fht] FMC Alias Private Key: 7
43,466,607 UART: [art] Derive CDI
43,467,413 UART: [art] Store in slot 0x4
43,509,525 UART: [art] Derive Key Pair
43,510,565 UART: [art] Store priv key in slot 0x5
46,753,100 UART: [art] Derive Key Pair - Done
46,765,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,046,015 UART: [art] Erasing AUTHORITY.KEYID = 7
49,047,525 UART: [art] PUB.X = 3176A640BB9D37582D3C1F472465DC31B4F1EE12F8EFD3064DE6520EF3F39D28F47C742712A7D5BE6238420847B37E16
49,054,773 UART: [art] PUB.Y = C9F332B80E45E4E844DE7DC18663AC3FA56E5FBE3B6B2B7619CB469EE17781AE3CC620F8981EAE397AF480141BFF8F32
49,062,018 UART: [art] SIG.R = 14127FDD5057BEC612F8CEC4E9ED875ACBAF21CBE163967017CC82C2345C032DDF5C98BC5129C95D184DF6D3588CA5AE
49,069,472 UART: [art] SIG.S = 50B7380F4936FC700656B4F356753655DB4B5C3C96965EDB450F4B75219E938CC905B7A07F8166D669CF176B1F45181B
50,374,814 UART: Caliptra RT
50,375,528 UART: [state] CFI Enabled
54,043,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
54,044,678 UART: [rt] RT listening for mailbox commands...
54,076,012 UART: [rt]cmd =0x494e464f, len=4
54,080,344 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,901 writing to cptra_bootfsm_go
191,978 UART:
192,342 UART: Running Caliptra ROM ...
193,483 UART:
193,628 UART: [state] CFI Enabled
265,262 UART: [state] LifecycleState = Unprovisioned
267,236 UART: [state] DebugLocked = No
269,545 UART: [state] WD Timer not started. Device not locked for debugging
274,077 UART: [kat] SHA2-256
453,750 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,563 UART: [kat] ++
465,039 UART: [kat] sha1
476,126 UART: [kat] SHA2-256
478,791 UART: [kat] SHA2-384
483,919 UART: [kat] SHA2-512-ACC
486,285 UART: [kat] ECC-384
2,947,472 UART: [kat] HMAC-384Kdf
2,972,849 UART: [kat] LMS
3,449,292 UART: [kat] --
3,453,734 UART: [cold-reset] ++
3,456,022 UART: [fht] FHT @ 0x50003400
3,466,574 UART: [idev] ++
3,467,141 UART: [idev] CDI.KEYID = 6
3,468,115 UART: [idev] SUBJECT.KEYID = 7
3,469,358 UART: [idev] UDS.KEYID = 0
3,470,277 ready_for_fw is high
3,470,464 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,891 UART: [idev] Erasing UDS.KEYID = 0
5,987,506 UART: [idev] Sha1 KeyId Algorithm
6,011,298 UART: [idev] --
6,016,699 UART: [ldev] ++
6,017,268 UART: [ldev] CDI.KEYID = 6
6,018,174 UART: [ldev] SUBJECT.KEYID = 5
6,019,388 UART: [ldev] AUTHORITY.KEYID = 7
6,020,617 UART: [ldev] FE.KEYID = 1
6,059,257 UART: [ldev] Erasing FE.KEYID = 1
8,567,366 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,991 UART: [ldev] --
10,376,481 UART: [fwproc] Wait for Commands...
10,378,087 UART: [fwproc] Recv command 0x46574c44
10,380,191 UART: [fwproc] Recv'd Img size: 82832 bytes
13,434,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,520,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,593,568 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,797,407 >>> mbox cmd response: success
13,798,712 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,802,172 UART: [afmc] ++
13,802,765 UART: [afmc] CDI.KEYID = 6
13,803,732 UART: [afmc] SUBJECT.KEYID = 7
13,804,884 UART: [afmc] AUTHORITY.KEYID = 5
16,345,386 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,087,649 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,089,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,105,609 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,121,685 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,137,243 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,163,533 UART: [afmc] --
18,167,632 UART: [cold-reset] --
18,172,466 UART: [state] Locking Datavault
18,177,161 UART: [state] Locking PCR0, PCR1 and PCR31
18,178,908 UART: [state] Locking ICCM
18,181,593 UART: [exit] Launching FMC @ 0x40000130
18,190,039 UART:
18,190,273 UART: Running Caliptra FMC ...
18,191,367 UART:
18,191,526 UART: [state] CFI Enabled
18,243,616 UART: [fht] FMC Alias Private Key: 7
20,009,493 UART: [art] Extend RT PCRs Done
20,010,717 UART: [art] Lock RT PCRs Done
20,012,128 UART: [art] Populate DV Done
20,017,860 UART: [fht] FMC Alias Private Key: 7
20,019,444 UART: [art] Derive CDI
20,020,253 UART: [art] Store in slot 0x4
20,076,589 UART: [art] Derive Key Pair
20,077,634 UART: [art] Store priv key in slot 0x5
22,540,789 UART: [art] Derive Key Pair - Done
22,553,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,266,672 UART: [art] Erasing AUTHORITY.KEYID = 7
24,268,170 UART: [art] PUB.X = CF959E9A5038EAC7687DA2C6FF2096FADA52EFD93643B5B9D8AF6264E62A4FD5DBF3CF7546496CDC29676620DC48B144
24,275,475 UART: [art] PUB.Y = F0531AF35D94A83F1300F15AA7677862B86DA77C545CE0AFC1F794F288D7C8F7DA3FF43D79A7F1269FA8B64C4CFE4FFB
24,282,737 UART: [art] SIG.R = 38129CD2D38E52A4CFBCBD294906E60EE58F1B3235F75BCE2613F9BAE235734779AC7B33F744B664E130E21CE15FBC36
24,290,149 UART: [art] SIG.S = F233CEE9F590657A95EDE2C32D658A8E45E6AE6F5CEEA0802817389E7F33079D228A21B66F80828DAA8022E55679B2B0
25,268,874 UART: mbox::rt_entry...
25,269,814 UART: ____ _ _ _ ____ _____
25,271,791 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,273,791 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,275,714 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,277,637 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,279,573 UART: |_|
25,280,398 UART:
25,412,165 UART: [rt] Runtime listening for mailbox commands...
25,419,373 >>> mbox cmd response data (4360 bytes)
25,440,092 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,484,475 >>> mbox cmd response data (0 bytes)
27,545,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,695,278 UART:
27,695,646 UART: Running Caliptra ROM ...
27,696,772 UART:
27,696,941 UART: [state] CFI Enabled
27,764,425 UART: [state] LifecycleState = Unprovisioned
27,766,354 UART: [state] DebugLocked = No
27,768,440 UART: [state] WD Timer not started. Device not locked for debugging
27,771,637 UART: [kat] SHA2-256
27,951,308 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,962,053 UART: [kat] ++
27,962,529 UART: [kat] sha1
27,972,279 UART: [kat] SHA2-256
27,974,970 UART: [kat] SHA2-384
27,980,370 UART: [kat] SHA2-512-ACC
27,982,711 UART: [kat] ECC-384
30,426,807 UART: [kat] HMAC-384Kdf
30,449,729 UART: [kat] LMS
30,926,196 UART: [kat] --
30,933,372 UART: [update-reset] ++
34,425,930 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,429,125 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,826,744 >>> mbox cmd response: success
34,831,421 UART: [update-reset] Copying MAN_2 To MAN_1
34,865,145 UART: [update-reset Success] --
34,869,603 UART: [state] Locking Datavault
34,872,976 UART: [state] Locking PCR0, PCR1 and PCR31
34,874,729 UART: [state] Locking ICCM
34,877,147 UART: [exit] Launching FMC @ 0x40000130
34,885,541 UART:
34,885,771 UART: Running Caliptra FMC ...
34,886,869 UART:
34,887,023 UART: [state] CFI Enabled
34,984,133 UART: [art] Extend RT PCRs Done
34,985,338 UART: [art] Lock RT PCRs Done
34,986,575 UART: [art] Populate DV Done
34,992,249 UART: [fht] FMC Alias Private Key: 7
34,993,831 UART: [art] Derive CDI
34,994,636 UART: [art] Store in slot 0x4
35,053,279 UART: [art] Derive Key Pair
35,054,334 UART: [art] Store priv key in slot 0x5
37,516,476 UART: [art] Derive Key Pair - Done
37,529,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,242,620 UART: [art] Erasing AUTHORITY.KEYID = 7
39,244,127 UART: [art] PUB.X = 1E361EE5FB37FD27A672449A17E6E90F9D66F25CC6E93A7160D90D89C3D841E5E71A7655FF8E21AD16C97D77EFFAE60E
39,251,440 UART: [art] PUB.Y = 3389F7C64FD58221BEC25390E09E53B84E4E4E12C19CE60C4A579A639D2E857F01E78E189EC37868D1A94F722EE69299
39,258,734 UART: [art] SIG.R = D2ED96D4D0C92E523D3FDF03A9BCE6C4FCE121902C34765216EA7A8CCC638B4A588207A05D58A3B33000D88813ACE41A
39,266,068 UART: [art] SIG.S = 78B318433BF5F807D49F66FFAADEF7B362549C1BAAD9D585E0D8A6B32519C6BFB71D95A980C9ADD3A34653A37AB503C3
40,245,049 UART: Caliptra RT
40,245,771 UART: [state] CFI Enabled
43,189,988 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,191,493 UART: [rt] RT listening for mailbox commands...
43,223,097 UART: [rt]cmd =0x494e464f, len=4
43,227,532 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,460,435 ready_for_fw is high
3,460,815 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,626,247 >>> mbox cmd response: success
13,627,631 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
17,913,755 UART:
17,914,158 UART: Running Caliptra FMC ...
17,915,287 UART:
17,915,445 UART: [state] CFI Enabled
17,985,290 UART: [fht] FMC Alias Private Key: 7
19,751,604 UART: [art] Extend RT PCRs Done
19,752,827 UART: [art] Lock RT PCRs Done
19,754,283 UART: [art] Populate DV Done
19,759,505 UART: [fht] FMC Alias Private Key: 7
19,761,104 UART: [art] Derive CDI
19,761,841 UART: [art] Store in slot 0x4
19,818,044 UART: [art] Derive Key Pair
19,819,048 UART: [art] Store priv key in slot 0x5
22,281,778 UART: [art] Derive Key Pair - Done
22,295,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,007,652 UART: [art] Erasing AUTHORITY.KEYID = 7
24,009,170 UART: [art] PUB.X = 184D9C7244E7BC17C6BF1A517F11EFCF03134AA1566B26C3E77519CA2A40BE077F1F3762DE7B787F433DBFCC6E5DC049
24,016,439 UART: [art] PUB.Y = 5EA0B7938B3EB056E6B0A9D99FB59B885210CFF5F5A4BCDE4F0CA4C1EF180D8D576F4872C2E1066C790F9113285C6690
24,023,725 UART: [art] SIG.R = BAB0D8A83EE0276CEB7D9DC4DCE23BD5A952547F6A9FD43EA5A5D5F55F2F4E5171BE58C7E8A7E77F6C6AC8DFD199E1E9
24,031,126 UART: [art] SIG.S = 9D988CE2CB454A1677E285CECB999BF34B99189ED21CCE1877F95B07CFCD1BCE6210883D2D77901FD6FD35F0B2767891
25,009,847 UART: mbox::rt_entry...
25,010,810 UART: ____ _ _ _ ____ _____
25,012,794 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,014,798 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,016,726 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,018,722 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,020,579 UART: |_|
25,021,379 UART:
25,152,625 UART: [rt] Runtime listening for mailbox commands...
25,159,836 >>> mbox cmd response data (4360 bytes)
25,180,521 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,224,848 >>> mbox cmd response data (0 bytes)
27,282,572 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,604,128 >>> mbox cmd response: success
34,639,069 UART:
34,639,407 UART: Running Caliptra FMC ...
34,640,535 UART:
34,640,718 UART: [state] CFI Enabled
34,746,131 UART: [art] Extend RT PCRs Done
34,747,327 UART: [art] Lock RT PCRs Done
34,748,783 UART: [art] Populate DV Done
34,754,511 UART: [fht] FMC Alias Private Key: 7
34,756,043 UART: [art] Derive CDI
34,756,858 UART: [art] Store in slot 0x4
34,815,665 UART: [art] Derive Key Pair
34,816,697 UART: [art] Store priv key in slot 0x5
37,279,123 UART: [art] Derive Key Pair - Done
37,292,062 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,004,820 UART: [art] Erasing AUTHORITY.KEYID = 7
39,006,327 UART: [art] PUB.X = ABD823FE4D5DDCA5B26675C05B84903047738C87D1D596F7BE6B45384CC9D15273959385A500659B2782E60F3376E794
39,013,531 UART: [art] PUB.Y = 912299F8B4DE9B5FC73898419E0AF2EDF3B7D9F7C8C6D819D522D076A166FC55287A6E55A3D3EBCAF3DD7B81BEAF835F
39,020,834 UART: [art] SIG.R = 1E354580A613FD6DCEB6FE47A1690E8DB01F5240D23BAA32DE94EB386A0E6ADDC84060FCD72128D370F520878C24CCB0
39,028,231 UART: [art] SIG.S = B78C10E3598E8D4F19C281BD417D3F4F62780FA5F9762440811B14CBDB9EC27C3389C4B27395684924F51396594740C9
40,007,422 UART: Caliptra RT
40,008,142 UART: [state] CFI Enabled
42,953,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,955,219 UART: [rt] RT listening for mailbox commands...
42,986,501 UART: [rt]cmd =0x494e464f, len=4
42,990,981 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,373 UART:
192,744 UART: Running Caliptra ROM ...
193,944 UART:
603,637 UART: [state] CFI Enabled
619,992 UART: [state] LifecycleState = Unprovisioned
621,860 UART: [state] DebugLocked = No
623,448 UART: [state] WD Timer not started. Device not locked for debugging
627,479 UART: [kat] SHA2-256
807,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,920 UART: [kat] ++
818,441 UART: [kat] sha1
828,696 UART: [kat] SHA2-256
831,353 UART: [kat] SHA2-384
836,142 UART: [kat] SHA2-512-ACC
838,512 UART: [kat] ECC-384
3,278,880 UART: [kat] HMAC-384Kdf
3,290,266 UART: [kat] LMS
3,766,771 UART: [kat] --
3,771,827 UART: [cold-reset] ++
3,773,408 UART: [fht] FHT @ 0x50003400
3,784,828 UART: [idev] ++
3,785,465 UART: [idev] CDI.KEYID = 6
3,786,377 UART: [idev] SUBJECT.KEYID = 7
3,787,627 UART: [idev] UDS.KEYID = 0
3,788,552 ready_for_fw is high
3,788,745 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,892,808 UART: [idev] Erasing UDS.KEYID = 0
6,270,344 UART: [idev] Sha1 KeyId Algorithm
6,293,684 UART: [idev] --
6,298,864 UART: [ldev] ++
6,299,432 UART: [ldev] CDI.KEYID = 6
6,300,450 UART: [ldev] SUBJECT.KEYID = 5
6,301,559 UART: [ldev] AUTHORITY.KEYID = 7
6,302,847 UART: [ldev] FE.KEYID = 1
6,314,196 UART: [ldev] Erasing FE.KEYID = 1
8,795,063 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,322 UART: [ldev] --
10,590,006 UART: [fwproc] Wait for Commands...
10,592,333 UART: [fwproc] Recv command 0x46574c44
10,594,341 UART: [fwproc] Recv'd Img size: 82832 bytes
13,629,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,711,451 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,784,452 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,986,886 >>> mbox cmd response: success
13,987,440 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
13,991,524 UART: [afmc] ++
13,992,162 UART: [afmc] CDI.KEYID = 6
13,993,076 UART: [afmc] SUBJECT.KEYID = 7
13,994,303 UART: [afmc] AUTHORITY.KEYID = 5
16,494,919 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,217,856 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,220,082 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,235,855 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,251,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,267,515 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,290,990 UART: [afmc] --
18,294,917 UART: [cold-reset] --
18,297,804 UART: [state] Locking Datavault
18,302,835 UART: [state] Locking PCR0, PCR1 and PCR31
18,304,589 UART: [state] Locking ICCM
18,307,008 UART: [exit] Launching FMC @ 0x40000130
18,315,420 UART:
18,315,657 UART: Running Caliptra FMC ...
18,316,762 UART:
18,316,919 UART: [state] CFI Enabled
18,325,079 UART: [fht] FMC Alias Private Key: 7
20,090,872 UART: [art] Extend RT PCRs Done
20,092,258 UART: [art] Lock RT PCRs Done
20,093,745 UART: [art] Populate DV Done
20,099,348 UART: [fht] FMC Alias Private Key: 7
20,100,957 UART: [art] Derive CDI
20,101,742 UART: [art] Store in slot 0x4
20,144,482 UART: [art] Derive Key Pair
20,145,487 UART: [art] Store priv key in slot 0x5
22,572,363 UART: [art] Derive Key Pair - Done
22,585,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,291,579 UART: [art] Erasing AUTHORITY.KEYID = 7
24,293,076 UART: [art] PUB.X = 2CB491973499575DF0531B6441183BDA3790278BD4E072BB830EB43772DDA4C56DDCBBE20C26ECB350846A8B4BAF5DE4
24,300,376 UART: [art] PUB.Y = 2A2099C27598E3DC9FE2589B7465F298FF6E1CD88BC94A21161DF16D01F0D6AEB211A39A667AAEBC9E02BDEC4454A0BA
24,307,610 UART: [art] SIG.R = 62ABD758419484C0F0CBAFB89523173103256A67752E789CFAF5EB80FF5EA559D90819E9D96A968AC1527D386A5B7EDE
24,315,001 UART: [art] SIG.S = AE80FEB2465C3691B12C09466FDC62DD317D21631171A9A4442B6DCCB1DD710C77E1D29BED879940DBA62670166E1709
25,293,779 UART: mbox::rt_entry...
25,294,745 UART: ____ _ _ _ ____ _____
25,296,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,298,683 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,300,539 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,302,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,304,369 UART: |_|
25,305,258 UART:
25,437,022 UART: [rt] Runtime listening for mailbox commands...
25,444,225 >>> mbox cmd response data (4360 bytes)
25,465,302 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,509,682 >>> mbox cmd response data (0 bytes)
27,576,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,726,878 UART:
27,727,260 UART: Running Caliptra ROM ...
27,728,311 UART:
27,728,486 UART: [state] CFI Enabled
27,743,472 UART: [state] LifecycleState = Unprovisioned
27,745,373 UART: [state] DebugLocked = No
27,747,381 UART: [state] WD Timer not started. Device not locked for debugging
27,750,578 UART: [kat] SHA2-256
27,930,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,941,046 UART: [kat] ++
27,941,572 UART: [kat] sha1
27,951,273 UART: [kat] SHA2-256
27,954,020 UART: [kat] SHA2-384
27,960,129 UART: [kat] SHA2-512-ACC
27,962,483 UART: [kat] ECC-384
30,403,800 UART: [kat] HMAC-384Kdf
30,416,155 UART: [kat] LMS
30,892,613 UART: [kat] --
30,897,328 UART: [update-reset] ++
34,391,544 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,394,321 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
34,791,946 >>> mbox cmd response: success
34,796,641 UART: [update-reset] Copying MAN_2 To MAN_1
34,830,203 UART: [update-reset Success] --
34,834,222 UART: [state] Locking Datavault
34,836,203 UART: [state] Locking PCR0, PCR1 and PCR31
34,837,964 UART: [state] Locking ICCM
34,840,234 UART: [exit] Launching FMC @ 0x40000130
34,848,638 UART:
34,848,878 UART: Running Caliptra FMC ...
34,849,982 UART:
34,850,158 UART: [state] CFI Enabled
34,894,486 UART: [art] Extend RT PCRs Done
34,895,691 UART: [art] Lock RT PCRs Done
34,896,990 UART: [art] Populate DV Done
34,902,673 UART: [fht] FMC Alias Private Key: 7
34,904,321 UART: [art] Derive CDI
34,905,135 UART: [art] Store in slot 0x4
34,948,165 UART: [art] Derive Key Pair
34,949,169 UART: [art] Store priv key in slot 0x5
37,376,094 UART: [art] Derive Key Pair - Done
37,389,327 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,095,827 UART: [art] Erasing AUTHORITY.KEYID = 7
39,097,340 UART: [art] PUB.X = 5F7AB585924FBD6F358AA1D4E2A82C99434B10638596AE6F7F7A1D34A6836047E92D465A8A292A5BE624FBB70BCA94EF
39,104,598 UART: [art] PUB.Y = 602A40CBE2A72EA0E08FE27C57923286A10C74C0B9E0A0924CD4ACB98F0A676C97128BAD427B8311F1FD2EC89FBB5DA4
39,111,894 UART: [art] SIG.R = 13C54932A645780D14B9A006DDA1CF72255E88A3D697BEABA6925CC3EA4B3E7AE1C4FDFDFB48CA9FEBA802B376835209
39,119,289 UART: [art] SIG.S = BF005AD14747D503EE25D9BD6FB1A653CEE6B3B53C1AA24E567FCC46FDAAFB7D4FD973C7D993515E3EE744705C509AFC
40,098,038 UART: Caliptra RT
40,098,749 UART: [state] CFI Enabled
42,950,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,952,483 UART: [rt] RT listening for mailbox commands...
42,984,091 UART: [rt]cmd =0x494e464f, len=4
42,988,317 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,782,746 ready_for_fw is high
3,783,125 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,887,143 >>> mbox cmd response: success
13,887,867 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,137,996 UART:
18,138,403 UART: Running Caliptra FMC ...
18,139,517 UART:
18,139,680 UART: [state] CFI Enabled
18,147,466 UART: [fht] FMC Alias Private Key: 7
19,914,158 UART: [art] Extend RT PCRs Done
19,915,386 UART: [art] Lock RT PCRs Done
19,917,124 UART: [art] Populate DV Done
19,922,599 UART: [fht] FMC Alias Private Key: 7
19,924,262 UART: [art] Derive CDI
19,925,003 UART: [art] Store in slot 0x4
19,967,775 UART: [art] Derive Key Pair
19,968,818 UART: [art] Store priv key in slot 0x5
22,395,891 UART: [art] Derive Key Pair - Done
22,408,840 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,115,221 UART: [art] Erasing AUTHORITY.KEYID = 7
24,116,747 UART: [art] PUB.X = 85B9521BBD795039637AEEA76D0BF792C50C9B09E7D92EC4EA67097DCEC84D908F7413CFC75BCB7A58FBD8315204F165
24,123,957 UART: [art] PUB.Y = 74B9B2C092716912CEC9E9637B755B642F0F73DDE44B1AB1F81019C1D284A2987F1A1221E93EA7E718D438675F925C2E
24,131,205 UART: [art] SIG.R = 77A129C33C530C12A21F8EC4B4ED080083D3897294367686BE0A89CBBC58DF3A67A7D843C8E895E97CA495038317B59F
24,138,613 UART: [art] SIG.S = 75CC7335CF68C268CF3EF245237A72E111DFE8B6A9476720F93C4DB31352B32021BA74EB06B3311C7F0B617921E54FA9
25,117,326 UART: mbox::rt_entry...
25,118,294 UART: ____ _ _ _ ____ _____
25,120,281 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,122,295 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,124,227 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,126,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,128,169 UART: |_|
25,128,978 UART:
25,259,896 UART: [rt] Runtime listening for mailbox commands...
25,267,106 >>> mbox cmd response data (4360 bytes)
25,287,970 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,332,350 >>> mbox cmd response data (0 bytes)
27,394,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
34,625,266 >>> mbox cmd response: success
34,658,162 UART:
34,658,483 UART: Running Caliptra FMC ...
34,659,607 UART:
34,659,781 UART: [state] CFI Enabled
34,704,294 UART: [art] Extend RT PCRs Done
34,705,499 UART: [art] Lock RT PCRs Done
34,707,017 UART: [art] Populate DV Done
34,712,650 UART: [fht] FMC Alias Private Key: 7
34,714,156 UART: [art] Derive CDI
34,714,929 UART: [art] Store in slot 0x4
34,758,016 UART: [art] Derive Key Pair
34,759,059 UART: [art] Store priv key in slot 0x5
37,185,183 UART: [art] Derive Key Pair - Done
37,198,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,904,717 UART: [art] Erasing AUTHORITY.KEYID = 7
38,906,218 UART: [art] PUB.X = 573357C50EE32616D6B6FA7DDA3FE381CE27B7A6ED3ECA5C0B12F2AE298EE8A036C41BB2424AC5DB78B9AD0B44FB0216
38,913,537 UART: [art] PUB.Y = 6B250F8BEE0629E3FB920193B8E3B4B403B74ABDCF5D3FB4B29D8DD9FD86BD11CC50536224419B4A599443D774376E9F
38,920,822 UART: [art] SIG.R = 449AC55F66C38606843D1D18AD7D3005B3B5BF0833287B5BFCB574DA58DCF6EF50877CB71F002DA016EC27A6F2879EB8
38,928,187 UART: [art] SIG.S = C1EE2185C208DC9C49A3EA9283D492FCC3C3F331638B4CE72FA6304D903FDA64103B7E26E4163796866BF6FE9C4B3625
39,907,177 UART: Caliptra RT
39,907,893 UART: [state] CFI Enabled
42,761,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,762,595 UART: [rt] RT listening for mailbox commands...
42,794,152 UART: [rt]cmd =0x494e464f, len=4
42,798,417 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,219 UART:
192,585 UART: Running Caliptra ROM ...
193,776 UART:
193,925 UART: [state] CFI Enabled
265,340 UART: [state] LifecycleState = Unprovisioned
267,693 UART: [state] DebugLocked = No
269,716 UART: [state] WD Timer not started. Device not locked for debugging
274,137 UART: [kat] SHA2-256
464,068 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,784 UART: [kat] ++
475,237 UART: [kat] sha1
486,602 UART: [kat] SHA2-256
489,617 UART: [kat] SHA2-384
495,247 UART: [kat] SHA2-512-ACC
497,822 UART: [kat] ECC-384
2,951,056 UART: [kat] HMAC-384Kdf
2,974,044 UART: [kat] LMS
3,505,781 UART: [kat] --
3,509,992 UART: [cold-reset] ++
3,512,130 UART: [fht] FHT @ 0x50003400
3,522,535 UART: [idev] ++
3,523,246 UART: [idev] CDI.KEYID = 6
3,524,170 UART: [idev] SUBJECT.KEYID = 7
3,525,359 UART: [idev] UDS.KEYID = 0
3,526,284 ready_for_fw is high
3,526,494 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,630,860 UART: [idev] Erasing UDS.KEYID = 0
6,032,010 UART: [idev] Sha1 KeyId Algorithm
6,054,054 UART: [idev] --
6,057,946 UART: [ldev] ++
6,058,621 UART: [ldev] CDI.KEYID = 6
6,059,502 UART: [ldev] SUBJECT.KEYID = 5
6,060,709 UART: [ldev] AUTHORITY.KEYID = 7
6,061,942 UART: [ldev] FE.KEYID = 1
6,102,594 UART: [ldev] Erasing FE.KEYID = 1
8,607,722 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,378 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,891 UART: [ldev] --
10,416,417 UART: [fwproc] Wait for Commands...
10,418,609 UART: [fwproc] Recv command 0x46574c44
10,420,910 UART: [fwproc] Recv'd Img size: 82832 bytes
13,477,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,554,745 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,678,353 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,024,970 >>> mbox cmd response: success
14,026,054 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,028,582 UART: [afmc] ++
14,029,347 UART: [afmc] CDI.KEYID = 6
14,030,453 UART: [afmc] SUBJECT.KEYID = 7
14,032,052 UART: [afmc] AUTHORITY.KEYID = 5
16,574,619 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,296,814 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,298,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,313,815 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,328,986 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,343,883 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,368,142 UART: [afmc] --
18,372,010 UART: [cold-reset] --
18,376,091 UART: [state] Locking Datavault
18,380,093 UART: [state] Locking PCR0, PCR1 and PCR31
18,382,281 UART: [state] Locking ICCM
18,384,835 UART: [exit] Launching FMC @ 0x40000130
18,393,488 UART:
18,393,731 UART: Running Caliptra FMC ...
18,394,832 UART:
18,394,988 UART: [state] CFI Enabled
18,454,785 UART: [fht] FMC Alias Private Key: 7
20,221,343 UART: [art] Extend RT PCRs Done
20,222,585 UART: [art] Lock RT PCRs Done
20,224,504 UART: [art] Populate DV Done
20,229,969 UART: [fht] FMC Alias Private Key: 7
20,231,610 UART: [art] Derive CDI
20,232,348 UART: [art] Store in slot 0x4
20,287,678 UART: [art] Derive Key Pair
20,288,714 UART: [art] Store priv key in slot 0x5
22,751,951 UART: [art] Derive Key Pair - Done
22,764,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,477,253 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,740 UART: [art] PUB.X = E75E08B39E0E8E44B12DEDC0A7A4B27FC30BDC6DCA9B8450AC93302DB2C284E1620EB11659FED702EA0726AF7FB0BC12
24,486,032 UART: [art] PUB.Y = E415838D6D3725B83D5531894C90ABFB2C5804551253B92A796906918EF0D911BA27590AB13620C9A3B0D03827C9FA42
24,493,260 UART: [art] SIG.R = 9F4B79CDE645201C8A489A581666A52C3AFF54DE95AF375E6DF6B01F6DF246A0BFD2FB082FC01A065A0AD2CB028E0257
24,500,644 UART: [art] SIG.S = 05A6A0CAF4D8DFA123A1DA5E0CD5DA074F15B992B512C23FB60340D0F6D7395BBFA234EC27EA364A67B09468BD0BC37B
25,479,194 UART: mbox::rt_entry...
25,480,165 UART: ____ _ _ _ ____ _____
25,482,174 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,484,182 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,486,110 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,488,035 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,489,962 UART: |_|
25,490,938 UART:
25,622,599 UART: [rt] Runtime listening for mailbox commands...
25,629,848 >>> mbox cmd response data (4360 bytes)
25,650,665 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,695,038 >>> mbox cmd response data (0 bytes)
27,767,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,917,472 UART:
27,917,839 UART: Running Caliptra ROM ...
27,918,975 UART:
27,919,147 UART: [state] CFI Enabled
27,994,667 UART: [state] LifecycleState = Unprovisioned
27,996,713 UART: [state] DebugLocked = No
27,998,157 UART: [state] WD Timer not started. Device not locked for debugging
28,003,356 UART: [kat] SHA2-256
28,193,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,204,006 UART: [kat] ++
28,204,509 UART: [kat] sha1
28,215,720 UART: [kat] SHA2-256
28,218,731 UART: [kat] SHA2-384
28,224,826 UART: [kat] SHA2-512-ACC
28,227,436 UART: [kat] ECC-384
30,677,526 UART: [kat] HMAC-384Kdf
30,700,939 UART: [kat] LMS
31,232,461 UART: [kat] --
31,237,177 UART: [update-reset] ++
34,753,468 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,756,742 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,386,474 >>> mbox cmd response: success
35,391,163 UART: [update-reset] Copying MAN_2 To MAN_1
35,426,005 UART: [update-reset Success] --
35,429,446 UART: [state] Locking Datavault
35,432,543 UART: [state] Locking PCR0, PCR1 and PCR31
35,434,747 UART: [state] Locking ICCM
35,436,919 UART: [exit] Launching FMC @ 0x40000130
35,445,599 UART:
35,445,832 UART: Running Caliptra FMC ...
35,446,932 UART:
35,447,085 UART: [state] CFI Enabled
35,552,857 UART: [art] Extend RT PCRs Done
35,554,051 UART: [art] Lock RT PCRs Done
35,555,402 UART: [art] Populate DV Done
35,560,971 UART: [fht] FMC Alias Private Key: 7
35,562,662 UART: [art] Derive CDI
35,563,472 UART: [art] Store in slot 0x4
35,622,249 UART: [art] Derive Key Pair
35,623,251 UART: [art] Store priv key in slot 0x5
38,085,250 UART: [art] Derive Key Pair - Done
38,098,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,810,951 UART: [art] Erasing AUTHORITY.KEYID = 7
39,812,485 UART: [art] PUB.X = E9384B488C4FDBCBE7DF4F0586D39EA3964F7E0175DC8B7E395726F1EE83A1093150A8B9ECF79B6E660ED1644FFCEE25
39,819,748 UART: [art] PUB.Y = 1A601CFFEB93BFD338452C5A587DD5DE3228AE94FA4FC2A95E0DC3F03163EEA6698AEA167662B922B2D734CEFF933B2A
39,827,060 UART: [art] SIG.R = 18F0677D802BB4B31CFA1E2792A2FF0D2A245D8321841DE5EBA597EEBDBA215B5B430B9DBB6D9F14F01C1532CC3EA751
39,834,414 UART: [art] SIG.S = 371D8329897EFD81767F0E4027A013019DA59D75A73F73B5CADF73316AF0FF3820B09C72C1CBB0631CE58AEC2349B26C
40,812,904 UART: Caliptra RT
40,813,594 UART: [state] CFI Enabled
43,781,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,783,168 UART: [rt] RT listening for mailbox commands...
43,814,565 UART: [rt]cmd =0x494e464f, len=4
43,818,930 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,085 writing to cptra_bootfsm_go
3,436,708 ready_for_fw is high
3,437,126 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,069,202 >>> mbox cmd response: success
14,070,219 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,366,429 UART:
18,366,804 UART: Running Caliptra FMC ...
18,368,013 UART:
18,368,187 UART: [state] CFI Enabled
18,433,596 UART: [fht] FMC Alias Private Key: 7
20,220,566 UART: [art] Extend RT PCRs Done
20,221,795 UART: [art] Lock RT PCRs Done
20,223,470 UART: [art] Populate DV Done
20,228,683 UART: [fht] FMC Alias Private Key: 7
20,230,174 UART: [art] Derive CDI
20,230,911 UART: [art] Store in slot 0x4
20,287,164 UART: [art] Derive Key Pair
20,288,167 UART: [art] Store priv key in slot 0x5
22,751,123 UART: [art] Derive Key Pair - Done
22,763,974 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,477,442 UART: [art] Erasing AUTHORITY.KEYID = 7
24,478,953 UART: [art] PUB.X = 2CFF77386B1DD376842FDC8CCA8141BDB33411F1FA5EA6CAB3AB2B54903FBE439BDFC02400642E797438BB993DF00C4B
24,486,197 UART: [art] PUB.Y = 3FFA01DAEC937E35A8FD44923BECE2050A4CDAD772C71D0F13B80FDC1053FE201F55D25F4EAB954811DC46E96F4CF475
24,493,496 UART: [art] SIG.R = A771088B363C93FC43539E9D81FBC99554926B146371D4BABD97883E96BF447B728A0C65327E8B7432BAEAB1AADCCD3E
24,500,895 UART: [art] SIG.S = 32CAB500854B357886272CCA7EF37911861EA08F25BF1C495DD569301ED6865B3CD496699B0AC8BE15EB95898E941CA3
25,479,576 UART: mbox::rt_entry...
25,480,547 UART: ____ _ _ _ ____ _____
25,482,477 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,484,484 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,486,411 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,488,396 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,490,328 UART: |_|
25,491,308 UART:
25,622,018 UART: [rt] Runtime listening for mailbox commands...
25,629,236 >>> mbox cmd response data (4360 bytes)
25,649,846 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,694,164 >>> mbox cmd response data (0 bytes)
27,765,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,663,565 >>> mbox cmd response: success
35,698,813 UART:
35,699,132 UART: Running Caliptra FMC ...
35,700,178 UART:
35,700,328 UART: [state] CFI Enabled
35,792,123 UART: [art] Extend RT PCRs Done
35,793,322 UART: [art] Lock RT PCRs Done
35,794,665 UART: [art] Populate DV Done
35,799,923 UART: [fht] FMC Alias Private Key: 7
35,801,520 UART: [art] Derive CDI
35,802,259 UART: [art] Store in slot 0x4
35,860,881 UART: [art] Derive Key Pair
35,861,950 UART: [art] Store priv key in slot 0x5
38,325,176 UART: [art] Derive Key Pair - Done
38,338,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
40,050,411 UART: [art] Erasing AUTHORITY.KEYID = 7
40,051,940 UART: [art] PUB.X = 986390D5114F0CA18E44A9D4F55773FAB57C498A62AA23E9A6B710400F7A8A8ECF2F35FA7A81B9A165B2325E4BA24796
40,059,215 UART: [art] PUB.Y = 259282403120269FAEB350BC95A322CD560B5E7160739167BD5246CC9679FB80506C103B40CED8BB1FE9A18FFAF5393E
40,066,427 UART: [art] SIG.R = ECD55DBD9ED6596491B3109CB56C1F0EBA75AC8CC56324FAF15D8884D3E6B2A11191377D84184F409A422EA044895FD6
40,073,828 UART: [art] SIG.S = CD37814D37DECBF4DAFC7C3E613AD4BF34E96A9E6B2B2C20BB795C03F9017202DAC2404508BBDC10FCBF886146D852A0
41,052,754 UART: Caliptra RT
41,053,453 UART: [state] CFI Enabled
43,999,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
44,001,264 UART: [rt] RT listening for mailbox commands...
44,032,613 UART: [rt]cmd =0x494e464f, len=4
44,036,858 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,439 UART:
192,817 UART: Running Caliptra ROM ...
194,013 UART:
603,421 UART: [state] CFI Enabled
619,584 UART: [state] LifecycleState = Unprovisioned
621,965 UART: [state] DebugLocked = No
623,854 UART: [state] WD Timer not started. Device not locked for debugging
629,116 UART: [kat] SHA2-256
819,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,816 UART: [kat] ++
830,425 UART: [kat] sha1
840,459 UART: [kat] SHA2-256
843,475 UART: [kat] SHA2-384
849,680 UART: [kat] SHA2-512-ACC
852,268 UART: [kat] ECC-384
3,294,113 UART: [kat] HMAC-384Kdf
3,307,341 UART: [kat] LMS
3,839,190 UART: [kat] --
3,845,532 UART: [cold-reset] ++
3,847,695 UART: [fht] FHT @ 0x50003400
3,860,079 UART: [idev] ++
3,860,740 UART: [idev] CDI.KEYID = 6
3,861,698 UART: [idev] SUBJECT.KEYID = 7
3,862,825 UART: [idev] UDS.KEYID = 0
3,863,882 ready_for_fw is high
3,864,086 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,968,183 UART: [idev] Erasing UDS.KEYID = 0
6,339,626 UART: [idev] Sha1 KeyId Algorithm
6,362,750 UART: [idev] --
6,367,775 UART: [ldev] ++
6,368,456 UART: [ldev] CDI.KEYID = 6
6,369,342 UART: [ldev] SUBJECT.KEYID = 5
6,370,552 UART: [ldev] AUTHORITY.KEYID = 7
6,371,784 UART: [ldev] FE.KEYID = 1
6,383,459 UART: [ldev] Erasing FE.KEYID = 1
8,863,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,555 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,951 UART: [ldev] --
10,657,229 UART: [fwproc] Wait for Commands...
10,659,832 UART: [fwproc] Recv command 0x46574c44
10,662,091 UART: [fwproc] Recv'd Img size: 82832 bytes
13,716,104 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,795,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,919,086 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,265,172 >>> mbox cmd response: success
14,265,651 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
14,269,070 UART: [afmc] ++
14,269,767 UART: [afmc] CDI.KEYID = 6
14,271,015 UART: [afmc] SUBJECT.KEYID = 7
14,272,487 UART: [afmc] AUTHORITY.KEYID = 5
16,778,098 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,499,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,501,966 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,517,050 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,532,186 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,547,101 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,569,560 UART: [afmc] --
18,573,785 UART: [cold-reset] --
18,577,984 UART: [state] Locking Datavault
18,582,436 UART: [state] Locking PCR0, PCR1 and PCR31
18,584,638 UART: [state] Locking ICCM
18,586,740 UART: [exit] Launching FMC @ 0x40000130
18,595,420 UART:
18,595,656 UART: Running Caliptra FMC ...
18,596,761 UART:
18,596,942 UART: [state] CFI Enabled
18,604,861 UART: [fht] FMC Alias Private Key: 7
20,371,009 UART: [art] Extend RT PCRs Done
20,372,241 UART: [art] Lock RT PCRs Done
20,373,814 UART: [art] Populate DV Done
20,379,178 UART: [fht] FMC Alias Private Key: 7
20,380,720 UART: [art] Derive CDI
20,381,540 UART: [art] Store in slot 0x4
20,424,084 UART: [art] Derive Key Pair
20,425,128 UART: [art] Store priv key in slot 0x5
22,851,178 UART: [art] Derive Key Pair - Done
22,864,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,570,435 UART: [art] Erasing AUTHORITY.KEYID = 7
24,571,933 UART: [art] PUB.X = 8FF3EB7768073E75949AD352347355D25A33E93E8D2DA46CC8010117A54B14F874841C4CEFB112A05B0CE011475733B4
24,579,153 UART: [art] PUB.Y = 6868EFADA7384B719C025BC5EA889C7C2DEE44EEB16D514F938D7E8B73BDA7665AA968DF8F83CA9559CB30AE52FE636C
24,586,456 UART: [art] SIG.R = CCCFC55CFD84CCCCDD09C894035FAAFFBD6BDD1B35E9C5492347B5B4DEFDD110029A66E892FFA885B4836248E6E061B1
24,593,884 UART: [art] SIG.S = 57D92DCB4FE6D25A8F49EE1E7B3A5169B164F4C764484970E83117C659582DB79A57609A692B76DB2476EBA5215E3E8C
25,572,197 UART: mbox::rt_entry...
25,573,151 UART: ____ _ _ _ ____ _____
25,575,134 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,577,137 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,579,067 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,581,004 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,582,940 UART: |_|
25,583,784 UART:
25,714,290 UART: [rt] Runtime listening for mailbox commands...
25,721,519 >>> mbox cmd response data (4360 bytes)
25,742,316 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,786,709 >>> mbox cmd response data (0 bytes)
27,863,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,013,785 UART:
28,014,199 UART: Running Caliptra ROM ...
28,015,346 UART:
28,015,527 UART: [state] CFI Enabled
28,026,506 UART: [state] LifecycleState = Unprovisioned
28,028,398 UART: [state] DebugLocked = No
28,030,051 UART: [state] WD Timer not started. Device not locked for debugging
28,034,686 UART: [kat] SHA2-256
28,224,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,235,313 UART: [kat] ++
28,235,840 UART: [kat] sha1
28,246,567 UART: [kat] SHA2-256
28,249,623 UART: [kat] SHA2-384
28,256,789 UART: [kat] SHA2-512-ACC
28,259,371 UART: [kat] ECC-384
30,701,966 UART: [kat] HMAC-384Kdf
30,715,924 UART: [kat] LMS
31,247,532 UART: [kat] --
31,250,978 UART: [update-reset] ++
34,763,107 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,766,078 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
35,395,808 >>> mbox cmd response: success
35,400,775 UART: [update-reset] Copying MAN_2 To MAN_1
35,433,790 UART: [update-reset Success] --
35,437,807 UART: [state] Locking Datavault
35,442,487 UART: [state] Locking PCR0, PCR1 and PCR31
35,444,714 UART: [state] Locking ICCM
35,446,170 UART: [exit] Launching FMC @ 0x40000130
35,454,828 UART:
35,455,083 UART: Running Caliptra FMC ...
35,456,199 UART:
35,456,370 UART: [state] CFI Enabled
35,500,365 UART: [art] Extend RT PCRs Done
35,501,516 UART: [art] Lock RT PCRs Done
35,503,021 UART: [art] Populate DV Done
35,508,332 UART: [fht] FMC Alias Private Key: 7
35,510,028 UART: [art] Derive CDI
35,510,847 UART: [art] Store in slot 0x4
35,553,810 UART: [art] Derive Key Pair
35,554,856 UART: [art] Store priv key in slot 0x5
37,981,448 UART: [art] Derive Key Pair - Done
37,994,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,700,444 UART: [art] Erasing AUTHORITY.KEYID = 7
39,701,952 UART: [art] PUB.X = 99A3E517580CB7420DD1B42B5212DAA5510A9E70E8E1B9AF365AB7FD853E86988F80DFB867E79AEDB4B952D4B77A4C57
39,709,303 UART: [art] PUB.Y = 96D46E778DB5AAADA4D8C4E151FEB0F76EFD078F9D4A8FC4C6C39E3C4E0F981254D5F3A3D0EB87374B1982572D1621F8
39,716,509 UART: [art] SIG.R = 08881157A48653A64DEBAC9CF03355201E3E6979BE4024545620DC7F36E581A891709FF339F9EBF1C361B7839D663C13
39,723,887 UART: [art] SIG.S = FF905480AC5ADA47F4D342431E65AF33162D99F7B570A41BA2EE86F1B601B10EADAD9BFC2C9A1458C5872A3DBDA84B78
40,702,767 UART: Caliptra RT
40,703,490 UART: [state] CFI Enabled
43,550,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,552,531 UART: [rt] RT listening for mailbox commands...
43,583,923 UART: [rt]cmd =0x494e464f, len=4
43,588,354 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
3,755,241 ready_for_fw is high
3,755,867 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,273,433 >>> mbox cmd response: success
14,274,078 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
18,528,095 UART:
18,528,477 UART: Running Caliptra FMC ...
18,529,595 UART:
18,529,748 UART: [state] CFI Enabled
18,537,811 UART: [fht] FMC Alias Private Key: 7
20,303,929 UART: [art] Extend RT PCRs Done
20,305,153 UART: [art] Lock RT PCRs Done
20,306,872 UART: [art] Populate DV Done
20,312,396 UART: [fht] FMC Alias Private Key: 7
20,313,885 UART: [art] Derive CDI
20,314,625 UART: [art] Store in slot 0x4
20,357,074 UART: [art] Derive Key Pair
20,358,129 UART: [art] Store priv key in slot 0x5
22,785,052 UART: [art] Derive Key Pair - Done
22,797,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,504,340 UART: [art] Erasing AUTHORITY.KEYID = 7
24,505,865 UART: [art] PUB.X = 3221DA83A2DBCBB59983018974DA6CCD7361D6434FD7A08D504079F8E460A74419D2BA9A95A967D5238E70AE894C1CEE
24,513,083 UART: [art] PUB.Y = AB684345EFCEDF6854E784F396C8F2491E88DBC524094C86A56B7492841309BB05BBA0A5F5CA7A6E41FB0EFB91B3D36F
24,520,377 UART: [art] SIG.R = D19DB56B33A44FEC02F43914871F407B982D5788A10590B6890C300CD8489F86AFEDF5699BC6AF735636336BB1BBE28A
24,527,763 UART: [art] SIG.S = 29A71485F84161AE88387B065387FB7434EA7A6B8C35472C1E0B29B7248ED5FA2B95A88CEB893EF5935F099D0C338672
25,505,945 UART: mbox::rt_entry...
25,506,910 UART: ____ _ _ _ ____ _____
25,508,898 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,510,912 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,512,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,514,855 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,516,722 UART: |_|
25,517,583 UART:
25,648,182 UART: [rt] Runtime listening for mailbox commands...
25,655,404 >>> mbox cmd response data (4360 bytes)
25,676,257 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
25,720,608 >>> mbox cmd response data (0 bytes)
27,802,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
35,628,768 >>> mbox cmd response: success
35,665,099 UART:
35,665,444 UART: Running Caliptra FMC ...
35,666,492 UART:
35,666,646 UART: [state] CFI Enabled
35,710,517 UART: [art] Extend RT PCRs Done
35,711,671 UART: [art] Lock RT PCRs Done
35,713,092 UART: [art] Populate DV Done
35,718,792 UART: [fht] FMC Alias Private Key: 7
35,720,476 UART: [art] Derive CDI
35,721,251 UART: [art] Store in slot 0x4
35,763,639 UART: [art] Derive Key Pair
35,764,649 UART: [art] Store priv key in slot 0x5
38,191,842 UART: [art] Derive Key Pair - Done
38,204,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,910,965 UART: [art] Erasing AUTHORITY.KEYID = 7
39,912,474 UART: [art] PUB.X = 6FF05395D8192EC68DFC72FD35A65D8516E77AB7E959F882B3E5A8490D5B33C85F7E04B723BB6EF08C294BEF66CE622B
39,919,756 UART: [art] PUB.Y = 3985D542D01F05AA4867238275872F67BEEEC847DF039FFA7CC1D3B3EF7238647ED189EE194C8746D992226F7D27974E
39,927,005 UART: [art] SIG.R = 94E59208932F36027313608964DE86AA63F7C5C169E35C9AEFAAFB35790CAEF3FEE0909E50A8E466570C3A8F0C28F8F6
39,934,368 UART: [art] SIG.S = CD5050CB5A92C6629E165EB7C9E7DD903BEC6D80755B75BB6CA9BBAF8CFE15092279C273DD5829D806782C7F5EBBF724
40,913,364 UART: Caliptra RT
40,914,078 UART: [state] CFI Enabled
43,761,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
43,763,101 UART: [rt] RT listening for mailbox commands...
43,794,337 UART: [rt]cmd =0x494e464f, len=4
43,798,778 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,670 UART: [state] LifecycleState = Unprovisioned
85,325 UART: [state] DebugLocked = No
86,025 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,641 UART: [kat] SHA2-256
881,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,687 UART: [kat] ++
885,839 UART: [kat] sha1
890,233 UART: [kat] SHA2-256
892,171 UART: [kat] SHA2-384
894,826 UART: [kat] SHA2-512-ACC
896,727 UART: [kat] ECC-384
902,126 UART: [kat] HMAC-384Kdf
906,576 UART: [kat] LMS
1,474,772 UART: [kat] --
1,475,721 UART: [cold-reset] ++
1,476,071 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 ready_for_fw is high
1,480,397 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,014 UART: [idev] Erasing UDS.KEYID = 0
1,505,040 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,630 UART: [idev] --
1,514,687 UART: [ldev] ++
1,514,855 UART: [ldev] CDI.KEYID = 6
1,515,218 UART: [ldev] SUBJECT.KEYID = 5
1,515,644 UART: [ldev] AUTHORITY.KEYID = 7
1,516,107 UART: [ldev] FE.KEYID = 1
1,521,355 UART: [ldev] Erasing FE.KEYID = 1
1,547,216 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,000 UART: [ldev] --
1,586,441 UART: [fwproc] Waiting for Commands...
1,587,094 UART: [fwproc] Received command 0x46574c44
1,587,885 UART: [fwproc] Received Image of size 82832 bytes
2,523,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,551,334 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,582,552 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,669,321 >>> mbox cmd response: success
2,669,321 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,670,373 UART: [afmc] ++
2,670,541 UART: [afmc] CDI.KEYID = 6
2,670,903 UART: [afmc] SUBJECT.KEYID = 7
2,671,328 UART: [afmc] AUTHORITY.KEYID = 5
2,705,781 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,721,809 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,722,589 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,728,298 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,734,181 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,739,864 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,747,550 UART: [afmc] --
2,748,442 UART: [cold-reset] --
2,749,144 UART: [state] Locking Datavault
2,750,277 UART: [state] Locking PCR0, PCR1 and PCR31
2,750,881 UART: [state] Locking ICCM
2,751,311 UART: [exit] Launching FMC @ 0x40000130
2,756,641 UART:
2,756,657 UART: Running Caliptra FMC ...
2,757,065 UART:
2,757,119 UART: [state] CFI Enabled
2,767,461 UART: [fht] FMC Alias Private Key: 7
2,887,011 UART: [art] Extend RT PCRs Done
2,887,439 UART: [art] Lock RT PCRs Done
2,889,159 UART: [art] Populate DV Done
2,897,550 UART: [fht] FMC Alias Private Key: 7
2,898,594 UART: [art] Derive CDI
2,898,874 UART: [art] Store in slot 0x4
2,984,434 UART: [art] Derive Key Pair
2,984,794 UART: [art] Store priv key in slot 0x5
2,998,031 UART: [art] Derive Key Pair - Done
3,012,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,414 UART: [art] PUB.X = BEE60055A7FD609CAFCC29F2E473971D0148A01C34AF5B3282D7EAEC40495926EBF9077EC364F6D385F466A790E3F048
3,035,164 UART: [art] PUB.Y = 4EB135AFD784564C8BE9C3DA2F4FB377E7D9F95FBD954C954A7FB7F0C373A7D9D66AB2BE8BBA3F578F67584113A6F986
3,042,132 UART: [art] SIG.R = 7C1E0D2144B3D7EFCC96542A6D0311FFA893E4052C01675EC0AEA8F491FC589B8732E4E150199DC9DA4D5FFB1B77E0F9
3,048,904 UART: [art] SIG.S = 3A9C3DE1B0A3F6814CD3E17DF53E82D69A16CEC29C4B4EFE206668B8E42C4DA04C88BB0D690532EBCA1E1960C3840DC8
3,072,187 UART: mbox::rt_entry...
3,072,559 UART: ____ _ _ _ ____ _____
3,073,343 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,074,143 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,074,911 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,075,679 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,076,447 UART: |_|
3,076,759 UART:
3,196,155 UART: [rt] Runtime listening for mailbox commands...
3,202,489 >>> mbox cmd response data (4360 bytes)
3,202,490 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,233,272 >>> mbox cmd response data (0 bytes)
3,233,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,233,394 UART:
3,233,410 UART: Running Caliptra ROM ...
3,233,818 UART:
3,233,872 UART: [state] CFI Enabled
3,236,852 UART: [state] LifecycleState = Unprovisioned
3,237,507 UART: [state] DebugLocked = No
3,237,995 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,239,520 UART: [kat] SHA2-256
4,033,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,037,566 UART: [kat] ++
4,037,718 UART: [kat] sha1
4,042,148 UART: [kat] SHA2-256
4,044,086 UART: [kat] SHA2-384
4,046,977 UART: [kat] SHA2-512-ACC
4,048,877 UART: [kat] ECC-384
4,054,386 UART: [kat] HMAC-384Kdf
4,059,032 UART: [kat] LMS
4,627,228 UART: [kat] --
4,628,099 UART: [update-reset] ++
6,009,883 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,065 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,166,332 >>> mbox cmd response: success
6,166,573 UART: [update-reset] Copying MAN_2 To MAN_1
6,174,587 UART: [update-reset Success] --
6,175,578 UART: [state] Locking Datavault
6,176,500 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,104 UART: [state] Locking ICCM
6,177,524 UART: [exit] Launching FMC @ 0x40000130
6,182,854 UART:
6,182,870 UART: Running Caliptra FMC ...
6,183,278 UART:
6,183,332 UART: [state] CFI Enabled
6,272,795 UART: [art] Extend RT PCRs Done
6,273,223 UART: [art] Lock RT PCRs Done
6,274,582 UART: [art] Populate DV Done
6,282,821 UART: [fht] FMC Alias Private Key: 7
6,283,989 UART: [art] Derive CDI
6,284,269 UART: [art] Store in slot 0x4
6,369,851 UART: [art] Derive Key Pair
6,370,211 UART: [art] Store priv key in slot 0x5
6,383,630 UART: [art] Derive Key Pair - Done
6,398,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,413,954 UART: [art] Erasing AUTHORITY.KEYID = 7
6,414,719 UART: [art] PUB.X = 86E99A7C80565405A40C793392A2756321BEFE2DA62AFCC74041167E532FC4DBE1E31B7792EA4995D7066F3B5EC88D39
6,421,482 UART: [art] PUB.Y = 3AB7E4DF28416CE001C580C890380106EAE493A785B12D8CA83A8ED1E61B707FAAE271DDCC133107D8462320D2873144
6,428,422 UART: [art] SIG.R = A08F0BE54059E912E46499271F53A82F035448C02E0E098EDC25F147C279EAF901A49496A182211101C3319D223647F7
6,435,162 UART: [art] SIG.S = 51C9FD78245C2B0D042EB1BB2026CA75D962A8ED64B9B4E2C217FF252E3FE5B863A38689F5C593568B0DA6D55BBFE1B2
6,459,019 UART: Caliptra RT
6,459,270 UART: [state] CFI Enabled
6,835,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,836,716 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,867,136 UART: [rt]cmd =0x494e464f, len=4
6,871,014 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,199 ready_for_fw is high
1,362,199 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,516,835 >>> mbox cmd response: success
2,516,835 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,578,206 UART:
2,578,222 UART: Running Caliptra FMC ...
2,578,630 UART:
2,578,684 UART: [state] CFI Enabled
2,589,502 UART: [fht] FMC Alias Private Key: 7
2,708,218 UART: [art] Extend RT PCRs Done
2,708,646 UART: [art] Lock RT PCRs Done
2,710,196 UART: [art] Populate DV Done
2,718,431 UART: [fht] FMC Alias Private Key: 7
2,719,365 UART: [art] Derive CDI
2,719,645 UART: [art] Store in slot 0x4
2,805,281 UART: [art] Derive Key Pair
2,805,641 UART: [art] Store priv key in slot 0x5
2,818,622 UART: [art] Derive Key Pair - Done
2,833,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,200 UART: [art] Erasing AUTHORITY.KEYID = 7
2,849,965 UART: [art] PUB.X = 7B8B0BDAD44EA8A2F4F6F77B66BE4448FC53DCEE921C72B8AE4474D1F9D87DA5EBB468F5AF0760AFD7D82327E5AD7A2A
2,856,757 UART: [art] PUB.Y = BF48EA41CE287AF437F28848C255041CB14674ACA19C2B59ABF19D82263A58C03B67536884FE1ADDB417043926EA6038
2,863,703 UART: [art] SIG.R = 94A2B46C40BA8B65E8BA07060F4F9A29A460CD84350E159BF6D8AE04D0B4BFD4D931B63A67070C47E05000B1493350AF
2,870,436 UART: [art] SIG.S = 66212721C5165189F5993C6B240475A13B8A9E24E1DCDFEE7BE43FADDC55075F65B33C0BA0B3371B24BF226448EA29AE
2,893,829 UART: mbox::rt_entry...
2,894,201 UART: ____ _ _ _ ____ _____
2,894,985 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,895,785 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,896,553 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,897,321 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,089 UART: |_|
2,898,401 UART:
3,017,854 UART: [rt] Runtime listening for mailbox commands...
3,024,188 >>> mbox cmd response data (4360 bytes)
3,024,189 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,054,971 >>> mbox cmd response data (0 bytes)
3,054,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,868,709 >>> mbox cmd response: success
5,882,097 UART:
5,882,113 UART: Running Caliptra FMC ...
5,882,521 UART:
5,882,575 UART: [state] CFI Enabled
5,972,088 UART: [art] Extend RT PCRs Done
5,972,516 UART: [art] Lock RT PCRs Done
5,973,779 UART: [art] Populate DV Done
5,981,758 UART: [fht] FMC Alias Private Key: 7
5,982,836 UART: [art] Derive CDI
5,983,116 UART: [art] Store in slot 0x4
6,068,860 UART: [art] Derive Key Pair
6,069,220 UART: [art] Store priv key in slot 0x5
6,082,403 UART: [art] Derive Key Pair - Done
6,097,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,112,297 UART: [art] Erasing AUTHORITY.KEYID = 7
6,113,062 UART: [art] PUB.X = 82D16426FDF3A1A5CD2B93AF1418A11135DD8AEC31F274D328A9FC05A2B866B772502264DB20228A05790CFB5F2F63F0
6,119,829 UART: [art] PUB.Y = 1F9DD757776C0EEAA9F61ED824689A9F94219983A2D515412B8BD451D514D1044767FBD7910B94F4F715CBD9ADDDECDE
6,126,782 UART: [art] SIG.R = C91D24451E22D1C242549F524C330D61DE58A5B667CF015D108F93FE6C4AFE0381DB40A5DFBACC565C2AF955424EBAE1
6,133,557 UART: [art] SIG.S = 9431E0D3F3BB56485566C5472EB3E05D627146F930B4AACE5598228E1CAD638F621FFD7E1294BC5470CF770BC273741E
6,157,474 UART: Caliptra RT
6,157,725 UART: [state] CFI Enabled
6,536,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,538,140 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,568,934 UART: [rt]cmd =0x494e464f, len=4
6,572,702 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,501 UART: [state] LifecycleState = Unprovisioned
86,156 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,426 UART: [kat] SHA2-256
882,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,472 UART: [kat] ++
886,624 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,435 UART: [kat] SHA2-512-ACC
897,336 UART: [kat] ECC-384
903,043 UART: [kat] HMAC-384Kdf
907,585 UART: [kat] LMS
1,475,781 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,480,031 UART: [idev] ++
1,480,199 UART: [idev] CDI.KEYID = 6
1,480,559 UART: [idev] SUBJECT.KEYID = 7
1,480,983 UART: [idev] UDS.KEYID = 0
1,481,328 ready_for_fw is high
1,481,328 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,129 UART: [idev] Erasing UDS.KEYID = 0
1,505,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,063 UART: [idev] --
1,515,058 UART: [ldev] ++
1,515,226 UART: [ldev] CDI.KEYID = 6
1,515,589 UART: [ldev] SUBJECT.KEYID = 5
1,516,015 UART: [ldev] AUTHORITY.KEYID = 7
1,516,478 UART: [ldev] FE.KEYID = 1
1,521,732 UART: [ldev] Erasing FE.KEYID = 1
1,546,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,670 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,386 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,407 UART: [fwproc] Received command 0x46574c44
1,588,198 UART: [fwproc] Received Image of size 82832 bytes
2,522,809 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,550,349 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,581,567 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,668,238 >>> mbox cmd response: success
2,668,238 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,669,490 UART: [afmc] ++
2,669,658 UART: [afmc] CDI.KEYID = 6
2,670,020 UART: [afmc] SUBJECT.KEYID = 7
2,670,445 UART: [afmc] AUTHORITY.KEYID = 5
2,706,206 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,722,714 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,723,494 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,729,203 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,735,086 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
2,740,769 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
2,748,557 UART: [afmc] --
2,749,631 UART: [cold-reset] --
2,750,575 UART: [state] Locking Datavault
2,751,660 UART: [state] Locking PCR0, PCR1 and PCR31
2,752,264 UART: [state] Locking ICCM
2,752,902 UART: [exit] Launching FMC @ 0x40000130
2,758,232 UART:
2,758,248 UART: Running Caliptra FMC ...
2,758,656 UART:
2,758,799 UART: [state] CFI Enabled
2,769,723 UART: [fht] FMC Alias Private Key: 7
2,888,807 UART: [art] Extend RT PCRs Done
2,889,235 UART: [art] Lock RT PCRs Done
2,890,831 UART: [art] Populate DV Done
2,898,820 UART: [fht] FMC Alias Private Key: 7
2,899,884 UART: [art] Derive CDI
2,900,164 UART: [art] Store in slot 0x4
2,985,794 UART: [art] Derive Key Pair
2,986,154 UART: [art] Store priv key in slot 0x5
2,999,625 UART: [art] Derive Key Pair - Done
3,014,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,030,204 UART: [art] Erasing AUTHORITY.KEYID = 7
3,030,969 UART: [art] PUB.X = 9DA146A23A42438F4F8966FCE6087F4773181F3442CAB218ADE5F000936330B8D05CEEC2FA3D084EF9A86AE93FB3637E
3,037,719 UART: [art] PUB.Y = F457C0881358183BE834C6EBBF850E52558EE154B3321B4734984FFEB81F3D522902BA56220DD6D0B22022AE2DB49D40
3,044,660 UART: [art] SIG.R = D35FE521D92B13352E002B6BE26EA68E042CFAAFD8A6FE30D66F653F56E15D749C62807EFCBC45355B66D9652EC79986
3,051,415 UART: [art] SIG.S = 7ACE49D541245634A39F8D2D0F19C052E139BEEB6DD47CF36387EDF2F07A2ED3DA4B88668BAE7BA50D1D424BC6CE0D9B
3,074,504 UART: mbox::rt_entry...
3,074,876 UART: ____ _ _ _ ____ _____
3,075,660 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,076,460 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,077,228 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,077,996 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,078,764 UART: |_|
3,079,076 UART:
3,198,473 UART: [rt] Runtime listening for mailbox commands...
3,204,807 >>> mbox cmd response data (4360 bytes)
3,204,808 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,235,590 >>> mbox cmd response data (0 bytes)
3,235,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,235,712 UART:
3,235,728 UART: Running Caliptra ROM ...
3,236,136 UART:
3,236,277 UART: [state] CFI Enabled
3,238,755 UART: [state] LifecycleState = Unprovisioned
3,239,410 UART: [state] DebugLocked = No
3,240,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,241,593 UART: [kat] SHA2-256
4,035,524 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,039,639 UART: [kat] ++
4,039,791 UART: [kat] sha1
4,043,895 UART: [kat] SHA2-256
4,045,833 UART: [kat] SHA2-384
4,048,490 UART: [kat] SHA2-512-ACC
4,050,390 UART: [kat] ECC-384
4,055,969 UART: [kat] HMAC-384Kdf
4,060,489 UART: [kat] LMS
4,628,685 UART: [kat] --
4,629,358 UART: [update-reset] ++
6,010,920 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,011,990 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
6,167,257 >>> mbox cmd response: success
6,167,490 UART: [update-reset] Copying MAN_2 To MAN_1
6,175,504 UART: [update-reset Success] --
6,176,711 UART: [state] Locking Datavault
6,177,347 UART: [state] Locking PCR0, PCR1 and PCR31
6,177,951 UART: [state] Locking ICCM
6,178,537 UART: [exit] Launching FMC @ 0x40000130
6,183,867 UART:
6,183,883 UART: Running Caliptra FMC ...
6,184,291 UART:
6,184,434 UART: [state] CFI Enabled
6,273,723 UART: [art] Extend RT PCRs Done
6,274,151 UART: [art] Lock RT PCRs Done
6,275,400 UART: [art] Populate DV Done
6,283,609 UART: [fht] FMC Alias Private Key: 7
6,284,623 UART: [art] Derive CDI
6,284,903 UART: [art] Store in slot 0x4
6,370,511 UART: [art] Derive Key Pair
6,370,871 UART: [art] Store priv key in slot 0x5
6,384,410 UART: [art] Derive Key Pair - Done
6,399,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,414,405 UART: [art] Erasing AUTHORITY.KEYID = 7
6,415,170 UART: [art] PUB.X = 84A3E89662A9EAAD0AB17A30BA7D5C0DF0C28CB20712DA11C864518046B2B5B933F1BFD7A54F6925FE226C7C2B043EFD
6,421,944 UART: [art] PUB.Y = 61A1287C18BAE27BC92D34E4653015CC6CB10423E1328FBA5A7B865A0BB8B369CAA01076FAE5E2FA6710A9D263B3C528
6,428,898 UART: [art] SIG.R = 8037416464E132485646E9291661B38D1C47AAF0B189ED6BD1C62C4FCEAF9DC6B77F740DBCAA11D1AA00727EDB810453
6,435,648 UART: [art] SIG.S = 36783F3251A610F6C01CE4C62F1F272B5179283C9FA72652498557AB0EE1CA9581FD3C3689E1AF9993457B9466041F76
6,459,908 UART: Caliptra RT
6,460,251 UART: [state] CFI Enabled
6,831,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,832,747 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,863,263 UART: [rt]cmd =0x494e464f, len=4
6,867,029 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,936 ready_for_fw is high
1,362,936 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,517,492 >>> mbox cmd response: success
2,517,492 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,578,171 UART:
2,578,187 UART: Running Caliptra FMC ...
2,578,595 UART:
2,578,738 UART: [state] CFI Enabled
2,589,316 UART: [fht] FMC Alias Private Key: 7
2,708,192 UART: [art] Extend RT PCRs Done
2,708,620 UART: [art] Lock RT PCRs Done
2,710,474 UART: [art] Populate DV Done
2,718,813 UART: [fht] FMC Alias Private Key: 7
2,719,795 UART: [art] Derive CDI
2,720,075 UART: [art] Store in slot 0x4
2,805,563 UART: [art] Derive Key Pair
2,805,923 UART: [art] Store priv key in slot 0x5
2,819,426 UART: [art] Derive Key Pair - Done
2,834,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,849,349 UART: [art] Erasing AUTHORITY.KEYID = 7
2,850,114 UART: [art] PUB.X = 47093BFF864ADFB7468E4F7F18E253AE02CAB4975B7B8B348BA25143892269A845F34FEC4D3EC24BCB8813241804C698
2,856,879 UART: [art] PUB.Y = 67FB8856BB43A27C5AB75683929BBFC0C4B3595DF9A70CE456EB26A8F72354C12AC9A6E088013FE5DBD222B0BABB0C16
2,863,836 UART: [art] SIG.R = 405E1B6B665123023C10FEFE57D5F0AC099656B73CE751B8708D580062A0958C47AE8F918F0510C8C9F42579039CEB7B
2,870,570 UART: [art] SIG.S = 8AE70481A4C96DAD4834F249431E56360DB762B406B4FC00C2F9109FBA3804E7CB9C6C68B3680D81FBB68259BB329D58
2,894,469 UART: mbox::rt_entry...
2,894,841 UART: ____ _ _ _ ____ _____
2,895,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,896,425 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,897,193 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,897,961 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,898,729 UART: |_|
2,899,041 UART:
3,017,368 UART: [rt] Runtime listening for mailbox commands...
3,023,702 >>> mbox cmd response data (4360 bytes)
3,023,703 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
3,054,485 >>> mbox cmd response data (0 bytes)
3,054,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,868,346 >>> mbox cmd response: success
5,881,900 UART:
5,881,916 UART: Running Caliptra FMC ...
5,882,324 UART:
5,882,467 UART: [state] CFI Enabled
5,971,216 UART: [art] Extend RT PCRs Done
5,971,644 UART: [art] Lock RT PCRs Done
5,973,245 UART: [art] Populate DV Done
5,981,458 UART: [fht] FMC Alias Private Key: 7
5,982,434 UART: [art] Derive CDI
5,982,714 UART: [art] Store in slot 0x4
6,068,270 UART: [art] Derive Key Pair
6,068,630 UART: [art] Store priv key in slot 0x5
6,081,545 UART: [art] Derive Key Pair - Done
6,096,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,111,803 UART: [art] Erasing AUTHORITY.KEYID = 7
6,112,568 UART: [art] PUB.X = 1A90361375E780ADFF4F4D219C418A26D392A4997CCFD4B3FC26EE2B34D49339C482DFEF6BA941E6279849DF2728311F
6,119,344 UART: [art] PUB.Y = 949067713E6D83F30A988CCF4678E2A0C916C3BEDB49DB7FADA0EFF464750389B4C16996923FD55009D8595CF6C174CD
6,126,291 UART: [art] SIG.R = 6ABE24D207B0E881B9C007924AE4D1E25AF06549F23BD46A21F8DE9483B7D906C2A34B406E272D8EB280369BB9251922
6,133,054 UART: [art] SIG.S = A95D38F4DAA9473EAEDDEE43D015EE80B46A2AB99383377BBAC3DEE20A7F17D42D831B64D7F2F0A0F4CDCD08969283E9
6,156,798 UART: Caliptra RT
6,157,141 UART: [state] CFI Enabled
6,534,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,535,881 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,566,369 UART: [rt]cmd =0x494e464f, len=4
6,570,055 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,316 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,519 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
891,344 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,448 UART: [kat] ++
895,600 UART: [kat] sha1
899,822 UART: [kat] SHA2-256
901,762 UART: [kat] SHA2-384
904,553 UART: [kat] SHA2-512-ACC
906,454 UART: [kat] ECC-384
915,945 UART: [kat] HMAC-384Kdf
920,523 UART: [kat] LMS
1,168,835 UART: [kat] --
1,169,654 UART: [cold-reset] ++
1,170,228 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 ready_for_fw is high
1,174,110 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,835 UART: [idev] Erasing UDS.KEYID = 0
1,198,883 UART: [idev] Sha1 KeyId Algorithm
1,207,583 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,258 UART: [ldev] Erasing FE.KEYID = 1
1,240,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,880 UART: [ldev] --
1,280,187 UART: [fwproc] Wait for Commands...
1,280,906 UART: [fwproc] Recv command 0x46574c44
1,281,639 UART: [fwproc] Recv'd Img size: 82832 bytes
2,217,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,244,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,275,975 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,362,738 >>> mbox cmd response: success
2,362,738 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,363,856 UART: [afmc] ++
2,364,024 UART: [afmc] CDI.KEYID = 6
2,364,387 UART: [afmc] SUBJECT.KEYID = 7
2,364,813 UART: [afmc] AUTHORITY.KEYID = 5
2,400,764 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,375 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,124 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,834 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,715 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,416 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,417 UART: [afmc] --
2,444,428 UART: [cold-reset] --
2,445,200 UART: [state] Locking Datavault
2,446,327 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,931 UART: [state] Locking ICCM
2,447,423 UART: [exit] Launching FMC @ 0x40000130
2,452,753 UART:
2,452,769 UART: Running Caliptra FMC ...
2,453,177 UART:
2,453,231 UART: [state] CFI Enabled
2,463,711 UART: [fht] FMC Alias Private Key: 7
2,582,297 UART: [art] Extend RT PCRs Done
2,582,725 UART: [art] Lock RT PCRs Done
2,584,153 UART: [art] Populate DV Done
2,592,264 UART: [fht] FMC Alias Private Key: 7
2,593,258 UART: [art] Derive CDI
2,593,538 UART: [art] Store in slot 0x4
2,679,167 UART: [art] Derive Key Pair
2,679,527 UART: [art] Store priv key in slot 0x5
2,693,067 UART: [art] Derive Key Pair - Done
2,707,983 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,318 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,083 UART: [art] PUB.X = 71A0E43CC1F57D1952A7C8DEC0E71E7259C33A5C23E4423E9634C2DE6EDF321CCE5353B927123722BA040471540A51B3
2,730,846 UART: [art] PUB.Y = FCE1B7522526698B6CDEAD2FDB4D43C667D08C949B960C167F5258A343AF38875CC030EE026E96974E18D39453046E78
2,737,787 UART: [art] SIG.R = BDF8FED19A1E1CAF7DF01E09C21EA4A54ADAD49200DACE366AE969358AD6B53CCBB1B0F70DBBB2072E7356DBC02D34B6
2,744,558 UART: [art] SIG.S = 40D63CBD687148C6D09A4BDFB019EDA0E7698F503C7A6FB73D142523ECA9D2C98908FE6AD218B686F230124AD5429344
2,768,039 UART: mbox::rt_entry...
2,768,411 UART: ____ _ _ _ ____ _____
2,769,195 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,769,995 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,763 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,531 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,299 UART: |_|
2,772,611 UART:
2,890,301 UART: [rt] Runtime listening for mailbox commands...
2,896,635 >>> mbox cmd response data (4360 bytes)
2,896,636 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,927,418 >>> mbox cmd response data (0 bytes)
2,927,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,927,537 UART:
2,927,553 UART: Running Caliptra ROM ...
2,927,961 UART:
2,928,016 UART: [state] CFI Enabled
2,931,128 UART: [state] LifecycleState = Unprovisioned
2,931,783 UART: [state] DebugLocked = No
2,932,447 UART: [state] WD Timer not started. Device not locked for debugging
2,933,573 UART: [kat] SHA2-256
3,737,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,741,227 UART: [kat] ++
3,741,379 UART: [kat] sha1
3,745,727 UART: [kat] SHA2-256
3,747,667 UART: [kat] SHA2-384
3,750,506 UART: [kat] SHA2-512-ACC
3,752,406 UART: [kat] ECC-384
3,761,837 UART: [kat] HMAC-384Kdf
3,766,595 UART: [kat] LMS
4,014,907 UART: [kat] --
4,015,815 UART: [update-reset] ++
5,375,138 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,376,193 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,531,408 >>> mbox cmd response: success
5,531,571 UART: [update-reset] Copying MAN_2 To MAN_1
5,539,585 UART: [update-reset Success] --
5,540,584 UART: [state] Locking Datavault
5,541,388 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,992 UART: [state] Locking ICCM
5,542,424 UART: [exit] Launching FMC @ 0x40000130
5,547,754 UART:
5,547,770 UART: Running Caliptra FMC ...
5,548,178 UART:
5,548,232 UART: [state] CFI Enabled
5,637,721 UART: [art] Extend RT PCRs Done
5,638,149 UART: [art] Lock RT PCRs Done
5,639,280 UART: [art] Populate DV Done
5,647,363 UART: [fht] FMC Alias Private Key: 7
5,648,379 UART: [art] Derive CDI
5,648,659 UART: [art] Store in slot 0x4
5,734,184 UART: [art] Derive Key Pair
5,734,544 UART: [art] Store priv key in slot 0x5
5,748,052 UART: [art] Derive Key Pair - Done
5,762,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,778,006 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,771 UART: [art] PUB.X = 20DCA8484A1FA478F6E33CC4908B23B5AA8DDEC14B1B51B70137298A7887E0280D87787EF26C466D4CDDE3CD4FD88A7D
5,785,549 UART: [art] PUB.Y = 588E6FA1D66FFEBD7EC5D55DD0230B417CC61A554F91ACDB303A44F57786E04E1110F4C810AC6299DA97B32927B684CD
5,792,508 UART: [art] SIG.R = B68AFB0658B53DCFF28F02FA8166A02F335D1349FBFC1DCF6BB4CFB139D89CC69A0021246E61B2617559A44BF3B362BC
5,799,266 UART: [art] SIG.S = 7398436BA4C1649F826975C9939FBBDDAF2CBAF68E23C59F27BE4EFFCB252B2E647E396DFA557F9C438F14AD568EBB1E
5,823,084 UART: Caliptra RT
5,823,335 UART: [state] CFI Enabled
6,195,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,196,750 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,227,206 UART: [rt]cmd =0x494e464f, len=4
6,231,056 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,608 ready_for_fw is high
1,059,608 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,123 >>> mbox cmd response: success
2,217,123 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,620 UART:
2,279,636 UART: Running Caliptra FMC ...
2,280,044 UART:
2,280,098 UART: [state] CFI Enabled
2,290,406 UART: [fht] FMC Alias Private Key: 7
2,409,600 UART: [art] Extend RT PCRs Done
2,410,028 UART: [art] Lock RT PCRs Done
2,411,356 UART: [art] Populate DV Done
2,419,391 UART: [fht] FMC Alias Private Key: 7
2,420,529 UART: [art] Derive CDI
2,420,809 UART: [art] Store in slot 0x4
2,506,610 UART: [art] Derive Key Pair
2,506,970 UART: [art] Store priv key in slot 0x5
2,520,204 UART: [art] Derive Key Pair - Done
2,534,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,550,752 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,517 UART: [art] PUB.X = 802462F9D9CB6C17398993EA37582F5EE956712F8007CCCEE869CC0C3CA7D133EDCDB01DF839AD933B8975C61E85D552
2,558,289 UART: [art] PUB.Y = A62A5C57E5D0B07AEF5B3B8913CB45F8302E3E65715E5370F7A24BB701F31A34130DF8EEE3A213BAFC9FCF8A5B9234F6
2,565,249 UART: [art] SIG.R = 0A9BE798DDD2FE8C88BA3333841D6299DAFBA8ACC5C6DF79C50EECCDA33E7A8F601C8DC36CCD87AC11D7AD2B9A5E2F89
2,572,047 UART: [art] SIG.S = 842CCE96EFCA60BAA7AD9410190368F4AEE8785522C91BC35D4E878383DB62CE2D46A47F1A835502808DAEAB64408192
2,595,671 UART: mbox::rt_entry...
2,596,043 UART: ____ _ _ _ ____ _____
2,596,827 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,627 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,395 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,163 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,599,931 UART: |_|
2,600,243 UART:
2,718,651 UART: [rt] Runtime listening for mailbox commands...
2,724,985 >>> mbox cmd response data (4360 bytes)
2,724,986 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,768 >>> mbox cmd response data (0 bytes)
2,755,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,244,308 >>> mbox cmd response: success
5,257,647 UART:
5,257,663 UART: Running Caliptra FMC ...
5,258,071 UART:
5,258,125 UART: [state] CFI Enabled
5,347,728 UART: [art] Extend RT PCRs Done
5,348,156 UART: [art] Lock RT PCRs Done
5,349,223 UART: [art] Populate DV Done
5,357,720 UART: [fht] FMC Alias Private Key: 7
5,358,654 UART: [art] Derive CDI
5,358,934 UART: [art] Store in slot 0x4
5,444,895 UART: [art] Derive Key Pair
5,445,255 UART: [art] Store priv key in slot 0x5
5,458,291 UART: [art] Derive Key Pair - Done
5,472,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,536 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,301 UART: [art] PUB.X = E4CD6F1A2A5890D7291F5D98829575B6C6BACC5731D6E6F03E6794D79BC9B3AE00404C5091ED2A3180364FD9A5013AB1
5,496,052 UART: [art] PUB.Y = 3BE15D83C73581595319F2A656468ABA89628E6F339D41BF128988046EDF08784E65F853C1A8C37134911DE31A74C80E
5,502,985 UART: [art] SIG.R = E13D9E096A5761DAF00610FA3BF87496CD0FD83ACA52D81F3A9636D2677F30EDEB9B50D2F30E676E93073D3ABDE289AD
5,509,756 UART: [art] SIG.S = 0B62A4C22A9E93541E04DC1349459A3DCB37B2EA85E9FE76F0147D43B356E674FAE03B087F6E2D1952998DA1D37D1F46
5,533,861 UART: Caliptra RT
5,534,112 UART: [state] CFI Enabled
5,904,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,906,489 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,937,043 UART: [rt]cmd =0x494e464f, len=4
5,940,871 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,426 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
891,201 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,305 UART: [kat] ++
895,457 UART: [kat] sha1
899,653 UART: [kat] SHA2-256
901,593 UART: [kat] SHA2-384
904,330 UART: [kat] SHA2-512-ACC
906,231 UART: [kat] ECC-384
915,942 UART: [kat] HMAC-384Kdf
920,450 UART: [kat] LMS
1,168,762 UART: [kat] --
1,169,811 UART: [cold-reset] ++
1,170,379 UART: [fht] FHT @ 0x50003400
1,172,863 UART: [idev] ++
1,173,031 UART: [idev] CDI.KEYID = 6
1,173,392 UART: [idev] SUBJECT.KEYID = 7
1,173,817 UART: [idev] UDS.KEYID = 0
1,174,163 ready_for_fw is high
1,174,163 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,746 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,604 UART: [idev] --
1,208,665 UART: [ldev] ++
1,208,833 UART: [ldev] CDI.KEYID = 6
1,209,197 UART: [ldev] SUBJECT.KEYID = 5
1,209,624 UART: [ldev] AUTHORITY.KEYID = 7
1,210,087 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,482 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,124 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,840 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,661 UART: [ldev] --
1,281,984 UART: [fwproc] Wait for Commands...
1,282,635 UART: [fwproc] Recv command 0x46574c44
1,283,368 UART: [fwproc] Recv'd Img size: 82832 bytes
2,218,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,481 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,656 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,415 >>> mbox cmd response: success
2,363,415 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,657 UART: [afmc] ++
2,364,825 UART: [afmc] CDI.KEYID = 6
2,365,188 UART: [afmc] SUBJECT.KEYID = 7
2,365,614 UART: [afmc] AUTHORITY.KEYID = 5
2,400,927 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,051 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,761 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,642 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,343 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,148 UART: [afmc] --
2,444,067 UART: [cold-reset] --
2,444,965 UART: [state] Locking Datavault
2,446,390 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,994 UART: [state] Locking ICCM
2,447,536 UART: [exit] Launching FMC @ 0x40000130
2,452,866 UART:
2,452,882 UART: Running Caliptra FMC ...
2,453,290 UART:
2,453,433 UART: [state] CFI Enabled
2,464,223 UART: [fht] FMC Alias Private Key: 7
2,583,049 UART: [art] Extend RT PCRs Done
2,583,477 UART: [art] Lock RT PCRs Done
2,584,993 UART: [art] Populate DV Done
2,593,318 UART: [fht] FMC Alias Private Key: 7
2,594,310 UART: [art] Derive CDI
2,594,590 UART: [art] Store in slot 0x4
2,680,217 UART: [art] Derive Key Pair
2,680,577 UART: [art] Store priv key in slot 0x5
2,693,865 UART: [art] Derive Key Pair - Done
2,708,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,724,231 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,996 UART: [art] PUB.X = 16C452E954D7F5254370D9FB96C23E9C9F35D081A6AACC7E838BF3A8753AA1845DA7E1283296180E01BE119253647422
2,731,756 UART: [art] PUB.Y = F063A2BF9EF1651C6CE3F756F0B1E4C964AF885244FEBAFEFA67CA595CB933B4892D48CB24097E8D758B59525176783C
2,738,713 UART: [art] SIG.R = 58521D0B88E681EAF255A6B567F9B99E5F76456D260780B3FC97DAE5581F5B1DE8E037FAFD18EB1D8BE2674DB39B16B4
2,745,489 UART: [art] SIG.S = 81C3E720EC0B95FC81AA18432D6DCD5522E35BCAF0B7295CC019C7C497AD5F55098455203A9BB8C047C5B3DD781AE4A4
2,768,725 UART: mbox::rt_entry...
2,769,097 UART: ____ _ _ _ ____ _____
2,769,881 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,681 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,771,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,772,217 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,985 UART: |_|
2,773,297 UART:
2,891,631 UART: [rt] Runtime listening for mailbox commands...
2,897,965 >>> mbox cmd response data (4360 bytes)
2,897,966 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,928,748 >>> mbox cmd response data (0 bytes)
2,928,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,928,867 UART:
2,928,883 UART: Running Caliptra ROM ...
2,929,291 UART:
2,929,433 UART: [state] CFI Enabled
2,931,901 UART: [state] LifecycleState = Unprovisioned
2,932,556 UART: [state] DebugLocked = No
2,933,204 UART: [state] WD Timer not started. Device not locked for debugging
2,934,440 UART: [kat] SHA2-256
3,737,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,742,094 UART: [kat] ++
3,742,246 UART: [kat] sha1
3,746,622 UART: [kat] SHA2-256
3,748,562 UART: [kat] SHA2-384
3,751,231 UART: [kat] SHA2-512-ACC
3,753,131 UART: [kat] ECC-384
3,762,950 UART: [kat] HMAC-384Kdf
3,767,504 UART: [kat] LMS
4,015,816 UART: [kat] --
4,016,666 UART: [update-reset] ++
5,374,251 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,375,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,530,617 >>> mbox cmd response: success
5,530,924 UART: [update-reset] Copying MAN_2 To MAN_1
5,538,938 UART: [update-reset Success] --
5,539,839 UART: [state] Locking Datavault
5,540,659 UART: [state] Locking PCR0, PCR1 and PCR31
5,541,263 UART: [state] Locking ICCM
5,541,789 UART: [exit] Launching FMC @ 0x40000130
5,547,119 UART:
5,547,135 UART: Running Caliptra FMC ...
5,547,543 UART:
5,547,686 UART: [state] CFI Enabled
5,636,899 UART: [art] Extend RT PCRs Done
5,637,327 UART: [art] Lock RT PCRs Done
5,638,678 UART: [art] Populate DV Done
5,647,005 UART: [fht] FMC Alias Private Key: 7
5,648,063 UART: [art] Derive CDI
5,648,343 UART: [art] Store in slot 0x4
5,734,366 UART: [art] Derive Key Pair
5,734,726 UART: [art] Store priv key in slot 0x5
5,747,996 UART: [art] Derive Key Pair - Done
5,762,722 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,778,137 UART: [art] Erasing AUTHORITY.KEYID = 7
5,778,902 UART: [art] PUB.X = E04F93DD4532F9DCBEA9A9FA9392FE0F0B257C410352079E9AA92D986A0F7D8C824E9ED944E347F6F3EB638405D83C84
5,785,664 UART: [art] PUB.Y = DF8537E58D795CD595F65942AD3DEE69BADF60510E110F50D8207A8B80E5E18B90C338DBC9978424B1CFA0D8CB56AA50
5,792,620 UART: [art] SIG.R = 442CDB8F20ECDADCC625A9B9F76FA3168FE10CAFDA3DF3049A5703223F9107C2B711BCAB4FC5E377FB99808AEEE1828B
5,799,402 UART: [art] SIG.S = E6CD7F684887DA42E178D802E99F0533708ECCE10F6AD7EC312F371FF34A66BF93FE7E9FA334B9ECC282D86FEBDD5E6B
5,822,597 UART: Caliptra RT
5,822,940 UART: [state] CFI Enabled
6,200,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,201,791 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,232,393 UART: [rt]cmd =0x494e464f, len=4
6,235,963 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,199 ready_for_fw is high
1,059,199 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,598 >>> mbox cmd response: success
2,217,598 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,280,179 UART:
2,280,195 UART: Running Caliptra FMC ...
2,280,603 UART:
2,280,746 UART: [state] CFI Enabled
2,291,328 UART: [fht] FMC Alias Private Key: 7
2,409,852 UART: [art] Extend RT PCRs Done
2,410,280 UART: [art] Lock RT PCRs Done
2,411,576 UART: [art] Populate DV Done
2,419,955 UART: [fht] FMC Alias Private Key: 7
2,420,931 UART: [art] Derive CDI
2,421,211 UART: [art] Store in slot 0x4
2,506,626 UART: [art] Derive Key Pair
2,506,986 UART: [art] Store priv key in slot 0x5
2,520,378 UART: [art] Derive Key Pair - Done
2,535,348 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,001 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,766 UART: [art] PUB.X = 4F0B0029DC0FE95549E3F46D608C5192ECD954563F1A0EA51FBA61A287F43F35A4509928D04DF9C6CCC210B41D58F676
2,558,511 UART: [art] PUB.Y = 9A6FF8A3817819589F0C9D86CEC06BDAB04289ACF2CBE0DAA559DC163EC912B4B3EAD97F1B251282EF69BDAE09ECD7A0
2,565,481 UART: [art] SIG.R = AFC97DACD4ACD521DAD702B25F724C50F3B046150BD6B3F57449DB4CC3DC7CE27D3BF8C8375503D394AD012DF4B0B8A8
2,572,261 UART: [art] SIG.S = 126A370D584AC688EEB3663D3330458F24CB6D581CF03EA6C8A0D539B60880E6D126BB92A40E3293064BB376FF3EEC87
2,595,863 UART: mbox::rt_entry...
2,596,235 UART: ____ _ _ _ ____ _____
2,597,019 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,597,819 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,587 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,355 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,123 UART: |_|
2,600,435 UART:
2,718,173 UART: [rt] Runtime listening for mailbox commands...
2,724,507 >>> mbox cmd response data (4360 bytes)
2,724,508 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,755,290 >>> mbox cmd response data (0 bytes)
2,755,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,243,813 >>> mbox cmd response: success
5,257,062 UART:
5,257,078 UART: Running Caliptra FMC ...
5,257,486 UART:
5,257,629 UART: [state] CFI Enabled
5,347,098 UART: [art] Extend RT PCRs Done
5,347,526 UART: [art] Lock RT PCRs Done
5,348,729 UART: [art] Populate DV Done
5,356,940 UART: [fht] FMC Alias Private Key: 7
5,358,084 UART: [art] Derive CDI
5,358,364 UART: [art] Store in slot 0x4
5,444,467 UART: [art] Derive Key Pair
5,444,827 UART: [art] Store priv key in slot 0x5
5,458,067 UART: [art] Derive Key Pair - Done
5,472,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,487,735 UART: [art] Erasing AUTHORITY.KEYID = 7
5,488,500 UART: [art] PUB.X = AFB490A9866750FD6B933DFBD7B3B7A70CB9F98D8C44CA5F6445A6C60A37AD8116FD4A0D559A3F8739F33930D01837EE
5,495,273 UART: [art] PUB.Y = AEBB3C223F762F83A7B6033D14F930D0789D98FD98FD38858F06B71B19FD3E039CF9DB1644D3638F80AD55B0860EE062
5,502,217 UART: [art] SIG.R = 476973012C0CF13852C415DB1805F0C9F1F711B0178F6FA3C5897DA5B1D8CBFEC0F0A02A681996C57B6D35F04F1D3787
5,508,982 UART: [art] SIG.S = FC4A920C703EFD3CAAEECA12A127308AA31686A8C9FA9AB05347B077D9A8BF2A1687C6D061AB078056748293B8577EC2
5,532,778 UART: Caliptra RT
5,533,121 UART: [state] CFI Enabled
5,908,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,909,800 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,940,402 UART: [rt]cmd =0x494e464f, len=4
5,944,184 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Unprovisioned
85,889 UART: [state] DebugLocked = No
86,499 UART: [state] WD Timer not started. Device not locked for debugging
87,624 UART: [kat] SHA2-256
893,274 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,399 UART: [kat] ++
897,551 UART: [kat] sha1
901,811 UART: [kat] SHA2-256
903,751 UART: [kat] SHA2-384
906,448 UART: [kat] SHA2-512-ACC
908,349 UART: [kat] ECC-384
918,276 UART: [kat] HMAC-384Kdf
922,902 UART: [kat] LMS
1,171,230 UART: [kat] --
1,171,731 UART: [cold-reset] ++
1,172,289 UART: [fht] FHT @ 0x50003400
1,175,126 UART: [idev] ++
1,175,294 UART: [idev] CDI.KEYID = 6
1,175,654 UART: [idev] SUBJECT.KEYID = 7
1,176,078 UART: [idev] UDS.KEYID = 0
1,176,423 ready_for_fw is high
1,176,423 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,194 UART: [idev] Erasing UDS.KEYID = 0
1,202,165 UART: [idev] Sha1 KeyId Algorithm
1,210,717 UART: [idev] --
1,211,703 UART: [ldev] ++
1,211,871 UART: [ldev] CDI.KEYID = 6
1,212,234 UART: [ldev] SUBJECT.KEYID = 5
1,212,660 UART: [ldev] AUTHORITY.KEYID = 7
1,213,123 UART: [ldev] FE.KEYID = 1
1,218,097 UART: [ldev] Erasing FE.KEYID = 1
1,244,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,901 UART: [ldev] --
1,284,168 UART: [fwproc] Wait for Commands...
1,284,924 UART: [fwproc] Recv command 0x46574c44
1,285,652 UART: [fwproc] Recv'd Img size: 82832 bytes
2,221,486 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,249,249 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,280,419 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,367,238 >>> mbox cmd response: success
2,367,238 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,368,358 UART: [afmc] ++
2,368,526 UART: [afmc] CDI.KEYID = 6
2,368,888 UART: [afmc] SUBJECT.KEYID = 7
2,369,313 UART: [afmc] AUTHORITY.KEYID = 5
2,405,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,421,669 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,422,417 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,428,126 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,434,009 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,439,710 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,447,736 UART: [afmc] --
2,448,788 UART: [cold-reset] --
2,449,644 UART: [state] Locking Datavault
2,451,033 UART: [state] Locking PCR0, PCR1 and PCR31
2,451,637 UART: [state] Locking ICCM
2,452,075 UART: [exit] Launching FMC @ 0x40000130
2,457,405 UART:
2,457,421 UART: Running Caliptra FMC ...
2,457,829 UART:
2,457,883 UART: [state] CFI Enabled
2,468,275 UART: [fht] FMC Alias Private Key: 7
2,587,433 UART: [art] Extend RT PCRs Done
2,587,861 UART: [art] Lock RT PCRs Done
2,589,607 UART: [art] Populate DV Done
2,597,738 UART: [fht] FMC Alias Private Key: 7
2,598,702 UART: [art] Derive CDI
2,598,982 UART: [art] Store in slot 0x4
2,684,881 UART: [art] Derive Key Pair
2,685,241 UART: [art] Store priv key in slot 0x5
2,698,451 UART: [art] Derive Key Pair - Done
2,712,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,727,947 UART: [art] Erasing AUTHORITY.KEYID = 7
2,728,712 UART: [art] PUB.X = E369DF8859149252E85CDBF217343A8FC272E7F058B06A10835DDB2F6A75E34C92A6FA9113066782BF7D5A5462D51712
2,735,477 UART: [art] PUB.Y = A028C6CC97F9AB9640C87E8D8CC43605163C7B4C8CE81D1C249174EB7886591160D02FC5DB08A40133377B1C89AC0B7B
2,742,419 UART: [art] SIG.R = 47D36F7CCD59A519CFCA66BA2DCB2DBFB4DC2DA15ED95984E598B7E7C180E12F2D6B1F4BDA61C264862AD4F258DAE3D8
2,749,217 UART: [art] SIG.S = 2F4164626DCB5549EA0B40B41DD38F30511B0A9ACB06E2F28623C28FD4B58BCE9501ECC199BE2C0637536D5F6F895FA8
2,773,210 UART: mbox::rt_entry...
2,773,582 UART: ____ _ _ _ ____ _____
2,774,366 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,775,166 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,775,934 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,776,702 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,777,470 UART: |_|
2,777,782 UART:
2,895,955 UART: [rt] Runtime listening for mailbox commands...
2,902,289 >>> mbox cmd response data (4360 bytes)
2,902,290 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,933,072 >>> mbox cmd response data (0 bytes)
2,933,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,933,191 UART:
2,933,207 UART: Running Caliptra ROM ...
2,933,615 UART:
2,933,670 UART: [state] CFI Enabled
2,936,100 UART: [state] LifecycleState = Unprovisioned
2,936,755 UART: [state] DebugLocked = No
2,937,449 UART: [state] WD Timer not started. Device not locked for debugging
2,938,591 UART: [kat] SHA2-256
3,744,241 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,748,366 UART: [kat] ++
3,748,518 UART: [kat] sha1
3,752,862 UART: [kat] SHA2-256
3,754,802 UART: [kat] SHA2-384
3,757,467 UART: [kat] SHA2-512-ACC
3,759,367 UART: [kat] ECC-384
3,768,844 UART: [kat] HMAC-384Kdf
3,773,392 UART: [kat] LMS
4,021,720 UART: [kat] --
4,022,664 UART: [update-reset] ++
5,381,496 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,382,579 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,537,794 >>> mbox cmd response: success
5,538,033 UART: [update-reset] Copying MAN_2 To MAN_1
5,546,047 UART: [update-reset Success] --
5,547,068 UART: [state] Locking Datavault
5,547,756 UART: [state] Locking PCR0, PCR1 and PCR31
5,548,360 UART: [state] Locking ICCM
5,549,004 UART: [exit] Launching FMC @ 0x40000130
5,554,334 UART:
5,554,350 UART: Running Caliptra FMC ...
5,554,758 UART:
5,554,812 UART: [state] CFI Enabled
5,643,555 UART: [art] Extend RT PCRs Done
5,643,983 UART: [art] Lock RT PCRs Done
5,645,164 UART: [art] Populate DV Done
5,653,737 UART: [fht] FMC Alias Private Key: 7
5,654,893 UART: [art] Derive CDI
5,655,173 UART: [art] Store in slot 0x4
5,740,752 UART: [art] Derive Key Pair
5,741,112 UART: [art] Store priv key in slot 0x5
5,753,878 UART: [art] Derive Key Pair - Done
5,768,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,784,160 UART: [art] Erasing AUTHORITY.KEYID = 7
5,784,925 UART: [art] PUB.X = 6CEA1FF4D1F4B4F8248BAA69A4FEA466A426EA422C4D9575AAC0C66DC266741A937141E520F11B82CDCC0B8FB57A29F4
5,791,710 UART: [art] PUB.Y = 16FB35F41FF0B7E58BD66AEF11DA18810A7125E04FBFD19D8016E0E3EC42D735E0D6D5702512FC3EA5A014D91A417BFD
5,798,673 UART: [art] SIG.R = B9B4155C3B5C8E16F70EF06DA56D6B657F25C5D426C9785938FAD4EC5A4B5FC2F962E454C9711D03410E84E40634F5F0
5,805,437 UART: [art] SIG.S = 78D5AB9047192F7B385BF7A7E18CA72760C1082D1D2A739D71638DB76ECBB9D8B2557B2D11F42511A76AA5F67EC18350
5,829,196 UART: Caliptra RT
5,829,447 UART: [state] CFI Enabled
6,201,819 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,203,128 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,233,652 UART: [rt]cmd =0x494e464f, len=4
6,237,308 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,613 ready_for_fw is high
1,060,613 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,635 >>> mbox cmd response: success
2,217,635 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,278,776 UART:
2,278,792 UART: Running Caliptra FMC ...
2,279,200 UART:
2,279,254 UART: [state] CFI Enabled
2,289,828 UART: [fht] FMC Alias Private Key: 7
2,408,406 UART: [art] Extend RT PCRs Done
2,408,834 UART: [art] Lock RT PCRs Done
2,410,628 UART: [art] Populate DV Done
2,419,095 UART: [fht] FMC Alias Private Key: 7
2,420,071 UART: [art] Derive CDI
2,420,351 UART: [art] Store in slot 0x4
2,506,198 UART: [art] Derive Key Pair
2,506,558 UART: [art] Store priv key in slot 0x5
2,520,558 UART: [art] Derive Key Pair - Done
2,535,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,171 UART: [art] Erasing AUTHORITY.KEYID = 7
2,551,936 UART: [art] PUB.X = BBC1681CF0FBB08A8792960CA2E0CBD8692633FB3849A0BB4DB9B052B61131FED402D1BD6FF4E63615C74AA0BE7CEAE6
2,558,722 UART: [art] PUB.Y = F012FA1AAD99C8EDEC2756680B2E111240DCDEF84BD84DD4C355D2588ABE1393CF34C33872F4FFBD9F86B46FFB23226A
2,565,689 UART: [art] SIG.R = 4E91CE647C77A3B68A972F0A8E907977821AF008BAEA1220FC00D6F616BC51320BDC3F067D073E21F5F83FB21F60447B
2,572,428 UART: [art] SIG.S = 1670859BBB26C4F0A3AB84CC178CAE827AD6B5F5A58F0B898320C62C9A54AE5F7B9C8F9AB989B748DFC6BFEB92441FBF
2,596,113 UART: mbox::rt_entry...
2,596,485 UART: ____ _ _ _ ____ _____
2,597,269 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,069 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,598,837 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,599,605 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,600,373 UART: |_|
2,600,685 UART:
2,719,222 UART: [rt] Runtime listening for mailbox commands...
2,725,556 >>> mbox cmd response data (4360 bytes)
2,725,557 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,756,339 >>> mbox cmd response data (0 bytes)
2,756,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,244,380 >>> mbox cmd response: success
5,257,837 UART:
5,257,853 UART: Running Caliptra FMC ...
5,258,261 UART:
5,258,315 UART: [state] CFI Enabled
5,347,448 UART: [art] Extend RT PCRs Done
5,347,876 UART: [art] Lock RT PCRs Done
5,349,301 UART: [art] Populate DV Done
5,357,250 UART: [fht] FMC Alias Private Key: 7
5,358,302 UART: [art] Derive CDI
5,358,582 UART: [art] Store in slot 0x4
5,444,019 UART: [art] Derive Key Pair
5,444,379 UART: [art] Store priv key in slot 0x5
5,458,137 UART: [art] Derive Key Pair - Done
5,472,809 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,488,578 UART: [art] Erasing AUTHORITY.KEYID = 7
5,489,343 UART: [art] PUB.X = B5CF68C939542B140571C258B78BF1F395571E0E498CB0668A0A6E7DC8A351796615BACD30AFAC415591C5C705EAFBA8
5,496,109 UART: [art] PUB.Y = B74256209D6CD841850101AF91C72D073E944DAF2EBFD10D656594CE3A7CCE6551DBAEA6E3CC61134A95D4F3500AEB71
5,503,056 UART: [art] SIG.R = 4C3C4E6B6EDF6CF1764F453E737D947F707422AF4DD813FA5FBCCBDF53F285155CBE5706BB345DEF61743F88F869EE1E
5,509,841 UART: [art] SIG.S = 4C5ACE764E2966A31D27661B6F500B698EAA51B5DBD818E8AB24C39E20FA91E8F1D3C810E1816B0831C24B484205CF08
5,534,151 UART: Caliptra RT
5,534,402 UART: [state] CFI Enabled
5,909,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,910,464 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,940,770 UART: [rt]cmd =0x494e464f, len=4
5,944,290 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,795 UART: [state] LifecycleState = Unprovisioned
85,450 UART: [state] DebugLocked = No
85,988 UART: [state] WD Timer not started. Device not locked for debugging
87,237 UART: [kat] SHA2-256
892,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,012 UART: [kat] ++
897,164 UART: [kat] sha1
901,274 UART: [kat] SHA2-256
903,214 UART: [kat] SHA2-384
906,121 UART: [kat] SHA2-512-ACC
908,022 UART: [kat] ECC-384
917,917 UART: [kat] HMAC-384Kdf
922,493 UART: [kat] LMS
1,170,821 UART: [kat] --
1,171,550 UART: [cold-reset] ++
1,171,974 UART: [fht] FHT @ 0x50003400
1,174,617 UART: [idev] ++
1,174,785 UART: [idev] CDI.KEYID = 6
1,175,145 UART: [idev] SUBJECT.KEYID = 7
1,175,569 UART: [idev] UDS.KEYID = 0
1,175,914 ready_for_fw is high
1,175,914 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,829 UART: [idev] Erasing UDS.KEYID = 0
1,201,328 UART: [idev] Sha1 KeyId Algorithm
1,209,820 UART: [idev] --
1,210,962 UART: [ldev] ++
1,211,130 UART: [ldev] CDI.KEYID = 6
1,211,493 UART: [ldev] SUBJECT.KEYID = 5
1,211,919 UART: [ldev] AUTHORITY.KEYID = 7
1,212,382 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,243,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,754 UART: [ldev] --
1,282,251 UART: [fwproc] Wait for Commands...
1,282,981 UART: [fwproc] Recv command 0x46574c44
1,283,709 UART: [fwproc] Recv'd Img size: 82832 bytes
2,219,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,245,616 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,276,786 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,363,605 >>> mbox cmd response: success
2,363,605 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,364,759 UART: [afmc] ++
2,364,927 UART: [afmc] CDI.KEYID = 6
2,365,289 UART: [afmc] SUBJECT.KEYID = 7
2,365,714 UART: [afmc] AUTHORITY.KEYID = 5
2,401,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,417,428 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,418,176 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,423,885 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,429,768 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,435,469 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,443,395 UART: [afmc] --
2,444,393 UART: [cold-reset] --
2,445,055 UART: [state] Locking Datavault
2,446,194 UART: [state] Locking PCR0, PCR1 and PCR31
2,446,798 UART: [state] Locking ICCM
2,447,362 UART: [exit] Launching FMC @ 0x40000130
2,452,692 UART:
2,452,708 UART: Running Caliptra FMC ...
2,453,116 UART:
2,453,259 UART: [state] CFI Enabled
2,463,723 UART: [fht] FMC Alias Private Key: 7
2,582,487 UART: [art] Extend RT PCRs Done
2,582,915 UART: [art] Lock RT PCRs Done
2,584,373 UART: [art] Populate DV Done
2,592,650 UART: [fht] FMC Alias Private Key: 7
2,593,616 UART: [art] Derive CDI
2,593,896 UART: [art] Store in slot 0x4
2,679,315 UART: [art] Derive Key Pair
2,679,675 UART: [art] Store priv key in slot 0x5
2,693,195 UART: [art] Derive Key Pair - Done
2,708,295 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,723,384 UART: [art] Erasing AUTHORITY.KEYID = 7
2,724,149 UART: [art] PUB.X = 19CEE3752C76A669F288AFC9BD69C4B4700F9D407A5B27BA7CBB807174124504EA978B699BD41C830241BCAEFC9E4361
2,730,918 UART: [art] PUB.Y = 6C7A671911BC22768213F729A05E3D18B8562F800022C4E759A96D78ECCCCF0F088578BF8331C2A12796517519B14093
2,737,830 UART: [art] SIG.R = 55871FF25C986BF3241F6C5B8D6921859EA89AF17C158FE27DE692130186341D3E42A11B52A48F24C5D42045A8499A0C
2,744,590 UART: [art] SIG.S = 51E6B5DCE6460B907E517AED7E2C7461757AC7509F5BED82F85419ECC9EEA23F21A435F6BB76EE2F026FB776F5A6BCB8
2,768,202 UART: mbox::rt_entry...
2,768,574 UART: ____ _ _ _ ____ _____
2,769,358 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,770,158 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,770,926 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,771,694 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,772,462 UART: |_|
2,772,774 UART:
2,892,469 UART: [rt] Runtime listening for mailbox commands...
2,898,803 >>> mbox cmd response data (4360 bytes)
2,898,804 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,929,586 >>> mbox cmd response data (0 bytes)
2,929,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,929,705 UART:
2,929,721 UART: Running Caliptra ROM ...
2,930,129 UART:
2,930,271 UART: [state] CFI Enabled
2,933,487 UART: [state] LifecycleState = Unprovisioned
2,934,142 UART: [state] DebugLocked = No
2,934,790 UART: [state] WD Timer not started. Device not locked for debugging
2,936,100 UART: [kat] SHA2-256
3,741,750 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,745,875 UART: [kat] ++
3,746,027 UART: [kat] sha1
3,750,139 UART: [kat] SHA2-256
3,752,079 UART: [kat] SHA2-384
3,754,734 UART: [kat] SHA2-512-ACC
3,756,634 UART: [kat] ECC-384
3,766,651 UART: [kat] HMAC-384Kdf
3,771,375 UART: [kat] LMS
4,019,703 UART: [kat] --
4,020,583 UART: [update-reset] ++
5,380,661 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,381,790 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
5,537,005 >>> mbox cmd response: success
5,537,352 UART: [update-reset] Copying MAN_2 To MAN_1
5,545,366 UART: [update-reset Success] --
5,546,365 UART: [state] Locking Datavault
5,547,183 UART: [state] Locking PCR0, PCR1 and PCR31
5,547,787 UART: [state] Locking ICCM
5,548,279 UART: [exit] Launching FMC @ 0x40000130
5,553,609 UART:
5,553,625 UART: Running Caliptra FMC ...
5,554,033 UART:
5,554,176 UART: [state] CFI Enabled
5,643,421 UART: [art] Extend RT PCRs Done
5,643,849 UART: [art] Lock RT PCRs Done
5,645,254 UART: [art] Populate DV Done
5,653,777 UART: [fht] FMC Alias Private Key: 7
5,654,937 UART: [art] Derive CDI
5,655,217 UART: [art] Store in slot 0x4
5,740,976 UART: [art] Derive Key Pair
5,741,336 UART: [art] Store priv key in slot 0x5
5,755,234 UART: [art] Derive Key Pair - Done
5,770,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,785,368 UART: [art] Erasing AUTHORITY.KEYID = 7
5,786,133 UART: [art] PUB.X = AB3C80641E6A23B16A60C48D6B38C328E2DD50FC9EC66BFB69E03EBD983D1646B158C5278008364011417CA8B38240DE
5,792,904 UART: [art] PUB.Y = 8006A212858B67DBFFEC83A5465B3E00AC1B9281EC31C81F8358757F8ED2AE4A49CB98DAD74B8E1CE0A08CAB7EE2810B
5,799,844 UART: [art] SIG.R = B2310C43B9DDAB6F62D6C2CB771CD79456AE24FC4CAB343D19B130E886DBB30D413829D118EE591CC19E84A85129006B
5,806,596 UART: [art] SIG.S = C3A940BB6A7EED84397E154ACBBA4FEE3ECAF330D35CC832D6E48034BEDC7DAF1DEBFB68F74134A90FF3EFFEF5270B9A
5,830,980 UART: Caliptra RT
5,831,323 UART: [state] CFI Enabled
6,199,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
6,200,487 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,231,077 UART: [rt]cmd =0x494e464f, len=4
6,234,841 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,728 ready_for_fw is high
1,060,728 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,217,490 >>> mbox cmd response: success
2,217,490 <<< Executing mbox cmd 0xa0000000 (0 bytes) from SoC
2,279,629 UART:
2,279,645 UART: Running Caliptra FMC ...
2,280,053 UART:
2,280,196 UART: [state] CFI Enabled
2,290,580 UART: [fht] FMC Alias Private Key: 7
2,409,774 UART: [art] Extend RT PCRs Done
2,410,202 UART: [art] Lock RT PCRs Done
2,411,696 UART: [art] Populate DV Done
2,419,877 UART: [fht] FMC Alias Private Key: 7
2,420,833 UART: [art] Derive CDI
2,421,113 UART: [art] Store in slot 0x4
2,507,120 UART: [art] Derive Key Pair
2,507,480 UART: [art] Store priv key in slot 0x5
2,521,022 UART: [art] Derive Key Pair - Done
2,535,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,551,540 UART: [art] Erasing AUTHORITY.KEYID = 7
2,552,305 UART: [art] PUB.X = 2E3C9854F82D11C3CA3D37B4130BAF655EB42446D68FD7868559EF3295DA94C24A338889734302FB48EF7D91A07F5036
2,559,067 UART: [art] PUB.Y = F52BEE9465C229D1BA1D223EF44185EF08D7A3224D729DADBF508529894E36FA0E481303020B989AA7E95E103BE312A2
2,566,006 UART: [art] SIG.R = CEF3E41E5FB8853DE3407E3F25499EA41343F4A50028E8F6FF5E386847FBE9960B65DAC7C96AB535C96CE55831755CBB
2,572,761 UART: [art] SIG.S = EB1DC7DDD645CD55C17B64D87CCAA399B41E5DC18ABAAE519A182D52BE10E9227DBDDD278F828457523E8C1393F09E01
2,596,894 UART: mbox::rt_entry...
2,597,266 UART: ____ _ _ _ ____ _____
2,598,050 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,598,850 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,599,618 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,600,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,601,154 UART: |_|
2,601,466 UART:
2,720,053 UART: [rt] Runtime listening for mailbox commands...
2,726,387 >>> mbox cmd response data (4360 bytes)
2,726,388 <<< Executing mbox cmd 0xb0000000 (4360 bytes) from SoC
2,757,170 >>> mbox cmd response data (0 bytes)
2,757,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,246,010 >>> mbox cmd response: success
5,259,087 UART:
5,259,103 UART: Running Caliptra FMC ...
5,259,511 UART:
5,259,654 UART: [state] CFI Enabled
5,349,065 UART: [art] Extend RT PCRs Done
5,349,493 UART: [art] Lock RT PCRs Done
5,350,658 UART: [art] Populate DV Done
5,358,603 UART: [fht] FMC Alias Private Key: 7
5,359,625 UART: [art] Derive CDI
5,359,905 UART: [art] Store in slot 0x4
5,445,910 UART: [art] Derive Key Pair
5,446,270 UART: [art] Store priv key in slot 0x5
5,459,798 UART: [art] Derive Key Pair - Done
5,474,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,490,035 UART: [art] Erasing AUTHORITY.KEYID = 7
5,490,800 UART: [art] PUB.X = 32B6CB98FF294686A994678C2353B0562DBA38542C90F4D3E27D6BF340E7947FEDF9D38472A44E1E62549E7A58311572
5,497,566 UART: [art] PUB.Y = 2D1DCB86E03EBEC2FB9384E0193CA130CEA17FA03CA9634917855186D0D3A4CC61EAB56EF09E41EC2B3D3657F72363F6
5,504,530 UART: [art] SIG.R = 6522410969F88EE46B4F3005A2CB874E2966B7E0A95E427A62C596ACC0FC6463697585E57895949CA44127F148C8A145
5,511,284 UART: [art] SIG.S = 502F7A1534B84B59238850FA6B2CD7F142C0E7DE4BC15C1D3C1740229CA877D77D2C2DC6E2A203B04D80D7D8417731D7
5,534,953 UART: Caliptra RT
5,535,296 UART: [state] CFI Enabled
5,911,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
5,913,118 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,943,632 UART: [rt]cmd =0x494e464f, len=4
5,947,384 >>> mbox cmd response data (312 bytes)
test test_update_reset::test_dpe_validation_used_context_threshold_exceeded ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,106 UART:
192,479 UART: Running Caliptra ROM ...
193,584 UART:
193,731 UART: [state] CFI Enabled
264,315 UART: [state] LifecycleState = Unprovisioned
266,230 UART: [state] DebugLocked = No
268,958 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,107 UART: [kat] SHA2-256
443,773 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,325 UART: [kat] ++
454,778 UART: [kat] sha1
465,015 UART: [kat] SHA2-256
467,741 UART: [kat] SHA2-384
472,971 UART: [kat] SHA2-512-ACC
475,345 UART: [kat] ECC-384
2,766,859 UART: [kat] HMAC-384Kdf
2,798,296 UART: [kat] LMS
3,988,572 UART: [kat] --
3,994,350 UART: [cold-reset] ++
3,995,569 UART: [fht] Storing FHT @ 0x50003400
4,007,552 UART: [idev] ++
4,008,124 UART: [idev] CDI.KEYID = 6
4,009,044 UART: [idev] SUBJECT.KEYID = 7
4,010,301 UART: [idev] UDS.KEYID = 0
4,011,385 ready_for_fw is high
4,011,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,182 UART: [idev] Erasing UDS.KEYID = 0
7,345,828 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,800 UART: [idev] --
7,370,688 UART: [ldev] ++
7,371,321 UART: [ldev] CDI.KEYID = 6
7,372,207 UART: [ldev] SUBJECT.KEYID = 5
7,373,424 UART: [ldev] AUTHORITY.KEYID = 7
7,374,710 UART: [ldev] FE.KEYID = 1
7,421,680 UART: [ldev] Erasing FE.KEYID = 1
10,756,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,206 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,568 UART: [ldev] --
13,135,995 UART: [fwproc] Waiting for Commands...
13,138,736 UART: [fwproc] Received command 0x46574c44
13,140,923 UART: [fwproc] Received Image of size 118548 bytes
17,248,886 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,330,072 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,403,260 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,732,532 >>> mbox cmd response: success
17,737,565 UART: [afmc] ++
17,738,183 UART: [afmc] CDI.KEYID = 6
17,739,099 UART: [afmc] SUBJECT.KEYID = 7
17,740,259 UART: [afmc] AUTHORITY.KEYID = 5
21,109,376 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,409,862 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,412,171 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,426,590 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,441,316 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,455,713 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,475,975 UART: [afmc] --
23,479,511 UART: [cold-reset] --
23,484,778 UART: [state] Locking Datavault
23,491,618 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,361 UART: [state] Locking ICCM
23,495,715 UART: [exit] Launching FMC @ 0x40000130
23,504,110 UART:
23,504,358 UART: Running Caliptra FMC ...
23,505,388 UART:
23,505,534 UART: [state] CFI Enabled
23,569,787 UART: [fht] FMC Alias Private Key: 7
25,931,000 UART: [art] Extend RT PCRs Done
25,932,227 UART: [art] Lock RT PCRs Done
25,933,884 UART: [art] Populate DV Done
25,939,401 UART: [fht] FMC Alias Private Key: 7
25,941,096 UART: [art] Derive CDI
25,941,835 UART: [art] Store in slot 0x4
25,999,463 UART: [art] Derive Key Pair
26,000,504 UART: [art] Store priv key in slot 0x5
29,293,299 UART: [art] Derive Key Pair - Done
29,306,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,594,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,595,991 UART: [art] PUB.X = 7324B832A10CAE396AC321E3603ED17F63C2972134141512255C9AD3CE6EC1EF7FB76EC18D16B9FA76B927FAD0F5CC06
31,603,293 UART: [art] PUB.Y = 02A48FC2FC329A06492C11AEC74F9D8A92E652C8FDF90EF9A5FCA23D578C9F09082BAD00B4FD099F711812206D7347BB
31,610,518 UART: [art] SIG.R = 72221A10F17904D433CEB0907C5982F24251AEA8B5320C213A94397D2CEF239CACDD309042B7B02E7D9F001158F0D21E
31,617,856 UART: [art] SIG.S = 00AEBCF1A1BAD9C025D435F635897ADA40EA62AC359BD41F224B871126EB0EE2C9717AB6B696F99DA4694F32FD34FE3D
32,922,973 UART: Caliptra RT
32,923,680 UART: [state] CFI Enabled
33,099,385 UART: [rt] RT listening for mailbox commands...
33,101,712 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,131,718 UART: [rt]cmd =0x50435252, len=8
33,133,910 >>> mbox cmd response data (8 bytes)
35,202,089 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,308,232 UART:
35,308,601 UART: Running Caliptra ROM ...
35,309,750 UART:
35,309,930 UART: [state] CFI Enabled
35,366,619 UART: [state] LifecycleState = Unprovisioned
35,368,557 UART: [state] DebugLocked = No
35,370,381 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,375,172 UART: [kat] SHA2-256
35,544,845 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,555,370 UART: [kat] ++
35,555,909 UART: [kat] sha1
35,565,615 UART: [kat] SHA2-256
35,568,316 UART: [kat] SHA2-384
35,574,835 UART: [kat] SHA2-512-ACC
35,577,211 UART: [kat] ECC-384
37,873,336 UART: [kat] HMAC-384Kdf
37,903,923 UART: [kat] LMS
39,094,286 UART: [kat] --
39,097,902 UART: [update-reset] ++
42,853,484 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,856,563 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,129,305 >>> mbox cmd response: success
43,129,695 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,130,103 UART: [update-reset] Copying MAN_2 To MAN_1
43,152,538 UART: [update-reset Success] --
43,157,150 UART: [state] Locking Datavault
43,160,670 UART: [state] Locking PCR0, PCR1 and PCR31
43,162,370 UART: [state] Locking ICCM
43,163,547 UART: [exit] Launching FMC @ 0x40000130
43,171,952 UART:
43,172,261 UART: Running Caliptra FMC ...
43,173,377 UART:
43,173,545 UART: [state] CFI Enabled
43,268,431 UART: [art] Extend RT PCRs Done
43,269,618 UART: [art] Lock RT PCRs Done
43,271,186 UART: [art] Populate DV Done
43,276,594 UART: [fht] FMC Alias Private Key: 7
43,278,137 UART: [art] Derive CDI
43,279,004 UART: [art] Store in slot 0x4
43,336,893 UART: [art] Derive Key Pair
43,337,936 UART: [art] Store priv key in slot 0x5
46,630,736 UART: [art] Derive Key Pair - Done
46,643,572 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,931,706 UART: [art] Erasing AUTHORITY.KEYID = 7
48,933,211 UART: [art] PUB.X = ED9AFB5C1D32696DA1740E0B49546171D49C26B9036F99A578C3D08AF50AAB418FEE2F9BCD8F1146D9A272C79E08005D
48,940,457 UART: [art] PUB.Y = B3AED8DB02B58F1DD0372DE8D238A977DE55A4BCBD6E55E372828AA2D781ED2B921F33765C7F0716B4C344AA8F08F350
48,947,757 UART: [art] SIG.R = CD49B6D6164E6B6DEED0A8E77D471F892AFE7303CFDABBDB36FC856E5B2666E86B857F6724C1253CA0B7FA00A9D9822B
48,955,147 UART: [art] SIG.S = 9C0A9F132AB7C38E45026656EF7C4212ADFC2782965E9418A61636F347D852F6B0367B4482F5DB3769AB39064CD12429
50,259,610 UART: mbox::rt_entry...
50,260,577 UART: ____ _ _ _ ____ _____
50,262,568 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,264,522 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,266,453 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,268,307 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,270,234 UART: |_|
50,271,042 UART:
50,644,609 UART: [rt] Runtime listening for mailbox commands...
50,646,622 >>> mbox cmd response data (128 bytes)
52,714,550 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,819,671 UART:
52,820,037 UART: Running Caliptra ROM ...
52,821,180 UART:
52,821,353 UART: [state] CFI Enabled
52,878,405 UART: [state] LifecycleState = Unprovisioned
52,880,347 UART: [state] DebugLocked = No
52,881,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,885,938 UART: [kat] SHA2-256
53,055,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
53,066,154 UART: [kat] ++
53,066,615 UART: [kat] sha1
53,076,265 UART: [kat] SHA2-256
53,078,961 UART: [kat] SHA2-384
53,085,059 UART: [kat] SHA2-512-ACC
53,087,412 UART: [kat] ECC-384
55,380,472 UART: [kat] HMAC-384Kdf
55,412,087 UART: [kat] LMS
56,602,449 UART: [kat] --
56,606,454 UART: [update-reset] ++
60,368,029 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,372,364 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,645,101 >>> mbox cmd response: success
60,645,460 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,645,844 UART: [update-reset] Copying MAN_2 To MAN_1
60,668,279 UART: [update-reset Success] --
60,672,565 UART: [state] Locking Datavault
60,676,302 UART: [state] Locking PCR0, PCR1 and PCR31
60,678,058 UART: [state] Locking ICCM
60,679,185 UART: [exit] Launching FMC @ 0x40000130
60,687,636 UART:
60,687,886 UART: Running Caliptra FMC ...
60,689,158 UART:
60,689,327 UART: [state] CFI Enabled
60,780,381 UART: [art] Extend RT PCRs Done
60,781,573 UART: [art] Lock RT PCRs Done
60,782,982 UART: [art] Populate DV Done
60,788,551 UART: [fht] FMC Alias Private Key: 7
60,790,258 UART: [art] Derive CDI
60,791,072 UART: [art] Store in slot 0x4
60,849,444 UART: [art] Derive Key Pair
60,850,474 UART: [art] Store priv key in slot 0x5
64,143,237 UART: [art] Derive Key Pair - Done
64,156,021 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,445,042 UART: [art] Erasing AUTHORITY.KEYID = 7
66,446,560 UART: [art] PUB.X = 7158068AB8ED0CAEC16EBB9E64952616B8D0D7974072353FC771C6D1591A556D5F6594ABA6910D25AA25F7A57EC32001
66,453,905 UART: [art] PUB.Y = FD2847A22181864828246D3D67BED9B23DB0A689853098EAE382339F5B16ED6930008428D218C9F3C023D95073267F38
66,461,038 UART: [art] SIG.R = 58FE77AA30D1BF47D1E3C95772A8CCA1496D2EF254E0032D8DCF5CA428B91D5F0A8FD4961DBAA3E2FAC802C5E1EA14EE
66,468,510 UART: [art] SIG.S = 000C667C846CF440918782659D650AF8A83DCE374A5E75124CE1E6BB104F1B45BA835B12B40F4909F08128CD8D244D42
67,773,525 UART: mbox::rt_entry...
67,774,482 UART: ____ _ _ _ ____ _____
67,776,417 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,778,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,780,279 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,782,203 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,784,090 UART: |_|
67,784,983 UART:
68,156,709 UART: [rt] Runtime listening for mailbox commands...
68,158,724 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,851 writing to cptra_bootfsm_go
3,795,900 ready_for_fw is high
3,796,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,950,527 >>> mbox cmd response: success
23,642,623 UART:
23,643,008 UART: Running Caliptra FMC ...
23,644,216 UART:
23,644,386 UART: [state] CFI Enabled
23,714,656 UART: [fht] FMC Alias Private Key: 7
26,054,530 UART: [art] Extend RT PCRs Done
26,055,779 UART: [art] Lock RT PCRs Done
26,057,581 UART: [art] Populate DV Done
26,062,998 UART: [fht] FMC Alias Private Key: 7
26,064,486 UART: [art] Derive CDI
26,065,251 UART: [art] Store in slot 0x4
26,123,212 UART: [art] Derive Key Pair
26,124,260 UART: [art] Store priv key in slot 0x5
29,417,012 UART: [art] Derive Key Pair - Done
29,430,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,717,723 UART: [art] Erasing AUTHORITY.KEYID = 7
31,719,230 UART: [art] PUB.X = AF7AE2DAE714B1591318C8AE1E00356D316A377065429BB4A4AF843944D022B568982860562E366AE5267A18FD27362B
31,726,480 UART: [art] PUB.Y = 353765ED16864F04D9B5E15415F551830AC18D45A7ED877D8985405CE53EA72184BCD025D0C551ABDFAB35CA15D23690
31,733,722 UART: [art] SIG.R = 988060D745214CFEB25A8A693CAD43F45F3FD48F31EEA180C8A2CF53EB1DF49BBF32160C64CD6095B903689F9D932B14
31,741,119 UART: [art] SIG.S = CD3FCC63B2E14EBA1CED8574FC7AF2EC40600E4AA72459DAB624B627D08982D01B5AC55DA4A92476E4725D65502806A0
33,045,736 UART: Caliptra RT
33,046,448 UART: [state] CFI Enabled
33,223,266 UART: [rt] RT listening for mailbox commands...
33,225,535 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,255,594 UART: [rt]cmd =0x50435252, len=8
33,257,519 >>> mbox cmd response data (8 bytes)
35,328,431 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,363,186 >>> mbox cmd response: success
43,363,690 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,397,960 UART:
43,398,239 UART: Running Caliptra FMC ...
43,399,358 UART:
43,399,522 UART: [state] CFI Enabled
43,501,348 UART: [art] Extend RT PCRs Done
43,502,572 UART: [art] Lock RT PCRs Done
43,504,143 UART: [art] Populate DV Done
43,509,456 UART: [fht] FMC Alias Private Key: 7
43,510,937 UART: [art] Derive CDI
43,511,703 UART: [art] Store in slot 0x4
43,570,141 UART: [art] Derive Key Pair
43,571,184 UART: [art] Store priv key in slot 0x5
46,863,808 UART: [art] Derive Key Pair - Done
46,877,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,165,919 UART: [art] Erasing AUTHORITY.KEYID = 7
49,167,439 UART: [art] PUB.X = 769FDBB642DD3196FA1F65BE35B21E6A9F1F0F45368FB6E81A4B1D9527B8EA8F07252036094BF8774291C172F1007878
49,174,632 UART: [art] PUB.Y = 15AF3F4B2AFB2F2BEF85ABA30A6E45C455779A8F3E0A651D8EE0CFB11A1AF41C069C69089B4263C62299A732463D692B
49,181,916 UART: [art] SIG.R = 1354E9260360FE1CE2F6848FD291A50135BCFF93E5912EEE907AA39EC07D043D573C78976A4AC5B2BD5AEFEE70904C23
49,189,309 UART: [art] SIG.S = A71CF7EDC6F03ADE451213250A510C798F68552C24743C1FC9269EF86200DCFFAC9605286307164E49587826BC17E3C5
50,494,445 UART: mbox::rt_entry...
50,495,420 UART: ____ _ _ _ ____ _____
50,497,373 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,499,380 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,501,312 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,503,240 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,505,166 UART: |_|
50,505,999 UART:
50,878,913 UART: [rt] Runtime listening for mailbox commands...
50,880,952 >>> mbox cmd response data (128 bytes)
52,948,986 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,987,916 >>> mbox cmd response: success
60,988,407 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
61,024,951 UART:
61,025,268 UART: Running Caliptra FMC ...
61,026,392 UART:
61,026,553 UART: [state] CFI Enabled
61,122,511 UART: [art] Extend RT PCRs Done
61,123,702 UART: [art] Lock RT PCRs Done
61,125,273 UART: [art] Populate DV Done
61,130,462 UART: [fht] FMC Alias Private Key: 7
61,132,158 UART: [art] Derive CDI
61,132,968 UART: [art] Store in slot 0x4
61,191,602 UART: [art] Derive Key Pair
61,192,611 UART: [art] Store priv key in slot 0x5
64,485,160 UART: [art] Derive Key Pair - Done
64,498,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,787,523 UART: [art] Erasing AUTHORITY.KEYID = 7
66,789,034 UART: [art] PUB.X = EB778C1990F02C413C8D53583D95A79AAD90C845364B1656D34539CCFCC2A53A85F5AAB3171AD73731372D1FF964877A
66,796,278 UART: [art] PUB.Y = 9F5DBBE62D296C786EA9186F2A59851FCC485F958F33B3EF8CECAE13432176A1E4FD7A6C6D629AB33D92E1580DFA5F22
66,803,563 UART: [art] SIG.R = A21270815DAC83A50606AD7D18E67A443BE80E435671A483EA1463952C5FFA546547D2B5D019BFF694382FC9F2651CFF
66,810,964 UART: [art] SIG.S = F818BCBA1218481CEB5FF2C76E34F77E9D91A757505239661F31771747F08615CDD5DED050325016353F9CF2625A77D1
68,115,510 UART: mbox::rt_entry...
68,116,467 UART: ____ _ _ _ ____ _____
68,118,451 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,120,454 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,122,384 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,124,315 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,126,244 UART: |_|
68,127,057 UART:
68,500,207 UART: [rt] Runtime listening for mailbox commands...
68,502,246 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
192,514 UART:
192,857 UART: Running Caliptra ROM ...
194,028 UART:
603,659 UART: [state] CFI Enabled
615,906 UART: [state] LifecycleState = Unprovisioned
617,848 UART: [state] DebugLocked = No
619,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,080 UART: [kat] SHA2-256
794,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,360 UART: [kat] ++
805,843 UART: [kat] sha1
816,795 UART: [kat] SHA2-256
819,514 UART: [kat] SHA2-384
825,027 UART: [kat] SHA2-512-ACC
827,398 UART: [kat] ECC-384
3,110,880 UART: [kat] HMAC-384Kdf
3,122,704 UART: [kat] LMS
4,312,802 UART: [kat] --
4,317,047 UART: [cold-reset] ++
4,319,151 UART: [fht] Storing FHT @ 0x50003400
4,331,514 UART: [idev] ++
4,332,080 UART: [idev] CDI.KEYID = 6
4,333,110 UART: [idev] SUBJECT.KEYID = 7
4,334,278 UART: [idev] UDS.KEYID = 0
4,335,329 ready_for_fw is high
4,335,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,447 UART: [idev] Erasing UDS.KEYID = 0
7,622,942 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,079 UART: [idev] --
7,648,715 UART: [ldev] ++
7,649,283 UART: [ldev] CDI.KEYID = 6
7,650,292 UART: [ldev] SUBJECT.KEYID = 5
7,651,444 UART: [ldev] AUTHORITY.KEYID = 7
7,652,719 UART: [ldev] FE.KEYID = 1
7,665,662 UART: [ldev] Erasing FE.KEYID = 1
10,955,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,495 UART: [ldev] --
13,314,406 UART: [fwproc] Waiting for Commands...
13,316,167 UART: [fwproc] Received command 0x46574c44
13,318,404 UART: [fwproc] Received Image of size 118548 bytes
17,423,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,716 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,890 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,512 >>> mbox cmd response: success
17,907,229 UART: [afmc] ++
17,907,818 UART: [afmc] CDI.KEYID = 6
17,908,753 UART: [afmc] SUBJECT.KEYID = 7
17,910,013 UART: [afmc] AUTHORITY.KEYID = 5
21,224,361 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,110 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,534,802 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,523 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,563,919 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,642 UART: [afmc] --
23,589,605 UART: [cold-reset] --
23,594,160 UART: [state] Locking Datavault
23,599,756 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,548 UART: [state] Locking ICCM
23,602,680 UART: [exit] Launching FMC @ 0x40000130
23,611,076 UART:
23,611,310 UART: Running Caliptra FMC ...
23,612,398 UART:
23,612,551 UART: [state] CFI Enabled
23,620,511 UART: [fht] FMC Alias Private Key: 7
25,959,582 UART: [art] Extend RT PCRs Done
25,960,809 UART: [art] Lock RT PCRs Done
25,962,482 UART: [art] Populate DV Done
25,967,885 UART: [fht] FMC Alias Private Key: 7
25,969,418 UART: [art] Derive CDI
25,970,226 UART: [art] Store in slot 0x4
26,012,709 UART: [art] Derive Key Pair
26,013,750 UART: [art] Store priv key in slot 0x5
29,255,469 UART: [art] Derive Key Pair - Done
29,268,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,891 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,390 UART: [art] PUB.X = B6B0CB7BCE8FE420CC3A70ECEA0CC91D1A05CEAB7617EB741843BBA582AB1C8068144AC45F77C257F51363F3088D7C7C
31,557,683 UART: [art] PUB.Y = 0FAA48EE23350CAC613204ABFEAA73C907E5007061A33C324541FEFB679EFFF4739665AEC9142D93B060F0F30571FCD0
31,564,961 UART: [art] SIG.R = 91A98F135162F15BB9A25F3B3994CC5AF393B70CEE34B7DF8B45ED49C20D8FD87DF06059EA174703C4640B7F0BCEB3CE
31,572,337 UART: [art] SIG.S = 2125ACDB46D677DE53B505A7093581BADB5E4B2B53DD1B57D1E74770C356002B715BAF1A0F35EA0144A7370CBF85817F
32,877,238 UART: Caliptra RT
32,877,948 UART: [state] CFI Enabled
33,011,546 UART: [rt] RT listening for mailbox commands...
33,013,673 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,043,471 UART: [rt]cmd =0x50435252, len=8
33,045,421 >>> mbox cmd response data (8 bytes)
35,115,328 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,221,374 UART:
35,221,724 UART: Running Caliptra ROM ...
35,222,766 UART:
35,222,974 UART: [state] CFI Enabled
35,239,674 UART: [state] LifecycleState = Unprovisioned
35,241,615 UART: [state] DebugLocked = No
35,244,533 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,250,282 UART: [kat] SHA2-256
35,419,959 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,430,536 UART: [kat] ++
35,430,986 UART: [kat] sha1
35,441,462 UART: [kat] SHA2-256
35,444,185 UART: [kat] SHA2-384
35,450,818 UART: [kat] SHA2-512-ACC
35,453,177 UART: [kat] ECC-384
37,735,229 UART: [kat] HMAC-384Kdf
37,746,115 UART: [kat] LMS
38,936,159 UART: [kat] --
38,942,413 UART: [update-reset] ++
42,703,312 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,707,574 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,980,303 >>> mbox cmd response: success
42,980,672 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
42,980,950 UART: [update-reset] Copying MAN_2 To MAN_1
43,003,215 UART: [update-reset Success] --
43,008,210 UART: [state] Locking Datavault
43,011,348 UART: [state] Locking PCR0, PCR1 and PCR31
43,013,043 UART: [state] Locking ICCM
43,014,119 UART: [exit] Launching FMC @ 0x40000130
43,022,564 UART:
43,022,818 UART: Running Caliptra FMC ...
43,023,920 UART:
43,024,077 UART: [state] CFI Enabled
43,068,369 UART: [art] Extend RT PCRs Done
43,069,588 UART: [art] Lock RT PCRs Done
43,070,994 UART: [art] Populate DV Done
43,076,289 UART: [fht] FMC Alias Private Key: 7
43,078,047 UART: [art] Derive CDI
43,078,899 UART: [art] Store in slot 0x4
43,121,518 UART: [art] Derive Key Pair
43,122,580 UART: [art] Store priv key in slot 0x5
46,364,447 UART: [art] Derive Key Pair - Done
46,377,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,657,654 UART: [art] Erasing AUTHORITY.KEYID = 7
48,659,150 UART: [art] PUB.X = 7CDE6FBEDF3E73DA9C0C72FA04554CE2C81E8C3244027AB0257DDE84B3ADD90EDA250155B64E93D72BF8F75042666D8A
48,666,495 UART: [art] PUB.Y = 305C4C5CA2BC3B7898A6B6DFBA20E626B27E8982E1C13453A4AA248CFD623F756E4518B606CDF00BBEAD5AED267826F4
48,673,730 UART: [art] SIG.R = 1AE8420567BEF37ABCD52628B81ED4E40A54121E8F14CE3EB92A8FE78C8F35C3F6D2CEA8A8660B7D6D1AE327108DFE64
48,681,178 UART: [art] SIG.S = 67FEE513901088A32AD80FBAF454DB196FE69A3A631EE4AF412F9A59C44B07C0AEC7EA574AF7BFCBC1A1FAF4B1ABB018
49,985,942 UART: mbox::rt_entry...
49,986,908 UART: ____ _ _ _ ____ _____
49,988,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,990,881 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,992,804 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,994,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,996,646 UART: |_|
49,997,449 UART:
50,371,733 UART: [rt] Runtime listening for mailbox commands...
50,373,738 >>> mbox cmd response data (128 bytes)
52,436,993 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,542,010 UART:
52,542,361 UART: Running Caliptra ROM ...
52,543,492 UART:
52,543,654 UART: [state] CFI Enabled
52,558,024 UART: [state] LifecycleState = Unprovisioned
52,559,931 UART: [state] DebugLocked = No
52,562,399 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,567,131 UART: [kat] SHA2-256
52,736,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,747,382 UART: [kat] ++
52,747,919 UART: [kat] sha1
52,758,543 UART: [kat] SHA2-256
52,761,224 UART: [kat] SHA2-384
52,766,340 UART: [kat] SHA2-512-ACC
52,768,691 UART: [kat] ECC-384
55,052,554 UART: [kat] HMAC-384Kdf
55,065,767 UART: [kat] LMS
56,255,844 UART: [kat] --
56,260,608 UART: [update-reset] ++
60,023,719 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,027,600 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,300,322 >>> mbox cmd response: success
60,300,687 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,302,368 UART: [update-reset] Copying MAN_2 To MAN_1
60,324,749 UART: [update-reset Success] --
60,330,467 UART: [state] Locking Datavault
60,334,686 UART: [state] Locking PCR0, PCR1 and PCR31
60,336,434 UART: [state] Locking ICCM
60,338,524 UART: [exit] Launching FMC @ 0x40000130
60,346,968 UART:
60,347,198 UART: Running Caliptra FMC ...
60,348,312 UART:
60,348,469 UART: [state] CFI Enabled
60,392,532 UART: [art] Extend RT PCRs Done
60,393,673 UART: [art] Lock RT PCRs Done
60,395,380 UART: [art] Populate DV Done
60,400,724 UART: [fht] FMC Alias Private Key: 7
60,402,411 UART: [art] Derive CDI
60,403,227 UART: [art] Store in slot 0x4
60,445,930 UART: [art] Derive Key Pair
60,446,927 UART: [art] Store priv key in slot 0x5
63,688,555 UART: [art] Derive Key Pair - Done
63,702,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,982,590 UART: [art] Erasing AUTHORITY.KEYID = 7
65,984,107 UART: [art] PUB.X = F5F1A7A732B0CD5CA8B5C5E1668301B887C11515CD487638AEBABE2683CC101FBED68959A21830E39482E092517FD1C6
65,991,345 UART: [art] PUB.Y = F1ABCBDBE4C5CAE930A1CF271527E06509AA48B9C1B5A8895CCE4BE9C4D99C2F91DCE0C48B4A3188E3B543AF56C30D72
65,998,671 UART: [art] SIG.R = FC5AE1903703E79819871047A35C9A470D74E9ACBA46319E1B6CECB874CA031E4539FEF04195E6700AE84175A0CAD60D
66,006,131 UART: [art] SIG.S = 70459A86FAFC9A217CF34917F80F8F4B700827366FD9FFDA7F3542DE85ABE91A62CE135B923C38D0F09FF9DD2AD3C529
67,310,882 UART: mbox::rt_entry...
67,311,839 UART: ____ _ _ _ ____ _____
67,313,737 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,315,737 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,317,589 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,319,503 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,321,354 UART: |_|
67,322,174 UART:
67,693,002 UART: [rt] Runtime listening for mailbox commands...
67,695,019 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,129,578 ready_for_fw is high
4,130,065 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,156,734 >>> mbox cmd response: success
23,796,963 UART:
23,797,341 UART: Running Caliptra FMC ...
23,798,469 UART:
23,798,626 UART: [state] CFI Enabled
23,806,699 UART: [fht] FMC Alias Private Key: 7
26,147,529 UART: [art] Extend RT PCRs Done
26,148,756 UART: [art] Lock RT PCRs Done
26,150,518 UART: [art] Populate DV Done
26,156,146 UART: [fht] FMC Alias Private Key: 7
26,157,741 UART: [art] Derive CDI
26,158,493 UART: [art] Store in slot 0x4
26,201,471 UART: [art] Derive Key Pair
26,202,513 UART: [art] Store priv key in slot 0x5
29,444,857 UART: [art] Derive Key Pair - Done
29,457,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,738,264 UART: [art] Erasing AUTHORITY.KEYID = 7
31,739,771 UART: [art] PUB.X = 68155F18C5C110A210D7B9BC080F093878BE756866EB2E1ABE2FE5E04CD1DF76E4BB34548FC538770A8DEC296649533C
31,747,020 UART: [art] PUB.Y = A3769D7FC1B0E566A7054E22276A8D9CCD3BCDB9020C2CFBE97A640B2418FFDBEDB3D420CCFD4B0AB7EF07D89DC03711
31,754,319 UART: [art] SIG.R = 693F3C69BEE6269E9CCCFF8B66CDAF5A6F387792A245F9F7C5E27D075300D95EBFB690E30914406A53A4F219A1285B13
31,761,717 UART: [art] SIG.S = 9352521E566C590EFEF6CB0F8471836493A16A00CD7E976CFFD56A1373C3B205747A851788EBEC8D36F9F17082692D10
33,066,947 UART: Caliptra RT
33,067,649 UART: [state] CFI Enabled
33,201,614 UART: [rt] RT listening for mailbox commands...
33,203,839 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,233,701 UART: [rt]cmd =0x50435252, len=8
33,235,992 >>> mbox cmd response data (8 bytes)
35,304,173 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,278,439 >>> mbox cmd response: success
43,279,124 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
43,314,176 UART:
43,314,499 UART: Running Caliptra FMC ...
43,315,623 UART:
43,315,784 UART: [state] CFI Enabled
43,359,960 UART: [art] Extend RT PCRs Done
43,361,104 UART: [art] Lock RT PCRs Done
43,362,787 UART: [art] Populate DV Done
43,368,249 UART: [fht] FMC Alias Private Key: 7
43,369,944 UART: [art] Derive CDI
43,370,773 UART: [art] Store in slot 0x4
43,413,487 UART: [art] Derive Key Pair
43,414,532 UART: [art] Store priv key in slot 0x5
46,656,452 UART: [art] Derive Key Pair - Done
46,669,459 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,950,130 UART: [art] Erasing AUTHORITY.KEYID = 7
48,951,638 UART: [art] PUB.X = 6A7085BFB8AD0960814A8C7D49AF87FCD9A328D5670CDFA2B05588BD0FC44415FADE79C46460F7B64423FBE701F20CF5
48,958,892 UART: [art] PUB.Y = 1A76D8DE1514949AC836AF4D5850C384C59F53535A466E74A638754E14F87240F5DD545C9B9B85B1DCADA13B268DEC61
48,966,173 UART: [art] SIG.R = 191F6B31BA7D7F2E389D5A9F121326CEA2D397738E34D8994775942A15D9740685D22D2564A2F845F182554A78D05D70
48,973,504 UART: [art] SIG.S = ED02A7080F4460403CAC1E11156A1AE809E13FBC5BEE22A900F98A6BAD29BA97689C7369C78A89A7E8ABCDF0E0F70FF5
50,278,498 UART: mbox::rt_entry...
50,279,467 UART: ____ _ _ _ ____ _____
50,281,396 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,283,397 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,285,323 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,287,247 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,289,191 UART: |_|
50,290,081 UART:
50,661,462 UART: [rt] Runtime listening for mailbox commands...
50,663,505 >>> mbox cmd response data (128 bytes)
52,726,190 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,703,848 >>> mbox cmd response: success
60,704,459 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
60,736,560 UART:
60,736,847 UART: Running Caliptra FMC ...
60,737,960 UART:
60,738,115 UART: [state] CFI Enabled
60,782,366 UART: [art] Extend RT PCRs Done
60,783,579 UART: [art] Lock RT PCRs Done
60,785,117 UART: [art] Populate DV Done
60,790,465 UART: [fht] FMC Alias Private Key: 7
60,791,995 UART: [art] Derive CDI
60,792,724 UART: [art] Store in slot 0x4
60,835,177 UART: [art] Derive Key Pair
60,836,220 UART: [art] Store priv key in slot 0x5
64,078,217 UART: [art] Derive Key Pair - Done
64,091,384 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,371,653 UART: [art] Erasing AUTHORITY.KEYID = 7
66,373,163 UART: [art] PUB.X = 77E533921BB0562F616AE24F804F029C5BFDA27C5ECA29B7789C0681F3CC40DE87B71F7D845CBF5079C2E076AF68BE79
66,380,416 UART: [art] PUB.Y = D948C56A942118B79DC804339C79B0D6292E6C35F4D6580083878E6FDFFD3B684638BADF75810A2800A28D75B10ECB70
66,387,643 UART: [art] SIG.R = 7380B6BCF875F832F9F07E4B594B58298BA82472BD07BCF177E83DD13FCF37B61E43EF1B7D1F691FBBB5A33967A1599E
66,395,027 UART: [art] SIG.S = 6B8AA79E80503039D6761BC3A771A61C2F0DBD5F36FCC658F888C394483CF0DCF3086A2CD7AD2B9A8FC203499D7B9B42
67,700,097 UART: mbox::rt_entry...
67,701,196 UART: ____ _ _ _ ____ _____
67,703,202 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,705,208 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,707,132 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,709,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,710,981 UART: |_|
67,711,782 UART:
68,085,011 UART: [rt] Runtime listening for mailbox commands...
68,087,020 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,056 UART:
192,406 UART: Running Caliptra ROM ...
193,501 UART:
193,641 UART: [state] CFI Enabled
263,057 UART: [state] LifecycleState = Unprovisioned
264,988 UART: [state] DebugLocked = No
266,454 UART: [state] WD Timer not started. Device not locked for debugging
270,785 UART: [kat] SHA2-256
450,465 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,199 UART: [kat] ++
461,800 UART: [kat] sha1
472,914 UART: [kat] SHA2-256
475,602 UART: [kat] SHA2-384
482,585 UART: [kat] SHA2-512-ACC
484,945 UART: [kat] ECC-384
2,947,584 UART: [kat] HMAC-384Kdf
2,972,387 UART: [kat] LMS
3,448,872 UART: [kat] --
3,452,367 UART: [cold-reset] ++
3,454,293 UART: [fht] FHT @ 0x50003400
3,464,982 UART: [idev] ++
3,465,606 UART: [idev] CDI.KEYID = 6
3,466,514 UART: [idev] SUBJECT.KEYID = 7
3,467,754 UART: [idev] UDS.KEYID = 0
3,468,765 ready_for_fw is high
3,468,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,229 UART: [idev] Erasing UDS.KEYID = 0
5,986,613 UART: [idev] Sha1 KeyId Algorithm
6,009,466 UART: [idev] --
6,013,513 UART: [ldev] ++
6,014,080 UART: [ldev] CDI.KEYID = 6
6,015,047 UART: [ldev] SUBJECT.KEYID = 5
6,016,208 UART: [ldev] AUTHORITY.KEYID = 7
6,017,494 UART: [ldev] FE.KEYID = 1
6,058,176 UART: [ldev] Erasing FE.KEYID = 1
8,568,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,427 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,961 UART: [ldev] --
10,376,655 UART: [fwproc] Wait for Commands...
10,378,742 UART: [fwproc] Recv command 0x46574c44
10,380,718 UART: [fwproc] Recv'd Img size: 118548 bytes
13,874,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,817 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,031,825 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,360,409 >>> mbox cmd response: success
14,365,358 UART: [afmc] ++
14,365,973 UART: [afmc] CDI.KEYID = 6
14,366,943 UART: [afmc] SUBJECT.KEYID = 7
14,368,102 UART: [afmc] AUTHORITY.KEYID = 5
16,895,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,934 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,622,165 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,988 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,654,005 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,560 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,730 UART: [afmc] --
18,697,803 UART: [cold-reset] --
18,700,963 UART: [state] Locking Datavault
18,705,504 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,293 UART: [state] Locking ICCM
18,709,942 UART: [exit] Launching FMC @ 0x40000130
18,718,342 UART:
18,718,575 UART: Running Caliptra FMC ...
18,719,681 UART:
18,719,844 UART: [state] CFI Enabled
18,775,813 UART: [fht] FMC Alias Private Key: 7
20,542,752 UART: [art] Extend RT PCRs Done
20,543,965 UART: [art] Lock RT PCRs Done
20,545,641 UART: [art] Populate DV Done
20,551,041 UART: [fht] FMC Alias Private Key: 7
20,552,536 UART: [art] Derive CDI
20,553,295 UART: [art] Store in slot 0x4
20,608,764 UART: [art] Derive Key Pair
20,609,764 UART: [art] Store priv key in slot 0x5
23,072,910 UART: [art] Derive Key Pair - Done
23,086,122 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,798,165 UART: [art] Erasing AUTHORITY.KEYID = 7
24,799,673 UART: [art] PUB.X = 9BF79892833DF27E1FA7E2A5591C2099956C9C275249AC0FDFB831B79EEDA95E7A9732E062D752BD7AFBBDC5BCCDBFB8
24,806,932 UART: [art] PUB.Y = CA5F999137A6AEAEAB16624BD93EFCDBFFC494A7597DBB060E9122923675582938D9DA6E9761CA5B32E298CCDEDB3C49
24,814,217 UART: [art] SIG.R = 00EFF3623D3CD5AE9DF85881EBE9F12267F1F507BA1A661C9C412195C20ABDD0237C689294D0E3B4943070FCBB469E4C
24,821,607 UART: [art] SIG.S = 81E0801AFA2D6CC3C99F8B7D888D7AB65C5F09ED1D612EC47986C2256A682940B0CB4C6D4BF2E3ADF1E7D3987E7FD4F7
25,800,173 UART: Caliptra RT
25,800,904 UART: [state] CFI Enabled
25,982,099 UART: [rt] RT listening for mailbox commands...
25,984,255 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,014,414 UART: [rt]cmd =0x50435252, len=8
26,016,533 >>> mbox cmd response data (8 bytes)
28,081,590 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,187,727 UART:
28,188,086 UART: Running Caliptra ROM ...
28,189,220 UART:
28,189,385 UART: [state] CFI Enabled
28,249,576 UART: [state] LifecycleState = Unprovisioned
28,251,510 UART: [state] DebugLocked = No
28,254,189 UART: [state] WD Timer not started. Device not locked for debugging
28,258,631 UART: [kat] SHA2-256
28,438,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,449,111 UART: [kat] ++
28,449,649 UART: [kat] sha1
28,461,191 UART: [kat] SHA2-256
28,463,875 UART: [kat] SHA2-384
28,468,834 UART: [kat] SHA2-512-ACC
28,471,222 UART: [kat] ECC-384
30,936,323 UART: [kat] HMAC-384Kdf
30,958,121 UART: [kat] LMS
31,434,569 UART: [kat] --
31,439,196 UART: [update-reset] ++
34,488,654 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,492,142 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,764,763 >>> mbox cmd response: success
34,765,167 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,766,048 UART: [update-reset] Copying MAN_2 To MAN_1
34,803,140 UART: [update-reset Success] --
34,807,051 UART: [state] Locking Datavault
34,811,174 UART: [state] Locking PCR0, PCR1 and PCR31
34,812,928 UART: [state] Locking ICCM
34,815,683 UART: [exit] Launching FMC @ 0x40000130
34,824,071 UART:
34,824,307 UART: Running Caliptra FMC ...
34,825,406 UART:
34,825,562 UART: [state] CFI Enabled
34,915,749 UART: [art] Extend RT PCRs Done
34,916,932 UART: [art] Lock RT PCRs Done
34,918,064 UART: [art] Populate DV Done
34,923,473 UART: [fht] FMC Alias Private Key: 7
34,925,172 UART: [art] Derive CDI
34,925,986 UART: [art] Store in slot 0x4
34,985,268 UART: [art] Derive Key Pair
34,986,306 UART: [art] Store priv key in slot 0x5
37,449,384 UART: [art] Derive Key Pair - Done
37,462,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,174,646 UART: [art] Erasing AUTHORITY.KEYID = 7
39,176,151 UART: [art] PUB.X = 660CA93EFA365C53D30FB99DC5B087D91B401080B362AE08FD3198C9CBCC17599F8834AB72934B8E45876BB689F4D2DA
39,183,452 UART: [art] PUB.Y = 58D094D7018F035C91C785320729033E6864B719AFA0016E5129C49F5C70381F8456ED250C2C2EDA873EE4806D2CA2BE
39,190,673 UART: [art] SIG.R = 696D7ECB0623FC818FE65A3ADFB666811878E9AFBB42BCEDC5C67C9E6006114E8896663D0DB9E844689CEF84B2C3AFE8
39,198,076 UART: [art] SIG.S = 330307E0DDBC63F47522B9CF135A88CCEDBD8F754C1CEBB3CC08DD375245565DA71FBEC89A1D502184FD5EB3E2040DEB
40,176,132 UART: mbox::rt_entry...
40,177,079 UART: ____ _ _ _ ____ _____
40,179,061 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,181,067 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,182,996 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,184,971 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,186,907 UART: |_|
40,187,714 UART:
40,562,936 UART: [rt] Runtime listening for mailbox commands...
40,564,988 >>> mbox cmd response data (128 bytes)
42,620,362 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,725,542 UART:
42,725,918 UART: Running Caliptra ROM ...
42,726,970 UART:
42,727,126 UART: [state] CFI Enabled
42,801,535 UART: [state] LifecycleState = Unprovisioned
42,803,472 UART: [state] DebugLocked = No
42,806,183 UART: [state] WD Timer not started. Device not locked for debugging
42,810,625 UART: [kat] SHA2-256
42,990,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
43,001,071 UART: [kat] ++
43,001,633 UART: [kat] sha1
43,012,583 UART: [kat] SHA2-256
43,015,278 UART: [kat] SHA2-384
43,020,829 UART: [kat] SHA2-512-ACC
43,023,178 UART: [kat] ECC-384
45,484,474 UART: [kat] HMAC-384Kdf
45,505,360 UART: [kat] LMS
45,981,807 UART: [kat] --
45,984,499 UART: [update-reset] ++
49,043,192 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,046,099 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,318,749 >>> mbox cmd response: success
49,319,147 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,319,601 UART: [update-reset] Copying MAN_2 To MAN_1
49,356,678 UART: [update-reset Success] --
49,360,361 UART: [state] Locking Datavault
49,363,097 UART: [state] Locking PCR0, PCR1 and PCR31
49,364,803 UART: [state] Locking ICCM
49,367,597 UART: [exit] Launching FMC @ 0x40000130
49,375,988 UART:
49,376,223 UART: Running Caliptra FMC ...
49,377,323 UART:
49,377,475 UART: [state] CFI Enabled
49,484,033 UART: [art] Extend RT PCRs Done
49,485,222 UART: [art] Lock RT PCRs Done
49,486,296 UART: [art] Populate DV Done
49,491,968 UART: [fht] FMC Alias Private Key: 7
49,493,553 UART: [art] Derive CDI
49,494,362 UART: [art] Store in slot 0x4
49,553,521 UART: [art] Derive Key Pair
49,554,586 UART: [art] Store priv key in slot 0x5
52,017,392 UART: [art] Derive Key Pair - Done
52,030,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,742,145 UART: [art] Erasing AUTHORITY.KEYID = 7
53,743,653 UART: [art] PUB.X = 6675CEBE531D76E16ADA44859233544CFBE126017B660C268DBEB74BDD3A1109BEFA8D27AEC3A5E27C90C7D189596C79
53,751,000 UART: [art] PUB.Y = 680E5E5B3E418B2A470DF27DC3AFB907627ADC06FF35B6547AEB16F157F54ACF470F4A9EEAA379CB19F0D75CE9F63919
53,758,252 UART: [art] SIG.R = DFC8B671E3C7C3D0AF035B7CE302F768548ADBE8E0F8017A816CA70963381E53BECD00A429968906D2F041F745AC46E9
53,765,602 UART: [art] SIG.S = 79B87BC1C3058E131F4EA6C4EB7241E233076E1DD6A7754E3F19BCB4481E7A0FAE09ED54FA38F960ED1F07CEEB2C88BE
54,744,406 UART: mbox::rt_entry...
54,745,357 UART: ____ _ _ _ ____ _____
54,747,336 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,749,344 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,751,277 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,753,210 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,755,064 UART: |_|
54,755,867 UART:
55,128,557 UART: [rt] Runtime listening for mailbox commands...
55,130,675 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,460,791 ready_for_fw is high
3,461,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,244,739 >>> mbox cmd response: success
18,531,103 UART:
18,531,502 UART: Running Caliptra FMC ...
18,532,695 UART:
18,532,866 UART: [state] CFI Enabled
18,602,597 UART: [fht] FMC Alias Private Key: 7
20,368,688 UART: [art] Extend RT PCRs Done
20,369,894 UART: [art] Lock RT PCRs Done
20,371,355 UART: [art] Populate DV Done
20,376,997 UART: [fht] FMC Alias Private Key: 7
20,378,696 UART: [art] Derive CDI
20,379,526 UART: [art] Store in slot 0x4
20,435,502 UART: [art] Derive Key Pair
20,436,565 UART: [art] Store priv key in slot 0x5
22,898,825 UART: [art] Derive Key Pair - Done
22,911,538 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,624,999 UART: [art] Erasing AUTHORITY.KEYID = 7
24,626,521 UART: [art] PUB.X = 68CFF4AF413BB2DFBFD38EACF1745CC77F51F64126AB66336C37FE1D3CBCDFCB47B3AD7CC412DD3855646D24386FFB4B
24,633,774 UART: [art] PUB.Y = F7B3F70BC11FA512F4FA4906738318FF2732A1D8AA4633F67C978487CBDB9727BB874C0E57DFA2DF554CD79B5B9D2823
24,641,095 UART: [art] SIG.R = 91311833063FCDF93527085D6FEE2DC2BE5BB65D677576DF5222C3E0CC520370EF0D2B75762DAFED47C926797FD3240A
24,648,439 UART: [art] SIG.S = A1445F38F85856CBD01A9395FA520B69A396CF85664FF955577576CF4F9271FEB9B8609D373D89C97254DF90FE243253
25,627,339 UART: Caliptra RT
25,628,057 UART: [state] CFI Enabled
25,807,709 UART: [rt] RT listening for mailbox commands...
25,809,944 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,840,062 UART: [rt]cmd =0x50435252, len=8
25,842,038 >>> mbox cmd response data (8 bytes)
27,903,421 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,604,899 >>> mbox cmd response: success
34,605,445 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,639,293 UART:
34,639,589 UART: Running Caliptra FMC ...
34,640,706 UART:
34,640,865 UART: [state] CFI Enabled
34,740,844 UART: [art] Extend RT PCRs Done
34,742,037 UART: [art] Lock RT PCRs Done
34,743,505 UART: [art] Populate DV Done
34,748,996 UART: [fht] FMC Alias Private Key: 7
34,750,519 UART: [art] Derive CDI
34,751,254 UART: [art] Store in slot 0x4
34,809,988 UART: [art] Derive Key Pair
34,810,984 UART: [art] Store priv key in slot 0x5
37,273,652 UART: [art] Derive Key Pair - Done
37,286,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,999,871 UART: [art] Erasing AUTHORITY.KEYID = 7
39,001,411 UART: [art] PUB.X = F97DD3961C099B0809BAC7994083D09EB1644B4F1A93992F8B65636A55DA775727303C453C0AFFBBD0D3CBA6D1D654A0
39,008,632 UART: [art] PUB.Y = BEDD56EFB110B8CA5E970E3EDDBA36164CB020DDF60BEF3956DB7B94298CAC10B925AFE09B73AB268D9A57B7571E8E82
39,015,934 UART: [art] SIG.R = E20AF610A1751C24077D322A8EC01FBFF1C6D50EB2156F42BB2848CE41FFE72913A06A6F78C4AD10F3725807F9302E9A
39,023,336 UART: [art] SIG.S = FA8A546E58956ABCDDD3845EED4DCD590DEE06BA9B1B3B770BAD84CD3D9F4A247ABC5E55272260F1D6783F569458FA89
40,001,494 UART: mbox::rt_entry...
40,002,464 UART: ____ _ _ _ ____ _____
40,004,454 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,006,463 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,008,394 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,010,324 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,012,250 UART: |_|
40,013,236 UART:
40,384,706 UART: [rt] Runtime listening for mailbox commands...
40,386,745 >>> mbox cmd response data (128 bytes)
42,442,490 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,130,522 >>> mbox cmd response: success
49,131,107 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,165,713 UART:
49,166,031 UART: Running Caliptra FMC ...
49,167,157 UART:
49,167,323 UART: [state] CFI Enabled
49,268,110 UART: [art] Extend RT PCRs Done
49,269,290 UART: [art] Lock RT PCRs Done
49,270,960 UART: [art] Populate DV Done
49,276,530 UART: [fht] FMC Alias Private Key: 7
49,278,059 UART: [art] Derive CDI
49,278,820 UART: [art] Store in slot 0x4
49,337,177 UART: [art] Derive Key Pair
49,338,232 UART: [art] Store priv key in slot 0x5
51,800,671 UART: [art] Derive Key Pair - Done
51,813,937 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,527,895 UART: [art] Erasing AUTHORITY.KEYID = 7
53,529,393 UART: [art] PUB.X = 64BC839E9758D1A6F82EDD53D639CA125C356864CAC3C72001AC2CCD382EC2C79F8B4227F04A1B4573B20A357AC350AE
53,536,651 UART: [art] PUB.Y = E87B5E28A5DE756EE20BF84291FE8C06D505021A1F79760D88FA5834372DC599C44A3FD63129D6D2BBBC21C0D8695385
53,543,941 UART: [art] SIG.R = A8FB7E1FFBDBBAB3A5943F47BCA27ACD6C6B34C329D92230AFA405B149BAAF887AAC9056C3B8EC95D8A573F0485AED6C
53,551,420 UART: [art] SIG.S = 2C1489771E2E17BE69AF5501C5E3D64CEF68E72AA9C2A176CF7F546067DD1F913832DA3EB7342C858E9394318C5D7FC4
54,530,215 UART: mbox::rt_entry...
54,531,177 UART: ____ _ _ _ ____ _____
54,533,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,535,117 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,537,046 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,538,975 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,540,898 UART: |_|
54,541,728 UART:
54,913,413 UART: [rt] Runtime listening for mailbox commands...
54,915,434 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
192,385 UART:
192,740 UART: Running Caliptra ROM ...
193,932 UART:
603,728 UART: [state] CFI Enabled
620,254 UART: [state] LifecycleState = Unprovisioned
622,205 UART: [state] DebugLocked = No
623,523 UART: [state] WD Timer not started. Device not locked for debugging
627,996 UART: [kat] SHA2-256
807,687 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,433 UART: [kat] ++
818,880 UART: [kat] sha1
829,849 UART: [kat] SHA2-256
832,546 UART: [kat] SHA2-384
837,567 UART: [kat] SHA2-512-ACC
839,941 UART: [kat] ECC-384
3,279,335 UART: [kat] HMAC-384Kdf
3,291,626 UART: [kat] LMS
3,768,113 UART: [kat] --
3,772,891 UART: [cold-reset] ++
3,774,679 UART: [fht] FHT @ 0x50003400
3,786,090 UART: [idev] ++
3,786,700 UART: [idev] CDI.KEYID = 6
3,787,627 UART: [idev] SUBJECT.KEYID = 7
3,788,879 UART: [idev] UDS.KEYID = 0
3,789,805 ready_for_fw is high
3,789,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,714 UART: [idev] Erasing UDS.KEYID = 0
6,261,353 UART: [idev] Sha1 KeyId Algorithm
6,284,813 UART: [idev] --
6,290,776 UART: [ldev] ++
6,291,349 UART: [ldev] CDI.KEYID = 6
6,292,259 UART: [ldev] SUBJECT.KEYID = 5
6,293,412 UART: [ldev] AUTHORITY.KEYID = 7
6,294,755 UART: [ldev] FE.KEYID = 1
6,306,942 UART: [ldev] Erasing FE.KEYID = 1
8,784,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,572,292 UART: [ldev] --
10,577,883 UART: [fwproc] Wait for Commands...
10,580,081 UART: [fwproc] Recv command 0x46574c44
10,582,171 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,152 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,551,204 >>> mbox cmd response: success
14,554,680 UART: [afmc] ++
14,555,293 UART: [afmc] CDI.KEYID = 6
14,556,177 UART: [afmc] SUBJECT.KEYID = 7
14,557,453 UART: [afmc] AUTHORITY.KEYID = 5
17,058,637 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,369 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,451 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,070 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,567 UART: [afmc] --
18,858,135 UART: [cold-reset] --
18,862,375 UART: [state] Locking Datavault
18,869,377 UART: [state] Locking PCR0, PCR1 and PCR31
18,871,139 UART: [state] Locking ICCM
18,873,188 UART: [exit] Launching FMC @ 0x40000130
18,881,586 UART:
18,881,825 UART: Running Caliptra FMC ...
18,882,929 UART:
18,883,088 UART: [state] CFI Enabled
18,891,086 UART: [fht] FMC Alias Private Key: 7
20,657,336 UART: [art] Extend RT PCRs Done
20,658,564 UART: [art] Lock RT PCRs Done
20,660,379 UART: [art] Populate DV Done
20,665,904 UART: [fht] FMC Alias Private Key: 7
20,667,492 UART: [art] Derive CDI
20,668,237 UART: [art] Store in slot 0x4
20,710,347 UART: [art] Derive Key Pair
20,711,350 UART: [art] Store priv key in slot 0x5
23,138,085 UART: [art] Derive Key Pair - Done
23,150,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,857,394 UART: [art] Erasing AUTHORITY.KEYID = 7
24,858,896 UART: [art] PUB.X = 8CD04A2F8EFF58CD17FF47A1B3EB0BF1FFC7C816E8F44B33800E3340590172C285D71D688F0A7BAA70ECBCC5DD23F748
24,866,149 UART: [art] PUB.Y = 125CBAD4B467B495EEC470CFFBE7C247CF5114877EB322E97423F017A687104A75CC6097C7FB013A5DF1894C34EC8518
24,873,437 UART: [art] SIG.R = B17B66875A1B58961372B35DD3DD7A5951139B2887B17B31291B09487AF5BFC86984CC0EB45FE9705F25B03EFE33168F
24,880,830 UART: [art] SIG.S = 01368FE3F3E6980B867EADACA42DA881EA520559B70AF55411294EEA973A8EDE80F25307505DB537204BC878452AB4FE
25,860,367 UART: Caliptra RT
25,861,080 UART: [state] CFI Enabled
25,994,196 UART: [rt] RT listening for mailbox commands...
25,996,400 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,026,081 UART: [rt]cmd =0x50435252, len=8
26,027,929 >>> mbox cmd response data (8 bytes)
28,080,720 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,186,953 UART:
28,187,329 UART: Running Caliptra ROM ...
28,188,467 UART:
28,188,643 UART: [state] CFI Enabled
28,205,398 UART: [state] LifecycleState = Unprovisioned
28,207,350 UART: [state] DebugLocked = No
28,209,864 UART: [state] WD Timer not started. Device not locked for debugging
28,213,609 UART: [kat] SHA2-256
28,393,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,404,107 UART: [kat] ++
28,404,561 UART: [kat] sha1
28,415,488 UART: [kat] SHA2-256
28,418,232 UART: [kat] SHA2-384
28,423,947 UART: [kat] SHA2-512-ACC
28,426,306 UART: [kat] ECC-384
30,869,871 UART: [kat] HMAC-384Kdf
30,882,429 UART: [kat] LMS
31,358,856 UART: [kat] --
31,363,925 UART: [update-reset] ++
34,420,642 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,424,944 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,697,541 >>> mbox cmd response: success
34,697,910 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,698,735 UART: [update-reset] Copying MAN_2 To MAN_1
34,735,860 UART: [update-reset Success] --
34,741,283 UART: [state] Locking Datavault
34,745,623 UART: [state] Locking PCR0, PCR1 and PCR31
34,747,336 UART: [state] Locking ICCM
34,749,708 UART: [exit] Launching FMC @ 0x40000130
34,758,107 UART:
34,758,363 UART: Running Caliptra FMC ...
34,759,465 UART:
34,759,628 UART: [state] CFI Enabled
34,803,804 UART: [art] Extend RT PCRs Done
34,804,949 UART: [art] Lock RT PCRs Done
34,806,233 UART: [art] Populate DV Done
34,811,641 UART: [fht] FMC Alias Private Key: 7
34,813,285 UART: [art] Derive CDI
34,814,100 UART: [art] Store in slot 0x4
34,856,682 UART: [art] Derive Key Pair
34,857,736 UART: [art] Store priv key in slot 0x5
37,285,191 UART: [art] Derive Key Pair - Done
37,297,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,004,142 UART: [art] Erasing AUTHORITY.KEYID = 7
39,005,665 UART: [art] PUB.X = 055B71EBA4B49EFE4F6DC663A870AFB55C710286C266A1BE9EE9D0EE10121536D51E0CB240DF50F60E55B5F4A420BFAA
39,012,918 UART: [art] PUB.Y = EC6BFA1D477466D9CB9AA2A74F16BD14C48DC6FD1F795A46BE06767D742862A856669DC9231DF4EAF8165DA7CB7C18DE
39,020,235 UART: [art] SIG.R = F025B0136C2904F7C7D58F128271F55AAD80DAF8D7A7264FF2192B5A0D92F4D0DD12EF8C8FCB394979D96A8BF3AEC799
39,027,634 UART: [art] SIG.S = 7B0F63E095ABA22A726A8AF48D631802CAC12157D0FDA9D91CCF3518673C7DBD0F4599B6448F28D131840A12A67CD119
40,006,622 UART: mbox::rt_entry...
40,007,584 UART: ____ _ _ _ ____ _____
40,009,573 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,011,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,013,519 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,015,451 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,017,383 UART: |_|
40,018,237 UART:
40,389,224 UART: [rt] Runtime listening for mailbox commands...
40,391,256 >>> mbox cmd response data (128 bytes)
42,447,304 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,552,316 UART:
42,552,668 UART: Running Caliptra ROM ...
42,553,803 UART:
42,553,974 UART: [state] CFI Enabled
42,569,061 UART: [state] LifecycleState = Unprovisioned
42,570,965 UART: [state] DebugLocked = No
42,573,969 UART: [state] WD Timer not started. Device not locked for debugging
42,577,015 UART: [kat] SHA2-256
42,756,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,767,501 UART: [kat] ++
42,767,959 UART: [kat] sha1
42,779,063 UART: [kat] SHA2-256
42,781,771 UART: [kat] SHA2-384
42,787,330 UART: [kat] SHA2-512-ACC
42,789,735 UART: [kat] ECC-384
45,230,067 UART: [kat] HMAC-384Kdf
45,242,636 UART: [kat] LMS
45,719,114 UART: [kat] --
45,723,800 UART: [update-reset] ++
48,784,739 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,787,739 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,060,330 >>> mbox cmd response: success
49,060,714 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,061,760 UART: [update-reset] Copying MAN_2 To MAN_1
49,098,874 UART: [update-reset Success] --
49,102,466 UART: [state] Locking Datavault
49,105,667 UART: [state] Locking PCR0, PCR1 and PCR31
49,107,421 UART: [state] Locking ICCM
49,109,473 UART: [exit] Launching FMC @ 0x40000130
49,117,816 UART:
49,118,055 UART: Running Caliptra FMC ...
49,119,179 UART:
49,119,335 UART: [state] CFI Enabled
49,163,403 UART: [art] Extend RT PCRs Done
49,164,587 UART: [art] Lock RT PCRs Done
49,165,989 UART: [art] Populate DV Done
49,171,668 UART: [fht] FMC Alias Private Key: 7
49,173,204 UART: [art] Derive CDI
49,174,018 UART: [art] Store in slot 0x4
49,216,612 UART: [art] Derive Key Pair
49,217,615 UART: [art] Store priv key in slot 0x5
51,644,387 UART: [art] Derive Key Pair - Done
51,657,217 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,363,005 UART: [art] Erasing AUTHORITY.KEYID = 7
53,364,518 UART: [art] PUB.X = 72F8D2225B48266B537AAFCF21E8C22D8CB15D8929DCFF7E6E9C4F64226FF944280148098F7E40E4367DC512B505AECD
53,371,821 UART: [art] PUB.Y = 6FECF9F6D388BDBC4AA2FBF15E07D4B476781CD1D46A1235874495742F15E24F05FE2D7176BD9443FB14731875909746
53,379,048 UART: [art] SIG.R = 75FB9BAADC4A4087C371074B28659409A1056B082B93B573E10B6BD7997C78F15B8CA66618368E6C72FF149367EF61A4
53,386,499 UART: [art] SIG.S = 040A470FC266698202E74D3AE3D67F1D451028E217F84F0FC3824459F81C5DF3AE27047398044D64E41ECB4ED4A47B55
54,365,079 UART: mbox::rt_entry...
54,366,021 UART: ____ _ _ _ ____ _____
54,367,954 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,369,960 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,371,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,373,745 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,375,630 UART: |_|
54,376,513 UART:
54,746,694 UART: [rt] Runtime listening for mailbox commands...
54,748,725 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,778,859 ready_for_fw is high
3,779,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,430,882 >>> mbox cmd response: success
18,681,460 UART:
18,681,835 UART: Running Caliptra FMC ...
18,683,041 UART:
18,683,217 UART: [state] CFI Enabled
18,691,055 UART: [fht] FMC Alias Private Key: 7
20,457,710 UART: [art] Extend RT PCRs Done
20,458,934 UART: [art] Lock RT PCRs Done
20,460,375 UART: [art] Populate DV Done
20,465,914 UART: [fht] FMC Alias Private Key: 7
20,467,620 UART: [art] Derive CDI
20,468,443 UART: [art] Store in slot 0x4
20,511,276 UART: [art] Derive Key Pair
20,512,319 UART: [art] Store priv key in slot 0x5
22,938,974 UART: [art] Derive Key Pair - Done
22,951,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,658,502 UART: [art] Erasing AUTHORITY.KEYID = 7
24,660,001 UART: [art] PUB.X = BAC61CED91769D13A30D467957AD8A0C7546E1F33AC175951599482E32482995BD7DCE664223864EE942D87563031DD4
24,667,271 UART: [art] PUB.Y = 2EC166E86DC1B56846342C33DE801A3B385C3BAE49299C562718427FC481286C4CB877B21B9182A332F2C07358B54EB4
24,674,469 UART: [art] SIG.R = C0ACB775335BADD5C56057905ED1B386F600DC6973D0AA1D7714EAE79A8D5B0FA5CEBAC842D57213AEABC5F1FE98BAB1
24,681,877 UART: [art] SIG.S = 7157DE68DC13639DE7B39AD665E13B57855A06D8BC4C09DDA27E6BAA1050564FA2737E2D90B2416E3D7194A4D09C9FF4
25,660,568 UART: Caliptra RT
25,661,265 UART: [state] CFI Enabled
25,793,256 UART: [rt] RT listening for mailbox commands...
25,795,477 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
25,825,380 UART: [rt]cmd =0x50435252, len=8
25,827,515 >>> mbox cmd response data (8 bytes)
27,880,023 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,495,958 >>> mbox cmd response: success
34,496,469 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
34,533,123 UART:
34,533,413 UART: Running Caliptra FMC ...
34,534,537 UART:
34,534,702 UART: [state] CFI Enabled
34,578,567 UART: [art] Extend RT PCRs Done
34,579,754 UART: [art] Lock RT PCRs Done
34,581,090 UART: [art] Populate DV Done
34,586,793 UART: [fht] FMC Alias Private Key: 7
34,588,499 UART: [art] Derive CDI
34,589,235 UART: [art] Store in slot 0x4
34,632,096 UART: [art] Derive Key Pair
34,633,096 UART: [art] Store priv key in slot 0x5
37,059,504 UART: [art] Derive Key Pair - Done
37,072,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,778,513 UART: [art] Erasing AUTHORITY.KEYID = 7
38,780,019 UART: [art] PUB.X = 26069C981BC73C3E05B0E8A9C0959FDAD0CB13D8ADA9AF3EAE6118E2C016021BB50FDE0461134682CB6E54CFC25EDCF3
38,787,296 UART: [art] PUB.Y = BD1F0BCDDAC8DBA92C29F4BC589D62E51B46490E9F7276DBC1E122D616762240EFDBAA2DA64EA6BE7DA0BF0D69843FE5
38,794,591 UART: [art] SIG.R = B5ABEDDC4B35581D8771B1698D56FC6A072CABF4C3EC987B3A6E64EBB508BBE05DBE94B42179703C4B75E5A7796C26A1
38,801,993 UART: [art] SIG.S = AA369CF2D00CAD6D9F6C4C247344E50FC09C758CE1D6B1726B605A96A42D7DC321E4F105C7575E5ED9CAF8701EF1C738
39,780,727 UART: mbox::rt_entry...
39,781,680 UART: ____ _ _ _ ____ _____
39,783,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,785,686 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,787,619 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,789,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,791,480 UART: |_|
39,792,317 UART:
40,163,108 UART: [rt] Runtime listening for mailbox commands...
40,165,296 >>> mbox cmd response data (128 bytes)
42,214,438 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,822,317 >>> mbox cmd response: success
48,822,800 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
48,857,299 UART:
48,857,598 UART: Running Caliptra FMC ...
48,858,736 UART:
48,858,903 UART: [state] CFI Enabled
48,902,946 UART: [art] Extend RT PCRs Done
48,904,165 UART: [art] Lock RT PCRs Done
48,905,630 UART: [art] Populate DV Done
48,911,150 UART: [fht] FMC Alias Private Key: 7
48,912,751 UART: [art] Derive CDI
48,913,569 UART: [art] Store in slot 0x4
48,956,168 UART: [art] Derive Key Pair
48,957,172 UART: [art] Store priv key in slot 0x5
51,383,798 UART: [art] Derive Key Pair - Done
51,397,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,103,472 UART: [art] Erasing AUTHORITY.KEYID = 7
53,104,985 UART: [art] PUB.X = 368337C4288CC9833DCE68CD7217E4BAAA5533505079AF9D1DDEE09D308F0F32EE309271781A28B7337EC2EA4F9AF6F7
53,112,241 UART: [art] PUB.Y = E5762F93A0484878E6EF9AD878AB81EB1141D9A5D5E4BEF657CE2C64EF71809FAFAA419CAA31CB1EF1D29635E77BB514
53,119,526 UART: [art] SIG.R = 60C2C334131C1732675480D72F893E8E4839BA05AB78A0266F76CA084C236486A1B65EEBDA194293FD493FBBD440C2FE
53,126,894 UART: [art] SIG.S = 7431B510348E749E3DD8080CD7870900713BF8E0BF5B4ABEF5C6B7B96E8D25A1F10CFCAD47CE0FF54D83A32752E286D0
54,105,244 UART: mbox::rt_entry...
54,106,196 UART: ____ _ _ _ ____ _____
54,108,126 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,110,131 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,111,986 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,113,915 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,115,844 UART: |_|
54,116,831 UART:
54,486,928 UART: [rt] Runtime listening for mailbox commands...
54,488,935 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
192,128 UART:
192,484 UART: Running Caliptra ROM ...
193,660 UART:
193,832 UART: [state] CFI Enabled
266,039 UART: [state] LifecycleState = Unprovisioned
268,458 UART: [state] DebugLocked = No
270,207 UART: [state] WD Timer not started. Device not locked for debugging
275,164 UART: [kat] SHA2-256
465,062 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,812 UART: [kat] ++
476,261 UART: [kat] sha1
487,914 UART: [kat] SHA2-256
490,923 UART: [kat] SHA2-384
496,482 UART: [kat] SHA2-512-ACC
499,057 UART: [kat] ECC-384
2,949,256 UART: [kat] HMAC-384Kdf
2,971,650 UART: [kat] LMS
3,503,413 UART: [kat] --
3,506,559 UART: [cold-reset] ++
3,508,864 UART: [fht] FHT @ 0x50003400
3,520,407 UART: [idev] ++
3,521,116 UART: [idev] CDI.KEYID = 6
3,521,997 UART: [idev] SUBJECT.KEYID = 7
3,523,233 UART: [idev] UDS.KEYID = 0
3,524,132 ready_for_fw is high
3,524,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,369 UART: [idev] Erasing UDS.KEYID = 0
6,030,994 UART: [idev] Sha1 KeyId Algorithm
6,054,921 UART: [idev] --
6,059,691 UART: [ldev] ++
6,060,408 UART: [ldev] CDI.KEYID = 6
6,061,295 UART: [ldev] SUBJECT.KEYID = 5
6,062,507 UART: [ldev] AUTHORITY.KEYID = 7
6,063,685 UART: [ldev] FE.KEYID = 1
6,099,582 UART: [ldev] Erasing FE.KEYID = 1
8,604,909 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,236 UART: [ldev] --
10,411,959 UART: [fwproc] Wait for Commands...
10,414,428 UART: [fwproc] Recv command 0x46574c44
10,416,732 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,673,492 >>> mbox cmd response: success
14,676,963 UART: [afmc] ++
14,677,668 UART: [afmc] CDI.KEYID = 6
14,678,911 UART: [afmc] SUBJECT.KEYID = 7
14,680,369 UART: [afmc] AUTHORITY.KEYID = 5
17,215,447 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,116 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,251 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,170 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,007,286 UART: [afmc] --
19,011,095 UART: [cold-reset] --
19,014,583 UART: [state] Locking Datavault
19,018,485 UART: [state] Locking PCR0, PCR1 and PCR31
19,020,682 UART: [state] Locking ICCM
19,023,543 UART: [exit] Launching FMC @ 0x40000130
19,032,219 UART:
19,032,454 UART: Running Caliptra FMC ...
19,033,552 UART:
19,033,733 UART: [state] CFI Enabled
19,095,343 UART: [fht] FMC Alias Private Key: 7
20,882,926 UART: [art] Extend RT PCRs Done
20,884,140 UART: [art] Lock RT PCRs Done
20,885,762 UART: [art] Populate DV Done
20,891,326 UART: [fht] FMC Alias Private Key: 7
20,892,856 UART: [art] Derive CDI
20,893,665 UART: [art] Store in slot 0x4
20,949,028 UART: [art] Derive Key Pair
20,950,064 UART: [art] Store priv key in slot 0x5
23,413,050 UART: [art] Derive Key Pair - Done
23,425,999 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,172 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,687 UART: [art] PUB.X = 159F64D855C9953C963BF7DBB8B09C7C666F023B9172D877D9E88D774D520544C9BD62BEE905BBE518B6ADBEFECC4773
25,147,954 UART: [art] PUB.Y = DAD71E946CB8736AB424BA52E29A1B581311528BB99933432DF5AC08FF0F4EA33128B3C518B5C2B5B0A0779A1E3D7C4F
25,155,195 UART: [art] SIG.R = EB5418EF9A7A30830C6AAD32705C7275F3C62243707D1AC659CDA39B8CCE93A1035D3BD0E237CD30BE6237094F62BC7B
25,162,617 UART: [art] SIG.S = C4C9BCC6354BAE9C2E537FCDF7E46709C361C0072C57FA26EF5FFFF66D8E4A2E68D77FE95B9E7AC308758C22A7F0F739
26,141,775 UART: Caliptra RT
26,142,487 UART: [state] CFI Enabled
26,322,763 UART: [rt] RT listening for mailbox commands...
26,325,141 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,354,985 UART: [rt]cmd =0x50435252, len=8
26,357,006 >>> mbox cmd response data (8 bytes)
28,417,673 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,523,591 UART:
28,523,936 UART: Running Caliptra ROM ...
28,525,070 UART:
28,525,249 UART: [state] CFI Enabled
28,595,179 UART: [state] LifecycleState = Unprovisioned
28,597,235 UART: [state] DebugLocked = No
28,599,216 UART: [state] WD Timer not started. Device not locked for debugging
28,604,530 UART: [kat] SHA2-256
28,794,389 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,805,165 UART: [kat] ++
28,805,650 UART: [kat] sha1
28,817,887 UART: [kat] SHA2-256
28,820,851 UART: [kat] SHA2-384
28,826,889 UART: [kat] SHA2-512-ACC
28,829,449 UART: [kat] ECC-384
31,278,374 UART: [kat] HMAC-384Kdf
31,300,053 UART: [kat] LMS
31,831,619 UART: [kat] --
31,836,487 UART: [update-reset] ++
34,908,819 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,911,938 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,327,361 >>> mbox cmd response: success
35,327,718 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,328,271 UART: [update-reset] Copying MAN_2 To MAN_1
35,365,877 UART: [update-reset Success] --
35,369,981 UART: [state] Locking Datavault
35,373,716 UART: [state] Locking PCR0, PCR1 and PCR31
35,375,852 UART: [state] Locking ICCM
35,377,404 UART: [exit] Launching FMC @ 0x40000130
35,386,067 UART:
35,386,300 UART: Running Caliptra FMC ...
35,387,396 UART:
35,387,551 UART: [state] CFI Enabled
35,492,104 UART: [art] Extend RT PCRs Done
35,493,288 UART: [art] Lock RT PCRs Done
35,494,845 UART: [art] Populate DV Done
35,500,746 UART: [fht] FMC Alias Private Key: 7
35,502,430 UART: [art] Derive CDI
35,503,248 UART: [art] Store in slot 0x4
35,560,958 UART: [art] Derive Key Pair
35,561,951 UART: [art] Store priv key in slot 0x5
38,024,738 UART: [art] Derive Key Pair - Done
38,037,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,750,062 UART: [art] Erasing AUTHORITY.KEYID = 7
39,751,548 UART: [art] PUB.X = 59E148747DEB41A916F79609C81D5DF9CDC67485DDBFBCB5CE3D27DA5D78A5310DB692A43DF8A2024F3504BB5D133768
39,758,856 UART: [art] PUB.Y = 231E501009146AA7913EEF92848F841C2816697D1883166235E363849CC8FDBA2536ABA9F31830A701DE272917B544ED
39,766,081 UART: [art] SIG.R = 44724E5FD65F5C6AECB12347E0F6FC5D7339497855D3DBEBE44184C56E2FAB9041C3495721B727D178EA055B60D2C97B
39,773,466 UART: [art] SIG.S = 2FD7D071C4407825DA48AE98376CBA9A0DD3EB4F845E557E8EB45B69911F1C1318D425B057A05AACADBC7D1558A67AA3
40,751,729 UART: mbox::rt_entry...
40,752,695 UART: ____ _ _ _ ____ _____
40,754,677 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,756,676 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,758,620 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,760,546 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,762,469 UART: |_|
40,763,275 UART:
41,135,851 UART: [rt] Runtime listening for mailbox commands...
41,137,856 >>> mbox cmd response data (128 bytes)
43,194,150 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,299,202 UART:
43,299,562 UART: Running Caliptra ROM ...
43,300,617 UART:
43,300,769 UART: [state] CFI Enabled
43,372,585 UART: [state] LifecycleState = Unprovisioned
43,374,657 UART: [state] DebugLocked = No
43,377,296 UART: [state] WD Timer not started. Device not locked for debugging
43,382,654 UART: [kat] SHA2-256
43,572,537 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,583,283 UART: [kat] ++
43,583,771 UART: [kat] sha1
43,594,496 UART: [kat] SHA2-256
43,597,507 UART: [kat] SHA2-384
43,604,469 UART: [kat] SHA2-512-ACC
43,607,083 UART: [kat] ECC-384
46,055,528 UART: [kat] HMAC-384Kdf
46,081,054 UART: [kat] LMS
46,612,650 UART: [kat] --
46,615,847 UART: [update-reset] ++
49,681,168 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,684,535 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,100,024 >>> mbox cmd response: success
50,100,415 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,100,698 UART: [update-reset] Copying MAN_2 To MAN_1
50,138,161 UART: [update-reset Success] --
50,142,259 UART: [state] Locking Datavault
50,144,487 UART: [state] Locking PCR0, PCR1 and PCR31
50,146,669 UART: [state] Locking ICCM
50,147,952 UART: [exit] Launching FMC @ 0x40000130
50,156,613 UART:
50,156,846 UART: Running Caliptra FMC ...
50,157,878 UART:
50,158,024 UART: [state] CFI Enabled
50,251,023 UART: [art] Extend RT PCRs Done
50,252,202 UART: [art] Lock RT PCRs Done
50,253,680 UART: [art] Populate DV Done
50,259,404 UART: [fht] FMC Alias Private Key: 7
50,261,114 UART: [art] Derive CDI
50,261,847 UART: [art] Store in slot 0x4
50,320,126 UART: [art] Derive Key Pair
50,321,188 UART: [art] Store priv key in slot 0x5
52,784,009 UART: [art] Derive Key Pair - Done
52,797,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,509,786 UART: [art] Erasing AUTHORITY.KEYID = 7
54,511,268 UART: [art] PUB.X = 7A49668BEA0DD93B0035EF97773263A26C19A3FACF1EB2909B4427E7436736FD81870E76C2A5625819B0EF043FD3A26B
54,518,507 UART: [art] PUB.Y = 4CF487604EAEA4513F07CFD8009243215EB74DE677B808C0201486DCBE2808EE2103A0B7ECC0F95DD36A8412FA9A8FA5
54,525,792 UART: [art] SIG.R = A7618D8FE5EC337E3D1DD9F2A68C17BCFB1C6426411656DFA34091A0A2665BC631E9E66FD73708D28661DE3A9E228281
54,533,178 UART: [art] SIG.S = A4848C39896665A1E549A1A77B35A5F1855A43F8D218811B5B0FB256CCF73FA92AF7A8DAB6E1F7D2A52243A87B5FB548
55,511,039 UART: mbox::rt_entry...
55,511,997 UART: ____ _ _ _ ____ _____
55,513,978 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,515,979 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,517,904 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,519,848 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,521,774 UART: |_|
55,522,578 UART:
55,892,780 UART: [rt] Runtime listening for mailbox commands...
55,894,788 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,875 writing to cptra_bootfsm_go
3,421,296 ready_for_fw is high
3,421,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,012 >>> mbox cmd response: success
19,095,365 UART:
19,095,762 UART: Running Caliptra FMC ...
19,096,867 UART:
19,097,020 UART: [state] CFI Enabled
19,158,326 UART: [fht] FMC Alias Private Key: 7
20,925,167 UART: [art] Extend RT PCRs Done
20,926,382 UART: [art] Lock RT PCRs Done
20,927,981 UART: [art] Populate DV Done
20,933,304 UART: [fht] FMC Alias Private Key: 7
20,934,799 UART: [art] Derive CDI
20,935,534 UART: [art] Store in slot 0x4
20,991,276 UART: [art] Derive Key Pair
20,992,277 UART: [art] Store priv key in slot 0x5
23,454,508 UART: [art] Derive Key Pair - Done
23,467,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,181,101 UART: [art] Erasing AUTHORITY.KEYID = 7
25,182,593 UART: [art] PUB.X = F358B2670534A9B79509AFCADD5753444102915398B0BF3933D1DEF7EA1A199A7FC8556DEFE117EFAA7257649CBD2E11
25,189,885 UART: [art] PUB.Y = 612E10A6A9C01DFADA5A7D8831B3F1804A8BFFA591A32A2EFDE31F2B9B50B8CB8C82778DF88731EE277F7B302E610286
25,197,166 UART: [art] SIG.R = 3ED51E9857B37355A7CE68920701EB313A52B4E82AF3DC69DCFB491D7F994478D04D98172A832C54950426B557DA47E1
25,204,542 UART: [art] SIG.S = 70DD340E34EAF2A6300D7C8B82704057544A0D16EDFD444765A7268D5BB989BF5F9C61285570586A84DBE56AD05CE760
26,183,402 UART: Caliptra RT
26,184,114 UART: [state] CFI Enabled
26,364,345 UART: [rt] RT listening for mailbox commands...
26,366,657 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,396,579 UART: [rt]cmd =0x50435252, len=8
26,398,714 >>> mbox cmd response data (8 bytes)
28,456,322 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,560,439 >>> mbox cmd response: success
35,561,049 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,593,553 UART:
35,593,843 UART: Running Caliptra FMC ...
35,594,874 UART:
35,595,020 UART: [state] CFI Enabled
35,682,765 UART: [art] Extend RT PCRs Done
35,683,982 UART: [art] Lock RT PCRs Done
35,685,510 UART: [art] Populate DV Done
35,690,734 UART: [fht] FMC Alias Private Key: 7
35,692,227 UART: [art] Derive CDI
35,692,960 UART: [art] Store in slot 0x4
35,751,833 UART: [art] Derive Key Pair
35,752,877 UART: [art] Store priv key in slot 0x5
38,215,646 UART: [art] Derive Key Pair - Done
38,228,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,941,320 UART: [art] Erasing AUTHORITY.KEYID = 7
39,942,829 UART: [art] PUB.X = C22334E9AD78BABAB0B8E40EFACC4E9A4090BAD4A3451403B38BF0C68016BC8C4D7C3225EC2C36A3E9CB28D814C4C190
39,950,132 UART: [art] PUB.Y = 117C25866D7200F2426EA2002C85ED87E30972D3BFD4139FBA3B7E3307A8FAAEF2257F6172A53C936D2EDC611D335317
39,957,335 UART: [art] SIG.R = 1F47A5A3C7C25D7FDF3FBABD124B2107AA95BB26EBB4F99D79114E243ED10CED37992AE1F8B7244969E65EA98D889440
39,964,736 UART: [art] SIG.S = A5DEBF694E5652A6CB8D1FB27EC9B0E967614B3FC53ED5626C48C772624CB9C777E19715BE62718499464A311BB0BB0F
40,942,681 UART: mbox::rt_entry...
40,943,623 UART: ____ _ _ _ ____ _____
40,945,561 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,947,564 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,949,515 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,951,445 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,953,369 UART: |_|
40,954,199 UART:
41,331,409 UART: [rt] Runtime listening for mailbox commands...
41,333,446 >>> mbox cmd response data (128 bytes)
43,389,878 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,473,486 >>> mbox cmd response: success
50,473,991 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,509,336 UART:
50,509,619 UART: Running Caliptra FMC ...
50,510,655 UART:
50,510,822 UART: [state] CFI Enabled
50,612,068 UART: [art] Extend RT PCRs Done
50,613,274 UART: [art] Lock RT PCRs Done
50,614,970 UART: [art] Populate DV Done
50,620,430 UART: [fht] FMC Alias Private Key: 7
50,622,018 UART: [art] Derive CDI
50,622,760 UART: [art] Store in slot 0x4
50,681,349 UART: [art] Derive Key Pair
50,682,388 UART: [art] Store priv key in slot 0x5
53,144,484 UART: [art] Derive Key Pair - Done
53,157,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,870,112 UART: [art] Erasing AUTHORITY.KEYID = 7
54,871,636 UART: [art] PUB.X = CEF8D704A23BCC8B8DA463D29AEE6C386DF0AD56BC290032638F4FE7247A39003068321F92C38C64011BC386930FF912
54,878,828 UART: [art] PUB.Y = 917CAAA105636CCFAF31CEB6E8B64A583C7C9E5FD157C78E993FE5F2BB2CC648DFD5F90BD722C5C930ACC46D5B817AAD
54,886,163 UART: [art] SIG.R = A68F9D08D40E7AB040D45FCB2F20F1E75685F7EBE624137A389AE3FCF3BCB91CF9D3C3DF413CFEA52D5B02DCC1E2DBBD
54,893,540 UART: [art] SIG.S = 7945887AF4D70F277C8668735236FF9CE40B4A143E851285E33E4AA15A40A071EAC949C3E36A25EBD3FDD028D4753313
55,872,787 UART: mbox::rt_entry...
55,873,733 UART: ____ _ _ _ ____ _____
55,875,658 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,877,863 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,879,729 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,881,657 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,883,543 UART: |_|
55,884,426 UART:
56,255,274 UART: [rt] Runtime listening for mailbox commands...
56,257,278 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,322 UART:
192,701 UART: Running Caliptra ROM ...
193,833 UART:
603,682 UART: [state] CFI Enabled
618,016 UART: [state] LifecycleState = Unprovisioned
620,412 UART: [state] DebugLocked = No
623,085 UART: [state] WD Timer not started. Device not locked for debugging
626,796 UART: [kat] SHA2-256
816,480 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,203 UART: [kat] ++
827,778 UART: [kat] sha1
839,728 UART: [kat] SHA2-256
842,747 UART: [kat] SHA2-384
848,817 UART: [kat] SHA2-512-ACC
851,404 UART: [kat] ECC-384
3,296,384 UART: [kat] HMAC-384Kdf
3,311,039 UART: [kat] LMS
3,842,832 UART: [kat] --
3,847,365 UART: [cold-reset] ++
3,848,804 UART: [fht] FHT @ 0x50003400
3,861,662 UART: [idev] ++
3,862,408 UART: [idev] CDI.KEYID = 6
3,863,333 UART: [idev] SUBJECT.KEYID = 7
3,864,510 UART: [idev] UDS.KEYID = 0
3,865,436 ready_for_fw is high
3,865,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,443 UART: [idev] Erasing UDS.KEYID = 0
6,340,047 UART: [idev] Sha1 KeyId Algorithm
6,362,205 UART: [idev] --
6,366,690 UART: [ldev] ++
6,367,383 UART: [ldev] CDI.KEYID = 6
6,368,298 UART: [ldev] SUBJECT.KEYID = 5
6,369,461 UART: [ldev] AUTHORITY.KEYID = 7
6,370,693 UART: [ldev] FE.KEYID = 1
6,383,072 UART: [ldev] Erasing FE.KEYID = 1
8,859,743 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,810 UART: [ldev] --
10,649,241 UART: [fwproc] Wait for Commands...
10,652,328 UART: [fwproc] Recv command 0x46574c44
10,654,587 UART: [fwproc] Recv'd Img size: 118548 bytes
14,159,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,153 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,360,765 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,920,662 >>> mbox cmd response: success
14,923,917 UART: [afmc] ++
14,924,628 UART: [afmc] CDI.KEYID = 6
14,925,746 UART: [afmc] SUBJECT.KEYID = 7
14,927,300 UART: [afmc] AUTHORITY.KEYID = 5
17,427,628 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,633 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,646 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,689 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,182,893 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,197,762 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,381 UART: [afmc] --
19,224,746 UART: [cold-reset] --
19,231,012 UART: [state] Locking Datavault
19,235,751 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,918 UART: [state] Locking ICCM
19,240,738 UART: [exit] Launching FMC @ 0x40000130
19,249,391 UART:
19,249,627 UART: Running Caliptra FMC ...
19,250,658 UART:
19,250,810 UART: [state] CFI Enabled
19,259,242 UART: [fht] FMC Alias Private Key: 7
21,025,489 UART: [art] Extend RT PCRs Done
21,026,724 UART: [art] Lock RT PCRs Done
21,028,438 UART: [art] Populate DV Done
21,033,801 UART: [fht] FMC Alias Private Key: 7
21,035,343 UART: [art] Derive CDI
21,036,130 UART: [art] Store in slot 0x4
21,078,465 UART: [art] Derive Key Pair
21,079,511 UART: [art] Store priv key in slot 0x5
23,506,014 UART: [art] Derive Key Pair - Done
23,518,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,915 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,414 UART: [art] PUB.X = E47A4A13D7276EC19EA6719C06B72ACF0EE70A73F73003A42BFB4A6205D6EB5E8DDB94B0F3E8DB5A153068787A9FD21F
25,233,688 UART: [art] PUB.Y = 6DA1235C2EE8086E18CEC6A03B298C761AF7EC47A1116DD1960DA97A5D124FEABE6734FAC816CE4F4E7A38AB16689229
25,241,010 UART: [art] SIG.R = 7D7EDBF542D671A13DEAB6BA4B475E4AF1258F28C1545226E36E76A1A10FEA0BD5F5470995D68F8A8AE8C683E512764C
25,248,383 UART: [art] SIG.S = ABDDE98BCF330936735AA069887AE91D367F334117C1ABAD5F873990F2EE093178765E18AC1E1833CE1679FE52523B60
26,227,888 UART: Caliptra RT
26,228,599 UART: [state] CFI Enabled
26,361,716 UART: [rt] RT listening for mailbox commands...
26,364,049 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,393,941 UART: [rt]cmd =0x50435252, len=8
26,395,696 >>> mbox cmd response data (8 bytes)
28,458,338 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,564,152 UART:
28,564,520 UART: Running Caliptra ROM ...
28,565,576 UART:
28,565,788 UART: [state] CFI Enabled
28,580,236 UART: [state] LifecycleState = Unprovisioned
28,582,180 UART: [state] DebugLocked = No
28,583,809 UART: [state] WD Timer not started. Device not locked for debugging
28,588,062 UART: [kat] SHA2-256
28,777,987 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,788,739 UART: [kat] ++
28,789,257 UART: [kat] sha1
28,800,164 UART: [kat] SHA2-256
28,803,130 UART: [kat] SHA2-384
28,808,261 UART: [kat] SHA2-512-ACC
28,810,890 UART: [kat] ECC-384
31,253,773 UART: [kat] HMAC-384Kdf
31,267,266 UART: [kat] LMS
31,798,883 UART: [kat] --
31,803,535 UART: [update-reset] ++
34,878,668 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,882,592 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,298,073 >>> mbox cmd response: success
35,298,470 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,299,405 UART: [update-reset] Copying MAN_2 To MAN_1
35,336,977 UART: [update-reset Success] --
35,343,166 UART: [state] Locking Datavault
35,345,512 UART: [state] Locking PCR0, PCR1 and PCR31
35,347,736 UART: [state] Locking ICCM
35,350,549 UART: [exit] Launching FMC @ 0x40000130
35,359,231 UART:
35,359,467 UART: Running Caliptra FMC ...
35,360,570 UART:
35,360,732 UART: [state] CFI Enabled
35,405,400 UART: [art] Extend RT PCRs Done
35,406,590 UART: [art] Lock RT PCRs Done
35,408,047 UART: [art] Populate DV Done
35,413,246 UART: [fht] FMC Alias Private Key: 7
35,414,739 UART: [art] Derive CDI
35,415,509 UART: [art] Store in slot 0x4
35,458,378 UART: [art] Derive Key Pair
35,459,426 UART: [art] Store priv key in slot 0x5
37,886,249 UART: [art] Derive Key Pair - Done
37,899,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,605,661 UART: [art] Erasing AUTHORITY.KEYID = 7
39,607,164 UART: [art] PUB.X = 53170981571266E5732904C4D536D0D97571D15F7D40B5D366A21DF3F55A8EC5C060834026D522FDA9E60E0AD5C72B95
39,614,381 UART: [art] PUB.Y = 2FB4C17C1524007E3BE4569403563A99B6B8943BFC433B4E63863DF99B141A9368738158664E8A67646E97D35E8C12BA
39,621,606 UART: [art] SIG.R = BC60736B0DAD1CBDF4DC411BE66CD20C74135032F7D5014701FC0779FD27B8CCF80B9F65EBAA284B50FD4B69E1138538
39,629,040 UART: [art] SIG.S = 3A86F9FD5DE14E4BE0DF1D75883F3C65DFA61F2A36D35AA990AF61A0F1955B6379157786CA73AF6F8BFAA19A7CF110FE
40,607,873 UART: mbox::rt_entry...
40,608,846 UART: ____ _ _ _ ____ _____
40,610,839 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,612,862 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,614,801 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,616,737 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,618,625 UART: |_|
40,619,514 UART:
40,993,933 UART: [rt] Runtime listening for mailbox commands...
40,995,941 >>> mbox cmd response data (128 bytes)
43,055,173 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,160,357 UART:
43,160,728 UART: Running Caliptra ROM ...
43,161,785 UART:
43,161,993 UART: [state] CFI Enabled
43,177,138 UART: [state] LifecycleState = Unprovisioned
43,179,034 UART: [state] DebugLocked = No
43,180,666 UART: [state] WD Timer not started. Device not locked for debugging
43,184,758 UART: [kat] SHA2-256
43,374,658 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,385,401 UART: [kat] ++
43,386,007 UART: [kat] sha1
43,398,313 UART: [kat] SHA2-256
43,401,304 UART: [kat] SHA2-384
43,407,205 UART: [kat] SHA2-512-ACC
43,409,838 UART: [kat] ECC-384
45,852,866 UART: [kat] HMAC-384Kdf
45,865,959 UART: [kat] LMS
46,397,598 UART: [kat] --
46,401,337 UART: [update-reset] ++
49,468,054 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,471,324 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,886,807 >>> mbox cmd response: success
49,887,195 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
49,888,088 UART: [update-reset] Copying MAN_2 To MAN_1
49,925,672 UART: [update-reset Success] --
49,930,081 UART: [state] Locking Datavault
49,934,212 UART: [state] Locking PCR0, PCR1 and PCR31
49,936,362 UART: [state] Locking ICCM
49,939,304 UART: [exit] Launching FMC @ 0x40000130
49,947,975 UART:
49,948,231 UART: Running Caliptra FMC ...
49,949,338 UART:
49,949,499 UART: [state] CFI Enabled
49,993,726 UART: [art] Extend RT PCRs Done
49,994,875 UART: [art] Lock RT PCRs Done
49,996,540 UART: [art] Populate DV Done
50,001,840 UART: [fht] FMC Alias Private Key: 7
50,003,599 UART: [art] Derive CDI
50,004,419 UART: [art] Store in slot 0x4
50,047,233 UART: [art] Derive Key Pair
50,048,278 UART: [art] Store priv key in slot 0x5
52,475,346 UART: [art] Derive Key Pair - Done
52,488,507 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,194,920 UART: [art] Erasing AUTHORITY.KEYID = 7
54,196,442 UART: [art] PUB.X = B0DB441CA90E8A8ADD5DB420ED8652383F164CE89D2CBCDD42DFEAAD3E6F2F5911A48029FFD5334BFE44FE6C8FD8B50A
54,203,720 UART: [art] PUB.Y = 8329659C69D36EFF3949189C046FC2CAACCC4E54FC195F89C138773DEF2E30AA5DC372E4B8952DE773D8C5D7C8FAC90C
54,210,971 UART: [art] SIG.R = C09DD75BBBCB346824347D88BF6E8882A6A9743920019AE5F2ED81D621A1741FFB79FC65700DC9E82BD18F2EF602D9E8
54,218,386 UART: [art] SIG.S = 7C3648FBF8CDA165146F9539960C47D9A82BFDDCC62C029668C4F0BB5904C2EE0163C0E237894EDC3F4F233E5A94F985
55,196,515 UART: mbox::rt_entry...
55,197,488 UART: ____ _ _ _ ____ _____
55,199,474 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,201,405 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,203,334 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,205,219 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,207,148 UART: |_|
55,207,962 UART:
55,582,364 UART: [rt] Runtime listening for mailbox commands...
55,584,374 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
3,755,854 ready_for_fw is high
3,756,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,053,430 >>> mbox cmd response: success
19,314,243 UART:
19,314,638 UART: Running Caliptra FMC ...
19,315,853 UART:
19,316,026 UART: [state] CFI Enabled
19,323,872 UART: [fht] FMC Alias Private Key: 7
21,090,292 UART: [art] Extend RT PCRs Done
21,091,518 UART: [art] Lock RT PCRs Done
21,093,424 UART: [art] Populate DV Done
21,099,009 UART: [fht] FMC Alias Private Key: 7
21,100,518 UART: [art] Derive CDI
21,101,292 UART: [art] Store in slot 0x4
21,143,783 UART: [art] Derive Key Pair
21,144,824 UART: [art] Store priv key in slot 0x5
23,571,735 UART: [art] Derive Key Pair - Done
23,584,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,801 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,309 UART: [art] PUB.X = F8A183AF145455B029AB85B14D04D421FB8C05BCE502FA4A04323B2C7AD58DD630EAFCB1E8C040071447FCC9B256F5AE
25,299,571 UART: [art] PUB.Y = 290A0B565B313EDF9C6CA821A1DEF140AE5188791F504B721AD9B26891CFAA9EE78A13B28311956A2B51EBE616959869
25,306,843 UART: [art] SIG.R = 334370B110653DD29510A80122F6845B97B5ED265A02BF304EE6072B52702D607369467909B7348A48FCECFB3750D56F
25,314,208 UART: [art] SIG.S = 0580A01ABC3386E443099CC24A4DBFA981FF5AC47829391DE871B5FA7301EA67F541F0072E9CBE1620CF4A080CA06FD4
26,292,728 UART: Caliptra RT
26,293,416 UART: [state] CFI Enabled
26,425,965 UART: [rt] RT listening for mailbox commands...
26,428,344 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
26,458,516 UART: [rt]cmd =0x50435252, len=8
26,460,600 >>> mbox cmd response data (8 bytes)
28,519,580 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,541,990 >>> mbox cmd response: success
35,542,535 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
35,575,892 UART:
35,576,188 UART: Running Caliptra FMC ...
35,577,311 UART:
35,577,480 UART: [state] CFI Enabled
35,621,735 UART: [art] Extend RT PCRs Done
35,622,928 UART: [art] Lock RT PCRs Done
35,624,425 UART: [art] Populate DV Done
35,629,952 UART: [fht] FMC Alias Private Key: 7
35,631,490 UART: [art] Derive CDI
35,632,311 UART: [art] Store in slot 0x4
35,674,958 UART: [art] Derive Key Pair
35,675,959 UART: [art] Store priv key in slot 0x5
38,103,207 UART: [art] Derive Key Pair - Done
38,115,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,822,085 UART: [art] Erasing AUTHORITY.KEYID = 7
39,823,596 UART: [art] PUB.X = EF9BDAE09D4027B4C5068E12CD62B29861567B15D6CC9C2F169B8E169983C1F725AA4E5C01E5323B8B3CDCFE344835FE
39,830,869 UART: [art] PUB.Y = F3E2AB9A4C69A46A8128708BCECF48DA3B0914B2C0087FF41A3E1CE313763FE4D5C2B2ADF6F007F0E17120472DE6C578
39,838,126 UART: [art] SIG.R = 757FA0413AD6F73C9DA3814D447E3CBB61DE778FCE990530202C66A52BB3C7930AF1FABB496B34C690F81FFF92876C5E
39,845,572 UART: [art] SIG.S = 9B6B8E4FE6407CEC9B63F77819C8CD137D27DD2E91141FAF385D9F0C205A5799F57CC74832D8A9786A7EFFF5F52EF38A
40,824,365 UART: mbox::rt_entry...
40,825,363 UART: ____ _ _ _ ____ _____
40,827,346 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,829,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,831,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,833,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,835,032 UART: |_|
40,835,845 UART:
41,204,904 UART: [rt] Runtime listening for mailbox commands...
41,206,968 >>> mbox cmd response data (128 bytes)
43,266,752 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,276,084 >>> mbox cmd response: success
50,276,649 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
50,311,400 UART:
50,311,701 UART: Running Caliptra FMC ...
50,312,824 UART:
50,312,984 UART: [state] CFI Enabled
50,356,908 UART: [art] Extend RT PCRs Done
50,358,102 UART: [art] Lock RT PCRs Done
50,359,346 UART: [art] Populate DV Done
50,364,919 UART: [fht] FMC Alias Private Key: 7
50,366,509 UART: [art] Derive CDI
50,367,344 UART: [art] Store in slot 0x4
50,410,159 UART: [art] Derive Key Pair
50,411,198 UART: [art] Store priv key in slot 0x5
52,837,710 UART: [art] Derive Key Pair - Done
52,850,603 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,557,396 UART: [art] Erasing AUTHORITY.KEYID = 7
54,558,907 UART: [art] PUB.X = 27EFA614344E2E9964BC7C74DC33A8B7553624ECB9C710E83F496DDBF199C4428CA46C71CE7BB995A6D82BA5C3720338
54,566,210 UART: [art] PUB.Y = 5DF6898662B6CC1976859B83EC687333968E3D6E608EBA33520EB6D4B1CA43D4EADBB41E9C8AC015CFFC51369136B08D
54,573,418 UART: [art] SIG.R = 791063E09422D5F7E1D063C589160B40F19CA0D67FB1F5BE7EC174D308C7B2D6ACC200567DE8E632786865BEC5C5E635
54,580,777 UART: [art] SIG.S = 394066195750BE28F68551EBEB2D6CA9F3A963EDBE1F1AA3CFD9B606BC3C732AABB9A6010B0CC433AFE1AFADAC422AA7
55,559,345 UART: mbox::rt_entry...
55,560,310 UART: ____ _ _ _ ____ _____
55,562,298 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,564,307 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,566,241 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,568,180 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,570,133 UART: |_|
55,570,949 UART:
55,941,464 UART: [rt] Runtime listening for mailbox commands...
55,943,467 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,711 UART: [kat] SHA2-256
881,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,757 UART: [kat] ++
885,909 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,898 UART: [kat] SHA2-512-ACC
896,799 UART: [kat] ECC-384
902,102 UART: [kat] HMAC-384Kdf
906,806 UART: [kat] LMS
1,475,002 UART: [kat] --
1,475,869 UART: [cold-reset] ++
1,476,331 UART: [fht] Storing FHT @ 0x50003400
1,479,144 UART: [idev] ++
1,479,312 UART: [idev] CDI.KEYID = 6
1,479,672 UART: [idev] SUBJECT.KEYID = 7
1,480,096 UART: [idev] UDS.KEYID = 0
1,480,441 ready_for_fw is high
1,480,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,226 UART: [idev] Erasing UDS.KEYID = 0
1,505,026 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,638 UART: [idev] --
1,514,591 UART: [ldev] ++
1,514,759 UART: [ldev] CDI.KEYID = 6
1,515,122 UART: [ldev] SUBJECT.KEYID = 5
1,515,548 UART: [ldev] AUTHORITY.KEYID = 7
1,516,011 UART: [ldev] FE.KEYID = 1
1,521,183 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,398 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,518 UART: [fwproc] Received command 0x46574c44
1,587,309 UART: [fwproc] Received Image of size 118548 bytes
2,931,127 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,383 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,754 >>> mbox cmd response: success
3,130,842 UART: [afmc] ++
3,131,010 UART: [afmc] CDI.KEYID = 6
3,131,372 UART: [afmc] SUBJECT.KEYID = 7
3,131,797 UART: [afmc] AUTHORITY.KEYID = 5
3,167,104 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,863 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,746 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,429 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,307 UART: [afmc] --
3,210,391 UART: [cold-reset] --
3,211,349 UART: [state] Locking Datavault
3,212,394 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,998 UART: [state] Locking ICCM
3,213,446 UART: [exit] Launching FMC @ 0x40000130
3,218,776 UART:
3,218,792 UART: Running Caliptra FMC ...
3,219,200 UART:
3,219,254 UART: [state] CFI Enabled
3,229,374 UART: [fht] FMC Alias Private Key: 7
3,348,108 UART: [art] Extend RT PCRs Done
3,348,536 UART: [art] Lock RT PCRs Done
3,350,192 UART: [art] Populate DV Done
3,358,345 UART: [fht] FMC Alias Private Key: 7
3,359,349 UART: [art] Derive CDI
3,359,629 UART: [art] Store in slot 0x4
3,445,343 UART: [art] Derive Key Pair
3,445,703 UART: [art] Store priv key in slot 0x5
3,458,884 UART: [art] Derive Key Pair - Done
3,473,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,950 UART: [art] PUB.X = 70C30020BDEDAE18A63A38BBC52B0CA91D4C4F4CD644E2142223B380954D7A1D67708D178BF00C42D86AD557FD4764CA
3,496,702 UART: [art] PUB.Y = 7F36B71B608348E4B366FD2112AC127AB6564577C1D10B7709072A6B8222A0A06CA9703301A5E9E083F4B619476CA191
3,503,632 UART: [art] SIG.R = C2C4FD89339E67F2177BF37B00C79A7D0472030735F1257825194A313DFFBDACE7150203A047EF71F2EA2E437504152A
3,510,360 UART: [art] SIG.S = 1B1CB60FF6AF1EB5B85D252BE89315DABF223F46AC391E7961FFA39F8B0A3DBB183E12AD18CCB996F77D6A8F4F64FAA9
3,533,696 UART: Caliptra RT
3,533,947 UART: [state] CFI Enabled
3,653,683 UART: [rt] RT listening for mailbox commands...
3,654,353 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,333 UART: [rt]cmd =0x50435252, len=8
3,686,025 >>> mbox cmd response data (8 bytes)
3,686,026 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,598 UART:
3,686,614 UART: Running Caliptra ROM ...
3,687,022 UART:
3,687,076 UART: [state] CFI Enabled
3,689,838 UART: [state] LifecycleState = Unprovisioned
3,690,493 UART: [state] DebugLocked = No
3,691,223 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,692,754 UART: [kat] SHA2-256
4,486,685 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,490,800 UART: [kat] ++
4,490,952 UART: [kat] sha1
4,495,158 UART: [kat] SHA2-256
4,497,096 UART: [kat] SHA2-384
4,500,057 UART: [kat] SHA2-512-ACC
4,501,957 UART: [kat] ECC-384
4,507,644 UART: [kat] HMAC-384Kdf
4,512,324 UART: [kat] LMS
5,080,520 UART: [kat] --
5,081,381 UART: [update-reset] ++
6,054,150 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,055,320 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,157,013 >>> mbox cmd response: success
6,157,013 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,157,334 UART: [update-reset] Copying MAN_2 To MAN_1
6,165,348 UART: [update-reset Success] --
6,166,155 UART: [state] Locking Datavault
6,166,895 UART: [state] Locking PCR0, PCR1 and PCR31
6,167,499 UART: [state] Locking ICCM
6,167,923 UART: [exit] Launching FMC @ 0x40000130
6,173,253 UART:
6,173,269 UART: Running Caliptra FMC ...
6,173,677 UART:
6,173,731 UART: [state] CFI Enabled
6,262,574 UART: [art] Extend RT PCRs Done
6,263,002 UART: [art] Lock RT PCRs Done
6,264,361 UART: [art] Populate DV Done
6,272,566 UART: [fht] FMC Alias Private Key: 7
6,273,602 UART: [art] Derive CDI
6,273,882 UART: [art] Store in slot 0x4
6,359,462 UART: [art] Derive Key Pair
6,359,822 UART: [art] Store priv key in slot 0x5
6,373,819 UART: [art] Derive Key Pair - Done
6,388,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,404,151 UART: [art] Erasing AUTHORITY.KEYID = 7
6,404,916 UART: [art] PUB.X = F18ABF298373D8D3214F1209138CFE920B25E3ABB63FFD8F479B2DA769C43D22C6FF0F7CE6A6CBFB96C3EC945E7753A7
6,411,695 UART: [art] PUB.Y = 982A68FBE9C1F573A6CF25AE3893CD30606CACF668CF44A85092D2C5E00304A8F910D07078972D86B66E3C2242F286D6
6,418,641 UART: [art] SIG.R = CCC1BCDAC8F4E93337296552A70AF5EE5CF5ACE6304CED8158E42F312D7A12F42F505AA74BE0C30F3B4CF849305351E0
6,425,421 UART: [art] SIG.S = CEFCBDECB64471998A2A0FA63606B6E391FD0F4ACFE8281E3CB863045E9F82A35CBF137D661B20BA53970E8909A8AA72
6,448,541 UART: mbox::rt_entry...
6,448,913 UART: ____ _ _ _ ____ _____
6,449,697 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,450,497 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,451,265 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,452,033 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,452,801 UART: |_|
6,453,113 UART:
6,815,143 UART: [rt] Runtime listening for mailbox commands...
6,816,196 >>> mbox cmd response data (128 bytes)
6,816,197 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,816,311 UART:
6,816,327 UART: Running Caliptra ROM ...
6,816,735 UART:
6,816,789 UART: [state] CFI Enabled
6,819,523 UART: [state] LifecycleState = Unprovisioned
6,820,178 UART: [state] DebugLocked = No
6,820,824 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,822,359 UART: [kat] SHA2-256
7,616,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,620,405 UART: [kat] ++
7,620,557 UART: [kat] sha1
7,624,955 UART: [kat] SHA2-256
7,626,893 UART: [kat] SHA2-384
7,629,742 UART: [kat] SHA2-512-ACC
7,631,642 UART: [kat] ECC-384
7,636,895 UART: [kat] HMAC-384Kdf
7,641,495 UART: [kat] LMS
8,209,691 UART: [kat] --
8,210,350 UART: [update-reset] ++
9,182,079 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,183,271 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,284,964 >>> mbox cmd response: success
9,284,964 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,285,291 UART: [update-reset] Copying MAN_2 To MAN_1
9,293,305 UART: [update-reset Success] --
9,294,296 UART: [state] Locking Datavault
9,295,000 UART: [state] Locking PCR0, PCR1 and PCR31
9,295,604 UART: [state] Locking ICCM
9,296,086 UART: [exit] Launching FMC @ 0x40000130
9,301,416 UART:
9,301,432 UART: Running Caliptra FMC ...
9,301,840 UART:
9,301,894 UART: [state] CFI Enabled
9,390,787 UART: [art] Extend RT PCRs Done
9,391,215 UART: [art] Lock RT PCRs Done
9,392,590 UART: [art] Populate DV Done
9,400,907 UART: [fht] FMC Alias Private Key: 7
9,401,937 UART: [art] Derive CDI
9,402,217 UART: [art] Store in slot 0x4
9,487,771 UART: [art] Derive Key Pair
9,488,131 UART: [art] Store priv key in slot 0x5
9,501,730 UART: [art] Derive Key Pair - Done
9,515,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,531,546 UART: [art] Erasing AUTHORITY.KEYID = 7
9,532,311 UART: [art] PUB.X = 9C68E5971FA0D11F3EB2A07356C27D74EC3FDA7FC2BD6F0BEA03D0C0536C40D806D4AAE908B769E2352F6B3DEC0C2EB7
9,539,088 UART: [art] PUB.Y = 9888E04C6A6EE51723CBAB917CA2C9DA5F7AF8486EC17829121B3A359BBF52E998E09C5EA01DF34848D66F04901A869D
9,546,043 UART: [art] SIG.R = F6B863918E11181BECF17BED78F767BBAA38C6324B2469A76F56AB8D0F79123456F43369ED8ABB7ED27923516D932293
9,552,812 UART: [art] SIG.S = 145BCE3296B3ED4544D529E0D730FA2BE107F1E5321E92106B63CF5A47E8D7C939D88FB1A36DC7753E0AE760D9118CF1
9,576,084 UART: mbox::rt_entry...
9,576,456 UART: ____ _ _ _ ____ _____
9,577,240 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,578,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,578,808 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,579,576 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,580,344 UART: |_|
9,580,656 UART:
9,944,609 UART: [rt] Runtime listening for mailbox commands...
9,945,662 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.14s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,039 ready_for_fw is high
1,362,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,382 >>> mbox cmd response: success
3,040,763 UART:
3,040,779 UART: Running Caliptra FMC ...
3,041,187 UART:
3,041,241 UART: [state] CFI Enabled
3,051,649 UART: [fht] FMC Alias Private Key: 7
3,170,479 UART: [art] Extend RT PCRs Done
3,170,907 UART: [art] Lock RT PCRs Done
3,172,517 UART: [art] Populate DV Done
3,180,880 UART: [fht] FMC Alias Private Key: 7
3,181,930 UART: [art] Derive CDI
3,182,210 UART: [art] Store in slot 0x4
3,267,850 UART: [art] Derive Key Pair
3,268,210 UART: [art] Store priv key in slot 0x5
3,281,119 UART: [art] Derive Key Pair - Done
3,295,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,852 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,617 UART: [art] PUB.X = 8A1B340402A01B8AF822E8274024DBD7BDBC743D89CDAB58CAA41549919B0CA6221969C6A07CFD2C1431D6414737FC8E
3,319,386 UART: [art] PUB.Y = AEBFCBD79E9C86843A4B516992CF4189469545A99B6B67AB2DC002E18B72DF6B3694F18EF3C2442EFA713E44B691C77E
3,326,343 UART: [art] SIG.R = 7145BB7C01D422712D7CDD5A5352C60B7D39B332DEBF49C493FF2D06CD4FF8B6F4B4AEFCC81F1ABE2F0540C79BA6C546
3,333,123 UART: [art] SIG.S = 1769BC1CDE0F70F1DB60B2515AE56F9CD21F199E5C21D1619A30D04C83062ABE974A7770D5DDFC8972BE7919AACC09F3
3,356,786 UART: Caliptra RT
3,357,037 UART: [state] CFI Enabled
3,477,796 UART: [rt] RT listening for mailbox commands...
3,478,466 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,508,252 UART: [rt]cmd =0x50435252, len=8
3,509,986 >>> mbox cmd response data (8 bytes)
3,509,987 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,862,390 >>> mbox cmd response: success
5,862,390 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,876,050 UART:
5,876,066 UART: Running Caliptra FMC ...
5,876,474 UART:
5,876,528 UART: [state] CFI Enabled
5,964,997 UART: [art] Extend RT PCRs Done
5,965,425 UART: [art] Lock RT PCRs Done
5,966,704 UART: [art] Populate DV Done
5,975,089 UART: [fht] FMC Alias Private Key: 7
5,976,099 UART: [art] Derive CDI
5,976,379 UART: [art] Store in slot 0x4
6,062,089 UART: [art] Derive Key Pair
6,062,449 UART: [art] Store priv key in slot 0x5
6,076,254 UART: [art] Derive Key Pair - Done
6,091,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,107,020 UART: [art] Erasing AUTHORITY.KEYID = 7
6,107,785 UART: [art] PUB.X = C2C4449C80F9668B5931EB6774BAE91B42C6A79AA362398731862214578FAA40331D6FF8E2AE058A675C055139A2F5B8
6,114,545 UART: [art] PUB.Y = AD8CE684E34DBB352AD28A0A07BD5AF8A1B4812DB060690C8FD7842E5058A47365427A7CB4B9FA8C4EED2109316DE44B
6,121,497 UART: [art] SIG.R = 7DEE467FF5C708FF0D0CFC020982A1635CF278B7EAD39FE5050AFAAE16B6C4DC264A142905BA590F7DE5ECF1C873043C
6,128,257 UART: [art] SIG.S = 23A7D95FB0D8993885C3E9CB4B7D3BBB7C1721D19AAB9D3CD783ECC13EAB85A1067ABC77019DA89DD5DE3AE12FEA7AF5
6,152,467 UART: mbox::rt_entry...
6,152,839 UART: ____ _ _ _ ____ _____
6,153,623 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,154,423 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,155,191 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,155,959 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,156,727 UART: |_|
6,157,039 UART:
6,523,725 UART: [rt] Runtime listening for mailbox commands...
6,524,778 >>> mbox cmd response data (128 bytes)
6,524,779 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,874,658 >>> mbox cmd response: success
8,874,658 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,888,424 UART:
8,888,440 UART: Running Caliptra FMC ...
8,888,848 UART:
8,888,902 UART: [state] CFI Enabled
8,978,069 UART: [art] Extend RT PCRs Done
8,978,497 UART: [art] Lock RT PCRs Done
8,979,714 UART: [art] Populate DV Done
8,987,783 UART: [fht] FMC Alias Private Key: 7
8,988,887 UART: [art] Derive CDI
8,989,167 UART: [art] Store in slot 0x4
9,074,725 UART: [art] Derive Key Pair
9,075,085 UART: [art] Store priv key in slot 0x5
9,089,246 UART: [art] Derive Key Pair - Done
9,103,802 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,119,381 UART: [art] Erasing AUTHORITY.KEYID = 7
9,120,146 UART: [art] PUB.X = 6DEA4499962BABAF5A22490C483B4144B438C8A909EC1B24AB432D475E873B5775BF9BDF5241959F66E34C5684BF6A05
9,126,911 UART: [art] PUB.Y = EB29210394DE78B0E118F7B53114A071E4C5B3DABCEA12E72CB699D676BAAF87C4DDA106DDDDB1F704EA8AE0D791B3AF
9,133,878 UART: [art] SIG.R = C37D064689CC4CD0F668A499507A0564F40F1014C8BD59C1C0AE3994EC0F244E9F769FE9D7CF4752F525D81366698560
9,140,634 UART: [art] SIG.S = 8F2BC51CF86266DE6FE7EA0BC76D660FB12FB3DF7AE297BA3AC68CD79FE7F1DB6598B2FFC87CE5E465302A5EE65025BC
9,164,332 UART: mbox::rt_entry...
9,164,704 UART: ____ _ _ _ ____ _____
9,165,488 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,166,288 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,167,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,167,824 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,168,592 UART: |_|
9,168,904 UART:
9,531,370 UART: [rt] Runtime listening for mailbox commands...
9,532,423 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,334 UART: [kat] SHA2-256
882,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,380 UART: [kat] ++
886,532 UART: [kat] sha1
890,646 UART: [kat] SHA2-256
892,584 UART: [kat] SHA2-384
895,419 UART: [kat] SHA2-512-ACC
897,320 UART: [kat] ECC-384
902,859 UART: [kat] HMAC-384Kdf
907,541 UART: [kat] LMS
1,475,737 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,122 UART: [fht] Storing FHT @ 0x50003400
1,480,129 UART: [idev] ++
1,480,297 UART: [idev] CDI.KEYID = 6
1,480,657 UART: [idev] SUBJECT.KEYID = 7
1,481,081 UART: [idev] UDS.KEYID = 0
1,481,426 ready_for_fw is high
1,481,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,367 UART: [idev] Erasing UDS.KEYID = 0
1,506,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,725 UART: [idev] --
1,515,814 UART: [ldev] ++
1,515,982 UART: [ldev] CDI.KEYID = 6
1,516,345 UART: [ldev] SUBJECT.KEYID = 5
1,516,771 UART: [ldev] AUTHORITY.KEYID = 7
1,517,234 UART: [ldev] FE.KEYID = 1
1,522,496 UART: [ldev] Erasing FE.KEYID = 1
1,548,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,963 UART: [ldev] --
1,587,364 UART: [fwproc] Waiting for Commands...
1,588,045 UART: [fwproc] Received command 0x46574c44
1,588,836 UART: [fwproc] Received Image of size 118548 bytes
2,933,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,082 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,300 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,535 >>> mbox cmd response: success
3,133,571 UART: [afmc] ++
3,133,739 UART: [afmc] CDI.KEYID = 6
3,134,101 UART: [afmc] SUBJECT.KEYID = 7
3,134,526 UART: [afmc] AUTHORITY.KEYID = 5
3,169,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,657 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,437 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,192,146 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,198,029 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,712 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,690 UART: [afmc] --
3,212,584 UART: [cold-reset] --
3,213,580 UART: [state] Locking Datavault
3,214,683 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,287 UART: [state] Locking ICCM
3,215,879 UART: [exit] Launching FMC @ 0x40000130
3,221,209 UART:
3,221,225 UART: Running Caliptra FMC ...
3,221,633 UART:
3,221,776 UART: [state] CFI Enabled
3,232,500 UART: [fht] FMC Alias Private Key: 7
3,351,626 UART: [art] Extend RT PCRs Done
3,352,054 UART: [art] Lock RT PCRs Done
3,353,666 UART: [art] Populate DV Done
3,361,653 UART: [fht] FMC Alias Private Key: 7
3,362,779 UART: [art] Derive CDI
3,363,059 UART: [art] Store in slot 0x4
3,449,187 UART: [art] Derive Key Pair
3,449,547 UART: [art] Store priv key in slot 0x5
3,462,970 UART: [art] Derive Key Pair - Done
3,477,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,493,311 UART: [art] Erasing AUTHORITY.KEYID = 7
3,494,076 UART: [art] PUB.X = 9F087CBBD249AB9CB00E162FDBCA1B7D976888B4F4FA87D0BC1649106BAAEAD81A0F08AA00B40ADFB9896DE91392F1FC
3,500,835 UART: [art] PUB.Y = 0914293863B1833319E5480A6722620D3FFFD05B4D34668630B1923AA555681ECB50319AD6F0239055EDC82AC6C98354
3,507,764 UART: [art] SIG.R = 3944AB2437B13D8C4E42DCF232A8DD8DAE91E1A995790A9FB89CDDCA11A59E4C47CEAC59FB6433246E2313FD0BC73FB7
3,514,548 UART: [art] SIG.S = 93570594D67807085CDE66FC0E19E17A047FFC91B6D9A4980D9FC39B938219F0151BBFA8024C46EECA0B6A65992B518C
3,538,550 UART: Caliptra RT
3,538,893 UART: [state] CFI Enabled
3,658,279 UART: [rt] RT listening for mailbox commands...
3,658,949 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,673 UART: [rt]cmd =0x50435252, len=8
3,690,199 >>> mbox cmd response data (8 bytes)
3,690,200 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,691,142 UART:
3,691,158 UART: Running Caliptra ROM ...
3,691,566 UART:
3,691,707 UART: [state] CFI Enabled
3,694,581 UART: [state] LifecycleState = Unprovisioned
3,695,236 UART: [state] DebugLocked = No
3,695,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,697,395 UART: [kat] SHA2-256
4,491,326 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,495,441 UART: [kat] ++
4,495,593 UART: [kat] sha1
4,499,875 UART: [kat] SHA2-256
4,501,813 UART: [kat] SHA2-384
4,504,390 UART: [kat] SHA2-512-ACC
4,506,290 UART: [kat] ECC-384
4,512,003 UART: [kat] HMAC-384Kdf
4,516,655 UART: [kat] LMS
5,084,851 UART: [kat] --
5,085,636 UART: [update-reset] ++
6,058,305 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,059,571 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,161,264 >>> mbox cmd response: success
6,161,264 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
6,161,487 UART: [update-reset] Copying MAN_2 To MAN_1
6,169,501 UART: [update-reset Success] --
6,170,576 UART: [state] Locking Datavault
6,171,292 UART: [state] Locking PCR0, PCR1 and PCR31
6,171,896 UART: [state] Locking ICCM
6,172,570 UART: [exit] Launching FMC @ 0x40000130
6,177,900 UART:
6,177,916 UART: Running Caliptra FMC ...
6,178,324 UART:
6,178,467 UART: [state] CFI Enabled
6,267,630 UART: [art] Extend RT PCRs Done
6,268,058 UART: [art] Lock RT PCRs Done
6,269,557 UART: [art] Populate DV Done
6,278,070 UART: [fht] FMC Alias Private Key: 7
6,279,204 UART: [art] Derive CDI
6,279,484 UART: [art] Store in slot 0x4
6,365,098 UART: [art] Derive Key Pair
6,365,458 UART: [art] Store priv key in slot 0x5
6,378,679 UART: [art] Derive Key Pair - Done
6,393,307 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,408,486 UART: [art] Erasing AUTHORITY.KEYID = 7
6,409,251 UART: [art] PUB.X = 404074F50610364D22D9B2D2A4852043B81FB3EFE5854C3315A59D250F8D6DEBBD974423A96369BFFDCFFD59DACA6460
6,416,023 UART: [art] PUB.Y = 8BEAEC9836D1692C6B1D9C8FB9E0393D2F471EE43688EF2519DD5DE3E70167436F029867B9422320BB52C05D37178BF2
6,422,969 UART: [art] SIG.R = 5B29EDA90B1966E72F516B2EC176A9C488E2EB00271BA8905E25D1F2F2E08DF32DA37CC09E6967105E4A21EE1F435B63
6,429,722 UART: [art] SIG.S = 75C2AA4AA431BEF78F31499B68C0256B8B0FD21C45905DA9EF06C46CCFBD18FDF7267FCF2494F9E6BB78D05BE7376409
6,453,107 UART: mbox::rt_entry...
6,453,479 UART: ____ _ _ _ ____ _____
6,454,263 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,455,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,455,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,456,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,457,367 UART: |_|
6,457,679 UART:
6,822,075 UART: [rt] Runtime listening for mailbox commands...
6,823,128 >>> mbox cmd response data (128 bytes)
6,823,129 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,823,243 UART:
6,823,259 UART: Running Caliptra ROM ...
6,823,667 UART:
6,823,808 UART: [state] CFI Enabled
6,826,458 UART: [state] LifecycleState = Unprovisioned
6,827,113 UART: [state] DebugLocked = No
6,827,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,829,256 UART: [kat] SHA2-256
7,623,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,627,302 UART: [kat] ++
7,627,454 UART: [kat] sha1
7,631,670 UART: [kat] SHA2-256
7,633,608 UART: [kat] SHA2-384
7,636,549 UART: [kat] SHA2-512-ACC
7,638,449 UART: [kat] ECC-384
7,643,790 UART: [kat] HMAC-384Kdf
7,648,406 UART: [kat] LMS
8,216,602 UART: [kat] --
8,217,299 UART: [update-reset] ++
9,189,708 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,190,948 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,292,641 >>> mbox cmd response: success
9,292,641 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
9,292,924 UART: [update-reset] Copying MAN_2 To MAN_1
9,300,938 UART: [update-reset Success] --
9,301,993 UART: [state] Locking Datavault
9,303,001 UART: [state] Locking PCR0, PCR1 and PCR31
9,303,605 UART: [state] Locking ICCM
9,304,155 UART: [exit] Launching FMC @ 0x40000130
9,309,485 UART:
9,309,501 UART: Running Caliptra FMC ...
9,309,909 UART:
9,310,052 UART: [state] CFI Enabled
9,399,045 UART: [art] Extend RT PCRs Done
9,399,473 UART: [art] Lock RT PCRs Done
9,400,688 UART: [art] Populate DV Done
9,408,703 UART: [fht] FMC Alias Private Key: 7
9,409,699 UART: [art] Derive CDI
9,409,979 UART: [art] Store in slot 0x4
9,495,863 UART: [art] Derive Key Pair
9,496,223 UART: [art] Store priv key in slot 0x5
9,509,620 UART: [art] Derive Key Pair - Done
9,524,393 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,539,670 UART: [art] Erasing AUTHORITY.KEYID = 7
9,540,435 UART: [art] PUB.X = 3AF16255FE6EDF2BD9976E8798DCDB76FA8181C77F8A9D8D9F189EAD69D882258498C20E53DFE7CE76EA13521C6EC9AA
9,547,220 UART: [art] PUB.Y = A2A690FF63F26B688841A225EF6F5E0FFD01B7800B9FE4ADAF00A154ED4C0F61BBB56BD899580A322B80C5BAC3BEB5BE
9,554,157 UART: [art] SIG.R = 6C400A3ADB99E8C2BFB75C64C6A6015A486E428E290263D6590F7629976BB9A80C6BBC71673EEDE34D2696A5624E9A8A
9,560,918 UART: [art] SIG.S = 47C423E2646D475221D2AA841FB230043DCCE8441E0BDA173626D6AC660548CD0B75A17A422F0B24BCABDEB308787AD9
9,584,928 UART: mbox::rt_entry...
9,585,300 UART: ____ _ _ _ ____ _____
9,586,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,586,884 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,587,652 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,588,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,589,188 UART: |_|
9,589,500 UART:
9,953,240 UART: [rt] Runtime listening for mailbox commands...
9,954,293 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,456 ready_for_fw is high
1,363,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,137 >>> mbox cmd response: success
3,044,606 UART:
3,044,622 UART: Running Caliptra FMC ...
3,045,030 UART:
3,045,173 UART: [state] CFI Enabled
3,055,811 UART: [fht] FMC Alias Private Key: 7
3,174,795 UART: [art] Extend RT PCRs Done
3,175,223 UART: [art] Lock RT PCRs Done
3,176,683 UART: [art] Populate DV Done
3,184,616 UART: [fht] FMC Alias Private Key: 7
3,185,666 UART: [art] Derive CDI
3,185,946 UART: [art] Store in slot 0x4
3,271,798 UART: [art] Derive Key Pair
3,272,158 UART: [art] Store priv key in slot 0x5
3,285,657 UART: [art] Derive Key Pair - Done
3,300,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,308 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,073 UART: [art] PUB.X = 2EC4F1ED9FDA6AE2DA0511B70B465C743F6D5EB6C2108F7CE591EA5CFCDDB54A8791B4213031B0AB39CEB226ECFCE2E8
3,323,865 UART: [art] PUB.Y = D132757DD5742B6DB54E5206373E2237CB499522D4B6B2D72089E1C551DFEFC571FD75029DC0898B38B29D71100FE9C7
3,330,806 UART: [art] SIG.R = 510178E0DBADBFF8EEE1A95B164CB9D75B38F7F14B6D6FDE825BDB988B81D3D39BECDA666D5C81BB25F66A10D9F266F8
3,337,599 UART: [art] SIG.S = FEE92A2C856138BB5EC9D4C4823EB6766500CD37BE59FBE53E0BE4B9A0E2FC670153912B67679335C4E9E3E8744866A9
3,361,637 UART: Caliptra RT
3,361,980 UART: [state] CFI Enabled
3,483,206 UART: [rt] RT listening for mailbox commands...
3,483,876 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,574 UART: [rt]cmd =0x50435252, len=8
3,515,004 >>> mbox cmd response data (8 bytes)
3,515,005 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,867,263 >>> mbox cmd response: success
5,867,263 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,880,795 UART:
5,880,811 UART: Running Caliptra FMC ...
5,881,219 UART:
5,881,362 UART: [state] CFI Enabled
5,970,363 UART: [art] Extend RT PCRs Done
5,970,791 UART: [art] Lock RT PCRs Done
5,971,928 UART: [art] Populate DV Done
5,979,991 UART: [fht] FMC Alias Private Key: 7
5,981,127 UART: [art] Derive CDI
5,981,407 UART: [art] Store in slot 0x4
6,067,341 UART: [art] Derive Key Pair
6,067,701 UART: [art] Store priv key in slot 0x5
6,080,290 UART: [art] Derive Key Pair - Done
6,094,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,110,004 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,769 UART: [art] PUB.X = 67EABC26ED59B9BBD9AD9A322CA7C5A9327E9292DA9A8ECCE622FE5557555D1C17E0327AD4BFFA8F82B96C6AA68208D4
6,117,558 UART: [art] PUB.Y = 6AA580C3A1B0132F570C92CEE1B1466B9E8227468284C81230917A006AE3E4B783A9E17F46331BBB23E8AD3CEA23D155
6,124,485 UART: [art] SIG.R = 5712B761C75539488479EFEAE08D5B49E38F63CF32029B81E1A003C43351547C11EF849FD8A6444341EEB95A0080CAB9
6,131,225 UART: [art] SIG.S = B17596BC0628EAFC27E270EF225863B5872838CBDF8542B0BF65B2E4BA0DFFB04AEAAEE502B01961EDE7B26A03FC0B8F
6,154,580 UART: mbox::rt_entry...
6,154,952 UART: ____ _ _ _ ____ _____
6,155,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,156,536 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,157,304 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,158,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,158,840 UART: |_|
6,159,152 UART:
6,525,311 UART: [rt] Runtime listening for mailbox commands...
6,526,364 >>> mbox cmd response data (128 bytes)
6,526,365 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,877,229 >>> mbox cmd response: success
8,877,229 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,890,773 UART:
8,890,789 UART: Running Caliptra FMC ...
8,891,197 UART:
8,891,340 UART: [state] CFI Enabled
8,980,539 UART: [art] Extend RT PCRs Done
8,980,967 UART: [art] Lock RT PCRs Done
8,982,362 UART: [art] Populate DV Done
8,990,809 UART: [fht] FMC Alias Private Key: 7
8,991,979 UART: [art] Derive CDI
8,992,259 UART: [art] Store in slot 0x4
9,078,155 UART: [art] Derive Key Pair
9,078,515 UART: [art] Store priv key in slot 0x5
9,092,334 UART: [art] Derive Key Pair - Done
9,107,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,122,843 UART: [art] Erasing AUTHORITY.KEYID = 7
9,123,608 UART: [art] PUB.X = E5923990C2B2D647C381177755AF2CC88C64A77D287075816047337264E62739E4D04F8F482E0E82845A9E15261331E0
9,130,357 UART: [art] PUB.Y = 5301A68EF2EB482DE7352072225B761099D3C0CBAD8A1F0CDB8F324D569F759E026EEC96D8176D824FFBFADCB5947D37
9,137,310 UART: [art] SIG.R = 1F536EA74AA9D5234EC4DF16DB10183249C067E54F9ACD99CC809044738E4B614A5FD29B8A059B3D60004FF9C91C4C0A
9,144,060 UART: [art] SIG.S = 81632C942D2F724925910AD8CADFAB7DDDDEE2ED2E828479679A4229CF0EE2C9771074A36CA6FFA2E242BAEF09B0DD30
9,167,639 UART: mbox::rt_entry...
9,168,011 UART: ____ _ _ _ ____ _____
9,168,795 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,169,595 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,170,363 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,171,131 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,171,899 UART: |_|
9,172,211 UART:
9,532,758 UART: [rt] Runtime listening for mailbox commands...
9,533,811 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,208 UART: [state] LifecycleState = Unprovisioned
85,863 UART: [state] DebugLocked = No
86,579 UART: [state] WD Timer not started. Device not locked for debugging
87,914 UART: [kat] SHA2-256
891,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,568 UART: [kat] ++
895,720 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,673 UART: [kat] SHA2-512-ACC
906,574 UART: [kat] ECC-384
916,089 UART: [kat] HMAC-384Kdf
920,793 UART: [kat] LMS
1,169,105 UART: [kat] --
1,170,046 UART: [cold-reset] ++
1,170,626 UART: [fht] FHT @ 0x50003400
1,173,366 UART: [idev] ++
1,173,534 UART: [idev] CDI.KEYID = 6
1,173,895 UART: [idev] SUBJECT.KEYID = 7
1,174,320 UART: [idev] UDS.KEYID = 0
1,174,666 ready_for_fw is high
1,174,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,605 UART: [idev] Erasing UDS.KEYID = 0
1,199,031 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,209,054 UART: [ldev] ++
1,209,222 UART: [ldev] CDI.KEYID = 6
1,209,586 UART: [ldev] SUBJECT.KEYID = 5
1,210,013 UART: [ldev] AUTHORITY.KEYID = 7
1,210,476 UART: [ldev] FE.KEYID = 1
1,215,618 UART: [ldev] Erasing FE.KEYID = 1
1,241,815 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,744 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,456 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,578 UART: [ldev] --
1,280,955 UART: [fwproc] Wait for Commands...
1,281,560 UART: [fwproc] Recv command 0x46574c44
1,282,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,901 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,076 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,387 >>> mbox cmd response: success
2,826,415 UART: [afmc] ++
2,826,583 UART: [afmc] CDI.KEYID = 6
2,826,946 UART: [afmc] SUBJECT.KEYID = 7
2,827,372 UART: [afmc] AUTHORITY.KEYID = 5
2,862,791 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,160 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,619 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,500 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,201 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,764 UART: [afmc] --
2,905,783 UART: [cold-reset] --
2,906,517 UART: [state] Locking Datavault
2,907,634 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,238 UART: [state] Locking ICCM
2,908,834 UART: [exit] Launching FMC @ 0x40000130
2,914,164 UART:
2,914,180 UART: Running Caliptra FMC ...
2,914,588 UART:
2,914,642 UART: [state] CFI Enabled
2,925,368 UART: [fht] FMC Alias Private Key: 7
3,044,956 UART: [art] Extend RT PCRs Done
3,045,384 UART: [art] Lock RT PCRs Done
3,047,006 UART: [art] Populate DV Done
3,054,831 UART: [fht] FMC Alias Private Key: 7
3,055,971 UART: [art] Derive CDI
3,056,251 UART: [art] Store in slot 0x4
3,141,762 UART: [art] Derive Key Pair
3,142,122 UART: [art] Store priv key in slot 0x5
3,155,240 UART: [art] Derive Key Pair - Done
3,169,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,253 UART: [art] PUB.X = 1E0860982BF943E641DB1BBE68C3F8A9A566C2A7F440C066CC7A6158B1D72975A31D1A0E2489B726D45E1EA51FEC48E1
3,193,025 UART: [art] PUB.Y = E04694AC52D5476D90ACBD833D895B2E9EDDD0FA73BC42CC71BC6D046152F7AAFEB313E58CCE4EC01B4BFAA6F006AF9B
3,199,999 UART: [art] SIG.R = 5BB78490706B8ADA3A828523318719E387C270B2D3CCCED83335FBBDE65F89B0535F17A1DF8F85128A28C7569BAA5908
3,206,770 UART: [art] SIG.S = 4263AD1E2D3654E72DE91E28062EFD70879E2E31A157E395EDEC9D6A52DC2ACCDF8BF044A880F887C7EAD9CE5E05F2B3
3,230,850 UART: Caliptra RT
3,231,101 UART: [state] CFI Enabled
3,351,285 UART: [rt] RT listening for mailbox commands...
3,351,955 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,673 UART: [rt]cmd =0x50435252, len=8
3,383,017 >>> mbox cmd response data (8 bytes)
3,383,018 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,629 UART:
3,383,645 UART: Running Caliptra ROM ...
3,384,053 UART:
3,384,108 UART: [state] CFI Enabled
3,386,728 UART: [state] LifecycleState = Unprovisioned
3,387,383 UART: [state] DebugLocked = No
3,388,065 UART: [state] WD Timer not started. Device not locked for debugging
3,389,263 UART: [kat] SHA2-256
4,192,813 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,196,917 UART: [kat] ++
4,197,069 UART: [kat] sha1
4,201,277 UART: [kat] SHA2-256
4,203,217 UART: [kat] SHA2-384
4,205,956 UART: [kat] SHA2-512-ACC
4,207,856 UART: [kat] ECC-384
4,217,749 UART: [kat] HMAC-384Kdf
4,222,391 UART: [kat] LMS
4,470,703 UART: [kat] --
4,471,437 UART: [update-reset] ++
5,422,347 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,434 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,075 >>> mbox cmd response: success
5,525,075 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,525,376 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,390 UART: [update-reset Success] --
5,534,395 UART: [state] Locking Datavault
5,535,187 UART: [state] Locking PCR0, PCR1 and PCR31
5,535,791 UART: [state] Locking ICCM
5,536,461 UART: [exit] Launching FMC @ 0x40000130
5,541,791 UART:
5,541,807 UART: Running Caliptra FMC ...
5,542,215 UART:
5,542,269 UART: [state] CFI Enabled
5,631,156 UART: [art] Extend RT PCRs Done
5,631,584 UART: [art] Lock RT PCRs Done
5,632,481 UART: [art] Populate DV Done
5,640,546 UART: [fht] FMC Alias Private Key: 7
5,641,686 UART: [art] Derive CDI
5,641,966 UART: [art] Store in slot 0x4
5,728,087 UART: [art] Derive Key Pair
5,728,447 UART: [art] Store priv key in slot 0x5
5,742,087 UART: [art] Derive Key Pair - Done
5,757,060 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,627 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,392 UART: [art] PUB.X = A7967264A84D6C22CEE95844B45698B60799DBD93623EF69F6B4D104374D060DAAD7AB465C37A3F485516813508F916F
5,780,146 UART: [art] PUB.Y = 6F09084EEB0EC6526864340DC2B9DA8F56117760CB182C5064C5991EF4E3CA01036F0AB0B930022359692C4A98E60512
5,787,063 UART: [art] SIG.R = 7C426E9A3E76DEBB0870A0EE72C70810BB789F2E71B9D35C861C11D8AF5303549DF2C3D7BE7509A9E1B63FC5BEE10D70
5,793,832 UART: [art] SIG.S = 55DFD997AF5C75B5DEBE7A645AB585C413A718C3EE020F220B7E947AF8D6CCD577B1ECB945C080F672D1C1CCD7A8C205
5,817,648 UART: mbox::rt_entry...
5,818,020 UART: ____ _ _ _ ____ _____
5,818,804 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,819,604 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,820,372 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,821,140 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,821,908 UART: |_|
5,822,220 UART:
6,188,077 UART: [rt] Runtime listening for mailbox commands...
6,189,130 >>> mbox cmd response data (128 bytes)
6,189,131 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,189,242 UART:
6,189,258 UART: Running Caliptra ROM ...
6,189,666 UART:
6,189,721 UART: [state] CFI Enabled
6,192,425 UART: [state] LifecycleState = Unprovisioned
6,193,080 UART: [state] DebugLocked = No
6,193,630 UART: [state] WD Timer not started. Device not locked for debugging
6,194,746 UART: [kat] SHA2-256
6,998,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,002,400 UART: [kat] ++
7,002,552 UART: [kat] sha1
7,006,886 UART: [kat] SHA2-256
7,008,826 UART: [kat] SHA2-384
7,011,351 UART: [kat] SHA2-512-ACC
7,013,251 UART: [kat] ECC-384
7,022,880 UART: [kat] HMAC-384Kdf
7,027,456 UART: [kat] LMS
7,275,768 UART: [kat] --
7,276,464 UART: [update-reset] ++
8,227,078 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,228,203 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,329,844 >>> mbox cmd response: success
8,329,844 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,330,023 UART: [update-reset] Copying MAN_2 To MAN_1
8,338,037 UART: [update-reset Success] --
8,338,928 UART: [state] Locking Datavault
8,339,542 UART: [state] Locking PCR0, PCR1 and PCR31
8,340,146 UART: [state] Locking ICCM
8,340,600 UART: [exit] Launching FMC @ 0x40000130
8,345,930 UART:
8,345,946 UART: Running Caliptra FMC ...
8,346,354 UART:
8,346,408 UART: [state] CFI Enabled
8,435,531 UART: [art] Extend RT PCRs Done
8,435,959 UART: [art] Lock RT PCRs Done
8,437,208 UART: [art] Populate DV Done
8,445,253 UART: [fht] FMC Alias Private Key: 7
8,446,349 UART: [art] Derive CDI
8,446,629 UART: [art] Store in slot 0x4
8,532,512 UART: [art] Derive Key Pair
8,532,872 UART: [art] Store priv key in slot 0x5
8,545,980 UART: [art] Derive Key Pair - Done
8,560,638 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,576,135 UART: [art] Erasing AUTHORITY.KEYID = 7
8,576,900 UART: [art] PUB.X = 76BD5B45531BAFDA042127B0D55CB4C121E1E87D3F2989FAEF6785C38DBB600EDD8C98A6EA42946D6147456A8557AEE7
8,583,676 UART: [art] PUB.Y = 45D7EB2752D3A62C377CD02BF5C3114F3DAC8DF2BF4CD595E2F0804F928331CEB219934E4C8CDDCBDC5EEF053F6A4FCC
8,590,649 UART: [art] SIG.R = 519900F4D9C2FB6EA24DF0B9E080693A58EE24FA9BE91FB7B7D68FED4E00B898AA2538A2ADFDAB62A1F6EC2D697E5591
8,597,397 UART: [art] SIG.S = F3DC8011D99E70F73D33C91214641E9BDC3A2DD6CBFBA35011C7165C12E8496AD8049945845F35870C92D21891F03192
8,620,843 UART: mbox::rt_entry...
8,621,215 UART: ____ _ _ _ ____ _____
8,621,999 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,622,799 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,623,567 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,624,335 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,625,103 UART: |_|
8,625,415 UART:
8,985,881 UART: [rt] Runtime listening for mailbox commands...
8,986,934 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,886 ready_for_fw is high
1,058,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,622 >>> mbox cmd response: success
2,739,093 UART:
2,739,109 UART: Running Caliptra FMC ...
2,739,517 UART:
2,739,571 UART: [state] CFI Enabled
2,750,069 UART: [fht] FMC Alias Private Key: 7
2,869,153 UART: [art] Extend RT PCRs Done
2,869,581 UART: [art] Lock RT PCRs Done
2,871,345 UART: [art] Populate DV Done
2,879,596 UART: [fht] FMC Alias Private Key: 7
2,880,748 UART: [art] Derive CDI
2,881,028 UART: [art] Store in slot 0x4
2,967,085 UART: [art] Derive Key Pair
2,967,445 UART: [art] Store priv key in slot 0x5
2,980,785 UART: [art] Derive Key Pair - Done
2,995,742 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,812 UART: [art] PUB.X = 7015A7EC0D979513C140C1BA1D4AEF269BA403F012F748C1C88B7B1AA9ECC36ACC9422B92481927AB8D6AB2468A09B2C
3,018,588 UART: [art] PUB.Y = F3301826CEEE53DC6619DAB06D65378D666B54FF6E97C289E6A67AE2AD95C29E914D8B8E5DFA04189A52C77707D1E7AD
3,025,544 UART: [art] SIG.R = C9C93D2752DDA121610653B34A7D600DADA75832E9288D26122D6BCF090704EA012327C4FCDFCB9B24450C8D4C9EABFA
3,032,305 UART: [art] SIG.S = EF1922201B28D585FA82B7FC94A532E3B9173D1DB2049C73A6A6C60D0BFF2E7C21D2CF9D5856D46080C5F25312A2A4BC
3,055,746 UART: Caliptra RT
3,055,997 UART: [state] CFI Enabled
3,175,585 UART: [rt] RT listening for mailbox commands...
3,176,255 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,161 UART: [rt]cmd =0x50435252, len=8
3,207,857 >>> mbox cmd response data (8 bytes)
3,207,858 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,233,475 >>> mbox cmd response: success
5,233,475 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,246,684 UART:
5,246,700 UART: Running Caliptra FMC ...
5,247,108 UART:
5,247,162 UART: [state] CFI Enabled
5,336,545 UART: [art] Extend RT PCRs Done
5,336,973 UART: [art] Lock RT PCRs Done
5,338,372 UART: [art] Populate DV Done
5,346,559 UART: [fht] FMC Alias Private Key: 7
5,347,645 UART: [art] Derive CDI
5,347,925 UART: [art] Store in slot 0x4
5,433,310 UART: [art] Derive Key Pair
5,433,670 UART: [art] Store priv key in slot 0x5
5,446,862 UART: [art] Derive Key Pair - Done
5,461,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,477,423 UART: [art] Erasing AUTHORITY.KEYID = 7
5,478,188 UART: [art] PUB.X = 1634C0ED31D0D128FF6E94778B62E0BC512692BBBFD6C269D116C4A027B6537FBFE03B6749A3EFE222553611F9A9F378
5,484,964 UART: [art] PUB.Y = 41CFAE78809EA3F54B12BA3CFED179A932595970D15B0A1DB397138EFC4647620763DFBE094A143B1ADBD524974731E7
5,491,911 UART: [art] SIG.R = E8DF71B1BCC24AA41FC360ECF6811BB81333944DB311808A3A8D12493E6BC670044708D5B2223FD2FAA8681DDC674F0B
5,498,682 UART: [art] SIG.S = 29F7C34A504825ECCD438B4FC499D3FD65679A8D0F3530E414A68E1D67BDAD5697DAC608095CC159714BC307B7EEE7B3
5,523,158 UART: mbox::rt_entry...
5,523,530 UART: ____ _ _ _ ____ _____
5,524,314 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,525,114 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,525,882 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,526,650 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,527,418 UART: |_|
5,527,730 UART:
5,890,502 UART: [rt] Runtime listening for mailbox commands...
5,891,555 >>> mbox cmd response data (128 bytes)
5,891,556 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,916,641 >>> mbox cmd response: success
7,916,641 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,930,192 UART:
7,930,208 UART: Running Caliptra FMC ...
7,930,616 UART:
7,930,670 UART: [state] CFI Enabled
8,019,609 UART: [art] Extend RT PCRs Done
8,020,037 UART: [art] Lock RT PCRs Done
8,021,424 UART: [art] Populate DV Done
8,029,835 UART: [fht] FMC Alias Private Key: 7
8,030,911 UART: [art] Derive CDI
8,031,191 UART: [art] Store in slot 0x4
8,116,748 UART: [art] Derive Key Pair
8,117,108 UART: [art] Store priv key in slot 0x5
8,129,914 UART: [art] Derive Key Pair - Done
8,144,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,160,012 UART: [art] Erasing AUTHORITY.KEYID = 7
8,160,777 UART: [art] PUB.X = 9A49E76E76378A33DE86FF069CE5A776820ECF0C75D0C86A1D52D349CC65D3B88B33FFBF63E0B4D35A37A44DB486E6D7
8,167,552 UART: [art] PUB.Y = 1217DBD354A017427131197B2B738D51A8F0D975CFE64A56597DC19C877F073D12FE9C2C699BC6F0A33778F7E5D722DF
8,174,501 UART: [art] SIG.R = 174165DFA5B5724D8A85663962FCF9075E7BA9D7ECB31AF1DB8C9BDC3D7973FACCF0E8F3BE3660E54BF542B2407BA55C
8,181,288 UART: [art] SIG.S = B89DBD7D1288D2195DFF1155F26A997997C74430549C8D74A186589600A802BE22C1322E4AF032113044DE154A702F74
8,204,963 UART: mbox::rt_entry...
8,205,335 UART: ____ _ _ _ ____ _____
8,206,119 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,206,919 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,207,687 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,208,455 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,209,223 UART: |_|
8,209,535 UART:
8,575,339 UART: [rt] Runtime listening for mailbox commands...
8,576,392 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,800 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
891,609 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,713 UART: [kat] ++
895,865 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,832 UART: [kat] SHA2-512-ACC
906,733 UART: [kat] ECC-384
916,420 UART: [kat] HMAC-384Kdf
921,004 UART: [kat] LMS
1,169,316 UART: [kat] --
1,170,477 UART: [cold-reset] ++
1,170,965 UART: [fht] FHT @ 0x50003400
1,173,629 UART: [idev] ++
1,173,797 UART: [idev] CDI.KEYID = 6
1,174,158 UART: [idev] SUBJECT.KEYID = 7
1,174,583 UART: [idev] UDS.KEYID = 0
1,174,929 ready_for_fw is high
1,174,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,154 UART: [idev] Erasing UDS.KEYID = 0
1,199,350 UART: [idev] Sha1 KeyId Algorithm
1,208,134 UART: [idev] --
1,209,159 UART: [ldev] ++
1,209,327 UART: [ldev] CDI.KEYID = 6
1,209,691 UART: [ldev] SUBJECT.KEYID = 5
1,210,118 UART: [ldev] AUTHORITY.KEYID = 7
1,210,581 UART: [ldev] FE.KEYID = 1
1,215,949 UART: [ldev] Erasing FE.KEYID = 1
1,243,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,536 UART: [fwproc] Wait for Commands...
1,283,349 UART: [fwproc] Recv command 0x46574c44
1,284,082 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,287 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,379 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,720 >>> mbox cmd response: success
2,827,806 UART: [afmc] ++
2,827,974 UART: [afmc] CDI.KEYID = 6
2,828,337 UART: [afmc] SUBJECT.KEYID = 7
2,828,763 UART: [afmc] AUTHORITY.KEYID = 5
2,864,342 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,113 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,862 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,572 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,453 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,154 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,925 UART: [afmc] --
2,907,912 UART: [cold-reset] --
2,908,722 UART: [state] Locking Datavault
2,909,759 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,363 UART: [state] Locking ICCM
2,911,007 UART: [exit] Launching FMC @ 0x40000130
2,916,337 UART:
2,916,353 UART: Running Caliptra FMC ...
2,916,761 UART:
2,916,904 UART: [state] CFI Enabled
2,927,262 UART: [fht] FMC Alias Private Key: 7
3,046,694 UART: [art] Extend RT PCRs Done
3,047,122 UART: [art] Lock RT PCRs Done
3,048,736 UART: [art] Populate DV Done
3,056,779 UART: [fht] FMC Alias Private Key: 7
3,057,787 UART: [art] Derive CDI
3,058,067 UART: [art] Store in slot 0x4
3,143,740 UART: [art] Derive Key Pair
3,144,100 UART: [art] Store priv key in slot 0x5
3,157,314 UART: [art] Derive Key Pair - Done
3,172,238 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,753 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,518 UART: [art] PUB.X = 158B370BEDB5B3449B75CF89751FAC639E83F48D1092B4A0BD9E1ECDB5F917DECBD517AD38BB5B99B2446F4256F545BE
3,195,303 UART: [art] PUB.Y = 36B4C407266D855A051CC3D561163C33EC5D0666C51702BAC0C3179798B4D921592EDDC9A1E42292FEA59D53802DF349
3,202,239 UART: [art] SIG.R = BBB99A30DBEDB046E6C6D51A5F74CE4D47F443E0FD1D862D19FFCC6BA97ECA05E17D7724DE5F45B5BF4C2C05353F38C4
3,209,029 UART: [art] SIG.S = B79B88AC54AAD3A594EE1B393B85746E23E11D8FBE625B8225675CC5B271DBA62A0D28824CE603BB53E2CED8C1A6B415
3,233,477 UART: Caliptra RT
3,233,820 UART: [state] CFI Enabled
3,353,504 UART: [rt] RT listening for mailbox commands...
3,354,174 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,200 UART: [rt]cmd =0x50435252, len=8
3,385,586 >>> mbox cmd response data (8 bytes)
3,385,587 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,420 UART:
3,386,436 UART: Running Caliptra ROM ...
3,386,844 UART:
3,386,986 UART: [state] CFI Enabled
3,389,876 UART: [state] LifecycleState = Unprovisioned
3,390,531 UART: [state] DebugLocked = No
3,391,199 UART: [state] WD Timer not started. Device not locked for debugging
3,392,491 UART: [kat] SHA2-256
4,196,041 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,200,145 UART: [kat] ++
4,200,297 UART: [kat] sha1
4,204,447 UART: [kat] SHA2-256
4,206,387 UART: [kat] SHA2-384
4,209,242 UART: [kat] SHA2-512-ACC
4,211,142 UART: [kat] ECC-384
4,220,767 UART: [kat] HMAC-384Kdf
4,225,313 UART: [kat] LMS
4,473,625 UART: [kat] --
4,474,507 UART: [update-reset] ++
5,423,333 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,356 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,997 >>> mbox cmd response: success
5,525,997 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,526,232 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,246 UART: [update-reset Success] --
5,535,431 UART: [state] Locking Datavault
5,536,189 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,793 UART: [state] Locking ICCM
5,537,463 UART: [exit] Launching FMC @ 0x40000130
5,542,793 UART:
5,542,809 UART: Running Caliptra FMC ...
5,543,217 UART:
5,543,360 UART: [state] CFI Enabled
5,632,461 UART: [art] Extend RT PCRs Done
5,632,889 UART: [art] Lock RT PCRs Done
5,634,154 UART: [art] Populate DV Done
5,642,323 UART: [fht] FMC Alias Private Key: 7
5,643,453 UART: [art] Derive CDI
5,643,733 UART: [art] Store in slot 0x4
5,729,616 UART: [art] Derive Key Pair
5,729,976 UART: [art] Store priv key in slot 0x5
5,743,250 UART: [art] Derive Key Pair - Done
5,758,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,773,819 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,584 UART: [art] PUB.X = 29934719FA223052A8F029C6EA6C820F2F3D21E6FACFBDDE9D05F71BF39707CA883BD17A64ADF179C93F6FB47ABFC1D7
5,781,365 UART: [art] PUB.Y = 66C7342840E4C6EA4D150FA575774F9144A7343BA2CA064BBD8F9905D39A8B179C55512A2F3CB3E1400E890DD7F9DCDD
5,788,308 UART: [art] SIG.R = 7F6C2021C887F503D5178093AF4FB2FC3A3A1DBF158259DDDEC173FA8F37DBC24A55F2FFCAF274F4EAB8D5EA02A8F27E
5,795,098 UART: [art] SIG.S = 70796CEA6F706AEFA2F1042065834AA25BDC603EA9CD4EAC7AF3898A5136CC0B289091D541D1F49F70358434C6DF8D66
5,819,516 UART: mbox::rt_entry...
5,819,888 UART: ____ _ _ _ ____ _____
5,820,672 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,821,472 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,822,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,823,008 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,823,776 UART: |_|
5,824,088 UART:
6,189,545 UART: [rt] Runtime listening for mailbox commands...
6,190,598 >>> mbox cmd response data (128 bytes)
6,190,599 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,190,710 UART:
6,190,726 UART: Running Caliptra ROM ...
6,191,134 UART:
6,191,276 UART: [state] CFI Enabled
6,193,900 UART: [state] LifecycleState = Unprovisioned
6,194,555 UART: [state] DebugLocked = No
6,195,207 UART: [state] WD Timer not started. Device not locked for debugging
6,196,335 UART: [kat] SHA2-256
6,999,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,003,989 UART: [kat] ++
7,004,141 UART: [kat] sha1
7,008,429 UART: [kat] SHA2-256
7,010,369 UART: [kat] SHA2-384
7,013,224 UART: [kat] SHA2-512-ACC
7,015,124 UART: [kat] ECC-384
7,024,451 UART: [kat] HMAC-384Kdf
7,029,139 UART: [kat] LMS
7,277,451 UART: [kat] --
7,278,475 UART: [update-reset] ++
8,228,821 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,229,948 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,331,589 >>> mbox cmd response: success
8,331,589 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,331,918 UART: [update-reset] Copying MAN_2 To MAN_1
8,339,932 UART: [update-reset Success] --
8,340,977 UART: [state] Locking Datavault
8,341,593 UART: [state] Locking PCR0, PCR1 and PCR31
8,342,197 UART: [state] Locking ICCM
8,342,669 UART: [exit] Launching FMC @ 0x40000130
8,347,999 UART:
8,348,015 UART: Running Caliptra FMC ...
8,348,423 UART:
8,348,566 UART: [state] CFI Enabled
8,437,267 UART: [art] Extend RT PCRs Done
8,437,695 UART: [art] Lock RT PCRs Done
8,439,088 UART: [art] Populate DV Done
8,447,253 UART: [fht] FMC Alias Private Key: 7
8,448,227 UART: [art] Derive CDI
8,448,507 UART: [art] Store in slot 0x4
8,534,560 UART: [art] Derive Key Pair
8,534,920 UART: [art] Store priv key in slot 0x5
8,548,760 UART: [art] Derive Key Pair - Done
8,563,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,579,012 UART: [art] Erasing AUTHORITY.KEYID = 7
8,579,777 UART: [art] PUB.X = 8932542E004A48CC37DAC2959ED4F5050F142EA69A5A3B50D4A50B5BE8EFC1AFD5AC24C9CD8547D12F25AA62D3C5B72D
8,586,534 UART: [art] PUB.Y = 34A247B634D75536C3F8EE2709B2324FFFC7FD3D388924AC9F0C2577D03B674B0051330526C38A10E9E8F2977C6C2D67
8,593,451 UART: [art] SIG.R = E7866DD21830887EF3E30E3BF9CC2F1CEC3FA2CE962A18F0F5D533093914AB247A1F3551B229B978EA1625513AB46F92
8,600,221 UART: [art] SIG.S = 34A56E9ED70F22C5BD343F2937DAF2D668D03D3B1679B2F69DC57084FC7B9D9686703FF720CABAB33C25D864E5298118
8,623,592 UART: mbox::rt_entry...
8,623,964 UART: ____ _ _ _ ____ _____
8,624,748 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,625,548 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,626,316 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,627,084 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,627,852 UART: |_|
8,628,164 UART:
8,991,202 UART: [rt] Runtime listening for mailbox commands...
8,992,255 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,529 ready_for_fw is high
1,059,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,481 >>> mbox cmd response: success
2,742,564 UART:
2,742,580 UART: Running Caliptra FMC ...
2,742,988 UART:
2,743,131 UART: [state] CFI Enabled
2,753,703 UART: [fht] FMC Alias Private Key: 7
2,872,657 UART: [art] Extend RT PCRs Done
2,873,085 UART: [art] Lock RT PCRs Done
2,874,755 UART: [art] Populate DV Done
2,883,096 UART: [fht] FMC Alias Private Key: 7
2,884,078 UART: [art] Derive CDI
2,884,358 UART: [art] Store in slot 0x4
2,970,339 UART: [art] Derive Key Pair
2,970,699 UART: [art] Store priv key in slot 0x5
2,983,615 UART: [art] Derive Key Pair - Done
2,998,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,192 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,957 UART: [art] PUB.X = 86CF23661D5B7870DF36BDC279E640FB127FA83ECE90CD71C03CC911737DE43C6EAA6A58F06FCFE4593A7BCFAED9754B
3,021,749 UART: [art] PUB.Y = 2A9A774DEBC1B9DC335B0545E44160FCACB35C2BD490ACF9B218C97B0360AF08E3A28C3E0BD814FA19B79FD976D87DB6
3,028,707 UART: [art] SIG.R = 11C74FA90669434A90FA6036522B9B0C44735B5E0E6383ACE517E24CBBA1A36B4599C50A93D36215A83B0B61450C6D9F
3,035,459 UART: [art] SIG.S = 4456B9756249F732C0A1F8CFD3B7C8EA71C3EF6724FD4A6BC502D0BC2AF01A10015FC7A87D6803CE77D01BE3241D2C9C
3,059,268 UART: Caliptra RT
3,059,611 UART: [state] CFI Enabled
3,179,099 UART: [rt] RT listening for mailbox commands...
3,179,769 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,417 UART: [rt]cmd =0x50435252, len=8
3,211,205 >>> mbox cmd response data (8 bytes)
3,211,206 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,239,236 >>> mbox cmd response: success
5,239,236 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,252,695 UART:
5,252,711 UART: Running Caliptra FMC ...
5,253,119 UART:
5,253,262 UART: [state] CFI Enabled
5,342,719 UART: [art] Extend RT PCRs Done
5,343,147 UART: [art] Lock RT PCRs Done
5,344,490 UART: [art] Populate DV Done
5,352,543 UART: [fht] FMC Alias Private Key: 7
5,353,691 UART: [art] Derive CDI
5,353,971 UART: [art] Store in slot 0x4
5,439,708 UART: [art] Derive Key Pair
5,440,068 UART: [art] Store priv key in slot 0x5
5,453,636 UART: [art] Derive Key Pair - Done
5,468,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,798 UART: [art] Erasing AUTHORITY.KEYID = 7
5,484,563 UART: [art] PUB.X = 0650BB7181BA860C9D6CBB15A8AA042AB60CF92B5022220556F52D1FE6741254A7696C44F324FBD99CFE461501BECBB2
5,491,323 UART: [art] PUB.Y = 560F34F03A14900A10531EB9887D9489DAAC7A859B008ED4F6B832F4476EF8B581BD9CA7F65FF98CC8AC9958F91AA5C9
5,498,255 UART: [art] SIG.R = DB4C27D830076A1048646F3B2FFC0401DCFBCA6FB0B50AA9663E82A516A1ED99A696705E10FCE19CAAF8651D4DFEF6A7
5,505,033 UART: [art] SIG.S = 6F72090581BCC86E521FDB02664CBA6EF4FA3B933B3D6C3A8FEDA2AA507540B76BEA2F273BFC25CEEAF39A135416B896
5,529,114 UART: mbox::rt_entry...
5,529,486 UART: ____ _ _ _ ____ _____
5,530,270 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,531,070 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,531,838 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,532,606 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,533,374 UART: |_|
5,533,686 UART:
5,894,870 UART: [rt] Runtime listening for mailbox commands...
5,895,923 >>> mbox cmd response data (128 bytes)
5,895,924 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,921,372 >>> mbox cmd response: success
7,921,372 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,934,967 UART:
7,934,983 UART: Running Caliptra FMC ...
7,935,391 UART:
7,935,534 UART: [state] CFI Enabled
8,024,377 UART: [art] Extend RT PCRs Done
8,024,805 UART: [art] Lock RT PCRs Done
8,025,756 UART: [art] Populate DV Done
8,034,025 UART: [fht] FMC Alias Private Key: 7
8,035,073 UART: [art] Derive CDI
8,035,353 UART: [art] Store in slot 0x4
8,121,400 UART: [art] Derive Key Pair
8,121,760 UART: [art] Store priv key in slot 0x5
8,135,620 UART: [art] Derive Key Pair - Done
8,150,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,165,783 UART: [art] Erasing AUTHORITY.KEYID = 7
8,166,548 UART: [art] PUB.X = 7883493182C5499FD610B821FFA3B6B69EC6EBBA639316F746B444DE3AC9FAF13F6546551482D4D365CBD216351D2984
8,173,318 UART: [art] PUB.Y = 07A7E52542F704FEF8A16E506512A866A4B7A853BC303D1F6FE6C9998AE567575F2E592ED9C55F2C8EFA87A1F76A52BB
8,180,272 UART: [art] SIG.R = ADDC7FCA5DB41DE8A65A4B686CF9AA1F08EAE5875656BC1242FEC4BE636B177A2CE26A3F410D017B41C7EC219599F8F9
8,187,055 UART: [art] SIG.S = 59E770C4E58DFACD49FC81291E47BC3A7D443809D456FA076E0900B12C271534CF40916B12C3A14E2855F787F198D3BE
8,210,584 UART: mbox::rt_entry...
8,210,956 UART: ____ _ _ _ ____ _____
8,211,740 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,212,540 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,213,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,214,076 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,214,844 UART: |_|
8,215,156 UART:
8,583,014 UART: [rt] Runtime listening for mailbox commands...
8,584,067 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.31s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,472 UART: [kat] SHA2-256
893,122 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,247 UART: [kat] ++
897,399 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,282 UART: [kat] SHA2-512-ACC
908,183 UART: [kat] ECC-384
918,078 UART: [kat] HMAC-384Kdf
922,644 UART: [kat] LMS
1,170,972 UART: [kat] --
1,172,035 UART: [cold-reset] ++
1,172,371 UART: [fht] FHT @ 0x50003400
1,174,926 UART: [idev] ++
1,175,094 UART: [idev] CDI.KEYID = 6
1,175,454 UART: [idev] SUBJECT.KEYID = 7
1,175,878 UART: [idev] UDS.KEYID = 0
1,176,223 ready_for_fw is high
1,176,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,427 UART: [idev] Sha1 KeyId Algorithm
1,208,847 UART: [idev] --
1,209,785 UART: [ldev] ++
1,209,953 UART: [ldev] CDI.KEYID = 6
1,210,316 UART: [ldev] SUBJECT.KEYID = 5
1,210,742 UART: [ldev] AUTHORITY.KEYID = 7
1,211,205 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,572 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,147 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,863 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,754 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,466 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,465 UART: [ldev] --
1,281,740 UART: [fwproc] Wait for Commands...
1,282,424 UART: [fwproc] Recv command 0x46574c44
1,283,152 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,331 >>> mbox cmd response: success
2,826,385 UART: [afmc] ++
2,826,553 UART: [afmc] CDI.KEYID = 6
2,826,915 UART: [afmc] SUBJECT.KEYID = 7
2,827,340 UART: [afmc] AUTHORITY.KEYID = 5
2,863,265 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,518 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,266 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,975 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,858 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,559 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,531 UART: [afmc] --
2,906,569 UART: [cold-reset] --
2,907,275 UART: [state] Locking Datavault
2,908,488 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,092 UART: [state] Locking ICCM
2,909,558 UART: [exit] Launching FMC @ 0x40000130
2,914,888 UART:
2,914,904 UART: Running Caliptra FMC ...
2,915,312 UART:
2,915,366 UART: [state] CFI Enabled
2,926,006 UART: [fht] FMC Alias Private Key: 7
3,044,468 UART: [art] Extend RT PCRs Done
3,044,896 UART: [art] Lock RT PCRs Done
3,046,564 UART: [art] Populate DV Done
3,054,833 UART: [fht] FMC Alias Private Key: 7
3,055,773 UART: [art] Derive CDI
3,056,053 UART: [art] Store in slot 0x4
3,141,656 UART: [art] Derive Key Pair
3,142,016 UART: [art] Store priv key in slot 0x5
3,155,758 UART: [art] Derive Key Pair - Done
3,170,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,779 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,544 UART: [art] PUB.X = 3A0984B8913E0A6CDCE9FEBBCBD783871E985B1359837C40500741B9CB5BA2F26A8C66753222DF1240A9283B5534A36F
3,193,307 UART: [art] PUB.Y = 2C3C28363891D9B93015689414D9BDF82C031897BDBDE92F15E12B77C411A3006E0D0B6866E7626A595FDE456B82CCAE
3,200,228 UART: [art] SIG.R = 62FC182CC600CA1F285BF19CBE52166B697E6AFA5C7572C109F8C3489E08ED5930256AB530DABB37E2112C3F966634B8
3,206,976 UART: [art] SIG.S = DAA4DA788B375C52728CAF1C589EA533B0860E0940E0B281502CBD354E36B5595F107BCD9CB255B80E3914916BCB116C
3,230,273 UART: Caliptra RT
3,230,524 UART: [state] CFI Enabled
3,350,153 UART: [rt] RT listening for mailbox commands...
3,350,823 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,917 UART: [rt]cmd =0x50435252, len=8
3,382,605 >>> mbox cmd response data (8 bytes)
3,382,606 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,699 UART:
3,383,715 UART: Running Caliptra ROM ...
3,384,123 UART:
3,384,178 UART: [state] CFI Enabled
3,386,924 UART: [state] LifecycleState = Unprovisioned
3,387,579 UART: [state] DebugLocked = No
3,388,061 UART: [state] WD Timer not started. Device not locked for debugging
3,389,369 UART: [kat] SHA2-256
4,195,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,199,144 UART: [kat] ++
4,199,296 UART: [kat] sha1
4,203,542 UART: [kat] SHA2-256
4,205,482 UART: [kat] SHA2-384
4,208,319 UART: [kat] SHA2-512-ACC
4,210,219 UART: [kat] ECC-384
4,219,714 UART: [kat] HMAC-384Kdf
4,224,450 UART: [kat] LMS
4,472,778 UART: [kat] --
4,473,552 UART: [update-reset] ++
5,422,897 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,423,896 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,537 >>> mbox cmd response: success
5,525,537 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,525,812 UART: [update-reset] Copying MAN_2 To MAN_1
5,533,826 UART: [update-reset Success] --
5,534,863 UART: [state] Locking Datavault
5,535,903 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,507 UART: [state] Locking ICCM
5,537,109 UART: [exit] Launching FMC @ 0x40000130
5,542,439 UART:
5,542,455 UART: Running Caliptra FMC ...
5,542,863 UART:
5,542,917 UART: [state] CFI Enabled
5,631,838 UART: [art] Extend RT PCRs Done
5,632,266 UART: [art] Lock RT PCRs Done
5,633,575 UART: [art] Populate DV Done
5,641,854 UART: [fht] FMC Alias Private Key: 7
5,642,922 UART: [art] Derive CDI
5,643,202 UART: [art] Store in slot 0x4
5,729,031 UART: [art] Derive Key Pair
5,729,391 UART: [art] Store priv key in slot 0x5
5,742,803 UART: [art] Derive Key Pair - Done
5,757,462 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,772,953 UART: [art] Erasing AUTHORITY.KEYID = 7
5,773,718 UART: [art] PUB.X = 27BAC10F53A08645DA70A743D26183BDF4C6E99FE99DA5E37C55FBA1EEA121ADCE12BA47454577AFB19A542C4D3EFEEF
5,780,509 UART: [art] PUB.Y = 378E836C648363DDDF4DDE7E21AF260D8ECBCEF715531D232559146D8523B51FB7B1AC8DB26E29E923952DA8C832CA8F
5,787,468 UART: [art] SIG.R = F0D20257498DFFE4B919929634513B8BF7ACC33947C4AC770B2D0150A42C1A9D4A24C3CDA6FE585D4634AB172DB2E6F7
5,794,239 UART: [art] SIG.S = DB141D5F53BA3559FA51B375066022071818C14D5596A4A75060A9754827AA9912F2241D06171EFC6880A18011ED0B04
5,818,118 UART: mbox::rt_entry...
5,818,490 UART: ____ _ _ _ ____ _____
5,819,274 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,074 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,820,842 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,821,610 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,378 UART: |_|
5,822,690 UART:
6,189,243 UART: [rt] Runtime listening for mailbox commands...
6,190,296 >>> mbox cmd response data (128 bytes)
6,190,297 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,190,408 UART:
6,190,424 UART: Running Caliptra ROM ...
6,190,832 UART:
6,190,887 UART: [state] CFI Enabled
6,193,301 UART: [state] LifecycleState = Unprovisioned
6,193,956 UART: [state] DebugLocked = No
6,194,502 UART: [state] WD Timer not started. Device not locked for debugging
6,195,854 UART: [kat] SHA2-256
7,001,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,005,629 UART: [kat] ++
7,005,781 UART: [kat] sha1
7,010,177 UART: [kat] SHA2-256
7,012,117 UART: [kat] SHA2-384
7,014,820 UART: [kat] SHA2-512-ACC
7,016,720 UART: [kat] ECC-384
7,026,455 UART: [kat] HMAC-384Kdf
7,031,129 UART: [kat] LMS
7,279,457 UART: [kat] --
7,280,279 UART: [update-reset] ++
8,229,915 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,231,008 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,332,649 >>> mbox cmd response: success
8,332,649 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,332,944 UART: [update-reset] Copying MAN_2 To MAN_1
8,340,958 UART: [update-reset Success] --
8,342,153 UART: [state] Locking Datavault
8,342,723 UART: [state] Locking PCR0, PCR1 and PCR31
8,343,327 UART: [state] Locking ICCM
8,343,853 UART: [exit] Launching FMC @ 0x40000130
8,349,183 UART:
8,349,199 UART: Running Caliptra FMC ...
8,349,607 UART:
8,349,661 UART: [state] CFI Enabled
8,438,984 UART: [art] Extend RT PCRs Done
8,439,412 UART: [art] Lock RT PCRs Done
8,440,571 UART: [art] Populate DV Done
8,448,792 UART: [fht] FMC Alias Private Key: 7
8,449,734 UART: [art] Derive CDI
8,450,014 UART: [art] Store in slot 0x4
8,535,911 UART: [art] Derive Key Pair
8,536,271 UART: [art] Store priv key in slot 0x5
8,549,473 UART: [art] Derive Key Pair - Done
8,564,206 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,579,535 UART: [art] Erasing AUTHORITY.KEYID = 7
8,580,300 UART: [art] PUB.X = 61BDDA7A137390D0D25937A0450082CD5A9FD41D9DAAC8AFCD95DE301A1AB651F1E973FCD81A39DB2BAF40DF39299A0A
8,587,067 UART: [art] PUB.Y = 8C5F1ED489BF54713165E0190224C780430574DA684211EC563E0672E2678790B681DAC83F5B2E5367E928D124745F7F
8,593,996 UART: [art] SIG.R = 270C22AE6EB77055163911D4CD93FB186BC240ECF0071787C7B74370E77EBFCD54F9069A3792A4BEDB172E2483AD19AC
8,600,765 UART: [art] SIG.S = 6100B9F1EE531A54839A8D5E7BE23067F27B0EBBCC9914274199DC2BBFCFE102821589A42749FF3D1646F1B694D622B1
8,624,545 UART: mbox::rt_entry...
8,624,917 UART: ____ _ _ _ ____ _____
8,625,701 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,626,501 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,627,269 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,628,037 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,628,805 UART: |_|
8,629,117 UART:
8,994,630 UART: [rt] Runtime listening for mailbox commands...
8,995,683 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,677 ready_for_fw is high
1,060,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,210 >>> mbox cmd response: success
2,741,123 UART:
2,741,139 UART: Running Caliptra FMC ...
2,741,547 UART:
2,741,601 UART: [state] CFI Enabled
2,752,181 UART: [fht] FMC Alias Private Key: 7
2,871,049 UART: [art] Extend RT PCRs Done
2,871,477 UART: [art] Lock RT PCRs Done
2,873,137 UART: [art] Populate DV Done
2,881,250 UART: [fht] FMC Alias Private Key: 7
2,882,428 UART: [art] Derive CDI
2,882,708 UART: [art] Store in slot 0x4
2,968,733 UART: [art] Derive Key Pair
2,969,093 UART: [art] Store priv key in slot 0x5
2,982,515 UART: [art] Derive Key Pair - Done
2,997,272 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,430 UART: [art] PUB.X = 05BA24DB0556234A971A4D9888C012C5B091A59EEE0F5A16DEEB2FB79FA529237C7AC2A205A3A97E6757A4728C113F30
3,020,194 UART: [art] PUB.Y = A2FCE43101169B6A6C83C95FB36DE440AF79CD7E61E952395DFB57EA9325E9007B5DBEF1C84723934E9CC0596EE1FF5C
3,027,133 UART: [art] SIG.R = B234F345636EBA955A7070FA2ADD3D017E4FC8DF843360B360306FB2A1C24DA67BACD1D5094A3751B25721191A4F68AD
3,033,905 UART: [art] SIG.S = 108A1B5E784B769BB6657E4DC6FD3F2E2B11642EEF1C4B23D9B518CE2A59F9698FA0343B36001B8BB438FC35D695F496
3,057,653 UART: Caliptra RT
3,057,904 UART: [state] CFI Enabled
3,177,371 UART: [rt] RT listening for mailbox commands...
3,178,041 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,001 UART: [rt]cmd =0x50435252, len=8
3,209,397 >>> mbox cmd response data (8 bytes)
3,209,398 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,236,456 >>> mbox cmd response: success
5,236,456 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,249,939 UART:
5,249,955 UART: Running Caliptra FMC ...
5,250,363 UART:
5,250,417 UART: [state] CFI Enabled
5,339,434 UART: [art] Extend RT PCRs Done
5,339,862 UART: [art] Lock RT PCRs Done
5,341,251 UART: [art] Populate DV Done
5,349,524 UART: [fht] FMC Alias Private Key: 7
5,350,594 UART: [art] Derive CDI
5,350,874 UART: [art] Store in slot 0x4
5,436,969 UART: [art] Derive Key Pair
5,437,329 UART: [art] Store priv key in slot 0x5
5,450,941 UART: [art] Derive Key Pair - Done
5,465,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,491 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,256 UART: [art] PUB.X = CB96F1286B5243590796B5EC9AAB9C6C6F2DCBE0D6F29058C801D21C0F82E1400953BFEB463402DE3C131ED980DEF53F
5,489,023 UART: [art] PUB.Y = 3F3EDA1C0FF4BDF48B9074253EC21D09AB3743C658D776033D760643623903FD781ACAD0267F2D6EB9CC2B6BACE70B11
5,495,967 UART: [art] SIG.R = 3E5067A88D19F6C9978DAEB7725F6077CEE295EFCC326FD59525C44E8319ED3AB77773A84F24CEE2AB2F1CCBC5729089
5,502,749 UART: [art] SIG.S = D3029F895E6C3FB53CEC3FA88AE8F80B897C0B6F778360087CE097C56BBF0B77F2E9467A521CECFF6EBFB0CE258875B3
5,526,016 UART: mbox::rt_entry...
5,526,388 UART: ____ _ _ _ ____ _____
5,527,172 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,527,972 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,528,740 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,529,508 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,530,276 UART: |_|
5,530,588 UART:
5,895,270 UART: [rt] Runtime listening for mailbox commands...
5,896,323 >>> mbox cmd response data (128 bytes)
5,896,324 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,922,390 >>> mbox cmd response: success
7,922,390 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,935,741 UART:
7,935,757 UART: Running Caliptra FMC ...
7,936,165 UART:
7,936,219 UART: [state] CFI Enabled
8,025,978 UART: [art] Extend RT PCRs Done
8,026,406 UART: [art] Lock RT PCRs Done
8,027,969 UART: [art] Populate DV Done
8,036,460 UART: [fht] FMC Alias Private Key: 7
8,037,438 UART: [art] Derive CDI
8,037,718 UART: [art] Store in slot 0x4
8,123,357 UART: [art] Derive Key Pair
8,123,717 UART: [art] Store priv key in slot 0x5
8,137,029 UART: [art] Derive Key Pair - Done
8,151,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,166,740 UART: [art] Erasing AUTHORITY.KEYID = 7
8,167,505 UART: [art] PUB.X = 686AF051ABEFE40C6C9A61D0B2357DED91865DC84512DFAD73B6725496963B8AD32C341D0BC7C3C1CFE90286849F5219
8,174,274 UART: [art] PUB.Y = 60F656A4ECCD0E7C1CC2C59196B4056DEDE390136AB3B3F4AA6AF75BB6CA4BE94871B9031EDC7EAB65378C56A5381C21
8,181,233 UART: [art] SIG.R = AE02EF8926D1E9833072EF0A1D3A596C65F6C4ED2207E11B22A85F2DD07E9242C253050414BD127571FF724FAA189852
8,187,988 UART: [art] SIG.S = E233A68FF4EF8C5F100D1CCFAA16570966E5A8F942516A197F0979C8F76D0E853A97672B5A2F099B87DC5286481D8587
8,211,943 UART: mbox::rt_entry...
8,212,315 UART: ____ _ _ _ ____ _____
8,213,099 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,213,899 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,214,667 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,215,435 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,216,203 UART: |_|
8,216,515 UART:
8,578,588 UART: [rt] Runtime listening for mailbox commands...
8,579,641 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,787 UART: [state] LifecycleState = Unprovisioned
86,442 UART: [state] DebugLocked = No
86,972 UART: [state] WD Timer not started. Device not locked for debugging
88,269 UART: [kat] SHA2-256
893,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,044 UART: [kat] ++
898,196 UART: [kat] sha1
902,572 UART: [kat] SHA2-256
904,512 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
918,689 UART: [kat] HMAC-384Kdf
923,331 UART: [kat] LMS
1,171,659 UART: [kat] --
1,172,522 UART: [cold-reset] ++
1,172,974 UART: [fht] FHT @ 0x50003400
1,175,679 UART: [idev] ++
1,175,847 UART: [idev] CDI.KEYID = 6
1,176,207 UART: [idev] SUBJECT.KEYID = 7
1,176,631 UART: [idev] UDS.KEYID = 0
1,176,976 ready_for_fw is high
1,176,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,987 UART: [idev] Erasing UDS.KEYID = 0
1,202,158 UART: [idev] Sha1 KeyId Algorithm
1,210,526 UART: [idev] --
1,211,712 UART: [ldev] ++
1,211,880 UART: [ldev] CDI.KEYID = 6
1,212,243 UART: [ldev] SUBJECT.KEYID = 5
1,212,669 UART: [ldev] AUTHORITY.KEYID = 7
1,213,132 UART: [ldev] FE.KEYID = 1
1,218,410 UART: [ldev] Erasing FE.KEYID = 1
1,244,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,777 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,489 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,608 UART: [ldev] --
1,284,121 UART: [fwproc] Wait for Commands...
1,284,793 UART: [fwproc] Recv command 0x46574c44
1,285,521 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,090 >>> mbox cmd response: success
2,829,334 UART: [afmc] ++
2,829,502 UART: [afmc] CDI.KEYID = 6
2,829,864 UART: [afmc] SUBJECT.KEYID = 7
2,830,289 UART: [afmc] AUTHORITY.KEYID = 5
2,865,588 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,882,297 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,045 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,754 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,637 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,900,338 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,908,350 UART: [afmc] --
2,909,354 UART: [cold-reset] --
2,910,080 UART: [state] Locking Datavault
2,911,211 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,815 UART: [state] Locking ICCM
2,912,411 UART: [exit] Launching FMC @ 0x40000130
2,917,741 UART:
2,917,757 UART: Running Caliptra FMC ...
2,918,165 UART:
2,918,308 UART: [state] CFI Enabled
2,928,568 UART: [fht] FMC Alias Private Key: 7
3,047,406 UART: [art] Extend RT PCRs Done
3,047,834 UART: [art] Lock RT PCRs Done
3,049,478 UART: [art] Populate DV Done
3,057,689 UART: [fht] FMC Alias Private Key: 7
3,058,665 UART: [art] Derive CDI
3,058,945 UART: [art] Store in slot 0x4
3,144,580 UART: [art] Derive Key Pair
3,144,940 UART: [art] Store priv key in slot 0x5
3,157,778 UART: [art] Derive Key Pair - Done
3,172,361 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,788 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,553 UART: [art] PUB.X = DF57DB60F172E01CAC3EC4CE1B38321ECF5C02C82A5EB3C0888A2C66B5B446E44F2F28ABA72E5705D95A8F146473ABF4
3,195,335 UART: [art] PUB.Y = D880F17DD769337E715DFF90170F65C037CDE2FBF5A42D5C1362139E2A0BF25AF55A227938284A58C8DD8447DB979272
3,202,281 UART: [art] SIG.R = 8ED035CB30F5438CAA25F123C28BED8BC5297AE3A141C79E23BEE5AD547FCC7FC0BC6F3754A864BF6D7BA40460234539
3,209,064 UART: [art] SIG.S = 6D0AAF713C32A4167577BA4C858C01D4FB9F8AC43CBFBC5D391806413DBD6C82873B50D05C9D16981341FD2775D66469
3,232,815 UART: Caliptra RT
3,233,158 UART: [state] CFI Enabled
3,352,885 UART: [rt] RT listening for mailbox commands...
3,353,555 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,493 UART: [rt]cmd =0x50435252, len=8
3,384,831 >>> mbox cmd response data (8 bytes)
3,384,832 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,735 UART:
3,385,751 UART: Running Caliptra ROM ...
3,386,159 UART:
3,386,301 UART: [state] CFI Enabled
3,389,279 UART: [state] LifecycleState = Unprovisioned
3,389,934 UART: [state] DebugLocked = No
3,390,472 UART: [state] WD Timer not started. Device not locked for debugging
3,391,744 UART: [kat] SHA2-256
4,197,394 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,201,519 UART: [kat] ++
4,201,671 UART: [kat] sha1
4,205,967 UART: [kat] SHA2-256
4,207,907 UART: [kat] SHA2-384
4,210,680 UART: [kat] SHA2-512-ACC
4,212,580 UART: [kat] ECC-384
4,222,135 UART: [kat] HMAC-384Kdf
4,226,659 UART: [kat] LMS
4,474,987 UART: [kat] --
4,475,825 UART: [update-reset] ++
5,426,006 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,427,203 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,528,844 >>> mbox cmd response: success
5,528,844 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,529,029 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,043 UART: [update-reset Success] --
5,537,958 UART: [state] Locking Datavault
5,538,868 UART: [state] Locking PCR0, PCR1 and PCR31
5,539,472 UART: [state] Locking ICCM
5,540,080 UART: [exit] Launching FMC @ 0x40000130
5,545,410 UART:
5,545,426 UART: Running Caliptra FMC ...
5,545,834 UART:
5,545,977 UART: [state] CFI Enabled
5,635,664 UART: [art] Extend RT PCRs Done
5,636,092 UART: [art] Lock RT PCRs Done
5,637,395 UART: [art] Populate DV Done
5,645,442 UART: [fht] FMC Alias Private Key: 7
5,646,584 UART: [art] Derive CDI
5,646,864 UART: [art] Store in slot 0x4
5,732,921 UART: [art] Derive Key Pair
5,733,281 UART: [art] Store priv key in slot 0x5
5,746,833 UART: [art] Derive Key Pair - Done
5,761,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,950 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,715 UART: [art] PUB.X = 1C4C3D8884932974BC8CC1B465B98730626D719C7152417052BC0A6938D67CD8644BE75E26DD9A9141057417558CA016
5,784,467 UART: [art] PUB.Y = 80AE415D773ADC031CD92B2BCFD36739E6E5927312C8A6D373470F1EACD108F103275F85AED8910A30141702251A6507
5,791,394 UART: [art] SIG.R = 07A3A03B03688718AB37F90818AB40766A5143E50BB5FE4289ED43A0B4E6BCC1D19AD0023614530A09E42A1637335129
5,798,137 UART: [art] SIG.S = 120D9CC8C96CA39738C6E416D6E10925F2206EFB9E76B4029F70C89E831B829BCD5369ED1B580808CA46394756106A74
5,821,590 UART: mbox::rt_entry...
5,821,962 UART: ____ _ _ _ ____ _____
5,822,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,823,546 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,314 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,082 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,825,850 UART: |_|
5,826,162 UART:
6,188,651 UART: [rt] Runtime listening for mailbox commands...
6,189,704 >>> mbox cmd response data (128 bytes)
6,189,705 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,189,816 UART:
6,189,832 UART: Running Caliptra ROM ...
6,190,240 UART:
6,190,382 UART: [state] CFI Enabled
6,193,298 UART: [state] LifecycleState = Unprovisioned
6,193,953 UART: [state] DebugLocked = No
6,194,477 UART: [state] WD Timer not started. Device not locked for debugging
6,195,803 UART: [kat] SHA2-256
7,001,453 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,005,578 UART: [kat] ++
7,005,730 UART: [kat] sha1
7,010,032 UART: [kat] SHA2-256
7,011,972 UART: [kat] SHA2-384
7,014,729 UART: [kat] SHA2-512-ACC
7,016,629 UART: [kat] ECC-384
7,026,358 UART: [kat] HMAC-384Kdf
7,030,858 UART: [kat] LMS
7,279,186 UART: [kat] --
7,280,068 UART: [update-reset] ++
8,230,225 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,231,208 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,332,849 >>> mbox cmd response: success
8,332,849 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
8,333,174 UART: [update-reset] Copying MAN_2 To MAN_1
8,341,188 UART: [update-reset Success] --
8,341,999 UART: [state] Locking Datavault
8,342,629 UART: [state] Locking PCR0, PCR1 and PCR31
8,343,233 UART: [state] Locking ICCM
8,343,805 UART: [exit] Launching FMC @ 0x40000130
8,349,135 UART:
8,349,151 UART: Running Caliptra FMC ...
8,349,559 UART:
8,349,702 UART: [state] CFI Enabled
8,439,107 UART: [art] Extend RT PCRs Done
8,439,535 UART: [art] Lock RT PCRs Done
8,440,728 UART: [art] Populate DV Done
8,448,819 UART: [fht] FMC Alias Private Key: 7
8,449,837 UART: [art] Derive CDI
8,450,117 UART: [art] Store in slot 0x4
8,536,164 UART: [art] Derive Key Pair
8,536,524 UART: [art] Store priv key in slot 0x5
8,549,420 UART: [art] Derive Key Pair - Done
8,564,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,579,601 UART: [art] Erasing AUTHORITY.KEYID = 7
8,580,366 UART: [art] PUB.X = 7B8F43D39C522ABFB5D269C25FE26BCBF80F062AAA807EA3BFE3C689F5708F12F90B6E30C0BD09A8B2453D679DE035CF
8,587,144 UART: [art] PUB.Y = 29ADDB5D1F988F0AE32C43855B3B2E045ACC58F2E416E307BA98D450805BE8F060F890406405FAA319C350A60B456B43
8,594,083 UART: [art] SIG.R = 68A98A4C82150A5E93CE76BB168DB0F240D5C0B7749F5A92AE6833D668DC45DCCD5486D7DC73EC732C178252BFC991A3
8,600,860 UART: [art] SIG.S = E5DE13BDD7EC8736254230B027C368A29BC91F1D086CF7F3FD5368FC15B5988701FFA7A6BEDA0546AAB7B350AA19C4DB
8,624,693 UART: mbox::rt_entry...
8,625,065 UART: ____ _ _ _ ____ _____
8,625,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,626,649 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,627,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,628,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,628,953 UART: |_|
8,629,265 UART:
8,996,063 UART: [rt] Runtime listening for mailbox commands...
8,997,116 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,404 ready_for_fw is high
1,060,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,483 >>> mbox cmd response: success
2,741,870 UART:
2,741,886 UART: Running Caliptra FMC ...
2,742,294 UART:
2,742,437 UART: [state] CFI Enabled
2,752,933 UART: [fht] FMC Alias Private Key: 7
2,872,237 UART: [art] Extend RT PCRs Done
2,872,665 UART: [art] Lock RT PCRs Done
2,874,225 UART: [art] Populate DV Done
2,882,336 UART: [fht] FMC Alias Private Key: 7
2,883,506 UART: [art] Derive CDI
2,883,786 UART: [art] Store in slot 0x4
2,969,551 UART: [art] Derive Key Pair
2,969,911 UART: [art] Store priv key in slot 0x5
2,982,913 UART: [art] Derive Key Pair - Done
2,997,539 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,425 UART: [art] PUB.X = EBA5CCB054C7A04F081BC4CA5069F5C66EDDFD539A6017A6E43E70179BD804072076C1DB4403B835003F790998E88296
3,020,160 UART: [art] PUB.Y = E99337D0491891D58860A5D42A0A2578170077B1FB45709B452FDC2E6E209301D68932008731629870D36FD25F4ADD24
3,027,046 UART: [art] SIG.R = 74AB2DE9716EB7780A1D50CBC9794ADE0EC1052650A365DE6816E018F40AB1706C25B82454C915641659DC57E9C907DE
3,033,803 UART: [art] SIG.S = B8CDECCBF59AF38A9BA0B24AD789B5293722782076F564CA15350A1C8BFE8BC2D15CFA738672139E6BAA3D39954A566D
3,057,418 UART: Caliptra RT
3,057,761 UART: [state] CFI Enabled
3,177,306 UART: [rt] RT listening for mailbox commands...
3,177,976 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,112 UART: [rt]cmd =0x50435252, len=8
3,209,598 >>> mbox cmd response data (8 bytes)
3,209,599 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,760 >>> mbox cmd response: success
5,237,760 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
5,251,271 UART:
5,251,287 UART: Running Caliptra FMC ...
5,251,695 UART:
5,251,838 UART: [state] CFI Enabled
5,340,777 UART: [art] Extend RT PCRs Done
5,341,205 UART: [art] Lock RT PCRs Done
5,342,258 UART: [art] Populate DV Done
5,350,325 UART: [fht] FMC Alias Private Key: 7
5,351,335 UART: [art] Derive CDI
5,351,615 UART: [art] Store in slot 0x4
5,437,648 UART: [art] Derive Key Pair
5,438,008 UART: [art] Store priv key in slot 0x5
5,451,096 UART: [art] Derive Key Pair - Done
5,466,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,616 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,381 UART: [art] PUB.X = 6142D07E7A68736F7D342B65A7BD62018035ECA91B7975DE86EE181E5E0CE6534FA0E44633A9F9282E8418188D47AC6E
5,489,145 UART: [art] PUB.Y = 09C1A8620E82D81CA6A3F643E588CE65D4ECE029AE2A3D856740425DAB4F7B6627580DE2DBA836DC3B82FF73D6BE8741
5,496,098 UART: [art] SIG.R = 785FD6982842F17EDE873DBADD2570FB8EEEE6857A66898447D072F0285FE3A7D90D346E84AA6829D35956E199BC6A0E
5,502,868 UART: [art] SIG.S = AB9CE8860769E054C57C23E052728B5F05ABADD628463C0230B7FF8B8ACC670710844BCC92000782AE48A630569AA91A
5,526,549 UART: mbox::rt_entry...
5,526,921 UART: ____ _ _ _ ____ _____
5,527,705 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,528,505 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,529,273 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,041 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,530,809 UART: |_|
5,531,121 UART:
5,897,651 UART: [rt] Runtime listening for mailbox commands...
5,898,704 >>> mbox cmd response data (128 bytes)
5,898,705 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,927,186 >>> mbox cmd response: success
7,927,186 <<< Executing mbox cmd 0xc0000000 (0 bytes) from SoC
7,940,665 UART:
7,940,681 UART: Running Caliptra FMC ...
7,941,089 UART:
7,941,232 UART: [state] CFI Enabled
8,030,473 UART: [art] Extend RT PCRs Done
8,030,901 UART: [art] Lock RT PCRs Done
8,032,330 UART: [art] Populate DV Done
8,040,751 UART: [fht] FMC Alias Private Key: 7
8,041,867 UART: [art] Derive CDI
8,042,147 UART: [art] Store in slot 0x4
8,128,154 UART: [art] Derive Key Pair
8,128,514 UART: [art] Store priv key in slot 0x5
8,141,976 UART: [art] Derive Key Pair - Done
8,156,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,172,366 UART: [art] Erasing AUTHORITY.KEYID = 7
8,173,131 UART: [art] PUB.X = C98EDC2CBD96B9FF0394F7A4C5B4372162C53436B6718CDF0E15007331018979D91C3313D777B8E13F0D5E720158A3F7
8,179,862 UART: [art] PUB.Y = 7073E433F4E9F726097DA469033C49F992A5A3C609704FAD716D39E98AE0BAD43BD339E84D349652BB9B4620D1415956
8,186,799 UART: [art] SIG.R = 73C306BEEAFCF7A472E636511EF17CDFD0C273F7048B30EEA9D86C907086310571C9F767AC62613310B9569EF5755982
8,193,560 UART: [art] SIG.S = 67ACAA8AD017BCAE6578DC7458FC9CD7235D6370CC3E055580AD422F495288FBF127B683E5FC1E2C59C041FECDD95E33
8,216,777 UART: mbox::rt_entry...
8,217,149 UART: ____ _ _ _ ____ _____
8,217,933 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,218,733 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,219,501 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,220,269 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,221,037 UART: |_|
8,221,349 UART:
8,585,932 UART: [rt] Runtime listening for mailbox commands...
8,586,985 >>> mbox cmd response data (128 bytes)
test test_update_reset::test_pcr_reset_counter_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
191,978 UART:
192,348 UART: Running Caliptra ROM ...
193,483 UART:
193,634 UART: [state] CFI Enabled
265,943 UART: [state] LifecycleState = Unprovisioned
267,852 UART: [state] DebugLocked = No
270,461 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,755 UART: [kat] SHA2-256
445,448 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,019 UART: [kat] ++
456,476 UART: [kat] sha1
468,557 UART: [kat] SHA2-256
471,216 UART: [kat] SHA2-384
476,845 UART: [kat] SHA2-512-ACC
479,212 UART: [kat] ECC-384
2,767,755 UART: [kat] HMAC-384Kdf
2,800,440 UART: [kat] LMS
3,990,736 UART: [kat] --
3,995,884 UART: [cold-reset] ++
3,997,529 UART: [fht] Storing FHT @ 0x50003400
4,009,006 UART: [idev] ++
4,009,582 UART: [idev] CDI.KEYID = 6
4,010,529 UART: [idev] SUBJECT.KEYID = 7
4,011,784 UART: [idev] UDS.KEYID = 0
4,012,858 ready_for_fw is high
4,013,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,247 UART: [idev] Erasing UDS.KEYID = 0
7,346,288 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,418 UART: [idev] --
7,372,117 UART: [ldev] ++
7,372,689 UART: [ldev] CDI.KEYID = 6
7,373,662 UART: [ldev] SUBJECT.KEYID = 5
7,374,878 UART: [ldev] AUTHORITY.KEYID = 7
7,376,111 UART: [ldev] FE.KEYID = 1
7,422,262 UART: [ldev] Erasing FE.KEYID = 1
10,759,306 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,655 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,587 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,414 UART: [ldev] --
13,135,919 UART: [fwproc] Waiting for Commands...
13,138,604 UART: [fwproc] Received command 0x46574c44
13,140,787 UART: [fwproc] Received Image of size 118548 bytes
17,246,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,962 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,718,920 >>> mbox cmd response: success
17,723,602 UART: [afmc] ++
17,724,233 UART: [afmc] CDI.KEYID = 6
17,725,152 UART: [afmc] SUBJECT.KEYID = 7
17,726,368 UART: [afmc] AUTHORITY.KEYID = 5
21,088,096 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,391,340 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,393,622 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,408,054 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,422,798 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,437,195 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,458,332 UART: [afmc] --
23,461,920 UART: [cold-reset] --
23,464,860 UART: [state] Locking Datavault
23,470,051 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,812 UART: [state] Locking ICCM
23,473,342 UART: [exit] Launching FMC @ 0x40000130
23,481,746 UART:
23,482,022 UART: Running Caliptra FMC ...
23,483,057 UART:
23,483,207 UART: [state] CFI Enabled
23,551,516 UART: [fht] FMC Alias Private Key: 7
25,891,959 UART: [art] Extend RT PCRs Done
25,893,201 UART: [art] Lock RT PCRs Done
25,894,959 UART: [art] Populate DV Done
25,900,418 UART: [fht] FMC Alias Private Key: 7
25,901,952 UART: [art] Derive CDI
25,902,689 UART: [art] Store in slot 0x4
25,960,260 UART: [art] Derive Key Pair
25,961,455 UART: [art] Store priv key in slot 0x5
29,253,804 UART: [art] Derive Key Pair - Done
29,266,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,153 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,674 UART: [art] PUB.X = 8E5A2BFF4AD47E9285D753B654DC59DB9504F902BE86B2446300565E93AC2DA4759145EB692E8590E8BA2B6733DD8C13
31,563,894 UART: [art] PUB.Y = 70D56AD20E371D3C6AA736D5F5342249BE9CFD0AE36C01166E92DFD4E84E3D5D19440B115B2BF3C68A438DCD1058BDE5
31,571,193 UART: [art] SIG.R = 70812CE2CFFBA193549F62ED44A77721CDE2518C426C7E561B092A42408399D2D7721D50EFD364FC565C47B6395A8DE0
31,578,528 UART: [art] SIG.S = 2C602A837FA1F68D2BC804DE97F60EB6746F2EE8CC1C18CC8283B1C1878873C98118A5A50EC177468B42562D32048B38
32,883,827 UART: Caliptra RT
32,884,532 UART: [state] CFI Enabled
33,080,944 UART: [rt] RT listening for mailbox commands...
35,157,288 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,263,450 UART:
35,263,816 UART: Running Caliptra ROM ...
35,264,952 UART:
35,265,129 UART: [state] CFI Enabled
35,330,017 UART: [state] LifecycleState = Unprovisioned
35,331,972 UART: [state] DebugLocked = No
35,334,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,339,050 UART: [kat] SHA2-256
35,508,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,519,227 UART: [kat] ++
35,519,736 UART: [kat] sha1
35,530,352 UART: [kat] SHA2-256
35,533,054 UART: [kat] SHA2-384
35,539,096 UART: [kat] SHA2-512-ACC
35,541,448 UART: [kat] ECC-384
37,831,399 UART: [kat] HMAC-384Kdf
37,863,127 UART: [kat] LMS
39,053,459 UART: [kat] --
39,058,045 UART: [update-reset] ++
42,815,752 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,819,721 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,092,500 >>> mbox cmd response: success
43,092,875 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,093,169 UART: [update-reset] Copying MAN_2 To MAN_1
43,115,407 UART: [update-reset Success] --
43,118,783 UART: [state] Locking Datavault
43,122,062 UART: [state] Locking PCR0, PCR1 and PCR31
43,123,781 UART: [state] Locking ICCM
43,124,851 UART: [exit] Launching FMC @ 0x40000130
43,133,306 UART:
43,133,545 UART: Running Caliptra FMC ...
43,134,645 UART:
43,134,805 UART: [state] CFI Enabled
43,230,678 UART: [art] Extend RT PCRs Done
43,231,865 UART: [art] Lock RT PCRs Done
43,233,322 UART: [art] Populate DV Done
43,239,157 UART: [fht] FMC Alias Private Key: 7
43,240,778 UART: [art] Derive CDI
43,241,550 UART: [art] Store in slot 0x4
43,299,680 UART: [art] Derive Key Pair
43,300,687 UART: [art] Store priv key in slot 0x5
46,593,157 UART: [art] Derive Key Pair - Done
46,606,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,895,550 UART: [art] Erasing AUTHORITY.KEYID = 7
48,897,057 UART: [art] PUB.X = 21BC2A1352D4C1C29292AC8C04EFE01329DC7C9237E0A6239A123BA4F3B3091421E65FE6298B5C79E369A5F99A72AD35
48,904,302 UART: [art] PUB.Y = 2D4166FEFF0E24AA5459B5655CA988BD3895F4E1747F41DED5C1ACFA949E5EE819FBA118D78268DB4143CCC3DDBBABE8
48,911,591 UART: [art] SIG.R = 649F597FCF4133B9E8593DA20A40E2D4574C8ECF8F84C9C03415430AD1F56606C0A256A9E1AB89224ED75C739C7E7F1D
48,918,976 UART: [art] SIG.S = 5B34212F822BA3853BD64948AF78C7E750F1C55B020FD272A4820A27D118F87265E558523392AB12624E4E4E1CD84553
50,223,585 UART: mbox::rt_entry...
50,224,550 UART: ____ _ _ _ ____ _____
50,226,482 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,228,492 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,230,348 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,232,280 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,234,163 UART: |_|
50,234,991 UART:
50,608,338 UART: [rt] Runtime listening for mailbox commands...
50,610,510 >>> mbox cmd response data (48 bytes)
50,611,094 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,611,532 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,783,896 ready_for_fw is high
3,784,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,953,369 >>> mbox cmd response: success
23,649,394 UART:
23,649,798 UART: Running Caliptra FMC ...
23,650,940 UART:
23,651,104 UART: [state] CFI Enabled
23,717,492 UART: [fht] FMC Alias Private Key: 7
26,057,701 UART: [art] Extend RT PCRs Done
26,058,931 UART: [art] Lock RT PCRs Done
26,060,721 UART: [art] Populate DV Done
26,066,465 UART: [fht] FMC Alias Private Key: 7
26,068,029 UART: [art] Derive CDI
26,069,067 UART: [art] Store in slot 0x4
26,125,591 UART: [art] Derive Key Pair
26,126,598 UART: [art] Store priv key in slot 0x5
29,419,495 UART: [art] Derive Key Pair - Done
29,432,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,243 UART: [art] Erasing AUTHORITY.KEYID = 7
31,721,753 UART: [art] PUB.X = 3936A276718AA49290F5DBE6E47126CE46BA176A4B45553E26D943FAC242FF5869A59EEA95FB887D25E10AC7C615FB23
31,729,002 UART: [art] PUB.Y = 30121471369F41A175A744055888BF63C7B075C3DC2702982CDD2DF06A468CFD258CAED2EBF8E208EB4A3B139739CF35
31,736,256 UART: [art] SIG.R = B6580BBC221A81233B0D05EAEEE4C594BB856880541DB1AD10DE08502024352EF9938D2D6A8216262B066A773DAC6BDA
31,743,653 UART: [art] SIG.S = 7683280C4749CEC4749E42E2D245230E00C60577C9387F3D8ABA4A2BDA595796CCE82E59C1F36F90804A64E56B5A1A8C
33,048,899 UART: Caliptra RT
33,049,604 UART: [state] CFI Enabled
33,226,171 UART: [rt] RT listening for mailbox commands...
35,292,897 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,362,927 >>> mbox cmd response: success
43,363,460 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,395,896 UART:
43,396,180 UART: Running Caliptra FMC ...
43,397,296 UART:
43,397,453 UART: [state] CFI Enabled
43,502,968 UART: [art] Extend RT PCRs Done
43,504,159 UART: [art] Lock RT PCRs Done
43,505,565 UART: [art] Populate DV Done
43,511,231 UART: [fht] FMC Alias Private Key: 7
43,512,996 UART: [art] Derive CDI
43,513,825 UART: [art] Store in slot 0x4
43,571,651 UART: [art] Derive Key Pair
43,572,673 UART: [art] Store priv key in slot 0x5
46,864,927 UART: [art] Derive Key Pair - Done
46,877,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,165,566 UART: [art] Erasing AUTHORITY.KEYID = 7
49,167,074 UART: [art] PUB.X = 1167BA73BA73C30E2303CF65F7C7D39087D600A5B2D147036C11311B41743165943EB6BB0C1CAF8F41355EB7ED7D868B
49,174,278 UART: [art] PUB.Y = 05E7D757B3210B0E0BA616B39BF29A52BBB6CB617C18E618E2A930B5EBEBBA2B04401661F64C9843816FD5C817F8E197
49,181,567 UART: [art] SIG.R = 6D3143AB4F4775137BE686A4E6407A571A73719E3A74EE94785193B52903D41F0A945E160782DE05F52030236CA3345B
49,189,043 UART: [art] SIG.S = 61227C53F37C4FCFDC99043847EE08D19311146A6E03AFCCBF6300FB7D5B7D629AB38F0E61452EA7B233959BECF63EC9
50,494,172 UART: mbox::rt_entry...
50,495,140 UART: ____ _ _ _ ____ _____
50,497,124 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,499,127 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,501,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,503,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,504,938 UART: |_|
50,505,748 UART:
50,876,845 UART: [rt] Runtime listening for mailbox commands...
50,879,019 >>> mbox cmd response data (48 bytes)
50,879,598 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,880,025 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.66s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,144 writing to cptra_bootfsm_go
192,394 UART:
192,749 UART: Running Caliptra ROM ...
193,923 UART:
603,586 UART: [state] CFI Enabled
616,507 UART: [state] LifecycleState = Unprovisioned
618,454 UART: [state] DebugLocked = No
619,899 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,613 UART: [kat] SHA2-256
794,403 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,906 UART: [kat] ++
805,352 UART: [kat] sha1
815,653 UART: [kat] SHA2-256
818,374 UART: [kat] SHA2-384
825,065 UART: [kat] SHA2-512-ACC
827,500 UART: [kat] ECC-384
3,112,447 UART: [kat] HMAC-384Kdf
3,123,907 UART: [kat] LMS
4,313,992 UART: [kat] --
4,318,308 UART: [cold-reset] ++
4,320,687 UART: [fht] Storing FHT @ 0x50003400
4,331,617 UART: [idev] ++
4,332,173 UART: [idev] CDI.KEYID = 6
4,333,119 UART: [idev] SUBJECT.KEYID = 7
4,334,352 UART: [idev] UDS.KEYID = 0
4,335,330 ready_for_fw is high
4,335,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,449 UART: [idev] Erasing UDS.KEYID = 0
7,627,899 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,194 UART: [idev] --
7,654,350 UART: [ldev] ++
7,654,916 UART: [ldev] CDI.KEYID = 6
7,655,879 UART: [ldev] SUBJECT.KEYID = 5
7,657,081 UART: [ldev] AUTHORITY.KEYID = 7
7,658,367 UART: [ldev] FE.KEYID = 1
7,666,471 UART: [ldev] Erasing FE.KEYID = 1
10,956,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,227 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,200 UART: [ldev] --
13,313,326 UART: [fwproc] Waiting for Commands...
13,315,583 UART: [fwproc] Received command 0x46574c44
13,317,762 UART: [fwproc] Received Image of size 118548 bytes
17,429,001 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,630 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,899,545 >>> mbox cmd response: success
17,904,209 UART: [afmc] ++
17,904,829 UART: [afmc] CDI.KEYID = 6
17,905,740 UART: [afmc] SUBJECT.KEYID = 7
17,907,013 UART: [afmc] AUTHORITY.KEYID = 5
21,223,582 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,777 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,532,189 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,916 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,300 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,959 UART: [afmc] --
23,588,142 UART: [cold-reset] --
23,593,407 UART: [state] Locking Datavault
23,598,633 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,416 UART: [state] Locking ICCM
23,601,870 UART: [exit] Launching FMC @ 0x40000130
23,610,262 UART:
23,610,498 UART: Running Caliptra FMC ...
23,611,597 UART:
23,611,751 UART: [state] CFI Enabled
23,619,538 UART: [fht] FMC Alias Private Key: 7
25,960,252 UART: [art] Extend RT PCRs Done
25,961,478 UART: [art] Lock RT PCRs Done
25,962,936 UART: [art] Populate DV Done
25,968,079 UART: [fht] FMC Alias Private Key: 7
25,969,722 UART: [art] Derive CDI
25,970,530 UART: [art] Store in slot 0x4
26,013,295 UART: [art] Derive Key Pair
26,014,335 UART: [art] Store priv key in slot 0x5
29,256,425 UART: [art] Derive Key Pair - Done
29,269,203 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,772 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,271 UART: [art] PUB.X = 86621A37CD63E1124E194151F5953725B831C7569FA0D45344D9D3A20E274B2CE57111365742B63963267982C3EE2A87
31,558,457 UART: [art] PUB.Y = CF7657EDC569E1B891D89249C85D9C0AA5DD7DE16B67D67931C2F5692E81F8451DF489323DE97D79745623A240598250
31,565,729 UART: [art] SIG.R = 7E1A72CE2BAE6DA30ADCFDE0FB6B387DF0605B1BD623CE7F8995F1FD728DAA9B294FC8F9C4350385F4130BDE682F8311
31,573,164 UART: [art] SIG.S = 38443E125397AB56CE46060550A25ECC35F47D5EB36574AB112BBDE4471EDAD81A60D27A971486E730FFEA7300FBBDBF
32,878,430 UART: Caliptra RT
32,879,158 UART: [state] CFI Enabled
33,012,370 UART: [rt] RT listening for mailbox commands...
35,078,363 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,184,271 UART:
35,184,604 UART: Running Caliptra ROM ...
35,185,696 UART:
35,185,908 UART: [state] CFI Enabled
35,203,185 UART: [state] LifecycleState = Unprovisioned
35,205,111 UART: [state] DebugLocked = No
35,207,604 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,211,912 UART: [kat] SHA2-256
35,381,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,392,175 UART: [kat] ++
35,392,643 UART: [kat] sha1
35,404,169 UART: [kat] SHA2-256
35,406,861 UART: [kat] SHA2-384
35,411,817 UART: [kat] SHA2-512-ACC
35,414,162 UART: [kat] ECC-384
37,695,887 UART: [kat] HMAC-384Kdf
37,707,309 UART: [kat] LMS
38,897,372 UART: [kat] --
38,901,001 UART: [update-reset] ++
42,656,051 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,659,891 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,932,691 >>> mbox cmd response: success
42,933,064 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
42,933,349 UART: [update-reset] Copying MAN_2 To MAN_1
42,955,709 UART: [update-reset Success] --
42,960,113 UART: [state] Locking Datavault
42,961,642 UART: [state] Locking PCR0, PCR1 and PCR31
42,963,449 UART: [state] Locking ICCM
42,964,816 UART: [exit] Launching FMC @ 0x40000130
42,973,252 UART:
42,973,479 UART: Running Caliptra FMC ...
42,974,501 UART:
42,974,647 UART: [state] CFI Enabled
43,019,242 UART: [art] Extend RT PCRs Done
43,020,383 UART: [art] Lock RT PCRs Done
43,021,609 UART: [art] Populate DV Done
43,027,171 UART: [fht] FMC Alias Private Key: 7
43,028,709 UART: [art] Derive CDI
43,029,518 UART: [art] Store in slot 0x4
43,072,012 UART: [art] Derive Key Pair
43,073,080 UART: [art] Store priv key in slot 0x5
46,315,091 UART: [art] Derive Key Pair - Done
46,328,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,609,166 UART: [art] Erasing AUTHORITY.KEYID = 7
48,610,667 UART: [art] PUB.X = 8B329193A7634EFDDD20BDA19880CD93C1EB2F07299453C1636D48D81ED1941CABC5394253874B1A54B3F6243A3929EB
48,617,910 UART: [art] PUB.Y = 11D96F7F71038D10E6BFBD73A40B83509D472AA9E7D6FC6929CF6F69E9E83FB0FD6713F8825147666AE6E8EFC57CB5C2
48,625,181 UART: [art] SIG.R = 983B33D738C5F23936CB3BCE822C201A768EF88904E30C804BE9E3E3F454834C3B0B531D968B45ED105A0C5A454A0A0D
48,632,562 UART: [art] SIG.S = DCC115B86C8EC54D7B680ED2ED1A102C4D7C15A36D36FA2694DA23128B52D4312F1530E689E8BA747E6752B5CCABCFEC
49,937,259 UART: mbox::rt_entry...
49,938,230 UART: ____ _ _ _ ____ _____
49,940,207 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,942,130 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,944,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,945,988 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
49,947,913 UART: |_|
49,948,722 UART:
50,321,967 UART: [rt] Runtime listening for mailbox commands...
50,324,141 >>> mbox cmd response data (48 bytes)
50,324,701 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,325,124 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,149 writing to cptra_bootfsm_go
4,129,641 ready_for_fw is high
4,130,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,168,936 >>> mbox cmd response: success
23,805,076 UART:
23,805,556 UART: Running Caliptra FMC ...
23,806,667 UART:
23,806,827 UART: [state] CFI Enabled
23,814,984 UART: [fht] FMC Alias Private Key: 7
26,155,392 UART: [art] Extend RT PCRs Done
26,156,627 UART: [art] Lock RT PCRs Done
26,158,014 UART: [art] Populate DV Done
26,163,448 UART: [fht] FMC Alias Private Key: 7
26,164,943 UART: [art] Derive CDI
26,165,706 UART: [art] Store in slot 0x4
26,208,298 UART: [art] Derive Key Pair
26,209,345 UART: [art] Store priv key in slot 0x5
29,450,844 UART: [art] Derive Key Pair - Done
29,463,705 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,920 UART: [art] Erasing AUTHORITY.KEYID = 7
31,745,437 UART: [art] PUB.X = 85989879F5065773AE87E4DA561D6F56FA197326BE022ABEBAB76CDB3C94C6A1F20E3132C3B5FF63EAA4F75707A6FCCB
31,752,686 UART: [art] PUB.Y = ABB617E4809C8DAB9E575DC0A80323F76EB4C596F20B8D1EB895265A2CB85923E8EAA744AC2CBF8AF3D3879BCDD7BD84
31,759,996 UART: [art] SIG.R = 411FB5B32A55805988243287A4A6C3C1EA9A1CFA2655AAF84F830B4A078FC7C6A2EED3874E9D3D482E02DBE976D7DC74
31,767,390 UART: [art] SIG.S = 625CF11A7887FCD6A35B20F5E589145F32D4E2D39F92590EA4581B788641FFD109E119D3188933876A9DD6773CC213BF
33,072,880 UART: Caliptra RT
33,073,580 UART: [state] CFI Enabled
33,206,141 UART: [rt] RT listening for mailbox commands...
35,274,527 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,251,748 >>> mbox cmd response: success
43,252,235 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
43,285,921 UART:
43,286,196 UART: Running Caliptra FMC ...
43,287,308 UART:
43,287,463 UART: [state] CFI Enabled
43,331,578 UART: [art] Extend RT PCRs Done
43,332,770 UART: [art] Lock RT PCRs Done
43,334,063 UART: [art] Populate DV Done
43,339,538 UART: [fht] FMC Alias Private Key: 7
43,341,065 UART: [art] Derive CDI
43,341,832 UART: [art] Store in slot 0x4
43,384,760 UART: [art] Derive Key Pair
43,385,811 UART: [art] Store priv key in slot 0x5
46,627,975 UART: [art] Derive Key Pair - Done
46,641,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,921,422 UART: [art] Erasing AUTHORITY.KEYID = 7
48,922,938 UART: [art] PUB.X = 8A47D0EF959ACEED4685B0FA7C134570CBD0D91B3535B8A30331E69BC8A183ED5A1DA7F307E55003A777AB4D032B3EE5
48,930,206 UART: [art] PUB.Y = 3390832A3ED77415F7988550B5E5AD31C2C6026F17C798BB51696870A717A596353E39CD0EF507107D90AFF1D8D39426
48,937,446 UART: [art] SIG.R = 04F2AAC4B3FA4FBD6F513C5F7B7AF144A2A7B655DA4E5AA74BFCF629D6FA7FDD6487055C267178497A58695C6C3BFA4B
48,944,831 UART: [art] SIG.S = 8EAA8524CDB130F684ED5242B6D2A4916095AC07C08A43AD589A02CB0A3F75205DE1A7A26D2CA01211619DC63C2E6547
50,249,673 UART: mbox::rt_entry...
50,250,644 UART: ____ _ _ _ ____ _____
50,252,639 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,254,642 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,256,572 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,258,500 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,260,350 UART: |_|
50,261,145 UART:
50,634,997 UART: [rt] Runtime listening for mailbox commands...
50,637,200 >>> mbox cmd response data (48 bytes)
50,637,765 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
50,638,184 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
192,056 UART:
192,418 UART: Running Caliptra ROM ...
193,622 UART:
193,792 UART: [state] CFI Enabled
264,997 UART: [state] LifecycleState = Unprovisioned
266,858 UART: [state] DebugLocked = No
268,559 UART: [state] WD Timer not started. Device not locked for debugging
272,833 UART: [kat] SHA2-256
452,473 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,276 UART: [kat] ++
463,766 UART: [kat] sha1
475,629 UART: [kat] SHA2-256
478,288 UART: [kat] SHA2-384
484,368 UART: [kat] SHA2-512-ACC
486,735 UART: [kat] ECC-384
2,947,688 UART: [kat] HMAC-384Kdf
2,972,169 UART: [kat] LMS
3,448,654 UART: [kat] --
3,454,143 UART: [cold-reset] ++
3,456,503 UART: [fht] FHT @ 0x50003400
3,467,902 UART: [idev] ++
3,468,666 UART: [idev] CDI.KEYID = 6
3,469,589 UART: [idev] SUBJECT.KEYID = 7
3,470,721 UART: [idev] UDS.KEYID = 0
3,471,643 ready_for_fw is high
3,471,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,844 UART: [idev] Erasing UDS.KEYID = 0
5,987,360 UART: [idev] Sha1 KeyId Algorithm
6,010,798 UART: [idev] --
6,015,407 UART: [ldev] ++
6,015,983 UART: [ldev] CDI.KEYID = 6
6,016,951 UART: [ldev] SUBJECT.KEYID = 5
6,018,109 UART: [ldev] AUTHORITY.KEYID = 7
6,019,394 UART: [ldev] FE.KEYID = 1
6,057,740 UART: [ldev] Erasing FE.KEYID = 1
8,566,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,071 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,676 UART: [ldev] --
10,375,003 UART: [fwproc] Wait for Commands...
10,377,049 UART: [fwproc] Recv command 0x46574c44
10,379,031 UART: [fwproc] Recv'd Img size: 118548 bytes
13,867,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,946,166 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,019,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,346,824 >>> mbox cmd response: success
14,350,587 UART: [afmc] ++
14,351,221 UART: [afmc] CDI.KEYID = 6
14,352,116 UART: [afmc] SUBJECT.KEYID = 7
14,353,335 UART: [afmc] AUTHORITY.KEYID = 5
16,894,870 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,596 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,800 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,592 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,683 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,284 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,901 UART: [afmc] --
18,698,136 UART: [cold-reset] --
18,702,106 UART: [state] Locking Datavault
18,707,749 UART: [state] Locking PCR0, PCR1 and PCR31
18,709,449 UART: [state] Locking ICCM
18,711,485 UART: [exit] Launching FMC @ 0x40000130
18,719,933 UART:
18,720,175 UART: Running Caliptra FMC ...
18,721,275 UART:
18,721,430 UART: [state] CFI Enabled
18,774,268 UART: [fht] FMC Alias Private Key: 7
20,540,794 UART: [art] Extend RT PCRs Done
20,542,019 UART: [art] Lock RT PCRs Done
20,543,837 UART: [art] Populate DV Done
20,549,084 UART: [fht] FMC Alias Private Key: 7
20,550,621 UART: [art] Derive CDI
20,551,349 UART: [art] Store in slot 0x4
20,606,492 UART: [art] Derive Key Pair
20,607,534 UART: [art] Store priv key in slot 0x5
23,070,691 UART: [art] Derive Key Pair - Done
23,083,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,796,360 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,866 UART: [art] PUB.X = B0D87B129655EAB99F6A343436E58D9C8B25E45BF5409625D2953AF66F2C6EA104973C13927086126DFB3BED410037B5
24,805,124 UART: [art] PUB.Y = 4C48E25B7FABB92EF8EBBB1A85EC89375E9B015C40D438727DA6B8FA5AF314640574BFE9DEAB49F6E8521CC265546D92
24,812,354 UART: [art] SIG.R = 173810B13DFD3306094908999427ED18EC5A3BD759648C4C4F5B24F9338ABBF3667C103E4151366EAC84E969AB7F32B9
24,819,740 UART: [art] SIG.S = 517FC7C141CFDE8884951786FFCB615DB7D6294013B6BECBAB3981648E370A4B9CAEAB10E607E33DA033256E9A378627
25,798,911 UART: Caliptra RT
25,799,623 UART: [state] CFI Enabled
25,978,888 UART: [rt] RT listening for mailbox commands...
28,037,652 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,143,500 UART:
28,143,872 UART: Running Caliptra ROM ...
28,145,003 UART:
28,145,178 UART: [state] CFI Enabled
28,203,128 UART: [state] LifecycleState = Unprovisioned
28,205,073 UART: [state] DebugLocked = No
28,207,222 UART: [state] WD Timer not started. Device not locked for debugging
28,211,396 UART: [kat] SHA2-256
28,391,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,401,849 UART: [kat] ++
28,402,343 UART: [kat] sha1
28,413,931 UART: [kat] SHA2-256
28,416,623 UART: [kat] SHA2-384
28,422,818 UART: [kat] SHA2-512-ACC
28,425,159 UART: [kat] ECC-384
30,869,137 UART: [kat] HMAC-384Kdf
30,890,935 UART: [kat] LMS
31,367,397 UART: [kat] --
31,372,200 UART: [update-reset] ++
34,436,226 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,440,402 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,713,003 >>> mbox cmd response: success
34,713,416 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,713,718 UART: [update-reset] Copying MAN_2 To MAN_1
34,750,553 UART: [update-reset Success] --
34,754,674 UART: [state] Locking Datavault
34,759,228 UART: [state] Locking PCR0, PCR1 and PCR31
34,760,926 UART: [state] Locking ICCM
34,762,315 UART: [exit] Launching FMC @ 0x40000130
34,770,704 UART:
34,770,938 UART: Running Caliptra FMC ...
34,772,035 UART:
34,772,200 UART: [state] CFI Enabled
34,870,135 UART: [art] Extend RT PCRs Done
34,871,325 UART: [art] Lock RT PCRs Done
34,872,780 UART: [art] Populate DV Done
34,878,403 UART: [fht] FMC Alias Private Key: 7
34,880,149 UART: [art] Derive CDI
34,880,961 UART: [art] Store in slot 0x4
34,939,593 UART: [art] Derive Key Pair
34,940,662 UART: [art] Store priv key in slot 0x5
37,403,034 UART: [art] Derive Key Pair - Done
37,415,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,129,114 UART: [art] Erasing AUTHORITY.KEYID = 7
39,130,644 UART: [art] PUB.X = D17E52E244E5D08276251D936C27AA483E8B5F34EDF150339CC21A9C009A013562B8BEA3623C89864293F8D057924252
39,137,847 UART: [art] PUB.Y = 51059D07C97BE0A1447F948F394DCCF058C297F801624254E193C391F31DCF604C5DECA4B7E44499F7661842EFAA9506
39,145,084 UART: [art] SIG.R = EBE6528992BC9C9EEF5DEBF4A5F0000729F90F9047A0BCE7777D790DFF95BF9C2C406C5FD13B1AB13085C73587394A39
39,152,519 UART: [art] SIG.S = A32771BEBA6AD6BAEA9168844DF9E463A372C960B0D0F2DE25C86DC3C043D844DC1F15CD410CF062B05E5D5FC9D41DFE
40,130,881 UART: mbox::rt_entry...
40,131,856 UART: ____ _ _ _ ____ _____
40,133,781 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,135,789 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,137,719 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,139,646 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,141,569 UART: |_|
40,142,415 UART:
40,517,306 UART: [rt] Runtime listening for mailbox commands...
40,519,505 >>> mbox cmd response data (48 bytes)
40,520,099 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,520,542 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
3,460,108 ready_for_fw is high
3,460,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,221,810 >>> mbox cmd response: success
18,511,856 UART:
18,512,247 UART: Running Caliptra FMC ...
18,513,446 UART:
18,513,617 UART: [state] CFI Enabled
18,580,269 UART: [fht] FMC Alias Private Key: 7
20,346,611 UART: [art] Extend RT PCRs Done
20,347,843 UART: [art] Lock RT PCRs Done
20,349,582 UART: [art] Populate DV Done
20,354,872 UART: [fht] FMC Alias Private Key: 7
20,356,369 UART: [art] Derive CDI
20,357,140 UART: [art] Store in slot 0x4
20,413,048 UART: [art] Derive Key Pair
20,414,088 UART: [art] Store priv key in slot 0x5
22,877,271 UART: [art] Derive Key Pair - Done
22,890,405 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,519 UART: [art] PUB.X = 3B623E282D80CA3428A71EB079A8062DF27BD475B31F16FEBCAF707C75A353ADC7AF915931D6A9BB99DA612B452A146F
24,611,779 UART: [art] PUB.Y = 06F998DEAF8FFDE0D1F21D28762EDA4427EBCF1FC019843641987575B697EEF759CB4B76B6EE713C300A1AA4EBFC5D86
24,619,041 UART: [art] SIG.R = D2DAA29C48980F802266039F2325873F3B380D42975D4472E9CF1464CEB0D7A8350D45F920040EFCBBE434A4C9117F42
24,626,453 UART: [art] SIG.S = 066AB1DB23FC9CF009CB8951726BA0AB900780E8B6788D20E95BCE522FABB7B28D0CBD93B0287CCEF761236BC713501A
25,605,260 UART: Caliptra RT
25,605,973 UART: [state] CFI Enabled
25,785,901 UART: [rt] RT listening for mailbox commands...
27,840,560 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,520,569 >>> mbox cmd response: success
34,521,112 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,553,936 UART:
34,554,260 UART: Running Caliptra FMC ...
34,555,299 UART:
34,555,450 UART: [state] CFI Enabled
34,653,050 UART: [art] Extend RT PCRs Done
34,654,242 UART: [art] Lock RT PCRs Done
34,655,451 UART: [art] Populate DV Done
34,660,920 UART: [fht] FMC Alias Private Key: 7
34,662,594 UART: [art] Derive CDI
34,663,332 UART: [art] Store in slot 0x4
34,722,369 UART: [art] Derive Key Pair
34,723,420 UART: [art] Store priv key in slot 0x5
37,186,478 UART: [art] Derive Key Pair - Done
37,199,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,911,206 UART: [art] Erasing AUTHORITY.KEYID = 7
38,912,719 UART: [art] PUB.X = 388B8E73B92F8D8144AF627F7626E39F6085F13862EC62384F4D2BD0A55E0516FE546A99F88243B23066B2CE812EB506
38,919,979 UART: [art] PUB.Y = EC65BE69073AE8113A77B8537120389BF81099CD643A9C45B619CC0A3130C668D295D96C023FC7812F7CE162A93792E3
38,927,217 UART: [art] SIG.R = FA23DBA5BCEAAAFC72367187AF4CE2AE00146AC88E2B4A6E4A78F67CDA3275376E78BCC329EEC6623E769839281E86EF
38,934,649 UART: [art] SIG.S = 4577845B71402A98F7FD22453961FD59AE450E753E1356B68E2D7B5352974229AA413ADCE150FC2F92883F4778457C54
39,912,975 UART: mbox::rt_entry...
39,913,943 UART: ____ _ _ _ ____ _____
39,915,927 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,917,930 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,919,856 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,921,779 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,923,704 UART: |_|
39,924,708 UART:
40,298,329 UART: [rt] Runtime listening for mailbox commands...
40,300,501 >>> mbox cmd response data (48 bytes)
40,301,072 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,301,455 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,572 writing to cptra_bootfsm_go
192,810 UART:
193,152 UART: Running Caliptra ROM ...
194,345 UART:
603,946 UART: [state] CFI Enabled
615,747 UART: [state] LifecycleState = Unprovisioned
617,719 UART: [state] DebugLocked = No
620,237 UART: [state] WD Timer not started. Device not locked for debugging
623,844 UART: [kat] SHA2-256
803,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,242 UART: [kat] ++
814,718 UART: [kat] sha1
825,171 UART: [kat] SHA2-256
827,903 UART: [kat] SHA2-384
832,623 UART: [kat] SHA2-512-ACC
834,993 UART: [kat] ECC-384
3,275,010 UART: [kat] HMAC-384Kdf
3,286,023 UART: [kat] LMS
3,762,556 UART: [kat] --
3,767,350 UART: [cold-reset] ++
3,768,790 UART: [fht] FHT @ 0x50003400
3,779,083 UART: [idev] ++
3,779,661 UART: [idev] CDI.KEYID = 6
3,780,615 UART: [idev] SUBJECT.KEYID = 7
3,781,862 UART: [idev] UDS.KEYID = 0
3,782,836 ready_for_fw is high
3,783,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,931,986 UART: [idev] Erasing UDS.KEYID = 0
6,261,183 UART: [idev] Sha1 KeyId Algorithm
6,284,688 UART: [idev] --
6,288,849 UART: [ldev] ++
6,289,428 UART: [ldev] CDI.KEYID = 6
6,290,356 UART: [ldev] SUBJECT.KEYID = 5
6,291,575 UART: [ldev] AUTHORITY.KEYID = 7
6,292,815 UART: [ldev] FE.KEYID = 1
6,305,412 UART: [ldev] Erasing FE.KEYID = 1
8,783,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,427 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,985 UART: [ldev] --
10,579,094 UART: [fwproc] Wait for Commands...
10,580,708 UART: [fwproc] Recv command 0x46574c44
10,582,750 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,227 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,149,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,222,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,550,294 >>> mbox cmd response: success
14,554,666 UART: [afmc] ++
14,555,287 UART: [afmc] CDI.KEYID = 6
14,556,206 UART: [afmc] SUBJECT.KEYID = 7
14,557,432 UART: [afmc] AUTHORITY.KEYID = 5
17,060,498 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,373 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,556 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,471 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,522 UART: [afmc] --
18,861,078 UART: [cold-reset] --
18,864,629 UART: [state] Locking Datavault
18,870,964 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,667 UART: [state] Locking ICCM
18,874,388 UART: [exit] Launching FMC @ 0x40000130
18,882,788 UART:
18,883,024 UART: Running Caliptra FMC ...
18,884,132 UART:
18,884,296 UART: [state] CFI Enabled
18,892,639 UART: [fht] FMC Alias Private Key: 7
20,658,335 UART: [art] Extend RT PCRs Done
20,659,556 UART: [art] Lock RT PCRs Done
20,661,235 UART: [art] Populate DV Done
20,666,817 UART: [fht] FMC Alias Private Key: 7
20,668,519 UART: [art] Derive CDI
20,669,334 UART: [art] Store in slot 0x4
20,711,886 UART: [art] Derive Key Pair
20,712,926 UART: [art] Store priv key in slot 0x5
23,139,952 UART: [art] Derive Key Pair - Done
23,153,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,859,062 UART: [art] Erasing AUTHORITY.KEYID = 7
24,860,569 UART: [art] PUB.X = 2C06EA749B72E7E9B50DC598AE4A6D07064A592E1B444E2100F3F9542EB43447B2B76C926975AA411077CBBB14DFF3DA
24,867,812 UART: [art] PUB.Y = D77C5604A0A6D961E30182F0A831D385662AAA54E92E0BCA6550D4BC5685495FA7C209AEDD92A90823D325D7425D29CB
24,875,105 UART: [art] SIG.R = 467A9C409C22995C139C3F5776B4088DAC7730E5A0813DF5D154BFCFA22D71ED8CF7318F22F831FCFD0E591A4650AEDA
24,882,497 UART: [art] SIG.S = 7973B1E41E362208CD66F1C3D6A874298CFDB69E9CB63B5C4F63D6B5D68717866818E2D0E26E05C3CE712AC89DB227A5
25,861,175 UART: Caliptra RT
25,861,876 UART: [state] CFI Enabled
25,994,667 UART: [rt] RT listening for mailbox commands...
28,052,523 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,158,754 UART:
28,159,120 UART: Running Caliptra ROM ...
28,160,257 UART:
28,160,431 UART: [state] CFI Enabled
28,173,243 UART: [state] LifecycleState = Unprovisioned
28,175,150 UART: [state] DebugLocked = No
28,176,642 UART: [state] WD Timer not started. Device not locked for debugging
28,180,245 UART: [kat] SHA2-256
28,359,952 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,370,767 UART: [kat] ++
28,371,313 UART: [kat] sha1
28,382,914 UART: [kat] SHA2-256
28,385,600 UART: [kat] SHA2-384
28,392,139 UART: [kat] SHA2-512-ACC
28,394,491 UART: [kat] ECC-384
30,835,634 UART: [kat] HMAC-384Kdf
30,846,843 UART: [kat] LMS
31,323,324 UART: [kat] --
31,326,717 UART: [update-reset] ++
34,381,877 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,385,648 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,658,242 >>> mbox cmd response: success
34,658,619 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,659,340 UART: [update-reset] Copying MAN_2 To MAN_1
34,696,490 UART: [update-reset Success] --
34,701,322 UART: [state] Locking Datavault
34,705,349 UART: [state] Locking PCR0, PCR1 and PCR31
34,707,054 UART: [state] Locking ICCM
34,709,345 UART: [exit] Launching FMC @ 0x40000130
34,717,749 UART:
34,717,985 UART: Running Caliptra FMC ...
34,719,011 UART:
34,719,161 UART: [state] CFI Enabled
34,763,175 UART: [art] Extend RT PCRs Done
34,764,320 UART: [art] Lock RT PCRs Done
34,765,929 UART: [art] Populate DV Done
34,771,388 UART: [fht] FMC Alias Private Key: 7
34,772,979 UART: [art] Derive CDI
34,773,792 UART: [art] Store in slot 0x4
34,816,456 UART: [art] Derive Key Pair
34,817,518 UART: [art] Store priv key in slot 0x5
37,243,479 UART: [art] Derive Key Pair - Done
37,256,359 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,962,555 UART: [art] Erasing AUTHORITY.KEYID = 7
38,964,059 UART: [art] PUB.X = 2D6C2CBF0F9AC7D0A7A13979C088EACED5BF3A43AAC9024E1E900F9D894DD8E4B9637B1E4B6D61B5A6B40F96B6B01E5F
38,971,381 UART: [art] PUB.Y = 41A5334828DC5AC95D50B8FB57B492FA7B10CDFE9C358B87C24D89CCF82D961700F8E864D8A7888EF4EACE2F2CE382D9
38,978,671 UART: [art] SIG.R = 3FC707DF0CA9C5811C7F55FE821C21ACB5DCBDC5B6BC83793711EBB5C869614D0BFF0473F94AB7BF5FEF09A91B7B679C
38,986,065 UART: [art] SIG.S = 6D6E53FB148D3081C7AB88579073F107B586D5C9A5EADB43E20E8504DB5557E1F730E82C847DE3D42AE28BBE759ACC3D
39,964,492 UART: mbox::rt_entry...
39,965,440 UART: ____ _ _ _ ____ _____
39,967,422 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,969,429 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,971,362 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,973,291 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,975,229 UART: |_|
39,976,231 UART:
40,346,798 UART: [rt] Runtime listening for mailbox commands...
40,349,027 >>> mbox cmd response data (48 bytes)
40,349,593 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,350,032 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
3,774,585 ready_for_fw is high
3,775,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,450,364 >>> mbox cmd response: success
18,707,999 UART:
18,708,391 UART: Running Caliptra FMC ...
18,709,506 UART:
18,709,681 UART: [state] CFI Enabled
18,717,833 UART: [fht] FMC Alias Private Key: 7
20,484,033 UART: [art] Extend RT PCRs Done
20,485,257 UART: [art] Lock RT PCRs Done
20,486,803 UART: [art] Populate DV Done
20,492,231 UART: [fht] FMC Alias Private Key: 7
20,493,771 UART: [art] Derive CDI
20,494,506 UART: [art] Store in slot 0x4
20,537,258 UART: [art] Derive Key Pair
20,538,257 UART: [art] Store priv key in slot 0x5
22,965,125 UART: [art] Derive Key Pair - Done
22,978,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,684,921 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,421 UART: [art] PUB.X = 4B93337BA2AA7BD9909ED97CBBC9ECCF6DAF647C09471D44BA52E75BE10D7B456E7F52CCAD2CBDB789A0C81E8DB9E97E
24,693,737 UART: [art] PUB.Y = 839F45AADF9131B113560D42AA6F6B45A73EC6D422D91D58F02F09D75D1D9FD7468F345877ED0C09317AB5953D8FEEE6
24,700,990 UART: [art] SIG.R = D27A43C53CEBF62BF8B3F34FA723675997779EB4AB2BBC0300BA78B5C0218AC9B084F6470CE514C4A6D5967C2BC2DF1E
24,708,466 UART: [art] SIG.S = 4BFC4D614F9A3EF8258755D7ACD3E70721182E7A2B2FD7F3F27D53ACB3DC82004FA41655D9E632542CCF09825C9DE67C
25,687,206 UART: Caliptra RT
25,687,909 UART: [state] CFI Enabled
25,820,418 UART: [rt] RT listening for mailbox commands...
27,873,256 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,474,626 >>> mbox cmd response: success
34,475,116 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
34,507,340 UART:
34,507,634 UART: Running Caliptra FMC ...
34,508,755 UART:
34,508,920 UART: [state] CFI Enabled
34,553,383 UART: [art] Extend RT PCRs Done
34,554,592 UART: [art] Lock RT PCRs Done
34,556,003 UART: [art] Populate DV Done
34,561,309 UART: [fht] FMC Alias Private Key: 7
34,563,049 UART: [art] Derive CDI
34,563,874 UART: [art] Store in slot 0x4
34,606,420 UART: [art] Derive Key Pair
34,607,423 UART: [art] Store priv key in slot 0x5
37,034,613 UART: [art] Derive Key Pair - Done
37,047,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,753,861 UART: [art] Erasing AUTHORITY.KEYID = 7
38,755,362 UART: [art] PUB.X = 05CC01C45C3F39AEE92D38A9914AF4EA5A60816B34B5AAF1973D14E90D0AD96E8E3399076CB1BB9CE9C91F169892F1BB
38,762,681 UART: [art] PUB.Y = DA0924DB31EE94B16844208A295C1638B3059B9D0A652361B602EEA5DEAC1C226BAC5C8D9AEAB61463F3E295839A1B02
38,769,918 UART: [art] SIG.R = 4C53BC8F5EB1EF5F165F85C7971DD6279D8E04AE5B3855D37201E23EEE2D6B8853739B6E6DCE485911A892277CDB2933
38,777,321 UART: [art] SIG.S = C9FBB45D26EC68691CB4BBDD47028397FD4F5A9B6F795188FBDC62DEE8B0F7EEEA0864FCD9936408E3B0066DA7A55A10
39,755,768 UART: mbox::rt_entry...
39,756,729 UART: ____ _ _ _ ____ _____
39,758,680 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,760,694 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,762,638 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,764,569 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,766,507 UART: |_|
39,767,317 UART:
40,140,310 UART: [rt] Runtime listening for mailbox commands...
40,142,488 >>> mbox cmd response data (48 bytes)
40,143,098 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,143,551 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
191,969 UART:
192,357 UART: Running Caliptra ROM ...
193,492 UART:
193,637 UART: [state] CFI Enabled
264,883 UART: [state] LifecycleState = Unprovisioned
267,299 UART: [state] DebugLocked = No
269,760 UART: [state] WD Timer not started. Device not locked for debugging
274,506 UART: [kat] SHA2-256
464,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,162 UART: [kat] ++
475,634 UART: [kat] sha1
487,402 UART: [kat] SHA2-256
490,427 UART: [kat] SHA2-384
496,273 UART: [kat] SHA2-512-ACC
498,843 UART: [kat] ECC-384
2,949,020 UART: [kat] HMAC-384Kdf
2,972,980 UART: [kat] LMS
3,504,795 UART: [kat] --
3,509,992 UART: [cold-reset] ++
3,511,139 UART: [fht] FHT @ 0x50003400
3,521,967 UART: [idev] ++
3,522,667 UART: [idev] CDI.KEYID = 6
3,523,691 UART: [idev] SUBJECT.KEYID = 7
3,524,860 UART: [idev] UDS.KEYID = 0
3,525,779 ready_for_fw is high
3,525,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,007 UART: [idev] Erasing UDS.KEYID = 0
6,028,797 UART: [idev] Sha1 KeyId Algorithm
6,051,189 UART: [idev] --
6,055,950 UART: [ldev] ++
6,056,631 UART: [ldev] CDI.KEYID = 6
6,057,648 UART: [ldev] SUBJECT.KEYID = 5
6,058,748 UART: [ldev] AUTHORITY.KEYID = 7
6,059,975 UART: [ldev] FE.KEYID = 1
6,101,193 UART: [ldev] Erasing FE.KEYID = 1
8,605,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,394 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,811 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,188 UART: [ldev] --
10,413,121 UART: [fwproc] Wait for Commands...
10,414,722 UART: [fwproc] Recv command 0x46574c44
10,417,130 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,811 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,679,576 >>> mbox cmd response: success
14,683,527 UART: [afmc] ++
14,684,254 UART: [afmc] CDI.KEYID = 6
14,685,443 UART: [afmc] SUBJECT.KEYID = 7
14,686,885 UART: [afmc] AUTHORITY.KEYID = 5
17,218,001 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,934 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,039 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,183 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,130 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,112 UART: [afmc] --
19,013,442 UART: [cold-reset] --
19,018,949 UART: [state] Locking Datavault
19,024,317 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,465 UART: [state] Locking ICCM
19,028,510 UART: [exit] Launching FMC @ 0x40000130
19,037,183 UART:
19,037,416 UART: Running Caliptra FMC ...
19,038,515 UART:
19,038,674 UART: [state] CFI Enabled
19,097,360 UART: [fht] FMC Alias Private Key: 7
20,885,252 UART: [art] Extend RT PCRs Done
20,886,454 UART: [art] Lock RT PCRs Done
20,888,236 UART: [art] Populate DV Done
20,893,584 UART: [fht] FMC Alias Private Key: 7
20,895,177 UART: [art] Derive CDI
20,895,986 UART: [art] Store in slot 0x4
20,952,088 UART: [art] Derive Key Pair
20,953,123 UART: [art] Store priv key in slot 0x5
23,416,269 UART: [art] Derive Key Pair - Done
23,428,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,142,419 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,924 UART: [art] PUB.X = 48D4529EA187E9357F11E7D89D5EB4C4FABDFA622CA5EF4B8265B8E0FF3ED6C8F573CF707A7360C33A6E776781C05AE7
25,151,231 UART: [art] PUB.Y = 0402F320AF34EEB78E6FFAD090EF70DBA70B626E7BC096BD6ADA94D36BA611E8F08FF2010E01C087512BBE9341ED9676
25,158,528 UART: [art] SIG.R = 1C8CD08778C3264A2B6F24EF4B6E5BC2B87C5610BE4F7C08E16F14C8F58DA7C3A4F639CBD96C105791B5B3D9C6F720A9
25,165,873 UART: [art] SIG.S = ECAD79BADBC0A3B732E55A5B766996223A50E82B327A7353C88970F2DF4318AD8B01D656F6AE3659486175A23425C92B
26,144,323 UART: Caliptra RT
26,145,041 UART: [state] CFI Enabled
26,324,971 UART: [rt] RT listening for mailbox commands...
28,383,435 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,489,334 UART:
28,489,698 UART: Running Caliptra ROM ...
28,490,796 UART:
28,490,959 UART: [state] CFI Enabled
28,551,439 UART: [state] LifecycleState = Unprovisioned
28,553,544 UART: [state] DebugLocked = No
28,554,720 UART: [state] WD Timer not started. Device not locked for debugging
28,558,032 UART: [kat] SHA2-256
28,747,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,758,618 UART: [kat] ++
28,759,072 UART: [kat] sha1
28,771,146 UART: [kat] SHA2-256
28,774,159 UART: [kat] SHA2-384
28,778,797 UART: [kat] SHA2-512-ACC
28,781,426 UART: [kat] ECC-384
31,237,068 UART: [kat] HMAC-384Kdf
31,259,259 UART: [kat] LMS
31,790,829 UART: [kat] --
31,794,847 UART: [update-reset] ++
34,866,886 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,870,048 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,285,475 >>> mbox cmd response: success
35,285,886 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,286,829 UART: [update-reset] Copying MAN_2 To MAN_1
35,324,398 UART: [update-reset Success] --
35,328,620 UART: [state] Locking Datavault
35,332,043 UART: [state] Locking PCR0, PCR1 and PCR31
35,334,178 UART: [state] Locking ICCM
35,336,052 UART: [exit] Launching FMC @ 0x40000130
35,344,672 UART:
35,344,915 UART: Running Caliptra FMC ...
35,346,016 UART:
35,346,199 UART: [state] CFI Enabled
35,451,412 UART: [art] Extend RT PCRs Done
35,452,601 UART: [art] Lock RT PCRs Done
35,453,730 UART: [art] Populate DV Done
35,459,034 UART: [fht] FMC Alias Private Key: 7
35,460,551 UART: [art] Derive CDI
35,461,316 UART: [art] Store in slot 0x4
35,520,383 UART: [art] Derive Key Pair
35,521,383 UART: [art] Store priv key in slot 0x5
37,984,349 UART: [art] Derive Key Pair - Done
37,997,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,709,701 UART: [art] Erasing AUTHORITY.KEYID = 7
39,711,202 UART: [art] PUB.X = 4102BEBB833F73A5D72FD64043FA77607FA6B1FA18DFEE4129BBED591E4306032BDB47AF356D6F3895F84C86BF9D4845
39,718,508 UART: [art] PUB.Y = B7EE0718118FDF3A9953FA5D3C153B67184F84371E55F428D1679633265A1012ED1E1537E438681AAA8259D9E19C576A
39,725,731 UART: [art] SIG.R = 8EA18B3AF54E6118C5122475FC082A2EC4E1B843681F658FDAB685712AEC9575F546351C54FFF3F44177A210F09BEB42
39,733,126 UART: [art] SIG.S = 2D2104056BD746C61E5FFB7B032D8B3E4A25E490B74272E1667BD19AA0CE6EF973A213885CC601E4CFC5560F36F78C3B
40,711,257 UART: mbox::rt_entry...
40,712,227 UART: ____ _ _ _ ____ _____
40,714,209 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,716,212 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,718,139 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,720,069 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,722,002 UART: |_|
40,722,821 UART:
41,094,092 UART: [rt] Runtime listening for mailbox commands...
41,096,321 >>> mbox cmd response data (48 bytes)
41,096,907 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,097,336 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,869 writing to cptra_bootfsm_go
3,438,238 ready_for_fw is high
3,438,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,835,796 >>> mbox cmd response: success
19,132,271 UART:
19,132,689 UART: Running Caliptra FMC ...
19,133,800 UART:
19,133,961 UART: [state] CFI Enabled
19,201,873 UART: [fht] FMC Alias Private Key: 7
20,988,993 UART: [art] Extend RT PCRs Done
20,990,221 UART: [art] Lock RT PCRs Done
20,991,906 UART: [art] Populate DV Done
20,997,544 UART: [fht] FMC Alias Private Key: 7
20,999,079 UART: [art] Derive CDI
21,000,051 UART: [art] Store in slot 0x4
21,055,167 UART: [art] Derive Key Pair
21,056,177 UART: [art] Store priv key in slot 0x5
23,518,792 UART: [art] Derive Key Pair - Done
23,531,792 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,244,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,226 UART: [art] PUB.X = AB42FA75208841314DE8EB52ED4DE0704AA0C046127ED95BCD36BBEF841EFA65963B9C9C81DC8325934FE6F8104BEE02
25,253,468 UART: [art] PUB.Y = 420967B369B042797EEDB757481A295C97E3B7D7133A48A28C5EEE568689932D5B2978299CD64F50889174E20405FE82
25,260,706 UART: [art] SIG.R = 82DB14DFF132A58AE341D0C52F66E4BBEA1DCB06CB21A8906F841CE4653850BF99933BCF469C412EF7E5165B244E08DE
25,268,121 UART: [art] SIG.S = A2C8C6E24403D6118194844D61570385A93FAB86D108900DBB36E875EC5E7E4B31B08693BF3C1166ADD60D8CDE419B21
26,247,319 UART: Caliptra RT
26,248,030 UART: [state] CFI Enabled
26,427,242 UART: [rt] RT listening for mailbox commands...
28,489,977 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,583,630 >>> mbox cmd response: success
35,584,185 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,619,598 UART:
35,619,882 UART: Running Caliptra FMC ...
35,621,031 UART:
35,621,195 UART: [state] CFI Enabled
35,722,982 UART: [art] Extend RT PCRs Done
35,724,184 UART: [art] Lock RT PCRs Done
35,725,480 UART: [art] Populate DV Done
35,731,099 UART: [fht] FMC Alias Private Key: 7
35,732,779 UART: [art] Derive CDI
35,733,599 UART: [art] Store in slot 0x4
35,792,775 UART: [art] Derive Key Pair
35,793,774 UART: [art] Store priv key in slot 0x5
38,256,928 UART: [art] Derive Key Pair - Done
38,269,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,982,694 UART: [art] Erasing AUTHORITY.KEYID = 7
39,984,210 UART: [art] PUB.X = A103A27C50646A964DE21C8E56E838EDA82B7934B516A02D60A79B3C2A4286633B5F0FC6DAB4518B9A4D74381F94FA01
39,991,453 UART: [art] PUB.Y = CF7D9558599AF45B1E98302FFA402D0D6AE18D8C255AF84982E02CAAD06472D471DA17EB86E09A78348B3D1C31EC4D5A
39,998,733 UART: [art] SIG.R = 5C55223DCA2B7EF237D9B6D08F20AE58DA7048659D08EEC4561283DF2CDA1812929BC57DFE8CEA82E9B8AC2EB755A4BA
40,006,132 UART: [art] SIG.S = 5CC20217D4F12780D9234B65FFB6A9E5293C3977853CA75979B156A8F3F1533DF9739DF9E9EAB871DC931C383566CF03
40,984,690 UART: mbox::rt_entry...
40,985,654 UART: ____ _ _ _ ____ _____
40,987,587 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,989,594 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,991,526 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,993,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,995,378 UART: |_|
40,996,207 UART:
41,368,776 UART: [rt] Runtime listening for mailbox commands...
41,370,949 >>> mbox cmd response data (48 bytes)
41,371,516 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,371,888 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,296 writing to cptra_bootfsm_go
192,537 UART:
192,907 UART: Running Caliptra ROM ...
194,101 UART:
603,642 UART: [state] CFI Enabled
615,275 UART: [state] LifecycleState = Unprovisioned
617,588 UART: [state] DebugLocked = No
620,395 UART: [state] WD Timer not started. Device not locked for debugging
624,874 UART: [kat] SHA2-256
814,778 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,581 UART: [kat] ++
826,065 UART: [kat] sha1
836,525 UART: [kat] SHA2-256
839,542 UART: [kat] SHA2-384
844,991 UART: [kat] SHA2-512-ACC
847,543 UART: [kat] ECC-384
3,293,360 UART: [kat] HMAC-384Kdf
3,306,678 UART: [kat] LMS
3,838,563 UART: [kat] --
3,843,624 UART: [cold-reset] ++
3,845,770 UART: [fht] FHT @ 0x50003400
3,857,176 UART: [idev] ++
3,857,893 UART: [idev] CDI.KEYID = 6
3,858,804 UART: [idev] SUBJECT.KEYID = 7
3,860,050 UART: [idev] UDS.KEYID = 0
3,860,981 ready_for_fw is high
3,861,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,045 UART: [idev] Erasing UDS.KEYID = 0
6,339,352 UART: [idev] Sha1 KeyId Algorithm
6,362,576 UART: [idev] --
6,367,197 UART: [ldev] ++
6,367,896 UART: [ldev] CDI.KEYID = 6
6,368,838 UART: [ldev] SUBJECT.KEYID = 5
6,370,002 UART: [ldev] AUTHORITY.KEYID = 7
6,371,185 UART: [ldev] FE.KEYID = 1
6,382,696 UART: [ldev] Erasing FE.KEYID = 1
8,857,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,518 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,048 UART: [ldev] --
10,648,208 UART: [fwproc] Wait for Commands...
10,650,849 UART: [fwproc] Recv command 0x46574c44
10,653,104 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,741 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,910,148 >>> mbox cmd response: success
14,913,580 UART: [afmc] ++
14,914,307 UART: [afmc] CDI.KEYID = 6
14,915,504 UART: [afmc] SUBJECT.KEYID = 7
14,916,951 UART: [afmc] AUTHORITY.KEYID = 5
17,417,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,138,034 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,140,006 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,155,066 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,170,215 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,185,157 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,209,021 UART: [afmc] --
19,212,732 UART: [cold-reset] --
19,216,497 UART: [state] Locking Datavault
19,221,337 UART: [state] Locking PCR0, PCR1 and PCR31
19,223,506 UART: [state] Locking ICCM
19,225,687 UART: [exit] Launching FMC @ 0x40000130
19,234,380 UART:
19,234,616 UART: Running Caliptra FMC ...
19,235,720 UART:
19,235,887 UART: [state] CFI Enabled
19,243,998 UART: [fht] FMC Alias Private Key: 7
21,010,391 UART: [art] Extend RT PCRs Done
21,011,609 UART: [art] Lock RT PCRs Done
21,013,456 UART: [art] Populate DV Done
21,018,816 UART: [fht] FMC Alias Private Key: 7
21,020,358 UART: [art] Derive CDI
21,021,176 UART: [art] Store in slot 0x4
21,064,314 UART: [art] Derive Key Pair
21,065,314 UART: [art] Store priv key in slot 0x5
23,492,092 UART: [art] Derive Key Pair - Done
23,505,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,211,267 UART: [art] Erasing AUTHORITY.KEYID = 7
25,212,778 UART: [art] PUB.X = 4082B7B2371FBD01F571EEA16EF194597192CA72109FCAECC9C6A3D52EE8B21C253ED24D5C73B7DB5F131A5C4EDF8808
25,220,056 UART: [art] PUB.Y = 5FE1C79D9D3AD4932393482685ADE8B4E89BA289D13A73A44CBD9DAD32692C3FE4E845976D8B5644E5F2C03FADAA64A5
25,227,328 UART: [art] SIG.R = FF0AAAA7A31AADE3EE52DF1B542F877AE7A8F2F1C8FC748686563D2D64EADD626ABF86BE447D7540280540FB63F77DB7
25,234,749 UART: [art] SIG.S = CEA8A4BD9255986C44A0CDC0D5E588B2BE8BC9209D42CA7D8578315DADD4018722D26CB180154D36CC0F944C7C8927BE
26,213,303 UART: Caliptra RT
26,213,995 UART: [state] CFI Enabled
26,346,064 UART: [rt] RT listening for mailbox commands...
28,404,553 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,510,432 UART:
28,510,785 UART: Running Caliptra ROM ...
28,511,924 UART:
28,512,123 UART: [state] CFI Enabled
28,527,087 UART: [state] LifecycleState = Unprovisioned
28,528,979 UART: [state] DebugLocked = No
28,531,722 UART: [state] WD Timer not started. Device not locked for debugging
28,535,637 UART: [kat] SHA2-256
28,725,509 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,736,259 UART: [kat] ++
28,736,858 UART: [kat] sha1
28,749,753 UART: [kat] SHA2-256
28,752,780 UART: [kat] SHA2-384
28,758,126 UART: [kat] SHA2-512-ACC
28,760,757 UART: [kat] ECC-384
31,202,127 UART: [kat] HMAC-384Kdf
31,214,921 UART: [kat] LMS
31,746,536 UART: [kat] --
31,751,549 UART: [update-reset] ++
34,822,287 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,825,236 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,240,640 >>> mbox cmd response: success
35,241,011 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,242,481 UART: [update-reset] Copying MAN_2 To MAN_1
35,279,555 UART: [update-reset Success] --
35,284,017 UART: [state] Locking Datavault
35,288,655 UART: [state] Locking PCR0, PCR1 and PCR31
35,290,812 UART: [state] Locking ICCM
35,293,467 UART: [exit] Launching FMC @ 0x40000130
35,302,092 UART:
35,302,333 UART: Running Caliptra FMC ...
35,303,441 UART:
35,303,605 UART: [state] CFI Enabled
35,347,697 UART: [art] Extend RT PCRs Done
35,348,880 UART: [art] Lock RT PCRs Done
35,350,359 UART: [art] Populate DV Done
35,355,858 UART: [fht] FMC Alias Private Key: 7
35,357,502 UART: [art] Derive CDI
35,358,242 UART: [art] Store in slot 0x4
35,400,893 UART: [art] Derive Key Pair
35,402,066 UART: [art] Store priv key in slot 0x5
37,828,535 UART: [art] Derive Key Pair - Done
37,841,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,547,334 UART: [art] Erasing AUTHORITY.KEYID = 7
39,548,836 UART: [art] PUB.X = 73E2D7AEAA00EE6B1CED1FAAE112F3E1A6A67F1250C018B6FD52D758064914BA27F44423C87E12D70E6C7314D3896858
39,556,099 UART: [art] PUB.Y = 6CC691C698EF87581B978323D91663123A764428F06EDEAFB959236DF57387D18179A326E2438CD4D2594C566EE9B7C5
39,563,327 UART: [art] SIG.R = 16187AD72E4A18622578AFDE4A8C0F35F0A74CA882C0EA6E18C44E5BC40F45E6AB0902D7A7EE42812FAC4827B535925E
39,570,707 UART: [art] SIG.S = CA75151AB9A85871C74871F0535F0C6F33530F851EF9DE986D372ACB8934502C263F83E332E26170A05A3F62A3906D65
40,549,157 UART: mbox::rt_entry...
40,550,126 UART: ____ _ _ _ ____ _____
40,552,115 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,554,147 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,556,086 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,558,025 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,559,958 UART: |_|
40,560,770 UART:
40,927,352 UART: [rt] Runtime listening for mailbox commands...
40,929,536 >>> mbox cmd response data (48 bytes)
40,930,105 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
40,930,540 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,753,237 ready_for_fw is high
3,753,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,029,389 >>> mbox cmd response: success
19,286,505 UART:
19,286,895 UART: Running Caliptra FMC ...
19,288,036 UART:
19,288,211 UART: [state] CFI Enabled
19,296,091 UART: [fht] FMC Alias Private Key: 7
21,062,515 UART: [art] Extend RT PCRs Done
21,063,753 UART: [art] Lock RT PCRs Done
21,065,500 UART: [art] Populate DV Done
21,070,661 UART: [fht] FMC Alias Private Key: 7
21,072,217 UART: [art] Derive CDI
21,073,061 UART: [art] Store in slot 0x4
21,115,979 UART: [art] Derive Key Pair
21,117,016 UART: [art] Store priv key in slot 0x5
23,543,493 UART: [art] Derive Key Pair - Done
23,556,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,262,394 UART: [art] Erasing AUTHORITY.KEYID = 7
25,263,888 UART: [art] PUB.X = 6A00E9EB69F843F3746B41E080E3D53B340E8222CA6D3F93833319D5311EA5404E17605988DF2A0607EA5B07A0C9DA4F
25,271,153 UART: [art] PUB.Y = 7C464FA2EF6AC436BD2CC0B38B9FF35B62CB37C5C17B3BFE728F34E3C390187B4966AB9BC2B4C44FB8BB63BED6EF2F23
25,278,469 UART: [art] SIG.R = D8C3D5B2867FD11A992E4B982EC1C2CAC6F16231662A35BB5868AE6652F58E71885A4FBF1F572137150CA0D931F7DBBB
25,285,843 UART: [art] SIG.S = EC58AC05E88318A5BCD5E4810442C7ADF8065AF42F6AFFFDBD3736E5C36F62960F8686D43379E74DEDD263F788FA33AC
26,265,336 UART: Caliptra RT
26,266,048 UART: [state] CFI Enabled
26,398,569 UART: [rt] RT listening for mailbox commands...
28,457,180 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,474,329 >>> mbox cmd response: success
35,474,809 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
35,511,012 UART:
35,511,340 UART: Running Caliptra FMC ...
35,512,479 UART:
35,512,660 UART: [state] CFI Enabled
35,557,122 UART: [art] Extend RT PCRs Done
35,558,275 UART: [art] Lock RT PCRs Done
35,559,835 UART: [art] Populate DV Done
35,565,619 UART: [fht] FMC Alias Private Key: 7
35,567,359 UART: [art] Derive CDI
35,568,187 UART: [art] Store in slot 0x4
35,611,118 UART: [art] Derive Key Pair
35,612,162 UART: [art] Store priv key in slot 0x5
38,039,079 UART: [art] Derive Key Pair - Done
38,052,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,758,670 UART: [art] Erasing AUTHORITY.KEYID = 7
39,760,177 UART: [art] PUB.X = 4AF38193D00DCF8C6102473D1C056AD4370C44F0282657F5EC267425DE4F76A9DDBDD0C3A4310558D72BED10E59D2C18
39,767,442 UART: [art] PUB.Y = 5D0CBBC635E4663FB67E96E35CF8B03C075A0B341054180DDAAA9E9ECA6DD2316698A7DF739F95411480096E250DAECA
39,774,698 UART: [art] SIG.R = 18378998F324651B17C54355244C01583B3B41268286E7B75A703950E95EF6FE2072751EA56E40A9CDF21B69BB4A508C
39,782,068 UART: [art] SIG.S = DFE885A93122BFE410A151F658B72D549B02910F3DDAFFE9A5842FE49C99BB63D90CE6CA01907D870DF8DB0CA55C19AE
40,760,680 UART: mbox::rt_entry...
40,761,660 UART: ____ _ _ _ ____ _____
40,763,662 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,765,674 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,767,607 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,769,541 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,771,474 UART: |_|
40,772,314 UART:
41,144,995 UART: [rt] Runtime listening for mailbox commands...
41,147,191 >>> mbox cmd response data (48 bytes)
41,147,781 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
41,148,218 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,297 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,174 UART: [kat] SHA2-512-ACC
897,075 UART: [kat] ECC-384
902,920 UART: [kat] HMAC-384Kdf
907,452 UART: [kat] LMS
1,475,648 UART: [kat] --
1,476,595 UART: [cold-reset] ++
1,476,983 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,008 UART: [idev] Erasing UDS.KEYID = 0
1,505,684 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,264 UART: [idev] --
1,515,479 UART: [ldev] ++
1,515,647 UART: [ldev] CDI.KEYID = 6
1,516,010 UART: [ldev] SUBJECT.KEYID = 5
1,516,436 UART: [ldev] AUTHORITY.KEYID = 7
1,516,899 UART: [ldev] FE.KEYID = 1
1,521,865 UART: [ldev] Erasing FE.KEYID = 1
1,546,998 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,365 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,972 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,684 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,608 UART: [ldev] --
1,586,013 UART: [fwproc] Waiting for Commands...
1,586,836 UART: [fwproc] Received command 0x46574c44
1,587,627 UART: [fwproc] Received Image of size 118548 bytes
2,932,311 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,985 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,203 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,514 >>> mbox cmd response: success
3,131,584 UART: [afmc] ++
3,131,752 UART: [afmc] CDI.KEYID = 6
3,132,114 UART: [afmc] SUBJECT.KEYID = 7
3,132,539 UART: [afmc] AUTHORITY.KEYID = 5
3,167,430 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,154 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,863 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,746 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,429 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,301 UART: [afmc] --
3,210,317 UART: [cold-reset] --
3,210,993 UART: [state] Locking Datavault
3,212,058 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,662 UART: [state] Locking ICCM
3,213,242 UART: [exit] Launching FMC @ 0x40000130
3,218,572 UART:
3,218,588 UART: Running Caliptra FMC ...
3,218,996 UART:
3,219,050 UART: [state] CFI Enabled
3,229,536 UART: [fht] FMC Alias Private Key: 7
3,348,670 UART: [art] Extend RT PCRs Done
3,349,098 UART: [art] Lock RT PCRs Done
3,350,536 UART: [art] Populate DV Done
3,358,923 UART: [fht] FMC Alias Private Key: 7
3,359,879 UART: [art] Derive CDI
3,360,159 UART: [art] Store in slot 0x4
3,445,757 UART: [art] Derive Key Pair
3,446,117 UART: [art] Store priv key in slot 0x5
3,458,500 UART: [art] Derive Key Pair - Done
3,473,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,497 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,262 UART: [art] PUB.X = B9648624D3BF3EBB3C6542A5709D3055866B1CFD0343C399FFFA8AB8D09B2AC477306ED8BF5D7DA3D6C77425445AF8D3
3,496,041 UART: [art] PUB.Y = DF0D4F5F438FDFCD63A0269E4ED6702E6C85FA71667F006448932FBEFF1722047CFEE44E94093817E4F0AAFF6B120B7B
3,502,971 UART: [art] SIG.R = C5A3280AB8EB0A7014497D7D3FBCE0E333EB48D663207D2CEA25524F1E74E2B98CEB1894691543C3878D6B2157531B4E
3,509,739 UART: [art] SIG.S = 164E85700A3A5D85C2D30112B87EE36DAABAEBF02C3F9364D4D229E36D8938167819CE85A0E678814A360368C0B98D1C
3,533,436 UART: Caliptra RT
3,533,687 UART: [state] CFI Enabled
3,653,335 UART: [rt] RT listening for mailbox commands...
3,654,005 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,358 UART:
3,655,374 UART: Running Caliptra ROM ...
3,655,782 UART:
3,655,836 UART: [state] CFI Enabled
3,658,160 UART: [state] LifecycleState = Unprovisioned
3,658,815 UART: [state] DebugLocked = No
3,659,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,660,962 UART: [kat] SHA2-256
4,454,893 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,459,008 UART: [kat] ++
4,459,160 UART: [kat] sha1
4,463,512 UART: [kat] SHA2-256
4,465,450 UART: [kat] SHA2-384
4,468,029 UART: [kat] SHA2-512-ACC
4,469,929 UART: [kat] ECC-384
4,475,496 UART: [kat] HMAC-384Kdf
4,480,188 UART: [kat] LMS
5,048,384 UART: [kat] --
5,049,323 UART: [update-reset] ++
6,022,412 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,023,512 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,125,205 >>> mbox cmd response: success
6,125,205 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,125,336 UART: [update-reset] Copying MAN_2 To MAN_1
6,133,350 UART: [update-reset Success] --
6,134,157 UART: [state] Locking Datavault
6,134,881 UART: [state] Locking PCR0, PCR1 and PCR31
6,135,485 UART: [state] Locking ICCM
6,136,077 UART: [exit] Launching FMC @ 0x40000130
6,141,407 UART:
6,141,423 UART: Running Caliptra FMC ...
6,141,831 UART:
6,141,885 UART: [state] CFI Enabled
6,230,818 UART: [art] Extend RT PCRs Done
6,231,246 UART: [art] Lock RT PCRs Done
6,232,463 UART: [art] Populate DV Done
6,241,024 UART: [fht] FMC Alias Private Key: 7
6,242,068 UART: [art] Derive CDI
6,242,348 UART: [art] Store in slot 0x4
6,327,986 UART: [art] Derive Key Pair
6,328,346 UART: [art] Store priv key in slot 0x5
6,341,631 UART: [art] Derive Key Pair - Done
6,356,763 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,372,466 UART: [art] Erasing AUTHORITY.KEYID = 7
6,373,231 UART: [art] PUB.X = 175C9279AE49A6BB072CE4C8BFB9679756AE2B2078CC33B6FCA98B76228C50E0577B5A1240B6D8C0A05FBBEA9E1AA3CF
6,380,016 UART: [art] PUB.Y = 763C8112CDD82F4BAE0B66825FEFEC91C01028D83FF8BE684169EABB709CD9C1AF25E3D5386EBF178CB4BEEA04D3F757
6,386,982 UART: [art] SIG.R = F78D2717A2203A7C18D9327C0F615B031F770A4CA6C748C273FF1226F75295F1ED8026146836788FF1B4F447E642D76E
6,393,737 UART: [art] SIG.S = F3257BA1BE228524696DCED3B1D8169A4956343CB9B5CAF6471127371E2ED762C698A82395979B34CB5664B6B5E8B4BF
6,418,107 UART: mbox::rt_entry...
6,418,479 UART: ____ _ _ _ ____ _____
6,419,263 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,420,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,420,831 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,421,599 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,422,367 UART: |_|
6,422,679 UART:
6,784,645 UART: [rt] Runtime listening for mailbox commands...
6,785,843 >>> mbox cmd response data (48 bytes)
6,785,844 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,785,952 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,905 ready_for_fw is high
1,361,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,164 >>> mbox cmd response: success
3,040,879 UART:
3,040,895 UART: Running Caliptra FMC ...
3,041,303 UART:
3,041,357 UART: [state] CFI Enabled
3,052,115 UART: [fht] FMC Alias Private Key: 7
3,171,393 UART: [art] Extend RT PCRs Done
3,171,821 UART: [art] Lock RT PCRs Done
3,173,399 UART: [art] Populate DV Done
3,181,778 UART: [fht] FMC Alias Private Key: 7
3,182,870 UART: [art] Derive CDI
3,183,150 UART: [art] Store in slot 0x4
3,268,680 UART: [art] Derive Key Pair
3,269,040 UART: [art] Store priv key in slot 0x5
3,282,143 UART: [art] Derive Key Pair - Done
3,296,841 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,298 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,063 UART: [art] PUB.X = 6C034408104C321179575629E44193D793A8DCA24BCC6C5D464B5EA59D650107DE232768C318F5335C69DABA9C20B0B8
3,319,817 UART: [art] PUB.Y = 1BB8BD0B3ABCDEDCEABF5A99B2D050E65EA9BC996F7E84110DB1CF3A6291DDCB5B1FAF855E3A70098504DBBFF2682136
3,326,785 UART: [art] SIG.R = 4F1179698E6B6CCA1894AFC5DD16D85DF5A917E22654B30F959C7CC25CE1DACB2BEF1E7F57ABD75ED1EEBE692EAB81A3
3,333,580 UART: [art] SIG.S = C1BCDEC15E81F0A2D02BAFF64C0CE080659304948A62502665F6982B65471566AF5D86A85507D36E1854289A71363108
3,357,914 UART: Caliptra RT
3,358,165 UART: [state] CFI Enabled
3,478,905 UART: [rt] RT listening for mailbox commands...
3,479,575 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,830,493 >>> mbox cmd response: success
5,830,493 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,843,911 UART:
5,843,927 UART: Running Caliptra FMC ...
5,844,335 UART:
5,844,389 UART: [state] CFI Enabled
5,933,272 UART: [art] Extend RT PCRs Done
5,933,700 UART: [art] Lock RT PCRs Done
5,935,083 UART: [art] Populate DV Done
5,943,302 UART: [fht] FMC Alias Private Key: 7
5,944,230 UART: [art] Derive CDI
5,944,510 UART: [art] Store in slot 0x4
6,030,176 UART: [art] Derive Key Pair
6,030,536 UART: [art] Store priv key in slot 0x5
6,043,763 UART: [art] Derive Key Pair - Done
6,058,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,074,331 UART: [art] Erasing AUTHORITY.KEYID = 7
6,075,096 UART: [art] PUB.X = D49199B88313FB470F4190355F2BF3EE8479004B4C090DB53E5311C83784DE5EF57F5ACA9930DA058707373B6ECAC786
6,081,829 UART: [art] PUB.Y = 0C933B0498BED3BDD93D706DD9C70CF955DC46853826A68F90192C660D79DF441DCFD9095064A6982A51FC6443D9C129
6,088,766 UART: [art] SIG.R = E3AE7459A125A75A9B630C07F2253659103BD6F8A7BEE37A45D3D03C64F158E0E412B73380E22D9DC3CF6B018D48C203
6,095,528 UART: [art] SIG.S = 095BA09E4D46CEB460D71A00D9743C3AE4CA09C94BE2E0BF611A935DD0FBB45E0CBCBDB27B2E8A39C8C5594994CDA113
6,119,747 UART: mbox::rt_entry...
6,120,119 UART: ____ _ _ _ ____ _____
6,120,903 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,121,703 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,122,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,123,239 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,124,007 UART: |_|
6,124,319 UART:
6,491,366 UART: [rt] Runtime listening for mailbox commands...
6,492,564 >>> mbox cmd response data (48 bytes)
6,492,565 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,492,673 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,476 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,510 UART: [kat] SHA2-256
892,448 UART: [kat] SHA2-384
895,307 UART: [kat] SHA2-512-ACC
897,208 UART: [kat] ECC-384
902,797 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,668 UART: [cold-reset] ++
1,477,238 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,915 UART: [idev] Erasing UDS.KEYID = 0
1,505,967 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,523 UART: [idev] --
1,515,672 UART: [ldev] ++
1,515,840 UART: [ldev] CDI.KEYID = 6
1,516,203 UART: [ldev] SUBJECT.KEYID = 5
1,516,629 UART: [ldev] AUTHORITY.KEYID = 7
1,517,092 UART: [ldev] FE.KEYID = 1
1,522,136 UART: [ldev] Erasing FE.KEYID = 1
1,547,959 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,791 UART: [ldev] --
1,587,262 UART: [fwproc] Waiting for Commands...
1,587,889 UART: [fwproc] Received command 0x46574c44
1,588,680 UART: [fwproc] Received Image of size 118548 bytes
2,933,142 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,654 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,071 >>> mbox cmd response: success
3,133,081 UART: [afmc] ++
3,133,249 UART: [afmc] CDI.KEYID = 6
3,133,611 UART: [afmc] SUBJECT.KEYID = 7
3,134,036 UART: [afmc] AUTHORITY.KEYID = 5
3,169,365 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,483 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,263 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,972 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,855 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,538 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,562 UART: [afmc] --
3,212,578 UART: [cold-reset] --
3,213,378 UART: [state] Locking Datavault
3,214,403 UART: [state] Locking PCR0, PCR1 and PCR31
3,215,007 UART: [state] Locking ICCM
3,215,563 UART: [exit] Launching FMC @ 0x40000130
3,220,893 UART:
3,220,909 UART: Running Caliptra FMC ...
3,221,317 UART:
3,221,460 UART: [state] CFI Enabled
3,231,966 UART: [fht] FMC Alias Private Key: 7
3,350,864 UART: [art] Extend RT PCRs Done
3,351,292 UART: [art] Lock RT PCRs Done
3,352,608 UART: [art] Populate DV Done
3,361,071 UART: [fht] FMC Alias Private Key: 7
3,362,211 UART: [art] Derive CDI
3,362,491 UART: [art] Store in slot 0x4
3,448,249 UART: [art] Derive Key Pair
3,448,609 UART: [art] Store priv key in slot 0x5
3,461,564 UART: [art] Derive Key Pair - Done
3,476,308 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,414 UART: [art] PUB.X = BE10CDB044200F344F436408E46EBEFDFF60E0894E0D9D4C0907149BC934B5CB226BE06F3B3F3C0570FC61EF0B2B052C
3,499,174 UART: [art] PUB.Y = 2AD36FCE591F3E7C30E7AB70C6D3FCBD118B16607998A18F750587929140F8D9FC994FFCB9F4E0D7A0C9387850F260D6
3,506,129 UART: [art] SIG.R = 6ED777047732306D0781B66DF434DEF6A1C0B3613F12393193BDC4C66732D51D97A77CDDCCD01EFD21BECAD4A9CDFA93
3,512,909 UART: [art] SIG.S = BAC6CBBD3C1AEF4AFE628B61FAA18E676B61DF408775B99C6087F703AA986A83AD6A7E8F000EFACE95567D03015150A7
3,537,015 UART: Caliptra RT
3,537,358 UART: [state] CFI Enabled
3,657,718 UART: [rt] RT listening for mailbox commands...
3,658,388 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,777 UART:
3,659,793 UART: Running Caliptra ROM ...
3,660,201 UART:
3,660,342 UART: [state] CFI Enabled
3,663,168 UART: [state] LifecycleState = Unprovisioned
3,663,823 UART: [state] DebugLocked = No
3,664,369 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,666,058 UART: [kat] SHA2-256
4,459,989 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,464,104 UART: [kat] ++
4,464,256 UART: [kat] sha1
4,468,438 UART: [kat] SHA2-256
4,470,376 UART: [kat] SHA2-384
4,473,125 UART: [kat] SHA2-512-ACC
4,475,025 UART: [kat] ECC-384
4,480,830 UART: [kat] HMAC-384Kdf
4,485,658 UART: [kat] LMS
5,053,854 UART: [kat] --
5,054,701 UART: [update-reset] ++
6,026,976 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,028,054 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,129,747 >>> mbox cmd response: success
6,129,747 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
6,130,000 UART: [update-reset] Copying MAN_2 To MAN_1
6,138,014 UART: [update-reset Success] --
6,139,009 UART: [state] Locking Datavault
6,139,643 UART: [state] Locking PCR0, PCR1 and PCR31
6,140,247 UART: [state] Locking ICCM
6,140,787 UART: [exit] Launching FMC @ 0x40000130
6,146,117 UART:
6,146,133 UART: Running Caliptra FMC ...
6,146,541 UART:
6,146,684 UART: [state] CFI Enabled
6,235,543 UART: [art] Extend RT PCRs Done
6,235,971 UART: [art] Lock RT PCRs Done
6,237,354 UART: [art] Populate DV Done
6,245,669 UART: [fht] FMC Alias Private Key: 7
6,246,731 UART: [art] Derive CDI
6,247,011 UART: [art] Store in slot 0x4
6,332,879 UART: [art] Derive Key Pair
6,333,239 UART: [art] Store priv key in slot 0x5
6,346,470 UART: [art] Derive Key Pair - Done
6,361,369 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,377,114 UART: [art] Erasing AUTHORITY.KEYID = 7
6,377,879 UART: [art] PUB.X = A09CE15CD1D5ACD65F49DECC92346B7BAC6F4F9280A67AD2E43D9C33A4F825B3E6EF55DF43F36DC0DE1AA2B91C3188C6
6,384,675 UART: [art] PUB.Y = D0CC8D46365A5694769F53934C3AE34408453CE36A38A2C26D8DAF66CE75651406427E6F08AC816C8272A3B3B1EE1A0F
6,391,615 UART: [art] SIG.R = D71810FC556DE1FA0670B3A1D24A3C2ADFD1EDE31203C8BB712ACD202E2D3AC8E93549E67EA88A700F7E4DA87E86EB6B
6,398,398 UART: [art] SIG.S = B068E7F73410FF69C4FEF1E094DC26C5B1B51BCD95DECFE92C663D1BDFE13120D74BD884C6ED871C98AE62022556E2F6
6,421,785 UART: mbox::rt_entry...
6,422,157 UART: ____ _ _ _ ____ _____
6,422,941 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,423,741 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,424,509 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,425,277 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,426,045 UART: |_|
6,426,357 UART:
6,795,013 UART: [rt] Runtime listening for mailbox commands...
6,796,211 >>> mbox cmd response data (48 bytes)
6,796,212 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,796,320 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 ready_for_fw is high
1,362,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,877 >>> mbox cmd response: success
3,042,464 UART:
3,042,480 UART: Running Caliptra FMC ...
3,042,888 UART:
3,043,031 UART: [state] CFI Enabled
3,053,775 UART: [fht] FMC Alias Private Key: 7
3,173,321 UART: [art] Extend RT PCRs Done
3,173,749 UART: [art] Lock RT PCRs Done
3,175,311 UART: [art] Populate DV Done
3,183,592 UART: [fht] FMC Alias Private Key: 7
3,184,764 UART: [art] Derive CDI
3,185,044 UART: [art] Store in slot 0x4
3,270,600 UART: [art] Derive Key Pair
3,270,960 UART: [art] Store priv key in slot 0x5
3,284,133 UART: [art] Derive Key Pair - Done
3,298,717 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,552 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,317 UART: [art] PUB.X = A08D6674CA16F4C33D59FEEEC38ED0EFDCB6B57896FD2AA2C41B5F8382AB82E0E7C61C2ED7373A4CF0325105A41A2928
3,322,102 UART: [art] PUB.Y = 648E6B027C1B476A4C1E14DF4908985482D56BCA8BB19CBAFF8A13E1954547B48CF0AEC5E823A613AD5170732EDD9FAA
3,329,060 UART: [art] SIG.R = 0ACF38B35A14BBC8BED67726BA580E6AFF17E8C67D53F59E151137DF56EECA21EEB395EA8D971FBCB296A25996E4E06D
3,335,846 UART: [art] SIG.S = 54512A83769D844132A891A1AD9811190697ABBFBEDF6FABB9CC3CBB0A794D03943CD9EB44A6F0434C052C16569B0842
3,359,781 UART: Caliptra RT
3,360,124 UART: [state] CFI Enabled
3,481,229 UART: [rt] RT listening for mailbox commands...
3,481,899 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,834,360 >>> mbox cmd response: success
5,834,360 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,847,782 UART:
5,847,798 UART: Running Caliptra FMC ...
5,848,206 UART:
5,848,349 UART: [state] CFI Enabled
5,938,380 UART: [art] Extend RT PCRs Done
5,938,808 UART: [art] Lock RT PCRs Done
5,940,195 UART: [art] Populate DV Done
5,948,268 UART: [fht] FMC Alias Private Key: 7
5,949,292 UART: [art] Derive CDI
5,949,572 UART: [art] Store in slot 0x4
6,034,886 UART: [art] Derive Key Pair
6,035,246 UART: [art] Store priv key in slot 0x5
6,048,767 UART: [art] Derive Key Pair - Done
6,063,618 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,078,671 UART: [art] Erasing AUTHORITY.KEYID = 7
6,079,436 UART: [art] PUB.X = 4DE4645C7DFEFF38E0F83C273256F02F83D81083DB89DD198C8745152CC1747926E093A5B69923E3BAD77CF35FCA5542
6,086,210 UART: [art] PUB.Y = 68CEF6BB5457C2FB872525250099921EDCCC981D406E431C0F1AB049722E046F6FC9F7E2F08A6D6282EEB732B8EC7C3C
6,093,142 UART: [art] SIG.R = E32A04F8D14EE62B468A96B55B808CF1BB09A1A64C7074C0F15C30DC175CE4DEDA2C4F5F64077C9ABE1EA2F05144E31C
6,099,921 UART: [art] SIG.S = C38BD7C7A45212D71EBD65921A307C7253E2ADEE704A3AC6EFB2E3E34D767D60CE554A2D24BC5C1FC15ACC18403369AB
6,123,827 UART: mbox::rt_entry...
6,124,199 UART: ____ _ _ _ ____ _____
6,124,983 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,125,783 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,126,551 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,127,319 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,128,087 UART: |_|
6,128,399 UART:
6,490,217 UART: [rt] Runtime listening for mailbox commands...
6,491,415 >>> mbox cmd response data (48 bytes)
6,491,416 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,491,524 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,074 UART: [state] LifecycleState = Unprovisioned
85,729 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,304 UART: [kat] SHA2-256
901,244 UART: [kat] SHA2-384
904,009 UART: [kat] SHA2-512-ACC
905,910 UART: [kat] ECC-384
915,881 UART: [kat] HMAC-384Kdf
920,425 UART: [kat] LMS
1,168,737 UART: [kat] --
1,169,444 UART: [cold-reset] ++
1,169,936 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 ready_for_fw is high
1,174,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,849 UART: [idev] Erasing UDS.KEYID = 0
1,198,697 UART: [idev] Sha1 KeyId Algorithm
1,207,563 UART: [idev] --
1,208,618 UART: [ldev] ++
1,208,786 UART: [ldev] CDI.KEYID = 6
1,209,150 UART: [ldev] SUBJECT.KEYID = 5
1,209,577 UART: [ldev] AUTHORITY.KEYID = 7
1,210,040 UART: [ldev] FE.KEYID = 1
1,215,028 UART: [ldev] Erasing FE.KEYID = 1
1,241,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,693 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,298 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,010 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,020 UART: [ldev] --
1,280,467 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,379 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,554 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,851 >>> mbox cmd response: success
2,825,977 UART: [afmc] ++
2,826,145 UART: [afmc] CDI.KEYID = 6
2,826,508 UART: [afmc] SUBJECT.KEYID = 7
2,826,934 UART: [afmc] AUTHORITY.KEYID = 5
2,862,553 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,655 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,365 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,246 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,947 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,666 UART: [afmc] --
2,905,679 UART: [cold-reset] --
2,906,417 UART: [state] Locking Datavault
2,907,626 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,230 UART: [state] Locking ICCM
2,908,774 UART: [exit] Launching FMC @ 0x40000130
2,914,104 UART:
2,914,120 UART: Running Caliptra FMC ...
2,914,528 UART:
2,914,582 UART: [state] CFI Enabled
2,924,714 UART: [fht] FMC Alias Private Key: 7
3,043,634 UART: [art] Extend RT PCRs Done
3,044,062 UART: [art] Lock RT PCRs Done
3,045,402 UART: [art] Populate DV Done
3,053,611 UART: [fht] FMC Alias Private Key: 7
3,054,619 UART: [art] Derive CDI
3,054,899 UART: [art] Store in slot 0x4
3,140,602 UART: [art] Derive Key Pair
3,140,962 UART: [art] Store priv key in slot 0x5
3,154,482 UART: [art] Derive Key Pair - Done
3,168,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,881 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,646 UART: [art] PUB.X = 713F347E4CCCEC8B7A0B0DA137349AC5747C5570030A97A2614A545538CDA3D537F0AF2C054FBADC967D4C7B6A03D39B
3,192,410 UART: [art] PUB.Y = B778E9D75A686C74FF9B0DA5D9A5516D1078F8F301744D54A789FAF2D7E4F7B59F1A6E3DF5A5FC70432B9B13B93D80F9
3,199,366 UART: [art] SIG.R = 7E8BA474E033EAE9A0A6A73923D256B6F3CFC6C675062295118F034693D977BC363F75C518D0CD0C46E06A1A2A478476
3,206,127 UART: [art] SIG.S = C926678F53834031F17216B4354401CBA8774FD86500F900EA48B25A406A26AFE3756062AD8705E018FBE7066B150A0F
3,230,404 UART: Caliptra RT
3,230,655 UART: [state] CFI Enabled
3,350,462 UART: [rt] RT listening for mailbox commands...
3,351,132 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,352,348 UART:
3,352,364 UART: Running Caliptra ROM ...
3,352,772 UART:
3,352,827 UART: [state] CFI Enabled
3,355,445 UART: [state] LifecycleState = Unprovisioned
3,356,100 UART: [state] DebugLocked = No
3,356,736 UART: [state] WD Timer not started. Device not locked for debugging
3,357,880 UART: [kat] SHA2-256
4,161,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,165,534 UART: [kat] ++
4,165,686 UART: [kat] sha1
4,170,072 UART: [kat] SHA2-256
4,172,012 UART: [kat] SHA2-384
4,174,793 UART: [kat] SHA2-512-ACC
4,176,693 UART: [kat] ECC-384
4,186,230 UART: [kat] HMAC-384Kdf
4,190,836 UART: [kat] LMS
4,439,148 UART: [kat] --
4,440,078 UART: [update-reset] ++
5,388,976 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,390,071 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,491,712 >>> mbox cmd response: success
5,491,712 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,491,957 UART: [update-reset] Copying MAN_2 To MAN_1
5,499,971 UART: [update-reset Success] --
5,500,778 UART: [state] Locking Datavault
5,501,550 UART: [state] Locking PCR0, PCR1 and PCR31
5,502,154 UART: [state] Locking ICCM
5,502,800 UART: [exit] Launching FMC @ 0x40000130
5,508,130 UART:
5,508,146 UART: Running Caliptra FMC ...
5,508,554 UART:
5,508,608 UART: [state] CFI Enabled
5,597,517 UART: [art] Extend RT PCRs Done
5,597,945 UART: [art] Lock RT PCRs Done
5,599,344 UART: [art] Populate DV Done
5,607,587 UART: [fht] FMC Alias Private Key: 7
5,608,525 UART: [art] Derive CDI
5,608,805 UART: [art] Store in slot 0x4
5,694,982 UART: [art] Derive Key Pair
5,695,342 UART: [art] Store priv key in slot 0x5
5,708,786 UART: [art] Derive Key Pair - Done
5,723,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,739,300 UART: [art] Erasing AUTHORITY.KEYID = 7
5,740,065 UART: [art] PUB.X = 54FCE842D44111C2747C4A963C10277C30DAA232ACBE0499ADF6B2F8E2D2631D3B1A4524515F0712F893750DF7832447
5,746,824 UART: [art] PUB.Y = 4EF33484DFBECD0C18D50414040B01E46450745DAC3AAFA77A02A8C0F2087CADC1EC331106EB57EDCF7DB8375BFD1AC4
5,753,772 UART: [art] SIG.R = 1D7833414DC244E9EFE8F7AA4B679A75C702F040E30D098D8E63BDF7E133304F660B56F77F53413D5E79CE608DF9B911
5,760,534 UART: [art] SIG.S = 660558C91005AF883B75C1FDC7D641F7B00AAE2BAEEADE6329EFD840FCA55D2E996AECB84F1B7588CE3FB387D00D192E
5,784,728 UART: mbox::rt_entry...
5,785,100 UART: ____ _ _ _ ____ _____
5,785,884 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,786,684 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,787,452 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,788,220 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,788,988 UART: |_|
5,789,300 UART:
6,148,397 UART: [rt] Runtime listening for mailbox commands...
6,149,595 >>> mbox cmd response data (48 bytes)
6,149,596 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,149,704 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,958 ready_for_fw is high
1,058,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,882 >>> mbox cmd response: success
2,739,825 UART:
2,739,841 UART: Running Caliptra FMC ...
2,740,249 UART:
2,740,303 UART: [state] CFI Enabled
2,750,875 UART: [fht] FMC Alias Private Key: 7
2,869,407 UART: [art] Extend RT PCRs Done
2,869,835 UART: [art] Lock RT PCRs Done
2,871,413 UART: [art] Populate DV Done
2,879,712 UART: [fht] FMC Alias Private Key: 7
2,880,812 UART: [art] Derive CDI
2,881,092 UART: [art] Store in slot 0x4
2,966,945 UART: [art] Derive Key Pair
2,967,305 UART: [art] Store priv key in slot 0x5
2,980,531 UART: [art] Derive Key Pair - Done
2,995,213 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,222 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,987 UART: [art] PUB.X = DCF13B96456DD2107ABF5E51A5C9C65D3FED6E1F1AA254CE7B05F6D01296A30476D0F72195308B4D3E0245BCB67C4EA0
3,017,762 UART: [art] PUB.Y = BC01096C45D1D0F508D35860BE40276F22A093D836B5B19F7A8582139B23E9DCF2C746B9EAB130E7744B59D342BD6454
3,024,703 UART: [art] SIG.R = ED08432C993A9A26A8AD0F95B49D068B15EA6C58A4C6C00AB63ED703252BFB9F0EB8FDCE6B27DFC8240E042D43493488
3,031,463 UART: [art] SIG.S = 0306253CBD55C937BA5ABC142D6C4033FEE1548032CE3F1F6D94B5576A2C165E7C3B252CCBD3EC4DE4FE4DB366080888
3,054,573 UART: Caliptra RT
3,054,824 UART: [state] CFI Enabled
3,174,597 UART: [rt] RT listening for mailbox commands...
3,175,267 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,201,487 >>> mbox cmd response: success
5,201,487 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,214,764 UART:
5,214,780 UART: Running Caliptra FMC ...
5,215,188 UART:
5,215,242 UART: [state] CFI Enabled
5,304,323 UART: [art] Extend RT PCRs Done
5,304,751 UART: [art] Lock RT PCRs Done
5,306,052 UART: [art] Populate DV Done
5,314,445 UART: [fht] FMC Alias Private Key: 7
5,315,479 UART: [art] Derive CDI
5,315,759 UART: [art] Store in slot 0x4
5,401,560 UART: [art] Derive Key Pair
5,401,920 UART: [art] Store priv key in slot 0x5
5,415,108 UART: [art] Derive Key Pair - Done
5,429,807 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,445,012 UART: [art] Erasing AUTHORITY.KEYID = 7
5,445,777 UART: [art] PUB.X = 812E5546583677913A66218D2671770F8A9C25A56430B95111A91E2186229A0279C7AEAF35E2B0FA1BB3C7E80E92A506
5,452,525 UART: [art] PUB.Y = D7C2C8DF98B909076B0536C1EFB11C3A550B9410F062CE2A001A5CA8291B20084D3E5BDF8C2AFF87BF9638B8CE3C3D47
5,459,452 UART: [art] SIG.R = 14EF4F94BDCEE7B95EE6DA7BBC6CA70D71A09833191C061A53574B7AB66E770BC1975776A685C1A15859EB18020D7092
5,466,213 UART: [art] SIG.S = CDF476F3885D0438E3780C95EC6118FE4FD72C3A43BCC2059AE159869594DBAD701121F92C137F8B66306F17F9E50191
5,490,801 UART: mbox::rt_entry...
5,491,173 UART: ____ _ _ _ ____ _____
5,491,957 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,492,757 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,493,525 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,494,293 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,495,061 UART: |_|
5,495,373 UART:
5,858,617 UART: [rt] Runtime listening for mailbox commands...
5,859,815 >>> mbox cmd response data (48 bytes)
5,859,816 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,859,924 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,901 UART: [kat] SHA2-256
891,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,555 UART: [kat] ++
895,707 UART: [kat] sha1
899,987 UART: [kat] SHA2-256
901,927 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,208 UART: [kat] LMS
1,169,520 UART: [kat] --
1,170,357 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,313 UART: [idev] ++
1,173,481 UART: [idev] CDI.KEYID = 6
1,173,842 UART: [idev] SUBJECT.KEYID = 7
1,174,267 UART: [idev] UDS.KEYID = 0
1,174,613 ready_for_fw is high
1,174,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,876 UART: [idev] Erasing UDS.KEYID = 0
1,198,938 UART: [idev] Sha1 KeyId Algorithm
1,207,666 UART: [idev] --
1,208,591 UART: [ldev] ++
1,208,759 UART: [ldev] CDI.KEYID = 6
1,209,123 UART: [ldev] SUBJECT.KEYID = 5
1,209,550 UART: [ldev] AUTHORITY.KEYID = 7
1,210,013 UART: [ldev] FE.KEYID = 1
1,215,185 UART: [ldev] Erasing FE.KEYID = 1
1,241,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,903 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,615 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,653 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,599 UART: [fwproc] Recv command 0x46574c44
1,282,332 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,826 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,001 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,352 >>> mbox cmd response: success
2,826,430 UART: [afmc] ++
2,826,598 UART: [afmc] CDI.KEYID = 6
2,826,961 UART: [afmc] SUBJECT.KEYID = 7
2,827,387 UART: [afmc] AUTHORITY.KEYID = 5
2,863,592 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,715 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,464 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,174 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,055 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,756 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,557 UART: [afmc] --
2,906,376 UART: [cold-reset] --
2,907,270 UART: [state] Locking Datavault
2,908,241 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,845 UART: [state] Locking ICCM
2,909,495 UART: [exit] Launching FMC @ 0x40000130
2,914,825 UART:
2,914,841 UART: Running Caliptra FMC ...
2,915,249 UART:
2,915,392 UART: [state] CFI Enabled
2,926,022 UART: [fht] FMC Alias Private Key: 7
3,046,108 UART: [art] Extend RT PCRs Done
3,046,536 UART: [art] Lock RT PCRs Done
3,048,264 UART: [art] Populate DV Done
3,056,379 UART: [fht] FMC Alias Private Key: 7
3,057,409 UART: [art] Derive CDI
3,057,689 UART: [art] Store in slot 0x4
3,143,658 UART: [art] Derive Key Pair
3,144,018 UART: [art] Store priv key in slot 0x5
3,156,896 UART: [art] Derive Key Pair - Done
3,171,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,103 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,868 UART: [art] PUB.X = 845E24280D1AE0D559286CC9B57815BA9EA3C4A6D24B27CB10897BF7A787598363F66D3BD8E4C4F3CED1B3A73A439CF6
3,194,645 UART: [art] PUB.Y = 6934EC1DA9E29C761D40CF675B9E9B6A2B53EC6C775FEC64E96920222301B14F93F11F6F933BAB34F0B28A786CA9CBD9
3,201,604 UART: [art] SIG.R = D2EBC17035B5D8A22E36D9277C05C588C01DF087E0B41BDB33363BC375CDF5BBE6F1C68408CE5F677F528BD91DAC626C
3,208,384 UART: [art] SIG.S = 529BDB434CB9757160FE27914E3AFFC8D1B77AD4AAF401F07997BE86B8EA1552C46C224E9C373ACAEC93950C6534BE03
3,232,267 UART: Caliptra RT
3,232,610 UART: [state] CFI Enabled
3,352,437 UART: [rt] RT listening for mailbox commands...
3,353,107 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,187 UART:
3,354,203 UART: Running Caliptra ROM ...
3,354,611 UART:
3,354,753 UART: [state] CFI Enabled
3,357,575 UART: [state] LifecycleState = Unprovisioned
3,358,230 UART: [state] DebugLocked = No
3,358,774 UART: [state] WD Timer not started. Device not locked for debugging
3,360,122 UART: [kat] SHA2-256
4,163,672 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,776 UART: [kat] ++
4,167,928 UART: [kat] sha1
4,172,128 UART: [kat] SHA2-256
4,174,068 UART: [kat] SHA2-384
4,176,799 UART: [kat] SHA2-512-ACC
4,178,699 UART: [kat] ECC-384
4,188,260 UART: [kat] HMAC-384Kdf
4,192,808 UART: [kat] LMS
4,441,120 UART: [kat] --
4,441,944 UART: [update-reset] ++
5,391,214 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,392,259 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,493,900 >>> mbox cmd response: success
5,493,900 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,494,051 UART: [update-reset] Copying MAN_2 To MAN_1
5,502,065 UART: [update-reset Success] --
5,503,192 UART: [state] Locking Datavault
5,504,052 UART: [state] Locking PCR0, PCR1 and PCR31
5,504,656 UART: [state] Locking ICCM
5,505,118 UART: [exit] Launching FMC @ 0x40000130
5,510,448 UART:
5,510,464 UART: Running Caliptra FMC ...
5,510,872 UART:
5,511,015 UART: [state] CFI Enabled
5,600,070 UART: [art] Extend RT PCRs Done
5,600,498 UART: [art] Lock RT PCRs Done
5,601,973 UART: [art] Populate DV Done
5,610,176 UART: [fht] FMC Alias Private Key: 7
5,611,338 UART: [art] Derive CDI
5,611,618 UART: [art] Store in slot 0x4
5,697,673 UART: [art] Derive Key Pair
5,698,033 UART: [art] Store priv key in slot 0x5
5,711,853 UART: [art] Derive Key Pair - Done
5,726,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,741,701 UART: [art] Erasing AUTHORITY.KEYID = 7
5,742,466 UART: [art] PUB.X = 9C0C7EDFD59862EF9DE35126434C4A30C557BA38A8C5A65CEC6C875ADA62EDE48179A4CFBF7CDB31214B80D51598CE8B
5,749,253 UART: [art] PUB.Y = CCEB963F36C01B5B149C68A8AE589DD3FDCE821E7688B4BA8E8F96AC6694D8DB47173722B06533E23CB94172FD1F4E3A
5,756,217 UART: [art] SIG.R = 637DEC50C882A0B8EF34B911D641723651F907D8B12F41C49A155B7C8F8A7AD81AC3BC36790A91B37D9ACC104A3BC89D
5,762,991 UART: [art] SIG.S = 88A5F504129B665ACCD9EEB39379C7602BE2A84F41A13ECAD415C7FE1EDE2082C983AE359AA2EB8D8C39752875681E8E
5,786,704 UART: mbox::rt_entry...
5,787,076 UART: ____ _ _ _ ____ _____
5,787,860 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,788,660 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,789,428 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,790,196 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,790,964 UART: |_|
5,791,276 UART:
6,154,666 UART: [rt] Runtime listening for mailbox commands...
6,155,864 >>> mbox cmd response data (48 bytes)
6,155,865 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,155,973 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,299 ready_for_fw is high
1,059,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,499 >>> mbox cmd response: success
2,739,790 UART:
2,739,806 UART: Running Caliptra FMC ...
2,740,214 UART:
2,740,357 UART: [state] CFI Enabled
2,751,143 UART: [fht] FMC Alias Private Key: 7
2,869,753 UART: [art] Extend RT PCRs Done
2,870,181 UART: [art] Lock RT PCRs Done
2,871,639 UART: [art] Populate DV Done
2,879,742 UART: [fht] FMC Alias Private Key: 7
2,880,686 UART: [art] Derive CDI
2,880,966 UART: [art] Store in slot 0x4
2,966,483 UART: [art] Derive Key Pair
2,966,843 UART: [art] Store priv key in slot 0x5
2,979,695 UART: [art] Derive Key Pair - Done
2,994,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,609 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,374 UART: [art] PUB.X = 788AC63C81D6E2A1F05857FCDD8188BA6063609F4332CE1A8BE47EB3F16FC3D99E3F2E705D71067F8630AF70A8CC7A0D
3,017,150 UART: [art] PUB.Y = C526A8E6E72FD201F3D881C5CAA7629C798877C54AC3EE8CD04943A9E2D712F0490A48B0FF8CFB6D89FA00C6E45AB318
3,024,086 UART: [art] SIG.R = 734F68FE9FD8CB98B61FC4BDF59F3E9EC6B4B8DB807C33A78B8B4675FB6DCA5C74EC6F6600AC309850DFF490C7B68A19
3,030,856 UART: [art] SIG.S = 370B91B8C244E813A0589B6B564AD3CAAC25A6DA7A99ECC0B2E4AD20EC24A925621D74CA0897B529FD4F7BDD5162DBC0
3,055,326 UART: Caliptra RT
3,055,669 UART: [state] CFI Enabled
3,175,231 UART: [rt] RT listening for mailbox commands...
3,175,901 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,203,078 >>> mbox cmd response: success
5,203,078 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,216,579 UART:
5,216,595 UART: Running Caliptra FMC ...
5,217,003 UART:
5,217,146 UART: [state] CFI Enabled
5,306,749 UART: [art] Extend RT PCRs Done
5,307,177 UART: [art] Lock RT PCRs Done
5,308,538 UART: [art] Populate DV Done
5,316,769 UART: [fht] FMC Alias Private Key: 7
5,317,803 UART: [art] Derive CDI
5,318,083 UART: [art] Store in slot 0x4
5,403,742 UART: [art] Derive Key Pair
5,404,102 UART: [art] Store priv key in slot 0x5
5,417,396 UART: [art] Derive Key Pair - Done
5,432,057 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,447,188 UART: [art] Erasing AUTHORITY.KEYID = 7
5,447,953 UART: [art] PUB.X = AC0E751B6CD8A3243C7344E0150CD7732FAB6A2D37400B0AFA942C81BF333A785B7952591DC66F7EE2E1C598D3F07AE2
5,454,721 UART: [art] PUB.Y = E5452473551F033BF6975A663CF14ACCF18BDCB4197FCF73D9BF17E7010032D0F43C4A0C6DDF61C47E07944AC2B2067E
5,461,644 UART: [art] SIG.R = 16B89D7F07347206E36F9F8143B30432937FBAEBA43A1CEB1E9302DD83E7C944199A4572F09B197FBC10AA5F26E0A0BD
5,468,410 UART: [art] SIG.S = 3D0139FB1BA1087E9C9CCBA933F51EB9599C711387A703830A3212B6B72C643994352D47D18F23C1EE7396B926D1CC16
5,492,644 UART: mbox::rt_entry...
5,493,016 UART: ____ _ _ _ ____ _____
5,493,800 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,494,600 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,495,368 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,496,136 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,496,904 UART: |_|
5,497,216 UART:
5,863,313 UART: [rt] Runtime listening for mailbox commands...
5,864,511 >>> mbox cmd response data (48 bytes)
5,864,512 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,864,620 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,545 UART: [state] WD Timer not started. Device not locked for debugging
87,770 UART: [kat] SHA2-256
893,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,545 UART: [kat] ++
897,697 UART: [kat] sha1
901,949 UART: [kat] SHA2-256
903,889 UART: [kat] SHA2-384
906,696 UART: [kat] SHA2-512-ACC
908,597 UART: [kat] ECC-384
918,162 UART: [kat] HMAC-384Kdf
922,966 UART: [kat] LMS
1,171,294 UART: [kat] --
1,172,431 UART: [cold-reset] ++
1,172,845 UART: [fht] FHT @ 0x50003400
1,175,630 UART: [idev] ++
1,175,798 UART: [idev] CDI.KEYID = 6
1,176,158 UART: [idev] SUBJECT.KEYID = 7
1,176,582 UART: [idev] UDS.KEYID = 0
1,176,927 ready_for_fw is high
1,176,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,142 UART: [idev] Erasing UDS.KEYID = 0
1,202,057 UART: [idev] Sha1 KeyId Algorithm
1,210,469 UART: [idev] --
1,211,375 UART: [ldev] ++
1,211,543 UART: [ldev] CDI.KEYID = 6
1,211,906 UART: [ldev] SUBJECT.KEYID = 5
1,212,332 UART: [ldev] AUTHORITY.KEYID = 7
1,212,795 UART: [ldev] FE.KEYID = 1
1,218,311 UART: [ldev] Erasing FE.KEYID = 1
1,244,618 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,645 UART: [ldev] --
1,283,956 UART: [fwproc] Wait for Commands...
1,284,548 UART: [fwproc] Recv command 0x46574c44
1,285,276 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,113 >>> mbox cmd response: success
2,829,195 UART: [afmc] ++
2,829,363 UART: [afmc] CDI.KEYID = 6
2,829,725 UART: [afmc] SUBJECT.KEYID = 7
2,830,150 UART: [afmc] AUTHORITY.KEYID = 5
2,865,431 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,722 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,470 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,062 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,525 UART: [afmc] --
2,908,477 UART: [cold-reset] --
2,909,333 UART: [state] Locking Datavault
2,910,328 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,932 UART: [state] Locking ICCM
2,911,370 UART: [exit] Launching FMC @ 0x40000130
2,916,700 UART:
2,916,716 UART: Running Caliptra FMC ...
2,917,124 UART:
2,917,178 UART: [state] CFI Enabled
2,927,716 UART: [fht] FMC Alias Private Key: 7
3,046,884 UART: [art] Extend RT PCRs Done
3,047,312 UART: [art] Lock RT PCRs Done
3,048,366 UART: [art] Populate DV Done
3,056,465 UART: [fht] FMC Alias Private Key: 7
3,057,483 UART: [art] Derive CDI
3,057,763 UART: [art] Store in slot 0x4
3,143,724 UART: [art] Derive Key Pair
3,144,084 UART: [art] Store priv key in slot 0x5
3,156,626 UART: [art] Derive Key Pair - Done
3,171,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,394 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,159 UART: [art] PUB.X = F8CA90019BB16DFB117CA958C21B8268E684868C72A78C435776E936E01CC78571AB626FFBBF5D1812E1733530BC128B
3,193,928 UART: [art] PUB.Y = 9A566211DB641183182C2AC102B635F6AAE760C7C41D5384BD7662BAFF4818DE649CB8789E4465354A00DB9CCBCA2714
3,200,857 UART: [art] SIG.R = 0728BD3E9A8CE99AEE06A3E9741D4604855A037DBEE626A8C139737F2985D1A60EDA5D637E26FBC52F3318B7A40E4A01
3,207,614 UART: [art] SIG.S = 02E1670AE10604D512E384C452689C46D3CBB2AE488E9F9918831C19A49331F9BB95582EE25FF9DB6B7DACD8CF7229C8
3,231,968 UART: Caliptra RT
3,232,219 UART: [state] CFI Enabled
3,352,033 UART: [rt] RT listening for mailbox commands...
3,352,703 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,997 UART:
3,354,013 UART: Running Caliptra ROM ...
3,354,421 UART:
3,354,476 UART: [state] CFI Enabled
3,356,830 UART: [state] LifecycleState = Unprovisioned
3,357,485 UART: [state] DebugLocked = No
3,358,119 UART: [state] WD Timer not started. Device not locked for debugging
3,359,425 UART: [kat] SHA2-256
4,165,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,169,200 UART: [kat] ++
4,169,352 UART: [kat] sha1
4,173,576 UART: [kat] SHA2-256
4,175,516 UART: [kat] SHA2-384
4,178,483 UART: [kat] SHA2-512-ACC
4,180,383 UART: [kat] ECC-384
4,190,472 UART: [kat] HMAC-384Kdf
4,194,894 UART: [kat] LMS
4,443,222 UART: [kat] --
4,444,278 UART: [update-reset] ++
5,393,437 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,394,416 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,496,057 >>> mbox cmd response: success
5,496,057 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,496,366 UART: [update-reset] Copying MAN_2 To MAN_1
5,504,380 UART: [update-reset Success] --
5,505,399 UART: [state] Locking Datavault
5,506,223 UART: [state] Locking PCR0, PCR1 and PCR31
5,506,827 UART: [state] Locking ICCM
5,507,441 UART: [exit] Launching FMC @ 0x40000130
5,512,771 UART:
5,512,787 UART: Running Caliptra FMC ...
5,513,195 UART:
5,513,249 UART: [state] CFI Enabled
5,603,012 UART: [art] Extend RT PCRs Done
5,603,440 UART: [art] Lock RT PCRs Done
5,604,587 UART: [art] Populate DV Done
5,612,888 UART: [fht] FMC Alias Private Key: 7
5,613,826 UART: [art] Derive CDI
5,614,106 UART: [art] Store in slot 0x4
5,700,043 UART: [art] Derive Key Pair
5,700,403 UART: [art] Store priv key in slot 0x5
5,713,817 UART: [art] Derive Key Pair - Done
5,728,053 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,743,022 UART: [art] Erasing AUTHORITY.KEYID = 7
5,743,787 UART: [art] PUB.X = DF91E24138B985E3AFCFC6D9F0653BA6ED19A3E3B30C01AF7152747E399AACF6165BB09A2D1512A3C71C473544E6CBB4
5,750,565 UART: [art] PUB.Y = 7BA439F814300C9919BD6237EB2FB328F4989F8D3FEEB2BE54199838FF6017EE2157B29428E50DC37A79AA3D57558540
5,757,509 UART: [art] SIG.R = A50670E50D1BBC1216F9F2F40083C14E94482E3DBA54013129616B042ADC94DC9A7B3A1A15B0396496088E3DC54D6B33
5,764,242 UART: [art] SIG.S = C243599DA8385A34E2133EA27A76C37196C3D75B6510D09589522A7E17D8143BBF6E164CB13D72F7A6EF652324072A76
5,788,251 UART: mbox::rt_entry...
5,788,623 UART: ____ _ _ _ ____ _____
5,789,407 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,790,207 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,790,975 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,791,743 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,792,511 UART: |_|
5,792,823 UART:
6,157,046 UART: [rt] Runtime listening for mailbox commands...
6,158,244 >>> mbox cmd response data (48 bytes)
6,158,245 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,158,353 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,027 ready_for_fw is high
1,060,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,998 >>> mbox cmd response: success
2,741,727 UART:
2,741,743 UART: Running Caliptra FMC ...
2,742,151 UART:
2,742,205 UART: [state] CFI Enabled
2,753,053 UART: [fht] FMC Alias Private Key: 7
2,872,157 UART: [art] Extend RT PCRs Done
2,872,585 UART: [art] Lock RT PCRs Done
2,874,249 UART: [art] Populate DV Done
2,882,386 UART: [fht] FMC Alias Private Key: 7
2,883,318 UART: [art] Derive CDI
2,883,598 UART: [art] Store in slot 0x4
2,969,697 UART: [art] Derive Key Pair
2,970,057 UART: [art] Store priv key in slot 0x5
2,983,633 UART: [art] Derive Key Pair - Done
2,998,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,973 UART: [art] PUB.X = 858E93BB8B1453D73A0665B141C9E7D15CBE52681E3A79109A0EF432D9032CF204017D09E535043C76FD7A4F8E2E0678
3,021,717 UART: [art] PUB.Y = 37694B05983C8BCD6D66E896294FAE8E3D3354DD0225FD4A9316254E477BC7B91996CECA9625576C9BBD8C1B2765FC9F
3,028,667 UART: [art] SIG.R = A83AF8BC738289A8D164C0709EFCAAF258FA2DD174440891660AB017D21BB40F4204BCE83EBBA13019717784604A367B
3,035,429 UART: [art] SIG.S = A185EB9CC13D44D76B9125ACBFC6C5FFF88987484C57FBE74FED287D6B10A194D925BCA2754C37DEFAC8B29F1BE883D6
3,058,721 UART: Caliptra RT
3,058,972 UART: [state] CFI Enabled
3,178,732 UART: [rt] RT listening for mailbox commands...
3,179,402 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,208,823 >>> mbox cmd response: success
5,208,823 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,222,192 UART:
5,222,208 UART: Running Caliptra FMC ...
5,222,616 UART:
5,222,670 UART: [state] CFI Enabled
5,311,731 UART: [art] Extend RT PCRs Done
5,312,159 UART: [art] Lock RT PCRs Done
5,313,578 UART: [art] Populate DV Done
5,321,635 UART: [fht] FMC Alias Private Key: 7
5,322,783 UART: [art] Derive CDI
5,323,063 UART: [art] Store in slot 0x4
5,408,494 UART: [art] Derive Key Pair
5,408,854 UART: [art] Store priv key in slot 0x5
5,421,944 UART: [art] Derive Key Pair - Done
5,436,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,452,553 UART: [art] Erasing AUTHORITY.KEYID = 7
5,453,318 UART: [art] PUB.X = 540A5908EAA233BECB4693A1A4E927B5B614C67A08F238E36866A150F0B5D07E1E4F967A2E1558DCC5D0B8713EFF9D70
5,460,087 UART: [art] PUB.Y = 37D7E8F24192F1839974AB07DF20D227FCA5040693B2C1B1455F7B70567C54EEE800925AB8475932E4D4896FEE429F8D
5,467,004 UART: [art] SIG.R = E73D7E63CDEE95B2EA40DA7D8EC52E352E6C65FD6370A1333E7DE5990EFDB00BEE841C856120AE0DE338A7DC1438D723
5,473,783 UART: [art] SIG.S = 9A07B4CE4176FFD3B67962B57751797F3AF9E8674D409D8A73929636748DB872C683800F0DB556C8878FCABC2A6A75B3
5,497,604 UART: mbox::rt_entry...
5,497,976 UART: ____ _ _ _ ____ _____
5,498,760 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,499,560 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,500,328 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,501,096 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,501,864 UART: |_|
5,502,176 UART:
5,864,647 UART: [rt] Runtime listening for mailbox commands...
5,865,845 >>> mbox cmd response data (48 bytes)
5,865,846 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,865,954 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,235 UART: [kat] SHA2-256
893,885 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,010 UART: [kat] ++
898,162 UART: [kat] sha1
902,500 UART: [kat] SHA2-256
904,440 UART: [kat] SHA2-384
907,215 UART: [kat] SHA2-512-ACC
909,116 UART: [kat] ECC-384
918,831 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,412 UART: [cold-reset] ++
1,172,794 UART: [fht] FHT @ 0x50003400
1,175,417 UART: [idev] ++
1,175,585 UART: [idev] CDI.KEYID = 6
1,175,945 UART: [idev] SUBJECT.KEYID = 7
1,176,369 UART: [idev] UDS.KEYID = 0
1,176,714 ready_for_fw is high
1,176,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,701 UART: [idev] Erasing UDS.KEYID = 0
1,201,986 UART: [idev] Sha1 KeyId Algorithm
1,210,258 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,218,062 UART: [ldev] Erasing FE.KEYID = 1
1,244,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,138 UART: [ldev] --
1,283,449 UART: [fwproc] Wait for Commands...
1,284,049 UART: [fwproc] Recv command 0x46574c44
1,284,777 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,022 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,241 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,394 >>> mbox cmd response: success
2,828,624 UART: [afmc] ++
2,828,792 UART: [afmc] CDI.KEYID = 6
2,829,154 UART: [afmc] SUBJECT.KEYID = 7
2,829,579 UART: [afmc] AUTHORITY.KEYID = 5
2,865,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,839 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,587 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,296 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,179 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,880 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,534 UART: [afmc] --
2,908,658 UART: [cold-reset] --
2,909,188 UART: [state] Locking Datavault
2,910,447 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,051 UART: [state] Locking ICCM
2,911,653 UART: [exit] Launching FMC @ 0x40000130
2,916,983 UART:
2,916,999 UART: Running Caliptra FMC ...
2,917,407 UART:
2,917,550 UART: [state] CFI Enabled
2,928,090 UART: [fht] FMC Alias Private Key: 7
3,047,432 UART: [art] Extend RT PCRs Done
3,047,860 UART: [art] Lock RT PCRs Done
3,049,242 UART: [art] Populate DV Done
3,057,721 UART: [fht] FMC Alias Private Key: 7
3,058,689 UART: [art] Derive CDI
3,058,969 UART: [art] Store in slot 0x4
3,144,584 UART: [art] Derive Key Pair
3,144,944 UART: [art] Store priv key in slot 0x5
3,158,864 UART: [art] Derive Key Pair - Done
3,173,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,320 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,085 UART: [art] PUB.X = 815C15D061A1E8B4DA841C3B0DB8C2620DEC656CCDD3FF17339CF1701504F210ACE2F09641887C27C0E1B79AE7BB8226
3,196,856 UART: [art] PUB.Y = 3FF9DCD54514A1BA5AF5190718AD414A646855C21DE64998516D1550B877EBEB9976418F9AB76D473452C308970F72AC
3,203,795 UART: [art] SIG.R = 78C09E52F3379E176748CC56F9C2D8557445AB5571ADF2259BF239139A79C22887C3ECBC90D69F7D48B3B5A4566A4CC9
3,210,567 UART: [art] SIG.S = 866708CFB1D33E7E2E126E598877733D2262E1606E0765CFA825F34A4A3F001CD3E70BDFBBB7400B5B86547BF47AD69B
3,234,103 UART: Caliptra RT
3,234,446 UART: [state] CFI Enabled
3,354,435 UART: [rt] RT listening for mailbox commands...
3,355,105 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,297 UART:
3,356,313 UART: Running Caliptra ROM ...
3,356,721 UART:
3,356,863 UART: [state] CFI Enabled
3,359,943 UART: [state] LifecycleState = Unprovisioned
3,360,598 UART: [state] DebugLocked = No
3,361,210 UART: [state] WD Timer not started. Device not locked for debugging
3,362,496 UART: [kat] SHA2-256
4,168,146 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,172,271 UART: [kat] ++
4,172,423 UART: [kat] sha1
4,176,797 UART: [kat] SHA2-256
4,178,737 UART: [kat] SHA2-384
4,181,432 UART: [kat] SHA2-512-ACC
4,183,332 UART: [kat] ECC-384
4,192,525 UART: [kat] HMAC-384Kdf
4,197,233 UART: [kat] LMS
4,445,561 UART: [kat] --
4,446,497 UART: [update-reset] ++
5,396,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,397,809 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,499,450 >>> mbox cmd response: success
5,499,450 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,499,775 UART: [update-reset] Copying MAN_2 To MAN_1
5,507,789 UART: [update-reset Success] --
5,508,890 UART: [state] Locking Datavault
5,509,644 UART: [state] Locking PCR0, PCR1 and PCR31
5,510,248 UART: [state] Locking ICCM
5,510,772 UART: [exit] Launching FMC @ 0x40000130
5,516,102 UART:
5,516,118 UART: Running Caliptra FMC ...
5,516,526 UART:
5,516,669 UART: [state] CFI Enabled
5,606,090 UART: [art] Extend RT PCRs Done
5,606,518 UART: [art] Lock RT PCRs Done
5,607,617 UART: [art] Populate DV Done
5,615,540 UART: [fht] FMC Alias Private Key: 7
5,616,486 UART: [art] Derive CDI
5,616,766 UART: [art] Store in slot 0x4
5,702,621 UART: [art] Derive Key Pair
5,702,981 UART: [art] Store priv key in slot 0x5
5,716,175 UART: [art] Derive Key Pair - Done
5,731,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,746,937 UART: [art] Erasing AUTHORITY.KEYID = 7
5,747,702 UART: [art] PUB.X = 77C962F63711B4EE35A373B91EF46D63DACD40CAFBB667A176F7F51A2FDF1D7F304F74DC24FE60C95F2FE09190C60265
5,754,483 UART: [art] PUB.Y = E21516A9011CC8DB88FE7984EC25BA69B9F7396E25A8A3FC57F80E7A488189A8DAEFB8D493B866F09A1E4B188703EC99
5,761,434 UART: [art] SIG.R = 0F779C84EAEDBCF086A3A669AE872139BBC6D50F7475DE96EED296AA35E4D23EEC3D4AAB8F817459E550CDD118481BE9
5,768,218 UART: [art] SIG.S = 5106A825A7BCBDF179E71D0BF8F49B96F6FF115B9A2003005619F65F620E5C576E977F2A80EFE02F8107B3C0C3B99CED
5,791,657 UART: mbox::rt_entry...
5,792,029 UART: ____ _ _ _ ____ _____
5,792,813 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,793,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,794,381 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,795,149 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,795,917 UART: |_|
5,796,229 UART:
6,156,048 UART: [rt] Runtime listening for mailbox commands...
6,157,246 >>> mbox cmd response data (48 bytes)
6,157,247 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
6,157,355 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,022 ready_for_fw is high
1,060,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,265 >>> mbox cmd response: success
2,740,742 UART:
2,740,758 UART: Running Caliptra FMC ...
2,741,166 UART:
2,741,309 UART: [state] CFI Enabled
2,752,119 UART: [fht] FMC Alias Private Key: 7
2,871,763 UART: [art] Extend RT PCRs Done
2,872,191 UART: [art] Lock RT PCRs Done
2,873,637 UART: [art] Populate DV Done
2,882,030 UART: [fht] FMC Alias Private Key: 7
2,883,088 UART: [art] Derive CDI
2,883,368 UART: [art] Store in slot 0x4
2,968,901 UART: [art] Derive Key Pair
2,969,261 UART: [art] Store priv key in slot 0x5
2,982,907 UART: [art] Derive Key Pair - Done
2,997,697 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,731 UART: [art] PUB.X = 0305C074B2F0488199B9F8C82B5CD62B1D7EAD665C230A55140069FF2770D849CF2FD108F288F2E2014409BFB1CF7499
3,020,461 UART: [art] PUB.Y = 4220AA419541253C759CC869E8C3CF0A7B08C31903DA22FE9F55FCE35EC00B46213AB4374ABC0CAB17249D082E8A6F2E
3,027,403 UART: [art] SIG.R = E1154DC61AADB93ED85E69C19B807E214F6641E70AFE00E81BDD0CADA81589EE43EEDF1694B00315789B636C49A67383
3,034,152 UART: [art] SIG.S = 5ECF702A979A2FBFC3BC399307CF0AF2B1298687888C3D14E4B85964CFE984084CD2C75DEA25E7EDA3F26E0BA4C26AE8
3,057,716 UART: Caliptra RT
3,058,059 UART: [state] CFI Enabled
3,178,162 UART: [rt] RT listening for mailbox commands...
3,178,832 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,207,354 >>> mbox cmd response: success
5,207,354 <<< Executing mbox cmd 0x10000000 (0 bytes) from SoC
5,220,479 UART:
5,220,495 UART: Running Caliptra FMC ...
5,220,903 UART:
5,221,046 UART: [state] CFI Enabled
5,310,353 UART: [art] Extend RT PCRs Done
5,310,781 UART: [art] Lock RT PCRs Done
5,311,932 UART: [art] Populate DV Done
5,320,193 UART: [fht] FMC Alias Private Key: 7
5,321,173 UART: [art] Derive CDI
5,321,453 UART: [art] Store in slot 0x4
5,407,782 UART: [art] Derive Key Pair
5,408,142 UART: [art] Store priv key in slot 0x5
5,421,328 UART: [art] Derive Key Pair - Done
5,435,971 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,451,292 UART: [art] Erasing AUTHORITY.KEYID = 7
5,452,057 UART: [art] PUB.X = 34304D8A3B09448466B53C999EABF1A06FD56919A73134FF21826AEB2BBAC0C3E891B0E8F78FE2670BB932C033F3EDE5
5,458,831 UART: [art] PUB.Y = F6802BE5BA8A7A485B388D16E32B33DF69BF693B4ADA7FD5DF9C5DFA9B58753A439A9F512B6038A271BD159C249BD2AD
5,465,799 UART: [art] SIG.R = D177997CFE117E0BB689DF0D244CAE60E5E117680AD96E22C4FC657FB1CF37102A2E143A0B2DE735F44F2E8960BB084F
5,472,566 UART: [art] SIG.S = 6ABD6DD268544BF2B18D66E5AB6D91A060F1E94900CE74F7DAFEC63381B0B195720D14C25D0A47E0B93A7F68974AAF68
5,496,580 UART: mbox::rt_entry...
5,496,952 UART: ____ _ _ _ ____ _____
5,497,736 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,498,536 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,499,304 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,500,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,500,840 UART: |_|
5,501,152 UART:
5,866,160 UART: [rt] Runtime listening for mailbox commands...
5,867,358 >>> mbox cmd response data (48 bytes)
5,867,359 <<< Executing mbox cmd 0x60000000 (0 bytes) from SoC
5,867,467 >>> mbox cmd response data (48 bytes)
test test_update_reset::test_rt_journey_pcr_updated_in_dpe ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,200 UART:
192,545 UART: Running Caliptra ROM ...
193,735 UART:
193,888 UART: [state] CFI Enabled
266,325 UART: [state] LifecycleState = Unprovisioned
268,314 UART: [state] DebugLocked = No
269,711 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,371 UART: [kat] SHA2-256
444,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,605 UART: [kat] ++
455,085 UART: [kat] sha1
466,830 UART: [kat] SHA2-256
469,484 UART: [kat] SHA2-384
476,196 UART: [kat] SHA2-512-ACC
478,572 UART: [kat] ECC-384
2,767,149 UART: [kat] HMAC-384Kdf
2,778,971 UART: [kat] LMS
3,969,289 UART: [kat] --
3,974,784 UART: [cold-reset] ++
3,975,719 UART: [fht] Storing FHT @ 0x50003400
3,987,848 UART: [idev] ++
3,988,447 UART: [idev] CDI.KEYID = 6
3,989,334 UART: [idev] SUBJECT.KEYID = 7
3,990,653 UART: [idev] UDS.KEYID = 0
3,991,611 ready_for_fw is high
3,991,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,726 UART: [idev] Erasing UDS.KEYID = 0
7,326,621 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,630 UART: [idev] --
7,353,103 UART: [ldev] ++
7,353,681 UART: [ldev] CDI.KEYID = 6
7,354,648 UART: [ldev] SUBJECT.KEYID = 5
7,355,859 UART: [ldev] AUTHORITY.KEYID = 7
7,357,141 UART: [ldev] FE.KEYID = 1
7,400,119 UART: [ldev] Erasing FE.KEYID = 1
10,732,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,665 UART: [ldev] --
13,092,388 UART: [fwproc] Waiting for Commands...
13,095,132 UART: [fwproc] Received command 0x46574c44
13,097,368 UART: [fwproc] Received Image of size 118548 bytes
17,197,637 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,276,023 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,349,170 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,678,104 >>> mbox cmd response: success
17,682,316 UART: [afmc] ++
17,682,933 UART: [afmc] CDI.KEYID = 6
17,683,845 UART: [afmc] SUBJECT.KEYID = 7
17,685,067 UART: [afmc] AUTHORITY.KEYID = 5
21,049,321 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,350,316 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,352,576 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,367,044 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,381,774 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,396,170 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,418,867 UART: [afmc] --
23,421,813 UART: [cold-reset] --
23,424,705 UART: [state] Locking Datavault
23,430,455 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,207 UART: [state] Locking ICCM
23,435,006 UART: [exit] Launching FMC @ 0x40000130
23,443,407 UART:
23,443,650 UART: Running Caliptra FMC ...
23,444,750 UART:
23,444,913 UART: [state] CFI Enabled
23,509,801 UART: [fht] FMC Alias Private Key: 7
25,850,202 UART: [art] Extend RT PCRs Done
25,851,423 UART: [art] Lock RT PCRs Done
25,852,723 UART: [art] Populate DV Done
25,858,188 UART: [fht] FMC Alias Private Key: 7
25,859,724 UART: [art] Derive CDI
25,860,540 UART: [art] Store in slot 0x4
25,918,118 UART: [art] Derive Key Pair
25,919,175 UART: [art] Store priv key in slot 0x5
29,212,409 UART: [art] Derive Key Pair - Done
29,225,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,513,006 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,521 UART: [art] PUB.X = 11A08AC8A2B4B5B6FBF5568584E4DD5E8B2E49E26FA47B42AD61CBD861B0AA29FA632EE84894B8D4AA13630F5CD9410F
31,521,763 UART: [art] PUB.Y = E2B944618E11EF656C2B77A747DA959C5451E4375724F107E1B407305E92879507F3382D91B913394983F827A636368E
31,528,991 UART: [art] SIG.R = 523C4CF7604BF641C493B1E2412A10C2191B42EA9FFFFD1CD2F2D830CE34170129C9F944DAD991670C9637EA75981761
31,536,381 UART: [art] SIG.S = 40C5D4814F11BA2A1C0C5EE1BEE95CA063C3A23DB71BC10435334F7C22FBC17A2EC338F15FC76B9BE6C17C518A8BD1EC
32,841,640 UART: Caliptra RT
32,842,354 UART: [state] CFI Enabled
33,018,428 UART: [rt] RT listening for mailbox commands...
33,020,528 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,050,362 UART: [rt]cmd =0x54514754, len=24
33,052,996 >>> mbox cmd response data (8 bytes)
35,120,171 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,226,160 UART:
35,226,521 UART: Running Caliptra ROM ...
35,227,665 UART:
35,227,840 UART: [state] CFI Enabled
35,285,232 UART: [state] LifecycleState = Unprovisioned
35,287,169 UART: [state] DebugLocked = No
35,289,422 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,293,401 UART: [kat] SHA2-256
35,463,098 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,473,628 UART: [kat] ++
35,474,169 UART: [kat] sha1
35,484,364 UART: [kat] SHA2-256
35,487,057 UART: [kat] SHA2-384
35,493,227 UART: [kat] SHA2-512-ACC
35,495,627 UART: [kat] ECC-384
37,790,296 UART: [kat] HMAC-384Kdf
37,822,567 UART: [kat] LMS
39,012,936 UART: [kat] --
39,017,980 UART: [update-reset] ++
42,778,647 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,782,287 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
43,054,983 >>> mbox cmd response: success
43,055,403 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,057,004 UART: [update-reset] Copying MAN_2 To MAN_1
43,079,447 UART: [update-reset Success] --
43,082,228 UART: [state] Locking Datavault
43,085,321 UART: [state] Locking PCR0, PCR1 and PCR31
43,087,076 UART: [state] Locking ICCM
43,088,906 UART: [exit] Launching FMC @ 0x40000130
43,097,335 UART:
43,097,580 UART: Running Caliptra FMC ...
43,098,690 UART:
43,098,845 UART: [state] CFI Enabled
43,188,416 UART: [art] Extend RT PCRs Done
43,189,612 UART: [art] Lock RT PCRs Done
43,191,119 UART: [art] Populate DV Done
43,196,524 UART: [fht] FMC Alias Private Key: 7
43,198,064 UART: [art] Derive CDI
43,198,940 UART: [art] Store in slot 0x4
43,256,548 UART: [art] Derive Key Pair
43,257,550 UART: [art] Store priv key in slot 0x5
46,549,572 UART: [art] Derive Key Pair - Done
46,562,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,850,425 UART: [art] Erasing AUTHORITY.KEYID = 7
48,851,948 UART: [art] PUB.X = 8C141DE1EC19093EB7B02AC4F79CBC7AD256CFABC3E1CCD77421344281081E4B922BF9049ED9F75F6ED62F9BBF618E02
48,859,284 UART: [art] PUB.Y = 1CAC5EEC5A9E1D6BF31E9DAC223A8530ED1E3127EBC7EBF62DFBD54E3E54E8437F5A55875A4D8200B68DA0B42357B169
48,866,488 UART: [art] SIG.R = F22CCD9E4DA756887258AB990917467A70D03660B2F44955262226E8F5345131F12D9A26239A190B76FFE7F94CE23145
48,873,888 UART: [art] SIG.S = 2464F0ADEE205E599509AF99F9A07B621BDC5C6850B524D86064E8DAC3694948EB05A80C343D99A8963ED327AEC3AAAA
50,178,745 UART: mbox::rt_entry...
50,179,699 UART: ____ _ _ _ ____ _____
50,181,629 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,183,634 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,185,490 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,187,414 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,189,292 UART: |_|
50,190,173 UART:
50,561,522 UART: [rt] Runtime listening for mailbox commands...
50,563,765 >>> mbox cmd response data (160 bytes)
52,630,683 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,735,761 UART:
52,736,114 UART: Running Caliptra ROM ...
52,737,162 UART:
52,737,313 UART: [state] CFI Enabled
52,795,997 UART: [state] LifecycleState = Unprovisioned
52,797,932 UART: [state] DebugLocked = No
52,800,575 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,805,747 UART: [kat] SHA2-256
52,975,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,985,966 UART: [kat] ++
52,986,508 UART: [kat] sha1
52,997,617 UART: [kat] SHA2-256
53,000,317 UART: [kat] SHA2-384
53,005,503 UART: [kat] SHA2-512-ACC
53,007,877 UART: [kat] ECC-384
55,298,254 UART: [kat] HMAC-384Kdf
55,330,846 UART: [kat] LMS
56,521,179 UART: [kat] --
56,525,120 UART: [update-reset] ++
60,275,308 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,278,161 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,550,853 >>> mbox cmd response: success
60,551,214 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,552,303 UART: [update-reset] Copying MAN_2 To MAN_1
60,574,682 UART: [update-reset Success] --
60,580,104 UART: [state] Locking Datavault
60,582,278 UART: [state] Locking PCR0, PCR1 and PCR31
60,584,029 UART: [state] Locking ICCM
60,585,782 UART: [exit] Launching FMC @ 0x40000130
60,594,171 UART:
60,594,424 UART: Running Caliptra FMC ...
60,595,524 UART:
60,595,680 UART: [state] CFI Enabled
60,695,150 UART: [art] Extend RT PCRs Done
60,696,334 UART: [art] Lock RT PCRs Done
60,697,662 UART: [art] Populate DV Done
60,702,845 UART: [fht] FMC Alias Private Key: 7
60,704,474 UART: [art] Derive CDI
60,705,219 UART: [art] Store in slot 0x4
60,764,389 UART: [art] Derive Key Pair
60,765,387 UART: [art] Store priv key in slot 0x5
64,058,055 UART: [art] Derive Key Pair - Done
64,071,004 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,358,657 UART: [art] Erasing AUTHORITY.KEYID = 7
66,360,169 UART: [art] PUB.X = 1BCD7FC5018B3142F8A852409639FB4D6A29B494CC64E94D707A3B009BF503C33B79F287FFD360C070C513198F658C0F
66,367,414 UART: [art] PUB.Y = A8A145EDDE38E600BAD533E669642F51DB444CB6F84282CADD5346B597C3EC86F9819F1E43A549D5686F81544ECD30F9
66,374,658 UART: [art] SIG.R = E04110CB09D8C7291E7AE3AA0AD8EBF2DA6FD584FC239E7AFF71520C68314FE2909FB793B29D20122140C0F451207651
66,382,248 UART: [art] SIG.S = 81F8C2ADB0ACAAC1EFE40B7868A6A45BF88AC0F604BDE0CE58DC7CD84E7B919A9C75DB1D0A12BAC8E7F3E2BFD573F938
67,687,061 UART: mbox::rt_entry...
67,688,041 UART: ____ _ _ _ ____ _____
67,690,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,692,057 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,693,990 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,695,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,697,840 UART: |_|
67,698,821 UART:
68,069,947 UART: [rt] Runtime listening for mailbox commands...
68,072,175 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,793,375 ready_for_fw is high
3,793,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,929,256 >>> mbox cmd response: success
23,622,582 UART:
23,622,996 UART: Running Caliptra FMC ...
23,624,121 UART:
23,624,283 UART: [state] CFI Enabled
23,674,851 UART: [fht] FMC Alias Private Key: 7
26,015,603 UART: [art] Extend RT PCRs Done
26,016,837 UART: [art] Lock RT PCRs Done
26,018,525 UART: [art] Populate DV Done
26,024,010 UART: [fht] FMC Alias Private Key: 7
26,025,718 UART: [art] Derive CDI
26,026,535 UART: [art] Store in slot 0x4
26,083,277 UART: [art] Derive Key Pair
26,084,327 UART: [art] Store priv key in slot 0x5
29,376,932 UART: [art] Derive Key Pair - Done
29,389,984 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,678,549 UART: [art] Erasing AUTHORITY.KEYID = 7
31,680,056 UART: [art] PUB.X = 8A2C59B106A6824592C0FE5B09D9D32CE05CA6197EE0588DE44B8B8B0703D7401EE6A91DC98A3819704D7EC6C0B0C4C0
31,687,311 UART: [art] PUB.Y = 6D2E953E7B5CBF79BF74DF84ACF6FB6A79FC9D274846B66599996F45CC31315D24B96328BFDE7ED937D452638EF16D2D
31,694,550 UART: [art] SIG.R = F193D630627FFD037B5FF29F9441395BD9F228762BBF4FCE5E906742713367C55F66231AF60DBC11E991E95396105275
31,701,950 UART: [art] SIG.S = 7E2A0C74DA71DEA091567C3D2D20A19D99EA686F24B5F3FFC9F96AAB70C3341EF0759804E891A116535C2EA272D70E5E
33,006,735 UART: Caliptra RT
33,007,441 UART: [state] CFI Enabled
33,182,969 UART: [rt] RT listening for mailbox commands...
33,185,287 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,215,336 UART: [rt]cmd =0x54514754, len=24
33,218,254 >>> mbox cmd response data (8 bytes)
35,288,797 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,333,979 >>> mbox cmd response: success
43,334,539 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,371,140 UART:
43,371,468 UART: Running Caliptra FMC ...
43,372,505 UART:
43,372,683 UART: [state] CFI Enabled
43,479,198 UART: [art] Extend RT PCRs Done
43,480,385 UART: [art] Lock RT PCRs Done
43,481,530 UART: [art] Populate DV Done
43,487,059 UART: [fht] FMC Alias Private Key: 7
43,488,708 UART: [art] Derive CDI
43,489,445 UART: [art] Store in slot 0x4
43,547,808 UART: [art] Derive Key Pair
43,548,848 UART: [art] Store priv key in slot 0x5
46,841,367 UART: [art] Derive Key Pair - Done
46,854,426 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
49,142,579 UART: [art] Erasing AUTHORITY.KEYID = 7
49,144,092 UART: [art] PUB.X = 90FEF0AF76EAA0395DD467BAA7A6902E3A3E690F8440FEDC5EE76829C9B071DE6F3AE3F1B92A6AAB76FBDD0FE0F21A0B
49,151,398 UART: [art] PUB.Y = 4CE3E050B87C4A83ACA5314247F52B3F1220E628CB29DC2FD30B0FA70B98C580B3F9D33F9B321DDFCC5E1B58B8DDE27E
49,158,675 UART: [art] SIG.R = 8685A91B971D29BE0DD0914BD260A771E2DC7E084856501BB518FABA1B26BB17CE9B81E5783F16DD61E6ECE7E8B21771
49,166,068 UART: [art] SIG.S = 7808F32942F7DBC8AF1F41C249C8E8AA501B174A0EDC1AB193AB39EAEDAD3C5163C56B6AED4493D8474D157471B04F55
50,470,768 UART: mbox::rt_entry...
50,471,736 UART: ____ _ _ _ ____ _____
50,473,675 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,475,683 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,477,613 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,479,543 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,481,469 UART: |_|
50,482,450 UART:
50,857,180 UART: [rt] Runtime listening for mailbox commands...
50,859,450 >>> mbox cmd response data (160 bytes)
52,927,412 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,976,813 >>> mbox cmd response: success
60,977,325 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
61,012,289 UART:
61,012,585 UART: Running Caliptra FMC ...
61,013,705 UART:
61,013,872 UART: [state] CFI Enabled
61,115,866 UART: [art] Extend RT PCRs Done
61,117,058 UART: [art] Lock RT PCRs Done
61,118,574 UART: [art] Populate DV Done
61,124,258 UART: [fht] FMC Alias Private Key: 7
61,125,795 UART: [art] Derive CDI
61,126,607 UART: [art] Store in slot 0x4
61,185,074 UART: [art] Derive Key Pair
61,186,072 UART: [art] Store priv key in slot 0x5
64,478,494 UART: [art] Derive Key Pair - Done
64,491,292 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,779,039 UART: [art] Erasing AUTHORITY.KEYID = 7
66,780,565 UART: [art] PUB.X = B7C16756BA1DBCD3B72A0A9459C46AAAC3BA5ED83DFE342031958D573C67FF049FC5A14B87129D6B268F889DA95F4699
66,787,891 UART: [art] PUB.Y = FFB550F05ACCFC03896BFFA046C1985BE13D5EE43FD29B317BB3DA3C17331ABF523F71FF41F944482C846696C0F2C556
66,795,130 UART: [art] SIG.R = DB5FB280C47B64AE70023633F80C5B52FC9A791F1FA22AC8F34485010ACD18346560F2F91F767AE51B3E54ADD4160A7E
66,802,528 UART: [art] SIG.S = B5465DAA12FBB035A8B675061485784BABE09A4E98C9A260DCDC5279279495CC0F0ED96F65F619DAE442F4B99020B220
68,107,129 UART: mbox::rt_entry...
68,108,087 UART: ____ _ _ _ ____ _____
68,110,071 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
68,112,076 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
68,114,011 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
68,115,940 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
68,117,861 UART: |_|
68,118,668 UART:
68,490,053 UART: [rt] Runtime listening for mailbox commands...
68,492,331 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,536 UART:
192,899 UART: Running Caliptra ROM ...
194,082 UART:
603,782 UART: [state] CFI Enabled
619,297 UART: [state] LifecycleState = Unprovisioned
621,162 UART: [state] DebugLocked = No
623,884 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,599 UART: [kat] SHA2-256
798,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,891 UART: [kat] ++
809,332 UART: [kat] sha1
819,847 UART: [kat] SHA2-256
822,566 UART: [kat] SHA2-384
829,061 UART: [kat] SHA2-512-ACC
831,432 UART: [kat] ECC-384
3,115,319 UART: [kat] HMAC-384Kdf
3,126,530 UART: [kat] LMS
4,316,628 UART: [kat] --
4,322,760 UART: [cold-reset] ++
4,324,557 UART: [fht] Storing FHT @ 0x50003400
4,335,820 UART: [idev] ++
4,336,449 UART: [idev] CDI.KEYID = 6
4,337,356 UART: [idev] SUBJECT.KEYID = 7
4,338,595 UART: [idev] UDS.KEYID = 0
4,339,675 ready_for_fw is high
4,339,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,810 UART: [idev] Erasing UDS.KEYID = 0
7,627,702 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,299 UART: [idev] --
7,653,689 UART: [ldev] ++
7,654,254 UART: [ldev] CDI.KEYID = 6
7,655,217 UART: [ldev] SUBJECT.KEYID = 5
7,656,423 UART: [ldev] AUTHORITY.KEYID = 7
7,657,703 UART: [ldev] FE.KEYID = 1
7,670,661 UART: [ldev] Erasing FE.KEYID = 1
10,960,023 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,626 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,425 UART: [ldev] --
13,321,255 UART: [fwproc] Waiting for Commands...
13,323,988 UART: [fwproc] Received command 0x46574c44
13,326,219 UART: [fwproc] Received Image of size 118548 bytes
17,429,385 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,507,766 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,957 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,908,661 >>> mbox cmd response: success
17,912,052 UART: [afmc] ++
17,912,669 UART: [afmc] CDI.KEYID = 6
17,913,614 UART: [afmc] SUBJECT.KEYID = 7
17,914,831 UART: [afmc] AUTHORITY.KEYID = 5
21,223,567 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,042 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,350 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,480 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,560,870 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,582,370 UART: [afmc] --
23,586,882 UART: [cold-reset] --
23,590,685 UART: [state] Locking Datavault
23,594,806 UART: [state] Locking PCR0, PCR1 and PCR31
23,596,550 UART: [state] Locking ICCM
23,598,326 UART: [exit] Launching FMC @ 0x40000130
23,606,736 UART:
23,606,977 UART: Running Caliptra FMC ...
23,608,001 UART:
23,608,151 UART: [state] CFI Enabled
23,616,195 UART: [fht] FMC Alias Private Key: 7
25,956,255 UART: [art] Extend RT PCRs Done
25,957,473 UART: [art] Lock RT PCRs Done
25,959,182 UART: [art] Populate DV Done
25,964,807 UART: [fht] FMC Alias Private Key: 7
25,966,340 UART: [art] Derive CDI
25,967,068 UART: [art] Store in slot 0x4
26,009,645 UART: [art] Derive Key Pair
26,010,693 UART: [art] Store priv key in slot 0x5
29,252,752 UART: [art] Derive Key Pair - Done
29,265,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,545,988 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,333 UART: [art] PUB.X = C8954DA5E228C48FBD9ECDC899E7B90B8230B1999C75F9E0DFD4EB93B4D1CE6D5E5430F03ED6EDC445844D61E276DB16
31,554,838 UART: [art] PUB.Y = 27BE917F17BD3E08B01EE20593B9627563281F6DF6F540BA19F9CDD130ABD34C1CCDDFD540BE97FE6B3895135C1DCBD0
31,562,121 UART: [art] SIG.R = 5D54F37546B683BA0401AAAA27C3ACD3F1A8624C55B12C113941B12739BD7CB38BAAC20BF551BD3110BC8AD6ED295979
31,569,507 UART: [art] SIG.S = 9F8B06951F1BEE3EA66FADB33E365791F8E1A82EEA32989840ACA865843C1559644E937C3095275F7095539668D849EC
32,874,809 UART: Caliptra RT
32,876,005 UART: [state] CFI Enabled
33,009,952 UART: [rt] RT listening for mailbox commands...
33,012,819 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,043,008 UART: [rt]cmd =0x54514754, len=24
33,045,626 >>> mbox cmd response data (8 bytes)
35,121,986 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,228,642 UART:
35,229,405 UART: Running Caliptra ROM ...
35,230,517 UART:
35,230,679 UART: [state] CFI Enabled
35,245,880 UART: [state] LifecycleState = Unprovisioned
35,247,834 UART: [state] DebugLocked = No
35,250,836 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
35,256,215 UART: [kat] SHA2-256
35,425,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
35,436,464 UART: [kat] ++
35,436,947 UART: [kat] sha1
35,448,358 UART: [kat] SHA2-256
35,451,068 UART: [kat] SHA2-384
35,457,167 UART: [kat] SHA2-512-ACC
35,459,533 UART: [kat] ECC-384
37,743,359 UART: [kat] HMAC-384Kdf
37,755,284 UART: [kat] LMS
38,945,377 UART: [kat] --
38,950,948 UART: [update-reset] ++
42,709,166 UART: [update-reset] Image verified using Vendor ECC Key Index 0
42,713,434 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
42,986,191 >>> mbox cmd response: success
42,986,635 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
42,986,933 UART: [update-reset] Copying MAN_2 To MAN_1
43,008,876 UART: [update-reset Success] --
43,013,490 UART: [state] Locking Datavault
43,016,248 UART: [state] Locking PCR0, PCR1 and PCR31
43,017,946 UART: [state] Locking ICCM
43,020,302 UART: [exit] Launching FMC @ 0x40000130
43,028,749 UART:
43,029,000 UART: Running Caliptra FMC ...
43,030,110 UART:
43,030,266 UART: [state] CFI Enabled
43,073,963 UART: [art] Extend RT PCRs Done
43,075,153 UART: [art] Lock RT PCRs Done
43,076,599 UART: [art] Populate DV Done
43,082,004 UART: [fht] FMC Alias Private Key: 7
43,083,645 UART: [art] Derive CDI
43,084,541 UART: [art] Store in slot 0x4
43,126,506 UART: [art] Derive Key Pair
43,127,547 UART: [art] Store priv key in slot 0x5
46,369,236 UART: [art] Derive Key Pair - Done
46,382,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,662,383 UART: [art] Erasing AUTHORITY.KEYID = 7
48,663,890 UART: [art] PUB.X = 6CEDCB1DAB32E8FCE66668546FA9A1BB75955293DF8CBC55F19317E67A9E3CE9E9B3CF3C9A7D8E8F683B6400A96E8207
48,671,183 UART: [art] PUB.Y = 823DA1B3664F81C0EBCA95A82E6BC5CCC5CBF27B0D8814D3E649CCED1C9C91AF2E9A24A8F469D2F9B2D8A488E32E61ED
48,678,479 UART: [art] SIG.R = F87F9759D568CCF43643FC9B54926E707E3B82222F59D2F2FBABCED78AB12F25D8F2287E570B6BE7A95243E4D97834B7
48,685,871 UART: [art] SIG.S = 984E006E84E508D65324CFAD778B9C8393A67E671EB18054563C72332523A8D82BAF9AE87EF3385AB556961C036C267F
49,990,730 UART: mbox::rt_entry...
49,991,696 UART: ____ _ _ _ ____ _____
49,993,621 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
49,995,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
49,997,761 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
49,999,695 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,001,621 UART: |_|
50,002,430 UART:
50,377,438 UART: [rt] Runtime listening for mailbox commands...
50,379,713 >>> mbox cmd response data (160 bytes)
52,442,526 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
52,547,528 UART:
52,547,871 UART: Running Caliptra ROM ...
52,548,924 UART:
52,549,183 UART: [state] CFI Enabled
52,566,004 UART: [state] LifecycleState = Unprovisioned
52,567,951 UART: [state] DebugLocked = No
52,570,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
52,575,605 UART: [kat] SHA2-256
52,745,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
52,755,903 UART: [kat] ++
52,756,370 UART: [kat] sha1
52,766,766 UART: [kat] SHA2-256
52,769,453 UART: [kat] SHA2-384
52,775,645 UART: [kat] SHA2-512-ACC
52,777,996 UART: [kat] ECC-384
55,061,682 UART: [kat] HMAC-384Kdf
55,074,352 UART: [kat] LMS
56,264,417 UART: [kat] --
56,267,924 UART: [update-reset] ++
60,017,249 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,020,975 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
60,293,747 >>> mbox cmd response: success
60,294,115 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,294,388 UART: [update-reset] Copying MAN_2 To MAN_1
60,316,490 UART: [update-reset Success] --
60,318,437 UART: [state] Locking Datavault
60,321,863 UART: [state] Locking PCR0, PCR1 and PCR31
60,323,612 UART: [state] Locking ICCM
60,325,286 UART: [exit] Launching FMC @ 0x40000130
60,333,671 UART:
60,333,900 UART: Running Caliptra FMC ...
60,335,014 UART:
60,335,171 UART: [state] CFI Enabled
60,379,502 UART: [art] Extend RT PCRs Done
60,380,640 UART: [art] Lock RT PCRs Done
60,382,079 UART: [art] Populate DV Done
60,387,533 UART: [fht] FMC Alias Private Key: 7
60,389,228 UART: [art] Derive CDI
60,390,032 UART: [art] Store in slot 0x4
60,432,683 UART: [art] Derive Key Pair
60,433,726 UART: [art] Store priv key in slot 0x5
63,675,586 UART: [art] Derive Key Pair - Done
63,688,650 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
65,969,126 UART: [art] Erasing AUTHORITY.KEYID = 7
65,970,629 UART: [art] PUB.X = A22DC8B4456581F4B0BD4FBB43020280FE1E341AB3464E55915FF2D57A7B9BCC27341190DF5F953753FE5C07D54539E6
65,977,922 UART: [art] PUB.Y = 8AE7AA214AC0443819A6CA16983F04713A6C0CF98839B95774C83C2301909ECD6A39FABE31413DBC44E9A3A73D1DA967
65,985,191 UART: [art] SIG.R = 242129CD42F19A80022617D07B7BC8C4E0C5B87E0F8C3379CC1F700FDEA5FB89AA4A0066257D81F6F46812E054FC7714
65,992,583 UART: [art] SIG.S = 6436E7382F7C1219099B953AD282A898073E58B06107B45A01125079B27D30639610A7C5118E9F277C645866CA518474
67,297,426 UART: mbox::rt_entry...
67,298,383 UART: ____ _ _ _ ____ _____
67,300,308 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,302,305 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,304,153 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,306,072 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,307,950 UART: |_|
67,308,770 UART:
67,684,154 UART: [rt] Runtime listening for mailbox commands...
67,686,402 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
4,122,407 ready_for_fw is high
4,122,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,162,504 >>> mbox cmd response: success
23,798,186 UART:
23,798,615 UART: Running Caliptra FMC ...
23,799,751 UART:
23,799,915 UART: [state] CFI Enabled
23,807,707 UART: [fht] FMC Alias Private Key: 7
26,147,266 UART: [art] Extend RT PCRs Done
26,148,503 UART: [art] Lock RT PCRs Done
26,150,099 UART: [art] Populate DV Done
26,155,739 UART: [fht] FMC Alias Private Key: 7
26,157,330 UART: [art] Derive CDI
26,158,063 UART: [art] Store in slot 0x4
26,201,148 UART: [art] Derive Key Pair
26,202,190 UART: [art] Store priv key in slot 0x5
29,444,073 UART: [art] Derive Key Pair - Done
29,457,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,737,305 UART: [art] Erasing AUTHORITY.KEYID = 7
31,738,813 UART: [art] PUB.X = C8A00CAFDEC8EEB0E4372A68647399737733A78027C9258D2F3B141FEEB26F4D07F6B65D6CE1ED5EE2EB7948177E0161
31,746,086 UART: [art] PUB.Y = 3C2C1FDA61FA81359498512534C77EAEF5C8812CEF6E8E332ABBD584380CF60264CE8FE69A0FA044FD22B3125F5A5F3D
31,753,346 UART: [art] SIG.R = 03CFFC73629874A324B560DC8018E1168ECDC08E2773E68D6B49FEE111171D581C4753A36A615D20A2A4CB6CEC43B367
31,760,738 UART: [art] SIG.S = EEFDC832D3AAA999C0A3B36CE281784FBC8902C9502100186F1E9485CCE0448EE1DA3E63819FEBB54FE76DFF49099C63
33,066,024 UART: Caliptra RT
33,066,738 UART: [state] CFI Enabled
33,199,954 UART: [rt] RT listening for mailbox commands...
33,202,210 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,232,349 UART: [rt]cmd =0x54514754, len=24
33,235,098 >>> mbox cmd response data (8 bytes)
35,302,351 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,275,139 >>> mbox cmd response: success
43,275,636 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
43,310,690 UART:
43,311,015 UART: Running Caliptra FMC ...
43,312,084 UART:
43,312,236 UART: [state] CFI Enabled
43,357,170 UART: [art] Extend RT PCRs Done
43,358,311 UART: [art] Lock RT PCRs Done
43,359,963 UART: [art] Populate DV Done
43,365,207 UART: [fht] FMC Alias Private Key: 7
43,366,797 UART: [art] Derive CDI
43,367,607 UART: [art] Store in slot 0x4
43,410,041 UART: [art] Derive Key Pair
43,411,068 UART: [art] Store priv key in slot 0x5
46,653,368 UART: [art] Derive Key Pair - Done
46,666,479 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
48,946,704 UART: [art] Erasing AUTHORITY.KEYID = 7
48,948,220 UART: [art] PUB.X = BF619F17EAA042ED4C44935A1C2136F1E0B9E445208C22C56BD07878DCBA518B02F9109AF649CBAE27C2962188FBA6F4
48,955,490 UART: [art] PUB.Y = B2B8CC95D98E631D51CA699577041DE7626F25535B9135F219A197BB8C28EA2CD879F67099C8191C70A65B5B99D00A65
48,962,727 UART: [art] SIG.R = A5715CE81F1EE6F7DFBA43B40E3C2FC16C36973369D3999CB0C07AB3CE9B2BEC5410A3B53465AA7F9629125788BA2685
48,970,121 UART: [art] SIG.S = 0C083EEB1482DDD0E4C6C9F122B68FA4B8BBDFE690FAFCCD4DA47AF4878A20BBC2A65E3896B8C6EE07407441C7722191
50,275,148 UART: mbox::rt_entry...
50,276,104 UART: ____ _ _ _ ____ _____
50,278,197 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
50,280,202 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
50,282,056 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
50,283,979 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
50,285,827 UART: |_|
50,286,701 UART:
50,660,596 UART: [rt] Runtime listening for mailbox commands...
50,662,864 >>> mbox cmd response data (160 bytes)
52,725,042 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
60,708,811 >>> mbox cmd response: success
60,709,344 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
60,743,461 UART:
60,743,780 UART: Running Caliptra FMC ...
60,744,902 UART:
60,745,064 UART: [state] CFI Enabled
60,789,351 UART: [art] Extend RT PCRs Done
60,790,487 UART: [art] Lock RT PCRs Done
60,791,856 UART: [art] Populate DV Done
60,797,367 UART: [fht] FMC Alias Private Key: 7
60,799,002 UART: [art] Derive CDI
60,799,812 UART: [art] Store in slot 0x4
60,842,680 UART: [art] Derive Key Pair
60,843,724 UART: [art] Store priv key in slot 0x5
64,085,773 UART: [art] Derive Key Pair - Done
64,098,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
66,379,683 UART: [art] Erasing AUTHORITY.KEYID = 7
66,381,194 UART: [art] PUB.X = 384AC9CDC62E162F19D8085D47345F898C71FF0CCF4F2D911AAC13366454BB83365EF5713EDF79A145E238E28F71A330
66,388,442 UART: [art] PUB.Y = 09E26DF5B05EA3EE95A97DE60BC971244D3097F94707A62BBEE42E6437788B03ACADDFAB57DA77FCEDB2FC4382C31595
66,395,728 UART: [art] SIG.R = DBD87EF585ED611A28AC1D7DA1201C64A7F75F75E28BA3A08333A03E512CDE85471FBCCB30AEE1927A42E433784C0174
66,403,114 UART: [art] SIG.S = C9E8E3A65B28050E984399DCA0B487588985003335973C2199A80039C6B66EA949BC55D826E9A4F3E62CD8159B38E80C
67,707,463 UART: mbox::rt_entry...
67,708,426 UART: ____ _ _ _ ____ _____
67,710,356 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
67,712,356 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
67,714,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
67,716,122 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
67,718,000 UART: |_|
67,718,881 UART:
68,094,392 UART: [rt] Runtime listening for mailbox commands...
68,096,640 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 3.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
192,173 UART:
192,528 UART: Running Caliptra ROM ...
193,698 UART:
193,854 UART: [state] CFI Enabled
267,065 UART: [state] LifecycleState = Unprovisioned
268,992 UART: [state] DebugLocked = No
270,742 UART: [state] WD Timer not started. Device not locked for debugging
274,852 UART: [kat] SHA2-256
454,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,245 UART: [kat] ++
465,854 UART: [kat] sha1
476,176 UART: [kat] SHA2-256
478,889 UART: [kat] SHA2-384
484,871 UART: [kat] SHA2-512-ACC
487,231 UART: [kat] ECC-384
2,950,551 UART: [kat] HMAC-384Kdf
2,973,515 UART: [kat] LMS
3,450,000 UART: [kat] --
3,452,963 UART: [cold-reset] ++
3,455,468 UART: [fht] FHT @ 0x50003400
3,467,655 UART: [idev] ++
3,468,213 UART: [idev] CDI.KEYID = 6
3,469,237 UART: [idev] SUBJECT.KEYID = 7
3,470,403 UART: [idev] UDS.KEYID = 0
3,471,350 ready_for_fw is high
3,471,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,810 UART: [idev] Erasing UDS.KEYID = 0
5,986,869 UART: [idev] Sha1 KeyId Algorithm
6,009,351 UART: [idev] --
6,013,616 UART: [ldev] ++
6,014,197 UART: [ldev] CDI.KEYID = 6
6,015,167 UART: [ldev] SUBJECT.KEYID = 5
6,016,328 UART: [ldev] AUTHORITY.KEYID = 7
6,017,614 UART: [ldev] FE.KEYID = 1
6,060,066 UART: [ldev] Erasing FE.KEYID = 1
8,568,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,371,536 UART: [ldev] --
10,376,569 UART: [fwproc] Wait for Commands...
10,379,373 UART: [fwproc] Recv command 0x46574c44
10,381,354 UART: [fwproc] Recv'd Img size: 118548 bytes
13,863,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,936,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,009,803 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,338,386 >>> mbox cmd response: success
14,341,634 UART: [afmc] ++
14,342,241 UART: [afmc] CDI.KEYID = 6
14,343,126 UART: [afmc] SUBJECT.KEYID = 7
14,344,389 UART: [afmc] AUTHORITY.KEYID = 5
16,880,126 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,621,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,623,565 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,639,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,655,397 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,670,958 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,695,500 UART: [afmc] --
18,699,505 UART: [cold-reset] --
18,703,101 UART: [state] Locking Datavault
18,708,451 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,143 UART: [state] Locking ICCM
18,711,507 UART: [exit] Launching FMC @ 0x40000130
18,719,947 UART:
18,720,171 UART: Running Caliptra FMC ...
18,721,193 UART:
18,721,338 UART: [state] CFI Enabled
18,777,964 UART: [fht] FMC Alias Private Key: 7
20,544,664 UART: [art] Extend RT PCRs Done
20,545,888 UART: [art] Lock RT PCRs Done
20,547,375 UART: [art] Populate DV Done
20,552,645 UART: [fht] FMC Alias Private Key: 7
20,554,180 UART: [art] Derive CDI
20,554,940 UART: [art] Store in slot 0x4
20,610,235 UART: [art] Derive Key Pair
20,611,231 UART: [art] Store priv key in slot 0x5
23,074,252 UART: [art] Derive Key Pair - Done
23,087,519 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,963 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,483 UART: [art] PUB.X = 45A8CB604111503F951992C874FE79FBD4DFEEAAD5BF60C3516994C5057739EB09874B6B1E7D827C5BE8BD6F40D8E816
24,808,748 UART: [art] PUB.Y = CF281E1DEBEC1C99265B545257041E4780836B76BFB0BEE5ECFF3A4675A51C09A49295206C6A3468DF3EFE7BF1EAC6AF
24,816,040 UART: [art] SIG.R = 8870FA6C05925C71C123552BBE7BBBBE4DFFAC033E6FDED013ED58DE4B3794A7B7E71B90B0CA8C2DBA193DFD698CB813
24,823,435 UART: [art] SIG.S = 51B318CF61B5D24FBBDD6E475D128B8DAC42C4A6B830E5D0685A18739C86ECAA804416529DE416EFDC5E62149DF70D55
25,801,957 UART: Caliptra RT
25,802,647 UART: [state] CFI Enabled
25,983,068 UART: [rt] RT listening for mailbox commands...
25,985,405 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,015,557 UART: [rt]cmd =0x54514754, len=24
26,018,054 >>> mbox cmd response data (8 bytes)
28,075,519 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,181,543 UART:
28,181,887 UART: Running Caliptra ROM ...
28,183,009 UART:
28,183,180 UART: [state] CFI Enabled
28,251,067 UART: [state] LifecycleState = Unprovisioned
28,253,007 UART: [state] DebugLocked = No
28,254,834 UART: [state] WD Timer not started. Device not locked for debugging
28,259,379 UART: [kat] SHA2-256
28,439,040 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,449,791 UART: [kat] ++
28,450,391 UART: [kat] sha1
28,460,721 UART: [kat] SHA2-256
28,463,407 UART: [kat] SHA2-384
28,468,425 UART: [kat] SHA2-512-ACC
28,470,768 UART: [kat] ECC-384
30,934,265 UART: [kat] HMAC-384Kdf
30,957,897 UART: [kat] LMS
31,434,369 UART: [kat] --
31,439,761 UART: [update-reset] ++
34,495,728 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,499,699 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,772,337 >>> mbox cmd response: success
34,772,742 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,773,033 UART: [update-reset] Copying MAN_2 To MAN_1
34,809,720 UART: [update-reset Success] --
34,812,895 UART: [state] Locking Datavault
34,816,254 UART: [state] Locking PCR0, PCR1 and PCR31
34,818,000 UART: [state] Locking ICCM
34,820,401 UART: [exit] Launching FMC @ 0x40000130
34,828,793 UART:
34,829,032 UART: Running Caliptra FMC ...
34,830,133 UART:
34,830,286 UART: [state] CFI Enabled
34,918,656 UART: [art] Extend RT PCRs Done
34,919,835 UART: [art] Lock RT PCRs Done
34,921,069 UART: [art] Populate DV Done
34,926,632 UART: [fht] FMC Alias Private Key: 7
34,928,379 UART: [art] Derive CDI
34,929,186 UART: [art] Store in slot 0x4
34,987,539 UART: [art] Derive Key Pair
34,988,566 UART: [art] Store priv key in slot 0x5
37,451,613 UART: [art] Derive Key Pair - Done
37,464,408 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,176,168 UART: [art] Erasing AUTHORITY.KEYID = 7
39,177,683 UART: [art] PUB.X = 108157887A7CCF64483DA91132C7610E32C42BADEEC616040F5F4087E388B478952AE58A4825311C4182F0CEEFB70619
39,184,935 UART: [art] PUB.Y = 548F7FC4DFA19256DFA6565A0CA53243A5F701538CAD93373156D8626D0A568D5EF5AFBDA3323D9B52DF934326D273CA
39,192,227 UART: [art] SIG.R = 9319F28D8AD1B80E1BB96FF6E01B6D6BF60FE5ADAEE27FA644E72AC465E92B23E89C35E8FE2DB1C2FDBB3D5F1B979DE7
39,199,618 UART: [art] SIG.S = 1BFABE80D0A18F2A3ED65652E135B0B68B2617A96BCC001547AE4A2A2D94D5335EEF53AB345B0F6A72B8B49109B02FCF
40,178,398 UART: mbox::rt_entry...
40,179,359 UART: ____ _ _ _ ____ _____
40,181,333 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,183,284 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,185,212 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,187,061 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,188,980 UART: |_|
40,189,788 UART:
40,564,238 UART: [rt] Runtime listening for mailbox commands...
40,566,460 >>> mbox cmd response data (160 bytes)
42,615,260 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,720,388 UART:
42,720,770 UART: Running Caliptra ROM ...
42,721,808 UART:
42,721,966 UART: [state] CFI Enabled
42,798,839 UART: [state] LifecycleState = Unprovisioned
42,800,773 UART: [state] DebugLocked = No
42,803,130 UART: [state] WD Timer not started. Device not locked for debugging
42,807,723 UART: [kat] SHA2-256
42,987,398 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,998,218 UART: [kat] ++
42,998,775 UART: [kat] sha1
43,008,861 UART: [kat] SHA2-256
43,011,724 UART: [kat] SHA2-384
43,017,748 UART: [kat] SHA2-512-ACC
43,020,098 UART: [kat] ECC-384
45,487,710 UART: [kat] HMAC-384Kdf
45,511,634 UART: [kat] LMS
45,988,073 UART: [kat] --
45,992,870 UART: [update-reset] ++
49,053,763 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,057,848 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,330,425 >>> mbox cmd response: success
49,330,823 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,331,823 UART: [update-reset] Copying MAN_2 To MAN_1
49,368,977 UART: [update-reset Success] --
49,373,592 UART: [state] Locking Datavault
49,376,695 UART: [state] Locking PCR0, PCR1 and PCR31
49,378,447 UART: [state] Locking ICCM
49,381,084 UART: [exit] Launching FMC @ 0x40000130
49,389,486 UART:
49,389,722 UART: Running Caliptra FMC ...
49,390,818 UART:
49,390,969 UART: [state] CFI Enabled
49,489,261 UART: [art] Extend RT PCRs Done
49,490,444 UART: [art] Lock RT PCRs Done
49,491,734 UART: [art] Populate DV Done
49,497,252 UART: [fht] FMC Alias Private Key: 7
49,498,901 UART: [art] Derive CDI
49,499,713 UART: [art] Store in slot 0x4
49,558,398 UART: [art] Derive Key Pair
49,559,401 UART: [art] Store priv key in slot 0x5
52,021,848 UART: [art] Derive Key Pair - Done
52,034,602 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,747,611 UART: [art] Erasing AUTHORITY.KEYID = 7
53,749,123 UART: [art] PUB.X = 1C5DA4037E65BF1C90A551CE019F77FAED7A6244B45F04A3DE9E8F12AB7D565C6E809A27A02565DC78D7C5FC38F87E62
53,756,424 UART: [art] PUB.Y = 5C4A7CBE9F18267F821275F9F37723B8E1ABDF5124EAF313F7FF6A332CD659E97A95636288572C696EAEFEA926C9C44B
53,763,701 UART: [art] SIG.R = D834C8702BC0F16642008D29DB5A760F173C2E9DF85A3DB6517CC29C2A0C861769076C35480C2BB95F7E832F6425C8C2
53,771,037 UART: [art] SIG.S = B5D8AAE7654828F78154F51E3E5D882931586139A5AB2667243EA63E35719EAC4DCEA6AE8578B4D016FFB0D829144513
54,749,809 UART: mbox::rt_entry...
54,750,762 UART: ____ _ _ _ ____ _____
54,752,691 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,754,687 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,756,565 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,758,485 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,760,337 UART: |_|
54,761,213 UART:
55,128,800 UART: [rt] Runtime listening for mailbox commands...
55,131,100 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,980 writing to cptra_bootfsm_go
3,459,902 ready_for_fw is high
3,460,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,232,512 >>> mbox cmd response: success
18,513,384 UART:
18,513,781 UART: Running Caliptra FMC ...
18,514,916 UART:
18,515,076 UART: [state] CFI Enabled
18,581,672 UART: [fht] FMC Alias Private Key: 7
20,348,344 UART: [art] Extend RT PCRs Done
20,349,567 UART: [art] Lock RT PCRs Done
20,351,108 UART: [art] Populate DV Done
20,356,632 UART: [fht] FMC Alias Private Key: 7
20,358,287 UART: [art] Derive CDI
20,359,124 UART: [art] Store in slot 0x4
20,414,551 UART: [art] Derive Key Pair
20,415,591 UART: [art] Store priv key in slot 0x5
22,878,324 UART: [art] Derive Key Pair - Done
22,891,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,514 UART: [art] Erasing AUTHORITY.KEYID = 7
24,604,991 UART: [art] PUB.X = 05C3C5C5000C8B84F45347C8EBE65D0CAC950020BBC8E6E97D5E059142E8C60F0E6640AE317670EE6636162A6AA8BDF8
24,612,250 UART: [art] PUB.Y = C969DF71E12F9F80DC391C5F1179D4223EE724C9522B89A4638906B501D905FE764D71A201B42BA87E848FCEC51BD085
24,619,501 UART: [art] SIG.R = 93C01785E19707DEA70DEC9D315B504097B62A752542B0D2B6C6583FDE91A4101CBC4064B38F39D0DEA9B9A72B21D451
24,626,886 UART: [art] SIG.S = 2C55908DAC766C40464BF62B21F445BB5ABCF8188ED2FAB223A5364BE95B6250F8619B585FF38048A5D8D5D13EA27A4D
25,606,398 UART: Caliptra RT
25,607,114 UART: [state] CFI Enabled
25,785,385 UART: [rt] RT listening for mailbox commands...
25,787,566 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,817,533 UART: [rt]cmd =0x54514754, len=24
25,820,348 >>> mbox cmd response data (8 bytes)
27,870,582 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,561,397 >>> mbox cmd response: success
34,561,864 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,593,221 UART:
34,593,501 UART: Running Caliptra FMC ...
34,594,618 UART:
34,594,769 UART: [state] CFI Enabled
34,699,636 UART: [art] Extend RT PCRs Done
34,700,831 UART: [art] Lock RT PCRs Done
34,702,299 UART: [art] Populate DV Done
34,707,886 UART: [fht] FMC Alias Private Key: 7
34,709,472 UART: [art] Derive CDI
34,710,302 UART: [art] Store in slot 0x4
34,768,496 UART: [art] Derive Key Pair
34,769,496 UART: [art] Store priv key in slot 0x5
37,232,952 UART: [art] Derive Key Pair - Done
37,246,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,958,234 UART: [art] Erasing AUTHORITY.KEYID = 7
38,959,746 UART: [art] PUB.X = 0976DFF7F1F873FC349C72A446F94B7419C82C1519A09BD6F5CD732B272583604E80074003130894EBBBD77FC11DBDF7
38,967,000 UART: [art] PUB.Y = 50AA42D2752BE2DCA82EDE135DC19DFDB80B6A41F28BCF8DC92F9630CD6F0EEDA742FF4317ECA842CFBE072C95BEE2A9
38,974,347 UART: [art] SIG.R = F898CC9CD23FD06B77CC95AC17AFBF5C4DB9C5AD898B5CA801D3E3DF502D048CF379E2A410F7F3F2430E96D124CA76AC
38,981,745 UART: [art] SIG.S = C252F1703B8CB761F00FD8FD5145DBD10361BD9BEC1316AA321982BD21C4F0BF6D7CCFE4B53CDF99CF47ECC323445ADF
39,960,377 UART: mbox::rt_entry...
39,961,335 UART: ____ _ _ _ ____ _____
39,963,324 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,965,325 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,967,290 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,969,222 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,971,168 UART: |_|
39,971,971 UART:
40,345,056 UART: [rt] Runtime listening for mailbox commands...
40,347,322 >>> mbox cmd response data (160 bytes)
42,395,628 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
49,082,419 >>> mbox cmd response: success
49,083,035 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,116,086 UART:
49,116,409 UART: Running Caliptra FMC ...
49,117,536 UART:
49,117,692 UART: [state] CFI Enabled
49,224,152 UART: [art] Extend RT PCRs Done
49,225,363 UART: [art] Lock RT PCRs Done
49,226,714 UART: [art] Populate DV Done
49,232,120 UART: [fht] FMC Alias Private Key: 7
49,233,821 UART: [art] Derive CDI
49,234,631 UART: [art] Store in slot 0x4
49,293,488 UART: [art] Derive Key Pair
49,294,526 UART: [art] Store priv key in slot 0x5
51,757,291 UART: [art] Derive Key Pair - Done
51,770,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,483,931 UART: [art] Erasing AUTHORITY.KEYID = 7
53,485,439 UART: [art] PUB.X = 9A4F75A38503C5B22F7DCB9A6086F7DD1089FA08634EA7A50EB772F4890A639C30BCA96014E78B122C3615976DB53992
53,492,648 UART: [art] PUB.Y = 860C846BAF5C145483BE73D230A2C7E607994763F7D31C73C32C1F6CFC641CA61929161C1F4197852AEFD6191898DEBA
53,499,936 UART: [art] SIG.R = 6171E65051EA772BE84A3B2E1D186531DE703835F72E6301D7B1C969178E231DB52E52E7436BBABA2B6766D65FB6BD9F
53,507,329 UART: [art] SIG.S = FC15E6A424780A286594EA8ACB73F1C0ED3A3D3A73A6D8566FDDFA17FC641A97EA16F91F20E7FDFF9F5B26DB1D0B34B8
54,485,654 UART: mbox::rt_entry...
54,486,625 UART: ____ _ _ _ ____ _____
54,488,629 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,490,634 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,492,562 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,494,489 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,496,424 UART: |_|
54,497,232 UART:
54,870,495 UART: [rt] Runtime listening for mailbox commands...
54,872,724 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,212 UART:
192,591 UART: Running Caliptra ROM ...
193,785 UART:
603,333 UART: [state] CFI Enabled
613,544 UART: [state] LifecycleState = Unprovisioned
615,502 UART: [state] DebugLocked = No
617,108 UART: [state] WD Timer not started. Device not locked for debugging
620,511 UART: [kat] SHA2-256
800,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
810,916 UART: [kat] ++
811,368 UART: [kat] sha1
823,022 UART: [kat] SHA2-256
825,752 UART: [kat] SHA2-384
832,031 UART: [kat] SHA2-512-ACC
834,409 UART: [kat] ECC-384
3,276,449 UART: [kat] HMAC-384Kdf
3,288,202 UART: [kat] LMS
3,764,745 UART: [kat] --
3,770,090 UART: [cold-reset] ++
3,772,450 UART: [fht] FHT @ 0x50003400
3,784,298 UART: [idev] ++
3,784,872 UART: [idev] CDI.KEYID = 6
3,785,754 UART: [idev] SUBJECT.KEYID = 7
3,787,072 UART: [idev] UDS.KEYID = 0
3,788,004 ready_for_fw is high
3,788,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,048 UART: [idev] Erasing UDS.KEYID = 0
6,265,038 UART: [idev] Sha1 KeyId Algorithm
6,288,211 UART: [idev] --
6,293,824 UART: [ldev] ++
6,294,450 UART: [ldev] CDI.KEYID = 6
6,295,360 UART: [ldev] SUBJECT.KEYID = 5
6,296,575 UART: [ldev] AUTHORITY.KEYID = 7
6,297,808 UART: [ldev] FE.KEYID = 1
6,309,480 UART: [ldev] Erasing FE.KEYID = 1
8,787,538 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,522,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,689 UART: [ldev] --
10,580,293 UART: [fwproc] Wait for Commands...
10,583,091 UART: [fwproc] Recv command 0x46574c44
10,585,129 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,150,822 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,223,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,072 >>> mbox cmd response: success
14,556,893 UART: [afmc] ++
14,557,506 UART: [afmc] CDI.KEYID = 6
14,558,480 UART: [afmc] SUBJECT.KEYID = 7
14,559,644 UART: [afmc] AUTHORITY.KEYID = 5
17,063,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,785,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,679 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,531 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,546 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,835,126 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,058 UART: [afmc] --
18,864,365 UART: [cold-reset] --
18,868,496 UART: [state] Locking Datavault
18,873,855 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,611 UART: [state] Locking ICCM
18,877,767 UART: [exit] Launching FMC @ 0x40000130
18,886,182 UART:
18,886,457 UART: Running Caliptra FMC ...
18,887,566 UART:
18,887,726 UART: [state] CFI Enabled
18,895,530 UART: [fht] FMC Alias Private Key: 7
20,662,357 UART: [art] Extend RT PCRs Done
20,663,579 UART: [art] Lock RT PCRs Done
20,665,586 UART: [art] Populate DV Done
20,671,054 UART: [fht] FMC Alias Private Key: 7
20,672,653 UART: [art] Derive CDI
20,673,391 UART: [art] Store in slot 0x4
20,716,259 UART: [art] Derive Key Pair
20,717,258 UART: [art] Store priv key in slot 0x5
23,144,968 UART: [art] Derive Key Pair - Done
23,158,020 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,483 UART: [art] Erasing AUTHORITY.KEYID = 7
24,865,979 UART: [art] PUB.X = 352228BF9C66BDBFDC428797BB1DCB3A6394A87ACDDE19D48B0EBCC7E91BDA628D1725A6BC02C0B3908B864F4F78E6CE
24,873,280 UART: [art] PUB.Y = C7F07AAF9A942FC52ACF361A6477790564B62D2CB17C91579ADEFFA47740502E8C605E97094D4419C0A6B5E74E1E5121
24,880,579 UART: [art] SIG.R = EF368B3DF310D721726DF84E184A319ABD246D04B3F89754BC1A74F42AF7EADD4F9C55A47BE2315C9F1B6D82DFB390CF
24,887,992 UART: [art] SIG.S = 70D76DD700AB70711E39734AB7570FF0A4810E220CBF8B66B406FC313B4B0877772AFDAAE95F99A773983CB94ECE3195
25,866,345 UART: Caliptra RT
25,867,031 UART: [state] CFI Enabled
26,000,078 UART: [rt] RT listening for mailbox commands...
26,002,332 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,032,271 UART: [rt]cmd =0x54514754, len=24
26,034,816 >>> mbox cmd response data (8 bytes)
28,094,023 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,199,909 UART:
28,200,250 UART: Running Caliptra ROM ...
28,201,394 UART:
28,201,560 UART: [state] CFI Enabled
28,216,541 UART: [state] LifecycleState = Unprovisioned
28,218,459 UART: [state] DebugLocked = No
28,221,297 UART: [state] WD Timer not started. Device not locked for debugging
28,225,681 UART: [kat] SHA2-256
28,405,385 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
28,416,207 UART: [kat] ++
28,416,666 UART: [kat] sha1
28,426,254 UART: [kat] SHA2-256
28,428,954 UART: [kat] SHA2-384
28,436,076 UART: [kat] SHA2-512-ACC
28,438,435 UART: [kat] ECC-384
30,881,463 UART: [kat] HMAC-384Kdf
30,893,824 UART: [kat] LMS
31,370,325 UART: [kat] --
31,372,267 UART: [update-reset] ++
34,424,997 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,429,253 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
34,701,856 >>> mbox cmd response: success
34,702,259 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,702,876 UART: [update-reset] Copying MAN_2 To MAN_1
34,739,959 UART: [update-reset Success] --
34,745,475 UART: [state] Locking Datavault
34,750,410 UART: [state] Locking PCR0, PCR1 and PCR31
34,752,112 UART: [state] Locking ICCM
34,754,161 UART: [exit] Launching FMC @ 0x40000130
34,762,559 UART:
34,762,799 UART: Running Caliptra FMC ...
34,763,900 UART:
34,764,059 UART: [state] CFI Enabled
34,808,496 UART: [art] Extend RT PCRs Done
34,809,696 UART: [art] Lock RT PCRs Done
34,810,998 UART: [art] Populate DV Done
34,816,408 UART: [fht] FMC Alias Private Key: 7
34,818,137 UART: [art] Derive CDI
34,818,955 UART: [art] Store in slot 0x4
34,861,660 UART: [art] Derive Key Pair
34,862,663 UART: [art] Store priv key in slot 0x5
37,289,455 UART: [art] Derive Key Pair - Done
37,302,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,008,989 UART: [art] Erasing AUTHORITY.KEYID = 7
39,010,505 UART: [art] PUB.X = B050649AB41FD3522C7058208CDA7D84F373CE11EA58F595E6F631ED7776CDEF5D9BA0AEC5E00957E40FDEB8B81E36C3
39,017,755 UART: [art] PUB.Y = 3E47F7A876D8DAB7A8B54BD4B9A02B34AB275AD3FA0EA0150A07D14B6D2CA541B096829E5670F48627A6D5418F6D23C2
39,025,040 UART: [art] SIG.R = 4E80A53C10626400C0D05C7FAAC83B294D7FC383FA13A9057DB0E9451C27C705320D4BA898AFC87F57C88AB5F60CA878
39,032,442 UART: [art] SIG.S = D73BBE397A26D3BF0A9789B1C4351B2A024DAFC8FCAB29DE026AFC44687CD080BEF306610944E8AFBD515BE22496BDA3
40,011,367 UART: mbox::rt_entry...
40,012,327 UART: ____ _ _ _ ____ _____
40,014,310 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,016,320 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,018,258 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,020,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,022,077 UART: |_|
40,022,884 UART:
40,391,823 UART: [rt] Runtime listening for mailbox commands...
40,394,098 >>> mbox cmd response data (160 bytes)
42,444,654 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
42,549,662 UART:
42,550,031 UART: Running Caliptra ROM ...
42,551,094 UART:
42,551,308 UART: [state] CFI Enabled
42,562,723 UART: [state] LifecycleState = Unprovisioned
42,564,652 UART: [state] DebugLocked = No
42,567,553 UART: [state] WD Timer not started. Device not locked for debugging
42,571,353 UART: [kat] SHA2-256
42,751,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
42,761,848 UART: [kat] ++
42,762,351 UART: [kat] sha1
42,771,730 UART: [kat] SHA2-256
42,774,438 UART: [kat] SHA2-384
42,778,589 UART: [kat] SHA2-512-ACC
42,780,942 UART: [kat] ECC-384
45,222,701 UART: [kat] HMAC-384Kdf
45,234,498 UART: [kat] LMS
45,710,955 UART: [kat] --
45,716,778 UART: [update-reset] ++
48,776,130 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,778,799 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,051,387 >>> mbox cmd response: success
49,051,795 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,053,113 UART: [update-reset] Copying MAN_2 To MAN_1
49,090,243 UART: [update-reset Success] --
49,096,258 UART: [state] Locking Datavault
49,099,135 UART: [state] Locking PCR0, PCR1 and PCR31
49,100,892 UART: [state] Locking ICCM
49,102,775 UART: [exit] Launching FMC @ 0x40000130
49,111,121 UART:
49,111,357 UART: Running Caliptra FMC ...
49,112,459 UART:
49,112,619 UART: [state] CFI Enabled
49,156,590 UART: [art] Extend RT PCRs Done
49,157,775 UART: [art] Lock RT PCRs Done
49,158,908 UART: [art] Populate DV Done
49,164,537 UART: [fht] FMC Alias Private Key: 7
49,166,123 UART: [art] Derive CDI
49,166,893 UART: [art] Store in slot 0x4
49,209,654 UART: [art] Derive Key Pair
49,210,693 UART: [art] Store priv key in slot 0x5
51,637,906 UART: [art] Derive Key Pair - Done
51,651,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,356,980 UART: [art] Erasing AUTHORITY.KEYID = 7
53,358,484 UART: [art] PUB.X = B2D16214BEDFB1561F868DF0C300E5F52CC6890A0A4E66FD3E3A8AB8A53D0394125E1343502EC4C2D48152ECDE881DE7
53,365,802 UART: [art] PUB.Y = 7FE04E730E4670C56E71B520D67E3755CBD191CDE13BA3D14C1E82ED42941AEB3E3A7668EBF701D674B9BB854ABBF916
53,373,042 UART: [art] SIG.R = BA056C96EE86C01A74DF6DE9494666057597D6432995177A50D7FEE43734F3897480BC88C603A43C0E2E658D1B576469
53,380,395 UART: [art] SIG.S = F436CC1C942110060B35A7D1801BE9FEE22753BCDAD7F63ACE38C9F4BA4A78BDCEC460A655820F619ABEA6CFCFC8FF0D
54,358,584 UART: mbox::rt_entry...
54,359,518 UART: ____ _ _ _ ____ _____
54,361,443 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,363,448 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,365,308 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,367,232 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,369,137 UART: |_|
54,370,032 UART:
54,743,636 UART: [rt] Runtime listening for mailbox commands...
54,745,925 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,779,261 ready_for_fw is high
3,779,688 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,448,983 >>> mbox cmd response: success
18,692,852 UART:
18,693,248 UART: Running Caliptra FMC ...
18,694,385 UART:
18,694,543 UART: [state] CFI Enabled
18,702,434 UART: [fht] FMC Alias Private Key: 7
20,468,159 UART: [art] Extend RT PCRs Done
20,469,397 UART: [art] Lock RT PCRs Done
20,471,159 UART: [art] Populate DV Done
20,476,642 UART: [fht] FMC Alias Private Key: 7
20,478,194 UART: [art] Derive CDI
20,478,931 UART: [art] Store in slot 0x4
20,521,796 UART: [art] Derive Key Pair
20,522,794 UART: [art] Store priv key in slot 0x5
22,949,188 UART: [art] Derive Key Pair - Done
22,962,239 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,998 UART: [art] Erasing AUTHORITY.KEYID = 7
24,670,495 UART: [art] PUB.X = 4436819508FC63FEC48A0529C88ACF498739278D8180C22B48B0780C4E506F2602DEB3ED3C9BB92FCB4703515CB6477C
24,677,762 UART: [art] PUB.Y = 8544D51402E193AAB8AB080843D5C3DD685810896DB18FA3635BDD208DB47CBCF636ECEA412182720D13A36C0AAEDB79
24,685,051 UART: [art] SIG.R = 28AA15D2CB37BA6B0658AE25E951B3E9CAAC17536ED67985AC0643BDD6A4661768A5083774E1407556CDA568CC82C4B3
24,692,447 UART: [art] SIG.S = 02824F27A99557A2E5F924C18E7B00FEB0FA8B61548C599B687082A07AC7D0FC2ED8EEBBB491EDC534B2B12E4E6E8EBE
25,671,378 UART: Caliptra RT
25,672,086 UART: [state] CFI Enabled
25,804,470 UART: [rt] RT listening for mailbox commands...
25,806,666 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
25,836,816 UART: [rt]cmd =0x54514754, len=24
25,839,715 >>> mbox cmd response data (8 bytes)
27,906,031 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
34,525,345 >>> mbox cmd response: success
34,525,877 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
34,559,949 UART:
34,560,288 UART: Running Caliptra FMC ...
34,561,334 UART:
34,561,485 UART: [state] CFI Enabled
34,605,402 UART: [art] Extend RT PCRs Done
34,606,552 UART: [art] Lock RT PCRs Done
34,607,854 UART: [art] Populate DV Done
34,613,349 UART: [fht] FMC Alias Private Key: 7
34,615,041 UART: [art] Derive CDI
34,615,788 UART: [art] Store in slot 0x4
34,658,710 UART: [art] Derive Key Pair
34,659,709 UART: [art] Store priv key in slot 0x5
37,086,892 UART: [art] Derive Key Pair - Done
37,099,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
38,806,418 UART: [art] Erasing AUTHORITY.KEYID = 7
38,807,925 UART: [art] PUB.X = 6AA7B1DD5BF06F190E280C8B9327B8C23B78DD4A78ECC60F02C05F5B4C149879BBC1FAAB366C14979C16EB097F53D5C2
38,815,181 UART: [art] PUB.Y = C08727F8719E0B0043B23357629FA28C6195B09C3DE3D20DD584BDFA2AF67F400193FBA674C4966F3FB362066BFAC8BA
38,822,438 UART: [art] SIG.R = 4AD8CC311E462D51F6170130E4064A48F8E46A795378DD90FA36507B3B388588BDFA67214DCF5AFEE4AD16052507517D
38,829,845 UART: [art] SIG.S = 49AF37C6E4D384078FEE773282DD27DB7A165DCC7F6A85FC04A9279B87BA1C61AD24839FC6F81FD4382D3623CBA7453B
39,808,555 UART: mbox::rt_entry...
39,809,501 UART: ____ _ _ _ ____ _____
39,811,746 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
39,813,681 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
39,815,614 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
39,817,471 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
39,819,399 UART: |_|
39,820,205 UART:
40,193,840 UART: [rt] Runtime listening for mailbox commands...
40,196,119 >>> mbox cmd response data (160 bytes)
42,246,217 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
48,853,182 >>> mbox cmd response: success
48,853,694 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
48,889,581 UART:
48,889,867 UART: Running Caliptra FMC ...
48,890,906 UART:
48,891,056 UART: [state] CFI Enabled
48,935,474 UART: [art] Extend RT PCRs Done
48,936,669 UART: [art] Lock RT PCRs Done
48,937,993 UART: [art] Populate DV Done
48,943,464 UART: [fht] FMC Alias Private Key: 7
48,945,109 UART: [art] Derive CDI
48,945,846 UART: [art] Store in slot 0x4
48,988,812 UART: [art] Derive Key Pair
48,989,816 UART: [art] Store priv key in slot 0x5
51,416,993 UART: [art] Derive Key Pair - Done
51,429,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
53,135,967 UART: [art] Erasing AUTHORITY.KEYID = 7
53,137,475 UART: [art] PUB.X = 0B29D2288288E2A400ED4B6E3F7CD76D82C08DAF4F48827D7F37A1CD58C9E2B9F6661CBFEBF05F752C28596CF4D6C39A
53,144,731 UART: [art] PUB.Y = CD46160ADF1061448852AEE506FE520A1A6E7F597929DBF5B34647B60A14BFC1AC639AC5249525ADFC6471747102E6D9
53,151,980 UART: [art] SIG.R = E8E6AFB629570776014A8C60F1EA3016BE37A6EBB67C779A3939E8B0413FEB5645395EE6DCDC52D02AC5BE058EDBF4D4
53,159,384 UART: [art] SIG.S = 157CB19930038D473DD8EC235A09744D35128A82EF323D6D4A40B2C6327F8AF780769E73F86A142AEABCA91FC9E356D1
54,138,419 UART: mbox::rt_entry...
54,139,365 UART: ____ _ _ _ ____ _____
54,141,301 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
54,143,308 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
54,145,240 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
54,147,172 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
54,149,103 UART: |_|
54,149,937 UART:
54,520,277 UART: [rt] Runtime listening for mailbox commands...
54,522,519 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,054 UART:
192,422 UART: Running Caliptra ROM ...
193,597 UART:
193,771 UART: [state] CFI Enabled
261,395 UART: [state] LifecycleState = Unprovisioned
263,806 UART: [state] DebugLocked = No
266,693 UART: [state] WD Timer not started. Device not locked for debugging
271,944 UART: [kat] SHA2-256
461,808 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,552 UART: [kat] ++
473,028 UART: [kat] sha1
484,399 UART: [kat] SHA2-256
487,408 UART: [kat] SHA2-384
493,963 UART: [kat] SHA2-512-ACC
496,611 UART: [kat] ECC-384
2,947,398 UART: [kat] HMAC-384Kdf
2,971,147 UART: [kat] LMS
3,502,919 UART: [kat] --
3,507,356 UART: [cold-reset] ++
3,509,304 UART: [fht] FHT @ 0x50003400
3,521,342 UART: [idev] ++
3,522,048 UART: [idev] CDI.KEYID = 6
3,523,004 UART: [idev] SUBJECT.KEYID = 7
3,524,245 UART: [idev] UDS.KEYID = 0
3,525,142 ready_for_fw is high
3,525,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,454 UART: [idev] Erasing UDS.KEYID = 0
6,029,609 UART: [idev] Sha1 KeyId Algorithm
6,051,987 UART: [idev] --
6,057,334 UART: [ldev] ++
6,058,016 UART: [ldev] CDI.KEYID = 6
6,058,904 UART: [ldev] SUBJECT.KEYID = 5
6,060,072 UART: [ldev] AUTHORITY.KEYID = 7
6,061,923 UART: [ldev] FE.KEYID = 1
6,099,628 UART: [ldev] Erasing FE.KEYID = 1
8,607,716 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,689 UART: [ldev] --
10,415,731 UART: [fwproc] Wait for Commands...
10,418,466 UART: [fwproc] Recv command 0x46574c44
10,420,772 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,537 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,610 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,214 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,684,303 >>> mbox cmd response: success
14,687,531 UART: [afmc] ++
14,688,262 UART: [afmc] CDI.KEYID = 6
14,689,453 UART: [afmc] SUBJECT.KEYID = 7
14,690,910 UART: [afmc] AUTHORITY.KEYID = 5
17,235,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,956,735 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,958,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,973,687 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,988,886 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,003,759 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,563 UART: [afmc] --
19,029,812 UART: [cold-reset] --
19,033,895 UART: [state] Locking Datavault
19,041,149 UART: [state] Locking PCR0, PCR1 and PCR31
19,043,356 UART: [state] Locking ICCM
19,045,325 UART: [exit] Launching FMC @ 0x40000130
19,053,998 UART:
19,054,232 UART: Running Caliptra FMC ...
19,055,259 UART:
19,055,427 UART: [state] CFI Enabled
19,115,193 UART: [fht] FMC Alias Private Key: 7
20,880,482 UART: [art] Extend RT PCRs Done
20,881,693 UART: [art] Lock RT PCRs Done
20,883,479 UART: [art] Populate DV Done
20,889,209 UART: [fht] FMC Alias Private Key: 7
20,890,686 UART: [art] Derive CDI
20,891,443 UART: [art] Store in slot 0x4
20,947,604 UART: [art] Derive Key Pair
20,948,645 UART: [art] Store priv key in slot 0x5
23,411,303 UART: [art] Derive Key Pair - Done
23,423,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,711 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,216 UART: [art] PUB.X = 7EFF999486833CD45039D6830177319A3197D96FE4B9F245AB443C37A2BAF223CD9E90ED601EB79ED21F2DDB9734E407
25,146,486 UART: [art] PUB.Y = 0F2A305D039919ED552A3FCB16431B7FB34769AD2F1990B531C02B1C1E895FAD1D2FD7B114DBC2BFFF42B1D959256260
25,153,720 UART: [art] SIG.R = 72019DD749BEFAC514E6D1D021B655609992558D3F539ED71984120F4969C438DC858F893DE64002092BC76721A421D4
25,161,100 UART: [art] SIG.S = B3E9CD8F7D0AAB03EF4FB6CDD2AE1E8A1E92F8D0CC4274CAA83991BE6228C450B3B1A0B10C327AB017EE313AFEA14157
26,140,269 UART: Caliptra RT
26,140,959 UART: [state] CFI Enabled
26,320,650 UART: [rt] RT listening for mailbox commands...
26,322,705 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,352,778 UART: [rt]cmd =0x54514754, len=24
26,355,315 >>> mbox cmd response data (8 bytes)
28,413,784 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,519,825 UART:
28,520,173 UART: Running Caliptra ROM ...
28,521,235 UART:
28,521,385 UART: [state] CFI Enabled
28,590,347 UART: [state] LifecycleState = Unprovisioned
28,592,441 UART: [state] DebugLocked = No
28,595,205 UART: [state] WD Timer not started. Device not locked for debugging
28,600,123 UART: [kat] SHA2-256
28,790,019 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,800,798 UART: [kat] ++
28,801,268 UART: [kat] sha1
28,811,665 UART: [kat] SHA2-256
28,814,687 UART: [kat] SHA2-384
28,820,726 UART: [kat] SHA2-512-ACC
28,823,289 UART: [kat] ECC-384
31,272,654 UART: [kat] HMAC-384Kdf
31,296,774 UART: [kat] LMS
31,828,392 UART: [kat] --
31,832,919 UART: [update-reset] ++
34,896,731 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,899,852 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,315,321 >>> mbox cmd response: success
35,315,716 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,317,240 UART: [update-reset] Copying MAN_2 To MAN_1
35,354,807 UART: [update-reset Success] --
35,358,267 UART: [state] Locking Datavault
35,361,632 UART: [state] Locking PCR0, PCR1 and PCR31
35,363,815 UART: [state] Locking ICCM
35,366,445 UART: [exit] Launching FMC @ 0x40000130
35,375,104 UART:
35,375,341 UART: Running Caliptra FMC ...
35,376,438 UART:
35,376,592 UART: [state] CFI Enabled
35,467,326 UART: [art] Extend RT PCRs Done
35,468,508 UART: [art] Lock RT PCRs Done
35,470,063 UART: [art] Populate DV Done
35,475,592 UART: [fht] FMC Alias Private Key: 7
35,477,178 UART: [art] Derive CDI
35,477,987 UART: [art] Store in slot 0x4
35,535,857 UART: [art] Derive Key Pair
35,536,892 UART: [art] Store priv key in slot 0x5
37,999,418 UART: [art] Derive Key Pair - Done
38,012,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,725,083 UART: [art] Erasing AUTHORITY.KEYID = 7
39,726,588 UART: [art] PUB.X = C98184D9A8CF0C5633B510887BE9573E4AD5F3114F1A7CD23AA8636BA68F6D8F0DBDE2E15A61C9D4CF230CF4177673CD
39,733,892 UART: [art] PUB.Y = E5E91FD64FC5C6598A5068F643122DC27F0F721694E3075A457CD29E966F6554E660E59DCB5D52D71AE0DF29A85C52DE
39,741,132 UART: [art] SIG.R = 0D8B292C6162A06DC64671B630427AAD9E6EDE81490FB5612FC0FCA39296B12F8383533CBB38AD3D035D1FD4E4D6558F
39,748,565 UART: [art] SIG.S = F61FE0BEBB2255C62A7E9BF7D6688D84A8453E976FB1D5CE841388D5DB7AA860EFD427A06A7B2959952126346F6DCDF7
40,727,327 UART: mbox::rt_entry...
40,728,278 UART: ____ _ _ _ ____ _____
40,730,251 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,732,249 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,734,197 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,736,124 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,738,174 UART: |_|
40,738,988 UART:
41,110,056 UART: [rt] Runtime listening for mailbox commands...
41,112,343 >>> mbox cmd response data (160 bytes)
43,168,869 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,274,093 UART:
43,274,471 UART: Running Caliptra ROM ...
43,275,567 UART:
43,275,728 UART: [state] CFI Enabled
43,351,150 UART: [state] LifecycleState = Unprovisioned
43,353,268 UART: [state] DebugLocked = No
43,355,303 UART: [state] WD Timer not started. Device not locked for debugging
43,359,259 UART: [kat] SHA2-256
43,549,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,559,888 UART: [kat] ++
43,560,537 UART: [kat] sha1
43,571,158 UART: [kat] SHA2-256
43,574,167 UART: [kat] SHA2-384
43,580,047 UART: [kat] SHA2-512-ACC
43,582,626 UART: [kat] ECC-384
46,032,415 UART: [kat] HMAC-384Kdf
46,055,726 UART: [kat] LMS
46,587,258 UART: [kat] --
46,591,195 UART: [update-reset] ++
49,655,721 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,659,736 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
50,075,213 >>> mbox cmd response: success
50,075,615 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,075,965 UART: [update-reset] Copying MAN_2 To MAN_1
50,113,525 UART: [update-reset Success] --
50,116,291 UART: [state] Locking Datavault
50,119,112 UART: [state] Locking PCR0, PCR1 and PCR31
50,121,292 UART: [state] Locking ICCM
50,122,896 UART: [exit] Launching FMC @ 0x40000130
50,131,554 UART:
50,131,782 UART: Running Caliptra FMC ...
50,132,878 UART:
50,133,031 UART: [state] CFI Enabled
50,228,355 UART: [art] Extend RT PCRs Done
50,229,538 UART: [art] Lock RT PCRs Done
50,230,935 UART: [art] Populate DV Done
50,236,498 UART: [fht] FMC Alias Private Key: 7
50,238,207 UART: [art] Derive CDI
50,239,019 UART: [art] Store in slot 0x4
50,297,411 UART: [art] Derive Key Pair
50,298,411 UART: [art] Store priv key in slot 0x5
52,760,879 UART: [art] Derive Key Pair - Done
52,773,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,488,244 UART: [art] Erasing AUTHORITY.KEYID = 7
54,489,749 UART: [art] PUB.X = B9C196C2E04F41BCA32EAB038AEA091ECDC471731EC3978E620018D65ABDE84579395EF8F5339B370283451AF60E2016
54,496,999 UART: [art] PUB.Y = 713D120952962C7663807AA22EDC90FA952A2B10C08ED55964E1043D3882F539D0382D8E0BBEDD03521FDE7C14F9C4DE
54,504,236 UART: [art] SIG.R = FC550A11ED5A25024376EB183558F2FA8B99E91AE7A33ABFBCBDE36935C02F608BB47393121E7897870EDEA5BD1034DC
54,511,628 UART: [art] SIG.S = 839E239C09C4357BAC0A482A9CAF59A07A192C011324E1401A5402874C386142D3C80D9345160126275613650758CDF3
55,490,610 UART: mbox::rt_entry...
55,491,561 UART: ____ _ _ _ ____ _____
55,493,539 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,495,540 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,497,471 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,499,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,501,351 UART: |_|
55,502,357 UART:
55,874,819 UART: [rt] Runtime listening for mailbox commands...
55,877,096 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
3,436,890 ready_for_fw is high
3,437,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,528 >>> mbox cmd response: success
19,131,319 UART:
19,131,692 UART: Running Caliptra FMC ...
19,132,791 UART:
19,132,963 UART: [state] CFI Enabled
19,200,515 UART: [fht] FMC Alias Private Key: 7
20,966,473 UART: [art] Extend RT PCRs Done
20,967,694 UART: [art] Lock RT PCRs Done
20,969,468 UART: [art] Populate DV Done
20,974,992 UART: [fht] FMC Alias Private Key: 7
20,976,638 UART: [art] Derive CDI
20,977,451 UART: [art] Store in slot 0x4
21,033,682 UART: [art] Derive Key Pair
21,034,729 UART: [art] Store priv key in slot 0x5
23,496,704 UART: [art] Derive Key Pair - Done
23,509,482 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,512 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,018 UART: [art] PUB.X = C05E475F71AE02067021A0CF1C5ADE6462A48A8E572458FE2F1AA3031D431689042AD076AAC544493A53362E1875C317
25,232,247 UART: [art] PUB.Y = F2FD63F0242BAFBAFAB00CAA8A3893D29A7F4BA80A5054109B8453F49D252719AFADD1696E83FE70F739929ACAF46D11
25,239,519 UART: [art] SIG.R = 51AA7CC5368D246B33A7884895B122303528935D2B2C5AFD1B6D065E8CA1037D2CE02001AD5569097D706404054885EE
25,246,894 UART: [art] SIG.S = 3BB46F892D278B1530F9EF177065FAE9DFC1F3482586B101E1960CDB35AF89128439058E22D2C8B5D9DB537ECAFAA925
26,225,666 UART: Caliptra RT
26,226,349 UART: [state] CFI Enabled
26,408,593 UART: [rt] RT listening for mailbox commands...
26,410,814 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,441,108 UART: [rt]cmd =0x54514754, len=24
26,444,088 >>> mbox cmd response data (8 bytes)
28,501,586 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,585,303 >>> mbox cmd response: success
35,585,872 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,618,678 UART:
35,618,960 UART: Running Caliptra FMC ...
35,620,102 UART:
35,620,262 UART: [state] CFI Enabled
35,727,047 UART: [art] Extend RT PCRs Done
35,728,244 UART: [art] Lock RT PCRs Done
35,729,409 UART: [art] Populate DV Done
35,735,147 UART: [fht] FMC Alias Private Key: 7
35,736,736 UART: [art] Derive CDI
35,737,510 UART: [art] Store in slot 0x4
35,796,415 UART: [art] Derive Key Pair
35,797,412 UART: [art] Store priv key in slot 0x5
38,260,794 UART: [art] Derive Key Pair - Done
38,273,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,986,302 UART: [art] Erasing AUTHORITY.KEYID = 7
39,987,804 UART: [art] PUB.X = 2D6F64CCC4173B8C7FC5C596808D03E63F17BA0C30471A7CAE114FBD2337CE2FB69692497B0EF128E02FF439C6EF2E94
39,995,108 UART: [art] PUB.Y = 30829CC23EBC67D2A97B106344E294EEC840630FB67745855924E7D773C19662C14FDD8D40E045C4F19801AE9B301E6F
40,002,331 UART: [art] SIG.R = 45DC2AF341AF6CF87A3E9FCE4B0BB7C7EBDC84A7EA582A5EC08126977D68E23BF7A42DB4E71D41A3564E1D318A2D9CED
40,009,790 UART: [art] SIG.S = BA0664198B1FA756BF3EDFED395D4F1185DEDC4588EB35DA9998E134D3E1A96C582A3D0F3FF66918885E064424C946EB
40,988,197 UART: mbox::rt_entry...
40,989,156 UART: ____ _ _ _ ____ _____
40,991,089 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,993,094 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,994,948 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,996,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,998,729 UART: |_|
40,999,607 UART:
41,371,394 UART: [rt] Runtime listening for mailbox commands...
41,373,653 >>> mbox cmd response data (160 bytes)
43,430,772 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,521,020 >>> mbox cmd response: success
50,521,523 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,553,044 UART:
50,553,368 UART: Running Caliptra FMC ...
50,554,495 UART:
50,554,664 UART: [state] CFI Enabled
50,660,848 UART: [art] Extend RT PCRs Done
50,662,044 UART: [art] Lock RT PCRs Done
50,663,504 UART: [art] Populate DV Done
50,669,242 UART: [fht] FMC Alias Private Key: 7
50,670,773 UART: [art] Derive CDI
50,671,586 UART: [art] Store in slot 0x4
50,729,623 UART: [art] Derive Key Pair
50,730,663 UART: [art] Store priv key in slot 0x5
53,193,350 UART: [art] Derive Key Pair - Done
53,206,199 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,917,972 UART: [art] Erasing AUTHORITY.KEYID = 7
54,919,473 UART: [art] PUB.X = BD3915D603A820C303A3B82C896E54437372FEC63B4E7665D6071B65FFD1DE971E4A2B2B643EF0D489F34906F129FDE0
54,926,723 UART: [art] PUB.Y = 904A1E3382045AAD2F7CE48BCFF78E30FA0C465E41B66C29E49AA7F5C14148D8C381495796B8DAFC42BD56F10440F867
54,934,013 UART: [art] SIG.R = 393050671C835C6CEA8125CAF238524326AA95F10A4522C8825258C6CA70DB8EB5D0829495F45AAA23486BB35365D038
54,941,354 UART: [art] SIG.S = CFF5CBBDFFA45E9353D72E7D9138FB672F671DB7B8A552E437C246B9D452E6134F1BFC02CADE622291ECD0E674CCB002
55,919,744 UART: mbox::rt_entry...
55,920,706 UART: ____ _ _ _ ____ _____
55,922,693 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,924,693 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,926,625 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,928,476 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,930,320 UART: |_|
55,931,207 UART:
56,304,397 UART: [rt] Runtime listening for mailbox commands...
56,306,629 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.93s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,621 UART:
193,007 UART: Running Caliptra ROM ...
194,117 UART:
603,828 UART: [state] CFI Enabled
619,782 UART: [state] LifecycleState = Unprovisioned
622,169 UART: [state] DebugLocked = No
623,422 UART: [state] WD Timer not started. Device not locked for debugging
628,037 UART: [kat] SHA2-256
817,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,737 UART: [kat] ++
829,239 UART: [kat] sha1
842,322 UART: [kat] SHA2-256
845,341 UART: [kat] SHA2-384
852,684 UART: [kat] SHA2-512-ACC
855,280 UART: [kat] ECC-384
3,297,510 UART: [kat] HMAC-384Kdf
3,309,457 UART: [kat] LMS
3,841,228 UART: [kat] --
3,847,292 UART: [cold-reset] ++
3,849,539 UART: [fht] FHT @ 0x50003400
3,860,452 UART: [idev] ++
3,861,161 UART: [idev] CDI.KEYID = 6
3,862,196 UART: [idev] SUBJECT.KEYID = 7
3,863,259 UART: [idev] UDS.KEYID = 0
3,864,271 ready_for_fw is high
3,864,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,427 UART: [idev] Erasing UDS.KEYID = 0
6,338,938 UART: [idev] Sha1 KeyId Algorithm
6,362,169 UART: [idev] --
6,366,859 UART: [ldev] ++
6,367,536 UART: [ldev] CDI.KEYID = 6
6,368,505 UART: [ldev] SUBJECT.KEYID = 5
6,369,669 UART: [ldev] AUTHORITY.KEYID = 7
6,370,846 UART: [ldev] FE.KEYID = 1
6,381,923 UART: [ldev] Erasing FE.KEYID = 1
8,856,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,333 UART: [ldev] --
10,646,704 UART: [fwproc] Wait for Commands...
10,648,543 UART: [fwproc] Recv command 0x46574c44
10,650,811 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,628 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,035 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,922,165 >>> mbox cmd response: success
14,925,445 UART: [afmc] ++
14,926,186 UART: [afmc] CDI.KEYID = 6
14,927,247 UART: [afmc] SUBJECT.KEYID = 7
14,928,807 UART: [afmc] AUTHORITY.KEYID = 5
17,435,005 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,158,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,160,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,175,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,863 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,205,785 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,062 UART: [afmc] --
19,232,736 UART: [cold-reset] --
19,236,777 UART: [state] Locking Datavault
19,241,992 UART: [state] Locking PCR0, PCR1 and PCR31
19,244,207 UART: [state] Locking ICCM
19,245,796 UART: [exit] Launching FMC @ 0x40000130
19,254,441 UART:
19,254,679 UART: Running Caliptra FMC ...
19,255,789 UART:
19,255,952 UART: [state] CFI Enabled
19,264,062 UART: [fht] FMC Alias Private Key: 7
21,030,402 UART: [art] Extend RT PCRs Done
21,031,627 UART: [art] Lock RT PCRs Done
21,033,259 UART: [art] Populate DV Done
21,039,057 UART: [fht] FMC Alias Private Key: 7
21,040,555 UART: [art] Derive CDI
21,041,343 UART: [art] Store in slot 0x4
21,083,839 UART: [art] Derive Key Pair
21,084,883 UART: [art] Store priv key in slot 0x5
23,512,270 UART: [art] Derive Key Pair - Done
23,525,167 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,467 UART: [art] Erasing AUTHORITY.KEYID = 7
25,232,970 UART: [art] PUB.X = 8B372E93A23C932740721B5CC68740B76090B952664C95C7869DD7179636692A23E9066F19ECE7C0E2DDCC20811A291E
25,240,238 UART: [art] PUB.Y = 69FD5A535F06F3E339893931773583668213E40A536A5EDAF43837F3006FAE3C9126EE47293F95E949E2FBE60B395474
25,247,442 UART: [art] SIG.R = C96C1D8A7F956747AEB2236681BA93007D7428E666154C5F74D56209E76B433A5A6B2A7D8FC6FE60A6E62EB02AB759CF
25,254,807 UART: [art] SIG.S = CF06367E09719D786DFF1CB9AD1BD013CD6719391AA39A2D5A39889754A97BFD4CCE2EFEA81086FF60A98ADE87B4CB99
26,233,594 UART: Caliptra RT
26,234,286 UART: [state] CFI Enabled
26,366,478 UART: [rt] RT listening for mailbox commands...
26,368,554 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,398,585 UART: [rt]cmd =0x54514754, len=24
26,401,031 >>> mbox cmd response data (8 bytes)
28,462,795 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
28,569,006 UART:
28,569,371 UART: Running Caliptra ROM ...
28,570,513 UART:
28,570,687 UART: [state] CFI Enabled
28,585,821 UART: [state] LifecycleState = Unprovisioned
28,587,721 UART: [state] DebugLocked = No
28,589,641 UART: [state] WD Timer not started. Device not locked for debugging
28,594,054 UART: [kat] SHA2-256
28,783,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
28,794,712 UART: [kat] ++
28,795,312 UART: [kat] sha1
28,806,451 UART: [kat] SHA2-256
28,809,468 UART: [kat] SHA2-384
28,816,117 UART: [kat] SHA2-512-ACC
28,818,748 UART: [kat] ECC-384
31,261,232 UART: [kat] HMAC-384Kdf
31,273,501 UART: [kat] LMS
31,805,089 UART: [kat] --
31,808,065 UART: [update-reset] ++
34,880,690 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
34,884,820 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
35,300,243 >>> mbox cmd response: success
35,300,669 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,300,952 UART: [update-reset] Copying MAN_2 To MAN_1
35,337,531 UART: [update-reset Success] --
35,340,967 UART: [state] Locking Datavault
35,343,799 UART: [state] Locking PCR0, PCR1 and PCR31
35,345,965 UART: [state] Locking ICCM
35,347,588 UART: [exit] Launching FMC @ 0x40000130
35,356,267 UART:
35,356,513 UART: Running Caliptra FMC ...
35,357,621 UART:
35,357,782 UART: [state] CFI Enabled
35,402,187 UART: [art] Extend RT PCRs Done
35,403,404 UART: [art] Lock RT PCRs Done
35,404,712 UART: [art] Populate DV Done
35,410,018 UART: [fht] FMC Alias Private Key: 7
35,411,725 UART: [art] Derive CDI
35,412,543 UART: [art] Store in slot 0x4
35,455,204 UART: [art] Derive Key Pair
35,456,249 UART: [art] Store priv key in slot 0x5
37,883,365 UART: [art] Derive Key Pair - Done
37,896,281 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,602,018 UART: [art] Erasing AUTHORITY.KEYID = 7
39,603,526 UART: [art] PUB.X = 65DCCD8FCA01DF900556695A531E65008A0B846055D022ADCE90E0F6F84D5A215C976FF0B7BA6E8F3A7F552731BE9815
39,610,835 UART: [art] PUB.Y = 88500BD2BDC1220E659369CACEA7F6E36B613A62392EF04B037FF37445BA0883870B8CB4D1001532E8E6BE6737E0FC72
39,618,039 UART: [art] SIG.R = A5CA3A1915EAE6525D80244660121CC1A0720A05EB4093BB4BBAC5A3EFA5299BE2ED9902E29116EB47B0B96169ABD526
39,625,405 UART: [art] SIG.S = 39B14E19B48DA0CFC22DEF4F24D19DDE8DFCE79F93D9F0DE5CC99B1D6BF778EB566AE49355E73A8AF8DCF1227D8B5AAF
40,603,630 UART: mbox::rt_entry...
40,604,591 UART: ____ _ _ _ ____ _____
40,606,577 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,608,542 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,610,477 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,612,364 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,614,296 UART: |_|
40,615,107 UART:
40,991,670 UART: [rt] Runtime listening for mailbox commands...
40,993,902 >>> mbox cmd response data (160 bytes)
43,054,968 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
43,160,028 UART:
43,160,394 UART: Running Caliptra ROM ...
43,161,450 UART:
43,161,663 UART: [state] CFI Enabled
43,177,561 UART: [state] LifecycleState = Unprovisioned
43,179,405 UART: [state] DebugLocked = No
43,180,819 UART: [state] WD Timer not started. Device not locked for debugging
43,186,042 UART: [kat] SHA2-256
43,375,951 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
43,386,715 UART: [kat] ++
43,387,172 UART: [kat] sha1
43,398,827 UART: [kat] SHA2-256
43,401,814 UART: [kat] SHA2-384
43,407,164 UART: [kat] SHA2-512-ACC
43,409,735 UART: [kat] ECC-384
45,850,740 UART: [kat] HMAC-384Kdf
45,862,601 UART: [kat] LMS
46,394,216 UART: [kat] --
46,398,531 UART: [update-reset] ++
49,470,602 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
49,474,093 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
49,889,528 >>> mbox cmd response: success
49,889,903 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
49,890,831 UART: [update-reset] Copying MAN_2 To MAN_1
49,928,418 UART: [update-reset Success] --
49,934,182 UART: [state] Locking Datavault
49,938,925 UART: [state] Locking PCR0, PCR1 and PCR31
49,941,137 UART: [state] Locking ICCM
49,943,965 UART: [exit] Launching FMC @ 0x40000130
49,952,596 UART:
49,952,838 UART: Running Caliptra FMC ...
49,953,865 UART:
49,954,014 UART: [state] CFI Enabled
49,997,982 UART: [art] Extend RT PCRs Done
49,999,132 UART: [art] Lock RT PCRs Done
50,000,770 UART: [art] Populate DV Done
50,006,520 UART: [fht] FMC Alias Private Key: 7
50,008,105 UART: [art] Derive CDI
50,008,852 UART: [art] Store in slot 0x4
50,051,203 UART: [art] Derive Key Pair
50,052,210 UART: [art] Store priv key in slot 0x5
52,479,132 UART: [art] Derive Key Pair - Done
52,492,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,199,006 UART: [art] Erasing AUTHORITY.KEYID = 7
54,200,535 UART: [art] PUB.X = 7ED9476830C8330243CDFE98FB881A0089161B403BC963C71A707EEECF84F1465A214B6B2BFD96ECE877662A69B060C5
54,207,747 UART: [art] PUB.Y = F637CE3EE99B46C6E406E6F8DC2816CDE6405269C408FA333101AF0820349F64EC43FE07C36D0B2F5DFA2F4F46DD50B8
54,215,003 UART: [art] SIG.R = EE041ED23A57E3F2A7CE45BDC064566EB0DC8451B9BF4188DC90CA7FDF3D3137FB7F3CFB9607B64CFE6803A86CC1359B
54,222,420 UART: [art] SIG.S = 44BF074CD421E39ED4DA35B14CF525EA06D89620D7BBDE0FF108344FE06800B56A1ABA22CEA34C7156FCB6EA215AA2AD
55,200,869 UART: mbox::rt_entry...
55,201,824 UART: ____ _ _ _ ____ _____
55,203,809 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,205,822 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,207,966 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,209,837 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,211,688 UART: |_|
55,212,573 UART:
55,588,045 UART: [rt] Runtime listening for mailbox commands...
55,590,328 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,755,630 ready_for_fw is high
3,756,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,046,614 >>> mbox cmd response: success
19,295,707 UART:
19,296,101 UART: Running Caliptra FMC ...
19,297,420 UART:
19,297,590 UART: [state] CFI Enabled
19,305,273 UART: [fht] FMC Alias Private Key: 7
21,071,083 UART: [art] Extend RT PCRs Done
21,072,315 UART: [art] Lock RT PCRs Done
21,073,814 UART: [art] Populate DV Done
21,079,077 UART: [fht] FMC Alias Private Key: 7
21,080,737 UART: [art] Derive CDI
21,081,558 UART: [art] Store in slot 0x4
21,124,351 UART: [art] Derive Key Pair
21,125,398 UART: [art] Store priv key in slot 0x5
23,552,204 UART: [art] Derive Key Pair - Done
23,565,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,189 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,700 UART: [art] PUB.X = 6180E6B432E91967AB3346FBF7CC736F354D9B3536825784104628778FF9C902082608CA46E4A42618D62984B84E2497
25,279,925 UART: [art] PUB.Y = C896955B9E0EB179B0B41B9F9DD4E84179BC84D75FE94BC2C06F3075E06CB997AFB2E0ADFD2C870B2D8E788B0D00D7DC
25,287,190 UART: [art] SIG.R = 0E4A53ECD834DAB8E57B87B8352E073AE16D61673DC1841A653D1156DB5555EF7B492FFD6B9722F2EE92AF7214AE89AB
25,294,614 UART: [art] SIG.S = 9B7823597611BF86CFC180796F1C390554A710F63118BE3828E07CFE2CCEFFD9E4C091CC2E5A88BC1A2A24791F181A37
26,273,538 UART: Caliptra RT
26,274,251 UART: [state] CFI Enabled
26,407,649 UART: [rt] RT listening for mailbox commands...
26,409,866 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
26,439,684 UART: [rt]cmd =0x54514754, len=24
26,442,300 >>> mbox cmd response data (8 bytes)
28,505,709 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
35,518,959 >>> mbox cmd response: success
35,519,485 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
35,551,923 UART:
35,552,222 UART: Running Caliptra FMC ...
35,553,346 UART:
35,553,510 UART: [state] CFI Enabled
35,597,648 UART: [art] Extend RT PCRs Done
35,598,842 UART: [art] Lock RT PCRs Done
35,600,232 UART: [art] Populate DV Done
35,605,654 UART: [fht] FMC Alias Private Key: 7
35,607,412 UART: [art] Derive CDI
35,608,228 UART: [art] Store in slot 0x4
35,650,469 UART: [art] Derive Key Pair
35,651,513 UART: [art] Store priv key in slot 0x5
38,078,546 UART: [art] Derive Key Pair - Done
38,091,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
39,797,493 UART: [art] Erasing AUTHORITY.KEYID = 7
39,799,007 UART: [art] PUB.X = 1C5F0F436ACBEAEDC31AD3D5AB42A6F777EC328F9B3CBBCDF9BDE6BCB7DB642BCDD91802BE421C336974832DA209C0A7
39,806,285 UART: [art] PUB.Y = A41D4732BEF1C44544C60F01EEA77A41ED0034EA553EB5C65A833A99C7AB836520327A905254A7D697BF1BC57A39C0E7
39,813,557 UART: [art] SIG.R = 899CB8E9CD3FCC170EEE2EB0C20A66759B0EC0FB757786D48A3EEC4193183EEE528D4F2495478DA7CB24DC81C042196C
39,820,939 UART: [art] SIG.S = 4210DC666C313B41680CF333CE510DA2D0A28E4A528870B088410C80EECCEE3F6EF8A273AE1FA5AE9775E796AFBA72F8
40,799,571 UART: mbox::rt_entry...
40,800,532 UART: ____ _ _ _ ____ _____
40,802,521 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
40,804,529 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
40,806,468 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
40,808,411 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
40,810,265 UART: |_|
40,811,173 UART:
41,180,406 UART: [rt] Runtime listening for mailbox commands...
41,182,666 >>> mbox cmd response data (160 bytes)
43,243,241 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
50,254,067 >>> mbox cmd response: success
50,254,537 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
50,289,892 UART:
50,290,208 UART: Running Caliptra FMC ...
50,291,252 UART:
50,291,404 UART: [state] CFI Enabled
50,335,809 UART: [art] Extend RT PCRs Done
50,336,963 UART: [art] Lock RT PCRs Done
50,338,136 UART: [art] Populate DV Done
50,343,823 UART: [fht] FMC Alias Private Key: 7
50,345,473 UART: [art] Derive CDI
50,346,211 UART: [art] Store in slot 0x4
50,388,918 UART: [art] Derive Key Pair
50,389,959 UART: [art] Store priv key in slot 0x5
52,816,253 UART: [art] Derive Key Pair - Done
52,829,151 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
54,535,765 UART: [art] Erasing AUTHORITY.KEYID = 7
54,537,275 UART: [art] PUB.X = BF312D5E958F5F6B6B1A7CE875EBF453B95F08BAC2CBD5CCE7066CBF8F542797795ACDC09CFA588AA4683E61E3685DCC
54,544,590 UART: [art] PUB.Y = 7572A323A5C47ECDA6C192CF2C7266AA7B001297C10E93EC4DE613732A6D936921404CB800C1D4A8CC92A08B217E999F
54,551,841 UART: [art] SIG.R = 6F21F4B9EDB55536008A7DF2A784FBE1A006C95DB4E34A334E079A8D816CF603DE6D6041D2060299C85082925FD43462
54,559,149 UART: [art] SIG.S = F528FE771380394890106E206DF6693FF87B81B6313A08C7BAC0CF6D601DC13A08ACFC60811AB0D1EC8AAFAC5F7244C8
55,537,520 UART: mbox::rt_entry...
55,538,499 UART: ____ _ _ _ ____ _____
55,540,491 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
55,542,518 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
55,544,469 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
55,546,411 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
55,548,339 UART: |_|
55,549,149 UART:
55,924,213 UART: [rt] Runtime listening for mailbox commands...
55,926,445 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,499 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,983 UART: [kat] SHA2-256
881,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,029 UART: [kat] ++
886,181 UART: [kat] sha1
890,427 UART: [kat] SHA2-256
892,365 UART: [kat] SHA2-384
895,148 UART: [kat] SHA2-512-ACC
897,049 UART: [kat] ECC-384
902,490 UART: [kat] HMAC-384Kdf
907,238 UART: [kat] LMS
1,475,434 UART: [kat] --
1,476,367 UART: [cold-reset] ++
1,476,781 UART: [fht] Storing FHT @ 0x50003400
1,479,550 UART: [idev] ++
1,479,718 UART: [idev] CDI.KEYID = 6
1,480,078 UART: [idev] SUBJECT.KEYID = 7
1,480,502 UART: [idev] UDS.KEYID = 0
1,480,847 ready_for_fw is high
1,480,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,432 UART: [idev] Erasing UDS.KEYID = 0
1,505,036 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,781 UART: [ldev] ++
1,514,949 UART: [ldev] CDI.KEYID = 6
1,515,312 UART: [ldev] SUBJECT.KEYID = 5
1,515,738 UART: [ldev] AUTHORITY.KEYID = 7
1,516,201 UART: [ldev] FE.KEYID = 1
1,521,381 UART: [ldev] Erasing FE.KEYID = 1
1,546,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,318 UART: [ldev] --
1,585,675 UART: [fwproc] Waiting for Commands...
1,586,414 UART: [fwproc] Received command 0x46574c44
1,587,205 UART: [fwproc] Received Image of size 118548 bytes
2,931,649 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,241 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,459 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,682 >>> mbox cmd response: success
3,131,910 UART: [afmc] ++
3,132,078 UART: [afmc] CDI.KEYID = 6
3,132,440 UART: [afmc] SUBJECT.KEYID = 7
3,132,865 UART: [afmc] AUTHORITY.KEYID = 5
3,167,760 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,732 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,512 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,221 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,104 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,787 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,747 UART: [afmc] --
3,210,743 UART: [cold-reset] --
3,211,559 UART: [state] Locking Datavault
3,212,536 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,140 UART: [state] Locking ICCM
3,213,790 UART: [exit] Launching FMC @ 0x40000130
3,219,120 UART:
3,219,136 UART: Running Caliptra FMC ...
3,219,544 UART:
3,219,598 UART: [state] CFI Enabled
3,229,922 UART: [fht] FMC Alias Private Key: 7
3,348,676 UART: [art] Extend RT PCRs Done
3,349,104 UART: [art] Lock RT PCRs Done
3,350,364 UART: [art] Populate DV Done
3,358,453 UART: [fht] FMC Alias Private Key: 7
3,359,435 UART: [art] Derive CDI
3,359,715 UART: [art] Store in slot 0x4
3,445,415 UART: [art] Derive Key Pair
3,445,775 UART: [art] Store priv key in slot 0x5
3,458,576 UART: [art] Derive Key Pair - Done
3,473,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,888 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,653 UART: [art] PUB.X = 5DEED0E6C50E15C59FA0379C9B940B7C4C82839C182647232CBDA76C0A6997861975CA1D237AE3F8C8D002FE94A7CD7C
3,496,421 UART: [art] PUB.Y = 5298D17E021351C1F6D2AC2AA0813D8748BF12A4F51B8FA6E7E4E4E707AF5ABAC814544959A9529992E3C17AA3092B1E
3,503,368 UART: [art] SIG.R = 234838179BA2E4E8B14430E50748BE14F06DFFED709D84A5547D67A6747423896E63848FC19DA673BCB50AD4AC222AF5
3,510,134 UART: [art] SIG.S = 3E5863C633EA16253FCA3A667054C6EDCB7CD9DECE64C000F29976D771B7689E3C571BFE9C5466AC935548CE396A38B2
3,533,446 UART: Caliptra RT
3,533,697 UART: [state] CFI Enabled
3,653,874 UART: [rt] RT listening for mailbox commands...
3,654,544 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,684,536 UART: [rt]cmd =0x54514754, len=24
3,686,589 >>> mbox cmd response data (8 bytes)
3,686,590 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,364 UART:
3,687,380 UART: Running Caliptra ROM ...
3,687,788 UART:
3,687,842 UART: [state] CFI Enabled
3,690,666 UART: [state] LifecycleState = Unprovisioned
3,691,321 UART: [state] DebugLocked = No
3,691,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,693,318 UART: [kat] SHA2-256
4,487,249 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,491,364 UART: [kat] ++
4,491,516 UART: [kat] sha1
4,495,606 UART: [kat] SHA2-256
4,497,544 UART: [kat] SHA2-384
4,500,341 UART: [kat] SHA2-512-ACC
4,502,241 UART: [kat] ECC-384
4,507,818 UART: [kat] HMAC-384Kdf
4,512,430 UART: [kat] LMS
5,080,626 UART: [kat] --
5,081,475 UART: [update-reset] ++
6,054,586 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,055,838 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,157,531 >>> mbox cmd response: success
6,157,531 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,157,788 UART: [update-reset] Copying MAN_2 To MAN_1
6,165,802 UART: [update-reset Success] --
6,166,677 UART: [state] Locking Datavault
6,167,559 UART: [state] Locking PCR0, PCR1 and PCR31
6,168,163 UART: [state] Locking ICCM
6,168,591 UART: [exit] Launching FMC @ 0x40000130
6,173,921 UART:
6,173,937 UART: Running Caliptra FMC ...
6,174,345 UART:
6,174,399 UART: [state] CFI Enabled
6,263,252 UART: [art] Extend RT PCRs Done
6,263,680 UART: [art] Lock RT PCRs Done
6,264,991 UART: [art] Populate DV Done
6,273,010 UART: [fht] FMC Alias Private Key: 7
6,274,090 UART: [art] Derive CDI
6,274,370 UART: [art] Store in slot 0x4
6,360,108 UART: [art] Derive Key Pair
6,360,468 UART: [art] Store priv key in slot 0x5
6,373,939 UART: [art] Derive Key Pair - Done
6,388,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,403,960 UART: [art] Erasing AUTHORITY.KEYID = 7
6,404,725 UART: [art] PUB.X = B2E823D751052F83CA423BBBBDBB9F8EBA083796BB692F766D6C4EC20355B6234897BC1D82AEC644791575A0036A0AB6
6,411,488 UART: [art] PUB.Y = B5F1CC58361790AF635C8ED30F68F0D0141E594588C3487281B80F0910AECD7D17E068DB0A7634306D149342942C4AD2
6,418,422 UART: [art] SIG.R = 79BCF2E9BC053352343B7CB941CFB4D28D2E4F3A8E88E5D423A6112753515CEC28899DF55A70ED560B94D28FF490FAA1
6,425,196 UART: [art] SIG.S = E87516081CBD66562EFDB518F33CF8B35619D773ECC145715F2E95CB115F52B98B9F4041439DAA3D149755E4C7CE25BB
6,448,961 UART: mbox::rt_entry...
6,449,333 UART: ____ _ _ _ ____ _____
6,450,117 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,450,917 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,451,685 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,452,453 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,453,221 UART: |_|
6,453,533 UART:
6,814,960 UART: [rt] Runtime listening for mailbox commands...
6,816,306 >>> mbox cmd response data (160 bytes)
6,816,307 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,816,421 UART:
6,816,437 UART: Running Caliptra ROM ...
6,816,845 UART:
6,816,899 UART: [state] CFI Enabled
6,819,727 UART: [state] LifecycleState = Unprovisioned
6,820,382 UART: [state] DebugLocked = No
6,821,114 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,822,833 UART: [kat] SHA2-256
7,616,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,620,879 UART: [kat] ++
7,621,031 UART: [kat] sha1
7,625,313 UART: [kat] SHA2-256
7,627,251 UART: [kat] SHA2-384
7,629,880 UART: [kat] SHA2-512-ACC
7,631,780 UART: [kat] ECC-384
7,637,603 UART: [kat] HMAC-384Kdf
7,642,247 UART: [kat] LMS
8,210,443 UART: [kat] --
8,211,374 UART: [update-reset] ++
9,183,527 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,184,817 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,286,510 >>> mbox cmd response: success
9,286,510 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,286,729 UART: [update-reset] Copying MAN_2 To MAN_1
9,294,743 UART: [update-reset Success] --
9,295,712 UART: [state] Locking Datavault
9,296,466 UART: [state] Locking PCR0, PCR1 and PCR31
9,297,070 UART: [state] Locking ICCM
9,297,668 UART: [exit] Launching FMC @ 0x40000130
9,302,998 UART:
9,303,014 UART: Running Caliptra FMC ...
9,303,422 UART:
9,303,476 UART: [state] CFI Enabled
9,392,349 UART: [art] Extend RT PCRs Done
9,392,777 UART: [art] Lock RT PCRs Done
9,393,950 UART: [art] Populate DV Done
9,402,143 UART: [fht] FMC Alias Private Key: 7
9,403,119 UART: [art] Derive CDI
9,403,399 UART: [art] Store in slot 0x4
9,489,489 UART: [art] Derive Key Pair
9,489,849 UART: [art] Store priv key in slot 0x5
9,503,356 UART: [art] Derive Key Pair - Done
9,518,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,534,255 UART: [art] Erasing AUTHORITY.KEYID = 7
9,535,020 UART: [art] PUB.X = 462DD0F0976447EFDCAD8B8727134ABC7AD42A8E15449E3CD26C23AB8585918F742161FBA30E43798124CD9C1EC62FAA
9,541,797 UART: [art] PUB.Y = 49B284495C69E80D8574124789DDE0996C20EBCD66F28395694B7316F999FEA6850428931F91EFE0F32CEA6EA047A858
9,548,737 UART: [art] SIG.R = 5056D1A67097CFF58C4EB88B2CCE98175ABB006EA096DA5BDEEDB5491091E0796B9BBFD07E7861FB1B5927BCF87F6EF1
9,555,505 UART: [art] SIG.S = 1953FBB5A1AADD8541A4F3BB9E7EB00B7D4062A64518FF96CC02317D290775B0346B65D5405E24C8537E16594C360836
9,579,169 UART: mbox::rt_entry...
9,579,541 UART: ____ _ _ _ ____ _____
9,580,325 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,581,125 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,581,893 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,582,661 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,583,429 UART: |_|
9,583,741 UART:
9,947,241 UART: [rt] Runtime listening for mailbox commands...
9,948,587 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,725 ready_for_fw is high
1,362,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,724 >>> mbox cmd response: success
3,044,489 UART:
3,044,505 UART: Running Caliptra FMC ...
3,044,913 UART:
3,044,967 UART: [state] CFI Enabled
3,056,023 UART: [fht] FMC Alias Private Key: 7
3,175,723 UART: [art] Extend RT PCRs Done
3,176,151 UART: [art] Lock RT PCRs Done
3,177,869 UART: [art] Populate DV Done
3,186,008 UART: [fht] FMC Alias Private Key: 7
3,187,016 UART: [art] Derive CDI
3,187,296 UART: [art] Store in slot 0x4
3,272,950 UART: [art] Derive Key Pair
3,273,310 UART: [art] Store priv key in slot 0x5
3,286,883 UART: [art] Derive Key Pair - Done
3,301,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,317,151 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,916 UART: [art] PUB.X = ABB30813F0EB7BDB49BD407896AC0176CAC9F45664FF8523E25FBA2094AE84A17C89CC2044445B201D74258110B96C7A
3,324,686 UART: [art] PUB.Y = 0A1423890707B499084274FBADB12F22693D4412EDDBAFF922ADAB775A1F10F01791A0B7F67737033A4D5427431B897D
3,331,619 UART: [art] SIG.R = 19EED8EE4F3338777970CC6179C490175BCF30F1B14B60FCF240345D8477AE56E5A3CC62469DAB408005D90B718FC09A
3,338,387 UART: [art] SIG.S = 27E046884D63BB830C503217D0FC9E4FBC697B8677C4054663F44DA82B70C6A7B4362DE1026B31E80953152743DAC1BC
3,362,513 UART: Caliptra RT
3,362,764 UART: [state] CFI Enabled
3,482,259 UART: [rt] RT listening for mailbox commands...
3,482,929 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,237 UART: [rt]cmd =0x54514754, len=24
3,515,370 >>> mbox cmd response data (8 bytes)
3,515,371 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,866,264 >>> mbox cmd response: success
5,866,264 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,879,592 UART:
5,879,608 UART: Running Caliptra FMC ...
5,880,016 UART:
5,880,070 UART: [state] CFI Enabled
5,969,037 UART: [art] Extend RT PCRs Done
5,969,465 UART: [art] Lock RT PCRs Done
5,970,782 UART: [art] Populate DV Done
5,978,827 UART: [fht] FMC Alias Private Key: 7
5,979,945 UART: [art] Derive CDI
5,980,225 UART: [art] Store in slot 0x4
6,065,753 UART: [art] Derive Key Pair
6,066,113 UART: [art] Store priv key in slot 0x5
6,079,262 UART: [art] Derive Key Pair - Done
6,093,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,109,663 UART: [art] Erasing AUTHORITY.KEYID = 7
6,110,428 UART: [art] PUB.X = DFC370A49100FF5B5123BF9A86D85F0B96AEBDE448032530F745EF01CE51D8FE2CF2B04F7829E930E956E488DC2DBCF9
6,117,183 UART: [art] PUB.Y = EF1ED2EEE98A6FF8EEDD083F8B85B1DA996A74AA69606724003F9AEF792EB562D28C3918D94E9B449C3116E0EA5F50A8
6,124,124 UART: [art] SIG.R = BB32ECA0BF81D0BBCB752CC170F7B4808481AFF910A4CE1BD7299F1435B9BED2C969BC4C320A29DE5607A7FD14298596
6,130,904 UART: [art] SIG.S = 7321A6C365ED35E458B496C1CF3E4CECB018B6DDCBF9801FEE571343F8330B31BEDB103C2497A6AAC254DA78CB2126CA
6,154,923 UART: mbox::rt_entry...
6,155,295 UART: ____ _ _ _ ____ _____
6,156,079 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,156,879 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,157,647 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,158,415 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,159,183 UART: |_|
6,159,495 UART:
6,523,190 UART: [rt] Runtime listening for mailbox commands...
6,524,536 >>> mbox cmd response data (160 bytes)
6,524,537 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,875,606 >>> mbox cmd response: success
8,875,606 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,888,752 UART:
8,888,768 UART: Running Caliptra FMC ...
8,889,176 UART:
8,889,230 UART: [state] CFI Enabled
8,978,357 UART: [art] Extend RT PCRs Done
8,978,785 UART: [art] Lock RT PCRs Done
8,979,858 UART: [art] Populate DV Done
8,988,023 UART: [fht] FMC Alias Private Key: 7
8,989,037 UART: [art] Derive CDI
8,989,317 UART: [art] Store in slot 0x4
9,075,651 UART: [art] Derive Key Pair
9,076,011 UART: [art] Store priv key in slot 0x5
9,089,040 UART: [art] Derive Key Pair - Done
9,103,615 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,119,182 UART: [art] Erasing AUTHORITY.KEYID = 7
9,119,947 UART: [art] PUB.X = 2E7721165249FB4D9A50FB24A558D9C9849EA1A47C1A4FB85DBB01E234B7560ACADB6CFBAC08D6A1BCA47536891CD6E2
9,126,726 UART: [art] PUB.Y = DBB895DD6E263E7AF264BBBFDC78CD1C3DAC0E179A70ED6EEF38D8C53E1F3703F985AC89A91C7E6549C76D92F7045D3F
9,133,691 UART: [art] SIG.R = 787DFBA8CA584515FB1E0CEEF5DFF86B8C20A1B8330AD9E18FB666B62BFD3E1CF17C36E2D849A5B1CAA1A0587C370580
9,140,474 UART: [art] SIG.S = EDD7C8E74B8D5E3D0F07F5D511F46536D708C92A446E180C5C51A424474309E27CE0E18A1EB8369292BB6797FC571909
9,164,050 UART: mbox::rt_entry...
9,164,422 UART: ____ _ _ _ ____ _____
9,165,206 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,166,006 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,166,774 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,167,542 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,168,310 UART: |_|
9,168,622 UART:
9,534,293 UART: [rt] Runtime listening for mailbox commands...
9,535,639 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,641 UART: [state] LifecycleState = Unprovisioned
86,296 UART: [state] DebugLocked = No
87,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,656 UART: [kat] SHA2-256
882,587 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,702 UART: [kat] ++
886,854 UART: [kat] sha1
891,162 UART: [kat] SHA2-256
893,100 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,167 UART: [kat] HMAC-384Kdf
907,797 UART: [kat] LMS
1,475,993 UART: [kat] --
1,476,670 UART: [cold-reset] ++
1,477,132 UART: [fht] Storing FHT @ 0x50003400
1,479,817 UART: [idev] ++
1,479,985 UART: [idev] CDI.KEYID = 6
1,480,345 UART: [idev] SUBJECT.KEYID = 7
1,480,769 UART: [idev] UDS.KEYID = 0
1,481,114 ready_for_fw is high
1,481,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,825 UART: [idev] Erasing UDS.KEYID = 0
1,505,653 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,163 UART: [idev] --
1,515,230 UART: [ldev] ++
1,515,398 UART: [ldev] CDI.KEYID = 6
1,515,761 UART: [ldev] SUBJECT.KEYID = 5
1,516,187 UART: [ldev] AUTHORITY.KEYID = 7
1,516,650 UART: [ldev] FE.KEYID = 1
1,521,860 UART: [ldev] Erasing FE.KEYID = 1
1,547,387 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,629 UART: [ldev] --
1,586,932 UART: [fwproc] Waiting for Commands...
1,587,659 UART: [fwproc] Received command 0x46574c44
1,588,450 UART: [fwproc] Received Image of size 118548 bytes
2,932,376 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,988 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,465 >>> mbox cmd response: success
3,132,479 UART: [afmc] ++
3,132,647 UART: [afmc] CDI.KEYID = 6
3,133,009 UART: [afmc] SUBJECT.KEYID = 7
3,133,434 UART: [afmc] AUTHORITY.KEYID = 5
3,168,737 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,185,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,186,209 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,918 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,801 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,484 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,211,198 UART: [afmc] --
3,212,140 UART: [cold-reset] --
3,213,080 UART: [state] Locking Datavault
3,214,133 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,737 UART: [state] Locking ICCM
3,215,333 UART: [exit] Launching FMC @ 0x40000130
3,220,663 UART:
3,220,679 UART: Running Caliptra FMC ...
3,221,087 UART:
3,221,230 UART: [state] CFI Enabled
3,231,784 UART: [fht] FMC Alias Private Key: 7
3,350,906 UART: [art] Extend RT PCRs Done
3,351,334 UART: [art] Lock RT PCRs Done
3,352,830 UART: [art] Populate DV Done
3,360,989 UART: [fht] FMC Alias Private Key: 7
3,362,105 UART: [art] Derive CDI
3,362,385 UART: [art] Store in slot 0x4
3,448,085 UART: [art] Derive Key Pair
3,448,445 UART: [art] Store priv key in slot 0x5
3,461,794 UART: [art] Derive Key Pair - Done
3,476,413 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,802 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,567 UART: [art] PUB.X = CBA5EB9FBEDEDB5FA784A2F2DBA25F57C8792173B4529A1EB4F6064F5CE01D1C8FDE85CE4CC4ADDF6F06FF3DA2937D49
3,499,365 UART: [art] PUB.Y = B3C9E860094DA3C68E37CF7803FE36CDBB827CE2A715157513B108A369E28B91B75B1B637C459A24866D205A821983B8
3,506,304 UART: [art] SIG.R = 518BD4A9F09F22DB2B670FB69CE7F0651496D912556D70DA9A3F12614C1AB29D85BCB40233A75EE83E893360953BDBC9
3,513,074 UART: [art] SIG.S = F0D0596B27F2071CBD19ACADC70DECD839BE42E65CB423FCFB7C3587C8E5379126AFA493522EC9B5BD02CF3D59915516
3,536,631 UART: Caliptra RT
3,536,974 UART: [state] CFI Enabled
3,656,844 UART: [rt] RT listening for mailbox commands...
3,657,514 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,570 UART: [rt]cmd =0x54514754, len=24
3,689,983 >>> mbox cmd response data (8 bytes)
3,689,984 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,690,696 UART:
3,690,712 UART: Running Caliptra ROM ...
3,691,120 UART:
3,691,261 UART: [state] CFI Enabled
3,694,199 UART: [state] LifecycleState = Unprovisioned
3,694,854 UART: [state] DebugLocked = No
3,695,358 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,696,853 UART: [kat] SHA2-256
4,490,784 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,494,899 UART: [kat] ++
4,495,051 UART: [kat] sha1
4,499,099 UART: [kat] SHA2-256
4,501,037 UART: [kat] SHA2-384
4,503,910 UART: [kat] SHA2-512-ACC
4,505,810 UART: [kat] ECC-384
4,511,425 UART: [kat] HMAC-384Kdf
4,516,135 UART: [kat] LMS
5,084,331 UART: [kat] --
5,085,044 UART: [update-reset] ++
6,057,483 UART: [update-reset] Image verified using Vendor ECC Key Index 0
6,058,627 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
6,160,320 >>> mbox cmd response: success
6,160,320 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
6,160,477 UART: [update-reset] Copying MAN_2 To MAN_1
6,168,491 UART: [update-reset Success] --
6,169,346 UART: [state] Locking Datavault
6,170,072 UART: [state] Locking PCR0, PCR1 and PCR31
6,170,676 UART: [state] Locking ICCM
6,171,222 UART: [exit] Launching FMC @ 0x40000130
6,176,552 UART:
6,176,568 UART: Running Caliptra FMC ...
6,176,976 UART:
6,177,119 UART: [state] CFI Enabled
6,266,196 UART: [art] Extend RT PCRs Done
6,266,624 UART: [art] Lock RT PCRs Done
6,267,953 UART: [art] Populate DV Done
6,275,986 UART: [fht] FMC Alias Private Key: 7
6,276,952 UART: [art] Derive CDI
6,277,232 UART: [art] Store in slot 0x4
6,363,176 UART: [art] Derive Key Pair
6,363,536 UART: [art] Store priv key in slot 0x5
6,376,495 UART: [art] Derive Key Pair - Done
6,391,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,407,199 UART: [art] Erasing AUTHORITY.KEYID = 7
6,407,964 UART: [art] PUB.X = 3DF0767745BCA73CD4C3E6BABDD6DD086B9118C09055A1C1030AF1D98BFADB4420A5B4CAB8DA2A2F5087040EB407A213
6,414,734 UART: [art] PUB.Y = 2D00C5E1767A5FD66AD2D4A31D3E84BB619BBA13F90D8FF96BA6C27522A906569A81293CDF55387A4DA1964DEF173E57
6,421,666 UART: [art] SIG.R = C998A6A4E805FE385310A38C91B2E63009B4F87485D411A4EE4C54E1E4FA60E48397FFEC24CF3BD4AB80FD348D73DCA2
6,428,444 UART: [art] SIG.S = A60DE0CF3C29DE82086F75588AAF6C625B51887D20A882896427CACFA7025FF1A048F8C8E8512342582CA034009B9D82
6,452,017 UART: mbox::rt_entry...
6,452,389 UART: ____ _ _ _ ____ _____
6,453,173 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,453,973 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,454,741 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,455,509 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,456,277 UART: |_|
6,456,589 UART:
6,820,273 UART: [rt] Runtime listening for mailbox commands...
6,821,619 >>> mbox cmd response data (160 bytes)
6,821,620 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,821,734 UART:
6,821,750 UART: Running Caliptra ROM ...
6,822,158 UART:
6,822,299 UART: [state] CFI Enabled
6,825,591 UART: [state] LifecycleState = Unprovisioned
6,826,246 UART: [state] DebugLocked = No
6,826,886 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,828,469 UART: [kat] SHA2-256
7,622,400 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,626,515 UART: [kat] ++
7,626,667 UART: [kat] sha1
7,630,739 UART: [kat] SHA2-256
7,632,677 UART: [kat] SHA2-384
7,635,432 UART: [kat] SHA2-512-ACC
7,637,332 UART: [kat] ECC-384
7,642,923 UART: [kat] HMAC-384Kdf
7,647,641 UART: [kat] LMS
8,215,837 UART: [kat] --
8,216,680 UART: [update-reset] ++
9,187,895 UART: [update-reset] Image verified using Vendor ECC Key Index 0
9,189,061 UART: [update-reset] Loading Runtime at address 0x40005000 len 56904
9,290,754 >>> mbox cmd response: success
9,290,754 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
9,290,903 UART: [update-reset] Copying MAN_2 To MAN_1
9,298,917 UART: [update-reset Success] --
9,299,664 UART: [state] Locking Datavault
9,300,408 UART: [state] Locking PCR0, PCR1 and PCR31
9,301,012 UART: [state] Locking ICCM
9,301,606 UART: [exit] Launching FMC @ 0x40000130
9,306,936 UART:
9,306,952 UART: Running Caliptra FMC ...
9,307,360 UART:
9,307,503 UART: [state] CFI Enabled
9,397,242 UART: [art] Extend RT PCRs Done
9,397,670 UART: [art] Lock RT PCRs Done
9,399,035 UART: [art] Populate DV Done
9,407,320 UART: [fht] FMC Alias Private Key: 7
9,408,468 UART: [art] Derive CDI
9,408,748 UART: [art] Store in slot 0x4
9,494,470 UART: [art] Derive Key Pair
9,494,830 UART: [art] Store priv key in slot 0x5
9,508,519 UART: [art] Derive Key Pair - Done
9,523,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,538,592 UART: [art] Erasing AUTHORITY.KEYID = 7
9,539,357 UART: [art] PUB.X = BFF8A92D3F195F37E85E7E3262EDC4A91B90DA36BAB6878C0DCB19E0A257CA1AD0768CE11A2120D461848B8B138590CC
9,546,138 UART: [art] PUB.Y = 1A1CC521C31A3A7A567A2CC717AC7642531FCD04F3C0F82FC55A9B69855FC4F19F7DEA0F4353FEF67ED3E1FA3949C7D7
9,553,100 UART: [art] SIG.R = 4DECC9E9077EB3ECD2A37552DF915EA5FBC8E6DC3A7BCCED9E13E80438B4484187D17C704E1AD5C522C5DA0F8DED8C96
9,559,887 UART: [art] SIG.S = 6F6E868AD6AEA600D28302C4BFB4EC555B79EE08B0B7A4D42CB86A0FD298441CE29F95722432DDE12CF092170DF73648
9,583,183 UART: mbox::rt_entry...
9,583,555 UART: ____ _ _ _ ____ _____
9,584,339 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,585,139 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,585,907 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,586,675 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,587,443 UART: |_|
9,587,755 UART:
9,953,153 UART: [rt] Runtime listening for mailbox commands...
9,954,499 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,456 ready_for_fw is high
1,362,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,681 >>> mbox cmd response: success
3,043,410 UART:
3,043,426 UART: Running Caliptra FMC ...
3,043,834 UART:
3,043,977 UART: [state] CFI Enabled
3,054,743 UART: [fht] FMC Alias Private Key: 7
3,174,409 UART: [art] Extend RT PCRs Done
3,174,837 UART: [art] Lock RT PCRs Done
3,176,431 UART: [art] Populate DV Done
3,184,898 UART: [fht] FMC Alias Private Key: 7
3,186,048 UART: [art] Derive CDI
3,186,328 UART: [art] Store in slot 0x4
3,272,304 UART: [art] Derive Key Pair
3,272,664 UART: [art] Store priv key in slot 0x5
3,286,737 UART: [art] Derive Key Pair - Done
3,301,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,316,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,317,068 UART: [art] PUB.X = 6E9E3062993E69CC53B2C3A6940BDA56F82EF88C8010F38EDB47E3CC5593BA0C45F307F0CD3F3C2A960D42D5217CD295
3,323,836 UART: [art] PUB.Y = B3E1FEE32DB1399E71FE0BB04D5B0A4044987667CE4EB2B6B9B345BCE1C03E60EBDA2FD158FE4111C1FE69F6453E81DE
3,330,802 UART: [art] SIG.R = 98D451AF34C98095ED28323B02AD9DFADC0F18A9649F045777CC7F82C3A17F6330AB253BD143166A59AB032DABC9458C
3,337,568 UART: [art] SIG.S = 7E4FB78C5AB785284D7951E8C51BF50710C2B9176FBAC70B595EC855EF0408D38B34BA61060836591B499CAEF1E61994
3,360,960 UART: Caliptra RT
3,361,303 UART: [state] CFI Enabled
3,482,439 UART: [rt] RT listening for mailbox commands...
3,483,109 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,513,259 UART: [rt]cmd =0x54514754, len=24
3,515,448 >>> mbox cmd response data (8 bytes)
3,515,449 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,867,629 >>> mbox cmd response: success
5,867,629 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,881,049 UART:
5,881,065 UART: Running Caliptra FMC ...
5,881,473 UART:
5,881,616 UART: [state] CFI Enabled
5,970,775 UART: [art] Extend RT PCRs Done
5,971,203 UART: [art] Lock RT PCRs Done
5,972,444 UART: [art] Populate DV Done
5,980,763 UART: [fht] FMC Alias Private Key: 7
5,981,883 UART: [art] Derive CDI
5,982,163 UART: [art] Store in slot 0x4
6,067,695 UART: [art] Derive Key Pair
6,068,055 UART: [art] Store priv key in slot 0x5
6,080,788 UART: [art] Derive Key Pair - Done
6,095,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
6,110,690 UART: [art] Erasing AUTHORITY.KEYID = 7
6,111,455 UART: [art] PUB.X = 951EC8664D6E82C9A40210641BEA7C55D5E7443A4F2E4D5BC725EAAD028C079CE2A901F5FBB2FA8A2662B10F1222F5FA
6,118,224 UART: [art] PUB.Y = 8C2A24A805C8513B1C00C1B028F8702CE11EEF11AD405BD3C1AF8E25A0FD4ECF59BE6D1C884ABED643DB7DAD473B3180
6,125,171 UART: [art] SIG.R = E0358A03FEB5ED4BA2181F2D6ECF3A4414A2748E76D4C965005917F07F076FDB97F71E2FA115E3AD24C5384B20175D6C
6,131,921 UART: [art] SIG.S = FB4E3F93385FB40346ECC3F9AD02A71255E9C76BAA1AA0FF5BB4BCA9DA44A258BF08F6DB476D1766A048D8B2C3020305
6,156,375 UART: mbox::rt_entry...
6,156,747 UART: ____ _ _ _ ____ _____
6,157,531 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
6,158,331 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
6,159,099 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
6,159,867 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
6,160,635 UART: |_|
6,160,947 UART:
6,524,455 UART: [rt] Runtime listening for mailbox commands...
6,525,801 >>> mbox cmd response data (160 bytes)
6,525,802 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
8,877,826 >>> mbox cmd response: success
8,877,826 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,891,850 UART:
8,891,866 UART: Running Caliptra FMC ...
8,892,274 UART:
8,892,417 UART: [state] CFI Enabled
8,981,534 UART: [art] Extend RT PCRs Done
8,981,962 UART: [art] Lock RT PCRs Done
8,983,327 UART: [art] Populate DV Done
8,991,526 UART: [fht] FMC Alias Private Key: 7
8,992,460 UART: [art] Derive CDI
8,992,740 UART: [art] Store in slot 0x4
9,078,390 UART: [art] Derive Key Pair
9,078,750 UART: [art] Store priv key in slot 0x5
9,092,371 UART: [art] Derive Key Pair - Done
9,106,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,122,186 UART: [art] Erasing AUTHORITY.KEYID = 7
9,122,951 UART: [art] PUB.X = 5E5751430DB4A98BB9CE527F31D174EC2E026CE75F6EB2516B481F69900F10D6D6D2AADB040F40BAA7CE1A7D46520DDB
9,129,719 UART: [art] PUB.Y = 45A74602BAAF9BB7804C27965FDC377C032BCBE09DBC50B5102CC8FC18331C18344A28A4182B2DC7B3D5A73129F4D057
9,136,671 UART: [art] SIG.R = 88A177CD4FAA21E6202D7F63456E43073E7391033DCBD13A405FA713A9AAF545A79F4B268B3B93A4321A292FF30E948F
9,143,436 UART: [art] SIG.S = 31D6179563D2B11C4BBDF936DD62FA7470FAA86FDEFCA99A9921537ED4D3888B7CF9C2AAF3F7BF684FF0F6DD55FB0E0E
9,167,640 UART: mbox::rt_entry...
9,168,012 UART: ____ _ _ _ ____ _____
9,168,796 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
9,169,596 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
9,170,364 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
9,171,132 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
9,171,900 UART: |_|
9,172,212 UART:
9,534,057 UART: [rt] Runtime listening for mailbox commands...
9,535,403 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,314 UART: [state] LifecycleState = Unprovisioned
85,969 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,804 UART: [kat] SHA2-256
891,354 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,458 UART: [kat] ++
895,610 UART: [kat] sha1
899,878 UART: [kat] SHA2-256
901,818 UART: [kat] SHA2-384
904,535 UART: [kat] SHA2-512-ACC
906,436 UART: [kat] ECC-384
916,279 UART: [kat] HMAC-384Kdf
920,671 UART: [kat] LMS
1,168,983 UART: [kat] --
1,169,604 UART: [cold-reset] ++
1,170,150 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 ready_for_fw is high
1,174,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,987 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,701 UART: [idev] --
1,208,768 UART: [ldev] ++
1,208,936 UART: [ldev] CDI.KEYID = 6
1,209,300 UART: [ldev] SUBJECT.KEYID = 5
1,209,727 UART: [ldev] AUTHORITY.KEYID = 7
1,210,190 UART: [ldev] FE.KEYID = 1
1,215,436 UART: [ldev] Erasing FE.KEYID = 1
1,241,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,284 UART: [ldev] --
1,280,531 UART: [fwproc] Wait for Commands...
1,281,238 UART: [fwproc] Recv command 0x46574c44
1,281,971 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,145 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,557 >>> mbox cmd response: success
2,825,655 UART: [afmc] ++
2,825,823 UART: [afmc] CDI.KEYID = 6
2,826,186 UART: [afmc] SUBJECT.KEYID = 7
2,826,612 UART: [afmc] AUTHORITY.KEYID = 5
2,861,509 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,956 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,705 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,415 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,296 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,997 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,678 UART: [afmc] --
2,904,701 UART: [cold-reset] --
2,905,637 UART: [state] Locking Datavault
2,906,864 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,468 UART: [state] Locking ICCM
2,908,118 UART: [exit] Launching FMC @ 0x40000130
2,913,448 UART:
2,913,464 UART: Running Caliptra FMC ...
2,913,872 UART:
2,913,926 UART: [state] CFI Enabled
2,924,498 UART: [fht] FMC Alias Private Key: 7
3,042,882 UART: [art] Extend RT PCRs Done
3,043,310 UART: [art] Lock RT PCRs Done
3,044,780 UART: [art] Populate DV Done
3,052,937 UART: [fht] FMC Alias Private Key: 7
3,053,961 UART: [art] Derive CDI
3,054,241 UART: [art] Store in slot 0x4
3,140,100 UART: [art] Derive Key Pair
3,140,460 UART: [art] Store priv key in slot 0x5
3,153,364 UART: [art] Derive Key Pair - Done
3,167,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,246 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,011 UART: [art] PUB.X = D2EACBBE1FF29CDB746030500923F2CCE499629E1DB1711353CC9B49618FAD62FD10B5FFE198D2EF0119FA7B7FD66451
3,190,791 UART: [art] PUB.Y = D975B0AC24C3BEE2789C369BC7167083211823F424BD06939C7D7EF99CFE19F218EF2C2C9FC5976ACC7D25B3CA64616A
3,197,748 UART: [art] SIG.R = 499DB54E326B45C93D762ABB0FC7C4F49241AC03A22345DA581D1526FAF779B886F0207EFB2837890D808D443EF87C6D
3,204,513 UART: [art] SIG.S = 147F8138AA998DBB5818E6C0F5F487EA7C5E79BC2EC008F19AF8AB04F381D8469F396A6B84CFCB8517DC0D5091C9B6C8
3,228,588 UART: Caliptra RT
3,228,839 UART: [state] CFI Enabled
3,347,933 UART: [rt] RT listening for mailbox commands...
3,348,603 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,529 UART: [rt]cmd =0x54514754, len=24
3,380,720 >>> mbox cmd response data (8 bytes)
3,380,721 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,546 UART:
3,381,562 UART: Running Caliptra ROM ...
3,381,970 UART:
3,382,025 UART: [state] CFI Enabled
3,384,923 UART: [state] LifecycleState = Unprovisioned
3,385,578 UART: [state] DebugLocked = No
3,386,190 UART: [state] WD Timer not started. Device not locked for debugging
3,387,348 UART: [kat] SHA2-256
4,190,898 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,195,002 UART: [kat] ++
4,195,154 UART: [kat] sha1
4,199,386 UART: [kat] SHA2-256
4,201,326 UART: [kat] SHA2-384
4,204,215 UART: [kat] SHA2-512-ACC
4,206,115 UART: [kat] ECC-384
4,216,310 UART: [kat] HMAC-384Kdf
4,220,980 UART: [kat] LMS
4,469,292 UART: [kat] --
4,470,476 UART: [update-reset] ++
5,420,818 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,421,869 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,523,510 >>> mbox cmd response: success
5,523,510 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,523,711 UART: [update-reset] Copying MAN_2 To MAN_1
5,531,725 UART: [update-reset Success] --
5,532,488 UART: [state] Locking Datavault
5,533,386 UART: [state] Locking PCR0, PCR1 and PCR31
5,533,990 UART: [state] Locking ICCM
5,534,608 UART: [exit] Launching FMC @ 0x40000130
5,539,938 UART:
5,539,954 UART: Running Caliptra FMC ...
5,540,362 UART:
5,540,416 UART: [state] CFI Enabled
5,629,835 UART: [art] Extend RT PCRs Done
5,630,263 UART: [art] Lock RT PCRs Done
5,631,256 UART: [art] Populate DV Done
5,639,227 UART: [fht] FMC Alias Private Key: 7
5,640,247 UART: [art] Derive CDI
5,640,527 UART: [art] Store in slot 0x4
5,725,976 UART: [art] Derive Key Pair
5,726,336 UART: [art] Store priv key in slot 0x5
5,740,072 UART: [art] Derive Key Pair - Done
5,755,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,770,669 UART: [art] Erasing AUTHORITY.KEYID = 7
5,771,434 UART: [art] PUB.X = E779FFC44DD0DCC17EDB29583F95CCBBD74DB91DF3CB989A2BE5A18B13EB2768C86DB976DEDDE39AC099B81D4CA2EB39
5,778,236 UART: [art] PUB.Y = 7EA93AFA0CFFC48AD07B6981383496DBE93B4C9A9512929FC4C4A8DA80854797CE162A2AD36A9A22B3FD9EDFC6B257ED
5,785,203 UART: [art] SIG.R = FF6B0DB96340108C1ED79801704C9A900EF89D0FDE39DEC93EBC4A5416FBA7F5EEB1D0F231D84492B5772680FA08B74E
5,791,972 UART: [art] SIG.S = EB44B7B72D991C543F397AA0EB7005761E9D884918DF78CFC7793AADD4A5B0EED8C2AD1F5AA1CBD2359C566996AC3D78
5,816,001 UART: mbox::rt_entry...
5,816,373 UART: ____ _ _ _ ____ _____
5,817,157 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,817,957 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,818,725 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,819,493 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,820,261 UART: |_|
5,820,573 UART:
6,184,422 UART: [rt] Runtime listening for mailbox commands...
6,185,768 >>> mbox cmd response data (160 bytes)
6,185,769 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,185,880 UART:
6,185,896 UART: Running Caliptra ROM ...
6,186,304 UART:
6,186,359 UART: [state] CFI Enabled
6,188,989 UART: [state] LifecycleState = Unprovisioned
6,189,644 UART: [state] DebugLocked = No
6,190,136 UART: [state] WD Timer not started. Device not locked for debugging
6,191,326 UART: [kat] SHA2-256
6,994,876 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,998,980 UART: [kat] ++
6,999,132 UART: [kat] sha1
7,003,336 UART: [kat] SHA2-256
7,005,276 UART: [kat] SHA2-384
7,008,013 UART: [kat] SHA2-512-ACC
7,009,913 UART: [kat] ECC-384
7,019,062 UART: [kat] HMAC-384Kdf
7,023,662 UART: [kat] LMS
7,271,974 UART: [kat] --
7,272,826 UART: [update-reset] ++
8,223,028 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,224,007 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,325,648 >>> mbox cmd response: success
8,325,648 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,325,807 UART: [update-reset] Copying MAN_2 To MAN_1
8,333,821 UART: [update-reset Success] --
8,334,762 UART: [state] Locking Datavault
8,335,566 UART: [state] Locking PCR0, PCR1 and PCR31
8,336,170 UART: [state] Locking ICCM
8,336,682 UART: [exit] Launching FMC @ 0x40000130
8,342,012 UART:
8,342,028 UART: Running Caliptra FMC ...
8,342,436 UART:
8,342,490 UART: [state] CFI Enabled
8,431,577 UART: [art] Extend RT PCRs Done
8,432,005 UART: [art] Lock RT PCRs Done
8,433,384 UART: [art] Populate DV Done
8,441,865 UART: [fht] FMC Alias Private Key: 7
8,442,965 UART: [art] Derive CDI
8,443,245 UART: [art] Store in slot 0x4
8,529,484 UART: [art] Derive Key Pair
8,529,844 UART: [art] Store priv key in slot 0x5
8,543,076 UART: [art] Derive Key Pair - Done
8,557,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,573,395 UART: [art] Erasing AUTHORITY.KEYID = 7
8,574,160 UART: [art] PUB.X = 7267E16172054442FE9722531525BA883227FFFE2B1860E336703C6BFB8849760FD24803C4F2FCFF66B22C559956F165
8,580,911 UART: [art] PUB.Y = 88651E161FC681458D91064B7C251651DA1C1A9908696A9215C18793A02231F27443AD3811DC30289C7B88A402817D94
8,587,834 UART: [art] SIG.R = E9B9E1E02E88D6F4720B985EAA4CAE3C9B4142770FE06D91B87BEB002700FBA5E1907AF103D9F8EBEC6AEDEB40B731A8
8,594,573 UART: [art] SIG.S = D1879F7A681037DD51AB120D65F673E6F4C44369742CAAEB72BBAD16EEC36E23BE0CA29CF5B035D870FB393B2C1579BA
8,618,355 UART: mbox::rt_entry...
8,618,727 UART: ____ _ _ _ ____ _____
8,619,511 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,620,311 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,621,079 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,621,847 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,622,615 UART: |_|
8,622,927 UART:
8,989,946 UART: [rt] Runtime listening for mailbox commands...
8,991,292 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,448 ready_for_fw is high
1,059,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,808 >>> mbox cmd response: success
2,739,109 UART:
2,739,125 UART: Running Caliptra FMC ...
2,739,533 UART:
2,739,587 UART: [state] CFI Enabled
2,749,709 UART: [fht] FMC Alias Private Key: 7
2,868,437 UART: [art] Extend RT PCRs Done
2,868,865 UART: [art] Lock RT PCRs Done
2,870,139 UART: [art] Populate DV Done
2,878,306 UART: [fht] FMC Alias Private Key: 7
2,879,410 UART: [art] Derive CDI
2,879,690 UART: [art] Store in slot 0x4
2,965,309 UART: [art] Derive Key Pair
2,965,669 UART: [art] Store priv key in slot 0x5
2,979,175 UART: [art] Derive Key Pair - Done
2,994,082 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,521 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,286 UART: [art] PUB.X = B5FFC8A7D6B077F3362D820E9FE4FE7E1F2B20C8169B17043BBBA1B879D401157BF24BCB92961E45B8D98E554472AD26
3,017,057 UART: [art] PUB.Y = D2D155C54301340DACFF5C76D1A9002B92A4E6C169C0D87584BACDA427BA7AC2E227BDEFEA2912CD2960CF02218FBA43
3,023,994 UART: [art] SIG.R = 7E9CF14C5D77321E5A413E3441BD1DD91205191C17E2084C26CA4A1170987C6CE65E72F59E539FDFFE1469EBA1C52262
3,030,762 UART: [art] SIG.S = FC9157BD5F242A2DCFAE5830B796C51E74F83DC935326AE9DBF00B778D1788C4ACC43E1CE1323A58F6B6463C2BDB3D3A
3,055,595 UART: Caliptra RT
3,055,846 UART: [state] CFI Enabled
3,176,223 UART: [rt] RT listening for mailbox commands...
3,176,893 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,759 UART: [rt]cmd =0x54514754, len=24
3,208,786 >>> mbox cmd response data (8 bytes)
3,208,787 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,233,352 >>> mbox cmd response: success
5,233,352 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,246,733 UART:
5,246,749 UART: Running Caliptra FMC ...
5,247,157 UART:
5,247,211 UART: [state] CFI Enabled
5,336,222 UART: [art] Extend RT PCRs Done
5,336,650 UART: [art] Lock RT PCRs Done
5,337,977 UART: [art] Populate DV Done
5,346,094 UART: [fht] FMC Alias Private Key: 7
5,347,052 UART: [art] Derive CDI
5,347,332 UART: [art] Store in slot 0x4
5,433,289 UART: [art] Derive Key Pair
5,433,649 UART: [art] Store priv key in slot 0x5
5,447,159 UART: [art] Derive Key Pair - Done
5,461,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,476,827 UART: [art] Erasing AUTHORITY.KEYID = 7
5,477,592 UART: [art] PUB.X = 3E09E2CF3D205E8B96BF8D90B3602BEDE9B4056EBB1CDF689645A53F76436A924D1D063D4A3EF1294B78C8EC1423D2C5
5,484,365 UART: [art] PUB.Y = 25DE8992F7F2AC808C781A898A8EDCC37045DBE20A76088201B801EB46FE053C86141791FB4C03020452818BD1C84674
5,491,287 UART: [art] SIG.R = 1F2969E96EE090A66DBA5C3FE5E9395FDE3DE504C8BBC87BF2005C4B12588DF84344BF7A19BDF85B38EAA628A800E8CD
5,498,030 UART: [art] SIG.S = 4592D9BC6F6EF0CDE974CE3DBEEC83D806AAECC27C1D3D83D9C64EE4CE67457786184BC126C76D570427DC993DC978A0
5,522,094 UART: mbox::rt_entry...
5,522,466 UART: ____ _ _ _ ____ _____
5,523,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,524,050 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,524,818 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,525,586 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,526,354 UART: |_|
5,526,666 UART:
5,887,877 UART: [rt] Runtime listening for mailbox commands...
5,889,223 >>> mbox cmd response data (160 bytes)
5,889,224 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,915,259 >>> mbox cmd response: success
7,915,259 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,928,550 UART:
7,928,566 UART: Running Caliptra FMC ...
7,928,974 UART:
7,929,028 UART: [state] CFI Enabled
8,018,465 UART: [art] Extend RT PCRs Done
8,018,893 UART: [art] Lock RT PCRs Done
8,020,128 UART: [art] Populate DV Done
8,028,455 UART: [fht] FMC Alias Private Key: 7
8,029,473 UART: [art] Derive CDI
8,029,753 UART: [art] Store in slot 0x4
8,115,096 UART: [art] Derive Key Pair
8,115,456 UART: [art] Store priv key in slot 0x5
8,129,416 UART: [art] Derive Key Pair - Done
8,144,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,159,669 UART: [art] Erasing AUTHORITY.KEYID = 7
8,160,434 UART: [art] PUB.X = A63BFD141FA63141E24028289EE7186CFA67D617CEE19A5E4C8B94FB3412582F62E3EC168C3268038C099400C3F28B2C
8,167,178 UART: [art] PUB.Y = 9F74DC7D7E0AB3690D2E203A9BE9B015DAE4499A519CBCE5A0F1DD69D43CBB8D15CD19911E69DDABC4C3D407F3C49E1E
8,174,145 UART: [art] SIG.R = B97FB2EF7EEEDF3348961C2061C7431EEFAEDD2C81F719EDB18C783C4241986C43C27726513204E3C95254D5C4031148
8,180,911 UART: [art] SIG.S = A1441EED028713475FE674C99E865AA3BD6DDE5CA1B1B74E372CDB5D1FAF907B4A2977443A8189EBFC6E54D6A924AE6A
8,204,986 UART: mbox::rt_entry...
8,205,358 UART: ____ _ _ _ ____ _____
8,206,142 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,206,942 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,207,710 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,208,478 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,209,246 UART: |_|
8,209,558 UART:
8,580,827 UART: [rt] Runtime listening for mailbox commands...
8,582,173 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Unprovisioned
85,828 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,583 UART: [kat] SHA2-256
891,133 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,237 UART: [kat] ++
895,389 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
915,886 UART: [kat] HMAC-384Kdf
920,696 UART: [kat] LMS
1,169,008 UART: [kat] --
1,169,633 UART: [cold-reset] ++
1,170,133 UART: [fht] FHT @ 0x50003400
1,172,783 UART: [idev] ++
1,172,951 UART: [idev] CDI.KEYID = 6
1,173,312 UART: [idev] SUBJECT.KEYID = 7
1,173,737 UART: [idev] UDS.KEYID = 0
1,174,083 ready_for_fw is high
1,174,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,542 UART: [idev] Erasing UDS.KEYID = 0
1,198,386 UART: [idev] Sha1 KeyId Algorithm
1,207,340 UART: [idev] --
1,208,399 UART: [ldev] ++
1,208,567 UART: [ldev] CDI.KEYID = 6
1,208,931 UART: [ldev] SUBJECT.KEYID = 5
1,209,358 UART: [ldev] AUTHORITY.KEYID = 7
1,209,821 UART: [ldev] FE.KEYID = 1
1,215,169 UART: [ldev] Erasing FE.KEYID = 1
1,241,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,687 UART: [ldev] --
1,280,906 UART: [fwproc] Wait for Commands...
1,281,685 UART: [fwproc] Recv command 0x46574c44
1,282,418 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,670 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,845 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,232 >>> mbox cmd response: success
2,826,276 UART: [afmc] ++
2,826,444 UART: [afmc] CDI.KEYID = 6
2,826,807 UART: [afmc] SUBJECT.KEYID = 7
2,827,233 UART: [afmc] AUTHORITY.KEYID = 5
2,863,040 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,283 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,032 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,623 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,324 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,917 UART: [afmc] --
2,905,872 UART: [cold-reset] --
2,906,664 UART: [state] Locking Datavault
2,908,071 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,675 UART: [state] Locking ICCM
2,909,149 UART: [exit] Launching FMC @ 0x40000130
2,914,479 UART:
2,914,495 UART: Running Caliptra FMC ...
2,914,903 UART:
2,915,046 UART: [state] CFI Enabled
2,925,734 UART: [fht] FMC Alias Private Key: 7
3,045,198 UART: [art] Extend RT PCRs Done
3,045,626 UART: [art] Lock RT PCRs Done
3,047,302 UART: [art] Populate DV Done
3,055,541 UART: [fht] FMC Alias Private Key: 7
3,056,673 UART: [art] Derive CDI
3,056,953 UART: [art] Store in slot 0x4
3,143,006 UART: [art] Derive Key Pair
3,143,366 UART: [art] Store priv key in slot 0x5
3,157,318 UART: [art] Derive Key Pair - Done
3,172,101 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,259 UART: [art] PUB.X = 2F28ECD1DA160057B9759494AEC583A55502A6331EF9135C38173B2935364B5C3726344B89C98A4DAB630FA1AB03E271
3,194,994 UART: [art] PUB.Y = ABC122C64024E373DBF9508B29C94A46226A8FADB1FF9FE463FB94ED00BAF20281A51596ECBD7F0F4F02D43DD3079865
3,201,924 UART: [art] SIG.R = 2E054306FB19630F14742D3A8FC3A874EF7CD6340CC1FFA972F8D274BC0A0BD662ED7C95C0D300D78E08755DB9E69D60
3,208,661 UART: [art] SIG.S = 93769EAFD5223CAEF8FF77264DF7F77190D61BC7CA136923B748D02A8D238E097061A3680C3FACB937B1FD81CAE3E995
3,232,055 UART: Caliptra RT
3,232,398 UART: [state] CFI Enabled
3,351,985 UART: [rt] RT listening for mailbox commands...
3,352,655 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,953 UART: [rt]cmd =0x54514754, len=24
3,385,322 >>> mbox cmd response data (8 bytes)
3,385,323 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,232 UART:
3,386,248 UART: Running Caliptra ROM ...
3,386,656 UART:
3,386,798 UART: [state] CFI Enabled
3,389,450 UART: [state] LifecycleState = Unprovisioned
3,390,105 UART: [state] DebugLocked = No
3,390,735 UART: [state] WD Timer not started. Device not locked for debugging
3,391,963 UART: [kat] SHA2-256
4,195,513 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,199,617 UART: [kat] ++
4,199,769 UART: [kat] sha1
4,204,031 UART: [kat] SHA2-256
4,205,971 UART: [kat] SHA2-384
4,208,818 UART: [kat] SHA2-512-ACC
4,210,718 UART: [kat] ECC-384
4,220,173 UART: [kat] HMAC-384Kdf
4,224,853 UART: [kat] LMS
4,473,165 UART: [kat] --
4,474,051 UART: [update-reset] ++
5,423,229 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,424,296 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,525,937 >>> mbox cmd response: success
5,525,937 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,526,260 UART: [update-reset] Copying MAN_2 To MAN_1
5,534,274 UART: [update-reset Success] --
5,535,301 UART: [state] Locking Datavault
5,536,157 UART: [state] Locking PCR0, PCR1 and PCR31
5,536,761 UART: [state] Locking ICCM
5,537,245 UART: [exit] Launching FMC @ 0x40000130
5,542,575 UART:
5,542,591 UART: Running Caliptra FMC ...
5,542,999 UART:
5,543,142 UART: [state] CFI Enabled
5,632,831 UART: [art] Extend RT PCRs Done
5,633,259 UART: [art] Lock RT PCRs Done
5,634,534 UART: [art] Populate DV Done
5,642,683 UART: [fht] FMC Alias Private Key: 7
5,643,645 UART: [art] Derive CDI
5,643,925 UART: [art] Store in slot 0x4
5,729,376 UART: [art] Derive Key Pair
5,729,736 UART: [art] Store priv key in slot 0x5
5,743,056 UART: [art] Derive Key Pair - Done
5,757,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,773,598 UART: [art] Erasing AUTHORITY.KEYID = 7
5,774,363 UART: [art] PUB.X = 7FBAF0DE267D9C6B696885D41317AB2162F3D92CF0A454E343F6546BBED9D03EBF135D9922A551E90FBC05378DEF62E3
5,781,139 UART: [art] PUB.Y = 82598771F35E58E4DBDF947EE8593B2D56D0777B9B7BE32A27ABFE1C8A6B33A9E9DB7EB2909BCECE5E4F564CA9B4D6F8
5,788,111 UART: [art] SIG.R = 1C7564A5DBA6612A154BD4824E7FEEF4D496644355FD85A1863F85FB762578374CFAB38FEBA6B9940873CA19B8AF78B5
5,794,886 UART: [art] SIG.S = 0AB8AE69FBBEF4E502D74A84D1E55EAA3618C3AE55FEBFF19374D1AA1C45D65C7B3434E86721E974F73A7734BACE4864
5,818,548 UART: mbox::rt_entry...
5,818,920 UART: ____ _ _ _ ____ _____
5,819,704 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,820,504 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,821,272 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,822,040 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,822,808 UART: |_|
5,823,120 UART:
6,185,277 UART: [rt] Runtime listening for mailbox commands...
6,186,623 >>> mbox cmd response data (160 bytes)
6,186,624 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,186,735 UART:
6,186,751 UART: Running Caliptra ROM ...
6,187,159 UART:
6,187,301 UART: [state] CFI Enabled
6,190,547 UART: [state] LifecycleState = Unprovisioned
6,191,202 UART: [state] DebugLocked = No
6,191,776 UART: [state] WD Timer not started. Device not locked for debugging
6,193,080 UART: [kat] SHA2-256
6,996,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,000,734 UART: [kat] ++
7,000,886 UART: [kat] sha1
7,005,064 UART: [kat] SHA2-256
7,007,004 UART: [kat] SHA2-384
7,009,659 UART: [kat] SHA2-512-ACC
7,011,559 UART: [kat] ECC-384
7,021,496 UART: [kat] HMAC-384Kdf
7,026,096 UART: [kat] LMS
7,274,408 UART: [kat] --
7,275,142 UART: [update-reset] ++
8,224,440 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,225,607 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,327,248 >>> mbox cmd response: success
8,327,248 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,327,481 UART: [update-reset] Copying MAN_2 To MAN_1
8,335,495 UART: [update-reset Success] --
8,336,382 UART: [state] Locking Datavault
8,337,202 UART: [state] Locking PCR0, PCR1 and PCR31
8,337,806 UART: [state] Locking ICCM
8,338,238 UART: [exit] Launching FMC @ 0x40000130
8,343,568 UART:
8,343,584 UART: Running Caliptra FMC ...
8,343,992 UART:
8,344,135 UART: [state] CFI Enabled
8,433,780 UART: [art] Extend RT PCRs Done
8,434,208 UART: [art] Lock RT PCRs Done
8,435,687 UART: [art] Populate DV Done
8,444,096 UART: [fht] FMC Alias Private Key: 7
8,445,258 UART: [art] Derive CDI
8,445,538 UART: [art] Store in slot 0x4
8,531,481 UART: [art] Derive Key Pair
8,531,841 UART: [art] Store priv key in slot 0x5
8,545,385 UART: [art] Derive Key Pair - Done
8,560,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,575,478 UART: [art] Erasing AUTHORITY.KEYID = 7
8,576,243 UART: [art] PUB.X = 5F5793ABB9FBD4118695D1B8613971C697E4E1CAEE7637150F0D53C739AC357AC116CE43CCA504AFB6BD4D97CC3F9879
8,583,016 UART: [art] PUB.Y = 854BD230D55DBAAB2512D0DA451AF45FA99C12A52B1FCD8B149E2F37EF5C9D4284B41CE0CAE4B20C5E1347C3FDDAD147
8,589,987 UART: [art] SIG.R = 0777808BC68CE5EFC73436AC21369F1298A0291B0A10F4B9CAB252510E5FD8C3E4136D40009494174633DA693BC06122
8,596,720 UART: [art] SIG.S = CDDAE2772F4E7F30DBE66507353907EC074291000D20279E70614446E4204AE671904261D6DBAA393DB9163ACB2C02A5
8,620,911 UART: mbox::rt_entry...
8,621,283 UART: ____ _ _ _ ____ _____
8,622,067 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,622,867 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,623,635 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,624,403 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,625,171 UART: |_|
8,625,483 UART:
8,988,189 UART: [rt] Runtime listening for mailbox commands...
8,989,535 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,351 ready_for_fw is high
1,059,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,543 >>> mbox cmd response: success
2,742,146 UART:
2,742,162 UART: Running Caliptra FMC ...
2,742,570 UART:
2,742,713 UART: [state] CFI Enabled
2,753,689 UART: [fht] FMC Alias Private Key: 7
2,872,377 UART: [art] Extend RT PCRs Done
2,872,805 UART: [art] Lock RT PCRs Done
2,874,425 UART: [art] Populate DV Done
2,882,666 UART: [fht] FMC Alias Private Key: 7
2,883,710 UART: [art] Derive CDI
2,883,990 UART: [art] Store in slot 0x4
2,969,997 UART: [art] Derive Key Pair
2,970,357 UART: [art] Store priv key in slot 0x5
2,983,609 UART: [art] Derive Key Pair - Done
2,998,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,273 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,038 UART: [art] PUB.X = E2E317F6DDE0995A8E9AEEF2EE3AF58E60F61340706EE689D1E38488680180A595130FDF15CF2D9EA17C628B81F8F7C3
3,021,812 UART: [art] PUB.Y = B85DB0AB4025A246EF61C23D6AF404D2C27183C5D91ED6FBB1F2FDFD49E2A20290F2FE9674BBF5ECB60E3092C6B79D67
3,028,773 UART: [art] SIG.R = A59432C4B5E5AB3E70D36E53C1DAC8615DC1B594C9175C6F28C5BA5258C8C81E4B4503D9537D66843DCE50C569A6B66A
3,035,548 UART: [art] SIG.S = 9CB1A49D87F736EE1CFD9E685695183907F34602F413506EE3FB31C2814AE5D70D715951A2C24FF0BA6B43BB28423F91
3,059,239 UART: Caliptra RT
3,059,582 UART: [state] CFI Enabled
3,179,778 UART: [rt] RT listening for mailbox commands...
3,180,448 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,250 UART: [rt]cmd =0x54514754, len=24
3,212,465 >>> mbox cmd response data (8 bytes)
3,212,466 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,240,136 >>> mbox cmd response: success
5,240,136 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,253,199 UART:
5,253,215 UART: Running Caliptra FMC ...
5,253,623 UART:
5,253,766 UART: [state] CFI Enabled
5,342,489 UART: [art] Extend RT PCRs Done
5,342,917 UART: [art] Lock RT PCRs Done
5,344,306 UART: [art] Populate DV Done
5,352,341 UART: [fht] FMC Alias Private Key: 7
5,353,283 UART: [art] Derive CDI
5,353,563 UART: [art] Store in slot 0x4
5,439,730 UART: [art] Derive Key Pair
5,440,090 UART: [art] Store priv key in slot 0x5
5,453,538 UART: [art] Derive Key Pair - Done
5,467,754 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,483,175 UART: [art] Erasing AUTHORITY.KEYID = 7
5,483,940 UART: [art] PUB.X = 8FFFF85AE06984BB9C46AD13DA9C28A228C5C60444CEC7D9907A7AF24DA6315CF07AD017B6EF149B028D22F2764494A0
5,490,716 UART: [art] PUB.Y = 56BC9662BC27352C55FFD86B851647E82DC39C580C883A007BC8FB3B699D3F176711884FF7ADF3112690F594E168D719
5,497,639 UART: [art] SIG.R = 4F7DEAD901BDC5AE742B34D5B5D16481A60BC7D2D471E5FF59EED675F524771AF4123F93C1F19DDE8C5C8D2B0E0BD570
5,504,417 UART: [art] SIG.S = 33972C85388D6409B8463F69463547E60B47AD0F7EB47A6381C4E857ED93D01BF1EA713532FF9995A1A0603D0A9B9AB4
5,529,153 UART: mbox::rt_entry...
5,529,525 UART: ____ _ _ _ ____ _____
5,530,309 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,531,109 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,531,877 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,532,645 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,533,413 UART: |_|
5,533,725 UART:
5,902,124 UART: [rt] Runtime listening for mailbox commands...
5,903,470 >>> mbox cmd response data (160 bytes)
5,903,471 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,928,531 >>> mbox cmd response: success
7,928,531 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,941,708 UART:
7,941,724 UART: Running Caliptra FMC ...
7,942,132 UART:
7,942,275 UART: [state] CFI Enabled
8,031,120 UART: [art] Extend RT PCRs Done
8,031,548 UART: [art] Lock RT PCRs Done
8,032,933 UART: [art] Populate DV Done
8,041,372 UART: [fht] FMC Alias Private Key: 7
8,042,304 UART: [art] Derive CDI
8,042,584 UART: [art] Store in slot 0x4
8,128,635 UART: [art] Derive Key Pair
8,128,995 UART: [art] Store priv key in slot 0x5
8,142,665 UART: [art] Derive Key Pair - Done
8,157,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,172,663 UART: [art] Erasing AUTHORITY.KEYID = 7
8,173,428 UART: [art] PUB.X = 208C2BF289648C24AE433D348EDCD0FC3C19E3626AA73C7135D018CEDAFD94FD13B1F86BF1A75E432E59432F53E660F9
8,180,210 UART: [art] PUB.Y = 0AA2C4D3F5D872E06867A09A4BBDC3DF1DEC35806A646BA75BC63EC8DDE0C9725D024DDC3CBFDC34A301B95CD38DFF77
8,187,179 UART: [art] SIG.R = E14F9DA415C4BE501190D71E5C692DCBB0686BC18DBCFE638D7B1EAECFCCD2427EC449BAC3BA4B4D9C3442F6D4F88DE9
8,193,979 UART: [art] SIG.S = 382171E556634A03127153F2225B9F095471731D930B2F5190BFC71DE80172AD14A50ADB41D9B9F02493B8AE06DA9955
8,217,833 UART: mbox::rt_entry...
8,218,205 UART: ____ _ _ _ ____ _____
8,218,989 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,219,789 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,220,557 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,221,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,222,093 UART: |_|
8,222,405 UART:
8,583,567 UART: [rt] Runtime listening for mailbox commands...
8,584,913 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.97s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,896 UART: [state] LifecycleState = Unprovisioned
85,551 UART: [state] DebugLocked = No
86,119 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
892,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,049 UART: [kat] ++
897,201 UART: [kat] sha1
901,353 UART: [kat] SHA2-256
903,293 UART: [kat] SHA2-384
906,116 UART: [kat] SHA2-512-ACC
908,017 UART: [kat] ECC-384
917,776 UART: [kat] HMAC-384Kdf
922,464 UART: [kat] LMS
1,170,792 UART: [kat] --
1,171,595 UART: [cold-reset] ++
1,172,013 UART: [fht] FHT @ 0x50003400
1,174,706 UART: [idev] ++
1,174,874 UART: [idev] CDI.KEYID = 6
1,175,234 UART: [idev] SUBJECT.KEYID = 7
1,175,658 UART: [idev] UDS.KEYID = 0
1,176,003 ready_for_fw is high
1,176,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,430 UART: [idev] Erasing UDS.KEYID = 0
1,200,645 UART: [idev] Sha1 KeyId Algorithm
1,209,111 UART: [idev] --
1,210,207 UART: [ldev] ++
1,210,375 UART: [ldev] CDI.KEYID = 6
1,210,738 UART: [ldev] SUBJECT.KEYID = 5
1,211,164 UART: [ldev] AUTHORITY.KEYID = 7
1,211,627 UART: [ldev] FE.KEYID = 1
1,216,829 UART: [ldev] Erasing FE.KEYID = 1
1,242,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,433 UART: [ldev] --
1,281,726 UART: [fwproc] Wait for Commands...
1,282,338 UART: [fwproc] Recv command 0x46574c44
1,283,066 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,437 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,345 >>> mbox cmd response: success
2,828,435 UART: [afmc] ++
2,828,603 UART: [afmc] CDI.KEYID = 6
2,828,965 UART: [afmc] SUBJECT.KEYID = 7
2,829,390 UART: [afmc] AUTHORITY.KEYID = 5
2,865,063 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,726 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,474 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,183 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,066 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,767 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,795 UART: [afmc] --
2,908,751 UART: [cold-reset] --
2,909,701 UART: [state] Locking Datavault
2,910,650 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,254 UART: [state] Locking ICCM
2,911,834 UART: [exit] Launching FMC @ 0x40000130
2,917,164 UART:
2,917,180 UART: Running Caliptra FMC ...
2,917,588 UART:
2,917,642 UART: [state] CFI Enabled
2,928,036 UART: [fht] FMC Alias Private Key: 7
3,047,192 UART: [art] Extend RT PCRs Done
3,047,620 UART: [art] Lock RT PCRs Done
3,049,078 UART: [art] Populate DV Done
3,057,267 UART: [fht] FMC Alias Private Key: 7
3,058,417 UART: [art] Derive CDI
3,058,697 UART: [art] Store in slot 0x4
3,143,888 UART: [art] Derive Key Pair
3,144,248 UART: [art] Store priv key in slot 0x5
3,157,834 UART: [art] Derive Key Pair - Done
3,172,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,602 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,367 UART: [art] PUB.X = 495212CA7E1FCB1B6DEC48CE3D73962BBF1FB6CFEF75ADA17BC29F3C61DC40C292B331E07F387BA23D5EE68686AA2839
3,196,159 UART: [art] PUB.Y = E1BC5E5DB9E38F7E5E36BECEF67F6F0D77A97C389BBF1714C450DEF4276CB9E2718023995C5F4599DD7755894EB99CC3
3,203,120 UART: [art] SIG.R = BCEC14C5F3374A453B14493CE0BADEC108037A56EAAE4FBD6D5002BB214816052FFB14F3BC233D2E6F9FBF9552D2B9B5
3,209,898 UART: [art] SIG.S = D3B9CE7ED79BF7E4FF2B548E7BB071AB3178792E7EA4FDFB9EDB18C99FDFC850F14734152081CE0F51C62233A129A84A
3,233,781 UART: Caliptra RT
3,234,032 UART: [state] CFI Enabled
3,353,900 UART: [rt] RT listening for mailbox commands...
3,354,570 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,384,160 UART: [rt]cmd =0x54514754, len=24
3,386,425 >>> mbox cmd response data (8 bytes)
3,386,426 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,247 UART:
3,387,263 UART: Running Caliptra ROM ...
3,387,671 UART:
3,387,726 UART: [state] CFI Enabled
3,390,198 UART: [state] LifecycleState = Unprovisioned
3,390,853 UART: [state] DebugLocked = No
3,391,515 UART: [state] WD Timer not started. Device not locked for debugging
3,392,761 UART: [kat] SHA2-256
4,198,411 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,202,536 UART: [kat] ++
4,202,688 UART: [kat] sha1
4,206,776 UART: [kat] SHA2-256
4,208,716 UART: [kat] SHA2-384
4,211,485 UART: [kat] SHA2-512-ACC
4,213,385 UART: [kat] ECC-384
4,223,010 UART: [kat] HMAC-384Kdf
4,227,516 UART: [kat] LMS
4,475,844 UART: [kat] --
4,476,758 UART: [update-reset] ++
5,426,957 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,428,096 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,529,737 >>> mbox cmd response: success
5,529,737 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,529,868 UART: [update-reset] Copying MAN_2 To MAN_1
5,537,882 UART: [update-reset Success] --
5,539,025 UART: [state] Locking Datavault
5,539,697 UART: [state] Locking PCR0, PCR1 and PCR31
5,540,301 UART: [state] Locking ICCM
5,540,767 UART: [exit] Launching FMC @ 0x40000130
5,546,097 UART:
5,546,113 UART: Running Caliptra FMC ...
5,546,521 UART:
5,546,575 UART: [state] CFI Enabled
5,635,576 UART: [art] Extend RT PCRs Done
5,636,004 UART: [art] Lock RT PCRs Done
5,637,463 UART: [art] Populate DV Done
5,645,630 UART: [fht] FMC Alias Private Key: 7
5,646,746 UART: [art] Derive CDI
5,647,026 UART: [art] Store in slot 0x4
5,732,757 UART: [art] Derive Key Pair
5,733,117 UART: [art] Store priv key in slot 0x5
5,746,439 UART: [art] Derive Key Pair - Done
5,760,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,776,784 UART: [art] Erasing AUTHORITY.KEYID = 7
5,777,549 UART: [art] PUB.X = F3BC4B222C98C05A9409FD04B526B8AED63F12B4E0007111D13F15CBF8A6D64933CAA2DF7F76576594F7C77C47D10E0B
5,784,295 UART: [art] PUB.Y = 3C50EF5289813B9784311C0BC40F15C56242DB750D820D90779A59937B6544D0D4BB9D01D0E02FC81486F37E4143BA4D
5,791,226 UART: [art] SIG.R = 927D172BFC48E62A101CEFF7B844E8B636E93000505B7FF5EEF5E3C3A58A1B97D0730987C10C7318B78A2449C54CC0D7
5,797,974 UART: [art] SIG.S = B2AC00C2F547C5A1B4AE98C56FE104F7845A8048A76806B625F38BFE715D7E444DCE602532FAAFB1755E0F7CE0BC3CB6
5,822,039 UART: mbox::rt_entry...
5,822,411 UART: ____ _ _ _ ____ _____
5,823,195 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,823,995 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,824,763 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,825,531 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,826,299 UART: |_|
5,826,611 UART:
6,189,694 UART: [rt] Runtime listening for mailbox commands...
6,191,040 >>> mbox cmd response data (160 bytes)
6,191,041 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,191,152 UART:
6,191,168 UART: Running Caliptra ROM ...
6,191,576 UART:
6,191,631 UART: [state] CFI Enabled
6,194,389 UART: [state] LifecycleState = Unprovisioned
6,195,044 UART: [state] DebugLocked = No
6,195,730 UART: [state] WD Timer not started. Device not locked for debugging
6,196,858 UART: [kat] SHA2-256
7,002,508 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,006,633 UART: [kat] ++
7,006,785 UART: [kat] sha1
7,011,003 UART: [kat] SHA2-256
7,012,943 UART: [kat] SHA2-384
7,015,704 UART: [kat] SHA2-512-ACC
7,017,604 UART: [kat] ECC-384
7,027,241 UART: [kat] HMAC-384Kdf
7,031,689 UART: [kat] LMS
7,280,017 UART: [kat] --
7,280,959 UART: [update-reset] ++
8,230,148 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,231,261 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,332,902 >>> mbox cmd response: success
8,332,902 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,333,257 UART: [update-reset] Copying MAN_2 To MAN_1
8,341,271 UART: [update-reset Success] --
8,342,306 UART: [state] Locking Datavault
8,343,206 UART: [state] Locking PCR0, PCR1 and PCR31
8,343,810 UART: [state] Locking ICCM
8,344,264 UART: [exit] Launching FMC @ 0x40000130
8,349,594 UART:
8,349,610 UART: Running Caliptra FMC ...
8,350,018 UART:
8,350,072 UART: [state] CFI Enabled
8,438,801 UART: [art] Extend RT PCRs Done
8,439,229 UART: [art] Lock RT PCRs Done
8,440,460 UART: [art] Populate DV Done
8,448,513 UART: [fht] FMC Alias Private Key: 7
8,449,509 UART: [art] Derive CDI
8,449,789 UART: [art] Store in slot 0x4
8,535,712 UART: [art] Derive Key Pair
8,536,072 UART: [art] Store priv key in slot 0x5
8,549,840 UART: [art] Derive Key Pair - Done
8,564,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,580,529 UART: [art] Erasing AUTHORITY.KEYID = 7
8,581,294 UART: [art] PUB.X = 0EB402877A597D7DFC6A1DC5130B0C690BEE0B99051EF23CAC67906244930968DB81F51792C5880792BA9B349979861F
8,588,033 UART: [art] PUB.Y = FAEACF798E3558A4DBD3A059C929110B5E92C705132038930829A23BE03DD3E0550BC8CFDCAB06028B439ADA8CA702EC
8,594,976 UART: [art] SIG.R = D938F566649781B70C8D7F9B4849D3D2FCE41F128B9D2417AFFFBB3870D75F2FCABD9A37D9DEEAA9BBBD0CB439285D20
8,601,762 UART: [art] SIG.S = 51CA7A3B41D2C795D52C307C8863E3059A65B493067158C330BE152E5D08DCBE5E770AA6DE5874A78341E401CDBBAEC7
8,626,109 UART: mbox::rt_entry...
8,626,481 UART: ____ _ _ _ ____ _____
8,627,265 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,628,065 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,628,833 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,629,601 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,630,369 UART: |_|
8,630,681 UART:
8,996,765 UART: [rt] Runtime listening for mailbox commands...
8,998,111 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.04s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,919 ready_for_fw is high
1,059,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,478 >>> mbox cmd response: success
2,740,333 UART:
2,740,349 UART: Running Caliptra FMC ...
2,740,757 UART:
2,740,811 UART: [state] CFI Enabled
2,751,565 UART: [fht] FMC Alias Private Key: 7
2,870,525 UART: [art] Extend RT PCRs Done
2,870,953 UART: [art] Lock RT PCRs Done
2,872,837 UART: [art] Populate DV Done
2,881,120 UART: [fht] FMC Alias Private Key: 7
2,882,160 UART: [art] Derive CDI
2,882,440 UART: [art] Store in slot 0x4
2,967,809 UART: [art] Derive Key Pair
2,968,169 UART: [art] Store priv key in slot 0x5
2,981,689 UART: [art] Derive Key Pair - Done
2,996,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,360 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,125 UART: [art] PUB.X = DC69DDE4249EBB6A5999DBAA0566E1AA43A052C5E6E367EDBD100526927F3115E37AB94CBBB72106ED81E7CC07158B95
3,019,897 UART: [art] PUB.Y = 8353E371E1D79AFBAF4EFA988FBCA98A6BB8B5D3356D1517CBFFED43EF4D133B664C1925E06DFBAC7535AA73C87DBA5E
3,026,875 UART: [art] SIG.R = A04DC3B8484F16A5D597AF04B721BE9EA91F421E1606360382889CCBC47A93AD276FD1DDB6C3878B22E55052F327F7A5
3,033,642 UART: [art] SIG.S = B3514AFDA3337327FE05A009404EEC52C938604849F8551ADBB150DE40455DFF25E2F5A9458E65F76B600D0E00BC203B
3,057,454 UART: Caliptra RT
3,057,705 UART: [state] CFI Enabled
3,176,855 UART: [rt] RT listening for mailbox commands...
3,177,525 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,367 UART: [rt]cmd =0x54514754, len=24
3,209,704 >>> mbox cmd response data (8 bytes)
3,209,705 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,189 >>> mbox cmd response: success
5,237,189 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,250,442 UART:
5,250,458 UART: Running Caliptra FMC ...
5,250,866 UART:
5,250,920 UART: [state] CFI Enabled
5,340,251 UART: [art] Extend RT PCRs Done
5,340,679 UART: [art] Lock RT PCRs Done
5,341,974 UART: [art] Populate DV Done
5,349,949 UART: [fht] FMC Alias Private Key: 7
5,351,121 UART: [art] Derive CDI
5,351,401 UART: [art] Store in slot 0x4
5,437,122 UART: [art] Derive Key Pair
5,437,482 UART: [art] Store priv key in slot 0x5
5,450,832 UART: [art] Derive Key Pair - Done
5,465,837 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,320 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,085 UART: [art] PUB.X = A14B62E9AF4ABC00CAC85F048A056DF7C97546EF083D330E5FBA43F53DE1EA629702BE631186B7ADCF47CBA82B7DF34E
5,488,840 UART: [art] PUB.Y = CB2D0BBC21BFA4985D4DAEA87A427F4B79B338E350F70CCC5978A9900035D1306659AD09E76F99FACAFB0CD32E3E7175
5,495,772 UART: [art] SIG.R = FAED2562ED29CCA48BF433C6D27B8CF89D1851445B13A7708BE91AB14BE0843A8380CCA175EBEE5F0D3E98D298B950D2
5,502,555 UART: [art] SIG.S = F56F71F2CD58B9934317C9FB93DBBAA0C6298BAD34F435312A991EDDAB9FC0C9D27A60FC05D5BFB588D4D29BD1E35AF9
5,525,972 UART: mbox::rt_entry...
5,526,344 UART: ____ _ _ _ ____ _____
5,527,128 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,527,928 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,528,696 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,529,464 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,530,232 UART: |_|
5,530,544 UART:
5,894,205 UART: [rt] Runtime listening for mailbox commands...
5,895,551 >>> mbox cmd response data (160 bytes)
5,895,552 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,920,168 >>> mbox cmd response: success
7,920,168 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,933,735 UART:
7,933,751 UART: Running Caliptra FMC ...
7,934,159 UART:
7,934,213 UART: [state] CFI Enabled
8,023,068 UART: [art] Extend RT PCRs Done
8,023,496 UART: [art] Lock RT PCRs Done
8,024,611 UART: [art] Populate DV Done
8,032,702 UART: [fht] FMC Alias Private Key: 7
8,033,702 UART: [art] Derive CDI
8,033,982 UART: [art] Store in slot 0x4
8,120,111 UART: [art] Derive Key Pair
8,120,471 UART: [art] Store priv key in slot 0x5
8,134,103 UART: [art] Derive Key Pair - Done
8,148,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,164,056 UART: [art] Erasing AUTHORITY.KEYID = 7
8,164,821 UART: [art] PUB.X = 6CF425C95DFD91CD9ABC45D28BEEB730AF99A45C6268D6B15C3736CEA276A1733A9ADD89D12734B704358F0229240831
8,171,588 UART: [art] PUB.Y = 6C6A71D7AA0F6C0C03A49B2FDC5A844692FBE6F04CFF91BCAF154DC03AC857F27D3BE27429E6CA534B6D19B10BEFFCB8
8,178,554 UART: [art] SIG.R = C2336CE5B14093612E1A1A9CF1E70A5AA720326236D5F33287B3E7C6F1053DD036E40011F74B5B15B688E23B4D9080E1
8,185,294 UART: [art] SIG.S = D2FC793C43E7B5DE89790B1BD1104B32DD09A52DBE9A5CF3AF7DE9C05FA7F626BA6C34FA8C3E6A72EBED06342CC4E25B
8,209,263 UART: mbox::rt_entry...
8,209,635 UART: ____ _ _ _ ____ _____
8,210,419 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,211,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,211,987 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,212,755 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,213,523 UART: |_|
8,213,835 UART:
8,578,064 UART: [rt] Runtime listening for mailbox commands...
8,579,410 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,976 UART: [kat] SHA2-256
903,916 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,295 UART: [kat] HMAC-384Kdf
922,871 UART: [kat] LMS
1,171,199 UART: [kat] --
1,172,184 UART: [cold-reset] ++
1,172,698 UART: [fht] FHT @ 0x50003400
1,175,429 UART: [idev] ++
1,175,597 UART: [idev] CDI.KEYID = 6
1,175,957 UART: [idev] SUBJECT.KEYID = 7
1,176,381 UART: [idev] UDS.KEYID = 0
1,176,726 ready_for_fw is high
1,176,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,349 UART: [idev] Erasing UDS.KEYID = 0
1,201,512 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,211,058 UART: [ldev] ++
1,211,226 UART: [ldev] CDI.KEYID = 6
1,211,589 UART: [ldev] SUBJECT.KEYID = 5
1,212,015 UART: [ldev] AUTHORITY.KEYID = 7
1,212,478 UART: [ldev] FE.KEYID = 1
1,218,006 UART: [ldev] Erasing FE.KEYID = 1
1,244,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,850 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,741 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,386 UART: [ldev] --
1,283,783 UART: [fwproc] Wait for Commands...
1,284,405 UART: [fwproc] Recv command 0x46574c44
1,285,133 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,861 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,690,031 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,196 >>> mbox cmd response: success
2,831,296 UART: [afmc] ++
2,831,464 UART: [afmc] CDI.KEYID = 6
2,831,826 UART: [afmc] SUBJECT.KEYID = 7
2,832,251 UART: [afmc] AUTHORITY.KEYID = 5
2,867,564 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,581 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,329 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,038 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,921 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,424 UART: [afmc] --
2,910,526 UART: [cold-reset] --
2,911,364 UART: [state] Locking Datavault
2,912,587 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,191 UART: [state] Locking ICCM
2,913,709 UART: [exit] Launching FMC @ 0x40000130
2,919,039 UART:
2,919,055 UART: Running Caliptra FMC ...
2,919,463 UART:
2,919,606 UART: [state] CFI Enabled
2,930,394 UART: [fht] FMC Alias Private Key: 7
3,049,406 UART: [art] Extend RT PCRs Done
3,049,834 UART: [art] Lock RT PCRs Done
3,051,242 UART: [art] Populate DV Done
3,059,257 UART: [fht] FMC Alias Private Key: 7
3,060,417 UART: [art] Derive CDI
3,060,697 UART: [art] Store in slot 0x4
3,146,670 UART: [art] Derive Key Pair
3,147,030 UART: [art] Store priv key in slot 0x5
3,160,362 UART: [art] Derive Key Pair - Done
3,175,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,595 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,360 UART: [art] PUB.X = 277EAF31E310DE86D83574191FA9C33AA08BC26D80DEF6265A4546A7617AAB3226A5A7C984DDD307DA21A7E3CC2522EA
3,198,139 UART: [art] PUB.Y = BE5D9EBE59A42C65A83393B0CB38F32B36CD0C7551B700696FCDB515BD812E2369B7F75669361288703728A38AA3C5DA
3,205,068 UART: [art] SIG.R = BDB3C24BCEF998E7980A26177F2B363BD64BEDAFAE65233BB683BFAF3D6B23ED4FE47C67E78964509EF29CE0A9EC2F62
3,211,859 UART: [art] SIG.S = E1287545E3B94D310B2BD8118222BEF34FF8F54FA4736B97C4D00B81B3D4861F8FF3BD77865DA6B3DB6B843AB4235F4B
3,235,713 UART: Caliptra RT
3,236,056 UART: [state] CFI Enabled
3,355,152 UART: [rt] RT listening for mailbox commands...
3,355,822 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,774 UART: [rt]cmd =0x54514754, len=24
3,388,115 >>> mbox cmd response data (8 bytes)
3,388,116 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,388,847 UART:
3,388,863 UART: Running Caliptra ROM ...
3,389,271 UART:
3,389,413 UART: [state] CFI Enabled
3,392,473 UART: [state] LifecycleState = Unprovisioned
3,393,128 UART: [state] DebugLocked = No
3,393,768 UART: [state] WD Timer not started. Device not locked for debugging
3,394,904 UART: [kat] SHA2-256
4,200,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,204,679 UART: [kat] ++
4,204,831 UART: [kat] sha1
4,209,073 UART: [kat] SHA2-256
4,211,013 UART: [kat] SHA2-384
4,213,974 UART: [kat] SHA2-512-ACC
4,215,874 UART: [kat] ECC-384
4,225,917 UART: [kat] HMAC-384Kdf
4,230,673 UART: [kat] LMS
4,479,001 UART: [kat] --
4,480,117 UART: [update-reset] ++
5,429,576 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
5,430,625 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
5,532,266 >>> mbox cmd response: success
5,532,266 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,532,453 UART: [update-reset] Copying MAN_2 To MAN_1
5,540,467 UART: [update-reset Success] --
5,541,504 UART: [state] Locking Datavault
5,542,376 UART: [state] Locking PCR0, PCR1 and PCR31
5,542,980 UART: [state] Locking ICCM
5,543,530 UART: [exit] Launching FMC @ 0x40000130
5,548,860 UART:
5,548,876 UART: Running Caliptra FMC ...
5,549,284 UART:
5,549,427 UART: [state] CFI Enabled
5,638,920 UART: [art] Extend RT PCRs Done
5,639,348 UART: [art] Lock RT PCRs Done
5,640,447 UART: [art] Populate DV Done
5,648,802 UART: [fht] FMC Alias Private Key: 7
5,649,934 UART: [art] Derive CDI
5,650,214 UART: [art] Store in slot 0x4
5,735,839 UART: [art] Derive Key Pair
5,736,199 UART: [art] Store priv key in slot 0x5
5,749,475 UART: [art] Derive Key Pair - Done
5,764,276 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,780,285 UART: [art] Erasing AUTHORITY.KEYID = 7
5,781,050 UART: [art] PUB.X = 2EB45910C64266C22134C6D1CEA1F6E8A122B1B61D32052C97104DC728DEF32AD10171D47C29F311A9B2D1460C32BFE2
5,787,815 UART: [art] PUB.Y = 9F5E7B5BE961548918CDFBFD0B319137937D53F5C6110DDFD86813360C6A9DD547F8ED5763AB8E24F08F380A0F05E347
5,794,753 UART: [art] SIG.R = 158A5D1405F90B0853AB1578C9FA3D9B3DB007FCAC8C6253F427FE0D276E3D39E45AFBE3768C4A1144C2A1EDD7419153
5,801,518 UART: [art] SIG.S = 6ADE1C1F14DFB043DC3407E5C0897F1581842413F71495980E736A4BC27AF396033BB80A8B9C480B5C958703B2824BF7
5,825,092 UART: mbox::rt_entry...
5,825,464 UART: ____ _ _ _ ____ _____
5,826,248 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,827,048 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,827,816 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,828,584 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,829,352 UART: |_|
5,829,664 UART:
6,191,505 UART: [rt] Runtime listening for mailbox commands...
6,192,851 >>> mbox cmd response data (160 bytes)
6,192,852 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
6,192,963 UART:
6,192,979 UART: Running Caliptra ROM ...
6,193,387 UART:
6,193,529 UART: [state] CFI Enabled
6,196,433 UART: [state] LifecycleState = Unprovisioned
6,197,088 UART: [state] DebugLocked = No
6,197,614 UART: [state] WD Timer not started. Device not locked for debugging
6,198,968 UART: [kat] SHA2-256
7,004,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,008,743 UART: [kat] ++
7,008,895 UART: [kat] sha1
7,013,305 UART: [kat] SHA2-256
7,015,245 UART: [kat] SHA2-384
7,018,116 UART: [kat] SHA2-512-ACC
7,020,016 UART: [kat] ECC-384
7,029,921 UART: [kat] HMAC-384Kdf
7,034,409 UART: [kat] LMS
7,282,737 UART: [kat] --
7,283,663 UART: [update-reset] ++
8,233,584 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,234,743 UART: [update-reset] Loading Runtime at addr 0x40005000 len 56904
8,336,384 >>> mbox cmd response: success
8,336,384 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
8,336,627 UART: [update-reset] Copying MAN_2 To MAN_1
8,344,641 UART: [update-reset Success] --
8,345,588 UART: [state] Locking Datavault
8,346,570 UART: [state] Locking PCR0, PCR1 and PCR31
8,347,174 UART: [state] Locking ICCM
8,347,660 UART: [exit] Launching FMC @ 0x40000130
8,352,990 UART:
8,353,006 UART: Running Caliptra FMC ...
8,353,414 UART:
8,353,557 UART: [state] CFI Enabled
8,442,708 UART: [art] Extend RT PCRs Done
8,443,136 UART: [art] Lock RT PCRs Done
8,444,239 UART: [art] Populate DV Done
8,452,506 UART: [fht] FMC Alias Private Key: 7
8,453,448 UART: [art] Derive CDI
8,453,728 UART: [art] Store in slot 0x4
8,539,429 UART: [art] Derive Key Pair
8,539,789 UART: [art] Store priv key in slot 0x5
8,552,933 UART: [art] Derive Key Pair - Done
8,567,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,582,273 UART: [art] Erasing AUTHORITY.KEYID = 7
8,583,038 UART: [art] PUB.X = 36D8C65B3CA41A10FB95464233729154F54BF015EDC0183C40C93F1964EDD44F24EC2DC4EF6229D60B64B879949DC8FB
8,589,811 UART: [art] PUB.Y = 3D75319D9730A3AFAD66C386741EB6853503BC27A2AC52FF8192E3DD24E7E410727ACA6CF1A48DFE0EA093D4B6BA01B4
8,596,766 UART: [art] SIG.R = 1B660CDD2AE9FF92BCA9FB32102D4A27671A2574D989EE08CC6A5DD4D3B3E33906E12EA8CF308A65960B3C77E38BAB4C
8,603,542 UART: [art] SIG.S = E8AC2C0EF94ED586008E45C7082B927103ABC2BE07672B50B83585685D523FB0561822349A2B4A8FB9BF3843EF43A587
8,627,422 UART: mbox::rt_entry...
8,627,794 UART: ____ _ _ _ ____ _____
8,628,578 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,629,378 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,630,146 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,630,914 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,631,682 UART: |_|
8,631,994 UART:
8,996,744 UART: [rt] Runtime listening for mailbox commands...
8,998,090 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 3.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,406 ready_for_fw is high
1,060,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,757 >>> mbox cmd response: success
2,741,610 UART:
2,741,626 UART: Running Caliptra FMC ...
2,742,034 UART:
2,742,177 UART: [state] CFI Enabled
2,752,913 UART: [fht] FMC Alias Private Key: 7
2,871,717 UART: [art] Extend RT PCRs Done
2,872,145 UART: [art] Lock RT PCRs Done
2,873,993 UART: [art] Populate DV Done
2,882,260 UART: [fht] FMC Alias Private Key: 7
2,883,202 UART: [art] Derive CDI
2,883,482 UART: [art] Store in slot 0x4
2,969,823 UART: [art] Derive Key Pair
2,970,183 UART: [art] Store priv key in slot 0x5
2,983,313 UART: [art] Derive Key Pair - Done
2,998,390 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,579 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,344 UART: [art] PUB.X = D0270A06AC44EAE6C820B105141172D4F058E4C9373A1C1E4C10C7A54755B368236A501539F2C141F8B532C5757239EE
3,021,099 UART: [art] PUB.Y = 3C4E615E0E38D55650E223FD1F8A3F0C9BBD6876753AC168082C6DB6124535C8DE2617443E5C7740999FC37FA4E80EAA
3,028,041 UART: [art] SIG.R = 35E815A9A76864941FDCB9D12F3662499C6404C58F5DAB517CF078D6A1440BB6A16723164C08EA6F996029042FFE9526
3,034,795 UART: [art] SIG.S = A43D3FC08D0E009F48F61A4578AC5A659D037355178CFF3385DA4DFCF68A2B8319222D0C65A37523B0D0A9BB54C88EDC
3,058,764 UART: Caliptra RT
3,059,107 UART: [state] CFI Enabled
3,178,910 UART: [rt] RT listening for mailbox commands...
3,179,580 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,674 UART: [rt]cmd =0x54514754, len=24
3,211,841 >>> mbox cmd response data (8 bytes)
3,211,842 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,237,823 >>> mbox cmd response: success
5,237,823 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
5,251,066 UART:
5,251,082 UART: Running Caliptra FMC ...
5,251,490 UART:
5,251,633 UART: [state] CFI Enabled
5,341,332 UART: [art] Extend RT PCRs Done
5,341,760 UART: [art] Lock RT PCRs Done
5,342,863 UART: [art] Populate DV Done
5,350,898 UART: [fht] FMC Alias Private Key: 7
5,351,914 UART: [art] Derive CDI
5,352,194 UART: [art] Store in slot 0x4
5,438,181 UART: [art] Derive Key Pair
5,438,541 UART: [art] Store priv key in slot 0x5
5,451,853 UART: [art] Derive Key Pair - Done
5,466,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,481,809 UART: [art] Erasing AUTHORITY.KEYID = 7
5,482,574 UART: [art] PUB.X = 6C2E704CC2B2311F0C594A511B43E58A12A24ED59148000114EEB255637E4BBD6348FF982DA210D2459D50971E02D9D5
5,489,311 UART: [art] PUB.Y = C0179AD43C04FAF96C2DAC567D2633729368A3100D8E093C2FA4F9DC910F29C6A3DA37D82CD7D0FED1193045FD637836
5,496,257 UART: [art] SIG.R = DEA77EFD4F3140EE105DA335391C7AD5F9CEB237BD13FFEEFCCFED0237F8D068D7F4684A53CF82836501AD778D308045
5,503,039 UART: [art] SIG.S = 18F0442FBD9229609ED335BEB193DD759180CCDB4383D802487C540B08E354D25552FEF69D0C335D3360B0B67C6C637E
5,527,395 UART: mbox::rt_entry...
5,527,767 UART: ____ _ _ _ ____ _____
5,528,551 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
5,529,351 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
5,530,119 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
5,530,887 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
5,531,655 UART: |_|
5,531,967 UART:
5,897,701 UART: [rt] Runtime listening for mailbox commands...
5,899,047 >>> mbox cmd response data (160 bytes)
5,899,048 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
7,925,421 >>> mbox cmd response: success
7,925,421 <<< Executing mbox cmd 0x70000000 (0 bytes) from SoC
7,938,876 UART:
7,938,892 UART: Running Caliptra FMC ...
7,939,300 UART:
7,939,443 UART: [state] CFI Enabled
8,029,144 UART: [art] Extend RT PCRs Done
8,029,572 UART: [art] Lock RT PCRs Done
8,030,715 UART: [art] Populate DV Done
8,039,102 UART: [fht] FMC Alias Private Key: 7
8,040,126 UART: [art] Derive CDI
8,040,406 UART: [art] Store in slot 0x4
8,125,837 UART: [art] Derive Key Pair
8,126,197 UART: [art] Store priv key in slot 0x5
8,140,067 UART: [art] Derive Key Pair - Done
8,154,465 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
8,169,830 UART: [art] Erasing AUTHORITY.KEYID = 7
8,170,595 UART: [art] PUB.X = 2E830B5E991301C27BF68A926AB3F0F97FEEBC2A64001A4A4A219EA6DEC4D3740ECDDD769E4FE98A3FB16A780AA58D1A
8,177,353 UART: [art] PUB.Y = B60A94793F102712B43BBD13A3C1E69C5F3F528A190422884BEA914FF8D2B55914647ADF10C9D517313DA43FA6230C79
8,184,294 UART: [art] SIG.R = 7D434C8DE8C5B363E9EA33CB78B2C9A74746066DE224F1485544C93E879A7CE706AEB49D69C372F7F45514F6B9D490E1
8,191,062 UART: [art] SIG.S = C61666E84146F2A6C298AFF6DF8D9AFADB3C68171784F51BFCF2420E453EEA1E239DBBDE8303EA94446A32476B854B83
8,214,926 UART: mbox::rt_entry...
8,215,298 UART: ____ _ _ _ ____ _____
8,216,082 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,216,882 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,217,650 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,218,418 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,219,186 UART: |_|
8,219,498 UART:
8,581,930 UART: [rt] Runtime listening for mailbox commands...
8,583,276 >>> mbox cmd response data (160 bytes)
test test_update_reset::test_tags_persistence ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
191,542 UART:
191,913 UART: Running Caliptra ROM ...
193,055 UART:
193,213 UART: [state] CFI Enabled
266,305 UART: [state] LifecycleState = Production
268,104 UART: [state] DebugLocked = Yes
269,537 UART: [state] Starting the Watchdog Timer 40000000 cycles
274,082 UART: [kat] SHA2-256
443,835 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,328 UART: [kat] ++
454,895 UART: [kat] sha1
465,283 UART: [kat] SHA2-256
467,940 UART: [kat] SHA2-384
473,718 UART: [kat] SHA2-512-ACC
476,106 UART: [kat] ECC-384
2,766,884 UART: [kat] HMAC-384Kdf
2,779,848 UART: [kat] LMS
3,970,208 UART: [kat] --
3,975,359 UART: [cold-reset] ++
3,976,508 UART: [fht] Storing FHT @ 0x50003400
3,988,558 UART: [idev] ++
3,989,130 UART: [idev] CDI.KEYID = 6
3,990,043 UART: [idev] SUBJECT.KEYID = 7
3,991,294 UART: [idev] UDS.KEYID = 0
3,992,217 ready_for_fw is high
3,992,412 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,096,826 UART: [idev] Erasing UDS.KEYID = 0
7,326,667 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,490 UART: [idev] --
7,354,297 UART: [ldev] ++
7,354,889 UART: [ldev] CDI.KEYID = 6
7,355,908 UART: [ldev] SUBJECT.KEYID = 5
7,357,066 UART: [ldev] AUTHORITY.KEYID = 7
7,358,296 UART: [ldev] FE.KEYID = 1
7,400,730 UART: [ldev] Erasing FE.KEYID = 1
10,735,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,186 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,062,712 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,077,347 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,091,712 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,110,547 UART: [ldev] --
13,114,402 UART: [fwproc] Waiting for Commands...
13,117,143 UART: [fwproc] Received command 0x46574c44
13,119,330 UART: [fwproc] Received Image of size 82832 bytes
16,818,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,900,118 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,973,313 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,176,827 >>> mbox cmd response: success
17,181,269 UART: [afmc] ++
17,181,886 UART: [afmc] CDI.KEYID = 6
17,182,779 UART: [afmc] SUBJECT.KEYID = 7
17,183,994 UART: [afmc] AUTHORITY.KEYID = 5
20,557,341 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,858,029 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,860,288 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,874,760 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,889,494 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,903,987 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,924,909 UART: [afmc] --
22,928,325 UART: [cold-reset] --
22,931,982 UART: [state] Locking Datavault
22,936,800 UART: [state] Locking PCR0, PCR1 and PCR31
22,938,574 UART: [state] Locking ICCM
22,940,727 UART: [exit] Launching FMC @ 0x40000130
22,949,078 UART:
22,949,326 UART: Running Caliptra FMC ...
22,950,428 UART:
22,950,586 UART: [state] CFI Enabled
23,017,273 UART: [fht] FMC Alias Private Key: 7
25,358,375 UART: [art] Extend RT PCRs Done
25,359,594 UART: [art] Lock RT PCRs Done
25,361,326 UART: [art] Populate DV Done
25,366,795 UART: [fht] FMC Alias Private Key: 7
25,368,496 UART: [art] Derive CDI
25,369,313 UART: [art] Store in slot 0x4
25,425,492 UART: [art] Derive Key Pair
25,426,530 UART: [art] Store priv key in slot 0x5
28,719,402 UART: [art] Derive Key Pair - Done
28,732,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,020,720 UART: [art] Erasing AUTHORITY.KEYID = 7
31,022,238 UART: [art] PUB.X = B24043CB0E11C1F86D82DAFE23E5376E3B9F3781FE5B4D17F5767C9779E1D089689E8757720EA33F7AC43393013D0142
31,029,487 UART: [art] PUB.Y = 83AAA705D95C1B1902C5816DC34F24F1413D00C7AA6618424951F653B61D4AFEC00ABE44A7FC1E32FFF75BD9CC7C05EA
31,036,783 UART: [art] SIG.R = 360C68913E95EBE8BC2CC245997518F2A9A1992F0EAE63929821E5548B0C61B55B1A0CA6DD8B8C091C68BD6808821F66
31,044,169 UART: [art] SIG.S = D96CD588391A58DACB7898004C74991F9F40B98925CBCCF12C53A1E7276AFE0AE7308074472AC90C1C6509A56C0D5177
32,349,052 UART: mbox::rt_entry...
32,350,022 UART: ____ _ _ _ ____ _____
32,351,960 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,353,969 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,355,819 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,357,751 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,359,635 UART: |_|
32,360,517 UART:
32,491,229 UART: [rt] Runtime listening for mailbox commands...
32,493,251 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,494,111 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
612 UART:
761 UART: Running Caliptra ROM ...
1,762 UART:
1,906 UART: [state] CFI Enabled
61,194 UART: [state] LifecycleState = Production
62,978 UART: [state] DebugLocked = Yes
64,580 UART: [state] Starting the Watchdog Timer 40000000 cycles
69,350 UART: [kat] SHA2-256
239,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
249,571 UART: [kat] ++
250,012 UART: [kat] sha1
260,784 UART: [kat] SHA2-256
263,472 UART: [kat] SHA2-384
269,617 UART: [kat] SHA2-512-ACC
271,981 UART: [kat] ECC-384
2,565,707 UART: [kat] HMAC-384Kdf
2,597,430 UART: [kat] LMS
3,787,724 UART: [kat] --
3,791,950 UART: [warm-reset] ++
3,795,776 UART: [warm-reset] --
3,801,964 UART: [state] Locking Datavault
3,805,000 UART: [state] Locking PCR0, PCR1 and PCR31
3,806,712 UART: [state] Locking ICCM
3,808,805 UART: [exit] Launching FMC @ 0x40000130
3,817,204 UART:
3,817,441 UART: Running Caliptra FMC ...
3,818,543 UART:
3,818,700 UART: [state] CFI Enabled
3,870,965 UART: [art] Skip pcr extension
3,872,113 UART: [art] Extend RT PCRs Done
3,873,285 UART: [art] Lock RT PCRs Done
3,874,356 UART: [art] Populate DV Done
3,879,816 UART: [fht] FMC Alias Private Key: 7
3,881,509 UART: [art] Derive CDI
3,882,256 UART: [art] Store in slot 0x4
3,939,736 UART: [art] Derive Key Pair
3,940,776 UART: [art] Store priv key in slot 0x5
7,233,306 UART: [art] Derive Key Pair - Done
7,246,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,534,761 UART: [art] Erasing AUTHORITY.KEYID = 7
9,536,278 UART: [art] PUB.X = B24043CB0E11C1F86D82DAFE23E5376E3B9F3781FE5B4D17F5767C9779E1D089689E8757720EA33F7AC43393013D0142
9,543,489 UART: [art] PUB.Y = 83AAA705D95C1B1902C5816DC34F24F1413D00C7AA6618424951F653B61D4AFEC00ABE44A7FC1E32FFF75BD9CC7C05EA
9,550,784 UART: [art] SIG.R = 360C68913E95EBE8BC2CC245997518F2A9A1992F0EAE63929821E5548B0C61B55B1A0CA6DD8B8C091C68BD6808821F66
9,558,126 UART: [art] SIG.S = D96CD588391A58DACB7898004C74991F9F40B98925CBCCF12C53A1E7276AFE0AE7308074472AC90C1C6509A56C0D5177
10,863,015 UART: mbox::rt_entry...
10,863,991 UART: ____ _ _ _ ____ _____
10,866,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,868,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,869,957 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,871,895 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,873,745 UART: |_|
10,874,626 UART:
11,248,931 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
3,780,856 ready_for_fw is high
3,781,357 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,256,987 >>> mbox cmd response: success
22,947,934 UART:
22,948,346 UART: Running Caliptra FMC ...
22,949,476 UART:
22,949,634 UART: [state] CFI Enabled
23,016,442 UART: [fht] FMC Alias Private Key: 7
25,356,907 UART: [art] Extend RT PCRs Done
25,358,122 UART: [art] Lock RT PCRs Done
25,359,738 UART: [art] Populate DV Done
25,365,213 UART: [fht] FMC Alias Private Key: 7
25,366,760 UART: [art] Derive CDI
25,367,495 UART: [art] Store in slot 0x4
25,424,908 UART: [art] Derive Key Pair
25,425,906 UART: [art] Store priv key in slot 0x5
28,718,121 UART: [art] Derive Key Pair - Done
28,730,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,019,754 UART: [art] Erasing AUTHORITY.KEYID = 7
31,021,265 UART: [art] PUB.X = DBA2EB4EC07FDB84C8225DF7913754E8AF35B3426A9AA9D1F0218EA9F22DB969C76CEDB59F19CA6C2687C36D07B15C7D
31,028,567 UART: [art] PUB.Y = 62650EFFA1F5806CDEBC05505D148E9E6BE707649CFD098FD5E2D115D0A9BB2D85EEE108E3E14B36877A832B05FE9090
31,035,834 UART: [art] SIG.R = 36FE965A56CCDCB5FD958BC9F224ADFAB599CCEF1AA57A8959A572A052EC494235187FB5D1A3EF9DCE8D17D94642FF1F
31,043,269 UART: [art] SIG.S = 08072E9705EE709B8A9B03200B4E198067D5E5F4122DC6E2976BDAB83870B532834F1F4C6D7918F8DE8C7C2D54D5402A
32,347,776 UART: mbox::rt_entry...
32,348,748 UART: ____ _ _ _ ____ _____
32,350,683 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,352,713 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,354,569 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,356,525 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,358,384 UART: |_|
32,359,213 UART:
32,489,477 UART: [rt] Runtime listening for mailbox commands...
32,491,499 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,492,432 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
3,605,596 UART:
3,605,924 UART: Running Caliptra FMC ...
3,606,967 UART:
3,607,116 UART: [state] CFI Enabled
3,653,057 UART: [art] Skip pcr extension
3,654,175 UART: [art] Extend RT PCRs Done
3,655,239 UART: [art] Lock RT PCRs Done
3,656,488 UART: [art] Populate DV Done
3,661,850 UART: [fht] FMC Alias Private Key: 7
3,663,369 UART: [art] Derive CDI
3,664,120 UART: [art] Store in slot 0x4
3,721,997 UART: [art] Derive Key Pair
3,722,997 UART: [art] Store priv key in slot 0x5
6,995,637 UART: [art] Derive Key Pair - Done
7,008,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,297,089 UART: [art] Erasing AUTHORITY.KEYID = 7
9,298,599 UART: [art] PUB.X = DBA2EB4EC07FDB84C8225DF7913754E8AF35B3426A9AA9D1F0218EA9F22DB969C76CEDB59F19CA6C2687C36D07B15C7D
9,305,863 UART: [art] PUB.Y = 62650EFFA1F5806CDEBC05505D148E9E6BE707649CFD098FD5E2D115D0A9BB2D85EEE108E3E14B36877A832B05FE9090
9,313,108 UART: [art] SIG.R = 36FE965A56CCDCB5FD958BC9F224ADFAB599CCEF1AA57A8959A572A052EC494235187FB5D1A3EF9DCE8D17D94642FF1F
9,320,580 UART: [art] SIG.S = 08072E9705EE709B8A9B03200B4E198067D5E5F4122DC6E2976BDAB83870B532834F1F4C6D7918F8DE8C7C2D54D5402A
10,626,139 UART: mbox::rt_entry...
10,627,107 UART: ____ _ _ _ ____ _____
10,629,085 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,631,122 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,632,977 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,634,896 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,636,747 UART: |_|
10,637,628 UART:
11,009,299 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
191,885 UART:
192,258 UART: Running Caliptra ROM ...
193,360 UART:
603,054 UART: [state] CFI Enabled
618,074 UART: [state] LifecycleState = Production
619,999 UART: [state] DebugLocked = Yes
621,446 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,375 UART: [kat] SHA2-256
797,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,661 UART: [kat] ++
808,163 UART: [kat] sha1
820,259 UART: [kat] SHA2-256
822,957 UART: [kat] SHA2-384
829,233 UART: [kat] SHA2-512-ACC
831,593 UART: [kat] ECC-384
3,116,062 UART: [kat] HMAC-384Kdf
3,127,740 UART: [kat] LMS
4,317,860 UART: [kat] --
4,323,459 UART: [cold-reset] ++
4,325,678 UART: [fht] Storing FHT @ 0x50003400
4,338,168 UART: [idev] ++
4,338,859 UART: [idev] CDI.KEYID = 6
4,339,774 UART: [idev] SUBJECT.KEYID = 7
4,340,946 UART: [idev] UDS.KEYID = 0
4,341,992 ready_for_fw is high
4,342,198 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,446,309 UART: [idev] Erasing UDS.KEYID = 0
7,632,111 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,211 UART: [idev] --
7,657,250 UART: [ldev] ++
7,657,824 UART: [ldev] CDI.KEYID = 6
7,658,780 UART: [ldev] SUBJECT.KEYID = 5
7,659,987 UART: [ldev] AUTHORITY.KEYID = 7
7,661,270 UART: [ldev] FE.KEYID = 1
7,672,124 UART: [ldev] Erasing FE.KEYID = 1
10,962,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,878 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,268,442 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,283,071 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,297,442 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,316,116 UART: [ldev] --
13,320,461 UART: [fwproc] Waiting for Commands...
13,322,283 UART: [fwproc] Received command 0x46574c44
13,324,518 UART: [fwproc] Received Image of size 82832 bytes
17,021,524 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,094,236 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,167,456 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,371,170 >>> mbox cmd response: success
17,374,785 UART: [afmc] ++
17,375,413 UART: [afmc] CDI.KEYID = 6
17,376,323 UART: [afmc] SUBJECT.KEYID = 7
17,377,532 UART: [afmc] AUTHORITY.KEYID = 5
20,689,661 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,983,991 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,986,254 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,000,783 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,015,520 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,029,969 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,051,049 UART: [afmc] --
23,055,735 UART: [cold-reset] --
23,059,047 UART: [state] Locking Datavault
23,065,109 UART: [state] Locking PCR0, PCR1 and PCR31
23,066,858 UART: [state] Locking ICCM
23,069,252 UART: [exit] Launching FMC @ 0x40000130
23,077,655 UART:
23,077,891 UART: Running Caliptra FMC ...
23,078,983 UART:
23,079,143 UART: [state] CFI Enabled
23,087,300 UART: [fht] FMC Alias Private Key: 7
25,427,355 UART: [art] Extend RT PCRs Done
25,428,577 UART: [art] Lock RT PCRs Done
25,429,927 UART: [art] Populate DV Done
25,435,232 UART: [fht] FMC Alias Private Key: 7
25,436,761 UART: [art] Derive CDI
25,437,564 UART: [art] Store in slot 0x4
25,480,266 UART: [art] Derive Key Pair
25,481,307 UART: [art] Store priv key in slot 0x5
28,722,844 UART: [art] Derive Key Pair - Done
28,735,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,015,840 UART: [art] Erasing AUTHORITY.KEYID = 7
31,017,345 UART: [art] PUB.X = B10A35AA3A5E1C19C0442B9E5721DFD2BADF3F4E27D004E94D00E15F92F510ED7B06EB7E2E3F480B9A701F34466A3DAB
31,024,647 UART: [art] PUB.Y = 8E2D56BA56D45C603953FFE239C53B5400DA6EC54CEB6403CF82305C47F85781DC7FF081FEEF10DF204A9A223D9AE04B
31,031,871 UART: [art] SIG.R = 3A24CF4F63CD8C6115D06C06D17454F6C1DE6D8C003757BA3D9AB7E27169F188635DC17F64EE91D70BEC7EA31D38DDD2
31,039,248 UART: [art] SIG.S = E91200C150B9EE94A2F3F089DECD9D0B37DD97F741CD2E33A4D0216DCA34AF3989E0D666E32B722C1B0A25F3485BF46A
32,344,511 UART: mbox::rt_entry...
32,345,510 UART: ____ _ _ _ ____ _____
32,347,496 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,349,424 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,351,340 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,353,189 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,355,104 UART: |_|
32,355,906 UART:
32,486,150 UART: [rt] Runtime listening for mailbox commands...
32,488,167 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,489,294 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
608 UART:
752 UART: Running Caliptra ROM ...
1,750 UART:
8,031,977 UART: [state] CFI Enabled
8,047,631 UART: [state] LifecycleState = Production
8,049,453 UART: [state] DebugLocked = Yes
8,051,632 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,057,765 UART: [kat] SHA2-256
8,227,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,238,074 UART: [kat] ++
8,238,561 UART: [kat] sha1
8,249,663 UART: [kat] SHA2-256
8,252,394 UART: [kat] SHA2-384
8,259,356 UART: [kat] SHA2-512-ACC
8,261,711 UART: [kat] ECC-384
10,545,351 UART: [kat] HMAC-384Kdf
10,558,004 UART: [kat] LMS
11,748,128 UART: [kat] --
11,752,838 UART: [warm-reset] ++
11,757,089 UART: [warm-reset] --
11,761,814 UART: [state] Locking Datavault
11,765,114 UART: [state] Locking PCR0, PCR1 and PCR31
11,766,824 UART: [state] Locking ICCM
11,768,705 UART: [exit] Launching FMC @ 0x40000130
11,777,094 UART:
11,777,326 UART: Running Caliptra FMC ...
11,778,415 UART:
11,778,571 UART: [state] CFI Enabled
11,780,673 UART: [art] Skip pcr extension
11,781,769 UART: [art] Extend RT PCRs Done
11,782,901 UART: [art] Lock RT PCRs Done
11,784,105 UART: [art] Populate DV Done
11,789,443 UART: [fht] FMC Alias Private Key: 7
11,791,218 UART: [art] Derive CDI
11,791,961 UART: [art] Store in slot 0x4
11,834,492 UART: [art] Derive Key Pair
11,835,480 UART: [art] Store priv key in slot 0x5
15,077,371 UART: [art] Derive Key Pair - Done
15,090,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,370,921 UART: [art] Erasing AUTHORITY.KEYID = 7
17,372,424 UART: [art] PUB.X = B10A35AA3A5E1C19C0442B9E5721DFD2BADF3F4E27D004E94D00E15F92F510ED7B06EB7E2E3F480B9A701F34466A3DAB
17,379,667 UART: [art] PUB.Y = 8E2D56BA56D45C603953FFE239C53B5400DA6EC54CEB6403CF82305C47F85781DC7FF081FEEF10DF204A9A223D9AE04B
17,386,944 UART: [art] SIG.R = 3A24CF4F63CD8C6115D06C06D17454F6C1DE6D8C003757BA3D9AB7E27169F188635DC17F64EE91D70BEC7EA31D38DDD2
17,394,321 UART: [art] SIG.S = E91200C150B9EE94A2F3F089DECD9D0B37DD97F741CD2E33A4D0216DCA34AF3989E0D666E32B722C1B0A25F3485BF46A
18,698,774 UART: mbox::rt_entry...
18,699,721 UART: ____ _ _ _ ____ _____
18,701,635 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,703,625 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,705,474 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,707,390 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,709,235 UART: |_|
18,710,050 UART:
19,086,718 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
4,130,422 ready_for_fw is high
4,130,858 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,472,726 >>> mbox cmd response: success
23,113,341 UART:
23,113,729 UART: Running Caliptra FMC ...
23,114,936 UART:
23,115,101 UART: [state] CFI Enabled
23,122,943 UART: [fht] FMC Alias Private Key: 7
25,462,738 UART: [art] Extend RT PCRs Done
25,463,958 UART: [art] Lock RT PCRs Done
25,465,335 UART: [art] Populate DV Done
25,470,808 UART: [fht] FMC Alias Private Key: 7
25,472,506 UART: [art] Derive CDI
25,473,318 UART: [art] Store in slot 0x4
25,515,699 UART: [art] Derive Key Pair
25,516,696 UART: [art] Store priv key in slot 0x5
28,758,600 UART: [art] Derive Key Pair - Done
28,771,611 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,051,687 UART: [art] Erasing AUTHORITY.KEYID = 7
31,053,201 UART: [art] PUB.X = 88685C62405342D1915DF7B1E3B7DC01642A3C549041F92355DC5D3F0C8DFA2A367EB04236D1880AEAC23413E8124AEC
31,060,449 UART: [art] PUB.Y = A7EBA26A9BC4FF595F7022070E944C51B696126DA95765AF6AE60B07C07AC3982AC178FE6B8135AF25279A0F423CFCBB
31,067,711 UART: [art] SIG.R = C02E8BFB200117E9829487BA8FE0B028E53ED03965AAED823D2B01EE70788F0D10C28E461548560C8D29FCCF5449DB97
31,075,111 UART: [art] SIG.S = 2996BC94C7E13A5BE16B6CB23B8DECD337EC12D9E3E8A1F9545E8434A81B0EC7C90918DDD5BB92B7AFF5D8F4079F0361
32,379,288 UART: mbox::rt_entry...
32,380,262 UART: ____ _ _ _ ____ _____
32,382,196 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,384,219 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,386,148 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,388,103 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,390,030 UART: |_|
32,390,837 UART:
32,522,325 UART: [rt] Runtime listening for mailbox commands...
32,524,344 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
32,525,270 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
11,541,447 UART:
11,541,794 UART: Running Caliptra FMC ...
11,542,833 UART:
11,542,980 UART: [state] CFI Enabled
11,544,829 UART: [art] Skip pcr extension
11,545,932 UART: [art] Extend RT PCRs Done
11,547,066 UART: [art] Lock RT PCRs Done
11,548,204 UART: [art] Populate DV Done
11,553,716 UART: [fht] FMC Alias Private Key: 7
11,555,411 UART: [art] Derive CDI
11,556,217 UART: [art] Store in slot 0x4
11,598,922 UART: [art] Derive Key Pair
11,599,963 UART: [art] Store priv key in slot 0x5
14,842,005 UART: [art] Derive Key Pair - Done
14,854,932 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,134,926 UART: [art] Erasing AUTHORITY.KEYID = 7
17,136,439 UART: [art] PUB.X = 88685C62405342D1915DF7B1E3B7DC01642A3C549041F92355DC5D3F0C8DFA2A367EB04236D1880AEAC23413E8124AEC
17,143,632 UART: [art] PUB.Y = A7EBA26A9BC4FF595F7022070E944C51B696126DA95765AF6AE60B07C07AC3982AC178FE6B8135AF25279A0F423CFCBB
17,150,928 UART: [art] SIG.R = C02E8BFB200117E9829487BA8FE0B028E53ED03965AAED823D2B01EE70788F0D10C28E461548560C8D29FCCF5449DB97
17,158,317 UART: [art] SIG.S = 2996BC94C7E13A5BE16B6CB23B8DECD337EC12D9E3E8A1F9545E8434A81B0EC7C90918DDD5BB92B7AFF5D8F4079F0361
18,463,121 UART: mbox::rt_entry...
18,464,091 UART: ____ _ _ _ ____ _____
18,466,114 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,468,142 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,470,072 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,472,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,473,854 UART: |_|
18,474,727 UART:
18,846,158 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
191,582 UART:
191,973 UART: Running Caliptra ROM ...
193,158 UART:
193,306 UART: [state] CFI Enabled
263,779 UART: [state] LifecycleState = Production
265,583 UART: [state] DebugLocked = Yes
267,366 UART: [state] Starting the WD Timer 40000000 cycles
272,592 UART: [kat] SHA2-256
452,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,981 UART: [kat] ++
463,578 UART: [kat] sha1
474,273 UART: [kat] SHA2-256
476,985 UART: [kat] SHA2-384
483,251 UART: [kat] SHA2-512-ACC
485,605 UART: [kat] ECC-384
2,949,727 UART: [kat] HMAC-384Kdf
2,971,282 UART: [kat] LMS
3,447,751 UART: [kat] --
3,451,608 UART: [cold-reset] ++
3,452,965 UART: [fht] FHT @ 0x50003400
3,463,932 UART: [idev] ++
3,464,530 UART: [idev] CDI.KEYID = 6
3,465,454 UART: [idev] SUBJECT.KEYID = 7
3,466,696 UART: [idev] UDS.KEYID = 0
3,467,620 ready_for_fw is high
3,467,819 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,572,094 UART: [idev] Erasing UDS.KEYID = 0
5,988,232 UART: [idev] Sha1 KeyId Algorithm
6,012,019 UART: [idev] --
6,016,394 UART: [ldev] ++
6,017,015 UART: [ldev] CDI.KEYID = 6
6,018,080 UART: [ldev] SUBJECT.KEYID = 5
6,019,184 UART: [ldev] AUTHORITY.KEYID = 7
6,020,410 UART: [ldev] FE.KEYID = 1
6,057,685 UART: [ldev] Erasing FE.KEYID = 1
8,568,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,306 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,314,148 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,330,027 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,345,802 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,061 UART: [ldev] --
10,374,189 UART: [fwproc] Wait for Commands...
10,376,439 UART: [fwproc] Recv command 0x46574c44
10,378,413 UART: [fwproc] Recv'd Img size: 82832 bytes
13,450,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,527,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,600,086 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,803,719 >>> mbox cmd response: success
13,808,003 UART: [afmc] ++
13,808,626 UART: [afmc] CDI.KEYID = 6
13,809,513 UART: [afmc] SUBJECT.KEYID = 7
13,810,781 UART: [afmc] AUTHORITY.KEYID = 5
16,339,600 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,063,171 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,065,363 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,081,280 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,097,278 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,112,908 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,136,746 UART: [afmc] --
18,141,136 UART: [cold-reset] --
18,145,532 UART: [state] Locking Datavault
18,152,295 UART: [state] Locking PCR0, PCR1 and PCR31
18,154,041 UART: [state] Locking ICCM
18,155,597 UART: [exit] Launching FMC @ 0x40000130
18,163,991 UART:
18,164,233 UART: Running Caliptra FMC ...
18,165,334 UART:
18,165,493 UART: [state] CFI Enabled
18,221,470 UART: [fht] FMC Alias Private Key: 7
19,988,202 UART: [art] Extend RT PCRs Done
19,989,425 UART: [art] Lock RT PCRs Done
19,990,721 UART: [art] Populate DV Done
19,996,512 UART: [fht] FMC Alias Private Key: 7
19,998,067 UART: [art] Derive CDI
19,998,831 UART: [art] Store in slot 0x4
20,053,872 UART: [art] Derive Key Pair
20,054,920 UART: [art] Store priv key in slot 0x5
22,517,513 UART: [art] Derive Key Pair - Done
22,530,078 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,242,787 UART: [art] Erasing AUTHORITY.KEYID = 7
24,244,297 UART: [art] PUB.X = 7929601008D877EB2AEF52E6CCCEBD8213FE27AB645C7E392CD4B50AE9D1E80803826A126C925681CDA83E543E9EE8DB
24,251,548 UART: [art] PUB.Y = 1560B80898E647290FE1FBE52DCF9F354B3BAEB98EFDFF61B0B096A252852AA330AB0390B2946A2FD63A95CD150B84AD
24,258,837 UART: [art] SIG.R = 8EAB725EE4C68C54D57654519D26C9DEA4DFFCA8F55AC07F611FF0C7196399777423D433AB33D20F5066ED704C458F47
24,266,263 UART: [art] SIG.S = BEE5DC8DC807A5212722414988CBF2DA0937E8CA68BA0190792680727959BF155921C24975D84602309BE9C8ABE562BB
25,245,081 UART: mbox::rt_entry...
25,246,051 UART: ____ _ _ _ ____ _____
25,247,952 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,249,956 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,251,884 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,253,826 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,255,750 UART: |_|
25,256,554 UART:
25,388,214 UART: [rt] Runtime listening for mailbox commands...
25,390,220 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,391,108 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
614 UART:
760 UART: Running Caliptra ROM ...
1,757 UART:
1,901 UART: [state] CFI Enabled
64,776 UART: [state] LifecycleState = Production
66,607 UART: [state] DebugLocked = Yes
69,614 UART: [state] Starting the WD Timer 40000000 cycles
75,424 UART: [kat] SHA2-256
255,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
265,878 UART: [kat] ++
266,326 UART: [kat] sha1
276,389 UART: [kat] SHA2-256
279,062 UART: [kat] SHA2-384
284,007 UART: [kat] SHA2-512-ACC
286,398 UART: [kat] ECC-384
2,746,758 UART: [kat] HMAC-384Kdf
2,769,983 UART: [kat] LMS
3,246,436 UART: [kat] --
3,250,378 UART: [warm-reset] ++
3,256,031 UART: [warm-reset] --
3,259,462 UART: [state] Locking Datavault
3,261,677 UART: [state] Locking PCR0, PCR1 and PCR31
3,263,427 UART: [state] Locking ICCM
3,265,895 UART: [exit] Launching FMC @ 0x40000130
3,274,289 UART:
3,274,584 UART: Running Caliptra FMC ...
3,275,619 UART:
3,275,767 UART: [state] CFI Enabled
3,336,247 UART: [art] Skip pcr extension
3,337,354 UART: [art] Extend RT PCRs Done
3,338,414 UART: [art] Lock RT PCRs Done
3,339,803 UART: [art] Populate DV Done
3,345,526 UART: [fht] FMC Alias Private Key: 7
3,347,280 UART: [art] Derive CDI
3,348,091 UART: [art] Store in slot 0x4
3,404,970 UART: [art] Derive Key Pair
3,406,361 UART: [art] Store priv key in slot 0x5
5,868,616 UART: [art] Derive Key Pair - Done
5,881,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,593,897 UART: [art] Erasing AUTHORITY.KEYID = 7
7,595,402 UART: [art] PUB.X = 7929601008D877EB2AEF52E6CCCEBD8213FE27AB645C7E392CD4B50AE9D1E80803826A126C925681CDA83E543E9EE8DB
7,602,735 UART: [art] PUB.Y = 1560B80898E647290FE1FBE52DCF9F354B3BAEB98EFDFF61B0B096A252852AA330AB0390B2946A2FD63A95CD150B84AD
7,609,978 UART: [art] SIG.R = 8EAB725EE4C68C54D57654519D26C9DEA4DFFCA8F55AC07F611FF0C7196399777423D433AB33D20F5066ED704C458F47
7,617,372 UART: [art] SIG.S = BEE5DC8DC807A5212722414988CBF2DA0937E8CA68BA0190792680727959BF155921C24975D84602309BE9C8ABE562BB
8,595,447 UART: mbox::rt_entry...
8,596,416 UART: ____ _ _ _ ____ _____
8,598,350 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,600,353 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,602,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,604,129 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,605,978 UART: |_|
8,606,856 UART:
8,979,192 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,458,679 ready_for_fw is high
3,459,259 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,694,769 >>> mbox cmd response: success
17,978,115 UART:
17,978,511 UART: Running Caliptra FMC ...
17,979,721 UART:
17,979,905 UART: [state] CFI Enabled
18,045,907 UART: [fht] FMC Alias Private Key: 7
19,812,464 UART: [art] Extend RT PCRs Done
19,813,699 UART: [art] Lock RT PCRs Done
19,815,334 UART: [art] Populate DV Done
19,820,798 UART: [fht] FMC Alias Private Key: 7
19,822,510 UART: [art] Derive CDI
19,823,324 UART: [art] Store in slot 0x4
19,878,632 UART: [art] Derive Key Pair
19,879,664 UART: [art] Store priv key in slot 0x5
22,342,302 UART: [art] Derive Key Pair - Done
22,355,257 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,067,861 UART: [art] Erasing AUTHORITY.KEYID = 7
24,069,379 UART: [art] PUB.X = 762039244A1008DC5736B403DF963F0AB974DCCDBC411B4951463B8D3734B869BBB1B737F164D3C354C7AB4FD1451F4A
24,076,658 UART: [art] PUB.Y = 9FE577D81702AE5133E8632152BB5E2394BC1734A545F357751547FC2747C43BC51CA35BB11B118764F5B59347BBD94D
24,083,893 UART: [art] SIG.R = 9AC39B1D2DA74B72CA1F987E9AF0E2498A7C6EF83303B29AF18C5D9FFD49FACBE23949222FF361895DBFD27CDC273ACD
24,091,319 UART: [art] SIG.S = 9F27A13BE4D03BABD30011E7F86814BF6EFA306CBDB7311961A161BD7FF1ECDD5BE1C4E8E4877BBC18D6D6BA871D6488
25,069,521 UART: mbox::rt_entry...
25,070,482 UART: ____ _ _ _ ____ _____
25,072,487 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,074,495 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,076,426 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,078,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,080,234 UART: |_|
25,081,035 UART:
25,211,580 UART: [rt] Runtime listening for mailbox commands...
25,213,601 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,214,444 >>> mbox cmd response data (0 bytes)
289 writing to cptra_bootfsm_go
3,265,415 UART:
3,265,746 UART: Running Caliptra FMC ...
3,266,787 UART:
3,266,939 UART: [state] CFI Enabled
3,317,485 UART: [art] Skip pcr extension
3,318,605 UART: [art] Extend RT PCRs Done
3,319,763 UART: [art] Lock RT PCRs Done
3,321,053 UART: [art] Populate DV Done
3,326,409 UART: [fht] FMC Alias Private Key: 7
3,327,998 UART: [art] Derive CDI
3,328,814 UART: [art] Store in slot 0x4
3,386,191 UART: [art] Derive Key Pair
3,387,238 UART: [art] Store priv key in slot 0x5
5,850,418 UART: [art] Derive Key Pair - Done
5,863,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,576,501 UART: [art] Erasing AUTHORITY.KEYID = 7
7,578,026 UART: [art] PUB.X = 762039244A1008DC5736B403DF963F0AB974DCCDBC411B4951463B8D3734B869BBB1B737F164D3C354C7AB4FD1451F4A
7,585,308 UART: [art] PUB.Y = 9FE577D81702AE5133E8632152BB5E2394BC1734A545F357751547FC2747C43BC51CA35BB11B118764F5B59347BBD94D
7,592,535 UART: [art] SIG.R = 9AC39B1D2DA74B72CA1F987E9AF0E2498A7C6EF83303B29AF18C5D9FFD49FACBE23949222FF361895DBFD27CDC273ACD
7,599,950 UART: [art] SIG.S = 9F27A13BE4D03BABD30011E7F86814BF6EFA306CBDB7311961A161BD7FF1ECDD5BE1C4E8E4877BBC18D6D6BA871D6488
8,578,585 UART: mbox::rt_entry...
8,579,541 UART: ____ _ _ _ ____ _____
8,581,617 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,583,628 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,585,559 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,587,413 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,589,336 UART: |_|
8,590,153 UART:
8,956,578 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
191,853 UART:
192,225 UART: Running Caliptra ROM ...
193,399 UART:
603,154 UART: [state] CFI Enabled
619,112 UART: [state] LifecycleState = Production
620,911 UART: [state] DebugLocked = Yes
622,409 UART: [state] Starting the WD Timer 40000000 cycles
626,933 UART: [kat] SHA2-256
806,601 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,325 UART: [kat] ++
817,934 UART: [kat] sha1
828,845 UART: [kat] SHA2-256
831,508 UART: [kat] SHA2-384
836,997 UART: [kat] SHA2-512-ACC
839,365 UART: [kat] ECC-384
3,280,402 UART: [kat] HMAC-384Kdf
3,292,707 UART: [kat] LMS
3,769,236 UART: [kat] --
3,772,445 UART: [cold-reset] ++
3,774,237 UART: [fht] FHT @ 0x50003400
3,785,643 UART: [idev] ++
3,786,214 UART: [idev] CDI.KEYID = 6
3,787,142 UART: [idev] SUBJECT.KEYID = 7
3,788,386 UART: [idev] UDS.KEYID = 0
3,789,315 ready_for_fw is high
3,789,535 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,893,835 UART: [idev] Erasing UDS.KEYID = 0
6,265,282 UART: [idev] Sha1 KeyId Algorithm
6,287,844 UART: [idev] --
6,293,435 UART: [ldev] ++
6,294,016 UART: [ldev] CDI.KEYID = 6
6,294,932 UART: [ldev] SUBJECT.KEYID = 5
6,296,168 UART: [ldev] AUTHORITY.KEYID = 7
6,297,406 UART: [ldev] FE.KEYID = 1
6,307,250 UART: [ldev] Erasing FE.KEYID = 1
8,787,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,523,223 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,539,113 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,554,850 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,576,266 UART: [ldev] --
10,582,293 UART: [fwproc] Wait for Commands...
10,583,902 UART: [fwproc] Recv command 0x46574c44
10,585,890 UART: [fwproc] Recv'd Img size: 82832 bytes
13,664,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,741,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,815,048 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,018,329 >>> mbox cmd response: success
14,021,523 UART: [afmc] ++
14,022,113 UART: [afmc] CDI.KEYID = 6
14,023,082 UART: [afmc] SUBJECT.KEYID = 7
14,024,301 UART: [afmc] AUTHORITY.KEYID = 5
16,526,610 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,249,421 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,251,607 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,267,488 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,283,514 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,299,135 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,322,616 UART: [afmc] --
18,325,861 UART: [cold-reset] --
18,329,450 UART: [state] Locking Datavault
18,335,019 UART: [state] Locking PCR0, PCR1 and PCR31
18,336,789 UART: [state] Locking ICCM
18,339,051 UART: [exit] Launching FMC @ 0x40000130
18,347,476 UART:
18,347,715 UART: Running Caliptra FMC ...
18,348,821 UART:
18,348,981 UART: [state] CFI Enabled
18,357,195 UART: [fht] FMC Alias Private Key: 7
20,123,487 UART: [art] Extend RT PCRs Done
20,124,710 UART: [art] Lock RT PCRs Done
20,126,499 UART: [art] Populate DV Done
20,131,965 UART: [fht] FMC Alias Private Key: 7
20,133,598 UART: [art] Derive CDI
20,134,421 UART: [art] Store in slot 0x4
20,177,238 UART: [art] Derive Key Pair
20,178,242 UART: [art] Store priv key in slot 0x5
22,605,022 UART: [art] Derive Key Pair - Done
22,618,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,324,533 UART: [art] Erasing AUTHORITY.KEYID = 7
24,326,053 UART: [art] PUB.X = 8039557E3CAAF39093EBBCD3DB39893CEEF7C84CB7D11993D524AF9421AABCB1225F5D6677830F9962FABE494F3C0DFB
24,333,304 UART: [art] PUB.Y = 518A97AF9E1F7B2CFD0BB348C9121D34348AD22677CBEDE09C6B4FCA68A7ADE6C8BDC0D12F6305404C09433CA47AEFAE
24,340,591 UART: [art] SIG.R = 3748029BC46FB45CC8F5C22C30A578E214DE0748586DE0562B60F924B7BCDC668E12A5627BCA9364B94DCF9E465D8473
24,347,983 UART: [art] SIG.S = B182901C3EBF8DF88916BB0233CBD88C13404ED80863326D286F2B1A3851573BF2BF9C9F9DFF2CEEDD6D429C6F6ECDBD
25,326,292 UART: mbox::rt_entry...
25,327,253 UART: ____ _ _ _ ____ _____
25,329,332 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,331,355 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,333,294 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,335,225 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,337,081 UART: |_|
25,337,889 UART:
25,468,722 UART: [rt] Runtime listening for mailbox commands...
25,470,737 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,471,814 >>> mbox cmd response data (0 bytes)
288 writing to cptra_bootfsm_go
618 UART:
774 UART: Running Caliptra ROM ...
1,877 UART:
15,057,577 UART: [state] CFI Enabled
15,074,211 UART: [state] LifecycleState = Production
15,075,967 UART: [state] DebugLocked = Yes
15,078,961 UART: [state] Starting the WD Timer 40000000 cycles
15,084,776 UART: [kat] SHA2-256
15,264,501 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,275,284 UART: [kat] ++
15,275,825 UART: [kat] sha1
15,286,615 UART: [kat] SHA2-256
15,289,311 UART: [kat] SHA2-384
15,294,542 UART: [kat] SHA2-512-ACC
15,296,921 UART: [kat] ECC-384
17,740,600 UART: [kat] HMAC-384Kdf
17,753,069 UART: [kat] LMS
18,229,555 UART: [kat] --
18,234,588 UART: [warm-reset] ++
18,240,408 UART: [warm-reset] --
18,244,332 UART: [state] Locking Datavault
18,247,638 UART: [state] Locking PCR0, PCR1 and PCR31
18,249,392 UART: [state] Locking ICCM
18,252,191 UART: [exit] Launching FMC @ 0x40000130
18,260,586 UART:
18,260,866 UART: Running Caliptra FMC ...
18,261,983 UART:
18,262,146 UART: [state] CFI Enabled
18,264,098 UART: [art] Skip pcr extension
18,265,207 UART: [art] Extend RT PCRs Done
18,266,345 UART: [art] Lock RT PCRs Done
18,267,471 UART: [art] Populate DV Done
18,272,955 UART: [fht] FMC Alias Private Key: 7
18,274,655 UART: [art] Derive CDI
18,275,472 UART: [art] Store in slot 0x4
18,318,349 UART: [art] Derive Key Pair
18,319,797 UART: [art] Store priv key in slot 0x5
20,746,059 UART: [art] Derive Key Pair - Done
20,759,063 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,465,601 UART: [art] Erasing AUTHORITY.KEYID = 7
22,467,102 UART: [art] PUB.X = 8039557E3CAAF39093EBBCD3DB39893CEEF7C84CB7D11993D524AF9421AABCB1225F5D6677830F9962FABE494F3C0DFB
22,474,398 UART: [art] PUB.Y = 518A97AF9E1F7B2CFD0BB348C9121D34348AD22677CBEDE09C6B4FCA68A7ADE6C8BDC0D12F6305404C09433CA47AEFAE
22,481,677 UART: [art] SIG.R = 3748029BC46FB45CC8F5C22C30A578E214DE0748586DE0562B60F924B7BCDC668E12A5627BCA9364B94DCF9E465D8473
22,489,065 UART: [art] SIG.S = B182901C3EBF8DF88916BB0233CBD88C13404ED80863326D286F2B1A3851573BF2BF9C9F9DFF2CEEDD6D429C6F6ECDBD
23,467,999 UART: mbox::rt_entry...
23,468,939 UART: ____ _ _ _ ____ _____
23,470,866 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,472,872 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,474,746 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,476,676 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,478,564 UART: |_|
23,479,451 UART:
23,848,726 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,784,780 ready_for_fw is high
3,785,302 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,905,276 >>> mbox cmd response: success
18,157,163 UART:
18,157,545 UART: Running Caliptra FMC ...
18,158,760 UART:
18,158,930 UART: [state] CFI Enabled
18,166,662 UART: [fht] FMC Alias Private Key: 7
19,932,678 UART: [art] Extend RT PCRs Done
19,933,891 UART: [art] Lock RT PCRs Done
19,935,522 UART: [art] Populate DV Done
19,941,106 UART: [fht] FMC Alias Private Key: 7
19,942,710 UART: [art] Derive CDI
19,943,450 UART: [art] Store in slot 0x4
19,985,988 UART: [art] Derive Key Pair
19,986,984 UART: [art] Store priv key in slot 0x5
22,413,968 UART: [art] Derive Key Pair - Done
22,426,803 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,133,421 UART: [art] Erasing AUTHORITY.KEYID = 7
24,134,902 UART: [art] PUB.X = 521BA6597E3CAD3FE5E9E1AEA26FAD7AC0C3FC5E0AD5312751E0CD330373606FA1E91CC985D69306B48F527096E7EB57
24,142,225 UART: [art] PUB.Y = 1C1B9A2A13C227D72294CE4900EF758CFB730BBA3C8F7B13BFE2F1E688D6D57C359A01D92EB8E755EF0E0C89FBE300A9
24,149,396 UART: [art] SIG.R = 2BD1EE5F792B0AD1C2D84C78683812876401BA25E7A9FCA6558A2B793B55CDFB8B5051FD9DACD3245EA72D638D69A406
24,156,844 UART: [art] SIG.S = F94904FD42E75D2E6576A3B8246C63252255773F46A1178E2DD43FABCE0A1FD3B6CED2A23C2AD27A18AF5BD6F2B3EA32
25,135,485 UART: mbox::rt_entry...
25,136,455 UART: ____ _ _ _ ____ _____
25,138,387 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,140,394 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,142,249 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,144,214 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,146,153 UART: |_|
25,146,962 UART:
25,278,256 UART: [rt] Runtime listening for mailbox commands...
25,280,300 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,281,510 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
18,440,048 UART:
18,440,389 UART: Running Caliptra FMC ...
18,441,437 UART:
18,441,592 UART: [state] CFI Enabled
18,443,390 UART: [art] Skip pcr extension
18,444,501 UART: [art] Extend RT PCRs Done
18,445,645 UART: [art] Lock RT PCRs Done
18,446,822 UART: [art] Populate DV Done
18,452,391 UART: [fht] FMC Alias Private Key: 7
18,454,092 UART: [art] Derive CDI
18,454,912 UART: [art] Store in slot 0x4
18,497,489 UART: [art] Derive Key Pair
18,498,529 UART: [art] Store priv key in slot 0x5
20,924,650 UART: [art] Derive Key Pair - Done
20,937,913 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,644,029 UART: [art] Erasing AUTHORITY.KEYID = 7
22,645,532 UART: [art] PUB.X = 521BA6597E3CAD3FE5E9E1AEA26FAD7AC0C3FC5E0AD5312751E0CD330373606FA1E91CC985D69306B48F527096E7EB57
22,652,837 UART: [art] PUB.Y = 1C1B9A2A13C227D72294CE4900EF758CFB730BBA3C8F7B13BFE2F1E688D6D57C359A01D92EB8E755EF0E0C89FBE300A9
22,660,023 UART: [art] SIG.R = 2BD1EE5F792B0AD1C2D84C78683812876401BA25E7A9FCA6558A2B793B55CDFB8B5051FD9DACD3245EA72D638D69A406
22,667,473 UART: [art] SIG.S = F94904FD42E75D2E6576A3B8246C63252255773F46A1178E2DD43FABCE0A1FD3B6CED2A23C2AD27A18AF5BD6F2B3EA32
23,646,189 UART: mbox::rt_entry...
23,647,152 UART: ____ _ _ _ ____ _____
23,649,167 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,651,176 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,653,107 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,655,036 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,656,969 UART: |_|
23,657,782 UART:
24,030,413 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,908 writing to cptra_bootfsm_go
191,561 UART:
191,942 UART: Running Caliptra ROM ...
193,108 UART:
193,260 UART: [state] CFI Enabled
264,406 UART: [state] LifecycleState = Production
266,629 UART: [state] DebugLocked = Yes
269,262 UART: [state] Starting the WD Timer 40000000 cycles
275,128 UART: [kat] SHA2-256
465,000 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,787 UART: [kat] ++
476,387 UART: [kat] sha1
487,362 UART: [kat] SHA2-256
490,441 UART: [kat] SHA2-384
496,280 UART: [kat] SHA2-512-ACC
498,864 UART: [kat] ECC-384
2,948,437 UART: [kat] HMAC-384Kdf
2,971,597 UART: [kat] LMS
3,503,398 UART: [kat] --
3,507,676 UART: [cold-reset] ++
3,509,595 UART: [fht] FHT @ 0x50003400
3,520,992 UART: [idev] ++
3,521,702 UART: [idev] CDI.KEYID = 6
3,522,688 UART: [idev] SUBJECT.KEYID = 7
3,523,860 UART: [idev] UDS.KEYID = 0
3,524,800 ready_for_fw is high
3,524,989 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,629,699 UART: [idev] Erasing UDS.KEYID = 0
6,029,881 UART: [idev] Sha1 KeyId Algorithm
6,051,553 UART: [idev] --
6,055,850 UART: [ldev] ++
6,056,540 UART: [ldev] CDI.KEYID = 6
6,057,460 UART: [ldev] SUBJECT.KEYID = 5
6,058,671 UART: [ldev] AUTHORITY.KEYID = 7
6,059,850 UART: [ldev] FE.KEYID = 1
6,099,392 UART: [ldev] Erasing FE.KEYID = 1
8,606,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,297 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,354,460 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,369,562 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,384,579 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,404,892 UART: [ldev] --
10,409,556 UART: [fwproc] Wait for Commands...
10,411,107 UART: [fwproc] Recv command 0x46574c44
10,413,030 UART: [fwproc] Recv'd Img size: 82832 bytes
13,511,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,585,686 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,709,321 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,056,015 >>> mbox cmd response: success
14,060,665 UART: [afmc] ++
14,061,389 UART: [afmc] CDI.KEYID = 6
14,062,580 UART: [afmc] SUBJECT.KEYID = 7
14,064,007 UART: [afmc] AUTHORITY.KEYID = 5
16,596,580 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,339,493 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,341,395 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,356,433 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,371,555 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,386,588 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,410,180 UART: [afmc] --
18,414,080 UART: [cold-reset] --
18,419,183 UART: [state] Locking Datavault
18,425,074 UART: [state] Locking PCR0, PCR1 and PCR31
18,427,257 UART: [state] Locking ICCM
18,430,105 UART: [exit] Launching FMC @ 0x40000130
18,438,769 UART:
18,439,004 UART: Running Caliptra FMC ...
18,440,108 UART:
18,440,264 UART: [state] CFI Enabled
18,496,179 UART: [fht] FMC Alias Private Key: 7
20,262,444 UART: [art] Extend RT PCRs Done
20,263,656 UART: [art] Lock RT PCRs Done
20,265,337 UART: [art] Populate DV Done
20,270,924 UART: [fht] FMC Alias Private Key: 7
20,272,511 UART: [art] Derive CDI
20,273,324 UART: [art] Store in slot 0x4
20,328,955 UART: [art] Derive Key Pair
20,329,989 UART: [art] Store priv key in slot 0x5
22,792,281 UART: [art] Derive Key Pair - Done
22,805,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,517,982 UART: [art] Erasing AUTHORITY.KEYID = 7
24,519,500 UART: [art] PUB.X = 503929EFFB140A98A7AAD9A74104D7880F222FCF712FC21CAA51142E70709423B018C3BED4FE6BA9E531B25398644168
24,526,756 UART: [art] PUB.Y = 23B8B1004F2F9BB03821EE2C21E7604AA0CBAC65C8480436EEEAEDF0723270FAB7C2158AFEB2F2B5FAD2E549DBE9B723
24,534,009 UART: [art] SIG.R = B97F89825EA8B908E3940345FD6109AB78EA7582588F8F141508DF1D8D7DAB086899C47A94C0CCBBC0D0BA552EE46861
24,541,419 UART: [art] SIG.S = 656704263A911F79BAAF7BE22292F69836289D377CE22B107108236040882748197848D42126B31EE79128E50AC04E8B
25,520,611 UART: mbox::rt_entry...
25,521,575 UART: ____ _ _ _ ____ _____
25,523,552 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,525,555 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,527,500 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,529,428 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,531,351 UART: |_|
25,532,180 UART:
25,663,405 UART: [rt] Runtime listening for mailbox commands...
25,665,423 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,666,323 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
546 UART:
692 UART: Running Caliptra ROM ...
1,791 UART:
1,944 UART: [state] CFI Enabled
65,343 UART: [state] LifecycleState = Production
67,266 UART: [state] DebugLocked = Yes
70,132 UART: [state] Starting the WD Timer 40000000 cycles
74,912 UART: [kat] SHA2-256
264,756 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
275,511 UART: [kat] ++
276,090 UART: [kat] sha1
287,031 UART: [kat] SHA2-256
290,033 UART: [kat] SHA2-384
295,529 UART: [kat] SHA2-512-ACC
298,134 UART: [kat] ECC-384
2,751,365 UART: [kat] HMAC-384Kdf
2,772,671 UART: [kat] LMS
3,304,227 UART: [kat] --
3,308,817 UART: [warm-reset] ++
3,311,988 UART: [warm-reset] --
3,318,272 UART: [state] Locking Datavault
3,321,412 UART: [state] Locking PCR0, PCR1 and PCR31
3,323,102 UART: [state] Locking ICCM
3,325,506 UART: [exit] Launching FMC @ 0x40000130
3,334,180 UART:
3,334,420 UART: Running Caliptra FMC ...
3,335,520 UART:
3,335,676 UART: [state] CFI Enabled
3,381,549 UART: [art] Skip pcr extension
3,382,694 UART: [art] Extend RT PCRs Done
3,383,758 UART: [art] Lock RT PCRs Done
3,385,144 UART: [art] Populate DV Done
3,390,923 UART: [fht] FMC Alias Private Key: 7
3,392,509 UART: [art] Derive CDI
3,393,328 UART: [art] Store in slot 0x4
3,450,466 UART: [art] Derive Key Pair
3,451,797 UART: [art] Store priv key in slot 0x5
5,914,432 UART: [art] Derive Key Pair - Done
5,927,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,640,239 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,746 UART: [art] PUB.X = 503929EFFB140A98A7AAD9A74104D7880F222FCF712FC21CAA51142E70709423B018C3BED4FE6BA9E531B25398644168
7,648,998 UART: [art] PUB.Y = 23B8B1004F2F9BB03821EE2C21E7604AA0CBAC65C8480436EEEAEDF0723270FAB7C2158AFEB2F2B5FAD2E549DBE9B723
7,656,299 UART: [art] SIG.R = B97F89825EA8B908E3940345FD6109AB78EA7582588F8F141508DF1D8D7DAB086899C47A94C0CCBBC0D0BA552EE46861
7,664,084 UART: [art] SIG.S = 656704263A911F79BAAF7BE22292F69836289D377CE22B107108236040882748197848D42126B31EE79128E50AC04E8B
8,641,948 UART: mbox::rt_entry...
8,642,909 UART: ____ _ _ _ ____ _____
8,644,887 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,646,889 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,648,817 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,650,749 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,652,600 UART: |_|
8,653,401 UART:
9,023,655 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
3,439,696 ready_for_fw is high
3,440,320 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,094,546 >>> mbox cmd response: success
18,388,058 UART:
18,388,454 UART: Running Caliptra FMC ...
18,389,620 UART:
18,389,786 UART: [state] CFI Enabled
18,457,957 UART: [fht] FMC Alias Private Key: 7
20,224,314 UART: [art] Extend RT PCRs Done
20,225,543 UART: [art] Lock RT PCRs Done
20,227,062 UART: [art] Populate DV Done
20,232,594 UART: [fht] FMC Alias Private Key: 7
20,234,246 UART: [art] Derive CDI
20,235,065 UART: [art] Store in slot 0x4
20,290,758 UART: [art] Derive Key Pair
20,291,801 UART: [art] Store priv key in slot 0x5
22,754,686 UART: [art] Derive Key Pair - Done
22,767,256 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,481,302 UART: [art] Erasing AUTHORITY.KEYID = 7
24,482,818 UART: [art] PUB.X = 68A61112132D3B5A1A024B9FD2667E497EC9400E47E0F16FA9A0D252FD5A5D87C364296097979C25745E13CA1C12DF15
24,490,055 UART: [art] PUB.Y = 91300120F5A5AA88905789AEDF7FCB5602E2CBE6AE6B54E440715BF39BD0EDA6CFAAE142E12ABCC471573605BE12C644
24,497,360 UART: [art] SIG.R = BB684C752448C88D682981A178601DBDBEED77FF244205B2333A8DD3A5C2EF4286E9DA9AB4CFC5D9B635D11E95BC9724
24,504,763 UART: [art] SIG.S = 9D702EAFAE2F6BD2EEE78446787B970DA11E57C225DE2F11BA191102F4FED2DA0496EE3FF2FF9B4842B996E5416EB387
25,483,573 UART: mbox::rt_entry...
25,484,539 UART: ____ _ _ _ ____ _____
25,486,522 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,488,525 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,490,449 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,492,405 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,494,338 UART: |_|
25,495,141 UART:
25,626,839 UART: [rt] Runtime listening for mailbox commands...
25,628,854 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,629,737 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
3,244,935 UART:
3,245,267 UART: Running Caliptra FMC ...
3,246,420 UART:
3,246,583 UART: [state] CFI Enabled
3,295,823 UART: [art] Skip pcr extension
3,296,977 UART: [art] Extend RT PCRs Done
3,298,124 UART: [art] Lock RT PCRs Done
3,299,358 UART: [art] Populate DV Done
3,304,978 UART: [fht] FMC Alias Private Key: 7
3,306,672 UART: [art] Derive CDI
3,307,481 UART: [art] Store in slot 0x4
3,364,628 UART: [art] Derive Key Pair
3,365,669 UART: [art] Store priv key in slot 0x5
5,827,939 UART: [art] Derive Key Pair - Done
5,840,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,554,402 UART: [art] Erasing AUTHORITY.KEYID = 7
7,555,925 UART: [art] PUB.X = 68A61112132D3B5A1A024B9FD2667E497EC9400E47E0F16FA9A0D252FD5A5D87C364296097979C25745E13CA1C12DF15
7,563,165 UART: [art] PUB.Y = 91300120F5A5AA88905789AEDF7FCB5602E2CBE6AE6B54E440715BF39BD0EDA6CFAAE142E12ABCC471573605BE12C644
7,570,408 UART: [art] SIG.R = BB684C752448C88D682981A178601DBDBEED77FF244205B2333A8DD3A5C2EF4286E9DA9AB4CFC5D9B635D11E95BC9724
7,577,804 UART: [art] SIG.S = 9D702EAFAE2F6BD2EEE78446787B970DA11E57C225DE2F11BA191102F4FED2DA0496EE3FF2FF9B4842B996E5416EB387
8,556,014 UART: mbox::rt_entry...
8,556,985 UART: ____ _ _ _ ____ _____
8,559,004 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,561,016 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,562,945 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,564,875 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,566,803 UART: |_|
8,567,787 UART:
8,939,348 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
191,957 UART:
192,331 UART: Running Caliptra ROM ...
193,518 UART:
603,003 UART: [state] CFI Enabled
618,533 UART: [state] LifecycleState = Production
620,812 UART: [state] DebugLocked = Yes
622,099 UART: [state] Starting the WD Timer 40000000 cycles
626,352 UART: [kat] SHA2-256
816,251 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,022 UART: [kat] ++
827,583 UART: [kat] sha1
839,787 UART: [kat] SHA2-256
842,775 UART: [kat] SHA2-384
848,212 UART: [kat] SHA2-512-ACC
850,822 UART: [kat] ECC-384
3,294,334 UART: [kat] HMAC-384Kdf
3,307,428 UART: [kat] LMS
3,839,298 UART: [kat] --
3,846,099 UART: [cold-reset] ++
3,847,906 UART: [fht] FHT @ 0x50003400
3,858,887 UART: [idev] ++
3,859,606 UART: [idev] CDI.KEYID = 6
3,860,603 UART: [idev] SUBJECT.KEYID = 7
3,861,784 UART: [idev] UDS.KEYID = 0
3,862,714 ready_for_fw is high
3,862,955 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,967,349 UART: [idev] Erasing UDS.KEYID = 0
6,338,628 UART: [idev] Sha1 KeyId Algorithm
6,361,414 UART: [idev] --
6,365,866 UART: [ldev] ++
6,366,571 UART: [ldev] CDI.KEYID = 6
6,367,463 UART: [ldev] SUBJECT.KEYID = 5
6,368,675 UART: [ldev] AUTHORITY.KEYID = 7
6,369,855 UART: [ldev] FE.KEYID = 1
6,380,128 UART: [ldev] Erasing FE.KEYID = 1
8,857,567 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,345 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,529 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,621 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,623 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,774 UART: [ldev] --
10,651,036 UART: [fwproc] Wait for Commands...
10,654,053 UART: [fwproc] Recv command 0x46574c44
10,656,047 UART: [fwproc] Recv'd Img size: 82832 bytes
13,743,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,818,922 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,942,553 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,289,046 >>> mbox cmd response: success
14,293,505 UART: [afmc] ++
14,294,228 UART: [afmc] CDI.KEYID = 6
14,295,424 UART: [afmc] SUBJECT.KEYID = 7
14,296,874 UART: [afmc] AUTHORITY.KEYID = 5
16,803,377 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,524,948 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,526,919 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,541,960 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,557,086 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,572,113 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,596,263 UART: [afmc] --
18,599,487 UART: [cold-reset] --
18,602,392 UART: [state] Locking Datavault
18,608,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,610,864 UART: [state] Locking ICCM
18,612,159 UART: [exit] Launching FMC @ 0x40000130
18,620,843 UART:
18,621,077 UART: Running Caliptra FMC ...
18,622,189 UART:
18,622,356 UART: [state] CFI Enabled
18,630,622 UART: [fht] FMC Alias Private Key: 7
20,396,278 UART: [art] Extend RT PCRs Done
20,397,512 UART: [art] Lock RT PCRs Done
20,399,138 UART: [art] Populate DV Done
20,404,555 UART: [fht] FMC Alias Private Key: 7
20,406,269 UART: [art] Derive CDI
20,407,089 UART: [art] Store in slot 0x4
20,449,693 UART: [art] Derive Key Pair
20,450,730 UART: [art] Store priv key in slot 0x5
22,877,530 UART: [art] Derive Key Pair - Done
22,890,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,596,566 UART: [art] Erasing AUTHORITY.KEYID = 7
24,598,074 UART: [art] PUB.X = C86109D9BCC199D01E748A5C9D3B622E7907151902E741701F5D3906F52EDF0B5286FC527FBBC862E01EE03FCCA6A4D7
24,605,293 UART: [art] PUB.Y = A135220FC7B785BE4ADEE073D407BAD35E1DD789DF680A7D3E4E3F6C62B0D8B421A0EE5EE89D73DAB67BB551443E3814
24,612,558 UART: [art] SIG.R = A3C92A201FAA6DF68FD03F6378E3E08DCE7E47979AC01DEC5613CCF5DC9C442602126BA81D831112767C6EE5F10657E5
24,619,975 UART: [art] SIG.S = 9839ECDDB11595300A79881DD640D2EC57EF0F917B1F95DD42A2EC43C7EA4FA9D5D0090C768203DB8A35AF81FFE0889E
25,598,680 UART: mbox::rt_entry...
25,599,636 UART: ____ _ _ _ ____ _____
25,601,625 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,603,633 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,605,636 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,607,501 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,609,438 UART: |_|
25,610,252 UART:
25,741,207 UART: [rt] Runtime listening for mailbox commands...
25,743,221 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,744,090 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
625 UART:
776 UART: Running Caliptra ROM ...
1,785 UART:
14,782,814 UART: [state] CFI Enabled
14,796,595 UART: [state] LifecycleState = Production
14,798,347 UART: [state] DebugLocked = Yes
14,799,745 UART: [state] Starting the WD Timer 40000000 cycles
14,805,195 UART: [kat] SHA2-256
14,995,096 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
15,005,973 UART: [kat] ++
15,006,518 UART: [kat] sha1
15,018,543 UART: [kat] SHA2-256
15,021,559 UART: [kat] SHA2-384
15,026,873 UART: [kat] SHA2-512-ACC
15,029,486 UART: [kat] ECC-384
17,471,523 UART: [kat] HMAC-384Kdf
17,484,295 UART: [kat] LMS
18,015,923 UART: [kat] --
18,018,690 UART: [warm-reset] ++
18,022,638 UART: [warm-reset] --
18,024,848 UART: [state] Locking Datavault
18,028,925 UART: [state] Locking PCR0, PCR1 and PCR31
18,030,578 UART: [state] Locking ICCM
18,032,092 UART: [exit] Launching FMC @ 0x40000130
18,040,728 UART:
18,040,970 UART: Running Caliptra FMC ...
18,042,077 UART:
18,042,241 UART: [state] CFI Enabled
18,044,193 UART: [art] Skip pcr extension
18,045,298 UART: [art] Extend RT PCRs Done
18,046,460 UART: [art] Lock RT PCRs Done
18,047,533 UART: [art] Populate DV Done
18,053,009 UART: [fht] FMC Alias Private Key: 7
18,054,702 UART: [art] Derive CDI
18,055,529 UART: [art] Store in slot 0x4
18,098,782 UART: [art] Derive Key Pair
18,100,253 UART: [art] Store priv key in slot 0x5
20,526,994 UART: [art] Derive Key Pair - Done
20,540,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,246,643 UART: [art] Erasing AUTHORITY.KEYID = 7
22,248,156 UART: [art] PUB.X = C86109D9BCC199D01E748A5C9D3B622E7907151902E741701F5D3906F52EDF0B5286FC527FBBC862E01EE03FCCA6A4D7
22,255,434 UART: [art] PUB.Y = A135220FC7B785BE4ADEE073D407BAD35E1DD789DF680A7D3E4E3F6C62B0D8B421A0EE5EE89D73DAB67BB551443E3814
22,262,692 UART: [art] SIG.R = A3C92A201FAA6DF68FD03F6378E3E08DCE7E47979AC01DEC5613CCF5DC9C442602126BA81D831112767C6EE5F10657E5
22,270,110 UART: [art] SIG.S = 9839ECDDB11595300A79881DD640D2EC57EF0F917B1F95DD42A2EC43C7EA4FA9D5D0090C768203DB8A35AF81FFE0889E
23,248,049 UART: mbox::rt_entry...
23,249,014 UART: ____ _ _ _ ____ _____
23,251,140 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,253,353 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,255,225 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,257,157 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,259,049 UART: |_|
23,259,944 UART:
23,635,052 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
3,756,389 ready_for_fw is high
3,756,787 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,325,484 >>> mbox cmd response: success
18,577,237 UART:
18,577,646 UART: Running Caliptra FMC ...
18,578,864 UART:
18,579,060 UART: [state] CFI Enabled
18,586,868 UART: [fht] FMC Alias Private Key: 7
20,353,171 UART: [art] Extend RT PCRs Done
20,354,394 UART: [art] Lock RT PCRs Done
20,356,351 UART: [art] Populate DV Done
20,361,718 UART: [fht] FMC Alias Private Key: 7
20,363,316 UART: [art] Derive CDI
20,364,133 UART: [art] Store in slot 0x4
20,407,112 UART: [art] Derive Key Pair
20,408,150 UART: [art] Store priv key in slot 0x5
22,835,161 UART: [art] Derive Key Pair - Done
22,848,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,555,042 UART: [art] Erasing AUTHORITY.KEYID = 7
24,556,565 UART: [art] PUB.X = C6470A797E6C9996B5F560EF0DAA8B79BC765D880611028F7ADD9E7995ACBC2E4B0136DE1D83186F8E49583C843EB13E
24,563,838 UART: [art] PUB.Y = 9C1A8E4B19B475FD7685BBA06863258595C8940C317D88E956FD70ED85D768659EAD0331C15EB121AED8D41DECFA8C29
24,571,068 UART: [art] SIG.R = 0EA05A58D76701261EE06C1440274387EF06F2BDDCD205512896DC883607262D1FE622AAF5687EA907E52C84176F3D88
24,578,439 UART: [art] SIG.S = 3206AB63689C0F96A04E4FF3BDC28096F4DCA39E13DBB118181DAA2764A6A7000C5A02C71288B70C115EBDCE6D73FE96
25,556,494 UART: mbox::rt_entry...
25,557,458 UART: ____ _ _ _ ____ _____
25,559,462 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,561,475 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,563,416 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,565,381 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,567,241 UART: |_|
25,568,046 UART:
25,698,100 UART: [rt] Runtime listening for mailbox commands...
25,700,113 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
25,701,009 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
17,981,573 UART:
17,982,043 UART: Running Caliptra FMC ...
17,983,095 UART:
17,983,256 UART: [state] CFI Enabled
17,985,021 UART: [art] Skip pcr extension
17,986,135 UART: [art] Extend RT PCRs Done
17,987,281 UART: [art] Lock RT PCRs Done
17,988,520 UART: [art] Populate DV Done
17,994,036 UART: [fht] FMC Alias Private Key: 7
17,995,514 UART: [art] Derive CDI
17,996,262 UART: [art] Store in slot 0x4
18,039,000 UART: [art] Derive Key Pair
18,040,077 UART: [art] Store priv key in slot 0x5
20,466,787 UART: [art] Derive Key Pair - Done
20,479,920 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,186,274 UART: [art] Erasing AUTHORITY.KEYID = 7
22,187,787 UART: [art] PUB.X = C6470A797E6C9996B5F560EF0DAA8B79BC765D880611028F7ADD9E7995ACBC2E4B0136DE1D83186F8E49583C843EB13E
22,195,065 UART: [art] PUB.Y = 9C1A8E4B19B475FD7685BBA06863258595C8940C317D88E956FD70ED85D768659EAD0331C15EB121AED8D41DECFA8C29
22,202,298 UART: [art] SIG.R = 0EA05A58D76701261EE06C1440274387EF06F2BDDCD205512896DC883607262D1FE622AAF5687EA907E52C84176F3D88
22,209,678 UART: [art] SIG.S = 3206AB63689C0F96A04E4FF3BDC28096F4DCA39E13DBB118181DAA2764A6A7000C5A02C71288B70C115EBDCE6D73FE96
23,188,272 UART: mbox::rt_entry...
23,189,240 UART: ____ _ _ _ ____ _____
23,191,250 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,193,264 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,195,149 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,197,081 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,198,947 UART: |_|
23,199,831 UART:
23,571,083 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Production
85,655 UART: [state] DebugLocked = Yes
86,193 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,319 UART: [kat] SHA2-256
892,257 UART: [kat] SHA2-384
894,890 UART: [kat] SHA2-512-ACC
896,791 UART: [kat] ECC-384
902,504 UART: [kat] HMAC-384Kdf
907,052 UART: [kat] LMS
1,475,248 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,864 UART: [fht] Storing FHT @ 0x50003400
1,479,633 UART: [idev] ++
1,479,801 UART: [idev] CDI.KEYID = 6
1,480,161 UART: [idev] SUBJECT.KEYID = 7
1,480,585 UART: [idev] UDS.KEYID = 0
1,480,930 ready_for_fw is high
1,480,930 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,129 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,848 UART: [idev] --
1,514,899 UART: [ldev] ++
1,515,067 UART: [ldev] CDI.KEYID = 6
1,515,430 UART: [ldev] SUBJECT.KEYID = 5
1,515,856 UART: [ldev] AUTHORITY.KEYID = 7
1,516,319 UART: [ldev] FE.KEYID = 1
1,521,143 UART: [ldev] Erasing FE.KEYID = 1
1,545,986 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,509 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,203 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,075 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,781 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,041 UART: [ldev] --
1,585,468 UART: [fwproc] Waiting for Commands...
1,586,219 UART: [fwproc] Received command 0x46574c44
1,587,010 UART: [fwproc] Received Image of size 82832 bytes
2,547,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,342 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,560 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,693,290 >>> mbox cmd response: success
2,694,407 UART: [afmc] ++
2,694,575 UART: [afmc] CDI.KEYID = 6
2,694,937 UART: [afmc] SUBJECT.KEYID = 7
2,695,362 UART: [afmc] AUTHORITY.KEYID = 5
2,730,841 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,747,071 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,747,851 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,753,566 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,759,451 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,765,154 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,773,008 UART: [afmc] --
2,773,973 UART: [cold-reset] --
2,774,859 UART: [state] Locking Datavault
2,775,926 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,530 UART: [state] Locking ICCM
2,777,030 UART: [exit] Launching FMC @ 0x40000130
2,782,360 UART:
2,782,376 UART: Running Caliptra FMC ...
2,782,784 UART:
2,782,838 UART: [state] CFI Enabled
2,793,316 UART: [fht] FMC Alias Private Key: 7
2,912,095 UART: [art] Extend RT PCRs Done
2,912,523 UART: [art] Lock RT PCRs Done
2,914,067 UART: [art] Populate DV Done
2,922,225 UART: [fht] FMC Alias Private Key: 7
2,923,213 UART: [art] Derive CDI
2,923,493 UART: [art] Store in slot 0x4
3,009,357 UART: [art] Derive Key Pair
3,009,717 UART: [art] Store priv key in slot 0x5
3,023,244 UART: [art] Derive Key Pair - Done
3,038,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,053,534 UART: [art] Erasing AUTHORITY.KEYID = 7
3,054,299 UART: [art] PUB.X = FA140439CA042FDF5249FC1347BF5889334F7AF23FDD6260D8FA3090434D846FCD4D7128E75D7D99833AE2BD50065313
3,061,062 UART: [art] PUB.Y = 8BD38650AFDB9C089074623C0D64C877693700A3445AF66FD39E33C26B6EDDE12B0E0852916074987C95A6BBB5745653
3,067,974 UART: [art] SIG.R = 18C119245A2043EA2C635668ECB73D82A67FC473745AC5D79D0214D62D3D75BFD683EDB7854C6297B28CA6C5B1A355CE
3,074,747 UART: [art] SIG.S = 90CC3A832F812B405AF222CCAD49DF41389E348E77F9327B390C0CC7A91A1E4871B50B63F207F357CD773DCBB2B6D0DD
3,098,403 UART: mbox::rt_entry...
3,098,775 UART: ____ _ _ _ ____ _____
3,099,559 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,359 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,101,127 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,101,895 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,102,663 UART: |_|
3,102,975 UART:
3,221,399 UART: [rt] Runtime listening for mailbox commands...
3,222,161 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,222,282 >>> mbox cmd response data (0 bytes)
3,222,284 writing to cptra_bootfsm_go
3,222,379 UART:
3,222,395 UART: Running Caliptra ROM ...
3,222,803 UART:
3,222,857 UART: [state] CFI Enabled
3,225,800 UART: [state] LifecycleState = Production
3,226,408 UART: [state] DebugLocked = Yes
3,227,080 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,228,658 UART: [kat] SHA2-256
4,022,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,026,704 UART: [kat] ++
4,026,856 UART: [kat] sha1
4,031,250 UART: [kat] SHA2-256
4,033,188 UART: [kat] SHA2-384
4,035,813 UART: [kat] SHA2-512-ACC
4,037,714 UART: [kat] ECC-384
4,043,317 UART: [kat] HMAC-384Kdf
4,047,761 UART: [kat] LMS
4,615,957 UART: [kat] --
4,616,597 UART: [warm-reset] ++
4,617,672 UART: [warm-reset] --
4,618,349 UART: [state] Locking Datavault
4,619,113 UART: [state] Locking PCR0, PCR1 and PCR31
4,619,717 UART: [state] Locking ICCM
4,620,185 UART: [exit] Launching FMC @ 0x40000130
4,625,515 UART:
4,625,531 UART: Running Caliptra FMC ...
4,625,939 UART:
4,625,993 UART: [state] CFI Enabled
4,627,216 UART: [art] Skip pcr extension
4,627,625 UART: [art] Extend RT PCRs Done
4,628,053 UART: [art] Lock RT PCRs Done
4,629,382 UART: [art] Populate DV Done
4,637,286 UART: [fht] FMC Alias Private Key: 7
4,638,450 UART: [art] Derive CDI
4,638,730 UART: [art] Store in slot 0x4
4,724,414 UART: [art] Derive Key Pair
4,724,774 UART: [art] Store priv key in slot 0x5
4,737,697 UART: [art] Derive Key Pair - Done
4,752,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,768,035 UART: [art] Erasing AUTHORITY.KEYID = 7
4,768,800 UART: [art] PUB.X = FA140439CA042FDF5249FC1347BF5889334F7AF23FDD6260D8FA3090434D846FCD4D7128E75D7D99833AE2BD50065313
4,775,563 UART: [art] PUB.Y = 8BD38650AFDB9C089074623C0D64C877693700A3445AF66FD39E33C26B6EDDE12B0E0852916074987C95A6BBB5745653
4,782,475 UART: [art] SIG.R = 18C119245A2043EA2C635668ECB73D82A67FC473745AC5D79D0214D62D3D75BFD683EDB7854C6297B28CA6C5B1A355CE
4,789,248 UART: [art] SIG.S = 90CC3A832F812B405AF222CCAD49DF41389E348E77F9327B390C0CC7A91A1E4871B50B63F207F357CD773DCBB2B6D0DD
4,813,254 UART: mbox::rt_entry...
4,813,626 UART: ____ _ _ _ ____ _____
4,814,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,815,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,815,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,816,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,817,514 UART: |_|
4,817,826 UART:
5,188,942 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,538 ready_for_fw is high
1,362,538 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,543,542 >>> mbox cmd response: success
2,605,864 UART:
2,605,880 UART: Running Caliptra FMC ...
2,606,288 UART:
2,606,342 UART: [state] CFI Enabled
2,616,548 UART: [fht] FMC Alias Private Key: 7
2,736,139 UART: [art] Extend RT PCRs Done
2,736,567 UART: [art] Lock RT PCRs Done
2,738,191 UART: [art] Populate DV Done
2,746,381 UART: [fht] FMC Alias Private Key: 7
2,747,497 UART: [art] Derive CDI
2,747,777 UART: [art] Store in slot 0x4
2,833,291 UART: [art] Derive Key Pair
2,833,651 UART: [art] Store priv key in slot 0x5
2,847,394 UART: [art] Derive Key Pair - Done
2,862,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,878,059 UART: [art] Erasing AUTHORITY.KEYID = 7
2,878,824 UART: [art] PUB.X = FA8F20FBC2E93D7672D583F56E1897BFC0D9C590A82AB8863C4C4577A52EB8216A0BCA75EBBDF62D8E41B4C2B8A29F2D
2,885,611 UART: [art] PUB.Y = 77E89433357C651BF024A2363141D9B54E952916EDCE064EC56A013D131C5810400089213A4F4171FB2478F1307E18FF
2,892,521 UART: [art] SIG.R = 5CD7C38159D620D043A7C34D0C8B51745273F3E42901095E1050457D45824A4060FCD9554349635B0E04E4A6F018FBFD
2,899,268 UART: [art] SIG.S = E6DB7F61C3B674D0F79A05F7207917E6321E7C38A3E0341D3082460FB71894FA3755B4CE4AFCCD4D839C544FC2EA8BDD
2,922,628 UART: mbox::rt_entry...
2,923,000 UART: ____ _ _ _ ____ _____
2,923,784 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,924,584 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,925,352 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,926,120 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,926,888 UART: |_|
2,927,200 UART:
3,045,908 UART: [rt] Runtime listening for mailbox commands...
3,046,670 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,046,791 >>> mbox cmd response data (0 bytes)
3,046,793 writing to cptra_bootfsm_go
4,331,892 UART:
4,331,908 UART: Running Caliptra FMC ...
4,332,316 UART:
4,332,370 UART: [state] CFI Enabled
4,333,683 UART: [art] Skip pcr extension
4,334,092 UART: [art] Extend RT PCRs Done
4,334,520 UART: [art] Lock RT PCRs Done
4,336,055 UART: [art] Populate DV Done
4,343,917 UART: [fht] FMC Alias Private Key: 7
4,344,963 UART: [art] Derive CDI
4,345,243 UART: [art] Store in slot 0x4
4,430,973 UART: [art] Derive Key Pair
4,431,333 UART: [art] Store priv key in slot 0x5
4,444,372 UART: [art] Derive Key Pair - Done
4,459,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,474,159 UART: [art] Erasing AUTHORITY.KEYID = 7
4,474,924 UART: [art] PUB.X = FA8F20FBC2E93D7672D583F56E1897BFC0D9C590A82AB8863C4C4577A52EB8216A0BCA75EBBDF62D8E41B4C2B8A29F2D
4,481,711 UART: [art] PUB.Y = 77E89433357C651BF024A2363141D9B54E952916EDCE064EC56A013D131C5810400089213A4F4171FB2478F1307E18FF
4,488,621 UART: [art] SIG.R = 5CD7C38159D620D043A7C34D0C8B51745273F3E42901095E1050457D45824A4060FCD9554349635B0E04E4A6F018FBFD
4,495,368 UART: [art] SIG.S = E6DB7F61C3B674D0F79A05F7207917E6321E7C38A3E0341D3082460FB71894FA3755B4CE4AFCCD4D839C544FC2EA8BDD
4,518,928 UART: mbox::rt_entry...
4,519,300 UART: ____ _ _ _ ____ _____
4,520,084 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,520,884 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,521,652 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,522,420 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,523,188 UART: |_|
4,523,500 UART:
4,888,246 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Production
85,800 UART: [state] DebugLocked = Yes
86,554 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,338 UART: [kat] SHA2-256
882,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,384 UART: [kat] ++
886,536 UART: [kat] sha1
890,672 UART: [kat] SHA2-256
892,610 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,651 UART: [kat] HMAC-384Kdf
907,301 UART: [kat] LMS
1,475,497 UART: [kat] --
1,476,020 UART: [cold-reset] ++
1,476,369 UART: [fht] Storing FHT @ 0x50003400
1,479,256 UART: [idev] ++
1,479,424 UART: [idev] CDI.KEYID = 6
1,479,784 UART: [idev] SUBJECT.KEYID = 7
1,480,208 UART: [idev] UDS.KEYID = 0
1,480,553 ready_for_fw is high
1,480,553 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,149 UART: [idev] Erasing UDS.KEYID = 0
1,505,222 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,849 UART: [idev] --
1,514,968 UART: [ldev] ++
1,515,136 UART: [ldev] CDI.KEYID = 6
1,515,499 UART: [ldev] SUBJECT.KEYID = 5
1,515,925 UART: [ldev] AUTHORITY.KEYID = 7
1,516,388 UART: [ldev] FE.KEYID = 1
1,521,728 UART: [ldev] Erasing FE.KEYID = 1
1,546,299 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,438 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,132 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,004 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,710 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,672 UART: [ldev] --
1,585,095 UART: [fwproc] Waiting for Commands...
1,585,886 UART: [fwproc] Received command 0x46574c44
1,586,677 UART: [fwproc] Received Image of size 82832 bytes
2,547,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,575,109 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,606,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,693,003 >>> mbox cmd response: success
2,694,040 UART: [afmc] ++
2,694,208 UART: [afmc] CDI.KEYID = 6
2,694,570 UART: [afmc] SUBJECT.KEYID = 7
2,694,995 UART: [afmc] AUTHORITY.KEYID = 5
2,730,328 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,746,374 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,747,154 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,752,869 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,758,754 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,764,457 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,772,491 UART: [afmc] --
2,773,412 UART: [cold-reset] --
2,774,052 UART: [state] Locking Datavault
2,775,285 UART: [state] Locking PCR0, PCR1 and PCR31
2,775,889 UART: [state] Locking ICCM
2,776,549 UART: [exit] Launching FMC @ 0x40000130
2,781,879 UART:
2,781,895 UART: Running Caliptra FMC ...
2,782,303 UART:
2,782,446 UART: [state] CFI Enabled
2,793,408 UART: [fht] FMC Alias Private Key: 7
2,912,369 UART: [art] Extend RT PCRs Done
2,912,797 UART: [art] Lock RT PCRs Done
2,914,589 UART: [art] Populate DV Done
2,922,447 UART: [fht] FMC Alias Private Key: 7
2,923,547 UART: [art] Derive CDI
2,923,827 UART: [art] Store in slot 0x4
3,009,335 UART: [art] Derive Key Pair
3,009,695 UART: [art] Store priv key in slot 0x5
3,023,422 UART: [art] Derive Key Pair - Done
3,038,301 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,054,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,054,951 UART: [art] PUB.X = A7EE3A84CD8819EB4CD392A776E7B40E49F836443F0B1694E064DAAD7CCCF4F1DF07F6A1E458C203FD8F0AA6BA73BE08
3,061,725 UART: [art] PUB.Y = F37AFA9BEB075195DAC33A20F4B6D7B55FFC03C383A5F25B97C5741CFB2274F9F9A8098F6F82D4447A2D8565ED5D0CCE
3,068,681 UART: [art] SIG.R = D86730B1067253127BB4F9F80E808CB091F3B37F42066D19CF53E291BCC4C3F769D034BD4A75C56D8088D6E3DCDC4FE3
3,075,450 UART: [art] SIG.S = A8D6E2A18751D81C31FA63420C778F3A754870C58F7727C095C39EFDE1545E3F83C499EE2A44C49EEE64F38890174931
3,099,043 UART: mbox::rt_entry...
3,099,415 UART: ____ _ _ _ ____ _____
3,100,199 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,100,999 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,101,767 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,102,535 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,103,303 UART: |_|
3,103,615 UART:
3,221,620 UART: [rt] Runtime listening for mailbox commands...
3,222,382 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,222,503 >>> mbox cmd response data (0 bytes)
3,222,505 writing to cptra_bootfsm_go
3,222,600 UART:
3,222,616 UART: Running Caliptra ROM ...
3,223,024 UART:
3,223,165 UART: [state] CFI Enabled
3,226,106 UART: [state] LifecycleState = Production
3,226,714 UART: [state] DebugLocked = Yes
3,227,270 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,228,844 UART: [kat] SHA2-256
4,022,775 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,026,890 UART: [kat] ++
4,027,042 UART: [kat] sha1
4,031,372 UART: [kat] SHA2-256
4,033,310 UART: [kat] SHA2-384
4,036,205 UART: [kat] SHA2-512-ACC
4,038,106 UART: [kat] ECC-384
4,043,651 UART: [kat] HMAC-384Kdf
4,048,433 UART: [kat] LMS
4,616,629 UART: [kat] --
4,617,557 UART: [warm-reset] ++
4,618,280 UART: [warm-reset] --
4,619,241 UART: [state] Locking Datavault
4,619,909 UART: [state] Locking PCR0, PCR1 and PCR31
4,620,513 UART: [state] Locking ICCM
4,621,157 UART: [exit] Launching FMC @ 0x40000130
4,626,487 UART:
4,626,503 UART: Running Caliptra FMC ...
4,626,911 UART:
4,627,054 UART: [state] CFI Enabled
4,628,587 UART: [art] Skip pcr extension
4,628,996 UART: [art] Extend RT PCRs Done
4,629,424 UART: [art] Lock RT PCRs Done
4,630,573 UART: [art] Populate DV Done
4,638,797 UART: [fht] FMC Alias Private Key: 7
4,639,817 UART: [art] Derive CDI
4,640,097 UART: [art] Store in slot 0x4
4,725,483 UART: [art] Derive Key Pair
4,725,843 UART: [art] Store priv key in slot 0x5
4,739,014 UART: [art] Derive Key Pair - Done
4,753,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,770,078 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,843 UART: [art] PUB.X = A7EE3A84CD8819EB4CD392A776E7B40E49F836443F0B1694E064DAAD7CCCF4F1DF07F6A1E458C203FD8F0AA6BA73BE08
4,777,617 UART: [art] PUB.Y = F37AFA9BEB075195DAC33A20F4B6D7B55FFC03C383A5F25B97C5741CFB2274F9F9A8098F6F82D4447A2D8565ED5D0CCE
4,784,573 UART: [art] SIG.R = D86730B1067253127BB4F9F80E808CB091F3B37F42066D19CF53E291BCC4C3F769D034BD4A75C56D8088D6E3DCDC4FE3
4,791,342 UART: [art] SIG.S = A8D6E2A18751D81C31FA63420C778F3A754870C58F7727C095C39EFDE1545E3F83C499EE2A44C49EEE64F38890174931
4,814,805 UART: mbox::rt_entry...
4,815,177 UART: ____ _ _ _ ____ _____
4,815,961 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,816,761 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,817,529 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,818,297 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,819,065 UART: |_|
4,819,377 UART:
5,185,332 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,619 ready_for_fw is high
1,362,619 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,542,395 >>> mbox cmd response: success
2,604,013 UART:
2,604,029 UART: Running Caliptra FMC ...
2,604,437 UART:
2,604,580 UART: [state] CFI Enabled
2,615,612 UART: [fht] FMC Alias Private Key: 7
2,733,843 UART: [art] Extend RT PCRs Done
2,734,271 UART: [art] Lock RT PCRs Done
2,735,691 UART: [art] Populate DV Done
2,744,135 UART: [fht] FMC Alias Private Key: 7
2,745,249 UART: [art] Derive CDI
2,745,529 UART: [art] Store in slot 0x4
2,831,109 UART: [art] Derive Key Pair
2,831,469 UART: [art] Store priv key in slot 0x5
2,844,864 UART: [art] Derive Key Pair - Done
2,859,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,875,054 UART: [art] Erasing AUTHORITY.KEYID = 7
2,875,819 UART: [art] PUB.X = 27423C008B8921109892DBEE83190F155A305ED8169B987A8DB8289A5F8E88EA2DD191B69DFCB4E450327515B36539A3
2,882,560 UART: [art] PUB.Y = 225FF7A52F7A1D95ADA193788AC02B24B30F00DF071EED7FECEFDC5583416553C4D3FDED78A1517EC6CF0E957C99222B
2,889,497 UART: [art] SIG.R = 1391DCA1F13D3837418B65E933629552D3A95E3EACCA10650FC97B815A6144543FB249C214C31D6F8EE37E66C8F191C5
2,896,264 UART: [art] SIG.S = AD6435A06D53683DFFF856742DABFDE1E08174C26F92F1B6DC33F2DEF2113FBDAA99909CAE4A8C2462C39EB9BB4032E4
2,920,062 UART: mbox::rt_entry...
2,920,434 UART: ____ _ _ _ ____ _____
2,921,218 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,922,018 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,922,786 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,923,554 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,924,322 UART: |_|
2,924,634 UART:
3,043,150 UART: [rt] Runtime listening for mailbox commands...
3,043,912 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
3,044,033 >>> mbox cmd response data (0 bytes)
3,044,035 writing to cptra_bootfsm_go
4,329,649 UART:
4,329,665 UART: Running Caliptra FMC ...
4,330,073 UART:
4,330,216 UART: [state] CFI Enabled
4,331,483 UART: [art] Skip pcr extension
4,331,892 UART: [art] Extend RT PCRs Done
4,332,320 UART: [art] Lock RT PCRs Done
4,333,377 UART: [art] Populate DV Done
4,341,525 UART: [fht] FMC Alias Private Key: 7
4,342,541 UART: [art] Derive CDI
4,342,821 UART: [art] Store in slot 0x4
4,428,539 UART: [art] Derive Key Pair
4,428,899 UART: [art] Store priv key in slot 0x5
4,442,704 UART: [art] Derive Key Pair - Done
4,457,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,473,096 UART: [art] Erasing AUTHORITY.KEYID = 7
4,473,861 UART: [art] PUB.X = 27423C008B8921109892DBEE83190F155A305ED8169B987A8DB8289A5F8E88EA2DD191B69DFCB4E450327515B36539A3
4,480,602 UART: [art] PUB.Y = 225FF7A52F7A1D95ADA193788AC02B24B30F00DF071EED7FECEFDC5583416553C4D3FDED78A1517EC6CF0E957C99222B
4,487,539 UART: [art] SIG.R = 1391DCA1F13D3837418B65E933629552D3A95E3EACCA10650FC97B815A6144543FB249C214C31D6F8EE37E66C8F191C5
4,494,306 UART: [art] SIG.S = AD6435A06D53683DFFF856742DABFDE1E08174C26F92F1B6DC33F2DEF2113FBDAA99909CAE4A8C2462C39EB9BB4032E4
4,518,230 UART: mbox::rt_entry...
4,518,602 UART: ____ _ _ _ ____ _____
4,519,386 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,520,186 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,520,954 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,521,722 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,522,490 UART: |_|
4,522,802 UART:
4,881,078 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,969 UART: [state] LifecycleState = Production
85,577 UART: [state] DebugLocked = Yes
86,183 UART: [state] Starting the WD Timer 40000000 cycles
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
900,020 UART: [kat] SHA2-256
901,960 UART: [kat] SHA2-384
904,499 UART: [kat] SHA2-512-ACC
906,400 UART: [kat] ECC-384
916,471 UART: [kat] HMAC-384Kdf
921,029 UART: [kat] LMS
1,169,341 UART: [kat] --
1,170,268 UART: [cold-reset] ++
1,170,723 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,174,625 ready_for_fw is high
1,174,625 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,198,734 UART: [idev] Sha1 KeyId Algorithm
1,207,803 UART: [idev] --
1,208,734 UART: [ldev] ++
1,208,902 UART: [ldev] CDI.KEYID = 6
1,209,266 UART: [ldev] SUBJECT.KEYID = 5
1,209,693 UART: [ldev] AUTHORITY.KEYID = 7
1,210,156 UART: [ldev] FE.KEYID = 1
1,215,364 UART: [ldev] Erasing FE.KEYID = 1
1,241,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,653 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,347 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,217 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,923 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,867 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,919 UART: [fwproc] Recv command 0x46574c44
1,282,652 UART: [fwproc] Recv'd Img size: 82832 bytes
2,242,380 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,271,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,302,293 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,389,121 >>> mbox cmd response: success
2,390,170 UART: [afmc] ++
2,390,338 UART: [afmc] CDI.KEYID = 6
2,390,701 UART: [afmc] SUBJECT.KEYID = 7
2,391,127 UART: [afmc] AUTHORITY.KEYID = 5
2,425,888 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,321 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,443,070 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,786 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,669 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,374 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,468,210 UART: [afmc] --
2,469,166 UART: [cold-reset] --
2,470,020 UART: [state] Locking Datavault
2,471,019 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,623 UART: [state] Locking ICCM
2,472,063 UART: [exit] Launching FMC @ 0x40000130
2,477,393 UART:
2,477,409 UART: Running Caliptra FMC ...
2,477,817 UART:
2,477,871 UART: [state] CFI Enabled
2,488,209 UART: [fht] FMC Alias Private Key: 7
2,606,792 UART: [art] Extend RT PCRs Done
2,607,220 UART: [art] Lock RT PCRs Done
2,608,712 UART: [art] Populate DV Done
2,617,204 UART: [fht] FMC Alias Private Key: 7
2,618,374 UART: [art] Derive CDI
2,618,654 UART: [art] Store in slot 0x4
2,704,489 UART: [art] Derive Key Pair
2,704,849 UART: [art] Store priv key in slot 0x5
2,718,007 UART: [art] Derive Key Pair - Done
2,732,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,848 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,613 UART: [art] PUB.X = 0F9A27509AFD6554CCA30C14E61708109A5B2116F03E65A9487BCC4E11B7508155EE1468226647C302F67A1F2341AA0A
2,756,364 UART: [art] PUB.Y = 67C051B6B527EDAFB7B193A89E67A20DCA17A30D4106506191D6863F384E548C41CCD898E5146F2F65254156570C6916
2,763,296 UART: [art] SIG.R = CCFF0D05A34ABD519DF292EBDCACADC44B13CE5AD4A902319018BF8EE99F25E21018DE27F00A4EE97C5592EF24C7B86A
2,770,080 UART: [art] SIG.S = 38615F43FE634EEECEE4D7BEF3EF23237C9CE592215D096FC1C22F5607791CA27991246BC65CC0CA6EDAF6B408257321
2,793,563 UART: mbox::rt_entry...
2,793,935 UART: ____ _ _ _ ____ _____
2,794,719 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,519 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,287 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,797,055 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,823 UART: |_|
2,798,135 UART:
2,915,914 UART: [rt] Runtime listening for mailbox commands...
2,916,676 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,916,797 >>> mbox cmd response data (0 bytes)
2,916,799 writing to cptra_bootfsm_go
2,916,891 UART:
2,916,907 UART: Running Caliptra ROM ...
2,917,315 UART:
2,917,370 UART: [state] CFI Enabled
2,920,217 UART: [state] LifecycleState = Production
2,920,825 UART: [state] DebugLocked = Yes
2,921,509 UART: [state] Starting the WD Timer 40000000 cycles
2,923,192 UART: [kat] SHA2-256
3,726,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,730,846 UART: [kat] ++
3,730,998 UART: [kat] sha1
3,735,216 UART: [kat] SHA2-256
3,737,156 UART: [kat] SHA2-384
3,740,049 UART: [kat] SHA2-512-ACC
3,741,950 UART: [kat] ECC-384
3,751,503 UART: [kat] HMAC-384Kdf
3,756,181 UART: [kat] LMS
4,004,493 UART: [kat] --
4,005,231 UART: [warm-reset] ++
4,005,948 UART: [warm-reset] --
4,006,863 UART: [state] Locking Datavault
4,007,743 UART: [state] Locking PCR0, PCR1 and PCR31
4,008,347 UART: [state] Locking ICCM
4,008,941 UART: [exit] Launching FMC @ 0x40000130
4,014,271 UART:
4,014,287 UART: Running Caliptra FMC ...
4,014,695 UART:
4,014,749 UART: [state] CFI Enabled
4,015,654 UART: [art] Skip pcr extension
4,016,063 UART: [art] Extend RT PCRs Done
4,016,491 UART: [art] Lock RT PCRs Done
4,017,734 UART: [art] Populate DV Done
4,025,982 UART: [fht] FMC Alias Private Key: 7
4,026,976 UART: [art] Derive CDI
4,027,256 UART: [art] Store in slot 0x4
4,112,849 UART: [art] Derive Key Pair
4,113,209 UART: [art] Store priv key in slot 0x5
4,126,267 UART: [art] Derive Key Pair - Done
4,140,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,156,484 UART: [art] Erasing AUTHORITY.KEYID = 7
4,157,249 UART: [art] PUB.X = 0F9A27509AFD6554CCA30C14E61708109A5B2116F03E65A9487BCC4E11B7508155EE1468226647C302F67A1F2341AA0A
4,164,000 UART: [art] PUB.Y = 67C051B6B527EDAFB7B193A89E67A20DCA17A30D4106506191D6863F384E548C41CCD898E5146F2F65254156570C6916
4,170,932 UART: [art] SIG.R = CCFF0D05A34ABD519DF292EBDCACADC44B13CE5AD4A902319018BF8EE99F25E21018DE27F00A4EE97C5592EF24C7B86A
4,177,716 UART: [art] SIG.S = 38615F43FE634EEECEE4D7BEF3EF23237C9CE592215D096FC1C22F5607791CA27991246BC65CC0CA6EDAF6B408257321
4,201,629 UART: mbox::rt_entry...
4,202,001 UART: ____ _ _ _ ____ _____
4,202,785 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,203,585 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,204,353 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,205,121 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,205,889 UART: |_|
4,206,201 UART:
4,568,450 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,879 ready_for_fw is high
1,058,879 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,239,802 >>> mbox cmd response: success
2,301,841 UART:
2,301,857 UART: Running Caliptra FMC ...
2,302,265 UART:
2,302,319 UART: [state] CFI Enabled
2,312,671 UART: [fht] FMC Alias Private Key: 7
2,431,318 UART: [art] Extend RT PCRs Done
2,431,746 UART: [art] Lock RT PCRs Done
2,433,232 UART: [art] Populate DV Done
2,441,722 UART: [fht] FMC Alias Private Key: 7
2,442,762 UART: [art] Derive CDI
2,443,042 UART: [art] Store in slot 0x4
2,529,223 UART: [art] Derive Key Pair
2,529,583 UART: [art] Store priv key in slot 0x5
2,542,517 UART: [art] Derive Key Pair - Done
2,557,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,572,971 UART: [art] Erasing AUTHORITY.KEYID = 7
2,573,736 UART: [art] PUB.X = 5320319A14792EE6149989A0E02FA36972D09632F1A2E68E7D245E3C0F46DFF45D24E9DB896406B837AEDCACE2539219
2,580,500 UART: [art] PUB.Y = C24C57441E745CCB620FA45F108928D5537341B7611C9E5A604FBE120391DE2210E2157F01EF9D1A0DD90DA03A316185
2,587,433 UART: [art] SIG.R = 1A19B437692247C6FAD17EFC12F058A83834A66865CA774D9D269738543D79CCDD0E74145DD47E7253339D1FC3576977
2,594,194 UART: [art] SIG.S = E71B1CE764DAB1E54B420086628BB0F04754B02C37E845F5BA5929CBDF221ED61FEA7B8803CFD3E8D4C47CAB72D77AE7
2,617,837 UART: mbox::rt_entry...
2,618,209 UART: ____ _ _ _ ____ _____
2,618,993 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,619,793 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,620,561 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,621,329 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,622,097 UART: |_|
2,622,409 UART:
2,741,980 UART: [rt] Runtime listening for mailbox commands...
2,742,742 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,742,863 >>> mbox cmd response data (0 bytes)
2,742,865 writing to cptra_bootfsm_go
3,724,804 UART:
3,724,820 UART: Running Caliptra FMC ...
3,725,228 UART:
3,725,282 UART: [state] CFI Enabled
3,726,495 UART: [art] Skip pcr extension
3,726,904 UART: [art] Extend RT PCRs Done
3,727,332 UART: [art] Lock RT PCRs Done
3,728,671 UART: [art] Populate DV Done
3,737,071 UART: [fht] FMC Alias Private Key: 7
3,738,173 UART: [art] Derive CDI
3,738,453 UART: [art] Store in slot 0x4
3,823,896 UART: [art] Derive Key Pair
3,824,256 UART: [art] Store priv key in slot 0x5
3,837,652 UART: [art] Derive Key Pair - Done
3,852,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,867,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,868,001 UART: [art] PUB.X = 5320319A14792EE6149989A0E02FA36972D09632F1A2E68E7D245E3C0F46DFF45D24E9DB896406B837AEDCACE2539219
3,874,765 UART: [art] PUB.Y = C24C57441E745CCB620FA45F108928D5537341B7611C9E5A604FBE120391DE2210E2157F01EF9D1A0DD90DA03A316185
3,881,698 UART: [art] SIG.R = 1A19B437692247C6FAD17EFC12F058A83834A66865CA774D9D269738543D79CCDD0E74145DD47E7253339D1FC3576977
3,888,459 UART: [art] SIG.S = E71B1CE764DAB1E54B420086628BB0F04754B02C37E845F5BA5929CBDF221ED61FEA7B8803CFD3E8D4C47CAB72D77AE7
3,912,150 UART: mbox::rt_entry...
3,912,522 UART: ____ _ _ _ ____ _____
3,913,306 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,914,106 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,914,874 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,915,642 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,916,410 UART: |_|
3,916,722 UART:
4,275,871 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Production
85,976 UART: [state] DebugLocked = Yes
86,508 UART: [state] Starting the WD Timer 40000000 cycles
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,638 UART: [kat] SHA2-512-ACC
906,539 UART: [kat] ECC-384
916,278 UART: [kat] HMAC-384Kdf
920,806 UART: [kat] LMS
1,169,118 UART: [kat] --
1,169,971 UART: [cold-reset] ++
1,170,434 UART: [fht] FHT @ 0x50003400
1,173,268 UART: [idev] ++
1,173,436 UART: [idev] CDI.KEYID = 6
1,173,797 UART: [idev] SUBJECT.KEYID = 7
1,174,222 UART: [idev] UDS.KEYID = 0
1,174,568 ready_for_fw is high
1,174,568 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,956 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,894 UART: [idev] --
1,208,939 UART: [ldev] ++
1,209,107 UART: [ldev] CDI.KEYID = 6
1,209,471 UART: [ldev] SUBJECT.KEYID = 5
1,209,898 UART: [ldev] AUTHORITY.KEYID = 7
1,210,361 UART: [ldev] FE.KEYID = 1
1,215,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,524 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,146 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,840 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,710 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,416 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,514 UART: [ldev] --
1,281,911 UART: [fwproc] Wait for Commands...
1,282,696 UART: [fwproc] Recv command 0x46574c44
1,283,429 UART: [fwproc] Recv'd Img size: 82832 bytes
2,244,627 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,272,229 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,303,404 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,060 >>> mbox cmd response: success
2,391,227 UART: [afmc] ++
2,391,395 UART: [afmc] CDI.KEYID = 6
2,391,758 UART: [afmc] SUBJECT.KEYID = 7
2,392,184 UART: [afmc] AUTHORITY.KEYID = 5
2,427,419 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,444,036 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,444,785 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,450,501 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,456,384 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,462,089 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,071 UART: [afmc] --
2,471,107 UART: [cold-reset] --
2,471,977 UART: [state] Locking Datavault
2,473,182 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,786 UART: [state] Locking ICCM
2,474,422 UART: [exit] Launching FMC @ 0x40000130
2,479,752 UART:
2,479,768 UART: Running Caliptra FMC ...
2,480,176 UART:
2,480,319 UART: [state] CFI Enabled
2,491,115 UART: [fht] FMC Alias Private Key: 7
2,609,066 UART: [art] Extend RT PCRs Done
2,609,494 UART: [art] Lock RT PCRs Done
2,611,288 UART: [art] Populate DV Done
2,619,480 UART: [fht] FMC Alias Private Key: 7
2,620,480 UART: [art] Derive CDI
2,620,760 UART: [art] Store in slot 0x4
2,706,887 UART: [art] Derive Key Pair
2,707,247 UART: [art] Store priv key in slot 0x5
2,720,563 UART: [art] Derive Key Pair - Done
2,735,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,542 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,307 UART: [art] PUB.X = D554152E277BB10244CEFC418F57B2F042CA14A637606D1EE1C08CC1D7971D6BA559043341A3BA64A3308A5656953996
2,758,067 UART: [art] PUB.Y = 41B892B28EE049C1CAA832F7F7E679EE9655E7520A110CF18F8473B0CB1664F31FDC03DCA39D0FABA4CCB5BF934D5E62
2,765,023 UART: [art] SIG.R = D25B3F469A1B44618BA6F1F5EAE673407232645BA6A4868F3CA112CB44D2BEA612FF1DF7A66DFB52F5C066EC0890EDCC
2,771,808 UART: [art] SIG.S = 63526743AB784E942456014081B6FF02AD1F7FE0EE300456BD53B1F5BCCD8BBAA5A5480676EDA2D6F20FD02839996801
2,794,990 UART: mbox::rt_entry...
2,795,362 UART: ____ _ _ _ ____ _____
2,796,146 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,796,946 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,797,714 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,798,482 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,799,250 UART: |_|
2,799,562 UART:
2,917,851 UART: [rt] Runtime listening for mailbox commands...
2,918,613 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,918,734 >>> mbox cmd response data (0 bytes)
2,918,736 writing to cptra_bootfsm_go
2,918,828 UART:
2,918,844 UART: Running Caliptra ROM ...
2,919,252 UART:
2,919,394 UART: [state] CFI Enabled
2,922,497 UART: [state] LifecycleState = Production
2,923,105 UART: [state] DebugLocked = Yes
2,923,759 UART: [state] Starting the WD Timer 40000000 cycles
2,925,456 UART: [kat] SHA2-256
3,729,006 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,733,110 UART: [kat] ++
3,733,262 UART: [kat] sha1
3,737,514 UART: [kat] SHA2-256
3,739,454 UART: [kat] SHA2-384
3,742,245 UART: [kat] SHA2-512-ACC
3,744,146 UART: [kat] ECC-384
3,753,857 UART: [kat] HMAC-384Kdf
3,758,493 UART: [kat] LMS
4,006,805 UART: [kat] --
4,007,603 UART: [warm-reset] ++
4,008,418 UART: [warm-reset] --
4,009,265 UART: [state] Locking Datavault
4,009,911 UART: [state] Locking PCR0, PCR1 and PCR31
4,010,515 UART: [state] Locking ICCM
4,011,047 UART: [exit] Launching FMC @ 0x40000130
4,016,377 UART:
4,016,393 UART: Running Caliptra FMC ...
4,016,801 UART:
4,016,944 UART: [state] CFI Enabled
4,018,603 UART: [art] Skip pcr extension
4,019,012 UART: [art] Extend RT PCRs Done
4,019,440 UART: [art] Lock RT PCRs Done
4,020,477 UART: [art] Populate DV Done
4,028,665 UART: [fht] FMC Alias Private Key: 7
4,029,733 UART: [art] Derive CDI
4,030,013 UART: [art] Store in slot 0x4
4,115,766 UART: [art] Derive Key Pair
4,116,126 UART: [art] Store priv key in slot 0x5
4,128,920 UART: [art] Derive Key Pair - Done
4,143,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,159,519 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,284 UART: [art] PUB.X = D554152E277BB10244CEFC418F57B2F042CA14A637606D1EE1C08CC1D7971D6BA559043341A3BA64A3308A5656953996
4,167,044 UART: [art] PUB.Y = 41B892B28EE049C1CAA832F7F7E679EE9655E7520A110CF18F8473B0CB1664F31FDC03DCA39D0FABA4CCB5BF934D5E62
4,174,000 UART: [art] SIG.R = D25B3F469A1B44618BA6F1F5EAE673407232645BA6A4868F3CA112CB44D2BEA612FF1DF7A66DFB52F5C066EC0890EDCC
4,180,785 UART: [art] SIG.S = 63526743AB784E942456014081B6FF02AD1F7FE0EE300456BD53B1F5BCCD8BBAA5A5480676EDA2D6F20FD02839996801
4,204,369 UART: mbox::rt_entry...
4,204,741 UART: ____ _ _ _ ____ _____
4,205,525 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,206,325 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,207,093 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,207,861 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,208,629 UART: |_|
4,208,941 UART:
4,574,194 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,748 ready_for_fw is high
1,059,748 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,239,939 >>> mbox cmd response: success
2,302,376 UART:
2,302,392 UART: Running Caliptra FMC ...
2,302,800 UART:
2,302,943 UART: [state] CFI Enabled
2,313,841 UART: [fht] FMC Alias Private Key: 7
2,431,620 UART: [art] Extend RT PCRs Done
2,432,048 UART: [art] Lock RT PCRs Done
2,433,652 UART: [art] Populate DV Done
2,441,910 UART: [fht] FMC Alias Private Key: 7
2,442,914 UART: [art] Derive CDI
2,443,194 UART: [art] Store in slot 0x4
2,528,799 UART: [art] Derive Key Pair
2,529,159 UART: [art] Store priv key in slot 0x5
2,542,091 UART: [art] Derive Key Pair - Done
2,556,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,572,224 UART: [art] Erasing AUTHORITY.KEYID = 7
2,572,989 UART: [art] PUB.X = B7340EF2EE0795A11D1E058E5873BFA1DAF86DE789423307212D6A2CC9395C98FE047FA97844655F62931864EB59F7B7
2,579,744 UART: [art] PUB.Y = E558B669C61877AF2EF56E2E494F73510452F8B16EE3B76635C40DB69058AFBA7D5F82C11C94097A24C79DC7F5A7EB77
2,586,691 UART: [art] SIG.R = 6B9DB20879313F8E9FBA4680D81E5641D2705FBCFFC8A5B2DA234D17ADF7D446B1B28822DF9809277C3FB8E2B2E09061
2,593,465 UART: [art] SIG.S = 0D11179C9A9E29B0ED74034A3F991D4F890502DACA33EB0D9A082A9D97E2C20B3C12392D8CCFD277629317DE69DF74B9
2,617,206 UART: mbox::rt_entry...
2,617,578 UART: ____ _ _ _ ____ _____
2,618,362 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,619,162 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,619,930 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,620,698 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,621,466 UART: |_|
2,621,778 UART:
2,739,970 UART: [rt] Runtime listening for mailbox commands...
2,740,732 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,740,853 >>> mbox cmd response data (0 bytes)
2,740,855 writing to cptra_bootfsm_go
3,722,957 UART:
3,722,973 UART: Running Caliptra FMC ...
3,723,381 UART:
3,723,524 UART: [state] CFI Enabled
3,724,803 UART: [art] Skip pcr extension
3,725,212 UART: [art] Extend RT PCRs Done
3,725,640 UART: [art] Lock RT PCRs Done
3,727,123 UART: [art] Populate DV Done
3,735,115 UART: [fht] FMC Alias Private Key: 7
3,736,045 UART: [art] Derive CDI
3,736,325 UART: [art] Store in slot 0x4
3,821,906 UART: [art] Derive Key Pair
3,822,266 UART: [art] Store priv key in slot 0x5
3,836,690 UART: [art] Derive Key Pair - Done
3,851,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,867,511 UART: [art] Erasing AUTHORITY.KEYID = 7
3,868,276 UART: [art] PUB.X = B7340EF2EE0795A11D1E058E5873BFA1DAF86DE789423307212D6A2CC9395C98FE047FA97844655F62931864EB59F7B7
3,875,031 UART: [art] PUB.Y = E558B669C61877AF2EF56E2E494F73510452F8B16EE3B76635C40DB69058AFBA7D5F82C11C94097A24C79DC7F5A7EB77
3,881,978 UART: [art] SIG.R = 6B9DB20879313F8E9FBA4680D81E5641D2705FBCFFC8A5B2DA234D17ADF7D446B1B28822DF9809277C3FB8E2B2E09061
3,888,752 UART: [art] SIG.S = 0D11179C9A9E29B0ED74034A3F991D4F890502DACA33EB0D9A082A9D97E2C20B3C12392D8CCFD277629317DE69DF74B9
3,912,211 UART: mbox::rt_entry...
3,912,583 UART: ____ _ _ _ ____ _____
3,913,367 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,914,167 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,914,935 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,915,703 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,916,471 UART: |_|
3,916,783 UART:
4,278,473 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,103 UART: [state] LifecycleState = Production
85,711 UART: [state] DebugLocked = Yes
86,371 UART: [state] Starting the WD Timer 40000000 cycles
88,076 UART: [kat] SHA2-256
893,726 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,851 UART: [kat] ++
898,003 UART: [kat] sha1
902,155 UART: [kat] SHA2-256
904,095 UART: [kat] SHA2-384
906,858 UART: [kat] SHA2-512-ACC
908,759 UART: [kat] ECC-384
918,142 UART: [kat] HMAC-384Kdf
922,630 UART: [kat] LMS
1,170,958 UART: [kat] --
1,171,715 UART: [cold-reset] ++
1,172,080 UART: [fht] FHT @ 0x50003400
1,174,815 UART: [idev] ++
1,174,983 UART: [idev] CDI.KEYID = 6
1,175,343 UART: [idev] SUBJECT.KEYID = 7
1,175,767 UART: [idev] UDS.KEYID = 0
1,176,112 ready_for_fw is high
1,176,112 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,183,786 UART: [idev] Erasing UDS.KEYID = 0
1,201,104 UART: [idev] Sha1 KeyId Algorithm
1,209,477 UART: [idev] --
1,210,685 UART: [ldev] ++
1,210,853 UART: [ldev] CDI.KEYID = 6
1,211,216 UART: [ldev] SUBJECT.KEYID = 5
1,211,642 UART: [ldev] AUTHORITY.KEYID = 7
1,212,105 UART: [ldev] FE.KEYID = 1
1,217,427 UART: [ldev] Erasing FE.KEYID = 1
1,243,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,085 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,779 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,651 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,357 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,412 UART: [ldev] --
1,282,795 UART: [fwproc] Wait for Commands...
1,283,401 UART: [fwproc] Recv command 0x46574c44
1,284,129 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,557 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,391,259 >>> mbox cmd response: success
2,392,330 UART: [afmc] ++
2,392,498 UART: [afmc] CDI.KEYID = 6
2,392,860 UART: [afmc] SUBJECT.KEYID = 7
2,393,285 UART: [afmc] AUTHORITY.KEYID = 5
2,429,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,445,777 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,446,525 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,452,240 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,458,125 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,463,830 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,471,808 UART: [afmc] --
2,472,705 UART: [cold-reset] --
2,473,843 UART: [state] Locking Datavault
2,475,136 UART: [state] Locking PCR0, PCR1 and PCR31
2,475,740 UART: [state] Locking ICCM
2,476,406 UART: [exit] Launching FMC @ 0x40000130
2,481,736 UART:
2,481,752 UART: Running Caliptra FMC ...
2,482,160 UART:
2,482,214 UART: [state] CFI Enabled
2,492,888 UART: [fht] FMC Alias Private Key: 7
2,611,515 UART: [art] Extend RT PCRs Done
2,611,943 UART: [art] Lock RT PCRs Done
2,613,255 UART: [art] Populate DV Done
2,621,617 UART: [fht] FMC Alias Private Key: 7
2,622,759 UART: [art] Derive CDI
2,623,039 UART: [art] Store in slot 0x4
2,708,910 UART: [art] Derive Key Pair
2,709,270 UART: [art] Store priv key in slot 0x5
2,721,614 UART: [art] Derive Key Pair - Done
2,736,595 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,752,070 UART: [art] Erasing AUTHORITY.KEYID = 7
2,752,835 UART: [art] PUB.X = 4A5EB30D8ADADB6E608B8CCFF57C1E3B218AB3148B11E3195542A90EE105C01D6726AD016C005885C154D10701919B33
2,759,569 UART: [art] PUB.Y = 3FEEEAA22D355C8D2BC7A14C02391E5D7147C5EF8CA5262FC095C3DB3A890F4849602B86FC3C4EC9DC635B7B35EFA9DC
2,766,535 UART: [art] SIG.R = 17E4979EB85218C449A60F49E69232E3B310C580A2807A9E914ADD73F5CF0F02860D9AFDA2A105933C279A8851791226
2,773,284 UART: [art] SIG.S = F17EF1093EC961FB4B47C1865AF44FF45B7E51A59C85EBE533DC69A50552EF9370869447DA959CF170BEEC908FD7AC4A
2,797,196 UART: mbox::rt_entry...
2,797,568 UART: ____ _ _ _ ____ _____
2,798,352 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,799,152 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,799,920 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,800,688 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,801,456 UART: |_|
2,801,768 UART:
2,920,513 UART: [rt] Runtime listening for mailbox commands...
2,921,275 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,921,396 >>> mbox cmd response data (0 bytes)
2,921,398 writing to cptra_bootfsm_go
2,921,490 UART:
2,921,506 UART: Running Caliptra ROM ...
2,921,914 UART:
2,921,969 UART: [state] CFI Enabled
2,924,914 UART: [state] LifecycleState = Production
2,925,522 UART: [state] DebugLocked = Yes
2,926,080 UART: [state] Starting the WD Timer 40000000 cycles
2,927,687 UART: [kat] SHA2-256
3,733,337 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,737,462 UART: [kat] ++
3,737,614 UART: [kat] sha1
3,741,648 UART: [kat] SHA2-256
3,743,588 UART: [kat] SHA2-384
3,746,209 UART: [kat] SHA2-512-ACC
3,748,110 UART: [kat] ECC-384
3,757,785 UART: [kat] HMAC-384Kdf
3,762,457 UART: [kat] LMS
4,010,785 UART: [kat] --
4,011,589 UART: [warm-reset] ++
4,012,494 UART: [warm-reset] --
4,013,449 UART: [state] Locking Datavault
4,014,035 UART: [state] Locking PCR0, PCR1 and PCR31
4,014,639 UART: [state] Locking ICCM
4,015,091 UART: [exit] Launching FMC @ 0x40000130
4,020,421 UART:
4,020,437 UART: Running Caliptra FMC ...
4,020,845 UART:
4,020,899 UART: [state] CFI Enabled
4,022,044 UART: [art] Skip pcr extension
4,022,453 UART: [art] Extend RT PCRs Done
4,022,881 UART: [art] Lock RT PCRs Done
4,024,106 UART: [art] Populate DV Done
4,032,170 UART: [fht] FMC Alias Private Key: 7
4,033,166 UART: [art] Derive CDI
4,033,446 UART: [art] Store in slot 0x4
4,119,057 UART: [art] Derive Key Pair
4,119,417 UART: [art] Store priv key in slot 0x5
4,133,099 UART: [art] Derive Key Pair - Done
4,147,912 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,163,359 UART: [art] Erasing AUTHORITY.KEYID = 7
4,164,124 UART: [art] PUB.X = 4A5EB30D8ADADB6E608B8CCFF57C1E3B218AB3148B11E3195542A90EE105C01D6726AD016C005885C154D10701919B33
4,170,858 UART: [art] PUB.Y = 3FEEEAA22D355C8D2BC7A14C02391E5D7147C5EF8CA5262FC095C3DB3A890F4849602B86FC3C4EC9DC635B7B35EFA9DC
4,177,824 UART: [art] SIG.R = 17E4979EB85218C449A60F49E69232E3B310C580A2807A9E914ADD73F5CF0F02860D9AFDA2A105933C279A8851791226
4,184,573 UART: [art] SIG.S = F17EF1093EC961FB4B47C1865AF44FF45B7E51A59C85EBE533DC69A50552EF9370869447DA959CF170BEEC908FD7AC4A
4,208,531 UART: mbox::rt_entry...
4,208,903 UART: ____ _ _ _ ____ _____
4,209,687 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,210,487 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,211,255 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,212,023 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,212,791 UART: |_|
4,213,103 UART:
4,581,284 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,978 ready_for_fw is high
1,060,978 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,096 >>> mbox cmd response: success
2,305,292 UART:
2,305,308 UART: Running Caliptra FMC ...
2,305,716 UART:
2,305,770 UART: [state] CFI Enabled
2,315,868 UART: [fht] FMC Alias Private Key: 7
2,434,481 UART: [art] Extend RT PCRs Done
2,434,909 UART: [art] Lock RT PCRs Done
2,436,483 UART: [art] Populate DV Done
2,444,637 UART: [fht] FMC Alias Private Key: 7
2,445,653 UART: [art] Derive CDI
2,445,933 UART: [art] Store in slot 0x4
2,532,078 UART: [art] Derive Key Pair
2,532,438 UART: [art] Store priv key in slot 0x5
2,545,812 UART: [art] Derive Key Pair - Done
2,560,388 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,575,595 UART: [art] Erasing AUTHORITY.KEYID = 7
2,576,360 UART: [art] PUB.X = 0E8F748702401AE3245BD40BA6E8706AFCB647BF5D5C4C66AED5F10B8D0AAD9EB515789A349ACF3E5574E41A2AF3B7A7
2,583,133 UART: [art] PUB.Y = 24A0E9685CCA0C067DB3157B500EC456CD755737CA173CEC228711DD6E5E67564F481F1FDA1AAE3F61141DC1D0BD5124
2,590,084 UART: [art] SIG.R = 97E0323C28CC1EBBA8D76A94507CDD9C45B2AED92455C435F5F87906E4F36A8F02FAFB326870BDF14412F1543FB6B94E
2,596,860 UART: [art] SIG.S = C55FBB5830398ABAD46B8C416649E0F42EDDB06C236F6F404A3717573C8E51A8E989433AE514B9A224D901143DDB4E54
2,620,723 UART: mbox::rt_entry...
2,621,095 UART: ____ _ _ _ ____ _____
2,621,879 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,622,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,623,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,624,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,983 UART: |_|
2,625,295 UART:
2,744,408 UART: [rt] Runtime listening for mailbox commands...
2,745,170 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,745,291 >>> mbox cmd response data (0 bytes)
2,745,293 writing to cptra_bootfsm_go
3,727,820 UART:
3,727,836 UART: Running Caliptra FMC ...
3,728,244 UART:
3,728,298 UART: [state] CFI Enabled
3,729,563 UART: [art] Skip pcr extension
3,729,972 UART: [art] Extend RT PCRs Done
3,730,400 UART: [art] Lock RT PCRs Done
3,731,603 UART: [art] Populate DV Done
3,739,961 UART: [fht] FMC Alias Private Key: 7
3,740,983 UART: [art] Derive CDI
3,741,263 UART: [art] Store in slot 0x4
3,827,114 UART: [art] Derive Key Pair
3,827,474 UART: [art] Store priv key in slot 0x5
3,840,896 UART: [art] Derive Key Pair - Done
3,855,884 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,871,183 UART: [art] Erasing AUTHORITY.KEYID = 7
3,871,948 UART: [art] PUB.X = 0E8F748702401AE3245BD40BA6E8706AFCB647BF5D5C4C66AED5F10B8D0AAD9EB515789A349ACF3E5574E41A2AF3B7A7
3,878,721 UART: [art] PUB.Y = 24A0E9685CCA0C067DB3157B500EC456CD755737CA173CEC228711DD6E5E67564F481F1FDA1AAE3F61141DC1D0BD5124
3,885,672 UART: [art] SIG.R = 97E0323C28CC1EBBA8D76A94507CDD9C45B2AED92455C435F5F87906E4F36A8F02FAFB326870BDF14412F1543FB6B94E
3,892,448 UART: [art] SIG.S = C55FBB5830398ABAD46B8C416649E0F42EDDB06C236F6F404A3717573C8E51A8E989433AE514B9A224D901143DDB4E54
3,916,065 UART: mbox::rt_entry...
3,916,437 UART: ____ _ _ _ ____ _____
3,917,221 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,918,021 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,918,789 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,919,557 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,920,325 UART: |_|
3,920,637 UART:
4,275,528 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,292 UART: [state] LifecycleState = Production
85,900 UART: [state] DebugLocked = Yes
86,588 UART: [state] Starting the WD Timer 40000000 cycles
88,141 UART: [kat] SHA2-256
893,791 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,916 UART: [kat] ++
898,068 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,749 UART: [kat] HMAC-384Kdf
923,441 UART: [kat] LMS
1,171,769 UART: [kat] --
1,172,896 UART: [cold-reset] ++
1,173,453 UART: [fht] FHT @ 0x50003400
1,176,172 UART: [idev] ++
1,176,340 UART: [idev] CDI.KEYID = 6
1,176,700 UART: [idev] SUBJECT.KEYID = 7
1,177,124 UART: [idev] UDS.KEYID = 0
1,177,469 ready_for_fw is high
1,177,469 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,185,107 UART: [idev] Erasing UDS.KEYID = 0
1,202,407 UART: [idev] Sha1 KeyId Algorithm
1,211,058 UART: [idev] --
1,212,046 UART: [ldev] ++
1,212,214 UART: [ldev] CDI.KEYID = 6
1,212,577 UART: [ldev] SUBJECT.KEYID = 5
1,213,003 UART: [ldev] AUTHORITY.KEYID = 7
1,213,466 UART: [ldev] FE.KEYID = 1
1,218,662 UART: [ldev] Erasing FE.KEYID = 1
1,244,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,820 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,514 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,386 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,092 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,961 UART: [ldev] --
1,283,230 UART: [fwproc] Wait for Commands...
1,283,830 UART: [fwproc] Recv command 0x46574c44
1,284,558 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,586 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,988 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,305,158 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,391,852 >>> mbox cmd response: success
2,392,873 UART: [afmc] ++
2,393,041 UART: [afmc] CDI.KEYID = 6
2,393,403 UART: [afmc] SUBJECT.KEYID = 7
2,393,828 UART: [afmc] AUTHORITY.KEYID = 5
2,429,591 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,446,082 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,446,830 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,452,545 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,458,430 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,464,135 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,471,971 UART: [afmc] --
2,472,892 UART: [cold-reset] --
2,473,946 UART: [state] Locking Datavault
2,475,137 UART: [state] Locking PCR0, PCR1 and PCR31
2,475,741 UART: [state] Locking ICCM
2,476,215 UART: [exit] Launching FMC @ 0x40000130
2,481,545 UART:
2,481,561 UART: Running Caliptra FMC ...
2,481,969 UART:
2,482,112 UART: [state] CFI Enabled
2,492,830 UART: [fht] FMC Alias Private Key: 7
2,611,279 UART: [art] Extend RT PCRs Done
2,611,707 UART: [art] Lock RT PCRs Done
2,613,217 UART: [art] Populate DV Done
2,621,245 UART: [fht] FMC Alias Private Key: 7
2,622,195 UART: [art] Derive CDI
2,622,475 UART: [art] Store in slot 0x4
2,708,358 UART: [art] Derive Key Pair
2,708,718 UART: [art] Store priv key in slot 0x5
2,721,848 UART: [art] Derive Key Pair - Done
2,736,351 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,751,832 UART: [art] Erasing AUTHORITY.KEYID = 7
2,752,597 UART: [art] PUB.X = FF696F7057E3FEF40194E754960BF609DAC1A13BC0E6907C83C66EF62F56B23D0FD71DD23A6A1E5880B833CE52684952
2,759,361 UART: [art] PUB.Y = 21B77FDFF853D09A424AF5C83E76B554D731D0162438C9DC522F3FF80408367FA4DF074C8E9B060210F4A88A83257727
2,766,294 UART: [art] SIG.R = 350B05CBE6F9D32A4A172C85F199EA8927D588EDB451F4A916CA5AD00338C38EA444BDA65264D7F194456E410B2F4F50
2,773,058 UART: [art] SIG.S = 90E925FA5356359E610F05BD23873E7160969959FB5BD962A974E56B591FCB85737BC6A2B1D51F987CC45847C16CF1F5
2,796,712 UART: mbox::rt_entry...
2,797,084 UART: ____ _ _ _ ____ _____
2,797,868 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,798,668 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,799,436 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,800,204 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,972 UART: |_|
2,801,284 UART:
2,920,243 UART: [rt] Runtime listening for mailbox commands...
2,921,005 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,921,126 >>> mbox cmd response data (0 bytes)
2,921,128 writing to cptra_bootfsm_go
2,921,220 UART:
2,921,236 UART: Running Caliptra ROM ...
2,921,644 UART:
2,921,786 UART: [state] CFI Enabled
2,924,201 UART: [state] LifecycleState = Production
2,924,809 UART: [state] DebugLocked = Yes
2,925,455 UART: [state] Starting the WD Timer 40000000 cycles
2,926,960 UART: [kat] SHA2-256
3,732,610 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,736,735 UART: [kat] ++
3,736,887 UART: [kat] sha1
3,741,109 UART: [kat] SHA2-256
3,743,049 UART: [kat] SHA2-384
3,745,886 UART: [kat] SHA2-512-ACC
3,747,787 UART: [kat] ECC-384
3,757,958 UART: [kat] HMAC-384Kdf
3,762,556 UART: [kat] LMS
4,010,884 UART: [kat] --
4,011,748 UART: [warm-reset] ++
4,012,471 UART: [warm-reset] --
4,013,378 UART: [state] Locking Datavault
4,014,244 UART: [state] Locking PCR0, PCR1 and PCR31
4,014,848 UART: [state] Locking ICCM
4,015,420 UART: [exit] Launching FMC @ 0x40000130
4,020,750 UART:
4,020,766 UART: Running Caliptra FMC ...
4,021,174 UART:
4,021,317 UART: [state] CFI Enabled
4,022,710 UART: [art] Skip pcr extension
4,023,119 UART: [art] Extend RT PCRs Done
4,023,547 UART: [art] Lock RT PCRs Done
4,024,714 UART: [art] Populate DV Done
4,032,708 UART: [fht] FMC Alias Private Key: 7
4,033,678 UART: [art] Derive CDI
4,033,958 UART: [art] Store in slot 0x4
4,119,709 UART: [art] Derive Key Pair
4,120,069 UART: [art] Store priv key in slot 0x5
4,133,767 UART: [art] Derive Key Pair - Done
4,148,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,164,645 UART: [art] Erasing AUTHORITY.KEYID = 7
4,165,410 UART: [art] PUB.X = FF696F7057E3FEF40194E754960BF609DAC1A13BC0E6907C83C66EF62F56B23D0FD71DD23A6A1E5880B833CE52684952
4,172,174 UART: [art] PUB.Y = 21B77FDFF853D09A424AF5C83E76B554D731D0162438C9DC522F3FF80408367FA4DF074C8E9B060210F4A88A83257727
4,179,107 UART: [art] SIG.R = 350B05CBE6F9D32A4A172C85F199EA8927D588EDB451F4A916CA5AD00338C38EA444BDA65264D7F194456E410B2F4F50
4,185,871 UART: [art] SIG.S = 90E925FA5356359E610F05BD23873E7160969959FB5BD962A974E56B591FCB85737BC6A2B1D51F987CC45847C16CF1F5
4,209,481 UART: mbox::rt_entry...
4,209,853 UART: ____ _ _ _ ____ _____
4,210,637 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,211,437 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,212,205 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,212,973 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,213,741 UART: |_|
4,214,053 UART:
4,582,358 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,477 ready_for_fw is high
1,061,477 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,244,197 >>> mbox cmd response: success
2,306,781 UART:
2,306,797 UART: Running Caliptra FMC ...
2,307,205 UART:
2,307,348 UART: [state] CFI Enabled
2,318,108 UART: [fht] FMC Alias Private Key: 7
2,437,097 UART: [art] Extend RT PCRs Done
2,437,525 UART: [art] Lock RT PCRs Done
2,438,887 UART: [art] Populate DV Done
2,447,131 UART: [fht] FMC Alias Private Key: 7
2,448,129 UART: [art] Derive CDI
2,448,409 UART: [art] Store in slot 0x4
2,533,964 UART: [art] Derive Key Pair
2,534,324 UART: [art] Store priv key in slot 0x5
2,547,818 UART: [art] Derive Key Pair - Done
2,562,601 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,040 UART: [art] Erasing AUTHORITY.KEYID = 7
2,578,805 UART: [art] PUB.X = 117DEA1A89E8AC7F94BB2081528326F684FCA909135F357B0AC41B1265F983FB77FD195F19F9011AC10B79A4624B1000
2,585,541 UART: [art] PUB.Y = 17B0AD2D57634CA7E595D5C932E49B8F56B490DE95595439F4D86EA0D5914A6A094474BCB064E8D4F50481A27F2A3BE5
2,592,489 UART: [art] SIG.R = E448BBBF0267DD2EAD27FC7BD9AF2D1A3D066BACEBA0AD695FAD6A42C6B138A564CA9789A957BAF99BB8EC67F53B535D
2,599,285 UART: [art] SIG.S = 38822EB78AB53E04507B223C14291D953EDAA03622664991CE8F4F4B84E86EDE4751A7EAE423331D63C5EA68E605D059
2,622,723 UART: mbox::rt_entry...
2,623,095 UART: ____ _ _ _ ____ _____
2,623,879 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,624,679 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,625,447 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,626,215 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,626,983 UART: |_|
2,627,295 UART:
2,746,224 UART: [rt] Runtime listening for mailbox commands...
2,746,986 <<< Executing mbox cmd 0xe0000000 (0 bytes) from SoC
2,747,107 >>> mbox cmd response data (0 bytes)
2,747,109 writing to cptra_bootfsm_go
3,730,139 UART:
3,730,155 UART: Running Caliptra FMC ...
3,730,563 UART:
3,730,706 UART: [state] CFI Enabled
3,731,863 UART: [art] Skip pcr extension
3,732,272 UART: [art] Extend RT PCRs Done
3,732,700 UART: [art] Lock RT PCRs Done
3,734,003 UART: [art] Populate DV Done
3,742,179 UART: [fht] FMC Alias Private Key: 7
3,743,181 UART: [art] Derive CDI
3,743,461 UART: [art] Store in slot 0x4
3,829,390 UART: [art] Derive Key Pair
3,829,750 UART: [art] Store priv key in slot 0x5
3,843,198 UART: [art] Derive Key Pair - Done
3,857,931 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,873,427 UART: [art] PUB.X = 117DEA1A89E8AC7F94BB2081528326F684FCA909135F357B0AC41B1265F983FB77FD195F19F9011AC10B79A4624B1000
3,880,163 UART: [art] PUB.Y = 17B0AD2D57634CA7E595D5C932E49B8F56B490DE95595439F4D86EA0D5914A6A094474BCB064E8D4F50481A27F2A3BE5
3,887,111 UART: [art] SIG.R = E448BBBF0267DD2EAD27FC7BD9AF2D1A3D066BACEBA0AD695FAD6A42C6B138A564CA9789A957BAF99BB8EC67F53B535D
3,893,907 UART: [art] SIG.S = 38822EB78AB53E04507B223C14291D953EDAA03622664991CE8F4F4B84E86EDE4751A7EAE423331D63C5EA68E605D059
3,917,673 UART: mbox::rt_entry...
3,918,045 UART: ____ _ _ _ ____ _____
3,918,829 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,919,629 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,165 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,921,933 UART: |_|
3,922,245 UART:
4,283,964 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_mbox_busy_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,655 UART: [state] LifecycleState = Production
85,263 UART: [state] DebugLocked = Yes
85,835 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,479 UART: [kat] SHA2-256
881,410 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,525 UART: [kat] ++
885,677 UART: [kat] sha1
889,977 UART: [kat] SHA2-256
891,915 UART: [kat] SHA2-384
894,576 UART: [kat] SHA2-512-ACC
896,477 UART: [kat] ECC-384
901,824 UART: [kat] HMAC-384Kdf
906,408 UART: [kat] LMS
1,474,604 UART: [kat] --
1,475,913 UART: [cold-reset] ++
1,476,312 UART: [fht] Storing FHT @ 0x50003400
1,479,003 UART: [idev] ++
1,479,171 UART: [idev] CDI.KEYID = 6
1,479,531 UART: [idev] SUBJECT.KEYID = 7
1,479,955 UART: [idev] UDS.KEYID = 0
1,480,300 ready_for_fw is high
1,480,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,870 UART: [idev] Erasing UDS.KEYID = 0
1,504,337 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,000 UART: [idev] --
1,514,219 UART: [ldev] ++
1,514,387 UART: [ldev] CDI.KEYID = 6
1,514,750 UART: [ldev] SUBJECT.KEYID = 5
1,515,176 UART: [ldev] AUTHORITY.KEYID = 7
1,515,639 UART: [ldev] FE.KEYID = 1
1,520,775 UART: [ldev] Erasing FE.KEYID = 1
1,546,334 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,879 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,573 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,445 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,151 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,229 UART: [ldev] --
1,585,534 UART: [fwproc] Waiting for Commands...
1,586,159 UART: [fwproc] Received command 0x46574c44
1,586,950 UART: [fwproc] Received Image of size 118548 bytes
2,957,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,984,945 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,163 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,156,575 >>> mbox cmd response: success
3,157,746 UART: [afmc] ++
3,157,914 UART: [afmc] CDI.KEYID = 6
3,158,276 UART: [afmc] SUBJECT.KEYID = 7
3,158,701 UART: [afmc] AUTHORITY.KEYID = 5
3,193,548 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,209,846 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,210,626 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,216,341 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,222,226 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,227,929 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,235,831 UART: [afmc] --
3,236,942 UART: [cold-reset] --
3,237,992 UART: [state] Locking Datavault
3,239,157 UART: [state] Locking PCR0, PCR1 and PCR31
3,239,761 UART: [state] Locking ICCM
3,240,343 UART: [exit] Launching FMC @ 0x40000130
3,245,673 UART:
3,245,689 UART: Running Caliptra FMC ...
3,246,097 UART:
3,246,151 UART: [state] CFI Enabled
3,257,057 UART: [fht] FMC Alias Private Key: 7
3,375,922 UART: [art] Extend RT PCRs Done
3,376,350 UART: [art] Lock RT PCRs Done
3,378,116 UART: [art] Populate DV Done
3,386,270 UART: [fht] FMC Alias Private Key: 7
3,387,254 UART: [art] Derive CDI
3,387,534 UART: [art] Store in slot 0x4
3,473,360 UART: [art] Derive Key Pair
3,473,720 UART: [art] Store priv key in slot 0x5
3,487,191 UART: [art] Derive Key Pair - Done
3,502,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,517,686 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,451 UART: [art] PUB.X = 4B1154B981472382B5C57CD45FAB8635C482D7346C1086F75ED6357337FBE8BC49233106590EDC4EB0D47FADC3A0923A
3,525,217 UART: [art] PUB.Y = F91B9CEE98435EFC3ADB9CC8724AB6FC947BF0765C03B62B8F0E5780BD5C5D436CBC9C13BD4DA53060CD5592905335B8
3,532,177 UART: [art] SIG.R = D98B833C2664531C4FDA998B5C33328E7EDE526C9CE1C5559A50CFAE2A9F86D86A7254B3A6F5FD0841038012D16D1CED
3,538,951 UART: [art] SIG.S = D21E1F4015B5CF3A043457BA2C8A71CB53941B3BD2C0FEB32D379303B86418253708367F5EBCC39B0BD75BA4A542330F
3,562,780 UART: Caliptra RT
3,563,031 UART: [state] CFI Enabled
3,682,709 UART: [rt] RT listening for mailbox commands...
3,683,775 writing to cptra_bootfsm_go
3,683,870 UART:
3,683,886 UART: Running Caliptra ROM ...
3,684,294 UART:
3,684,348 UART: [state] CFI Enabled
3,687,043 UART: [state] LifecycleState = Production
3,687,651 UART: [state] DebugLocked = Yes
3,688,391 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,690,173 UART: [kat] SHA2-256
4,484,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,488,219 UART: [kat] ++
4,488,371 UART: [kat] sha1
4,492,659 UART: [kat] SHA2-256
4,494,597 UART: [kat] SHA2-384
4,497,340 UART: [kat] SHA2-512-ACC
4,499,241 UART: [kat] ECC-384
4,504,806 UART: [kat] HMAC-384Kdf
4,509,334 UART: [kat] LMS
5,077,530 UART: [kat] --
5,078,278 UART: [warm-reset] ++
5,079,439 UART: [warm-reset] --
5,080,336 UART: [state] Locking Datavault
5,081,088 UART: [state] Locking PCR0, PCR1 and PCR31
5,081,692 UART: [state] Locking ICCM
5,082,202 UART: [exit] Launching FMC @ 0x40000130
5,087,532 UART:
5,087,548 UART: Running Caliptra FMC ...
5,087,956 UART:
5,088,010 UART: [state] CFI Enabled
5,089,405 UART: [art] Skip pcr extension
5,089,814 UART: [art] Extend RT PCRs Done
5,090,242 UART: [art] Lock RT PCRs Done
5,091,483 UART: [art] Populate DV Done
5,099,545 UART: [fht] FMC Alias Private Key: 7
5,100,669 UART: [art] Derive CDI
5,100,949 UART: [art] Store in slot 0x4
5,186,435 UART: [art] Derive Key Pair
5,186,795 UART: [art] Store priv key in slot 0x5
5,199,634 UART: [art] Derive Key Pair - Done
5,214,088 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,229,081 UART: [art] Erasing AUTHORITY.KEYID = 7
5,229,846 UART: [art] PUB.X = 4B1154B981472382B5C57CD45FAB8635C482D7346C1086F75ED6357337FBE8BC49233106590EDC4EB0D47FADC3A0923A
5,236,612 UART: [art] PUB.Y = F91B9CEE98435EFC3ADB9CC8724AB6FC947BF0765C03B62B8F0E5780BD5C5D436CBC9C13BD4DA53060CD5592905335B8
5,243,572 UART: [art] SIG.R = D98B833C2664531C4FDA998B5C33328E7EDE526C9CE1C5559A50CFAE2A9F86D86A7254B3A6F5FD0841038012D16D1CED
5,250,346 UART: [art] SIG.S = D21E1F4015B5CF3A043457BA2C8A71CB53941B3BD2C0FEB32D379303B86418253708367F5EBCC39B0BD75BA4A542330F
5,274,445 UART: Caliptra RT
5,274,696 UART: [state] CFI Enabled
5,639,405 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,008 ready_for_fw is high
1,363,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,403 >>> mbox cmd response: success
3,066,245 UART:
3,066,261 UART: Running Caliptra FMC ...
3,066,669 UART:
3,066,723 UART: [state] CFI Enabled
3,077,061 UART: [fht] FMC Alias Private Key: 7
3,195,796 UART: [art] Extend RT PCRs Done
3,196,224 UART: [art] Lock RT PCRs Done
3,198,096 UART: [art] Populate DV Done
3,206,594 UART: [fht] FMC Alias Private Key: 7
3,207,752 UART: [art] Derive CDI
3,208,032 UART: [art] Store in slot 0x4
3,293,792 UART: [art] Derive Key Pair
3,294,152 UART: [art] Store priv key in slot 0x5
3,307,251 UART: [art] Derive Key Pair - Done
3,322,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,337,531 UART: [art] Erasing AUTHORITY.KEYID = 7
3,338,296 UART: [art] PUB.X = C92A6FFD938E1D2BDF4D33EEFB765B49127665E040A99E4BE2920076135D3DDA5AAB045C301720F539F8DAE03B31F8E9
3,345,053 UART: [art] PUB.Y = 0CCD66624D86E69F9EA5D814B2D2EFBD9DA3483CF9C2CECE4BCB5B6A5A7D7D27668A3F3C333828BCF8F7F1843CCA7504
3,352,021 UART: [art] SIG.R = 8E0EF2FC177BC3644641F1957A70E03CFC212FA56310FF0D3EF3A36D230DFD400625A98EF3C5CF44C83B63CD2DDBF541
3,358,795 UART: [art] SIG.S = 7683B0860DAB5C873810261D752E2C4B5B6175D3720E023BB20BD8F96A1D8B6C34826386820DA2B5650B43A97EE71459
3,382,307 UART: Caliptra RT
3,382,558 UART: [state] CFI Enabled
3,502,765 UART: [rt] RT listening for mailbox commands...
3,503,871 writing to cptra_bootfsm_go
4,788,202 UART:
4,788,218 UART: Running Caliptra FMC ...
4,788,626 UART:
4,788,680 UART: [state] CFI Enabled
4,789,857 UART: [art] Skip pcr extension
4,790,266 UART: [art] Extend RT PCRs Done
4,790,694 UART: [art] Lock RT PCRs Done
4,792,013 UART: [art] Populate DV Done
4,800,225 UART: [fht] FMC Alias Private Key: 7
4,801,207 UART: [art] Derive CDI
4,801,487 UART: [art] Store in slot 0x4
4,887,087 UART: [art] Derive Key Pair
4,887,447 UART: [art] Store priv key in slot 0x5
4,900,044 UART: [art] Derive Key Pair - Done
4,915,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,930,168 UART: [art] Erasing AUTHORITY.KEYID = 7
4,930,933 UART: [art] PUB.X = C92A6FFD938E1D2BDF4D33EEFB765B49127665E040A99E4BE2920076135D3DDA5AAB045C301720F539F8DAE03B31F8E9
4,937,690 UART: [art] PUB.Y = 0CCD66624D86E69F9EA5D814B2D2EFBD9DA3483CF9C2CECE4BCB5B6A5A7D7D27668A3F3C333828BCF8F7F1843CCA7504
4,944,658 UART: [art] SIG.R = 8E0EF2FC177BC3644641F1957A70E03CFC212FA56310FF0D3EF3A36D230DFD400625A98EF3C5CF44C83B63CD2DDBF541
4,951,432 UART: [art] SIG.S = 7683B0860DAB5C873810261D752E2C4B5B6175D3720E023BB20BD8F96A1D8B6C34826386820DA2B5650B43A97EE71459
4,974,422 UART: Caliptra RT
4,974,673 UART: [state] CFI Enabled
5,344,761 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,858 UART: [state] LifecycleState = Production
86,466 UART: [state] DebugLocked = Yes
86,974 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,690 UART: [kat] SHA2-256
882,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,736 UART: [kat] ++
886,888 UART: [kat] sha1
891,292 UART: [kat] SHA2-256
893,230 UART: [kat] SHA2-384
895,773 UART: [kat] SHA2-512-ACC
897,674 UART: [kat] ECC-384
903,417 UART: [kat] HMAC-384Kdf
908,007 UART: [kat] LMS
1,476,203 UART: [kat] --
1,476,982 UART: [cold-reset] ++
1,477,497 UART: [fht] Storing FHT @ 0x50003400
1,480,222 UART: [idev] ++
1,480,390 UART: [idev] CDI.KEYID = 6
1,480,750 UART: [idev] SUBJECT.KEYID = 7
1,481,174 UART: [idev] UDS.KEYID = 0
1,481,519 ready_for_fw is high
1,481,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,165 UART: [idev] Erasing UDS.KEYID = 0
1,505,550 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,153 UART: [idev] --
1,515,388 UART: [ldev] ++
1,515,556 UART: [ldev] CDI.KEYID = 6
1,515,919 UART: [ldev] SUBJECT.KEYID = 5
1,516,345 UART: [ldev] AUTHORITY.KEYID = 7
1,516,808 UART: [ldev] FE.KEYID = 1
1,522,000 UART: [ldev] Erasing FE.KEYID = 1
1,547,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,822 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,516 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,388 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,094 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,152 UART: [ldev] --
1,586,607 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 118548 bytes
2,958,595 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,680 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,898 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,146 >>> mbox cmd response: success
3,158,395 UART: [afmc] ++
3,158,563 UART: [afmc] CDI.KEYID = 6
3,158,925 UART: [afmc] SUBJECT.KEYID = 7
3,159,350 UART: [afmc] AUTHORITY.KEYID = 5
3,194,497 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,210,973 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,211,753 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,217,468 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,223,353 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,229,056 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,237,050 UART: [afmc] --
3,238,105 UART: [cold-reset] --
3,238,831 UART: [state] Locking Datavault
3,240,090 UART: [state] Locking PCR0, PCR1 and PCR31
3,240,694 UART: [state] Locking ICCM
3,241,254 UART: [exit] Launching FMC @ 0x40000130
3,246,584 UART:
3,246,600 UART: Running Caliptra FMC ...
3,247,008 UART:
3,247,151 UART: [state] CFI Enabled
3,257,987 UART: [fht] FMC Alias Private Key: 7
3,375,700 UART: [art] Extend RT PCRs Done
3,376,128 UART: [art] Lock RT PCRs Done
3,377,442 UART: [art] Populate DV Done
3,385,690 UART: [fht] FMC Alias Private Key: 7
3,386,620 UART: [art] Derive CDI
3,386,900 UART: [art] Store in slot 0x4
3,472,838 UART: [art] Derive Key Pair
3,473,198 UART: [art] Store priv key in slot 0x5
3,486,859 UART: [art] Derive Key Pair - Done
3,501,732 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,517,023 UART: [art] Erasing AUTHORITY.KEYID = 7
3,517,788 UART: [art] PUB.X = 31FF98DACBBDF100BD8869FBB69CC7B95D1E10EBB87B598402970256655D222E7D79B9A83A19FF7D63371CB0864C1CB4
3,524,542 UART: [art] PUB.Y = 123970327704359E5472CEB43A5B357EE0EB741D053B04D8105F3801BFDF16D983CED0A3C518A9293D7F39DDFC1A60BD
3,531,486 UART: [art] SIG.R = 16A92F0B70540A355FF8DDC82FC205996CEA18A568E8753F194BA63D1872C548070F9A0FD590417B4CAA20A5FDA55B17
3,538,244 UART: [art] SIG.S = C3739321728D522A73855CA5C2C4F554E0C61A144B2E19AA19F5FAA1E1B05AB350793D8B3D76B00BAC5F4B5FCACC571D
3,562,081 UART: Caliptra RT
3,562,424 UART: [state] CFI Enabled
3,681,213 UART: [rt] RT listening for mailbox commands...
3,682,221 writing to cptra_bootfsm_go
3,682,316 UART:
3,682,332 UART: Running Caliptra ROM ...
3,682,740 UART:
3,682,881 UART: [state] CFI Enabled
3,685,022 UART: [state] LifecycleState = Production
3,685,630 UART: [state] DebugLocked = Yes
3,686,388 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,687,952 UART: [kat] SHA2-256
4,481,883 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,485,998 UART: [kat] ++
4,486,150 UART: [kat] sha1
4,490,368 UART: [kat] SHA2-256
4,492,306 UART: [kat] SHA2-384
4,495,135 UART: [kat] SHA2-512-ACC
4,497,036 UART: [kat] ECC-384
4,502,781 UART: [kat] HMAC-384Kdf
4,507,629 UART: [kat] LMS
5,075,825 UART: [kat] --
5,076,621 UART: [warm-reset] ++
5,077,398 UART: [warm-reset] --
5,078,043 UART: [state] Locking Datavault
5,078,841 UART: [state] Locking PCR0, PCR1 and PCR31
5,079,445 UART: [state] Locking ICCM
5,079,941 UART: [exit] Launching FMC @ 0x40000130
5,085,271 UART:
5,085,287 UART: Running Caliptra FMC ...
5,085,695 UART:
5,085,838 UART: [state] CFI Enabled
5,087,191 UART: [art] Skip pcr extension
5,087,600 UART: [art] Extend RT PCRs Done
5,088,028 UART: [art] Lock RT PCRs Done
5,089,173 UART: [art] Populate DV Done
5,097,607 UART: [fht] FMC Alias Private Key: 7
5,098,543 UART: [art] Derive CDI
5,098,823 UART: [art] Store in slot 0x4
5,184,299 UART: [art] Derive Key Pair
5,184,659 UART: [art] Store priv key in slot 0x5
5,198,002 UART: [art] Derive Key Pair - Done
5,212,659 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,227,946 UART: [art] Erasing AUTHORITY.KEYID = 7
5,228,711 UART: [art] PUB.X = 31FF98DACBBDF100BD8869FBB69CC7B95D1E10EBB87B598402970256655D222E7D79B9A83A19FF7D63371CB0864C1CB4
5,235,465 UART: [art] PUB.Y = 123970327704359E5472CEB43A5B357EE0EB741D053B04D8105F3801BFDF16D983CED0A3C518A9293D7F39DDFC1A60BD
5,242,409 UART: [art] SIG.R = 16A92F0B70540A355FF8DDC82FC205996CEA18A568E8753F194BA63D1872C548070F9A0FD590417B4CAA20A5FDA55B17
5,249,167 UART: [art] SIG.S = C3739321728D522A73855CA5C2C4F554E0C61A144B2E19AA19F5FAA1E1B05AB350793D8B3D76B00BAC5F4B5FCACC571D
5,272,726 UART: Caliptra RT
5,273,069 UART: [state] CFI Enabled
5,633,131 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,637 ready_for_fw is high
1,363,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,210 >>> mbox cmd response: success
3,069,786 UART:
3,069,802 UART: Running Caliptra FMC ...
3,070,210 UART:
3,070,353 UART: [state] CFI Enabled
3,081,443 UART: [fht] FMC Alias Private Key: 7
3,200,044 UART: [art] Extend RT PCRs Done
3,200,472 UART: [art] Lock RT PCRs Done
3,202,058 UART: [art] Populate DV Done
3,210,206 UART: [fht] FMC Alias Private Key: 7
3,211,308 UART: [art] Derive CDI
3,211,588 UART: [art] Store in slot 0x4
3,297,348 UART: [art] Derive Key Pair
3,297,708 UART: [art] Store priv key in slot 0x5
3,310,521 UART: [art] Derive Key Pair - Done
3,325,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,340,927 UART: [art] Erasing AUTHORITY.KEYID = 7
3,341,692 UART: [art] PUB.X = 69C28E5427A506636D44633C1E57C24409C2081F8C17AE1168346E43411C6A0AF3DA509C8F846A3CD6F80C10074F5296
3,348,436 UART: [art] PUB.Y = 504AF2589354F699AA7A8EE8BE404D436CA07FCA8E4090E7FED37BACBA125076EBA175BE820BA690F2FCE631C4B3FE81
3,355,403 UART: [art] SIG.R = 5FAC2A5764F52D12042A1F3AB9BE6CBFCB11E150CCECEEA2A3F1FAD07D0D454ADD4EAEA1FD4668054E736BDCE912AF09
3,362,195 UART: [art] SIG.S = C1B4DA3346A0313093EE9BB12EFB6DF769F29AC28E92059CA15932FA6D16A775B1A133D5814C71EBBF350D3E06643C76
3,385,990 UART: Caliptra RT
3,386,333 UART: [state] CFI Enabled
3,505,350 UART: [rt] RT listening for mailbox commands...
3,506,450 writing to cptra_bootfsm_go
4,791,610 UART:
4,791,626 UART: Running Caliptra FMC ...
4,792,034 UART:
4,792,177 UART: [state] CFI Enabled
4,793,662 UART: [art] Skip pcr extension
4,794,071 UART: [art] Extend RT PCRs Done
4,794,499 UART: [art] Lock RT PCRs Done
4,795,966 UART: [art] Populate DV Done
4,804,024 UART: [fht] FMC Alias Private Key: 7
4,805,012 UART: [art] Derive CDI
4,805,292 UART: [art] Store in slot 0x4
4,890,872 UART: [art] Derive Key Pair
4,891,232 UART: [art] Store priv key in slot 0x5
4,904,215 UART: [art] Derive Key Pair - Done
4,918,800 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,934,407 UART: [art] Erasing AUTHORITY.KEYID = 7
4,935,172 UART: [art] PUB.X = 69C28E5427A506636D44633C1E57C24409C2081F8C17AE1168346E43411C6A0AF3DA509C8F846A3CD6F80C10074F5296
4,941,916 UART: [art] PUB.Y = 504AF2589354F699AA7A8EE8BE404D436CA07FCA8E4090E7FED37BACBA125076EBA175BE820BA690F2FCE631C4B3FE81
4,948,883 UART: [art] SIG.R = 5FAC2A5764F52D12042A1F3AB9BE6CBFCB11E150CCECEEA2A3F1FAD07D0D454ADD4EAEA1FD4668054E736BDCE912AF09
4,955,675 UART: [art] SIG.S = C1B4DA3346A0313093EE9BB12EFB6DF769F29AC28E92059CA15932FA6D16A775B1A133D5814C71EBBF350D3E06643C76
4,979,786 UART: Caliptra RT
4,980,129 UART: [state] CFI Enabled
5,347,085 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Production
85,919 UART: [state] DebugLocked = Yes
86,563 UART: [state] Starting the WD Timer 40000000 cycles
88,132 UART: [kat] SHA2-256
891,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,786 UART: [kat] ++
895,938 UART: [kat] sha1
900,306 UART: [kat] SHA2-256
902,246 UART: [kat] SHA2-384
904,911 UART: [kat] SHA2-512-ACC
906,812 UART: [kat] ECC-384
916,671 UART: [kat] HMAC-384Kdf
921,477 UART: [kat] LMS
1,169,789 UART: [kat] --
1,170,612 UART: [cold-reset] ++
1,171,123 UART: [fht] FHT @ 0x50003400
1,173,905 UART: [idev] ++
1,174,073 UART: [idev] CDI.KEYID = 6
1,174,434 UART: [idev] SUBJECT.KEYID = 7
1,174,859 UART: [idev] UDS.KEYID = 0
1,175,205 ready_for_fw is high
1,175,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,982 UART: [idev] Sha1 KeyId Algorithm
1,207,971 UART: [idev] --
1,209,174 UART: [ldev] ++
1,209,342 UART: [ldev] CDI.KEYID = 6
1,209,706 UART: [ldev] SUBJECT.KEYID = 5
1,210,133 UART: [ldev] AUTHORITY.KEYID = 7
1,210,596 UART: [ldev] FE.KEYID = 1
1,215,840 UART: [ldev] Erasing FE.KEYID = 1
1,241,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,173 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,867 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,737 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,443 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,497 UART: [ldev] --
1,280,794 UART: [fwproc] Wait for Commands...
1,281,375 UART: [fwproc] Recv command 0x46574c44
1,282,108 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,519 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,324 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,706 >>> mbox cmd response: success
2,851,877 UART: [afmc] ++
2,852,045 UART: [afmc] CDI.KEYID = 6
2,852,408 UART: [afmc] SUBJECT.KEYID = 7
2,852,834 UART: [afmc] AUTHORITY.KEYID = 5
2,888,207 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,904,688 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,437 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,153 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,036 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,741 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,479 UART: [afmc] --
2,931,329 UART: [cold-reset] --
2,932,151 UART: [state] Locking Datavault
2,933,280 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,884 UART: [state] Locking ICCM
2,934,482 UART: [exit] Launching FMC @ 0x40000130
2,939,812 UART:
2,939,828 UART: Running Caliptra FMC ...
2,940,236 UART:
2,940,290 UART: [state] CFI Enabled
2,950,854 UART: [fht] FMC Alias Private Key: 7
3,069,923 UART: [art] Extend RT PCRs Done
3,070,351 UART: [art] Lock RT PCRs Done
3,071,791 UART: [art] Populate DV Done
3,079,865 UART: [fht] FMC Alias Private Key: 7
3,081,045 UART: [art] Derive CDI
3,081,325 UART: [art] Store in slot 0x4
3,166,850 UART: [art] Derive Key Pair
3,167,210 UART: [art] Store priv key in slot 0x5
3,181,196 UART: [art] Derive Key Pair - Done
3,195,973 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,574 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,339 UART: [art] PUB.X = DECD86A8838466671B24BD4E22BE5DA121FEFCC5F09E05DD01E0F9F1D0F3AA5CFA2B01FAD2104C33E9BFB0FBEC76550C
3,219,127 UART: [art] PUB.Y = 33744C1A8648ADEA6E2AA2F7F09B343CBCABAD890C362F5697E7CF0DBEA35527C2265E97080FAD60A3E68A439AADEB29
3,226,085 UART: [art] SIG.R = 3B29BBB5F5BB0FB5D2EDCF7BBC6C71588B97BC8669BD73C04F8EF6DA372846B73B863DD7CEEF47C248CD923C94C04917
3,232,874 UART: [art] SIG.S = 8214A3E4D41F94C06BF7007C4ACE7E44FFC8FAE195508A13FFA8AFCCE3F9CA51F109B76166676A89B19695DED1CE9AB6
3,256,967 UART: Caliptra RT
3,257,218 UART: [state] CFI Enabled
3,375,516 UART: [rt] RT listening for mailbox commands...
3,376,494 writing to cptra_bootfsm_go
3,376,586 UART:
3,376,602 UART: Running Caliptra ROM ...
3,377,010 UART:
3,377,065 UART: [state] CFI Enabled
3,379,372 UART: [state] LifecycleState = Production
3,379,980 UART: [state] DebugLocked = Yes
3,380,610 UART: [state] Starting the WD Timer 40000000 cycles
3,382,221 UART: [kat] SHA2-256
4,185,771 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,875 UART: [kat] ++
4,190,027 UART: [kat] sha1
4,194,161 UART: [kat] SHA2-256
4,196,101 UART: [kat] SHA2-384
4,198,856 UART: [kat] SHA2-512-ACC
4,200,757 UART: [kat] ECC-384
4,210,410 UART: [kat] HMAC-384Kdf
4,214,998 UART: [kat] LMS
4,463,310 UART: [kat] --
4,464,282 UART: [warm-reset] ++
4,465,245 UART: [warm-reset] --
4,466,352 UART: [state] Locking Datavault
4,467,194 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,798 UART: [state] Locking ICCM
4,468,260 UART: [exit] Launching FMC @ 0x40000130
4,473,590 UART:
4,473,606 UART: Running Caliptra FMC ...
4,474,014 UART:
4,474,068 UART: [state] CFI Enabled
4,475,321 UART: [art] Skip pcr extension
4,475,730 UART: [art] Extend RT PCRs Done
4,476,158 UART: [art] Lock RT PCRs Done
4,477,267 UART: [art] Populate DV Done
4,485,193 UART: [fht] FMC Alias Private Key: 7
4,486,205 UART: [art] Derive CDI
4,486,485 UART: [art] Store in slot 0x4
4,571,956 UART: [art] Derive Key Pair
4,572,316 UART: [art] Store priv key in slot 0x5
4,585,880 UART: [art] Derive Key Pair - Done
4,600,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,126 UART: [art] Erasing AUTHORITY.KEYID = 7
4,616,891 UART: [art] PUB.X = DECD86A8838466671B24BD4E22BE5DA121FEFCC5F09E05DD01E0F9F1D0F3AA5CFA2B01FAD2104C33E9BFB0FBEC76550C
4,623,679 UART: [art] PUB.Y = 33744C1A8648ADEA6E2AA2F7F09B343CBCABAD890C362F5697E7CF0DBEA35527C2265E97080FAD60A3E68A439AADEB29
4,630,637 UART: [art] SIG.R = 3B29BBB5F5BB0FB5D2EDCF7BBC6C71588B97BC8669BD73C04F8EF6DA372846B73B863DD7CEEF47C248CD923C94C04917
4,637,426 UART: [art] SIG.S = 8214A3E4D41F94C06BF7007C4ACE7E44FFC8FAE195508A13FFA8AFCCE3F9CA51F109B76166676A89B19695DED1CE9AB6
4,661,009 UART: Caliptra RT
4,661,260 UART: [state] CFI Enabled
5,027,831 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,369 ready_for_fw is high
1,059,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,271 >>> mbox cmd response: success
2,765,898 UART:
2,765,914 UART: Running Caliptra FMC ...
2,766,322 UART:
2,766,376 UART: [state] CFI Enabled
2,776,928 UART: [fht] FMC Alias Private Key: 7
2,896,037 UART: [art] Extend RT PCRs Done
2,896,465 UART: [art] Lock RT PCRs Done
2,898,229 UART: [art] Populate DV Done
2,906,451 UART: [fht] FMC Alias Private Key: 7
2,907,525 UART: [art] Derive CDI
2,907,805 UART: [art] Store in slot 0x4
2,993,252 UART: [art] Derive Key Pair
2,993,612 UART: [art] Store priv key in slot 0x5
3,007,104 UART: [art] Derive Key Pair - Done
3,022,142 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,038,005 UART: [art] Erasing AUTHORITY.KEYID = 7
3,038,770 UART: [art] PUB.X = 8E2122DB2B0D740A3335B13267306C1B41971E633E72C2FBAC78644E85CA6D69179796E8445FF2D6896871F7C3F85D3F
3,045,530 UART: [art] PUB.Y = 64DA0CFF4205B660989AC8E65475C32BB1E329A6C8A196D0134A0947A1368E750AE6495B11DA0C609E0D5A6CFC30E710
3,052,466 UART: [art] SIG.R = 02672CEAB19DC49EC8ED0807F097D529A7E88081E51EF5A45AD4E0E4B3458B5FD46835EDA15CE5FDB4B6C19643F99815
3,059,239 UART: [art] SIG.S = 6672D135E5AA68D7237EC1B8F5216D5BC41E4BB5B28141DE0E0CF94F1AB601BF805AF2F2804E7AC86EF7D2D1FE055F46
3,083,081 UART: Caliptra RT
3,083,332 UART: [state] CFI Enabled
3,203,705 UART: [rt] RT listening for mailbox commands...
3,204,967 writing to cptra_bootfsm_go
4,186,326 UART:
4,186,342 UART: Running Caliptra FMC ...
4,186,750 UART:
4,186,804 UART: [state] CFI Enabled
4,187,953 UART: [art] Skip pcr extension
4,188,362 UART: [art] Extend RT PCRs Done
4,188,790 UART: [art] Lock RT PCRs Done
4,190,203 UART: [art] Populate DV Done
4,198,575 UART: [fht] FMC Alias Private Key: 7
4,199,513 UART: [art] Derive CDI
4,199,793 UART: [art] Store in slot 0x4
4,285,648 UART: [art] Derive Key Pair
4,286,008 UART: [art] Store priv key in slot 0x5
4,299,654 UART: [art] Derive Key Pair - Done
4,314,460 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,330,201 UART: [art] Erasing AUTHORITY.KEYID = 7
4,330,966 UART: [art] PUB.X = 8E2122DB2B0D740A3335B13267306C1B41971E633E72C2FBAC78644E85CA6D69179796E8445FF2D6896871F7C3F85D3F
4,337,726 UART: [art] PUB.Y = 64DA0CFF4205B660989AC8E65475C32BB1E329A6C8A196D0134A0947A1368E750AE6495B11DA0C609E0D5A6CFC30E710
4,344,662 UART: [art] SIG.R = 02672CEAB19DC49EC8ED0807F097D529A7E88081E51EF5A45AD4E0E4B3458B5FD46835EDA15CE5FDB4B6C19643F99815
4,351,435 UART: [art] SIG.S = 6672D135E5AA68D7237EC1B8F5216D5BC41E4BB5B28141DE0E0CF94F1AB601BF805AF2F2804E7AC86EF7D2D1FE055F46
4,375,059 UART: Caliptra RT
4,375,310 UART: [state] CFI Enabled
4,742,978 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,568 UART: [state] LifecycleState = Production
86,176 UART: [state] DebugLocked = Yes
86,722 UART: [state] Starting the WD Timer 40000000 cycles
88,237 UART: [kat] SHA2-256
891,787 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,891 UART: [kat] ++
896,043 UART: [kat] sha1
900,447 UART: [kat] SHA2-256
902,387 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,596 UART: [kat] HMAC-384Kdf
921,276 UART: [kat] LMS
1,169,588 UART: [kat] --
1,170,507 UART: [cold-reset] ++
1,170,846 UART: [fht] FHT @ 0x50003400
1,173,538 UART: [idev] ++
1,173,706 UART: [idev] CDI.KEYID = 6
1,174,067 UART: [idev] SUBJECT.KEYID = 7
1,174,492 UART: [idev] UDS.KEYID = 0
1,174,838 ready_for_fw is high
1,174,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,324 UART: [idev] Erasing UDS.KEYID = 0
1,199,019 UART: [idev] Sha1 KeyId Algorithm
1,207,898 UART: [idev] --
1,208,853 UART: [ldev] ++
1,209,021 UART: [ldev] CDI.KEYID = 6
1,209,385 UART: [ldev] SUBJECT.KEYID = 5
1,209,812 UART: [ldev] AUTHORITY.KEYID = 7
1,210,275 UART: [ldev] FE.KEYID = 1
1,215,263 UART: [ldev] Erasing FE.KEYID = 1
1,241,334 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,470 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,164 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,034 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,740 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,888 UART: [ldev] --
1,280,101 UART: [fwproc] Wait for Commands...
1,280,742 UART: [fwproc] Recv command 0x46574c44
1,281,475 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,677,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,709,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,849,353 >>> mbox cmd response: success
2,850,522 UART: [afmc] ++
2,850,690 UART: [afmc] CDI.KEYID = 6
2,851,053 UART: [afmc] SUBJECT.KEYID = 7
2,851,479 UART: [afmc] AUTHORITY.KEYID = 5
2,887,454 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,903,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,904,738 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,910,454 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,916,337 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,922,042 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,929,832 UART: [afmc] --
2,930,682 UART: [cold-reset] --
2,931,462 UART: [state] Locking Datavault
2,932,683 UART: [state] Locking PCR0, PCR1 and PCR31
2,933,287 UART: [state] Locking ICCM
2,933,775 UART: [exit] Launching FMC @ 0x40000130
2,939,105 UART:
2,939,121 UART: Running Caliptra FMC ...
2,939,529 UART:
2,939,672 UART: [state] CFI Enabled
2,950,504 UART: [fht] FMC Alias Private Key: 7
3,069,053 UART: [art] Extend RT PCRs Done
3,069,481 UART: [art] Lock RT PCRs Done
3,070,951 UART: [art] Populate DV Done
3,078,955 UART: [fht] FMC Alias Private Key: 7
3,080,077 UART: [art] Derive CDI
3,080,357 UART: [art] Store in slot 0x4
3,166,428 UART: [art] Derive Key Pair
3,166,788 UART: [art] Store priv key in slot 0x5
3,180,078 UART: [art] Derive Key Pair - Done
3,194,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,069 UART: [art] PUB.X = 03DAA7BB47AFDC7CEBCE4B9032B8106B29CE3AA0DA8DB5B37C5F55FA2169C9EDA731FDE78D2E1413EF882D09E0892500
3,217,835 UART: [art] PUB.Y = 507DEE04C39A958D529628FBB4BDED94CC509961DE33065152C1D03483AC8F0CBC34B5279883B50C720C604C73BA7A7E
3,224,776 UART: [art] SIG.R = 36883EAE7350330CF41824310381D51D3AC8633D0B7BE51DFCD24FA5C4AE8740A1BBF4CA14575454906712C82D0E67DE
3,231,538 UART: [art] SIG.S = 4C9467B73929AACEF32CE18BD0C3AE18DCC7BD853036AC829D741D57F8DF8A525B7839844AC72CD99740D21454FA6081
3,254,948 UART: Caliptra RT
3,255,291 UART: [state] CFI Enabled
3,374,546 UART: [rt] RT listening for mailbox commands...
3,375,800 writing to cptra_bootfsm_go
3,375,892 UART:
3,375,908 UART: Running Caliptra ROM ...
3,376,316 UART:
3,376,458 UART: [state] CFI Enabled
3,379,289 UART: [state] LifecycleState = Production
3,379,897 UART: [state] DebugLocked = Yes
3,380,459 UART: [state] Starting the WD Timer 40000000 cycles
3,381,964 UART: [kat] SHA2-256
4,185,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,618 UART: [kat] ++
4,189,770 UART: [kat] sha1
4,194,104 UART: [kat] SHA2-256
4,196,044 UART: [kat] SHA2-384
4,198,883 UART: [kat] SHA2-512-ACC
4,200,784 UART: [kat] ECC-384
4,210,677 UART: [kat] HMAC-384Kdf
4,215,495 UART: [kat] LMS
4,463,807 UART: [kat] --
4,464,809 UART: [warm-reset] ++
4,465,610 UART: [warm-reset] --
4,466,309 UART: [state] Locking Datavault
4,466,987 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,591 UART: [state] Locking ICCM
4,468,029 UART: [exit] Launching FMC @ 0x40000130
4,473,359 UART:
4,473,375 UART: Running Caliptra FMC ...
4,473,783 UART:
4,473,926 UART: [state] CFI Enabled
4,475,341 UART: [art] Skip pcr extension
4,475,750 UART: [art] Extend RT PCRs Done
4,476,178 UART: [art] Lock RT PCRs Done
4,477,387 UART: [art] Populate DV Done
4,485,417 UART: [fht] FMC Alias Private Key: 7
4,486,413 UART: [art] Derive CDI
4,486,693 UART: [art] Store in slot 0x4
4,572,206 UART: [art] Derive Key Pair
4,572,566 UART: [art] Store priv key in slot 0x5
4,586,074 UART: [art] Derive Key Pair - Done
4,601,013 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,690 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,455 UART: [art] PUB.X = 03DAA7BB47AFDC7CEBCE4B9032B8106B29CE3AA0DA8DB5B37C5F55FA2169C9EDA731FDE78D2E1413EF882D09E0892500
4,624,221 UART: [art] PUB.Y = 507DEE04C39A958D529628FBB4BDED94CC509961DE33065152C1D03483AC8F0CBC34B5279883B50C720C604C73BA7A7E
4,631,162 UART: [art] SIG.R = 36883EAE7350330CF41824310381D51D3AC8633D0B7BE51DFCD24FA5C4AE8740A1BBF4CA14575454906712C82D0E67DE
4,637,924 UART: [art] SIG.S = 4C9467B73929AACEF32CE18BD0C3AE18DCC7BD853036AC829D741D57F8DF8A525B7839844AC72CD99740D21454FA6081
4,661,346 UART: Caliptra RT
4,661,689 UART: [state] CFI Enabled
5,027,435 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,670 ready_for_fw is high
1,059,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,094 >>> mbox cmd response: success
2,765,251 UART:
2,765,267 UART: Running Caliptra FMC ...
2,765,675 UART:
2,765,818 UART: [state] CFI Enabled
2,776,486 UART: [fht] FMC Alias Private Key: 7
2,895,007 UART: [art] Extend RT PCRs Done
2,895,435 UART: [art] Lock RT PCRs Done
2,896,773 UART: [art] Populate DV Done
2,905,245 UART: [fht] FMC Alias Private Key: 7
2,906,363 UART: [art] Derive CDI
2,906,643 UART: [art] Store in slot 0x4
2,992,494 UART: [art] Derive Key Pair
2,992,854 UART: [art] Store priv key in slot 0x5
3,006,298 UART: [art] Derive Key Pair - Done
3,020,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,036,385 UART: [art] Erasing AUTHORITY.KEYID = 7
3,037,150 UART: [art] PUB.X = 72C86263A371D51E4C3678365EA84AE9097AD300E881F2D6297BAFB9F96347E5CA57C4A9BA71BE35DB67A3F27AADBEFA
3,043,911 UART: [art] PUB.Y = 00A0DEECD203170E25D25DF2BF332240448CB9B235588DA1BA787B813F254E1B2F95ED25838C3F7E64C1C73C12298166
3,050,835 UART: [art] SIG.R = DFF585FF1836EC5A202D3E73F9D1607F7279AA8DE10BBCDB2AC86ECB8F6D082CD8F4D5D16ACBE2678EDEC1CB6BC2876D
3,057,631 UART: [art] SIG.S = C5517721B9C193D3B57C4FEA0D33847220345B5CE54785EBA5C3589D0EFF80466FFE022308AF61C831BD5A31798DFD4E
3,080,951 UART: Caliptra RT
3,081,294 UART: [state] CFI Enabled
3,201,518 UART: [rt] RT listening for mailbox commands...
3,202,672 writing to cptra_bootfsm_go
4,185,114 UART:
4,185,130 UART: Running Caliptra FMC ...
4,185,538 UART:
4,185,681 UART: [state] CFI Enabled
4,187,088 UART: [art] Skip pcr extension
4,187,497 UART: [art] Extend RT PCRs Done
4,187,925 UART: [art] Lock RT PCRs Done
4,189,146 UART: [art] Populate DV Done
4,197,540 UART: [fht] FMC Alias Private Key: 7
4,198,644 UART: [art] Derive CDI
4,198,924 UART: [art] Store in slot 0x4
4,284,837 UART: [art] Derive Key Pair
4,285,197 UART: [art] Store priv key in slot 0x5
4,298,641 UART: [art] Derive Key Pair - Done
4,313,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,328,704 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,469 UART: [art] PUB.X = 72C86263A371D51E4C3678365EA84AE9097AD300E881F2D6297BAFB9F96347E5CA57C4A9BA71BE35DB67A3F27AADBEFA
4,336,230 UART: [art] PUB.Y = 00A0DEECD203170E25D25DF2BF332240448CB9B235588DA1BA787B813F254E1B2F95ED25838C3F7E64C1C73C12298166
4,343,154 UART: [art] SIG.R = DFF585FF1836EC5A202D3E73F9D1607F7279AA8DE10BBCDB2AC86ECB8F6D082CD8F4D5D16ACBE2678EDEC1CB6BC2876D
4,349,950 UART: [art] SIG.S = C5517721B9C193D3B57C4FEA0D33847220345B5CE54785EBA5C3589D0EFF80466FFE022308AF61C831BD5A31798DFD4E
4,373,666 UART: Caliptra RT
4,374,009 UART: [state] CFI Enabled
4,739,792 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Production
85,975 UART: [state] DebugLocked = Yes
86,603 UART: [state] Starting the WD Timer 40000000 cycles
88,304 UART: [kat] SHA2-256
893,954 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,079 UART: [kat] ++
898,231 UART: [kat] sha1
902,519 UART: [kat] SHA2-256
904,459 UART: [kat] SHA2-384
907,238 UART: [kat] SHA2-512-ACC
909,139 UART: [kat] ECC-384
918,648 UART: [kat] HMAC-384Kdf
923,324 UART: [kat] LMS
1,171,652 UART: [kat] --
1,172,565 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 ready_for_fw is high
1,176,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,594 UART: [idev] Sha1 KeyId Algorithm
1,209,091 UART: [idev] --
1,210,361 UART: [ldev] ++
1,210,529 UART: [ldev] CDI.KEYID = 6
1,210,892 UART: [ldev] SUBJECT.KEYID = 5
1,211,318 UART: [ldev] AUTHORITY.KEYID = 7
1,211,781 UART: [ldev] FE.KEYID = 1
1,216,617 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,497 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,191 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,063 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,769 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,022 UART: [ldev] --
1,282,287 UART: [fwproc] Wait for Commands...
1,283,029 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,906 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,284 >>> mbox cmd response: success
2,855,317 UART: [afmc] ++
2,855,485 UART: [afmc] CDI.KEYID = 6
2,855,847 UART: [afmc] SUBJECT.KEYID = 7
2,856,272 UART: [afmc] AUTHORITY.KEYID = 5
2,892,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,774 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,522 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,237 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,122 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,926,827 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,775 UART: [afmc] --
2,935,888 UART: [cold-reset] --
2,936,582 UART: [state] Locking Datavault
2,937,869 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,473 UART: [state] Locking ICCM
2,938,905 UART: [exit] Launching FMC @ 0x40000130
2,944,235 UART:
2,944,251 UART: Running Caliptra FMC ...
2,944,659 UART:
2,944,713 UART: [state] CFI Enabled
2,955,209 UART: [fht] FMC Alias Private Key: 7
3,074,488 UART: [art] Extend RT PCRs Done
3,074,916 UART: [art] Lock RT PCRs Done
3,076,288 UART: [art] Populate DV Done
3,084,582 UART: [fht] FMC Alias Private Key: 7
3,085,686 UART: [art] Derive CDI
3,085,966 UART: [art] Store in slot 0x4
3,171,669 UART: [art] Derive Key Pair
3,172,029 UART: [art] Store priv key in slot 0x5
3,184,911 UART: [art] Derive Key Pair - Done
3,199,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,215,078 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,843 UART: [art] PUB.X = DC1B41CD1B9E77C3F6786849BA267070F3200FF5F826B327407A846C6A14B59C6BF8E216EEEEA43D1A06689E422D07AD
3,222,612 UART: [art] PUB.Y = F59241FB353E1AB3D083EB0D024538617DD9F5097EFD393BCDF83D1911EA7F3A02D7C5D20E9BA0DC67AB48AD25644715
3,229,559 UART: [art] SIG.R = DE2BB028DCE992A0B8B6CA8ED2B985F229EAC4E129BB227FC30837E37B2A4BAD44E469C56F3CCFF1006A8320F6D6A140
3,236,324 UART: [art] SIG.S = 1D28F2C3C140C4C44FFB1A9F5FA102188DA9306AFD358F7B5C0A9354BEF22DABE680FFC4D922320265251CC7D0D1AA67
3,259,811 UART: Caliptra RT
3,260,062 UART: [state] CFI Enabled
3,379,844 UART: [rt] RT listening for mailbox commands...
3,380,798 writing to cptra_bootfsm_go
3,380,890 UART:
3,380,906 UART: Running Caliptra ROM ...
3,381,314 UART:
3,381,369 UART: [state] CFI Enabled
3,384,332 UART: [state] LifecycleState = Production
3,384,940 UART: [state] DebugLocked = Yes
3,385,638 UART: [state] Starting the WD Timer 40000000 cycles
3,387,179 UART: [kat] SHA2-256
4,192,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,196,954 UART: [kat] ++
4,197,106 UART: [kat] sha1
4,201,212 UART: [kat] SHA2-256
4,203,152 UART: [kat] SHA2-384
4,205,817 UART: [kat] SHA2-512-ACC
4,207,718 UART: [kat] ECC-384
4,217,749 UART: [kat] HMAC-384Kdf
4,222,341 UART: [kat] LMS
4,470,669 UART: [kat] --
4,471,655 UART: [warm-reset] ++
4,472,706 UART: [warm-reset] --
4,473,487 UART: [state] Locking Datavault
4,474,317 UART: [state] Locking PCR0, PCR1 and PCR31
4,474,921 UART: [state] Locking ICCM
4,475,431 UART: [exit] Launching FMC @ 0x40000130
4,480,761 UART:
4,480,777 UART: Running Caliptra FMC ...
4,481,185 UART:
4,481,239 UART: [state] CFI Enabled
4,482,558 UART: [art] Skip pcr extension
4,482,967 UART: [art] Extend RT PCRs Done
4,483,395 UART: [art] Lock RT PCRs Done
4,484,860 UART: [art] Populate DV Done
4,492,930 UART: [fht] FMC Alias Private Key: 7
4,493,960 UART: [art] Derive CDI
4,494,240 UART: [art] Store in slot 0x4
4,580,327 UART: [art] Derive Key Pair
4,580,687 UART: [art] Store priv key in slot 0x5
4,594,091 UART: [art] Derive Key Pair - Done
4,608,789 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,624,048 UART: [art] Erasing AUTHORITY.KEYID = 7
4,624,813 UART: [art] PUB.X = DC1B41CD1B9E77C3F6786849BA267070F3200FF5F826B327407A846C6A14B59C6BF8E216EEEEA43D1A06689E422D07AD
4,631,582 UART: [art] PUB.Y = F59241FB353E1AB3D083EB0D024538617DD9F5097EFD393BCDF83D1911EA7F3A02D7C5D20E9BA0DC67AB48AD25644715
4,638,529 UART: [art] SIG.R = DE2BB028DCE992A0B8B6CA8ED2B985F229EAC4E129BB227FC30837E37B2A4BAD44E469C56F3CCFF1006A8320F6D6A140
4,645,294 UART: [art] SIG.S = 1D28F2C3C140C4C44FFB1A9F5FA102188DA9306AFD358F7B5C0A9354BEF22DABE680FFC4D922320265251CC7D0D1AA67
4,668,501 UART: Caliptra RT
4,668,752 UART: [state] CFI Enabled
5,030,115 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,898 ready_for_fw is high
1,059,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,707,297 >>> mbox cmd response: success
2,769,375 UART:
2,769,391 UART: Running Caliptra FMC ...
2,769,799 UART:
2,769,853 UART: [state] CFI Enabled
2,780,751 UART: [fht] FMC Alias Private Key: 7
2,899,574 UART: [art] Extend RT PCRs Done
2,900,002 UART: [art] Lock RT PCRs Done
2,901,752 UART: [art] Populate DV Done
2,910,188 UART: [fht] FMC Alias Private Key: 7
2,911,242 UART: [art] Derive CDI
2,911,522 UART: [art] Store in slot 0x4
2,996,933 UART: [art] Derive Key Pair
2,997,293 UART: [art] Store priv key in slot 0x5
3,010,621 UART: [art] Derive Key Pair - Done
3,025,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,040,587 UART: [art] Erasing AUTHORITY.KEYID = 7
3,041,352 UART: [art] PUB.X = 2A8BE28C11A7D171EE0AA3581CDCFAC73CC69CDD46B1ECC01B8028A8F69DE2364C3FA910AD30CB2421062E5AE88831FB
3,048,138 UART: [art] PUB.Y = 7362085A1BD78F5F8C4D45A0B2DA1EB6B1DA6AA7DC80C3B3E398B6A16666E35FB3308E9FFE8857D68072B98838841386
3,055,091 UART: [art] SIG.R = 09B10C909642D0CC5E5F70CE23FC1A0325DE2FFBA5447629FE9581C0C0B1AE1948093EF9D5CC54B54D250A28DC54BC79
3,061,858 UART: [art] SIG.S = 0E6B41FD22D11F459F03F6CEC412A74AC6853E7AD2324C13FC55F48B5B092245FF0DBEA78AC44E65DEF73C28ED13E9C1
3,085,692 UART: Caliptra RT
3,085,943 UART: [state] CFI Enabled
3,206,318 UART: [rt] RT listening for mailbox commands...
3,207,340 writing to cptra_bootfsm_go
4,190,469 UART:
4,190,485 UART: Running Caliptra FMC ...
4,190,893 UART:
4,190,947 UART: [state] CFI Enabled
4,192,154 UART: [art] Skip pcr extension
4,192,563 UART: [art] Extend RT PCRs Done
4,192,991 UART: [art] Lock RT PCRs Done
4,194,212 UART: [art] Populate DV Done
4,202,274 UART: [fht] FMC Alias Private Key: 7
4,203,438 UART: [art] Derive CDI
4,203,718 UART: [art] Store in slot 0x4
4,289,479 UART: [art] Derive Key Pair
4,289,839 UART: [art] Store priv key in slot 0x5
4,302,943 UART: [art] Derive Key Pair - Done
4,317,148 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,333,137 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,902 UART: [art] PUB.X = 2A8BE28C11A7D171EE0AA3581CDCFAC73CC69CDD46B1ECC01B8028A8F69DE2364C3FA910AD30CB2421062E5AE88831FB
4,340,688 UART: [art] PUB.Y = 7362085A1BD78F5F8C4D45A0B2DA1EB6B1DA6AA7DC80C3B3E398B6A16666E35FB3308E9FFE8857D68072B98838841386
4,347,641 UART: [art] SIG.R = 09B10C909642D0CC5E5F70CE23FC1A0325DE2FFBA5447629FE9581C0C0B1AE1948093EF9D5CC54B54D250A28DC54BC79
4,354,408 UART: [art] SIG.S = 0E6B41FD22D11F459F03F6CEC412A74AC6853E7AD2324C13FC55F48B5B092245FF0DBEA78AC44E65DEF73C28ED13E9C1
4,378,082 UART: Caliptra RT
4,378,333 UART: [state] CFI Enabled
4,745,935 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Production
85,712 UART: [state] DebugLocked = Yes
86,384 UART: [state] Starting the WD Timer 40000000 cycles
88,099 UART: [kat] SHA2-256
893,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,874 UART: [kat] ++
898,026 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,721 UART: [kat] SHA2-512-ACC
908,622 UART: [kat] ECC-384
919,007 UART: [kat] HMAC-384Kdf
923,575 UART: [kat] LMS
1,171,903 UART: [kat] --
1,173,134 UART: [cold-reset] ++
1,173,471 UART: [fht] FHT @ 0x50003400
1,176,012 UART: [idev] ++
1,176,180 UART: [idev] CDI.KEYID = 6
1,176,540 UART: [idev] SUBJECT.KEYID = 7
1,176,964 UART: [idev] UDS.KEYID = 0
1,177,309 ready_for_fw is high
1,177,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,055 UART: [idev] Erasing UDS.KEYID = 0
1,202,229 UART: [idev] Sha1 KeyId Algorithm
1,210,856 UART: [idev] --
1,211,774 UART: [ldev] ++
1,211,942 UART: [ldev] CDI.KEYID = 6
1,212,305 UART: [ldev] SUBJECT.KEYID = 5
1,212,731 UART: [ldev] AUTHORITY.KEYID = 7
1,213,194 UART: [ldev] FE.KEYID = 1
1,218,542 UART: [ldev] Erasing FE.KEYID = 1
1,245,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,878 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,572 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,444 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,150 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,973 UART: [ldev] --
1,284,304 UART: [fwproc] Wait for Commands...
1,285,026 UART: [fwproc] Recv command 0x46574c44
1,285,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,656,523 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,683,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,714,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,545 >>> mbox cmd response: success
2,855,750 UART: [afmc] ++
2,855,918 UART: [afmc] CDI.KEYID = 6
2,856,280 UART: [afmc] SUBJECT.KEYID = 7
2,856,705 UART: [afmc] AUTHORITY.KEYID = 5
2,892,180 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,977 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,725 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,440 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,325 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,927,030 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,966 UART: [afmc] --
2,935,919 UART: [cold-reset] --
2,936,745 UART: [state] Locking Datavault
2,937,930 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,534 UART: [state] Locking ICCM
2,939,154 UART: [exit] Launching FMC @ 0x40000130
2,944,484 UART:
2,944,500 UART: Running Caliptra FMC ...
2,944,908 UART:
2,945,051 UART: [state] CFI Enabled
2,955,417 UART: [fht] FMC Alias Private Key: 7
3,074,450 UART: [art] Extend RT PCRs Done
3,074,878 UART: [art] Lock RT PCRs Done
3,076,332 UART: [art] Populate DV Done
3,084,422 UART: [fht] FMC Alias Private Key: 7
3,085,480 UART: [art] Derive CDI
3,085,760 UART: [art] Store in slot 0x4
3,171,649 UART: [art] Derive Key Pair
3,172,009 UART: [art] Store priv key in slot 0x5
3,185,059 UART: [art] Derive Key Pair - Done
3,200,172 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,215,769 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,534 UART: [art] PUB.X = F276BF39D2A51E0F6EF304252259978A1FB6C73E499609C24033896A03D6F2FA5C485F2C67B7A7BFE10AD0D2B117A168
3,223,293 UART: [art] PUB.Y = 615304387AC31AC261A82BDBCA75C431F13A769EBC4ADED422D5ECA9BB0805C4554ADD9C42ACB798E946BCB4C023B968
3,230,252 UART: [art] SIG.R = AED7EE790B21C3A296EDB747B9FAEA1A16C32E3BC68E7F9410B5112E0C5C8D63D2DAEB785F3576B308356963AFABCDE1
3,237,035 UART: [art] SIG.S = B6089E4EB3A2247744714D158752160A843FC19D89AB83CC793F63416F21173C81D3C19B403C1F43007AB8F4A820A7AE
3,260,987 UART: Caliptra RT
3,261,330 UART: [state] CFI Enabled
3,381,480 UART: [rt] RT listening for mailbox commands...
3,382,574 writing to cptra_bootfsm_go
3,382,666 UART:
3,382,682 UART: Running Caliptra ROM ...
3,383,090 UART:
3,383,232 UART: [state] CFI Enabled
3,385,455 UART: [state] LifecycleState = Production
3,386,063 UART: [state] DebugLocked = Yes
3,386,727 UART: [state] Starting the WD Timer 40000000 cycles
3,388,420 UART: [kat] SHA2-256
4,194,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,198,195 UART: [kat] ++
4,198,347 UART: [kat] sha1
4,202,537 UART: [kat] SHA2-256
4,204,477 UART: [kat] SHA2-384
4,207,242 UART: [kat] SHA2-512-ACC
4,209,143 UART: [kat] ECC-384
4,219,038 UART: [kat] HMAC-384Kdf
4,223,496 UART: [kat] LMS
4,471,824 UART: [kat] --
4,472,898 UART: [warm-reset] ++
4,473,631 UART: [warm-reset] --
4,474,630 UART: [state] Locking Datavault
4,475,434 UART: [state] Locking PCR0, PCR1 and PCR31
4,476,038 UART: [state] Locking ICCM
4,476,550 UART: [exit] Launching FMC @ 0x40000130
4,481,880 UART:
4,481,896 UART: Running Caliptra FMC ...
4,482,304 UART:
4,482,447 UART: [state] CFI Enabled
4,483,654 UART: [art] Skip pcr extension
4,484,063 UART: [art] Extend RT PCRs Done
4,484,491 UART: [art] Lock RT PCRs Done
4,485,774 UART: [art] Populate DV Done
4,494,118 UART: [fht] FMC Alias Private Key: 7
4,495,124 UART: [art] Derive CDI
4,495,404 UART: [art] Store in slot 0x4
4,581,529 UART: [art] Derive Key Pair
4,581,889 UART: [art] Store priv key in slot 0x5
4,595,585 UART: [art] Derive Key Pair - Done
4,610,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,626,237 UART: [art] Erasing AUTHORITY.KEYID = 7
4,627,002 UART: [art] PUB.X = F276BF39D2A51E0F6EF304252259978A1FB6C73E499609C24033896A03D6F2FA5C485F2C67B7A7BFE10AD0D2B117A168
4,633,761 UART: [art] PUB.Y = 615304387AC31AC261A82BDBCA75C431F13A769EBC4ADED422D5ECA9BB0805C4554ADD9C42ACB798E946BCB4C023B968
4,640,720 UART: [art] SIG.R = AED7EE790B21C3A296EDB747B9FAEA1A16C32E3BC68E7F9410B5112E0C5C8D63D2DAEB785F3576B308356963AFABCDE1
4,647,503 UART: [art] SIG.S = B6089E4EB3A2247744714D158752160A843FC19D89AB83CC793F63416F21173C81D3C19B403C1F43007AB8F4A820A7AE
4,671,061 UART: Caliptra RT
4,671,404 UART: [state] CFI Enabled
5,035,459 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,337 ready_for_fw is high
1,061,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,558 >>> mbox cmd response: success
2,768,110 UART:
2,768,126 UART: Running Caliptra FMC ...
2,768,534 UART:
2,768,677 UART: [state] CFI Enabled
2,779,121 UART: [fht] FMC Alias Private Key: 7
2,897,574 UART: [art] Extend RT PCRs Done
2,898,002 UART: [art] Lock RT PCRs Done
2,899,748 UART: [art] Populate DV Done
2,908,224 UART: [fht] FMC Alias Private Key: 7
2,909,220 UART: [art] Derive CDI
2,909,500 UART: [art] Store in slot 0x4
2,995,177 UART: [art] Derive Key Pair
2,995,537 UART: [art] Store priv key in slot 0x5
3,009,117 UART: [art] Derive Key Pair - Done
3,023,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,039,147 UART: [art] Erasing AUTHORITY.KEYID = 7
3,039,912 UART: [art] PUB.X = 89AB9289B9EF2AE4F7465BD2152E5DD5EFBA0141117172538297038AC5B3AEF266B37F49F8CBDB671BD0EED5458140FC
3,046,688 UART: [art] PUB.Y = 56F0D5BC06921139581858B85F736909912BF14A24B88CC9B6EE9F70B8C37C9C8C2FD3B39D28045B9B6F1A6E9399893B
3,053,629 UART: [art] SIG.R = CFAB3F7A4296A8D85D2DC2EA5E5F5E53C03148DA32D32ECC21A5546E2C03C504B0E69A7FAD6D5194C715A927DC747E92
3,060,409 UART: [art] SIG.S = 14B9A2276AE935051DB6F82B479A7E42B53C947A4428F16882EA6464A91CBF010DCB67CB0145E8CD7ACEA1CFFC5748F5
3,084,129 UART: Caliptra RT
3,084,472 UART: [state] CFI Enabled
3,204,410 UART: [rt] RT listening for mailbox commands...
3,205,666 writing to cptra_bootfsm_go
4,188,236 UART:
4,188,252 UART: Running Caliptra FMC ...
4,188,660 UART:
4,188,803 UART: [state] CFI Enabled
4,190,062 UART: [art] Skip pcr extension
4,190,471 UART: [art] Extend RT PCRs Done
4,190,899 UART: [art] Lock RT PCRs Done
4,192,316 UART: [art] Populate DV Done
4,200,586 UART: [fht] FMC Alias Private Key: 7
4,201,694 UART: [art] Derive CDI
4,201,974 UART: [art] Store in slot 0x4
4,287,819 UART: [art] Derive Key Pair
4,288,179 UART: [art] Store priv key in slot 0x5
4,301,871 UART: [art] Derive Key Pair - Done
4,316,596 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,331,865 UART: [art] Erasing AUTHORITY.KEYID = 7
4,332,630 UART: [art] PUB.X = 89AB9289B9EF2AE4F7465BD2152E5DD5EFBA0141117172538297038AC5B3AEF266B37F49F8CBDB671BD0EED5458140FC
4,339,406 UART: [art] PUB.Y = 56F0D5BC06921139581858B85F736909912BF14A24B88CC9B6EE9F70B8C37C9C8C2FD3B39D28045B9B6F1A6E9399893B
4,346,347 UART: [art] SIG.R = CFAB3F7A4296A8D85D2DC2EA5E5F5E53C03148DA32D32ECC21A5546E2C03C504B0E69A7FAD6D5194C715A927DC747E92
4,353,127 UART: [art] SIG.S = 14B9A2276AE935051DB6F82B479A7E42B53C947A4428F16882EA6464A91CBF010DCB67CB0145E8CD7ACEA1CFFC5748F5
4,376,807 UART: Caliptra RT
4,377,150 UART: [state] CFI Enabled
4,744,365 UART: [rt] RT listening for mailbox commands...
test test_warm_reset::test_mbox_idle_during_warm_reset ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
191,550 UART:
191,927 UART: Running Caliptra ROM ...
193,059 UART:
193,219 UART: [state] CFI Enabled
262,368 UART: [state] LifecycleState = Production
264,185 UART: [state] DebugLocked = Yes
265,747 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,811 UART: [kat] SHA2-256
441,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,063 UART: [kat] ++
452,543 UART: [kat] sha1
464,362 UART: [kat] SHA2-256
467,085 UART: [kat] SHA2-384
472,590 UART: [kat] SHA2-512-ACC
474,958 UART: [kat] ECC-384
2,765,575 UART: [kat] HMAC-384Kdf
2,777,790 UART: [kat] LMS
3,968,112 UART: [kat] --
3,972,321 UART: [cold-reset] ++
3,974,530 UART: [fht] Storing FHT @ 0x50003400
3,987,712 UART: [idev] ++
3,988,274 UART: [idev] CDI.KEYID = 6
3,989,193 UART: [idev] SUBJECT.KEYID = 7
3,990,441 UART: [idev] UDS.KEYID = 0
3,991,487 ready_for_fw is high
3,991,697 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,096,041 UART: [idev] Erasing UDS.KEYID = 0
7,324,976 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,622 UART: [idev] --
7,350,407 UART: [ldev] ++
7,350,971 UART: [ldev] CDI.KEYID = 6
7,351,914 UART: [ldev] SUBJECT.KEYID = 5
7,353,181 UART: [ldev] AUTHORITY.KEYID = 7
7,354,334 UART: [ldev] FE.KEYID = 1
7,400,870 UART: [ldev] Erasing FE.KEYID = 1
10,731,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,638 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,039,171 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,053,811 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,068,154 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,087,162 UART: [ldev] --
13,092,708 UART: [fwproc] Waiting for Commands...
13,095,351 UART: [fwproc] Received command 0x46574c44
13,097,555 UART: [fwproc] Received Image of size 82832 bytes
16,806,237 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,885,431 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
16,958,657 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,162,011 >>> mbox cmd response: success
17,166,806 UART: [afmc] ++
17,167,412 UART: [afmc] CDI.KEYID = 6
17,168,296 UART: [afmc] SUBJECT.KEYID = 7
17,169,564 UART: [afmc] AUTHORITY.KEYID = 5
20,536,370 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,834,308 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,836,616 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
22,851,088 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
22,865,815 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
22,880,207 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
22,900,790 UART: [afmc] --
22,904,346 UART: [cold-reset] --
22,909,073 UART: [state] Locking Datavault
22,914,001 UART: [state] Locking PCR0, PCR1 and PCR31
22,915,719 UART: [state] Locking ICCM
22,916,981 UART: [exit] Launching FMC @ 0x40000130
22,925,372 UART:
22,925,605 UART: Running Caliptra FMC ...
22,926,701 UART:
22,926,856 UART: [state] CFI Enabled
22,993,225 UART: [fht] FMC Alias Private Key: 7
25,333,961 UART: [art] Extend RT PCRs Done
25,335,181 UART: [art] Lock RT PCRs Done
25,336,853 UART: [art] Populate DV Done
25,342,372 UART: [fht] FMC Alias Private Key: 7
25,343,919 UART: [art] Derive CDI
25,344,735 UART: [art] Store in slot 0x4
25,401,316 UART: [art] Derive Key Pair
25,402,349 UART: [art] Store priv key in slot 0x5
28,694,754 UART: [art] Derive Key Pair - Done
28,707,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
30,996,341 UART: [art] Erasing AUTHORITY.KEYID = 7
30,997,859 UART: [art] PUB.X = 2F1C574D41A054DED9AC4D49481EE0C36921499997D25CD56E3F51B0C2B38967AB09DEEB0C7EE78378B58F779C000859
31,005,107 UART: [art] PUB.Y = 5FAD73B82797234186F89D9F2AF5502B194EA3876720839969D16848D9BCC514C7C14A33142DAD58257A45F907B5EE1C
31,012,341 UART: [art] SIG.R = 50681A2992471377C251059F12154024E9BFA278E1E2513090FD09AD8B6D0BFA58223DDB5E2D417AEBACF8582CC001BD
31,019,727 UART: [art] SIG.S = BEBBA2EF532D789C4F8FB2B0FD747C77A205C6087AA259C13B8DA11FF75C16F3AF8676FFDA07B3C92CCCA6D34687FCAE
32,324,933 UART: mbox::rt_entry...
32,325,897 UART: ____ _ _ _ ____ _____
32,327,883 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,329,886 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,331,815 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,333,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,335,596 UART: |_|
32,336,484 UART:
32,466,465 UART: [rt] Runtime listening for mailbox commands...
32,468,490 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,469,574 >>> mbox cmd response data (0 bytes)
290 writing to cptra_bootfsm_go
605 UART:
753 UART: Running Caliptra ROM ...
1,756 UART:
1,900 UART: [state] CFI Enabled
60,687 UART: [state] LifecycleState = Production
62,511 UART: [state] DebugLocked = Yes
65,253 UART: [state] Starting the Watchdog Timer 40000000 cycles
71,431 UART: [kat] SHA2-256
241,158 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
251,650 UART: [kat] ++
252,094 UART: [kat] sha1
263,268 UART: [kat] SHA2-256
265,953 UART: [kat] SHA2-384
271,876 UART: [kat] SHA2-512-ACC
274,221 UART: [kat] ECC-384
2,563,852 UART: [kat] HMAC-384Kdf
2,594,980 UART: [kat] LMS
3,785,333 UART: [kat] --
3,791,717 UART: [warm-reset] ++
3,796,941 UART: [warm-reset] --
3,800,128 UART: [state] Locking Datavault
3,803,751 UART: [state] Locking PCR0, PCR1 and PCR31
3,805,511 UART: [state] Locking ICCM
3,806,826 UART: [exit] Launching FMC @ 0x40000130
3,815,224 UART:
3,815,458 UART: Running Caliptra FMC ...
3,816,485 UART:
3,816,654 UART: [state] CFI Enabled
3,865,725 UART: [art] Skip pcr extension
3,866,830 UART: [art] Extend RT PCRs Done
3,867,893 UART: [art] Lock RT PCRs Done
3,869,284 UART: [art] Populate DV Done
3,874,802 UART: [fht] FMC Alias Private Key: 7
3,876,551 UART: [art] Derive CDI
3,877,293 UART: [art] Store in slot 0x4
3,934,442 UART: [art] Derive Key Pair
3,935,484 UART: [art] Store priv key in slot 0x5
7,228,122 UART: [art] Derive Key Pair - Done
7,241,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,528,943 UART: [art] Erasing AUTHORITY.KEYID = 7
9,530,448 UART: [art] PUB.X = 2F1C574D41A054DED9AC4D49481EE0C36921499997D25CD56E3F51B0C2B38967AB09DEEB0C7EE78378B58F779C000859
9,537,704 UART: [art] PUB.Y = 5FAD73B82797234186F89D9F2AF5502B194EA3876720839969D16848D9BCC514C7C14A33142DAD58257A45F907B5EE1C
9,544,957 UART: [art] SIG.R = 50681A2992471377C251059F12154024E9BFA278E1E2513090FD09AD8B6D0BFA58223DDB5E2D417AEBACF8582CC001BD
9,552,380 UART: [art] SIG.S = BEBBA2EF532D789C4F8FB2B0FD747C77A205C6087AA259C13B8DA11FF75C16F3AF8676FFDA07B3C92CCCA6D34687FCAE
10,857,089 UART: mbox::rt_entry...
10,858,047 UART: ____ _ _ _ ____ _____
10,860,033 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,862,040 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,863,984 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,865,911 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,867,838 UART: |_|
10,868,816 UART:
14,544,592 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,770,613 ready_for_fw is high
3,771,031 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,254,295 >>> mbox cmd response: success
22,951,805 UART:
22,952,192 UART: Running Caliptra FMC ...
22,953,317 UART:
22,953,472 UART: [state] CFI Enabled
23,024,015 UART: [fht] FMC Alias Private Key: 7
25,364,392 UART: [art] Extend RT PCRs Done
25,365,611 UART: [art] Lock RT PCRs Done
25,367,369 UART: [art] Populate DV Done
25,372,569 UART: [fht] FMC Alias Private Key: 7
25,374,004 UART: [art] Derive CDI
25,374,742 UART: [art] Store in slot 0x4
25,432,354 UART: [art] Derive Key Pair
25,433,395 UART: [art] Store priv key in slot 0x5
28,726,232 UART: [art] Derive Key Pair - Done
28,739,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,027,869 UART: [art] Erasing AUTHORITY.KEYID = 7
31,029,378 UART: [art] PUB.X = CD1EEA7AA8B41C4875F30387BA08DEB2145CDE877C67405E9493568A10F7F231D0D177A697628F168DAAC066E229E5B0
31,036,634 UART: [art] PUB.Y = 47361247F215645EFC9504EC3139795511B46672144288C64060444BD7306A0BC60F28364CF4D12FFA13EC7AD7D71D8C
31,043,897 UART: [art] SIG.R = 80903DE0F630BCDF267EE1B2846AD707D8CBA40D0B308C52A2CFA18EFF7B4E2C51706839C6CAA9977958041BC7B6DB4D
31,051,302 UART: [art] SIG.S = 9D8C81883BB538C23D84A0697A6CF390B4980A72C5A3CDB13AA82E6AD5CEB580378E6796B1D786141264ACE4C9659953
32,356,315 UART: mbox::rt_entry...
32,357,281 UART: ____ _ _ _ ____ _____
32,359,497 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,361,526 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,363,415 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,365,386 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,367,266 UART: |_|
32,368,097 UART:
32,499,046 UART: [rt] Runtime listening for mailbox commands...
32,501,061 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,502,210 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
3,609,252 UART:
3,609,585 UART: Running Caliptra FMC ...
3,610,635 UART:
3,610,790 UART: [state] CFI Enabled
3,673,404 UART: [art] Skip pcr extension
3,674,563 UART: [art] Extend RT PCRs Done
3,675,637 UART: [art] Lock RT PCRs Done
3,677,086 UART: [art] Populate DV Done
3,682,609 UART: [fht] FMC Alias Private Key: 7
3,684,153 UART: [art] Derive CDI
3,684,889 UART: [art] Store in slot 0x4
3,742,365 UART: [art] Derive Key Pair
3,743,406 UART: [art] Store priv key in slot 0x5
7,035,661 UART: [art] Derive Key Pair - Done
7,048,714 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,336,680 UART: [art] Erasing AUTHORITY.KEYID = 7
9,338,190 UART: [art] PUB.X = CD1EEA7AA8B41C4875F30387BA08DEB2145CDE877C67405E9493568A10F7F231D0D177A697628F168DAAC066E229E5B0
9,345,461 UART: [art] PUB.Y = 47361247F215645EFC9504EC3139795511B46672144288C64060444BD7306A0BC60F28364CF4D12FFA13EC7AD7D71D8C
9,352,714 UART: [art] SIG.R = 80903DE0F630BCDF267EE1B2846AD707D8CBA40D0B308C52A2CFA18EFF7B4E2C51706839C6CAA9977958041BC7B6DB4D
9,360,116 UART: [art] SIG.S = 9D8C81883BB538C23D84A0697A6CF390B4980A72C5A3CDB13AA82E6AD5CEB580378E6796B1D786141264ACE4C9659953
10,664,993 UART: mbox::rt_entry...
10,665,950 UART: ____ _ _ _ ____ _____
10,667,912 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
10,669,923 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
10,671,779 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
10,673,704 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
10,675,632 UART: |_|
10,676,437 UART:
14,373,817 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.46s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,023 UART:
192,398 UART: Running Caliptra ROM ...
193,516 UART:
603,037 UART: [state] CFI Enabled
615,707 UART: [state] LifecycleState = Production
617,508 UART: [state] DebugLocked = Yes
620,426 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,079 UART: [kat] SHA2-256
795,879 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,398 UART: [kat] ++
806,965 UART: [kat] sha1
818,696 UART: [kat] SHA2-256
821,347 UART: [kat] SHA2-384
825,553 UART: [kat] SHA2-512-ACC
827,911 UART: [kat] ECC-384
3,109,970 UART: [kat] HMAC-384Kdf
3,122,136 UART: [kat] LMS
4,312,273 UART: [kat] --
4,316,550 UART: [cold-reset] ++
4,317,910 UART: [fht] Storing FHT @ 0x50003400
4,330,308 UART: [idev] ++
4,330,865 UART: [idev] CDI.KEYID = 6
4,331,887 UART: [idev] SUBJECT.KEYID = 7
4,333,053 UART: [idev] UDS.KEYID = 0
4,334,097 ready_for_fw is high
4,334,324 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
4,438,574 UART: [idev] Erasing UDS.KEYID = 0
7,619,819 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,271 UART: [idev] --
7,644,803 UART: [ldev] ++
7,645,367 UART: [ldev] CDI.KEYID = 6
7,646,332 UART: [ldev] SUBJECT.KEYID = 5
7,647,538 UART: [ldev] AUTHORITY.KEYID = 7
7,648,818 UART: [ldev] FE.KEYID = 1
7,660,310 UART: [ldev] Erasing FE.KEYID = 1
10,945,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,830 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,255,355 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,270,021 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,284,403 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,304,423 UART: [ldev] --
13,309,429 UART: [fwproc] Waiting for Commands...
13,311,520 UART: [fwproc] Received command 0x46574c44
13,313,755 UART: [fwproc] Received Image of size 82832 bytes
17,012,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,092,389 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,165,615 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
17,369,059 >>> mbox cmd response: success
17,372,691 UART: [afmc] ++
17,373,331 UART: [afmc] CDI.KEYID = 6
17,374,236 UART: [afmc] SUBJECT.KEYID = 7
17,375,438 UART: [afmc] AUTHORITY.KEYID = 5
20,691,092 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
22,983,995 UART: [afmc] Erasing AUTHORITY.KEYID = 5
22,986,300 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,000,763 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,015,537 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,030,002 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,050,422 UART: [afmc] --
23,053,849 UART: [cold-reset] --
23,058,673 UART: [state] Locking Datavault
23,065,803 UART: [state] Locking PCR0, PCR1 and PCR31
23,067,555 UART: [state] Locking ICCM
23,069,031 UART: [exit] Launching FMC @ 0x40000130
23,077,423 UART:
23,077,653 UART: Running Caliptra FMC ...
23,078,674 UART:
23,078,818 UART: [state] CFI Enabled
23,086,858 UART: [fht] FMC Alias Private Key: 7
25,426,309 UART: [art] Extend RT PCRs Done
25,427,520 UART: [art] Lock RT PCRs Done
25,429,357 UART: [art] Populate DV Done
25,434,544 UART: [fht] FMC Alias Private Key: 7
25,436,159 UART: [art] Derive CDI
25,436,895 UART: [art] Store in slot 0x4
25,479,430 UART: [art] Derive Key Pair
25,480,427 UART: [art] Store priv key in slot 0x5
28,722,474 UART: [art] Derive Key Pair - Done
28,735,417 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,015,810 UART: [art] Erasing AUTHORITY.KEYID = 7
31,017,456 UART: [art] PUB.X = 74A71DD35B664B1A260DC228FF292A8418E5635C8FECE441E1401C1B0B6BBE1F6FDE4FB23D4E16D109135AE4E78C7CA8
31,024,538 UART: [art] PUB.Y = 7F4C10D00E01D8FA2E90747B706AD548BC2FB966C19C12824BC5F224F1AA676016403A3F09635FBA921C520734327D52
31,031,810 UART: [art] SIG.R = DC9F320C5864A68FD5F91DA5BA11269D73BC4C5E4CA055800E1F10D164573FD20D4BE3A909F5886E82FA15C6F632D389
31,039,200 UART: [art] SIG.S = 874DA802CDFB92155D2508F764B13B9A90779641EE0B5F81F0E9CF5B80BDC21B2438E2EE7C37BAF1B3F62838BBA2B963
32,344,688 UART: mbox::rt_entry...
32,345,651 UART: ____ _ _ _ ____ _____
32,347,571 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,349,570 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,351,494 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,353,432 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,355,365 UART: |_|
32,356,173 UART:
32,488,270 UART: [rt] Runtime listening for mailbox commands...
32,490,280 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,491,619 >>> mbox cmd response data (0 bytes)
298 writing to cptra_bootfsm_go
610 UART:
756 UART: Running Caliptra ROM ...
1,836 UART:
8,038,102 UART: [state] CFI Enabled
8,051,761 UART: [state] LifecycleState = Production
8,053,607 UART: [state] DebugLocked = Yes
8,056,226 UART: [state] Starting the Watchdog Timer 40000000 cycles
8,061,241 UART: [kat] SHA2-256
8,231,022 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,241,510 UART: [kat] ++
8,241,992 UART: [kat] sha1
8,252,063 UART: [kat] SHA2-256
8,254,759 UART: [kat] SHA2-384
8,260,903 UART: [kat] SHA2-512-ACC
8,263,247 UART: [kat] ECC-384
10,545,135 UART: [kat] HMAC-384Kdf
10,557,731 UART: [kat] LMS
11,747,840 UART: [kat] --
11,749,943 UART: [warm-reset] ++
11,754,521 UART: [warm-reset] --
11,759,147 UART: [state] Locking Datavault
11,762,882 UART: [state] Locking PCR0, PCR1 and PCR31
11,764,628 UART: [state] Locking ICCM
11,767,312 UART: [exit] Launching FMC @ 0x40000130
11,775,703 UART:
11,775,959 UART: Running Caliptra FMC ...
11,777,058 UART:
11,777,217 UART: [state] CFI Enabled
11,779,264 UART: [art] Skip pcr extension
11,780,358 UART: [art] Extend RT PCRs Done
11,781,487 UART: [art] Lock RT PCRs Done
11,782,765 UART: [art] Populate DV Done
11,788,272 UART: [fht] FMC Alias Private Key: 7
11,790,031 UART: [art] Derive CDI
11,790,777 UART: [art] Store in slot 0x4
11,833,212 UART: [art] Derive Key Pair
11,834,248 UART: [art] Store priv key in slot 0x5
15,076,394 UART: [art] Derive Key Pair - Done
15,089,230 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,369,643 UART: [art] Erasing AUTHORITY.KEYID = 7
17,371,151 UART: [art] PUB.X = 74A71DD35B664B1A260DC228FF292A8418E5635C8FECE441E1401C1B0B6BBE1F6FDE4FB23D4E16D109135AE4E78C7CA8
17,378,417 UART: [art] PUB.Y = 7F4C10D00E01D8FA2E90747B706AD548BC2FB966C19C12824BC5F224F1AA676016403A3F09635FBA921C520734327D52
17,385,649 UART: [art] SIG.R = DC9F320C5864A68FD5F91DA5BA11269D73BC4C5E4CA055800E1F10D164573FD20D4BE3A909F5886E82FA15C6F632D389
17,393,030 UART: [art] SIG.S = 874DA802CDFB92155D2508F764B13B9A90779641EE0B5F81F0E9CF5B80BDC21B2438E2EE7C37BAF1B3F62838BBA2B963
18,697,365 UART: mbox::rt_entry...
18,698,330 UART: ____ _ _ _ ____ _____
18,700,311 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,702,304 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,704,225 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,706,144 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,708,064 UART: |_|
18,708,897 UART:
22,322,562 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,130,808 ready_for_fw is high
4,131,379 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
17,479,794 >>> mbox cmd response: success
23,114,076 UART:
23,114,469 UART: Running Caliptra FMC ...
23,115,642 UART:
23,115,798 UART: [state] CFI Enabled
23,123,615 UART: [fht] FMC Alias Private Key: 7
25,463,110 UART: [art] Extend RT PCRs Done
25,464,331 UART: [art] Lock RT PCRs Done
25,466,094 UART: [art] Populate DV Done
25,471,464 UART: [fht] FMC Alias Private Key: 7
25,473,168 UART: [art] Derive CDI
25,473,980 UART: [art] Store in slot 0x4
25,516,628 UART: [art] Derive Key Pair
25,517,623 UART: [art] Store priv key in slot 0x5
28,759,847 UART: [art] Derive Key Pair - Done
28,773,014 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,053,493 UART: [art] Erasing AUTHORITY.KEYID = 7
31,055,006 UART: [art] PUB.X = 0352363DB8F964F3F224361F309CB2066713506A1021B9AAC9667A1F27A6E39201F3024D4A59CDE56FAD8BF17FDC9AD1
31,062,297 UART: [art] PUB.Y = D29F5057D935F05AC71546610D8631C406893D6283C791C7B63F9599CBCCF82C6F2F8CE2F9017BE928D83D37CA9D3774
31,069,537 UART: [art] SIG.R = 92880A5B6F0B516023974AD318A768A10A833899366D74BB69F855470B380457D37A1937B5190F4CF0386560F986BA17
31,076,882 UART: [art] SIG.S = 45A957448B1D111815ABBDF3F8DD976A02C0D69DE647B26324B00C26C7239AB83A20E4888E77EC287BE5DF6E97EF0DB1
32,381,630 UART: mbox::rt_entry...
32,382,599 UART: ____ _ _ _ ____ _____
32,384,584 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
32,386,588 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
32,388,510 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
32,390,463 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
32,392,388 UART: |_|
32,393,192 UART:
32,523,409 UART: [rt] Runtime listening for mailbox commands...
32,525,437 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
32,526,809 >>> mbox cmd response data (0 bytes)
294 writing to cptra_bootfsm_go
11,532,939 UART:
11,533,302 UART: Running Caliptra FMC ...
11,534,366 UART:
11,534,519 UART: [state] CFI Enabled
11,536,586 UART: [art] Skip pcr extension
11,537,688 UART: [art] Extend RT PCRs Done
11,538,817 UART: [art] Lock RT PCRs Done
11,540,036 UART: [art] Populate DV Done
11,545,764 UART: [fht] FMC Alias Private Key: 7
11,547,454 UART: [art] Derive CDI
11,548,260 UART: [art] Store in slot 0x4
11,591,025 UART: [art] Derive Key Pair
11,592,071 UART: [art] Store priv key in slot 0x5
14,834,348 UART: [art] Derive Key Pair - Done
14,847,457 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
17,127,829 UART: [art] Erasing AUTHORITY.KEYID = 7
17,129,338 UART: [art] PUB.X = 0352363DB8F964F3F224361F309CB2066713506A1021B9AAC9667A1F27A6E39201F3024D4A59CDE56FAD8BF17FDC9AD1
17,136,586 UART: [art] PUB.Y = D29F5057D935F05AC71546610D8631C406893D6283C791C7B63F9599CBCCF82C6F2F8CE2F9017BE928D83D37CA9D3774
17,143,830 UART: [art] SIG.R = 92880A5B6F0B516023974AD318A768A10A833899366D74BB69F855470B380457D37A1937B5190F4CF0386560F986BA17
17,151,168 UART: [art] SIG.S = 45A957448B1D111815ABBDF3F8DD976A02C0D69DE647B26324B00C26C7239AB83A20E4888E77EC287BE5DF6E97EF0DB1
18,456,066 UART: mbox::rt_entry...
18,457,038 UART: ____ _ _ _ ____ _____
18,459,056 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
18,461,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
18,462,993 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
18,464,918 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
18,466,837 UART: |_|
18,467,641 UART:
22,084,449 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
191,543 UART:
191,904 UART: Running Caliptra ROM ...
193,083 UART:
193,241 UART: [state] CFI Enabled
264,031 UART: [state] LifecycleState = Production
265,907 UART: [state] DebugLocked = Yes
268,756 UART: [state] Starting the WD Timer 40000000 cycles
273,425 UART: [kat] SHA2-256
453,113 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,897 UART: [kat] ++
464,345 UART: [kat] sha1
474,698 UART: [kat] SHA2-256
477,424 UART: [kat] SHA2-384
482,556 UART: [kat] SHA2-512-ACC
484,925 UART: [kat] ECC-384
2,948,840 UART: [kat] HMAC-384Kdf
2,971,200 UART: [kat] LMS
3,447,687 UART: [kat] --
3,452,038 UART: [cold-reset] ++
3,454,329 UART: [fht] FHT @ 0x50003400
3,466,223 UART: [idev] ++
3,466,793 UART: [idev] CDI.KEYID = 6
3,467,711 UART: [idev] SUBJECT.KEYID = 7
3,468,951 UART: [idev] UDS.KEYID = 0
3,469,992 ready_for_fw is high
3,470,210 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,574,687 UART: [idev] Erasing UDS.KEYID = 0
5,986,974 UART: [idev] Sha1 KeyId Algorithm
6,011,518 UART: [idev] --
6,015,836 UART: [ldev] ++
6,016,405 UART: [ldev] CDI.KEYID = 6
6,017,341 UART: [ldev] SUBJECT.KEYID = 5
6,018,551 UART: [ldev] AUTHORITY.KEYID = 7
6,019,835 UART: [ldev] FE.KEYID = 1
6,058,656 UART: [ldev] Erasing FE.KEYID = 1
8,567,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,563 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,390 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,333,255 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,349,000 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,369,265 UART: [ldev] --
10,375,093 UART: [fwproc] Wait for Commands...
10,377,301 UART: [fwproc] Recv command 0x46574c44
10,379,300 UART: [fwproc] Recv'd Img size: 82832 bytes
13,449,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,530,095 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,603,116 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
13,806,851 >>> mbox cmd response: success
13,810,076 UART: [afmc] ++
13,810,694 UART: [afmc] CDI.KEYID = 6
13,811,605 UART: [afmc] SUBJECT.KEYID = 7
13,812,816 UART: [afmc] AUTHORITY.KEYID = 5
16,342,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,066,303 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,068,488 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,084,388 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,100,440 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,115,993 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,140,821 UART: [afmc] --
18,144,484 UART: [cold-reset] --
18,149,971 UART: [state] Locking Datavault
18,155,540 UART: [state] Locking PCR0, PCR1 and PCR31
18,157,286 UART: [state] Locking ICCM
18,158,729 UART: [exit] Launching FMC @ 0x40000130
18,167,173 UART:
18,167,405 UART: Running Caliptra FMC ...
18,168,496 UART:
18,168,656 UART: [state] CFI Enabled
18,224,103 UART: [fht] FMC Alias Private Key: 7
19,990,252 UART: [art] Extend RT PCRs Done
19,991,469 UART: [art] Lock RT PCRs Done
19,993,195 UART: [art] Populate DV Done
19,998,603 UART: [fht] FMC Alias Private Key: 7
20,000,189 UART: [art] Derive CDI
20,000,997 UART: [art] Store in slot 0x4
20,056,163 UART: [art] Derive Key Pair
20,057,206 UART: [art] Store priv key in slot 0x5
22,520,181 UART: [art] Derive Key Pair - Done
22,533,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,245,463 UART: [art] Erasing AUTHORITY.KEYID = 7
24,246,965 UART: [art] PUB.X = FA202C9A07991A31CDEEFBF900CA18B00AF043ED679179E6C1C18FBD6F4CD6DD58400BEFC1662E674AAF8354E59AFC01
24,254,215 UART: [art] PUB.Y = 7A2FC0BFDBC9E748B470796C7B5C6C4A5297589DBC9238A939519EEEFBFA4EE5C490EE002AAC8D00AB7F2D77ADF0954F
24,261,502 UART: [art] SIG.R = 2690AA8822C204B5ECF809E7DAA7C6F190F15605CC18F2B0D812CDBE6D7672901861E3C554709C35FA6493E6807B983F
24,268,898 UART: [art] SIG.S = 9EDABDC43CD1DB717CF38B5C448860A9253D073821C931CF9B4CB8CBD6DC6BABBD025C1DEEFC16288DD3512874D2C6EA
25,247,171 UART: mbox::rt_entry...
25,248,125 UART: ____ _ _ _ ____ _____
25,250,052 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,252,054 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,253,909 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,255,832 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,257,710 UART: |_|
25,258,609 UART:
25,389,177 UART: [rt] Runtime listening for mailbox commands...
25,391,203 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,392,404 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
536 UART:
674 UART: Running Caliptra ROM ...
1,775 UART:
1,927 UART: [state] CFI Enabled
60,327 UART: [state] LifecycleState = Production
62,154 UART: [state] DebugLocked = Yes
64,731 UART: [state] Starting the WD Timer 40000000 cycles
69,618 UART: [kat] SHA2-256
249,321 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
260,105 UART: [kat] ++
260,548 UART: [kat] sha1
270,848 UART: [kat] SHA2-256
273,525 UART: [kat] SHA2-384
280,039 UART: [kat] SHA2-512-ACC
282,428 UART: [kat] ECC-384
2,727,674 UART: [kat] HMAC-384Kdf
2,750,327 UART: [kat] LMS
3,226,782 UART: [kat] --
3,229,801 UART: [warm-reset] ++
3,233,781 UART: [warm-reset] --
3,239,052 UART: [state] Locking Datavault
3,241,980 UART: [state] Locking PCR0, PCR1 and PCR31
3,243,729 UART: [state] Locking ICCM
3,245,928 UART: [exit] Launching FMC @ 0x40000130
3,254,322 UART:
3,254,565 UART: Running Caliptra FMC ...
3,255,667 UART:
3,255,842 UART: [state] CFI Enabled
3,316,376 UART: [art] Skip pcr extension
3,317,598 UART: [art] Extend RT PCRs Done
3,318,696 UART: [art] Lock RT PCRs Done
3,320,089 UART: [art] Populate DV Done
3,325,602 UART: [fht] FMC Alias Private Key: 7
3,327,240 UART: [art] Derive CDI
3,328,049 UART: [art] Store in slot 0x4
3,385,037 UART: [art] Derive Key Pair
3,386,351 UART: [art] Store priv key in slot 0x5
5,848,657 UART: [art] Derive Key Pair - Done
5,861,883 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,574,881 UART: [art] Erasing AUTHORITY.KEYID = 7
7,576,395 UART: [art] PUB.X = FA202C9A07991A31CDEEFBF900CA18B00AF043ED679179E6C1C18FBD6F4CD6DD58400BEFC1662E674AAF8354E59AFC01
7,583,649 UART: [art] PUB.Y = 7A2FC0BFDBC9E748B470796C7B5C6C4A5297589DBC9238A939519EEEFBFA4EE5C490EE002AAC8D00AB7F2D77ADF0954F
7,590,934 UART: [art] SIG.R = 2690AA8822C204B5ECF809E7DAA7C6F190F15605CC18F2B0D812CDBE6D7672901861E3C554709C35FA6493E6807B983F
7,598,351 UART: [art] SIG.S = 9EDABDC43CD1DB717CF38B5C448860A9253D073821C931CF9B4CB8CBD6DC6BABBD025C1DEEFC16288DD3512874D2C6EA
8,576,119 UART: mbox::rt_entry...
8,577,061 UART: ____ _ _ _ ____ _____
8,579,047 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,581,063 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,583,048 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,584,984 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,586,859 UART: |_|
8,587,662 UART:
11,437,452 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,459,467 ready_for_fw is high
3,459,874 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,703,049 >>> mbox cmd response: success
18,004,139 UART:
18,004,547 UART: Running Caliptra FMC ...
18,005,762 UART:
18,005,931 UART: [state] CFI Enabled
18,070,254 UART: [fht] FMC Alias Private Key: 7
19,835,786 UART: [art] Extend RT PCRs Done
19,836,991 UART: [art] Lock RT PCRs Done
19,838,082 UART: [art] Populate DV Done
19,843,503 UART: [fht] FMC Alias Private Key: 7
19,845,042 UART: [art] Derive CDI
19,845,857 UART: [art] Store in slot 0x4
19,902,593 UART: [art] Derive Key Pair
19,903,679 UART: [art] Store priv key in slot 0x5
22,366,505 UART: [art] Derive Key Pair - Done
22,379,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,092,492 UART: [art] Erasing AUTHORITY.KEYID = 7
24,094,008 UART: [art] PUB.X = E04EB044CB2B61E6CC7BE928E4A3F77A6579275EC4E33EDA49CC8F21FC675BEA1111DB5C6C0D7DE5DE367A4EDC997930
24,101,298 UART: [art] PUB.Y = E15D99C42472C8F15C05F07F46A9A9CD6AE2CF8DD31EFE3308EFCB9E07E06F15DBCB371C7EED93D10C4B09EA3CBF94FF
24,108,580 UART: [art] SIG.R = 017E88D31ED719E2BBEA98055F05B0896F65628292DF26F1D8B6E3A53226E2DE502DA3324B5968DE69CE404C9D350898
24,115,956 UART: [art] SIG.S = 805497C0255E38C0D18586A9DCA4F9BED508EDF60DFD47068FE2AEDE39CBDF4FBA586518B5097CCAD9CC701C939D3BD0
25,094,233 UART: mbox::rt_entry...
25,095,189 UART: ____ _ _ _ ____ _____
25,097,172 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,099,173 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,101,101 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,103,058 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,104,990 UART: |_|
25,105,795 UART:
25,236,979 UART: [rt] Runtime listening for mailbox commands...
25,238,996 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,240,150 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
3,272,232 UART:
3,272,581 UART: Running Caliptra FMC ...
3,273,627 UART:
3,273,777 UART: [state] CFI Enabled
3,317,983 UART: [art] Skip pcr extension
3,319,140 UART: [art] Extend RT PCRs Done
3,320,209 UART: [art] Lock RT PCRs Done
3,321,711 UART: [art] Populate DV Done
3,327,015 UART: [fht] FMC Alias Private Key: 7
3,328,602 UART: [art] Derive CDI
3,329,347 UART: [art] Store in slot 0x4
3,386,605 UART: [art] Derive Key Pair
3,387,665 UART: [art] Store priv key in slot 0x5
5,850,791 UART: [art] Derive Key Pair - Done
5,863,677 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,575,997 UART: [art] Erasing AUTHORITY.KEYID = 7
7,577,507 UART: [art] PUB.X = E04EB044CB2B61E6CC7BE928E4A3F77A6579275EC4E33EDA49CC8F21FC675BEA1111DB5C6C0D7DE5DE367A4EDC997930
7,584,761 UART: [art] PUB.Y = E15D99C42472C8F15C05F07F46A9A9CD6AE2CF8DD31EFE3308EFCB9E07E06F15DBCB371C7EED93D10C4B09EA3CBF94FF
7,592,108 UART: [art] SIG.R = 017E88D31ED719E2BBEA98055F05B0896F65628292DF26F1D8B6E3A53226E2DE502DA3324B5968DE69CE404C9D350898
7,599,440 UART: [art] SIG.S = 805497C0255E38C0D18586A9DCA4F9BED508EDF60DFD47068FE2AEDE39CBDF4FBA586518B5097CCAD9CC701C939D3BD0
8,578,033 UART: mbox::rt_entry...
8,578,986 UART: ____ _ _ _ ____ _____
8,580,944 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,582,950 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,584,803 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,586,727 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,588,576 UART: |_|
8,589,399 UART:
11,439,338 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,211 writing to cptra_bootfsm_go
191,808 UART:
192,260 UART: Running Caliptra ROM ...
193,395 UART:
603,197 UART: [state] CFI Enabled
621,003 UART: [state] LifecycleState = Production
622,814 UART: [state] DebugLocked = Yes
624,238 UART: [state] Starting the WD Timer 40000000 cycles
629,138 UART: [kat] SHA2-256
808,807 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,577 UART: [kat] ++
820,075 UART: [kat] sha1
829,989 UART: [kat] SHA2-256
832,653 UART: [kat] SHA2-384
837,440 UART: [kat] SHA2-512-ACC
839,814 UART: [kat] ECC-384
3,281,935 UART: [kat] HMAC-384Kdf
3,294,102 UART: [kat] LMS
3,770,620 UART: [kat] --
3,776,048 UART: [cold-reset] ++
3,776,988 UART: [fht] FHT @ 0x50003400
3,789,672 UART: [idev] ++
3,790,247 UART: [idev] CDI.KEYID = 6
3,791,159 UART: [idev] SUBJECT.KEYID = 7
3,792,408 UART: [idev] UDS.KEYID = 0
3,793,337 ready_for_fw is high
3,793,547 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,897,666 UART: [idev] Erasing UDS.KEYID = 0
6,269,835 UART: [idev] Sha1 KeyId Algorithm
6,293,142 UART: [idev] --
6,299,089 UART: [ldev] ++
6,299,671 UART: [ldev] CDI.KEYID = 6
6,300,582 UART: [ldev] SUBJECT.KEYID = 5
6,301,799 UART: [ldev] AUTHORITY.KEYID = 7
6,303,087 UART: [ldev] FE.KEYID = 1
6,315,418 UART: [ldev] Erasing FE.KEYID = 1
8,796,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,602 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,533,373 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,549,254 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,565,009 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,587,615 UART: [ldev] --
10,593,697 UART: [fwproc] Wait for Commands...
10,595,633 UART: [fwproc] Recv command 0x46574c44
10,597,672 UART: [fwproc] Recv'd Img size: 82832 bytes
13,670,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,750,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,823,579 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,027,698 >>> mbox cmd response: success
14,031,913 UART: [afmc] ++
14,032,525 UART: [afmc] CDI.KEYID = 6
14,033,458 UART: [afmc] SUBJECT.KEYID = 7
14,034,681 UART: [afmc] AUTHORITY.KEYID = 5
16,536,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,258,133 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,260,359 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,276,228 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,292,258 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,307,881 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,331,152 UART: [afmc] --
18,334,019 UART: [cold-reset] --
18,338,212 UART: [state] Locking Datavault
18,343,299 UART: [state] Locking PCR0, PCR1 and PCR31
18,345,062 UART: [state] Locking ICCM
18,346,140 UART: [exit] Launching FMC @ 0x40000130
18,354,596 UART:
18,354,834 UART: Running Caliptra FMC ...
18,355,954 UART:
18,356,115 UART: [state] CFI Enabled
18,364,381 UART: [fht] FMC Alias Private Key: 7
20,130,199 UART: [art] Extend RT PCRs Done
20,131,420 UART: [art] Lock RT PCRs Done
20,133,287 UART: [art] Populate DV Done
20,138,972 UART: [fht] FMC Alias Private Key: 7
20,140,454 UART: [art] Derive CDI
20,141,218 UART: [art] Store in slot 0x4
20,184,304 UART: [art] Derive Key Pair
20,185,342 UART: [art] Store priv key in slot 0x5
22,611,722 UART: [art] Derive Key Pair - Done
22,624,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,330,929 UART: [art] Erasing AUTHORITY.KEYID = 7
24,332,430 UART: [art] PUB.X = C07035E1BF42DA94738D3F2A120280C5D71EC77024687177F742A73DA73701ECDE5727138F1CBF1D4A69675477F8A8BF
24,339,684 UART: [art] PUB.Y = 4B48990BA8E1B08E65D0C298A0A895676732D3128D38EB352B67092185CC6DC416E956BA2F778333A6E39631D18EAF8D
24,346,883 UART: [art] SIG.R = DDA2F43593AB2EE9D312F3E4673728292D7FB2823B387597C224B61C747CE9AD6098488DEFE778271FECA9BA3CA0973E
24,354,279 UART: [art] SIG.S = 486CAAE71B5A39701DC2EFF6C3853A9C6001F839E73E061237B1E89739BE9C3D15B9C40CAF939149AC9AA7D67F9FB357
25,333,062 UART: mbox::rt_entry...
25,334,030 UART: ____ _ _ _ ____ _____
25,336,017 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,338,027 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,339,959 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,341,888 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,343,820 UART: |_|
25,344,663 UART:
25,476,134 UART: [rt] Runtime listening for mailbox commands...
25,478,160 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,479,281 >>> mbox cmd response data (0 bytes)
288 writing to cptra_bootfsm_go
503 UART:
649 UART: Running Caliptra ROM ...
1,783 UART:
15,045,393 UART: [state] CFI Enabled
15,058,159 UART: [state] LifecycleState = Production
15,059,980 UART: [state] DebugLocked = Yes
15,062,546 UART: [state] Starting the WD Timer 40000000 cycles
15,068,129 UART: [kat] SHA2-256
15,247,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
15,258,590 UART: [kat] ++
15,259,126 UART: [kat] sha1
15,269,702 UART: [kat] SHA2-256
15,272,395 UART: [kat] SHA2-384
15,278,273 UART: [kat] SHA2-512-ACC
15,280,679 UART: [kat] ECC-384
17,724,169 UART: [kat] HMAC-384Kdf
17,737,798 UART: [kat] LMS
18,214,307 UART: [kat] --
18,217,737 UART: [warm-reset] ++
18,222,481 UART: [warm-reset] --
18,226,348 UART: [state] Locking Datavault
18,229,005 UART: [state] Locking PCR0, PCR1 and PCR31
18,230,766 UART: [state] Locking ICCM
18,233,407 UART: [exit] Launching FMC @ 0x40000130
18,241,754 UART:
18,241,997 UART: Running Caliptra FMC ...
18,243,102 UART:
18,243,261 UART: [state] CFI Enabled
18,245,482 UART: [art] Skip pcr extension
18,246,583 UART: [art] Extend RT PCRs Done
18,247,726 UART: [art] Lock RT PCRs Done
18,249,074 UART: [art] Populate DV Done
18,254,973 UART: [fht] FMC Alias Private Key: 7
18,256,621 UART: [art] Derive CDI
18,257,375 UART: [art] Store in slot 0x4
18,300,357 UART: [art] Derive Key Pair
18,301,909 UART: [art] Store priv key in slot 0x5
20,728,797 UART: [art] Derive Key Pair - Done
20,741,745 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,448,147 UART: [art] Erasing AUTHORITY.KEYID = 7
22,449,650 UART: [art] PUB.X = C07035E1BF42DA94738D3F2A120280C5D71EC77024687177F742A73DA73701ECDE5727138F1CBF1D4A69675477F8A8BF
22,456,968 UART: [art] PUB.Y = 4B48990BA8E1B08E65D0C298A0A895676732D3128D38EB352B67092185CC6DC416E956BA2F778333A6E39631D18EAF8D
22,464,154 UART: [art] SIG.R = DDA2F43593AB2EE9D312F3E4673728292D7FB2823B387597C224B61C747CE9AD6098488DEFE778271FECA9BA3CA0973E
22,471,554 UART: [art] SIG.S = 486CAAE71B5A39701DC2EFF6C3853A9C6001F839E73E061237B1E89739BE9C3D15B9C40CAF939149AC9AA7D67F9FB357
23,450,014 UART: mbox::rt_entry...
23,450,982 UART: ____ _ _ _ ____ _____
23,452,976 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,454,988 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,456,918 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,458,856 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,460,805 UART: |_|
23,461,646 UART:
26,259,130 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,128 writing to cptra_bootfsm_go
3,774,011 ready_for_fw is high
3,774,650 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
13,891,590 >>> mbox cmd response: success
18,148,674 UART:
18,149,073 UART: Running Caliptra FMC ...
18,150,186 UART:
18,150,347 UART: [state] CFI Enabled
18,158,362 UART: [fht] FMC Alias Private Key: 7
19,924,538 UART: [art] Extend RT PCRs Done
19,925,765 UART: [art] Lock RT PCRs Done
19,927,527 UART: [art] Populate DV Done
19,933,003 UART: [fht] FMC Alias Private Key: 7
19,934,712 UART: [art] Derive CDI
19,935,450 UART: [art] Store in slot 0x4
19,978,270 UART: [art] Derive Key Pair
19,979,306 UART: [art] Store priv key in slot 0x5
22,405,819 UART: [art] Derive Key Pair - Done
22,419,255 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,125,314 UART: [art] Erasing AUTHORITY.KEYID = 7
24,126,822 UART: [art] PUB.X = 8249257B8193B42A96E0596DF9CDB149ABD6C5F0275701DB374338696ED528B5B8CD978892D6AA1633B5DEF6C2E9F04D
24,134,095 UART: [art] PUB.Y = 179C4112ABCA5D0BA4BD786D4B599692239C8DB5E358000DC47E6B5E595C9D6EBBD351330C035D0CDF06F19093E45DFA
24,141,336 UART: [art] SIG.R = 86158A475D3994CF2F405A24F89B9FE98CC1F546CDD0798C8754A9E01E9C75B30437AA7EA52FBFB58BF7F8F93D635552
24,148,744 UART: [art] SIG.S = B42390484F37CE140249AB28E7076A1E7548FFB2EC89BB6AF677D51CF893AFE7E97F6DD52ED699A6179F53C93A39471C
25,127,066 UART: mbox::rt_entry...
25,128,035 UART: ____ _ _ _ ____ _____
25,130,025 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,132,042 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,133,984 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,135,951 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,137,806 UART: |_|
25,138,609 UART:
25,269,469 UART: [rt] Runtime listening for mailbox commands...
25,271,497 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,272,659 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
18,436,889 UART:
18,437,312 UART: Running Caliptra FMC ...
18,438,361 UART:
18,438,521 UART: [state] CFI Enabled
18,440,443 UART: [art] Skip pcr extension
18,441,561 UART: [art] Extend RT PCRs Done
18,442,707 UART: [art] Lock RT PCRs Done
18,443,996 UART: [art] Populate DV Done
18,449,312 UART: [fht] FMC Alias Private Key: 7
18,450,848 UART: [art] Derive CDI
18,451,676 UART: [art] Store in slot 0x4
18,494,603 UART: [art] Derive Key Pair
18,495,611 UART: [art] Store priv key in slot 0x5
20,922,041 UART: [art] Derive Key Pair - Done
20,935,270 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,641,615 UART: [art] Erasing AUTHORITY.KEYID = 7
22,643,115 UART: [art] PUB.X = 8249257B8193B42A96E0596DF9CDB149ABD6C5F0275701DB374338696ED528B5B8CD978892D6AA1633B5DEF6C2E9F04D
22,650,371 UART: [art] PUB.Y = 179C4112ABCA5D0BA4BD786D4B599692239C8DB5E358000DC47E6B5E595C9D6EBBD351330C035D0CDF06F19093E45DFA
22,657,619 UART: [art] SIG.R = 86158A475D3994CF2F405A24F89B9FE98CC1F546CDD0798C8754A9E01E9C75B30437AA7EA52FBFB58BF7F8F93D635552
22,665,031 UART: [art] SIG.S = B42390484F37CE140249AB28E7076A1E7548FFB2EC89BB6AF677D51CF893AFE7E97F6DD52ED699A6179F53C93A39471C
23,643,389 UART: mbox::rt_entry...
23,644,327 UART: ____ _ _ _ ____ _____
23,646,391 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,648,599 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,650,542 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,652,475 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,654,406 UART: |_|
23,655,211 UART:
26,455,750 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
191,512 UART:
191,895 UART: Running Caliptra ROM ...
193,179 UART:
193,333 UART: [state] CFI Enabled
264,937 UART: [state] LifecycleState = Production
267,168 UART: [state] DebugLocked = Yes
269,182 UART: [state] Starting the WD Timer 40000000 cycles
273,779 UART: [kat] SHA2-256
463,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,377 UART: [kat] ++
474,974 UART: [kat] sha1
487,228 UART: [kat] SHA2-256
490,237 UART: [kat] SHA2-384
495,869 UART: [kat] SHA2-512-ACC
498,446 UART: [kat] ECC-384
2,947,973 UART: [kat] HMAC-384Kdf
2,971,998 UART: [kat] LMS
3,503,736 UART: [kat] --
3,507,739 UART: [cold-reset] ++
3,508,740 UART: [fht] FHT @ 0x50003400
3,519,704 UART: [idev] ++
3,520,409 UART: [idev] CDI.KEYID = 6
3,521,378 UART: [idev] SUBJECT.KEYID = 7
3,522,545 UART: [idev] UDS.KEYID = 0
3,523,591 ready_for_fw is high
3,523,786 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,628,195 UART: [idev] Erasing UDS.KEYID = 0
6,029,804 UART: [idev] Sha1 KeyId Algorithm
6,052,528 UART: [idev] --
6,057,609 UART: [ldev] ++
6,058,296 UART: [ldev] CDI.KEYID = 6
6,059,261 UART: [ldev] SUBJECT.KEYID = 5
6,060,422 UART: [ldev] AUTHORITY.KEYID = 7
6,061,653 UART: [ldev] FE.KEYID = 1
6,100,163 UART: [ldev] Erasing FE.KEYID = 1
8,609,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,708 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,913 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,998 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,962 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,811 UART: [ldev] --
10,414,183 UART: [fwproc] Wait for Commands...
10,416,056 UART: [fwproc] Recv command 0x46574c44
10,418,043 UART: [fwproc] Recv'd Img size: 82832 bytes
13,511,834 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,588,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,711,752 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,058,372 >>> mbox cmd response: success
14,063,057 UART: [afmc] ++
14,063,780 UART: [afmc] CDI.KEYID = 6
14,064,945 UART: [afmc] SUBJECT.KEYID = 7
14,066,423 UART: [afmc] AUTHORITY.KEYID = 5
16,591,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,318,022 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,319,945 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,334,971 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,350,121 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,365,140 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,388,360 UART: [afmc] --
18,391,771 UART: [cold-reset] --
18,397,036 UART: [state] Locking Datavault
18,399,803 UART: [state] Locking PCR0, PCR1 and PCR31
18,401,989 UART: [state] Locking ICCM
18,404,893 UART: [exit] Launching FMC @ 0x40000130
18,413,554 UART:
18,413,795 UART: Running Caliptra FMC ...
18,414,893 UART:
18,415,050 UART: [state] CFI Enabled
18,474,829 UART: [fht] FMC Alias Private Key: 7
20,240,948 UART: [art] Extend RT PCRs Done
20,242,179 UART: [art] Lock RT PCRs Done
20,243,804 UART: [art] Populate DV Done
20,249,161 UART: [fht] FMC Alias Private Key: 7
20,250,748 UART: [art] Derive CDI
20,251,485 UART: [art] Store in slot 0x4
20,307,702 UART: [art] Derive Key Pair
20,308,738 UART: [art] Store priv key in slot 0x5
22,771,473 UART: [art] Derive Key Pair - Done
22,784,525 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,497,511 UART: [art] Erasing AUTHORITY.KEYID = 7
24,498,996 UART: [art] PUB.X = DA3B14FF82C134B71D252DDAD94FAB4AC9C8619F91756151D4865DEF7AAA27A6A89277A089BCC4115F79C8D7C3FC43BA
24,506,318 UART: [art] PUB.Y = 2D1D60FBFA912FE64125BF6BFB690B54955D66AA2D04C1E61841024D0A38AA6B5C2A50156E74FBDC210CE80CCF824405
24,513,571 UART: [art] SIG.R = 6C58B7FB73F5926B6E0A25F03153A5CADACE37C86C623EE7F6D1E41FE23619319D3BBA3E121270CBC05C2A1C70CE5924
24,520,963 UART: [art] SIG.S = E8DC5D099B1E91637C9118DE64E90D04D07B9ED58D941F58FE65BB75FB40792402B23E092E47DA75DAE513F10902E12F
25,499,709 UART: mbox::rt_entry...
25,500,668 UART: ____ _ _ _ ____ _____
25,502,610 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,504,613 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,506,465 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,508,387 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,510,236 UART: |_|
25,511,117 UART:
25,641,761 UART: [rt] Runtime listening for mailbox commands...
25,643,783 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,644,929 >>> mbox cmd response data (0 bytes)
291 writing to cptra_bootfsm_go
542 UART:
694 UART: Running Caliptra ROM ...
1,796 UART:
1,950 UART: [state] CFI Enabled
65,560 UART: [state] LifecycleState = Production
67,528 UART: [state] DebugLocked = Yes
68,940 UART: [state] Starting the WD Timer 40000000 cycles
74,335 UART: [kat] SHA2-256
264,177 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,932 UART: [kat] ++
275,425 UART: [kat] sha1
288,412 UART: [kat] SHA2-256
291,424 UART: [kat] SHA2-384
298,168 UART: [kat] SHA2-512-ACC
300,710 UART: [kat] ECC-384
2,752,174 UART: [kat] HMAC-384Kdf
2,772,827 UART: [kat] LMS
3,304,366 UART: [kat] --
3,308,433 UART: [warm-reset] ++
3,313,935 UART: [warm-reset] --
3,317,211 UART: [state] Locking Datavault
3,320,253 UART: [state] Locking PCR0, PCR1 and PCR31
3,321,969 UART: [state] Locking ICCM
3,324,341 UART: [exit] Launching FMC @ 0x40000130
3,333,017 UART:
3,333,261 UART: Running Caliptra FMC ...
3,334,362 UART:
3,334,516 UART: [state] CFI Enabled
3,382,017 UART: [art] Skip pcr extension
3,383,166 UART: [art] Extend RT PCRs Done
3,384,312 UART: [art] Lock RT PCRs Done
3,385,486 UART: [art] Populate DV Done
3,391,105 UART: [fht] FMC Alias Private Key: 7
3,392,693 UART: [art] Derive CDI
3,393,503 UART: [art] Store in slot 0x4
3,450,437 UART: [art] Derive Key Pair
3,451,895 UART: [art] Store priv key in slot 0x5
5,913,936 UART: [art] Derive Key Pair - Done
5,927,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,639,695 UART: [art] Erasing AUTHORITY.KEYID = 7
7,641,203 UART: [art] PUB.X = DA3B14FF82C134B71D252DDAD94FAB4AC9C8619F91756151D4865DEF7AAA27A6A89277A089BCC4115F79C8D7C3FC43BA
7,648,435 UART: [art] PUB.Y = 2D1D60FBFA912FE64125BF6BFB690B54955D66AA2D04C1E61841024D0A38AA6B5C2A50156E74FBDC210CE80CCF824405
7,655,715 UART: [art] SIG.R = 6C58B7FB73F5926B6E0A25F03153A5CADACE37C86C623EE7F6D1E41FE23619319D3BBA3E121270CBC05C2A1C70CE5924
7,663,142 UART: [art] SIG.S = E8DC5D099B1E91637C9118DE64E90D04D07B9ED58D941F58FE65BB75FB40792402B23E092E47DA75DAE513F10902E12F
8,642,548 UART: mbox::rt_entry...
8,643,491 UART: ____ _ _ _ ____ _____
8,645,468 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,647,467 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,649,397 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,651,325 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,653,202 UART: |_|
8,654,087 UART:
11,501,959 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,439,116 ready_for_fw is high
3,439,671 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,117,439 >>> mbox cmd response: success
18,405,900 UART:
18,406,296 UART: Running Caliptra FMC ...
18,407,425 UART:
18,407,582 UART: [state] CFI Enabled
18,476,345 UART: [fht] FMC Alias Private Key: 7
20,242,758 UART: [art] Extend RT PCRs Done
20,243,986 UART: [art] Lock RT PCRs Done
20,245,640 UART: [art] Populate DV Done
20,250,901 UART: [fht] FMC Alias Private Key: 7
20,252,441 UART: [art] Derive CDI
20,253,253 UART: [art] Store in slot 0x4
20,309,115 UART: [art] Derive Key Pair
20,310,155 UART: [art] Store priv key in slot 0x5
22,773,197 UART: [art] Derive Key Pair - Done
22,785,876 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,498,636 UART: [art] Erasing AUTHORITY.KEYID = 7
24,500,145 UART: [art] PUB.X = C7182CA80379580C33BA6FC5DE4E07124A86FDEA01F3999ECCA42C97A0FBD3BAB61525BA1ABB88559E2E057AA048B568
24,507,424 UART: [art] PUB.Y = D7634A6042616B2658D0D997330DEDA7341E5631D24C5B607DAFC5ECD44D484340C1F2CFE56905045C7BE7764111D878
24,514,652 UART: [art] SIG.R = 4B28C4BF644B8D702389D0F48ED8D4EFF9A2A3A90A3C550FC4CF42CBF50B182C5655B9C1B91A7B69C4BD1CA6B9B72761
24,522,041 UART: [art] SIG.S = 75942CA57E638BCEAC090EC0D412986817FBB29AFB78E68DEB5921197C0E15D817DFF56D8B6C48117BDAEFBF396D4F06
25,500,177 UART: mbox::rt_entry...
25,501,142 UART: ____ _ _ _ ____ _____
25,503,078 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,505,102 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,507,036 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,509,000 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,510,935 UART: |_|
25,511,768 UART:
25,643,877 UART: [rt] Runtime listening for mailbox commands...
25,645,894 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,646,994 >>> mbox cmd response data (0 bytes)
289 writing to cptra_bootfsm_go
3,244,702 UART:
3,245,032 UART: Running Caliptra FMC ...
3,246,101 UART:
3,246,256 UART: [state] CFI Enabled
3,296,089 UART: [art] Skip pcr extension
3,297,253 UART: [art] Extend RT PCRs Done
3,298,322 UART: [art] Lock RT PCRs Done
3,299,558 UART: [art] Populate DV Done
3,304,914 UART: [fht] FMC Alias Private Key: 7
3,306,556 UART: [art] Derive CDI
3,307,293 UART: [art] Store in slot 0x4
3,364,924 UART: [art] Derive Key Pair
3,365,962 UART: [art] Store priv key in slot 0x5
5,828,970 UART: [art] Derive Key Pair - Done
5,841,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,554,598 UART: [art] Erasing AUTHORITY.KEYID = 7
7,556,095 UART: [art] PUB.X = C7182CA80379580C33BA6FC5DE4E07124A86FDEA01F3999ECCA42C97A0FBD3BAB61525BA1ABB88559E2E057AA048B568
7,563,382 UART: [art] PUB.Y = D7634A6042616B2658D0D997330DEDA7341E5631D24C5B607DAFC5ECD44D484340C1F2CFE56905045C7BE7764111D878
7,570,676 UART: [art] SIG.R = 4B28C4BF644B8D702389D0F48ED8D4EFF9A2A3A90A3C550FC4CF42CBF50B182C5655B9C1B91A7B69C4BD1CA6B9B72761
7,578,113 UART: [art] SIG.S = 75942CA57E638BCEAC090EC0D412986817FBB29AFB78E68DEB5921197C0E15D817DFF56D8B6C48117BDAEFBF396D4F06
8,556,245 UART: mbox::rt_entry...
8,557,210 UART: ____ _ _ _ ____ _____
8,559,170 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
8,561,185 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
8,563,120 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
8,565,056 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
8,566,990 UART: |_|
8,567,800 UART:
11,416,705 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 1.97s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
191,813 UART:
192,176 UART: Running Caliptra ROM ...
193,367 UART:
603,223 UART: [state] CFI Enabled
617,312 UART: [state] LifecycleState = Production
619,512 UART: [state] DebugLocked = Yes
621,454 UART: [state] Starting the WD Timer 40000000 cycles
625,981 UART: [kat] SHA2-256
815,874 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,710 UART: [kat] ++
827,316 UART: [kat] sha1
838,880 UART: [kat] SHA2-256
841,864 UART: [kat] SHA2-384
847,296 UART: [kat] SHA2-512-ACC
849,883 UART: [kat] ECC-384
3,292,521 UART: [kat] HMAC-384Kdf
3,305,682 UART: [kat] LMS
3,837,493 UART: [kat] --
3,841,061 UART: [cold-reset] ++
3,842,644 UART: [fht] FHT @ 0x50003400
3,853,696 UART: [idev] ++
3,854,342 UART: [idev] CDI.KEYID = 6
3,855,362 UART: [idev] SUBJECT.KEYID = 7
3,856,546 UART: [idev] UDS.KEYID = 0
3,857,476 ready_for_fw is high
3,857,677 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
3,961,968 UART: [idev] Erasing UDS.KEYID = 0
6,337,733 UART: [idev] Sha1 KeyId Algorithm
6,360,514 UART: [idev] --
6,365,231 UART: [ldev] ++
6,365,925 UART: [ldev] CDI.KEYID = 6
6,366,814 UART: [ldev] SUBJECT.KEYID = 5
6,368,028 UART: [ldev] AUTHORITY.KEYID = 7
6,369,267 UART: [ldev] FE.KEYID = 1
6,381,646 UART: [ldev] Erasing FE.KEYID = 1
8,863,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,724 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,599,870 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,614,958 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,629,961 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,650,839 UART: [ldev] --
10,656,751 UART: [fwproc] Wait for Commands...
10,658,359 UART: [fwproc] Recv command 0x46574c44
10,660,292 UART: [fwproc] Recv'd Img size: 82832 bytes
13,755,060 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,832,870 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,956,478 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
14,303,002 >>> mbox cmd response: success
14,307,634 UART: [afmc] ++
14,308,360 UART: [afmc] CDI.KEYID = 6
14,309,560 UART: [afmc] SUBJECT.KEYID = 7
14,311,013 UART: [afmc] AUTHORITY.KEYID = 5
16,818,128 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,542,073 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,544,012 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,559,063 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,574,157 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,589,177 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,613,252 UART: [afmc] --
18,616,093 UART: [cold-reset] --
18,619,910 UART: [state] Locking Datavault
18,625,983 UART: [state] Locking PCR0, PCR1 and PCR31
18,628,131 UART: [state] Locking ICCM
18,629,476 UART: [exit] Launching FMC @ 0x40000130
18,638,156 UART:
18,638,402 UART: Running Caliptra FMC ...
18,639,509 UART:
18,639,667 UART: [state] CFI Enabled
18,647,661 UART: [fht] FMC Alias Private Key: 7
20,413,647 UART: [art] Extend RT PCRs Done
20,414,888 UART: [art] Lock RT PCRs Done
20,416,574 UART: [art] Populate DV Done
20,422,263 UART: [fht] FMC Alias Private Key: 7
20,423,972 UART: [art] Derive CDI
20,424,796 UART: [art] Store in slot 0x4
20,467,457 UART: [art] Derive Key Pair
20,468,497 UART: [art] Store priv key in slot 0x5
22,895,625 UART: [art] Derive Key Pair - Done
22,908,139 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,614,475 UART: [art] Erasing AUTHORITY.KEYID = 7
24,615,980 UART: [art] PUB.X = B81F446706DD9C7FCB480E1ED0B151DFECF402A43E137C9C201E2562F00067F4692C5F0E693A4BD2F378C935BF07E7DC
24,623,247 UART: [art] PUB.Y = 5E576D35F6382AA49D18B062B89EC5E2D1CACF9E3EFBEA8001726FAAC93317772300374CCD49228291F2FA008D3766FC
24,630,495 UART: [art] SIG.R = C00EEA7339E8A4CDECDACDF201AAF7626F290BF3BDA8AE3C34FB198A590451CD323CBBDFE7F2F250DEC175FADE0DB43E
24,637,907 UART: [art] SIG.S = 18E319BB80EF7CB0D49DC8CD56959E0EE4BB41A67A98471115B3B5A9F9393D131D5BA3523F3344F0C72A532CD5139277
25,616,438 UART: mbox::rt_entry...
25,617,387 UART: ____ _ _ _ ____ _____
25,619,337 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,621,349 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,623,208 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,625,134 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,627,024 UART: |_|
25,627,913 UART:
25,758,769 UART: [rt] Runtime listening for mailbox commands...
25,760,778 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,761,914 >>> mbox cmd response data (0 bytes)
292 writing to cptra_bootfsm_go
511 UART:
657 UART: Running Caliptra ROM ...
1,778 UART:
14,766,736 UART: [state] CFI Enabled
14,781,144 UART: [state] LifecycleState = Production
14,782,953 UART: [state] DebugLocked = Yes
14,785,749 UART: [state] Starting the WD Timer 40000000 cycles
14,791,448 UART: [kat] SHA2-256
14,981,320 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,992,237 UART: [kat] ++
14,992,756 UART: [kat] sha1
15,004,672 UART: [kat] SHA2-256
15,007,645 UART: [kat] SHA2-384
15,013,707 UART: [kat] SHA2-512-ACC
15,016,341 UART: [kat] ECC-384
17,461,575 UART: [kat] HMAC-384Kdf
17,475,156 UART: [kat] LMS
18,006,767 UART: [kat] --
18,011,079 UART: [warm-reset] ++
18,013,016 UART: [warm-reset] --
18,015,486 UART: [state] Locking Datavault
18,019,952 UART: [state] Locking PCR0, PCR1 and PCR31
18,021,627 UART: [state] Locking ICCM
18,022,922 UART: [exit] Launching FMC @ 0x40000130
18,031,223 UART:
18,031,461 UART: Running Caliptra FMC ...
18,032,568 UART:
18,032,730 UART: [state] CFI Enabled
18,034,796 UART: [art] Skip pcr extension
18,036,105 UART: [art] Extend RT PCRs Done
18,037,259 UART: [art] Lock RT PCRs Done
18,038,386 UART: [art] Populate DV Done
18,043,910 UART: [fht] FMC Alias Private Key: 7
18,045,557 UART: [art] Derive CDI
18,046,373 UART: [art] Store in slot 0x4
18,089,403 UART: [art] Derive Key Pair
18,090,914 UART: [art] Store priv key in slot 0x5
20,517,273 UART: [art] Derive Key Pair - Done
20,530,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,237,055 UART: [art] Erasing AUTHORITY.KEYID = 7
22,238,575 UART: [art] PUB.X = B81F446706DD9C7FCB480E1ED0B151DFECF402A43E137C9C201E2562F00067F4692C5F0E693A4BD2F378C935BF07E7DC
22,245,845 UART: [art] PUB.Y = 5E576D35F6382AA49D18B062B89EC5E2D1CACF9E3EFBEA8001726FAAC93317772300374CCD49228291F2FA008D3766FC
22,253,057 UART: [art] SIG.R = C00EEA7339E8A4CDECDACDF201AAF7626F290BF3BDA8AE3C34FB198A590451CD323CBBDFE7F2F250DEC175FADE0DB43E
22,260,480 UART: [art] SIG.S = 18E319BB80EF7CB0D49DC8CD56959E0EE4BB41A67A98471115B3B5A9F9393D131D5BA3523F3344F0C72A532CD5139277
23,239,058 UART: mbox::rt_entry...
23,240,023 UART: ____ _ _ _ ____ _____
23,242,017 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,244,032 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,245,972 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,247,913 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,249,767 UART: |_|
23,250,629 UART:
26,053,342 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
3,754,020 ready_for_fw is high
3,754,619 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
14,328,180 >>> mbox cmd response: success
18,584,180 UART:
18,584,570 UART: Running Caliptra FMC ...
18,585,703 UART:
18,585,861 UART: [state] CFI Enabled
18,593,555 UART: [fht] FMC Alias Private Key: 7
20,359,817 UART: [art] Extend RT PCRs Done
20,361,042 UART: [art] Lock RT PCRs Done
20,362,758 UART: [art] Populate DV Done
20,368,090 UART: [fht] FMC Alias Private Key: 7
20,369,701 UART: [art] Derive CDI
20,370,445 UART: [art] Store in slot 0x4
20,412,935 UART: [art] Derive Key Pair
20,413,981 UART: [art] Store priv key in slot 0x5
22,840,691 UART: [art] Derive Key Pair - Done
22,853,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,559,912 UART: [art] Erasing AUTHORITY.KEYID = 7
24,561,419 UART: [art] PUB.X = 5ABACA024729A6D771D7C13BA7BE066365C31B9326F4FF80BFCFDFF395654F5470A21728A218E1A6904B5F121A72BB3C
24,568,713 UART: [art] PUB.Y = 08B2AD084587C0608AE2B4D0B08C7F0F963986D85517E0CB02A4B193BB15B1A57BA018E0F2A06736A3728669E73C8BE4
24,575,960 UART: [art] SIG.R = FDDC0E7FFC3CEC6326CEBF1884EE5C722D337C3471038766001288B73A783E58CA2F750C8F7104C274DBCBC931273511
24,583,323 UART: [art] SIG.S = DF5E28100DE9D9C6955DF2FAC82A97F71CDA16CF81A56A19F6FE52439A8BC61E733B6AB093DB45916DDEECAF2B2099AA
25,562,341 UART: mbox::rt_entry...
25,563,316 UART: ____ _ _ _ ____ _____
25,565,253 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
25,567,264 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
25,569,145 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
25,571,128 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
25,572,987 UART: |_|
25,573,874 UART:
25,705,002 UART: [rt] Runtime listening for mailbox commands...
25,707,030 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
25,708,167 >>> mbox cmd response data (0 bytes)
293 writing to cptra_bootfsm_go
17,963,819 UART:
17,964,175 UART: Running Caliptra FMC ...
17,965,255 UART:
17,965,419 UART: [state] CFI Enabled
17,967,223 UART: [art] Skip pcr extension
17,968,333 UART: [art] Extend RT PCRs Done
17,969,475 UART: [art] Lock RT PCRs Done
17,970,763 UART: [art] Populate DV Done
17,976,458 UART: [fht] FMC Alias Private Key: 7
17,978,049 UART: [art] Derive CDI
17,979,083 UART: [art] Store in slot 0x4
18,021,588 UART: [art] Derive Key Pair
18,022,594 UART: [art] Store priv key in slot 0x5
20,448,762 UART: [art] Derive Key Pair - Done
20,462,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,168,471 UART: [art] Erasing AUTHORITY.KEYID = 7
22,169,960 UART: [art] PUB.X = 5ABACA024729A6D771D7C13BA7BE066365C31B9326F4FF80BFCFDFF395654F5470A21728A218E1A6904B5F121A72BB3C
22,177,288 UART: [art] PUB.Y = 08B2AD084587C0608AE2B4D0B08C7F0F963986D85517E0CB02A4B193BB15B1A57BA018E0F2A06736A3728669E73C8BE4
22,184,538 UART: [art] SIG.R = FDDC0E7FFC3CEC6326CEBF1884EE5C722D337C3471038766001288B73A783E58CA2F750C8F7104C274DBCBC931273511
22,191,904 UART: [art] SIG.S = DF5E28100DE9D9C6955DF2FAC82A97F71CDA16CF81A56A19F6FE52439A8BC61E733B6AB093DB45916DDEECAF2B2099AA
23,170,531 UART: mbox::rt_entry...
23,171,496 UART: ____ _ _ _ ____ _____
23,173,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
23,175,543 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
23,177,498 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
23,179,641 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
23,181,509 UART: |_|
23,182,396 UART:
25,985,087 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 153 filtered out; finished in 2.70s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,055 UART: [state] LifecycleState = Production
85,663 UART: [state] DebugLocked = Yes
86,377 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,189 UART: [kat] SHA2-256
882,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,235 UART: [kat] ++
886,387 UART: [kat] sha1
890,787 UART: [kat] SHA2-256
892,725 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,602 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,383 UART: [cold-reset] ++
1,476,916 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 ready_for_fw is high
1,480,982 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,488,582 UART: [idev] Erasing UDS.KEYID = 0
1,505,041 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,751 UART: [ldev] ++
1,514,919 UART: [ldev] CDI.KEYID = 6
1,515,282 UART: [ldev] SUBJECT.KEYID = 5
1,515,708 UART: [ldev] AUTHORITY.KEYID = 7
1,516,171 UART: [ldev] FE.KEYID = 1
1,521,399 UART: [ldev] Erasing FE.KEYID = 1
1,546,514 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,923 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,617 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,489 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,195 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,201 UART: [ldev] --
1,585,650 UART: [fwproc] Waiting for Commands...
1,586,439 UART: [fwproc] Received command 0x46574c44
1,587,230 UART: [fwproc] Received Image of size 82832 bytes
2,548,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,576,162 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,607,380 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,694,196 >>> mbox cmd response: success
2,695,415 UART: [afmc] ++
2,695,583 UART: [afmc] CDI.KEYID = 6
2,695,945 UART: [afmc] SUBJECT.KEYID = 7
2,696,370 UART: [afmc] AUTHORITY.KEYID = 5
2,731,135 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,747,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,748,401 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,754,116 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,760,001 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,765,704 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,773,446 UART: [afmc] --
2,774,533 UART: [cold-reset] --
2,775,309 UART: [state] Locking Datavault
2,776,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,776,988 UART: [state] Locking ICCM
2,777,488 UART: [exit] Launching FMC @ 0x40000130
2,782,818 UART:
2,782,834 UART: Running Caliptra FMC ...
2,783,242 UART:
2,783,296 UART: [state] CFI Enabled
2,793,626 UART: [fht] FMC Alias Private Key: 7
2,912,739 UART: [art] Extend RT PCRs Done
2,913,167 UART: [art] Lock RT PCRs Done
2,914,785 UART: [art] Populate DV Done
2,923,309 UART: [fht] FMC Alias Private Key: 7
2,924,369 UART: [art] Derive CDI
2,924,649 UART: [art] Store in slot 0x4
3,010,305 UART: [art] Derive Key Pair
3,010,665 UART: [art] Store priv key in slot 0x5
3,024,196 UART: [art] Derive Key Pair - Done
3,039,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,054,811 UART: [art] Erasing AUTHORITY.KEYID = 7
3,055,576 UART: [art] PUB.X = 6317DC34B9055C795B8B2D0F5ED4B93469515E83D916D27D956023F6F7FF3CA3AE61965B8F5EC1434331E5C778275CA7
3,062,340 UART: [art] PUB.Y = 5169BCFA72573BB5DA275C6E09BB9130F342C3BFC8BC44BA579570620E5BEB9511CC6406AD13B709AE5FB459091E2249
3,069,283 UART: [art] SIG.R = 50BC05C60C9D6DE64CD4F0C20E1C39C69DC01E34E05A9C94C976CCFC46B15AFEA3AFFF89880ABF0D06C6A2F3994A604F
3,076,059 UART: [art] SIG.S = 7B513E77EFEA996113125124E70C2F353D107CEC17D7CD8CCB0B7E6A2F6050687D68477C02C711984ED15B0362CC06CB
3,099,700 UART: mbox::rt_entry...
3,100,072 UART: ____ _ _ _ ____ _____
3,100,856 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,101,656 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,102,424 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,103,192 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,103,960 UART: |_|
3,104,272 UART:
3,223,049 UART: [rt] Runtime listening for mailbox commands...
3,223,811 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,224,037 >>> mbox cmd response data (0 bytes)
3,224,039 writing to cptra_bootfsm_go
3,224,134 UART:
3,224,150 UART: Running Caliptra ROM ...
3,224,558 UART:
3,224,612 UART: [state] CFI Enabled
3,227,047 UART: [state] LifecycleState = Production
3,227,655 UART: [state] DebugLocked = Yes
3,228,209 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,229,949 UART: [kat] SHA2-256
4,023,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,027,995 UART: [kat] ++
4,028,147 UART: [kat] sha1
4,032,417 UART: [kat] SHA2-256
4,034,355 UART: [kat] SHA2-384
4,037,160 UART: [kat] SHA2-512-ACC
4,039,061 UART: [kat] ECC-384
4,044,710 UART: [kat] HMAC-384Kdf
4,049,380 UART: [kat] LMS
4,617,576 UART: [kat] --
4,618,590 UART: [warm-reset] ++
4,619,255 UART: [warm-reset] --
4,620,018 UART: [state] Locking Datavault
4,620,904 UART: [state] Locking PCR0, PCR1 and PCR31
4,621,508 UART: [state] Locking ICCM
4,621,936 UART: [exit] Launching FMC @ 0x40000130
4,627,266 UART:
4,627,282 UART: Running Caliptra FMC ...
4,627,690 UART:
4,627,744 UART: [state] CFI Enabled
4,628,927 UART: [art] Skip pcr extension
4,629,336 UART: [art] Extend RT PCRs Done
4,629,764 UART: [art] Lock RT PCRs Done
4,630,897 UART: [art] Populate DV Done
4,639,027 UART: [fht] FMC Alias Private Key: 7
4,640,109 UART: [art] Derive CDI
4,640,389 UART: [art] Store in slot 0x4
4,725,601 UART: [art] Derive Key Pair
4,725,961 UART: [art] Store priv key in slot 0x5
4,739,308 UART: [art] Derive Key Pair - Done
4,754,038 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,769,491 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,256 UART: [art] PUB.X = 6317DC34B9055C795B8B2D0F5ED4B93469515E83D916D27D956023F6F7FF3CA3AE61965B8F5EC1434331E5C778275CA7
4,777,020 UART: [art] PUB.Y = 5169BCFA72573BB5DA275C6E09BB9130F342C3BFC8BC44BA579570620E5BEB9511CC6406AD13B709AE5FB459091E2249
4,783,963 UART: [art] SIG.R = 50BC05C60C9D6DE64CD4F0C20E1C39C69DC01E34E05A9C94C976CCFC46B15AFEA3AFFF89880ABF0D06C6A2F3994A604F
4,790,739 UART: [art] SIG.S = 7B513E77EFEA996113125124E70C2F353D107CEC17D7CD8CCB0B7E6A2F6050687D68477C02C711984ED15B0362CC06CB
4,814,444 UART: mbox::rt_entry...
4,814,816 UART: ____ _ _ _ ____ _____
4,815,600 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,816,400 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,817,168 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,817,936 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,818,704 UART: |_|
4,819,016 UART:
5,204,707 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,818 ready_for_fw is high
1,362,818 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,543,830 >>> mbox cmd response: success
2,605,290 UART:
2,605,306 UART: Running Caliptra FMC ...
2,605,714 UART:
2,605,768 UART: [state] CFI Enabled
2,616,362 UART: [fht] FMC Alias Private Key: 7
2,735,185 UART: [art] Extend RT PCRs Done
2,735,613 UART: [art] Lock RT PCRs Done
2,736,937 UART: [art] Populate DV Done
2,745,137 UART: [fht] FMC Alias Private Key: 7
2,746,297 UART: [art] Derive CDI
2,746,577 UART: [art] Store in slot 0x4
2,832,301 UART: [art] Derive Key Pair
2,832,661 UART: [art] Store priv key in slot 0x5
2,846,176 UART: [art] Derive Key Pair - Done
2,860,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,876,744 UART: [art] Erasing AUTHORITY.KEYID = 7
2,877,509 UART: [art] PUB.X = D2F8F3147EDB54D4BF6124CEAE2992C2929BB72B2C20B49417E832A1B6955F81355CBAE118B5DE43F085EFFC3AF50B5C
2,884,292 UART: [art] PUB.Y = 654E8E6714638ED65A049E0AD87013CE8C4E62298B6FF796FA28925C589DB4023FCAD36ED531315E51D143231C6E0929
2,891,228 UART: [art] SIG.R = 9C70A3D90F7EB9908CB0FAF1C6CA09FE37658C651877EEC4DCC5E0EBAE8274E6ADC58ACC0E391C072E54ECCAD8DD02AC
2,898,015 UART: [art] SIG.S = 925E295BC570E30052B20D93351E9D20976AE3819ED4301C544A5CF49293AA9246643F5E494063354E89EF9BBBEC707B
2,921,208 UART: mbox::rt_entry...
2,921,580 UART: ____ _ _ _ ____ _____
2,922,364 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,923,164 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,923,932 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,924,700 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,925,468 UART: |_|
2,925,780 UART:
3,043,413 UART: [rt] Runtime listening for mailbox commands...
3,044,175 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,044,401 >>> mbox cmd response data (0 bytes)
3,044,403 writing to cptra_bootfsm_go
4,329,408 UART:
4,329,424 UART: Running Caliptra FMC ...
4,329,832 UART:
4,329,886 UART: [state] CFI Enabled
4,331,053 UART: [art] Skip pcr extension
4,331,462 UART: [art] Extend RT PCRs Done
4,331,890 UART: [art] Lock RT PCRs Done
4,333,181 UART: [art] Populate DV Done
4,341,547 UART: [fht] FMC Alias Private Key: 7
4,342,685 UART: [art] Derive CDI
4,342,965 UART: [art] Store in slot 0x4
4,428,467 UART: [art] Derive Key Pair
4,428,827 UART: [art] Store priv key in slot 0x5
4,442,350 UART: [art] Derive Key Pair - Done
4,457,205 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,472,414 UART: [art] Erasing AUTHORITY.KEYID = 7
4,473,179 UART: [art] PUB.X = D2F8F3147EDB54D4BF6124CEAE2992C2929BB72B2C20B49417E832A1B6955F81355CBAE118B5DE43F085EFFC3AF50B5C
4,479,962 UART: [art] PUB.Y = 654E8E6714638ED65A049E0AD87013CE8C4E62298B6FF796FA28925C589DB4023FCAD36ED531315E51D143231C6E0929
4,486,898 UART: [art] SIG.R = 9C70A3D90F7EB9908CB0FAF1C6CA09FE37658C651877EEC4DCC5E0EBAE8274E6ADC58ACC0E391C072E54ECCAD8DD02AC
4,493,685 UART: [art] SIG.S = 925E295BC570E30052B20D93351E9D20976AE3819ED4301C544A5CF49293AA9246643F5E494063354E89EF9BBBEC707B
4,517,372 UART: mbox::rt_entry...
4,517,744 UART: ____ _ _ _ ____ _____
4,518,528 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,519,328 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,520,096 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,520,864 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,521,632 UART: |_|
4,521,944 UART:
4,901,785 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,694 UART: [state] LifecycleState = Production
86,302 UART: [state] DebugLocked = Yes
86,916 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,686 UART: [kat] SHA2-256
882,617 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,732 UART: [kat] ++
886,884 UART: [kat] sha1
891,262 UART: [kat] SHA2-256
893,200 UART: [kat] SHA2-384
896,187 UART: [kat] SHA2-512-ACC
898,088 UART: [kat] ECC-384
903,637 UART: [kat] HMAC-384Kdf
908,369 UART: [kat] LMS
1,476,565 UART: [kat] --
1,477,464 UART: [cold-reset] ++
1,477,969 UART: [fht] Storing FHT @ 0x50003400
1,480,846 UART: [idev] ++
1,481,014 UART: [idev] CDI.KEYID = 6
1,481,374 UART: [idev] SUBJECT.KEYID = 7
1,481,798 UART: [idev] UDS.KEYID = 0
1,482,143 ready_for_fw is high
1,482,143 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,489,925 UART: [idev] Erasing UDS.KEYID = 0
1,506,482 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,143 UART: [idev] --
1,516,272 UART: [ldev] ++
1,516,440 UART: [ldev] CDI.KEYID = 6
1,516,803 UART: [ldev] SUBJECT.KEYID = 5
1,517,229 UART: [ldev] AUTHORITY.KEYID = 7
1,517,692 UART: [ldev] FE.KEYID = 1
1,522,966 UART: [ldev] Erasing FE.KEYID = 1
1,548,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,018 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,712 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,584 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,579,290 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,586,356 UART: [ldev] --
1,587,667 UART: [fwproc] Waiting for Commands...
1,588,286 UART: [fwproc] Received command 0x46574c44
1,589,077 UART: [fwproc] Received Image of size 82832 bytes
2,549,334 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,576,485 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,607,703 UART: [fwproc] Loading Runtime at address 0x40005000 len 56904
2,694,353 >>> mbox cmd response: success
2,695,590 UART: [afmc] ++
2,695,758 UART: [afmc] CDI.KEYID = 6
2,696,120 UART: [afmc] SUBJECT.KEYID = 7
2,696,545 UART: [afmc] AUTHORITY.KEYID = 5
2,731,714 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
2,748,104 UART: [afmc] Erasing AUTHORITY.KEYID = 5
2,748,884 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,754,599 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,760,484 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
2,766,187 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
2,774,165 UART: [afmc] --
2,775,074 UART: [cold-reset] --
2,775,976 UART: [state] Locking Datavault
2,777,455 UART: [state] Locking PCR0, PCR1 and PCR31
2,778,059 UART: [state] Locking ICCM
2,778,725 UART: [exit] Launching FMC @ 0x40000130
2,784,055 UART:
2,784,071 UART: Running Caliptra FMC ...
2,784,479 UART:
2,784,622 UART: [state] CFI Enabled
2,795,370 UART: [fht] FMC Alias Private Key: 7
2,914,659 UART: [art] Extend RT PCRs Done
2,915,087 UART: [art] Lock RT PCRs Done
2,917,025 UART: [art] Populate DV Done
2,925,067 UART: [fht] FMC Alias Private Key: 7
2,926,073 UART: [art] Derive CDI
2,926,353 UART: [art] Store in slot 0x4
3,012,053 UART: [art] Derive Key Pair
3,012,413 UART: [art] Store priv key in slot 0x5
3,025,084 UART: [art] Derive Key Pair - Done
3,039,859 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,055,236 UART: [art] Erasing AUTHORITY.KEYID = 7
3,056,001 UART: [art] PUB.X = 336362A2CBE67918B181131103FFCDB59BD5A7DC13E0AEF90B30B728E7DB8333E8233FD797CB65753596D8D43A61E91C
3,062,771 UART: [art] PUB.Y = B1E921357F740F7A81753DC38792E00A259AC87F34B244AB31A64175C810F3EB8B3352AC5D3C467B2D2FDB5B6D1DD822
3,069,721 UART: [art] SIG.R = 3B43F4567FEC81032B83374633BD75F894B3E0EE205AAAB141DE856D2AF93EDCAE23AC2A767E6BB18B038BBCFAAE53A2
3,076,507 UART: [art] SIG.S = AE1522312C5E5E8F8616D4CE7344F8FDE596B5AF06FAB42B6B1FD31E98B8DA24F0C3C68BCBD1F80E047819EC9B9B69D1
3,100,316 UART: mbox::rt_entry...
3,100,688 UART: ____ _ _ _ ____ _____
3,101,472 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,102,272 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,103,040 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,103,808 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,104,576 UART: |_|
3,104,888 UART:
3,223,224 UART: [rt] Runtime listening for mailbox commands...
3,223,986 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,224,212 >>> mbox cmd response data (0 bytes)
3,224,214 writing to cptra_bootfsm_go
3,224,309 UART:
3,224,325 UART: Running Caliptra ROM ...
3,224,733 UART:
3,224,874 UART: [state] CFI Enabled
3,227,993 UART: [state] LifecycleState = Production
3,228,601 UART: [state] DebugLocked = Yes
3,229,153 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,230,889 UART: [kat] SHA2-256
4,024,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,028,935 UART: [kat] ++
4,029,087 UART: [kat] sha1
4,033,367 UART: [kat] SHA2-256
4,035,305 UART: [kat] SHA2-384
4,038,234 UART: [kat] SHA2-512-ACC
4,040,135 UART: [kat] ECC-384
4,045,728 UART: [kat] HMAC-384Kdf
4,050,440 UART: [kat] LMS
4,618,636 UART: [kat] --
4,619,806 UART: [warm-reset] ++
4,620,929 UART: [warm-reset] --
4,621,848 UART: [state] Locking Datavault
4,622,730 UART: [state] Locking PCR0, PCR1 and PCR31
4,623,334 UART: [state] Locking ICCM
4,623,798 UART: [exit] Launching FMC @ 0x40000130
4,629,128 UART:
4,629,144 UART: Running Caliptra FMC ...
4,629,552 UART:
4,629,695 UART: [state] CFI Enabled
4,630,796 UART: [art] Skip pcr extension
4,631,205 UART: [art] Extend RT PCRs Done
4,631,633 UART: [art] Lock RT PCRs Done
4,632,986 UART: [art] Populate DV Done
4,641,212 UART: [fht] FMC Alias Private Key: 7
4,642,360 UART: [art] Derive CDI
4,642,640 UART: [art] Store in slot 0x4
4,728,168 UART: [art] Derive Key Pair
4,728,528 UART: [art] Store priv key in slot 0x5
4,742,035 UART: [art] Derive Key Pair - Done
4,756,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,771,975 UART: [art] Erasing AUTHORITY.KEYID = 7
4,772,740 UART: [art] PUB.X = 336362A2CBE67918B181131103FFCDB59BD5A7DC13E0AEF90B30B728E7DB8333E8233FD797CB65753596D8D43A61E91C
4,779,510 UART: [art] PUB.Y = B1E921357F740F7A81753DC38792E00A259AC87F34B244AB31A64175C810F3EB8B3352AC5D3C467B2D2FDB5B6D1DD822
4,786,460 UART: [art] SIG.R = 3B43F4567FEC81032B83374633BD75F894B3E0EE205AAAB141DE856D2AF93EDCAE23AC2A767E6BB18B038BBCFAAE53A2
4,793,246 UART: [art] SIG.S = AE1522312C5E5E8F8616D4CE7344F8FDE596B5AF06FAB42B6B1FD31E98B8DA24F0C3C68BCBD1F80E047819EC9B9B69D1
4,817,003 UART: mbox::rt_entry...
4,817,375 UART: ____ _ _ _ ____ _____
4,818,159 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,818,959 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,819,727 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,820,495 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,821,263 UART: |_|
4,821,575 UART:
5,207,499 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,365 ready_for_fw is high
1,363,365 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,545,679 >>> mbox cmd response: success
2,607,063 UART:
2,607,079 UART: Running Caliptra FMC ...
2,607,487 UART:
2,607,630 UART: [state] CFI Enabled
2,618,332 UART: [fht] FMC Alias Private Key: 7
2,736,691 UART: [art] Extend RT PCRs Done
2,737,119 UART: [art] Lock RT PCRs Done
2,739,053 UART: [art] Populate DV Done
2,747,247 UART: [fht] FMC Alias Private Key: 7
2,748,205 UART: [art] Derive CDI
2,748,485 UART: [art] Store in slot 0x4
2,834,343 UART: [art] Derive Key Pair
2,834,703 UART: [art] Store priv key in slot 0x5
2,848,040 UART: [art] Derive Key Pair - Done
2,863,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,878,418 UART: [art] Erasing AUTHORITY.KEYID = 7
2,879,183 UART: [art] PUB.X = 6A957319B6FA5D560645132A5FAB05D9D69A958864734B75F2D496B215B0636CB590337F2C02257B787FF766FFE80C33
2,885,935 UART: [art] PUB.Y = 7835D7E3AB91FE137FB2E26A83339108B98423F62B8B62237154AC40550C1E8F3DD58C22A994B693E0DE5636C48B8FFE
2,892,881 UART: [art] SIG.R = 06606E2B595313D6480FE13ABB8CEA045B1BCFBDC101A373005DC9F5023C9A7BEE2C558D674625B724D6A55C6965938E
2,899,620 UART: [art] SIG.S = A61E4C0A63CF8DD7B576E26CDF93B9FDABA9E38C12C10E46914E3A3EDE776A3A27F0FB49E3F84C2E66ECCECA73045BA7
2,922,693 UART: mbox::rt_entry...
2,923,065 UART: ____ _ _ _ ____ _____
2,923,849 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,924,649 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,925,417 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,926,185 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,926,953 UART: |_|
2,927,265 UART:
3,045,621 UART: [rt] Runtime listening for mailbox commands...
3,046,383 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
3,046,609 >>> mbox cmd response data (0 bytes)
3,046,611 writing to cptra_bootfsm_go
4,331,397 UART:
4,331,413 UART: Running Caliptra FMC ...
4,331,821 UART:
4,331,964 UART: [state] CFI Enabled
4,333,455 UART: [art] Skip pcr extension
4,333,864 UART: [art] Extend RT PCRs Done
4,334,292 UART: [art] Lock RT PCRs Done
4,335,565 UART: [art] Populate DV Done
4,343,899 UART: [fht] FMC Alias Private Key: 7
4,344,855 UART: [art] Derive CDI
4,345,135 UART: [art] Store in slot 0x4
4,431,189 UART: [art] Derive Key Pair
4,431,549 UART: [art] Store priv key in slot 0x5
4,444,978 UART: [art] Derive Key Pair - Done
4,459,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,475,630 UART: [art] Erasing AUTHORITY.KEYID = 7
4,476,395 UART: [art] PUB.X = 6A957319B6FA5D560645132A5FAB05D9D69A958864734B75F2D496B215B0636CB590337F2C02257B787FF766FFE80C33
4,483,147 UART: [art] PUB.Y = 7835D7E3AB91FE137FB2E26A83339108B98423F62B8B62237154AC40550C1E8F3DD58C22A994B693E0DE5636C48B8FFE
4,490,093 UART: [art] SIG.R = 06606E2B595313D6480FE13ABB8CEA045B1BCFBDC101A373005DC9F5023C9A7BEE2C558D674625B724D6A55C6965938E
4,496,832 UART: [art] SIG.S = A61E4C0A63CF8DD7B576E26CDF93B9FDABA9E38C12C10E46914E3A3EDE776A3A27F0FB49E3F84C2E66ECCECA73045BA7
4,520,471 UART: mbox::rt_entry...
4,520,843 UART: ____ _ _ _ ____ _____
4,521,627 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,522,427 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,523,195 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,523,963 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,524,731 UART: |_|
4,525,043 UART:
4,908,607 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Production
86,077 UART: [state] DebugLocked = Yes
86,787 UART: [state] Starting the WD Timer 40000000 cycles
88,492 UART: [kat] SHA2-256
892,042 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,146 UART: [kat] ++
896,298 UART: [kat] sha1
900,670 UART: [kat] SHA2-256
902,610 UART: [kat] SHA2-384
905,373 UART: [kat] SHA2-512-ACC
907,274 UART: [kat] ECC-384
916,757 UART: [kat] HMAC-384Kdf
921,389 UART: [kat] LMS
1,169,701 UART: [kat] --
1,170,576 UART: [cold-reset] ++
1,170,931 UART: [fht] FHT @ 0x50003400
1,173,419 UART: [idev] ++
1,173,587 UART: [idev] CDI.KEYID = 6
1,173,948 UART: [idev] SUBJECT.KEYID = 7
1,174,373 UART: [idev] UDS.KEYID = 0
1,174,719 ready_for_fw is high
1,174,719 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,182,583 UART: [idev] Erasing UDS.KEYID = 0
1,199,320 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,216 UART: [ldev] ++
1,209,384 UART: [ldev] CDI.KEYID = 6
1,209,748 UART: [ldev] SUBJECT.KEYID = 5
1,210,175 UART: [ldev] AUTHORITY.KEYID = 7
1,210,638 UART: [ldev] FE.KEYID = 1
1,215,662 UART: [ldev] Erasing FE.KEYID = 1
1,241,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,565 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,259 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,129 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,271,835 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,278,859 UART: [ldev] --
1,280,138 UART: [fwproc] Wait for Commands...
1,280,707 UART: [fwproc] Recv command 0x46574c44
1,281,440 UART: [fwproc] Recv'd Img size: 82832 bytes
2,240,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,267,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,298,385 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,385,133 >>> mbox cmd response: success
2,386,250 UART: [afmc] ++
2,386,418 UART: [afmc] CDI.KEYID = 6
2,386,781 UART: [afmc] SUBJECT.KEYID = 7
2,387,207 UART: [afmc] AUTHORITY.KEYID = 5
2,423,296 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,440,011 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,440,760 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,446,476 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,452,359 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,458,064 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,465,848 UART: [afmc] --
2,466,902 UART: [cold-reset] --
2,468,058 UART: [state] Locking Datavault
2,469,127 UART: [state] Locking PCR0, PCR1 and PCR31
2,469,731 UART: [state] Locking ICCM
2,470,179 UART: [exit] Launching FMC @ 0x40000130
2,475,509 UART:
2,475,525 UART: Running Caliptra FMC ...
2,475,933 UART:
2,475,987 UART: [state] CFI Enabled
2,486,497 UART: [fht] FMC Alias Private Key: 7
2,605,382 UART: [art] Extend RT PCRs Done
2,605,810 UART: [art] Lock RT PCRs Done
2,607,212 UART: [art] Populate DV Done
2,615,494 UART: [fht] FMC Alias Private Key: 7
2,616,452 UART: [art] Derive CDI
2,616,732 UART: [art] Store in slot 0x4
2,702,495 UART: [art] Derive Key Pair
2,702,855 UART: [art] Store priv key in slot 0x5
2,716,083 UART: [art] Derive Key Pair - Done
2,731,202 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,746,787 UART: [art] Erasing AUTHORITY.KEYID = 7
2,747,552 UART: [art] PUB.X = 75A68AC00676D7FE4DD96EEA04D033202C561A912E5179BB5778723E7B63C1F4D8B7BEE2E9540516D93AD74D93577431
2,754,313 UART: [art] PUB.Y = E16707B74B524580E0EC212D859683D8F6EEA566ABAEE36E2CC5AD44927EA4FDCE273D78D5855430FE86E7DD66083856
2,761,265 UART: [art] SIG.R = ACC5B2F6862898CEBB3FFE71F871961D827CDD65D0BCB231F2B5B806A16D76C1386B06F1FF9FD30EE105EB2B73EAB62C
2,768,045 UART: [art] SIG.S = A45AC835E7BF3A98A3AE50F00018BC529D1DB023CF214113CD593BAFB8C762E4927F0D3A5C5CD25E090DDA0F0A64E3F6
2,791,844 UART: mbox::rt_entry...
2,792,216 UART: ____ _ _ _ ____ _____
2,793,000 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,793,800 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,794,568 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,795,336 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,796,104 UART: |_|
2,796,416 UART:
2,914,781 UART: [rt] Runtime listening for mailbox commands...
2,915,543 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,915,769 >>> mbox cmd response data (0 bytes)
2,915,771 writing to cptra_bootfsm_go
2,915,863 UART:
2,915,879 UART: Running Caliptra ROM ...
2,916,287 UART:
2,916,342 UART: [state] CFI Enabled
2,918,953 UART: [state] LifecycleState = Production
2,919,561 UART: [state] DebugLocked = Yes
2,920,207 UART: [state] Starting the WD Timer 40000000 cycles
2,921,728 UART: [kat] SHA2-256
3,725,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,729,382 UART: [kat] ++
3,729,534 UART: [kat] sha1
3,733,696 UART: [kat] SHA2-256
3,735,636 UART: [kat] SHA2-384
3,738,475 UART: [kat] SHA2-512-ACC
3,740,376 UART: [kat] ECC-384
3,750,407 UART: [kat] HMAC-384Kdf
3,754,969 UART: [kat] LMS
4,003,281 UART: [kat] --
4,004,235 UART: [warm-reset] ++
4,004,906 UART: [warm-reset] --
4,005,529 UART: [state] Locking Datavault
4,006,179 UART: [state] Locking PCR0, PCR1 and PCR31
4,006,783 UART: [state] Locking ICCM
4,007,397 UART: [exit] Launching FMC @ 0x40000130
4,012,727 UART:
4,012,743 UART: Running Caliptra FMC ...
4,013,151 UART:
4,013,205 UART: [state] CFI Enabled
4,014,320 UART: [art] Skip pcr extension
4,014,729 UART: [art] Extend RT PCRs Done
4,015,157 UART: [art] Lock RT PCRs Done
4,016,460 UART: [art] Populate DV Done
4,024,498 UART: [fht] FMC Alias Private Key: 7
4,025,670 UART: [art] Derive CDI
4,025,950 UART: [art] Store in slot 0x4
4,111,635 UART: [art] Derive Key Pair
4,111,995 UART: [art] Store priv key in slot 0x5
4,125,729 UART: [art] Derive Key Pair - Done
4,140,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,156,057 UART: [art] Erasing AUTHORITY.KEYID = 7
4,156,822 UART: [art] PUB.X = 75A68AC00676D7FE4DD96EEA04D033202C561A912E5179BB5778723E7B63C1F4D8B7BEE2E9540516D93AD74D93577431
4,163,583 UART: [art] PUB.Y = E16707B74B524580E0EC212D859683D8F6EEA566ABAEE36E2CC5AD44927EA4FDCE273D78D5855430FE86E7DD66083856
4,170,535 UART: [art] SIG.R = ACC5B2F6862898CEBB3FFE71F871961D827CDD65D0BCB231F2B5B806A16D76C1386B06F1FF9FD30EE105EB2B73EAB62C
4,177,315 UART: [art] SIG.S = A45AC835E7BF3A98A3AE50F00018BC529D1DB023CF214113CD593BAFB8C762E4927F0D3A5C5CD25E090DDA0F0A64E3F6
4,201,044 UART: mbox::rt_entry...
4,201,416 UART: ____ _ _ _ ____ _____
4,202,200 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,203,000 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,203,768 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,204,536 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,205,304 UART: |_|
4,205,616 UART:
4,583,081 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,213 ready_for_fw is high
1,059,213 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,240,234 >>> mbox cmd response: success
2,302,477 UART:
2,302,493 UART: Running Caliptra FMC ...
2,302,901 UART:
2,302,955 UART: [state] CFI Enabled
2,313,665 UART: [fht] FMC Alias Private Key: 7
2,432,726 UART: [art] Extend RT PCRs Done
2,433,154 UART: [art] Lock RT PCRs Done
2,434,912 UART: [art] Populate DV Done
2,442,964 UART: [fht] FMC Alias Private Key: 7
2,444,080 UART: [art] Derive CDI
2,444,360 UART: [art] Store in slot 0x4
2,530,147 UART: [art] Derive Key Pair
2,530,507 UART: [art] Store priv key in slot 0x5
2,542,981 UART: [art] Derive Key Pair - Done
2,557,672 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,572,859 UART: [art] Erasing AUTHORITY.KEYID = 7
2,573,624 UART: [art] PUB.X = D51B91B745F72D505F4EF7F603D2454CDDE04BE122DAA42D5B9F6F77412A1351D4B046BCE5EE021A4757BA6875BC4805
2,580,395 UART: [art] PUB.Y = DC1FCBE71DFF487D937643A6431BC82608F0D6D136B4C80E5EBDE74D3C666F11FC6AAE7BC1577913467DA64A3D9C140F
2,587,352 UART: [art] SIG.R = A1868FA6A035A9F4E6646FBB1595D52B30D237D8C52DEBC14EEBAF4D4479BC5198BC1E20374FDCE6612F57422DD0C235
2,594,136 UART: [art] SIG.S = FF60569B24CF8D09914A38F4AA3F738E364182429EC9B4C9DB70713A0859EC4C134698AF42826C671250A12ED83EE44D
2,617,908 UART: mbox::rt_entry...
2,618,280 UART: ____ _ _ _ ____ _____
2,619,064 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,619,864 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,620,632 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,621,400 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,622,168 UART: |_|
2,622,480 UART:
2,741,217 UART: [rt] Runtime listening for mailbox commands...
2,741,979 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,742,205 >>> mbox cmd response data (0 bytes)
2,742,207 writing to cptra_bootfsm_go
3,723,478 UART:
3,723,494 UART: Running Caliptra FMC ...
3,723,902 UART:
3,723,956 UART: [state] CFI Enabled
3,725,147 UART: [art] Skip pcr extension
3,725,556 UART: [art] Extend RT PCRs Done
3,725,984 UART: [art] Lock RT PCRs Done
3,727,105 UART: [art] Populate DV Done
3,735,221 UART: [fht] FMC Alias Private Key: 7
3,736,351 UART: [art] Derive CDI
3,736,631 UART: [art] Store in slot 0x4
3,822,488 UART: [art] Derive Key Pair
3,822,848 UART: [art] Store priv key in slot 0x5
3,836,080 UART: [art] Derive Key Pair - Done
3,850,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,866,118 UART: [art] Erasing AUTHORITY.KEYID = 7
3,866,883 UART: [art] PUB.X = D51B91B745F72D505F4EF7F603D2454CDDE04BE122DAA42D5B9F6F77412A1351D4B046BCE5EE021A4757BA6875BC4805
3,873,654 UART: [art] PUB.Y = DC1FCBE71DFF487D937643A6431BC82608F0D6D136B4C80E5EBDE74D3C666F11FC6AAE7BC1577913467DA64A3D9C140F
3,880,611 UART: [art] SIG.R = A1868FA6A035A9F4E6646FBB1595D52B30D237D8C52DEBC14EEBAF4D4479BC5198BC1E20374FDCE6612F57422DD0C235
3,887,395 UART: [art] SIG.S = FF60569B24CF8D09914A38F4AA3F738E364182429EC9B4C9DB70713A0859EC4C134698AF42826C671250A12ED83EE44D
3,911,059 UART: mbox::rt_entry...
3,911,431 UART: ____ _ _ _ ____ _____
3,912,215 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,913,015 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,913,783 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,914,551 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,915,319 UART: |_|
3,915,631 UART:
4,298,618 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Production
85,724 UART: [state] DebugLocked = Yes
86,304 UART: [state] Starting the WD Timer 40000000 cycles
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
899,867 UART: [kat] SHA2-256
901,807 UART: [kat] SHA2-384
904,374 UART: [kat] SHA2-512-ACC
906,275 UART: [kat] ECC-384
915,960 UART: [kat] HMAC-384Kdf
920,606 UART: [kat] LMS
1,168,918 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,142 UART: [fht] FHT @ 0x50003400
1,172,690 UART: [idev] ++
1,172,858 UART: [idev] CDI.KEYID = 6
1,173,219 UART: [idev] SUBJECT.KEYID = 7
1,173,644 UART: [idev] UDS.KEYID = 0
1,173,990 ready_for_fw is high
1,173,990 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,181,814 UART: [idev] Erasing UDS.KEYID = 0
1,198,523 UART: [idev] Sha1 KeyId Algorithm
1,207,488 UART: [idev] --
1,208,489 UART: [ldev] ++
1,208,657 UART: [ldev] CDI.KEYID = 6
1,209,021 UART: [ldev] SUBJECT.KEYID = 5
1,209,448 UART: [ldev] AUTHORITY.KEYID = 7
1,209,911 UART: [ldev] FE.KEYID = 1
1,215,281 UART: [ldev] Erasing FE.KEYID = 1
1,241,986 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,436 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,130 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,000 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,706 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,938 UART: [ldev] --
1,281,271 UART: [fwproc] Wait for Commands...
1,282,080 UART: [fwproc] Recv command 0x46574c44
1,282,813 UART: [fwproc] Recv'd Img size: 82832 bytes
2,242,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,269,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,301,080 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,387,682 >>> mbox cmd response: success
2,388,887 UART: [afmc] ++
2,389,055 UART: [afmc] CDI.KEYID = 6
2,389,418 UART: [afmc] SUBJECT.KEYID = 7
2,389,844 UART: [afmc] AUTHORITY.KEYID = 5
2,425,603 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,442,112 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,442,861 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,448,577 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,454,460 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,460,165 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,468,017 UART: [afmc] --
2,468,985 UART: [cold-reset] --
2,469,815 UART: [state] Locking Datavault
2,471,010 UART: [state] Locking PCR0, PCR1 and PCR31
2,471,614 UART: [state] Locking ICCM
2,472,040 UART: [exit] Launching FMC @ 0x40000130
2,477,370 UART:
2,477,386 UART: Running Caliptra FMC ...
2,477,794 UART:
2,477,937 UART: [state] CFI Enabled
2,488,473 UART: [fht] FMC Alias Private Key: 7
2,607,278 UART: [art] Extend RT PCRs Done
2,607,706 UART: [art] Lock RT PCRs Done
2,608,954 UART: [art] Populate DV Done
2,616,980 UART: [fht] FMC Alias Private Key: 7
2,617,966 UART: [art] Derive CDI
2,618,246 UART: [art] Store in slot 0x4
2,704,171 UART: [art] Derive Key Pair
2,704,531 UART: [art] Store priv key in slot 0x5
2,718,227 UART: [art] Derive Key Pair - Done
2,733,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,748,512 UART: [art] Erasing AUTHORITY.KEYID = 7
2,749,277 UART: [art] PUB.X = 9A27490321E2EE0EF738144BDC67D7CA26442AA2C237A4DDB715E8B8F6B6ED17631D0AF660360A2E7EEBEB0CA1B99008
2,756,043 UART: [art] PUB.Y = A0982D4D4D54F55209AB88847B11CEA4FC14DDA41E101C4D5296A8C75DE16DBE5CCEB516705F4548AE35D56A0D1F72C6
2,763,001 UART: [art] SIG.R = 2A79E1F504519E06A345EE9CCE8B1D9513A04BD97C52025059BA8C50639C16C2C168ED905BF218D57232CACD347888C5
2,769,764 UART: [art] SIG.S = A4477945D442277F6933BC7412350838712020A4705D513CFE5B7D1C34B3976B528F7CEAA7453C1DA6DD16F3459E6B2D
2,793,309 UART: mbox::rt_entry...
2,793,681 UART: ____ _ _ _ ____ _____
2,794,465 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,795,265 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,796,033 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,796,801 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,797,569 UART: |_|
2,797,881 UART:
2,917,024 UART: [rt] Runtime listening for mailbox commands...
2,917,786 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,918,012 >>> mbox cmd response data (0 bytes)
2,918,014 writing to cptra_bootfsm_go
2,918,106 UART:
2,918,122 UART: Running Caliptra ROM ...
2,918,530 UART:
2,918,672 UART: [state] CFI Enabled
2,921,663 UART: [state] LifecycleState = Production
2,922,271 UART: [state] DebugLocked = Yes
2,922,881 UART: [state] Starting the WD Timer 40000000 cycles
2,924,388 UART: [kat] SHA2-256
3,727,938 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
3,732,042 UART: [kat] ++
3,732,194 UART: [kat] sha1
3,736,450 UART: [kat] SHA2-256
3,738,390 UART: [kat] SHA2-384
3,741,273 UART: [kat] SHA2-512-ACC
3,743,174 UART: [kat] ECC-384
3,752,941 UART: [kat] HMAC-384Kdf
3,757,539 UART: [kat] LMS
4,005,851 UART: [kat] --
4,006,469 UART: [warm-reset] ++
4,007,506 UART: [warm-reset] --
4,008,425 UART: [state] Locking Datavault
4,008,991 UART: [state] Locking PCR0, PCR1 and PCR31
4,009,595 UART: [state] Locking ICCM
4,010,053 UART: [exit] Launching FMC @ 0x40000130
4,015,383 UART:
4,015,399 UART: Running Caliptra FMC ...
4,015,807 UART:
4,015,950 UART: [state] CFI Enabled
4,017,413 UART: [art] Skip pcr extension
4,017,822 UART: [art] Extend RT PCRs Done
4,018,250 UART: [art] Lock RT PCRs Done
4,019,517 UART: [art] Populate DV Done
4,028,081 UART: [fht] FMC Alias Private Key: 7
4,029,223 UART: [art] Derive CDI
4,029,503 UART: [art] Store in slot 0x4
4,115,444 UART: [art] Derive Key Pair
4,115,804 UART: [art] Store priv key in slot 0x5
4,129,482 UART: [art] Derive Key Pair - Done
4,144,530 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,160,103 UART: [art] Erasing AUTHORITY.KEYID = 7
4,160,868 UART: [art] PUB.X = 9A27490321E2EE0EF738144BDC67D7CA26442AA2C237A4DDB715E8B8F6B6ED17631D0AF660360A2E7EEBEB0CA1B99008
4,167,634 UART: [art] PUB.Y = A0982D4D4D54F55209AB88847B11CEA4FC14DDA41E101C4D5296A8C75DE16DBE5CCEB516705F4548AE35D56A0D1F72C6
4,174,592 UART: [art] SIG.R = 2A79E1F504519E06A345EE9CCE8B1D9513A04BD97C52025059BA8C50639C16C2C168ED905BF218D57232CACD347888C5
4,181,355 UART: [art] SIG.S = A4477945D442277F6933BC7412350838712020A4705D513CFE5B7D1C34B3976B528F7CEAA7453C1DA6DD16F3459E6B2D
4,204,258 UART: mbox::rt_entry...
4,204,630 UART: ____ _ _ _ ____ _____
4,205,414 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,206,214 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,206,982 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,207,750 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,208,518 UART: |_|
4,208,830 UART:
4,593,699 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,372 ready_for_fw is high
1,060,372 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,627 >>> mbox cmd response: success
2,304,210 UART:
2,304,226 UART: Running Caliptra FMC ...
2,304,634 UART:
2,304,777 UART: [state] CFI Enabled
2,315,163 UART: [fht] FMC Alias Private Key: 7
2,433,454 UART: [art] Extend RT PCRs Done
2,433,882 UART: [art] Lock RT PCRs Done
2,435,248 UART: [art] Populate DV Done
2,443,248 UART: [fht] FMC Alias Private Key: 7
2,444,396 UART: [art] Derive CDI
2,444,676 UART: [art] Store in slot 0x4
2,530,295 UART: [art] Derive Key Pair
2,530,655 UART: [art] Store priv key in slot 0x5
2,543,999 UART: [art] Derive Key Pair - Done
2,558,804 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,553 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,318 UART: [art] PUB.X = 7353CDEDEDD111FE09AB02569880FB4BB52082648A58670AB0A313AB7A8CB231166C71212BFFFF04294066F2779692D6
2,582,078 UART: [art] PUB.Y = 3109A1A38AFA11DF6EA2C3828F614D608AAE17B3A9BB11123312918B1AAF86E20434B9D045600C74D3FFEEB1E25CF9EC
2,589,033 UART: [art] SIG.R = D7122FCF44BBC5A6B07BE164D2D998F7A8082515FA2BF08FB0C07B31FC1526D89C50626C725896C5240B6C2916F231AF
2,595,803 UART: [art] SIG.S = F35E3B6422BBF737EE245F2EB7C8AC7C48EA190406D557B277D1571F1804FB00F86A25580F6CF3938E840877FFA4505D
2,619,986 UART: mbox::rt_entry...
2,620,358 UART: ____ _ _ _ ____ _____
2,621,142 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,942 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,710 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,478 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,246 UART: |_|
2,624,558 UART:
2,742,197 UART: [rt] Runtime listening for mailbox commands...
2,742,959 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,743,185 >>> mbox cmd response data (0 bytes)
2,743,187 writing to cptra_bootfsm_go
3,725,205 UART:
3,725,221 UART: Running Caliptra FMC ...
3,725,629 UART:
3,725,772 UART: [state] CFI Enabled
3,727,055 UART: [art] Skip pcr extension
3,727,464 UART: [art] Extend RT PCRs Done
3,727,892 UART: [art] Lock RT PCRs Done
3,728,897 UART: [art] Populate DV Done
3,737,147 UART: [fht] FMC Alias Private Key: 7
3,738,141 UART: [art] Derive CDI
3,738,421 UART: [art] Store in slot 0x4
3,823,754 UART: [art] Derive Key Pair
3,824,114 UART: [art] Store priv key in slot 0x5
3,837,098 UART: [art] Derive Key Pair - Done
3,851,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,867,342 UART: [art] Erasing AUTHORITY.KEYID = 7
3,868,107 UART: [art] PUB.X = 7353CDEDEDD111FE09AB02569880FB4BB52082648A58670AB0A313AB7A8CB231166C71212BFFFF04294066F2779692D6
3,874,867 UART: [art] PUB.Y = 3109A1A38AFA11DF6EA2C3828F614D608AAE17B3A9BB11123312918B1AAF86E20434B9D045600C74D3FFEEB1E25CF9EC
3,881,822 UART: [art] SIG.R = D7122FCF44BBC5A6B07BE164D2D998F7A8082515FA2BF08FB0C07B31FC1526D89C50626C725896C5240B6C2916F231AF
3,888,592 UART: [art] SIG.S = F35E3B6422BBF737EE245F2EB7C8AC7C48EA190406D557B277D1571F1804FB00F86A25580F6CF3938E840877FFA4505D
3,911,949 UART: mbox::rt_entry...
3,912,321 UART: ____ _ _ _ ____ _____
3,913,105 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,913,905 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,914,673 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,915,441 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,916,209 UART: |_|
3,916,521 UART:
4,293,342 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,857 UART: [state] LifecycleState = Production
86,465 UART: [state] DebugLocked = Yes
87,039 UART: [state] Starting the WD Timer 40000000 cycles
88,514 UART: [kat] SHA2-256
894,164 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,289 UART: [kat] ++
898,441 UART: [kat] sha1
902,699 UART: [kat] SHA2-256
904,639 UART: [kat] SHA2-384
907,442 UART: [kat] SHA2-512-ACC
909,343 UART: [kat] ECC-384
918,660 UART: [kat] HMAC-384Kdf
923,030 UART: [kat] LMS
1,171,358 UART: [kat] --
1,172,239 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,329 UART: [idev] ++
1,175,497 UART: [idev] CDI.KEYID = 6
1,175,857 UART: [idev] SUBJECT.KEYID = 7
1,176,281 UART: [idev] UDS.KEYID = 0
1,176,626 ready_for_fw is high
1,176,626 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,220 UART: [idev] Erasing UDS.KEYID = 0
1,201,394 UART: [idev] Sha1 KeyId Algorithm
1,209,917 UART: [idev] --
1,211,087 UART: [ldev] ++
1,211,255 UART: [ldev] CDI.KEYID = 6
1,211,618 UART: [ldev] SUBJECT.KEYID = 5
1,212,044 UART: [ldev] AUTHORITY.KEYID = 7
1,212,507 UART: [ldev] FE.KEYID = 1
1,217,625 UART: [ldev] Erasing FE.KEYID = 1
1,244,064 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,831 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,525 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,397 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,103 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,154 UART: [ldev] --
1,283,463 UART: [fwproc] Wait for Commands...
1,284,163 UART: [fwproc] Recv command 0x46574c44
1,284,891 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,921 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,272,933 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,103 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,779 >>> mbox cmd response: success
2,391,884 UART: [afmc] ++
2,392,052 UART: [afmc] CDI.KEYID = 6
2,392,414 UART: [afmc] SUBJECT.KEYID = 7
2,392,839 UART: [afmc] AUTHORITY.KEYID = 5
2,428,560 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,445,027 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,445,775 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,451,490 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,457,375 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,463,080 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,794 UART: [afmc] --
2,471,837 UART: [cold-reset] --
2,472,607 UART: [state] Locking Datavault
2,473,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,474,424 UART: [state] Locking ICCM
2,475,000 UART: [exit] Launching FMC @ 0x40000130
2,480,330 UART:
2,480,346 UART: Running Caliptra FMC ...
2,480,754 UART:
2,480,808 UART: [state] CFI Enabled
2,491,276 UART: [fht] FMC Alias Private Key: 7
2,609,665 UART: [art] Extend RT PCRs Done
2,610,093 UART: [art] Lock RT PCRs Done
2,611,805 UART: [art] Populate DV Done
2,619,747 UART: [fht] FMC Alias Private Key: 7
2,620,679 UART: [art] Derive CDI
2,620,959 UART: [art] Store in slot 0x4
2,706,742 UART: [art] Derive Key Pair
2,707,102 UART: [art] Store priv key in slot 0x5
2,720,422 UART: [art] Derive Key Pair - Done
2,735,434 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,750,329 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,094 UART: [art] PUB.X = B33ADE5DC55DA86DEBBA6549D5EA78EF0CAE6195A386B45C1E9707B7DB73A7736A1419D1E1B78AE9AA520D528F226C6A
2,757,875 UART: [art] PUB.Y = 9C134C3DF3DC187103B6BF82723CFE379308B048F7F59F93322A70C861BE83D2047F4D6B057930C631E0062EEE4F3823
2,764,808 UART: [art] SIG.R = BDD19AEA168E34E7773B585CC38644EF634A28DC74570ED67B9CB6D7C0194BEAA4E0D1F1E434B708FF9E7254ACC105E0
2,771,585 UART: [art] SIG.S = A88ACC7C85B87D12A9E9A96446810C1EE990EF25CD5A3EB49BA825B3B6EFE4D67F2F78AEF989AB7BDC84D9F5ACF7551D
2,794,960 UART: mbox::rt_entry...
2,795,332 UART: ____ _ _ _ ____ _____
2,796,116 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,796,916 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,797,684 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,798,452 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,799,220 UART: |_|
2,799,532 UART:
2,918,069 UART: [rt] Runtime listening for mailbox commands...
2,918,831 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,919,057 >>> mbox cmd response data (0 bytes)
2,919,059 writing to cptra_bootfsm_go
2,919,151 UART:
2,919,167 UART: Running Caliptra ROM ...
2,919,575 UART:
2,919,630 UART: [state] CFI Enabled
2,922,627 UART: [state] LifecycleState = Production
2,923,235 UART: [state] DebugLocked = Yes
2,923,991 UART: [state] Starting the WD Timer 40000000 cycles
2,925,528 UART: [kat] SHA2-256
3,731,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,735,303 UART: [kat] ++
3,735,455 UART: [kat] sha1
3,739,659 UART: [kat] SHA2-256
3,741,599 UART: [kat] SHA2-384
3,744,240 UART: [kat] SHA2-512-ACC
3,746,141 UART: [kat] ECC-384
3,755,836 UART: [kat] HMAC-384Kdf
3,760,454 UART: [kat] LMS
4,008,782 UART: [kat] --
4,009,816 UART: [warm-reset] ++
4,010,717 UART: [warm-reset] --
4,011,360 UART: [state] Locking Datavault
4,012,308 UART: [state] Locking PCR0, PCR1 and PCR31
4,012,912 UART: [state] Locking ICCM
4,013,420 UART: [exit] Launching FMC @ 0x40000130
4,018,750 UART:
4,018,766 UART: Running Caliptra FMC ...
4,019,174 UART:
4,019,228 UART: [state] CFI Enabled
4,020,789 UART: [art] Skip pcr extension
4,021,198 UART: [art] Extend RT PCRs Done
4,021,626 UART: [art] Lock RT PCRs Done
4,022,927 UART: [art] Populate DV Done
4,031,163 UART: [fht] FMC Alias Private Key: 7
4,032,235 UART: [art] Derive CDI
4,032,515 UART: [art] Store in slot 0x4
4,118,410 UART: [art] Derive Key Pair
4,118,770 UART: [art] Store priv key in slot 0x5
4,131,418 UART: [art] Derive Key Pair - Done
4,145,888 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,161,467 UART: [art] Erasing AUTHORITY.KEYID = 7
4,162,232 UART: [art] PUB.X = B33ADE5DC55DA86DEBBA6549D5EA78EF0CAE6195A386B45C1E9707B7DB73A7736A1419D1E1B78AE9AA520D528F226C6A
4,169,013 UART: [art] PUB.Y = 9C134C3DF3DC187103B6BF82723CFE379308B048F7F59F93322A70C861BE83D2047F4D6B057930C631E0062EEE4F3823
4,175,946 UART: [art] SIG.R = BDD19AEA168E34E7773B585CC38644EF634A28DC74570ED67B9CB6D7C0194BEAA4E0D1F1E434B708FF9E7254ACC105E0
4,182,723 UART: [art] SIG.S = A88ACC7C85B87D12A9E9A96446810C1EE990EF25CD5A3EB49BA825B3B6EFE4D67F2F78AEF989AB7BDC84D9F5ACF7551D
4,206,442 UART: mbox::rt_entry...
4,206,814 UART: ____ _ _ _ ____ _____
4,207,598 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,208,398 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,209,166 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,209,934 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,210,702 UART: |_|
4,211,014 UART:
4,591,743 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,280 ready_for_fw is high
1,060,280 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,242,152 >>> mbox cmd response: success
2,305,076 UART:
2,305,092 UART: Running Caliptra FMC ...
2,305,500 UART:
2,305,554 UART: [state] CFI Enabled
2,315,870 UART: [fht] FMC Alias Private Key: 7
2,434,161 UART: [art] Extend RT PCRs Done
2,434,589 UART: [art] Lock RT PCRs Done
2,435,999 UART: [art] Populate DV Done
2,444,149 UART: [fht] FMC Alias Private Key: 7
2,445,127 UART: [art] Derive CDI
2,445,407 UART: [art] Store in slot 0x4
2,530,854 UART: [art] Derive Key Pair
2,531,214 UART: [art] Store priv key in slot 0x5
2,544,616 UART: [art] Derive Key Pair - Done
2,559,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,574,642 UART: [art] Erasing AUTHORITY.KEYID = 7
2,575,407 UART: [art] PUB.X = 9ED4C807D2EC093CE92AAE7EE5941A09ECB932056058B6EC7EC7A2EC16BDA00B65C6A33C2DFB14CA5A4790519734FC2C
2,582,182 UART: [art] PUB.Y = 1EE6AE18A5321F787130E617DD3897774F4FAD7DA4221E01FF6B101482BE432BCFE192B38C79B4ECB6F7777B666BE041
2,589,137 UART: [art] SIG.R = 2C4668F2C61F511C76E643DBE2C51C9DB8785858C3436CAD0F536115B763007A98C1125E745CA9BD82AC12A88DB03DA0
2,595,886 UART: [art] SIG.S = FCB072610357C328993E434137E7101A27C1BFF25695888CD34BB76208701D900AAE0741F5A0D204A7A60C17F199F055
2,619,996 UART: mbox::rt_entry...
2,620,368 UART: ____ _ _ _ ____ _____
2,621,152 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,621,952 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,622,720 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,623,488 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,624,256 UART: |_|
2,624,568 UART:
2,743,395 UART: [rt] Runtime listening for mailbox commands...
2,744,157 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,744,383 >>> mbox cmd response data (0 bytes)
2,744,385 writing to cptra_bootfsm_go
3,727,594 UART:
3,727,610 UART: Running Caliptra FMC ...
3,728,018 UART:
3,728,072 UART: [state] CFI Enabled
3,729,553 UART: [art] Skip pcr extension
3,729,962 UART: [art] Extend RT PCRs Done
3,730,390 UART: [art] Lock RT PCRs Done
3,731,639 UART: [art] Populate DV Done
3,739,907 UART: [fht] FMC Alias Private Key: 7
3,740,873 UART: [art] Derive CDI
3,741,153 UART: [art] Store in slot 0x4
3,826,924 UART: [art] Derive Key Pair
3,827,284 UART: [art] Store priv key in slot 0x5
3,841,072 UART: [art] Derive Key Pair - Done
3,855,605 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,870,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,871,535 UART: [art] PUB.X = 9ED4C807D2EC093CE92AAE7EE5941A09ECB932056058B6EC7EC7A2EC16BDA00B65C6A33C2DFB14CA5A4790519734FC2C
3,878,310 UART: [art] PUB.Y = 1EE6AE18A5321F787130E617DD3897774F4FAD7DA4221E01FF6B101482BE432BCFE192B38C79B4ECB6F7777B666BE041
3,885,265 UART: [art] SIG.R = 2C4668F2C61F511C76E643DBE2C51C9DB8785858C3436CAD0F536115B763007A98C1125E745CA9BD82AC12A88DB03DA0
3,892,014 UART: [art] SIG.S = FCB072610357C328993E434137E7101A27C1BFF25695888CD34BB76208701D900AAE0741F5A0D204A7A60C17F199F055
3,915,572 UART: mbox::rt_entry...
3,915,944 UART: ____ _ _ _ ____ _____
3,916,728 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,917,528 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,918,296 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,919,064 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,919,832 UART: |_|
3,920,144 UART:
4,305,703 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Production
86,044 UART: [state] DebugLocked = Yes
86,776 UART: [state] Starting the WD Timer 40000000 cycles
88,303 UART: [kat] SHA2-256
893,953 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,078 UART: [kat] ++
898,230 UART: [kat] sha1
902,476 UART: [kat] SHA2-256
904,416 UART: [kat] SHA2-384
907,159 UART: [kat] SHA2-512-ACC
909,060 UART: [kat] ECC-384
918,957 UART: [kat] HMAC-384Kdf
923,551 UART: [kat] LMS
1,171,879 UART: [kat] --
1,172,788 UART: [cold-reset] ++
1,173,139 UART: [fht] FHT @ 0x50003400
1,175,852 UART: [idev] ++
1,176,020 UART: [idev] CDI.KEYID = 6
1,176,380 UART: [idev] SUBJECT.KEYID = 7
1,176,804 UART: [idev] UDS.KEYID = 0
1,177,149 ready_for_fw is high
1,177,149 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
1,184,837 UART: [idev] Erasing UDS.KEYID = 0
1,201,679 UART: [idev] Sha1 KeyId Algorithm
1,210,054 UART: [idev] --
1,211,104 UART: [ldev] ++
1,211,272 UART: [ldev] CDI.KEYID = 6
1,211,635 UART: [ldev] SUBJECT.KEYID = 5
1,212,061 UART: [ldev] AUTHORITY.KEYID = 7
1,212,524 UART: [ldev] FE.KEYID = 1
1,217,988 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,818 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,512 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,384 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,090 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,211 UART: [ldev] --
1,283,600 UART: [fwproc] Wait for Commands...
1,284,298 UART: [fwproc] Recv command 0x46574c44
1,285,026 UART: [fwproc] Recv'd Img size: 82832 bytes
2,245,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,273,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,304,240 UART: [fwproc] Load Runtime at address 0x40005000 len 56904
2,390,970 >>> mbox cmd response: success
2,392,131 UART: [afmc] ++
2,392,299 UART: [afmc] CDI.KEYID = 6
2,392,661 UART: [afmc] SUBJECT.KEYID = 7
2,393,086 UART: [afmc] AUTHORITY.KEYID = 5
2,428,463 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,444,844 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,445,592 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,451,307 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,457,192 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,462,897 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,470,703 UART: [afmc] --
2,471,654 UART: [cold-reset] --
2,472,420 UART: [state] Locking Datavault
2,473,349 UART: [state] Locking PCR0, PCR1 and PCR31
2,473,953 UART: [state] Locking ICCM
2,474,511 UART: [exit] Launching FMC @ 0x40000130
2,479,841 UART:
2,479,857 UART: Running Caliptra FMC ...
2,480,265 UART:
2,480,408 UART: [state] CFI Enabled
2,490,664 UART: [fht] FMC Alias Private Key: 7
2,608,901 UART: [art] Extend RT PCRs Done
2,609,329 UART: [art] Lock RT PCRs Done
2,610,967 UART: [art] Populate DV Done
2,619,143 UART: [fht] FMC Alias Private Key: 7
2,620,075 UART: [art] Derive CDI
2,620,355 UART: [art] Store in slot 0x4
2,706,328 UART: [art] Derive Key Pair
2,706,688 UART: [art] Store priv key in slot 0x5
2,720,832 UART: [art] Derive Key Pair - Done
2,735,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,751,104 UART: [art] Erasing AUTHORITY.KEYID = 7
2,751,869 UART: [art] PUB.X = 5B9902CB351DF01A8563DAE49F4290C8BF18E9A11C858A89593753280874A91F8BDE086F390412DD47E476D1EC59E414
2,758,625 UART: [art] PUB.Y = BC93C74FB57B50FE4A888BD6F9E0DB6DFF827C2A27AB66C0854DDDAB850A8187AAB2153DC6B2C292AE723E1DED6E925B
2,765,598 UART: [art] SIG.R = 4F057EB4594CE3513B2F024F8D9FE65D55D8F3E0677E62813AEE91A42B21234ABF2CD7C32CE0F0797F2DEA6CC509FFC5
2,772,375 UART: [art] SIG.S = 363E3EB30EB177803AD8F6CE76566AA3ECEE03BB64C232DA5AFC6D54935498843D6949422FF15690915EBC01FFED47C6
2,796,254 UART: mbox::rt_entry...
2,796,626 UART: ____ _ _ _ ____ _____
2,797,410 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,798,210 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,798,978 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,799,746 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,800,514 UART: |_|
2,800,826 UART:
2,919,578 UART: [rt] Runtime listening for mailbox commands...
2,920,340 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,920,566 >>> mbox cmd response data (0 bytes)
2,920,568 writing to cptra_bootfsm_go
2,920,660 UART:
2,920,676 UART: Running Caliptra ROM ...
2,921,084 UART:
2,921,226 UART: [state] CFI Enabled
2,924,421 UART: [state] LifecycleState = Production
2,925,029 UART: [state] DebugLocked = Yes
2,925,551 UART: [state] Starting the WD Timer 40000000 cycles
2,927,194 UART: [kat] SHA2-256
3,732,844 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
3,736,969 UART: [kat] ++
3,737,121 UART: [kat] sha1
3,741,283 UART: [kat] SHA2-256
3,743,223 UART: [kat] SHA2-384
3,745,836 UART: [kat] SHA2-512-ACC
3,747,737 UART: [kat] ECC-384
3,757,442 UART: [kat] HMAC-384Kdf
3,761,960 UART: [kat] LMS
4,010,288 UART: [kat] --
4,011,138 UART: [warm-reset] ++
4,011,915 UART: [warm-reset] --
4,012,768 UART: [state] Locking Datavault
4,013,746 UART: [state] Locking PCR0, PCR1 and PCR31
4,014,350 UART: [state] Locking ICCM
4,014,934 UART: [exit] Launching FMC @ 0x40000130
4,020,264 UART:
4,020,280 UART: Running Caliptra FMC ...
4,020,688 UART:
4,020,831 UART: [state] CFI Enabled
4,022,188 UART: [art] Skip pcr extension
4,022,597 UART: [art] Extend RT PCRs Done
4,023,025 UART: [art] Lock RT PCRs Done
4,024,298 UART: [art] Populate DV Done
4,032,646 UART: [fht] FMC Alias Private Key: 7
4,033,700 UART: [art] Derive CDI
4,033,980 UART: [art] Store in slot 0x4
4,119,741 UART: [art] Derive Key Pair
4,120,101 UART: [art] Store priv key in slot 0x5
4,133,711 UART: [art] Derive Key Pair - Done
4,148,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,164,003 UART: [art] Erasing AUTHORITY.KEYID = 7
4,164,768 UART: [art] PUB.X = 5B9902CB351DF01A8563DAE49F4290C8BF18E9A11C858A89593753280874A91F8BDE086F390412DD47E476D1EC59E414
4,171,524 UART: [art] PUB.Y = BC93C74FB57B50FE4A888BD6F9E0DB6DFF827C2A27AB66C0854DDDAB850A8187AAB2153DC6B2C292AE723E1DED6E925B
4,178,497 UART: [art] SIG.R = 4F057EB4594CE3513B2F024F8D9FE65D55D8F3E0677E62813AEE91A42B21234ABF2CD7C32CE0F0797F2DEA6CC509FFC5
4,185,274 UART: [art] SIG.S = 363E3EB30EB177803AD8F6CE76566AA3ECEE03BB64C232DA5AFC6D54935498843D6949422FF15690915EBC01FFED47C6
4,208,739 UART: mbox::rt_entry...
4,209,111 UART: ____ _ _ _ ____ _____
4,209,895 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
4,210,695 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
4,211,463 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
4,212,231 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
4,212,999 UART: |_|
4,213,311 UART:
4,594,273 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,175 ready_for_fw is high
1,061,175 <<< Executing mbox cmd 0x46574c44 (82832 bytes) from SoC
2,243,905 >>> mbox cmd response: success
2,306,113 UART:
2,306,129 UART: Running Caliptra FMC ...
2,306,537 UART:
2,306,680 UART: [state] CFI Enabled
2,317,142 UART: [fht] FMC Alias Private Key: 7
2,435,857 UART: [art] Extend RT PCRs Done
2,436,285 UART: [art] Lock RT PCRs Done
2,437,671 UART: [art] Populate DV Done
2,445,871 UART: [fht] FMC Alias Private Key: 7
2,446,929 UART: [art] Derive CDI
2,447,209 UART: [art] Store in slot 0x4
2,533,200 UART: [art] Derive Key Pair
2,533,560 UART: [art] Store priv key in slot 0x5
2,547,740 UART: [art] Derive Key Pair - Done
2,562,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
2,578,459 UART: [art] Erasing AUTHORITY.KEYID = 7
2,579,224 UART: [art] PUB.X = EF49C05720E75A92BCA17302EB063D032E5D4E96C954B08B384D3CA398FC60DC539221D30ACA87A8FED12FD40453258A
2,585,987 UART: [art] PUB.Y = 0D38954C2B5425B202C87CC1B9AF82B207161DFE7B543C21A0F9C308D996E310406A9C7B37FAF042BA4CF0EDE1B1F213
2,592,935 UART: [art] SIG.R = 74147501AB60E7FEF02B0E0C6623DF41045482BD66EDC5C809AD1CF00DA9740511F62F51D3F7998040096693522FF9CE
2,599,681 UART: [art] SIG.S = 59B709EB3E7236FA01032120AFCC9D39DDC33A0952C408EB47FDF0D2BF53637FC811B3AC1D895322D7E7A54687A4AFBD
2,623,270 UART: mbox::rt_entry...
2,623,642 UART: ____ _ _ _ ____ _____
2,624,426 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
2,625,226 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
2,625,994 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
2,626,762 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
2,627,530 UART: |_|
2,627,842 UART:
2,745,418 UART: [rt] Runtime listening for mailbox commands...
2,746,180 <<< Executing mbox cmd 0xd0000000 (48 bytes) from SoC
2,746,406 >>> mbox cmd response data (0 bytes)
2,746,408 writing to cptra_bootfsm_go
3,729,704 UART:
3,729,720 UART: Running Caliptra FMC ...
3,730,128 UART:
3,730,271 UART: [state] CFI Enabled
3,731,548 UART: [art] Skip pcr extension
3,731,957 UART: [art] Extend RT PCRs Done
3,732,385 UART: [art] Lock RT PCRs Done
3,733,730 UART: [art] Populate DV Done
3,741,938 UART: [fht] FMC Alias Private Key: 7
3,743,098 UART: [art] Derive CDI
3,743,378 UART: [art] Store in slot 0x4
3,829,261 UART: [art] Derive Key Pair
3,829,621 UART: [art] Store priv key in slot 0x5
3,842,805 UART: [art] Derive Key Pair - Done
3,857,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,872,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,873,517 UART: [art] PUB.X = EF49C05720E75A92BCA17302EB063D032E5D4E96C954B08B384D3CA398FC60DC539221D30ACA87A8FED12FD40453258A
3,880,280 UART: [art] PUB.Y = 0D38954C2B5425B202C87CC1B9AF82B207161DFE7B543C21A0F9C308D996E310406A9C7B37FAF042BA4CF0EDE1B1F213
3,887,228 UART: [art] SIG.R = 74147501AB60E7FEF02B0E0C6623DF41045482BD66EDC5C809AD1CF00DA9740511F62F51D3F7998040096693522FF9CE
3,893,974 UART: [art] SIG.S = 59B709EB3E7236FA01032120AFCC9D39DDC33A0952C408EB47FDF0D2BF53637FC811B3AC1D895322D7E7A54687A4AFBD
3,918,243 UART: mbox::rt_entry...
3,918,615 UART: ____ _ _ _ ____ _____
3,919,399 UART: / ___|__ _| (_)_ __ | |_ _ __ __ _ | _ \_ _|
3,920,199 UART: | | / _` | | | '_ \| __| '__/ _` | | |_) || |
3,920,967 UART: | |__| (_| | | | |_) | |_| | | (_| | | _ < | |
3,921,735 UART: \____\__,_|_|_| .__/ \__|_| \__,_| |_| \_\|_|
3,922,503 UART: |_|
3,922,815 UART:
4,303,499 UART: [rt] Runtime listening for mailbox commands...
test test_warm_reset::test_rt_journey_pcr_validation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 152 filtered out; finished in 1.51s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test git::tests::test_commit_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_from_str ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test bits::tests::test_new ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test lexer::test::test_foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_scope_def ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_stuff ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test scope::tests::test_type_instantiation ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test string_arena::test::foo ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.04s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.02s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_derive_ecdsa_keypair ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_drbg_keygen ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_hmac384_kdf ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_is_valid_privkey ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test crypto::test_pubkey_ecdsa_der ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_cert_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_fmc_alias_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_derive_pcr0 ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_doe_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_idevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_issuer_serial_number ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_key_id ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test derive::test_ldevid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test redact::test_redact ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_none - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_none' panicked at 'No item found', test/src/unwrap_single.rs:30:28
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test unwrap_single::test_single ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test unwrap_single::test_two - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
stderr:
thread 'unwrap_single::test_two' panicked at 'More than one item found', test/src/unwrap_single.rs:36:30
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_get_cert_extension ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.01s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_replace_sig ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_find_multiple_in_cert_when_no_tcb_info ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test x509::test_tcb_info_parse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 23 filtered out; finished in 0.00s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.25s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.37s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.31s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.34s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.35s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.30s
running 1 test
test build_test::test_hw_1_0_bin_identical ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,060 UART:
192,442 UART: Running Caliptra ROM ...
193,652 UART:
193,805 UART: [state] CFI Enabled
269,450 UART: [state] LifecycleState = Unprovisioned
271,213 UART: [state] DebugLocked = No
272,961 UART: [state] WD Timer not started. Device not locked for debugging
277,998 UART: [fake-rom-cold-reset] ++
280,320 ready_for_fw is high
280,605 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
410,131 UART: [fht] FHT @ 0x50003400
411,254 UART: [fwproc] Wait for Commands...
412,459 UART: [fwproc] Recv command 0x46574c44
413,879 UART: [fwproc] Recv'd Img size: 102604 bytes
1,770,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,841,546 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,868,991 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,428,360 >>> mbox cmd response: success
2,434,233 UART: [fake-rom-cold-reset] --
2,436,885 UART: [state] Locking Datavault
2,442,198 UART: [state] Locking PCR0, PCR1 and PCR31
2,443,798 UART: [state] Locking ICCM
2,446,083 UART: [exit] Launching FMC @ 0x40000130
2,454,424 UART:
2,454,663 UART: Running Caliptra FMC ...
2,455,706 UART:
2,455,851 UART: [state] CFI Enabled
2,517,560 UART: Caliptra RT
2,518,265 UART: [state] CFI Enabled
2,703,169 UART: [rt] RT listening for mailbox commands...
2,705,342 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,735,325 UART: [rt]cmd =0x4c444556, len=4
2,746,690 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,154,762 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,184,337 UART: [rt]cmd =0x43455246, len=4
3,196,897 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,937 writing to cptra_bootfsm_go
191,958 UART:
192,324 UART: Running Caliptra ROM ...
193,518 UART:
193,671 UART: [state] CFI Enabled
266,868 UART: [state] LifecycleState = Unprovisioned
268,583 UART: [state] DebugLocked = No
269,910 UART: [state] WD Timer not started. Device not locked for debugging
274,454 UART: [fake-rom-cold-reset] ++
276,736 ready_for_fw is high
277,038 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
405,829 UART: [fht] FHT @ 0x50003400
406,923 UART: [fwproc] Wait for Commands...
408,213 UART: [fwproc] Recv command 0x46574c44
409,635 UART: [fwproc] Recv'd Img size: 102604 bytes
1,764,612 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,842,140 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,869,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,429,217 >>> mbox cmd response: success
2,435,078 UART: [fake-rom-cold-reset] --
2,438,079 UART: [state] Locking Datavault
2,442,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,444,387 UART: [state] Locking ICCM
2,445,756 UART: [exit] Launching FMC @ 0x40000130
2,454,148 UART:
2,454,381 UART: Running Caliptra FMC ...
2,455,407 UART:
2,455,552 UART: [state] CFI Enabled
2,517,823 UART: Caliptra RT
2,518,504 UART: [state] CFI Enabled
2,702,863 UART: [rt] RT listening for mailbox commands...
2,705,031 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,734,910 UART: [rt]cmd =0x4c444556, len=4
2,745,899 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,154,974 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,184,736 UART: [rt]cmd =0x43455246, len=4
3,197,428 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,945 writing to cptra_bootfsm_go
193,006 UART:
193,386 UART: Running Caliptra ROM ...
194,590 UART:
603,994 UART: [state] CFI Enabled
616,930 UART: [state] LifecycleState = Unprovisioned
618,656 UART: [state] DebugLocked = No
619,897 UART: [state] WD Timer not started. Device not locked for debugging
624,353 UART: [fake-rom-cold-reset] ++
626,674 ready_for_fw is high
626,932 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
755,693 UART: [fht] FHT @ 0x50003400
756,783 UART: [fwproc] Wait for Commands...
758,068 UART: [fwproc] Recv command 0x46574c44
759,482 UART: [fwproc] Recv'd Img size: 102604 bytes
2,110,449 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,178,224 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,205,642 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,765,145 >>> mbox cmd response: success
2,770,969 UART: [fake-rom-cold-reset] --
2,773,884 UART: [state] Locking Datavault
2,778,760 UART: [state] Locking PCR0, PCR1 and PCR31
2,780,309 UART: [state] Locking ICCM
2,782,679 UART: [exit] Launching FMC @ 0x40000130
2,791,078 UART:
2,791,322 UART: Running Caliptra FMC ...
2,792,427 UART:
2,792,581 UART: [state] CFI Enabled
2,796,418 UART: Caliptra RT
2,797,107 UART: [state] CFI Enabled
2,922,791 UART: [rt] RT listening for mailbox commands...
2,924,949 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,954,720 UART: [rt]cmd =0x4c444556, len=4
2,966,099 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,373,518 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,403,289 UART: [rt]cmd =0x43455246, len=4
3,416,047 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,133 writing to cptra_bootfsm_go
194,273 UART:
194,633 UART: Running Caliptra ROM ...
195,836 UART:
605,466 UART: [state] CFI Enabled
617,646 UART: [state] LifecycleState = Unprovisioned
619,316 UART: [state] DebugLocked = No
620,850 UART: [state] WD Timer not started. Device not locked for debugging
625,597 UART: [fake-rom-cold-reset] ++
627,914 ready_for_fw is high
628,167 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
757,075 UART: [fht] FHT @ 0x50003400
758,185 UART: [fwproc] Wait for Commands...
759,478 UART: [fwproc] Recv command 0x46574c44
760,896 UART: [fwproc] Recv'd Img size: 102604 bytes
2,113,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,184,618 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,212,023 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,771,791 >>> mbox cmd response: success
2,777,648 UART: [fake-rom-cold-reset] --
2,781,711 UART: [state] Locking Datavault
2,787,409 UART: [state] Locking PCR0, PCR1 and PCR31
2,788,952 UART: [state] Locking ICCM
2,789,862 UART: [exit] Launching FMC @ 0x40000130
2,798,263 UART:
2,798,505 UART: Running Caliptra FMC ...
2,799,608 UART:
2,799,763 UART: [state] CFI Enabled
2,803,554 UART: Caliptra RT
2,804,289 UART: [state] CFI Enabled
2,929,265 UART: [rt] RT listening for mailbox commands...
2,931,484 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,961,212 UART: [rt]cmd =0x4c444556, len=4
2,972,466 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,381,004 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,410,736 UART: [rt]cmd =0x43455246, len=4
3,423,524 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,906 writing to cptra_bootfsm_go
191,977 UART:
192,353 UART: Running Caliptra ROM ...
193,494 UART:
193,642 UART: [state] CFI Enabled
264,079 UART: [state] LifecycleState = Unprovisioned
265,852 UART: [state] DebugLocked = No
267,817 UART: [state] WD Timer not started. Device not locked for debugging
271,849 UART: [fake-rom-cold-reset] ++
274,107 ready_for_fw is high
274,367 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
403,448 UART: [fht] FHT @ 0x50003400
404,561 UART: [fwproc] Wait for Commands...
405,875 UART: [fwproc] Recv command 0x46574c44
407,290 UART: [fwproc] Recv'd Img size: 102604 bytes
1,768,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,841,460 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,868,865 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,428,982 >>> mbox cmd response: success
2,434,840 UART: [fake-rom-cold-reset] --
2,438,406 UART: [state] Locking Datavault
2,443,630 UART: [state] Locking PCR0, PCR1 and PCR31
2,445,220 UART: [state] Locking ICCM
2,446,869 UART: [exit] Launching FMC @ 0x40000130
2,455,281 UART:
2,455,524 UART: Running Caliptra FMC ...
2,456,633 UART:
2,456,799 UART: [state] CFI Enabled
2,517,610 UART: Caliptra RT
2,518,276 UART: [state] CFI Enabled
2,703,017 UART: [rt] RT listening for mailbox commands...
2,705,203 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,735,034 UART: [rt]cmd =0x4c444556, len=4
2,746,357 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,153,368 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,183,162 UART: [rt]cmd =0x43455246, len=4
3,195,879 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,071 UART:
192,455 UART: Running Caliptra ROM ...
193,650 UART:
193,809 UART: [state] CFI Enabled
265,004 UART: [state] LifecycleState = Unprovisioned
266,730 UART: [state] DebugLocked = No
269,391 UART: [state] WD Timer not started. Device not locked for debugging
272,857 UART: [fake-rom-cold-reset] ++
275,194 ready_for_fw is high
275,462 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
404,343 UART: [fht] FHT @ 0x50003400
405,443 UART: [fwproc] Wait for Commands...
406,738 UART: [fwproc] Recv command 0x46574c44
408,070 UART: [fwproc] Recv'd Img size: 102604 bytes
1,764,186 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,835,300 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,862,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,423,256 >>> mbox cmd response: success
2,429,142 UART: [fake-rom-cold-reset] --
2,431,582 UART: [state] Locking Datavault
2,436,488 UART: [state] Locking PCR0, PCR1 and PCR31
2,438,094 UART: [state] Locking ICCM
2,440,105 UART: [exit] Launching FMC @ 0x40000130
2,448,509 UART:
2,448,757 UART: Running Caliptra FMC ...
2,449,866 UART:
2,450,031 UART: [state] CFI Enabled
2,497,536 UART: Caliptra RT
2,498,184 UART: [state] CFI Enabled
2,682,724 UART: [rt] RT listening for mailbox commands...
2,684,889 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,714,875 UART: [rt]cmd =0x4c444556, len=4
2,726,019 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,132,918 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,162,475 UART: [rt]cmd =0x43455246, len=4
3,175,012 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,258 UART:
192,626 UART: Running Caliptra ROM ...
193,724 UART:
603,549 UART: [state] CFI Enabled
615,868 UART: [state] LifecycleState = Unprovisioned
617,540 UART: [state] DebugLocked = No
619,940 UART: [state] WD Timer not started. Device not locked for debugging
625,039 UART: [fake-rom-cold-reset] ++
627,366 ready_for_fw is high
627,620 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
756,503 UART: [fht] FHT @ 0x50003400
757,599 UART: [fwproc] Wait for Commands...
758,887 UART: [fwproc] Recv command 0x46574c44
760,299 UART: [fwproc] Recv'd Img size: 102604 bytes
2,113,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,189,313 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,216,718 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,775,683 >>> mbox cmd response: success
2,781,520 UART: [fake-rom-cold-reset] --
2,784,815 UART: [state] Locking Datavault
2,789,505 UART: [state] Locking PCR0, PCR1 and PCR31
2,791,105 UART: [state] Locking ICCM
2,792,562 UART: [exit] Launching FMC @ 0x40000130
2,800,921 UART:
2,801,158 UART: Running Caliptra FMC ...
2,802,265 UART:
2,802,427 UART: [state] CFI Enabled
2,806,333 UART: Caliptra RT
2,807,008 UART: [state] CFI Enabled
2,932,066 UART: [rt] RT listening for mailbox commands...
2,934,223 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,964,059 UART: [rt]cmd =0x4c444556, len=4
2,975,014 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,381,225 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,411,229 UART: [rt]cmd =0x43455246, len=4
3,423,963 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
192,383 UART:
192,760 UART: Running Caliptra ROM ...
194,145 UART:
603,357 UART: [state] CFI Enabled
618,717 UART: [state] LifecycleState = Unprovisioned
620,453 UART: [state] DebugLocked = No
622,898 UART: [state] WD Timer not started. Device not locked for debugging
629,010 UART: [fake-rom-cold-reset] ++
631,336 ready_for_fw is high
631,597 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
760,634 UART: [fht] FHT @ 0x50003400
761,736 UART: [fwproc] Wait for Commands...
763,026 UART: [fwproc] Recv command 0x46574c44
764,444 UART: [fwproc] Recv'd Img size: 102604 bytes
2,114,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,182,731 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,210,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,769,470 >>> mbox cmd response: success
2,775,314 UART: [fake-rom-cold-reset] --
2,778,503 UART: [state] Locking Datavault
2,782,406 UART: [state] Locking PCR0, PCR1 and PCR31
2,783,943 UART: [state] Locking ICCM
2,785,312 UART: [exit] Launching FMC @ 0x40000130
2,793,671 UART:
2,793,915 UART: Running Caliptra FMC ...
2,794,943 UART:
2,795,090 UART: [state] CFI Enabled
2,799,093 UART: Caliptra RT
2,799,785 UART: [state] CFI Enabled
2,924,424 UART: [rt] RT listening for mailbox commands...
2,926,595 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,956,360 UART: [rt]cmd =0x4c444556, len=4
2,967,610 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,374,483 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,404,371 UART: [rt]cmd =0x43455246, len=4
3,417,177 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,187 UART:
192,525 UART: Running Caliptra ROM ...
193,703 UART:
193,857 UART: [state] CFI Enabled
261,035 UART: [state] LifecycleState = Unprovisioned
262,803 UART: [state] DebugLocked = No
265,401 UART: [state] WD Timer not started. Device not locked for debugging
270,232 UART: [fake-rom-cold-reset] ++
272,554 ready_for_fw is high
272,810 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
401,779 UART: [fht] FHT @ 0x50003400
402,874 UART: [fwproc] Wait for Commands...
404,162 UART: [fwproc] Recv command 0x46574c44
405,575 UART: [fwproc] Recv'd Img size: 102604 bytes
1,759,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,832,786 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,860,184 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,419,467 >>> mbox cmd response: success
2,425,332 UART: [fake-rom-cold-reset] --
2,428,626 UART: [state] Locking Datavault
2,433,501 UART: [state] Locking PCR0, PCR1 and PCR31
2,435,040 UART: [state] Locking ICCM
2,436,764 UART: [exit] Launching FMC @ 0x40000130
2,445,155 UART:
2,445,392 UART: Running Caliptra FMC ...
2,446,493 UART:
2,446,669 UART: [state] CFI Enabled
2,495,311 UART: Caliptra RT
2,496,005 UART: [state] CFI Enabled
2,681,161 UART: [rt] RT listening for mailbox commands...
2,683,323 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,713,098 UART: [rt]cmd =0x4c444556, len=4
2,724,175 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,130,712 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,160,678 UART: [rt]cmd =0x43455246, len=4
3,173,325 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
191,998 UART:
192,353 UART: Running Caliptra ROM ...
193,456 UART:
193,594 UART: [state] CFI Enabled
264,124 UART: [state] LifecycleState = Unprovisioned
265,874 UART: [state] DebugLocked = No
267,181 UART: [state] WD Timer not started. Device not locked for debugging
271,358 UART: [fake-rom-cold-reset] ++
273,676 ready_for_fw is high
273,852 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
402,879 UART: [fht] FHT @ 0x50003400
403,984 UART: [fwproc] Wait for Commands...
405,184 UART: [fwproc] Recv command 0x46574c44
406,596 UART: [fwproc] Recv'd Img size: 102604 bytes
1,757,705 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,828,605 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,855,956 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,416,314 >>> mbox cmd response: success
2,422,160 UART: [fake-rom-cold-reset] --
2,425,699 UART: [state] Locking Datavault
2,432,460 UART: [state] Locking PCR0, PCR1 and PCR31
2,433,993 UART: [state] Locking ICCM
2,436,687 UART: [exit] Launching FMC @ 0x40000130
2,445,084 UART:
2,445,323 UART: Running Caliptra FMC ...
2,446,423 UART:
2,446,599 UART: [state] CFI Enabled
2,494,422 UART: Caliptra RT
2,495,062 UART: [state] CFI Enabled
2,680,299 UART: [rt] RT listening for mailbox commands...
2,682,483 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,712,530 UART: [rt]cmd =0x4c444556, len=4
2,723,681 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,129,648 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,159,574 UART: [rt]cmd =0x43455246, len=4
3,172,181 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,235 writing to cptra_bootfsm_go
192,287 UART:
192,650 UART: Running Caliptra ROM ...
193,749 UART:
603,312 UART: [state] CFI Enabled
620,803 UART: [state] LifecycleState = Unprovisioned
622,534 UART: [state] DebugLocked = No
624,428 UART: [state] WD Timer not started. Device not locked for debugging
629,673 UART: [fake-rom-cold-reset] ++
632,033 ready_for_fw is high
632,249 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
760,989 UART: [fht] FHT @ 0x50003400
762,079 UART: [fwproc] Wait for Commands...
763,286 UART: [fwproc] Recv command 0x46574c44
764,705 UART: [fwproc] Recv'd Img size: 102604 bytes
2,117,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,190,665 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,218,017 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,777,983 >>> mbox cmd response: success
2,783,886 UART: [fake-rom-cold-reset] --
2,786,642 UART: [state] Locking Datavault
2,793,043 UART: [state] Locking PCR0, PCR1 and PCR31
2,794,623 UART: [state] Locking ICCM
2,795,527 UART: [exit] Launching FMC @ 0x40000130
2,803,878 UART:
2,804,114 UART: Running Caliptra FMC ...
2,805,148 UART:
2,805,294 UART: [state] CFI Enabled
2,809,293 UART: Caliptra RT
2,809,980 UART: [state] CFI Enabled
2,935,994 UART: [rt] RT listening for mailbox commands...
2,938,144 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,967,883 UART: [rt]cmd =0x4c444556, len=4
2,979,071 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,386,652 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,416,527 UART: [rt]cmd =0x43455246, len=4
3,429,149 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ec1eb265624bc5986eb937b990c9a4690be44d165088fa16dfee5b8bcae87bdb75b921b08ba3629977947e719166d6b9",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,659 writing to cptra_bootfsm_go
192,955 UART:
193,336 UART: Running Caliptra ROM ...
194,456 UART:
604,053 UART: [state] CFI Enabled
615,305 UART: [state] LifecycleState = Unprovisioned
616,963 UART: [state] DebugLocked = No
618,132 UART: [state] WD Timer not started. Device not locked for debugging
623,096 UART: [fake-rom-cold-reset] ++
625,422 ready_for_fw is high
625,685 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
754,594 UART: [fht] FHT @ 0x50003400
755,689 UART: [fwproc] Wait for Commands...
756,889 UART: [fwproc] Recv command 0x46574c44
758,305 UART: [fwproc] Recv'd Img size: 102604 bytes
2,107,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,176,074 UART: [fwproc] Load FMC at address 0x40000000 len 4100
2,203,472 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,763,520 >>> mbox cmd response: success
2,769,410 UART: [fake-rom-cold-reset] --
2,771,366 UART: [state] Locking Datavault
2,775,818 UART: [state] Locking PCR0, PCR1 and PCR31
2,777,358 UART: [state] Locking ICCM
2,779,970 UART: [exit] Launching FMC @ 0x40000130
2,788,363 UART:
2,788,610 UART: Running Caliptra FMC ...
2,789,716 UART:
2,789,874 UART: [state] CFI Enabled
2,793,816 UART: Caliptra RT
2,794,501 UART: [state] CFI Enabled
2,920,133 UART: [rt] RT listening for mailbox commands...
2,922,301 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
2,952,095 UART: [rt]cmd =0x4c444556, len=4
2,963,411 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
3,370,053 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
3,399,803 UART: [rt]cmd =0x43455246, len=4
3,412,409 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,067 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
88,410 UART: [fake-rom-cold-reset] ++
89,338 ready_for_fw is high
89,338 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,502 UART: [fht] FHT @ 0x50003400
92,891 UART: [fwproc] Wait for Commands...
93,508 UART: [fwproc] Recv command 0x46574c44
94,236 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,201 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,574 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,802 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,084 >>> mbox cmd response: success
1,427,242 UART: [fake-rom-cold-reset] --
1,428,054 UART: [state] Locking Datavault
1,429,231 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,835 UART: [state] Locking ICCM
1,430,401 UART: [exit] Launching FMC @ 0x40000130
1,435,723 UART:
1,435,739 UART: Running Caliptra FMC ...
1,436,147 UART:
1,436,201 UART: [state] CFI Enabled
1,438,810 UART: Caliptra RT
1,439,061 UART: [state] CFI Enabled
1,550,047 UART: [rt] RT listening for mailbox commands...
1,550,717 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,525 UART: [rt]cmd =0x4c444556, len=4
1,591,077 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,078 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,620,587 UART: [rt]cmd =0x43455246, len=4
1,632,879 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,046 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
88,036 UART: [fake-rom-cold-reset] ++
88,964 ready_for_fw is high
88,964 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,178 UART: [fht] FHT @ 0x50003400
92,489 UART: [fwproc] Wait for Commands...
93,222 UART: [fwproc] Recv command 0x46574c44
93,950 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,814 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,042 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,318 >>> mbox cmd response: success
1,426,476 UART: [fake-rom-cold-reset] --
1,427,244 UART: [state] Locking Datavault
1,428,427 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,031 UART: [state] Locking ICCM
1,429,461 UART: [exit] Launching FMC @ 0x40000130
1,434,783 UART:
1,434,799 UART: Running Caliptra FMC ...
1,435,207 UART:
1,435,261 UART: [state] CFI Enabled
1,438,074 UART: Caliptra RT
1,438,325 UART: [state] CFI Enabled
1,550,905 UART: [rt] RT listening for mailbox commands...
1,551,575 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,607 UART: [rt]cmd =0x4c444556, len=4
1,591,967 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,968 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,177 UART: [rt]cmd =0x43455246, len=4
1,633,215 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,258 UART: [state] DebugLocked = No
86,843 UART: [state] WD Timer not started. Device not locked for debugging
88,329 UART: [fake-rom-cold-reset] ++
89,257 ready_for_fw is high
89,257 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,535 UART: [fht] FHT @ 0x50003400
92,964 UART: [fwproc] Wait for Commands...
93,769 UART: [fwproc] Recv command 0x46574c44
94,497 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,698 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,511 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,739 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,891 >>> mbox cmd response: success
1,428,049 UART: [fake-rom-cold-reset] --
1,428,859 UART: [state] Locking Datavault
1,430,052 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,656 UART: [state] Locking ICCM
1,431,292 UART: [exit] Launching FMC @ 0x40000130
1,436,614 UART:
1,436,630 UART: Running Caliptra FMC ...
1,437,038 UART:
1,437,179 UART: [state] CFI Enabled
1,440,013 UART: Caliptra RT
1,440,356 UART: [state] CFI Enabled
1,553,920 UART: [rt] RT listening for mailbox commands...
1,554,590 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,584,644 UART: [rt]cmd =0x4c444556, len=4
1,595,006 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,595,007 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,624,586 UART: [rt]cmd =0x43455246, len=4
1,636,646 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
88,089 UART: [fake-rom-cold-reset] ++
89,017 ready_for_fw is high
89,017 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,211 UART: [fht] FHT @ 0x50003400
92,626 UART: [fwproc] Wait for Commands...
93,221 UART: [fwproc] Recv command 0x46574c44
93,949 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,719 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,203 >>> mbox cmd response: success
1,426,361 UART: [fake-rom-cold-reset] --
1,427,213 UART: [state] Locking Datavault
1,428,610 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,214 UART: [state] Locking ICCM
1,429,880 UART: [exit] Launching FMC @ 0x40000130
1,435,202 UART:
1,435,218 UART: Running Caliptra FMC ...
1,435,626 UART:
1,435,767 UART: [state] CFI Enabled
1,438,655 UART: Caliptra RT
1,438,998 UART: [state] CFI Enabled
1,551,582 UART: [rt] RT listening for mailbox commands...
1,552,252 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,922 UART: [rt]cmd =0x4c444556, len=4
1,592,322 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,323 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,670 UART: [rt]cmd =0x43455246, len=4
1,633,668 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,288 UART: [state] WD Timer not started. Device not locked for debugging
87,898 UART: [fake-rom-cold-reset] ++
88,826 ready_for_fw is high
88,826 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,904 UART: [fht] FHT @ 0x50003400
92,333 UART: [fwproc] Wait for Commands...
92,942 UART: [fwproc] Recv command 0x46574c44
93,670 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,574 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,284,802 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,172 >>> mbox cmd response: success
1,426,330 UART: [fake-rom-cold-reset] --
1,427,238 UART: [state] Locking Datavault
1,428,279 UART: [state] Locking PCR0, PCR1 and PCR31
1,428,883 UART: [state] Locking ICCM
1,429,359 UART: [exit] Launching FMC @ 0x40000130
1,434,681 UART:
1,434,697 UART: Running Caliptra FMC ...
1,435,105 UART:
1,435,159 UART: [state] CFI Enabled
1,437,806 UART: Caliptra RT
1,438,057 UART: [state] CFI Enabled
1,550,099 UART: [rt] RT listening for mailbox commands...
1,550,769 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,580,409 UART: [rt]cmd =0x4c444556, len=4
1,590,743 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,590,744 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,619,833 UART: [rt]cmd =0x43455246, len=4
1,631,741 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,450 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [fake-rom-cold-reset] ++
88,680 ready_for_fw is high
88,680 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,970 UART: [fht] FHT @ 0x50003400
92,315 UART: [fwproc] Wait for Commands...
93,084 UART: [fwproc] Recv command 0x46574c44
93,812 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,931 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,492 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,720 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,427,096 >>> mbox cmd response: success
1,428,254 UART: [fake-rom-cold-reset] --
1,429,198 UART: [state] Locking Datavault
1,430,297 UART: [state] Locking PCR0, PCR1 and PCR31
1,430,901 UART: [state] Locking ICCM
1,431,551 UART: [exit] Launching FMC @ 0x40000130
1,436,873 UART:
1,436,889 UART: Running Caliptra FMC ...
1,437,297 UART:
1,437,351 UART: [state] CFI Enabled
1,440,176 UART: Caliptra RT
1,440,427 UART: [state] CFI Enabled
1,552,279 UART: [rt] RT listening for mailbox commands...
1,552,949 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,583,007 UART: [rt]cmd =0x4c444556, len=4
1,593,481 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,482 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,943 UART: [rt]cmd =0x43455246, len=4
1,635,029 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,563 UART: [state] WD Timer not started. Device not locked for debugging
87,963 UART: [fake-rom-cold-reset] ++
88,891 ready_for_fw is high
88,891 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,129 UART: [fht] FHT @ 0x50003400
92,530 UART: [fwproc] Wait for Commands...
93,213 UART: [fwproc] Recv command 0x46574c44
93,941 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,666 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,905 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,287,133 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,427,513 >>> mbox cmd response: success
1,428,671 UART: [fake-rom-cold-reset] --
1,429,581 UART: [state] Locking Datavault
1,431,002 UART: [state] Locking PCR0, PCR1 and PCR31
1,431,606 UART: [state] Locking ICCM
1,432,130 UART: [exit] Launching FMC @ 0x40000130
1,437,452 UART:
1,437,468 UART: Running Caliptra FMC ...
1,437,876 UART:
1,438,017 UART: [state] CFI Enabled
1,441,033 UART: Caliptra RT
1,441,376 UART: [state] CFI Enabled
1,554,352 UART: [rt] RT listening for mailbox commands...
1,555,022 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,584,984 UART: [rt]cmd =0x4c444556, len=4
1,595,410 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,595,411 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,624,666 UART: [rt]cmd =0x43455246, len=4
1,636,646 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [fake-rom-cold-reset] ++
88,797 ready_for_fw is high
88,797 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,881 UART: [fht] FHT @ 0x50003400
92,224 UART: [fwproc] Wait for Commands...
93,061 UART: [fwproc] Recv command 0x46574c44
93,789 UART: [fwproc] Recv'd Img size: 102604 bytes
1,251,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,277,813 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,331 >>> mbox cmd response: success
1,426,489 UART: [fake-rom-cold-reset] --
1,427,203 UART: [state] Locking Datavault
1,428,474 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,078 UART: [state] Locking ICCM
1,429,518 UART: [exit] Launching FMC @ 0x40000130
1,434,840 UART:
1,434,856 UART: Running Caliptra FMC ...
1,435,264 UART:
1,435,405 UART: [state] CFI Enabled
1,438,289 UART: Caliptra RT
1,438,632 UART: [state] CFI Enabled
1,550,624 UART: [rt] RT listening for mailbox commands...
1,551,294 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,348 UART: [rt]cmd =0x4c444556, len=4
1,591,788 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,591,789 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,166 UART: [rt]cmd =0x43455246, len=4
1,633,196 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,971 UART: [state] DebugLocked = No
86,620 UART: [state] WD Timer not started. Device not locked for debugging
88,070 UART: [fake-rom-cold-reset] ++
88,998 ready_for_fw is high
88,998 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,180 UART: [fht] FHT @ 0x50003400
92,421 UART: [fwproc] Wait for Commands...
93,142 UART: [fwproc] Recv command 0x46574c44
93,870 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,313 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,854 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,082 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,320 >>> mbox cmd response: success
1,427,478 UART: [fake-rom-cold-reset] --
1,428,356 UART: [state] Locking Datavault
1,429,335 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,939 UART: [state] Locking ICCM
1,430,601 UART: [exit] Launching FMC @ 0x40000130
1,435,923 UART:
1,435,939 UART: Running Caliptra FMC ...
1,436,347 UART:
1,436,401 UART: [state] CFI Enabled
1,439,170 UART: Caliptra RT
1,439,421 UART: [state] CFI Enabled
1,551,165 UART: [rt] RT listening for mailbox commands...
1,551,835 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,581,613 UART: [rt]cmd =0x4c444556, len=4
1,592,105 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,106 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,621,415 UART: [rt]cmd =0x43455246, len=4
1,633,571 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,506 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,853 UART: [state] DebugLocked = No
86,344 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [fake-rom-cold-reset] ++
88,624 ready_for_fw is high
88,624 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,774 UART: [fht] FHT @ 0x50003400
92,027 UART: [fwproc] Wait for Commands...
92,684 UART: [fwproc] Recv command 0x46574c44
93,412 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,276,722 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,283,950 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,424,304 >>> mbox cmd response: success
1,425,462 UART: [fake-rom-cold-reset] --
1,426,224 UART: [state] Locking Datavault
1,427,347 UART: [state] Locking PCR0, PCR1 and PCR31
1,427,951 UART: [state] Locking ICCM
1,428,385 UART: [exit] Launching FMC @ 0x40000130
1,433,707 UART:
1,433,723 UART: Running Caliptra FMC ...
1,434,131 UART:
1,434,185 UART: [state] CFI Enabled
1,437,000 UART: Caliptra RT
1,437,251 UART: [state] CFI Enabled
1,549,115 UART: [rt] RT listening for mailbox commands...
1,549,785 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,579,647 UART: [rt]cmd =0x4c444556, len=4
1,590,067 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,590,068 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,619,129 UART: [rt]cmd =0x43455246, len=4
1,631,319 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,720 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [fake-rom-cold-reset] ++
88,611 ready_for_fw is high
88,611 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
88,757 UART: [fht] FHT @ 0x50003400
92,170 UART: [fwproc] Wait for Commands...
93,003 UART: [fwproc] Recv command 0x46574c44
93,731 UART: [fwproc] Recv'd Img size: 102604 bytes
1,250,734 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,278,039 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,285,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,425,575 >>> mbox cmd response: success
1,426,733 UART: [fake-rom-cold-reset] --
1,427,567 UART: [state] Locking Datavault
1,428,722 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,326 UART: [state] Locking ICCM
1,429,980 UART: [exit] Launching FMC @ 0x40000130
1,435,302 UART:
1,435,318 UART: Running Caliptra FMC ...
1,435,726 UART:
1,435,867 UART: [state] CFI Enabled
1,438,755 UART: Caliptra RT
1,439,098 UART: [state] CFI Enabled
1,552,020 UART: [rt] RT listening for mailbox commands...
1,552,690 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,720 UART: [rt]cmd =0x4c444556, len=4
1,593,200 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,593,201 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,646 UART: [rt]cmd =0x43455246, len=4
1,634,850 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c50f8267905ef2d34204f21bd4d08a24a204420802485f245b7de85d8b922ea6427c5d19c6b74bdff3a125ee13390f7c",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,027 UART:
82,043 UART: Running Caliptra ROM ...
82,451 UART:
82,627 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,394 UART: [state] DebugLocked = No
87,095 UART: [state] WD Timer not started. Device not locked for debugging
88,543 UART: [fake-rom-cold-reset] ++
89,471 ready_for_fw is high
89,471 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
89,785 UART: [fht] FHT @ 0x50003400
93,062 UART: [fwproc] Wait for Commands...
93,797 UART: [fwproc] Recv command 0x46574c44
94,525 UART: [fwproc] Recv'd Img size: 102604 bytes
1,252,340 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,279,167 UART: [fwproc] Load FMC at address 0x40000000 len 4100
1,286,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
1,426,557 >>> mbox cmd response: success
1,427,715 UART: [fake-rom-cold-reset] --
1,428,421 UART: [state] Locking Datavault
1,429,292 UART: [state] Locking PCR0, PCR1 and PCR31
1,429,896 UART: [state] Locking ICCM
1,430,328 UART: [exit] Launching FMC @ 0x40000130
1,435,650 UART:
1,435,666 UART: Running Caliptra FMC ...
1,436,074 UART:
1,436,215 UART: [state] CFI Enabled
1,439,063 UART: Caliptra RT
1,439,406 UART: [state] CFI Enabled
1,551,998 UART: [rt] RT listening for mailbox commands...
1,552,668 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,582,100 UART: [rt]cmd =0x4c444556, len=4
1,592,522 >>> mbox cmd response data (687 bytes)
ldev-cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:ee:ef:9a:4c:61:d4:b9:e3:d9:4b:ea:46:f9:a1:2a:c6:88:7c:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
1,592,523 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
1,622,144 UART: [rt]cmd =0x43455246, len=4
1,634,118 >>> mbox cmd response data (879 bytes)
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
06:b0:fb:b6:60:59:b8:54:55:ea:c8:95:65:c0:c3:7b:67:0f:b1:87
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra FMC Alias/serialNumber=82B0FBB66059B85455EAC89565C0C37B670FB187E031F86177F2FC4B152DCCCA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:4c:25:c3:71:bb:0f:48:9b:1e:20:2c:67:57:
cf:47:d2:82:c5:28:70:c9:9a:55:fc:d0:62:76:1f:
83:a4:c3:8b:51:82:16:01:cd:2b:ab:15:ff:e6:66:
e2:ed:62:a4:28:0c:fe:1d:e5:c2:a2:38:d6:89:31:
32:23:d0:07:07:2d:bf:a8:a0:66:a4:20:72:60:04:
86:8f:f1:70:3a:56:34:8b:d1:06:e9:9c:f7:d2:48:
b6:3f:0f:86:04:bc:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:0
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0
..........
2.23.133.5.4.5:
0..0$..Caliptra..Device..................0....Caliptra..FMC.....~0=..`.H.e.....0...T:.h..."...G.3.....'@..K...,...Ov[g.S.V.]....0=..`.H.e.....0B.u.zq..4...j...w.......&...>..3.l.....tg....
.:
X509v3 Subject Key Identifier:
82:B0:FB:B6:60:59:B8:54:55:EA:C8:95:65:C0:C3:7B:67:0F:B1:87
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5b:a9:3b:47:21:91:24:43:94:75:c1:eb:d4:02:
9f:a6:3c:81:d1:38:e8:b7:f4:a5:55:f3:9b:f2:22:33:dd:74:
93:ce:6f:a8:dc:f7:0c:d7:00:58:1d:ff:12:42:7f:f5:02:31:
00:ff:a8:d0:41:80:28:79:9f:44:98:0c:c1:f6:ec:cf:87:63:
8b:db:f2:5f:f0:8e:a9:c9:a3:af:c7:33:b4:a1:23:91:d8:8e:
63:69:63:b0:f4:1c:ab:a7:ad:95:85:ac:a5
test fake_collateral_boot_test::fake_boot_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,899 writing to cptra_bootfsm_go
191,992 UART:
192,348 UART: Running Caliptra ROM ...
193,675 UART:
193,825 UART: [state] CFI Enabled
265,501 UART: [state] LifecycleState = Production
267,314 UART: [state] DebugLocked = No
268,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,646 UART: [kat] SHA2-256
444,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,860 UART: [kat] ++
455,399 UART: [kat] sha1
465,992 UART: [kat] SHA2-256
468,715 UART: [kat] SHA2-384
475,128 UART: [kat] SHA2-512-ACC
477,490 UART: [kat] ECC-384
2,768,101 UART: [kat] HMAC-384Kdf
2,799,831 UART: [kat] LMS
3,990,133 UART: [kat] --
3,996,651 UART: [cold-reset] ++
3,998,519 UART: [fht] Storing FHT @ 0x50003400
4,009,077 UART: [idev] ++
4,009,656 UART: [idev] CDI.KEYID = 6
4,010,593 UART: [idev] SUBJECT.KEYID = 7
4,011,842 UART: [idev] UDS.KEYID = 0
4,012,967 ready_for_fw is high
4,013,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,377 UART: [idev] Erasing UDS.KEYID = 0
7,345,446 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,376 UART: [idev] --
7,371,160 UART: [ldev] ++
7,371,737 UART: [ldev] CDI.KEYID = 6
7,372,758 UART: [ldev] SUBJECT.KEYID = 5
7,373,919 UART: [ldev] AUTHORITY.KEYID = 7
7,375,209 UART: [ldev] FE.KEYID = 1
7,423,018 UART: [ldev] Erasing FE.KEYID = 1
10,754,779 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,475 UART: [ldev] --
13,116,082 UART: [fwproc] Waiting for Commands...
13,118,340 UART: [fwproc] Received command 0x46574c44
13,120,522 UART: [fwproc] Received Image of size 118548 bytes
22,233,416 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,313,538 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,386,731 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,715,648 >>> mbox cmd response: success
22,719,037 UART: [afmc] ++
22,719,649 UART: [afmc] CDI.KEYID = 6
22,720,609 UART: [afmc] SUBJECT.KEYID = 7
22,721,898 UART: [afmc] AUTHORITY.KEYID = 5
26,081,182 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,381,998 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,384,286 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,398,771 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,413,560 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,427,956 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,448,662 UART: [afmc] --
28,452,833 UART: [cold-reset] --
28,458,958 UART: [state] Locking Datavault
28,465,090 UART: [state] Locking PCR0, PCR1 and PCR31
28,466,827 UART: [state] Locking ICCM
28,467,966 UART: [exit] Launching FMC @ 0x40000130
28,476,390 UART:
28,476,640 UART: Running Caliptra FMC ...
28,477,775 UART:
28,477,935 UART: [state] CFI Enabled
28,541,448 UART: [fht] FMC Alias Private Key: 7
30,882,092 UART: [art] Extend RT PCRs Done
30,883,357 UART: [art] Lock RT PCRs Done
30,884,939 UART: [art] Populate DV Done
30,890,222 UART: [fht] FMC Alias Private Key: 7
30,891,757 UART: [art] Derive CDI
30,892,627 UART: [art] Store in slot 0x4
30,951,082 UART: [art] Derive Key Pair
30,952,179 UART: [art] Store priv key in slot 0x5
34,244,603 UART: [art] Derive Key Pair - Done
34,257,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,546,221 UART: [art] Erasing AUTHORITY.KEYID = 7
36,547,772 UART: [art] PUB.X = 1138005B285051E423ECAFACE01FCA84845B91601A61A5CE61C3D4046543F46418349F7025503DBC19B445EE6AA75745
36,555,037 UART: [art] PUB.Y = 48E2F7623A84365918D152C0AD4A772862435192349D7CEA9E608DDD59C344A66C8D78254E866B16BC54A876FFBF5C51
36,562,260 UART: [art] SIG.R = 70849D77ED1C604786473915F432F7453D9F5A8C7CFC9346B52B46BA60CDB36613F73EB85150A000BFDD46D2E85903D5
36,569,610 UART: [art] SIG.S = 76A1A0728F4D8143A5ADE1B15DADE07F3DE4CE93B72F4412D37497542C26C79497FFFE0D4F3348136591FB3382F8CE0A
37,874,793 UART: Caliptra RT
37,875,512 UART: [state] CFI Enabled
38,053,287 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,785,476 ready_for_fw is high
3,785,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,190,950 >>> mbox cmd response: success
27,878,563 UART:
27,878,956 UART: Running Caliptra FMC ...
27,880,125 UART:
27,880,279 UART: [state] CFI Enabled
27,947,720 UART: [fht] FMC Alias Private Key: 7
30,288,872 UART: [art] Extend RT PCRs Done
30,290,141 UART: [art] Lock RT PCRs Done
30,291,887 UART: [art] Populate DV Done
30,297,560 UART: [fht] FMC Alias Private Key: 7
30,299,136 UART: [art] Derive CDI
30,299,909 UART: [art] Store in slot 0x4
30,356,878 UART: [art] Derive Key Pair
30,357,927 UART: [art] Store priv key in slot 0x5
33,651,611 UART: [art] Derive Key Pair - Done
33,664,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,953,300 UART: [art] Erasing AUTHORITY.KEYID = 7
35,954,869 UART: [art] PUB.X = DF44F9A9B8B5DC164F5348FD7DF4D78FCF208B8F1087AC599C3C22AC3EE4AA828699804E64BC7E0521642F4B35276C48
35,962,077 UART: [art] PUB.Y = E24219AE6689463D2C4C7B83EFF92D782742554BA8B5B655C970A1C3B1747CC8199E1D16329F2EA5ECAC8B79D49211EE
35,969,386 UART: [art] SIG.R = 67DC3EFEEB6ABF40773755F2ECA942E909F349836818A8968C63837EDC2F51B15DFD6B35D851934FBA47FCE9564343EA
35,976,749 UART: [art] SIG.S = ECEDC5D8CB128DC3A482A74C529332627DE6E7321A190386D75DEEAF2D37C8EE78DD4703AB05739F16DA7C10666A7CAD
37,282,540 UART: Caliptra RT
37,283,255 UART: [state] CFI Enabled
37,459,928 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,530 UART:
192,902 UART: Running Caliptra ROM ...
194,099 UART:
603,828 UART: [state] CFI Enabled
616,555 UART: [state] LifecycleState = Production
618,336 UART: [state] DebugLocked = No
620,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,717 UART: [kat] SHA2-256
795,440 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,017 UART: [kat] ++
806,470 UART: [kat] sha1
817,695 UART: [kat] SHA2-256
820,421 UART: [kat] SHA2-384
826,124 UART: [kat] SHA2-512-ACC
828,508 UART: [kat] ECC-384
3,112,391 UART: [kat] HMAC-384Kdf
3,123,080 UART: [kat] LMS
4,313,240 UART: [kat] --
4,317,631 UART: [cold-reset] ++
4,319,666 UART: [fht] Storing FHT @ 0x50003400
4,329,730 UART: [idev] ++
4,330,292 UART: [idev] CDI.KEYID = 6
4,331,238 UART: [idev] SUBJECT.KEYID = 7
4,332,478 UART: [idev] UDS.KEYID = 0
4,333,466 ready_for_fw is high
4,333,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,482,523 UART: [idev] Erasing UDS.KEYID = 0
7,621,686 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,597 UART: [idev] --
7,646,888 UART: [ldev] ++
7,647,475 UART: [ldev] CDI.KEYID = 6
7,648,442 UART: [ldev] SUBJECT.KEYID = 5
7,649,600 UART: [ldev] AUTHORITY.KEYID = 7
7,650,881 UART: [ldev] FE.KEYID = 1
7,662,330 UART: [ldev] Erasing FE.KEYID = 1
10,948,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,446 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,793 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,090 UART: [ldev] --
13,305,220 UART: [fwproc] Waiting for Commands...
13,307,742 UART: [fwproc] Received command 0x46574c44
13,309,917 UART: [fwproc] Received Image of size 118548 bytes
22,193,408 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,276,493 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,349,679 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,678,477 >>> mbox cmd response: success
22,682,348 UART: [afmc] ++
22,682,965 UART: [afmc] CDI.KEYID = 6
22,683,928 UART: [afmc] SUBJECT.KEYID = 7
22,685,218 UART: [afmc] AUTHORITY.KEYID = 5
26,003,644 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
28,298,868 UART: [afmc] Erasing AUTHORITY.KEYID = 5
28,301,093 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
28,315,610 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
28,330,369 UART: [afmc] SIG.R = 07DA8956422B67BE520AE0F3F19018E6413FE1DE68004414FFC970884079A4DE78CC68B1AF11F9488D6BA52138DE7256
28,344,758 UART: [afmc] SIG.S = F365DA2001D0DAC9DE7816A6A536E7BAA763EB876E3E406ABB2FA06DFD0780670CA799570BF6F73554BEFF879A841F5A
28,366,196 UART: [afmc] --
28,370,149 UART: [cold-reset] --
28,374,133 UART: [state] Locking Datavault
28,379,372 UART: [state] Locking PCR0, PCR1 and PCR31
28,381,207 UART: [state] Locking ICCM
28,383,546 UART: [exit] Launching FMC @ 0x40000130
28,391,965 UART:
28,392,219 UART: Running Caliptra FMC ...
28,393,355 UART:
28,393,512 UART: [state] CFI Enabled
28,401,635 UART: [fht] FMC Alias Private Key: 7
30,741,165 UART: [art] Extend RT PCRs Done
30,742,423 UART: [art] Lock RT PCRs Done
30,744,154 UART: [art] Populate DV Done
30,749,537 UART: [fht] FMC Alias Private Key: 7
30,751,203 UART: [art] Derive CDI
30,751,977 UART: [art] Store in slot 0x4
30,794,552 UART: [art] Derive Key Pair
30,795,601 UART: [art] Store priv key in slot 0x5
34,037,782 UART: [art] Derive Key Pair - Done
34,050,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,330,839 UART: [art] Erasing AUTHORITY.KEYID = 7
36,332,390 UART: [art] PUB.X = B4FAB78526E1020A70DEE9E5A0C2B60AF31664318D6CAC22A6449B9349684ABDB943FD59256821903EAA7C998B0A6B5C
36,339,609 UART: [art] PUB.Y = 82011E1238828EC0850B4C4711FAEFA3C040FDFEAB1D1FBF73C86DAF88631CFB9BADD550997AC94166E3728B02469E32
36,346,907 UART: [art] SIG.R = D2F5444EBDC7963C20D7F878C7CA5261934406247545FF3020DF092517594CAC91EE90FD017DA65A7EB7830715340538
36,354,258 UART: [art] SIG.S = E993789B2B9D2645161DE827ECE563D0AE3387F0EAB3DE258DF2D7909DC12556A4869CC5E9FBB40D285A074AF4335349
37,659,665 UART: Caliptra RT
37,660,391 UART: [state] CFI Enabled
37,795,127 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,157 writing to cptra_bootfsm_go
4,125,920 ready_for_fw is high
4,126,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,177,592 >>> mbox cmd response: success
27,814,370 UART:
27,814,746 UART: Running Caliptra FMC ...
27,815,910 UART:
27,816,060 UART: [state] CFI Enabled
27,823,837 UART: [fht] FMC Alias Private Key: 7
30,163,214 UART: [art] Extend RT PCRs Done
30,164,495 UART: [art] Lock RT PCRs Done
30,166,170 UART: [art] Populate DV Done
30,171,395 UART: [fht] FMC Alias Private Key: 7
30,172,954 UART: [art] Derive CDI
30,173,808 UART: [art] Store in slot 0x4
30,216,511 UART: [art] Derive Key Pair
30,217,596 UART: [art] Store priv key in slot 0x5
33,459,778 UART: [art] Derive Key Pair - Done
33,472,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,752,733 UART: [art] Erasing AUTHORITY.KEYID = 7
35,754,313 UART: [art] PUB.X = 8754E13F8EF8F6A4AD62582BCF9A9E178EFCB7CBB7B8F9B488DB730E13D47CE21C7DC10B6CFF1E740F40F15CDB37F28B
35,761,566 UART: [art] PUB.Y = 058F6B24068AD155796AD022A2371A1358DAB6E2232DA33408967098CA95EA589BE9850757C4B1CF8EA61825262E07A6
35,768,753 UART: [art] SIG.R = 528772DB815E102BA51A933ADD5EE1FAEC256BBE5BA33708D89BB7B6901BBC41D1C23B6AD34376998787A6809715E77B
35,776,222 UART: [art] SIG.S = 5BA2B4093A8741FD531C8678BB81F5B3EF36A24E837571314B36B377D94510F0DED493E41669FFD5A97953BECD4E0151
37,081,572 UART: Caliptra RT
37,082,310 UART: [state] CFI Enabled
37,216,386 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 6.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,865 writing to cptra_bootfsm_go
191,917 UART:
192,285 UART: Running Caliptra ROM ...
193,410 UART:
193,558 UART: [state] CFI Enabled
266,856 UART: [state] LifecycleState = Production
268,667 UART: [state] DebugLocked = No
271,202 UART: [state] WD Timer not started. Device not locked for debugging
274,606 UART: [kat] SHA2-256
454,244 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,041 UART: [kat] ++
465,495 UART: [kat] sha1
477,812 UART: [kat] SHA2-256
480,469 UART: [kat] SHA2-384
487,170 UART: [kat] SHA2-512-ACC
489,537 UART: [kat] ECC-384
2,949,191 UART: [kat] HMAC-384Kdf
2,971,955 UART: [kat] LMS
3,448,438 UART: [kat] --
3,451,936 UART: [cold-reset] ++
3,454,308 UART: [fht] FHT @ 0x50003400
3,465,749 UART: [idev] ++
3,466,393 UART: [idev] CDI.KEYID = 6
3,467,277 UART: [idev] SUBJECT.KEYID = 7
3,468,523 UART: [idev] UDS.KEYID = 0
3,469,681 ready_for_fw is high
3,469,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,951 UART: [idev] Erasing UDS.KEYID = 0
5,988,697 UART: [idev] Sha1 KeyId Algorithm
6,013,329 UART: [idev] --
6,019,454 UART: [ldev] ++
6,020,082 UART: [ldev] CDI.KEYID = 6
6,020,974 UART: [ldev] SUBJECT.KEYID = 5
6,022,084 UART: [ldev] AUTHORITY.KEYID = 7
6,023,372 UART: [ldev] FE.KEYID = 1
6,057,942 UART: [ldev] Erasing FE.KEYID = 1
8,563,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,560 UART: [ldev] --
10,374,204 UART: [fwproc] Wait for Commands...
10,376,742 UART: [fwproc] Recv command 0x46574c44
10,378,752 UART: [fwproc] Recv'd Img size: 118548 bytes
14,952,183 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,036,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,110,010 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,437,521 >>> mbox cmd response: success
15,441,083 UART: [afmc] ++
15,441,696 UART: [afmc] CDI.KEYID = 6
15,442,658 UART: [afmc] SUBJECT.KEYID = 7
15,443,951 UART: [afmc] AUTHORITY.KEYID = 5
17,982,166 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,704,790 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,706,987 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,722,850 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,738,734 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,754,325 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,778,707 UART: [afmc] --
19,781,734 UART: [cold-reset] --
19,785,942 UART: [state] Locking Datavault
19,791,181 UART: [state] Locking PCR0, PCR1 and PCR31
19,792,925 UART: [state] Locking ICCM
19,795,413 UART: [exit] Launching FMC @ 0x40000130
19,803,853 UART:
19,804,102 UART: Running Caliptra FMC ...
19,805,243 UART:
19,805,410 UART: [state] CFI Enabled
19,862,162 UART: [fht] FMC Alias Private Key: 7
21,628,254 UART: [art] Extend RT PCRs Done
21,629,517 UART: [art] Lock RT PCRs Done
21,631,125 UART: [art] Populate DV Done
21,636,566 UART: [fht] FMC Alias Private Key: 7
21,638,182 UART: [art] Derive CDI
21,639,051 UART: [art] Store in slot 0x4
21,694,565 UART: [art] Derive Key Pair
21,695,643 UART: [art] Store priv key in slot 0x5
24,158,319 UART: [art] Derive Key Pair - Done
24,170,969 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,884,746 UART: [art] Erasing AUTHORITY.KEYID = 7
25,886,322 UART: [art] PUB.X = 16585728189C295B181242B58077675C31F6D21D847953AA7289D90B862AE136ECDF18FA85E97ED64C644EC2C15530FD
25,893,525 UART: [art] PUB.Y = 905B2EB812CB27ED94F816B41908F1F706993114E6C17BC5C7EA840BCAB510D78CB33557E32375E66145ECE6661E9CB6
25,900,823 UART: [art] SIG.R = 9B6C69C0CF60A5E19BBAC3733284A849B76580F6046060DD030DDE9CA721596998A1E06A51BBFF80B937F92A92D266F4
25,908,177 UART: [art] SIG.S = FB730798A7D273F4045AFB9085F29C46EE9EFE8C53ABB2DB2BCDA99567A81927598C3DA2FDAF5175C63B24C1F34C9302
26,887,215 UART: Caliptra RT
26,887,952 UART: [state] CFI Enabled
27,068,857 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,463,822 ready_for_fw is high
3,464,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,431,255 >>> mbox cmd response: success
19,708,651 UART:
19,709,022 UART: Running Caliptra FMC ...
19,710,486 UART:
19,710,692 UART: [state] CFI Enabled
19,775,978 UART: [fht] FMC Alias Private Key: 7
21,541,670 UART: [art] Extend RT PCRs Done
21,542,963 UART: [art] Lock RT PCRs Done
21,544,460 UART: [art] Populate DV Done
21,550,015 UART: [fht] FMC Alias Private Key: 7
21,551,628 UART: [art] Derive CDI
21,552,501 UART: [art] Store in slot 0x4
21,608,235 UART: [art] Derive Key Pair
21,609,272 UART: [art] Store priv key in slot 0x5
24,072,466 UART: [art] Derive Key Pair - Done
24,085,842 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,797,642 UART: [art] Erasing AUTHORITY.KEYID = 7
25,799,208 UART: [art] PUB.X = BBF08C6B50940DF51860D1D94225406375F175A6480C9AB5D528EA9CC1B7C9F865FAF5F73A18A9C469F3E38321CD4350
25,806,426 UART: [art] PUB.Y = ED19590B32316AE98C19B3AD593EFE52CDA8D53C455BBD62F2F50A24A984D9D7BEB08D36C5C1E77D927A092225D6B77A
25,813,707 UART: [art] SIG.R = 76A7C7D97B0BD29FAB96714A474247F8A0B369D3604DE50C8C0A7F0B316426E3C1C6FDD7C365B45283139B7BC7C5C36A
25,821,106 UART: [art] SIG.S = 8EE416F3BC703E33F8780606B7FFB49A5C2D601BF67B2FA632155641A9EAA8DEB064723A882A0FA4BAC3740DFCD44F89
26,800,375 UART: Caliptra RT
26,801,088 UART: [state] CFI Enabled
26,981,490 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
192,365 UART:
192,742 UART: Running Caliptra ROM ...
193,935 UART:
603,503 UART: [state] CFI Enabled
618,654 UART: [state] LifecycleState = Production
620,437 UART: [state] DebugLocked = No
623,105 UART: [state] WD Timer not started. Device not locked for debugging
626,363 UART: [kat] SHA2-256
805,975 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,792 UART: [kat] ++
817,236 UART: [kat] sha1
826,902 UART: [kat] SHA2-256
829,624 UART: [kat] SHA2-384
836,678 UART: [kat] SHA2-512-ACC
839,043 UART: [kat] ECC-384
3,281,866 UART: [kat] HMAC-384Kdf
3,294,283 UART: [kat] LMS
3,770,752 UART: [kat] --
3,775,460 UART: [cold-reset] ++
3,776,677 UART: [fht] FHT @ 0x50003400
3,787,866 UART: [idev] ++
3,788,436 UART: [idev] CDI.KEYID = 6
3,789,347 UART: [idev] SUBJECT.KEYID = 7
3,790,590 UART: [idev] UDS.KEYID = 0
3,791,635 ready_for_fw is high
3,791,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,790 UART: [idev] Erasing UDS.KEYID = 0
6,266,837 UART: [idev] Sha1 KeyId Algorithm
6,291,354 UART: [idev] --
6,296,581 UART: [ldev] ++
6,297,150 UART: [ldev] CDI.KEYID = 6
6,298,087 UART: [ldev] SUBJECT.KEYID = 5
6,299,299 UART: [ldev] AUTHORITY.KEYID = 7
6,300,498 UART: [ldev] FE.KEYID = 1
6,310,601 UART: [ldev] Erasing FE.KEYID = 1
8,788,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,635 UART: [ldev] --
10,582,388 UART: [fwproc] Wait for Commands...
10,585,075 UART: [fwproc] Recv command 0x46574c44
10,587,111 UART: [fwproc] Recv'd Img size: 118548 bytes
15,140,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,221,829 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,294,805 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,623,389 >>> mbox cmd response: success
15,627,995 UART: [afmc] ++
15,628,621 UART: [afmc] CDI.KEYID = 6
15,629,643 UART: [afmc] SUBJECT.KEYID = 7
15,630,778 UART: [afmc] AUTHORITY.KEYID = 5
18,136,953 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,856,952 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,859,157 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
19,874,990 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
19,890,916 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
19,906,551 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
19,930,371 UART: [afmc] --
19,934,447 UART: [cold-reset] --
19,938,492 UART: [state] Locking Datavault
19,943,727 UART: [state] Locking PCR0, PCR1 and PCR31
19,945,466 UART: [state] Locking ICCM
19,947,536 UART: [exit] Launching FMC @ 0x40000130
19,955,990 UART:
19,956,253 UART: Running Caliptra FMC ...
19,957,398 UART:
19,957,556 UART: [state] CFI Enabled
19,966,134 UART: [fht] FMC Alias Private Key: 7
21,732,471 UART: [art] Extend RT PCRs Done
21,733,737 UART: [art] Lock RT PCRs Done
21,735,713 UART: [art] Populate DV Done
21,740,943 UART: [fht] FMC Alias Private Key: 7
21,742,447 UART: [art] Derive CDI
21,743,245 UART: [art] Store in slot 0x4
21,786,092 UART: [art] Derive Key Pair
21,787,182 UART: [art] Store priv key in slot 0x5
24,213,886 UART: [art] Derive Key Pair - Done
24,226,952 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,933,144 UART: [art] Erasing AUTHORITY.KEYID = 7
25,934,719 UART: [art] PUB.X = 97505EE770FC17E7B2F9029F06232AD58EB2F9E450B684CDFB954A9FD94510297C969D34506C7391C1A6C7D22A9BB0A3
25,941,962 UART: [art] PUB.Y = 1F9DC8663930F62BD65EFA75B0E9FD734231314ED3DA052D0F5B473DB26182A03A8968F0F97A4558CD283C39E7CA1EB4
25,949,189 UART: [art] SIG.R = 083C940D2DA5C9DD4B819969473A948C0B91E7D658319AEDC65438DC2009A3ED361C91DDA6497C7D56A2C2D939797E75
25,956,636 UART: [art] SIG.S = 80A73DB7235554FE7B0CC7AF897C0860304A06A165D0A2AAB1B8B01D545812A4344641B1CD5553CDBADDF63DA2DFEC9B
26,935,959 UART: Caliptra RT
26,936,675 UART: [state] CFI Enabled
27,069,730 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
3,775,646 ready_for_fw is high
3,776,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,626,819 >>> mbox cmd response: success
19,879,488 UART:
19,879,845 UART: Running Caliptra FMC ...
19,881,105 UART:
19,881,281 UART: [state] CFI Enabled
19,888,840 UART: [fht] FMC Alias Private Key: 7
21,655,070 UART: [art] Extend RT PCRs Done
21,656,351 UART: [art] Lock RT PCRs Done
21,657,897 UART: [art] Populate DV Done
21,663,136 UART: [fht] FMC Alias Private Key: 7
21,664,700 UART: [art] Derive CDI
21,665,560 UART: [art] Store in slot 0x4
21,708,032 UART: [art] Derive Key Pair
21,709,085 UART: [art] Store priv key in slot 0x5
24,135,685 UART: [art] Derive Key Pair - Done
24,148,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,855,159 UART: [art] Erasing AUTHORITY.KEYID = 7
25,856,737 UART: [art] PUB.X = D39641EF4D450AF09767E16F7FB1AFEAADBB864B6E6A6056569ED7371BCADB63E94B7877A972B7B83D365E368C849751
25,863,945 UART: [art] PUB.Y = 6C7DAE7C191663D7F62BFA51614CC9D4FE94AF8C40BE61ECA58CC29806E9A9FD19A89C37515FC818909196560A634294
25,871,236 UART: [art] SIG.R = AB7B58B4F3510F7A6429ECC0CD328EB4F83C137CB040EF9A77ECA7EC86650C9CEE3A9958487285F029838D88C190F8C1
25,878,663 UART: [art] SIG.S = 9F77228E250C126B0B782A240DD1DEE761C49C8385F8EE4D9A904021B1AAA110C3531E425C9467F03454F23DCEA91D97
26,857,353 UART: Caliptra RT
26,858,069 UART: [state] CFI Enabled
26,990,710 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,088 UART:
192,464 UART: Running Caliptra ROM ...
193,649 UART:
193,805 UART: [state] CFI Enabled
263,774 UART: [state] LifecycleState = Production
266,018 UART: [state] DebugLocked = No
268,554 UART: [state] WD Timer not started. Device not locked for debugging
274,008 UART: [kat] SHA2-256
463,927 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,659 UART: [kat] ++
475,133 UART: [kat] sha1
486,570 UART: [kat] SHA2-256
489,649 UART: [kat] SHA2-384
496,862 UART: [kat] SHA2-512-ACC
499,401 UART: [kat] ECC-384
2,949,232 UART: [kat] HMAC-384Kdf
2,973,423 UART: [kat] LMS
3,505,221 UART: [kat] --
3,508,646 UART: [cold-reset] ++
3,511,070 UART: [fht] FHT @ 0x50003400
3,522,470 UART: [idev] ++
3,523,167 UART: [idev] CDI.KEYID = 6
3,524,143 UART: [idev] SUBJECT.KEYID = 7
3,525,320 UART: [idev] UDS.KEYID = 0
3,526,245 ready_for_fw is high
3,526,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,481 UART: [idev] Erasing UDS.KEYID = 0
6,028,345 UART: [idev] Sha1 KeyId Algorithm
6,050,661 UART: [idev] --
6,054,923 UART: [ldev] ++
6,055,600 UART: [ldev] CDI.KEYID = 6
6,056,486 UART: [ldev] SUBJECT.KEYID = 5
6,057,697 UART: [ldev] AUTHORITY.KEYID = 7
6,058,925 UART: [ldev] FE.KEYID = 1
6,100,008 UART: [ldev] Erasing FE.KEYID = 1
8,604,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,013 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,234 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,744 UART: [ldev] --
10,412,813 UART: [fwproc] Wait for Commands...
10,415,701 UART: [fwproc] Recv command 0x46574c44
10,418,013 UART: [fwproc] Recv'd Img size: 118548 bytes
15,123,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,204,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,327,867 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,888,099 >>> mbox cmd response: success
15,892,107 UART: [afmc] ++
15,892,773 UART: [afmc] CDI.KEYID = 6
15,893,996 UART: [afmc] SUBJECT.KEYID = 7
15,895,452 UART: [afmc] AUTHORITY.KEYID = 5
18,428,019 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,150,821 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,152,749 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,167,868 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,183,032 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,198,039 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,221,612 UART: [afmc] --
20,225,152 UART: [cold-reset] --
20,230,068 UART: [state] Locking Datavault
20,233,317 UART: [state] Locking PCR0, PCR1 and PCR31
20,235,499 UART: [state] Locking ICCM
20,238,369 UART: [exit] Launching FMC @ 0x40000130
20,247,002 UART:
20,247,250 UART: Running Caliptra FMC ...
20,248,395 UART:
20,248,552 UART: [state] CFI Enabled
20,306,912 UART: [fht] FMC Alias Private Key: 7
22,073,833 UART: [art] Extend RT PCRs Done
22,075,109 UART: [art] Lock RT PCRs Done
22,076,879 UART: [art] Populate DV Done
22,082,214 UART: [fht] FMC Alias Private Key: 7
22,083,896 UART: [art] Derive CDI
22,084,761 UART: [art] Store in slot 0x4
22,139,315 UART: [art] Derive Key Pair
22,140,401 UART: [art] Store priv key in slot 0x5
24,602,834 UART: [art] Derive Key Pair - Done
24,615,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,328,647 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,217 UART: [art] PUB.X = 68E3FAD118B0D6BDE49A5FFD9DBB0FAC06BD88A4AF66CC10B8DD81F201D8FF572EC6AAB6A313EA61920ED60CC99A89B0
26,337,534 UART: [art] PUB.Y = F7590B048CA52AFFCE34EDADC1F10C5470FD9268FF511F1C597EC1D4E43D55D14EDE5CAF8D782CA97C19083B4DE9281A
26,344,760 UART: [art] SIG.R = DB63A38DB17C08FED0E8C06483F70729E405A22992BB3759990FC35BC6A9625B8CE1AB86434844F56858FC6ADABDC137
26,352,189 UART: [art] SIG.S = 1C0C31CD1EFE22441B04618ECC7D6349A4B0CFDEE7334E6BD2CDA9727DD7F6BE19907B78D4FD8A41C7CAC652291D64B8
27,331,427 UART: Caliptra RT
27,332,155 UART: [state] CFI Enabled
27,511,871 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,917 writing to cptra_bootfsm_go
3,417,431 ready_for_fw is high
3,417,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,962,558 >>> mbox cmd response: success
20,238,583 UART:
20,238,946 UART: Running Caliptra FMC ...
20,240,103 UART:
20,240,256 UART: [state] CFI Enabled
20,307,114 UART: [fht] FMC Alias Private Key: 7
22,074,044 UART: [art] Extend RT PCRs Done
22,075,313 UART: [art] Lock RT PCRs Done
22,077,111 UART: [art] Populate DV Done
22,082,546 UART: [fht] FMC Alias Private Key: 7
22,084,099 UART: [art] Derive CDI
22,084,873 UART: [art] Store in slot 0x4
22,139,316 UART: [art] Derive Key Pair
22,140,402 UART: [art] Store priv key in slot 0x5
24,603,443 UART: [art] Derive Key Pair - Done
24,616,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,328,817 UART: [art] Erasing AUTHORITY.KEYID = 7
26,330,384 UART: [art] PUB.X = 15E22099E19C3467DB41120289478CE3B70C2D82A10F13C891AA25F8D6DC64AD7C983E65D451EFBFBE6E0D15970EC623
26,337,605 UART: [art] PUB.Y = 7A38C46FD7FA3ED6A9BA5C767E5411EA70C5825F5BF3809F3122645C58976618DF18AC4EB3D2542F340600672006037D
26,344,811 UART: [art] SIG.R = EAC9DAE3CC2AA6097C22A6B46B7465F9C81C26F26A6976ECADEDD036F5AC5501EF591DBD6FC001F2E10E837FCCA57F69
26,352,260 UART: [art] SIG.S = 2BBC0E85EFF1C1CC2EE2362437E6E52D9E0C1B999CA3B040F787961ED90E2D48D8AED49AA10A34FCEA896123B6EFBDD9
27,331,254 UART: Caliptra RT
27,331,968 UART: [state] CFI Enabled
27,512,074 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
192,328 UART:
192,683 UART: Running Caliptra ROM ...
193,881 UART:
603,657 UART: [state] CFI Enabled
616,963 UART: [state] LifecycleState = Production
619,160 UART: [state] DebugLocked = No
622,106 UART: [state] WD Timer not started. Device not locked for debugging
627,563 UART: [kat] SHA2-256
817,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,226 UART: [kat] ++
828,831 UART: [kat] sha1
840,630 UART: [kat] SHA2-256
843,657 UART: [kat] SHA2-384
849,365 UART: [kat] SHA2-512-ACC
851,950 UART: [kat] ECC-384
3,297,106 UART: [kat] HMAC-384Kdf
3,310,281 UART: [kat] LMS
3,842,099 UART: [kat] --
3,845,249 UART: [cold-reset] ++
3,846,182 UART: [fht] FHT @ 0x50003400
3,857,649 UART: [idev] ++
3,858,377 UART: [idev] CDI.KEYID = 6
3,859,334 UART: [idev] SUBJECT.KEYID = 7
3,860,425 UART: [idev] UDS.KEYID = 0
3,861,387 ready_for_fw is high
3,861,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,517 UART: [idev] Erasing UDS.KEYID = 0
6,337,421 UART: [idev] Sha1 KeyId Algorithm
6,360,246 UART: [idev] --
6,365,481 UART: [ldev] ++
6,366,160 UART: [ldev] CDI.KEYID = 6
6,367,086 UART: [ldev] SUBJECT.KEYID = 5
6,368,244 UART: [ldev] AUTHORITY.KEYID = 7
6,369,472 UART: [ldev] FE.KEYID = 1
6,380,492 UART: [ldev] Erasing FE.KEYID = 1
8,859,857 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,618 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,799 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,930 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,509 UART: [ldev] --
10,650,277 UART: [fwproc] Wait for Commands...
10,652,810 UART: [fwproc] Recv command 0x46574c44
10,655,118 UART: [fwproc] Recv'd Img size: 118548 bytes
15,371,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,453,818 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,577,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,137,677 >>> mbox cmd response: success
16,141,856 UART: [afmc] ++
16,142,661 UART: [afmc] CDI.KEYID = 6
16,143,785 UART: [afmc] SUBJECT.KEYID = 7
16,145,257 UART: [afmc] AUTHORITY.KEYID = 5
18,650,291 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,372,219 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,374,136 UART: [afmc] PUB.X = A7382C604276F822AB8638836C2A037C5C64856FCD71F0CD9477421657831738A77BBDBA1BB7FB0835F5D8306656B60D
20,389,264 UART: [afmc] PUB.Y = 52AC8F7BDD6D8E02FFCA52DAF0D380B6973305CBE2CCC3E553D9840645FF4F37A4E50AD1C35030FF8B2D27E62AC18DCD
20,404,438 UART: [afmc] SIG.R = EEF9D85620300560282D1C96AFDDBC4E52F572713C243B5F1A5074E5156216C58C685F9141E745A8833E7BC3BD76DE04
20,419,413 UART: [afmc] SIG.S = 184605AA705F3954109587DB320D6D01E428901529F0191F9F69B63A824F1A8ADD6E5A9B142A8283DB301B4D5A8CDD8E
20,443,359 UART: [afmc] --
20,446,869 UART: [cold-reset] --
20,451,500 UART: [state] Locking Datavault
20,455,668 UART: [state] Locking PCR0, PCR1 and PCR31
20,457,862 UART: [state] Locking ICCM
20,459,800 UART: [exit] Launching FMC @ 0x40000130
20,468,491 UART:
20,468,739 UART: Running Caliptra FMC ...
20,469,809 UART:
20,469,957 UART: [state] CFI Enabled
20,477,654 UART: [fht] FMC Alias Private Key: 7
22,244,366 UART: [art] Extend RT PCRs Done
22,245,630 UART: [art] Lock RT PCRs Done
22,247,533 UART: [art] Populate DV Done
22,252,758 UART: [fht] FMC Alias Private Key: 7
22,254,315 UART: [art] Derive CDI
22,255,174 UART: [art] Store in slot 0x4
22,297,791 UART: [art] Derive Key Pair
22,298,859 UART: [art] Store priv key in slot 0x5
24,725,630 UART: [art] Derive Key Pair - Done
24,738,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,444,864 UART: [art] Erasing AUTHORITY.KEYID = 7
26,446,432 UART: [art] PUB.X = 2D972169F8CDF5EB23C7079D842CA627D617E38226FAB8373398B5E0929693E17EE17A6CD9862CB359126D3F6FE5CE4B
26,453,646 UART: [art] PUB.Y = CFB3E42DADFD29669F0EDE36217D5D6E885A65208FA887108D244CBC0D7B04A8D78521DD8276387E1604077C7934453C
26,460,944 UART: [art] SIG.R = B0F58BADAB8F63A7924376D4C72E870ECB81F76BCED1C0844F5C7529C3450AB0A385AC92041AEA35A586427CCF165995
26,468,314 UART: [art] SIG.S = 72A3F6DB9B78E89D474690959B444B13B8D83912B089604AFD7B762C2D76C89B08734562FE06A632FA672C5C8AC37658
27,447,228 UART: Caliptra RT
27,448,000 UART: [state] CFI Enabled
27,580,672 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.02s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,756,781 ready_for_fw is high
3,757,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,198,998 >>> mbox cmd response: success
20,451,677 UART:
20,452,045 UART: Running Caliptra FMC ...
20,453,318 UART:
20,453,488 UART: [state] CFI Enabled
20,460,977 UART: [fht] FMC Alias Private Key: 7
22,226,655 UART: [art] Extend RT PCRs Done
22,227,923 UART: [art] Lock RT PCRs Done
22,229,447 UART: [art] Populate DV Done
22,234,970 UART: [fht] FMC Alias Private Key: 7
22,236,629 UART: [art] Derive CDI
22,237,483 UART: [art] Store in slot 0x4
22,280,055 UART: [art] Derive Key Pair
22,281,103 UART: [art] Store priv key in slot 0x5
24,707,907 UART: [art] Derive Key Pair - Done
24,720,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,427,437 UART: [art] Erasing AUTHORITY.KEYID = 7
26,428,997 UART: [art] PUB.X = 8F19082C32631F25116E7AAD7C881FEB02FD19F0115A90DCAB0B59DC5ADEA1A46CD641DB4C3EF54181B5150E3B779894
26,436,221 UART: [art] PUB.Y = 588A1820D7CEA92B21D878752FFF3DA415A5C3E88C64FD5A144C23A6BA760D434EB14D7275F3070BB69F113B5AC6D333
26,443,454 UART: [art] SIG.R = CCC7234F98F01F1BEC2591D4D930E17510087E9B5036F0803B2256566CA9A2B4460F6D920358C075CEEEF2571DFCE02D
26,450,901 UART: [art] SIG.S = 3BB6B8C96AE284FF5A0E6359CE6B23C4915F91531C7F9EA00E3D3C20D8FB069C0748863E16F1F3776964E95EB53471DC
27,429,792 UART: Caliptra RT
27,430,532 UART: [state] CFI Enabled
27,564,205 UART: [rt] RT listening for mailbox commands...
test jtag_test::gdb_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 5.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,617 writing to cptra_bootfsm_go
192,254 UART:
193,507 UART: Running Caliptra ROM ...
194,735 UART:
194,955 UART: [state] CFI Enabled
263,744 UART: [state] LifecycleState = Unprovisioned
266,057 UART: [state] DebugLocked = Yes
267,259 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,016 UART: [kat] SHA2-256
442,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,265 UART: [kat] ++
453,792 UART: [kat] sha1
464,823 UART: [kat] SHA2-256
467,507 UART: [kat] SHA2-384
474,540 UART: [kat] SHA2-512-ACC
476,507 UART: [kat] ECC-384
2,765,103 UART: [kat] HMAC-384Kdf
2,797,929 UART: [kat] LMS
3,988,233 UART: [kat] --
3,991,759 UART: [cold-reset] ++
3,994,362 UART: [fht] Storing FHT @ 0x50003400
4,006,804 UART: [idev] ++
4,007,448 UART: [idev] CDI.KEYID = 6
4,008,372 UART: [idev] SUBJECT.KEYID = 7
4,009,596 UART: [idev] UDS.KEYID = 0
4,030,686 UART: [idev] Erasing UDS.KEYID = 0
7,342,389 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,058 UART: [idev] CSR upload requested
7,369,227 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,674,861 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,689,393 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,704,164 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,718,471 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
9,741,430 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,444 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.50s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,814 writing to cptra_bootfsm_go
192,427 UART:
196,435 UART: Running Caliptra ROM ...
197,824 UART:
603,519 UART: [state] CFI Enabled
618,159 UART: [state] LifecycleState = Unprovisioned
620,389 UART: [state] DebugLocked = Yes
623,203 UART: [state] Starting the Watchdog Timer 40000000 cycles
628,282 UART: [kat] SHA2-256
798,062 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,617 UART: [kat] ++
809,100 UART: [kat] sha1
820,308 UART: [kat] SHA2-256
822,977 UART: [kat] SHA2-384
829,175 UART: [kat] SHA2-512-ACC
831,513 UART: [kat] ECC-384
3,115,626 UART: [kat] HMAC-384Kdf
3,127,795 UART: [kat] LMS
4,317,929 UART: [kat] --
4,322,997 UART: [cold-reset] ++
4,324,395 UART: [fht] Storing FHT @ 0x50003400
4,335,024 UART: [idev] ++
4,335,604 UART: [idev] CDI.KEYID = 6
4,336,569 UART: [idev] SUBJECT.KEYID = 7
4,337,785 UART: [idev] UDS.KEYID = 0
4,355,035 UART: [idev] Erasing UDS.KEYID = 0
7,621,978 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,314 UART: [idev] CSR upload requested
7,648,498 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
9,940,091 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
9,954,644 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
9,969,415 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
9,983,730 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
10,006,719 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
15,733 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,002 UART:
193,096 UART: Running Caliptra ROM ...
194,408 UART:
194,571 UART: [state] CFI Enabled
261,540 UART: [state] LifecycleState = Unprovisioned
263,908 UART: [state] DebugLocked = Yes
266,324 UART: [state] Starting the WD Timer 40000000 cycles
271,147 UART: [kat] SHA2-256
450,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,643 UART: [kat] ++
462,213 UART: [kat] sha1
474,120 UART: [kat] SHA2-256
476,825 UART: [kat] SHA2-384
483,405 UART: [kat] SHA2-512-ACC
485,758 UART: [kat] ECC-384
2,947,851 UART: [kat] HMAC-384Kdf
2,972,754 UART: [kat] LMS
3,449,240 UART: [kat] --
3,453,504 UART: [cold-reset] ++
3,455,341 UART: [fht] FHT @ 0x50003400
3,465,864 UART: [idev] ++
3,466,444 UART: [idev] CDI.KEYID = 6
3,467,470 UART: [idev] SUBJECT.KEYID = 7
3,468,636 UART: [idev] UDS.KEYID = 0
3,502,513 UART: [idev] Erasing UDS.KEYID = 0
5,985,558 UART: [idev] Sha1 KeyId Algorithm
6,010,387 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,741,731 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,757,620 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,773,631 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,789,189 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,815,477 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,645 writing to cptra_bootfsm_go
192,250 UART:
193,424 UART: Running Caliptra ROM ...
194,649 UART:
603,625 UART: [state] CFI Enabled
616,563 UART: [state] LifecycleState = Unprovisioned
618,711 UART: [state] DebugLocked = Yes
620,346 UART: [state] Starting the WD Timer 40000000 cycles
625,251 UART: [kat] SHA2-256
804,926 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,685 UART: [kat] ++
816,190 UART: [kat] sha1
827,392 UART: [kat] SHA2-256
830,076 UART: [kat] SHA2-384
836,011 UART: [kat] SHA2-512-ACC
838,330 UART: [kat] ECC-384
3,280,248 UART: [kat] HMAC-384Kdf
3,292,368 UART: [kat] LMS
3,768,917 UART: [kat] --
3,772,429 UART: [cold-reset] ++
3,773,886 UART: [fht] FHT @ 0x50003400
3,786,592 UART: [idev] ++
3,787,155 UART: [idev] CDI.KEYID = 6
3,788,280 UART: [idev] SUBJECT.KEYID = 7
3,789,385 UART: [idev] UDS.KEYID = 0
3,807,151 UART: [idev] Erasing UDS.KEYID = 0
6,268,778 UART: [idev] Sha1 KeyId Algorithm
6,294,955 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,012,837 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,028,753 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,044,692 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,060,341 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,086,552 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,692 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,371 writing to cptra_bootfsm_go
191,975 UART:
193,265 UART: Running Caliptra ROM ...
194,478 UART:
194,632 UART: [state] CFI Enabled
266,373 UART: [state] LifecycleState = Unprovisioned
269,044 UART: [state] DebugLocked = Yes
271,706 UART: [state] Starting the WD Timer 40000000 cycles
277,664 UART: [kat] SHA2-256
467,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,332 UART: [kat] ++
478,921 UART: [kat] sha1
490,515 UART: [kat] SHA2-256
493,490 UART: [kat] SHA2-384
497,800 UART: [kat] SHA2-512-ACC
500,437 UART: [kat] ECC-384
2,951,812 UART: [kat] HMAC-384Kdf
2,974,709 UART: [kat] LMS
3,506,517 UART: [kat] --
3,508,399 UART: [cold-reset] ++
3,510,435 UART: [fht] FHT @ 0x50003400
3,523,619 UART: [idev] ++
3,524,295 UART: [idev] CDI.KEYID = 6
3,525,306 UART: [idev] SUBJECT.KEYID = 7
3,526,456 UART: [idev] UDS.KEYID = 0
3,547,279 UART: [idev] Erasing UDS.KEYID = 0
6,042,114 UART: [idev] Sha1 KeyId Algorithm
6,065,008 UART: [idev] CSR upload begun
6,070,051 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
7,797,440 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
7,812,649 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
7,827,751 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
7,842,713 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
7,867,856 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,693 writing to cptra_bootfsm_go
192,294 UART:
193,537 UART: Running Caliptra ROM ...
194,740 UART:
603,320 UART: [state] CFI Enabled
616,825 UART: [state] LifecycleState = Unprovisioned
619,262 UART: [state] DebugLocked = Yes
622,102 UART: [state] Starting the WD Timer 40000000 cycles
627,766 UART: [kat] SHA2-256
817,640 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,431 UART: [kat] ++
828,993 UART: [kat] sha1
840,236 UART: [kat] SHA2-256
843,262 UART: [kat] SHA2-384
848,810 UART: [kat] SHA2-512-ACC
851,383 UART: [kat] ECC-384
3,293,805 UART: [kat] HMAC-384Kdf
3,307,365 UART: [kat] LMS
3,839,174 UART: [kat] --
3,845,066 UART: [cold-reset] ++
3,846,677 UART: [fht] FHT @ 0x50003400
3,857,658 UART: [idev] ++
3,858,340 UART: [idev] CDI.KEYID = 6
3,859,309 UART: [idev] SUBJECT.KEYID = 7
3,860,519 UART: [idev] UDS.KEYID = 0
3,875,897 UART: [idev] Erasing UDS.KEYID = 0
6,338,227 UART: [idev] Sha1 KeyId Algorithm
6,360,017 UART: [idev] CSR upload begun
6,365,097 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
8,082,999 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
8,098,190 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
8,113,283 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
8,128,297 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
8,153,419 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,628 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.42s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,081 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = Yes
86,369 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,507 UART: [kat] SHA2-256
892,445 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,616 UART: [kat] HMAC-384Kdf
907,136 UART: [kat] LMS
1,475,332 UART: [kat] --
1,476,229 UART: [cold-reset] ++
1,476,786 UART: [fht] Storing FHT @ 0x50003400
1,479,713 UART: [idev] ++
1,479,881 UART: [idev] CDI.KEYID = 6
1,480,241 UART: [idev] SUBJECT.KEYID = 7
1,480,665 UART: [idev] UDS.KEYID = 0
1,488,596 UART: [idev] Erasing UDS.KEYID = 0
1,505,391 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,021 UART: [idev] CSR upload requested
1,515,867 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,948 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,660 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,562 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,266 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,801 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,902 UART: [state] LifecycleState = Unprovisioned
86,558 UART: [state] DebugLocked = Yes
87,226 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,934 UART: [kat] SHA2-256
882,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,980 UART: [kat] ++
887,132 UART: [kat] sha1
891,550 UART: [kat] SHA2-256
893,488 UART: [kat] SHA2-384
896,015 UART: [kat] SHA2-512-ACC
897,916 UART: [kat] ECC-384
903,515 UART: [kat] HMAC-384Kdf
908,147 UART: [kat] LMS
1,476,343 UART: [kat] --
1,477,222 UART: [cold-reset] ++
1,477,665 UART: [fht] Storing FHT @ 0x50003400
1,480,630 UART: [idev] ++
1,480,798 UART: [idev] CDI.KEYID = 6
1,481,158 UART: [idev] SUBJECT.KEYID = 7
1,481,582 UART: [idev] UDS.KEYID = 0
1,489,357 UART: [idev] Erasing UDS.KEYID = 0
1,505,660 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,994 UART: [idev] CSR upload requested
1,515,840 UART: [idev] Signing CSR with SUBJECT.KEYID = 7
1,526,785 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,532,497 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,538,399 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,544,103 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,552,638 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.48s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = Yes
86,523 UART: [state] Starting the WD Timer 40000000 cycles
88,012 UART: [kat] SHA2-256
891,562 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,666 UART: [kat] ++
895,818 UART: [kat] sha1
900,088 UART: [kat] SHA2-256
902,028 UART: [kat] SHA2-384
904,929 UART: [kat] SHA2-512-ACC
906,830 UART: [kat] ECC-384
915,865 UART: [kat] HMAC-384Kdf
920,479 UART: [kat] LMS
1,168,791 UART: [kat] --
1,169,522 UART: [cold-reset] ++
1,169,965 UART: [fht] FHT @ 0x50003400
1,172,513 UART: [idev] ++
1,172,681 UART: [idev] CDI.KEYID = 6
1,173,042 UART: [idev] SUBJECT.KEYID = 7
1,173,467 UART: [idev] UDS.KEYID = 0
1,181,087 UART: [idev] Erasing UDS.KEYID = 0
1,198,112 UART: [idev] Sha1 KeyId Algorithm
1,207,705 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,218,307 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,224,020 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,229,925 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,235,630 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,244,174 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = Yes
86,634 UART: [state] Starting the WD Timer 40000000 cycles
88,161 UART: [kat] SHA2-256
891,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,815 UART: [kat] ++
895,967 UART: [kat] sha1
900,071 UART: [kat] SHA2-256
902,011 UART: [kat] SHA2-384
904,850 UART: [kat] SHA2-512-ACC
906,751 UART: [kat] ECC-384
916,378 UART: [kat] HMAC-384Kdf
921,012 UART: [kat] LMS
1,169,324 UART: [kat] --
1,169,843 UART: [cold-reset] ++
1,170,416 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,182,044 UART: [idev] Erasing UDS.KEYID = 0
1,199,435 UART: [idev] Sha1 KeyId Algorithm
1,209,196 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,219,916 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,225,629 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,231,534 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,237,239 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,245,783 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,705 UART: [state] DebugLocked = Yes
86,381 UART: [state] Starting the WD Timer 40000000 cycles
87,866 UART: [kat] SHA2-256
893,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,641 UART: [kat] ++
897,793 UART: [kat] sha1
902,193 UART: [kat] SHA2-256
904,133 UART: [kat] SHA2-384
906,942 UART: [kat] SHA2-512-ACC
908,843 UART: [kat] ECC-384
918,488 UART: [kat] HMAC-384Kdf
923,080 UART: [kat] LMS
1,171,408 UART: [kat] --
1,172,389 UART: [cold-reset] ++
1,172,924 UART: [fht] FHT @ 0x50003400
1,175,655 UART: [idev] ++
1,175,823 UART: [idev] CDI.KEYID = 6
1,176,183 UART: [idev] SUBJECT.KEYID = 7
1,176,607 UART: [idev] UDS.KEYID = 0
1,184,438 UART: [idev] Erasing UDS.KEYID = 0
1,201,306 UART: [idev] Sha1 KeyId Algorithm
1,209,605 UART: [idev] CSR upload begun
1,211,386 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,046 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,227,758 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,233,660 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,364 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,247,899 UART: [idev] CSR = 308201B73082013E0201003069311C301A06035504030C1343616C697074726120312E30204944657649443149304706035504051340384533433141303538463730344131313832314637423438443334304145463939444441424144433130393044373444303537464543434637333239344544363076301006072A8648CE3D020106052B8104002203620004D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6A056305406092A864886F70D01090E3147304530120603551D130101FF040830060101FF020105300E0603551D0F0101FF040403020204301F06066781050504040415301304110000000000000000000000000000000000300A06082A8648CE3D040303036700306402307C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1023024FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,988 UART: [state] LifecycleState = Unprovisioned
86,644 UART: [state] DebugLocked = Yes
87,160 UART: [state] Starting the WD Timer 40000000 cycles
88,695 UART: [kat] SHA2-256
894,345 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,470 UART: [kat] ++
898,622 UART: [kat] sha1
902,932 UART: [kat] SHA2-256
904,872 UART: [kat] SHA2-384
907,659 UART: [kat] SHA2-512-ACC
909,560 UART: [kat] ECC-384
918,985 UART: [kat] HMAC-384Kdf
923,587 UART: [kat] LMS
1,171,915 UART: [kat] --
1,172,852 UART: [cold-reset] ++
1,173,319 UART: [fht] FHT @ 0x50003400
1,176,072 UART: [idev] ++
1,176,240 UART: [idev] CDI.KEYID = 6
1,176,600 UART: [idev] SUBJECT.KEYID = 7
1,177,024 UART: [idev] UDS.KEYID = 0
1,185,001 UART: [idev] Erasing UDS.KEYID = 0
1,201,839 UART: [idev] Sha1 KeyId Algorithm
1,210,142 UART: [idev] CSR upload begun
1,211,923 UART: [idev] Sign CSR w/ SUBJECT.KEYID = 7
1,222,639 UART: [idev] PUB.X = D7B485F29F115C1CB3046B840B4589B57862F5EBF99D846FBE3FD2D14396F5F69A379A59ACC5A2AEC8369ECB65904437
1,228,351 UART: [idev] PUB.Y = B4BC7CD9A5A8403C5BB1915223AA86BEF2C1BC92145FFC27C125C6DBFAD49C91E848C544AC7F0E95D6CD8CACFB923FA6
1,234,253 UART: [idev] SIG.R = 7C74FD28CE0FF9E9DAEF9084A5AFC042D1E2088467D66AE8DC46CC021D80DA375091EE7509ED15550F311523C9BBE6E1
1,239,957 UART: [idev] SIG.S = 24FD1B5B47CC144A66A5BBE70474F0213637F49E5DCDA142BFF6825CA1F45143E297FC95CE56B167E1BFE1263ACEA1F3
1,248,492 UART: [idev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
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 IDevID/serialNumber=8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d7:b4:85:f2:9f:11:5c:1c:b3:04:6b:84:0b:45:
89:b5:78:62:f5:eb:f9:9d:84:6f:be:3f:d2:d1:43:
96:f5:f6:9a:37:9a:59:ac:c5:a2:ae:c8:36:9e:cb:
65:90:44:37:b4:bc:7c:d9:a5:a8:40:3c:5b:b1:91:
52:23:aa:86:be:f2:c1:bc:92:14:5f:fc:27:c1:25:
c6:db:fa:d4:9c:91:e8:48:c5:44:ac:7f:0e:95:d6:
cd:8c:ac:fb:92:3f:a6
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:5
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:74:fd:28:ce:0f:f9:e9:da:ef:90:84:a5:af:
c0:42:d1:e2:08:84:67:d6:6a:e8:dc:46:cc:02:1d:80:da:37:
50:91:ee:75:09:ed:15:55:0f:31:15:23:c9:bb:e6:e1:02:30:
24:fd:1b:5b:47:cc:14:4a:66:a5:bb:e7:04:74:f0:21:36:37:
f4:9e:5d:cd:a1:42:bf:f6:82:5c:a1:f4:51:43:e2:97:fc:95:
ce:56:b1:67:e1:bf:e1:26:3a:ce:a1:f3
test smoke_test::retrieve_csr_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.42s
Truncated 6858 bytes from beginning
v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,272,495 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,706,657 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,094,728 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
66:da:1b:b3:1d:e7:76:6e:71:b4:b2:95:dc:41:e9:d7:95:99:9d:8f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E2DA1BB31DE7766E71B4B295DC41E9D795999D8F4B382C7977ED9019352917BC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4b:b4:16:d7:57:fb:55:fe:10:9f:a0:09:30:c7:
93:0e:bd:6d:17:05:08:0e:62:62:8e:91:3e:00:3d:
fe:5f:4d:fc:9c:a9:fa:0a:a5:c7:e8:1b:74:8b:2a:
00:31:01:50:ee:29:4a:98:2d:98:96:5c:6e:71:11:
8c:b2:fe:1b:d7:09:bf:f2:3c:48:73:0a:58:4c:3d:
c6:e4:5e:61:06:7f:40:91:e5:21:2c:d8:27:f1:b7:
42:02:e1:de:ba:4c:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
E2:DA:1B:B3:1D:E7:76:6E:71:B4:B2:95:DC:41:E9:D7:95:99:9D:8F
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:35:87:d6:01:c9:e2:71:e0:f3:6c:40:00:f8:15:
f8:2e:65:2a:6d:43:19:b4:df:3b:14:d9:ff:9d:61:ef:8d:36:
29:69:45:ce:ba:bb:3f:47:7a:2b:66:07:b2:f5:1e:b5:02:30:
72:81:3e:3e:82:ef:ef:23:12:f9:4c:ae:01:00:10:f3:39:f7:
48:61:49:e9:20:d9:50:ae:aa:32:fe:b5:00:b9:0f:6f:95:9d:
d8:fc:17:e1:20:76:9a:c7:57:1a:d5:5f
41,565,357 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
41,713,929 UART:
41,714,325 UART: Running Caliptra ROM ...
41,715,435 UART:
41,715,586 UART: [state] CFI Enabled
41,782,002 UART: [state] LifecycleState = Production
41,783,792 UART: [state] DebugLocked = Yes
41,786,361 UART: [state] Starting the Watchdog Timer 40000000 cycles
41,791,406 UART: [kat] SHA2-256
41,961,171 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
41,971,641 UART: [kat] ++
41,972,102 UART: [kat] sha1
41,984,087 UART: [kat] SHA2-256
41,986,781 UART: [kat] SHA2-384
41,992,448 UART: [kat] SHA2-512-ACC
41,994,858 UART: [kat] ECC-384
44,284,613 UART: [kat] HMAC-384Kdf
44,296,180 UART: [kat] LMS
45,486,525 UART: [kat] --
45,489,981 UART: [update-reset] ++
54,755,715 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,759,082 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
55,150,724 >>> mbox cmd response: success
55,151,452 UART: [update-reset] Copying MAN_2 To MAN_1
55,173,909 UART: [update-reset Success] --
55,178,238 UART: [state] Locking Datavault
55,180,962 UART: [state] Locking PCR0, PCR1 and PCR31
55,182,722 UART: [state] Locking ICCM
55,184,710 UART: [exit] Launching FMC @ 0x40000130
55,193,161 UART:
55,193,396 UART: Running Caliptra FMC ...
55,194,500 UART:
55,194,659 UART: [state] CFI Enabled
55,296,781 UART: [art] Extend RT PCRs Done
55,297,970 UART: [art] Lock RT PCRs Done
55,299,426 UART: [art] Populate DV Done
55,304,562 UART: [fht] FMC Alias Private Key: 7
55,306,260 UART: [art] Derive CDI
55,307,071 UART: [art] Store in slot 0x4
55,365,387 UART: [art] Derive Key Pair
55,366,442 UART: [art] Store priv key in slot 0x5
58,659,059 UART: [art] Derive Key Pair - Done
58,672,137 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,960,730 UART: [art] Erasing AUTHORITY.KEYID = 7
60,962,249 UART: [art] PUB.X = 393FED56997B23163BAEB59A88DBA193BE74709BB8149C5E344349D75F83130F768D4C239A76B00AFF91D1EA7BE3BCC9
60,969,524 UART: [art] PUB.Y = 9AAAE4B1C47D056C072C86D50D9CA51D50B06D838088F2052119D294FC562D1CE005911E04AFFFB3982AA58C06976A96
60,976,784 UART: [art] SIG.R = 03ABEE5AF71AE301A67B0F7BB41741D517C905D8AF11278F557656EB47533AB842F0B8D0E1F24D898B64CB24087EB151
60,984,168 UART: [art] SIG.S = 29749E0C8A27066B01642A3F9F5EEB94EC558CB543063A360F51A414BD2B078DC2628DF0CB47EB90C07DDFEE9B009CAA
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:a6:d2:aa:77:17:d3:e7:e5:cb:2a:05:47:17:80:0f:91:f5:6d:ea
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=37A6D2AA7717D3E7E5CB2A054717800F91F56DEA4022CCB2FE3369E0B8F43305
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:39:3f:ed:56:99:7b:23:16:3b:ae:b5:9a:88:db:
a1:93:be:74:70:9b:b8:14:9c:5e:34:43:49:d7:5f:
83:13:0f:76:8d:4c:23:9a:76:b0:0a:ff:91:d1:ea:
7b:e3:bc:c9:9a:aa:e4:b1:c4:7d:05:6c:07:2c:86:
d5:0d:9c:a5:1d:50:b0:6d:83:80:88:f2:05:21:19:
d2:94:fc:56:2d:1c:e0:05:91:1e:04:af:ff:b3:98:
2a:a5:8c:06:97:6a:96
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
37:A6:D2:AA:77:17:D3:E7:E5:CB:2A:05:47:17:80:0F:91:F5:6D:EA
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:03:ab:ee:5a:f7:1a:e3:01:a6:7b:0f:7b:b4:17:
41:d5:17:c9:05:d8:af:11:27:8f:55:76:56:eb:47:53:3a:b8:
42:f0:b8:d0:e1:f2:4d:89:8b:64:cb:24:08:7e:b1:51:02:30:
29:74:9e:0c:8a:27:06:6b:01:64:2a:3f:9f:5e:eb:94:ec:55:
8c:b5:43:06:3a:36:0f:51:a4:14:bd:2b:07:8d:c2:62:8d:f0:
cb:47:eb:90:c0:7d:df:ee:9b:00:9c:aa
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.27s
Truncated 2347 bytes from beginning
DC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,903,083 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,340,052 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,729,416 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6c:5d:90:8a:5c:59:49:47:53:33:8d:d3:2e:17:da:db:94:7a:e9:b4
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=EC5D908A5C59494753338DD32E17DADB947AE9B4914C4790EEC6CEFF774BA9B4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:5f:d6:d6:71:54:7f:49:1e:4e:e2:4b:8a:bb:8c:
b6:38:95:cc:a6:05:7f:80:9b:c1:09:ba:99:c5:04:
e0:f7:31:44:13:4a:fd:4a:20:82:6d:da:89:d0:28:
cf:0e:88:d5:7b:5c:b3:17:a3:83:c7:9d:02:b5:b7:
e0:f9:bc:75:32:9d:18:21:a0:93:48:da:12:ed:d6:
55:0b:9d:43:b6:4b:ce:37:26:ce:0f:2e:16:f0:b0:
84:29:f6:a9:93:29:29
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
EC:5D:90:8A:5C:59:49:47:53:33:8D:D3:2E:17:DA:DB:94:7A:E9:B4
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:3f:8c:f6:ba:8d:2c:52:2a:0e:fc:28:23:cc:95:
93:96:9b:30:1a:c0:71:79:cf:4c:11:b3:93:92:ce:05:7f:02:
b7:5f:60:5d:9a:6e:ea:95:c5:52:0d:d3:61:8b:c2:58:02:31:
00:92:c8:0b:38:7d:2f:4a:33:cd:dd:40:87:3a:21:a8:39:fe:
6a:bb:0a:c0:53:95:7f:82:a7:95:64:53:20:91:86:0c:33:5d:
33:db:ef:dc:cb:31:70:29:00:1c:3a:28:61
41,202,582 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
53,944,218 >>> mbox cmd response: success
53,977,154 UART:
53,977,485 UART: Running Caliptra FMC ...
53,978,704 UART:
53,978,879 UART: [state] CFI Enabled
54,073,146 UART: [art] Extend RT PCRs Done
54,074,347 UART: [art] Lock RT PCRs Done
54,075,755 UART: [art] Populate DV Done
54,081,382 UART: [fht] FMC Alias Private Key: 7
54,083,086 UART: [art] Derive CDI
54,083,905 UART: [art] Store in slot 0x4
54,141,792 UART: [art] Derive Key Pair
54,142,836 UART: [art] Store priv key in slot 0x5
57,435,492 UART: [art] Derive Key Pair - Done
57,448,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,738,212 UART: [art] Erasing AUTHORITY.KEYID = 7
59,739,736 UART: [art] PUB.X = B080D99A9882878B38F290EB1F7A05FFF201495D3806259E21CCED48A28B1D13539B9462D1C0E4497E635EB767E7E524
59,746,987 UART: [art] PUB.Y = B689E6070A5300D1C98B1A38B3E29E74E6F605EC451202AFA0D3E4C1EECB815B5F43091EDE2B5A9E6096941CBED879FF
59,754,199 UART: [art] SIG.R = FBD3CB02C5C6BAC441F559777281A490B6D4949BA53C559B3DC1E99C8B044A99D216483A573A873EABFBD98520783C19
59,761,573 UART: [art] SIG.S = 85D9B08E9F89C2DD39C44773AB53E51CDB9823D83BBBF2433C4AF3C98D01D07BB3741E9106E7E906183EC423BE87D166
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
76:f9:0b:22:da:92:a6:e6:09:4d:19:76:4d:13:ef:d4:46:41:89:21
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F2F90B22DA92A6E6094D19764D13EFD446418921E064C722471778182A858554
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:b0:80:d9:9a:98:82:87:8b:38:f2:90:eb:1f:7a:
05:ff:f2:01:49:5d:38:06:25:9e:21:cc:ed:48:a2:
8b:1d:13:53:9b:94:62:d1:c0:e4:49:7e:63:5e:b7:
67:e7:e5:24:b6:89:e6:07:0a:53:00:d1:c9:8b:1a:
38:b3:e2:9e:74:e6:f6:05:ec:45:12:02:af:a0:d3:
e4:c1:ee:cb:81:5b:5f:43:09:1e:de:2b:5a:9e:60:
96:94:1c:be:d8:79:ff
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
F2:F9:0B:22:DA:92:A6:E6:09:4D:19:76:4D:13:EF:D4:46:41:89:21
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:fb:d3:cb:02:c5:c6:ba:c4:41:f5:59:77:72:
81:a4:90:b6:d4:94:9b:a5:3c:55:9b:3d:c1:e9:9c:8b:04:4a:
99:d2:16:48:3a:57:3a:87:3e:ab:fb:d9:85:20:78:3c:19:02:
31:00:85:d9:b0:8e:9f:89:c2:dd:39:c4:47:73:ab:53:e5:1c:
db:98:23:d8:3b:bb:f2:43:3c:4a:f3:c9:8d:01:d0:7b:b3:74:
1e:91:06:e7:e9:06:18:3e:c4:23:be:87:d1:66
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.21s
Truncated 6861 bytes from beginning
Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
38,798,939 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
39,233,939 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
39,623,691 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
77:b8:99:94:94:35:77:01:71:36:6c:84:37:f9:53:ab:e5:70:bb:f1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=73B899949435770171366C8437F953ABE570BBF1BE99CB3C5D07181ADCA1638F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:4d:a2:15:bc:5f:43:43:59:92:13:18:bf:da:24:
f0:3d:bb:f3:7a:86:68:48:a9:0d:30:12:be:9a:31:
79:08:6f:26:cb:6d:19:b8:93:33:f8:c8:04:96:a0:
f2:bc:84:65:9a:c8:7e:7d:f6:4e:d3:91:94:ea:48:
f6:45:29:09:76:58:f2:54:57:eb:9e:e0:d3:54:50:
5c:02:fb:f4:7a:fe:d5:58:6b:d7:4a:9e:26:d8:e9:
48:79:da:07:af:38:eb
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
73:B8:99:94:94:35:77:01:71:36:6C:84:37:F9:53:AB:E5:70:BB:F1
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:10:51:7c:a8:bf:40:01:88:0b:6b:92:50:b3:b0:
47:28:43:ec:4c:67:71:1d:d6:8d:88:61:fd:09:90:11:66:47:
f3:6e:15:4f:8a:99:33:4a:c4:97:2c:8d:6b:df:80:85:02:31:
00:f7:b9:a4:83:d9:bc:c6:de:bb:d2:6a:2e:2c:5f:5f:cd:98:
37:d3:22:1e:d1:8b:24:4c:3f:81:df:2b:8a:61:a3:d8:78:38:
2b:12:19:dc:64:c2:b9:8c:d8:95:e4:ae:14
42,089,584 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
42,238,089 UART:
42,238,478 UART: Running Caliptra ROM ...
42,239,587 UART:
42,239,743 UART: [state] CFI Enabled
42,252,082 UART: [state] LifecycleState = Production
42,253,824 UART: [state] DebugLocked = Yes
42,255,540 UART: [state] Starting the Watchdog Timer 40000000 cycles
42,260,427 UART: [kat] SHA2-256
42,430,192 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
42,440,679 UART: [kat] ++
42,441,162 UART: [kat] sha1
42,452,429 UART: [kat] SHA2-256
42,455,129 UART: [kat] SHA2-384
42,461,329 UART: [kat] SHA2-512-ACC
42,463,732 UART: [kat] ECC-384
44,744,816 UART: [kat] HMAC-384Kdf
44,757,532 UART: [kat] LMS
45,947,647 UART: [kat] --
45,951,258 UART: [update-reset] ++
54,828,750 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,832,229 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
55,224,005 >>> mbox cmd response: success
55,224,626 UART: [update-reset] Copying MAN_2 To MAN_1
55,247,031 UART: [update-reset Success] --
55,252,192 UART: [state] Locking Datavault
55,254,851 UART: [state] Locking PCR0, PCR1 and PCR31
55,256,629 UART: [state] Locking ICCM
55,259,232 UART: [exit] Launching FMC @ 0x40000130
55,267,628 UART:
55,267,873 UART: Running Caliptra FMC ...
55,268,975 UART:
55,269,129 UART: [state] CFI Enabled
55,313,367 UART: [art] Extend RT PCRs Done
55,314,547 UART: [art] Lock RT PCRs Done
55,315,732 UART: [art] Populate DV Done
55,321,188 UART: [fht] FMC Alias Private Key: 7
55,322,828 UART: [art] Derive CDI
55,323,639 UART: [art] Store in slot 0x4
55,366,121 UART: [art] Derive Key Pair
55,367,122 UART: [art] Store priv key in slot 0x5
58,609,174 UART: [art] Derive Key Pair - Done
58,621,851 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
60,902,129 UART: [art] Erasing AUTHORITY.KEYID = 7
60,903,641 UART: [art] PUB.X = 8ADE78138142EE33736F130F66BE3D55C96C960F11A98D8239A699F00E88F1483D7169A5E87334756D4E7EC201CF5795
60,910,916 UART: [art] PUB.Y = B4A3818F73A88C8FB96FB5D5131C0CF40B30B9489CABBB48B34DBF96037F8E69E5803FF3849C9F7E2C3FA6B28826E46E
60,918,161 UART: [art] SIG.R = 1331268AE722FE04848D9D5E6B2BAFB531AE50314DA0AB092CA5B91ED882DEFBCB0687F0F18166B817DC5CAFECFBF438
60,925,592 UART: [art] SIG.S = 77870507FF08811815D78F72354EBC40D9867A678A394EBDB8D94E9898EC48B06DFA5BC0A89B184E5DB3ECD4453A3AEA
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:ea:aa:5f:a3:b8:21:28:c9:93:98:16:b0:9d:0a:a6:79:54:c9:6e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BFEAAA5FA3B82128C9939816B09D0AA67954C96E8CF87028EA43DEE6914BB64D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:8a:de:78:13:81:42:ee:33:73:6f:13:0f:66:be:
3d:55:c9:6c:96:0f:11:a9:8d:82:39:a6:99:f0:0e:
88:f1:48:3d:71:69:a5:e8:73:34:75:6d:4e:7e:c2:
01:cf:57:95:b4:a3:81:8f:73:a8:8c:8f:b9:6f:b5:
d5:13:1c:0c:f4:0b:30:b9:48:9c:ab:bb:48:b3:4d:
bf:96:03:7f:8e:69:e5:80:3f:f3:84:9c:9f:7e:2c:
3f:a6:b2:88:26:e4:6e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
BF:EA:AA:5F:A3:B8:21:28:C9:93:98:16:B0:9D:0A:A6:79:54:C9:6E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:13:31:26:8a:e7:22:fe:04:84:8d:9d:5e:6b:2b:
af:b5:31:ae:50:31:4d:a0:ab:09:2c:a5:b9:1e:d8:82:de:fb:
cb:06:87:f0:f1:81:66:b8:17:dc:5c:af:ec:fb:f4:38:02:30:
77:87:05:07:ff:08:81:18:15:d7:8f:72:35:4e:bc:40:d9:86:
7a:67:8a:39:4e:bd:b8:d9:4e:98:98:ec:48:b0:6d:fa:5b:c0:
a8:9b:18:4e:5d:b3:ec:d4:45:3a:3a:ea
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.27s
Truncated 2344 bytes from beginning
ABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
37,638,884 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
38,073,848 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
38,463,439 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
17:eb:b1:29:1f:dc:da:0e:f0:9b:74:44:35:d6:f6:c2:59:68:9f:e7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=17EBB1291FDCDA0EF09B744435D6F6C259689FE7485492FA2670972066324DF4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9c:bf:3f:b6:ea:b6:4f:0f:63:ef:bd:76:f7:f9:
14:d8:85:76:aa:4f:89:c0:03:f5:1e:a6:bf:9b:1a:
17:c6:2c:57:6b:69:11:ee:cc:42:c4:33:9a:b9:fe:
4b:4b:a3:e5:c5:7d:86:40:34:31:09:f4:0a:bb:ba:
14:dd:6f:1b:4b:76:43:4f:0a:d6:84:52:ad:fe:cb:
32:65:ca:08:65:1d:2f:e8:f2:98:52:62:1d:6b:e7:
70:17:b5:8b:6f:05:ca
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
17:EB:B1:29:1F:DC:DA:0E:F0:9B:74:44:35:D6:F6:C2:59:68:9F:E7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:40:b6:83:1b:07:8c:5a:0f:63:d0:23:44:2d:02:
49:ba:df:6e:ce:63:1b:10:78:18:6b:ee:03:e1:87:fc:f4:a3:
ee:1a:31:e8:12:9b:0b:65:b9:6a:c3:93:43:36:72:16:02:30:
2d:96:3e:ea:8c:a2:55:47:76:f9:3c:03:d1:b9:17:bf:45:dd:
b3:8a:a4:cb:95:31:88:60:cc:36:fe:b3:eb:35:45:0f:47:b2:
74:a2:d5:c6:78:80:b5:1a:3e:58:e2:fc
40,934,788 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
53,798,689 >>> mbox cmd response: success
53,831,386 UART:
53,831,724 UART: Running Caliptra FMC ...
53,832,968 UART:
53,833,145 UART: [state] CFI Enabled
53,877,151 UART: [art] Extend RT PCRs Done
53,878,338 UART: [art] Lock RT PCRs Done
53,879,838 UART: [art] Populate DV Done
53,885,570 UART: [fht] FMC Alias Private Key: 7
53,887,266 UART: [art] Derive CDI
53,887,999 UART: [art] Store in slot 0x4
53,930,507 UART: [art] Derive Key Pair
53,931,553 UART: [art] Store priv key in slot 0x5
57,173,296 UART: [art] Derive Key Pair - Done
57,185,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
59,466,612 UART: [art] Erasing AUTHORITY.KEYID = 7
59,468,120 UART: [art] PUB.X = 13BA6CBB24B416473BF2F7A8B51680353567FC4428E4593FA8997E3BC8DB9B5F707E88948310CD843862E4EFD289BC62
59,475,372 UART: [art] PUB.Y = 000DBC1FC1107203C00E5F0687B0041879E65AAFD0056F3BC22907FD1A83B57DC0152D3973318C2912E8AF75DE6ECDDB
59,482,601 UART: [art] SIG.R = E381BA928ACC944A73D26386CA1B137DE5C0C96C60468CF18AF726C3E85DABE11028C3B5D303856BEEC842A9823671A7
59,490,028 UART: [art] SIG.S = C1F69A716F11604E92954430F6DEADA67E434787313316A79DE4AEB47E698F379EE9D0D27324DC082B08884281CFE4CC
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
27:3a:eb:1b:3a:48:3b:92:0f:0b:76:e0:ec:1e:8e:cf:66:7c:52:e2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=233AEB1B3A483B920F0B76E0EC1E8ECF667C52E246BFA5CE3B87DE840C9AE9AB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:13:ba:6c:bb:24:b4:16:47:3b:f2:f7:a8:b5:16:
80:35:35:67:fc:44:28:e4:59:3f:a8:99:7e:3b:c8:
db:9b:5f:70:7e:88:94:83:10:cd:84:38:62:e4:ef:
d2:89:bc:62:00:0d:bc:1f:c1:10:72:03:c0:0e:5f:
06:87:b0:04:18:79:e6:5a:af:d0:05:6f:3b:c2:29:
07:fd:1a:83:b5:7d:c0:15:2d:39:73:31:8c:29:12:
e8:af:75:de:6e:cd:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
23:3A:EB:1B:3A:48:3B:92:0F:0B:76:E0:EC:1E:8E:CF:66:7C:52:E2
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e3:81:ba:92:8a:cc:94:4a:73:d2:63:86:ca:
1b:13:7d:e5:c0:c9:6c:60:46:8c:f1:8a:f7:26:c3:e8:5d:ab:
e1:10:28:c3:b5:d3:03:85:6b:ee:c8:42:a9:82:36:71:a7:02:
31:00:c1:f6:9a:71:6f:11:60:4e:92:95:44:30:f6:de:ad:a6:
7e:43:47:87:31:33:16:a7:9d:e4:ae:b4:7e:69:8f:37:9e:e9:
d0:d2:73:24:dc:08:2b:08:88:42:81:cf:e4:cc
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 3.19s
Truncated 6759 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,792,177 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,227,383 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,617,175 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
46:fa:b9:22:7d:54:f9:56:0d:78:d2:33:2f:d7:71:5b:15:9d:90:05
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=C6FAB9227D54F9560D78D2332FD7715B159D9005DBCCEF6D9312C81AFB9711D4
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0d:0c:eb:83:56:d8:a2:5d:f5:8b:e5:4f:64:54:
fa:05:e7:ed:31:df:6c:24:6f:0a:2b:e0:4b:c0:62:
a6:dd:28:c1:3a:30:94:09:b7:a8:60:5b:d0:90:20:
26:65:70:2d:7e:0f:1a:02:a4:55:03:46:72:62:9d:
29:ae:bd:85:40:f9:1b:ae:e3:58:bf:31:bc:33:cf:
ac:cb:b5:d6:a2:f0:51:8f:e2:5c:7b:db:ad:fd:c5:
11:c6:fc:2d:87:09:57
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
C6:FA:B9:22:7D:54:F9:56:0D:78:D2:33:2F:D7:71:5B:15:9D:90:05
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:79:68:bb:36:4a:bb:da:c1:7f:ba:4a:02:15:0d:
de:66:a7:f5:3f:69:53:b7:6b:12:45:ce:e7:e2:f2:c5:01:d0:
d6:ad:28:a5:2e:34:86:cb:72:aa:dd:bd:15:71:1d:58:02:30:
1f:52:da:f2:17:fa:6a:e4:8d:4f:28:2f:9d:72:e9:2a:90:2e:
e6:30:da:e3:d2:07:32:e7:a9:fa:4d:b5:eb:42:41:d2:74:66:
7d:22:23:a3:e3:83:af:e3:33:8d:a1:3b
31,087,124 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,235,788 UART:
31,236,170 UART: Running Caliptra ROM ...
31,237,378 UART:
31,237,562 UART: [state] CFI Enabled
31,301,911 UART: [state] LifecycleState = Production
31,303,739 UART: [state] DebugLocked = Yes
31,306,413 UART: [state] Starting the WD Timer 40000000 cycles
31,311,457 UART: [kat] SHA2-256
31,491,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,501,971 UART: [kat] ++
31,502,517 UART: [kat] sha1
31,513,740 UART: [kat] SHA2-256
31,516,423 UART: [kat] SHA2-384
31,522,364 UART: [kat] SHA2-512-ACC
31,524,720 UART: [kat] ECC-384
33,986,284 UART: [kat] HMAC-384Kdf
34,011,798 UART: [kat] LMS
34,488,257 UART: [kat] --
34,491,564 UART: [update-reset] ++
39,077,177 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,081,070 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,472,589 >>> mbox cmd response: success
39,473,660 UART: [update-reset] Copying MAN_2 To MAN_1
39,510,814 UART: [update-reset Success] --
39,515,583 UART: [state] Locking Datavault
39,519,667 UART: [state] Locking PCR0, PCR1 and PCR31
39,521,373 UART: [state] Locking ICCM
39,522,694 UART: [exit] Launching FMC @ 0x40000130
39,531,094 UART:
39,531,337 UART: Running Caliptra FMC ...
39,532,367 UART:
39,532,518 UART: [state] CFI Enabled
39,633,861 UART: [art] Extend RT PCRs Done
39,635,043 UART: [art] Lock RT PCRs Done
39,636,227 UART: [art] Populate DV Done
39,641,690 UART: [fht] FMC Alias Private Key: 7
39,643,346 UART: [art] Derive CDI
39,644,163 UART: [art] Store in slot 0x4
39,702,954 UART: [art] Derive Key Pair
39,704,009 UART: [art] Store priv key in slot 0x5
42,166,472 UART: [art] Derive Key Pair - Done
42,179,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,891,079 UART: [art] Erasing AUTHORITY.KEYID = 7
43,892,592 UART: [art] PUB.X = 18822C050291AAFADD2A5B311C0C495538EA80F6E682C24FA7984D7C3CC02AC6CF919AC34A68FD4443D604228203E995
43,899,860 UART: [art] PUB.Y = C73D72515707F9EF279B54AB05887894FCB1EA36CE08DD9FD682C578EE6BC460578D8A3F8772E4037B4716A6EDC20B8C
43,907,160 UART: [art] SIG.R = 5CAC03D78458C7FBF5B8550ABFF48DC42785708E2D4F3DD8A90354D9B11A3B0CF53586E7A94221BDD32B18090F4F1089
43,914,553 UART: [art] SIG.S = FF6E025CFB1F01A4EF5720D10B50656985BDC193F5654101617664F39E74187EC1BE2BF9D405EC6169DEFE1CE830BEA9
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3e:0e:a0:fb:b3:4d:1c:39:f0:4d:a1:4f:57:9f:af:a9:9e:f9:92:29
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BA0EA0FBB34D1C39F04DA14F579FAFA99EF99229C8EDD0E4ACCF0BB97B89538C
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:18:82:2c:05:02:91:aa:fa:dd:2a:5b:31:1c:0c:
49:55:38:ea:80:f6:e6:82:c2:4f:a7:98:4d:7c:3c:
c0:2a:c6:cf:91:9a:c3:4a:68:fd:44:43:d6:04:22:
82:03:e9:95:c7:3d:72:51:57:07:f9:ef:27:9b:54:
ab:05:88:78:94:fc:b1:ea:36:ce:08:dd:9f:d6:82:
c5:78:ee:6b:c4:60:57:8d:8a:3f:87:72:e4:03:7b:
47:16:a6:ed:c2:0b:8c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
BA:0E:A0:FB:B3:4D:1C:39:F0:4D:A1:4F:57:9F:AF:A9:9E:F9:92:29
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:5c:ac:03:d7:84:58:c7:fb:f5:b8:55:0a:bf:f4:
8d:c4:27:85:70:8e:2d:4f:3d:d8:a9:03:54:d9:b1:1a:3b:0c:
f5:35:86:e7:a9:42:21:bd:d3:2b:18:09:0f:4f:10:89:02:31:
00:ff:6e:02:5c:fb:1f:01:a4:ef:57:20:d1:0b:50:65:69:85:
bd:c1:93:f5:65:41:01:61:76:64:f3:9e:74:18:7e:c1:be:2b:
f9:d4:05:ec:61:69:de:fe:1c:e8:30:be:a9
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.40s
Truncated 2312 bytes from beginning
C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,464,137 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,903,171 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,291,656 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
05:3f:29:1d:90:bd:9d:cc:53:22:21:4d:c7:bf:30:54:6d:d9:d3:5a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=013F291D90BD9DCC5322214DC7BF30546DD9D35AB18B1BC01852FEAECCB40050
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:05:d5:b2:9e:bb:5a:d0:2d:f2:b6:76:24:1e:e3:
5e:a3:55:1b:5b:aa:18:d2:fc:99:5f:5c:b6:97:f3:
cb:6b:06:5c:95:ae:66:60:a8:3b:5d:98:8e:8d:c3:
97:fb:ba:83:db:e9:11:17:c8:00:bb:8b:c4:51:32:
9b:04:bc:3a:11:1b:a7:39:91:3d:c4:db:9b:56:fe:
f4:86:f1:ec:e5:ab:fc:1e:6e:ff:79:56:0d:15:9f:
7e:d6:90:ba:09:18:c5
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
01:3F:29:1D:90:BD:9D:CC:53:22:21:4D:C7:BF:30:54:6D:D9:D3:5A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ad:87:d5:e1:09:a2:6c:d6:77:6f:35:13:c4:
35:eb:07:3a:ec:76:17:69:d1:c2:61:52:17:3e:c0:82:db:09:
42:80:c1:b6:ee:5d:62:63:be:90:bf:e4:8b:28:91:1f:ce:02:
31:00:9d:72:e6:7f:b7:e0:43:8a:0e:c3:e9:06:04:b7:1c:2c:
90:bb:68:1c:9f:4c:b1:a4:c1:b8:89:7b:ea:2a:f8:c7:38:5f:
b5:4f:95:70:00:f1:4f:e1:8c:91:18:f4:c0:48
30,760,817 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,244,368 >>> mbox cmd response: success
39,278,648 UART:
39,278,975 UART: Running Caliptra FMC ...
39,280,137 UART:
39,280,297 UART: [state] CFI Enabled
39,377,019 UART: [art] Extend RT PCRs Done
39,378,228 UART: [art] Lock RT PCRs Done
39,379,724 UART: [art] Populate DV Done
39,385,355 UART: [fht] FMC Alias Private Key: 7
39,386,894 UART: [art] Derive CDI
39,387,629 UART: [art] Store in slot 0x4
39,446,046 UART: [art] Derive Key Pair
39,447,047 UART: [art] Store priv key in slot 0x5
41,909,588 UART: [art] Derive Key Pair - Done
41,922,532 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,635,869 UART: [art] Erasing AUTHORITY.KEYID = 7
43,637,385 UART: [art] PUB.X = C45E267E12154D3273CEFADE8958554F1F58BEB9E4F28058BBF77182F2AB5127880C0B1C0B92273C2746332236E406C1
43,644,630 UART: [art] PUB.Y = 41CE521694780455C029ABA94369A0F1124006B45C8D4BA647E78B15760B68764FF1019CD81CDA4790CFE20EFAB03CBD
43,651,866 UART: [art] SIG.R = 322E5394BBB8EDD2CC88D74DAA1F6E3F4DBAD0551AF3DD6EA4F61CAF7793537A1DCD15B67B46B980C8EF82F26C942C8C
43,659,328 UART: [art] SIG.S = 637683F541A5C4999FBCDB2C2B98327BC7147179136D70D767621201293F5DCF8ED2AEDD845869AF88321B4B1403DF78
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:7f:a3:6f:32:db:91:63:98:5a:98:cc:d0:ee:ca:a4:fa:09:b4:52
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=327FA36F32DB9163985A98CCD0EECAA4FA09B4524384CF89FE9ADAEAE46CE4D3
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:c4:5e:26:7e:12:15:4d:32:73:ce:fa:de:89:58:
55:4f:1f:58:be:b9:e4:f2:80:58:bb:f7:71:82:f2:
ab:51:27:88:0c:0b:1c:0b:92:27:3c:27:46:33:22:
36:e4:06:c1:41:ce:52:16:94:78:04:55:c0:29:ab:
a9:43:69:a0:f1:12:40:06:b4:5c:8d:4b:a6:47:e7:
8b:15:76:0b:68:76:4f:f1:01:9c:d8:1c:da:47:90:
cf:e2:0e:fa:b0:3c:bd
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
32:7F:A3:6F:32:DB:91:63:98:5A:98:CC:D0:EE:CA:A4:FA:09:B4:52
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:32:2e:53:94:bb:b8:ed:d2:cc:88:d7:4d:aa:1f:
6e:3f:4d:ba:d0:55:1a:f3:dd:6e:a4:f6:1c:af:77:93:53:7a:
1d:cd:15:b6:7b:46:b9:80:c8:ef:82:f2:6c:94:2c:8c:02:30:
63:76:83:f5:41:a5:c4:99:9f:bc:db:2c:2b:98:32:7b:c7:14:
71:79:13:6d:70:d7:67:62:12:01:29:3f:5d:cf:8e:d2:ae:dd:
84:58:69:af:88:32:1b:4b:14:03:df:78
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 6768 bytes from beginning
.................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,808,630 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,241,554 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,629,227 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
65:85:c5:1e:6e:ad:81:4c:d1:e3:69:a5:31:1a:ab:f1:de:47:52:38
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6585C51E6EAD814CD1E369A5311AABF1DE47523803D8282D8F6822F571782D08
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:0f:5c:a7:95:75:e2:f9:35:62:4c:cc:8e:53:af:
d4:ae:73:af:99:48:d9:b6:9c:39:44:91:58:ae:32:
1e:3e:d0:9c:4f:f0:2a:c0:e9:b7:0a:77:34:69:67:
b2:4a:19:78:ea:f8:a0:b7:a3:ab:52:31:29:10:10:
92:c7:0b:5c:c8:b4:6a:9c:f2:34:8a:48:ba:31:d2:
0d:a2:3a:9f:b8:8a:01:33:34:f6:db:44:99:c6:ce:
fd:49:5e:fa:0c:d6:ea
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
65:85:C5:1E:6E:AD:81:4C:D1:E3:69:A5:31:1A:AB:F1:DE:47:52:38
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e9:9c:35:eb:ef:c7:0b:d8:a5:5b:0c:5b:a4:
05:e3:47:46:3b:1f:54:97:9a:36:d7:22:5e:5f:27:2f:54:00:
46:a3:5a:d7:9b:04:24:3f:02:40:82:d6:26:60:82:25:ba:02:
31:00:b8:d4:fd:8f:8a:00:7c:b3:db:f4:e8:13:1f:c3:fe:6a:
6d:9b:ea:6d:47:ca:d7:2f:5e:89:a4:c5:fb:5b:a9:73:24:35:
ec:9b:82:53:d3:64:e9:fd:27:a4:98:5e:a6:63
31,098,260 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,246,779 UART:
31,247,146 UART: Running Caliptra ROM ...
31,248,250 UART:
31,248,412 UART: [state] CFI Enabled
31,261,807 UART: [state] LifecycleState = Production
31,263,597 UART: [state] DebugLocked = Yes
31,266,421 UART: [state] Starting the WD Timer 40000000 cycles
31,271,101 UART: [kat] SHA2-256
31,450,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
31,461,589 UART: [kat] ++
31,462,103 UART: [kat] sha1
31,474,119 UART: [kat] SHA2-256
31,476,797 UART: [kat] SHA2-384
31,483,719 UART: [kat] SHA2-512-ACC
31,486,071 UART: [kat] ECC-384
33,928,748 UART: [kat] HMAC-384Kdf
33,940,182 UART: [kat] LMS
34,416,659 UART: [kat] --
34,422,646 UART: [update-reset] ++
38,977,212 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
38,981,019 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
39,372,533 >>> mbox cmd response: success
39,373,043 UART: [update-reset] Copying MAN_2 To MAN_1
39,409,959 UART: [update-reset Success] --
39,416,039 UART: [state] Locking Datavault
39,419,910 UART: [state] Locking PCR0, PCR1 and PCR31
39,421,668 UART: [state] Locking ICCM
39,423,092 UART: [exit] Launching FMC @ 0x40000130
39,431,490 UART:
39,431,721 UART: Running Caliptra FMC ...
39,432,744 UART:
39,432,888 UART: [state] CFI Enabled
39,477,127 UART: [art] Extend RT PCRs Done
39,478,311 UART: [art] Lock RT PCRs Done
39,479,574 UART: [art] Populate DV Done
39,485,087 UART: [fht] FMC Alias Private Key: 7
39,486,695 UART: [art] Derive CDI
39,487,432 UART: [art] Store in slot 0x4
39,529,970 UART: [art] Derive Key Pair
39,530,961 UART: [art] Store priv key in slot 0x5
41,957,716 UART: [art] Derive Key Pair - Done
41,970,878 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,677,091 UART: [art] Erasing AUTHORITY.KEYID = 7
43,678,618 UART: [art] PUB.X = 8330281BB22EBADD1DAED16CDA51522D19437A3FA0F0DE6C1EE72ACA2085DA2C59BEBA1EEE99BA2EF011982AF544E860
43,685,942 UART: [art] PUB.Y = 77655F1690A1701BBBFB227711943EDCFB3086403E96C2A76ABEA64AAAA7910FCD5124864C7050C73398001EA4554F14
43,693,180 UART: [art] SIG.R = DFD4E3B6C8E68E1837EA7A5BE4F55EFEC923E70595A544DEC9644C0E02A1A779949F37BA320A7413EB62629962210CBE
43,700,587 UART: [art] SIG.S = C037D7BAA36D0FE2CE24546EEB8EA8499447C6FAE1C09C42C52FE4E519BF7D97E69D829F3DCE22288DB8D4C0F2FAFB57
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5f:8a:7c:dc:c9:36:bc:c6:b0:00:fd:77:42:0a:60:f3:96:ee:bc:c7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5B8A7CDCC936BCC6B000FD77420A60F396EEBCC7086A2BE80EA504551CF7A7DF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:83:30:28:1b:b2:2e:ba:dd:1d:ae:d1:6c:da:51:
52:2d:19:43:7a:3f:a0:f0:de:6c:1e:e7:2a:ca:20:
85:da:2c:59:be:ba:1e:ee:99:ba:2e:f0:11:98:2a:
f5:44:e8:60:77:65:5f:16:90:a1:70:1b:bb:fb:22:
77:11:94:3e:dc:fb:30:86:40:3e:96:c2:a7:6a:be:
a6:4a:aa:a7:91:0f:cd:51:24:86:4c:70:50:c7:33:
98:00:1e:a4:55:4f:14
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
5B:8A:7C:DC:C9:36:BC:C6:B0:00:FD:77:42:0A:60:F3:96:EE:BC:C7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:df:d4:e3:b6:c8:e6:8e:18:37:ea:7a:5b:e4:
f5:5e:fe:c9:23:e7:05:95:a5:44:de:c9:64:4c:0e:02:a1:a7:
79:94:9f:37:ba:32:0a:74:13:eb:62:62:99:62:21:0c:be:02:
31:00:c0:37:d7:ba:a3:6d:0f:e2:ce:24:54:6e:eb:8e:a8:49:
94:47:c6:fa:e1:c0:9c:42:c5:2f:e4:e5:19:bf:7d:97:e6:9d:
82:9f:3d:ce:22:28:8d:b8:d4:c0:f2:fa:fb:57
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.39s
Truncated 2309 bytes from beginning
8E3C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
27,476,522 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
27,918,939 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,306,513 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:f6:65:90:64:b5:bf:b3:cc:a0:a3:90:49:f6:ec:8d:2e:12:b9:24
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B3F6659064B5BFB3CCA0A39049F6EC8D2E12B9243C0B9AABE27DFFAB3173BA75
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:f0:cb:13:de:cd:62:c5:0c:65:30:cf:c5:6b:bd:
a4:f9:ca:2d:db:21:08:0e:ab:30:0f:51:af:93:da:
2e:9f:65:59:05:70:71:d6:ab:86:af:64:3c:fd:ec:
6e:0f:73:02:e0:4c:db:00:c0:98:40:f6:d8:ac:a3:
aa:44:56:b2:87:f5:74:b2:32:d0:b1:bd:52:89:f0:
f4:3a:2a:12:3e:bf:36:60:67:25:4a:b1:01:f5:46:
e7:08:d3:52:fe:92:de
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
B3:F6:65:90:64:B5:BF:B3:CC:A0:A3:90:49:F6:EC:8D:2E:12:B9:24
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:af:69:1c:35:5a:a9:16:d4:23:ba:3c:ab:44:
74:29:11:f0:29:09:27:f7:6d:36:b5:72:98:ba:ce:18:73:b2:
e7:3e:9e:34:50:29:2f:54:c0:11:4d:d2:45:3f:74:f9:6e:02:
30:3a:17:77:c5:5b:9a:a0:8b:c1:e6:db:15:f3:43:85:a8:f7:
12:bc:01:f9:f3:af:0b:ea:1b:44:f0:16:13:c5:5c:94:37:2b:
6e:d4:9a:b6:f2:1b:68:f9:b2:70:67:ac:b5
30,779,184 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
39,136,459 >>> mbox cmd response: success
39,169,835 UART:
39,170,209 UART: Running Caliptra FMC ...
39,171,459 UART:
39,171,646 UART: [state] CFI Enabled
39,215,233 UART: [art] Extend RT PCRs Done
39,216,386 UART: [art] Lock RT PCRs Done
39,217,822 UART: [art] Populate DV Done
39,223,340 UART: [fht] FMC Alias Private Key: 7
39,224,929 UART: [art] Derive CDI
39,225,744 UART: [art] Store in slot 0x4
39,268,404 UART: [art] Derive Key Pair
39,269,447 UART: [art] Store priv key in slot 0x5
41,696,143 UART: [art] Derive Key Pair - Done
41,709,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
43,416,195 UART: [art] Erasing AUTHORITY.KEYID = 7
43,417,700 UART: [art] PUB.X = CDAEEE2539A1C624159E9721A38DDEA82DB23C38034771BB586B23304A8735B79DB0E4686ACD75F243763ABAE10E5579
43,424,962 UART: [art] PUB.Y = 6C13451918BB8000E1E90965B0582B7F472DA8EBB0F63F0DF6A7F1DC45D123B7989B6D98C95F378B2E37B91627FAE26E
43,432,215 UART: [art] SIG.R = 7163D6BD7D842B91A12652DB39FD278B77EFD25EFB0955AB80D23C1D5AD6E9FE03C114F76D826859A2FB321806796A1C
43,439,610 UART: [art] SIG.S = 45175021C70C66534BCD32ABA632C979F700D704007847FC0B11CB5F76968BB42731A3D6B513B640CD3B757933965094
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
26:c2:83:0e:09:e7:4f:78:58:aa:17:f7:01:72:60:a5:1f:6f:22:44
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A6C2830E09E74F7858AA17F7017260A51F6F22440979392CD8B49BAA5D056E23
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cd:ae:ee:25:39:a1:c6:24:15:9e:97:21:a3:8d:
de:a8:2d:b2:3c:38:03:47:71:bb:58:6b:23:30:4a:
87:35:b7:9d:b0:e4:68:6a:cd:75:f2:43:76:3a:ba:
e1:0e:55:79:6c:13:45:19:18:bb:80:00:e1:e9:09:
65:b0:58:2b:7f:47:2d:a8:eb:b0:f6:3f:0d:f6:a7:
f1:dc:45:d1:23:b7:98:9b:6d:98:c9:5f:37:8b:2e:
37:b9:16:27:fa:e2:6e
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
A6:C2:83:0E:09:E7:4F:78:58:AA:17:F7:01:72:60:A5:1F:6F:22:44
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:71:63:d6:bd:7d:84:2b:91:a1:26:52:db:39:fd:
27:8b:77:ef:d2:5e:fb:09:55:ab:80:d2:3c:1d:5a:d6:e9:fe:
03:c1:14:f7:6d:82:68:59:a2:fb:32:18:06:79:6a:1c:02:30:
45:17:50:21:c7:0c:66:53:4b:cd:32:ab:a6:32:c9:79:f7:00:
d7:04:00:78:47:fc:0b:11:cb:5f:76:96:8b:b4:27:31:a3:d6:
b5:13:b6:40:cd:3b:75:79:33:96:50:94
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.38s
Truncated 6762 bytes from beginning
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,206,771 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,639,251 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,029,639 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2c:a7:ad:8e:e2:e5:82:24:e5:03:e9:64:f2:07:74:96:91:f9:0b:0b
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=2CA7AD8EE2E58224E503E964F207749691F90B0B744D683CFAF7FD58D90082D8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:fb:84:7d:d3:60:cd:95:99:8e:aa:ba:a7:02:d9:
a7:df:12:79:f9:71:8d:0a:ff:c0:88:08:56:5a:63:
47:a9:c3:b0:2b:13:f6:0c:a7:eb:e1:db:b3:91:f0:
93:62:18:6a:5b:93:8d:3e:5d:5e:40:13:91:09:bd:
fd:c4:c8:f3:3e:d6:a4:80:3f:ed:fc:3e:58:58:7e:
dc:94:fa:7f:44:35:00:9c:fa:f3:c7:33:d2:50:8f:
f9:d1:68:54:bd:19:24
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
2C:A7:AD:8E:E2:E5:82:24:E5:03:E9:64:F2:07:74:96:91:F9:0B:0B
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:d4:b4:bd:7f:73:e6:7f:25:30:18:70:88:
90:fb:ec:14:59:e3:cc:6f:0b:ee:07:2b:58:57:b4:64:bd:74:
5e:03:a8:c3:c7:9a:5a:ad:2f:75:52:f0:9c:e4:36:b7:84:02:
30:56:ac:61:33:21:98:55:4e:bc:c5:15:f7:26:bb:24:13:25:
36:e8:33:a9:88:5f:d7:cd:21:24:15:4c:ae:93:7c:ab:86:cd:
d4:23:11:d0:53:57:ee:76:ab:13:16:db:25
31,497,581 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,646,294 UART:
31,646,664 UART: Running Caliptra ROM ...
31,647,870 UART:
31,648,042 UART: [state] CFI Enabled
31,717,640 UART: [state] LifecycleState = Production
31,719,564 UART: [state] DebugLocked = Yes
31,721,437 UART: [state] Starting the WD Timer 40000000 cycles
31,726,219 UART: [kat] SHA2-256
31,916,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,926,839 UART: [kat] ++
31,927,431 UART: [kat] sha1
31,938,268 UART: [kat] SHA2-256
31,941,233 UART: [kat] SHA2-384
31,946,733 UART: [kat] SHA2-512-ACC
31,949,343 UART: [kat] ECC-384
34,401,414 UART: [kat] HMAC-384Kdf
34,426,832 UART: [kat] LMS
34,958,414 UART: [kat] --
34,963,434 UART: [update-reset] ++
39,617,182 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,620,782 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,239,979 >>> mbox cmd response: success
40,240,995 UART: [update-reset] Copying MAN_2 To MAN_1
40,278,569 UART: [update-reset Success] --
40,282,186 UART: [state] Locking Datavault
40,284,901 UART: [state] Locking PCR0, PCR1 and PCR31
40,287,087 UART: [state] Locking ICCM
40,288,537 UART: [exit] Launching FMC @ 0x40000130
40,297,252 UART:
40,297,490 UART: Running Caliptra FMC ...
40,298,589 UART:
40,298,750 UART: [state] CFI Enabled
40,389,591 UART: [art] Extend RT PCRs Done
40,390,765 UART: [art] Lock RT PCRs Done
40,392,433 UART: [art] Populate DV Done
40,397,674 UART: [fht] FMC Alias Private Key: 7
40,399,317 UART: [art] Derive CDI
40,400,127 UART: [art] Store in slot 0x4
40,458,937 UART: [art] Derive Key Pair
40,459,970 UART: [art] Store priv key in slot 0x5
42,923,374 UART: [art] Derive Key Pair - Done
42,936,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,648,771 UART: [art] Erasing AUTHORITY.KEYID = 7
44,650,274 UART: [art] PUB.X = 96F9C46D0920D290D1AD5268A0B9DE6219225BFD690ED661494D9C19A0EF91E1A2948EA47BCD2D296716E8B49A45254C
44,657,532 UART: [art] PUB.Y = 371D11E42A6E2DB553CE2C4E59C97303279B791DDAE410906190F1085DBFFA0BA8FA919768FB9F140E9646FB865AC885
44,664,823 UART: [art] SIG.R = EDF4303868E6B1E6234AFE13A48440EF8FB919A7DF12C23B0534CCC006A763A80EEA7F4A5B282E68186BD6301A13FEB4
44,672,205 UART: [art] SIG.S = 77CC6F559CB416A4C1C3F9968FE73F28809893D65CA90F6A22195574BE7720E7CEC0125659373D830FB57D68DD374700
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
55:d1:cf:ce:73:fb:63:2d:aa:ec:05:09:6d:93:b8:ad:2d:4c:e3:b8
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=D1D1CFCE73FB632DAAEC05096D93B8AD2D4CE3B856AB78910AE484264E51401D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:96:f9:c4:6d:09:20:d2:90:d1:ad:52:68:a0:b9:
de:62:19:22:5b:fd:69:0e:d6:61:49:4d:9c:19:a0:
ef:91:e1:a2:94:8e:a4:7b:cd:2d:29:67:16:e8:b4:
9a:45:25:4c:37:1d:11:e4:2a:6e:2d:b5:53:ce:2c:
4e:59:c9:73:03:27:9b:79:1d:da:e4:10:90:61:90:
f1:08:5d:bf:fa:0b:a8:fa:91:97:68:fb:9f:14:0e:
96:46:fb:86:5a:c8:85
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
D1:D1:CF:CE:73:FB:63:2D:AA:EC:05:09:6D:93:B8:AD:2D:4C:E3:B8
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ed:f4:30:38:68:e6:b1:e6:23:4a:fe:13:a4:
84:40:ef:8f:b9:19:a7:df:12:c2:3b:05:34:cc:c0:06:a7:63:
a8:0e:ea:7f:4a:5b:28:2e:68:18:6b:d6:30:1a:13:fe:b4:02:
30:77:cc:6f:55:9c:b4:16:a4:c1:c3:f9:96:8f:e7:3f:28:80:
98:93:d6:5c:a9:0f:6a:22:19:55:74:be:77:20:e7:ce:c0:12:
56:59:37:3d:83:0f:b5:7d:68:dd:37:47:00
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 2315 bytes from beginning
058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,037,694 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,473,252 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,862,250 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:3a:18:60:8a:88:98:f8:3e:79:05:0f:13:8d:f7:82:ce:5e:22:8f
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5C3A18608A8898F83E79050F138DF782CE5E228F502DFD5E78D17DF20850883A
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cf:e0:e0:13:2b:ed:c1:7f:bf:b7:af:9c:e1:57:
05:fe:7f:63:c5:92:e9:d2:70:ca:92:cb:12:bf:6b:
21:50:b9:0a:b9:6d:d5:76:3e:b5:09:41:0e:2a:28:
ad:06:65:3e:22:e8:f2:37:dd:fc:d6:32:d3:d9:6b:
71:f1:2e:6b:94:24:ba:a8:03:95:f6:09:61:3c:f6:
46:29:57:74:34:23:47:85:c6:e3:2a:f6:66:6b:3a:
1c:e2:e7:e4:0c:06:b7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
5C:3A:18:60:8A:88:98:F8:3E:79:05:0F:13:8D:F7:82:CE:5E:22:8F
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:df:33:94:73:fa:e8:4c:7a:0f:1b:72:5a:ef:
df:8d:5c:f9:da:75:4b:47:db:3d:b1:73:81:62:a8:ae:7c:af:
b3:9e:b6:8d:b8:8e:c3:08:8c:40:22:b8:c5:00:90:e2:02:31:
00:b0:14:fb:c1:7e:23:79:54:e0:9a:88:93:b5:35:94:21:c7:
bc:17:a3:91:d2:98:78:9a:5a:e8:30:9b:80:b3:41:71:e0:73:
79:4f:50:c7:49:70:86:59:49:66:67:9c:44
31,329,297 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,330,692 >>> mbox cmd response: success
40,365,871 UART:
40,366,185 UART: Running Caliptra FMC ...
40,367,401 UART:
40,367,570 UART: [state] CFI Enabled
40,461,349 UART: [art] Extend RT PCRs Done
40,462,543 UART: [art] Lock RT PCRs Done
40,463,838 UART: [art] Populate DV Done
40,469,429 UART: [fht] FMC Alias Private Key: 7
40,471,020 UART: [art] Derive CDI
40,471,838 UART: [art] Store in slot 0x4
40,530,467 UART: [art] Derive Key Pair
40,531,504 UART: [art] Store priv key in slot 0x5
42,993,507 UART: [art] Derive Key Pair - Done
43,006,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,719,454 UART: [art] Erasing AUTHORITY.KEYID = 7
44,720,971 UART: [art] PUB.X = CEC650D258C393AA8F162D276CA3DAE86BB40AAECD405284FE60321D15C20300D6EF1E1D52FDC30D440CFD9701563639
44,728,258 UART: [art] PUB.Y = 35E1156C448AED240C310F18C41AA67FFABE9ADD7F7C887CC411844E1ABDBB9E6D7CAECC452C88C9EA1F4EBBE8256672
44,735,498 UART: [art] SIG.R = E3C3F6A0EAAFF695342CC4CA08C21D7E9968FB4B1F9A7180B7A247A5EBAF9A0B1F01D096249ACD33B371C3B6E45179C8
44,742,957 UART: [art] SIG.S = F74D3C660719B8FCFB0671A8F37EFF1C2E398197EB3C09455DD1524F3A10A029F33B63D7EB99452C9A8BE3E46272308A
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
37:b0:ee:5a:27:a9:26:da:a5:d6:c8:bd:59:3f:58:6d:2f:b3:d2:f2
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=37B0EE5A27A926DAA5D6C8BD593F586D2FB3D2F260F9D9B7A43B1462A2D9A013
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ce:c6:50:d2:58:c3:93:aa:8f:16:2d:27:6c:a3:
da:e8:6b:b4:0a:ae:cd:40:52:84:fe:60:32:1d:15:
c2:03:00:d6:ef:1e:1d:52:fd:c3:0d:44:0c:fd:97:
01:56:36:39:35:e1:15:6c:44:8a:ed:24:0c:31:0f:
18:c4:1a:a6:7f:fa:be:9a:dd:7f:7c:88:7c:c4:11:
84:4e:1a:bd:bb:9e:6d:7c:ae:cc:45:2c:88:c9:ea:
1f:4e:bb:e8:25:66:72
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
37:B0:EE:5A:27:A9:26:DA:A5:D6:C8:BD:59:3F:58:6D:2F:B3:D2:F2
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e3:c3:f6:a0:ea:af:f6:95:34:2c:c4:ca:08:
c2:1d:7e:99:68:fb:4b:1f:9a:71:80:b7:a2:47:a5:eb:af:9a:
0b:1f:01:d0:96:24:9a:cd:33:b3:71:c3:b6:e4:51:79:c8:02:
31:00:f7:4d:3c:66:07:19:b8:fc:fb:06:71:a8:f3:7e:ff:1c:
2e:39:81:97:eb:3c:09:45:5d:d1:52:4f:3a:10:a0:29:f3:3b:
63:d7:eb:99:45:2c:9a:8b:e3:e4:62:72:30:8a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
Truncated 6765 bytes from beginning
....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,246,409 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,682,965 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
29,074,311 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:38:5a:88:40:09:80:e8:e4:6e:6e:79:b1:79:61:28:cb:99:eb:39
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9C385A88400980E8E46E6E79B1796128CB99EB39A37A80492ECD3A81566D2DEF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a3:aa:be:a2:6e:f2:10:02:f1:d5:d4:1b:2a:cb:
46:68:41:a8:fe:09:4d:3c:de:16:ee:c0:8b:4d:4c:
50:08:f1:50:db:a3:a4:71:25:d2:e3:01:91:b8:7f:
eb:df:b2:c2:40:f5:34:93:eb:58:8d:76:77:e2:8d:
4f:2e:dd:2b:0b:0d:9a:ae:ea:0a:e0:b5:bc:1c:c4:
9f:2e:04:2b:0f:f1:69:ab:e9:a4:04:58:c3:61:05:
b9:f6:65:c4:12:9d:2c
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
9C:38:5A:88:40:09:80:E8:E4:6E:6E:79:B1:79:61:28:CB:99:EB:39
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:9b:b0:6c:eb:a4:16:c6:de:8e:e3:d6:dd:c5:
bf:6f:dd:a6:14:81:28:fa:32:ca:fe:1d:95:d5:b3:01:c0:6e:
8d:ed:90:3a:ea:62:f8:d0:97:92:d6:f2:62:30:1f:aa:d9:02:
30:0b:21:76:52:de:22:b0:45:29:44:bc:f2:cf:e1:e5:ab:53:
bb:80:67:f3:de:39:27:0d:f7:5c:bd:5b:20:56:97:30:08:c5:
f2:64:f9:b7:31:c0:ba:c9:45:6e:3a:b9:ac
31,544,591 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
31,693,188 UART:
31,693,561 UART: Running Caliptra ROM ...
31,694,770 UART:
31,694,962 UART: [state] CFI Enabled
31,706,477 UART: [state] LifecycleState = Production
31,708,305 UART: [state] DebugLocked = Yes
31,710,993 UART: [state] Starting the WD Timer 40000000 cycles
31,715,430 UART: [kat] SHA2-256
31,905,257 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
31,916,169 UART: [kat] ++
31,916,628 UART: [kat] sha1
31,927,954 UART: [kat] SHA2-256
31,930,953 UART: [kat] SHA2-384
31,937,109 UART: [kat] SHA2-512-ACC
31,939,687 UART: [kat] ECC-384
34,384,094 UART: [kat] HMAC-384Kdf
34,398,115 UART: [kat] LMS
34,929,690 UART: [kat] --
34,933,380 UART: [update-reset] ++
39,644,470 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
39,647,568 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
40,266,747 >>> mbox cmd response: success
40,268,632 UART: [update-reset] Copying MAN_2 To MAN_1
40,306,211 UART: [update-reset Success] --
40,312,120 UART: [state] Locking Datavault
40,315,542 UART: [state] Locking PCR0, PCR1 and PCR31
40,317,736 UART: [state] Locking ICCM
40,320,537 UART: [exit] Launching FMC @ 0x40000130
40,329,205 UART:
40,329,464 UART: Running Caliptra FMC ...
40,330,571 UART:
40,330,728 UART: [state] CFI Enabled
40,374,523 UART: [art] Extend RT PCRs Done
40,375,670 UART: [art] Lock RT PCRs Done
40,376,845 UART: [art] Populate DV Done
40,382,214 UART: [fht] FMC Alias Private Key: 7
40,383,859 UART: [art] Derive CDI
40,384,672 UART: [art] Store in slot 0x4
40,427,211 UART: [art] Derive Key Pair
40,428,247 UART: [art] Store priv key in slot 0x5
42,855,480 UART: [art] Derive Key Pair - Done
42,868,689 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,575,448 UART: [art] Erasing AUTHORITY.KEYID = 7
44,576,949 UART: [art] PUB.X = 33D8143D7C8A58250A7EE8150330FF4F6745BB0CFC7F9356B2931B88DB18B92EE4E8AC46B4CB055719EC79485FD6CB09
44,584,213 UART: [art] PUB.Y = 7E19EDF160B287BEF19CC5378B64038D2832BE02D312874EC49E96A12590CBFD770818DC07FFAE8F1E5230C46AF089D4
44,591,505 UART: [art] SIG.R = BEC9F9273559140F9D3F3B20D444B56E19D3BA965845ABF46D04C77C56FB691AF4732C4AE2263F3D15881C54063478AD
44,598,842 UART: [art] SIG.S = A84D68B3CCEE0331CD6042F37C1A36F752A4453CE3F9E70F8F4697C373BA8B5308075FDEF6298B1CB39E8976A7EEE1FD
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:b4:2a:cb:6d:7b:c3:33:88:4f:8e:52:d7:27:f1:e5:9d:6c:ef:19
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=88B42ACB6D7BC333884F8E52D727F1E59D6CEF191B4B003D1392E826654EE1C8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:33:d8:14:3d:7c:8a:58:25:0a:7e:e8:15:03:30:
ff:4f:67:45:bb:0c:fc:7f:93:56:b2:93:1b:88:db:
18:b9:2e:e4:e8:ac:46:b4:cb:05:57:19:ec:79:48:
5f:d6:cb:09:7e:19:ed:f1:60:b2:87:be:f1:9c:c5:
37:8b:64:03:8d:28:32:be:02:d3:12:87:4e:c4:9e:
96:a1:25:90:cb:fd:77:08:18:dc:07:ff:ae:8f:1e:
52:30:c4:6a:f0:89:d4
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
88:B4:2A:CB:6D:7B:C3:33:88:4F:8E:52:D7:27:F1:E5:9D:6C:EF:19
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:be:c9:f9:27:35:59:14:0f:9d:3f:3b:20:d4:
44:b5:6e:19:d3:ba:96:58:45:ab:f4:6d:04:c7:7c:56:fb:69:
1a:f4:73:2c:4a:e2:26:3f:3d:15:88:1c:54:06:34:78:ad:02:
31:00:a8:4d:68:b3:cc:ee:03:31:cd:60:42:f3:7c:1a:36:f7:
52:a4:45:3c:e3:f9:e7:0f:8f:46:97:c3:73:ba:8b:53:08:07:
5f:de:f6:29:8b:1c:b3:9e:89:76:a7:ee:e1:fd
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 2312 bytes from beginning
C1A058F704A11821F7B48D340AEF99DDABADC1090D74D057FECCF73294ED6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
28,019,271 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
28,453,345 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
28,841,713 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
7d:82:5a:49:38:ae:db:62:62:69:b4:51:74:a5:17:a8:9f:9c:81:ab
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=79825A4938AEDB626269B45174A517A89F9C81ABA0DBFCC66E47F52E8F17261F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:88:01:c3:8e:f4:6d:8e:0b:12:39:c7:5c:9e:8f:
77:2e:e6:1a:eb:f5:59:b2:03:ae:8e:de:0c:0a:30:
b9:15:0b:92:6e:82:2e:2b:4a:c0:73:4e:f1:08:ce:
71:80:28:1d:8d:cd:a2:48:70:16:11:50:f7:5e:46:
c7:f7:d6:4d:17:e8:2a:f4:97:ee:bd:c5:07:ed:2b:
b1:9e:f1:a6:22:f1:bc:44:11:42:ad:a7:ac:44:2c:
71:75:ce:05:1b:7c:16
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
79:82:5A:49:38:AE:DB:62:62:69:B4:51:74:A5:17:A8:9F:9C:81:AB
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7f:2c:1c:f4:7c:c7:b2:58:90:14:94:a2:76:a7:
47:f7:f4:dd:64:20:5b:a5:71:81:89:a4:7a:af:5c:c2:88:46:
c4:ac:2d:97:86:92:44:69:d6:5f:a1:4f:d1:07:34:3f:02:30:
1d:78:d8:60:86:1d:73:17:2b:7c:d5:51:91:81:37:ee:37:ee:
e4:0e:8d:5f:e7:01:3a:43:9e:39:c6:42:da:d6:ff:5c:fc:db:
f3:b2:96:c1:77:af:89:34:47:81:c3:80
31,310,963 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
40,245,386 >>> mbox cmd response: success
40,280,201 UART:
40,280,523 UART: Running Caliptra FMC ...
40,281,733 UART:
40,281,914 UART: [state] CFI Enabled
40,325,864 UART: [art] Extend RT PCRs Done
40,327,054 UART: [art] Lock RT PCRs Done
40,328,678 UART: [art] Populate DV Done
40,333,869 UART: [fht] FMC Alias Private Key: 7
40,335,568 UART: [art] Derive CDI
40,336,379 UART: [art] Store in slot 0x4
40,379,025 UART: [art] Derive Key Pair
40,380,065 UART: [art] Store priv key in slot 0x5
42,806,863 UART: [art] Derive Key Pair - Done
42,819,821 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
44,526,583 UART: [art] Erasing AUTHORITY.KEYID = 7
44,528,088 UART: [art] PUB.X = CCE2853498A88F1704D29664B7256D90E2B232EAE1FCA6C17D659D7F7DC8FC9FFFC1D3BCA2DC4784D18FA4F953119116
44,535,365 UART: [art] PUB.Y = 62016A83CA712F1DDD7D805E5DEF456D3E7DF4004F7B2835F607B932AE2B8898A1901A5C076EB5F9697FD01800057729
44,542,560 UART: [art] SIG.R = C6BAC110464BFE36B2849021DE50074D6C0BB6F4D36E29E6AB8BBBC76F5FD015CBC411C03CF1649E43FC1399A51360DE
44,549,959 UART: [art] SIG.S = B16D84C6ACF2E6B7E194BFB477A8EFCD367394B59CCC3685516B0442F10ACC0D72EF2A253853FB352B85FB14C1DD1201
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5e:6e:90:11:a5:ce:c5:1d:6d:2e:53:c5:db:25:5e:64:f7:8a:9a:11
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5E6E9011A5CEC51D6D2E53C5DB255E64F78A9A113AD539BF07F3B3443BCF0F0D
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cc:e2:85:34:98:a8:8f:17:04:d2:96:64:b7:25:
6d:90:e2:b2:32:ea:e1:fc:a6:c1:7d:65:9d:7f:7d:
c8:fc:9f:ff:c1:d3:bc:a2:dc:47:84:d1:8f:a4:f9:
53:11:91:16:62:01:6a:83:ca:71:2f:1d:dd:7d:80:
5e:5d:ef:45:6d:3e:7d:f4:00:4f:7b:28:35:f6:07:
b9:32:ae:2b:88:98:a1:90:1a:5c:07:6e:b5:f9:69:
7f:d0:18:00:05:77:29
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
5E:6E:90:11:A5:CE:C5:1D:6D:2E:53:C5:DB:25:5E:64:F7:8A:9A:11
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c6:ba:c1:10:46:4b:fe:36:b2:84:90:21:de:
50:07:4d:6c:0b:b6:f4:d3:6e:29:e6:ab:8b:bb:c7:6f:5f:d0:
15:cb:c4:11:c0:3c:f1:64:9e:43:fc:13:99:a5:13:60:de:02:
31:00:b1:6d:84:c6:ac:f2:e6:b7:e1:94:bf:b4:77:a8:ef:cd:
36:73:94:b5:9c:cc:36:85:51:6b:04:42:f1:0a:cc:0d:72:ef:
2a:25:38:53:fb:35:2b:85:fb:14:c1:dd:12:01
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
Truncated 7246 bytes from beginning
1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,986,687 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,028,289 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,067,530 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:53:bc:c5:ef:7b:b9:d7:75:af:9b:33:5b:ab:65:cc:27:ae:52:a5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8853BCC5EF7BB9D775AF9B335BAB65CC27AE52A5CE6C8E7F09FBBFAF7B0BD9D8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:69:16:15:6b:26:c2:bb:3a:03:ab:83:12:e3:fa:
93:e8:c2:44:51:e4:4b:e8:22:97:c8:43:95:a6:d7:
d0:cc:6e:75:93:20:23:1d:1f:a2:2f:03:79:86:7c:
15:99:eb:21:58:21:74:99:4e:c8:09:dd:42:6b:67:
14:f5:02:60:51:f4:6f:12:15:ad:f7:ac:29:48:96:
98:e1:75:fe:68:c7:74:2a:a1:6c:23:57:b8:26:1a:
83:b9:cb:75:31:a5:4b
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
88:53:BC:C5:EF:7B:B9:D7:75:AF:9B:33:5B:AB:65:CC:27:AE:52:A5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ef:b6:41:a8:40:04:75:8c:dd:68:9f:98:d9:
54:c7:92:3c:3b:99:c5:f7:21:48:41:c4:37:db:b0:b8:c2:77:
a8:f5:fb:a3:1c:30:c6:f5:54:64:12:a7:c3:33:41:90:17:02:
31:00:ed:99:33:05:8d:a3:9f:75:6d:a7:dd:f2:0f:b8:ef:4f:
1d:14:3a:db:a4:52:fe:56:cf:83:60:c9:6c:58:63:84:cb:98:
8e:0b:53:c2:54:16:03:89:41:27:c0:2e:90:d5
6,078,404 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,079,213 UART:
6,079,229 UART: Running Caliptra ROM ...
6,079,637 UART:
6,079,691 UART: [state] CFI Enabled
6,082,064 UART: [state] LifecycleState = Production
6,082,672 UART: [state] DebugLocked = Yes
6,083,334 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,085,021 UART: [kat] SHA2-256
6,878,952 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,883,067 UART: [kat] ++
6,883,219 UART: [kat] sha1
6,887,509 UART: [kat] SHA2-256
6,889,447 UART: [kat] SHA2-384
6,891,960 UART: [kat] SHA2-512-ACC
6,893,860 UART: [kat] ECC-384
6,899,621 UART: [kat] HMAC-384Kdf
6,904,143 UART: [kat] LMS
7,472,339 UART: [kat] --
7,472,978 UART: [update-reset] ++
11,284,767 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,285,985 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,438,630 >>> mbox cmd response: success
11,438,738 UART: [update-reset] Copying MAN_2 To MAN_1
11,446,750 UART: [update-reset Success] --
11,447,667 UART: [state] Locking Datavault
11,448,643 UART: [state] Locking PCR0, PCR1 and PCR31
11,449,247 UART: [state] Locking ICCM
11,449,725 UART: [exit] Launching FMC @ 0x40000130
11,455,055 UART:
11,455,071 UART: Running Caliptra FMC ...
11,455,479 UART:
11,455,533 UART: [state] CFI Enabled
11,545,310 UART: [art] Extend RT PCRs Done
11,545,738 UART: [art] Lock RT PCRs Done
11,547,037 UART: [art] Populate DV Done
11,555,451 UART: [fht] FMC Alias Private Key: 7
11,556,413 UART: [art] Derive CDI
11,556,693 UART: [art] Store in slot 0x4
11,641,967 UART: [art] Derive Key Pair
11,642,327 UART: [art] Store priv key in slot 0x5
11,655,844 UART: [art] Derive Key Pair - Done
11,670,750 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,686,141 UART: [art] Erasing AUTHORITY.KEYID = 7
11,686,906 UART: [art] PUB.X = 459EED1A018DDA97732E1326A0699E9E2FFAC82E89ACD97CEE531DA1ACD5C83839787D16746EA62C38E382E4D578788F
11,693,683 UART: [art] PUB.Y = 4A1E49B38FC07EE09C69D1B94A6DA255FB1C9E0CA4CA20A37F0F598C6727768AE94466F0CAA2C395864848CE34F40C74
11,700,634 UART: [art] SIG.R = C6C96BDD54FBEE37BD79BA84DB7B147F028CAE01A36B176718AEEF656475D5216E43C4B83AD4034925FD2FA1CBE504A4
11,707,410 UART: [art] SIG.S = DE1C5D9B2981A396048CCCAE8A2D477B31BBE7D6698FD4EB2A85102D302A1F30E889E4759252E8B38C622B80444FF30F
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:68:d6:3a:4e:16:de:a9:72:db:e2:a8:0f:a9:5b:86:0e:8e:13:77
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A568D63A4E16DEA972DBE2A80FA95B860E8E13778506CF1CA6455FB05ABAA969
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:45:9e:ed:1a:01:8d:da:97:73:2e:13:26:a0:69:
9e:9e:2f:fa:c8:2e:89:ac:d9:7c:ee:53:1d:a1:ac:
d5:c8:38:39:78:7d:16:74:6e:a6:2c:38:e3:82:e4:
d5:78:78:8f:4a:1e:49:b3:8f:c0:7e:e0:9c:69:d1:
b9:4a:6d:a2:55:fb:1c:9e:0c:a4:ca:20:a3:7f:0f:
59:8c:67:27:76:8a:e9:44:66:f0:ca:a2:c3:95:86:
48:48:ce:34:f4:0c:74
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
A5:68:D6:3A:4E:16:DE:A9:72:DB:E2:A8:0F:A9:5B:86:0E:8E:13:77
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:c6:c9:6b:dd:54:fb:ee:37:bd:79:ba:84:db:
7b:14:7f:02:8c:ae:01:a3:6b:17:67:18:ae:ef:65:64:75:d5:
21:6e:43:c4:b8:3a:d4:03:49:25:fd:2f:a1:cb:e5:04:a4:02:
31:00:de:1c:5d:9b:29:81:a3:96:04:8c:cc:ae:8a:2d:47:7b:
31:bb:e7:d6:69:8f:d4:eb:2a:85:10:2d:30:2a:1f:30:e8:89:
e4:75:92:52:e8:b3:8c:62:2b:80:44:4f:f3:0f
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.07s
Truncated 2723 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,922,740 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,964,428 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,003,507 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1c:bc:66:a3:ec:a1:53:c9:46:3a:6e:67:a5:65:c2:6a:ec:a9:fd:7e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=98BC66A3ECA153C9463A6E67A565C26AECA9FD7E3E127346F6B8055216287BC0
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e4:8d:a4:1f:4e:4a:48:9b:ee:c2:8f:82:1b:55:
f5:f8:c5:bc:f4:9f:f3:ce:2d:cf:fc:5f:66:68:ff:
c3:0e:5f:b4:1c:28:fa:08:59:b2:0f:1a:67:c7:58:
d9:ff:93:c2:1c:13:f9:9e:de:51:14:20:e5:e3:66:
5d:52:ec:39:ca:ac:62:2b:06:85:2b:89:fa:05:1a:
a8:4c:44:4b:76:ba:d3:97:4d:b3:a0:4b:e2:3a:65:
04:fa:02:82:e8:ab:f7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
98:BC:66:A3:EC:A1:53:C9:46:3A:6E:67:A5:65:C2:6A:EC:A9:FD:7E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:e9:07:38:0b:c0:83:34:d8:88:49:99:f8:34:
11:44:ae:6c:0d:6c:89:89:a7:99:1c:f8:de:bb:2e:55:f2:75:
e2:44:e7:66:41:98:84:5a:a9:a2:4e:ff:02:1e:c2:4f:66:02:
31:00:d1:00:04:bc:9b:37:e6:26:29:99:a0:df:06:5a:35:bd:
82:e2:9e:b2:72:37:12:f5:68:a3:ff:09:bf:84:f2:dd:ed:ec:
f2:84:86:c3:30:62:f2:a0:44:6b:cd:ca:a7:74
6,014,429 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,069,100 >>> mbox cmd response: success
11,082,445 UART:
11,082,461 UART: Running Caliptra FMC ...
11,082,869 UART:
11,082,923 UART: [state] CFI Enabled
11,172,586 UART: [art] Extend RT PCRs Done
11,173,014 UART: [art] Lock RT PCRs Done
11,174,355 UART: [art] Populate DV Done
11,182,579 UART: [fht] FMC Alias Private Key: 7
11,183,591 UART: [art] Derive CDI
11,183,871 UART: [art] Store in slot 0x4
11,270,019 UART: [art] Derive Key Pair
11,270,379 UART: [art] Store priv key in slot 0x5
11,283,738 UART: [art] Derive Key Pair - Done
11,298,661 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,314,266 UART: [art] Erasing AUTHORITY.KEYID = 7
11,315,031 UART: [art] PUB.X = 10F98F27CA2CA8437F089F28A203604B35F9C844DD2FF1E2E4E53C218C639EC0AECE48A4C53013975449FD620A101F96
11,321,796 UART: [art] PUB.Y = D18EC26459D76EEE53AD8AE2C22B126150D4E8DD23A748AD41DFD662925B20C2547991CB689FDAB730538D06FC1BE8D3
11,328,755 UART: [art] SIG.R = EC9298D5D1B29B8149B0376EFF11E75276BAE0C0C5D7CDFBAFD839615F86DFAB6DDF6BA9B39FA2E9812FE455E9060E53
11,335,541 UART: [art] SIG.S = 338EF11ABCAFDC6A6F97A866E7786E4AD7EC6BAB3D3653933FD890D53F105E21279AED73DDFECEF58B7667197B12A72A
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0e:85:2b:f9:2b:a1:49:a0:ce:ad:3c:5f:76:d1:25:f5:a4:c4:09:a3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8A852BF92BA149A0CEAD3C5F76D125F5A4C409A3C3E4F44FDC2092C1F50FD791
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:10:f9:8f:27:ca:2c:a8:43:7f:08:9f:28:a2:03:
60:4b:35:f9:c8:44:dd:2f:f1:e2:e4:e5:3c:21:8c:
63:9e:c0:ae:ce:48:a4:c5:30:13:97:54:49:fd:62:
0a:10:1f:96:d1:8e:c2:64:59:d7:6e:ee:53:ad:8a:
e2:c2:2b:12:61:50:d4:e8:dd:23:a7:48:ad:41:df:
d6:62:92:5b:20:c2:54:79:91:cb:68:9f:da:b7:30:
53:8d:06:fc:1b:e8:d3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8A:85:2B:F9:2B:A1:49:A0:CE:AD:3C:5F:76:D1:25:F5:A4:C4:09:A3
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ec:92:98:d5:d1:b2:9b:81:49:b0:37:6e:ff:
11:e7:52:76:ba:e0:c0:c5:d7:cd:fb:af:d8:39:61:5f:86:df:
ab:6d:df:6b:a9:b3:9f:a2:e9:81:2f:e4:55:e9:06:0e:53:02:
30:33:8e:f1:1a:bc:af:dc:6a:6f:97:a8:66:e7:78:6e:4a:d7:
ec:6b:ab:3d:36:53:93:3f:d8:90:d5:3f:10:5e:21:27:9a:ed:
73:dd:fe:ce:f5:8b:76:67:19:7b:12:a7:2a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.00s
Truncated 7240 bytes from beginning
1:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,103,083 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,144,669 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,183,902 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
64:65:f5:0b:12:04:e1:e2:3e:2c:2c:8a:cb:98:43:16:a3:ee:89:de
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6465F50B1204E1E23E2C2C8ACB984316A3EE89DE882A704E575BEC7E01CCBC4F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:42:67:4a:2b:62:fc:b1:86:88:62:63:37:5d:20:
b1:ee:b3:5e:2d:b5:57:5e:62:59:2b:11:43:d3:b3:
83:44:e0:b4:99:49:6b:26:9f:fb:82:62:a0:30:56:
60:7e:f4:0d:59:c4:7e:14:12:1d:77:78:80:77:86:
08:cc:c1:70:11:90:49:c4:23:1a:5b:74:1e:0e:72:
d2:73:c6:95:ea:b0:2c:c2:69:a1:90:36:3a:2b:1d:
a2:3c:dd:25:3e:82:ce
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
64:65:F5:0B:12:04:E1:E2:3E:2C:2C:8A:CB:98:43:16:A3:EE:89:DE
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:a6:27:fb:cf:10:d1:fd:d3:8d:92:13:4a:84:
5e:b4:b7:dd:ba:82:52:53:45:e8:59:7d:be:e5:fe:a4:64:02:
8a:fa:57:d3:8b:81:8d:03:ec:2c:d5:69:04:7a:99:94:e2:02:
31:00:91:95:28:cb:fa:97:c3:1c:0a:4f:79:08:47:45:49:dd:
cd:06:ca:e3:ae:46:b4:53:00:96:a7:11:bf:74:a6:5c:0a:d2:
6b:d1:24:cb:ad:49:fa:20:31:3f:c6:4f:6b:82
6,194,856 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,195,643 UART:
6,195,659 UART: Running Caliptra ROM ...
6,196,067 UART:
6,196,208 UART: [state] CFI Enabled
6,199,193 UART: [state] LifecycleState = Production
6,199,801 UART: [state] DebugLocked = Yes
6,200,397 UART: [state] Starting the Watchdog Timer 40000000 cycles
6,202,080 UART: [kat] SHA2-256
6,996,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,000,126 UART: [kat] ++
7,000,278 UART: [kat] sha1
7,004,620 UART: [kat] SHA2-256
7,006,558 UART: [kat] SHA2-384
7,009,501 UART: [kat] SHA2-512-ACC
7,011,401 UART: [kat] ECC-384
7,017,314 UART: [kat] HMAC-384Kdf
7,021,998 UART: [kat] LMS
7,590,194 UART: [kat] --
7,591,085 UART: [update-reset] ++
11,289,037 UART: [update-reset] Image verified using Vendor ECC Key Index 0
11,290,173 UART: [update-reset] Loading Runtime at address 0x40005000 len 90872
11,442,818 >>> mbox cmd response: success
11,443,100 UART: [update-reset] Copying MAN_2 To MAN_1
11,451,112 UART: [update-reset Success] --
11,451,959 UART: [state] Locking Datavault
11,452,773 UART: [state] Locking PCR0, PCR1 and PCR31
11,453,377 UART: [state] Locking ICCM
11,453,949 UART: [exit] Launching FMC @ 0x40000130
11,459,279 UART:
11,459,295 UART: Running Caliptra FMC ...
11,459,703 UART:
11,459,846 UART: [state] CFI Enabled
11,548,867 UART: [art] Extend RT PCRs Done
11,549,295 UART: [art] Lock RT PCRs Done
11,550,590 UART: [art] Populate DV Done
11,558,778 UART: [fht] FMC Alias Private Key: 7
11,559,890 UART: [art] Derive CDI
11,560,170 UART: [art] Store in slot 0x4
11,645,698 UART: [art] Derive Key Pair
11,646,058 UART: [art] Store priv key in slot 0x5
11,659,657 UART: [art] Derive Key Pair - Done
11,674,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,689,986 UART: [art] Erasing AUTHORITY.KEYID = 7
11,690,751 UART: [art] PUB.X = 6DD7B6A994FC4673058542096109D26AEF0D7835CC91C34C661FA80D59569EA7A6270BB5666526C42111FFDD707A7409
11,697,496 UART: [art] PUB.Y = 1315A6B58B92C8F134E8B135EC55133EB88596DF6742DD680A36D4AC7B983AF90A189ED801FCCE757C92162346529AC2
11,704,439 UART: [art] SIG.R = 5F2F0BF5667A36C0D8CDFCFA7B5FD687CF7E2CBB08B80176405E39CFE6E3D27B26DC078EEB488A339DF110FD454792E9
11,711,217 UART: [art] SIG.S = 100DC5029CB6B91AFD5E8F3CEAD7CF6C90005BFE74D482659B4A48E7C2D35D1A48F10B4147D25577AACD63D68A269A42
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3c:ec:f2:35:a1:58:b8:46:47:45:46:b5:70:c5:2d:95:07:95:77:31
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=BCECF235A158B846474546B570C52D950795773159E1AA2A5F9D3870E50B2365
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6d:d7:b6:a9:94:fc:46:73:05:85:42:09:61:09:
d2:6a:ef:0d:78:35:cc:91:c3:4c:66:1f:a8:0d:59:
56:9e:a7:a6:27:0b:b5:66:65:26:c4:21:11:ff:dd:
70:7a:74:09:13:15:a6:b5:8b:92:c8:f1:34:e8:b1:
35:ec:55:13:3e:b8:85:96:df:67:42:dd:68:0a:36:
d4:ac:7b:98:3a:f9:0a:18:9e:d8:01:fc:ce:75:7c:
92:16:23:46:52:9a:c2
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
BC:EC:F2:35:A1:58:B8:46:47:45:46:B5:70:C5:2D:95:07:95:77:31
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:5f:2f:0b:f5:66:7a:36:c0:d8:cd:fc:fa:7b:5f:
d6:87:cf:7e:2c:bb:08:b8:01:76:40:5e:39:cf:e6:e3:d2:7b:
26:dc:07:8e:eb:48:8a:33:9d:f1:10:fd:45:47:92:e9:02:30:
10:0d:c5:02:9c:b6:b9:1a:fd:5e:8f:3c:ea:d7:cf:6c:90:00:
5b:fe:74:d4:82:65:9b:4a:48:e7:c2:d3:5d:1a:48:f1:0b:41:
47:d2:55:77:aa:cd:63:d6:8a:26:9a:42
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.04s
Truncated 2717 bytes from beginning
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,924,941 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0r..Caliptra..Device.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0^..Caliptra..FMC.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:98:64:82:2e:50:ed:43:c7:e1:85:98:a6:46:
8f:bd:e2:31:3a:f2:01:b1:5a:d5:54:2a:08:34:aa:23:75:1d:
e3:19:7a:79:f4:51:77:e7:62:e8:5c:05:da:91:79:02:2c:02:
30:3e:21:f0:18:6f:ce:1e:0e:1b:34:c3:af:4a:db:df:4f:64:
c8:34:ba:7d:d2:0d:86:8f:48:13:94:49:4c:d0:65:11:34:5c:
9e:c0:d7:d0:ae:44:1a:a8:8f:d6:2f:4c:8e
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,966,545 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,005,832 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6f:1d:74:4e:5f:37:f0:92:7b:a0:7b:90:99:3d:81:3e:d0:a6:bd:79
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=6B1D744E5F37F0927BA07B90993D813ED0A6BD7950A5D4429C0287DA767FCB54
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dd:22:4b:f9:e8:f9:d9:08:63:f7:6e:89:6b:53:
58:d9:c6:e6:8d:03:76:67:11:0c:0f:be:8d:92:2d:
15:44:e9:f7:49:39:df:dd:07:ac:40:fc:f5:b0:15:
f3:13:ef:ea:d7:5d:2e:83:dd:93:83:cb:82:53:5e:
69:b5:8e:6d:ce:66:0d:43:00:80:57:78:00:94:d8:
fa:f9:86:7d:bf:53:6e:af:92:3c:dc:0b:a9:a2:52:
15:4d:9b:2c:fa:7c:bc
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
6B:1D:74:4E:5F:37:F0:92:7B:A0:7B:90:99:3D:81:3E:D0:A6:BD:79
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e5:22:bf:7d:fe:ec:68:d4:e0:93:b6:25:3a:
d2:f9:0f:f5:09:60:ae:ef:1a:3b:93:63:8a:c4:85:c4:46:85:
83:20:d9:f4:0e:cb:4d:0b:ac:51:6e:62:6a:ae:30:8c:d1:02:
30:34:3b:d4:6c:e2:65:c0:53:25:6c:8e:5b:60:9c:e9:8a:ac:
61:bd:5f:4f:1b:8b:ca:e0:73:5d:58:24:95:18:00:8e:e9:8d:
7c:1f:b1:9c:67:e8:af:73:3f:f6:da:72:be
6,016,661 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
11,107,754 >>> mbox cmd response: success
11,121,043 UART:
11,121,059 UART: Running Caliptra FMC ...
11,121,467 UART:
11,121,610 UART: [state] CFI Enabled
11,210,719 UART: [art] Extend RT PCRs Done
11,211,147 UART: [art] Lock RT PCRs Done
11,212,498 UART: [art] Populate DV Done
11,220,818 UART: [fht] FMC Alias Private Key: 7
11,221,908 UART: [art] Derive CDI
11,222,188 UART: [art] Store in slot 0x4
11,307,536 UART: [art] Derive Key Pair
11,307,896 UART: [art] Store priv key in slot 0x5
11,321,177 UART: [art] Derive Key Pair - Done
11,336,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
11,351,081 UART: [art] Erasing AUTHORITY.KEYID = 7
11,351,846 UART: [art] PUB.X = 729A07C32E6B7C0156D78C8ACD09D3E1824E7C9FE36951507AFE8252786474E53D0E517E8866778DCB48AC96DE8814ED
11,358,606 UART: [art] PUB.Y = EF28A4592A134C3370CB18BED1BFBFC3C1D1234DA69B07B4346E23E9C7D5B9694D5550E572D0D55DFE7424B3F7C42B44
11,365,565 UART: [art] SIG.R = 7C0CD4D105EC35065334191AF88DCBC6E3721CFC9F7F448CCF96B3675747B496219FBB90EE068D78755FA92A53F550A8
11,372,329 UART: [art] SIG.S = 214831FE3B2D7DA7AF2C4FE5EE7DDBFE200F8286A2A694094ED304D57E0FEB4D3C72790A9FC4F1551FBD6A0ECA400E86
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
74:32:55:d4:69:86:53:c6:c5:60:e7:00:58:89:f6:1c:55:a3:57:77
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=F03255D4698653C6C560E7005889F61C55A3577721A8E72566F59D063512FF4F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:72:9a:07:c3:2e:6b:7c:01:56:d7:8c:8a:cd:09:
d3:e1:82:4e:7c:9f:e3:69:51:50:7a:fe:82:52:78:
64:74:e5:3d:0e:51:7e:88:66:77:8d:cb:48:ac:96:
de:88:14:ed:ef:28:a4:59:2a:13:4c:33:70:cb:18:
be:d1:bf:bf:c3:c1:d1:23:4d:a6:9b:07:b4:34:6e:
23:e9:c7:d5:b9:69:4d:55:50:e5:72:d0:d5:5d:fe:
74:24:b3:f7:c4:2b:44
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
F0:32:55:D4:69:86:53:C6:C5:60:E7:00:58:89:F6:1C:55:A3:57:77
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:7c:0c:d4:d1:05:ec:35:06:53:34:19:1a:f8:8d:
cb:c6:e3:72:1c:fc:9f:7f:44:8c:cf:96:b3:67:57:47:b4:96:
21:9f:bb:90:ee:06:8d:78:75:5f:a9:2a:53:f5:50:a8:02:30:
21:48:31:fe:3b:2d:7d:a7:af:2c:4f:e5:ee:7d:db:fe:20:0f:
82:86:a2:a6:94:09:4e:d3:04:d5:7e:0f:eb:4d:3c:72:79:0a:
9f:c4:f1:55:1f:bd:6a:0e:ca:40:0e:86
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 3.07s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,978,605 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,020,185 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,059,144 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
75:79:cc:60:7a:9b:b3:af:1d:e3:7d:64:97:8e:35:f5:71:94:05:f5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=7179CC607A9BB3AF1DE37D64978E35F5719405F57CBA41100362032ABBCFC60F
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:73:9d:f9:6f:9e:af:ce:f4:ed:a1:51:ca:c1:4c:
93:65:83:9c:73:af:af:0c:1d:9c:dc:58:2a:53:3d:
d3:7d:44:4e:4f:e4:45:f6:12:c6:59:54:86:65:53:
d4:e2:5f:4a:c6:b2:52:71:5b:f2:a0:d5:a3:9f:c0:
00:9a:67:b4:7c:02:99:cf:a7:5a:9d:50:fb:ef:f3:
e7:99:d9:29:f3:a1:3d:bf:68:d1:7a:74:a0:1a:31:
c0:d0:27:ae:f4:31:c7
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
71:79:CC:60:7A:9B:B3:AF:1D:E3:7D:64:97:8E:35:F5:71:94:05:F5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:82:60:46:b1:1f:72:c7:36:6d:6b:fe:61:79:
90:9c:0f:ea:8e:6a:fd:a7:b5:21:41:66:19:92:bf:da:2e:c4:
ee:e6:87:9a:2e:d8:aa:2d:a0:10:66:c6:10:63:3a:54:1d:02:
31:00:b0:04:2c:b6:ce:bf:10:fc:8b:a0:e2:42:02:47:c8:6c:
9a:8a:e6:67:a0:e1:5b:f6:cf:16:9a:09:11:bb:d4:c6:33:88:
1b:d5:65:b7:4b:09:e7:ac:ff:eb:d5:8e:e0:aa
4,069,882 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,070,596 UART:
4,070,612 UART: Running Caliptra ROM ...
4,071,020 UART:
4,071,075 UART: [state] CFI Enabled
4,073,670 UART: [state] LifecycleState = Production
4,074,278 UART: [state] DebugLocked = Yes
4,074,830 UART: [state] Starting the WD Timer 40000000 cycles
4,076,496 UART: [kat] SHA2-256
4,880,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,884,150 UART: [kat] ++
4,884,302 UART: [kat] sha1
4,888,622 UART: [kat] SHA2-256
4,890,562 UART: [kat] SHA2-384
4,893,155 UART: [kat] SHA2-512-ACC
4,895,055 UART: [kat] ECC-384
4,904,728 UART: [kat] HMAC-384Kdf
4,909,112 UART: [kat] LMS
5,157,424 UART: [kat] --
5,158,324 UART: [update-reset] ++
7,070,799 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,071,806 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,224,399 >>> mbox cmd response: success
7,224,655 UART: [update-reset] Copying MAN_2 To MAN_1
7,232,667 UART: [update-reset Success] --
7,233,708 UART: [state] Locking Datavault
7,234,542 UART: [state] Locking PCR0, PCR1 and PCR31
7,235,146 UART: [state] Locking ICCM
7,235,660 UART: [exit] Launching FMC @ 0x40000130
7,240,990 UART:
7,241,006 UART: Running Caliptra FMC ...
7,241,414 UART:
7,241,468 UART: [state] CFI Enabled
7,329,909 UART: [art] Extend RT PCRs Done
7,330,337 UART: [art] Lock RT PCRs Done
7,331,650 UART: [art] Populate DV Done
7,340,064 UART: [fht] FMC Alias Private Key: 7
7,341,178 UART: [art] Derive CDI
7,341,458 UART: [art] Store in slot 0x4
7,427,369 UART: [art] Derive Key Pair
7,427,729 UART: [art] Store priv key in slot 0x5
7,440,929 UART: [art] Derive Key Pair - Done
7,455,856 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,471,447 UART: [art] Erasing AUTHORITY.KEYID = 7
7,472,212 UART: [art] PUB.X = 65065A226F033674DF575E36EFB3AB6A00877282A8A5F8B61011BCFCAB3A00B9B903676D1A190E2135C5633F4CB3EA25
7,478,930 UART: [art] PUB.Y = 3893B89077C531F5275261968828B7728454FE1C53ADD9F57B02C6C7415AFA8E519904AAFD05E02C62A28C2B91B9C041
7,485,867 UART: [art] SIG.R = 04A2E38F003CCFBEC82943A711CD98E1EBAC38661B4A53DDBF0956AAB0FB5145817FDA1D8D69B395D6112585A60FB348
7,492,620 UART: [art] SIG.S = 609E7FAE35CE16A5C54E5F47E3C297B77C4450C55A140805A999F20C87CD12346DCE8A0903D37733B893E364B32F7533
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
4d:25:31:7b:39:dc:a9:30:25:21:2f:70:d0:94:e9:4a:64:0d:de:30
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=4D25317B39DCA93025212F70D094E94A640DDE30342FEB56444211C91E9B69E8
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:65:06:5a:22:6f:03:36:74:df:57:5e:36:ef:b3:
ab:6a:00:87:72:82:a8:a5:f8:b6:10:11:bc:fc:ab:
3a:00:b9:b9:03:67:6d:1a:19:0e:21:35:c5:63:3f:
4c:b3:ea:25:38:93:b8:90:77:c5:31:f5:27:52:61:
96:88:28:b7:72:84:54:fe:1c:53:ad:d9:f5:7b:02:
c6:c7:41:5a:fa:8e:51:99:04:aa:fd:05:e0:2c:62:
a2:8c:2b:91:b9:c0:41
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
4D:25:31:7B:39:DC:A9:30:25:21:2F:70:D0:94:E9:4A:64:0D:DE:30
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:04:a2:e3:8f:00:3c:cf:be:c8:29:43:a7:11:cd:
98:e1:eb:ac:38:66:1b:4a:53:dd:bf:09:56:aa:b0:fb:51:45:
81:7f:da:1d:8d:69:b3:95:d6:11:25:85:a6:0f:b3:48:02:30:
60:9e:7f:ae:35:ce:16:a5:c5:4e:5f:47:e3:c2:97:b7:7c:44:
50:c5:5a:14:08:05:a9:99:f2:0c:87:cd:12:34:6d:ce:8a:09:
03:d3:77:33:b8:93:e3:64:b3:2f:75:33
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.52s
Truncated 2690 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,816,615 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,065 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,897,274 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
25:a1:9a:21:f2:d1:e9:69:ad:34:f1:5a:d1:6a:80:4a:8d:23:94:c7
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A1A19A21F2D1E969AD34F15AD16A804A8D2394C705FE832797F8B17CAD1F14FA
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:45:2f:65:fe:23:86:15:92:1e:db:1f:52:4e:e8:
7f:6a:88:e5:1a:94:4d:d6:2c:b3:73:83:86:c9:84:
27:2c:ad:f5:0d:04:7f:c6:85:cb:09:f7:14:39:2a:
ef:fb:09:b7:5f:66:62:e2:df:86:40:b9:5c:33:84:
72:3c:78:83:fc:94:c6:6d:ee:db:5a:b1:5b:16:3b:
9d:07:26:bd:47:11:b2:39:1a:1b:45:68:4a:c2:ff:
61:db:ce:51:d0:1b:e9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
A1:A1:9A:21:F2:D1:E9:69:AD:34:F1:5A:D1:6A:80:4A:8D:23:94:C7
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:f8:b1:7b:3d:48:ee:bf:d5:79:93:9c:2d:bc:
2b:30:ff:b1:88:32:cd:f1:f8:9d:8d:58:31:6a:70:c4:df:d9:
e2:ea:a7:88:cf:b3:39:2a:9d:7a:2a:58:b2:56:37:a5:e9:02:
31:00:ed:b1:8c:9d:f9:ba:10:ce:0e:61:4b:33:81:f3:ad:6d:
b9:0c:db:3d:25:84:83:aa:b7:e8:6e:27:43:35:6e:1c:68:a3:
99:71:90:b7:44:1b:2f:2c:64:46:01:96:67:7b
3,908,108 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,939,328 >>> mbox cmd response: success
6,952,598 UART:
6,952,614 UART: Running Caliptra FMC ...
6,953,022 UART:
6,953,076 UART: [state] CFI Enabled
7,041,955 UART: [art] Extend RT PCRs Done
7,042,383 UART: [art] Lock RT PCRs Done
7,043,608 UART: [art] Populate DV Done
7,051,764 UART: [fht] FMC Alias Private Key: 7
7,052,828 UART: [art] Derive CDI
7,053,108 UART: [art] Store in slot 0x4
7,139,133 UART: [art] Derive Key Pair
7,139,493 UART: [art] Store priv key in slot 0x5
7,153,325 UART: [art] Derive Key Pair - Done
7,168,034 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,182,631 UART: [art] Erasing AUTHORITY.KEYID = 7
7,183,396 UART: [art] PUB.X = 11E8F8CC22C5C005669BB14CD6FA57FB9F9716AB0E2450A8F21971F9B74B4AA89A9BFB38E9A4CF115D473583C9635891
7,190,168 UART: [art] PUB.Y = 1E35FBF6B4384507D56E87B8C6F33392BC099580EF8117084E8323AC39815FCAAF43D3C2C03E62F0EA321CCB4B2540B8
7,197,115 UART: [art] SIG.R = 413ED89F8A851D4887398716F9DBD70F47F1179B8B2DB71148365234F814970F97672F5C21A15A53F79FDB3CB9701BE9
7,203,875 UART: [art] SIG.S = B7F17B3A9CC2BA3A15C91944A8AA258A4810930BB93FBBFC30AC397A566910A693D8B871B915971F8DF11DA53FC03128
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0c:8e:6f:d0:92:2f:b8:c6:eb:79:af:dc:43:e6:25:ab:7c:33:75:dc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=8C8E6FD0922FB8C6EB79AFDC43E625AB7C3375DC82726F091E4BBC51F4C217A1
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:11:e8:f8:cc:22:c5:c0:05:66:9b:b1:4c:d6:fa:
57:fb:9f:97:16:ab:0e:24:50:a8:f2:19:71:f9:b7:
4b:4a:a8:9a:9b:fb:38:e9:a4:cf:11:5d:47:35:83:
c9:63:58:91:1e:35:fb:f6:b4:38:45:07:d5:6e:87:
b8:c6:f3:33:92:bc:09:95:80:ef:81:17:08:4e:83:
23:ac:39:81:5f:ca:af:43:d3:c2:c0:3e:62:f0:ea:
32:1c:cb:4b:25:40:b8
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
8C:8E:6F:D0:92:2F:B8:C6:EB:79:AF:DC:43:E6:25:AB:7C:33:75:DC
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:41:3e:d8:9f:8a:85:1d:48:87:39:87:16:f9:db:
d7:0f:47:f1:17:9b:8b:2d:b7:11:48:36:52:34:f8:14:97:0f:
97:67:2f:5c:21:a1:5a:53:f7:9f:db:3c:b9:70:1b:e9:02:31:
00:b7:f1:7b:3a:9c:c2:ba:3a:15:c9:19:44:a8:aa:25:8a:48:
10:93:0b:b9:3f:bb:fc:30:ac:39:7a:56:69:10:a6:93:d8:b8:
71:b9:15:97:1f:8d:f1:1d:a5:3f:c0:31:28
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.23s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,992,374 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,033,598 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,072,585 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5d:1a:b9:50:79:cc:5e:d1:0c:b7:e8:73:8d:04:8f:f8:9f:81:97:f1
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=5D1AB95079CC5ED10CB7E8738D048FF89F8197F169946919EE4DA72B589D46CF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:ea:dd:f5:43:5c:91:1a:93:3c:d6:a4:f0:f3:f5:
a5:65:17:05:7e:31:ed:02:89:0c:3a:9e:b8:66:d4:
09:a3:ab:9a:87:c8:3c:1f:a8:12:b3:b6:8f:5c:b3:
c4:85:ba:e0:dd:51:ca:70:35:3a:4c:d2:68:8b:77:
20:c8:03:e7:94:f7:8d:8c:7f:63:e0:8b:d6:12:11:
6f:b7:c1:2d:bb:ad:76:cb:f6:20:e6:0a:4b:9b:36:
46:d5:e0:44:a3:35:c9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
5D:1A:B9:50:79:CC:5E:D1:0C:B7:E8:73:8D:04:8F:F8:9F:81:97:F1
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:19:9e:82:32:fe:f1:ba:eb:41:bc:81:fe:bc:ef:
70:e1:9c:b4:43:d8:75:31:dc:9c:68:d5:cf:bd:26:02:2e:79:
ae:b4:62:8b:96:a6:61:ec:45:e6:38:e5:a2:03:cf:34:02:31:
00:c2:fd:c1:96:94:49:e9:2c:3f:9b:99:7e:1c:51:bc:2f:07:
d9:0f:57:78:d0:82:f8:46:d5:fb:09:50:5a:28:39:bb:8c:b0:
78:3e:1d:c3:61:77:c0:c3:50:4d:f3:4d:97
4,083,652 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,084,528 UART:
4,084,544 UART: Running Caliptra ROM ...
4,084,952 UART:
4,085,094 UART: [state] CFI Enabled
4,087,661 UART: [state] LifecycleState = Production
4,088,269 UART: [state] DebugLocked = Yes
4,088,991 UART: [state] Starting the WD Timer 40000000 cycles
4,090,621 UART: [kat] SHA2-256
4,894,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,898,275 UART: [kat] ++
4,898,427 UART: [kat] sha1
4,902,711 UART: [kat] SHA2-256
4,904,651 UART: [kat] SHA2-384
4,907,354 UART: [kat] SHA2-512-ACC
4,909,254 UART: [kat] ECC-384
4,919,147 UART: [kat] HMAC-384Kdf
4,923,757 UART: [kat] LMS
5,172,069 UART: [kat] --
5,172,943 UART: [update-reset] ++
7,079,400 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,080,411 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,233,004 >>> mbox cmd response: success
7,233,360 UART: [update-reset] Copying MAN_2 To MAN_1
7,241,372 UART: [update-reset Success] --
7,242,447 UART: [state] Locking Datavault
7,243,275 UART: [state] Locking PCR0, PCR1 and PCR31
7,243,879 UART: [state] Locking ICCM
7,244,507 UART: [exit] Launching FMC @ 0x40000130
7,249,837 UART:
7,249,853 UART: Running Caliptra FMC ...
7,250,261 UART:
7,250,404 UART: [state] CFI Enabled
7,339,323 UART: [art] Extend RT PCRs Done
7,339,751 UART: [art] Lock RT PCRs Done
7,340,844 UART: [art] Populate DV Done
7,348,984 UART: [fht] FMC Alias Private Key: 7
7,350,126 UART: [art] Derive CDI
7,350,406 UART: [art] Store in slot 0x4
7,436,435 UART: [art] Derive Key Pair
7,436,795 UART: [art] Store priv key in slot 0x5
7,449,763 UART: [art] Derive Key Pair - Done
7,464,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,480,358 UART: [art] Erasing AUTHORITY.KEYID = 7
7,481,123 UART: [art] PUB.X = 4196F395D7B5FBB3F8D60E9BFD26CD5BFB3DB8DF35563DA5371AF7A11DDBAA41B7801E9608B408316F7AEB12A6614C04
7,487,899 UART: [art] PUB.Y = 8F701CDE994954FB103E9C90BF3A442596BBE27D0BA29D595E620381D4B270D640056B673760A2CD5846FD0A64FC3BEA
7,494,843 UART: [art] SIG.R = 43E4D1DC61F404959EEBF9C077626014FF018C445F13C07AD9D5148DD1484A187FB680907F8A3CD5AF6843B3BA4226AA
7,501,613 UART: [art] SIG.S = 8824DC70DE6F84C3EE78F67B6C8F430B8D5760D44E906FD93BDF49453608BF7BCC3FAB9FB36BD78F5E6C98FEDFA7C1FF
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:d4:11:b8:02:4d:b8:8b:71:74:ff:4b:67:0c:54:36:62:46:2b:d0
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=1FD411B8024DB88B7174FF4B670C543662462BD0ED94B4EB806D0FB1FABE8E2B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:41:96:f3:95:d7:b5:fb:b3:f8:d6:0e:9b:fd:26:
cd:5b:fb:3d:b8:df:35:56:3d:a5:37:1a:f7:a1:1d:
db:aa:41:b7:80:1e:96:08:b4:08:31:6f:7a:eb:12:
a6:61:4c:04:8f:70:1c:de:99:49:54:fb:10:3e:9c:
90:bf:3a:44:25:96:bb:e2:7d:0b:a2:9d:59:5e:62:
03:81:d4:b2:70:d6:40:05:6b:67:37:60:a2:cd:58:
46:fd:0a:64:fc:3b:ea
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
1F:D4:11:B8:02:4D:B8:8B:71:74:FF:4B:67:0C:54:36:62:46:2B:D0
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:43:e4:d1:dc:61:f4:04:95:9e:eb:f9:c0:77:62:
60:14:ff:01:8c:44:5f:13:c0:7a:d9:d5:14:8d:d1:48:4a:18:
7f:b6:80:90:7f:8a:3c:d5:af:68:43:b3:ba:42:26:aa:02:31:
00:88:24:dc:70:de:6f:84:c3:ee:78:f6:7b:6c:8f:43:0b:8d:
57:60:d4:4e:90:6f:d9:3b:df:49:45:36:08:bf:7b:cc:3f:ab:
9f:b3:6b:d7:8f:5e:6c:98:fe:df:a7:c1:ff
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.39s
Truncated 2690 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,817,512 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,858,932 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,898,401 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
65:6b:91:12:5e:fe:51:86:c6:ab:6b:12:ed:2f:3e:d6:29:30:c7:82
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=E56B91125EFE5186C6AB6B12ED2F3ED62930C7820703C366074EEDFF175FC268
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9e:9f:69:98:e2:ac:5a:9d:4a:9c:b9:c2:5b:98:
87:a3:88:22:5c:a7:2c:4e:17:20:5c:c8:dd:63:61:
95:9e:c1:5f:1c:e0:91:f1:2e:5e:fe:85:2a:58:57:
01:19:e3:fe:98:83:4b:ba:f6:13:ba:72:a0:65:71:
9c:0b:dc:3a:bc:e6:ba:34:a1:e5:82:0b:f7:1e:d2:
2a:f6:df:c9:39:5e:71:01:ba:f4:ba:e8:d1:fb:9e:
e8:2c:68:c9:79:ec:7f
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
E5:6B:91:12:5E:FE:51:86:C6:AB:6B:12:ED:2F:3E:D6:29:30:C7:82
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:ea:e5:38:7e:5b:64:9a:8e:da:a2:52:b0:fe:
b6:19:41:5a:71:93:8b:76:4d:a9:0e:07:15:cd:3f:4b:70:86:
64:10:e5:4e:62:ee:af:4b:b5:de:21:b4:28:30:a7:b3:30:02:
31:00:ea:b3:0d:30:c6:98:bc:de:90:8e:03:3d:47:82:53:3f:
75:fb:c3:7d:ba:6f:a8:46:09:25:92:99:1b:30:01:6b:0f:ec:
d6:fe:b4:a2:1c:d9:8e:c3:8f:eb:27:3e:0f:2a
3,909,139 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,946,155 >>> mbox cmd response: success
6,959,403 UART:
6,959,419 UART: Running Caliptra FMC ...
6,959,827 UART:
6,959,970 UART: [state] CFI Enabled
7,049,007 UART: [art] Extend RT PCRs Done
7,049,435 UART: [art] Lock RT PCRs Done
7,050,636 UART: [art] Populate DV Done
7,059,156 UART: [fht] FMC Alias Private Key: 7
7,060,198 UART: [art] Derive CDI
7,060,478 UART: [art] Store in slot 0x4
7,146,347 UART: [art] Derive Key Pair
7,146,707 UART: [art] Store priv key in slot 0x5
7,159,515 UART: [art] Derive Key Pair - Done
7,174,518 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,190,357 UART: [art] Erasing AUTHORITY.KEYID = 7
7,191,122 UART: [art] PUB.X = 97938E8C437058C423C42929DF9D7CA9DD785CC6C32B4CD077BD9C132B15C77A9986F60F7586D98C6299DA06A751A4E3
7,197,888 UART: [art] PUB.Y = 53F91DC6C596A01605805ECCD0D1957D7CF088A0DC6AFEB76724E1F96F2F7F50E47D4C5381FA9626B621985331554ED0
7,204,839 UART: [art] SIG.R = 630CA31D969C2E20A1887D0707EDA15D624FADCC7FFE4921E8F5BCA364F9A7F8B5581964B96382EA6E7FA052A4BC05FE
7,211,613 UART: [art] SIG.S = E53B8AC59D11CE8F9081A125AA2C58202EDDD7D4829EF8CFDE04DC608131926671C83231D8B3B5680958D153D88C720A
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
3f:f3:32:06:1c:6a:05:50:1a:87:ab:1f:f3:b9:82:f0:d1:fb:29:b3
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=3BF332061C6A05501A87AB1FF3B982F0D1FB29B3E513F3A5BC98FD4FCAB6517B
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:97:93:8e:8c:43:70:58:c4:23:c4:29:29:df:9d:
7c:a9:dd:78:5c:c6:c3:2b:4c:d0:77:bd:9c:13:2b:
15:c7:7a:99:86:f6:0f:75:86:d9:8c:62:99:da:06:
a7:51:a4:e3:53:f9:1d:c6:c5:96:a0:16:05:80:5e:
cc:d0:d1:95:7d:7c:f0:88:a0:dc:6a:fe:b7:67:24:
e1:f9:6f:2f:7f:50:e4:7d:4c:53:81:fa:96:26:b6:
21:98:53:31:55:4e:d0
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
3B:F3:32:06:1C:6A:05:50:1A:87:AB:1F:F3:B9:82:F0:D1:FB:29:B3
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:63:0c:a3:1d:96:9c:2e:20:a1:88:7d:07:07:ed:
a1:5d:62:4f:ad:cc:7f:fe:49:21:e8:f5:bc:a3:64:f9:a7:f8:
b5:58:19:64:b9:63:82:ea:6e:7f:a0:52:a4:bc:05:fe:02:31:
00:e5:3b:8a:c5:9d:11:ce:8f:90:81:a1:25:aa:2c:58:20:2e:
dd:d7:d4:82:9e:f8:cf:de:04:dc:60:81:31:92:66:71:c8:32:
31:d8:b3:b5:68:09:58:d1:53:d8:8c:72:0a
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.36s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,993,630 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,034,966 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,073,745 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
2e:c0:e5:58:77:bb:3e:81:00:98:f4:5a:ba:d3:23:9a:02:36:7a:51
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=AAC0E55877BB3E810098F45ABAD3239A02367A514F4008BE27B77737ABAD06F9
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:e1:19:11:7a:51:dd:f5:8e:0d:1a:aa:d1:aa:4c:
a5:0f:08:71:d6:d1:47:cd:fe:c4:ca:5d:02:c8:52:
b6:a5:e6:f2:39:77:f5:0b:c2:68:ae:03:c6:99:00:
f2:13:1c:65:85:00:82:c4:28:4f:be:0c:84:cc:47:
5c:6b:c6:95:44:b6:bf:e9:8a:e7:1a:7f:da:cc:d4:
d4:fd:b0:31:81:d1:25:dd:fd:1e:84:b0:39:1e:f9:
0c:93:45:98:78:64:ea
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
AA:C0:E5:58:77:BB:3E:81:00:98:F4:5A:BA:D3:23:9A:02:36:7A:51
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:82:e9:e0:75:6e:a2:8c:2a:3d:6d:fb:54:98:
c3:d2:72:13:4e:a0:2e:ad:c8:24:f7:5f:a4:bf:d0:b1:c2:99:
a0:43:6a:95:26:0c:d5:4b:98:94:b9:42:b7:06:3f:96:b8:02:
30:4f:e0:95:7c:ab:be:e4:4b:83:dc:66:e4:4a:9a:a2:40:42:
29:53:ca:b2:f6:70:9f:a1:35:b2:28:f6:f2:5d:ad:06:e2:6f:
7a:41:44:ae:f9:e6:eb:a8:5b:c2:87:73:21
4,084,590 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,608 UART:
4,085,624 UART: Running Caliptra ROM ...
4,086,032 UART:
4,086,087 UART: [state] CFI Enabled
4,089,210 UART: [state] LifecycleState = Production
4,089,818 UART: [state] DebugLocked = Yes
4,090,490 UART: [state] Starting the WD Timer 40000000 cycles
4,092,048 UART: [kat] SHA2-256
4,897,698 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,901,823 UART: [kat] ++
4,901,975 UART: [kat] sha1
4,906,285 UART: [kat] SHA2-256
4,908,225 UART: [kat] SHA2-384
4,910,828 UART: [kat] SHA2-512-ACC
4,912,728 UART: [kat] ECC-384
4,922,295 UART: [kat] HMAC-384Kdf
4,926,693 UART: [kat] LMS
5,175,021 UART: [kat] --
5,176,073 UART: [update-reset] ++
7,087,206 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,088,253 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,240,846 >>> mbox cmd response: success
7,241,178 UART: [update-reset] Copying MAN_2 To MAN_1
7,249,190 UART: [update-reset Success] --
7,250,135 UART: [state] Locking Datavault
7,250,757 UART: [state] Locking PCR0, PCR1 and PCR31
7,251,361 UART: [state] Locking ICCM
7,251,991 UART: [exit] Launching FMC @ 0x40000130
7,257,321 UART:
7,257,337 UART: Running Caliptra FMC ...
7,257,745 UART:
7,257,799 UART: [state] CFI Enabled
7,346,402 UART: [art] Extend RT PCRs Done
7,346,830 UART: [art] Lock RT PCRs Done
7,348,089 UART: [art] Populate DV Done
7,356,259 UART: [fht] FMC Alias Private Key: 7
7,357,279 UART: [art] Derive CDI
7,357,559 UART: [art] Store in slot 0x4
7,443,336 UART: [art] Derive Key Pair
7,443,696 UART: [art] Store priv key in slot 0x5
7,456,852 UART: [art] Derive Key Pair - Done
7,471,416 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,486,475 UART: [art] Erasing AUTHORITY.KEYID = 7
7,487,240 UART: [art] PUB.X = 9F3E48A64E51A4CBBEED2C8E93F952C266D2FD5ABE2124857C0FC340F81A3E4DB8192A7CD9C6A2EB4BC0BD219762084A
7,494,024 UART: [art] PUB.Y = 258C269882C72F51A730160676D2DCE23446630F31B4CB53DBD7CCD68EA58A6CD9DE20D0E13472FF1EC2CD7057FD9689
7,500,976 UART: [art] SIG.R = 408864070C334AC6986B10D7B40BCC52EE27C875998A511D0F540E35076E3DBBBD16840F7AE9DB0BBC4FC305D8A421E3
7,507,727 UART: [art] SIG.S = D6699F9002D1FEBE2E247DEE7C582209FB575072CB249E4B8A5C4B8AA76FC1602A1E3E9D7882225C459D919832FF7A88
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
36:58:8f:10:65:1f:70:45:67:37:8a:b6:60:8c:e6:ea:bd:44:42:9a
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=B2588F10651F704567378AB6608CE6EABD44429AE96CDF6F7BA1DFE192F94AEC
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:9f:3e:48:a6:4e:51:a4:cb:be:ed:2c:8e:93:f9:
52:c2:66:d2:fd:5a:be:21:24:85:7c:0f:c3:40:f8:
1a:3e:4d:b8:19:2a:7c:d9:c6:a2:eb:4b:c0:bd:21:
97:62:08:4a:25:8c:26:98:82:c7:2f:51:a7:30:16:
06:76:d2:dc:e2:34:46:63:0f:31:b4:cb:53:db:d7:
cc:d6:8e:a5:8a:6c:d9:de:20:d0:e1:34:72:ff:1e:
c2:cd:70:57:fd:96:89
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
B2:58:8F:10:65:1F:70:45:67:37:8A:B6:60:8C:E6:EA:BD:44:42:9A
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:40:88:64:07:0c:33:4a:c6:98:6b:10:d7:b4:0b:
cc:52:ee:27:c8:75:99:8a:51:1d:0f:54:0e:35:07:6e:3d:bb:
bd:16:84:0f:7a:e9:db:0b:bc:4f:c3:05:d8:a4:21:e3:02:31:
00:d6:69:9f:90:02:d1:fe:be:2e:24:7d:ee:7c:58:22:09:fb:
57:50:72:cb:24:9e:4b:8a:5c:4b:8a:a7:6f:c1:60:2a:1e:3e:
9d:78:82:22:5c:45:9d:91:98:32:ff:7a:88
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.42s
Truncated 2687 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,814,133 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,855,741 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,895,100 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
16:c6:ce:0f:dc:15:7d:5b:a3:4c:2a:ba:82:cf:ae:6a:32:fb:38:48
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=12C6CE0FDC157D5BA34C2ABA82CFAE6A32FB38484C666C82899753CE289889DF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:6a:89:c0:24:40:e1:58:31:b3:ec:3f:25:ca:8d:
42:f8:71:9a:32:00:9e:6f:02:8f:41:f6:63:11:b9:
03:93:e5:43:bd:ae:5e:c0:eb:2c:48:e7:63:86:42:
15:3b:57:bc:fe:c1:8c:f9:82:d8:70:dd:38:24:1e:
78:89:9c:45:13:f7:d6:46:d0:c6:86:df:4b:25:f1:
20:dc:d4:88:4d:cf:27:8f:a4:c6:00:62:6b:84:a4:
bb:4c:e8:e2:0e:22:84
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
12:C6:CE:0F:DC:15:7D:5B:A3:4C:2A:BA:82:CF:AE:6A:32:FB:38:48
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:ae:b9:57:c8:e6:b6:3f:40:49:5c:bb:5e:5f:
21:de:75:33:46:df:04:c0:51:0e:d5:95:d9:be:7f:4c:3c:bf:
79:71:16:8a:32:22:4e:eb:82:c6:d9:d0:bf:2b:7c:ed:b6:02:
30:3e:d9:9b:40:35:6f:0c:c4:d3:d9:dd:a9:b8:18:59:e3:50:
c9:48:6d:fe:ac:55:d8:17:c9:1b:cf:df:d4:66:ef:5e:b2:dd:
5c:bf:0c:bd:89:ae:c6:9d:c1:e0:4d:08:eb
3,906,143 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,951,265 >>> mbox cmd response: success
6,964,789 UART:
6,964,805 UART: Running Caliptra FMC ...
6,965,213 UART:
6,965,267 UART: [state] CFI Enabled
7,054,770 UART: [art] Extend RT PCRs Done
7,055,198 UART: [art] Lock RT PCRs Done
7,056,605 UART: [art] Populate DV Done
7,064,827 UART: [fht] FMC Alias Private Key: 7
7,065,759 UART: [art] Derive CDI
7,066,039 UART: [art] Store in slot 0x4
7,151,946 UART: [art] Derive Key Pair
7,152,306 UART: [art] Store priv key in slot 0x5
7,165,602 UART: [art] Derive Key Pair - Done
7,180,864 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,196,063 UART: [art] Erasing AUTHORITY.KEYID = 7
7,196,828 UART: [art] PUB.X = DC4AC482A44EFB51813599996B511C57104AF212D6020DE4407021FA1D0656BF755F190584E258FF69AD47B8FD1ACC9F
7,203,590 UART: [art] PUB.Y = F06FD4A12D6BB6CED05404C11C44673B928EEC8AD455D550DBA33F85B3152FEA5A44AC4C55BDABCE3C28AACD54F7A675
7,210,563 UART: [art] SIG.R = 4B22201FDBCFFFB638A11E18025671348950F38E4DD0B0BA30E05E6D17AE23A24FFB429100E14110EB5F1D8B3493F0CF
7,217,318 UART: [art] SIG.S = A13222DE70C93E8F03E8B45A795C206C3278E50E8ED6E614730270454E287549EC538304E69586FA3ED3B7D8E92FF984
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1f:15:1c:dc:d5:09:40:9e:77:11:09:8e:f9:fe:93:ad:0e:3a:a4:9e
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=9B151CDCD509409E7711098EF9FE93AD0E3AA49E6EEA4D8647557E96C0B65F46
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:dc:4a:c4:82:a4:4e:fb:51:81:35:99:99:6b:51:
1c:57:10:4a:f2:12:d6:02:0d:e4:40:70:21:fa:1d:
06:56:bf:75:5f:19:05:84:e2:58:ff:69:ad:47:b8:
fd:1a:cc:9f:f0:6f:d4:a1:2d:6b:b6:ce:d0:54:04:
c1:1c:44:67:3b:92:8e:ec:8a:d4:55:d5:50:db:a3:
3f:85:b3:15:2f:ea:5a:44:ac:4c:55:bd:ab:ce:3c:
28:aa:cd:54:f7:a6:75
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
9B:15:1C:DC:D5:09:40:9E:77:11:09:8E:F9:FE:93:AD:0E:3A:A4:9E
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:4b:22:20:1f:db:cf:ff:b6:38:a1:1e:18:02:56:
71:34:89:50:f3:8e:4d:d0:b0:ba:30:e0:5e:6d:17:ae:23:a2:
4f:fb:42:91:00:e1:41:10:eb:5f:1d:8b:34:93:f0:cf:02:31:
00:a1:32:22:de:70:c9:3e:8f:03:e8:b4:5a:79:5c:20:6c:32:
78:e5:0e:8e:d6:e6:14:73:02:70:45:4e:28:75:49:ec:53:83:
04:e6:95:86:fa:3e:d3:b7:d8:e9:2f:f9:84
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.46s
Truncated 7137 bytes from beginning
:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,005,088 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,046,308 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,085,485 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0f:77:c8:2b:1f:d1:19:ce:4c:aa:71:20:e8:d0:a7:4f:a9:f7:f7:dc
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=0F77C82B1FD119CE4CAA7120E8D0A74FA9F7F7DC90692A355F144A7E7FD8A004
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:06:29:bf:f3:2f:a1:de:ce:37:5a:97:0d:1c:1e:
28:43:1c:3a:2f:83:6d:00:f3:bc:34:85:b2:be:28:
4e:8e:a0:fc:19:9f:30:de:12:02:0f:25:1d:96:7b:
66:97:88:74:4b:9c:76:8f:61:af:5b:ad:42:59:4c:
7c:ba:bb:b8:c8:25:e8:4b:bd:b3:8f:ff:3a:61:f1:
fb:38:f3:22:29:70:94:6e:24:6e:1f:93:ba:69:a9:
0f:2d:d3:b4:33:e8:21
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
0F:77:C8:2B:1F:D1:19:CE:4C:AA:71:20:E8:D0:A7:4F:A9:F7:F7:DC
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:d3:78:8f:54:c3:50:3d:fe:1a:32:50:01:a3:
56:64:03:a3:2b:8e:17:aa:c2:db:37:d5:4a:8d:a5:7e:8b:0c:
5b:48:89:a1:4d:2c:f8:f9:19:b7:b7:d0:a3:2a:ee:60:98:02:
30:69:69:1e:1c:ff:11:cf:e6:06:f8:96:f2:35:44:5f:8b:bd:
b7:9d:ab:a8:7d:6a:f9:35:19:f3:2e:58:0a:03:d5:cf:69:ea:
a1:50:fe:0b:c5:4d:d1:7d:bf:80:ea:71:85
4,096,412 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,097,240 UART:
4,097,256 UART: Running Caliptra ROM ...
4,097,664 UART:
4,097,806 UART: [state] CFI Enabled
4,101,023 UART: [state] LifecycleState = Production
4,101,631 UART: [state] DebugLocked = Yes
4,102,157 UART: [state] Starting the WD Timer 40000000 cycles
4,103,721 UART: [kat] SHA2-256
4,909,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,913,496 UART: [kat] ++
4,913,648 UART: [kat] sha1
4,918,036 UART: [kat] SHA2-256
4,919,976 UART: [kat] SHA2-384
4,922,853 UART: [kat] SHA2-512-ACC
4,924,753 UART: [kat] ECC-384
4,933,732 UART: [kat] HMAC-384Kdf
4,938,436 UART: [kat] LMS
5,186,764 UART: [kat] --
5,187,582 UART: [update-reset] ++
7,105,960 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,106,997 UART: [update-reset] Loading Runtime at addr 0x40005000 len 90872
7,259,590 >>> mbox cmd response: success
7,259,700 UART: [update-reset] Copying MAN_2 To MAN_1
7,267,712 UART: [update-reset Success] --
7,268,767 UART: [state] Locking Datavault
7,269,769 UART: [state] Locking PCR0, PCR1 and PCR31
7,270,373 UART: [state] Locking ICCM
7,270,803 UART: [exit] Launching FMC @ 0x40000130
7,276,133 UART:
7,276,149 UART: Running Caliptra FMC ...
7,276,557 UART:
7,276,700 UART: [state] CFI Enabled
7,366,549 UART: [art] Extend RT PCRs Done
7,366,977 UART: [art] Lock RT PCRs Done
7,368,360 UART: [art] Populate DV Done
7,376,632 UART: [fht] FMC Alias Private Key: 7
7,377,782 UART: [art] Derive CDI
7,378,062 UART: [art] Store in slot 0x4
7,463,945 UART: [art] Derive Key Pair
7,464,305 UART: [art] Store priv key in slot 0x5
7,477,919 UART: [art] Derive Key Pair - Done
7,492,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,508,319 UART: [art] Erasing AUTHORITY.KEYID = 7
7,509,084 UART: [art] PUB.X = CFD16EAE0CF71018A0FDDC919A2B7038FDD266014CDD5BF5755302A68EE62784FE8A4BF6934237E11EC33E9C83067305
7,515,849 UART: [art] PUB.Y = 2A6E55BCC3314C4FF9EF311AB494E5B6FBF82A898217B0DC9D16A55A0876D83D3F94BC839F28F5DDDB9893B441E7A6C3
7,522,812 UART: [art] SIG.R = B554856FC7526D5DE58EA008A890195B3212AD28F0D94A3DCE7309AE9618F34DA8891362815F05004325C79405CB99BB
7,529,544 UART: [art] SIG.S = 5ABAF60E927E926028DB26648502DA8A78DBD31F829522809517891B209FC6E5CAD12539295E7F42FD95D64D88943085
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:6a:e8:e8:87:98:d7:c4:8b:18:6d:82:fa:1f:35:bc:32:cc:97:82
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=906AE8E88798D7C48B186D82FA1F35BC32CC9782F158695C936090DBE00227EF
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:cf:d1:6e:ae:0c:f7:10:18:a0:fd:dc:91:9a:2b:
70:38:fd:d2:66:01:4c:dd:5b:f5:75:53:02:a6:8e:
e6:27:84:fe:8a:4b:f6:93:42:37:e1:1e:c3:3e:9c:
83:06:73:05:2a:6e:55:bc:c3:31:4c:4f:f9:ef:31:
1a:b4:94:e5:b6:fb:f8:2a:89:82:17:b0:dc:9d:16:
a5:5a:08:76:d8:3d:3f:94:bc:83:9f:28:f5:dd:db:
98:93:b4:41:e7:a6:c3
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
90:6A:E8:E8:87:98:D7:C4:8B:18:6D:82:FA:1F:35:BC:32:CC:97:82
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:b5:54:85:6f:c7:52:6d:5d:e5:8e:a0:08:a8:
90:19:5b:32:12:ad:28:f0:d9:4a:3d:ce:73:09:ae:96:18:f3:
4d:a8:89:13:62:81:5f:05:00:43:25:c7:94:05:cb:99:bb:02:
30:5a:ba:f6:0e:92:7e:92:60:28:db:26:64:85:02:da:8a:78:
db:d3:1f:82:95:22:80:95:17:89:1b:20:9f:c6:e5:ca:d1:25:
39:29:5e:7f:42:fd:95:d6:4d:88:94:30:85
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.36s
Truncated 2687 bytes from beginning
Public-Key: (384 bit)
pub:
04:84:2c:00:af:05:ac:cc:eb:14:51:4e:2d:37:b0:
c3:aa:a2:18:f1:50:57:f1:dc:b8:24:a2:14:98:0b:
74:46:88:a0:88:8a:02:97:fa:7d:c5:e1:ea:d8:ca:
12:91:db:22:9c:28:eb:86:78:bc:e8:00:82:2c:07:
22:8f:41:6a:e4:9d:21:8e:5d:a2:f2:d1:a8:a2:7d:
c1:9a:df:66:8a:74:62:89:99:d2:22:b4:01:59:d8:
07:6f:af:bb:8c:5e:db
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:4
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
X509v3 Subject Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
X509v3 Authority Key Identifier:
42:4F:3A:C7:45:DD:BD:50:15:05:7F:5B:F8:3E:9C:D6:48:10:B0:41
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:9b:0e:19:91:81:f6:90:a7:43:34:60:d8:1d:
69:c4:a5:63:52:a3:c8:93:cf:4c:11:be:e1:a1:8d:47:a6:b5:
63:78:42:3f:8a:85:f2:34:b4:ab:5a:18:01:f6:e7:ff:92:02:
31:00:e1:21:cf:21:fe:44:09:81:95:01:fd:29:ad:f5:29:a9:
01:6a:2e:a3:15:bf:65:ab:2a:e5:82:7c:ef:f1:b8:59:bd:7e:
60:cf:15:c7:2a:64:ea:cf:2b:7b:9b:ff:42:d3
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,818,949 UART: [rt]cmd =0x43455246, len=4
fmc-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
14:4a:45:10:63:00:d2:8a:e6:56:1a:f1:34:cc:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 LDevID/serialNumber=21EEEF9A4C61D4B9E3D94BEA46F9A12AC6887CE2188559F40FF95777E8014889
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
X509v3 Subject Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
X509v3 Authority Key Identifier:
21:EE:EF:9A:4C:61:D4:B9:E3:D9:4B:EA:46:F9:A1:2A:C6:88:7C:E2
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:30:29:b5:7d:e2:6f:12:74:e3:7c:64:b2:39:6a:21:
5b:e6:23:55:92:18:f2:84:2c:00:43:82:38:5f:3c:39:fc:23:
b2:e4:6f:88:b1:d6:cb:3d:30:6e:af:6e:4e:7a:82:5a:02:31:
00:e3:ba:ff:20:a3:af:44:f5:f0:bf:c5:87:28:05:2e:75:63:
02:5a:0a:92:9d:7f:4a:a3:e0:fc:fb:0d:2e:d4:9c:c4:8d:e3:
61:39:4f:65:bc:dd:29:83:30:0e:b2:dc:80
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,860,531 UART: [rt]cmd =0x464d4352, len=4
fmc-alias csr: Certificate Request:
Data:
Version: 1 (0x0)
Subject: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d0:5d:3a:f9:0a:2a:56:c3:b3:3d:31:d0:53:ad:
75:77:b8:46:c3:b2:db:32:0d:df:bb:b8:e3:91:5e:
88:9b:7f:c7:ea:18:cc:76:90:15:9f:1c:d4:f6:36:
64:e1:7d:d1:b4:c7:1e:08:a9:c6:2a:22:57:5e:30:
49:57:8f:ae:48:90:5f:39:d6:6d:d5:af:ee:d7:e9:
cd:f2:64:0b:b7:bf:ab:7f:8b:be:2a:8a:21:b0:20:
fd:c9:15:d9:48:9e:fa
ASN1 OID: secp384r1
NIST CURVE: P-384
Attributes:
Requested Extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:3
X509v3 Key Usage: critical
Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.5:
0..0`.....?0=..`.H.e.....0f..........N.aa.Qe4..q.k..y...b..{l.:_f.;................DEVICE_INFO.......0O.....?0=..`.H.e.....0!.a.e......{....LFq...$.{r{........D.j..q......Q..FMC_INFO
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:65:02:31:00:e9:ba:3d:00:d0:a1:9c:9a:7a:df:27:43:0b:
51:40:86:16:79:b7:64:7b:9a:8d:2c:0c:c7:8d:c5:19:9f:de:
53:cb:a3:b8:46:37:c6:14:7f:47:a1:2b:36:d1:ab:b1:48:02:
30:7c:94:4d:4d:1d:99:26:97:24:f9:0d:61:80:37:94:98:c6:
d1:c1:d2:6a:7e:77:3f:ca:a6:f1:86:f0:3a:c2:d1:cd:99:e7:
30:72:a2:b0:52:f7:2f:19:04:75:98:55:a5
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,899,812 UART: [rt]cmd =0x43455252, len=4
Manifest digest is [07, 5e, 86, 89, ec, 47, 15, 49, 89, a9, 6d, fa, c0, d1, df, 7e, 43, 81, 1a, a8, 28, 96, 2d, 46, e6, f3, ac, c5, 7a, 85, b7, 96, 49, 82, 1a, f3, b6, e1, 51, 2a, d0, 24, 4a, 73, 84, d4, 61, 15]
rt-alias cert: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
47:f3:d2:a2:14:af:53:ab:2c:fc:4d:ed:5c:1f:45:97:b1:93:b2:d6
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=47F3D2A214AF53AB2CFC4DED5C1F4597B193B2D61D5D28D137CD409D8891E556
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:d6:bc:84:6b:6b:2f:16:36:42:51:54:ef:95:c0:
75:53:43:22:41:f5:c2:95:8a:0e:7d:96:69:24:39:
75:91:57:91:b9:70:b0:5e:49:b1:5f:a9:e8:09:62:
86:5a:f3:96:29:2b:ba:ec:23:a0:44:a5:77:2b:10:
a6:a3:4c:70:68:7d:76:db:8d:b3:4b:a6:ed:7e:84:
87:e8:b3:9c:e4:6f:34:a8:1b:7c:e3:17:af:32:1c:
28:dc:89:37:41:41:79
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0..^.I.G..m..~......CF-.(.......z...I*Q..sJ$..a....RT_INFO
X509v3 Subject Key Identifier:
47:F3:D2:A2:14:AF:53:AB:2C:FC:4D:ED:5C:1F:45:97:B1:93:B2:D6
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:66:02:31:00:84:e8:fe:f0:79:85:e4:a2:84:6a:3c:e4:41:
51:fb:4c:bf:c2:3f:59:2c:d4:4e:19:c3:0b:a0:22:11:4f:00:
e7:a5:d9:ae:f2:07:27:9b:86:00:b4:e0:4b:d3:7e:34:2c:02:
31:00:f8:dc:cd:e6:22:0c:65:d7:65:5f:39:f8:6d:29:58:16:
fc:08:86:7b:bb:ce:c8:e1:b3:22:f9:59:c3:5d:6a:a7:26:d5:
db:30:c2:4a:06:63:e9:4e:05:7a:18:cf:ba:97
3,910,654 <<< Executing mbox cmd 0x46574c44 (116800 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,948,864 >>> mbox cmd response: success
6,962,168 UART:
6,962,184 UART: Running Caliptra FMC ...
6,962,592 UART:
6,962,735 UART: [state] CFI Enabled
7,052,122 UART: [art] Extend RT PCRs Done
7,052,550 UART: [art] Lock RT PCRs Done
7,053,885 UART: [art] Populate DV Done
7,061,925 UART: [fht] FMC Alias Private Key: 7
7,063,045 UART: [art] Derive CDI
7,063,325 UART: [art] Store in slot 0x4
7,148,890 UART: [art] Derive Key Pair
7,149,250 UART: [art] Store priv key in slot 0x5
7,163,092 UART: [art] Derive Key Pair - Done
7,177,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,193,000 UART: [art] Erasing AUTHORITY.KEYID = 7
7,193,765 UART: [art] PUB.X = A228F6AE5D1C1C8B7089395C85FF690389A1510C764B817D5255E3897BB8CB0DB6710B29F6C1008829ED1421E42655B7
7,200,497 UART: [art] PUB.Y = 0EAD418EDF22DED98F0FF8E63EA1B4760577AB088830A789936EF39FF879CE4F4B2AFF9EF42ACF30A081AC043ED563B9
7,207,452 UART: [art] SIG.R = 44EAE0599F67E377FBC730DF0E2E70C5430BB49F5F24911C8046D84E8210A1E57BCE2A3CB605BA2AAF6D87D72DC3541A
7,214,227 UART: [art] SIG.S = 3B877984ED0A1EBBAF7626F5AEF2A48F6C1157C5C6D14C3AA4E9052012C5A87577AF7286842A9D843C55A3C57D96AB02
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
rt-alias cert2: Certificate:
Data:
Version: 3 (0x2)
Serial Number:
26:ab:a6:e1:10:fc:d1:80:34:ee:82:9c:ac:9e:99:ae:e7:97:04:d5
Signature Algorithm: ecdsa-with-SHA384
Issuer: CN=Caliptra 1.0 FMC Alias/serialNumber=104A45106300D28AE6561AF134CC9087418315671DAD59218470BE3296EDA2C6
Validity
Not Before: Jan 1 00:00:00 2023 GMT
Not After : Dec 31 23:59:59 9999 GMT
Subject: CN=Caliptra 1.0 Rt Alias/serialNumber=A2ABA6E110FCD18034EE829CAC9E99AEE79704D55125057FB5267E70AC2FF1BB
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (384 bit)
pub:
04:a2:28:f6:ae:5d:1c:1c:8b:70:89:39:5c:85:ff:
69:03:89:a1:51:0c:76:4b:81:7d:52:55:e3:89:7b:
b8:cb:0d:b6:71:0b:29:f6:c1:00:88:29:ed:14:21:
e4:26:55:b7:0e:ad:41:8e:df:22:de:d9:8f:0f:f8:
e6:3e:a1:b4:76:05:77:ab:08:88:30:a7:89:93:6e:
f3:9f:f8:79:ce:4f:4b:2a:ff:9e:f4:2a:cf:30:a0:
81:ac:04:3e:d5:63:b9
ASN1 OID: secp384r1
NIST CURVE: P-384
X509v3 extensions:
X509v3 Basic Constraints: critical
CA:TRUE, pathlen:2
X509v3 Key Usage: critical
Digital Signature, Certificate Sign
2.23.133.5.4.4:
0....................
2.23.133.5.4.1:
0N.....?0=..`.H.e.....0Z..X.....G.V.t.Vv..#..+_....Bt.h.."...v..?(d*..!..RT_INFO
X509v3 Subject Key Identifier:
A2:AB:A6:E1:10:FC:D1:80:34:EE:82:9C:AC:9E:99:AE:E7:97:04:D5
X509v3 Authority Key Identifier:
10:4A:45:10:63:00:D2:8A:E6:56:1A:F1:34:CC:90:87:41:83:15:67
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
30:64:02:30:44:ea:e0:59:9f:67:e3:77:fb:c7:30:df:0e:2e:
70:c5:43:0b:b4:9f:5f:24:91:1c:80:46:d8:4e:82:10:a1:e5:
7b:ce:2a:3c:b6:05:ba:2a:af:6d:87:d7:2d:c3:54:1a:02:30:
3b:87:79:84:ed:0a:1e:bb:af:76:26:f5:ae:f2:a4:8f:6c:11:
57:c5:c6:d1:4c:3a:a4:e9:05:20:12:c5:a8:75:77:af:72:86:
84:2a:9d:84:3c:55:a3:c5:7d:96:ab:02
test smoke_test::smoke_test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.35s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,017 UART:
192,391 UART: Running Caliptra ROM ...
193,471 UART:
193,612 UART: [state] CFI Enabled
265,748 UART: [state] LifecycleState = Unprovisioned
267,686 UART: [state] DebugLocked = No
269,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
278,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
428,009 UART: [kat] SHA2-256
444,020 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,539 UART: [kat] ++
454,991 UART: [kat] sha1
465,164 UART: [kat] SHA2-256
467,865 UART: [kat] SHA2-384
472,926 UART: [kat] SHA2-512-ACC
475,319 UART: [kat] ECC-384
2,771,149 UART: [kat] HMAC-384Kdf
2,803,172 UART: [kat] LMS
3,993,487 UART: [kat] --
3,996,681 UART: [cold-reset] ++
3,998,616 UART: [fht] Storing FHT @ 0x50003400
4,009,241 UART: [idev] ++
4,009,809 UART: [idev] CDI.KEYID = 6
4,010,824 UART: [idev] SUBJECT.KEYID = 7
4,011,990 UART: [idev] UDS.KEYID = 0
4,037,271 UART: [idev] Erasing UDS.KEYID = 0
7,346,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,951 UART: [idev] --
7,374,272 UART: [ldev] ++
7,374,860 UART: [ldev] CDI.KEYID = 6
7,375,769 UART: [ldev] SUBJECT.KEYID = 5
7,376,981 UART: [ldev] AUTHORITY.KEYID = 7
7,378,269 UART: [ldev] FE.KEYID = 1
7,404,951 UART: [ldev] Erasing FE.KEYID = 1
10,735,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,398 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,380 UART: [ldev] --
13,097,357 UART: [fwproc] Waiting for Commands...
13,100,651 UART: [fwproc] Received command 0x46574c44
13,102,838 UART: [fwproc] Received Image of size 118548 bytes
17,202,538 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,278,077 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,351,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,966 >>> mbox cmd response: success
17,684,745 UART: [afmc] ++
17,685,333 UART: [afmc] CDI.KEYID = 6
17,686,216 UART: [afmc] SUBJECT.KEYID = 7
17,687,485 UART: [afmc] AUTHORITY.KEYID = 5
21,052,101 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,356,856 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,359,116 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,373,519 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,388,267 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,402,697 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,425,647 UART: [afmc] --
23,429,521 UART: [cold-reset] --
23,432,358 UART: [state] Locking Datavault
23,436,159 UART: [state] Locking PCR0, PCR1 and PCR31
23,437,935 UART: [state] Locking ICCM
23,439,922 UART: [exit] Launching FMC @ 0x40000130
23,448,318 UART:
23,448,551 UART: Running Caliptra FMC ...
23,449,648 UART:
23,449,799 UART: [state] CFI Enabled
23,515,021 UART: [fht] FMC Alias Private Key: 7
25,855,563 UART: [art] Extend RT PCRs Done
25,856,786 UART: [art] Lock RT PCRs Done
25,858,381 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
191,709 UART:
192,082 UART: Running Caliptra ROM ...
193,196 UART:
193,342 UART: [state] CFI Enabled
260,826 UART: [state] LifecycleState = Unprovisioned
262,824 UART: [state] DebugLocked = Yes
264,607 UART: [state] Starting the Watchdog Timer 25585165 cycles
269,906 UART: [kat] SHA2-256
439,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,110 UART: [kat] ++
450,695 UART: [kat] sha1
460,750 UART: [kat] SHA2-256
463,448 UART: [kat] SHA2-384
468,521 UART: [kat] SHA2-512-ACC
470,890 UART: [kat] ECC-384
2,765,369 UART: [kat] HMAC-384Kdf
2,797,149 UART: [kat] LMS
3,987,398 UART: [kat] --
3,990,631 UART: [cold-reset] ++
3,992,567 UART: [fht] Storing FHT @ 0x50003400
4,003,192 UART: [idev] ++
4,003,768 UART: [idev] CDI.KEYID = 6
4,004,653 UART: [idev] SUBJECT.KEYID = 7
4,005,900 UART: [idev] UDS.KEYID = 0
4,006,896 ready_for_fw is high
4,007,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,156,200 UART: [idev] Erasing UDS.KEYID = 0
7,341,606 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,887 UART: [idev] --
7,369,156 UART: [ldev] ++
7,369,786 UART: [ldev] CDI.KEYID = 6
7,370,693 UART: [ldev] SUBJECT.KEYID = 5
7,371,957 UART: [ldev] AUTHORITY.KEYID = 7
7,373,187 UART: [ldev] FE.KEYID = 1
7,420,776 UART: [ldev] Erasing FE.KEYID = 1
10,751,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,372 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,059,914 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,074,543 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,088,921 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,108,494 UART: [ldev] --
13,112,443 UART: [fwproc] Waiting for Commands...
13,115,785 UART: [fwproc] Received command 0x46574c44
13,117,970 UART: [fwproc] Received Image of size 118548 bytes
17,217,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,366,315 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,695,049 >>> mbox cmd response: success
17,699,861 UART: [afmc] ++
17,700,481 UART: [afmc] CDI.KEYID = 6
17,701,401 UART: [afmc] SUBJECT.KEYID = 7
17,702,622 UART: [afmc] AUTHORITY.KEYID = 5
21,066,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,370,362 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,372,616 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,387,300 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,402,050 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,416,454 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,439,371 UART: [afmc] --
23,443,241 UART: [cold-reset] --
23,446,127 UART: [state] Locking Datavault
23,449,916 UART: [state] Locking PCR0, PCR1 and PCR31
23,451,670 UART: [state] Locking ICCM
23,453,652 UART: [exit] Launching FMC @ 0x40000130
23,462,046 UART:
23,462,294 UART: Running Caliptra FMC ...
23,463,394 UART:
23,463,552 UART: [state] CFI Enabled
23,528,562 UART: [fht] FMC Alias Private Key: 7
25,853,893 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000340Aerror_internal_intr_r=00000040
25,857,456 UART: WDT Expired
25,858,016 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
270,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,958,984 >>> mbox cmd response: success
23,653,887 UART:
23,654,300 UART: Running Caliptra FMC ...
23,655,407 UART:
23,655,567 UART: [state] CFI Enabled
23,721,571 UART: [fht] FMC Alias Private Key: 7
26,062,005 UART: [art] Extend RT PCRs Done
26,063,232 UART: [art] Lock RT PCRs Done
26,064,833 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,802,096 ready_for_fw is high
3,802,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,956,814 >>> mbox cmd response: success
23,652,242 UART:
23,652,678 UART: Running Caliptra FMC ...
23,653,805 UART:
23,653,967 UART: [state] CFI Enabled
23,720,122 UART: [fht] FMC Alias Private Key: 7
26,060,601 UART: [art] Extend RT PCRs Done
26,061,844 UART: [art] Lock RT PCRs Done
26,063,418 UART: [arFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
26,067,102 UART: WDT Expired
26,067,662 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,172 writing to cptra_bootfsm_go
192,406 UART:
192,762 UART: Running Caliptra ROM ...
193,849 UART:
603,520 UART: [state] CFI Enabled
620,921 UART: [state] LifecycleState = Unprovisioned
622,808 UART: [state] DebugLocked = No
625,756 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
635,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
784,113 UART: [kat] SHA2-256
800,439 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,969 UART: [kat] ++
811,554 UART: [kat] sha1
822,165 UART: [kat] SHA2-256
824,857 UART: [kat] SHA2-384
830,525 UART: [kat] SHA2-512-ACC
832,799 UART: [kat] ECC-384
3,118,184 UART: [kat] HMAC-384Kdf
3,130,173 UART: [kat] LMS
4,320,322 UART: [kat] --
4,324,302 UART: [cold-reset] ++
4,325,916 UART: [fht] Storing FHT @ 0x50003400
4,336,755 UART: [idev] ++
4,337,384 UART: [idev] CDI.KEYID = 6
4,338,267 UART: [idev] SUBJECT.KEYID = 7
4,339,536 UART: [idev] UDS.KEYID = 0
4,355,289 UART: [idev] Erasing UDS.KEYID = 0
7,628,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,089 UART: [idev] --
7,654,235 UART: [ldev] ++
7,654,889 UART: [ldev] CDI.KEYID = 6
7,655,803 UART: [ldev] SUBJECT.KEYID = 5
7,657,018 UART: [ldev] AUTHORITY.KEYID = 7
7,658,253 UART: [ldev] FE.KEYID = 1
7,670,140 UART: [ldev] Erasing FE.KEYID = 1
10,956,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,104 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,659 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,296 UART: [ldev] --
13,316,390 UART: [fwproc] Waiting for Commands...
13,318,874 UART: [fwproc] Received command 0x46574c44
13,321,065 UART: [fwproc] Received Image of size 118548 bytes
17,416,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,892,112 >>> mbox cmd response: success
17,897,001 UART: [afmc] ++
17,897,598 UART: [afmc] CDI.KEYID = 6
17,898,506 UART: [afmc] SUBJECT.KEYID = 7
17,899,778 UART: [afmc] AUTHORITY.KEYID = 5
21,217,038 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,681 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,528,334 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,543,099 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,557,536 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,579,590 UART: [afmc] --
23,582,965 UART: [cold-reset] --
23,587,528 UART: [state] Locking Datavault
23,592,778 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,499 UART: [state] Locking ICCM
23,596,839 UART: [exit] Launching FMC @ 0x40000130
23,605,232 UART:
23,605,474 UART: Running Caliptra FMC ...
23,606,521 UART:
23,606,666 UART: [state] CFI Enabled
23,614,903 UART: [fht] FMC Alias Private Key: 7
25,955,012 UART: [art] Extend RT PCRs Done
25,956,239 UART: [art] Lock RT PCRs Done
25,957,726 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
191,888 UART:
192,259 UART: Running Caliptra ROM ...
193,358 UART:
603,007 UART: [state] CFI Enabled
620,378 UART: [state] LifecycleState = Unprovisioned
622,273 UART: [state] DebugLocked = Yes
625,257 UART: [state] Starting the Watchdog Timer 25328125 cycles
630,622 UART: [kat] SHA2-256
800,422 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,966 UART: [kat] ++
811,469 UART: [kat] sha1
822,128 UART: [kat] SHA2-256
824,794 UART: [kat] SHA2-384
830,325 UART: [kat] SHA2-512-ACC
832,697 UART: [kat] ECC-384
3,118,137 UART: [kat] HMAC-384Kdf
3,130,156 UART: [kat] LMS
4,320,249 UART: [kat] --
4,324,269 UART: [cold-reset] ++
4,325,849 UART: [fht] Storing FHT @ 0x50003400
4,336,765 UART: [idev] ++
4,337,328 UART: [idev] CDI.KEYID = 6
4,338,232 UART: [idev] SUBJECT.KEYID = 7
4,339,474 UART: [idev] UDS.KEYID = 0
4,340,517 ready_for_fw is high
4,340,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,705 UART: [idev] Erasing UDS.KEYID = 0
7,628,225 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,082 UART: [idev] --
7,654,245 UART: [ldev] ++
7,654,865 UART: [ldev] CDI.KEYID = 6
7,655,770 UART: [ldev] SUBJECT.KEYID = 5
7,657,030 UART: [ldev] AUTHORITY.KEYID = 7
7,658,259 UART: [ldev] FE.KEYID = 1
7,670,139 UART: [ldev] Erasing FE.KEYID = 1
10,956,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,082 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,648 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,284 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,654 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,311,028 UART: [ldev] --
13,316,141 UART: [fwproc] Waiting for Commands...
13,318,629 UART: [fwproc] Received command 0x46574c44
13,320,808 UART: [fwproc] Received Image of size 118548 bytes
17,415,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,489,310 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,562,515 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,891,920 >>> mbox cmd response: success
17,896,774 UART: [afmc] ++
17,897,371 UART: [afmc] CDI.KEYID = 6
17,898,334 UART: [afmc] SUBJECT.KEYID = 7
17,899,551 UART: [afmc] AUTHORITY.KEYID = 5
21,216,855 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,511,457 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,513,724 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
23,528,284 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
23,543,056 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
23,557,406 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
23,579,388 UART: [afmc] --
23,582,775 UART: [cold-reset] --
23,587,338 UART: [state] Locking Datavault
23,592,588 UART: [state] Locking PCR0, PCR1 and PCR31
23,594,344 UART: [state] Locking ICCM
23,596,650 UART: [exit] Launching FMC @ 0x40000130
23,605,047 UART:
23,605,288 UART: Running Caliptra FMC ...
23,606,387 UART:
23,606,544 UART: [state] CFI Enabled
23,614,756 UART: [fht] FMC Alias Private Key: 7
25,954,918 UART: [art] Extend RT PCRs Done
25,956,149 UART: [art] Lock RT PCRs Done
25,957,560 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
25,961,050 UART: WDT Expired
25,961,609 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
626,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,410 >>> mbox cmd response: success
23,795,545 UART:
23,795,939 UART: Running Caliptra FMC ...
23,797,127 UART:
23,797,299 UART: [state] CFI Enabled
23,805,250 UART: [fht] FMC Alias Private Key: 7
26,145,260 UART: [art] Extend RT PCRs Done
26,146,535 UART: [art] Lock RT PCRs Done
26,148,031 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
4,131,279 ready_for_fw is high
4,131,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,150,172 >>> mbox cmd response: success
23,795,299 UART:
23,795,713 UART: Running Caliptra FMC ...
23,796,840 UART:
23,797,005 UART: [state] CFI Enabled
23,805,059 UART: [fht] FMC Alias Private Key: 7
26,145,144 UART: [art] Extend RT PCRs Done
26,146,370 UART: [art] Lock RT PCRs Done
26,147,970 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
26,151,533 UART: WDT Expired
26,152,090 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,162 writing to cptra_bootfsm_go
192,346 UART:
192,703 UART: Running Caliptra ROM ...
193,876 UART:
194,030 UART: [state] CFI Enabled
264,041 UART: [state] LifecycleState = Unprovisioned
266,032 UART: [state] DebugLocked = No
267,696 UART: [state] WD Timer not started. Device not locked for debugging
275,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
425,198 UART: [kat] SHA2-256
451,248 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,060 UART: [kat] ++
462,554 UART: [kat] sha1
472,629 UART: [kat] SHA2-256
475,321 UART: [kat] SHA2-384
480,434 UART: [kat] SHA2-512-ACC
482,794 UART: [kat] ECC-384
2,927,938 UART: [kat] HMAC-384Kdf
2,950,811 UART: [kat] LMS
3,427,332 UART: [kat] --
3,431,647 UART: [cold-reset] ++
3,433,581 UART: [fht] FHT @ 0x50003400
3,445,585 UART: [idev] ++
3,446,150 UART: [idev] CDI.KEYID = 6
3,447,121 UART: [idev] SUBJECT.KEYID = 7
3,448,341 UART: [idev] UDS.KEYID = 0
3,480,577 UART: [idev] Erasing UDS.KEYID = 0
5,965,340 UART: [idev] Sha1 KeyId Algorithm
5,988,146 UART: [idev] --
5,994,338 UART: [ldev] ++
5,994,919 UART: [ldev] CDI.KEYID = 6
5,995,837 UART: [ldev] SUBJECT.KEYID = 5
5,997,021 UART: [ldev] AUTHORITY.KEYID = 7
5,998,263 UART: [ldev] FE.KEYID = 1
6,037,059 UART: [ldev] Erasing FE.KEYID = 1
8,540,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,273,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,289,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,305,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,320,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,342,162 UART: [ldev] --
10,347,319 UART: [fwproc] Wait for Commands...
10,349,636 UART: [fwproc] Recv command 0x46574c44
10,351,679 UART: [fwproc] Recv'd Img size: 118548 bytes
13,829,273 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,908,771 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,981,792 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,309,523 >>> mbox cmd response: success
14,313,774 UART: [afmc] ++
14,314,374 UART: [afmc] CDI.KEYID = 6
14,315,290 UART: [afmc] SUBJECT.KEYID = 7
14,316,511 UART: [afmc] AUTHORITY.KEYID = 5
16,850,407 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,590,339 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,592,533 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,608,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,624,420 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,639,986 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,663,973 UART: [afmc] --
18,668,163 UART: [cold-reset] --
18,672,622 UART: [state] Locking Datavault
18,678,141 UART: [state] Locking PCR0, PCR1 and PCR31
18,679,900 UART: [state] Locking ICCM
18,680,921 UART: [exit] Launching FMC @ 0x40000130
18,689,343 UART:
18,689,587 UART: Running Caliptra FMC ...
18,690,694 UART:
18,690,863 UART: [state] CFI Enabled
18,749,878 UART: [fht] FMC Alias Private Key: 7
20,515,883 UART: [art] Extend RT PCRs Done
20,517,111 UART: [art] Lock RT PCRs Done
20,518,953 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
191,652 UART:
192,030 UART: Running Caliptra ROM ...
193,235 UART:
193,395 UART: [state] CFI Enabled
260,977 UART: [state] LifecycleState = Unprovisioned
262,898 UART: [state] DebugLocked = Yes
264,684 UART: [state] Starting the WD Timer 20248460 cycles
269,697 UART: [kat] SHA2-256
449,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,139 UART: [kat] ++
460,637 UART: [kat] sha1
470,733 UART: [kat] SHA2-256
473,389 UART: [kat] SHA2-384
478,530 UART: [kat] SHA2-512-ACC
480,896 UART: [kat] ECC-384
2,945,160 UART: [kat] HMAC-384Kdf
2,968,011 UART: [kat] LMS
3,444,498 UART: [kat] --
3,448,893 UART: [cold-reset] ++
3,450,762 UART: [fht] FHT @ 0x50003400
3,462,744 UART: [idev] ++
3,463,407 UART: [idev] CDI.KEYID = 6
3,464,375 UART: [idev] SUBJECT.KEYID = 7
3,465,553 UART: [idev] UDS.KEYID = 0
3,466,487 ready_for_fw is high
3,466,690 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,822 UART: [idev] Erasing UDS.KEYID = 0
5,982,894 UART: [idev] Sha1 KeyId Algorithm
6,005,738 UART: [idev] --
6,011,928 UART: [ldev] ++
6,012,515 UART: [ldev] CDI.KEYID = 6
6,013,437 UART: [ldev] SUBJECT.KEYID = 5
6,014,663 UART: [ldev] AUTHORITY.KEYID = 7
6,015,902 UART: [ldev] FE.KEYID = 1
6,054,693 UART: [ldev] Erasing FE.KEYID = 1
8,558,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,284,513 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,300,324 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,316,153 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,331,947 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,353,436 UART: [ldev] --
10,358,603 UART: [fwproc] Wait for Commands...
10,360,921 UART: [fwproc] Recv command 0x46574c44
10,362,910 UART: [fwproc] Recv'd Img size: 118548 bytes
13,840,527 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,025 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,320,762 >>> mbox cmd response: success
14,325,010 UART: [afmc] ++
14,325,628 UART: [afmc] CDI.KEYID = 6
14,326,604 UART: [afmc] SUBJECT.KEYID = 7
14,327,769 UART: [afmc] AUTHORITY.KEYID = 5
16,862,672 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,602,188 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,604,393 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,620,137 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,636,244 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,651,997 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,675,889 UART: [afmc] --
18,680,129 UART: [cold-reset] --
18,684,539 UART: [state] Locking Datavault
18,690,062 UART: [state] Locking PCR0, PCR1 and PCR31
18,691,821 UART: [state] Locking ICCM
18,692,872 UART: [exit] Launching FMC @ 0x40000130
18,701,266 UART:
18,701,511 UART: Running Caliptra FMC ...
18,702,542 UART:
18,702,694 UART: [state] CFI Enabled
18,760,791 UART: [fht] FMC Alias Private Key: 7
20,516,972 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C70error_internal_intr_r=00000040
20,520,550 UART: WDT Expired
20,521,126 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
271,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,917 >>> mbox cmd response: success
18,512,289 UART:
18,512,739 UART: Running Caliptra FMC ...
18,513,841 UART:
18,514,008 UART: [state] CFI Enabled
18,582,250 UART: [fht] FMC Alias Private Key: 7
20,348,157 UART: [art] Extend RT PCRs Done
20,349,377 UART: [art] Lock RT PCRs Done
20,351,166 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,458,769 ready_for_fw is high
3,459,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,214,098 >>> mbox cmd response: success
18,508,433 UART:
18,508,848 UART: Running Caliptra FMC ...
18,510,181 UART:
18,510,369 UART: [state] CFI Enabled
18,577,762 UART: [fht] FMC Alias Private Key: 7
20,343,732 UART: [art] Extend RT PCRs Done
20,344,955 UART: [art] Lock RT PCRs Done
20,346,801 UART: [art] Populate DV Done
20,348,514 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C50error_internal_intr_r=00000040
20,352,013 UART: WDT Expired
20,352,576 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
192,428 UART:
192,779 UART: Running Caliptra ROM ...
193,955 UART:
603,727 UART: [state] CFI Enabled
620,824 UART: [state] LifecycleState = Unprovisioned
622,727 UART: [state] DebugLocked = No
625,629 UART: [state] WD Timer not started. Device not locked for debugging
633,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
782,966 UART: [kat] SHA2-256
809,250 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,019 UART: [kat] ++
820,557 UART: [kat] sha1
831,144 UART: [kat] SHA2-256
833,865 UART: [kat] SHA2-384
839,411 UART: [kat] SHA2-512-ACC
841,807 UART: [kat] ECC-384
3,284,658 UART: [kat] HMAC-384Kdf
3,297,182 UART: [kat] LMS
3,773,679 UART: [kat] --
3,777,888 UART: [cold-reset] ++
3,779,393 UART: [fht] FHT @ 0x50003400
3,792,087 UART: [idev] ++
3,792,681 UART: [idev] CDI.KEYID = 6
3,793,598 UART: [idev] SUBJECT.KEYID = 7
3,794,816 UART: [idev] UDS.KEYID = 0
3,809,406 UART: [idev] Erasing UDS.KEYID = 0
6,272,852 UART: [idev] Sha1 KeyId Algorithm
6,296,989 UART: [idev] --
6,302,333 UART: [ldev] ++
6,302,901 UART: [ldev] CDI.KEYID = 6
6,303,813 UART: [ldev] SUBJECT.KEYID = 5
6,305,026 UART: [ldev] AUTHORITY.KEYID = 7
6,306,263 UART: [ldev] FE.KEYID = 1
6,317,452 UART: [ldev] Erasing FE.KEYID = 1
8,793,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,239 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,018 UART: [ldev] --
10,588,000 UART: [fwproc] Wait for Commands...
10,589,624 UART: [fwproc] Recv command 0x46574c44
10,591,632 UART: [fwproc] Recv'd Img size: 118548 bytes
14,064,968 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,314 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,323 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,330 >>> mbox cmd response: success
14,548,578 UART: [afmc] ++
14,549,219 UART: [afmc] CDI.KEYID = 6
14,550,126 UART: [afmc] SUBJECT.KEYID = 7
14,551,343 UART: [afmc] AUTHORITY.KEYID = 5
17,059,045 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,783,742 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,524 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,815,629 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,220 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,855,972 UART: [afmc] --
18,858,814 UART: [cold-reset] --
18,864,132 UART: [state] Locking Datavault
18,870,727 UART: [state] Locking PCR0, PCR1 and PCR31
18,872,481 UART: [state] Locking ICCM
18,873,907 UART: [exit] Launching FMC @ 0x40000130
18,882,300 UART:
18,882,542 UART: Running Caliptra FMC ...
18,883,645 UART:
18,883,805 UART: [state] CFI Enabled
18,891,852 UART: [fht] FMC Alias Private Key: 7
20,657,514 UART: [art] Extend RT PCRs Done
20,658,737 UART: [art] Lock RT PCRs Done
20,660,337 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
191,828 UART:
192,176 UART: Running Caliptra ROM ...
193,347 UART:
602,985 UART: [state] CFI Enabled
620,091 UART: [state] LifecycleState = Unprovisioned
621,971 UART: [state] DebugLocked = Yes
624,958 UART: [state] Starting the WD Timer 20031905 cycles
629,987 UART: [kat] SHA2-256
809,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,412 UART: [kat] ++
820,921 UART: [kat] sha1
831,583 UART: [kat] SHA2-256
834,246 UART: [kat] SHA2-384
839,811 UART: [kat] SHA2-512-ACC
842,181 UART: [kat] ECC-384
3,285,078 UART: [kat] HMAC-384Kdf
3,297,595 UART: [kat] LMS
3,774,108 UART: [kat] --
3,778,237 UART: [cold-reset] ++
3,779,812 UART: [fht] FHT @ 0x50003400
3,792,489 UART: [idev] ++
3,793,057 UART: [idev] CDI.KEYID = 6
3,794,037 UART: [idev] SUBJECT.KEYID = 7
3,795,153 UART: [idev] UDS.KEYID = 0
3,796,270 ready_for_fw is high
3,796,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,324 UART: [idev] Erasing UDS.KEYID = 0
6,273,228 UART: [idev] Sha1 KeyId Algorithm
6,297,363 UART: [idev] --
6,302,691 UART: [ldev] ++
6,303,313 UART: [ldev] CDI.KEYID = 6
6,304,242 UART: [ldev] SUBJECT.KEYID = 5
6,305,447 UART: [ldev] AUTHORITY.KEYID = 7
6,306,675 UART: [ldev] FE.KEYID = 1
6,318,017 UART: [ldev] Erasing FE.KEYID = 1
8,793,996 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,932 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,529,700 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,545,576 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,561,356 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,582,558 UART: [ldev] --
10,588,530 UART: [fwproc] Wait for Commands...
10,590,140 UART: [fwproc] Recv command 0x46574c44
10,592,179 UART: [fwproc] Recv'd Img size: 118548 bytes
14,065,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,144,830 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,217,840 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,545,894 >>> mbox cmd response: success
14,549,165 UART: [afmc] ++
14,549,783 UART: [afmc] CDI.KEYID = 6
14,550,699 UART: [afmc] SUBJECT.KEYID = 7
14,551,919 UART: [afmc] AUTHORITY.KEYID = 5
17,059,561 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,782,033 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,232 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,799,996 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,816,057 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
18,831,771 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
18,856,503 UART: [afmc] --
18,859,428 UART: [cold-reset] --
18,864,703 UART: [state] Locking Datavault
18,871,302 UART: [state] Locking PCR0, PCR1 and PCR31
18,873,059 UART: [state] Locking ICCM
18,874,478 UART: [exit] Launching FMC @ 0x40000130
18,882,895 UART:
18,883,175 UART: Running Caliptra FMC ...
18,884,287 UART:
18,884,447 UART: [state] CFI Enabled
18,892,450 UART: [fht] FMC Alias Private Key: 7
20,658,119 UART: [art] Extend RT PCRs Done
20,659,343 UART: [art] Lock RT PCRs Done
20,660,701 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
20,664,192 UART: WDT Expired
20,664,750 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
626,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,735 >>> mbox cmd response: success
18,692,477 UART:
18,692,895 UART: Running Caliptra FMC ...
18,694,027 UART:
18,694,198 UART: [state] CFI Enabled
18,702,129 UART: [fht] FMC Alias Private Key: 7
20,467,630 UART: [art] Extend RT PCRs Done
20,468,852 UART: [art] Lock RT PCRs Done
20,470,448 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
3,784,920 ready_for_fw is high
3,785,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,437,832 >>> mbox cmd response: success
18,692,632 UART:
18,693,046 UART: Running Caliptra FMC ...
18,694,176 UART:
18,694,336 UART: [state] CFI Enabled
18,702,268 UART: [fht] FMC Alias Private Key: 7
20,467,885 UART: [art] Extend RT PCRs Done
20,469,105 UART: [art] Lock RT PCRs Done
20,470,607 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
20,474,181 UART: WDT Expired
20,474,743 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,057 writing to cptra_bootfsm_go
192,140 UART:
192,525 UART: Running Caliptra ROM ...
193,601 UART:
193,740 UART: [state] CFI Enabled
264,149 UART: [state] LifecycleState = Unprovisioned
266,568 UART: [state] DebugLocked = No
268,222 UART: [state] WD Timer not started. Device not locked for debugging
277,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
426,239 UART: [kat] SHA2-256
462,758 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,498 UART: [kat] ++
474,023 UART: [kat] sha1
484,583 UART: [kat] SHA2-256
487,579 UART: [kat] SHA2-384
492,808 UART: [kat] SHA2-512-ACC
495,406 UART: [kat] ECC-384
2,948,808 UART: [kat] HMAC-384Kdf
2,971,895 UART: [kat] LMS
3,503,654 UART: [kat] --
3,508,014 UART: [cold-reset] ++
3,509,897 UART: [fht] FHT @ 0x50003400
3,522,006 UART: [idev] ++
3,522,681 UART: [idev] CDI.KEYID = 6
3,523,764 UART: [idev] SUBJECT.KEYID = 7
3,524,861 UART: [idev] UDS.KEYID = 0
3,543,964 UART: [idev] Erasing UDS.KEYID = 0
6,028,007 UART: [idev] Sha1 KeyId Algorithm
6,049,576 UART: [idev] --
6,055,686 UART: [ldev] ++
6,056,363 UART: [ldev] CDI.KEYID = 6
6,057,267 UART: [ldev] SUBJECT.KEYID = 5
6,058,480 UART: [ldev] AUTHORITY.KEYID = 7
6,059,713 UART: [ldev] FE.KEYID = 1
6,100,449 UART: [ldev] Erasing FE.KEYID = 1
8,603,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,381 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,478 UART: [ldev] --
10,413,636 UART: [fwproc] Wait for Commands...
10,415,901 UART: [fwproc] Recv command 0x46574c44
10,418,226 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,276 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,670,635 >>> mbox cmd response: success
14,674,878 UART: [afmc] ++
14,675,577 UART: [afmc] CDI.KEYID = 6
14,676,755 UART: [afmc] SUBJECT.KEYID = 7
14,678,236 UART: [afmc] AUTHORITY.KEYID = 5
17,216,492 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,936,502 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,938,416 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,953,516 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,968,668 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,983,621 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,006,765 UART: [afmc] --
19,010,803 UART: [cold-reset] --
19,015,366 UART: [state] Locking Datavault
19,021,096 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,231 UART: [state] Locking ICCM
19,024,519 UART: [exit] Launching FMC @ 0x40000130
19,032,859 UART:
19,033,097 UART: Running Caliptra FMC ...
19,034,200 UART:
19,034,363 UART: [state] CFI Enabled
19,095,535 UART: [fht] FMC Alias Private Key: 7
20,861,516 UART: [art] Extend RT PCRs Done
20,862,729 UART: [art] Lock RT PCRs Done
20,864,549 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
191,622 UART:
191,964 UART: Running Caliptra ROM ...
193,130 UART:
193,284 UART: [state] CFI Enabled
260,706 UART: [state] LifecycleState = Unprovisioned
263,115 UART: [state] DebugLocked = Yes
264,892 UART: [state] Starting the WD Timer 20592842 cycles
270,255 UART: [kat] SHA2-256
460,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,850 UART: [kat] ++
471,416 UART: [kat] sha1
482,006 UART: [kat] SHA2-256
485,030 UART: [kat] SHA2-384
490,239 UART: [kat] SHA2-512-ACC
492,882 UART: [kat] ECC-384
2,946,316 UART: [kat] HMAC-384Kdf
2,970,266 UART: [kat] LMS
3,502,013 UART: [kat] --
3,506,359 UART: [cold-reset] ++
3,508,280 UART: [fht] FHT @ 0x50003400
3,520,405 UART: [idev] ++
3,521,113 UART: [idev] CDI.KEYID = 6
3,522,100 UART: [idev] SUBJECT.KEYID = 7
3,523,210 UART: [idev] UDS.KEYID = 0
3,524,250 ready_for_fw is high
3,524,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,535 UART: [idev] Erasing UDS.KEYID = 0
6,027,155 UART: [idev] Sha1 KeyId Algorithm
6,048,719 UART: [idev] --
6,054,971 UART: [ldev] ++
6,055,684 UART: [ldev] CDI.KEYID = 6
6,056,596 UART: [ldev] SUBJECT.KEYID = 5
6,057,808 UART: [ldev] AUTHORITY.KEYID = 7
6,058,978 UART: [ldev] FE.KEYID = 1
6,099,703 UART: [ldev] Erasing FE.KEYID = 1
8,602,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,910 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,083 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,199 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,188 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,408,128 UART: [ldev] --
10,413,275 UART: [fwproc] Wait for Commands...
10,415,528 UART: [fwproc] Recv command 0x46574c44
10,417,506 UART: [fwproc] Recv'd Img size: 118548 bytes
13,908,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,986,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,669,972 >>> mbox cmd response: success
14,674,199 UART: [afmc] ++
14,674,907 UART: [afmc] CDI.KEYID = 6
14,676,092 UART: [afmc] SUBJECT.KEYID = 7
14,677,532 UART: [afmc] AUTHORITY.KEYID = 5
17,216,690 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,330 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,206 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
18,974,409 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
18,989,593 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
19,004,667 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,027,994 UART: [afmc] --
19,032,015 UART: [cold-reset] --
19,036,646 UART: [state] Locking Datavault
19,042,328 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,457 UART: [state] Locking ICCM
19,045,475 UART: [exit] Launching FMC @ 0x40000130
19,053,813 UART:
19,054,055 UART: Running Caliptra FMC ...
19,055,160 UART:
19,055,322 UART: [state] CFI Enabled
19,116,463 UART: [fht] FMC Alias Private Key: 7
20,861,971 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002C6Eerror_internal_intr_r=00000040
20,865,533 UART: WDT Expired
20,866,095 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,907 writing to cptra_bootfsm_go
270,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,795,654 >>> mbox cmd response: success
19,090,123 UART:
19,090,517 UART: Running Caliptra FMC ...
19,091,646 UART:
19,091,811 UART: [state] CFI Enabled
19,160,485 UART: [fht] FMC Alias Private Key: 7
20,926,467 UART: [art] Extend RT PCRs Done
20,927,697 UART: [art] Lock RT PCRs Done
20,929,537 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,435,217 ready_for_fw is high
3,435,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,812,217 >>> mbox cmd response: success
19,126,014 UART:
19,126,411 UART: Running Caliptra FMC ...
19,127,546 UART:
19,127,705 UART: [state] CFI Enabled
19,195,489 UART: [fht] FMC Alias Private Key: 7
20,926,532 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x400044E4error_internal_intr_r=00000040
20,930,143 UART: WDT Expired
20,930,712 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
192,361 UART:
192,720 UART: Running Caliptra ROM ...
193,794 UART:
603,595 UART: [state] CFI Enabled
620,575 UART: [state] LifecycleState = Unprovisioned
622,955 UART: [state] DebugLocked = No
625,767 UART: [state] WD Timer not started. Device not locked for debugging
634,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
783,839 UART: [kat] SHA2-256
820,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,160 UART: [kat] ++
831,687 UART: [kat] sha1
842,782 UART: [kat] SHA2-256
845,794 UART: [kat] SHA2-384
851,507 UART: [kat] SHA2-512-ACC
854,119 UART: [kat] ECC-384
3,296,924 UART: [kat] HMAC-384Kdf
3,310,097 UART: [kat] LMS
3,841,938 UART: [kat] --
3,846,124 UART: [cold-reset] ++
3,847,636 UART: [fht] FHT @ 0x50003400
3,860,457 UART: [idev] ++
3,861,138 UART: [idev] CDI.KEYID = 6
3,862,115 UART: [idev] SUBJECT.KEYID = 7
3,863,342 UART: [idev] UDS.KEYID = 0
3,877,714 UART: [idev] Erasing UDS.KEYID = 0
6,340,732 UART: [idev] Sha1 KeyId Algorithm
6,363,548 UART: [idev] --
6,368,815 UART: [ldev] ++
6,369,502 UART: [ldev] CDI.KEYID = 6
6,370,417 UART: [ldev] SUBJECT.KEYID = 5
6,371,629 UART: [ldev] AUTHORITY.KEYID = 7
6,372,807 UART: [ldev] FE.KEYID = 1
6,383,830 UART: [ldev] Erasing FE.KEYID = 1
8,859,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,255 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,767 UART: [ldev] --
10,650,737 UART: [fwproc] Wait for Commands...
10,652,296 UART: [fwproc] Recv command 0x46574c44
10,654,581 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,219,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,435 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,446 >>> mbox cmd response: success
14,906,704 UART: [afmc] ++
14,907,400 UART: [afmc] CDI.KEYID = 6
14,908,514 UART: [afmc] SUBJECT.KEYID = 7
14,910,051 UART: [afmc] AUTHORITY.KEYID = 5
17,417,159 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,304 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,267 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,407 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,495 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,401 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,210,416 UART: [afmc] --
19,213,110 UART: [cold-reset] --
19,218,596 UART: [state] Locking Datavault
19,225,328 UART: [state] Locking PCR0, PCR1 and PCR31
19,227,568 UART: [state] Locking ICCM
19,229,143 UART: [exit] Launching FMC @ 0x40000130
19,237,825 UART:
19,238,067 UART: Running Caliptra FMC ...
19,239,171 UART:
19,239,323 UART: [state] CFI Enabled
19,247,366 UART: [fht] FMC Alias Private Key: 7
21,013,055 UART: [art] Extend RT PCRs Done
21,014,269 UART: [art] Lock RT PCRs Done
21,015,840 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,419 writing to cptra_bootfsm_go
192,069 UART:
192,436 UART: Running Caliptra ROM ...
193,613 UART:
603,336 UART: [state] CFI Enabled
620,339 UART: [state] LifecycleState = Unprovisioned
622,652 UART: [state] DebugLocked = Yes
625,632 UART: [state] Starting the WD Timer 20386510 cycles
631,072 UART: [kat] SHA2-256
820,949 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,713 UART: [kat] ++
832,276 UART: [kat] sha1
843,359 UART: [kat] SHA2-256
846,438 UART: [kat] SHA2-384
852,073 UART: [kat] SHA2-512-ACC
854,659 UART: [kat] ECC-384
3,297,543 UART: [kat] HMAC-384Kdf
3,310,712 UART: [kat] LMS
3,842,523 UART: [kat] --
3,846,725 UART: [cold-reset] ++
3,848,227 UART: [fht] FHT @ 0x50003400
3,861,048 UART: [idev] ++
3,861,688 UART: [idev] CDI.KEYID = 6
3,862,721 UART: [idev] SUBJECT.KEYID = 7
3,863,917 UART: [idev] UDS.KEYID = 0
3,864,898 ready_for_fw is high
3,865,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,964 UART: [idev] Erasing UDS.KEYID = 0
6,341,279 UART: [idev] Sha1 KeyId Algorithm
6,364,182 UART: [idev] --
6,369,581 UART: [ldev] ++
6,370,254 UART: [ldev] CDI.KEYID = 6
6,371,188 UART: [ldev] SUBJECT.KEYID = 5
6,372,341 UART: [ldev] AUTHORITY.KEYID = 7
6,373,575 UART: [ldev] FE.KEYID = 1
6,384,571 UART: [ldev] Erasing FE.KEYID = 1
8,860,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,510 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,594,633 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,609,753 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,624,770 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,645,426 UART: [ldev] --
10,651,409 UART: [fwproc] Wait for Commands...
10,652,959 UART: [fwproc] Recv command 0x46574c44
10,654,889 UART: [fwproc] Recv'd Img size: 118548 bytes
14,141,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,220,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,343,749 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,903,819 >>> mbox cmd response: success
14,907,033 UART: [afmc] ++
14,907,765 UART: [afmc] CDI.KEYID = 6
14,908,961 UART: [afmc] SUBJECT.KEYID = 7
14,910,397 UART: [afmc] AUTHORITY.KEYID = 5
17,417,563 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,662 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,615 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
19,156,812 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
19,172,023 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
19,187,072 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
19,211,232 UART: [afmc] --
19,213,901 UART: [cold-reset] --
19,219,386 UART: [state] Locking Datavault
19,226,104 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,302 UART: [state] Locking ICCM
19,229,670 UART: [exit] Launching FMC @ 0x40000130
19,238,339 UART:
19,238,572 UART: Running Caliptra FMC ...
19,239,599 UART:
19,239,744 UART: [state] CFI Enabled
19,247,899 UART: [fht] FMC Alias Private Key: 7
21,013,634 UART: [art] Extend RT PCRs Done
21,014,851 UART: [art] Lock RT PCRs Done
21,016,368 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Aerror_internal_intr_r=00000040
21,019,853 UART: WDT Expired
21,020,414 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
625,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,554 >>> mbox cmd response: success
19,293,736 UART:
19,294,170 UART: Running Caliptra FMC ...
19,295,281 UART:
19,295,437 UART: [state] CFI Enabled
19,303,347 UART: [fht] FMC Alias Private Key: 7
21,068,899 UART: [art] Extend RT PCRs Done
21,070,140 UART: [art] Lock RT PCRs Done
21,071,719 UART: [art] Populate DV Done
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,761,073 ready_for_fw is high
3,761,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,036,878 >>> mbox cmd response: success
19,294,145 UART:
19,294,534 UART: Running Caliptra FMC ...
19,295,685 UART:
19,295,843 UART: [state] CFI Enabled
19,303,713 UART: [fht] FMC Alias Private Key: 7
21,069,379 UART: [art] Extend RT PCRs Done
21,070,733 UART: [art] Lock RT PCRs Done
21,072,094 UART: FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4000299Cerror_internal_intr_r=00000040
21,075,648 UART: WDT Expired
21,076,210 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3261959 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,349,490 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002BA6error_internal_intr_r=00000040
3,351,776 UART: WDT Expired
3,351,985 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,172,082 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Eerror_internal_intr_r=00000040
3,174,341 UART: WDT Expired
3,174,550 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3263380 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,351,900 UART: [art] PFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B8Aerror_internal_intr_r=00000040
3,354,178 UART: WDT Expired
3,354,387 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,174,492 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Cerror_internal_intr_r=00000040
3,176,743 UART: WDT Expired
3,176,952 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 2956854 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,810 >>> mbox cmd response: success
2,824,969 UART: [afmc] ++
2,825,137 UART: [afmc] CDI.KEYID = 6
2,825,500 UART: [afmc] SUBJECT.KEYID = 7
2,825,926 UART: [afmc] AUTHORITY.KEYID = 5
2,861,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,833 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,706 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,415 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,105 UART: [afmc] --
2,904,109 UART: [cold-reset] --
2,905,029 UART: [state] Locking Datavault
2,906,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,824 UART: [state] Locking ICCM
2,907,244 UART: [exit] Launching FMC @ 0x40000130
2,912,574 UART:
2,912,590 UART: Running Caliptra FMC ...
2,912,998 UART:
2,913,052 UART: [state] CFI Enabled
2,923,642 UART: [fht] FMC Alias Private Key: 7
3,042,078 UART: [art] Extend RT PCRs Done
3,042,506 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,044,238 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
3,046,541 UART: WDT Expired
3,046,750 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,870,013 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B76error_internal_intr_r=00000040
2,872,268 UART: WDT Expired
2,872,477 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 2960215 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,048,588 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
3,050,883 UART: WDT Expired
3,051,092 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,266 >>> mbox cmd response: success
2,741,022 UART:
2,741,038 UART: Running Caliptra FMC ...
2,741,446 UART:
2,741,589 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,872,327 UART: [art] Extend RT PCRs Done
2,872,755 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,874,363 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B94error_internal_intr_r=00000040
2,876,610 UART: WDT Expired
2,876,819 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 2958904 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,046,317 UART: [art] PopFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
3,048,623 UART: WDT Expired
3,048,832 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,871,018 UART: [art] FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B7Aerror_internal_intr_r=00000040
2,873,276 UART: WDT Expired
2,873,485 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 2962265 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
3,050,667 UART: [art] PoFMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
3,052,965 UART: WDT Expired
3,053,174 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
handle_trap: cause=0, mtval=0, next_pc=40000030
2,875,368 UART: [art]FMC NMI mcause=0x00000000 mscause=0x00000000 mepc=0x40002B9Aerror_internal_intr_r=00000040
2,877,618 UART: WDT Expired
2,877,827 UART: Fatal Error: 0x000F000D
test smoke_test::test_fmc_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.01s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_idevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.02s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
test smoke_test::test_golden_ldevid_pubkey_matches_generated ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.00s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,346 UART: [kat] HMAC-384Kdf
906,942 UART: [kat] LMS
1,475,138 UART: [kat] --
1,475,827 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,478,956 UART: [idev] ++
1,479,124 UART: [idev] CDI.KEYID = 6
1,479,484 UART: [idev] SUBJECT.KEYID = 7
1,479,908 UART: [idev] UDS.KEYID = 0
1,488,290 UART: [idev] Erasing UDS.KEYID = 0
1,504,472 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,308 UART: [idev] --
1,514,389 UART: [ldev] ++
1,514,557 UART: [ldev] CDI.KEYID = 6
1,514,920 UART: [ldev] SUBJECT.KEYID = 5
1,515,346 UART: [ldev] AUTHORITY.KEYID = 7
1,515,809 UART: [ldev] FE.KEYID = 1
1,520,793 UART: [ldev] Erasing FE.KEYID = 1
1,546,104 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,836 UART: [ldev] --
1,585,113 UART: [fwproc] Waiting for Commands...
1,585,972 UART: [fwproc] Received command 0x46574c44
1,586,763 UART: [fwproc] Received Image of size 118548 bytes
2,930,531 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,336 >>> mbox cmd response: success
3,130,556 UART: [afmc] ++
3,130,724 UART: [afmc] CDI.KEYID = 6
3,131,086 UART: [afmc] SUBJECT.KEYID = 7
3,131,511 UART: [afmc] AUTHORITY.KEYID = 5
3,165,920 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,468 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,248 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,957 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,523 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,597 UART: [afmc] --
3,209,605 UART: [cold-reset] --
3,210,299 UART: [state] Locking Datavault
3,211,252 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,856 UART: [state] Locking ICCM
3,212,412 UART: [exit] Launching FMC @ 0x40000130
3,217,742 UART:
3,217,758 UART: Running Caliptra FMC ...
3,218,166 UART:
3,218,220 UART: [state] CFI Enabled
3,228,588 UART: [fht] FMC Alias Private Key: 7
3,347,540 UART: [art] Extend RT PCRs Done
3,347,968 UART: [art] Lock RT PCRs Done
3,349,456 UART: [art] Populate DV Done
3,357,675 UART: [fht] FMC Alias Private Key: 7
3,358,699 UART: [art] Derive CDI
3,358,979 UART: [art] Store in slot 0x4
3,444,237 UART: [art] Derive Key Pair
3,444,597 UART: [art] Store priv key in slot 0x5
3,457,722 UART: [art] Derive Key Pair - Done
3,472,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,487,982 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,747 UART: [art] PUB.X = 2BD2519A858B723082CE3DA2DA0136F6AC9C7B7DA3A40677DD73C3DEB85E7A4F8F394A43C82873BB82DCD161B2A4875E
3,495,525 UART: [art] PUB.Y = 56330EF1EB18CBB30E2F6A95C8DA658685CCCEE97526E4C987590565257221EB23A8FD41665882AF891E1F6E6C1ACAFD
3,502,476 UART: [art] SIG.R = DE24FCFAF54C7016AFAD59FF7841A261C32BC16C5B95FD797FBE567A351444A375F394A8661C010277096AA967AD42FD
3,509,247 UART: [art] SIG.S = 03731833AB0BAB6B5DED3623C203ABB0ABCDF840538A508C81BCED997C60D0A5600342269EDCCA992909922329F197D3
3,533,558 UART: Caliptra RT
3,533,809 UART: [state] CFI Enabled
3,653,615 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,067 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = Yes
86,301 UART: [state] Starting the Watchdog Timer 3561426 cycles
87,897 UART: [kat] SHA2-256
881,828 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,943 UART: [kat] ++
886,095 UART: [kat] sha1
890,205 UART: [kat] SHA2-256
892,143 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,362 UART: [kat] HMAC-384Kdf
906,958 UART: [kat] LMS
1,475,154 UART: [kat] --
1,475,843 UART: [cold-reset] ++
1,476,320 UART: [fht] Storing FHT @ 0x50003400
1,478,971 UART: [idev] ++
1,479,139 UART: [idev] CDI.KEYID = 6
1,479,499 UART: [idev] SUBJECT.KEYID = 7
1,479,923 UART: [idev] UDS.KEYID = 0
1,480,268 ready_for_fw is high
1,480,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,302 UART: [idev] Erasing UDS.KEYID = 0
1,504,485 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,320 UART: [idev] --
1,514,399 UART: [ldev] ++
1,514,567 UART: [ldev] CDI.KEYID = 6
1,514,930 UART: [ldev] SUBJECT.KEYID = 5
1,515,356 UART: [ldev] AUTHORITY.KEYID = 7
1,515,819 UART: [ldev] FE.KEYID = 1
1,520,803 UART: [ldev] Erasing FE.KEYID = 1
1,546,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,077 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,570,949 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,576,655 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,583,803 UART: [ldev] --
1,585,078 UART: [fwproc] Waiting for Commands...
1,585,937 UART: [fwproc] Received command 0x46574c44
1,586,728 UART: [fwproc] Received Image of size 118548 bytes
2,930,494 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,723 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,941 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,295 >>> mbox cmd response: success
3,130,512 UART: [afmc] ++
3,130,680 UART: [afmc] CDI.KEYID = 6
3,131,042 UART: [afmc] SUBJECT.KEYID = 7
3,131,467 UART: [afmc] AUTHORITY.KEYID = 5
3,165,873 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,421 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,201 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,188,907 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,194,782 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,200,481 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,208,562 UART: [afmc] --
3,209,569 UART: [cold-reset] --
3,210,263 UART: [state] Locking Datavault
3,211,216 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,820 UART: [state] Locking ICCM
3,212,376 UART: [exit] Launching FMC @ 0x40000130
3,217,706 UART:
3,217,722 UART: Running Caliptra FMC ...
3,218,130 UART:
3,218,184 UART: [state] CFI Enabled
3,228,554 UART: [fht] FMC Alias Private Key: 7
3,347,574 UART: [art] Extend RT PCRs Done
3,348,002 UART: [art] Lock RT PCRs Done
3,349,490 UART: [art] Populate DV Done
3,357,710 UART: [fht] FMC Alias Private Key: 7
3,358,734 UART: [art] Derive CDI
3,359,014 UART: [art] Store in slot 0x4
3,444,270 UART: [art] Derive Key Pair
3,444,630 UART: [art] Store priv key in slot 0x5
3,457,755 UART: [art] Derive Key Pair - Done
3,472,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,017 UART: [art] Erasing AUTHORITY.KEYID = 7
3,488,782 UART: [art] PUB.X = 19620A19A2BDDA1E7DF42ACE65E111DEBFE703354AF2B779DB62F7BB2691A75538008CB87FEFB5F89DFDC984CAA128A6
3,495,546 UART: [art] PUB.Y = BE9E4FE7919D72A1DADBC6BE7252AD4D934DEB6C9F407EE725A7D61E6A4C5DF448473D76E5C55DDA9690BADD2228FF37
3,502,520 UART: [art] SIG.R = 07F3CC1D018F0CC83F93C25E4302CE121EB3A64732B7B85DBE43440CEE7AD0EAD0F24E8EE30639627DBA9ECBA41B91DA
3,509,294 UART: [art] SIG.S = 61EDCDFC01E0FD19259980AEE3C961C59676C9732E408F574B14B3D1F7BB2631BFE06FFECAAF313C8697920A2950AEE5
3,533,620 UART: Caliptra RT
3,533,871 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,649,146 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,651,590 UART: [rt] WDT Expired
3,651,877 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,972 >>> mbox cmd response: success
3,040,061 UART:
3,040,077 UART: Running Caliptra FMC ...
3,040,485 UART:
3,040,539 UART: [state] CFI Enabled
3,050,907 UART: [fht] FMC Alias Private Key: 7
3,169,859 UART: [art] Extend RT PCRs Done
3,170,287 UART: [art] Lock RT PCRs Done
3,171,775 UART: [art] Populate DV Done
3,179,994 UART: [fht] FMC Alias Private Key: 7
3,181,018 UART: [art] Derive CDI
3,181,298 UART: [art] Store in slot 0x4
3,266,556 UART: [art] Derive Key Pair
3,266,916 UART: [art] Store priv key in slot 0x5
3,280,041 UART: [art] Derive Key Pair - Done
3,294,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,062 UART: [art] PUB.X = 44FD5B44C5CF6B925FA7C0A9E13C2B873C8CF23AA3054D4C08E376493F11DA3952CDE8203E1C2FBEEE91D30EEE6610C8
3,317,841 UART: [art] PUB.Y = 8D680218BE7898D089C287B0C60334E8B85DA639028099F9699556826577902F77082E9C760433FA8A67CCA8A86F0A97
3,324,759 UART: [art] SIG.R = E46DF92DDE95625E88B15136B478859FC8DEC483616F28B9C3560FC7265B6C22B360E38DCF4623753F8C46BDE699EB85
3,331,530 UART: [art] SIG.S = 6123ED6D89ADE8E04F266C8285AF84F4EE9D52C63674E7F82D6E3B108172BE5F11BBCBA464B7AD6FF570A00547E7DFDF
3,355,865 UART: Caliptra RT
3,356,116 UART: [state] CFI Enabled
3,475,922 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 ready_for_fw is high
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,219 >>> mbox cmd response: success
3,040,298 UART:
3,040,314 UART: Running Caliptra FMC ...
3,040,722 UART:
3,040,776 UART: [state] CFI Enabled
3,051,146 UART: [fht] FMC Alias Private Key: 7
3,170,166 UART: [art] Extend RT PCRs Done
3,170,594 UART: [art] Lock RT PCRs Done
3,172,082 UART: [art] Populate DV Done
3,180,302 UART: [fht] FMC Alias Private Key: 7
3,181,326 UART: [art] Derive CDI
3,181,606 UART: [art] Store in slot 0x4
3,266,862 UART: [art] Derive Key Pair
3,267,222 UART: [art] Store priv key in slot 0x5
3,280,347 UART: [art] Derive Key Pair - Done
3,294,933 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,310,610 UART: [art] Erasing AUTHORITY.KEYID = 7
3,311,375 UART: [art] PUB.X = DA62BE4022753A2DADEDC0AB9B60EBD218550611A256D35E0A0FAC12E0DDBED234448B0067C4F0E5C93BF419A95DA5D3
3,318,134 UART: [art] PUB.Y = 8A170607599635CB8565B1A0B9A89988250B74A966EE150E534521771F3D298FE005574E846799ACB7C55C0B4B74E3C8
3,325,056 UART: [art] SIG.R = C96E85EA1B3FDAD51D8995ABC6391703B7F963415D452C39639ECD31B5AF93DAFCF988FDC9C6EEFD825F15DF52AADBF9
3,331,849 UART: [art] SIG.S = D3A84FC95C12D17B7EF99C636365348033830A2158000B6ED6B5163F4E054CE0B69A37EA5597F50DEC77077496B78658
3,356,124 UART: Caliptra RT
3,356,375 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,471,699 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,474,143 UART: [rt] WDT Expired
3,474,430 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,883 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = No
87,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,870 UART: [kat] SHA2-256
882,801 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,916 UART: [kat] ++
887,068 UART: [kat] sha1
891,254 UART: [kat] SHA2-256
893,192 UART: [kat] SHA2-384
895,897 UART: [kat] SHA2-512-ACC
897,798 UART: [kat] ECC-384
903,617 UART: [kat] HMAC-384Kdf
908,289 UART: [kat] LMS
1,476,485 UART: [kat] --
1,477,288 UART: [cold-reset] ++
1,477,716 UART: [fht] Storing FHT @ 0x50003400
1,480,407 UART: [idev] ++
1,480,575 UART: [idev] CDI.KEYID = 6
1,480,935 UART: [idev] SUBJECT.KEYID = 7
1,481,359 UART: [idev] UDS.KEYID = 0
1,489,289 UART: [idev] Erasing UDS.KEYID = 0
1,506,301 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,933 UART: [idev] --
1,515,996 UART: [ldev] ++
1,516,164 UART: [ldev] CDI.KEYID = 6
1,516,527 UART: [ldev] SUBJECT.KEYID = 5
1,516,953 UART: [ldev] AUTHORITY.KEYID = 7
1,517,416 UART: [ldev] FE.KEYID = 1
1,522,782 UART: [ldev] Erasing FE.KEYID = 1
1,547,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,248 UART: [fwproc] Waiting for Commands...
1,587,985 UART: [fwproc] Received command 0x46574c44
1,588,776 UART: [fwproc] Received Image of size 118548 bytes
2,931,884 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,828 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,046 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,495 >>> mbox cmd response: success
3,131,727 UART: [afmc] ++
3,131,895 UART: [afmc] CDI.KEYID = 6
3,132,257 UART: [afmc] SUBJECT.KEYID = 7
3,132,682 UART: [afmc] AUTHORITY.KEYID = 5
3,168,251 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,591 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,371 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,080 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,963 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,646 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,590 UART: [afmc] --
3,211,530 UART: [cold-reset] --
3,212,466 UART: [state] Locking Datavault
3,213,623 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,227 UART: [state] Locking ICCM
3,214,833 UART: [exit] Launching FMC @ 0x40000130
3,220,163 UART:
3,220,179 UART: Running Caliptra FMC ...
3,220,587 UART:
3,220,730 UART: [state] CFI Enabled
3,231,360 UART: [fht] FMC Alias Private Key: 7
3,350,136 UART: [art] Extend RT PCRs Done
3,350,564 UART: [art] Lock RT PCRs Done
3,351,866 UART: [art] Populate DV Done
3,360,105 UART: [fht] FMC Alias Private Key: 7
3,361,119 UART: [art] Derive CDI
3,361,399 UART: [art] Store in slot 0x4
3,447,233 UART: [art] Derive Key Pair
3,447,593 UART: [art] Store priv key in slot 0x5
3,460,832 UART: [art] Derive Key Pair - Done
3,475,626 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,287 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,052 UART: [art] PUB.X = 5A29D9D5802A1FEBAD9B13F31DBA058E76C65A74D45DDE624A4E20C68A554B4492477A72BA50D544725C02A7A92D59B1
3,498,824 UART: [art] PUB.Y = 8243F3E6EA364D27E870B71D7613A98DB1088C9F5C6F7F1E6524FB3DAD36719D35D85B13ADD30017950A03FEFC64ECFC
3,505,755 UART: [art] SIG.R = 7F17113372EDFC07D85F035B475B868A1E7177F816BF59CC74450AE9A2C6CD1C14022788EE6346367A15347307989223
3,512,500 UART: [art] SIG.S = 1A427C59BFB1E0F0F51E7D39665FFB64531EFCB1DFCA803D53C92355BC0521D3F30002FC5E50A0948B54977DCE97314B
3,536,108 UART: Caliptra RT
3,536,451 UART: [state] CFI Enabled
3,657,160 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,882 UART: [state] LifecycleState = Unprovisioned
86,538 UART: [state] DebugLocked = Yes
87,282 UART: [state] Starting the Watchdog Timer 3563982 cycles
88,886 UART: [kat] SHA2-256
882,817 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,932 UART: [kat] ++
887,084 UART: [kat] sha1
891,270 UART: [kat] SHA2-256
893,208 UART: [kat] SHA2-384
895,913 UART: [kat] SHA2-512-ACC
897,814 UART: [kat] ECC-384
903,633 UART: [kat] HMAC-384Kdf
908,305 UART: [kat] LMS
1,476,501 UART: [kat] --
1,477,304 UART: [cold-reset] ++
1,477,731 UART: [fht] Storing FHT @ 0x50003400
1,480,422 UART: [idev] ++
1,480,590 UART: [idev] CDI.KEYID = 6
1,480,950 UART: [idev] SUBJECT.KEYID = 7
1,481,374 UART: [idev] UDS.KEYID = 0
1,481,719 ready_for_fw is high
1,481,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,301 UART: [idev] Erasing UDS.KEYID = 0
1,506,314 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,945 UART: [idev] --
1,516,006 UART: [ldev] ++
1,516,174 UART: [ldev] CDI.KEYID = 6
1,516,537 UART: [ldev] SUBJECT.KEYID = 5
1,516,963 UART: [ldev] AUTHORITY.KEYID = 7
1,517,426 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,993 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,567,218 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,573,090 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,796 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,772 UART: [ldev] --
1,587,213 UART: [fwproc] Waiting for Commands...
1,587,950 UART: [fwproc] Received command 0x46574c44
1,588,741 UART: [fwproc] Received Image of size 118548 bytes
2,931,847 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,788 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,454 >>> mbox cmd response: success
3,131,683 UART: [afmc] ++
3,131,851 UART: [afmc] CDI.KEYID = 6
3,132,213 UART: [afmc] SUBJECT.KEYID = 7
3,132,638 UART: [afmc] AUTHORITY.KEYID = 5
3,168,204 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,544 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,324 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
3,191,030 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
3,196,905 UART: [afmc] SIG.R = B985A818B01EE8F47BA79F51942DA348C54B012D9E6DF387FA5DFE4C1E24F7E3070757D2883302F30F158E7278D4E49E
3,202,604 UART: [afmc] SIG.S = BFB2DFB3D68DCB91657A2C0D0D2F2EC2738FBE80B84A82904C5082E33FDCFDD9C59344114A06B4F2FB4E8885AAF71D87
3,210,555 UART: [afmc] --
3,211,494 UART: [cold-reset] --
3,212,430 UART: [state] Locking Datavault
3,213,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,191 UART: [state] Locking ICCM
3,214,797 UART: [exit] Launching FMC @ 0x40000130
3,220,127 UART:
3,220,143 UART: Running Caliptra FMC ...
3,220,551 UART:
3,220,694 UART: [state] CFI Enabled
3,231,326 UART: [fht] FMC Alias Private Key: 7
3,350,170 UART: [art] Extend RT PCRs Done
3,350,598 UART: [art] Lock RT PCRs Done
3,351,900 UART: [art] Populate DV Done
3,360,140 UART: [fht] FMC Alias Private Key: 7
3,361,154 UART: [art] Derive CDI
3,361,434 UART: [art] Store in slot 0x4
3,447,266 UART: [art] Derive Key Pair
3,447,626 UART: [art] Store priv key in slot 0x5
3,460,865 UART: [art] Derive Key Pair - Done
3,475,657 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,318 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,083 UART: [art] PUB.X = 158977A5E14EFEE8CACB5EDCB3691EF6E19D77D1425443F720AF014927781A816BCEDDB51062F05CFAB0117F79827E67
3,498,860 UART: [art] PUB.Y = E098328B04BD14A5AE14C04E1F72CEC414A7CDE286A1201D02708761B7F9F638E20079A392110DC231B90ED677EF6126
3,505,776 UART: [art] SIG.R = 8D9522A3026EA3B415012F0FF8C86CEF0DCF1DF01C4936623880312CA50E127A7497D6F45C83A3A9B93A2E8806917A6A
3,512,530 UART: [art] SIG.S = 4FF0652D92A4A2B2D30FA682634FC45F149570470A3D71CA47EB92962C4E8423536A1A4C50D184EC1B05F05FA56E829F
3,536,147 UART: Caliptra RT
3,536,490 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,652,683 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,655,127 UART: [rt] WDT Expired
3,655,414 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,131 >>> mbox cmd response: success
3,042,482 UART:
3,042,498 UART: Running Caliptra FMC ...
3,042,906 UART:
3,043,049 UART: [state] CFI Enabled
3,053,679 UART: [fht] FMC Alias Private Key: 7
3,172,455 UART: [art] Extend RT PCRs Done
3,172,883 UART: [art] Lock RT PCRs Done
3,174,185 UART: [art] Populate DV Done
3,182,424 UART: [fht] FMC Alias Private Key: 7
3,183,438 UART: [art] Derive CDI
3,183,718 UART: [art] Store in slot 0x4
3,269,552 UART: [art] Derive Key Pair
3,269,912 UART: [art] Store priv key in slot 0x5
3,283,151 UART: [art] Derive Key Pair - Done
3,297,943 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,604 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,369 UART: [art] PUB.X = 3712DE303635267EF5AE6EF52AF2C85DE60F09474E8E2EACF2A3ECDC6D280BFDC0E3F579C1452F47FAD4E9C824D4782E
3,321,150 UART: [art] PUB.Y = 68FB7CA5733A9337EB4C302D8042319CE81D45436F1893B001CF5F1783F8EC9F6F63B4BC450608AD97AF1B0C8B46C064
3,328,092 UART: [art] SIG.R = 289E0586A7EB2CC43A55FEBB3770F7D98A28C019A67E94273D0DF93CAC6536BCA55FC51376C6809DB36E5447CE91C428
3,334,864 UART: [art] SIG.S = 81C4E9C4096C6D4BEF345BAC584F029DB97D5E4D213524F6A7BD8F76534FF6C069204196936FDA178EE145E34A9327DB
3,358,490 UART: Caliptra RT
3,358,833 UART: [state] CFI Enabled
3,479,559 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,611 ready_for_fw is high
1,363,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,378 >>> mbox cmd response: success
3,042,719 UART:
3,042,735 UART: Running Caliptra FMC ...
3,043,143 UART:
3,043,286 UART: [state] CFI Enabled
3,053,918 UART: [fht] FMC Alias Private Key: 7
3,172,762 UART: [art] Extend RT PCRs Done
3,173,190 UART: [art] Lock RT PCRs Done
3,174,492 UART: [art] Populate DV Done
3,182,732 UART: [fht] FMC Alias Private Key: 7
3,183,746 UART: [art] Derive CDI
3,184,026 UART: [art] Store in slot 0x4
3,269,858 UART: [art] Derive Key Pair
3,270,218 UART: [art] Store priv key in slot 0x5
3,283,457 UART: [art] Derive Key Pair - Done
3,298,252 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,678 UART: [art] PUB.X = F23F97604C6D1813E6F54EC0EE7ECCC4C0F00C4001E37397CD4DC80C0F82D4C765109D83E3CB6DA118EF008421266B1D
3,321,424 UART: [art] PUB.Y = 7642839A44E5E34A55FC36EF293E51A20740F0AD1EEB8D209F61C2AA6D8F1A95604155DD216D0C4AB6F8C443D09A1CAF
3,328,380 UART: [art] SIG.R = 8E02D6C2059CA9879D840A5F831AE0041DCCCC4BD1C461E0889B55BB37E7320BCC6EFF7137DD4CCE368D3D5A071EA716
3,335,148 UART: [art] SIG.S = FA5D44EFDE5FE98A02A885CE349CE742D9AB61D132288EECAE43B4B9BD1790598904F96EB673EB0CF4F95511B66E628F
3,358,779 UART: Caliptra RT
3,359,122 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,475,328 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D2 ra=0x400078B0 error_internal_intr_r=00000040
3,477,772 UART: [rt] WDT Expired
3,478,059 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,482 UART: [kat] SHA2-256
891,032 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,136 UART: [kat] ++
895,288 UART: [kat] sha1
899,398 UART: [kat] SHA2-256
901,338 UART: [kat] SHA2-384
903,979 UART: [kat] SHA2-512-ACC
905,880 UART: [kat] ECC-384
915,571 UART: [kat] HMAC-384Kdf
920,055 UART: [kat] LMS
1,168,367 UART: [kat] --
1,169,228 UART: [cold-reset] ++
1,169,700 UART: [fht] FHT @ 0x50003400
1,172,448 UART: [idev] ++
1,172,616 UART: [idev] CDI.KEYID = 6
1,172,977 UART: [idev] SUBJECT.KEYID = 7
1,173,402 UART: [idev] UDS.KEYID = 0
1,181,725 UART: [idev] Erasing UDS.KEYID = 0
1,198,267 UART: [idev] Sha1 KeyId Algorithm
1,207,019 UART: [idev] --
1,208,246 UART: [ldev] ++
1,208,414 UART: [ldev] CDI.KEYID = 6
1,208,778 UART: [ldev] SUBJECT.KEYID = 5
1,209,205 UART: [ldev] AUTHORITY.KEYID = 7
1,209,668 UART: [ldev] FE.KEYID = 1
1,214,926 UART: [ldev] Erasing FE.KEYID = 1
1,240,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,832 UART: [ldev] --
1,280,115 UART: [fwproc] Wait for Commands...
1,280,802 UART: [fwproc] Recv command 0x46574c44
1,281,535 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,970 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,203 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,579 >>> mbox cmd response: success
2,824,741 UART: [afmc] ++
2,824,909 UART: [afmc] CDI.KEYID = 6
2,825,272 UART: [afmc] SUBJECT.KEYID = 7
2,825,698 UART: [afmc] AUTHORITY.KEYID = 5
2,861,091 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,152 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,877,901 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,883,611 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,889,492 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,902,888 UART: [afmc] --
2,903,893 UART: [cold-reset] --
2,904,813 UART: [state] Locking Datavault
2,906,004 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,608 UART: [state] Locking ICCM
2,907,028 UART: [exit] Launching FMC @ 0x40000130
2,912,358 UART:
2,912,374 UART: Running Caliptra FMC ...
2,912,782 UART:
2,912,836 UART: [state] CFI Enabled
2,923,424 UART: [fht] FMC Alias Private Key: 7
3,041,792 UART: [art] Extend RT PCRs Done
3,042,220 UART: [art] Lock RT PCRs Done
3,043,952 UART: [art] Populate DV Done
3,052,231 UART: [fht] FMC Alias Private Key: 7
3,053,223 UART: [art] Derive CDI
3,053,503 UART: [art] Store in slot 0x4
3,138,706 UART: [art] Derive Key Pair
3,139,066 UART: [art] Store priv key in slot 0x5
3,152,776 UART: [art] Derive Key Pair - Done
3,167,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,984 UART: [art] PUB.X = 705B0AAC7C57D9D9AF2BB00CE06865579B8582EF16D746286AE6BE39F664EA7DBCF76FEFF48D1D1F390C0587B401487C
3,190,753 UART: [art] PUB.Y = 4CC6911FB8879C0522F5E28DF893C9F0631CD34D6CF191CA45F0AABB64555D2A2646138532E465F18ADF86713D671CB9
3,197,704 UART: [art] SIG.R = D74DFED1BBC0EDE2C64292CAA09732FCCBF4F3446A9C025352F6CE401CA812ACE25EE9C5A56A1226F355F0A373AD235D
3,204,493 UART: [art] SIG.S = 00FE4D1732F69CDC5D82176CD042C7B92CD6708CE53281D8808C9605334B349DF6D79A06E50B5C4DDF1043F8A7C56E1D
3,228,038 UART: Caliptra RT
3,228,289 UART: [state] CFI Enabled
3,347,933 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,035 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = Yes
86,269 UART: [state] Starting the WD Timer 3256143 cycles
87,770 UART: [kat] SHA2-256
891,320 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,424 UART: [kat] ++
895,576 UART: [kat] sha1
899,686 UART: [kat] SHA2-256
901,626 UART: [kat] SHA2-384
904,267 UART: [kat] SHA2-512-ACC
906,168 UART: [kat] ECC-384
915,859 UART: [kat] HMAC-384Kdf
920,343 UART: [kat] LMS
1,168,655 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,987 UART: [fht] FHT @ 0x50003400
1,172,735 UART: [idev] ++
1,172,903 UART: [idev] CDI.KEYID = 6
1,173,264 UART: [idev] SUBJECT.KEYID = 7
1,173,689 UART: [idev] UDS.KEYID = 0
1,174,035 ready_for_fw is high
1,174,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,198,552 UART: [idev] Sha1 KeyId Algorithm
1,207,303 UART: [idev] --
1,208,528 UART: [ldev] ++
1,208,696 UART: [ldev] CDI.KEYID = 6
1,209,060 UART: [ldev] SUBJECT.KEYID = 5
1,209,487 UART: [ldev] AUTHORITY.KEYID = 7
1,209,950 UART: [ldev] FE.KEYID = 1
1,215,208 UART: [ldev] Erasing FE.KEYID = 1
1,241,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,737 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,260,431 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,266,301 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,007 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,071 UART: [ldev] --
1,280,352 UART: [fwproc] Wait for Commands...
1,281,039 UART: [fwproc] Recv command 0x46574c44
1,281,772 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,435 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,610 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,810 >>> mbox cmd response: success
2,824,969 UART: [afmc] ++
2,825,137 UART: [afmc] CDI.KEYID = 6
2,825,500 UART: [afmc] SUBJECT.KEYID = 7
2,825,926 UART: [afmc] AUTHORITY.KEYID = 5
2,861,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,377 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,126 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,883,833 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,889,706 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,895,415 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,903,105 UART: [afmc] --
2,904,109 UART: [cold-reset] --
2,905,029 UART: [state] Locking Datavault
2,906,220 UART: [state] Locking PCR0, PCR1 and PCR31
2,906,824 UART: [state] Locking ICCM
2,907,244 UART: [exit] Launching FMC @ 0x40000130
2,912,574 UART:
2,912,590 UART: Running Caliptra FMC ...
2,912,998 UART:
2,913,052 UART: [state] CFI Enabled
2,923,642 UART: [fht] FMC Alias Private Key: 7
3,042,078 UART: [art] Extend RT PCRs Done
3,042,506 UART: [art] Lock RT PCRs Done
3,044,238 UART: [art] Populate DV Done
3,052,518 UART: [fht] FMC Alias Private Key: 7
3,053,510 UART: [art] Derive CDI
3,053,790 UART: [art] Store in slot 0x4
3,138,991 UART: [art] Derive Key Pair
3,139,351 UART: [art] Store priv key in slot 0x5
3,153,061 UART: [art] Derive Key Pair - Done
3,168,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,183,504 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,269 UART: [art] PUB.X = D83996D5258188F8735D515CC2C60E4A694FC7BE6EFC30BCEE1CB8EC147FB2797C8DFA9F87985F8621E508CD1DAC8968
3,191,047 UART: [art] PUB.Y = 2DA4A39B2862C2246BECAA10751A752DD672C481EDDA6B7CAA7434A1DACD32C9E825098E41E6603C92C91FAB7504E01D
3,198,005 UART: [art] SIG.R = 35055CF8440FECB34BEDE5CFCD6FA8A69E4BC279EF85BE1BDEB01836D8FF86789A0AB16237D892CC2AB66A4A7D3041DA
3,204,792 UART: [art] SIG.S = BE84D8EB04E635EBD650E36D517B56F2FC8AE5B39E5BEC1304119226BF484EB219593174377E66D2A35B3DCE21323A96
3,228,360 UART: Caliptra RT
3,228,611 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,343,735 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D6 ra=0x400078B0 error_internal_intr_r=00000040
3,346,179 UART: [rt] WDT Expired
3,346,466 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,638 >>> mbox cmd response: success
2,738,111 UART:
2,738,127 UART: Running Caliptra FMC ...
2,738,535 UART:
2,738,589 UART: [state] CFI Enabled
2,749,177 UART: [fht] FMC Alias Private Key: 7
2,867,545 UART: [art] Extend RT PCRs Done
2,867,973 UART: [art] Lock RT PCRs Done
2,869,705 UART: [art] Populate DV Done
2,877,984 UART: [fht] FMC Alias Private Key: 7
2,878,976 UART: [art] Derive CDI
2,879,256 UART: [art] Store in slot 0x4
2,964,459 UART: [art] Derive Key Pair
2,964,819 UART: [art] Store priv key in slot 0x5
2,978,529 UART: [art] Derive Key Pair - Done
2,993,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,976 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,741 UART: [art] PUB.X = CD4D1A378925884109C4C4C086EBCFA5A90D9682B5900D5FD0DFA97142733FD655E5111F115FE1959B97D0D08C6A136F
3,016,506 UART: [art] PUB.Y = 91D58C645CB07303C05769043AB67FBE3916C13A03131A589AE61853300F40F6711241DF508307B2A9B6696C59515469
3,023,425 UART: [art] SIG.R = 2EFF16E003EE0EE877A9C588F238FBA90C1345FB15A87B96896EE6577B6759B804FDD0D4D4377235800244C7BBCA1818
3,030,184 UART: [art] SIG.S = 5620888B53FB355DA6BD5649F947849427D20FFF63CA7EA255EA8AABC86E62474006FA3D98A3E05E0C26CF16B116EE25
3,053,753 UART: Caliptra RT
3,054,004 UART: [state] CFI Enabled
3,173,690 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 ready_for_fw is high
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,885 >>> mbox cmd response: success
2,738,349 UART:
2,738,365 UART: Running Caliptra FMC ...
2,738,773 UART:
2,738,827 UART: [state] CFI Enabled
2,749,417 UART: [fht] FMC Alias Private Key: 7
2,867,853 UART: [art] Extend RT PCRs Done
2,868,281 UART: [art] Lock RT PCRs Done
2,870,013 UART: [art] Populate DV Done
2,878,293 UART: [fht] FMC Alias Private Key: 7
2,879,285 UART: [art] Derive CDI
2,879,565 UART: [art] Store in slot 0x4
2,964,766 UART: [art] Derive Key Pair
2,965,126 UART: [art] Store priv key in slot 0x5
2,978,836 UART: [art] Derive Key Pair - Done
2,993,826 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,285 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,050 UART: [art] PUB.X = 0A02D984F0C7C398EEE6B6360BDCA57924C6A5B982042D6659C5E09F577782FEB43E5E21D057BC132F8FD88104CFED62
3,016,813 UART: [art] PUB.Y = 5593DD0081963528122D9B9AFB6C826690297D66239BAA5E9350FC8859248D2D3D4F0884C79E6268EF95AFCEFAB63136
3,023,736 UART: [art] SIG.R = E0E277193A7FFBDF84BCC36CBC0400D8A8AF34871354E8375AF5420D5DA189C9D1ACDC5B02C39A15F09DF016715808A1
3,030,484 UART: [art] SIG.S = B8FEBCED1853940D1A866A698F6D2ADDAC5632E9FCC5DC7311DAA05F817A1A43ABED5A9481850AED6E9F5EDA6E70E8FD
3,054,076 UART: Caliptra RT
3,054,327 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,169,466 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,171,910 UART: [rt] WDT Expired
3,172,197 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,851 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = No
87,224 UART: [state] WD Timer not started. Device not locked for debugging
88,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,471 UART: [kat] SHA2-256
892,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,125 UART: [kat] ++
896,277 UART: [kat] sha1
900,463 UART: [kat] SHA2-256
902,403 UART: [kat] SHA2-384
905,108 UART: [kat] SHA2-512-ACC
907,009 UART: [kat] ECC-384
916,916 UART: [kat] HMAC-384Kdf
921,566 UART: [kat] LMS
1,169,878 UART: [kat] --
1,170,715 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,977 UART: [idev] ++
1,174,145 UART: [idev] CDI.KEYID = 6
1,174,506 UART: [idev] SUBJECT.KEYID = 7
1,174,931 UART: [idev] UDS.KEYID = 0
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,200,128 UART: [idev] Sha1 KeyId Algorithm
1,209,062 UART: [idev] --
1,210,169 UART: [ldev] ++
1,210,337 UART: [ldev] CDI.KEYID = 6
1,210,701 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,853 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,156 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,757 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,781 UART: [ldev] --
1,282,184 UART: [fwproc] Wait for Commands...
1,282,767 UART: [fwproc] Recv command 0x46574c44
1,283,500 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,719 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,960 >>> mbox cmd response: success
2,825,982 UART: [afmc] ++
2,826,150 UART: [afmc] CDI.KEYID = 6
2,826,513 UART: [afmc] SUBJECT.KEYID = 7
2,826,939 UART: [afmc] AUTHORITY.KEYID = 5
2,863,084 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,573 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,322 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,032 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,614 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,425 UART: [afmc] --
2,906,236 UART: [cold-reset] --
2,907,280 UART: [state] Locking Datavault
2,908,623 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,227 UART: [state] Locking ICCM
2,909,701 UART: [exit] Launching FMC @ 0x40000130
2,915,031 UART:
2,915,047 UART: Running Caliptra FMC ...
2,915,455 UART:
2,915,598 UART: [state] CFI Enabled
2,926,530 UART: [fht] FMC Alias Private Key: 7
3,046,266 UART: [art] Extend RT PCRs Done
3,046,694 UART: [art] Lock RT PCRs Done
3,048,302 UART: [art] Populate DV Done
3,056,377 UART: [fht] FMC Alias Private Key: 7
3,057,317 UART: [art] Derive CDI
3,057,597 UART: [art] Store in slot 0x4
3,143,310 UART: [art] Derive Key Pair
3,143,670 UART: [art] Store priv key in slot 0x5
3,157,060 UART: [art] Derive Key Pair - Done
3,171,923 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,396 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,161 UART: [art] PUB.X = 7C9F13395E6ED840D5CED1FF256686616014591035AEC07F9B59F7D18C2CF4DF3CA5166373BDD9DE8FB04C9149DE6355
3,194,939 UART: [art] PUB.Y = 1AA492F5F661921EE816B0CBF18C6C6D7E6785C6D28173A5E08BE380592F393DDFB20AC55C44853462861ACC2B3E7E55
3,201,892 UART: [art] SIG.R = CF8298F29DBF5640937767ECC13A17ABD0FF00579E40CFE51486762018FF024EFC8579480F408BFAFA1C82A1F58592B1
3,208,640 UART: [art] SIG.S = A00B5FF6AA65A42A02ADAFCB17B25B89934D6BCA457332E054A3EEE1A1E5094E5856E6ECE4FEF7BEC28BB375699C50F6
3,232,951 UART: Caliptra RT
3,233,294 UART: [state] CFI Enabled
3,353,134 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,850 UART: [state] LifecycleState = Unprovisioned
86,506 UART: [state] DebugLocked = Yes
87,250 UART: [state] Starting the WD Timer 3260355 cycles
88,759 UART: [kat] SHA2-256
892,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,413 UART: [kat] ++
896,565 UART: [kat] sha1
900,751 UART: [kat] SHA2-256
902,691 UART: [kat] SHA2-384
905,396 UART: [kat] SHA2-512-ACC
907,297 UART: [kat] ECC-384
917,204 UART: [kat] HMAC-384Kdf
921,854 UART: [kat] LMS
1,170,166 UART: [kat] --
1,171,003 UART: [cold-reset] ++
1,171,422 UART: [fht] FHT @ 0x50003400
1,174,264 UART: [idev] ++
1,174,432 UART: [idev] CDI.KEYID = 6
1,174,793 UART: [idev] SUBJECT.KEYID = 7
1,175,218 UART: [idev] UDS.KEYID = 0
1,175,564 ready_for_fw is high
1,175,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,413 UART: [idev] Sha1 KeyId Algorithm
1,209,346 UART: [idev] --
1,210,451 UART: [ldev] ++
1,210,619 UART: [ldev] CDI.KEYID = 6
1,210,983 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,135 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,722 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,416 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,286 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,992 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,020 UART: [ldev] --
1,282,421 UART: [fwproc] Wait for Commands...
1,283,004 UART: [fwproc] Recv command 0x46574c44
1,283,737 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,776 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,951 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,191 >>> mbox cmd response: success
2,826,210 UART: [afmc] ++
2,826,378 UART: [afmc] CDI.KEYID = 6
2,826,741 UART: [afmc] SUBJECT.KEYID = 7
2,827,167 UART: [afmc] AUTHORITY.KEYID = 5
2,863,309 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,798 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,547 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,886,254 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,892,127 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,836 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,642 UART: [afmc] --
2,906,452 UART: [cold-reset] --
2,907,496 UART: [state] Locking Datavault
2,908,839 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,443 UART: [state] Locking ICCM
2,909,917 UART: [exit] Launching FMC @ 0x40000130
2,915,247 UART:
2,915,263 UART: Running Caliptra FMC ...
2,915,671 UART:
2,915,814 UART: [state] CFI Enabled
2,926,748 UART: [fht] FMC Alias Private Key: 7
3,046,552 UART: [art] Extend RT PCRs Done
3,046,980 UART: [art] Lock RT PCRs Done
3,048,588 UART: [art] Populate DV Done
3,056,664 UART: [fht] FMC Alias Private Key: 7
3,057,604 UART: [art] Derive CDI
3,057,884 UART: [art] Store in slot 0x4
3,143,595 UART: [art] Derive Key Pair
3,143,955 UART: [art] Store priv key in slot 0x5
3,157,345 UART: [art] Derive Key Pair - Done
3,172,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,691 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,456 UART: [art] PUB.X = D22F73055CEAD8B365F81CC551664482006F95B69C051799E834ED7D9D0F1328D1D3A21CD052D40A17117C9F5F5AC9AA
3,195,196 UART: [art] PUB.Y = 286ED828E1AC909D52A66D0C6FC23C047A1F9CA1FD3F9AFD950672DA02F2E8E0F18245D48E1647AA42B8D8CBF253BDEB
3,202,154 UART: [art] SIG.R = 5378D403043C0EA205072E0CFED22DE61BFF23F25D15FBDB6DB87B41611ED746827342EF16162F95A3F14E5C3327D13D
3,208,912 UART: [art] SIG.S = 9BF6D94691EA862C67B4A7A33079E9E6E61A114178435667E8F10F6CB12A68A0B7912A18B62B118C3B9503284B7EA021
3,233,198 UART: Caliptra RT
3,233,541 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,348,928 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,351,374 UART: [rt] WDT Expired
3,351,661 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,019 >>> mbox cmd response: success
2,740,784 UART:
2,740,800 UART: Running Caliptra FMC ...
2,741,208 UART:
2,741,351 UART: [state] CFI Enabled
2,752,283 UART: [fht] FMC Alias Private Key: 7
2,872,019 UART: [art] Extend RT PCRs Done
2,872,447 UART: [art] Lock RT PCRs Done
2,874,055 UART: [art] Populate DV Done
2,882,130 UART: [fht] FMC Alias Private Key: 7
2,883,070 UART: [art] Derive CDI
2,883,350 UART: [art] Store in slot 0x4
2,969,063 UART: [art] Derive Key Pair
2,969,423 UART: [art] Store priv key in slot 0x5
2,982,813 UART: [art] Derive Key Pair - Done
2,997,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,158 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,923 UART: [art] PUB.X = F4E637FFDE93C9DD737340D73E351129003B2C7B0255FACC597FE399FBD9E6FF3E09AFD6A7D0FF1ACB66BDE210A581C3
3,020,687 UART: [art] PUB.Y = C324383BA702971D370EA87C06E424D7626FE56739DDE6DDBEAC374DA3B5E70A1C3CBF63544B7ED51E58B4AB091F7B20
3,027,636 UART: [art] SIG.R = E99B55DF9177AFD3C5AC26DA9A2DA014A6561B66C453D858E7281E8331D6250F3027887F627C234ECCEE4F5D327AD9B3
3,034,411 UART: [art] SIG.S = 7E4853D0C44C2E68AA134495A216BE16ED34AACAFD094BCE5DC01716F1CC2633F1F1FBB2E1C5BD6A8BCCFF9525A487BD
3,058,732 UART: Caliptra RT
3,059,075 UART: [state] CFI Enabled
3,178,898 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,524 ready_for_fw is high
1,060,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,266 >>> mbox cmd response: success
2,741,022 UART:
2,741,038 UART: Running Caliptra FMC ...
2,741,446 UART:
2,741,589 UART: [state] CFI Enabled
2,752,523 UART: [fht] FMC Alias Private Key: 7
2,872,327 UART: [art] Extend RT PCRs Done
2,872,755 UART: [art] Lock RT PCRs Done
2,874,363 UART: [art] Populate DV Done
2,882,439 UART: [fht] FMC Alias Private Key: 7
2,883,379 UART: [art] Derive CDI
2,883,659 UART: [art] Store in slot 0x4
2,969,370 UART: [art] Derive Key Pair
2,969,730 UART: [art] Store priv key in slot 0x5
2,983,120 UART: [art] Derive Key Pair - Done
2,997,997 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,470 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,235 UART: [art] PUB.X = D86A25EEE1E266E0CB9EFCBCB13289EA0D2F148E5B5B4F033CDE03D1C0AEE35D337D5D0AF23E90437B1D46AF32C7263E
3,021,017 UART: [art] PUB.Y = 85ED078CAF1F1D7175B239670E5AF040306CE3C1D605417181B7029CCD6543371ECAD68D003E7C17A34995C5D7B2B6B6
3,027,935 UART: [art] SIG.R = E0634D4641EB15BC8D2042F84FFBE05BBA2A23E1E84B5B9D001B6D7FF55E1730FC9309D3AE08C7F3D9888FD4BE7E838C
3,034,695 UART: [art] SIG.S = D24E19CEDCBE1A69C788BE785CFAB4A22D9C277C4BC563908FF43F343F23D763239C72DA14DCE880C3DF9D42ED75E5C6
3,059,011 UART: Caliptra RT
3,059,354 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,174,666 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D0 ra=0x400078B0 error_internal_intr_r=00000040
3,177,110 UART: [rt] WDT Expired
3,177,397 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,273 UART: [state] WD Timer not started. Device not locked for debugging
87,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,512 UART: [kat] SHA2-256
893,162 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,287 UART: [kat] ++
897,439 UART: [kat] sha1
901,549 UART: [kat] SHA2-256
903,489 UART: [kat] SHA2-384
906,130 UART: [kat] SHA2-512-ACC
908,031 UART: [kat] ECC-384
917,722 UART: [kat] HMAC-384Kdf
922,206 UART: [kat] LMS
1,170,534 UART: [kat] --
1,171,389 UART: [cold-reset] ++
1,171,861 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,183,872 UART: [idev] Erasing UDS.KEYID = 0
1,200,419 UART: [idev] Sha1 KeyId Algorithm
1,208,765 UART: [idev] --
1,209,999 UART: [ldev] ++
1,210,167 UART: [ldev] CDI.KEYID = 6
1,210,530 UART: [ldev] SUBJECT.KEYID = 5
1,210,956 UART: [ldev] AUTHORITY.KEYID = 7
1,211,419 UART: [ldev] FE.KEYID = 1
1,216,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,490 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,569 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,600 UART: [fwproc] Recv command 0x46574c44
1,283,328 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,949 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,370 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,565 >>> mbox cmd response: success
2,826,721 UART: [afmc] ++
2,826,889 UART: [afmc] CDI.KEYID = 6
2,827,251 UART: [afmc] SUBJECT.KEYID = 7
2,827,676 UART: [afmc] AUTHORITY.KEYID = 5
2,863,043 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,106 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,854 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,563 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,147 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,901 UART: [afmc] --
2,905,973 UART: [cold-reset] --
2,906,893 UART: [state] Locking Datavault
2,908,084 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,688 UART: [state] Locking ICCM
2,909,108 UART: [exit] Launching FMC @ 0x40000130
2,914,438 UART:
2,914,454 UART: Running Caliptra FMC ...
2,914,862 UART:
2,914,916 UART: [state] CFI Enabled
2,925,504 UART: [fht] FMC Alias Private Key: 7
3,043,872 UART: [art] Extend RT PCRs Done
3,044,300 UART: [art] Lock RT PCRs Done
3,046,032 UART: [art] Populate DV Done
3,054,311 UART: [fht] FMC Alias Private Key: 7
3,055,303 UART: [art] Derive CDI
3,055,583 UART: [art] Store in slot 0x4
3,140,786 UART: [art] Derive Key Pair
3,141,146 UART: [art] Store priv key in slot 0x5
3,154,856 UART: [art] Derive Key Pair - Done
3,169,844 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,303 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,068 UART: [art] PUB.X = 1600731493480FE8DC24121E563B97D4D3B8E9BC50840F6DE77EDD2AA40E9701B1A789BADB78BEB67DFD908A96461148
3,192,810 UART: [art] PUB.Y = 30190F4BF2036ABD173358B39BC7DE2BA56D7F5959215786BCB7A5B8FF4B95289B64649394720659C6B48D6001152F23
3,199,742 UART: [art] SIG.R = 51814992CEF4B1A3347B211DA621CF061F080C1DBBCFDA68AB24B585630122825E41C9323873862A952582E9653238C2
3,206,492 UART: [art] SIG.S = B0D97063C2F8BA22D561158B6B4AFFC5A800707DA118C5909F890C72865DD21BE9D982538910DA081730D80EA21C0FBF
3,230,032 UART: Caliptra RT
3,230,283 UART: [state] CFI Enabled
3,349,986 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,065 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = Yes
86,299 UART: [state] Starting the WD Timer 3258166 cycles
87,800 UART: [kat] SHA2-256
893,450 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,575 UART: [kat] ++
897,727 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,418 UART: [kat] SHA2-512-ACC
908,319 UART: [kat] ECC-384
918,010 UART: [kat] HMAC-384Kdf
922,494 UART: [kat] LMS
1,170,822 UART: [kat] --
1,171,677 UART: [cold-reset] ++
1,172,148 UART: [fht] FHT @ 0x50003400
1,174,891 UART: [idev] ++
1,175,059 UART: [idev] CDI.KEYID = 6
1,175,419 UART: [idev] SUBJECT.KEYID = 7
1,175,843 UART: [idev] UDS.KEYID = 0
1,176,188 ready_for_fw is high
1,176,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,704 UART: [idev] Sha1 KeyId Algorithm
1,209,049 UART: [idev] --
1,210,281 UART: [ldev] ++
1,210,449 UART: [ldev] CDI.KEYID = 6
1,210,812 UART: [ldev] SUBJECT.KEYID = 5
1,211,238 UART: [ldev] AUTHORITY.KEYID = 7
1,211,701 UART: [ldev] FE.KEYID = 1
1,216,945 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,475 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,262,169 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,268,041 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,747 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,808 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,837 UART: [fwproc] Recv command 0x46574c44
1,283,565 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,796 >>> mbox cmd response: success
2,826,949 UART: [afmc] ++
2,827,117 UART: [afmc] CDI.KEYID = 6
2,827,479 UART: [afmc] SUBJECT.KEYID = 7
2,827,904 UART: [afmc] AUTHORITY.KEYID = 5
2,863,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,331 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,079 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,885,785 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,891,660 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,897,369 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,905,117 UART: [afmc] --
2,906,188 UART: [cold-reset] --
2,907,108 UART: [state] Locking Datavault
2,908,299 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,903 UART: [state] Locking ICCM
2,909,323 UART: [exit] Launching FMC @ 0x40000130
2,914,653 UART:
2,914,669 UART: Running Caliptra FMC ...
2,915,077 UART:
2,915,131 UART: [state] CFI Enabled
2,925,721 UART: [fht] FMC Alias Private Key: 7
3,044,157 UART: [art] Extend RT PCRs Done
3,044,585 UART: [art] Lock RT PCRs Done
3,046,317 UART: [art] Populate DV Done
3,054,597 UART: [fht] FMC Alias Private Key: 7
3,055,589 UART: [art] Derive CDI
3,055,869 UART: [art] Store in slot 0x4
3,141,070 UART: [art] Derive Key Pair
3,141,430 UART: [art] Store priv key in slot 0x5
3,155,140 UART: [art] Derive Key Pair - Done
3,170,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,585 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,350 UART: [art] PUB.X = FA91D4025F24506D4300358D533B4DC2DAC9E8187F2F6451AADE85188CF7FB9379780B7D33F6D0A65F4D4BB909938ABF
3,193,097 UART: [art] PUB.Y = 2972DCA2256886713F8B5890C829FCDBB9B61E280B817E941F35F1AC944E60EC1BE39B95EC54E139D7CC16B97F949E23
3,200,050 UART: [art] SIG.R = 02B8D70C6B7396F6F4FA1000582A331532DA03F48D2124F999CBEF2EA8C7EEB0AB69152F171360083965B4B8E16987A0
3,206,786 UART: [art] SIG.S = 821097BE9F4B71E3C8192E23CCF2A89872E52EC4384FD7D09C25E176AAA8C5C464D19A382559006A8269ACF7E6E337F2
3,230,336 UART: Caliptra RT
3,230,587 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,345,788 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,348,234 UART: [rt] WDT Expired
3,348,521 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
84,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,546 >>> mbox cmd response: success
2,739,117 UART:
2,739,133 UART: Running Caliptra FMC ...
2,739,541 UART:
2,739,595 UART: [state] CFI Enabled
2,750,183 UART: [fht] FMC Alias Private Key: 7
2,868,551 UART: [art] Extend RT PCRs Done
2,868,979 UART: [art] Lock RT PCRs Done
2,870,711 UART: [art] Populate DV Done
2,878,990 UART: [fht] FMC Alias Private Key: 7
2,879,982 UART: [art] Derive CDI
2,880,262 UART: [art] Store in slot 0x4
2,965,465 UART: [art] Derive Key Pair
2,965,825 UART: [art] Store priv key in slot 0x5
2,979,535 UART: [art] Derive Key Pair - Done
2,994,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,980 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,745 UART: [art] PUB.X = 9606F5C501B1866FEBC99FE814457197D2AE2F562C9C789404A5AD43ECCB3501227D4693A2654516CF642A5D3A409A86
3,017,501 UART: [art] PUB.Y = 62F887153FBEF1E0BE8C942C924EE4EA8AF99158B2CFDB90E09F748A70080CA9A6E176040F4A679AFC43778869438EBC
3,024,449 UART: [art] SIG.R = C6020580ECAE6E42865E12F99FBB3599C7734033474E6177DF3A5758498E63268C2678F517238160F4A585CF77F3FBC4
3,031,205 UART: [art] SIG.S = 7C40359FE6ABCCAA21D02CFF6BDF7996CD9516919CEF35A629B0C90775236D21A7D28CF84F411C8BDC6C25BBADD590F3
3,054,792 UART: Caliptra RT
3,055,043 UART: [state] CFI Enabled
3,174,678 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,088 ready_for_fw is high
1,060,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,793 >>> mbox cmd response: success
2,739,354 UART:
2,739,370 UART: Running Caliptra FMC ...
2,739,778 UART:
2,739,832 UART: [state] CFI Enabled
2,750,422 UART: [fht] FMC Alias Private Key: 7
2,868,858 UART: [art] Extend RT PCRs Done
2,869,286 UART: [art] Lock RT PCRs Done
2,871,018 UART: [art] Populate DV Done
2,879,298 UART: [fht] FMC Alias Private Key: 7
2,880,290 UART: [art] Derive CDI
2,880,570 UART: [art] Store in slot 0x4
2,965,771 UART: [art] Derive Key Pair
2,966,131 UART: [art] Store priv key in slot 0x5
2,979,841 UART: [art] Derive Key Pair - Done
2,994,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,057 UART: [art] PUB.X = DFF751922B80CBAC17996736007F0B73C220699748DDC119A5D0B99C5CBC97226725EEFD851538C82879B44440FA2377
3,017,798 UART: [art] PUB.Y = 0427F7A69A0A44E3617C14F88BA0936D9F5E9165EBA834D797825FEE7AB6FA799ADB278C1E99ECB69D74C06C96AEC891
3,024,754 UART: [art] SIG.R = 9A685C0AE23704DE8FFEB7B66E97201AA883ECC9E6153A458B339FE0391780EA96AF5C479E50EA1EA99735302CB36439
3,031,524 UART: [art] SIG.S = 84ADBD0D82B543EFDE9982681D32DE9C59D40ADC478BE4DEAEE80DE62A114BC543E179133A1940C7FBAEBDCBAEA2880D
3,055,108 UART: Caliptra RT
3,055,359 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,170,454 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,172,900 UART: [rt] WDT Expired
3,173,187 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,881 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = No
87,254 UART: [state] WD Timer not started. Device not locked for debugging
88,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,501 UART: [kat] SHA2-256
894,151 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,276 UART: [kat] ++
898,428 UART: [kat] sha1
902,614 UART: [kat] SHA2-256
904,554 UART: [kat] SHA2-384
907,259 UART: [kat] SHA2-512-ACC
909,160 UART: [kat] ECC-384
919,067 UART: [kat] HMAC-384Kdf
923,717 UART: [kat] LMS
1,172,045 UART: [kat] --
1,172,876 UART: [cold-reset] ++
1,173,296 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,184,795 UART: [idev] Erasing UDS.KEYID = 0
1,202,280 UART: [idev] Sha1 KeyId Algorithm
1,210,808 UART: [idev] --
1,211,922 UART: [ldev] ++
1,212,090 UART: [ldev] CDI.KEYID = 6
1,212,453 UART: [ldev] SUBJECT.KEYID = 5
1,212,879 UART: [ldev] AUTHORITY.KEYID = 7
1,213,342 UART: [ldev] FE.KEYID = 1
1,218,590 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,518 UART: [ldev] --
1,283,981 UART: [fwproc] Wait for Commands...
1,284,565 UART: [fwproc] Recv command 0x46574c44
1,285,293 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,308 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,541 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,711 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,946 >>> mbox cmd response: success
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,865,036 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,527 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,984 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,867 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,568 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,438 UART: [afmc] --
2,908,316 UART: [cold-reset] --
2,909,360 UART: [state] Locking Datavault
2,910,703 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,307 UART: [state] Locking ICCM
2,911,781 UART: [exit] Launching FMC @ 0x40000130
2,917,111 UART:
2,917,127 UART: Running Caliptra FMC ...
2,917,535 UART:
2,917,678 UART: [state] CFI Enabled
2,928,610 UART: [fht] FMC Alias Private Key: 7
3,048,346 UART: [art] Extend RT PCRs Done
3,048,774 UART: [art] Lock RT PCRs Done
3,050,382 UART: [art] Populate DV Done
3,058,457 UART: [fht] FMC Alias Private Key: 7
3,059,397 UART: [art] Derive CDI
3,059,677 UART: [art] Store in slot 0x4
3,145,390 UART: [art] Derive Key Pair
3,145,750 UART: [art] Store priv key in slot 0x5
3,159,140 UART: [art] Derive Key Pair - Done
3,174,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,253 UART: [art] PUB.X = 159C5274F32436F3AAF3A9C6A1D38917F6EAE2826623624F5556BED3FA1FE9429659B83AFFC2EF249A7D6F641E9ADFEF
3,197,037 UART: [art] PUB.Y = 1817AF1587D57E00426D90424D2BB3FFDDDB78341135D6AF5F822CDB6F3F600145D43C39DB9810E004A8CB373381FC88
3,203,963 UART: [art] SIG.R = 71E272C8B5266EE73CC5294F7F31D319477E66CDE2D92D01BE672FA8DE2FE844A4EB3AC155741DFA40ED6BE2A61F0139
3,210,741 UART: [art] SIG.S = 7246F7CE10CCE8354A6389D03FB2AC457252A7CB53947CA5AAC174A591FAB3588EB4D6839B7F8711C3B7EF7C56F4D9BB
3,235,053 UART: Caliptra RT
3,235,396 UART: [state] CFI Enabled
3,355,270 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,880 UART: [state] LifecycleState = Unprovisioned
86,536 UART: [state] DebugLocked = Yes
87,280 UART: [state] Starting the WD Timer 3262461 cycles
88,789 UART: [kat] SHA2-256
894,439 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,564 UART: [kat] ++
898,716 UART: [kat] sha1
902,902 UART: [kat] SHA2-256
904,842 UART: [kat] SHA2-384
907,547 UART: [kat] SHA2-512-ACC
909,448 UART: [kat] ECC-384
919,355 UART: [kat] HMAC-384Kdf
924,005 UART: [kat] LMS
1,172,333 UART: [kat] --
1,173,164 UART: [cold-reset] ++
1,173,583 UART: [fht] FHT @ 0x50003400
1,176,420 UART: [idev] ++
1,176,588 UART: [idev] CDI.KEYID = 6
1,176,948 UART: [idev] SUBJECT.KEYID = 7
1,177,372 UART: [idev] UDS.KEYID = 0
1,177,717 ready_for_fw is high
1,177,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,079 UART: [idev] Erasing UDS.KEYID = 0
1,202,565 UART: [idev] Sha1 KeyId Algorithm
1,211,092 UART: [idev] --
1,212,204 UART: [ldev] ++
1,212,372 UART: [ldev] CDI.KEYID = 6
1,212,735 UART: [ldev] SUBJECT.KEYID = 5
1,213,161 UART: [ldev] AUTHORITY.KEYID = 7
1,213,624 UART: [ldev] FE.KEYID = 1
1,218,872 UART: [ldev] Erasing FE.KEYID = 1
1,244,913 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,460 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,154 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,026 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,732 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,757 UART: [ldev] --
1,284,218 UART: [fwproc] Wait for Commands...
1,284,802 UART: [fwproc] Recv command 0x46574c44
1,285,530 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,543 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,943 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,177 >>> mbox cmd response: success
2,828,190 UART: [afmc] ++
2,828,358 UART: [afmc] CDI.KEYID = 6
2,828,720 UART: [afmc] SUBJECT.KEYID = 7
2,829,145 UART: [afmc] AUTHORITY.KEYID = 5
2,865,261 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,752 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,500 UART: [afmc] PUB.X = F372A51664951D4CC72434BDCB145AC6EE95661CC5BBFCEE6FA46B3E8F94F70CDF51B2D500C49ED9385DBBAAE9B53B55
2,888,206 UART: [afmc] PUB.Y = 9D079D886004BCE6FA876607D2C17FEA15D1BA976B038E4C695413E6B0CCD54A5DA7017892AB9A593287260882F4E321
2,894,081 UART: [afmc] SIG.R = F5D5699B97FB44241D59C52B5C709018560AA1CB232BFA68E7461ED7A90236F3FC592292759D64BEA489F492AF3D3CFE
2,899,790 UART: [afmc] SIG.S = 95C11DC5B39354BECB2B8FFC3BFAAB479B04330230455F501B30F35C89F2CE89FEF66D825206095EA9518D80B5F18F3F
2,907,654 UART: [afmc] --
2,908,531 UART: [cold-reset] --
2,909,575 UART: [state] Locking Datavault
2,910,918 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,522 UART: [state] Locking ICCM
2,911,996 UART: [exit] Launching FMC @ 0x40000130
2,917,326 UART:
2,917,342 UART: Running Caliptra FMC ...
2,917,750 UART:
2,917,893 UART: [state] CFI Enabled
2,928,827 UART: [fht] FMC Alias Private Key: 7
3,048,631 UART: [art] Extend RT PCRs Done
3,049,059 UART: [art] Lock RT PCRs Done
3,050,667 UART: [art] Populate DV Done
3,058,743 UART: [fht] FMC Alias Private Key: 7
3,059,683 UART: [art] Derive CDI
3,059,963 UART: [art] Store in slot 0x4
3,145,674 UART: [art] Derive Key Pair
3,146,034 UART: [art] Store priv key in slot 0x5
3,159,424 UART: [art] Derive Key Pair - Done
3,174,298 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,771 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,536 UART: [art] PUB.X = EBDEC8B2E8C405B44DC298B8188368B44E6776552154FB65ABC10BF88B1FB1266F7A25EEAC3F65B0A4CF743C13FA4F27
3,197,316 UART: [art] PUB.Y = E053ECDF55BD394F0A968461FA27835D0C4A93B53555F9E206D842CCB3C3C64D85635656F23AA000A6EB4DFDDD1A93EA
3,204,249 UART: [art] SIG.R = E0226CDB00D36DE5408F0B84DB434B0E63FCCA84F3DF6D570E797E19D3325268A154A0D3B7865C7B4F5849E1B2EC7F4E
3,211,000 UART: [art] SIG.S = 58ACAE694911954E7FD96C9545BA197B628DB5115AC405084A3B63542D8D6AE2839698D44EDECC438045465700E33960
3,235,262 UART: Caliptra RT
3,235,605 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,351,064 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9DA ra=0x400078B0 error_internal_intr_r=00000040
3,353,510 UART: [rt] WDT Expired
3,353,797 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,927 >>> mbox cmd response: success
2,741,790 UART:
2,741,806 UART: Running Caliptra FMC ...
2,742,214 UART:
2,742,357 UART: [state] CFI Enabled
2,753,289 UART: [fht] FMC Alias Private Key: 7
2,873,025 UART: [art] Extend RT PCRs Done
2,873,453 UART: [art] Lock RT PCRs Done
2,875,061 UART: [art] Populate DV Done
2,883,136 UART: [fht] FMC Alias Private Key: 7
2,884,076 UART: [art] Derive CDI
2,884,356 UART: [art] Store in slot 0x4
2,970,069 UART: [art] Derive Key Pair
2,970,429 UART: [art] Store priv key in slot 0x5
2,983,819 UART: [art] Derive Key Pair - Done
2,998,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,166 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,931 UART: [art] PUB.X = FF06BEA731AEFA017F97A0F3443C354A32B4D630361D91EDA1DA64BDCCC8AA13F8F7A01485EA60333826AC3A8B7C39DC
3,021,715 UART: [art] PUB.Y = 8B0D1EE52A205E1F03019653967827248DE879C567ADC8DA6B9151423FD54D4469F179B070FB692C6E833DFF235455DC
3,028,654 UART: [art] SIG.R = 407DECB094BF65A9B63FA79C8BF694835B94A0571B414BD1E705C7FE8F932D2E62E6EDE3E7088242EC3FB76F669A8918
3,035,428 UART: [art] SIG.S = 5E61AA2AB03F81901E69DE03FACBFEF28A45EBADFD058B0751919F4C635D406366AB2D9DF11E8B7BDE09CD9E9755306F
3,059,734 UART: Caliptra RT
3,060,077 UART: [state] CFI Enabled
3,179,951 UART: [rt] RT listening for mailbox commands...
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,617 ready_for_fw is high
1,061,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,174 >>> mbox cmd response: success
2,742,027 UART:
2,742,043 UART: Running Caliptra FMC ...
2,742,451 UART:
2,742,594 UART: [state] CFI Enabled
2,753,528 UART: [fht] FMC Alias Private Key: 7
2,873,332 UART: [art] Extend RT PCRs Done
2,873,760 UART: [art] Lock RT PCRs Done
2,875,368 UART: [art] Populate DV Done
2,883,444 UART: [fht] FMC Alias Private Key: 7
2,884,384 UART: [art] Derive CDI
2,884,664 UART: [art] Store in slot 0x4
2,970,375 UART: [art] Derive Key Pair
2,970,735 UART: [art] Store priv key in slot 0x5
2,984,125 UART: [art] Derive Key Pair - Done
2,998,988 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,226 UART: [art] PUB.X = 770FDC25A3A40B7D91B7DA95BF2B464E78B77BB40C02B0FAFB61945F5B8A826B7526AF18C37497459DE6C9F2CAE1394B
3,021,998 UART: [art] PUB.Y = 2169E63F2A96344549215FAC98B4C5B37DCE20A07B4EC41D43EFE78EBE8A60E8034B460D2BB3871B7CD952E16D4DD279
3,028,952 UART: [art] SIG.R = 5571335D5C02EF88B3648A143964D719A1CDD65439610096E058D625025193201C7F62B211AEB94A1A387A0BD94447EF
3,035,681 UART: [art] SIG.S = F9C7E50BA668CAD7D7973F36D25A325990660C77313BAD0B53A7A4096C9BA0DCFAD6A1B621939FB5906987645AD3AE7D
3,059,975 UART: Caliptra RT
3,060,318 UART: [state] CFI Enabled
handle_trap: cause=0, mtval=0, next_pc=40005c40
3,175,719 UART: RT NMI mcause=0x00000000 mscause=0x00000000 mepc=0x4001A9D8 ra=0x400078B0 error_internal_intr_r=00000040
3,178,163 UART: [rt] WDT Expired
3,178,450 UART: Fatal Error: 0x000E001B
test smoke_test::test_rt_wdt_timeout ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,194 UART: [state] LifecycleState = Unprovisioned
85,849 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
891,082 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,186 UART: [kat] ++
895,338 UART: [kat] sha1
899,578 UART: [kat] SHA2-256
901,518 UART: [kat] SHA2-384
904,341 UART: [kat] SHA2-512-ACC
906,242 UART: [kat] ECC-384
915,973 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,080 UART: [fht] FHT @ 0x50003400
1,172,784 UART: [idev] ++
1,172,952 UART: [idev] CDI.KEYID = 6
1,173,313 UART: [idev] SUBJECT.KEYID = 7
1,173,738 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.37s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 7.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,147 UART: [state] LifecycleState = Unprovisioned
85,802 UART: [state] DebugLocked = No
86,372 UART: [state] WD Timer not started. Device not locked for debugging
87,653 UART: [kat] SHA2-256
891,203 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,307 UART: [kat] ++
895,459 UART: [kat] sha1
899,797 UART: [kat] SHA2-256
901,737 UART: [kat] SHA2-384
904,544 UART: [kat] SHA2-512-ACC
906,445 UART: [kat] ECC-384
915,946 UART: [kat] HMAC-384Kdf
920,622 UART: [kat] LMS
1,168,934 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,157 UART: [fht] FHT @ 0x50003400
1,172,777 UART: [idev] ++
1,172,945 UART: [idev] CDI.KEYID = 6
1,173,306 UART: [idev] SUBJECT.KEYID = 7
1,173,731 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 8.54s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 6.99s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,186 UART: [state] LifecycleState = Unprovisioned
85,841 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,776 UART: [kat] SHA2-256
891,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,430 UART: [kat] ++
895,582 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,251 UART: [kat] SHA2-512-ACC
906,152 UART: [kat] ECC-384
916,195 UART: [kat] HMAC-384Kdf
920,595 UART: [kat] LMS
1,168,907 UART: [kat] --
1,170,028 UART: [cold-reset] ++
1,170,438 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.71s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,099 UART: [state] LifecycleState = Unprovisioned
85,754 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,515 UART: [kat] SHA2-256
901,455 UART: [kat] SHA2-384
904,264 UART: [kat] SHA2-512-ACC
906,165 UART: [kat] ECC-384
915,440 UART: [kat] HMAC-384Kdf
920,090 UART: [kat] LMS
1,168,402 UART: [kat] --
1,169,203 UART: [cold-reset] ++
1,169,595 UART: [fht] FHT @ 0x50003400
1,172,155 UART: [idev] ++
1,172,323 UART: [idev] CDI.KEYID = 6
1,172,684 UART: [idev] SUBJECT.KEYID = 7
1,173,109 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 8.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.17s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,242 UART: [state] LifecycleState = Unprovisioned
85,897 UART: [state] DebugLocked = No
86,435 UART: [state] WD Timer not started. Device not locked for debugging
87,568 UART: [kat] SHA2-256
891,118 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,222 UART: [kat] ++
895,374 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,301 UART: [kat] SHA2-512-ACC
906,202 UART: [kat] ECC-384
915,653 UART: [kat] HMAC-384Kdf
920,139 UART: [kat] LMS
1,168,451 UART: [kat] --
1,169,582 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,778 UART: [idev] ++
1,172,946 UART: [idev] CDI.KEYID = 6
1,173,307 UART: [idev] SUBJECT.KEYID = 7
1,173,732 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3794 , 3794
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.73s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3465 , 3465
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,135 UART: [state] LifecycleState = Unprovisioned
85,790 UART: [state] DebugLocked = No
86,342 UART: [state] WD Timer not started. Device not locked for debugging
87,609 UART: [kat] SHA2-256
891,159 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,263 UART: [kat] ++
895,415 UART: [kat] sha1
899,727 UART: [kat] SHA2-256
901,667 UART: [kat] SHA2-384
904,418 UART: [kat] SHA2-512-ACC
906,319 UART: [kat] ECC-384
915,984 UART: [kat] HMAC-384Kdf
920,648 UART: [kat] LMS
1,168,960 UART: [kat] --
1,169,715 UART: [cold-reset] ++
1,170,085 UART: [fht] FHT @ 0x50003400
1,172,779 UART: [idev] ++
1,172,947 UART: [idev] CDI.KEYID = 6
1,173,308 UART: [idev] SUBJECT.KEYID = 7
1,173,733 UART: [idev] UDS.KEYID = 0
Test coverage using different methods 3949 , 3949
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 7.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
Test coverage using different methods 3620 , 3620
test test_code_coverage::test_emu_coverage ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 6.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,873 writing to cptra_bootfsm_go
191,503 UART:
191,874 UART: Running Caliptra ROM ...
193,006 UART:
193,158 UART: [state] CFI Enabled
263,685 UART: [state] LifecycleState = Production
265,481 UART: [state] DebugLocked = Yes
267,975 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,787 UART: [kat] SHA2-256
442,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,992 UART: [kat] ++
453,491 UART: [kat] sha1
464,150 UART: [kat] SHA2-256
466,872 UART: [kat] SHA2-384
473,143 UART: [kat] SHA2-512-ACC
475,521 UART: [kat] ECC-384
2,766,906 UART: [kat] HMAC-384Kdf
2,780,377 UART: [kat] LMS
3,970,702 UART: [kat] --
3,973,348 UART: [cold-reset] ++
3,975,921 UART: [fht] Storing FHT @ 0x50003400
3,986,763 UART: [idev] ++
3,987,327 UART: [idev] CDI.KEYID = 6
3,988,352 UART: [idev] SUBJECT.KEYID = 7
3,989,523 UART: [idev] UDS.KEYID = 0
3,990,441 ready_for_fw is high
3,990,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,717 UART: [idev] Erasing UDS.KEYID = 0
7,327,036 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,605 UART: [idev] --
7,350,404 UART: [ldev] ++
7,351,025 UART: [ldev] CDI.KEYID = 6
7,351,933 UART: [ldev] SUBJECT.KEYID = 5
7,353,216 UART: [ldev] AUTHORITY.KEYID = 7
7,354,447 UART: [ldev] FE.KEYID = 1
7,402,026 UART: [ldev] Erasing FE.KEYID = 1
10,735,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,614 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,063,142 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,077,827 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,092,151 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,110,711 UART: [ldev] --
13,116,187 UART: [fwproc] Waiting for Commands...
13,118,553 UART: [fwproc] Received command 0x46574c44
13,120,735 UART: [fwproc] Received Image of size 118548 bytes
17,266,991 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,345,836 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,419,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,747,672 >>> mbox cmd response: success
17,752,000 UART: [afmc] ++
17,752,603 UART: [afmc] CDI.KEYID = 6
17,753,514 UART: [afmc] SUBJECT.KEYID = 7
17,754,734 UART: [afmc] AUTHORITY.KEYID = 5
21,114,785 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,415,598 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,417,915 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,432,376 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,447,106 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,461,572 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,483,259 UART: [afmc] --
23,486,523 UART: [cold-reset] --
23,491,030 UART: [state] Locking Datavault
23,494,773 UART: [state] Locking PCR0, PCR1 and PCR31
23,496,531 UART: [state] Locking ICCM
23,497,759 UART: [exit] Launching FMC @ 0x40000130
23,506,180 UART:
23,506,417 UART: Running Caliptra FMC ...
23,507,516 UART:
23,507,675 UART: [state] CFI Enabled
23,575,595 UART: [fht] FMC Alias Private Key: 7
25,915,892 UART: [art] Extend RT PCRs Done
25,917,114 UART: [art] Lock RT PCRs Done
25,918,681 UART: [art] Populate DV Done
25,924,197 UART: [fht] FMC Alias Private Key: 7
25,925,932 UART: [art] Derive CDI
25,926,767 UART: [art] Store in slot 0x4
25,986,141 UART: [art] Derive Key Pair
25,987,139 UART: [art] Store priv key in slot 0x5
29,279,296 UART: [art] Derive Key Pair - Done
29,292,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,581,900 UART: [art] Erasing AUTHORITY.KEYID = 7
31,583,422 UART: [art] PUB.X = 747F3997039E2F3648725C36879EFA880EE94D48FE0C94B1F8C9010831FFC158EFC7FD492CE19BAFEA1663EBEABC3FBC
31,590,666 UART: [art] PUB.Y = 384AA9C6D1702CC74D1B32ED4FBA85316E839CF596D72FF1D7E29C86CAA59DC90D7EBA8F471F41ED0FD9A3988FFEB212
31,597,952 UART: [art] SIG.R = DD34309FE7CF40E4B4B5357835C608E0AA708708B9EF6F5654EE90E79633C62E705F89323392D41A41C0891ABF2CB521
31,605,360 UART: [art] SIG.S = D1C679D416E2F69DE08AD7F36C0528902338D943E2728F7C9A85790C25C58CB909403B2AB27809D267D9DA319BC597A4
32,910,455 UART: Caliptra RT
32,911,165 UART: [state] CFI Enabled
33,085,560 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
546 UART:
686 UART: Running Caliptra ROM ...
1,787 UART:
1,937 UART: [state] CFI Enabled
75,676 UART: [state] LifecycleState = Production
77,498 UART: [state] DebugLocked = Yes
78,994 UART: [state] Starting the Watchdog Timer 40000000 cycles
83,935 UART: [kat] SHA2-256
253,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
264,192 UART: [kat] ++
264,638 UART: [kat] sha1
274,806 UART: [kat] SHA2-256
277,484 UART: [kat] SHA2-384
283,815 UART: [kat] SHA2-512-ACC
286,166 UART: [kat] ECC-384
2,573,839 UART: [kat] HMAC-384Kdf
2,608,143 UART: [kat] LMS
3,798,473 UART: [kat] --
3,804,269 UART: [warm-reset] ++
3,808,688 UART: [warm-reset] --
3,813,253 UART: [state] Locking Datavault
3,816,450 UART: [state] Locking PCR0, PCR1 and PCR31
3,818,153 UART: [state] Locking ICCM
3,820,135 UART: [exit] Launching FMC @ 0x40000130
3,828,552 UART:
3,828,789 UART: Running Caliptra FMC ...
3,829,894 UART:
3,830,051 UART: [state] CFI Enabled
3,878,778 UART: [art] Skip pcr extension
3,879,917 UART: [art] Extend RT PCRs Done
3,880,977 UART: [art] Lock RT PCRs Done
3,882,370 UART: [art] Populate DV Done
3,887,891 UART: [fht] FMC Alias Private Key: 7
3,889,642 UART: [art] Derive CDI
3,890,377 UART: [art] Store in slot 0x4
3,947,470 UART: [art] Derive Key Pair
3,948,471 UART: [art] Store priv key in slot 0x5
7,242,287 UART: [art] Derive Key Pair - Done
7,254,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,545,057 UART: [art] Erasing AUTHORITY.KEYID = 7
9,546,597 UART: [art] PUB.X = 747F3997039E2F3648725C36879EFA880EE94D48FE0C94B1F8C9010831FFC158EFC7FD492CE19BAFEA1663EBEABC3FBC
9,553,879 UART: [art] PUB.Y = 384AA9C6D1702CC74D1B32ED4FBA85316E839CF596D72FF1D7E29C86CAA59DC90D7EBA8F471F41ED0FD9A3988FFEB212
9,561,147 UART: [art] SIG.R = DD34309FE7CF40E4B4B5357835C608E0AA708708B9EF6F5654EE90E79633C62E705F89323392D41A41C0891ABF2CB521
9,568,493 UART: [art] SIG.S = D1C679D416E2F69DE08AD7F36C0528902338D943E2728F7C9A85790C25C58CB909403B2AB27809D267D9DA319BC597A4
10,873,825 UART: Caliptra RT
10,874,510 UART: [state] CFI Enabled
11,290,658 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,804,618 ready_for_fw is high
3,805,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,021,155 >>> mbox cmd response: success
23,715,828 UART:
23,716,216 UART: Running Caliptra FMC ...
23,717,546 UART:
23,717,735 UART: [state] CFI Enabled
23,784,925 UART: [fht] FMC Alias Private Key: 7
26,125,536 UART: [art] Extend RT PCRs Done
26,126,760 UART: [art] Lock RT PCRs Done
26,128,382 UART: [art] Populate DV Done
26,134,075 UART: [fht] FMC Alias Private Key: 7
26,135,564 UART: [art] Derive CDI
26,136,323 UART: [art] Store in slot 0x4
26,194,063 UART: [art] Derive Key Pair
26,195,107 UART: [art] Store priv key in slot 0x5
29,488,207 UART: [art] Derive Key Pair - Done
29,501,037 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,789,121 UART: [art] Erasing AUTHORITY.KEYID = 7
31,790,630 UART: [art] PUB.X = 248A71DD3608D3BE8586788EBD7E32549D93EE3B78255B397CD2431C99C294B29FBBE5E115EF43B52BCC3042E0A399AD
31,797,871 UART: [art] PUB.Y = 1F494342653DB5DCCD95B3911E7259BCCA5C40F8E3243C111C047878C9AE50AD432A8F77746E2135D2C747E6B7956A61
31,805,157 UART: [art] SIG.R = 4722A72D6555C043D317D5F7B4C11CE6BBE0FC944D421F0B47A2701209067DA84153F35158A85EEDBAEECAA64E9B9453
31,812,554 UART: [art] SIG.S = 0500897795E975E8AAEFC6DE6DA2F5A91235A1A430DC8B4D9AD9B0D1D6652E9E69A2000A026C81C19CF8AD4ADD122216
33,117,453 UART: Caliptra RT
33,118,167 UART: [state] CFI Enabled
33,293,697 UART: [rt] RT listening for mailbox commands...
297 writing to cptra_bootfsm_go
3,617,175 UART:
3,617,502 UART: Running Caliptra FMC ...
3,618,570 UART:
3,618,721 UART: [state] CFI Enabled
3,664,366 UART: [art] Skip pcr extension
3,665,523 UART: [art] Extend RT PCRs Done
3,666,624 UART: [art] Lock RT PCRs Done
3,668,032 UART: [art] Populate DV Done
3,673,400 UART: [fht] FMC Alias Private Key: 7
3,675,044 UART: [art] Derive CDI
3,675,782 UART: [art] Store in slot 0x4
3,733,061 UART: [art] Derive Key Pair
3,734,107 UART: [art] Store priv key in slot 0x5
7,027,016 UART: [art] Derive Key Pair - Done
7,039,867 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
9,327,406 UART: [art] Erasing AUTHORITY.KEYID = 7
9,328,926 UART: [art] PUB.X = 248A71DD3608D3BE8586788EBD7E32549D93EE3B78255B397CD2431C99C294B29FBBE5E115EF43B52BCC3042E0A399AD
9,336,223 UART: [art] PUB.Y = 1F494342653DB5DCCD95B3911E7259BCCA5C40F8E3243C111C047878C9AE50AD432A8F77746E2135D2C747E6B7956A61
9,343,441 UART: [art] SIG.R = 4722A72D6555C043D317D5F7B4C11CE6BBE0FC944D421F0B47A2701209067DA84153F35158A85EEDBAEECAA64E9B9453
9,350,833 UART: [art] SIG.S = 0500897795E975E8AAEFC6DE6DA2F5A91235A1A430DC8B4D9AD9B0D1D6652E9E69A2000A026C81C19CF8AD4ADD122216
10,656,095 UART: Caliptra RT
10,656,812 UART: [state] CFI Enabled
11,076,877 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
191,810 UART:
192,186 UART: Running Caliptra ROM ...
193,320 UART:
603,036 UART: [state] CFI Enabled
619,535 UART: [state] LifecycleState = Production
621,381 UART: [state] DebugLocked = Yes
623,866 UART: [state] Starting the Watchdog Timer 40000000 cycles
629,461 UART: [kat] SHA2-256
799,251 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,799 UART: [kat] ++
810,356 UART: [kat] sha1
821,450 UART: [kat] SHA2-256
824,164 UART: [kat] SHA2-384
829,935 UART: [kat] SHA2-512-ACC
832,296 UART: [kat] ECC-384
3,117,819 UART: [kat] HMAC-384Kdf
3,129,697 UART: [kat] LMS
4,319,845 UART: [kat] --
4,324,437 UART: [cold-reset] ++
4,326,228 UART: [fht] Storing FHT @ 0x50003400
4,337,708 UART: [idev] ++
4,338,277 UART: [idev] CDI.KEYID = 6
4,339,192 UART: [idev] SUBJECT.KEYID = 7
4,340,439 UART: [idev] UDS.KEYID = 0
4,341,505 ready_for_fw is high
4,341,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,670 UART: [idev] Erasing UDS.KEYID = 0
7,630,098 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,356 UART: [idev] --
7,655,714 UART: [ldev] ++
7,656,291 UART: [ldev] CDI.KEYID = 6
7,657,223 UART: [ldev] SUBJECT.KEYID = 5
7,658,483 UART: [ldev] AUTHORITY.KEYID = 7
7,659,631 UART: [ldev] FE.KEYID = 1
7,670,134 UART: [ldev] Erasing FE.KEYID = 1
10,958,662 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,875 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,263,399 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,278,083 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,292,415 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,312,441 UART: [ldev] --
13,316,899 UART: [fwproc] Waiting for Commands...
13,320,129 UART: [fwproc] Received command 0x46574c44
13,322,510 UART: [fwproc] Received Image of size 118548 bytes
17,457,907 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,533,865 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,607,070 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,935,875 >>> mbox cmd response: success
17,939,431 UART: [afmc] ++
17,940,015 UART: [afmc] CDI.KEYID = 6
17,940,960 UART: [afmc] SUBJECT.KEYID = 7
17,942,171 UART: [afmc] AUTHORITY.KEYID = 5
21,258,575 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,555,039 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,557,305 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
23,571,845 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
23,586,557 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
23,600,990 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
23,622,879 UART: [afmc] --
23,626,090 UART: [cold-reset] --
23,629,678 UART: [state] Locking Datavault
23,636,391 UART: [state] Locking PCR0, PCR1 and PCR31
23,638,144 UART: [state] Locking ICCM
23,640,414 UART: [exit] Launching FMC @ 0x40000130
23,648,842 UART:
23,649,095 UART: Running Caliptra FMC ...
23,650,123 UART:
23,650,267 UART: [state] CFI Enabled
23,658,580 UART: [fht] FMC Alias Private Key: 7
25,997,497 UART: [art] Extend RT PCRs Done
25,998,720 UART: [art] Lock RT PCRs Done
26,000,584 UART: [art] Populate DV Done
26,005,967 UART: [fht] FMC Alias Private Key: 7
26,007,566 UART: [art] Derive CDI
26,008,306 UART: [art] Store in slot 0x4
26,050,969 UART: [art] Derive Key Pair
26,052,012 UART: [art] Store priv key in slot 0x5
29,294,418 UART: [art] Derive Key Pair - Done
29,307,356 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,588,071 UART: [art] Erasing AUTHORITY.KEYID = 7
31,589,580 UART: [art] PUB.X = 38644A2EBA298413F21E78F26019610225D574DCA9459129901E958365EF08B3F9192BE6AF49723F0A55FA12D72434AD
31,596,824 UART: [art] PUB.Y = D79605EAA3445C2053F0070570E13A138C5D862D8593B37438AC321C5C6C4F3E6E84C39E763153CD483F99DA9EEB7A96
31,604,039 UART: [art] SIG.R = F75415F4B939AE47DB7D232E172BE81915B6F8C84668ACA3730D660450FC2D91561D5970729F5D7ED03AA6AF084B621D
31,611,417 UART: [art] SIG.S = CC6E069E4CA57E2B30559FBDB46F9CDCD2B5C97D1A35FA686E5D5D4F4134448419B9077E9659816EC8735A7B15207BA9
32,916,548 UART: Caliptra RT
32,917,255 UART: [state] CFI Enabled
33,050,195 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
562 UART:
703 UART: Running Caliptra ROM ...
1,803 UART:
7,479,780 UART: [state] CFI Enabled
7,495,934 UART: [state] LifecycleState = Production
7,497,741 UART: [state] DebugLocked = Yes
7,499,539 UART: [state] Starting the Watchdog Timer 40000000 cycles
7,504,117 UART: [kat] SHA2-256
7,673,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,684,432 UART: [kat] ++
7,684,979 UART: [kat] sha1
7,696,411 UART: [kat] SHA2-256
7,699,110 UART: [kat] SHA2-384
7,706,449 UART: [kat] SHA2-512-ACC
7,708,797 UART: [kat] ECC-384
9,992,492 UART: [kat] HMAC-384Kdf
10,005,276 UART: [kat] LMS
11,195,411 UART: [kat] --
11,200,910 UART: [warm-reset] ++
11,204,300 UART: [warm-reset] --
11,207,786 UART: [state] Locking Datavault
11,210,500 UART: [state] Locking PCR0, PCR1 and PCR31
11,212,266 UART: [state] Locking ICCM
11,214,524 UART: [exit] Launching FMC @ 0x40000130
11,222,926 UART:
11,223,163 UART: Running Caliptra FMC ...
11,224,266 UART:
11,224,424 UART: [state] CFI Enabled
11,226,420 UART: [art] Skip pcr extension
11,227,519 UART: [art] Extend RT PCRs Done
11,228,652 UART: [art] Lock RT PCRs Done
11,229,968 UART: [art] Populate DV Done
11,235,374 UART: [fht] FMC Alias Private Key: 7
11,236,875 UART: [art] Derive CDI
11,237,635 UART: [art] Store in slot 0x4
11,280,115 UART: [art] Derive Key Pair
11,281,116 UART: [art] Store priv key in slot 0x5
14,523,153 UART: [art] Derive Key Pair - Done
14,536,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,816,583 UART: [art] Erasing AUTHORITY.KEYID = 7
16,818,087 UART: [art] PUB.X = 38644A2EBA298413F21E78F26019610225D574DCA9459129901E958365EF08B3F9192BE6AF49723F0A55FA12D72434AD
16,825,355 UART: [art] PUB.Y = D79605EAA3445C2053F0070570E13A138C5D862D8593B37438AC321C5C6C4F3E6E84C39E763153CD483F99DA9EEB7A96
16,832,620 UART: [art] SIG.R = F75415F4B939AE47DB7D232E172BE81915B6F8C84668ACA3730D660450FC2D91561D5970729F5D7ED03AA6AF084B621D
16,839,964 UART: [art] SIG.S = CC6E069E4CA57E2B30559FBDB46F9CDCD2B5C97D1A35FA686E5D5D4F4134448419B9077E9659816EC8735A7B15207BA9
18,145,193 UART: Caliptra RT
18,145,882 UART: [state] CFI Enabled
18,521,053 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
4,130,364 ready_for_fw is high
4,130,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,193,124 >>> mbox cmd response: success
23,832,545 UART:
23,832,938 UART: Running Caliptra FMC ...
23,834,063 UART:
23,834,224 UART: [state] CFI Enabled
23,842,110 UART: [fht] FMC Alias Private Key: 7
26,182,495 UART: [art] Extend RT PCRs Done
26,183,716 UART: [art] Lock RT PCRs Done
26,185,422 UART: [art] Populate DV Done
26,190,730 UART: [fht] FMC Alias Private Key: 7
26,192,377 UART: [art] Derive CDI
26,193,192 UART: [art] Store in slot 0x4
26,235,636 UART: [art] Derive Key Pair
26,236,674 UART: [art] Store priv key in slot 0x5
29,478,700 UART: [art] Derive Key Pair - Done
29,491,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,772,532 UART: [art] Erasing AUTHORITY.KEYID = 7
31,774,058 UART: [art] PUB.X = F2810BCE69FCB578DCACD984965350C66146F055F00EF27564923C39A54DC84D275CE9E21F46FB2D9F86CF401F08DAB9
31,781,306 UART: [art] PUB.Y = A7825BF671B9A054C70511C795C55636C6BC385957843595134BE08587EF9A01FDD453CD46F82C4F8EE9FE5781A691D2
31,788,540 UART: [art] SIG.R = 625F5C6D66EA7FA4E98C41448A745518B7E16590645212D9E10D46D9E8C31FAC7C3821ADEF2434AF9C8B5152BE1B5713
31,795,930 UART: [art] SIG.S = 3BA59629731940DF457CD447DBFC2254FD3F96399BC5E37A7815EC50728EB6EEDE24B84E7E92317965F1D86284EFEDA4
33,101,464 UART: Caliptra RT
33,102,194 UART: [state] CFI Enabled
33,235,362 UART: [rt] RT listening for mailbox commands...
299 writing to cptra_bootfsm_go
10,831,824 UART:
10,832,171 UART: Running Caliptra FMC ...
10,833,215 UART:
10,833,371 UART: [state] CFI Enabled
10,835,166 UART: [art] Skip pcr extension
10,836,275 UART: [art] Extend RT PCRs Done
10,837,418 UART: [art] Lock RT PCRs Done
10,838,631 UART: [art] Populate DV Done
10,844,010 UART: [fht] FMC Alias Private Key: 7
10,845,709 UART: [art] Derive CDI
10,846,447 UART: [art] Store in slot 0x4
10,889,048 UART: [art] Derive Key Pair
10,890,096 UART: [art] Store priv key in slot 0x5
14,132,415 UART: [art] Derive Key Pair - Done
14,145,474 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
16,425,434 UART: [art] Erasing AUTHORITY.KEYID = 7
16,426,936 UART: [art] PUB.X = F2810BCE69FCB578DCACD984965350C66146F055F00EF27564923C39A54DC84D275CE9E21F46FB2D9F86CF401F08DAB9
16,434,243 UART: [art] PUB.Y = A7825BF671B9A054C70511C795C55636C6BC385957843595134BE08587EF9A01FDD453CD46F82C4F8EE9FE5781A691D2
16,441,489 UART: [art] SIG.R = 625F5C6D66EA7FA4E98C41448A745518B7E16590645212D9E10D46D9E8C31FAC7C3821ADEF2434AF9C8B5152BE1B5713
16,448,865 UART: [art] SIG.S = 3BA59629731940DF457CD447DBFC2254FD3F96399BC5E37A7815EC50728EB6EEDE24B84E7E92317965F1D86284EFEDA4
17,754,071 UART: Caliptra RT
17,754,778 UART: [state] CFI Enabled
18,127,620 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 2.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
191,586 UART:
191,962 UART: Running Caliptra ROM ...
193,158 UART:
193,320 UART: [state] CFI Enabled
262,931 UART: [state] LifecycleState = Production
264,753 UART: [state] DebugLocked = Yes
266,393 UART: [state] Starting the WD Timer 40000000 cycles
271,982 UART: [kat] SHA2-256
451,638 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,392 UART: [kat] ++
462,929 UART: [kat] sha1
473,698 UART: [kat] SHA2-256
476,358 UART: [kat] SHA2-384
482,350 UART: [kat] SHA2-512-ACC
484,720 UART: [kat] ECC-384
2,946,848 UART: [kat] HMAC-384Kdf
2,970,672 UART: [kat] LMS
3,447,161 UART: [kat] --
3,450,626 UART: [cold-reset] ++
3,453,148 UART: [fht] FHT @ 0x50003400
3,464,274 UART: [idev] ++
3,464,851 UART: [idev] CDI.KEYID = 6
3,465,886 UART: [idev] SUBJECT.KEYID = 7
3,467,067 UART: [idev] UDS.KEYID = 0
3,468,000 ready_for_fw is high
3,468,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,297 UART: [idev] Erasing UDS.KEYID = 0
5,987,535 UART: [idev] Sha1 KeyId Algorithm
6,011,234 UART: [idev] --
6,016,264 UART: [ldev] ++
6,016,842 UART: [ldev] CDI.KEYID = 6
6,017,764 UART: [ldev] SUBJECT.KEYID = 5
6,018,986 UART: [ldev] AUTHORITY.KEYID = 7
6,020,239 UART: [ldev] FE.KEYID = 1
6,056,090 UART: [ldev] Erasing FE.KEYID = 1
8,565,369 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,486 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,314,277 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,330,159 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,345,916 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,368,147 UART: [ldev] --
10,373,846 UART: [fwproc] Wait for Commands...
10,375,998 UART: [fwproc] Recv command 0x46574c44
10,378,030 UART: [fwproc] Recv'd Img size: 118548 bytes
13,889,618 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,971,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,044,102 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,371,927 >>> mbox cmd response: success
14,376,153 UART: [afmc] ++
14,376,944 UART: [afmc] CDI.KEYID = 6
14,377,843 UART: [afmc] SUBJECT.KEYID = 7
14,378,901 UART: [afmc] AUTHORITY.KEYID = 5
16,916,508 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,396 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,656,254 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,672,313 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,687,874 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,711,527 UART: [afmc] --
18,715,732 UART: [cold-reset] --
18,720,576 UART: [state] Locking Datavault
18,726,745 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,500 UART: [state] Locking ICCM
18,730,490 UART: [exit] Launching FMC @ 0x40000130
18,738,895 UART:
18,739,155 UART: Running Caliptra FMC ...
18,740,263 UART:
18,740,430 UART: [state] CFI Enabled
18,794,525 UART: [fht] FMC Alias Private Key: 7
20,561,501 UART: [art] Extend RT PCRs Done
20,562,731 UART: [art] Lock RT PCRs Done
20,564,227 UART: [art] Populate DV Done
20,569,694 UART: [fht] FMC Alias Private Key: 7
20,571,339 UART: [art] Derive CDI
20,572,078 UART: [art] Store in slot 0x4
20,627,444 UART: [art] Derive Key Pair
20,628,488 UART: [art] Store priv key in slot 0x5
23,091,714 UART: [art] Derive Key Pair - Done
23,104,424 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,817,486 UART: [art] Erasing AUTHORITY.KEYID = 7
24,818,997 UART: [art] PUB.X = 9D25E275B15E05378B19186A72625236C4BF8B73827E25FCEB70513FF4C66744AF7E4C0E65D58FABF1D61A2AA5346F5B
24,826,225 UART: [art] PUB.Y = 978FDB1885D4EB006D7597AFFA0F9A860AFD1D08F57344096204164008C4558C846BBD7D426A55170A955358384AF3C7
24,833,431 UART: [art] SIG.R = 4930837C19A2FF4363DC73245764CA9F1A6D29E46ABF3F9BA5551DDDDB2ADD4915F33380FC93A7FE8C67A8BF9722FA2B
24,840,845 UART: [art] SIG.S = 1230BDC6D6FA7F90D95437967B7D7613589DF46A1B62533DA8469B2C9C9DAE5209EFD9DE6E3CFD86BD51E938F58BE447
25,819,950 UART: Caliptra RT
25,820,671 UART: [state] CFI Enabled
26,001,712 UART: [rt] RT listening for mailbox commands...
294 writing to cptra_bootfsm_go
563 UART:
717 UART: Running Caliptra ROM ...
1,825 UART:
1,989 UART: [state] CFI Enabled
68,517 UART: [state] LifecycleState = Production
70,345 UART: [state] DebugLocked = Yes
72,038 UART: [state] Starting the WD Timer 40000000 cycles
77,153 UART: [kat] SHA2-256
256,819 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
267,605 UART: [kat] ++
268,140 UART: [kat] sha1
278,100 UART: [kat] SHA2-256
280,790 UART: [kat] SHA2-384
288,173 UART: [kat] SHA2-512-ACC
290,512 UART: [kat] ECC-384
2,760,965 UART: [kat] HMAC-384Kdf
2,788,352 UART: [kat] LMS
3,264,795 UART: [kat] --
3,269,213 UART: [warm-reset] ++
3,274,065 UART: [warm-reset] --
3,278,745 UART: [state] Locking Datavault
3,282,811 UART: [state] Locking PCR0, PCR1 and PCR31
3,284,568 UART: [state] Locking ICCM
3,286,452 UART: [exit] Launching FMC @ 0x40000130
3,294,854 UART:
3,295,114 UART: Running Caliptra FMC ...
3,296,231 UART:
3,296,415 UART: [state] CFI Enabled
3,355,226 UART: [art] Skip pcr extension
3,356,371 UART: [art] Extend RT PCRs Done
3,357,525 UART: [art] Lock RT PCRs Done
3,358,817 UART: [art] Populate DV Done
3,364,335 UART: [fht] FMC Alias Private Key: 7
3,365,822 UART: [art] Derive CDI
3,366,590 UART: [art] Store in slot 0x4
3,424,276 UART: [art] Derive Key Pair
3,425,318 UART: [art] Store priv key in slot 0x5
5,888,389 UART: [art] Derive Key Pair - Done
5,901,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,614,198 UART: [art] Erasing AUTHORITY.KEYID = 7
7,615,708 UART: [art] PUB.X = 9D25E275B15E05378B19186A72625236C4BF8B73827E25FCEB70513FF4C66744AF7E4C0E65D58FABF1D61A2AA5346F5B
7,622,985 UART: [art] PUB.Y = 978FDB1885D4EB006D7597AFFA0F9A860AFD1D08F57344096204164008C4558C846BBD7D426A55170A955358384AF3C7
7,630,216 UART: [art] SIG.R = 4930837C19A2FF4363DC73245764CA9F1A6D29E46ABF3F9BA5551DDDDB2ADD4915F33380FC93A7FE8C67A8BF9722FA2B
7,637,632 UART: [art] SIG.S = 1230BDC6D6FA7F90D95437967B7D7613589DF46A1B62533DA8469B2C9C9DAE5209EFD9DE6E3CFD86BD51E938F58BE447
8,616,460 UART: Caliptra RT
8,617,175 UART: [state] CFI Enabled
9,042,600 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
3,459,134 ready_for_fw is high
3,459,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,277,369 >>> mbox cmd response: success
18,555,577 UART:
18,556,024 UART: Running Caliptra FMC ...
18,557,178 UART:
18,557,350 UART: [state] CFI Enabled
18,627,308 UART: [fht] FMC Alias Private Key: 7
20,393,074 UART: [art] Extend RT PCRs Done
20,394,315 UART: [art] Lock RT PCRs Done
20,395,758 UART: [art] Populate DV Done
20,401,082 UART: [fht] FMC Alias Private Key: 7
20,402,753 UART: [art] Derive CDI
20,403,573 UART: [art] Store in slot 0x4
20,460,307 UART: [art] Derive Key Pair
20,461,352 UART: [art] Store priv key in slot 0x5
22,924,043 UART: [art] Derive Key Pair - Done
22,936,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,649,724 UART: [art] Erasing AUTHORITY.KEYID = 7
24,651,233 UART: [art] PUB.X = A116C61FD1176972D31B5FB2E24B937E0B92DAC834EED4A6306958255C3184D95764141E668413425DDDC83CCB8E7A28
24,658,495 UART: [art] PUB.Y = 00D698A62ECC726E65445AD25CC46EFA27A7655153C12DDD2567DB4E52823F6DAF8FB8DA3EFBBC7BE88CD474B185FE7E
24,665,766 UART: [art] SIG.R = E0EE293C687FAD2F2F7EEBD9829E4CA8D4515CAFDD04A3104C0716EE01AB0488621BB84F1C64F6B7CAFEEE0C12FBF786
24,673,222 UART: [art] SIG.S = 15D063D54F88550DBBA9BF7F2636761656BD8C3222B01A694F88C4606F475823B56FD14304A2A9C4F4FE29C687C30072
25,652,249 UART: Caliptra RT
25,652,964 UART: [state] CFI Enabled
25,833,620 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
3,271,840 UART:
3,272,172 UART: Running Caliptra FMC ...
3,273,224 UART:
3,273,390 UART: [state] CFI Enabled
3,322,802 UART: [art] Skip pcr extension
3,323,918 UART: [art] Extend RT PCRs Done
3,325,068 UART: [art] Lock RT PCRs Done
3,326,541 UART: [art] Populate DV Done
3,332,234 UART: [fht] FMC Alias Private Key: 7
3,333,788 UART: [art] Derive CDI
3,334,558 UART: [art] Store in slot 0x4
3,391,611 UART: [art] Derive Key Pair
3,392,673 UART: [art] Store priv key in slot 0x5
5,856,168 UART: [art] Derive Key Pair - Done
5,869,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,581,424 UART: [art] Erasing AUTHORITY.KEYID = 7
7,582,932 UART: [art] PUB.X = A116C61FD1176972D31B5FB2E24B937E0B92DAC834EED4A6306958255C3184D95764141E668413425DDDC83CCB8E7A28
7,590,190 UART: [art] PUB.Y = 00D698A62ECC726E65445AD25CC46EFA27A7655153C12DDD2567DB4E52823F6DAF8FB8DA3EFBBC7BE88CD474B185FE7E
7,597,430 UART: [art] SIG.R = E0EE293C687FAD2F2F7EEBD9829E4CA8D4515CAFDD04A3104C0716EE01AB0488621BB84F1C64F6B7CAFEEE0C12FBF786
7,604,884 UART: [art] SIG.S = 15D063D54F88550DBBA9BF7F2636761656BD8C3222B01A694F88C4606F475823B56FD14304A2A9C4F4FE29C687C30072
8,583,838 UART: Caliptra RT
8,584,553 UART: [state] CFI Enabled
9,004,990 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
191,916 UART:
192,276 UART: Running Caliptra ROM ...
193,467 UART:
603,258 UART: [state] CFI Enabled
616,061 UART: [state] LifecycleState = Production
617,843 UART: [state] DebugLocked = Yes
619,837 UART: [state] Starting the WD Timer 40000000 cycles
625,465 UART: [kat] SHA2-256
805,111 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,912 UART: [kat] ++
816,411 UART: [kat] sha1
827,038 UART: [kat] SHA2-256
829,777 UART: [kat] SHA2-384
835,345 UART: [kat] SHA2-512-ACC
837,712 UART: [kat] ECC-384
3,281,245 UART: [kat] HMAC-384Kdf
3,295,182 UART: [kat] LMS
3,771,764 UART: [kat] --
3,776,560 UART: [cold-reset] ++
3,778,354 UART: [fht] FHT @ 0x50003400
3,788,548 UART: [idev] ++
3,789,110 UART: [idev] CDI.KEYID = 6
3,790,018 UART: [idev] SUBJECT.KEYID = 7
3,791,265 UART: [idev] UDS.KEYID = 0
3,792,312 ready_for_fw is high
3,792,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,385 UART: [idev] Erasing UDS.KEYID = 0
6,273,711 UART: [idev] Sha1 KeyId Algorithm
6,296,957 UART: [idev] --
6,301,762 UART: [ldev] ++
6,302,335 UART: [ldev] CDI.KEYID = 6
6,303,243 UART: [ldev] SUBJECT.KEYID = 5
6,304,453 UART: [ldev] AUTHORITY.KEYID = 7
6,305,754 UART: [ldev] FE.KEYID = 1
6,314,543 UART: [ldev] Erasing FE.KEYID = 1
8,789,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,522 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,524,356 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,540,181 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,555,949 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,578,075 UART: [ldev] --
10,584,210 UART: [fwproc] Wait for Commands...
10,587,133 UART: [fwproc] Recv command 0x46574c44
10,589,175 UART: [fwproc] Recv'd Img size: 118548 bytes
14,114,019 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,197,773 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,270,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,598,379 >>> mbox cmd response: success
14,603,278 UART: [afmc] ++
14,603,870 UART: [afmc] CDI.KEYID = 6
14,604,756 UART: [afmc] SUBJECT.KEYID = 7
14,606,023 UART: [afmc] AUTHORITY.KEYID = 5
17,112,268 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,835,204 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,837,402 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,853,294 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
18,869,365 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
18,884,934 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
18,910,760 UART: [afmc] --
18,914,615 UART: [cold-reset] --
18,917,562 UART: [state] Locking Datavault
18,922,703 UART: [state] Locking PCR0, PCR1 and PCR31
18,924,407 UART: [state] Locking ICCM
18,927,156 UART: [exit] Launching FMC @ 0x40000130
18,935,608 UART:
18,935,841 UART: Running Caliptra FMC ...
18,936,939 UART:
18,937,097 UART: [state] CFI Enabled
18,945,153 UART: [fht] FMC Alias Private Key: 7
20,711,276 UART: [art] Extend RT PCRs Done
20,712,495 UART: [art] Lock RT PCRs Done
20,714,497 UART: [art] Populate DV Done
20,720,019 UART: [fht] FMC Alias Private Key: 7
20,721,664 UART: [art] Derive CDI
20,722,498 UART: [art] Store in slot 0x4
20,765,310 UART: [art] Derive Key Pair
20,766,308 UART: [art] Store priv key in slot 0x5
23,192,968 UART: [art] Derive Key Pair - Done
23,205,949 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,912,069 UART: [art] Erasing AUTHORITY.KEYID = 7
24,913,597 UART: [art] PUB.X = 45C581FADF3E27130F6A292E6E91D4BDA694B6380C2F1E143AF29CD754B5F541A1E044D9257A4671920265EC98805EED
24,920,816 UART: [art] PUB.Y = A011EC7E1355B8B2F957CB6DDDFCE5D958C5B429AE26AA0FD4BDE84D214DA5F19D573BAD421920D28F07629D2FE9592A
24,928,121 UART: [art] SIG.R = 2E84D738031DC76E618965A67113CC1A3A846E2A2CB7674E9C9237CDD902B44DC097D6CE72C4AD284681FC0B48BC45D8
24,935,475 UART: [art] SIG.S = 6A4DFE4CD806E09B8EB5532E3356F2941F25F3332DC30515C4C361958BFD3EB17FF7AFD2B136C8355D09CF803C4390F8
25,915,021 UART: Caliptra RT
25,915,720 UART: [state] CFI Enabled
26,048,765 UART: [rt] RT listening for mailbox commands...
304 writing to cptra_bootfsm_go
549 UART:
691 UART: Running Caliptra ROM ...
1,812 UART:
14,482,639 UART: [state] CFI Enabled
14,496,109 UART: [state] LifecycleState = Production
14,497,951 UART: [state] DebugLocked = Yes
14,499,737 UART: [state] Starting the WD Timer 40000000 cycles
14,503,930 UART: [kat] SHA2-256
14,683,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,694,397 UART: [kat] ++
14,694,850 UART: [kat] sha1
14,706,585 UART: [kat] SHA2-256
14,709,280 UART: [kat] SHA2-384
14,715,265 UART: [kat] SHA2-512-ACC
14,717,612 UART: [kat] ECC-384
17,160,212 UART: [kat] HMAC-384Kdf
17,171,161 UART: [kat] LMS
17,647,645 UART: [kat] --
17,651,947 UART: [warm-reset] ++
17,657,284 UART: [warm-reset] --
17,660,820 UART: [state] Locking Datavault
17,665,474 UART: [state] Locking PCR0, PCR1 and PCR31
17,667,174 UART: [state] Locking ICCM
17,669,059 UART: [exit] Launching FMC @ 0x40000130
17,677,457 UART:
17,677,692 UART: Running Caliptra FMC ...
17,678,787 UART:
17,678,942 UART: [state] CFI Enabled
17,680,885 UART: [art] Skip pcr extension
17,681,981 UART: [art] Extend RT PCRs Done
17,683,113 UART: [art] Lock RT PCRs Done
17,684,393 UART: [art] Populate DV Done
17,689,631 UART: [fht] FMC Alias Private Key: 7
17,691,322 UART: [art] Derive CDI
17,692,150 UART: [art] Store in slot 0x4
17,735,069 UART: [art] Derive Key Pair
17,736,113 UART: [art] Store priv key in slot 0x5
20,162,925 UART: [art] Derive Key Pair - Done
20,175,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,881,833 UART: [art] Erasing AUTHORITY.KEYID = 7
21,883,353 UART: [art] PUB.X = 45C581FADF3E27130F6A292E6E91D4BDA694B6380C2F1E143AF29CD754B5F541A1E044D9257A4671920265EC98805EED
21,890,619 UART: [art] PUB.Y = A011EC7E1355B8B2F957CB6DDDFCE5D958C5B429AE26AA0FD4BDE84D214DA5F19D573BAD421920D28F07629D2FE9592A
21,897,876 UART: [art] SIG.R = 2E84D738031DC76E618965A67113CC1A3A846E2A2CB7674E9C9237CDD902B44DC097D6CE72C4AD284681FC0B48BC45D8
21,905,286 UART: [art] SIG.S = 6A4DFE4CD806E09B8EB5532E3356F2941F25F3332DC30515C4C361958BFD3EB17FF7AFD2B136C8355D09CF803C4390F8
22,884,118 UART: Caliptra RT
22,884,813 UART: [state] CFI Enabled
23,261,111 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
3,775,473 ready_for_fw is high
3,775,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,475,998 >>> mbox cmd response: success
18,730,930 UART:
18,731,343 UART: Running Caliptra FMC ...
18,732,482 UART:
18,732,641 UART: [state] CFI Enabled
18,740,525 UART: [fht] FMC Alias Private Key: 7
20,506,393 UART: [art] Extend RT PCRs Done
20,507,634 UART: [art] Lock RT PCRs Done
20,509,104 UART: [art] Populate DV Done
20,514,523 UART: [fht] FMC Alias Private Key: 7
20,516,170 UART: [art] Derive CDI
20,517,006 UART: [art] Store in slot 0x4
20,559,501 UART: [art] Derive Key Pair
20,560,496 UART: [art] Store priv key in slot 0x5
22,986,665 UART: [art] Derive Key Pair - Done
22,999,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,705,704 UART: [art] Erasing AUTHORITY.KEYID = 7
24,707,211 UART: [art] PUB.X = CC48D9948884D8D24010957C71AFC0C6D4A4A12ADB5BD8DB52EE755E7CB3038D7B3FA589FBC227FAE7A812AF81A7AC25
24,714,526 UART: [art] PUB.Y = 2B5948BBA808DA52009DF3D03D62D95A956DF6724A6E91B08F98DD2406C74A55FABD77169BD24D19E41C681E32D6711B
24,721,749 UART: [art] SIG.R = F72147B78D6CB75E729439DB2CB203BE3E439BC387796030207838AFE0D423F910FD95B8228527C970FDF5B347917590
24,729,093 UART: [art] SIG.S = 8C754E0742FCED877A5B1B57C9929BB2950B08BC7C1A66FEA800AB9F29870A3DB687B17FC0B29A2D082E7DCD567D9271
25,708,050 UART: Caliptra RT
25,708,757 UART: [state] CFI Enabled
25,842,030 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
17,873,076 UART:
17,873,457 UART: Running Caliptra FMC ...
17,874,530 UART:
17,874,683 UART: [state] CFI Enabled
17,876,526 UART: [art] Skip pcr extension
17,877,640 UART: [art] Extend RT PCRs Done
17,878,784 UART: [art] Lock RT PCRs Done
17,879,990 UART: [art] Populate DV Done
17,885,559 UART: [fht] FMC Alias Private Key: 7
17,887,203 UART: [art] Derive CDI
17,888,015 UART: [art] Store in slot 0x4
17,930,470 UART: [art] Derive Key Pair
17,931,512 UART: [art] Store priv key in slot 0x5
20,358,675 UART: [art] Derive Key Pair - Done
20,371,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
22,078,253 UART: [art] Erasing AUTHORITY.KEYID = 7
22,079,762 UART: [art] PUB.X = CC48D9948884D8D24010957C71AFC0C6D4A4A12ADB5BD8DB52EE755E7CB3038D7B3FA589FBC227FAE7A812AF81A7AC25
22,087,057 UART: [art] PUB.Y = 2B5948BBA808DA52009DF3D03D62D95A956DF6724A6E91B08F98DD2406C74A55FABD77169BD24D19E41C681E32D6711B
22,094,286 UART: [art] SIG.R = F72147B78D6CB75E729439DB2CB203BE3E439BC387796030207838AFE0D423F910FD95B8228527C970FDF5B347917590
22,101,634 UART: [art] SIG.S = 8C754E0742FCED877A5B1B57C9929BB2950B08BC7C1A66FEA800AB9F29870A3DB687B17FC0B29A2D082E7DCD567D9271
23,080,574 UART: Caliptra RT
23,081,267 UART: [state] CFI Enabled
23,456,305 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,871 writing to cptra_bootfsm_go
191,537 UART:
191,897 UART: Running Caliptra ROM ...
193,050 UART:
193,204 UART: [state] CFI Enabled
266,610 UART: [state] LifecycleState = Production
268,818 UART: [state] DebugLocked = Yes
271,233 UART: [state] Starting the WD Timer 40000000 cycles
277,143 UART: [kat] SHA2-256
467,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,794 UART: [kat] ++
478,391 UART: [kat] sha1
489,575 UART: [kat] SHA2-256
492,583 UART: [kat] SHA2-384
499,487 UART: [kat] SHA2-512-ACC
502,064 UART: [kat] ECC-384
2,946,916 UART: [kat] HMAC-384Kdf
2,970,021 UART: [kat] LMS
3,501,816 UART: [kat] --
3,505,701 UART: [cold-reset] ++
3,506,709 UART: [fht] FHT @ 0x50003400
3,518,672 UART: [idev] ++
3,519,372 UART: [idev] CDI.KEYID = 6
3,520,391 UART: [idev] SUBJECT.KEYID = 7
3,521,489 UART: [idev] UDS.KEYID = 0
3,522,406 ready_for_fw is high
3,522,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,642 UART: [idev] Erasing UDS.KEYID = 0
6,027,115 UART: [idev] Sha1 KeyId Algorithm
6,050,214 UART: [idev] --
6,053,698 UART: [ldev] ++
6,054,380 UART: [ldev] CDI.KEYID = 6
6,055,290 UART: [ldev] SUBJECT.KEYID = 5
6,056,498 UART: [ldev] AUTHORITY.KEYID = 7
6,057,670 UART: [ldev] FE.KEYID = 1
6,098,031 UART: [ldev] Erasing FE.KEYID = 1
8,601,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,548 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,356,762 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,371,880 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,386,820 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,954 UART: [ldev] --
10,412,837 UART: [fwproc] Wait for Commands...
10,415,193 UART: [fwproc] Recv command 0x46574c44
10,417,167 UART: [fwproc] Recv'd Img size: 118548 bytes
13,953,559 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,032,311 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,155,913 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,715,561 >>> mbox cmd response: success
14,719,763 UART: [afmc] ++
14,720,453 UART: [afmc] CDI.KEYID = 6
14,721,706 UART: [afmc] SUBJECT.KEYID = 7
14,723,137 UART: [afmc] AUTHORITY.KEYID = 5
17,256,711 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,982,830 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,984,735 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
18,999,794 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,014,933 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,029,952 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,054,736 UART: [afmc] --
19,057,726 UART: [cold-reset] --
19,060,883 UART: [state] Locking Datavault
19,066,078 UART: [state] Locking PCR0, PCR1 and PCR31
19,068,262 UART: [state] Locking ICCM
19,070,693 UART: [exit] Launching FMC @ 0x40000130
19,079,318 UART:
19,079,592 UART: Running Caliptra FMC ...
19,080,722 UART:
19,080,902 UART: [state] CFI Enabled
19,138,069 UART: [fht] FMC Alias Private Key: 7
20,904,303 UART: [art] Extend RT PCRs Done
20,905,524 UART: [art] Lock RT PCRs Done
20,907,495 UART: [art] Populate DV Done
20,912,955 UART: [fht] FMC Alias Private Key: 7
20,914,675 UART: [art] Derive CDI
20,915,422 UART: [art] Store in slot 0x4
20,970,409 UART: [art] Derive Key Pair
20,971,399 UART: [art] Store priv key in slot 0x5
23,434,074 UART: [art] Derive Key Pair - Done
23,446,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,413 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,924 UART: [art] PUB.X = ECA65161A3F4C508025E79146A6C0CE6E0DB4D244170794D7377E26C3272E076A02CD824765F6895CBD91FED3DC5688E
25,168,178 UART: [art] PUB.Y = 11ACDEB566755582C991DF37C037387304D4BEC916029423F000498D91A6D8E542BEFC3D05C92CB1BBD7C96D5AC8481D
25,175,443 UART: [art] SIG.R = ADE545190E11D9D2018EC5A121A1A9F31244E4554EA206B30EB5848085611CF6BE0C0DB01B75B4C57AA6991718322523
25,182,793 UART: [art] SIG.S = E016179E831A2CBE6D10BB86437BAB8F937FB9CEFD2DAAD718757B2F1C0C4BCFCEB4381C49173442550B1A587A40F98A
26,161,236 UART: Caliptra RT
26,162,006 UART: [state] CFI Enabled
26,342,741 UART: [rt] RT listening for mailbox commands...
301 writing to cptra_bootfsm_go
543 UART:
685 UART: Running Caliptra ROM ...
1,731 UART:
1,875 UART: [state] CFI Enabled
70,699 UART: [state] LifecycleState = Production
72,629 UART: [state] DebugLocked = Yes
74,286 UART: [state] Starting the WD Timer 40000000 cycles
80,198 UART: [kat] SHA2-256
270,078 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
280,845 UART: [kat] ++
281,363 UART: [kat] sha1
293,967 UART: [kat] SHA2-256
296,965 UART: [kat] SHA2-384
302,288 UART: [kat] SHA2-512-ACC
304,838 UART: [kat] ECC-384
2,751,757 UART: [kat] HMAC-384Kdf
2,777,496 UART: [kat] LMS
3,309,048 UART: [kat] --
3,312,988 UART: [warm-reset] ++
3,316,481 UART: [warm-reset] --
3,319,483 UART: [state] Locking Datavault
3,321,645 UART: [state] Locking PCR0, PCR1 and PCR31
3,323,345 UART: [state] Locking ICCM
3,324,844 UART: [exit] Launching FMC @ 0x40000130
3,333,508 UART:
3,333,741 UART: Running Caliptra FMC ...
3,334,858 UART:
3,335,014 UART: [state] CFI Enabled
3,386,692 UART: [art] Skip pcr extension
3,387,842 UART: [art] Extend RT PCRs Done
3,388,987 UART: [art] Lock RT PCRs Done
3,390,052 UART: [art] Populate DV Done
3,395,512 UART: [fht] FMC Alias Private Key: 7
3,397,208 UART: [art] Derive CDI
3,398,016 UART: [art] Store in slot 0x4
3,455,334 UART: [art] Derive Key Pair
3,456,364 UART: [art] Store priv key in slot 0x5
5,919,106 UART: [art] Derive Key Pair - Done
5,932,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,644,878 UART: [art] Erasing AUTHORITY.KEYID = 7
7,646,375 UART: [art] PUB.X = ECA65161A3F4C508025E79146A6C0CE6E0DB4D244170794D7377E26C3272E076A02CD824765F6895CBD91FED3DC5688E
7,653,638 UART: [art] PUB.Y = 11ACDEB566755582C991DF37C037387304D4BEC916029423F000498D91A6D8E542BEFC3D05C92CB1BBD7C96D5AC8481D
7,660,907 UART: [art] SIG.R = ADE545190E11D9D2018EC5A121A1A9F31244E4554EA206B30EB5848085611CF6BE0C0DB01B75B4C57AA6991718322523
7,668,254 UART: [art] SIG.S = E016179E831A2CBE6D10BB86437BAB8F937FB9CEFD2DAAD718757B2F1C0C4BCFCEB4381C49173442550B1A587A40F98A
8,647,247 UART: Caliptra RT
8,647,965 UART: [state] CFI Enabled
9,066,809 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,437,853 ready_for_fw is high
3,438,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,874,306 >>> mbox cmd response: success
19,152,144 UART:
19,152,524 UART: Running Caliptra FMC ...
19,153,667 UART:
19,153,824 UART: [state] CFI Enabled
19,204,616 UART: [fht] FMC Alias Private Key: 7
20,970,987 UART: [art] Extend RT PCRs Done
20,972,209 UART: [art] Lock RT PCRs Done
20,973,690 UART: [art] Populate DV Done
20,979,056 UART: [fht] FMC Alias Private Key: 7
20,980,540 UART: [art] Derive CDI
20,981,278 UART: [art] Store in slot 0x4
21,036,964 UART: [art] Derive Key Pair
21,038,009 UART: [art] Store priv key in slot 0x5
23,501,013 UART: [art] Derive Key Pair - Done
23,513,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,241,680 UART: [art] PUB.X = B10B7A618894BD955EAFA0470608CD9D8D9F70F61C152F761EBBCE2883390870D2F0407DC9D7BCC203233B116922081B
25,248,950 UART: [art] PUB.Y = B9F6A1E4DE2278B557E85DBE88167F1AC2E02414479D225844C474998D8A26AA7F35D4A6B205921C4D3FC2B2C3EE9CCA
25,256,218 UART: [art] SIG.R = CBDC41A0540A9994BD2BBD8F34AAC0BEFF140707830EB5D722CE86DC7396A41A8383756A501D8CB7B30FFC8AF3C002C1
25,263,597 UART: [art] SIG.S = 6030538BC49B961B4EAC1D9AC165F98C845AF779B6C125D3EEA673DE074C82E5001D295C5DDC4387562C11B4F19FB58A
26,242,605 UART: Caliptra RT
26,243,312 UART: [state] CFI Enabled
26,422,937 UART: [rt] RT listening for mailbox commands...
298 writing to cptra_bootfsm_go
3,252,922 UART:
3,253,251 UART: Running Caliptra FMC ...
3,254,290 UART:
3,254,444 UART: [state] CFI Enabled
3,302,780 UART: [art] Skip pcr extension
3,303,889 UART: [art] Extend RT PCRs Done
3,304,955 UART: [art] Lock RT PCRs Done
3,306,341 UART: [art] Populate DV Done
3,311,836 UART: [fht] FMC Alias Private Key: 7
3,313,453 UART: [art] Derive CDI
3,314,201 UART: [art] Store in slot 0x4
3,371,700 UART: [art] Derive Key Pair
3,372,694 UART: [art] Store priv key in slot 0x5
5,835,112 UART: [art] Derive Key Pair - Done
5,848,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,560,181 UART: [art] Erasing AUTHORITY.KEYID = 7
7,561,662 UART: [art] PUB.X = B10B7A618894BD955EAFA0470608CD9D8D9F70F61C152F761EBBCE2883390870D2F0407DC9D7BCC203233B116922081B
7,568,909 UART: [art] PUB.Y = B9F6A1E4DE2278B557E85DBE88167F1AC2E02414479D225844C474998D8A26AA7F35D4A6B205921C4D3FC2B2C3EE9CCA
7,576,204 UART: [art] SIG.R = CBDC41A0540A9994BD2BBD8F34AAC0BEFF140707830EB5D722CE86DC7396A41A8383756A501D8CB7B30FFC8AF3C002C1
7,583,603 UART: [art] SIG.S = 6030538BC49B961B4EAC1D9AC165F98C845AF779B6C125D3EEA673DE074C82E5001D295C5DDC4387562C11B4F19FB58A
8,562,597 UART: Caliptra RT
8,563,313 UART: [state] CFI Enabled
8,982,627 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.89s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
191,748 UART:
192,140 UART: Running Caliptra ROM ...
193,334 UART:
603,086 UART: [state] CFI Enabled
619,733 UART: [state] LifecycleState = Production
621,930 UART: [state] DebugLocked = Yes
623,285 UART: [state] Starting the WD Timer 40000000 cycles
627,389 UART: [kat] SHA2-256
817,255 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,094 UART: [kat] ++
828,615 UART: [kat] sha1
840,151 UART: [kat] SHA2-256
843,162 UART: [kat] SHA2-384
850,073 UART: [kat] SHA2-512-ACC
852,664 UART: [kat] ECC-384
3,294,868 UART: [kat] HMAC-384Kdf
3,307,321 UART: [kat] LMS
3,839,141 UART: [kat] --
3,844,853 UART: [cold-reset] ++
3,847,354 UART: [fht] FHT @ 0x50003400
3,858,125 UART: [idev] ++
3,858,830 UART: [idev] CDI.KEYID = 6
3,859,716 UART: [idev] SUBJECT.KEYID = 7
3,860,960 UART: [idev] UDS.KEYID = 0
3,861,889 ready_for_fw is high
3,862,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,368 UART: [idev] Erasing UDS.KEYID = 0
6,336,753 UART: [idev] Sha1 KeyId Algorithm
6,360,698 UART: [idev] --
6,364,310 UART: [ldev] ++
6,364,992 UART: [ldev] CDI.KEYID = 6
6,365,904 UART: [ldev] SUBJECT.KEYID = 5
6,367,114 UART: [ldev] AUTHORITY.KEYID = 7
6,368,312 UART: [ldev] FE.KEYID = 1
6,377,773 UART: [ldev] Erasing FE.KEYID = 1
8,849,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,566,885 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,582,008 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,597,127 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,612,117 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,633,279 UART: [ldev] --
10,638,698 UART: [fwproc] Wait for Commands...
10,641,282 UART: [fwproc] Recv command 0x46574c44
10,643,272 UART: [fwproc] Recv'd Img size: 118548 bytes
14,176,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,253,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,377,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,938,018 >>> mbox cmd response: success
14,942,701 UART: [afmc] ++
14,943,430 UART: [afmc] CDI.KEYID = 6
14,944,620 UART: [afmc] SUBJECT.KEYID = 7
14,946,054 UART: [afmc] AUTHORITY.KEYID = 5
17,453,559 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,177,125 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,179,096 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
19,194,136 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
19,209,268 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
19,224,269 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
19,246,992 UART: [afmc] --
19,250,643 UART: [cold-reset] --
19,254,993 UART: [state] Locking Datavault
19,261,487 UART: [state] Locking PCR0, PCR1 and PCR31
19,263,628 UART: [state] Locking ICCM
19,266,645 UART: [exit] Launching FMC @ 0x40000130
19,275,326 UART:
19,275,617 UART: Running Caliptra FMC ...
19,276,729 UART:
19,276,890 UART: [state] CFI Enabled
19,284,935 UART: [fht] FMC Alias Private Key: 7
21,051,152 UART: [art] Extend RT PCRs Done
21,052,371 UART: [art] Lock RT PCRs Done
21,054,038 UART: [art] Populate DV Done
21,059,451 UART: [fht] FMC Alias Private Key: 7
21,061,096 UART: [art] Derive CDI
21,061,835 UART: [art] Store in slot 0x4
21,104,642 UART: [art] Derive Key Pair
21,105,635 UART: [art] Store priv key in slot 0x5
23,532,391 UART: [art] Derive Key Pair - Done
23,545,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,252,063 UART: [art] Erasing AUTHORITY.KEYID = 7
25,253,572 UART: [art] PUB.X = AF970D683CF76EE0D96286B64818074EDB1103BEF5FBC956487CD16EBF8359428D0359AFDECD49271EBB668B1427678A
25,260,853 UART: [art] PUB.Y = 9F5ADAC515C3AB5681139B85E6043859F95A6D9BB6F48305BACF2E3EB0269C2FC26F59142D1E4AA90D7CE3A1AB9DE23B
25,268,086 UART: [art] SIG.R = 822A28367DD8129C5BB9A7ABB29CD9BB9430C3BC9AF574A83C1FE43C1D60F6618DD31AE22F374D1CF646942FF6674642
25,275,567 UART: [art] SIG.S = AB68B090F26DC39DF61D0CE4A2874A3D0A6D703158B2EA05CB092AAF1A9EAC54F4741D10E4E7B42E2FB15C0E66BB70D0
26,253,973 UART: Caliptra RT
26,254,668 UART: [state] CFI Enabled
26,387,120 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
550 UART:
692 UART: Running Caliptra ROM ...
1,788 UART:
14,137,758 UART: [state] CFI Enabled
14,154,141 UART: [state] LifecycleState = Production
14,155,888 UART: [state] DebugLocked = Yes
14,157,631 UART: [state] Starting the WD Timer 40000000 cycles
14,162,055 UART: [kat] SHA2-256
14,351,895 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,362,823 UART: [kat] ++
14,363,417 UART: [kat] sha1
14,375,234 UART: [kat] SHA2-256
14,378,249 UART: [kat] SHA2-384
14,384,620 UART: [kat] SHA2-512-ACC
14,387,190 UART: [kat] ECC-384
16,828,275 UART: [kat] HMAC-384Kdf
16,841,581 UART: [kat] LMS
17,373,196 UART: [kat] --
17,377,581 UART: [warm-reset] ++
17,382,642 UART: [warm-reset] --
17,386,775 UART: [state] Locking Datavault
17,389,013 UART: [state] Locking PCR0, PCR1 and PCR31
17,390,718 UART: [state] Locking ICCM
17,392,981 UART: [exit] Launching FMC @ 0x40000130
17,401,605 UART:
17,401,858 UART: Running Caliptra FMC ...
17,402,964 UART:
17,403,121 UART: [state] CFI Enabled
17,405,282 UART: [art] Skip pcr extension
17,406,382 UART: [art] Extend RT PCRs Done
17,407,515 UART: [art] Lock RT PCRs Done
17,408,751 UART: [art] Populate DV Done
17,414,373 UART: [fht] FMC Alias Private Key: 7
17,415,908 UART: [art] Derive CDI
17,416,723 UART: [art] Store in slot 0x4
17,459,164 UART: [art] Derive Key Pair
17,460,203 UART: [art] Store priv key in slot 0x5
19,886,983 UART: [art] Derive Key Pair - Done
19,900,140 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,606,868 UART: [art] Erasing AUTHORITY.KEYID = 7
21,608,371 UART: [art] PUB.X = AF970D683CF76EE0D96286B64818074EDB1103BEF5FBC956487CD16EBF8359428D0359AFDECD49271EBB668B1427678A
21,615,693 UART: [art] PUB.Y = 9F5ADAC515C3AB5681139B85E6043859F95A6D9BB6F48305BACF2E3EB0269C2FC26F59142D1E4AA90D7CE3A1AB9DE23B
21,622,968 UART: [art] SIG.R = 822A28367DD8129C5BB9A7ABB29CD9BB9430C3BC9AF574A83C1FE43C1D60F6618DD31AE22F374D1CF646942FF6674642
21,630,366 UART: [art] SIG.S = AB68B090F26DC39DF61D0CE4A2874A3D0A6D703158B2EA05CB092AAF1A9EAC54F4741D10E4E7B42E2FB15C0E66BB70D0
22,609,675 UART: Caliptra RT
22,610,371 UART: [state] CFI Enabled
22,985,318 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,547 writing to cptra_bootfsm_go
3,756,806 ready_for_fw is high
3,757,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,080,136 >>> mbox cmd response: success
19,328,478 UART:
19,328,869 UART: Running Caliptra FMC ...
19,329,989 UART:
19,330,164 UART: [state] CFI Enabled
19,337,987 UART: [fht] FMC Alias Private Key: 7
21,103,839 UART: [art] Extend RT PCRs Done
21,105,134 UART: [art] Lock RT PCRs Done
21,106,804 UART: [art] Populate DV Done
21,112,146 UART: [fht] FMC Alias Private Key: 7
21,113,688 UART: [art] Derive CDI
21,114,427 UART: [art] Store in slot 0x4
21,157,346 UART: [art] Derive Key Pair
21,158,346 UART: [art] Store priv key in slot 0x5
23,585,276 UART: [art] Derive Key Pair - Done
23,598,164 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,304,793 UART: [art] Erasing AUTHORITY.KEYID = 7
25,306,302 UART: [art] PUB.X = 2618BD25A159CCEDA6162FF9D8745A7DF36E33E92A0322D8B48ABC4F88135B676D9E6451D66BC6A17AFB6AE8816DD56E
25,313,611 UART: [art] PUB.Y = 5A5184BDF6F6BA80E89CF54F1ECF5030DC5ED76FB035F7E330E37CE56E0D2AC553887BB099AF353B5D149005D0D208FF
25,320,867 UART: [art] SIG.R = 739C4000B30B0E716AE1AE948D458EDFBB77C1D1A96D3BCC06B4E5CEFBBE303A0F4DE206C1FADCA5A4BE61FC43911134
25,328,324 UART: [art] SIG.S = 48552B64FC16BFF5BFDFE66D32EAED1B693210D7213F4BBE59C5395DEAD8FC2E521B7A6F19932CF47464CE6143C2CF7E
26,306,931 UART: Caliptra RT
26,307,616 UART: [state] CFI Enabled
26,440,818 UART: [rt] RT listening for mailbox commands...
300 writing to cptra_bootfsm_go
17,248,578 UART:
17,248,923 UART: Running Caliptra FMC ...
17,249,961 UART:
17,250,109 UART: [state] CFI Enabled
17,252,170 UART: [art] Skip pcr extension
17,253,284 UART: [art] Extend RT PCRs Done
17,254,350 UART: [art] Lock RT PCRs Done
17,255,609 UART: [art] Populate DV Done
17,261,183 UART: [fht] FMC Alias Private Key: 7
17,262,775 UART: [art] Derive CDI
17,263,534 UART: [art] Store in slot 0x4
17,306,430 UART: [art] Derive Key Pair
17,307,493 UART: [art] Store priv key in slot 0x5
19,734,392 UART: [art] Derive Key Pair - Done
19,747,382 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
21,453,972 UART: [art] Erasing AUTHORITY.KEYID = 7
21,455,478 UART: [art] PUB.X = 2618BD25A159CCEDA6162FF9D8745A7DF36E33E92A0322D8B48ABC4F88135B676D9E6451D66BC6A17AFB6AE8816DD56E
21,462,778 UART: [art] PUB.Y = 5A5184BDF6F6BA80E89CF54F1ECF5030DC5ED76FB035F7E330E37CE56E0D2AC553887BB099AF353B5D149005D0D208FF
21,470,073 UART: [art] SIG.R = 739C4000B30B0E716AE1AE948D458EDFBB77C1D1A96D3BCC06B4E5CEFBBE303A0F4DE206C1FADCA5A4BE61FC43911134
21,477,471 UART: [art] SIG.S = 48552B64FC16BFF5BFDFE66D32EAED1B693210D7213F4BBE59C5395DEAD8FC2E521B7A6F19932CF47464CE6143C2CF7E
22,456,832 UART: Caliptra RT
22,457,522 UART: [state] CFI Enabled
22,833,748 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,173 UART: [state] LifecycleState = Production
85,781 UART: [state] DebugLocked = Yes
86,401 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,125 UART: [kat] SHA2-256
882,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,171 UART: [kat] ++
886,323 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
895,324 UART: [kat] SHA2-512-ACC
897,225 UART: [kat] ECC-384
902,698 UART: [kat] HMAC-384Kdf
907,314 UART: [kat] LMS
1,475,510 UART: [kat] --
1,476,469 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,917 UART: [idev] ++
1,480,085 UART: [idev] CDI.KEYID = 6
1,480,445 UART: [idev] SUBJECT.KEYID = 7
1,480,869 UART: [idev] UDS.KEYID = 0
1,481,214 ready_for_fw is high
1,481,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,680 UART: [idev] Erasing UDS.KEYID = 0
1,504,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,612 UART: [idev] --
1,514,581 UART: [ldev] ++
1,514,749 UART: [ldev] CDI.KEYID = 6
1,515,112 UART: [ldev] SUBJECT.KEYID = 5
1,515,538 UART: [ldev] AUTHORITY.KEYID = 7
1,516,001 UART: [ldev] FE.KEYID = 1
1,521,093 UART: [ldev] Erasing FE.KEYID = 1
1,546,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,565,531 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,571,403 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,109 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,173 UART: [ldev] --
1,585,530 UART: [fwproc] Waiting for Commands...
1,586,247 UART: [fwproc] Received command 0x46574c44
1,587,038 UART: [fwproc] Received Image of size 118548 bytes
2,956,712 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,983,567 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,014,785 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,155,045 >>> mbox cmd response: success
3,156,166 UART: [afmc] ++
3,156,334 UART: [afmc] CDI.KEYID = 6
3,156,696 UART: [afmc] SUBJECT.KEYID = 7
3,157,121 UART: [afmc] AUTHORITY.KEYID = 5
3,192,552 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,208,664 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,209,444 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,215,159 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,221,044 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,226,747 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,234,761 UART: [afmc] --
3,235,652 UART: [cold-reset] --
3,236,642 UART: [state] Locking Datavault
3,237,833 UART: [state] Locking PCR0, PCR1 and PCR31
3,238,437 UART: [state] Locking ICCM
3,239,025 UART: [exit] Launching FMC @ 0x40000130
3,244,355 UART:
3,244,371 UART: Running Caliptra FMC ...
3,244,779 UART:
3,244,833 UART: [state] CFI Enabled
3,255,415 UART: [fht] FMC Alias Private Key: 7
3,373,932 UART: [art] Extend RT PCRs Done
3,374,360 UART: [art] Lock RT PCRs Done
3,376,066 UART: [art] Populate DV Done
3,384,160 UART: [fht] FMC Alias Private Key: 7
3,385,274 UART: [art] Derive CDI
3,385,554 UART: [art] Store in slot 0x4
3,471,670 UART: [art] Derive Key Pair
3,472,030 UART: [art] Store priv key in slot 0x5
3,485,113 UART: [art] Derive Key Pair - Done
3,500,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,515,970 UART: [art] Erasing AUTHORITY.KEYID = 7
3,516,735 UART: [art] PUB.X = 47EBA9FB33E2179319B474DEDCE55523C5EDD118737A31D04BAA93D62A3018A4105152AF37089164BE32786F6C81613E
3,523,502 UART: [art] PUB.Y = 305FED8143EBE4720309170C61541EE1B2EFBCE0A1FFBAD570DFA5267896386C0910D4DA8A3903C591332DB19A06A3DA
3,530,444 UART: [art] SIG.R = 9896A5FC9F6868B410D457EE52A13266ABA8956EE64A429F4EE58E436796900881500BA3A3AF086418B3DD2A2C57B56D
3,537,205 UART: [art] SIG.S = 2636CC19C4BF598BE1BB6D003A538A866B9D828918121CDC114D7A0092C4D8235D878664AF12860F6B5586D525A3B414
3,561,030 UART: Caliptra RT
3,561,281 UART: [state] CFI Enabled
3,679,740 UART: [rt] RT listening for mailbox commands...
3,680,404 writing to cptra_bootfsm_go
3,680,499 UART:
3,680,515 UART: Running Caliptra ROM ...
3,680,923 UART:
3,680,977 UART: [state] CFI Enabled
3,683,686 UART: [state] LifecycleState = Production
3,684,294 UART: [state] DebugLocked = Yes
3,684,978 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,686,666 UART: [kat] SHA2-256
4,480,597 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,484,712 UART: [kat] ++
4,484,864 UART: [kat] sha1
4,489,228 UART: [kat] SHA2-256
4,491,166 UART: [kat] SHA2-384
4,494,057 UART: [kat] SHA2-512-ACC
4,495,958 UART: [kat] ECC-384
4,501,519 UART: [kat] HMAC-384Kdf
4,506,121 UART: [kat] LMS
5,074,317 UART: [kat] --
5,075,529 UART: [warm-reset] ++
5,076,508 UART: [warm-reset] --
5,077,111 UART: [state] Locking Datavault
5,078,133 UART: [state] Locking PCR0, PCR1 and PCR31
5,078,737 UART: [state] Locking ICCM
5,079,299 UART: [exit] Launching FMC @ 0x40000130
5,084,629 UART:
5,084,645 UART: Running Caliptra FMC ...
5,085,053 UART:
5,085,107 UART: [state] CFI Enabled
5,086,314 UART: [art] Skip pcr extension
5,086,723 UART: [art] Extend RT PCRs Done
5,087,151 UART: [art] Lock RT PCRs Done
5,088,278 UART: [art] Populate DV Done
5,096,640 UART: [fht] FMC Alias Private Key: 7
5,097,656 UART: [art] Derive CDI
5,097,936 UART: [art] Store in slot 0x4
5,183,666 UART: [art] Derive Key Pair
5,184,026 UART: [art] Store priv key in slot 0x5
5,197,995 UART: [art] Derive Key Pair - Done
5,212,591 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,227,966 UART: [art] Erasing AUTHORITY.KEYID = 7
5,228,731 UART: [art] PUB.X = 47EBA9FB33E2179319B474DEDCE55523C5EDD118737A31D04BAA93D62A3018A4105152AF37089164BE32786F6C81613E
5,235,498 UART: [art] PUB.Y = 305FED8143EBE4720309170C61541EE1B2EFBCE0A1FFBAD570DFA5267896386C0910D4DA8A3903C591332DB19A06A3DA
5,242,440 UART: [art] SIG.R = 9896A5FC9F6868B410D457EE52A13266ABA8956EE64A429F4EE58E436796900881500BA3A3AF086418B3DD2A2C57B56D
5,249,201 UART: [art] SIG.S = 2636CC19C4BF598BE1BB6D003A538A866B9D828918121CDC114D7A0092C4D8235D878664AF12860F6B5586D525A3B414
5,272,826 UART: Caliptra RT
5,273,077 UART: [state] CFI Enabled
5,638,323 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,350 ready_for_fw is high
1,363,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,006,829 >>> mbox cmd response: success
3,068,405 UART:
3,068,421 UART: Running Caliptra FMC ...
3,068,829 UART:
3,068,883 UART: [state] CFI Enabled
3,079,011 UART: [fht] FMC Alias Private Key: 7
3,197,954 UART: [art] Extend RT PCRs Done
3,198,382 UART: [art] Lock RT PCRs Done
3,199,944 UART: [art] Populate DV Done
3,208,204 UART: [fht] FMC Alias Private Key: 7
3,209,386 UART: [art] Derive CDI
3,209,666 UART: [art] Store in slot 0x4
3,295,144 UART: [art] Derive Key Pair
3,295,504 UART: [art] Store priv key in slot 0x5
3,308,931 UART: [art] Derive Key Pair - Done
3,324,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,339,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,340,502 UART: [art] PUB.X = 0416790982AA01333A3838EB0D9B4DB523337A29C5C59E78E7639AB21047B1E8716AF41B07DA9C45491805AEB6876191
3,347,246 UART: [art] PUB.Y = 64826A3DBBF6103C98010D9390530A38D9C4ED10EAE2342CB3ECBAF11D73DD52ED3BAE708F7689AEFE2D3AAD2A4F2C00
3,354,187 UART: [art] SIG.R = 64271A577EBEA9E8D8536707AE32DB8BBB7941D0CCB5134A8BD96027631F2883BBEE932CDADF5A3425317ED1D0FB343E
3,360,968 UART: [art] SIG.S = C469DF5E47F88D62D3D625B4EDB3BFE1B79B0DB96006FD7AA76DDA62D49A3E8FEACFAD23C4F7D6ACEEB8B6123A6800C3
3,384,584 UART: Caliptra RT
3,384,835 UART: [state] CFI Enabled
3,503,540 UART: [rt] RT listening for mailbox commands...
3,504,204 writing to cptra_bootfsm_go
4,788,741 UART:
4,788,757 UART: Running Caliptra FMC ...
4,789,165 UART:
4,789,219 UART: [state] CFI Enabled
4,790,330 UART: [art] Skip pcr extension
4,790,739 UART: [art] Extend RT PCRs Done
4,791,167 UART: [art] Lock RT PCRs Done
4,792,496 UART: [art] Populate DV Done
4,800,716 UART: [fht] FMC Alias Private Key: 7
4,801,648 UART: [art] Derive CDI
4,801,928 UART: [art] Store in slot 0x4
4,887,530 UART: [art] Derive Key Pair
4,887,890 UART: [art] Store priv key in slot 0x5
4,901,067 UART: [art] Derive Key Pair - Done
4,915,970 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,931,419 UART: [art] Erasing AUTHORITY.KEYID = 7
4,932,184 UART: [art] PUB.X = 0416790982AA01333A3838EB0D9B4DB523337A29C5C59E78E7639AB21047B1E8716AF41B07DA9C45491805AEB6876191
4,938,928 UART: [art] PUB.Y = 64826A3DBBF6103C98010D9390530A38D9C4ED10EAE2342CB3ECBAF11D73DD52ED3BAE708F7689AEFE2D3AAD2A4F2C00
4,945,869 UART: [art] SIG.R = 64271A577EBEA9E8D8536707AE32DB8BBB7941D0CCB5134A8BD96027631F2883BBEE932CDADF5A3425317ED1D0FB343E
4,952,650 UART: [art] SIG.S = C469DF5E47F88D62D3D625B4EDB3BFE1B79B0DB96006FD7AA76DDA62D49A3E8FEACFAD23C4F7D6ACEEB8B6123A6800C3
4,976,308 UART: Caliptra RT
4,976,559 UART: [state] CFI Enabled
5,342,203 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Production
86,230 UART: [state] DebugLocked = Yes
86,894 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,478 UART: [kat] SHA2-256
882,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,524 UART: [kat] ++
886,676 UART: [kat] sha1
890,974 UART: [kat] SHA2-256
892,912 UART: [kat] SHA2-384
895,655 UART: [kat] SHA2-512-ACC
897,556 UART: [kat] ECC-384
903,249 UART: [kat] HMAC-384Kdf
907,787 UART: [kat] LMS
1,475,983 UART: [kat] --
1,476,798 UART: [cold-reset] ++
1,477,171 UART: [fht] Storing FHT @ 0x50003400
1,479,972 UART: [idev] ++
1,480,140 UART: [idev] CDI.KEYID = 6
1,480,500 UART: [idev] SUBJECT.KEYID = 7
1,480,924 UART: [idev] UDS.KEYID = 0
1,481,269 ready_for_fw is high
1,481,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,037 UART: [idev] Erasing UDS.KEYID = 0
1,505,828 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,401 UART: [idev] --
1,515,648 UART: [ldev] ++
1,515,816 UART: [ldev] CDI.KEYID = 6
1,516,179 UART: [ldev] SUBJECT.KEYID = 5
1,516,605 UART: [ldev] AUTHORITY.KEYID = 7
1,517,068 UART: [ldev] FE.KEYID = 1
1,522,052 UART: [ldev] Erasing FE.KEYID = 1
1,547,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,996 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,690 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,562 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,268 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,330 UART: [ldev] --
1,586,703 UART: [fwproc] Waiting for Commands...
1,587,562 UART: [fwproc] Received command 0x46574c44
1,588,353 UART: [fwproc] Received Image of size 118548 bytes
2,957,779 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,020 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,016,238 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,156,678 >>> mbox cmd response: success
3,157,805 UART: [afmc] ++
3,157,973 UART: [afmc] CDI.KEYID = 6
3,158,335 UART: [afmc] SUBJECT.KEYID = 7
3,158,760 UART: [afmc] AUTHORITY.KEYID = 5
3,194,259 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,210,621 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,211,401 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
3,217,116 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
3,223,001 UART: [afmc] SIG.R = B6EC55130ED942036CE4A82B4CDD116AED43F336B0180B7A2B8FD4EFD298F2C817D171686A04F709F75C8FED7D7C1469
3,228,704 UART: [afmc] SIG.S = C8DFC61996ED41C68D7B7EF15F343B65F4F23958D53080539B38C3971B2E9F70247AE36C18741F165A3D5E4C0CFAD07B
3,236,384 UART: [afmc] --
3,237,341 UART: [cold-reset] --
3,238,309 UART: [state] Locking Datavault
3,239,378 UART: [state] Locking PCR0, PCR1 and PCR31
3,239,982 UART: [state] Locking ICCM
3,240,600 UART: [exit] Launching FMC @ 0x40000130
3,245,930 UART:
3,245,946 UART: Running Caliptra FMC ...
3,246,354 UART:
3,246,497 UART: [state] CFI Enabled
3,256,867 UART: [fht] FMC Alias Private Key: 7
3,375,634 UART: [art] Extend RT PCRs Done
3,376,062 UART: [art] Lock RT PCRs Done
3,377,800 UART: [art] Populate DV Done
3,386,162 UART: [fht] FMC Alias Private Key: 7
3,387,128 UART: [art] Derive CDI
3,387,408 UART: [art] Store in slot 0x4
3,473,280 UART: [art] Derive Key Pair
3,473,640 UART: [art] Store priv key in slot 0x5
3,486,757 UART: [art] Derive Key Pair - Done
3,501,911 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,517,240 UART: [art] Erasing AUTHORITY.KEYID = 7
3,518,005 UART: [art] PUB.X = 0E5FDCB59559ED9B4E770D95EDF850C68B0EED43F36AEC2D40D8767C935E87657995A7416B5431756A6497A36AE0A809
3,524,767 UART: [art] PUB.Y = 99139460D2EB18610AEA30FD38F40D578F2019FDD1B055B1EE8C52C03BDC614464E0DAA91E193E430B86C5D27CB455E3
3,531,716 UART: [art] SIG.R = 18ED777997B5B1771B70E79123D64A2E637BDA357746BD800F142A0D677A799A9433B636CC00CABB1F38686FB25ED7F4
3,538,460 UART: [art] SIG.S = 11FCF9CC52EE069394673A633D04894C1901A2CA303335EEDFB5B4ACDC909B6A1E6C2348F808459C5E3821218FF1173C
3,562,030 UART: Caliptra RT
3,562,373 UART: [state] CFI Enabled
3,681,329 UART: [rt] RT listening for mailbox commands...
3,681,993 writing to cptra_bootfsm_go
3,682,088 UART:
3,682,104 UART: Running Caliptra ROM ...
3,682,512 UART:
3,682,653 UART: [state] CFI Enabled
3,685,730 UART: [state] LifecycleState = Production
3,686,338 UART: [state] DebugLocked = Yes
3,687,060 UART: [state] Starting the Watchdog Timer 40000000 cycles
3,688,668 UART: [kat] SHA2-256
4,482,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,486,714 UART: [kat] ++
4,486,866 UART: [kat] sha1
4,491,006 UART: [kat] SHA2-256
4,492,944 UART: [kat] SHA2-384
4,495,763 UART: [kat] SHA2-512-ACC
4,497,664 UART: [kat] ECC-384
4,503,047 UART: [kat] HMAC-384Kdf
4,507,509 UART: [kat] LMS
5,075,705 UART: [kat] --
5,076,537 UART: [warm-reset] ++
5,077,314 UART: [warm-reset] --
5,078,299 UART: [state] Locking Datavault
5,079,151 UART: [state] Locking PCR0, PCR1 and PCR31
5,079,755 UART: [state] Locking ICCM
5,080,251 UART: [exit] Launching FMC @ 0x40000130
5,085,581 UART:
5,085,597 UART: Running Caliptra FMC ...
5,086,005 UART:
5,086,148 UART: [state] CFI Enabled
5,087,733 UART: [art] Skip pcr extension
5,088,142 UART: [art] Extend RT PCRs Done
5,088,570 UART: [art] Lock RT PCRs Done
5,089,705 UART: [art] Populate DV Done
5,097,987 UART: [fht] FMC Alias Private Key: 7
5,098,937 UART: [art] Derive CDI
5,099,217 UART: [art] Store in slot 0x4
5,185,111 UART: [art] Derive Key Pair
5,185,471 UART: [art] Store priv key in slot 0x5
5,198,470 UART: [art] Derive Key Pair - Done
5,213,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,228,935 UART: [art] Erasing AUTHORITY.KEYID = 7
5,229,700 UART: [art] PUB.X = 0E5FDCB59559ED9B4E770D95EDF850C68B0EED43F36AEC2D40D8767C935E87657995A7416B5431756A6497A36AE0A809
5,236,462 UART: [art] PUB.Y = 99139460D2EB18610AEA30FD38F40D578F2019FDD1B055B1EE8C52C03BDC614464E0DAA91E193E430B86C5D27CB455E3
5,243,411 UART: [art] SIG.R = 18ED777997B5B1771B70E79123D64A2E637BDA357746BD800F142A0D677A799A9433B636CC00CABB1F38686FB25ED7F4
5,250,155 UART: [art] SIG.S = 11FCF9CC52EE069394673A633D04894C1901A2CA303335EEDFB5B4ACDC909B6A1E6C2348F808459C5E3821218FF1173C
5,273,711 UART: Caliptra RT
5,274,054 UART: [state] CFI Enabled
5,640,393 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,393 ready_for_fw is high
1,363,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,007,232 >>> mbox cmd response: success
3,069,888 UART:
3,069,904 UART: Running Caliptra FMC ...
3,070,312 UART:
3,070,455 UART: [state] CFI Enabled
3,081,109 UART: [fht] FMC Alias Private Key: 7
3,199,028 UART: [art] Extend RT PCRs Done
3,199,456 UART: [art] Lock RT PCRs Done
3,201,150 UART: [art] Populate DV Done
3,209,354 UART: [fht] FMC Alias Private Key: 7
3,210,468 UART: [art] Derive CDI
3,210,748 UART: [art] Store in slot 0x4
3,296,376 UART: [art] Derive Key Pair
3,296,736 UART: [art] Store priv key in slot 0x5
3,310,201 UART: [art] Derive Key Pair - Done
3,324,680 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,340,563 UART: [art] Erasing AUTHORITY.KEYID = 7
3,341,328 UART: [art] PUB.X = 0884F1A7E4DE9F33846DA9E3E2F32C919EBAEB1B4213C4E6E4BF8EDB9C5ED09913AA86962719C665195A10FCCA13E0D2
3,348,111 UART: [art] PUB.Y = F56BB70AEC12E3DF21880F07B3FBCAAC6CB875BF2B0961102026CC3AF3E9FEA95BBB3FCFD0AF59E94E218403D8D1128A
3,355,072 UART: [art] SIG.R = 9390FADB013888FE6E9FF2217E9985BD6D9EF563F97489EC0059134EADABF5E90AF310DD6D33D809A69BF240165B5529
3,361,819 UART: [art] SIG.S = 089F026CB4DF27A41593486167617BEC39EBE849949E7EFA87F442157AC9AF2EA907A91419798A6BB1F4336E02911280
3,385,615 UART: Caliptra RT
3,385,958 UART: [state] CFI Enabled
3,505,037 UART: [rt] RT listening for mailbox commands...
3,505,701 writing to cptra_bootfsm_go
4,791,319 UART:
4,791,335 UART: Running Caliptra FMC ...
4,791,743 UART:
4,791,886 UART: [state] CFI Enabled
4,793,491 UART: [art] Skip pcr extension
4,793,900 UART: [art] Extend RT PCRs Done
4,794,328 UART: [art] Lock RT PCRs Done
4,795,685 UART: [art] Populate DV Done
4,803,707 UART: [fht] FMC Alias Private Key: 7
4,804,713 UART: [art] Derive CDI
4,804,993 UART: [art] Store in slot 0x4
4,891,047 UART: [art] Derive Key Pair
4,891,407 UART: [art] Store priv key in slot 0x5
4,904,922 UART: [art] Derive Key Pair - Done
4,919,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,935,150 UART: [art] Erasing AUTHORITY.KEYID = 7
4,935,915 UART: [art] PUB.X = 0884F1A7E4DE9F33846DA9E3E2F32C919EBAEB1B4213C4E6E4BF8EDB9C5ED09913AA86962719C665195A10FCCA13E0D2
4,942,698 UART: [art] PUB.Y = F56BB70AEC12E3DF21880F07B3FBCAAC6CB875BF2B0961102026CC3AF3E9FEA95BBB3FCFD0AF59E94E218403D8D1128A
4,949,659 UART: [art] SIG.R = 9390FADB013888FE6E9FF2217E9985BD6D9EF563F97489EC0059134EADABF5E90AF310DD6D33D809A69BF240165B5529
4,956,406 UART: [art] SIG.S = 089F026CB4DF27A41593486167617BEC39EBE849949E7EFA87F442157AC9AF2EA907A91419798A6BB1F4336E02911280
4,980,648 UART: Caliptra RT
4,980,991 UART: [state] CFI Enabled
5,348,139 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,947 UART: [state] LifecycleState = Production
85,555 UART: [state] DebugLocked = Yes
86,097 UART: [state] Starting the WD Timer 40000000 cycles
87,656 UART: [kat] SHA2-256
891,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,310 UART: [kat] ++
895,462 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,231 UART: [kat] SHA2-512-ACC
906,132 UART: [kat] ECC-384
915,693 UART: [kat] HMAC-384Kdf
920,253 UART: [kat] LMS
1,168,565 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,170,059 UART: [fht] FHT @ 0x50003400
1,172,717 UART: [idev] ++
1,172,885 UART: [idev] CDI.KEYID = 6
1,173,246 UART: [idev] SUBJECT.KEYID = 7
1,173,671 UART: [idev] UDS.KEYID = 0
1,174,017 ready_for_fw is high
1,174,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,198,448 UART: [idev] Sha1 KeyId Algorithm
1,207,435 UART: [idev] --
1,208,584 UART: [ldev] ++
1,208,752 UART: [ldev] CDI.KEYID = 6
1,209,116 UART: [ldev] SUBJECT.KEYID = 5
1,209,543 UART: [ldev] AUTHORITY.KEYID = 7
1,210,006 UART: [ldev] FE.KEYID = 1
1,215,246 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,789 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,483 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,353 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,059 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,199 UART: [ldev] --
1,281,604 UART: [fwproc] Wait for Commands...
1,282,411 UART: [fwproc] Recv command 0x46574c44
1,283,144 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,233 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,341 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,516 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,900 >>> mbox cmd response: success
2,852,121 UART: [afmc] ++
2,852,289 UART: [afmc] CDI.KEYID = 6
2,852,652 UART: [afmc] SUBJECT.KEYID = 7
2,853,078 UART: [afmc] AUTHORITY.KEYID = 5
2,888,565 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,010 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,905,759 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,475 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,358 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,063 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,930,847 UART: [afmc] --
2,931,733 UART: [cold-reset] --
2,932,659 UART: [state] Locking Datavault
2,933,816 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,420 UART: [state] Locking ICCM
2,934,874 UART: [exit] Launching FMC @ 0x40000130
2,940,204 UART:
2,940,220 UART: Running Caliptra FMC ...
2,940,628 UART:
2,940,682 UART: [state] CFI Enabled
2,951,380 UART: [fht] FMC Alias Private Key: 7
3,069,899 UART: [art] Extend RT PCRs Done
3,070,327 UART: [art] Lock RT PCRs Done
3,072,289 UART: [art] Populate DV Done
3,080,201 UART: [fht] FMC Alias Private Key: 7
3,081,219 UART: [art] Derive CDI
3,081,499 UART: [art] Store in slot 0x4
3,166,992 UART: [art] Derive Key Pair
3,167,352 UART: [art] Store priv key in slot 0x5
3,180,400 UART: [art] Derive Key Pair - Done
3,195,189 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,210,864 UART: [art] Erasing AUTHORITY.KEYID = 7
3,211,629 UART: [art] PUB.X = 39F94EAE3D00D5607088F80E90EB15E2634F3AEA0A0F5FBA395B83352CF1E1FEE16E871DEAD6AFB3341A11FE0E696C30
3,218,383 UART: [art] PUB.Y = 04A7FE5EC5322BB1380A38310AF3D90406864AD4E86CAA192407D8D3967B4E9FF0DD995FDA84BC929A4455B31416672D
3,225,319 UART: [art] SIG.R = FA28D739E23EBF880568BD7BDF677F5EBCF764C73D0CFB611852B75A17388FE8C84B6207EF073182E5AF3341B7DB1B42
3,232,089 UART: [art] SIG.S = 8A4A0134B148FAE338E848BD0B868E3623208443F93F356AFB14A92DB7813E553B655AB7E039B8E33701A8021B27E9B9
3,255,695 UART: Caliptra RT
3,255,946 UART: [state] CFI Enabled
3,375,176 UART: [rt] RT listening for mailbox commands...
3,375,840 writing to cptra_bootfsm_go
3,375,932 UART:
3,375,948 UART: Running Caliptra ROM ...
3,376,356 UART:
3,376,411 UART: [state] CFI Enabled
3,379,484 UART: [state] LifecycleState = Production
3,380,092 UART: [state] DebugLocked = Yes
3,380,680 UART: [state] Starting the WD Timer 40000000 cycles
3,382,175 UART: [kat] SHA2-256
4,185,725 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,189,829 UART: [kat] ++
4,189,981 UART: [kat] sha1
4,194,371 UART: [kat] SHA2-256
4,196,311 UART: [kat] SHA2-384
4,199,288 UART: [kat] SHA2-512-ACC
4,201,189 UART: [kat] ECC-384
4,210,742 UART: [kat] HMAC-384Kdf
4,215,230 UART: [kat] LMS
4,463,542 UART: [kat] --
4,464,392 UART: [warm-reset] ++
4,465,329 UART: [warm-reset] --
4,466,038 UART: [state] Locking Datavault
4,466,982 UART: [state] Locking PCR0, PCR1 and PCR31
4,467,586 UART: [state] Locking ICCM
4,468,132 UART: [exit] Launching FMC @ 0x40000130
4,473,462 UART:
4,473,478 UART: Running Caliptra FMC ...
4,473,886 UART:
4,473,940 UART: [state] CFI Enabled
4,475,137 UART: [art] Skip pcr extension
4,475,546 UART: [art] Extend RT PCRs Done
4,475,974 UART: [art] Lock RT PCRs Done
4,477,235 UART: [art] Populate DV Done
4,485,469 UART: [fht] FMC Alias Private Key: 7
4,486,583 UART: [art] Derive CDI
4,486,863 UART: [art] Store in slot 0x4
4,572,384 UART: [art] Derive Key Pair
4,572,744 UART: [art] Store priv key in slot 0x5
4,586,082 UART: [art] Derive Key Pair - Done
4,600,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,616,474 UART: [art] Erasing AUTHORITY.KEYID = 7
4,617,239 UART: [art] PUB.X = 39F94EAE3D00D5607088F80E90EB15E2634F3AEA0A0F5FBA395B83352CF1E1FEE16E871DEAD6AFB3341A11FE0E696C30
4,623,993 UART: [art] PUB.Y = 04A7FE5EC5322BB1380A38310AF3D90406864AD4E86CAA192407D8D3967B4E9FF0DD995FDA84BC929A4455B31416672D
4,630,929 UART: [art] SIG.R = FA28D739E23EBF880568BD7BDF677F5EBCF764C73D0CFB611852B75A17388FE8C84B6207EF073182E5AF3341B7DB1B42
4,637,699 UART: [art] SIG.S = 8A4A0134B148FAE338E848BD0B868E3623208443F93F356AFB14A92DB7813E553B655AB7E039B8E33701A8021B27E9B9
4,661,579 UART: Caliptra RT
4,661,830 UART: [state] CFI Enabled
5,026,197 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,553 ready_for_fw is high
1,059,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,247 >>> mbox cmd response: success
2,764,208 UART:
2,764,224 UART: Running Caliptra FMC ...
2,764,632 UART:
2,764,686 UART: [state] CFI Enabled
2,775,056 UART: [fht] FMC Alias Private Key: 7
2,893,989 UART: [art] Extend RT PCRs Done
2,894,417 UART: [art] Lock RT PCRs Done
2,895,917 UART: [art] Populate DV Done
2,904,193 UART: [fht] FMC Alias Private Key: 7
2,905,131 UART: [art] Derive CDI
2,905,411 UART: [art] Store in slot 0x4
2,991,296 UART: [art] Derive Key Pair
2,991,656 UART: [art] Store priv key in slot 0x5
3,004,856 UART: [art] Derive Key Pair - Done
3,019,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,034,996 UART: [art] Erasing AUTHORITY.KEYID = 7
3,035,761 UART: [art] PUB.X = F97152A98AC4DB77753BD2FE379A6A0B222A0859C610483D845261621D7B0AC8C4DBA87657BCC27FFF13C11AF3B19CB2
3,042,532 UART: [art] PUB.Y = 0CC39D9314E68B84E8BCBE244F5A1FF099A7D5BA344B27563DA69B99FFAB355204C3988FE12A9FED8BE21A3EF79AE013
3,049,494 UART: [art] SIG.R = 1C31422C11546860756D2F526D564A760E17BF9E5FEA24B05EBF20448D2835B2972DA15820661436151AAC1FDE870B89
3,056,252 UART: [art] SIG.S = D929BF83E04C744E42074391BA61AC3C9D7242EA1DB9F479D2D0075246F0E588C0C27060E3E4F0BB04994FABD07BA01E
3,080,033 UART: Caliptra RT
3,080,284 UART: [state] CFI Enabled
3,198,772 UART: [rt] RT listening for mailbox commands...
3,199,436 writing to cptra_bootfsm_go
4,180,969 UART:
4,180,985 UART: Running Caliptra FMC ...
4,181,393 UART:
4,181,447 UART: [state] CFI Enabled
4,182,530 UART: [art] Skip pcr extension
4,182,939 UART: [art] Extend RT PCRs Done
4,183,367 UART: [art] Lock RT PCRs Done
4,184,576 UART: [art] Populate DV Done
4,192,964 UART: [fht] FMC Alias Private Key: 7
4,193,906 UART: [art] Derive CDI
4,194,186 UART: [art] Store in slot 0x4
4,280,005 UART: [art] Derive Key Pair
4,280,365 UART: [art] Store priv key in slot 0x5
4,293,691 UART: [art] Derive Key Pair - Done
4,308,550 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,323,987 UART: [art] Erasing AUTHORITY.KEYID = 7
4,324,752 UART: [art] PUB.X = F97152A98AC4DB77753BD2FE379A6A0B222A0859C610483D845261621D7B0AC8C4DBA87657BCC27FFF13C11AF3B19CB2
4,331,523 UART: [art] PUB.Y = 0CC39D9314E68B84E8BCBE244F5A1FF099A7D5BA344B27563DA69B99FFAB355204C3988FE12A9FED8BE21A3EF79AE013
4,338,485 UART: [art] SIG.R = 1C31422C11546860756D2F526D564A760E17BF9E5FEA24B05EBF20448D2835B2972DA15820661436151AAC1FDE870B89
4,345,243 UART: [art] SIG.S = D929BF83E04C744E42074391BA61AC3C9D7242EA1DB9F479D2D0075246F0E588C0C27060E3E4F0BB04994FABD07BA01E
4,369,292 UART: Caliptra RT
4,369,543 UART: [state] CFI Enabled
4,739,188 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,206 UART: [state] LifecycleState = Production
85,814 UART: [state] DebugLocked = Yes
86,572 UART: [state] Starting the WD Timer 40000000 cycles
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,213 UART: [kat] SHA2-256
902,153 UART: [kat] SHA2-384
904,932 UART: [kat] SHA2-512-ACC
906,833 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,052 UART: [kat] LMS
1,169,364 UART: [kat] --
1,169,969 UART: [cold-reset] ++
1,170,338 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 ready_for_fw is high
1,174,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,070 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,930 UART: [idev] --
1,209,095 UART: [ldev] ++
1,209,263 UART: [ldev] CDI.KEYID = 6
1,209,627 UART: [ldev] SUBJECT.KEYID = 5
1,210,054 UART: [ldev] AUTHORITY.KEYID = 7
1,210,517 UART: [ldev] FE.KEYID = 1
1,215,961 UART: [ldev] Erasing FE.KEYID = 1
1,241,928 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,602 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,296 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,166 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,272,872 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,279,828 UART: [ldev] --
1,281,237 UART: [fwproc] Wait for Commands...
1,281,934 UART: [fwproc] Recv command 0x46574c44
1,282,667 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,678,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,017 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,383 >>> mbox cmd response: success
2,851,470 UART: [afmc] ++
2,851,638 UART: [afmc] CDI.KEYID = 6
2,852,001 UART: [afmc] SUBJECT.KEYID = 7
2,852,427 UART: [afmc] AUTHORITY.KEYID = 5
2,888,784 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,905,263 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,906,012 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,911,728 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,917,611 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,923,316 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,931,076 UART: [afmc] --
2,932,050 UART: [cold-reset] --
2,932,980 UART: [state] Locking Datavault
2,933,997 UART: [state] Locking PCR0, PCR1 and PCR31
2,934,601 UART: [state] Locking ICCM
2,935,191 UART: [exit] Launching FMC @ 0x40000130
2,940,521 UART:
2,940,537 UART: Running Caliptra FMC ...
2,940,945 UART:
2,941,088 UART: [state] CFI Enabled
2,951,884 UART: [fht] FMC Alias Private Key: 7
3,070,741 UART: [art] Extend RT PCRs Done
3,071,169 UART: [art] Lock RT PCRs Done
3,072,683 UART: [art] Populate DV Done
3,080,875 UART: [fht] FMC Alias Private Key: 7
3,081,959 UART: [art] Derive CDI
3,082,239 UART: [art] Store in slot 0x4
3,168,220 UART: [art] Derive Key Pair
3,168,580 UART: [art] Store priv key in slot 0x5
3,181,488 UART: [art] Derive Key Pair - Done
3,196,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,211,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,212,404 UART: [art] PUB.X = 5AE9962FC589CA177F47B291E0A9DB98C04843B448C041CC4D687AC1F62CCEE47E4C1B12D3593186034B6900C2A1332F
3,219,153 UART: [art] PUB.Y = 7217DA2CB9F119E460F136BB424C23C2E3446AF919BE7D7D3B27708206AF2C5FA12247AF1077A2EB8BEB9553E9993933
3,226,104 UART: [art] SIG.R = 2CFCF8F196FC80921830BFE47BCBC0C2F15ED7753ACBED0D9EAC1B9FBA84C3DEFF629C0E68931EA599BFE95E83C46278
3,232,896 UART: [art] SIG.S = CBA4D490F83792BE8D1BBE6507994C17218391E8457563475C0687D9B7BB274D84980EDCEAA7911A998602CE52D57317
3,256,618 UART: Caliptra RT
3,256,961 UART: [state] CFI Enabled
3,376,867 UART: [rt] RT listening for mailbox commands...
3,377,531 writing to cptra_bootfsm_go
3,377,623 UART:
3,377,639 UART: Running Caliptra ROM ...
3,378,047 UART:
3,378,189 UART: [state] CFI Enabled
3,380,794 UART: [state] LifecycleState = Production
3,381,402 UART: [state] DebugLocked = Yes
3,382,146 UART: [state] Starting the WD Timer 40000000 cycles
3,383,619 UART: [kat] SHA2-256
4,187,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,191,273 UART: [kat] ++
4,191,425 UART: [kat] sha1
4,195,491 UART: [kat] SHA2-256
4,197,431 UART: [kat] SHA2-384
4,200,196 UART: [kat] SHA2-512-ACC
4,202,097 UART: [kat] ECC-384
4,211,926 UART: [kat] HMAC-384Kdf
4,216,498 UART: [kat] LMS
4,464,810 UART: [kat] --
4,465,670 UART: [warm-reset] ++
4,466,485 UART: [warm-reset] --
4,467,214 UART: [state] Locking Datavault
4,467,906 UART: [state] Locking PCR0, PCR1 and PCR31
4,468,510 UART: [state] Locking ICCM
4,469,060 UART: [exit] Launching FMC @ 0x40000130
4,474,390 UART:
4,474,406 UART: Running Caliptra FMC ...
4,474,814 UART:
4,474,957 UART: [state] CFI Enabled
4,476,292 UART: [art] Skip pcr extension
4,476,701 UART: [art] Extend RT PCRs Done
4,477,129 UART: [art] Lock RT PCRs Done
4,478,346 UART: [art] Populate DV Done
4,486,574 UART: [fht] FMC Alias Private Key: 7
4,487,736 UART: [art] Derive CDI
4,488,016 UART: [art] Store in slot 0x4
4,574,063 UART: [art] Derive Key Pair
4,574,423 UART: [art] Store priv key in slot 0x5
4,587,619 UART: [art] Derive Key Pair - Done
4,602,739 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,618,226 UART: [art] Erasing AUTHORITY.KEYID = 7
4,618,991 UART: [art] PUB.X = 5AE9962FC589CA177F47B291E0A9DB98C04843B448C041CC4D687AC1F62CCEE47E4C1B12D3593186034B6900C2A1332F
4,625,740 UART: [art] PUB.Y = 7217DA2CB9F119E460F136BB424C23C2E3446AF919BE7D7D3B27708206AF2C5FA12247AF1077A2EB8BEB9553E9993933
4,632,691 UART: [art] SIG.R = 2CFCF8F196FC80921830BFE47BCBC0C2F15ED7753ACBED0D9EAC1B9FBA84C3DEFF629C0E68931EA599BFE95E83C46278
4,639,483 UART: [art] SIG.S = CBA4D490F83792BE8D1BBE6507994C17218391E8457563475C0687D9B7BB274D84980EDCEAA7911A998602CE52D57317
4,662,561 UART: Caliptra RT
4,662,904 UART: [state] CFI Enabled
5,025,853 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,950 ready_for_fw is high
1,059,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,880 >>> mbox cmd response: success
2,768,613 UART:
2,768,629 UART: Running Caliptra FMC ...
2,769,037 UART:
2,769,180 UART: [state] CFI Enabled
2,779,942 UART: [fht] FMC Alias Private Key: 7
2,898,593 UART: [art] Extend RT PCRs Done
2,899,021 UART: [art] Lock RT PCRs Done
2,900,235 UART: [art] Populate DV Done
2,908,571 UART: [fht] FMC Alias Private Key: 7
2,909,555 UART: [art] Derive CDI
2,909,835 UART: [art] Store in slot 0x4
2,995,760 UART: [art] Derive Key Pair
2,996,120 UART: [art] Store priv key in slot 0x5
3,009,818 UART: [art] Derive Key Pair - Done
3,024,868 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,040,781 UART: [art] Erasing AUTHORITY.KEYID = 7
3,041,546 UART: [art] PUB.X = 376356FE72E52DC420886C6D4B7FE386C12CA947014E4D80C6486B341A2D518B3422005C3DA81367B0712933387C35D2
3,048,281 UART: [art] PUB.Y = 4DC4FA245EF7DBD690B393919E150C08CFF7C51406CC6CA6394D03BF8775BE2BA51A673981D52D922210DD8C696B038A
3,055,224 UART: [art] SIG.R = 049D1054B003E5D1CD6CC09D12CD76FE2DB0A0FBE4215CC597AE7EA1B6E25699D70FD5AE67BC3597FFFA7D66E0D44195
3,062,005 UART: [art] SIG.S = 2EEF65E917A947D503E9D298D4FEEDECAC891CD58B023CE4DFC81B780A09AECC3B22C40A20B00B58732708AB491E3B1D
3,085,668 UART: Caliptra RT
3,086,011 UART: [state] CFI Enabled
3,205,338 UART: [rt] RT listening for mailbox commands...
3,206,002 writing to cptra_bootfsm_go
4,187,934 UART:
4,187,950 UART: Running Caliptra FMC ...
4,188,358 UART:
4,188,501 UART: [state] CFI Enabled
4,189,874 UART: [art] Skip pcr extension
4,190,283 UART: [art] Extend RT PCRs Done
4,190,711 UART: [art] Lock RT PCRs Done
4,191,838 UART: [art] Populate DV Done
4,199,944 UART: [fht] FMC Alias Private Key: 7
4,200,934 UART: [art] Derive CDI
4,201,214 UART: [art] Store in slot 0x4
4,287,273 UART: [art] Derive Key Pair
4,287,633 UART: [art] Store priv key in slot 0x5
4,301,173 UART: [art] Derive Key Pair - Done
4,316,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,331,534 UART: [art] Erasing AUTHORITY.KEYID = 7
4,332,299 UART: [art] PUB.X = 376356FE72E52DC420886C6D4B7FE386C12CA947014E4D80C6486B341A2D518B3422005C3DA81367B0712933387C35D2
4,339,034 UART: [art] PUB.Y = 4DC4FA245EF7DBD690B393919E150C08CFF7C51406CC6CA6394D03BF8775BE2BA51A673981D52D922210DD8C696B038A
4,345,977 UART: [art] SIG.R = 049D1054B003E5D1CD6CC09D12CD76FE2DB0A0FBE4215CC597AE7EA1B6E25699D70FD5AE67BC3597FFFA7D66E0D44195
4,352,758 UART: [art] SIG.S = 2EEF65E917A947D503E9D298D4FEEDECAC891CD58B023CE4DFC81B780A09AECC3B22C40A20B00B58732708AB491E3B1D
4,376,837 UART: Caliptra RT
4,377,180 UART: [state] CFI Enabled
4,744,178 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,777 UART: [state] LifecycleState = Production
85,385 UART: [state] DebugLocked = Yes
85,919 UART: [state] Starting the WD Timer 40000000 cycles
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,625 UART: [kat] SHA2-256
903,565 UART: [kat] SHA2-384
906,380 UART: [kat] SHA2-512-ACC
908,281 UART: [kat] ECC-384
918,184 UART: [kat] HMAC-384Kdf
922,894 UART: [kat] LMS
1,171,222 UART: [kat] --
1,172,195 UART: [cold-reset] ++
1,172,672 UART: [fht] FHT @ 0x50003400
1,175,409 UART: [idev] ++
1,175,577 UART: [idev] CDI.KEYID = 6
1,175,937 UART: [idev] SUBJECT.KEYID = 7
1,176,361 UART: [idev] UDS.KEYID = 0
1,176,706 ready_for_fw is high
1,176,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,182 UART: [idev] Erasing UDS.KEYID = 0
1,201,288 UART: [idev] Sha1 KeyId Algorithm
1,209,695 UART: [idev] --
1,210,711 UART: [ldev] ++
1,210,879 UART: [ldev] CDI.KEYID = 6
1,211,242 UART: [ldev] SUBJECT.KEYID = 5
1,211,668 UART: [ldev] AUTHORITY.KEYID = 7
1,212,131 UART: [ldev] FE.KEYID = 1
1,217,491 UART: [ldev] Erasing FE.KEYID = 1
1,243,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,485 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,179 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,051 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,757 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,724 UART: [ldev] --
1,283,183 UART: [fwproc] Wait for Commands...
1,283,969 UART: [fwproc] Recv command 0x46574c44
1,284,697 UART: [fwproc] Recv'd Img size: 118548 bytes
2,654,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,681,586 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,756 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,853,140 >>> mbox cmd response: success
2,854,329 UART: [afmc] ++
2,854,497 UART: [afmc] CDI.KEYID = 6
2,854,859 UART: [afmc] SUBJECT.KEYID = 7
2,855,284 UART: [afmc] AUTHORITY.KEYID = 5
2,891,125 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,907,622 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,908,370 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,914,085 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,919,970 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,925,675 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,933,569 UART: [afmc] --
2,934,474 UART: [cold-reset] --
2,935,446 UART: [state] Locking Datavault
2,936,443 UART: [state] Locking PCR0, PCR1 and PCR31
2,937,047 UART: [state] Locking ICCM
2,937,637 UART: [exit] Launching FMC @ 0x40000130
2,942,967 UART:
2,942,983 UART: Running Caliptra FMC ...
2,943,391 UART:
2,943,445 UART: [state] CFI Enabled
2,954,103 UART: [fht] FMC Alias Private Key: 7
3,072,596 UART: [art] Extend RT PCRs Done
3,073,024 UART: [art] Lock RT PCRs Done
3,074,568 UART: [art] Populate DV Done
3,082,952 UART: [fht] FMC Alias Private Key: 7
3,084,058 UART: [art] Derive CDI
3,084,338 UART: [art] Store in slot 0x4
3,170,607 UART: [art] Derive Key Pair
3,170,967 UART: [art] Store priv key in slot 0x5
3,184,049 UART: [art] Derive Key Pair - Done
3,198,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,214,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,215,196 UART: [art] PUB.X = CD5739D7990315701D08405BD83A89838ED154B181825D44F36526BAF1FA3FA6F1ACB9D594930D9F9275850C15E879D7
3,221,950 UART: [art] PUB.Y = 9CAC507A416B4B2D6A8C4949181885CD708023A45923EAC54A72CDB85F60CADF436672735C7ED8DE4621F835A2C05189
3,228,902 UART: [art] SIG.R = CC3C2429BA4D4B055A995D471C598F241F12D093F31D0D8C6FEF9F7AA0CD65FAFFAD1B0CEB02C91EE8B5016A9F2C29D1
3,235,681 UART: [art] SIG.S = 6EC3909069EDECDD0FB7280057135A716766E3E6A5407C7706F610FCF484DE7C0A124E09A439F674482BC166FE897FF4
3,259,481 UART: Caliptra RT
3,259,732 UART: [state] CFI Enabled
3,379,954 UART: [rt] RT listening for mailbox commands...
3,380,618 writing to cptra_bootfsm_go
3,380,710 UART:
3,380,726 UART: Running Caliptra ROM ...
3,381,134 UART:
3,381,189 UART: [state] CFI Enabled
3,383,304 UART: [state] LifecycleState = Production
3,383,912 UART: [state] DebugLocked = Yes
3,384,576 UART: [state] Starting the WD Timer 40000000 cycles
3,386,117 UART: [kat] SHA2-256
4,191,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,195,892 UART: [kat] ++
4,196,044 UART: [kat] sha1
4,200,200 UART: [kat] SHA2-256
4,202,140 UART: [kat] SHA2-384
4,204,897 UART: [kat] SHA2-512-ACC
4,206,798 UART: [kat] ECC-384
4,216,163 UART: [kat] HMAC-384Kdf
4,220,735 UART: [kat] LMS
4,469,063 UART: [kat] --
4,469,981 UART: [warm-reset] ++
4,470,824 UART: [warm-reset] --
4,471,487 UART: [state] Locking Datavault
4,472,413 UART: [state] Locking PCR0, PCR1 and PCR31
4,473,017 UART: [state] Locking ICCM
4,473,611 UART: [exit] Launching FMC @ 0x40000130
4,478,941 UART:
4,478,957 UART: Running Caliptra FMC ...
4,479,365 UART:
4,479,419 UART: [state] CFI Enabled
4,480,952 UART: [art] Skip pcr extension
4,481,361 UART: [art] Extend RT PCRs Done
4,481,789 UART: [art] Lock RT PCRs Done
4,482,976 UART: [art] Populate DV Done
4,491,258 UART: [fht] FMC Alias Private Key: 7
4,492,248 UART: [art] Derive CDI
4,492,528 UART: [art] Store in slot 0x4
4,578,615 UART: [art] Derive Key Pair
4,578,975 UART: [art] Store priv key in slot 0x5
4,592,097 UART: [art] Derive Key Pair - Done
4,607,154 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,622,589 UART: [art] Erasing AUTHORITY.KEYID = 7
4,623,354 UART: [art] PUB.X = CD5739D7990315701D08405BD83A89838ED154B181825D44F36526BAF1FA3FA6F1ACB9D594930D9F9275850C15E879D7
4,630,108 UART: [art] PUB.Y = 9CAC507A416B4B2D6A8C4949181885CD708023A45923EAC54A72CDB85F60CADF436672735C7ED8DE4621F835A2C05189
4,637,060 UART: [art] SIG.R = CC3C2429BA4D4B055A995D471C598F241F12D093F31D0D8C6FEF9F7AA0CD65FAFFAD1B0CEB02C91EE8B5016A9F2C29D1
4,643,839 UART: [art] SIG.S = 6EC3909069EDECDD0FB7280057135A716766E3E6A5407C7706F610FCF484DE7C0A124E09A439F674482BC166FE897FF4
4,667,665 UART: Caliptra RT
4,667,916 UART: [state] CFI Enabled
5,032,103 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,438 ready_for_fw is high
1,060,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,007 >>> mbox cmd response: success
2,765,911 UART:
2,765,927 UART: Running Caliptra FMC ...
2,766,335 UART:
2,766,389 UART: [state] CFI Enabled
2,777,375 UART: [fht] FMC Alias Private Key: 7
2,896,018 UART: [art] Extend RT PCRs Done
2,896,446 UART: [art] Lock RT PCRs Done
2,898,174 UART: [art] Populate DV Done
2,906,454 UART: [fht] FMC Alias Private Key: 7
2,907,464 UART: [art] Derive CDI
2,907,744 UART: [art] Store in slot 0x4
2,993,389 UART: [art] Derive Key Pair
2,993,749 UART: [art] Store priv key in slot 0x5
3,007,191 UART: [art] Derive Key Pair - Done
3,021,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,037,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,037,988 UART: [art] PUB.X = 87F479423BEE9DD3413A7A1940057CCFD981C7228021C79AE58C6843A8F0842A9C5DB9366C18FB50B9965178DF8A7C9B
3,044,757 UART: [art] PUB.Y = BEF86167237904EB40026C91D245D55DE0F4B877F40A24F13E680DEB0850E0984B2F9105D978A8AB25CD2F35A4D9968D
3,051,691 UART: [art] SIG.R = 5070722B73BAB322497D9817AED20966F2BB440C7B9FD62B4D9D30A31F2158E75D671B8B6FA63B4F3FD18F967281F1B6
3,058,459 UART: [art] SIG.S = 172519AFBD1E011DA753BD65BDF44474C0EBD517269893A4F03674750189B51F491C23421D77A86C6DC962D7BC30DE52
3,082,251 UART: Caliptra RT
3,082,502 UART: [state] CFI Enabled
3,202,651 UART: [rt] RT listening for mailbox commands...
3,203,315 writing to cptra_bootfsm_go
4,185,400 UART:
4,185,416 UART: Running Caliptra FMC ...
4,185,824 UART:
4,185,878 UART: [state] CFI Enabled
4,187,253 UART: [art] Skip pcr extension
4,187,662 UART: [art] Extend RT PCRs Done
4,188,090 UART: [art] Lock RT PCRs Done
4,189,449 UART: [art] Populate DV Done
4,197,595 UART: [fht] FMC Alias Private Key: 7
4,198,619 UART: [art] Derive CDI
4,198,899 UART: [art] Store in slot 0x4
4,284,602 UART: [art] Derive Key Pair
4,284,962 UART: [art] Store priv key in slot 0x5
4,298,076 UART: [art] Derive Key Pair - Done
4,312,701 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,328,254 UART: [art] Erasing AUTHORITY.KEYID = 7
4,329,019 UART: [art] PUB.X = 87F479423BEE9DD3413A7A1940057CCFD981C7228021C79AE58C6843A8F0842A9C5DB9366C18FB50B9965178DF8A7C9B
4,335,788 UART: [art] PUB.Y = BEF86167237904EB40026C91D245D55DE0F4B877F40A24F13E680DEB0850E0984B2F9105D978A8AB25CD2F35A4D9968D
4,342,722 UART: [art] SIG.R = 5070722B73BAB322497D9817AED20966F2BB440C7B9FD62B4D9D30A31F2158E75D671B8B6FA63B4F3FD18F967281F1B6
4,349,490 UART: [art] SIG.S = 172519AFBD1E011DA753BD65BDF44474C0EBD517269893A4F03674750189B51F491C23421D77A86C6DC962D7BC30DE52
4,373,186 UART: Caliptra RT
4,373,437 UART: [state] CFI Enabled
4,738,773 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,198 UART: [state] LifecycleState = Production
86,806 UART: [state] DebugLocked = Yes
87,364 UART: [state] Starting the WD Timer 40000000 cycles
88,959 UART: [kat] SHA2-256
894,609 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,734 UART: [kat] ++
898,886 UART: [kat] sha1
903,244 UART: [kat] SHA2-256
905,184 UART: [kat] SHA2-384
908,035 UART: [kat] SHA2-512-ACC
909,936 UART: [kat] ECC-384
919,839 UART: [kat] HMAC-384Kdf
924,475 UART: [kat] LMS
1,172,803 UART: [kat] --
1,173,968 UART: [cold-reset] ++
1,174,533 UART: [fht] FHT @ 0x50003400
1,177,066 UART: [idev] ++
1,177,234 UART: [idev] CDI.KEYID = 6
1,177,594 UART: [idev] SUBJECT.KEYID = 7
1,178,018 UART: [idev] UDS.KEYID = 0
1,178,363 ready_for_fw is high
1,178,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,801 UART: [idev] Erasing UDS.KEYID = 0
1,203,511 UART: [idev] Sha1 KeyId Algorithm
1,211,888 UART: [idev] --
1,213,122 UART: [ldev] ++
1,213,290 UART: [ldev] CDI.KEYID = 6
1,213,653 UART: [ldev] SUBJECT.KEYID = 5
1,214,079 UART: [ldev] AUTHORITY.KEYID = 7
1,214,542 UART: [ldev] FE.KEYID = 1
1,219,784 UART: [ldev] Erasing FE.KEYID = 1
1,246,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,644 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,265,338 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,271,210 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,276,916 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,283,897 UART: [ldev] --
1,285,278 UART: [fwproc] Wait for Commands...
1,285,860 UART: [fwproc] Recv command 0x46574c44
1,286,588 UART: [fwproc] Recv'd Img size: 118548 bytes
2,656,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,559 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,729 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,085 >>> mbox cmd response: success
2,855,282 UART: [afmc] ++
2,855,450 UART: [afmc] CDI.KEYID = 6
2,855,812 UART: [afmc] SUBJECT.KEYID = 7
2,856,237 UART: [afmc] AUTHORITY.KEYID = 5
2,892,200 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,908,809 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,909,557 UART: [afmc] PUB.X = C98645B0BF5AF39BCF9FB67DAB27F3D9F896591D660B44C2F55169C91972B1D2AE52BB7C52D9D743D9B45A9358E84399
2,915,272 UART: [afmc] PUB.Y = 40DCBFE635C58C8410CE64F72666079C8FCDFA32A75801290D120A4590EC899531C5CCA81B484550B5BDBAF0E3AB3696
2,921,157 UART: [afmc] SIG.R = 3870F6FBED63621E232CC1693A560BE98C8D0D2A63AD9CB633478818F309C4B15B2D09FC84725F9D43BB8FCBEA3416A2
2,926,862 UART: [afmc] SIG.S = 228E818BEC82C5A478CBC499DA126C2B561D04832C438ECA83B92CFB402E8E7EB0C67D3376845E7F8462DEDED3974432
2,934,840 UART: [afmc] --
2,935,743 UART: [cold-reset] --
2,936,675 UART: [state] Locking Datavault
2,937,754 UART: [state] Locking PCR0, PCR1 and PCR31
2,938,358 UART: [state] Locking ICCM
2,938,802 UART: [exit] Launching FMC @ 0x40000130
2,944,132 UART:
2,944,148 UART: Running Caliptra FMC ...
2,944,556 UART:
2,944,699 UART: [state] CFI Enabled
2,955,329 UART: [fht] FMC Alias Private Key: 7
3,074,020 UART: [art] Extend RT PCRs Done
3,074,448 UART: [art] Lock RT PCRs Done
3,075,980 UART: [art] Populate DV Done
3,084,104 UART: [fht] FMC Alias Private Key: 7
3,085,090 UART: [art] Derive CDI
3,085,370 UART: [art] Store in slot 0x4
3,171,515 UART: [art] Derive Key Pair
3,171,875 UART: [art] Store priv key in slot 0x5
3,185,151 UART: [art] Derive Key Pair - Done
3,200,041 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,215,354 UART: [art] Erasing AUTHORITY.KEYID = 7
3,216,119 UART: [art] PUB.X = E67F600AB3F2A4FDF9D465CA65323A0AA479352B0E60C0AC9BAAF5F810E1272FF93D1C6F7742B52A06068450C31075FA
3,222,884 UART: [art] PUB.Y = 44736A89FFE7B839481C52D445166EAC373E6728267B0C4A7764A5BD61803245FE57FE558EF82951F6F49ECA399781E3
3,229,827 UART: [art] SIG.R = 0000E0B342219195BBBC01F687B9EFDF8C035564F0B381B4FF4A1E319D32B8792171796709C87916D10A40C23679F3D6
3,236,535 UART: [art] SIG.S = 88BE58EF4C967AD74B518B77030946805BFAB78D5AF54E9C907E3B73CA449E8CE10EBE577C201F9319F88DC1E5DA2139
3,259,666 UART: Caliptra RT
3,260,009 UART: [state] CFI Enabled
3,381,504 UART: [rt] RT listening for mailbox commands...
3,382,168 writing to cptra_bootfsm_go
3,382,260 UART:
3,382,276 UART: Running Caliptra ROM ...
3,382,684 UART:
3,382,826 UART: [state] CFI Enabled
3,385,573 UART: [state] LifecycleState = Production
3,386,181 UART: [state] DebugLocked = Yes
3,386,711 UART: [state] Starting the WD Timer 40000000 cycles
3,388,174 UART: [kat] SHA2-256
4,193,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,197,949 UART: [kat] ++
4,198,101 UART: [kat] sha1
4,202,247 UART: [kat] SHA2-256
4,204,187 UART: [kat] SHA2-384
4,206,976 UART: [kat] SHA2-512-ACC
4,208,877 UART: [kat] ECC-384
4,218,538 UART: [kat] HMAC-384Kdf
4,223,114 UART: [kat] LMS
4,471,442 UART: [kat] --
4,472,314 UART: [warm-reset] ++
4,473,105 UART: [warm-reset] --
4,473,858 UART: [state] Locking Datavault
4,474,768 UART: [state] Locking PCR0, PCR1 and PCR31
4,475,372 UART: [state] Locking ICCM
4,476,004 UART: [exit] Launching FMC @ 0x40000130
4,481,334 UART:
4,481,350 UART: Running Caliptra FMC ...
4,481,758 UART:
4,481,901 UART: [state] CFI Enabled
4,483,156 UART: [art] Skip pcr extension
4,483,565 UART: [art] Extend RT PCRs Done
4,483,993 UART: [art] Lock RT PCRs Done
4,485,134 UART: [art] Populate DV Done
4,493,426 UART: [fht] FMC Alias Private Key: 7
4,494,520 UART: [art] Derive CDI
4,494,800 UART: [art] Store in slot 0x4
4,580,575 UART: [art] Derive Key Pair
4,580,935 UART: [art] Store priv key in slot 0x5
4,594,273 UART: [art] Derive Key Pair - Done
4,609,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,624,892 UART: [art] Erasing AUTHORITY.KEYID = 7
4,625,657 UART: [art] PUB.X = E67F600AB3F2A4FDF9D465CA65323A0AA479352B0E60C0AC9BAAF5F810E1272FF93D1C6F7742B52A06068450C31075FA
4,632,422 UART: [art] PUB.Y = 44736A89FFE7B839481C52D445166EAC373E6728267B0C4A7764A5BD61803245FE57FE558EF82951F6F49ECA399781E3
4,639,365 UART: [art] SIG.R = 0000E0B342219195BBBC01F687B9EFDF8C035564F0B381B4FF4A1E319D32B8792171796709C87916D10A40C23679F3D6
4,646,073 UART: [art] SIG.S = 88BE58EF4C967AD74B518B77030946805BFAB78D5AF54E9C907E3B73CA449E8CE10EBE577C201F9319F88DC1E5DA2139
4,670,154 UART: Caliptra RT
4,670,497 UART: [state] CFI Enabled
5,032,689 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,025 ready_for_fw is high
1,061,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,414 >>> mbox cmd response: success
2,768,136 UART:
2,768,152 UART: Running Caliptra FMC ...
2,768,560 UART:
2,768,703 UART: [state] CFI Enabled
2,779,679 UART: [fht] FMC Alias Private Key: 7
2,898,704 UART: [art] Extend RT PCRs Done
2,899,132 UART: [art] Lock RT PCRs Done
2,900,772 UART: [art] Populate DV Done
2,908,994 UART: [fht] FMC Alias Private Key: 7
2,910,120 UART: [art] Derive CDI
2,910,400 UART: [art] Store in slot 0x4
2,996,437 UART: [art] Derive Key Pair
2,996,797 UART: [art] Store priv key in slot 0x5
3,009,647 UART: [art] Derive Key Pair - Done
3,024,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,040,248 UART: [art] Erasing AUTHORITY.KEYID = 7
3,041,013 UART: [art] PUB.X = F4ED1221B46C87E9786E4FA8467ED3E86AE403029B8E0DCA4973EB7A06CB69AC96BDBC55C2641A522A2BA122229D9633
3,047,781 UART: [art] PUB.Y = 78B9DA1B21AA74737915E920EA67B99EDA99D8F8B2EEA0C39978057CCEA56903B477C9B1C64FC459F14C0EA3206F45FD
3,054,734 UART: [art] SIG.R = 0AC03019B60F1D6D5053BEFF70D3F4C2059B064BFDF83C6C6E28DDE5D3193746A1101B63901DB5F8A2B67084BCB86286
3,061,500 UART: [art] SIG.S = 9E769CD54E4079C3036E9F102F21A5DCA7DA4420B353E08A09B24B783CEC36C552AC441A5D3A6CFEFF33161845354FB1
3,085,188 UART: Caliptra RT
3,085,531 UART: [state] CFI Enabled
3,205,467 UART: [rt] RT listening for mailbox commands...
3,206,131 writing to cptra_bootfsm_go
4,189,617 UART:
4,189,633 UART: Running Caliptra FMC ...
4,190,041 UART:
4,190,184 UART: [state] CFI Enabled
4,191,541 UART: [art] Skip pcr extension
4,191,950 UART: [art] Extend RT PCRs Done
4,192,378 UART: [art] Lock RT PCRs Done
4,193,517 UART: [art] Populate DV Done
4,201,661 UART: [fht] FMC Alias Private Key: 7
4,202,713 UART: [art] Derive CDI
4,202,993 UART: [art] Store in slot 0x4
4,289,038 UART: [art] Derive Key Pair
4,289,398 UART: [art] Store priv key in slot 0x5
4,302,690 UART: [art] Derive Key Pair - Done
4,317,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,333,035 UART: [art] Erasing AUTHORITY.KEYID = 7
4,333,800 UART: [art] PUB.X = F4ED1221B46C87E9786E4FA8467ED3E86AE403029B8E0DCA4973EB7A06CB69AC96BDBC55C2641A522A2BA122229D9633
4,340,568 UART: [art] PUB.Y = 78B9DA1B21AA74737915E920EA67B99EDA99D8F8B2EEA0C39978057CCEA56903B477C9B1C64FC459F14C0EA3206F45FD
4,347,521 UART: [art] SIG.R = 0AC03019B60F1D6D5053BEFF70D3F4C2059B064BFDF83C6C6E28DDE5D3193746A1101B63901DB5F8A2B67084BCB86286
4,354,287 UART: [art] SIG.S = 9E769CD54E4079C3036E9F102F21A5DCA7DA4420B353E08A09B24B783CEC36C552AC441A5D3A6CFEFF33161845354FB1
4,377,995 UART: Caliptra RT
4,378,338 UART: [state] CFI Enabled
4,746,069 UART: [rt] RT listening for mailbox commands...
test warm_reset::warm_reset_basic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,538 UART:
191,920 UART: Running Caliptra ROM ...
193,119 UART:
193,267 UART: [state] CFI Enabled
264,249 UART: [state] LifecycleState = Production
266,118 UART: [state] DebugLocked = Yes
267,770 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,896 UART: [kat] SHA2-256
442,630 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,092 UART: [kat] ++
453,611 UART: [kat] sha1
464,576 UART: [kat] SHA2-256
467,257 UART: [kat] SHA2-384
474,266 UART: [kat] SHA2-512-ACC
476,629 UART: [kat] ECC-384
2,770,588 UART: [kat] HMAC-384Kdf
2,802,332 UART: [kat] LMS
3,992,619 UART: [kat] --
3,996,794 UART: [cold-reset] ++
3,998,826 UART: [fht] Storing FHT @ 0x50003400
4,010,712 UART: [idev] ++
4,011,330 UART: [idev] CDI.KEYID = 6
4,012,246 UART: [idev] SUBJECT.KEYID = 7
4,013,510 UART: [idev] UDS.KEYID = 0
304 writing to cptra_bootfsm_go
730 UART: [idev] Erasing UDS.KEYID = 0
2,067 UART:
2,235 UART: Running Caliptra ROM ...
3,332 UART:
3,485 UART: [state] CFI Enabled
68,090 UART: [state] LifecycleState = Production
69,912 UART: [state] DebugLocked = Yes
72,489 UART: [state] Starting the Watchdog Timer 40000000 cycles
78,145 UART: [kat] SHA2-256
247,897 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
258,371 UART: [kat] ++
258,848 UART: [kat] sha1
270,049 UART: [kat] SHA2-256
272,739 UART: [kat] SHA2-384
278,823 UART: [kat] SHA2-512-ACC
281,218 UART: [kat] ECC-384
2,570,426 UART: [kat] HMAC-384Kdf
2,601,457 UART: [kat] LMS
3,791,760 UART: [kat] --
3,798,970 UART: [warm-reset] ++
3,799,774 UART: [warm-reset] Previous Cold-Reset was not successful.
3,805,150 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
301 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 0.49s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,201 writing to cptra_bootfsm_go
191,822 UART:
192,175 UART: Running Caliptra ROM ...
193,278 UART:
602,855 UART: [state] CFI Enabled
615,721 UART: [state] LifecycleState = Production
617,548 UART: [state] DebugLocked = Yes
619,697 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,539 UART: [kat] SHA2-256
795,345 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,851 UART: [kat] ++
806,331 UART: [kat] sha1
818,416 UART: [kat] SHA2-256
821,144 UART: [kat] SHA2-384
827,032 UART: [kat] SHA2-512-ACC
829,406 UART: [kat] ECC-384
3,114,467 UART: [kat] HMAC-384Kdf
3,124,866 UART: [kat] LMS
4,315,009 UART: [kat] --
4,319,450 UART: [cold-reset] ++
4,320,860 UART: [fht] Storing FHT @ 0x50003400
4,333,548 UART: [idev] ++
4,334,162 UART: [idev] CDI.KEYID = 6
4,335,099 UART: [idev] SUBJECT.KEYID = 7
4,336,314 UART: [idev] UDS.KEYID = 0
295 writing to cptra_bootfsm_go
726 UART: [idev] Erasing UDS.KEYID = 0
2,059 UART:
2,225 UART: Running Caliptra ROM ...
3,320 UART:
15,990,289 UART: [state] CFI Enabled
16,003,116 UART: [state] LifecycleState = Production
16,004,921 UART: [state] DebugLocked = Yes
16,006,258 UART: [state] Starting the Watchdog Timer 40000000 cycles
16,010,796 UART: [kat] SHA2-256
16,180,558 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
16,191,062 UART: [kat] ++
16,191,523 UART: [kat] sha1
16,201,670 UART: [kat] SHA2-256
16,204,363 UART: [kat] SHA2-384
16,211,104 UART: [kat] SHA2-512-ACC
16,213,503 UART: [kat] ECC-384
18,497,550 UART: [kat] HMAC-384Kdf
18,509,719 UART: [kat] LMS
19,699,824 UART: [kat] --
19,705,509 UART: [warm-reset] ++
19,706,361 UART: [warm-reset] Previous Cold-Reset was not successful.
19,711,847 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,390 writing to cptra_bootfsm_go
298 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 9 filtered out; finished in 1.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,867 writing to cptra_bootfsm_go
191,466 UART:
191,820 UART: Running Caliptra ROM ...
193,018 UART:
193,185 UART: [state] CFI Enabled
266,446 UART: [state] LifecycleState = Production
268,240 UART: [state] DebugLocked = Yes
270,619 UART: [state] Starting the WD Timer 40000000 cycles
274,863 UART: [kat] SHA2-256
454,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,302 UART: [kat] ++
465,808 UART: [kat] sha1
475,934 UART: [kat] SHA2-256
478,617 UART: [kat] SHA2-384
484,660 UART: [kat] SHA2-512-ACC
487,019 UART: [kat] ECC-384
2,951,249 UART: [kat] HMAC-384Kdf
2,972,361 UART: [kat] LMS
3,448,897 UART: [kat] --
3,455,868 UART: [cold-reset] ++
3,456,922 UART: [fht] FHT @ 0x50003400
3,469,100 UART: [idev] ++
3,469,674 UART: [idev] CDI.KEYID = 6
3,470,638 UART: [idev] SUBJECT.KEYID = 7
3,471,898 UART: [idev] UDS.KEYID = 0
293 writing to cptra_bootfsm_go
748 UART: [idev] Erasing UDS.KEYID = 0
2,016 UART:
2,236 UART: Running Caliptra ROM ...
3,343 UART:
3,502 UART: [state] CFI Enabled
73,003 UART: [state] LifecycleState = Production
74,832 UART: [state] DebugLocked = Yes
77,659 UART: [state] Starting the WD Timer 40000000 cycles
82,228 UART: [kat] SHA2-256
261,934 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
272,704 UART: [kat] ++
273,188 UART: [kat] sha1
284,993 UART: [kat] SHA2-256
287,694 UART: [kat] SHA2-384
293,193 UART: [kat] SHA2-512-ACC
295,588 UART: [kat] ECC-384
2,755,379 UART: [kat] HMAC-384Kdf
2,780,264 UART: [kat] LMS
3,256,753 UART: [kat] --
3,262,400 UART: [warm-reset] ++
3,263,268 UART: [warm-reset] Prev Cold-Reset failed
3,265,810 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
191,846 UART:
192,204 UART: Running Caliptra ROM ...
193,330 UART:
602,990 UART: [state] CFI Enabled
618,960 UART: [state] LifecycleState = Production
620,781 UART: [state] DebugLocked = Yes
622,076 UART: [state] Starting the WD Timer 40000000 cycles
626,832 UART: [kat] SHA2-256
806,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,284 UART: [kat] ++
817,812 UART: [kat] sha1
828,800 UART: [kat] SHA2-256
831,473 UART: [kat] SHA2-384
837,390 UART: [kat] SHA2-512-ACC
839,752 UART: [kat] ECC-384
3,280,676 UART: [kat] HMAC-384Kdf
3,292,122 UART: [kat] LMS
3,768,671 UART: [kat] --
3,772,165 UART: [cold-reset] ++
3,774,686 UART: [fht] FHT @ 0x50003400
3,786,484 UART: [idev] ++
3,787,085 UART: [idev] CDI.KEYID = 6
3,787,979 UART: [idev] SUBJECT.KEYID = 7
3,789,240 UART: [idev] UDS.KEYID = 0
295 writing to cptra_bootfsm_go
715 UART: [idev] Erasing UDS.KEYID = 0
1,888 UART:
2,096 UART: Running Caliptra ROM ...
3,133 UART:
16,518,592 UART: [state] CFI Enabled
16,535,801 UART: [state] LifecycleState = Production
16,537,567 UART: [state] DebugLocked = Yes
16,540,508 UART: [state] Starting the WD Timer 40000000 cycles
16,544,760 UART: [kat] SHA2-256
16,724,464 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
16,735,235 UART: [kat] ++
16,735,779 UART: [kat] sha1
16,747,376 UART: [kat] SHA2-256
16,750,068 UART: [kat] SHA2-384
16,756,650 UART: [kat] SHA2-512-ACC
16,759,055 UART: [kat] ECC-384
19,202,958 UART: [kat] HMAC-384Kdf
19,216,213 UART: [kat] LMS
19,692,680 UART: [kat] --
19,696,255 UART: [warm-reset] ++
19,697,105 UART: [warm-reset] Prev Cold-Reset failed
19,700,557 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
191,518 UART:
191,890 UART: Running Caliptra ROM ...
193,096 UART:
193,256 UART: [state] CFI Enabled
262,937 UART: [state] LifecycleState = Production
265,180 UART: [state] DebugLocked = Yes
268,213 UART: [state] Starting the WD Timer 40000000 cycles
272,910 UART: [kat] SHA2-256
462,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,561 UART: [kat] ++
474,091 UART: [kat] sha1
486,466 UART: [kat] SHA2-256
489,447 UART: [kat] SHA2-384
496,913 UART: [kat] SHA2-512-ACC
499,524 UART: [kat] ECC-384
2,947,168 UART: [kat] HMAC-384Kdf
2,969,927 UART: [kat] LMS
3,501,682 UART: [kat] --
3,506,856 UART: [cold-reset] ++
3,509,054 UART: [fht] FHT @ 0x50003400
3,521,352 UART: [idev] ++
3,522,023 UART: [idev] CDI.KEYID = 6
3,522,955 UART: [idev] SUBJECT.KEYID = 7
3,524,206 UART: [idev] UDS.KEYID = 0
295 writing to cptra_bootfsm_go
712 UART: [idev] Erasing UDS.KEYID = 0
1,884 UART:
2,085 UART: Running Caliptra ROM ...
3,100 UART:
3,240 UART: [state] CFI Enabled
64,893 UART: [state] LifecycleState = Production
66,733 UART: [state] DebugLocked = Yes
69,244 UART: [state] Starting the WD Timer 40000000 cycles
74,248 UART: [kat] SHA2-256
264,111 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
274,863 UART: [kat] ++
275,364 UART: [kat] sha1
286,726 UART: [kat] SHA2-256
289,734 UART: [kat] SHA2-384
294,792 UART: [kat] SHA2-512-ACC
297,397 UART: [kat] ECC-384
2,743,236 UART: [kat] HMAC-384Kdf
2,769,896 UART: [kat] LMS
3,301,420 UART: [kat] --
3,306,218 UART: [warm-reset] ++
3,307,061 UART: [warm-reset] Prev Cold-Reset failed
3,310,819 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,887 writing to cptra_bootfsm_go
294 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
191,813 UART:
192,171 UART: Running Caliptra ROM ...
193,272 UART:
603,085 UART: [state] CFI Enabled
615,638 UART: [state] LifecycleState = Production
617,859 UART: [state] DebugLocked = Yes
620,315 UART: [state] Starting the WD Timer 40000000 cycles
625,325 UART: [kat] SHA2-256
815,206 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,034 UART: [kat] ++
826,539 UART: [kat] sha1
837,831 UART: [kat] SHA2-256
840,822 UART: [kat] SHA2-384
848,035 UART: [kat] SHA2-512-ACC
850,652 UART: [kat] ECC-384
3,292,641 UART: [kat] HMAC-384Kdf
3,304,404 UART: [kat] LMS
3,836,223 UART: [kat] --
3,841,499 UART: [cold-reset] ++
3,843,365 UART: [fht] FHT @ 0x50003400
3,855,361 UART: [idev] ++
3,856,076 UART: [idev] CDI.KEYID = 6
3,857,107 UART: [idev] SUBJECT.KEYID = 7
3,858,210 UART: [idev] UDS.KEYID = 0
292 writing to cptra_bootfsm_go
705 UART: [idev] Erasing UDS.KEYID = 0
1,967 UART:
2,179 UART: Running Caliptra ROM ...
3,282 UART:
16,459,268 UART: [state] CFI Enabled
16,471,189 UART: [state] LifecycleState = Production
16,472,957 UART: [state] DebugLocked = Yes
16,475,094 UART: [state] Starting the WD Timer 40000000 cycles
16,479,730 UART: [kat] SHA2-256
16,669,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
16,680,471 UART: [kat] ++
16,680,992 UART: [kat] sha1
16,691,095 UART: [kat] SHA2-256
16,694,073 UART: [kat] SHA2-384
16,699,638 UART: [kat] SHA2-512-ACC
16,702,210 UART: [kat] ECC-384
19,143,364 UART: [kat] HMAC-384Kdf
19,155,056 UART: [kat] LMS
19,686,680 UART: [kat] --
19,689,970 UART: [warm-reset] ++
19,690,819 UART: [warm-reset] Prev Cold-Reset failed
19,694,058 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
295 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,157 UART: [state] LifecycleState = Production
85,765 UART: [state] DebugLocked = Yes
86,441 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,204 UART: [kat] SHA2-512-ACC
897,105 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,253 UART: [cold-reset] ++
1,476,606 UART: [fht] Storing FHT @ 0x50003400
1,479,275 UART: [idev] ++
1,479,443 UART: [idev] CDI.KEYID = 6
1,479,803 UART: [idev] SUBJECT.KEYID = 7
1,480,227 UART: [idev] UDS.KEYID = 0
1,480,573 writing to cptra_bootfsm_go
1,480,668 UART:
1,480,684 UART: Running Caliptra ROM ...
1,481,092 UART:
1,481,146 UART: [state] CFI Enabled
1,483,901 UART: [state] LifecycleState = Production
1,484,509 UART: [state] DebugLocked = Yes
1,485,077 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,486,671 UART: [kat] SHA2-256
2,280,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,284,717 UART: [kat] ++
2,284,869 UART: [kat] sha1
2,289,121 UART: [kat] SHA2-256
2,291,059 UART: [kat] SHA2-384
2,293,722 UART: [kat] SHA2-512-ACC
2,295,623 UART: [kat] ECC-384
2,300,860 UART: [kat] HMAC-384Kdf
2,305,398 UART: [kat] LMS
2,873,594 UART: [kat] --
2,874,672 UART: [warm-reset] ++
2,874,943 UART: [warm-reset] Previous Cold-Reset was not successful.
2,876,260 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,599 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,664 UART: [state] LifecycleState = Production
86,272 UART: [state] DebugLocked = Yes
86,810 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,392 UART: [kat] SHA2-256
882,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,438 UART: [kat] ++
886,590 UART: [kat] sha1
890,860 UART: [kat] SHA2-256
892,798 UART: [kat] SHA2-384
895,531 UART: [kat] SHA2-512-ACC
897,432 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,627 UART: [kat] LMS
1,475,823 UART: [kat] --
1,476,384 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,438 UART: [idev] ++
1,479,606 UART: [idev] CDI.KEYID = 6
1,479,966 UART: [idev] SUBJECT.KEYID = 7
1,480,390 UART: [idev] UDS.KEYID = 0
1,480,736 writing to cptra_bootfsm_go
1,480,831 UART:
1,480,847 UART: Running Caliptra ROM ...
1,481,255 UART:
1,481,396 UART: [state] CFI Enabled
1,484,837 UART: [state] LifecycleState = Production
1,485,445 UART: [state] DebugLocked = Yes
1,486,157 UART: [state] Starting the Watchdog Timer 40000000 cycles
1,487,769 UART: [kat] SHA2-256
2,281,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,285,815 UART: [kat] ++
2,285,967 UART: [kat] sha1
2,290,147 UART: [kat] SHA2-256
2,292,085 UART: [kat] SHA2-384
2,294,890 UART: [kat] SHA2-512-ACC
2,296,791 UART: [kat] ECC-384
2,302,200 UART: [kat] HMAC-384Kdf
2,306,996 UART: [kat] LMS
2,875,192 UART: [kat] --
2,876,004 UART: [warm-reset] ++
2,876,275 UART: [warm-reset] Previous Cold-Reset was not successful.
2,877,602 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,584 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 10 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Production
86,209 UART: [state] DebugLocked = Yes
86,737 UART: [state] Starting the WD Timer 40000000 cycles
88,424 UART: [kat] SHA2-256
891,974 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,078 UART: [kat] ++
896,230 UART: [kat] sha1
900,402 UART: [kat] SHA2-256
902,342 UART: [kat] SHA2-384
905,073 UART: [kat] SHA2-512-ACC
906,974 UART: [kat] ECC-384
916,531 UART: [kat] HMAC-384Kdf
921,015 UART: [kat] LMS
1,169,327 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,487 UART: [fht] FHT @ 0x50003400
1,173,049 UART: [idev] ++
1,173,217 UART: [idev] CDI.KEYID = 6
1,173,578 UART: [idev] SUBJECT.KEYID = 7
1,174,003 UART: [idev] UDS.KEYID = 0
1,174,350 writing to cptra_bootfsm_go
1,174,442 UART:
1,174,458 UART: Running Caliptra ROM ...
1,174,866 UART:
1,174,921 UART: [state] CFI Enabled
1,177,660 UART: [state] LifecycleState = Production
1,178,268 UART: [state] DebugLocked = Yes
1,179,030 UART: [state] Starting the WD Timer 40000000 cycles
1,180,733 UART: [kat] SHA2-256
1,984,283 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,387 UART: [kat] ++
1,988,539 UART: [kat] sha1
1,992,725 UART: [kat] SHA2-256
1,994,665 UART: [kat] SHA2-384
1,997,448 UART: [kat] SHA2-512-ACC
1,999,349 UART: [kat] ECC-384
2,009,192 UART: [kat] HMAC-384Kdf
2,013,704 UART: [kat] LMS
2,262,016 UART: [kat] --
2,263,046 UART: [warm-reset] ++
2,263,314 UART: [warm-reset] Prev Cold-Reset failed
2,264,321 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,108 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Production
85,904 UART: [state] DebugLocked = Yes
86,466 UART: [state] Starting the WD Timer 40000000 cycles
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
899,937 UART: [kat] SHA2-256
901,877 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
920,930 UART: [kat] LMS
1,169,242 UART: [kat] --
1,170,239 UART: [cold-reset] ++
1,170,620 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,383 writing to cptra_bootfsm_go
1,174,475 UART:
1,174,491 UART: Running Caliptra ROM ...
1,174,899 UART:
1,175,041 UART: [state] CFI Enabled
1,178,204 UART: [state] LifecycleState = Production
1,178,812 UART: [state] DebugLocked = Yes
1,179,540 UART: [state] Starting the WD Timer 40000000 cycles
1,181,249 UART: [kat] SHA2-256
1,984,799 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
1,988,903 UART: [kat] ++
1,989,055 UART: [kat] sha1
1,993,229 UART: [kat] SHA2-256
1,995,169 UART: [kat] SHA2-384
1,997,940 UART: [kat] SHA2-512-ACC
1,999,841 UART: [kat] ECC-384
2,009,996 UART: [kat] HMAC-384Kdf
2,014,842 UART: [kat] LMS
2,263,154 UART: [kat] --
2,263,720 UART: [warm-reset] ++
2,263,988 UART: [warm-reset] Prev Cold-Reset failed
2,265,019 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,431 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,929 UART: [state] LifecycleState = Production
85,537 UART: [state] DebugLocked = Yes
86,069 UART: [state] Starting the WD Timer 40000000 cycles
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,813 UART: [kat] SHA2-256
903,753 UART: [kat] SHA2-384
906,558 UART: [kat] SHA2-512-ACC
908,459 UART: [kat] ECC-384
917,558 UART: [kat] HMAC-384Kdf
922,266 UART: [kat] LMS
1,170,594 UART: [kat] --
1,171,257 UART: [cold-reset] ++
1,171,720 UART: [fht] FHT @ 0x50003400
1,174,277 UART: [idev] ++
1,174,445 UART: [idev] CDI.KEYID = 6
1,174,805 UART: [idev] SUBJECT.KEYID = 7
1,175,229 UART: [idev] UDS.KEYID = 0
1,175,575 writing to cptra_bootfsm_go
1,175,667 UART:
1,175,683 UART: Running Caliptra ROM ...
1,176,091 UART:
1,176,146 UART: [state] CFI Enabled
1,178,565 UART: [state] LifecycleState = Production
1,179,173 UART: [state] DebugLocked = Yes
1,179,905 UART: [state] Starting the WD Timer 40000000 cycles
1,181,546 UART: [kat] SHA2-256
1,987,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,991,321 UART: [kat] ++
1,991,473 UART: [kat] sha1
1,995,531 UART: [kat] SHA2-256
1,997,471 UART: [kat] SHA2-384
2,000,368 UART: [kat] SHA2-512-ACC
2,002,269 UART: [kat] ECC-384
2,012,304 UART: [kat] HMAC-384Kdf
2,016,736 UART: [kat] LMS
2,265,064 UART: [kat] --
2,265,940 UART: [warm-reset] ++
2,266,211 UART: [warm-reset] Prev Cold-Reset failed
2,267,072 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,633 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Production
86,016 UART: [state] DebugLocked = Yes
86,634 UART: [state] Starting the WD Timer 40000000 cycles
88,155 UART: [kat] SHA2-256
893,805 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,930 UART: [kat] ++
898,082 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,073 UART: [kat] SHA2-512-ACC
908,974 UART: [kat] ECC-384
918,969 UART: [kat] HMAC-384Kdf
923,629 UART: [kat] LMS
1,171,957 UART: [kat] --
1,172,722 UART: [cold-reset] ++
1,173,137 UART: [fht] FHT @ 0x50003400
1,175,740 UART: [idev] ++
1,175,908 UART: [idev] CDI.KEYID = 6
1,176,268 UART: [idev] SUBJECT.KEYID = 7
1,176,692 UART: [idev] UDS.KEYID = 0
1,177,038 writing to cptra_bootfsm_go
1,177,130 UART:
1,177,146 UART: Running Caliptra ROM ...
1,177,554 UART:
1,177,696 UART: [state] CFI Enabled
1,180,835 UART: [state] LifecycleState = Production
1,181,443 UART: [state] DebugLocked = Yes
1,182,109 UART: [state] Starting the WD Timer 40000000 cycles
1,183,628 UART: [kat] SHA2-256
1,989,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
1,993,403 UART: [kat] ++
1,993,555 UART: [kat] sha1
1,997,627 UART: [kat] SHA2-256
1,999,567 UART: [kat] SHA2-384
2,002,320 UART: [kat] SHA2-512-ACC
2,004,221 UART: [kat] ECC-384
2,014,056 UART: [kat] HMAC-384Kdf
2,018,540 UART: [kat] LMS
2,266,868 UART: [kat] --
2,267,810 UART: [warm-reset] ++
2,268,081 UART: [warm-reset] Prev Cold-Reset failed
2,269,130 UART: ROM Fatal Error: 0x01040010
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,962 writing to cptra_bootfsm_go
test warm_reset::warm_reset_during_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 11 filtered out; finished in 0.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,066 UART:
192,440 UART: Running Caliptra ROM ...
193,595 UART:
193,752 UART: [state] CFI Enabled
262,465 UART: [state] LifecycleState = Unprovisioned
264,612 UART: [state] DebugLocked = No
266,761 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,752 UART: [kat] SHA2-256
440,468 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,003 UART: [kat] ++
451,462 UART: [kat] sha1
463,148 UART: [kat] SHA2-256
465,854 UART: [kat] SHA2-384
470,755 UART: [kat] SHA2-512-ACC
473,101 UART: [kat] ECC-384
2,767,448 UART: [kat] HMAC-384Kdf
2,800,547 UART: [kat] LMS
3,990,875 UART: [kat] --
3,993,923 UART: [cold-reset] ++
3,995,545 UART: [fht] Storing FHT @ 0x50003400
4,007,479 UART: [idev] ++
4,008,054 UART: [idev] CDI.KEYID = 6
4,008,982 UART: [idev] SUBJECT.KEYID = 7
4,010,205 UART: [idev] UDS.KEYID = 0
6,604,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,754,308 UART: [idev] Erasing UDS.KEYID = 0
7,347,311 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,275 UART: [idev] --
7,374,732 UART: [ldev] ++
7,375,313 UART: [ldev] CDI.KEYID = 6
7,376,291 UART: [ldev] SUBJECT.KEYID = 5
7,377,459 UART: [ldev] AUTHORITY.KEYID = 7
7,378,756 UART: [ldev] FE.KEYID = 1
7,422,776 UART: [ldev] Erasing FE.KEYID = 1
10,757,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,175 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,133,641 UART: [ldev] --
13,138,442 UART: [fwproc] Waiting for Commands...
13,141,360 UART: [fwproc] Received command 0x46574c44
13,143,552 UART: [fwproc] Received Image of size 118548 bytes
17,249,004 UART: ROM Fatal Error: 0x000B0016
17,252,476 >>> mbox cmd response: failed
17,252,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,253,171 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
6,386,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,196,204 >>> mbox cmd response: failed
17,197,009 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,197,318 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,631 UART:
193,039 UART: Running Caliptra ROM ...
194,228 UART:
603,724 UART: [state] CFI Enabled
615,863 UART: [state] LifecycleState = Unprovisioned
617,784 UART: [state] DebugLocked = No
619,598 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,609 UART: [kat] SHA2-256
794,353 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,933 UART: [kat] ++
805,420 UART: [kat] sha1
815,331 UART: [kat] SHA2-256
818,024 UART: [kat] SHA2-384
824,829 UART: [kat] SHA2-512-ACC
827,193 UART: [kat] ECC-384
3,110,933 UART: [kat] HMAC-384Kdf
3,122,145 UART: [kat] LMS
4,312,278 UART: [kat] --
4,318,668 UART: [cold-reset] ++
4,320,481 UART: [fht] Storing FHT @ 0x50003400
4,331,437 UART: [idev] ++
4,332,012 UART: [idev] CDI.KEYID = 6
4,333,159 UART: [idev] SUBJECT.KEYID = 7
4,334,287 UART: [idev] UDS.KEYID = 0
6,873,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,022,868 UART: [idev] Erasing UDS.KEYID = 0
7,618,260 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,026 UART: [idev] --
7,643,707 UART: [ldev] ++
7,644,283 UART: [ldev] CDI.KEYID = 6
7,645,235 UART: [ldev] SUBJECT.KEYID = 5
7,646,459 UART: [ldev] AUTHORITY.KEYID = 7
7,647,701 UART: [ldev] FE.KEYID = 1
7,657,793 UART: [ldev] Erasing FE.KEYID = 1
10,946,914 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,240 UART: [ldev] --
13,308,380 UART: [fwproc] Waiting for Commands...
13,310,648 UART: [fwproc] Received command 0x46574c44
13,312,862 UART: [fwproc] Received Image of size 118548 bytes
17,420,616 UART: ROM Fatal Error: 0x000B0016
17,424,096 >>> mbox cmd response: failed
17,424,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,424,899 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
6,733,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,404,506 >>> mbox cmd response: failed
17,405,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,405,583 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,420 UART:
192,798 UART: Running Caliptra ROM ...
193,908 UART:
194,056 UART: [state] CFI Enabled
260,502 UART: [state] LifecycleState = Unprovisioned
262,446 UART: [state] DebugLocked = No
264,584 UART: [state] WD Timer not started. Device not locked for debugging
267,586 UART: [kat] SHA2-256
447,289 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,038 UART: [kat] ++
458,587 UART: [kat] sha1
469,996 UART: [kat] SHA2-256
472,692 UART: [kat] SHA2-384
478,090 UART: [kat] SHA2-512-ACC
480,496 UART: [kat] ECC-384
2,947,413 UART: [kat] HMAC-384Kdf
2,970,268 UART: [kat] LMS
3,446,758 UART: [kat] --
3,451,244 UART: [cold-reset] ++
3,452,755 UART: [fht] FHT @ 0x50003400
3,464,871 UART: [idev] ++
3,465,442 UART: [idev] CDI.KEYID = 6
3,466,388 UART: [idev] SUBJECT.KEYID = 7
3,467,600 UART: [idev] UDS.KEYID = 0
5,961,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,111,941 UART: [idev] Erasing UDS.KEYID = 0
6,113,392 UART: [idev] Sha1 KeyId Algorithm
6,114,578 UART: [idev] --
6,115,066 UART: [ldev] ++
6,115,553 UART: [ldev] CDI.KEYID = 6
6,116,430 UART: [ldev] SUBJECT.KEYID = 5
6,117,550 UART: [ldev] AUTHORITY.KEYID = 7
6,118,658 UART: [ldev] FE.KEYID = 1
6,119,502 UART: [ldev] Erasing FE.KEYID = 1
8,561,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,668 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,360,848 UART: [ldev] --
10,366,927 UART: [fwproc] Wait for Commands...
10,369,357 UART: [fwproc] Recv command 0x46574c44
10,371,348 UART: [fwproc] Recv'd Img size: 118548 bytes
13,845,806 UART: ROM Fatal Error: 0x000B0016
13,849,050 >>> mbox cmd response: failed
13,849,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,849,851 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,404 writing to cptra_bootfsm_go
5,948,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,731,359 >>> mbox cmd response: failed
13,731,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,732,365 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,639 UART:
193,034 UART: Running Caliptra ROM ...
194,170 UART:
603,958 UART: [state] CFI Enabled
618,395 UART: [state] LifecycleState = Unprovisioned
620,332 UART: [state] DebugLocked = No
622,045 UART: [state] WD Timer not started. Device not locked for debugging
625,440 UART: [kat] SHA2-256
805,073 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,835 UART: [kat] ++
816,428 UART: [kat] sha1
827,797 UART: [kat] SHA2-256
830,526 UART: [kat] SHA2-384
835,922 UART: [kat] SHA2-512-ACC
838,275 UART: [kat] ECC-384
3,277,468 UART: [kat] HMAC-384Kdf
3,289,724 UART: [kat] LMS
3,766,237 UART: [kat] --
3,772,778 UART: [cold-reset] ++
3,774,722 UART: [fht] FHT @ 0x50003400
3,785,598 UART: [idev] ++
3,786,173 UART: [idev] CDI.KEYID = 6
3,787,398 UART: [idev] SUBJECT.KEYID = 7
3,788,444 UART: [idev] UDS.KEYID = 0
6,282,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,432,778 UART: [idev] Erasing UDS.KEYID = 0
6,434,249 UART: [idev] Sha1 KeyId Algorithm
6,435,503 UART: [idev] --
6,436,054 UART: [ldev] ++
6,436,550 UART: [ldev] CDI.KEYID = 6
6,437,516 UART: [ldev] SUBJECT.KEYID = 5
6,438,627 UART: [ldev] AUTHORITY.KEYID = 7
6,439,830 UART: [ldev] FE.KEYID = 1
6,440,727 UART: [ldev] Erasing FE.KEYID = 1
8,796,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,488 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,946 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,273 UART: [ldev] --
10,589,278 UART: [fwproc] Wait for Commands...
10,592,402 UART: [fwproc] Recv command 0x46574c44
10,594,408 UART: [fwproc] Recv'd Img size: 118548 bytes
14,070,136 UART: ROM Fatal Error: 0x000B0016
14,073,405 >>> mbox cmd response: failed
14,073,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,074,196 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,298 writing to cptra_bootfsm_go
6,277,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,967,453 >>> mbox cmd response: failed
13,968,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,968,558 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
192,295 UART:
192,678 UART: Running Caliptra ROM ...
193,783 UART:
193,933 UART: [state] CFI Enabled
263,255 UART: [state] LifecycleState = Unprovisioned
265,607 UART: [state] DebugLocked = No
268,393 UART: [state] WD Timer not started. Device not locked for debugging
272,381 UART: [kat] SHA2-256
462,260 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,029 UART: [kat] ++
473,516 UART: [kat] sha1
484,454 UART: [kat] SHA2-256
487,475 UART: [kat] SHA2-384
494,000 UART: [kat] SHA2-512-ACC
496,570 UART: [kat] ECC-384
2,943,658 UART: [kat] HMAC-384Kdf
2,971,812 UART: [kat] LMS
3,503,587 UART: [kat] --
3,508,724 UART: [cold-reset] ++
3,510,392 UART: [fht] FHT @ 0x50003400
3,522,139 UART: [idev] ++
3,522,830 UART: [idev] CDI.KEYID = 6
3,523,806 UART: [idev] SUBJECT.KEYID = 7
3,525,045 UART: [idev] UDS.KEYID = 0
6,067,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,062 UART: [idev] Erasing UDS.KEYID = 0
6,218,526 UART: [idev] Sha1 KeyId Algorithm
6,219,772 UART: [idev] --
6,220,269 UART: [ldev] ++
6,220,762 UART: [ldev] CDI.KEYID = 6
6,221,724 UART: [ldev] SUBJECT.KEYID = 5
6,222,839 UART: [ldev] AUTHORITY.KEYID = 7
6,224,018 UART: [ldev] FE.KEYID = 1
6,224,908 UART: [ldev] Erasing FE.KEYID = 1
8,607,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,371 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,493 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,509 UART: [ldev] --
10,414,050 UART: [fwproc] Wait for Commands...
10,417,236 UART: [fwproc] Recv command 0x46574c44
10,419,557 UART: [fwproc] Recv'd Img size: 118548 bytes
13,910,423 UART: ROM Fatal Error: 0x000B0016
13,914,104 >>> mbox cmd response: failed
13,914,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,914,815 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
5,953,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,325,332 >>> mbox cmd response: failed
14,326,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,326,622 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,724 UART:
193,147 UART: Running Caliptra ROM ...
194,239 UART:
603,940 UART: [state] CFI Enabled
619,656 UART: [state] LifecycleState = Unprovisioned
622,021 UART: [state] DebugLocked = No
624,492 UART: [state] WD Timer not started. Device not locked for debugging
628,424 UART: [kat] SHA2-256
818,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,139 UART: [kat] ++
829,732 UART: [kat] sha1
840,442 UART: [kat] SHA2-256
843,449 UART: [kat] SHA2-384
849,734 UART: [kat] SHA2-512-ACC
852,302 UART: [kat] ECC-384
3,293,800 UART: [kat] HMAC-384Kdf
3,307,055 UART: [kat] LMS
3,838,908 UART: [kat] --
3,843,608 UART: [cold-reset] ++
3,845,493 UART: [fht] FHT @ 0x50003400
3,858,374 UART: [idev] ++
3,859,058 UART: [idev] CDI.KEYID = 6
3,859,945 UART: [idev] SUBJECT.KEYID = 7
3,861,233 UART: [idev] UDS.KEYID = 0
6,391,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,541,638 UART: [idev] Erasing UDS.KEYID = 0
6,543,097 UART: [idev] Sha1 KeyId Algorithm
6,544,351 UART: [idev] --
6,544,848 UART: [ldev] ++
6,545,340 UART: [ldev] CDI.KEYID = 6
6,546,302 UART: [ldev] SUBJECT.KEYID = 5
6,547,417 UART: [ldev] AUTHORITY.KEYID = 7
6,548,597 UART: [ldev] FE.KEYID = 1
6,549,477 UART: [ldev] Erasing FE.KEYID = 1
8,863,462 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,597,426 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,612,457 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,453 UART: [ldev] --
10,654,340 UART: [fwproc] Wait for Commands...
10,656,771 UART: [fwproc] Recv command 0x46574c44
10,659,044 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,867 UART: ROM Fatal Error: 0x000B0016
14,156,506 >>> mbox cmd response: failed
14,156,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,157,281 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
6,295,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,566,605 >>> mbox cmd response: failed
14,567,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,567,779 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,847 UART: [kat] SHA2-256
881,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,893 UART: [kat] ++
886,045 UART: [kat] sha1
890,351 UART: [kat] SHA2-256
892,289 UART: [kat] SHA2-384
894,860 UART: [kat] SHA2-512-ACC
896,761 UART: [kat] ECC-384
902,556 UART: [kat] HMAC-384Kdf
907,108 UART: [kat] LMS
1,475,304 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,431 UART: [fht] Storing FHT @ 0x50003400
1,479,272 UART: [idev] ++
1,479,440 UART: [idev] CDI.KEYID = 6
1,479,800 UART: [idev] SUBJECT.KEYID = 7
1,480,224 UART: [idev] UDS.KEYID = 0
1,480,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,288 UART: [idev] Erasing UDS.KEYID = 0
1,504,656 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,172 UART: [idev] --
1,514,259 UART: [ldev] ++
1,514,427 UART: [ldev] CDI.KEYID = 6
1,514,790 UART: [ldev] SUBJECT.KEYID = 5
1,515,216 UART: [ldev] AUTHORITY.KEYID = 7
1,515,679 UART: [ldev] FE.KEYID = 1
1,520,909 UART: [ldev] Erasing FE.KEYID = 1
1,546,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,286 UART: [ldev] --
1,585,657 UART: [fwproc] Waiting for Commands...
1,586,524 UART: [fwproc] Received command 0x46574c44
1,587,315 UART: [fwproc] Received Image of size 118548 bytes
2,930,137 UART: ROM Fatal Error: 0x000B0016
2,931,294 >>> mbox cmd response: failed
2,931,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,300 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,786,269 >>> mbox cmd response: failed
2,786,269 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,786,275 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
86,984 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,694 UART: [kat] SHA2-256
882,625 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,740 UART: [kat] ++
886,892 UART: [kat] sha1
891,098 UART: [kat] SHA2-256
893,036 UART: [kat] SHA2-384
895,927 UART: [kat] SHA2-512-ACC
897,828 UART: [kat] ECC-384
903,579 UART: [kat] HMAC-384Kdf
908,285 UART: [kat] LMS
1,476,481 UART: [kat] --
1,477,380 UART: [cold-reset] ++
1,477,920 UART: [fht] Storing FHT @ 0x50003400
1,480,623 UART: [idev] ++
1,480,791 UART: [idev] CDI.KEYID = 6
1,481,151 UART: [idev] SUBJECT.KEYID = 7
1,481,575 UART: [idev] UDS.KEYID = 0
1,481,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,611 UART: [idev] Erasing UDS.KEYID = 0
1,506,557 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,085 UART: [idev] --
1,515,978 UART: [ldev] ++
1,516,146 UART: [ldev] CDI.KEYID = 6
1,516,509 UART: [ldev] SUBJECT.KEYID = 5
1,516,935 UART: [ldev] AUTHORITY.KEYID = 7
1,517,398 UART: [ldev] FE.KEYID = 1
1,522,792 UART: [ldev] Erasing FE.KEYID = 1
1,548,341 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,712 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,177 UART: [ldev] --
1,587,680 UART: [fwproc] Waiting for Commands...
1,588,471 UART: [fwproc] Received command 0x46574c44
1,589,262 UART: [fwproc] Received Image of size 118548 bytes
2,931,908 UART: ROM Fatal Error: 0x000B0016
2,933,065 >>> mbox cmd response: failed
2,933,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,071 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,750 >>> mbox cmd response: failed
2,785,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,756 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,466 UART: [kat] SHA2-256
891,016 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,120 UART: [kat] ++
895,272 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,161 UART: [kat] SHA2-512-ACC
906,062 UART: [kat] ECC-384
916,109 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,958 UART: [cold-reset] ++
1,170,348 UART: [fht] FHT @ 0x50003400
1,172,848 UART: [idev] ++
1,173,016 UART: [idev] CDI.KEYID = 6
1,173,377 UART: [idev] SUBJECT.KEYID = 7
1,173,802 UART: [idev] UDS.KEYID = 0
1,174,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,623 UART: [idev] Erasing UDS.KEYID = 0
1,198,679 UART: [idev] Sha1 KeyId Algorithm
1,207,555 UART: [idev] --
1,208,736 UART: [ldev] ++
1,208,904 UART: [ldev] CDI.KEYID = 6
1,209,268 UART: [ldev] SUBJECT.KEYID = 5
1,209,695 UART: [ldev] AUTHORITY.KEYID = 7
1,210,158 UART: [ldev] FE.KEYID = 1
1,215,600 UART: [ldev] Erasing FE.KEYID = 1
1,241,937 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,800 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,000 UART: [ldev] --
1,281,359 UART: [fwproc] Wait for Commands...
1,281,950 UART: [fwproc] Recv command 0x46574c44
1,282,683 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,294 UART: ROM Fatal Error: 0x000B0016
2,627,451 >>> mbox cmd response: failed
2,627,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,457 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,766 >>> mbox cmd response: failed
2,482,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,772 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,366 UART: [kat] SHA2-512-ACC
906,267 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,534 UART: [kat] LMS
1,168,846 UART: [kat] --
1,169,695 UART: [cold-reset] ++
1,170,257 UART: [fht] FHT @ 0x50003400
1,173,065 UART: [idev] ++
1,173,233 UART: [idev] CDI.KEYID = 6
1,173,594 UART: [idev] SUBJECT.KEYID = 7
1,174,019 UART: [idev] UDS.KEYID = 0
1,174,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,110 UART: [idev] Erasing UDS.KEYID = 0
1,199,426 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,323 UART: [ldev] ++
1,209,491 UART: [ldev] CDI.KEYID = 6
1,209,855 UART: [ldev] SUBJECT.KEYID = 5
1,210,282 UART: [ldev] AUTHORITY.KEYID = 7
1,210,745 UART: [ldev] FE.KEYID = 1
1,216,211 UART: [ldev] Erasing FE.KEYID = 1
1,242,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,883 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,785 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,673 UART: [fwproc] Recv command 0x46574c44
1,283,406 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,661 UART: ROM Fatal Error: 0x000B0016
2,627,818 >>> mbox cmd response: failed
2,627,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,824 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,068 >>> mbox cmd response: failed
2,484,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,074 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,678 UART: [state] LifecycleState = Unprovisioned
86,333 UART: [state] DebugLocked = No
86,875 UART: [state] WD Timer not started. Device not locked for debugging
88,116 UART: [kat] SHA2-256
893,766 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,891 UART: [kat] ++
898,043 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,994 UART: [kat] SHA2-512-ACC
908,895 UART: [kat] ECC-384
918,598 UART: [kat] HMAC-384Kdf
923,018 UART: [kat] LMS
1,171,346 UART: [kat] --
1,172,265 UART: [cold-reset] ++
1,172,803 UART: [fht] FHT @ 0x50003400
1,175,492 UART: [idev] ++
1,175,660 UART: [idev] CDI.KEYID = 6
1,176,020 UART: [idev] SUBJECT.KEYID = 7
1,176,444 UART: [idev] UDS.KEYID = 0
1,176,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,320 UART: [idev] Erasing UDS.KEYID = 0
1,201,175 UART: [idev] Sha1 KeyId Algorithm
1,209,783 UART: [idev] --
1,210,961 UART: [ldev] ++
1,211,129 UART: [ldev] CDI.KEYID = 6
1,211,492 UART: [ldev] SUBJECT.KEYID = 5
1,211,918 UART: [ldev] AUTHORITY.KEYID = 7
1,212,381 UART: [ldev] FE.KEYID = 1
1,217,477 UART: [ldev] Erasing FE.KEYID = 1
1,244,070 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,047 UART: [ldev] --
1,283,350 UART: [fwproc] Wait for Commands...
1,284,140 UART: [fwproc] Recv command 0x46574c44
1,284,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,488 UART: ROM Fatal Error: 0x000B0016
2,629,645 >>> mbox cmd response: failed
2,629,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,651 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,612 >>> mbox cmd response: failed
2,483,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,618 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,235 UART: [state] LifecycleState = Unprovisioned
85,890 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,603 UART: [kat] SHA2-256
893,253 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,378 UART: [kat] ++
897,530 UART: [kat] sha1
901,828 UART: [kat] SHA2-256
903,768 UART: [kat] SHA2-384
906,639 UART: [kat] SHA2-512-ACC
908,540 UART: [kat] ECC-384
918,315 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,060 UART: [cold-reset] ++
1,172,558 UART: [fht] FHT @ 0x50003400
1,175,335 UART: [idev] ++
1,175,503 UART: [idev] CDI.KEYID = 6
1,175,863 UART: [idev] SUBJECT.KEYID = 7
1,176,287 UART: [idev] UDS.KEYID = 0
1,176,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,587 UART: [idev] Erasing UDS.KEYID = 0
1,201,908 UART: [idev] Sha1 KeyId Algorithm
1,210,324 UART: [idev] --
1,211,316 UART: [ldev] ++
1,211,484 UART: [ldev] CDI.KEYID = 6
1,211,847 UART: [ldev] SUBJECT.KEYID = 5
1,212,273 UART: [ldev] AUTHORITY.KEYID = 7
1,212,736 UART: [ldev] FE.KEYID = 1
1,218,172 UART: [ldev] Erasing FE.KEYID = 1
1,244,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,460 UART: [ldev] --
1,283,955 UART: [fwproc] Wait for Commands...
1,284,685 UART: [fwproc] Recv command 0x46574c44
1,285,413 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,955 UART: ROM Fatal Error: 0x000B0016
2,630,112 >>> mbox cmd response: failed
2,630,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,118 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,718 >>> mbox cmd response: failed
2,483,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,724 >>> mbox cmd response: failed
test fw_load::corrupted_fw_load_version ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,071 UART:
192,466 UART: Running Caliptra ROM ...
193,783 UART:
193,940 UART: [state] CFI Enabled
262,795 UART: [state] LifecycleState = Production
264,628 UART: [state] DebugLocked = No
266,120 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,262 UART: [kat] SHA2-256
440,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,496 UART: [kat] ++
451,995 UART: [kat] sha1
462,983 UART: [kat] SHA2-256
465,675 UART: [kat] SHA2-384
472,898 UART: [kat] SHA2-512-ACC
475,293 UART: [kat] ECC-384
2,768,175 UART: [kat] HMAC-384Kdf
2,800,928 UART: [kat] LMS
3,991,248 UART: [kat] --
3,995,538 UART: [cold-reset] ++
3,997,426 UART: [fht] Storing FHT @ 0x50003400
4,008,043 UART: [idev] ++
4,008,636 UART: [idev] CDI.KEYID = 6
4,009,609 UART: [idev] SUBJECT.KEYID = 7
4,010,779 UART: [idev] UDS.KEYID = 0
4,013,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,239 UART: [idev] Erasing UDS.KEYID = 0
7,350,394 UART: [idev] Using Sha1 for KeyId Algorithm
7,373,666 UART: [idev] --
7,379,016 UART: [ldev] ++
7,379,593 UART: [ldev] CDI.KEYID = 6
7,380,562 UART: [ldev] SUBJECT.KEYID = 5
7,381,775 UART: [ldev] AUTHORITY.KEYID = 7
7,383,166 UART: [ldev] FE.KEYID = 1
7,423,102 UART: [ldev] Erasing FE.KEYID = 1
10,754,538 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,665 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,068 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,132,057 UART: [ldev] --
13,137,270 UART: [fwproc] Waiting for Commands...
13,140,665 UART: [fwproc] Received command 0x46574c44
13,143,005 UART: [fwproc] Received Image of size 118548 bytes
13,243,106 UART: ROM Fatal Error: 0x000B0007
13,246,621 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,789,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,968,365 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,583 UART:
192,944 UART: Running Caliptra ROM ...
194,137 UART:
603,902 UART: [state] CFI Enabled
620,343 UART: [state] LifecycleState = Production
622,182 UART: [state] DebugLocked = No
625,033 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,647 UART: [kat] SHA2-256
799,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,950 UART: [kat] ++
810,428 UART: [kat] sha1
822,496 UART: [kat] SHA2-256
825,187 UART: [kat] SHA2-384
832,031 UART: [kat] SHA2-512-ACC
834,379 UART: [kat] ECC-384
3,120,125 UART: [kat] HMAC-384Kdf
3,131,669 UART: [kat] LMS
4,321,808 UART: [kat] --
4,326,486 UART: [cold-reset] ++
4,328,057 UART: [fht] Storing FHT @ 0x50003400
4,338,923 UART: [idev] ++
4,339,496 UART: [idev] CDI.KEYID = 6
4,340,409 UART: [idev] SUBJECT.KEYID = 7
4,341,687 UART: [idev] UDS.KEYID = 0
4,344,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,916 UART: [idev] Erasing UDS.KEYID = 0
7,627,747 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,918 UART: [idev] --
7,653,488 UART: [ldev] ++
7,654,104 UART: [ldev] CDI.KEYID = 6
7,655,029 UART: [ldev] SUBJECT.KEYID = 5
7,656,260 UART: [ldev] AUTHORITY.KEYID = 7
7,657,503 UART: [ldev] FE.KEYID = 1
7,667,671 UART: [ldev] Erasing FE.KEYID = 1
10,954,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,698 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,176 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,066 UART: [ldev] --
13,316,911 UART: [fwproc] Waiting for Commands...
13,319,671 UART: [fwproc] Received command 0x46574c44
13,321,863 UART: [fwproc] Received Image of size 118548 bytes
13,419,946 UART: ROM Fatal Error: 0x000B0007
13,423,483 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
4,131,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,168,520 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,191 UART:
192,569 UART: Running Caliptra ROM ...
193,748 UART:
193,902 UART: [state] CFI Enabled
266,352 UART: [state] LifecycleState = Production
268,174 UART: [state] DebugLocked = No
269,399 UART: [state] WD Timer not started. Device not locked for debugging
273,629 UART: [kat] SHA2-256
453,322 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,085 UART: [kat] ++
464,574 UART: [kat] sha1
476,103 UART: [kat] SHA2-256
478,793 UART: [kat] SHA2-384
484,454 UART: [kat] SHA2-512-ACC
486,798 UART: [kat] ECC-384
2,949,034 UART: [kat] HMAC-384Kdf
2,971,814 UART: [kat] LMS
3,448,303 UART: [kat] --
3,453,037 UART: [cold-reset] ++
3,453,963 UART: [fht] FHT @ 0x50003400
3,463,816 UART: [idev] ++
3,464,390 UART: [idev] CDI.KEYID = 6
3,465,281 UART: [idev] SUBJECT.KEYID = 7
3,466,551 UART: [idev] UDS.KEYID = 0
3,469,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,004 UART: [idev] Erasing UDS.KEYID = 0
5,967,219 UART: [idev] Sha1 KeyId Algorithm
5,990,997 UART: [idev] --
5,995,431 UART: [ldev] ++
5,996,002 UART: [ldev] CDI.KEYID = 6
5,996,898 UART: [ldev] SUBJECT.KEYID = 5
5,998,187 UART: [ldev] AUTHORITY.KEYID = 7
5,999,428 UART: [ldev] FE.KEYID = 1
6,038,472 UART: [ldev] Erasing FE.KEYID = 1
8,544,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,601 UART: [ldev] --
10,354,696 UART: [fwproc] Wait for Commands...
10,356,633 UART: [fwproc] Recv command 0x46574c44
10,358,679 UART: [fwproc] Recv'd Img size: 118548 bytes
10,473,229 UART: ROM Fatal Error: 0x000B0007
10,476,475 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
3,462,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,385,383 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,735 UART:
193,093 UART: Running Caliptra ROM ...
194,281 UART:
604,118 UART: [state] CFI Enabled
618,812 UART: [state] LifecycleState = Production
620,597 UART: [state] DebugLocked = No
622,360 UART: [state] WD Timer not started. Device not locked for debugging
625,991 UART: [kat] SHA2-256
805,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,419 UART: [kat] ++
816,922 UART: [kat] sha1
828,300 UART: [kat] SHA2-256
830,996 UART: [kat] SHA2-384
836,927 UART: [kat] SHA2-512-ACC
839,325 UART: [kat] ECC-384
3,281,335 UART: [kat] HMAC-384Kdf
3,293,901 UART: [kat] LMS
3,770,413 UART: [kat] --
3,774,747 UART: [cold-reset] ++
3,776,201 UART: [fht] FHT @ 0x50003400
3,788,118 UART: [idev] ++
3,788,694 UART: [idev] CDI.KEYID = 6
3,789,637 UART: [idev] SUBJECT.KEYID = 7
3,790,856 UART: [idev] UDS.KEYID = 0
3,793,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,110 UART: [idev] Erasing UDS.KEYID = 0
6,266,611 UART: [idev] Sha1 KeyId Algorithm
6,290,658 UART: [idev] --
6,296,708 UART: [ldev] ++
6,297,280 UART: [ldev] CDI.KEYID = 6
6,298,228 UART: [ldev] SUBJECT.KEYID = 5
6,299,446 UART: [ldev] AUTHORITY.KEYID = 7
6,300,681 UART: [ldev] FE.KEYID = 1
6,313,389 UART: [ldev] Erasing FE.KEYID = 1
8,790,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,375 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,383 UART: [ldev] --
10,583,579 UART: [fwproc] Wait for Commands...
10,586,345 UART: [fwproc] Recv command 0x46574c44
10,588,339 UART: [fwproc] Recv'd Img size: 118548 bytes
10,699,126 UART: ROM Fatal Error: 0x000B0007
10,702,373 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,772,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,652 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,076 UART:
192,463 UART: Running Caliptra ROM ...
193,566 UART:
193,718 UART: [state] CFI Enabled
263,999 UART: [state] LifecycleState = Production
266,231 UART: [state] DebugLocked = No
267,593 UART: [state] WD Timer not started. Device not locked for debugging
272,620 UART: [kat] SHA2-256
462,514 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,320 UART: [kat] ++
473,768 UART: [kat] sha1
486,703 UART: [kat] SHA2-256
489,719 UART: [kat] SHA2-384
495,216 UART: [kat] SHA2-512-ACC
497,797 UART: [kat] ECC-384
2,947,896 UART: [kat] HMAC-384Kdf
2,972,252 UART: [kat] LMS
3,504,009 UART: [kat] --
3,509,019 UART: [cold-reset] ++
3,510,480 UART: [fht] FHT @ 0x50003400
3,521,653 UART: [idev] ++
3,522,346 UART: [idev] CDI.KEYID = 6
3,523,294 UART: [idev] SUBJECT.KEYID = 7
3,524,514 UART: [idev] UDS.KEYID = 0
3,527,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,439 UART: [idev] Erasing UDS.KEYID = 0
6,031,012 UART: [idev] Sha1 KeyId Algorithm
6,053,618 UART: [idev] --
6,058,813 UART: [ldev] ++
6,059,510 UART: [ldev] CDI.KEYID = 6
6,060,448 UART: [ldev] SUBJECT.KEYID = 5
6,061,621 UART: [ldev] AUTHORITY.KEYID = 7
6,062,807 UART: [ldev] FE.KEYID = 1
6,101,322 UART: [ldev] Erasing FE.KEYID = 1
8,611,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,044 UART: [ldev] --
10,415,155 UART: [fwproc] Wait for Commands...
10,417,922 UART: [fwproc] Recv command 0x46574c44
10,420,283 UART: [fwproc] Recv'd Img size: 118548 bytes
10,551,798 UART: ROM Fatal Error: 0x000B0007
10,555,477 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,441,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,364,244 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,637 UART:
192,998 UART: Running Caliptra ROM ...
194,127 UART:
603,693 UART: [state] CFI Enabled
617,755 UART: [state] LifecycleState = Production
619,932 UART: [state] DebugLocked = No
621,427 UART: [state] WD Timer not started. Device not locked for debugging
625,656 UART: [kat] SHA2-256
815,504 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,317 UART: [kat] ++
826,837 UART: [kat] sha1
838,158 UART: [kat] SHA2-256
841,175 UART: [kat] SHA2-384
847,991 UART: [kat] SHA2-512-ACC
850,564 UART: [kat] ECC-384
3,292,545 UART: [kat] HMAC-384Kdf
3,304,905 UART: [kat] LMS
3,836,757 UART: [kat] --
3,839,354 UART: [cold-reset] ++
3,841,615 UART: [fht] FHT @ 0x50003400
3,853,790 UART: [idev] ++
3,854,462 UART: [idev] CDI.KEYID = 6
3,855,418 UART: [idev] SUBJECT.KEYID = 7
3,856,647 UART: [idev] UDS.KEYID = 0
3,859,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,672 UART: [idev] Erasing UDS.KEYID = 0
6,337,140 UART: [idev] Sha1 KeyId Algorithm
6,360,117 UART: [idev] --
6,364,814 UART: [ldev] ++
6,365,527 UART: [ldev] CDI.KEYID = 6
6,366,460 UART: [ldev] SUBJECT.KEYID = 5
6,367,567 UART: [ldev] AUTHORITY.KEYID = 7
6,368,807 UART: [ldev] FE.KEYID = 1
6,379,621 UART: [ldev] Erasing FE.KEYID = 1
8,857,948 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,241 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,213 UART: [ldev] --
10,650,242 UART: [fwproc] Wait for Commands...
10,652,146 UART: [fwproc] Recv command 0x46574c44
10,654,059 UART: [fwproc] Recv'd Img size: 118548 bytes
10,784,341 UART: ROM Fatal Error: 0x000B0007
10,787,975 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,757,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,579,566 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Production
85,607 UART: [state] DebugLocked = No
86,235 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,085 UART: [kat] SHA2-256
892,023 UART: [kat] SHA2-384
894,764 UART: [kat] SHA2-512-ACC
896,665 UART: [kat] ECC-384
902,202 UART: [kat] HMAC-384Kdf
906,774 UART: [kat] LMS
1,474,970 UART: [kat] --
1,476,007 UART: [cold-reset] ++
1,476,393 UART: [fht] Storing FHT @ 0x50003400
1,478,962 UART: [idev] ++
1,479,130 UART: [idev] CDI.KEYID = 6
1,479,490 UART: [idev] SUBJECT.KEYID = 7
1,479,914 UART: [idev] UDS.KEYID = 0
1,480,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,906 UART: [idev] Erasing UDS.KEYID = 0
1,504,534 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,349 UART: [ldev] ++
1,514,517 UART: [ldev] CDI.KEYID = 6
1,514,880 UART: [ldev] SUBJECT.KEYID = 5
1,515,306 UART: [ldev] AUTHORITY.KEYID = 7
1,515,769 UART: [ldev] FE.KEYID = 1
1,520,967 UART: [ldev] Erasing FE.KEYID = 1
1,546,570 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,640 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,352 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,382 UART: [ldev] --
1,585,761 UART: [fwproc] Waiting for Commands...
1,586,380 UART: [fwproc] Received command 0x46574c44
1,587,171 UART: [fwproc] Received Image of size 118548 bytes
1,636,640 UART: ROM Fatal Error: 0x000B0007
1,637,797 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,603 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,484 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Production
86,188 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,466 UART: [kat] SHA2-256
882,397 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,512 UART: [kat] ++
886,664 UART: [kat] sha1
890,958 UART: [kat] SHA2-256
892,896 UART: [kat] SHA2-384
895,623 UART: [kat] SHA2-512-ACC
897,524 UART: [kat] ECC-384
903,119 UART: [kat] HMAC-384Kdf
907,647 UART: [kat] LMS
1,475,843 UART: [kat] --
1,476,762 UART: [cold-reset] ++
1,477,210 UART: [fht] Storing FHT @ 0x50003400
1,480,059 UART: [idev] ++
1,480,227 UART: [idev] CDI.KEYID = 6
1,480,587 UART: [idev] SUBJECT.KEYID = 7
1,481,011 UART: [idev] UDS.KEYID = 0
1,481,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,351 UART: [idev] Erasing UDS.KEYID = 0
1,506,199 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,791 UART: [idev] --
1,515,870 UART: [ldev] ++
1,516,038 UART: [ldev] CDI.KEYID = 6
1,516,401 UART: [ldev] SUBJECT.KEYID = 5
1,516,827 UART: [ldev] AUTHORITY.KEYID = 7
1,517,290 UART: [ldev] FE.KEYID = 1
1,522,236 UART: [ldev] Erasing FE.KEYID = 1
1,547,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,486 UART: [fwproc] Waiting for Commands...
1,587,189 UART: [fwproc] Received command 0x46574c44
1,587,980 UART: [fwproc] Received Image of size 118548 bytes
1,637,073 UART: ROM Fatal Error: 0x000B0007
1,638,230 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,031 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,422 UART: [state] LifecycleState = Production
86,029 UART: [state] DebugLocked = No
86,677 UART: [state] WD Timer not started. Device not locked for debugging
87,842 UART: [kat] SHA2-256
891,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,496 UART: [kat] ++
895,648 UART: [kat] sha1
899,926 UART: [kat] SHA2-256
901,866 UART: [kat] SHA2-384
904,495 UART: [kat] SHA2-512-ACC
906,396 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,910 UART: [fht] FHT @ 0x50003400
1,172,704 UART: [idev] ++
1,172,872 UART: [idev] CDI.KEYID = 6
1,173,233 UART: [idev] SUBJECT.KEYID = 7
1,173,658 UART: [idev] UDS.KEYID = 0
1,174,004 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,743 UART: [idev] Erasing UDS.KEYID = 0
1,199,325 UART: [idev] Sha1 KeyId Algorithm
1,208,185 UART: [idev] --
1,209,484 UART: [ldev] ++
1,209,652 UART: [ldev] CDI.KEYID = 6
1,210,016 UART: [ldev] SUBJECT.KEYID = 5
1,210,443 UART: [ldev] AUTHORITY.KEYID = 7
1,210,906 UART: [ldev] FE.KEYID = 1
1,215,794 UART: [ldev] Erasing FE.KEYID = 1
1,241,875 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,617 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,333 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,934 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,219 UART: [fwproc] Wait for Commands...
1,281,888 UART: [fwproc] Recv command 0x46574c44
1,282,621 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,927 UART: ROM Fatal Error: 0x000B0007
1,332,084 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,847 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Production
86,406 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,323 UART: [kat] SHA2-256
891,873 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,977 UART: [kat] ++
896,129 UART: [kat] sha1
900,385 UART: [kat] SHA2-256
902,325 UART: [kat] SHA2-384
904,914 UART: [kat] SHA2-512-ACC
906,815 UART: [kat] ECC-384
916,820 UART: [kat] HMAC-384Kdf
921,274 UART: [kat] LMS
1,169,586 UART: [kat] --
1,170,515 UART: [cold-reset] ++
1,170,841 UART: [fht] FHT @ 0x50003400
1,173,387 UART: [idev] ++
1,173,555 UART: [idev] CDI.KEYID = 6
1,173,916 UART: [idev] SUBJECT.KEYID = 7
1,174,341 UART: [idev] UDS.KEYID = 0
1,174,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,264 UART: [idev] Erasing UDS.KEYID = 0
1,198,922 UART: [idev] Sha1 KeyId Algorithm
1,207,646 UART: [idev] --
1,208,727 UART: [ldev] ++
1,208,895 UART: [ldev] CDI.KEYID = 6
1,209,259 UART: [ldev] SUBJECT.KEYID = 5
1,209,686 UART: [ldev] AUTHORITY.KEYID = 7
1,210,149 UART: [ldev] FE.KEYID = 1
1,215,541 UART: [ldev] Erasing FE.KEYID = 1
1,241,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,485 UART: [ldev] --
1,280,896 UART: [fwproc] Wait for Commands...
1,281,675 UART: [fwproc] Recv command 0x46574c44
1,282,408 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,318 UART: ROM Fatal Error: 0x000B0007
1,332,475 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,568 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,852 UART: [state] LifecycleState = Production
85,459 UART: [state] DebugLocked = No
86,015 UART: [state] WD Timer not started. Device not locked for debugging
87,360 UART: [kat] SHA2-256
893,010 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,135 UART: [kat] ++
897,287 UART: [kat] sha1
901,509 UART: [kat] SHA2-256
903,449 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,632 UART: [kat] HMAC-384Kdf
922,068 UART: [kat] LMS
1,170,396 UART: [kat] --
1,171,165 UART: [cold-reset] ++
1,171,505 UART: [fht] FHT @ 0x50003400
1,174,314 UART: [idev] ++
1,174,482 UART: [idev] CDI.KEYID = 6
1,174,842 UART: [idev] SUBJECT.KEYID = 7
1,175,266 UART: [idev] UDS.KEYID = 0
1,175,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,477 UART: [idev] Sha1 KeyId Algorithm
1,208,897 UART: [idev] --
1,210,097 UART: [ldev] ++
1,210,265 UART: [ldev] CDI.KEYID = 6
1,210,628 UART: [ldev] SUBJECT.KEYID = 5
1,211,054 UART: [ldev] AUTHORITY.KEYID = 7
1,211,517 UART: [ldev] FE.KEYID = 1
1,216,923 UART: [ldev] Erasing FE.KEYID = 1
1,243,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,069 UART: [ldev] --
1,283,370 UART: [fwproc] Wait for Commands...
1,284,046 UART: [fwproc] Recv command 0x46574c44
1,284,774 UART: [fwproc] Recv'd Img size: 118548 bytes
1,334,051 UART: ROM Fatal Error: 0x000B0007
1,335,208 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,071 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,143 UART: [state] LifecycleState = Production
85,750 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,487 UART: [kat] SHA2-256
893,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,262 UART: [kat] ++
897,414 UART: [kat] sha1
901,660 UART: [kat] SHA2-256
903,600 UART: [kat] SHA2-384
906,389 UART: [kat] SHA2-512-ACC
908,290 UART: [kat] ECC-384
918,449 UART: [kat] HMAC-384Kdf
923,043 UART: [kat] LMS
1,171,371 UART: [kat] --
1,172,190 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,179 UART: [idev] ++
1,175,347 UART: [idev] CDI.KEYID = 6
1,175,707 UART: [idev] SUBJECT.KEYID = 7
1,176,131 UART: [idev] UDS.KEYID = 0
1,176,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,013 UART: [idev] Erasing UDS.KEYID = 0
1,201,374 UART: [idev] Sha1 KeyId Algorithm
1,209,772 UART: [idev] --
1,210,828 UART: [ldev] ++
1,210,996 UART: [ldev] CDI.KEYID = 6
1,211,359 UART: [ldev] SUBJECT.KEYID = 5
1,211,785 UART: [ldev] AUTHORITY.KEYID = 7
1,212,248 UART: [ldev] FE.KEYID = 1
1,217,266 UART: [ldev] Erasing FE.KEYID = 1
1,243,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,060 UART: [ldev] --
1,282,549 UART: [fwproc] Wait for Commands...
1,283,219 UART: [fwproc] Recv command 0x46574c44
1,283,947 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,254 UART: ROM Fatal Error: 0x000B0007
1,334,411 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,189,326 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,266 UART:
192,619 UART: Running Caliptra ROM ...
193,748 UART:
193,891 UART: [state] CFI Enabled
267,478 UART: [state] LifecycleState = Production
269,308 UART: [state] DebugLocked = No
271,345 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,595 UART: [kat] SHA2-256
446,293 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,802 UART: [kat] ++
457,333 UART: [kat] sha1
468,667 UART: [kat] SHA2-256
471,353 UART: [kat] SHA2-384
476,149 UART: [kat] SHA2-512-ACC
478,549 UART: [kat] ECC-384
2,767,463 UART: [kat] HMAC-384Kdf
2,781,562 UART: [kat] LMS
3,971,861 UART: [kat] --
3,978,790 UART: [cold-reset] ++
3,980,950 UART: [fht] Storing FHT @ 0x50003400
3,993,031 UART: [idev] ++
3,993,605 UART: [idev] CDI.KEYID = 6
3,994,581 UART: [idev] SUBJECT.KEYID = 7
3,995,802 UART: [idev] UDS.KEYID = 0
3,998,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,148,276 UART: [idev] Erasing UDS.KEYID = 0
7,328,777 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,832 UART: [idev] --
7,353,701 UART: [ldev] ++
7,354,275 UART: [ldev] CDI.KEYID = 6
7,355,168 UART: [ldev] SUBJECT.KEYID = 5
7,356,358 UART: [ldev] AUTHORITY.KEYID = 7
7,357,696 UART: [ldev] FE.KEYID = 1
7,404,517 UART: [ldev] Erasing FE.KEYID = 1
10,734,887 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,263 UART: [ldev] --
13,096,294 UART: [fwproc] Waiting for Commands...
13,099,429 UART: [fwproc] Received command 0x46574c44
13,101,621 UART: [fwproc] Received Image of size 118548 bytes
13,201,901 UART: ROM Fatal Error: 0x000B0007
13,205,377 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,784,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,966,947 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
192,520 UART:
192,874 UART: Running Caliptra ROM ...
194,063 UART:
603,598 UART: [state] CFI Enabled
618,188 UART: [state] LifecycleState = Production
619,963 UART: [state] DebugLocked = No
621,832 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,252 UART: [kat] SHA2-256
796,991 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,539 UART: [kat] ++
807,997 UART: [kat] sha1
819,145 UART: [kat] SHA2-256
821,839 UART: [kat] SHA2-384
826,598 UART: [kat] SHA2-512-ACC
828,977 UART: [kat] ECC-384
3,114,905 UART: [kat] HMAC-384Kdf
3,126,281 UART: [kat] LMS
4,316,380 UART: [kat] --
4,322,426 UART: [cold-reset] ++
4,323,830 UART: [fht] Storing FHT @ 0x50003400
4,334,403 UART: [idev] ++
4,334,980 UART: [idev] CDI.KEYID = 6
4,335,907 UART: [idev] SUBJECT.KEYID = 7
4,337,130 UART: [idev] UDS.KEYID = 0
4,340,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,438 UART: [idev] Erasing UDS.KEYID = 0
7,624,809 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,895 UART: [idev] --
7,648,867 UART: [ldev] ++
7,649,478 UART: [ldev] CDI.KEYID = 6
7,650,401 UART: [ldev] SUBJECT.KEYID = 5
7,651,627 UART: [ldev] AUTHORITY.KEYID = 7
7,652,925 UART: [ldev] FE.KEYID = 1
7,665,044 UART: [ldev] Erasing FE.KEYID = 1
10,952,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,871 UART: [ldev] --
13,313,423 UART: [fwproc] Waiting for Commands...
13,316,508 UART: [fwproc] Received command 0x46574c44
13,318,757 UART: [fwproc] Received Image of size 118548 bytes
13,416,427 UART: ROM Fatal Error: 0x000B0007
13,419,953 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
4,133,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,167,750 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,178 UART:
192,556 UART: Running Caliptra ROM ...
193,649 UART:
193,795 UART: [state] CFI Enabled
262,037 UART: [state] LifecycleState = Production
263,812 UART: [state] DebugLocked = No
265,386 UART: [state] WD Timer not started. Device not locked for debugging
270,145 UART: [kat] SHA2-256
449,757 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,553 UART: [kat] ++
461,031 UART: [kat] sha1
472,082 UART: [kat] SHA2-256
474,773 UART: [kat] SHA2-384
479,573 UART: [kat] SHA2-512-ACC
481,971 UART: [kat] ECC-384
2,927,674 UART: [kat] HMAC-384Kdf
2,952,122 UART: [kat] LMS
3,428,632 UART: [kat] --
3,433,065 UART: [cold-reset] ++
3,434,956 UART: [fht] FHT @ 0x50003400
3,445,991 UART: [idev] ++
3,446,570 UART: [idev] CDI.KEYID = 6
3,447,532 UART: [idev] SUBJECT.KEYID = 7
3,448,756 UART: [idev] UDS.KEYID = 0
3,451,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,600,918 UART: [idev] Erasing UDS.KEYID = 0
5,965,096 UART: [idev] Sha1 KeyId Algorithm
5,987,666 UART: [idev] --
5,991,235 UART: [ldev] ++
5,991,865 UART: [ldev] CDI.KEYID = 6
5,992,763 UART: [ldev] SUBJECT.KEYID = 5
5,993,981 UART: [ldev] AUTHORITY.KEYID = 7
5,995,166 UART: [ldev] FE.KEYID = 1
6,038,040 UART: [ldev] Erasing FE.KEYID = 1
8,542,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,391 UART: [ldev] --
10,353,757 UART: [fwproc] Wait for Commands...
10,356,025 UART: [fwproc] Recv command 0x46574c44
10,358,021 UART: [fwproc] Recv'd Img size: 118548 bytes
10,472,373 UART: ROM Fatal Error: 0x000B0007
10,475,627 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,465,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,407,318 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,424 writing to cptra_bootfsm_go
192,543 UART:
192,911 UART: Running Caliptra ROM ...
193,999 UART:
603,556 UART: [state] CFI Enabled
619,235 UART: [state] LifecycleState = Production
620,984 UART: [state] DebugLocked = No
622,534 UART: [state] WD Timer not started. Device not locked for debugging
626,221 UART: [kat] SHA2-256
805,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,707 UART: [kat] ++
817,243 UART: [kat] sha1
827,304 UART: [kat] SHA2-256
829,870 UART: [kat] SHA2-384
835,831 UART: [kat] SHA2-512-ACC
838,231 UART: [kat] ECC-384
3,280,833 UART: [kat] HMAC-384Kdf
3,293,830 UART: [kat] LMS
3,770,340 UART: [kat] --
3,775,037 UART: [cold-reset] ++
3,777,410 UART: [fht] FHT @ 0x50003400
3,789,420 UART: [idev] ++
3,790,083 UART: [idev] CDI.KEYID = 6
3,791,002 UART: [idev] SUBJECT.KEYID = 7
3,792,232 UART: [idev] UDS.KEYID = 0
3,795,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,036 UART: [idev] Erasing UDS.KEYID = 0
6,269,334 UART: [idev] Sha1 KeyId Algorithm
6,293,276 UART: [idev] --
6,298,025 UART: [ldev] ++
6,298,601 UART: [ldev] CDI.KEYID = 6
6,299,516 UART: [ldev] SUBJECT.KEYID = 5
6,300,735 UART: [ldev] AUTHORITY.KEYID = 7
6,301,969 UART: [ldev] FE.KEYID = 1
6,312,508 UART: [ldev] Erasing FE.KEYID = 1
8,794,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,879 UART: [ldev] --
10,588,033 UART: [fwproc] Wait for Commands...
10,590,715 UART: [fwproc] Recv command 0x46574c44
10,592,716 UART: [fwproc] Recv'd Img size: 118548 bytes
10,706,313 UART: ROM Fatal Error: 0x000B0007
10,709,565 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,476 writing to cptra_bootfsm_go
3,781,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,598,110 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,394 writing to cptra_bootfsm_go
193,587 UART:
193,936 UART: Running Caliptra ROM ...
195,046 UART:
195,198 UART: [state] CFI Enabled
259,852 UART: [state] LifecycleState = Production
262,059 UART: [state] DebugLocked = No
264,773 UART: [state] WD Timer not started. Device not locked for debugging
268,614 UART: [kat] SHA2-256
458,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,264 UART: [kat] ++
469,930 UART: [kat] sha1
480,068 UART: [kat] SHA2-256
483,095 UART: [kat] SHA2-384
488,382 UART: [kat] SHA2-512-ACC
490,960 UART: [kat] ECC-384
2,946,261 UART: [kat] HMAC-384Kdf
2,971,506 UART: [kat] LMS
3,503,268 UART: [kat] --
3,506,944 UART: [cold-reset] ++
3,508,559 UART: [fht] FHT @ 0x50003400
3,519,337 UART: [idev] ++
3,520,025 UART: [idev] CDI.KEYID = 6
3,521,105 UART: [idev] SUBJECT.KEYID = 7
3,522,414 UART: [idev] UDS.KEYID = 0
3,525,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,445 UART: [idev] Erasing UDS.KEYID = 0
6,027,816 UART: [idev] Sha1 KeyId Algorithm
6,049,120 UART: [idev] --
6,053,558 UART: [ldev] ++
6,054,245 UART: [ldev] CDI.KEYID = 6
6,055,162 UART: [ldev] SUBJECT.KEYID = 5
6,056,350 UART: [ldev] AUTHORITY.KEYID = 7
6,057,597 UART: [ldev] FE.KEYID = 1
6,099,155 UART: [ldev] Erasing FE.KEYID = 1
8,610,243 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,306 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,572 UART: [ldev] --
10,410,501 UART: [fwproc] Wait for Commands...
10,413,268 UART: [fwproc] Recv command 0x46574c44
10,415,591 UART: [fwproc] Recv'd Img size: 118548 bytes
10,546,607 UART: ROM Fatal Error: 0x000B0007
10,550,302 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,912 writing to cptra_bootfsm_go
3,441,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,379,083 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,687 UART:
193,042 UART: Running Caliptra ROM ...
194,142 UART:
604,002 UART: [state] CFI Enabled
620,165 UART: [state] LifecycleState = Production
622,397 UART: [state] DebugLocked = No
625,263 UART: [state] WD Timer not started. Device not locked for debugging
629,215 UART: [kat] SHA2-256
819,126 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,890 UART: [kat] ++
830,400 UART: [kat] sha1
843,607 UART: [kat] SHA2-256
846,630 UART: [kat] SHA2-384
851,974 UART: [kat] SHA2-512-ACC
854,605 UART: [kat] ECC-384
3,298,049 UART: [kat] HMAC-384Kdf
3,311,311 UART: [kat] LMS
3,843,147 UART: [kat] --
3,847,427 UART: [cold-reset] ++
3,849,477 UART: [fht] FHT @ 0x50003400
3,860,737 UART: [idev] ++
3,861,418 UART: [idev] CDI.KEYID = 6
3,862,390 UART: [idev] SUBJECT.KEYID = 7
3,863,551 UART: [idev] UDS.KEYID = 0
3,866,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,417 UART: [idev] Erasing UDS.KEYID = 0
6,342,011 UART: [idev] Sha1 KeyId Algorithm
6,363,958 UART: [idev] --
6,370,060 UART: [ldev] ++
6,370,748 UART: [ldev] CDI.KEYID = 6
6,371,635 UART: [ldev] SUBJECT.KEYID = 5
6,372,859 UART: [ldev] AUTHORITY.KEYID = 7
6,373,991 UART: [ldev] FE.KEYID = 1
6,384,854 UART: [ldev] Erasing FE.KEYID = 1
8,863,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,749 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,613,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,611 UART: [ldev] --
10,654,505 UART: [fwproc] Wait for Commands...
10,657,208 UART: [fwproc] Recv command 0x46574c44
10,659,533 UART: [fwproc] Recv'd Img size: 118548 bytes
10,787,422 UART: ROM Fatal Error: 0x000B0007
10,791,063 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,758,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,582,053 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Production
85,975 UART: [state] DebugLocked = No
86,611 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,655 UART: [kat] SHA2-256
892,593 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
903,124 UART: [kat] HMAC-384Kdf
907,666 UART: [kat] LMS
1,475,862 UART: [kat] --
1,476,549 UART: [cold-reset] ++
1,477,117 UART: [fht] Storing FHT @ 0x50003400
1,479,900 UART: [idev] ++
1,480,068 UART: [idev] CDI.KEYID = 6
1,480,428 UART: [idev] SUBJECT.KEYID = 7
1,480,852 UART: [idev] UDS.KEYID = 0
1,481,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,792 UART: [idev] Erasing UDS.KEYID = 0
1,505,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,640 UART: [idev] --
1,514,805 UART: [ldev] ++
1,514,973 UART: [ldev] CDI.KEYID = 6
1,515,336 UART: [ldev] SUBJECT.KEYID = 5
1,515,762 UART: [ldev] AUTHORITY.KEYID = 7
1,516,225 UART: [ldev] FE.KEYID = 1
1,521,287 UART: [ldev] Erasing FE.KEYID = 1
1,546,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,340 UART: [ldev] --
1,585,711 UART: [fwproc] Waiting for Commands...
1,586,388 UART: [fwproc] Received command 0x46574c44
1,587,179 UART: [fwproc] Received Image of size 118548 bytes
1,636,254 UART: ROM Fatal Error: 0x000B0007
1,637,411 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,491,048 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,363 UART: [state] LifecycleState = Production
85,970 UART: [state] DebugLocked = No
86,464 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,080 UART: [kat] SHA2-256
882,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,126 UART: [kat] ++
886,278 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,485 UART: [kat] SHA2-512-ACC
897,386 UART: [kat] ECC-384
902,925 UART: [kat] HMAC-384Kdf
907,627 UART: [kat] LMS
1,475,823 UART: [kat] --
1,476,638 UART: [cold-reset] ++
1,477,098 UART: [fht] Storing FHT @ 0x50003400
1,479,853 UART: [idev] ++
1,480,021 UART: [idev] CDI.KEYID = 6
1,480,381 UART: [idev] SUBJECT.KEYID = 7
1,480,805 UART: [idev] UDS.KEYID = 0
1,481,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,873 UART: [idev] Erasing UDS.KEYID = 0
1,505,265 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,889 UART: [idev] --
1,515,140 UART: [ldev] ++
1,515,308 UART: [ldev] CDI.KEYID = 6
1,515,671 UART: [ldev] SUBJECT.KEYID = 5
1,516,097 UART: [ldev] AUTHORITY.KEYID = 7
1,516,560 UART: [ldev] FE.KEYID = 1
1,521,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,029 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,163 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,291 UART: [ldev] --
1,586,772 UART: [fwproc] Waiting for Commands...
1,587,615 UART: [fwproc] Received command 0x46574c44
1,588,406 UART: [fwproc] Received Image of size 118548 bytes
1,637,763 UART: ROM Fatal Error: 0x000B0007
1,638,920 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,177 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,876 UART: [state] LifecycleState = Production
85,483 UART: [state] DebugLocked = No
86,181 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
890,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,012 UART: [kat] ++
895,164 UART: [kat] sha1
899,186 UART: [kat] SHA2-256
901,126 UART: [kat] SHA2-384
903,713 UART: [kat] SHA2-512-ACC
905,614 UART: [kat] ECC-384
915,195 UART: [kat] HMAC-384Kdf
919,877 UART: [kat] LMS
1,168,189 UART: [kat] --
1,168,842 UART: [cold-reset] ++
1,169,386 UART: [fht] FHT @ 0x50003400
1,171,960 UART: [idev] ++
1,172,128 UART: [idev] CDI.KEYID = 6
1,172,489 UART: [idev] SUBJECT.KEYID = 7
1,172,914 UART: [idev] UDS.KEYID = 0
1,173,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,787 UART: [idev] Erasing UDS.KEYID = 0
1,197,537 UART: [idev] Sha1 KeyId Algorithm
1,206,479 UART: [idev] --
1,207,546 UART: [ldev] ++
1,207,714 UART: [ldev] CDI.KEYID = 6
1,208,078 UART: [ldev] SUBJECT.KEYID = 5
1,208,505 UART: [ldev] AUTHORITY.KEYID = 7
1,208,968 UART: [ldev] FE.KEYID = 1
1,214,300 UART: [ldev] Erasing FE.KEYID = 1
1,241,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,985 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,590 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,300 UART: [ldev] --
1,280,611 UART: [fwproc] Wait for Commands...
1,281,338 UART: [fwproc] Recv command 0x46574c44
1,282,071 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,147 UART: ROM Fatal Error: 0x000B0007
1,332,304 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,253 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,091 UART: [state] LifecycleState = Production
85,698 UART: [state] DebugLocked = No
86,390 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,857 UART: [kat] SHA2-256
901,797 UART: [kat] SHA2-384
904,362 UART: [kat] SHA2-512-ACC
906,263 UART: [kat] ECC-384
916,080 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,172,953 UART: [idev] ++
1,173,121 UART: [idev] CDI.KEYID = 6
1,173,482 UART: [idev] SUBJECT.KEYID = 7
1,173,907 UART: [idev] UDS.KEYID = 0
1,174,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,036 UART: [idev] Erasing UDS.KEYID = 0
1,199,366 UART: [idev] Sha1 KeyId Algorithm
1,208,208 UART: [idev] --
1,209,103 UART: [ldev] ++
1,209,271 UART: [ldev] CDI.KEYID = 6
1,209,635 UART: [ldev] SUBJECT.KEYID = 5
1,210,062 UART: [ldev] AUTHORITY.KEYID = 7
1,210,525 UART: [ldev] FE.KEYID = 1
1,215,589 UART: [ldev] Erasing FE.KEYID = 1
1,241,982 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,316 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,603 UART: [ldev] --
1,281,030 UART: [fwproc] Wait for Commands...
1,281,807 UART: [fwproc] Recv command 0x46574c44
1,282,540 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,900 UART: ROM Fatal Error: 0x000B0007
1,332,057 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,630 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Production
85,589 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
893,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,233 UART: [kat] ++
897,385 UART: [kat] sha1
901,641 UART: [kat] SHA2-256
903,581 UART: [kat] SHA2-384
906,230 UART: [kat] SHA2-512-ACC
908,131 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,530 UART: [kat] LMS
1,170,858 UART: [kat] --
1,171,857 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,222 UART: [idev] Erasing UDS.KEYID = 0
1,200,729 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,255 UART: [ldev] ++
1,210,423 UART: [ldev] CDI.KEYID = 6
1,210,786 UART: [ldev] SUBJECT.KEYID = 5
1,211,212 UART: [ldev] AUTHORITY.KEYID = 7
1,211,675 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,533 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,341 UART: [ldev] --
1,282,832 UART: [fwproc] Wait for Commands...
1,283,426 UART: [fwproc] Recv command 0x46574c44
1,284,154 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,613 UART: ROM Fatal Error: 0x000B0007
1,334,770 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,190,043 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Production
86,154 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
88,077 UART: [kat] SHA2-256
893,727 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,852 UART: [kat] ++
898,004 UART: [kat] sha1
902,352 UART: [kat] SHA2-256
904,292 UART: [kat] SHA2-384
907,163 UART: [kat] SHA2-512-ACC
909,064 UART: [kat] ECC-384
918,579 UART: [kat] HMAC-384Kdf
923,423 UART: [kat] LMS
1,171,751 UART: [kat] --
1,172,614 UART: [cold-reset] ++
1,173,042 UART: [fht] FHT @ 0x50003400
1,175,627 UART: [idev] ++
1,175,795 UART: [idev] CDI.KEYID = 6
1,176,155 UART: [idev] SUBJECT.KEYID = 7
1,176,579 UART: [idev] UDS.KEYID = 0
1,176,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,577 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,150 UART: [idev] --
1,211,170 UART: [ldev] ++
1,211,338 UART: [ldev] CDI.KEYID = 6
1,211,701 UART: [ldev] SUBJECT.KEYID = 5
1,212,127 UART: [ldev] AUTHORITY.KEYID = 7
1,212,590 UART: [ldev] FE.KEYID = 1
1,217,726 UART: [ldev] Erasing FE.KEYID = 1
1,244,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,722 UART: [ldev] --
1,284,055 UART: [fwproc] Wait for Commands...
1,284,771 UART: [fwproc] Recv command 0x46574c44
1,285,499 UART: [fwproc] Recv'd Img size: 118548 bytes
1,334,226 UART: ROM Fatal Error: 0x000B0007
1,335,383 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,190,264 >>> mbox cmd response: failed
test fw_load::fw_load_bad_owner_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
192,141 UART:
192,492 UART: Running Caliptra ROM ...
193,663 UART:
193,814 UART: [state] CFI Enabled
264,407 UART: [state] LifecycleState = Production
266,225 UART: [state] DebugLocked = No
268,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,316 UART: [kat] SHA2-256
444,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,471 UART: [kat] ++
454,976 UART: [kat] sha1
466,718 UART: [kat] SHA2-256
469,456 UART: [kat] SHA2-384
475,759 UART: [kat] SHA2-512-ACC
478,103 UART: [kat] ECC-384
2,769,540 UART: [kat] HMAC-384Kdf
2,800,914 UART: [kat] LMS
3,991,191 UART: [kat] --
3,995,540 UART: [cold-reset] ++
3,996,509 UART: [fht] Storing FHT @ 0x50003400
4,008,202 UART: [idev] ++
4,008,772 UART: [idev] CDI.KEYID = 6
4,009,714 UART: [idev] SUBJECT.KEYID = 7
4,010,987 UART: [idev] UDS.KEYID = 0
4,013,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,191 UART: [idev] Erasing UDS.KEYID = 0
7,348,495 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,457 UART: [idev] --
7,374,193 UART: [ldev] ++
7,374,772 UART: [ldev] CDI.KEYID = 6
7,375,754 UART: [ldev] SUBJECT.KEYID = 5
7,376,854 UART: [ldev] AUTHORITY.KEYID = 7
7,378,194 UART: [ldev] FE.KEYID = 1
7,424,016 UART: [ldev] Erasing FE.KEYID = 1
10,755,177 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,119 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,757 UART: [ldev] --
13,118,783 UART: [fwproc] Waiting for Commands...
13,120,780 UART: [fwproc] Received command 0x46574c44
13,122,965 UART: [fwproc] Received Image of size 118548 bytes
13,213,047 UART: ROM Fatal Error: 0x000B0005
13,216,567 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,807,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,946,121 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,546 UART:
192,911 UART: Running Caliptra ROM ...
194,098 UART:
603,642 UART: [state] CFI Enabled
616,280 UART: [state] LifecycleState = Production
618,076 UART: [state] DebugLocked = No
619,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,693 UART: [kat] SHA2-256
793,412 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,937 UART: [kat] ++
804,448 UART: [kat] sha1
814,733 UART: [kat] SHA2-256
817,442 UART: [kat] SHA2-384
823,056 UART: [kat] SHA2-512-ACC
825,425 UART: [kat] ECC-384
3,110,726 UART: [kat] HMAC-384Kdf
3,122,644 UART: [kat] LMS
4,312,783 UART: [kat] --
4,316,835 UART: [cold-reset] ++
4,318,772 UART: [fht] Storing FHT @ 0x50003400
4,330,743 UART: [idev] ++
4,331,321 UART: [idev] CDI.KEYID = 6
4,332,214 UART: [idev] SUBJECT.KEYID = 7
4,333,489 UART: [idev] UDS.KEYID = 0
4,336,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,466 UART: [idev] Erasing UDS.KEYID = 0
7,623,520 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,022 UART: [idev] --
7,649,266 UART: [ldev] ++
7,649,849 UART: [ldev] CDI.KEYID = 6
7,650,767 UART: [ldev] SUBJECT.KEYID = 5
7,651,991 UART: [ldev] AUTHORITY.KEYID = 7
7,653,290 UART: [ldev] FE.KEYID = 1
7,662,811 UART: [ldev] Erasing FE.KEYID = 1
10,951,874 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,059 UART: [ldev] --
13,311,019 UART: [fwproc] Waiting for Commands...
13,313,238 UART: [fwproc] Received command 0x46574c44
13,315,439 UART: [fwproc] Received Image of size 118548 bytes
13,408,358 UART: ROM Fatal Error: 0x000B0005
13,411,848 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
4,129,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,150,382 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
192,147 UART:
192,520 UART: Running Caliptra ROM ...
193,700 UART:
193,854 UART: [state] CFI Enabled
265,171 UART: [state] LifecycleState = Production
266,989 UART: [state] DebugLocked = No
269,725 UART: [state] WD Timer not started. Device not locked for debugging
274,425 UART: [kat] SHA2-256
454,047 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,866 UART: [kat] ++
465,385 UART: [kat] sha1
475,565 UART: [kat] SHA2-256
478,262 UART: [kat] SHA2-384
485,437 UART: [kat] SHA2-512-ACC
487,835 UART: [kat] ECC-384
2,950,060 UART: [kat] HMAC-384Kdf
2,972,693 UART: [kat] LMS
3,449,184 UART: [kat] --
3,453,295 UART: [cold-reset] ++
3,454,691 UART: [fht] FHT @ 0x50003400
3,466,483 UART: [idev] ++
3,467,112 UART: [idev] CDI.KEYID = 6
3,468,029 UART: [idev] SUBJECT.KEYID = 7
3,469,301 UART: [idev] UDS.KEYID = 0
3,472,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,677 UART: [idev] Erasing UDS.KEYID = 0
5,986,231 UART: [idev] Sha1 KeyId Algorithm
6,010,280 UART: [idev] --
6,015,744 UART: [ldev] ++
6,016,317 UART: [ldev] CDI.KEYID = 6
6,017,266 UART: [ldev] SUBJECT.KEYID = 5
6,018,484 UART: [ldev] AUTHORITY.KEYID = 7
6,019,725 UART: [ldev] FE.KEYID = 1
6,059,508 UART: [ldev] Erasing FE.KEYID = 1
8,563,582 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,948 UART: [ldev] --
10,373,051 UART: [fwproc] Wait for Commands...
10,375,544 UART: [fwproc] Recv command 0x46574c44
10,377,554 UART: [fwproc] Recv'd Img size: 118548 bytes
10,481,141 UART: ROM Fatal Error: 0x000B0005
10,484,388 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
3,465,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,356,893 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,520 writing to cptra_bootfsm_go
192,654 UART:
193,017 UART: Running Caliptra ROM ...
194,165 UART:
603,749 UART: [state] CFI Enabled
619,006 UART: [state] LifecycleState = Production
620,818 UART: [state] DebugLocked = No
623,668 UART: [state] WD Timer not started. Device not locked for debugging
627,025 UART: [kat] SHA2-256
806,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,444 UART: [kat] ++
817,892 UART: [kat] sha1
828,991 UART: [kat] SHA2-256
831,736 UART: [kat] SHA2-384
838,158 UART: [kat] SHA2-512-ACC
840,504 UART: [kat] ECC-384
3,283,222 UART: [kat] HMAC-384Kdf
3,296,852 UART: [kat] LMS
3,773,377 UART: [kat] --
3,777,590 UART: [cold-reset] ++
3,778,557 UART: [fht] FHT @ 0x50003400
3,789,609 UART: [idev] ++
3,790,187 UART: [idev] CDI.KEYID = 6
3,791,209 UART: [idev] SUBJECT.KEYID = 7
3,792,373 UART: [idev] UDS.KEYID = 0
3,795,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,689 UART: [idev] Erasing UDS.KEYID = 0
6,270,003 UART: [idev] Sha1 KeyId Algorithm
6,293,436 UART: [idev] --
6,298,296 UART: [ldev] ++
6,298,871 UART: [ldev] CDI.KEYID = 6
6,299,948 UART: [ldev] SUBJECT.KEYID = 5
6,301,054 UART: [ldev] AUTHORITY.KEYID = 7
6,302,237 UART: [ldev] FE.KEYID = 1
6,312,095 UART: [ldev] Erasing FE.KEYID = 1
8,787,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,414 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,827 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,263 UART: [ldev] --
10,580,069 UART: [fwproc] Wait for Commands...
10,581,964 UART: [fwproc] Recv command 0x46574c44
10,584,015 UART: [fwproc] Recv'd Img size: 118548 bytes
10,693,168 UART: ROM Fatal Error: 0x000B0005
10,696,417 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,775,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,586,225 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
4,077 writing to cptra_bootfsm_go
193,341 UART:
193,708 UART: Running Caliptra ROM ...
194,799 UART:
194,949 UART: [state] CFI Enabled
264,365 UART: [state] LifecycleState = Production
266,634 UART: [state] DebugLocked = No
268,127 UART: [state] WD Timer not started. Device not locked for debugging
273,582 UART: [kat] SHA2-256
463,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,203 UART: [kat] ++
474,744 UART: [kat] sha1
487,398 UART: [kat] SHA2-256
490,463 UART: [kat] SHA2-384
496,838 UART: [kat] SHA2-512-ACC
499,408 UART: [kat] ECC-384
2,947,377 UART: [kat] HMAC-384Kdf
2,971,958 UART: [kat] LMS
3,503,731 UART: [kat] --
3,508,219 UART: [cold-reset] ++
3,509,293 UART: [fht] FHT @ 0x50003400
3,522,218 UART: [idev] ++
3,523,128 UART: [idev] CDI.KEYID = 6
3,524,126 UART: [idev] SUBJECT.KEYID = 7
3,525,239 UART: [idev] UDS.KEYID = 0
3,528,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,448 UART: [idev] Erasing UDS.KEYID = 0
6,029,851 UART: [idev] Sha1 KeyId Algorithm
6,052,274 UART: [idev] --
6,057,517 UART: [ldev] ++
6,058,208 UART: [ldev] CDI.KEYID = 6
6,059,121 UART: [ldev] SUBJECT.KEYID = 5
6,060,291 UART: [ldev] AUTHORITY.KEYID = 7
6,061,471 UART: [ldev] FE.KEYID = 1
6,101,347 UART: [ldev] Erasing FE.KEYID = 1
8,606,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,707 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,261 UART: [ldev] --
10,413,785 UART: [fwproc] Wait for Commands...
10,415,743 UART: [fwproc] Recv command 0x46574c44
10,418,064 UART: [fwproc] Recv'd Img size: 118548 bytes
10,539,924 UART: ROM Fatal Error: 0x000B0005
10,543,608 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,439,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,348,648 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
192,560 UART:
192,922 UART: Running Caliptra ROM ...
194,114 UART:
603,793 UART: [state] CFI Enabled
619,468 UART: [state] LifecycleState = Production
621,666 UART: [state] DebugLocked = No
623,934 UART: [state] WD Timer not started. Device not locked for debugging
628,173 UART: [kat] SHA2-256
818,075 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,863 UART: [kat] ++
829,461 UART: [kat] sha1
840,454 UART: [kat] SHA2-256
843,462 UART: [kat] SHA2-384
850,422 UART: [kat] SHA2-512-ACC
852,999 UART: [kat] ECC-384
3,291,312 UART: [kat] HMAC-384Kdf
3,304,419 UART: [kat] LMS
3,836,243 UART: [kat] --
3,839,756 UART: [cold-reset] ++
3,841,823 UART: [fht] FHT @ 0x50003400
3,852,916 UART: [idev] ++
3,853,605 UART: [idev] CDI.KEYID = 6
3,854,589 UART: [idev] SUBJECT.KEYID = 7
3,855,753 UART: [idev] UDS.KEYID = 0
3,858,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,800 UART: [idev] Erasing UDS.KEYID = 0
6,334,197 UART: [idev] Sha1 KeyId Algorithm
6,358,038 UART: [idev] --
6,361,881 UART: [ldev] ++
6,362,570 UART: [ldev] CDI.KEYID = 6
6,363,461 UART: [ldev] SUBJECT.KEYID = 5
6,364,783 UART: [ldev] AUTHORITY.KEYID = 7
6,365,987 UART: [ldev] FE.KEYID = 1
6,375,726 UART: [ldev] Erasing FE.KEYID = 1
8,858,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,269 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,182 UART: [ldev] --
10,652,476 UART: [fwproc] Wait for Commands...
10,655,552 UART: [fwproc] Recv command 0x46574c44
10,657,818 UART: [fwproc] Recv'd Img size: 118548 bytes
10,778,878 UART: ROM Fatal Error: 0x000B0005
10,782,575 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
3,756,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,567,607 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Production
85,703 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,973 UART: [kat] SHA2-256
881,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,019 UART: [kat] ++
886,171 UART: [kat] sha1
890,639 UART: [kat] SHA2-256
892,577 UART: [kat] SHA2-384
895,302 UART: [kat] SHA2-512-ACC
897,203 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,156 UART: [kat] LMS
1,475,352 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,789 UART: [fht] Storing FHT @ 0x50003400
1,479,458 UART: [idev] ++
1,479,626 UART: [idev] CDI.KEYID = 6
1,479,986 UART: [idev] SUBJECT.KEYID = 7
1,480,410 UART: [idev] UDS.KEYID = 0
1,480,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,496 UART: [idev] Erasing UDS.KEYID = 0
1,505,068 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,515,017 UART: [ldev] ++
1,515,185 UART: [ldev] CDI.KEYID = 6
1,515,548 UART: [ldev] SUBJECT.KEYID = 5
1,515,974 UART: [ldev] AUTHORITY.KEYID = 7
1,516,437 UART: [ldev] FE.KEYID = 1
1,521,281 UART: [ldev] Erasing FE.KEYID = 1
1,546,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,839 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,555 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,446 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,158 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,148 UART: [ldev] --
1,585,563 UART: [fwproc] Waiting for Commands...
1,586,364 UART: [fwproc] Received command 0x46574c44
1,587,155 UART: [fwproc] Received Image of size 118548 bytes
1,632,124 UART: ROM Fatal Error: 0x000B0005
1,633,281 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,608 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,659 UART: [state] LifecycleState = Production
86,266 UART: [state] DebugLocked = No
86,828 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,516 UART: [kat] SHA2-256
882,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,562 UART: [kat] ++
886,714 UART: [kat] sha1
890,984 UART: [kat] SHA2-256
892,922 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
903,613 UART: [kat] HMAC-384Kdf
908,379 UART: [kat] LMS
1,476,575 UART: [kat] --
1,477,482 UART: [cold-reset] ++
1,477,930 UART: [fht] Storing FHT @ 0x50003400
1,480,721 UART: [idev] ++
1,480,889 UART: [idev] CDI.KEYID = 6
1,481,249 UART: [idev] SUBJECT.KEYID = 7
1,481,673 UART: [idev] UDS.KEYID = 0
1,482,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,519 UART: [idev] Erasing UDS.KEYID = 0
1,507,153 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,695 UART: [idev] --
1,516,820 UART: [ldev] ++
1,516,988 UART: [ldev] CDI.KEYID = 6
1,517,351 UART: [ldev] SUBJECT.KEYID = 5
1,517,777 UART: [ldev] AUTHORITY.KEYID = 7
1,518,240 UART: [ldev] FE.KEYID = 1
1,523,374 UART: [ldev] Erasing FE.KEYID = 1
1,548,429 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,622 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,151 UART: [ldev] --
1,587,554 UART: [fwproc] Waiting for Commands...
1,588,249 UART: [fwproc] Received command 0x46574c44
1,589,040 UART: [fwproc] Received Image of size 118548 bytes
1,634,111 UART: ROM Fatal Error: 0x000B0005
1,635,268 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,345 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,886 UART: [state] LifecycleState = Production
85,493 UART: [state] DebugLocked = No
86,151 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,492 UART: [kat] SHA2-256
901,432 UART: [kat] SHA2-384
904,309 UART: [kat] SHA2-512-ACC
906,210 UART: [kat] ECC-384
915,741 UART: [kat] HMAC-384Kdf
920,275 UART: [kat] LMS
1,168,587 UART: [kat] --
1,169,292 UART: [cold-reset] ++
1,169,752 UART: [fht] FHT @ 0x50003400
1,172,524 UART: [idev] ++
1,172,692 UART: [idev] CDI.KEYID = 6
1,173,053 UART: [idev] SUBJECT.KEYID = 7
1,173,478 UART: [idev] UDS.KEYID = 0
1,173,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,198,725 UART: [idev] Sha1 KeyId Algorithm
1,207,719 UART: [idev] --
1,208,696 UART: [ldev] ++
1,208,864 UART: [ldev] CDI.KEYID = 6
1,209,228 UART: [ldev] SUBJECT.KEYID = 5
1,209,655 UART: [ldev] AUTHORITY.KEYID = 7
1,210,118 UART: [ldev] FE.KEYID = 1
1,215,320 UART: [ldev] Erasing FE.KEYID = 1
1,241,163 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,657 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,262 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,974 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,018 UART: [ldev] --
1,280,415 UART: [fwproc] Wait for Commands...
1,281,178 UART: [fwproc] Recv command 0x46574c44
1,281,911 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,631 UART: ROM Fatal Error: 0x000B0005
1,327,788 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,439 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Production
86,456 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,197 UART: [kat] SHA2-256
891,747 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,851 UART: [kat] ++
896,003 UART: [kat] sha1
900,389 UART: [kat] SHA2-256
902,329 UART: [kat] SHA2-384
905,164 UART: [kat] SHA2-512-ACC
907,065 UART: [kat] ECC-384
916,832 UART: [kat] HMAC-384Kdf
921,320 UART: [kat] LMS
1,169,632 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,171,025 UART: [fht] FHT @ 0x50003400
1,173,575 UART: [idev] ++
1,173,743 UART: [idev] CDI.KEYID = 6
1,174,104 UART: [idev] SUBJECT.KEYID = 7
1,174,529 UART: [idev] UDS.KEYID = 0
1,174,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,330 UART: [idev] Erasing UDS.KEYID = 0
1,199,808 UART: [idev] Sha1 KeyId Algorithm
1,208,724 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,181 UART: [ldev] Erasing FE.KEYID = 1
1,242,972 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,279 UART: [ldev] --
1,282,680 UART: [fwproc] Wait for Commands...
1,283,285 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,534 UART: ROM Fatal Error: 0x000B0005
1,329,691 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,254 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Production
85,779 UART: [state] DebugLocked = No
86,389 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
893,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,471 UART: [kat] ++
897,623 UART: [kat] sha1
901,909 UART: [kat] SHA2-256
903,849 UART: [kat] SHA2-384
906,630 UART: [kat] SHA2-512-ACC
908,531 UART: [kat] ECC-384
918,198 UART: [kat] HMAC-384Kdf
922,754 UART: [kat] LMS
1,171,082 UART: [kat] --
1,172,073 UART: [cold-reset] ++
1,172,643 UART: [fht] FHT @ 0x50003400
1,175,358 UART: [idev] ++
1,175,526 UART: [idev] CDI.KEYID = 6
1,175,886 UART: [idev] SUBJECT.KEYID = 7
1,176,310 UART: [idev] UDS.KEYID = 0
1,176,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,944 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,209,279 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,930 UART: [ldev] SUBJECT.KEYID = 5
1,211,356 UART: [ldev] AUTHORITY.KEYID = 7
1,211,819 UART: [ldev] FE.KEYID = 1
1,217,131 UART: [ldev] Erasing FE.KEYID = 1
1,243,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,127 UART: [ldev] --
1,282,488 UART: [fwproc] Wait for Commands...
1,283,270 UART: [fwproc] Recv command 0x46574c44
1,283,998 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,165 UART: ROM Fatal Error: 0x000B0005
1,330,322 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,407 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,679 UART: [state] LifecycleState = Production
85,286 UART: [state] DebugLocked = No
85,970 UART: [state] WD Timer not started. Device not locked for debugging
87,287 UART: [kat] SHA2-256
892,937 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,062 UART: [kat] ++
897,214 UART: [kat] sha1
901,452 UART: [kat] SHA2-256
903,392 UART: [kat] SHA2-384
906,033 UART: [kat] SHA2-512-ACC
907,934 UART: [kat] ECC-384
917,721 UART: [kat] HMAC-384Kdf
922,349 UART: [kat] LMS
1,170,677 UART: [kat] --
1,171,652 UART: [cold-reset] ++
1,172,062 UART: [fht] FHT @ 0x50003400
1,174,507 UART: [idev] ++
1,174,675 UART: [idev] CDI.KEYID = 6
1,175,035 UART: [idev] SUBJECT.KEYID = 7
1,175,459 UART: [idev] UDS.KEYID = 0
1,175,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,455 UART: [idev] Erasing UDS.KEYID = 0
1,200,568 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,284 UART: [ldev] ++
1,210,452 UART: [ldev] CDI.KEYID = 6
1,210,815 UART: [ldev] SUBJECT.KEYID = 5
1,211,241 UART: [ldev] AUTHORITY.KEYID = 7
1,211,704 UART: [ldev] FE.KEYID = 1
1,217,258 UART: [ldev] Erasing FE.KEYID = 1
1,244,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,488 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,807 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,038 UART: [ldev] --
1,283,425 UART: [fwproc] Wait for Commands...
1,284,003 UART: [fwproc] Recv command 0x46574c44
1,284,731 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,230 UART: ROM Fatal Error: 0x000B0005
1,330,387 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,680 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_ecc_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,042 writing to cptra_bootfsm_go
192,190 UART:
192,545 UART: Running Caliptra ROM ...
193,731 UART:
193,891 UART: [state] CFI Enabled
263,125 UART: [state] LifecycleState = Production
264,934 UART: [state] DebugLocked = No
267,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,723 UART: [kat] SHA2-256
441,434 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,963 UART: [kat] ++
452,498 UART: [kat] sha1
463,173 UART: [kat] SHA2-256
465,870 UART: [kat] SHA2-384
471,259 UART: [kat] SHA2-512-ACC
473,653 UART: [kat] ECC-384
2,766,895 UART: [kat] HMAC-384Kdf
2,800,137 UART: [kat] LMS
3,990,473 UART: [kat] --
3,996,488 UART: [cold-reset] ++
3,998,323 UART: [fht] Storing FHT @ 0x50003400
4,009,205 UART: [idev] ++
4,009,792 UART: [idev] CDI.KEYID = 6
4,010,711 UART: [idev] SUBJECT.KEYID = 7
4,011,986 UART: [idev] UDS.KEYID = 0
4,014,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,122 UART: [idev] Erasing UDS.KEYID = 0
7,347,086 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,500 UART: [idev] --
7,373,068 UART: [ldev] ++
7,373,666 UART: [ldev] CDI.KEYID = 6
7,374,693 UART: [ldev] SUBJECT.KEYID = 5
7,375,857 UART: [ldev] AUTHORITY.KEYID = 7
7,377,093 UART: [ldev] FE.KEYID = 1
7,422,208 UART: [ldev] Erasing FE.KEYID = 1
10,756,012 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,364 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,388 UART: [ldev] --
13,117,367 UART: [fwproc] Waiting for Commands...
13,119,491 UART: [fwproc] Received command 0x46574c44
13,121,723 UART: [fwproc] Received Image of size 118548 bytes
13,213,887 UART: ROM Fatal Error: 0x000B0005
13,217,381 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,788,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,958,845 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,541 UART:
192,914 UART: Running Caliptra ROM ...
194,044 UART:
603,742 UART: [state] CFI Enabled
618,022 UART: [state] LifecycleState = Production
619,815 UART: [state] DebugLocked = No
622,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,618 UART: [kat] SHA2-256
796,399 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,944 UART: [kat] ++
807,479 UART: [kat] sha1
817,777 UART: [kat] SHA2-256
820,504 UART: [kat] SHA2-384
826,710 UART: [kat] SHA2-512-ACC
829,105 UART: [kat] ECC-384
3,114,010 UART: [kat] HMAC-384Kdf
3,127,064 UART: [kat] LMS
4,317,187 UART: [kat] --
4,320,970 UART: [cold-reset] ++
4,322,587 UART: [fht] Storing FHT @ 0x50003400
4,335,005 UART: [idev] ++
4,335,655 UART: [idev] CDI.KEYID = 6
4,336,580 UART: [idev] SUBJECT.KEYID = 7
4,337,808 UART: [idev] UDS.KEYID = 0
4,340,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,685 UART: [idev] Erasing UDS.KEYID = 0
7,625,390 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,726 UART: [idev] --
7,652,181 UART: [ldev] ++
7,652,763 UART: [ldev] CDI.KEYID = 6
7,653,713 UART: [ldev] SUBJECT.KEYID = 5
7,654,957 UART: [ldev] AUTHORITY.KEYID = 7
7,656,209 UART: [ldev] FE.KEYID = 1
7,669,106 UART: [ldev] Erasing FE.KEYID = 1
10,961,320 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,281 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,875 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,674 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,221 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,581 UART: [ldev] --
13,318,151 UART: [fwproc] Waiting for Commands...
13,321,339 UART: [fwproc] Received command 0x46574c44
13,323,533 UART: [fwproc] Received Image of size 118548 bytes
13,416,560 UART: ROM Fatal Error: 0x000B0005
13,420,026 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,130,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,156,089 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
192,318 UART:
192,674 UART: Running Caliptra ROM ...
193,808 UART:
193,960 UART: [state] CFI Enabled
263,740 UART: [state] LifecycleState = Production
265,559 UART: [state] DebugLocked = No
267,646 UART: [state] WD Timer not started. Device not locked for debugging
271,886 UART: [kat] SHA2-256
451,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,358 UART: [kat] ++
462,841 UART: [kat] sha1
473,724 UART: [kat] SHA2-256
476,411 UART: [kat] SHA2-384
482,122 UART: [kat] SHA2-512-ACC
484,521 UART: [kat] ECC-384
2,926,290 UART: [kat] HMAC-384Kdf
2,951,485 UART: [kat] LMS
3,428,015 UART: [kat] --
3,433,910 UART: [cold-reset] ++
3,435,367 UART: [fht] FHT @ 0x50003400
3,447,699 UART: [idev] ++
3,448,274 UART: [idev] CDI.KEYID = 6
3,449,165 UART: [idev] SUBJECT.KEYID = 7
3,450,456 UART: [idev] UDS.KEYID = 0
3,453,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,603,173 UART: [idev] Erasing UDS.KEYID = 0
5,964,781 UART: [idev] Sha1 KeyId Algorithm
5,988,932 UART: [idev] --
5,993,082 UART: [ldev] ++
5,993,671 UART: [ldev] CDI.KEYID = 6
5,994,588 UART: [ldev] SUBJECT.KEYID = 5
5,995,754 UART: [ldev] AUTHORITY.KEYID = 7
5,997,047 UART: [ldev] FE.KEYID = 1
6,038,055 UART: [ldev] Erasing FE.KEYID = 1
8,545,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,772 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,222 UART: [ldev] --
10,354,302 UART: [fwproc] Wait for Commands...
10,357,383 UART: [fwproc] Recv command 0x46574c44
10,359,375 UART: [fwproc] Recv'd Img size: 118548 bytes
10,462,312 UART: ROM Fatal Error: 0x000B0005
10,465,575 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,464,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,378,388 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
192,555 UART:
192,939 UART: Running Caliptra ROM ...
194,115 UART:
603,914 UART: [state] CFI Enabled
617,042 UART: [state] LifecycleState = Production
618,830 UART: [state] DebugLocked = No
620,210 UART: [state] WD Timer not started. Device not locked for debugging
624,005 UART: [kat] SHA2-256
803,666 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,430 UART: [kat] ++
814,880 UART: [kat] sha1
827,592 UART: [kat] SHA2-256
830,335 UART: [kat] SHA2-384
835,881 UART: [kat] SHA2-512-ACC
838,234 UART: [kat] ECC-384
3,280,703 UART: [kat] HMAC-384Kdf
3,293,095 UART: [kat] LMS
3,769,587 UART: [kat] --
3,775,742 UART: [cold-reset] ++
3,776,979 UART: [fht] FHT @ 0x50003400
3,788,181 UART: [idev] ++
3,788,752 UART: [idev] CDI.KEYID = 6
3,789,772 UART: [idev] SUBJECT.KEYID = 7
3,790,932 UART: [idev] UDS.KEYID = 0
3,793,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,963 UART: [idev] Erasing UDS.KEYID = 0
6,270,357 UART: [idev] Sha1 KeyId Algorithm
6,293,446 UART: [idev] --
6,297,605 UART: [ldev] ++
6,298,192 UART: [ldev] CDI.KEYID = 6
6,299,221 UART: [ldev] SUBJECT.KEYID = 5
6,300,334 UART: [ldev] AUTHORITY.KEYID = 7
6,301,572 UART: [ldev] FE.KEYID = 1
6,313,087 UART: [ldev] Erasing FE.KEYID = 1
8,789,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,356 UART: [ldev] --
10,584,536 UART: [fwproc] Wait for Commands...
10,586,588 UART: [fwproc] Recv command 0x46574c44
10,588,581 UART: [fwproc] Recv'd Img size: 118548 bytes
10,696,537 UART: ROM Fatal Error: 0x000B0005
10,699,798 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,781,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,590,116 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
192,321 UART:
192,666 UART: Running Caliptra ROM ...
193,767 UART:
193,912 UART: [state] CFI Enabled
264,328 UART: [state] LifecycleState = Production
266,583 UART: [state] DebugLocked = No
268,048 UART: [state] WD Timer not started. Device not locked for debugging
273,503 UART: [kat] SHA2-256
463,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,133 UART: [kat] ++
474,585 UART: [kat] sha1
486,225 UART: [kat] SHA2-256
489,275 UART: [kat] SHA2-384
494,397 UART: [kat] SHA2-512-ACC
496,992 UART: [kat] ECC-384
2,947,752 UART: [kat] HMAC-384Kdf
2,970,023 UART: [kat] LMS
3,501,792 UART: [kat] --
3,504,984 UART: [cold-reset] ++
3,506,873 UART: [fht] FHT @ 0x50003400
3,518,446 UART: [idev] ++
3,519,170 UART: [idev] CDI.KEYID = 6
3,520,106 UART: [idev] SUBJECT.KEYID = 7
3,521,273 UART: [idev] UDS.KEYID = 0
3,523,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,545 UART: [idev] Erasing UDS.KEYID = 0
6,029,869 UART: [idev] Sha1 KeyId Algorithm
6,051,719 UART: [idev] --
6,056,595 UART: [ldev] ++
6,057,285 UART: [ldev] CDI.KEYID = 6
6,058,221 UART: [ldev] SUBJECT.KEYID = 5
6,059,340 UART: [ldev] AUTHORITY.KEYID = 7
6,060,577 UART: [ldev] FE.KEYID = 1
6,097,649 UART: [ldev] Erasing FE.KEYID = 1
8,602,854 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,525 UART: [ldev] --
10,411,382 UART: [fwproc] Wait for Commands...
10,414,085 UART: [fwproc] Recv command 0x46574c44
10,416,361 UART: [fwproc] Recv'd Img size: 118548 bytes
10,531,547 UART: ROM Fatal Error: 0x000B0005
10,535,245 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,443,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,349,013 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,487 UART:
192,848 UART: Running Caliptra ROM ...
193,996 UART:
603,706 UART: [state] CFI Enabled
615,669 UART: [state] LifecycleState = Production
617,900 UART: [state] DebugLocked = No
620,473 UART: [state] WD Timer not started. Device not locked for debugging
624,212 UART: [kat] SHA2-256
813,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,662 UART: [kat] ++
825,287 UART: [kat] sha1
835,911 UART: [kat] SHA2-256
838,917 UART: [kat] SHA2-384
844,431 UART: [kat] SHA2-512-ACC
847,002 UART: [kat] ECC-384
3,287,951 UART: [kat] HMAC-384Kdf
3,300,748 UART: [kat] LMS
3,832,558 UART: [kat] --
3,838,362 UART: [cold-reset] ++
3,840,311 UART: [fht] FHT @ 0x50003400
3,850,814 UART: [idev] ++
3,851,494 UART: [idev] CDI.KEYID = 6
3,852,514 UART: [idev] SUBJECT.KEYID = 7
3,853,679 UART: [idev] UDS.KEYID = 0
3,856,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,584 UART: [idev] Erasing UDS.KEYID = 0
6,334,468 UART: [idev] Sha1 KeyId Algorithm
6,355,984 UART: [idev] --
6,360,556 UART: [ldev] ++
6,361,251 UART: [ldev] CDI.KEYID = 6
6,362,175 UART: [ldev] SUBJECT.KEYID = 5
6,363,340 UART: [ldev] AUTHORITY.KEYID = 7
6,364,577 UART: [ldev] FE.KEYID = 1
6,374,036 UART: [ldev] Erasing FE.KEYID = 1
8,848,347 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,585,880 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,095 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,968 UART: [ldev] --
10,642,891 UART: [fwproc] Wait for Commands...
10,645,592 UART: [fwproc] Recv command 0x46574c44
10,647,932 UART: [fwproc] Recv'd Img size: 118548 bytes
10,767,601 UART: ROM Fatal Error: 0x000B0005
10,771,307 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,758,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,575,830 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,548 UART: [state] LifecycleState = Production
86,155 UART: [state] DebugLocked = No
86,739 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,419 UART: [kat] SHA2-256
882,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,465 UART: [kat] ++
886,617 UART: [kat] sha1
890,821 UART: [kat] SHA2-256
892,759 UART: [kat] SHA2-384
895,680 UART: [kat] SHA2-512-ACC
897,581 UART: [kat] ECC-384
903,264 UART: [kat] HMAC-384Kdf
908,048 UART: [kat] LMS
1,476,244 UART: [kat] --
1,477,055 UART: [cold-reset] ++
1,477,627 UART: [fht] Storing FHT @ 0x50003400
1,480,644 UART: [idev] ++
1,480,812 UART: [idev] CDI.KEYID = 6
1,481,172 UART: [idev] SUBJECT.KEYID = 7
1,481,596 UART: [idev] UDS.KEYID = 0
1,481,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,048 UART: [idev] Erasing UDS.KEYID = 0
1,506,044 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,858 UART: [idev] --
1,515,851 UART: [ldev] ++
1,516,019 UART: [ldev] CDI.KEYID = 6
1,516,382 UART: [ldev] SUBJECT.KEYID = 5
1,516,808 UART: [ldev] AUTHORITY.KEYID = 7
1,517,271 UART: [ldev] FE.KEYID = 1
1,522,401 UART: [ldev] Erasing FE.KEYID = 1
1,548,490 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,393 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,756 UART: [ldev] --
1,588,091 UART: [fwproc] Waiting for Commands...
1,588,948 UART: [fwproc] Received command 0x46574c44
1,589,739 UART: [fwproc] Received Image of size 118548 bytes
1,635,192 UART: ROM Fatal Error: 0x000B0005
1,636,349 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,812 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Production
85,924 UART: [state] DebugLocked = No
86,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,184 UART: [kat] SHA2-256
882,115 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,230 UART: [kat] ++
886,382 UART: [kat] sha1
890,452 UART: [kat] SHA2-256
892,390 UART: [kat] SHA2-384
895,131 UART: [kat] SHA2-512-ACC
897,032 UART: [kat] ECC-384
902,791 UART: [kat] HMAC-384Kdf
907,413 UART: [kat] LMS
1,475,609 UART: [kat] --
1,476,460 UART: [cold-reset] ++
1,476,980 UART: [fht] Storing FHT @ 0x50003400
1,479,657 UART: [idev] ++
1,479,825 UART: [idev] CDI.KEYID = 6
1,480,185 UART: [idev] SUBJECT.KEYID = 7
1,480,609 UART: [idev] UDS.KEYID = 0
1,480,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,453 UART: [idev] Erasing UDS.KEYID = 0
1,504,651 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,175 UART: [idev] --
1,514,296 UART: [ldev] ++
1,514,464 UART: [ldev] CDI.KEYID = 6
1,514,827 UART: [ldev] SUBJECT.KEYID = 5
1,515,253 UART: [ldev] AUTHORITY.KEYID = 7
1,515,716 UART: [ldev] FE.KEYID = 1
1,520,798 UART: [ldev] Erasing FE.KEYID = 1
1,546,179 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,381 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,319 UART: [ldev] --
1,585,668 UART: [fwproc] Waiting for Commands...
1,586,365 UART: [fwproc] Received command 0x46574c44
1,587,156 UART: [fwproc] Received Image of size 118548 bytes
1,632,461 UART: ROM Fatal Error: 0x000B0005
1,633,618 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,279 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Production
85,861 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,538 UART: [kat] SHA2-256
901,478 UART: [kat] SHA2-384
904,157 UART: [kat] SHA2-512-ACC
906,058 UART: [kat] ECC-384
915,985 UART: [kat] HMAC-384Kdf
920,375 UART: [kat] LMS
1,168,687 UART: [kat] --
1,169,406 UART: [cold-reset] ++
1,169,938 UART: [fht] FHT @ 0x50003400
1,172,432 UART: [idev] ++
1,172,600 UART: [idev] CDI.KEYID = 6
1,172,961 UART: [idev] SUBJECT.KEYID = 7
1,173,386 UART: [idev] UDS.KEYID = 0
1,173,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,877 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,207,845 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,648 UART: [ldev] Erasing FE.KEYID = 1
1,242,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,608 UART: [ldev] --
1,281,955 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,457 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,951 UART: ROM Fatal Error: 0x000B0005
1,329,108 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,671 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,865 UART: [state] LifecycleState = Production
86,472 UART: [state] DebugLocked = No
87,152 UART: [state] WD Timer not started. Device not locked for debugging
88,341 UART: [kat] SHA2-256
891,891 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,995 UART: [kat] ++
896,147 UART: [kat] sha1
900,333 UART: [kat] SHA2-256
902,273 UART: [kat] SHA2-384
905,070 UART: [kat] SHA2-512-ACC
906,971 UART: [kat] ECC-384
917,006 UART: [kat] HMAC-384Kdf
921,630 UART: [kat] LMS
1,169,942 UART: [kat] --
1,170,807 UART: [cold-reset] ++
1,171,247 UART: [fht] FHT @ 0x50003400
1,173,859 UART: [idev] ++
1,174,027 UART: [idev] CDI.KEYID = 6
1,174,388 UART: [idev] SUBJECT.KEYID = 7
1,174,813 UART: [idev] UDS.KEYID = 0
1,175,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,092 UART: [idev] Sha1 KeyId Algorithm
1,209,042 UART: [idev] --
1,210,079 UART: [ldev] ++
1,210,247 UART: [ldev] CDI.KEYID = 6
1,210,611 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,797 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,325 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,401 UART: [fwproc] Recv command 0x46574c44
1,284,134 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,656 UART: ROM Fatal Error: 0x000B0005
1,329,813 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,856 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Production
85,717 UART: [state] DebugLocked = No
86,341 UART: [state] WD Timer not started. Device not locked for debugging
87,504 UART: [kat] SHA2-256
893,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,279 UART: [kat] ++
897,431 UART: [kat] sha1
901,479 UART: [kat] SHA2-256
903,419 UART: [kat] SHA2-384
906,228 UART: [kat] SHA2-512-ACC
908,129 UART: [kat] ECC-384
917,938 UART: [kat] HMAC-384Kdf
922,384 UART: [kat] LMS
1,170,712 UART: [kat] --
1,171,605 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,494 UART: [idev] Erasing UDS.KEYID = 0
1,200,813 UART: [idev] Sha1 KeyId Algorithm
1,209,361 UART: [idev] --
1,210,507 UART: [ldev] ++
1,210,675 UART: [ldev] CDI.KEYID = 6
1,211,038 UART: [ldev] SUBJECT.KEYID = 5
1,211,464 UART: [ldev] AUTHORITY.KEYID = 7
1,211,927 UART: [ldev] FE.KEYID = 1
1,216,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,524 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,236 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,425 UART: [ldev] --
1,282,868 UART: [fwproc] Wait for Commands...
1,283,480 UART: [fwproc] Recv command 0x46574c44
1,284,208 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,011 UART: ROM Fatal Error: 0x000B0005
1,330,168 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,529 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,301 UART: [state] LifecycleState = Production
85,908 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,515 UART: [kat] SHA2-512-ACC
908,416 UART: [kat] ECC-384
918,119 UART: [kat] HMAC-384Kdf
922,537 UART: [kat] LMS
1,170,865 UART: [kat] --
1,171,784 UART: [cold-reset] ++
1,172,214 UART: [fht] FHT @ 0x50003400
1,175,019 UART: [idev] ++
1,175,187 UART: [idev] CDI.KEYID = 6
1,175,547 UART: [idev] SUBJECT.KEYID = 7
1,175,971 UART: [idev] UDS.KEYID = 0
1,176,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,979 UART: [idev] Erasing UDS.KEYID = 0
1,201,226 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,580 UART: [ldev] ++
1,210,748 UART: [ldev] CDI.KEYID = 6
1,211,111 UART: [ldev] SUBJECT.KEYID = 5
1,211,537 UART: [ldev] AUTHORITY.KEYID = 7
1,212,000 UART: [ldev] FE.KEYID = 1
1,217,050 UART: [ldev] Erasing FE.KEYID = 1
1,243,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,990 UART: [ldev] --
1,282,381 UART: [fwproc] Wait for Commands...
1,283,059 UART: [fwproc] Recv command 0x46574c44
1,283,787 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,372 UART: ROM Fatal Error: 0x000B0005
1,329,529 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,816 >>> mbox cmd response: failed
test fw_load::fw_load_bad_vendor_lms_pub_key ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,178 UART:
192,543 UART: Running Caliptra ROM ...
193,624 UART:
193,770 UART: [state] CFI Enabled
267,842 UART: [state] LifecycleState = Production
269,645 UART: [state] DebugLocked = No
271,753 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,847 UART: [kat] SHA2-256
445,560 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,050 UART: [kat] ++
456,567 UART: [kat] sha1
469,063 UART: [kat] SHA2-256
471,759 UART: [kat] SHA2-384
477,651 UART: [kat] SHA2-512-ACC
480,050 UART: [kat] ECC-384
2,768,055 UART: [kat] HMAC-384Kdf
2,800,343 UART: [kat] LMS
3,990,649 UART: [kat] --
3,994,782 UART: [cold-reset] ++
3,996,394 UART: [fht] Storing FHT @ 0x50003400
4,007,122 UART: [idev] ++
4,007,693 UART: [idev] CDI.KEYID = 6
4,008,714 UART: [idev] SUBJECT.KEYID = 7
4,009,882 UART: [idev] UDS.KEYID = 0
4,015,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,282 UART: [idev] Erasing UDS.KEYID = 0
7,350,410 UART: [idev] Using Sha1 for KeyId Algorithm
7,372,021 UART: [idev] --
7,375,394 UART: [ldev] ++
7,375,969 UART: [ldev] CDI.KEYID = 6
7,376,933 UART: [ldev] SUBJECT.KEYID = 5
7,378,151 UART: [ldev] AUTHORITY.KEYID = 7
7,379,600 UART: [ldev] FE.KEYID = 1
7,424,021 UART: [ldev] Erasing FE.KEYID = 1
10,753,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,582 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,106 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,261 UART: [ldev] --
13,116,778 UART: [fwproc] Waiting for Commands...
13,119,095 UART: [fwproc] Received command 0x46574c44
13,121,288 UART: [fwproc] Received Image of size 118548 bytes
13,187,064 UART: ROM Fatal Error: 0x000B0003
13,190,557 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,808,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,940,221 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,518 UART:
192,874 UART: Running Caliptra ROM ...
194,062 UART:
603,791 UART: [state] CFI Enabled
617,025 UART: [state] LifecycleState = Production
618,861 UART: [state] DebugLocked = No
621,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,145 UART: [kat] SHA2-256
795,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,435 UART: [kat] ++
806,888 UART: [kat] sha1
818,632 UART: [kat] SHA2-256
821,364 UART: [kat] SHA2-384
828,261 UART: [kat] SHA2-512-ACC
830,597 UART: [kat] ECC-384
3,115,754 UART: [kat] HMAC-384Kdf
3,127,857 UART: [kat] LMS
4,318,006 UART: [kat] --
4,323,405 UART: [cold-reset] ++
4,324,375 UART: [fht] Storing FHT @ 0x50003400
4,336,544 UART: [idev] ++
4,337,166 UART: [idev] CDI.KEYID = 6
4,338,050 UART: [idev] SUBJECT.KEYID = 7
4,339,324 UART: [idev] UDS.KEYID = 0
4,345,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,494,435 UART: [idev] Erasing UDS.KEYID = 0
7,624,700 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,999 UART: [idev] --
7,649,617 UART: [ldev] ++
7,650,194 UART: [ldev] CDI.KEYID = 6
7,651,191 UART: [ldev] SUBJECT.KEYID = 5
7,652,416 UART: [ldev] AUTHORITY.KEYID = 7
7,653,651 UART: [ldev] FE.KEYID = 1
7,665,171 UART: [ldev] Erasing FE.KEYID = 1
10,956,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,840 UART: [ldev] --
13,317,164 UART: [fwproc] Waiting for Commands...
13,320,088 UART: [fwproc] Received command 0x46574c44
13,322,289 UART: [fwproc] Received Image of size 118548 bytes
13,385,595 UART: ROM Fatal Error: 0x000B0003
13,389,144 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
4,131,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,117,314 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,182 writing to cptra_bootfsm_go
192,426 UART:
192,780 UART: Running Caliptra ROM ...
193,953 UART:
194,109 UART: [state] CFI Enabled
266,378 UART: [state] LifecycleState = Production
268,218 UART: [state] DebugLocked = No
270,580 UART: [state] WD Timer not started. Device not locked for debugging
275,213 UART: [kat] SHA2-256
454,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,611 UART: [kat] ++
466,062 UART: [kat] sha1
475,752 UART: [kat] SHA2-256
478,432 UART: [kat] SHA2-384
483,128 UART: [kat] SHA2-512-ACC
485,525 UART: [kat] ECC-384
2,948,794 UART: [kat] HMAC-384Kdf
2,971,312 UART: [kat] LMS
3,447,802 UART: [kat] --
3,453,470 UART: [cold-reset] ++
3,456,064 UART: [fht] FHT @ 0x50003400
3,467,478 UART: [idev] ++
3,468,050 UART: [idev] CDI.KEYID = 6
3,468,996 UART: [idev] SUBJECT.KEYID = 7
3,470,265 UART: [idev] UDS.KEYID = 0
3,473,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,874 UART: [idev] Erasing UDS.KEYID = 0
5,986,771 UART: [idev] Sha1 KeyId Algorithm
6,010,148 UART: [idev] --
6,014,082 UART: [ldev] ++
6,014,678 UART: [ldev] CDI.KEYID = 6
6,015,754 UART: [ldev] SUBJECT.KEYID = 5
6,016,871 UART: [ldev] AUTHORITY.KEYID = 7
6,018,052 UART: [ldev] FE.KEYID = 1
6,058,051 UART: [ldev] Erasing FE.KEYID = 1
8,565,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,639 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,761 UART: [ldev] --
10,374,653 UART: [fwproc] Wait for Commands...
10,376,485 UART: [fwproc] Recv command 0x46574c44
10,378,480 UART: [fwproc] Recv'd Img size: 118548 bytes
10,453,029 UART: ROM Fatal Error: 0x000B0003
10,456,232 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,462,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,329,113 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,508 writing to cptra_bootfsm_go
192,711 UART:
193,073 UART: Running Caliptra ROM ...
194,225 UART:
603,872 UART: [state] CFI Enabled
618,645 UART: [state] LifecycleState = Production
620,444 UART: [state] DebugLocked = No
622,771 UART: [state] WD Timer not started. Device not locked for debugging
626,104 UART: [kat] SHA2-256
805,745 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,520 UART: [kat] ++
816,970 UART: [kat] sha1
827,902 UART: [kat] SHA2-256
830,647 UART: [kat] SHA2-384
837,169 UART: [kat] SHA2-512-ACC
839,518 UART: [kat] ECC-384
3,280,208 UART: [kat] HMAC-384Kdf
3,292,600 UART: [kat] LMS
3,769,162 UART: [kat] --
3,773,282 UART: [cold-reset] ++
3,775,395 UART: [fht] FHT @ 0x50003400
3,785,799 UART: [idev] ++
3,786,373 UART: [idev] CDI.KEYID = 6
3,787,400 UART: [idev] SUBJECT.KEYID = 7
3,788,575 UART: [idev] UDS.KEYID = 0
3,791,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,862 UART: [idev] Erasing UDS.KEYID = 0
6,267,033 UART: [idev] Sha1 KeyId Algorithm
6,290,707 UART: [idev] --
6,297,246 UART: [ldev] ++
6,297,822 UART: [ldev] CDI.KEYID = 6
6,298,741 UART: [ldev] SUBJECT.KEYID = 5
6,299,960 UART: [ldev] AUTHORITY.KEYID = 7
6,301,200 UART: [ldev] FE.KEYID = 1
6,312,839 UART: [ldev] Erasing FE.KEYID = 1
8,793,129 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,791 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,098 UART: [ldev] --
10,583,910 UART: [fwproc] Wait for Commands...
10,586,985 UART: [fwproc] Recv command 0x46574c44
10,588,974 UART: [fwproc] Recv'd Img size: 118548 bytes
10,666,199 UART: ROM Fatal Error: 0x000B0003
10,669,445 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
3,780,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,550,340 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,939 writing to cptra_bootfsm_go
192,067 UART:
192,433 UART: Running Caliptra ROM ...
193,547 UART:
193,698 UART: [state] CFI Enabled
262,766 UART: [state] LifecycleState = Production
265,034 UART: [state] DebugLocked = No
267,691 UART: [state] WD Timer not started. Device not locked for debugging
271,942 UART: [kat] SHA2-256
461,817 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,568 UART: [kat] ++
473,019 UART: [kat] sha1
484,665 UART: [kat] SHA2-256
487,646 UART: [kat] SHA2-384
493,904 UART: [kat] SHA2-512-ACC
496,474 UART: [kat] ECC-384
2,948,697 UART: [kat] HMAC-384Kdf
2,975,940 UART: [kat] LMS
3,507,722 UART: [kat] --
3,511,847 UART: [cold-reset] ++
3,514,223 UART: [fht] FHT @ 0x50003400
3,527,155 UART: [idev] ++
3,527,842 UART: [idev] CDI.KEYID = 6
3,528,756 UART: [idev] SUBJECT.KEYID = 7
3,529,975 UART: [idev] UDS.KEYID = 0
3,536,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,685,498 UART: [idev] Erasing UDS.KEYID = 0
6,033,471 UART: [idev] Sha1 KeyId Algorithm
6,056,223 UART: [idev] --
6,060,855 UART: [ldev] ++
6,061,553 UART: [ldev] CDI.KEYID = 6
6,062,446 UART: [ldev] SUBJECT.KEYID = 5
6,063,670 UART: [ldev] AUTHORITY.KEYID = 7
6,064,804 UART: [ldev] FE.KEYID = 1
6,105,261 UART: [ldev] Erasing FE.KEYID = 1
8,610,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,377,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,392,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,413,860 UART: [ldev] --
10,419,832 UART: [fwproc] Wait for Commands...
10,422,257 UART: [fwproc] Recv command 0x46574c44
10,424,523 UART: [fwproc] Recv'd Img size: 118548 bytes
10,517,638 UART: ROM Fatal Error: 0x000B0003
10,521,322 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,446,637 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,309,981 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,527 UART:
192,890 UART: Running Caliptra ROM ...
194,078 UART:
603,817 UART: [state] CFI Enabled
618,980 UART: [state] LifecycleState = Production
621,201 UART: [state] DebugLocked = No
623,337 UART: [state] WD Timer not started. Device not locked for debugging
627,437 UART: [kat] SHA2-256
817,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,102 UART: [kat] ++
828,700 UART: [kat] sha1
839,049 UART: [kat] SHA2-256
842,074 UART: [kat] SHA2-384
847,466 UART: [kat] SHA2-512-ACC
850,095 UART: [kat] ECC-384
3,288,754 UART: [kat] HMAC-384Kdf
3,301,883 UART: [kat] LMS
3,833,685 UART: [kat] --
3,838,429 UART: [cold-reset] ++
3,840,595 UART: [fht] FHT @ 0x50003400
3,852,069 UART: [idev] ++
3,852,756 UART: [idev] CDI.KEYID = 6
3,853,685 UART: [idev] SUBJECT.KEYID = 7
3,854,903 UART: [idev] UDS.KEYID = 0
3,860,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,961 UART: [idev] Erasing UDS.KEYID = 0
6,332,948 UART: [idev] Sha1 KeyId Algorithm
6,355,703 UART: [idev] --
6,360,115 UART: [ldev] ++
6,360,808 UART: [ldev] CDI.KEYID = 6
6,361,725 UART: [ldev] SUBJECT.KEYID = 5
6,362,832 UART: [ldev] AUTHORITY.KEYID = 7
6,364,131 UART: [ldev] FE.KEYID = 1
6,376,593 UART: [ldev] Erasing FE.KEYID = 1
8,853,718 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,210 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,654 UART: [ldev] --
10,642,542 UART: [fwproc] Wait for Commands...
10,644,159 UART: [fwproc] Recv command 0x46574c44
10,646,484 UART: [fwproc] Recv'd Img size: 118548 bytes
10,735,267 UART: ROM Fatal Error: 0x000B0003
10,738,953 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.65s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
3,758,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,531,608 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,534 UART: [state] LifecycleState = Production
86,141 UART: [state] DebugLocked = No
86,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,489 UART: [kat] SHA2-256
882,420 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,535 UART: [kat] ++
886,687 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,446 UART: [kat] SHA2-512-ACC
897,347 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,550 UART: [kat] LMS
1,475,746 UART: [kat] --
1,476,453 UART: [cold-reset] ++
1,476,991 UART: [fht] Storing FHT @ 0x50003400
1,479,954 UART: [idev] ++
1,480,122 UART: [idev] CDI.KEYID = 6
1,480,482 UART: [idev] SUBJECT.KEYID = 7
1,480,906 UART: [idev] UDS.KEYID = 0
1,481,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,064 UART: [idev] Erasing UDS.KEYID = 0
1,506,060 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,660 UART: [idev] --
1,515,755 UART: [ldev] ++
1,515,923 UART: [ldev] CDI.KEYID = 6
1,516,286 UART: [ldev] SUBJECT.KEYID = 5
1,516,712 UART: [ldev] AUTHORITY.KEYID = 7
1,517,175 UART: [ldev] FE.KEYID = 1
1,522,367 UART: [ldev] Erasing FE.KEYID = 1
1,546,880 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,349 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,065 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,956 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,668 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,746 UART: [ldev] --
1,586,243 UART: [fwproc] Waiting for Commands...
1,586,972 UART: [fwproc] Received command 0x46574c44
1,587,763 UART: [fwproc] Received Image of size 118548 bytes
1,608,249 UART: ROM Fatal Error: 0x000B0003
1,609,406 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,675 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Production
86,226 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,578 UART: [kat] SHA2-256
882,509 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,624 UART: [kat] ++
886,776 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,529 UART: [kat] SHA2-512-ACC
897,430 UART: [kat] ECC-384
903,007 UART: [kat] HMAC-384Kdf
907,657 UART: [kat] LMS
1,475,853 UART: [kat] --
1,476,820 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,141 UART: [idev] ++
1,480,309 UART: [idev] CDI.KEYID = 6
1,480,669 UART: [idev] SUBJECT.KEYID = 7
1,481,093 UART: [idev] UDS.KEYID = 0
1,481,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,833 UART: [idev] Erasing UDS.KEYID = 0
1,505,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,717 UART: [idev] --
1,514,954 UART: [ldev] ++
1,515,122 UART: [ldev] CDI.KEYID = 6
1,515,485 UART: [ldev] SUBJECT.KEYID = 5
1,515,911 UART: [ldev] AUTHORITY.KEYID = 7
1,516,374 UART: [ldev] FE.KEYID = 1
1,521,764 UART: [ldev] Erasing FE.KEYID = 1
1,546,771 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,538 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,254 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,145 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,979 UART: [ldev] --
1,586,478 UART: [fwproc] Waiting for Commands...
1,587,221 UART: [fwproc] Received command 0x46574c44
1,588,012 UART: [fwproc] Received Image of size 118548 bytes
1,608,238 UART: ROM Fatal Error: 0x000B0003
1,609,395 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,774 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,234 UART: [state] LifecycleState = Production
85,841 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
891,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,302 UART: [kat] ++
895,454 UART: [kat] sha1
899,854 UART: [kat] SHA2-256
901,794 UART: [kat] SHA2-384
904,555 UART: [kat] SHA2-512-ACC
906,456 UART: [kat] ECC-384
915,991 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,692 UART: [cold-reset] ++
1,170,092 UART: [fht] FHT @ 0x50003400
1,172,714 UART: [idev] ++
1,172,882 UART: [idev] CDI.KEYID = 6
1,173,243 UART: [idev] SUBJECT.KEYID = 7
1,173,668 UART: [idev] UDS.KEYID = 0
1,174,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,705 UART: [idev] Erasing UDS.KEYID = 0
1,198,935 UART: [idev] Sha1 KeyId Algorithm
1,207,765 UART: [idev] --
1,208,596 UART: [ldev] ++
1,208,764 UART: [ldev] CDI.KEYID = 6
1,209,128 UART: [ldev] SUBJECT.KEYID = 5
1,209,555 UART: [ldev] AUTHORITY.KEYID = 7
1,210,018 UART: [ldev] FE.KEYID = 1
1,215,390 UART: [ldev] Erasing FE.KEYID = 1
1,241,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,437 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,243 UART: [fwproc] Wait for Commands...
1,281,846 UART: [fwproc] Recv command 0x46574c44
1,282,579 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,387 UART: ROM Fatal Error: 0x000B0003
1,303,544 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,531 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Production
86,044 UART: [state] DebugLocked = No
86,586 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
891,335 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,439 UART: [kat] ++
895,591 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,520 UART: [kat] SHA2-512-ACC
906,421 UART: [kat] ECC-384
915,952 UART: [kat] HMAC-384Kdf
920,388 UART: [kat] LMS
1,168,700 UART: [kat] --
1,169,659 UART: [cold-reset] ++
1,170,115 UART: [fht] FHT @ 0x50003400
1,172,921 UART: [idev] ++
1,173,089 UART: [idev] CDI.KEYID = 6
1,173,450 UART: [idev] SUBJECT.KEYID = 7
1,173,875 UART: [idev] UDS.KEYID = 0
1,174,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,230 UART: [idev] Sha1 KeyId Algorithm
1,208,036 UART: [idev] --
1,208,933 UART: [ldev] ++
1,209,101 UART: [ldev] CDI.KEYID = 6
1,209,465 UART: [ldev] SUBJECT.KEYID = 5
1,209,892 UART: [ldev] AUTHORITY.KEYID = 7
1,210,355 UART: [ldev] FE.KEYID = 1
1,215,605 UART: [ldev] Erasing FE.KEYID = 1
1,241,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,808 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,409 UART: [ldev] --
1,280,656 UART: [fwproc] Wait for Commands...
1,281,293 UART: [fwproc] Recv command 0x46574c44
1,282,026 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,790 UART: ROM Fatal Error: 0x000B0003
1,303,947 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,252 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Production
85,701 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,474 UART: [kat] SHA2-256
893,124 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,249 UART: [kat] ++
897,401 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,146 UART: [kat] SHA2-512-ACC
908,047 UART: [kat] ECC-384
917,726 UART: [kat] HMAC-384Kdf
922,374 UART: [kat] LMS
1,170,702 UART: [kat] --
1,171,631 UART: [cold-reset] ++
1,171,995 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,690 UART: [idev] Erasing UDS.KEYID = 0
1,200,271 UART: [idev] Sha1 KeyId Algorithm
1,208,873 UART: [idev] --
1,209,893 UART: [ldev] ++
1,210,061 UART: [ldev] CDI.KEYID = 6
1,210,424 UART: [ldev] SUBJECT.KEYID = 5
1,210,850 UART: [ldev] AUTHORITY.KEYID = 7
1,211,313 UART: [ldev] FE.KEYID = 1
1,216,619 UART: [ldev] Erasing FE.KEYID = 1
1,243,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,731 UART: [ldev] --
1,283,176 UART: [fwproc] Wait for Commands...
1,283,940 UART: [fwproc] Recv command 0x46574c44
1,284,668 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,598 UART: ROM Fatal Error: 0x000B0003
1,305,755 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,222 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Production
85,660 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,451 UART: [kat] SHA2-256
893,101 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,226 UART: [kat] ++
897,378 UART: [kat] sha1
901,584 UART: [kat] SHA2-256
903,524 UART: [kat] SHA2-384
906,289 UART: [kat] SHA2-512-ACC
908,190 UART: [kat] ECC-384
917,983 UART: [kat] HMAC-384Kdf
922,639 UART: [kat] LMS
1,170,967 UART: [kat] --
1,172,024 UART: [cold-reset] ++
1,172,448 UART: [fht] FHT @ 0x50003400
1,174,963 UART: [idev] ++
1,175,131 UART: [idev] CDI.KEYID = 6
1,175,491 UART: [idev] SUBJECT.KEYID = 7
1,175,915 UART: [idev] UDS.KEYID = 0
1,176,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,157 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,211,168 UART: [ldev] ++
1,211,336 UART: [ldev] CDI.KEYID = 6
1,211,699 UART: [ldev] SUBJECT.KEYID = 5
1,212,125 UART: [ldev] AUTHORITY.KEYID = 7
1,212,588 UART: [ldev] FE.KEYID = 1
1,217,526 UART: [ldev] Erasing FE.KEYID = 1
1,243,793 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,674 UART: [ldev] --
1,282,981 UART: [fwproc] Wait for Commands...
1,283,709 UART: [fwproc] Recv command 0x46574c44
1,284,437 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,847 UART: ROM Fatal Error: 0x000B0003
1,306,004 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,393 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_key_hashes ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,181 UART:
192,540 UART: Running Caliptra ROM ...
193,718 UART:
193,871 UART: [state] CFI Enabled
266,701 UART: [state] LifecycleState = Production
268,571 UART: [state] DebugLocked = No
270,767 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,695 UART: [kat] SHA2-256
445,441 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,954 UART: [kat] ++
456,485 UART: [kat] sha1
467,313 UART: [kat] SHA2-256
470,018 UART: [kat] SHA2-384
475,568 UART: [kat] SHA2-512-ACC
477,908 UART: [kat] ECC-384
2,768,615 UART: [kat] HMAC-384Kdf
2,781,498 UART: [kat] LMS
3,971,819 UART: [kat] --
3,976,159 UART: [cold-reset] ++
3,978,260 UART: [fht] Storing FHT @ 0x50003400
3,988,720 UART: [idev] ++
3,989,339 UART: [idev] CDI.KEYID = 6
3,990,267 UART: [idev] SUBJECT.KEYID = 7
3,991,485 UART: [idev] UDS.KEYID = 0
3,994,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,007 UART: [idev] Erasing UDS.KEYID = 0
7,329,902 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,202 UART: [idev] --
7,358,787 UART: [ldev] ++
7,359,363 UART: [ldev] CDI.KEYID = 6
7,360,305 UART: [ldev] SUBJECT.KEYID = 5
7,361,524 UART: [ldev] AUTHORITY.KEYID = 7
7,362,766 UART: [ldev] FE.KEYID = 1
7,405,876 UART: [ldev] Erasing FE.KEYID = 1
10,736,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,044,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,323 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,890 UART: [ldev] --
13,097,618 UART: [fwproc] Waiting for Commands...
13,099,777 UART: [fwproc] Received command 0x46574c44
13,101,972 UART: [fwproc] Received Image of size 118548 bytes
13,188,190 UART: ROM Fatal Error: 0x000B0005
13,191,736 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
3,806,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,970,344 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
192,608 UART:
192,958 UART: Running Caliptra ROM ...
194,056 UART:
603,942 UART: [state] CFI Enabled
619,235 UART: [state] LifecycleState = Production
621,082 UART: [state] DebugLocked = No
623,355 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,768 UART: [kat] SHA2-256
798,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,057 UART: [kat] ++
809,511 UART: [kat] sha1
821,147 UART: [kat] SHA2-256
823,887 UART: [kat] SHA2-384
829,729 UART: [kat] SHA2-512-ACC
832,090 UART: [kat] ECC-384
3,115,558 UART: [kat] HMAC-384Kdf
3,127,251 UART: [kat] LMS
4,317,354 UART: [kat] --
4,320,129 UART: [cold-reset] ++
4,321,582 UART: [fht] Storing FHT @ 0x50003400
4,334,262 UART: [idev] ++
4,334,844 UART: [idev] CDI.KEYID = 6
4,335,734 UART: [idev] SUBJECT.KEYID = 7
4,337,015 UART: [idev] UDS.KEYID = 0
4,340,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,211 UART: [idev] Erasing UDS.KEYID = 0
7,623,040 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,951 UART: [idev] --
7,648,175 UART: [ldev] ++
7,648,829 UART: [ldev] CDI.KEYID = 6
7,649,723 UART: [ldev] SUBJECT.KEYID = 5
7,650,946 UART: [ldev] AUTHORITY.KEYID = 7
7,652,188 UART: [ldev] FE.KEYID = 1
7,664,680 UART: [ldev] Erasing FE.KEYID = 1
10,955,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,794 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,646 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,434 UART: [ldev] --
13,315,829 UART: [fwproc] Waiting for Commands...
13,317,993 UART: [fwproc] Received command 0x46574c44
13,320,186 UART: [fwproc] Received Image of size 118548 bytes
13,413,866 UART: ROM Fatal Error: 0x000B0005
13,417,338 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.89s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
4,134,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,162,801 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,248 UART:
192,618 UART: Running Caliptra ROM ...
193,753 UART:
193,905 UART: [state] CFI Enabled
268,302 UART: [state] LifecycleState = Production
270,129 UART: [state] DebugLocked = No
271,300 UART: [state] WD Timer not started. Device not locked for debugging
275,529 UART: [kat] SHA2-256
455,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,975 UART: [kat] ++
466,517 UART: [kat] sha1
476,811 UART: [kat] SHA2-256
479,546 UART: [kat] SHA2-384
485,743 UART: [kat] SHA2-512-ACC
488,092 UART: [kat] ECC-384
2,948,720 UART: [kat] HMAC-384Kdf
2,971,232 UART: [kat] LMS
3,447,732 UART: [kat] --
3,454,510 UART: [cold-reset] ++
3,456,560 UART: [fht] FHT @ 0x50003400
3,468,029 UART: [idev] ++
3,468,611 UART: [idev] CDI.KEYID = 6
3,469,556 UART: [idev] SUBJECT.KEYID = 7
3,470,826 UART: [idev] UDS.KEYID = 0
3,473,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,114 UART: [idev] Erasing UDS.KEYID = 0
5,986,329 UART: [idev] Sha1 KeyId Algorithm
6,009,645 UART: [idev] --
6,014,471 UART: [ldev] ++
6,015,055 UART: [ldev] CDI.KEYID = 6
6,015,978 UART: [ldev] SUBJECT.KEYID = 5
6,017,225 UART: [ldev] AUTHORITY.KEYID = 7
6,018,467 UART: [ldev] FE.KEYID = 1
6,056,250 UART: [ldev] Erasing FE.KEYID = 1
8,561,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,237 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,079 UART: [ldev] --
10,372,347 UART: [fwproc] Wait for Commands...
10,374,625 UART: [fwproc] Recv command 0x46574c44
10,376,680 UART: [fwproc] Recv'd Img size: 118548 bytes
10,483,253 UART: ROM Fatal Error: 0x000B0005
10,486,509 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
3,462,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,380,912 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,445 writing to cptra_bootfsm_go
192,586 UART:
192,956 UART: Running Caliptra ROM ...
194,044 UART:
603,764 UART: [state] CFI Enabled
613,167 UART: [state] LifecycleState = Production
614,954 UART: [state] DebugLocked = No
616,420 UART: [state] WD Timer not started. Device not locked for debugging
619,837 UART: [kat] SHA2-256
799,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
810,276 UART: [kat] ++
810,734 UART: [kat] sha1
821,960 UART: [kat] SHA2-256
824,656 UART: [kat] SHA2-384
830,698 UART: [kat] SHA2-512-ACC
833,098 UART: [kat] ECC-384
3,276,241 UART: [kat] HMAC-384Kdf
3,289,086 UART: [kat] LMS
3,765,570 UART: [kat] --
3,771,670 UART: [cold-reset] ++
3,772,862 UART: [fht] FHT @ 0x50003400
3,783,901 UART: [idev] ++
3,784,472 UART: [idev] CDI.KEYID = 6
3,785,494 UART: [idev] SUBJECT.KEYID = 7
3,786,656 UART: [idev] UDS.KEYID = 0
3,789,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,624 UART: [idev] Erasing UDS.KEYID = 0
6,267,875 UART: [idev] Sha1 KeyId Algorithm
6,292,157 UART: [idev] --
6,296,966 UART: [ldev] ++
6,297,539 UART: [ldev] CDI.KEYID = 6
6,298,428 UART: [ldev] SUBJECT.KEYID = 5
6,299,647 UART: [ldev] AUTHORITY.KEYID = 7
6,300,944 UART: [ldev] FE.KEYID = 1
6,311,897 UART: [ldev] Erasing FE.KEYID = 1
8,788,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,538,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,155 UART: [ldev] --
10,581,675 UART: [fwproc] Wait for Commands...
10,583,616 UART: [fwproc] Recv command 0x46574c44
10,585,624 UART: [fwproc] Recv'd Img size: 118548 bytes
10,695,662 UART: ROM Fatal Error: 0x000B0005
10,698,912 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,502 writing to cptra_bootfsm_go
3,778,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,571,089 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,141 UART:
192,501 UART: Running Caliptra ROM ...
193,598 UART:
193,764 UART: [state] CFI Enabled
263,364 UART: [state] LifecycleState = Production
265,595 UART: [state] DebugLocked = No
267,118 UART: [state] WD Timer not started. Device not locked for debugging
272,098 UART: [kat] SHA2-256
461,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,778 UART: [kat] ++
473,264 UART: [kat] sha1
485,391 UART: [kat] SHA2-256
488,407 UART: [kat] SHA2-384
494,501 UART: [kat] SHA2-512-ACC
497,063 UART: [kat] ECC-384
2,947,711 UART: [kat] HMAC-384Kdf
2,970,329 UART: [kat] LMS
3,502,061 UART: [kat] --
3,507,048 UART: [cold-reset] ++
3,508,430 UART: [fht] FHT @ 0x50003400
3,521,202 UART: [idev] ++
3,521,883 UART: [idev] CDI.KEYID = 6
3,522,905 UART: [idev] SUBJECT.KEYID = 7
3,524,009 UART: [idev] UDS.KEYID = 0
3,526,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,232 UART: [idev] Erasing UDS.KEYID = 0
6,026,359 UART: [idev] Sha1 KeyId Algorithm
6,048,683 UART: [idev] --
6,053,709 UART: [ldev] ++
6,054,396 UART: [ldev] CDI.KEYID = 6
6,055,482 UART: [ldev] SUBJECT.KEYID = 5
6,056,613 UART: [ldev] AUTHORITY.KEYID = 7
6,057,804 UART: [ldev] FE.KEYID = 1
6,098,433 UART: [ldev] Erasing FE.KEYID = 1
8,606,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,238 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,349 UART: [ldev] --
10,411,977 UART: [fwproc] Wait for Commands...
10,413,437 UART: [fwproc] Recv command 0x46574c44
10,415,699 UART: [fwproc] Recv'd Img size: 118548 bytes
10,537,724 UART: ROM Fatal Error: 0x000B0005
10,541,408 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
3,443,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,370,575 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.74s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
192,617 UART:
192,980 UART: Running Caliptra ROM ...
194,185 UART:
603,895 UART: [state] CFI Enabled
615,471 UART: [state] LifecycleState = Production
617,685 UART: [state] DebugLocked = No
619,475 UART: [state] WD Timer not started. Device not locked for debugging
623,770 UART: [kat] SHA2-256
813,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,481 UART: [kat] ++
825,074 UART: [kat] sha1
836,130 UART: [kat] SHA2-256
839,152 UART: [kat] SHA2-384
845,299 UART: [kat] SHA2-512-ACC
847,915 UART: [kat] ECC-384
3,288,847 UART: [kat] HMAC-384Kdf
3,302,889 UART: [kat] LMS
3,834,726 UART: [kat] --
3,840,828 UART: [cold-reset] ++
3,843,034 UART: [fht] FHT @ 0x50003400
3,855,325 UART: [idev] ++
3,856,016 UART: [idev] CDI.KEYID = 6
3,857,060 UART: [idev] SUBJECT.KEYID = 7
3,858,176 UART: [idev] UDS.KEYID = 0
3,861,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,130 UART: [idev] Erasing UDS.KEYID = 0
6,334,183 UART: [idev] Sha1 KeyId Algorithm
6,356,397 UART: [idev] --
6,360,284 UART: [ldev] ++
6,360,964 UART: [ldev] CDI.KEYID = 6
6,361,876 UART: [ldev] SUBJECT.KEYID = 5
6,363,042 UART: [ldev] AUTHORITY.KEYID = 7
6,364,281 UART: [ldev] FE.KEYID = 1
6,374,496 UART: [ldev] Erasing FE.KEYID = 1
8,857,665 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,303 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,205 UART: [ldev] --
10,648,853 UART: [fwproc] Wait for Commands...
10,651,342 UART: [fwproc] Recv command 0x46574c44
10,653,670 UART: [fwproc] Recv'd Img size: 118548 bytes
10,774,903 UART: ROM Fatal Error: 0x000B0005
10,778,520 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,754,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,580,565 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Production
85,673 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,933 UART: [kat] SHA2-256
881,864 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,979 UART: [kat] ++
886,131 UART: [kat] sha1
890,339 UART: [kat] SHA2-256
892,277 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,468 UART: [kat] HMAC-384Kdf
906,842 UART: [kat] LMS
1,475,038 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,402 UART: [idev] ++
1,479,570 UART: [idev] CDI.KEYID = 6
1,479,930 UART: [idev] SUBJECT.KEYID = 7
1,480,354 UART: [idev] UDS.KEYID = 0
1,480,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,252 UART: [idev] Erasing UDS.KEYID = 0
1,504,674 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,410 UART: [idev] --
1,514,417 UART: [ldev] ++
1,514,585 UART: [ldev] CDI.KEYID = 6
1,514,948 UART: [ldev] SUBJECT.KEYID = 5
1,515,374 UART: [ldev] AUTHORITY.KEYID = 7
1,515,837 UART: [ldev] FE.KEYID = 1
1,520,811 UART: [ldev] Erasing FE.KEYID = 1
1,546,354 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,462 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,638 UART: [ldev] --
1,586,149 UART: [fwproc] Waiting for Commands...
1,586,852 UART: [fwproc] Received command 0x46574c44
1,587,643 UART: [fwproc] Received Image of size 118548 bytes
1,633,390 UART: ROM Fatal Error: 0x000B0005
1,634,547 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,914 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,299 UART: [state] LifecycleState = Production
85,906 UART: [state] DebugLocked = No
86,492 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,998 UART: [kat] SHA2-256
881,929 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,044 UART: [kat] ++
886,196 UART: [kat] sha1
890,616 UART: [kat] SHA2-256
892,554 UART: [kat] SHA2-384
895,177 UART: [kat] SHA2-512-ACC
897,078 UART: [kat] ECC-384
902,787 UART: [kat] HMAC-384Kdf
907,375 UART: [kat] LMS
1,475,571 UART: [kat] --
1,476,408 UART: [cold-reset] ++
1,476,870 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,883 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,224 UART: [ldev] ++
1,515,392 UART: [ldev] CDI.KEYID = 6
1,515,755 UART: [ldev] SUBJECT.KEYID = 5
1,516,181 UART: [ldev] AUTHORITY.KEYID = 7
1,516,644 UART: [ldev] FE.KEYID = 1
1,521,792 UART: [ldev] Erasing FE.KEYID = 1
1,547,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,270 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,961 UART: [ldev] --
1,586,466 UART: [fwproc] Waiting for Commands...
1,587,243 UART: [fwproc] Received command 0x46574c44
1,588,034 UART: [fwproc] Received Image of size 118548 bytes
1,632,753 UART: ROM Fatal Error: 0x000B0005
1,633,910 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,135 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Production
85,773 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,728 UART: [kat] SHA2-256
901,668 UART: [kat] SHA2-384
904,543 UART: [kat] SHA2-512-ACC
906,444 UART: [kat] ECC-384
915,677 UART: [kat] HMAC-384Kdf
920,205 UART: [kat] LMS
1,168,517 UART: [kat] --
1,169,192 UART: [cold-reset] ++
1,169,762 UART: [fht] FHT @ 0x50003400
1,172,246 UART: [idev] ++
1,172,414 UART: [idev] CDI.KEYID = 6
1,172,775 UART: [idev] SUBJECT.KEYID = 7
1,173,200 UART: [idev] UDS.KEYID = 0
1,173,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,923 UART: [idev] Erasing UDS.KEYID = 0
1,198,565 UART: [idev] Sha1 KeyId Algorithm
1,207,355 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,254 UART: [ldev] Erasing FE.KEYID = 1
1,241,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,542 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,330 UART: [ldev] --
1,280,601 UART: [fwproc] Wait for Commands...
1,281,354 UART: [fwproc] Recv command 0x46574c44
1,282,087 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,755 UART: ROM Fatal Error: 0x000B0005
1,327,912 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,817 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Production
86,054 UART: [state] DebugLocked = No
86,608 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
891,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: [kat] ++
895,625 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,918 UART: [kat] SHA2-512-ACC
906,819 UART: [kat] ECC-384
916,364 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,653 UART: [fht] FHT @ 0x50003400
1,173,395 UART: [idev] ++
1,173,563 UART: [idev] CDI.KEYID = 6
1,173,924 UART: [idev] SUBJECT.KEYID = 7
1,174,349 UART: [idev] UDS.KEYID = 0
1,174,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,768 UART: [idev] Sha1 KeyId Algorithm
1,208,536 UART: [idev] --
1,209,563 UART: [ldev] ++
1,209,731 UART: [ldev] CDI.KEYID = 6
1,210,095 UART: [ldev] SUBJECT.KEYID = 5
1,210,522 UART: [ldev] AUTHORITY.KEYID = 7
1,210,985 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,243,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,387 UART: [ldev] --
1,282,822 UART: [fwproc] Wait for Commands...
1,283,435 UART: [fwproc] Recv command 0x46574c44
1,284,168 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,472 UART: ROM Fatal Error: 0x000B0005
1,329,629 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,970 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Production
85,471 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
893,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,191 UART: [kat] ++
897,343 UART: [kat] sha1
901,541 UART: [kat] SHA2-256
903,481 UART: [kat] SHA2-384
906,182 UART: [kat] SHA2-512-ACC
908,083 UART: [kat] ECC-384
917,764 UART: [kat] HMAC-384Kdf
922,420 UART: [kat] LMS
1,170,748 UART: [kat] --
1,171,665 UART: [cold-reset] ++
1,172,215 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,800 UART: [idev] Erasing UDS.KEYID = 0
1,200,997 UART: [idev] Sha1 KeyId Algorithm
1,209,393 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,008 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,242,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,203 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,316 UART: [fwproc] Recv command 0x46574c44
1,284,044 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,863 UART: ROM Fatal Error: 0x000B0005
1,330,020 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,693 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Production
86,016 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,819 UART: [kat] SHA2-256
893,469 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,594 UART: [kat] ++
897,746 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,449 UART: [kat] LMS
1,171,777 UART: [kat] --
1,172,444 UART: [cold-reset] ++
1,173,022 UART: [fht] FHT @ 0x50003400
1,175,587 UART: [idev] ++
1,175,755 UART: [idev] CDI.KEYID = 6
1,176,115 UART: [idev] SUBJECT.KEYID = 7
1,176,539 UART: [idev] UDS.KEYID = 0
1,176,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,637 UART: [idev] Erasing UDS.KEYID = 0
1,201,240 UART: [idev] Sha1 KeyId Algorithm
1,209,740 UART: [idev] --
1,210,962 UART: [ldev] ++
1,211,130 UART: [ldev] CDI.KEYID = 6
1,211,493 UART: [ldev] SUBJECT.KEYID = 5
1,211,919 UART: [ldev] AUTHORITY.KEYID = 7
1,212,382 UART: [ldev] FE.KEYID = 1
1,217,532 UART: [ldev] Erasing FE.KEYID = 1
1,243,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,837 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,572 UART: [ldev] --
1,282,951 UART: [fwproc] Wait for Commands...
1,283,571 UART: [fwproc] Recv command 0x46574c44
1,284,299 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,958 UART: ROM Fatal Error: 0x000B0005
1,330,115 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,232 >>> mbox cmd response: failed
test fw_load::fw_load_blank_pub_keys ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,447,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,363,965 >>> mbox cmd response: failed
12,364,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,365,030 >>> mbox cmd response: failed
12,365,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,365,600 >>> mbox cmd response: failed
Initializing fuses
2,060,995 writing to cptra_bootfsm_go
5,501,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,333,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,447,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,375,567 >>> mbox cmd response: failed
12,376,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,376,693 >>> mbox cmd response: failed
12,376,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,377,269 >>> mbox cmd response: failed
Initializing fuses
2,066,661 writing to cptra_bootfsm_go
5,514,151 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,339,689 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,464 writing to cptra_bootfsm_go
3,774,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,580,529 >>> mbox cmd response: failed
12,581,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,581,740 >>> mbox cmd response: failed
12,582,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,314 >>> mbox cmd response: failed
Initializing fuses
2,061,725 writing to cptra_bootfsm_go
11,064,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,777,463 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,398 writing to cptra_bootfsm_go
3,777,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,587,720 >>> mbox cmd response: failed
12,588,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,588,651 >>> mbox cmd response: failed
12,588,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,589,212 >>> mbox cmd response: failed
Initializing fuses
2,060,055 writing to cptra_bootfsm_go
11,062,057 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,769,642 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
3,451,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,382,756 >>> mbox cmd response: failed
12,383,533 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,383,912 >>> mbox cmd response: failed
12,384,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,384,482 >>> mbox cmd response: failed
Initializing fuses
2,068,825 writing to cptra_bootfsm_go
5,507,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,336,954 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
3,446,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,354,181 >>> mbox cmd response: failed
12,354,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,355,162 >>> mbox cmd response: failed
12,355,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,355,737 >>> mbox cmd response: failed
Initializing fuses
2,063,222 writing to cptra_bootfsm_go
5,511,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,341,419 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,234 writing to cptra_bootfsm_go
3,785,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,589,213 >>> mbox cmd response: failed
12,589,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,590,216 >>> mbox cmd response: failed
12,590,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,590,803 >>> mbox cmd response: failed
Initializing fuses
2,064,496 writing to cptra_bootfsm_go
11,056,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,777,315 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,783,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,580,525 >>> mbox cmd response: failed
12,581,275 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,581,633 >>> mbox cmd response: failed
12,581,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,210 >>> mbox cmd response: failed
Initializing fuses
2,061,817 writing to cptra_bootfsm_go
11,061,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,773,794 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,209,964 >>> mbox cmd response: failed
1,209,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,970 >>> mbox cmd response: failed
1,209,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,706 UART: [state] LifecycleState = Unprovisioned
85,361 UART: [state] DebugLocked = No
85,959 UART: [state] WD Timer not started. Device not locked for debugging
87,224 UART: [kat] SHA2-256
890,774 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,878 UART: [kat] ++
895,030 UART: [kat] sha1
899,186 UART: [kat] SHA2-256
901,126 UART: [kat] SHA2-384
903,871 UART: [kat] SHA2-512-ACC
905,772 UART: [kat] ECC-384
915,851 UART: [kat] HMAC-384Kdf
920,357 UART: [kat] LMS
1,168,669 UART: [kat] --
1,169,576 UART: [cold-reset] ++
1,169,996 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,431 UART: [idev] Erasing UDS.KEYID = 0
1,198,463 UART: [idev] Sha1 KeyId Algorithm
1,207,399 UART: [idev] --
1,208,648 UART: [ldev] ++
1,208,816 UART: [ldev] CDI.KEYID = 6
1,209,180 UART: [ldev] SUBJECT.KEYID = 5
1,209,607 UART: [ldev] AUTHORITY.KEYID = 7
1,210,070 UART: [ldev] FE.KEYID = 1
1,215,138 UART: [ldev] Erasing FE.KEYID = 1
1,241,657 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,926 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,980 UART: [ldev] --
1,281,253 UART: [fwproc] Wait for Commands...
1,281,910 UART: [fwproc] Recv command 0x46574c44
1,282,643 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,075 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,744 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,919 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,232 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,209,554 >>> mbox cmd response: failed
1,209,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,560 >>> mbox cmd response: failed
1,209,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,209,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,669 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,019 >>> mbox cmd response: failed
1,211,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,025 >>> mbox cmd response: failed
1,211,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
87,138 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
891,883 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,987 UART: [kat] ++
896,139 UART: [kat] sha1
900,279 UART: [kat] SHA2-256
902,219 UART: [kat] SHA2-384
905,008 UART: [kat] SHA2-512-ACC
906,909 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,375 UART: [cold-reset] ++
1,170,891 UART: [fht] FHT @ 0x50003400
1,173,503 UART: [idev] ++
1,173,671 UART: [idev] CDI.KEYID = 6
1,174,032 UART: [idev] SUBJECT.KEYID = 7
1,174,457 UART: [idev] UDS.KEYID = 0
1,174,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,150 UART: [idev] Sha1 KeyId Algorithm
1,208,000 UART: [idev] --
1,209,109 UART: [ldev] ++
1,209,277 UART: [ldev] CDI.KEYID = 6
1,209,641 UART: [ldev] SUBJECT.KEYID = 5
1,210,068 UART: [ldev] AUTHORITY.KEYID = 7
1,210,531 UART: [ldev] FE.KEYID = 1
1,215,905 UART: [ldev] Erasing FE.KEYID = 1
1,242,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,575 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,431 UART: [fwproc] Recv command 0x46574c44
1,283,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,138 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,662 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,211,693 >>> mbox cmd response: failed
1,211,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,699 >>> mbox cmd response: failed
1,211,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,211,705 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,460 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,208,774 >>> mbox cmd response: failed
1,208,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,780 >>> mbox cmd response: failed
1,208,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,744 UART: [state] LifecycleState = Unprovisioned
86,399 UART: [state] DebugLocked = No
86,945 UART: [state] WD Timer not started. Device not locked for debugging
88,282 UART: [kat] SHA2-256
893,932 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,057 UART: [kat] ++
898,209 UART: [kat] sha1
902,479 UART: [kat] SHA2-256
904,419 UART: [kat] SHA2-384
907,142 UART: [kat] SHA2-512-ACC
909,043 UART: [kat] ECC-384
918,656 UART: [kat] HMAC-384Kdf
923,274 UART: [kat] LMS
1,171,602 UART: [kat] --
1,172,391 UART: [cold-reset] ++
1,172,961 UART: [fht] FHT @ 0x50003400
1,175,646 UART: [idev] ++
1,175,814 UART: [idev] CDI.KEYID = 6
1,176,174 UART: [idev] SUBJECT.KEYID = 7
1,176,598 UART: [idev] UDS.KEYID = 0
1,176,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,674 UART: [idev] Erasing UDS.KEYID = 0
1,201,231 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,613 UART: [ldev] ++
1,210,781 UART: [ldev] CDI.KEYID = 6
1,211,144 UART: [ldev] SUBJECT.KEYID = 5
1,211,570 UART: [ldev] AUTHORITY.KEYID = 7
1,212,033 UART: [ldev] FE.KEYID = 1
1,217,141 UART: [ldev] Erasing FE.KEYID = 1
1,243,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,767 UART: [ldev] --
1,283,280 UART: [fwproc] Wait for Commands...
1,283,958 UART: [fwproc] Recv command 0x46574c44
1,284,686 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,275 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,445 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,616 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,504 >>> mbox cmd response: failed
1,210,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,510 >>> mbox cmd response: failed
1,210,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,715 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,210,289 >>> mbox cmd response: failed
1,210,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,295 >>> mbox cmd response: failed
1,210,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,210,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,414 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
893,281 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,406 UART: [kat] ++
897,558 UART: [kat] sha1
901,866 UART: [kat] SHA2-256
903,806 UART: [kat] SHA2-384
906,395 UART: [kat] SHA2-512-ACC
908,296 UART: [kat] ECC-384
918,293 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,272 UART: [cold-reset] ++
1,172,614 UART: [fht] FHT @ 0x50003400
1,175,103 UART: [idev] ++
1,175,271 UART: [idev] CDI.KEYID = 6
1,175,631 UART: [idev] SUBJECT.KEYID = 7
1,176,055 UART: [idev] UDS.KEYID = 0
1,176,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,949 UART: [idev] Erasing UDS.KEYID = 0
1,200,942 UART: [idev] Sha1 KeyId Algorithm
1,209,336 UART: [idev] --
1,210,380 UART: [ldev] ++
1,210,548 UART: [ldev] CDI.KEYID = 6
1,210,911 UART: [ldev] SUBJECT.KEYID = 5
1,211,337 UART: [ldev] AUTHORITY.KEYID = 7
1,211,800 UART: [ldev] FE.KEYID = 1
1,217,148 UART: [ldev] Erasing FE.KEYID = 1
1,243,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,430 UART: [ldev] --
1,282,731 UART: [fwproc] Wait for Commands...
1,283,497 UART: [fwproc] Recv command 0x46574c44
1,284,225 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,161 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,054 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,224 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,513 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,212,893 >>> mbox cmd response: failed
1,212,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,899 >>> mbox cmd response: failed
1,212,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,212,905 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,336 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,239 UART:
192,609 UART: Running Caliptra ROM ...
193,805 UART:
193,962 UART: [state] CFI Enabled
266,914 UART: [state] LifecycleState = Unprovisioned
268,884 UART: [state] DebugLocked = No
271,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,588 UART: [kat] SHA2-256
445,272 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,787 UART: [kat] ++
456,273 UART: [kat] sha1
467,043 UART: [kat] SHA2-256
469,719 UART: [kat] SHA2-384
476,252 UART: [kat] SHA2-512-ACC
478,664 UART: [kat] ECC-384
2,767,141 UART: [kat] HMAC-384Kdf
2,779,700 UART: [kat] LMS
3,970,036 UART: [kat] --
3,975,435 UART: [cold-reset] ++
3,977,752 UART: [fht] Storing FHT @ 0x50003400
3,989,781 UART: [idev] ++
3,990,389 UART: [idev] CDI.KEYID = 6
3,991,283 UART: [idev] SUBJECT.KEYID = 7
3,992,563 UART: [idev] UDS.KEYID = 0
3,995,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,755 UART: [idev] Erasing UDS.KEYID = 0
7,324,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,482 UART: [idev] --
7,350,574 UART: [ldev] ++
7,351,178 UART: [ldev] CDI.KEYID = 6
7,352,071 UART: [ldev] SUBJECT.KEYID = 5
7,353,298 UART: [ldev] AUTHORITY.KEYID = 7
7,354,593 UART: [ldev] FE.KEYID = 1
7,382,684 UART: [ldev] Erasing FE.KEYID = 1
10,716,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,091,805 UART: [ldev] --
13,096,907 UART: [fwproc] Waiting for Commands...
13,098,912 UART: [fwproc] Received command 0x46574c44
13,101,104 UART: [fwproc] Received Image of size 118548 bytes
16,053,201 UART: ROM Fatal Error: 0x000B0014
16,056,668 >>> mbox cmd response: failed
16,057,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,057,468 >>> mbox cmd response: failed
16,057,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,058,053 >>> mbox cmd response: failed
Initializing fuses
2,053,891 writing to cptra_bootfsm_go
2,243,218 UART:
2,243,556 UART: Running Caliptra ROM ...
2,244,606 UART:
2,244,763 UART: [state] CFI Enabled
2,302,133 UART: [state] LifecycleState = Unprovisioned
2,304,075 UART: [state] DebugLocked = No
2,305,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,367 UART: [kat] SHA2-256
2,481,055 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,491,593 UART: [kat] ++
2,492,055 UART: [kat] sha1
2,501,726 UART: [kat] SHA2-256
2,504,424 UART: [kat] SHA2-384
2,508,585 UART: [kat] SHA2-512-ACC
2,510,940 UART: [kat] ECC-384
4,804,549 UART: [kat] HMAC-384Kdf
4,835,418 UART: [kat] LMS
6,025,727 UART: [kat] --
6,030,014 UART: [cold-reset] ++
6,031,144 UART: [fht] Storing FHT @ 0x50003400
6,043,714 UART: [idev] ++
6,044,279 UART: [idev] CDI.KEYID = 6
6,045,162 UART: [idev] SUBJECT.KEYID = 7
6,046,436 UART: [idev] UDS.KEYID = 0
6,048,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,197,917 UART: [idev] Erasing UDS.KEYID = 0
9,381,403 UART: [idev] Using Sha1 for KeyId Algorithm
9,404,264 UART: [idev] --
9,409,724 UART: [ldev] ++
9,410,302 UART: [ldev] CDI.KEYID = 6
9,411,270 UART: [ldev] SUBJECT.KEYID = 5
9,412,480 UART: [ldev] AUTHORITY.KEYID = 7
9,413,720 UART: [ldev] FE.KEYID = 1
9,457,571 UART: [ldev] Erasing FE.KEYID = 1
12,786,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,114,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,472 UART: [ldev] --
15,151,349 UART: [fwproc] Waiting for Commands...
15,153,886 UART: [fwproc] Received command 0x46574c44
15,156,075 UART: [fwproc] Received Image of size 118548 bytes
19,262,586 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,338,251 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,411,445 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,739,301 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,806,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,853,244 >>> mbox cmd response: failed
15,853,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,251 >>> mbox cmd response: failed
15,854,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,854,778 >>> mbox cmd response: failed
Initializing fuses
2,050,539 writing to cptra_bootfsm_go
5,850,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,000,592 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,245 writing to cptra_bootfsm_go
192,560 UART:
192,932 UART: Running Caliptra ROM ...
194,061 UART:
603,566 UART: [state] CFI Enabled
617,668 UART: [state] LifecycleState = Unprovisioned
619,561 UART: [state] DebugLocked = No
622,518 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,860 UART: [kat] SHA2-256
797,616 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,160 UART: [kat] ++
808,697 UART: [kat] sha1
819,750 UART: [kat] SHA2-256
822,492 UART: [kat] SHA2-384
828,485 UART: [kat] SHA2-512-ACC
830,872 UART: [kat] ECC-384
3,115,301 UART: [kat] HMAC-384Kdf
3,128,129 UART: [kat] LMS
4,318,242 UART: [kat] --
4,321,879 UART: [cold-reset] ++
4,322,795 UART: [fht] Storing FHT @ 0x50003400
4,332,935 UART: [idev] ++
4,333,511 UART: [idev] CDI.KEYID = 6
4,334,486 UART: [idev] SUBJECT.KEYID = 7
4,335,728 UART: [idev] UDS.KEYID = 0
4,338,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,656 UART: [idev] Erasing UDS.KEYID = 0
7,624,988 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,157 UART: [idev] --
7,650,703 UART: [ldev] ++
7,651,292 UART: [ldev] CDI.KEYID = 6
7,652,322 UART: [ldev] SUBJECT.KEYID = 5
7,653,488 UART: [ldev] AUTHORITY.KEYID = 7
7,654,727 UART: [ldev] FE.KEYID = 1
7,664,897 UART: [ldev] Erasing FE.KEYID = 1
10,951,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,605 UART: [ldev] --
13,312,511 UART: [fwproc] Waiting for Commands...
13,314,946 UART: [fwproc] Received command 0x46574c44
13,317,195 UART: [fwproc] Received Image of size 118548 bytes
16,275,247 UART: ROM Fatal Error: 0x000B0014
16,278,714 >>> mbox cmd response: failed
16,279,125 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,279,483 >>> mbox cmd response: failed
16,279,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,280,055 >>> mbox cmd response: failed
Initializing fuses
2,056,414 writing to cptra_bootfsm_go
2,245,721 UART:
2,246,091 UART: Running Caliptra ROM ...
2,247,153 UART:
4,191,966 UART: [state] CFI Enabled
4,208,283 UART: [state] LifecycleState = Unprovisioned
4,210,202 UART: [state] DebugLocked = No
4,211,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,216,315 UART: [kat] SHA2-256
4,386,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,396,607 UART: [kat] ++
4,397,073 UART: [kat] sha1
4,407,213 UART: [kat] SHA2-256
4,409,915 UART: [kat] SHA2-384
4,415,594 UART: [kat] SHA2-512-ACC
4,417,952 UART: [kat] ECC-384
6,702,097 UART: [kat] HMAC-384Kdf
6,713,212 UART: [kat] LMS
7,903,326 UART: [kat] --
7,907,317 UART: [cold-reset] ++
7,909,341 UART: [fht] Storing FHT @ 0x50003400
7,920,890 UART: [idev] ++
7,921,465 UART: [idev] CDI.KEYID = 6
7,922,440 UART: [idev] SUBJECT.KEYID = 7
7,923,662 UART: [idev] UDS.KEYID = 0
7,926,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,075,001 UART: [idev] Erasing UDS.KEYID = 0
11,214,757 UART: [idev] Using Sha1 for KeyId Algorithm
11,235,948 UART: [idev] --
11,240,282 UART: [ldev] ++
11,240,864 UART: [ldev] CDI.KEYID = 6
11,241,833 UART: [ldev] SUBJECT.KEYID = 5
11,243,095 UART: [ldev] AUTHORITY.KEYID = 7
11,244,286 UART: [ldev] FE.KEYID = 1
11,253,182 UART: [ldev] Erasing FE.KEYID = 1
14,542,125 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,832,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,847,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,861,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,876,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,895,413 UART: [ldev] --
16,900,738 UART: [fwproc] Waiting for Commands...
16,903,067 UART: [fwproc] Received command 0x46574c44
16,905,262 UART: [fwproc] Received Image of size 118548 bytes
21,018,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,092,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,165,714 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,493,936 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
4,127,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,050,596 >>> mbox cmd response: failed
16,051,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,051,698 >>> mbox cmd response: failed
16,051,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,052,325 >>> mbox cmd response: failed
Initializing fuses
2,049,947 writing to cptra_bootfsm_go
7,940,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,971,790 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
192,211 UART:
192,586 UART: Running Caliptra ROM ...
193,703 UART:
193,856 UART: [state] CFI Enabled
267,467 UART: [state] LifecycleState = Unprovisioned
269,411 UART: [state] DebugLocked = No
271,347 UART: [state] WD Timer not started. Device not locked for debugging
274,387 UART: [kat] SHA2-256
454,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,805 UART: [kat] ++
465,411 UART: [kat] sha1
476,947 UART: [kat] SHA2-256
479,633 UART: [kat] SHA2-384
485,457 UART: [kat] SHA2-512-ACC
487,820 UART: [kat] ECC-384
2,950,276 UART: [kat] HMAC-384Kdf
2,971,336 UART: [kat] LMS
3,447,863 UART: [kat] --
3,453,970 UART: [cold-reset] ++
3,455,906 UART: [fht] FHT @ 0x50003400
3,468,669 UART: [idev] ++
3,469,245 UART: [idev] CDI.KEYID = 6
3,470,213 UART: [idev] SUBJECT.KEYID = 7
3,471,431 UART: [idev] UDS.KEYID = 0
3,474,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,623,885 UART: [idev] Erasing UDS.KEYID = 0
5,984,754 UART: [idev] Sha1 KeyId Algorithm
6,008,159 UART: [idev] --
6,013,623 UART: [ldev] ++
6,014,200 UART: [ldev] CDI.KEYID = 6
6,015,141 UART: [ldev] SUBJECT.KEYID = 5
6,016,314 UART: [ldev] AUTHORITY.KEYID = 7
6,017,615 UART: [ldev] FE.KEYID = 1
6,057,422 UART: [ldev] Erasing FE.KEYID = 1
8,565,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,596 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,883 UART: [ldev] --
10,372,729 UART: [fwproc] Wait for Commands...
10,375,033 UART: [fwproc] Recv command 0x46574c44
10,377,039 UART: [fwproc] Recv'd Img size: 118548 bytes
12,698,697 UART: ROM Fatal Error: 0x000B0014
12,701,925 >>> mbox cmd response: failed
12,702,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,702,619 >>> mbox cmd response: failed
12,702,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,220 >>> mbox cmd response: failed
Initializing fuses
2,059,569 writing to cptra_bootfsm_go
2,248,892 UART:
2,249,243 UART: Running Caliptra ROM ...
2,250,381 UART:
2,250,555 UART: [state] CFI Enabled
2,321,443 UART: [state] LifecycleState = Unprovisioned
2,323,386 UART: [state] DebugLocked = No
2,324,953 UART: [state] WD Timer not started. Device not locked for debugging
2,328,973 UART: [kat] SHA2-256
2,508,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,406 UART: [kat] ++
2,519,954 UART: [kat] sha1
2,531,555 UART: [kat] SHA2-256
2,534,254 UART: [kat] SHA2-384
2,540,037 UART: [kat] SHA2-512-ACC
2,542,400 UART: [kat] ECC-384
5,005,180 UART: [kat] HMAC-384Kdf
5,025,580 UART: [kat] LMS
5,502,090 UART: [kat] --
5,506,746 UART: [cold-reset] ++
5,508,687 UART: [fht] FHT @ 0x50003400
5,519,935 UART: [idev] ++
5,520,514 UART: [idev] CDI.KEYID = 6
5,521,485 UART: [idev] SUBJECT.KEYID = 7
5,522,705 UART: [idev] UDS.KEYID = 0
5,525,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,180 UART: [idev] Erasing UDS.KEYID = 0
8,041,845 UART: [idev] Sha1 KeyId Algorithm
8,064,183 UART: [idev] --
8,069,652 UART: [ldev] ++
8,070,273 UART: [ldev] CDI.KEYID = 6
8,071,197 UART: [ldev] SUBJECT.KEYID = 5
8,072,367 UART: [ldev] AUTHORITY.KEYID = 7
8,073,609 UART: [ldev] FE.KEYID = 1
8,112,361 UART: [ldev] Erasing FE.KEYID = 1
10,621,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,292 UART: [ldev] --
12,429,556 UART: [fwproc] Wait for Commands...
12,431,291 UART: [fwproc] Recv command 0x46574c44
12,433,288 UART: [fwproc] Recv'd Img size: 118548 bytes
15,919,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,002,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,075,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,403,549 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
3,462,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,599,864 >>> mbox cmd response: failed
12,600,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,600,875 >>> mbox cmd response: failed
12,601,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,601,451 >>> mbox cmd response: failed
Initializing fuses
2,065,922 writing to cptra_bootfsm_go
5,513,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,297,017 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,498 UART:
192,868 UART: Running Caliptra ROM ...
193,951 UART:
603,737 UART: [state] CFI Enabled
615,764 UART: [state] LifecycleState = Unprovisioned
617,715 UART: [state] DebugLocked = No
619,974 UART: [state] WD Timer not started. Device not locked for debugging
623,176 UART: [kat] SHA2-256
802,856 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,607 UART: [kat] ++
814,089 UART: [kat] sha1
824,595 UART: [kat] SHA2-256
827,292 UART: [kat] SHA2-384
832,680 UART: [kat] SHA2-512-ACC
835,078 UART: [kat] ECC-384
3,276,806 UART: [kat] HMAC-384Kdf
3,288,613 UART: [kat] LMS
3,765,078 UART: [kat] --
3,770,288 UART: [cold-reset] ++
3,772,068 UART: [fht] FHT @ 0x50003400
3,783,033 UART: [idev] ++
3,783,608 UART: [idev] CDI.KEYID = 6
3,784,545 UART: [idev] SUBJECT.KEYID = 7
3,785,819 UART: [idev] UDS.KEYID = 0
3,788,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,724 UART: [idev] Erasing UDS.KEYID = 0
6,265,787 UART: [idev] Sha1 KeyId Algorithm
6,288,690 UART: [idev] --
6,293,579 UART: [ldev] ++
6,294,168 UART: [ldev] CDI.KEYID = 6
6,295,087 UART: [ldev] SUBJECT.KEYID = 5
6,296,313 UART: [ldev] AUTHORITY.KEYID = 7
6,297,551 UART: [ldev] FE.KEYID = 1
6,311,933 UART: [ldev] Erasing FE.KEYID = 1
8,791,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,529 UART: [ldev] --
10,586,152 UART: [fwproc] Wait for Commands...
10,588,847 UART: [fwproc] Recv command 0x46574c44
10,590,837 UART: [fwproc] Recv'd Img size: 118548 bytes
12,921,498 UART: ROM Fatal Error: 0x000B0014
12,924,727 >>> mbox cmd response: failed
12,925,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,925,705 >>> mbox cmd response: failed
12,926,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,345 >>> mbox cmd response: failed
Initializing fuses
2,059,692 writing to cptra_bootfsm_go
2,248,992 UART:
2,249,332 UART: Running Caliptra ROM ...
2,250,385 UART:
7,545,045 UART: [state] CFI Enabled
7,557,920 UART: [state] LifecycleState = Unprovisioned
7,559,841 UART: [state] DebugLocked = No
7,561,962 UART: [state] WD Timer not started. Device not locked for debugging
7,565,449 UART: [kat] SHA2-256
7,745,104 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,755,906 UART: [kat] ++
7,756,368 UART: [kat] sha1
7,768,124 UART: [kat] SHA2-256
7,770,810 UART: [kat] SHA2-384
7,778,271 UART: [kat] SHA2-512-ACC
7,780,660 UART: [kat] ECC-384
10,222,538 UART: [kat] HMAC-384Kdf
10,235,517 UART: [kat] LMS
10,712,003 UART: [kat] --
10,715,781 UART: [cold-reset] ++
10,716,744 UART: [fht] FHT @ 0x50003400
10,728,809 UART: [idev] ++
10,729,408 UART: [idev] CDI.KEYID = 6
10,730,329 UART: [idev] SUBJECT.KEYID = 7
10,731,550 UART: [idev] UDS.KEYID = 0
10,734,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,883,372 UART: [idev] Erasing UDS.KEYID = 0
13,205,259 UART: [idev] Sha1 KeyId Algorithm
13,230,117 UART: [idev] --
13,236,165 UART: [ldev] ++
13,236,790 UART: [ldev] CDI.KEYID = 6
13,237,697 UART: [ldev] SUBJECT.KEYID = 5
13,238,918 UART: [ldev] AUTHORITY.KEYID = 7
13,240,105 UART: [ldev] FE.KEYID = 1
13,251,972 UART: [ldev] Erasing FE.KEYID = 1
15,729,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,451,297 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,467,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,483,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,498,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,520,198 UART: [ldev] --
17,524,806 UART: [fwproc] Wait for Commands...
17,526,496 UART: [fwproc] Recv command 0x46574c44
17,528,497 UART: [fwproc] Recv'd Img size: 118548 bytes
21,006,247 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,085,372 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,158,389 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,486,140 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
3,777,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,800,011 >>> mbox cmd response: failed
12,800,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,800,920 >>> mbox cmd response: failed
12,801,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,801,499 >>> mbox cmd response: failed
Initializing fuses
2,066,166 writing to cptra_bootfsm_go
10,854,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,512,155 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
192,032 UART:
192,426 UART: Running Caliptra ROM ...
193,556 UART:
193,707 UART: [state] CFI Enabled
265,020 UART: [state] LifecycleState = Unprovisioned
267,434 UART: [state] DebugLocked = No
270,251 UART: [state] WD Timer not started. Device not locked for debugging
274,532 UART: [kat] SHA2-256
464,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,180 UART: [kat] ++
475,632 UART: [kat] sha1
486,728 UART: [kat] SHA2-256
489,747 UART: [kat] SHA2-384
495,402 UART: [kat] SHA2-512-ACC
498,016 UART: [kat] ECC-384
2,950,184 UART: [kat] HMAC-384Kdf
2,973,532 UART: [kat] LMS
3,505,283 UART: [kat] --
3,508,621 UART: [cold-reset] ++
3,510,567 UART: [fht] FHT @ 0x50003400
3,521,554 UART: [idev] ++
3,522,237 UART: [idev] CDI.KEYID = 6
3,523,261 UART: [idev] SUBJECT.KEYID = 7
3,524,431 UART: [idev] UDS.KEYID = 0
3,527,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,918 UART: [idev] Erasing UDS.KEYID = 0
6,028,288 UART: [idev] Sha1 KeyId Algorithm
6,050,568 UART: [idev] --
6,056,767 UART: [ldev] ++
6,057,465 UART: [ldev] CDI.KEYID = 6
6,058,360 UART: [ldev] SUBJECT.KEYID = 5
6,059,473 UART: [ldev] AUTHORITY.KEYID = 7
6,060,766 UART: [ldev] FE.KEYID = 1
6,100,256 UART: [ldev] Erasing FE.KEYID = 1
8,608,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,140 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,571 UART: [ldev] --
10,414,737 UART: [fwproc] Wait for Commands...
10,417,538 UART: [fwproc] Recv command 0x46574c44
10,419,798 UART: [fwproc] Recv'd Img size: 118548 bytes
12,754,335 UART: ROM Fatal Error: 0x000B0014
12,758,022 >>> mbox cmd response: failed
12,758,377 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,758,646 >>> mbox cmd response: failed
12,758,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,759,204 >>> mbox cmd response: failed
Initializing fuses
2,067,024 writing to cptra_bootfsm_go
2,256,344 UART:
2,256,697 UART: Running Caliptra ROM ...
2,257,745 UART:
2,257,903 UART: [state] CFI Enabled
2,326,851 UART: [state] LifecycleState = Unprovisioned
2,329,224 UART: [state] DebugLocked = No
2,331,217 UART: [state] WD Timer not started. Device not locked for debugging
2,335,620 UART: [kat] SHA2-256
2,525,502 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,236 UART: [kat] ++
2,536,784 UART: [kat] sha1
2,549,375 UART: [kat] SHA2-256
2,552,397 UART: [kat] SHA2-384
2,558,390 UART: [kat] SHA2-512-ACC
2,561,008 UART: [kat] ECC-384
5,012,947 UART: [kat] HMAC-384Kdf
5,036,523 UART: [kat] LMS
5,568,264 UART: [kat] --
5,574,014 UART: [cold-reset] ++
5,575,325 UART: [fht] FHT @ 0x50003400
5,585,987 UART: [idev] ++
5,586,669 UART: [idev] CDI.KEYID = 6
5,587,609 UART: [idev] SUBJECT.KEYID = 7
5,588,878 UART: [idev] UDS.KEYID = 0
5,591,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,282 UART: [idev] Erasing UDS.KEYID = 0
8,095,039 UART: [idev] Sha1 KeyId Algorithm
8,116,273 UART: [idev] --
8,121,304 UART: [ldev] ++
8,121,994 UART: [ldev] CDI.KEYID = 6
8,122,880 UART: [ldev] SUBJECT.KEYID = 5
8,123,989 UART: [ldev] AUTHORITY.KEYID = 7
8,125,245 UART: [ldev] FE.KEYID = 1
8,163,710 UART: [ldev] Erasing FE.KEYID = 1
10,673,031 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,524 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,471,868 UART: [ldev] --
12,476,916 UART: [fwproc] Wait for Commands...
12,478,529 UART: [fwproc] Recv command 0x46574c44
12,481,044 UART: [fwproc] Recv'd Img size: 118548 bytes
15,975,511 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,172,247 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,731,752 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
3,443,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,670,706 >>> mbox cmd response: failed
12,671,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,671,634 >>> mbox cmd response: failed
12,671,906 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,202 >>> mbox cmd response: failed
Initializing fuses
2,055,592 writing to cptra_bootfsm_go
5,483,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,868,027 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,230 writing to cptra_bootfsm_go
192,537 UART:
192,890 UART: Running Caliptra ROM ...
194,075 UART:
603,532 UART: [state] CFI Enabled
617,366 UART: [state] LifecycleState = Unprovisioned
619,705 UART: [state] DebugLocked = No
622,548 UART: [state] WD Timer not started. Device not locked for debugging
627,483 UART: [kat] SHA2-256
817,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,104 UART: [kat] ++
828,722 UART: [kat] sha1
840,156 UART: [kat] SHA2-256
843,170 UART: [kat] SHA2-384
848,395 UART: [kat] SHA2-512-ACC
851,021 UART: [kat] ECC-384
3,291,872 UART: [kat] HMAC-384Kdf
3,304,986 UART: [kat] LMS
3,836,845 UART: [kat] --
3,840,408 UART: [cold-reset] ++
3,842,755 UART: [fht] FHT @ 0x50003400
3,854,778 UART: [idev] ++
3,855,463 UART: [idev] CDI.KEYID = 6
3,856,434 UART: [idev] SUBJECT.KEYID = 7
3,857,653 UART: [idev] UDS.KEYID = 0
3,860,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,276 UART: [idev] Erasing UDS.KEYID = 0
6,333,879 UART: [idev] Sha1 KeyId Algorithm
6,357,027 UART: [idev] --
6,361,953 UART: [ldev] ++
6,362,651 UART: [ldev] CDI.KEYID = 6
6,363,538 UART: [ldev] SUBJECT.KEYID = 5
6,364,757 UART: [ldev] AUTHORITY.KEYID = 7
6,365,993 UART: [ldev] FE.KEYID = 1
6,376,482 UART: [ldev] Erasing FE.KEYID = 1
8,858,416 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,882 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,946 UART: [ldev] --
10,650,337 UART: [fwproc] Wait for Commands...
10,652,388 UART: [fwproc] Recv command 0x46574c44
10,654,679 UART: [fwproc] Recv'd Img size: 118548 bytes
12,981,196 UART: ROM Fatal Error: 0x000B0014
12,984,873 >>> mbox cmd response: failed
12,985,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,985,558 >>> mbox cmd response: failed
12,985,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,986,166 >>> mbox cmd response: failed
Initializing fuses
2,059,185 writing to cptra_bootfsm_go
2,248,527 UART:
2,248,874 UART: Running Caliptra ROM ...
2,250,016 UART:
7,488,666 UART: [state] CFI Enabled
7,503,360 UART: [state] LifecycleState = Unprovisioned
7,505,752 UART: [state] DebugLocked = No
7,508,239 UART: [state] WD Timer not started. Device not locked for debugging
7,512,720 UART: [kat] SHA2-256
7,702,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,713,346 UART: [kat] ++
7,713,896 UART: [kat] sha1
7,726,255 UART: [kat] SHA2-256
7,729,298 UART: [kat] SHA2-384
7,736,391 UART: [kat] SHA2-512-ACC
7,739,003 UART: [kat] ECC-384
10,181,336 UART: [kat] HMAC-384Kdf
10,194,427 UART: [kat] LMS
10,726,264 UART: [kat] --
10,730,689 UART: [cold-reset] ++
10,731,540 UART: [fht] FHT @ 0x50003400
10,742,653 UART: [idev] ++
10,743,340 UART: [idev] CDI.KEYID = 6
10,744,364 UART: [idev] SUBJECT.KEYID = 7
10,745,528 UART: [idev] UDS.KEYID = 0
10,747,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,897,386 UART: [idev] Erasing UDS.KEYID = 0
13,222,221 UART: [idev] Sha1 KeyId Algorithm
13,245,080 UART: [idev] --
13,249,620 UART: [ldev] ++
13,250,300 UART: [ldev] CDI.KEYID = 6
13,251,187 UART: [ldev] SUBJECT.KEYID = 5
13,252,620 UART: [ldev] AUTHORITY.KEYID = 7
13,253,817 UART: [ldev] FE.KEYID = 1
13,265,036 UART: [ldev] Erasing FE.KEYID = 1
15,746,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,463,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,479,087 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,494,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,509,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,529,612 UART: [ldev] --
17,535,640 UART: [fwproc] Wait for Commands...
17,538,666 UART: [fwproc] Recv command 0x46574c44
17,540,936 UART: [fwproc] Recv'd Img size: 118548 bytes
21,038,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,114,809 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,238,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,799,468 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
3,757,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,880,700 >>> mbox cmd response: failed
12,881,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,881,579 >>> mbox cmd response: failed
12,881,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,882,160 >>> mbox cmd response: failed
Initializing fuses
2,059,977 writing to cptra_bootfsm_go
10,743,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,028,860 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,988 UART: [state] LifecycleState = Unprovisioned
85,643 UART: [state] DebugLocked = No
86,213 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,787 UART: [kat] SHA2-256
881,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,833 UART: [kat] ++
885,985 UART: [kat] sha1
890,203 UART: [kat] SHA2-256
892,141 UART: [kat] SHA2-384
894,784 UART: [kat] SHA2-512-ACC
896,685 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
906,914 UART: [kat] LMS
1,475,110 UART: [kat] --
1,475,923 UART: [cold-reset] ++
1,476,281 UART: [fht] Storing FHT @ 0x50003400
1,478,974 UART: [idev] ++
1,479,142 UART: [idev] CDI.KEYID = 6
1,479,502 UART: [idev] SUBJECT.KEYID = 7
1,479,926 UART: [idev] UDS.KEYID = 0
1,480,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,276 UART: [idev] Erasing UDS.KEYID = 0
1,504,266 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,956 UART: [idev] --
1,513,925 UART: [ldev] ++
1,514,093 UART: [ldev] CDI.KEYID = 6
1,514,456 UART: [ldev] SUBJECT.KEYID = 5
1,514,882 UART: [ldev] AUTHORITY.KEYID = 7
1,515,345 UART: [ldev] FE.KEYID = 1
1,520,519 UART: [ldev] Erasing FE.KEYID = 1
1,545,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,048 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,760 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,826 UART: [ldev] --
1,585,121 UART: [fwproc] Waiting for Commands...
1,585,788 UART: [fwproc] Received command 0x46574c44
1,586,579 UART: [fwproc] Received Image of size 118548 bytes
1,866,398 UART: ROM Fatal Error: 0x000B0014
1,867,555 >>> mbox cmd response: failed
1,867,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,561 >>> mbox cmd response: failed
1,867,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,081 UART: [kat] SHA2-256
882,012 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,127 UART: [kat] ++
886,279 UART: [kat] sha1
890,457 UART: [kat] SHA2-256
892,395 UART: [kat] SHA2-384
895,294 UART: [kat] SHA2-512-ACC
897,195 UART: [kat] ECC-384
902,964 UART: [kat] HMAC-384Kdf
907,518 UART: [kat] LMS
1,475,714 UART: [kat] --
1,476,653 UART: [cold-reset] ++
1,477,115 UART: [fht] Storing FHT @ 0x50003400
1,479,954 UART: [idev] ++
1,480,122 UART: [idev] CDI.KEYID = 6
1,480,482 UART: [idev] SUBJECT.KEYID = 7
1,480,906 UART: [idev] UDS.KEYID = 0
1,481,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,038 UART: [idev] Erasing UDS.KEYID = 0
1,505,914 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,454 UART: [idev] --
1,515,323 UART: [ldev] ++
1,515,491 UART: [ldev] CDI.KEYID = 6
1,515,854 UART: [ldev] SUBJECT.KEYID = 5
1,516,280 UART: [ldev] AUTHORITY.KEYID = 7
1,516,743 UART: [ldev] FE.KEYID = 1
1,521,763 UART: [ldev] Erasing FE.KEYID = 1
1,547,406 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,562 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,594 UART: [ldev] --
1,587,001 UART: [fwproc] Waiting for Commands...
1,587,828 UART: [fwproc] Received command 0x46574c44
1,588,619 UART: [fwproc] Received Image of size 118548 bytes
2,932,522 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,436 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,654 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,885 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,944 >>> mbox cmd response: failed
1,719,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,950 >>> mbox cmd response: failed
1,719,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,063 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,754 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,804 UART: [kat] SHA2-256
892,742 UART: [kat] SHA2-384
895,719 UART: [kat] SHA2-512-ACC
897,620 UART: [kat] ECC-384
903,255 UART: [kat] HMAC-384Kdf
907,933 UART: [kat] LMS
1,476,129 UART: [kat] --
1,477,154 UART: [cold-reset] ++
1,477,556 UART: [fht] Storing FHT @ 0x50003400
1,480,205 UART: [idev] ++
1,480,373 UART: [idev] CDI.KEYID = 6
1,480,733 UART: [idev] SUBJECT.KEYID = 7
1,481,157 UART: [idev] UDS.KEYID = 0
1,481,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,525 UART: [idev] Erasing UDS.KEYID = 0
1,506,241 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,697 UART: [idev] --
1,515,738 UART: [ldev] ++
1,515,906 UART: [ldev] CDI.KEYID = 6
1,516,269 UART: [ldev] SUBJECT.KEYID = 5
1,516,695 UART: [ldev] AUTHORITY.KEYID = 7
1,517,158 UART: [ldev] FE.KEYID = 1
1,522,534 UART: [ldev] Erasing FE.KEYID = 1
1,547,987 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,315 UART: [ldev] --
1,587,672 UART: [fwproc] Waiting for Commands...
1,588,511 UART: [fwproc] Received command 0x46574c44
1,589,302 UART: [fwproc] Received Image of size 118548 bytes
1,869,203 UART: ROM Fatal Error: 0x000B0014
1,870,360 >>> mbox cmd response: failed
1,870,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,366 >>> mbox cmd response: failed
1,870,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,373 UART: [kat] SHA2-512-ACC
897,274 UART: [kat] ECC-384
903,099 UART: [kat] HMAC-384Kdf
907,753 UART: [kat] LMS
1,475,949 UART: [kat] --
1,476,754 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,480,021 UART: [idev] ++
1,480,189 UART: [idev] CDI.KEYID = 6
1,480,549 UART: [idev] SUBJECT.KEYID = 7
1,480,973 UART: [idev] UDS.KEYID = 0
1,481,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,609 UART: [idev] Erasing UDS.KEYID = 0
1,505,623 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,309 UART: [idev] --
1,515,512 UART: [ldev] ++
1,515,680 UART: [ldev] CDI.KEYID = 6
1,516,043 UART: [ldev] SUBJECT.KEYID = 5
1,516,469 UART: [ldev] AUTHORITY.KEYID = 7
1,516,932 UART: [ldev] FE.KEYID = 1
1,522,294 UART: [ldev] Erasing FE.KEYID = 1
1,547,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,899 UART: [ldev] --
1,587,382 UART: [fwproc] Waiting for Commands...
1,588,099 UART: [fwproc] Received command 0x46574c44
1,588,890 UART: [fwproc] Received Image of size 118548 bytes
2,932,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,081 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,299 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,526 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,139 >>> mbox cmd response: failed
1,721,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,145 >>> mbox cmd response: failed
1,721,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,151 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,076 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,672 UART: [kat] SHA2-256
891,222 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,326 UART: [kat] ++
895,478 UART: [kat] sha1
899,624 UART: [kat] SHA2-256
901,564 UART: [kat] SHA2-384
904,281 UART: [kat] SHA2-512-ACC
906,182 UART: [kat] ECC-384
915,783 UART: [kat] HMAC-384Kdf
920,579 UART: [kat] LMS
1,168,891 UART: [kat] --
1,169,778 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,174,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,199,033 UART: [idev] Sha1 KeyId Algorithm
1,208,019 UART: [idev] --
1,209,186 UART: [ldev] ++
1,209,354 UART: [ldev] CDI.KEYID = 6
1,209,718 UART: [ldev] SUBJECT.KEYID = 5
1,210,145 UART: [ldev] AUTHORITY.KEYID = 7
1,210,608 UART: [ldev] FE.KEYID = 1
1,215,866 UART: [ldev] Erasing FE.KEYID = 1
1,241,837 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,041 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,826 UART: [ldev] --
1,281,189 UART: [fwproc] Wait for Commands...
1,281,918 UART: [fwproc] Recv command 0x46574c44
1,282,651 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,448 UART: ROM Fatal Error: 0x000B0014
1,562,605 >>> mbox cmd response: failed
1,562,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,611 >>> mbox cmd response: failed
1,562,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,680 UART: [state] LifecycleState = Unprovisioned
86,335 UART: [state] DebugLocked = No
87,051 UART: [state] WD Timer not started. Device not locked for debugging
88,184 UART: [kat] SHA2-256
891,734 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,838 UART: [kat] ++
895,990 UART: [kat] sha1
900,118 UART: [kat] SHA2-256
902,058 UART: [kat] SHA2-384
904,723 UART: [kat] SHA2-512-ACC
906,624 UART: [kat] ECC-384
916,991 UART: [kat] HMAC-384Kdf
921,517 UART: [kat] LMS
1,169,829 UART: [kat] --
1,170,718 UART: [cold-reset] ++
1,171,124 UART: [fht] FHT @ 0x50003400
1,173,914 UART: [idev] ++
1,174,082 UART: [idev] CDI.KEYID = 6
1,174,443 UART: [idev] SUBJECT.KEYID = 7
1,174,868 UART: [idev] UDS.KEYID = 0
1,175,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,917 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,292 UART: [ldev] Erasing FE.KEYID = 1
1,241,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,254 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,106 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,206 UART: [fwproc] Recv command 0x46574c44
1,281,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,065 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,794 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,969 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,310 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,500 >>> mbox cmd response: failed
1,418,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,506 >>> mbox cmd response: failed
1,418,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,353 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
891,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,753 UART: [kat] ++
895,905 UART: [kat] sha1
900,181 UART: [kat] SHA2-256
902,121 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,401 UART: [cold-reset] ++
1,170,933 UART: [fht] FHT @ 0x50003400
1,173,675 UART: [idev] ++
1,173,843 UART: [idev] CDI.KEYID = 6
1,174,204 UART: [idev] SUBJECT.KEYID = 7
1,174,629 UART: [idev] UDS.KEYID = 0
1,174,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,298 UART: [idev] Erasing UDS.KEYID = 0
1,199,872 UART: [idev] Sha1 KeyId Algorithm
1,208,734 UART: [idev] --
1,209,791 UART: [ldev] ++
1,209,959 UART: [ldev] CDI.KEYID = 6
1,210,323 UART: [ldev] SUBJECT.KEYID = 5
1,210,750 UART: [ldev] AUTHORITY.KEYID = 7
1,211,213 UART: [ldev] FE.KEYID = 1
1,216,601 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,442 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,047 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,759 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,849 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,957 UART: [fwproc] Recv command 0x46574c44
1,283,690 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,151 UART: ROM Fatal Error: 0x000B0014
1,563,308 >>> mbox cmd response: failed
1,563,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,314 >>> mbox cmd response: failed
1,563,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,320 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,557 UART: [state] LifecycleState = Unprovisioned
86,212 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
899,865 UART: [kat] SHA2-256
901,805 UART: [kat] SHA2-384
904,396 UART: [kat] SHA2-512-ACC
906,297 UART: [kat] ECC-384
916,254 UART: [kat] HMAC-384Kdf
920,936 UART: [kat] LMS
1,169,248 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,427 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,174,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,194 UART: [idev] Erasing UDS.KEYID = 0
1,199,586 UART: [idev] Sha1 KeyId Algorithm
1,208,590 UART: [idev] --
1,209,391 UART: [ldev] ++
1,209,559 UART: [ldev] CDI.KEYID = 6
1,209,923 UART: [ldev] SUBJECT.KEYID = 5
1,210,350 UART: [ldev] AUTHORITY.KEYID = 7
1,210,813 UART: [ldev] FE.KEYID = 1
1,216,047 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,663 UART: [ldev] --
1,282,082 UART: [fwproc] Wait for Commands...
1,282,807 UART: [fwproc] Recv command 0x46574c44
1,283,540 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,982 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,664 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,837 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,301 >>> mbox cmd response: failed
1,419,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,307 >>> mbox cmd response: failed
1,419,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,618 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,605 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
901,993 UART: [kat] SHA2-256
903,933 UART: [kat] SHA2-384
906,686 UART: [kat] SHA2-512-ACC
908,587 UART: [kat] ECC-384
917,940 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,799 UART: [cold-reset] ++
1,172,301 UART: [fht] FHT @ 0x50003400
1,174,844 UART: [idev] ++
1,175,012 UART: [idev] CDI.KEYID = 6
1,175,372 UART: [idev] SUBJECT.KEYID = 7
1,175,796 UART: [idev] UDS.KEYID = 0
1,176,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,850 UART: [idev] Erasing UDS.KEYID = 0
1,200,951 UART: [idev] Sha1 KeyId Algorithm
1,209,315 UART: [idev] --
1,210,465 UART: [ldev] ++
1,210,633 UART: [ldev] CDI.KEYID = 6
1,210,996 UART: [ldev] SUBJECT.KEYID = 5
1,211,422 UART: [ldev] AUTHORITY.KEYID = 7
1,211,885 UART: [ldev] FE.KEYID = 1
1,216,885 UART: [ldev] Erasing FE.KEYID = 1
1,243,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,313 UART: [ldev] --
1,282,718 UART: [fwproc] Wait for Commands...
1,283,390 UART: [fwproc] Recv command 0x46574c44
1,284,118 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,755 UART: ROM Fatal Error: 0x000B0014
1,563,912 >>> mbox cmd response: failed
1,563,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,918 >>> mbox cmd response: failed
1,563,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,602 UART: [kat] SHA2-256
893,252 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,377 UART: [kat] ++
897,529 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,534 UART: [kat] SHA2-512-ACC
908,435 UART: [kat] ECC-384
918,394 UART: [kat] HMAC-384Kdf
922,960 UART: [kat] LMS
1,171,288 UART: [kat] --
1,172,041 UART: [cold-reset] ++
1,172,475 UART: [fht] FHT @ 0x50003400
1,175,146 UART: [idev] ++
1,175,314 UART: [idev] CDI.KEYID = 6
1,175,674 UART: [idev] SUBJECT.KEYID = 7
1,176,098 UART: [idev] UDS.KEYID = 0
1,176,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,118 UART: [idev] Erasing UDS.KEYID = 0
1,200,819 UART: [idev] Sha1 KeyId Algorithm
1,209,259 UART: [idev] --
1,210,323 UART: [ldev] ++
1,210,491 UART: [ldev] CDI.KEYID = 6
1,210,854 UART: [ldev] SUBJECT.KEYID = 5
1,211,280 UART: [ldev] AUTHORITY.KEYID = 7
1,211,743 UART: [ldev] FE.KEYID = 1
1,216,599 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,457 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,691 UART: [ldev] --
1,281,976 UART: [fwproc] Wait for Commands...
1,282,618 UART: [fwproc] Recv command 0x46574c44
1,283,346 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,671 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,841 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,128 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,989 >>> mbox cmd response: failed
1,419,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,995 >>> mbox cmd response: failed
1,419,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,001 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,339 UART: [state] LifecycleState = Unprovisioned
85,994 UART: [state] DebugLocked = No
86,546 UART: [state] WD Timer not started. Device not locked for debugging
87,711 UART: [kat] SHA2-256
893,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,486 UART: [kat] ++
897,638 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,231 UART: [kat] HMAC-384Kdf
922,949 UART: [kat] LMS
1,171,277 UART: [kat] --
1,172,244 UART: [cold-reset] ++
1,172,722 UART: [fht] FHT @ 0x50003400
1,175,323 UART: [idev] ++
1,175,491 UART: [idev] CDI.KEYID = 6
1,175,851 UART: [idev] SUBJECT.KEYID = 7
1,176,275 UART: [idev] UDS.KEYID = 0
1,176,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,241 UART: [idev] Erasing UDS.KEYID = 0
1,201,780 UART: [idev] Sha1 KeyId Algorithm
1,210,216 UART: [idev] --
1,211,222 UART: [ldev] ++
1,211,390 UART: [ldev] CDI.KEYID = 6
1,211,753 UART: [ldev] SUBJECT.KEYID = 5
1,212,179 UART: [ldev] AUTHORITY.KEYID = 7
1,212,642 UART: [ldev] FE.KEYID = 1
1,217,678 UART: [ldev] Erasing FE.KEYID = 1
1,244,275 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,512 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,119 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,831 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,872 UART: [ldev] --
1,283,299 UART: [fwproc] Wait for Commands...
1,284,019 UART: [fwproc] Recv command 0x46574c44
1,284,747 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,142 UART: ROM Fatal Error: 0x000B0014
1,565,299 >>> mbox cmd response: failed
1,565,299 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,305 >>> mbox cmd response: failed
1,565,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,311 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
87,066 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
894,021 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,146 UART: [kat] ++
898,298 UART: [kat] sha1
902,658 UART: [kat] SHA2-256
904,598 UART: [kat] SHA2-384
907,485 UART: [kat] SHA2-512-ACC
909,386 UART: [kat] ECC-384
919,583 UART: [kat] HMAC-384Kdf
924,261 UART: [kat] LMS
1,172,589 UART: [kat] --
1,173,524 UART: [cold-reset] ++
1,173,858 UART: [fht] FHT @ 0x50003400
1,176,641 UART: [idev] ++
1,176,809 UART: [idev] CDI.KEYID = 6
1,177,169 UART: [idev] SUBJECT.KEYID = 7
1,177,593 UART: [idev] UDS.KEYID = 0
1,177,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,793 UART: [idev] Erasing UDS.KEYID = 0
1,202,868 UART: [idev] Sha1 KeyId Algorithm
1,211,324 UART: [idev] --
1,212,290 UART: [ldev] ++
1,212,458 UART: [ldev] CDI.KEYID = 6
1,212,821 UART: [ldev] SUBJECT.KEYID = 5
1,213,247 UART: [ldev] AUTHORITY.KEYID = 7
1,213,710 UART: [ldev] FE.KEYID = 1
1,218,776 UART: [ldev] Erasing FE.KEYID = 1
1,244,905 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,905 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,908 UART: [ldev] --
1,284,213 UART: [fwproc] Wait for Commands...
1,284,997 UART: [fwproc] Recv command 0x46574c44
1,285,725 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,663 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,034 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,249 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,421,768 >>> mbox cmd response: failed
1,421,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,421,774 >>> mbox cmd response: failed
1,421,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,421,780 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,728 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,263 UART:
192,622 UART: Running Caliptra ROM ...
193,807 UART:
193,964 UART: [state] CFI Enabled
263,837 UART: [state] LifecycleState = Unprovisioned
265,785 UART: [state] DebugLocked = No
268,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,316 UART: [kat] SHA2-256
442,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,484 UART: [kat] ++
454,076 UART: [kat] sha1
464,804 UART: [kat] SHA2-256
467,498 UART: [kat] SHA2-384
474,397 UART: [kat] SHA2-512-ACC
476,794 UART: [kat] ECC-384
2,766,310 UART: [kat] HMAC-384Kdf
2,778,671 UART: [kat] LMS
3,968,938 UART: [kat] --
3,975,103 UART: [cold-reset] ++
3,977,748 UART: [fht] Storing FHT @ 0x50003400
3,989,632 UART: [idev] ++
3,990,210 UART: [idev] CDI.KEYID = 6
3,991,180 UART: [idev] SUBJECT.KEYID = 7
3,992,396 UART: [idev] UDS.KEYID = 0
3,995,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,834 UART: [idev] Erasing UDS.KEYID = 0
7,328,201 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,387 UART: [idev] --
7,354,577 UART: [ldev] ++
7,355,146 UART: [ldev] CDI.KEYID = 6
7,356,085 UART: [ldev] SUBJECT.KEYID = 5
7,357,304 UART: [ldev] AUTHORITY.KEYID = 7
7,358,593 UART: [ldev] FE.KEYID = 1
7,403,030 UART: [ldev] Erasing FE.KEYID = 1
10,736,475 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,173 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,550 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,115,097 UART: [ldev] --
13,119,556 UART: [fwproc] Waiting for Commands...
13,121,434 UART: [fwproc] Received command 0x46574c44
13,123,624 UART: [fwproc] Received Image of size 118548 bytes
16,077,476 UART: ROM Fatal Error: 0x000B0023
16,080,949 >>> mbox cmd response: failed
16,081,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,081,735 >>> mbox cmd response: failed
16,082,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,082,325 >>> mbox cmd response: failed
Initializing fuses
2,056,779 writing to cptra_bootfsm_go
2,246,109 UART:
2,246,456 UART: Running Caliptra ROM ...
2,247,500 UART:
2,247,654 UART: [state] CFI Enabled
2,314,767 UART: [state] LifecycleState = Unprovisioned
2,316,709 UART: [state] DebugLocked = No
2,319,351 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,925 UART: [kat] SHA2-256
2,493,669 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,169 UART: [kat] ++
2,504,709 UART: [kat] sha1
2,515,010 UART: [kat] SHA2-256
2,517,693 UART: [kat] SHA2-384
2,522,771 UART: [kat] SHA2-512-ACC
2,525,132 UART: [kat] ECC-384
4,816,150 UART: [kat] HMAC-384Kdf
4,848,473 UART: [kat] LMS
6,038,754 UART: [kat] --
6,043,824 UART: [cold-reset] ++
6,045,056 UART: [fht] Storing FHT @ 0x50003400
6,057,572 UART: [idev] ++
6,058,139 UART: [idev] CDI.KEYID = 6
6,059,076 UART: [idev] SUBJECT.KEYID = 7
6,060,349 UART: [idev] UDS.KEYID = 0
6,062,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,212,188 UART: [idev] Erasing UDS.KEYID = 0
9,396,008 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,445 UART: [idev] --
9,422,356 UART: [ldev] ++
9,422,984 UART: [ldev] CDI.KEYID = 6
9,423,873 UART: [ldev] SUBJECT.KEYID = 5
9,425,151 UART: [ldev] AUTHORITY.KEYID = 7
9,426,397 UART: [ldev] FE.KEYID = 1
9,469,784 UART: [ldev] Erasing FE.KEYID = 1
12,801,388 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,669 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,196 UART: [ldev] --
15,162,176 UART: [fwproc] Waiting for Commands...
15,165,413 UART: [fwproc] Received command 0x46574c44
15,167,596 UART: [fwproc] Received Image of size 118548 bytes
19,281,587 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,355,815 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,429,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,757,104 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
3,804,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,861,083 >>> mbox cmd response: failed
15,861,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,862,003 >>> mbox cmd response: failed
15,862,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,862,568 >>> mbox cmd response: failed
Initializing fuses
2,057,080 writing to cptra_bootfsm_go
5,841,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,993,334 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,411 UART:
192,785 UART: Running Caliptra ROM ...
193,892 UART:
603,706 UART: [state] CFI Enabled
619,249 UART: [state] LifecycleState = Unprovisioned
621,195 UART: [state] DebugLocked = No
622,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,468 UART: [kat] SHA2-256
797,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,737 UART: [kat] ++
808,193 UART: [kat] sha1
818,643 UART: [kat] SHA2-256
821,330 UART: [kat] SHA2-384
827,483 UART: [kat] SHA2-512-ACC
829,872 UART: [kat] ECC-384
3,112,898 UART: [kat] HMAC-384Kdf
3,123,654 UART: [kat] LMS
4,313,754 UART: [kat] --
4,318,122 UART: [cold-reset] ++
4,320,177 UART: [fht] Storing FHT @ 0x50003400
4,331,073 UART: [idev] ++
4,331,653 UART: [idev] CDI.KEYID = 6
4,332,598 UART: [idev] SUBJECT.KEYID = 7
4,333,872 UART: [idev] UDS.KEYID = 0
4,336,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,077 UART: [idev] Erasing UDS.KEYID = 0
7,616,735 UART: [idev] Using Sha1 for KeyId Algorithm
7,638,301 UART: [idev] --
7,642,772 UART: [ldev] ++
7,643,361 UART: [ldev] CDI.KEYID = 6
7,644,285 UART: [ldev] SUBJECT.KEYID = 5
7,645,508 UART: [ldev] AUTHORITY.KEYID = 7
7,646,775 UART: [ldev] FE.KEYID = 1
7,659,699 UART: [ldev] Erasing FE.KEYID = 1
10,949,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,777 UART: [ldev] --
13,308,787 UART: [fwproc] Waiting for Commands...
13,311,385 UART: [fwproc] Received command 0x46574c44
13,313,593 UART: [fwproc] Received Image of size 118548 bytes
16,265,772 UART: ROM Fatal Error: 0x000B0023
16,269,252 >>> mbox cmd response: failed
16,269,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,030 >>> mbox cmd response: failed
16,270,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,270,627 >>> mbox cmd response: failed
Initializing fuses
2,056,632 writing to cptra_bootfsm_go
2,245,963 UART:
2,246,309 UART: Running Caliptra ROM ...
2,247,453 UART:
4,179,572 UART: [state] CFI Enabled
4,194,043 UART: [state] LifecycleState = Unprovisioned
4,195,962 UART: [state] DebugLocked = No
4,197,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,201,399 UART: [kat] SHA2-256
4,371,138 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,381,674 UART: [kat] ++
4,382,174 UART: [kat] sha1
4,392,384 UART: [kat] SHA2-256
4,395,091 UART: [kat] SHA2-384
4,400,042 UART: [kat] SHA2-512-ACC
4,402,421 UART: [kat] ECC-384
6,687,129 UART: [kat] HMAC-384Kdf
6,699,063 UART: [kat] LMS
7,889,216 UART: [kat] --
7,893,614 UART: [cold-reset] ++
7,895,622 UART: [fht] Storing FHT @ 0x50003400
7,906,951 UART: [idev] ++
7,907,521 UART: [idev] CDI.KEYID = 6
7,908,437 UART: [idev] SUBJECT.KEYID = 7
7,909,723 UART: [idev] UDS.KEYID = 0
7,911,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,060,933 UART: [idev] Erasing UDS.KEYID = 0
11,192,166 UART: [idev] Using Sha1 for KeyId Algorithm
11,213,614 UART: [idev] --
11,218,988 UART: [ldev] ++
11,219,568 UART: [ldev] CDI.KEYID = 6
11,220,594 UART: [ldev] SUBJECT.KEYID = 5
11,221,810 UART: [ldev] AUTHORITY.KEYID = 7
11,222,995 UART: [ldev] FE.KEYID = 1
11,233,650 UART: [ldev] Erasing FE.KEYID = 1
14,521,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,812,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,827,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,841,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,856,366 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,874,386 UART: [ldev] --
16,878,597 UART: [fwproc] Waiting for Commands...
16,880,640 UART: [fwproc] Received command 0x46574c44
16,882,854 UART: [fwproc] Received Image of size 118548 bytes
20,982,918 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,063,039 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,136,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,464,079 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,133,722 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,067,123 >>> mbox cmd response: failed
16,067,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,057 >>> mbox cmd response: failed
16,068,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,639 >>> mbox cmd response: failed
Initializing fuses
2,057,641 writing to cptra_bootfsm_go
7,929,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,955,634 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
192,559 UART:
192,923 UART: Running Caliptra ROM ...
194,141 UART:
194,300 UART: [state] CFI Enabled
261,905 UART: [state] LifecycleState = Unprovisioned
263,827 UART: [state] DebugLocked = No
266,299 UART: [state] WD Timer not started. Device not locked for debugging
269,950 UART: [kat] SHA2-256
449,630 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,408 UART: [kat] ++
460,864 UART: [kat] sha1
470,338 UART: [kat] SHA2-256
473,026 UART: [kat] SHA2-384
477,931 UART: [kat] SHA2-512-ACC
480,270 UART: [kat] ECC-384
2,923,876 UART: [kat] HMAC-384Kdf
2,949,256 UART: [kat] LMS
3,425,761 UART: [kat] --
3,429,807 UART: [cold-reset] ++
3,431,638 UART: [fht] FHT @ 0x50003400
3,443,756 UART: [idev] ++
3,444,329 UART: [idev] CDI.KEYID = 6
3,445,349 UART: [idev] SUBJECT.KEYID = 7
3,446,568 UART: [idev] UDS.KEYID = 0
3,448,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,843 UART: [idev] Erasing UDS.KEYID = 0
5,965,061 UART: [idev] Sha1 KeyId Algorithm
5,988,206 UART: [idev] --
5,993,236 UART: [ldev] ++
5,993,812 UART: [ldev] CDI.KEYID = 6
5,994,724 UART: [ldev] SUBJECT.KEYID = 5
5,995,946 UART: [ldev] AUTHORITY.KEYID = 7
5,997,187 UART: [ldev] FE.KEYID = 1
6,035,176 UART: [ldev] Erasing FE.KEYID = 1
8,540,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,324,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,096 UART: [ldev] --
10,352,288 UART: [fwproc] Wait for Commands...
10,354,148 UART: [fwproc] Recv command 0x46574c44
10,356,147 UART: [fwproc] Recv'd Img size: 118548 bytes
12,689,951 UART: ROM Fatal Error: 0x000B0023
12,693,216 >>> mbox cmd response: failed
12,693,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,025 >>> mbox cmd response: failed
12,694,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,694,604 >>> mbox cmd response: failed
Initializing fuses
2,066,617 writing to cptra_bootfsm_go
2,255,924 UART:
2,256,301 UART: Running Caliptra ROM ...
2,257,353 UART:
2,257,510 UART: [state] CFI Enabled
2,332,809 UART: [state] LifecycleState = Unprovisioned
2,334,748 UART: [state] DebugLocked = No
2,336,276 UART: [state] WD Timer not started. Device not locked for debugging
2,339,863 UART: [kat] SHA2-256
2,519,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,530,290 UART: [kat] ++
2,530,760 UART: [kat] sha1
2,543,087 UART: [kat] SHA2-256
2,545,778 UART: [kat] SHA2-384
2,551,405 UART: [kat] SHA2-512-ACC
2,553,762 UART: [kat] ECC-384
5,014,037 UART: [kat] HMAC-384Kdf
5,037,728 UART: [kat] LMS
5,514,221 UART: [kat] --
5,518,967 UART: [cold-reset] ++
5,520,055 UART: [fht] FHT @ 0x50003400
5,531,985 UART: [idev] ++
5,532,558 UART: [idev] CDI.KEYID = 6
5,533,530 UART: [idev] SUBJECT.KEYID = 7
5,534,753 UART: [idev] UDS.KEYID = 0
5,537,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,686,645 UART: [idev] Erasing UDS.KEYID = 0
8,049,472 UART: [idev] Sha1 KeyId Algorithm
8,073,404 UART: [idev] --
8,078,840 UART: [ldev] ++
8,079,427 UART: [ldev] CDI.KEYID = 6
8,080,327 UART: [ldev] SUBJECT.KEYID = 5
8,081,552 UART: [ldev] AUTHORITY.KEYID = 7
8,082,853 UART: [ldev] FE.KEYID = 1
8,122,753 UART: [ldev] Erasing FE.KEYID = 1
10,630,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,366,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,382,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,398,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,414,210 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,436,310 UART: [ldev] --
12,442,117 UART: [fwproc] Wait for Commands...
12,445,195 UART: [fwproc] Recv command 0x46574c44
12,447,189 UART: [fwproc] Recv'd Img size: 118548 bytes
15,934,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,089,755 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,418,792 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,462,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,581,553 >>> mbox cmd response: failed
12,582,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,582,504 >>> mbox cmd response: failed
12,582,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,583,077 >>> mbox cmd response: failed
Initializing fuses
2,061,204 writing to cptra_bootfsm_go
5,513,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,248,231 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,213 writing to cptra_bootfsm_go
192,522 UART:
192,898 UART: Running Caliptra ROM ...
194,118 UART:
603,677 UART: [state] CFI Enabled
619,349 UART: [state] LifecycleState = Unprovisioned
621,296 UART: [state] DebugLocked = No
622,994 UART: [state] WD Timer not started. Device not locked for debugging
627,569 UART: [kat] SHA2-256
807,206 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,991 UART: [kat] ++
818,536 UART: [kat] sha1
829,802 UART: [kat] SHA2-256
832,481 UART: [kat] SHA2-384
838,457 UART: [kat] SHA2-512-ACC
840,803 UART: [kat] ECC-384
3,285,279 UART: [kat] HMAC-384Kdf
3,298,437 UART: [kat] LMS
3,774,936 UART: [kat] --
3,780,714 UART: [cold-reset] ++
3,782,002 UART: [fht] FHT @ 0x50003400
3,793,583 UART: [idev] ++
3,794,161 UART: [idev] CDI.KEYID = 6
3,795,134 UART: [idev] SUBJECT.KEYID = 7
3,796,351 UART: [idev] UDS.KEYID = 0
3,798,787 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,867 UART: [idev] Erasing UDS.KEYID = 0
6,276,185 UART: [idev] Sha1 KeyId Algorithm
6,299,432 UART: [idev] --
6,306,017 UART: [ldev] ++
6,306,593 UART: [ldev] CDI.KEYID = 6
6,307,503 UART: [ldev] SUBJECT.KEYID = 5
6,308,730 UART: [ldev] AUTHORITY.KEYID = 7
6,309,992 UART: [ldev] FE.KEYID = 1
6,321,135 UART: [ldev] Erasing FE.KEYID = 1
8,797,868 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,026 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,096 UART: [ldev] --
10,590,920 UART: [fwproc] Wait for Commands...
10,594,163 UART: [fwproc] Recv command 0x46574c44
10,596,158 UART: [fwproc] Recv'd Img size: 118548 bytes
12,924,624 UART: ROM Fatal Error: 0x000B0023
12,927,848 >>> mbox cmd response: failed
12,928,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,928,620 >>> mbox cmd response: failed
12,928,890 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,929,204 >>> mbox cmd response: failed
Initializing fuses
2,060,208 writing to cptra_bootfsm_go
2,249,531 UART:
2,249,868 UART: Running Caliptra ROM ...
2,251,004 UART:
7,525,343 UART: [state] CFI Enabled
7,537,382 UART: [state] LifecycleState = Unprovisioned
7,539,303 UART: [state] DebugLocked = No
7,541,835 UART: [state] WD Timer not started. Device not locked for debugging
7,546,026 UART: [kat] SHA2-256
7,725,720 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,736,476 UART: [kat] ++
7,736,939 UART: [kat] sha1
7,748,282 UART: [kat] SHA2-256
7,750,990 UART: [kat] SHA2-384
7,757,688 UART: [kat] SHA2-512-ACC
7,760,044 UART: [kat] ECC-384
10,203,050 UART: [kat] HMAC-384Kdf
10,216,356 UART: [kat] LMS
10,692,879 UART: [kat] --
10,697,380 UART: [cold-reset] ++
10,699,915 UART: [fht] FHT @ 0x50003400
10,712,138 UART: [idev] ++
10,712,703 UART: [idev] CDI.KEYID = 6
10,713,717 UART: [idev] SUBJECT.KEYID = 7
10,714,878 UART: [idev] UDS.KEYID = 0
10,717,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,866,333 UART: [idev] Erasing UDS.KEYID = 0
13,194,732 UART: [idev] Sha1 KeyId Algorithm
13,218,049 UART: [idev] --
13,223,133 UART: [ldev] ++
13,223,706 UART: [ldev] CDI.KEYID = 6
13,224,620 UART: [ldev] SUBJECT.KEYID = 5
13,225,838 UART: [ldev] AUTHORITY.KEYID = 7
13,227,072 UART: [ldev] FE.KEYID = 1
13,240,044 UART: [ldev] Erasing FE.KEYID = 1
15,716,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,452,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,468,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,483,864 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,505,166 UART: [ldev] --
17,510,498 UART: [fwproc] Wait for Commands...
17,512,441 UART: [fwproc] Recv command 0x46574c44
17,514,487 UART: [fwproc] Recv'd Img size: 118548 bytes
20,995,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,074,505 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,147,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,475,084 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,780,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,797,588 >>> mbox cmd response: failed
12,798,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,798,492 >>> mbox cmd response: failed
12,798,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,799,063 >>> mbox cmd response: failed
Initializing fuses
2,059,517 writing to cptra_bootfsm_go
10,846,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,513,042 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
192,117 UART:
192,489 UART: Running Caliptra ROM ...
193,583 UART:
193,728 UART: [state] CFI Enabled
265,846 UART: [state] LifecycleState = Unprovisioned
268,254 UART: [state] DebugLocked = No
269,640 UART: [state] WD Timer not started. Device not locked for debugging
274,495 UART: [kat] SHA2-256
464,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,145 UART: [kat] ++
475,644 UART: [kat] sha1
487,015 UART: [kat] SHA2-256
490,014 UART: [kat] SHA2-384
495,734 UART: [kat] SHA2-512-ACC
498,348 UART: [kat] ECC-384
2,949,416 UART: [kat] HMAC-384Kdf
2,969,697 UART: [kat] LMS
3,501,482 UART: [kat] --
3,506,724 UART: [cold-reset] ++
3,508,069 UART: [fht] FHT @ 0x50003400
3,519,867 UART: [idev] ++
3,520,548 UART: [idev] CDI.KEYID = 6
3,521,568 UART: [idev] SUBJECT.KEYID = 7
3,522,739 UART: [idev] UDS.KEYID = 0
3,525,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,802 UART: [idev] Erasing UDS.KEYID = 0
6,030,336 UART: [idev] Sha1 KeyId Algorithm
6,052,603 UART: [idev] --
6,058,142 UART: [ldev] ++
6,058,886 UART: [ldev] CDI.KEYID = 6
6,059,807 UART: [ldev] SUBJECT.KEYID = 5
6,060,978 UART: [ldev] AUTHORITY.KEYID = 7
6,062,160 UART: [ldev] FE.KEYID = 1
6,098,846 UART: [ldev] Erasing FE.KEYID = 1
8,602,791 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,288 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,406 UART: [ldev] --
10,412,031 UART: [fwproc] Wait for Commands...
10,413,867 UART: [fwproc] Recv command 0x46574c44
10,416,185 UART: [fwproc] Recv'd Img size: 118548 bytes
12,756,581 UART: ROM Fatal Error: 0x000B0023
12,760,261 >>> mbox cmd response: failed
12,760,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,761,032 >>> mbox cmd response: failed
12,761,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,761,602 >>> mbox cmd response: failed
Initializing fuses
2,063,113 writing to cptra_bootfsm_go
2,252,459 UART:
2,252,820 UART: Running Caliptra ROM ...
2,253,875 UART:
2,254,036 UART: [state] CFI Enabled
2,327,677 UART: [state] LifecycleState = Unprovisioned
2,330,052 UART: [state] DebugLocked = No
2,332,394 UART: [state] WD Timer not started. Device not locked for debugging
2,336,660 UART: [kat] SHA2-256
2,526,559 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,537,316 UART: [kat] ++
2,537,871 UART: [kat] sha1
2,548,792 UART: [kat] SHA2-256
2,551,806 UART: [kat] SHA2-384
2,556,848 UART: [kat] SHA2-512-ACC
2,559,473 UART: [kat] ECC-384
5,010,157 UART: [kat] HMAC-384Kdf
5,033,619 UART: [kat] LMS
5,565,376 UART: [kat] --
5,570,715 UART: [cold-reset] ++
5,572,175 UART: [fht] FHT @ 0x50003400
5,582,136 UART: [idev] ++
5,583,010 UART: [idev] CDI.KEYID = 6
5,583,944 UART: [idev] SUBJECT.KEYID = 7
5,585,078 UART: [idev] UDS.KEYID = 0
5,587,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,455 UART: [idev] Erasing UDS.KEYID = 0
8,091,810 UART: [idev] Sha1 KeyId Algorithm
8,114,728 UART: [idev] --
8,119,265 UART: [ldev] ++
8,119,950 UART: [ldev] CDI.KEYID = 6
8,120,861 UART: [ldev] SUBJECT.KEYID = 5
8,122,024 UART: [ldev] AUTHORITY.KEYID = 7
8,123,264 UART: [ldev] FE.KEYID = 1
8,162,598 UART: [ldev] Erasing FE.KEYID = 1
10,665,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,061 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,245 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,489 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,243 UART: [ldev] --
12,475,234 UART: [fwproc] Wait for Commands...
12,477,941 UART: [fwproc] Recv command 0x46574c44
12,480,207 UART: [fwproc] Recv'd Img size: 118548 bytes
15,978,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,055,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,179,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,740,526 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
3,442,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,671,933 >>> mbox cmd response: failed
12,672,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,672,900 >>> mbox cmd response: failed
12,673,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,673,500 >>> mbox cmd response: failed
Initializing fuses
2,062,613 writing to cptra_bootfsm_go
5,489,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,114 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,660 UART:
193,022 UART: Running Caliptra ROM ...
194,437 UART:
603,899 UART: [state] CFI Enabled
618,070 UART: [state] LifecycleState = Unprovisioned
620,410 UART: [state] DebugLocked = No
622,955 UART: [state] WD Timer not started. Device not locked for debugging
628,367 UART: [kat] SHA2-256
818,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,058 UART: [kat] ++
829,578 UART: [kat] sha1
839,866 UART: [kat] SHA2-256
842,887 UART: [kat] SHA2-384
847,918 UART: [kat] SHA2-512-ACC
850,492 UART: [kat] ECC-384
3,292,587 UART: [kat] HMAC-384Kdf
3,305,944 UART: [kat] LMS
3,837,783 UART: [kat] --
3,842,640 UART: [cold-reset] ++
3,843,826 UART: [fht] FHT @ 0x50003400
3,855,625 UART: [idev] ++
3,856,309 UART: [idev] CDI.KEYID = 6
3,857,332 UART: [idev] SUBJECT.KEYID = 7
3,858,443 UART: [idev] UDS.KEYID = 0
3,861,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,550 UART: [idev] Erasing UDS.KEYID = 0
6,336,532 UART: [idev] Sha1 KeyId Algorithm
6,359,375 UART: [idev] --
6,365,808 UART: [ldev] ++
6,366,505 UART: [ldev] CDI.KEYID = 6
6,367,393 UART: [ldev] SUBJECT.KEYID = 5
6,368,615 UART: [ldev] AUTHORITY.KEYID = 7
6,369,748 UART: [ldev] FE.KEYID = 1
6,382,771 UART: [ldev] Erasing FE.KEYID = 1
8,858,412 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,054 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,194 UART: [ldev] --
10,651,624 UART: [fwproc] Wait for Commands...
10,654,211 UART: [fwproc] Recv command 0x46574c44
10,656,479 UART: [fwproc] Recv'd Img size: 118548 bytes
12,982,981 UART: ROM Fatal Error: 0x000B0023
12,986,619 >>> mbox cmd response: failed
12,986,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,300 >>> mbox cmd response: failed
12,987,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,987,950 >>> mbox cmd response: failed
Initializing fuses
2,064,437 writing to cptra_bootfsm_go
2,253,762 UART:
2,254,103 UART: Running Caliptra ROM ...
2,255,154 UART:
7,461,242 UART: [state] CFI Enabled
7,475,904 UART: [state] LifecycleState = Unprovisioned
7,478,264 UART: [state] DebugLocked = No
7,481,063 UART: [state] WD Timer not started. Device not locked for debugging
7,485,456 UART: [kat] SHA2-256
7,675,302 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,686,088 UART: [kat] ++
7,686,648 UART: [kat] sha1
7,698,038 UART: [kat] SHA2-256
7,701,029 UART: [kat] SHA2-384
7,706,873 UART: [kat] SHA2-512-ACC
7,709,453 UART: [kat] ECC-384
10,152,721 UART: [kat] HMAC-384Kdf
10,165,277 UART: [kat] LMS
10,697,071 UART: [kat] --
10,700,699 UART: [cold-reset] ++
10,701,716 UART: [fht] FHT @ 0x50003400
10,712,862 UART: [idev] ++
10,713,538 UART: [idev] CDI.KEYID = 6
10,714,505 UART: [idev] SUBJECT.KEYID = 7
10,715,742 UART: [idev] UDS.KEYID = 0
10,718,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,867,120 UART: [idev] Erasing UDS.KEYID = 0
13,193,138 UART: [idev] Sha1 KeyId Algorithm
13,215,899 UART: [idev] --
13,222,087 UART: [ldev] ++
13,222,778 UART: [ldev] CDI.KEYID = 6
13,223,663 UART: [ldev] SUBJECT.KEYID = 5
13,224,767 UART: [ldev] AUTHORITY.KEYID = 7
13,226,058 UART: [ldev] FE.KEYID = 1
13,235,499 UART: [ldev] Erasing FE.KEYID = 1
15,715,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,433,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,448,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,463,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,478,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,499,897 UART: [ldev] --
17,504,627 UART: [fwproc] Wait for Commands...
17,506,297 UART: [fwproc] Recv command 0x46574c44
17,508,575 UART: [fwproc] Recv'd Img size: 118548 bytes
21,009,919 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,085,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,209,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,769,253 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
3,757,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,899,918 >>> mbox cmd response: failed
12,900,427 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,900,780 >>> mbox cmd response: failed
12,901,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,901,356 >>> mbox cmd response: failed
Initializing fuses
2,061,541 writing to cptra_bootfsm_go
10,705,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,993,037 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Unprovisioned
85,941 UART: [state] DebugLocked = No
86,471 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,121 UART: [kat] SHA2-256
882,052 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,167 UART: [kat] ++
886,319 UART: [kat] sha1
890,697 UART: [kat] SHA2-256
892,635 UART: [kat] SHA2-384
895,538 UART: [kat] SHA2-512-ACC
897,439 UART: [kat] ECC-384
902,994 UART: [kat] HMAC-384Kdf
907,550 UART: [kat] LMS
1,475,746 UART: [kat] --
1,476,685 UART: [cold-reset] ++
1,477,085 UART: [fht] Storing FHT @ 0x50003400
1,479,846 UART: [idev] ++
1,480,014 UART: [idev] CDI.KEYID = 6
1,480,374 UART: [idev] SUBJECT.KEYID = 7
1,480,798 UART: [idev] UDS.KEYID = 0
1,481,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,532 UART: [idev] Erasing UDS.KEYID = 0
1,504,906 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,562 UART: [idev] --
1,514,695 UART: [ldev] ++
1,514,863 UART: [ldev] CDI.KEYID = 6
1,515,226 UART: [ldev] SUBJECT.KEYID = 5
1,515,652 UART: [ldev] AUTHORITY.KEYID = 7
1,516,115 UART: [ldev] FE.KEYID = 1
1,521,583 UART: [ldev] Erasing FE.KEYID = 1
1,547,118 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,745 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,348 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,326 UART: [ldev] --
1,586,743 UART: [fwproc] Waiting for Commands...
1,587,478 UART: [fwproc] Received command 0x46574c44
1,588,269 UART: [fwproc] Received Image of size 118548 bytes
1,867,661 UART: ROM Fatal Error: 0x000B0023
1,868,818 >>> mbox cmd response: failed
1,868,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,824 >>> mbox cmd response: failed
1,868,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,353 UART: [kat] SHA2-256
882,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,399 UART: [kat] ++
886,551 UART: [kat] sha1
890,921 UART: [kat] SHA2-256
892,859 UART: [kat] SHA2-384
895,754 UART: [kat] SHA2-512-ACC
897,655 UART: [kat] ECC-384
903,330 UART: [kat] HMAC-384Kdf
907,952 UART: [kat] LMS
1,476,148 UART: [kat] --
1,476,755 UART: [cold-reset] ++
1,477,233 UART: [fht] Storing FHT @ 0x50003400
1,479,992 UART: [idev] ++
1,480,160 UART: [idev] CDI.KEYID = 6
1,480,520 UART: [idev] SUBJECT.KEYID = 7
1,480,944 UART: [idev] UDS.KEYID = 0
1,481,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,698 UART: [idev] Erasing UDS.KEYID = 0
1,505,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,950 UART: [idev] --
1,515,071 UART: [ldev] ++
1,515,239 UART: [ldev] CDI.KEYID = 6
1,515,602 UART: [ldev] SUBJECT.KEYID = 5
1,516,028 UART: [ldev] AUTHORITY.KEYID = 7
1,516,491 UART: [ldev] FE.KEYID = 1
1,521,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,996 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,642 UART: [ldev] --
1,585,931 UART: [fwproc] Waiting for Commands...
1,586,700 UART: [fwproc] Received command 0x46574c44
1,587,491 UART: [fwproc] Received Image of size 118548 bytes
2,932,706 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,916 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,477 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,599 >>> mbox cmd response: failed
1,719,599 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,605 >>> mbox cmd response: failed
1,719,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,611 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,831 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,126 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,644 UART: [kat] SHA2-256
882,575 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,690 UART: [kat] ++
886,842 UART: [kat] sha1
891,132 UART: [kat] SHA2-256
893,070 UART: [kat] SHA2-384
895,833 UART: [kat] SHA2-512-ACC
897,734 UART: [kat] ECC-384
903,565 UART: [kat] HMAC-384Kdf
908,357 UART: [kat] LMS
1,476,553 UART: [kat] --
1,477,328 UART: [cold-reset] ++
1,477,730 UART: [fht] Storing FHT @ 0x50003400
1,480,323 UART: [idev] ++
1,480,491 UART: [idev] CDI.KEYID = 6
1,480,851 UART: [idev] SUBJECT.KEYID = 7
1,481,275 UART: [idev] UDS.KEYID = 0
1,481,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,319 UART: [idev] Erasing UDS.KEYID = 0
1,505,573 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,223 UART: [idev] --
1,515,240 UART: [ldev] ++
1,515,408 UART: [ldev] CDI.KEYID = 6
1,515,771 UART: [ldev] SUBJECT.KEYID = 5
1,516,197 UART: [ldev] AUTHORITY.KEYID = 7
1,516,660 UART: [ldev] FE.KEYID = 1
1,521,780 UART: [ldev] Erasing FE.KEYID = 1
1,547,521 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,443 UART: [ldev] --
1,586,706 UART: [fwproc] Waiting for Commands...
1,587,511 UART: [fwproc] Received command 0x46574c44
1,588,302 UART: [fwproc] Received Image of size 118548 bytes
1,868,954 UART: ROM Fatal Error: 0x000B0023
1,870,111 >>> mbox cmd response: failed
1,870,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,117 >>> mbox cmd response: failed
1,870,117 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,123 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,377 UART: [state] LifecycleState = Unprovisioned
86,032 UART: [state] DebugLocked = No
86,542 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,600 UART: [kat] SHA2-256
892,538 UART: [kat] SHA2-384
895,197 UART: [kat] SHA2-512-ACC
897,098 UART: [kat] ECC-384
902,585 UART: [kat] HMAC-384Kdf
907,417 UART: [kat] LMS
1,475,613 UART: [kat] --
1,476,504 UART: [cold-reset] ++
1,476,906 UART: [fht] Storing FHT @ 0x50003400
1,479,773 UART: [idev] ++
1,479,941 UART: [idev] CDI.KEYID = 6
1,480,301 UART: [idev] SUBJECT.KEYID = 7
1,480,725 UART: [idev] UDS.KEYID = 0
1,481,070 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,455 UART: [idev] --
1,515,408 UART: [ldev] ++
1,515,576 UART: [ldev] CDI.KEYID = 6
1,515,939 UART: [ldev] SUBJECT.KEYID = 5
1,516,365 UART: [ldev] AUTHORITY.KEYID = 7
1,516,828 UART: [ldev] FE.KEYID = 1
1,522,142 UART: [ldev] Erasing FE.KEYID = 1
1,547,897 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,323 UART: [ldev] --
1,587,684 UART: [fwproc] Waiting for Commands...
1,588,473 UART: [fwproc] Received command 0x46574c44
1,589,264 UART: [fwproc] Received Image of size 118548 bytes
2,933,487 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,203 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,421 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,716 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,860 >>> mbox cmd response: failed
1,721,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,866 >>> mbox cmd response: failed
1,721,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,786 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,960 UART: [kat] SHA2-256
891,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,614 UART: [kat] ++
895,766 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,887 UART: [kat] SHA2-512-ACC
906,788 UART: [kat] ECC-384
916,653 UART: [kat] HMAC-384Kdf
921,335 UART: [kat] LMS
1,169,647 UART: [kat] --
1,170,360 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,632 UART: [idev] ++
1,173,800 UART: [idev] CDI.KEYID = 6
1,174,161 UART: [idev] SUBJECT.KEYID = 7
1,174,586 UART: [idev] UDS.KEYID = 0
1,174,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,211 UART: [idev] Erasing UDS.KEYID = 0
1,199,545 UART: [idev] Sha1 KeyId Algorithm
1,208,565 UART: [idev] --
1,209,670 UART: [ldev] ++
1,209,838 UART: [ldev] CDI.KEYID = 6
1,210,202 UART: [ldev] SUBJECT.KEYID = 5
1,210,629 UART: [ldev] AUTHORITY.KEYID = 7
1,211,092 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,243,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,112 UART: [ldev] --
1,282,445 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,897 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,847 UART: ROM Fatal Error: 0x000B0023
1,564,004 >>> mbox cmd response: failed
1,564,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,010 >>> mbox cmd response: failed
1,564,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,287 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,387 UART: [kat] SHA2-512-ACC
906,288 UART: [kat] ECC-384
916,093 UART: [kat] HMAC-384Kdf
920,563 UART: [kat] LMS
1,168,875 UART: [kat] --
1,169,844 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,935 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,295 UART: [idev] --
1,208,426 UART: [ldev] ++
1,208,594 UART: [ldev] CDI.KEYID = 6
1,208,958 UART: [ldev] SUBJECT.KEYID = 5
1,209,385 UART: [ldev] AUTHORITY.KEYID = 7
1,209,848 UART: [ldev] FE.KEYID = 1
1,215,034 UART: [ldev] Erasing FE.KEYID = 1
1,241,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,603 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,319 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,920 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,944 UART: [ldev] --
1,280,311 UART: [fwproc] Wait for Commands...
1,280,922 UART: [fwproc] Recv command 0x46574c44
1,281,655 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,723 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,210 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,385 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,724 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,567 >>> mbox cmd response: failed
1,418,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,573 >>> mbox cmd response: failed
1,418,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,579 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,789 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,316 UART: [state] WD Timer not started. Device not locked for debugging
87,453 UART: [kat] SHA2-256
891,003 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,107 UART: [kat] ++
895,259 UART: [kat] sha1
899,595 UART: [kat] SHA2-256
901,535 UART: [kat] SHA2-384
904,390 UART: [kat] SHA2-512-ACC
906,291 UART: [kat] ECC-384
916,130 UART: [kat] HMAC-384Kdf
920,618 UART: [kat] LMS
1,168,930 UART: [kat] --
1,169,915 UART: [cold-reset] ++
1,170,303 UART: [fht] FHT @ 0x50003400
1,172,905 UART: [idev] ++
1,173,073 UART: [idev] CDI.KEYID = 6
1,173,434 UART: [idev] SUBJECT.KEYID = 7
1,173,859 UART: [idev] UDS.KEYID = 0
1,174,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,164 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,440 UART: [idev] --
1,208,555 UART: [ldev] ++
1,208,723 UART: [ldev] CDI.KEYID = 6
1,209,087 UART: [ldev] SUBJECT.KEYID = 5
1,209,514 UART: [ldev] AUTHORITY.KEYID = 7
1,209,977 UART: [ldev] FE.KEYID = 1
1,215,115 UART: [ldev] Erasing FE.KEYID = 1
1,241,438 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,806 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,139 UART: [ldev] --
1,280,496 UART: [fwproc] Wait for Commands...
1,281,219 UART: [fwproc] Recv command 0x46574c44
1,281,952 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,946 UART: ROM Fatal Error: 0x000B0023
1,563,103 >>> mbox cmd response: failed
1,563,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,109 >>> mbox cmd response: failed
1,563,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,764 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
891,475 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,579 UART: [kat] ++
895,731 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,698 UART: [kat] SHA2-512-ACC
906,599 UART: [kat] ECC-384
916,236 UART: [kat] HMAC-384Kdf
921,000 UART: [kat] LMS
1,169,312 UART: [kat] --
1,170,167 UART: [cold-reset] ++
1,170,643 UART: [fht] FHT @ 0x50003400
1,173,293 UART: [idev] ++
1,173,461 UART: [idev] CDI.KEYID = 6
1,173,822 UART: [idev] SUBJECT.KEYID = 7
1,174,247 UART: [idev] UDS.KEYID = 0
1,174,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,816 UART: [idev] Erasing UDS.KEYID = 0
1,198,694 UART: [idev] Sha1 KeyId Algorithm
1,207,626 UART: [idev] --
1,208,551 UART: [ldev] ++
1,208,719 UART: [ldev] CDI.KEYID = 6
1,209,083 UART: [ldev] SUBJECT.KEYID = 5
1,209,510 UART: [ldev] AUTHORITY.KEYID = 7
1,209,973 UART: [ldev] FE.KEYID = 1
1,215,303 UART: [ldev] Erasing FE.KEYID = 1
1,241,904 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,272 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,161 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,051 UART: [ldev] --
1,281,428 UART: [fwproc] Wait for Commands...
1,282,215 UART: [fwproc] Recv command 0x46574c44
1,282,948 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,470 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,723 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,898 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,267 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,160 >>> mbox cmd response: failed
1,419,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,166 >>> mbox cmd response: failed
1,419,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,169 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,238 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,595 UART: [state] WD Timer not started. Device not locked for debugging
87,872 UART: [kat] SHA2-256
893,522 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,647 UART: [kat] ++
897,799 UART: [kat] sha1
902,067 UART: [kat] SHA2-256
904,007 UART: [kat] SHA2-384
906,764 UART: [kat] SHA2-512-ACC
908,665 UART: [kat] ECC-384
918,164 UART: [kat] HMAC-384Kdf
922,686 UART: [kat] LMS
1,171,014 UART: [kat] --
1,171,571 UART: [cold-reset] ++
1,171,987 UART: [fht] FHT @ 0x50003400
1,174,690 UART: [idev] ++
1,174,858 UART: [idev] CDI.KEYID = 6
1,175,218 UART: [idev] SUBJECT.KEYID = 7
1,175,642 UART: [idev] UDS.KEYID = 0
1,175,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,400 UART: [idev] Erasing UDS.KEYID = 0
1,199,971 UART: [idev] Sha1 KeyId Algorithm
1,208,377 UART: [idev] --
1,209,433 UART: [ldev] ++
1,209,601 UART: [ldev] CDI.KEYID = 6
1,209,964 UART: [ldev] SUBJECT.KEYID = 5
1,210,390 UART: [ldev] AUTHORITY.KEYID = 7
1,210,853 UART: [ldev] FE.KEYID = 1
1,216,039 UART: [ldev] Erasing FE.KEYID = 1
1,242,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,703 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,310 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,037 UART: [ldev] --
1,281,406 UART: [fwproc] Wait for Commands...
1,282,214 UART: [fwproc] Recv command 0x46574c44
1,282,942 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,310 UART: ROM Fatal Error: 0x000B0023
1,563,467 >>> mbox cmd response: failed
1,563,467 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,473 >>> mbox cmd response: failed
1,563,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,479 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,555 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,607 UART: [kat] SHA2-256
903,547 UART: [kat] SHA2-384
906,344 UART: [kat] SHA2-512-ACC
908,245 UART: [kat] ECC-384
918,092 UART: [kat] HMAC-384Kdf
922,736 UART: [kat] LMS
1,171,064 UART: [kat] --
1,172,071 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,030 UART: [idev] ++
1,175,198 UART: [idev] CDI.KEYID = 6
1,175,558 UART: [idev] SUBJECT.KEYID = 7
1,175,982 UART: [idev] UDS.KEYID = 0
1,176,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,046 UART: [idev] Erasing UDS.KEYID = 0
1,201,167 UART: [idev] Sha1 KeyId Algorithm
1,209,563 UART: [idev] --
1,210,555 UART: [ldev] ++
1,210,723 UART: [ldev] CDI.KEYID = 6
1,211,086 UART: [ldev] SUBJECT.KEYID = 5
1,211,512 UART: [ldev] AUTHORITY.KEYID = 7
1,211,975 UART: [ldev] FE.KEYID = 1
1,217,079 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,537 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,412 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,988 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,151 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,536 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,860 >>> mbox cmd response: failed
1,418,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,866 >>> mbox cmd response: failed
1,418,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,835 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,733 UART: [kat] SHA2-256
893,383 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,508 UART: [kat] ++
897,660 UART: [kat] sha1
902,034 UART: [kat] SHA2-256
903,974 UART: [kat] SHA2-384
906,681 UART: [kat] SHA2-512-ACC
908,582 UART: [kat] ECC-384
918,587 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,458 UART: [cold-reset] ++
1,172,988 UART: [fht] FHT @ 0x50003400
1,175,537 UART: [idev] ++
1,175,705 UART: [idev] CDI.KEYID = 6
1,176,065 UART: [idev] SUBJECT.KEYID = 7
1,176,489 UART: [idev] UDS.KEYID = 0
1,176,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,283 UART: [idev] Erasing UDS.KEYID = 0
1,201,712 UART: [idev] Sha1 KeyId Algorithm
1,210,164 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,218,028 UART: [ldev] Erasing FE.KEYID = 1
1,244,701 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,715 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,570 UART: [ldev] --
1,283,939 UART: [fwproc] Wait for Commands...
1,284,703 UART: [fwproc] Recv command 0x46574c44
1,285,431 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,759 UART: ROM Fatal Error: 0x000B0023
1,564,916 >>> mbox cmd response: failed
1,564,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,922 >>> mbox cmd response: failed
1,564,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,796 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,080 UART: [kat] SHA2-256
904,020 UART: [kat] SHA2-384
906,617 UART: [kat] SHA2-512-ACC
908,518 UART: [kat] ECC-384
918,241 UART: [kat] HMAC-384Kdf
923,013 UART: [kat] LMS
1,171,341 UART: [kat] --
1,172,540 UART: [cold-reset] ++
1,173,100 UART: [fht] FHT @ 0x50003400
1,175,787 UART: [idev] ++
1,175,955 UART: [idev] CDI.KEYID = 6
1,176,315 UART: [idev] SUBJECT.KEYID = 7
1,176,739 UART: [idev] UDS.KEYID = 0
1,177,084 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,575 UART: [idev] Erasing UDS.KEYID = 0
1,201,922 UART: [idev] Sha1 KeyId Algorithm
1,210,420 UART: [idev] --
1,211,616 UART: [ldev] ++
1,211,784 UART: [ldev] CDI.KEYID = 6
1,212,147 UART: [ldev] SUBJECT.KEYID = 5
1,212,573 UART: [ldev] AUTHORITY.KEYID = 7
1,213,036 UART: [ldev] FE.KEYID = 1
1,218,182 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,477 UART: [fwproc] Wait for Commands...
1,284,069 UART: [fwproc] Recv command 0x46574c44
1,284,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,901 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,396 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,566 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,817 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,301 >>> mbox cmd response: failed
1,419,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,307 >>> mbox cmd response: failed
1,419,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,612 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,304 UART:
192,659 UART: Running Caliptra ROM ...
193,859 UART:
194,012 UART: [state] CFI Enabled
261,409 UART: [state] LifecycleState = Unprovisioned
263,389 UART: [state] DebugLocked = No
264,775 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,427 UART: [kat] SHA2-256
439,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,592 UART: [kat] ++
450,185 UART: [kat] sha1
460,209 UART: [kat] SHA2-256
462,889 UART: [kat] SHA2-384
469,263 UART: [kat] SHA2-512-ACC
471,663 UART: [kat] ECC-384
2,764,905 UART: [kat] HMAC-384Kdf
2,777,593 UART: [kat] LMS
3,967,895 UART: [kat] --
3,970,918 UART: [cold-reset] ++
3,972,180 UART: [fht] Storing FHT @ 0x50003400
3,984,544 UART: [idev] ++
3,985,167 UART: [idev] CDI.KEYID = 6
3,986,077 UART: [idev] SUBJECT.KEYID = 7
3,987,397 UART: [idev] UDS.KEYID = 0
3,990,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,663 UART: [idev] Erasing UDS.KEYID = 0
7,327,380 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,952 UART: [idev] --
7,352,678 UART: [ldev] ++
7,353,251 UART: [ldev] CDI.KEYID = 6
7,354,194 UART: [ldev] SUBJECT.KEYID = 5
7,355,408 UART: [ldev] AUTHORITY.KEYID = 7
7,356,644 UART: [ldev] FE.KEYID = 1
7,399,731 UART: [ldev] Erasing FE.KEYID = 1
10,734,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,699 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,647 UART: [ldev] --
13,095,379 UART: [fwproc] Waiting for Commands...
13,097,979 UART: [fwproc] Received command 0x46574c44
13,100,229 UART: [fwproc] Received Image of size 118548 bytes
16,058,304 UART: ROM Fatal Error: 0x000B0024
16,061,767 >>> mbox cmd response: failed
16,062,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,062,482 >>> mbox cmd response: failed
16,062,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,063,063 >>> mbox cmd response: failed
Initializing fuses
2,057,070 writing to cptra_bootfsm_go
2,246,412 UART:
2,246,761 UART: Running Caliptra ROM ...
2,247,903 UART:
2,248,068 UART: [state] CFI Enabled
2,314,137 UART: [state] LifecycleState = Unprovisioned
2,316,033 UART: [state] DebugLocked = No
2,318,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,983 UART: [kat] SHA2-256
2,492,654 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,503,145 UART: [kat] ++
2,503,612 UART: [kat] sha1
2,515,255 UART: [kat] SHA2-256
2,517,961 UART: [kat] SHA2-384
2,524,115 UART: [kat] SHA2-512-ACC
2,526,443 UART: [kat] ECC-384
4,815,799 UART: [kat] HMAC-384Kdf
4,847,808 UART: [kat] LMS
6,038,068 UART: [kat] --
6,043,700 UART: [cold-reset] ++
6,044,727 UART: [fht] Storing FHT @ 0x50003400
6,054,861 UART: [idev] ++
6,055,428 UART: [idev] CDI.KEYID = 6
6,056,399 UART: [idev] SUBJECT.KEYID = 7
6,057,620 UART: [idev] UDS.KEYID = 0
6,060,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,194 UART: [idev] Erasing UDS.KEYID = 0
9,390,471 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,665 UART: [idev] --
9,416,230 UART: [ldev] ++
9,416,800 UART: [ldev] CDI.KEYID = 6
9,417,788 UART: [ldev] SUBJECT.KEYID = 5
9,419,007 UART: [ldev] AUTHORITY.KEYID = 7
9,420,255 UART: [ldev] FE.KEYID = 1
9,450,146 UART: [ldev] Erasing FE.KEYID = 1
12,785,114 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,127,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,271 UART: [ldev] --
15,164,834 UART: [fwproc] Waiting for Commands...
15,167,531 UART: [fwproc] Received command 0x46574c44
15,169,786 UART: [fwproc] Received Image of size 118548 bytes
19,279,505 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,357,009 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,430,204 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,498 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,787,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,869,059 >>> mbox cmd response: failed
15,869,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,870,004 >>> mbox cmd response: failed
15,870,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,870,576 >>> mbox cmd response: failed
Initializing fuses
2,057,259 writing to cptra_bootfsm_go
5,836,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,987,759 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
192,407 UART:
192,774 UART: Running Caliptra ROM ...
193,985 UART:
603,420 UART: [state] CFI Enabled
615,132 UART: [state] LifecycleState = Unprovisioned
617,025 UART: [state] DebugLocked = No
618,653 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,462 UART: [kat] SHA2-256
793,188 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,724 UART: [kat] ++
804,212 UART: [kat] sha1
815,416 UART: [kat] SHA2-256
818,130 UART: [kat] SHA2-384
824,713 UART: [kat] SHA2-512-ACC
827,064 UART: [kat] ECC-384
3,112,848 UART: [kat] HMAC-384Kdf
3,124,606 UART: [kat] LMS
4,314,744 UART: [kat] --
4,316,405 UART: [cold-reset] ++
4,318,522 UART: [fht] Storing FHT @ 0x50003400
4,329,802 UART: [idev] ++
4,330,381 UART: [idev] CDI.KEYID = 6
4,331,300 UART: [idev] SUBJECT.KEYID = 7
4,332,580 UART: [idev] UDS.KEYID = 0
4,335,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,451 UART: [idev] Erasing UDS.KEYID = 0
7,618,927 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,751 UART: [idev] --
7,644,856 UART: [ldev] ++
7,645,490 UART: [ldev] CDI.KEYID = 6
7,646,408 UART: [ldev] SUBJECT.KEYID = 5
7,647,634 UART: [ldev] AUTHORITY.KEYID = 7
7,648,873 UART: [ldev] FE.KEYID = 1
7,658,340 UART: [ldev] Erasing FE.KEYID = 1
10,943,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,480 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,299,774 UART: [ldev] --
13,305,049 UART: [fwproc] Waiting for Commands...
13,306,890 UART: [fwproc] Received command 0x46574c44
13,309,087 UART: [fwproc] Received Image of size 118548 bytes
16,269,126 UART: ROM Fatal Error: 0x000B0024
16,272,585 >>> mbox cmd response: failed
16,273,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,273,409 >>> mbox cmd response: failed
16,273,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,274,104 >>> mbox cmd response: failed
Initializing fuses
2,058,986 writing to cptra_bootfsm_go
2,248,294 UART:
2,248,644 UART: Running Caliptra ROM ...
2,249,790 UART:
4,179,386 UART: [state] CFI Enabled
4,193,157 UART: [state] LifecycleState = Unprovisioned
4,195,086 UART: [state] DebugLocked = No
4,197,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,202,134 UART: [kat] SHA2-256
4,371,882 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,382,465 UART: [kat] ++
4,383,012 UART: [kat] sha1
4,394,242 UART: [kat] SHA2-256
4,396,996 UART: [kat] SHA2-384
4,403,046 UART: [kat] SHA2-512-ACC
4,405,405 UART: [kat] ECC-384
6,688,877 UART: [kat] HMAC-384Kdf
6,699,865 UART: [kat] LMS
7,889,946 UART: [kat] --
7,895,862 UART: [cold-reset] ++
7,897,262 UART: [fht] Storing FHT @ 0x50003400
7,908,970 UART: [idev] ++
7,909,543 UART: [idev] CDI.KEYID = 6
7,910,463 UART: [idev] SUBJECT.KEYID = 7
7,911,623 UART: [idev] UDS.KEYID = 0
7,914,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,063,310 UART: [idev] Erasing UDS.KEYID = 0
11,196,566 UART: [idev] Using Sha1 for KeyId Algorithm
11,218,758 UART: [idev] --
11,222,161 UART: [ldev] ++
11,222,794 UART: [ldev] CDI.KEYID = 6
11,223,707 UART: [ldev] SUBJECT.KEYID = 5
11,224,983 UART: [ldev] AUTHORITY.KEYID = 7
11,226,226 UART: [ldev] FE.KEYID = 1
11,236,186 UART: [ldev] Erasing FE.KEYID = 1
14,527,852 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,820,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,834,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,849,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,864,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,883,475 UART: [ldev] --
16,889,128 UART: [fwproc] Waiting for Commands...
16,892,215 UART: [fwproc] Received command 0x46574c44
16,894,407 UART: [fwproc] Received Image of size 118548 bytes
20,992,998 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,072,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,145,533 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,474,695 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
4,131,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,067,920 >>> mbox cmd response: failed
16,068,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,068,837 >>> mbox cmd response: failed
16,069,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,069,416 >>> mbox cmd response: failed
Initializing fuses
2,057,171 writing to cptra_bootfsm_go
7,931,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,979,729 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
192,261 UART:
192,636 UART: Running Caliptra ROM ...
193,794 UART:
193,946 UART: [state] CFI Enabled
261,044 UART: [state] LifecycleState = Unprovisioned
263,041 UART: [state] DebugLocked = No
264,487 UART: [state] WD Timer not started. Device not locked for debugging
268,352 UART: [kat] SHA2-256
448,018 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,786 UART: [kat] ++
459,275 UART: [kat] sha1
470,756 UART: [kat] SHA2-256
473,447 UART: [kat] SHA2-384
478,569 UART: [kat] SHA2-512-ACC
480,962 UART: [kat] ECC-384
2,948,486 UART: [kat] HMAC-384Kdf
2,969,570 UART: [kat] LMS
3,446,077 UART: [kat] --
3,449,863 UART: [cold-reset] ++
3,451,479 UART: [fht] FHT @ 0x50003400
3,462,179 UART: [idev] ++
3,462,817 UART: [idev] CDI.KEYID = 6
3,463,748 UART: [idev] SUBJECT.KEYID = 7
3,464,971 UART: [idev] UDS.KEYID = 0
3,467,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,755 UART: [idev] Erasing UDS.KEYID = 0
5,986,503 UART: [idev] Sha1 KeyId Algorithm
6,010,564 UART: [idev] --
6,015,161 UART: [ldev] ++
6,015,735 UART: [ldev] CDI.KEYID = 6
6,016,655 UART: [ldev] SUBJECT.KEYID = 5
6,017,901 UART: [ldev] AUTHORITY.KEYID = 7
6,019,164 UART: [ldev] FE.KEYID = 1
6,056,069 UART: [ldev] Erasing FE.KEYID = 1
8,564,187 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,052 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,906 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,103 UART: [ldev] --
10,373,807 UART: [fwproc] Wait for Commands...
10,375,376 UART: [fwproc] Recv command 0x46574c44
10,377,425 UART: [fwproc] Recv'd Img size: 118548 bytes
12,699,064 UART: ROM Fatal Error: 0x000B0024
12,702,305 >>> mbox cmd response: failed
12,702,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,102 >>> mbox cmd response: failed
12,703,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,703,672 >>> mbox cmd response: failed
Initializing fuses
2,060,732 writing to cptra_bootfsm_go
2,250,053 UART:
2,250,394 UART: Running Caliptra ROM ...
2,251,534 UART:
2,251,714 UART: [state] CFI Enabled
2,325,354 UART: [state] LifecycleState = Unprovisioned
2,327,292 UART: [state] DebugLocked = No
2,328,499 UART: [state] WD Timer not started. Device not locked for debugging
2,332,190 UART: [kat] SHA2-256
2,511,847 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,522,606 UART: [kat] ++
2,523,080 UART: [kat] sha1
2,534,840 UART: [kat] SHA2-256
2,537,545 UART: [kat] SHA2-384
2,543,218 UART: [kat] SHA2-512-ACC
2,545,570 UART: [kat] ECC-384
5,008,146 UART: [kat] HMAC-384Kdf
5,031,381 UART: [kat] LMS
5,507,896 UART: [kat] --
5,511,082 UART: [cold-reset] ++
5,512,427 UART: [fht] FHT @ 0x50003400
5,522,595 UART: [idev] ++
5,523,161 UART: [idev] CDI.KEYID = 6
5,524,155 UART: [idev] SUBJECT.KEYID = 7
5,525,374 UART: [idev] UDS.KEYID = 0
5,527,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,997 UART: [idev] Erasing UDS.KEYID = 0
8,048,835 UART: [idev] Sha1 KeyId Algorithm
8,072,395 UART: [idev] --
8,077,371 UART: [ldev] ++
8,077,946 UART: [ldev] CDI.KEYID = 6
8,078,843 UART: [ldev] SUBJECT.KEYID = 5
8,080,059 UART: [ldev] AUTHORITY.KEYID = 7
8,081,374 UART: [ldev] FE.KEYID = 1
8,119,243 UART: [ldev] Erasing FE.KEYID = 1
10,629,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,361,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,377,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,393,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,409,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,431,523 UART: [ldev] --
12,437,175 UART: [fwproc] Wait for Commands...
12,440,347 UART: [fwproc] Recv command 0x46574c44
12,442,350 UART: [fwproc] Recv'd Img size: 118548 bytes
15,929,338 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,005,932 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,078,959 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,406,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,463,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,599,085 >>> mbox cmd response: failed
12,599,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,600,190 >>> mbox cmd response: failed
12,600,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,600,769 >>> mbox cmd response: failed
Initializing fuses
2,060,600 writing to cptra_bootfsm_go
5,516,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,266,436 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,541 writing to cptra_bootfsm_go
192,902 UART:
193,260 UART: Running Caliptra ROM ...
194,485 UART:
603,941 UART: [state] CFI Enabled
618,317 UART: [state] LifecycleState = Unprovisioned
620,233 UART: [state] DebugLocked = No
621,517 UART: [state] WD Timer not started. Device not locked for debugging
625,981 UART: [kat] SHA2-256
805,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,424 UART: [kat] ++
816,944 UART: [kat] sha1
828,204 UART: [kat] SHA2-256
830,902 UART: [kat] SHA2-384
836,772 UART: [kat] SHA2-512-ACC
839,114 UART: [kat] ECC-384
3,282,418 UART: [kat] HMAC-384Kdf
3,295,481 UART: [kat] LMS
3,772,008 UART: [kat] --
3,776,613 UART: [cold-reset] ++
3,778,721 UART: [fht] FHT @ 0x50003400
3,788,784 UART: [idev] ++
3,789,411 UART: [idev] CDI.KEYID = 6
3,790,325 UART: [idev] SUBJECT.KEYID = 7
3,791,598 UART: [idev] UDS.KEYID = 0
3,794,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,178 UART: [idev] Erasing UDS.KEYID = 0
6,266,152 UART: [idev] Sha1 KeyId Algorithm
6,289,937 UART: [idev] --
6,295,710 UART: [ldev] ++
6,296,328 UART: [ldev] CDI.KEYID = 6
6,297,418 UART: [ldev] SUBJECT.KEYID = 5
6,298,528 UART: [ldev] AUTHORITY.KEYID = 7
6,299,707 UART: [ldev] FE.KEYID = 1
6,312,950 UART: [ldev] Erasing FE.KEYID = 1
8,793,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,780 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,064 UART: [ldev] --
10,589,769 UART: [fwproc] Wait for Commands...
10,591,441 UART: [fwproc] Recv command 0x46574c44
10,593,512 UART: [fwproc] Recv'd Img size: 118548 bytes
12,916,061 UART: ROM Fatal Error: 0x000B0024
12,919,294 >>> mbox cmd response: failed
12,919,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,058 >>> mbox cmd response: failed
12,920,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,920,627 >>> mbox cmd response: failed
Initializing fuses
2,060,001 writing to cptra_bootfsm_go
2,249,318 UART:
2,249,664 UART: Running Caliptra ROM ...
2,250,805 UART:
7,534,194 UART: [state] CFI Enabled
7,547,060 UART: [state] LifecycleState = Unprovisioned
7,549,000 UART: [state] DebugLocked = No
7,550,322 UART: [state] WD Timer not started. Device not locked for debugging
7,554,183 UART: [kat] SHA2-256
7,733,840 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,744,638 UART: [kat] ++
7,745,105 UART: [kat] sha1
7,755,185 UART: [kat] SHA2-256
7,757,880 UART: [kat] SHA2-384
7,764,578 UART: [kat] SHA2-512-ACC
7,766,932 UART: [kat] ECC-384
10,206,555 UART: [kat] HMAC-384Kdf
10,219,137 UART: [kat] LMS
10,695,650 UART: [kat] --
10,699,879 UART: [cold-reset] ++
10,700,730 UART: [fht] FHT @ 0x50003400
10,713,574 UART: [idev] ++
10,714,156 UART: [idev] CDI.KEYID = 6
10,715,177 UART: [idev] SUBJECT.KEYID = 7
10,716,293 UART: [idev] UDS.KEYID = 0
10,718,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,867,794 UART: [idev] Erasing UDS.KEYID = 0
13,194,230 UART: [idev] Sha1 KeyId Algorithm
13,217,758 UART: [idev] --
13,222,923 UART: [ldev] ++
13,223,504 UART: [ldev] CDI.KEYID = 6
13,224,419 UART: [ldev] SUBJECT.KEYID = 5
13,225,635 UART: [ldev] AUTHORITY.KEYID = 7
13,226,870 UART: [ldev] FE.KEYID = 1
13,238,816 UART: [ldev] Erasing FE.KEYID = 1
15,716,185 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,439,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,454,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,470,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,486,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,508,346 UART: [ldev] --
17,514,213 UART: [fwproc] Wait for Commands...
17,516,268 UART: [fwproc] Recv command 0x46574c44
17,518,264 UART: [fwproc] Recv'd Img size: 118548 bytes
21,002,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,078,116 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,151,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,478,921 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,789,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,815,499 >>> mbox cmd response: failed
12,816,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,816,368 >>> mbox cmd response: failed
12,816,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,816,963 >>> mbox cmd response: failed
Initializing fuses
2,060,370 writing to cptra_bootfsm_go
10,828,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,497,847 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,442 UART:
192,853 UART: Running Caliptra ROM ...
194,000 UART:
194,163 UART: [state] CFI Enabled
263,122 UART: [state] LifecycleState = Unprovisioned
265,539 UART: [state] DebugLocked = No
266,932 UART: [state] WD Timer not started. Device not locked for debugging
272,133 UART: [kat] SHA2-256
461,988 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,762 UART: [kat] ++
473,244 UART: [kat] sha1
484,234 UART: [kat] SHA2-256
487,271 UART: [kat] SHA2-384
492,176 UART: [kat] SHA2-512-ACC
494,791 UART: [kat] ECC-384
2,945,507 UART: [kat] HMAC-384Kdf
2,971,296 UART: [kat] LMS
3,503,041 UART: [kat] --
3,510,013 UART: [cold-reset] ++
3,511,897 UART: [fht] FHT @ 0x50003400
3,522,235 UART: [idev] ++
3,522,924 UART: [idev] CDI.KEYID = 6
3,523,891 UART: [idev] SUBJECT.KEYID = 7
3,525,111 UART: [idev] UDS.KEYID = 0
3,528,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,303 UART: [idev] Erasing UDS.KEYID = 0
6,029,466 UART: [idev] Sha1 KeyId Algorithm
6,052,218 UART: [idev] --
6,056,463 UART: [ldev] ++
6,057,161 UART: [ldev] CDI.KEYID = 6
6,058,079 UART: [ldev] SUBJECT.KEYID = 5
6,059,800 UART: [ldev] AUTHORITY.KEYID = 7
6,061,006 UART: [ldev] FE.KEYID = 1
6,098,941 UART: [ldev] Erasing FE.KEYID = 1
8,607,421 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,423 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,792 UART: [ldev] --
10,415,658 UART: [fwproc] Wait for Commands...
10,418,896 UART: [fwproc] Recv command 0x46574c44
10,421,215 UART: [fwproc] Recv'd Img size: 118548 bytes
12,758,676 UART: ROM Fatal Error: 0x000B0024
12,762,314 >>> mbox cmd response: failed
12,762,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,763,089 >>> mbox cmd response: failed
12,763,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,763,658 >>> mbox cmd response: failed
Initializing fuses
2,068,293 writing to cptra_bootfsm_go
2,257,679 UART:
2,258,031 UART: Running Caliptra ROM ...
2,259,184 UART:
2,259,361 UART: [state] CFI Enabled
2,327,264 UART: [state] LifecycleState = Unprovisioned
2,329,602 UART: [state] DebugLocked = No
2,331,640 UART: [state] WD Timer not started. Device not locked for debugging
2,335,567 UART: [kat] SHA2-256
2,525,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,536,195 UART: [kat] ++
2,536,750 UART: [kat] sha1
2,546,842 UART: [kat] SHA2-256
2,549,874 UART: [kat] SHA2-384
2,555,010 UART: [kat] SHA2-512-ACC
2,557,637 UART: [kat] ECC-384
5,007,980 UART: [kat] HMAC-384Kdf
5,031,674 UART: [kat] LMS
5,563,405 UART: [kat] --
5,567,852 UART: [cold-reset] ++
5,568,770 UART: [fht] FHT @ 0x50003400
5,580,133 UART: [idev] ++
5,580,813 UART: [idev] CDI.KEYID = 6
5,581,787 UART: [idev] SUBJECT.KEYID = 7
5,582,971 UART: [idev] UDS.KEYID = 0
5,585,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,734,539 UART: [idev] Erasing UDS.KEYID = 0
8,086,479 UART: [idev] Sha1 KeyId Algorithm
8,108,736 UART: [idev] --
8,112,398 UART: [ldev] ++
8,113,096 UART: [ldev] CDI.KEYID = 6
8,114,033 UART: [ldev] SUBJECT.KEYID = 5
8,115,201 UART: [ldev] AUTHORITY.KEYID = 7
8,116,439 UART: [ldev] FE.KEYID = 1
8,158,853 UART: [ldev] Erasing FE.KEYID = 1
10,661,874 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,367 UART: [ldev] --
12,469,537 UART: [fwproc] Wait for Commands...
12,472,776 UART: [fwproc] Recv command 0x46574c44
12,475,040 UART: [fwproc] Recv'd Img size: 118548 bytes
15,971,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,051,134 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,174,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,125 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,437,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,665,392 >>> mbox cmd response: failed
12,665,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,282 >>> mbox cmd response: failed
12,666,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,859 >>> mbox cmd response: failed
Initializing fuses
2,063,940 writing to cptra_bootfsm_go
5,492,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,872,270 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
192,557 UART:
192,929 UART: Running Caliptra ROM ...
194,066 UART:
603,761 UART: [state] CFI Enabled
617,039 UART: [state] LifecycleState = Unprovisioned
619,374 UART: [state] DebugLocked = No
620,650 UART: [state] WD Timer not started. Device not locked for debugging
624,766 UART: [kat] SHA2-256
814,687 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,479 UART: [kat] ++
825,932 UART: [kat] sha1
836,603 UART: [kat] SHA2-256
839,622 UART: [kat] SHA2-384
845,936 UART: [kat] SHA2-512-ACC
848,507 UART: [kat] ECC-384
3,294,396 UART: [kat] HMAC-384Kdf
3,307,739 UART: [kat] LMS
3,839,577 UART: [kat] --
3,844,501 UART: [cold-reset] ++
3,846,127 UART: [fht] FHT @ 0x50003400
3,856,843 UART: [idev] ++
3,857,559 UART: [idev] CDI.KEYID = 6
3,858,498 UART: [idev] SUBJECT.KEYID = 7
3,859,668 UART: [idev] UDS.KEYID = 0
3,862,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,659 UART: [idev] Erasing UDS.KEYID = 0
6,339,056 UART: [idev] Sha1 KeyId Algorithm
6,361,227 UART: [idev] --
6,365,608 UART: [ldev] ++
6,366,297 UART: [ldev] CDI.KEYID = 6
6,367,214 UART: [ldev] SUBJECT.KEYID = 5
6,368,400 UART: [ldev] AUTHORITY.KEYID = 7
6,369,580 UART: [ldev] FE.KEYID = 1
6,380,823 UART: [ldev] Erasing FE.KEYID = 1
8,863,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,592 UART: [ldev] --
10,650,701 UART: [fwproc] Wait for Commands...
10,653,196 UART: [fwproc] Recv command 0x46574c44
10,655,568 UART: [fwproc] Recv'd Img size: 118548 bytes
12,995,437 UART: ROM Fatal Error: 0x000B0024
12,999,099 >>> mbox cmd response: failed
12,999,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,999,916 >>> mbox cmd response: failed
13,000,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,000,522 >>> mbox cmd response: failed
Initializing fuses
2,070,981 writing to cptra_bootfsm_go
2,260,295 UART:
2,260,646 UART: Running Caliptra ROM ...
2,261,789 UART:
7,453,300 UART: [state] CFI Enabled
7,469,291 UART: [state] LifecycleState = Unprovisioned
7,471,655 UART: [state] DebugLocked = No
7,474,295 UART: [state] WD Timer not started. Device not locked for debugging
7,478,385 UART: [kat] SHA2-256
7,668,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,679,064 UART: [kat] ++
7,679,618 UART: [kat] sha1
7,691,057 UART: [kat] SHA2-256
7,694,092 UART: [kat] SHA2-384
7,699,067 UART: [kat] SHA2-512-ACC
7,701,641 UART: [kat] ECC-384
10,144,733 UART: [kat] HMAC-384Kdf
10,158,157 UART: [kat] LMS
10,689,967 UART: [kat] --
10,693,738 UART: [cold-reset] ++
10,695,163 UART: [fht] FHT @ 0x50003400
10,706,753 UART: [idev] ++
10,707,440 UART: [idev] CDI.KEYID = 6
10,708,352 UART: [idev] SUBJECT.KEYID = 7
10,709,570 UART: [idev] UDS.KEYID = 0
10,711,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,860,941 UART: [idev] Erasing UDS.KEYID = 0
13,186,740 UART: [idev] Sha1 KeyId Algorithm
13,208,228 UART: [idev] --
13,213,144 UART: [ldev] ++
13,213,827 UART: [ldev] CDI.KEYID = 6
13,214,715 UART: [ldev] SUBJECT.KEYID = 5
13,215,927 UART: [ldev] AUTHORITY.KEYID = 7
13,217,166 UART: [ldev] FE.KEYID = 1
13,227,466 UART: [ldev] Erasing FE.KEYID = 1
15,709,317 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,426,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,442,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,457,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,472,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,492,512 UART: [ldev] --
17,498,473 UART: [fwproc] Wait for Commands...
17,500,322 UART: [fwproc] Recv command 0x46574c44
17,502,672 UART: [fwproc] Recv'd Img size: 118548 bytes
21,002,500 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,077,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,201,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,760,961 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,761,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,883,936 >>> mbox cmd response: failed
12,884,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,884,835 >>> mbox cmd response: failed
12,885,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,885,401 >>> mbox cmd response: failed
Initializing fuses
2,062,149 writing to cptra_bootfsm_go
10,733,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,012,183 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,333 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,017 UART: [kat] SHA2-256
881,948 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,063 UART: [kat] ++
886,215 UART: [kat] sha1
890,475 UART: [kat] SHA2-256
892,413 UART: [kat] SHA2-384
894,968 UART: [kat] SHA2-512-ACC
896,869 UART: [kat] ECC-384
902,570 UART: [kat] HMAC-384Kdf
907,274 UART: [kat] LMS
1,475,470 UART: [kat] --
1,476,075 UART: [cold-reset] ++
1,476,413 UART: [fht] Storing FHT @ 0x50003400
1,479,234 UART: [idev] ++
1,479,402 UART: [idev] CDI.KEYID = 6
1,479,762 UART: [idev] SUBJECT.KEYID = 7
1,480,186 UART: [idev] UDS.KEYID = 0
1,480,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,220 UART: [idev] Erasing UDS.KEYID = 0
1,504,382 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,381 UART: [ldev] ++
1,514,549 UART: [ldev] CDI.KEYID = 6
1,514,912 UART: [ldev] SUBJECT.KEYID = 5
1,515,338 UART: [ldev] AUTHORITY.KEYID = 7
1,515,801 UART: [ldev] FE.KEYID = 1
1,520,979 UART: [ldev] Erasing FE.KEYID = 1
1,545,866 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,786 UART: [ldev] --
1,585,125 UART: [fwproc] Waiting for Commands...
1,585,888 UART: [fwproc] Received command 0x46574c44
1,586,679 UART: [fwproc] Received Image of size 118548 bytes
1,866,614 UART: ROM Fatal Error: 0x000B0024
1,867,771 >>> mbox cmd response: failed
1,867,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,777 >>> mbox cmd response: failed
1,867,777 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,783 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,094 UART: [state] LifecycleState = Unprovisioned
85,749 UART: [state] DebugLocked = No
86,455 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,983 UART: [kat] SHA2-256
881,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,029 UART: [kat] ++
886,181 UART: [kat] sha1
890,521 UART: [kat] SHA2-256
892,459 UART: [kat] SHA2-384
895,246 UART: [kat] SHA2-512-ACC
897,147 UART: [kat] ECC-384
902,494 UART: [kat] HMAC-384Kdf
906,858 UART: [kat] LMS
1,475,054 UART: [kat] --
1,475,895 UART: [cold-reset] ++
1,476,281 UART: [fht] Storing FHT @ 0x50003400
1,478,992 UART: [idev] ++
1,479,160 UART: [idev] CDI.KEYID = 6
1,479,520 UART: [idev] SUBJECT.KEYID = 7
1,479,944 UART: [idev] UDS.KEYID = 0
1,480,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,994 UART: [idev] Erasing UDS.KEYID = 0
1,504,848 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,474 UART: [idev] --
1,514,439 UART: [ldev] ++
1,514,607 UART: [ldev] CDI.KEYID = 6
1,514,970 UART: [ldev] SUBJECT.KEYID = 5
1,515,396 UART: [ldev] AUTHORITY.KEYID = 7
1,515,859 UART: [ldev] FE.KEYID = 1
1,520,871 UART: [ldev] Erasing FE.KEYID = 1
1,546,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,879 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,464 UART: [ldev] --
1,585,773 UART: [fwproc] Waiting for Commands...
1,586,458 UART: [fwproc] Received command 0x46574c44
1,587,249 UART: [fwproc] Received Image of size 118548 bytes
2,931,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,958 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,176 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,555 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,296 >>> mbox cmd response: failed
1,719,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,302 >>> mbox cmd response: failed
1,719,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,308 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,177 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,294 UART: [kat] SHA2-256
882,225 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,340 UART: [kat] ++
886,492 UART: [kat] sha1
890,854 UART: [kat] SHA2-256
892,792 UART: [kat] SHA2-384
895,569 UART: [kat] SHA2-512-ACC
897,470 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,671 UART: [kat] LMS
1,475,867 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,464 UART: [fht] Storing FHT @ 0x50003400
1,480,449 UART: [idev] ++
1,480,617 UART: [idev] CDI.KEYID = 6
1,480,977 UART: [idev] SUBJECT.KEYID = 7
1,481,401 UART: [idev] UDS.KEYID = 0
1,481,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,743 UART: [idev] Erasing UDS.KEYID = 0
1,506,567 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,335 UART: [idev] --
1,516,414 UART: [ldev] ++
1,516,582 UART: [ldev] CDI.KEYID = 6
1,516,945 UART: [ldev] SUBJECT.KEYID = 5
1,517,371 UART: [ldev] AUTHORITY.KEYID = 7
1,517,834 UART: [ldev] FE.KEYID = 1
1,523,170 UART: [ldev] Erasing FE.KEYID = 1
1,548,571 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,451 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,355 UART: [ldev] --
1,587,782 UART: [fwproc] Waiting for Commands...
1,588,509 UART: [fwproc] Received command 0x46574c44
1,589,300 UART: [fwproc] Received Image of size 118548 bytes
1,869,395 UART: ROM Fatal Error: 0x000B0024
1,870,552 >>> mbox cmd response: failed
1,870,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,558 >>> mbox cmd response: failed
1,870,558 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,870,564 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,779 UART: [state] LifecycleState = Unprovisioned
86,434 UART: [state] DebugLocked = No
87,056 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,584 UART: [kat] SHA2-256
882,515 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,630 UART: [kat] ++
886,782 UART: [kat] sha1
891,100 UART: [kat] SHA2-256
893,038 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
903,479 UART: [kat] HMAC-384Kdf
908,143 UART: [kat] LMS
1,476,339 UART: [kat] --
1,477,240 UART: [cold-reset] ++
1,477,608 UART: [fht] Storing FHT @ 0x50003400
1,480,281 UART: [idev] ++
1,480,449 UART: [idev] CDI.KEYID = 6
1,480,809 UART: [idev] SUBJECT.KEYID = 7
1,481,233 UART: [idev] UDS.KEYID = 0
1,481,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,291 UART: [idev] Erasing UDS.KEYID = 0
1,505,897 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,587 UART: [idev] --
1,515,562 UART: [ldev] ++
1,515,730 UART: [ldev] CDI.KEYID = 6
1,516,093 UART: [ldev] SUBJECT.KEYID = 5
1,516,519 UART: [ldev] AUTHORITY.KEYID = 7
1,516,982 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,548,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,101 UART: [ldev] --
1,587,490 UART: [fwproc] Waiting for Commands...
1,588,183 UART: [fwproc] Received command 0x46574c44
1,588,974 UART: [fwproc] Received Image of size 118548 bytes
2,932,749 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,435 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,653 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,056 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,721,265 >>> mbox cmd response: failed
1,721,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,271 >>> mbox cmd response: failed
1,721,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,721,277 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,430 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,549 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,696 UART: [kat] SHA2-256
901,636 UART: [kat] SHA2-384
904,581 UART: [kat] SHA2-512-ACC
906,482 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,731 UART: [kat] LMS
1,169,043 UART: [kat] --
1,169,656 UART: [cold-reset] ++
1,169,984 UART: [fht] FHT @ 0x50003400
1,172,728 UART: [idev] ++
1,172,896 UART: [idev] CDI.KEYID = 6
1,173,257 UART: [idev] SUBJECT.KEYID = 7
1,173,682 UART: [idev] UDS.KEYID = 0
1,174,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,427 UART: [idev] Erasing UDS.KEYID = 0
1,198,803 UART: [idev] Sha1 KeyId Algorithm
1,207,579 UART: [idev] --
1,208,624 UART: [ldev] ++
1,208,792 UART: [ldev] CDI.KEYID = 6
1,209,156 UART: [ldev] SUBJECT.KEYID = 5
1,209,583 UART: [ldev] AUTHORITY.KEYID = 7
1,210,046 UART: [ldev] FE.KEYID = 1
1,215,370 UART: [ldev] Erasing FE.KEYID = 1
1,241,511 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,616 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,322 UART: [ldev] --
1,280,637 UART: [fwproc] Wait for Commands...
1,281,232 UART: [fwproc] Recv command 0x46574c44
1,281,965 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,290 UART: ROM Fatal Error: 0x000B0024
1,562,447 >>> mbox cmd response: failed
1,562,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,453 >>> mbox cmd response: failed
1,562,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,388 UART: [state] LifecycleState = Unprovisioned
86,043 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,950 UART: [kat] SHA2-256
891,500 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,604 UART: [kat] ++
895,756 UART: [kat] sha1
899,812 UART: [kat] SHA2-256
901,752 UART: [kat] SHA2-384
904,371 UART: [kat] SHA2-512-ACC
906,272 UART: [kat] ECC-384
915,513 UART: [kat] HMAC-384Kdf
920,087 UART: [kat] LMS
1,168,399 UART: [kat] --
1,169,092 UART: [cold-reset] ++
1,169,618 UART: [fht] FHT @ 0x50003400
1,172,450 UART: [idev] ++
1,172,618 UART: [idev] CDI.KEYID = 6
1,172,979 UART: [idev] SUBJECT.KEYID = 7
1,173,404 UART: [idev] UDS.KEYID = 0
1,173,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,289 UART: [idev] Erasing UDS.KEYID = 0
1,198,149 UART: [idev] Sha1 KeyId Algorithm
1,206,999 UART: [idev] --
1,207,980 UART: [ldev] ++
1,208,148 UART: [ldev] CDI.KEYID = 6
1,208,512 UART: [ldev] SUBJECT.KEYID = 5
1,208,939 UART: [ldev] AUTHORITY.KEYID = 7
1,209,402 UART: [ldev] FE.KEYID = 1
1,214,776 UART: [ldev] Erasing FE.KEYID = 1
1,241,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,052 UART: [ldev] --
1,280,439 UART: [fwproc] Wait for Commands...
1,281,110 UART: [fwproc] Recv command 0x46574c44
1,281,843 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,195 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,190 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,556 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,896 >>> mbox cmd response: failed
1,417,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,902 >>> mbox cmd response: failed
1,417,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,908 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,023 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
86,986 UART: [state] WD Timer not started. Device not locked for debugging
88,127 UART: [kat] SHA2-256
891,677 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,781 UART: [kat] ++
895,933 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,728 UART: [kat] SHA2-512-ACC
906,629 UART: [kat] ECC-384
916,596 UART: [kat] HMAC-384Kdf
921,350 UART: [kat] LMS
1,169,662 UART: [kat] --
1,170,475 UART: [cold-reset] ++
1,171,001 UART: [fht] FHT @ 0x50003400
1,173,625 UART: [idev] ++
1,173,793 UART: [idev] CDI.KEYID = 6
1,174,154 UART: [idev] SUBJECT.KEYID = 7
1,174,579 UART: [idev] UDS.KEYID = 0
1,174,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,694 UART: [idev] Erasing UDS.KEYID = 0
1,199,128 UART: [idev] Sha1 KeyId Algorithm
1,207,994 UART: [idev] --
1,208,915 UART: [ldev] ++
1,209,083 UART: [ldev] CDI.KEYID = 6
1,209,447 UART: [ldev] SUBJECT.KEYID = 5
1,209,874 UART: [ldev] AUTHORITY.KEYID = 7
1,210,337 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,241,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,736 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,625 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,337 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,343 UART: [ldev] --
1,280,642 UART: [fwproc] Wait for Commands...
1,281,379 UART: [fwproc] Recv command 0x46574c44
1,282,112 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,715 UART: ROM Fatal Error: 0x000B0024
1,562,872 >>> mbox cmd response: failed
1,562,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,878 >>> mbox cmd response: failed
1,562,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,884 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,675 UART: [state] LifecycleState = Unprovisioned
85,330 UART: [state] DebugLocked = No
85,878 UART: [state] WD Timer not started. Device not locked for debugging
87,027 UART: [kat] SHA2-256
890,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,681 UART: [kat] ++
894,833 UART: [kat] sha1
898,919 UART: [kat] SHA2-256
900,859 UART: [kat] SHA2-384
903,620 UART: [kat] SHA2-512-ACC
905,521 UART: [kat] ECC-384
915,446 UART: [kat] HMAC-384Kdf
920,032 UART: [kat] LMS
1,168,344 UART: [kat] --
1,169,291 UART: [cold-reset] ++
1,169,803 UART: [fht] FHT @ 0x50003400
1,172,439 UART: [idev] ++
1,172,607 UART: [idev] CDI.KEYID = 6
1,172,968 UART: [idev] SUBJECT.KEYID = 7
1,173,393 UART: [idev] UDS.KEYID = 0
1,173,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,252 UART: [idev] Erasing UDS.KEYID = 0
1,198,102 UART: [idev] Sha1 KeyId Algorithm
1,206,938 UART: [idev] --
1,208,005 UART: [ldev] ++
1,208,173 UART: [ldev] CDI.KEYID = 6
1,208,537 UART: [ldev] SUBJECT.KEYID = 5
1,208,964 UART: [ldev] AUTHORITY.KEYID = 7
1,209,427 UART: [ldev] FE.KEYID = 1
1,214,843 UART: [ldev] Erasing FE.KEYID = 1
1,240,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,173 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,885 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,179 UART: [ldev] --
1,280,578 UART: [fwproc] Wait for Commands...
1,281,153 UART: [fwproc] Recv command 0x46574c44
1,281,886 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,092 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,411 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,417,065 >>> mbox cmd response: failed
1,417,065 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,071 >>> mbox cmd response: failed
1,417,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,417,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,404 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,704 UART: [state] LifecycleState = Unprovisioned
86,359 UART: [state] DebugLocked = No
87,063 UART: [state] WD Timer not started. Device not locked for debugging
88,172 UART: [kat] SHA2-256
893,822 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,947 UART: [kat] ++
898,099 UART: [kat] sha1
902,179 UART: [kat] SHA2-256
904,119 UART: [kat] SHA2-384
906,996 UART: [kat] SHA2-512-ACC
908,897 UART: [kat] ECC-384
918,412 UART: [kat] HMAC-384Kdf
923,008 UART: [kat] LMS
1,171,336 UART: [kat] --
1,172,313 UART: [cold-reset] ++
1,172,765 UART: [fht] FHT @ 0x50003400
1,175,616 UART: [idev] ++
1,175,784 UART: [idev] CDI.KEYID = 6
1,176,144 UART: [idev] SUBJECT.KEYID = 7
1,176,568 UART: [idev] UDS.KEYID = 0
1,176,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,510 UART: [idev] Erasing UDS.KEYID = 0
1,202,091 UART: [idev] Sha1 KeyId Algorithm
1,210,703 UART: [idev] --
1,211,711 UART: [ldev] ++
1,211,879 UART: [ldev] CDI.KEYID = 6
1,212,242 UART: [ldev] SUBJECT.KEYID = 5
1,212,668 UART: [ldev] AUTHORITY.KEYID = 7
1,213,131 UART: [ldev] FE.KEYID = 1
1,218,669 UART: [ldev] Erasing FE.KEYID = 1
1,245,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,199 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,807 UART: [ldev] --
1,284,244 UART: [fwproc] Wait for Commands...
1,284,922 UART: [fwproc] Recv command 0x46574c44
1,285,650 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,719 UART: ROM Fatal Error: 0x000B0024
1,565,876 >>> mbox cmd response: failed
1,565,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,882 >>> mbox cmd response: failed
1,565,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,018 UART: [state] LifecycleState = Unprovisioned
85,673 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,546 UART: [kat] SHA2-256
893,196 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,321 UART: [kat] ++
897,473 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,330 UART: [kat] SHA2-512-ACC
908,231 UART: [kat] ECC-384
917,806 UART: [kat] HMAC-384Kdf
922,390 UART: [kat] LMS
1,170,718 UART: [kat] --
1,171,757 UART: [cold-reset] ++
1,172,207 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,686 UART: [idev] Erasing UDS.KEYID = 0
1,200,691 UART: [idev] Sha1 KeyId Algorithm
1,209,269 UART: [idev] --
1,210,363 UART: [ldev] ++
1,210,531 UART: [ldev] CDI.KEYID = 6
1,210,894 UART: [ldev] SUBJECT.KEYID = 5
1,211,320 UART: [ldev] AUTHORITY.KEYID = 7
1,211,783 UART: [ldev] FE.KEYID = 1
1,217,091 UART: [ldev] Erasing FE.KEYID = 1
1,242,826 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,982 UART: [fwproc] Wait for Commands...
1,282,800 UART: [fwproc] Recv command 0x46574c44
1,283,528 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,507 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,677 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,006 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,055 >>> mbox cmd response: failed
1,420,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,061 >>> mbox cmd response: failed
1,420,061 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,067 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,287 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,665 UART: [kat] SHA2-256
893,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,440 UART: [kat] ++
897,592 UART: [kat] sha1
901,810 UART: [kat] SHA2-256
903,750 UART: [kat] SHA2-384
906,535 UART: [kat] SHA2-512-ACC
908,436 UART: [kat] ECC-384
918,581 UART: [kat] HMAC-384Kdf
923,259 UART: [kat] LMS
1,171,587 UART: [kat] --
1,172,492 UART: [cold-reset] ++
1,172,830 UART: [fht] FHT @ 0x50003400
1,175,511 UART: [idev] ++
1,175,679 UART: [idev] CDI.KEYID = 6
1,176,039 UART: [idev] SUBJECT.KEYID = 7
1,176,463 UART: [idev] UDS.KEYID = 0
1,176,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,479 UART: [idev] Erasing UDS.KEYID = 0
1,201,046 UART: [idev] Sha1 KeyId Algorithm
1,209,556 UART: [idev] --
1,210,506 UART: [ldev] ++
1,210,674 UART: [ldev] CDI.KEYID = 6
1,211,037 UART: [ldev] SUBJECT.KEYID = 5
1,211,463 UART: [ldev] AUTHORITY.KEYID = 7
1,211,926 UART: [ldev] FE.KEYID = 1
1,217,290 UART: [ldev] Erasing FE.KEYID = 1
1,243,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,396 UART: [ldev] --
1,282,663 UART: [fwproc] Wait for Commands...
1,283,375 UART: [fwproc] Recv command 0x46574c44
1,284,103 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,710 UART: ROM Fatal Error: 0x000B0024
1,564,867 >>> mbox cmd response: failed
1,564,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,873 >>> mbox cmd response: failed
1,564,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,151 UART: [kat] SHA2-256
893,801 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,926 UART: [kat] ++
898,078 UART: [kat] sha1
902,434 UART: [kat] SHA2-256
904,374 UART: [kat] SHA2-384
907,169 UART: [kat] SHA2-512-ACC
909,070 UART: [kat] ECC-384
918,671 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,604 UART: [cold-reset] ++
1,173,076 UART: [fht] FHT @ 0x50003400
1,175,577 UART: [idev] ++
1,175,745 UART: [idev] CDI.KEYID = 6
1,176,105 UART: [idev] SUBJECT.KEYID = 7
1,176,529 UART: [idev] UDS.KEYID = 0
1,176,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,543 UART: [idev] Erasing UDS.KEYID = 0
1,201,260 UART: [idev] Sha1 KeyId Algorithm
1,209,752 UART: [idev] --
1,211,008 UART: [ldev] ++
1,211,176 UART: [ldev] CDI.KEYID = 6
1,211,539 UART: [ldev] SUBJECT.KEYID = 5
1,211,965 UART: [ldev] AUTHORITY.KEYID = 7
1,212,428 UART: [ldev] FE.KEYID = 1
1,217,632 UART: [ldev] Erasing FE.KEYID = 1
1,243,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,034 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,492 UART: [ldev] --
1,282,969 UART: [fwproc] Wait for Commands...
1,283,687 UART: [fwproc] Recv command 0x46574c44
1,284,415 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,697 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,392 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,562 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,715 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,402 >>> mbox cmd response: failed
1,420,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,408 >>> mbox cmd response: failed
1,420,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,118 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,139 UART:
192,509 UART: Running Caliptra ROM ...
193,707 UART:
193,865 UART: [state] CFI Enabled
262,722 UART: [state] LifecycleState = Unprovisioned
264,658 UART: [state] DebugLocked = No
266,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,154 UART: [kat] SHA2-256
441,856 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,349 UART: [kat] ++
452,834 UART: [kat] sha1
463,660 UART: [kat] SHA2-256
466,348 UART: [kat] SHA2-384
472,346 UART: [kat] SHA2-512-ACC
474,704 UART: [kat] ECC-384
2,765,717 UART: [kat] HMAC-384Kdf
2,798,548 UART: [kat] LMS
3,988,864 UART: [kat] --
3,994,275 UART: [cold-reset] ++
3,995,459 UART: [fht] Storing FHT @ 0x50003400
4,007,385 UART: [idev] ++
4,007,958 UART: [idev] CDI.KEYID = 6
4,008,983 UART: [idev] SUBJECT.KEYID = 7
4,010,155 UART: [idev] UDS.KEYID = 0
4,013,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,335 UART: [idev] Erasing UDS.KEYID = 0
7,339,797 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,830 UART: [idev] --
7,364,213 UART: [ldev] ++
7,364,806 UART: [ldev] CDI.KEYID = 6
7,365,829 UART: [ldev] SUBJECT.KEYID = 5
7,366,992 UART: [ldev] AUTHORITY.KEYID = 7
7,368,230 UART: [ldev] FE.KEYID = 1
7,399,913 UART: [ldev] Erasing FE.KEYID = 1
10,734,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,812 UART: [ldev] --
13,093,870 UART: [fwproc] Waiting for Commands...
13,096,628 UART: [fwproc] Received command 0x46574c44
13,098,829 UART: [fwproc] Received Image of size 118548 bytes
16,055,177 UART: ROM Fatal Error: 0x000B0021
16,058,643 >>> mbox cmd response: failed
16,059,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,059,432 >>> mbox cmd response: failed
16,059,705 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,060,006 >>> mbox cmd response: failed
Initializing fuses
2,057,194 writing to cptra_bootfsm_go
2,246,523 UART:
2,246,866 UART: Running Caliptra ROM ...
2,247,913 UART:
2,248,071 UART: [state] CFI Enabled
2,316,866 UART: [state] LifecycleState = Unprovisioned
2,318,801 UART: [state] DebugLocked = No
2,320,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,136 UART: [kat] SHA2-256
2,495,849 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,361 UART: [kat] ++
2,506,822 UART: [kat] sha1
2,517,106 UART: [kat] SHA2-256
2,519,727 UART: [kat] SHA2-384
2,526,642 UART: [kat] SHA2-512-ACC
2,528,996 UART: [kat] ECC-384
4,819,597 UART: [kat] HMAC-384Kdf
4,851,823 UART: [kat] LMS
6,042,109 UART: [kat] --
6,048,387 UART: [cold-reset] ++
6,050,166 UART: [fht] Storing FHT @ 0x50003400
6,062,255 UART: [idev] ++
6,062,884 UART: [idev] CDI.KEYID = 6
6,063,803 UART: [idev] SUBJECT.KEYID = 7
6,065,022 UART: [idev] UDS.KEYID = 0
6,067,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,695 UART: [idev] Erasing UDS.KEYID = 0
9,392,488 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,510 UART: [idev] --
9,417,190 UART: [ldev] ++
9,417,777 UART: [ldev] CDI.KEYID = 6
9,418,747 UART: [ldev] SUBJECT.KEYID = 5
9,420,008 UART: [ldev] AUTHORITY.KEYID = 7
9,421,199 UART: [ldev] FE.KEYID = 1
9,465,886 UART: [ldev] Erasing FE.KEYID = 1
12,800,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,114,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,129,132 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,143,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,158,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,321 UART: [ldev] --
15,180,702 UART: [fwproc] Waiting for Commands...
15,183,678 UART: [fwproc] Received command 0x46574c44
15,185,870 UART: [fwproc] Received Image of size 118548 bytes
19,288,912 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,359,428 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,432,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,760,830 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,043 writing to cptra_bootfsm_go
3,810,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,858,515 >>> mbox cmd response: failed
15,859,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,859,721 >>> mbox cmd response: failed
15,859,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,860,295 >>> mbox cmd response: failed
Initializing fuses
2,056,981 writing to cptra_bootfsm_go
5,847,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,001,638 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,568 UART:
192,934 UART: Running Caliptra ROM ...
194,071 UART:
603,766 UART: [state] CFI Enabled
621,636 UART: [state] LifecycleState = Unprovisioned
623,584 UART: [state] DebugLocked = No
624,915 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,056 UART: [kat] SHA2-256
799,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,366 UART: [kat] ++
810,848 UART: [kat] sha1
822,001 UART: [kat] SHA2-256
824,674 UART: [kat] SHA2-384
830,501 UART: [kat] SHA2-512-ACC
832,906 UART: [kat] ECC-384
3,117,966 UART: [kat] HMAC-384Kdf
3,130,134 UART: [kat] LMS
4,320,225 UART: [kat] --
4,325,005 UART: [cold-reset] ++
4,326,361 UART: [fht] Storing FHT @ 0x50003400
4,337,034 UART: [idev] ++
4,337,657 UART: [idev] CDI.KEYID = 6
4,338,577 UART: [idev] SUBJECT.KEYID = 7
4,339,807 UART: [idev] UDS.KEYID = 0
4,342,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,773 UART: [idev] Erasing UDS.KEYID = 0
7,630,866 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,020 UART: [idev] --
7,657,350 UART: [ldev] ++
7,657,926 UART: [ldev] CDI.KEYID = 6
7,658,895 UART: [ldev] SUBJECT.KEYID = 5
7,660,121 UART: [ldev] AUTHORITY.KEYID = 7
7,661,385 UART: [ldev] FE.KEYID = 1
7,673,074 UART: [ldev] Erasing FE.KEYID = 1
10,960,675 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,886 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,805 UART: [ldev] --
13,316,723 UART: [fwproc] Waiting for Commands...
13,318,341 UART: [fwproc] Received command 0x46574c44
13,320,534 UART: [fwproc] Received Image of size 118548 bytes
16,287,071 UART: ROM Fatal Error: 0x000B0021
16,290,590 >>> mbox cmd response: failed
16,291,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,291,392 >>> mbox cmd response: failed
16,291,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,291,985 >>> mbox cmd response: failed
Initializing fuses
2,057,319 writing to cptra_bootfsm_go
2,246,634 UART:
2,246,984 UART: Running Caliptra ROM ...
2,248,040 UART:
4,157,480 UART: [state] CFI Enabled
4,172,286 UART: [state] LifecycleState = Unprovisioned
4,174,203 UART: [state] DebugLocked = No
4,176,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,182,144 UART: [kat] SHA2-256
4,351,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,362,437 UART: [kat] ++
4,362,903 UART: [kat] sha1
4,374,575 UART: [kat] SHA2-256
4,377,281 UART: [kat] SHA2-384
4,382,466 UART: [kat] SHA2-512-ACC
4,384,823 UART: [kat] ECC-384
6,669,574 UART: [kat] HMAC-384Kdf
6,681,269 UART: [kat] LMS
7,871,392 UART: [kat] --
7,874,208 UART: [cold-reset] ++
7,876,525 UART: [fht] Storing FHT @ 0x50003400
7,887,241 UART: [idev] ++
7,887,847 UART: [idev] CDI.KEYID = 6
7,888,744 UART: [idev] SUBJECT.KEYID = 7
7,890,024 UART: [idev] UDS.KEYID = 0
7,892,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,041,199 UART: [idev] Erasing UDS.KEYID = 0
11,179,977 UART: [idev] Using Sha1 for KeyId Algorithm
11,200,464 UART: [idev] --
11,204,354 UART: [ldev] ++
11,204,932 UART: [ldev] CDI.KEYID = 6
11,205,903 UART: [ldev] SUBJECT.KEYID = 5
11,207,183 UART: [ldev] AUTHORITY.KEYID = 7
11,208,371 UART: [ldev] FE.KEYID = 1
11,220,751 UART: [ldev] Erasing FE.KEYID = 1
14,509,151 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,804,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,818,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,833,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,848,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,867,009 UART: [ldev] --
16,871,477 UART: [fwproc] Waiting for Commands...
16,873,586 UART: [fwproc] Received command 0x46574c44
16,875,833 UART: [fwproc] Received Image of size 118548 bytes
20,977,687 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,054,275 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,127,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,455,233 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,619 writing to cptra_bootfsm_go
4,129,739 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,052,876 >>> mbox cmd response: failed
16,053,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,053,793 >>> mbox cmd response: failed
16,054,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,054,374 >>> mbox cmd response: failed
Initializing fuses
2,058,382 writing to cptra_bootfsm_go
7,939,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,967,060 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,258 UART:
192,687 UART: Running Caliptra ROM ...
193,847 UART:
194,001 UART: [state] CFI Enabled
262,244 UART: [state] LifecycleState = Unprovisioned
264,116 UART: [state] DebugLocked = No
266,513 UART: [state] WD Timer not started. Device not locked for debugging
270,583 UART: [kat] SHA2-256
450,204 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,008 UART: [kat] ++
461,500 UART: [kat] sha1
473,408 UART: [kat] SHA2-256
476,098 UART: [kat] SHA2-384
481,160 UART: [kat] SHA2-512-ACC
483,500 UART: [kat] ECC-384
2,946,386 UART: [kat] HMAC-384Kdf
2,969,717 UART: [kat] LMS
3,446,244 UART: [kat] --
3,450,942 UART: [cold-reset] ++
3,452,499 UART: [fht] FHT @ 0x50003400
3,463,056 UART: [idev] ++
3,463,638 UART: [idev] CDI.KEYID = 6
3,464,549 UART: [idev] SUBJECT.KEYID = 7
3,465,823 UART: [idev] UDS.KEYID = 0
3,468,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,997 UART: [idev] Erasing UDS.KEYID = 0
5,984,500 UART: [idev] Sha1 KeyId Algorithm
6,007,526 UART: [idev] --
6,011,318 UART: [ldev] ++
6,011,894 UART: [ldev] CDI.KEYID = 6
6,012,809 UART: [ldev] SUBJECT.KEYID = 5
6,014,050 UART: [ldev] AUTHORITY.KEYID = 7
6,015,296 UART: [ldev] FE.KEYID = 1
6,055,442 UART: [ldev] Erasing FE.KEYID = 1
8,563,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,955 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,831 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,725 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,350 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,049 UART: [ldev] --
10,372,435 UART: [fwproc] Wait for Commands...
10,374,916 UART: [fwproc] Recv command 0x46574c44
10,376,911 UART: [fwproc] Recv'd Img size: 118548 bytes
12,707,439 UART: ROM Fatal Error: 0x000B0021
12,710,703 >>> mbox cmd response: failed
12,711,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,711,491 >>> mbox cmd response: failed
12,711,886 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,712,200 >>> mbox cmd response: failed
Initializing fuses
2,060,756 writing to cptra_bootfsm_go
2,250,054 UART:
2,250,393 UART: Running Caliptra ROM ...
2,251,538 UART:
2,251,719 UART: [state] CFI Enabled
2,316,185 UART: [state] LifecycleState = Unprovisioned
2,318,119 UART: [state] DebugLocked = No
2,319,838 UART: [state] WD Timer not started. Device not locked for debugging
2,323,318 UART: [kat] SHA2-256
2,502,959 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,513,732 UART: [kat] ++
2,514,240 UART: [kat] sha1
2,525,733 UART: [kat] SHA2-256
2,528,436 UART: [kat] SHA2-384
2,533,456 UART: [kat] SHA2-512-ACC
2,535,810 UART: [kat] ECC-384
4,997,624 UART: [kat] HMAC-384Kdf
5,019,426 UART: [kat] LMS
5,495,909 UART: [kat] --
5,500,876 UART: [cold-reset] ++
5,503,460 UART: [fht] FHT @ 0x50003400
5,515,467 UART: [idev] ++
5,516,045 UART: [idev] CDI.KEYID = 6
5,516,965 UART: [idev] SUBJECT.KEYID = 7
5,518,233 UART: [idev] UDS.KEYID = 0
5,520,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,750 UART: [idev] Erasing UDS.KEYID = 0
8,036,856 UART: [idev] Sha1 KeyId Algorithm
8,061,386 UART: [idev] --
8,065,552 UART: [ldev] ++
8,066,127 UART: [ldev] CDI.KEYID = 6
8,067,047 UART: [ldev] SUBJECT.KEYID = 5
8,068,214 UART: [ldev] AUTHORITY.KEYID = 7
8,069,508 UART: [ldev] FE.KEYID = 1
8,105,447 UART: [ldev] Erasing FE.KEYID = 1
10,614,922 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,741 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,588 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,395,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,415,770 UART: [ldev] --
12,422,075 UART: [fwproc] Wait for Commands...
12,424,666 UART: [fwproc] Recv command 0x46574c44
12,426,680 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,911 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,066,050 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,393,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,464,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,599,914 >>> mbox cmd response: failed
12,600,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,600,890 >>> mbox cmd response: failed
12,601,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,601,525 >>> mbox cmd response: failed
Initializing fuses
2,063,251 writing to cptra_bootfsm_go
5,511,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,245,931 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,442 UART:
192,831 UART: Running Caliptra ROM ...
194,043 UART:
603,717 UART: [state] CFI Enabled
618,976 UART: [state] LifecycleState = Unprovisioned
620,876 UART: [state] DebugLocked = No
623,706 UART: [state] WD Timer not started. Device not locked for debugging
627,144 UART: [kat] SHA2-256
806,794 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,559 UART: [kat] ++
818,012 UART: [kat] sha1
829,152 UART: [kat] SHA2-256
831,821 UART: [kat] SHA2-384
837,173 UART: [kat] SHA2-512-ACC
839,525 UART: [kat] ECC-384
3,278,600 UART: [kat] HMAC-384Kdf
3,291,750 UART: [kat] LMS
3,768,274 UART: [kat] --
3,771,650 UART: [cold-reset] ++
3,772,631 UART: [fht] FHT @ 0x50003400
3,783,460 UART: [idev] ++
3,784,066 UART: [idev] CDI.KEYID = 6
3,785,015 UART: [idev] SUBJECT.KEYID = 7
3,786,244 UART: [idev] UDS.KEYID = 0
3,788,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,843 UART: [idev] Erasing UDS.KEYID = 0
6,267,921 UART: [idev] Sha1 KeyId Algorithm
6,292,562 UART: [idev] --
6,297,428 UART: [ldev] ++
6,298,059 UART: [ldev] CDI.KEYID = 6
6,298,974 UART: [ldev] SUBJECT.KEYID = 5
6,300,139 UART: [ldev] AUTHORITY.KEYID = 7
6,301,430 UART: [ldev] FE.KEYID = 1
6,314,348 UART: [ldev] Erasing FE.KEYID = 1
8,794,492 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,633 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,524 UART: [ldev] --
10,588,511 UART: [fwproc] Wait for Commands...
10,591,389 UART: [fwproc] Recv command 0x46574c44
10,593,384 UART: [fwproc] Recv'd Img size: 118548 bytes
12,920,456 UART: ROM Fatal Error: 0x000B0021
12,923,646 >>> mbox cmd response: failed
12,924,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,345 >>> mbox cmd response: failed
12,924,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,924,946 >>> mbox cmd response: failed
Initializing fuses
2,065,626 writing to cptra_bootfsm_go
2,254,962 UART:
2,255,332 UART: Running Caliptra ROM ...
2,256,381 UART:
7,531,263 UART: [state] CFI Enabled
7,545,623 UART: [state] LifecycleState = Unprovisioned
7,547,545 UART: [state] DebugLocked = No
7,549,349 UART: [state] WD Timer not started. Device not locked for debugging
7,552,931 UART: [kat] SHA2-256
7,732,591 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,743,361 UART: [kat] ++
7,743,857 UART: [kat] sha1
7,754,971 UART: [kat] SHA2-256
7,757,677 UART: [kat] SHA2-384
7,764,647 UART: [kat] SHA2-512-ACC
7,767,005 UART: [kat] ECC-384
10,209,052 UART: [kat] HMAC-384Kdf
10,220,598 UART: [kat] LMS
10,697,091 UART: [kat] --
10,702,294 UART: [cold-reset] ++
10,704,289 UART: [fht] FHT @ 0x50003400
10,715,711 UART: [idev] ++
10,716,281 UART: [idev] CDI.KEYID = 6
10,717,251 UART: [idev] SUBJECT.KEYID = 7
10,718,468 UART: [idev] UDS.KEYID = 0
10,721,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,870,167 UART: [idev] Erasing UDS.KEYID = 0
13,195,054 UART: [idev] Sha1 KeyId Algorithm
13,219,367 UART: [idev] --
13,225,684 UART: [ldev] ++
13,226,262 UART: [ldev] CDI.KEYID = 6
13,227,174 UART: [ldev] SUBJECT.KEYID = 5
13,228,393 UART: [ldev] AUTHORITY.KEYID = 7
13,229,628 UART: [ldev] FE.KEYID = 1
13,242,343 UART: [ldev] Erasing FE.KEYID = 1
15,716,652 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,436,583 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,452,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,468,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,483,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,504,658 UART: [ldev] --
17,509,502 UART: [fwproc] Wait for Commands...
17,511,766 UART: [fwproc] Recv command 0x46574c44
17,513,814 UART: [fwproc] Recv'd Img size: 118548 bytes
20,999,193 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,079,438 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,152,503 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,480,558 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
3,783,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,798,815 >>> mbox cmd response: failed
12,799,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,799,780 >>> mbox cmd response: failed
12,800,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,800,345 >>> mbox cmd response: failed
Initializing fuses
2,060,060 writing to cptra_bootfsm_go
10,842,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,504,969 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,885 writing to cptra_bootfsm_go
192,225 UART:
192,595 UART: Running Caliptra ROM ...
193,694 UART:
193,839 UART: [state] CFI Enabled
263,836 UART: [state] LifecycleState = Unprovisioned
266,206 UART: [state] DebugLocked = No
268,534 UART: [state] WD Timer not started. Device not locked for debugging
273,123 UART: [kat] SHA2-256
463,031 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,805 UART: [kat] ++
474,343 UART: [kat] sha1
486,306 UART: [kat] SHA2-256
489,322 UART: [kat] SHA2-384
494,549 UART: [kat] SHA2-512-ACC
497,110 UART: [kat] ECC-384
2,945,545 UART: [kat] HMAC-384Kdf
2,969,753 UART: [kat] LMS
3,501,533 UART: [kat] --
3,506,958 UART: [cold-reset] ++
3,507,983 UART: [fht] FHT @ 0x50003400
3,519,536 UART: [idev] ++
3,520,219 UART: [idev] CDI.KEYID = 6
3,521,103 UART: [idev] SUBJECT.KEYID = 7
3,522,373 UART: [idev] UDS.KEYID = 0
3,525,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,507 UART: [idev] Erasing UDS.KEYID = 0
6,024,536 UART: [idev] Sha1 KeyId Algorithm
6,047,551 UART: [idev] --
6,053,010 UART: [ldev] ++
6,053,698 UART: [ldev] CDI.KEYID = 6
6,054,614 UART: [ldev] SUBJECT.KEYID = 5
6,055,779 UART: [ldev] AUTHORITY.KEYID = 7
6,057,035 UART: [ldev] FE.KEYID = 1
6,099,128 UART: [ldev] Erasing FE.KEYID = 1
8,606,106 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,610 UART: [ldev] --
10,412,147 UART: [fwproc] Wait for Commands...
10,413,923 UART: [fwproc] Recv command 0x46574c44
10,416,237 UART: [fwproc] Recv'd Img size: 118548 bytes
12,753,102 UART: ROM Fatal Error: 0x000B0021
12,756,720 >>> mbox cmd response: failed
12,757,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,757,484 >>> mbox cmd response: failed
12,757,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,758,024 >>> mbox cmd response: failed
Initializing fuses
2,061,674 writing to cptra_bootfsm_go
2,251,013 UART:
2,251,360 UART: Running Caliptra ROM ...
2,252,504 UART:
2,252,678 UART: [state] CFI Enabled
2,316,101 UART: [state] LifecycleState = Unprovisioned
2,318,477 UART: [state] DebugLocked = No
2,319,875 UART: [state] WD Timer not started. Device not locked for debugging
2,325,089 UART: [kat] SHA2-256
2,514,971 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,751 UART: [kat] ++
2,526,268 UART: [kat] sha1
2,538,529 UART: [kat] SHA2-256
2,541,558 UART: [kat] SHA2-384
2,546,799 UART: [kat] SHA2-512-ACC
2,549,365 UART: [kat] ECC-384
4,998,822 UART: [kat] HMAC-384Kdf
5,020,024 UART: [kat] LMS
5,551,763 UART: [kat] --
5,555,982 UART: [cold-reset] ++
5,557,111 UART: [fht] FHT @ 0x50003400
5,567,826 UART: [idev] ++
5,568,569 UART: [idev] CDI.KEYID = 6
5,569,478 UART: [idev] SUBJECT.KEYID = 7
5,570,696 UART: [idev] UDS.KEYID = 0
5,572,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,722,245 UART: [idev] Erasing UDS.KEYID = 0
8,078,887 UART: [idev] Sha1 KeyId Algorithm
8,101,386 UART: [idev] --
8,105,980 UART: [ldev] ++
8,106,665 UART: [ldev] CDI.KEYID = 6
8,107,554 UART: [ldev] SUBJECT.KEYID = 5
8,108,776 UART: [ldev] AUTHORITY.KEYID = 7
8,110,014 UART: [ldev] FE.KEYID = 1
8,148,228 UART: [ldev] Erasing FE.KEYID = 1
10,655,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,456,827 UART: [ldev] --
12,462,852 UART: [fwproc] Wait for Commands...
12,464,448 UART: [fwproc] Recv command 0x46574c44
12,466,785 UART: [fwproc] Recv'd Img size: 118548 bytes
15,959,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,043,359 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,166,940 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,727,854 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,440,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,668,359 >>> mbox cmd response: failed
12,668,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,669,340 >>> mbox cmd response: failed
12,669,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,669,917 >>> mbox cmd response: failed
Initializing fuses
2,063,354 writing to cptra_bootfsm_go
5,498,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,879,640 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,571 UART:
192,919 UART: Running Caliptra ROM ...
194,109 UART:
603,824 UART: [state] CFI Enabled
620,511 UART: [state] LifecycleState = Unprovisioned
622,930 UART: [state] DebugLocked = No
625,070 UART: [state] WD Timer not started. Device not locked for debugging
629,838 UART: [kat] SHA2-256
819,671 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,465 UART: [kat] ++
831,059 UART: [kat] sha1
841,579 UART: [kat] SHA2-256
844,598 UART: [kat] SHA2-384
851,081 UART: [kat] SHA2-512-ACC
853,719 UART: [kat] ECC-384
3,297,388 UART: [kat] HMAC-384Kdf
3,310,879 UART: [kat] LMS
3,842,723 UART: [kat] --
3,845,756 UART: [cold-reset] ++
3,847,745 UART: [fht] FHT @ 0x50003400
3,858,247 UART: [idev] ++
3,858,937 UART: [idev] CDI.KEYID = 6
3,859,958 UART: [idev] SUBJECT.KEYID = 7
3,861,121 UART: [idev] UDS.KEYID = 0
3,863,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,992 UART: [idev] Erasing UDS.KEYID = 0
6,340,489 UART: [idev] Sha1 KeyId Algorithm
6,361,904 UART: [idev] --
6,366,553 UART: [ldev] ++
6,367,442 UART: [ldev] CDI.KEYID = 6
6,368,427 UART: [ldev] SUBJECT.KEYID = 5
6,369,561 UART: [ldev] AUTHORITY.KEYID = 7
6,370,744 UART: [ldev] FE.KEYID = 1
6,380,530 UART: [ldev] Erasing FE.KEYID = 1
8,855,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,244 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,575 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,716 UART: [ldev] --
10,646,204 UART: [fwproc] Wait for Commands...
10,649,224 UART: [fwproc] Recv command 0x46574c44
10,651,487 UART: [fwproc] Recv'd Img size: 118548 bytes
12,999,568 UART: ROM Fatal Error: 0x000B0021
13,003,186 >>> mbox cmd response: failed
13,003,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,003,948 >>> mbox cmd response: failed
13,004,247 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,004,556 >>> mbox cmd response: failed
Initializing fuses
2,062,103 writing to cptra_bootfsm_go
2,251,431 UART:
2,251,782 UART: Running Caliptra ROM ...
2,252,866 UART:
7,438,561 UART: [state] CFI Enabled
7,453,010 UART: [state] LifecycleState = Unprovisioned
7,455,409 UART: [state] DebugLocked = No
7,456,883 UART: [state] WD Timer not started. Device not locked for debugging
7,461,408 UART: [kat] SHA2-256
7,651,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,662,095 UART: [kat] ++
7,662,668 UART: [kat] sha1
7,673,239 UART: [kat] SHA2-256
7,676,266 UART: [kat] SHA2-384
7,681,996 UART: [kat] SHA2-512-ACC
7,684,545 UART: [kat] ECC-384
10,126,484 UART: [kat] HMAC-384Kdf
10,140,658 UART: [kat] LMS
10,672,476 UART: [kat] --
10,675,615 UART: [cold-reset] ++
10,677,601 UART: [fht] FHT @ 0x50003400
10,688,800 UART: [idev] ++
10,689,532 UART: [idev] CDI.KEYID = 6
10,690,553 UART: [idev] SUBJECT.KEYID = 7
10,691,660 UART: [idev] UDS.KEYID = 0
10,693,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,843,288 UART: [idev] Erasing UDS.KEYID = 0
13,168,614 UART: [idev] Sha1 KeyId Algorithm
13,189,803 UART: [idev] --
13,194,287 UART: [ldev] ++
13,194,968 UART: [ldev] CDI.KEYID = 6
13,195,855 UART: [ldev] SUBJECT.KEYID = 5
13,197,071 UART: [ldev] AUTHORITY.KEYID = 7
13,198,309 UART: [ldev] FE.KEYID = 1
13,207,988 UART: [ldev] Erasing FE.KEYID = 1
15,679,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,401,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,417,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,432,364 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,447,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,469,111 UART: [ldev] --
17,475,150 UART: [fwproc] Wait for Commands...
17,477,525 UART: [fwproc] Recv command 0x46574c44
17,479,868 UART: [fwproc] Recv'd Img size: 118548 bytes
20,991,121 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,063,853 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,187,479 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,747,191 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,752,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,885,797 >>> mbox cmd response: failed
12,886,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,886,711 >>> mbox cmd response: failed
12,886,987 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,887,290 >>> mbox cmd response: failed
Initializing fuses
2,069,258 writing to cptra_bootfsm_go
10,734,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,014,600 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,318 UART: [state] LifecycleState = Unprovisioned
85,973 UART: [state] DebugLocked = No
86,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,409 UART: [kat] SHA2-256
892,347 UART: [kat] SHA2-384
894,896 UART: [kat] SHA2-512-ACC
896,797 UART: [kat] ECC-384
901,994 UART: [kat] HMAC-384Kdf
906,640 UART: [kat] LMS
1,474,836 UART: [kat] --
1,475,547 UART: [cold-reset] ++
1,476,033 UART: [fht] Storing FHT @ 0x50003400
1,478,818 UART: [idev] ++
1,478,986 UART: [idev] CDI.KEYID = 6
1,479,346 UART: [idev] SUBJECT.KEYID = 7
1,479,770 UART: [idev] UDS.KEYID = 0
1,480,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,748 UART: [idev] Erasing UDS.KEYID = 0
1,504,324 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,100 UART: [idev] --
1,514,035 UART: [ldev] ++
1,514,203 UART: [ldev] CDI.KEYID = 6
1,514,566 UART: [ldev] SUBJECT.KEYID = 5
1,514,992 UART: [ldev] AUTHORITY.KEYID = 7
1,515,455 UART: [ldev] FE.KEYID = 1
1,520,729 UART: [ldev] Erasing FE.KEYID = 1
1,546,036 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,124 UART: [ldev] --
1,585,613 UART: [fwproc] Waiting for Commands...
1,586,426 UART: [fwproc] Received command 0x46574c44
1,587,217 UART: [fwproc] Received Image of size 118548 bytes
1,866,660 UART: ROM Fatal Error: 0x000B0021
1,867,817 >>> mbox cmd response: failed
1,867,817 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,823 >>> mbox cmd response: failed
1,867,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,867,829 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,083 UART: [kat] SHA2-256
882,014 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,129 UART: [kat] ++
886,281 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,914 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,777 UART: [cold-reset] ++
1,477,249 UART: [fht] Storing FHT @ 0x50003400
1,480,092 UART: [idev] ++
1,480,260 UART: [idev] CDI.KEYID = 6
1,480,620 UART: [idev] SUBJECT.KEYID = 7
1,481,044 UART: [idev] UDS.KEYID = 0
1,481,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,106 UART: [idev] Erasing UDS.KEYID = 0
1,505,450 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,042 UART: [idev] --
1,515,211 UART: [ldev] ++
1,515,379 UART: [ldev] CDI.KEYID = 6
1,515,742 UART: [ldev] SUBJECT.KEYID = 5
1,516,168 UART: [ldev] AUTHORITY.KEYID = 7
1,516,631 UART: [ldev] FE.KEYID = 1
1,521,533 UART: [ldev] Erasing FE.KEYID = 1
1,546,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,694 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,726 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,782 UART: [fwproc] Received command 0x46574c44
1,587,573 UART: [fwproc] Received Image of size 118548 bytes
2,931,846 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,516 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,734 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,971 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,748 >>> mbox cmd response: failed
1,719,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,754 >>> mbox cmd response: failed
1,719,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,760 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,398 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,895 UART: [state] LifecycleState = Unprovisioned
86,550 UART: [state] DebugLocked = No
87,118 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,740 UART: [kat] SHA2-256
882,671 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,786 UART: [kat] ++
886,938 UART: [kat] sha1
891,148 UART: [kat] SHA2-256
893,086 UART: [kat] SHA2-384
895,827 UART: [kat] SHA2-512-ACC
897,728 UART: [kat] ECC-384
903,303 UART: [kat] HMAC-384Kdf
908,127 UART: [kat] LMS
1,476,323 UART: [kat] --
1,477,196 UART: [cold-reset] ++
1,477,606 UART: [fht] Storing FHT @ 0x50003400
1,480,259 UART: [idev] ++
1,480,427 UART: [idev] CDI.KEYID = 6
1,480,787 UART: [idev] SUBJECT.KEYID = 7
1,481,211 UART: [idev] UDS.KEYID = 0
1,481,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,161 UART: [idev] Erasing UDS.KEYID = 0
1,506,193 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,721 UART: [idev] --
1,515,892 UART: [ldev] ++
1,516,060 UART: [ldev] CDI.KEYID = 6
1,516,423 UART: [ldev] SUBJECT.KEYID = 5
1,516,849 UART: [ldev] AUTHORITY.KEYID = 7
1,517,312 UART: [ldev] FE.KEYID = 1
1,522,722 UART: [ldev] Erasing FE.KEYID = 1
1,548,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,916 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,632 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,135 UART: [ldev] --
1,587,582 UART: [fwproc] Waiting for Commands...
1,588,341 UART: [fwproc] Received command 0x46574c44
1,589,132 UART: [fwproc] Received Image of size 118548 bytes
1,868,681 UART: ROM Fatal Error: 0x000B0021
1,869,838 >>> mbox cmd response: failed
1,869,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,844 >>> mbox cmd response: failed
1,869,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,438 UART: [kat] SHA2-256
882,369 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,484 UART: [kat] ++
886,636 UART: [kat] sha1
890,934 UART: [kat] SHA2-256
892,872 UART: [kat] SHA2-384
895,749 UART: [kat] SHA2-512-ACC
897,650 UART: [kat] ECC-384
903,359 UART: [kat] HMAC-384Kdf
907,901 UART: [kat] LMS
1,476,097 UART: [kat] --
1,477,000 UART: [cold-reset] ++
1,477,346 UART: [fht] Storing FHT @ 0x50003400
1,480,047 UART: [idev] ++
1,480,215 UART: [idev] CDI.KEYID = 6
1,480,575 UART: [idev] SUBJECT.KEYID = 7
1,480,999 UART: [idev] UDS.KEYID = 0
1,481,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,515 UART: [idev] Erasing UDS.KEYID = 0
1,505,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,223 UART: [idev] --
1,515,216 UART: [ldev] ++
1,515,384 UART: [ldev] CDI.KEYID = 6
1,515,747 UART: [ldev] SUBJECT.KEYID = 5
1,516,173 UART: [ldev] AUTHORITY.KEYID = 7
1,516,636 UART: [ldev] FE.KEYID = 1
1,522,296 UART: [ldev] Erasing FE.KEYID = 1
1,547,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,790 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,506 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,397 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,109 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,197 UART: [ldev] --
1,587,464 UART: [fwproc] Waiting for Commands...
1,588,227 UART: [fwproc] Received command 0x46574c44
1,589,018 UART: [fwproc] Received Image of size 118548 bytes
2,934,009 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,611 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,829 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,254 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,719,605 >>> mbox cmd response: failed
1,719,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,611 >>> mbox cmd response: failed
1,719,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,719,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,570 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,008 UART: [state] LifecycleState = Unprovisioned
85,663 UART: [state] DebugLocked = No
86,285 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,050 UART: [kat] ++
895,202 UART: [kat] sha1
899,354 UART: [kat] SHA2-256
901,294 UART: [kat] SHA2-384
903,995 UART: [kat] SHA2-512-ACC
905,896 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
920,051 UART: [kat] LMS
1,168,363 UART: [kat] --
1,169,070 UART: [cold-reset] ++
1,169,630 UART: [fht] FHT @ 0x50003400
1,172,230 UART: [idev] ++
1,172,398 UART: [idev] CDI.KEYID = 6
1,172,759 UART: [idev] SUBJECT.KEYID = 7
1,173,184 UART: [idev] UDS.KEYID = 0
1,173,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,955 UART: [idev] Erasing UDS.KEYID = 0
1,198,447 UART: [idev] Sha1 KeyId Algorithm
1,207,305 UART: [idev] --
1,208,330 UART: [ldev] ++
1,208,498 UART: [ldev] CDI.KEYID = 6
1,208,862 UART: [ldev] SUBJECT.KEYID = 5
1,209,289 UART: [ldev] AUTHORITY.KEYID = 7
1,209,752 UART: [ldev] FE.KEYID = 1
1,215,048 UART: [ldev] Erasing FE.KEYID = 1
1,241,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,706 UART: [ldev] --
1,281,109 UART: [fwproc] Wait for Commands...
1,281,832 UART: [fwproc] Recv command 0x46574c44
1,282,565 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,640 UART: ROM Fatal Error: 0x000B0021
1,562,797 >>> mbox cmd response: failed
1,562,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,803 >>> mbox cmd response: failed
1,562,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,598 UART: [state] LifecycleState = Unprovisioned
86,253 UART: [state] DebugLocked = No
86,967 UART: [state] WD Timer not started. Device not locked for debugging
88,100 UART: [kat] SHA2-256
891,650 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,754 UART: [kat] ++
895,906 UART: [kat] sha1
900,162 UART: [kat] SHA2-256
902,102 UART: [kat] SHA2-384
904,805 UART: [kat] SHA2-512-ACC
906,706 UART: [kat] ECC-384
916,045 UART: [kat] HMAC-384Kdf
920,467 UART: [kat] LMS
1,168,779 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,169,894 UART: [fht] FHT @ 0x50003400
1,172,530 UART: [idev] ++
1,172,698 UART: [idev] CDI.KEYID = 6
1,173,059 UART: [idev] SUBJECT.KEYID = 7
1,173,484 UART: [idev] UDS.KEYID = 0
1,173,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,481 UART: [idev] Erasing UDS.KEYID = 0
1,197,873 UART: [idev] Sha1 KeyId Algorithm
1,206,749 UART: [idev] --
1,207,854 UART: [ldev] ++
1,208,022 UART: [ldev] CDI.KEYID = 6
1,208,386 UART: [ldev] SUBJECT.KEYID = 5
1,208,813 UART: [ldev] AUTHORITY.KEYID = 7
1,209,276 UART: [ldev] FE.KEYID = 1
1,214,258 UART: [ldev] Erasing FE.KEYID = 1
1,239,829 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,672 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,402 UART: [ldev] --
1,278,669 UART: [fwproc] Wait for Commands...
1,279,326 UART: [fwproc] Recv command 0x46574c44
1,280,059 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,928 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,103 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,412 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,234 >>> mbox cmd response: failed
1,419,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,240 >>> mbox cmd response: failed
1,419,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,246 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,042 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,023 UART: [state] LifecycleState = Unprovisioned
85,678 UART: [state] DebugLocked = No
86,328 UART: [state] WD Timer not started. Device not locked for debugging
87,675 UART: [kat] SHA2-256
891,225 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,329 UART: [kat] ++
895,481 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,202 UART: [kat] SHA2-512-ACC
906,103 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,409 UART: [cold-reset] ++
1,170,845 UART: [fht] FHT @ 0x50003400
1,173,589 UART: [idev] ++
1,173,757 UART: [idev] CDI.KEYID = 6
1,174,118 UART: [idev] SUBJECT.KEYID = 7
1,174,543 UART: [idev] UDS.KEYID = 0
1,174,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,576 UART: [idev] Sha1 KeyId Algorithm
1,208,646 UART: [idev] --
1,209,889 UART: [ldev] ++
1,210,057 UART: [ldev] CDI.KEYID = 6
1,210,421 UART: [ldev] SUBJECT.KEYID = 5
1,210,848 UART: [ldev] AUTHORITY.KEYID = 7
1,211,311 UART: [ldev] FE.KEYID = 1
1,216,867 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,143 UART: [ldev] --
1,281,416 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,855 UART: ROM Fatal Error: 0x000B0021
1,563,012 >>> mbox cmd response: failed
1,563,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,018 >>> mbox cmd response: failed
1,563,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,504 UART: [state] WD Timer not started. Device not locked for debugging
87,787 UART: [kat] SHA2-256
891,337 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,441 UART: [kat] ++
895,593 UART: [kat] sha1
899,787 UART: [kat] SHA2-256
901,727 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,504 UART: [kat] HMAC-384Kdf
921,098 UART: [kat] LMS
1,169,410 UART: [kat] --
1,170,235 UART: [cold-reset] ++
1,170,629 UART: [fht] FHT @ 0x50003400
1,173,275 UART: [idev] ++
1,173,443 UART: [idev] CDI.KEYID = 6
1,173,804 UART: [idev] SUBJECT.KEYID = 7
1,174,229 UART: [idev] UDS.KEYID = 0
1,174,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,346 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,340 UART: [idev] --
1,209,471 UART: [ldev] ++
1,209,639 UART: [ldev] CDI.KEYID = 6
1,210,003 UART: [ldev] SUBJECT.KEYID = 5
1,210,430 UART: [ldev] AUTHORITY.KEYID = 7
1,210,893 UART: [ldev] FE.KEYID = 1
1,216,057 UART: [ldev] Erasing FE.KEYID = 1
1,242,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,470 UART: [fwproc] Wait for Commands...
1,283,273 UART: [fwproc] Recv command 0x46574c44
1,284,006 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,886 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,599 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,015 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,420,251 >>> mbox cmd response: failed
1,420,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,257 >>> mbox cmd response: failed
1,420,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,420,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,868 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,468 UART: [state] LifecycleState = Unprovisioned
86,123 UART: [state] DebugLocked = No
86,789 UART: [state] WD Timer not started. Device not locked for debugging
87,904 UART: [kat] SHA2-256
893,554 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,679 UART: [kat] ++
897,831 UART: [kat] sha1
902,035 UART: [kat] SHA2-256
903,975 UART: [kat] SHA2-384
906,768 UART: [kat] SHA2-512-ACC
908,669 UART: [kat] ECC-384
918,444 UART: [kat] HMAC-384Kdf
922,988 UART: [kat] LMS
1,171,316 UART: [kat] --
1,172,229 UART: [cold-reset] ++
1,172,731 UART: [fht] FHT @ 0x50003400
1,175,230 UART: [idev] ++
1,175,398 UART: [idev] CDI.KEYID = 6
1,175,758 UART: [idev] SUBJECT.KEYID = 7
1,176,182 UART: [idev] UDS.KEYID = 0
1,176,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,943 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,239 UART: [ldev] ++
1,210,407 UART: [ldev] CDI.KEYID = 6
1,210,770 UART: [ldev] SUBJECT.KEYID = 5
1,211,196 UART: [ldev] AUTHORITY.KEYID = 7
1,211,659 UART: [ldev] FE.KEYID = 1
1,216,553 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,308 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,410 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 118548 bytes
1,563,377 UART: ROM Fatal Error: 0x000B0021
1,564,534 >>> mbox cmd response: failed
1,564,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,540 >>> mbox cmd response: failed
1,564,540 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,564,546 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,744 UART: [state] LifecycleState = Unprovisioned
85,399 UART: [state] DebugLocked = No
86,057 UART: [state] WD Timer not started. Device not locked for debugging
87,186 UART: [kat] SHA2-256
892,836 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,961 UART: [kat] ++
897,113 UART: [kat] sha1
901,253 UART: [kat] SHA2-256
903,193 UART: [kat] SHA2-384
905,826 UART: [kat] SHA2-512-ACC
907,727 UART: [kat] ECC-384
917,418 UART: [kat] HMAC-384Kdf
922,096 UART: [kat] LMS
1,170,424 UART: [kat] --
1,171,335 UART: [cold-reset] ++
1,171,725 UART: [fht] FHT @ 0x50003400
1,174,462 UART: [idev] ++
1,174,630 UART: [idev] CDI.KEYID = 6
1,174,990 UART: [idev] SUBJECT.KEYID = 7
1,175,414 UART: [idev] UDS.KEYID = 0
1,175,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,478 UART: [idev] Erasing UDS.KEYID = 0
1,200,537 UART: [idev] Sha1 KeyId Algorithm
1,208,975 UART: [idev] --
1,210,063 UART: [ldev] ++
1,210,231 UART: [ldev] CDI.KEYID = 6
1,210,594 UART: [ldev] SUBJECT.KEYID = 5
1,211,020 UART: [ldev] AUTHORITY.KEYID = 7
1,211,483 UART: [ldev] FE.KEYID = 1
1,216,607 UART: [ldev] Erasing FE.KEYID = 1
1,242,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,881 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,772 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,484 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,365 UART: [ldev] --
1,281,826 UART: [fwproc] Wait for Commands...
1,282,574 UART: [fwproc] Recv command 0x46574c44
1,283,302 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,885 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,070 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,319 >>> mbox cmd response: failed
1,419,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,325 >>> mbox cmd response: failed
1,419,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,431 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,532 UART: [state] WD Timer not started. Device not locked for debugging
87,691 UART: [kat] SHA2-256
893,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,466 UART: [kat] ++
897,618 UART: [kat] sha1
901,716 UART: [kat] SHA2-256
903,656 UART: [kat] SHA2-384
906,405 UART: [kat] SHA2-512-ACC
908,306 UART: [kat] ECC-384
918,307 UART: [kat] HMAC-384Kdf
922,885 UART: [kat] LMS
1,171,213 UART: [kat] --
1,172,132 UART: [cold-reset] ++
1,172,534 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,269 UART: [idev] Erasing UDS.KEYID = 0
1,201,308 UART: [idev] Sha1 KeyId Algorithm
1,209,816 UART: [idev] --
1,210,964 UART: [ldev] ++
1,211,132 UART: [ldev] CDI.KEYID = 6
1,211,495 UART: [ldev] SUBJECT.KEYID = 5
1,211,921 UART: [ldev] AUTHORITY.KEYID = 7
1,212,384 UART: [ldev] FE.KEYID = 1
1,217,610 UART: [ldev] Erasing FE.KEYID = 1
1,244,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,835 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,958 UART: [ldev] --
1,283,351 UART: [fwproc] Wait for Commands...
1,284,015 UART: [fwproc] Recv command 0x46574c44
1,284,743 UART: [fwproc] Recv'd Img size: 118548 bytes
1,565,098 UART: ROM Fatal Error: 0x000B0021
1,566,255 >>> mbox cmd response: failed
1,566,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,261 >>> mbox cmd response: failed
1,566,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,566,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,095 UART: [state] LifecycleState = Unprovisioned
86,750 UART: [state] DebugLocked = No
87,316 UART: [state] WD Timer not started. Device not locked for debugging
88,427 UART: [kat] SHA2-256
894,077 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,202 UART: [kat] ++
898,354 UART: [kat] sha1
902,592 UART: [kat] SHA2-256
904,532 UART: [kat] SHA2-384
907,151 UART: [kat] SHA2-512-ACC
909,052 UART: [kat] ECC-384
919,253 UART: [kat] HMAC-384Kdf
923,779 UART: [kat] LMS
1,172,107 UART: [kat] --
1,173,280 UART: [cold-reset] ++
1,173,662 UART: [fht] FHT @ 0x50003400
1,176,133 UART: [idev] ++
1,176,301 UART: [idev] CDI.KEYID = 6
1,176,661 UART: [idev] SUBJECT.KEYID = 7
1,177,085 UART: [idev] UDS.KEYID = 0
1,177,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,041 UART: [idev] Erasing UDS.KEYID = 0
1,201,582 UART: [idev] Sha1 KeyId Algorithm
1,210,052 UART: [idev] --
1,211,250 UART: [ldev] ++
1,211,418 UART: [ldev] CDI.KEYID = 6
1,211,781 UART: [ldev] SUBJECT.KEYID = 5
1,212,207 UART: [ldev] AUTHORITY.KEYID = 7
1,212,670 UART: [ldev] FE.KEYID = 1
1,217,964 UART: [ldev] Erasing FE.KEYID = 1
1,245,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,731 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,806 UART: [ldev] --
1,284,105 UART: [fwproc] Wait for Commands...
1,284,829 UART: [fwproc] Recv command 0x46574c44
1,285,557 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,958 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,128 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,525 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,421,062 >>> mbox cmd response: failed
1,421,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,421,068 >>> mbox cmd response: failed
1,421,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,421,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,210 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,166 UART:
192,517 UART: Running Caliptra ROM ...
193,613 UART:
193,755 UART: [state] CFI Enabled
263,238 UART: [state] LifecycleState = Unprovisioned
265,222 UART: [state] DebugLocked = No
268,031 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,126 UART: [kat] SHA2-256
442,865 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,361 UART: [kat] ++
453,809 UART: [kat] sha1
465,245 UART: [kat] SHA2-256
467,943 UART: [kat] SHA2-384
474,613 UART: [kat] SHA2-512-ACC
477,019 UART: [kat] ECC-384
2,765,709 UART: [kat] HMAC-384Kdf
2,798,734 UART: [kat] LMS
3,989,003 UART: [kat] --
3,994,807 UART: [cold-reset] ++
3,995,671 UART: [fht] Storing FHT @ 0x50003400
4,007,184 UART: [idev] ++
4,007,749 UART: [idev] CDI.KEYID = 6
4,008,693 UART: [idev] SUBJECT.KEYID = 7
4,009,966 UART: [idev] UDS.KEYID = 0
4,012,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,925 UART: [idev] Erasing UDS.KEYID = 0
7,347,179 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,636 UART: [idev] --
7,373,150 UART: [ldev] ++
7,373,725 UART: [ldev] CDI.KEYID = 6
7,374,707 UART: [ldev] SUBJECT.KEYID = 5
7,375,805 UART: [ldev] AUTHORITY.KEYID = 7
7,377,148 UART: [ldev] FE.KEYID = 1
7,421,021 UART: [ldev] Erasing FE.KEYID = 1
10,756,505 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,069,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,113,267 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,130,382 UART: [ldev] --
13,135,925 UART: [fwproc] Waiting for Commands...
13,138,684 UART: [fwproc] Received command 0x46574c44
13,140,875 UART: [fwproc] Received Image of size 118548 bytes
16,094,535 UART: ROM Fatal Error: 0x000B0022
16,098,048 >>> mbox cmd response: failed
16,098,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,098,835 >>> mbox cmd response: failed
16,099,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,099,413 >>> mbox cmd response: failed
Initializing fuses
2,057,308 writing to cptra_bootfsm_go
2,246,622 UART:
2,246,962 UART: Running Caliptra ROM ...
2,248,099 UART:
2,248,275 UART: [state] CFI Enabled
2,322,125 UART: [state] LifecycleState = Unprovisioned
2,324,073 UART: [state] DebugLocked = No
2,325,601 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,593 UART: [kat] SHA2-256
2,499,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,807 UART: [kat] ++
2,510,310 UART: [kat] sha1
2,522,222 UART: [kat] SHA2-256
2,524,920 UART: [kat] SHA2-384
2,531,450 UART: [kat] SHA2-512-ACC
2,533,797 UART: [kat] ECC-384
4,820,721 UART: [kat] HMAC-384Kdf
4,832,748 UART: [kat] LMS
6,023,074 UART: [kat] --
6,027,782 UART: [cold-reset] ++
6,030,309 UART: [fht] Storing FHT @ 0x50003400
6,042,556 UART: [idev] ++
6,043,131 UART: [idev] CDI.KEYID = 6
6,044,133 UART: [idev] SUBJECT.KEYID = 7
6,045,310 UART: [idev] UDS.KEYID = 0
6,047,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,196,829 UART: [idev] Erasing UDS.KEYID = 0
9,379,430 UART: [idev] Using Sha1 for KeyId Algorithm
9,401,205 UART: [idev] --
9,405,524 UART: [ldev] ++
9,406,098 UART: [ldev] CDI.KEYID = 6
9,407,072 UART: [ldev] SUBJECT.KEYID = 5
9,408,366 UART: [ldev] AUTHORITY.KEYID = 7
9,409,467 UART: [ldev] FE.KEYID = 1
9,455,351 UART: [ldev] Erasing FE.KEYID = 1
12,789,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,103,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,117,997 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,132,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,147,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,167,659 UART: [ldev] --
15,172,266 UART: [fwproc] Waiting for Commands...
15,174,811 UART: [fwproc] Received command 0x46574c44
15,177,013 UART: [fwproc] Received Image of size 118548 bytes
19,283,324 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,360,744 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,433,945 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,762,257 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
3,804,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,855,610 >>> mbox cmd response: failed
15,856,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,856,637 >>> mbox cmd response: failed
15,856,911 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,857,205 >>> mbox cmd response: failed
Initializing fuses
2,057,852 writing to cptra_bootfsm_go
5,822,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,002,302 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
192,599 UART:
192,954 UART: Running Caliptra ROM ...
194,053 UART:
603,773 UART: [state] CFI Enabled
617,276 UART: [state] LifecycleState = Unprovisioned
619,259 UART: [state] DebugLocked = No
621,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,294 UART: [kat] SHA2-256
796,027 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,597 UART: [kat] ++
807,048 UART: [kat] sha1
817,769 UART: [kat] SHA2-256
820,461 UART: [kat] SHA2-384
827,308 UART: [kat] SHA2-512-ACC
829,654 UART: [kat] ECC-384
3,113,632 UART: [kat] HMAC-384Kdf
3,125,876 UART: [kat] LMS
4,316,024 UART: [kat] --
4,320,643 UART: [cold-reset] ++
4,322,914 UART: [fht] Storing FHT @ 0x50003400
4,334,730 UART: [idev] ++
4,335,303 UART: [idev] CDI.KEYID = 6
4,336,291 UART: [idev] SUBJECT.KEYID = 7
4,337,516 UART: [idev] UDS.KEYID = 0
4,340,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,402 UART: [idev] Erasing UDS.KEYID = 0
7,623,206 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,939 UART: [idev] --
7,649,640 UART: [ldev] ++
7,650,228 UART: [ldev] CDI.KEYID = 6
7,651,172 UART: [ldev] SUBJECT.KEYID = 5
7,652,413 UART: [ldev] AUTHORITY.KEYID = 7
7,653,660 UART: [ldev] FE.KEYID = 1
7,666,662 UART: [ldev] Erasing FE.KEYID = 1
10,955,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,904 UART: [ldev] --
13,315,583 UART: [fwproc] Waiting for Commands...
13,318,503 UART: [fwproc] Received command 0x46574c44
13,320,702 UART: [fwproc] Received Image of size 118548 bytes
16,272,722 UART: ROM Fatal Error: 0x000B0022
16,276,192 >>> mbox cmd response: failed
16,276,639 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,276,976 >>> mbox cmd response: failed
16,277,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,277,574 >>> mbox cmd response: failed
Initializing fuses
2,057,412 writing to cptra_bootfsm_go
2,246,725 UART:
2,247,094 UART: Running Caliptra ROM ...
2,248,249 UART:
4,179,898 UART: [state] CFI Enabled
4,193,927 UART: [state] LifecycleState = Unprovisioned
4,195,846 UART: [state] DebugLocked = No
4,198,855 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,203,168 UART: [kat] SHA2-256
4,372,934 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,383,470 UART: [kat] ++
4,383,985 UART: [kat] sha1
4,394,828 UART: [kat] SHA2-256
4,397,529 UART: [kat] SHA2-384
4,402,874 UART: [kat] SHA2-512-ACC
4,405,236 UART: [kat] ECC-384
6,692,865 UART: [kat] HMAC-384Kdf
6,704,937 UART: [kat] LMS
7,895,005 UART: [kat] --
7,899,931 UART: [cold-reset] ++
7,901,277 UART: [fht] Storing FHT @ 0x50003400
7,912,349 UART: [idev] ++
7,912,923 UART: [idev] CDI.KEYID = 6
7,913,837 UART: [idev] SUBJECT.KEYID = 7
7,915,112 UART: [idev] UDS.KEYID = 0
7,917,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,066,359 UART: [idev] Erasing UDS.KEYID = 0
11,206,234 UART: [idev] Using Sha1 for KeyId Algorithm
11,227,728 UART: [idev] --
11,231,866 UART: [ldev] ++
11,232,452 UART: [ldev] CDI.KEYID = 6
11,233,479 UART: [ldev] SUBJECT.KEYID = 5
11,234,684 UART: [ldev] AUTHORITY.KEYID = 7
11,235,875 UART: [ldev] FE.KEYID = 1
11,246,482 UART: [ldev] Erasing FE.KEYID = 1
14,533,186 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,825,493 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,840,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,854,899 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,869,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,887,326 UART: [ldev] --
16,892,662 UART: [fwproc] Waiting for Commands...
16,894,425 UART: [fwproc] Received command 0x46574c44
16,896,646 UART: [fwproc] Received Image of size 118548 bytes
20,998,196 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,077,043 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,150,235 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,479,263 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
4,124,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,049,042 >>> mbox cmd response: failed
16,049,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,049,981 >>> mbox cmd response: failed
16,050,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,050,594 >>> mbox cmd response: failed
Initializing fuses
2,057,682 writing to cptra_bootfsm_go
7,952,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,985,431 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,237 UART:
192,608 UART: Running Caliptra ROM ...
193,765 UART:
193,914 UART: [state] CFI Enabled
256,919 UART: [state] LifecycleState = Unprovisioned
258,847 UART: [state] DebugLocked = No
260,399 UART: [state] WD Timer not started. Device not locked for debugging
264,211 UART: [kat] SHA2-256
443,901 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,663 UART: [kat] ++
455,163 UART: [kat] sha1
466,048 UART: [kat] SHA2-256
468,740 UART: [kat] SHA2-384
474,072 UART: [kat] SHA2-512-ACC
476,472 UART: [kat] ECC-384
2,924,641 UART: [kat] HMAC-384Kdf
2,948,500 UART: [kat] LMS
3,424,990 UART: [kat] --
3,428,931 UART: [cold-reset] ++
3,431,517 UART: [fht] FHT @ 0x50003400
3,442,831 UART: [idev] ++
3,443,404 UART: [idev] CDI.KEYID = 6
3,444,428 UART: [idev] SUBJECT.KEYID = 7
3,445,597 UART: [idev] UDS.KEYID = 0
3,448,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,510 UART: [idev] Erasing UDS.KEYID = 0
5,961,005 UART: [idev] Sha1 KeyId Algorithm
5,984,565 UART: [idev] --
5,989,427 UART: [ldev] ++
5,990,004 UART: [ldev] CDI.KEYID = 6
5,990,923 UART: [ldev] SUBJECT.KEYID = 5
5,992,146 UART: [ldev] AUTHORITY.KEYID = 7
5,993,385 UART: [ldev] FE.KEYID = 1
6,032,446 UART: [ldev] Erasing FE.KEYID = 1
8,539,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,289,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,305,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,321,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,726 UART: [ldev] --
10,349,427 UART: [fwproc] Wait for Commands...
10,351,096 UART: [fwproc] Recv command 0x46574c44
10,353,164 UART: [fwproc] Recv'd Img size: 118548 bytes
12,683,327 UART: ROM Fatal Error: 0x000B0022
12,686,576 >>> mbox cmd response: failed
12,686,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,687,334 >>> mbox cmd response: failed
12,687,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,687,906 >>> mbox cmd response: failed
Initializing fuses
2,060,619 writing to cptra_bootfsm_go
2,249,961 UART:
2,250,309 UART: Running Caliptra ROM ...
2,251,454 UART:
2,251,645 UART: [state] CFI Enabled
2,312,970 UART: [state] LifecycleState = Unprovisioned
2,314,932 UART: [state] DebugLocked = No
2,316,549 UART: [state] WD Timer not started. Device not locked for debugging
2,320,468 UART: [kat] SHA2-256
2,500,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,901 UART: [kat] ++
2,511,369 UART: [kat] sha1
2,522,137 UART: [kat] SHA2-256
2,524,841 UART: [kat] SHA2-384
2,529,972 UART: [kat] SHA2-512-ACC
2,532,335 UART: [kat] ECC-384
4,995,866 UART: [kat] HMAC-384Kdf
5,017,360 UART: [kat] LMS
5,493,884 UART: [kat] --
5,498,909 UART: [cold-reset] ++
5,501,115 UART: [fht] FHT @ 0x50003400
5,511,879 UART: [idev] ++
5,512,517 UART: [idev] CDI.KEYID = 6
5,513,454 UART: [idev] SUBJECT.KEYID = 7
5,514,688 UART: [idev] UDS.KEYID = 0
5,517,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,068 UART: [idev] Erasing UDS.KEYID = 0
8,032,250 UART: [idev] Sha1 KeyId Algorithm
8,055,379 UART: [idev] --
8,060,416 UART: [ldev] ++
8,060,997 UART: [ldev] CDI.KEYID = 6
8,061,889 UART: [ldev] SUBJECT.KEYID = 5
8,063,108 UART: [ldev] AUTHORITY.KEYID = 7
8,064,345 UART: [ldev] FE.KEYID = 1
8,104,278 UART: [ldev] Erasing FE.KEYID = 1
10,610,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,344,846 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,360,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,376,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,413,446 UART: [ldev] --
12,418,935 UART: [fwproc] Wait for Commands...
12,422,114 UART: [fwproc] Recv command 0x46574c44
12,424,163 UART: [fwproc] Recv'd Img size: 118548 bytes
15,919,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,066,599 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,521 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,463,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,578,372 >>> mbox cmd response: failed
12,578,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,579,306 >>> mbox cmd response: failed
12,579,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,579,884 >>> mbox cmd response: failed
Initializing fuses
2,065,545 writing to cptra_bootfsm_go
5,516,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,259,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,481 writing to cptra_bootfsm_go
192,757 UART:
193,105 UART: Running Caliptra ROM ...
194,217 UART:
603,762 UART: [state] CFI Enabled
619,318 UART: [state] LifecycleState = Unprovisioned
621,237 UART: [state] DebugLocked = No
623,061 UART: [state] WD Timer not started. Device not locked for debugging
626,078 UART: [kat] SHA2-256
805,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,490 UART: [kat] ++
816,944 UART: [kat] sha1
828,739 UART: [kat] SHA2-256
831,423 UART: [kat] SHA2-384
838,760 UART: [kat] SHA2-512-ACC
841,114 UART: [kat] ECC-384
3,284,359 UART: [kat] HMAC-384Kdf
3,296,280 UART: [kat] LMS
3,772,810 UART: [kat] --
3,776,756 UART: [cold-reset] ++
3,778,590 UART: [fht] FHT @ 0x50003400
3,791,088 UART: [idev] ++
3,791,672 UART: [idev] CDI.KEYID = 6
3,792,643 UART: [idev] SUBJECT.KEYID = 7
3,793,867 UART: [idev] UDS.KEYID = 0
3,796,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,360 UART: [idev] Erasing UDS.KEYID = 0
6,271,429 UART: [idev] Sha1 KeyId Algorithm
6,295,043 UART: [idev] --
6,299,836 UART: [ldev] ++
6,300,422 UART: [ldev] CDI.KEYID = 6
6,301,342 UART: [ldev] SUBJECT.KEYID = 5
6,302,563 UART: [ldev] AUTHORITY.KEYID = 7
6,303,801 UART: [ldev] FE.KEYID = 1
6,315,372 UART: [ldev] Erasing FE.KEYID = 1
8,795,834 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,367 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,377 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,672 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,173 UART: [ldev] --
10,592,195 UART: [fwproc] Wait for Commands...
10,594,249 UART: [fwproc] Recv command 0x46574c44
10,596,249 UART: [fwproc] Recv'd Img size: 118548 bytes
12,912,115 UART: ROM Fatal Error: 0x000B0022
12,915,353 >>> mbox cmd response: failed
12,915,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,130 >>> mbox cmd response: failed
12,916,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,697 >>> mbox cmd response: failed
Initializing fuses
2,060,514 writing to cptra_bootfsm_go
2,249,856 UART:
2,250,190 UART: Running Caliptra ROM ...
2,251,323 UART:
7,534,327 UART: [state] CFI Enabled
7,549,014 UART: [state] LifecycleState = Unprovisioned
7,550,969 UART: [state] DebugLocked = No
7,553,566 UART: [state] WD Timer not started. Device not locked for debugging
7,558,028 UART: [kat] SHA2-256
7,737,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,748,470 UART: [kat] ++
7,748,947 UART: [kat] sha1
7,760,164 UART: [kat] SHA2-256
7,762,869 UART: [kat] SHA2-384
7,768,431 UART: [kat] SHA2-512-ACC
7,770,841 UART: [kat] ECC-384
10,214,262 UART: [kat] HMAC-384Kdf
10,226,350 UART: [kat] LMS
10,702,878 UART: [kat] --
10,706,610 UART: [cold-reset] ++
10,708,782 UART: [fht] FHT @ 0x50003400
10,719,816 UART: [idev] ++
10,720,391 UART: [idev] CDI.KEYID = 6
10,721,370 UART: [idev] SUBJECT.KEYID = 7
10,722,591 UART: [idev] UDS.KEYID = 0
10,724,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,873,926 UART: [idev] Erasing UDS.KEYID = 0
13,205,238 UART: [idev] Sha1 KeyId Algorithm
13,228,695 UART: [idev] --
13,233,853 UART: [ldev] ++
13,234,430 UART: [ldev] CDI.KEYID = 6
13,235,320 UART: [ldev] SUBJECT.KEYID = 5
13,236,589 UART: [ldev] AUTHORITY.KEYID = 7
13,237,820 UART: [ldev] FE.KEYID = 1
13,247,419 UART: [ldev] Erasing FE.KEYID = 1
15,725,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,449,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,464,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,480,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,496,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,518,393 UART: [ldev] --
17,524,090 UART: [fwproc] Wait for Commands...
17,526,357 UART: [fwproc] Recv command 0x46574c44
17,528,355 UART: [fwproc] Recv'd Img size: 118548 bytes
21,009,004 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,083,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,156,060 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,483,893 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
3,781,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,802,685 >>> mbox cmd response: failed
12,803,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,803,545 >>> mbox cmd response: failed
12,803,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,804,109 >>> mbox cmd response: failed
Initializing fuses
2,060,618 writing to cptra_bootfsm_go
10,843,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,502,666 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,925 writing to cptra_bootfsm_go
193,045 UART:
193,405 UART: Running Caliptra ROM ...
194,611 UART:
194,785 UART: [state] CFI Enabled
263,677 UART: [state] LifecycleState = Unprovisioned
266,102 UART: [state] DebugLocked = No
268,110 UART: [state] WD Timer not started. Device not locked for debugging
272,592 UART: [kat] SHA2-256
462,510 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,267 UART: [kat] ++
473,719 UART: [kat] sha1
486,170 UART: [kat] SHA2-256
489,184 UART: [kat] SHA2-384
494,040 UART: [kat] SHA2-512-ACC
496,616 UART: [kat] ECC-384
2,949,561 UART: [kat] HMAC-384Kdf
2,971,786 UART: [kat] LMS
3,503,536 UART: [kat] --
3,507,533 UART: [cold-reset] ++
3,508,716 UART: [fht] FHT @ 0x50003400
3,520,241 UART: [idev] ++
3,520,931 UART: [idev] CDI.KEYID = 6
3,522,138 UART: [idev] SUBJECT.KEYID = 7
3,523,175 UART: [idev] UDS.KEYID = 0
3,525,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,138 UART: [idev] Erasing UDS.KEYID = 0
6,026,779 UART: [idev] Sha1 KeyId Algorithm
6,048,777 UART: [idev] --
6,053,501 UART: [ldev] ++
6,054,204 UART: [ldev] CDI.KEYID = 6
6,055,120 UART: [ldev] SUBJECT.KEYID = 5
6,056,227 UART: [ldev] AUTHORITY.KEYID = 7
6,057,461 UART: [ldev] FE.KEYID = 1
6,100,302 UART: [ldev] Erasing FE.KEYID = 1
8,604,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,209 UART: [ldev] --
10,411,363 UART: [fwproc] Wait for Commands...
10,414,014 UART: [fwproc] Recv command 0x46574c44
10,416,283 UART: [fwproc] Recv'd Img size: 118548 bytes
12,758,555 UART: ROM Fatal Error: 0x000B0022
12,762,181 >>> mbox cmd response: failed
12,762,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,762,944 >>> mbox cmd response: failed
12,763,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,763,517 >>> mbox cmd response: failed
Initializing fuses
2,062,323 writing to cptra_bootfsm_go
2,251,660 UART:
2,252,013 UART: Running Caliptra ROM ...
2,253,149 UART:
2,253,317 UART: [state] CFI Enabled
2,320,368 UART: [state] LifecycleState = Unprovisioned
2,322,743 UART: [state] DebugLocked = No
2,324,219 UART: [state] WD Timer not started. Device not locked for debugging
2,328,106 UART: [kat] SHA2-256
2,517,982 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,765 UART: [kat] ++
2,529,233 UART: [kat] sha1
2,539,963 UART: [kat] SHA2-256
2,542,994 UART: [kat] SHA2-384
2,547,803 UART: [kat] SHA2-512-ACC
2,550,379 UART: [kat] ECC-384
5,004,119 UART: [kat] HMAC-384Kdf
5,029,165 UART: [kat] LMS
5,560,941 UART: [kat] --
5,565,589 UART: [cold-reset] ++
5,568,076 UART: [fht] FHT @ 0x50003400
5,579,279 UART: [idev] ++
5,579,968 UART: [idev] CDI.KEYID = 6
5,580,888 UART: [idev] SUBJECT.KEYID = 7
5,582,130 UART: [idev] UDS.KEYID = 0
5,584,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,699 UART: [idev] Erasing UDS.KEYID = 0
8,088,953 UART: [idev] Sha1 KeyId Algorithm
8,112,733 UART: [idev] --
8,117,493 UART: [ldev] ++
8,118,378 UART: [ldev] CDI.KEYID = 6
8,119,297 UART: [ldev] SUBJECT.KEYID = 5
8,120,500 UART: [ldev] AUTHORITY.KEYID = 7
8,121,689 UART: [ldev] FE.KEYID = 1
8,158,377 UART: [ldev] Erasing FE.KEYID = 1
10,668,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,313 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,501 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,905 UART: [ldev] --
12,473,238 UART: [fwproc] Wait for Commands...
12,475,881 UART: [fwproc] Recv command 0x46574c44
12,478,152 UART: [fwproc] Recv'd Img size: 118548 bytes
15,977,883 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,057,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,181,440 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,740,930 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
3,440,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,664,286 >>> mbox cmd response: failed
12,664,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,174 >>> mbox cmd response: failed
12,665,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,742 >>> mbox cmd response: failed
Initializing fuses
2,062,331 writing to cptra_bootfsm_go
5,490,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,870,790 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,131 writing to cptra_bootfsm_go
192,319 UART:
192,708 UART: Running Caliptra ROM ...
193,817 UART:
603,380 UART: [state] CFI Enabled
619,180 UART: [state] LifecycleState = Unprovisioned
621,532 UART: [state] DebugLocked = No
623,625 UART: [state] WD Timer not started. Device not locked for debugging
628,287 UART: [kat] SHA2-256
818,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,957 UART: [kat] ++
829,499 UART: [kat] sha1
840,654 UART: [kat] SHA2-256
843,674 UART: [kat] SHA2-384
850,580 UART: [kat] SHA2-512-ACC
853,158 UART: [kat] ECC-384
3,295,314 UART: [kat] HMAC-384Kdf
3,308,273 UART: [kat] LMS
3,840,136 UART: [kat] --
3,844,250 UART: [cold-reset] ++
3,846,679 UART: [fht] FHT @ 0x50003400
3,857,499 UART: [idev] ++
3,858,166 UART: [idev] CDI.KEYID = 6
3,859,144 UART: [idev] SUBJECT.KEYID = 7
3,860,312 UART: [idev] UDS.KEYID = 0
3,863,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,055 UART: [idev] Erasing UDS.KEYID = 0
6,332,726 UART: [idev] Sha1 KeyId Algorithm
6,355,811 UART: [idev] --
6,360,378 UART: [ldev] ++
6,361,072 UART: [ldev] CDI.KEYID = 6
6,361,962 UART: [ldev] SUBJECT.KEYID = 5
6,363,077 UART: [ldev] AUTHORITY.KEYID = 7
6,364,394 UART: [ldev] FE.KEYID = 1
6,375,293 UART: [ldev] Erasing FE.KEYID = 1
8,855,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,589 UART: [ldev] --
10,645,318 UART: [fwproc] Wait for Commands...
10,647,967 UART: [fwproc] Recv command 0x46574c44
10,650,238 UART: [fwproc] Recv'd Img size: 118548 bytes
12,986,898 UART: ROM Fatal Error: 0x000B0022
12,990,526 >>> mbox cmd response: failed
12,990,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,991,311 >>> mbox cmd response: failed
12,991,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,991,910 >>> mbox cmd response: failed
Initializing fuses
2,061,604 writing to cptra_bootfsm_go
2,250,943 UART:
2,251,319 UART: Running Caliptra ROM ...
2,252,458 UART:
7,459,975 UART: [state] CFI Enabled
7,473,535 UART: [state] LifecycleState = Unprovisioned
7,475,951 UART: [state] DebugLocked = No
7,478,072 UART: [state] WD Timer not started. Device not locked for debugging
7,482,434 UART: [kat] SHA2-256
7,672,355 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,683,114 UART: [kat] ++
7,683,648 UART: [kat] sha1
7,696,019 UART: [kat] SHA2-256
7,699,059 UART: [kat] SHA2-384
7,703,983 UART: [kat] SHA2-512-ACC
7,706,565 UART: [kat] ECC-384
10,149,618 UART: [kat] HMAC-384Kdf
10,163,259 UART: [kat] LMS
10,695,075 UART: [kat] --
10,698,872 UART: [cold-reset] ++
10,699,949 UART: [fht] FHT @ 0x50003400
10,711,232 UART: [idev] ++
10,711,947 UART: [idev] CDI.KEYID = 6
10,712,838 UART: [idev] SUBJECT.KEYID = 7
10,714,061 UART: [idev] UDS.KEYID = 0
10,716,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,865,440 UART: [idev] Erasing UDS.KEYID = 0
13,191,973 UART: [idev] Sha1 KeyId Algorithm
13,214,676 UART: [idev] --
13,220,890 UART: [ldev] ++
13,221,573 UART: [ldev] CDI.KEYID = 6
13,222,513 UART: [ldev] SUBJECT.KEYID = 5
13,223,671 UART: [ldev] AUTHORITY.KEYID = 7
13,224,869 UART: [ldev] FE.KEYID = 1
13,236,407 UART: [ldev] Erasing FE.KEYID = 1
15,716,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,437,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,453,120 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,468,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,483,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,505,412 UART: [ldev] --
17,511,529 UART: [fwproc] Wait for Commands...
17,514,618 UART: [fwproc] Recv command 0x46574c44
17,516,894 UART: [fwproc] Recv'd Img size: 118548 bytes
21,017,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,097,824 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,221,441 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,782,517 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
3,755,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,890,999 >>> mbox cmd response: failed
12,891,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,891,897 >>> mbox cmd response: failed
12,892,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,892,472 >>> mbox cmd response: failed
Initializing fuses
2,060,629 writing to cptra_bootfsm_go
10,722,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,004,993 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,276 UART: [state] LifecycleState = Unprovisioned
85,931 UART: [state] DebugLocked = No
86,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,467 UART: [kat] SHA2-256
892,405 UART: [kat] SHA2-384
895,164 UART: [kat] SHA2-512-ACC
897,065 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,096 UART: [kat] LMS
1,475,292 UART: [kat] --
1,476,313 UART: [cold-reset] ++
1,476,685 UART: [fht] Storing FHT @ 0x50003400
1,479,622 UART: [idev] ++
1,479,790 UART: [idev] CDI.KEYID = 6
1,480,150 UART: [idev] SUBJECT.KEYID = 7
1,480,574 UART: [idev] UDS.KEYID = 0
1,480,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,582 UART: [idev] Erasing UDS.KEYID = 0
1,505,078 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,644 UART: [idev] --
1,514,703 UART: [ldev] ++
1,514,871 UART: [ldev] CDI.KEYID = 6
1,515,234 UART: [ldev] SUBJECT.KEYID = 5
1,515,660 UART: [ldev] AUTHORITY.KEYID = 7
1,516,123 UART: [ldev] FE.KEYID = 1
1,521,363 UART: [ldev] Erasing FE.KEYID = 1
1,546,178 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,064 UART: [ldev] --
1,585,363 UART: [fwproc] Waiting for Commands...
1,586,152 UART: [fwproc] Received command 0x46574c44
1,586,943 UART: [fwproc] Received Image of size 118548 bytes
1,866,956 UART: ROM Fatal Error: 0x000B0022
1,868,113 >>> mbox cmd response: failed
1,868,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,119 >>> mbox cmd response: failed
1,868,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,868,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,147 UART: [kat] SHA2-256
882,078 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,193 UART: [kat] ++
886,345 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
906,888 UART: [kat] LMS
1,475,084 UART: [kat] --
1,475,751 UART: [cold-reset] ++
1,476,285 UART: [fht] Storing FHT @ 0x50003400
1,479,044 UART: [idev] ++
1,479,212 UART: [idev] CDI.KEYID = 6
1,479,572 UART: [idev] SUBJECT.KEYID = 7
1,479,996 UART: [idev] UDS.KEYID = 0
1,480,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,680 UART: [idev] Erasing UDS.KEYID = 0
1,504,192 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,828 UART: [idev] --
1,513,641 UART: [ldev] ++
1,513,809 UART: [ldev] CDI.KEYID = 6
1,514,172 UART: [ldev] SUBJECT.KEYID = 5
1,514,598 UART: [ldev] AUTHORITY.KEYID = 7
1,515,061 UART: [ldev] FE.KEYID = 1
1,520,367 UART: [ldev] Erasing FE.KEYID = 1
1,545,190 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,158 UART: [ldev] --
1,584,457 UART: [fwproc] Waiting for Commands...
1,585,206 UART: [fwproc] Received command 0x46574c44
1,585,997 UART: [fwproc] Received Image of size 118548 bytes
2,929,992 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,812 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,030 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,417 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,718,432 >>> mbox cmd response: failed
1,718,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,438 >>> mbox cmd response: failed
1,718,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,718,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,817 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,345 UART: [state] LifecycleState = Unprovisioned
86,000 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,216 UART: [kat] SHA2-256
882,147 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,262 UART: [kat] ++
886,414 UART: [kat] sha1
890,652 UART: [kat] SHA2-256
892,590 UART: [kat] SHA2-384
895,405 UART: [kat] SHA2-512-ACC
897,306 UART: [kat] ECC-384
902,749 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,334 UART: [cold-reset] ++
1,476,810 UART: [fht] Storing FHT @ 0x50003400
1,479,663 UART: [idev] ++
1,479,831 UART: [idev] CDI.KEYID = 6
1,480,191 UART: [idev] SUBJECT.KEYID = 7
1,480,615 UART: [idev] UDS.KEYID = 0
1,480,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,601 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,109 UART: [idev] --
1,515,002 UART: [ldev] ++
1,515,170 UART: [ldev] CDI.KEYID = 6
1,515,533 UART: [ldev] SUBJECT.KEYID = 5
1,515,959 UART: [ldev] AUTHORITY.KEYID = 7
1,516,422 UART: [ldev] FE.KEYID = 1
1,521,690 UART: [ldev] Erasing FE.KEYID = 1
1,547,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,873 UART: [ldev] --
1,587,168 UART: [fwproc] Waiting for Commands...
1,587,995 UART: [fwproc] Received command 0x46574c44
1,588,786 UART: [fwproc] Received Image of size 118548 bytes
1,868,503 UART: ROM Fatal Error: 0x000B0022
1,869,660 >>> mbox cmd response: failed
1,869,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,666 >>> mbox cmd response: failed
1,869,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,869,672 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,650 UART: [kat] SHA2-256
882,581 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,696 UART: [kat] ++
886,848 UART: [kat] sha1
891,086 UART: [kat] SHA2-256
893,024 UART: [kat] SHA2-384
895,705 UART: [kat] SHA2-512-ACC
897,606 UART: [kat] ECC-384
903,065 UART: [kat] HMAC-384Kdf
907,819 UART: [kat] LMS
1,476,015 UART: [kat] --
1,476,906 UART: [cold-reset] ++
1,477,458 UART: [fht] Storing FHT @ 0x50003400
1,480,353 UART: [idev] ++
1,480,521 UART: [idev] CDI.KEYID = 6
1,480,881 UART: [idev] SUBJECT.KEYID = 7
1,481,305 UART: [idev] UDS.KEYID = 0
1,481,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,453 UART: [idev] Erasing UDS.KEYID = 0
1,506,185 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,967 UART: [idev] --
1,515,960 UART: [ldev] ++
1,516,128 UART: [ldev] CDI.KEYID = 6
1,516,491 UART: [ldev] SUBJECT.KEYID = 5
1,516,917 UART: [ldev] AUTHORITY.KEYID = 7
1,517,380 UART: [ldev] FE.KEYID = 1
1,522,568 UART: [ldev] Erasing FE.KEYID = 1
1,548,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,123 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,249 UART: [ldev] --
1,587,546 UART: [fwproc] Waiting for Commands...
1,588,225 UART: [fwproc] Received command 0x46574c44
1,589,016 UART: [fwproc] Received Image of size 118548 bytes
2,934,355 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,869 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,292 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,722,295 >>> mbox cmd response: failed
1,722,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,301 >>> mbox cmd response: failed
1,722,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,307 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,234 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Unprovisioned
85,939 UART: [state] DebugLocked = No
86,521 UART: [state] WD Timer not started. Device not locked for debugging
87,680 UART: [kat] SHA2-256
891,230 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,334 UART: [kat] ++
895,486 UART: [kat] sha1
899,746 UART: [kat] SHA2-256
901,686 UART: [kat] SHA2-384
904,547 UART: [kat] SHA2-512-ACC
906,448 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,885 UART: [kat] LMS
1,169,197 UART: [kat] --
1,170,096 UART: [cold-reset] ++
1,170,428 UART: [fht] FHT @ 0x50003400
1,173,180 UART: [idev] ++
1,173,348 UART: [idev] CDI.KEYID = 6
1,173,709 UART: [idev] SUBJECT.KEYID = 7
1,174,134 UART: [idev] UDS.KEYID = 0
1,174,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,733 UART: [idev] --
1,208,742 UART: [ldev] ++
1,208,910 UART: [ldev] CDI.KEYID = 6
1,209,274 UART: [ldev] SUBJECT.KEYID = 5
1,209,701 UART: [ldev] AUTHORITY.KEYID = 7
1,210,164 UART: [ldev] FE.KEYID = 1
1,215,196 UART: [ldev] Erasing FE.KEYID = 1
1,241,527 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,883 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,599 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,793 UART: [fwproc] Wait for Commands...
1,281,398 UART: [fwproc] Recv command 0x46574c44
1,282,131 UART: [fwproc] Recv'd Img size: 118548 bytes
1,561,510 UART: ROM Fatal Error: 0x000B0022
1,562,667 >>> mbox cmd response: failed
1,562,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,673 >>> mbox cmd response: failed
1,562,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,562,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,154 UART: [state] LifecycleState = Unprovisioned
85,809 UART: [state] DebugLocked = No
86,539 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
891,358 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,462 UART: [kat] ++
895,614 UART: [kat] sha1
899,760 UART: [kat] SHA2-256
901,700 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
916,379 UART: [kat] HMAC-384Kdf
920,895 UART: [kat] LMS
1,169,207 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,356 UART: [fht] FHT @ 0x50003400
1,173,196 UART: [idev] ++
1,173,364 UART: [idev] CDI.KEYID = 6
1,173,725 UART: [idev] SUBJECT.KEYID = 7
1,174,150 UART: [idev] UDS.KEYID = 0
1,174,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,459 UART: [idev] Erasing UDS.KEYID = 0
1,199,591 UART: [idev] Sha1 KeyId Algorithm
1,208,429 UART: [idev] --
1,209,418 UART: [ldev] ++
1,209,586 UART: [ldev] CDI.KEYID = 6
1,209,950 UART: [ldev] SUBJECT.KEYID = 5
1,210,377 UART: [ldev] AUTHORITY.KEYID = 7
1,210,840 UART: [ldev] FE.KEYID = 1
1,216,290 UART: [ldev] Erasing FE.KEYID = 1
1,242,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,865 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,581 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,224 UART: [ldev] --
1,281,429 UART: [fwproc] Wait for Commands...
1,282,210 UART: [fwproc] Recv command 0x46574c44
1,282,943 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,976 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,602 >>> mbox cmd response: failed
1,418,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,608 >>> mbox cmd response: failed
1,418,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,527 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,085 UART: [kat] SHA2-256
891,635 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,739 UART: [kat] ++
895,891 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,866 UART: [kat] SHA2-512-ACC
906,767 UART: [kat] ECC-384
916,560 UART: [kat] HMAC-384Kdf
921,294 UART: [kat] LMS
1,169,606 UART: [kat] --
1,170,571 UART: [cold-reset] ++
1,170,939 UART: [fht] FHT @ 0x50003400
1,173,647 UART: [idev] ++
1,173,815 UART: [idev] CDI.KEYID = 6
1,174,176 UART: [idev] SUBJECT.KEYID = 7
1,174,601 UART: [idev] UDS.KEYID = 0
1,174,947 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,768 UART: [idev] Erasing UDS.KEYID = 0
1,200,116 UART: [idev] Sha1 KeyId Algorithm
1,209,028 UART: [idev] --
1,210,135 UART: [ldev] ++
1,210,303 UART: [ldev] CDI.KEYID = 6
1,210,667 UART: [ldev] SUBJECT.KEYID = 5
1,211,094 UART: [ldev] AUTHORITY.KEYID = 7
1,211,557 UART: [ldev] FE.KEYID = 1
1,216,849 UART: [ldev] Erasing FE.KEYID = 1
1,243,296 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,163 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,011 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,133 UART: [fwproc] Recv command 0x46574c44
1,283,866 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,579 UART: ROM Fatal Error: 0x000B0022
1,563,736 >>> mbox cmd response: failed
1,563,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,742 >>> mbox cmd response: failed
1,563,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
900,031 UART: [kat] SHA2-256
901,971 UART: [kat] SHA2-384
904,764 UART: [kat] SHA2-512-ACC
906,665 UART: [kat] ECC-384
916,098 UART: [kat] HMAC-384Kdf
920,822 UART: [kat] LMS
1,169,134 UART: [kat] --
1,170,051 UART: [cold-reset] ++
1,170,617 UART: [fht] FHT @ 0x50003400
1,173,045 UART: [idev] ++
1,173,213 UART: [idev] CDI.KEYID = 6
1,173,574 UART: [idev] SUBJECT.KEYID = 7
1,173,999 UART: [idev] UDS.KEYID = 0
1,174,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,710 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,208,957 UART: [ldev] ++
1,209,125 UART: [ldev] CDI.KEYID = 6
1,209,489 UART: [ldev] SUBJECT.KEYID = 5
1,209,916 UART: [ldev] AUTHORITY.KEYID = 7
1,210,379 UART: [ldev] FE.KEYID = 1
1,215,947 UART: [ldev] Erasing FE.KEYID = 1
1,242,712 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,441 UART: [fwproc] Recv command 0x46574c44
1,283,174 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,316 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,909 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,084 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,363 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,799 >>> mbox cmd response: failed
1,418,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,805 >>> mbox cmd response: failed
1,418,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,811 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,672 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,619 UART: [state] WD Timer not started. Device not locked for debugging
87,908 UART: [kat] SHA2-256
893,558 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,683 UART: [kat] ++
897,835 UART: [kat] sha1
902,107 UART: [kat] SHA2-256
904,047 UART: [kat] SHA2-384
906,766 UART: [kat] SHA2-512-ACC
908,667 UART: [kat] ECC-384
918,212 UART: [kat] HMAC-384Kdf
922,772 UART: [kat] LMS
1,171,100 UART: [kat] --
1,171,745 UART: [cold-reset] ++
1,172,081 UART: [fht] FHT @ 0x50003400
1,174,802 UART: [idev] ++
1,174,970 UART: [idev] CDI.KEYID = 6
1,175,330 UART: [idev] SUBJECT.KEYID = 7
1,175,754 UART: [idev] UDS.KEYID = 0
1,176,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,834 UART: [idev] Erasing UDS.KEYID = 0
1,200,899 UART: [idev] Sha1 KeyId Algorithm
1,209,445 UART: [idev] --
1,210,477 UART: [ldev] ++
1,210,645 UART: [ldev] CDI.KEYID = 6
1,211,008 UART: [ldev] SUBJECT.KEYID = 5
1,211,434 UART: [ldev] AUTHORITY.KEYID = 7
1,211,897 UART: [ldev] FE.KEYID = 1
1,216,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,098 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,135 UART: [ldev] --
1,282,420 UART: [fwproc] Wait for Commands...
1,283,220 UART: [fwproc] Recv command 0x46574c44
1,283,948 UART: [fwproc] Recv'd Img size: 118548 bytes
1,564,205 UART: ROM Fatal Error: 0x000B0022
1,565,362 >>> mbox cmd response: failed
1,565,362 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,368 >>> mbox cmd response: failed
1,565,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,565,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,854 UART: [state] LifecycleState = Unprovisioned
85,509 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,358 UART: [kat] SHA2-256
893,008 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,133 UART: [kat] ++
897,285 UART: [kat] sha1
901,387 UART: [kat] SHA2-256
903,327 UART: [kat] SHA2-384
906,104 UART: [kat] SHA2-512-ACC
908,005 UART: [kat] ECC-384
917,554 UART: [kat] HMAC-384Kdf
922,156 UART: [kat] LMS
1,170,484 UART: [kat] --
1,171,467 UART: [cold-reset] ++
1,172,015 UART: [fht] FHT @ 0x50003400
1,174,672 UART: [idev] ++
1,174,840 UART: [idev] CDI.KEYID = 6
1,175,200 UART: [idev] SUBJECT.KEYID = 7
1,175,624 UART: [idev] UDS.KEYID = 0
1,175,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,678 UART: [idev] Erasing UDS.KEYID = 0
1,200,697 UART: [idev] Sha1 KeyId Algorithm
1,209,275 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,014 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,053 UART: [ldev] Erasing FE.KEYID = 1
1,243,332 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,350 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,062 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,119 UART: [ldev] --
1,282,450 UART: [fwproc] Wait for Commands...
1,283,124 UART: [fwproc] Recv command 0x46574c44
1,283,852 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,359 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,702 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,418,255 >>> mbox cmd response: failed
1,418,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,261 >>> mbox cmd response: failed
1,418,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,418,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,435 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,760 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
893,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,644 UART: [kat] ++
897,796 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,665 UART: [kat] SHA2-512-ACC
908,566 UART: [kat] ECC-384
917,935 UART: [kat] HMAC-384Kdf
922,375 UART: [kat] LMS
1,170,703 UART: [kat] --
1,171,472 UART: [cold-reset] ++
1,171,876 UART: [fht] FHT @ 0x50003400
1,174,589 UART: [idev] ++
1,174,757 UART: [idev] CDI.KEYID = 6
1,175,117 UART: [idev] SUBJECT.KEYID = 7
1,175,541 UART: [idev] UDS.KEYID = 0
1,175,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,416 UART: [idev] Sha1 KeyId Algorithm
1,209,902 UART: [idev] --
1,210,858 UART: [ldev] ++
1,211,026 UART: [ldev] CDI.KEYID = 6
1,211,389 UART: [ldev] SUBJECT.KEYID = 5
1,211,815 UART: [ldev] AUTHORITY.KEYID = 7
1,212,278 UART: [ldev] FE.KEYID = 1
1,217,452 UART: [ldev] Erasing FE.KEYID = 1
1,243,613 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,984 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,294 UART: [ldev] --
1,282,605 UART: [fwproc] Wait for Commands...
1,283,311 UART: [fwproc] Recv command 0x46574c44
1,284,039 UART: [fwproc] Recv'd Img size: 118548 bytes
1,562,672 UART: ROM Fatal Error: 0x000B0022
1,563,829 >>> mbox cmd response: failed
1,563,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,835 >>> mbox cmd response: failed
1,563,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,563,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,670 UART: [state] WD Timer not started. Device not locked for debugging
87,957 UART: [kat] SHA2-256
893,607 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,732 UART: [kat] ++
897,884 UART: [kat] sha1
901,898 UART: [kat] SHA2-256
903,838 UART: [kat] SHA2-384
906,829 UART: [kat] SHA2-512-ACC
908,730 UART: [kat] ECC-384
918,481 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,658 UART: [fht] FHT @ 0x50003400
1,175,219 UART: [idev] ++
1,175,387 UART: [idev] CDI.KEYID = 6
1,175,747 UART: [idev] SUBJECT.KEYID = 7
1,176,171 UART: [idev] UDS.KEYID = 0
1,176,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,613 UART: [idev] Erasing UDS.KEYID = 0
1,202,210 UART: [idev] Sha1 KeyId Algorithm
1,210,634 UART: [idev] --
1,211,514 UART: [ldev] ++
1,211,682 UART: [ldev] CDI.KEYID = 6
1,212,045 UART: [ldev] SUBJECT.KEYID = 5
1,212,471 UART: [ldev] AUTHORITY.KEYID = 7
1,212,934 UART: [ldev] FE.KEYID = 1
1,217,968 UART: [ldev] Erasing FE.KEYID = 1
1,244,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,504 UART: [ldev] --
1,283,817 UART: [fwproc] Wait for Commands...
1,284,591 UART: [fwproc] Recv command 0x46574c44
1,285,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,682 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,852 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,227 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,419,044 >>> mbox cmd response: failed
1,419,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,050 >>> mbox cmd response: failed
1,419,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,419,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,498 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,018 writing to cptra_bootfsm_go
192,221 UART:
192,562 UART: Running Caliptra ROM ...
193,752 UART:
193,906 UART: [state] CFI Enabled
260,992 UART: [state] LifecycleState = Unprovisioned
262,975 UART: [state] DebugLocked = No
265,337 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,035 UART: [kat] SHA2-256
439,714 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,240 UART: [kat] ++
450,688 UART: [kat] sha1
461,250 UART: [kat] SHA2-256
463,945 UART: [kat] SHA2-384
469,937 UART: [kat] SHA2-512-ACC
472,322 UART: [kat] ECC-384
2,766,459 UART: [kat] HMAC-384Kdf
2,798,795 UART: [kat] LMS
3,989,128 UART: [kat] --
3,993,854 UART: [cold-reset] ++
3,996,335 UART: [fht] Storing FHT @ 0x50003400
4,007,227 UART: [idev] ++
4,007,807 UART: [idev] CDI.KEYID = 6
4,008,727 UART: [idev] SUBJECT.KEYID = 7
4,009,947 UART: [idev] UDS.KEYID = 0
4,013,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,426 UART: [idev] Erasing UDS.KEYID = 0
7,343,659 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,319 UART: [idev] --
7,369,597 UART: [ldev] ++
7,370,172 UART: [ldev] CDI.KEYID = 6
7,371,141 UART: [ldev] SUBJECT.KEYID = 5
7,372,363 UART: [ldev] AUTHORITY.KEYID = 7
7,373,603 UART: [ldev] FE.KEYID = 1
7,421,248 UART: [ldev] Erasing FE.KEYID = 1
10,751,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,439 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,879 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,445 UART: [ldev] --
13,113,482 UART: [fwproc] Waiting for Commands...
13,116,454 UART: [fwproc] Received command 0x46574c44
13,118,644 UART: [fwproc] Received Image of size 118548 bytes
15,821,593 UART: ROM Fatal Error: 0x000B003E
15,825,036 >>> mbox cmd response: failed
15,825,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,825,746 >>> mbox cmd response: failed
15,826,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,826,320 >>> mbox cmd response: failed
Initializing fuses
2,057,531 writing to cptra_bootfsm_go
2,246,845 UART:
2,247,174 UART: Running Caliptra ROM ...
2,248,304 UART:
2,248,475 UART: [state] CFI Enabled
2,309,148 UART: [state] LifecycleState = Unprovisioned
2,311,096 UART: [state] DebugLocked = No
2,313,536 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,319,252 UART: [kat] SHA2-256
2,488,994 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,499,494 UART: [kat] ++
2,500,042 UART: [kat] sha1
2,510,136 UART: [kat] SHA2-256
2,512,827 UART: [kat] SHA2-384
2,518,658 UART: [kat] SHA2-512-ACC
2,521,014 UART: [kat] ECC-384
4,811,557 UART: [kat] HMAC-384Kdf
4,824,449 UART: [kat] LMS
6,014,759 UART: [kat] --
6,019,155 UART: [cold-reset] ++
6,020,234 UART: [fht] Storing FHT @ 0x50003400
6,031,130 UART: [idev] ++
6,031,698 UART: [idev] CDI.KEYID = 6
6,032,633 UART: [idev] SUBJECT.KEYID = 7
6,033,854 UART: [idev] UDS.KEYID = 0
6,036,126 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,185,290 UART: [idev] Erasing UDS.KEYID = 0
9,369,691 UART: [idev] Using Sha1 for KeyId Algorithm
9,392,647 UART: [idev] --
9,396,912 UART: [ldev] ++
9,397,486 UART: [ldev] CDI.KEYID = 6
9,398,455 UART: [ldev] SUBJECT.KEYID = 5
9,399,659 UART: [ldev] AUTHORITY.KEYID = 7
9,400,891 UART: [ldev] FE.KEYID = 1
9,446,945 UART: [ldev] Erasing FE.KEYID = 1
12,773,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,073,190 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,087,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,102,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,117,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,134,789 UART: [ldev] --
15,140,123 UART: [fwproc] Waiting for Commands...
15,142,448 UART: [fwproc] Received command 0x46574c44
15,144,637 UART: [fwproc] Received Image of size 118548 bytes
19,246,930 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,317,606 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,390,811 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,719,947 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
3,805,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,555,953 >>> mbox cmd response: failed
15,556,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,557,090 >>> mbox cmd response: failed
15,557,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,557,615 >>> mbox cmd response: failed
Initializing fuses
2,057,219 writing to cptra_bootfsm_go
5,847,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,023,787 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,605 UART:
192,956 UART: Running Caliptra ROM ...
194,154 UART:
603,774 UART: [state] CFI Enabled
619,393 UART: [state] LifecycleState = Unprovisioned
621,352 UART: [state] DebugLocked = No
622,954 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,003 UART: [kat] SHA2-256
797,762 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,270 UART: [kat] ++
808,754 UART: [kat] sha1
818,937 UART: [kat] SHA2-256
821,678 UART: [kat] SHA2-384
827,229 UART: [kat] SHA2-512-ACC
829,582 UART: [kat] ECC-384
3,113,141 UART: [kat] HMAC-384Kdf
3,125,742 UART: [kat] LMS
4,315,854 UART: [kat] --
4,321,579 UART: [cold-reset] ++
4,322,815 UART: [fht] Storing FHT @ 0x50003400
4,334,952 UART: [idev] ++
4,335,531 UART: [idev] CDI.KEYID = 6
4,336,444 UART: [idev] SUBJECT.KEYID = 7
4,337,678 UART: [idev] UDS.KEYID = 0
4,340,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,552 UART: [idev] Erasing UDS.KEYID = 0
7,625,318 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,606 UART: [idev] --
7,653,046 UART: [ldev] ++
7,653,627 UART: [ldev] CDI.KEYID = 6
7,654,546 UART: [ldev] SUBJECT.KEYID = 5
7,655,768 UART: [ldev] AUTHORITY.KEYID = 7
7,657,015 UART: [ldev] FE.KEYID = 1
7,668,215 UART: [ldev] Erasing FE.KEYID = 1
10,956,212 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,416 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,730 UART: [ldev] --
13,320,165 UART: [fwproc] Waiting for Commands...
13,323,514 UART: [fwproc] Received command 0x46574c44
13,325,709 UART: [fwproc] Received Image of size 118548 bytes
16,037,078 UART: ROM Fatal Error: 0x000B003E
16,040,534 >>> mbox cmd response: failed
16,040,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,041,306 >>> mbox cmd response: failed
16,041,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,041,881 >>> mbox cmd response: failed
Initializing fuses
2,060,338 writing to cptra_bootfsm_go
2,249,634 UART:
2,249,977 UART: Running Caliptra ROM ...
2,251,141 UART:
4,413,974 UART: [state] CFI Enabled
4,422,180 UART: [state] LifecycleState = Unprovisioned
4,424,094 UART: [state] DebugLocked = No
4,426,032 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,430,295 UART: [kat] SHA2-256
4,600,079 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,610,607 UART: [kat] ++
4,611,153 UART: [kat] sha1
4,623,835 UART: [kat] SHA2-256
4,626,540 UART: [kat] SHA2-384
4,632,806 UART: [kat] SHA2-512-ACC
4,635,166 UART: [kat] ECC-384
6,918,872 UART: [kat] HMAC-384Kdf
6,930,610 UART: [kat] LMS
8,120,754 UART: [kat] --
8,125,822 UART: [cold-reset] ++
8,127,075 UART: [fht] Storing FHT @ 0x50003400
8,139,055 UART: [idev] ++
8,139,631 UART: [idev] CDI.KEYID = 6
8,140,603 UART: [idev] SUBJECT.KEYID = 7
8,141,831 UART: [idev] UDS.KEYID = 0
8,144,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,293,097 UART: [idev] Erasing UDS.KEYID = 0
11,428,926 UART: [idev] Using Sha1 for KeyId Algorithm
11,449,621 UART: [idev] --
11,453,893 UART: [ldev] ++
11,454,525 UART: [ldev] CDI.KEYID = 6
11,455,440 UART: [ldev] SUBJECT.KEYID = 5
11,456,716 UART: [ldev] AUTHORITY.KEYID = 7
11,457,954 UART: [ldev] FE.KEYID = 1
11,467,424 UART: [ldev] Erasing FE.KEYID = 1
14,756,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,050,236 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,064,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,079,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,094,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,113,462 UART: [ldev] --
17,118,948 UART: [fwproc] Waiting for Commands...
17,122,240 UART: [fwproc] Received command 0x46574c44
17,124,435 UART: [fwproc] Received Image of size 118548 bytes
21,227,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,305,575 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,378,759 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,706,967 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,126,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,764,017 >>> mbox cmd response: failed
15,764,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,291 >>> mbox cmd response: failed
15,765,565 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,765,865 >>> mbox cmd response: failed
Initializing fuses
2,058,048 writing to cptra_bootfsm_go
8,232,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,276,424 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
192,316 UART:
192,673 UART: Running Caliptra ROM ...
194,178 UART:
194,332 UART: [state] CFI Enabled
262,500 UART: [state] LifecycleState = Unprovisioned
264,438 UART: [state] DebugLocked = No
266,116 UART: [state] WD Timer not started. Device not locked for debugging
269,330 UART: [kat] SHA2-256
448,981 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,736 UART: [kat] ++
460,250 UART: [kat] sha1
471,581 UART: [kat] SHA2-256
474,273 UART: [kat] SHA2-384
481,011 UART: [kat] SHA2-512-ACC
483,414 UART: [kat] ECC-384
2,946,254 UART: [kat] HMAC-384Kdf
2,968,055 UART: [kat] LMS
3,444,509 UART: [kat] --
3,450,493 UART: [cold-reset] ++
3,452,003 UART: [fht] FHT @ 0x50003400
3,463,691 UART: [idev] ++
3,464,262 UART: [idev] CDI.KEYID = 6
3,465,283 UART: [idev] SUBJECT.KEYID = 7
3,466,444 UART: [idev] UDS.KEYID = 0
3,469,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,419 UART: [idev] Erasing UDS.KEYID = 0
5,989,057 UART: [idev] Sha1 KeyId Algorithm
6,011,790 UART: [idev] --
6,016,833 UART: [ldev] ++
6,017,419 UART: [ldev] CDI.KEYID = 6
6,018,339 UART: [ldev] SUBJECT.KEYID = 5
6,019,564 UART: [ldev] AUTHORITY.KEYID = 7
6,020,801 UART: [ldev] FE.KEYID = 1
6,055,269 UART: [ldev] Erasing FE.KEYID = 1
8,560,759 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,168 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,118 UART: [ldev] --
10,368,864 UART: [fwproc] Wait for Commands...
10,370,812 UART: [fwproc] Recv command 0x46574c44
10,372,806 UART: [fwproc] Recv'd Img size: 118548 bytes
12,442,246 UART: ROM Fatal Error: 0x000B003E
12,445,537 >>> mbox cmd response: failed
12,445,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,135 >>> mbox cmd response: failed
12,446,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,799 >>> mbox cmd response: failed
Initializing fuses
2,063,989 writing to cptra_bootfsm_go
2,253,289 UART:
2,253,637 UART: Running Caliptra ROM ...
2,254,718 UART:
2,254,885 UART: [state] CFI Enabled
2,313,707 UART: [state] LifecycleState = Unprovisioned
2,315,640 UART: [state] DebugLocked = No
2,318,190 UART: [state] WD Timer not started. Device not locked for debugging
2,322,104 UART: [kat] SHA2-256
2,501,737 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,511 UART: [kat] ++
2,513,002 UART: [kat] sha1
2,524,113 UART: [kat] SHA2-256
2,526,815 UART: [kat] SHA2-384
2,532,652 UART: [kat] SHA2-512-ACC
2,535,008 UART: [kat] ECC-384
4,980,820 UART: [kat] HMAC-384Kdf
5,004,367 UART: [kat] LMS
5,480,892 UART: [kat] --
5,484,808 UART: [cold-reset] ++
5,486,052 UART: [fht] FHT @ 0x50003400
5,496,340 UART: [idev] ++
5,496,921 UART: [idev] CDI.KEYID = 6
5,497,913 UART: [idev] SUBJECT.KEYID = 7
5,499,077 UART: [idev] UDS.KEYID = 0
5,501,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,650,648 UART: [idev] Erasing UDS.KEYID = 0
8,019,814 UART: [idev] Sha1 KeyId Algorithm
8,044,800 UART: [idev] --
8,049,187 UART: [ldev] ++
8,049,768 UART: [ldev] CDI.KEYID = 6
8,050,744 UART: [ldev] SUBJECT.KEYID = 5
8,051,917 UART: [ldev] AUTHORITY.KEYID = 7
8,053,156 UART: [ldev] FE.KEYID = 1
8,089,359 UART: [ldev] Erasing FE.KEYID = 1
10,599,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,332,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,348,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,364,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,379,606 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,400,930 UART: [ldev] --
12,406,054 UART: [fwproc] Wait for Commands...
12,408,754 UART: [fwproc] Recv command 0x46574c44
12,410,747 UART: [fwproc] Recv'd Img size: 118548 bytes
15,900,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,053,293 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,380,822 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
3,462,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,334,046 >>> mbox cmd response: failed
12,334,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,334,951 >>> mbox cmd response: failed
12,335,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,335,519 >>> mbox cmd response: failed
Initializing fuses
2,067,948 writing to cptra_bootfsm_go
5,520,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,306,003 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,582 UART:
193,115 UART: Running Caliptra ROM ...
194,276 UART:
603,691 UART: [state] CFI Enabled
618,650 UART: [state] LifecycleState = Unprovisioned
620,614 UART: [state] DebugLocked = No
623,531 UART: [state] WD Timer not started. Device not locked for debugging
627,944 UART: [kat] SHA2-256
807,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,411 UART: [kat] ++
818,950 UART: [kat] sha1
830,320 UART: [kat] SHA2-256
832,731 UART: [kat] SHA2-384
837,971 UART: [kat] SHA2-512-ACC
840,344 UART: [kat] ECC-384
3,282,372 UART: [kat] HMAC-384Kdf
3,295,098 UART: [kat] LMS
3,771,618 UART: [kat] --
3,776,332 UART: [cold-reset] ++
3,777,249 UART: [fht] FHT @ 0x50003400
3,788,446 UART: [idev] ++
3,789,017 UART: [idev] CDI.KEYID = 6
3,789,989 UART: [idev] SUBJECT.KEYID = 7
3,791,286 UART: [idev] UDS.KEYID = 0
3,793,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,801 UART: [idev] Erasing UDS.KEYID = 0
6,271,081 UART: [idev] Sha1 KeyId Algorithm
6,295,020 UART: [idev] --
6,299,451 UART: [ldev] ++
6,300,025 UART: [ldev] CDI.KEYID = 6
6,301,016 UART: [ldev] SUBJECT.KEYID = 5
6,302,186 UART: [ldev] AUTHORITY.KEYID = 7
6,303,424 UART: [ldev] FE.KEYID = 1
6,314,611 UART: [ldev] Erasing FE.KEYID = 1
8,795,383 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,197 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,814 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,909 UART: [ldev] --
10,589,960 UART: [fwproc] Wait for Commands...
10,591,898 UART: [fwproc] Recv command 0x46574c44
10,593,902 UART: [fwproc] Recv'd Img size: 118548 bytes
12,662,160 UART: ROM Fatal Error: 0x000B003E
12,665,394 >>> mbox cmd response: failed
12,665,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,127 >>> mbox cmd response: failed
12,666,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,666,699 >>> mbox cmd response: failed
Initializing fuses
2,060,330 writing to cptra_bootfsm_go
2,249,625 UART:
2,249,966 UART: Running Caliptra ROM ...
2,251,107 UART:
7,785,868 UART: [state] CFI Enabled
7,799,617 UART: [state] LifecycleState = Unprovisioned
7,801,545 UART: [state] DebugLocked = No
7,803,916 UART: [state] WD Timer not started. Device not locked for debugging
7,808,158 UART: [kat] SHA2-256
7,987,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,998,559 UART: [kat] ++
7,999,056 UART: [kat] sha1
8,010,418 UART: [kat] SHA2-256
8,013,114 UART: [kat] SHA2-384
8,019,606 UART: [kat] SHA2-512-ACC
8,021,968 UART: [kat] ECC-384
10,465,049 UART: [kat] HMAC-384Kdf
10,475,764 UART: [kat] LMS
10,952,266 UART: [kat] --
10,955,456 UART: [cold-reset] ++
10,957,123 UART: [fht] FHT @ 0x50003400
10,968,880 UART: [idev] ++
10,969,491 UART: [idev] CDI.KEYID = 6
10,970,405 UART: [idev] SUBJECT.KEYID = 7
10,971,685 UART: [idev] UDS.KEYID = 0
10,973,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,122,824 UART: [idev] Erasing UDS.KEYID = 0
13,449,271 UART: [idev] Sha1 KeyId Algorithm
13,472,127 UART: [idev] --
13,477,258 UART: [ldev] ++
13,477,827 UART: [ldev] CDI.KEYID = 6
13,478,735 UART: [ldev] SUBJECT.KEYID = 5
13,479,947 UART: [ldev] AUTHORITY.KEYID = 7
13,481,179 UART: [ldev] FE.KEYID = 1
13,493,232 UART: [ldev] Erasing FE.KEYID = 1
15,968,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,740,325 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,761,636 UART: [ldev] --
17,767,726 UART: [fwproc] Wait for Commands...
17,770,662 UART: [fwproc] Recv command 0x46574c44
17,772,664 UART: [fwproc] Recv'd Img size: 118548 bytes
21,257,740 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,334,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,407,925 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,735,874 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,782,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,537,389 >>> mbox cmd response: failed
12,537,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,335 >>> mbox cmd response: failed
12,538,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,538,903 >>> mbox cmd response: failed
Initializing fuses
2,061,990 writing to cptra_bootfsm_go
11,102,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,770,397 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
192,249 UART:
192,608 UART: Running Caliptra ROM ...
193,798 UART:
193,953 UART: [state] CFI Enabled
260,409 UART: [state] LifecycleState = Unprovisioned
262,447 UART: [state] DebugLocked = No
265,138 UART: [state] WD Timer not started. Device not locked for debugging
270,043 UART: [kat] SHA2-256
459,923 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,703 UART: [kat] ++
471,161 UART: [kat] sha1
481,539 UART: [kat] SHA2-256
484,549 UART: [kat] SHA2-384
489,400 UART: [kat] SHA2-512-ACC
492,016 UART: [kat] ECC-384
2,954,575 UART: [kat] HMAC-384Kdf
2,977,602 UART: [kat] LMS
3,509,351 UART: [kat] --
3,513,590 UART: [cold-reset] ++
3,514,512 UART: [fht] FHT @ 0x50003400
3,525,554 UART: [idev] ++
3,526,236 UART: [idev] CDI.KEYID = 6
3,527,257 UART: [idev] SUBJECT.KEYID = 7
3,528,420 UART: [idev] UDS.KEYID = 0
3,531,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,680,885 UART: [idev] Erasing UDS.KEYID = 0
6,033,359 UART: [idev] Sha1 KeyId Algorithm
6,056,341 UART: [idev] --
6,060,694 UART: [ldev] ++
6,061,389 UART: [ldev] CDI.KEYID = 6
6,062,321 UART: [ldev] SUBJECT.KEYID = 5
6,063,489 UART: [ldev] AUTHORITY.KEYID = 7
6,064,730 UART: [ldev] FE.KEYID = 1
6,106,873 UART: [ldev] Erasing FE.KEYID = 1
8,614,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,347,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,362,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,561 UART: [ldev] --
10,419,958 UART: [fwproc] Wait for Commands...
10,421,521 UART: [fwproc] Recv command 0x46574c44
10,423,836 UART: [fwproc] Recv'd Img size: 118548 bytes
12,502,431 UART: ROM Fatal Error: 0x000B003E
12,506,113 >>> mbox cmd response: failed
12,506,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,886 >>> mbox cmd response: failed
12,507,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,454 >>> mbox cmd response: failed
Initializing fuses
2,062,583 writing to cptra_bootfsm_go
2,251,890 UART:
2,252,237 UART: Running Caliptra ROM ...
2,253,376 UART:
2,253,569 UART: [state] CFI Enabled
2,329,367 UART: [state] LifecycleState = Unprovisioned
2,331,748 UART: [state] DebugLocked = No
2,334,718 UART: [state] WD Timer not started. Device not locked for debugging
2,338,469 UART: [kat] SHA2-256
2,528,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,538,906 UART: [kat] ++
2,539,375 UART: [kat] sha1
2,551,403 UART: [kat] SHA2-256
2,554,440 UART: [kat] SHA2-384
2,561,419 UART: [kat] SHA2-512-ACC
2,563,996 UART: [kat] ECC-384
5,012,534 UART: [kat] HMAC-384Kdf
5,036,867 UART: [kat] LMS
5,568,611 UART: [kat] --
5,571,648 UART: [cold-reset] ++
5,572,633 UART: [fht] FHT @ 0x50003400
5,584,915 UART: [idev] ++
5,585,596 UART: [idev] CDI.KEYID = 6
5,586,565 UART: [idev] SUBJECT.KEYID = 7
5,587,786 UART: [idev] UDS.KEYID = 0
5,589,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,739,119 UART: [idev] Erasing UDS.KEYID = 0
8,092,629 UART: [idev] Sha1 KeyId Algorithm
8,115,915 UART: [idev] --
8,119,870 UART: [ldev] ++
8,120,559 UART: [ldev] CDI.KEYID = 6
8,121,472 UART: [ldev] SUBJECT.KEYID = 5
8,122,635 UART: [ldev] AUTHORITY.KEYID = 7
8,123,869 UART: [ldev] FE.KEYID = 1
8,164,603 UART: [ldev] Erasing FE.KEYID = 1
10,669,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,406,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,421,643 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,436,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,607 UART: [ldev] --
12,477,711 UART: [fwproc] Wait for Commands...
12,479,707 UART: [fwproc] Recv command 0x46574c44
12,481,969 UART: [fwproc] Recv'd Img size: 118548 bytes
15,976,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,055,672 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,179,242 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,845 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
3,442,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,297,710 >>> mbox cmd response: failed
12,298,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,590 >>> mbox cmd response: failed
12,298,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,154 >>> mbox cmd response: failed
Initializing fuses
2,063,955 writing to cptra_bootfsm_go
5,494,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,880,340 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,478 UART:
192,834 UART: Running Caliptra ROM ...
193,971 UART:
603,801 UART: [state] CFI Enabled
618,278 UART: [state] LifecycleState = Unprovisioned
620,639 UART: [state] DebugLocked = No
623,381 UART: [state] WD Timer not started. Device not locked for debugging
627,607 UART: [kat] SHA2-256
817,490 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,276 UART: [kat] ++
828,874 UART: [kat] sha1
838,953 UART: [kat] SHA2-256
841,966 UART: [kat] SHA2-384
847,574 UART: [kat] SHA2-512-ACC
850,138 UART: [kat] ECC-384
3,294,124 UART: [kat] HMAC-384Kdf
3,307,506 UART: [kat] LMS
3,839,307 UART: [kat] --
3,844,288 UART: [cold-reset] ++
3,846,446 UART: [fht] FHT @ 0x50003400
3,859,272 UART: [idev] ++
3,859,960 UART: [idev] CDI.KEYID = 6
3,860,984 UART: [idev] SUBJECT.KEYID = 7
3,862,154 UART: [idev] UDS.KEYID = 0
3,864,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,012 UART: [idev] Erasing UDS.KEYID = 0
6,338,148 UART: [idev] Sha1 KeyId Algorithm
6,359,835 UART: [idev] --
6,364,327 UART: [ldev] ++
6,365,014 UART: [ldev] CDI.KEYID = 6
6,365,932 UART: [ldev] SUBJECT.KEYID = 5
6,367,121 UART: [ldev] AUTHORITY.KEYID = 7
6,368,307 UART: [ldev] FE.KEYID = 1
6,380,590 UART: [ldev] Erasing FE.KEYID = 1
8,854,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,164 UART: [ldev] --
10,646,219 UART: [fwproc] Wait for Commands...
10,647,793 UART: [fwproc] Recv command 0x46574c44
10,650,066 UART: [fwproc] Recv'd Img size: 118548 bytes
12,732,365 UART: ROM Fatal Error: 0x000B003E
12,735,995 >>> mbox cmd response: failed
12,736,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,736,695 >>> mbox cmd response: failed
12,736,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,307 >>> mbox cmd response: failed
Initializing fuses
2,062,203 writing to cptra_bootfsm_go
2,251,491 UART:
2,251,853 UART: Running Caliptra ROM ...
2,252,995 UART:
7,712,493 UART: [state] CFI Enabled
7,726,976 UART: [state] LifecycleState = Unprovisioned
7,729,370 UART: [state] DebugLocked = No
7,732,291 UART: [state] WD Timer not started. Device not locked for debugging
7,736,551 UART: [kat] SHA2-256
7,926,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,937,243 UART: [kat] ++
7,937,815 UART: [kat] sha1
7,948,123 UART: [kat] SHA2-256
7,951,156 UART: [kat] SHA2-384
7,957,328 UART: [kat] SHA2-512-ACC
7,959,939 UART: [kat] ECC-384
10,401,693 UART: [kat] HMAC-384Kdf
10,414,633 UART: [kat] LMS
10,946,457 UART: [kat] --
10,951,207 UART: [cold-reset] ++
10,952,661 UART: [fht] FHT @ 0x50003400
10,964,294 UART: [idev] ++
10,965,029 UART: [idev] CDI.KEYID = 6
10,965,947 UART: [idev] SUBJECT.KEYID = 7
10,967,169 UART: [idev] UDS.KEYID = 0
10,969,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,118,802 UART: [idev] Erasing UDS.KEYID = 0
13,443,697 UART: [idev] Sha1 KeyId Algorithm
13,466,769 UART: [idev] --
13,470,820 UART: [ldev] ++
13,471,502 UART: [ldev] CDI.KEYID = 6
13,472,389 UART: [ldev] SUBJECT.KEYID = 5
13,473,599 UART: [ldev] AUTHORITY.KEYID = 7
13,474,833 UART: [ldev] FE.KEYID = 1
13,485,695 UART: [ldev] Erasing FE.KEYID = 1
15,969,032 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,689,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,704,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,719,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,735,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,754,807 UART: [ldev] --
17,761,153 UART: [fwproc] Wait for Commands...
17,763,745 UART: [fwproc] Recv command 0x46574c44
17,766,095 UART: [fwproc] Recv'd Img size: 118548 bytes
21,266,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,346,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,469,851 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,030,398 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,326 writing to cptra_bootfsm_go
3,761,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,519,331 >>> mbox cmd response: failed
12,519,856 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,208 >>> mbox cmd response: failed
12,520,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,520,795 >>> mbox cmd response: failed
Initializing fuses
2,061,671 writing to cptra_bootfsm_go
11,098,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,377,624 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,721 UART: [kat] SHA2-256
892,659 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,894 UART: [kat] HMAC-384Kdf
907,392 UART: [kat] LMS
1,475,588 UART: [kat] --
1,476,259 UART: [cold-reset] ++
1,476,611 UART: [fht] Storing FHT @ 0x50003400
1,479,454 UART: [idev] ++
1,479,622 UART: [idev] CDI.KEYID = 6
1,479,982 UART: [idev] SUBJECT.KEYID = 7
1,480,406 UART: [idev] UDS.KEYID = 0
1,480,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,532 UART: [idev] Erasing UDS.KEYID = 0
1,505,638 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,396 UART: [idev] --
1,515,443 UART: [ldev] ++
1,515,611 UART: [ldev] CDI.KEYID = 6
1,515,974 UART: [ldev] SUBJECT.KEYID = 5
1,516,400 UART: [ldev] AUTHORITY.KEYID = 7
1,516,863 UART: [ldev] FE.KEYID = 1
1,521,823 UART: [ldev] Erasing FE.KEYID = 1
1,547,568 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,167 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,883 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,774 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,678 UART: [ldev] --
1,587,001 UART: [fwproc] Waiting for Commands...
1,587,764 UART: [fwproc] Received command 0x46574c44
1,588,555 UART: [fwproc] Received Image of size 118548 bytes
1,635,427 UART: ROM Fatal Error: 0x000B003E
1,636,586 >>> mbox cmd response: failed
1,636,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,592 >>> mbox cmd response: failed
1,636,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,047 UART: [kat] SHA2-256
881,978 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,093 UART: [kat] ++
886,245 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,560 UART: [kat] LMS
1,475,756 UART: [kat] --
1,476,441 UART: [cold-reset] ++
1,476,829 UART: [fht] Storing FHT @ 0x50003400
1,479,558 UART: [idev] ++
1,479,726 UART: [idev] CDI.KEYID = 6
1,480,086 UART: [idev] SUBJECT.KEYID = 7
1,480,510 UART: [idev] UDS.KEYID = 0
1,480,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,842 UART: [idev] Erasing UDS.KEYID = 0
1,504,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,342 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,521,099 UART: [ldev] Erasing FE.KEYID = 1
1,546,462 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,346 UART: [ldev] --
1,585,699 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 118548 bytes
2,930,468 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,462 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,703 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,315 >>> mbox cmd response: failed
1,486,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,321 >>> mbox cmd response: failed
1,486,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,327 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,143 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,417 UART: [state] LifecycleState = Unprovisioned
86,072 UART: [state] DebugLocked = No
86,798 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,492 UART: [kat] SHA2-256
882,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,538 UART: [kat] ++
886,690 UART: [kat] sha1
890,790 UART: [kat] SHA2-256
892,728 UART: [kat] SHA2-384
895,513 UART: [kat] SHA2-512-ACC
897,414 UART: [kat] ECC-384
903,431 UART: [kat] HMAC-384Kdf
908,203 UART: [kat] LMS
1,476,399 UART: [kat] --
1,477,212 UART: [cold-reset] ++
1,477,720 UART: [fht] Storing FHT @ 0x50003400
1,480,447 UART: [idev] ++
1,480,615 UART: [idev] CDI.KEYID = 6
1,480,975 UART: [idev] SUBJECT.KEYID = 7
1,481,399 UART: [idev] UDS.KEYID = 0
1,481,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,481 UART: [idev] Erasing UDS.KEYID = 0
1,506,455 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,147 UART: [idev] --
1,516,318 UART: [ldev] ++
1,516,486 UART: [ldev] CDI.KEYID = 6
1,516,849 UART: [ldev] SUBJECT.KEYID = 5
1,517,275 UART: [ldev] AUTHORITY.KEYID = 7
1,517,738 UART: [ldev] FE.KEYID = 1
1,523,056 UART: [ldev] Erasing FE.KEYID = 1
1,548,235 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,893 UART: [ldev] --
1,587,228 UART: [fwproc] Waiting for Commands...
1,587,897 UART: [fwproc] Received command 0x46574c44
1,588,688 UART: [fwproc] Received Image of size 118548 bytes
1,636,076 UART: ROM Fatal Error: 0x000B003E
1,637,235 >>> mbox cmd response: failed
1,637,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,241 >>> mbox cmd response: failed
1,637,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,325 UART: [state] LifecycleState = Unprovisioned
85,980 UART: [state] DebugLocked = No
86,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,098 UART: [kat] SHA2-256
882,029 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,144 UART: [kat] ++
886,296 UART: [kat] sha1
890,632 UART: [kat] SHA2-256
892,570 UART: [kat] SHA2-384
895,467 UART: [kat] SHA2-512-ACC
897,368 UART: [kat] ECC-384
902,831 UART: [kat] HMAC-384Kdf
907,433 UART: [kat] LMS
1,475,629 UART: [kat] --
1,476,250 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,711 UART: [idev] ++
1,479,879 UART: [idev] CDI.KEYID = 6
1,480,239 UART: [idev] SUBJECT.KEYID = 7
1,480,663 UART: [idev] UDS.KEYID = 0
1,481,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,923 UART: [idev] Erasing UDS.KEYID = 0
1,505,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,417 UART: [idev] --
1,515,504 UART: [ldev] ++
1,515,672 UART: [ldev] CDI.KEYID = 6
1,516,035 UART: [ldev] SUBJECT.KEYID = 5
1,516,461 UART: [ldev] AUTHORITY.KEYID = 7
1,516,924 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,548,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,682 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,398 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,119 UART: [ldev] --
1,587,500 UART: [fwproc] Waiting for Commands...
1,588,117 UART: [fwproc] Received command 0x46574c44
1,588,908 UART: [fwproc] Received Image of size 118548 bytes
2,932,049 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,061 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,279 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,688 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,230 >>> mbox cmd response: failed
1,490,230 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,236 >>> mbox cmd response: failed
1,490,236 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,242 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,752 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,576 UART: [state] LifecycleState = Unprovisioned
85,231 UART: [state] DebugLocked = No
85,945 UART: [state] WD Timer not started. Device not locked for debugging
87,238 UART: [kat] SHA2-256
890,788 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,892 UART: [kat] ++
895,044 UART: [kat] sha1
899,300 UART: [kat] SHA2-256
901,240 UART: [kat] SHA2-384
904,067 UART: [kat] SHA2-512-ACC
905,968 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,325 UART: [kat] LMS
1,168,637 UART: [kat] --
1,169,600 UART: [cold-reset] ++
1,170,104 UART: [fht] FHT @ 0x50003400
1,172,644 UART: [idev] ++
1,172,812 UART: [idev] CDI.KEYID = 6
1,173,173 UART: [idev] SUBJECT.KEYID = 7
1,173,598 UART: [idev] UDS.KEYID = 0
1,173,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,671 UART: [idev] Erasing UDS.KEYID = 0
1,198,427 UART: [idev] Sha1 KeyId Algorithm
1,207,219 UART: [idev] --
1,208,262 UART: [ldev] ++
1,208,430 UART: [ldev] CDI.KEYID = 6
1,208,794 UART: [ldev] SUBJECT.KEYID = 5
1,209,221 UART: [ldev] AUTHORITY.KEYID = 7
1,209,684 UART: [ldev] FE.KEYID = 1
1,214,726 UART: [ldev] Erasing FE.KEYID = 1
1,240,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,072 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,958 UART: [ldev] --
1,280,185 UART: [fwproc] Wait for Commands...
1,280,962 UART: [fwproc] Recv command 0x46574c44
1,281,695 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,857 UART: ROM Fatal Error: 0x000B003E
1,330,016 >>> mbox cmd response: failed
1,330,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,022 >>> mbox cmd response: failed
1,330,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,331 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,532 UART: [kat] SHA2-256
901,472 UART: [kat] SHA2-384
904,073 UART: [kat] SHA2-512-ACC
905,974 UART: [kat] ECC-384
915,573 UART: [kat] HMAC-384Kdf
920,179 UART: [kat] LMS
1,168,491 UART: [kat] --
1,169,298 UART: [cold-reset] ++
1,169,870 UART: [fht] FHT @ 0x50003400
1,172,516 UART: [idev] ++
1,172,684 UART: [idev] CDI.KEYID = 6
1,173,045 UART: [idev] SUBJECT.KEYID = 7
1,173,470 UART: [idev] UDS.KEYID = 0
1,173,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,749 UART: [idev] Erasing UDS.KEYID = 0
1,198,479 UART: [idev] Sha1 KeyId Algorithm
1,207,373 UART: [idev] --
1,208,472 UART: [ldev] ++
1,208,640 UART: [ldev] CDI.KEYID = 6
1,209,004 UART: [ldev] SUBJECT.KEYID = 5
1,209,431 UART: [ldev] AUTHORITY.KEYID = 7
1,209,894 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,241,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,425 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,030 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,742 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,069 UART: [fwproc] Wait for Commands...
1,281,648 UART: [fwproc] Recv command 0x46574c44
1,282,381 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,053 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,280 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,907 >>> mbox cmd response: failed
1,185,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,913 >>> mbox cmd response: failed
1,185,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,103 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,192 UART: [state] WD Timer not started. Device not locked for debugging
88,309 UART: [kat] SHA2-256
891,859 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,963 UART: [kat] ++
896,115 UART: [kat] sha1
900,471 UART: [kat] SHA2-256
902,411 UART: [kat] SHA2-384
905,384 UART: [kat] SHA2-512-ACC
907,285 UART: [kat] ECC-384
916,792 UART: [kat] HMAC-384Kdf
921,416 UART: [kat] LMS
1,169,728 UART: [kat] --
1,170,419 UART: [cold-reset] ++
1,170,801 UART: [fht] FHT @ 0x50003400
1,173,583 UART: [idev] ++
1,173,751 UART: [idev] CDI.KEYID = 6
1,174,112 UART: [idev] SUBJECT.KEYID = 7
1,174,537 UART: [idev] UDS.KEYID = 0
1,174,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,326 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,901 UART: [ldev] SUBJECT.KEYID = 5
1,210,328 UART: [ldev] AUTHORITY.KEYID = 7
1,210,791 UART: [ldev] FE.KEYID = 1
1,216,077 UART: [ldev] Erasing FE.KEYID = 1
1,242,728 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,304 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,020 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,088 UART: [fwproc] Wait for Commands...
1,282,859 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,904 UART: ROM Fatal Error: 0x000B003E
1,332,063 >>> mbox cmd response: failed
1,332,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,069 >>> mbox cmd response: failed
1,332,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,465 UART: [state] LifecycleState = Unprovisioned
86,120 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
900,041 UART: [kat] SHA2-256
901,981 UART: [kat] SHA2-384
904,946 UART: [kat] SHA2-512-ACC
906,847 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,998 UART: [kat] LMS
1,169,310 UART: [kat] --
1,170,409 UART: [cold-reset] ++
1,170,849 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,174,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,470 UART: [idev] Erasing UDS.KEYID = 0
1,199,792 UART: [idev] Sha1 KeyId Algorithm
1,208,770 UART: [idev] --
1,209,743 UART: [ldev] ++
1,209,911 UART: [ldev] CDI.KEYID = 6
1,210,275 UART: [ldev] SUBJECT.KEYID = 5
1,210,702 UART: [ldev] AUTHORITY.KEYID = 7
1,211,165 UART: [ldev] FE.KEYID = 1
1,216,503 UART: [ldev] Erasing FE.KEYID = 1
1,242,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,618 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,223 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,935 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,390 UART: [fwproc] Wait for Commands...
1,282,979 UART: [fwproc] Recv command 0x46574c44
1,283,712 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,208 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,485 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,660 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,903 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,706 >>> mbox cmd response: failed
1,186,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,712 >>> mbox cmd response: failed
1,186,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,916 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,355 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
893,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,391 UART: [kat] ++
897,543 UART: [kat] sha1
901,791 UART: [kat] SHA2-256
903,731 UART: [kat] SHA2-384
906,614 UART: [kat] SHA2-512-ACC
908,515 UART: [kat] ECC-384
918,378 UART: [kat] HMAC-384Kdf
922,848 UART: [kat] LMS
1,171,176 UART: [kat] --
1,171,863 UART: [cold-reset] ++
1,172,245 UART: [fht] FHT @ 0x50003400
1,174,810 UART: [idev] ++
1,174,978 UART: [idev] CDI.KEYID = 6
1,175,338 UART: [idev] SUBJECT.KEYID = 7
1,175,762 UART: [idev] UDS.KEYID = 0
1,176,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,540 UART: [idev] Erasing UDS.KEYID = 0
1,200,051 UART: [idev] Sha1 KeyId Algorithm
1,208,489 UART: [idev] --
1,209,517 UART: [ldev] ++
1,209,685 UART: [ldev] CDI.KEYID = 6
1,210,048 UART: [ldev] SUBJECT.KEYID = 5
1,210,474 UART: [ldev] AUTHORITY.KEYID = 7
1,210,937 UART: [ldev] FE.KEYID = 1
1,216,221 UART: [ldev] Erasing FE.KEYID = 1
1,242,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,186 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,568 UART: [fwproc] Wait for Commands...
1,282,392 UART: [fwproc] Recv command 0x46574c44
1,283,120 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,180 UART: ROM Fatal Error: 0x000B003E
1,331,339 >>> mbox cmd response: failed
1,331,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,345 >>> mbox cmd response: failed
1,331,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,351 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,055 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
893,066 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,191 UART: [kat] ++
897,343 UART: [kat] sha1
901,555 UART: [kat] SHA2-256
903,495 UART: [kat] SHA2-384
906,280 UART: [kat] SHA2-512-ACC
908,181 UART: [kat] ECC-384
917,536 UART: [kat] HMAC-384Kdf
922,300 UART: [kat] LMS
1,170,628 UART: [kat] --
1,171,435 UART: [cold-reset] ++
1,171,877 UART: [fht] FHT @ 0x50003400
1,174,508 UART: [idev] ++
1,174,676 UART: [idev] CDI.KEYID = 6
1,175,036 UART: [idev] SUBJECT.KEYID = 7
1,175,460 UART: [idev] UDS.KEYID = 0
1,175,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,114 UART: [idev] Erasing UDS.KEYID = 0
1,200,139 UART: [idev] Sha1 KeyId Algorithm
1,208,743 UART: [idev] --
1,209,819 UART: [ldev] ++
1,209,987 UART: [ldev] CDI.KEYID = 6
1,210,350 UART: [ldev] SUBJECT.KEYID = 5
1,210,776 UART: [ldev] AUTHORITY.KEYID = 7
1,211,239 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,550 UART: [fwproc] Wait for Commands...
1,282,320 UART: [fwproc] Recv command 0x46574c44
1,283,048 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,935 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,105 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,492 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,812 >>> mbox cmd response: failed
1,187,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,818 >>> mbox cmd response: failed
1,187,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,311 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,803 UART: [state] LifecycleState = Unprovisioned
86,458 UART: [state] DebugLocked = No
87,042 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
893,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,090 UART: [kat] ++
898,242 UART: [kat] sha1
902,640 UART: [kat] SHA2-256
904,580 UART: [kat] SHA2-384
907,541 UART: [kat] SHA2-512-ACC
909,442 UART: [kat] ECC-384
919,243 UART: [kat] HMAC-384Kdf
924,099 UART: [kat] LMS
1,172,427 UART: [kat] --
1,173,098 UART: [cold-reset] ++
1,173,568 UART: [fht] FHT @ 0x50003400
1,176,199 UART: [idev] ++
1,176,367 UART: [idev] CDI.KEYID = 6
1,176,727 UART: [idev] SUBJECT.KEYID = 7
1,177,151 UART: [idev] UDS.KEYID = 0
1,177,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,933 UART: [idev] Erasing UDS.KEYID = 0
1,202,490 UART: [idev] Sha1 KeyId Algorithm
1,211,056 UART: [idev] --
1,212,354 UART: [ldev] ++
1,212,522 UART: [ldev] CDI.KEYID = 6
1,212,885 UART: [ldev] SUBJECT.KEYID = 5
1,213,311 UART: [ldev] AUTHORITY.KEYID = 7
1,213,774 UART: [ldev] FE.KEYID = 1
1,218,908 UART: [ldev] Erasing FE.KEYID = 1
1,245,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,630 UART: [ldev] --
1,284,913 UART: [fwproc] Wait for Commands...
1,285,585 UART: [fwproc] Recv command 0x46574c44
1,286,313 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,785 UART: ROM Fatal Error: 0x000B003E
1,334,944 >>> mbox cmd response: failed
1,334,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,950 >>> mbox cmd response: failed
1,334,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,956 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,866 UART: [state] WD Timer not started. Device not locked for debugging
88,099 UART: [kat] SHA2-256
893,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,874 UART: [kat] ++
898,026 UART: [kat] sha1
902,278 UART: [kat] SHA2-256
904,218 UART: [kat] SHA2-384
906,929 UART: [kat] SHA2-512-ACC
908,830 UART: [kat] ECC-384
918,663 UART: [kat] HMAC-384Kdf
923,311 UART: [kat] LMS
1,171,639 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,696 UART: [fht] FHT @ 0x50003400
1,175,517 UART: [idev] ++
1,175,685 UART: [idev] CDI.KEYID = 6
1,176,045 UART: [idev] SUBJECT.KEYID = 7
1,176,469 UART: [idev] UDS.KEYID = 0
1,176,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,437 UART: [idev] Erasing UDS.KEYID = 0
1,202,058 UART: [idev] Sha1 KeyId Algorithm
1,210,700 UART: [idev] --
1,211,636 UART: [ldev] ++
1,211,804 UART: [ldev] CDI.KEYID = 6
1,212,167 UART: [ldev] SUBJECT.KEYID = 5
1,212,593 UART: [ldev] AUTHORITY.KEYID = 7
1,213,056 UART: [ldev] FE.KEYID = 1
1,218,254 UART: [ldev] Erasing FE.KEYID = 1
1,244,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,750 UART: [ldev] --
1,284,085 UART: [fwproc] Wait for Commands...
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,465 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,364 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,681 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,667 >>> mbox cmd response: failed
1,187,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,673 >>> mbox cmd response: failed
1,187,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,679 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,436 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,025 writing to cptra_bootfsm_go
192,280 UART:
192,625 UART: Running Caliptra ROM ...
193,808 UART:
193,958 UART: [state] CFI Enabled
263,084 UART: [state] LifecycleState = Unprovisioned
265,032 UART: [state] DebugLocked = No
267,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,734 UART: [kat] SHA2-256
441,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,950 UART: [kat] ++
452,402 UART: [kat] sha1
462,405 UART: [kat] SHA2-256
465,091 UART: [kat] SHA2-384
470,490 UART: [kat] SHA2-512-ACC
472,884 UART: [kat] ECC-384
2,765,498 UART: [kat] HMAC-384Kdf
2,777,287 UART: [kat] LMS
3,967,575 UART: [kat] --
3,972,772 UART: [cold-reset] ++
3,974,462 UART: [fht] Storing FHT @ 0x50003400
3,987,156 UART: [idev] ++
3,987,725 UART: [idev] CDI.KEYID = 6
3,988,695 UART: [idev] SUBJECT.KEYID = 7
3,989,912 UART: [idev] UDS.KEYID = 0
3,993,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,413 UART: [idev] Erasing UDS.KEYID = 0
7,324,747 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,162 UART: [idev] --
7,350,381 UART: [ldev] ++
7,351,016 UART: [ldev] CDI.KEYID = 6
7,351,929 UART: [ldev] SUBJECT.KEYID = 5
7,353,152 UART: [ldev] AUTHORITY.KEYID = 7
7,354,389 UART: [ldev] FE.KEYID = 1
7,401,529 UART: [ldev] Erasing FE.KEYID = 1
10,729,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,782 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,142 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,430 UART: [ldev] --
13,092,456 UART: [fwproc] Waiting for Commands...
13,094,441 UART: [fwproc] Received command 0x46574c44
13,096,650 UART: [fwproc] Received Image of size 118548 bytes
15,797,754 UART: ROM Fatal Error: 0x000B0018
15,801,261 >>> mbox cmd response: failed
15,801,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,802,025 >>> mbox cmd response: failed
15,802,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,802,601 >>> mbox cmd response: failed
Initializing fuses
2,057,685 writing to cptra_bootfsm_go
2,246,996 UART:
2,247,334 UART: Running Caliptra ROM ...
2,248,469 UART:
2,248,634 UART: [state] CFI Enabled
2,315,752 UART: [state] LifecycleState = Unprovisioned
2,317,693 UART: [state] DebugLocked = No
2,319,521 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,317 UART: [kat] SHA2-256
2,493,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,481 UART: [kat] ++
2,505,022 UART: [kat] sha1
2,515,121 UART: [kat] SHA2-256
2,517,865 UART: [kat] SHA2-384
2,524,547 UART: [kat] SHA2-512-ACC
2,526,868 UART: [kat] ECC-384
4,821,775 UART: [kat] HMAC-384Kdf
4,832,965 UART: [kat] LMS
6,023,267 UART: [kat] --
6,027,387 UART: [cold-reset] ++
6,029,509 UART: [fht] Storing FHT @ 0x50003400
6,040,479 UART: [idev] ++
6,041,213 UART: [idev] CDI.KEYID = 6
6,042,104 UART: [idev] SUBJECT.KEYID = 7
6,043,269 UART: [idev] UDS.KEYID = 0
6,046,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,195,332 UART: [idev] Erasing UDS.KEYID = 0
9,380,435 UART: [idev] Using Sha1 for KeyId Algorithm
9,402,000 UART: [idev] --
9,407,194 UART: [ldev] ++
9,407,768 UART: [ldev] CDI.KEYID = 6
9,408,711 UART: [ldev] SUBJECT.KEYID = 5
9,410,012 UART: [ldev] AUTHORITY.KEYID = 7
9,411,111 UART: [ldev] FE.KEYID = 1
9,458,146 UART: [ldev] Erasing FE.KEYID = 1
12,788,727 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,083,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,097,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,112,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,127,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,145,944 UART: [ldev] --
15,151,474 UART: [fwproc] Waiting for Commands...
15,153,905 UART: [fwproc] Received command 0x46574c44
15,156,106 UART: [fwproc] Received Image of size 118548 bytes
19,262,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,337,436 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,410,618 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,739,919 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,786,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,551,849 >>> mbox cmd response: failed
15,552,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,552,760 >>> mbox cmd response: failed
15,553,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,553,323 >>> mbox cmd response: failed
Initializing fuses
2,058,037 writing to cptra_bootfsm_go
5,829,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,962,208 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
192,597 UART:
193,043 UART: Running Caliptra ROM ...
194,177 UART:
603,828 UART: [state] CFI Enabled
618,301 UART: [state] LifecycleState = Unprovisioned
620,217 UART: [state] DebugLocked = No
622,685 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,910 UART: [kat] SHA2-256
796,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,170 UART: [kat] ++
807,622 UART: [kat] sha1
818,879 UART: [kat] SHA2-256
821,628 UART: [kat] SHA2-384
827,308 UART: [kat] SHA2-512-ACC
829,659 UART: [kat] ECC-384
3,113,311 UART: [kat] HMAC-384Kdf
3,125,337 UART: [kat] LMS
4,315,450 UART: [kat] --
4,322,169 UART: [cold-reset] ++
4,324,285 UART: [fht] Storing FHT @ 0x50003400
4,336,533 UART: [idev] ++
4,337,103 UART: [idev] CDI.KEYID = 6
4,338,018 UART: [idev] SUBJECT.KEYID = 7
4,339,295 UART: [idev] UDS.KEYID = 0
4,342,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,310 UART: [idev] Erasing UDS.KEYID = 0
7,624,495 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,045 UART: [idev] --
7,650,191 UART: [ldev] ++
7,650,792 UART: [ldev] CDI.KEYID = 6
7,651,707 UART: [ldev] SUBJECT.KEYID = 5
7,652,930 UART: [ldev] AUTHORITY.KEYID = 7
7,654,175 UART: [ldev] FE.KEYID = 1
7,666,289 UART: [ldev] Erasing FE.KEYID = 1
10,955,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,150 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,971 UART: [ldev] --
13,316,391 UART: [fwproc] Waiting for Commands...
13,319,387 UART: [fwproc] Received command 0x46574c44
13,321,584 UART: [fwproc] Received Image of size 118548 bytes
16,028,823 UART: ROM Fatal Error: 0x000B0018
16,032,335 >>> mbox cmd response: failed
16,032,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,120 >>> mbox cmd response: failed
16,033,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,697 >>> mbox cmd response: failed
Initializing fuses
2,056,165 writing to cptra_bootfsm_go
2,245,438 UART:
2,245,783 UART: Running Caliptra ROM ...
2,246,932 UART:
4,424,589 UART: [state] CFI Enabled
4,439,144 UART: [state] LifecycleState = Unprovisioned
4,441,059 UART: [state] DebugLocked = No
4,442,647 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,447,336 UART: [kat] SHA2-256
4,617,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,628 UART: [kat] ++
4,628,096 UART: [kat] sha1
4,639,640 UART: [kat] SHA2-256
4,642,379 UART: [kat] SHA2-384
4,648,165 UART: [kat] SHA2-512-ACC
4,650,533 UART: [kat] ECC-384
6,937,030 UART: [kat] HMAC-384Kdf
6,949,213 UART: [kat] LMS
8,139,349 UART: [kat] --
8,143,851 UART: [cold-reset] ++
8,145,304 UART: [fht] Storing FHT @ 0x50003400
8,155,125 UART: [idev] ++
8,155,733 UART: [idev] CDI.KEYID = 6
8,156,669 UART: [idev] SUBJECT.KEYID = 7
8,157,890 UART: [idev] UDS.KEYID = 0
8,160,348 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,309,179 UART: [idev] Erasing UDS.KEYID = 0
11,445,263 UART: [idev] Using Sha1 for KeyId Algorithm
11,467,589 UART: [idev] --
11,470,942 UART: [ldev] ++
11,471,515 UART: [ldev] CDI.KEYID = 6
11,472,536 UART: [ldev] SUBJECT.KEYID = 5
11,473,762 UART: [ldev] AUTHORITY.KEYID = 7
11,474,948 UART: [ldev] FE.KEYID = 1
11,486,304 UART: [ldev] Erasing FE.KEYID = 1
14,774,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,067,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,082,393 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,097,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,111,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,130,411 UART: [ldev] --
17,134,250 UART: [fwproc] Waiting for Commands...
17,136,574 UART: [fwproc] Received command 0x46574c44
17,138,769 UART: [fwproc] Received Image of size 118548 bytes
21,244,963 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,689 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,398,870 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,727,975 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
4,130,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,757,769 >>> mbox cmd response: failed
15,758,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,758,786 >>> mbox cmd response: failed
15,759,080 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,379 >>> mbox cmd response: failed
Initializing fuses
2,058,947 writing to cptra_bootfsm_go
8,240,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,267,604 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
192,355 UART:
192,706 UART: Running Caliptra ROM ...
193,912 UART:
194,069 UART: [state] CFI Enabled
262,955 UART: [state] LifecycleState = Unprovisioned
264,888 UART: [state] DebugLocked = No
267,575 UART: [state] WD Timer not started. Device not locked for debugging
271,600 UART: [kat] SHA2-256
451,271 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,043 UART: [kat] ++
462,521 UART: [kat] sha1
473,840 UART: [kat] SHA2-256
476,557 UART: [kat] SHA2-384
482,275 UART: [kat] SHA2-512-ACC
484,673 UART: [kat] ECC-384
2,948,616 UART: [kat] HMAC-384Kdf
2,970,281 UART: [kat] LMS
3,446,784 UART: [kat] --
3,453,057 UART: [cold-reset] ++
3,454,187 UART: [fht] FHT @ 0x50003400
3,465,284 UART: [idev] ++
3,465,867 UART: [idev] CDI.KEYID = 6
3,466,893 UART: [idev] SUBJECT.KEYID = 7
3,468,066 UART: [idev] UDS.KEYID = 0
3,470,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,967 UART: [idev] Erasing UDS.KEYID = 0
5,989,006 UART: [idev] Sha1 KeyId Algorithm
6,013,321 UART: [idev] --
6,017,739 UART: [ldev] ++
6,018,381 UART: [ldev] CDI.KEYID = 6
6,019,303 UART: [ldev] SUBJECT.KEYID = 5
6,020,467 UART: [ldev] AUTHORITY.KEYID = 7
6,021,711 UART: [ldev] FE.KEYID = 1
6,056,567 UART: [ldev] Erasing FE.KEYID = 1
8,565,822 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,277 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,345 UART: [ldev] --
10,373,213 UART: [fwproc] Wait for Commands...
10,374,827 UART: [fwproc] Recv command 0x46574c44
10,376,878 UART: [fwproc] Recv'd Img size: 118548 bytes
12,450,126 UART: ROM Fatal Error: 0x000B0018
12,453,379 >>> mbox cmd response: failed
12,453,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,144 >>> mbox cmd response: failed
12,454,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,753 >>> mbox cmd response: failed
Initializing fuses
2,060,199 writing to cptra_bootfsm_go
2,249,512 UART:
2,249,857 UART: Running Caliptra ROM ...
2,250,999 UART:
2,251,173 UART: [state] CFI Enabled
2,314,605 UART: [state] LifecycleState = Unprovisioned
2,316,502 UART: [state] DebugLocked = No
2,318,650 UART: [state] WD Timer not started. Device not locked for debugging
2,321,674 UART: [kat] SHA2-256
2,501,285 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,512,062 UART: [kat] ++
2,512,529 UART: [kat] sha1
2,524,068 UART: [kat] SHA2-256
2,526,773 UART: [kat] SHA2-384
2,533,528 UART: [kat] SHA2-512-ACC
2,535,884 UART: [kat] ECC-384
4,998,124 UART: [kat] HMAC-384Kdf
5,019,986 UART: [kat] LMS
5,496,505 UART: [kat] --
5,499,902 UART: [cold-reset] ++
5,502,435 UART: [fht] FHT @ 0x50003400
5,513,744 UART: [idev] ++
5,514,314 UART: [idev] CDI.KEYID = 6
5,515,260 UART: [idev] SUBJECT.KEYID = 7
5,516,554 UART: [idev] UDS.KEYID = 0
5,518,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,910 UART: [idev] Erasing UDS.KEYID = 0
8,035,986 UART: [idev] Sha1 KeyId Algorithm
8,059,837 UART: [idev] --
8,064,441 UART: [ldev] ++
8,065,073 UART: [ldev] CDI.KEYID = 6
8,065,972 UART: [ldev] SUBJECT.KEYID = 5
8,067,194 UART: [ldev] AUTHORITY.KEYID = 7
8,068,434 UART: [ldev] FE.KEYID = 1
8,104,834 UART: [ldev] Erasing FE.KEYID = 1
10,611,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,223 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,961 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,395,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,416,304 UART: [ldev] --
12,421,161 UART: [fwproc] Wait for Commands...
12,423,386 UART: [fwproc] Recv command 0x46574c44
12,425,437 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,996,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,069,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,398,268 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,458,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,296,874 >>> mbox cmd response: failed
12,297,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,846 >>> mbox cmd response: failed
12,298,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,419 >>> mbox cmd response: failed
Initializing fuses
2,069,861 writing to cptra_bootfsm_go
5,517,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,294,611 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,485 writing to cptra_bootfsm_go
192,809 UART:
193,172 UART: Running Caliptra ROM ...
194,378 UART:
604,026 UART: [state] CFI Enabled
619,052 UART: [state] LifecycleState = Unprovisioned
620,996 UART: [state] DebugLocked = No
622,833 UART: [state] WD Timer not started. Device not locked for debugging
626,045 UART: [kat] SHA2-256
805,709 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,500 UART: [kat] ++
816,956 UART: [kat] sha1
826,811 UART: [kat] SHA2-256
829,504 UART: [kat] SHA2-384
836,682 UART: [kat] SHA2-512-ACC
839,031 UART: [kat] ECC-384
3,280,588 UART: [kat] HMAC-384Kdf
3,294,411 UART: [kat] LMS
3,770,879 UART: [kat] --
3,776,176 UART: [cold-reset] ++
3,777,410 UART: [fht] FHT @ 0x50003400
3,788,590 UART: [idev] ++
3,789,214 UART: [idev] CDI.KEYID = 6
3,790,098 UART: [idev] SUBJECT.KEYID = 7
3,791,320 UART: [idev] UDS.KEYID = 0
3,793,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,951 UART: [idev] Erasing UDS.KEYID = 0
6,268,825 UART: [idev] Sha1 KeyId Algorithm
6,294,163 UART: [idev] --
6,299,724 UART: [ldev] ++
6,300,297 UART: [ldev] CDI.KEYID = 6
6,301,266 UART: [ldev] SUBJECT.KEYID = 5
6,302,454 UART: [ldev] AUTHORITY.KEYID = 7
6,303,699 UART: [ldev] FE.KEYID = 1
6,315,168 UART: [ldev] Erasing FE.KEYID = 1
8,790,236 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,221 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,525 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,652 UART: [ldev] --
10,585,309 UART: [fwproc] Wait for Commands...
10,588,543 UART: [fwproc] Recv command 0x46574c44
10,590,535 UART: [fwproc] Recv'd Img size: 118548 bytes
12,663,584 UART: ROM Fatal Error: 0x000B0018
12,666,823 >>> mbox cmd response: failed
12,667,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,667,586 >>> mbox cmd response: failed
12,667,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,668,286 >>> mbox cmd response: failed
Initializing fuses
2,063,253 writing to cptra_bootfsm_go
2,252,569 UART:
2,252,910 UART: Running Caliptra ROM ...
2,254,044 UART:
7,782,211 UART: [state] CFI Enabled
7,799,638 UART: [state] LifecycleState = Unprovisioned
7,801,568 UART: [state] DebugLocked = No
7,803,233 UART: [state] WD Timer not started. Device not locked for debugging
7,807,051 UART: [kat] SHA2-256
7,986,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,997,505 UART: [kat] ++
7,997,995 UART: [kat] sha1
8,008,397 UART: [kat] SHA2-256
8,011,106 UART: [kat] SHA2-384
8,017,590 UART: [kat] SHA2-512-ACC
8,019,950 UART: [kat] ECC-384
10,464,857 UART: [kat] HMAC-384Kdf
10,477,310 UART: [kat] LMS
10,953,846 UART: [kat] --
10,956,222 UART: [cold-reset] ++
10,958,100 UART: [fht] FHT @ 0x50003400
10,968,709 UART: [idev] ++
10,969,274 UART: [idev] CDI.KEYID = 6
10,970,214 UART: [idev] SUBJECT.KEYID = 7
10,971,479 UART: [idev] UDS.KEYID = 0
10,973,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,123,109 UART: [idev] Erasing UDS.KEYID = 0
13,449,236 UART: [idev] Sha1 KeyId Algorithm
13,472,310 UART: [idev] --
13,476,576 UART: [ldev] ++
13,477,202 UART: [ldev] CDI.KEYID = 6
13,478,113 UART: [ldev] SUBJECT.KEYID = 5
13,479,328 UART: [ldev] AUTHORITY.KEYID = 7
13,480,559 UART: [ldev] FE.KEYID = 1
13,493,418 UART: [ldev] Erasing FE.KEYID = 1
15,971,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,693,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,740,400 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,761,241 UART: [ldev] --
17,766,078 UART: [fwproc] Wait for Commands...
17,768,561 UART: [fwproc] Recv command 0x46574c44
17,770,569 UART: [fwproc] Recv'd Img size: 118548 bytes
21,255,136 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,328,623 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,401,653 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,730,238 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,777,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,012 >>> mbox cmd response: failed
12,528,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,956 >>> mbox cmd response: failed
12,529,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,520 >>> mbox cmd response: failed
Initializing fuses
2,060,953 writing to cptra_bootfsm_go
11,118,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,781,199 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
192,167 UART:
192,538 UART: Running Caliptra ROM ...
193,676 UART:
193,828 UART: [state] CFI Enabled
262,956 UART: [state] LifecycleState = Unprovisioned
265,391 UART: [state] DebugLocked = No
267,754 UART: [state] WD Timer not started. Device not locked for debugging
271,855 UART: [kat] SHA2-256
461,762 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,539 UART: [kat] ++
473,020 UART: [kat] sha1
484,666 UART: [kat] SHA2-256
487,685 UART: [kat] SHA2-384
493,360 UART: [kat] SHA2-512-ACC
495,962 UART: [kat] ECC-384
2,947,420 UART: [kat] HMAC-384Kdf
2,969,686 UART: [kat] LMS
3,501,470 UART: [kat] --
3,507,261 UART: [cold-reset] ++
3,509,475 UART: [fht] FHT @ 0x50003400
3,521,110 UART: [idev] ++
3,521,816 UART: [idev] CDI.KEYID = 6
3,522,731 UART: [idev] SUBJECT.KEYID = 7
3,523,954 UART: [idev] UDS.KEYID = 0
3,526,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,143 UART: [idev] Erasing UDS.KEYID = 0
6,029,259 UART: [idev] Sha1 KeyId Algorithm
6,050,727 UART: [idev] --
6,056,567 UART: [ldev] ++
6,057,254 UART: [ldev] CDI.KEYID = 6
6,058,171 UART: [ldev] SUBJECT.KEYID = 5
6,059,339 UART: [ldev] AUTHORITY.KEYID = 7
6,060,578 UART: [ldev] FE.KEYID = 1
6,098,842 UART: [ldev] Erasing FE.KEYID = 1
8,605,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,176 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,376 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,942 UART: [ldev] --
10,413,055 UART: [fwproc] Wait for Commands...
10,415,634 UART: [fwproc] Recv command 0x46574c44
10,417,967 UART: [fwproc] Recv'd Img size: 118548 bytes
12,504,945 UART: ROM Fatal Error: 0x000B0018
12,508,614 >>> mbox cmd response: failed
12,509,030 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,365 >>> mbox cmd response: failed
12,509,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,509,941 >>> mbox cmd response: failed
Initializing fuses
2,061,500 writing to cptra_bootfsm_go
2,250,888 UART:
2,251,234 UART: Running Caliptra ROM ...
2,252,372 UART:
2,252,545 UART: [state] CFI Enabled
2,324,124 UART: [state] LifecycleState = Unprovisioned
2,326,169 UART: [state] DebugLocked = No
2,328,753 UART: [state] WD Timer not started. Device not locked for debugging
2,333,481 UART: [kat] SHA2-256
2,523,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,147 UART: [kat] ++
2,534,663 UART: [kat] sha1
2,545,891 UART: [kat] SHA2-256
2,548,903 UART: [kat] SHA2-384
2,553,883 UART: [kat] SHA2-512-ACC
2,556,461 UART: [kat] ECC-384
5,004,857 UART: [kat] HMAC-384Kdf
5,028,726 UART: [kat] LMS
5,560,512 UART: [kat] --
5,565,068 UART: [cold-reset] ++
5,567,018 UART: [fht] FHT @ 0x50003400
5,578,558 UART: [idev] ++
5,579,332 UART: [idev] CDI.KEYID = 6
5,580,252 UART: [idev] SUBJECT.KEYID = 7
5,581,425 UART: [idev] UDS.KEYID = 0
5,583,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,732,799 UART: [idev] Erasing UDS.KEYID = 0
8,086,896 UART: [idev] Sha1 KeyId Algorithm
8,108,727 UART: [idev] --
8,115,319 UART: [ldev] ++
8,116,008 UART: [ldev] CDI.KEYID = 6
8,116,925 UART: [ldev] SUBJECT.KEYID = 5
8,118,092 UART: [ldev] AUTHORITY.KEYID = 7
8,119,353 UART: [ldev] FE.KEYID = 1
8,159,070 UART: [ldev] Erasing FE.KEYID = 1
10,666,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,225 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,351 UART: [ldev] --
12,470,421 UART: [fwproc] Wait for Commands...
12,472,857 UART: [fwproc] Recv command 0x46574c44
12,475,119 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,052,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,175,689 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,797 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,907 writing to cptra_bootfsm_go
3,441,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,291,866 >>> mbox cmd response: failed
12,292,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,292,824 >>> mbox cmd response: failed
12,293,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,293,392 >>> mbox cmd response: failed
Initializing fuses
2,063,122 writing to cptra_bootfsm_go
5,501,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,901,917 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
192,556 UART:
192,941 UART: Running Caliptra ROM ...
194,044 UART:
603,940 UART: [state] CFI Enabled
616,516 UART: [state] LifecycleState = Unprovisioned
618,523 UART: [state] DebugLocked = No
620,015 UART: [state] WD Timer not started. Device not locked for debugging
623,976 UART: [kat] SHA2-256
813,868 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,696 UART: [kat] ++
825,160 UART: [kat] sha1
835,970 UART: [kat] SHA2-256
838,993 UART: [kat] SHA2-384
844,199 UART: [kat] SHA2-512-ACC
846,772 UART: [kat] ECC-384
3,288,175 UART: [kat] HMAC-384Kdf
3,301,352 UART: [kat] LMS
3,833,172 UART: [kat] --
3,838,094 UART: [cold-reset] ++
3,840,043 UART: [fht] FHT @ 0x50003400
3,852,388 UART: [idev] ++
3,853,072 UART: [idev] CDI.KEYID = 6
3,854,096 UART: [idev] SUBJECT.KEYID = 7
3,855,270 UART: [idev] UDS.KEYID = 0
3,858,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,700 UART: [idev] Erasing UDS.KEYID = 0
6,332,436 UART: [idev] Sha1 KeyId Algorithm
6,355,904 UART: [idev] --
6,361,011 UART: [ldev] ++
6,361,726 UART: [ldev] CDI.KEYID = 6
6,362,653 UART: [ldev] SUBJECT.KEYID = 5
6,363,827 UART: [ldev] AUTHORITY.KEYID = 7
6,364,948 UART: [ldev] FE.KEYID = 1
6,378,166 UART: [ldev] Erasing FE.KEYID = 1
8,857,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,862 UART: [ldev] --
10,648,108 UART: [fwproc] Wait for Commands...
10,650,048 UART: [fwproc] Recv command 0x46574c44
10,652,377 UART: [fwproc] Recv'd Img size: 118548 bytes
12,739,227 UART: ROM Fatal Error: 0x000B0018
12,742,913 >>> mbox cmd response: failed
12,743,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,743,720 >>> mbox cmd response: failed
12,744,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,523 >>> mbox cmd response: failed
Initializing fuses
2,060,650 writing to cptra_bootfsm_go
2,250,042 UART:
2,250,408 UART: Running Caliptra ROM ...
2,251,508 UART:
7,700,696 UART: [state] CFI Enabled
7,718,745 UART: [state] LifecycleState = Unprovisioned
7,721,102 UART: [state] DebugLocked = No
7,722,735 UART: [state] WD Timer not started. Device not locked for debugging
7,727,313 UART: [kat] SHA2-256
7,917,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,927,950 UART: [kat] ++
7,928,475 UART: [kat] sha1
7,941,042 UART: [kat] SHA2-256
7,944,080 UART: [kat] SHA2-384
7,949,922 UART: [kat] SHA2-512-ACC
7,952,510 UART: [kat] ECC-384
10,394,033 UART: [kat] HMAC-384Kdf
10,407,722 UART: [kat] LMS
10,939,558 UART: [kat] --
10,944,523 UART: [cold-reset] ++
10,946,188 UART: [fht] FHT @ 0x50003400
10,956,684 UART: [idev] ++
10,957,424 UART: [idev] CDI.KEYID = 6
10,958,334 UART: [idev] SUBJECT.KEYID = 7
10,960,046 UART: [idev] UDS.KEYID = 0
10,962,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,111,363 UART: [idev] Erasing UDS.KEYID = 0
13,433,609 UART: [idev] Sha1 KeyId Algorithm
13,456,093 UART: [idev] --
13,460,659 UART: [ldev] ++
13,461,348 UART: [ldev] CDI.KEYID = 6
13,462,234 UART: [ldev] SUBJECT.KEYID = 5
13,463,393 UART: [ldev] AUTHORITY.KEYID = 7
13,464,641 UART: [ldev] FE.KEYID = 1
13,474,830 UART: [ldev] Erasing FE.KEYID = 1
15,953,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,672,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,687,562 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,702,732 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,717,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,739,594 UART: [ldev] --
17,744,281 UART: [fwproc] Wait for Commands...
17,746,869 UART: [fwproc] Recv command 0x46574c44
17,749,135 UART: [fwproc] Recv'd Img size: 118548 bytes
21,244,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,319,664 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,443,275 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,002,928 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,759,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,524,356 >>> mbox cmd response: failed
12,524,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,211 >>> mbox cmd response: failed
12,525,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,777 >>> mbox cmd response: failed
Initializing fuses
2,064,790 writing to cptra_bootfsm_go
11,092,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,362,653 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,537 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,189 UART: [kat] SHA2-256
882,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,235 UART: [kat] ++
886,387 UART: [kat] sha1
890,567 UART: [kat] SHA2-256
892,505 UART: [kat] SHA2-384
895,136 UART: [kat] SHA2-512-ACC
897,037 UART: [kat] ECC-384
902,484 UART: [kat] HMAC-384Kdf
907,104 UART: [kat] LMS
1,475,300 UART: [kat] --
1,476,237 UART: [cold-reset] ++
1,476,717 UART: [fht] Storing FHT @ 0x50003400
1,479,702 UART: [idev] ++
1,479,870 UART: [idev] CDI.KEYID = 6
1,480,230 UART: [idev] SUBJECT.KEYID = 7
1,480,654 UART: [idev] UDS.KEYID = 0
1,480,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,454 UART: [idev] Erasing UDS.KEYID = 0
1,505,056 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,494 UART: [idev] --
1,514,463 UART: [ldev] ++
1,514,631 UART: [ldev] CDI.KEYID = 6
1,514,994 UART: [ldev] SUBJECT.KEYID = 5
1,515,420 UART: [ldev] AUTHORITY.KEYID = 7
1,515,883 UART: [ldev] FE.KEYID = 1
1,521,023 UART: [ldev] Erasing FE.KEYID = 1
1,546,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,346 UART: [ldev] --
1,585,839 UART: [fwproc] Waiting for Commands...
1,586,564 UART: [fwproc] Received command 0x46574c44
1,587,355 UART: [fwproc] Received Image of size 118548 bytes
1,636,064 UART: ROM Fatal Error: 0x000B0018
1,637,221 >>> mbox cmd response: failed
1,637,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,227 >>> mbox cmd response: failed
1,637,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,233 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,322 UART: [state] LifecycleState = Unprovisioned
85,977 UART: [state] DebugLocked = No
86,625 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,703 UART: [kat] SHA2-256
892,641 UART: [kat] SHA2-384
895,438 UART: [kat] SHA2-512-ACC
897,339 UART: [kat] ECC-384
902,750 UART: [kat] HMAC-384Kdf
907,402 UART: [kat] LMS
1,475,598 UART: [kat] --
1,476,547 UART: [cold-reset] ++
1,477,001 UART: [fht] Storing FHT @ 0x50003400
1,479,938 UART: [idev] ++
1,480,106 UART: [idev] CDI.KEYID = 6
1,480,466 UART: [idev] SUBJECT.KEYID = 7
1,480,890 UART: [idev] UDS.KEYID = 0
1,481,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,505,526 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,156 UART: [idev] --
1,515,219 UART: [ldev] ++
1,515,387 UART: [ldev] CDI.KEYID = 6
1,515,750 UART: [ldev] SUBJECT.KEYID = 5
1,516,176 UART: [ldev] AUTHORITY.KEYID = 7
1,516,639 UART: [ldev] FE.KEYID = 1
1,521,565 UART: [ldev] Erasing FE.KEYID = 1
1,546,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,851 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,742 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,454 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,490 UART: [ldev] --
1,585,949 UART: [fwproc] Waiting for Commands...
1,586,796 UART: [fwproc] Received command 0x46574c44
1,587,587 UART: [fwproc] Received Image of size 118548 bytes
2,931,550 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,862 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,363 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,018 >>> mbox cmd response: failed
1,488,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,024 >>> mbox cmd response: failed
1,488,024 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,589 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,589 UART: [state] LifecycleState = Unprovisioned
86,244 UART: [state] DebugLocked = No
86,882 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,376 UART: [kat] SHA2-256
882,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,422 UART: [kat] ++
886,574 UART: [kat] sha1
890,994 UART: [kat] SHA2-256
892,932 UART: [kat] SHA2-384
895,719 UART: [kat] SHA2-512-ACC
897,620 UART: [kat] ECC-384
903,425 UART: [kat] HMAC-384Kdf
908,165 UART: [kat] LMS
1,476,361 UART: [kat] --
1,477,436 UART: [cold-reset] ++
1,477,928 UART: [fht] Storing FHT @ 0x50003400
1,480,733 UART: [idev] ++
1,480,901 UART: [idev] CDI.KEYID = 6
1,481,261 UART: [idev] SUBJECT.KEYID = 7
1,481,685 UART: [idev] UDS.KEYID = 0
1,482,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,663 UART: [idev] Erasing UDS.KEYID = 0
1,506,133 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,939 UART: [idev] --
1,516,016 UART: [ldev] ++
1,516,184 UART: [ldev] CDI.KEYID = 6
1,516,547 UART: [ldev] SUBJECT.KEYID = 5
1,516,973 UART: [ldev] AUTHORITY.KEYID = 7
1,517,436 UART: [ldev] FE.KEYID = 1
1,522,480 UART: [ldev] Erasing FE.KEYID = 1
1,548,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,557 UART: [ldev] --
1,588,044 UART: [fwproc] Waiting for Commands...
1,588,843 UART: [fwproc] Received command 0x46574c44
1,589,634 UART: [fwproc] Received Image of size 118548 bytes
1,636,759 UART: ROM Fatal Error: 0x000B0018
1,637,916 >>> mbox cmd response: failed
1,637,916 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,922 >>> mbox cmd response: failed
1,637,922 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,928 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,850 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,452 UART: [kat] SHA2-256
882,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,498 UART: [kat] ++
886,650 UART: [kat] sha1
890,898 UART: [kat] SHA2-256
892,836 UART: [kat] SHA2-384
895,505 UART: [kat] SHA2-512-ACC
897,406 UART: [kat] ECC-384
903,057 UART: [kat] HMAC-384Kdf
907,597 UART: [kat] LMS
1,475,793 UART: [kat] --
1,476,526 UART: [cold-reset] ++
1,476,948 UART: [fht] Storing FHT @ 0x50003400
1,479,967 UART: [idev] ++
1,480,135 UART: [idev] CDI.KEYID = 6
1,480,495 UART: [idev] SUBJECT.KEYID = 7
1,480,919 UART: [idev] UDS.KEYID = 0
1,481,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,709 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,401 UART: [idev] --
1,515,454 UART: [ldev] ++
1,515,622 UART: [ldev] CDI.KEYID = 6
1,515,985 UART: [ldev] SUBJECT.KEYID = 5
1,516,411 UART: [ldev] AUTHORITY.KEYID = 7
1,516,874 UART: [ldev] FE.KEYID = 1
1,522,266 UART: [ldev] Erasing FE.KEYID = 1
1,547,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,449 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,355 UART: [ldev] --
1,586,648 UART: [fwproc] Waiting for Commands...
1,587,405 UART: [fwproc] Received command 0x46574c44
1,588,196 UART: [fwproc] Received Image of size 118548 bytes
2,931,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,921 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,139 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,442 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,993 >>> mbox cmd response: failed
1,490,993 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,999 >>> mbox cmd response: failed
1,490,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,491,005 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,278 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,256 UART: [state] LifecycleState = Unprovisioned
85,911 UART: [state] DebugLocked = No
86,423 UART: [state] WD Timer not started. Device not locked for debugging
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,497 UART: [kat] SHA2-512-ACC
906,398 UART: [kat] ECC-384
916,121 UART: [kat] HMAC-384Kdf
920,711 UART: [kat] LMS
1,169,023 UART: [kat] --
1,169,968 UART: [cold-reset] ++
1,170,444 UART: [fht] FHT @ 0x50003400
1,173,066 UART: [idev] ++
1,173,234 UART: [idev] CDI.KEYID = 6
1,173,595 UART: [idev] SUBJECT.KEYID = 7
1,174,020 UART: [idev] UDS.KEYID = 0
1,174,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,089 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,649 UART: [idev] --
1,208,808 UART: [ldev] ++
1,208,976 UART: [ldev] CDI.KEYID = 6
1,209,340 UART: [ldev] SUBJECT.KEYID = 5
1,209,767 UART: [ldev] AUTHORITY.KEYID = 7
1,210,230 UART: [ldev] FE.KEYID = 1
1,215,524 UART: [ldev] Erasing FE.KEYID = 1
1,241,099 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,431 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,104 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,154 UART: [fwproc] Recv command 0x46574c44
1,281,887 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,252 UART: ROM Fatal Error: 0x000B0018
1,329,409 >>> mbox cmd response: failed
1,329,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,415 >>> mbox cmd response: failed
1,329,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,421 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,343 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
891,092 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,196 UART: [kat] ++
895,348 UART: [kat] sha1
899,766 UART: [kat] SHA2-256
901,706 UART: [kat] SHA2-384
904,431 UART: [kat] SHA2-512-ACC
906,332 UART: [kat] ECC-384
915,843 UART: [kat] HMAC-384Kdf
920,377 UART: [kat] LMS
1,168,689 UART: [kat] --
1,169,628 UART: [cold-reset] ++
1,169,972 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,353 UART: [idev] Erasing UDS.KEYID = 0
1,198,651 UART: [idev] Sha1 KeyId Algorithm
1,207,651 UART: [idev] --
1,208,790 UART: [ldev] ++
1,208,958 UART: [ldev] CDI.KEYID = 6
1,209,322 UART: [ldev] SUBJECT.KEYID = 5
1,209,749 UART: [ldev] AUTHORITY.KEYID = 7
1,210,212 UART: [ldev] FE.KEYID = 1
1,215,180 UART: [ldev] Erasing FE.KEYID = 1
1,240,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,012 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,724 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,838 UART: [ldev] --
1,280,247 UART: [fwproc] Wait for Commands...
1,280,900 UART: [fwproc] Recv command 0x46574c44
1,281,633 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,025 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,244 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,419 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,758 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,160 >>> mbox cmd response: failed
1,186,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,166 >>> mbox cmd response: failed
1,186,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,172 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,589 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,047 UART: [kat] SHA2-256
891,597 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,701 UART: [kat] ++
895,853 UART: [kat] sha1
900,139 UART: [kat] SHA2-256
902,079 UART: [kat] SHA2-384
904,838 UART: [kat] SHA2-512-ACC
906,739 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,242 UART: [kat] LMS
1,169,554 UART: [kat] --
1,170,579 UART: [cold-reset] ++
1,171,087 UART: [fht] FHT @ 0x50003400
1,173,779 UART: [idev] ++
1,173,947 UART: [idev] CDI.KEYID = 6
1,174,308 UART: [idev] SUBJECT.KEYID = 7
1,174,733 UART: [idev] UDS.KEYID = 0
1,175,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,992 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,874 UART: [idev] --
1,209,961 UART: [ldev] ++
1,210,129 UART: [ldev] CDI.KEYID = 6
1,210,493 UART: [ldev] SUBJECT.KEYID = 5
1,210,920 UART: [ldev] AUTHORITY.KEYID = 7
1,211,383 UART: [ldev] FE.KEYID = 1
1,217,025 UART: [ldev] Erasing FE.KEYID = 1
1,243,596 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,622 UART: [fwproc] Wait for Commands...
1,283,415 UART: [fwproc] Recv command 0x46574c44
1,284,148 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,391 UART: ROM Fatal Error: 0x000B0018
1,331,548 >>> mbox cmd response: failed
1,331,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,554 >>> mbox cmd response: failed
1,331,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,323 UART: [state] LifecycleState = Unprovisioned
85,978 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
900,033 UART: [kat] SHA2-256
901,973 UART: [kat] SHA2-384
904,680 UART: [kat] SHA2-512-ACC
906,581 UART: [kat] ECC-384
916,306 UART: [kat] HMAC-384Kdf
920,982 UART: [kat] LMS
1,169,294 UART: [kat] --
1,170,235 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,684 UART: [idev] Erasing UDS.KEYID = 0
1,199,882 UART: [idev] Sha1 KeyId Algorithm
1,208,604 UART: [idev] --
1,209,537 UART: [ldev] ++
1,209,705 UART: [ldev] CDI.KEYID = 6
1,210,069 UART: [ldev] SUBJECT.KEYID = 5
1,210,496 UART: [ldev] AUTHORITY.KEYID = 7
1,210,959 UART: [ldev] FE.KEYID = 1
1,216,165 UART: [ldev] Erasing FE.KEYID = 1
1,242,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,517 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,333 UART: [ldev] --
1,281,638 UART: [fwproc] Wait for Commands...
1,282,259 UART: [fwproc] Recv command 0x46574c44
1,282,992 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,285 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,460 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,681 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,131 >>> mbox cmd response: failed
1,186,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,137 >>> mbox cmd response: failed
1,186,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,304 UART: [state] LifecycleState = Unprovisioned
85,959 UART: [state] DebugLocked = No
86,577 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
893,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,663 UART: [kat] ++
897,815 UART: [kat] sha1
902,143 UART: [kat] SHA2-256
904,083 UART: [kat] SHA2-384
906,712 UART: [kat] SHA2-512-ACC
908,613 UART: [kat] ECC-384
918,222 UART: [kat] HMAC-384Kdf
922,754 UART: [kat] LMS
1,171,082 UART: [kat] --
1,171,711 UART: [cold-reset] ++
1,172,169 UART: [fht] FHT @ 0x50003400
1,174,792 UART: [idev] ++
1,174,960 UART: [idev] CDI.KEYID = 6
1,175,320 UART: [idev] SUBJECT.KEYID = 7
1,175,744 UART: [idev] UDS.KEYID = 0
1,176,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,182 UART: [idev] Erasing UDS.KEYID = 0
1,200,861 UART: [idev] Sha1 KeyId Algorithm
1,209,249 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,216,931 UART: [ldev] Erasing FE.KEYID = 1
1,243,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,382 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,094 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,099 UART: [ldev] --
1,282,370 UART: [fwproc] Wait for Commands...
1,283,108 UART: [fwproc] Recv command 0x46574c44
1,283,836 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,999 UART: ROM Fatal Error: 0x000B0018
1,332,156 >>> mbox cmd response: failed
1,332,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,162 >>> mbox cmd response: failed
1,332,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,168 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,714 UART: [kat] SHA2-256
893,364 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,489 UART: [kat] ++
897,641 UART: [kat] sha1
901,815 UART: [kat] SHA2-256
903,755 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,680 UART: [kat] LMS
1,171,008 UART: [kat] --
1,172,089 UART: [cold-reset] ++
1,172,473 UART: [fht] FHT @ 0x50003400
1,175,046 UART: [idev] ++
1,175,214 UART: [idev] CDI.KEYID = 6
1,175,574 UART: [idev] SUBJECT.KEYID = 7
1,175,998 UART: [idev] UDS.KEYID = 0
1,176,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,130 UART: [idev] Erasing UDS.KEYID = 0
1,201,231 UART: [idev] Sha1 KeyId Algorithm
1,209,487 UART: [idev] --
1,210,741 UART: [ldev] ++
1,210,909 UART: [ldev] CDI.KEYID = 6
1,211,272 UART: [ldev] SUBJECT.KEYID = 5
1,211,698 UART: [ldev] AUTHORITY.KEYID = 7
1,212,161 UART: [ldev] FE.KEYID = 1
1,217,329 UART: [ldev] Erasing FE.KEYID = 1
1,244,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,171 UART: [ldev] --
1,283,626 UART: [fwproc] Wait for Commands...
1,284,216 UART: [fwproc] Recv command 0x46574c44
1,284,944 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,088 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,191 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,578 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,071 >>> mbox cmd response: failed
1,186,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,077 >>> mbox cmd response: failed
1,186,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,171 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,795 UART: [state] LifecycleState = Unprovisioned
86,450 UART: [state] DebugLocked = No
86,970 UART: [state] WD Timer not started. Device not locked for debugging
88,227 UART: [kat] SHA2-256
893,877 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,002 UART: [kat] ++
898,154 UART: [kat] sha1
902,482 UART: [kat] SHA2-256
904,422 UART: [kat] SHA2-384
907,035 UART: [kat] SHA2-512-ACC
908,936 UART: [kat] ECC-384
918,819 UART: [kat] HMAC-384Kdf
923,405 UART: [kat] LMS
1,171,733 UART: [kat] --
1,172,684 UART: [cold-reset] ++
1,173,220 UART: [fht] FHT @ 0x50003400
1,176,007 UART: [idev] ++
1,176,175 UART: [idev] CDI.KEYID = 6
1,176,535 UART: [idev] SUBJECT.KEYID = 7
1,176,959 UART: [idev] UDS.KEYID = 0
1,177,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,157 UART: [idev] Erasing UDS.KEYID = 0
1,202,682 UART: [idev] Sha1 KeyId Algorithm
1,211,046 UART: [idev] --
1,212,254 UART: [ldev] ++
1,212,422 UART: [ldev] CDI.KEYID = 6
1,212,785 UART: [ldev] SUBJECT.KEYID = 5
1,213,211 UART: [ldev] AUTHORITY.KEYID = 7
1,213,674 UART: [ldev] FE.KEYID = 1
1,218,898 UART: [ldev] Erasing FE.KEYID = 1
1,245,165 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,284 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,784 UART: [ldev] --
1,284,265 UART: [fwproc] Wait for Commands...
1,284,899 UART: [fwproc] Recv command 0x46574c44
1,285,627 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,916 UART: ROM Fatal Error: 0x000B0018
1,334,073 >>> mbox cmd response: failed
1,334,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,079 >>> mbox cmd response: failed
1,334,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,505 UART: [state] LifecycleState = Unprovisioned
86,160 UART: [state] DebugLocked = No
86,810 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,112 UART: [kat] SHA2-256
904,052 UART: [kat] SHA2-384
906,963 UART: [kat] SHA2-512-ACC
908,864 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,569 UART: [kat] LMS
1,171,897 UART: [kat] --
1,172,900 UART: [cold-reset] ++
1,173,456 UART: [fht] FHT @ 0x50003400
1,175,965 UART: [idev] ++
1,176,133 UART: [idev] CDI.KEYID = 6
1,176,493 UART: [idev] SUBJECT.KEYID = 7
1,176,917 UART: [idev] UDS.KEYID = 0
1,177,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,089 UART: [idev] Erasing UDS.KEYID = 0
1,201,808 UART: [idev] Sha1 KeyId Algorithm
1,210,230 UART: [idev] --
1,211,122 UART: [ldev] ++
1,211,290 UART: [ldev] CDI.KEYID = 6
1,211,653 UART: [ldev] SUBJECT.KEYID = 5
1,212,079 UART: [ldev] AUTHORITY.KEYID = 7
1,212,542 UART: [ldev] FE.KEYID = 1
1,217,996 UART: [ldev] Erasing FE.KEYID = 1
1,244,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,966 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,682 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,573 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,285 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,340 UART: [ldev] --
1,283,745 UART: [fwproc] Wait for Commands...
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,285 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,633 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,377 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,594 >>> mbox cmd response: failed
1,187,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,600 >>> mbox cmd response: failed
1,187,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,876 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_incorrect_order ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,221 UART:
192,575 UART: Running Caliptra ROM ...
193,761 UART:
193,919 UART: [state] CFI Enabled
260,387 UART: [state] LifecycleState = Unprovisioned
262,372 UART: [state] DebugLocked = No
263,944 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,960 UART: [kat] SHA2-256
437,650 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
448,138 UART: [kat] ++
448,613 UART: [kat] sha1
460,138 UART: [kat] SHA2-256
462,857 UART: [kat] SHA2-384
470,031 UART: [kat] SHA2-512-ACC
472,386 UART: [kat] ECC-384
2,765,607 UART: [kat] HMAC-384Kdf
2,777,805 UART: [kat] LMS
3,968,132 UART: [kat] --
3,970,370 UART: [cold-reset] ++
3,972,577 UART: [fht] Storing FHT @ 0x50003400
3,983,896 UART: [idev] ++
3,984,499 UART: [idev] CDI.KEYID = 6
3,985,415 UART: [idev] SUBJECT.KEYID = 7
3,986,697 UART: [idev] UDS.KEYID = 0
3,989,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,832 UART: [idev] Erasing UDS.KEYID = 0
7,326,624 UART: [idev] Using Sha1 for KeyId Algorithm
7,348,277 UART: [idev] --
7,351,242 UART: [ldev] ++
7,351,833 UART: [ldev] CDI.KEYID = 6
7,352,721 UART: [ldev] SUBJECT.KEYID = 5
7,353,911 UART: [ldev] AUTHORITY.KEYID = 7
7,355,260 UART: [ldev] FE.KEYID = 1
7,399,509 UART: [ldev] Erasing FE.KEYID = 1
10,735,590 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,245 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,282 UART: [ldev] --
13,115,073 UART: [fwproc] Waiting for Commands...
13,117,936 UART: [fwproc] Received command 0x46574c44
13,120,126 UART: [fwproc] Received Image of size 118548 bytes
15,823,749 UART: ROM Fatal Error: 0x000B0034
15,827,250 >>> mbox cmd response: failed
15,827,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,011 >>> mbox cmd response: failed
15,828,281 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,828,579 >>> mbox cmd response: failed
Initializing fuses
2,057,738 writing to cptra_bootfsm_go
2,247,057 UART:
2,247,432 UART: Running Caliptra ROM ...
2,248,482 UART:
2,248,639 UART: [state] CFI Enabled
2,312,561 UART: [state] LifecycleState = Unprovisioned
2,314,499 UART: [state] DebugLocked = No
2,317,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,322,218 UART: [kat] SHA2-256
2,491,943 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,446 UART: [kat] ++
2,502,993 UART: [kat] sha1
2,514,162 UART: [kat] SHA2-256
2,516,850 UART: [kat] SHA2-384
2,522,945 UART: [kat] SHA2-512-ACC
2,525,297 UART: [kat] ECC-384
4,812,844 UART: [kat] HMAC-384Kdf
4,843,870 UART: [kat] LMS
6,034,197 UART: [kat] --
6,039,725 UART: [cold-reset] ++
6,041,447 UART: [fht] Storing FHT @ 0x50003400
6,054,284 UART: [idev] ++
6,054,915 UART: [idev] CDI.KEYID = 6
6,055,833 UART: [idev] SUBJECT.KEYID = 7
6,057,057 UART: [idev] UDS.KEYID = 0
6,059,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,209,028 UART: [idev] Erasing UDS.KEYID = 0
9,390,849 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,780 UART: [idev] --
9,416,556 UART: [ldev] ++
9,417,128 UART: [ldev] CDI.KEYID = 6
9,418,150 UART: [ldev] SUBJECT.KEYID = 5
9,419,374 UART: [ldev] AUTHORITY.KEYID = 7
9,420,561 UART: [ldev] FE.KEYID = 1
9,468,410 UART: [ldev] Erasing FE.KEYID = 1
12,802,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,115,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,159,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,177,761 UART: [ldev] --
15,183,188 UART: [fwproc] Waiting for Commands...
15,185,720 UART: [fwproc] Received command 0x46574c44
15,188,060 UART: [fwproc] Received Image of size 118548 bytes
19,298,986 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,375,659 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,448,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,778,041 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,958 writing to cptra_bootfsm_go
3,788,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,562,642 >>> mbox cmd response: failed
15,563,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,563,575 >>> mbox cmd response: failed
15,563,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,564,147 >>> mbox cmd response: failed
Initializing fuses
2,058,419 writing to cptra_bootfsm_go
5,858,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,034,828 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,651 UART:
193,030 UART: Running Caliptra ROM ...
194,246 UART:
603,960 UART: [state] CFI Enabled
618,383 UART: [state] LifecycleState = Unprovisioned
620,324 UART: [state] DebugLocked = No
622,947 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,193 UART: [kat] SHA2-256
797,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,492 UART: [kat] ++
808,978 UART: [kat] sha1
820,237 UART: [kat] SHA2-256
822,925 UART: [kat] SHA2-384
828,317 UART: [kat] SHA2-512-ACC
830,671 UART: [kat] ECC-384
3,117,226 UART: [kat] HMAC-384Kdf
3,129,040 UART: [kat] LMS
4,319,166 UART: [kat] --
4,323,301 UART: [cold-reset] ++
4,325,085 UART: [fht] Storing FHT @ 0x50003400
4,336,577 UART: [idev] ++
4,337,155 UART: [idev] CDI.KEYID = 6
4,338,129 UART: [idev] SUBJECT.KEYID = 7
4,339,350 UART: [idev] UDS.KEYID = 0
4,342,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,146 UART: [idev] Erasing UDS.KEYID = 0
7,626,134 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,844 UART: [idev] --
7,652,738 UART: [ldev] ++
7,653,325 UART: [ldev] CDI.KEYID = 6
7,654,241 UART: [ldev] SUBJECT.KEYID = 5
7,655,471 UART: [ldev] AUTHORITY.KEYID = 7
7,656,718 UART: [ldev] FE.KEYID = 1
7,667,936 UART: [ldev] Erasing FE.KEYID = 1
10,956,400 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,288 UART: [ldev] --
13,318,297 UART: [fwproc] Waiting for Commands...
13,320,125 UART: [fwproc] Received command 0x46574c44
13,322,328 UART: [fwproc] Received Image of size 118548 bytes
16,028,703 UART: ROM Fatal Error: 0x000B0034
16,032,240 >>> mbox cmd response: failed
16,032,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,046 >>> mbox cmd response: failed
16,033,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,623 >>> mbox cmd response: failed
Initializing fuses
2,057,087 writing to cptra_bootfsm_go
2,246,392 UART:
2,246,754 UART: Running Caliptra ROM ...
2,247,902 UART:
4,422,771 UART: [state] CFI Enabled
4,439,467 UART: [state] LifecycleState = Unprovisioned
4,441,383 UART: [state] DebugLocked = No
4,443,097 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,447,675 UART: [kat] SHA2-256
4,617,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,936 UART: [kat] ++
4,628,430 UART: [kat] sha1
4,639,541 UART: [kat] SHA2-256
4,642,270 UART: [kat] SHA2-384
4,648,890 UART: [kat] SHA2-512-ACC
4,651,258 UART: [kat] ECC-384
6,933,260 UART: [kat] HMAC-384Kdf
6,945,227 UART: [kat] LMS
8,135,318 UART: [kat] --
8,138,031 UART: [cold-reset] ++
8,139,866 UART: [fht] Storing FHT @ 0x50003400
8,151,356 UART: [idev] ++
8,151,982 UART: [idev] CDI.KEYID = 6
8,152,903 UART: [idev] SUBJECT.KEYID = 7
8,154,128 UART: [idev] UDS.KEYID = 0
8,156,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,305,534 UART: [idev] Erasing UDS.KEYID = 0
11,443,300 UART: [idev] Using Sha1 for KeyId Algorithm
11,464,748 UART: [idev] --
11,469,207 UART: [ldev] ++
11,469,791 UART: [ldev] CDI.KEYID = 6
11,470,764 UART: [ldev] SUBJECT.KEYID = 5
11,472,034 UART: [ldev] AUTHORITY.KEYID = 7
11,473,228 UART: [ldev] FE.KEYID = 1
11,484,907 UART: [ldev] Erasing FE.KEYID = 1
14,773,508 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,064,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,078,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,093,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,107,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,127,369 UART: [ldev] --
17,132,080 UART: [fwproc] Waiting for Commands...
17,134,857 UART: [fwproc] Received command 0x46574c44
17,137,056 UART: [fwproc] Received Image of size 118548 bytes
21,241,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,318,445 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,391,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,720,868 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
4,136,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,770,461 >>> mbox cmd response: failed
15,771,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,771,432 >>> mbox cmd response: failed
15,771,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,772,015 >>> mbox cmd response: failed
Initializing fuses
2,058,939 writing to cptra_bootfsm_go
8,223,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,241,303 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
192,337 UART:
192,688 UART: Running Caliptra ROM ...
193,898 UART:
194,062 UART: [state] CFI Enabled
264,477 UART: [state] LifecycleState = Unprovisioned
266,399 UART: [state] DebugLocked = No
268,059 UART: [state] WD Timer not started. Device not locked for debugging
271,875 UART: [kat] SHA2-256
451,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,290 UART: [kat] ++
462,805 UART: [kat] sha1
472,946 UART: [kat] SHA2-256
475,615 UART: [kat] SHA2-384
481,926 UART: [kat] SHA2-512-ACC
484,274 UART: [kat] ECC-384
2,946,454 UART: [kat] HMAC-384Kdf
2,970,306 UART: [kat] LMS
3,446,847 UART: [kat] --
3,453,193 UART: [cold-reset] ++
3,455,786 UART: [fht] FHT @ 0x50003400
3,467,369 UART: [idev] ++
3,467,937 UART: [idev] CDI.KEYID = 6
3,468,887 UART: [idev] SUBJECT.KEYID = 7
3,470,103 UART: [idev] UDS.KEYID = 0
3,472,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,622,611 UART: [idev] Erasing UDS.KEYID = 0
5,985,703 UART: [idev] Sha1 KeyId Algorithm
6,008,535 UART: [idev] --
6,012,978 UART: [ldev] ++
6,013,555 UART: [ldev] CDI.KEYID = 6
6,014,449 UART: [ldev] SUBJECT.KEYID = 5
6,015,671 UART: [ldev] AUTHORITY.KEYID = 7
6,016,922 UART: [ldev] FE.KEYID = 1
6,055,530 UART: [ldev] Erasing FE.KEYID = 1
8,560,489 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,302 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,948 UART: [ldev] --
10,369,490 UART: [fwproc] Wait for Commands...
10,372,782 UART: [fwproc] Recv command 0x46574c44
10,374,792 UART: [fwproc] Recv'd Img size: 118548 bytes
12,445,520 UART: ROM Fatal Error: 0x000B0034
12,448,755 >>> mbox cmd response: failed
12,449,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,431 >>> mbox cmd response: failed
12,449,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,041 >>> mbox cmd response: failed
Initializing fuses
2,067,740 writing to cptra_bootfsm_go
2,257,053 UART:
2,257,397 UART: Running Caliptra ROM ...
2,258,533 UART:
2,258,705 UART: [state] CFI Enabled
2,317,600 UART: [state] LifecycleState = Unprovisioned
2,319,516 UART: [state] DebugLocked = No
2,321,282 UART: [state] WD Timer not started. Device not locked for debugging
2,325,087 UART: [kat] SHA2-256
2,504,732 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,515 UART: [kat] ++
2,516,301 UART: [kat] sha1
2,527,260 UART: [kat] SHA2-256
2,529,949 UART: [kat] SHA2-384
2,536,930 UART: [kat] SHA2-512-ACC
2,539,326 UART: [kat] ECC-384
4,999,392 UART: [kat] HMAC-384Kdf
5,021,723 UART: [kat] LMS
5,498,208 UART: [kat] --
5,501,821 UART: [cold-reset] ++
5,504,409 UART: [fht] FHT @ 0x50003400
5,516,308 UART: [idev] ++
5,516,895 UART: [idev] CDI.KEYID = 6
5,517,919 UART: [idev] SUBJECT.KEYID = 7
5,519,086 UART: [idev] UDS.KEYID = 0
5,521,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,670,678 UART: [idev] Erasing UDS.KEYID = 0
8,035,240 UART: [idev] Sha1 KeyId Algorithm
8,059,044 UART: [idev] --
8,063,378 UART: [ldev] ++
8,063,956 UART: [ldev] CDI.KEYID = 6
8,064,890 UART: [ldev] SUBJECT.KEYID = 5
8,066,057 UART: [ldev] AUTHORITY.KEYID = 7
8,067,300 UART: [ldev] FE.KEYID = 1
8,107,828 UART: [ldev] Erasing FE.KEYID = 1
10,614,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,765 UART: [ldev] --
12,423,652 UART: [fwproc] Wait for Commands...
12,426,198 UART: [fwproc] Recv command 0x46574c44
12,428,190 UART: [fwproc] Recv'd Img size: 118548 bytes
15,917,225 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,997,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,070,513 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,398,546 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,289 writing to cptra_bootfsm_go
3,462,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,339,502 >>> mbox cmd response: failed
12,340,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,340,438 >>> mbox cmd response: failed
12,340,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,341,010 >>> mbox cmd response: failed
Initializing fuses
2,060,681 writing to cptra_bootfsm_go
5,520,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,300,937 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,495 writing to cptra_bootfsm_go
192,849 UART:
193,219 UART: Running Caliptra ROM ...
194,439 UART:
603,984 UART: [state] CFI Enabled
616,313 UART: [state] LifecycleState = Unprovisioned
618,263 UART: [state] DebugLocked = No
620,541 UART: [state] WD Timer not started. Device not locked for debugging
624,751 UART: [kat] SHA2-256
804,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,198 UART: [kat] ++
815,677 UART: [kat] sha1
825,912 UART: [kat] SHA2-256
828,598 UART: [kat] SHA2-384
834,797 UART: [kat] SHA2-512-ACC
837,198 UART: [kat] ECC-384
3,279,084 UART: [kat] HMAC-384Kdf
3,291,214 UART: [kat] LMS
3,767,713 UART: [kat] --
3,773,385 UART: [cold-reset] ++
3,774,916 UART: [fht] FHT @ 0x50003400
3,785,530 UART: [idev] ++
3,786,099 UART: [idev] CDI.KEYID = 6
3,787,126 UART: [idev] SUBJECT.KEYID = 7
3,788,288 UART: [idev] UDS.KEYID = 0
3,790,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,770 UART: [idev] Erasing UDS.KEYID = 0
6,271,388 UART: [idev] Sha1 KeyId Algorithm
6,295,110 UART: [idev] --
6,299,180 UART: [ldev] ++
6,299,815 UART: [ldev] CDI.KEYID = 6
6,300,745 UART: [ldev] SUBJECT.KEYID = 5
6,301,915 UART: [ldev] AUTHORITY.KEYID = 7
6,303,152 UART: [ldev] FE.KEYID = 1
6,315,368 UART: [ldev] Erasing FE.KEYID = 1
8,793,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,570 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,859 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,445 UART: [ldev] --
10,585,551 UART: [fwproc] Wait for Commands...
10,587,657 UART: [fwproc] Recv command 0x46574c44
10,589,652 UART: [fwproc] Recv'd Img size: 118548 bytes
12,659,136 UART: ROM Fatal Error: 0x000B0034
12,662,371 >>> mbox cmd response: failed
12,662,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,037 >>> mbox cmd response: failed
12,663,339 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,638 >>> mbox cmd response: failed
Initializing fuses
2,061,689 writing to cptra_bootfsm_go
2,250,968 UART:
2,251,312 UART: Running Caliptra ROM ...
2,252,360 UART:
7,784,426 UART: [state] CFI Enabled
7,798,189 UART: [state] LifecycleState = Unprovisioned
7,800,086 UART: [state] DebugLocked = No
7,801,844 UART: [state] WD Timer not started. Device not locked for debugging
7,806,473 UART: [kat] SHA2-256
7,986,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,996,954 UART: [kat] ++
7,997,420 UART: [kat] sha1
8,009,119 UART: [kat] SHA2-256
8,011,818 UART: [kat] SHA2-384
8,018,251 UART: [kat] SHA2-512-ACC
8,020,628 UART: [kat] ECC-384
10,462,314 UART: [kat] HMAC-384Kdf
10,473,738 UART: [kat] LMS
10,950,284 UART: [kat] --
10,954,611 UART: [cold-reset] ++
10,955,846 UART: [fht] FHT @ 0x50003400
10,967,094 UART: [idev] ++
10,967,662 UART: [idev] CDI.KEYID = 6
10,968,676 UART: [idev] SUBJECT.KEYID = 7
10,969,837 UART: [idev] UDS.KEYID = 0
10,972,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,121,221 UART: [idev] Erasing UDS.KEYID = 0
13,443,143 UART: [idev] Sha1 KeyId Algorithm
13,466,211 UART: [idev] --
13,471,231 UART: [ldev] ++
13,471,855 UART: [ldev] CDI.KEYID = 6
13,472,784 UART: [ldev] SUBJECT.KEYID = 5
13,473,946 UART: [ldev] AUTHORITY.KEYID = 7
13,475,330 UART: [ldev] FE.KEYID = 1
13,485,299 UART: [ldev] Erasing FE.KEYID = 1
15,961,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,680,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,712,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,727,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,749,119 UART: [ldev] --
17,754,067 UART: [fwproc] Wait for Commands...
17,756,708 UART: [fwproc] Recv command 0x46574c44
17,758,695 UART: [fwproc] Recv'd Img size: 118548 bytes
21,233,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,311,974 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,384,993 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,713,956 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
3,784,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,542,409 >>> mbox cmd response: failed
12,542,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,342 >>> mbox cmd response: failed
12,543,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,543,901 >>> mbox cmd response: failed
Initializing fuses
2,060,950 writing to cptra_bootfsm_go
11,096,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,759,382 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,187 UART:
192,562 UART: Running Caliptra ROM ...
193,673 UART:
193,819 UART: [state] CFI Enabled
262,173 UART: [state] LifecycleState = Unprovisioned
264,594 UART: [state] DebugLocked = No
266,041 UART: [state] WD Timer not started. Device not locked for debugging
270,638 UART: [kat] SHA2-256
460,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,284 UART: [kat] ++
471,767 UART: [kat] sha1
483,139 UART: [kat] SHA2-256
486,165 UART: [kat] SHA2-384
491,988 UART: [kat] SHA2-512-ACC
494,546 UART: [kat] ECC-384
2,947,474 UART: [kat] HMAC-384Kdf
2,969,077 UART: [kat] LMS
3,500,839 UART: [kat] --
3,504,470 UART: [cold-reset] ++
3,506,517 UART: [fht] FHT @ 0x50003400
3,518,043 UART: [idev] ++
3,518,737 UART: [idev] CDI.KEYID = 6
3,519,707 UART: [idev] SUBJECT.KEYID = 7
3,520,871 UART: [idev] UDS.KEYID = 0
3,523,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,988 UART: [idev] Erasing UDS.KEYID = 0
6,025,236 UART: [idev] Sha1 KeyId Algorithm
6,046,919 UART: [idev] --
6,051,356 UART: [ldev] ++
6,052,045 UART: [ldev] CDI.KEYID = 6
6,052,968 UART: [ldev] SUBJECT.KEYID = 5
6,054,142 UART: [ldev] AUTHORITY.KEYID = 7
6,055,327 UART: [ldev] FE.KEYID = 1
6,097,943 UART: [ldev] Erasing FE.KEYID = 1
8,603,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,480 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,629 UART: [ldev] --
10,411,549 UART: [fwproc] Wait for Commands...
10,413,385 UART: [fwproc] Recv command 0x46574c44
10,415,706 UART: [fwproc] Recv'd Img size: 118548 bytes
12,498,604 UART: ROM Fatal Error: 0x000B0034
12,502,270 >>> mbox cmd response: failed
12,502,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,052 >>> mbox cmd response: failed
12,503,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,503,628 >>> mbox cmd response: failed
Initializing fuses
2,061,125 writing to cptra_bootfsm_go
2,250,470 UART:
2,250,825 UART: Running Caliptra ROM ...
2,251,966 UART:
2,252,142 UART: [state] CFI Enabled
2,325,528 UART: [state] LifecycleState = Unprovisioned
2,327,946 UART: [state] DebugLocked = No
2,329,121 UART: [state] WD Timer not started. Device not locked for debugging
2,332,170 UART: [kat] SHA2-256
2,522,072 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,532,810 UART: [kat] ++
2,533,308 UART: [kat] sha1
2,544,474 UART: [kat] SHA2-256
2,547,462 UART: [kat] SHA2-384
2,555,081 UART: [kat] SHA2-512-ACC
2,557,661 UART: [kat] ECC-384
5,012,963 UART: [kat] HMAC-384Kdf
5,036,280 UART: [kat] LMS
5,568,014 UART: [kat] --
5,572,390 UART: [cold-reset] ++
5,574,004 UART: [fht] FHT @ 0x50003400
5,585,865 UART: [idev] ++
5,586,548 UART: [idev] CDI.KEYID = 6
5,587,517 UART: [idev] SUBJECT.KEYID = 7
5,588,734 UART: [idev] UDS.KEYID = 0
5,591,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,740,200 UART: [idev] Erasing UDS.KEYID = 0
8,094,607 UART: [idev] Sha1 KeyId Algorithm
8,116,225 UART: [idev] --
8,120,169 UART: [ldev] ++
8,120,759 UART: [ldev] CDI.KEYID = 6
8,121,679 UART: [ldev] SUBJECT.KEYID = 5
8,122,850 UART: [ldev] AUTHORITY.KEYID = 7
8,124,088 UART: [ldev] FE.KEYID = 1
8,163,528 UART: [ldev] Erasing FE.KEYID = 1
10,671,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,405,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,420,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,435,982 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,451,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,472,597 UART: [ldev] --
12,477,975 UART: [fwproc] Wait for Commands...
12,479,970 UART: [fwproc] Recv command 0x46574c44
12,482,285 UART: [fwproc] Recv'd Img size: 118548 bytes
15,978,045 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,053,084 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,176,706 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,737,417 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,439,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,294,851 >>> mbox cmd response: failed
12,295,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,295,744 >>> mbox cmd response: failed
12,296,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,321 >>> mbox cmd response: failed
Initializing fuses
2,062,022 writing to cptra_bootfsm_go
5,488,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,872,497 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,253 writing to cptra_bootfsm_go
192,375 UART:
192,748 UART: Running Caliptra ROM ...
193,850 UART:
603,648 UART: [state] CFI Enabled
617,095 UART: [state] LifecycleState = Unprovisioned
619,446 UART: [state] DebugLocked = No
621,343 UART: [state] WD Timer not started. Device not locked for debugging
625,250 UART: [kat] SHA2-256
815,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,932 UART: [kat] ++
826,445 UART: [kat] sha1
838,571 UART: [kat] SHA2-256
841,591 UART: [kat] SHA2-384
848,012 UART: [kat] SHA2-512-ACC
850,594 UART: [kat] ECC-384
3,290,267 UART: [kat] HMAC-384Kdf
3,302,781 UART: [kat] LMS
3,834,566 UART: [kat] --
3,838,245 UART: [cold-reset] ++
3,839,432 UART: [fht] FHT @ 0x50003400
3,850,529 UART: [idev] ++
3,851,217 UART: [idev] CDI.KEYID = 6
3,852,193 UART: [idev] SUBJECT.KEYID = 7
3,853,359 UART: [idev] UDS.KEYID = 0
3,856,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,554 UART: [idev] Erasing UDS.KEYID = 0
6,331,402 UART: [idev] Sha1 KeyId Algorithm
6,354,446 UART: [idev] --
6,360,017 UART: [ldev] ++
6,360,705 UART: [ldev] CDI.KEYID = 6
6,361,620 UART: [ldev] SUBJECT.KEYID = 5
6,362,791 UART: [ldev] AUTHORITY.KEYID = 7
6,364,028 UART: [ldev] FE.KEYID = 1
6,376,216 UART: [ldev] Erasing FE.KEYID = 1
8,854,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,031 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,414 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,556 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,052 UART: [ldev] --
10,647,450 UART: [fwproc] Wait for Commands...
10,649,341 UART: [fwproc] Recv command 0x46574c44
10,651,614 UART: [fwproc] Recv'd Img size: 118548 bytes
12,732,836 UART: ROM Fatal Error: 0x000B0034
12,736,448 >>> mbox cmd response: failed
12,736,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,214 >>> mbox cmd response: failed
12,737,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,737,794 >>> mbox cmd response: failed
Initializing fuses
2,060,986 writing to cptra_bootfsm_go
2,250,314 UART:
2,250,666 UART: Running Caliptra ROM ...
2,251,811 UART:
7,705,146 UART: [state] CFI Enabled
7,721,528 UART: [state] LifecycleState = Unprovisioned
7,723,889 UART: [state] DebugLocked = No
7,726,745 UART: [state] WD Timer not started. Device not locked for debugging
7,730,626 UART: [kat] SHA2-256
7,920,528 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,931,282 UART: [kat] ++
7,931,811 UART: [kat] sha1
7,942,760 UART: [kat] SHA2-256
7,945,809 UART: [kat] SHA2-384
7,952,186 UART: [kat] SHA2-512-ACC
7,954,767 UART: [kat] ECC-384
10,395,475 UART: [kat] HMAC-384Kdf
10,408,409 UART: [kat] LMS
10,940,235 UART: [kat] --
10,944,992 UART: [cold-reset] ++
10,947,028 UART: [fht] FHT @ 0x50003400
10,958,725 UART: [idev] ++
10,959,408 UART: [idev] CDI.KEYID = 6
10,960,429 UART: [idev] SUBJECT.KEYID = 7
10,961,591 UART: [idev] UDS.KEYID = 0
10,964,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,113,011 UART: [idev] Erasing UDS.KEYID = 0
13,438,371 UART: [idev] Sha1 KeyId Algorithm
13,460,291 UART: [idev] --
13,464,785 UART: [ldev] ++
13,465,475 UART: [ldev] CDI.KEYID = 6
13,466,360 UART: [ldev] SUBJECT.KEYID = 5
13,467,576 UART: [ldev] AUTHORITY.KEYID = 7
13,468,812 UART: [ldev] FE.KEYID = 1
13,480,033 UART: [ldev] Erasing FE.KEYID = 1
15,957,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,678,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,693,848 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,709,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,724,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,746,190 UART: [ldev] --
17,751,579 UART: [fwproc] Wait for Commands...
17,754,331 UART: [fwproc] Recv command 0x46574c44
17,756,600 UART: [fwproc] Recv'd Img size: 118548 bytes
21,256,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,338,252 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,461,824 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,021,419 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,754,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,520,235 >>> mbox cmd response: failed
12,520,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,100 >>> mbox cmd response: failed
12,521,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,521,661 >>> mbox cmd response: failed
Initializing fuses
2,060,722 writing to cptra_bootfsm_go
11,099,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,388,201 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,629 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,295 UART: [kat] SHA2-256
882,226 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,341 UART: [kat] ++
886,493 UART: [kat] sha1
890,755 UART: [kat] SHA2-256
892,693 UART: [kat] SHA2-384
895,540 UART: [kat] SHA2-512-ACC
897,441 UART: [kat] ECC-384
903,194 UART: [kat] HMAC-384Kdf
907,800 UART: [kat] LMS
1,475,996 UART: [kat] --
1,476,979 UART: [cold-reset] ++
1,477,347 UART: [fht] Storing FHT @ 0x50003400
1,480,178 UART: [idev] ++
1,480,346 UART: [idev] CDI.KEYID = 6
1,480,706 UART: [idev] SUBJECT.KEYID = 7
1,481,130 UART: [idev] UDS.KEYID = 0
1,481,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,102 UART: [idev] Erasing UDS.KEYID = 0
1,505,654 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,270 UART: [idev] --
1,515,295 UART: [ldev] ++
1,515,463 UART: [ldev] CDI.KEYID = 6
1,515,826 UART: [ldev] SUBJECT.KEYID = 5
1,516,252 UART: [ldev] AUTHORITY.KEYID = 7
1,516,715 UART: [ldev] FE.KEYID = 1
1,521,931 UART: [ldev] Erasing FE.KEYID = 1
1,546,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,385 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,902 UART: [ldev] --
1,586,195 UART: [fwproc] Waiting for Commands...
1,586,898 UART: [fwproc] Received command 0x46574c44
1,587,689 UART: [fwproc] Received Image of size 118548 bytes
1,634,980 UART: ROM Fatal Error: 0x000B0034
1,636,137 >>> mbox cmd response: failed
1,636,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,143 >>> mbox cmd response: failed
1,636,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,113 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,651 UART: [kat] SHA2-256
881,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,697 UART: [kat] ++
885,849 UART: [kat] sha1
890,065 UART: [kat] SHA2-256
892,003 UART: [kat] SHA2-384
894,680 UART: [kat] SHA2-512-ACC
896,581 UART: [kat] ECC-384
902,466 UART: [kat] HMAC-384Kdf
906,918 UART: [kat] LMS
1,475,114 UART: [kat] --
1,476,161 UART: [cold-reset] ++
1,476,523 UART: [fht] Storing FHT @ 0x50003400
1,479,378 UART: [idev] ++
1,479,546 UART: [idev] CDI.KEYID = 6
1,479,906 UART: [idev] SUBJECT.KEYID = 7
1,480,330 UART: [idev] UDS.KEYID = 0
1,480,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,505,084 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,776 UART: [idev] --
1,514,765 UART: [ldev] ++
1,514,933 UART: [ldev] CDI.KEYID = 6
1,515,296 UART: [ldev] SUBJECT.KEYID = 5
1,515,722 UART: [ldev] AUTHORITY.KEYID = 7
1,516,185 UART: [ldev] FE.KEYID = 1
1,521,265 UART: [ldev] Erasing FE.KEYID = 1
1,546,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,392 UART: [ldev] --
1,585,805 UART: [fwproc] Waiting for Commands...
1,586,460 UART: [fwproc] Received command 0x46574c44
1,587,251 UART: [fwproc] Received Image of size 118548 bytes
2,932,528 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,194 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,412 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,773 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,386 >>> mbox cmd response: failed
1,487,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,392 >>> mbox cmd response: failed
1,487,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,441 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,473 UART: [state] LifecycleState = Unprovisioned
86,128 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,289 UART: [kat] SHA2-512-ACC
897,190 UART: [kat] ECC-384
902,577 UART: [kat] HMAC-384Kdf
906,999 UART: [kat] LMS
1,475,195 UART: [kat] --
1,475,894 UART: [cold-reset] ++
1,476,226 UART: [fht] Storing FHT @ 0x50003400
1,478,885 UART: [idev] ++
1,479,053 UART: [idev] CDI.KEYID = 6
1,479,413 UART: [idev] SUBJECT.KEYID = 7
1,479,837 UART: [idev] UDS.KEYID = 0
1,480,182 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,009 UART: [idev] Erasing UDS.KEYID = 0
1,504,477 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,101 UART: [idev] --
1,514,164 UART: [ldev] ++
1,514,332 UART: [ldev] CDI.KEYID = 6
1,514,695 UART: [ldev] SUBJECT.KEYID = 5
1,515,121 UART: [ldev] AUTHORITY.KEYID = 7
1,515,584 UART: [ldev] FE.KEYID = 1
1,520,966 UART: [ldev] Erasing FE.KEYID = 1
1,546,259 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,417 UART: [ldev] --
1,585,714 UART: [fwproc] Waiting for Commands...
1,586,525 UART: [fwproc] Received command 0x46574c44
1,587,316 UART: [fwproc] Received Image of size 118548 bytes
1,634,855 UART: ROM Fatal Error: 0x000B0034
1,636,012 >>> mbox cmd response: failed
1,636,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,018 >>> mbox cmd response: failed
1,636,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,943 UART: [state] LifecycleState = Unprovisioned
85,598 UART: [state] DebugLocked = No
86,264 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,974 UART: [kat] SHA2-256
881,905 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,020 UART: [kat] ++
886,172 UART: [kat] sha1
890,478 UART: [kat] SHA2-256
892,416 UART: [kat] SHA2-384
895,397 UART: [kat] SHA2-512-ACC
897,298 UART: [kat] ECC-384
902,937 UART: [kat] HMAC-384Kdf
907,589 UART: [kat] LMS
1,475,785 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,298 UART: [fht] Storing FHT @ 0x50003400
1,479,891 UART: [idev] ++
1,480,059 UART: [idev] CDI.KEYID = 6
1,480,419 UART: [idev] SUBJECT.KEYID = 7
1,480,843 UART: [idev] UDS.KEYID = 0
1,481,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,835 UART: [idev] Erasing UDS.KEYID = 0
1,505,673 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,115 UART: [idev] --
1,515,146 UART: [ldev] ++
1,515,314 UART: [ldev] CDI.KEYID = 6
1,515,677 UART: [ldev] SUBJECT.KEYID = 5
1,516,103 UART: [ldev] AUTHORITY.KEYID = 7
1,516,566 UART: [ldev] FE.KEYID = 1
1,521,830 UART: [ldev] Erasing FE.KEYID = 1
1,547,589 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,767 UART: [ldev] --
1,587,268 UART: [fwproc] Waiting for Commands...
1,587,895 UART: [fwproc] Received command 0x46574c44
1,588,686 UART: [fwproc] Received Image of size 118548 bytes
2,932,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,361 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,579 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,862 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,481 >>> mbox cmd response: failed
1,490,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,487 >>> mbox cmd response: failed
1,490,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,490,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,270 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,174 UART: [state] LifecycleState = Unprovisioned
85,829 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,702 UART: [kat] SHA2-256
891,252 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,356 UART: [kat] ++
895,508 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,715 UART: [kat] SHA2-512-ACC
906,616 UART: [kat] ECC-384
916,199 UART: [kat] HMAC-384Kdf
920,837 UART: [kat] LMS
1,169,149 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,472 UART: [fht] FHT @ 0x50003400
1,173,076 UART: [idev] ++
1,173,244 UART: [idev] CDI.KEYID = 6
1,173,605 UART: [idev] SUBJECT.KEYID = 7
1,174,030 UART: [idev] UDS.KEYID = 0
1,174,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,135 UART: [idev] Erasing UDS.KEYID = 0
1,199,127 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,566 UART: [ldev] Erasing FE.KEYID = 1
1,241,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,634 UART: [ldev] --
1,280,843 UART: [fwproc] Wait for Commands...
1,281,574 UART: [fwproc] Recv command 0x46574c44
1,282,307 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,060 UART: ROM Fatal Error: 0x000B0034
1,330,217 >>> mbox cmd response: failed
1,330,217 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,223 >>> mbox cmd response: failed
1,330,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,229 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,134 UART: [state] LifecycleState = Unprovisioned
85,789 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,530 UART: [kat] SHA2-256
891,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,184 UART: [kat] ++
895,336 UART: [kat] sha1
899,684 UART: [kat] SHA2-256
901,624 UART: [kat] SHA2-384
904,595 UART: [kat] SHA2-512-ACC
906,496 UART: [kat] ECC-384
916,041 UART: [kat] HMAC-384Kdf
920,619 UART: [kat] LMS
1,168,931 UART: [kat] --
1,169,640 UART: [cold-reset] ++
1,169,988 UART: [fht] FHT @ 0x50003400
1,172,652 UART: [idev] ++
1,172,820 UART: [idev] CDI.KEYID = 6
1,173,181 UART: [idev] SUBJECT.KEYID = 7
1,173,606 UART: [idev] UDS.KEYID = 0
1,173,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,703 UART: [idev] Erasing UDS.KEYID = 0
1,198,501 UART: [idev] Sha1 KeyId Algorithm
1,207,527 UART: [idev] --
1,208,760 UART: [ldev] ++
1,208,928 UART: [ldev] CDI.KEYID = 6
1,209,292 UART: [ldev] SUBJECT.KEYID = 5
1,209,719 UART: [ldev] AUTHORITY.KEYID = 7
1,210,182 UART: [ldev] FE.KEYID = 1
1,215,358 UART: [ldev] Erasing FE.KEYID = 1
1,242,139 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,445 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,050 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,026 UART: [ldev] --
1,281,377 UART: [fwproc] Wait for Commands...
1,281,952 UART: [fwproc] Recv command 0x46574c44
1,282,685 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,708 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,142 >>> mbox cmd response: failed
1,184,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,148 >>> mbox cmd response: failed
1,184,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,154 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,149 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,013 UART: [state] LifecycleState = Unprovisioned
85,668 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,517 UART: [kat] SHA2-256
891,067 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,171 UART: [kat] ++
895,323 UART: [kat] sha1
899,609 UART: [kat] SHA2-256
901,549 UART: [kat] SHA2-384
904,304 UART: [kat] SHA2-512-ACC
906,205 UART: [kat] ECC-384
916,184 UART: [kat] HMAC-384Kdf
920,802 UART: [kat] LMS
1,169,114 UART: [kat] --
1,170,009 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,085 UART: [idev] ++
1,173,253 UART: [idev] CDI.KEYID = 6
1,173,614 UART: [idev] SUBJECT.KEYID = 7
1,174,039 UART: [idev] UDS.KEYID = 0
1,174,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,794 UART: [idev] Erasing UDS.KEYID = 0
1,199,050 UART: [idev] Sha1 KeyId Algorithm
1,208,068 UART: [idev] --
1,209,131 UART: [ldev] ++
1,209,299 UART: [ldev] CDI.KEYID = 6
1,209,663 UART: [ldev] SUBJECT.KEYID = 5
1,210,090 UART: [ldev] AUTHORITY.KEYID = 7
1,210,553 UART: [ldev] FE.KEYID = 1
1,215,871 UART: [ldev] Erasing FE.KEYID = 1
1,242,044 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,752 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,213 UART: [ldev] --
1,281,616 UART: [fwproc] Wait for Commands...
1,282,285 UART: [fwproc] Recv command 0x46574c44
1,283,018 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,127 UART: ROM Fatal Error: 0x000B0034
1,331,284 >>> mbox cmd response: failed
1,331,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,290 >>> mbox cmd response: failed
1,331,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,219 UART: [state] LifecycleState = Unprovisioned
85,874 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,527 UART: [kat] SHA2-256
891,077 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,181 UART: [kat] ++
895,333 UART: [kat] sha1
899,329 UART: [kat] SHA2-256
901,269 UART: [kat] SHA2-384
904,140 UART: [kat] SHA2-512-ACC
906,041 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,870 UART: [kat] LMS
1,169,182 UART: [kat] --
1,170,189 UART: [cold-reset] ++
1,170,691 UART: [fht] FHT @ 0x50003400
1,173,325 UART: [idev] ++
1,173,493 UART: [idev] CDI.KEYID = 6
1,173,854 UART: [idev] SUBJECT.KEYID = 7
1,174,279 UART: [idev] UDS.KEYID = 0
1,174,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,228 UART: [idev] Erasing UDS.KEYID = 0
1,199,332 UART: [idev] Sha1 KeyId Algorithm
1,208,380 UART: [idev] --
1,209,463 UART: [ldev] ++
1,209,631 UART: [ldev] CDI.KEYID = 6
1,209,995 UART: [ldev] SUBJECT.KEYID = 5
1,210,422 UART: [ldev] AUTHORITY.KEYID = 7
1,210,885 UART: [ldev] FE.KEYID = 1
1,216,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,796 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,523 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,423 UART: [fwproc] Recv command 0x46574c44
1,283,156 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,184 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,544 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,837 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,189 >>> mbox cmd response: failed
1,186,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,195 >>> mbox cmd response: failed
1,186,195 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,201 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,132 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,383 UART: [state] WD Timer not started. Device not locked for debugging
87,548 UART: [kat] SHA2-256
893,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,323 UART: [kat] ++
897,475 UART: [kat] sha1
901,571 UART: [kat] SHA2-256
903,511 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
917,650 UART: [kat] HMAC-384Kdf
922,452 UART: [kat] LMS
1,170,780 UART: [kat] --
1,171,601 UART: [cold-reset] ++
1,172,035 UART: [fht] FHT @ 0x50003400
1,174,704 UART: [idev] ++
1,174,872 UART: [idev] CDI.KEYID = 6
1,175,232 UART: [idev] SUBJECT.KEYID = 7
1,175,656 UART: [idev] UDS.KEYID = 0
1,176,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,572 UART: [idev] Erasing UDS.KEYID = 0
1,201,165 UART: [idev] Sha1 KeyId Algorithm
1,209,603 UART: [idev] --
1,210,519 UART: [ldev] ++
1,210,687 UART: [ldev] CDI.KEYID = 6
1,211,050 UART: [ldev] SUBJECT.KEYID = 5
1,211,476 UART: [ldev] AUTHORITY.KEYID = 7
1,211,939 UART: [ldev] FE.KEYID = 1
1,217,091 UART: [ldev] Erasing FE.KEYID = 1
1,244,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,005 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,271 UART: [ldev] --
1,283,586 UART: [fwproc] Wait for Commands...
1,284,236 UART: [fwproc] Recv command 0x46574c44
1,284,964 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,871 UART: ROM Fatal Error: 0x000B0034
1,333,028 >>> mbox cmd response: failed
1,333,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,034 >>> mbox cmd response: failed
1,333,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,126 UART: [state] LifecycleState = Unprovisioned
85,781 UART: [state] DebugLocked = No
86,347 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,969 UART: [kat] SHA2-256
903,909 UART: [kat] SHA2-384
906,462 UART: [kat] SHA2-512-ACC
908,363 UART: [kat] ECC-384
917,998 UART: [kat] HMAC-384Kdf
922,502 UART: [kat] LMS
1,170,830 UART: [kat] --
1,171,837 UART: [cold-reset] ++
1,172,165 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,722 UART: [idev] Erasing UDS.KEYID = 0
1,200,197 UART: [idev] Sha1 KeyId Algorithm
1,208,575 UART: [idev] --
1,209,675 UART: [ldev] ++
1,209,843 UART: [ldev] CDI.KEYID = 6
1,210,206 UART: [ldev] SUBJECT.KEYID = 5
1,210,632 UART: [ldev] AUTHORITY.KEYID = 7
1,211,095 UART: [ldev] FE.KEYID = 1
1,216,005 UART: [ldev] Erasing FE.KEYID = 1
1,242,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,660 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,761 UART: [ldev] --
1,282,270 UART: [fwproc] Wait for Commands...
1,282,864 UART: [fwproc] Recv command 0x46574c44
1,283,592 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,447 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,617 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,862 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,735 >>> mbox cmd response: failed
1,186,735 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,741 >>> mbox cmd response: failed
1,186,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,747 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,073 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,272 UART: [kat] SHA2-256
904,212 UART: [kat] SHA2-384
906,855 UART: [kat] SHA2-512-ACC
908,756 UART: [kat] ECC-384
918,591 UART: [kat] HMAC-384Kdf
923,251 UART: [kat] LMS
1,171,579 UART: [kat] --
1,172,586 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,609 UART: [idev] ++
1,175,777 UART: [idev] CDI.KEYID = 6
1,176,137 UART: [idev] SUBJECT.KEYID = 7
1,176,561 UART: [idev] UDS.KEYID = 0
1,176,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,827 UART: [idev] Erasing UDS.KEYID = 0
1,201,848 UART: [idev] Sha1 KeyId Algorithm
1,210,364 UART: [idev] --
1,211,510 UART: [ldev] ++
1,211,678 UART: [ldev] CDI.KEYID = 6
1,212,041 UART: [ldev] SUBJECT.KEYID = 5
1,212,467 UART: [ldev] AUTHORITY.KEYID = 7
1,212,930 UART: [ldev] FE.KEYID = 1
1,218,306 UART: [ldev] Erasing FE.KEYID = 1
1,245,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,928 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,396 UART: [ldev] --
1,284,847 UART: [fwproc] Wait for Commands...
1,285,541 UART: [fwproc] Recv command 0x46574c44
1,286,269 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,812 UART: ROM Fatal Error: 0x000B0034
1,333,969 >>> mbox cmd response: failed
1,333,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,975 >>> mbox cmd response: failed
1,333,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,622 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
893,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,696 UART: [kat] ++
897,848 UART: [kat] sha1
902,158 UART: [kat] SHA2-256
904,098 UART: [kat] SHA2-384
906,889 UART: [kat] SHA2-512-ACC
908,790 UART: [kat] ECC-384
918,917 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,764 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,175,811 UART: [idev] ++
1,175,979 UART: [idev] CDI.KEYID = 6
1,176,339 UART: [idev] SUBJECT.KEYID = 7
1,176,763 UART: [idev] UDS.KEYID = 0
1,177,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,759 UART: [idev] Erasing UDS.KEYID = 0
1,201,758 UART: [idev] Sha1 KeyId Algorithm
1,210,246 UART: [idev] --
1,211,478 UART: [ldev] ++
1,211,646 UART: [ldev] CDI.KEYID = 6
1,212,009 UART: [ldev] SUBJECT.KEYID = 5
1,212,435 UART: [ldev] AUTHORITY.KEYID = 7
1,212,898 UART: [ldev] FE.KEYID = 1
1,218,040 UART: [ldev] Erasing FE.KEYID = 1
1,244,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,440 UART: [ldev] --
1,283,903 UART: [fwproc] Wait for Commands...
1,284,557 UART: [fwproc] Recv command 0x46574c44
1,285,285 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,851 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,270 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,440 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,815 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,774 >>> mbox cmd response: failed
1,186,774 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,780 >>> mbox cmd response: failed
1,186,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,786 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,970 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_load_addr_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,411 UART:
192,777 UART: Running Caliptra ROM ...
193,973 UART:
194,130 UART: [state] CFI Enabled
262,178 UART: [state] LifecycleState = Unprovisioned
264,164 UART: [state] DebugLocked = No
265,667 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,891 UART: [kat] SHA2-256
439,563 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,062 UART: [kat] ++
450,602 UART: [kat] sha1
461,914 UART: [kat] SHA2-256
464,608 UART: [kat] SHA2-384
471,105 UART: [kat] SHA2-512-ACC
473,495 UART: [kat] ECC-384
2,765,370 UART: [kat] HMAC-384Kdf
2,776,748 UART: [kat] LMS
3,967,050 UART: [kat] --
3,971,547 UART: [cold-reset] ++
3,972,889 UART: [fht] Storing FHT @ 0x50003400
3,983,453 UART: [idev] ++
3,984,024 UART: [idev] CDI.KEYID = 6
3,984,995 UART: [idev] SUBJECT.KEYID = 7
3,986,211 UART: [idev] UDS.KEYID = 0
3,989,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,138,838 UART: [idev] Erasing UDS.KEYID = 0
7,322,647 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,282 UART: [idev] --
7,348,315 UART: [ldev] ++
7,348,927 UART: [ldev] CDI.KEYID = 6
7,349,848 UART: [ldev] SUBJECT.KEYID = 5
7,351,073 UART: [ldev] AUTHORITY.KEYID = 7
7,352,313 UART: [ldev] FE.KEYID = 1
7,398,732 UART: [ldev] Erasing FE.KEYID = 1
10,733,757 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,991 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,478 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,015 UART: [ldev] --
13,111,911 UART: [fwproc] Waiting for Commands...
13,115,249 UART: [fwproc] Received command 0x46574c44
13,117,447 UART: [fwproc] Received Image of size 118548 bytes
15,820,343 UART: ROM Fatal Error: 0x000B0017
15,823,863 >>> mbox cmd response: failed
15,824,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,824,635 >>> mbox cmd response: failed
15,824,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,825,204 >>> mbox cmd response: failed
Initializing fuses
2,056,846 writing to cptra_bootfsm_go
2,246,198 UART:
2,246,546 UART: Running Caliptra ROM ...
2,247,683 UART:
2,247,848 UART: [state] CFI Enabled
2,313,226 UART: [state] LifecycleState = Unprovisioned
2,315,125 UART: [state] DebugLocked = No
2,316,675 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,822 UART: [kat] SHA2-256
2,490,518 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,027 UART: [kat] ++
2,501,586 UART: [kat] sha1
2,512,052 UART: [kat] SHA2-256
2,514,767 UART: [kat] SHA2-384
2,520,766 UART: [kat] SHA2-512-ACC
2,523,129 UART: [kat] ECC-384
4,813,391 UART: [kat] HMAC-384Kdf
4,844,164 UART: [kat] LMS
6,034,470 UART: [kat] --
6,038,223 UART: [cold-reset] ++
6,039,847 UART: [fht] Storing FHT @ 0x50003400
6,051,498 UART: [idev] ++
6,052,076 UART: [idev] CDI.KEYID = 6
6,052,993 UART: [idev] SUBJECT.KEYID = 7
6,054,274 UART: [idev] UDS.KEYID = 0
6,056,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,892 UART: [idev] Erasing UDS.KEYID = 0
9,392,207 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,705 UART: [idev] --
9,416,749 UART: [ldev] ++
9,417,327 UART: [ldev] CDI.KEYID = 6
9,418,291 UART: [ldev] SUBJECT.KEYID = 5
9,419,554 UART: [ldev] AUTHORITY.KEYID = 7
9,420,741 UART: [ldev] FE.KEYID = 1
9,467,216 UART: [ldev] Erasing FE.KEYID = 1
12,801,685 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,113,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,127,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,142,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,156,971 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,176,065 UART: [ldev] --
15,181,499 UART: [fwproc] Waiting for Commands...
15,184,683 UART: [fwproc] Received command 0x46574c44
15,186,879 UART: [fwproc] Received Image of size 118548 bytes
19,296,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,377,825 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,451,047 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,779,987 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,785,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,555,398 >>> mbox cmd response: failed
15,556,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,556,908 >>> mbox cmd response: failed
15,557,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,557,480 >>> mbox cmd response: failed
Initializing fuses
2,058,416 writing to cptra_bootfsm_go
5,856,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,032,007 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,729 UART:
193,084 UART: Running Caliptra ROM ...
194,297 UART:
603,756 UART: [state] CFI Enabled
617,226 UART: [state] LifecycleState = Unprovisioned
619,146 UART: [state] DebugLocked = No
621,446 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,883 UART: [kat] SHA2-256
795,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,150 UART: [kat] ++
806,689 UART: [kat] sha1
816,978 UART: [kat] SHA2-256
819,669 UART: [kat] SHA2-384
824,900 UART: [kat] SHA2-512-ACC
827,244 UART: [kat] ECC-384
3,110,060 UART: [kat] HMAC-384Kdf
3,121,887 UART: [kat] LMS
4,312,002 UART: [kat] --
4,318,304 UART: [cold-reset] ++
4,319,723 UART: [fht] Storing FHT @ 0x50003400
4,331,328 UART: [idev] ++
4,331,901 UART: [idev] CDI.KEYID = 6
4,332,872 UART: [idev] SUBJECT.KEYID = 7
4,334,096 UART: [idev] UDS.KEYID = 0
4,337,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,176 UART: [idev] Erasing UDS.KEYID = 0
7,620,387 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,965 UART: [idev] --
7,645,508 UART: [ldev] ++
7,646,082 UART: [ldev] CDI.KEYID = 6
7,647,059 UART: [ldev] SUBJECT.KEYID = 5
7,648,249 UART: [ldev] AUTHORITY.KEYID = 7
7,649,497 UART: [ldev] FE.KEYID = 1
7,661,669 UART: [ldev] Erasing FE.KEYID = 1
10,952,888 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,847 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,363 UART: [ldev] --
13,314,854 UART: [fwproc] Waiting for Commands...
13,316,535 UART: [fwproc] Received command 0x46574c44
13,318,728 UART: [fwproc] Received Image of size 118548 bytes
16,018,749 UART: ROM Fatal Error: 0x000B0017
16,022,273 >>> mbox cmd response: failed
16,022,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,109 >>> mbox cmd response: failed
16,023,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,707 >>> mbox cmd response: failed
Initializing fuses
2,057,786 writing to cptra_bootfsm_go
2,247,068 UART:
2,247,431 UART: Running Caliptra ROM ...
2,248,580 UART:
4,432,907 UART: [state] CFI Enabled
4,450,430 UART: [state] LifecycleState = Unprovisioned
4,452,389 UART: [state] DebugLocked = No
4,454,059 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,458,971 UART: [kat] SHA2-256
4,628,723 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,639,251 UART: [kat] ++
4,639,816 UART: [kat] sha1
4,651,480 UART: [kat] SHA2-256
4,654,187 UART: [kat] SHA2-384
4,659,206 UART: [kat] SHA2-512-ACC
4,661,560 UART: [kat] ECC-384
6,945,895 UART: [kat] HMAC-384Kdf
6,956,884 UART: [kat] LMS
8,146,965 UART: [kat] --
8,151,403 UART: [cold-reset] ++
8,153,283 UART: [fht] Storing FHT @ 0x50003400
8,164,565 UART: [idev] ++
8,165,137 UART: [idev] CDI.KEYID = 6
8,166,107 UART: [idev] SUBJECT.KEYID = 7
8,167,326 UART: [idev] UDS.KEYID = 0
8,169,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,318,774 UART: [idev] Erasing UDS.KEYID = 0
11,455,146 UART: [idev] Using Sha1 for KeyId Algorithm
11,477,618 UART: [idev] --
11,480,266 UART: [ldev] ++
11,480,837 UART: [ldev] CDI.KEYID = 6
11,481,785 UART: [ldev] SUBJECT.KEYID = 5
11,483,068 UART: [ldev] AUTHORITY.KEYID = 7
11,484,281 UART: [ldev] FE.KEYID = 1
11,496,309 UART: [ldev] Erasing FE.KEYID = 1
14,786,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,080,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,095,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,109,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,124,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,143,211 UART: [ldev] --
17,147,243 UART: [fwproc] Waiting for Commands...
17,149,730 UART: [fwproc] Received command 0x46574c44
17,151,953 UART: [fwproc] Received Image of size 118548 bytes
21,255,075 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,332,242 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,405,429 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,734,507 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
4,133,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,766,391 >>> mbox cmd response: failed
15,767,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,767,442 >>> mbox cmd response: failed
15,767,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,768,019 >>> mbox cmd response: failed
Initializing fuses
2,058,175 writing to cptra_bootfsm_go
8,232,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,262,194 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
192,498 UART:
192,864 UART: Running Caliptra ROM ...
194,089 UART:
194,253 UART: [state] CFI Enabled
263,283 UART: [state] LifecycleState = Unprovisioned
265,198 UART: [state] DebugLocked = No
267,394 UART: [state] WD Timer not started. Device not locked for debugging
271,846 UART: [kat] SHA2-256
451,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,285 UART: [kat] ++
462,822 UART: [kat] sha1
474,659 UART: [kat] SHA2-256
477,346 UART: [kat] SHA2-384
483,715 UART: [kat] SHA2-512-ACC
486,060 UART: [kat] ECC-384
2,946,707 UART: [kat] HMAC-384Kdf
2,969,911 UART: [kat] LMS
3,446,388 UART: [kat] --
3,450,177 UART: [cold-reset] ++
3,451,475 UART: [fht] FHT @ 0x50003400
3,463,915 UART: [idev] ++
3,464,488 UART: [idev] CDI.KEYID = 6
3,465,463 UART: [idev] SUBJECT.KEYID = 7
3,466,685 UART: [idev] UDS.KEYID = 0
3,469,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,590 UART: [idev] Erasing UDS.KEYID = 0
5,984,084 UART: [idev] Sha1 KeyId Algorithm
6,006,921 UART: [idev] --
6,011,774 UART: [ldev] ++
6,012,363 UART: [ldev] CDI.KEYID = 6
6,013,279 UART: [ldev] SUBJECT.KEYID = 5
6,014,501 UART: [ldev] AUTHORITY.KEYID = 7
6,015,745 UART: [ldev] FE.KEYID = 1
6,057,336 UART: [ldev] Erasing FE.KEYID = 1
8,565,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,917 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,495 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,487 UART: [ldev] --
10,373,675 UART: [fwproc] Wait for Commands...
10,375,998 UART: [fwproc] Recv command 0x46574c44
10,377,992 UART: [fwproc] Recv'd Img size: 118548 bytes
12,450,628 UART: ROM Fatal Error: 0x000B0017
12,453,894 >>> mbox cmd response: failed
12,454,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,663 >>> mbox cmd response: failed
12,454,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,237 >>> mbox cmd response: failed
Initializing fuses
2,064,577 writing to cptra_bootfsm_go
2,253,881 UART:
2,254,223 UART: Running Caliptra ROM ...
2,255,274 UART:
2,255,450 UART: [state] CFI Enabled
2,311,970 UART: [state] LifecycleState = Unprovisioned
2,313,875 UART: [state] DebugLocked = No
2,316,154 UART: [state] WD Timer not started. Device not locked for debugging
2,320,068 UART: [kat] SHA2-256
2,499,683 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,466 UART: [kat] ++
2,510,934 UART: [kat] sha1
2,522,201 UART: [kat] SHA2-256
2,524,899 UART: [kat] SHA2-384
2,530,571 UART: [kat] SHA2-512-ACC
2,532,934 UART: [kat] ECC-384
4,996,966 UART: [kat] HMAC-384Kdf
5,019,131 UART: [kat] LMS
5,495,617 UART: [kat] --
5,501,829 UART: [cold-reset] ++
5,502,819 UART: [fht] FHT @ 0x50003400
5,513,533 UART: [idev] ++
5,514,102 UART: [idev] CDI.KEYID = 6
5,515,046 UART: [idev] SUBJECT.KEYID = 7
5,516,268 UART: [idev] UDS.KEYID = 0
5,518,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,208 UART: [idev] Erasing UDS.KEYID = 0
8,032,159 UART: [idev] Sha1 KeyId Algorithm
8,056,740 UART: [idev] --
8,061,770 UART: [ldev] ++
8,062,348 UART: [ldev] CDI.KEYID = 6
8,063,297 UART: [ldev] SUBJECT.KEYID = 5
8,064,512 UART: [ldev] AUTHORITY.KEYID = 7
8,065,755 UART: [ldev] FE.KEYID = 1
8,105,792 UART: [ldev] Erasing FE.KEYID = 1
10,612,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,601 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,299 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,395,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,313 UART: [ldev] --
12,422,568 UART: [fwproc] Wait for Commands...
12,425,869 UART: [fwproc] Recv command 0x46574c44
12,427,872 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,608 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,664 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,391,333 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,154 writing to cptra_bootfsm_go
3,465,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,321,904 >>> mbox cmd response: failed
12,322,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,322,899 >>> mbox cmd response: failed
12,323,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,323,479 >>> mbox cmd response: failed
Initializing fuses
2,062,732 writing to cptra_bootfsm_go
5,517,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,282,865 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,499 writing to cptra_bootfsm_go
192,766 UART:
193,120 UART: Running Caliptra ROM ...
194,331 UART:
603,979 UART: [state] CFI Enabled
616,514 UART: [state] LifecycleState = Unprovisioned
618,423 UART: [state] DebugLocked = No
620,752 UART: [state] WD Timer not started. Device not locked for debugging
623,878 UART: [kat] SHA2-256
803,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,322 UART: [kat] ++
814,856 UART: [kat] sha1
825,800 UART: [kat] SHA2-256
828,485 UART: [kat] SHA2-384
835,599 UART: [kat] SHA2-512-ACC
838,006 UART: [kat] ECC-384
3,280,295 UART: [kat] HMAC-384Kdf
3,292,433 UART: [kat] LMS
3,768,908 UART: [kat] --
3,773,334 UART: [cold-reset] ++
3,774,620 UART: [fht] FHT @ 0x50003400
3,785,296 UART: [idev] ++
3,785,864 UART: [idev] CDI.KEYID = 6
3,786,824 UART: [idev] SUBJECT.KEYID = 7
3,788,098 UART: [idev] UDS.KEYID = 0
3,790,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,891 UART: [idev] Erasing UDS.KEYID = 0
6,263,516 UART: [idev] Sha1 KeyId Algorithm
6,287,570 UART: [idev] --
6,293,137 UART: [ldev] ++
6,293,745 UART: [ldev] CDI.KEYID = 6
6,294,678 UART: [ldev] SUBJECT.KEYID = 5
6,295,841 UART: [ldev] AUTHORITY.KEYID = 7
6,297,076 UART: [ldev] FE.KEYID = 1
6,308,861 UART: [ldev] Erasing FE.KEYID = 1
8,785,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,106 UART: [ldev] --
10,584,208 UART: [fwproc] Wait for Commands...
10,586,746 UART: [fwproc] Recv command 0x46574c44
10,588,736 UART: [fwproc] Recv'd Img size: 118548 bytes
12,658,592 UART: ROM Fatal Error: 0x000B0017
12,661,826 >>> mbox cmd response: failed
12,662,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,662,567 >>> mbox cmd response: failed
12,662,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,128 >>> mbox cmd response: failed
Initializing fuses
2,062,794 writing to cptra_bootfsm_go
2,252,116 UART:
2,252,485 UART: Running Caliptra ROM ...
2,253,626 UART:
7,789,649 UART: [state] CFI Enabled
7,805,060 UART: [state] LifecycleState = Unprovisioned
7,806,985 UART: [state] DebugLocked = No
7,809,652 UART: [state] WD Timer not started. Device not locked for debugging
7,813,835 UART: [kat] SHA2-256
7,993,476 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,004,279 UART: [kat] ++
8,004,762 UART: [kat] sha1
8,015,175 UART: [kat] SHA2-256
8,017,881 UART: [kat] SHA2-384
8,023,607 UART: [kat] SHA2-512-ACC
8,026,131 UART: [kat] ECC-384
10,468,744 UART: [kat] HMAC-384Kdf
10,481,998 UART: [kat] LMS
10,958,469 UART: [kat] --
10,961,440 UART: [cold-reset] ++
10,963,703 UART: [fht] FHT @ 0x50003400
10,974,468 UART: [idev] ++
10,975,090 UART: [idev] CDI.KEYID = 6
10,976,009 UART: [idev] SUBJECT.KEYID = 7
10,977,285 UART: [idev] UDS.KEYID = 0
10,979,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,128,637 UART: [idev] Erasing UDS.KEYID = 0
13,453,963 UART: [idev] Sha1 KeyId Algorithm
13,478,042 UART: [idev] --
13,481,475 UART: [ldev] ++
13,482,058 UART: [ldev] CDI.KEYID = 6
13,482,950 UART: [ldev] SUBJECT.KEYID = 5
13,484,235 UART: [ldev] AUTHORITY.KEYID = 7
13,485,478 UART: [ldev] FE.KEYID = 1
13,496,420 UART: [ldev] Erasing FE.KEYID = 1
15,974,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,712,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,728,039 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,743,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,764,352 UART: [ldev] --
17,770,544 UART: [fwproc] Wait for Commands...
17,773,671 UART: [fwproc] Recv command 0x46574c44
17,775,659 UART: [fwproc] Recv'd Img size: 118548 bytes
21,256,132 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,337,729 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,410,746 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,739,723 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
3,781,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,546,772 >>> mbox cmd response: failed
12,547,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,547,853 >>> mbox cmd response: failed
12,548,129 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,548,418 >>> mbox cmd response: failed
Initializing fuses
2,062,908 writing to cptra_bootfsm_go
11,091,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,745,897 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
192,140 UART:
192,510 UART: Running Caliptra ROM ...
193,923 UART:
194,087 UART: [state] CFI Enabled
261,420 UART: [state] LifecycleState = Unprovisioned
263,803 UART: [state] DebugLocked = No
266,751 UART: [state] WD Timer not started. Device not locked for debugging
271,283 UART: [kat] SHA2-256
461,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,948 UART: [kat] ++
472,403 UART: [kat] sha1
482,801 UART: [kat] SHA2-256
485,825 UART: [kat] SHA2-384
491,379 UART: [kat] SHA2-512-ACC
493,998 UART: [kat] ECC-384
2,947,225 UART: [kat] HMAC-384Kdf
2,970,503 UART: [kat] LMS
3,502,295 UART: [kat] --
3,507,426 UART: [cold-reset] ++
3,508,394 UART: [fht] FHT @ 0x50003400
3,520,704 UART: [idev] ++
3,521,407 UART: [idev] CDI.KEYID = 6
3,522,356 UART: [idev] SUBJECT.KEYID = 7
3,523,576 UART: [idev] UDS.KEYID = 0
3,526,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,196 UART: [idev] Erasing UDS.KEYID = 0
6,025,229 UART: [idev] Sha1 KeyId Algorithm
6,046,928 UART: [idev] --
6,051,607 UART: [ldev] ++
6,052,309 UART: [ldev] CDI.KEYID = 6
6,053,242 UART: [ldev] SUBJECT.KEYID = 5
6,054,411 UART: [ldev] AUTHORITY.KEYID = 7
6,055,651 UART: [ldev] FE.KEYID = 1
6,097,195 UART: [ldev] Erasing FE.KEYID = 1
8,601,398 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,062 UART: [ldev] --
10,411,474 UART: [fwproc] Wait for Commands...
10,413,689 UART: [fwproc] Recv command 0x46574c44
10,416,012 UART: [fwproc] Recv'd Img size: 118548 bytes
12,494,211 UART: ROM Fatal Error: 0x000B0017
12,497,826 >>> mbox cmd response: failed
12,498,224 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,498,561 >>> mbox cmd response: failed
12,498,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,499,138 >>> mbox cmd response: failed
Initializing fuses
2,061,207 writing to cptra_bootfsm_go
2,250,545 UART:
2,250,889 UART: Running Caliptra ROM ...
2,252,032 UART:
2,252,210 UART: [state] CFI Enabled
2,309,973 UART: [state] LifecycleState = Unprovisioned
2,312,347 UART: [state] DebugLocked = No
2,314,886 UART: [state] WD Timer not started. Device not locked for debugging
2,319,619 UART: [kat] SHA2-256
2,509,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,520,243 UART: [kat] ++
2,520,795 UART: [kat] sha1
2,531,535 UART: [kat] SHA2-256
2,534,566 UART: [kat] SHA2-384
2,540,836 UART: [kat] SHA2-512-ACC
2,543,411 UART: [kat] ECC-384
4,992,913 UART: [kat] HMAC-384Kdf
5,016,406 UART: [kat] LMS
5,548,195 UART: [kat] --
5,552,190 UART: [cold-reset] ++
5,554,405 UART: [fht] FHT @ 0x50003400
5,566,041 UART: [idev] ++
5,566,729 UART: [idev] CDI.KEYID = 6
5,567,750 UART: [idev] SUBJECT.KEYID = 7
5,568,916 UART: [idev] UDS.KEYID = 0
5,571,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,720,772 UART: [idev] Erasing UDS.KEYID = 0
8,076,972 UART: [idev] Sha1 KeyId Algorithm
8,099,226 UART: [idev] --
8,104,230 UART: [ldev] ++
8,104,923 UART: [ldev] CDI.KEYID = 6
8,105,813 UART: [ldev] SUBJECT.KEYID = 5
8,107,032 UART: [ldev] AUTHORITY.KEYID = 7
8,108,237 UART: [ldev] FE.KEYID = 1
8,144,145 UART: [ldev] Erasing FE.KEYID = 1
10,649,087 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,384,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,602 UART: [ldev] --
12,457,634 UART: [fwproc] Wait for Commands...
12,460,225 UART: [fwproc] Recv command 0x46574c44
12,462,492 UART: [fwproc] Recv'd Img size: 118548 bytes
15,964,149 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,041,302 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,164,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,724,458 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,002 writing to cptra_bootfsm_go
3,418,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,300,856 >>> mbox cmd response: failed
12,301,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,756 >>> mbox cmd response: failed
12,302,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,302,331 >>> mbox cmd response: failed
Initializing fuses
2,069,766 writing to cptra_bootfsm_go
5,472,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,842,688 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,348 writing to cptra_bootfsm_go
192,521 UART:
192,877 UART: Running Caliptra ROM ...
193,989 UART:
603,806 UART: [state] CFI Enabled
620,095 UART: [state] LifecycleState = Unprovisioned
622,479 UART: [state] DebugLocked = No
624,161 UART: [state] WD Timer not started. Device not locked for debugging
628,931 UART: [kat] SHA2-256
818,772 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,559 UART: [kat] ++
830,070 UART: [kat] sha1
841,985 UART: [kat] SHA2-256
844,998 UART: [kat] SHA2-384
851,047 UART: [kat] SHA2-512-ACC
853,619 UART: [kat] ECC-384
3,298,507 UART: [kat] HMAC-384Kdf
3,311,374 UART: [kat] LMS
3,843,230 UART: [kat] --
3,849,349 UART: [cold-reset] ++
3,851,238 UART: [fht] FHT @ 0x50003400
3,862,823 UART: [idev] ++
3,863,506 UART: [idev] CDI.KEYID = 6
3,864,530 UART: [idev] SUBJECT.KEYID = 7
3,865,641 UART: [idev] UDS.KEYID = 0
3,868,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,798 UART: [idev] Erasing UDS.KEYID = 0
6,345,105 UART: [idev] Sha1 KeyId Algorithm
6,369,212 UART: [idev] --
6,375,293 UART: [ldev] ++
6,375,990 UART: [ldev] CDI.KEYID = 6
6,376,928 UART: [ldev] SUBJECT.KEYID = 5
6,378,097 UART: [ldev] AUTHORITY.KEYID = 7
6,379,281 UART: [ldev] FE.KEYID = 1
6,391,939 UART: [ldev] Erasing FE.KEYID = 1
8,873,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,592,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,607,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,622,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,637,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,657,831 UART: [ldev] --
10,664,075 UART: [fwproc] Wait for Commands...
10,666,883 UART: [fwproc] Recv command 0x46574c44
10,669,207 UART: [fwproc] Recv'd Img size: 118548 bytes
12,755,922 UART: ROM Fatal Error: 0x000B0017
12,759,550 >>> mbox cmd response: failed
12,759,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,760,196 >>> mbox cmd response: failed
12,760,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,760,896 >>> mbox cmd response: failed
Initializing fuses
2,061,173 writing to cptra_bootfsm_go
2,250,525 UART:
2,250,874 UART: Running Caliptra ROM ...
2,252,016 UART:
7,690,227 UART: [state] CFI Enabled
7,702,709 UART: [state] LifecycleState = Unprovisioned
7,705,063 UART: [state] DebugLocked = No
7,706,485 UART: [state] WD Timer not started. Device not locked for debugging
7,711,060 UART: [kat] SHA2-256
7,900,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,911,723 UART: [kat] ++
7,912,244 UART: [kat] sha1
7,922,760 UART: [kat] SHA2-256
7,925,840 UART: [kat] SHA2-384
7,930,847 UART: [kat] SHA2-512-ACC
7,933,429 UART: [kat] ECC-384
10,376,370 UART: [kat] HMAC-384Kdf
10,388,122 UART: [kat] LMS
10,919,902 UART: [kat] --
10,923,849 UART: [cold-reset] ++
10,924,756 UART: [fht] FHT @ 0x50003400
10,936,441 UART: [idev] ++
10,937,123 UART: [idev] CDI.KEYID = 6
10,938,142 UART: [idev] SUBJECT.KEYID = 7
10,939,315 UART: [idev] UDS.KEYID = 0
10,941,574 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,090,933 UART: [idev] Erasing UDS.KEYID = 0
13,413,595 UART: [idev] Sha1 KeyId Algorithm
13,435,007 UART: [idev] --
13,439,972 UART: [ldev] ++
13,440,659 UART: [ldev] CDI.KEYID = 6
13,441,569 UART: [ldev] SUBJECT.KEYID = 5
13,442,788 UART: [ldev] AUTHORITY.KEYID = 7
13,443,965 UART: [ldev] FE.KEYID = 1
13,455,491 UART: [ldev] Erasing FE.KEYID = 1
15,934,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,655,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,670,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,685,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,700,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,721,550 UART: [ldev] --
17,727,847 UART: [fwproc] Wait for Commands...
17,729,317 UART: [fwproc] Recv command 0x46574c44
17,731,598 UART: [fwproc] Recv'd Img size: 118548 bytes
21,235,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,310,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,434,223 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,993,926 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,758,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,524,746 >>> mbox cmd response: failed
12,525,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,653 >>> mbox cmd response: failed
12,525,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,234 >>> mbox cmd response: failed
Initializing fuses
2,064,098 writing to cptra_bootfsm_go
11,093,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,381,497 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,406 UART: [state] LifecycleState = Unprovisioned
86,061 UART: [state] DebugLocked = No
86,603 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,097 UART: [kat] SHA2-256
882,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,143 UART: [kat] ++
886,295 UART: [kat] sha1
890,563 UART: [kat] SHA2-256
892,501 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,706 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,595 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,842 UART: [idev] ++
1,480,010 UART: [idev] CDI.KEYID = 6
1,480,370 UART: [idev] SUBJECT.KEYID = 7
1,480,794 UART: [idev] UDS.KEYID = 0
1,481,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,974 UART: [idev] Erasing UDS.KEYID = 0
1,505,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,155 UART: [ldev] ++
1,515,323 UART: [ldev] CDI.KEYID = 6
1,515,686 UART: [ldev] SUBJECT.KEYID = 5
1,516,112 UART: [ldev] AUTHORITY.KEYID = 7
1,516,575 UART: [ldev] FE.KEYID = 1
1,521,607 UART: [ldev] Erasing FE.KEYID = 1
1,547,254 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,022 UART: [ldev] --
1,586,337 UART: [fwproc] Waiting for Commands...
1,587,042 UART: [fwproc] Received command 0x46574c44
1,587,833 UART: [fwproc] Received Image of size 118548 bytes
1,635,016 UART: ROM Fatal Error: 0x000B0017
1,636,173 >>> mbox cmd response: failed
1,636,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,179 >>> mbox cmd response: failed
1,636,179 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,185 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Unprovisioned
86,063 UART: [state] DebugLocked = No
86,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,149 UART: [kat] SHA2-256
882,080 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,195 UART: [kat] ++
886,347 UART: [kat] sha1
890,765 UART: [kat] SHA2-256
892,703 UART: [kat] SHA2-384
895,288 UART: [kat] SHA2-512-ACC
897,189 UART: [kat] ECC-384
902,886 UART: [kat] HMAC-384Kdf
907,564 UART: [kat] LMS
1,475,760 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,989 UART: [fht] Storing FHT @ 0x50003400
1,479,668 UART: [idev] ++
1,479,836 UART: [idev] CDI.KEYID = 6
1,480,196 UART: [idev] SUBJECT.KEYID = 7
1,480,620 UART: [idev] UDS.KEYID = 0
1,480,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,342 UART: [idev] Erasing UDS.KEYID = 0
1,504,670 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,298 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,521,127 UART: [ldev] Erasing FE.KEYID = 1
1,546,804 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,620 UART: [ldev] --
1,586,011 UART: [fwproc] Waiting for Commands...
1,586,682 UART: [fwproc] Received command 0x46574c44
1,587,473 UART: [fwproc] Received Image of size 118548 bytes
2,931,466 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,026 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,244 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,471 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,177 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,400 >>> mbox cmd response: failed
1,488,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,406 >>> mbox cmd response: failed
1,488,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,412 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,247 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,888 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,598 UART: [kat] SHA2-256
882,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,644 UART: [kat] ++
886,796 UART: [kat] sha1
890,980 UART: [kat] SHA2-256
892,918 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
902,967 UART: [kat] HMAC-384Kdf
907,705 UART: [kat] LMS
1,475,901 UART: [kat] --
1,476,704 UART: [cold-reset] ++
1,477,204 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,127 UART: [idev] Erasing UDS.KEYID = 0
1,506,009 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,643 UART: [idev] --
1,515,788 UART: [ldev] ++
1,515,956 UART: [ldev] CDI.KEYID = 6
1,516,319 UART: [ldev] SUBJECT.KEYID = 5
1,516,745 UART: [ldev] AUTHORITY.KEYID = 7
1,517,208 UART: [ldev] FE.KEYID = 1
1,522,454 UART: [ldev] Erasing FE.KEYID = 1
1,548,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,776 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,492 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,383 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,193 UART: [ldev] --
1,587,578 UART: [fwproc] Waiting for Commands...
1,588,233 UART: [fwproc] Received command 0x46574c44
1,589,024 UART: [fwproc] Received Image of size 118548 bytes
1,637,127 UART: ROM Fatal Error: 0x000B0017
1,638,284 >>> mbox cmd response: failed
1,638,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,290 >>> mbox cmd response: failed
1,638,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,527 UART: [state] LifecycleState = Unprovisioned
86,182 UART: [state] DebugLocked = No
86,730 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,692 UART: [kat] SHA2-256
892,630 UART: [kat] SHA2-384
895,421 UART: [kat] SHA2-512-ACC
897,322 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,601 UART: [kat] LMS
1,475,797 UART: [kat] --
1,476,694 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,877 UART: [idev] ++
1,480,045 UART: [idev] CDI.KEYID = 6
1,480,405 UART: [idev] SUBJECT.KEYID = 7
1,480,829 UART: [idev] UDS.KEYID = 0
1,481,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,027 UART: [idev] Erasing UDS.KEYID = 0
1,506,087 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,941 UART: [idev] --
1,515,908 UART: [ldev] ++
1,516,076 UART: [ldev] CDI.KEYID = 6
1,516,439 UART: [ldev] SUBJECT.KEYID = 5
1,516,865 UART: [ldev] AUTHORITY.KEYID = 7
1,517,328 UART: [ldev] FE.KEYID = 1
1,522,694 UART: [ldev] Erasing FE.KEYID = 1
1,547,913 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,139 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,919 UART: [ldev] --
1,587,366 UART: [fwproc] Waiting for Commands...
1,587,999 UART: [fwproc] Received command 0x46574c44
1,588,790 UART: [fwproc] Received Image of size 118548 bytes
2,933,347 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,841 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,059 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,348 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,257 >>> mbox cmd response: failed
1,489,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,263 >>> mbox cmd response: failed
1,489,263 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,269 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,264 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,718 UART: [state] LifecycleState = Unprovisioned
85,373 UART: [state] DebugLocked = No
85,961 UART: [state] WD Timer not started. Device not locked for debugging
87,152 UART: [kat] SHA2-256
890,702 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,806 UART: [kat] ++
894,958 UART: [kat] sha1
899,260 UART: [kat] SHA2-256
901,200 UART: [kat] SHA2-384
903,911 UART: [kat] SHA2-512-ACC
905,812 UART: [kat] ECC-384
915,469 UART: [kat] HMAC-384Kdf
920,065 UART: [kat] LMS
1,168,377 UART: [kat] --
1,169,394 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,957 UART: [idev] Erasing UDS.KEYID = 0
1,198,133 UART: [idev] Sha1 KeyId Algorithm
1,206,923 UART: [idev] --
1,207,830 UART: [ldev] ++
1,207,998 UART: [ldev] CDI.KEYID = 6
1,208,362 UART: [ldev] SUBJECT.KEYID = 5
1,208,789 UART: [ldev] AUTHORITY.KEYID = 7
1,209,252 UART: [ldev] FE.KEYID = 1
1,214,188 UART: [ldev] Erasing FE.KEYID = 1
1,239,663 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,536 UART: [ldev] --
1,278,801 UART: [fwproc] Wait for Commands...
1,279,550 UART: [fwproc] Recv command 0x46574c44
1,280,283 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,940 UART: ROM Fatal Error: 0x000B0017
1,329,097 >>> mbox cmd response: failed
1,329,097 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,103 >>> mbox cmd response: failed
1,329,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,109 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,622 UART: [kat] SHA2-256
891,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,276 UART: [kat] ++
895,428 UART: [kat] sha1
899,804 UART: [kat] SHA2-256
901,744 UART: [kat] SHA2-384
904,491 UART: [kat] SHA2-512-ACC
906,392 UART: [kat] ECC-384
916,401 UART: [kat] HMAC-384Kdf
921,067 UART: [kat] LMS
1,169,379 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,802 UART: [fht] FHT @ 0x50003400
1,173,420 UART: [idev] ++
1,173,588 UART: [idev] CDI.KEYID = 6
1,173,949 UART: [idev] SUBJECT.KEYID = 7
1,174,374 UART: [idev] UDS.KEYID = 0
1,174,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,259 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,501 UART: [idev] --
1,208,512 UART: [ldev] ++
1,208,680 UART: [ldev] CDI.KEYID = 6
1,209,044 UART: [ldev] SUBJECT.KEYID = 5
1,209,471 UART: [ldev] AUTHORITY.KEYID = 7
1,209,934 UART: [ldev] FE.KEYID = 1
1,215,084 UART: [ldev] Erasing FE.KEYID = 1
1,241,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,905 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,621 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,360 UART: [ldev] --
1,280,801 UART: [fwproc] Wait for Commands...
1,281,430 UART: [fwproc] Recv command 0x46574c44
1,282,163 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,456 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,874 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,424 >>> mbox cmd response: failed
1,184,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,430 >>> mbox cmd response: failed
1,184,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,529 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,696 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,009 UART: [kat] SHA2-256
901,949 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,034 UART: [kat] HMAC-384Kdf
920,686 UART: [kat] LMS
1,168,998 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,269 UART: [fht] FHT @ 0x50003400
1,172,791 UART: [idev] ++
1,172,959 UART: [idev] CDI.KEYID = 6
1,173,320 UART: [idev] SUBJECT.KEYID = 7
1,173,745 UART: [idev] UDS.KEYID = 0
1,174,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,832 UART: [idev] Erasing UDS.KEYID = 0
1,199,018 UART: [idev] Sha1 KeyId Algorithm
1,207,856 UART: [idev] --
1,208,825 UART: [ldev] ++
1,208,993 UART: [ldev] CDI.KEYID = 6
1,209,357 UART: [ldev] SUBJECT.KEYID = 5
1,209,784 UART: [ldev] AUTHORITY.KEYID = 7
1,210,247 UART: [ldev] FE.KEYID = 1
1,215,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,290 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,677 UART: [ldev] --
1,281,102 UART: [fwproc] Wait for Commands...
1,281,855 UART: [fwproc] Recv command 0x46574c44
1,282,588 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,835 UART: ROM Fatal Error: 0x000B0017
1,330,992 >>> mbox cmd response: failed
1,330,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,998 >>> mbox cmd response: failed
1,330,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,825 UART: [kat] ++
895,977 UART: [kat] sha1
900,361 UART: [kat] SHA2-256
902,301 UART: [kat] SHA2-384
905,010 UART: [kat] SHA2-512-ACC
906,911 UART: [kat] ECC-384
916,548 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,505 UART: [cold-reset] ++
1,170,989 UART: [fht] FHT @ 0x50003400
1,173,695 UART: [idev] ++
1,173,863 UART: [idev] CDI.KEYID = 6
1,174,224 UART: [idev] SUBJECT.KEYID = 7
1,174,649 UART: [idev] UDS.KEYID = 0
1,174,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,156 UART: [idev] Erasing UDS.KEYID = 0
1,199,872 UART: [idev] Sha1 KeyId Algorithm
1,208,930 UART: [idev] --
1,209,827 UART: [ldev] ++
1,209,995 UART: [ldev] CDI.KEYID = 6
1,210,359 UART: [ldev] SUBJECT.KEYID = 5
1,210,786 UART: [ldev] AUTHORITY.KEYID = 7
1,211,249 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,244,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,739 UART: [ldev] --
1,283,082 UART: [fwproc] Wait for Commands...
1,283,753 UART: [fwproc] Recv command 0x46574c44
1,284,486 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,313 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,488 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,679 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,935 >>> mbox cmd response: failed
1,187,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,941 >>> mbox cmd response: failed
1,187,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,947 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,920 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,770 UART: [state] LifecycleState = Unprovisioned
85,425 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,435 UART: [kat] SHA2-256
903,375 UART: [kat] SHA2-384
905,904 UART: [kat] SHA2-512-ACC
907,805 UART: [kat] ECC-384
917,604 UART: [kat] HMAC-384Kdf
922,352 UART: [kat] LMS
1,170,680 UART: [kat] --
1,171,587 UART: [cold-reset] ++
1,172,037 UART: [fht] FHT @ 0x50003400
1,174,470 UART: [idev] ++
1,174,638 UART: [idev] CDI.KEYID = 6
1,174,998 UART: [idev] SUBJECT.KEYID = 7
1,175,422 UART: [idev] UDS.KEYID = 0
1,175,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,058 UART: [idev] Erasing UDS.KEYID = 0
1,199,941 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,613 UART: [ldev] ++
1,209,781 UART: [ldev] CDI.KEYID = 6
1,210,144 UART: [ldev] SUBJECT.KEYID = 5
1,210,570 UART: [ldev] AUTHORITY.KEYID = 7
1,211,033 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,006 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,911 UART: [ldev] --
1,281,176 UART: [fwproc] Wait for Commands...
1,281,982 UART: [fwproc] Recv command 0x46574c44
1,282,710 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,099 UART: ROM Fatal Error: 0x000B0017
1,331,256 >>> mbox cmd response: failed
1,331,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,262 >>> mbox cmd response: failed
1,331,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,732 UART: [state] LifecycleState = Unprovisioned
85,387 UART: [state] DebugLocked = No
85,963 UART: [state] WD Timer not started. Device not locked for debugging
87,182 UART: [kat] SHA2-256
892,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,957 UART: [kat] ++
897,109 UART: [kat] sha1
901,231 UART: [kat] SHA2-256
903,171 UART: [kat] SHA2-384
906,020 UART: [kat] SHA2-512-ACC
907,921 UART: [kat] ECC-384
917,556 UART: [kat] HMAC-384Kdf
921,986 UART: [kat] LMS
1,170,314 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,937 UART: [fht] FHT @ 0x50003400
1,174,640 UART: [idev] ++
1,174,808 UART: [idev] CDI.KEYID = 6
1,175,168 UART: [idev] SUBJECT.KEYID = 7
1,175,592 UART: [idev] UDS.KEYID = 0
1,175,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,634 UART: [idev] Erasing UDS.KEYID = 0
1,200,921 UART: [idev] Sha1 KeyId Algorithm
1,209,429 UART: [idev] --
1,210,337 UART: [ldev] ++
1,210,505 UART: [ldev] CDI.KEYID = 6
1,210,868 UART: [ldev] SUBJECT.KEYID = 5
1,211,294 UART: [ldev] AUTHORITY.KEYID = 7
1,211,757 UART: [ldev] FE.KEYID = 1
1,217,043 UART: [ldev] Erasing FE.KEYID = 1
1,243,628 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,589 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,978 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,309 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,522 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,383 >>> mbox cmd response: failed
1,188,383 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,389 >>> mbox cmd response: failed
1,188,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,395 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,549 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,523 UART: [state] LifecycleState = Unprovisioned
86,178 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,240 UART: [kat] SHA2-256
904,180 UART: [kat] SHA2-384
906,887 UART: [kat] SHA2-512-ACC
908,788 UART: [kat] ECC-384
918,953 UART: [kat] HMAC-384Kdf
923,413 UART: [kat] LMS
1,171,741 UART: [kat] --
1,172,566 UART: [cold-reset] ++
1,173,018 UART: [fht] FHT @ 0x50003400
1,175,741 UART: [idev] ++
1,175,909 UART: [idev] CDI.KEYID = 6
1,176,269 UART: [idev] SUBJECT.KEYID = 7
1,176,693 UART: [idev] UDS.KEYID = 0
1,177,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,581 UART: [idev] Erasing UDS.KEYID = 0
1,201,858 UART: [idev] Sha1 KeyId Algorithm
1,210,462 UART: [idev] --
1,211,388 UART: [ldev] ++
1,211,556 UART: [ldev] CDI.KEYID = 6
1,211,919 UART: [ldev] SUBJECT.KEYID = 5
1,212,345 UART: [ldev] AUTHORITY.KEYID = 7
1,212,808 UART: [ldev] FE.KEYID = 1
1,218,024 UART: [ldev] Erasing FE.KEYID = 1
1,245,233 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,540 UART: [ldev] --
1,284,979 UART: [fwproc] Wait for Commands...
1,285,769 UART: [fwproc] Recv command 0x46574c44
1,286,497 UART: [fwproc] Recv'd Img size: 118548 bytes
1,333,594 UART: ROM Fatal Error: 0x000B0017
1,334,751 >>> mbox cmd response: failed
1,334,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,757 >>> mbox cmd response: failed
1,334,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
893,605 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,730 UART: [kat] ++
897,882 UART: [kat] sha1
902,346 UART: [kat] SHA2-256
904,286 UART: [kat] SHA2-384
907,061 UART: [kat] SHA2-512-ACC
908,962 UART: [kat] ECC-384
919,097 UART: [kat] HMAC-384Kdf
923,703 UART: [kat] LMS
1,172,031 UART: [kat] --
1,172,984 UART: [cold-reset] ++
1,173,394 UART: [fht] FHT @ 0x50003400
1,176,177 UART: [idev] ++
1,176,345 UART: [idev] CDI.KEYID = 6
1,176,705 UART: [idev] SUBJECT.KEYID = 7
1,177,129 UART: [idev] UDS.KEYID = 0
1,177,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,163 UART: [idev] Erasing UDS.KEYID = 0
1,202,118 UART: [idev] Sha1 KeyId Algorithm
1,210,650 UART: [idev] --
1,211,880 UART: [ldev] ++
1,212,048 UART: [ldev] CDI.KEYID = 6
1,212,411 UART: [ldev] SUBJECT.KEYID = 5
1,212,837 UART: [ldev] AUTHORITY.KEYID = 7
1,213,300 UART: [ldev] FE.KEYID = 1
1,218,402 UART: [ldev] Erasing FE.KEYID = 1
1,244,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,262 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,978 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,869 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,581 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,656 UART: [ldev] --
1,284,101 UART: [fwproc] Wait for Commands...
1,284,919 UART: [fwproc] Recv command 0x46574c44
1,285,647 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,330 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,500 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,739 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,148 >>> mbox cmd response: failed
1,187,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,154 >>> mbox cmd response: failed
1,187,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,160 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_runtime_overlap ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,026 writing to cptra_bootfsm_go
192,150 UART:
192,503 UART: Running Caliptra ROM ...
193,598 UART:
193,743 UART: [state] CFI Enabled
261,898 UART: [state] LifecycleState = Unprovisioned
263,836 UART: [state] DebugLocked = No
265,964 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,557 UART: [kat] SHA2-256
440,256 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,749 UART: [kat] ++
451,193 UART: [kat] sha1
461,203 UART: [kat] SHA2-256
463,890 UART: [kat] SHA2-384
469,825 UART: [kat] SHA2-512-ACC
472,220 UART: [kat] ECC-384
2,764,693 UART: [kat] HMAC-384Kdf
2,777,766 UART: [kat] LMS
3,968,052 UART: [kat] --
3,973,213 UART: [cold-reset] ++
3,974,238 UART: [fht] Storing FHT @ 0x50003400
3,985,401 UART: [idev] ++
3,985,968 UART: [idev] CDI.KEYID = 6
3,986,921 UART: [idev] SUBJECT.KEYID = 7
3,988,138 UART: [idev] UDS.KEYID = 0
3,990,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,229 UART: [idev] Erasing UDS.KEYID = 0
7,316,402 UART: [idev] Using Sha1 for KeyId Algorithm
7,337,092 UART: [idev] --
7,341,845 UART: [ldev] ++
7,342,418 UART: [ldev] CDI.KEYID = 6
7,343,385 UART: [ldev] SUBJECT.KEYID = 5
7,344,597 UART: [ldev] AUTHORITY.KEYID = 7
7,345,835 UART: [ldev] FE.KEYID = 1
7,373,068 UART: [ldev] Erasing FE.KEYID = 1
10,703,483 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
12,999,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,013,717 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,028,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,043,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,061,571 UART: [ldev] --
13,066,525 UART: [fwproc] Waiting for Commands...
13,068,206 UART: [fwproc] Received command 0x46574c44
13,070,397 UART: [fwproc] Received Image of size 118548 bytes
15,778,251 UART: ROM Fatal Error: 0x000B003B
15,781,763 >>> mbox cmd response: failed
15,782,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,782,513 >>> mbox cmd response: failed
15,782,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,783,081 >>> mbox cmd response: failed
Initializing fuses
2,056,275 writing to cptra_bootfsm_go
2,245,577 UART:
2,245,984 UART: Running Caliptra ROM ...
2,247,087 UART:
2,247,250 UART: [state] CFI Enabled
2,305,293 UART: [state] LifecycleState = Unprovisioned
2,307,234 UART: [state] DebugLocked = No
2,309,389 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,620 UART: [kat] SHA2-256
2,484,328 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,830 UART: [kat] ++
2,495,379 UART: [kat] sha1
2,506,328 UART: [kat] SHA2-256
2,509,025 UART: [kat] SHA2-384
2,513,936 UART: [kat] SHA2-512-ACC
2,516,343 UART: [kat] ECC-384
4,810,126 UART: [kat] HMAC-384Kdf
4,842,587 UART: [kat] LMS
6,032,876 UART: [kat] --
6,039,388 UART: [cold-reset] ++
6,041,439 UART: [fht] Storing FHT @ 0x50003400
6,054,339 UART: [idev] ++
6,054,957 UART: [idev] CDI.KEYID = 6
6,055,890 UART: [idev] SUBJECT.KEYID = 7
6,057,114 UART: [idev] UDS.KEYID = 0
6,059,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,701 UART: [idev] Erasing UDS.KEYID = 0
9,387,451 UART: [idev] Using Sha1 for KeyId Algorithm
9,409,063 UART: [idev] --
9,412,588 UART: [ldev] ++
9,413,200 UART: [ldev] CDI.KEYID = 6
9,414,121 UART: [ldev] SUBJECT.KEYID = 5
9,415,419 UART: [ldev] AUTHORITY.KEYID = 7
9,416,608 UART: [ldev] FE.KEYID = 1
9,462,873 UART: [ldev] Erasing FE.KEYID = 1
12,801,207 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,109,184 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,123,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,138,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,153,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,172,407 UART: [ldev] --
15,177,440 UART: [fwproc] Waiting for Commands...
15,179,505 UART: [fwproc] Received command 0x46574c44
15,181,699 UART: [fwproc] Received Image of size 118548 bytes
19,285,718 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,362,243 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,435,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,763,173 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,787,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,544,285 >>> mbox cmd response: failed
15,544,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,545,282 >>> mbox cmd response: failed
15,545,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,545,854 >>> mbox cmd response: failed
Initializing fuses
2,056,460 writing to cptra_bootfsm_go
5,860,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,021,126 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,123 writing to cptra_bootfsm_go
193,455 UART:
193,817 UART: Running Caliptra ROM ...
194,925 UART:
604,662 UART: [state] CFI Enabled
619,833 UART: [state] LifecycleState = Unprovisioned
621,788 UART: [state] DebugLocked = No
624,197 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,366 UART: [kat] SHA2-256
798,103 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,688 UART: [kat] ++
809,174 UART: [kat] sha1
820,105 UART: [kat] SHA2-256
822,789 UART: [kat] SHA2-384
828,180 UART: [kat] SHA2-512-ACC
830,524 UART: [kat] ECC-384
3,114,108 UART: [kat] HMAC-384Kdf
3,125,705 UART: [kat] LMS
4,315,794 UART: [kat] --
4,321,469 UART: [cold-reset] ++
4,322,754 UART: [fht] Storing FHT @ 0x50003400
4,334,803 UART: [idev] ++
4,335,388 UART: [idev] CDI.KEYID = 6
4,336,414 UART: [idev] SUBJECT.KEYID = 7
4,337,581 UART: [idev] UDS.KEYID = 0
4,340,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,500 UART: [idev] Erasing UDS.KEYID = 0
7,628,363 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,232 UART: [idev] --
7,655,509 UART: [ldev] ++
7,656,090 UART: [ldev] CDI.KEYID = 6
7,657,120 UART: [ldev] SUBJECT.KEYID = 5
7,658,236 UART: [ldev] AUTHORITY.KEYID = 7
7,659,555 UART: [ldev] FE.KEYID = 1
7,671,402 UART: [ldev] Erasing FE.KEYID = 1
10,959,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,832 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,535 UART: [ldev] --
13,320,511 UART: [fwproc] Waiting for Commands...
13,322,775 UART: [fwproc] Received command 0x46574c44
13,324,970 UART: [fwproc] Received Image of size 118548 bytes
16,030,707 UART: ROM Fatal Error: 0x000B003B
16,034,191 >>> mbox cmd response: failed
16,034,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,991 >>> mbox cmd response: failed
16,035,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,035,603 >>> mbox cmd response: failed
Initializing fuses
2,057,991 writing to cptra_bootfsm_go
2,247,369 UART:
2,247,715 UART: Running Caliptra ROM ...
2,248,813 UART:
4,419,894 UART: [state] CFI Enabled
4,436,975 UART: [state] LifecycleState = Unprovisioned
4,438,947 UART: [state] DebugLocked = No
4,441,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,446,973 UART: [kat] SHA2-256
4,616,725 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,627,257 UART: [kat] ++
4,627,752 UART: [kat] sha1
4,638,666 UART: [kat] SHA2-256
4,641,374 UART: [kat] SHA2-384
4,646,832 UART: [kat] SHA2-512-ACC
4,649,193 UART: [kat] ECC-384
6,931,739 UART: [kat] HMAC-384Kdf
6,944,577 UART: [kat] LMS
8,134,712 UART: [kat] --
8,138,246 UART: [cold-reset] ++
8,139,654 UART: [fht] Storing FHT @ 0x50003400
8,151,900 UART: [idev] ++
8,152,471 UART: [idev] CDI.KEYID = 6
8,153,491 UART: [idev] SUBJECT.KEYID = 7
8,154,657 UART: [idev] UDS.KEYID = 0
8,157,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,306,048 UART: [idev] Erasing UDS.KEYID = 0
11,440,937 UART: [idev] Using Sha1 for KeyId Algorithm
11,461,948 UART: [idev] --
11,466,281 UART: [ldev] ++
11,466,861 UART: [ldev] CDI.KEYID = 6
11,467,832 UART: [ldev] SUBJECT.KEYID = 5
11,469,100 UART: [ldev] AUTHORITY.KEYID = 7
11,470,287 UART: [ldev] FE.KEYID = 1
11,482,617 UART: [ldev] Erasing FE.KEYID = 1
14,770,614 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,063,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,077,903 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,092,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,107,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,126,627 UART: [ldev] --
17,130,925 UART: [fwproc] Waiting for Commands...
17,132,545 UART: [fwproc] Received command 0x46574c44
17,134,741 UART: [fwproc] Received Image of size 118548 bytes
21,238,221 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,315,551 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,388,738 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,717,878 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,423 writing to cptra_bootfsm_go
4,134,720 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,773,059 >>> mbox cmd response: failed
15,773,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,774,072 >>> mbox cmd response: failed
15,774,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,774,641 >>> mbox cmd response: failed
Initializing fuses
2,058,165 writing to cptra_bootfsm_go
8,224,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,249,108 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
192,184 UART:
192,560 UART: Running Caliptra ROM ...
193,717 UART:
193,867 UART: [state] CFI Enabled
260,678 UART: [state] LifecycleState = Unprovisioned
262,597 UART: [state] DebugLocked = No
264,851 UART: [state] WD Timer not started. Device not locked for debugging
267,964 UART: [kat] SHA2-256
447,600 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,415 UART: [kat] ++
458,910 UART: [kat] sha1
470,387 UART: [kat] SHA2-256
473,080 UART: [kat] SHA2-384
478,964 UART: [kat] SHA2-512-ACC
481,308 UART: [kat] ECC-384
2,946,127 UART: [kat] HMAC-384Kdf
2,968,938 UART: [kat] LMS
3,445,413 UART: [kat] --
3,450,779 UART: [cold-reset] ++
3,452,606 UART: [fht] FHT @ 0x50003400
3,462,813 UART: [idev] ++
3,463,398 UART: [idev] CDI.KEYID = 6
3,464,351 UART: [idev] SUBJECT.KEYID = 7
3,465,622 UART: [idev] UDS.KEYID = 0
3,468,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,529 UART: [idev] Erasing UDS.KEYID = 0
5,984,626 UART: [idev] Sha1 KeyId Algorithm
6,008,951 UART: [idev] --
6,013,244 UART: [ldev] ++
6,013,862 UART: [ldev] CDI.KEYID = 6
6,014,792 UART: [ldev] SUBJECT.KEYID = 5
6,015,961 UART: [ldev] AUTHORITY.KEYID = 7
6,017,199 UART: [ldev] FE.KEYID = 1
6,057,015 UART: [ldev] Erasing FE.KEYID = 1
8,563,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,856 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,711 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,987 UART: [ldev] --
10,374,958 UART: [fwproc] Wait for Commands...
10,376,573 UART: [fwproc] Recv command 0x46574c44
10,378,570 UART: [fwproc] Recv'd Img size: 118548 bytes
12,446,638 UART: ROM Fatal Error: 0x000B003B
12,449,878 >>> mbox cmd response: failed
12,450,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,450,535 >>> mbox cmd response: failed
12,450,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,451,312 >>> mbox cmd response: failed
Initializing fuses
2,061,162 writing to cptra_bootfsm_go
2,250,458 UART:
2,250,798 UART: Running Caliptra ROM ...
2,251,851 UART:
2,252,011 UART: [state] CFI Enabled
2,320,296 UART: [state] LifecycleState = Unprovisioned
2,322,233 UART: [state] DebugLocked = No
2,325,004 UART: [state] WD Timer not started. Device not locked for debugging
2,328,704 UART: [kat] SHA2-256
2,508,392 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,147 UART: [kat] ++
2,519,638 UART: [kat] sha1
2,529,184 UART: [kat] SHA2-256
2,531,891 UART: [kat] SHA2-384
2,537,016 UART: [kat] SHA2-512-ACC
2,539,374 UART: [kat] ECC-384
4,999,445 UART: [kat] HMAC-384Kdf
5,021,935 UART: [kat] LMS
5,498,425 UART: [kat] --
5,504,232 UART: [cold-reset] ++
5,505,471 UART: [fht] FHT @ 0x50003400
5,517,101 UART: [idev] ++
5,517,675 UART: [idev] CDI.KEYID = 6
5,518,700 UART: [idev] SUBJECT.KEYID = 7
5,519,868 UART: [idev] UDS.KEYID = 0
5,522,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,624 UART: [idev] Erasing UDS.KEYID = 0
8,039,665 UART: [idev] Sha1 KeyId Algorithm
8,062,374 UART: [idev] --
8,067,084 UART: [ldev] ++
8,067,667 UART: [ldev] CDI.KEYID = 6
8,068,594 UART: [ldev] SUBJECT.KEYID = 5
8,069,843 UART: [ldev] AUTHORITY.KEYID = 7
8,071,085 UART: [ldev] FE.KEYID = 1
8,107,679 UART: [ldev] Erasing FE.KEYID = 1
10,612,002 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,335 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,595 UART: [ldev] --
12,423,543 UART: [fwproc] Wait for Commands...
12,425,319 UART: [fwproc] Recv command 0x46574c44
12,427,368 UART: [fwproc] Recv'd Img size: 118548 bytes
15,920,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,998,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,071,457 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,398,940 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
3,465,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,297,991 >>> mbox cmd response: failed
12,298,872 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,245 >>> mbox cmd response: failed
12,299,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,824 >>> mbox cmd response: failed
Initializing fuses
2,062,021 writing to cptra_bootfsm_go
5,516,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,301,316 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,592 UART:
192,970 UART: Running Caliptra ROM ...
194,078 UART:
603,602 UART: [state] CFI Enabled
618,076 UART: [state] LifecycleState = Unprovisioned
620,025 UART: [state] DebugLocked = No
621,328 UART: [state] WD Timer not started. Device not locked for debugging
625,640 UART: [kat] SHA2-256
805,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,079 UART: [kat] ++
816,562 UART: [kat] sha1
828,703 UART: [kat] SHA2-256
831,396 UART: [kat] SHA2-384
837,292 UART: [kat] SHA2-512-ACC
839,643 UART: [kat] ECC-384
3,279,896 UART: [kat] HMAC-384Kdf
3,293,282 UART: [kat] LMS
3,769,814 UART: [kat] --
3,771,977 UART: [cold-reset] ++
3,774,027 UART: [fht] FHT @ 0x50003400
3,785,122 UART: [idev] ++
3,785,728 UART: [idev] CDI.KEYID = 6
3,786,668 UART: [idev] SUBJECT.KEYID = 7
3,787,894 UART: [idev] UDS.KEYID = 0
3,790,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,293 UART: [idev] Erasing UDS.KEYID = 0
6,268,434 UART: [idev] Sha1 KeyId Algorithm
6,292,598 UART: [idev] --
6,297,410 UART: [ldev] ++
6,297,985 UART: [ldev] CDI.KEYID = 6
6,298,955 UART: [ldev] SUBJECT.KEYID = 5
6,300,117 UART: [ldev] AUTHORITY.KEYID = 7
6,301,407 UART: [ldev] FE.KEYID = 1
6,311,621 UART: [ldev] Erasing FE.KEYID = 1
8,791,167 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,314 UART: [ldev] --
10,586,184 UART: [fwproc] Wait for Commands...
10,588,064 UART: [fwproc] Recv command 0x46574c44
10,590,068 UART: [fwproc] Recv'd Img size: 118548 bytes
12,659,525 UART: ROM Fatal Error: 0x000B003B
12,662,752 >>> mbox cmd response: failed
12,663,203 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,663,546 >>> mbox cmd response: failed
12,663,822 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,119 >>> mbox cmd response: failed
Initializing fuses
2,059,140 writing to cptra_bootfsm_go
2,248,450 UART:
2,248,822 UART: Running Caliptra ROM ...
2,249,888 UART:
7,786,729 UART: [state] CFI Enabled
7,798,787 UART: [state] LifecycleState = Unprovisioned
7,800,712 UART: [state] DebugLocked = No
7,803,594 UART: [state] WD Timer not started. Device not locked for debugging
7,807,776 UART: [kat] SHA2-256
7,987,400 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,998,221 UART: [kat] ++
7,998,693 UART: [kat] sha1
8,009,951 UART: [kat] SHA2-256
8,012,663 UART: [kat] SHA2-384
8,018,880 UART: [kat] SHA2-512-ACC
8,021,241 UART: [kat] ECC-384
10,461,788 UART: [kat] HMAC-384Kdf
10,474,873 UART: [kat] LMS
10,951,412 UART: [kat] --
10,957,083 UART: [cold-reset] ++
10,958,662 UART: [fht] FHT @ 0x50003400
10,969,485 UART: [idev] ++
10,970,067 UART: [idev] CDI.KEYID = 6
10,971,094 UART: [idev] SUBJECT.KEYID = 7
10,972,261 UART: [idev] UDS.KEYID = 0
10,974,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,123,640 UART: [idev] Erasing UDS.KEYID = 0
13,446,951 UART: [idev] Sha1 KeyId Algorithm
13,469,918 UART: [idev] --
13,473,325 UART: [ldev] ++
13,473,896 UART: [ldev] CDI.KEYID = 6
13,474,784 UART: [ldev] SUBJECT.KEYID = 5
13,475,999 UART: [ldev] AUTHORITY.KEYID = 7
13,477,291 UART: [ldev] FE.KEYID = 1
13,488,365 UART: [ldev] Erasing FE.KEYID = 1
15,971,195 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,692,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,708,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,724,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,739,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,760,417 UART: [ldev] --
17,766,647 UART: [fwproc] Wait for Commands...
17,768,597 UART: [fwproc] Recv command 0x46574c44
17,770,597 UART: [fwproc] Recv'd Img size: 118548 bytes
21,258,266 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,339,136 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,412,146 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,739,844 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
3,780,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,543,601 >>> mbox cmd response: failed
12,544,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,544,520 >>> mbox cmd response: failed
12,544,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,545,082 >>> mbox cmd response: failed
Initializing fuses
2,060,227 writing to cptra_bootfsm_go
11,098,609 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,770,509 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,205 UART:
192,572 UART: Running Caliptra ROM ...
193,763 UART:
193,921 UART: [state] CFI Enabled
265,054 UART: [state] LifecycleState = Unprovisioned
267,483 UART: [state] DebugLocked = No
270,326 UART: [state] WD Timer not started. Device not locked for debugging
274,327 UART: [kat] SHA2-256
464,213 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,986 UART: [kat] ++
475,438 UART: [kat] sha1
486,969 UART: [kat] SHA2-256
489,997 UART: [kat] SHA2-384
496,791 UART: [kat] SHA2-512-ACC
499,405 UART: [kat] ECC-384
2,945,950 UART: [kat] HMAC-384Kdf
2,968,456 UART: [kat] LMS
3,500,256 UART: [kat] --
3,504,487 UART: [cold-reset] ++
3,506,216 UART: [fht] FHT @ 0x50003400
3,518,604 UART: [idev] ++
3,519,286 UART: [idev] CDI.KEYID = 6
3,520,308 UART: [idev] SUBJECT.KEYID = 7
3,521,474 UART: [idev] UDS.KEYID = 0
3,524,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,598 UART: [idev] Erasing UDS.KEYID = 0
6,026,131 UART: [idev] Sha1 KeyId Algorithm
6,049,288 UART: [idev] --
6,053,239 UART: [ldev] ++
6,053,938 UART: [ldev] CDI.KEYID = 6
6,054,862 UART: [ldev] SUBJECT.KEYID = 5
6,056,025 UART: [ldev] AUTHORITY.KEYID = 7
6,057,266 UART: [ldev] FE.KEYID = 1
6,097,743 UART: [ldev] Erasing FE.KEYID = 1
8,604,726 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,441 UART: [ldev] --
10,409,335 UART: [fwproc] Wait for Commands...
10,411,388 UART: [fwproc] Recv command 0x46574c44
10,413,708 UART: [fwproc] Recv'd Img size: 118548 bytes
12,496,344 UART: ROM Fatal Error: 0x000B003B
12,500,032 >>> mbox cmd response: failed
12,500,368 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,696 >>> mbox cmd response: failed
12,501,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,307 >>> mbox cmd response: failed
Initializing fuses
2,062,589 writing to cptra_bootfsm_go
2,251,927 UART:
2,252,299 UART: Running Caliptra ROM ...
2,253,402 UART:
2,253,567 UART: [state] CFI Enabled
2,320,261 UART: [state] LifecycleState = Unprovisioned
2,322,634 UART: [state] DebugLocked = No
2,324,953 UART: [state] WD Timer not started. Device not locked for debugging
2,330,021 UART: [kat] SHA2-256
2,519,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,688 UART: [kat] ++
2,531,182 UART: [kat] sha1
2,541,807 UART: [kat] SHA2-256
2,544,788 UART: [kat] SHA2-384
2,551,325 UART: [kat] SHA2-512-ACC
2,553,947 UART: [kat] ECC-384
5,003,187 UART: [kat] HMAC-384Kdf
5,027,379 UART: [kat] LMS
5,559,169 UART: [kat] --
5,562,621 UART: [cold-reset] ++
5,563,655 UART: [fht] FHT @ 0x50003400
5,574,808 UART: [idev] ++
5,575,491 UART: [idev] CDI.KEYID = 6
5,576,466 UART: [idev] SUBJECT.KEYID = 7
5,577,648 UART: [idev] UDS.KEYID = 0
5,580,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,500 UART: [idev] Erasing UDS.KEYID = 0
8,101,556 UART: [idev] Sha1 KeyId Algorithm
8,122,628 UART: [idev] --
8,127,652 UART: [ldev] ++
8,128,388 UART: [ldev] CDI.KEYID = 6
8,129,275 UART: [ldev] SUBJECT.KEYID = 5
8,130,379 UART: [ldev] AUTHORITY.KEYID = 7
8,131,669 UART: [ldev] FE.KEYID = 1
8,169,024 UART: [ldev] Erasing FE.KEYID = 1
10,678,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,411,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,426,583 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,441,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,456,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,478,205 UART: [ldev] --
12,484,290 UART: [fwproc] Wait for Commands...
12,487,530 UART: [fwproc] Recv command 0x46574c44
12,489,847 UART: [fwproc] Recv'd Img size: 118548 bytes
15,985,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,062,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,186,469 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,746,742 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
3,441,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,297,266 >>> mbox cmd response: failed
12,297,828 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,187 >>> mbox cmd response: failed
12,298,456 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,298,757 >>> mbox cmd response: failed
Initializing fuses
2,061,903 writing to cptra_bootfsm_go
5,499,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,883,448 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,181 writing to cptra_bootfsm_go
192,497 UART:
192,859 UART: Running Caliptra ROM ...
194,063 UART:
603,823 UART: [state] CFI Enabled
616,135 UART: [state] LifecycleState = Unprovisioned
618,540 UART: [state] DebugLocked = No
620,953 UART: [state] WD Timer not started. Device not locked for debugging
626,150 UART: [kat] SHA2-256
816,070 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,832 UART: [kat] ++
827,426 UART: [kat] sha1
837,884 UART: [kat] SHA2-256
840,900 UART: [kat] SHA2-384
845,966 UART: [kat] SHA2-512-ACC
848,526 UART: [kat] ECC-384
3,292,765 UART: [kat] HMAC-384Kdf
3,307,553 UART: [kat] LMS
3,839,372 UART: [kat] --
3,844,584 UART: [cold-reset] ++
3,845,552 UART: [fht] FHT @ 0x50003400
3,857,212 UART: [idev] ++
3,857,934 UART: [idev] CDI.KEYID = 6
3,858,880 UART: [idev] SUBJECT.KEYID = 7
3,860,045 UART: [idev] UDS.KEYID = 0
3,863,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,180 UART: [idev] Erasing UDS.KEYID = 0
6,332,328 UART: [idev] Sha1 KeyId Algorithm
6,354,008 UART: [idev] --
6,359,368 UART: [ldev] ++
6,360,055 UART: [ldev] CDI.KEYID = 6
6,360,975 UART: [ldev] SUBJECT.KEYID = 5
6,362,142 UART: [ldev] AUTHORITY.KEYID = 7
6,363,376 UART: [ldev] FE.KEYID = 1
6,375,431 UART: [ldev] Erasing FE.KEYID = 1
8,846,824 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,486 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,631,338 UART: [ldev] --
10,637,251 UART: [fwproc] Wait for Commands...
10,640,001 UART: [fwproc] Recv command 0x46574c44
10,642,280 UART: [fwproc] Recv'd Img size: 118548 bytes
12,722,331 UART: ROM Fatal Error: 0x000B003B
12,726,002 >>> mbox cmd response: failed
12,726,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,726,793 >>> mbox cmd response: failed
12,727,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,727,373 >>> mbox cmd response: failed
Initializing fuses
2,066,317 writing to cptra_bootfsm_go
2,255,629 UART:
2,255,988 UART: Running Caliptra ROM ...
2,257,071 UART:
7,725,300 UART: [state] CFI Enabled
7,741,516 UART: [state] LifecycleState = Unprovisioned
7,743,877 UART: [state] DebugLocked = No
7,746,733 UART: [state] WD Timer not started. Device not locked for debugging
7,752,016 UART: [kat] SHA2-256
7,941,933 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,952,697 UART: [kat] ++
7,953,306 UART: [kat] sha1
7,963,668 UART: [kat] SHA2-256
7,966,645 UART: [kat] SHA2-384
7,972,913 UART: [kat] SHA2-512-ACC
7,975,493 UART: [kat] ECC-384
10,418,411 UART: [kat] HMAC-384Kdf
10,431,186 UART: [kat] LMS
10,963,020 UART: [kat] --
10,967,391 UART: [cold-reset] ++
10,968,382 UART: [fht] FHT @ 0x50003400
10,978,887 UART: [idev] ++
10,979,619 UART: [idev] CDI.KEYID = 6
10,980,530 UART: [idev] SUBJECT.KEYID = 7
10,981,749 UART: [idev] UDS.KEYID = 0
10,984,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,133,362 UART: [idev] Erasing UDS.KEYID = 0
13,461,083 UART: [idev] Sha1 KeyId Algorithm
13,483,518 UART: [idev] --
13,489,192 UART: [ldev] ++
13,489,876 UART: [ldev] CDI.KEYID = 6
13,490,845 UART: [ldev] SUBJECT.KEYID = 5
13,492,025 UART: [ldev] AUTHORITY.KEYID = 7
13,493,210 UART: [ldev] FE.KEYID = 1
13,502,379 UART: [ldev] Erasing FE.KEYID = 1
15,981,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,700,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,731,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,746,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,767,736 UART: [ldev] --
17,772,826 UART: [fwproc] Wait for Commands...
17,775,481 UART: [fwproc] Recv command 0x46574c44
17,777,816 UART: [fwproc] Recv'd Img size: 118548 bytes
21,274,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,353,026 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,476,611 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,037,179 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,757,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,529,528 >>> mbox cmd response: failed
12,530,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,530,493 >>> mbox cmd response: failed
12,530,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,079 >>> mbox cmd response: failed
Initializing fuses
2,061,600 writing to cptra_bootfsm_go
11,094,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,379,475 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,722 UART: [state] LifecycleState = Unprovisioned
85,377 UART: [state] DebugLocked = No
85,949 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,471 UART: [kat] SHA2-256
881,402 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,517 UART: [kat] ++
885,669 UART: [kat] sha1
889,971 UART: [kat] SHA2-256
891,909 UART: [kat] SHA2-384
894,600 UART: [kat] SHA2-512-ACC
896,501 UART: [kat] ECC-384
902,260 UART: [kat] HMAC-384Kdf
906,750 UART: [kat] LMS
1,474,946 UART: [kat] --
1,475,935 UART: [cold-reset] ++
1,476,311 UART: [fht] Storing FHT @ 0x50003400
1,479,100 UART: [idev] ++
1,479,268 UART: [idev] CDI.KEYID = 6
1,479,628 UART: [idev] SUBJECT.KEYID = 7
1,480,052 UART: [idev] UDS.KEYID = 0
1,480,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,086 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,520 UART: [idev] --
1,514,589 UART: [ldev] ++
1,514,757 UART: [ldev] CDI.KEYID = 6
1,515,120 UART: [ldev] SUBJECT.KEYID = 5
1,515,546 UART: [ldev] AUTHORITY.KEYID = 7
1,516,009 UART: [ldev] FE.KEYID = 1
1,521,305 UART: [ldev] Erasing FE.KEYID = 1
1,546,814 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,514 UART: [ldev] --
1,585,935 UART: [fwproc] Waiting for Commands...
1,586,578 UART: [fwproc] Received command 0x46574c44
1,587,369 UART: [fwproc] Received Image of size 118548 bytes
1,634,542 UART: ROM Fatal Error: 0x000B003B
1,635,701 >>> mbox cmd response: failed
1,635,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,707 >>> mbox cmd response: failed
1,635,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,808 UART: [state] LifecycleState = Unprovisioned
85,463 UART: [state] DebugLocked = No
85,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,465 UART: [kat] SHA2-256
881,396 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,511 UART: [kat] ++
885,663 UART: [kat] sha1
890,133 UART: [kat] SHA2-256
892,071 UART: [kat] SHA2-384
894,954 UART: [kat] SHA2-512-ACC
896,855 UART: [kat] ECC-384
902,188 UART: [kat] HMAC-384Kdf
906,762 UART: [kat] LMS
1,474,958 UART: [kat] --
1,475,769 UART: [cold-reset] ++
1,476,211 UART: [fht] Storing FHT @ 0x50003400
1,479,030 UART: [idev] ++
1,479,198 UART: [idev] CDI.KEYID = 6
1,479,558 UART: [idev] SUBJECT.KEYID = 7
1,479,982 UART: [idev] UDS.KEYID = 0
1,480,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,844 UART: [idev] Erasing UDS.KEYID = 0
1,504,464 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,216 UART: [idev] --
1,514,137 UART: [ldev] ++
1,514,305 UART: [ldev] CDI.KEYID = 6
1,514,668 UART: [ldev] SUBJECT.KEYID = 5
1,515,094 UART: [ldev] AUTHORITY.KEYID = 7
1,515,557 UART: [ldev] FE.KEYID = 1
1,520,627 UART: [ldev] Erasing FE.KEYID = 1
1,545,766 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,213 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,929 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,532 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,716 UART: [ldev] --
1,585,159 UART: [fwproc] Waiting for Commands...
1,585,868 UART: [fwproc] Received command 0x46574c44
1,586,659 UART: [fwproc] Received Image of size 118548 bytes
2,931,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,266 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,793 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,792 >>> mbox cmd response: failed
1,487,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,798 >>> mbox cmd response: failed
1,487,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,251 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,558 UART: [kat] SHA2-256
882,489 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,604 UART: [kat] ++
886,756 UART: [kat] sha1
891,234 UART: [kat] SHA2-256
893,172 UART: [kat] SHA2-384
895,933 UART: [kat] SHA2-512-ACC
897,834 UART: [kat] ECC-384
903,581 UART: [kat] HMAC-384Kdf
908,463 UART: [kat] LMS
1,476,659 UART: [kat] --
1,477,648 UART: [cold-reset] ++
1,477,984 UART: [fht] Storing FHT @ 0x50003400
1,480,665 UART: [idev] ++
1,480,833 UART: [idev] CDI.KEYID = 6
1,481,193 UART: [idev] SUBJECT.KEYID = 7
1,481,617 UART: [idev] UDS.KEYID = 0
1,481,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,637 UART: [idev] Erasing UDS.KEYID = 0
1,506,315 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,979 UART: [idev] --
1,516,026 UART: [ldev] ++
1,516,194 UART: [ldev] CDI.KEYID = 6
1,516,557 UART: [ldev] SUBJECT.KEYID = 5
1,516,983 UART: [ldev] AUTHORITY.KEYID = 7
1,517,446 UART: [ldev] FE.KEYID = 1
1,522,844 UART: [ldev] Erasing FE.KEYID = 1
1,548,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,950 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,353 UART: [ldev] --
1,587,660 UART: [fwproc] Waiting for Commands...
1,588,455 UART: [fwproc] Received command 0x46574c44
1,589,246 UART: [fwproc] Received Image of size 118548 bytes
1,637,683 UART: ROM Fatal Error: 0x000B003B
1,638,842 >>> mbox cmd response: failed
1,638,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,848 >>> mbox cmd response: failed
1,638,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,638,854 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,285 UART: [state] LifecycleState = Unprovisioned
85,940 UART: [state] DebugLocked = No
86,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,154 UART: [kat] SHA2-256
882,085 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,200 UART: [kat] ++
886,352 UART: [kat] sha1
890,546 UART: [kat] SHA2-256
892,484 UART: [kat] SHA2-384
895,369 UART: [kat] SHA2-512-ACC
897,270 UART: [kat] ECC-384
902,843 UART: [kat] HMAC-384Kdf
907,365 UART: [kat] LMS
1,475,561 UART: [kat] --
1,476,538 UART: [cold-reset] ++
1,476,942 UART: [fht] Storing FHT @ 0x50003400
1,479,685 UART: [idev] ++
1,479,853 UART: [idev] CDI.KEYID = 6
1,480,213 UART: [idev] SUBJECT.KEYID = 7
1,480,637 UART: [idev] UDS.KEYID = 0
1,480,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,739 UART: [idev] Erasing UDS.KEYID = 0
1,505,461 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,997 UART: [idev] --
1,515,012 UART: [ldev] ++
1,515,180 UART: [ldev] CDI.KEYID = 6
1,515,543 UART: [ldev] SUBJECT.KEYID = 5
1,515,969 UART: [ldev] AUTHORITY.KEYID = 7
1,516,432 UART: [ldev] FE.KEYID = 1
1,521,760 UART: [ldev] Erasing FE.KEYID = 1
1,546,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,570 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,461 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,281 UART: [ldev] --
1,585,618 UART: [fwproc] Waiting for Commands...
1,586,481 UART: [fwproc] Received command 0x46574c44
1,587,272 UART: [fwproc] Received Image of size 118548 bytes
2,932,085 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,226 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,564 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,485,959 >>> mbox cmd response: failed
1,485,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,965 >>> mbox cmd response: failed
1,485,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,485,971 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,750 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,394 UART: [state] LifecycleState = Unprovisioned
86,049 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,858 UART: [kat] SHA2-256
891,408 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,512 UART: [kat] ++
895,664 UART: [kat] sha1
900,010 UART: [kat] SHA2-256
901,950 UART: [kat] SHA2-384
904,839 UART: [kat] SHA2-512-ACC
906,740 UART: [kat] ECC-384
916,299 UART: [kat] HMAC-384Kdf
920,811 UART: [kat] LMS
1,169,123 UART: [kat] --
1,170,082 UART: [cold-reset] ++
1,170,608 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,271 UART: [idev] Erasing UDS.KEYID = 0
1,199,373 UART: [idev] Sha1 KeyId Algorithm
1,208,313 UART: [idev] --
1,209,304 UART: [ldev] ++
1,209,472 UART: [ldev] CDI.KEYID = 6
1,209,836 UART: [ldev] SUBJECT.KEYID = 5
1,210,263 UART: [ldev] AUTHORITY.KEYID = 7
1,210,726 UART: [ldev] FE.KEYID = 1
1,216,064 UART: [ldev] Erasing FE.KEYID = 1
1,242,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,749 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,194 UART: [ldev] --
1,281,477 UART: [fwproc] Wait for Commands...
1,282,088 UART: [fwproc] Recv command 0x46574c44
1,282,821 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,894 UART: ROM Fatal Error: 0x000B003B
1,331,053 >>> mbox cmd response: failed
1,331,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,059 >>> mbox cmd response: failed
1,331,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,793 UART: [state] WD Timer not started. Device not locked for debugging
88,090 UART: [kat] SHA2-256
891,640 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,744 UART: [kat] ++
895,896 UART: [kat] sha1
899,990 UART: [kat] SHA2-256
901,930 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,283 UART: [kat] HMAC-384Kdf
920,883 UART: [kat] LMS
1,169,195 UART: [kat] --
1,170,204 UART: [cold-reset] ++
1,170,780 UART: [fht] FHT @ 0x50003400
1,173,406 UART: [idev] ++
1,173,574 UART: [idev] CDI.KEYID = 6
1,173,935 UART: [idev] SUBJECT.KEYID = 7
1,174,360 UART: [idev] UDS.KEYID = 0
1,174,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,535 UART: [idev] Erasing UDS.KEYID = 0
1,199,977 UART: [idev] Sha1 KeyId Algorithm
1,208,849 UART: [idev] --
1,209,928 UART: [ldev] ++
1,210,096 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,887 UART: [ldev] AUTHORITY.KEYID = 7
1,211,350 UART: [ldev] FE.KEYID = 1
1,216,544 UART: [ldev] Erasing FE.KEYID = 1
1,242,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,319 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,762 UART: [ldev] --
1,282,173 UART: [fwproc] Wait for Commands...
1,282,944 UART: [fwproc] Recv command 0x46574c44
1,283,677 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,593 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,808 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,490 >>> mbox cmd response: failed
1,185,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,496 >>> mbox cmd response: failed
1,185,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,117 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,720 UART: [state] WD Timer not started. Device not locked for debugging
87,975 UART: [kat] SHA2-256
891,525 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,629 UART: [kat] ++
895,781 UART: [kat] sha1
900,067 UART: [kat] SHA2-256
902,007 UART: [kat] SHA2-384
904,688 UART: [kat] SHA2-512-ACC
906,589 UART: [kat] ECC-384
916,524 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,783 UART: [cold-reset] ++
1,171,355 UART: [fht] FHT @ 0x50003400
1,174,109 UART: [idev] ++
1,174,277 UART: [idev] CDI.KEYID = 6
1,174,638 UART: [idev] SUBJECT.KEYID = 7
1,175,063 UART: [idev] UDS.KEYID = 0
1,175,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,378 UART: [idev] Erasing UDS.KEYID = 0
1,200,426 UART: [idev] Sha1 KeyId Algorithm
1,209,432 UART: [idev] --
1,210,581 UART: [ldev] ++
1,210,749 UART: [ldev] CDI.KEYID = 6
1,211,113 UART: [ldev] SUBJECT.KEYID = 5
1,211,540 UART: [ldev] AUTHORITY.KEYID = 7
1,212,003 UART: [ldev] FE.KEYID = 1
1,217,383 UART: [ldev] Erasing FE.KEYID = 1
1,243,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,934 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,707 UART: [ldev] --
1,283,090 UART: [fwproc] Wait for Commands...
1,283,863 UART: [fwproc] Recv command 0x46574c44
1,284,596 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,351 UART: ROM Fatal Error: 0x000B003B
1,332,510 >>> mbox cmd response: failed
1,332,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,516 >>> mbox cmd response: failed
1,332,516 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,522 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,311 UART: [state] LifecycleState = Unprovisioned
85,966 UART: [state] DebugLocked = No
86,654 UART: [state] WD Timer not started. Device not locked for debugging
87,999 UART: [kat] SHA2-256
891,549 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,653 UART: [kat] ++
895,805 UART: [kat] sha1
900,135 UART: [kat] SHA2-256
902,075 UART: [kat] SHA2-384
904,802 UART: [kat] SHA2-512-ACC
906,703 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,132 UART: [kat] LMS
1,169,444 UART: [kat] --
1,170,095 UART: [cold-reset] ++
1,170,623 UART: [fht] FHT @ 0x50003400
1,173,161 UART: [idev] ++
1,173,329 UART: [idev] CDI.KEYID = 6
1,173,690 UART: [idev] SUBJECT.KEYID = 7
1,174,115 UART: [idev] UDS.KEYID = 0
1,174,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,450 UART: [idev] Sha1 KeyId Algorithm
1,208,226 UART: [idev] --
1,209,263 UART: [ldev] ++
1,209,431 UART: [ldev] CDI.KEYID = 6
1,209,795 UART: [ldev] SUBJECT.KEYID = 5
1,210,222 UART: [ldev] AUTHORITY.KEYID = 7
1,210,685 UART: [ldev] FE.KEYID = 1
1,215,727 UART: [ldev] Erasing FE.KEYID = 1
1,242,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,463 UART: [ldev] --
1,281,804 UART: [fwproc] Wait for Commands...
1,282,507 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,824 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,359 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,867 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,745 >>> mbox cmd response: failed
1,187,745 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,751 >>> mbox cmd response: failed
1,187,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,757 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,642 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,063 UART: [state] WD Timer not started. Device not locked for debugging
87,344 UART: [kat] SHA2-256
892,994 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,119 UART: [kat] ++
897,271 UART: [kat] sha1
901,479 UART: [kat] SHA2-256
903,419 UART: [kat] SHA2-384
906,258 UART: [kat] SHA2-512-ACC
908,159 UART: [kat] ECC-384
917,746 UART: [kat] HMAC-384Kdf
922,272 UART: [kat] LMS
1,170,600 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,904 UART: [idev] Erasing UDS.KEYID = 0
1,200,859 UART: [idev] Sha1 KeyId Algorithm
1,209,419 UART: [idev] --
1,210,383 UART: [ldev] ++
1,210,551 UART: [ldev] CDI.KEYID = 6
1,210,914 UART: [ldev] SUBJECT.KEYID = 5
1,211,340 UART: [ldev] AUTHORITY.KEYID = 7
1,211,803 UART: [ldev] FE.KEYID = 1
1,217,171 UART: [ldev] Erasing FE.KEYID = 1
1,243,378 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,090 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,323 UART: [ldev] --
1,282,818 UART: [fwproc] Wait for Commands...
1,283,516 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,827 UART: ROM Fatal Error: 0x000B003B
1,332,986 >>> mbox cmd response: failed
1,332,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,992 >>> mbox cmd response: failed
1,332,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,998 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,080 UART: [state] LifecycleState = Unprovisioned
85,735 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,582 UART: [kat] SHA2-256
893,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,357 UART: [kat] ++
897,509 UART: [kat] sha1
901,647 UART: [kat] SHA2-256
903,587 UART: [kat] SHA2-384
906,384 UART: [kat] SHA2-512-ACC
908,285 UART: [kat] ECC-384
917,926 UART: [kat] HMAC-384Kdf
922,448 UART: [kat] LMS
1,170,776 UART: [kat] --
1,171,347 UART: [cold-reset] ++
1,171,891 UART: [fht] FHT @ 0x50003400
1,174,402 UART: [idev] ++
1,174,570 UART: [idev] CDI.KEYID = 6
1,174,930 UART: [idev] SUBJECT.KEYID = 7
1,175,354 UART: [idev] UDS.KEYID = 0
1,175,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,121 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,509 UART: [ldev] ++
1,209,677 UART: [ldev] CDI.KEYID = 6
1,210,040 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,099 UART: [ldev] Erasing FE.KEYID = 1
1,242,198 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,117 UART: [ldev] --
1,281,604 UART: [fwproc] Wait for Commands...
1,282,190 UART: [fwproc] Recv command 0x46574c44
1,282,918 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,237 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,746 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,235 >>> mbox cmd response: failed
1,186,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,241 >>> mbox cmd response: failed
1,186,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,247 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,387 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,826 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
893,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,824 UART: [kat] ++
897,976 UART: [kat] sha1
902,220 UART: [kat] SHA2-256
904,160 UART: [kat] SHA2-384
906,839 UART: [kat] SHA2-512-ACC
908,740 UART: [kat] ECC-384
918,809 UART: [kat] HMAC-384Kdf
923,309 UART: [kat] LMS
1,171,637 UART: [kat] --
1,172,420 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,441 UART: [idev] ++
1,175,609 UART: [idev] CDI.KEYID = 6
1,175,969 UART: [idev] SUBJECT.KEYID = 7
1,176,393 UART: [idev] UDS.KEYID = 0
1,176,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,149 UART: [idev] Erasing UDS.KEYID = 0
1,201,276 UART: [idev] Sha1 KeyId Algorithm
1,209,694 UART: [idev] --
1,210,732 UART: [ldev] ++
1,210,900 UART: [ldev] CDI.KEYID = 6
1,211,263 UART: [ldev] SUBJECT.KEYID = 5
1,211,689 UART: [ldev] AUTHORITY.KEYID = 7
1,212,152 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,758 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,294 UART: [ldev] --
1,283,755 UART: [fwproc] Wait for Commands...
1,284,403 UART: [fwproc] Recv command 0x46574c44
1,285,131 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,972 UART: ROM Fatal Error: 0x000B003B
1,333,131 >>> mbox cmd response: failed
1,333,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,137 >>> mbox cmd response: failed
1,333,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,143 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,740 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
893,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,622 UART: [kat] ++
897,774 UART: [kat] sha1
902,022 UART: [kat] SHA2-256
903,962 UART: [kat] SHA2-384
906,609 UART: [kat] SHA2-512-ACC
908,510 UART: [kat] ECC-384
918,485 UART: [kat] HMAC-384Kdf
923,297 UART: [kat] LMS
1,171,625 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,978 UART: [fht] FHT @ 0x50003400
1,175,643 UART: [idev] ++
1,175,811 UART: [idev] CDI.KEYID = 6
1,176,171 UART: [idev] SUBJECT.KEYID = 7
1,176,595 UART: [idev] UDS.KEYID = 0
1,176,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,337 UART: [idev] Erasing UDS.KEYID = 0
1,201,438 UART: [idev] Sha1 KeyId Algorithm
1,209,922 UART: [idev] --
1,210,984 UART: [ldev] ++
1,211,152 UART: [ldev] CDI.KEYID = 6
1,211,515 UART: [ldev] SUBJECT.KEYID = 5
1,211,941 UART: [ldev] AUTHORITY.KEYID = 7
1,212,404 UART: [ldev] FE.KEYID = 1
1,217,422 UART: [ldev] Erasing FE.KEYID = 1
1,244,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,736 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,452 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,256 UART: [ldev] --
1,283,577 UART: [fwproc] Wait for Commands...
1,284,367 UART: [fwproc] Recv command 0x46574c44
1,285,095 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,495 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,693 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,636 >>> mbox cmd response: failed
1,188,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,642 >>> mbox cmd response: failed
1,188,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,390 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
192,048 UART:
192,443 UART: Running Caliptra ROM ...
193,590 UART:
193,740 UART: [state] CFI Enabled
256,639 UART: [state] LifecycleState = Manufacturing
258,626 UART: [state] DebugLocked = No
260,994 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,338 UART: [kat] SHA2-256
435,056 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,526 UART: [kat] ++
446,112 UART: [kat] sha1
457,158 UART: [kat] SHA2-256
459,837 UART: [kat] SHA2-384
466,785 UART: [kat] SHA2-512-ACC
469,122 UART: [kat] ECC-384
2,760,736 UART: [kat] HMAC-384Kdf
2,786,036 UART: [kat] LMS
3,976,328 UART: [kat] --
3,980,466 UART: [cold-reset] ++
3,981,646 UART: [fht] Storing FHT @ 0x50003400
3,991,945 UART: [idev] ++
3,992,519 UART: [idev] CDI.KEYID = 6
3,993,411 UART: [idev] SUBJECT.KEYID = 7
3,994,683 UART: [idev] UDS.KEYID = 0
3,997,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,147,196 UART: [idev] Erasing UDS.KEYID = 0
7,334,842 UART: [idev] Using Sha1 for KeyId Algorithm
7,357,466 UART: [idev] --
7,361,407 UART: [ldev] ++
7,361,978 UART: [ldev] CDI.KEYID = 6
7,362,960 UART: [ldev] SUBJECT.KEYID = 5
7,364,174 UART: [ldev] AUTHORITY.KEYID = 7
7,365,455 UART: [ldev] FE.KEYID = 1
7,411,664 UART: [ldev] Erasing FE.KEYID = 1
10,743,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,058,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,073,204 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,088,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,102,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,121,867 UART: [ldev] --
13,126,591 UART: [fwproc] Waiting for Commands...
13,128,960 UART: [fwproc] Received command 0x46574c44
13,131,144 UART: [fwproc] Received Image of size 118548 bytes
16,118,354 UART: ROM Fatal Error: 0x000B0025
16,121,825 >>> mbox cmd response: failed
16,122,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,122,567 >>> mbox cmd response: failed
16,122,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,123,141 >>> mbox cmd response: failed
Initializing fuses
2,060,578 writing to cptra_bootfsm_go
2,249,959 UART:
2,250,313 UART: Running Caliptra ROM ...
2,251,457 UART:
2,251,624 UART: [state] CFI Enabled
2,321,644 UART: [state] LifecycleState = Manufacturing
2,323,589 UART: [state] DebugLocked = No
2,325,091 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,727 UART: [kat] SHA2-256
2,499,413 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,915 UART: [kat] ++
2,510,419 UART: [kat] sha1
2,520,414 UART: [kat] SHA2-256
2,523,116 UART: [kat] SHA2-384
2,527,379 UART: [kat] SHA2-512-ACC
2,529,743 UART: [kat] ECC-384
4,830,603 UART: [kat] HMAC-384Kdf
4,861,517 UART: [kat] LMS
6,051,797 UART: [kat] --
6,054,605 UART: [cold-reset] ++
6,056,000 UART: [fht] Storing FHT @ 0x50003400
6,068,033 UART: [idev] ++
6,068,604 UART: [idev] CDI.KEYID = 6
6,069,572 UART: [idev] SUBJECT.KEYID = 7
6,070,790 UART: [idev] UDS.KEYID = 0
6,073,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,222,222 UART: [idev] Erasing UDS.KEYID = 0
9,406,471 UART: [idev] Using Sha1 for KeyId Algorithm
9,427,065 UART: [idev] --
9,431,200 UART: [ldev] ++
9,431,778 UART: [ldev] CDI.KEYID = 6
9,432,724 UART: [ldev] SUBJECT.KEYID = 5
9,433,993 UART: [ldev] AUTHORITY.KEYID = 7
9,435,149 UART: [ldev] FE.KEYID = 1
9,482,919 UART: [ldev] Erasing FE.KEYID = 1
12,816,572 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,130,929 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,145,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,160,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,174,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,193,743 UART: [ldev] --
15,198,689 UART: [fwproc] Waiting for Commands...
15,201,438 UART: [fwproc] Received command 0x46574c44
15,203,629 UART: [fwproc] Received Image of size 118548 bytes
19,336,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,415,377 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,488,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,816,679 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
3,786,513 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,906,317 >>> mbox cmd response: failed
15,907,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,907,384 >>> mbox cmd response: failed
15,907,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,907,981 >>> mbox cmd response: failed
Initializing fuses
2,054,341 writing to cptra_bootfsm_go
5,861,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,052,792 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
192,516 UART:
192,864 UART: Running Caliptra ROM ...
194,048 UART:
603,626 UART: [state] CFI Enabled
618,487 UART: [state] LifecycleState = Manufacturing
620,377 UART: [state] DebugLocked = No
622,705 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,967 UART: [kat] SHA2-256
797,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,267 UART: [kat] ++
808,713 UART: [kat] sha1
819,153 UART: [kat] SHA2-256
821,851 UART: [kat] SHA2-384
827,510 UART: [kat] SHA2-512-ACC
829,909 UART: [kat] ECC-384
3,113,679 UART: [kat] HMAC-384Kdf
3,124,310 UART: [kat] LMS
4,314,433 UART: [kat] --
4,318,667 UART: [cold-reset] ++
4,320,227 UART: [fht] Storing FHT @ 0x50003400
4,331,026 UART: [idev] ++
4,331,604 UART: [idev] CDI.KEYID = 6
4,332,522 UART: [idev] SUBJECT.KEYID = 7
4,333,820 UART: [idev] UDS.KEYID = 0
4,336,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,072 UART: [idev] Erasing UDS.KEYID = 0
7,618,663 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,152 UART: [idev] --
7,645,478 UART: [ldev] ++
7,646,059 UART: [ldev] CDI.KEYID = 6
7,647,034 UART: [ldev] SUBJECT.KEYID = 5
7,648,205 UART: [ldev] AUTHORITY.KEYID = 7
7,649,501 UART: [ldev] FE.KEYID = 1
7,660,045 UART: [ldev] Erasing FE.KEYID = 1
10,945,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,505 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,594 UART: [ldev] --
13,309,380 UART: [fwproc] Waiting for Commands...
13,311,651 UART: [fwproc] Received command 0x46574c44
13,313,841 UART: [fwproc] Received Image of size 118548 bytes
16,305,070 UART: ROM Fatal Error: 0x000B0025
16,308,524 >>> mbox cmd response: failed
16,308,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,309,312 >>> mbox cmd response: failed
16,309,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,309,887 >>> mbox cmd response: failed
Initializing fuses
2,060,591 writing to cptra_bootfsm_go
2,249,886 UART:
2,250,249 UART: Running Caliptra ROM ...
2,251,397 UART:
4,156,632 UART: [state] CFI Enabled
4,169,961 UART: [state] LifecycleState = Manufacturing
4,171,875 UART: [state] DebugLocked = No
4,174,861 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,180,200 UART: [kat] SHA2-256
4,349,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,360,496 UART: [kat] ++
4,360,992 UART: [kat] sha1
4,373,447 UART: [kat] SHA2-256
4,376,156 UART: [kat] SHA2-384
4,381,772 UART: [kat] SHA2-512-ACC
4,384,182 UART: [kat] ECC-384
6,667,263 UART: [kat] HMAC-384Kdf
6,678,468 UART: [kat] LMS
7,868,587 UART: [kat] --
7,870,948 UART: [cold-reset] ++
7,873,328 UART: [fht] Storing FHT @ 0x50003400
7,884,596 UART: [idev] ++
7,885,166 UART: [idev] CDI.KEYID = 6
7,886,054 UART: [idev] SUBJECT.KEYID = 7
7,887,333 UART: [idev] UDS.KEYID = 0
7,889,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,038,659 UART: [idev] Erasing UDS.KEYID = 0
11,176,802 UART: [idev] Using Sha1 for KeyId Algorithm
11,199,205 UART: [idev] --
11,204,103 UART: [ldev] ++
11,204,685 UART: [ldev] CDI.KEYID = 6
11,205,569 UART: [ldev] SUBJECT.KEYID = 5
11,206,902 UART: [ldev] AUTHORITY.KEYID = 7
11,208,094 UART: [ldev] FE.KEYID = 1
11,221,043 UART: [ldev] Erasing FE.KEYID = 1
14,505,695 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,799,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,814,153 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,828,958 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,843,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,863,534 UART: [ldev] --
16,868,262 UART: [fwproc] Waiting for Commands...
16,870,316 UART: [fwproc] Received command 0x46574c44
16,872,622 UART: [fwproc] Received Image of size 118548 bytes
21,010,892 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,092,210 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,165,439 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,494,085 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,131,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,103,585 >>> mbox cmd response: failed
16,104,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,104,517 >>> mbox cmd response: failed
16,104,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,105,136 >>> mbox cmd response: failed
Initializing fuses
2,054,366 writing to cptra_bootfsm_go
7,889,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,949,636 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,124 UART:
192,486 UART: Running Caliptra ROM ...
193,570 UART:
193,738 UART: [state] CFI Enabled
261,611 UART: [state] LifecycleState = Manufacturing
263,613 UART: [state] DebugLocked = No
265,076 UART: [state] WD Timer not started. Device not locked for debugging
269,743 UART: [kat] SHA2-256
449,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,210 UART: [kat] ++
460,671 UART: [kat] sha1
470,580 UART: [kat] SHA2-256
473,268 UART: [kat] SHA2-384
479,413 UART: [kat] SHA2-512-ACC
481,765 UART: [kat] ECC-384
2,928,019 UART: [kat] HMAC-384Kdf
2,947,149 UART: [kat] LMS
3,423,599 UART: [kat] --
3,428,630 UART: [cold-reset] ++
3,430,537 UART: [fht] FHT @ 0x50003400
3,442,117 UART: [idev] ++
3,442,694 UART: [idev] CDI.KEYID = 6
3,443,641 UART: [idev] SUBJECT.KEYID = 7
3,444,973 UART: [idev] UDS.KEYID = 0
3,447,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,221 UART: [idev] Erasing UDS.KEYID = 0
5,949,511 UART: [idev] Sha1 KeyId Algorithm
5,973,616 UART: [idev] --
5,977,655 UART: [ldev] ++
5,978,243 UART: [ldev] CDI.KEYID = 6
5,979,171 UART: [ldev] SUBJECT.KEYID = 5
5,980,336 UART: [ldev] AUTHORITY.KEYID = 7
5,981,627 UART: [ldev] FE.KEYID = 1
6,021,448 UART: [ldev] Erasing FE.KEYID = 1
8,526,642 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,262,019 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,277,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,293,750 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,309,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,330,427 UART: [ldev] --
10,335,425 UART: [fwproc] Wait for Commands...
10,337,697 UART: [fwproc] Recv command 0x46574c44
10,339,691 UART: [fwproc] Recv'd Img size: 118548 bytes
12,693,603 UART: ROM Fatal Error: 0x000B0025
12,696,885 >>> mbox cmd response: failed
12,697,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,697,669 >>> mbox cmd response: failed
12,697,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,698,277 >>> mbox cmd response: failed
Initializing fuses
2,054,583 writing to cptra_bootfsm_go
2,243,864 UART:
2,244,219 UART: Running Caliptra ROM ...
2,245,362 UART:
2,245,533 UART: [state] CFI Enabled
2,313,703 UART: [state] LifecycleState = Manufacturing
2,315,638 UART: [state] DebugLocked = No
2,317,574 UART: [state] WD Timer not started. Device not locked for debugging
2,320,622 UART: [kat] SHA2-256
2,500,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,051 UART: [kat] ++
2,511,548 UART: [kat] sha1
2,524,277 UART: [kat] SHA2-256
2,526,982 UART: [kat] SHA2-384
2,531,808 UART: [kat] SHA2-512-ACC
2,534,167 UART: [kat] ECC-384
4,997,207 UART: [kat] HMAC-384Kdf
5,021,645 UART: [kat] LMS
5,498,130 UART: [kat] --
5,503,268 UART: [cold-reset] ++
5,505,641 UART: [fht] FHT @ 0x50003400
5,516,669 UART: [idev] ++
5,517,274 UART: [idev] CDI.KEYID = 6
5,518,193 UART: [idev] SUBJECT.KEYID = 7
5,519,463 UART: [idev] UDS.KEYID = 0
5,522,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,340 UART: [idev] Erasing UDS.KEYID = 0
8,039,004 UART: [idev] Sha1 KeyId Algorithm
8,061,783 UART: [idev] --
8,067,736 UART: [ldev] ++
8,068,339 UART: [ldev] CDI.KEYID = 6
8,069,408 UART: [ldev] SUBJECT.KEYID = 5
8,070,522 UART: [ldev] AUTHORITY.KEYID = 7
8,071,703 UART: [ldev] FE.KEYID = 1
8,110,459 UART: [ldev] Erasing FE.KEYID = 1
10,615,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,351,410 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,367,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,383,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,398,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,419,322 UART: [ldev] --
12,425,410 UART: [fwproc] Wait for Commands...
12,428,433 UART: [fwproc] Recv command 0x46574c44
12,430,427 UART: [fwproc] Recv'd Img size: 118548 bytes
15,953,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,029,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,102,766 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,430,557 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,464,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,611,644 >>> mbox cmd response: failed
12,612,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,612,767 >>> mbox cmd response: failed
12,613,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,613,341 >>> mbox cmd response: failed
Initializing fuses
2,055,821 writing to cptra_bootfsm_go
5,503,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,315,324 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,649 UART:
193,024 UART: Running Caliptra ROM ...
194,175 UART:
604,050 UART: [state] CFI Enabled
617,850 UART: [state] LifecycleState = Manufacturing
619,760 UART: [state] DebugLocked = No
621,469 UART: [state] WD Timer not started. Device not locked for debugging
625,907 UART: [kat] SHA2-256
805,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,349 UART: [kat] ++
816,829 UART: [kat] sha1
827,493 UART: [kat] SHA2-256
830,166 UART: [kat] SHA2-384
835,513 UART: [kat] SHA2-512-ACC
837,857 UART: [kat] ECC-384
3,279,452 UART: [kat] HMAC-384Kdf
3,291,793 UART: [kat] LMS
3,768,304 UART: [kat] --
3,772,100 UART: [cold-reset] ++
3,773,820 UART: [fht] FHT @ 0x50003400
3,784,317 UART: [idev] ++
3,784,887 UART: [idev] CDI.KEYID = 6
3,785,910 UART: [idev] SUBJECT.KEYID = 7
3,787,110 UART: [idev] UDS.KEYID = 0
3,789,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,862 UART: [idev] Erasing UDS.KEYID = 0
6,269,140 UART: [idev] Sha1 KeyId Algorithm
6,292,694 UART: [idev] --
6,296,861 UART: [ldev] ++
6,297,438 UART: [ldev] CDI.KEYID = 6
6,298,352 UART: [ldev] SUBJECT.KEYID = 5
6,299,570 UART: [ldev] AUTHORITY.KEYID = 7
6,300,804 UART: [ldev] FE.KEYID = 1
6,313,237 UART: [ldev] Erasing FE.KEYID = 1
8,791,497 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,557 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,296 UART: [ldev] --
10,585,353 UART: [fwproc] Wait for Commands...
10,587,272 UART: [fwproc] Recv command 0x46574c44
10,589,283 UART: [fwproc] Recv'd Img size: 118548 bytes
12,944,432 UART: ROM Fatal Error: 0x000B0025
12,947,665 >>> mbox cmd response: failed
12,948,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,948,441 >>> mbox cmd response: failed
12,948,708 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,949,000 >>> mbox cmd response: failed
Initializing fuses
2,063,577 writing to cptra_bootfsm_go
2,252,856 UART:
2,253,226 UART: Running Caliptra ROM ...
2,254,280 UART:
7,508,313 UART: [state] CFI Enabled
7,522,986 UART: [state] LifecycleState = Manufacturing
7,524,911 UART: [state] DebugLocked = No
7,526,092 UART: [state] WD Timer not started. Device not locked for debugging
7,530,837 UART: [kat] SHA2-256
7,710,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,721,282 UART: [kat] ++
7,721,782 UART: [kat] sha1
7,731,917 UART: [kat] SHA2-256
7,734,578 UART: [kat] SHA2-384
7,739,655 UART: [kat] SHA2-512-ACC
7,742,014 UART: [kat] ECC-384
10,184,097 UART: [kat] HMAC-384Kdf
10,197,345 UART: [kat] LMS
10,673,883 UART: [kat] --
10,680,530 UART: [cold-reset] ++
10,681,852 UART: [fht] FHT @ 0x50003400
10,692,573 UART: [idev] ++
10,693,146 UART: [idev] CDI.KEYID = 6
10,694,167 UART: [idev] SUBJECT.KEYID = 7
10,695,386 UART: [idev] UDS.KEYID = 0
10,698,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,847,452 UART: [idev] Erasing UDS.KEYID = 0
13,172,829 UART: [idev] Sha1 KeyId Algorithm
13,195,687 UART: [idev] --
13,199,268 UART: [ldev] ++
13,199,900 UART: [ldev] CDI.KEYID = 6
13,200,814 UART: [ldev] SUBJECT.KEYID = 5
13,201,974 UART: [ldev] AUTHORITY.KEYID = 7
13,203,259 UART: [ldev] FE.KEYID = 1
13,214,500 UART: [ldev] Erasing FE.KEYID = 1
15,690,231 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,406,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,422,605 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,438,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,454,027 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,476,366 UART: [ldev] --
17,481,422 UART: [fwproc] Wait for Commands...
17,483,783 UART: [fwproc] Recv command 0x46574c44
17,485,787 UART: [fwproc] Recv'd Img size: 118548 bytes
21,002,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,086,524 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,159,542 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,487,157 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,466 writing to cptra_bootfsm_go
3,774,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,815,969 >>> mbox cmd response: failed
12,816,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,816,891 >>> mbox cmd response: failed
12,817,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,817,466 >>> mbox cmd response: failed
Initializing fuses
2,055,686 writing to cptra_bootfsm_go
10,833,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,533,998 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
192,094 UART:
192,472 UART: Running Caliptra ROM ...
193,610 UART:
193,758 UART: [state] CFI Enabled
262,203 UART: [state] LifecycleState = Manufacturing
264,627 UART: [state] DebugLocked = No
266,820 UART: [state] WD Timer not started. Device not locked for debugging
272,015 UART: [kat] SHA2-256
461,884 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,649 UART: [kat] ++
473,132 UART: [kat] sha1
485,741 UART: [kat] SHA2-256
488,714 UART: [kat] SHA2-384
494,324 UART: [kat] SHA2-512-ACC
496,939 UART: [kat] ECC-384
2,946,571 UART: [kat] HMAC-384Kdf
2,969,778 UART: [kat] LMS
3,501,556 UART: [kat] --
3,507,349 UART: [cold-reset] ++
3,509,242 UART: [fht] FHT @ 0x50003400
3,519,529 UART: [idev] ++
3,520,208 UART: [idev] CDI.KEYID = 6
3,521,229 UART: [idev] SUBJECT.KEYID = 7
3,522,399 UART: [idev] UDS.KEYID = 0
3,525,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,544 UART: [idev] Erasing UDS.KEYID = 0
6,026,063 UART: [idev] Sha1 KeyId Algorithm
6,049,907 UART: [idev] --
6,055,250 UART: [ldev] ++
6,055,948 UART: [ldev] CDI.KEYID = 6
6,056,872 UART: [ldev] SUBJECT.KEYID = 5
6,058,042 UART: [ldev] AUTHORITY.KEYID = 7
6,059,281 UART: [ldev] FE.KEYID = 1
6,099,048 UART: [ldev] Erasing FE.KEYID = 1
8,600,404 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,323,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,338,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,599 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,763 UART: [ldev] --
10,393,895 UART: [fwproc] Wait for Commands...
10,396,000 UART: [fwproc] Recv command 0x46574c44
10,398,325 UART: [fwproc] Recv'd Img size: 118548 bytes
12,767,581 UART: ROM Fatal Error: 0x000B0025
12,771,243 >>> mbox cmd response: failed
12,771,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,771,993 >>> mbox cmd response: failed
12,772,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,772,562 >>> mbox cmd response: failed
Initializing fuses
2,054,811 writing to cptra_bootfsm_go
2,244,157 UART:
2,244,510 UART: Running Caliptra ROM ...
2,245,670 UART:
2,245,840 UART: [state] CFI Enabled
2,317,041 UART: [state] LifecycleState = Manufacturing
2,319,414 UART: [state] DebugLocked = No
2,321,026 UART: [state] WD Timer not started. Device not locked for debugging
2,324,995 UART: [kat] SHA2-256
2,514,886 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,669 UART: [kat] ++
2,526,133 UART: [kat] sha1
2,537,351 UART: [kat] SHA2-256
2,540,382 UART: [kat] SHA2-384
2,546,760 UART: [kat] SHA2-512-ACC
2,549,331 UART: [kat] ECC-384
4,999,719 UART: [kat] HMAC-384Kdf
5,023,306 UART: [kat] LMS
5,555,041 UART: [kat] --
5,557,355 UART: [cold-reset] ++
5,558,552 UART: [fht] FHT @ 0x50003400
5,570,887 UART: [idev] ++
5,571,570 UART: [idev] CDI.KEYID = 6
5,572,612 UART: [idev] SUBJECT.KEYID = 7
5,573,781 UART: [idev] UDS.KEYID = 0
5,576,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,725,275 UART: [idev] Erasing UDS.KEYID = 0
8,080,223 UART: [idev] Sha1 KeyId Algorithm
8,102,550 UART: [idev] --
8,105,906 UART: [ldev] ++
8,106,596 UART: [ldev] CDI.KEYID = 6
8,107,512 UART: [ldev] SUBJECT.KEYID = 5
8,108,676 UART: [ldev] AUTHORITY.KEYID = 7
8,109,923 UART: [ldev] FE.KEYID = 1
8,151,879 UART: [ldev] Erasing FE.KEYID = 1
10,660,598 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,827 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,408,028 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,423,220 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,085 UART: [ldev] --
12,464,304 UART: [fwproc] Wait for Commands...
12,467,376 UART: [fwproc] Recv command 0x46574c44
12,469,692 UART: [fwproc] Recv'd Img size: 118548 bytes
16,000,324 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,077,926 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,201,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,762,291 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
3,442,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,709,796 >>> mbox cmd response: failed
12,710,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,710,741 >>> mbox cmd response: failed
12,711,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,711,331 >>> mbox cmd response: failed
Initializing fuses
2,048,279 writing to cptra_bootfsm_go
5,488,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,909,265 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,539 UART:
192,924 UART: Running Caliptra ROM ...
194,017 UART:
603,647 UART: [state] CFI Enabled
618,720 UART: [state] LifecycleState = Manufacturing
621,061 UART: [state] DebugLocked = No
623,966 UART: [state] WD Timer not started. Device not locked for debugging
628,626 UART: [kat] SHA2-256
818,492 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,305 UART: [kat] ++
829,898 UART: [kat] sha1
840,843 UART: [kat] SHA2-256
843,867 UART: [kat] SHA2-384
849,909 UART: [kat] SHA2-512-ACC
852,469 UART: [kat] ECC-384
3,293,132 UART: [kat] HMAC-384Kdf
3,305,845 UART: [kat] LMS
3,837,637 UART: [kat] --
3,841,910 UART: [cold-reset] ++
3,842,762 UART: [fht] FHT @ 0x50003400
3,855,458 UART: [idev] ++
3,856,177 UART: [idev] CDI.KEYID = 6
3,857,073 UART: [idev] SUBJECT.KEYID = 7
3,858,297 UART: [idev] UDS.KEYID = 0
3,861,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,311 UART: [idev] Erasing UDS.KEYID = 0
6,337,271 UART: [idev] Sha1 KeyId Algorithm
6,359,826 UART: [idev] --
6,365,767 UART: [ldev] ++
6,366,454 UART: [ldev] CDI.KEYID = 6
6,367,341 UART: [ldev] SUBJECT.KEYID = 5
6,368,558 UART: [ldev] AUTHORITY.KEYID = 7
6,369,797 UART: [ldev] FE.KEYID = 1
6,380,609 UART: [ldev] Erasing FE.KEYID = 1
8,857,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,386 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,311 UART: [ldev] --
10,651,394 UART: [fwproc] Wait for Commands...
10,653,295 UART: [fwproc] Recv command 0x46574c44
10,655,610 UART: [fwproc] Recv'd Img size: 118548 bytes
13,032,598 UART: ROM Fatal Error: 0x000B0025
13,036,242 >>> mbox cmd response: failed
13,036,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,037,018 >>> mbox cmd response: failed
13,037,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,037,596 >>> mbox cmd response: failed
Initializing fuses
2,062,252 writing to cptra_bootfsm_go
2,251,586 UART:
2,251,934 UART: Running Caliptra ROM ...
2,253,026 UART:
7,416,911 UART: [state] CFI Enabled
7,428,737 UART: [state] LifecycleState = Manufacturing
7,431,096 UART: [state] DebugLocked = No
7,433,042 UART: [state] WD Timer not started. Device not locked for debugging
7,437,685 UART: [kat] SHA2-256
7,627,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,638,393 UART: [kat] ++
7,638,892 UART: [kat] sha1
7,650,031 UART: [kat] SHA2-256
7,653,015 UART: [kat] SHA2-384
7,659,074 UART: [kat] SHA2-512-ACC
7,661,663 UART: [kat] ECC-384
10,103,114 UART: [kat] HMAC-384Kdf
10,116,273 UART: [kat] LMS
10,648,067 UART: [kat] --
10,654,384 UART: [cold-reset] ++
10,656,604 UART: [fht] FHT @ 0x50003400
10,668,420 UART: [idev] ++
10,669,098 UART: [idev] CDI.KEYID = 6
10,670,041 UART: [idev] SUBJECT.KEYID = 7
10,671,259 UART: [idev] UDS.KEYID = 0
10,673,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,822,626 UART: [idev] Erasing UDS.KEYID = 0
13,146,058 UART: [idev] Sha1 KeyId Algorithm
13,168,451 UART: [idev] --
13,174,117 UART: [ldev] ++
13,174,799 UART: [ldev] CDI.KEYID = 6
13,175,685 UART: [ldev] SUBJECT.KEYID = 5
13,176,905 UART: [ldev] AUTHORITY.KEYID = 7
13,178,084 UART: [ldev] FE.KEYID = 1
13,189,756 UART: [ldev] Erasing FE.KEYID = 1
15,662,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,378,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,394,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,409,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,424,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,445,240 UART: [ldev] --
17,450,949 UART: [fwproc] Wait for Commands...
17,453,156 UART: [fwproc] Recv command 0x46574c44
17,455,588 UART: [fwproc] Recv'd Img size: 118548 bytes
20,985,092 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,062,327 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,185,903 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,745,826 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,297 writing to cptra_bootfsm_go
3,757,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,940,816 >>> mbox cmd response: failed
12,941,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,941,785 >>> mbox cmd response: failed
12,942,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,942,375 >>> mbox cmd response: failed
Initializing fuses
2,051,941 writing to cptra_bootfsm_go
10,683,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,029,369 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Manufacturing
85,719 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,991 UART: [kat] SHA2-256
881,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,037 UART: [kat] ++
886,189 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,270 UART: [kat] SHA2-512-ACC
897,171 UART: [kat] ECC-384
902,924 UART: [kat] HMAC-384Kdf
907,394 UART: [kat] LMS
1,475,590 UART: [kat] --
1,476,657 UART: [cold-reset] ++
1,476,997 UART: [fht] Storing FHT @ 0x50003400
1,479,954 UART: [idev] ++
1,480,122 UART: [idev] CDI.KEYID = 6
1,480,482 UART: [idev] SUBJECT.KEYID = 7
1,480,906 UART: [idev] UDS.KEYID = 0
1,481,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,582 UART: [idev] Erasing UDS.KEYID = 0
1,504,792 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,384 UART: [idev] --
1,514,493 UART: [ldev] ++
1,514,661 UART: [ldev] CDI.KEYID = 6
1,515,024 UART: [ldev] SUBJECT.KEYID = 5
1,515,450 UART: [ldev] AUTHORITY.KEYID = 7
1,515,913 UART: [ldev] FE.KEYID = 1
1,521,383 UART: [ldev] Erasing FE.KEYID = 1
1,546,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,440 UART: [ldev] --
1,585,865 UART: [fwproc] Waiting for Commands...
1,586,682 UART: [fwproc] Received command 0x46574c44
1,587,473 UART: [fwproc] Received Image of size 118548 bytes
1,893,491 UART: ROM Fatal Error: 0x000B0025
1,894,648 >>> mbox cmd response: failed
1,894,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,654 >>> mbox cmd response: failed
1,894,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,894,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,279 UART: [kat] SHA2-256
892,217 UART: [kat] SHA2-384
895,154 UART: [kat] SHA2-512-ACC
897,055 UART: [kat] ECC-384
902,398 UART: [kat] HMAC-384Kdf
907,132 UART: [kat] LMS
1,475,328 UART: [kat] --
1,475,999 UART: [cold-reset] ++
1,476,421 UART: [fht] Storing FHT @ 0x50003400
1,479,284 UART: [idev] ++
1,479,452 UART: [idev] CDI.KEYID = 6
1,479,812 UART: [idev] SUBJECT.KEYID = 7
1,480,236 UART: [idev] UDS.KEYID = 0
1,480,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,486 UART: [idev] Erasing UDS.KEYID = 0
1,505,186 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,764 UART: [idev] --
1,514,759 UART: [ldev] ++
1,514,927 UART: [ldev] CDI.KEYID = 6
1,515,290 UART: [ldev] SUBJECT.KEYID = 5
1,515,716 UART: [ldev] AUTHORITY.KEYID = 7
1,516,179 UART: [ldev] FE.KEYID = 1
1,521,383 UART: [ldev] Erasing FE.KEYID = 1
1,546,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,584 UART: [ldev] --
1,586,041 UART: [fwproc] Waiting for Commands...
1,586,850 UART: [fwproc] Received command 0x46574c44
1,587,641 UART: [fwproc] Received Image of size 118548 bytes
2,932,452 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,228 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,446 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,751 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,745,485 >>> mbox cmd response: failed
1,745,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,491 >>> mbox cmd response: failed
1,745,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,087 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,679 UART: [state] LifecycleState = Manufacturing
86,334 UART: [state] DebugLocked = No
86,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,432 UART: [kat] SHA2-256
882,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,478 UART: [kat] ++
886,630 UART: [kat] sha1
890,948 UART: [kat] SHA2-256
892,886 UART: [kat] SHA2-384
895,659 UART: [kat] SHA2-512-ACC
897,560 UART: [kat] ECC-384
903,365 UART: [kat] HMAC-384Kdf
908,131 UART: [kat] LMS
1,476,327 UART: [kat] --
1,477,086 UART: [cold-reset] ++
1,477,508 UART: [fht] Storing FHT @ 0x50003400
1,480,287 UART: [idev] ++
1,480,455 UART: [idev] CDI.KEYID = 6
1,480,815 UART: [idev] SUBJECT.KEYID = 7
1,481,239 UART: [idev] UDS.KEYID = 0
1,481,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,331 UART: [idev] Erasing UDS.KEYID = 0
1,505,877 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,541 UART: [idev] --
1,515,508 UART: [ldev] ++
1,515,676 UART: [ldev] CDI.KEYID = 6
1,516,039 UART: [ldev] SUBJECT.KEYID = 5
1,516,465 UART: [ldev] AUTHORITY.KEYID = 7
1,516,928 UART: [ldev] FE.KEYID = 1
1,522,088 UART: [ldev] Erasing FE.KEYID = 1
1,547,829 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,398 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,114 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,793 UART: [ldev] --
1,587,238 UART: [fwproc] Waiting for Commands...
1,587,909 UART: [fwproc] Received command 0x46574c44
1,588,700 UART: [fwproc] Received Image of size 118548 bytes
1,894,096 UART: ROM Fatal Error: 0x000B0025
1,895,253 >>> mbox cmd response: failed
1,895,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,259 >>> mbox cmd response: failed
1,895,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,686 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,258 UART: [kat] SHA2-256
882,189 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,304 UART: [kat] ++
886,456 UART: [kat] sha1
890,628 UART: [kat] SHA2-256
892,566 UART: [kat] SHA2-384
895,299 UART: [kat] SHA2-512-ACC
897,200 UART: [kat] ECC-384
902,587 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,420 UART: [cold-reset] ++
1,476,854 UART: [fht] Storing FHT @ 0x50003400
1,479,585 UART: [idev] ++
1,479,753 UART: [idev] CDI.KEYID = 6
1,480,113 UART: [idev] SUBJECT.KEYID = 7
1,480,537 UART: [idev] UDS.KEYID = 0
1,480,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,773 UART: [idev] Erasing UDS.KEYID = 0
1,505,679 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,411 UART: [idev] --
1,515,558 UART: [ldev] ++
1,515,726 UART: [ldev] CDI.KEYID = 6
1,516,089 UART: [ldev] SUBJECT.KEYID = 5
1,516,515 UART: [ldev] AUTHORITY.KEYID = 7
1,516,978 UART: [ldev] FE.KEYID = 1
1,522,358 UART: [ldev] Erasing FE.KEYID = 1
1,547,585 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,515 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,227 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,373 UART: [ldev] --
1,586,698 UART: [fwproc] Waiting for Commands...
1,587,399 UART: [fwproc] Received command 0x46574c44
1,588,190 UART: [fwproc] Received Image of size 118548 bytes
2,932,155 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,425 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,643 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,846 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,745,166 >>> mbox cmd response: failed
1,745,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,172 >>> mbox cmd response: failed
1,745,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,745,178 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,266 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Manufacturing
85,683 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,660 UART: [kat] SHA2-256
891,210 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,314 UART: [kat] ++
895,466 UART: [kat] sha1
899,556 UART: [kat] SHA2-256
901,496 UART: [kat] SHA2-384
904,269 UART: [kat] SHA2-512-ACC
906,170 UART: [kat] ECC-384
915,931 UART: [kat] HMAC-384Kdf
920,659 UART: [kat] LMS
1,168,971 UART: [kat] --
1,169,888 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,914 UART: [idev] ++
1,173,082 UART: [idev] CDI.KEYID = 6
1,173,443 UART: [idev] SUBJECT.KEYID = 7
1,173,868 UART: [idev] UDS.KEYID = 0
1,174,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,129 UART: [idev] Erasing UDS.KEYID = 0
1,198,907 UART: [idev] Sha1 KeyId Algorithm
1,207,911 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,916 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,287 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,176 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,814 UART: [ldev] --
1,281,171 UART: [fwproc] Wait for Commands...
1,281,848 UART: [fwproc] Recv command 0x46574c44
1,282,581 UART: [fwproc] Recv'd Img size: 118548 bytes
1,586,172 UART: ROM Fatal Error: 0x000B0025
1,587,329 >>> mbox cmd response: failed
1,587,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,335 >>> mbox cmd response: failed
1,587,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,796 UART: [state] LifecycleState = Unprovisioned
85,451 UART: [state] DebugLocked = No
85,999 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
890,720 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,824 UART: [kat] ++
894,976 UART: [kat] sha1
899,088 UART: [kat] SHA2-256
901,028 UART: [kat] SHA2-384
903,861 UART: [kat] SHA2-512-ACC
905,762 UART: [kat] ECC-384
915,477 UART: [kat] HMAC-384Kdf
920,005 UART: [kat] LMS
1,168,317 UART: [kat] --
1,169,050 UART: [cold-reset] ++
1,169,490 UART: [fht] FHT @ 0x50003400
1,172,176 UART: [idev] ++
1,172,344 UART: [idev] CDI.KEYID = 6
1,172,705 UART: [idev] SUBJECT.KEYID = 7
1,173,130 UART: [idev] UDS.KEYID = 0
1,173,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,103 UART: [idev] Erasing UDS.KEYID = 0
1,198,235 UART: [idev] Sha1 KeyId Algorithm
1,206,983 UART: [idev] --
1,207,904 UART: [ldev] ++
1,208,072 UART: [ldev] CDI.KEYID = 6
1,208,436 UART: [ldev] SUBJECT.KEYID = 5
1,208,863 UART: [ldev] AUTHORITY.KEYID = 7
1,209,326 UART: [ldev] FE.KEYID = 1
1,214,370 UART: [ldev] Erasing FE.KEYID = 1
1,240,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,869 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,544 UART: [ldev] --
1,279,889 UART: [fwproc] Wait for Commands...
1,280,618 UART: [fwproc] Recv command 0x46574c44
1,281,351 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,739 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,790 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,965 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,256 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,792 >>> mbox cmd response: failed
1,443,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,798 >>> mbox cmd response: failed
1,443,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,973 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Manufacturing
86,236 UART: [state] DebugLocked = No
86,868 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,287 UART: [kat] SHA2-256
902,227 UART: [kat] SHA2-384
904,810 UART: [kat] SHA2-512-ACC
906,711 UART: [kat] ECC-384
916,716 UART: [kat] HMAC-384Kdf
921,378 UART: [kat] LMS
1,169,690 UART: [kat] --
1,170,771 UART: [cold-reset] ++
1,171,183 UART: [fht] FHT @ 0x50003400
1,173,871 UART: [idev] ++
1,174,039 UART: [idev] CDI.KEYID = 6
1,174,400 UART: [idev] SUBJECT.KEYID = 7
1,174,825 UART: [idev] UDS.KEYID = 0
1,175,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,168 UART: [idev] Erasing UDS.KEYID = 0
1,200,320 UART: [idev] Sha1 KeyId Algorithm
1,209,202 UART: [idev] --
1,210,261 UART: [ldev] ++
1,210,429 UART: [ldev] CDI.KEYID = 6
1,210,793 UART: [ldev] SUBJECT.KEYID = 5
1,211,220 UART: [ldev] AUTHORITY.KEYID = 7
1,211,683 UART: [ldev] FE.KEYID = 1
1,216,983 UART: [ldev] Erasing FE.KEYID = 1
1,242,766 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,871 UART: [ldev] --
1,282,250 UART: [fwproc] Wait for Commands...
1,283,071 UART: [fwproc] Recv command 0x46574c44
1,283,804 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,487 UART: ROM Fatal Error: 0x000B0025
1,589,644 >>> mbox cmd response: failed
1,589,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,650 >>> mbox cmd response: failed
1,589,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,745 UART: [kat] SHA2-256
901,685 UART: [kat] SHA2-384
904,556 UART: [kat] SHA2-512-ACC
906,457 UART: [kat] ECC-384
916,380 UART: [kat] HMAC-384Kdf
921,048 UART: [kat] LMS
1,169,360 UART: [kat] --
1,169,987 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,172,969 UART: [idev] ++
1,173,137 UART: [idev] CDI.KEYID = 6
1,173,498 UART: [idev] SUBJECT.KEYID = 7
1,173,923 UART: [idev] UDS.KEYID = 0
1,174,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,688 UART: [idev] Erasing UDS.KEYID = 0
1,198,548 UART: [idev] Sha1 KeyId Algorithm
1,207,482 UART: [idev] --
1,208,435 UART: [ldev] ++
1,208,603 UART: [ldev] CDI.KEYID = 6
1,208,967 UART: [ldev] SUBJECT.KEYID = 5
1,209,394 UART: [ldev] AUTHORITY.KEYID = 7
1,209,857 UART: [ldev] FE.KEYID = 1
1,215,329 UART: [ldev] Erasing FE.KEYID = 1
1,241,788 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,625 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,667 UART: [ldev] --
1,281,114 UART: [fwproc] Wait for Commands...
1,281,893 UART: [fwproc] Recv command 0x46574c44
1,282,626 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,788 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,569 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,744 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,059 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,809 >>> mbox cmd response: failed
1,444,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,815 >>> mbox cmd response: failed
1,444,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,106 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,682 UART: [state] LifecycleState = Manufacturing
86,337 UART: [state] DebugLocked = No
86,969 UART: [state] WD Timer not started. Device not locked for debugging
88,182 UART: [kat] SHA2-256
893,832 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,957 UART: [kat] ++
898,109 UART: [kat] sha1
902,325 UART: [kat] SHA2-256
904,265 UART: [kat] SHA2-384
907,000 UART: [kat] SHA2-512-ACC
908,901 UART: [kat] ECC-384
918,492 UART: [kat] HMAC-384Kdf
923,084 UART: [kat] LMS
1,171,412 UART: [kat] --
1,172,339 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,394 UART: [idev] ++
1,175,562 UART: [idev] CDI.KEYID = 6
1,175,922 UART: [idev] SUBJECT.KEYID = 7
1,176,346 UART: [idev] UDS.KEYID = 0
1,176,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,096 UART: [idev] Erasing UDS.KEYID = 0
1,201,035 UART: [idev] Sha1 KeyId Algorithm
1,209,463 UART: [idev] --
1,210,453 UART: [ldev] ++
1,210,621 UART: [ldev] CDI.KEYID = 6
1,210,984 UART: [ldev] SUBJECT.KEYID = 5
1,211,410 UART: [ldev] AUTHORITY.KEYID = 7
1,211,873 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,244,186 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,217 UART: [ldev] --
1,283,590 UART: [fwproc] Wait for Commands...
1,284,202 UART: [fwproc] Recv command 0x46574c44
1,284,930 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,850 UART: ROM Fatal Error: 0x000B0025
1,591,007 >>> mbox cmd response: failed
1,591,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,013 >>> mbox cmd response: failed
1,591,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Unprovisioned
85,633 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,310 UART: [kat] SHA2-256
892,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,085 UART: [kat] ++
897,237 UART: [kat] sha1
901,331 UART: [kat] SHA2-256
903,271 UART: [kat] SHA2-384
906,068 UART: [kat] SHA2-512-ACC
907,969 UART: [kat] ECC-384
917,902 UART: [kat] HMAC-384Kdf
922,404 UART: [kat] LMS
1,170,732 UART: [kat] --
1,171,965 UART: [cold-reset] ++
1,172,467 UART: [fht] FHT @ 0x50003400
1,174,976 UART: [idev] ++
1,175,144 UART: [idev] CDI.KEYID = 6
1,175,504 UART: [idev] SUBJECT.KEYID = 7
1,175,928 UART: [idev] UDS.KEYID = 0
1,176,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,950 UART: [idev] Erasing UDS.KEYID = 0
1,200,379 UART: [idev] Sha1 KeyId Algorithm
1,208,917 UART: [idev] --
1,210,071 UART: [ldev] ++
1,210,239 UART: [ldev] CDI.KEYID = 6
1,210,602 UART: [ldev] SUBJECT.KEYID = 5
1,211,028 UART: [ldev] AUTHORITY.KEYID = 7
1,211,491 UART: [ldev] FE.KEYID = 1
1,216,925 UART: [ldev] Erasing FE.KEYID = 1
1,243,176 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,725 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,332 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,927 UART: [ldev] --
1,282,314 UART: [fwproc] Wait for Commands...
1,282,996 UART: [fwproc] Recv command 0x46574c44
1,283,724 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,170 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,059 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,412 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,376 >>> mbox cmd response: failed
1,444,376 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,382 >>> mbox cmd response: failed
1,444,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,388 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,709 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Manufacturing
85,834 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,625 UART: [kat] SHA2-256
893,275 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,400 UART: [kat] ++
897,552 UART: [kat] sha1
901,812 UART: [kat] SHA2-256
903,752 UART: [kat] SHA2-384
906,585 UART: [kat] SHA2-512-ACC
908,486 UART: [kat] ECC-384
918,467 UART: [kat] HMAC-384Kdf
923,175 UART: [kat] LMS
1,171,503 UART: [kat] --
1,172,384 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,607 UART: [idev] ++
1,175,775 UART: [idev] CDI.KEYID = 6
1,176,135 UART: [idev] SUBJECT.KEYID = 7
1,176,559 UART: [idev] UDS.KEYID = 0
1,176,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,524 UART: [idev] Sha1 KeyId Algorithm
1,209,756 UART: [idev] --
1,210,984 UART: [ldev] ++
1,211,152 UART: [ldev] CDI.KEYID = 6
1,211,515 UART: [ldev] SUBJECT.KEYID = 5
1,211,941 UART: [ldev] AUTHORITY.KEYID = 7
1,212,404 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,381 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,739 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,818 UART: [ldev] --
1,284,247 UART: [fwproc] Wait for Commands...
1,284,819 UART: [fwproc] Recv command 0x46574c44
1,285,547 UART: [fwproc] Recv'd Img size: 118548 bytes
1,590,309 UART: ROM Fatal Error: 0x000B0025
1,591,466 >>> mbox cmd response: failed
1,591,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,472 >>> mbox cmd response: failed
1,591,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,591,478 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,570 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
893,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,522 UART: [kat] ++
897,674 UART: [kat] sha1
901,808 UART: [kat] SHA2-256
903,748 UART: [kat] SHA2-384
906,541 UART: [kat] SHA2-512-ACC
908,442 UART: [kat] ECC-384
918,181 UART: [kat] HMAC-384Kdf
922,771 UART: [kat] LMS
1,171,099 UART: [kat] --
1,172,066 UART: [cold-reset] ++
1,172,630 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,173 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,354 UART: [idev] --
1,210,458 UART: [ldev] ++
1,210,626 UART: [ldev] CDI.KEYID = 6
1,210,989 UART: [ldev] SUBJECT.KEYID = 5
1,211,415 UART: [ldev] AUTHORITY.KEYID = 7
1,211,878 UART: [ldev] FE.KEYID = 1
1,217,192 UART: [ldev] Erasing FE.KEYID = 1
1,243,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,558 UART: [ldev] --
1,282,859 UART: [fwproc] Wait for Commands...
1,283,671 UART: [fwproc] Recv command 0x46574c44
1,284,399 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,798 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,968 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,363 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,445,191 >>> mbox cmd response: failed
1,445,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,197 >>> mbox cmd response: failed
1,445,197 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,445,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,610 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,156 UART:
192,510 UART: Running Caliptra ROM ...
193,626 UART:
193,770 UART: [state] CFI Enabled
267,292 UART: [state] LifecycleState = Manufacturing
269,246 UART: [state] DebugLocked = No
270,818 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,439 UART: [kat] SHA2-256
445,126 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,652 UART: [kat] ++
456,134 UART: [kat] sha1
466,959 UART: [kat] SHA2-256
469,661 UART: [kat] SHA2-384
473,912 UART: [kat] SHA2-512-ACC
476,253 UART: [kat] ECC-384
2,765,477 UART: [kat] HMAC-384Kdf
2,778,782 UART: [kat] LMS
3,969,052 UART: [kat] --
3,972,107 UART: [cold-reset] ++
3,973,964 UART: [fht] Storing FHT @ 0x50003400
3,986,106 UART: [idev] ++
3,986,734 UART: [idev] CDI.KEYID = 6
3,987,666 UART: [idev] SUBJECT.KEYID = 7
3,988,885 UART: [idev] UDS.KEYID = 0
3,992,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,347 UART: [idev] Erasing UDS.KEYID = 0
7,322,687 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,136 UART: [idev] --
7,347,943 UART: [ldev] ++
7,348,519 UART: [ldev] CDI.KEYID = 6
7,349,462 UART: [ldev] SUBJECT.KEYID = 5
7,350,679 UART: [ldev] AUTHORITY.KEYID = 7
7,351,973 UART: [ldev] FE.KEYID = 1
7,380,429 UART: [ldev] Erasing FE.KEYID = 1
10,710,795 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,006,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,021,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,035,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,050,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,070,738 UART: [ldev] --
13,074,611 UART: [fwproc] Waiting for Commands...
13,077,529 UART: [fwproc] Received command 0x46574c44
13,079,723 UART: [fwproc] Received Image of size 118548 bytes
16,069,010 UART: ROM Fatal Error: 0x000B0027
16,072,472 >>> mbox cmd response: failed
16,072,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,073,305 >>> mbox cmd response: failed
16,073,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,073,880 >>> mbox cmd response: failed
Initializing fuses
2,058,853 writing to cptra_bootfsm_go
2,248,167 UART:
2,248,508 UART: Running Caliptra ROM ...
2,249,559 UART:
2,249,709 UART: [state] CFI Enabled
2,321,816 UART: [state] LifecycleState = Manufacturing
2,323,809 UART: [state] DebugLocked = No
2,325,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,040 UART: [kat] SHA2-256
2,500,733 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,238 UART: [kat] ++
2,511,753 UART: [kat] sha1
2,523,290 UART: [kat] SHA2-256
2,525,977 UART: [kat] SHA2-384
2,532,233 UART: [kat] SHA2-512-ACC
2,534,589 UART: [kat] ECC-384
4,824,623 UART: [kat] HMAC-384Kdf
4,855,843 UART: [kat] LMS
6,046,152 UART: [kat] --
6,050,655 UART: [cold-reset] ++
6,052,921 UART: [fht] Storing FHT @ 0x50003400
6,064,835 UART: [idev] ++
6,065,439 UART: [idev] CDI.KEYID = 6
6,066,338 UART: [idev] SUBJECT.KEYID = 7
6,067,616 UART: [idev] UDS.KEYID = 0
6,069,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,219,096 UART: [idev] Erasing UDS.KEYID = 0
9,398,668 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,649 UART: [idev] --
9,424,028 UART: [ldev] ++
9,424,666 UART: [ldev] CDI.KEYID = 6
9,425,583 UART: [ldev] SUBJECT.KEYID = 5
9,426,853 UART: [ldev] AUTHORITY.KEYID = 7
9,428,114 UART: [ldev] FE.KEYID = 1
9,457,998 UART: [ldev] Erasing FE.KEYID = 1
12,789,644 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,084,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,099,190 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,114,040 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,128,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,753 UART: [ldev] --
15,152,205 UART: [fwproc] Waiting for Commands...
15,154,738 UART: [fwproc] Received command 0x46574c44
15,156,930 UART: [fwproc] Received Image of size 118548 bytes
19,292,410 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,369,031 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,442,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,770,012 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,941 writing to cptra_bootfsm_go
3,810,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,904,099 >>> mbox cmd response: failed
15,904,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,905,125 >>> mbox cmd response: failed
15,905,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,905,699 >>> mbox cmd response: failed
Initializing fuses
2,055,565 writing to cptra_bootfsm_go
5,825,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,012,969 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,637 UART:
193,003 UART: Running Caliptra ROM ...
194,209 UART:
603,846 UART: [state] CFI Enabled
618,858 UART: [state] LifecycleState = Manufacturing
620,813 UART: [state] DebugLocked = No
623,597 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,205 UART: [kat] SHA2-256
797,804 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,374 UART: [kat] ++
808,857 UART: [kat] sha1
819,529 UART: [kat] SHA2-256
822,217 UART: [kat] SHA2-384
827,768 UART: [kat] SHA2-512-ACC
830,113 UART: [kat] ECC-384
3,112,626 UART: [kat] HMAC-384Kdf
3,126,027 UART: [kat] LMS
4,316,159 UART: [kat] --
4,320,012 UART: [cold-reset] ++
4,321,149 UART: [fht] Storing FHT @ 0x50003400
4,333,289 UART: [idev] ++
4,333,872 UART: [idev] CDI.KEYID = 6
4,334,895 UART: [idev] SUBJECT.KEYID = 7
4,336,061 UART: [idev] UDS.KEYID = 0
4,339,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,288 UART: [idev] Erasing UDS.KEYID = 0
7,625,991 UART: [idev] Using Sha1 for KeyId Algorithm
7,647,294 UART: [idev] --
7,651,896 UART: [ldev] ++
7,652,474 UART: [ldev] CDI.KEYID = 6
7,653,395 UART: [ldev] SUBJECT.KEYID = 5
7,654,554 UART: [ldev] AUTHORITY.KEYID = 7
7,655,910 UART: [ldev] FE.KEYID = 1
7,667,918 UART: [ldev] Erasing FE.KEYID = 1
10,958,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,326 UART: [ldev] --
13,315,895 UART: [fwproc] Waiting for Commands...
13,317,587 UART: [fwproc] Received command 0x46574c44
13,319,791 UART: [fwproc] Received Image of size 118548 bytes
16,311,899 UART: ROM Fatal Error: 0x000B0027
16,315,355 >>> mbox cmd response: failed
16,315,821 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,316,163 >>> mbox cmd response: failed
16,316,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,316,735 >>> mbox cmd response: failed
Initializing fuses
2,062,059 writing to cptra_bootfsm_go
2,251,448 UART:
2,251,786 UART: Running Caliptra ROM ...
2,252,932 UART:
4,151,565 UART: [state] CFI Enabled
4,166,353 UART: [state] LifecycleState = Manufacturing
4,168,270 UART: [state] DebugLocked = No
4,170,205 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,175,547 UART: [kat] SHA2-256
4,345,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,355,871 UART: [kat] ++
4,356,419 UART: [kat] sha1
4,367,432 UART: [kat] SHA2-256
4,370,129 UART: [kat] SHA2-384
4,375,150 UART: [kat] SHA2-512-ACC
4,377,514 UART: [kat] ECC-384
6,661,566 UART: [kat] HMAC-384Kdf
6,673,014 UART: [kat] LMS
7,863,116 UART: [kat] --
7,868,411 UART: [cold-reset] ++
7,870,580 UART: [fht] Storing FHT @ 0x50003400
7,880,557 UART: [idev] ++
7,881,131 UART: [idev] CDI.KEYID = 6
7,882,020 UART: [idev] SUBJECT.KEYID = 7
7,883,248 UART: [idev] UDS.KEYID = 0
7,885,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,034,807 UART: [idev] Erasing UDS.KEYID = 0
11,172,471 UART: [idev] Using Sha1 for KeyId Algorithm
11,194,236 UART: [idev] --
11,198,424 UART: [ldev] ++
11,199,003 UART: [ldev] CDI.KEYID = 6
11,199,926 UART: [ldev] SUBJECT.KEYID = 5
11,201,190 UART: [ldev] AUTHORITY.KEYID = 7
11,202,436 UART: [ldev] FE.KEYID = 1
11,214,549 UART: [ldev] Erasing FE.KEYID = 1
14,504,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,793,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,807,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,822,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,837,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,856,729 UART: [ldev] --
16,862,271 UART: [fwproc] Waiting for Commands...
16,865,292 UART: [fwproc] Received command 0x46574c44
16,867,485 UART: [fwproc] Received Image of size 118548 bytes
21,011,555 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,083,964 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,157,144 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,484,984 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
4,135,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,098,659 >>> mbox cmd response: failed
16,099,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,099,752 >>> mbox cmd response: failed
16,100,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,100,350 >>> mbox cmd response: failed
Initializing fuses
2,054,278 writing to cptra_bootfsm_go
7,907,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,983,035 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
192,199 UART:
192,564 UART: Running Caliptra ROM ...
193,662 UART:
193,804 UART: [state] CFI Enabled
257,673 UART: [state] LifecycleState = Manufacturing
259,628 UART: [state] DebugLocked = No
261,331 UART: [state] WD Timer not started. Device not locked for debugging
265,517 UART: [kat] SHA2-256
445,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,908 UART: [kat] ++
456,368 UART: [kat] sha1
467,519 UART: [kat] SHA2-256
470,221 UART: [kat] SHA2-384
475,557 UART: [kat] SHA2-512-ACC
477,895 UART: [kat] ECC-384
2,925,468 UART: [kat] HMAC-384Kdf
2,948,021 UART: [kat] LMS
3,424,534 UART: [kat] --
3,427,991 UART: [cold-reset] ++
3,429,553 UART: [fht] FHT @ 0x50003400
3,439,511 UART: [idev] ++
3,440,134 UART: [idev] CDI.KEYID = 6
3,441,068 UART: [idev] SUBJECT.KEYID = 7
3,442,288 UART: [idev] UDS.KEYID = 0
3,445,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,399 UART: [idev] Erasing UDS.KEYID = 0
5,962,847 UART: [idev] Sha1 KeyId Algorithm
5,986,704 UART: [idev] --
5,991,228 UART: [ldev] ++
5,991,815 UART: [ldev] CDI.KEYID = 6
5,992,739 UART: [ldev] SUBJECT.KEYID = 5
5,993,902 UART: [ldev] AUTHORITY.KEYID = 7
5,995,201 UART: [ldev] FE.KEYID = 1
6,034,325 UART: [ldev] Erasing FE.KEYID = 1
8,539,770 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,295 UART: [ldev] --
10,349,382 UART: [fwproc] Wait for Commands...
10,351,863 UART: [fwproc] Recv command 0x46574c44
10,353,853 UART: [fwproc] Recv'd Img size: 118548 bytes
12,715,292 UART: ROM Fatal Error: 0x000B0027
12,718,539 >>> mbox cmd response: failed
12,718,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,358 >>> mbox cmd response: failed
12,719,629 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,719,926 >>> mbox cmd response: failed
Initializing fuses
2,055,211 writing to cptra_bootfsm_go
2,244,493 UART:
2,244,868 UART: Running Caliptra ROM ...
2,245,915 UART:
2,246,068 UART: [state] CFI Enabled
2,304,705 UART: [state] LifecycleState = Manufacturing
2,306,646 UART: [state] DebugLocked = No
2,307,959 UART: [state] WD Timer not started. Device not locked for debugging
2,312,137 UART: [kat] SHA2-256
2,491,764 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,502,541 UART: [kat] ++
2,503,011 UART: [kat] sha1
2,513,826 UART: [kat] SHA2-256
2,516,536 UART: [kat] SHA2-384
2,521,182 UART: [kat] SHA2-512-ACC
2,523,532 UART: [kat] ECC-384
4,966,257 UART: [kat] HMAC-384Kdf
4,989,766 UART: [kat] LMS
5,466,310 UART: [kat] --
5,471,184 UART: [cold-reset] ++
5,472,426 UART: [fht] FHT @ 0x50003400
5,483,516 UART: [idev] ++
5,484,088 UART: [idev] CDI.KEYID = 6
5,485,114 UART: [idev] SUBJECT.KEYID = 7
5,486,276 UART: [idev] UDS.KEYID = 0
5,489,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,638,230 UART: [idev] Erasing UDS.KEYID = 0
8,003,689 UART: [idev] Sha1 KeyId Algorithm
8,028,518 UART: [idev] --
8,032,850 UART: [ldev] ++
8,033,426 UART: [ldev] CDI.KEYID = 6
8,034,347 UART: [ldev] SUBJECT.KEYID = 5
8,035,574 UART: [ldev] AUTHORITY.KEYID = 7
8,036,830 UART: [ldev] FE.KEYID = 1
8,076,661 UART: [ldev] Erasing FE.KEYID = 1
10,582,417 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,319,953 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,335,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,351,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,367,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,388,963 UART: [ldev] --
12,395,115 UART: [fwproc] Wait for Commands...
12,397,006 UART: [fwproc] Recv command 0x46574c44
12,399,008 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,053 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,250 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,066,287 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,371 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,464,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,639,509 >>> mbox cmd response: failed
12,640,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,640,476 >>> mbox cmd response: failed
12,640,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,641,066 >>> mbox cmd response: failed
Initializing fuses
2,054,061 writing to cptra_bootfsm_go
5,496,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,312,707 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,703 UART:
193,065 UART: Running Caliptra ROM ...
194,252 UART:
603,809 UART: [state] CFI Enabled
617,049 UART: [state] LifecycleState = Manufacturing
619,015 UART: [state] DebugLocked = No
620,374 UART: [state] WD Timer not started. Device not locked for debugging
624,916 UART: [kat] SHA2-256
804,589 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,342 UART: [kat] ++
815,827 UART: [kat] sha1
827,086 UART: [kat] SHA2-256
829,774 UART: [kat] SHA2-384
836,295 UART: [kat] SHA2-512-ACC
838,643 UART: [kat] ECC-384
3,281,068 UART: [kat] HMAC-384Kdf
3,293,524 UART: [kat] LMS
3,770,060 UART: [kat] --
3,773,355 UART: [cold-reset] ++
3,775,991 UART: [fht] FHT @ 0x50003400
3,787,837 UART: [idev] ++
3,788,427 UART: [idev] CDI.KEYID = 6
3,789,395 UART: [idev] SUBJECT.KEYID = 7
3,790,613 UART: [idev] UDS.KEYID = 0
3,793,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,644 UART: [idev] Erasing UDS.KEYID = 0
6,269,059 UART: [idev] Sha1 KeyId Algorithm
6,293,007 UART: [idev] --
6,296,527 UART: [ldev] ++
6,297,103 UART: [ldev] CDI.KEYID = 6
6,298,013 UART: [ldev] SUBJECT.KEYID = 5
6,299,235 UART: [ldev] AUTHORITY.KEYID = 7
6,300,473 UART: [ldev] FE.KEYID = 1
6,311,071 UART: [ldev] Erasing FE.KEYID = 1
8,791,234 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,359 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,379 UART: [ldev] --
10,585,186 UART: [fwproc] Wait for Commands...
10,588,050 UART: [fwproc] Recv command 0x46574c44
10,590,101 UART: [fwproc] Recv'd Img size: 118548 bytes
12,948,859 UART: ROM Fatal Error: 0x000B0027
12,952,087 >>> mbox cmd response: failed
12,952,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,952,866 >>> mbox cmd response: failed
12,953,134 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,953,430 >>> mbox cmd response: failed
Initializing fuses
2,054,877 writing to cptra_bootfsm_go
2,244,153 UART:
2,244,493 UART: Running Caliptra ROM ...
2,245,767 UART:
7,506,012 UART: [state] CFI Enabled
7,521,078 UART: [state] LifecycleState = Manufacturing
7,523,006 UART: [state] DebugLocked = No
7,525,654 UART: [state] WD Timer not started. Device not locked for debugging
7,529,884 UART: [kat] SHA2-256
7,709,510 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,720,309 UART: [kat] ++
7,720,859 UART: [kat] sha1
7,732,248 UART: [kat] SHA2-256
7,734,937 UART: [kat] SHA2-384
7,739,951 UART: [kat] SHA2-512-ACC
7,742,314 UART: [kat] ECC-384
10,182,768 UART: [kat] HMAC-384Kdf
10,194,187 UART: [kat] LMS
10,670,674 UART: [kat] --
10,674,873 UART: [cold-reset] ++
10,675,995 UART: [fht] FHT @ 0x50003400
10,688,429 UART: [idev] ++
10,688,993 UART: [idev] CDI.KEYID = 6
10,689,933 UART: [idev] SUBJECT.KEYID = 7
10,691,205 UART: [idev] UDS.KEYID = 0
10,694,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,843,590 UART: [idev] Erasing UDS.KEYID = 0
13,169,530 UART: [idev] Sha1 KeyId Algorithm
13,192,441 UART: [idev] --
13,197,516 UART: [ldev] ++
13,198,089 UART: [ldev] CDI.KEYID = 6
13,199,074 UART: [ldev] SUBJECT.KEYID = 5
13,200,258 UART: [ldev] AUTHORITY.KEYID = 7
13,201,495 UART: [ldev] FE.KEYID = 1
13,210,364 UART: [ldev] Erasing FE.KEYID = 1
15,684,257 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,403,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,419,639 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,435,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,451,114 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,472,923 UART: [ldev] --
17,478,789 UART: [fwproc] Wait for Commands...
17,481,487 UART: [fwproc] Recv command 0x46574c44
17,483,535 UART: [fwproc] Recv'd Img size: 118548 bytes
20,999,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,076,044 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,149,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,478,132 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
3,783,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,832,615 >>> mbox cmd response: failed
12,833,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,833,656 >>> mbox cmd response: failed
12,833,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,834,243 >>> mbox cmd response: failed
Initializing fuses
2,059,475 writing to cptra_bootfsm_go
10,812,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,519,251 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,110 UART:
192,470 UART: Running Caliptra ROM ...
193,571 UART:
193,720 UART: [state] CFI Enabled
265,429 UART: [state] LifecycleState = Manufacturing
267,826 UART: [state] DebugLocked = No
269,509 UART: [state] WD Timer not started. Device not locked for debugging
274,647 UART: [kat] SHA2-256
464,491 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,289 UART: [kat] ++
475,739 UART: [kat] sha1
486,133 UART: [kat] SHA2-256
489,145 UART: [kat] SHA2-384
495,164 UART: [kat] SHA2-512-ACC
497,785 UART: [kat] ECC-384
2,947,812 UART: [kat] HMAC-384Kdf
2,972,245 UART: [kat] LMS
3,504,007 UART: [kat] --
3,509,793 UART: [cold-reset] ++
3,511,084 UART: [fht] FHT @ 0x50003400
3,521,922 UART: [idev] ++
3,522,622 UART: [idev] CDI.KEYID = 6
3,523,514 UART: [idev] SUBJECT.KEYID = 7
3,524,738 UART: [idev] UDS.KEYID = 0
3,527,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,787 UART: [idev] Erasing UDS.KEYID = 0
6,031,993 UART: [idev] Sha1 KeyId Algorithm
6,055,617 UART: [idev] --
6,060,434 UART: [ldev] ++
6,061,126 UART: [ldev] CDI.KEYID = 6
6,062,043 UART: [ldev] SUBJECT.KEYID = 5
6,063,213 UART: [ldev] AUTHORITY.KEYID = 7
6,064,398 UART: [ldev] FE.KEYID = 1
6,099,640 UART: [ldev] Erasing FE.KEYID = 1
8,607,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,889 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,774 UART: [ldev] --
10,411,500 UART: [fwproc] Wait for Commands...
10,414,187 UART: [fwproc] Recv command 0x46574c44
10,416,457 UART: [fwproc] Recv'd Img size: 118548 bytes
12,786,275 UART: ROM Fatal Error: 0x000B0027
12,789,943 >>> mbox cmd response: failed
12,790,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,790,648 >>> mbox cmd response: failed
12,790,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,791,218 >>> mbox cmd response: failed
Initializing fuses
2,055,752 writing to cptra_bootfsm_go
2,245,102 UART:
2,245,461 UART: Running Caliptra ROM ...
2,246,708 UART:
2,246,889 UART: [state] CFI Enabled
2,316,532 UART: [state] LifecycleState = Manufacturing
2,318,957 UART: [state] DebugLocked = No
2,320,300 UART: [state] WD Timer not started. Device not locked for debugging
2,325,508 UART: [kat] SHA2-256
2,515,401 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,134 UART: [kat] ++
2,526,632 UART: [kat] sha1
2,538,551 UART: [kat] SHA2-256
2,541,577 UART: [kat] SHA2-384
2,548,112 UART: [kat] SHA2-512-ACC
2,550,692 UART: [kat] ECC-384
5,003,176 UART: [kat] HMAC-384Kdf
5,026,704 UART: [kat] LMS
5,558,483 UART: [kat] --
5,563,214 UART: [cold-reset] ++
5,564,508 UART: [fht] FHT @ 0x50003400
5,577,168 UART: [idev] ++
5,577,858 UART: [idev] CDI.KEYID = 6
5,578,769 UART: [idev] SUBJECT.KEYID = 7
5,579,986 UART: [idev] UDS.KEYID = 0
5,582,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,972 UART: [idev] Erasing UDS.KEYID = 0
8,078,933 UART: [idev] Sha1 KeyId Algorithm
8,101,900 UART: [idev] --
8,105,768 UART: [ldev] ++
8,106,468 UART: [ldev] CDI.KEYID = 6
8,107,382 UART: [ldev] SUBJECT.KEYID = 5
8,108,570 UART: [ldev] AUTHORITY.KEYID = 7
8,109,757 UART: [ldev] FE.KEYID = 1
8,153,082 UART: [ldev] Erasing FE.KEYID = 1
10,660,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,877 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,544 UART: [ldev] --
12,465,217 UART: [fwproc] Wait for Commands...
12,468,289 UART: [fwproc] Recv command 0x46574c44
12,470,605 UART: [fwproc] Recv'd Img size: 118548 bytes
15,993,654 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,195,985 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,755,457 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,441,820 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,712,283 >>> mbox cmd response: failed
12,712,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,364 >>> mbox cmd response: failed
12,713,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,713,936 >>> mbox cmd response: failed
Initializing fuses
2,050,663 writing to cptra_bootfsm_go
5,484,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,915,607 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,338 writing to cptra_bootfsm_go
192,548 UART:
192,906 UART: Running Caliptra ROM ...
194,093 UART:
603,789 UART: [state] CFI Enabled
617,896 UART: [state] LifecycleState = Manufacturing
620,290 UART: [state] DebugLocked = No
622,073 UART: [state] WD Timer not started. Device not locked for debugging
626,638 UART: [kat] SHA2-256
816,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,290 UART: [kat] ++
827,891 UART: [kat] sha1
840,077 UART: [kat] SHA2-256
843,101 UART: [kat] SHA2-384
850,708 UART: [kat] SHA2-512-ACC
853,290 UART: [kat] ECC-384
3,293,638 UART: [kat] HMAC-384Kdf
3,308,274 UART: [kat] LMS
3,840,104 UART: [kat] --
3,841,838 UART: [cold-reset] ++
3,843,241 UART: [fht] FHT @ 0x50003400
3,854,768 UART: [idev] ++
3,855,459 UART: [idev] CDI.KEYID = 6
3,856,380 UART: [idev] SUBJECT.KEYID = 7
3,857,599 UART: [idev] UDS.KEYID = 0
3,860,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,028 UART: [idev] Erasing UDS.KEYID = 0
6,335,054 UART: [idev] Sha1 KeyId Algorithm
6,357,442 UART: [idev] --
6,361,986 UART: [ldev] ++
6,362,674 UART: [ldev] CDI.KEYID = 6
6,363,605 UART: [ldev] SUBJECT.KEYID = 5
6,364,770 UART: [ldev] AUTHORITY.KEYID = 7
6,366,036 UART: [ldev] FE.KEYID = 1
6,377,242 UART: [ldev] Erasing FE.KEYID = 1
8,855,261 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,968 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,469 UART: [ldev] --
10,642,469 UART: [fwproc] Wait for Commands...
10,645,435 UART: [fwproc] Recv command 0x46574c44
10,647,700 UART: [fwproc] Recv'd Img size: 118548 bytes
13,022,059 UART: ROM Fatal Error: 0x000B0027
13,025,742 >>> mbox cmd response: failed
13,026,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,026,426 >>> mbox cmd response: failed
13,026,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,027,144 >>> mbox cmd response: failed
Initializing fuses
2,062,544 writing to cptra_bootfsm_go
2,251,870 UART:
2,252,220 UART: Running Caliptra ROM ...
2,253,364 UART:
7,431,150 UART: [state] CFI Enabled
7,444,280 UART: [state] LifecycleState = Manufacturing
7,446,696 UART: [state] DebugLocked = No
7,449,554 UART: [state] WD Timer not started. Device not locked for debugging
7,454,034 UART: [kat] SHA2-256
7,643,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,654,729 UART: [kat] ++
7,655,241 UART: [kat] sha1
7,667,327 UART: [kat] SHA2-256
7,670,296 UART: [kat] SHA2-384
7,676,060 UART: [kat] SHA2-512-ACC
7,678,645 UART: [kat] ECC-384
10,117,199 UART: [kat] HMAC-384Kdf
10,129,706 UART: [kat] LMS
10,661,529 UART: [kat] --
10,665,680 UART: [cold-reset] ++
10,667,240 UART: [fht] FHT @ 0x50003400
10,679,417 UART: [idev] ++
10,680,147 UART: [idev] CDI.KEYID = 6
10,681,085 UART: [idev] SUBJECT.KEYID = 7
10,682,302 UART: [idev] UDS.KEYID = 0
10,684,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,833,664 UART: [idev] Erasing UDS.KEYID = 0
13,163,101 UART: [idev] Sha1 KeyId Algorithm
13,184,619 UART: [idev] --
13,189,758 UART: [ldev] ++
13,190,480 UART: [ldev] CDI.KEYID = 6
13,191,392 UART: [ldev] SUBJECT.KEYID = 5
13,192,557 UART: [ldev] AUTHORITY.KEYID = 7
13,193,794 UART: [ldev] FE.KEYID = 1
13,202,708 UART: [ldev] Erasing FE.KEYID = 1
15,680,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,403,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,418,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,433,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,448,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,470,665 UART: [ldev] --
17,476,087 UART: [fwproc] Wait for Commands...
17,479,127 UART: [fwproc] Recv command 0x46574c44
17,481,420 UART: [fwproc] Recv'd Img size: 118548 bytes
21,011,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,091,144 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,214,792 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,774,441 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,753,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,924,915 >>> mbox cmd response: failed
12,925,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,049 >>> mbox cmd response: failed
12,926,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,905 >>> mbox cmd response: failed
Initializing fuses
2,049,192 writing to cptra_bootfsm_go
10,701,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,036,124 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Manufacturing
85,913 UART: [state] DebugLocked = No
86,451 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,551 UART: [kat] SHA2-256
892,489 UART: [kat] SHA2-384
895,298 UART: [kat] SHA2-512-ACC
897,199 UART: [kat] ECC-384
902,846 UART: [kat] HMAC-384Kdf
907,550 UART: [kat] LMS
1,475,746 UART: [kat] --
1,476,575 UART: [cold-reset] ++
1,477,089 UART: [fht] Storing FHT @ 0x50003400
1,480,074 UART: [idev] ++
1,480,242 UART: [idev] CDI.KEYID = 6
1,480,602 UART: [idev] SUBJECT.KEYID = 7
1,481,026 UART: [idev] UDS.KEYID = 0
1,481,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,920 UART: [idev] Erasing UDS.KEYID = 0
1,505,524 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,140 UART: [idev] --
1,515,089 UART: [ldev] ++
1,515,257 UART: [ldev] CDI.KEYID = 6
1,515,620 UART: [ldev] SUBJECT.KEYID = 5
1,516,046 UART: [ldev] AUTHORITY.KEYID = 7
1,516,509 UART: [ldev] FE.KEYID = 1
1,521,669 UART: [ldev] Erasing FE.KEYID = 1
1,546,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,223 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,812 UART: [ldev] --
1,586,205 UART: [fwproc] Waiting for Commands...
1,586,880 UART: [fwproc] Received command 0x46574c44
1,587,671 UART: [fwproc] Received Image of size 118548 bytes
1,892,543 UART: ROM Fatal Error: 0x000B0027
1,893,700 >>> mbox cmd response: failed
1,893,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,893,706 >>> mbox cmd response: failed
1,893,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,893,712 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,354 UART: [state] LifecycleState = Unprovisioned
86,009 UART: [state] DebugLocked = No
86,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,265 UART: [kat] SHA2-256
882,196 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,311 UART: [kat] ++
886,463 UART: [kat] sha1
890,785 UART: [kat] SHA2-256
892,723 UART: [kat] SHA2-384
895,648 UART: [kat] SHA2-512-ACC
897,549 UART: [kat] ECC-384
903,308 UART: [kat] HMAC-384Kdf
908,032 UART: [kat] LMS
1,476,228 UART: [kat] --
1,477,319 UART: [cold-reset] ++
1,477,709 UART: [fht] Storing FHT @ 0x50003400
1,480,598 UART: [idev] ++
1,480,766 UART: [idev] CDI.KEYID = 6
1,481,126 UART: [idev] SUBJECT.KEYID = 7
1,481,550 UART: [idev] UDS.KEYID = 0
1,481,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,320 UART: [idev] Erasing UDS.KEYID = 0
1,505,504 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,170 UART: [idev] --
1,515,219 UART: [ldev] ++
1,515,387 UART: [ldev] CDI.KEYID = 6
1,515,750 UART: [ldev] SUBJECT.KEYID = 5
1,516,176 UART: [ldev] AUTHORITY.KEYID = 7
1,516,639 UART: [ldev] FE.KEYID = 1
1,521,747 UART: [ldev] Erasing FE.KEYID = 1
1,547,088 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,635 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,351 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,002 UART: [ldev] --
1,586,473 UART: [fwproc] Waiting for Commands...
1,587,170 UART: [fwproc] Received command 0x46574c44
1,587,961 UART: [fwproc] Received Image of size 118548 bytes
2,932,192 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,196 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,414 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,739 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,743,749 >>> mbox cmd response: failed
1,743,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,743,755 >>> mbox cmd response: failed
1,743,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,743,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,613 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Manufacturing
85,824 UART: [state] DebugLocked = No
86,546 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,050 UART: [kat] SHA2-256
881,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,096 UART: [kat] ++
886,248 UART: [kat] sha1
890,660 UART: [kat] SHA2-256
892,598 UART: [kat] SHA2-384
895,383 UART: [kat] SHA2-512-ACC
897,284 UART: [kat] ECC-384
902,999 UART: [kat] HMAC-384Kdf
907,615 UART: [kat] LMS
1,475,811 UART: [kat] --
1,476,842 UART: [cold-reset] ++
1,477,300 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,323 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,933 UART: [idev] --
1,515,012 UART: [ldev] ++
1,515,180 UART: [ldev] CDI.KEYID = 6
1,515,543 UART: [ldev] SUBJECT.KEYID = 5
1,515,969 UART: [ldev] AUTHORITY.KEYID = 7
1,516,432 UART: [ldev] FE.KEYID = 1
1,521,550 UART: [ldev] Erasing FE.KEYID = 1
1,547,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,910 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,801 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,513 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,473 UART: [ldev] --
1,586,896 UART: [fwproc] Waiting for Commands...
1,587,699 UART: [fwproc] Received command 0x46574c44
1,588,490 UART: [fwproc] Received Image of size 118548 bytes
1,894,036 UART: ROM Fatal Error: 0x000B0027
1,895,193 >>> mbox cmd response: failed
1,895,193 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,199 >>> mbox cmd response: failed
1,895,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,895,205 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,955 UART: [state] LifecycleState = Unprovisioned
85,610 UART: [state] DebugLocked = No
86,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,830 UART: [kat] SHA2-256
881,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,876 UART: [kat] ++
886,028 UART: [kat] sha1
890,376 UART: [kat] SHA2-256
892,314 UART: [kat] SHA2-384
895,023 UART: [kat] SHA2-512-ACC
896,924 UART: [kat] ECC-384
902,357 UART: [kat] HMAC-384Kdf
907,219 UART: [kat] LMS
1,475,415 UART: [kat] --
1,476,222 UART: [cold-reset] ++
1,476,738 UART: [fht] Storing FHT @ 0x50003400
1,479,601 UART: [idev] ++
1,479,769 UART: [idev] CDI.KEYID = 6
1,480,129 UART: [idev] SUBJECT.KEYID = 7
1,480,553 UART: [idev] UDS.KEYID = 0
1,480,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,447 UART: [idev] Erasing UDS.KEYID = 0
1,505,741 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,271 UART: [idev] --
1,515,384 UART: [ldev] ++
1,515,552 UART: [ldev] CDI.KEYID = 6
1,515,915 UART: [ldev] SUBJECT.KEYID = 5
1,516,341 UART: [ldev] AUTHORITY.KEYID = 7
1,516,804 UART: [ldev] FE.KEYID = 1
1,522,154 UART: [ldev] Erasing FE.KEYID = 1
1,547,827 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,883 UART: [ldev] --
1,587,170 UART: [fwproc] Waiting for Commands...
1,587,921 UART: [fwproc] Received command 0x46574c44
1,588,712 UART: [fwproc] Received Image of size 118548 bytes
2,932,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,459 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,677 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,058 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,746,240 >>> mbox cmd response: failed
1,746,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,246 >>> mbox cmd response: failed
1,746,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,746,252 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,134 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Manufacturing
86,027 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
87,916 UART: [kat] SHA2-256
891,466 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,570 UART: [kat] ++
895,722 UART: [kat] sha1
900,026 UART: [kat] SHA2-256
901,966 UART: [kat] SHA2-384
904,855 UART: [kat] SHA2-512-ACC
906,756 UART: [kat] ECC-384
916,521 UART: [kat] HMAC-384Kdf
921,085 UART: [kat] LMS
1,169,397 UART: [kat] --
1,170,452 UART: [cold-reset] ++
1,170,838 UART: [fht] FHT @ 0x50003400
1,173,426 UART: [idev] ++
1,173,594 UART: [idev] CDI.KEYID = 6
1,173,955 UART: [idev] SUBJECT.KEYID = 7
1,174,380 UART: [idev] UDS.KEYID = 0
1,174,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,541 UART: [idev] Erasing UDS.KEYID = 0
1,198,693 UART: [idev] Sha1 KeyId Algorithm
1,207,567 UART: [idev] --
1,208,668 UART: [ldev] ++
1,208,836 UART: [ldev] CDI.KEYID = 6
1,209,200 UART: [ldev] SUBJECT.KEYID = 5
1,209,627 UART: [ldev] AUTHORITY.KEYID = 7
1,210,090 UART: [ldev] FE.KEYID = 1
1,215,558 UART: [ldev] Erasing FE.KEYID = 1
1,241,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,596 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,308 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,336 UART: [ldev] --
1,280,603 UART: [fwproc] Wait for Commands...
1,281,188 UART: [fwproc] Recv command 0x46574c44
1,281,921 UART: [fwproc] Recv'd Img size: 118548 bytes
1,585,894 UART: ROM Fatal Error: 0x000B0027
1,587,051 >>> mbox cmd response: failed
1,587,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,057 >>> mbox cmd response: failed
1,587,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,587,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,458 UART: [state] LifecycleState = Unprovisioned
85,113 UART: [state] DebugLocked = No
85,685 UART: [state] WD Timer not started. Device not locked for debugging
87,042 UART: [kat] SHA2-256
890,592 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,696 UART: [kat] ++
894,848 UART: [kat] sha1
898,938 UART: [kat] SHA2-256
900,878 UART: [kat] SHA2-384
903,447 UART: [kat] SHA2-512-ACC
905,348 UART: [kat] ECC-384
915,243 UART: [kat] HMAC-384Kdf
919,827 UART: [kat] LMS
1,168,139 UART: [kat] --
1,169,068 UART: [cold-reset] ++
1,169,574 UART: [fht] FHT @ 0x50003400
1,172,180 UART: [idev] ++
1,172,348 UART: [idev] CDI.KEYID = 6
1,172,709 UART: [idev] SUBJECT.KEYID = 7
1,173,134 UART: [idev] UDS.KEYID = 0
1,173,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,191 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,669 UART: [idev] --
1,207,774 UART: [ldev] ++
1,207,942 UART: [ldev] CDI.KEYID = 6
1,208,306 UART: [ldev] SUBJECT.KEYID = 5
1,208,733 UART: [ldev] AUTHORITY.KEYID = 7
1,209,196 UART: [ldev] FE.KEYID = 1
1,214,388 UART: [ldev] Erasing FE.KEYID = 1
1,240,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,554 UART: [ldev] --
1,279,957 UART: [fwproc] Wait for Commands...
1,280,702 UART: [fwproc] Recv command 0x46574c44
1,281,435 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,890 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,065 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,258 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,918 >>> mbox cmd response: failed
1,442,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,924 >>> mbox cmd response: failed
1,442,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,930 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,745 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Manufacturing
86,218 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
899,835 UART: [kat] SHA2-256
901,775 UART: [kat] SHA2-384
904,478 UART: [kat] SHA2-512-ACC
906,379 UART: [kat] ECC-384
916,024 UART: [kat] HMAC-384Kdf
920,698 UART: [kat] LMS
1,169,010 UART: [kat] --
1,169,891 UART: [cold-reset] ++
1,170,437 UART: [fht] FHT @ 0x50003400
1,173,257 UART: [idev] ++
1,173,425 UART: [idev] CDI.KEYID = 6
1,173,786 UART: [idev] SUBJECT.KEYID = 7
1,174,211 UART: [idev] UDS.KEYID = 0
1,174,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,074 UART: [idev] Erasing UDS.KEYID = 0
1,199,342 UART: [idev] Sha1 KeyId Algorithm
1,208,278 UART: [idev] --
1,209,167 UART: [ldev] ++
1,209,335 UART: [ldev] CDI.KEYID = 6
1,209,699 UART: [ldev] SUBJECT.KEYID = 5
1,210,126 UART: [ldev] AUTHORITY.KEYID = 7
1,210,589 UART: [ldev] FE.KEYID = 1
1,216,233 UART: [ldev] Erasing FE.KEYID = 1
1,242,544 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,622 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,338 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,939 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,971 UART: [ldev] --
1,282,354 UART: [fwproc] Wait for Commands...
1,282,969 UART: [fwproc] Recv command 0x46574c44
1,283,702 UART: [fwproc] Recv'd Img size: 118548 bytes
1,588,021 UART: ROM Fatal Error: 0x000B0027
1,589,178 >>> mbox cmd response: failed
1,589,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,184 >>> mbox cmd response: failed
1,589,184 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,589,190 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,469 UART: [state] LifecycleState = Unprovisioned
86,124 UART: [state] DebugLocked = No
86,628 UART: [state] WD Timer not started. Device not locked for debugging
87,751 UART: [kat] SHA2-256
891,301 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,405 UART: [kat] ++
895,557 UART: [kat] sha1
899,871 UART: [kat] SHA2-256
901,811 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
916,060 UART: [kat] HMAC-384Kdf
920,682 UART: [kat] LMS
1,168,994 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,173,233 UART: [idev] ++
1,173,401 UART: [idev] CDI.KEYID = 6
1,173,762 UART: [idev] SUBJECT.KEYID = 7
1,174,187 UART: [idev] UDS.KEYID = 0
1,174,533 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,254 UART: [idev] Erasing UDS.KEYID = 0
1,199,972 UART: [idev] Sha1 KeyId Algorithm
1,208,832 UART: [idev] --
1,209,765 UART: [ldev] ++
1,209,933 UART: [ldev] CDI.KEYID = 6
1,210,297 UART: [ldev] SUBJECT.KEYID = 5
1,210,724 UART: [ldev] AUTHORITY.KEYID = 7
1,211,187 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,242,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,808 UART: [fwproc] Wait for Commands...
1,282,471 UART: [fwproc] Recv command 0x46574c44
1,283,204 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,251 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,671 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,041 >>> mbox cmd response: failed
1,444,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,047 >>> mbox cmd response: failed
1,444,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,053 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,720 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Manufacturing
85,827 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
893,524 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,649 UART: [kat] ++
897,801 UART: [kat] sha1
902,093 UART: [kat] SHA2-256
904,033 UART: [kat] SHA2-384
906,774 UART: [kat] SHA2-512-ACC
908,675 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
923,056 UART: [kat] LMS
1,171,384 UART: [kat] --
1,172,519 UART: [cold-reset] ++
1,173,053 UART: [fht] FHT @ 0x50003400
1,175,706 UART: [idev] ++
1,175,874 UART: [idev] CDI.KEYID = 6
1,176,234 UART: [idev] SUBJECT.KEYID = 7
1,176,658 UART: [idev] UDS.KEYID = 0
1,177,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,585 UART: [idev] Sha1 KeyId Algorithm
1,209,113 UART: [idev] --
1,210,047 UART: [ldev] ++
1,210,215 UART: [ldev] CDI.KEYID = 6
1,210,578 UART: [ldev] SUBJECT.KEYID = 5
1,211,004 UART: [ldev] AUTHORITY.KEYID = 7
1,211,467 UART: [ldev] FE.KEYID = 1
1,216,833 UART: [ldev] Erasing FE.KEYID = 1
1,243,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,793 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,509 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,400 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,112 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,189 UART: [ldev] --
1,282,572 UART: [fwproc] Wait for Commands...
1,283,210 UART: [fwproc] Recv command 0x46574c44
1,283,938 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,172 UART: ROM Fatal Error: 0x000B0027
1,590,329 >>> mbox cmd response: failed
1,590,329 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,335 >>> mbox cmd response: failed
1,590,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,341 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,061 UART: [kat] SHA2-256
904,001 UART: [kat] SHA2-384
906,670 UART: [kat] SHA2-512-ACC
908,571 UART: [kat] ECC-384
918,336 UART: [kat] HMAC-384Kdf
922,928 UART: [kat] LMS
1,171,256 UART: [kat] --
1,171,929 UART: [cold-reset] ++
1,172,457 UART: [fht] FHT @ 0x50003400
1,175,154 UART: [idev] ++
1,175,322 UART: [idev] CDI.KEYID = 6
1,175,682 UART: [idev] SUBJECT.KEYID = 7
1,176,106 UART: [idev] UDS.KEYID = 0
1,176,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,642 UART: [idev] Erasing UDS.KEYID = 0
1,200,287 UART: [idev] Sha1 KeyId Algorithm
1,208,721 UART: [idev] --
1,209,647 UART: [ldev] ++
1,209,815 UART: [ldev] CDI.KEYID = 6
1,210,178 UART: [ldev] SUBJECT.KEYID = 5
1,210,604 UART: [ldev] AUTHORITY.KEYID = 7
1,211,067 UART: [ldev] FE.KEYID = 1
1,216,527 UART: [ldev] Erasing FE.KEYID = 1
1,243,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,739 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,455 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,414 UART: [fwproc] Wait for Commands...
1,283,140 UART: [fwproc] Recv command 0x46574c44
1,283,868 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,767 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,274 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,972 >>> mbox cmd response: failed
1,442,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,978 >>> mbox cmd response: failed
1,442,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,984 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,717 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,063 UART: [state] LifecycleState = Manufacturing
85,718 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,521 UART: [kat] SHA2-256
893,171 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,296 UART: [kat] ++
897,448 UART: [kat] sha1
901,752 UART: [kat] SHA2-256
903,692 UART: [kat] SHA2-384
906,447 UART: [kat] SHA2-512-ACC
908,348 UART: [kat] ECC-384
917,899 UART: [kat] HMAC-384Kdf
922,511 UART: [kat] LMS
1,170,839 UART: [kat] --
1,171,742 UART: [cold-reset] ++
1,172,212 UART: [fht] FHT @ 0x50003400
1,174,827 UART: [idev] ++
1,174,995 UART: [idev] CDI.KEYID = 6
1,175,355 UART: [idev] SUBJECT.KEYID = 7
1,175,779 UART: [idev] UDS.KEYID = 0
1,176,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,939 UART: [idev] Erasing UDS.KEYID = 0
1,200,612 UART: [idev] Sha1 KeyId Algorithm
1,209,080 UART: [idev] --
1,210,086 UART: [ldev] ++
1,210,254 UART: [ldev] CDI.KEYID = 6
1,210,617 UART: [ldev] SUBJECT.KEYID = 5
1,211,043 UART: [ldev] AUTHORITY.KEYID = 7
1,211,506 UART: [ldev] FE.KEYID = 1
1,216,892 UART: [ldev] Erasing FE.KEYID = 1
1,243,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,824 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,540 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,431 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,143 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,248 UART: [ldev] --
1,282,547 UART: [fwproc] Wait for Commands...
1,283,173 UART: [fwproc] Recv command 0x46574c44
1,283,901 UART: [fwproc] Recv'd Img size: 118548 bytes
1,589,703 UART: ROM Fatal Error: 0x000B0027
1,590,860 >>> mbox cmd response: failed
1,590,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,866 >>> mbox cmd response: failed
1,590,866 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,590,872 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,387 UART: [state] LifecycleState = Unprovisioned
86,042 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,785 UART: [kat] SHA2-256
893,435 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,560 UART: [kat] ++
897,712 UART: [kat] sha1
902,016 UART: [kat] SHA2-256
903,956 UART: [kat] SHA2-384
906,609 UART: [kat] SHA2-512-ACC
908,510 UART: [kat] ECC-384
917,963 UART: [kat] HMAC-384Kdf
922,371 UART: [kat] LMS
1,170,699 UART: [kat] --
1,171,494 UART: [cold-reset] ++
1,172,036 UART: [fht] FHT @ 0x50003400
1,174,871 UART: [idev] ++
1,175,039 UART: [idev] CDI.KEYID = 6
1,175,399 UART: [idev] SUBJECT.KEYID = 7
1,175,823 UART: [idev] UDS.KEYID = 0
1,176,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,917 UART: [idev] Erasing UDS.KEYID = 0
1,200,356 UART: [idev] Sha1 KeyId Algorithm
1,209,030 UART: [idev] --
1,210,168 UART: [ldev] ++
1,210,336 UART: [ldev] CDI.KEYID = 6
1,210,699 UART: [ldev] SUBJECT.KEYID = 5
1,211,125 UART: [ldev] AUTHORITY.KEYID = 7
1,211,588 UART: [ldev] FE.KEYID = 1
1,216,822 UART: [ldev] Erasing FE.KEYID = 1
1,243,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,388 UART: [ldev] --
1,282,883 UART: [fwproc] Wait for Commands...
1,283,473 UART: [fwproc] Recv command 0x46574c44
1,284,201 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,218 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,637 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,751 >>> mbox cmd response: failed
1,444,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,757 >>> mbox cmd response: failed
1,444,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,332 >>> mbox cmd response: success
test fw_load::fw_load_error_fmc_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,038 writing to cptra_bootfsm_go
192,301 UART:
192,651 UART: Running Caliptra ROM ...
193,844 UART:
194,001 UART: [state] CFI Enabled
265,273 UART: [state] LifecycleState = Unprovisioned
267,254 UART: [state] DebugLocked = No
269,721 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,482 UART: [kat] SHA2-256
444,223 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,731 UART: [kat] ++
455,219 UART: [kat] sha1
466,117 UART: [kat] SHA2-256
468,817 UART: [kat] SHA2-384
474,372 UART: [kat] SHA2-512-ACC
476,713 UART: [kat] ECC-384
2,765,100 UART: [kat] HMAC-384Kdf
2,798,277 UART: [kat] LMS
3,988,566 UART: [kat] --
3,995,123 UART: [cold-reset] ++
3,997,449 UART: [fht] Storing FHT @ 0x50003400
4,008,866 UART: [idev] ++
4,009,455 UART: [idev] CDI.KEYID = 6
4,010,386 UART: [idev] SUBJECT.KEYID = 7
4,011,606 UART: [idev] UDS.KEYID = 0
4,014,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,115 UART: [idev] Erasing UDS.KEYID = 0
7,342,878 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,327 UART: [idev] --
7,369,495 UART: [ldev] ++
7,370,133 UART: [ldev] CDI.KEYID = 6
7,371,049 UART: [ldev] SUBJECT.KEYID = 5
7,372,271 UART: [ldev] AUTHORITY.KEYID = 7
7,373,505 UART: [ldev] FE.KEYID = 1
7,421,022 UART: [ldev] Erasing FE.KEYID = 1
10,754,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,340 UART: [ldev] --
13,134,144 UART: [fwproc] Waiting for Commands...
13,136,251 UART: [fwproc] Received command 0x46574c44
13,138,442 UART: [fwproc] Received Image of size 118548 bytes
15,841,329 UART: ROM Fatal Error: 0x000B002F
15,844,791 >>> mbox cmd response: failed
15,845,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,845,571 >>> mbox cmd response: failed
15,845,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,846,140 >>> mbox cmd response: failed
Initializing fuses
2,057,053 writing to cptra_bootfsm_go
2,246,365 UART:
2,246,699 UART: Running Caliptra ROM ...
2,247,836 UART:
2,248,005 UART: [state] CFI Enabled
2,315,804 UART: [state] LifecycleState = Unprovisioned
2,317,743 UART: [state] DebugLocked = No
2,319,105 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,760 UART: [kat] SHA2-256
2,494,450 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,958 UART: [kat] ++
2,505,418 UART: [kat] sha1
2,515,062 UART: [kat] SHA2-256
2,517,759 UART: [kat] SHA2-384
2,523,810 UART: [kat] SHA2-512-ACC
2,526,216 UART: [kat] ECC-384
4,817,867 UART: [kat] HMAC-384Kdf
4,849,828 UART: [kat] LMS
6,040,110 UART: [kat] --
6,043,964 UART: [cold-reset] ++
6,045,958 UART: [fht] Storing FHT @ 0x50003400
6,057,447 UART: [idev] ++
6,058,030 UART: [idev] CDI.KEYID = 6
6,059,038 UART: [idev] SUBJECT.KEYID = 7
6,060,210 UART: [idev] UDS.KEYID = 0
6,062,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,211,872 UART: [idev] Erasing UDS.KEYID = 0
9,399,269 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,298 UART: [idev] --
9,424,590 UART: [ldev] ++
9,425,161 UART: [ldev] CDI.KEYID = 6
9,426,130 UART: [ldev] SUBJECT.KEYID = 5
9,427,393 UART: [ldev] AUTHORITY.KEYID = 7
9,428,520 UART: [ldev] FE.KEYID = 1
9,473,428 UART: [ldev] Erasing FE.KEYID = 1
12,805,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,142,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,050 UART: [ldev] --
15,167,643 UART: [fwproc] Waiting for Commands...
15,169,746 UART: [fwproc] Received command 0x46574c44
15,172,000 UART: [fwproc] Received Image of size 118548 bytes
19,276,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,675 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,873 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,751,957 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,808,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,547,848 >>> mbox cmd response: failed
15,548,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,548,787 >>> mbox cmd response: failed
15,549,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,549,355 >>> mbox cmd response: failed
Initializing fuses
2,059,233 writing to cptra_bootfsm_go
5,855,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,033,151 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
192,560 UART:
192,915 UART: Running Caliptra ROM ...
194,131 UART:
603,922 UART: [state] CFI Enabled
617,533 UART: [state] LifecycleState = Unprovisioned
619,479 UART: [state] DebugLocked = No
621,516 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,822 UART: [kat] SHA2-256
796,569 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,131 UART: [kat] ++
807,589 UART: [kat] sha1
817,553 UART: [kat] SHA2-256
820,245 UART: [kat] SHA2-384
826,719 UART: [kat] SHA2-512-ACC
829,093 UART: [kat] ECC-384
3,112,262 UART: [kat] HMAC-384Kdf
3,123,742 UART: [kat] LMS
4,313,887 UART: [kat] --
4,315,920 UART: [cold-reset] ++
4,318,417 UART: [fht] Storing FHT @ 0x50003400
4,329,743 UART: [idev] ++
4,330,326 UART: [idev] CDI.KEYID = 6
4,331,215 UART: [idev] SUBJECT.KEYID = 7
4,332,490 UART: [idev] UDS.KEYID = 0
4,335,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,484,255 UART: [idev] Erasing UDS.KEYID = 0
7,621,078 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,763 UART: [idev] --
7,646,689 UART: [ldev] ++
7,647,272 UART: [ldev] CDI.KEYID = 6
7,648,189 UART: [ldev] SUBJECT.KEYID = 5
7,649,420 UART: [ldev] AUTHORITY.KEYID = 7
7,650,662 UART: [ldev] FE.KEYID = 1
7,660,467 UART: [ldev] Erasing FE.KEYID = 1
10,947,494 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,218 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,635 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,139 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,622 UART: [ldev] --
13,305,458 UART: [fwproc] Waiting for Commands...
13,307,840 UART: [fwproc] Received command 0x46574c44
13,310,036 UART: [fwproc] Received Image of size 118548 bytes
16,018,686 UART: ROM Fatal Error: 0x000B002F
16,022,149 >>> mbox cmd response: failed
16,022,583 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,022,937 >>> mbox cmd response: failed
16,023,215 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,517 >>> mbox cmd response: failed
Initializing fuses
2,058,258 writing to cptra_bootfsm_go
2,247,506 UART:
2,247,844 UART: Running Caliptra ROM ...
2,248,892 UART:
4,432,087 UART: [state] CFI Enabled
4,446,462 UART: [state] LifecycleState = Unprovisioned
4,448,431 UART: [state] DebugLocked = No
4,450,040 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,455,438 UART: [kat] SHA2-256
4,625,166 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,635,717 UART: [kat] ++
4,636,220 UART: [kat] sha1
4,646,361 UART: [kat] SHA2-256
4,649,064 UART: [kat] SHA2-384
4,653,927 UART: [kat] SHA2-512-ACC
4,656,289 UART: [kat] ECC-384
6,941,882 UART: [kat] HMAC-384Kdf
6,953,897 UART: [kat] LMS
8,143,975 UART: [kat] --
8,148,576 UART: [cold-reset] ++
8,149,869 UART: [fht] Storing FHT @ 0x50003400
8,162,765 UART: [idev] ++
8,163,390 UART: [idev] CDI.KEYID = 6
8,164,304 UART: [idev] SUBJECT.KEYID = 7
8,165,527 UART: [idev] UDS.KEYID = 0
8,168,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,317,379 UART: [idev] Erasing UDS.KEYID = 0
11,453,711 UART: [idev] Using Sha1 for KeyId Algorithm
11,475,304 UART: [idev] --
11,480,042 UART: [ldev] ++
11,480,636 UART: [ldev] CDI.KEYID = 6
11,481,663 UART: [ldev] SUBJECT.KEYID = 5
11,482,891 UART: [ldev] AUTHORITY.KEYID = 7
11,484,081 UART: [ldev] FE.KEYID = 1
11,496,146 UART: [ldev] Erasing FE.KEYID = 1
14,782,663 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,075,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,089,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,104,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,119,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,138,737 UART: [ldev] --
17,142,798 UART: [fwproc] Waiting for Commands...
17,146,015 UART: [fwproc] Received command 0x46574c44
17,148,219 UART: [fwproc] Received Image of size 118548 bytes
21,251,540 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,326,461 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,399,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,728,777 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,133,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,775,164 >>> mbox cmd response: failed
15,775,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,776,102 >>> mbox cmd response: failed
15,776,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,776,679 >>> mbox cmd response: failed
Initializing fuses
2,057,335 writing to cptra_bootfsm_go
8,217,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,250,998 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,348 UART:
192,704 UART: Running Caliptra ROM ...
193,920 UART:
194,077 UART: [state] CFI Enabled
265,842 UART: [state] LifecycleState = Unprovisioned
267,846 UART: [state] DebugLocked = No
269,452 UART: [state] WD Timer not started. Device not locked for debugging
274,070 UART: [kat] SHA2-256
453,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,530 UART: [kat] ++
465,069 UART: [kat] sha1
476,499 UART: [kat] SHA2-256
479,184 UART: [kat] SHA2-384
484,782 UART: [kat] SHA2-512-ACC
487,120 UART: [kat] ECC-384
2,950,261 UART: [kat] HMAC-384Kdf
2,971,522 UART: [kat] LMS
3,448,010 UART: [kat] --
3,452,998 UART: [cold-reset] ++
3,455,205 UART: [fht] FHT @ 0x50003400
3,466,457 UART: [idev] ++
3,467,045 UART: [idev] CDI.KEYID = 6
3,468,071 UART: [idev] SUBJECT.KEYID = 7
3,469,235 UART: [idev] UDS.KEYID = 0
3,471,796 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,180 UART: [idev] Erasing UDS.KEYID = 0
5,987,463 UART: [idev] Sha1 KeyId Algorithm
6,010,130 UART: [idev] --
6,013,706 UART: [ldev] ++
6,014,285 UART: [ldev] CDI.KEYID = 6
6,015,181 UART: [ldev] SUBJECT.KEYID = 5
6,016,400 UART: [ldev] AUTHORITY.KEYID = 7
6,017,643 UART: [ldev] FE.KEYID = 1
6,059,148 UART: [ldev] Erasing FE.KEYID = 1
8,565,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,948 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,551 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,703 UART: [ldev] --
10,376,363 UART: [fwproc] Wait for Commands...
10,378,827 UART: [fwproc] Recv command 0x46574c44
10,380,877 UART: [fwproc] Recv'd Img size: 118548 bytes
12,451,816 UART: ROM Fatal Error: 0x000B002F
12,455,072 >>> mbox cmd response: failed
12,455,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,797 >>> mbox cmd response: failed
12,456,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,456,372 >>> mbox cmd response: failed
Initializing fuses
2,060,843 writing to cptra_bootfsm_go
2,250,198 UART:
2,250,547 UART: Running Caliptra ROM ...
2,251,689 UART:
2,251,856 UART: [state] CFI Enabled
2,312,205 UART: [state] LifecycleState = Unprovisioned
2,314,099 UART: [state] DebugLocked = No
2,315,708 UART: [state] WD Timer not started. Device not locked for debugging
2,319,124 UART: [kat] SHA2-256
2,498,754 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,582 UART: [kat] ++
2,510,075 UART: [kat] sha1
2,520,868 UART: [kat] SHA2-256
2,523,563 UART: [kat] SHA2-384
2,530,635 UART: [kat] SHA2-512-ACC
2,532,996 UART: [kat] ECC-384
4,998,104 UART: [kat] HMAC-384Kdf
5,019,651 UART: [kat] LMS
5,496,150 UART: [kat] --
5,501,081 UART: [cold-reset] ++
5,502,215 UART: [fht] FHT @ 0x50003400
5,514,232 UART: [idev] ++
5,514,804 UART: [idev] CDI.KEYID = 6
5,515,767 UART: [idev] SUBJECT.KEYID = 7
5,517,152 UART: [idev] UDS.KEYID = 0
5,519,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,546 UART: [idev] Erasing UDS.KEYID = 0
8,036,507 UART: [idev] Sha1 KeyId Algorithm
8,060,942 UART: [idev] --
8,066,571 UART: [ldev] ++
8,067,149 UART: [ldev] CDI.KEYID = 6
8,068,121 UART: [ldev] SUBJECT.KEYID = 5
8,069,288 UART: [ldev] AUTHORITY.KEYID = 7
8,070,607 UART: [ldev] FE.KEYID = 1
8,104,764 UART: [ldev] Erasing FE.KEYID = 1
10,614,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,317 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,208 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,723 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,137 UART: [ldev] --
12,422,365 UART: [fwproc] Wait for Commands...
12,424,956 UART: [fwproc] Recv command 0x46574c44
12,426,949 UART: [fwproc] Recv'd Img size: 118548 bytes
15,918,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,998,402 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,071,428 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,400,379 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,465,119 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,295,853 >>> mbox cmd response: failed
12,296,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,896 >>> mbox cmd response: failed
12,297,171 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,297,465 >>> mbox cmd response: failed
Initializing fuses
2,061,357 writing to cptra_bootfsm_go
5,519,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,278,234 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,483 UART:
192,888 UART: Running Caliptra ROM ...
194,103 UART:
603,593 UART: [state] CFI Enabled
616,998 UART: [state] LifecycleState = Unprovisioned
618,929 UART: [state] DebugLocked = No
621,121 UART: [state] WD Timer not started. Device not locked for debugging
624,335 UART: [kat] SHA2-256
804,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,769 UART: [kat] ++
815,316 UART: [kat] sha1
826,745 UART: [kat] SHA2-256
829,482 UART: [kat] SHA2-384
835,101 UART: [kat] SHA2-512-ACC
837,486 UART: [kat] ECC-384
3,280,591 UART: [kat] HMAC-384Kdf
3,292,720 UART: [kat] LMS
3,769,224 UART: [kat] --
3,773,231 UART: [cold-reset] ++
3,775,602 UART: [fht] FHT @ 0x50003400
3,786,913 UART: [idev] ++
3,787,491 UART: [idev] CDI.KEYID = 6
3,788,515 UART: [idev] SUBJECT.KEYID = 7
3,789,681 UART: [idev] UDS.KEYID = 0
3,792,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,261 UART: [idev] Erasing UDS.KEYID = 0
6,265,348 UART: [idev] Sha1 KeyId Algorithm
6,288,795 UART: [idev] --
6,292,874 UART: [ldev] ++
6,293,464 UART: [ldev] CDI.KEYID = 6
6,294,489 UART: [ldev] SUBJECT.KEYID = 5
6,295,598 UART: [ldev] AUTHORITY.KEYID = 7
6,296,833 UART: [ldev] FE.KEYID = 1
6,309,300 UART: [ldev] Erasing FE.KEYID = 1
8,785,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,161 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,575,345 UART: [ldev] --
10,581,533 UART: [fwproc] Wait for Commands...
10,583,213 UART: [fwproc] Recv command 0x46574c44
10,585,213 UART: [fwproc] Recv'd Img size: 118548 bytes
12,655,770 UART: ROM Fatal Error: 0x000B002F
12,659,006 >>> mbox cmd response: failed
12,659,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,705 >>> mbox cmd response: failed
12,660,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,315 >>> mbox cmd response: failed
Initializing fuses
2,059,767 writing to cptra_bootfsm_go
2,249,023 UART:
2,249,383 UART: Running Caliptra ROM ...
2,250,431 UART:
7,812,540 UART: [state] CFI Enabled
7,827,115 UART: [state] LifecycleState = Unprovisioned
7,829,048 UART: [state] DebugLocked = No
7,831,701 UART: [state] WD Timer not started. Device not locked for debugging
7,834,816 UART: [kat] SHA2-256
8,014,458 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,025,266 UART: [kat] ++
8,025,825 UART: [kat] sha1
8,037,112 UART: [kat] SHA2-256
8,039,838 UART: [kat] SHA2-384
8,044,816 UART: [kat] SHA2-512-ACC
8,047,173 UART: [kat] ECC-384
10,490,119 UART: [kat] HMAC-384Kdf
10,501,984 UART: [kat] LMS
10,978,467 UART: [kat] --
10,983,935 UART: [cold-reset] ++
10,986,519 UART: [fht] FHT @ 0x50003400
10,997,768 UART: [idev] ++
10,998,339 UART: [idev] CDI.KEYID = 6
10,999,280 UART: [idev] SUBJECT.KEYID = 7
11,000,547 UART: [idev] UDS.KEYID = 0
11,002,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,151,874 UART: [idev] Erasing UDS.KEYID = 0
13,476,905 UART: [idev] Sha1 KeyId Algorithm
13,501,761 UART: [idev] --
13,507,773 UART: [ldev] ++
13,508,345 UART: [ldev] CDI.KEYID = 6
13,509,227 UART: [ldev] SUBJECT.KEYID = 5
13,510,440 UART: [ldev] AUTHORITY.KEYID = 7
13,511,733 UART: [ldev] FE.KEYID = 1
13,522,244 UART: [ldev] Erasing FE.KEYID = 1
16,001,990 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,722,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,738,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,754,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,769,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,790,300 UART: [ldev] --
17,795,206 UART: [fwproc] Wait for Commands...
17,798,389 UART: [fwproc] Recv command 0x46574c44
17,800,436 UART: [fwproc] Recv'd Img size: 118548 bytes
21,290,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,366,907 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,439,918 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,768,441 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,428 writing to cptra_bootfsm_go
3,779,107 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,387 >>> mbox cmd response: failed
12,535,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,659 >>> mbox cmd response: failed
12,535,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,228 >>> mbox cmd response: failed
Initializing fuses
2,061,268 writing to cptra_bootfsm_go
11,115,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,778,512 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
192,173 UART:
192,533 UART: Running Caliptra ROM ...
193,649 UART:
193,797 UART: [state] CFI Enabled
267,703 UART: [state] LifecycleState = Unprovisioned
270,068 UART: [state] DebugLocked = No
271,700 UART: [state] WD Timer not started. Device not locked for debugging
275,907 UART: [kat] SHA2-256
465,773 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,572 UART: [kat] ++
477,028 UART: [kat] sha1
487,753 UART: [kat] SHA2-256
490,762 UART: [kat] SHA2-384
497,007 UART: [kat] SHA2-512-ACC
499,574 UART: [kat] ECC-384
2,949,426 UART: [kat] HMAC-384Kdf
2,973,125 UART: [kat] LMS
3,504,896 UART: [kat] --
3,507,952 UART: [cold-reset] ++
3,510,323 UART: [fht] FHT @ 0x50003400
3,521,688 UART: [idev] ++
3,522,367 UART: [idev] CDI.KEYID = 6
3,523,309 UART: [idev] SUBJECT.KEYID = 7
3,524,528 UART: [idev] UDS.KEYID = 0
3,527,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,593 UART: [idev] Erasing UDS.KEYID = 0
6,031,897 UART: [idev] Sha1 KeyId Algorithm
6,055,726 UART: [idev] --
6,061,218 UART: [ldev] ++
6,061,915 UART: [ldev] CDI.KEYID = 6
6,062,808 UART: [ldev] SUBJECT.KEYID = 5
6,063,973 UART: [ldev] AUTHORITY.KEYID = 7
6,065,213 UART: [ldev] FE.KEYID = 1
6,101,447 UART: [ldev] Erasing FE.KEYID = 1
8,607,179 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,468 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,048 UART: [ldev] --
10,414,535 UART: [fwproc] Wait for Commands...
10,416,263 UART: [fwproc] Recv command 0x46574c44
10,418,584 UART: [fwproc] Recv'd Img size: 118548 bytes
12,501,165 UART: ROM Fatal Error: 0x000B002F
12,504,829 >>> mbox cmd response: failed
12,505,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,505,478 >>> mbox cmd response: failed
12,505,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,113 >>> mbox cmd response: failed
Initializing fuses
2,063,699 writing to cptra_bootfsm_go
2,253,030 UART:
2,253,378 UART: Running Caliptra ROM ...
2,254,517 UART:
2,254,706 UART: [state] CFI Enabled
2,323,158 UART: [state] LifecycleState = Unprovisioned
2,325,523 UART: [state] DebugLocked = No
2,327,410 UART: [state] WD Timer not started. Device not locked for debugging
2,332,581 UART: [kat] SHA2-256
2,522,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,250 UART: [kat] ++
2,533,762 UART: [kat] sha1
2,545,792 UART: [kat] SHA2-256
2,548,774 UART: [kat] SHA2-384
2,556,249 UART: [kat] SHA2-512-ACC
2,558,824 UART: [kat] ECC-384
5,010,476 UART: [kat] HMAC-384Kdf
5,023,256 UART: [kat] LMS
5,555,032 UART: [kat] --
5,559,953 UART: [cold-reset] ++
5,562,489 UART: [fht] FHT @ 0x50003400
5,573,321 UART: [idev] ++
5,574,002 UART: [idev] CDI.KEYID = 6
5,575,031 UART: [idev] SUBJECT.KEYID = 7
5,576,201 UART: [idev] UDS.KEYID = 0
5,578,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,680 UART: [idev] Erasing UDS.KEYID = 0
8,081,390 UART: [idev] Sha1 KeyId Algorithm
8,103,698 UART: [idev] --
8,109,083 UART: [ldev] ++
8,109,806 UART: [ldev] CDI.KEYID = 6
8,110,724 UART: [ldev] SUBJECT.KEYID = 5
8,111,838 UART: [ldev] AUTHORITY.KEYID = 7
8,113,073 UART: [ldev] FE.KEYID = 1
8,152,002 UART: [ldev] Erasing FE.KEYID = 1
10,661,498 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,392,459 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,407,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,422,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,438,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,459,162 UART: [ldev] --
12,464,982 UART: [fwproc] Wait for Commands...
12,468,072 UART: [fwproc] Recv command 0x46574c44
12,470,335 UART: [fwproc] Recv'd Img size: 118548 bytes
15,968,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,169,143 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,729,788 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,957 writing to cptra_bootfsm_go
3,440,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,303,676 >>> mbox cmd response: failed
12,304,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,610 >>> mbox cmd response: failed
12,304,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,184 >>> mbox cmd response: failed
Initializing fuses
2,062,247 writing to cptra_bootfsm_go
5,492,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,873,467 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,587 UART:
192,952 UART: Running Caliptra ROM ...
194,141 UART:
603,608 UART: [state] CFI Enabled
619,867 UART: [state] LifecycleState = Unprovisioned
622,288 UART: [state] DebugLocked = No
624,595 UART: [state] WD Timer not started. Device not locked for debugging
630,066 UART: [kat] SHA2-256
819,955 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,741 UART: [kat] ++
831,337 UART: [kat] sha1
842,226 UART: [kat] SHA2-256
845,238 UART: [kat] SHA2-384
851,304 UART: [kat] SHA2-512-ACC
853,871 UART: [kat] ECC-384
3,297,744 UART: [kat] HMAC-384Kdf
3,311,123 UART: [kat] LMS
3,842,967 UART: [kat] --
3,847,030 UART: [cold-reset] ++
3,848,378 UART: [fht] FHT @ 0x50003400
3,859,643 UART: [idev] ++
3,860,326 UART: [idev] CDI.KEYID = 6
3,861,270 UART: [idev] SUBJECT.KEYID = 7
3,862,483 UART: [idev] UDS.KEYID = 0
3,865,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,507 UART: [idev] Erasing UDS.KEYID = 0
6,336,766 UART: [idev] Sha1 KeyId Algorithm
6,360,198 UART: [idev] --
6,364,524 UART: [ldev] ++
6,365,228 UART: [ldev] CDI.KEYID = 6
6,366,116 UART: [ldev] SUBJECT.KEYID = 5
6,367,336 UART: [ldev] AUTHORITY.KEYID = 7
6,368,472 UART: [ldev] FE.KEYID = 1
6,380,194 UART: [ldev] Erasing FE.KEYID = 1
8,854,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,948 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,136 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,449 UART: [ldev] --
10,646,270 UART: [fwproc] Wait for Commands...
10,649,073 UART: [fwproc] Recv command 0x46574c44
10,651,346 UART: [fwproc] Recv'd Img size: 118548 bytes
12,734,828 UART: ROM Fatal Error: 0x000B002F
12,738,508 >>> mbox cmd response: failed
12,738,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,290 >>> mbox cmd response: failed
12,739,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,739,864 >>> mbox cmd response: failed
Initializing fuses
2,074,498 writing to cptra_bootfsm_go
2,263,842 UART:
2,264,190 UART: Running Caliptra ROM ...
2,265,328 UART:
7,732,623 UART: [state] CFI Enabled
7,746,306 UART: [state] LifecycleState = Unprovisioned
7,748,664 UART: [state] DebugLocked = No
7,750,765 UART: [state] WD Timer not started. Device not locked for debugging
7,754,963 UART: [kat] SHA2-256
7,944,882 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,955,639 UART: [kat] ++
7,956,248 UART: [kat] sha1
7,966,293 UART: [kat] SHA2-256
7,969,314 UART: [kat] SHA2-384
7,976,136 UART: [kat] SHA2-512-ACC
7,978,715 UART: [kat] ECC-384
10,419,327 UART: [kat] HMAC-384Kdf
10,431,893 UART: [kat] LMS
10,963,714 UART: [kat] --
10,968,260 UART: [cold-reset] ++
10,969,554 UART: [fht] FHT @ 0x50003400
10,981,241 UART: [idev] ++
10,981,976 UART: [idev] CDI.KEYID = 6
10,982,893 UART: [idev] SUBJECT.KEYID = 7
10,984,109 UART: [idev] UDS.KEYID = 0
10,986,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,135,445 UART: [idev] Erasing UDS.KEYID = 0
13,458,106 UART: [idev] Sha1 KeyId Algorithm
13,480,855 UART: [idev] --
13,487,042 UART: [ldev] ++
13,487,735 UART: [ldev] CDI.KEYID = 6
13,488,649 UART: [ldev] SUBJECT.KEYID = 5
13,489,811 UART: [ldev] AUTHORITY.KEYID = 7
13,491,046 UART: [ldev] FE.KEYID = 1
13,501,418 UART: [ldev] Erasing FE.KEYID = 1
15,980,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,699,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,714,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,729,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,744,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,441 UART: [ldev] --
17,771,086 UART: [fwproc] Wait for Commands...
17,773,462 UART: [fwproc] Recv command 0x46574c44
17,775,732 UART: [fwproc] Recv'd Img size: 118548 bytes
21,266,963 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,340,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,463,673 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,023,792 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,754,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,530,621 >>> mbox cmd response: failed
12,531,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,531,497 >>> mbox cmd response: failed
12,531,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,532,124 >>> mbox cmd response: failed
Initializing fuses
2,060,634 writing to cptra_bootfsm_go
11,093,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,377,716 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,926 UART: [state] LifecycleState = Unprovisioned
85,581 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,843 UART: [kat] SHA2-256
881,774 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,889 UART: [kat] ++
886,041 UART: [kat] sha1
890,397 UART: [kat] SHA2-256
892,335 UART: [kat] SHA2-384
895,178 UART: [kat] SHA2-512-ACC
897,079 UART: [kat] ECC-384
902,880 UART: [kat] HMAC-384Kdf
907,508 UART: [kat] LMS
1,475,704 UART: [kat] --
1,476,465 UART: [cold-reset] ++
1,476,983 UART: [fht] Storing FHT @ 0x50003400
1,479,718 UART: [idev] ++
1,479,886 UART: [idev] CDI.KEYID = 6
1,480,246 UART: [idev] SUBJECT.KEYID = 7
1,480,670 UART: [idev] UDS.KEYID = 0
1,481,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,324 UART: [idev] Erasing UDS.KEYID = 0
1,505,282 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,842 UART: [idev] --
1,514,675 UART: [ldev] ++
1,514,843 UART: [ldev] CDI.KEYID = 6
1,515,206 UART: [ldev] SUBJECT.KEYID = 5
1,515,632 UART: [ldev] AUTHORITY.KEYID = 7
1,516,095 UART: [ldev] FE.KEYID = 1
1,521,275 UART: [ldev] Erasing FE.KEYID = 1
1,546,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,185 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,458 UART: [ldev] --
1,585,913 UART: [fwproc] Waiting for Commands...
1,586,704 UART: [fwproc] Received command 0x46574c44
1,587,495 UART: [fwproc] Received Image of size 118548 bytes
1,635,385 UART: ROM Fatal Error: 0x000B002F
1,636,544 >>> mbox cmd response: failed
1,636,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,550 >>> mbox cmd response: failed
1,636,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,411 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,129 UART: [kat] SHA2-256
882,060 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,175 UART: [kat] ++
886,327 UART: [kat] sha1
890,541 UART: [kat] SHA2-256
892,479 UART: [kat] SHA2-384
895,182 UART: [kat] SHA2-512-ACC
897,083 UART: [kat] ECC-384
903,000 UART: [kat] HMAC-384Kdf
907,712 UART: [kat] LMS
1,475,908 UART: [kat] --
1,476,855 UART: [cold-reset] ++
1,477,297 UART: [fht] Storing FHT @ 0x50003400
1,480,156 UART: [idev] ++
1,480,324 UART: [idev] CDI.KEYID = 6
1,480,684 UART: [idev] SUBJECT.KEYID = 7
1,481,108 UART: [idev] UDS.KEYID = 0
1,481,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,922 UART: [idev] Erasing UDS.KEYID = 0
1,505,584 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,124 UART: [idev] --
1,515,123 UART: [ldev] ++
1,515,291 UART: [ldev] CDI.KEYID = 6
1,515,654 UART: [ldev] SUBJECT.KEYID = 5
1,516,080 UART: [ldev] AUTHORITY.KEYID = 7
1,516,543 UART: [ldev] FE.KEYID = 1
1,521,681 UART: [ldev] Erasing FE.KEYID = 1
1,546,440 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,454 UART: [ldev] --
1,585,789 UART: [fwproc] Waiting for Commands...
1,586,512 UART: [fwproc] Received command 0x46574c44
1,587,303 UART: [fwproc] Received Image of size 118548 bytes
2,931,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,176 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,613 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,035 >>> mbox cmd response: failed
1,487,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,041 >>> mbox cmd response: failed
1,487,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,543 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,321 UART: [state] LifecycleState = Unprovisioned
85,976 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,048 UART: [kat] SHA2-256
881,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,094 UART: [kat] ++
886,246 UART: [kat] sha1
890,524 UART: [kat] SHA2-256
892,462 UART: [kat] SHA2-384
895,263 UART: [kat] SHA2-512-ACC
897,164 UART: [kat] ECC-384
902,645 UART: [kat] HMAC-384Kdf
907,197 UART: [kat] LMS
1,475,393 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,728 UART: [fht] Storing FHT @ 0x50003400
1,479,411 UART: [idev] ++
1,479,579 UART: [idev] CDI.KEYID = 6
1,479,939 UART: [idev] SUBJECT.KEYID = 7
1,480,363 UART: [idev] UDS.KEYID = 0
1,480,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,383 UART: [idev] Erasing UDS.KEYID = 0
1,505,425 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,127 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,522,034 UART: [ldev] Erasing FE.KEYID = 1
1,547,567 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,469 UART: [ldev] --
1,586,972 UART: [fwproc] Waiting for Commands...
1,587,821 UART: [fwproc] Received command 0x46574c44
1,588,612 UART: [fwproc] Received Image of size 118548 bytes
1,635,708 UART: ROM Fatal Error: 0x000B002F
1,636,867 >>> mbox cmd response: failed
1,636,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,873 >>> mbox cmd response: failed
1,636,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,879 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,670 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,760 UART: [kat] SHA2-256
892,698 UART: [kat] SHA2-384
895,551 UART: [kat] SHA2-512-ACC
897,452 UART: [kat] ECC-384
903,019 UART: [kat] HMAC-384Kdf
907,557 UART: [kat] LMS
1,475,753 UART: [kat] --
1,476,624 UART: [cold-reset] ++
1,477,070 UART: [fht] Storing FHT @ 0x50003400
1,479,991 UART: [idev] ++
1,480,159 UART: [idev] CDI.KEYID = 6
1,480,519 UART: [idev] SUBJECT.KEYID = 7
1,480,943 UART: [idev] UDS.KEYID = 0
1,481,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,041 UART: [idev] Erasing UDS.KEYID = 0
1,505,307 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,875 UART: [idev] --
1,514,944 UART: [ldev] ++
1,515,112 UART: [ldev] CDI.KEYID = 6
1,515,475 UART: [ldev] SUBJECT.KEYID = 5
1,515,901 UART: [ldev] AUTHORITY.KEYID = 7
1,516,364 UART: [ldev] FE.KEYID = 1
1,521,542 UART: [ldev] Erasing FE.KEYID = 1
1,547,145 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,467 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,109 UART: [ldev] --
1,586,590 UART: [fwproc] Waiting for Commands...
1,587,453 UART: [fwproc] Received command 0x46574c44
1,588,244 UART: [fwproc] Received Image of size 118548 bytes
2,932,423 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,085 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,636 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,270 >>> mbox cmd response: failed
1,488,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,276 >>> mbox cmd response: failed
1,488,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,282 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,922 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,071 UART: [state] WD Timer not started. Device not locked for debugging
87,406 UART: [kat] SHA2-256
890,956 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,060 UART: [kat] ++
895,212 UART: [kat] sha1
899,460 UART: [kat] SHA2-256
901,400 UART: [kat] SHA2-384
904,171 UART: [kat] SHA2-512-ACC
906,072 UART: [kat] ECC-384
915,601 UART: [kat] HMAC-384Kdf
920,093 UART: [kat] LMS
1,168,405 UART: [kat] --
1,169,274 UART: [cold-reset] ++
1,169,634 UART: [fht] FHT @ 0x50003400
1,172,182 UART: [idev] ++
1,172,350 UART: [idev] CDI.KEYID = 6
1,172,711 UART: [idev] SUBJECT.KEYID = 7
1,173,136 UART: [idev] UDS.KEYID = 0
1,173,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,105 UART: [idev] Sha1 KeyId Algorithm
1,207,057 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,612 UART: [ldev] Erasing FE.KEYID = 1
1,241,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,535 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,140 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,780 UART: [ldev] --
1,280,121 UART: [fwproc] Wait for Commands...
1,280,788 UART: [fwproc] Recv command 0x46574c44
1,281,521 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,063 UART: ROM Fatal Error: 0x000B002F
1,329,222 >>> mbox cmd response: failed
1,329,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,228 >>> mbox cmd response: failed
1,329,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,156 UART: [state] LifecycleState = Unprovisioned
85,811 UART: [state] DebugLocked = No
86,525 UART: [state] WD Timer not started. Device not locked for debugging
87,744 UART: [kat] SHA2-256
891,294 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,398 UART: [kat] ++
895,550 UART: [kat] sha1
899,858 UART: [kat] SHA2-256
901,798 UART: [kat] SHA2-384
904,365 UART: [kat] SHA2-512-ACC
906,266 UART: [kat] ECC-384
916,173 UART: [kat] HMAC-384Kdf
920,881 UART: [kat] LMS
1,169,193 UART: [kat] --
1,169,832 UART: [cold-reset] ++
1,170,366 UART: [fht] FHT @ 0x50003400
1,172,994 UART: [idev] ++
1,173,162 UART: [idev] CDI.KEYID = 6
1,173,523 UART: [idev] SUBJECT.KEYID = 7
1,173,948 UART: [idev] UDS.KEYID = 0
1,174,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,663 UART: [idev] Sha1 KeyId Algorithm
1,207,389 UART: [idev] --
1,208,448 UART: [ldev] ++
1,208,616 UART: [ldev] CDI.KEYID = 6
1,208,980 UART: [ldev] SUBJECT.KEYID = 5
1,209,407 UART: [ldev] AUTHORITY.KEYID = 7
1,209,870 UART: [ldev] FE.KEYID = 1
1,214,874 UART: [ldev] Erasing FE.KEYID = 1
1,241,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,357 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,726 UART: [ldev] --
1,281,121 UART: [fwproc] Wait for Commands...
1,281,794 UART: [fwproc] Recv command 0x46574c44
1,282,527 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,004 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,179 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,380 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,233 >>> mbox cmd response: failed
1,185,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,239 >>> mbox cmd response: failed
1,185,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,533 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,877 UART: [kat] ++
896,029 UART: [kat] sha1
900,183 UART: [kat] SHA2-256
902,123 UART: [kat] SHA2-384
904,924 UART: [kat] SHA2-512-ACC
906,825 UART: [kat] ECC-384
916,618 UART: [kat] HMAC-384Kdf
921,338 UART: [kat] LMS
1,169,650 UART: [kat] --
1,170,335 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,661 UART: [idev] ++
1,173,829 UART: [idev] CDI.KEYID = 6
1,174,190 UART: [idev] SUBJECT.KEYID = 7
1,174,615 UART: [idev] UDS.KEYID = 0
1,174,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,790 UART: [idev] Erasing UDS.KEYID = 0
1,199,448 UART: [idev] Sha1 KeyId Algorithm
1,208,298 UART: [idev] --
1,209,407 UART: [ldev] ++
1,209,575 UART: [ldev] CDI.KEYID = 6
1,209,939 UART: [ldev] SUBJECT.KEYID = 5
1,210,366 UART: [ldev] AUTHORITY.KEYID = 7
1,210,829 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,994 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,423 UART: [ldev] --
1,281,762 UART: [fwproc] Wait for Commands...
1,282,481 UART: [fwproc] Recv command 0x46574c44
1,283,214 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,944 UART: ROM Fatal Error: 0x000B002F
1,331,103 >>> mbox cmd response: failed
1,331,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,109 >>> mbox cmd response: failed
1,331,109 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,115 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,453 UART: [state] LifecycleState = Unprovisioned
86,108 UART: [state] DebugLocked = No
86,632 UART: [state] WD Timer not started. Device not locked for debugging
87,945 UART: [kat] SHA2-256
891,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,599 UART: [kat] ++
895,751 UART: [kat] sha1
900,095 UART: [kat] SHA2-256
902,035 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,706 UART: [kat] HMAC-384Kdf
921,306 UART: [kat] LMS
1,169,618 UART: [kat] --
1,170,461 UART: [cold-reset] ++
1,171,023 UART: [fht] FHT @ 0x50003400
1,173,617 UART: [idev] ++
1,173,785 UART: [idev] CDI.KEYID = 6
1,174,146 UART: [idev] SUBJECT.KEYID = 7
1,174,571 UART: [idev] UDS.KEYID = 0
1,174,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,432 UART: [idev] Erasing UDS.KEYID = 0
1,199,526 UART: [idev] Sha1 KeyId Algorithm
1,208,490 UART: [idev] --
1,209,507 UART: [ldev] ++
1,209,675 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,466 UART: [ldev] AUTHORITY.KEYID = 7
1,210,929 UART: [ldev] FE.KEYID = 1
1,216,121 UART: [ldev] Erasing FE.KEYID = 1
1,242,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,085 UART: [ldev] --
1,281,344 UART: [fwproc] Wait for Commands...
1,281,967 UART: [fwproc] Recv command 0x46574c44
1,282,700 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,337 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,869 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,564 >>> mbox cmd response: failed
1,186,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,570 >>> mbox cmd response: failed
1,186,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,308 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,996 UART: [state] LifecycleState = Unprovisioned
85,651 UART: [state] DebugLocked = No
86,377 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,791 UART: [kat] SHA2-256
903,731 UART: [kat] SHA2-384
906,520 UART: [kat] SHA2-512-ACC
908,421 UART: [kat] ECC-384
917,798 UART: [kat] HMAC-384Kdf
922,308 UART: [kat] LMS
1,170,636 UART: [kat] --
1,171,673 UART: [cold-reset] ++
1,172,135 UART: [fht] FHT @ 0x50003400
1,174,764 UART: [idev] ++
1,174,932 UART: [idev] CDI.KEYID = 6
1,175,292 UART: [idev] SUBJECT.KEYID = 7
1,175,716 UART: [idev] UDS.KEYID = 0
1,176,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,200,745 UART: [idev] Sha1 KeyId Algorithm
1,209,163 UART: [idev] --
1,210,229 UART: [ldev] ++
1,210,397 UART: [ldev] CDI.KEYID = 6
1,210,760 UART: [ldev] SUBJECT.KEYID = 5
1,211,186 UART: [ldev] AUTHORITY.KEYID = 7
1,211,649 UART: [ldev] FE.KEYID = 1
1,216,863 UART: [ldev] Erasing FE.KEYID = 1
1,243,324 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,128 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,107 UART: [ldev] --
1,282,564 UART: [fwproc] Wait for Commands...
1,283,178 UART: [fwproc] Recv command 0x46574c44
1,283,906 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,092 UART: ROM Fatal Error: 0x000B002F
1,332,251 >>> mbox cmd response: failed
1,332,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,257 >>> mbox cmd response: failed
1,332,257 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,263 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,289 UART: [state] WD Timer not started. Device not locked for debugging
87,430 UART: [kat] SHA2-256
893,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,205 UART: [kat] ++
897,357 UART: [kat] sha1
901,581 UART: [kat] SHA2-256
903,521 UART: [kat] SHA2-384
906,246 UART: [kat] SHA2-512-ACC
908,147 UART: [kat] ECC-384
918,024 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,171,799 UART: [cold-reset] ++
1,172,147 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,236 UART: [idev] Erasing UDS.KEYID = 0
1,199,515 UART: [idev] Sha1 KeyId Algorithm
1,207,879 UART: [idev] --
1,208,905 UART: [ldev] ++
1,209,073 UART: [ldev] CDI.KEYID = 6
1,209,436 UART: [ldev] SUBJECT.KEYID = 5
1,209,862 UART: [ldev] AUTHORITY.KEYID = 7
1,210,325 UART: [ldev] FE.KEYID = 1
1,215,219 UART: [ldev] Erasing FE.KEYID = 1
1,241,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,994 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,706 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,771 UART: [ldev] --
1,281,148 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,127 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,297 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,484 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,433 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,260 >>> mbox cmd response: failed
1,187,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,266 >>> mbox cmd response: failed
1,187,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,272 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,337 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,652 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
893,591 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,716 UART: [kat] ++
897,868 UART: [kat] sha1
902,064 UART: [kat] SHA2-256
904,004 UART: [kat] SHA2-384
906,795 UART: [kat] SHA2-512-ACC
908,696 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,592 UART: [fht] FHT @ 0x50003400
1,175,235 UART: [idev] ++
1,175,403 UART: [idev] CDI.KEYID = 6
1,175,763 UART: [idev] SUBJECT.KEYID = 7
1,176,187 UART: [idev] UDS.KEYID = 0
1,176,532 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,083 UART: [idev] Erasing UDS.KEYID = 0
1,201,516 UART: [idev] Sha1 KeyId Algorithm
1,210,152 UART: [idev] --
1,211,328 UART: [ldev] ++
1,211,496 UART: [ldev] CDI.KEYID = 6
1,211,859 UART: [ldev] SUBJECT.KEYID = 5
1,212,285 UART: [ldev] AUTHORITY.KEYID = 7
1,212,748 UART: [ldev] FE.KEYID = 1
1,217,884 UART: [ldev] Erasing FE.KEYID = 1
1,244,221 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,200 UART: [ldev] --
1,283,499 UART: [fwproc] Wait for Commands...
1,284,237 UART: [fwproc] Recv command 0x46574c44
1,284,965 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,361 UART: ROM Fatal Error: 0x000B002F
1,333,520 >>> mbox cmd response: failed
1,333,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,526 >>> mbox cmd response: failed
1,333,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,532 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,597 UART: [state] LifecycleState = Unprovisioned
86,252 UART: [state] DebugLocked = No
86,772 UART: [state] WD Timer not started. Device not locked for debugging
88,053 UART: [kat] SHA2-256
893,703 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,828 UART: [kat] ++
897,980 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,629 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,478 UART: [cold-reset] ++
1,173,038 UART: [fht] FHT @ 0x50003400
1,175,691 UART: [idev] ++
1,175,859 UART: [idev] CDI.KEYID = 6
1,176,219 UART: [idev] SUBJECT.KEYID = 7
1,176,643 UART: [idev] UDS.KEYID = 0
1,176,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,847 UART: [idev] Erasing UDS.KEYID = 0
1,202,010 UART: [idev] Sha1 KeyId Algorithm
1,210,438 UART: [idev] --
1,211,574 UART: [ldev] ++
1,211,742 UART: [ldev] CDI.KEYID = 6
1,212,105 UART: [ldev] SUBJECT.KEYID = 5
1,212,531 UART: [ldev] AUTHORITY.KEYID = 7
1,212,994 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,940 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,656 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,259 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,304 UART: [ldev] --
1,283,671 UART: [fwproc] Wait for Commands...
1,284,439 UART: [fwproc] Recv command 0x46574c44
1,285,167 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,239 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,288 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,631 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,188,317 >>> mbox cmd response: failed
1,188,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,323 >>> mbox cmd response: failed
1,188,323 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,188,329 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,124 >>> mbox cmd response: success
test fw_load::fw_load_error_image_len_more_than_bundle_size ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
192,182 UART:
192,563 UART: Running Caliptra ROM ...
193,746 UART:
193,897 UART: [state] CFI Enabled
263,467 UART: [state] LifecycleState = Unprovisioned
265,452 UART: [state] DebugLocked = No
266,945 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,993 UART: [kat] SHA2-256
441,737 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,217 UART: [kat] ++
452,720 UART: [kat] sha1
462,952 UART: [kat] SHA2-256
465,639 UART: [kat] SHA2-384
472,162 UART: [kat] SHA2-512-ACC
474,553 UART: [kat] ECC-384
2,765,655 UART: [kat] HMAC-384Kdf
2,779,002 UART: [kat] LMS
3,969,278 UART: [kat] --
3,972,935 UART: [cold-reset] ++
3,975,253 UART: [fht] Storing FHT @ 0x50003400
3,987,011 UART: [idev] ++
3,987,594 UART: [idev] CDI.KEYID = 6
3,988,485 UART: [idev] SUBJECT.KEYID = 7
3,989,757 UART: [idev] UDS.KEYID = 0
3,992,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,142,242 UART: [idev] Erasing UDS.KEYID = 0
7,322,882 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,505 UART: [idev] --
7,349,771 UART: [ldev] ++
7,350,355 UART: [ldev] CDI.KEYID = 6
7,351,268 UART: [ldev] SUBJECT.KEYID = 5
7,352,487 UART: [ldev] AUTHORITY.KEYID = 7
7,353,785 UART: [ldev] FE.KEYID = 1
7,402,266 UART: [ldev] Erasing FE.KEYID = 1
10,731,332 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,029,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,776 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,073,152 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,137 UART: [ldev] --
13,098,013 UART: [fwproc] Waiting for Commands...
13,100,398 UART: [fwproc] Received command 0x46574c44
13,102,589 UART: [fwproc] Received Image of size 118548 bytes
13,159,727 UART: ROM Fatal Error: 0x000B0001
13,163,264 >>> mbox cmd response: failed
13,163,608 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,163,929 >>> mbox cmd response: failed
13,164,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,164,504 >>> mbox cmd response: failed
Initializing fuses
2,053,111 writing to cptra_bootfsm_go
2,242,415 UART:
2,242,758 UART: Running Caliptra ROM ...
2,243,804 UART:
2,243,960 UART: [state] CFI Enabled
2,313,983 UART: [state] LifecycleState = Unprovisioned
2,315,897 UART: [state] DebugLocked = No
2,318,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,323,936 UART: [kat] SHA2-256
2,493,641 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,164 UART: [kat] ++
2,504,625 UART: [kat] sha1
2,515,806 UART: [kat] SHA2-256
2,518,506 UART: [kat] SHA2-384
2,525,469 UART: [kat] SHA2-512-ACC
2,527,884 UART: [kat] ECC-384
4,813,297 UART: [kat] HMAC-384Kdf
4,846,003 UART: [kat] LMS
6,036,302 UART: [kat] --
6,039,389 UART: [cold-reset] ++
6,041,380 UART: [fht] Storing FHT @ 0x50003400
6,053,348 UART: [idev] ++
6,053,979 UART: [idev] CDI.KEYID = 6
6,054,893 UART: [idev] SUBJECT.KEYID = 7
6,056,117 UART: [idev] UDS.KEYID = 0
6,058,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,207,687 UART: [idev] Erasing UDS.KEYID = 0
9,391,064 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,152 UART: [idev] --
9,417,235 UART: [ldev] ++
9,417,806 UART: [ldev] CDI.KEYID = 6
9,418,753 UART: [ldev] SUBJECT.KEYID = 5
9,420,020 UART: [ldev] AUTHORITY.KEYID = 7
9,421,265 UART: [ldev] FE.KEYID = 1
9,467,062 UART: [ldev] Erasing FE.KEYID = 1
12,796,935 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,095,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,110,184 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,139,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,371 UART: [ldev] --
15,161,337 UART: [fwproc] Waiting for Commands...
15,163,441 UART: [fwproc] Received command 0x46574c44
15,165,682 UART: [fwproc] Received Image of size 118548 bytes
19,274,519 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,195 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,751,250 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,805,173 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,917,853 >>> mbox cmd response: failed
12,918,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,918,823 >>> mbox cmd response: failed
12,919,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,919,388 >>> mbox cmd response: failed
Initializing fuses
2,048,236 writing to cptra_bootfsm_go
5,821,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,980,031 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,609 UART:
192,986 UART: Running Caliptra ROM ...
194,130 UART:
603,800 UART: [state] CFI Enabled
615,790 UART: [state] LifecycleState = Unprovisioned
617,699 UART: [state] DebugLocked = No
619,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,085 UART: [kat] SHA2-256
793,839 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,393 UART: [kat] ++
804,883 UART: [kat] sha1
816,470 UART: [kat] SHA2-256
819,222 UART: [kat] SHA2-384
824,933 UART: [kat] SHA2-512-ACC
827,263 UART: [kat] ECC-384
3,112,900 UART: [kat] HMAC-384Kdf
3,124,921 UART: [kat] LMS
4,315,054 UART: [kat] --
4,319,169 UART: [cold-reset] ++
4,321,165 UART: [fht] Storing FHT @ 0x50003400
4,332,652 UART: [idev] ++
4,333,219 UART: [idev] CDI.KEYID = 6
4,334,170 UART: [idev] SUBJECT.KEYID = 7
4,335,386 UART: [idev] UDS.KEYID = 0
4,338,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,668 UART: [idev] Erasing UDS.KEYID = 0
7,624,172 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,630 UART: [idev] --
7,649,710 UART: [ldev] ++
7,650,294 UART: [ldev] CDI.KEYID = 6
7,651,240 UART: [ldev] SUBJECT.KEYID = 5
7,652,462 UART: [ldev] AUTHORITY.KEYID = 7
7,653,707 UART: [ldev] FE.KEYID = 1
7,665,391 UART: [ldev] Erasing FE.KEYID = 1
10,951,066 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,115 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,459 UART: [ldev] --
13,310,848 UART: [fwproc] Waiting for Commands...
13,313,257 UART: [fwproc] Received command 0x46574c44
13,315,460 UART: [fwproc] Received Image of size 118548 bytes
13,371,676 UART: ROM Fatal Error: 0x000B0001
13,375,215 >>> mbox cmd response: failed
13,375,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,994 >>> mbox cmd response: failed
13,376,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,376,564 >>> mbox cmd response: failed
Initializing fuses
2,053,454 writing to cptra_bootfsm_go
2,242,856 UART:
2,243,211 UART: Running Caliptra ROM ...
2,244,362 UART:
7,094,888 UART: [state] CFI Enabled
7,110,072 UART: [state] LifecycleState = Unprovisioned
7,112,006 UART: [state] DebugLocked = No
7,113,729 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,117,928 UART: [kat] SHA2-256
7,287,683 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,298,219 UART: [kat] ++
7,298,714 UART: [kat] sha1
7,308,744 UART: [kat] SHA2-256
7,311,438 UART: [kat] SHA2-384
7,315,865 UART: [kat] SHA2-512-ACC
7,318,235 UART: [kat] ECC-384
9,602,414 UART: [kat] HMAC-384Kdf
9,614,048 UART: [kat] LMS
10,804,179 UART: [kat] --
10,809,314 UART: [cold-reset] ++
10,810,388 UART: [fht] Storing FHT @ 0x50003400
10,822,315 UART: [idev] ++
10,822,895 UART: [idev] CDI.KEYID = 6
10,823,862 UART: [idev] SUBJECT.KEYID = 7
10,825,079 UART: [idev] UDS.KEYID = 0
10,827,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,976,422 UART: [idev] Erasing UDS.KEYID = 0
14,112,585 UART: [idev] Using Sha1 for KeyId Algorithm
14,134,999 UART: [idev] --
14,139,211 UART: [ldev] ++
14,139,785 UART: [ldev] CDI.KEYID = 6
14,140,754 UART: [ldev] SUBJECT.KEYID = 5
14,141,963 UART: [ldev] AUTHORITY.KEYID = 7
14,143,205 UART: [ldev] FE.KEYID = 1
14,152,770 UART: [ldev] Erasing FE.KEYID = 1
17,443,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,737,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,752,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,767,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,781,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,799,914 UART: [ldev] --
19,804,540 UART: [fwproc] Waiting for Commands...
19,807,401 UART: [fwproc] Received command 0x46574c44
19,809,596 UART: [fwproc] Received Image of size 118548 bytes
23,913,752 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,988,165 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,061,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,389,184 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,169 writing to cptra_bootfsm_go
4,129,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,112,636 >>> mbox cmd response: failed
13,113,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,113,543 >>> mbox cmd response: failed
13,114,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,368 >>> mbox cmd response: failed
Initializing fuses
2,056,487 writing to cptra_bootfsm_go
10,889,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,918,356 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
192,122 UART:
192,499 UART: Running Caliptra ROM ...
193,682 UART:
193,844 UART: [state] CFI Enabled
262,751 UART: [state] LifecycleState = Unprovisioned
264,901 UART: [state] DebugLocked = No
266,312 UART: [state] WD Timer not started. Device not locked for debugging
269,465 UART: [kat] SHA2-256
449,137 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,936 UART: [kat] ++
460,424 UART: [kat] sha1
471,413 UART: [kat] SHA2-256
474,101 UART: [kat] SHA2-384
479,283 UART: [kat] SHA2-512-ACC
481,679 UART: [kat] ECC-384
2,946,925 UART: [kat] HMAC-384Kdf
2,969,492 UART: [kat] LMS
3,445,995 UART: [kat] --
3,450,284 UART: [cold-reset] ++
3,452,823 UART: [fht] FHT @ 0x50003400
3,464,265 UART: [idev] ++
3,464,871 UART: [idev] CDI.KEYID = 6
3,465,811 UART: [idev] SUBJECT.KEYID = 7
3,467,036 UART: [idev] UDS.KEYID = 0
3,469,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,986 UART: [idev] Erasing UDS.KEYID = 0
5,986,897 UART: [idev] Sha1 KeyId Algorithm
6,009,018 UART: [idev] --
6,015,189 UART: [ldev] ++
6,015,766 UART: [ldev] CDI.KEYID = 6
6,016,681 UART: [ldev] SUBJECT.KEYID = 5
6,017,850 UART: [ldev] AUTHORITY.KEYID = 7
6,019,143 UART: [ldev] FE.KEYID = 1
6,056,108 UART: [ldev] Erasing FE.KEYID = 1
8,563,160 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,532 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,286 UART: [ldev] --
10,373,881 UART: [fwproc] Wait for Commands...
10,376,149 UART: [fwproc] Recv command 0x46574c44
10,378,144 UART: [fwproc] Recv'd Img size: 118548 bytes
10,450,344 UART: ROM Fatal Error: 0x000B0001
10,453,541 >>> mbox cmd response: failed
10,453,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,454,320 >>> mbox cmd response: failed
10,454,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,454,887 >>> mbox cmd response: failed
Initializing fuses
2,055,719 writing to cptra_bootfsm_go
2,245,096 UART:
2,245,458 UART: Running Caliptra ROM ...
2,246,506 UART:
2,246,662 UART: [state] CFI Enabled
2,308,201 UART: [state] LifecycleState = Unprovisioned
2,310,152 UART: [state] DebugLocked = No
2,312,815 UART: [state] WD Timer not started. Device not locked for debugging
2,316,672 UART: [kat] SHA2-256
2,496,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,507,095 UART: [kat] ++
2,507,566 UART: [kat] sha1
2,517,865 UART: [kat] SHA2-256
2,520,566 UART: [kat] SHA2-384
2,527,432 UART: [kat] SHA2-512-ACC
2,529,791 UART: [kat] ECC-384
4,989,077 UART: [kat] HMAC-384Kdf
5,011,923 UART: [kat] LMS
5,488,385 UART: [kat] --
5,492,737 UART: [cold-reset] ++
5,494,967 UART: [fht] FHT @ 0x50003400
5,506,391 UART: [idev] ++
5,507,020 UART: [idev] CDI.KEYID = 6
5,507,914 UART: [idev] SUBJECT.KEYID = 7
5,509,188 UART: [idev] UDS.KEYID = 0
5,512,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,661,428 UART: [idev] Erasing UDS.KEYID = 0
8,029,630 UART: [idev] Sha1 KeyId Algorithm
8,053,289 UART: [idev] --
8,057,860 UART: [ldev] ++
8,058,446 UART: [ldev] CDI.KEYID = 6
8,059,343 UART: [ldev] SUBJECT.KEYID = 5
8,060,563 UART: [ldev] AUTHORITY.KEYID = 7
8,061,829 UART: [ldev] FE.KEYID = 1
8,099,895 UART: [ldev] Erasing FE.KEYID = 1
10,606,003 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,341,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,356,940 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,372,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,388,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,409,281 UART: [ldev] --
12,415,038 UART: [fwproc] Wait for Commands...
12,417,039 UART: [fwproc] Recv command 0x46574c44
12,419,036 UART: [fwproc] Recv'd Img size: 118548 bytes
15,903,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,981,232 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,054,257 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,382,918 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,466,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,344,186 >>> mbox cmd response: failed
10,344,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,345,162 >>> mbox cmd response: failed
10,345,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,345,741 >>> mbox cmd response: failed
Initializing fuses
2,062,849 writing to cptra_bootfsm_go
5,509,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,269,500 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,606 UART:
192,992 UART: Running Caliptra ROM ...
194,180 UART:
603,615 UART: [state] CFI Enabled
620,691 UART: [state] LifecycleState = Unprovisioned
622,606 UART: [state] DebugLocked = No
625,347 UART: [state] WD Timer not started. Device not locked for debugging
629,955 UART: [kat] SHA2-256
809,588 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,377 UART: [kat] ++
820,861 UART: [kat] sha1
832,119 UART: [kat] SHA2-256
834,813 UART: [kat] SHA2-384
842,414 UART: [kat] SHA2-512-ACC
844,814 UART: [kat] ECC-384
3,286,260 UART: [kat] HMAC-384Kdf
3,298,472 UART: [kat] LMS
3,775,019 UART: [kat] --
3,779,553 UART: [cold-reset] ++
3,781,648 UART: [fht] FHT @ 0x50003400
3,792,748 UART: [idev] ++
3,793,316 UART: [idev] CDI.KEYID = 6
3,794,287 UART: [idev] SUBJECT.KEYID = 7
3,795,507 UART: [idev] UDS.KEYID = 0
3,798,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,399 UART: [idev] Erasing UDS.KEYID = 0
6,269,239 UART: [idev] Sha1 KeyId Algorithm
6,293,982 UART: [idev] --
6,298,406 UART: [ldev] ++
6,298,986 UART: [ldev] CDI.KEYID = 6
6,299,899 UART: [ldev] SUBJECT.KEYID = 5
6,301,058 UART: [ldev] AUTHORITY.KEYID = 7
6,302,427 UART: [ldev] FE.KEYID = 1
6,313,405 UART: [ldev] Erasing FE.KEYID = 1
8,793,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,553 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,001 UART: [ldev] --
10,589,614 UART: [fwproc] Wait for Commands...
10,592,539 UART: [fwproc] Recv command 0x46574c44
10,594,596 UART: [fwproc] Recv'd Img size: 118548 bytes
10,668,753 UART: ROM Fatal Error: 0x000B0001
10,672,003 >>> mbox cmd response: failed
10,672,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,672,769 >>> mbox cmd response: failed
10,673,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,673,364 >>> mbox cmd response: failed
Initializing fuses
2,053,918 writing to cptra_bootfsm_go
2,243,189 UART:
2,243,546 UART: Running Caliptra ROM ...
2,244,689 UART:
9,785,944 UART: [state] CFI Enabled
9,800,819 UART: [state] LifecycleState = Unprovisioned
9,802,741 UART: [state] DebugLocked = No
9,805,300 UART: [state] WD Timer not started. Device not locked for debugging
9,808,353 UART: [kat] SHA2-256
9,988,015 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,998,821 UART: [kat] ++
9,999,309 UART: [kat] sha1
10,010,473 UART: [kat] SHA2-256
10,013,177 UART: [kat] SHA2-384
10,019,767 UART: [kat] SHA2-512-ACC
10,022,124 UART: [kat] ECC-384
12,462,628 UART: [kat] HMAC-384Kdf
12,476,169 UART: [kat] LMS
12,952,696 UART: [kat] --
12,956,848 UART: [cold-reset] ++
12,959,163 UART: [fht] FHT @ 0x50003400
12,970,091 UART: [idev] ++
12,970,669 UART: [idev] CDI.KEYID = 6
12,971,689 UART: [idev] SUBJECT.KEYID = 7
12,972,856 UART: [idev] UDS.KEYID = 0
12,975,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,124,874 UART: [idev] Erasing UDS.KEYID = 0
15,450,128 UART: [idev] Sha1 KeyId Algorithm
15,474,440 UART: [idev] --
15,479,565 UART: [ldev] ++
15,480,135 UART: [ldev] CDI.KEYID = 6
15,481,020 UART: [ldev] SUBJECT.KEYID = 5
15,482,238 UART: [ldev] AUTHORITY.KEYID = 7
15,483,529 UART: [ldev] FE.KEYID = 1
15,493,289 UART: [ldev] Erasing FE.KEYID = 1
17,969,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,687,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,703,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,719,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,735,207 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,757,590 UART: [ldev] --
19,763,463 UART: [fwproc] Wait for Commands...
19,765,351 UART: [fwproc] Recv command 0x46574c44
19,767,419 UART: [fwproc] Recv'd Img size: 118548 bytes
23,247,817 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,330,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,403,879 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,731,516 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,788,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,545,933 >>> mbox cmd response: failed
10,546,674 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,036 >>> mbox cmd response: failed
10,547,312 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,547,666 >>> mbox cmd response: failed
Initializing fuses
2,062,363 writing to cptra_bootfsm_go
13,104,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,763,554 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,566 UART:
192,922 UART: Running Caliptra ROM ...
194,121 UART:
194,274 UART: [state] CFI Enabled
264,477 UART: [state] LifecycleState = Unprovisioned
266,867 UART: [state] DebugLocked = No
268,068 UART: [state] WD Timer not started. Device not locked for debugging
272,085 UART: [kat] SHA2-256
461,959 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,728 UART: [kat] ++
473,225 UART: [kat] sha1
486,114 UART: [kat] SHA2-256
489,129 UART: [kat] SHA2-384
495,980 UART: [kat] SHA2-512-ACC
498,545 UART: [kat] ECC-384
2,947,842 UART: [kat] HMAC-384Kdf
2,971,082 UART: [kat] LMS
3,502,866 UART: [kat] --
3,507,415 UART: [cold-reset] ++
3,509,519 UART: [fht] FHT @ 0x50003400
3,520,904 UART: [idev] ++
3,521,590 UART: [idev] CDI.KEYID = 6
3,522,612 UART: [idev] SUBJECT.KEYID = 7
3,523,721 UART: [idev] UDS.KEYID = 0
3,526,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,056 UART: [idev] Erasing UDS.KEYID = 0
6,029,378 UART: [idev] Sha1 KeyId Algorithm
6,050,731 UART: [idev] --
6,054,300 UART: [ldev] ++
6,055,153 UART: [ldev] CDI.KEYID = 6
6,056,152 UART: [ldev] SUBJECT.KEYID = 5
6,057,272 UART: [ldev] AUTHORITY.KEYID = 7
6,058,460 UART: [ldev] FE.KEYID = 1
6,100,116 UART: [ldev] Erasing FE.KEYID = 1
8,606,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,759 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,931 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,711 UART: [ldev] --
10,416,508 UART: [fwproc] Wait for Commands...
10,419,421 UART: [fwproc] Recv command 0x46574c44
10,421,742 UART: [fwproc] Recv'd Img size: 118548 bytes
10,508,681 UART: ROM Fatal Error: 0x000B0001
10,512,361 >>> mbox cmd response: failed
10,512,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,062 >>> mbox cmd response: failed
10,513,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,513,639 >>> mbox cmd response: failed
Initializing fuses
2,055,315 writing to cptra_bootfsm_go
2,244,697 UART:
2,245,051 UART: Running Caliptra ROM ...
2,246,191 UART:
2,246,366 UART: [state] CFI Enabled
2,315,035 UART: [state] LifecycleState = Unprovisioned
2,317,406 UART: [state] DebugLocked = No
2,319,023 UART: [state] WD Timer not started. Device not locked for debugging
2,322,882 UART: [kat] SHA2-256
2,512,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,523,523 UART: [kat] ++
2,523,988 UART: [kat] sha1
2,536,020 UART: [kat] SHA2-256
2,538,995 UART: [kat] SHA2-384
2,546,398 UART: [kat] SHA2-512-ACC
2,548,989 UART: [kat] ECC-384
4,998,508 UART: [kat] HMAC-384Kdf
5,023,163 UART: [kat] LMS
5,554,947 UART: [kat] --
5,560,883 UART: [cold-reset] ++
5,562,716 UART: [fht] FHT @ 0x50003400
5,575,269 UART: [idev] ++
5,575,953 UART: [idev] CDI.KEYID = 6
5,576,972 UART: [idev] SUBJECT.KEYID = 7
5,578,143 UART: [idev] UDS.KEYID = 0
5,580,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,592 UART: [idev] Erasing UDS.KEYID = 0
8,081,891 UART: [idev] Sha1 KeyId Algorithm
8,103,727 UART: [idev] --
8,107,539 UART: [ldev] ++
8,108,237 UART: [ldev] CDI.KEYID = 6
8,109,168 UART: [ldev] SUBJECT.KEYID = 5
8,110,334 UART: [ldev] AUTHORITY.KEYID = 7
8,111,515 UART: [ldev] FE.KEYID = 1
8,152,250 UART: [ldev] Erasing FE.KEYID = 1
10,660,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,139 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,615 UART: [ldev] --
12,466,567 UART: [fwproc] Wait for Commands...
12,469,047 UART: [fwproc] Recv command 0x46574c44
12,471,367 UART: [fwproc] Recv'd Img size: 118548 bytes
15,967,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,042,792 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,166,404 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,725,877 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,443,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,304,794 >>> mbox cmd response: failed
10,305,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,305,715 >>> mbox cmd response: failed
10,305,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,306,294 >>> mbox cmd response: failed
Initializing fuses
2,049,986 writing to cptra_bootfsm_go
5,487,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,844,260 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,399 UART:
192,756 UART: Running Caliptra ROM ...
193,949 UART:
603,593 UART: [state] CFI Enabled
618,187 UART: [state] LifecycleState = Unprovisioned
620,509 UART: [state] DebugLocked = No
623,413 UART: [state] WD Timer not started. Device not locked for debugging
627,986 UART: [kat] SHA2-256
817,856 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,685 UART: [kat] ++
829,283 UART: [kat] sha1
842,385 UART: [kat] SHA2-256
845,400 UART: [kat] SHA2-384
852,085 UART: [kat] SHA2-512-ACC
854,709 UART: [kat] ECC-384
3,297,336 UART: [kat] HMAC-384Kdf
3,310,935 UART: [kat] LMS
3,842,783 UART: [kat] --
3,846,296 UART: [cold-reset] ++
3,847,583 UART: [fht] FHT @ 0x50003400
3,860,304 UART: [idev] ++
3,860,992 UART: [idev] CDI.KEYID = 6
3,861,936 UART: [idev] SUBJECT.KEYID = 7
3,863,153 UART: [idev] UDS.KEYID = 0
3,866,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,015,658 UART: [idev] Erasing UDS.KEYID = 0
6,338,670 UART: [idev] Sha1 KeyId Algorithm
6,360,022 UART: [idev] --
6,364,347 UART: [ldev] ++
6,365,037 UART: [ldev] CDI.KEYID = 6
6,365,956 UART: [ldev] SUBJECT.KEYID = 5
6,367,200 UART: [ldev] AUTHORITY.KEYID = 7
6,368,384 UART: [ldev] FE.KEYID = 1
6,379,209 UART: [ldev] Erasing FE.KEYID = 1
8,860,101 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,294 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,936 UART: [ldev] --
10,650,530 UART: [fwproc] Wait for Commands...
10,653,293 UART: [fwproc] Recv command 0x46574c44
10,655,563 UART: [fwproc] Recv'd Img size: 118548 bytes
10,739,823 UART: ROM Fatal Error: 0x000B0001
10,743,460 >>> mbox cmd response: failed
10,743,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,223 >>> mbox cmd response: failed
10,744,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,823 >>> mbox cmd response: failed
Initializing fuses
2,054,384 writing to cptra_bootfsm_go
2,243,719 UART:
2,244,076 UART: Running Caliptra ROM ...
2,245,221 UART:
9,711,639 UART: [state] CFI Enabled
9,724,049 UART: [state] LifecycleState = Unprovisioned
9,726,499 UART: [state] DebugLocked = No
9,728,737 UART: [state] WD Timer not started. Device not locked for debugging
9,733,533 UART: [kat] SHA2-256
9,923,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,934,231 UART: [kat] ++
9,934,694 UART: [kat] sha1
9,946,510 UART: [kat] SHA2-256
9,949,489 UART: [kat] SHA2-384
9,955,878 UART: [kat] SHA2-512-ACC
9,958,447 UART: [kat] ECC-384
12,399,708 UART: [kat] HMAC-384Kdf
12,413,110 UART: [kat] LMS
12,944,930 UART: [kat] --
12,948,611 UART: [cold-reset] ++
12,951,040 UART: [fht] FHT @ 0x50003400
12,963,707 UART: [idev] ++
12,964,391 UART: [idev] CDI.KEYID = 6
12,965,414 UART: [idev] SUBJECT.KEYID = 7
12,966,580 UART: [idev] UDS.KEYID = 0
12,969,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,118,308 UART: [idev] Erasing UDS.KEYID = 0
15,441,747 UART: [idev] Sha1 KeyId Algorithm
15,464,290 UART: [idev] --
15,468,877 UART: [ldev] ++
15,469,559 UART: [ldev] CDI.KEYID = 6
15,470,476 UART: [ldev] SUBJECT.KEYID = 5
15,471,638 UART: [ldev] AUTHORITY.KEYID = 7
15,472,873 UART: [ldev] FE.KEYID = 1
15,486,079 UART: [ldev] Erasing FE.KEYID = 1
17,964,867 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,685,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,716,053 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,731,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,752,985 UART: [ldev] --
19,757,987 UART: [fwproc] Wait for Commands...
19,760,481 UART: [fwproc] Recv command 0x46574c44
19,762,807 UART: [fwproc] Recv'd Img size: 118548 bytes
23,263,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,336,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,459,683 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,019,862 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
3,759,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,516,183 >>> mbox cmd response: failed
10,516,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,517,230 >>> mbox cmd response: failed
10,517,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,518,125 >>> mbox cmd response: failed
Initializing fuses
2,049,238 writing to cptra_bootfsm_go
13,107,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,396,492 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,254 UART: [state] LifecycleState = Unprovisioned
85,909 UART: [state] DebugLocked = No
86,475 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,997 UART: [kat] SHA2-256
881,928 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,043 UART: [kat] ++
886,195 UART: [kat] sha1
890,371 UART: [kat] SHA2-256
892,309 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,558 UART: [kat] HMAC-384Kdf
907,204 UART: [kat] LMS
1,475,400 UART: [kat] --
1,476,167 UART: [cold-reset] ++
1,476,735 UART: [fht] Storing FHT @ 0x50003400
1,479,690 UART: [idev] ++
1,479,858 UART: [idev] CDI.KEYID = 6
1,480,218 UART: [idev] SUBJECT.KEYID = 7
1,480,642 UART: [idev] UDS.KEYID = 0
1,480,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,504,978 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,678 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,520,781 UART: [ldev] Erasing FE.KEYID = 1
1,546,176 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,016 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,164 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,334 UART: [fwproc] Received command 0x46574c44
1,587,125 UART: [fwproc] Received Image of size 118548 bytes
1,606,613 UART: ROM Fatal Error: 0x000B0001
1,607,770 >>> mbox cmd response: failed
1,607,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,776 >>> mbox cmd response: failed
1,607,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,607,782 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,982 UART: [state] LifecycleState = Unprovisioned
85,637 UART: [state] DebugLocked = No
86,193 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,287 UART: [kat] SHA2-256
892,225 UART: [kat] SHA2-384
894,912 UART: [kat] SHA2-512-ACC
896,813 UART: [kat] ECC-384
902,550 UART: [kat] HMAC-384Kdf
907,186 UART: [kat] LMS
1,475,382 UART: [kat] --
1,476,425 UART: [cold-reset] ++
1,476,813 UART: [fht] Storing FHT @ 0x50003400
1,479,642 UART: [idev] ++
1,479,810 UART: [idev] CDI.KEYID = 6
1,480,170 UART: [idev] SUBJECT.KEYID = 7
1,480,594 UART: [idev] UDS.KEYID = 0
1,480,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,568 UART: [idev] Erasing UDS.KEYID = 0
1,505,038 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,627 UART: [ldev] ++
1,514,795 UART: [ldev] CDI.KEYID = 6
1,515,158 UART: [ldev] SUBJECT.KEYID = 5
1,515,584 UART: [ldev] AUTHORITY.KEYID = 7
1,516,047 UART: [ldev] FE.KEYID = 1
1,520,971 UART: [ldev] Erasing FE.KEYID = 1
1,546,018 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,132 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,116 UART: [ldev] --
1,585,603 UART: [fwproc] Waiting for Commands...
1,586,294 UART: [fwproc] Received command 0x46574c44
1,587,085 UART: [fwproc] Received Image of size 118548 bytes
2,930,908 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,268 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,486 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,793 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,367 >>> mbox cmd response: failed
1,461,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,373 >>> mbox cmd response: failed
1,461,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,247 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,844 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,456 UART: [kat] SHA2-256
882,387 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,502 UART: [kat] ++
886,654 UART: [kat] sha1
891,014 UART: [kat] SHA2-256
892,952 UART: [kat] SHA2-384
895,649 UART: [kat] SHA2-512-ACC
897,550 UART: [kat] ECC-384
903,179 UART: [kat] HMAC-384Kdf
907,899 UART: [kat] LMS
1,476,095 UART: [kat] --
1,476,962 UART: [cold-reset] ++
1,477,366 UART: [fht] Storing FHT @ 0x50003400
1,480,107 UART: [idev] ++
1,480,275 UART: [idev] CDI.KEYID = 6
1,480,635 UART: [idev] SUBJECT.KEYID = 7
1,481,059 UART: [idev] UDS.KEYID = 0
1,481,404 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,135 UART: [idev] Erasing UDS.KEYID = 0
1,506,493 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,939 UART: [idev] --
1,516,046 UART: [ldev] ++
1,516,214 UART: [ldev] CDI.KEYID = 6
1,516,577 UART: [ldev] SUBJECT.KEYID = 5
1,517,003 UART: [ldev] AUTHORITY.KEYID = 7
1,517,466 UART: [ldev] FE.KEYID = 1
1,522,200 UART: [ldev] Erasing FE.KEYID = 1
1,547,397 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,106 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,822 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,493 UART: [ldev] --
1,586,836 UART: [fwproc] Waiting for Commands...
1,587,689 UART: [fwproc] Received command 0x46574c44
1,588,480 UART: [fwproc] Received Image of size 118548 bytes
1,607,462 UART: ROM Fatal Error: 0x000B0001
1,608,619 >>> mbox cmd response: failed
1,608,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,625 >>> mbox cmd response: failed
1,608,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,631 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,570 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,046 UART: [kat] SHA2-256
881,977 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,092 UART: [kat] ++
886,244 UART: [kat] sha1
890,500 UART: [kat] SHA2-256
892,438 UART: [kat] SHA2-384
895,145 UART: [kat] SHA2-512-ACC
897,046 UART: [kat] ECC-384
902,509 UART: [kat] HMAC-384Kdf
907,061 UART: [kat] LMS
1,475,257 UART: [kat] --
1,476,294 UART: [cold-reset] ++
1,476,694 UART: [fht] Storing FHT @ 0x50003400
1,479,683 UART: [idev] ++
1,479,851 UART: [idev] CDI.KEYID = 6
1,480,211 UART: [idev] SUBJECT.KEYID = 7
1,480,635 UART: [idev] UDS.KEYID = 0
1,480,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,933 UART: [idev] Erasing UDS.KEYID = 0
1,506,097 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,765 UART: [idev] --
1,515,946 UART: [ldev] ++
1,516,114 UART: [ldev] CDI.KEYID = 6
1,516,477 UART: [ldev] SUBJECT.KEYID = 5
1,516,903 UART: [ldev] AUTHORITY.KEYID = 7
1,517,366 UART: [ldev] FE.KEYID = 1
1,522,722 UART: [ldev] Erasing FE.KEYID = 1
1,548,407 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,515 UART: [ldev] --
1,587,980 UART: [fwproc] Waiting for Commands...
1,588,799 UART: [fwproc] Received command 0x46574c44
1,589,590 UART: [fwproc] Received Image of size 118548 bytes
2,933,575 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,085 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,303 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,746 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,461,386 >>> mbox cmd response: failed
1,461,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,392 >>> mbox cmd response: failed
1,461,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,461,398 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,080 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,364 UART: [state] LifecycleState = Unprovisioned
86,019 UART: [state] DebugLocked = No
86,597 UART: [state] WD Timer not started. Device not locked for debugging
87,750 UART: [kat] SHA2-256
891,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,404 UART: [kat] ++
895,556 UART: [kat] sha1
899,706 UART: [kat] SHA2-256
901,646 UART: [kat] SHA2-384
904,395 UART: [kat] SHA2-512-ACC
906,296 UART: [kat] ECC-384
915,997 UART: [kat] HMAC-384Kdf
920,403 UART: [kat] LMS
1,168,715 UART: [kat] --
1,169,464 UART: [cold-reset] ++
1,169,886 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,198,745 UART: [idev] Sha1 KeyId Algorithm
1,207,685 UART: [idev] --
1,208,656 UART: [ldev] ++
1,208,824 UART: [ldev] CDI.KEYID = 6
1,209,188 UART: [ldev] SUBJECT.KEYID = 5
1,209,615 UART: [ldev] AUTHORITY.KEYID = 7
1,210,078 UART: [ldev] FE.KEYID = 1
1,215,646 UART: [ldev] Erasing FE.KEYID = 1
1,242,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,034 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,716 UART: [ldev] --
1,282,149 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,617 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,813 UART: ROM Fatal Error: 0x000B0001
1,303,970 >>> mbox cmd response: failed
1,303,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,976 >>> mbox cmd response: failed
1,303,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,484 UART: [state] LifecycleState = Unprovisioned
86,139 UART: [state] DebugLocked = No
86,851 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
891,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,732 UART: [kat] ++
895,884 UART: [kat] sha1
900,092 UART: [kat] SHA2-256
902,032 UART: [kat] SHA2-384
904,613 UART: [kat] SHA2-512-ACC
906,514 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,897 UART: [kat] LMS
1,169,209 UART: [kat] --
1,170,116 UART: [cold-reset] ++
1,170,562 UART: [fht] FHT @ 0x50003400
1,173,178 UART: [idev] ++
1,173,346 UART: [idev] CDI.KEYID = 6
1,173,707 UART: [idev] SUBJECT.KEYID = 7
1,174,132 UART: [idev] UDS.KEYID = 0
1,174,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,339 UART: [idev] Erasing UDS.KEYID = 0
1,199,103 UART: [idev] Sha1 KeyId Algorithm
1,208,069 UART: [idev] --
1,209,048 UART: [ldev] ++
1,209,216 UART: [ldev] CDI.KEYID = 6
1,209,580 UART: [ldev] SUBJECT.KEYID = 5
1,210,007 UART: [ldev] AUTHORITY.KEYID = 7
1,210,470 UART: [ldev] FE.KEYID = 1
1,215,752 UART: [ldev] Erasing FE.KEYID = 1
1,241,659 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,708 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,420 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,680 UART: [ldev] --
1,281,047 UART: [fwproc] Wait for Commands...
1,281,710 UART: [fwproc] Recv command 0x46574c44
1,282,443 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,349 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,724 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,476 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,267 >>> mbox cmd response: failed
1,158,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,273 >>> mbox cmd response: failed
1,158,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,279 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,445 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,971 UART: [kat] SHA2-256
891,521 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,625 UART: [kat] ++
895,777 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,814 UART: [kat] SHA2-512-ACC
906,715 UART: [kat] ECC-384
916,190 UART: [kat] HMAC-384Kdf
920,744 UART: [kat] LMS
1,169,056 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,323 UART: [fht] FHT @ 0x50003400
1,173,031 UART: [idev] ++
1,173,199 UART: [idev] CDI.KEYID = 6
1,173,560 UART: [idev] SUBJECT.KEYID = 7
1,173,985 UART: [idev] UDS.KEYID = 0
1,174,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,342 UART: [idev] Erasing UDS.KEYID = 0
1,199,434 UART: [idev] Sha1 KeyId Algorithm
1,208,284 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,519 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,533 UART: [ldev] --
1,281,758 UART: [fwproc] Wait for Commands...
1,282,353 UART: [fwproc] Recv command 0x46574c44
1,283,086 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,364 UART: ROM Fatal Error: 0x000B0001
1,303,521 >>> mbox cmd response: failed
1,303,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,527 >>> mbox cmd response: failed
1,303,527 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,402 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
915,878 UART: [kat] HMAC-384Kdf
920,604 UART: [kat] LMS
1,168,916 UART: [kat] --
1,169,739 UART: [cold-reset] ++
1,170,253 UART: [fht] FHT @ 0x50003400
1,172,963 UART: [idev] ++
1,173,131 UART: [idev] CDI.KEYID = 6
1,173,492 UART: [idev] SUBJECT.KEYID = 7
1,173,917 UART: [idev] UDS.KEYID = 0
1,174,263 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,199,512 UART: [idev] Sha1 KeyId Algorithm
1,208,458 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,549 UART: [ldev] Erasing FE.KEYID = 1
1,242,804 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,633 UART: [ldev] --
1,282,044 UART: [fwproc] Wait for Commands...
1,282,693 UART: [fwproc] Recv command 0x46574c44
1,283,426 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,006 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,283 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,458 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,685 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,978 >>> mbox cmd response: failed
1,159,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,984 >>> mbox cmd response: failed
1,159,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,140 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,166 UART: [state] LifecycleState = Unprovisioned
85,821 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
893,402 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,527 UART: [kat] ++
897,679 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,598 UART: [kat] SHA2-512-ACC
908,499 UART: [kat] ECC-384
918,214 UART: [kat] HMAC-384Kdf
922,884 UART: [kat] LMS
1,171,212 UART: [kat] --
1,172,209 UART: [cold-reset] ++
1,172,579 UART: [fht] FHT @ 0x50003400
1,175,260 UART: [idev] ++
1,175,428 UART: [idev] CDI.KEYID = 6
1,175,788 UART: [idev] SUBJECT.KEYID = 7
1,176,212 UART: [idev] UDS.KEYID = 0
1,176,557 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,280 UART: [idev] Erasing UDS.KEYID = 0
1,201,419 UART: [idev] Sha1 KeyId Algorithm
1,209,911 UART: [idev] --
1,211,165 UART: [ldev] ++
1,211,333 UART: [ldev] CDI.KEYID = 6
1,211,696 UART: [ldev] SUBJECT.KEYID = 5
1,212,122 UART: [ldev] AUTHORITY.KEYID = 7
1,212,585 UART: [ldev] FE.KEYID = 1
1,217,687 UART: [ldev] Erasing FE.KEYID = 1
1,244,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,753 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,469 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,360 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,072 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,155 UART: [ldev] --
1,283,590 UART: [fwproc] Wait for Commands...
1,284,266 UART: [fwproc] Recv command 0x46574c44
1,284,994 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,406 UART: ROM Fatal Error: 0x000B0001
1,305,563 >>> mbox cmd response: failed
1,305,563 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,569 >>> mbox cmd response: failed
1,305,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,478 UART: [state] LifecycleState = Unprovisioned
85,133 UART: [state] DebugLocked = No
85,639 UART: [state] WD Timer not started. Device not locked for debugging
86,914 UART: [kat] SHA2-256
892,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,689 UART: [kat] ++
896,841 UART: [kat] sha1
900,993 UART: [kat] SHA2-256
902,933 UART: [kat] SHA2-384
905,786 UART: [kat] SHA2-512-ACC
907,687 UART: [kat] ECC-384
917,212 UART: [kat] HMAC-384Kdf
921,776 UART: [kat] LMS
1,170,104 UART: [kat] --
1,170,919 UART: [cold-reset] ++
1,171,461 UART: [fht] FHT @ 0x50003400
1,174,202 UART: [idev] ++
1,174,370 UART: [idev] CDI.KEYID = 6
1,174,730 UART: [idev] SUBJECT.KEYID = 7
1,175,154 UART: [idev] UDS.KEYID = 0
1,175,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,296 UART: [idev] Erasing UDS.KEYID = 0
1,200,211 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,210,089 UART: [ldev] ++
1,210,257 UART: [ldev] CDI.KEYID = 6
1,210,620 UART: [ldev] SUBJECT.KEYID = 5
1,211,046 UART: [ldev] AUTHORITY.KEYID = 7
1,211,509 UART: [ldev] FE.KEYID = 1
1,216,551 UART: [ldev] Erasing FE.KEYID = 1
1,243,048 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,019 UART: [ldev] --
1,282,374 UART: [fwproc] Wait for Commands...
1,283,146 UART: [fwproc] Recv command 0x46574c44
1,283,874 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,557 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,727 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,128 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,754 >>> mbox cmd response: failed
1,159,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,760 >>> mbox cmd response: failed
1,159,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,766 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,970 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,535 UART: [state] LifecycleState = Unprovisioned
86,190 UART: [state] DebugLocked = No
86,872 UART: [state] WD Timer not started. Device not locked for debugging
88,221 UART: [kat] SHA2-256
893,871 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,996 UART: [kat] ++
898,148 UART: [kat] sha1
902,374 UART: [kat] SHA2-256
904,314 UART: [kat] SHA2-384
907,059 UART: [kat] SHA2-512-ACC
908,960 UART: [kat] ECC-384
918,469 UART: [kat] HMAC-384Kdf
923,089 UART: [kat] LMS
1,171,417 UART: [kat] --
1,172,266 UART: [cold-reset] ++
1,172,690 UART: [fht] FHT @ 0x50003400
1,175,351 UART: [idev] ++
1,175,519 UART: [idev] CDI.KEYID = 6
1,175,879 UART: [idev] SUBJECT.KEYID = 7
1,176,303 UART: [idev] UDS.KEYID = 0
1,176,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,379 UART: [idev] Erasing UDS.KEYID = 0
1,201,446 UART: [idev] Sha1 KeyId Algorithm
1,209,976 UART: [idev] --
1,210,970 UART: [ldev] ++
1,211,138 UART: [ldev] CDI.KEYID = 6
1,211,501 UART: [ldev] SUBJECT.KEYID = 5
1,211,927 UART: [ldev] AUTHORITY.KEYID = 7
1,212,390 UART: [ldev] FE.KEYID = 1
1,217,466 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,610 UART: [ldev] --
1,284,043 UART: [fwproc] Wait for Commands...
1,284,861 UART: [fwproc] Recv command 0x46574c44
1,285,589 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,757 UART: ROM Fatal Error: 0x000B0001
1,305,914 >>> mbox cmd response: failed
1,305,914 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,920 >>> mbox cmd response: failed
1,305,920 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,399 UART: [state] LifecycleState = Unprovisioned
86,054 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
87,889 UART: [kat] SHA2-256
893,539 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,664 UART: [kat] ++
897,816 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,883 UART: [kat] SHA2-512-ACC
908,784 UART: [kat] ECC-384
918,767 UART: [kat] HMAC-384Kdf
923,409 UART: [kat] LMS
1,171,737 UART: [kat] --
1,172,772 UART: [cold-reset] ++
1,173,114 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,053 UART: [idev] Erasing UDS.KEYID = 0
1,202,402 UART: [idev] Sha1 KeyId Algorithm
1,210,648 UART: [idev] --
1,211,794 UART: [ldev] ++
1,211,962 UART: [ldev] CDI.KEYID = 6
1,212,325 UART: [ldev] SUBJECT.KEYID = 5
1,212,751 UART: [ldev] AUTHORITY.KEYID = 7
1,213,214 UART: [ldev] FE.KEYID = 1
1,218,498 UART: [ldev] Erasing FE.KEYID = 1
1,245,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,158 UART: [ldev] --
1,284,623 UART: [fwproc] Wait for Commands...
1,285,237 UART: [fwproc] Recv command 0x46574c44
1,285,965 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,997 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,300 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,470 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,619 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,435 >>> mbox cmd response: failed
1,159,435 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,441 >>> mbox cmd response: failed
1,159,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,412 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_marker_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
192,184 UART:
192,537 UART: Running Caliptra ROM ...
193,744 UART:
193,904 UART: [state] CFI Enabled
264,112 UART: [state] LifecycleState = Unprovisioned
266,078 UART: [state] DebugLocked = No
268,065 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,810 UART: [kat] SHA2-256
443,470 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,004 UART: [kat] ++
454,519 UART: [kat] sha1
464,481 UART: [kat] SHA2-256
467,174 UART: [kat] SHA2-384
473,325 UART: [kat] SHA2-512-ACC
475,675 UART: [kat] ECC-384
2,766,191 UART: [kat] HMAC-384Kdf
2,798,351 UART: [kat] LMS
3,988,692 UART: [kat] --
3,993,514 UART: [cold-reset] ++
3,996,083 UART: [fht] Storing FHT @ 0x50003400
4,007,854 UART: [idev] ++
4,008,424 UART: [idev] CDI.KEYID = 6
4,009,397 UART: [idev] SUBJECT.KEYID = 7
4,010,618 UART: [idev] UDS.KEYID = 0
4,013,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,045 UART: [idev] Erasing UDS.KEYID = 0
7,344,329 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,749 UART: [idev] --
7,370,887 UART: [ldev] ++
7,371,469 UART: [ldev] CDI.KEYID = 6
7,372,495 UART: [ldev] SUBJECT.KEYID = 5
7,373,659 UART: [ldev] AUTHORITY.KEYID = 7
7,374,898 UART: [ldev] FE.KEYID = 1
7,422,649 UART: [ldev] Erasing FE.KEYID = 1
10,757,100 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,070,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,084,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,099,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,114,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,731 UART: [ldev] --
13,137,275 UART: [fwproc] Waiting for Commands...
13,139,484 UART: [fwproc] Received command 0x46574c44
13,141,750 UART: [fwproc] Received Image of size 118548 bytes
13,197,701 UART: ROM Fatal Error: 0x000B0002
13,201,226 >>> mbox cmd response: failed
13,201,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,202,000 >>> mbox cmd response: failed
13,202,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,202,570 >>> mbox cmd response: failed
Initializing fuses
2,052,566 writing to cptra_bootfsm_go
2,241,968 UART:
2,242,327 UART: Running Caliptra ROM ...
2,243,407 UART:
2,243,576 UART: [state] CFI Enabled
2,312,833 UART: [state] LifecycleState = Unprovisioned
2,314,802 UART: [state] DebugLocked = No
2,316,691 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,875 UART: [kat] SHA2-256
2,491,606 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,502,088 UART: [kat] ++
2,502,582 UART: [kat] sha1
2,513,583 UART: [kat] SHA2-256
2,516,288 UART: [kat] SHA2-384
2,520,928 UART: [kat] SHA2-512-ACC
2,523,334 UART: [kat] ECC-384
4,816,401 UART: [kat] HMAC-384Kdf
4,850,509 UART: [kat] LMS
6,040,799 UART: [kat] --
6,046,737 UART: [cold-reset] ++
6,049,324 UART: [fht] Storing FHT @ 0x50003400
6,060,451 UART: [idev] ++
6,061,026 UART: [idev] CDI.KEYID = 6
6,062,053 UART: [idev] SUBJECT.KEYID = 7
6,063,220 UART: [idev] UDS.KEYID = 0
6,065,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,214,800 UART: [idev] Erasing UDS.KEYID = 0
9,394,408 UART: [idev] Using Sha1 for KeyId Algorithm
9,414,827 UART: [idev] --
9,419,149 UART: [ldev] ++
9,419,724 UART: [ldev] CDI.KEYID = 6
9,420,690 UART: [ldev] SUBJECT.KEYID = 5
9,421,994 UART: [ldev] AUTHORITY.KEYID = 7
9,423,181 UART: [ldev] FE.KEYID = 1
9,449,502 UART: [ldev] Erasing FE.KEYID = 1
12,783,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,097,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,605 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,141,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,160,375 UART: [ldev] --
15,165,857 UART: [fwproc] Waiting for Commands...
15,168,229 UART: [fwproc] Received command 0x46574c44
15,170,472 UART: [fwproc] Received Image of size 118548 bytes
19,273,418 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,156 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,751,049 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,784,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,894,416 >>> mbox cmd response: failed
12,895,001 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,895,354 >>> mbox cmd response: failed
12,895,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,895,920 >>> mbox cmd response: failed
Initializing fuses
2,050,538 writing to cptra_bootfsm_go
5,841,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,007,764 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
193,438 UART:
193,797 UART: Running Caliptra ROM ...
194,985 UART:
604,743 UART: [state] CFI Enabled
617,112 UART: [state] LifecycleState = Unprovisioned
619,049 UART: [state] DebugLocked = No
621,519 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,562 UART: [kat] SHA2-256
796,302 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,812 UART: [kat] ++
807,319 UART: [kat] sha1
817,602 UART: [kat] SHA2-256
820,291 UART: [kat] SHA2-384
826,918 UART: [kat] SHA2-512-ACC
829,312 UART: [kat] ECC-384
3,112,795 UART: [kat] HMAC-384Kdf
3,125,066 UART: [kat] LMS
4,315,183 UART: [kat] --
4,318,065 UART: [cold-reset] ++
4,320,237 UART: [fht] Storing FHT @ 0x50003400
4,332,013 UART: [idev] ++
4,332,627 UART: [idev] CDI.KEYID = 6
4,333,559 UART: [idev] SUBJECT.KEYID = 7
4,334,782 UART: [idev] UDS.KEYID = 0
4,337,932 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,009 UART: [idev] Erasing UDS.KEYID = 0
7,624,264 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,938 UART: [idev] --
7,649,721 UART: [ldev] ++
7,650,297 UART: [ldev] CDI.KEYID = 6
7,651,243 UART: [ldev] SUBJECT.KEYID = 5
7,652,485 UART: [ldev] AUTHORITY.KEYID = 7
7,653,728 UART: [ldev] FE.KEYID = 1
7,665,659 UART: [ldev] Erasing FE.KEYID = 1
10,956,296 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,602 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,978 UART: [ldev] --
13,315,625 UART: [fwproc] Waiting for Commands...
13,318,811 UART: [fwproc] Received command 0x46574c44
13,321,001 UART: [fwproc] Received Image of size 118548 bytes
13,372,739 UART: ROM Fatal Error: 0x000B0002
13,376,262 >>> mbox cmd response: failed
13,376,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,376,944 >>> mbox cmd response: failed
13,377,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,377,541 >>> mbox cmd response: failed
Initializing fuses
2,053,256 writing to cptra_bootfsm_go
2,242,535 UART:
2,242,886 UART: Running Caliptra ROM ...
2,243,940 UART:
7,090,523 UART: [state] CFI Enabled
7,104,586 UART: [state] LifecycleState = Unprovisioned
7,106,530 UART: [state] DebugLocked = No
7,107,829 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,112,797 UART: [kat] SHA2-256
7,282,527 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,293,042 UART: [kat] ++
7,293,548 UART: [kat] sha1
7,304,712 UART: [kat] SHA2-256
7,307,419 UART: [kat] SHA2-384
7,312,929 UART: [kat] SHA2-512-ACC
7,315,287 UART: [kat] ECC-384
9,596,293 UART: [kat] HMAC-384Kdf
9,609,018 UART: [kat] LMS
10,799,180 UART: [kat] --
10,804,468 UART: [cold-reset] ++
10,805,812 UART: [fht] Storing FHT @ 0x50003400
10,817,192 UART: [idev] ++
10,817,760 UART: [idev] CDI.KEYID = 6
10,818,727 UART: [idev] SUBJECT.KEYID = 7
10,819,946 UART: [idev] UDS.KEYID = 0
10,822,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,971,415 UART: [idev] Erasing UDS.KEYID = 0
14,105,681 UART: [idev] Using Sha1 for KeyId Algorithm
14,127,515 UART: [idev] --
14,131,143 UART: [ldev] ++
14,131,773 UART: [ldev] CDI.KEYID = 6
14,132,664 UART: [ldev] SUBJECT.KEYID = 5
14,133,945 UART: [ldev] AUTHORITY.KEYID = 7
14,135,187 UART: [ldev] FE.KEYID = 1
14,147,229 UART: [ldev] Erasing FE.KEYID = 1
17,431,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,725,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,740,183 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,754,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,769,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,787,403 UART: [ldev] --
19,792,403 UART: [fwproc] Waiting for Commands...
19,795,233 UART: [fwproc] Received command 0x46574c44
19,797,431 UART: [fwproc] Received Image of size 118548 bytes
23,904,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,979,276 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,052,448 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,381,588 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
4,134,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,112,859 >>> mbox cmd response: failed
13,113,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,113,911 >>> mbox cmd response: failed
13,114,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,114,481 >>> mbox cmd response: failed
Initializing fuses
2,050,042 writing to cptra_bootfsm_go
10,882,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,904,054 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
193,010 UART:
193,383 UART: Running Caliptra ROM ...
194,476 UART:
194,643 UART: [state] CFI Enabled
266,267 UART: [state] LifecycleState = Unprovisioned
268,250 UART: [state] DebugLocked = No
270,744 UART: [state] WD Timer not started. Device not locked for debugging
275,128 UART: [kat] SHA2-256
454,763 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,559 UART: [kat] ++
466,012 UART: [kat] sha1
476,248 UART: [kat] SHA2-256
478,994 UART: [kat] SHA2-384
484,865 UART: [kat] SHA2-512-ACC
487,259 UART: [kat] ECC-384
2,947,511 UART: [kat] HMAC-384Kdf
2,970,737 UART: [kat] LMS
3,447,216 UART: [kat] --
3,452,579 UART: [cold-reset] ++
3,454,124 UART: [fht] FHT @ 0x50003400
3,465,758 UART: [idev] ++
3,466,333 UART: [idev] CDI.KEYID = 6
3,467,310 UART: [idev] SUBJECT.KEYID = 7
3,468,531 UART: [idev] UDS.KEYID = 0
3,471,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,046 UART: [idev] Erasing UDS.KEYID = 0
5,985,863 UART: [idev] Sha1 KeyId Algorithm
6,008,812 UART: [idev] --
6,012,479 UART: [ldev] ++
6,013,079 UART: [ldev] CDI.KEYID = 6
6,014,014 UART: [ldev] SUBJECT.KEYID = 5
6,015,190 UART: [ldev] AUTHORITY.KEYID = 7
6,016,463 UART: [ldev] FE.KEYID = 1
6,055,908 UART: [ldev] Erasing FE.KEYID = 1
8,563,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,874 UART: [ldev] --
10,371,557 UART: [fwproc] Wait for Commands...
10,373,282 UART: [fwproc] Recv command 0x46574c44
10,375,279 UART: [fwproc] Recv'd Img size: 118548 bytes
10,444,764 UART: ROM Fatal Error: 0x000B0002
10,448,017 >>> mbox cmd response: failed
10,448,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,448,699 >>> mbox cmd response: failed
10,448,972 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,449,272 >>> mbox cmd response: failed
Initializing fuses
2,054,442 writing to cptra_bootfsm_go
2,243,830 UART:
2,244,183 UART: Running Caliptra ROM ...
2,245,331 UART:
2,245,507 UART: [state] CFI Enabled
2,300,454 UART: [state] LifecycleState = Unprovisioned
2,302,427 UART: [state] DebugLocked = No
2,304,320 UART: [state] WD Timer not started. Device not locked for debugging
2,307,696 UART: [kat] SHA2-256
2,487,390 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,498,168 UART: [kat] ++
2,498,636 UART: [kat] sha1
2,510,498 UART: [kat] SHA2-256
2,513,206 UART: [kat] SHA2-384
2,519,104 UART: [kat] SHA2-512-ACC
2,521,479 UART: [kat] ECC-384
4,986,958 UART: [kat] HMAC-384Kdf
5,009,414 UART: [kat] LMS
5,485,907 UART: [kat] --
5,490,407 UART: [cold-reset] ++
5,493,051 UART: [fht] FHT @ 0x50003400
5,503,766 UART: [idev] ++
5,504,341 UART: [idev] CDI.KEYID = 6
5,505,282 UART: [idev] SUBJECT.KEYID = 7
5,506,553 UART: [idev] UDS.KEYID = 0
5,509,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,658,548 UART: [idev] Erasing UDS.KEYID = 0
8,024,134 UART: [idev] Sha1 KeyId Algorithm
8,048,746 UART: [idev] --
8,053,811 UART: [ldev] ++
8,054,418 UART: [ldev] CDI.KEYID = 6
8,055,339 UART: [ldev] SUBJECT.KEYID = 5
8,056,511 UART: [ldev] AUTHORITY.KEYID = 7
8,057,809 UART: [ldev] FE.KEYID = 1
8,096,008 UART: [ldev] Erasing FE.KEYID = 1
10,605,991 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,335,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,351,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,367,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,383,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,404,928 UART: [ldev] --
12,409,936 UART: [fwproc] Wait for Commands...
12,412,793 UART: [fwproc] Recv command 0x46574c44
12,414,783 UART: [fwproc] Recv'd Img size: 118548 bytes
15,901,710 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,980,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,053,508 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,382,552 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
3,464,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,342,065 >>> mbox cmd response: failed
10,342,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,158 >>> mbox cmd response: failed
10,343,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,722 >>> mbox cmd response: failed
Initializing fuses
2,056,273 writing to cptra_bootfsm_go
5,509,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,295,514 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,611 UART:
193,032 UART: Running Caliptra ROM ...
194,201 UART:
603,606 UART: [state] CFI Enabled
617,714 UART: [state] LifecycleState = Unprovisioned
619,619 UART: [state] DebugLocked = No
621,165 UART: [state] WD Timer not started. Device not locked for debugging
625,283 UART: [kat] SHA2-256
804,965 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,740 UART: [kat] ++
816,200 UART: [kat] sha1
827,565 UART: [kat] SHA2-256
830,252 UART: [kat] SHA2-384
836,124 UART: [kat] SHA2-512-ACC
838,473 UART: [kat] ECC-384
3,280,784 UART: [kat] HMAC-384Kdf
3,293,230 UART: [kat] LMS
3,769,770 UART: [kat] --
3,773,909 UART: [cold-reset] ++
3,775,020 UART: [fht] FHT @ 0x50003400
3,785,636 UART: [idev] ++
3,786,205 UART: [idev] CDI.KEYID = 6
3,787,179 UART: [idev] SUBJECT.KEYID = 7
3,788,391 UART: [idev] UDS.KEYID = 0
3,791,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,662 UART: [idev] Erasing UDS.KEYID = 0
6,269,701 UART: [idev] Sha1 KeyId Algorithm
6,292,886 UART: [idev] --
6,296,565 UART: [ldev] ++
6,297,143 UART: [ldev] CDI.KEYID = 6
6,298,058 UART: [ldev] SUBJECT.KEYID = 5
6,299,282 UART: [ldev] AUTHORITY.KEYID = 7
6,300,520 UART: [ldev] FE.KEYID = 1
6,311,060 UART: [ldev] Erasing FE.KEYID = 1
8,791,551 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,712 UART: [ldev] --
10,583,718 UART: [fwproc] Wait for Commands...
10,586,693 UART: [fwproc] Recv command 0x46574c44
10,588,692 UART: [fwproc] Recv'd Img size: 118548 bytes
10,657,893 UART: ROM Fatal Error: 0x000B0002
10,661,090 >>> mbox cmd response: failed
10,661,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,661,781 >>> mbox cmd response: failed
10,662,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,662,353 >>> mbox cmd response: failed
Initializing fuses
2,054,902 writing to cptra_bootfsm_go
2,244,183 UART:
2,244,534 UART: Running Caliptra ROM ...
2,245,579 UART:
9,786,539 UART: [state] CFI Enabled
9,801,530 UART: [state] LifecycleState = Unprovisioned
9,803,457 UART: [state] DebugLocked = No
9,804,966 UART: [state] WD Timer not started. Device not locked for debugging
9,809,589 UART: [kat] SHA2-256
9,989,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,000,012 UART: [kat] ++
10,000,487 UART: [kat] sha1
10,011,441 UART: [kat] SHA2-256
10,014,157 UART: [kat] SHA2-384
10,019,993 UART: [kat] SHA2-512-ACC
10,022,407 UART: [kat] ECC-384
12,467,580 UART: [kat] HMAC-384Kdf
12,480,821 UART: [kat] LMS
12,957,321 UART: [kat] --
12,962,285 UART: [cold-reset] ++
12,964,218 UART: [fht] FHT @ 0x50003400
12,975,139 UART: [idev] ++
12,975,768 UART: [idev] CDI.KEYID = 6
12,976,652 UART: [idev] SUBJECT.KEYID = 7
12,977,923 UART: [idev] UDS.KEYID = 0
12,980,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,129,901 UART: [idev] Erasing UDS.KEYID = 0
15,455,473 UART: [idev] Sha1 KeyId Algorithm
15,478,971 UART: [idev] --
15,484,657 UART: [ldev] ++
15,485,226 UART: [ldev] CDI.KEYID = 6
15,486,165 UART: [ldev] SUBJECT.KEYID = 5
15,487,377 UART: [ldev] AUTHORITY.KEYID = 7
15,488,668 UART: [ldev] FE.KEYID = 1
15,500,966 UART: [ldev] Erasing FE.KEYID = 1
17,979,130 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,697,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,713,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,729,214 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,744,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,766,946 UART: [ldev] --
19,772,015 UART: [fwproc] Wait for Commands...
19,774,770 UART: [fwproc] Recv command 0x46574c44
19,776,815 UART: [fwproc] Recv'd Img size: 118548 bytes
23,259,541 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,336,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,409,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,738,338 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
3,781,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,545,201 >>> mbox cmd response: failed
10,545,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,310 >>> mbox cmd response: failed
10,546,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,874 >>> mbox cmd response: failed
Initializing fuses
2,054,474 writing to cptra_bootfsm_go
13,107,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,767,881 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,250 UART:
192,602 UART: Running Caliptra ROM ...
193,807 UART:
193,966 UART: [state] CFI Enabled
263,920 UART: [state] LifecycleState = Unprovisioned
266,269 UART: [state] DebugLocked = No
269,114 UART: [state] WD Timer not started. Device not locked for debugging
273,449 UART: [kat] SHA2-256
463,308 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,071 UART: [kat] ++
474,561 UART: [kat] sha1
484,688 UART: [kat] SHA2-256
487,688 UART: [kat] SHA2-384
493,946 UART: [kat] SHA2-512-ACC
496,508 UART: [kat] ECC-384
2,947,373 UART: [kat] HMAC-384Kdf
2,970,101 UART: [kat] LMS
3,501,876 UART: [kat] --
3,506,975 UART: [cold-reset] ++
3,508,430 UART: [fht] FHT @ 0x50003400
3,519,852 UART: [idev] ++
3,520,530 UART: [idev] CDI.KEYID = 6
3,521,475 UART: [idev] SUBJECT.KEYID = 7
3,522,691 UART: [idev] UDS.KEYID = 0
3,525,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,129 UART: [idev] Erasing UDS.KEYID = 0
6,026,401 UART: [idev] Sha1 KeyId Algorithm
6,049,423 UART: [idev] --
6,053,380 UART: [ldev] ++
6,054,068 UART: [ldev] CDI.KEYID = 6
6,054,987 UART: [ldev] SUBJECT.KEYID = 5
6,056,150 UART: [ldev] AUTHORITY.KEYID = 7
6,057,389 UART: [ldev] FE.KEYID = 1
6,097,917 UART: [ldev] Erasing FE.KEYID = 1
8,605,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,444 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,876 UART: [ldev] --
10,412,497 UART: [fwproc] Wait for Commands...
10,414,494 UART: [fwproc] Recv command 0x46574c44
10,416,813 UART: [fwproc] Recv'd Img size: 118548 bytes
10,501,170 UART: ROM Fatal Error: 0x000B0002
10,504,856 >>> mbox cmd response: failed
10,505,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,505,590 >>> mbox cmd response: failed
10,505,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,156 >>> mbox cmd response: failed
Initializing fuses
2,054,660 writing to cptra_bootfsm_go
2,243,985 UART:
2,244,335 UART: Running Caliptra ROM ...
2,245,477 UART:
2,245,647 UART: [state] CFI Enabled
2,320,306 UART: [state] LifecycleState = Unprovisioned
2,322,682 UART: [state] DebugLocked = No
2,325,646 UART: [state] WD Timer not started. Device not locked for debugging
2,329,503 UART: [kat] SHA2-256
2,519,352 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,155 UART: [kat] ++
2,530,708 UART: [kat] sha1
2,542,419 UART: [kat] SHA2-256
2,545,457 UART: [kat] SHA2-384
2,550,751 UART: [kat] SHA2-512-ACC
2,553,377 UART: [kat] ECC-384
5,008,299 UART: [kat] HMAC-384Kdf
5,030,925 UART: [kat] LMS
5,562,731 UART: [kat] --
5,568,341 UART: [cold-reset] ++
5,570,718 UART: [fht] FHT @ 0x50003400
5,582,356 UART: [idev] ++
5,583,040 UART: [idev] CDI.KEYID = 6
5,584,031 UART: [idev] SUBJECT.KEYID = 7
5,585,200 UART: [idev] UDS.KEYID = 0
5,587,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,737,040 UART: [idev] Erasing UDS.KEYID = 0
8,110,834 UART: [idev] Sha1 KeyId Algorithm
8,133,770 UART: [idev] --
8,139,198 UART: [ldev] ++
8,139,889 UART: [ldev] CDI.KEYID = 6
8,140,966 UART: [ldev] SUBJECT.KEYID = 5
8,142,078 UART: [ldev] AUTHORITY.KEYID = 7
8,143,265 UART: [ldev] FE.KEYID = 1
8,178,873 UART: [ldev] Erasing FE.KEYID = 1
10,682,570 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,402,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,417,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,918 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,461 UART: [ldev] --
12,474,415 UART: [fwproc] Wait for Commands...
12,477,273 UART: [fwproc] Recv command 0x46574c44
12,479,534 UART: [fwproc] Recv'd Img size: 118548 bytes
15,977,223 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,054,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,178,121 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,738,537 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
3,440,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,293,421 >>> mbox cmd response: failed
10,294,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,294,517 >>> mbox cmd response: failed
10,294,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,295,078 >>> mbox cmd response: failed
Initializing fuses
2,055,589 writing to cptra_bootfsm_go
5,491,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,574 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
192,661 UART:
193,015 UART: Running Caliptra ROM ...
194,217 UART:
603,795 UART: [state] CFI Enabled
617,828 UART: [state] LifecycleState = Unprovisioned
620,279 UART: [state] DebugLocked = No
621,564 UART: [state] WD Timer not started. Device not locked for debugging
626,239 UART: [kat] SHA2-256
816,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,911 UART: [kat] ++
827,522 UART: [kat] sha1
839,714 UART: [kat] SHA2-256
842,735 UART: [kat] SHA2-384
849,374 UART: [kat] SHA2-512-ACC
851,997 UART: [kat] ECC-384
3,293,312 UART: [kat] HMAC-384Kdf
3,306,529 UART: [kat] LMS
3,838,367 UART: [kat] --
3,842,312 UART: [cold-reset] ++
3,843,982 UART: [fht] FHT @ 0x50003400
3,854,646 UART: [idev] ++
3,855,324 UART: [idev] CDI.KEYID = 6
3,856,351 UART: [idev] SUBJECT.KEYID = 7
3,857,517 UART: [idev] UDS.KEYID = 0
3,860,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,339 UART: [idev] Erasing UDS.KEYID = 0
6,342,728 UART: [idev] Sha1 KeyId Algorithm
6,366,549 UART: [idev] --
6,370,553 UART: [ldev] ++
6,371,237 UART: [ldev] CDI.KEYID = 6
6,372,159 UART: [ldev] SUBJECT.KEYID = 5
6,373,319 UART: [ldev] AUTHORITY.KEYID = 7
6,374,557 UART: [ldev] FE.KEYID = 1
6,385,810 UART: [ldev] Erasing FE.KEYID = 1
8,862,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,200 UART: [ldev] --
10,649,877 UART: [fwproc] Wait for Commands...
10,651,765 UART: [fwproc] Recv command 0x46574c44
10,654,063 UART: [fwproc] Recv'd Img size: 118548 bytes
10,739,177 UART: ROM Fatal Error: 0x000B0002
10,742,867 >>> mbox cmd response: failed
10,743,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,743,674 >>> mbox cmd response: failed
10,743,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,744,247 >>> mbox cmd response: failed
Initializing fuses
2,061,550 writing to cptra_bootfsm_go
2,250,894 UART:
2,251,246 UART: Running Caliptra ROM ...
2,252,387 UART:
9,710,048 UART: [state] CFI Enabled
9,723,956 UART: [state] LifecycleState = Unprovisioned
9,726,361 UART: [state] DebugLocked = No
9,728,900 UART: [state] WD Timer not started. Device not locked for debugging
9,734,234 UART: [kat] SHA2-256
9,924,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,934,876 UART: [kat] ++
9,935,483 UART: [kat] sha1
9,947,138 UART: [kat] SHA2-256
9,950,164 UART: [kat] SHA2-384
9,955,540 UART: [kat] SHA2-512-ACC
9,958,140 UART: [kat] ECC-384
12,400,863 UART: [kat] HMAC-384Kdf
12,414,123 UART: [kat] LMS
12,945,907 UART: [kat] --
12,951,250 UART: [cold-reset] ++
12,952,157 UART: [fht] FHT @ 0x50003400
12,962,216 UART: [idev] ++
12,962,891 UART: [idev] CDI.KEYID = 6
12,963,830 UART: [idev] SUBJECT.KEYID = 7
12,965,041 UART: [idev] UDS.KEYID = 0
12,967,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,116,454 UART: [idev] Erasing UDS.KEYID = 0
15,439,931 UART: [idev] Sha1 KeyId Algorithm
15,462,312 UART: [idev] --
15,467,818 UART: [ldev] ++
15,468,501 UART: [ldev] CDI.KEYID = 6
15,469,438 UART: [ldev] SUBJECT.KEYID = 5
15,470,598 UART: [ldev] AUTHORITY.KEYID = 7
15,471,833 UART: [ldev] FE.KEYID = 1
15,482,431 UART: [ldev] Erasing FE.KEYID = 1
17,956,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,675,741 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,690,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,706,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,721,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,741,977 UART: [ldev] --
19,747,951 UART: [fwproc] Wait for Commands...
19,750,010 UART: [fwproc] Recv command 0x46574c44
19,752,337 UART: [fwproc] Recv'd Img size: 118548 bytes
23,246,984 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,320,163 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,443,795 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,003,566 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,761,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,522,922 >>> mbox cmd response: failed
10,523,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,008 >>> mbox cmd response: failed
10,524,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,594 >>> mbox cmd response: failed
Initializing fuses
2,049,703 writing to cptra_bootfsm_go
13,107,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,406,021 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,596 UART: [state] LifecycleState = Unprovisioned
86,251 UART: [state] DebugLocked = No
86,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,531 UART: [kat] SHA2-256
882,462 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,577 UART: [kat] ++
886,729 UART: [kat] sha1
891,043 UART: [kat] SHA2-256
892,981 UART: [kat] SHA2-384
895,638 UART: [kat] SHA2-512-ACC
897,539 UART: [kat] ECC-384
903,246 UART: [kat] HMAC-384Kdf
907,804 UART: [kat] LMS
1,476,000 UART: [kat] --
1,476,677 UART: [cold-reset] ++
1,477,139 UART: [fht] Storing FHT @ 0x50003400
1,480,018 UART: [idev] ++
1,480,186 UART: [idev] CDI.KEYID = 6
1,480,546 UART: [idev] SUBJECT.KEYID = 7
1,480,970 UART: [idev] UDS.KEYID = 0
1,481,315 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,760 UART: [idev] Erasing UDS.KEYID = 0
1,505,794 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,490 UART: [idev] --
1,515,475 UART: [ldev] ++
1,515,643 UART: [ldev] CDI.KEYID = 6
1,516,006 UART: [ldev] SUBJECT.KEYID = 5
1,516,432 UART: [ldev] AUTHORITY.KEYID = 7
1,516,895 UART: [ldev] FE.KEYID = 1
1,522,139 UART: [ldev] Erasing FE.KEYID = 1
1,547,246 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,716 UART: [ldev] --
1,586,037 UART: [fwproc] Waiting for Commands...
1,586,806 UART: [fwproc] Received command 0x46574c44
1,587,597 UART: [fwproc] Received Image of size 118548 bytes
1,607,102 UART: ROM Fatal Error: 0x000B0002
1,608,259 >>> mbox cmd response: failed
1,608,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,265 >>> mbox cmd response: failed
1,608,265 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,271 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,775 UART: [kat] SHA2-256
881,706 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,821 UART: [kat] ++
885,973 UART: [kat] sha1
890,045 UART: [kat] SHA2-256
891,983 UART: [kat] SHA2-384
894,742 UART: [kat] SHA2-512-ACC
896,643 UART: [kat] ECC-384
902,396 UART: [kat] HMAC-384Kdf
907,104 UART: [kat] LMS
1,475,300 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,420 UART: [idev] ++
1,479,588 UART: [idev] CDI.KEYID = 6
1,479,948 UART: [idev] SUBJECT.KEYID = 7
1,480,372 UART: [idev] UDS.KEYID = 0
1,480,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,276 UART: [idev] Erasing UDS.KEYID = 0
1,505,154 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,768 UART: [idev] --
1,514,791 UART: [ldev] ++
1,514,959 UART: [ldev] CDI.KEYID = 6
1,515,322 UART: [ldev] SUBJECT.KEYID = 5
1,515,748 UART: [ldev] AUTHORITY.KEYID = 7
1,516,211 UART: [ldev] FE.KEYID = 1
1,521,629 UART: [ldev] Erasing FE.KEYID = 1
1,547,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,806 UART: [ldev] --
1,587,283 UART: [fwproc] Waiting for Commands...
1,587,974 UART: [fwproc] Received command 0x46574c44
1,588,765 UART: [fwproc] Received Image of size 118548 bytes
2,933,340 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,618 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,143 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,102 >>> mbox cmd response: failed
1,460,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,108 >>> mbox cmd response: failed
1,460,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,637 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,924 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,572 UART: [kat] SHA2-256
882,503 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,618 UART: [kat] ++
886,770 UART: [kat] sha1
890,858 UART: [kat] SHA2-256
892,796 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
903,195 UART: [kat] HMAC-384Kdf
907,737 UART: [kat] LMS
1,475,933 UART: [kat] --
1,476,620 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,480,027 UART: [idev] ++
1,480,195 UART: [idev] CDI.KEYID = 6
1,480,555 UART: [idev] SUBJECT.KEYID = 7
1,480,979 UART: [idev] UDS.KEYID = 0
1,481,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,625 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,211 UART: [idev] --
1,515,214 UART: [ldev] ++
1,515,382 UART: [ldev] CDI.KEYID = 6
1,515,745 UART: [ldev] SUBJECT.KEYID = 5
1,516,171 UART: [ldev] AUTHORITY.KEYID = 7
1,516,634 UART: [ldev] FE.KEYID = 1
1,521,852 UART: [ldev] Erasing FE.KEYID = 1
1,547,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,922 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,529 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,241 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,433 UART: [ldev] --
1,586,718 UART: [fwproc] Waiting for Commands...
1,587,431 UART: [fwproc] Received command 0x46574c44
1,588,222 UART: [fwproc] Received Image of size 118548 bytes
1,607,419 UART: ROM Fatal Error: 0x000B0002
1,608,576 >>> mbox cmd response: failed
1,608,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,582 >>> mbox cmd response: failed
1,608,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,608,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,591 UART: [state] LifecycleState = Unprovisioned
86,246 UART: [state] DebugLocked = No
86,790 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,436 UART: [kat] SHA2-256
882,367 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,482 UART: [kat] ++
886,634 UART: [kat] sha1
891,096 UART: [kat] SHA2-256
893,034 UART: [kat] SHA2-384
895,721 UART: [kat] SHA2-512-ACC
897,622 UART: [kat] ECC-384
903,229 UART: [kat] HMAC-384Kdf
907,867 UART: [kat] LMS
1,476,063 UART: [kat] --
1,476,922 UART: [cold-reset] ++
1,477,468 UART: [fht] Storing FHT @ 0x50003400
1,480,303 UART: [idev] ++
1,480,471 UART: [idev] CDI.KEYID = 6
1,480,831 UART: [idev] SUBJECT.KEYID = 7
1,481,255 UART: [idev] UDS.KEYID = 0
1,481,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,847 UART: [idev] Erasing UDS.KEYID = 0
1,505,067 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,593 UART: [idev] --
1,514,766 UART: [ldev] ++
1,514,934 UART: [ldev] CDI.KEYID = 6
1,515,297 UART: [ldev] SUBJECT.KEYID = 5
1,515,723 UART: [ldev] AUTHORITY.KEYID = 7
1,516,186 UART: [ldev] FE.KEYID = 1
1,521,396 UART: [ldev] Erasing FE.KEYID = 1
1,546,837 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,333 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,223 UART: [ldev] --
1,586,550 UART: [fwproc] Waiting for Commands...
1,587,237 UART: [fwproc] Received command 0x46574c44
1,588,028 UART: [fwproc] Received Image of size 118548 bytes
2,931,837 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,869 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,087 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,388 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,459,943 >>> mbox cmd response: failed
1,459,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,949 >>> mbox cmd response: failed
1,459,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,459,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,976 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,184 UART: [state] LifecycleState = Unprovisioned
85,839 UART: [state] DebugLocked = No
86,413 UART: [state] WD Timer not started. Device not locked for debugging
87,550 UART: [kat] SHA2-256
891,100 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,204 UART: [kat] ++
895,356 UART: [kat] sha1
899,364 UART: [kat] SHA2-256
901,304 UART: [kat] SHA2-384
904,271 UART: [kat] SHA2-512-ACC
906,172 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,821 UART: [kat] LMS
1,169,133 UART: [kat] --
1,169,788 UART: [cold-reset] ++
1,170,118 UART: [fht] FHT @ 0x50003400
1,172,810 UART: [idev] ++
1,172,978 UART: [idev] CDI.KEYID = 6
1,173,339 UART: [idev] SUBJECT.KEYID = 7
1,173,764 UART: [idev] UDS.KEYID = 0
1,174,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,457 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,748 UART: [ldev] ++
1,208,916 UART: [ldev] CDI.KEYID = 6
1,209,280 UART: [ldev] SUBJECT.KEYID = 5
1,209,707 UART: [ldev] AUTHORITY.KEYID = 7
1,210,170 UART: [ldev] FE.KEYID = 1
1,215,222 UART: [ldev] Erasing FE.KEYID = 1
1,241,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,116 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,308 UART: [ldev] --
1,280,645 UART: [fwproc] Wait for Commands...
1,281,258 UART: [fwproc] Recv command 0x46574c44
1,281,991 UART: [fwproc] Recv'd Img size: 118548 bytes
1,301,332 UART: ROM Fatal Error: 0x000B0002
1,302,489 >>> mbox cmd response: failed
1,302,489 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,495 >>> mbox cmd response: failed
1,302,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,302,501 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,245 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
891,050 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,154 UART: [kat] ++
895,306 UART: [kat] sha1
899,598 UART: [kat] SHA2-256
901,538 UART: [kat] SHA2-384
904,383 UART: [kat] SHA2-512-ACC
906,284 UART: [kat] ECC-384
916,145 UART: [kat] HMAC-384Kdf
920,851 UART: [kat] LMS
1,169,163 UART: [kat] --
1,170,198 UART: [cold-reset] ++
1,170,596 UART: [fht] FHT @ 0x50003400
1,173,258 UART: [idev] ++
1,173,426 UART: [idev] CDI.KEYID = 6
1,173,787 UART: [idev] SUBJECT.KEYID = 7
1,174,212 UART: [idev] UDS.KEYID = 0
1,174,558 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,537 UART: [idev] Erasing UDS.KEYID = 0
1,199,491 UART: [idev] Sha1 KeyId Algorithm
1,208,243 UART: [idev] --
1,209,322 UART: [ldev] ++
1,209,490 UART: [ldev] CDI.KEYID = 6
1,209,854 UART: [ldev] SUBJECT.KEYID = 5
1,210,281 UART: [ldev] AUTHORITY.KEYID = 7
1,210,744 UART: [ldev] FE.KEYID = 1
1,215,864 UART: [ldev] Erasing FE.KEYID = 1
1,242,395 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,525 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,241 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,130 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,964 UART: [ldev] --
1,281,199 UART: [fwproc] Wait for Commands...
1,281,988 UART: [fwproc] Recv command 0x46574c44
1,282,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,943 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,964 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,157,556 >>> mbox cmd response: failed
1,157,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,562 >>> mbox cmd response: failed
1,157,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,157,568 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,693 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,537 UART: [state] LifecycleState = Unprovisioned
86,192 UART: [state] DebugLocked = No
86,754 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
900,121 UART: [kat] SHA2-256
902,061 UART: [kat] SHA2-384
904,914 UART: [kat] SHA2-512-ACC
906,815 UART: [kat] ECC-384
916,476 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,249 UART: [cold-reset] ++
1,170,811 UART: [fht] FHT @ 0x50003400
1,173,509 UART: [idev] ++
1,173,677 UART: [idev] CDI.KEYID = 6
1,174,038 UART: [idev] SUBJECT.KEYID = 7
1,174,463 UART: [idev] UDS.KEYID = 0
1,174,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,276 UART: [idev] Erasing UDS.KEYID = 0
1,199,066 UART: [idev] Sha1 KeyId Algorithm
1,208,154 UART: [idev] --
1,209,261 UART: [ldev] ++
1,209,429 UART: [ldev] CDI.KEYID = 6
1,209,793 UART: [ldev] SUBJECT.KEYID = 5
1,210,220 UART: [ldev] AUTHORITY.KEYID = 7
1,210,683 UART: [ldev] FE.KEYID = 1
1,216,113 UART: [ldev] Erasing FE.KEYID = 1
1,242,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,942 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,543 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,573 UART: [ldev] --
1,281,876 UART: [fwproc] Wait for Commands...
1,282,533 UART: [fwproc] Recv command 0x46574c44
1,283,266 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,479 UART: ROM Fatal Error: 0x000B0002
1,303,636 >>> mbox cmd response: failed
1,303,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,642 >>> mbox cmd response: failed
1,303,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,303,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,577 UART: [state] LifecycleState = Unprovisioned
86,232 UART: [state] DebugLocked = No
86,848 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
891,699 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,803 UART: [kat] ++
895,955 UART: [kat] sha1
900,247 UART: [kat] SHA2-256
902,187 UART: [kat] SHA2-384
904,772 UART: [kat] SHA2-512-ACC
906,673 UART: [kat] ECC-384
916,652 UART: [kat] HMAC-384Kdf
921,360 UART: [kat] LMS
1,169,672 UART: [kat] --
1,170,593 UART: [cold-reset] ++
1,170,989 UART: [fht] FHT @ 0x50003400
1,173,733 UART: [idev] ++
1,173,901 UART: [idev] CDI.KEYID = 6
1,174,262 UART: [idev] SUBJECT.KEYID = 7
1,174,687 UART: [idev] UDS.KEYID = 0
1,175,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,786 UART: [idev] Erasing UDS.KEYID = 0
1,199,682 UART: [idev] Sha1 KeyId Algorithm
1,208,542 UART: [idev] --
1,209,497 UART: [ldev] ++
1,209,665 UART: [ldev] CDI.KEYID = 6
1,210,029 UART: [ldev] SUBJECT.KEYID = 5
1,210,456 UART: [ldev] AUTHORITY.KEYID = 7
1,210,919 UART: [ldev] FE.KEYID = 1
1,215,967 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,845 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,685 UART: [fwproc] Recv command 0x46574c44
1,283,418 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,534 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,179 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,354 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,539 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,167 >>> mbox cmd response: failed
1,159,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,173 >>> mbox cmd response: failed
1,159,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,240 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,921 UART: [state] WD Timer not started. Device not locked for debugging
88,088 UART: [kat] SHA2-256
893,738 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,863 UART: [kat] ++
898,015 UART: [kat] sha1
902,327 UART: [kat] SHA2-256
904,267 UART: [kat] SHA2-384
906,854 UART: [kat] SHA2-512-ACC
908,755 UART: [kat] ECC-384
918,234 UART: [kat] HMAC-384Kdf
922,956 UART: [kat] LMS
1,171,284 UART: [kat] --
1,172,301 UART: [cold-reset] ++
1,172,861 UART: [fht] FHT @ 0x50003400
1,175,496 UART: [idev] ++
1,175,664 UART: [idev] CDI.KEYID = 6
1,176,024 UART: [idev] SUBJECT.KEYID = 7
1,176,448 UART: [idev] UDS.KEYID = 0
1,176,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,398 UART: [idev] Erasing UDS.KEYID = 0
1,200,925 UART: [idev] Sha1 KeyId Algorithm
1,209,433 UART: [idev] --
1,210,427 UART: [ldev] ++
1,210,595 UART: [ldev] CDI.KEYID = 6
1,210,958 UART: [ldev] SUBJECT.KEYID = 5
1,211,384 UART: [ldev] AUTHORITY.KEYID = 7
1,211,847 UART: [ldev] FE.KEYID = 1
1,217,099 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,268 UART: [fwproc] Wait for Commands...
1,282,884 UART: [fwproc] Recv command 0x46574c44
1,283,612 UART: [fwproc] Recv'd Img size: 118548 bytes
1,302,963 UART: ROM Fatal Error: 0x000B0002
1,304,120 >>> mbox cmd response: failed
1,304,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,126 >>> mbox cmd response: failed
1,304,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,304,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,140 UART: [state] LifecycleState = Unprovisioned
85,795 UART: [state] DebugLocked = No
86,359 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
893,340 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,465 UART: [kat] ++
897,617 UART: [kat] sha1
902,069 UART: [kat] SHA2-256
904,009 UART: [kat] SHA2-384
906,740 UART: [kat] SHA2-512-ACC
908,641 UART: [kat] ECC-384
918,500 UART: [kat] HMAC-384Kdf
923,102 UART: [kat] LMS
1,171,430 UART: [kat] --
1,172,253 UART: [cold-reset] ++
1,172,763 UART: [fht] FHT @ 0x50003400
1,175,564 UART: [idev] ++
1,175,732 UART: [idev] CDI.KEYID = 6
1,176,092 UART: [idev] SUBJECT.KEYID = 7
1,176,516 UART: [idev] UDS.KEYID = 0
1,176,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,166 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,149 UART: [idev] --
1,210,159 UART: [ldev] ++
1,210,327 UART: [ldev] CDI.KEYID = 6
1,210,690 UART: [ldev] SUBJECT.KEYID = 5
1,211,116 UART: [ldev] AUTHORITY.KEYID = 7
1,211,579 UART: [ldev] FE.KEYID = 1
1,216,837 UART: [ldev] Erasing FE.KEYID = 1
1,243,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,914 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,794 UART: [fwproc] Recv command 0x46574c44
1,283,522 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,629 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,799 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,990 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,479 >>> mbox cmd response: failed
1,159,479 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,485 >>> mbox cmd response: failed
1,159,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,491 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,665 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,804 UART: [state] WD Timer not started. Device not locked for debugging
88,067 UART: [kat] SHA2-256
893,717 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,842 UART: [kat] ++
897,994 UART: [kat] sha1
902,292 UART: [kat] SHA2-256
904,232 UART: [kat] SHA2-384
907,031 UART: [kat] SHA2-512-ACC
908,932 UART: [kat] ECC-384
918,677 UART: [kat] HMAC-384Kdf
923,369 UART: [kat] LMS
1,171,697 UART: [kat] --
1,172,644 UART: [cold-reset] ++
1,173,138 UART: [fht] FHT @ 0x50003400
1,176,025 UART: [idev] ++
1,176,193 UART: [idev] CDI.KEYID = 6
1,176,553 UART: [idev] SUBJECT.KEYID = 7
1,176,977 UART: [idev] UDS.KEYID = 0
1,177,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,999 UART: [idev] Erasing UDS.KEYID = 0
1,202,358 UART: [idev] Sha1 KeyId Algorithm
1,210,712 UART: [idev] --
1,211,718 UART: [ldev] ++
1,211,886 UART: [ldev] CDI.KEYID = 6
1,212,249 UART: [ldev] SUBJECT.KEYID = 5
1,212,675 UART: [ldev] AUTHORITY.KEYID = 7
1,213,138 UART: [ldev] FE.KEYID = 1
1,218,326 UART: [ldev] Erasing FE.KEYID = 1
1,244,535 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,973 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,685 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,604 UART: [ldev] --
1,284,021 UART: [fwproc] Wait for Commands...
1,284,669 UART: [fwproc] Recv command 0x46574c44
1,285,397 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,876 UART: ROM Fatal Error: 0x000B0002
1,306,033 >>> mbox cmd response: failed
1,306,033 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,039 >>> mbox cmd response: failed
1,306,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,045 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,957 UART: [state] LifecycleState = Unprovisioned
85,612 UART: [state] DebugLocked = No
86,178 UART: [state] WD Timer not started. Device not locked for debugging
87,463 UART: [kat] SHA2-256
893,113 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,238 UART: [kat] ++
897,390 UART: [kat] sha1
901,478 UART: [kat] SHA2-256
903,418 UART: [kat] SHA2-384
905,951 UART: [kat] SHA2-512-ACC
907,852 UART: [kat] ECC-384
917,289 UART: [kat] HMAC-384Kdf
922,147 UART: [kat] LMS
1,170,475 UART: [kat] --
1,171,254 UART: [cold-reset] ++
1,171,762 UART: [fht] FHT @ 0x50003400
1,174,285 UART: [idev] ++
1,174,453 UART: [idev] CDI.KEYID = 6
1,174,813 UART: [idev] SUBJECT.KEYID = 7
1,175,237 UART: [idev] UDS.KEYID = 0
1,175,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,167 UART: [idev] Erasing UDS.KEYID = 0
1,200,298 UART: [idev] Sha1 KeyId Algorithm
1,208,806 UART: [idev] --
1,209,888 UART: [ldev] ++
1,210,056 UART: [ldev] CDI.KEYID = 6
1,210,419 UART: [ldev] SUBJECT.KEYID = 5
1,210,845 UART: [ldev] AUTHORITY.KEYID = 7
1,211,308 UART: [ldev] FE.KEYID = 1
1,216,634 UART: [ldev] Erasing FE.KEYID = 1
1,242,575 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,308 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,024 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,915 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,627 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,552 UART: [ldev] --
1,281,973 UART: [fwproc] Wait for Commands...
1,282,795 UART: [fwproc] Recv command 0x46574c44
1,283,523 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,553 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,696 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,866 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,015 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,158,928 >>> mbox cmd response: failed
1,158,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,934 >>> mbox cmd response: failed
1,158,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,158,940 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,568 >>> mbox cmd response: success
test fw_load::fw_load_error_manifest_size_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
192,253 UART:
192,607 UART: Running Caliptra ROM ...
193,777 UART:
194,136 UART: [state] CFI Enabled
266,452 UART: [state] LifecycleState = Unprovisioned
268,393 UART: [state] DebugLocked = No
270,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,002 UART: [kat] SHA2-256
445,710 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,244 UART: [kat] ++
456,721 UART: [kat] sha1
467,330 UART: [kat] SHA2-256
470,015 UART: [kat] SHA2-384
475,462 UART: [kat] SHA2-512-ACC
477,859 UART: [kat] ECC-384
2,767,674 UART: [kat] HMAC-384Kdf
2,798,815 UART: [kat] LMS
3,989,089 UART: [kat] --
3,994,160 UART: [cold-reset] ++
3,995,954 UART: [fht] Storing FHT @ 0x50003400
4,007,224 UART: [idev] ++
4,007,795 UART: [idev] CDI.KEYID = 6
4,008,709 UART: [idev] SUBJECT.KEYID = 7
4,009,983 UART: [idev] UDS.KEYID = 0
4,012,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,178 UART: [idev] Erasing UDS.KEYID = 0
7,345,120 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,536 UART: [idev] --
7,370,640 UART: [ldev] ++
7,371,222 UART: [ldev] CDI.KEYID = 6
7,372,203 UART: [ldev] SUBJECT.KEYID = 5
7,373,362 UART: [ldev] AUTHORITY.KEYID = 7
7,374,652 UART: [ldev] FE.KEYID = 1
7,421,182 UART: [ldev] Erasing FE.KEYID = 1
10,753,618 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,164 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,131 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,753 UART: [ldev] --
13,114,128 UART: [fwproc] Waiting for Commands...
13,116,829 UART: [fwproc] Received command 0x46574c44
13,119,018 UART: [fwproc] Received Image of size 118548 bytes
14,513,226 UART: ROM Fatal Error: 0x000B0019
14,516,696 >>> mbox cmd response: failed
14,517,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,517,418 >>> mbox cmd response: failed
14,517,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,517,976 >>> mbox cmd response: failed
Initializing fuses
2,055,990 writing to cptra_bootfsm_go
2,245,293 UART:
2,245,644 UART: Running Caliptra ROM ...
2,246,783 UART:
2,246,952 UART: [state] CFI Enabled
2,317,502 UART: [state] LifecycleState = Unprovisioned
2,319,442 UART: [state] DebugLocked = No
2,320,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,325,953 UART: [kat] SHA2-256
2,495,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,506,146 UART: [kat] ++
2,506,636 UART: [kat] sha1
2,517,522 UART: [kat] SHA2-256
2,520,240 UART: [kat] SHA2-384
2,526,076 UART: [kat] SHA2-512-ACC
2,528,433 UART: [kat] ECC-384
4,821,655 UART: [kat] HMAC-384Kdf
4,854,632 UART: [kat] LMS
6,044,935 UART: [kat] --
6,050,901 UART: [cold-reset] ++
6,052,038 UART: [fht] Storing FHT @ 0x50003400
6,063,964 UART: [idev] ++
6,064,602 UART: [idev] CDI.KEYID = 6
6,065,513 UART: [idev] SUBJECT.KEYID = 7
6,066,734 UART: [idev] UDS.KEYID = 0
6,069,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,309 UART: [idev] Erasing UDS.KEYID = 0
9,401,833 UART: [idev] Using Sha1 for KeyId Algorithm
9,423,218 UART: [idev] --
9,426,525 UART: [ldev] ++
9,427,101 UART: [ldev] CDI.KEYID = 6
9,428,041 UART: [ldev] SUBJECT.KEYID = 5
9,429,307 UART: [ldev] AUTHORITY.KEYID = 7
9,430,466 UART: [ldev] FE.KEYID = 1
9,477,683 UART: [ldev] Erasing FE.KEYID = 1
12,808,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,104,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,119,538 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,134,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,148,863 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,167,584 UART: [ldev] --
15,172,911 UART: [fwproc] Waiting for Commands...
15,174,634 UART: [fwproc] Received command 0x46574c44
15,176,823 UART: [fwproc] Received Image of size 118548 bytes
19,278,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,358,763 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,431,904 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,760,247 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,800,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,230,609 >>> mbox cmd response: failed
14,231,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,231,610 >>> mbox cmd response: failed
14,231,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,232,184 >>> mbox cmd response: failed
Initializing fuses
2,049,207 writing to cptra_bootfsm_go
5,842,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,039,075 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,163 writing to cptra_bootfsm_go
192,312 UART:
192,702 UART: Running Caliptra ROM ...
193,893 UART:
603,375 UART: [state] CFI Enabled
615,034 UART: [state] LifecycleState = Unprovisioned
616,974 UART: [state] DebugLocked = No
619,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,454 UART: [kat] SHA2-256
794,204 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,741 UART: [kat] ++
805,191 UART: [kat] sha1
816,182 UART: [kat] SHA2-256
818,875 UART: [kat] SHA2-384
826,479 UART: [kat] SHA2-512-ACC
828,877 UART: [kat] ECC-384
3,111,746 UART: [kat] HMAC-384Kdf
3,123,766 UART: [kat] LMS
4,313,877 UART: [kat] --
4,316,309 UART: [cold-reset] ++
4,317,874 UART: [fht] Storing FHT @ 0x50003400
4,328,660 UART: [idev] ++
4,329,290 UART: [idev] CDI.KEYID = 6
4,330,220 UART: [idev] SUBJECT.KEYID = 7
4,331,454 UART: [idev] UDS.KEYID = 0
4,334,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,483,372 UART: [idev] Erasing UDS.KEYID = 0
7,618,672 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,283 UART: [idev] --
7,643,964 UART: [ldev] ++
7,644,544 UART: [ldev] CDI.KEYID = 6
7,645,520 UART: [ldev] SUBJECT.KEYID = 5
7,646,745 UART: [ldev] AUTHORITY.KEYID = 7
7,647,986 UART: [ldev] FE.KEYID = 1
7,659,212 UART: [ldev] Erasing FE.KEYID = 1
10,946,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,250,549 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,265,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,117 UART: [ldev] --
13,303,656 UART: [fwproc] Waiting for Commands...
13,306,250 UART: [fwproc] Received command 0x46574c44
13,308,453 UART: [fwproc] Received Image of size 118548 bytes
14,708,512 UART: ROM Fatal Error: 0x000B0019
14,712,012 >>> mbox cmd response: failed
14,712,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,712,840 >>> mbox cmd response: failed
14,713,111 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,713,413 >>> mbox cmd response: failed
Initializing fuses
2,055,090 writing to cptra_bootfsm_go
2,244,467 UART:
2,244,827 UART: Running Caliptra ROM ...
2,245,980 UART:
5,755,251 UART: [state] CFI Enabled
5,769,633 UART: [state] LifecycleState = Unprovisioned
5,771,563 UART: [state] DebugLocked = No
5,773,662 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,779,212 UART: [kat] SHA2-256
5,948,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,959,488 UART: [kat] ++
5,960,041 UART: [kat] sha1
5,970,267 UART: [kat] SHA2-256
5,973,015 UART: [kat] SHA2-384
5,979,059 UART: [kat] SHA2-512-ACC
5,981,412 UART: [kat] ECC-384
8,264,913 UART: [kat] HMAC-384Kdf
8,276,714 UART: [kat] LMS
9,466,862 UART: [kat] --
9,471,301 UART: [cold-reset] ++
9,473,187 UART: [fht] Storing FHT @ 0x50003400
9,485,215 UART: [idev] ++
9,485,795 UART: [idev] CDI.KEYID = 6
9,486,741 UART: [idev] SUBJECT.KEYID = 7
9,487,977 UART: [idev] UDS.KEYID = 0
9,490,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,639,338 UART: [idev] Erasing UDS.KEYID = 0
12,773,176 UART: [idev] Using Sha1 for KeyId Algorithm
12,793,772 UART: [idev] --
12,797,207 UART: [ldev] ++
12,797,788 UART: [ldev] CDI.KEYID = 6
12,798,706 UART: [ldev] SUBJECT.KEYID = 5
12,799,967 UART: [ldev] AUTHORITY.KEYID = 7
12,801,209 UART: [ldev] FE.KEYID = 1
12,813,210 UART: [ldev] Erasing FE.KEYID = 1
16,099,232 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,392,540 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,407,129 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,421,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,436,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,456,345 UART: [ldev] --
18,460,851 UART: [fwproc] Waiting for Commands...
18,462,540 UART: [fwproc] Received command 0x46574c44
18,464,741 UART: [fwproc] Received Image of size 118548 bytes
22,570,645 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,644,408 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,717,580 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,045,468 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,274 writing to cptra_bootfsm_go
4,129,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,455,417 >>> mbox cmd response: failed
14,456,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,456,371 >>> mbox cmd response: failed
14,456,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,456,947 >>> mbox cmd response: failed
Initializing fuses
2,051,715 writing to cptra_bootfsm_go
9,551,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,591,343 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
192,346 UART:
192,717 UART: Running Caliptra ROM ...
193,890 UART:
194,045 UART: [state] CFI Enabled
261,734 UART: [state] LifecycleState = Unprovisioned
263,673 UART: [state] DebugLocked = No
266,086 UART: [state] WD Timer not started. Device not locked for debugging
269,669 UART: [kat] SHA2-256
449,330 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,082 UART: [kat] ++
460,629 UART: [kat] sha1
470,892 UART: [kat] SHA2-256
473,567 UART: [kat] SHA2-384
480,583 UART: [kat] SHA2-512-ACC
482,935 UART: [kat] ECC-384
2,946,598 UART: [kat] HMAC-384Kdf
2,970,301 UART: [kat] LMS
3,446,802 UART: [kat] --
3,451,559 UART: [cold-reset] ++
3,452,644 UART: [fht] FHT @ 0x50003400
3,464,650 UART: [idev] ++
3,465,223 UART: [idev] CDI.KEYID = 6
3,466,246 UART: [idev] SUBJECT.KEYID = 7
3,467,412 UART: [idev] UDS.KEYID = 0
3,470,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,768 UART: [idev] Erasing UDS.KEYID = 0
5,988,385 UART: [idev] Sha1 KeyId Algorithm
6,012,925 UART: [idev] --
6,016,990 UART: [ldev] ++
6,017,570 UART: [ldev] CDI.KEYID = 6
6,018,487 UART: [ldev] SUBJECT.KEYID = 5
6,019,653 UART: [ldev] AUTHORITY.KEYID = 7
6,020,953 UART: [ldev] FE.KEYID = 1
6,057,388 UART: [ldev] Erasing FE.KEYID = 1
8,566,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,325 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,063 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,236 UART: [ldev] --
10,373,480 UART: [fwproc] Wait for Commands...
10,376,229 UART: [fwproc] Recv command 0x46574c44
10,378,286 UART: [fwproc] Recv'd Img size: 118548 bytes
11,463,638 UART: ROM Fatal Error: 0x000B0019
11,466,872 >>> mbox cmd response: failed
11,467,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,467,582 >>> mbox cmd response: failed
11,467,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,468,150 >>> mbox cmd response: failed
Initializing fuses
2,060,704 writing to cptra_bootfsm_go
2,250,016 UART:
2,250,364 UART: Running Caliptra ROM ...
2,251,411 UART:
2,251,564 UART: [state] CFI Enabled
2,316,418 UART: [state] LifecycleState = Unprovisioned
2,318,358 UART: [state] DebugLocked = No
2,319,726 UART: [state] WD Timer not started. Device not locked for debugging
2,323,688 UART: [kat] SHA2-256
2,503,373 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,152 UART: [kat] ++
2,514,619 UART: [kat] sha1
2,526,671 UART: [kat] SHA2-256
2,529,369 UART: [kat] SHA2-384
2,534,847 UART: [kat] SHA2-512-ACC
2,537,212 UART: [kat] ECC-384
5,002,752 UART: [kat] HMAC-384Kdf
5,024,389 UART: [kat] LMS
5,500,909 UART: [kat] --
5,503,664 UART: [cold-reset] ++
5,505,010 UART: [fht] FHT @ 0x50003400
5,515,720 UART: [idev] ++
5,516,300 UART: [idev] CDI.KEYID = 6
5,517,269 UART: [idev] SUBJECT.KEYID = 7
5,518,489 UART: [idev] UDS.KEYID = 0
5,521,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,670,506 UART: [idev] Erasing UDS.KEYID = 0
8,042,574 UART: [idev] Sha1 KeyId Algorithm
8,067,489 UART: [idev] --
8,071,874 UART: [ldev] ++
8,072,464 UART: [ldev] CDI.KEYID = 6
8,073,382 UART: [ldev] SUBJECT.KEYID = 5
8,074,548 UART: [ldev] AUTHORITY.KEYID = 7
8,075,838 UART: [ldev] FE.KEYID = 1
8,111,723 UART: [ldev] Erasing FE.KEYID = 1
10,615,639 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,204 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,424,278 UART: [ldev] --
12,429,549 UART: [fwproc] Wait for Commands...
12,432,677 UART: [fwproc] Recv command 0x46574c44
12,434,673 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,302 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,450 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,975 writing to cptra_bootfsm_go
3,462,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,335,866 >>> mbox cmd response: failed
11,336,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,336,796 >>> mbox cmd response: failed
11,337,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,337,426 >>> mbox cmd response: failed
Initializing fuses
2,059,857 writing to cptra_bootfsm_go
5,522,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,278,183 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,874 writing to cptra_bootfsm_go
193,209 UART:
193,590 UART: Running Caliptra ROM ...
194,792 UART:
604,331 UART: [state] CFI Enabled
619,564 UART: [state] LifecycleState = Unprovisioned
621,466 UART: [state] DebugLocked = No
622,821 UART: [state] WD Timer not started. Device not locked for debugging
626,083 UART: [kat] SHA2-256
805,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,544 UART: [kat] ++
817,032 UART: [kat] sha1
828,887 UART: [kat] SHA2-256
831,580 UART: [kat] SHA2-384
838,536 UART: [kat] SHA2-512-ACC
840,889 UART: [kat] ECC-384
3,282,997 UART: [kat] HMAC-384Kdf
3,295,777 UART: [kat] LMS
3,772,258 UART: [kat] --
3,776,921 UART: [cold-reset] ++
3,778,645 UART: [fht] FHT @ 0x50003400
3,790,549 UART: [idev] ++
3,791,173 UART: [idev] CDI.KEYID = 6
3,792,091 UART: [idev] SUBJECT.KEYID = 7
3,793,315 UART: [idev] UDS.KEYID = 0
3,796,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,565 UART: [idev] Erasing UDS.KEYID = 0
6,268,520 UART: [idev] Sha1 KeyId Algorithm
6,291,013 UART: [idev] --
6,295,941 UART: [ldev] ++
6,296,512 UART: [ldev] CDI.KEYID = 6
6,297,406 UART: [ldev] SUBJECT.KEYID = 5
6,298,621 UART: [ldev] AUTHORITY.KEYID = 7
6,299,918 UART: [ldev] FE.KEYID = 1
6,311,142 UART: [ldev] Erasing FE.KEYID = 1
8,790,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,395 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,856 UART: [ldev] --
10,585,492 UART: [fwproc] Wait for Commands...
10,588,405 UART: [fwproc] Recv command 0x46574c44
10,590,394 UART: [fwproc] Recv'd Img size: 118548 bytes
11,684,008 UART: ROM Fatal Error: 0x000B0019
11,687,289 >>> mbox cmd response: failed
11,687,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,688,063 >>> mbox cmd response: failed
11,688,344 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,688,642 >>> mbox cmd response: failed
Initializing fuses
2,057,976 writing to cptra_bootfsm_go
2,247,332 UART:
2,247,672 UART: Running Caliptra ROM ...
2,248,809 UART:
8,773,347 UART: [state] CFI Enabled
8,784,882 UART: [state] LifecycleState = Unprovisioned
8,786,806 UART: [state] DebugLocked = No
8,789,504 UART: [state] WD Timer not started. Device not locked for debugging
8,793,475 UART: [kat] SHA2-256
8,973,129 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,983,903 UART: [kat] ++
8,984,374 UART: [kat] sha1
8,995,159 UART: [kat] SHA2-256
8,997,828 UART: [kat] SHA2-384
9,003,829 UART: [kat] SHA2-512-ACC
9,006,196 UART: [kat] ECC-384
11,450,071 UART: [kat] HMAC-384Kdf
11,463,287 UART: [kat] LMS
11,939,756 UART: [kat] --
11,944,177 UART: [cold-reset] ++
11,946,486 UART: [fht] FHT @ 0x50003400
11,958,060 UART: [idev] ++
11,958,630 UART: [idev] CDI.KEYID = 6
11,959,600 UART: [idev] SUBJECT.KEYID = 7
11,960,818 UART: [idev] UDS.KEYID = 0
11,963,715 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,112,712 UART: [idev] Erasing UDS.KEYID = 0
14,434,237 UART: [idev] Sha1 KeyId Algorithm
14,457,739 UART: [idev] --
14,462,341 UART: [ldev] ++
14,462,920 UART: [ldev] CDI.KEYID = 6
14,463,834 UART: [ldev] SUBJECT.KEYID = 5
14,465,053 UART: [ldev] AUTHORITY.KEYID = 7
14,466,297 UART: [ldev] FE.KEYID = 1
14,477,335 UART: [ldev] Erasing FE.KEYID = 1
16,955,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,672,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,688,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,704,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,720,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,742,390 UART: [ldev] --
18,748,050 UART: [fwproc] Wait for Commands...
18,750,699 UART: [fwproc] Recv command 0x46574c44
18,752,694 UART: [fwproc] Recv'd Img size: 118548 bytes
22,226,969 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,304,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,377,555 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,706,308 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,784,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,566,591 >>> mbox cmd response: failed
11,567,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,567,487 >>> mbox cmd response: failed
11,567,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,568,066 >>> mbox cmd response: failed
Initializing fuses
2,059,926 writing to cptra_bootfsm_go
12,089,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,750,449 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,084 writing to cptra_bootfsm_go
192,216 UART:
192,577 UART: Running Caliptra ROM ...
193,698 UART:
193,848 UART: [state] CFI Enabled
260,390 UART: [state] LifecycleState = Unprovisioned
262,808 UART: [state] DebugLocked = No
265,567 UART: [state] WD Timer not started. Device not locked for debugging
270,705 UART: [kat] SHA2-256
460,571 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,332 UART: [kat] ++
471,817 UART: [kat] sha1
483,246 UART: [kat] SHA2-256
486,263 UART: [kat] SHA2-384
493,762 UART: [kat] SHA2-512-ACC
496,318 UART: [kat] ECC-384
2,948,582 UART: [kat] HMAC-384Kdf
2,971,677 UART: [kat] LMS
3,503,435 UART: [kat] --
3,509,102 UART: [cold-reset] ++
3,511,149 UART: [fht] FHT @ 0x50003400
3,521,765 UART: [idev] ++
3,522,509 UART: [idev] CDI.KEYID = 6
3,523,598 UART: [idev] SUBJECT.KEYID = 7
3,524,713 UART: [idev] UDS.KEYID = 0
3,527,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,830 UART: [idev] Erasing UDS.KEYID = 0
6,028,275 UART: [idev] Sha1 KeyId Algorithm
6,050,040 UART: [idev] --
6,054,345 UART: [ldev] ++
6,055,046 UART: [ldev] CDI.KEYID = 6
6,055,963 UART: [ldev] SUBJECT.KEYID = 5
6,057,131 UART: [ldev] AUTHORITY.KEYID = 7
6,058,373 UART: [ldev] FE.KEYID = 1
6,100,298 UART: [ldev] Erasing FE.KEYID = 1
8,605,599 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,714 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,983 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,636 UART: [ldev] --
10,415,715 UART: [fwproc] Wait for Commands...
10,418,788 UART: [fwproc] Recv command 0x46574c44
10,421,113 UART: [fwproc] Recv'd Img size: 118548 bytes
11,524,314 UART: ROM Fatal Error: 0x000B0019
11,527,967 >>> mbox cmd response: failed
11,528,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,528,664 >>> mbox cmd response: failed
11,528,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,529,236 >>> mbox cmd response: failed
Initializing fuses
2,059,601 writing to cptra_bootfsm_go
2,248,952 UART:
2,249,300 UART: Running Caliptra ROM ...
2,250,436 UART:
2,250,615 UART: [state] CFI Enabled
2,326,024 UART: [state] LifecycleState = Unprovisioned
2,328,394 UART: [state] DebugLocked = No
2,330,663 UART: [state] WD Timer not started. Device not locked for debugging
2,334,955 UART: [kat] SHA2-256
2,524,837 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,535,611 UART: [kat] ++
2,536,100 UART: [kat] sha1
2,546,889 UART: [kat] SHA2-256
2,549,929 UART: [kat] SHA2-384
2,555,550 UART: [kat] SHA2-512-ACC
2,558,122 UART: [kat] ECC-384
5,007,590 UART: [kat] HMAC-384Kdf
5,031,849 UART: [kat] LMS
5,563,617 UART: [kat] --
5,568,489 UART: [cold-reset] ++
5,570,158 UART: [fht] FHT @ 0x50003400
5,582,281 UART: [idev] ++
5,582,971 UART: [idev] CDI.KEYID = 6
5,583,996 UART: [idev] SUBJECT.KEYID = 7
5,585,103 UART: [idev] UDS.KEYID = 0
5,587,418 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,621 UART: [idev] Erasing UDS.KEYID = 0
8,086,376 UART: [idev] Sha1 KeyId Algorithm
8,107,881 UART: [idev] --
8,112,416 UART: [ldev] ++
8,113,102 UART: [ldev] CDI.KEYID = 6
8,113,995 UART: [ldev] SUBJECT.KEYID = 5
8,115,160 UART: [ldev] AUTHORITY.KEYID = 7
8,116,420 UART: [ldev] FE.KEYID = 1
8,160,759 UART: [ldev] Erasing FE.KEYID = 1
10,664,825 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,115 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,431,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,446,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,033 UART: [ldev] --
12,473,338 UART: [fwproc] Wait for Commands...
12,475,440 UART: [fwproc] Recv command 0x46574c44
12,477,705 UART: [fwproc] Recv'd Img size: 118548 bytes
15,979,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,060,083 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,183,688 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,049 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,440,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,323,727 >>> mbox cmd response: failed
11,324,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,324,697 >>> mbox cmd response: failed
11,324,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,325,270 >>> mbox cmd response: failed
Initializing fuses
2,054,807 writing to cptra_bootfsm_go
5,490,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,869,514 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
192,463 UART:
192,817 UART: Running Caliptra ROM ...
194,010 UART:
603,768 UART: [state] CFI Enabled
621,654 UART: [state] LifecycleState = Unprovisioned
624,046 UART: [state] DebugLocked = No
625,704 UART: [state] WD Timer not started. Device not locked for debugging
629,656 UART: [kat] SHA2-256
819,523 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,316 UART: [kat] ++
830,857 UART: [kat] sha1
842,877 UART: [kat] SHA2-256
845,899 UART: [kat] SHA2-384
850,828 UART: [kat] SHA2-512-ACC
853,454 UART: [kat] ECC-384
3,295,996 UART: [kat] HMAC-384Kdf
3,308,779 UART: [kat] LMS
3,840,593 UART: [kat] --
3,846,321 UART: [cold-reset] ++
3,847,284 UART: [fht] FHT @ 0x50003400
3,858,113 UART: [idev] ++
3,858,799 UART: [idev] CDI.KEYID = 6
3,859,766 UART: [idev] SUBJECT.KEYID = 7
3,860,987 UART: [idev] UDS.KEYID = 0
3,863,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,867 UART: [idev] Erasing UDS.KEYID = 0
6,339,486 UART: [idev] Sha1 KeyId Algorithm
6,360,373 UART: [idev] --
6,365,780 UART: [ldev] ++
6,366,486 UART: [ldev] CDI.KEYID = 6
6,367,399 UART: [ldev] SUBJECT.KEYID = 5
6,368,567 UART: [ldev] AUTHORITY.KEYID = 7
6,369,802 UART: [ldev] FE.KEYID = 1
6,379,372 UART: [ldev] Erasing FE.KEYID = 1
8,859,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,222 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,595 UART: [ldev] --
10,650,394 UART: [fwproc] Wait for Commands...
10,652,997 UART: [fwproc] Recv command 0x46574c44
10,655,265 UART: [fwproc] Recv'd Img size: 118548 bytes
11,754,648 UART: ROM Fatal Error: 0x000B0019
11,758,317 >>> mbox cmd response: failed
11,758,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,759,139 >>> mbox cmd response: failed
11,759,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,759,716 >>> mbox cmd response: failed
Initializing fuses
2,058,475 writing to cptra_bootfsm_go
2,247,800 UART:
2,248,152 UART: Running Caliptra ROM ...
2,249,290 UART:
8,698,141 UART: [state] CFI Enabled
8,715,019 UART: [state] LifecycleState = Unprovisioned
8,717,411 UART: [state] DebugLocked = No
8,719,321 UART: [state] WD Timer not started. Device not locked for debugging
8,723,484 UART: [kat] SHA2-256
8,913,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,924,154 UART: [kat] ++
8,924,618 UART: [kat] sha1
8,936,377 UART: [kat] SHA2-256
8,939,404 UART: [kat] SHA2-384
8,944,266 UART: [kat] SHA2-512-ACC
8,946,838 UART: [kat] ECC-384
11,387,953 UART: [kat] HMAC-384Kdf
11,401,483 UART: [kat] LMS
11,933,337 UART: [kat] --
11,939,401 UART: [cold-reset] ++
11,941,824 UART: [fht] FHT @ 0x50003400
11,953,135 UART: [idev] ++
11,953,809 UART: [idev] CDI.KEYID = 6
11,954,749 UART: [idev] SUBJECT.KEYID = 7
11,955,931 UART: [idev] UDS.KEYID = 0
11,958,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,107,507 UART: [idev] Erasing UDS.KEYID = 0
14,436,108 UART: [idev] Sha1 KeyId Algorithm
14,459,898 UART: [idev] --
14,465,027 UART: [ldev] ++
14,465,715 UART: [ldev] CDI.KEYID = 6
14,466,768 UART: [ldev] SUBJECT.KEYID = 5
14,467,900 UART: [ldev] AUTHORITY.KEYID = 7
14,469,083 UART: [ldev] FE.KEYID = 1
14,478,738 UART: [ldev] Erasing FE.KEYID = 1
16,958,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,679,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,694,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,709,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,724,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,745,399 UART: [ldev] --
18,750,185 UART: [fwproc] Wait for Commands...
18,752,239 UART: [fwproc] Recv command 0x46574c44
18,754,509 UART: [fwproc] Recv'd Img size: 118548 bytes
22,254,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,331,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,455,244 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,015,359 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,762,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,541,319 >>> mbox cmd response: failed
11,542,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,452 >>> mbox cmd response: failed
11,542,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,543,076 >>> mbox cmd response: failed
Initializing fuses
2,054,748 writing to cptra_bootfsm_go
12,073,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,369,035 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,036 UART: [state] LifecycleState = Unprovisioned
85,691 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,029 UART: [kat] SHA2-256
881,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,075 UART: [kat] ++
886,227 UART: [kat] sha1
890,437 UART: [kat] SHA2-256
892,375 UART: [kat] SHA2-384
895,328 UART: [kat] SHA2-512-ACC
897,229 UART: [kat] ECC-384
902,976 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,637 UART: [cold-reset] ++
1,477,113 UART: [fht] Storing FHT @ 0x50003400
1,479,978 UART: [idev] ++
1,480,146 UART: [idev] CDI.KEYID = 6
1,480,506 UART: [idev] SUBJECT.KEYID = 7
1,480,930 UART: [idev] UDS.KEYID = 0
1,481,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,028 UART: [idev] Erasing UDS.KEYID = 0
1,505,958 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,404 UART: [idev] --
1,515,569 UART: [ldev] ++
1,515,737 UART: [ldev] CDI.KEYID = 6
1,516,100 UART: [ldev] SUBJECT.KEYID = 5
1,516,526 UART: [ldev] AUTHORITY.KEYID = 7
1,516,989 UART: [ldev] FE.KEYID = 1
1,522,403 UART: [ldev] Erasing FE.KEYID = 1
1,548,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,111 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,430 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,438 UART: [ldev] --
1,587,729 UART: [fwproc] Waiting for Commands...
1,588,364 UART: [fwproc] Received command 0x46574c44
1,589,155 UART: [fwproc] Received Image of size 118548 bytes
1,629,132 UART: ROM Fatal Error: 0x000B0019
1,630,289 >>> mbox cmd response: failed
1,630,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,295 >>> mbox cmd response: failed
1,630,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,630,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,735 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,357 UART: [kat] SHA2-256
882,288 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,403 UART: [kat] ++
886,555 UART: [kat] sha1
890,931 UART: [kat] SHA2-256
892,869 UART: [kat] SHA2-384
895,710 UART: [kat] SHA2-512-ACC
897,611 UART: [kat] ECC-384
902,968 UART: [kat] HMAC-384Kdf
907,612 UART: [kat] LMS
1,475,808 UART: [kat] --
1,476,691 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,814 UART: [idev] ++
1,479,982 UART: [idev] CDI.KEYID = 6
1,480,342 UART: [idev] SUBJECT.KEYID = 7
1,480,766 UART: [idev] UDS.KEYID = 0
1,481,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,740 UART: [idev] Erasing UDS.KEYID = 0
1,505,462 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,894 UART: [idev] --
1,515,061 UART: [ldev] ++
1,515,229 UART: [ldev] CDI.KEYID = 6
1,515,592 UART: [ldev] SUBJECT.KEYID = 5
1,516,018 UART: [ldev] AUTHORITY.KEYID = 7
1,516,481 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,546,552 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,106 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,310 UART: [fwproc] Received command 0x46574c44
1,587,101 UART: [fwproc] Received Image of size 118548 bytes
2,931,214 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,438 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,656 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,963 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,458 >>> mbox cmd response: failed
1,480,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,464 >>> mbox cmd response: failed
1,480,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,470 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,809 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,782 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,502 UART: [kat] SHA2-256
882,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,548 UART: [kat] ++
886,700 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,839 UART: [kat] SHA2-512-ACC
897,740 UART: [kat] ECC-384
903,715 UART: [kat] HMAC-384Kdf
908,487 UART: [kat] LMS
1,476,683 UART: [kat] --
1,477,344 UART: [cold-reset] ++
1,477,690 UART: [fht] Storing FHT @ 0x50003400
1,480,493 UART: [idev] ++
1,480,661 UART: [idev] CDI.KEYID = 6
1,481,021 UART: [idev] SUBJECT.KEYID = 7
1,481,445 UART: [idev] UDS.KEYID = 0
1,481,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,591 UART: [idev] Erasing UDS.KEYID = 0
1,506,065 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,647 UART: [idev] --
1,515,748 UART: [ldev] ++
1,515,916 UART: [ldev] CDI.KEYID = 6
1,516,279 UART: [ldev] SUBJECT.KEYID = 5
1,516,705 UART: [ldev] AUTHORITY.KEYID = 7
1,517,168 UART: [ldev] FE.KEYID = 1
1,522,324 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,478 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,194 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,085 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,995 UART: [ldev] --
1,587,416 UART: [fwproc] Waiting for Commands...
1,588,201 UART: [fwproc] Received command 0x46574c44
1,588,992 UART: [fwproc] Received Image of size 118548 bytes
1,628,183 UART: ROM Fatal Error: 0x000B0019
1,629,340 >>> mbox cmd response: failed
1,629,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,346 >>> mbox cmd response: failed
1,629,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,629,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,412 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,926 UART: [kat] SHA2-256
881,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,972 UART: [kat] ++
886,124 UART: [kat] sha1
890,496 UART: [kat] SHA2-256
892,434 UART: [kat] SHA2-384
895,057 UART: [kat] SHA2-512-ACC
896,958 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,471 UART: [kat] LMS
1,475,667 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,140 UART: [fht] Storing FHT @ 0x50003400
1,479,953 UART: [idev] ++
1,480,121 UART: [idev] CDI.KEYID = 6
1,480,481 UART: [idev] SUBJECT.KEYID = 7
1,480,905 UART: [idev] UDS.KEYID = 0
1,481,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,771 UART: [idev] Erasing UDS.KEYID = 0
1,505,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,869 UART: [idev] --
1,514,902 UART: [ldev] ++
1,515,070 UART: [ldev] CDI.KEYID = 6
1,515,433 UART: [ldev] SUBJECT.KEYID = 5
1,515,859 UART: [ldev] AUTHORITY.KEYID = 7
1,516,322 UART: [ldev] FE.KEYID = 1
1,521,512 UART: [ldev] Erasing FE.KEYID = 1
1,546,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,756 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,472 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,127 UART: [ldev] --
1,586,548 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 118548 bytes
2,931,327 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,881 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,099 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,308 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,827 >>> mbox cmd response: failed
1,479,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,833 >>> mbox cmd response: failed
1,479,833 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,839 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,504 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,834 UART: [kat] SHA2-256
891,384 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,488 UART: [kat] ++
895,640 UART: [kat] sha1
900,056 UART: [kat] SHA2-256
901,996 UART: [kat] SHA2-384
904,853 UART: [kat] SHA2-512-ACC
906,754 UART: [kat] ECC-384
916,581 UART: [kat] HMAC-384Kdf
921,143 UART: [kat] LMS
1,169,455 UART: [kat] --
1,170,466 UART: [cold-reset] ++
1,170,830 UART: [fht] FHT @ 0x50003400
1,173,616 UART: [idev] ++
1,173,784 UART: [idev] CDI.KEYID = 6
1,174,145 UART: [idev] SUBJECT.KEYID = 7
1,174,570 UART: [idev] UDS.KEYID = 0
1,174,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,811 UART: [idev] Erasing UDS.KEYID = 0
1,200,189 UART: [idev] Sha1 KeyId Algorithm
1,208,881 UART: [idev] --
1,210,132 UART: [ldev] ++
1,210,300 UART: [ldev] CDI.KEYID = 6
1,210,664 UART: [ldev] SUBJECT.KEYID = 5
1,211,091 UART: [ldev] AUTHORITY.KEYID = 7
1,211,554 UART: [ldev] FE.KEYID = 1
1,216,800 UART: [ldev] Erasing FE.KEYID = 1
1,243,691 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,464 UART: [ldev] --
1,282,711 UART: [fwproc] Wait for Commands...
1,283,472 UART: [fwproc] Recv command 0x46574c44
1,284,205 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,188 UART: ROM Fatal Error: 0x000B0019
1,325,345 >>> mbox cmd response: failed
1,325,345 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,351 >>> mbox cmd response: failed
1,325,351 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,357 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Unprovisioned
85,471 UART: [state] DebugLocked = No
86,037 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
890,884 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,988 UART: [kat] ++
895,140 UART: [kat] sha1
899,544 UART: [kat] SHA2-256
901,484 UART: [kat] SHA2-384
904,393 UART: [kat] SHA2-512-ACC
906,294 UART: [kat] ECC-384
915,715 UART: [kat] HMAC-384Kdf
920,427 UART: [kat] LMS
1,168,739 UART: [kat] --
1,169,768 UART: [cold-reset] ++
1,170,334 UART: [fht] FHT @ 0x50003400
1,172,920 UART: [idev] ++
1,173,088 UART: [idev] CDI.KEYID = 6
1,173,449 UART: [idev] SUBJECT.KEYID = 7
1,173,874 UART: [idev] UDS.KEYID = 0
1,174,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,655 UART: [idev] Sha1 KeyId Algorithm
1,207,461 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,128 UART: [ldev] Erasing FE.KEYID = 1
1,241,811 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,986 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,698 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,916 UART: [ldev] --
1,281,181 UART: [fwproc] Wait for Commands...
1,281,878 UART: [fwproc] Recv command 0x46574c44
1,282,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,269 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,486 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,661 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,974 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,802 >>> mbox cmd response: failed
1,177,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,808 >>> mbox cmd response: failed
1,177,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,814 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,209 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,405 UART: [state] LifecycleState = Unprovisioned
86,060 UART: [state] DebugLocked = No
86,580 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
891,259 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,363 UART: [kat] ++
895,515 UART: [kat] sha1
899,717 UART: [kat] SHA2-256
901,657 UART: [kat] SHA2-384
904,388 UART: [kat] SHA2-512-ACC
906,289 UART: [kat] ECC-384
916,020 UART: [kat] HMAC-384Kdf
920,708 UART: [kat] LMS
1,169,020 UART: [kat] --
1,169,955 UART: [cold-reset] ++
1,170,423 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,662 UART: [idev] Erasing UDS.KEYID = 0
1,198,746 UART: [idev] Sha1 KeyId Algorithm
1,207,584 UART: [idev] --
1,208,755 UART: [ldev] ++
1,208,923 UART: [ldev] CDI.KEYID = 6
1,209,287 UART: [ldev] SUBJECT.KEYID = 5
1,209,714 UART: [ldev] AUTHORITY.KEYID = 7
1,210,177 UART: [ldev] FE.KEYID = 1
1,215,459 UART: [ldev] Erasing FE.KEYID = 1
1,242,028 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,116 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,005 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,883 UART: [ldev] --
1,281,296 UART: [fwproc] Wait for Commands...
1,281,903 UART: [fwproc] Recv command 0x46574c44
1,282,636 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,889 UART: ROM Fatal Error: 0x000B0019
1,322,046 >>> mbox cmd response: failed
1,322,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,052 >>> mbox cmd response: failed
1,322,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,058 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,498 UART: [state] WD Timer not started. Device not locked for debugging
87,825 UART: [kat] SHA2-256
891,375 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,479 UART: [kat] ++
895,631 UART: [kat] sha1
899,841 UART: [kat] SHA2-256
901,781 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,822 UART: [kat] HMAC-384Kdf
921,558 UART: [kat] LMS
1,169,870 UART: [kat] --
1,170,511 UART: [cold-reset] ++
1,170,905 UART: [fht] FHT @ 0x50003400
1,173,483 UART: [idev] ++
1,173,651 UART: [idev] CDI.KEYID = 6
1,174,012 UART: [idev] SUBJECT.KEYID = 7
1,174,437 UART: [idev] UDS.KEYID = 0
1,174,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,492 UART: [idev] Erasing UDS.KEYID = 0
1,199,144 UART: [idev] Sha1 KeyId Algorithm
1,208,070 UART: [idev] --
1,209,179 UART: [ldev] ++
1,209,347 UART: [ldev] CDI.KEYID = 6
1,209,711 UART: [ldev] SUBJECT.KEYID = 5
1,210,138 UART: [ldev] AUTHORITY.KEYID = 7
1,210,601 UART: [ldev] FE.KEYID = 1
1,215,841 UART: [ldev] Erasing FE.KEYID = 1
1,242,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,446 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,763 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,829 UART: [ldev] --
1,281,080 UART: [fwproc] Wait for Commands...
1,281,845 UART: [fwproc] Recv command 0x46574c44
1,282,578 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,519 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,069 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,541 >>> mbox cmd response: failed
1,179,541 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,547 >>> mbox cmd response: failed
1,179,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,738 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,653 UART: [state] WD Timer not started. Device not locked for debugging
87,790 UART: [kat] SHA2-256
893,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,565 UART: [kat] ++
897,717 UART: [kat] sha1
902,071 UART: [kat] SHA2-256
904,011 UART: [kat] SHA2-384
906,812 UART: [kat] SHA2-512-ACC
908,713 UART: [kat] ECC-384
918,774 UART: [kat] HMAC-384Kdf
923,136 UART: [kat] LMS
1,171,464 UART: [kat] --
1,172,553 UART: [cold-reset] ++
1,172,953 UART: [fht] FHT @ 0x50003400
1,175,440 UART: [idev] ++
1,175,608 UART: [idev] CDI.KEYID = 6
1,175,968 UART: [idev] SUBJECT.KEYID = 7
1,176,392 UART: [idev] UDS.KEYID = 0
1,176,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,490 UART: [idev] Erasing UDS.KEYID = 0
1,201,303 UART: [idev] Sha1 KeyId Algorithm
1,209,865 UART: [idev] --
1,210,943 UART: [ldev] ++
1,211,111 UART: [ldev] CDI.KEYID = 6
1,211,474 UART: [ldev] SUBJECT.KEYID = 5
1,211,900 UART: [ldev] AUTHORITY.KEYID = 7
1,212,363 UART: [ldev] FE.KEYID = 1
1,217,327 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,637 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,244 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,956 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,176 UART: [fwproc] Wait for Commands...
1,282,788 UART: [fwproc] Recv command 0x46574c44
1,283,516 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,059 UART: ROM Fatal Error: 0x000B0019
1,325,216 >>> mbox cmd response: failed
1,325,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,222 >>> mbox cmd response: failed
1,325,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,228 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,424 UART: [state] LifecycleState = Unprovisioned
86,079 UART: [state] DebugLocked = No
86,629 UART: [state] WD Timer not started. Device not locked for debugging
87,926 UART: [kat] SHA2-256
893,576 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,701 UART: [kat] ++
897,853 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
907,026 UART: [kat] SHA2-512-ACC
908,927 UART: [kat] ECC-384
918,950 UART: [kat] HMAC-384Kdf
923,516 UART: [kat] LMS
1,171,844 UART: [kat] --
1,172,565 UART: [cold-reset] ++
1,173,111 UART: [fht] FHT @ 0x50003400
1,175,758 UART: [idev] ++
1,175,926 UART: [idev] CDI.KEYID = 6
1,176,286 UART: [idev] SUBJECT.KEYID = 7
1,176,710 UART: [idev] UDS.KEYID = 0
1,177,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,422 UART: [idev] Erasing UDS.KEYID = 0
1,201,355 UART: [idev] Sha1 KeyId Algorithm
1,209,831 UART: [idev] --
1,211,097 UART: [ldev] ++
1,211,265 UART: [ldev] CDI.KEYID = 6
1,211,628 UART: [ldev] SUBJECT.KEYID = 5
1,212,054 UART: [ldev] AUTHORITY.KEYID = 7
1,212,517 UART: [ldev] FE.KEYID = 1
1,217,709 UART: [ldev] Erasing FE.KEYID = 1
1,243,814 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,429 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,809 UART: [ldev] --
1,283,072 UART: [fwproc] Wait for Commands...
1,283,648 UART: [fwproc] Recv command 0x46574c44
1,284,376 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,093 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,263 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,458 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,113 >>> mbox cmd response: failed
1,180,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,119 >>> mbox cmd response: failed
1,180,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,749 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,335 UART: [state] LifecycleState = Unprovisioned
85,990 UART: [state] DebugLocked = No
86,700 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
893,633 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,758 UART: [kat] ++
897,910 UART: [kat] sha1
902,140 UART: [kat] SHA2-256
904,080 UART: [kat] SHA2-384
906,897 UART: [kat] SHA2-512-ACC
908,798 UART: [kat] ECC-384
918,423 UART: [kat] HMAC-384Kdf
923,041 UART: [kat] LMS
1,171,369 UART: [kat] --
1,172,016 UART: [cold-reset] ++
1,172,428 UART: [fht] FHT @ 0x50003400
1,174,929 UART: [idev] ++
1,175,097 UART: [idev] CDI.KEYID = 6
1,175,457 UART: [idev] SUBJECT.KEYID = 7
1,175,881 UART: [idev] UDS.KEYID = 0
1,176,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,893 UART: [idev] Erasing UDS.KEYID = 0
1,201,546 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,211,042 UART: [ldev] ++
1,211,210 UART: [ldev] CDI.KEYID = 6
1,211,573 UART: [ldev] SUBJECT.KEYID = 5
1,211,999 UART: [ldev] AUTHORITY.KEYID = 7
1,212,462 UART: [ldev] FE.KEYID = 1
1,217,894 UART: [ldev] Erasing FE.KEYID = 1
1,244,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,156 UART: [ldev] --
1,283,635 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,718 UART: ROM Fatal Error: 0x000B0019
1,325,875 >>> mbox cmd response: failed
1,325,875 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,881 >>> mbox cmd response: failed
1,325,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,887 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,365 UART: [state] LifecycleState = Unprovisioned
86,020 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,895 UART: [kat] SHA2-256
893,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,670 UART: [kat] ++
897,822 UART: [kat] sha1
901,930 UART: [kat] SHA2-256
903,870 UART: [kat] SHA2-384
906,573 UART: [kat] SHA2-512-ACC
908,474 UART: [kat] ECC-384
918,115 UART: [kat] HMAC-384Kdf
922,603 UART: [kat] LMS
1,170,931 UART: [kat] --
1,171,942 UART: [cold-reset] ++
1,172,382 UART: [fht] FHT @ 0x50003400
1,175,063 UART: [idev] ++
1,175,231 UART: [idev] CDI.KEYID = 6
1,175,591 UART: [idev] SUBJECT.KEYID = 7
1,176,015 UART: [idev] UDS.KEYID = 0
1,176,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,669 UART: [idev] Erasing UDS.KEYID = 0
1,201,168 UART: [idev] Sha1 KeyId Algorithm
1,209,642 UART: [idev] --
1,210,690 UART: [ldev] ++
1,210,858 UART: [ldev] CDI.KEYID = 6
1,211,221 UART: [ldev] SUBJECT.KEYID = 5
1,211,647 UART: [ldev] AUTHORITY.KEYID = 7
1,212,110 UART: [ldev] FE.KEYID = 1
1,217,074 UART: [ldev] Erasing FE.KEYID = 1
1,243,327 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,571 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,318 UART: [ldev] --
1,282,729 UART: [fwproc] Wait for Commands...
1,283,325 UART: [fwproc] Recv command 0x46574c44
1,284,053 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,869 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,814 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,167 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,140 >>> mbox cmd response: failed
1,179,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,146 >>> mbox cmd response: failed
1,179,146 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,152 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,128 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_pub_key_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
192,227 UART:
192,613 UART: Running Caliptra ROM ...
193,707 UART:
193,855 UART: [state] CFI Enabled
266,921 UART: [state] LifecycleState = Unprovisioned
268,851 UART: [state] DebugLocked = No
271,693 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,165 UART: [kat] SHA2-256
446,842 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,370 UART: [kat] ++
457,849 UART: [kat] sha1
468,510 UART: [kat] SHA2-256
471,246 UART: [kat] SHA2-384
478,195 UART: [kat] SHA2-512-ACC
480,549 UART: [kat] ECC-384
2,769,019 UART: [kat] HMAC-384Kdf
2,799,842 UART: [kat] LMS
3,990,170 UART: [kat] --
3,994,673 UART: [cold-reset] ++
3,995,910 UART: [fht] Storing FHT @ 0x50003400
4,006,098 UART: [idev] ++
4,006,743 UART: [idev] CDI.KEYID = 6
4,007,640 UART: [idev] SUBJECT.KEYID = 7
4,008,872 UART: [idev] UDS.KEYID = 0
4,011,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,062 UART: [idev] Erasing UDS.KEYID = 0
7,349,248 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,174 UART: [idev] --
7,374,900 UART: [ldev] ++
7,375,477 UART: [ldev] CDI.KEYID = 6
7,376,444 UART: [ldev] SUBJECT.KEYID = 5
7,377,665 UART: [ldev] AUTHORITY.KEYID = 7
7,378,905 UART: [ldev] FE.KEYID = 1
7,423,607 UART: [ldev] Erasing FE.KEYID = 1
10,754,133 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,123 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,740 UART: [ldev] --
13,119,144 UART: [fwproc] Waiting for Commands...
13,120,927 UART: [fwproc] Received command 0x46574c44
13,123,174 UART: [fwproc] Received Image of size 118548 bytes
15,815,124 UART: ROM Fatal Error: 0x000B000F
15,818,590 >>> mbox cmd response: failed
15,818,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,819,253 >>> mbox cmd response: failed
15,819,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,819,862 >>> mbox cmd response: failed
Initializing fuses
2,056,202 writing to cptra_bootfsm_go
2,245,503 UART:
2,245,859 UART: Running Caliptra ROM ...
2,246,910 UART:
2,247,072 UART: [state] CFI Enabled
2,304,238 UART: [state] LifecycleState = Unprovisioned
2,306,176 UART: [state] DebugLocked = No
2,307,903 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,311,947 UART: [kat] SHA2-256
2,481,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,492,186 UART: [kat] ++
2,492,669 UART: [kat] sha1
2,504,551 UART: [kat] SHA2-256
2,507,258 UART: [kat] SHA2-384
2,512,706 UART: [kat] SHA2-512-ACC
2,515,058 UART: [kat] ECC-384
4,806,726 UART: [kat] HMAC-384Kdf
4,839,056 UART: [kat] LMS
6,029,341 UART: [kat] --
6,033,721 UART: [cold-reset] ++
6,035,234 UART: [fht] Storing FHT @ 0x50003400
6,046,884 UART: [idev] ++
6,047,451 UART: [idev] CDI.KEYID = 6
6,048,420 UART: [idev] SUBJECT.KEYID = 7
6,049,639 UART: [idev] UDS.KEYID = 0
6,052,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,201,378 UART: [idev] Erasing UDS.KEYID = 0
9,386,614 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,804 UART: [idev] --
9,412,990 UART: [ldev] ++
9,413,562 UART: [ldev] CDI.KEYID = 6
9,414,526 UART: [ldev] SUBJECT.KEYID = 5
9,415,796 UART: [ldev] AUTHORITY.KEYID = 7
9,416,987 UART: [ldev] FE.KEYID = 1
9,462,655 UART: [ldev] Erasing FE.KEYID = 1
12,797,502 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,121,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,169,057 UART: [ldev] --
15,174,112 UART: [fwproc] Waiting for Commands...
15,177,446 UART: [fwproc] Received command 0x46574c44
15,179,696 UART: [fwproc] Received Image of size 118548 bytes
19,280,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,358,094 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,431,288 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,760,430 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
3,787,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,535,977 >>> mbox cmd response: failed
15,536,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,536,957 >>> mbox cmd response: failed
15,537,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,537,520 >>> mbox cmd response: failed
Initializing fuses
2,051,971 writing to cptra_bootfsm_go
5,847,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,013,060 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,280 writing to cptra_bootfsm_go
192,443 UART:
192,817 UART: Running Caliptra ROM ...
194,025 UART:
603,806 UART: [state] CFI Enabled
614,937 UART: [state] LifecycleState = Unprovisioned
616,822 UART: [state] DebugLocked = No
618,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,436 UART: [kat] SHA2-256
793,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,728 UART: [kat] ++
804,187 UART: [kat] sha1
814,656 UART: [kat] SHA2-256
817,327 UART: [kat] SHA2-384
822,295 UART: [kat] SHA2-512-ACC
824,692 UART: [kat] ECC-384
3,106,821 UART: [kat] HMAC-384Kdf
3,117,271 UART: [kat] LMS
4,307,411 UART: [kat] --
4,312,651 UART: [cold-reset] ++
4,313,996 UART: [fht] Storing FHT @ 0x50003400
4,325,863 UART: [idev] ++
4,326,441 UART: [idev] CDI.KEYID = 6
4,327,357 UART: [idev] SUBJECT.KEYID = 7
4,328,632 UART: [idev] UDS.KEYID = 0
4,332,007 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,950 UART: [idev] Erasing UDS.KEYID = 0
7,612,055 UART: [idev] Using Sha1 for KeyId Algorithm
7,633,635 UART: [idev] --
7,637,754 UART: [ldev] ++
7,638,339 UART: [ldev] CDI.KEYID = 6
7,639,261 UART: [ldev] SUBJECT.KEYID = 5
7,640,488 UART: [ldev] AUTHORITY.KEYID = 7
7,641,729 UART: [ldev] FE.KEYID = 1
7,654,811 UART: [ldev] Erasing FE.KEYID = 1
10,946,670 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,132 UART: [ldev] --
13,308,546 UART: [fwproc] Waiting for Commands...
13,311,577 UART: [fwproc] Received command 0x46574c44
13,313,773 UART: [fwproc] Received Image of size 118548 bytes
16,005,698 UART: ROM Fatal Error: 0x000B000F
16,009,114 >>> mbox cmd response: failed
16,009,587 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,009,944 >>> mbox cmd response: failed
16,010,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,010,529 >>> mbox cmd response: failed
Initializing fuses
2,056,545 writing to cptra_bootfsm_go
2,245,859 UART:
2,246,212 UART: Running Caliptra ROM ...
2,247,320 UART:
4,458,433 UART: [state] CFI Enabled
4,471,348 UART: [state] LifecycleState = Unprovisioned
4,473,264 UART: [state] DebugLocked = No
4,475,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,480,674 UART: [kat] SHA2-256
4,650,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,660,958 UART: [kat] ++
4,661,510 UART: [kat] sha1
4,671,280 UART: [kat] SHA2-256
4,673,978 UART: [kat] SHA2-384
4,681,106 UART: [kat] SHA2-512-ACC
4,683,468 UART: [kat] ECC-384
6,966,726 UART: [kat] HMAC-384Kdf
6,978,638 UART: [kat] LMS
8,168,748 UART: [kat] --
8,174,086 UART: [cold-reset] ++
8,176,682 UART: [fht] Storing FHT @ 0x50003400
8,187,092 UART: [idev] ++
8,187,671 UART: [idev] CDI.KEYID = 6
8,188,614 UART: [idev] SUBJECT.KEYID = 7
8,189,835 UART: [idev] UDS.KEYID = 0
8,192,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,341,223 UART: [idev] Erasing UDS.KEYID = 0
11,477,028 UART: [idev] Using Sha1 for KeyId Algorithm
11,498,919 UART: [idev] --
11,503,356 UART: [ldev] ++
11,503,934 UART: [ldev] CDI.KEYID = 6
11,504,825 UART: [ldev] SUBJECT.KEYID = 5
11,506,084 UART: [ldev] AUTHORITY.KEYID = 7
11,507,335 UART: [ldev] FE.KEYID = 1
11,519,040 UART: [ldev] Erasing FE.KEYID = 1
14,807,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,099,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,113,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,128,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,143,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,161,156 UART: [ldev] --
17,165,944 UART: [fwproc] Waiting for Commands...
17,168,163 UART: [fwproc] Received command 0x46574c44
17,170,361 UART: [fwproc] Received Image of size 118548 bytes
21,277,198 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,356,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,429,879 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,758,717 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
4,131,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,749,603 >>> mbox cmd response: failed
15,750,213 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,750,568 >>> mbox cmd response: failed
15,750,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,751,137 >>> mbox cmd response: failed
Initializing fuses
2,049,928 writing to cptra_bootfsm_go
8,247,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,279,786 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,316 UART:
192,680 UART: Running Caliptra ROM ...
193,855 UART:
194,010 UART: [state] CFI Enabled
262,994 UART: [state] LifecycleState = Unprovisioned
264,919 UART: [state] DebugLocked = No
267,167 UART: [state] WD Timer not started. Device not locked for debugging
270,372 UART: [kat] SHA2-256
450,059 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,829 UART: [kat] ++
461,279 UART: [kat] sha1
472,750 UART: [kat] SHA2-256
475,439 UART: [kat] SHA2-384
480,989 UART: [kat] SHA2-512-ACC
483,340 UART: [kat] ECC-384
2,942,597 UART: [kat] HMAC-384Kdf
2,968,112 UART: [kat] LMS
3,444,596 UART: [kat] --
3,448,507 UART: [cold-reset] ++
3,449,655 UART: [fht] FHT @ 0x50003400
3,461,621 UART: [idev] ++
3,462,255 UART: [idev] CDI.KEYID = 6
3,463,171 UART: [idev] SUBJECT.KEYID = 7
3,464,395 UART: [idev] UDS.KEYID = 0
3,467,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,479 UART: [idev] Erasing UDS.KEYID = 0
5,984,210 UART: [idev] Sha1 KeyId Algorithm
6,008,369 UART: [idev] --
6,013,831 UART: [ldev] ++
6,014,461 UART: [ldev] CDI.KEYID = 6
6,015,356 UART: [ldev] SUBJECT.KEYID = 5
6,016,573 UART: [ldev] AUTHORITY.KEYID = 7
6,017,814 UART: [ldev] FE.KEYID = 1
6,053,390 UART: [ldev] Erasing FE.KEYID = 1
8,561,174 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,287 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,691 UART: [ldev] --
10,369,705 UART: [fwproc] Wait for Commands...
10,371,915 UART: [fwproc] Recv command 0x46574c44
10,373,964 UART: [fwproc] Recv'd Img size: 118548 bytes
12,431,639 UART: ROM Fatal Error: 0x000B000F
12,434,884 >>> mbox cmd response: failed
12,435,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,435,679 >>> mbox cmd response: failed
12,435,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,436,246 >>> mbox cmd response: failed
Initializing fuses
2,059,890 writing to cptra_bootfsm_go
2,249,170 UART:
2,249,515 UART: Running Caliptra ROM ...
2,250,591 UART:
2,250,751 UART: [state] CFI Enabled
2,312,636 UART: [state] LifecycleState = Unprovisioned
2,314,542 UART: [state] DebugLocked = No
2,317,507 UART: [state] WD Timer not started. Device not locked for debugging
2,320,941 UART: [kat] SHA2-256
2,500,628 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,357 UART: [kat] ++
2,511,911 UART: [kat] sha1
2,523,834 UART: [kat] SHA2-256
2,526,530 UART: [kat] SHA2-384
2,532,362 UART: [kat] SHA2-512-ACC
2,534,723 UART: [kat] ECC-384
4,995,393 UART: [kat] HMAC-384Kdf
5,016,229 UART: [kat] LMS
5,492,712 UART: [kat] --
5,499,400 UART: [cold-reset] ++
5,501,076 UART: [fht] FHT @ 0x50003400
5,511,468 UART: [idev] ++
5,512,044 UART: [idev] CDI.KEYID = 6
5,513,077 UART: [idev] SUBJECT.KEYID = 7
5,514,249 UART: [idev] UDS.KEYID = 0
5,517,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,340 UART: [idev] Erasing UDS.KEYID = 0
8,032,939 UART: [idev] Sha1 KeyId Algorithm
8,056,620 UART: [idev] --
8,061,327 UART: [ldev] ++
8,061,907 UART: [ldev] CDI.KEYID = 6
8,062,826 UART: [ldev] SUBJECT.KEYID = 5
8,064,050 UART: [ldev] AUTHORITY.KEYID = 7
8,065,291 UART: [ldev] FE.KEYID = 1
8,103,065 UART: [ldev] Erasing FE.KEYID = 1
10,608,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,346,156 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,362,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,377,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,393,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,415,661 UART: [ldev] --
12,420,878 UART: [fwproc] Wait for Commands...
12,423,933 UART: [fwproc] Recv command 0x46574c44
12,425,937 UART: [fwproc] Recv'd Img size: 118548 bytes
15,909,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,206 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,227 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,384,738 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,848 writing to cptra_bootfsm_go
3,465,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,329,560 >>> mbox cmd response: failed
12,330,192 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,330,557 >>> mbox cmd response: failed
12,330,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,331,140 >>> mbox cmd response: failed
Initializing fuses
2,058,983 writing to cptra_bootfsm_go
5,510,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,274,310 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
43 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,362 writing to cptra_bootfsm_go
192,599 UART:
192,966 UART: Running Caliptra ROM ...
194,144 UART:
603,746 UART: [state] CFI Enabled
620,294 UART: [state] LifecycleState = Unprovisioned
622,258 UART: [state] DebugLocked = No
623,451 UART: [state] WD Timer not started. Device not locked for debugging
627,995 UART: [kat] SHA2-256
807,633 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,421 UART: [kat] ++
818,906 UART: [kat] sha1
830,277 UART: [kat] SHA2-256
832,989 UART: [kat] SHA2-384
839,083 UART: [kat] SHA2-512-ACC
841,489 UART: [kat] ECC-384
3,283,771 UART: [kat] HMAC-384Kdf
3,296,525 UART: [kat] LMS
3,773,073 UART: [kat] --
3,777,067 UART: [cold-reset] ++
3,778,046 UART: [fht] FHT @ 0x50003400
3,788,819 UART: [idev] ++
3,789,388 UART: [idev] CDI.KEYID = 6
3,790,359 UART: [idev] SUBJECT.KEYID = 7
3,791,579 UART: [idev] UDS.KEYID = 0
3,794,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,894 UART: [idev] Erasing UDS.KEYID = 0
6,267,357 UART: [idev] Sha1 KeyId Algorithm
6,291,286 UART: [idev] --
6,296,647 UART: [ldev] ++
6,297,224 UART: [ldev] CDI.KEYID = 6
6,298,141 UART: [ldev] SUBJECT.KEYID = 5
6,299,299 UART: [ldev] AUTHORITY.KEYID = 7
6,300,589 UART: [ldev] FE.KEYID = 1
6,310,163 UART: [ldev] Erasing FE.KEYID = 1
8,788,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,612 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,487 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,256 UART: [ldev] --
10,582,940 UART: [fwproc] Wait for Commands...
10,584,841 UART: [fwproc] Recv command 0x46574c44
10,586,834 UART: [fwproc] Recv'd Img size: 118548 bytes
12,643,509 UART: ROM Fatal Error: 0x000B000F
12,646,755 >>> mbox cmd response: failed
12,647,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,647,525 >>> mbox cmd response: failed
12,647,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,648,093 >>> mbox cmd response: failed
Initializing fuses
2,060,080 writing to cptra_bootfsm_go
2,249,391 UART:
2,249,764 UART: Running Caliptra ROM ...
2,250,902 UART:
7,808,554 UART: [state] CFI Enabled
7,821,300 UART: [state] LifecycleState = Unprovisioned
7,823,224 UART: [state] DebugLocked = No
7,826,100 UART: [state] WD Timer not started. Device not locked for debugging
7,829,587 UART: [kat] SHA2-256
8,009,280 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,020,030 UART: [kat] ++
8,020,587 UART: [kat] sha1
8,031,062 UART: [kat] SHA2-256
8,033,713 UART: [kat] SHA2-384
8,039,815 UART: [kat] SHA2-512-ACC
8,042,172 UART: [kat] ECC-384
10,483,254 UART: [kat] HMAC-384Kdf
10,495,048 UART: [kat] LMS
10,971,536 UART: [kat] --
10,978,238 UART: [cold-reset] ++
10,979,683 UART: [fht] FHT @ 0x50003400
10,990,933 UART: [idev] ++
10,991,505 UART: [idev] CDI.KEYID = 6
10,992,473 UART: [idev] SUBJECT.KEYID = 7
10,993,688 UART: [idev] UDS.KEYID = 0
10,996,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,145,751 UART: [idev] Erasing UDS.KEYID = 0
13,472,603 UART: [idev] Sha1 KeyId Algorithm
13,495,998 UART: [idev] --
13,499,988 UART: [ldev] ++
13,500,558 UART: [ldev] CDI.KEYID = 6
13,501,502 UART: [ldev] SUBJECT.KEYID = 5
13,502,716 UART: [ldev] AUTHORITY.KEYID = 7
13,503,954 UART: [ldev] FE.KEYID = 1
13,514,578 UART: [ldev] Erasing FE.KEYID = 1
15,995,900 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,714,140 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,729,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,745,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,761,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,783,276 UART: [ldev] --
17,789,208 UART: [fwproc] Wait for Commands...
17,791,852 UART: [fwproc] Recv command 0x46574c44
17,793,840 UART: [fwproc] Recv'd Img size: 118548 bytes
21,274,662 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,353,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,426,454 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,754,889 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
3,782,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,525,002 >>> mbox cmd response: failed
12,525,529 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,882 >>> mbox cmd response: failed
12,526,162 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,454 >>> mbox cmd response: failed
Initializing fuses
2,063,484 writing to cptra_bootfsm_go
11,124,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,793,351 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
192,138 UART:
192,497 UART: Running Caliptra ROM ...
193,603 UART:
193,752 UART: [state] CFI Enabled
262,595 UART: [state] LifecycleState = Unprovisioned
265,020 UART: [state] DebugLocked = No
267,510 UART: [state] WD Timer not started. Device not locked for debugging
271,195 UART: [kat] SHA2-256
461,087 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,850 UART: [kat] ++
472,306 UART: [kat] sha1
484,657 UART: [kat] SHA2-256
487,676 UART: [kat] SHA2-384
493,225 UART: [kat] SHA2-512-ACC
495,835 UART: [kat] ECC-384
2,946,190 UART: [kat] HMAC-384Kdf
2,969,785 UART: [kat] LMS
3,501,551 UART: [kat] --
3,504,100 UART: [cold-reset] ++
3,506,412 UART: [fht] FHT @ 0x50003400
3,517,039 UART: [idev] ++
3,517,735 UART: [idev] CDI.KEYID = 6
3,518,715 UART: [idev] SUBJECT.KEYID = 7
3,519,880 UART: [idev] UDS.KEYID = 0
3,522,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,252 UART: [idev] Erasing UDS.KEYID = 0
6,028,698 UART: [idev] Sha1 KeyId Algorithm
6,049,811 UART: [idev] --
6,053,652 UART: [ldev] ++
6,054,344 UART: [ldev] CDI.KEYID = 6
6,055,263 UART: [ldev] SUBJECT.KEYID = 5
6,056,483 UART: [ldev] AUTHORITY.KEYID = 7
6,057,842 UART: [ldev] FE.KEYID = 1
6,098,895 UART: [ldev] Erasing FE.KEYID = 1
8,602,993 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,458 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,571 UART: [ldev] --
10,410,546 UART: [fwproc] Wait for Commands...
10,412,321 UART: [fwproc] Recv command 0x46574c44
10,414,639 UART: [fwproc] Recv'd Img size: 118548 bytes
12,482,550 UART: ROM Fatal Error: 0x000B000F
12,486,182 >>> mbox cmd response: failed
12,486,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,486,979 >>> mbox cmd response: failed
12,487,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,487,500 >>> mbox cmd response: failed
Initializing fuses
2,061,331 writing to cptra_bootfsm_go
2,250,669 UART:
2,251,028 UART: Running Caliptra ROM ...
2,252,126 UART:
2,252,287 UART: [state] CFI Enabled
2,322,522 UART: [state] LifecycleState = Unprovisioned
2,324,951 UART: [state] DebugLocked = No
2,326,453 UART: [state] WD Timer not started. Device not locked for debugging
2,331,286 UART: [kat] SHA2-256
2,521,175 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,917 UART: [kat] ++
2,532,465 UART: [kat] sha1
2,542,984 UART: [kat] SHA2-256
2,545,952 UART: [kat] SHA2-384
2,550,971 UART: [kat] SHA2-512-ACC
2,553,563 UART: [kat] ECC-384
5,007,664 UART: [kat] HMAC-384Kdf
5,031,570 UART: [kat] LMS
5,563,337 UART: [kat] --
5,567,713 UART: [cold-reset] ++
5,570,244 UART: [fht] FHT @ 0x50003400
5,582,288 UART: [idev] ++
5,582,989 UART: [idev] CDI.KEYID = 6
5,584,016 UART: [idev] SUBJECT.KEYID = 7
5,585,131 UART: [idev] UDS.KEYID = 0
5,587,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,736,677 UART: [idev] Erasing UDS.KEYID = 0
8,088,238 UART: [idev] Sha1 KeyId Algorithm
8,111,578 UART: [idev] --
8,116,763 UART: [ldev] ++
8,117,445 UART: [ldev] CDI.KEYID = 6
8,118,379 UART: [ldev] SUBJECT.KEYID = 5
8,119,546 UART: [ldev] AUTHORITY.KEYID = 7
8,120,728 UART: [ldev] FE.KEYID = 1
8,158,609 UART: [ldev] Erasing FE.KEYID = 1
10,664,881 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,333 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,831 UART: [ldev] --
12,470,576 UART: [fwproc] Wait for Commands...
12,473,651 UART: [fwproc] Recv command 0x46574c44
12,475,913 UART: [fwproc] Recv'd Img size: 118548 bytes
15,969,641 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,044,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,168,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,728,803 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,905 writing to cptra_bootfsm_go
3,420,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,267,047 >>> mbox cmd response: failed
12,267,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,267,940 >>> mbox cmd response: failed
12,268,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,268,507 >>> mbox cmd response: failed
Initializing fuses
2,060,480 writing to cptra_bootfsm_go
5,484,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,890,473 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,463 writing to cptra_bootfsm_go
192,753 UART:
193,115 UART: Running Caliptra ROM ...
194,308 UART:
603,875 UART: [state] CFI Enabled
618,413 UART: [state] LifecycleState = Unprovisioned
620,784 UART: [state] DebugLocked = No
622,950 UART: [state] WD Timer not started. Device not locked for debugging
627,402 UART: [kat] SHA2-256
817,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,080 UART: [kat] ++
828,656 UART: [kat] sha1
839,812 UART: [kat] SHA2-256
842,826 UART: [kat] SHA2-384
849,834 UART: [kat] SHA2-512-ACC
852,567 UART: [kat] ECC-384
3,293,896 UART: [kat] HMAC-384Kdf
3,307,005 UART: [kat] LMS
3,838,858 UART: [kat] --
3,841,290 UART: [cold-reset] ++
3,842,418 UART: [fht] FHT @ 0x50003400
3,853,356 UART: [idev] ++
3,854,045 UART: [idev] CDI.KEYID = 6
3,855,016 UART: [idev] SUBJECT.KEYID = 7
3,856,180 UART: [idev] UDS.KEYID = 0
3,859,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,121 UART: [idev] Erasing UDS.KEYID = 0
6,331,550 UART: [idev] Sha1 KeyId Algorithm
6,354,349 UART: [idev] --
6,358,022 UART: [ldev] ++
6,358,710 UART: [ldev] CDI.KEYID = 6
6,359,602 UART: [ldev] SUBJECT.KEYID = 5
6,360,821 UART: [ldev] AUTHORITY.KEYID = 7
6,362,060 UART: [ldev] FE.KEYID = 1
6,372,527 UART: [ldev] Erasing FE.KEYID = 1
8,849,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,437 UART: [ldev] --
10,643,032 UART: [fwproc] Wait for Commands...
10,645,902 UART: [fwproc] Recv command 0x46574c44
10,648,196 UART: [fwproc] Recv'd Img size: 118548 bytes
12,713,620 UART: ROM Fatal Error: 0x000B000F
12,717,242 >>> mbox cmd response: failed
12,717,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,029 >>> mbox cmd response: failed
12,718,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,718,602 >>> mbox cmd response: failed
Initializing fuses
2,066,719 writing to cptra_bootfsm_go
2,256,000 UART:
2,256,369 UART: Running Caliptra ROM ...
2,257,510 UART:
7,739,315 UART: [state] CFI Enabled
7,752,564 UART: [state] LifecycleState = Unprovisioned
7,754,922 UART: [state] DebugLocked = No
7,756,881 UART: [state] WD Timer not started. Device not locked for debugging
7,760,813 UART: [kat] SHA2-256
7,950,730 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,961,477 UART: [kat] ++
7,962,007 UART: [kat] sha1
7,974,573 UART: [kat] SHA2-256
7,977,585 UART: [kat] SHA2-384
7,983,102 UART: [kat] SHA2-512-ACC
7,985,680 UART: [kat] ECC-384
10,427,244 UART: [kat] HMAC-384Kdf
10,439,152 UART: [kat] LMS
10,970,933 UART: [kat] --
10,975,905 UART: [cold-reset] ++
10,978,005 UART: [fht] FHT @ 0x50003400
10,989,128 UART: [idev] ++
10,989,815 UART: [idev] CDI.KEYID = 6
10,990,786 UART: [idev] SUBJECT.KEYID = 7
10,992,007 UART: [idev] UDS.KEYID = 0
10,994,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,143,822 UART: [idev] Erasing UDS.KEYID = 0
13,465,747 UART: [idev] Sha1 KeyId Algorithm
13,487,641 UART: [idev] --
13,493,251 UART: [ldev] ++
13,493,912 UART: [ldev] CDI.KEYID = 6
13,494,805 UART: [ldev] SUBJECT.KEYID = 5
13,495,969 UART: [ldev] AUTHORITY.KEYID = 7
13,497,149 UART: [ldev] FE.KEYID = 1
13,507,475 UART: [ldev] Erasing FE.KEYID = 1
15,990,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,711,715 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,726,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,742,118 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,757,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,777,851 UART: [ldev] --
17,783,989 UART: [fwproc] Wait for Commands...
17,786,263 UART: [fwproc] Recv command 0x46574c44
17,788,589 UART: [fwproc] Recv'd Img size: 118548 bytes
21,286,756 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,367,923 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,491,540 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,051,388 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
3,759,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,505,936 >>> mbox cmd response: failed
12,506,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,506,824 >>> mbox cmd response: failed
12,507,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,423 >>> mbox cmd response: failed
Initializing fuses
2,054,156 writing to cptra_bootfsm_go
11,110,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,392,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,465 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,133 UART: [kat] SHA2-256
882,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,179 UART: [kat] ++
886,331 UART: [kat] sha1
890,615 UART: [kat] SHA2-256
892,553 UART: [kat] SHA2-384
895,266 UART: [kat] SHA2-512-ACC
897,167 UART: [kat] ECC-384
902,872 UART: [kat] HMAC-384Kdf
907,674 UART: [kat] LMS
1,475,870 UART: [kat] --
1,476,835 UART: [cold-reset] ++
1,477,247 UART: [fht] Storing FHT @ 0x50003400
1,479,832 UART: [idev] ++
1,480,000 UART: [idev] CDI.KEYID = 6
1,480,360 UART: [idev] SUBJECT.KEYID = 7
1,480,784 UART: [idev] UDS.KEYID = 0
1,481,129 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,726 UART: [idev] Erasing UDS.KEYID = 0
1,505,678 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,474 UART: [idev] --
1,515,609 UART: [ldev] ++
1,515,777 UART: [ldev] CDI.KEYID = 6
1,516,140 UART: [ldev] SUBJECT.KEYID = 5
1,516,566 UART: [ldev] AUTHORITY.KEYID = 7
1,517,029 UART: [ldev] FE.KEYID = 1
1,522,213 UART: [ldev] Erasing FE.KEYID = 1
1,547,452 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,352 UART: [ldev] --
1,586,663 UART: [fwproc] Waiting for Commands...
1,587,442 UART: [fwproc] Received command 0x46574c44
1,588,233 UART: [fwproc] Received Image of size 118548 bytes
1,629,845 UART: ROM Fatal Error: 0x000B000F
1,631,004 >>> mbox cmd response: failed
1,631,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,010 >>> mbox cmd response: failed
1,631,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,474 UART: [state] LifecycleState = Unprovisioned
86,129 UART: [state] DebugLocked = No
86,749 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,329 UART: [kat] SHA2-256
882,260 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,375 UART: [kat] ++
886,527 UART: [kat] sha1
890,725 UART: [kat] SHA2-256
892,663 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,190 UART: [kat] LMS
1,475,386 UART: [kat] --
1,476,071 UART: [cold-reset] ++
1,476,641 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,498 UART: [idev] Erasing UDS.KEYID = 0
1,505,080 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,754 UART: [idev] --
1,514,573 UART: [ldev] ++
1,514,741 UART: [ldev] CDI.KEYID = 6
1,515,104 UART: [ldev] SUBJECT.KEYID = 5
1,515,530 UART: [ldev] AUTHORITY.KEYID = 7
1,515,993 UART: [ldev] FE.KEYID = 1
1,521,083 UART: [ldev] Erasing FE.KEYID = 1
1,546,696 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,598 UART: [ldev] --
1,585,889 UART: [fwproc] Waiting for Commands...
1,586,672 UART: [fwproc] Received command 0x46574c44
1,587,463 UART: [fwproc] Received Image of size 118548 bytes
2,931,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,235 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,075 >>> mbox cmd response: failed
1,484,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,081 >>> mbox cmd response: failed
1,484,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,566 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
86,021 UART: [state] LifecycleState = Unprovisioned
86,676 UART: [state] DebugLocked = No
87,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,996 UART: [kat] SHA2-256
882,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,042 UART: [kat] ++
887,194 UART: [kat] sha1
891,564 UART: [kat] SHA2-256
893,502 UART: [kat] SHA2-384
896,261 UART: [kat] SHA2-512-ACC
898,162 UART: [kat] ECC-384
903,897 UART: [kat] HMAC-384Kdf
908,419 UART: [kat] LMS
1,476,615 UART: [kat] --
1,477,604 UART: [cold-reset] ++
1,478,048 UART: [fht] Storing FHT @ 0x50003400
1,480,859 UART: [idev] ++
1,481,027 UART: [idev] CDI.KEYID = 6
1,481,387 UART: [idev] SUBJECT.KEYID = 7
1,481,811 UART: [idev] UDS.KEYID = 0
1,482,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,931 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,571 UART: [idev] --
1,515,618 UART: [ldev] ++
1,515,786 UART: [ldev] CDI.KEYID = 6
1,516,149 UART: [ldev] SUBJECT.KEYID = 5
1,516,575 UART: [ldev] AUTHORITY.KEYID = 7
1,517,038 UART: [ldev] FE.KEYID = 1
1,521,994 UART: [ldev] Erasing FE.KEYID = 1
1,547,659 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,274 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,757 UART: [ldev] --
1,587,062 UART: [fwproc] Waiting for Commands...
1,587,827 UART: [fwproc] Received command 0x46574c44
1,588,618 UART: [fwproc] Received Image of size 118548 bytes
1,630,194 UART: ROM Fatal Error: 0x000B000F
1,631,353 >>> mbox cmd response: failed
1,631,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,359 >>> mbox cmd response: failed
1,631,359 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,365 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,330 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,980 UART: [kat] SHA2-256
881,911 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,026 UART: [kat] ++
886,178 UART: [kat] sha1
890,262 UART: [kat] SHA2-256
892,200 UART: [kat] SHA2-384
894,865 UART: [kat] SHA2-512-ACC
896,766 UART: [kat] ECC-384
902,231 UART: [kat] HMAC-384Kdf
906,813 UART: [kat] LMS
1,475,009 UART: [kat] --
1,475,964 UART: [cold-reset] ++
1,476,450 UART: [fht] Storing FHT @ 0x50003400
1,479,217 UART: [idev] ++
1,479,385 UART: [idev] CDI.KEYID = 6
1,479,745 UART: [idev] SUBJECT.KEYID = 7
1,480,169 UART: [idev] UDS.KEYID = 0
1,480,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,829 UART: [idev] Erasing UDS.KEYID = 0
1,504,229 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,027 UART: [idev] --
1,514,138 UART: [ldev] ++
1,514,306 UART: [ldev] CDI.KEYID = 6
1,514,669 UART: [ldev] SUBJECT.KEYID = 5
1,515,095 UART: [ldev] AUTHORITY.KEYID = 7
1,515,558 UART: [ldev] FE.KEYID = 1
1,520,748 UART: [ldev] Erasing FE.KEYID = 1
1,545,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,859 UART: [ldev] --
1,585,348 UART: [fwproc] Waiting for Commands...
1,586,053 UART: [fwproc] Received command 0x46574c44
1,586,844 UART: [fwproc] Received Image of size 118548 bytes
2,931,271 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,257 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,475 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,746 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,483,096 >>> mbox cmd response: failed
1,483,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,102 >>> mbox cmd response: failed
1,483,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,108 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,350 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,403 UART: [state] WD Timer not started. Device not locked for debugging
87,678 UART: [kat] SHA2-256
891,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,332 UART: [kat] ++
895,484 UART: [kat] sha1
899,674 UART: [kat] SHA2-256
901,614 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
915,897 UART: [kat] HMAC-384Kdf
920,571 UART: [kat] LMS
1,168,883 UART: [kat] --
1,169,644 UART: [cold-reset] ++
1,170,158 UART: [fht] FHT @ 0x50003400
1,172,706 UART: [idev] ++
1,172,874 UART: [idev] CDI.KEYID = 6
1,173,235 UART: [idev] SUBJECT.KEYID = 7
1,173,660 UART: [idev] UDS.KEYID = 0
1,174,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,185 UART: [idev] Sha1 KeyId Algorithm
1,207,009 UART: [idev] --
1,208,060 UART: [ldev] ++
1,208,228 UART: [ldev] CDI.KEYID = 6
1,208,592 UART: [ldev] SUBJECT.KEYID = 5
1,209,019 UART: [ldev] AUTHORITY.KEYID = 7
1,209,482 UART: [ldev] FE.KEYID = 1
1,214,654 UART: [ldev] Erasing FE.KEYID = 1
1,240,951 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,720 UART: [ldev] --
1,279,989 UART: [fwproc] Wait for Commands...
1,280,804 UART: [fwproc] Recv command 0x46574c44
1,281,537 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,916 UART: ROM Fatal Error: 0x000B000F
1,323,075 >>> mbox cmd response: failed
1,323,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,081 >>> mbox cmd response: failed
1,323,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,802 UART: [state] LifecycleState = Unprovisioned
85,457 UART: [state] DebugLocked = No
85,985 UART: [state] WD Timer not started. Device not locked for debugging
87,158 UART: [kat] SHA2-256
890,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,812 UART: [kat] ++
894,964 UART: [kat] sha1
899,040 UART: [kat] SHA2-256
900,980 UART: [kat] SHA2-384
903,745 UART: [kat] SHA2-512-ACC
905,646 UART: [kat] ECC-384
915,769 UART: [kat] HMAC-384Kdf
920,409 UART: [kat] LMS
1,168,721 UART: [kat] --
1,169,510 UART: [cold-reset] ++
1,169,868 UART: [fht] FHT @ 0x50003400
1,172,464 UART: [idev] ++
1,172,632 UART: [idev] CDI.KEYID = 6
1,172,993 UART: [idev] SUBJECT.KEYID = 7
1,173,418 UART: [idev] UDS.KEYID = 0
1,173,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,359 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,205 UART: [idev] --
1,208,228 UART: [ldev] ++
1,208,396 UART: [ldev] CDI.KEYID = 6
1,208,760 UART: [ldev] SUBJECT.KEYID = 5
1,209,187 UART: [ldev] AUTHORITY.KEYID = 7
1,209,650 UART: [ldev] FE.KEYID = 1
1,214,514 UART: [ldev] Erasing FE.KEYID = 1
1,240,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,478 UART: [ldev] --
1,279,873 UART: [fwproc] Wait for Commands...
1,280,654 UART: [fwproc] Recv command 0x46574c44
1,281,387 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,642 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,817 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,120 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,554 >>> mbox cmd response: failed
1,180,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,560 >>> mbox cmd response: failed
1,180,560 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,180,566 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,741 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,738 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,143 UART: [kat] SHA2-256
902,083 UART: [kat] SHA2-384
904,744 UART: [kat] SHA2-512-ACC
906,645 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,230 UART: [kat] LMS
1,169,542 UART: [kat] --
1,170,577 UART: [cold-reset] ++
1,171,005 UART: [fht] FHT @ 0x50003400
1,173,679 UART: [idev] ++
1,173,847 UART: [idev] CDI.KEYID = 6
1,174,208 UART: [idev] SUBJECT.KEYID = 7
1,174,633 UART: [idev] UDS.KEYID = 0
1,174,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,828 UART: [idev] Erasing UDS.KEYID = 0
1,199,940 UART: [idev] Sha1 KeyId Algorithm
1,208,854 UART: [idev] --
1,209,725 UART: [ldev] ++
1,209,893 UART: [ldev] CDI.KEYID = 6
1,210,257 UART: [ldev] SUBJECT.KEYID = 5
1,210,684 UART: [ldev] AUTHORITY.KEYID = 7
1,211,147 UART: [ldev] FE.KEYID = 1
1,216,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,844 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,177 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,889 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,795 UART: [ldev] --
1,282,104 UART: [fwproc] Wait for Commands...
1,282,711 UART: [fwproc] Recv command 0x46574c44
1,283,444 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,877 UART: ROM Fatal Error: 0x000B000F
1,326,036 >>> mbox cmd response: failed
1,326,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,042 >>> mbox cmd response: failed
1,326,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,451 UART: [state] LifecycleState = Unprovisioned
86,106 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,978 UART: [kat] SHA2-512-ACC
906,879 UART: [kat] ECC-384
915,938 UART: [kat] HMAC-384Kdf
920,608 UART: [kat] LMS
1,168,920 UART: [kat] --
1,169,737 UART: [cold-reset] ++
1,170,229 UART: [fht] FHT @ 0x50003400
1,173,063 UART: [idev] ++
1,173,231 UART: [idev] CDI.KEYID = 6
1,173,592 UART: [idev] SUBJECT.KEYID = 7
1,174,017 UART: [idev] UDS.KEYID = 0
1,174,363 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,348 UART: [idev] Sha1 KeyId Algorithm
1,208,282 UART: [idev] --
1,209,487 UART: [ldev] ++
1,209,655 UART: [ldev] CDI.KEYID = 6
1,210,019 UART: [ldev] SUBJECT.KEYID = 5
1,210,446 UART: [ldev] AUTHORITY.KEYID = 7
1,210,909 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,342 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,453 UART: [ldev] --
1,281,698 UART: [fwproc] Wait for Commands...
1,282,283 UART: [fwproc] Recv command 0x46574c44
1,283,016 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,017 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,192 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,535 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,045 >>> mbox cmd response: failed
1,181,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,051 >>> mbox cmd response: failed
1,181,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,057 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,056 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,706 UART: [state] LifecycleState = Unprovisioned
86,361 UART: [state] DebugLocked = No
86,973 UART: [state] WD Timer not started. Device not locked for debugging
88,222 UART: [kat] SHA2-256
893,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,997 UART: [kat] ++
898,149 UART: [kat] sha1
902,379 UART: [kat] SHA2-256
904,319 UART: [kat] SHA2-384
907,118 UART: [kat] SHA2-512-ACC
909,019 UART: [kat] ECC-384
918,778 UART: [kat] HMAC-384Kdf
923,520 UART: [kat] LMS
1,171,848 UART: [kat] --
1,172,545 UART: [cold-reset] ++
1,173,095 UART: [fht] FHT @ 0x50003400
1,175,682 UART: [idev] ++
1,175,850 UART: [idev] CDI.KEYID = 6
1,176,210 UART: [idev] SUBJECT.KEYID = 7
1,176,634 UART: [idev] UDS.KEYID = 0
1,176,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,844 UART: [idev] Erasing UDS.KEYID = 0
1,201,527 UART: [idev] Sha1 KeyId Algorithm
1,209,995 UART: [idev] --
1,211,185 UART: [ldev] ++
1,211,353 UART: [ldev] CDI.KEYID = 6
1,211,716 UART: [ldev] SUBJECT.KEYID = 5
1,212,142 UART: [ldev] AUTHORITY.KEYID = 7
1,212,605 UART: [ldev] FE.KEYID = 1
1,217,901 UART: [ldev] Erasing FE.KEYID = 1
1,244,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,421 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,137 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,740 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,869 UART: [ldev] --
1,283,382 UART: [fwproc] Wait for Commands...
1,283,980 UART: [fwproc] Recv command 0x46574c44
1,284,708 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,812 UART: ROM Fatal Error: 0x000B000F
1,327,971 >>> mbox cmd response: failed
1,327,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,977 >>> mbox cmd response: failed
1,327,977 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,983 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,820 UART: [state] LifecycleState = Unprovisioned
85,475 UART: [state] DebugLocked = No
86,053 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
893,004 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,129 UART: [kat] ++
897,281 UART: [kat] sha1
901,585 UART: [kat] SHA2-256
903,525 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
917,832 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,155 UART: [fht] FHT @ 0x50003400
1,174,738 UART: [idev] ++
1,174,906 UART: [idev] CDI.KEYID = 6
1,175,266 UART: [idev] SUBJECT.KEYID = 7
1,175,690 UART: [idev] UDS.KEYID = 0
1,176,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,198 UART: [idev] Erasing UDS.KEYID = 0
1,201,275 UART: [idev] Sha1 KeyId Algorithm
1,209,755 UART: [idev] --
1,211,003 UART: [ldev] ++
1,211,171 UART: [ldev] CDI.KEYID = 6
1,211,534 UART: [ldev] SUBJECT.KEYID = 5
1,211,960 UART: [ldev] AUTHORITY.KEYID = 7
1,212,423 UART: [ldev] FE.KEYID = 1
1,217,739 UART: [ldev] Erasing FE.KEYID = 1
1,244,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,429 UART: [ldev] --
1,283,764 UART: [fwproc] Wait for Commands...
1,284,340 UART: [fwproc] Recv command 0x46574c44
1,285,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,928 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,387 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,920 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,480 >>> mbox cmd response: failed
1,181,480 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,486 >>> mbox cmd response: failed
1,181,486 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,492 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,799 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,247 UART: [state] LifecycleState = Unprovisioned
85,902 UART: [state] DebugLocked = No
86,562 UART: [state] WD Timer not started. Device not locked for debugging
87,721 UART: [kat] SHA2-256
893,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,496 UART: [kat] ++
897,648 UART: [kat] sha1
901,790 UART: [kat] SHA2-256
903,730 UART: [kat] SHA2-384
906,413 UART: [kat] SHA2-512-ACC
908,314 UART: [kat] ECC-384
917,541 UART: [kat] HMAC-384Kdf
922,033 UART: [kat] LMS
1,170,361 UART: [kat] --
1,171,210 UART: [cold-reset] ++
1,171,732 UART: [fht] FHT @ 0x50003400
1,174,377 UART: [idev] ++
1,174,545 UART: [idev] CDI.KEYID = 6
1,174,905 UART: [idev] SUBJECT.KEYID = 7
1,175,329 UART: [idev] UDS.KEYID = 0
1,175,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,405 UART: [idev] Erasing UDS.KEYID = 0
1,200,404 UART: [idev] Sha1 KeyId Algorithm
1,209,046 UART: [idev] --
1,210,032 UART: [ldev] ++
1,210,200 UART: [ldev] CDI.KEYID = 6
1,210,563 UART: [ldev] SUBJECT.KEYID = 5
1,210,989 UART: [ldev] AUTHORITY.KEYID = 7
1,211,452 UART: [ldev] FE.KEYID = 1
1,217,032 UART: [ldev] Erasing FE.KEYID = 1
1,243,111 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,104 UART: [ldev] --
1,282,545 UART: [fwproc] Wait for Commands...
1,283,155 UART: [fwproc] Recv command 0x46574c44
1,283,883 UART: [fwproc] Recv'd Img size: 118548 bytes
1,324,919 UART: ROM Fatal Error: 0x000B000F
1,326,078 >>> mbox cmd response: failed
1,326,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,084 >>> mbox cmd response: failed
1,326,084 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,995 UART: [state] LifecycleState = Unprovisioned
85,650 UART: [state] DebugLocked = No
86,382 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,998 UART: [kat] SHA2-256
903,938 UART: [kat] SHA2-384
906,831 UART: [kat] SHA2-512-ACC
908,732 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
923,165 UART: [kat] LMS
1,171,493 UART: [kat] --
1,172,370 UART: [cold-reset] ++
1,172,926 UART: [fht] FHT @ 0x50003400
1,175,677 UART: [idev] ++
1,175,845 UART: [idev] CDI.KEYID = 6
1,176,205 UART: [idev] SUBJECT.KEYID = 7
1,176,629 UART: [idev] UDS.KEYID = 0
1,176,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,073 UART: [idev] Erasing UDS.KEYID = 0
1,201,616 UART: [idev] Sha1 KeyId Algorithm
1,210,128 UART: [idev] --
1,211,046 UART: [ldev] ++
1,211,214 UART: [ldev] CDI.KEYID = 6
1,211,577 UART: [ldev] SUBJECT.KEYID = 5
1,212,003 UART: [ldev] AUTHORITY.KEYID = 7
1,212,466 UART: [ldev] FE.KEYID = 1
1,217,646 UART: [ldev] Erasing FE.KEYID = 1
1,243,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,961 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,926 UART: [ldev] --
1,283,399 UART: [fwproc] Wait for Commands...
1,284,049 UART: [fwproc] Recv command 0x46574c44
1,284,777 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,837 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,118 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,288 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,491 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,025 >>> mbox cmd response: failed
1,182,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,031 >>> mbox cmd response: failed
1,182,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,037 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,542 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,314 UART:
192,689 UART: Running Caliptra ROM ...
193,777 UART:
193,924 UART: [state] CFI Enabled
266,118 UART: [state] LifecycleState = Unprovisioned
268,038 UART: [state] DebugLocked = No
269,467 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,297 UART: [kat] SHA2-256
443,979 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,510 UART: [kat] ++
454,959 UART: [kat] sha1
467,294 UART: [kat] SHA2-256
469,987 UART: [kat] SHA2-384
476,134 UART: [kat] SHA2-512-ACC
478,477 UART: [kat] ECC-384
2,767,784 UART: [kat] HMAC-384Kdf
2,797,892 UART: [kat] LMS
3,988,235 UART: [kat] --
3,991,486 UART: [cold-reset] ++
3,994,072 UART: [fht] Storing FHT @ 0x50003400
4,004,590 UART: [idev] ++
4,005,164 UART: [idev] CDI.KEYID = 6
4,006,133 UART: [idev] SUBJECT.KEYID = 7
4,007,366 UART: [idev] UDS.KEYID = 0
4,010,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,573 UART: [idev] Erasing UDS.KEYID = 0
7,344,504 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,378 UART: [idev] --
7,370,600 UART: [ldev] ++
7,371,175 UART: [ldev] CDI.KEYID = 6
7,372,117 UART: [ldev] SUBJECT.KEYID = 5
7,373,333 UART: [ldev] AUTHORITY.KEYID = 7
7,374,545 UART: [ldev] FE.KEYID = 1
7,421,271 UART: [ldev] Erasing FE.KEYID = 1
10,752,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,725 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,081 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,039 UART: [ldev] --
13,114,399 UART: [fwproc] Waiting for Commands...
13,116,885 UART: [fwproc] Received command 0x46574c44
13,119,072 UART: [fwproc] Received Image of size 118548 bytes
14,514,639 UART: ROM Fatal Error: 0x000B001A
14,518,092 >>> mbox cmd response: failed
14,518,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,518,855 >>> mbox cmd response: failed
14,519,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,519,422 >>> mbox cmd response: failed
Initializing fuses
2,055,684 writing to cptra_bootfsm_go
2,245,042 UART:
2,245,384 UART: Running Caliptra ROM ...
2,246,435 UART:
2,246,588 UART: [state] CFI Enabled
2,322,707 UART: [state] LifecycleState = Unprovisioned
2,324,646 UART: [state] DebugLocked = No
2,327,036 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,331,780 UART: [kat] SHA2-256
2,501,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,511,976 UART: [kat] ++
2,512,433 UART: [kat] sha1
2,523,537 UART: [kat] SHA2-256
2,526,237 UART: [kat] SHA2-384
2,531,802 UART: [kat] SHA2-512-ACC
2,534,160 UART: [kat] ECC-384
4,824,271 UART: [kat] HMAC-384Kdf
4,855,705 UART: [kat] LMS
6,046,016 UART: [kat] --
6,050,350 UART: [cold-reset] ++
6,052,072 UART: [fht] Storing FHT @ 0x50003400
6,063,789 UART: [idev] ++
6,064,361 UART: [idev] CDI.KEYID = 6
6,065,331 UART: [idev] SUBJECT.KEYID = 7
6,066,556 UART: [idev] UDS.KEYID = 0
6,069,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,241 UART: [idev] Erasing UDS.KEYID = 0
9,402,598 UART: [idev] Using Sha1 for KeyId Algorithm
9,424,208 UART: [idev] --
9,429,727 UART: [ldev] ++
9,430,305 UART: [ldev] CDI.KEYID = 6
9,431,216 UART: [ldev] SUBJECT.KEYID = 5
9,432,474 UART: [ldev] AUTHORITY.KEYID = 7
9,433,731 UART: [ldev] FE.KEYID = 1
9,479,222 UART: [ldev] Erasing FE.KEYID = 1
12,812,124 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,126,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,140,817 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,155,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,170,173 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,190,188 UART: [ldev] --
15,194,318 UART: [fwproc] Waiting for Commands...
15,196,634 UART: [fwproc] Received command 0x46574c44
15,198,832 UART: [fwproc] Received Image of size 118548 bytes
19,298,381 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,371,058 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,444,234 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,773,246 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,078 writing to cptra_bootfsm_go
3,784,337 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,287,945 >>> mbox cmd response: failed
14,288,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,288,926 >>> mbox cmd response: failed
14,289,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,289,518 >>> mbox cmd response: failed
Initializing fuses
2,049,726 writing to cptra_bootfsm_go
5,822,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,984,683 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,597 UART:
192,960 UART: Running Caliptra ROM ...
194,057 UART:
603,655 UART: [state] CFI Enabled
617,759 UART: [state] LifecycleState = Unprovisioned
619,683 UART: [state] DebugLocked = No
621,308 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,154 UART: [kat] SHA2-256
795,924 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,466 UART: [kat] ++
806,918 UART: [kat] sha1
817,851 UART: [kat] SHA2-256
820,541 UART: [kat] SHA2-384
826,357 UART: [kat] SHA2-512-ACC
828,700 UART: [kat] ECC-384
3,115,936 UART: [kat] HMAC-384Kdf
3,126,444 UART: [kat] LMS
4,316,574 UART: [kat] --
4,321,486 UART: [cold-reset] ++
4,324,080 UART: [fht] Storing FHT @ 0x50003400
4,336,275 UART: [idev] ++
4,336,849 UART: [idev] CDI.KEYID = 6
4,337,840 UART: [idev] SUBJECT.KEYID = 7
4,339,080 UART: [idev] UDS.KEYID = 0
4,342,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,513 UART: [idev] Erasing UDS.KEYID = 0
7,623,077 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,977 UART: [idev] --
7,650,470 UART: [ldev] ++
7,651,112 UART: [ldev] CDI.KEYID = 6
7,652,031 UART: [ldev] SUBJECT.KEYID = 5
7,653,255 UART: [ldev] AUTHORITY.KEYID = 7
7,654,493 UART: [ldev] FE.KEYID = 1
7,668,059 UART: [ldev] Erasing FE.KEYID = 1
10,956,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,763 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,297 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,967 UART: [ldev] --
13,313,054 UART: [fwproc] Waiting for Commands...
13,315,653 UART: [fwproc] Received command 0x46574c44
13,317,852 UART: [fwproc] Received Image of size 118548 bytes
14,715,136 UART: ROM Fatal Error: 0x000B001A
14,718,586 >>> mbox cmd response: failed
14,719,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,719,389 >>> mbox cmd response: failed
14,719,659 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,719,956 >>> mbox cmd response: failed
Initializing fuses
2,054,974 writing to cptra_bootfsm_go
2,244,246 UART:
2,244,609 UART: Running Caliptra ROM ...
2,245,752 UART:
5,753,757 UART: [state] CFI Enabled
5,768,775 UART: [state] LifecycleState = Unprovisioned
5,770,701 UART: [state] DebugLocked = No
5,772,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,776,679 UART: [kat] SHA2-256
5,946,423 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,956,959 UART: [kat] ++
5,957,424 UART: [kat] sha1
5,968,636 UART: [kat] SHA2-256
5,971,376 UART: [kat] SHA2-384
5,977,162 UART: [kat] SHA2-512-ACC
5,979,526 UART: [kat] ECC-384
8,261,667 UART: [kat] HMAC-384Kdf
8,274,392 UART: [kat] LMS
9,464,498 UART: [kat] --
9,466,876 UART: [cold-reset] ++
9,468,977 UART: [fht] Storing FHT @ 0x50003400
9,480,246 UART: [idev] ++
9,480,827 UART: [idev] CDI.KEYID = 6
9,481,855 UART: [idev] SUBJECT.KEYID = 7
9,483,022 UART: [idev] UDS.KEYID = 0
9,485,676 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,634,499 UART: [idev] Erasing UDS.KEYID = 0
12,774,387 UART: [idev] Using Sha1 for KeyId Algorithm
12,796,013 UART: [idev] --
12,800,186 UART: [ldev] ++
12,800,818 UART: [ldev] CDI.KEYID = 6
12,801,735 UART: [ldev] SUBJECT.KEYID = 5
12,803,005 UART: [ldev] AUTHORITY.KEYID = 7
12,804,260 UART: [ldev] FE.KEYID = 1
12,815,260 UART: [ldev] Erasing FE.KEYID = 1
16,103,174 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,397,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,411,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,426,516 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,440,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,459,403 UART: [ldev] --
18,464,961 UART: [fwproc] Waiting for Commands...
18,467,552 UART: [fwproc] Received command 0x46574c44
18,469,751 UART: [fwproc] Received Image of size 118548 bytes
22,579,913 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,653,555 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,726,780 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,054,498 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
4,127,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,064 >>> mbox cmd response: failed
14,451,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,451,972 >>> mbox cmd response: failed
14,452,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,548 >>> mbox cmd response: failed
Initializing fuses
2,049,049 writing to cptra_bootfsm_go
9,544,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,573,347 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,117 UART:
192,486 UART: Running Caliptra ROM ...
193,573 UART:
193,720 UART: [state] CFI Enabled
263,376 UART: [state] LifecycleState = Unprovisioned
265,319 UART: [state] DebugLocked = No
266,944 UART: [state] WD Timer not started. Device not locked for debugging
269,987 UART: [kat] SHA2-256
449,641 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,396 UART: [kat] ++
460,897 UART: [kat] sha1
470,912 UART: [kat] SHA2-256
473,656 UART: [kat] SHA2-384
480,014 UART: [kat] SHA2-512-ACC
482,363 UART: [kat] ECC-384
2,926,345 UART: [kat] HMAC-384Kdf
2,949,067 UART: [kat] LMS
3,425,597 UART: [kat] --
3,428,159 UART: [cold-reset] ++
3,429,622 UART: [fht] FHT @ 0x50003400
3,439,905 UART: [idev] ++
3,440,533 UART: [idev] CDI.KEYID = 6
3,441,449 UART: [idev] SUBJECT.KEYID = 7
3,442,718 UART: [idev] UDS.KEYID = 0
3,445,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,980 UART: [idev] Erasing UDS.KEYID = 0
5,966,493 UART: [idev] Sha1 KeyId Algorithm
5,989,040 UART: [idev] --
5,994,558 UART: [ldev] ++
5,995,132 UART: [ldev] CDI.KEYID = 6
5,996,051 UART: [ldev] SUBJECT.KEYID = 5
5,997,221 UART: [ldev] AUTHORITY.KEYID = 7
5,998,513 UART: [ldev] FE.KEYID = 1
6,036,605 UART: [ldev] Erasing FE.KEYID = 1
8,544,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,347,524 UART: [ldev] --
10,352,741 UART: [fwproc] Wait for Commands...
10,354,581 UART: [fwproc] Recv command 0x46574c44
10,356,595 UART: [fwproc] Recv'd Img size: 118548 bytes
11,448,907 UART: ROM Fatal Error: 0x000B001A
11,452,167 >>> mbox cmd response: failed
11,452,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,452,860 >>> mbox cmd response: failed
11,453,131 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,453,427 >>> mbox cmd response: failed
Initializing fuses
2,059,200 writing to cptra_bootfsm_go
2,248,568 UART:
2,248,912 UART: Running Caliptra ROM ...
2,249,972 UART:
2,250,127 UART: [state] CFI Enabled
2,313,515 UART: [state] LifecycleState = Unprovisioned
2,315,491 UART: [state] DebugLocked = No
2,316,918 UART: [state] WD Timer not started. Device not locked for debugging
2,320,183 UART: [kat] SHA2-256
2,499,830 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,642 UART: [kat] ++
2,511,112 UART: [kat] sha1
2,521,083 UART: [kat] SHA2-256
2,523,784 UART: [kat] SHA2-384
2,528,860 UART: [kat] SHA2-512-ACC
2,531,267 UART: [kat] ECC-384
4,975,836 UART: [kat] HMAC-384Kdf
4,999,402 UART: [kat] LMS
5,475,900 UART: [kat] --
5,478,327 UART: [cold-reset] ++
5,480,478 UART: [fht] FHT @ 0x50003400
5,491,596 UART: [idev] ++
5,492,168 UART: [idev] CDI.KEYID = 6
5,493,084 UART: [idev] SUBJECT.KEYID = 7
5,494,361 UART: [idev] UDS.KEYID = 0
5,497,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,646,301 UART: [idev] Erasing UDS.KEYID = 0
8,012,575 UART: [idev] Sha1 KeyId Algorithm
8,037,208 UART: [idev] --
8,042,264 UART: [ldev] ++
8,042,860 UART: [ldev] CDI.KEYID = 6
8,043,779 UART: [ldev] SUBJECT.KEYID = 5
8,044,948 UART: [ldev] AUTHORITY.KEYID = 7
8,046,241 UART: [ldev] FE.KEYID = 1
8,084,276 UART: [ldev] Erasing FE.KEYID = 1
10,595,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,326,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,342,580 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,358,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,373,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,395,277 UART: [ldev] --
12,400,169 UART: [fwproc] Wait for Commands...
12,402,171 UART: [fwproc] Recv command 0x46574c44
12,404,160 UART: [fwproc] Recv'd Img size: 118548 bytes
15,883,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,965,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,038,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,366,342 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,465,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,359,016 >>> mbox cmd response: failed
11,359,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,360,196 >>> mbox cmd response: failed
11,360,477 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,360,771 >>> mbox cmd response: failed
Initializing fuses
2,067,709 writing to cptra_bootfsm_go
5,525,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,309,647 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,596 UART:
192,958 UART: Running Caliptra ROM ...
194,086 UART:
603,696 UART: [state] CFI Enabled
615,861 UART: [state] LifecycleState = Unprovisioned
617,838 UART: [state] DebugLocked = No
620,200 UART: [state] WD Timer not started. Device not locked for debugging
624,857 UART: [kat] SHA2-256
804,520 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,283 UART: [kat] ++
815,763 UART: [kat] sha1
826,804 UART: [kat] SHA2-256
829,492 UART: [kat] SHA2-384
836,392 UART: [kat] SHA2-512-ACC
838,799 UART: [kat] ECC-384
3,282,520 UART: [kat] HMAC-384Kdf
3,294,888 UART: [kat] LMS
3,771,372 UART: [kat] --
3,775,068 UART: [cold-reset] ++
3,776,036 UART: [fht] FHT @ 0x50003400
3,787,189 UART: [idev] ++
3,787,779 UART: [idev] CDI.KEYID = 6
3,788,808 UART: [idev] SUBJECT.KEYID = 7
3,789,971 UART: [idev] UDS.KEYID = 0
3,793,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,176 UART: [idev] Erasing UDS.KEYID = 0
6,265,055 UART: [idev] Sha1 KeyId Algorithm
6,289,165 UART: [idev] --
6,294,296 UART: [ldev] ++
6,294,872 UART: [ldev] CDI.KEYID = 6
6,295,783 UART: [ldev] SUBJECT.KEYID = 5
6,297,002 UART: [ldev] AUTHORITY.KEYID = 7
6,298,245 UART: [ldev] FE.KEYID = 1
6,311,596 UART: [ldev] Erasing FE.KEYID = 1
8,790,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,659 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,557,283 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,440 UART: [ldev] --
10,584,579 UART: [fwproc] Wait for Commands...
10,586,257 UART: [fwproc] Recv command 0x46574c44
10,588,254 UART: [fwproc] Recv'd Img size: 118548 bytes
11,671,722 UART: ROM Fatal Error: 0x000B001A
11,674,924 >>> mbox cmd response: failed
11,675,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,675,707 >>> mbox cmd response: failed
11,675,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,676,280 >>> mbox cmd response: failed
Initializing fuses
2,058,906 writing to cptra_bootfsm_go
2,248,247 UART:
2,248,593 UART: Running Caliptra ROM ...
2,249,733 UART:
8,782,337 UART: [state] CFI Enabled
8,795,745 UART: [state] LifecycleState = Unprovisioned
8,797,697 UART: [state] DebugLocked = No
8,800,243 UART: [state] WD Timer not started. Device not locked for debugging
8,804,050 UART: [kat] SHA2-256
8,983,711 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,994,505 UART: [kat] ++
8,995,047 UART: [kat] sha1
9,006,442 UART: [kat] SHA2-256
9,009,148 UART: [kat] SHA2-384
9,014,124 UART: [kat] SHA2-512-ACC
9,016,543 UART: [kat] ECC-384
11,457,532 UART: [kat] HMAC-384Kdf
11,470,098 UART: [kat] LMS
11,946,652 UART: [kat] --
11,950,109 UART: [cold-reset] ++
11,952,039 UART: [fht] FHT @ 0x50003400
11,962,269 UART: [idev] ++
11,962,837 UART: [idev] CDI.KEYID = 6
11,963,861 UART: [idev] SUBJECT.KEYID = 7
11,965,025 UART: [idev] UDS.KEYID = 0
11,967,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,116,941 UART: [idev] Erasing UDS.KEYID = 0
14,444,893 UART: [idev] Sha1 KeyId Algorithm
14,467,157 UART: [idev] --
14,472,343 UART: [ldev] ++
14,472,920 UART: [ldev] CDI.KEYID = 6
14,473,833 UART: [ldev] SUBJECT.KEYID = 5
14,475,076 UART: [ldev] AUTHORITY.KEYID = 7
14,476,312 UART: [ldev] FE.KEYID = 1
14,489,550 UART: [ldev] Erasing FE.KEYID = 1
16,966,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,687,761 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,703,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,719,474 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,735,073 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,758,012 UART: [ldev] --
18,763,822 UART: [fwproc] Wait for Commands...
18,765,386 UART: [fwproc] Recv command 0x46574c44
18,767,380 UART: [fwproc] Recv'd Img size: 118548 bytes
22,251,387 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,330,878 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,403,899 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,731,918 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,783,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,571,520 >>> mbox cmd response: failed
11,572,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,572,407 >>> mbox cmd response: failed
11,572,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,572,980 >>> mbox cmd response: failed
Initializing fuses
2,062,483 writing to cptra_bootfsm_go
12,060,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,741,475 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,135 UART:
192,509 UART: Running Caliptra ROM ...
193,714 UART:
193,875 UART: [state] CFI Enabled
260,523 UART: [state] LifecycleState = Unprovisioned
262,966 UART: [state] DebugLocked = No
264,463 UART: [state] WD Timer not started. Device not locked for debugging
268,587 UART: [kat] SHA2-256
458,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,250 UART: [kat] ++
469,703 UART: [kat] sha1
481,239 UART: [kat] SHA2-256
484,258 UART: [kat] SHA2-384
490,904 UART: [kat] SHA2-512-ACC
493,505 UART: [kat] ECC-384
2,947,147 UART: [kat] HMAC-384Kdf
2,972,093 UART: [kat] LMS
3,503,891 UART: [kat] --
3,507,130 UART: [cold-reset] ++
3,508,638 UART: [fht] FHT @ 0x50003400
3,519,578 UART: [idev] ++
3,520,341 UART: [idev] CDI.KEYID = 6
3,521,232 UART: [idev] SUBJECT.KEYID = 7
3,522,453 UART: [idev] UDS.KEYID = 0
3,525,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,591 UART: [idev] Erasing UDS.KEYID = 0
6,030,317 UART: [idev] Sha1 KeyId Algorithm
6,053,225 UART: [idev] --
6,058,085 UART: [ldev] ++
6,058,772 UART: [ldev] CDI.KEYID = 6
6,059,662 UART: [ldev] SUBJECT.KEYID = 5
6,060,885 UART: [ldev] AUTHORITY.KEYID = 7
6,062,074 UART: [ldev] FE.KEYID = 1
6,100,526 UART: [ldev] Erasing FE.KEYID = 1
8,605,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,645 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,768 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,090 UART: [ldev] --
10,415,161 UART: [fwproc] Wait for Commands...
10,418,148 UART: [fwproc] Recv command 0x46574c44
10,420,413 UART: [fwproc] Recv'd Img size: 118548 bytes
11,519,908 UART: ROM Fatal Error: 0x000B001A
11,523,566 >>> mbox cmd response: failed
11,523,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,524,328 >>> mbox cmd response: failed
11,524,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,524,902 >>> mbox cmd response: failed
Initializing fuses
2,061,299 writing to cptra_bootfsm_go
2,250,625 UART:
2,250,975 UART: Running Caliptra ROM ...
2,252,111 UART:
2,252,278 UART: [state] CFI Enabled
2,319,473 UART: [state] LifecycleState = Unprovisioned
2,321,806 UART: [state] DebugLocked = No
2,324,405 UART: [state] WD Timer not started. Device not locked for debugging
2,328,572 UART: [kat] SHA2-256
2,518,404 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,529,189 UART: [kat] ++
2,529,655 UART: [kat] sha1
2,542,599 UART: [kat] SHA2-256
2,545,627 UART: [kat] SHA2-384
2,550,650 UART: [kat] SHA2-512-ACC
2,553,272 UART: [kat] ECC-384
5,010,032 UART: [kat] HMAC-384Kdf
5,033,025 UART: [kat] LMS
5,564,798 UART: [kat] --
5,569,248 UART: [cold-reset] ++
5,570,378 UART: [fht] FHT @ 0x50003400
5,581,741 UART: [idev] ++
5,582,428 UART: [idev] CDI.KEYID = 6
5,583,447 UART: [idev] SUBJECT.KEYID = 7
5,584,556 UART: [idev] UDS.KEYID = 0
5,586,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,920 UART: [idev] Erasing UDS.KEYID = 0
8,091,400 UART: [idev] Sha1 KeyId Algorithm
8,115,554 UART: [idev] --
8,119,443 UART: [ldev] ++
8,120,126 UART: [ldev] CDI.KEYID = 6
8,121,067 UART: [ldev] SUBJECT.KEYID = 5
8,122,253 UART: [ldev] AUTHORITY.KEYID = 7
8,123,493 UART: [ldev] FE.KEYID = 1
8,161,505 UART: [ldev] Erasing FE.KEYID = 1
10,666,337 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,963 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,419,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,434,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,449,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,470,572 UART: [ldev] --
12,476,221 UART: [fwproc] Wait for Commands...
12,479,295 UART: [fwproc] Recv command 0x46574c44
12,481,562 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,798 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,048,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,172,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,733,225 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,443,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,320,746 >>> mbox cmd response: failed
11,321,286 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,321,633 >>> mbox cmd response: failed
11,321,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,322,208 >>> mbox cmd response: failed
Initializing fuses
2,060,809 writing to cptra_bootfsm_go
5,493,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,882,154 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,501 UART:
192,857 UART: Running Caliptra ROM ...
194,044 UART:
603,708 UART: [state] CFI Enabled
620,559 UART: [state] LifecycleState = Unprovisioned
622,968 UART: [state] DebugLocked = No
624,348 UART: [state] WD Timer not started. Device not locked for debugging
628,359 UART: [kat] SHA2-256
818,258 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,022 UART: [kat] ++
829,539 UART: [kat] sha1
841,012 UART: [kat] SHA2-256
844,022 UART: [kat] SHA2-384
850,464 UART: [kat] SHA2-512-ACC
853,092 UART: [kat] ECC-384
3,297,810 UART: [kat] HMAC-384Kdf
3,310,007 UART: [kat] LMS
3,841,849 UART: [kat] --
3,846,437 UART: [cold-reset] ++
3,847,781 UART: [fht] FHT @ 0x50003400
3,859,368 UART: [idev] ++
3,860,069 UART: [idev] CDI.KEYID = 6
3,860,967 UART: [idev] SUBJECT.KEYID = 7
3,862,190 UART: [idev] UDS.KEYID = 0
3,865,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,086 UART: [idev] Erasing UDS.KEYID = 0
6,339,851 UART: [idev] Sha1 KeyId Algorithm
6,362,448 UART: [idev] --
6,366,317 UART: [ldev] ++
6,367,014 UART: [ldev] CDI.KEYID = 6
6,367,933 UART: [ldev] SUBJECT.KEYID = 5
6,369,099 UART: [ldev] AUTHORITY.KEYID = 7
6,370,340 UART: [ldev] FE.KEYID = 1
6,381,857 UART: [ldev] Erasing FE.KEYID = 1
8,859,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,519 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,596 UART: [ldev] --
10,651,301 UART: [fwproc] Wait for Commands...
10,653,516 UART: [fwproc] Recv command 0x46574c44
10,655,787 UART: [fwproc] Recv'd Img size: 118548 bytes
11,757,474 UART: ROM Fatal Error: 0x000B001A
11,761,154 >>> mbox cmd response: failed
11,761,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,761,906 >>> mbox cmd response: failed
11,762,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,762,480 >>> mbox cmd response: failed
Initializing fuses
2,065,789 writing to cptra_bootfsm_go
2,255,111 UART:
2,255,461 UART: Running Caliptra ROM ...
2,256,598 UART:
8,693,737 UART: [state] CFI Enabled
8,709,627 UART: [state] LifecycleState = Unprovisioned
8,711,987 UART: [state] DebugLocked = No
8,714,488 UART: [state] WD Timer not started. Device not locked for debugging
8,719,005 UART: [kat] SHA2-256
8,908,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,919,672 UART: [kat] ++
8,920,194 UART: [kat] sha1
8,931,952 UART: [kat] SHA2-256
8,934,978 UART: [kat] SHA2-384
8,941,034 UART: [kat] SHA2-512-ACC
8,943,623 UART: [kat] ECC-384
11,387,424 UART: [kat] HMAC-384Kdf
11,401,970 UART: [kat] LMS
11,933,807 UART: [kat] --
11,938,715 UART: [cold-reset] ++
11,940,008 UART: [fht] FHT @ 0x50003400
11,950,350 UART: [idev] ++
11,951,085 UART: [idev] CDI.KEYID = 6
11,952,003 UART: [idev] SUBJECT.KEYID = 7
11,953,227 UART: [idev] UDS.KEYID = 0
11,955,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,104,968 UART: [idev] Erasing UDS.KEYID = 0
14,429,974 UART: [idev] Sha1 KeyId Algorithm
14,451,062 UART: [idev] --
14,455,581 UART: [ldev] ++
14,456,282 UART: [ldev] CDI.KEYID = 6
14,457,165 UART: [ldev] SUBJECT.KEYID = 5
14,458,400 UART: [ldev] AUTHORITY.KEYID = 7
14,459,584 UART: [ldev] FE.KEYID = 1
14,472,265 UART: [ldev] Erasing FE.KEYID = 1
16,955,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,675,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,690,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,705,483 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,720,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,741,484 UART: [ldev] --
18,747,022 UART: [fwproc] Wait for Commands...
18,749,072 UART: [fwproc] Recv command 0x46574c44
18,751,345 UART: [fwproc] Recv'd Img size: 118548 bytes
22,243,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,321,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,444,868 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,005,553 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,345 writing to cptra_bootfsm_go
3,757,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,545,724 >>> mbox cmd response: failed
11,546,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,546,998 >>> mbox cmd response: failed
11,547,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,547,574 >>> mbox cmd response: failed
Initializing fuses
2,053,275 writing to cptra_bootfsm_go
12,073,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,361,631 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,690 UART: [state] LifecycleState = Unprovisioned
86,345 UART: [state] DebugLocked = No
87,071 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,727 UART: [kat] SHA2-256
882,658 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,773 UART: [kat] ++
886,925 UART: [kat] sha1
891,183 UART: [kat] SHA2-256
893,121 UART: [kat] SHA2-384
895,822 UART: [kat] SHA2-512-ACC
897,723 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,600 UART: [kat] LMS
1,475,796 UART: [kat] --
1,476,531 UART: [cold-reset] ++
1,476,957 UART: [fht] Storing FHT @ 0x50003400
1,479,632 UART: [idev] ++
1,479,800 UART: [idev] CDI.KEYID = 6
1,480,160 UART: [idev] SUBJECT.KEYID = 7
1,480,584 UART: [idev] UDS.KEYID = 0
1,480,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,642 UART: [idev] Erasing UDS.KEYID = 0
1,504,862 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,354 UART: [idev] --
1,514,263 UART: [ldev] ++
1,514,431 UART: [ldev] CDI.KEYID = 6
1,514,794 UART: [ldev] SUBJECT.KEYID = 5
1,515,220 UART: [ldev] AUTHORITY.KEYID = 7
1,515,683 UART: [ldev] FE.KEYID = 1
1,520,849 UART: [ldev] Erasing FE.KEYID = 1
1,546,486 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,420 UART: [ldev] --
1,585,893 UART: [fwproc] Waiting for Commands...
1,586,544 UART: [fwproc] Received command 0x46574c44
1,587,335 UART: [fwproc] Received Image of size 118548 bytes
1,626,507 UART: ROM Fatal Error: 0x000B001A
1,627,666 >>> mbox cmd response: failed
1,627,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,672 >>> mbox cmd response: failed
1,627,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,093 UART: [kat] SHA2-256
882,024 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,139 UART: [kat] ++
886,291 UART: [kat] sha1
890,509 UART: [kat] SHA2-256
892,447 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,736 UART: [kat] HMAC-384Kdf
907,356 UART: [kat] LMS
1,475,552 UART: [kat] --
1,476,453 UART: [cold-reset] ++
1,476,889 UART: [fht] Storing FHT @ 0x50003400
1,479,600 UART: [idev] ++
1,479,768 UART: [idev] CDI.KEYID = 6
1,480,128 UART: [idev] SUBJECT.KEYID = 7
1,480,552 UART: [idev] UDS.KEYID = 0
1,480,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,286 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,189 UART: [ldev] ++
1,514,357 UART: [ldev] CDI.KEYID = 6
1,514,720 UART: [ldev] SUBJECT.KEYID = 5
1,515,146 UART: [ldev] AUTHORITY.KEYID = 7
1,515,609 UART: [ldev] FE.KEYID = 1
1,520,485 UART: [ldev] Erasing FE.KEYID = 1
1,546,184 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,572 UART: [ldev] --
1,584,927 UART: [fwproc] Waiting for Commands...
1,585,634 UART: [fwproc] Received command 0x46574c44
1,586,425 UART: [fwproc] Received Image of size 118548 bytes
2,930,430 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,144 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,677 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,053 >>> mbox cmd response: failed
1,479,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,059 >>> mbox cmd response: failed
1,479,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,295 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,564 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
895,149 UART: [kat] SHA2-512-ACC
897,050 UART: [kat] ECC-384
902,823 UART: [kat] HMAC-384Kdf
907,281 UART: [kat] LMS
1,475,477 UART: [kat] --
1,476,244 UART: [cold-reset] ++
1,476,574 UART: [fht] Storing FHT @ 0x50003400
1,479,363 UART: [idev] ++
1,479,531 UART: [idev] CDI.KEYID = 6
1,479,891 UART: [idev] SUBJECT.KEYID = 7
1,480,315 UART: [idev] UDS.KEYID = 0
1,480,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,165 UART: [idev] Erasing UDS.KEYID = 0
1,504,939 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,365 UART: [idev] --
1,514,240 UART: [ldev] ++
1,514,408 UART: [ldev] CDI.KEYID = 6
1,514,771 UART: [ldev] SUBJECT.KEYID = 5
1,515,197 UART: [ldev] AUTHORITY.KEYID = 7
1,515,660 UART: [ldev] FE.KEYID = 1
1,521,052 UART: [ldev] Erasing FE.KEYID = 1
1,546,233 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,027 UART: [ldev] --
1,585,506 UART: [fwproc] Waiting for Commands...
1,586,353 UART: [fwproc] Received command 0x46574c44
1,587,144 UART: [fwproc] Received Image of size 118548 bytes
1,626,338 UART: ROM Fatal Error: 0x000B001A
1,627,497 >>> mbox cmd response: failed
1,627,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,503 >>> mbox cmd response: failed
1,627,503 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,627,509 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,286 UART: [kat] SHA2-256
882,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,332 UART: [kat] ++
886,484 UART: [kat] sha1
890,762 UART: [kat] SHA2-256
892,700 UART: [kat] SHA2-384
895,471 UART: [kat] SHA2-512-ACC
897,372 UART: [kat] ECC-384
903,087 UART: [kat] HMAC-384Kdf
907,723 UART: [kat] LMS
1,475,919 UART: [kat] --
1,476,812 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,227 UART: [idev] ++
1,480,395 UART: [idev] CDI.KEYID = 6
1,480,755 UART: [idev] SUBJECT.KEYID = 7
1,481,179 UART: [idev] UDS.KEYID = 0
1,481,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,321 UART: [idev] Erasing UDS.KEYID = 0
1,506,237 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,843 UART: [idev] --
1,515,898 UART: [ldev] ++
1,516,066 UART: [ldev] CDI.KEYID = 6
1,516,429 UART: [ldev] SUBJECT.KEYID = 5
1,516,855 UART: [ldev] AUTHORITY.KEYID = 7
1,517,318 UART: [ldev] FE.KEYID = 1
1,522,688 UART: [ldev] Erasing FE.KEYID = 1
1,547,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,955 UART: [ldev] --
1,587,282 UART: [fwproc] Waiting for Commands...
1,588,067 UART: [fwproc] Received command 0x46574c44
1,588,858 UART: [fwproc] Received Image of size 118548 bytes
2,933,887 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,897 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,115 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,344 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,481,576 >>> mbox cmd response: failed
1,481,576 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,582 >>> mbox cmd response: failed
1,481,582 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,481,588 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,422 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,366 UART: [state] LifecycleState = Unprovisioned
86,021 UART: [state] DebugLocked = No
86,593 UART: [state] WD Timer not started. Device not locked for debugging
87,906 UART: [kat] SHA2-256
891,456 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,560 UART: [kat] ++
895,712 UART: [kat] sha1
900,028 UART: [kat] SHA2-256
901,968 UART: [kat] SHA2-384
904,537 UART: [kat] SHA2-512-ACC
906,438 UART: [kat] ECC-384
916,221 UART: [kat] HMAC-384Kdf
920,971 UART: [kat] LMS
1,169,283 UART: [kat] --
1,170,308 UART: [cold-reset] ++
1,170,878 UART: [fht] FHT @ 0x50003400
1,173,492 UART: [idev] ++
1,173,660 UART: [idev] CDI.KEYID = 6
1,174,021 UART: [idev] SUBJECT.KEYID = 7
1,174,446 UART: [idev] UDS.KEYID = 0
1,174,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,097 UART: [idev] Erasing UDS.KEYID = 0
1,198,919 UART: [idev] Sha1 KeyId Algorithm
1,207,779 UART: [idev] --
1,208,770 UART: [ldev] ++
1,208,938 UART: [ldev] CDI.KEYID = 6
1,209,302 UART: [ldev] SUBJECT.KEYID = 5
1,209,729 UART: [ldev] AUTHORITY.KEYID = 7
1,210,192 UART: [ldev] FE.KEYID = 1
1,215,322 UART: [ldev] Erasing FE.KEYID = 1
1,241,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,277 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,166 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,882 UART: [ldev] --
1,280,099 UART: [fwproc] Wait for Commands...
1,280,830 UART: [fwproc] Recv command 0x46574c44
1,281,563 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,877 UART: ROM Fatal Error: 0x000B001A
1,322,036 >>> mbox cmd response: failed
1,322,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,042 >>> mbox cmd response: failed
1,322,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,048 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,132 UART: [state] LifecycleState = Unprovisioned
85,787 UART: [state] DebugLocked = No
86,395 UART: [state] WD Timer not started. Device not locked for debugging
87,570 UART: [kat] SHA2-256
891,120 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,224 UART: [kat] ++
895,376 UART: [kat] sha1
899,564 UART: [kat] SHA2-256
901,504 UART: [kat] SHA2-384
904,373 UART: [kat] SHA2-512-ACC
906,274 UART: [kat] ECC-384
915,875 UART: [kat] HMAC-384Kdf
920,301 UART: [kat] LMS
1,168,613 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,958 UART: [fht] FHT @ 0x50003400
1,172,672 UART: [idev] ++
1,172,840 UART: [idev] CDI.KEYID = 6
1,173,201 UART: [idev] SUBJECT.KEYID = 7
1,173,626 UART: [idev] UDS.KEYID = 0
1,173,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,649 UART: [idev] Erasing UDS.KEYID = 0
1,199,001 UART: [idev] Sha1 KeyId Algorithm
1,208,013 UART: [idev] --
1,208,998 UART: [ldev] ++
1,209,166 UART: [ldev] CDI.KEYID = 6
1,209,530 UART: [ldev] SUBJECT.KEYID = 5
1,209,957 UART: [ldev] AUTHORITY.KEYID = 7
1,210,420 UART: [ldev] FE.KEYID = 1
1,215,410 UART: [ldev] Erasing FE.KEYID = 1
1,242,033 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,363 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,838 UART: [ldev] --
1,281,145 UART: [fwproc] Wait for Commands...
1,281,754 UART: [fwproc] Recv command 0x46574c44
1,282,487 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,203 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,568 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,102 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,327 >>> mbox cmd response: failed
1,178,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,333 >>> mbox cmd response: failed
1,178,333 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,339 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,433 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
88,035 UART: [kat] SHA2-256
891,585 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,689 UART: [kat] ++
895,841 UART: [kat] sha1
900,123 UART: [kat] SHA2-256
902,063 UART: [kat] SHA2-384
904,762 UART: [kat] SHA2-512-ACC
906,663 UART: [kat] ECC-384
916,594 UART: [kat] HMAC-384Kdf
921,176 UART: [kat] LMS
1,169,488 UART: [kat] --
1,170,341 UART: [cold-reset] ++
1,170,735 UART: [fht] FHT @ 0x50003400
1,173,483 UART: [idev] ++
1,173,651 UART: [idev] CDI.KEYID = 6
1,174,012 UART: [idev] SUBJECT.KEYID = 7
1,174,437 UART: [idev] UDS.KEYID = 0
1,174,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,692 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,761 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,152 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,868 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,757 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,469 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,623 UART: [ldev] --
1,283,014 UART: [fwproc] Wait for Commands...
1,283,797 UART: [fwproc] Recv command 0x46574c44
1,284,530 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,766 UART: ROM Fatal Error: 0x000B001A
1,324,925 >>> mbox cmd response: failed
1,324,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,931 >>> mbox cmd response: failed
1,324,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,937 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
891,307 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,411 UART: [kat] ++
895,563 UART: [kat] sha1
899,849 UART: [kat] SHA2-256
901,789 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,016 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,170,267 UART: [cold-reset] ++
1,170,679 UART: [fht] FHT @ 0x50003400
1,173,449 UART: [idev] ++
1,173,617 UART: [idev] CDI.KEYID = 6
1,173,978 UART: [idev] SUBJECT.KEYID = 7
1,174,403 UART: [idev] UDS.KEYID = 0
1,174,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,204 UART: [idev] Erasing UDS.KEYID = 0
1,199,400 UART: [idev] Sha1 KeyId Algorithm
1,208,268 UART: [idev] --
1,209,311 UART: [ldev] ++
1,209,479 UART: [ldev] CDI.KEYID = 6
1,209,843 UART: [ldev] SUBJECT.KEYID = 5
1,210,270 UART: [ldev] AUTHORITY.KEYID = 7
1,210,733 UART: [ldev] FE.KEYID = 1
1,215,795 UART: [ldev] Erasing FE.KEYID = 1
1,242,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,225 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,369 UART: [ldev] --
1,281,584 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,804 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,056 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,351 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,696 >>> mbox cmd response: failed
1,179,696 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,702 >>> mbox cmd response: failed
1,179,702 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,708 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,708 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
893,268 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,393 UART: [kat] ++
897,545 UART: [kat] sha1
901,841 UART: [kat] SHA2-256
903,781 UART: [kat] SHA2-384
906,556 UART: [kat] SHA2-512-ACC
908,457 UART: [kat] ECC-384
918,104 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,171,753 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,690 UART: [idev] ++
1,174,858 UART: [idev] CDI.KEYID = 6
1,175,218 UART: [idev] SUBJECT.KEYID = 7
1,175,642 UART: [idev] UDS.KEYID = 0
1,175,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,150 UART: [idev] Erasing UDS.KEYID = 0
1,200,519 UART: [idev] Sha1 KeyId Algorithm
1,209,017 UART: [idev] --
1,210,151 UART: [ldev] ++
1,210,319 UART: [ldev] CDI.KEYID = 6
1,210,682 UART: [ldev] SUBJECT.KEYID = 5
1,211,108 UART: [ldev] AUTHORITY.KEYID = 7
1,211,571 UART: [ldev] FE.KEYID = 1
1,216,927 UART: [ldev] Erasing FE.KEYID = 1
1,243,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,819 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,475 UART: [ldev] --
1,282,952 UART: [fwproc] Wait for Commands...
1,283,562 UART: [fwproc] Recv command 0x46574c44
1,284,290 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,512 UART: ROM Fatal Error: 0x000B001A
1,324,671 >>> mbox cmd response: failed
1,324,671 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,677 >>> mbox cmd response: failed
1,324,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,324,683 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,594 UART: [state] LifecycleState = Unprovisioned
86,249 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,130 UART: [kat] SHA2-256
893,780 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,905 UART: [kat] ++
898,057 UART: [kat] sha1
902,235 UART: [kat] SHA2-256
904,175 UART: [kat] SHA2-384
906,888 UART: [kat] SHA2-512-ACC
908,789 UART: [kat] ECC-384
918,564 UART: [kat] HMAC-384Kdf
923,186 UART: [kat] LMS
1,171,514 UART: [kat] --
1,172,521 UART: [cold-reset] ++
1,173,089 UART: [fht] FHT @ 0x50003400
1,175,686 UART: [idev] ++
1,175,854 UART: [idev] CDI.KEYID = 6
1,176,214 UART: [idev] SUBJECT.KEYID = 7
1,176,638 UART: [idev] UDS.KEYID = 0
1,176,983 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,512 UART: [idev] Erasing UDS.KEYID = 0
1,201,501 UART: [idev] Sha1 KeyId Algorithm
1,209,949 UART: [idev] --
1,211,001 UART: [ldev] ++
1,211,169 UART: [ldev] CDI.KEYID = 6
1,211,532 UART: [ldev] SUBJECT.KEYID = 5
1,211,958 UART: [ldev] AUTHORITY.KEYID = 7
1,212,421 UART: [ldev] FE.KEYID = 1
1,217,411 UART: [ldev] Erasing FE.KEYID = 1
1,243,210 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,758 UART: [fwproc] Wait for Commands...
1,283,358 UART: [fwproc] Recv command 0x46574c44
1,284,086 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,023 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,193 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,574 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,326 >>> mbox cmd response: failed
1,178,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,332 >>> mbox cmd response: failed
1,178,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,047 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,533 UART: [state] LifecycleState = Unprovisioned
86,188 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,893 UART: [kat] SHA2-512-ACC
908,794 UART: [kat] ECC-384
918,503 UART: [kat] HMAC-384Kdf
923,191 UART: [kat] LMS
1,171,519 UART: [kat] --
1,172,358 UART: [cold-reset] ++
1,172,858 UART: [fht] FHT @ 0x50003400
1,175,653 UART: [idev] ++
1,175,821 UART: [idev] CDI.KEYID = 6
1,176,181 UART: [idev] SUBJECT.KEYID = 7
1,176,605 UART: [idev] UDS.KEYID = 0
1,176,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,854 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,176 UART: [ldev] ++
1,211,344 UART: [ldev] CDI.KEYID = 6
1,211,707 UART: [ldev] SUBJECT.KEYID = 5
1,212,133 UART: [ldev] AUTHORITY.KEYID = 7
1,212,596 UART: [ldev] FE.KEYID = 1
1,217,712 UART: [ldev] Erasing FE.KEYID = 1
1,243,647 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,388 UART: [ldev] --
1,282,867 UART: [fwproc] Wait for Commands...
1,283,521 UART: [fwproc] Recv command 0x46574c44
1,284,249 UART: [fwproc] Recv'd Img size: 118548 bytes
1,323,905 UART: ROM Fatal Error: 0x000B001A
1,325,064 >>> mbox cmd response: failed
1,325,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,070 >>> mbox cmd response: failed
1,325,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,325,076 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,906 UART: [state] WD Timer not started. Device not locked for debugging
88,149 UART: [kat] SHA2-256
893,799 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,924 UART: [kat] ++
898,076 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,839 UART: [kat] HMAC-384Kdf
923,533 UART: [kat] LMS
1,171,861 UART: [kat] --
1,172,848 UART: [cold-reset] ++
1,173,272 UART: [fht] FHT @ 0x50003400
1,176,041 UART: [idev] ++
1,176,209 UART: [idev] CDI.KEYID = 6
1,176,569 UART: [idev] SUBJECT.KEYID = 7
1,176,993 UART: [idev] UDS.KEYID = 0
1,177,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,881 UART: [idev] Erasing UDS.KEYID = 0
1,202,128 UART: [idev] Sha1 KeyId Algorithm
1,210,658 UART: [idev] --
1,211,800 UART: [ldev] ++
1,211,968 UART: [ldev] CDI.KEYID = 6
1,212,331 UART: [ldev] SUBJECT.KEYID = 5
1,212,757 UART: [ldev] AUTHORITY.KEYID = 7
1,213,220 UART: [ldev] FE.KEYID = 1
1,218,086 UART: [ldev] Erasing FE.KEYID = 1
1,244,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,694 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,410 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,013 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,966 UART: [ldev] --
1,283,341 UART: [fwproc] Wait for Commands...
1,283,957 UART: [fwproc] Recv command 0x46574c44
1,284,685 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,993 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,588 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,758 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,927 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,969 >>> mbox cmd response: failed
1,179,969 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,975 >>> mbox cmd response: failed
1,179,975 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,981 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,888 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,092 writing to cptra_bootfsm_go
3,449,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,388,656 >>> mbox cmd response: failed
11,389,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,389,788 >>> mbox cmd response: failed
11,390,064 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,390,367 >>> mbox cmd response: failed
Initializing fuses
2,063,483 writing to cptra_bootfsm_go
5,489,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,321,071 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,445,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,385,737 >>> mbox cmd response: failed
11,386,346 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,386,696 >>> mbox cmd response: failed
11,386,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,387,283 >>> mbox cmd response: failed
Initializing fuses
2,069,324 writing to cptra_bootfsm_go
5,500,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,169 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,785,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,603,145 >>> mbox cmd response: failed
11,603,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,604,256 >>> mbox cmd response: failed
11,604,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,604,818 >>> mbox cmd response: failed
Initializing fuses
2,060,035 writing to cptra_bootfsm_go
12,031,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,736,442 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
3,778,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,598,830 >>> mbox cmd response: failed
11,599,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,599,750 >>> mbox cmd response: failed
11,600,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,600,318 >>> mbox cmd response: failed
Initializing fuses
2,060,908 writing to cptra_bootfsm_go
12,049,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,756,094 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,451,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,379,337 >>> mbox cmd response: failed
11,379,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,285 >>> mbox cmd response: failed
11,380,567 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,380,861 >>> mbox cmd response: failed
Initializing fuses
2,065,347 writing to cptra_bootfsm_go
5,502,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,327,681 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,449,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,389,167 >>> mbox cmd response: failed
11,390,002 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,390,378 >>> mbox cmd response: failed
11,390,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,390,952 >>> mbox cmd response: failed
Initializing fuses
2,062,735 writing to cptra_bootfsm_go
5,515,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,356,568 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,780,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,601,867 >>> mbox cmd response: failed
11,602,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,602,814 >>> mbox cmd response: failed
11,603,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,603,393 >>> mbox cmd response: failed
Initializing fuses
2,061,265 writing to cptra_bootfsm_go
12,039,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,745,157 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,314 writing to cptra_bootfsm_go
3,789,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,596,247 >>> mbox cmd response: failed
11,596,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,597,166 >>> mbox cmd response: failed
11,597,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,597,751 >>> mbox cmd response: failed
Initializing fuses
2,061,443 writing to cptra_bootfsm_go
12,046,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,779,363 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,079 >>> mbox cmd response: failed
1,201,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,085 >>> mbox cmd response: failed
1,201,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,091 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,426 UART: [state] LifecycleState = Unprovisioned
86,081 UART: [state] DebugLocked = No
86,757 UART: [state] WD Timer not started. Device not locked for debugging
88,006 UART: [kat] SHA2-256
891,556 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,660 UART: [kat] ++
895,812 UART: [kat] sha1
900,104 UART: [kat] SHA2-256
902,044 UART: [kat] SHA2-384
904,823 UART: [kat] SHA2-512-ACC
906,724 UART: [kat] ECC-384
916,801 UART: [kat] HMAC-384Kdf
921,299 UART: [kat] LMS
1,169,611 UART: [kat] --
1,170,512 UART: [cold-reset] ++
1,170,860 UART: [fht] FHT @ 0x50003400
1,173,568 UART: [idev] ++
1,173,736 UART: [idev] CDI.KEYID = 6
1,174,097 UART: [idev] SUBJECT.KEYID = 7
1,174,522 UART: [idev] UDS.KEYID = 0
1,174,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,715 UART: [idev] Erasing UDS.KEYID = 0
1,199,675 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,668 UART: [ldev] ++
1,209,836 UART: [ldev] CDI.KEYID = 6
1,210,200 UART: [ldev] SUBJECT.KEYID = 5
1,210,627 UART: [ldev] AUTHORITY.KEYID = 7
1,211,090 UART: [ldev] FE.KEYID = 1
1,216,148 UART: [ldev] Erasing FE.KEYID = 1
1,242,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,228 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,076 UART: [ldev] --
1,282,285 UART: [fwproc] Wait for Commands...
1,282,928 UART: [fwproc] Recv command 0x46574c44
1,283,661 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,790 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,241 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,335 >>> mbox cmd response: failed
1,203,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,341 >>> mbox cmd response: failed
1,203,341 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,880 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,823 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,612 >>> mbox cmd response: failed
1,203,612 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,618 >>> mbox cmd response: failed
1,203,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,624 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,220 UART: [state] WD Timer not started. Device not locked for debugging
87,573 UART: [kat] SHA2-256
891,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,227 UART: [kat] ++
895,379 UART: [kat] sha1
899,663 UART: [kat] SHA2-256
901,603 UART: [kat] SHA2-384
904,252 UART: [kat] SHA2-512-ACC
906,153 UART: [kat] ECC-384
916,158 UART: [kat] HMAC-384Kdf
920,632 UART: [kat] LMS
1,168,944 UART: [kat] --
1,169,929 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,173,019 UART: [idev] ++
1,173,187 UART: [idev] CDI.KEYID = 6
1,173,548 UART: [idev] SUBJECT.KEYID = 7
1,173,973 UART: [idev] UDS.KEYID = 0
1,174,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,642 UART: [idev] Erasing UDS.KEYID = 0
1,198,142 UART: [idev] Sha1 KeyId Algorithm
1,207,200 UART: [idev] --
1,208,053 UART: [ldev] ++
1,208,221 UART: [ldev] CDI.KEYID = 6
1,208,585 UART: [ldev] SUBJECT.KEYID = 5
1,209,012 UART: [ldev] AUTHORITY.KEYID = 7
1,209,475 UART: [ldev] FE.KEYID = 1
1,214,997 UART: [ldev] Erasing FE.KEYID = 1
1,241,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,768 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,484 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,373 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,085 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,053 UART: [ldev] --
1,281,312 UART: [fwproc] Wait for Commands...
1,282,057 UART: [fwproc] Recv command 0x46574c44
1,282,790 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,874 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,787 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,962 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,203 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,006 >>> mbox cmd response: failed
1,204,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,012 >>> mbox cmd response: failed
1,204,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,018 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,624 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,635 >>> mbox cmd response: failed
1,202,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,641 >>> mbox cmd response: failed
1,202,641 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,647 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,580 UART: [state] LifecycleState = Unprovisioned
86,235 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,052 UART: [kat] SHA2-256
893,702 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,827 UART: [kat] ++
897,979 UART: [kat] sha1
902,337 UART: [kat] SHA2-256
904,277 UART: [kat] SHA2-384
907,076 UART: [kat] SHA2-512-ACC
908,977 UART: [kat] ECC-384
918,938 UART: [kat] HMAC-384Kdf
923,554 UART: [kat] LMS
1,171,882 UART: [kat] --
1,172,911 UART: [cold-reset] ++
1,173,339 UART: [fht] FHT @ 0x50003400
1,176,048 UART: [idev] ++
1,176,216 UART: [idev] CDI.KEYID = 6
1,176,576 UART: [idev] SUBJECT.KEYID = 7
1,177,000 UART: [idev] UDS.KEYID = 0
1,177,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,036 UART: [idev] Erasing UDS.KEYID = 0
1,202,261 UART: [idev] Sha1 KeyId Algorithm
1,210,925 UART: [idev] --
1,212,067 UART: [ldev] ++
1,212,235 UART: [ldev] CDI.KEYID = 6
1,212,598 UART: [ldev] SUBJECT.KEYID = 5
1,213,024 UART: [ldev] AUTHORITY.KEYID = 7
1,213,487 UART: [ldev] FE.KEYID = 1
1,218,597 UART: [ldev] Erasing FE.KEYID = 1
1,245,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,093 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,535 UART: [ldev] --
1,284,826 UART: [fwproc] Wait for Commands...
1,285,444 UART: [fwproc] Recv command 0x46574c44
1,286,172 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,800 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,097 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,267 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,416 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,287 >>> mbox cmd response: failed
1,203,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,293 >>> mbox cmd response: failed
1,203,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,299 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,195 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,222 >>> mbox cmd response: failed
1,204,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,228 >>> mbox cmd response: failed
1,204,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,903 UART: [kat] SHA2-256
893,553 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,678 UART: [kat] ++
897,830 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,461 UART: [kat] HMAC-384Kdf
923,131 UART: [kat] LMS
1,171,459 UART: [kat] --
1,172,472 UART: [cold-reset] ++
1,173,046 UART: [fht] FHT @ 0x50003400
1,175,797 UART: [idev] ++
1,175,965 UART: [idev] CDI.KEYID = 6
1,176,325 UART: [idev] SUBJECT.KEYID = 7
1,176,749 UART: [idev] UDS.KEYID = 0
1,177,094 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,919 UART: [idev] Erasing UDS.KEYID = 0
1,202,946 UART: [idev] Sha1 KeyId Algorithm
1,211,352 UART: [idev] --
1,212,446 UART: [ldev] ++
1,212,614 UART: [ldev] CDI.KEYID = 6
1,212,977 UART: [ldev] SUBJECT.KEYID = 5
1,213,403 UART: [ldev] AUTHORITY.KEYID = 7
1,213,866 UART: [ldev] FE.KEYID = 1
1,219,276 UART: [ldev] Erasing FE.KEYID = 1
1,245,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,696 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,015 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,120 UART: [ldev] --
1,284,475 UART: [fwproc] Wait for Commands...
1,285,281 UART: [fwproc] Recv command 0x46574c44
1,286,009 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,424 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,733 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,202,818 >>> mbox cmd response: failed
1,202,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,824 >>> mbox cmd response: failed
1,202,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,202,830 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,188 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,063 UART:
192,437 UART: Running Caliptra ROM ...
193,559 UART:
193,725 UART: [state] CFI Enabled
262,350 UART: [state] LifecycleState = Unprovisioned
264,287 UART: [state] DebugLocked = No
267,078 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,332 UART: [kat] SHA2-256
442,013 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,487 UART: [kat] ++
453,082 UART: [kat] sha1
464,401 UART: [kat] SHA2-256
467,092 UART: [kat] SHA2-384
473,289 UART: [kat] SHA2-512-ACC
475,632 UART: [kat] ECC-384
2,765,833 UART: [kat] HMAC-384Kdf
2,780,017 UART: [kat] LMS
3,970,326 UART: [kat] --
3,973,965 UART: [cold-reset] ++
3,976,191 UART: [fht] Storing FHT @ 0x50003400
3,989,032 UART: [idev] ++
3,989,606 UART: [idev] CDI.KEYID = 6
3,990,545 UART: [idev] SUBJECT.KEYID = 7
3,991,816 UART: [idev] UDS.KEYID = 0
3,994,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,927 UART: [idev] Erasing UDS.KEYID = 0
7,327,585 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,458 UART: [idev] --
7,353,885 UART: [ldev] ++
7,354,456 UART: [ldev] CDI.KEYID = 6
7,355,433 UART: [ldev] SUBJECT.KEYID = 5
7,356,651 UART: [ldev] AUTHORITY.KEYID = 7
7,357,888 UART: [ldev] FE.KEYID = 1
7,401,902 UART: [ldev] Erasing FE.KEYID = 1
10,741,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,759 UART: [ldev] --
13,116,111 UART: [fwproc] Waiting for Commands...
13,118,858 UART: [fwproc] Received command 0x46574c44
13,121,046 UART: [fwproc] Received Image of size 118548 bytes
20,156,671 UART: ROM Fatal Error: 0x000B0038
20,160,112 >>> mbox cmd response: failed
20,160,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,160,911 >>> mbox cmd response: failed
20,161,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,161,475 >>> mbox cmd response: failed
Initializing fuses
2,059,388 writing to cptra_bootfsm_go
2,248,708 UART:
2,249,069 UART: Running Caliptra ROM ...
2,250,118 UART:
2,250,270 UART: [state] CFI Enabled
2,312,146 UART: [state] LifecycleState = Unprovisioned
2,314,080 UART: [state] DebugLocked = No
2,317,014 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,756 UART: [kat] SHA2-256
2,491,469 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,971 UART: [kat] ++
2,502,435 UART: [kat] sha1
2,514,239 UART: [kat] SHA2-256
2,516,932 UART: [kat] SHA2-384
2,522,007 UART: [kat] SHA2-512-ACC
2,524,381 UART: [kat] ECC-384
4,813,923 UART: [kat] HMAC-384Kdf
4,845,810 UART: [kat] LMS
6,036,098 UART: [kat] --
6,040,125 UART: [cold-reset] ++
6,041,956 UART: [fht] Storing FHT @ 0x50003400
6,053,170 UART: [idev] ++
6,053,744 UART: [idev] CDI.KEYID = 6
6,054,631 UART: [idev] SUBJECT.KEYID = 7
6,055,904 UART: [idev] UDS.KEYID = 0
6,058,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,207,402 UART: [idev] Erasing UDS.KEYID = 0
9,392,847 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,190 UART: [idev] --
9,418,410 UART: [ldev] ++
9,419,014 UART: [ldev] CDI.KEYID = 6
9,419,986 UART: [ldev] SUBJECT.KEYID = 5
9,421,190 UART: [ldev] AUTHORITY.KEYID = 7
9,422,432 UART: [ldev] FE.KEYID = 1
9,469,975 UART: [ldev] Erasing FE.KEYID = 1
12,799,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,108,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,123,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,192 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,652 UART: [ldev] --
15,162,976 UART: [fwproc] Waiting for Commands...
15,165,139 UART: [fwproc] Received command 0x46574c44
15,167,331 UART: [fwproc] Received Image of size 118548 bytes
19,274,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,346,244 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,419,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,880 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,949 writing to cptra_bootfsm_go
3,789,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,438,469 >>> mbox cmd response: failed
19,439,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,439,658 >>> mbox cmd response: failed
19,439,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,440,234 >>> mbox cmd response: failed
Initializing fuses
2,055,711 writing to cptra_bootfsm_go
5,821,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,981,916 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,657 UART:
193,009 UART: Running Caliptra ROM ...
194,206 UART:
603,829 UART: [state] CFI Enabled
619,513 UART: [state] LifecycleState = Unprovisioned
621,410 UART: [state] DebugLocked = No
623,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,393 UART: [kat] SHA2-256
798,163 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,705 UART: [kat] ++
809,192 UART: [kat] sha1
819,211 UART: [kat] SHA2-256
821,952 UART: [kat] SHA2-384
827,281 UART: [kat] SHA2-512-ACC
829,625 UART: [kat] ECC-384
3,113,025 UART: [kat] HMAC-384Kdf
3,125,504 UART: [kat] LMS
4,315,620 UART: [kat] --
4,321,417 UART: [cold-reset] ++
4,323,522 UART: [fht] Storing FHT @ 0x50003400
4,334,952 UART: [idev] ++
4,335,529 UART: [idev] CDI.KEYID = 6
4,336,553 UART: [idev] SUBJECT.KEYID = 7
4,337,742 UART: [idev] UDS.KEYID = 0
4,340,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,528 UART: [idev] Erasing UDS.KEYID = 0
7,626,858 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,845 UART: [idev] --
7,653,688 UART: [ldev] ++
7,654,267 UART: [ldev] CDI.KEYID = 6
7,655,240 UART: [ldev] SUBJECT.KEYID = 5
7,656,470 UART: [ldev] AUTHORITY.KEYID = 7
7,657,637 UART: [ldev] FE.KEYID = 1
7,669,556 UART: [ldev] Erasing FE.KEYID = 1
10,954,891 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,495 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,774 UART: [ldev] --
13,318,370 UART: [fwproc] Waiting for Commands...
13,320,536 UART: [fwproc] Received command 0x46574c44
13,322,730 UART: [fwproc] Received Image of size 118548 bytes
20,678,257 UART: ROM Fatal Error: 0x000B0038
20,681,681 >>> mbox cmd response: failed
20,682,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,682,397 >>> mbox cmd response: failed
20,682,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
20,682,959 >>> mbox cmd response: failed
Initializing fuses
2,059,854 writing to cptra_bootfsm_go
2,249,173 UART:
2,249,540 UART: Running Caliptra ROM ...
2,250,643 UART:
2,660,395 UART: [state] CFI Enabled
2,672,947 UART: [state] LifecycleState = Unprovisioned
2,674,902 UART: [state] DebugLocked = No
2,676,250 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,681,211 UART: [kat] SHA2-256
2,850,980 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,861,514 UART: [kat] ++
2,862,064 UART: [kat] sha1
2,872,863 UART: [kat] SHA2-256
2,875,554 UART: [kat] SHA2-384
2,881,331 UART: [kat] SHA2-512-ACC
2,883,696 UART: [kat] ECC-384
5,166,681 UART: [kat] HMAC-384Kdf
5,178,758 UART: [kat] LMS
6,368,903 UART: [kat] --
6,373,140 UART: [cold-reset] ++
6,374,862 UART: [fht] Storing FHT @ 0x50003400
6,387,811 UART: [idev] ++
6,388,386 UART: [idev] CDI.KEYID = 6
6,389,271 UART: [idev] SUBJECT.KEYID = 7
6,390,545 UART: [idev] UDS.KEYID = 0
6,393,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,541,985 UART: [idev] Erasing UDS.KEYID = 0
9,676,550 UART: [idev] Using Sha1 for KeyId Algorithm
9,698,546 UART: [idev] --
9,701,853 UART: [ldev] ++
9,702,430 UART: [ldev] CDI.KEYID = 6
9,703,353 UART: [ldev] SUBJECT.KEYID = 5
9,704,620 UART: [ldev] AUTHORITY.KEYID = 7
9,705,866 UART: [ldev] FE.KEYID = 1
9,716,750 UART: [ldev] Erasing FE.KEYID = 1
13,006,546 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,298,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,312,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,327,454 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,341,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,361,442 UART: [ldev] --
15,366,394 UART: [fwproc] Waiting for Commands...
15,368,554 UART: [fwproc] Received command 0x46574c44
15,370,750 UART: [fwproc] Received Image of size 118548 bytes
19,478,057 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,557,619 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,630,828 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,959,055 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.25s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,129,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,656,265 >>> mbox cmd response: failed
19,657,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,657,396 >>> mbox cmd response: failed
19,657,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
19,657,971 >>> mbox cmd response: failed
Initializing fuses
2,056,685 writing to cptra_bootfsm_go
6,184,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,216,391 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
192,216 UART:
192,599 UART: Running Caliptra ROM ...
193,723 UART:
193,872 UART: [state] CFI Enabled
265,601 UART: [state] LifecycleState = Unprovisioned
267,539 UART: [state] DebugLocked = No
269,366 UART: [state] WD Timer not started. Device not locked for debugging
274,084 UART: [kat] SHA2-256
453,722 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,524 UART: [kat] ++
465,025 UART: [kat] sha1
476,510 UART: [kat] SHA2-256
479,196 UART: [kat] SHA2-384
484,964 UART: [kat] SHA2-512-ACC
487,363 UART: [kat] ECC-384
2,947,840 UART: [kat] HMAC-384Kdf
2,970,451 UART: [kat] LMS
3,446,929 UART: [kat] --
3,452,121 UART: [cold-reset] ++
3,453,652 UART: [fht] FHT @ 0x50003400
3,466,373 UART: [idev] ++
3,467,004 UART: [idev] CDI.KEYID = 6
3,467,904 UART: [idev] SUBJECT.KEYID = 7
3,469,173 UART: [idev] UDS.KEYID = 0
3,472,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,621,586 UART: [idev] Erasing UDS.KEYID = 0
5,985,787 UART: [idev] Sha1 KeyId Algorithm
6,010,319 UART: [idev] --
6,014,405 UART: [ldev] ++
6,014,998 UART: [ldev] CDI.KEYID = 6
6,015,920 UART: [ldev] SUBJECT.KEYID = 5
6,017,143 UART: [ldev] AUTHORITY.KEYID = 7
6,018,389 UART: [ldev] FE.KEYID = 1
6,057,350 UART: [ldev] Erasing FE.KEYID = 1
8,560,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,999 UART: [ldev] --
10,372,056 UART: [fwproc] Wait for Commands...
10,374,864 UART: [fwproc] Recv command 0x46574c44
10,376,857 UART: [fwproc] Recv'd Img size: 118548 bytes
13,502,078 UART: ROM Fatal Error: 0x000B0038
13,505,328 >>> mbox cmd response: failed
13,505,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,506,100 >>> mbox cmd response: failed
13,506,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,506,676 >>> mbox cmd response: failed
Initializing fuses
2,066,341 writing to cptra_bootfsm_go
2,255,621 UART:
2,255,974 UART: Running Caliptra ROM ...
2,257,027 UART:
2,257,189 UART: [state] CFI Enabled
2,323,325 UART: [state] LifecycleState = Unprovisioned
2,325,264 UART: [state] DebugLocked = No
2,326,842 UART: [state] WD Timer not started. Device not locked for debugging
2,331,455 UART: [kat] SHA2-256
2,511,097 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,876 UART: [kat] ++
2,522,544 UART: [kat] sha1
2,533,336 UART: [kat] SHA2-256
2,536,002 UART: [kat] SHA2-384
2,540,872 UART: [kat] SHA2-512-ACC
2,543,280 UART: [kat] ECC-384
4,987,486 UART: [kat] HMAC-384Kdf
5,009,717 UART: [kat] LMS
5,486,205 UART: [kat] --
5,490,788 UART: [cold-reset] ++
5,493,050 UART: [fht] FHT @ 0x50003400
5,502,845 UART: [idev] ++
5,503,419 UART: [idev] CDI.KEYID = 6
5,504,400 UART: [idev] SUBJECT.KEYID = 7
5,505,621 UART: [idev] UDS.KEYID = 0
5,508,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,657,651 UART: [idev] Erasing UDS.KEYID = 0
8,028,646 UART: [idev] Sha1 KeyId Algorithm
8,051,036 UART: [idev] --
8,057,275 UART: [ldev] ++
8,057,858 UART: [ldev] CDI.KEYID = 6
8,058,779 UART: [ldev] SUBJECT.KEYID = 5
8,060,002 UART: [ldev] AUTHORITY.KEYID = 7
8,061,245 UART: [ldev] FE.KEYID = 1
8,096,094 UART: [ldev] Erasing FE.KEYID = 1
10,606,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,338,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,354,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,370,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,385,756 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,406,938 UART: [ldev] --
12,411,561 UART: [fwproc] Wait for Commands...
12,413,401 UART: [fwproc] Recv command 0x46574c44
12,415,398 UART: [fwproc] Recv'd Img size: 118548 bytes
15,902,595 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,151 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,171 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,385,963 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,989 writing to cptra_bootfsm_go
3,463,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,442,724 >>> mbox cmd response: failed
13,443,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,443,719 >>> mbox cmd response: failed
13,443,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,444,291 >>> mbox cmd response: failed
Initializing fuses
2,060,258 writing to cptra_bootfsm_go
5,504,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,269,970 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
192,414 UART:
192,773 UART: Running Caliptra ROM ...
193,878 UART:
603,455 UART: [state] CFI Enabled
616,593 UART: [state] LifecycleState = Unprovisioned
618,506 UART: [state] DebugLocked = No
621,299 UART: [state] WD Timer not started. Device not locked for debugging
624,847 UART: [kat] SHA2-256
804,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,297 UART: [kat] ++
815,787 UART: [kat] sha1
826,182 UART: [kat] SHA2-256
828,865 UART: [kat] SHA2-384
834,413 UART: [kat] SHA2-512-ACC
836,754 UART: [kat] ECC-384
3,280,897 UART: [kat] HMAC-384Kdf
3,293,910 UART: [kat] LMS
3,770,395 UART: [kat] --
3,774,498 UART: [cold-reset] ++
3,776,488 UART: [fht] FHT @ 0x50003400
3,787,306 UART: [idev] ++
3,787,881 UART: [idev] CDI.KEYID = 6
3,788,902 UART: [idev] SUBJECT.KEYID = 7
3,790,086 UART: [idev] UDS.KEYID = 0
3,793,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,209 UART: [idev] Erasing UDS.KEYID = 0
6,266,453 UART: [idev] Sha1 KeyId Algorithm
6,290,380 UART: [idev] --
6,295,752 UART: [ldev] ++
6,296,337 UART: [ldev] CDI.KEYID = 6
6,297,258 UART: [ldev] SUBJECT.KEYID = 5
6,298,423 UART: [ldev] AUTHORITY.KEYID = 7
6,299,715 UART: [ldev] FE.KEYID = 1
6,312,847 UART: [ldev] Erasing FE.KEYID = 1
8,792,319 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,369 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,128 UART: [ldev] --
10,585,134 UART: [fwproc] Wait for Commands...
10,587,022 UART: [fwproc] Recv command 0x46574c44
10,589,069 UART: [fwproc] Recv'd Img size: 118548 bytes
13,724,914 UART: ROM Fatal Error: 0x000B0038
13,728,157 >>> mbox cmd response: failed
13,728,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,728,932 >>> mbox cmd response: failed
13,729,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,729,504 >>> mbox cmd response: failed
Initializing fuses
2,054,496 writing to cptra_bootfsm_go
2,243,814 UART:
2,244,178 UART: Running Caliptra ROM ...
2,245,320 UART:
6,742,826 UART: [state] CFI Enabled
6,758,336 UART: [state] LifecycleState = Unprovisioned
6,760,261 UART: [state] DebugLocked = No
6,761,709 UART: [state] WD Timer not started. Device not locked for debugging
6,766,166 UART: [kat] SHA2-256
6,945,800 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,956,573 UART: [kat] ++
6,957,087 UART: [kat] sha1
6,968,573 UART: [kat] SHA2-256
6,971,266 UART: [kat] SHA2-384
6,977,792 UART: [kat] SHA2-512-ACC
6,980,200 UART: [kat] ECC-384
9,422,229 UART: [kat] HMAC-384Kdf
9,435,798 UART: [kat] LMS
9,912,312 UART: [kat] --
9,915,330 UART: [cold-reset] ++
9,917,278 UART: [fht] FHT @ 0x50003400
9,928,804 UART: [idev] ++
9,929,373 UART: [idev] CDI.KEYID = 6
9,930,342 UART: [idev] SUBJECT.KEYID = 7
9,931,563 UART: [idev] UDS.KEYID = 0
9,934,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,083,736 UART: [idev] Erasing UDS.KEYID = 0
12,405,219 UART: [idev] Sha1 KeyId Algorithm
12,430,016 UART: [idev] --
12,435,261 UART: [ldev] ++
12,435,836 UART: [ldev] CDI.KEYID = 6
12,436,749 UART: [ldev] SUBJECT.KEYID = 5
12,437,965 UART: [ldev] AUTHORITY.KEYID = 7
12,439,252 UART: [ldev] FE.KEYID = 1
12,450,294 UART: [ldev] Erasing FE.KEYID = 1
14,926,446 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,645,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,661,735 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,677,570 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,693,168 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,714,059 UART: [ldev] --
16,720,231 UART: [fwproc] Wait for Commands...
16,721,856 UART: [fwproc] Recv command 0x46574c44
16,723,856 UART: [fwproc] Recv'd Img size: 118548 bytes
20,205,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,281,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,354,600 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,682,983 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,829 writing to cptra_bootfsm_go
3,784,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,701,447 >>> mbox cmd response: failed
13,702,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,702,427 >>> mbox cmd response: failed
13,702,698 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,702,989 >>> mbox cmd response: failed
Initializing fuses
2,055,159 writing to cptra_bootfsm_go
9,950,540 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,614,345 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,060 writing to cptra_bootfsm_go
192,322 UART:
192,681 UART: Running Caliptra ROM ...
193,862 UART:
194,018 UART: [state] CFI Enabled
264,962 UART: [state] LifecycleState = Unprovisioned
267,325 UART: [state] DebugLocked = No
269,312 UART: [state] WD Timer not started. Device not locked for debugging
273,541 UART: [kat] SHA2-256
463,406 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,153 UART: [kat] ++
474,610 UART: [kat] sha1
486,219 UART: [kat] SHA2-256
489,234 UART: [kat] SHA2-384
495,774 UART: [kat] SHA2-512-ACC
498,349 UART: [kat] ECC-384
2,949,103 UART: [kat] HMAC-384Kdf
2,970,509 UART: [kat] LMS
3,502,318 UART: [kat] --
3,507,448 UART: [cold-reset] ++
3,509,171 UART: [fht] FHT @ 0x50003400
3,521,289 UART: [idev] ++
3,522,014 UART: [idev] CDI.KEYID = 6
3,522,943 UART: [idev] SUBJECT.KEYID = 7
3,524,163 UART: [idev] UDS.KEYID = 0
3,526,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,986 UART: [idev] Erasing UDS.KEYID = 0
6,025,146 UART: [idev] Sha1 KeyId Algorithm
6,047,127 UART: [idev] --
6,052,216 UART: [ldev] ++
6,052,903 UART: [ldev] CDI.KEYID = 6
6,053,820 UART: [ldev] SUBJECT.KEYID = 5
6,054,991 UART: [ldev] AUTHORITY.KEYID = 7
6,056,236 UART: [ldev] FE.KEYID = 1
6,099,898 UART: [ldev] Erasing FE.KEYID = 1
8,609,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,183 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,166 UART: [ldev] --
10,411,803 UART: [fwproc] Wait for Commands...
10,414,502 UART: [fwproc] Recv command 0x46574c44
10,416,829 UART: [fwproc] Recv'd Img size: 118548 bytes
13,660,697 UART: ROM Fatal Error: 0x000B0038
13,664,150 >>> mbox cmd response: failed
13,664,573 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,664,906 >>> mbox cmd response: failed
13,665,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,665,482 >>> mbox cmd response: failed
Initializing fuses
2,054,332 writing to cptra_bootfsm_go
2,243,676 UART:
2,244,029 UART: Running Caliptra ROM ...
2,245,171 UART:
2,245,338 UART: [state] CFI Enabled
2,315,192 UART: [state] LifecycleState = Unprovisioned
2,317,589 UART: [state] DebugLocked = No
2,320,129 UART: [state] WD Timer not started. Device not locked for debugging
2,325,557 UART: [kat] SHA2-256
2,515,433 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,526,216 UART: [kat] ++
2,526,710 UART: [kat] sha1
2,538,887 UART: [kat] SHA2-256
2,541,871 UART: [kat] SHA2-384
2,547,874 UART: [kat] SHA2-512-ACC
2,550,443 UART: [kat] ECC-384
5,003,001 UART: [kat] HMAC-384Kdf
5,024,057 UART: [kat] LMS
5,555,784 UART: [kat] --
5,559,780 UART: [cold-reset] ++
5,561,453 UART: [fht] FHT @ 0x50003400
5,572,337 UART: [idev] ++
5,573,037 UART: [idev] CDI.KEYID = 6
5,573,956 UART: [idev] SUBJECT.KEYID = 7
5,575,177 UART: [idev] UDS.KEYID = 0
5,577,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,726,975 UART: [idev] Erasing UDS.KEYID = 0
8,082,452 UART: [idev] Sha1 KeyId Algorithm
8,104,785 UART: [idev] --
8,110,542 UART: [ldev] ++
8,111,239 UART: [ldev] CDI.KEYID = 6
8,112,128 UART: [ldev] SUBJECT.KEYID = 5
8,113,287 UART: [ldev] AUTHORITY.KEYID = 7
8,114,521 UART: [ldev] FE.KEYID = 1
8,145,425 UART: [ldev] Erasing FE.KEYID = 1
10,652,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,242 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,409 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,518 UART: [ldev] --
12,458,221 UART: [fwproc] Wait for Commands...
12,460,052 UART: [fwproc] Recv command 0x46574c44
12,462,370 UART: [fwproc] Recv'd Img size: 118548 bytes
15,967,762 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,051,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,175,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,639 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,916 writing to cptra_bootfsm_go
3,438,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,373,814 >>> mbox cmd response: failed
13,374,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,374,789 >>> mbox cmd response: failed
13,375,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,375,365 >>> mbox cmd response: failed
Initializing fuses
2,049,176 writing to cptra_bootfsm_go
5,484,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,868,174 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,561 UART:
192,926 UART: Running Caliptra ROM ...
194,056 UART:
603,746 UART: [state] CFI Enabled
616,285 UART: [state] LifecycleState = Unprovisioned
618,682 UART: [state] DebugLocked = No
621,576 UART: [state] WD Timer not started. Device not locked for debugging
625,544 UART: [kat] SHA2-256
815,397 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,183 UART: [kat] ++
826,782 UART: [kat] sha1
839,509 UART: [kat] SHA2-256
842,530 UART: [kat] SHA2-384
849,329 UART: [kat] SHA2-512-ACC
851,951 UART: [kat] ECC-384
3,292,473 UART: [kat] HMAC-384Kdf
3,305,444 UART: [kat] LMS
3,837,246 UART: [kat] --
3,842,560 UART: [cold-reset] ++
3,844,067 UART: [fht] FHT @ 0x50003400
3,855,768 UART: [idev] ++
3,856,488 UART: [idev] CDI.KEYID = 6
3,857,408 UART: [idev] SUBJECT.KEYID = 7
3,858,643 UART: [idev] UDS.KEYID = 0
3,861,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,414 UART: [idev] Erasing UDS.KEYID = 0
6,338,840 UART: [idev] Sha1 KeyId Algorithm
6,360,406 UART: [idev] --
6,364,140 UART: [ldev] ++
6,364,829 UART: [ldev] CDI.KEYID = 6
6,365,744 UART: [ldev] SUBJECT.KEYID = 5
6,366,965 UART: [ldev] AUTHORITY.KEYID = 7
6,368,150 UART: [ldev] FE.KEYID = 1
6,380,203 UART: [ldev] Erasing FE.KEYID = 1
8,859,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,480 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,204 UART: [ldev] --
10,648,525 UART: [fwproc] Wait for Commands...
10,650,427 UART: [fwproc] Recv command 0x46574c44
10,652,754 UART: [fwproc] Recv'd Img size: 118548 bytes
13,896,663 UART: ROM Fatal Error: 0x000B0038
13,900,113 >>> mbox cmd response: failed
13,900,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,900,784 >>> mbox cmd response: failed
13,901,094 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,901,403 >>> mbox cmd response: failed
Initializing fuses
2,057,213 writing to cptra_bootfsm_go
2,246,545 UART:
2,246,901 UART: Running Caliptra ROM ...
2,248,139 UART:
6,568,438 UART: [state] CFI Enabled
6,582,510 UART: [state] LifecycleState = Unprovisioned
6,584,869 UART: [state] DebugLocked = No
6,586,867 UART: [state] WD Timer not started. Device not locked for debugging
6,591,467 UART: [kat] SHA2-256
6,781,312 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,792,121 UART: [kat] ++
6,792,642 UART: [kat] sha1
6,804,617 UART: [kat] SHA2-256
6,807,647 UART: [kat] SHA2-384
6,813,913 UART: [kat] SHA2-512-ACC
6,816,541 UART: [kat] ECC-384
9,256,739 UART: [kat] HMAC-384Kdf
9,270,486 UART: [kat] LMS
9,802,300 UART: [kat] --
9,807,700 UART: [cold-reset] ++
9,808,684 UART: [fht] FHT @ 0x50003400
9,821,513 UART: [idev] ++
9,822,203 UART: [idev] CDI.KEYID = 6
9,823,223 UART: [idev] SUBJECT.KEYID = 7
9,824,386 UART: [idev] UDS.KEYID = 0
9,826,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,975,734 UART: [idev] Erasing UDS.KEYID = 0
12,303,517 UART: [idev] Sha1 KeyId Algorithm
12,326,044 UART: [idev] --
12,330,357 UART: [ldev] ++
12,331,037 UART: [ldev] CDI.KEYID = 6
12,331,951 UART: [ldev] SUBJECT.KEYID = 5
12,333,111 UART: [ldev] AUTHORITY.KEYID = 7
12,334,345 UART: [ldev] FE.KEYID = 1
12,346,128 UART: [ldev] Erasing FE.KEYID = 1
14,825,751 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,545,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,560,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,575,462 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,590,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,611,555 UART: [ldev] --
16,617,006 UART: [fwproc] Wait for Commands...
16,619,176 UART: [fwproc] Recv command 0x46574c44
16,621,502 UART: [fwproc] Recv'd Img size: 118548 bytes
20,114,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
20,189,976 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,313,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,873,743 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,286 writing to cptra_bootfsm_go
3,762,388 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,595,905 >>> mbox cmd response: failed
13,596,562 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,596,925 >>> mbox cmd response: failed
13,597,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,597,498 >>> mbox cmd response: failed
Initializing fuses
2,053,292 writing to cptra_bootfsm_go
10,033,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,320,587 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,191 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,331 UART: [kat] SHA2-256
892,269 UART: [kat] SHA2-384
895,206 UART: [kat] SHA2-512-ACC
897,107 UART: [kat] ECC-384
902,830 UART: [kat] HMAC-384Kdf
907,528 UART: [kat] LMS
1,475,724 UART: [kat] --
1,476,769 UART: [cold-reset] ++
1,477,195 UART: [fht] Storing FHT @ 0x50003400
1,479,844 UART: [idev] ++
1,480,012 UART: [idev] CDI.KEYID = 6
1,480,372 UART: [idev] SUBJECT.KEYID = 7
1,480,796 UART: [idev] UDS.KEYID = 0
1,481,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,262 UART: [idev] Erasing UDS.KEYID = 0
1,504,712 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,292 UART: [idev] --
1,514,415 UART: [ldev] ++
1,514,583 UART: [ldev] CDI.KEYID = 6
1,514,946 UART: [ldev] SUBJECT.KEYID = 5
1,515,372 UART: [ldev] AUTHORITY.KEYID = 7
1,515,835 UART: [ldev] FE.KEYID = 1
1,521,135 UART: [ldev] Erasing FE.KEYID = 1
1,546,548 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,470 UART: [ldev] --
1,585,951 UART: [fwproc] Waiting for Commands...
1,586,628 UART: [fwproc] Received command 0x46574c44
1,587,419 UART: [fwproc] Received Image of size 118548 bytes
3,751,547 UART: ROM Fatal Error: 0x000B0038
3,752,704 >>> mbox cmd response: failed
3,752,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,752,710 >>> mbox cmd response: failed
3,752,710 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,752,716 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,929 UART: [kat] SHA2-256
881,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,975 UART: [kat] ++
886,127 UART: [kat] sha1
890,565 UART: [kat] SHA2-256
892,503 UART: [kat] SHA2-384
895,098 UART: [kat] SHA2-512-ACC
896,999 UART: [kat] ECC-384
902,730 UART: [kat] HMAC-384Kdf
907,536 UART: [kat] LMS
1,475,732 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,975 UART: [fht] Storing FHT @ 0x50003400
1,479,762 UART: [idev] ++
1,479,930 UART: [idev] CDI.KEYID = 6
1,480,290 UART: [idev] SUBJECT.KEYID = 7
1,480,714 UART: [idev] UDS.KEYID = 0
1,481,059 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,928 UART: [idev] Erasing UDS.KEYID = 0
1,505,288 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,944 UART: [idev] --
1,514,903 UART: [ldev] ++
1,515,071 UART: [ldev] CDI.KEYID = 6
1,515,434 UART: [ldev] SUBJECT.KEYID = 5
1,515,860 UART: [ldev] AUTHORITY.KEYID = 7
1,516,323 UART: [ldev] FE.KEYID = 1
1,521,355 UART: [ldev] Erasing FE.KEYID = 1
1,546,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,993 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,596 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,658 UART: [ldev] --
1,585,929 UART: [fwproc] Waiting for Commands...
1,586,612 UART: [fwproc] Received command 0x46574c44
1,587,403 UART: [fwproc] Received Image of size 118548 bytes
2,932,788 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,574 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,073 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,755,933 >>> mbox cmd response: failed
3,755,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,755,939 >>> mbox cmd response: failed
3,755,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,755,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,619 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,114 UART: [kat] SHA2-256
882,045 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,160 UART: [kat] ++
886,312 UART: [kat] sha1
890,384 UART: [kat] SHA2-256
892,322 UART: [kat] SHA2-384
894,971 UART: [kat] SHA2-512-ACC
896,872 UART: [kat] ECC-384
902,525 UART: [kat] HMAC-384Kdf
906,965 UART: [kat] LMS
1,475,161 UART: [kat] --
1,476,010 UART: [cold-reset] ++
1,476,530 UART: [fht] Storing FHT @ 0x50003400
1,479,413 UART: [idev] ++
1,479,581 UART: [idev] CDI.KEYID = 6
1,479,941 UART: [idev] SUBJECT.KEYID = 7
1,480,365 UART: [idev] UDS.KEYID = 0
1,480,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,051 UART: [idev] Erasing UDS.KEYID = 0
1,504,825 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,317 UART: [idev] --
1,514,230 UART: [ldev] ++
1,514,398 UART: [ldev] CDI.KEYID = 6
1,514,761 UART: [ldev] SUBJECT.KEYID = 5
1,515,187 UART: [ldev] AUTHORITY.KEYID = 7
1,515,650 UART: [ldev] FE.KEYID = 1
1,520,996 UART: [ldev] Erasing FE.KEYID = 1
1,546,607 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,633 UART: [ldev] --
1,585,954 UART: [fwproc] Waiting for Commands...
1,586,589 UART: [fwproc] Received command 0x46574c44
1,587,380 UART: [fwproc] Received Image of size 118548 bytes
3,826,928 UART: ROM Fatal Error: 0x000B0038
3,828,085 >>> mbox cmd response: failed
3,828,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,828,091 >>> mbox cmd response: failed
3,828,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,828,097 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,326 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,010 UART: [kat] SHA2-256
881,941 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,056 UART: [kat] ++
886,208 UART: [kat] sha1
890,402 UART: [kat] SHA2-256
892,340 UART: [kat] SHA2-384
895,089 UART: [kat] SHA2-512-ACC
896,990 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,399 UART: [kat] LMS
1,475,595 UART: [kat] --
1,476,518 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,867 UART: [idev] ++
1,480,035 UART: [idev] CDI.KEYID = 6
1,480,395 UART: [idev] SUBJECT.KEYID = 7
1,480,819 UART: [idev] UDS.KEYID = 0
1,481,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,133 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,421 UART: [idev] --
1,515,316 UART: [ldev] ++
1,515,484 UART: [ldev] CDI.KEYID = 6
1,515,847 UART: [ldev] SUBJECT.KEYID = 5
1,516,273 UART: [ldev] AUTHORITY.KEYID = 7
1,516,736 UART: [ldev] FE.KEYID = 1
1,522,022 UART: [ldev] Erasing FE.KEYID = 1
1,547,507 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,960 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,851 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,647 UART: [ldev] --
1,586,998 UART: [fwproc] Waiting for Commands...
1,587,859 UART: [fwproc] Received command 0x46574c44
1,588,650 UART: [fwproc] Received Image of size 118548 bytes
2,933,485 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,555 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,112 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,794,847 >>> mbox cmd response: failed
3,794,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,794,853 >>> mbox cmd response: failed
3,794,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,794,859 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,062 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,356 UART: [state] LifecycleState = Unprovisioned
86,011 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,918 UART: [kat] SHA2-256
891,468 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,572 UART: [kat] ++
895,724 UART: [kat] sha1
899,942 UART: [kat] SHA2-256
901,882 UART: [kat] SHA2-384
904,541 UART: [kat] SHA2-512-ACC
906,442 UART: [kat] ECC-384
916,363 UART: [kat] HMAC-384Kdf
920,859 UART: [kat] LMS
1,169,171 UART: [kat] --
1,170,006 UART: [cold-reset] ++
1,170,544 UART: [fht] FHT @ 0x50003400
1,173,304 UART: [idev] ++
1,173,472 UART: [idev] CDI.KEYID = 6
1,173,833 UART: [idev] SUBJECT.KEYID = 7
1,174,258 UART: [idev] UDS.KEYID = 0
1,174,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,449 UART: [idev] Erasing UDS.KEYID = 0
1,199,355 UART: [idev] Sha1 KeyId Algorithm
1,208,099 UART: [idev] --
1,209,032 UART: [ldev] ++
1,209,200 UART: [ldev] CDI.KEYID = 6
1,209,564 UART: [ldev] SUBJECT.KEYID = 5
1,209,991 UART: [ldev] AUTHORITY.KEYID = 7
1,210,454 UART: [ldev] FE.KEYID = 1
1,215,808 UART: [ldev] Erasing FE.KEYID = 1
1,242,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,584 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,578 UART: [ldev] --
1,282,011 UART: [fwproc] Wait for Commands...
1,282,818 UART: [fwproc] Recv command 0x46574c44
1,283,551 UART: [fwproc] Recv'd Img size: 118548 bytes
1,853,682 UART: ROM Fatal Error: 0x000B0038
1,854,839 >>> mbox cmd response: failed
1,854,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,845 >>> mbox cmd response: failed
1,854,845 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,854,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,032 UART: [state] LifecycleState = Unprovisioned
85,687 UART: [state] DebugLocked = No
86,351 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,726 UART: [kat] SHA2-256
901,666 UART: [kat] SHA2-384
904,327 UART: [kat] SHA2-512-ACC
906,228 UART: [kat] ECC-384
915,615 UART: [kat] HMAC-384Kdf
920,341 UART: [kat] LMS
1,168,653 UART: [kat] --
1,169,706 UART: [cold-reset] ++
1,170,274 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,475 UART: [idev] Erasing UDS.KEYID = 0
1,198,201 UART: [idev] Sha1 KeyId Algorithm
1,207,087 UART: [idev] --
1,208,006 UART: [ldev] ++
1,208,174 UART: [ldev] CDI.KEYID = 6
1,208,538 UART: [ldev] SUBJECT.KEYID = 5
1,208,965 UART: [ldev] AUTHORITY.KEYID = 7
1,209,428 UART: [ldev] FE.KEYID = 1
1,214,784 UART: [ldev] Erasing FE.KEYID = 1
1,241,443 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,507 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,124 UART: [ldev] --
1,280,499 UART: [fwproc] Wait for Commands...
1,281,124 UART: [fwproc] Recv command 0x46574c44
1,281,857 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,181 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,537 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,772 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,722,108 >>> mbox cmd response: failed
1,722,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,114 >>> mbox cmd response: failed
1,722,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,722,120 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,397 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,601 UART: [state] LifecycleState = Unprovisioned
86,256 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,345 UART: [kat] SHA2-256
891,895 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,999 UART: [kat] ++
896,151 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
904,888 UART: [kat] SHA2-512-ACC
906,789 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,146 UART: [kat] LMS
1,169,458 UART: [kat] --
1,170,423 UART: [cold-reset] ++
1,170,813 UART: [fht] FHT @ 0x50003400
1,173,477 UART: [idev] ++
1,173,645 UART: [idev] CDI.KEYID = 6
1,174,006 UART: [idev] SUBJECT.KEYID = 7
1,174,431 UART: [idev] UDS.KEYID = 0
1,174,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,184 UART: [idev] Sha1 KeyId Algorithm
1,208,144 UART: [idev] --
1,209,273 UART: [ldev] ++
1,209,441 UART: [ldev] CDI.KEYID = 6
1,209,805 UART: [ldev] SUBJECT.KEYID = 5
1,210,232 UART: [ldev] AUTHORITY.KEYID = 7
1,210,695 UART: [ldev] FE.KEYID = 1
1,216,269 UART: [ldev] Erasing FE.KEYID = 1
1,242,796 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,212 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,101 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,813 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,939 UART: [ldev] --
1,282,358 UART: [fwproc] Wait for Commands...
1,282,971 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 118548 bytes
1,864,909 UART: ROM Fatal Error: 0x000B0038
1,866,066 >>> mbox cmd response: failed
1,866,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,072 >>> mbox cmd response: failed
1,866,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,866,078 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,566 UART: [state] WD Timer not started. Device not locked for debugging
87,881 UART: [kat] SHA2-256
891,431 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,535 UART: [kat] ++
895,687 UART: [kat] sha1
899,761 UART: [kat] SHA2-256
901,701 UART: [kat] SHA2-384
904,534 UART: [kat] SHA2-512-ACC
906,435 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,726 UART: [kat] LMS
1,169,038 UART: [kat] --
1,169,879 UART: [cold-reset] ++
1,170,289 UART: [fht] FHT @ 0x50003400
1,172,917 UART: [idev] ++
1,173,085 UART: [idev] CDI.KEYID = 6
1,173,446 UART: [idev] SUBJECT.KEYID = 7
1,173,871 UART: [idev] UDS.KEYID = 0
1,174,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,846 UART: [idev] Erasing UDS.KEYID = 0
1,198,908 UART: [idev] Sha1 KeyId Algorithm
1,207,604 UART: [idev] --
1,208,713 UART: [ldev] ++
1,208,881 UART: [ldev] CDI.KEYID = 6
1,209,245 UART: [ldev] SUBJECT.KEYID = 5
1,209,672 UART: [ldev] AUTHORITY.KEYID = 7
1,210,135 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,241,518 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,634 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,239 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,951 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,115 UART: [ldev] --
1,281,388 UART: [fwproc] Wait for Commands...
1,282,125 UART: [fwproc] Recv command 0x46574c44
1,282,858 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,584 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,363 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,538 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,781 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,720,647 >>> mbox cmd response: failed
1,720,647 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,653 >>> mbox cmd response: failed
1,720,653 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,720,659 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,484 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
902,025 UART: [kat] SHA2-256
903,965 UART: [kat] SHA2-384
906,746 UART: [kat] SHA2-512-ACC
908,647 UART: [kat] ECC-384
918,330 UART: [kat] HMAC-384Kdf
923,004 UART: [kat] LMS
1,171,332 UART: [kat] --
1,172,103 UART: [cold-reset] ++
1,172,433 UART: [fht] FHT @ 0x50003400
1,175,006 UART: [idev] ++
1,175,174 UART: [idev] CDI.KEYID = 6
1,175,534 UART: [idev] SUBJECT.KEYID = 7
1,175,958 UART: [idev] UDS.KEYID = 0
1,176,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,894 UART: [idev] Erasing UDS.KEYID = 0
1,200,675 UART: [idev] Sha1 KeyId Algorithm
1,209,019 UART: [idev] --
1,209,973 UART: [ldev] ++
1,210,141 UART: [ldev] CDI.KEYID = 6
1,210,504 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,242,612 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,781 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,388 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,100 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,249 UART: [ldev] --
1,281,588 UART: [fwproc] Wait for Commands...
1,282,222 UART: [fwproc] Recv command 0x46574c44
1,282,950 UART: [fwproc] Recv'd Img size: 118548 bytes
1,881,297 UART: ROM Fatal Error: 0x000B0038
1,882,454 >>> mbox cmd response: failed
1,882,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,460 >>> mbox cmd response: failed
1,882,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,310 UART: [state] LifecycleState = Unprovisioned
85,965 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
893,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,695 UART: [kat] ++
897,847 UART: [kat] sha1
902,083 UART: [kat] SHA2-256
904,023 UART: [kat] SHA2-384
906,760 UART: [kat] SHA2-512-ACC
908,661 UART: [kat] ECC-384
918,148 UART: [kat] HMAC-384Kdf
922,804 UART: [kat] LMS
1,171,132 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,167 UART: [fht] FHT @ 0x50003400
1,174,690 UART: [idev] ++
1,174,858 UART: [idev] CDI.KEYID = 6
1,175,218 UART: [idev] SUBJECT.KEYID = 7
1,175,642 UART: [idev] UDS.KEYID = 0
1,175,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,851 UART: [idev] Sha1 KeyId Algorithm
1,209,329 UART: [idev] --
1,210,401 UART: [ldev] ++
1,210,569 UART: [ldev] CDI.KEYID = 6
1,210,932 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,216,873 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,095 UART: [ldev] --
1,282,542 UART: [fwproc] Wait for Commands...
1,283,290 UART: [fwproc] Recv command 0x46574c44
1,284,018 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,624 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,609 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,779 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,122 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,725,150 >>> mbox cmd response: failed
1,725,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,725,156 >>> mbox cmd response: failed
1,725,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,725,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,057 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,843 UART: [state] LifecycleState = Unprovisioned
86,498 UART: [state] DebugLocked = No
87,216 UART: [state] WD Timer not started. Device not locked for debugging
88,483 UART: [kat] SHA2-256
894,133 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,258 UART: [kat] ++
898,410 UART: [kat] sha1
902,602 UART: [kat] SHA2-256
904,542 UART: [kat] SHA2-384
907,355 UART: [kat] SHA2-512-ACC
909,256 UART: [kat] ECC-384
918,783 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,858 UART: [fht] FHT @ 0x50003400
1,175,407 UART: [idev] ++
1,175,575 UART: [idev] CDI.KEYID = 6
1,175,935 UART: [idev] SUBJECT.KEYID = 7
1,176,359 UART: [idev] UDS.KEYID = 0
1,176,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,063 UART: [idev] Erasing UDS.KEYID = 0
1,201,662 UART: [idev] Sha1 KeyId Algorithm
1,210,352 UART: [idev] --
1,211,406 UART: [ldev] ++
1,211,574 UART: [ldev] CDI.KEYID = 6
1,211,937 UART: [ldev] SUBJECT.KEYID = 5
1,212,363 UART: [ldev] AUTHORITY.KEYID = 7
1,212,826 UART: [ldev] FE.KEYID = 1
1,218,288 UART: [ldev] Erasing FE.KEYID = 1
1,244,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,802 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,470 UART: [ldev] --
1,283,769 UART: [fwproc] Wait for Commands...
1,284,371 UART: [fwproc] Recv command 0x46574c44
1,285,099 UART: [fwproc] Recv'd Img size: 118548 bytes
1,881,081 UART: ROM Fatal Error: 0x000B0038
1,882,238 >>> mbox cmd response: failed
1,882,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,244 >>> mbox cmd response: failed
1,882,244 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,882,250 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,105 UART: [state] LifecycleState = Unprovisioned
85,760 UART: [state] DebugLocked = No
86,358 UART: [state] WD Timer not started. Device not locked for debugging
87,491 UART: [kat] SHA2-256
893,141 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,266 UART: [kat] ++
897,418 UART: [kat] sha1
901,704 UART: [kat] SHA2-256
903,644 UART: [kat] SHA2-384
906,471 UART: [kat] SHA2-512-ACC
908,372 UART: [kat] ECC-384
918,159 UART: [kat] HMAC-384Kdf
922,845 UART: [kat] LMS
1,171,173 UART: [kat] --
1,172,154 UART: [cold-reset] ++
1,172,538 UART: [fht] FHT @ 0x50003400
1,175,085 UART: [idev] ++
1,175,253 UART: [idev] CDI.KEYID = 6
1,175,613 UART: [idev] SUBJECT.KEYID = 7
1,176,037 UART: [idev] UDS.KEYID = 0
1,176,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,755 UART: [idev] Erasing UDS.KEYID = 0
1,200,964 UART: [idev] Sha1 KeyId Algorithm
1,209,398 UART: [idev] --
1,210,376 UART: [ldev] ++
1,210,544 UART: [ldev] CDI.KEYID = 6
1,210,907 UART: [ldev] SUBJECT.KEYID = 5
1,211,333 UART: [ldev] AUTHORITY.KEYID = 7
1,211,796 UART: [ldev] FE.KEYID = 1
1,217,200 UART: [ldev] Erasing FE.KEYID = 1
1,243,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,606 UART: [ldev] --
1,283,101 UART: [fwproc] Wait for Commands...
1,283,813 UART: [fwproc] Recv command 0x46574c44
1,284,541 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,028 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,507 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,739,736 >>> mbox cmd response: failed
1,739,736 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,739,742 >>> mbox cmd response: failed
1,739,742 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,739,748 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,544 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,206 writing to cptra_bootfsm_go
3,443,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,894,584 >>> mbox cmd response: failed
12,895,249 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,895,552 >>> mbox cmd response: failed
12,895,849 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,896,151 >>> mbox cmd response: failed
Initializing fuses
2,054,096 writing to cptra_bootfsm_go
5,501,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,347,647 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
3,447,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,910,244 >>> mbox cmd response: failed
12,910,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,123 >>> mbox cmd response: failed
12,911,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,911,700 >>> mbox cmd response: failed
Initializing fuses
2,062,038 writing to cptra_bootfsm_go
5,510,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,352,341 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,077 writing to cptra_bootfsm_go
3,778,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,142,737 >>> mbox cmd response: failed
13,143,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,143,652 >>> mbox cmd response: failed
13,143,917 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,144,285 >>> mbox cmd response: failed
Initializing fuses
2,055,015 writing to cptra_bootfsm_go
10,496,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,213,636 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,313 writing to cptra_bootfsm_go
3,780,795 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,126,086 >>> mbox cmd response: failed
13,126,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,188 >>> mbox cmd response: failed
13,127,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,762 >>> mbox cmd response: failed
Initializing fuses
2,061,636 writing to cptra_bootfsm_go
10,520,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,229,570 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,449,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,904,459 >>> mbox cmd response: failed
12,905,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,905,538 >>> mbox cmd response: failed
12,905,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,906,115 >>> mbox cmd response: failed
Initializing fuses
2,055,157 writing to cptra_bootfsm_go
5,492,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,347,249 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
3,471,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,914,433 >>> mbox cmd response: failed
12,915,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,915,540 >>> mbox cmd response: failed
12,915,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,916,178 >>> mbox cmd response: failed
Initializing fuses
2,056,244 writing to cptra_bootfsm_go
5,502,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,335,148 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,787,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,131,456 >>> mbox cmd response: failed
13,132,141 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,132,506 >>> mbox cmd response: failed
13,132,801 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,102 >>> mbox cmd response: failed
Initializing fuses
2,062,948 writing to cptra_bootfsm_go
10,515,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,231,129 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,782,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,126,165 >>> mbox cmd response: failed
13,126,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,165 >>> mbox cmd response: failed
13,127,465 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,127,775 >>> mbox cmd response: failed
Initializing fuses
2,056,252 writing to cptra_bootfsm_go
10,518,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,222,527 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,747 >>> mbox cmd response: failed
1,477,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,753 >>> mbox cmd response: failed
1,477,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,169 UART: [state] WD Timer not started. Device not locked for debugging
87,396 UART: [kat] SHA2-256
890,946 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,050 UART: [kat] ++
895,202 UART: [kat] sha1
899,566 UART: [kat] SHA2-256
901,506 UART: [kat] SHA2-384
904,131 UART: [kat] SHA2-512-ACC
906,032 UART: [kat] ECC-384
915,735 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,808 UART: [cold-reset] ++
1,170,240 UART: [fht] FHT @ 0x50003400
1,172,694 UART: [idev] ++
1,172,862 UART: [idev] CDI.KEYID = 6
1,173,223 UART: [idev] SUBJECT.KEYID = 7
1,173,648 UART: [idev] UDS.KEYID = 0
1,173,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,287 UART: [idev] Sha1 KeyId Algorithm
1,206,975 UART: [idev] --
1,208,022 UART: [ldev] ++
1,208,190 UART: [ldev] CDI.KEYID = 6
1,208,554 UART: [ldev] SUBJECT.KEYID = 5
1,208,981 UART: [ldev] AUTHORITY.KEYID = 7
1,209,444 UART: [ldev] FE.KEYID = 1
1,214,550 UART: [ldev] Erasing FE.KEYID = 1
1,240,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,207 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,534 UART: [ldev] --
1,279,815 UART: [fwproc] Wait for Commands...
1,280,384 UART: [fwproc] Recv command 0x46574c44
1,281,117 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,141 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,615 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,836 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,482,454 >>> mbox cmd response: failed
1,482,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,460 >>> mbox cmd response: failed
1,482,460 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,482,466 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,859 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,474,434 >>> mbox cmd response: failed
1,474,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,440 >>> mbox cmd response: failed
1,474,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,474,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,101 UART: [state] LifecycleState = Unprovisioned
85,756 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,655 UART: [kat] SHA2-256
891,205 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,309 UART: [kat] ++
895,461 UART: [kat] sha1
899,825 UART: [kat] SHA2-256
901,765 UART: [kat] SHA2-384
904,428 UART: [kat] SHA2-512-ACC
906,329 UART: [kat] ECC-384
915,910 UART: [kat] HMAC-384Kdf
920,554 UART: [kat] LMS
1,168,866 UART: [kat] --
1,169,779 UART: [cold-reset] ++
1,170,139 UART: [fht] FHT @ 0x50003400
1,172,925 UART: [idev] ++
1,173,093 UART: [idev] CDI.KEYID = 6
1,173,454 UART: [idev] SUBJECT.KEYID = 7
1,173,879 UART: [idev] UDS.KEYID = 0
1,174,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,710 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,556 UART: [idev] --
1,208,555 UART: [ldev] ++
1,208,723 UART: [ldev] CDI.KEYID = 6
1,209,087 UART: [ldev] SUBJECT.KEYID = 5
1,209,514 UART: [ldev] AUTHORITY.KEYID = 7
1,209,977 UART: [ldev] FE.KEYID = 1
1,215,273 UART: [ldev] Erasing FE.KEYID = 1
1,241,760 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,851 UART: [ldev] --
1,281,162 UART: [fwproc] Wait for Commands...
1,281,825 UART: [fwproc] Recv command 0x46574c44
1,282,558 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,284 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,195 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,473,007 >>> mbox cmd response: failed
1,473,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,013 >>> mbox cmd response: failed
1,473,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,473,019 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,022 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,179 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,044 >>> mbox cmd response: failed
1,477,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,050 >>> mbox cmd response: failed
1,477,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,248 UART: [state] LifecycleState = Unprovisioned
85,903 UART: [state] DebugLocked = No
86,445 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
893,234 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,359 UART: [kat] ++
897,511 UART: [kat] sha1
901,561 UART: [kat] SHA2-256
903,501 UART: [kat] SHA2-384
906,362 UART: [kat] SHA2-512-ACC
908,263 UART: [kat] ECC-384
917,516 UART: [kat] HMAC-384Kdf
922,070 UART: [kat] LMS
1,170,398 UART: [kat] --
1,171,101 UART: [cold-reset] ++
1,171,429 UART: [fht] FHT @ 0x50003400
1,174,104 UART: [idev] ++
1,174,272 UART: [idev] CDI.KEYID = 6
1,174,632 UART: [idev] SUBJECT.KEYID = 7
1,175,056 UART: [idev] UDS.KEYID = 0
1,175,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,812 UART: [idev] Erasing UDS.KEYID = 0
1,200,167 UART: [idev] Sha1 KeyId Algorithm
1,208,729 UART: [idev] --
1,209,945 UART: [ldev] ++
1,210,113 UART: [ldev] CDI.KEYID = 6
1,210,476 UART: [ldev] SUBJECT.KEYID = 5
1,210,902 UART: [ldev] AUTHORITY.KEYID = 7
1,211,365 UART: [ldev] FE.KEYID = 1
1,216,287 UART: [ldev] Erasing FE.KEYID = 1
1,242,878 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,563 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,279 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,170 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,882 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,817 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,724 UART: [fwproc] Recv command 0x46574c44
1,283,452 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,517 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,712 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,781 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,242 >>> mbox cmd response: failed
1,476,242 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,248 >>> mbox cmd response: failed
1,476,248 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,254 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,973 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,478,262 >>> mbox cmd response: failed
1,478,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,268 >>> mbox cmd response: failed
1,478,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,478,274 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,188 UART: [state] WD Timer not started. Device not locked for debugging
88,333 UART: [kat] SHA2-256
893,983 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,108 UART: [kat] ++
898,260 UART: [kat] sha1
902,396 UART: [kat] SHA2-256
904,336 UART: [kat] SHA2-384
907,061 UART: [kat] SHA2-512-ACC
908,962 UART: [kat] ECC-384
918,409 UART: [kat] HMAC-384Kdf
923,023 UART: [kat] LMS
1,171,351 UART: [kat] --
1,172,052 UART: [cold-reset] ++
1,172,596 UART: [fht] FHT @ 0x50003400
1,175,045 UART: [idev] ++
1,175,213 UART: [idev] CDI.KEYID = 6
1,175,573 UART: [idev] SUBJECT.KEYID = 7
1,175,997 UART: [idev] UDS.KEYID = 0
1,176,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,787 UART: [idev] Erasing UDS.KEYID = 0
1,200,736 UART: [idev] Sha1 KeyId Algorithm
1,209,394 UART: [idev] --
1,210,596 UART: [ldev] ++
1,210,764 UART: [ldev] CDI.KEYID = 6
1,211,127 UART: [ldev] SUBJECT.KEYID = 5
1,211,553 UART: [ldev] AUTHORITY.KEYID = 7
1,212,016 UART: [ldev] FE.KEYID = 1
1,217,096 UART: [ldev] Erasing FE.KEYID = 1
1,243,773 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,196 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,912 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,803 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,515 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,628 UART: [ldev] --
1,283,091 UART: [fwproc] Wait for Commands...
1,283,883 UART: [fwproc] Recv command 0x46574c44
1,284,611 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,875 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,320 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,519 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,894 >>> mbox cmd response: failed
1,479,894 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,900 >>> mbox cmd response: failed
1,479,900 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,868 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,550 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
3,443,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,369,802 >>> mbox cmd response: failed
10,370,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,370,718 >>> mbox cmd response: failed
10,370,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,371,295 >>> mbox cmd response: failed
Initializing fuses
2,060,540 writing to cptra_bootfsm_go
5,491,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,328,503 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,139 writing to cptra_bootfsm_go
3,467,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,389,899 >>> mbox cmd response: failed
10,390,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,391,013 >>> mbox cmd response: failed
10,391,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,391,585 >>> mbox cmd response: failed
Initializing fuses
2,063,037 writing to cptra_bootfsm_go
5,492,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,320,581 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,285 writing to cptra_bootfsm_go
3,775,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,583,627 >>> mbox cmd response: failed
10,584,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,584,513 >>> mbox cmd response: failed
10,584,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,073 >>> mbox cmd response: failed
Initializing fuses
2,074,552 writing to cptra_bootfsm_go
13,064,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,773,330 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
3,784,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,597,970 >>> mbox cmd response: failed
10,598,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,598,869 >>> mbox cmd response: failed
10,599,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,599,448 >>> mbox cmd response: failed
Initializing fuses
2,062,850 writing to cptra_bootfsm_go
13,041,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,756,128 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,445,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,366,578 >>> mbox cmd response: failed
10,367,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,367,718 >>> mbox cmd response: failed
10,367,995 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,368,356 >>> mbox cmd response: failed
Initializing fuses
2,076,352 writing to cptra_bootfsm_go
5,505,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,566 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,452,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,366,467 >>> mbox cmd response: failed
10,367,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,367,368 >>> mbox cmd response: failed
10,367,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,367,937 >>> mbox cmd response: failed
Initializing fuses
2,063,680 writing to cptra_bootfsm_go
5,508,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,324,279 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
3,777,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,585,228 >>> mbox cmd response: failed
10,586,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,443 >>> mbox cmd response: failed
10,586,720 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,587,014 >>> mbox cmd response: failed
Initializing fuses
2,062,463 writing to cptra_bootfsm_go
13,063,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,776,616 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,775,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,578,405 >>> mbox cmd response: failed
10,579,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,579,534 >>> mbox cmd response: failed
10,579,823 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,072 >>> mbox cmd response: failed
Initializing fuses
2,062,286 writing to cptra_bootfsm_go
13,065,112 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,775,196 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,930 >>> mbox cmd response: failed
1,181,930 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,936 >>> mbox cmd response: failed
1,181,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,618 UART: [state] LifecycleState = Unprovisioned
86,273 UART: [state] DebugLocked = No
86,947 UART: [state] WD Timer not started. Device not locked for debugging
88,248 UART: [kat] SHA2-256
891,798 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,902 UART: [kat] ++
896,054 UART: [kat] sha1
900,192 UART: [kat] SHA2-256
902,132 UART: [kat] SHA2-384
904,927 UART: [kat] SHA2-512-ACC
906,828 UART: [kat] ECC-384
916,397 UART: [kat] HMAC-384Kdf
921,041 UART: [kat] LMS
1,169,353 UART: [kat] --
1,169,984 UART: [cold-reset] ++
1,170,340 UART: [fht] FHT @ 0x50003400
1,173,114 UART: [idev] ++
1,173,282 UART: [idev] CDI.KEYID = 6
1,173,643 UART: [idev] SUBJECT.KEYID = 7
1,174,068 UART: [idev] UDS.KEYID = 0
1,174,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,803 UART: [idev] Erasing UDS.KEYID = 0
1,199,027 UART: [idev] Sha1 KeyId Algorithm
1,208,057 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,722 UART: [ldev] Erasing FE.KEYID = 1
1,241,679 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,981 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,697 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,586 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,298 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,406 UART: [ldev] --
1,280,725 UART: [fwproc] Wait for Commands...
1,281,428 UART: [fwproc] Recv command 0x46574c44
1,282,161 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,175 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,368 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,840 >>> mbox cmd response: failed
1,182,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,846 >>> mbox cmd response: failed
1,182,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,852 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,333 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,549 >>> mbox cmd response: failed
1,183,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,555 >>> mbox cmd response: failed
1,183,555 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,439 UART: [state] LifecycleState = Unprovisioned
86,094 UART: [state] DebugLocked = No
86,770 UART: [state] WD Timer not started. Device not locked for debugging
88,025 UART: [kat] SHA2-256
891,575 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,679 UART: [kat] ++
895,831 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,630 UART: [kat] SHA2-512-ACC
906,531 UART: [kat] ECC-384
916,414 UART: [kat] HMAC-384Kdf
921,050 UART: [kat] LMS
1,169,362 UART: [kat] --
1,169,985 UART: [cold-reset] ++
1,170,453 UART: [fht] FHT @ 0x50003400
1,173,041 UART: [idev] ++
1,173,209 UART: [idev] CDI.KEYID = 6
1,173,570 UART: [idev] SUBJECT.KEYID = 7
1,173,995 UART: [idev] UDS.KEYID = 0
1,174,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,960 UART: [idev] Erasing UDS.KEYID = 0
1,199,220 UART: [idev] Sha1 KeyId Algorithm
1,208,322 UART: [idev] --
1,209,265 UART: [ldev] ++
1,209,433 UART: [ldev] CDI.KEYID = 6
1,209,797 UART: [ldev] SUBJECT.KEYID = 5
1,210,224 UART: [ldev] AUTHORITY.KEYID = 7
1,210,687 UART: [ldev] FE.KEYID = 1
1,215,931 UART: [ldev] Erasing FE.KEYID = 1
1,241,942 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,637 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,753 UART: [ldev] --
1,281,154 UART: [fwproc] Wait for Commands...
1,281,871 UART: [fwproc] Recv command 0x46574c44
1,282,604 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,029 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,421 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,791 >>> mbox cmd response: failed
1,183,791 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,797 >>> mbox cmd response: failed
1,183,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,346 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,056 >>> mbox cmd response: failed
1,183,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,062 >>> mbox cmd response: failed
1,183,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,068 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,960 UART: [state] LifecycleState = Unprovisioned
85,615 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,394 UART: [kat] SHA2-256
893,044 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,169 UART: [kat] ++
897,321 UART: [kat] sha1
901,619 UART: [kat] SHA2-256
903,559 UART: [kat] SHA2-384
906,426 UART: [kat] SHA2-512-ACC
908,327 UART: [kat] ECC-384
918,248 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,935 UART: [cold-reset] ++
1,172,347 UART: [fht] FHT @ 0x50003400
1,175,076 UART: [idev] ++
1,175,244 UART: [idev] CDI.KEYID = 6
1,175,604 UART: [idev] SUBJECT.KEYID = 7
1,176,028 UART: [idev] UDS.KEYID = 0
1,176,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,142 UART: [idev] Erasing UDS.KEYID = 0
1,201,565 UART: [idev] Sha1 KeyId Algorithm
1,210,007 UART: [idev] --
1,211,021 UART: [ldev] ++
1,211,189 UART: [ldev] CDI.KEYID = 6
1,211,552 UART: [ldev] SUBJECT.KEYID = 5
1,211,978 UART: [ldev] AUTHORITY.KEYID = 7
1,212,441 UART: [ldev] FE.KEYID = 1
1,217,645 UART: [ldev] Erasing FE.KEYID = 1
1,244,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,146 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,858 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,773 UART: [ldev] --
1,283,068 UART: [fwproc] Wait for Commands...
1,283,674 UART: [fwproc] Recv command 0x46574c44
1,284,402 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,362 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,893 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,063 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,324 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,752 >>> mbox cmd response: failed
1,181,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,758 >>> mbox cmd response: failed
1,181,758 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,764 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,427 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,035 >>> mbox cmd response: failed
1,182,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,041 >>> mbox cmd response: failed
1,182,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,315 UART: [kat] SHA2-256
893,965 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,090 UART: [kat] ++
898,242 UART: [kat] sha1
902,356 UART: [kat] SHA2-256
904,296 UART: [kat] SHA2-384
906,881 UART: [kat] SHA2-512-ACC
908,782 UART: [kat] ECC-384
918,751 UART: [kat] HMAC-384Kdf
923,347 UART: [kat] LMS
1,171,675 UART: [kat] --
1,172,682 UART: [cold-reset] ++
1,173,074 UART: [fht] FHT @ 0x50003400
1,175,723 UART: [idev] ++
1,175,891 UART: [idev] CDI.KEYID = 6
1,176,251 UART: [idev] SUBJECT.KEYID = 7
1,176,675 UART: [idev] UDS.KEYID = 0
1,177,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,667 UART: [idev] Erasing UDS.KEYID = 0
1,201,876 UART: [idev] Sha1 KeyId Algorithm
1,210,396 UART: [idev] --
1,211,284 UART: [ldev] ++
1,211,452 UART: [ldev] CDI.KEYID = 6
1,211,815 UART: [ldev] SUBJECT.KEYID = 5
1,212,241 UART: [ldev] AUTHORITY.KEYID = 7
1,212,704 UART: [ldev] FE.KEYID = 1
1,217,982 UART: [ldev] Erasing FE.KEYID = 1
1,244,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,952 UART: [ldev] --
1,284,331 UART: [fwproc] Wait for Commands...
1,284,901 UART: [fwproc] Recv command 0x46574c44
1,285,629 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,588 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,903 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,439 >>> mbox cmd response: failed
1,183,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,445 >>> mbox cmd response: failed
1,183,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,626 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,942 writing to cptra_bootfsm_go
192,182 UART:
192,548 UART: Running Caliptra ROM ...
193,675 UART:
193,824 UART: [state] CFI Enabled
264,401 UART: [state] LifecycleState = Unprovisioned
266,374 UART: [state] DebugLocked = No
268,900 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,427 UART: [kat] SHA2-256
444,140 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,618 UART: [kat] ++
455,063 UART: [kat] sha1
465,840 UART: [kat] SHA2-256
468,521 UART: [kat] SHA2-384
474,121 UART: [kat] SHA2-512-ACC
476,515 UART: [kat] ECC-384
2,767,314 UART: [kat] HMAC-384Kdf
2,797,746 UART: [kat] LMS
3,988,019 UART: [kat] --
3,994,229 UART: [cold-reset] ++
3,995,197 UART: [fht] Storing FHT @ 0x50003400
4,005,874 UART: [idev] ++
4,006,502 UART: [idev] CDI.KEYID = 6
4,007,415 UART: [idev] SUBJECT.KEYID = 7
4,008,653 UART: [idev] UDS.KEYID = 0
4,014,595 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,784 UART: [idev] Erasing UDS.KEYID = 0
7,344,237 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,082 UART: [idev] --
7,369,598 UART: [ldev] ++
7,370,170 UART: [ldev] CDI.KEYID = 6
7,371,140 UART: [ldev] SUBJECT.KEYID = 5
7,372,361 UART: [ldev] AUTHORITY.KEYID = 7
7,373,597 UART: [ldev] FE.KEYID = 1
7,410,031 UART: [ldev] Erasing FE.KEYID = 1
10,741,445 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,341 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,048,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,063,759 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,096,854 UART: [ldev] --
13,102,234 UART: [fwproc] Waiting for Commands...
13,103,850 UART: [fwproc] Received command 0x46574c44
13,106,093 UART: [fwproc] Received Image of size 118548 bytes
13,173,042 UART: ROM Fatal Error: 0x000B0007
13,176,567 >>> mbox cmd response: failed
13,177,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,352 >>> mbox cmd response: failed
13,177,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,177,924 >>> mbox cmd response: failed
Initializing fuses
2,077,162 writing to cptra_bootfsm_go
2,266,471 UART:
2,266,811 UART: Running Caliptra ROM ...
2,267,950 UART:
2,268,114 UART: [state] CFI Enabled
2,322,306 UART: [state] LifecycleState = Unprovisioned
2,324,245 UART: [state] DebugLocked = No
2,326,128 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,330,703 UART: [kat] SHA2-256
2,500,401 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,510,913 UART: [kat] ++
2,511,456 UART: [kat] sha1
2,521,485 UART: [kat] SHA2-256
2,524,188 UART: [kat] SHA2-384
2,530,569 UART: [kat] SHA2-512-ACC
2,532,925 UART: [kat] ECC-384
4,827,398 UART: [kat] HMAC-384Kdf
4,858,802 UART: [kat] LMS
6,049,054 UART: [kat] --
6,053,755 UART: [cold-reset] ++
6,055,057 UART: [fht] Storing FHT @ 0x50003400
6,066,766 UART: [idev] ++
6,067,338 UART: [idev] CDI.KEYID = 6
6,068,323 UART: [idev] SUBJECT.KEYID = 7
6,069,544 UART: [idev] UDS.KEYID = 0
6,072,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,221,501 UART: [idev] Erasing UDS.KEYID = 0
9,405,771 UART: [idev] Using Sha1 for KeyId Algorithm
9,426,582 UART: [idev] --
9,429,525 UART: [ldev] ++
9,430,104 UART: [ldev] CDI.KEYID = 6
9,431,127 UART: [ldev] SUBJECT.KEYID = 5
9,432,376 UART: [ldev] AUTHORITY.KEYID = 7
9,433,556 UART: [ldev] FE.KEYID = 1
9,460,967 UART: [ldev] Erasing FE.KEYID = 1
12,793,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,089,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,104,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,118,910 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,133,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,151,917 UART: [ldev] --
15,157,405 UART: [fwproc] Waiting for Commands...
15,160,030 UART: [fwproc] Received command 0x46574c44
15,162,235 UART: [fwproc] Received Image of size 118548 bytes
19,264,776 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,340,564 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,413,757 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,742,059 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,788,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,925,671 >>> mbox cmd response: failed
12,926,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,926,655 >>> mbox cmd response: failed
12,926,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,927,222 >>> mbox cmd response: failed
Initializing fuses
2,063,895 writing to cptra_bootfsm_go
5,833,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,981,876 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,604 UART:
192,977 UART: Running Caliptra ROM ...
194,106 UART:
603,865 UART: [state] CFI Enabled
617,174 UART: [state] LifecycleState = Unprovisioned
619,122 UART: [state] DebugLocked = No
621,696 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,554 UART: [kat] SHA2-256
796,290 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,851 UART: [kat] ++
807,389 UART: [kat] sha1
817,339 UART: [kat] SHA2-256
820,026 UART: [kat] SHA2-384
825,803 UART: [kat] SHA2-512-ACC
828,148 UART: [kat] ECC-384
3,111,706 UART: [kat] HMAC-384Kdf
3,123,805 UART: [kat] LMS
4,313,922 UART: [kat] --
4,316,734 UART: [cold-reset] ++
4,318,459 UART: [fht] Storing FHT @ 0x50003400
4,329,358 UART: [idev] ++
4,329,928 UART: [idev] CDI.KEYID = 6
4,330,844 UART: [idev] SUBJECT.KEYID = 7
4,332,125 UART: [idev] UDS.KEYID = 0
4,337,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,927 UART: [idev] Erasing UDS.KEYID = 0
7,621,550 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,606 UART: [idev] --
7,646,580 UART: [ldev] ++
7,647,157 UART: [ldev] CDI.KEYID = 6
7,648,131 UART: [ldev] SUBJECT.KEYID = 5
7,649,318 UART: [ldev] AUTHORITY.KEYID = 7
7,650,560 UART: [ldev] FE.KEYID = 1
7,662,055 UART: [ldev] Erasing FE.KEYID = 1
10,951,936 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,376 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,036 UART: [ldev] --
13,314,265 UART: [fwproc] Waiting for Commands...
13,315,941 UART: [fwproc] Received command 0x46574c44
13,318,136 UART: [fwproc] Received Image of size 118548 bytes
13,385,588 UART: ROM Fatal Error: 0x000B0007
13,389,110 >>> mbox cmd response: failed
13,389,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,389,885 >>> mbox cmd response: failed
13,390,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,390,482 >>> mbox cmd response: failed
Initializing fuses
2,062,587 writing to cptra_bootfsm_go
2,251,898 UART:
2,252,275 UART: Running Caliptra ROM ...
2,253,349 UART:
7,080,656 UART: [state] CFI Enabled
7,091,611 UART: [state] LifecycleState = Unprovisioned
7,093,551 UART: [state] DebugLocked = No
7,096,463 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,100,511 UART: [kat] SHA2-256
7,270,253 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,280,787 UART: [kat] ++
7,281,339 UART: [kat] sha1
7,292,296 UART: [kat] SHA2-256
7,295,048 UART: [kat] SHA2-384
7,300,932 UART: [kat] SHA2-512-ACC
7,303,284 UART: [kat] ECC-384
9,586,482 UART: [kat] HMAC-384Kdf
9,598,122 UART: [kat] LMS
10,788,208 UART: [kat] --
10,790,932 UART: [cold-reset] ++
10,792,494 UART: [fht] Storing FHT @ 0x50003400
10,805,387 UART: [idev] ++
10,805,973 UART: [idev] CDI.KEYID = 6
10,806,945 UART: [idev] SUBJECT.KEYID = 7
10,808,106 UART: [idev] UDS.KEYID = 0
10,811,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,960,214 UART: [idev] Erasing UDS.KEYID = 0
14,094,444 UART: [idev] Using Sha1 for KeyId Algorithm
14,114,875 UART: [idev] --
14,118,169 UART: [ldev] ++
14,118,738 UART: [ldev] CDI.KEYID = 6
14,119,678 UART: [ldev] SUBJECT.KEYID = 5
14,120,946 UART: [ldev] AUTHORITY.KEYID = 7
14,122,187 UART: [ldev] FE.KEYID = 1
14,132,653 UART: [ldev] Erasing FE.KEYID = 1
17,419,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,713,616 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,728,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,743,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,757,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,776,512 UART: [ldev] --
19,781,025 UART: [fwproc] Waiting for Commands...
19,782,699 UART: [fwproc] Received command 0x46574c44
19,784,890 UART: [fwproc] Received Image of size 118548 bytes
23,893,632 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,961,011 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,034,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,362,417 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,132,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,132,247 >>> mbox cmd response: failed
13,132,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,224 >>> mbox cmd response: failed
13,133,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,133,794 >>> mbox cmd response: failed
Initializing fuses
2,062,393 writing to cptra_bootfsm_go
10,860,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,885,909 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,196 UART:
192,569 UART: Running Caliptra ROM ...
193,750 UART:
193,911 UART: [state] CFI Enabled
261,497 UART: [state] LifecycleState = Unprovisioned
263,448 UART: [state] DebugLocked = No
265,539 UART: [state] WD Timer not started. Device not locked for debugging
268,990 UART: [kat] SHA2-256
448,686 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,457 UART: [kat] ++
459,941 UART: [kat] sha1
470,821 UART: [kat] SHA2-256
473,519 UART: [kat] SHA2-384
479,143 UART: [kat] SHA2-512-ACC
481,544 UART: [kat] ECC-384
2,927,309 UART: [kat] HMAC-384Kdf
2,950,624 UART: [kat] LMS
3,427,095 UART: [kat] --
3,430,874 UART: [cold-reset] ++
3,433,403 UART: [fht] FHT @ 0x50003400
3,443,253 UART: [idev] ++
3,443,817 UART: [idev] CDI.KEYID = 6
3,444,761 UART: [idev] SUBJECT.KEYID = 7
3,446,027 UART: [idev] UDS.KEYID = 0
3,448,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,194 UART: [idev] Erasing UDS.KEYID = 0
5,964,873 UART: [idev] Sha1 KeyId Algorithm
5,987,423 UART: [idev] --
5,993,148 UART: [ldev] ++
5,993,743 UART: [ldev] CDI.KEYID = 6
5,994,666 UART: [ldev] SUBJECT.KEYID = 5
5,995,883 UART: [ldev] AUTHORITY.KEYID = 7
5,997,125 UART: [ldev] FE.KEYID = 1
6,036,074 UART: [ldev] Erasing FE.KEYID = 1
8,541,372 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,277,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,293,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,309,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,325,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,346,609 UART: [ldev] --
10,352,424 UART: [fwproc] Wait for Commands...
10,354,261 UART: [fwproc] Recv command 0x46574c44
10,356,312 UART: [fwproc] Recv'd Img size: 118548 bytes
10,435,421 UART: ROM Fatal Error: 0x000B0007
10,438,665 >>> mbox cmd response: failed
10,439,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,439,504 >>> mbox cmd response: failed
10,439,779 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,440,077 >>> mbox cmd response: failed
Initializing fuses
2,056,481 writing to cptra_bootfsm_go
2,245,770 UART:
2,246,132 UART: Running Caliptra ROM ...
2,247,218 UART:
2,247,393 UART: [state] CFI Enabled
2,315,150 UART: [state] LifecycleState = Unprovisioned
2,317,037 UART: [state] DebugLocked = No
2,320,020 UART: [state] WD Timer not started. Device not locked for debugging
2,324,483 UART: [kat] SHA2-256
2,504,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,947 UART: [kat] ++
2,515,439 UART: [kat] sha1
2,527,247 UART: [kat] SHA2-256
2,529,945 UART: [kat] SHA2-384
2,535,680 UART: [kat] SHA2-512-ACC
2,538,025 UART: [kat] ECC-384
4,999,935 UART: [kat] HMAC-384Kdf
5,013,635 UART: [kat] LMS
5,490,123 UART: [kat] --
5,493,845 UART: [cold-reset] ++
5,496,472 UART: [fht] FHT @ 0x50003400
5,508,567 UART: [idev] ++
5,509,153 UART: [idev] CDI.KEYID = 6
5,510,118 UART: [idev] SUBJECT.KEYID = 7
5,511,338 UART: [idev] UDS.KEYID = 0
5,514,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,663,288 UART: [idev] Erasing UDS.KEYID = 0
8,021,404 UART: [idev] Sha1 KeyId Algorithm
8,045,722 UART: [idev] --
8,050,314 UART: [ldev] ++
8,050,891 UART: [ldev] CDI.KEYID = 6
8,051,814 UART: [ldev] SUBJECT.KEYID = 5
8,053,035 UART: [ldev] AUTHORITY.KEYID = 7
8,054,275 UART: [ldev] FE.KEYID = 1
8,091,159 UART: [ldev] Erasing FE.KEYID = 1
10,607,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,390,045 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,412,316 UART: [ldev] --
12,418,233 UART: [fwproc] Wait for Commands...
12,421,197 UART: [fwproc] Recv command 0x46574c44
12,423,183 UART: [fwproc] Recv'd Img size: 118548 bytes
15,909,352 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,983,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,056,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,383,573 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,463,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,343,488 >>> mbox cmd response: failed
10,344,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,344,622 >>> mbox cmd response: failed
10,344,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,345,191 >>> mbox cmd response: failed
Initializing fuses
2,057,123 writing to cptra_bootfsm_go
5,509,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,266,213 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,560 UART:
192,922 UART: Running Caliptra ROM ...
194,036 UART:
603,992 UART: [state] CFI Enabled
616,912 UART: [state] LifecycleState = Unprovisioned
618,819 UART: [state] DebugLocked = No
620,800 UART: [state] WD Timer not started. Device not locked for debugging
623,771 UART: [kat] SHA2-256
803,426 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,214 UART: [kat] ++
814,715 UART: [kat] sha1
826,298 UART: [kat] SHA2-256
828,988 UART: [kat] SHA2-384
835,080 UART: [kat] SHA2-512-ACC
837,437 UART: [kat] ECC-384
3,278,740 UART: [kat] HMAC-384Kdf
3,290,875 UART: [kat] LMS
3,767,407 UART: [kat] --
3,773,829 UART: [cold-reset] ++
3,775,123 UART: [fht] FHT @ 0x50003400
3,786,701 UART: [idev] ++
3,787,270 UART: [idev] CDI.KEYID = 6
3,788,296 UART: [idev] SUBJECT.KEYID = 7
3,789,462 UART: [idev] UDS.KEYID = 0
3,792,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,389 UART: [idev] Erasing UDS.KEYID = 0
6,267,910 UART: [idev] Sha1 KeyId Algorithm
6,291,588 UART: [idev] --
6,296,531 UART: [ldev] ++
6,297,115 UART: [ldev] CDI.KEYID = 6
6,298,030 UART: [ldev] SUBJECT.KEYID = 5
6,299,257 UART: [ldev] AUTHORITY.KEYID = 7
6,300,495 UART: [ldev] FE.KEYID = 1
6,311,525 UART: [ldev] Erasing FE.KEYID = 1
8,791,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,951 UART: [ldev] --
10,588,243 UART: [fwproc] Wait for Commands...
10,590,673 UART: [fwproc] Recv command 0x46574c44
10,592,739 UART: [fwproc] Recv'd Img size: 118548 bytes
10,674,346 UART: ROM Fatal Error: 0x000B0007
10,677,600 >>> mbox cmd response: failed
10,678,052 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,678,392 >>> mbox cmd response: failed
10,678,666 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,678,965 >>> mbox cmd response: failed
Initializing fuses
2,062,248 writing to cptra_bootfsm_go
2,251,601 UART:
2,251,939 UART: Running Caliptra ROM ...
2,252,992 UART:
9,791,873 UART: [state] CFI Enabled
9,806,761 UART: [state] LifecycleState = Unprovisioned
9,808,691 UART: [state] DebugLocked = No
9,810,683 UART: [state] WD Timer not started. Device not locked for debugging
9,814,753 UART: [kat] SHA2-256
9,994,439 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,005,222 UART: [kat] ++
10,005,718 UART: [kat] sha1
10,017,156 UART: [kat] SHA2-256
10,019,865 UART: [kat] SHA2-384
10,025,593 UART: [kat] SHA2-512-ACC
10,027,946 UART: [kat] ECC-384
12,472,071 UART: [kat] HMAC-384Kdf
12,484,939 UART: [kat] LMS
12,961,416 UART: [kat] --
12,967,714 UART: [cold-reset] ++
12,969,950 UART: [fht] FHT @ 0x50003400
12,982,604 UART: [idev] ++
12,983,166 UART: [idev] CDI.KEYID = 6
12,984,104 UART: [idev] SUBJECT.KEYID = 7
12,985,369 UART: [idev] UDS.KEYID = 0
12,988,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,137,315 UART: [idev] Erasing UDS.KEYID = 0
15,460,785 UART: [idev] Sha1 KeyId Algorithm
15,486,022 UART: [idev] --
15,489,966 UART: [ldev] ++
15,490,544 UART: [ldev] CDI.KEYID = 6
15,491,488 UART: [ldev] SUBJECT.KEYID = 5
15,492,702 UART: [ldev] AUTHORITY.KEYID = 7
15,493,940 UART: [ldev] FE.KEYID = 1
15,504,726 UART: [ldev] Erasing FE.KEYID = 1
17,983,640 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,701,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,716,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,732,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,748,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,769,258 UART: [ldev] --
19,774,112 UART: [fwproc] Wait for Commands...
19,777,354 UART: [fwproc] Recv command 0x46574c44
19,779,345 UART: [fwproc] Recv'd Img size: 118548 bytes
23,262,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,342,078 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,415,094 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,743,481 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
3,782,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,552,079 >>> mbox cmd response: failed
10,552,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,552,967 >>> mbox cmd response: failed
10,553,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,581 >>> mbox cmd response: failed
Initializing fuses
2,062,519 writing to cptra_bootfsm_go
13,093,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,759,988 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,245 UART:
192,620 UART: Running Caliptra ROM ...
193,816 UART:
193,976 UART: [state] CFI Enabled
266,064 UART: [state] LifecycleState = Unprovisioned
268,490 UART: [state] DebugLocked = No
270,094 UART: [state] WD Timer not started. Device not locked for debugging
274,781 UART: [kat] SHA2-256
464,621 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,430 UART: [kat] ++
475,970 UART: [kat] sha1
487,559 UART: [kat] SHA2-256
490,563 UART: [kat] SHA2-384
497,002 UART: [kat] SHA2-512-ACC
499,631 UART: [kat] ECC-384
2,949,036 UART: [kat] HMAC-384Kdf
2,972,501 UART: [kat] LMS
3,504,286 UART: [kat] --
3,509,376 UART: [cold-reset] ++
3,511,156 UART: [fht] FHT @ 0x50003400
3,523,161 UART: [idev] ++
3,523,837 UART: [idev] CDI.KEYID = 6
3,524,781 UART: [idev] SUBJECT.KEYID = 7
3,525,992 UART: [idev] UDS.KEYID = 0
3,531,959 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,311 UART: [idev] Erasing UDS.KEYID = 0
6,030,553 UART: [idev] Sha1 KeyId Algorithm
6,053,600 UART: [idev] --
6,058,709 UART: [ldev] ++
6,059,402 UART: [ldev] CDI.KEYID = 6
6,060,338 UART: [ldev] SUBJECT.KEYID = 5
6,061,505 UART: [ldev] AUTHORITY.KEYID = 7
6,062,752 UART: [ldev] FE.KEYID = 1
6,100,849 UART: [ldev] Erasing FE.KEYID = 1
8,605,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,259 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,380 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,561 UART: [ldev] --
10,412,938 UART: [fwproc] Wait for Commands...
10,414,879 UART: [fwproc] Recv command 0x46574c44
10,417,146 UART: [fwproc] Recv'd Img size: 118548 bytes
10,515,118 UART: ROM Fatal Error: 0x000B0007
10,518,768 >>> mbox cmd response: failed
10,519,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,519,489 >>> mbox cmd response: failed
10,519,763 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,061 >>> mbox cmd response: failed
Initializing fuses
2,057,496 writing to cptra_bootfsm_go
2,246,848 UART:
2,247,195 UART: Running Caliptra ROM ...
2,248,302 UART:
2,248,469 UART: [state] CFI Enabled
2,308,774 UART: [state] LifecycleState = Unprovisioned
2,311,149 UART: [state] DebugLocked = No
2,313,031 UART: [state] WD Timer not started. Device not locked for debugging
2,318,135 UART: [kat] SHA2-256
2,508,027 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,518,808 UART: [kat] ++
2,519,301 UART: [kat] sha1
2,531,333 UART: [kat] SHA2-256
2,534,359 UART: [kat] SHA2-384
2,539,112 UART: [kat] SHA2-512-ACC
2,541,685 UART: [kat] ECC-384
4,993,136 UART: [kat] HMAC-384Kdf
5,017,522 UART: [kat] LMS
5,549,281 UART: [kat] --
5,553,561 UART: [cold-reset] ++
5,555,768 UART: [fht] FHT @ 0x50003400
5,566,104 UART: [idev] ++
5,566,788 UART: [idev] CDI.KEYID = 6
5,567,729 UART: [idev] SUBJECT.KEYID = 7
5,568,941 UART: [idev] UDS.KEYID = 0
5,571,642 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,720,858 UART: [idev] Erasing UDS.KEYID = 0
8,072,583 UART: [idev] Sha1 KeyId Algorithm
8,094,048 UART: [idev] --
8,098,649 UART: [ldev] ++
8,099,338 UART: [ldev] CDI.KEYID = 6
8,100,230 UART: [ldev] SUBJECT.KEYID = 5
8,101,394 UART: [ldev] AUTHORITY.KEYID = 7
8,102,632 UART: [ldev] FE.KEYID = 1
8,143,825 UART: [ldev] Erasing FE.KEYID = 1
10,650,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,385,345 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,400,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,415,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,430,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,451,118 UART: [ldev] --
12,456,985 UART: [fwproc] Wait for Commands...
12,458,654 UART: [fwproc] Recv command 0x46574c44
12,460,922 UART: [fwproc] Recv'd Img size: 118548 bytes
15,957,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,033,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,157,155 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,717,357 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
3,446,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,311,996 >>> mbox cmd response: failed
10,312,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,312,951 >>> mbox cmd response: failed
10,313,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,313,527 >>> mbox cmd response: failed
Initializing fuses
2,065,569 writing to cptra_bootfsm_go
5,502,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,881,946 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,640 UART:
192,997 UART: Running Caliptra ROM ...
194,107 UART:
604,010 UART: [state] CFI Enabled
619,812 UART: [state] LifecycleState = Unprovisioned
622,218 UART: [state] DebugLocked = No
624,973 UART: [state] WD Timer not started. Device not locked for debugging
630,318 UART: [kat] SHA2-256
820,172 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,979 UART: [kat] ++
831,500 UART: [kat] sha1
842,993 UART: [kat] SHA2-256
846,015 UART: [kat] SHA2-384
851,900 UART: [kat] SHA2-512-ACC
854,460 UART: [kat] ECC-384
3,293,511 UART: [kat] HMAC-384Kdf
3,305,257 UART: [kat] LMS
3,837,082 UART: [kat] --
3,843,341 UART: [cold-reset] ++
3,845,713 UART: [fht] FHT @ 0x50003400
3,856,491 UART: [idev] ++
3,857,233 UART: [idev] CDI.KEYID = 6
3,858,145 UART: [idev] SUBJECT.KEYID = 7
3,859,366 UART: [idev] UDS.KEYID = 0
3,864,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,088 UART: [idev] Erasing UDS.KEYID = 0
6,330,601 UART: [idev] Sha1 KeyId Algorithm
6,352,892 UART: [idev] --
6,357,648 UART: [ldev] ++
6,358,334 UART: [ldev] CDI.KEYID = 6
6,359,245 UART: [ldev] SUBJECT.KEYID = 5
6,360,408 UART: [ldev] AUTHORITY.KEYID = 7
6,361,649 UART: [ldev] FE.KEYID = 1
6,372,816 UART: [ldev] Erasing FE.KEYID = 1
8,848,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,779 UART: [ldev] --
10,639,844 UART: [fwproc] Wait for Commands...
10,641,415 UART: [fwproc] Recv command 0x46574c44
10,643,760 UART: [fwproc] Recv'd Img size: 118548 bytes
10,743,309 UART: ROM Fatal Error: 0x000B0007
10,746,991 >>> mbox cmd response: failed
10,747,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,747,691 >>> mbox cmd response: failed
10,747,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,748,263 >>> mbox cmd response: failed
Initializing fuses
2,060,128 writing to cptra_bootfsm_go
2,249,442 UART:
2,249,805 UART: Running Caliptra ROM ...
2,250,854 UART:
9,724,612 UART: [state] CFI Enabled
9,736,326 UART: [state] LifecycleState = Unprovisioned
9,738,684 UART: [state] DebugLocked = No
9,741,131 UART: [state] WD Timer not started. Device not locked for debugging
9,745,272 UART: [kat] SHA2-256
9,935,197 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,945,948 UART: [kat] ++
9,946,553 UART: [kat] sha1
9,957,828 UART: [kat] SHA2-256
9,960,849 UART: [kat] SHA2-384
9,965,703 UART: [kat] SHA2-512-ACC
9,968,327 UART: [kat] ECC-384
12,411,551 UART: [kat] HMAC-384Kdf
12,425,804 UART: [kat] LMS
12,957,620 UART: [kat] --
12,961,628 UART: [cold-reset] ++
12,963,238 UART: [fht] FHT @ 0x50003400
12,974,385 UART: [idev] ++
12,975,057 UART: [idev] CDI.KEYID = 6
12,976,000 UART: [idev] SUBJECT.KEYID = 7
12,977,224 UART: [idev] UDS.KEYID = 0
12,980,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,129,244 UART: [idev] Erasing UDS.KEYID = 0
15,453,748 UART: [idev] Sha1 KeyId Algorithm
15,477,102 UART: [idev] --
15,481,854 UART: [ldev] ++
15,482,633 UART: [ldev] CDI.KEYID = 6
15,483,562 UART: [ldev] SUBJECT.KEYID = 5
15,484,680 UART: [ldev] AUTHORITY.KEYID = 7
15,485,879 UART: [ldev] FE.KEYID = 1
15,496,364 UART: [ldev] Erasing FE.KEYID = 1
17,974,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,696,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,726,653 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,741,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,762,605 UART: [ldev] --
19,767,231 UART: [fwproc] Wait for Commands...
19,769,872 UART: [fwproc] Recv command 0x46574c44
19,772,195 UART: [fwproc] Recv'd Img size: 118548 bytes
23,268,154 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,342,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,466,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,025,823 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
3,757,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,528,760 >>> mbox cmd response: failed
10,529,370 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,529,733 >>> mbox cmd response: failed
10,530,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,530,361 >>> mbox cmd response: failed
Initializing fuses
2,063,683 writing to cptra_bootfsm_go
13,093,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,387,330 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,832 UART: [state] LifecycleState = Unprovisioned
85,487 UART: [state] DebugLocked = No
86,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,617 UART: [kat] SHA2-256
881,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,663 UART: [kat] ++
885,815 UART: [kat] sha1
889,999 UART: [kat] SHA2-256
891,937 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,478 UART: [kat] HMAC-384Kdf
907,040 UART: [kat] LMS
1,475,236 UART: [kat] --
1,476,181 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,460 UART: [idev] ++
1,479,628 UART: [idev] CDI.KEYID = 6
1,479,988 UART: [idev] SUBJECT.KEYID = 7
1,480,412 UART: [idev] UDS.KEYID = 0
1,480,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,248 UART: [idev] Erasing UDS.KEYID = 0
1,504,620 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,358 UART: [idev] --
1,514,419 UART: [ldev] ++
1,514,587 UART: [ldev] CDI.KEYID = 6
1,514,950 UART: [ldev] SUBJECT.KEYID = 5
1,515,376 UART: [ldev] AUTHORITY.KEYID = 7
1,515,839 UART: [ldev] FE.KEYID = 1
1,520,873 UART: [ldev] Erasing FE.KEYID = 1
1,546,146 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,415 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,976 UART: [ldev] --
1,585,371 UART: [fwproc] Waiting for Commands...
1,586,148 UART: [fwproc] Received command 0x46574c44
1,586,939 UART: [fwproc] Received Image of size 118548 bytes
1,610,996 UART: ROM Fatal Error: 0x000B0007
1,612,153 >>> mbox cmd response: failed
1,612,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,159 >>> mbox cmd response: failed
1,612,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,612,165 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,041 UART: [kat] SHA2-256
881,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,087 UART: [kat] ++
886,239 UART: [kat] sha1
890,501 UART: [kat] SHA2-256
892,439 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,598 UART: [kat] HMAC-384Kdf
907,224 UART: [kat] LMS
1,475,420 UART: [kat] --
1,476,205 UART: [cold-reset] ++
1,476,575 UART: [fht] Storing FHT @ 0x50003400
1,479,404 UART: [idev] ++
1,479,572 UART: [idev] CDI.KEYID = 6
1,479,932 UART: [idev] SUBJECT.KEYID = 7
1,480,356 UART: [idev] UDS.KEYID = 0
1,480,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,472 UART: [idev] Erasing UDS.KEYID = 0
1,504,956 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,344 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,521,111 UART: [ldev] Erasing FE.KEYID = 1
1,546,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,720 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,432 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,498 UART: [ldev] --
1,585,865 UART: [fwproc] Waiting for Commands...
1,586,586 UART: [fwproc] Received command 0x46574c44
1,587,377 UART: [fwproc] Received Image of size 118548 bytes
2,931,202 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,920 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,138 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,555 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,463,874 >>> mbox cmd response: failed
1,463,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,880 >>> mbox cmd response: failed
1,463,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,463,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,839 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,051 UART: [state] LifecycleState = Unprovisioned
85,706 UART: [state] DebugLocked = No
86,312 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,976 UART: [kat] SHA2-256
881,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,022 UART: [kat] ++
886,174 UART: [kat] sha1
890,418 UART: [kat] SHA2-256
892,356 UART: [kat] SHA2-384
895,275 UART: [kat] SHA2-512-ACC
897,176 UART: [kat] ECC-384
902,637 UART: [kat] HMAC-384Kdf
907,279 UART: [kat] LMS
1,475,475 UART: [kat] --
1,476,306 UART: [cold-reset] ++
1,476,782 UART: [fht] Storing FHT @ 0x50003400
1,479,449 UART: [idev] ++
1,479,617 UART: [idev] CDI.KEYID = 6
1,479,977 UART: [idev] SUBJECT.KEYID = 7
1,480,401 UART: [idev] UDS.KEYID = 0
1,480,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,235 UART: [idev] Erasing UDS.KEYID = 0
1,504,789 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,305 UART: [idev] --
1,514,224 UART: [ldev] ++
1,514,392 UART: [ldev] CDI.KEYID = 6
1,514,755 UART: [ldev] SUBJECT.KEYID = 5
1,515,181 UART: [ldev] AUTHORITY.KEYID = 7
1,515,644 UART: [ldev] FE.KEYID = 1
1,520,752 UART: [ldev] Erasing FE.KEYID = 1
1,546,085 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,367 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,161 UART: [ldev] --
1,585,584 UART: [fwproc] Waiting for Commands...
1,586,297 UART: [fwproc] Received command 0x46574c44
1,587,088 UART: [fwproc] Received Image of size 118548 bytes
1,610,653 UART: ROM Fatal Error: 0x000B0007
1,611,810 >>> mbox cmd response: failed
1,611,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,816 >>> mbox cmd response: failed
1,611,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,611,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,519 UART: [state] LifecycleState = Unprovisioned
86,174 UART: [state] DebugLocked = No
86,908 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,622 UART: [kat] SHA2-256
882,553 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,668 UART: [kat] ++
886,820 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,403 UART: [kat] SHA2-512-ACC
897,304 UART: [kat] ECC-384
903,055 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,988 UART: [cold-reset] ++
1,477,542 UART: [fht] Storing FHT @ 0x50003400
1,480,319 UART: [idev] ++
1,480,487 UART: [idev] CDI.KEYID = 6
1,480,847 UART: [idev] SUBJECT.KEYID = 7
1,481,271 UART: [idev] UDS.KEYID = 0
1,481,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,453 UART: [idev] Erasing UDS.KEYID = 0
1,506,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,203 UART: [idev] --
1,516,164 UART: [ldev] ++
1,516,332 UART: [ldev] CDI.KEYID = 6
1,516,695 UART: [ldev] SUBJECT.KEYID = 5
1,517,121 UART: [ldev] AUTHORITY.KEYID = 7
1,517,584 UART: [ldev] FE.KEYID = 1
1,522,934 UART: [ldev] Erasing FE.KEYID = 1
1,548,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,875 UART: [ldev] --
1,588,382 UART: [fwproc] Waiting for Commands...
1,589,015 UART: [fwproc] Received command 0x46574c44
1,589,806 UART: [fwproc] Received Image of size 118548 bytes
2,934,261 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,813 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,031 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,396 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,113 >>> mbox cmd response: failed
1,466,113 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,119 >>> mbox cmd response: failed
1,466,119 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,644 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,600 UART: [state] LifecycleState = Unprovisioned
86,255 UART: [state] DebugLocked = No
86,985 UART: [state] WD Timer not started. Device not locked for debugging
88,206 UART: [kat] SHA2-256
891,756 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,860 UART: [kat] ++
896,012 UART: [kat] sha1
900,236 UART: [kat] SHA2-256
902,176 UART: [kat] SHA2-384
904,695 UART: [kat] SHA2-512-ACC
906,596 UART: [kat] ECC-384
916,369 UART: [kat] HMAC-384Kdf
921,127 UART: [kat] LMS
1,169,439 UART: [kat] --
1,170,380 UART: [cold-reset] ++
1,170,836 UART: [fht] FHT @ 0x50003400
1,173,614 UART: [idev] ++
1,173,782 UART: [idev] CDI.KEYID = 6
1,174,143 UART: [idev] SUBJECT.KEYID = 7
1,174,568 UART: [idev] UDS.KEYID = 0
1,174,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,573 UART: [idev] Erasing UDS.KEYID = 0
1,200,073 UART: [idev] Sha1 KeyId Algorithm
1,208,927 UART: [idev] --
1,209,902 UART: [ldev] ++
1,210,070 UART: [ldev] CDI.KEYID = 6
1,210,434 UART: [ldev] SUBJECT.KEYID = 5
1,210,861 UART: [ldev] AUTHORITY.KEYID = 7
1,211,324 UART: [ldev] FE.KEYID = 1
1,216,358 UART: [ldev] Erasing FE.KEYID = 1
1,241,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,594 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,306 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,400 UART: [ldev] --
1,280,773 UART: [fwproc] Wait for Commands...
1,281,492 UART: [fwproc] Recv command 0x46574c44
1,282,225 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,531 UART: ROM Fatal Error: 0x000B0007
1,306,688 >>> mbox cmd response: failed
1,306,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,694 >>> mbox cmd response: failed
1,306,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,700 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,559 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
891,370 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,474 UART: [kat] ++
895,626 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,609 UART: [kat] SHA2-512-ACC
906,510 UART: [kat] ECC-384
916,547 UART: [kat] HMAC-384Kdf
921,253 UART: [kat] LMS
1,169,565 UART: [kat] --
1,170,700 UART: [cold-reset] ++
1,171,212 UART: [fht] FHT @ 0x50003400
1,174,010 UART: [idev] ++
1,174,178 UART: [idev] CDI.KEYID = 6
1,174,539 UART: [idev] SUBJECT.KEYID = 7
1,174,964 UART: [idev] UDS.KEYID = 0
1,175,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,171 UART: [idev] Erasing UDS.KEYID = 0
1,200,331 UART: [idev] Sha1 KeyId Algorithm
1,209,293 UART: [idev] --
1,210,272 UART: [ldev] ++
1,210,440 UART: [ldev] CDI.KEYID = 6
1,210,804 UART: [ldev] SUBJECT.KEYID = 5
1,211,231 UART: [ldev] AUTHORITY.KEYID = 7
1,211,694 UART: [ldev] FE.KEYID = 1
1,217,176 UART: [ldev] Erasing FE.KEYID = 1
1,243,943 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,798 UART: [ldev] --
1,283,159 UART: [fwproc] Wait for Commands...
1,283,774 UART: [fwproc] Recv command 0x46574c44
1,284,507 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,500 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,080 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,181 >>> mbox cmd response: failed
1,162,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,187 >>> mbox cmd response: failed
1,162,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,193 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,813 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,849 UART: [state] LifecycleState = Unprovisioned
86,504 UART: [state] DebugLocked = No
87,206 UART: [state] WD Timer not started. Device not locked for debugging
88,497 UART: [kat] SHA2-256
892,047 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,151 UART: [kat] ++
896,303 UART: [kat] sha1
900,549 UART: [kat] SHA2-256
902,489 UART: [kat] SHA2-384
905,180 UART: [kat] SHA2-512-ACC
907,081 UART: [kat] ECC-384
916,840 UART: [kat] HMAC-384Kdf
921,468 UART: [kat] LMS
1,169,780 UART: [kat] --
1,170,923 UART: [cold-reset] ++
1,171,255 UART: [fht] FHT @ 0x50003400
1,173,975 UART: [idev] ++
1,174,143 UART: [idev] CDI.KEYID = 6
1,174,504 UART: [idev] SUBJECT.KEYID = 7
1,174,929 UART: [idev] UDS.KEYID = 0
1,175,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,826 UART: [idev] Erasing UDS.KEYID = 0
1,200,214 UART: [idev] Sha1 KeyId Algorithm
1,209,058 UART: [idev] --
1,210,213 UART: [ldev] ++
1,210,381 UART: [ldev] CDI.KEYID = 6
1,210,745 UART: [ldev] SUBJECT.KEYID = 5
1,211,172 UART: [ldev] AUTHORITY.KEYID = 7
1,211,635 UART: [ldev] FE.KEYID = 1
1,216,763 UART: [ldev] Erasing FE.KEYID = 1
1,243,166 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,311 UART: [ldev] --
1,282,648 UART: [fwproc] Wait for Commands...
1,283,299 UART: [fwproc] Recv command 0x46574c44
1,284,032 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,794 UART: ROM Fatal Error: 0x000B0007
1,308,951 >>> mbox cmd response: failed
1,308,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,957 >>> mbox cmd response: failed
1,308,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,963 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
88,055 UART: [kat] SHA2-256
891,605 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,709 UART: [kat] ++
895,861 UART: [kat] sha1
900,099 UART: [kat] SHA2-256
902,039 UART: [kat] SHA2-384
904,602 UART: [kat] SHA2-512-ACC
906,503 UART: [kat] ECC-384
916,124 UART: [kat] HMAC-384Kdf
920,840 UART: [kat] LMS
1,169,152 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,699 UART: [fht] FHT @ 0x50003400
1,173,277 UART: [idev] ++
1,173,445 UART: [idev] CDI.KEYID = 6
1,173,806 UART: [idev] SUBJECT.KEYID = 7
1,174,231 UART: [idev] UDS.KEYID = 0
1,174,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,226 UART: [idev] Erasing UDS.KEYID = 0
1,198,768 UART: [idev] Sha1 KeyId Algorithm
1,207,714 UART: [idev] --
1,208,789 UART: [ldev] ++
1,208,957 UART: [ldev] CDI.KEYID = 6
1,209,321 UART: [ldev] SUBJECT.KEYID = 5
1,209,748 UART: [ldev] AUTHORITY.KEYID = 7
1,210,211 UART: [ldev] FE.KEYID = 1
1,215,295 UART: [ldev] Erasing FE.KEYID = 1
1,240,806 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,893 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,605 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,599 UART: [ldev] --
1,280,048 UART: [fwproc] Wait for Commands...
1,280,655 UART: [fwproc] Recv command 0x46574c44
1,281,388 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,906 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,635 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,810 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,137 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,050 >>> mbox cmd response: failed
1,164,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,056 >>> mbox cmd response: failed
1,164,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,900 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,591 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,977 UART: [kat] SHA2-256
903,917 UART: [kat] SHA2-384
906,698 UART: [kat] SHA2-512-ACC
908,599 UART: [kat] ECC-384
918,186 UART: [kat] HMAC-384Kdf
922,974 UART: [kat] LMS
1,171,302 UART: [kat] --
1,172,131 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,178 UART: [idev] ++
1,175,346 UART: [idev] CDI.KEYID = 6
1,175,706 UART: [idev] SUBJECT.KEYID = 7
1,176,130 UART: [idev] UDS.KEYID = 0
1,176,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,201,251 UART: [idev] Sha1 KeyId Algorithm
1,209,741 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,307 UART: [ldev] Erasing FE.KEYID = 1
1,243,870 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,729 UART: [ldev] --
1,283,174 UART: [fwproc] Wait for Commands...
1,283,976 UART: [fwproc] Recv command 0x46574c44
1,284,704 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,969 UART: ROM Fatal Error: 0x000B0007
1,310,126 >>> mbox cmd response: failed
1,310,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,132 >>> mbox cmd response: failed
1,310,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,138 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,621 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
893,532 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,657 UART: [kat] ++
897,809 UART: [kat] sha1
902,165 UART: [kat] SHA2-256
904,105 UART: [kat] SHA2-384
906,932 UART: [kat] SHA2-512-ACC
908,833 UART: [kat] ECC-384
918,422 UART: [kat] HMAC-384Kdf
923,108 UART: [kat] LMS
1,171,436 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,403 UART: [fht] FHT @ 0x50003400
1,175,070 UART: [idev] ++
1,175,238 UART: [idev] CDI.KEYID = 6
1,175,598 UART: [idev] SUBJECT.KEYID = 7
1,176,022 UART: [idev] UDS.KEYID = 0
1,176,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,324 UART: [idev] Erasing UDS.KEYID = 0
1,201,469 UART: [idev] Sha1 KeyId Algorithm
1,209,971 UART: [idev] --
1,210,945 UART: [ldev] ++
1,211,113 UART: [ldev] CDI.KEYID = 6
1,211,476 UART: [ldev] SUBJECT.KEYID = 5
1,211,902 UART: [ldev] AUTHORITY.KEYID = 7
1,212,365 UART: [ldev] FE.KEYID = 1
1,217,525 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,717 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,324 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,135 UART: [ldev] --
1,282,494 UART: [fwproc] Wait for Commands...
1,283,166 UART: [fwproc] Recv command 0x46574c44
1,283,894 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,197 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,367 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,710 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,199 >>> mbox cmd response: failed
1,162,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,205 >>> mbox cmd response: failed
1,162,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,849 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
893,581 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,706 UART: [kat] ++
897,858 UART: [kat] sha1
901,868 UART: [kat] SHA2-256
903,808 UART: [kat] SHA2-384
906,499 UART: [kat] SHA2-512-ACC
908,400 UART: [kat] ECC-384
918,377 UART: [kat] HMAC-384Kdf
922,999 UART: [kat] LMS
1,171,327 UART: [kat] --
1,172,258 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,315 UART: [idev] ++
1,175,483 UART: [idev] CDI.KEYID = 6
1,175,843 UART: [idev] SUBJECT.KEYID = 7
1,176,267 UART: [idev] UDS.KEYID = 0
1,176,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,653 UART: [idev] Erasing UDS.KEYID = 0
1,202,374 UART: [idev] Sha1 KeyId Algorithm
1,210,960 UART: [idev] --
1,211,992 UART: [ldev] ++
1,212,160 UART: [ldev] CDI.KEYID = 6
1,212,523 UART: [ldev] SUBJECT.KEYID = 5
1,212,949 UART: [ldev] AUTHORITY.KEYID = 7
1,213,412 UART: [ldev] FE.KEYID = 1
1,218,908 UART: [ldev] Erasing FE.KEYID = 1
1,245,543 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,722 UART: [ldev] --
1,285,077 UART: [fwproc] Wait for Commands...
1,285,647 UART: [fwproc] Recv command 0x46574c44
1,286,375 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,164 UART: ROM Fatal Error: 0x000B0007
1,311,321 >>> mbox cmd response: failed
1,311,321 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,327 >>> mbox cmd response: failed
1,311,327 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,940 UART: [state] WD Timer not started. Device not locked for debugging
88,163 UART: [kat] SHA2-256
893,813 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,938 UART: [kat] ++
898,090 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,011 UART: [kat] SHA2-512-ACC
908,912 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,406 UART: [cold-reset] ++
1,172,824 UART: [fht] FHT @ 0x50003400
1,175,337 UART: [idev] ++
1,175,505 UART: [idev] CDI.KEYID = 6
1,175,865 UART: [idev] SUBJECT.KEYID = 7
1,176,289 UART: [idev] UDS.KEYID = 0
1,176,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,259 UART: [idev] Erasing UDS.KEYID = 0
1,201,096 UART: [idev] Sha1 KeyId Algorithm
1,209,594 UART: [idev] --
1,210,660 UART: [ldev] ++
1,210,828 UART: [ldev] CDI.KEYID = 6
1,211,191 UART: [ldev] SUBJECT.KEYID = 5
1,211,617 UART: [ldev] AUTHORITY.KEYID = 7
1,212,080 UART: [ldev] FE.KEYID = 1
1,217,578 UART: [ldev] Erasing FE.KEYID = 1
1,243,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,402 UART: [ldev] --
1,282,767 UART: [fwproc] Wait for Commands...
1,283,567 UART: [fwproc] Recv command 0x46574c44
1,284,295 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,237 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,016 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,391 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,548 >>> mbox cmd response: failed
1,164,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,554 >>> mbox cmd response: failed
1,164,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,226 >>> mbox cmd response: success
test fw_load::fw_load_error_owner_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
3,446,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,623,392 >>> mbox cmd response: failed
12,624,357 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,624,731 >>> mbox cmd response: failed
12,625,007 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,625,302 >>> mbox cmd response: failed
Initializing fuses
2,061,896 writing to cptra_bootfsm_go
5,505,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,339,237 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
3,446,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,638,018 >>> mbox cmd response: failed
12,638,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,639,124 >>> mbox cmd response: failed
12,639,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,639,768 >>> mbox cmd response: failed
Initializing fuses
2,063,217 writing to cptra_bootfsm_go
5,504,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,785 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,778,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,851,024 >>> mbox cmd response: failed
12,851,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,851,840 >>> mbox cmd response: failed
12,852,115 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,852,407 >>> mbox cmd response: failed
Initializing fuses
2,068,088 writing to cptra_bootfsm_go
10,795,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,497,314 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,429 writing to cptra_bootfsm_go
3,769,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,835,843 >>> mbox cmd response: failed
12,836,535 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,836,901 >>> mbox cmd response: failed
12,837,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,837,466 >>> mbox cmd response: failed
Initializing fuses
2,061,998 writing to cptra_bootfsm_go
10,809,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,521,486 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,056 writing to cptra_bootfsm_go
3,448,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,658,900 >>> mbox cmd response: failed
12,659,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,659,881 >>> mbox cmd response: failed
12,660,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,450 >>> mbox cmd response: failed
Initializing fuses
2,063,348 writing to cptra_bootfsm_go
5,514,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,332,950 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,452,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,633,580 >>> mbox cmd response: failed
12,634,189 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,634,553 >>> mbox cmd response: failed
12,634,831 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,635,128 >>> mbox cmd response: failed
Initializing fuses
2,062,449 writing to cptra_bootfsm_go
5,492,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,323,945 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
3,782,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,857,785 >>> mbox cmd response: failed
12,858,374 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,858,738 >>> mbox cmd response: failed
12,859,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,859,265 >>> mbox cmd response: failed
Initializing fuses
2,061,408 writing to cptra_bootfsm_go
10,782,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,499,258 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
3,779,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,846,043 >>> mbox cmd response: failed
12,846,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,847,074 >>> mbox cmd response: failed
12,847,349 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,847,653 >>> mbox cmd response: failed
Initializing fuses
2,064,545 writing to cptra_bootfsm_go
10,800,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,524,681 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,152 >>> mbox cmd response: failed
1,444,152 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,158 >>> mbox cmd response: failed
1,444,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,121 UART: [state] WD Timer not started. Device not locked for debugging
87,420 UART: [kat] SHA2-256
890,970 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,074 UART: [kat] ++
895,226 UART: [kat] sha1
899,448 UART: [kat] SHA2-256
901,388 UART: [kat] SHA2-384
904,089 UART: [kat] SHA2-512-ACC
905,990 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,419 UART: [kat] LMS
1,168,731 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,616 UART: [idev] ++
1,172,784 UART: [idev] CDI.KEYID = 6
1,173,145 UART: [idev] SUBJECT.KEYID = 7
1,173,570 UART: [idev] UDS.KEYID = 0
1,173,916 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,327 UART: [idev] Erasing UDS.KEYID = 0
1,198,399 UART: [idev] Sha1 KeyId Algorithm
1,207,339 UART: [idev] --
1,208,342 UART: [ldev] ++
1,208,510 UART: [ldev] CDI.KEYID = 6
1,208,874 UART: [ldev] SUBJECT.KEYID = 5
1,209,301 UART: [ldev] AUTHORITY.KEYID = 7
1,209,764 UART: [ldev] FE.KEYID = 1
1,214,562 UART: [ldev] Erasing FE.KEYID = 1
1,240,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,218 UART: [ldev] --
1,279,571 UART: [fwproc] Wait for Commands...
1,280,246 UART: [fwproc] Recv command 0x46574c44
1,280,979 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,267 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,543 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,758 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.91s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,441,302 >>> mbox cmd response: failed
1,441,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,308 >>> mbox cmd response: failed
1,441,308 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,441,314 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,025 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,463 >>> mbox cmd response: failed
1,444,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,469 >>> mbox cmd response: failed
1,444,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,680 UART: [state] WD Timer not started. Device not locked for debugging
88,007 UART: [kat] SHA2-256
891,557 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,661 UART: [kat] ++
895,813 UART: [kat] sha1
899,919 UART: [kat] SHA2-256
901,859 UART: [kat] SHA2-384
904,422 UART: [kat] SHA2-512-ACC
906,323 UART: [kat] ECC-384
916,054 UART: [kat] HMAC-384Kdf
920,540 UART: [kat] LMS
1,168,852 UART: [kat] --
1,169,731 UART: [cold-reset] ++
1,170,183 UART: [fht] FHT @ 0x50003400
1,172,721 UART: [idev] ++
1,172,889 UART: [idev] CDI.KEYID = 6
1,173,250 UART: [idev] SUBJECT.KEYID = 7
1,173,675 UART: [idev] UDS.KEYID = 0
1,174,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,686 UART: [idev] Erasing UDS.KEYID = 0
1,198,998 UART: [idev] Sha1 KeyId Algorithm
1,207,948 UART: [idev] --
1,208,963 UART: [ldev] ++
1,209,131 UART: [ldev] CDI.KEYID = 6
1,209,495 UART: [ldev] SUBJECT.KEYID = 5
1,209,922 UART: [ldev] AUTHORITY.KEYID = 7
1,210,385 UART: [ldev] FE.KEYID = 1
1,215,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,608 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,324 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,133 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,051 UART: [fwproc] Recv command 0x46574c44
1,282,784 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,964 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,283 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,446,611 >>> mbox cmd response: failed
1,446,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,617 >>> mbox cmd response: failed
1,446,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,446,623 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,806 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,396 >>> mbox cmd response: failed
1,443,396 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,402 >>> mbox cmd response: failed
1,443,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,408 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,703 UART: [state] WD Timer not started. Device not locked for debugging
88,020 UART: [kat] SHA2-256
893,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,795 UART: [kat] ++
897,947 UART: [kat] sha1
902,079 UART: [kat] SHA2-256
904,019 UART: [kat] SHA2-384
906,792 UART: [kat] SHA2-512-ACC
908,693 UART: [kat] ECC-384
918,438 UART: [kat] HMAC-384Kdf
923,050 UART: [kat] LMS
1,171,378 UART: [kat] --
1,172,183 UART: [cold-reset] ++
1,172,735 UART: [fht] FHT @ 0x50003400
1,175,456 UART: [idev] ++
1,175,624 UART: [idev] CDI.KEYID = 6
1,175,984 UART: [idev] SUBJECT.KEYID = 7
1,176,408 UART: [idev] UDS.KEYID = 0
1,176,753 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,434 UART: [idev] Erasing UDS.KEYID = 0
1,201,403 UART: [idev] Sha1 KeyId Algorithm
1,209,773 UART: [idev] --
1,210,803 UART: [ldev] ++
1,210,971 UART: [ldev] CDI.KEYID = 6
1,211,334 UART: [ldev] SUBJECT.KEYID = 5
1,211,760 UART: [ldev] AUTHORITY.KEYID = 7
1,212,223 UART: [ldev] FE.KEYID = 1
1,216,997 UART: [ldev] Erasing FE.KEYID = 1
1,243,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,813 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,282,966 UART: [fwproc] Recv command 0x46574c44
1,283,694 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,794 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,727 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,897 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,134 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,079,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,442,072 >>> mbox cmd response: failed
1,442,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,078 >>> mbox cmd response: failed
1,442,078 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,442,084 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,221 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,444,367 >>> mbox cmd response: failed
1,444,367 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,373 >>> mbox cmd response: failed
1,444,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,444,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,536 UART: [state] WD Timer not started. Device not locked for debugging
87,651 UART: [kat] SHA2-256
893,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,426 UART: [kat] ++
897,578 UART: [kat] sha1
901,712 UART: [kat] SHA2-256
903,652 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
918,301 UART: [kat] HMAC-384Kdf
923,039 UART: [kat] LMS
1,171,367 UART: [kat] --
1,172,280 UART: [cold-reset] ++
1,172,656 UART: [fht] FHT @ 0x50003400
1,175,373 UART: [idev] ++
1,175,541 UART: [idev] CDI.KEYID = 6
1,175,901 UART: [idev] SUBJECT.KEYID = 7
1,176,325 UART: [idev] UDS.KEYID = 0
1,176,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,563 UART: [idev] Erasing UDS.KEYID = 0
1,201,548 UART: [idev] Sha1 KeyId Algorithm
1,210,064 UART: [idev] --
1,211,078 UART: [ldev] ++
1,211,246 UART: [ldev] CDI.KEYID = 6
1,211,609 UART: [ldev] SUBJECT.KEYID = 5
1,212,035 UART: [ldev] AUTHORITY.KEYID = 7
1,212,498 UART: [ldev] FE.KEYID = 1
1,217,562 UART: [ldev] Erasing FE.KEYID = 1
1,244,009 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,006 UART: [ldev] --
1,283,469 UART: [fwproc] Wait for Commands...
1,284,283 UART: [fwproc] Recv command 0x46574c44
1,285,011 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,507 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,480 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,650 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,813 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,443,673 >>> mbox cmd response: failed
1,443,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,679 >>> mbox cmd response: failed
1,443,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,443,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,006 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,982 writing to cptra_bootfsm_go
192,115 UART:
192,486 UART: Running Caliptra ROM ...
193,600 UART:
193,749 UART: [state] CFI Enabled
264,469 UART: [state] LifecycleState = Unprovisioned
266,526 UART: [state] DebugLocked = No
268,854 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,250 UART: [kat] SHA2-256
442,961 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,488 UART: [kat] ++
453,963 UART: [kat] sha1
465,217 UART: [kat] SHA2-256
467,914 UART: [kat] SHA2-384
474,490 UART: [kat] SHA2-512-ACC
476,828 UART: [kat] ECC-384
2,765,200 UART: [kat] HMAC-384Kdf
2,778,247 UART: [kat] LMS
3,968,553 UART: [kat] --
3,971,583 UART: [cold-reset] ++
3,972,713 UART: [fht] Storing FHT @ 0x50003400
3,985,707 UART: [idev] ++
3,986,280 UART: [idev] CDI.KEYID = 6
3,987,205 UART: [idev] SUBJECT.KEYID = 7
3,988,424 UART: [idev] UDS.KEYID = 0
3,991,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,569 UART: [idev] Erasing UDS.KEYID = 0
7,324,028 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,863 UART: [idev] --
7,350,675 UART: [ldev] ++
7,351,248 UART: [ldev] CDI.KEYID = 6
7,352,213 UART: [ldev] SUBJECT.KEYID = 5
7,353,428 UART: [ldev] AUTHORITY.KEYID = 7
7,354,663 UART: [ldev] FE.KEYID = 1
7,382,219 UART: [ldev] Erasing FE.KEYID = 1
10,714,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,483 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,092,549 UART: [ldev] --
13,096,523 UART: [fwproc] Waiting for Commands...
13,098,844 UART: [fwproc] Received command 0x46574c44
13,101,032 UART: [fwproc] Received Image of size 118548 bytes
17,202,986 UART: ROM Fatal Error: 0x000B0016
17,206,459 >>> mbox cmd response: failed
17,206,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,207,238 >>> mbox cmd response: failed
17,207,514 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,207,811 >>> mbox cmd response: failed
Initializing fuses
2,057,384 writing to cptra_bootfsm_go
2,246,718 UART:
2,247,049 UART: Running Caliptra ROM ...
2,248,180 UART:
2,248,346 UART: [state] CFI Enabled
2,314,638 UART: [state] LifecycleState = Unprovisioned
2,316,585 UART: [state] DebugLocked = No
2,319,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,613 UART: [kat] SHA2-256
2,494,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,841 UART: [kat] ++
2,505,303 UART: [kat] sha1
2,515,654 UART: [kat] SHA2-256
2,518,350 UART: [kat] SHA2-384
2,525,636 UART: [kat] SHA2-512-ACC
2,528,046 UART: [kat] ECC-384
4,821,589 UART: [kat] HMAC-384Kdf
4,853,608 UART: [kat] LMS
6,043,947 UART: [kat] --
6,047,858 UART: [cold-reset] ++
6,050,288 UART: [fht] Storing FHT @ 0x50003400
6,061,887 UART: [idev] ++
6,062,455 UART: [idev] CDI.KEYID = 6
6,063,424 UART: [idev] SUBJECT.KEYID = 7
6,064,643 UART: [idev] UDS.KEYID = 0
6,066,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,136 UART: [idev] Erasing UDS.KEYID = 0
9,399,237 UART: [idev] Using Sha1 for KeyId Algorithm
9,419,761 UART: [idev] --
9,424,723 UART: [ldev] ++
9,425,289 UART: [ldev] CDI.KEYID = 6
9,426,228 UART: [ldev] SUBJECT.KEYID = 5
9,427,486 UART: [ldev] AUTHORITY.KEYID = 7
9,428,667 UART: [ldev] FE.KEYID = 1
9,454,250 UART: [ldev] Erasing FE.KEYID = 1
12,786,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,081,347 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,932 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,125,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,145,717 UART: [ldev] --
15,151,264 UART: [fwproc] Waiting for Commands...
15,154,338 UART: [fwproc] Received command 0x46574c44
15,156,522 UART: [fwproc] Received Image of size 118548 bytes
19,254,496 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,330,037 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,403,225 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,731,395 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
3,784,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,189,551 >>> mbox cmd response: failed
17,190,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,190,896 >>> mbox cmd response: failed
17,191,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,191,467 >>> mbox cmd response: failed
Initializing fuses
2,048,724 writing to cptra_bootfsm_go
5,832,134 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,015,909 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
192,759 UART:
193,131 UART: Running Caliptra ROM ...
194,233 UART:
603,827 UART: [state] CFI Enabled
618,899 UART: [state] LifecycleState = Unprovisioned
620,842 UART: [state] DebugLocked = No
622,602 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,038 UART: [kat] SHA2-256
797,744 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,284 UART: [kat] ++
808,793 UART: [kat] sha1
818,973 UART: [kat] SHA2-256
821,719 UART: [kat] SHA2-384
827,754 UART: [kat] SHA2-512-ACC
830,094 UART: [kat] ECC-384
3,113,190 UART: [kat] HMAC-384Kdf
3,126,013 UART: [kat] LMS
4,316,131 UART: [kat] --
4,320,362 UART: [cold-reset] ++
4,321,607 UART: [fht] Storing FHT @ 0x50003400
4,333,799 UART: [idev] ++
4,334,367 UART: [idev] CDI.KEYID = 6
4,335,391 UART: [idev] SUBJECT.KEYID = 7
4,336,558 UART: [idev] UDS.KEYID = 0
4,339,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,431 UART: [idev] Erasing UDS.KEYID = 0
7,620,786 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,485 UART: [idev] --
7,647,569 UART: [ldev] ++
7,648,148 UART: [ldev] CDI.KEYID = 6
7,649,123 UART: [ldev] SUBJECT.KEYID = 5
7,650,349 UART: [ldev] AUTHORITY.KEYID = 7
7,651,588 UART: [ldev] FE.KEYID = 1
7,662,844 UART: [ldev] Erasing FE.KEYID = 1
10,949,958 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,378 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,978 UART: [ldev] --
13,311,494 UART: [fwproc] Waiting for Commands...
13,314,408 UART: [fwproc] Received command 0x46574c44
13,316,620 UART: [fwproc] Received Image of size 118548 bytes
17,412,623 UART: ROM Fatal Error: 0x000B0016
17,416,098 >>> mbox cmd response: failed
17,416,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,416,912 >>> mbox cmd response: failed
17,417,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,417,477 >>> mbox cmd response: failed
Initializing fuses
2,054,593 writing to cptra_bootfsm_go
2,243,867 UART:
2,244,208 UART: Running Caliptra ROM ...
2,245,355 UART:
3,049,639 UART: [state] CFI Enabled
3,062,629 UART: [state] LifecycleState = Unprovisioned
3,064,543 UART: [state] DebugLocked = No
3,066,880 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,072,218 UART: [kat] SHA2-256
3,241,960 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,252,488 UART: [kat] ++
3,252,984 UART: [kat] sha1
3,264,903 UART: [kat] SHA2-256
3,267,603 UART: [kat] SHA2-384
3,275,055 UART: [kat] SHA2-512-ACC
3,277,416 UART: [kat] ECC-384
5,559,966 UART: [kat] HMAC-384Kdf
5,570,547 UART: [kat] LMS
6,760,705 UART: [kat] --
6,764,291 UART: [cold-reset] ++
6,765,315 UART: [fht] Storing FHT @ 0x50003400
6,777,417 UART: [idev] ++
6,777,997 UART: [idev] CDI.KEYID = 6
6,778,913 UART: [idev] SUBJECT.KEYID = 7
6,780,196 UART: [idev] UDS.KEYID = 0
6,782,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,931,936 UART: [idev] Erasing UDS.KEYID = 0
10,067,204 UART: [idev] Using Sha1 for KeyId Algorithm
10,089,037 UART: [idev] --
10,092,501 UART: [ldev] ++
10,093,124 UART: [ldev] CDI.KEYID = 6
10,094,049 UART: [ldev] SUBJECT.KEYID = 5
10,095,263 UART: [ldev] AUTHORITY.KEYID = 7
10,096,510 UART: [ldev] FE.KEYID = 1
10,105,921 UART: [ldev] Erasing FE.KEYID = 1
13,394,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,686,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,700,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,715,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,730,268 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,749,958 UART: [ldev] --
15,755,548 UART: [fwproc] Waiting for Commands...
15,757,223 UART: [fwproc] Received command 0x46574c44
15,759,420 UART: [fwproc] Received Image of size 118548 bytes
19,859,993 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,937,751 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,010,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,339,510 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
4,127,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,405,621 >>> mbox cmd response: failed
17,406,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,406,710 >>> mbox cmd response: failed
17,406,983 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,407,283 >>> mbox cmd response: failed
Initializing fuses
2,052,628 writing to cptra_bootfsm_go
6,591,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,626,338 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,161 writing to cptra_bootfsm_go
192,339 UART:
192,705 UART: Running Caliptra ROM ...
193,881 UART:
194,036 UART: [state] CFI Enabled
263,810 UART: [state] LifecycleState = Unprovisioned
265,752 UART: [state] DebugLocked = No
268,599 UART: [state] WD Timer not started. Device not locked for debugging
272,344 UART: [kat] SHA2-256
451,992 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,801 UART: [kat] ++
463,256 UART: [kat] sha1
475,158 UART: [kat] SHA2-256
477,847 UART: [kat] SHA2-384
484,154 UART: [kat] SHA2-512-ACC
486,503 UART: [kat] ECC-384
2,947,716 UART: [kat] HMAC-384Kdf
2,972,239 UART: [kat] LMS
3,448,769 UART: [kat] --
3,452,766 UART: [cold-reset] ++
3,454,873 UART: [fht] FHT @ 0x50003400
3,466,020 UART: [idev] ++
3,466,598 UART: [idev] CDI.KEYID = 6
3,467,574 UART: [idev] SUBJECT.KEYID = 7
3,468,795 UART: [idev] UDS.KEYID = 0
3,471,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,928 UART: [idev] Erasing UDS.KEYID = 0
5,981,969 UART: [idev] Sha1 KeyId Algorithm
6,006,127 UART: [idev] --
6,011,327 UART: [ldev] ++
6,011,963 UART: [ldev] CDI.KEYID = 6
6,012,863 UART: [ldev] SUBJECT.KEYID = 5
6,014,101 UART: [ldev] AUTHORITY.KEYID = 7
6,015,352 UART: [ldev] FE.KEYID = 1
6,056,562 UART: [ldev] Erasing FE.KEYID = 1
8,565,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,216 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,468 UART: [ldev] --
10,374,342 UART: [fwproc] Wait for Commands...
10,377,633 UART: [fwproc] Recv command 0x46574c44
10,379,624 UART: [fwproc] Recv'd Img size: 118548 bytes
13,856,993 UART: ROM Fatal Error: 0x000B0016
13,860,252 >>> mbox cmd response: failed
13,860,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,078 >>> mbox cmd response: failed
13,861,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,629 >>> mbox cmd response: failed
Initializing fuses
2,059,850 writing to cptra_bootfsm_go
2,249,205 UART:
2,249,554 UART: Running Caliptra ROM ...
2,250,693 UART:
2,250,866 UART: [state] CFI Enabled
2,312,295 UART: [state] LifecycleState = Unprovisioned
2,314,235 UART: [state] DebugLocked = No
2,316,227 UART: [state] WD Timer not started. Device not locked for debugging
2,319,542 UART: [kat] SHA2-256
2,499,172 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,938 UART: [kat] ++
2,510,495 UART: [kat] sha1
2,520,807 UART: [kat] SHA2-256
2,523,517 UART: [kat] SHA2-384
2,529,727 UART: [kat] SHA2-512-ACC
2,532,136 UART: [kat] ECC-384
4,996,184 UART: [kat] HMAC-384Kdf
5,018,466 UART: [kat] LMS
5,494,946 UART: [kat] --
5,499,858 UART: [cold-reset] ++
5,501,904 UART: [fht] FHT @ 0x50003400
5,512,510 UART: [idev] ++
5,513,135 UART: [idev] CDI.KEYID = 6
5,514,069 UART: [idev] SUBJECT.KEYID = 7
5,515,295 UART: [idev] UDS.KEYID = 0
5,518,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,359 UART: [idev] Erasing UDS.KEYID = 0
8,034,770 UART: [idev] Sha1 KeyId Algorithm
8,058,934 UART: [idev] --
8,064,074 UART: [ldev] ++
8,064,657 UART: [ldev] CDI.KEYID = 6
8,065,583 UART: [ldev] SUBJECT.KEYID = 5
8,066,808 UART: [ldev] AUTHORITY.KEYID = 7
8,068,054 UART: [ldev] FE.KEYID = 1
8,106,803 UART: [ldev] Erasing FE.KEYID = 1
10,614,356 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,347,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,249 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,394,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,115 UART: [ldev] --
12,423,057 UART: [fwproc] Wait for Commands...
12,426,092 UART: [fwproc] Recv command 0x46574c44
12,428,109 UART: [fwproc] Recv'd Img size: 118548 bytes
15,903,294 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,215 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,239 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,386,094 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,463,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,780,782 >>> mbox cmd response: failed
13,781,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,781,935 >>> mbox cmd response: failed
13,782,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,782,502 >>> mbox cmd response: failed
Initializing fuses
2,073,223 writing to cptra_bootfsm_go
5,525,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,310,891 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,589 UART:
193,103 UART: Running Caliptra ROM ...
194,224 UART:
603,644 UART: [state] CFI Enabled
617,060 UART: [state] LifecycleState = Unprovisioned
619,050 UART: [state] DebugLocked = No
621,532 UART: [state] WD Timer not started. Device not locked for debugging
625,228 UART: [kat] SHA2-256
804,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,677 UART: [kat] ++
816,216 UART: [kat] sha1
826,949 UART: [kat] SHA2-256
829,649 UART: [kat] SHA2-384
834,828 UART: [kat] SHA2-512-ACC
837,174 UART: [kat] ECC-384
3,277,625 UART: [kat] HMAC-384Kdf
3,290,410 UART: [kat] LMS
3,766,912 UART: [kat] --
3,769,015 UART: [cold-reset] ++
3,769,927 UART: [fht] FHT @ 0x50003400
3,780,477 UART: [idev] ++
3,781,042 UART: [idev] CDI.KEYID = 6
3,782,066 UART: [idev] SUBJECT.KEYID = 7
3,783,233 UART: [idev] UDS.KEYID = 0
3,786,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,953 UART: [idev] Erasing UDS.KEYID = 0
6,259,810 UART: [idev] Sha1 KeyId Algorithm
6,282,671 UART: [idev] --
6,287,285 UART: [ldev] ++
6,287,860 UART: [ldev] CDI.KEYID = 6
6,288,944 UART: [ldev] SUBJECT.KEYID = 5
6,290,065 UART: [ldev] AUTHORITY.KEYID = 7
6,291,256 UART: [ldev] FE.KEYID = 1
6,300,726 UART: [ldev] Erasing FE.KEYID = 1
8,779,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,722 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,862 UART: [ldev] --
10,574,970 UART: [fwproc] Wait for Commands...
10,578,154 UART: [fwproc] Recv command 0x46574c44
10,580,151 UART: [fwproc] Recv'd Img size: 118548 bytes
14,054,247 UART: ROM Fatal Error: 0x000B0016
14,057,489 >>> mbox cmd response: failed
14,057,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,058,308 >>> mbox cmd response: failed
14,058,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,058,877 >>> mbox cmd response: failed
Initializing fuses
2,058,746 writing to cptra_bootfsm_go
2,248,062 UART:
2,248,410 UART: Running Caliptra ROM ...
2,249,504 UART:
6,409,981 UART: [state] CFI Enabled
6,424,811 UART: [state] LifecycleState = Unprovisioned
6,426,797 UART: [state] DebugLocked = No
6,429,135 UART: [state] WD Timer not started. Device not locked for debugging
6,433,595 UART: [kat] SHA2-256
6,613,243 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,624,016 UART: [kat] ++
6,624,530 UART: [kat] sha1
6,634,675 UART: [kat] SHA2-256
6,637,369 UART: [kat] SHA2-384
6,644,667 UART: [kat] SHA2-512-ACC
6,647,024 UART: [kat] ECC-384
9,089,467 UART: [kat] HMAC-384Kdf
9,101,274 UART: [kat] LMS
9,577,756 UART: [kat] --
9,583,694 UART: [cold-reset] ++
9,584,655 UART: [fht] FHT @ 0x50003400
9,597,281 UART: [idev] ++
9,597,893 UART: [idev] CDI.KEYID = 6
9,598,808 UART: [idev] SUBJECT.KEYID = 7
9,600,032 UART: [idev] UDS.KEYID = 0
9,602,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,751,846 UART: [idev] Erasing UDS.KEYID = 0
12,081,318 UART: [idev] Sha1 KeyId Algorithm
12,105,475 UART: [idev] --
12,110,177 UART: [ldev] ++
12,110,747 UART: [ldev] CDI.KEYID = 6
12,111,714 UART: [ldev] SUBJECT.KEYID = 5
12,112,876 UART: [ldev] AUTHORITY.KEYID = 7
12,114,169 UART: [ldev] FE.KEYID = 1
12,123,790 UART: [ldev] Erasing FE.KEYID = 1
14,606,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,326,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,342,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,358,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,374,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,397,233 UART: [ldev] --
16,402,190 UART: [fwproc] Wait for Commands...
16,403,977 UART: [fwproc] Recv command 0x46574c44
16,405,975 UART: [fwproc] Recv'd Img size: 118548 bytes
19,895,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,976,130 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,049,147 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,377,258 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
3,778,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,979,053 >>> mbox cmd response: failed
13,979,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,980,163 >>> mbox cmd response: failed
13,980,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,980,756 >>> mbox cmd response: failed
Initializing fuses
2,060,554 writing to cptra_bootfsm_go
9,670,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,333,880 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,171 UART:
192,527 UART: Running Caliptra ROM ...
193,632 UART:
193,781 UART: [state] CFI Enabled
263,772 UART: [state] LifecycleState = Unprovisioned
266,169 UART: [state] DebugLocked = No
268,444 UART: [state] WD Timer not started. Device not locked for debugging
273,633 UART: [kat] SHA2-256
463,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,283 UART: [kat] ++
474,739 UART: [kat] sha1
485,951 UART: [kat] SHA2-256
489,017 UART: [kat] SHA2-384
495,488 UART: [kat] SHA2-512-ACC
498,057 UART: [kat] ECC-384
2,950,611 UART: [kat] HMAC-384Kdf
2,972,148 UART: [kat] LMS
3,503,895 UART: [kat] --
3,508,806 UART: [cold-reset] ++
3,510,608 UART: [fht] FHT @ 0x50003400
3,523,649 UART: [idev] ++
3,524,329 UART: [idev] CDI.KEYID = 6
3,525,269 UART: [idev] SUBJECT.KEYID = 7
3,526,485 UART: [idev] UDS.KEYID = 0
3,529,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,678,581 UART: [idev] Erasing UDS.KEYID = 0
6,033,021 UART: [idev] Sha1 KeyId Algorithm
6,054,647 UART: [idev] --
6,059,029 UART: [ldev] ++
6,059,720 UART: [ldev] CDI.KEYID = 6
6,060,607 UART: [ldev] SUBJECT.KEYID = 5
6,061,822 UART: [ldev] AUTHORITY.KEYID = 7
6,063,062 UART: [ldev] FE.KEYID = 1
6,101,406 UART: [ldev] Erasing FE.KEYID = 1
8,604,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,433 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,765 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,496 UART: [ldev] --
10,414,652 UART: [fwproc] Wait for Commands...
10,416,490 UART: [fwproc] Recv command 0x46574c44
10,418,755 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,803 UART: ROM Fatal Error: 0x000B0016
13,916,422 >>> mbox cmd response: failed
13,916,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,177 >>> mbox cmd response: failed
13,917,450 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,763 >>> mbox cmd response: failed
Initializing fuses
2,061,128 writing to cptra_bootfsm_go
2,250,480 UART:
2,250,838 UART: Running Caliptra ROM ...
2,251,949 UART:
2,252,112 UART: [state] CFI Enabled
2,321,582 UART: [state] LifecycleState = Unprovisioned
2,323,985 UART: [state] DebugLocked = No
2,325,549 UART: [state] WD Timer not started. Device not locked for debugging
2,330,546 UART: [kat] SHA2-256
2,520,399 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,180 UART: [kat] ++
2,531,731 UART: [kat] sha1
2,543,713 UART: [kat] SHA2-256
2,546,742 UART: [kat] SHA2-384
2,553,596 UART: [kat] SHA2-512-ACC
2,556,206 UART: [kat] ECC-384
5,006,786 UART: [kat] HMAC-384Kdf
5,029,231 UART: [kat] LMS
5,561,008 UART: [kat] --
5,564,653 UART: [cold-reset] ++
5,566,433 UART: [fht] FHT @ 0x50003400
5,576,820 UART: [idev] ++
5,577,509 UART: [idev] CDI.KEYID = 6
5,578,529 UART: [idev] SUBJECT.KEYID = 7
5,579,636 UART: [idev] UDS.KEYID = 0
5,581,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,117 UART: [idev] Erasing UDS.KEYID = 0
8,084,276 UART: [idev] Sha1 KeyId Algorithm
8,106,115 UART: [idev] --
8,110,824 UART: [ldev] ++
8,111,519 UART: [ldev] CDI.KEYID = 6
8,112,408 UART: [ldev] SUBJECT.KEYID = 5
8,113,626 UART: [ldev] AUTHORITY.KEYID = 7
8,114,850 UART: [ldev] FE.KEYID = 1
8,156,626 UART: [ldev] Erasing FE.KEYID = 1
10,659,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,908 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,303 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,943 UART: [ldev] --
12,469,126 UART: [fwproc] Wait for Commands...
12,471,803 UART: [fwproc] Recv command 0x46574c44
12,474,128 UART: [fwproc] Recv'd Img size: 118548 bytes
15,972,209 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,179,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,741,009 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,441,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,358,185 >>> mbox cmd response: failed
14,359,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,359,388 >>> mbox cmd response: failed
14,359,667 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,359,983 >>> mbox cmd response: failed
Initializing fuses
2,060,501 writing to cptra_bootfsm_go
5,495,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,883,138 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
192,558 UART:
192,926 UART: Running Caliptra ROM ...
194,056 UART:
603,946 UART: [state] CFI Enabled
615,453 UART: [state] LifecycleState = Unprovisioned
617,834 UART: [state] DebugLocked = No
619,861 UART: [state] WD Timer not started. Device not locked for debugging
624,584 UART: [kat] SHA2-256
814,481 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,268 UART: [kat] ++
825,722 UART: [kat] sha1
837,739 UART: [kat] SHA2-256
840,759 UART: [kat] SHA2-384
845,825 UART: [kat] SHA2-512-ACC
848,404 UART: [kat] ECC-384
3,289,224 UART: [kat] HMAC-384Kdf
3,301,732 UART: [kat] LMS
3,833,567 UART: [kat] --
3,837,694 UART: [cold-reset] ++
3,839,692 UART: [fht] FHT @ 0x50003400
3,850,514 UART: [idev] ++
3,851,254 UART: [idev] CDI.KEYID = 6
3,852,329 UART: [idev] SUBJECT.KEYID = 7
3,853,439 UART: [idev] UDS.KEYID = 0
3,856,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,005,571 UART: [idev] Erasing UDS.KEYID = 0
6,333,601 UART: [idev] Sha1 KeyId Algorithm
6,355,364 UART: [idev] --
6,360,046 UART: [ldev] ++
6,360,741 UART: [ldev] CDI.KEYID = 6
6,361,650 UART: [ldev] SUBJECT.KEYID = 5
6,362,767 UART: [ldev] AUTHORITY.KEYID = 7
6,363,974 UART: [ldev] FE.KEYID = 1
6,375,655 UART: [ldev] Erasing FE.KEYID = 1
8,857,866 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,637 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,302 UART: [ldev] --
10,648,438 UART: [fwproc] Wait for Commands...
10,650,110 UART: [fwproc] Recv command 0x46574c44
10,652,381 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,186 UART: ROM Fatal Error: 0x000B0016
14,149,868 >>> mbox cmd response: failed
14,150,298 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,150,656 >>> mbox cmd response: failed
14,150,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,151,239 >>> mbox cmd response: failed
Initializing fuses
2,059,407 writing to cptra_bootfsm_go
2,248,729 UART:
2,249,072 UART: Running Caliptra ROM ...
2,250,171 UART:
6,319,184 UART: [state] CFI Enabled
6,336,054 UART: [state] LifecycleState = Unprovisioned
6,338,469 UART: [state] DebugLocked = No
6,340,757 UART: [state] WD Timer not started. Device not locked for debugging
6,345,655 UART: [kat] SHA2-256
6,535,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,546,326 UART: [kat] ++
6,546,849 UART: [kat] sha1
6,557,417 UART: [kat] SHA2-256
6,560,447 UART: [kat] SHA2-384
6,567,309 UART: [kat] SHA2-512-ACC
6,569,938 UART: [kat] ECC-384
9,012,172 UART: [kat] HMAC-384Kdf
9,024,088 UART: [kat] LMS
9,555,954 UART: [kat] --
9,560,755 UART: [cold-reset] ++
9,561,770 UART: [fht] FHT @ 0x50003400
9,574,211 UART: [idev] ++
9,574,891 UART: [idev] CDI.KEYID = 6
9,575,805 UART: [idev] SUBJECT.KEYID = 7
9,577,035 UART: [idev] UDS.KEYID = 0
9,579,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,728,417 UART: [idev] Erasing UDS.KEYID = 0
12,053,191 UART: [idev] Sha1 KeyId Algorithm
12,075,840 UART: [idev] --
12,080,107 UART: [ldev] ++
12,080,792 UART: [ldev] CDI.KEYID = 6
12,081,711 UART: [ldev] SUBJECT.KEYID = 5
12,082,879 UART: [ldev] AUTHORITY.KEYID = 7
12,084,116 UART: [ldev] FE.KEYID = 1
12,095,039 UART: [ldev] Erasing FE.KEYID = 1
14,573,232 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,289,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,304,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,319,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,334,566 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,355,505 UART: [ldev] --
16,360,890 UART: [fwproc] Wait for Commands...
16,362,515 UART: [fwproc] Recv command 0x46574c44
16,364,790 UART: [fwproc] Recv'd Img size: 118548 bytes
19,860,055 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,936,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,059,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,620,798 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
3,757,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,559,589 >>> mbox cmd response: failed
14,560,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,560,592 >>> mbox cmd response: failed
14,560,867 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,561,165 >>> mbox cmd response: failed
Initializing fuses
2,060,396 writing to cptra_bootfsm_go
9,056,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,350,175 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,279 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,921 UART: [kat] SHA2-256
881,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,967 UART: [kat] ++
886,119 UART: [kat] sha1
890,399 UART: [kat] SHA2-256
892,337 UART: [kat] SHA2-384
895,228 UART: [kat] SHA2-512-ACC
897,129 UART: [kat] ECC-384
902,856 UART: [kat] HMAC-384Kdf
907,594 UART: [kat] LMS
1,475,790 UART: [kat] --
1,476,767 UART: [cold-reset] ++
1,477,197 UART: [fht] Storing FHT @ 0x50003400
1,479,786 UART: [idev] ++
1,479,954 UART: [idev] CDI.KEYID = 6
1,480,314 UART: [idev] SUBJECT.KEYID = 7
1,480,738 UART: [idev] UDS.KEYID = 0
1,481,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,558 UART: [idev] Erasing UDS.KEYID = 0
1,505,232 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,876 UART: [idev] --
1,514,839 UART: [ldev] ++
1,515,007 UART: [ldev] CDI.KEYID = 6
1,515,370 UART: [ldev] SUBJECT.KEYID = 5
1,515,796 UART: [ldev] AUTHORITY.KEYID = 7
1,516,259 UART: [ldev] FE.KEYID = 1
1,521,505 UART: [ldev] Erasing FE.KEYID = 1
1,546,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,531 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,247 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,138 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,850 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,586,976 UART: [fwproc] Received command 0x46574c44
1,587,767 UART: [fwproc] Received Image of size 118548 bytes
2,930,525 UART: ROM Fatal Error: 0x000B0016
2,931,682 >>> mbox cmd response: failed
2,931,682 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,688 >>> mbox cmd response: failed
2,931,688 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,694 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,462 UART: [state] LifecycleState = Unprovisioned
86,117 UART: [state] DebugLocked = No
86,643 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,173 UART: [kat] SHA2-256
882,104 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,219 UART: [kat] ++
886,371 UART: [kat] sha1
890,771 UART: [kat] SHA2-256
892,709 UART: [kat] SHA2-384
895,402 UART: [kat] SHA2-512-ACC
897,303 UART: [kat] ECC-384
903,154 UART: [kat] HMAC-384Kdf
907,692 UART: [kat] LMS
1,475,888 UART: [kat] --
1,477,029 UART: [cold-reset] ++
1,477,565 UART: [fht] Storing FHT @ 0x50003400
1,480,376 UART: [idev] ++
1,480,544 UART: [idev] CDI.KEYID = 6
1,480,904 UART: [idev] SUBJECT.KEYID = 7
1,481,328 UART: [idev] UDS.KEYID = 0
1,481,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,028 UART: [idev] Erasing UDS.KEYID = 0
1,505,884 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,324 UART: [idev] --
1,515,281 UART: [ldev] ++
1,515,449 UART: [ldev] CDI.KEYID = 6
1,515,812 UART: [ldev] SUBJECT.KEYID = 5
1,516,238 UART: [ldev] AUTHORITY.KEYID = 7
1,516,701 UART: [ldev] FE.KEYID = 1
1,522,081 UART: [ldev] Erasing FE.KEYID = 1
1,547,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,216 UART: [ldev] --
1,586,663 UART: [fwproc] Waiting for Commands...
1,587,456 UART: [fwproc] Received command 0x46574c44
1,588,247 UART: [fwproc] Received Image of size 118548 bytes
2,931,608 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,700 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,918 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,281 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,783,369 >>> mbox cmd response: failed
2,783,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,375 >>> mbox cmd response: failed
2,783,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,783,381 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,357 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,887 UART: [state] LifecycleState = Unprovisioned
85,542 UART: [state] DebugLocked = No
86,256 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,916 UART: [kat] SHA2-256
881,847 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,962 UART: [kat] ++
886,114 UART: [kat] sha1
890,460 UART: [kat] SHA2-256
892,398 UART: [kat] SHA2-384
895,005 UART: [kat] SHA2-512-ACC
896,906 UART: [kat] ECC-384
902,323 UART: [kat] HMAC-384Kdf
906,825 UART: [kat] LMS
1,475,021 UART: [kat] --
1,475,966 UART: [cold-reset] ++
1,476,402 UART: [fht] Storing FHT @ 0x50003400
1,479,247 UART: [idev] ++
1,479,415 UART: [idev] CDI.KEYID = 6
1,479,775 UART: [idev] SUBJECT.KEYID = 7
1,480,199 UART: [idev] UDS.KEYID = 0
1,480,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,829 UART: [idev] Erasing UDS.KEYID = 0
1,504,419 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,123 UART: [idev] --
1,514,130 UART: [ldev] ++
1,514,298 UART: [ldev] CDI.KEYID = 6
1,514,661 UART: [ldev] SUBJECT.KEYID = 5
1,515,087 UART: [ldev] AUTHORITY.KEYID = 7
1,515,550 UART: [ldev] FE.KEYID = 1
1,520,646 UART: [ldev] Erasing FE.KEYID = 1
1,545,815 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,689 UART: [ldev] --
1,584,950 UART: [fwproc] Waiting for Commands...
1,585,763 UART: [fwproc] Received command 0x46574c44
1,586,554 UART: [fwproc] Received Image of size 118548 bytes
2,930,198 UART: ROM Fatal Error: 0x000B0016
2,931,355 >>> mbox cmd response: failed
2,931,355 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,361 >>> mbox cmd response: failed
2,931,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,043 UART: [state] LifecycleState = Unprovisioned
85,698 UART: [state] DebugLocked = No
86,404 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,996 UART: [kat] SHA2-256
881,927 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,042 UART: [kat] ++
886,194 UART: [kat] sha1
890,566 UART: [kat] SHA2-256
892,504 UART: [kat] SHA2-384
895,249 UART: [kat] SHA2-512-ACC
897,150 UART: [kat] ECC-384
902,755 UART: [kat] HMAC-384Kdf
907,429 UART: [kat] LMS
1,475,625 UART: [kat] --
1,476,426 UART: [cold-reset] ++
1,476,800 UART: [fht] Storing FHT @ 0x50003400
1,479,567 UART: [idev] ++
1,479,735 UART: [idev] CDI.KEYID = 6
1,480,095 UART: [idev] SUBJECT.KEYID = 7
1,480,519 UART: [idev] UDS.KEYID = 0
1,480,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,797 UART: [idev] Erasing UDS.KEYID = 0
1,505,769 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,425 UART: [idev] --
1,515,472 UART: [ldev] ++
1,515,640 UART: [ldev] CDI.KEYID = 6
1,516,003 UART: [ldev] SUBJECT.KEYID = 5
1,516,429 UART: [ldev] AUTHORITY.KEYID = 7
1,516,892 UART: [ldev] FE.KEYID = 1
1,522,094 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,141 UART: [ldev] --
1,587,538 UART: [fwproc] Waiting for Commands...
1,588,191 UART: [fwproc] Received command 0x46574c44
1,588,982 UART: [fwproc] Received Image of size 118548 bytes
2,933,919 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,613 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,831 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,186 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,518 >>> mbox cmd response: failed
2,784,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,524 >>> mbox cmd response: failed
2,784,524 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,806 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,344 UART: [state] LifecycleState = Unprovisioned
85,999 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,894 UART: [kat] SHA2-256
891,444 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,548 UART: [kat] ++
895,700 UART: [kat] sha1
900,034 UART: [kat] SHA2-256
901,974 UART: [kat] SHA2-384
904,603 UART: [kat] SHA2-512-ACC
906,504 UART: [kat] ECC-384
915,917 UART: [kat] HMAC-384Kdf
920,477 UART: [kat] LMS
1,168,789 UART: [kat] --
1,170,084 UART: [cold-reset] ++
1,170,524 UART: [fht] FHT @ 0x50003400
1,173,150 UART: [idev] ++
1,173,318 UART: [idev] CDI.KEYID = 6
1,173,679 UART: [idev] SUBJECT.KEYID = 7
1,174,104 UART: [idev] UDS.KEYID = 0
1,174,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,391 UART: [idev] Erasing UDS.KEYID = 0
1,199,805 UART: [idev] Sha1 KeyId Algorithm
1,208,587 UART: [idev] --
1,209,632 UART: [ldev] ++
1,209,800 UART: [ldev] CDI.KEYID = 6
1,210,164 UART: [ldev] SUBJECT.KEYID = 5
1,210,591 UART: [ldev] AUTHORITY.KEYID = 7
1,211,054 UART: [ldev] FE.KEYID = 1
1,216,418 UART: [ldev] Erasing FE.KEYID = 1
1,242,941 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,040 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,088 UART: [ldev] --
1,282,431 UART: [fwproc] Wait for Commands...
1,283,002 UART: [fwproc] Recv command 0x46574c44
1,283,735 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,834 UART: ROM Fatal Error: 0x000B0016
2,627,991 >>> mbox cmd response: failed
2,627,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,997 >>> mbox cmd response: failed
2,627,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,003 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,454 UART: [state] LifecycleState = Unprovisioned
86,109 UART: [state] DebugLocked = No
86,795 UART: [state] WD Timer not started. Device not locked for debugging
87,928 UART: [kat] SHA2-256
891,478 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,582 UART: [kat] ++
895,734 UART: [kat] sha1
899,890 UART: [kat] SHA2-256
901,830 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,091 UART: [kat] HMAC-384Kdf
920,719 UART: [kat] LMS
1,169,031 UART: [kat] --
1,169,722 UART: [cold-reset] ++
1,170,090 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,009 UART: [idev] Erasing UDS.KEYID = 0
1,199,155 UART: [idev] Sha1 KeyId Algorithm
1,208,027 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,726 UART: [ldev] Erasing FE.KEYID = 1
1,242,341 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,895 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,611 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,230 UART: [ldev] --
1,281,547 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x46574c44
1,283,089 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,439 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,200 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,375 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,768 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,774 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,500 >>> mbox cmd response: failed
2,483,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,506 >>> mbox cmd response: failed
2,483,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,501 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,511 UART: [state] LifecycleState = Unprovisioned
86,166 UART: [state] DebugLocked = No
86,874 UART: [state] WD Timer not started. Device not locked for debugging
88,103 UART: [kat] SHA2-256
891,653 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,757 UART: [kat] ++
895,909 UART: [kat] sha1
900,049 UART: [kat] SHA2-256
901,989 UART: [kat] SHA2-384
904,858 UART: [kat] SHA2-512-ACC
906,759 UART: [kat] ECC-384
916,330 UART: [kat] HMAC-384Kdf
921,070 UART: [kat] LMS
1,169,382 UART: [kat] --
1,170,067 UART: [cold-reset] ++
1,170,451 UART: [fht] FHT @ 0x50003400
1,173,237 UART: [idev] ++
1,173,405 UART: [idev] CDI.KEYID = 6
1,173,766 UART: [idev] SUBJECT.KEYID = 7
1,174,191 UART: [idev] UDS.KEYID = 0
1,174,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,094 UART: [idev] Erasing UDS.KEYID = 0
1,198,860 UART: [idev] Sha1 KeyId Algorithm
1,207,848 UART: [idev] --
1,209,013 UART: [ldev] ++
1,209,181 UART: [ldev] CDI.KEYID = 6
1,209,545 UART: [ldev] SUBJECT.KEYID = 5
1,209,972 UART: [ldev] AUTHORITY.KEYID = 7
1,210,435 UART: [ldev] FE.KEYID = 1
1,215,849 UART: [ldev] Erasing FE.KEYID = 1
1,242,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,952 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,557 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,269 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,708 UART: [fwproc] Wait for Commands...
1,282,395 UART: [fwproc] Recv command 0x46574c44
1,283,128 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,153 UART: ROM Fatal Error: 0x000B0016
2,627,310 >>> mbox cmd response: failed
2,627,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,316 >>> mbox cmd response: failed
2,627,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,322 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,359 UART: [state] LifecycleState = Unprovisioned
86,014 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,851 UART: [kat] SHA2-256
891,401 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,505 UART: [kat] ++
895,657 UART: [kat] sha1
899,813 UART: [kat] SHA2-256
901,753 UART: [kat] SHA2-384
904,502 UART: [kat] SHA2-512-ACC
906,403 UART: [kat] ECC-384
916,226 UART: [kat] HMAC-384Kdf
920,916 UART: [kat] LMS
1,169,228 UART: [kat] --
1,170,217 UART: [cold-reset] ++
1,170,719 UART: [fht] FHT @ 0x50003400
1,173,305 UART: [idev] ++
1,173,473 UART: [idev] CDI.KEYID = 6
1,173,834 UART: [idev] SUBJECT.KEYID = 7
1,174,259 UART: [idev] UDS.KEYID = 0
1,174,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,278 UART: [idev] Erasing UDS.KEYID = 0
1,199,180 UART: [idev] Sha1 KeyId Algorithm
1,207,892 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,669 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,097 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,995 UART: [ldev] --
1,281,420 UART: [fwproc] Wait for Commands...
1,282,021 UART: [fwproc] Recv command 0x46574c44
1,282,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,101 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,276 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,461 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,997 >>> mbox cmd response: failed
2,482,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,003 >>> mbox cmd response: failed
2,483,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,702 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
893,488 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,613 UART: [kat] ++
897,765 UART: [kat] sha1
902,225 UART: [kat] SHA2-256
904,165 UART: [kat] SHA2-384
906,926 UART: [kat] SHA2-512-ACC
908,827 UART: [kat] ECC-384
918,386 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,323 UART: [cold-reset] ++
1,172,723 UART: [fht] FHT @ 0x50003400
1,175,292 UART: [idev] ++
1,175,460 UART: [idev] CDI.KEYID = 6
1,175,820 UART: [idev] SUBJECT.KEYID = 7
1,176,244 UART: [idev] UDS.KEYID = 0
1,176,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,162 UART: [idev] Erasing UDS.KEYID = 0
1,200,495 UART: [idev] Sha1 KeyId Algorithm
1,208,951 UART: [idev] --
1,209,929 UART: [ldev] ++
1,210,097 UART: [ldev] CDI.KEYID = 6
1,210,460 UART: [ldev] SUBJECT.KEYID = 5
1,210,886 UART: [ldev] AUTHORITY.KEYID = 7
1,211,349 UART: [ldev] FE.KEYID = 1
1,216,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,046 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,479 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,086 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,798 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,007 UART: [ldev] --
1,282,290 UART: [fwproc] Wait for Commands...
1,282,994 UART: [fwproc] Recv command 0x46574c44
1,283,722 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,280 UART: ROM Fatal Error: 0x000B0016
2,629,437 >>> mbox cmd response: failed
2,629,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,443 >>> mbox cmd response: failed
2,629,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,449 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,129 UART: [state] WD Timer not started. Device not locked for debugging
87,374 UART: [kat] SHA2-256
893,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,149 UART: [kat] ++
897,301 UART: [kat] sha1
901,411 UART: [kat] SHA2-256
903,351 UART: [kat] SHA2-384
906,070 UART: [kat] SHA2-512-ACC
907,971 UART: [kat] ECC-384
918,262 UART: [kat] HMAC-384Kdf
922,832 UART: [kat] LMS
1,171,160 UART: [kat] --
1,172,363 UART: [cold-reset] ++
1,172,777 UART: [fht] FHT @ 0x50003400
1,175,390 UART: [idev] ++
1,175,558 UART: [idev] CDI.KEYID = 6
1,175,918 UART: [idev] SUBJECT.KEYID = 7
1,176,342 UART: [idev] UDS.KEYID = 0
1,176,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,410 UART: [idev] Erasing UDS.KEYID = 0
1,201,299 UART: [idev] Sha1 KeyId Algorithm
1,209,691 UART: [idev] --
1,210,695 UART: [ldev] ++
1,210,863 UART: [ldev] CDI.KEYID = 6
1,211,226 UART: [ldev] SUBJECT.KEYID = 5
1,211,652 UART: [ldev] AUTHORITY.KEYID = 7
1,212,115 UART: [ldev] FE.KEYID = 1
1,217,249 UART: [ldev] Erasing FE.KEYID = 1
1,242,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,864 UART: [fwproc] Wait for Commands...
1,282,626 UART: [fwproc] Recv command 0x46574c44
1,283,354 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,303 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,473 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,706 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,272 >>> mbox cmd response: failed
2,482,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,278 >>> mbox cmd response: failed
2,482,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,284 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,355 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,923 UART: [state] LifecycleState = Unprovisioned
86,578 UART: [state] DebugLocked = No
87,226 UART: [state] WD Timer not started. Device not locked for debugging
88,509 UART: [kat] SHA2-256
894,159 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,284 UART: [kat] ++
898,436 UART: [kat] sha1
902,742 UART: [kat] SHA2-256
904,682 UART: [kat] SHA2-384
907,401 UART: [kat] SHA2-512-ACC
909,302 UART: [kat] ECC-384
919,283 UART: [kat] HMAC-384Kdf
923,837 UART: [kat] LMS
1,172,165 UART: [kat] --
1,173,176 UART: [cold-reset] ++
1,173,634 UART: [fht] FHT @ 0x50003400
1,176,291 UART: [idev] ++
1,176,459 UART: [idev] CDI.KEYID = 6
1,176,819 UART: [idev] SUBJECT.KEYID = 7
1,177,243 UART: [idev] UDS.KEYID = 0
1,177,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,309 UART: [idev] Erasing UDS.KEYID = 0
1,202,682 UART: [idev] Sha1 KeyId Algorithm
1,211,086 UART: [idev] --
1,212,144 UART: [ldev] ++
1,212,312 UART: [ldev] CDI.KEYID = 6
1,212,675 UART: [ldev] SUBJECT.KEYID = 5
1,213,101 UART: [ldev] AUTHORITY.KEYID = 7
1,213,564 UART: [ldev] FE.KEYID = 1
1,218,904 UART: [ldev] Erasing FE.KEYID = 1
1,245,699 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,927 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,790 UART: [ldev] --
1,285,207 UART: [fwproc] Wait for Commands...
1,285,927 UART: [fwproc] Recv command 0x46574c44
1,286,655 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,717 UART: ROM Fatal Error: 0x000B0016
2,630,874 >>> mbox cmd response: failed
2,630,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,880 >>> mbox cmd response: failed
2,630,880 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,630,886 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,918 UART: [state] WD Timer not started. Device not locked for debugging
88,177 UART: [kat] SHA2-256
893,827 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,952 UART: [kat] ++
898,104 UART: [kat] sha1
902,242 UART: [kat] SHA2-256
904,182 UART: [kat] SHA2-384
906,937 UART: [kat] SHA2-512-ACC
908,838 UART: [kat] ECC-384
918,761 UART: [kat] HMAC-384Kdf
923,337 UART: [kat] LMS
1,171,665 UART: [kat] --
1,172,348 UART: [cold-reset] ++
1,172,896 UART: [fht] FHT @ 0x50003400
1,175,459 UART: [idev] ++
1,175,627 UART: [idev] CDI.KEYID = 6
1,175,987 UART: [idev] SUBJECT.KEYID = 7
1,176,411 UART: [idev] UDS.KEYID = 0
1,176,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,247 UART: [idev] Erasing UDS.KEYID = 0
1,201,322 UART: [idev] Sha1 KeyId Algorithm
1,209,872 UART: [idev] --
1,210,932 UART: [ldev] ++
1,211,100 UART: [ldev] CDI.KEYID = 6
1,211,463 UART: [ldev] SUBJECT.KEYID = 5
1,211,889 UART: [ldev] AUTHORITY.KEYID = 7
1,212,352 UART: [ldev] FE.KEYID = 1
1,217,522 UART: [ldev] Erasing FE.KEYID = 1
1,243,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,750 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,952 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,122 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,479 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,713 >>> mbox cmd response: failed
2,484,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,719 >>> mbox cmd response: failed
2,484,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,886 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
192,103 UART:
192,454 UART: Running Caliptra ROM ...
193,636 UART:
193,789 UART: [state] CFI Enabled
260,809 UART: [state] LifecycleState = Unprovisioned
262,732 UART: [state] DebugLocked = No
264,714 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,007 UART: [kat] SHA2-256
439,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,189 UART: [kat] ++
450,787 UART: [kat] sha1
463,235 UART: [kat] SHA2-256
466,080 UART: [kat] SHA2-384
472,608 UART: [kat] SHA2-512-ACC
475,015 UART: [kat] ECC-384
2,763,397 UART: [kat] HMAC-384Kdf
2,775,157 UART: [kat] LMS
3,965,460 UART: [kat] --
3,969,033 UART: [cold-reset] ++
3,971,191 UART: [fht] Storing FHT @ 0x50003400
3,982,026 UART: [idev] ++
3,982,608 UART: [idev] CDI.KEYID = 6
3,983,531 UART: [idev] SUBJECT.KEYID = 7
3,984,750 UART: [idev] UDS.KEYID = 0
3,987,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,136,990 UART: [idev] Erasing UDS.KEYID = 0
7,321,824 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,746 UART: [idev] --
7,349,472 UART: [ldev] ++
7,350,087 UART: [ldev] CDI.KEYID = 6
7,350,982 UART: [ldev] SUBJECT.KEYID = 5
7,352,200 UART: [ldev] AUTHORITY.KEYID = 7
7,353,495 UART: [ldev] FE.KEYID = 1
7,397,580 UART: [ldev] Erasing FE.KEYID = 1
10,727,171 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,660 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,067,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,238 UART: [ldev] --
13,092,460 UART: [fwproc] Waiting for Commands...
13,094,889 UART: [fwproc] Received command 0x46574c44
13,097,082 UART: [fwproc] Received Image of size 118548 bytes
17,196,952 UART: ROM Fatal Error: 0x000B002A
17,200,381 >>> mbox cmd response: failed
17,200,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,145 >>> mbox cmd response: failed
17,201,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,715 >>> mbox cmd response: failed
Initializing fuses
2,058,910 writing to cptra_bootfsm_go
2,248,243 UART:
2,248,590 UART: Running Caliptra ROM ...
2,249,725 UART:
2,249,894 UART: [state] CFI Enabled
2,317,686 UART: [state] LifecycleState = Unprovisioned
2,319,621 UART: [state] DebugLocked = No
2,322,211 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,326,964 UART: [kat] SHA2-256
2,496,646 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,152 UART: [kat] ++
2,507,652 UART: [kat] sha1
2,518,053 UART: [kat] SHA2-256
2,520,699 UART: [kat] SHA2-384
2,526,635 UART: [kat] SHA2-512-ACC
2,528,989 UART: [kat] ECC-384
4,820,605 UART: [kat] HMAC-384Kdf
4,853,249 UART: [kat] LMS
6,043,594 UART: [kat] --
6,049,775 UART: [cold-reset] ++
6,051,500 UART: [fht] Storing FHT @ 0x50003400
6,063,326 UART: [idev] ++
6,063,897 UART: [idev] CDI.KEYID = 6
6,064,976 UART: [idev] SUBJECT.KEYID = 7
6,066,131 UART: [idev] UDS.KEYID = 0
6,068,429 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,559 UART: [idev] Erasing UDS.KEYID = 0
9,398,564 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,218 UART: [idev] --
9,424,537 UART: [ldev] ++
9,425,309 UART: [ldev] CDI.KEYID = 6
9,426,235 UART: [ldev] SUBJECT.KEYID = 5
9,427,473 UART: [ldev] AUTHORITY.KEYID = 7
9,428,659 UART: [ldev] FE.KEYID = 1
9,476,522 UART: [ldev] Erasing FE.KEYID = 1
12,806,073 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,101,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,115,789 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,130,638 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,145,095 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,163,024 UART: [ldev] --
15,167,699 UART: [fwproc] Waiting for Commands...
15,169,802 UART: [fwproc] Received command 0x46574c44
15,171,989 UART: [fwproc] Received Image of size 118548 bytes
19,274,096 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,348,234 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,421,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,749,917 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,891 writing to cptra_bootfsm_go
3,787,699 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,210,998 >>> mbox cmd response: failed
17,211,764 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,212,129 >>> mbox cmd response: failed
17,212,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,212,702 >>> mbox cmd response: failed
Initializing fuses
2,058,002 writing to cptra_bootfsm_go
5,857,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,013,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
192,458 UART:
192,834 UART: Running Caliptra ROM ...
194,049 UART:
603,527 UART: [state] CFI Enabled
618,756 UART: [state] LifecycleState = Unprovisioned
620,668 UART: [state] DebugLocked = No
623,698 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,971 UART: [kat] SHA2-256
797,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,284 UART: [kat] ++
808,750 UART: [kat] sha1
819,523 UART: [kat] SHA2-256
822,262 UART: [kat] SHA2-384
828,623 UART: [kat] SHA2-512-ACC
831,022 UART: [kat] ECC-384
3,115,733 UART: [kat] HMAC-384Kdf
3,126,534 UART: [kat] LMS
4,316,653 UART: [kat] --
4,322,000 UART: [cold-reset] ++
4,324,222 UART: [fht] Storing FHT @ 0x50003400
4,336,634 UART: [idev] ++
4,337,246 UART: [idev] CDI.KEYID = 6
4,338,143 UART: [idev] SUBJECT.KEYID = 7
4,339,366 UART: [idev] UDS.KEYID = 0
4,342,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,617 UART: [idev] Erasing UDS.KEYID = 0
7,631,926 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,069 UART: [idev] --
7,658,349 UART: [ldev] ++
7,658,928 UART: [ldev] CDI.KEYID = 6
7,659,851 UART: [ldev] SUBJECT.KEYID = 5
7,661,075 UART: [ldev] AUTHORITY.KEYID = 7
7,662,323 UART: [ldev] FE.KEYID = 1
7,673,736 UART: [ldev] Erasing FE.KEYID = 1
10,961,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,174 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,775 UART: [ldev] --
13,318,720 UART: [fwproc] Waiting for Commands...
13,321,689 UART: [fwproc] Received command 0x46574c44
13,323,881 UART: [fwproc] Received Image of size 118548 bytes
17,434,738 UART: ROM Fatal Error: 0x000B002A
17,438,208 >>> mbox cmd response: failed
17,438,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,438,898 >>> mbox cmd response: failed
17,439,166 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,439,467 >>> mbox cmd response: failed
Initializing fuses
2,060,169 writing to cptra_bootfsm_go
2,249,483 UART:
2,249,829 UART: Running Caliptra ROM ...
2,250,926 UART:
3,015,347 UART: [state] CFI Enabled
3,030,518 UART: [state] LifecycleState = Unprovisioned
3,032,497 UART: [state] DebugLocked = No
3,034,925 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,039,022 UART: [kat] SHA2-256
3,208,788 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,219,323 UART: [kat] ++
3,219,814 UART: [kat] sha1
3,232,215 UART: [kat] SHA2-256
3,234,917 UART: [kat] SHA2-384
3,241,559 UART: [kat] SHA2-512-ACC
3,243,969 UART: [kat] ECC-384
5,528,047 UART: [kat] HMAC-384Kdf
5,539,377 UART: [kat] LMS
6,729,538 UART: [kat] --
6,735,427 UART: [cold-reset] ++
6,736,724 UART: [fht] Storing FHT @ 0x50003400
6,748,813 UART: [idev] ++
6,749,388 UART: [idev] CDI.KEYID = 6
6,750,295 UART: [idev] SUBJECT.KEYID = 7
6,751,572 UART: [idev] UDS.KEYID = 0
6,753,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,903,193 UART: [idev] Erasing UDS.KEYID = 0
10,040,724 UART: [idev] Using Sha1 for KeyId Algorithm
10,063,187 UART: [idev] --
10,066,917 UART: [ldev] ++
10,067,504 UART: [ldev] CDI.KEYID = 6
10,068,477 UART: [ldev] SUBJECT.KEYID = 5
10,069,700 UART: [ldev] AUTHORITY.KEYID = 7
10,070,912 UART: [ldev] FE.KEYID = 1
10,080,729 UART: [ldev] Erasing FE.KEYID = 1
13,366,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,660,591 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,675,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,690,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,704,534 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,723,806 UART: [ldev] --
15,728,158 UART: [fwproc] Waiting for Commands...
15,730,005 UART: [fwproc] Received command 0x46574c44
15,732,205 UART: [fwproc] Received Image of size 118548 bytes
19,839,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,914,862 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,988,045 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,316,897 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
4,126,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,410,176 >>> mbox cmd response: failed
17,410,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,411,092 >>> mbox cmd response: failed
17,411,373 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,411,672 >>> mbox cmd response: failed
Initializing fuses
2,057,373 writing to cptra_bootfsm_go
6,584,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,621,150 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,131 UART:
192,501 UART: Running Caliptra ROM ...
193,624 UART:
193,796 UART: [state] CFI Enabled
262,816 UART: [state] LifecycleState = Unprovisioned
264,736 UART: [state] DebugLocked = No
267,640 UART: [state] WD Timer not started. Device not locked for debugging
270,860 UART: [kat] SHA2-256
450,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,311 UART: [kat] ++
461,855 UART: [kat] sha1
471,232 UART: [kat] SHA2-256
473,923 UART: [kat] SHA2-384
479,420 UART: [kat] SHA2-512-ACC
481,759 UART: [kat] ECC-384
2,927,125 UART: [kat] HMAC-384Kdf
2,949,573 UART: [kat] LMS
3,426,038 UART: [kat] --
3,428,635 UART: [cold-reset] ++
3,430,764 UART: [fht] FHT @ 0x50003400
3,443,097 UART: [idev] ++
3,443,672 UART: [idev] CDI.KEYID = 6
3,444,615 UART: [idev] SUBJECT.KEYID = 7
3,445,831 UART: [idev] UDS.KEYID = 0
3,448,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,597,736 UART: [idev] Erasing UDS.KEYID = 0
5,964,435 UART: [idev] Sha1 KeyId Algorithm
5,987,351 UART: [idev] --
5,993,133 UART: [ldev] ++
5,993,706 UART: [ldev] CDI.KEYID = 6
5,994,595 UART: [ldev] SUBJECT.KEYID = 5
5,995,813 UART: [ldev] AUTHORITY.KEYID = 7
5,997,110 UART: [ldev] FE.KEYID = 1
6,035,772 UART: [ldev] Erasing FE.KEYID = 1
8,545,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,275,910 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,291,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,307,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,278 UART: [ldev] --
10,350,323 UART: [fwproc] Wait for Commands...
10,352,763 UART: [fwproc] Recv command 0x46574c44
10,354,758 UART: [fwproc] Recv'd Img size: 118548 bytes
13,833,783 UART: ROM Fatal Error: 0x000B002A
13,837,066 >>> mbox cmd response: failed
13,837,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,837,854 >>> mbox cmd response: failed
13,838,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,838,417 >>> mbox cmd response: failed
Initializing fuses
2,060,274 writing to cptra_bootfsm_go
2,249,597 UART:
2,249,942 UART: Running Caliptra ROM ...
2,251,081 UART:
2,251,260 UART: [state] CFI Enabled
2,316,576 UART: [state] LifecycleState = Unprovisioned
2,318,511 UART: [state] DebugLocked = No
2,320,778 UART: [state] WD Timer not started. Device not locked for debugging
2,323,826 UART: [kat] SHA2-256
2,503,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,260 UART: [kat] ++
2,514,812 UART: [kat] sha1
2,526,304 UART: [kat] SHA2-256
2,528,999 UART: [kat] SHA2-384
2,534,134 UART: [kat] SHA2-512-ACC
2,536,511 UART: [kat] ECC-384
5,001,068 UART: [kat] HMAC-384Kdf
5,020,972 UART: [kat] LMS
5,497,453 UART: [kat] --
5,501,454 UART: [cold-reset] ++
5,502,316 UART: [fht] FHT @ 0x50003400
5,514,489 UART: [idev] ++
5,515,065 UART: [idev] CDI.KEYID = 6
5,516,193 UART: [idev] SUBJECT.KEYID = 7
5,517,304 UART: [idev] UDS.KEYID = 0
5,519,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,116 UART: [idev] Erasing UDS.KEYID = 0
8,036,777 UART: [idev] Sha1 KeyId Algorithm
8,060,715 UART: [idev] --
8,065,641 UART: [ldev] ++
8,066,228 UART: [ldev] CDI.KEYID = 6
8,067,220 UART: [ldev] SUBJECT.KEYID = 5
8,068,390 UART: [ldev] AUTHORITY.KEYID = 7
8,069,638 UART: [ldev] FE.KEYID = 1
8,107,078 UART: [ldev] Erasing FE.KEYID = 1
10,618,071 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,073 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,364,958 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,380,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,418,429 UART: [ldev] --
12,423,469 UART: [fwproc] Wait for Commands...
12,425,252 UART: [fwproc] Recv command 0x46574c44
12,427,251 UART: [fwproc] Recv'd Img size: 118548 bytes
15,909,333 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,985,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,058,417 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,387,098 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,168 writing to cptra_bootfsm_go
3,463,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,769,322 >>> mbox cmd response: failed
13,769,893 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,770,243 >>> mbox cmd response: failed
13,770,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,770,815 >>> mbox cmd response: failed
Initializing fuses
2,067,661 writing to cptra_bootfsm_go
5,520,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,298,134 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
192,570 UART:
192,928 UART: Running Caliptra ROM ...
194,129 UART:
603,728 UART: [state] CFI Enabled
617,145 UART: [state] LifecycleState = Unprovisioned
619,090 UART: [state] DebugLocked = No
620,371 UART: [state] WD Timer not started. Device not locked for debugging
623,702 UART: [kat] SHA2-256
803,360 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,143 UART: [kat] ++
814,616 UART: [kat] sha1
825,610 UART: [kat] SHA2-256
828,306 UART: [kat] SHA2-384
834,617 UART: [kat] SHA2-512-ACC
836,957 UART: [kat] ECC-384
3,276,475 UART: [kat] HMAC-384Kdf
3,288,384 UART: [kat] LMS
3,764,934 UART: [kat] --
3,769,255 UART: [cold-reset] ++
3,771,085 UART: [fht] FHT @ 0x50003400
3,781,587 UART: [idev] ++
3,782,209 UART: [idev] CDI.KEYID = 6
3,783,121 UART: [idev] SUBJECT.KEYID = 7
3,784,401 UART: [idev] UDS.KEYID = 0
3,786,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,865 UART: [idev] Erasing UDS.KEYID = 0
6,266,111 UART: [idev] Sha1 KeyId Algorithm
6,290,861 UART: [idev] --
6,294,480 UART: [ldev] ++
6,295,051 UART: [ldev] CDI.KEYID = 6
6,295,973 UART: [ldev] SUBJECT.KEYID = 5
6,297,194 UART: [ldev] AUTHORITY.KEYID = 7
6,298,431 UART: [ldev] FE.KEYID = 1
6,309,424 UART: [ldev] Erasing FE.KEYID = 1
8,790,723 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,224 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,537 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,947 UART: [ldev] --
10,586,568 UART: [fwproc] Wait for Commands...
10,589,696 UART: [fwproc] Recv command 0x46574c44
10,591,713 UART: [fwproc] Recv'd Img size: 118548 bytes
14,068,866 UART: ROM Fatal Error: 0x000B002A
14,072,107 >>> mbox cmd response: failed
14,072,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,072,891 >>> mbox cmd response: failed
14,073,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,073,452 >>> mbox cmd response: failed
Initializing fuses
2,063,540 writing to cptra_bootfsm_go
2,252,834 UART:
2,253,187 UART: Running Caliptra ROM ...
2,254,329 UART:
6,380,323 UART: [state] CFI Enabled
6,396,488 UART: [state] LifecycleState = Unprovisioned
6,398,465 UART: [state] DebugLocked = No
6,401,113 UART: [state] WD Timer not started. Device not locked for debugging
6,404,708 UART: [kat] SHA2-256
6,584,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,595,128 UART: [kat] ++
6,595,602 UART: [kat] sha1
6,607,087 UART: [kat] SHA2-256
6,609,742 UART: [kat] SHA2-384
6,614,549 UART: [kat] SHA2-512-ACC
6,616,903 UART: [kat] ECC-384
9,060,027 UART: [kat] HMAC-384Kdf
9,071,786 UART: [kat] LMS
9,548,307 UART: [kat] --
9,554,535 UART: [cold-reset] ++
9,557,176 UART: [fht] FHT @ 0x50003400
9,568,593 UART: [idev] ++
9,569,190 UART: [idev] CDI.KEYID = 6
9,570,215 UART: [idev] SUBJECT.KEYID = 7
9,571,385 UART: [idev] UDS.KEYID = 0
9,573,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,722,740 UART: [idev] Erasing UDS.KEYID = 0
12,050,107 UART: [idev] Sha1 KeyId Algorithm
12,074,415 UART: [idev] --
12,080,062 UART: [ldev] ++
12,080,655 UART: [ldev] CDI.KEYID = 6
12,081,572 UART: [ldev] SUBJECT.KEYID = 5
12,082,794 UART: [ldev] AUTHORITY.KEYID = 7
12,084,038 UART: [ldev] FE.KEYID = 1
12,094,270 UART: [ldev] Erasing FE.KEYID = 1
14,572,355 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,293,379 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,309,252 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,325,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,340,673 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,361,453 UART: [ldev] --
16,366,884 UART: [fwproc] Wait for Commands...
16,369,632 UART: [fwproc] Recv command 0x46574c44
16,371,624 UART: [fwproc] Recv'd Img size: 118548 bytes
19,853,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,928,961 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,001,981 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,330,372 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
3,782,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,965,916 >>> mbox cmd response: failed
13,966,466 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,966,817 >>> mbox cmd response: failed
13,967,091 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,967,390 >>> mbox cmd response: failed
Initializing fuses
2,059,393 writing to cptra_bootfsm_go
9,681,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,352,636 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,201 UART:
192,567 UART: Running Caliptra ROM ...
193,766 UART:
193,944 UART: [state] CFI Enabled
259,008 UART: [state] LifecycleState = Unprovisioned
261,395 UART: [state] DebugLocked = No
263,164 UART: [state] WD Timer not started. Device not locked for debugging
267,860 UART: [kat] SHA2-256
457,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,540 UART: [kat] ++
469,020 UART: [kat] sha1
479,293 UART: [kat] SHA2-256
482,327 UART: [kat] SHA2-384
488,858 UART: [kat] SHA2-512-ACC
491,430 UART: [kat] ECC-384
2,944,413 UART: [kat] HMAC-384Kdf
2,970,135 UART: [kat] LMS
3,501,892 UART: [kat] --
3,507,263 UART: [cold-reset] ++
3,508,945 UART: [fht] FHT @ 0x50003400
3,520,781 UART: [idev] ++
3,521,479 UART: [idev] CDI.KEYID = 6
3,522,504 UART: [idev] SUBJECT.KEYID = 7
3,523,618 UART: [idev] UDS.KEYID = 0
3,526,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,902 UART: [idev] Erasing UDS.KEYID = 0
6,025,543 UART: [idev] Sha1 KeyId Algorithm
6,048,682 UART: [idev] --
6,054,523 UART: [ldev] ++
6,055,213 UART: [ldev] CDI.KEYID = 6
6,056,106 UART: [ldev] SUBJECT.KEYID = 5
6,057,272 UART: [ldev] AUTHORITY.KEYID = 7
6,058,536 UART: [ldev] FE.KEYID = 1
6,097,803 UART: [ldev] Erasing FE.KEYID = 1
8,602,602 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,854 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,954 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,857 UART: [ldev] --
10,410,790 UART: [fwproc] Wait for Commands...
10,413,712 UART: [fwproc] Recv command 0x46574c44
10,415,979 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,008 UART: ROM Fatal Error: 0x000B002A
13,915,692 >>> mbox cmd response: failed
13,916,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,916,456 >>> mbox cmd response: failed
13,916,730 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,049 >>> mbox cmd response: failed
Initializing fuses
2,061,176 writing to cptra_bootfsm_go
2,250,521 UART:
2,250,879 UART: Running Caliptra ROM ...
2,251,961 UART:
2,252,122 UART: [state] CFI Enabled
2,318,532 UART: [state] LifecycleState = Unprovisioned
2,320,960 UART: [state] DebugLocked = No
2,323,762 UART: [state] WD Timer not started. Device not locked for debugging
2,327,513 UART: [kat] SHA2-256
2,517,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,131 UART: [kat] ++
2,528,622 UART: [kat] sha1
2,539,441 UART: [kat] SHA2-256
2,542,473 UART: [kat] SHA2-384
2,548,094 UART: [kat] SHA2-512-ACC
2,550,674 UART: [kat] ECC-384
5,002,248 UART: [kat] HMAC-384Kdf
5,027,126 UART: [kat] LMS
5,558,862 UART: [kat] --
5,564,585 UART: [cold-reset] ++
5,566,739 UART: [fht] FHT @ 0x50003400
5,578,429 UART: [idev] ++
5,579,120 UART: [idev] CDI.KEYID = 6
5,580,146 UART: [idev] SUBJECT.KEYID = 7
5,581,311 UART: [idev] UDS.KEYID = 0
5,583,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,042 UART: [idev] Erasing UDS.KEYID = 0
8,086,571 UART: [idev] Sha1 KeyId Algorithm
8,109,945 UART: [idev] --
8,114,496 UART: [ldev] ++
8,115,185 UART: [ldev] CDI.KEYID = 6
8,116,075 UART: [ldev] SUBJECT.KEYID = 5
8,117,299 UART: [ldev] AUTHORITY.KEYID = 7
8,118,538 UART: [ldev] FE.KEYID = 1
8,155,099 UART: [ldev] Erasing FE.KEYID = 1
10,661,085 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,399,199 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,414,344 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,429,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,444,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,464,880 UART: [ldev] --
12,470,202 UART: [fwproc] Wait for Commands...
12,471,878 UART: [fwproc] Recv command 0x46574c44
12,474,230 UART: [fwproc] Recv'd Img size: 118548 bytes
15,975,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,051,245 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,174,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,017 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
3,437,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,347,851 >>> mbox cmd response: failed
14,348,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,348,739 >>> mbox cmd response: failed
14,349,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,349,309 >>> mbox cmd response: failed
Initializing fuses
2,061,135 writing to cptra_bootfsm_go
5,489,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,864,841 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,611 UART:
193,037 UART: Running Caliptra ROM ...
194,177 UART:
603,850 UART: [state] CFI Enabled
620,526 UART: [state] LifecycleState = Unprovisioned
622,879 UART: [state] DebugLocked = No
625,292 UART: [state] WD Timer not started. Device not locked for debugging
629,953 UART: [kat] SHA2-256
819,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,590 UART: [kat] ++
831,183 UART: [kat] sha1
842,829 UART: [kat] SHA2-256
845,899 UART: [kat] SHA2-384
851,941 UART: [kat] SHA2-512-ACC
854,560 UART: [kat] ECC-384
3,299,700 UART: [kat] HMAC-384Kdf
3,313,298 UART: [kat] LMS
3,845,134 UART: [kat] --
3,850,106 UART: [cold-reset] ++
3,850,963 UART: [fht] FHT @ 0x50003400
3,862,615 UART: [idev] ++
3,863,307 UART: [idev] CDI.KEYID = 6
3,864,289 UART: [idev] SUBJECT.KEYID = 7
3,865,368 UART: [idev] UDS.KEYID = 0
3,868,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,592 UART: [idev] Erasing UDS.KEYID = 0
6,342,918 UART: [idev] Sha1 KeyId Algorithm
6,366,048 UART: [idev] --
6,371,180 UART: [ldev] ++
6,371,862 UART: [ldev] CDI.KEYID = 6
6,372,788 UART: [ldev] SUBJECT.KEYID = 5
6,373,957 UART: [ldev] AUTHORITY.KEYID = 7
6,375,194 UART: [ldev] FE.KEYID = 1
6,386,335 UART: [ldev] Erasing FE.KEYID = 1
8,861,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,298 UART: [ldev] --
10,651,984 UART: [fwproc] Wait for Commands...
10,653,882 UART: [fwproc] Recv command 0x46574c44
10,656,209 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,848 UART: ROM Fatal Error: 0x000B002A
14,152,538 >>> mbox cmd response: failed
14,152,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,153,293 >>> mbox cmd response: failed
14,153,571 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,153,873 >>> mbox cmd response: failed
Initializing fuses
2,065,093 writing to cptra_bootfsm_go
2,254,442 UART:
2,254,785 UART: Running Caliptra ROM ...
2,255,929 UART:
6,301,242 UART: [state] CFI Enabled
6,316,164 UART: [state] LifecycleState = Unprovisioned
6,318,449 UART: [state] DebugLocked = No
6,321,262 UART: [state] WD Timer not started. Device not locked for debugging
6,325,354 UART: [kat] SHA2-256
6,515,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,526,000 UART: [kat] ++
6,526,616 UART: [kat] sha1
6,537,460 UART: [kat] SHA2-256
6,540,482 UART: [kat] SHA2-384
6,546,692 UART: [kat] SHA2-512-ACC
6,549,325 UART: [kat] ECC-384
8,992,575 UART: [kat] HMAC-384Kdf
9,006,329 UART: [kat] LMS
9,538,123 UART: [kat] --
9,541,540 UART: [cold-reset] ++
9,544,078 UART: [fht] FHT @ 0x50003400
9,557,072 UART: [idev] ++
9,557,760 UART: [idev] CDI.KEYID = 6
9,558,675 UART: [idev] SUBJECT.KEYID = 7
9,559,894 UART: [idev] UDS.KEYID = 0
9,562,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,711,541 UART: [idev] Erasing UDS.KEYID = 0
12,034,836 UART: [idev] Sha1 KeyId Algorithm
12,056,681 UART: [idev] --
12,062,243 UART: [ldev] ++
12,062,927 UART: [ldev] CDI.KEYID = 6
12,063,845 UART: [ldev] SUBJECT.KEYID = 5
12,065,029 UART: [ldev] AUTHORITY.KEYID = 7
12,066,217 UART: [ldev] FE.KEYID = 1
12,079,177 UART: [ldev] Erasing FE.KEYID = 1
14,558,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,277,979 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,215 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,308,386 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,323,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,343,962 UART: [ldev] --
16,349,439 UART: [fwproc] Wait for Commands...
16,351,878 UART: [fwproc] Recv command 0x46574c44
16,354,150 UART: [fwproc] Recv'd Img size: 118548 bytes
19,858,593 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,934,211 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,057,834 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,617,298 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
3,753,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,575,288 >>> mbox cmd response: failed
14,575,936 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,576,281 >>> mbox cmd response: failed
14,576,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,576,851 >>> mbox cmd response: failed
Initializing fuses
2,062,079 writing to cptra_bootfsm_go
9,041,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,339,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,704 UART: [state] LifecycleState = Unprovisioned
85,359 UART: [state] DebugLocked = No
86,021 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,709 UART: [kat] SHA2-256
881,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,755 UART: [kat] ++
885,907 UART: [kat] sha1
890,247 UART: [kat] SHA2-256
892,185 UART: [kat] SHA2-384
895,100 UART: [kat] SHA2-512-ACC
897,001 UART: [kat] ECC-384
902,564 UART: [kat] HMAC-384Kdf
907,192 UART: [kat] LMS
1,475,388 UART: [kat] --
1,476,311 UART: [cold-reset] ++
1,476,647 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,952 UART: [idev] Erasing UDS.KEYID = 0
1,504,898 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,596 UART: [idev] --
1,514,533 UART: [ldev] ++
1,514,701 UART: [ldev] CDI.KEYID = 6
1,515,064 UART: [ldev] SUBJECT.KEYID = 5
1,515,490 UART: [ldev] AUTHORITY.KEYID = 7
1,515,953 UART: [ldev] FE.KEYID = 1
1,520,961 UART: [ldev] Erasing FE.KEYID = 1
1,545,834 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,283 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,652 UART: [ldev] --
1,585,011 UART: [fwproc] Waiting for Commands...
1,585,758 UART: [fwproc] Received command 0x46574c44
1,586,549 UART: [fwproc] Received Image of size 118548 bytes
2,929,772 UART: ROM Fatal Error: 0x000B002A
2,930,931 >>> mbox cmd response: failed
2,930,931 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,930,937 >>> mbox cmd response: failed
2,930,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,930,943 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,473 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,023 UART: [kat] SHA2-256
881,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,069 UART: [kat] ++
886,221 UART: [kat] sha1
890,421 UART: [kat] SHA2-256
892,359 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,672 UART: [kat] LMS
1,475,868 UART: [kat] --
1,476,639 UART: [cold-reset] ++
1,477,157 UART: [fht] Storing FHT @ 0x50003400
1,479,982 UART: [idev] ++
1,480,150 UART: [idev] CDI.KEYID = 6
1,480,510 UART: [idev] SUBJECT.KEYID = 7
1,480,934 UART: [idev] UDS.KEYID = 0
1,481,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,748 UART: [idev] Erasing UDS.KEYID = 0
1,505,060 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,862 UART: [idev] --
1,514,929 UART: [ldev] ++
1,515,097 UART: [ldev] CDI.KEYID = 6
1,515,460 UART: [ldev] SUBJECT.KEYID = 5
1,515,886 UART: [ldev] AUTHORITY.KEYID = 7
1,516,349 UART: [ldev] FE.KEYID = 1
1,521,333 UART: [ldev] Erasing FE.KEYID = 1
1,546,656 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,590 UART: [ldev] --
1,585,975 UART: [fwproc] Waiting for Commands...
1,586,758 UART: [fwproc] Received command 0x46574c44
1,587,549 UART: [fwproc] Received Image of size 118548 bytes
2,932,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,024 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,242 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,663 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,580 >>> mbox cmd response: failed
2,784,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,586 >>> mbox cmd response: failed
2,784,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,945 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,976 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,524 UART: [kat] SHA2-256
882,455 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,570 UART: [kat] ++
886,722 UART: [kat] sha1
890,928 UART: [kat] SHA2-256
892,866 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,217 UART: [kat] HMAC-384Kdf
907,835 UART: [kat] LMS
1,476,031 UART: [kat] --
1,476,590 UART: [cold-reset] ++
1,477,000 UART: [fht] Storing FHT @ 0x50003400
1,479,653 UART: [idev] ++
1,479,821 UART: [idev] CDI.KEYID = 6
1,480,181 UART: [idev] SUBJECT.KEYID = 7
1,480,605 UART: [idev] UDS.KEYID = 0
1,480,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,985 UART: [idev] Erasing UDS.KEYID = 0
1,505,799 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,495 UART: [idev] --
1,515,578 UART: [ldev] ++
1,515,746 UART: [ldev] CDI.KEYID = 6
1,516,109 UART: [ldev] SUBJECT.KEYID = 5
1,516,535 UART: [ldev] AUTHORITY.KEYID = 7
1,516,998 UART: [ldev] FE.KEYID = 1
1,522,196 UART: [ldev] Erasing FE.KEYID = 1
1,547,525 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,689 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,401 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,381 UART: [ldev] --
1,586,800 UART: [fwproc] Waiting for Commands...
1,587,515 UART: [fwproc] Received command 0x46574c44
1,588,306 UART: [fwproc] Received Image of size 118548 bytes
2,931,587 UART: ROM Fatal Error: 0x000B002A
2,932,746 >>> mbox cmd response: failed
2,932,746 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,752 >>> mbox cmd response: failed
2,932,752 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,758 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,053 UART: [state] LifecycleState = Unprovisioned
85,708 UART: [state] DebugLocked = No
86,318 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,864 UART: [kat] SHA2-256
881,795 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,910 UART: [kat] ++
886,062 UART: [kat] sha1
890,406 UART: [kat] SHA2-256
892,344 UART: [kat] SHA2-384
895,239 UART: [kat] SHA2-512-ACC
897,140 UART: [kat] ECC-384
902,609 UART: [kat] HMAC-384Kdf
907,437 UART: [kat] LMS
1,475,633 UART: [kat] --
1,476,228 UART: [cold-reset] ++
1,476,578 UART: [fht] Storing FHT @ 0x50003400
1,479,551 UART: [idev] ++
1,479,719 UART: [idev] CDI.KEYID = 6
1,480,079 UART: [idev] SUBJECT.KEYID = 7
1,480,503 UART: [idev] UDS.KEYID = 0
1,480,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,815 UART: [idev] Erasing UDS.KEYID = 0
1,505,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,712 UART: [ldev] ++
1,515,880 UART: [ldev] CDI.KEYID = 6
1,516,243 UART: [ldev] SUBJECT.KEYID = 5
1,516,669 UART: [ldev] AUTHORITY.KEYID = 7
1,517,132 UART: [ldev] FE.KEYID = 1
1,522,328 UART: [ldev] Erasing FE.KEYID = 1
1,547,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,294 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,701 UART: [ldev] --
1,587,198 UART: [fwproc] Waiting for Commands...
1,587,857 UART: [fwproc] Received command 0x46574c44
1,588,648 UART: [fwproc] Received Image of size 118548 bytes
2,934,173 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,557 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,775 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,146 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,751 >>> mbox cmd response: failed
2,785,751 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,757 >>> mbox cmd response: failed
2,785,757 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,763 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,412 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,228 UART: [state] LifecycleState = Unprovisioned
85,883 UART: [state] DebugLocked = No
86,587 UART: [state] WD Timer not started. Device not locked for debugging
87,736 UART: [kat] SHA2-256
891,286 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,390 UART: [kat] ++
895,542 UART: [kat] sha1
899,816 UART: [kat] SHA2-256
901,756 UART: [kat] SHA2-384
904,487 UART: [kat] SHA2-512-ACC
906,388 UART: [kat] ECC-384
916,125 UART: [kat] HMAC-384Kdf
920,691 UART: [kat] LMS
1,169,003 UART: [kat] --
1,170,032 UART: [cold-reset] ++
1,170,488 UART: [fht] FHT @ 0x50003400
1,173,100 UART: [idev] ++
1,173,268 UART: [idev] CDI.KEYID = 6
1,173,629 UART: [idev] SUBJECT.KEYID = 7
1,174,054 UART: [idev] UDS.KEYID = 0
1,174,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,131 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,338 UART: [ldev] ++
1,209,506 UART: [ldev] CDI.KEYID = 6
1,209,870 UART: [ldev] SUBJECT.KEYID = 5
1,210,297 UART: [ldev] AUTHORITY.KEYID = 7
1,210,760 UART: [ldev] FE.KEYID = 1
1,216,298 UART: [ldev] Erasing FE.KEYID = 1
1,242,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,946 UART: [ldev] --
1,282,283 UART: [fwproc] Wait for Commands...
1,283,024 UART: [fwproc] Recv command 0x46574c44
1,283,757 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,635 UART: ROM Fatal Error: 0x000B002A
2,628,794 >>> mbox cmd response: failed
2,628,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,800 >>> mbox cmd response: failed
2,628,800 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,806 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,188 UART: [state] LifecycleState = Unprovisioned
85,843 UART: [state] DebugLocked = No
86,507 UART: [state] WD Timer not started. Device not locked for debugging
87,856 UART: [kat] SHA2-256
891,406 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,510 UART: [kat] ++
895,662 UART: [kat] sha1
899,940 UART: [kat] SHA2-256
901,880 UART: [kat] SHA2-384
904,551 UART: [kat] SHA2-512-ACC
906,452 UART: [kat] ECC-384
916,359 UART: [kat] HMAC-384Kdf
920,927 UART: [kat] LMS
1,169,239 UART: [kat] --
1,169,936 UART: [cold-reset] ++
1,170,482 UART: [fht] FHT @ 0x50003400
1,173,192 UART: [idev] ++
1,173,360 UART: [idev] CDI.KEYID = 6
1,173,721 UART: [idev] SUBJECT.KEYID = 7
1,174,146 UART: [idev] UDS.KEYID = 0
1,174,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,165 UART: [idev] Erasing UDS.KEYID = 0
1,199,333 UART: [idev] Sha1 KeyId Algorithm
1,208,253 UART: [idev] --
1,209,244 UART: [ldev] ++
1,209,412 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,203 UART: [ldev] AUTHORITY.KEYID = 7
1,210,666 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,250 UART: [ldev] --
1,281,619 UART: [fwproc] Wait for Commands...
1,282,356 UART: [fwproc] Recv command 0x46574c44
1,283,089 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,734 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,909 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,092 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,013 >>> mbox cmd response: failed
2,482,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,019 >>> mbox cmd response: failed
2,482,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,025 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,495 UART: [state] LifecycleState = Unprovisioned
86,150 UART: [state] DebugLocked = No
86,748 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,633 UART: [kat] ++
895,785 UART: [kat] sha1
900,117 UART: [kat] SHA2-256
902,057 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,450 UART: [kat] HMAC-384Kdf
921,042 UART: [kat] LMS
1,169,354 UART: [kat] --
1,170,371 UART: [cold-reset] ++
1,170,705 UART: [fht] FHT @ 0x50003400
1,173,443 UART: [idev] ++
1,173,611 UART: [idev] CDI.KEYID = 6
1,173,972 UART: [idev] SUBJECT.KEYID = 7
1,174,397 UART: [idev] UDS.KEYID = 0
1,174,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,520 UART: [idev] Sha1 KeyId Algorithm
1,208,464 UART: [idev] --
1,209,499 UART: [ldev] ++
1,209,667 UART: [ldev] CDI.KEYID = 6
1,210,031 UART: [ldev] SUBJECT.KEYID = 5
1,210,458 UART: [ldev] AUTHORITY.KEYID = 7
1,210,921 UART: [ldev] FE.KEYID = 1
1,216,525 UART: [ldev] Erasing FE.KEYID = 1
1,242,896 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,450 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,077 UART: [ldev] --
1,282,324 UART: [fwproc] Wait for Commands...
1,282,973 UART: [fwproc] Recv command 0x46574c44
1,283,706 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,096 UART: ROM Fatal Error: 0x000B002A
2,628,255 >>> mbox cmd response: failed
2,628,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,261 >>> mbox cmd response: failed
2,628,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,259 UART: [state] LifecycleState = Unprovisioned
85,914 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,875 UART: [kat] SHA2-256
891,425 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: [kat] ++
895,681 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,554 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,135 UART: [cold-reset] ++
1,170,585 UART: [fht] FHT @ 0x50003400
1,173,263 UART: [idev] ++
1,173,431 UART: [idev] CDI.KEYID = 6
1,173,792 UART: [idev] SUBJECT.KEYID = 7
1,174,217 UART: [idev] UDS.KEYID = 0
1,174,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,050 UART: [idev] Erasing UDS.KEYID = 0
1,198,954 UART: [idev] Sha1 KeyId Algorithm
1,207,854 UART: [idev] --
1,208,877 UART: [ldev] ++
1,209,045 UART: [ldev] CDI.KEYID = 6
1,209,409 UART: [ldev] SUBJECT.KEYID = 5
1,209,836 UART: [ldev] AUTHORITY.KEYID = 7
1,210,299 UART: [ldev] FE.KEYID = 1
1,215,723 UART: [ldev] Erasing FE.KEYID = 1
1,242,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,800 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,231 UART: [ldev] --
1,281,608 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,904 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,129 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,304 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,607 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,057,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,526 >>> mbox cmd response: failed
2,481,526 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,532 >>> mbox cmd response: failed
2,481,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,538 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,442 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,338 UART: [state] LifecycleState = Unprovisioned
85,993 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
918,216 UART: [kat] HMAC-384Kdf
922,720 UART: [kat] LMS
1,171,048 UART: [kat] --
1,171,747 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,716 UART: [idev] ++
1,174,884 UART: [idev] CDI.KEYID = 6
1,175,244 UART: [idev] SUBJECT.KEYID = 7
1,175,668 UART: [idev] UDS.KEYID = 0
1,176,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,638 UART: [idev] Erasing UDS.KEYID = 0
1,200,095 UART: [idev] Sha1 KeyId Algorithm
1,208,531 UART: [idev] --
1,209,369 UART: [ldev] ++
1,209,537 UART: [ldev] CDI.KEYID = 6
1,209,900 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,001 UART: [ldev] Erasing FE.KEYID = 1
1,242,864 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,278 UART: [fwproc] Wait for Commands...
1,282,976 UART: [fwproc] Recv command 0x46574c44
1,283,704 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,011 UART: ROM Fatal Error: 0x000B002A
2,627,170 >>> mbox cmd response: failed
2,627,170 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,176 >>> mbox cmd response: failed
2,627,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,182 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,946 UART: [state] LifecycleState = Unprovisioned
85,601 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,695 UART: [kat] SHA2-256
903,635 UART: [kat] SHA2-384
906,278 UART: [kat] SHA2-512-ACC
908,179 UART: [kat] ECC-384
917,994 UART: [kat] HMAC-384Kdf
922,592 UART: [kat] LMS
1,170,920 UART: [kat] --
1,171,925 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,142 UART: [idev] ++
1,175,310 UART: [idev] CDI.KEYID = 6
1,175,670 UART: [idev] SUBJECT.KEYID = 7
1,176,094 UART: [idev] UDS.KEYID = 0
1,176,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,966 UART: [idev] Erasing UDS.KEYID = 0
1,200,987 UART: [idev] Sha1 KeyId Algorithm
1,209,461 UART: [idev] --
1,210,549 UART: [ldev] ++
1,210,717 UART: [ldev] CDI.KEYID = 6
1,211,080 UART: [ldev] SUBJECT.KEYID = 5
1,211,506 UART: [ldev] AUTHORITY.KEYID = 7
1,211,969 UART: [ldev] FE.KEYID = 1
1,217,187 UART: [ldev] Erasing FE.KEYID = 1
1,242,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,425 UART: [ldev] --
1,281,822 UART: [fwproc] Wait for Commands...
1,282,512 UART: [fwproc] Recv command 0x46574c44
1,283,240 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,144 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,833 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,003 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,380 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,491 >>> mbox cmd response: failed
2,482,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,497 >>> mbox cmd response: failed
2,482,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,235 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,743 UART: [kat] SHA2-256
893,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,518 UART: [kat] ++
897,670 UART: [kat] sha1
901,916 UART: [kat] SHA2-256
903,856 UART: [kat] SHA2-384
906,743 UART: [kat] SHA2-512-ACC
908,644 UART: [kat] ECC-384
918,459 UART: [kat] HMAC-384Kdf
923,249 UART: [kat] LMS
1,171,577 UART: [kat] --
1,172,368 UART: [cold-reset] ++
1,172,738 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,433 UART: [idev] Erasing UDS.KEYID = 0
1,201,264 UART: [idev] Sha1 KeyId Algorithm
1,209,580 UART: [idev] --
1,210,724 UART: [ldev] ++
1,210,892 UART: [ldev] CDI.KEYID = 6
1,211,255 UART: [ldev] SUBJECT.KEYID = 5
1,211,681 UART: [ldev] AUTHORITY.KEYID = 7
1,212,144 UART: [ldev] FE.KEYID = 1
1,217,452 UART: [ldev] Erasing FE.KEYID = 1
1,243,979 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,886 UART: [ldev] --
1,283,357 UART: [fwproc] Wait for Commands...
1,284,037 UART: [fwproc] Recv command 0x46574c44
1,284,765 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,630 UART: ROM Fatal Error: 0x000B002A
2,629,789 >>> mbox cmd response: failed
2,629,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,795 >>> mbox cmd response: failed
2,629,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,801 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,749 UART: [state] LifecycleState = Unprovisioned
86,404 UART: [state] DebugLocked = No
87,090 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,358 UART: [kat] SHA2-256
904,298 UART: [kat] SHA2-384
907,001 UART: [kat] SHA2-512-ACC
908,902 UART: [kat] ECC-384
918,501 UART: [kat] HMAC-384Kdf
923,105 UART: [kat] LMS
1,171,433 UART: [kat] --
1,172,378 UART: [cold-reset] ++
1,172,806 UART: [fht] FHT @ 0x50003400
1,175,325 UART: [idev] ++
1,175,493 UART: [idev] CDI.KEYID = 6
1,175,853 UART: [idev] SUBJECT.KEYID = 7
1,176,277 UART: [idev] UDS.KEYID = 0
1,176,622 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,005 UART: [idev] Erasing UDS.KEYID = 0
1,200,920 UART: [idev] Sha1 KeyId Algorithm
1,209,158 UART: [idev] --
1,210,126 UART: [ldev] ++
1,210,294 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,083 UART: [ldev] AUTHORITY.KEYID = 7
1,211,546 UART: [ldev] FE.KEYID = 1
1,216,890 UART: [ldev] Erasing FE.KEYID = 1
1,242,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,486 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,093 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,914 UART: [ldev] --
1,282,379 UART: [fwproc] Wait for Commands...
1,283,083 UART: [fwproc] Recv command 0x46574c44
1,283,811 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,162 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,332 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,705 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,044 >>> mbox cmd response: failed
2,483,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,050 >>> mbox cmd response: failed
2,483,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,444 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,121 UART:
192,487 UART: Running Caliptra ROM ...
193,644 UART:
193,798 UART: [state] CFI Enabled
268,021 UART: [state] LifecycleState = Unprovisioned
270,102 UART: [state] DebugLocked = No
271,548 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,289 UART: [kat] SHA2-256
447,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,501 UART: [kat] ++
457,979 UART: [kat] sha1
467,779 UART: [kat] SHA2-256
470,478 UART: [kat] SHA2-384
476,675 UART: [kat] SHA2-512-ACC
479,037 UART: [kat] ECC-384
2,766,384 UART: [kat] HMAC-384Kdf
2,779,550 UART: [kat] LMS
3,969,808 UART: [kat] --
3,976,510 UART: [cold-reset] ++
3,977,689 UART: [fht] Storing FHT @ 0x50003400
3,989,440 UART: [idev] ++
3,990,072 UART: [idev] CDI.KEYID = 6
3,990,983 UART: [idev] SUBJECT.KEYID = 7
3,992,252 UART: [idev] UDS.KEYID = 0
3,995,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,357 UART: [idev] Erasing UDS.KEYID = 0
7,325,405 UART: [idev] Using Sha1 for KeyId Algorithm
7,345,923 UART: [idev] --
7,349,814 UART: [ldev] ++
7,350,437 UART: [ldev] CDI.KEYID = 6
7,351,368 UART: [ldev] SUBJECT.KEYID = 5
7,352,590 UART: [ldev] AUTHORITY.KEYID = 7
7,353,827 UART: [ldev] FE.KEYID = 1
7,401,316 UART: [ldev] Erasing FE.KEYID = 1
10,735,518 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,566 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,062,167 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,514 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,208 UART: [ldev] --
13,115,884 UART: [fwproc] Waiting for Commands...
13,118,147 UART: [fwproc] Received command 0x46574c44
13,120,332 UART: [fwproc] Received Image of size 118548 bytes
17,218,722 UART: ROM Fatal Error: 0x000B002B
17,222,175 >>> mbox cmd response: failed
17,222,602 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,222,947 >>> mbox cmd response: failed
17,223,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,223,515 >>> mbox cmd response: failed
Initializing fuses
2,057,607 writing to cptra_bootfsm_go
2,246,940 UART:
2,247,280 UART: Running Caliptra ROM ...
2,248,320 UART:
2,248,475 UART: [state] CFI Enabled
2,325,901 UART: [state] LifecycleState = Unprovisioned
2,327,842 UART: [state] DebugLocked = No
2,330,340 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,334,592 UART: [kat] SHA2-256
2,504,304 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,514,771 UART: [kat] ++
2,515,277 UART: [kat] sha1
2,525,898 UART: [kat] SHA2-256
2,528,540 UART: [kat] SHA2-384
2,534,643 UART: [kat] SHA2-512-ACC
2,537,001 UART: [kat] ECC-384
4,828,216 UART: [kat] HMAC-384Kdf
4,857,508 UART: [kat] LMS
6,047,818 UART: [kat] --
6,051,025 UART: [cold-reset] ++
6,053,455 UART: [fht] Storing FHT @ 0x50003400
6,065,213 UART: [idev] ++
6,065,783 UART: [idev] CDI.KEYID = 6
6,066,696 UART: [idev] SUBJECT.KEYID = 7
6,067,968 UART: [idev] UDS.KEYID = 0
6,070,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,219,681 UART: [idev] Erasing UDS.KEYID = 0
9,406,345 UART: [idev] Using Sha1 for KeyId Algorithm
9,428,374 UART: [idev] --
9,432,691 UART: [ldev] ++
9,433,265 UART: [ldev] CDI.KEYID = 6
9,434,236 UART: [ldev] SUBJECT.KEYID = 5
9,435,451 UART: [ldev] AUTHORITY.KEYID = 7
9,436,690 UART: [ldev] FE.KEYID = 1
9,481,298 UART: [ldev] Erasing FE.KEYID = 1
12,815,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,127,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,142,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,157,025 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,171,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,189,927 UART: [ldev] --
15,195,133 UART: [fwproc] Waiting for Commands...
15,197,741 UART: [fwproc] Received command 0x46574c44
15,199,995 UART: [fwproc] Received Image of size 118548 bytes
19,301,673 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,383,041 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,456,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,785,048 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,789,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,206,026 >>> mbox cmd response: failed
17,206,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,207,005 >>> mbox cmd response: failed
17,207,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,207,584 >>> mbox cmd response: failed
Initializing fuses
2,063,486 writing to cptra_bootfsm_go
5,842,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,002,983 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,517 writing to cptra_bootfsm_go
192,664 UART:
193,020 UART: Running Caliptra ROM ...
194,128 UART:
603,773 UART: [state] CFI Enabled
619,975 UART: [state] LifecycleState = Unprovisioned
621,912 UART: [state] DebugLocked = No
624,644 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,563 UART: [kat] SHA2-256
799,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,863 UART: [kat] ++
810,357 UART: [kat] sha1
822,697 UART: [kat] SHA2-256
825,389 UART: [kat] SHA2-384
829,966 UART: [kat] SHA2-512-ACC
832,361 UART: [kat] ECC-384
3,115,767 UART: [kat] HMAC-384Kdf
3,127,574 UART: [kat] LMS
4,317,653 UART: [kat] --
4,323,111 UART: [cold-reset] ++
4,325,535 UART: [fht] Storing FHT @ 0x50003400
4,336,810 UART: [idev] ++
4,337,383 UART: [idev] CDI.KEYID = 6
4,338,409 UART: [idev] SUBJECT.KEYID = 7
4,339,582 UART: [idev] UDS.KEYID = 0
4,342,354 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,443 UART: [idev] Erasing UDS.KEYID = 0
7,630,123 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,072 UART: [idev] --
7,654,859 UART: [ldev] ++
7,655,441 UART: [ldev] CDI.KEYID = 6
7,656,468 UART: [ldev] SUBJECT.KEYID = 5
7,657,633 UART: [ldev] AUTHORITY.KEYID = 7
7,658,864 UART: [ldev] FE.KEYID = 1
7,672,916 UART: [ldev] Erasing FE.KEYID = 1
10,959,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,450 UART: [ldev] --
13,320,778 UART: [fwproc] Waiting for Commands...
13,322,870 UART: [fwproc] Received command 0x46574c44
13,325,079 UART: [fwproc] Received Image of size 118548 bytes
17,431,502 UART: ROM Fatal Error: 0x000B002B
17,434,980 >>> mbox cmd response: failed
17,435,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,435,717 >>> mbox cmd response: failed
17,435,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,436,289 >>> mbox cmd response: failed
Initializing fuses
2,056,879 writing to cptra_bootfsm_go
2,246,141 UART:
2,246,509 UART: Running Caliptra ROM ...
2,247,566 UART:
3,019,913 UART: [state] CFI Enabled
3,036,009 UART: [state] LifecycleState = Unprovisioned
3,037,935 UART: [state] DebugLocked = No
3,040,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,044,697 UART: [kat] SHA2-256
3,214,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,224,988 UART: [kat] ++
3,225,448 UART: [kat] sha1
3,235,526 UART: [kat] SHA2-256
3,238,226 UART: [kat] SHA2-384
3,243,678 UART: [kat] SHA2-512-ACC
3,246,072 UART: [kat] ECC-384
5,530,055 UART: [kat] HMAC-384Kdf
5,541,171 UART: [kat] LMS
6,731,264 UART: [kat] --
6,738,363 UART: [cold-reset] ++
6,740,902 UART: [fht] Storing FHT @ 0x50003400
6,752,040 UART: [idev] ++
6,752,627 UART: [idev] CDI.KEYID = 6
6,753,544 UART: [idev] SUBJECT.KEYID = 7
6,754,764 UART: [idev] UDS.KEYID = 0
6,757,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,906,017 UART: [idev] Erasing UDS.KEYID = 0
10,044,604 UART: [idev] Using Sha1 for KeyId Algorithm
10,066,477 UART: [idev] --
10,069,393 UART: [ldev] ++
10,069,969 UART: [ldev] CDI.KEYID = 6
10,070,884 UART: [ldev] SUBJECT.KEYID = 5
10,072,144 UART: [ldev] AUTHORITY.KEYID = 7
10,073,392 UART: [ldev] FE.KEYID = 1
10,083,718 UART: [ldev] Erasing FE.KEYID = 1
13,370,248 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,662,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,676,710 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,691,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,706,019 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,725,366 UART: [ldev] --
15,729,991 UART: [fwproc] Waiting for Commands...
15,731,731 UART: [fwproc] Received command 0x46574c44
15,733,929 UART: [fwproc] Received Image of size 118548 bytes
19,831,834 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,911,306 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,984,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,313,341 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
4,135,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,412,935 >>> mbox cmd response: failed
17,413,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,413,906 >>> mbox cmd response: failed
17,414,178 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,414,484 >>> mbox cmd response: failed
Initializing fuses
2,060,806 writing to cptra_bootfsm_go
6,576,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,623,229 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,320 UART:
192,696 UART: Running Caliptra ROM ...
193,913 UART:
194,079 UART: [state] CFI Enabled
263,071 UART: [state] LifecycleState = Unprovisioned
264,987 UART: [state] DebugLocked = No
267,183 UART: [state] WD Timer not started. Device not locked for debugging
271,205 UART: [kat] SHA2-256
450,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,610 UART: [kat] ++
462,118 UART: [kat] sha1
473,488 UART: [kat] SHA2-256
476,190 UART: [kat] SHA2-384
481,147 UART: [kat] SHA2-512-ACC
483,488 UART: [kat] ECC-384
2,948,779 UART: [kat] HMAC-384Kdf
2,969,492 UART: [kat] LMS
3,445,971 UART: [kat] --
3,449,264 UART: [cold-reset] ++
3,450,283 UART: [fht] FHT @ 0x50003400
3,462,577 UART: [idev] ++
3,463,196 UART: [idev] CDI.KEYID = 6
3,464,094 UART: [idev] SUBJECT.KEYID = 7
3,465,371 UART: [idev] UDS.KEYID = 0
3,467,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,116 UART: [idev] Erasing UDS.KEYID = 0
5,986,754 UART: [idev] Sha1 KeyId Algorithm
6,010,376 UART: [idev] --
6,016,375 UART: [ldev] ++
6,016,956 UART: [ldev] CDI.KEYID = 6
6,017,945 UART: [ldev] SUBJECT.KEYID = 5
6,019,117 UART: [ldev] AUTHORITY.KEYID = 7
6,020,382 UART: [ldev] FE.KEYID = 1
6,058,295 UART: [ldev] Erasing FE.KEYID = 1
8,565,434 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,652 UART: [ldev] --
10,374,198 UART: [fwproc] Wait for Commands...
10,377,439 UART: [fwproc] Recv command 0x46574c44
10,379,433 UART: [fwproc] Recv'd Img size: 118548 bytes
13,857,279 UART: ROM Fatal Error: 0x000B002B
13,860,544 >>> mbox cmd response: failed
13,861,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,861,516 >>> mbox cmd response: failed
13,861,794 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,862,117 >>> mbox cmd response: failed
Initializing fuses
2,060,793 writing to cptra_bootfsm_go
2,250,123 UART:
2,250,470 UART: Running Caliptra ROM ...
2,251,607 UART:
2,251,785 UART: [state] CFI Enabled
2,316,618 UART: [state] LifecycleState = Unprovisioned
2,318,663 UART: [state] DebugLocked = No
2,319,792 UART: [state] WD Timer not started. Device not locked for debugging
2,323,703 UART: [kat] SHA2-256
2,503,383 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,514,160 UART: [kat] ++
2,514,711 UART: [kat] sha1
2,526,174 UART: [kat] SHA2-256
2,528,879 UART: [kat] SHA2-384
2,534,436 UART: [kat] SHA2-512-ACC
2,536,846 UART: [kat] ECC-384
5,002,426 UART: [kat] HMAC-384Kdf
5,025,966 UART: [kat] LMS
5,502,438 UART: [kat] --
5,508,054 UART: [cold-reset] ++
5,509,556 UART: [fht] FHT @ 0x50003400
5,520,854 UART: [idev] ++
5,521,523 UART: [idev] CDI.KEYID = 6
5,522,418 UART: [idev] SUBJECT.KEYID = 7
5,523,638 UART: [idev] UDS.KEYID = 0
5,526,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,138 UART: [idev] Erasing UDS.KEYID = 0
8,042,483 UART: [idev] Sha1 KeyId Algorithm
8,065,260 UART: [idev] --
8,070,884 UART: [ldev] ++
8,071,466 UART: [ldev] CDI.KEYID = 6
8,072,385 UART: [ldev] SUBJECT.KEYID = 5
8,073,607 UART: [ldev] AUTHORITY.KEYID = 7
8,074,772 UART: [ldev] FE.KEYID = 1
8,114,240 UART: [ldev] Erasing FE.KEYID = 1
10,620,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,408 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,267 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,404,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,392 UART: [ldev] --
12,432,715 UART: [fwproc] Wait for Commands...
12,434,869 UART: [fwproc] Recv command 0x46574c44
12,436,920 UART: [fwproc] Recv'd Img size: 118548 bytes
15,918,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,180 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,072,164 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,400,025 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,462,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,780,222 >>> mbox cmd response: failed
13,780,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,781,283 >>> mbox cmd response: failed
13,781,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,781,855 >>> mbox cmd response: failed
Initializing fuses
2,061,538 writing to cptra_bootfsm_go
5,508,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,273,966 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
192,597 UART:
192,960 UART: Running Caliptra ROM ...
194,180 UART:
603,779 UART: [state] CFI Enabled
617,256 UART: [state] LifecycleState = Unprovisioned
619,201 UART: [state] DebugLocked = No
621,239 UART: [state] WD Timer not started. Device not locked for debugging
624,672 UART: [kat] SHA2-256
804,306 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,108 UART: [kat] ++
815,561 UART: [kat] sha1
827,734 UART: [kat] SHA2-256
830,427 UART: [kat] SHA2-384
836,162 UART: [kat] SHA2-512-ACC
838,548 UART: [kat] ECC-384
3,281,987 UART: [kat] HMAC-384Kdf
3,295,252 UART: [kat] LMS
3,771,774 UART: [kat] --
3,777,288 UART: [cold-reset] ++
3,779,226 UART: [fht] FHT @ 0x50003400
3,791,729 UART: [idev] ++
3,792,361 UART: [idev] CDI.KEYID = 6
3,793,272 UART: [idev] SUBJECT.KEYID = 7
3,794,711 UART: [idev] UDS.KEYID = 0
3,797,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,302 UART: [idev] Erasing UDS.KEYID = 0
6,271,235 UART: [idev] Sha1 KeyId Algorithm
6,294,639 UART: [idev] --
6,298,237 UART: [ldev] ++
6,298,817 UART: [ldev] CDI.KEYID = 6
6,299,729 UART: [ldev] SUBJECT.KEYID = 5
6,300,968 UART: [ldev] AUTHORITY.KEYID = 7
6,302,205 UART: [ldev] FE.KEYID = 1
6,313,288 UART: [ldev] Erasing FE.KEYID = 1
8,791,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,154 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,578,723 UART: [ldev] --
10,584,044 UART: [fwproc] Wait for Commands...
10,587,020 UART: [fwproc] Recv command 0x46574c44
10,589,014 UART: [fwproc] Recv'd Img size: 118548 bytes
14,062,080 UART: ROM Fatal Error: 0x000B002B
14,065,272 >>> mbox cmd response: failed
14,065,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,066,040 >>> mbox cmd response: failed
14,066,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,066,634 >>> mbox cmd response: failed
Initializing fuses
2,061,266 writing to cptra_bootfsm_go
2,250,541 UART:
2,250,883 UART: Running Caliptra ROM ...
2,252,022 UART:
6,383,978 UART: [state] CFI Enabled
6,396,255 UART: [state] LifecycleState = Unprovisioned
6,398,183 UART: [state] DebugLocked = No
6,399,524 UART: [state] WD Timer not started. Device not locked for debugging
6,402,792 UART: [kat] SHA2-256
6,582,462 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,593,262 UART: [kat] ++
6,593,831 UART: [kat] sha1
6,603,760 UART: [kat] SHA2-256
6,606,473 UART: [kat] SHA2-384
6,611,990 UART: [kat] SHA2-512-ACC
6,614,387 UART: [kat] ECC-384
9,055,831 UART: [kat] HMAC-384Kdf
9,067,794 UART: [kat] LMS
9,544,295 UART: [kat] --
9,550,631 UART: [cold-reset] ++
9,552,790 UART: [fht] FHT @ 0x50003400
9,563,986 UART: [idev] ++
9,564,562 UART: [idev] CDI.KEYID = 6
9,565,533 UART: [idev] SUBJECT.KEYID = 7
9,566,750 UART: [idev] UDS.KEYID = 0
9,569,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,718,278 UART: [idev] Erasing UDS.KEYID = 0
12,047,391 UART: [idev] Sha1 KeyId Algorithm
12,069,520 UART: [idev] --
12,074,611 UART: [ldev] ++
12,075,191 UART: [ldev] CDI.KEYID = 6
12,076,268 UART: [ldev] SUBJECT.KEYID = 5
12,077,377 UART: [ldev] AUTHORITY.KEYID = 7
12,078,559 UART: [ldev] FE.KEYID = 1
12,091,043 UART: [ldev] Erasing FE.KEYID = 1
14,571,246 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,291,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,307,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,323,493 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,339,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,359,908 UART: [ldev] --
16,365,765 UART: [fwproc] Wait for Commands...
16,367,379 UART: [fwproc] Recv command 0x46574c44
16,369,481 UART: [fwproc] Recv'd Img size: 118548 bytes
19,852,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,943,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,016,189 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,343,734 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,366 writing to cptra_bootfsm_go
3,779,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,971,193 >>> mbox cmd response: failed
13,971,807 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,972,164 >>> mbox cmd response: failed
13,972,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,972,732 >>> mbox cmd response: failed
Initializing fuses
2,061,783 writing to cptra_bootfsm_go
9,679,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,352,131 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
192,405 UART:
192,759 UART: Running Caliptra ROM ...
193,948 UART:
194,103 UART: [state] CFI Enabled
261,432 UART: [state] LifecycleState = Unprovisioned
263,856 UART: [state] DebugLocked = No
265,947 UART: [state] WD Timer not started. Device not locked for debugging
270,489 UART: [kat] SHA2-256
460,390 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,120 UART: [kat] ++
472,404 UART: [kat] sha1
484,623 UART: [kat] SHA2-256
487,653 UART: [kat] SHA2-384
494,346 UART: [kat] SHA2-512-ACC
496,963 UART: [kat] ECC-384
2,946,929 UART: [kat] HMAC-384Kdf
2,971,299 UART: [kat] LMS
3,503,086 UART: [kat] --
3,507,191 UART: [cold-reset] ++
3,508,103 UART: [fht] FHT @ 0x50003400
3,519,719 UART: [idev] ++
3,520,455 UART: [idev] CDI.KEYID = 6
3,521,385 UART: [idev] SUBJECT.KEYID = 7
3,522,549 UART: [idev] UDS.KEYID = 0
3,525,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,603 UART: [idev] Erasing UDS.KEYID = 0
6,029,120 UART: [idev] Sha1 KeyId Algorithm
6,052,484 UART: [idev] --
6,055,900 UART: [ldev] ++
6,056,590 UART: [ldev] CDI.KEYID = 6
6,057,504 UART: [ldev] SUBJECT.KEYID = 5
6,058,673 UART: [ldev] AUTHORITY.KEYID = 7
6,059,912 UART: [ldev] FE.KEYID = 1
6,101,998 UART: [ldev] Erasing FE.KEYID = 1
8,608,061 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,744 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,830 UART: [ldev] --
10,415,169 UART: [fwproc] Wait for Commands...
10,417,594 UART: [fwproc] Recv command 0x46574c44
10,419,860 UART: [fwproc] Recv'd Img size: 118548 bytes
13,913,564 UART: ROM Fatal Error: 0x000B002B
13,917,245 >>> mbox cmd response: failed
13,917,675 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,918,012 >>> mbox cmd response: failed
13,918,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,918,539 >>> mbox cmd response: failed
Initializing fuses
2,061,580 writing to cptra_bootfsm_go
2,250,934 UART:
2,251,300 UART: Running Caliptra ROM ...
2,252,381 UART:
2,252,541 UART: [state] CFI Enabled
2,317,626 UART: [state] LifecycleState = Unprovisioned
2,320,052 UART: [state] DebugLocked = No
2,322,769 UART: [state] WD Timer not started. Device not locked for debugging
2,327,387 UART: [kat] SHA2-256
2,517,232 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,528,006 UART: [kat] ++
2,528,558 UART: [kat] sha1
2,539,248 UART: [kat] SHA2-256
2,542,271 UART: [kat] SHA2-384
2,547,887 UART: [kat] SHA2-512-ACC
2,550,463 UART: [kat] ECC-384
4,999,189 UART: [kat] HMAC-384Kdf
5,026,068 UART: [kat] LMS
5,557,813 UART: [kat] --
5,561,773 UART: [cold-reset] ++
5,563,829 UART: [fht] FHT @ 0x50003400
5,576,710 UART: [idev] ++
5,577,393 UART: [idev] CDI.KEYID = 6
5,578,329 UART: [idev] SUBJECT.KEYID = 7
5,579,557 UART: [idev] UDS.KEYID = 0
5,581,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,029 UART: [idev] Erasing UDS.KEYID = 0
8,082,745 UART: [idev] Sha1 KeyId Algorithm
8,106,757 UART: [idev] --
8,111,840 UART: [ldev] ++
8,112,527 UART: [ldev] CDI.KEYID = 6
8,113,436 UART: [ldev] SUBJECT.KEYID = 5
8,114,601 UART: [ldev] AUTHORITY.KEYID = 7
8,115,842 UART: [ldev] FE.KEYID = 1
8,154,090 UART: [ldev] Erasing FE.KEYID = 1
10,661,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,609 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,868 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,462,251 UART: [ldev] --
12,467,576 UART: [fwproc] Wait for Commands...
12,469,137 UART: [fwproc] Recv command 0x46574c44
12,471,451 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,049,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,173,235 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,733,187 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,968 writing to cptra_bootfsm_go
3,444,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,322,839 >>> mbox cmd response: failed
14,323,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,323,906 >>> mbox cmd response: failed
14,324,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,484 >>> mbox cmd response: failed
Initializing fuses
2,061,698 writing to cptra_bootfsm_go
5,499,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,865,328 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,183 writing to cptra_bootfsm_go
192,499 UART:
192,868 UART: Running Caliptra ROM ...
194,025 UART:
603,556 UART: [state] CFI Enabled
615,967 UART: [state] LifecycleState = Unprovisioned
618,297 UART: [state] DebugLocked = No
620,789 UART: [state] WD Timer not started. Device not locked for debugging
625,653 UART: [kat] SHA2-256
815,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,297 UART: [kat] ++
826,836 UART: [kat] sha1
839,235 UART: [kat] SHA2-256
842,257 UART: [kat] SHA2-384
848,249 UART: [kat] SHA2-512-ACC
850,870 UART: [kat] ECC-384
3,294,575 UART: [kat] HMAC-384Kdf
3,307,105 UART: [kat] LMS
3,838,914 UART: [kat] --
3,845,692 UART: [cold-reset] ++
3,846,824 UART: [fht] FHT @ 0x50003400
3,858,305 UART: [idev] ++
3,858,994 UART: [idev] CDI.KEYID = 6
3,859,964 UART: [idev] SUBJECT.KEYID = 7
3,861,186 UART: [idev] UDS.KEYID = 0
3,864,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,013,099 UART: [idev] Erasing UDS.KEYID = 0
6,340,015 UART: [idev] Sha1 KeyId Algorithm
6,363,262 UART: [idev] --
6,368,203 UART: [ldev] ++
6,368,905 UART: [ldev] CDI.KEYID = 6
6,369,794 UART: [ldev] SUBJECT.KEYID = 5
6,371,013 UART: [ldev] AUTHORITY.KEYID = 7
6,372,193 UART: [ldev] FE.KEYID = 1
6,384,495 UART: [ldev] Erasing FE.KEYID = 1
8,865,242 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,585,995 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,601,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,616,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,631,486 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,401 UART: [ldev] --
10,657,373 UART: [fwproc] Wait for Commands...
10,660,122 UART: [fwproc] Recv command 0x46574c44
10,662,393 UART: [fwproc] Recv'd Img size: 118548 bytes
14,153,251 UART: ROM Fatal Error: 0x000B002B
14,156,938 >>> mbox cmd response: failed
14,157,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,157,693 >>> mbox cmd response: failed
14,157,968 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,158,266 >>> mbox cmd response: failed
Initializing fuses
2,064,573 writing to cptra_bootfsm_go
2,253,904 UART:
2,254,258 UART: Running Caliptra ROM ...
2,255,397 UART:
6,286,130 UART: [state] CFI Enabled
6,300,950 UART: [state] LifecycleState = Unprovisioned
6,303,313 UART: [state] DebugLocked = No
6,305,679 UART: [state] WD Timer not started. Device not locked for debugging
6,310,098 UART: [kat] SHA2-256
6,499,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,510,779 UART: [kat] ++
6,511,332 UART: [kat] sha1
6,521,373 UART: [kat] SHA2-256
6,524,397 UART: [kat] SHA2-384
6,531,174 UART: [kat] SHA2-512-ACC
6,533,755 UART: [kat] ECC-384
8,977,058 UART: [kat] HMAC-384Kdf
8,989,196 UART: [kat] LMS
9,521,038 UART: [kat] --
9,525,422 UART: [cold-reset] ++
9,526,770 UART: [fht] FHT @ 0x50003400
9,537,328 UART: [idev] ++
9,538,016 UART: [idev] CDI.KEYID = 6
9,539,010 UART: [idev] SUBJECT.KEYID = 7
9,540,178 UART: [idev] UDS.KEYID = 0
9,542,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,691,443 UART: [idev] Erasing UDS.KEYID = 0
12,015,871 UART: [idev] Sha1 KeyId Algorithm
12,039,054 UART: [idev] --
12,042,715 UART: [ldev] ++
12,043,436 UART: [ldev] CDI.KEYID = 6
12,044,358 UART: [ldev] SUBJECT.KEYID = 5
12,045,529 UART: [ldev] AUTHORITY.KEYID = 7
12,046,713 UART: [ldev] FE.KEYID = 1
12,056,772 UART: [ldev] Erasing FE.KEYID = 1
14,534,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,255,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,271,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,286,238 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,301,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,321,144 UART: [ldev] --
16,327,438 UART: [fwproc] Wait for Commands...
16,330,356 UART: [fwproc] Recv command 0x46574c44
16,332,628 UART: [fwproc] Recv'd Img size: 118548 bytes
19,821,589 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,905,721 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,029,372 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,590,362 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,243 writing to cptra_bootfsm_go
3,756,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,577,172 >>> mbox cmd response: failed
14,577,703 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,578,057 >>> mbox cmd response: failed
14,578,389 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,578,685 >>> mbox cmd response: failed
Initializing fuses
2,061,417 writing to cptra_bootfsm_go
9,037,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,313,654 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,024 UART: [state] LifecycleState = Unprovisioned
85,679 UART: [state] DebugLocked = No
86,227 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,865 UART: [kat] SHA2-256
881,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,911 UART: [kat] ++
886,063 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,768 UART: [kat] SHA2-512-ACC
896,669 UART: [kat] ECC-384
902,150 UART: [kat] HMAC-384Kdf
906,732 UART: [kat] LMS
1,474,928 UART: [kat] --
1,475,821 UART: [cold-reset] ++
1,476,185 UART: [fht] Storing FHT @ 0x50003400
1,479,010 UART: [idev] ++
1,479,178 UART: [idev] CDI.KEYID = 6
1,479,538 UART: [idev] SUBJECT.KEYID = 7
1,479,962 UART: [idev] UDS.KEYID = 0
1,480,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,272 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,686 UART: [idev] --
1,514,795 UART: [ldev] ++
1,514,963 UART: [ldev] CDI.KEYID = 6
1,515,326 UART: [ldev] SUBJECT.KEYID = 5
1,515,752 UART: [ldev] AUTHORITY.KEYID = 7
1,516,215 UART: [ldev] FE.KEYID = 1
1,521,345 UART: [ldev] Erasing FE.KEYID = 1
1,546,962 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,231 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,834 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,796 UART: [ldev] --
1,586,311 UART: [fwproc] Waiting for Commands...
1,587,026 UART: [fwproc] Received command 0x46574c44
1,587,817 UART: [fwproc] Received Image of size 118548 bytes
2,930,992 UART: ROM Fatal Error: 0x000B002B
2,932,151 >>> mbox cmd response: failed
2,932,151 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,157 >>> mbox cmd response: failed
2,932,157 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,163 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,202 UART: [state] LifecycleState = Unprovisioned
85,857 UART: [state] DebugLocked = No
86,419 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,116 UART: [kat] SHA2-512-ACC
897,017 UART: [kat] ECC-384
902,372 UART: [kat] HMAC-384Kdf
907,130 UART: [kat] LMS
1,475,326 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,999 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,806 UART: [idev] Erasing UDS.KEYID = 0
1,506,052 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,552 UART: [idev] --
1,515,655 UART: [ldev] ++
1,515,823 UART: [ldev] CDI.KEYID = 6
1,516,186 UART: [ldev] SUBJECT.KEYID = 5
1,516,612 UART: [ldev] AUTHORITY.KEYID = 7
1,517,075 UART: [ldev] FE.KEYID = 1
1,522,389 UART: [ldev] Erasing FE.KEYID = 1
1,548,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,788 UART: [ldev] --
1,587,163 UART: [fwproc] Waiting for Commands...
1,587,996 UART: [fwproc] Received command 0x46574c44
1,588,787 UART: [fwproc] Received Image of size 118548 bytes
2,933,474 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,462 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,680 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,989 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,082 >>> mbox cmd response: failed
2,785,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,088 >>> mbox cmd response: failed
2,785,088 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,094 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,067 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,261 UART: [state] LifecycleState = Unprovisioned
85,916 UART: [state] DebugLocked = No
86,506 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,186 UART: [kat] SHA2-256
882,117 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,232 UART: [kat] ++
886,384 UART: [kat] sha1
890,792 UART: [kat] SHA2-256
892,730 UART: [kat] SHA2-384
895,353 UART: [kat] SHA2-512-ACC
897,254 UART: [kat] ECC-384
903,047 UART: [kat] HMAC-384Kdf
907,755 UART: [kat] LMS
1,475,951 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,476,988 UART: [fht] Storing FHT @ 0x50003400
1,479,823 UART: [idev] ++
1,479,991 UART: [idev] CDI.KEYID = 6
1,480,351 UART: [idev] SUBJECT.KEYID = 7
1,480,775 UART: [idev] UDS.KEYID = 0
1,481,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,529 UART: [idev] Erasing UDS.KEYID = 0
1,505,427 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,249 UART: [idev] --
1,515,424 UART: [ldev] ++
1,515,592 UART: [ldev] CDI.KEYID = 6
1,515,955 UART: [ldev] SUBJECT.KEYID = 5
1,516,381 UART: [ldev] AUTHORITY.KEYID = 7
1,516,844 UART: [ldev] FE.KEYID = 1
1,522,220 UART: [ldev] Erasing FE.KEYID = 1
1,547,185 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,121 UART: [ldev] --
1,586,416 UART: [fwproc] Waiting for Commands...
1,587,083 UART: [fwproc] Received command 0x46574c44
1,587,874 UART: [fwproc] Received Image of size 118548 bytes
2,931,061 UART: ROM Fatal Error: 0x000B002B
2,932,220 >>> mbox cmd response: failed
2,932,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,226 >>> mbox cmd response: failed
2,932,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,932,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,142 UART: [kat] SHA2-256
882,073 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,188 UART: [kat] ++
886,340 UART: [kat] sha1
890,630 UART: [kat] SHA2-256
892,568 UART: [kat] SHA2-384
895,183 UART: [kat] SHA2-512-ACC
897,084 UART: [kat] ECC-384
902,979 UART: [kat] HMAC-384Kdf
907,749 UART: [kat] LMS
1,475,945 UART: [kat] --
1,476,932 UART: [cold-reset] ++
1,477,336 UART: [fht] Storing FHT @ 0x50003400
1,480,065 UART: [idev] ++
1,480,233 UART: [idev] CDI.KEYID = 6
1,480,593 UART: [idev] SUBJECT.KEYID = 7
1,481,017 UART: [idev] UDS.KEYID = 0
1,481,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,841 UART: [idev] Erasing UDS.KEYID = 0
1,505,935 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,425 UART: [idev] --
1,515,516 UART: [ldev] ++
1,515,684 UART: [ldev] CDI.KEYID = 6
1,516,047 UART: [ldev] SUBJECT.KEYID = 5
1,516,473 UART: [ldev] AUTHORITY.KEYID = 7
1,516,936 UART: [ldev] FE.KEYID = 1
1,522,214 UART: [ldev] Erasing FE.KEYID = 1
1,548,043 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,947 UART: [ldev] --
1,587,220 UART: [fwproc] Waiting for Commands...
1,587,949 UART: [fwproc] Received command 0x46574c44
1,588,740 UART: [fwproc] Received Image of size 118548 bytes
2,933,023 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,215 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,433 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,726 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,378 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,967 >>> mbox cmd response: failed
2,784,967 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,973 >>> mbox cmd response: failed
2,784,973 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,979 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,356 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,792 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,035 UART: [state] WD Timer not started. Device not locked for debugging
87,148 UART: [kat] SHA2-256
890,698 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,802 UART: [kat] ++
894,954 UART: [kat] sha1
899,146 UART: [kat] SHA2-256
901,086 UART: [kat] SHA2-384
903,653 UART: [kat] SHA2-512-ACC
905,554 UART: [kat] ECC-384
915,233 UART: [kat] HMAC-384Kdf
920,021 UART: [kat] LMS
1,168,333 UART: [kat] --
1,169,386 UART: [cold-reset] ++
1,169,726 UART: [fht] FHT @ 0x50003400
1,172,336 UART: [idev] ++
1,172,504 UART: [idev] CDI.KEYID = 6
1,172,865 UART: [idev] SUBJECT.KEYID = 7
1,173,290 UART: [idev] UDS.KEYID = 0
1,173,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,627 UART: [idev] Erasing UDS.KEYID = 0
1,198,329 UART: [idev] Sha1 KeyId Algorithm
1,207,163 UART: [idev] --
1,208,178 UART: [ldev] ++
1,208,346 UART: [ldev] CDI.KEYID = 6
1,208,710 UART: [ldev] SUBJECT.KEYID = 5
1,209,137 UART: [ldev] AUTHORITY.KEYID = 7
1,209,600 UART: [ldev] FE.KEYID = 1
1,214,910 UART: [ldev] Erasing FE.KEYID = 1
1,241,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,811 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,412 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,626 UART: [ldev] --
1,280,933 UART: [fwproc] Wait for Commands...
1,281,700 UART: [fwproc] Recv command 0x46574c44
1,282,433 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,833 UART: ROM Fatal Error: 0x000B002B
2,626,992 >>> mbox cmd response: failed
2,626,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,998 >>> mbox cmd response: failed
2,626,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,004 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,382 UART: [state] LifecycleState = Unprovisioned
85,037 UART: [state] DebugLocked = No
85,671 UART: [state] WD Timer not started. Device not locked for debugging
86,864 UART: [kat] SHA2-256
890,414 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,518 UART: [kat] ++
894,670 UART: [kat] sha1
898,812 UART: [kat] SHA2-256
900,752 UART: [kat] SHA2-384
903,545 UART: [kat] SHA2-512-ACC
905,446 UART: [kat] ECC-384
915,253 UART: [kat] HMAC-384Kdf
919,877 UART: [kat] LMS
1,168,189 UART: [kat] --
1,168,972 UART: [cold-reset] ++
1,169,468 UART: [fht] FHT @ 0x50003400
1,172,126 UART: [idev] ++
1,172,294 UART: [idev] CDI.KEYID = 6
1,172,655 UART: [idev] SUBJECT.KEYID = 7
1,173,080 UART: [idev] UDS.KEYID = 0
1,173,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,673 UART: [idev] Erasing UDS.KEYID = 0
1,197,617 UART: [idev] Sha1 KeyId Algorithm
1,206,623 UART: [idev] --
1,207,548 UART: [ldev] ++
1,207,716 UART: [ldev] CDI.KEYID = 6
1,208,080 UART: [ldev] SUBJECT.KEYID = 5
1,208,507 UART: [ldev] AUTHORITY.KEYID = 7
1,208,970 UART: [ldev] FE.KEYID = 1
1,213,952 UART: [ldev] Erasing FE.KEYID = 1
1,239,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,942 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,872 UART: [ldev] --
1,279,199 UART: [fwproc] Wait for Commands...
1,279,906 UART: [fwproc] Recv command 0x46574c44
1,280,639 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,781 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,617 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,075 >>> mbox cmd response: failed
2,483,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,081 >>> mbox cmd response: failed
2,483,081 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,087 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,727 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,820 UART: [state] WD Timer not started. Device not locked for debugging
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,215 UART: [kat] SHA2-256
902,155 UART: [kat] SHA2-384
904,920 UART: [kat] SHA2-512-ACC
906,821 UART: [kat] ECC-384
916,960 UART: [kat] HMAC-384Kdf
921,534 UART: [kat] LMS
1,169,846 UART: [kat] --
1,170,681 UART: [cold-reset] ++
1,171,097 UART: [fht] FHT @ 0x50003400
1,173,739 UART: [idev] ++
1,173,907 UART: [idev] CDI.KEYID = 6
1,174,268 UART: [idev] SUBJECT.KEYID = 7
1,174,693 UART: [idev] UDS.KEYID = 0
1,175,039 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,388 UART: [idev] Erasing UDS.KEYID = 0
1,199,938 UART: [idev] Sha1 KeyId Algorithm
1,208,872 UART: [idev] --
1,210,009 UART: [ldev] ++
1,210,177 UART: [ldev] CDI.KEYID = 6
1,210,541 UART: [ldev] SUBJECT.KEYID = 5
1,210,968 UART: [ldev] AUTHORITY.KEYID = 7
1,211,431 UART: [ldev] FE.KEYID = 1
1,216,603 UART: [ldev] Erasing FE.KEYID = 1
1,242,182 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,539 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,508 UART: [fwproc] Wait for Commands...
1,282,307 UART: [fwproc] Recv command 0x46574c44
1,283,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,272 UART: ROM Fatal Error: 0x000B002B
2,627,431 >>> mbox cmd response: failed
2,627,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,437 >>> mbox cmd response: failed
2,627,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,443 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,664 UART: [state] WD Timer not started. Device not locked for debugging
87,779 UART: [kat] SHA2-256
891,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,433 UART: [kat] ++
895,585 UART: [kat] sha1
899,951 UART: [kat] SHA2-256
901,891 UART: [kat] SHA2-384
904,774 UART: [kat] SHA2-512-ACC
906,675 UART: [kat] ECC-384
916,722 UART: [kat] HMAC-384Kdf
921,406 UART: [kat] LMS
1,169,718 UART: [kat] --
1,170,689 UART: [cold-reset] ++
1,171,227 UART: [fht] FHT @ 0x50003400
1,173,927 UART: [idev] ++
1,174,095 UART: [idev] CDI.KEYID = 6
1,174,456 UART: [idev] SUBJECT.KEYID = 7
1,174,881 UART: [idev] UDS.KEYID = 0
1,175,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,716 UART: [idev] Erasing UDS.KEYID = 0
1,199,538 UART: [idev] Sha1 KeyId Algorithm
1,208,456 UART: [idev] --
1,209,379 UART: [ldev] ++
1,209,547 UART: [ldev] CDI.KEYID = 6
1,209,911 UART: [ldev] SUBJECT.KEYID = 5
1,210,338 UART: [ldev] AUTHORITY.KEYID = 7
1,210,801 UART: [ldev] FE.KEYID = 1
1,215,969 UART: [ldev] Erasing FE.KEYID = 1
1,242,720 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,451 UART: [ldev] --
1,281,816 UART: [fwproc] Wait for Commands...
1,282,401 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,318 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,255 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,430 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,749 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,898 >>> mbox cmd response: failed
2,484,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,904 >>> mbox cmd response: failed
2,484,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,772 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,095 UART: [state] WD Timer not started. Device not locked for debugging
87,250 UART: [kat] SHA2-256
892,900 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,025 UART: [kat] ++
897,177 UART: [kat] sha1
901,551 UART: [kat] SHA2-256
903,491 UART: [kat] SHA2-384
906,454 UART: [kat] SHA2-512-ACC
908,355 UART: [kat] ECC-384
918,162 UART: [kat] HMAC-384Kdf
922,836 UART: [kat] LMS
1,171,164 UART: [kat] --
1,172,101 UART: [cold-reset] ++
1,172,567 UART: [fht] FHT @ 0x50003400
1,175,088 UART: [idev] ++
1,175,256 UART: [idev] CDI.KEYID = 6
1,175,616 UART: [idev] SUBJECT.KEYID = 7
1,176,040 UART: [idev] UDS.KEYID = 0
1,176,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,246 UART: [idev] Erasing UDS.KEYID = 0
1,201,127 UART: [idev] Sha1 KeyId Algorithm
1,209,609 UART: [idev] --
1,210,637 UART: [ldev] ++
1,210,805 UART: [ldev] CDI.KEYID = 6
1,211,168 UART: [ldev] SUBJECT.KEYID = 5
1,211,594 UART: [ldev] AUTHORITY.KEYID = 7
1,212,057 UART: [ldev] FE.KEYID = 1
1,217,251 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,274 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,986 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,157 UART: [ldev] --
1,282,552 UART: [fwproc] Wait for Commands...
1,283,164 UART: [fwproc] Recv command 0x46574c44
1,283,892 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,160 UART: ROM Fatal Error: 0x000B002B
2,628,319 >>> mbox cmd response: failed
2,628,319 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,325 >>> mbox cmd response: failed
2,628,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,331 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,826 UART: [state] LifecycleState = Unprovisioned
85,481 UART: [state] DebugLocked = No
86,079 UART: [state] WD Timer not started. Device not locked for debugging
87,368 UART: [kat] SHA2-256
893,018 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,143 UART: [kat] ++
897,295 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,172 UART: [kat] SHA2-512-ACC
908,073 UART: [kat] ECC-384
917,794 UART: [kat] HMAC-384Kdf
922,226 UART: [kat] LMS
1,170,554 UART: [kat] --
1,171,497 UART: [cold-reset] ++
1,171,949 UART: [fht] FHT @ 0x50003400
1,174,528 UART: [idev] ++
1,174,696 UART: [idev] CDI.KEYID = 6
1,175,056 UART: [idev] SUBJECT.KEYID = 7
1,175,480 UART: [idev] UDS.KEYID = 0
1,175,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,482 UART: [idev] Erasing UDS.KEYID = 0
1,200,731 UART: [idev] Sha1 KeyId Algorithm
1,209,261 UART: [idev] --
1,210,177 UART: [ldev] ++
1,210,345 UART: [ldev] CDI.KEYID = 6
1,210,708 UART: [ldev] SUBJECT.KEYID = 5
1,211,134 UART: [ldev] AUTHORITY.KEYID = 7
1,211,597 UART: [ldev] FE.KEYID = 1
1,216,727 UART: [ldev] Erasing FE.KEYID = 1
1,243,168 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,547 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,263 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,866 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,464 UART: [fwproc] Wait for Commands...
1,283,198 UART: [fwproc] Recv command 0x46574c44
1,283,926 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,525 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,695 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,936 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,415 >>> mbox cmd response: failed
2,482,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,421 >>> mbox cmd response: failed
2,482,421 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,823 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,865 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,489 UART: [state] LifecycleState = Unprovisioned
86,144 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
87,993 UART: [kat] SHA2-256
893,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,768 UART: [kat] ++
897,920 UART: [kat] sha1
902,074 UART: [kat] SHA2-256
904,014 UART: [kat] SHA2-384
906,745 UART: [kat] SHA2-512-ACC
908,646 UART: [kat] ECC-384
918,369 UART: [kat] HMAC-384Kdf
923,005 UART: [kat] LMS
1,171,333 UART: [kat] --
1,172,126 UART: [cold-reset] ++
1,172,518 UART: [fht] FHT @ 0x50003400
1,175,245 UART: [idev] ++
1,175,413 UART: [idev] CDI.KEYID = 6
1,175,773 UART: [idev] SUBJECT.KEYID = 7
1,176,197 UART: [idev] UDS.KEYID = 0
1,176,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,419 UART: [idev] Erasing UDS.KEYID = 0
1,201,342 UART: [idev] Sha1 KeyId Algorithm
1,209,720 UART: [idev] --
1,210,824 UART: [ldev] ++
1,210,992 UART: [ldev] CDI.KEYID = 6
1,211,355 UART: [ldev] SUBJECT.KEYID = 5
1,211,781 UART: [ldev] AUTHORITY.KEYID = 7
1,212,244 UART: [ldev] FE.KEYID = 1
1,217,466 UART: [ldev] Erasing FE.KEYID = 1
1,243,487 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,316 UART: [ldev] --
1,282,593 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,949 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,243 UART: ROM Fatal Error: 0x000B002B
2,628,402 >>> mbox cmd response: failed
2,628,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,408 >>> mbox cmd response: failed
2,628,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,253 UART: [state] LifecycleState = Unprovisioned
85,908 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,827 UART: [kat] SHA2-256
893,477 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,602 UART: [kat] ++
897,754 UART: [kat] sha1
901,862 UART: [kat] SHA2-256
903,802 UART: [kat] SHA2-384
906,477 UART: [kat] SHA2-512-ACC
908,378 UART: [kat] ECC-384
918,291 UART: [kat] HMAC-384Kdf
923,013 UART: [kat] LMS
1,171,341 UART: [kat] --
1,171,892 UART: [cold-reset] ++
1,172,264 UART: [fht] FHT @ 0x50003400
1,174,853 UART: [idev] ++
1,175,021 UART: [idev] CDI.KEYID = 6
1,175,381 UART: [idev] SUBJECT.KEYID = 7
1,175,805 UART: [idev] UDS.KEYID = 0
1,176,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,243 UART: [idev] Erasing UDS.KEYID = 0
1,201,612 UART: [idev] Sha1 KeyId Algorithm
1,210,046 UART: [idev] --
1,211,264 UART: [ldev] ++
1,211,432 UART: [ldev] CDI.KEYID = 6
1,211,795 UART: [ldev] SUBJECT.KEYID = 5
1,212,221 UART: [ldev] AUTHORITY.KEYID = 7
1,212,684 UART: [ldev] FE.KEYID = 1
1,217,844 UART: [ldev] Erasing FE.KEYID = 1
1,244,871 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,394 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,285 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,997 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,110 UART: [ldev] --
1,284,371 UART: [fwproc] Wait for Commands...
1,285,053 UART: [fwproc] Recv command 0x46574c44
1,285,781 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,361 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,977 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,624 >>> mbox cmd response: failed
2,482,624 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,630 >>> mbox cmd response: failed
2,482,630 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,736 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,476 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_entry_point_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
192,220 UART:
192,562 UART: Running Caliptra ROM ...
193,694 UART:
193,841 UART: [state] CFI Enabled
266,422 UART: [state] LifecycleState = Unprovisioned
268,407 UART: [state] DebugLocked = No
269,732 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,014 UART: [kat] SHA2-256
443,718 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,197 UART: [kat] ++
454,646 UART: [kat] sha1
466,442 UART: [kat] SHA2-256
469,131 UART: [kat] SHA2-384
474,951 UART: [kat] SHA2-512-ACC
477,349 UART: [kat] ECC-384
2,766,299 UART: [kat] HMAC-384Kdf
2,798,963 UART: [kat] LMS
3,989,258 UART: [kat] --
3,993,172 UART: [cold-reset] ++
3,995,225 UART: [fht] Storing FHT @ 0x50003400
4,007,943 UART: [idev] ++
4,008,558 UART: [idev] CDI.KEYID = 6
4,009,483 UART: [idev] SUBJECT.KEYID = 7
4,010,706 UART: [idev] UDS.KEYID = 0
4,013,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,761 UART: [idev] Erasing UDS.KEYID = 0
7,349,416 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,445 UART: [idev] --
7,376,128 UART: [ldev] ++
7,376,769 UART: [ldev] CDI.KEYID = 6
7,377,682 UART: [ldev] SUBJECT.KEYID = 5
7,378,920 UART: [ldev] AUTHORITY.KEYID = 7
7,380,159 UART: [ldev] FE.KEYID = 1
7,420,245 UART: [ldev] Erasing FE.KEYID = 1
10,755,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,045 UART: [ldev] --
13,136,122 UART: [fwproc] Waiting for Commands...
13,139,205 UART: [fwproc] Received command 0x46574c44
13,141,398 UART: [fwproc] Received Image of size 118548 bytes
17,240,813 UART: ROM Fatal Error: 0x000B0028
17,244,278 >>> mbox cmd response: failed
17,244,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,245,048 >>> mbox cmd response: failed
17,245,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,245,636 >>> mbox cmd response: failed
Initializing fuses
2,056,677 writing to cptra_bootfsm_go
2,246,036 UART:
2,246,399 UART: Running Caliptra ROM ...
2,247,451 UART:
2,247,603 UART: [state] CFI Enabled
2,318,227 UART: [state] LifecycleState = Unprovisioned
2,320,173 UART: [state] DebugLocked = No
2,321,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,327,088 UART: [kat] SHA2-256
2,496,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,507,295 UART: [kat] ++
2,507,775 UART: [kat] sha1
2,517,964 UART: [kat] SHA2-256
2,520,670 UART: [kat] SHA2-384
2,526,761 UART: [kat] SHA2-512-ACC
2,529,181 UART: [kat] ECC-384
4,823,909 UART: [kat] HMAC-384Kdf
4,853,477 UART: [kat] LMS
6,043,797 UART: [kat] --
6,050,666 UART: [cold-reset] ++
6,051,634 UART: [fht] Storing FHT @ 0x50003400
6,062,529 UART: [idev] ++
6,063,095 UART: [idev] CDI.KEYID = 6
6,064,118 UART: [idev] SUBJECT.KEYID = 7
6,065,284 UART: [idev] UDS.KEYID = 0
6,067,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,794 UART: [idev] Erasing UDS.KEYID = 0
9,398,370 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,036 UART: [idev] --
9,425,490 UART: [ldev] ++
9,426,070 UART: [ldev] CDI.KEYID = 6
9,426,985 UART: [ldev] SUBJECT.KEYID = 5
9,428,247 UART: [ldev] AUTHORITY.KEYID = 7
9,429,494 UART: [ldev] FE.KEYID = 1
9,474,001 UART: [ldev] Erasing FE.KEYID = 1
12,805,278 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,099,240 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,143,196 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,162,890 UART: [ldev] --
15,167,930 UART: [fwproc] Waiting for Commands...
15,170,960 UART: [fwproc] Received command 0x46574c44
15,173,172 UART: [fwproc] Received Image of size 118548 bytes
19,282,774 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,355,560 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,428,736 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,756,804 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,785,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,213,579 >>> mbox cmd response: failed
17,214,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,214,578 >>> mbox cmd response: failed
17,214,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,215,160 >>> mbox cmd response: failed
Initializing fuses
2,057,256 writing to cptra_bootfsm_go
5,834,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,982,730 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,559 UART:
192,946 UART: Running Caliptra ROM ...
194,142 UART:
603,868 UART: [state] CFI Enabled
617,845 UART: [state] LifecycleState = Unprovisioned
619,819 UART: [state] DebugLocked = No
621,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,554 UART: [kat] SHA2-256
797,275 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,862 UART: [kat] ++
808,320 UART: [kat] sha1
818,120 UART: [kat] SHA2-256
820,868 UART: [kat] SHA2-384
826,752 UART: [kat] SHA2-512-ACC
829,097 UART: [kat] ECC-384
3,111,686 UART: [kat] HMAC-384Kdf
3,122,851 UART: [kat] LMS
4,312,954 UART: [kat] --
4,317,473 UART: [cold-reset] ++
4,318,928 UART: [fht] Storing FHT @ 0x50003400
4,331,176 UART: [idev] ++
4,331,760 UART: [idev] CDI.KEYID = 6
4,332,682 UART: [idev] SUBJECT.KEYID = 7
4,333,908 UART: [idev] UDS.KEYID = 0
4,337,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,135 UART: [idev] Erasing UDS.KEYID = 0
7,623,609 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,124 UART: [idev] --
7,650,590 UART: [ldev] ++
7,651,174 UART: [ldev] CDI.KEYID = 6
7,652,150 UART: [ldev] SUBJECT.KEYID = 5
7,653,372 UART: [ldev] AUTHORITY.KEYID = 7
7,654,613 UART: [ldev] FE.KEYID = 1
7,665,793 UART: [ldev] Erasing FE.KEYID = 1
10,949,366 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,794 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,340 UART: [ldev] --
13,312,080 UART: [fwproc] Waiting for Commands...
13,315,432 UART: [fwproc] Received command 0x46574c44
13,317,622 UART: [fwproc] Received Image of size 118548 bytes
17,413,954 UART: ROM Fatal Error: 0x000B0028
17,417,474 >>> mbox cmd response: failed
17,417,992 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,418,344 >>> mbox cmd response: failed
17,418,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,418,913 >>> mbox cmd response: failed
Initializing fuses
2,059,213 writing to cptra_bootfsm_go
2,248,474 UART:
2,248,839 UART: Running Caliptra ROM ...
2,249,921 UART:
3,035,601 UART: [state] CFI Enabled
3,050,841 UART: [state] LifecycleState = Unprovisioned
3,052,792 UART: [state] DebugLocked = No
3,054,795 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,059,601 UART: [kat] SHA2-256
3,229,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,239,921 UART: [kat] ++
3,240,469 UART: [kat] sha1
3,250,935 UART: [kat] SHA2-256
3,253,645 UART: [kat] SHA2-384
3,258,346 UART: [kat] SHA2-512-ACC
3,260,703 UART: [kat] ECC-384
5,545,264 UART: [kat] HMAC-384Kdf
5,555,514 UART: [kat] LMS
6,745,635 UART: [kat] --
6,749,869 UART: [cold-reset] ++
6,750,838 UART: [fht] Storing FHT @ 0x50003400
6,762,223 UART: [idev] ++
6,762,793 UART: [idev] CDI.KEYID = 6
6,763,732 UART: [idev] SUBJECT.KEYID = 7
6,765,004 UART: [idev] UDS.KEYID = 0
6,767,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,916,270 UART: [idev] Erasing UDS.KEYID = 0
10,052,788 UART: [idev] Using Sha1 for KeyId Algorithm
10,073,859 UART: [idev] --
10,077,650 UART: [ldev] ++
10,078,277 UART: [ldev] CDI.KEYID = 6
10,079,203 UART: [ldev] SUBJECT.KEYID = 5
10,080,432 UART: [ldev] AUTHORITY.KEYID = 7
10,081,622 UART: [ldev] FE.KEYID = 1
10,092,496 UART: [ldev] Erasing FE.KEYID = 1
13,381,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,675,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,689,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,704,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,719,093 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,738,789 UART: [ldev] --
15,744,119 UART: [fwproc] Waiting for Commands...
15,746,605 UART: [fwproc] Received command 0x46574c44
15,748,801 UART: [fwproc] Received Image of size 118548 bytes
19,854,514 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,937,366 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,010,559 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,339,265 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
4,130,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,401,792 >>> mbox cmd response: failed
17,402,360 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,402,701 >>> mbox cmd response: failed
17,402,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,403,279 >>> mbox cmd response: failed
Initializing fuses
2,059,049 writing to cptra_bootfsm_go
6,587,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,613,944 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,337 UART:
192,693 UART: Running Caliptra ROM ...
193,900 UART:
194,063 UART: [state] CFI Enabled
262,648 UART: [state] LifecycleState = Unprovisioned
264,591 UART: [state] DebugLocked = No
267,437 UART: [state] WD Timer not started. Device not locked for debugging
270,490 UART: [kat] SHA2-256
450,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,930 UART: [kat] ++
461,423 UART: [kat] sha1
472,857 UART: [kat] SHA2-256
475,538 UART: [kat] SHA2-384
481,474 UART: [kat] SHA2-512-ACC
483,818 UART: [kat] ECC-384
2,948,061 UART: [kat] HMAC-384Kdf
2,969,867 UART: [kat] LMS
3,446,346 UART: [kat] --
3,452,134 UART: [cold-reset] ++
3,453,914 UART: [fht] FHT @ 0x50003400
3,464,032 UART: [idev] ++
3,464,622 UART: [idev] CDI.KEYID = 6
3,465,540 UART: [idev] SUBJECT.KEYID = 7
3,466,810 UART: [idev] UDS.KEYID = 0
3,469,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,687 UART: [idev] Erasing UDS.KEYID = 0
5,988,830 UART: [idev] Sha1 KeyId Algorithm
6,013,283 UART: [idev] --
6,018,245 UART: [ldev] ++
6,018,834 UART: [ldev] CDI.KEYID = 6
6,019,783 UART: [ldev] SUBJECT.KEYID = 5
6,021,002 UART: [ldev] AUTHORITY.KEYID = 7
6,022,243 UART: [ldev] FE.KEYID = 1
6,058,334 UART: [ldev] Erasing FE.KEYID = 1
8,562,133 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,320 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,842 UART: [ldev] --
10,376,548 UART: [fwproc] Wait for Commands...
10,378,871 UART: [fwproc] Recv command 0x46574c44
10,380,868 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,047 UART: ROM Fatal Error: 0x000B0028
13,865,287 >>> mbox cmd response: failed
13,865,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,058 >>> mbox cmd response: failed
13,866,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,866,750 >>> mbox cmd response: failed
Initializing fuses
2,062,751 writing to cptra_bootfsm_go
2,252,100 UART:
2,252,467 UART: Running Caliptra ROM ...
2,253,609 UART:
2,253,783 UART: [state] CFI Enabled
2,312,906 UART: [state] LifecycleState = Unprovisioned
2,314,841 UART: [state] DebugLocked = No
2,317,426 UART: [state] WD Timer not started. Device not locked for debugging
2,321,499 UART: [kat] SHA2-256
2,501,180 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,948 UART: [kat] ++
2,512,496 UART: [kat] sha1
2,523,132 UART: [kat] SHA2-256
2,525,865 UART: [kat] SHA2-384
2,531,006 UART: [kat] SHA2-512-ACC
2,533,370 UART: [kat] ECC-384
4,996,312 UART: [kat] HMAC-384Kdf
5,018,945 UART: [kat] LMS
5,495,416 UART: [kat] --
5,500,381 UART: [cold-reset] ++
5,502,318 UART: [fht] FHT @ 0x50003400
5,514,434 UART: [idev] ++
5,514,999 UART: [idev] CDI.KEYID = 6
5,515,940 UART: [idev] SUBJECT.KEYID = 7
5,517,207 UART: [idev] UDS.KEYID = 0
5,519,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,668,687 UART: [idev] Erasing UDS.KEYID = 0
8,033,733 UART: [idev] Sha1 KeyId Algorithm
8,058,272 UART: [idev] --
8,063,004 UART: [ldev] ++
8,063,596 UART: [ldev] CDI.KEYID = 6
8,064,528 UART: [ldev] SUBJECT.KEYID = 5
8,065,749 UART: [ldev] AUTHORITY.KEYID = 7
8,067,006 UART: [ldev] FE.KEYID = 1
8,106,181 UART: [ldev] Erasing FE.KEYID = 1
10,610,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,348,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,363,955 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,379,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,395,414 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,788 UART: [ldev] --
12,423,380 UART: [fwproc] Wait for Commands...
12,425,639 UART: [fwproc] Recv command 0x46574c44
12,427,626 UART: [fwproc] Recv'd Img size: 118548 bytes
15,902,639 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,976,652 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,049,675 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,378,050 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,775 writing to cptra_bootfsm_go
3,461,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,727,223 >>> mbox cmd response: failed
13,727,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,728,189 >>> mbox cmd response: failed
13,728,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,728,785 >>> mbox cmd response: failed
Initializing fuses
2,067,484 writing to cptra_bootfsm_go
5,523,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,276,486 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,325 writing to cptra_bootfsm_go
192,604 UART:
192,948 UART: Running Caliptra ROM ...
194,161 UART:
603,751 UART: [state] CFI Enabled
618,173 UART: [state] LifecycleState = Unprovisioned
620,121 UART: [state] DebugLocked = No
623,038 UART: [state] WD Timer not started. Device not locked for debugging
626,579 UART: [kat] SHA2-256
806,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,055 UART: [kat] ++
817,530 UART: [kat] sha1
828,571 UART: [kat] SHA2-256
831,257 UART: [kat] SHA2-384
837,670 UART: [kat] SHA2-512-ACC
840,068 UART: [kat] ECC-384
3,282,094 UART: [kat] HMAC-384Kdf
3,293,147 UART: [kat] LMS
3,769,701 UART: [kat] --
3,774,459 UART: [cold-reset] ++
3,775,592 UART: [fht] FHT @ 0x50003400
3,786,741 UART: [idev] ++
3,787,312 UART: [idev] CDI.KEYID = 6
3,788,331 UART: [idev] SUBJECT.KEYID = 7
3,789,499 UART: [idev] UDS.KEYID = 0
3,792,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,125 UART: [idev] Erasing UDS.KEYID = 0
6,271,200 UART: [idev] Sha1 KeyId Algorithm
6,294,553 UART: [idev] --
6,300,333 UART: [ldev] ++
6,300,904 UART: [ldev] CDI.KEYID = 6
6,301,823 UART: [ldev] SUBJECT.KEYID = 5
6,303,042 UART: [ldev] AUTHORITY.KEYID = 7
6,304,282 UART: [ldev] FE.KEYID = 1
6,315,257 UART: [ldev] Erasing FE.KEYID = 1
8,793,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,203 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,812 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,787 UART: [ldev] --
10,586,950 UART: [fwproc] Wait for Commands...
10,588,943 UART: [fwproc] Recv command 0x46574c44
10,591,015 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,189 UART: ROM Fatal Error: 0x000B0028
14,066,429 >>> mbox cmd response: failed
14,066,842 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,067,128 >>> mbox cmd response: failed
14,067,437 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,067,747 >>> mbox cmd response: failed
Initializing fuses
2,060,741 writing to cptra_bootfsm_go
2,250,019 UART:
2,250,369 UART: Running Caliptra ROM ...
2,251,416 UART:
6,384,401 UART: [state] CFI Enabled
6,398,886 UART: [state] LifecycleState = Unprovisioned
6,400,832 UART: [state] DebugLocked = No
6,402,956 UART: [state] WD Timer not started. Device not locked for debugging
6,406,171 UART: [kat] SHA2-256
6,585,811 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,596,615 UART: [kat] ++
6,597,110 UART: [kat] sha1
6,607,893 UART: [kat] SHA2-256
6,610,586 UART: [kat] SHA2-384
6,615,237 UART: [kat] SHA2-512-ACC
6,617,596 UART: [kat] ECC-384
9,062,919 UART: [kat] HMAC-384Kdf
9,075,690 UART: [kat] LMS
9,552,225 UART: [kat] --
9,557,001 UART: [cold-reset] ++
9,559,324 UART: [fht] FHT @ 0x50003400
9,570,796 UART: [idev] ++
9,571,446 UART: [idev] CDI.KEYID = 6
9,572,361 UART: [idev] SUBJECT.KEYID = 7
9,573,587 UART: [idev] UDS.KEYID = 0
9,575,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,724,933 UART: [idev] Erasing UDS.KEYID = 0
12,048,237 UART: [idev] Sha1 KeyId Algorithm
12,072,881 UART: [idev] --
12,076,239 UART: [ldev] ++
12,076,848 UART: [ldev] CDI.KEYID = 6
12,077,764 UART: [ldev] SUBJECT.KEYID = 5
12,078,955 UART: [ldev] AUTHORITY.KEYID = 7
12,080,124 UART: [ldev] FE.KEYID = 1
12,089,817 UART: [ldev] Erasing FE.KEYID = 1
14,574,084 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,295,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,311,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,327,059 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,342,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,363,588 UART: [ldev] --
16,369,833 UART: [fwproc] Wait for Commands...
16,372,260 UART: [fwproc] Recv command 0x46574c44
16,374,253 UART: [fwproc] Recv'd Img size: 118548 bytes
19,855,912 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,935,080 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,008,111 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,337,010 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,250 writing to cptra_bootfsm_go
3,785,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,981,988 >>> mbox cmd response: failed
13,982,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,982,956 >>> mbox cmd response: failed
13,983,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,983,579 >>> mbox cmd response: failed
Initializing fuses
2,067,843 writing to cptra_bootfsm_go
9,660,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,318,026 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,148 UART:
192,518 UART: Running Caliptra ROM ...
193,708 UART:
193,866 UART: [state] CFI Enabled
265,483 UART: [state] LifecycleState = Unprovisioned
267,870 UART: [state] DebugLocked = No
269,318 UART: [state] WD Timer not started. Device not locked for debugging
274,502 UART: [kat] SHA2-256
464,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,113 UART: [kat] ++
475,605 UART: [kat] sha1
486,438 UART: [kat] SHA2-256
489,278 UART: [kat] SHA2-384
495,815 UART: [kat] SHA2-512-ACC
498,379 UART: [kat] ECC-384
2,949,830 UART: [kat] HMAC-384Kdf
2,971,186 UART: [kat] LMS
3,502,980 UART: [kat] --
3,506,615 UART: [cold-reset] ++
3,508,881 UART: [fht] FHT @ 0x50003400
3,521,106 UART: [idev] ++
3,521,808 UART: [idev] CDI.KEYID = 6
3,522,693 UART: [idev] SUBJECT.KEYID = 7
3,523,963 UART: [idev] UDS.KEYID = 0
3,527,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,431 UART: [idev] Erasing UDS.KEYID = 0
6,027,234 UART: [idev] Sha1 KeyId Algorithm
6,049,067 UART: [idev] --
6,055,290 UART: [ldev] ++
6,055,981 UART: [ldev] CDI.KEYID = 6
6,056,872 UART: [ldev] SUBJECT.KEYID = 5
6,058,092 UART: [ldev] AUTHORITY.KEYID = 7
6,059,229 UART: [ldev] FE.KEYID = 1
6,100,062 UART: [ldev] Erasing FE.KEYID = 1
8,608,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,535 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,517 UART: [ldev] --
10,410,311 UART: [fwproc] Wait for Commands...
10,412,372 UART: [fwproc] Recv command 0x46574c44
10,414,653 UART: [fwproc] Recv'd Img size: 118548 bytes
13,901,455 UART: ROM Fatal Error: 0x000B0028
13,905,120 >>> mbox cmd response: failed
13,905,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,905,819 >>> mbox cmd response: failed
13,906,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,906,454 >>> mbox cmd response: failed
Initializing fuses
2,072,411 writing to cptra_bootfsm_go
2,261,821 UART:
2,262,176 UART: Running Caliptra ROM ...
2,263,312 UART:
2,263,483 UART: [state] CFI Enabled
2,331,454 UART: [state] LifecycleState = Unprovisioned
2,333,842 UART: [state] DebugLocked = No
2,336,256 UART: [state] WD Timer not started. Device not locked for debugging
2,341,436 UART: [kat] SHA2-256
2,531,292 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,542,074 UART: [kat] ++
2,542,541 UART: [kat] sha1
2,555,538 UART: [kat] SHA2-256
2,558,560 UART: [kat] SHA2-384
2,564,502 UART: [kat] SHA2-512-ACC
2,567,075 UART: [kat] ECC-384
5,015,767 UART: [kat] HMAC-384Kdf
5,040,837 UART: [kat] LMS
5,572,635 UART: [kat] --
5,577,602 UART: [cold-reset] ++
5,578,464 UART: [fht] FHT @ 0x50003400
5,588,965 UART: [idev] ++
5,589,704 UART: [idev] CDI.KEYID = 6
5,590,618 UART: [idev] SUBJECT.KEYID = 7
5,591,837 UART: [idev] UDS.KEYID = 0
5,594,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,743,473 UART: [idev] Erasing UDS.KEYID = 0
8,095,494 UART: [idev] Sha1 KeyId Algorithm
8,118,401 UART: [idev] --
8,122,705 UART: [ldev] ++
8,123,399 UART: [ldev] CDI.KEYID = 6
8,124,320 UART: [ldev] SUBJECT.KEYID = 5
8,125,484 UART: [ldev] AUTHORITY.KEYID = 7
8,126,740 UART: [ldev] FE.KEYID = 1
8,168,663 UART: [ldev] Erasing FE.KEYID = 1
10,678,549 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,410,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,425,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,441,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,456,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,476,203 UART: [ldev] --
12,481,582 UART: [fwproc] Wait for Commands...
12,484,115 UART: [fwproc] Recv command 0x46574c44
12,486,429 UART: [fwproc] Recv'd Img size: 118548 bytes
15,984,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,059,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,182,847 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,744,013 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,932 writing to cptra_bootfsm_go
3,440,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,342,032 >>> mbox cmd response: failed
14,342,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,343,012 >>> mbox cmd response: failed
14,343,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,343,584 >>> mbox cmd response: failed
Initializing fuses
2,068,174 writing to cptra_bootfsm_go
5,476,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,868,968 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,580 UART:
192,934 UART: Running Caliptra ROM ...
194,137 UART:
603,718 UART: [state] CFI Enabled
621,236 UART: [state] LifecycleState = Unprovisioned
623,630 UART: [state] DebugLocked = No
626,577 UART: [state] WD Timer not started. Device not locked for debugging
631,348 UART: [kat] SHA2-256
821,228 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
832,016 UART: [kat] ++
832,506 UART: [kat] sha1
844,363 UART: [kat] SHA2-256
847,378 UART: [kat] SHA2-384
853,523 UART: [kat] SHA2-512-ACC
856,087 UART: [kat] ECC-384
3,295,442 UART: [kat] HMAC-384Kdf
3,308,275 UART: [kat] LMS
3,840,109 UART: [kat] --
3,844,446 UART: [cold-reset] ++
3,846,070 UART: [fht] FHT @ 0x50003400
3,857,443 UART: [idev] ++
3,858,125 UART: [idev] CDI.KEYID = 6
3,859,065 UART: [idev] SUBJECT.KEYID = 7
3,860,289 UART: [idev] UDS.KEYID = 0
3,863,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,118 UART: [idev] Erasing UDS.KEYID = 0
6,336,536 UART: [idev] Sha1 KeyId Algorithm
6,359,886 UART: [idev] --
6,364,648 UART: [ldev] ++
6,365,388 UART: [ldev] CDI.KEYID = 6
6,366,304 UART: [ldev] SUBJECT.KEYID = 5
6,367,472 UART: [ldev] AUTHORITY.KEYID = 7
6,368,650 UART: [ldev] FE.KEYID = 1
6,379,247 UART: [ldev] Erasing FE.KEYID = 1
8,859,433 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,225 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,411 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,549 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,771 UART: [ldev] --
10,648,075 UART: [fwproc] Wait for Commands...
10,650,994 UART: [fwproc] Recv command 0x46574c44
10,653,266 UART: [fwproc] Recv'd Img size: 118548 bytes
14,144,521 UART: ROM Fatal Error: 0x000B0028
14,148,149 >>> mbox cmd response: failed
14,148,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,148,815 >>> mbox cmd response: failed
14,149,198 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,149,512 >>> mbox cmd response: failed
Initializing fuses
2,061,466 writing to cptra_bootfsm_go
2,250,801 UART:
2,251,172 UART: Running Caliptra ROM ...
2,252,218 UART:
6,297,893 UART: [state] CFI Enabled
6,315,628 UART: [state] LifecycleState = Unprovisioned
6,317,989 UART: [state] DebugLocked = No
6,320,055 UART: [state] WD Timer not started. Device not locked for debugging
6,324,473 UART: [kat] SHA2-256
6,514,338 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,525,144 UART: [kat] ++
6,525,611 UART: [kat] sha1
6,536,396 UART: [kat] SHA2-256
6,539,438 UART: [kat] SHA2-384
6,545,389 UART: [kat] SHA2-512-ACC
6,547,972 UART: [kat] ECC-384
8,990,667 UART: [kat] HMAC-384Kdf
9,003,181 UART: [kat] LMS
9,535,038 UART: [kat] --
9,540,077 UART: [cold-reset] ++
9,541,230 UART: [fht] FHT @ 0x50003400
9,553,032 UART: [idev] ++
9,553,722 UART: [idev] CDI.KEYID = 6
9,554,748 UART: [idev] SUBJECT.KEYID = 7
9,555,917 UART: [idev] UDS.KEYID = 0
9,558,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,707,838 UART: [idev] Erasing UDS.KEYID = 0
12,034,148 UART: [idev] Sha1 KeyId Algorithm
12,056,370 UART: [idev] --
12,062,266 UART: [ldev] ++
12,062,949 UART: [ldev] CDI.KEYID = 6
12,063,864 UART: [ldev] SUBJECT.KEYID = 5
12,065,029 UART: [ldev] AUTHORITY.KEYID = 7
12,066,273 UART: [ldev] FE.KEYID = 1
12,079,356 UART: [ldev] Erasing FE.KEYID = 1
14,558,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,278,778 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,961 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,309,143 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,324,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,346,305 UART: [ldev] --
16,350,886 UART: [fwproc] Wait for Commands...
16,353,321 UART: [fwproc] Recv command 0x46574c44
16,355,597 UART: [fwproc] Recv'd Img size: 118548 bytes
19,850,116 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,934,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,057,716 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,618,306 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,121 writing to cptra_bootfsm_go
3,759,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,572,896 >>> mbox cmd response: failed
14,573,448 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,573,791 >>> mbox cmd response: failed
14,574,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,574,361 >>> mbox cmd response: failed
Initializing fuses
2,061,378 writing to cptra_bootfsm_go
9,045,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,338,359 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,349 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,987 UART: [kat] SHA2-256
881,918 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,033 UART: [kat] ++
886,185 UART: [kat] sha1
890,285 UART: [kat] SHA2-256
892,223 UART: [kat] SHA2-384
894,924 UART: [kat] SHA2-512-ACC
896,825 UART: [kat] ECC-384
902,284 UART: [kat] HMAC-384Kdf
906,850 UART: [kat] LMS
1,475,046 UART: [kat] --
1,476,109 UART: [cold-reset] ++
1,476,511 UART: [fht] Storing FHT @ 0x50003400
1,479,324 UART: [idev] ++
1,479,492 UART: [idev] CDI.KEYID = 6
1,479,852 UART: [idev] SUBJECT.KEYID = 7
1,480,276 UART: [idev] UDS.KEYID = 0
1,480,621 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,572 UART: [idev] Erasing UDS.KEYID = 0
1,505,526 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,034 UART: [idev] --
1,514,913 UART: [ldev] ++
1,515,081 UART: [ldev] CDI.KEYID = 6
1,515,444 UART: [ldev] SUBJECT.KEYID = 5
1,515,870 UART: [ldev] AUTHORITY.KEYID = 7
1,516,333 UART: [ldev] FE.KEYID = 1
1,521,813 UART: [ldev] Erasing FE.KEYID = 1
1,547,294 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,036 UART: [ldev] --
1,586,419 UART: [fwproc] Waiting for Commands...
1,587,178 UART: [fwproc] Received command 0x46574c44
1,587,969 UART: [fwproc] Received Image of size 118548 bytes
2,930,619 UART: ROM Fatal Error: 0x000B0028
2,931,776 >>> mbox cmd response: failed
2,931,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,782 >>> mbox cmd response: failed
2,931,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,931,788 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,918 UART: [state] LifecycleState = Unprovisioned
85,573 UART: [state] DebugLocked = No
86,271 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,927 UART: [kat] SHA2-256
881,858 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,973 UART: [kat] ++
886,125 UART: [kat] sha1
890,385 UART: [kat] SHA2-256
892,323 UART: [kat] SHA2-384
895,022 UART: [kat] SHA2-512-ACC
896,923 UART: [kat] ECC-384
902,684 UART: [kat] HMAC-384Kdf
907,174 UART: [kat] LMS
1,475,370 UART: [kat] --
1,476,315 UART: [cold-reset] ++
1,476,771 UART: [fht] Storing FHT @ 0x50003400
1,479,480 UART: [idev] ++
1,479,648 UART: [idev] CDI.KEYID = 6
1,480,008 UART: [idev] SUBJECT.KEYID = 7
1,480,432 UART: [idev] UDS.KEYID = 0
1,480,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,314 UART: [idev] Erasing UDS.KEYID = 0
1,504,510 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,064 UART: [idev] --
1,514,099 UART: [ldev] ++
1,514,267 UART: [ldev] CDI.KEYID = 6
1,514,630 UART: [ldev] SUBJECT.KEYID = 5
1,515,056 UART: [ldev] AUTHORITY.KEYID = 7
1,515,519 UART: [ldev] FE.KEYID = 1
1,520,801 UART: [ldev] Erasing FE.KEYID = 1
1,545,646 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,496 UART: [ldev] --
1,584,927 UART: [fwproc] Waiting for Commands...
1,585,630 UART: [fwproc] Received command 0x46574c44
1,586,421 UART: [fwproc] Received Image of size 118548 bytes
2,930,988 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,886 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,104 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,357 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,784,019 >>> mbox cmd response: failed
2,784,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,025 >>> mbox cmd response: failed
2,784,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,784,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,815 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,891 UART: [state] LifecycleState = Unprovisioned
86,546 UART: [state] DebugLocked = No
87,108 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,618 UART: [kat] SHA2-256
882,549 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,664 UART: [kat] ++
886,816 UART: [kat] sha1
891,224 UART: [kat] SHA2-256
893,162 UART: [kat] SHA2-384
895,891 UART: [kat] SHA2-512-ACC
897,792 UART: [kat] ECC-384
903,387 UART: [kat] HMAC-384Kdf
908,007 UART: [kat] LMS
1,476,203 UART: [kat] --
1,476,886 UART: [cold-reset] ++
1,477,262 UART: [fht] Storing FHT @ 0x50003400
1,480,023 UART: [idev] ++
1,480,191 UART: [idev] CDI.KEYID = 6
1,480,551 UART: [idev] SUBJECT.KEYID = 7
1,480,975 UART: [idev] UDS.KEYID = 0
1,481,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,947 UART: [idev] Erasing UDS.KEYID = 0
1,504,901 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,605 UART: [idev] --
1,514,794 UART: [ldev] ++
1,514,962 UART: [ldev] CDI.KEYID = 6
1,515,325 UART: [ldev] SUBJECT.KEYID = 5
1,515,751 UART: [ldev] AUTHORITY.KEYID = 7
1,516,214 UART: [ldev] FE.KEYID = 1
1,521,490 UART: [ldev] Erasing FE.KEYID = 1
1,547,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,391 UART: [ldev] --
1,586,666 UART: [fwproc] Waiting for Commands...
1,587,459 UART: [fwproc] Received command 0x46574c44
1,588,250 UART: [fwproc] Received Image of size 118548 bytes
2,932,352 UART: ROM Fatal Error: 0x000B0028
2,933,509 >>> mbox cmd response: failed
2,933,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,515 >>> mbox cmd response: failed
2,933,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,784 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,432 UART: [kat] SHA2-256
882,363 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,478 UART: [kat] ++
886,630 UART: [kat] sha1
890,966 UART: [kat] SHA2-256
892,904 UART: [kat] SHA2-384
895,625 UART: [kat] SHA2-512-ACC
897,526 UART: [kat] ECC-384
903,275 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,790 UART: [cold-reset] ++
1,477,212 UART: [fht] Storing FHT @ 0x50003400
1,479,981 UART: [idev] ++
1,480,149 UART: [idev] CDI.KEYID = 6
1,480,509 UART: [idev] SUBJECT.KEYID = 7
1,480,933 UART: [idev] UDS.KEYID = 0
1,481,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,905 UART: [idev] Erasing UDS.KEYID = 0
1,505,535 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,081 UART: [idev] --
1,515,156 UART: [ldev] ++
1,515,324 UART: [ldev] CDI.KEYID = 6
1,515,687 UART: [ldev] SUBJECT.KEYID = 5
1,516,113 UART: [ldev] AUTHORITY.KEYID = 7
1,516,576 UART: [ldev] FE.KEYID = 1
1,521,762 UART: [ldev] Erasing FE.KEYID = 1
1,547,455 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,008 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,724 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,615 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,333 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 118548 bytes
2,931,891 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,187 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,405 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,688 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,588 >>> mbox cmd response: failed
2,785,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,594 >>> mbox cmd response: failed
2,785,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,600 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,040 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,702 UART: [state] LifecycleState = Unprovisioned
85,357 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,298 UART: [kat] SHA2-256
890,848 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,952 UART: [kat] ++
895,104 UART: [kat] sha1
899,472 UART: [kat] SHA2-256
901,412 UART: [kat] SHA2-384
903,999 UART: [kat] SHA2-512-ACC
905,900 UART: [kat] ECC-384
915,357 UART: [kat] HMAC-384Kdf
919,819 UART: [kat] LMS
1,168,131 UART: [kat] --
1,168,866 UART: [cold-reset] ++
1,169,236 UART: [fht] FHT @ 0x50003400
1,171,888 UART: [idev] ++
1,172,056 UART: [idev] CDI.KEYID = 6
1,172,417 UART: [idev] SUBJECT.KEYID = 7
1,172,842 UART: [idev] UDS.KEYID = 0
1,173,188 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,643 UART: [idev] Erasing UDS.KEYID = 0
1,197,545 UART: [idev] Sha1 KeyId Algorithm
1,206,235 UART: [idev] --
1,207,364 UART: [ldev] ++
1,207,532 UART: [ldev] CDI.KEYID = 6
1,207,896 UART: [ldev] SUBJECT.KEYID = 5
1,208,323 UART: [ldev] AUTHORITY.KEYID = 7
1,208,786 UART: [ldev] FE.KEYID = 1
1,213,932 UART: [ldev] Erasing FE.KEYID = 1
1,239,921 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,118 UART: [ldev] --
1,279,573 UART: [fwproc] Wait for Commands...
1,280,244 UART: [fwproc] Recv command 0x46574c44
1,280,977 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,584 UART: ROM Fatal Error: 0x000B0028
2,625,741 >>> mbox cmd response: failed
2,625,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,625,747 >>> mbox cmd response: failed
2,625,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,625,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,064 UART: [state] LifecycleState = Unprovisioned
85,719 UART: [state] DebugLocked = No
86,447 UART: [state] WD Timer not started. Device not locked for debugging
87,742 UART: [kat] SHA2-256
891,292 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,396 UART: [kat] ++
895,548 UART: [kat] sha1
899,734 UART: [kat] SHA2-256
901,674 UART: [kat] SHA2-384
904,455 UART: [kat] SHA2-512-ACC
906,356 UART: [kat] ECC-384
916,253 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,922 UART: [cold-reset] ++
1,170,456 UART: [fht] FHT @ 0x50003400
1,173,122 UART: [idev] ++
1,173,290 UART: [idev] CDI.KEYID = 6
1,173,651 UART: [idev] SUBJECT.KEYID = 7
1,174,076 UART: [idev] UDS.KEYID = 0
1,174,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,045 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,208,007 UART: [idev] --
1,209,044 UART: [ldev] ++
1,209,212 UART: [ldev] CDI.KEYID = 6
1,209,576 UART: [ldev] SUBJECT.KEYID = 5
1,210,003 UART: [ldev] AUTHORITY.KEYID = 7
1,210,466 UART: [ldev] FE.KEYID = 1
1,215,550 UART: [ldev] Erasing FE.KEYID = 1
1,241,459 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,537 UART: [fwproc] Wait for Commands...
1,281,270 UART: [fwproc] Recv command 0x46574c44
1,282,003 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,179 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,722 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,897 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,160 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,440 >>> mbox cmd response: failed
2,482,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,446 >>> mbox cmd response: failed
2,482,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,452 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,793 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,669 UART: [kat] SHA2-256
891,219 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,323 UART: [kat] ++
895,475 UART: [kat] sha1
899,665 UART: [kat] SHA2-256
901,605 UART: [kat] SHA2-384
904,342 UART: [kat] SHA2-512-ACC
906,243 UART: [kat] ECC-384
916,090 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,917 UART: [cold-reset] ++
1,170,375 UART: [fht] FHT @ 0x50003400
1,173,117 UART: [idev] ++
1,173,285 UART: [idev] CDI.KEYID = 6
1,173,646 UART: [idev] SUBJECT.KEYID = 7
1,174,071 UART: [idev] UDS.KEYID = 0
1,174,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,430 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,202 UART: [idev] --
1,209,083 UART: [ldev] ++
1,209,251 UART: [ldev] CDI.KEYID = 6
1,209,615 UART: [ldev] SUBJECT.KEYID = 5
1,210,042 UART: [ldev] AUTHORITY.KEYID = 7
1,210,505 UART: [ldev] FE.KEYID = 1
1,215,603 UART: [ldev] Erasing FE.KEYID = 1
1,241,098 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,804 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,520 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,121 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,229 UART: [ldev] --
1,280,616 UART: [fwproc] Wait for Commands...
1,281,289 UART: [fwproc] Recv command 0x46574c44
1,282,022 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,447 UART: ROM Fatal Error: 0x000B0028
2,627,604 >>> mbox cmd response: failed
2,627,604 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,610 >>> mbox cmd response: failed
2,627,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,627,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,710 UART: [state] WD Timer not started. Device not locked for debugging
87,887 UART: [kat] SHA2-256
891,437 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,541 UART: [kat] ++
895,693 UART: [kat] sha1
899,967 UART: [kat] SHA2-256
901,907 UART: [kat] SHA2-384
904,678 UART: [kat] SHA2-512-ACC
906,579 UART: [kat] ECC-384
916,418 UART: [kat] HMAC-384Kdf
920,884 UART: [kat] LMS
1,169,196 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,461 UART: [fht] FHT @ 0x50003400
1,173,251 UART: [idev] ++
1,173,419 UART: [idev] CDI.KEYID = 6
1,173,780 UART: [idev] SUBJECT.KEYID = 7
1,174,205 UART: [idev] UDS.KEYID = 0
1,174,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,318 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,338 UART: [idev] --
1,209,465 UART: [ldev] ++
1,209,633 UART: [ldev] CDI.KEYID = 6
1,209,997 UART: [ldev] SUBJECT.KEYID = 5
1,210,424 UART: [ldev] AUTHORITY.KEYID = 7
1,210,887 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,428 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,447 UART: [ldev] --
1,281,894 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x46574c44
1,283,430 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,896 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,599 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,774 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,999 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,551 >>> mbox cmd response: failed
2,483,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,557 >>> mbox cmd response: failed
2,483,557 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,563 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,038 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,861 UART: [state] WD Timer not started. Device not locked for debugging
88,078 UART: [kat] SHA2-256
893,728 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,853 UART: [kat] ++
898,005 UART: [kat] sha1
902,329 UART: [kat] SHA2-256
904,269 UART: [kat] SHA2-384
907,012 UART: [kat] SHA2-512-ACC
908,913 UART: [kat] ECC-384
918,896 UART: [kat] HMAC-384Kdf
923,310 UART: [kat] LMS
1,171,638 UART: [kat] --
1,172,647 UART: [cold-reset] ++
1,173,181 UART: [fht] FHT @ 0x50003400
1,176,022 UART: [idev] ++
1,176,190 UART: [idev] CDI.KEYID = 6
1,176,550 UART: [idev] SUBJECT.KEYID = 7
1,176,974 UART: [idev] UDS.KEYID = 0
1,177,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,732 UART: [idev] Erasing UDS.KEYID = 0
1,201,861 UART: [idev] Sha1 KeyId Algorithm
1,210,353 UART: [idev] --
1,211,425 UART: [ldev] ++
1,211,593 UART: [ldev] CDI.KEYID = 6
1,211,956 UART: [ldev] SUBJECT.KEYID = 5
1,212,382 UART: [ldev] AUTHORITY.KEYID = 7
1,212,845 UART: [ldev] FE.KEYID = 1
1,218,071 UART: [ldev] Erasing FE.KEYID = 1
1,244,426 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,727 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,618 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,330 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,405 UART: [ldev] --
1,283,716 UART: [fwproc] Wait for Commands...
1,284,312 UART: [fwproc] Recv command 0x46574c44
1,285,040 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,640 UART: ROM Fatal Error: 0x000B0028
2,628,797 >>> mbox cmd response: failed
2,628,797 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,803 >>> mbox cmd response: failed
2,628,803 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,809 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,668 UART: [state] LifecycleState = Unprovisioned
86,323 UART: [state] DebugLocked = No
86,909 UART: [state] WD Timer not started. Device not locked for debugging
88,042 UART: [kat] SHA2-256
893,692 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,817 UART: [kat] ++
897,969 UART: [kat] sha1
902,151 UART: [kat] SHA2-256
904,091 UART: [kat] SHA2-384
906,788 UART: [kat] SHA2-512-ACC
908,689 UART: [kat] ECC-384
918,900 UART: [kat] HMAC-384Kdf
923,412 UART: [kat] LMS
1,171,740 UART: [kat] --
1,172,785 UART: [cold-reset] ++
1,173,363 UART: [fht] FHT @ 0x50003400
1,176,080 UART: [idev] ++
1,176,248 UART: [idev] CDI.KEYID = 6
1,176,608 UART: [idev] SUBJECT.KEYID = 7
1,177,032 UART: [idev] UDS.KEYID = 0
1,177,377 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,718 UART: [idev] Erasing UDS.KEYID = 0
1,201,071 UART: [idev] Sha1 KeyId Algorithm
1,209,405 UART: [idev] --
1,210,367 UART: [ldev] ++
1,210,535 UART: [ldev] CDI.KEYID = 6
1,210,898 UART: [ldev] SUBJECT.KEYID = 5
1,211,324 UART: [ldev] AUTHORITY.KEYID = 7
1,211,787 UART: [ldev] FE.KEYID = 1
1,216,883 UART: [ldev] Erasing FE.KEYID = 1
1,242,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,797 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,742 UART: [fwproc] Recv command 0x46574c44
1,283,470 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,177 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,347 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,498 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,980 >>> mbox cmd response: failed
2,482,980 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,986 >>> mbox cmd response: failed
2,482,986 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,331 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,835 UART: [kat] SHA2-256
893,485 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,610 UART: [kat] ++
897,762 UART: [kat] sha1
902,046 UART: [kat] SHA2-256
903,986 UART: [kat] SHA2-384
906,721 UART: [kat] SHA2-512-ACC
908,622 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
922,907 UART: [kat] LMS
1,171,235 UART: [kat] --
1,172,000 UART: [cold-reset] ++
1,172,338 UART: [fht] FHT @ 0x50003400
1,174,869 UART: [idev] ++
1,175,037 UART: [idev] CDI.KEYID = 6
1,175,397 UART: [idev] SUBJECT.KEYID = 7
1,175,821 UART: [idev] UDS.KEYID = 0
1,176,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,497 UART: [idev] Erasing UDS.KEYID = 0
1,200,488 UART: [idev] Sha1 KeyId Algorithm
1,208,790 UART: [idev] --
1,209,716 UART: [ldev] ++
1,209,884 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,673 UART: [ldev] AUTHORITY.KEYID = 7
1,211,136 UART: [ldev] FE.KEYID = 1
1,216,150 UART: [ldev] Erasing FE.KEYID = 1
1,242,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,977 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,146 UART: [ldev] --
1,282,425 UART: [fwproc] Wait for Commands...
1,283,025 UART: [fwproc] Recv command 0x46574c44
1,283,753 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,953 UART: ROM Fatal Error: 0x000B0028
2,628,110 >>> mbox cmd response: failed
2,628,110 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,116 >>> mbox cmd response: failed
2,628,116 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,122 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
88,039 UART: [kat] SHA2-256
893,689 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,814 UART: [kat] ++
897,966 UART: [kat] sha1
902,232 UART: [kat] SHA2-256
904,172 UART: [kat] SHA2-384
906,909 UART: [kat] SHA2-512-ACC
908,810 UART: [kat] ECC-384
918,895 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,726 UART: [cold-reset] ++
1,173,286 UART: [fht] FHT @ 0x50003400
1,175,957 UART: [idev] ++
1,176,125 UART: [idev] CDI.KEYID = 6
1,176,485 UART: [idev] SUBJECT.KEYID = 7
1,176,909 UART: [idev] UDS.KEYID = 0
1,177,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,723 UART: [idev] Erasing UDS.KEYID = 0
1,201,932 UART: [idev] Sha1 KeyId Algorithm
1,210,508 UART: [idev] --
1,211,578 UART: [ldev] ++
1,211,746 UART: [ldev] CDI.KEYID = 6
1,212,109 UART: [ldev] SUBJECT.KEYID = 5
1,212,535 UART: [ldev] AUTHORITY.KEYID = 7
1,212,998 UART: [ldev] FE.KEYID = 1
1,218,284 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,684 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,400 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,012 UART: [ldev] --
1,284,303 UART: [fwproc] Wait for Commands...
1,284,993 UART: [fwproc] Recv command 0x46574c44
1,285,721 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,442 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,635 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,483,447 >>> mbox cmd response: failed
2,483,447 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,453 >>> mbox cmd response: failed
2,483,453 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,483,459 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,216 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
192,335 UART:
192,700 UART: Running Caliptra ROM ...
193,889 UART:
194,045 UART: [state] CFI Enabled
260,800 UART: [state] LifecycleState = Unprovisioned
262,760 UART: [state] DebugLocked = No
264,324 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,900 UART: [kat] SHA2-256
439,620 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,123 UART: [kat] ++
450,663 UART: [kat] sha1
460,950 UART: [kat] SHA2-256
463,637 UART: [kat] SHA2-384
469,995 UART: [kat] SHA2-512-ACC
472,337 UART: [kat] ECC-384
2,765,334 UART: [kat] HMAC-384Kdf
2,798,753 UART: [kat] LMS
3,989,054 UART: [kat] --
3,993,605 UART: [cold-reset] ++
3,995,810 UART: [fht] Storing FHT @ 0x50003400
4,005,708 UART: [idev] ++
4,006,298 UART: [idev] CDI.KEYID = 6
4,007,240 UART: [idev] SUBJECT.KEYID = 7
4,008,468 UART: [idev] UDS.KEYID = 0
4,011,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,630 UART: [idev] Erasing UDS.KEYID = 0
7,343,005 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,096 UART: [idev] --
7,369,830 UART: [ldev] ++
7,370,410 UART: [ldev] CDI.KEYID = 6
7,371,353 UART: [ldev] SUBJECT.KEYID = 5
7,372,573 UART: [ldev] AUTHORITY.KEYID = 7
7,373,867 UART: [ldev] FE.KEYID = 1
7,420,354 UART: [ldev] Erasing FE.KEYID = 1
10,754,135 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,849 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,392 UART: [ldev] --
13,134,670 UART: [fwproc] Waiting for Commands...
13,137,587 UART: [fwproc] Received command 0x46574c44
13,139,775 UART: [fwproc] Received Image of size 118548 bytes
17,244,067 UART: ROM Fatal Error: 0x000B0029
17,247,538 >>> mbox cmd response: failed
17,247,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,248,243 >>> mbox cmd response: failed
17,248,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,248,812 >>> mbox cmd response: failed
Initializing fuses
2,056,451 writing to cptra_bootfsm_go
2,245,759 UART:
2,246,115 UART: Running Caliptra ROM ...
2,247,254 UART:
2,247,422 UART: [state] CFI Enabled
2,319,354 UART: [state] LifecycleState = Unprovisioned
2,321,282 UART: [state] DebugLocked = No
2,323,867 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,328,606 UART: [kat] SHA2-256
2,498,264 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,508,814 UART: [kat] ++
2,509,300 UART: [kat] sha1
2,520,731 UART: [kat] SHA2-256
2,523,436 UART: [kat] SHA2-384
2,529,644 UART: [kat] SHA2-512-ACC
2,531,995 UART: [kat] ECC-384
4,821,403 UART: [kat] HMAC-384Kdf
4,832,505 UART: [kat] LMS
6,022,808 UART: [kat] --
6,027,949 UART: [cold-reset] ++
6,030,069 UART: [fht] Storing FHT @ 0x50003400
6,042,436 UART: [idev] ++
6,043,007 UART: [idev] CDI.KEYID = 6
6,043,980 UART: [idev] SUBJECT.KEYID = 7
6,045,201 UART: [idev] UDS.KEYID = 0
6,047,617 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,196,906 UART: [idev] Erasing UDS.KEYID = 0
9,381,431 UART: [idev] Using Sha1 for KeyId Algorithm
9,403,948 UART: [idev] --
9,406,792 UART: [ldev] ++
9,407,377 UART: [ldev] CDI.KEYID = 6
9,408,287 UART: [ldev] SUBJECT.KEYID = 5
9,409,547 UART: [ldev] AUTHORITY.KEYID = 7
9,410,790 UART: [ldev] FE.KEYID = 1
9,455,651 UART: [ldev] Erasing FE.KEYID = 1
12,788,376 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,080,971 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,095,504 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,110,352 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,124,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,144,265 UART: [ldev] --
15,148,993 UART: [fwproc] Waiting for Commands...
15,150,966 UART: [fwproc] Received command 0x46574c44
15,153,160 UART: [fwproc] Received Image of size 118548 bytes
19,259,364 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,334,196 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,407,375 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,735,165 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
3,805,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,200,230 >>> mbox cmd response: failed
17,200,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,249 >>> mbox cmd response: failed
17,201,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,201,823 >>> mbox cmd response: failed
Initializing fuses
2,061,890 writing to cptra_bootfsm_go
5,864,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,060,975 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,716 writing to cptra_bootfsm_go
204,034 UART:
204,389 UART: Running Caliptra ROM ...
205,486 UART:
615,387 UART: [state] CFI Enabled
629,320 UART: [state] LifecycleState = Unprovisioned
631,253 UART: [state] DebugLocked = No
634,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
638,829 UART: [kat] SHA2-256
808,590 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
819,147 UART: [kat] ++
819,601 UART: [kat] sha1
831,828 UART: [kat] SHA2-256
834,515 UART: [kat] SHA2-384
839,956 UART: [kat] SHA2-512-ACC
842,301 UART: [kat] ECC-384
3,124,580 UART: [kat] HMAC-384Kdf
3,136,609 UART: [kat] LMS
4,326,707 UART: [kat] --
4,332,364 UART: [cold-reset] ++
4,334,041 UART: [fht] Storing FHT @ 0x50003400
4,344,731 UART: [idev] ++
4,345,302 UART: [idev] CDI.KEYID = 6
4,346,240 UART: [idev] SUBJECT.KEYID = 7
4,347,518 UART: [idev] UDS.KEYID = 0
4,350,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,499,542 UART: [idev] Erasing UDS.KEYID = 0
7,631,885 UART: [idev] Using Sha1 for KeyId Algorithm
7,654,840 UART: [idev] --
7,658,305 UART: [ldev] ++
7,658,881 UART: [ldev] CDI.KEYID = 6
7,659,860 UART: [ldev] SUBJECT.KEYID = 5
7,661,099 UART: [ldev] AUTHORITY.KEYID = 7
7,662,347 UART: [ldev] FE.KEYID = 1
7,674,565 UART: [ldev] Erasing FE.KEYID = 1
10,959,975 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,254,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,621 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,298,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,317,027 UART: [ldev] --
13,321,760 UART: [fwproc] Waiting for Commands...
13,324,729 UART: [fwproc] Received command 0x46574c44
13,326,921 UART: [fwproc] Received Image of size 118548 bytes
17,424,781 UART: ROM Fatal Error: 0x000B0029
17,428,297 >>> mbox cmd response: failed
17,428,726 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,429,063 >>> mbox cmd response: failed
17,429,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,429,665 >>> mbox cmd response: failed
Initializing fuses
2,059,003 writing to cptra_bootfsm_go
2,248,258 UART:
2,248,598 UART: Running Caliptra ROM ...
2,249,651 UART:
3,025,389 UART: [state] CFI Enabled
3,038,926 UART: [state] LifecycleState = Unprovisioned
3,040,837 UART: [state] DebugLocked = No
3,043,443 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,048,671 UART: [kat] SHA2-256
3,218,430 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,228,966 UART: [kat] ++
3,229,451 UART: [kat] sha1
3,240,833 UART: [kat] SHA2-256
3,243,536 UART: [kat] SHA2-384
3,248,991 UART: [kat] SHA2-512-ACC
3,251,345 UART: [kat] ECC-384
5,534,312 UART: [kat] HMAC-384Kdf
5,545,207 UART: [kat] LMS
6,735,315 UART: [kat] --
6,740,024 UART: [cold-reset] ++
6,741,592 UART: [fht] Storing FHT @ 0x50003400
6,751,675 UART: [idev] ++
6,752,245 UART: [idev] CDI.KEYID = 6
6,753,266 UART: [idev] SUBJECT.KEYID = 7
6,754,433 UART: [idev] UDS.KEYID = 0
6,756,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,905,823 UART: [idev] Erasing UDS.KEYID = 0
10,044,528 UART: [idev] Using Sha1 for KeyId Algorithm
10,065,219 UART: [idev] --
10,069,592 UART: [ldev] ++
10,070,163 UART: [ldev] CDI.KEYID = 6
10,071,100 UART: [ldev] SUBJECT.KEYID = 5
10,072,370 UART: [ldev] AUTHORITY.KEYID = 7
10,073,474 UART: [ldev] FE.KEYID = 1
10,085,398 UART: [ldev] Erasing FE.KEYID = 1
13,376,067 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,667,474 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,682,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,696,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,711,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,730,217 UART: [ldev] --
15,734,623 UART: [fwproc] Waiting for Commands...
15,737,164 UART: [fwproc] Received command 0x46574c44
15,739,374 UART: [fwproc] Received Image of size 118548 bytes
19,853,685 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,927,394 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,000,605 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,328,607 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
4,126,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,406,487 >>> mbox cmd response: failed
17,407,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,407,501 >>> mbox cmd response: failed
17,407,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,408,070 >>> mbox cmd response: failed
Initializing fuses
2,063,863 writing to cptra_bootfsm_go
6,583,157 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,604,640 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,180 UART:
192,590 UART: Running Caliptra ROM ...
193,707 UART:
193,853 UART: [state] CFI Enabled
261,123 UART: [state] LifecycleState = Unprovisioned
263,100 UART: [state] DebugLocked = No
264,292 UART: [state] WD Timer not started. Device not locked for debugging
267,624 UART: [kat] SHA2-256
447,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,059 UART: [kat] ++
458,523 UART: [kat] sha1
468,918 UART: [kat] SHA2-256
471,607 UART: [kat] SHA2-384
476,940 UART: [kat] SHA2-512-ACC
479,285 UART: [kat] ECC-384
2,924,798 UART: [kat] HMAC-384Kdf
2,946,572 UART: [kat] LMS
3,423,118 UART: [kat] --
3,426,147 UART: [cold-reset] ++
3,427,766 UART: [fht] FHT @ 0x50003400
3,438,805 UART: [idev] ++
3,439,385 UART: [idev] CDI.KEYID = 6
3,440,357 UART: [idev] SUBJECT.KEYID = 7
3,441,581 UART: [idev] UDS.KEYID = 0
3,444,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,506 UART: [idev] Erasing UDS.KEYID = 0
5,966,566 UART: [idev] Sha1 KeyId Algorithm
5,990,021 UART: [idev] --
5,994,726 UART: [ldev] ++
5,995,303 UART: [ldev] CDI.KEYID = 6
5,996,195 UART: [ldev] SUBJECT.KEYID = 5
5,997,413 UART: [ldev] AUTHORITY.KEYID = 7
5,998,710 UART: [ldev] FE.KEYID = 1
6,035,100 UART: [ldev] Erasing FE.KEYID = 1
8,541,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,276,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,292,365 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,308,271 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,323,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,783 UART: [ldev] --
10,350,968 UART: [fwproc] Wait for Commands...
10,353,958 UART: [fwproc] Recv command 0x46574c44
10,355,953 UART: [fwproc] Recv'd Img size: 118548 bytes
13,833,803 UART: ROM Fatal Error: 0x000B0029
13,837,039 >>> mbox cmd response: failed
13,837,504 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,837,850 >>> mbox cmd response: failed
13,838,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,838,419 >>> mbox cmd response: failed
Initializing fuses
2,063,695 writing to cptra_bootfsm_go
2,252,993 UART:
2,253,359 UART: Running Caliptra ROM ...
2,254,499 UART:
2,254,674 UART: [state] CFI Enabled
2,312,158 UART: [state] LifecycleState = Unprovisioned
2,314,110 UART: [state] DebugLocked = No
2,316,108 UART: [state] WD Timer not started. Device not locked for debugging
2,319,491 UART: [kat] SHA2-256
2,499,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,509,929 UART: [kat] ++
2,510,480 UART: [kat] sha1
2,520,081 UART: [kat] SHA2-256
2,522,819 UART: [kat] SHA2-384
2,527,355 UART: [kat] SHA2-512-ACC
2,529,717 UART: [kat] ECC-384
4,976,442 UART: [kat] HMAC-384Kdf
5,000,962 UART: [kat] LMS
5,477,473 UART: [kat] --
5,480,715 UART: [cold-reset] ++
5,482,586 UART: [fht] FHT @ 0x50003400
5,493,819 UART: [idev] ++
5,494,402 UART: [idev] CDI.KEYID = 6
5,495,427 UART: [idev] SUBJECT.KEYID = 7
5,496,590 UART: [idev] UDS.KEYID = 0
5,498,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,648,169 UART: [idev] Erasing UDS.KEYID = 0
8,016,000 UART: [idev] Sha1 KeyId Algorithm
8,040,181 UART: [idev] --
8,045,817 UART: [ldev] ++
8,046,437 UART: [ldev] CDI.KEYID = 6
8,047,362 UART: [ldev] SUBJECT.KEYID = 5
8,048,533 UART: [ldev] AUTHORITY.KEYID = 7
8,049,771 UART: [ldev] FE.KEYID = 1
8,087,106 UART: [ldev] Erasing FE.KEYID = 1
10,595,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,329,710 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,345,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,361,434 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,377,039 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,398,395 UART: [ldev] --
12,403,613 UART: [fwproc] Wait for Commands...
12,405,176 UART: [fwproc] Recv command 0x46574c44
12,407,221 UART: [fwproc] Recv'd Img size: 118548 bytes
15,897,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,976,047 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,049,074 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,378,055 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,126 writing to cptra_bootfsm_go
3,462,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,767,199 >>> mbox cmd response: failed
13,767,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,768,146 >>> mbox cmd response: failed
13,768,420 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,768,720 >>> mbox cmd response: failed
Initializing fuses
2,063,899 writing to cptra_bootfsm_go
5,511,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,288,080 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.82s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,684 UART:
193,040 UART: Running Caliptra ROM ...
194,271 UART:
603,742 UART: [state] CFI Enabled
615,997 UART: [state] LifecycleState = Unprovisioned
617,941 UART: [state] DebugLocked = No
619,266 UART: [state] WD Timer not started. Device not locked for debugging
623,297 UART: [kat] SHA2-256
802,967 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,729 UART: [kat] ++
814,336 UART: [kat] sha1
824,149 UART: [kat] SHA2-256
826,831 UART: [kat] SHA2-384
833,836 UART: [kat] SHA2-512-ACC
836,182 UART: [kat] ECC-384
3,277,827 UART: [kat] HMAC-384Kdf
3,289,743 UART: [kat] LMS
3,766,236 UART: [kat] --
3,770,844 UART: [cold-reset] ++
3,772,786 UART: [fht] FHT @ 0x50003400
3,783,768 UART: [idev] ++
3,784,346 UART: [idev] CDI.KEYID = 6
3,785,318 UART: [idev] SUBJECT.KEYID = 7
3,786,530 UART: [idev] UDS.KEYID = 0
3,789,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,066 UART: [idev] Erasing UDS.KEYID = 0
6,264,862 UART: [idev] Sha1 KeyId Algorithm
6,286,902 UART: [idev] --
6,292,654 UART: [ldev] ++
6,293,233 UART: [ldev] CDI.KEYID = 6
6,294,255 UART: [ldev] SUBJECT.KEYID = 5
6,295,366 UART: [ldev] AUTHORITY.KEYID = 7
6,296,607 UART: [ldev] FE.KEYID = 1
6,307,482 UART: [ldev] Erasing FE.KEYID = 1
8,784,377 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,285 UART: [ldev] --
10,580,255 UART: [fwproc] Wait for Commands...
10,581,823 UART: [fwproc] Recv command 0x46574c44
10,583,836 UART: [fwproc] Recv'd Img size: 118548 bytes
14,066,369 UART: ROM Fatal Error: 0x000B0029
14,069,613 >>> mbox cmd response: failed
14,070,047 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,392 >>> mbox cmd response: failed
14,070,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,070,969 >>> mbox cmd response: failed
Initializing fuses
2,060,878 writing to cptra_bootfsm_go
2,250,206 UART:
2,250,546 UART: Running Caliptra ROM ...
2,251,679 UART:
6,382,051 UART: [state] CFI Enabled
6,396,625 UART: [state] LifecycleState = Unprovisioned
6,398,564 UART: [state] DebugLocked = No
6,400,714 UART: [state] WD Timer not started. Device not locked for debugging
6,403,874 UART: [kat] SHA2-256
6,583,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,594,312 UART: [kat] ++
6,594,802 UART: [kat] sha1
6,606,185 UART: [kat] SHA2-256
6,608,929 UART: [kat] SHA2-384
6,615,253 UART: [kat] SHA2-512-ACC
6,617,624 UART: [kat] ECC-384
9,058,501 UART: [kat] HMAC-384Kdf
9,069,548 UART: [kat] LMS
9,546,076 UART: [kat] --
9,549,917 UART: [cold-reset] ++
9,551,699 UART: [fht] FHT @ 0x50003400
9,562,196 UART: [idev] ++
9,562,783 UART: [idev] CDI.KEYID = 6
9,563,671 UART: [idev] SUBJECT.KEYID = 7
9,564,946 UART: [idev] UDS.KEYID = 0
9,567,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,716,272 UART: [idev] Erasing UDS.KEYID = 0
12,037,004 UART: [idev] Sha1 KeyId Algorithm
12,061,374 UART: [idev] --
12,066,203 UART: [ldev] ++
12,066,781 UART: [ldev] CDI.KEYID = 6
12,067,698 UART: [ldev] SUBJECT.KEYID = 5
12,068,920 UART: [ldev] AUTHORITY.KEYID = 7
12,070,154 UART: [ldev] FE.KEYID = 1
12,081,507 UART: [ldev] Erasing FE.KEYID = 1
14,559,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,278,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,294,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,310,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,325,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,347,569 UART: [ldev] --
16,352,410 UART: [fwproc] Wait for Commands...
16,354,624 UART: [fwproc] Recv command 0x46574c44
16,356,617 UART: [fwproc] Recv'd Img size: 118548 bytes
19,835,288 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,916,683 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,989,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,318,232 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,401 writing to cptra_bootfsm_go
3,780,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,958,261 >>> mbox cmd response: failed
13,958,853 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,959,197 >>> mbox cmd response: failed
13,959,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,959,772 >>> mbox cmd response: failed
Initializing fuses
2,060,393 writing to cptra_bootfsm_go
9,686,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,350,776 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,057 UART:
192,426 UART: Running Caliptra ROM ...
193,724 UART:
193,899 UART: [state] CFI Enabled
260,529 UART: [state] LifecycleState = Unprovisioned
262,537 UART: [state] DebugLocked = No
264,147 UART: [state] WD Timer not started. Device not locked for debugging
268,689 UART: [kat] SHA2-256
458,530 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,309 UART: [kat] ++
469,767 UART: [kat] sha1
481,033 UART: [kat] SHA2-256
484,046 UART: [kat] SHA2-384
489,621 UART: [kat] SHA2-512-ACC
492,194 UART: [kat] ECC-384
2,943,843 UART: [kat] HMAC-384Kdf
2,969,442 UART: [kat] LMS
3,501,225 UART: [kat] --
3,505,876 UART: [cold-reset] ++
3,507,166 UART: [fht] FHT @ 0x50003400
3,517,555 UART: [idev] ++
3,518,235 UART: [idev] CDI.KEYID = 6
3,519,253 UART: [idev] SUBJECT.KEYID = 7
3,520,357 UART: [idev] UDS.KEYID = 0
3,523,229 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,485 UART: [idev] Erasing UDS.KEYID = 0
6,024,642 UART: [idev] Sha1 KeyId Algorithm
6,048,748 UART: [idev] --
6,054,528 UART: [ldev] ++
6,055,235 UART: [ldev] CDI.KEYID = 6
6,056,126 UART: [ldev] SUBJECT.KEYID = 5
6,057,291 UART: [ldev] AUTHORITY.KEYID = 7
6,058,534 UART: [ldev] FE.KEYID = 1
6,098,106 UART: [ldev] Erasing FE.KEYID = 1
8,601,191 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,038 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,942 UART: [ldev] --
10,411,481 UART: [fwproc] Wait for Commands...
10,414,655 UART: [fwproc] Recv command 0x46574c44
10,416,974 UART: [fwproc] Recv'd Img size: 118548 bytes
13,912,092 UART: ROM Fatal Error: 0x000B0029
13,915,766 >>> mbox cmd response: failed
13,916,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,916,481 >>> mbox cmd response: failed
13,916,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,917,048 >>> mbox cmd response: failed
Initializing fuses
2,067,526 writing to cptra_bootfsm_go
2,256,824 UART:
2,257,189 UART: Running Caliptra ROM ...
2,258,268 UART:
2,258,425 UART: [state] CFI Enabled
2,324,463 UART: [state] LifecycleState = Unprovisioned
2,326,894 UART: [state] DebugLocked = No
2,328,129 UART: [state] WD Timer not started. Device not locked for debugging
2,332,426 UART: [kat] SHA2-256
2,522,315 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,056 UART: [kat] ++
2,533,529 UART: [kat] sha1
2,544,662 UART: [kat] SHA2-256
2,547,691 UART: [kat] SHA2-384
2,552,443 UART: [kat] SHA2-512-ACC
2,555,027 UART: [kat] ECC-384
5,006,019 UART: [kat] HMAC-384Kdf
5,030,858 UART: [kat] LMS
5,562,563 UART: [kat] --
5,567,873 UART: [cold-reset] ++
5,569,983 UART: [fht] FHT @ 0x50003400
5,581,517 UART: [idev] ++
5,582,235 UART: [idev] CDI.KEYID = 6
5,583,128 UART: [idev] SUBJECT.KEYID = 7
5,584,348 UART: [idev] UDS.KEYID = 0
5,586,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,970 UART: [idev] Erasing UDS.KEYID = 0
8,111,696 UART: [idev] Sha1 KeyId Algorithm
8,133,366 UART: [idev] --
8,137,691 UART: [ldev] ++
8,138,427 UART: [ldev] CDI.KEYID = 6
8,139,341 UART: [ldev] SUBJECT.KEYID = 5
8,140,500 UART: [ldev] AUTHORITY.KEYID = 7
8,141,737 UART: [ldev] FE.KEYID = 1
8,181,173 UART: [ldev] Erasing FE.KEYID = 1
10,688,049 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,421,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,436,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,451,963 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,467,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,487,615 UART: [ldev] --
12,492,847 UART: [fwproc] Wait for Commands...
12,494,684 UART: [fwproc] Recv command 0x46574c44
12,497,002 UART: [fwproc] Recv'd Img size: 118548 bytes
15,994,845 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,385 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,755,441 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,420,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,323,114 >>> mbox cmd response: failed
14,323,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,136 >>> mbox cmd response: failed
14,324,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,324,706 >>> mbox cmd response: failed
Initializing fuses
2,068,330 writing to cptra_bootfsm_go
5,497,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,872,268 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.88s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,416 UART:
192,782 UART: Running Caliptra ROM ...
193,905 UART:
603,491 UART: [state] CFI Enabled
619,745 UART: [state] LifecycleState = Unprovisioned
622,132 UART: [state] DebugLocked = No
623,678 UART: [state] WD Timer not started. Device not locked for debugging
628,931 UART: [kat] SHA2-256
818,776 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,610 UART: [kat] ++
830,205 UART: [kat] sha1
842,556 UART: [kat] SHA2-256
845,619 UART: [kat] SHA2-384
852,525 UART: [kat] SHA2-512-ACC
855,096 UART: [kat] ECC-384
3,295,751 UART: [kat] HMAC-384Kdf
3,308,730 UART: [kat] LMS
3,840,539 UART: [kat] --
3,843,963 UART: [cold-reset] ++
3,845,207 UART: [fht] FHT @ 0x50003400
3,858,238 UART: [idev] ++
3,858,953 UART: [idev] CDI.KEYID = 6
3,859,933 UART: [idev] SUBJECT.KEYID = 7
3,861,099 UART: [idev] UDS.KEYID = 0
3,863,768 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,675 UART: [idev] Erasing UDS.KEYID = 0
6,338,381 UART: [idev] Sha1 KeyId Algorithm
6,360,976 UART: [idev] --
6,365,616 UART: [ldev] ++
6,366,312 UART: [ldev] CDI.KEYID = 6
6,367,228 UART: [ldev] SUBJECT.KEYID = 5
6,368,393 UART: [ldev] AUTHORITY.KEYID = 7
6,369,631 UART: [ldev] FE.KEYID = 1
6,380,934 UART: [ldev] Erasing FE.KEYID = 1
8,858,103 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,900 UART: [ldev] --
10,650,056 UART: [fwproc] Wait for Commands...
10,652,216 UART: [fwproc] Recv command 0x46574c44
10,654,480 UART: [fwproc] Recv'd Img size: 118548 bytes
14,149,311 UART: ROM Fatal Error: 0x000B0029
14,152,992 >>> mbox cmd response: failed
14,153,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,153,727 >>> mbox cmd response: failed
14,154,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,154,310 >>> mbox cmd response: failed
Initializing fuses
2,061,032 writing to cptra_bootfsm_go
2,250,387 UART:
2,250,736 UART: Running Caliptra ROM ...
2,251,872 UART:
6,299,267 UART: [state] CFI Enabled
6,314,111 UART: [state] LifecycleState = Unprovisioned
6,316,472 UART: [state] DebugLocked = No
6,318,082 UART: [state] WD Timer not started. Device not locked for debugging
6,323,473 UART: [kat] SHA2-256
6,513,335 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,524,137 UART: [kat] ++
6,524,741 UART: [kat] sha1
6,536,290 UART: [kat] SHA2-256
6,539,311 UART: [kat] SHA2-384
6,546,133 UART: [kat] SHA2-512-ACC
6,548,714 UART: [kat] ECC-384
8,988,961 UART: [kat] HMAC-384Kdf
9,002,281 UART: [kat] LMS
9,534,126 UART: [kat] --
9,540,287 UART: [cold-reset] ++
9,541,311 UART: [fht] FHT @ 0x50003400
9,553,675 UART: [idev] ++
9,554,376 UART: [idev] CDI.KEYID = 6
9,555,328 UART: [idev] SUBJECT.KEYID = 7
9,556,559 UART: [idev] UDS.KEYID = 0
9,558,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,708,323 UART: [idev] Erasing UDS.KEYID = 0
12,035,928 UART: [idev] Sha1 KeyId Algorithm
12,059,705 UART: [idev] --
12,063,864 UART: [ldev] ++
12,064,572 UART: [ldev] CDI.KEYID = 6
12,065,465 UART: [ldev] SUBJECT.KEYID = 5
12,066,623 UART: [ldev] AUTHORITY.KEYID = 7
12,067,855 UART: [ldev] FE.KEYID = 1
12,079,157 UART: [ldev] Erasing FE.KEYID = 1
14,558,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,277,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,293,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,308,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,323,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,345,119 UART: [ldev] --
16,350,321 UART: [fwproc] Wait for Commands...
16,353,302 UART: [fwproc] Recv command 0x46574c44
16,355,630 UART: [fwproc] Recv'd Img size: 118548 bytes
19,855,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,932,828 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,056,443 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,617,203 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,762,593 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,576,581 >>> mbox cmd response: failed
14,577,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,577,501 >>> mbox cmd response: failed
14,577,780 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,578,075 >>> mbox cmd response: failed
Initializing fuses
2,062,006 writing to cptra_bootfsm_go
9,041,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,332,800 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,546 UART: [state] LifecycleState = Unprovisioned
86,201 UART: [state] DebugLocked = No
86,799 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,449 UART: [kat] SHA2-256
882,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,495 UART: [kat] ++
886,647 UART: [kat] sha1
890,829 UART: [kat] SHA2-256
892,767 UART: [kat] SHA2-384
895,482 UART: [kat] SHA2-512-ACC
897,383 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,558 UART: [kat] LMS
1,475,754 UART: [kat] --
1,476,779 UART: [cold-reset] ++
1,477,341 UART: [fht] Storing FHT @ 0x50003400
1,480,252 UART: [idev] ++
1,480,420 UART: [idev] CDI.KEYID = 6
1,480,780 UART: [idev] SUBJECT.KEYID = 7
1,481,204 UART: [idev] UDS.KEYID = 0
1,481,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,292 UART: [idev] Erasing UDS.KEYID = 0
1,506,168 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,910 UART: [idev] --
1,516,083 UART: [ldev] ++
1,516,251 UART: [ldev] CDI.KEYID = 6
1,516,614 UART: [ldev] SUBJECT.KEYID = 5
1,517,040 UART: [ldev] AUTHORITY.KEYID = 7
1,517,503 UART: [ldev] FE.KEYID = 1
1,522,531 UART: [ldev] Erasing FE.KEYID = 1
1,547,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,944 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,650 UART: [ldev] --
1,585,977 UART: [fwproc] Waiting for Commands...
1,586,776 UART: [fwproc] Received command 0x46574c44
1,587,567 UART: [fwproc] Received Image of size 118548 bytes
2,931,857 UART: ROM Fatal Error: 0x000B0029
2,933,014 >>> mbox cmd response: failed
2,933,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,020 >>> mbox cmd response: failed
2,933,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,232 UART: [state] LifecycleState = Unprovisioned
85,887 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,945 UART: [kat] SHA2-256
881,876 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,991 UART: [kat] ++
886,143 UART: [kat] sha1
890,597 UART: [kat] SHA2-256
892,535 UART: [kat] SHA2-384
895,336 UART: [kat] SHA2-512-ACC
897,237 UART: [kat] ECC-384
902,796 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,337 UART: [cold-reset] ++
1,476,863 UART: [fht] Storing FHT @ 0x50003400
1,479,518 UART: [idev] ++
1,479,686 UART: [idev] CDI.KEYID = 6
1,480,046 UART: [idev] SUBJECT.KEYID = 7
1,480,470 UART: [idev] UDS.KEYID = 0
1,480,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,616 UART: [idev] Erasing UDS.KEYID = 0
1,505,448 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,090 UART: [idev] --
1,515,127 UART: [ldev] ++
1,515,295 UART: [ldev] CDI.KEYID = 6
1,515,658 UART: [ldev] SUBJECT.KEYID = 5
1,516,084 UART: [ldev] AUTHORITY.KEYID = 7
1,516,547 UART: [ldev] FE.KEYID = 1
1,521,695 UART: [ldev] Erasing FE.KEYID = 1
1,547,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,054 UART: [ldev] --
1,586,375 UART: [fwproc] Waiting for Commands...
1,587,242 UART: [fwproc] Received command 0x46574c44
1,588,033 UART: [fwproc] Received Image of size 118548 bytes
2,932,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,778 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,996 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,313 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,951 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,741 >>> mbox cmd response: failed
2,785,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,747 >>> mbox cmd response: failed
2,785,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,397 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,845 UART: [state] LifecycleState = Unprovisioned
86,500 UART: [state] DebugLocked = No
87,070 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,658 UART: [kat] SHA2-256
882,589 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,704 UART: [kat] ++
886,856 UART: [kat] sha1
891,156 UART: [kat] SHA2-256
893,094 UART: [kat] SHA2-384
895,755 UART: [kat] SHA2-512-ACC
897,656 UART: [kat] ECC-384
903,609 UART: [kat] HMAC-384Kdf
908,205 UART: [kat] LMS
1,476,401 UART: [kat] --
1,477,252 UART: [cold-reset] ++
1,477,584 UART: [fht] Storing FHT @ 0x50003400
1,480,493 UART: [idev] ++
1,480,661 UART: [idev] CDI.KEYID = 6
1,481,021 UART: [idev] SUBJECT.KEYID = 7
1,481,445 UART: [idev] UDS.KEYID = 0
1,481,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,311 UART: [idev] Erasing UDS.KEYID = 0
1,506,671 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,389 UART: [idev] --
1,516,360 UART: [ldev] ++
1,516,528 UART: [ldev] CDI.KEYID = 6
1,516,891 UART: [ldev] SUBJECT.KEYID = 5
1,517,317 UART: [ldev] AUTHORITY.KEYID = 7
1,517,780 UART: [ldev] FE.KEYID = 1
1,522,752 UART: [ldev] Erasing FE.KEYID = 1
1,548,147 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,976 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,692 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,545 UART: [ldev] --
1,587,854 UART: [fwproc] Waiting for Commands...
1,588,571 UART: [fwproc] Received command 0x46574c44
1,589,362 UART: [fwproc] Received Image of size 118548 bytes
2,932,498 UART: ROM Fatal Error: 0x000B0029
2,933,655 >>> mbox cmd response: failed
2,933,655 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,661 >>> mbox cmd response: failed
2,933,661 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,933,667 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,351 UART: [state] LifecycleState = Unprovisioned
86,006 UART: [state] DebugLocked = No
86,584 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,306 UART: [kat] SHA2-256
882,237 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,352 UART: [kat] ++
886,504 UART: [kat] sha1
890,796 UART: [kat] SHA2-256
892,734 UART: [kat] SHA2-384
895,581 UART: [kat] SHA2-512-ACC
897,482 UART: [kat] ECC-384
902,885 UART: [kat] HMAC-384Kdf
907,447 UART: [kat] LMS
1,475,643 UART: [kat] --
1,476,648 UART: [cold-reset] ++
1,477,116 UART: [fht] Storing FHT @ 0x50003400
1,479,857 UART: [idev] ++
1,480,025 UART: [idev] CDI.KEYID = 6
1,480,385 UART: [idev] SUBJECT.KEYID = 7
1,480,809 UART: [idev] UDS.KEYID = 0
1,481,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,665 UART: [idev] Erasing UDS.KEYID = 0
1,505,883 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,447 UART: [idev] --
1,515,614 UART: [ldev] ++
1,515,782 UART: [ldev] CDI.KEYID = 6
1,516,145 UART: [ldev] SUBJECT.KEYID = 5
1,516,571 UART: [ldev] AUTHORITY.KEYID = 7
1,517,034 UART: [ldev] FE.KEYID = 1
1,522,610 UART: [ldev] Erasing FE.KEYID = 1
1,548,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,181 UART: [ldev] --
1,587,604 UART: [fwproc] Waiting for Commands...
1,588,465 UART: [fwproc] Received command 0x46574c44
1,589,256 UART: [fwproc] Received Image of size 118548 bytes
2,933,339 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,984 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,785,194 >>> mbox cmd response: failed
2,785,194 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,200 >>> mbox cmd response: failed
2,785,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,785,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,318 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,996 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,241 UART: [state] WD Timer not started. Device not locked for debugging
87,564 UART: [kat] SHA2-256
891,114 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,218 UART: [kat] ++
895,370 UART: [kat] sha1
899,688 UART: [kat] SHA2-256
901,628 UART: [kat] SHA2-384
904,465 UART: [kat] SHA2-512-ACC
906,366 UART: [kat] ECC-384
915,911 UART: [kat] HMAC-384Kdf
920,497 UART: [kat] LMS
1,168,809 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,892 UART: [fht] FHT @ 0x50003400
1,172,666 UART: [idev] ++
1,172,834 UART: [idev] CDI.KEYID = 6
1,173,195 UART: [idev] SUBJECT.KEYID = 7
1,173,620 UART: [idev] UDS.KEYID = 0
1,173,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,531 UART: [idev] Erasing UDS.KEYID = 0
1,198,845 UART: [idev] Sha1 KeyId Algorithm
1,207,739 UART: [idev] --
1,208,758 UART: [ldev] ++
1,208,926 UART: [ldev] CDI.KEYID = 6
1,209,290 UART: [ldev] SUBJECT.KEYID = 5
1,209,717 UART: [ldev] AUTHORITY.KEYID = 7
1,210,180 UART: [ldev] FE.KEYID = 1
1,215,440 UART: [ldev] Erasing FE.KEYID = 1
1,241,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,352 UART: [ldev] --
1,280,637 UART: [fwproc] Wait for Commands...
1,281,286 UART: [fwproc] Recv command 0x46574c44
1,282,019 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,010 UART: ROM Fatal Error: 0x000B0029
2,626,167 >>> mbox cmd response: failed
2,626,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,173 >>> mbox cmd response: failed
2,626,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,626,179 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,894 UART: [state] LifecycleState = Unprovisioned
85,549 UART: [state] DebugLocked = No
86,161 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
890,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,978 UART: [kat] ++
895,130 UART: [kat] sha1
899,260 UART: [kat] SHA2-256
901,200 UART: [kat] SHA2-384
903,907 UART: [kat] SHA2-512-ACC
905,808 UART: [kat] ECC-384
915,585 UART: [kat] HMAC-384Kdf
920,345 UART: [kat] LMS
1,168,657 UART: [kat] --
1,169,346 UART: [cold-reset] ++
1,169,792 UART: [fht] FHT @ 0x50003400
1,172,444 UART: [idev] ++
1,172,612 UART: [idev] CDI.KEYID = 6
1,172,973 UART: [idev] SUBJECT.KEYID = 7
1,173,398 UART: [idev] UDS.KEYID = 0
1,173,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,221 UART: [idev] Erasing UDS.KEYID = 0
1,198,435 UART: [idev] Sha1 KeyId Algorithm
1,207,357 UART: [idev] --
1,208,578 UART: [ldev] ++
1,208,746 UART: [ldev] CDI.KEYID = 6
1,209,110 UART: [ldev] SUBJECT.KEYID = 5
1,209,537 UART: [ldev] AUTHORITY.KEYID = 7
1,210,000 UART: [ldev] FE.KEYID = 1
1,215,148 UART: [ldev] Erasing FE.KEYID = 1
1,241,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,859 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,710 UART: [ldev] --
1,281,051 UART: [fwproc] Wait for Commands...
1,281,772 UART: [fwproc] Recv command 0x46574c44
1,282,505 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,391 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,982 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,157 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,550 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,481,578 >>> mbox cmd response: failed
2,481,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,584 >>> mbox cmd response: failed
2,481,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,481,590 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,924 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,087 UART: [state] LifecycleState = Unprovisioned
85,742 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
891,345 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,449 UART: [kat] ++
895,601 UART: [kat] sha1
899,979 UART: [kat] SHA2-256
901,919 UART: [kat] SHA2-384
904,834 UART: [kat] SHA2-512-ACC
906,735 UART: [kat] ECC-384
916,624 UART: [kat] HMAC-384Kdf
921,252 UART: [kat] LMS
1,169,564 UART: [kat] --
1,170,339 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,416 UART: [idev] Erasing UDS.KEYID = 0
1,199,208 UART: [idev] Sha1 KeyId Algorithm
1,207,976 UART: [idev] --
1,209,025 UART: [ldev] ++
1,209,193 UART: [ldev] CDI.KEYID = 6
1,209,557 UART: [ldev] SUBJECT.KEYID = 5
1,209,984 UART: [ldev] AUTHORITY.KEYID = 7
1,210,447 UART: [ldev] FE.KEYID = 1
1,215,847 UART: [ldev] Erasing FE.KEYID = 1
1,242,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,979 UART: [ldev] --
1,281,214 UART: [fwproc] Wait for Commands...
1,281,911 UART: [fwproc] Recv command 0x46574c44
1,282,644 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,837 UART: ROM Fatal Error: 0x000B0029
2,627,994 >>> mbox cmd response: failed
2,627,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,000 >>> mbox cmd response: failed
2,628,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,628,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,031 UART: [state] LifecycleState = Unprovisioned
85,686 UART: [state] DebugLocked = No
86,400 UART: [state] WD Timer not started. Device not locked for debugging
87,525 UART: [kat] SHA2-256
891,075 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,179 UART: [kat] ++
895,331 UART: [kat] sha1
899,519 UART: [kat] SHA2-256
901,459 UART: [kat] SHA2-384
904,054 UART: [kat] SHA2-512-ACC
905,955 UART: [kat] ECC-384
915,870 UART: [kat] HMAC-384Kdf
920,572 UART: [kat] LMS
1,168,884 UART: [kat] --
1,169,807 UART: [cold-reset] ++
1,170,327 UART: [fht] FHT @ 0x50003400
1,172,899 UART: [idev] ++
1,173,067 UART: [idev] CDI.KEYID = 6
1,173,428 UART: [idev] SUBJECT.KEYID = 7
1,173,853 UART: [idev] UDS.KEYID = 0
1,174,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,910 UART: [idev] Erasing UDS.KEYID = 0
1,199,416 UART: [idev] Sha1 KeyId Algorithm
1,208,092 UART: [idev] --
1,209,063 UART: [ldev] ++
1,209,231 UART: [ldev] CDI.KEYID = 6
1,209,595 UART: [ldev] SUBJECT.KEYID = 5
1,210,022 UART: [ldev] AUTHORITY.KEYID = 7
1,210,485 UART: [ldev] FE.KEYID = 1
1,215,653 UART: [ldev] Erasing FE.KEYID = 1
1,242,222 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,422 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,013 UART: [ldev] --
1,281,280 UART: [fwproc] Wait for Commands...
1,282,055 UART: [fwproc] Recv command 0x46574c44
1,282,788 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,913 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,088 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,445 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,727 >>> mbox cmd response: failed
2,482,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,733 >>> mbox cmd response: failed
2,482,733 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,739 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,952 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,696 UART: [state] LifecycleState = Unprovisioned
86,351 UART: [state] DebugLocked = No
86,979 UART: [state] WD Timer not started. Device not locked for debugging
88,118 UART: [kat] SHA2-256
893,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,893 UART: [kat] ++
898,045 UART: [kat] sha1
902,305 UART: [kat] SHA2-256
904,245 UART: [kat] SHA2-384
907,064 UART: [kat] SHA2-512-ACC
908,965 UART: [kat] ECC-384
918,768 UART: [kat] HMAC-384Kdf
923,326 UART: [kat] LMS
1,171,654 UART: [kat] --
1,172,509 UART: [cold-reset] ++
1,172,949 UART: [fht] FHT @ 0x50003400
1,175,652 UART: [idev] ++
1,175,820 UART: [idev] CDI.KEYID = 6
1,176,180 UART: [idev] SUBJECT.KEYID = 7
1,176,604 UART: [idev] UDS.KEYID = 0
1,176,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,244 UART: [idev] Erasing UDS.KEYID = 0
1,201,257 UART: [idev] Sha1 KeyId Algorithm
1,209,665 UART: [idev] --
1,210,717 UART: [ldev] ++
1,210,885 UART: [ldev] CDI.KEYID = 6
1,211,248 UART: [ldev] SUBJECT.KEYID = 5
1,211,674 UART: [ldev] AUTHORITY.KEYID = 7
1,212,137 UART: [ldev] FE.KEYID = 1
1,217,123 UART: [ldev] Erasing FE.KEYID = 1
1,243,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,873 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,476 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,629 UART: [ldev] --
1,283,088 UART: [fwproc] Wait for Commands...
1,283,766 UART: [fwproc] Recv command 0x46574c44
1,284,494 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,230 UART: ROM Fatal Error: 0x000B0029
2,629,387 >>> mbox cmd response: failed
2,629,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,393 >>> mbox cmd response: failed
2,629,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,629,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,440 UART: [state] LifecycleState = Unprovisioned
86,095 UART: [state] DebugLocked = No
86,679 UART: [state] WD Timer not started. Device not locked for debugging
87,850 UART: [kat] SHA2-256
893,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,625 UART: [kat] ++
897,777 UART: [kat] sha1
902,009 UART: [kat] SHA2-256
903,949 UART: [kat] SHA2-384
906,514 UART: [kat] SHA2-512-ACC
908,415 UART: [kat] ECC-384
918,228 UART: [kat] HMAC-384Kdf
922,844 UART: [kat] LMS
1,171,172 UART: [kat] --
1,172,199 UART: [cold-reset] ++
1,172,635 UART: [fht] FHT @ 0x50003400
1,175,314 UART: [idev] ++
1,175,482 UART: [idev] CDI.KEYID = 6
1,175,842 UART: [idev] SUBJECT.KEYID = 7
1,176,266 UART: [idev] UDS.KEYID = 0
1,176,611 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,262 UART: [idev] Erasing UDS.KEYID = 0
1,201,297 UART: [idev] Sha1 KeyId Algorithm
1,209,987 UART: [idev] --
1,211,155 UART: [ldev] ++
1,211,323 UART: [ldev] CDI.KEYID = 6
1,211,686 UART: [ldev] SUBJECT.KEYID = 5
1,212,112 UART: [ldev] AUTHORITY.KEYID = 7
1,212,575 UART: [ldev] FE.KEYID = 1
1,217,789 UART: [ldev] Erasing FE.KEYID = 1
1,243,940 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,991 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,882 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,761 UART: [ldev] --
1,283,152 UART: [fwproc] Wait for Commands...
1,283,922 UART: [fwproc] Recv command 0x46574c44
1,284,650 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,810 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,219 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,498 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,482,032 >>> mbox cmd response: failed
2,482,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,038 >>> mbox cmd response: failed
2,482,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,482,044 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,567 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,747 UART: [state] LifecycleState = Unprovisioned
86,402 UART: [state] DebugLocked = No
86,900 UART: [state] WD Timer not started. Device not locked for debugging
88,239 UART: [kat] SHA2-256
893,889 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,014 UART: [kat] ++
898,166 UART: [kat] sha1
902,412 UART: [kat] SHA2-256
904,352 UART: [kat] SHA2-384
907,109 UART: [kat] SHA2-512-ACC
909,010 UART: [kat] ECC-384
918,739 UART: [kat] HMAC-384Kdf
923,499 UART: [kat] LMS
1,171,827 UART: [kat] --
1,172,950 UART: [cold-reset] ++
1,173,496 UART: [fht] FHT @ 0x50003400
1,176,047 UART: [idev] ++
1,176,215 UART: [idev] CDI.KEYID = 6
1,176,575 UART: [idev] SUBJECT.KEYID = 7
1,176,999 UART: [idev] UDS.KEYID = 0
1,177,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,095 UART: [idev] Erasing UDS.KEYID = 0
1,202,358 UART: [idev] Sha1 KeyId Algorithm
1,210,866 UART: [idev] --
1,211,792 UART: [ldev] ++
1,211,960 UART: [ldev] CDI.KEYID = 6
1,212,323 UART: [ldev] SUBJECT.KEYID = 5
1,212,749 UART: [ldev] AUTHORITY.KEYID = 7
1,213,212 UART: [ldev] FE.KEYID = 1
1,218,902 UART: [ldev] Erasing FE.KEYID = 1
1,245,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,259,334 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,265,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,844 UART: [ldev] --
1,285,235 UART: [fwproc] Wait for Commands...
1,286,043 UART: [fwproc] Recv command 0x46574c44
1,286,771 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,159 UART: ROM Fatal Error: 0x000B0029
2,632,316 >>> mbox cmd response: failed
2,632,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,632,322 >>> mbox cmd response: failed
2,632,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,632,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,609 UART: [state] LifecycleState = Unprovisioned
86,264 UART: [state] DebugLocked = No
86,832 UART: [state] WD Timer not started. Device not locked for debugging
88,145 UART: [kat] SHA2-256
893,795 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,920 UART: [kat] ++
898,072 UART: [kat] sha1
902,284 UART: [kat] SHA2-256
904,224 UART: [kat] SHA2-384
906,965 UART: [kat] SHA2-512-ACC
908,866 UART: [kat] ECC-384
918,655 UART: [kat] HMAC-384Kdf
923,321 UART: [kat] LMS
1,171,649 UART: [kat] --
1,172,758 UART: [cold-reset] ++
1,173,276 UART: [fht] FHT @ 0x50003400
1,176,047 UART: [idev] ++
1,176,215 UART: [idev] CDI.KEYID = 6
1,176,575 UART: [idev] SUBJECT.KEYID = 7
1,176,999 UART: [idev] UDS.KEYID = 0
1,177,344 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,923 UART: [idev] Erasing UDS.KEYID = 0
1,201,782 UART: [idev] Sha1 KeyId Algorithm
1,210,218 UART: [idev] --
1,211,126 UART: [ldev] ++
1,211,294 UART: [ldev] CDI.KEYID = 6
1,211,657 UART: [ldev] SUBJECT.KEYID = 5
1,212,083 UART: [ldev] AUTHORITY.KEYID = 7
1,212,546 UART: [ldev] FE.KEYID = 1
1,217,666 UART: [ldev] Erasing FE.KEYID = 1
1,243,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,676 UART: [ldev] --
1,282,995 UART: [fwproc] Wait for Commands...
1,283,777 UART: [fwproc] Recv command 0x46574c44
1,284,505 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,796 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,966 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,213 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,484,233 >>> mbox cmd response: failed
2,484,233 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,239 >>> mbox cmd response: failed
2,484,239 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,484,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,570 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_addr_unaligned ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,785 writing to cptra_bootfsm_go
193,006 UART:
193,369 UART: Running Caliptra ROM ...
194,554 UART:
194,715 UART: [state] CFI Enabled
266,019 UART: [state] LifecycleState = Unprovisioned
267,993 UART: [state] DebugLocked = No
270,187 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,264 UART: [kat] SHA2-256
443,967 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,462 UART: [kat] ++
455,057 UART: [kat] sha1
466,920 UART: [kat] SHA2-256
469,624 UART: [kat] SHA2-384
475,387 UART: [kat] SHA2-512-ACC
477,786 UART: [kat] ECC-384
2,764,797 UART: [kat] HMAC-384Kdf
2,777,644 UART: [kat] LMS
3,967,944 UART: [kat] --
3,971,894 UART: [cold-reset] ++
3,973,231 UART: [fht] Storing FHT @ 0x50003400
3,984,552 UART: [idev] ++
3,985,119 UART: [idev] CDI.KEYID = 6
3,986,138 UART: [idev] SUBJECT.KEYID = 7
3,987,300 UART: [idev] UDS.KEYID = 0
3,990,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,139,500 UART: [idev] Erasing UDS.KEYID = 0
7,323,962 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,860 UART: [idev] --
7,349,960 UART: [ldev] ++
7,350,532 UART: [ldev] CDI.KEYID = 6
7,351,474 UART: [ldev] SUBJECT.KEYID = 5
7,352,746 UART: [ldev] AUTHORITY.KEYID = 7
7,353,983 UART: [ldev] FE.KEYID = 1
7,399,261 UART: [ldev] Erasing FE.KEYID = 1
10,734,657 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,593 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,096 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,068 UART: [ldev] --
13,116,184 UART: [fwproc] Waiting for Commands...
13,119,206 UART: [fwproc] Received command 0x46574c44
13,121,543 UART: [fwproc] Received Image of size 118548 bytes
15,833,040 UART: ROM Fatal Error: 0x000B003F
15,836,516 >>> mbox cmd response: failed
15,836,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,837,188 >>> mbox cmd response: failed
15,837,492 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,837,794 >>> mbox cmd response: failed
Initializing fuses
2,056,128 writing to cptra_bootfsm_go
2,245,448 UART:
2,245,824 UART: Running Caliptra ROM ...
2,246,966 UART:
2,247,137 UART: [state] CFI Enabled
2,320,060 UART: [state] LifecycleState = Unprovisioned
2,322,012 UART: [state] DebugLocked = No
2,323,851 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,329,114 UART: [kat] SHA2-256
2,498,826 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,509,339 UART: [kat] ++
2,509,799 UART: [kat] sha1
2,521,557 UART: [kat] SHA2-256
2,524,261 UART: [kat] SHA2-384
2,529,978 UART: [kat] SHA2-512-ACC
2,532,387 UART: [kat] ECC-384
4,824,074 UART: [kat] HMAC-384Kdf
4,855,315 UART: [kat] LMS
6,045,611 UART: [kat] --
6,049,900 UART: [cold-reset] ++
6,052,388 UART: [fht] Storing FHT @ 0x50003400
6,062,634 UART: [idev] ++
6,063,213 UART: [idev] CDI.KEYID = 6
6,064,181 UART: [idev] SUBJECT.KEYID = 7
6,065,430 UART: [idev] UDS.KEYID = 0
6,067,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,216,951 UART: [idev] Erasing UDS.KEYID = 0
9,403,759 UART: [idev] Using Sha1 for KeyId Algorithm
9,424,280 UART: [idev] --
9,427,796 UART: [ldev] ++
9,428,429 UART: [ldev] CDI.KEYID = 6
9,429,339 UART: [ldev] SUBJECT.KEYID = 5
9,430,634 UART: [ldev] AUTHORITY.KEYID = 7
9,431,822 UART: [ldev] FE.KEYID = 1
9,478,511 UART: [ldev] Erasing FE.KEYID = 1
12,810,636 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,106,002 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,120,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,135,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,149,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,168,510 UART: [ldev] --
15,173,073 UART: [fwproc] Waiting for Commands...
15,175,123 UART: [fwproc] Received command 0x46574c44
15,177,315 UART: [fwproc] Received Image of size 118548 bytes
19,283,273 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,357,179 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,430,404 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,066 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
3,807,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,583,031 >>> mbox cmd response: failed
15,583,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,583,965 >>> mbox cmd response: failed
15,584,237 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,584,550 >>> mbox cmd response: failed
Initializing fuses
2,070,566 writing to cptra_bootfsm_go
5,862,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,995,673 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,512 UART:
192,873 UART: Running Caliptra ROM ...
194,073 UART:
603,701 UART: [state] CFI Enabled
618,777 UART: [state] LifecycleState = Unprovisioned
620,707 UART: [state] DebugLocked = No
622,206 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,382 UART: [kat] SHA2-256
796,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,678 UART: [kat] ++
807,128 UART: [kat] sha1
819,036 UART: [kat] SHA2-256
821,710 UART: [kat] SHA2-384
826,241 UART: [kat] SHA2-512-ACC
828,586 UART: [kat] ECC-384
3,113,725 UART: [kat] HMAC-384Kdf
3,126,621 UART: [kat] LMS
4,316,740 UART: [kat] --
4,320,806 UART: [cold-reset] ++
4,322,477 UART: [fht] Storing FHT @ 0x50003400
4,333,371 UART: [idev] ++
4,334,014 UART: [idev] CDI.KEYID = 6
4,334,909 UART: [idev] SUBJECT.KEYID = 7
4,336,189 UART: [idev] UDS.KEYID = 0
4,339,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,488,234 UART: [idev] Erasing UDS.KEYID = 0
7,621,779 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,228 UART: [idev] --
7,646,800 UART: [ldev] ++
7,647,379 UART: [ldev] CDI.KEYID = 6
7,648,356 UART: [ldev] SUBJECT.KEYID = 5
7,649,578 UART: [ldev] AUTHORITY.KEYID = 7
7,650,819 UART: [ldev] FE.KEYID = 1
7,659,203 UART: [ldev] Erasing FE.KEYID = 1
10,945,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,238,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,282,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,480 UART: [ldev] --
13,307,158 UART: [fwproc] Waiting for Commands...
13,309,381 UART: [fwproc] Received command 0x46574c44
13,311,583 UART: [fwproc] Received Image of size 118548 bytes
16,017,542 UART: ROM Fatal Error: 0x000B003F
16,021,004 >>> mbox cmd response: failed
16,021,400 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,021,737 >>> mbox cmd response: failed
16,022,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,022,319 >>> mbox cmd response: failed
Initializing fuses
2,057,827 writing to cptra_bootfsm_go
2,247,105 UART:
2,247,461 UART: Running Caliptra ROM ...
2,248,547 UART:
4,436,668 UART: [state] CFI Enabled
4,453,787 UART: [state] LifecycleState = Unprovisioned
4,455,705 UART: [state] DebugLocked = No
4,457,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,462,344 UART: [kat] SHA2-256
4,632,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,642,623 UART: [kat] ++
4,643,093 UART: [kat] sha1
4,655,016 UART: [kat] SHA2-256
4,657,715 UART: [kat] SHA2-384
4,662,801 UART: [kat] SHA2-512-ACC
4,665,161 UART: [kat] ECC-384
6,947,166 UART: [kat] HMAC-384Kdf
6,960,275 UART: [kat] LMS
8,150,410 UART: [kat] --
8,154,862 UART: [cold-reset] ++
8,156,649 UART: [fht] Storing FHT @ 0x50003400
8,167,965 UART: [idev] ++
8,168,553 UART: [idev] CDI.KEYID = 6
8,169,472 UART: [idev] SUBJECT.KEYID = 7
8,170,750 UART: [idev] UDS.KEYID = 0
8,173,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,322,070 UART: [idev] Erasing UDS.KEYID = 0
11,460,155 UART: [idev] Using Sha1 for KeyId Algorithm
11,481,865 UART: [idev] --
11,487,111 UART: [ldev] ++
11,487,684 UART: [ldev] CDI.KEYID = 6
11,488,625 UART: [ldev] SUBJECT.KEYID = 5
11,489,890 UART: [ldev] AUTHORITY.KEYID = 7
11,491,017 UART: [ldev] FE.KEYID = 1
11,501,970 UART: [ldev] Erasing FE.KEYID = 1
14,792,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,087,159 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,101,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,116,545 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,131,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,149,384 UART: [ldev] --
17,154,015 UART: [fwproc] Waiting for Commands...
17,156,667 UART: [fwproc] Received command 0x46574c44
17,158,859 UART: [fwproc] Received Image of size 118548 bytes
21,264,787 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,338,179 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,411,362 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,738,982 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
4,127,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,758,743 >>> mbox cmd response: failed
15,759,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,680 >>> mbox cmd response: failed
15,759,957 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,261 >>> mbox cmd response: failed
Initializing fuses
2,057,054 writing to cptra_bootfsm_go
8,237,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,268,909 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,010 writing to cptra_bootfsm_go
192,132 UART:
192,502 UART: Running Caliptra ROM ...
193,627 UART:
193,778 UART: [state] CFI Enabled
260,286 UART: [state] LifecycleState = Unprovisioned
262,238 UART: [state] DebugLocked = No
264,355 UART: [state] WD Timer not started. Device not locked for debugging
268,175 UART: [kat] SHA2-256
447,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,615 UART: [kat] ++
459,068 UART: [kat] sha1
471,356 UART: [kat] SHA2-256
474,046 UART: [kat] SHA2-384
479,762 UART: [kat] SHA2-512-ACC
482,164 UART: [kat] ECC-384
2,947,399 UART: [kat] HMAC-384Kdf
2,969,466 UART: [kat] LMS
3,445,948 UART: [kat] --
3,451,421 UART: [cold-reset] ++
3,452,290 UART: [fht] FHT @ 0x50003400
3,464,006 UART: [idev] ++
3,464,577 UART: [idev] CDI.KEYID = 6
3,465,519 UART: [idev] SUBJECT.KEYID = 7
3,466,765 UART: [idev] UDS.KEYID = 0
3,469,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,762 UART: [idev] Erasing UDS.KEYID = 0
5,987,853 UART: [idev] Sha1 KeyId Algorithm
6,011,428 UART: [idev] --
6,016,456 UART: [ldev] ++
6,017,029 UART: [ldev] CDI.KEYID = 6
6,017,968 UART: [ldev] SUBJECT.KEYID = 5
6,019,135 UART: [ldev] AUTHORITY.KEYID = 7
6,020,427 UART: [ldev] FE.KEYID = 1
6,056,372 UART: [ldev] Erasing FE.KEYID = 1
8,565,500 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,068 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,370 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,775 UART: [ldev] --
10,372,621 UART: [fwproc] Wait for Commands...
10,375,872 UART: [fwproc] Recv command 0x46574c44
10,377,865 UART: [fwproc] Recv'd Img size: 118548 bytes
12,451,173 UART: ROM Fatal Error: 0x000B003F
12,454,401 >>> mbox cmd response: failed
12,454,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,168 >>> mbox cmd response: failed
12,455,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,729 >>> mbox cmd response: failed
Initializing fuses
2,066,819 writing to cptra_bootfsm_go
2,256,143 UART:
2,256,485 UART: Running Caliptra ROM ...
2,257,627 UART:
2,257,802 UART: [state] CFI Enabled
2,332,933 UART: [state] LifecycleState = Unprovisioned
2,334,901 UART: [state] DebugLocked = No
2,336,464 UART: [state] WD Timer not started. Device not locked for debugging
2,340,603 UART: [kat] SHA2-256
2,520,275 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,531,052 UART: [kat] ++
2,531,608 UART: [kat] sha1
2,543,589 UART: [kat] SHA2-256
2,546,286 UART: [kat] SHA2-384
2,552,031 UART: [kat] SHA2-512-ACC
2,554,385 UART: [kat] ECC-384
5,017,317 UART: [kat] HMAC-384Kdf
5,043,111 UART: [kat] LMS
5,519,578 UART: [kat] --
5,524,138 UART: [cold-reset] ++
5,526,564 UART: [fht] FHT @ 0x50003400
5,538,033 UART: [idev] ++
5,538,603 UART: [idev] CDI.KEYID = 6
5,539,542 UART: [idev] SUBJECT.KEYID = 7
5,540,813 UART: [idev] UDS.KEYID = 0
5,543,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,692,300 UART: [idev] Erasing UDS.KEYID = 0
8,056,886 UART: [idev] Sha1 KeyId Algorithm
8,081,676 UART: [idev] --
8,087,326 UART: [ldev] ++
8,087,942 UART: [ldev] CDI.KEYID = 6
8,088,867 UART: [ldev] SUBJECT.KEYID = 5
8,090,035 UART: [ldev] AUTHORITY.KEYID = 7
8,091,279 UART: [ldev] FE.KEYID = 1
8,129,202 UART: [ldev] Erasing FE.KEYID = 1
10,640,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,372,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,388,010 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,403,913 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,419,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,440,942 UART: [ldev] --
12,445,948 UART: [fwproc] Wait for Commands...
12,448,111 UART: [fwproc] Recv command 0x46574c44
12,450,107 UART: [fwproc] Recv'd Img size: 118548 bytes
15,932,801 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,008,152 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,081,201 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,409,103 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
3,464,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,341,385 >>> mbox cmd response: failed
12,342,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,342,404 >>> mbox cmd response: failed
12,342,836 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,343,170 >>> mbox cmd response: failed
Initializing fuses
2,061,634 writing to cptra_bootfsm_go
5,518,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,298,615 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,562 UART:
192,939 UART: Running Caliptra ROM ...
194,179 UART:
603,831 UART: [state] CFI Enabled
614,280 UART: [state] LifecycleState = Unprovisioned
616,182 UART: [state] DebugLocked = No
618,431 UART: [state] WD Timer not started. Device not locked for debugging
621,919 UART: [kat] SHA2-256
801,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,372 UART: [kat] ++
812,910 UART: [kat] sha1
823,150 UART: [kat] SHA2-256
825,842 UART: [kat] SHA2-384
831,072 UART: [kat] SHA2-512-ACC
833,423 UART: [kat] ECC-384
3,274,326 UART: [kat] HMAC-384Kdf
3,285,593 UART: [kat] LMS
3,762,081 UART: [kat] --
3,766,523 UART: [cold-reset] ++
3,768,673 UART: [fht] FHT @ 0x50003400
3,780,389 UART: [idev] ++
3,780,980 UART: [idev] CDI.KEYID = 6
3,782,009 UART: [idev] SUBJECT.KEYID = 7
3,783,177 UART: [idev] UDS.KEYID = 0
3,785,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,934,981 UART: [idev] Erasing UDS.KEYID = 0
6,265,592 UART: [idev] Sha1 KeyId Algorithm
6,289,317 UART: [idev] --
6,294,878 UART: [ldev] ++
6,295,455 UART: [ldev] CDI.KEYID = 6
6,296,368 UART: [ldev] SUBJECT.KEYID = 5
6,297,586 UART: [ldev] AUTHORITY.KEYID = 7
6,298,826 UART: [ldev] FE.KEYID = 1
6,310,130 UART: [ldev] Erasing FE.KEYID = 1
8,792,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,100 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,956 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,783 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,403 UART: [ldev] --
10,587,493 UART: [fwproc] Wait for Commands...
10,589,441 UART: [fwproc] Recv command 0x46574c44
10,591,441 UART: [fwproc] Recv'd Img size: 118548 bytes
12,660,592 UART: ROM Fatal Error: 0x000B003F
12,663,832 >>> mbox cmd response: failed
12,664,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,664,620 >>> mbox cmd response: failed
12,665,003 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,665,319 >>> mbox cmd response: failed
Initializing fuses
2,060,966 writing to cptra_bootfsm_go
2,250,263 UART:
2,250,609 UART: Running Caliptra ROM ...
2,251,697 UART:
7,789,757 UART: [state] CFI Enabled
7,801,725 UART: [state] LifecycleState = Unprovisioned
7,803,645 UART: [state] DebugLocked = No
7,806,230 UART: [state] WD Timer not started. Device not locked for debugging
7,810,590 UART: [kat] SHA2-256
7,990,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,001,049 UART: [kat] ++
8,001,556 UART: [kat] sha1
8,012,834 UART: [kat] SHA2-256
8,015,480 UART: [kat] SHA2-384
8,022,125 UART: [kat] SHA2-512-ACC
8,024,488 UART: [kat] ECC-384
10,467,321 UART: [kat] HMAC-384Kdf
10,480,034 UART: [kat] LMS
10,956,531 UART: [kat] --
10,962,636 UART: [cold-reset] ++
10,963,563 UART: [fht] FHT @ 0x50003400
10,973,840 UART: [idev] ++
10,974,473 UART: [idev] CDI.KEYID = 6
10,975,382 UART: [idev] SUBJECT.KEYID = 7
10,976,656 UART: [idev] UDS.KEYID = 0
10,979,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,128,183 UART: [idev] Erasing UDS.KEYID = 0
13,454,340 UART: [idev] Sha1 KeyId Algorithm
13,477,643 UART: [idev] --
13,482,071 UART: [ldev] ++
13,482,646 UART: [ldev] CDI.KEYID = 6
13,483,532 UART: [ldev] SUBJECT.KEYID = 5
13,484,806 UART: [ldev] AUTHORITY.KEYID = 7
13,486,054 UART: [ldev] FE.KEYID = 1
13,497,437 UART: [ldev] Erasing FE.KEYID = 1
15,975,704 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,696,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,712,754 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,728,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,744,199 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,766,658 UART: [ldev] --
17,771,822 UART: [fwproc] Wait for Commands...
17,775,065 UART: [fwproc] Recv command 0x46574c44
17,777,116 UART: [fwproc] Recv'd Img size: 118548 bytes
21,259,998 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,338,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,411,328 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,739,751 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,782,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,005 >>> mbox cmd response: failed
12,534,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,913 >>> mbox cmd response: failed
12,535,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,486 >>> mbox cmd response: failed
Initializing fuses
2,060,726 writing to cptra_bootfsm_go
11,106,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,767,002 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,959 writing to cptra_bootfsm_go
193,072 UART:
193,444 UART: Running Caliptra ROM ...
194,578 UART:
194,728 UART: [state] CFI Enabled
262,653 UART: [state] LifecycleState = Unprovisioned
265,054 UART: [state] DebugLocked = No
267,965 UART: [state] WD Timer not started. Device not locked for debugging
271,911 UART: [kat] SHA2-256
461,826 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,607 UART: [kat] ++
473,092 UART: [kat] sha1
486,036 UART: [kat] SHA2-256
489,012 UART: [kat] SHA2-384
494,902 UART: [kat] SHA2-512-ACC
497,468 UART: [kat] ECC-384
2,946,533 UART: [kat] HMAC-384Kdf
2,969,656 UART: [kat] LMS
3,501,404 UART: [kat] --
3,504,478 UART: [cold-reset] ++
3,506,523 UART: [fht] FHT @ 0x50003400
3,516,863 UART: [idev] ++
3,517,540 UART: [idev] CDI.KEYID = 6
3,518,510 UART: [idev] SUBJECT.KEYID = 7
3,519,669 UART: [idev] UDS.KEYID = 0
3,522,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,137 UART: [idev] Erasing UDS.KEYID = 0
6,025,861 UART: [idev] Sha1 KeyId Algorithm
6,047,544 UART: [idev] --
6,051,186 UART: [ldev] ++
6,051,927 UART: [ldev] CDI.KEYID = 6
6,052,822 UART: [ldev] SUBJECT.KEYID = 5
6,053,991 UART: [ldev] AUTHORITY.KEYID = 7
6,055,152 UART: [ldev] FE.KEYID = 1
6,099,281 UART: [ldev] Erasing FE.KEYID = 1
8,606,873 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,194 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,715 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,067 UART: [ldev] --
10,412,952 UART: [fwproc] Wait for Commands...
10,415,871 UART: [fwproc] Recv command 0x46574c44
10,418,139 UART: [fwproc] Recv'd Img size: 118548 bytes
12,503,414 UART: ROM Fatal Error: 0x000B003F
12,507,045 >>> mbox cmd response: failed
12,507,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,507,792 >>> mbox cmd response: failed
12,508,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,363 >>> mbox cmd response: failed
Initializing fuses
2,062,871 writing to cptra_bootfsm_go
2,252,196 UART:
2,252,543 UART: Running Caliptra ROM ...
2,253,684 UART:
2,253,854 UART: [state] CFI Enabled
2,324,153 UART: [state] LifecycleState = Unprovisioned
2,326,523 UART: [state] DebugLocked = No
2,328,139 UART: [state] WD Timer not started. Device not locked for debugging
2,332,830 UART: [kat] SHA2-256
2,522,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,541 UART: [kat] ++
2,534,028 UART: [kat] sha1
2,544,694 UART: [kat] SHA2-256
2,547,727 UART: [kat] SHA2-384
2,553,081 UART: [kat] SHA2-512-ACC
2,555,656 UART: [kat] ECC-384
5,006,923 UART: [kat] HMAC-384Kdf
5,029,909 UART: [kat] LMS
5,561,714 UART: [kat] --
5,565,760 UART: [cold-reset] ++
5,566,941 UART: [fht] FHT @ 0x50003400
5,577,326 UART: [idev] ++
5,578,048 UART: [idev] CDI.KEYID = 6
5,578,970 UART: [idev] SUBJECT.KEYID = 7
5,580,210 UART: [idev] UDS.KEYID = 0
5,582,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,478 UART: [idev] Erasing UDS.KEYID = 0
8,085,056 UART: [idev] Sha1 KeyId Algorithm
8,106,792 UART: [idev] --
8,112,904 UART: [ldev] ++
8,113,584 UART: [ldev] CDI.KEYID = 6
8,114,469 UART: [ldev] SUBJECT.KEYID = 5
8,115,685 UART: [ldev] AUTHORITY.KEYID = 7
8,116,866 UART: [ldev] FE.KEYID = 1
8,157,529 UART: [ldev] Erasing FE.KEYID = 1
10,663,207 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,945 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,412,097 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,427,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,442,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,177 UART: [ldev] --
12,469,166 UART: [fwproc] Wait for Commands...
12,471,767 UART: [fwproc] Recv command 0x46574c44
12,474,086 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,334 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,050,528 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,174,144 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,734,595 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,876 writing to cptra_bootfsm_go
3,439,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,303,921 >>> mbox cmd response: failed
12,304,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,304,790 >>> mbox cmd response: failed
12,305,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,305,361 >>> mbox cmd response: failed
Initializing fuses
2,061,994 writing to cptra_bootfsm_go
5,489,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,874,474 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,327 writing to cptra_bootfsm_go
192,647 UART:
193,000 UART: Running Caliptra ROM ...
194,206 UART:
603,960 UART: [state] CFI Enabled
618,159 UART: [state] LifecycleState = Unprovisioned
620,572 UART: [state] DebugLocked = No
622,561 UART: [state] WD Timer not started. Device not locked for debugging
628,027 UART: [kat] SHA2-256
817,902 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,678 UART: [kat] ++
829,274 UART: [kat] sha1
841,684 UART: [kat] SHA2-256
844,695 UART: [kat] SHA2-384
851,109 UART: [kat] SHA2-512-ACC
853,680 UART: [kat] ECC-384
3,293,282 UART: [kat] HMAC-384Kdf
3,307,047 UART: [kat] LMS
3,838,848 UART: [kat] --
3,844,142 UART: [cold-reset] ++
3,846,626 UART: [fht] FHT @ 0x50003400
3,857,184 UART: [idev] ++
3,857,868 UART: [idev] CDI.KEYID = 6
3,858,839 UART: [idev] SUBJECT.KEYID = 7
3,860,059 UART: [idev] UDS.KEYID = 0
3,862,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,901 UART: [idev] Erasing UDS.KEYID = 0
6,337,044 UART: [idev] Sha1 KeyId Algorithm
6,359,158 UART: [idev] --
6,363,639 UART: [ldev] ++
6,364,324 UART: [ldev] CDI.KEYID = 6
6,365,206 UART: [ldev] SUBJECT.KEYID = 5
6,366,444 UART: [ldev] AUTHORITY.KEYID = 7
6,367,624 UART: [ldev] FE.KEYID = 1
6,379,177 UART: [ldev] Erasing FE.KEYID = 1
8,857,414 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,597 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,126 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,285 UART: [ldev] --
10,649,363 UART: [fwproc] Wait for Commands...
10,650,867 UART: [fwproc] Recv command 0x46574c44
10,653,191 UART: [fwproc] Recv'd Img size: 118548 bytes
12,740,003 UART: ROM Fatal Error: 0x000B003F
12,743,677 >>> mbox cmd response: failed
12,744,006 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,331 >>> mbox cmd response: failed
12,744,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,971 >>> mbox cmd response: failed
Initializing fuses
2,070,595 writing to cptra_bootfsm_go
2,259,933 UART:
2,260,280 UART: Running Caliptra ROM ...
2,261,419 UART:
7,707,806 UART: [state] CFI Enabled
7,723,038 UART: [state] LifecycleState = Unprovisioned
7,725,434 UART: [state] DebugLocked = No
7,727,022 UART: [state] WD Timer not started. Device not locked for debugging
7,731,498 UART: [kat] SHA2-256
7,921,361 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,932,160 UART: [kat] ++
7,932,732 UART: [kat] sha1
7,944,716 UART: [kat] SHA2-256
7,947,754 UART: [kat] SHA2-384
7,954,450 UART: [kat] SHA2-512-ACC
7,957,042 UART: [kat] ECC-384
10,398,908 UART: [kat] HMAC-384Kdf
10,412,591 UART: [kat] LMS
10,944,373 UART: [kat] --
10,949,721 UART: [cold-reset] ++
10,951,816 UART: [fht] FHT @ 0x50003400
10,963,068 UART: [idev] ++
10,963,804 UART: [idev] CDI.KEYID = 6
10,964,715 UART: [idev] SUBJECT.KEYID = 7
10,965,931 UART: [idev] UDS.KEYID = 0
10,968,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,117,385 UART: [idev] Erasing UDS.KEYID = 0
13,448,454 UART: [idev] Sha1 KeyId Algorithm
13,471,221 UART: [idev] --
13,474,999 UART: [ldev] ++
13,475,725 UART: [ldev] CDI.KEYID = 6
13,476,618 UART: [ldev] SUBJECT.KEYID = 5
13,477,732 UART: [ldev] AUTHORITY.KEYID = 7
13,478,973 UART: [ldev] FE.KEYID = 1
13,489,380 UART: [ldev] Erasing FE.KEYID = 1
15,964,034 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,681,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,696,525 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,711,700 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,726,851 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,748,179 UART: [ldev] --
17,753,830 UART: [fwproc] Wait for Commands...
17,757,017 UART: [fwproc] Recv command 0x46574c44
17,759,316 UART: [fwproc] Recv'd Img size: 118548 bytes
21,258,029 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,331,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,454,785 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,015,528 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,753,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,526,948 >>> mbox cmd response: failed
12,527,508 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,527,862 >>> mbox cmd response: failed
12,528,142 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,445 >>> mbox cmd response: failed
Initializing fuses
2,061,476 writing to cptra_bootfsm_go
11,095,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,381,966 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,418 UART: [state] LifecycleState = Unprovisioned
86,073 UART: [state] DebugLocked = No
86,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,317 UART: [kat] SHA2-256
882,248 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,363 UART: [kat] ++
886,515 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,416 UART: [kat] SHA2-512-ACC
897,317 UART: [kat] ECC-384
903,018 UART: [kat] HMAC-384Kdf
907,480 UART: [kat] LMS
1,475,676 UART: [kat] --
1,476,355 UART: [cold-reset] ++
1,476,865 UART: [fht] Storing FHT @ 0x50003400
1,479,516 UART: [idev] ++
1,479,684 UART: [idev] CDI.KEYID = 6
1,480,044 UART: [idev] SUBJECT.KEYID = 7
1,480,468 UART: [idev] UDS.KEYID = 0
1,480,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,388 UART: [idev] Erasing UDS.KEYID = 0
1,504,700 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,568 UART: [idev] --
1,514,723 UART: [ldev] ++
1,514,891 UART: [ldev] CDI.KEYID = 6
1,515,254 UART: [ldev] SUBJECT.KEYID = 5
1,515,680 UART: [ldev] AUTHORITY.KEYID = 7
1,516,143 UART: [ldev] FE.KEYID = 1
1,521,027 UART: [ldev] Erasing FE.KEYID = 1
1,546,582 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,643 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,359 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,962 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,084 UART: [ldev] --
1,586,595 UART: [fwproc] Waiting for Commands...
1,587,240 UART: [fwproc] Received command 0x46574c44
1,588,031 UART: [fwproc] Received Image of size 118548 bytes
1,635,665 UART: ROM Fatal Error: 0x000B003F
1,636,824 >>> mbox cmd response: failed
1,636,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,830 >>> mbox cmd response: failed
1,636,830 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,230 UART: [state] LifecycleState = Unprovisioned
85,885 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,175 UART: [kat] SHA2-256
882,106 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,221 UART: [kat] ++
886,373 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,610 UART: [kat] HMAC-384Kdf
907,274 UART: [kat] LMS
1,475,470 UART: [kat] --
1,476,267 UART: [cold-reset] ++
1,476,695 UART: [fht] Storing FHT @ 0x50003400
1,479,356 UART: [idev] ++
1,479,524 UART: [idev] CDI.KEYID = 6
1,479,884 UART: [idev] SUBJECT.KEYID = 7
1,480,308 UART: [idev] UDS.KEYID = 0
1,480,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,410 UART: [idev] Erasing UDS.KEYID = 0
1,505,264 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,054 UART: [idev] --
1,514,891 UART: [ldev] ++
1,515,059 UART: [ldev] CDI.KEYID = 6
1,515,422 UART: [ldev] SUBJECT.KEYID = 5
1,515,848 UART: [ldev] AUTHORITY.KEYID = 7
1,516,311 UART: [ldev] FE.KEYID = 1
1,521,373 UART: [ldev] Erasing FE.KEYID = 1
1,547,628 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,567 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,283 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,956 UART: [ldev] --
1,587,443 UART: [fwproc] Waiting for Commands...
1,588,120 UART: [fwproc] Received command 0x46574c44
1,588,911 UART: [fwproc] Received Image of size 118548 bytes
2,934,082 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,080 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,298 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,531 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,895 >>> mbox cmd response: failed
1,487,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,901 >>> mbox cmd response: failed
1,487,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,891 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,097 UART: [state] LifecycleState = Unprovisioned
85,752 UART: [state] DebugLocked = No
86,384 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,070 UART: [kat] SHA2-256
882,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,116 UART: [kat] ++
886,268 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,233 UART: [kat] SHA2-512-ACC
897,134 UART: [kat] ECC-384
902,757 UART: [kat] HMAC-384Kdf
907,253 UART: [kat] LMS
1,475,449 UART: [kat] --
1,476,484 UART: [cold-reset] ++
1,476,972 UART: [fht] Storing FHT @ 0x50003400
1,479,785 UART: [idev] ++
1,479,953 UART: [idev] CDI.KEYID = 6
1,480,313 UART: [idev] SUBJECT.KEYID = 7
1,480,737 UART: [idev] UDS.KEYID = 0
1,481,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,615 UART: [idev] Erasing UDS.KEYID = 0
1,504,735 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,559 UART: [idev] --
1,514,454 UART: [ldev] ++
1,514,622 UART: [ldev] CDI.KEYID = 6
1,514,985 UART: [ldev] SUBJECT.KEYID = 5
1,515,411 UART: [ldev] AUTHORITY.KEYID = 7
1,515,874 UART: [ldev] FE.KEYID = 1
1,521,040 UART: [ldev] Erasing FE.KEYID = 1
1,546,357 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,305 UART: [ldev] --
1,585,782 UART: [fwproc] Waiting for Commands...
1,586,415 UART: [fwproc] Received command 0x46574c44
1,587,206 UART: [fwproc] Received Image of size 118548 bytes
1,634,386 UART: ROM Fatal Error: 0x000B003F
1,635,545 >>> mbox cmd response: failed
1,635,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,551 >>> mbox cmd response: failed
1,635,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,121 UART: [state] LifecycleState = Unprovisioned
85,776 UART: [state] DebugLocked = No
86,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,518 UART: [kat] SHA2-256
892,456 UART: [kat] SHA2-384
895,095 UART: [kat] SHA2-512-ACC
896,996 UART: [kat] ECC-384
902,561 UART: [kat] HMAC-384Kdf
907,005 UART: [kat] LMS
1,475,201 UART: [kat] --
1,476,378 UART: [cold-reset] ++
1,476,764 UART: [fht] Storing FHT @ 0x50003400
1,479,409 UART: [idev] ++
1,479,577 UART: [idev] CDI.KEYID = 6
1,479,937 UART: [idev] SUBJECT.KEYID = 7
1,480,361 UART: [idev] UDS.KEYID = 0
1,480,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,551 UART: [idev] Erasing UDS.KEYID = 0
1,505,829 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,365 UART: [idev] --
1,515,444 UART: [ldev] ++
1,515,612 UART: [ldev] CDI.KEYID = 6
1,515,975 UART: [ldev] SUBJECT.KEYID = 5
1,516,401 UART: [ldev] AUTHORITY.KEYID = 7
1,516,864 UART: [ldev] FE.KEYID = 1
1,522,288 UART: [ldev] Erasing FE.KEYID = 1
1,547,605 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,693 UART: [ldev] --
1,587,182 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 118548 bytes
2,932,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,303 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,521 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,738 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,960 >>> mbox cmd response: failed
1,487,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,966 >>> mbox cmd response: failed
1,487,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,972 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,640 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,364 UART: [kat] SHA2-256
890,914 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,018 UART: [kat] ++
895,170 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,105 UART: [kat] SHA2-512-ACC
906,006 UART: [kat] ECC-384
915,763 UART: [kat] HMAC-384Kdf
920,293 UART: [kat] LMS
1,168,605 UART: [kat] --
1,169,318 UART: [cold-reset] ++
1,169,680 UART: [fht] FHT @ 0x50003400
1,172,304 UART: [idev] ++
1,172,472 UART: [idev] CDI.KEYID = 6
1,172,833 UART: [idev] SUBJECT.KEYID = 7
1,173,258 UART: [idev] UDS.KEYID = 0
1,173,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,099 UART: [idev] --
1,208,184 UART: [ldev] ++
1,208,352 UART: [ldev] CDI.KEYID = 6
1,208,716 UART: [ldev] SUBJECT.KEYID = 5
1,209,143 UART: [ldev] AUTHORITY.KEYID = 7
1,209,606 UART: [ldev] FE.KEYID = 1
1,214,670 UART: [ldev] Erasing FE.KEYID = 1
1,240,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,392 UART: [ldev] --
1,279,649 UART: [fwproc] Wait for Commands...
1,280,318 UART: [fwproc] Recv command 0x46574c44
1,281,051 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,055 UART: ROM Fatal Error: 0x000B003F
1,329,214 >>> mbox cmd response: failed
1,329,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,220 >>> mbox cmd response: failed
1,329,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,226 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,940 UART: [kat] ++
895,092 UART: [kat] sha1
899,298 UART: [kat] SHA2-256
901,238 UART: [kat] SHA2-384
903,915 UART: [kat] SHA2-512-ACC
905,816 UART: [kat] ECC-384
915,491 UART: [kat] HMAC-384Kdf
920,183 UART: [kat] LMS
1,168,495 UART: [kat] --
1,169,258 UART: [cold-reset] ++
1,169,772 UART: [fht] FHT @ 0x50003400
1,172,500 UART: [idev] ++
1,172,668 UART: [idev] CDI.KEYID = 6
1,173,029 UART: [idev] SUBJECT.KEYID = 7
1,173,454 UART: [idev] UDS.KEYID = 0
1,173,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,521 UART: [idev] Erasing UDS.KEYID = 0
1,198,207 UART: [idev] Sha1 KeyId Algorithm
1,206,977 UART: [idev] --
1,208,024 UART: [ldev] ++
1,208,192 UART: [ldev] CDI.KEYID = 6
1,208,556 UART: [ldev] SUBJECT.KEYID = 5
1,208,983 UART: [ldev] AUTHORITY.KEYID = 7
1,209,446 UART: [ldev] FE.KEYID = 1
1,214,614 UART: [ldev] Erasing FE.KEYID = 1
1,240,677 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,716 UART: [ldev] --
1,280,119 UART: [fwproc] Wait for Commands...
1,280,904 UART: [fwproc] Recv command 0x46574c44
1,281,637 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,040 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,907 >>> mbox cmd response: failed
1,184,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,913 >>> mbox cmd response: failed
1,184,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,101 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,667 UART: [state] LifecycleState = Unprovisioned
86,322 UART: [state] DebugLocked = No
87,040 UART: [state] WD Timer not started. Device not locked for debugging
88,371 UART: [kat] SHA2-256
891,921 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,025 UART: [kat] ++
896,177 UART: [kat] sha1
900,373 UART: [kat] SHA2-256
902,313 UART: [kat] SHA2-384
905,086 UART: [kat] SHA2-512-ACC
906,987 UART: [kat] ECC-384
916,820 UART: [kat] HMAC-384Kdf
921,564 UART: [kat] LMS
1,169,876 UART: [kat] --
1,170,763 UART: [cold-reset] ++
1,171,207 UART: [fht] FHT @ 0x50003400
1,173,815 UART: [idev] ++
1,173,983 UART: [idev] CDI.KEYID = 6
1,174,344 UART: [idev] SUBJECT.KEYID = 7
1,174,769 UART: [idev] UDS.KEYID = 0
1,175,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,762 UART: [idev] Erasing UDS.KEYID = 0
1,200,700 UART: [idev] Sha1 KeyId Algorithm
1,209,502 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,973 UART: [ldev] SUBJECT.KEYID = 5
1,211,400 UART: [ldev] AUTHORITY.KEYID = 7
1,211,863 UART: [ldev] FE.KEYID = 1
1,216,913 UART: [ldev] Erasing FE.KEYID = 1
1,243,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,343 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,055 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,125 UART: [fwproc] Recv command 0x46574c44
1,283,858 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,114 UART: ROM Fatal Error: 0x000B003F
1,332,273 >>> mbox cmd response: failed
1,332,273 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,279 >>> mbox cmd response: failed
1,332,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,133 UART: [state] LifecycleState = Unprovisioned
85,788 UART: [state] DebugLocked = No
86,458 UART: [state] WD Timer not started. Device not locked for debugging
87,613 UART: [kat] SHA2-256
891,163 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,267 UART: [kat] ++
895,419 UART: [kat] sha1
899,639 UART: [kat] SHA2-256
901,579 UART: [kat] SHA2-384
904,206 UART: [kat] SHA2-512-ACC
906,107 UART: [kat] ECC-384
916,138 UART: [kat] HMAC-384Kdf
920,748 UART: [kat] LMS
1,169,060 UART: [kat] --
1,169,767 UART: [cold-reset] ++
1,170,325 UART: [fht] FHT @ 0x50003400
1,173,013 UART: [idev] ++
1,173,181 UART: [idev] CDI.KEYID = 6
1,173,542 UART: [idev] SUBJECT.KEYID = 7
1,173,967 UART: [idev] UDS.KEYID = 0
1,174,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,308 UART: [idev] Erasing UDS.KEYID = 0
1,199,458 UART: [idev] Sha1 KeyId Algorithm
1,208,392 UART: [idev] --
1,209,453 UART: [ldev] ++
1,209,621 UART: [ldev] CDI.KEYID = 6
1,209,985 UART: [ldev] SUBJECT.KEYID = 5
1,210,412 UART: [ldev] AUTHORITY.KEYID = 7
1,210,875 UART: [ldev] FE.KEYID = 1
1,216,265 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,221 UART: [ldev] --
1,282,442 UART: [fwproc] Wait for Commands...
1,283,239 UART: [fwproc] Recv command 0x46574c44
1,283,972 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,258 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,453 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,628 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,785 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,898 >>> mbox cmd response: failed
1,186,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,904 >>> mbox cmd response: failed
1,186,904 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,910 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,682,020 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,974 UART: [state] LifecycleState = Unprovisioned
85,629 UART: [state] DebugLocked = No
86,185 UART: [state] WD Timer not started. Device not locked for debugging
87,346 UART: [kat] SHA2-256
892,996 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,121 UART: [kat] ++
897,273 UART: [kat] sha1
901,537 UART: [kat] SHA2-256
903,477 UART: [kat] SHA2-384
906,236 UART: [kat] SHA2-512-ACC
908,137 UART: [kat] ECC-384
917,596 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,403 UART: [cold-reset] ++
1,171,833 UART: [fht] FHT @ 0x50003400
1,174,552 UART: [idev] ++
1,174,720 UART: [idev] CDI.KEYID = 6
1,175,080 UART: [idev] SUBJECT.KEYID = 7
1,175,504 UART: [idev] UDS.KEYID = 0
1,175,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,518 UART: [idev] Erasing UDS.KEYID = 0
1,200,089 UART: [idev] Sha1 KeyId Algorithm
1,208,401 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,332 UART: [ldev] AUTHORITY.KEYID = 7
1,210,795 UART: [ldev] FE.KEYID = 1
1,216,087 UART: [ldev] Erasing FE.KEYID = 1
1,241,936 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,251 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,858 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,570 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,763 UART: [ldev] --
1,281,138 UART: [fwproc] Wait for Commands...
1,281,808 UART: [fwproc] Recv command 0x46574c44
1,282,536 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,244 UART: ROM Fatal Error: 0x000B003F
1,331,403 >>> mbox cmd response: failed
1,331,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,409 >>> mbox cmd response: failed
1,331,409 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,415 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,407 UART: [state] WD Timer not started. Device not locked for debugging
87,566 UART: [kat] SHA2-256
893,216 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,341 UART: [kat] ++
897,493 UART: [kat] sha1
901,559 UART: [kat] SHA2-256
903,499 UART: [kat] SHA2-384
906,076 UART: [kat] SHA2-512-ACC
907,977 UART: [kat] ECC-384
917,898 UART: [kat] HMAC-384Kdf
922,594 UART: [kat] LMS
1,170,922 UART: [kat] --
1,171,761 UART: [cold-reset] ++
1,172,337 UART: [fht] FHT @ 0x50003400
1,174,958 UART: [idev] ++
1,175,126 UART: [idev] CDI.KEYID = 6
1,175,486 UART: [idev] SUBJECT.KEYID = 7
1,175,910 UART: [idev] UDS.KEYID = 0
1,176,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,200,035 UART: [idev] Sha1 KeyId Algorithm
1,208,549 UART: [idev] --
1,209,405 UART: [ldev] ++
1,209,573 UART: [ldev] CDI.KEYID = 6
1,209,936 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,340 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,042 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,105 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,854 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,581 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,751 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,924 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,410 >>> mbox cmd response: failed
1,186,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,416 >>> mbox cmd response: failed
1,186,416 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,422 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,853 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,743 UART: [state] LifecycleState = Unprovisioned
86,398 UART: [state] DebugLocked = No
87,004 UART: [state] WD Timer not started. Device not locked for debugging
88,113 UART: [kat] SHA2-256
893,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,888 UART: [kat] ++
898,040 UART: [kat] sha1
902,286 UART: [kat] SHA2-256
904,226 UART: [kat] SHA2-384
907,175 UART: [kat] SHA2-512-ACC
909,076 UART: [kat] ECC-384
919,195 UART: [kat] HMAC-384Kdf
923,783 UART: [kat] LMS
1,172,111 UART: [kat] --
1,172,866 UART: [cold-reset] ++
1,173,326 UART: [fht] FHT @ 0x50003400
1,175,873 UART: [idev] ++
1,176,041 UART: [idev] CDI.KEYID = 6
1,176,401 UART: [idev] SUBJECT.KEYID = 7
1,176,825 UART: [idev] UDS.KEYID = 0
1,177,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,849 UART: [idev] Erasing UDS.KEYID = 0
1,201,628 UART: [idev] Sha1 KeyId Algorithm
1,210,170 UART: [idev] --
1,211,174 UART: [ldev] ++
1,211,342 UART: [ldev] CDI.KEYID = 6
1,211,705 UART: [ldev] SUBJECT.KEYID = 5
1,212,131 UART: [ldev] AUTHORITY.KEYID = 7
1,212,594 UART: [ldev] FE.KEYID = 1
1,218,146 UART: [ldev] Erasing FE.KEYID = 1
1,244,471 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,914 UART: [ldev] --
1,283,379 UART: [fwproc] Wait for Commands...
1,284,185 UART: [fwproc] Recv command 0x46574c44
1,284,913 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,107 UART: ROM Fatal Error: 0x000B003F
1,332,266 >>> mbox cmd response: failed
1,332,266 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,272 >>> mbox cmd response: failed
1,332,272 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,278 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,155 UART: [state] LifecycleState = Unprovisioned
85,810 UART: [state] DebugLocked = No
86,370 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
893,145 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,270 UART: [kat] ++
897,422 UART: [kat] sha1
901,712 UART: [kat] SHA2-256
903,652 UART: [kat] SHA2-384
906,427 UART: [kat] SHA2-512-ACC
908,328 UART: [kat] ECC-384
918,081 UART: [kat] HMAC-384Kdf
922,763 UART: [kat] LMS
1,171,091 UART: [kat] --
1,171,842 UART: [cold-reset] ++
1,172,416 UART: [fht] FHT @ 0x50003400
1,175,125 UART: [idev] ++
1,175,293 UART: [idev] CDI.KEYID = 6
1,175,653 UART: [idev] SUBJECT.KEYID = 7
1,176,077 UART: [idev] UDS.KEYID = 0
1,176,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,687 UART: [idev] Erasing UDS.KEYID = 0
1,200,578 UART: [idev] Sha1 KeyId Algorithm
1,209,050 UART: [idev] --
1,210,106 UART: [ldev] ++
1,210,274 UART: [ldev] CDI.KEYID = 6
1,210,637 UART: [ldev] SUBJECT.KEYID = 5
1,211,063 UART: [ldev] AUTHORITY.KEYID = 7
1,211,526 UART: [ldev] FE.KEYID = 1
1,216,616 UART: [ldev] Erasing FE.KEYID = 1
1,242,669 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,576 UART: [ldev] --
1,281,905 UART: [fwproc] Wait for Commands...
1,282,635 UART: [fwproc] Recv command 0x46574c44
1,283,363 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,643 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,342 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,512 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,883 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,445 >>> mbox cmd response: failed
1,186,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,451 >>> mbox cmd response: failed
1,186,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,457 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,556 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_load_address_image_size_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,342 writing to cptra_bootfsm_go
192,456 UART:
193,632 UART: Running Caliptra ROM ...
194,807 UART:
195,005 UART: [state] CFI Enabled
263,655 UART: [state] LifecycleState = Unprovisioned
265,555 UART: [state] DebugLocked = No
268,125 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,803 UART: [kat] SHA2-256
443,513 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,032 UART: [kat] ++
454,487 UART: [kat] sha1
465,848 UART: [kat] SHA2-256
468,540 UART: [kat] SHA2-384
473,387 UART: [kat] SHA2-512-ACC
475,736 UART: [kat] ECC-384
2,767,655 UART: [kat] HMAC-384Kdf
2,800,411 UART: [kat] LMS
3,990,716 UART: [kat] --
3,996,086 UART: [cold-reset] ++
3,998,634 UART: [fht] Storing FHT @ 0x50003400
4,010,715 UART: [idev] ++
4,011,286 UART: [idev] CDI.KEYID = 6
4,012,307 UART: [idev] SUBJECT.KEYID = 7
4,013,477 UART: [idev] UDS.KEYID = 0
4,016,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,165,836 UART: [idev] Erasing UDS.KEYID = 0
7,347,895 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,442 UART: [idev] --
7,373,059 UART: [ldev] ++
7,373,644 UART: [ldev] CDI.KEYID = 6
7,374,612 UART: [ldev] SUBJECT.KEYID = 5
7,375,832 UART: [ldev] AUTHORITY.KEYID = 7
7,377,064 UART: [ldev] FE.KEYID = 1
7,416,663 UART: [ldev] Erasing FE.KEYID = 1
10,751,010 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,062,132 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,076,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,091,592 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,106,101 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,210 UART: [ldev] --
13,129,290 UART: [fwproc] Waiting for Commands...
13,131,340 UART: [fwproc] Received command 0x46574c44
13,133,528 UART: [fwproc] Received Image of size 118548 bytes
15,836,700 UART: ROM Fatal Error: 0x000B003C
15,840,163 >>> mbox cmd response: failed
15,840,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,840,945 >>> mbox cmd response: failed
15,841,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,841,508 >>> mbox cmd response: failed
Initializing fuses
2,063,449 writing to cptra_bootfsm_go
2,252,750 UART:
2,253,085 UART: Running Caliptra ROM ...
2,254,184 UART:
2,254,339 UART: [state] CFI Enabled
2,312,752 UART: [state] LifecycleState = Unprovisioned
2,314,689 UART: [state] DebugLocked = No
2,316,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,415 UART: [kat] SHA2-256
2,491,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,629 UART: [kat] ++
2,502,180 UART: [kat] sha1
2,512,435 UART: [kat] SHA2-256
2,515,147 UART: [kat] SHA2-384
2,521,150 UART: [kat] SHA2-512-ACC
2,523,510 UART: [kat] ECC-384
4,816,912 UART: [kat] HMAC-384Kdf
4,848,637 UART: [kat] LMS
6,038,909 UART: [kat] --
6,045,726 UART: [cold-reset] ++
6,047,020 UART: [fht] Storing FHT @ 0x50003400
6,058,888 UART: [idev] ++
6,059,457 UART: [idev] CDI.KEYID = 6
6,060,479 UART: [idev] SUBJECT.KEYID = 7
6,061,642 UART: [idev] UDS.KEYID = 0
6,064,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,213,197 UART: [idev] Erasing UDS.KEYID = 0
9,394,928 UART: [idev] Using Sha1 for KeyId Algorithm
9,416,267 UART: [idev] --
9,420,390 UART: [ldev] ++
9,420,972 UART: [ldev] CDI.KEYID = 6
9,421,951 UART: [ldev] SUBJECT.KEYID = 5
9,423,150 UART: [ldev] AUTHORITY.KEYID = 7
9,424,392 UART: [ldev] FE.KEYID = 1
9,469,225 UART: [ldev] Erasing FE.KEYID = 1
12,803,210 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,098,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,113,259 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,128,113 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,142,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,161,642 UART: [ldev] --
15,167,083 UART: [fwproc] Waiting for Commands...
15,169,465 UART: [fwproc] Received command 0x46574c44
15,171,656 UART: [fwproc] Received Image of size 118548 bytes
19,262,094 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,329,175 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,402,365 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,731,611 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,805,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,542,130 >>> mbox cmd response: failed
15,542,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,084 >>> mbox cmd response: failed
15,543,363 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,543,662 >>> mbox cmd response: failed
Initializing fuses
2,059,222 writing to cptra_bootfsm_go
5,841,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,990,882 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
192,689 UART:
193,039 UART: Running Caliptra ROM ...
194,251 UART:
603,968 UART: [state] CFI Enabled
617,363 UART: [state] LifecycleState = Unprovisioned
619,262 UART: [state] DebugLocked = No
621,267 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,918 UART: [kat] SHA2-256
795,632 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,217 UART: [kat] ++
806,670 UART: [kat] sha1
816,417 UART: [kat] SHA2-256
819,156 UART: [kat] SHA2-384
824,653 UART: [kat] SHA2-512-ACC
827,057 UART: [kat] ECC-384
3,113,345 UART: [kat] HMAC-384Kdf
3,123,537 UART: [kat] LMS
4,313,626 UART: [kat] --
4,317,663 UART: [cold-reset] ++
4,319,770 UART: [fht] Storing FHT @ 0x50003400
4,330,611 UART: [idev] ++
4,331,195 UART: [idev] CDI.KEYID = 6
4,332,219 UART: [idev] SUBJECT.KEYID = 7
4,333,389 UART: [idev] UDS.KEYID = 0
4,336,246 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,318 UART: [idev] Erasing UDS.KEYID = 0
7,622,453 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,566 UART: [idev] --
7,647,110 UART: [ldev] ++
7,647,692 UART: [ldev] CDI.KEYID = 6
7,648,636 UART: [ldev] SUBJECT.KEYID = 5
7,649,854 UART: [ldev] AUTHORITY.KEYID = 7
7,651,093 UART: [ldev] FE.KEYID = 1
7,663,939 UART: [ldev] Erasing FE.KEYID = 1
10,951,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,154 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,082 UART: [ldev] --
13,312,302 UART: [fwproc] Waiting for Commands...
13,315,234 UART: [fwproc] Received command 0x46574c44
13,317,430 UART: [fwproc] Received Image of size 118548 bytes
16,021,891 UART: ROM Fatal Error: 0x000B003C
16,025,363 >>> mbox cmd response: failed
16,025,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,142 >>> mbox cmd response: failed
16,026,413 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,026,715 >>> mbox cmd response: failed
Initializing fuses
2,056,832 writing to cptra_bootfsm_go
2,246,085 UART:
2,246,429 UART: Running Caliptra ROM ...
2,247,485 UART:
4,431,718 UART: [state] CFI Enabled
4,446,660 UART: [state] LifecycleState = Unprovisioned
4,448,585 UART: [state] DebugLocked = No
4,451,356 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,457,016 UART: [kat] SHA2-256
4,626,772 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,637,330 UART: [kat] ++
4,637,884 UART: [kat] sha1
4,648,892 UART: [kat] SHA2-256
4,651,586 UART: [kat] SHA2-384
4,658,447 UART: [kat] SHA2-512-ACC
4,660,801 UART: [kat] ECC-384
6,944,157 UART: [kat] HMAC-384Kdf
6,956,330 UART: [kat] LMS
8,146,472 UART: [kat] --
8,150,533 UART: [cold-reset] ++
8,152,521 UART: [fht] Storing FHT @ 0x50003400
8,163,759 UART: [idev] ++
8,164,342 UART: [idev] CDI.KEYID = 6
8,165,315 UART: [idev] SUBJECT.KEYID = 7
8,166,539 UART: [idev] UDS.KEYID = 0
8,168,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,317,878 UART: [idev] Erasing UDS.KEYID = 0
11,456,795 UART: [idev] Using Sha1 for KeyId Algorithm
11,478,504 UART: [idev] --
11,482,185 UART: [ldev] ++
11,482,759 UART: [ldev] CDI.KEYID = 6
11,483,698 UART: [ldev] SUBJECT.KEYID = 5
11,484,971 UART: [ldev] AUTHORITY.KEYID = 7
11,486,136 UART: [ldev] FE.KEYID = 1
11,496,218 UART: [ldev] Erasing FE.KEYID = 1
14,785,347 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,079,912 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,094,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,109,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,123,837 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,142,874 UART: [ldev] --
17,147,348 UART: [fwproc] Waiting for Commands...
17,148,969 UART: [fwproc] Received command 0x46574c44
17,151,163 UART: [fwproc] Received Image of size 118548 bytes
21,253,915 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,325,031 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,398,226 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,726,920 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
4,124,116 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,762,894 >>> mbox cmd response: failed
15,763,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,763,884 >>> mbox cmd response: failed
15,764,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,403 >>> mbox cmd response: failed
Initializing fuses
2,060,893 writing to cptra_bootfsm_go
8,229,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,256,640 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,108 writing to cptra_bootfsm_go
192,347 UART:
192,713 UART: Running Caliptra ROM ...
193,858 UART:
194,008 UART: [state] CFI Enabled
264,359 UART: [state] LifecycleState = Unprovisioned
266,284 UART: [state] DebugLocked = No
269,242 UART: [state] WD Timer not started. Device not locked for debugging
273,538 UART: [kat] SHA2-256
453,232 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,994 UART: [kat] ++
464,558 UART: [kat] sha1
475,232 UART: [kat] SHA2-256
477,919 UART: [kat] SHA2-384
482,444 UART: [kat] SHA2-512-ACC
484,841 UART: [kat] ECC-384
2,947,678 UART: [kat] HMAC-384Kdf
2,971,057 UART: [kat] LMS
3,447,556 UART: [kat] --
3,451,873 UART: [cold-reset] ++
3,452,889 UART: [fht] FHT @ 0x50003400
3,464,029 UART: [idev] ++
3,464,608 UART: [idev] CDI.KEYID = 6
3,465,522 UART: [idev] SUBJECT.KEYID = 7
3,466,800 UART: [idev] UDS.KEYID = 0
3,469,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,197 UART: [idev] Erasing UDS.KEYID = 0
5,985,124 UART: [idev] Sha1 KeyId Algorithm
6,008,756 UART: [idev] --
6,014,379 UART: [ldev] ++
6,014,959 UART: [ldev] CDI.KEYID = 6
6,015,879 UART: [ldev] SUBJECT.KEYID = 5
6,017,102 UART: [ldev] AUTHORITY.KEYID = 7
6,018,351 UART: [ldev] FE.KEYID = 1
6,055,806 UART: [ldev] Erasing FE.KEYID = 1
8,563,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,032 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,884 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,791 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,338 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,720 UART: [ldev] --
10,369,346 UART: [fwproc] Wait for Commands...
10,372,333 UART: [fwproc] Recv command 0x46574c44
10,374,387 UART: [fwproc] Recv'd Img size: 118548 bytes
12,444,453 UART: ROM Fatal Error: 0x000B003C
12,447,696 >>> mbox cmd response: failed
12,448,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,448,466 >>> mbox cmd response: failed
12,448,838 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,449,096 >>> mbox cmd response: failed
Initializing fuses
2,059,814 writing to cptra_bootfsm_go
2,249,161 UART:
2,249,505 UART: Running Caliptra ROM ...
2,250,645 UART:
2,250,816 UART: [state] CFI Enabled
2,318,930 UART: [state] LifecycleState = Unprovisioned
2,320,850 UART: [state] DebugLocked = No
2,322,284 UART: [state] WD Timer not started. Device not locked for debugging
2,326,427 UART: [kat] SHA2-256
2,506,074 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,861 UART: [kat] ++
2,517,415 UART: [kat] sha1
2,529,128 UART: [kat] SHA2-256
2,531,828 UART: [kat] SHA2-384
2,537,822 UART: [kat] SHA2-512-ACC
2,540,229 UART: [kat] ECC-384
5,000,906 UART: [kat] HMAC-384Kdf
5,021,038 UART: [kat] LMS
5,497,526 UART: [kat] --
5,500,712 UART: [cold-reset] ++
5,501,621 UART: [fht] FHT @ 0x50003400
5,513,009 UART: [idev] ++
5,513,605 UART: [idev] CDI.KEYID = 6
5,514,530 UART: [idev] SUBJECT.KEYID = 7
5,515,757 UART: [idev] UDS.KEYID = 0
5,518,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,232 UART: [idev] Erasing UDS.KEYID = 0
8,035,569 UART: [idev] Sha1 KeyId Algorithm
8,058,860 UART: [idev] --
8,064,431 UART: [ldev] ++
8,065,017 UART: [ldev] CDI.KEYID = 6
8,065,990 UART: [ldev] SUBJECT.KEYID = 5
8,067,183 UART: [ldev] AUTHORITY.KEYID = 7
8,068,422 UART: [ldev] FE.KEYID = 1
8,106,844 UART: [ldev] Erasing FE.KEYID = 1
10,614,577 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,349,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,365,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,381,081 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,396,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,417,118 UART: [ldev] --
12,422,343 UART: [fwproc] Wait for Commands...
12,424,766 UART: [fwproc] Recv command 0x46574c44
12,426,820 UART: [fwproc] Recv'd Img size: 118548 bytes
15,908,722 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,978,505 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,051,532 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,380,233 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,463,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,315,331 >>> mbox cmd response: failed
12,315,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,277 >>> mbox cmd response: failed
12,316,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,316,848 >>> mbox cmd response: failed
Initializing fuses
2,075,450 writing to cptra_bootfsm_go
5,538,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,321,023 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,331 writing to cptra_bootfsm_go
192,576 UART:
192,937 UART: Running Caliptra ROM ...
194,154 UART:
603,673 UART: [state] CFI Enabled
614,434 UART: [state] LifecycleState = Unprovisioned
616,381 UART: [state] DebugLocked = No
618,976 UART: [state] WD Timer not started. Device not locked for debugging
622,466 UART: [kat] SHA2-256
802,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,865 UART: [kat] ++
813,463 UART: [kat] sha1
824,568 UART: [kat] SHA2-256
827,266 UART: [kat] SHA2-384
832,819 UART: [kat] SHA2-512-ACC
835,219 UART: [kat] ECC-384
3,278,225 UART: [kat] HMAC-384Kdf
3,291,046 UART: [kat] LMS
3,767,559 UART: [kat] --
3,772,502 UART: [cold-reset] ++
3,775,036 UART: [fht] FHT @ 0x50003400
3,786,613 UART: [idev] ++
3,787,190 UART: [idev] CDI.KEYID = 6
3,788,236 UART: [idev] SUBJECT.KEYID = 7
3,789,352 UART: [idev] UDS.KEYID = 0
3,792,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,243 UART: [idev] Erasing UDS.KEYID = 0
6,263,413 UART: [idev] Sha1 KeyId Algorithm
6,287,316 UART: [idev] --
6,292,232 UART: [ldev] ++
6,292,806 UART: [ldev] CDI.KEYID = 6
6,293,797 UART: [ldev] SUBJECT.KEYID = 5
6,294,931 UART: [ldev] AUTHORITY.KEYID = 7
6,296,224 UART: [ldev] FE.KEYID = 1
6,304,669 UART: [ldev] Erasing FE.KEYID = 1
8,780,265 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,516,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,532,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,371 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,056 UART: [ldev] --
10,575,088 UART: [fwproc] Wait for Commands...
10,577,897 UART: [fwproc] Recv command 0x46574c44
10,579,944 UART: [fwproc] Recv'd Img size: 118548 bytes
12,648,027 UART: ROM Fatal Error: 0x000B003C
12,651,267 >>> mbox cmd response: failed
12,651,614 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,651,960 >>> mbox cmd response: failed
12,652,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,652,567 >>> mbox cmd response: failed
Initializing fuses
2,059,612 writing to cptra_bootfsm_go
2,248,931 UART:
2,249,302 UART: Running Caliptra ROM ...
2,250,439 UART:
7,794,408 UART: [state] CFI Enabled
7,809,390 UART: [state] LifecycleState = Unprovisioned
7,811,333 UART: [state] DebugLocked = No
7,813,772 UART: [state] WD Timer not started. Device not locked for debugging
7,816,827 UART: [kat] SHA2-256
7,996,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,007,249 UART: [kat] ++
8,007,743 UART: [kat] sha1
8,019,398 UART: [kat] SHA2-256
8,022,056 UART: [kat] SHA2-384
8,027,568 UART: [kat] SHA2-512-ACC
8,029,920 UART: [kat] ECC-384
10,473,682 UART: [kat] HMAC-384Kdf
10,486,561 UART: [kat] LMS
10,963,107 UART: [kat] --
10,967,595 UART: [cold-reset] ++
10,968,565 UART: [fht] FHT @ 0x50003400
10,978,632 UART: [idev] ++
10,979,198 UART: [idev] CDI.KEYID = 6
10,980,218 UART: [idev] SUBJECT.KEYID = 7
10,981,432 UART: [idev] UDS.KEYID = 0
10,983,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,132,739 UART: [idev] Erasing UDS.KEYID = 0
13,459,169 UART: [idev] Sha1 KeyId Algorithm
13,483,803 UART: [idev] --
13,490,066 UART: [ldev] ++
13,490,834 UART: [ldev] CDI.KEYID = 6
13,491,728 UART: [ldev] SUBJECT.KEYID = 5
13,492,776 UART: [ldev] AUTHORITY.KEYID = 7
13,494,010 UART: [ldev] FE.KEYID = 1
13,504,169 UART: [ldev] Erasing FE.KEYID = 1
15,983,379 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,701,035 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,716,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,732,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,748,344 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,770,303 UART: [ldev] --
17,776,324 UART: [fwproc] Wait for Commands...
17,778,206 UART: [fwproc] Recv command 0x46574c44
17,780,256 UART: [fwproc] Recv'd Img size: 118548 bytes
21,259,907 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,345,246 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,418,270 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,746,773 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,785,700 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,549,590 >>> mbox cmd response: failed
12,550,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,550,530 >>> mbox cmd response: failed
12,550,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,551,091 >>> mbox cmd response: failed
Initializing fuses
2,059,852 writing to cptra_bootfsm_go
11,092,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,764,806 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,088 UART:
192,476 UART: Running Caliptra ROM ...
193,606 UART:
193,753 UART: [state] CFI Enabled
261,199 UART: [state] LifecycleState = Unprovisioned
263,657 UART: [state] DebugLocked = No
265,584 UART: [state] WD Timer not started. Device not locked for debugging
269,755 UART: [kat] SHA2-256
459,636 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,419 UART: [kat] ++
470,900 UART: [kat] sha1
482,597 UART: [kat] SHA2-256
485,619 UART: [kat] SHA2-384
492,470 UART: [kat] SHA2-512-ACC
495,095 UART: [kat] ECC-384
2,945,903 UART: [kat] HMAC-384Kdf
2,969,754 UART: [kat] LMS
3,501,485 UART: [kat] --
3,506,210 UART: [cold-reset] ++
3,508,424 UART: [fht] FHT @ 0x50003400
3,520,003 UART: [idev] ++
3,520,712 UART: [idev] CDI.KEYID = 6
3,521,626 UART: [idev] SUBJECT.KEYID = 7
3,522,844 UART: [idev] UDS.KEYID = 0
3,525,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,853 UART: [idev] Erasing UDS.KEYID = 0
6,029,462 UART: [idev] Sha1 KeyId Algorithm
6,050,898 UART: [idev] --
6,055,655 UART: [ldev] ++
6,056,364 UART: [ldev] CDI.KEYID = 6
6,057,283 UART: [ldev] SUBJECT.KEYID = 5
6,058,453 UART: [ldev] AUTHORITY.KEYID = 7
6,059,639 UART: [ldev] FE.KEYID = 1
6,099,030 UART: [ldev] Erasing FE.KEYID = 1
8,606,830 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,716 UART: [ldev] --
10,411,577 UART: [fwproc] Wait for Commands...
10,413,405 UART: [fwproc] Recv command 0x46574c44
10,415,721 UART: [fwproc] Recv'd Img size: 118548 bytes
12,495,703 UART: ROM Fatal Error: 0x000B003C
12,499,364 >>> mbox cmd response: failed
12,499,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,077 >>> mbox cmd response: failed
12,500,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,500,735 >>> mbox cmd response: failed
Initializing fuses
2,062,551 writing to cptra_bootfsm_go
2,251,921 UART:
2,252,273 UART: Running Caliptra ROM ...
2,253,414 UART:
2,253,583 UART: [state] CFI Enabled
2,309,089 UART: [state] LifecycleState = Unprovisioned
2,311,477 UART: [state] DebugLocked = No
2,313,261 UART: [state] WD Timer not started. Device not locked for debugging
2,317,232 UART: [kat] SHA2-256
2,507,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,517,884 UART: [kat] ++
2,518,351 UART: [kat] sha1
2,529,676 UART: [kat] SHA2-256
2,532,655 UART: [kat] SHA2-384
2,539,090 UART: [kat] SHA2-512-ACC
2,541,674 UART: [kat] ECC-384
4,994,814 UART: [kat] HMAC-384Kdf
5,018,576 UART: [kat] LMS
5,550,365 UART: [kat] --
5,554,031 UART: [cold-reset] ++
5,555,593 UART: [fht] FHT @ 0x50003400
5,566,534 UART: [idev] ++
5,567,222 UART: [idev] CDI.KEYID = 6
5,568,163 UART: [idev] SUBJECT.KEYID = 7
5,569,382 UART: [idev] UDS.KEYID = 0
5,572,056 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,721,341 UART: [idev] Erasing UDS.KEYID = 0
8,075,375 UART: [idev] Sha1 KeyId Algorithm
8,097,315 UART: [idev] --
8,101,799 UART: [ldev] ++
8,102,488 UART: [ldev] CDI.KEYID = 6
8,103,914 UART: [ldev] SUBJECT.KEYID = 5
8,105,062 UART: [ldev] AUTHORITY.KEYID = 7
8,106,194 UART: [ldev] FE.KEYID = 1
8,145,497 UART: [ldev] Erasing FE.KEYID = 1
10,654,629 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,388,134 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,403,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,418,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,433,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,287 UART: [ldev] --
12,461,041 UART: [fwproc] Wait for Commands...
12,463,254 UART: [fwproc] Recv command 0x46574c44
12,465,567 UART: [fwproc] Recv'd Img size: 118548 bytes
15,968,002 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,044,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,167,927 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,727,520 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,439,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,295,493 >>> mbox cmd response: failed
12,296,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,391 >>> mbox cmd response: failed
12,296,665 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,296,961 >>> mbox cmd response: failed
Initializing fuses
2,062,675 writing to cptra_bootfsm_go
5,495,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,878,422 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
192,526 UART:
192,917 UART: Running Caliptra ROM ...
194,077 UART:
603,714 UART: [state] CFI Enabled
620,823 UART: [state] LifecycleState = Unprovisioned
623,210 UART: [state] DebugLocked = No
625,916 UART: [state] WD Timer not started. Device not locked for debugging
630,133 UART: [kat] SHA2-256
820,001 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,817 UART: [kat] ++
831,325 UART: [kat] sha1
843,876 UART: [kat] SHA2-256
846,892 UART: [kat] SHA2-384
852,882 UART: [kat] SHA2-512-ACC
855,449 UART: [kat] ECC-384
3,295,363 UART: [kat] HMAC-384Kdf
3,308,367 UART: [kat] LMS
3,840,162 UART: [kat] --
3,842,263 UART: [cold-reset] ++
3,844,932 UART: [fht] FHT @ 0x50003400
3,857,864 UART: [idev] ++
3,858,546 UART: [idev] CDI.KEYID = 6
3,859,514 UART: [idev] SUBJECT.KEYID = 7
3,860,733 UART: [idev] UDS.KEYID = 0
3,863,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,898 UART: [idev] Erasing UDS.KEYID = 0
6,339,057 UART: [idev] Sha1 KeyId Algorithm
6,360,951 UART: [idev] --
6,365,568 UART: [ldev] ++
6,366,262 UART: [ldev] CDI.KEYID = 6
6,367,182 UART: [ldev] SUBJECT.KEYID = 5
6,368,351 UART: [ldev] AUTHORITY.KEYID = 7
6,369,586 UART: [ldev] FE.KEYID = 1
6,378,134 UART: [ldev] Erasing FE.KEYID = 1
8,860,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,989 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,195 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,148 UART: [ldev] --
10,651,151 UART: [fwproc] Wait for Commands...
10,653,254 UART: [fwproc] Recv command 0x46574c44
10,655,573 UART: [fwproc] Recv'd Img size: 118548 bytes
12,743,008 UART: ROM Fatal Error: 0x000B003C
12,746,683 >>> mbox cmd response: failed
12,747,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,747,450 >>> mbox cmd response: failed
12,747,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,748,019 >>> mbox cmd response: failed
Initializing fuses
2,062,169 writing to cptra_bootfsm_go
2,251,510 UART:
2,251,877 UART: Running Caliptra ROM ...
2,252,925 UART:
7,710,885 UART: [state] CFI Enabled
7,727,234 UART: [state] LifecycleState = Unprovisioned
7,729,598 UART: [state] DebugLocked = No
7,732,456 UART: [state] WD Timer not started. Device not locked for debugging
7,736,170 UART: [kat] SHA2-256
7,925,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,936,592 UART: [kat] ++
7,937,202 UART: [kat] sha1
7,947,669 UART: [kat] SHA2-256
7,950,688 UART: [kat] SHA2-384
7,958,143 UART: [kat] SHA2-512-ACC
7,960,749 UART: [kat] ECC-384
10,399,490 UART: [kat] HMAC-384Kdf
10,413,395 UART: [kat] LMS
10,945,260 UART: [kat] --
10,948,562 UART: [cold-reset] ++
10,950,451 UART: [fht] FHT @ 0x50003400
10,961,008 UART: [idev] ++
10,961,783 UART: [idev] CDI.KEYID = 6
10,962,709 UART: [idev] SUBJECT.KEYID = 7
10,963,820 UART: [idev] UDS.KEYID = 0
10,966,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,115,283 UART: [idev] Erasing UDS.KEYID = 0
13,436,523 UART: [idev] Sha1 KeyId Algorithm
13,459,812 UART: [idev] --
13,465,025 UART: [ldev] ++
13,465,717 UART: [ldev] CDI.KEYID = 6
13,466,620 UART: [ldev] SUBJECT.KEYID = 5
13,467,787 UART: [ldev] AUTHORITY.KEYID = 7
13,469,022 UART: [ldev] FE.KEYID = 1
13,480,077 UART: [ldev] Erasing FE.KEYID = 1
15,959,689 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,680,050 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,695,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,710,468 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,725,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,747,799 UART: [ldev] --
17,753,241 UART: [fwproc] Wait for Commands...
17,755,884 UART: [fwproc] Recv command 0x46574c44
17,758,155 UART: [fwproc] Recv'd Img size: 118548 bytes
21,255,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,333,772 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,457,407 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,018,184 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
3,754,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,513,256 >>> mbox cmd response: failed
12,513,848 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,205 >>> mbox cmd response: failed
12,514,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,514,807 >>> mbox cmd response: failed
Initializing fuses
2,061,807 writing to cptra_bootfsm_go
11,097,906 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,373,932 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,011 UART: [kat] SHA2-256
881,942 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,057 UART: [kat] ++
886,209 UART: [kat] sha1
890,309 UART: [kat] SHA2-256
892,247 UART: [kat] SHA2-384
895,008 UART: [kat] SHA2-512-ACC
896,909 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,476,305 UART: [cold-reset] ++
1,476,793 UART: [fht] Storing FHT @ 0x50003400
1,479,550 UART: [idev] ++
1,479,718 UART: [idev] CDI.KEYID = 6
1,480,078 UART: [idev] SUBJECT.KEYID = 7
1,480,502 UART: [idev] UDS.KEYID = 0
1,480,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,630 UART: [idev] Erasing UDS.KEYID = 0
1,505,144 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,427 UART: [ldev] ++
1,514,595 UART: [ldev] CDI.KEYID = 6
1,514,958 UART: [ldev] SUBJECT.KEYID = 5
1,515,384 UART: [ldev] AUTHORITY.KEYID = 7
1,515,847 UART: [ldev] FE.KEYID = 1
1,521,109 UART: [ldev] Erasing FE.KEYID = 1
1,545,994 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,713 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,232 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,340 UART: [fwproc] Received command 0x46574c44
1,587,131 UART: [fwproc] Received Image of size 118548 bytes
1,634,189 UART: ROM Fatal Error: 0x000B003C
1,635,348 >>> mbox cmd response: failed
1,635,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,354 >>> mbox cmd response: failed
1,635,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,360 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,902 UART: [state] LifecycleState = Unprovisioned
85,557 UART: [state] DebugLocked = No
86,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,691 UART: [kat] SHA2-256
881,622 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,737 UART: [kat] ++
885,889 UART: [kat] sha1
890,303 UART: [kat] SHA2-256
892,241 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,400 UART: [kat] HMAC-384Kdf
907,008 UART: [kat] LMS
1,475,204 UART: [kat] --
1,476,371 UART: [cold-reset] ++
1,476,761 UART: [fht] Storing FHT @ 0x50003400
1,479,388 UART: [idev] ++
1,479,556 UART: [idev] CDI.KEYID = 6
1,479,916 UART: [idev] SUBJECT.KEYID = 7
1,480,340 UART: [idev] UDS.KEYID = 0
1,480,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,176 UART: [idev] Erasing UDS.KEYID = 0
1,505,050 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,746 UART: [idev] --
1,514,743 UART: [ldev] ++
1,514,911 UART: [ldev] CDI.KEYID = 6
1,515,274 UART: [ldev] SUBJECT.KEYID = 5
1,515,700 UART: [ldev] AUTHORITY.KEYID = 7
1,516,163 UART: [ldev] FE.KEYID = 1
1,521,163 UART: [ldev] Erasing FE.KEYID = 1
1,546,172 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,361 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,744 UART: [ldev] --
1,585,193 UART: [fwproc] Waiting for Commands...
1,585,974 UART: [fwproc] Received command 0x46574c44
1,586,765 UART: [fwproc] Received Image of size 118548 bytes
2,930,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,930 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,427 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,331 >>> mbox cmd response: failed
1,488,331 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,337 >>> mbox cmd response: failed
1,488,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,343 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,605 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,457 UART: [state] LifecycleState = Unprovisioned
86,112 UART: [state] DebugLocked = No
86,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,526 UART: [kat] SHA2-256
882,457 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,572 UART: [kat] ++
886,724 UART: [kat] sha1
891,196 UART: [kat] SHA2-256
893,134 UART: [kat] SHA2-384
896,009 UART: [kat] SHA2-512-ACC
897,910 UART: [kat] ECC-384
903,651 UART: [kat] HMAC-384Kdf
908,055 UART: [kat] LMS
1,476,251 UART: [kat] --
1,476,978 UART: [cold-reset] ++
1,477,498 UART: [fht] Storing FHT @ 0x50003400
1,480,295 UART: [idev] ++
1,480,463 UART: [idev] CDI.KEYID = 6
1,480,823 UART: [idev] SUBJECT.KEYID = 7
1,481,247 UART: [idev] UDS.KEYID = 0
1,481,592 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,506,243 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,897 UART: [idev] --
1,516,020 UART: [ldev] ++
1,516,188 UART: [ldev] CDI.KEYID = 6
1,516,551 UART: [ldev] SUBJECT.KEYID = 5
1,516,977 UART: [ldev] AUTHORITY.KEYID = 7
1,517,440 UART: [ldev] FE.KEYID = 1
1,522,642 UART: [ldev] Erasing FE.KEYID = 1
1,548,203 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,320 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,087 UART: [ldev] --
1,587,554 UART: [fwproc] Waiting for Commands...
1,588,279 UART: [fwproc] Received command 0x46574c44
1,589,070 UART: [fwproc] Received Image of size 118548 bytes
1,635,840 UART: ROM Fatal Error: 0x000B003C
1,636,999 >>> mbox cmd response: failed
1,636,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,005 >>> mbox cmd response: failed
1,637,005 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,637,011 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,430 UART: [kat] SHA2-256
882,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,476 UART: [kat] ++
886,628 UART: [kat] sha1
890,926 UART: [kat] SHA2-256
892,864 UART: [kat] SHA2-384
895,575 UART: [kat] SHA2-512-ACC
897,476 UART: [kat] ECC-384
903,093 UART: [kat] HMAC-384Kdf
907,669 UART: [kat] LMS
1,475,865 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,254 UART: [fht] Storing FHT @ 0x50003400
1,480,097 UART: [idev] ++
1,480,265 UART: [idev] CDI.KEYID = 6
1,480,625 UART: [idev] SUBJECT.KEYID = 7
1,481,049 UART: [idev] UDS.KEYID = 0
1,481,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,039 UART: [idev] Erasing UDS.KEYID = 0
1,505,685 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,302 UART: [ldev] ++
1,515,470 UART: [ldev] CDI.KEYID = 6
1,515,833 UART: [ldev] SUBJECT.KEYID = 5
1,516,259 UART: [ldev] AUTHORITY.KEYID = 7
1,516,722 UART: [ldev] FE.KEYID = 1
1,521,906 UART: [ldev] Erasing FE.KEYID = 1
1,547,759 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,167 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,879 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,093 UART: [ldev] --
1,587,602 UART: [fwproc] Waiting for Commands...
1,588,371 UART: [fwproc] Received command 0x46574c44
1,589,162 UART: [fwproc] Received Image of size 118548 bytes
2,933,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,615 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,833 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,162 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,750 >>> mbox cmd response: failed
1,487,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,756 >>> mbox cmd response: failed
1,487,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,487,762 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,716 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,176 UART: [state] LifecycleState = Unprovisioned
85,831 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,644 UART: [kat] SHA2-256
891,194 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,298 UART: [kat] ++
895,450 UART: [kat] sha1
899,806 UART: [kat] SHA2-256
901,746 UART: [kat] SHA2-384
904,521 UART: [kat] SHA2-512-ACC
906,422 UART: [kat] ECC-384
916,605 UART: [kat] HMAC-384Kdf
921,209 UART: [kat] LMS
1,169,521 UART: [kat] --
1,170,544 UART: [cold-reset] ++
1,171,008 UART: [fht] FHT @ 0x50003400
1,173,762 UART: [idev] ++
1,173,930 UART: [idev] CDI.KEYID = 6
1,174,291 UART: [idev] SUBJECT.KEYID = 7
1,174,716 UART: [idev] UDS.KEYID = 0
1,175,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,273 UART: [idev] Erasing UDS.KEYID = 0
1,199,297 UART: [idev] Sha1 KeyId Algorithm
1,208,103 UART: [idev] --
1,209,098 UART: [ldev] ++
1,209,266 UART: [ldev] CDI.KEYID = 6
1,209,630 UART: [ldev] SUBJECT.KEYID = 5
1,210,057 UART: [ldev] AUTHORITY.KEYID = 7
1,210,520 UART: [ldev] FE.KEYID = 1
1,215,842 UART: [ldev] Erasing FE.KEYID = 1
1,241,735 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,917 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,806 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,518 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,598 UART: [ldev] --
1,280,829 UART: [fwproc] Wait for Commands...
1,281,530 UART: [fwproc] Recv command 0x46574c44
1,282,263 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,547 UART: ROM Fatal Error: 0x000B003C
1,330,706 >>> mbox cmd response: failed
1,330,706 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,712 >>> mbox cmd response: failed
1,330,712 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,453 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
891,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,366 UART: [kat] ++
895,518 UART: [kat] sha1
899,906 UART: [kat] SHA2-256
901,846 UART: [kat] SHA2-384
904,489 UART: [kat] SHA2-512-ACC
906,390 UART: [kat] ECC-384
916,027 UART: [kat] HMAC-384Kdf
920,739 UART: [kat] LMS
1,169,051 UART: [kat] --
1,169,874 UART: [cold-reset] ++
1,170,210 UART: [fht] FHT @ 0x50003400
1,172,802 UART: [idev] ++
1,172,970 UART: [idev] CDI.KEYID = 6
1,173,331 UART: [idev] SUBJECT.KEYID = 7
1,173,756 UART: [idev] UDS.KEYID = 0
1,174,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,535 UART: [idev] Erasing UDS.KEYID = 0
1,198,431 UART: [idev] Sha1 KeyId Algorithm
1,207,277 UART: [idev] --
1,208,460 UART: [ldev] ++
1,208,628 UART: [ldev] CDI.KEYID = 6
1,208,992 UART: [ldev] SUBJECT.KEYID = 5
1,209,419 UART: [ldev] AUTHORITY.KEYID = 7
1,209,882 UART: [ldev] FE.KEYID = 1
1,215,118 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,089 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,690 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,700 UART: [ldev] --
1,281,053 UART: [fwproc] Wait for Commands...
1,281,644 UART: [fwproc] Recv command 0x46574c44
1,282,377 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,015 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,406 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,581 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,934 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,881 >>> mbox cmd response: failed
1,186,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,887 >>> mbox cmd response: failed
1,186,887 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,835 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,154 UART: [state] WD Timer not started. Device not locked for debugging
88,515 UART: [kat] SHA2-256
892,065 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,169 UART: [kat] ++
896,321 UART: [kat] sha1
900,683 UART: [kat] SHA2-256
902,623 UART: [kat] SHA2-384
905,380 UART: [kat] SHA2-512-ACC
907,281 UART: [kat] ECC-384
917,212 UART: [kat] HMAC-384Kdf
921,766 UART: [kat] LMS
1,170,078 UART: [kat] --
1,171,071 UART: [cold-reset] ++
1,171,473 UART: [fht] FHT @ 0x50003400
1,174,273 UART: [idev] ++
1,174,441 UART: [idev] CDI.KEYID = 6
1,174,802 UART: [idev] SUBJECT.KEYID = 7
1,175,227 UART: [idev] UDS.KEYID = 0
1,175,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,456 UART: [idev] Erasing UDS.KEYID = 0
1,200,498 UART: [idev] Sha1 KeyId Algorithm
1,209,304 UART: [idev] --
1,210,497 UART: [ldev] ++
1,210,665 UART: [ldev] CDI.KEYID = 6
1,211,029 UART: [ldev] SUBJECT.KEYID = 5
1,211,456 UART: [ldev] AUTHORITY.KEYID = 7
1,211,919 UART: [ldev] FE.KEYID = 1
1,217,015 UART: [ldev] Erasing FE.KEYID = 1
1,243,514 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,637 UART: [ldev] --
1,282,958 UART: [fwproc] Wait for Commands...
1,283,647 UART: [fwproc] Recv command 0x46574c44
1,284,380 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,226 UART: ROM Fatal Error: 0x000B003C
1,332,385 >>> mbox cmd response: failed
1,332,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,391 >>> mbox cmd response: failed
1,332,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,397 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,971 UART: [state] LifecycleState = Unprovisioned
85,626 UART: [state] DebugLocked = No
86,324 UART: [state] WD Timer not started. Device not locked for debugging
87,513 UART: [kat] SHA2-256
891,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,167 UART: [kat] ++
895,319 UART: [kat] sha1
899,583 UART: [kat] SHA2-256
901,523 UART: [kat] SHA2-384
904,258 UART: [kat] SHA2-512-ACC
906,159 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,438 UART: [kat] LMS
1,168,750 UART: [kat] --
1,169,777 UART: [cold-reset] ++
1,170,221 UART: [fht] FHT @ 0x50003400
1,172,803 UART: [idev] ++
1,172,971 UART: [idev] CDI.KEYID = 6
1,173,332 UART: [idev] SUBJECT.KEYID = 7
1,173,757 UART: [idev] UDS.KEYID = 0
1,174,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,440 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,354 UART: [idev] --
1,209,375 UART: [ldev] ++
1,209,543 UART: [ldev] CDI.KEYID = 6
1,209,907 UART: [ldev] SUBJECT.KEYID = 5
1,210,334 UART: [ldev] AUTHORITY.KEYID = 7
1,210,797 UART: [ldev] FE.KEYID = 1
1,215,963 UART: [ldev] Erasing FE.KEYID = 1
1,242,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,955 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,891 UART: [ldev] --
1,281,264 UART: [fwproc] Wait for Commands...
1,282,003 UART: [fwproc] Recv command 0x46574c44
1,282,736 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,594 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,891 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,066 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,313 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,772 >>> mbox cmd response: failed
1,185,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,778 >>> mbox cmd response: failed
1,185,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,784 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,886 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,544 UART: [state] LifecycleState = Unprovisioned
85,199 UART: [state] DebugLocked = No
85,707 UART: [state] WD Timer not started. Device not locked for debugging
87,010 UART: [kat] SHA2-256
892,660 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,785 UART: [kat] ++
896,937 UART: [kat] sha1
901,259 UART: [kat] SHA2-256
903,199 UART: [kat] SHA2-384
905,852 UART: [kat] SHA2-512-ACC
907,753 UART: [kat] ECC-384
917,600 UART: [kat] HMAC-384Kdf
922,074 UART: [kat] LMS
1,170,402 UART: [kat] --
1,171,481 UART: [cold-reset] ++
1,172,007 UART: [fht] FHT @ 0x50003400
1,174,782 UART: [idev] ++
1,174,950 UART: [idev] CDI.KEYID = 6
1,175,310 UART: [idev] SUBJECT.KEYID = 7
1,175,734 UART: [idev] UDS.KEYID = 0
1,176,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,724 UART: [idev] Erasing UDS.KEYID = 0
1,200,553 UART: [idev] Sha1 KeyId Algorithm
1,209,069 UART: [idev] --
1,210,165 UART: [ldev] ++
1,210,333 UART: [ldev] CDI.KEYID = 6
1,210,696 UART: [ldev] SUBJECT.KEYID = 5
1,211,122 UART: [ldev] AUTHORITY.KEYID = 7
1,211,585 UART: [ldev] FE.KEYID = 1
1,216,559 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,517 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,233 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,124 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,836 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,005 UART: [ldev] --
1,282,308 UART: [fwproc] Wait for Commands...
1,283,054 UART: [fwproc] Recv command 0x46574c44
1,283,782 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,060 UART: ROM Fatal Error: 0x000B003C
1,332,219 >>> mbox cmd response: failed
1,332,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,225 >>> mbox cmd response: failed
1,332,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,716 UART: [state] LifecycleState = Unprovisioned
85,371 UART: [state] DebugLocked = No
85,965 UART: [state] WD Timer not started. Device not locked for debugging
87,170 UART: [kat] SHA2-256
892,820 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,945 UART: [kat] ++
897,097 UART: [kat] sha1
901,237 UART: [kat] SHA2-256
903,177 UART: [kat] SHA2-384
905,802 UART: [kat] SHA2-512-ACC
907,703 UART: [kat] ECC-384
917,418 UART: [kat] HMAC-384Kdf
921,924 UART: [kat] LMS
1,170,252 UART: [kat] --
1,171,439 UART: [cold-reset] ++
1,171,929 UART: [fht] FHT @ 0x50003400
1,174,614 UART: [idev] ++
1,174,782 UART: [idev] CDI.KEYID = 6
1,175,142 UART: [idev] SUBJECT.KEYID = 7
1,175,566 UART: [idev] UDS.KEYID = 0
1,175,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,506 UART: [idev] Erasing UDS.KEYID = 0
1,200,497 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,210,081 UART: [ldev] ++
1,210,249 UART: [ldev] CDI.KEYID = 6
1,210,612 UART: [ldev] SUBJECT.KEYID = 5
1,211,038 UART: [ldev] AUTHORITY.KEYID = 7
1,211,501 UART: [ldev] FE.KEYID = 1
1,216,671 UART: [ldev] Erasing FE.KEYID = 1
1,242,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,731 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,936 UART: [fwproc] Recv command 0x46574c44
1,283,664 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,253 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,423 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,664 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,478 >>> mbox cmd response: failed
1,187,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,484 >>> mbox cmd response: failed
1,187,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,019 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,017 UART: [state] LifecycleState = Unprovisioned
85,672 UART: [state] DebugLocked = No
86,276 UART: [state] WD Timer not started. Device not locked for debugging
87,449 UART: [kat] SHA2-256
893,099 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,224 UART: [kat] ++
897,376 UART: [kat] sha1
901,504 UART: [kat] SHA2-256
903,444 UART: [kat] SHA2-384
906,037 UART: [kat] SHA2-512-ACC
907,938 UART: [kat] ECC-384
917,529 UART: [kat] HMAC-384Kdf
922,245 UART: [kat] LMS
1,170,573 UART: [kat] --
1,171,612 UART: [cold-reset] ++
1,171,942 UART: [fht] FHT @ 0x50003400
1,174,589 UART: [idev] ++
1,174,757 UART: [idev] CDI.KEYID = 6
1,175,117 UART: [idev] SUBJECT.KEYID = 7
1,175,541 UART: [idev] UDS.KEYID = 0
1,175,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,509 UART: [idev] Erasing UDS.KEYID = 0
1,200,986 UART: [idev] Sha1 KeyId Algorithm
1,209,312 UART: [idev] --
1,210,612 UART: [ldev] ++
1,210,780 UART: [ldev] CDI.KEYID = 6
1,211,143 UART: [ldev] SUBJECT.KEYID = 5
1,211,569 UART: [ldev] AUTHORITY.KEYID = 7
1,212,032 UART: [ldev] FE.KEYID = 1
1,217,240 UART: [ldev] Erasing FE.KEYID = 1
1,243,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,874 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,590 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,481 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,193 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,344 UART: [ldev] --
1,282,737 UART: [fwproc] Wait for Commands...
1,283,411 UART: [fwproc] Recv command 0x46574c44
1,284,139 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,931 UART: ROM Fatal Error: 0x000B003C
1,333,090 >>> mbox cmd response: failed
1,333,090 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,096 >>> mbox cmd response: failed
1,333,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,333,102 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,786 UART: [state] WD Timer not started. Device not locked for debugging
88,011 UART: [kat] SHA2-256
893,661 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,786 UART: [kat] ++
897,938 UART: [kat] sha1
902,172 UART: [kat] SHA2-256
904,112 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,563 UART: [kat] HMAC-384Kdf
923,239 UART: [kat] LMS
1,171,567 UART: [kat] --
1,172,356 UART: [cold-reset] ++
1,172,744 UART: [fht] FHT @ 0x50003400
1,175,337 UART: [idev] ++
1,175,505 UART: [idev] CDI.KEYID = 6
1,175,865 UART: [idev] SUBJECT.KEYID = 7
1,176,289 UART: [idev] UDS.KEYID = 0
1,176,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,201,464 UART: [idev] Sha1 KeyId Algorithm
1,210,000 UART: [idev] --
1,211,218 UART: [ldev] ++
1,211,386 UART: [ldev] CDI.KEYID = 6
1,211,749 UART: [ldev] SUBJECT.KEYID = 5
1,212,175 UART: [ldev] AUTHORITY.KEYID = 7
1,212,638 UART: [ldev] FE.KEYID = 1
1,218,042 UART: [ldev] Erasing FE.KEYID = 1
1,244,453 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,622 UART: [ldev] --
1,283,923 UART: [fwproc] Wait for Commands...
1,284,619 UART: [fwproc] Recv command 0x46574c44
1,285,347 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,717 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,198 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,368 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,681 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,677 >>> mbox cmd response: failed
1,186,677 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,683 >>> mbox cmd response: failed
1,186,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,970 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,176 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_size_zero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,964 writing to cptra_bootfsm_go
192,199 UART:
192,580 UART: Running Caliptra ROM ...
193,719 UART:
193,871 UART: [state] CFI Enabled
267,960 UART: [state] LifecycleState = Manufacturing
269,891 UART: [state] DebugLocked = No
272,787 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,601 UART: [kat] SHA2-256
447,311 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,801 UART: [kat] ++
458,250 UART: [kat] sha1
469,233 UART: [kat] SHA2-256
471,917 UART: [kat] SHA2-384
478,673 UART: [kat] SHA2-512-ACC
481,079 UART: [kat] ECC-384
2,767,285 UART: [kat] HMAC-384Kdf
2,779,628 UART: [kat] LMS
3,969,946 UART: [kat] --
3,976,063 UART: [cold-reset] ++
3,976,979 UART: [fht] Storing FHT @ 0x50003400
3,988,815 UART: [idev] ++
3,989,382 UART: [idev] CDI.KEYID = 6
3,990,326 UART: [idev] SUBJECT.KEYID = 7
3,991,541 UART: [idev] UDS.KEYID = 0
3,994,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,143,724 UART: [idev] Erasing UDS.KEYID = 0
7,326,496 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,499 UART: [idev] --
7,352,147 UART: [ldev] ++
7,352,739 UART: [ldev] CDI.KEYID = 6
7,353,657 UART: [ldev] SUBJECT.KEYID = 5
7,354,878 UART: [ldev] AUTHORITY.KEYID = 7
7,356,113 UART: [ldev] FE.KEYID = 1
7,402,459 UART: [ldev] Erasing FE.KEYID = 1
10,732,547 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,604 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,319 UART: [ldev] --
13,094,523 UART: [fwproc] Waiting for Commands...
13,097,278 UART: [fwproc] Received command 0x46574c44
13,099,475 UART: [fwproc] Received Image of size 118548 bytes
17,231,252 UART: ROM Fatal Error: 0x000B002C
17,234,723 >>> mbox cmd response: failed
17,235,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,235,442 >>> mbox cmd response: failed
17,235,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,236,010 >>> mbox cmd response: failed
Initializing fuses
2,061,398 writing to cptra_bootfsm_go
2,250,730 UART:
2,251,069 UART: Running Caliptra ROM ...
2,252,208 UART:
2,252,372 UART: [state] CFI Enabled
2,311,197 UART: [state] LifecycleState = Manufacturing
2,313,150 UART: [state] DebugLocked = No
2,315,990 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,099 UART: [kat] SHA2-256
2,489,830 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,340 UART: [kat] ++
2,500,800 UART: [kat] sha1
2,513,413 UART: [kat] SHA2-256
2,516,102 UART: [kat] SHA2-384
2,521,391 UART: [kat] SHA2-512-ACC
2,523,743 UART: [kat] ECC-384
4,816,255 UART: [kat] HMAC-384Kdf
4,846,424 UART: [kat] LMS
6,036,718 UART: [kat] --
6,041,766 UART: [cold-reset] ++
6,042,792 UART: [fht] Storing FHT @ 0x50003400
6,054,280 UART: [idev] ++
6,054,850 UART: [idev] CDI.KEYID = 6
6,055,871 UART: [idev] SUBJECT.KEYID = 7
6,057,053 UART: [idev] UDS.KEYID = 0
6,059,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,588 UART: [idev] Erasing UDS.KEYID = 0
9,393,068 UART: [idev] Using Sha1 for KeyId Algorithm
9,415,811 UART: [idev] --
9,420,238 UART: [ldev] ++
9,420,804 UART: [ldev] CDI.KEYID = 6
9,421,749 UART: [ldev] SUBJECT.KEYID = 5
9,423,009 UART: [ldev] AUTHORITY.KEYID = 7
9,424,260 UART: [ldev] FE.KEYID = 1
9,470,868 UART: [ldev] Erasing FE.KEYID = 1
12,802,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,946 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,182,072 UART: [ldev] --
15,186,317 UART: [fwproc] Waiting for Commands...
15,188,146 UART: [fwproc] Received command 0x46574c44
15,190,393 UART: [fwproc] Received Image of size 118548 bytes
19,323,578 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,405,382 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,478,570 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,807,062 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,788,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,213,196 >>> mbox cmd response: failed
17,213,825 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,214,181 >>> mbox cmd response: failed
17,214,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,214,753 >>> mbox cmd response: failed
Initializing fuses
2,056,520 writing to cptra_bootfsm_go
5,823,328 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,030,240 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,609 UART:
192,996 UART: Running Caliptra ROM ...
194,123 UART:
603,838 UART: [state] CFI Enabled
616,760 UART: [state] LifecycleState = Manufacturing
618,656 UART: [state] DebugLocked = No
621,332 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,791 UART: [kat] SHA2-256
795,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,198 UART: [kat] ++
806,677 UART: [kat] sha1
817,919 UART: [kat] SHA2-256
820,623 UART: [kat] SHA2-384
827,095 UART: [kat] SHA2-512-ACC
829,445 UART: [kat] ECC-384
3,114,782 UART: [kat] HMAC-384Kdf
3,126,256 UART: [kat] LMS
4,316,357 UART: [kat] --
4,321,513 UART: [cold-reset] ++
4,324,055 UART: [fht] Storing FHT @ 0x50003400
4,336,514 UART: [idev] ++
4,337,130 UART: [idev] CDI.KEYID = 6
4,338,052 UART: [idev] SUBJECT.KEYID = 7
4,339,286 UART: [idev] UDS.KEYID = 0
4,342,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,175 UART: [idev] Erasing UDS.KEYID = 0
7,629,578 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,838 UART: [idev] --
7,655,091 UART: [ldev] ++
7,655,672 UART: [ldev] CDI.KEYID = 6
7,656,589 UART: [ldev] SUBJECT.KEYID = 5
7,657,811 UART: [ldev] AUTHORITY.KEYID = 7
7,659,059 UART: [ldev] FE.KEYID = 1
7,669,630 UART: [ldev] Erasing FE.KEYID = 1
10,955,317 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,924 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,522 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,205 UART: [ldev] --
13,316,728 UART: [fwproc] Waiting for Commands...
13,319,430 UART: [fwproc] Received command 0x46574c44
13,321,624 UART: [fwproc] Received Image of size 118548 bytes
17,465,509 UART: ROM Fatal Error: 0x000B002C
17,468,985 >>> mbox cmd response: failed
17,469,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,469,779 >>> mbox cmd response: failed
17,470,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,470,352 >>> mbox cmd response: failed
Initializing fuses
2,066,222 writing to cptra_bootfsm_go
2,255,516 UART:
2,255,856 UART: Running Caliptra ROM ...
2,257,000 UART:
2,996,759 UART: [state] CFI Enabled
3,008,267 UART: [state] LifecycleState = Manufacturing
3,010,183 UART: [state] DebugLocked = No
3,012,608 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,016,659 UART: [kat] SHA2-256
3,186,383 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,196,918 UART: [kat] ++
3,197,577 UART: [kat] sha1
3,207,148 UART: [kat] SHA2-256
3,209,855 UART: [kat] SHA2-384
3,216,556 UART: [kat] SHA2-512-ACC
3,218,914 UART: [kat] ECC-384
5,503,845 UART: [kat] HMAC-384Kdf
5,514,834 UART: [kat] LMS
6,704,946 UART: [kat] --
6,710,023 UART: [cold-reset] ++
6,712,123 UART: [fht] Storing FHT @ 0x50003400
6,723,716 UART: [idev] ++
6,724,288 UART: [idev] CDI.KEYID = 6
6,725,314 UART: [idev] SUBJECT.KEYID = 7
6,726,479 UART: [idev] UDS.KEYID = 0
6,728,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,877,747 UART: [idev] Erasing UDS.KEYID = 0
10,013,156 UART: [idev] Using Sha1 for KeyId Algorithm
10,033,945 UART: [idev] --
10,038,441 UART: [ldev] ++
10,039,026 UART: [ldev] CDI.KEYID = 6
10,040,004 UART: [ldev] SUBJECT.KEYID = 5
10,041,228 UART: [ldev] AUTHORITY.KEYID = 7
10,042,477 UART: [ldev] FE.KEYID = 1
10,056,345 UART: [ldev] Erasing FE.KEYID = 1
13,346,624 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,640,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,655,173 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,669,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,684,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,704,235 UART: [ldev] --
15,709,080 UART: [fwproc] Waiting for Commands...
15,712,272 UART: [fwproc] Received command 0x46574c44
15,714,468 UART: [fwproc] Received Image of size 118548 bytes
19,859,279 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,935,051 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,008,240 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,336,666 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,421 writing to cptra_bootfsm_go
4,131,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,437,567 >>> mbox cmd response: failed
17,438,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,438,478 >>> mbox cmd response: failed
17,438,754 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,439,049 >>> mbox cmd response: failed
Initializing fuses
2,055,384 writing to cptra_bootfsm_go
6,547,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,617,792 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,114 UART:
192,497 UART: Running Caliptra ROM ...
193,587 UART:
193,732 UART: [state] CFI Enabled
261,192 UART: [state] LifecycleState = Manufacturing
263,134 UART: [state] DebugLocked = No
264,545 UART: [state] WD Timer not started. Device not locked for debugging
268,492 UART: [kat] SHA2-256
448,123 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,932 UART: [kat] ++
459,404 UART: [kat] sha1
469,851 UART: [kat] SHA2-256
472,547 UART: [kat] SHA2-384
479,507 UART: [kat] SHA2-512-ACC
481,902 UART: [kat] ECC-384
2,945,903 UART: [kat] HMAC-384Kdf
2,969,496 UART: [kat] LMS
3,446,020 UART: [kat] --
3,450,176 UART: [cold-reset] ++
3,451,252 UART: [fht] FHT @ 0x50003400
3,463,096 UART: [idev] ++
3,463,670 UART: [idev] CDI.KEYID = 6
3,464,748 UART: [idev] SUBJECT.KEYID = 7
3,465,857 UART: [idev] UDS.KEYID = 0
3,468,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,669 UART: [idev] Erasing UDS.KEYID = 0
5,984,211 UART: [idev] Sha1 KeyId Algorithm
6,008,147 UART: [idev] --
6,012,849 UART: [ldev] ++
6,013,428 UART: [ldev] CDI.KEYID = 6
6,014,349 UART: [ldev] SUBJECT.KEYID = 5
6,015,572 UART: [ldev] AUTHORITY.KEYID = 7
6,016,815 UART: [ldev] FE.KEYID = 1
6,056,259 UART: [ldev] Erasing FE.KEYID = 1
8,565,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,051 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,907 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,464 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,285 UART: [ldev] --
10,370,872 UART: [fwproc] Wait for Commands...
10,372,762 UART: [fwproc] Recv command 0x46574c44
10,374,829 UART: [fwproc] Recv'd Img size: 118548 bytes
13,884,709 UART: ROM Fatal Error: 0x000B002C
13,888,002 >>> mbox cmd response: failed
13,888,441 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,888,787 >>> mbox cmd response: failed
13,889,070 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,889,372 >>> mbox cmd response: failed
Initializing fuses
2,054,554 writing to cptra_bootfsm_go
2,243,892 UART:
2,244,258 UART: Running Caliptra ROM ...
2,245,403 UART:
2,245,582 UART: [state] CFI Enabled
2,310,327 UART: [state] LifecycleState = Manufacturing
2,312,270 UART: [state] DebugLocked = No
2,314,207 UART: [state] WD Timer not started. Device not locked for debugging
2,318,007 UART: [kat] SHA2-256
2,497,636 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,508,408 UART: [kat] ++
2,508,877 UART: [kat] sha1
2,521,064 UART: [kat] SHA2-256
2,523,766 UART: [kat] SHA2-384
2,530,669 UART: [kat] SHA2-512-ACC
2,533,024 UART: [kat] ECC-384
4,992,332 UART: [kat] HMAC-384Kdf
5,013,930 UART: [kat] LMS
5,490,470 UART: [kat] --
5,497,535 UART: [cold-reset] ++
5,499,630 UART: [fht] FHT @ 0x50003400
5,509,876 UART: [idev] ++
5,510,603 UART: [idev] CDI.KEYID = 6
5,511,595 UART: [idev] SUBJECT.KEYID = 7
5,512,717 UART: [idev] UDS.KEYID = 0
5,515,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,664,731 UART: [idev] Erasing UDS.KEYID = 0
8,031,202 UART: [idev] Sha1 KeyId Algorithm
8,054,762 UART: [idev] --
8,059,575 UART: [ldev] ++
8,060,155 UART: [ldev] CDI.KEYID = 6
8,061,077 UART: [ldev] SUBJECT.KEYID = 5
8,062,253 UART: [ldev] AUTHORITY.KEYID = 7
8,063,497 UART: [ldev] FE.KEYID = 1
8,102,739 UART: [ldev] Erasing FE.KEYID = 1
10,606,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,342,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,358,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,374,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,390,146 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,411,368 UART: [ldev] --
12,416,973 UART: [fwproc] Wait for Commands...
12,418,702 UART: [fwproc] Recv command 0x46574c44
12,420,697 UART: [fwproc] Recv'd Img size: 118548 bytes
15,937,221 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,016,288 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,089,315 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,417,442 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,973 writing to cptra_bootfsm_go
3,462,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,786,416 >>> mbox cmd response: failed
13,787,072 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,787,435 >>> mbox cmd response: failed
13,787,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,788,017 >>> mbox cmd response: failed
Initializing fuses
2,054,914 writing to cptra_bootfsm_go
5,502,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,309,793 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
192,523 UART:
192,888 UART: Running Caliptra ROM ...
193,979 UART:
603,815 UART: [state] CFI Enabled
618,693 UART: [state] LifecycleState = Manufacturing
620,599 UART: [state] DebugLocked = No
621,930 UART: [state] WD Timer not started. Device not locked for debugging
626,075 UART: [kat] SHA2-256
805,704 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,525 UART: [kat] ++
817,063 UART: [kat] sha1
828,873 UART: [kat] SHA2-256
831,563 UART: [kat] SHA2-384
838,517 UART: [kat] SHA2-512-ACC
840,860 UART: [kat] ECC-384
3,283,606 UART: [kat] HMAC-384Kdf
3,296,707 UART: [kat] LMS
3,773,229 UART: [kat] --
3,779,652 UART: [cold-reset] ++
3,782,234 UART: [fht] FHT @ 0x50003400
3,794,193 UART: [idev] ++
3,794,760 UART: [idev] CDI.KEYID = 6
3,795,701 UART: [idev] SUBJECT.KEYID = 7
3,796,991 UART: [idev] UDS.KEYID = 0
3,799,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,949,474 UART: [idev] Erasing UDS.KEYID = 0
6,276,051 UART: [idev] Sha1 KeyId Algorithm
6,301,157 UART: [idev] --
6,305,322 UART: [ldev] ++
6,305,900 UART: [ldev] CDI.KEYID = 6
6,306,816 UART: [ldev] SUBJECT.KEYID = 5
6,308,035 UART: [ldev] AUTHORITY.KEYID = 7
6,309,273 UART: [ldev] FE.KEYID = 1
6,320,576 UART: [ldev] Erasing FE.KEYID = 1
8,796,929 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,584,860 UART: [ldev] --
10,590,457 UART: [fwproc] Wait for Commands...
10,592,505 UART: [fwproc] Recv command 0x46574c44
10,594,499 UART: [fwproc] Recv'd Img size: 118548 bytes
14,105,073 UART: ROM Fatal Error: 0x000B002C
14,108,333 >>> mbox cmd response: failed
14,108,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,109,181 >>> mbox cmd response: failed
14,109,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,109,855 >>> mbox cmd response: failed
Initializing fuses
2,056,050 writing to cptra_bootfsm_go
2,245,352 UART:
2,245,718 UART: Running Caliptra ROM ...
2,246,768 UART:
6,347,234 UART: [state] CFI Enabled
6,362,964 UART: [state] LifecycleState = Manufacturing
6,364,908 UART: [state] DebugLocked = No
6,366,852 UART: [state] WD Timer not started. Device not locked for debugging
6,370,769 UART: [kat] SHA2-256
6,550,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,561,195 UART: [kat] ++
6,561,694 UART: [kat] sha1
6,573,723 UART: [kat] SHA2-256
6,576,429 UART: [kat] SHA2-384
6,582,749 UART: [kat] SHA2-512-ACC
6,585,105 UART: [kat] ECC-384
9,027,481 UART: [kat] HMAC-384Kdf
9,038,742 UART: [kat] LMS
9,515,241 UART: [kat] --
9,520,425 UART: [cold-reset] ++
9,522,629 UART: [fht] FHT @ 0x50003400
9,534,748 UART: [idev] ++
9,535,325 UART: [idev] CDI.KEYID = 6
9,536,345 UART: [idev] SUBJECT.KEYID = 7
9,537,518 UART: [idev] UDS.KEYID = 0
9,540,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,689,297 UART: [idev] Erasing UDS.KEYID = 0
12,017,698 UART: [idev] Sha1 KeyId Algorithm
12,041,847 UART: [idev] --
12,046,926 UART: [ldev] ++
12,047,540 UART: [ldev] CDI.KEYID = 6
12,048,463 UART: [ldev] SUBJECT.KEYID = 5
12,049,629 UART: [ldev] AUTHORITY.KEYID = 7
12,050,869 UART: [ldev] FE.KEYID = 1
12,064,462 UART: [ldev] Erasing FE.KEYID = 1
14,548,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,266,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,282,336 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,298,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,313,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,335,859 UART: [ldev] --
16,340,642 UART: [fwproc] Wait for Commands...
16,343,769 UART: [fwproc] Recv command 0x46574c44
16,345,815 UART: [fwproc] Recv'd Img size: 118548 bytes
19,865,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,945,978 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,018,984 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,347,163 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,783,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,008,115 >>> mbox cmd response: failed
14,008,685 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,009,037 >>> mbox cmd response: failed
14,009,315 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,009,611 >>> mbox cmd response: failed
Initializing fuses
2,062,123 writing to cptra_bootfsm_go
9,638,033 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,336,817 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
192,179 UART:
192,541 UART: Running Caliptra ROM ...
193,731 UART:
193,889 UART: [state] CFI Enabled
260,135 UART: [state] LifecycleState = Manufacturing
262,541 UART: [state] DebugLocked = No
265,286 UART: [state] WD Timer not started. Device not locked for debugging
269,892 UART: [kat] SHA2-256
459,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,501 UART: [kat] ++
470,957 UART: [kat] sha1
482,372 UART: [kat] SHA2-256
485,376 UART: [kat] SHA2-384
491,000 UART: [kat] SHA2-512-ACC
493,624 UART: [kat] ECC-384
2,945,447 UART: [kat] HMAC-384Kdf
2,969,940 UART: [kat] LMS
3,501,699 UART: [kat] --
3,505,548 UART: [cold-reset] ++
3,507,172 UART: [fht] FHT @ 0x50003400
3,519,287 UART: [idev] ++
3,520,026 UART: [idev] CDI.KEYID = 6
3,520,961 UART: [idev] SUBJECT.KEYID = 7
3,522,096 UART: [idev] UDS.KEYID = 0
3,525,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,432 UART: [idev] Erasing UDS.KEYID = 0
6,026,244 UART: [idev] Sha1 KeyId Algorithm
6,048,685 UART: [idev] --
6,053,820 UART: [ldev] ++
6,054,511 UART: [ldev] CDI.KEYID = 6
6,055,433 UART: [ldev] SUBJECT.KEYID = 5
6,056,603 UART: [ldev] AUTHORITY.KEYID = 7
6,057,784 UART: [ldev] FE.KEYID = 1
6,098,855 UART: [ldev] Erasing FE.KEYID = 1
8,602,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,044 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,303 UART: [ldev] --
10,410,864 UART: [fwproc] Wait for Commands...
10,413,611 UART: [fwproc] Recv command 0x46574c44
10,416,029 UART: [fwproc] Recv'd Img size: 118548 bytes
13,942,766 UART: ROM Fatal Error: 0x000B002C
13,946,452 >>> mbox cmd response: failed
13,946,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,947,142 >>> mbox cmd response: failed
13,947,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,947,702 >>> mbox cmd response: failed
Initializing fuses
2,055,533 writing to cptra_bootfsm_go
2,244,814 UART:
2,245,168 UART: Running Caliptra ROM ...
2,246,213 UART:
2,246,367 UART: [state] CFI Enabled
2,311,669 UART: [state] LifecycleState = Manufacturing
2,314,068 UART: [state] DebugLocked = No
2,316,150 UART: [state] WD Timer not started. Device not locked for debugging
2,321,471 UART: [kat] SHA2-256
2,511,329 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,120 UART: [kat] ++
2,522,586 UART: [kat] sha1
2,534,715 UART: [kat] SHA2-256
2,537,714 UART: [kat] SHA2-384
2,542,962 UART: [kat] SHA2-512-ACC
2,545,539 UART: [kat] ECC-384
4,997,207 UART: [kat] HMAC-384Kdf
5,020,070 UART: [kat] LMS
5,551,824 UART: [kat] --
5,556,682 UART: [cold-reset] ++
5,558,943 UART: [fht] FHT @ 0x50003400
5,569,659 UART: [idev] ++
5,570,374 UART: [idev] CDI.KEYID = 6
5,571,314 UART: [idev] SUBJECT.KEYID = 7
5,572,483 UART: [idev] UDS.KEYID = 0
5,574,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,724,013 UART: [idev] Erasing UDS.KEYID = 0
8,078,918 UART: [idev] Sha1 KeyId Algorithm
8,102,700 UART: [idev] --
8,108,049 UART: [ldev] ++
8,108,787 UART: [ldev] CDI.KEYID = 6
8,109,700 UART: [ldev] SUBJECT.KEYID = 5
8,110,878 UART: [ldev] AUTHORITY.KEYID = 7
8,112,059 UART: [ldev] FE.KEYID = 1
8,147,785 UART: [ldev] Erasing FE.KEYID = 1
10,655,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,387,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,402,276 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,417,531 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,432,657 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,453,820 UART: [ldev] --
12,459,105 UART: [fwproc] Wait for Commands...
12,461,053 UART: [fwproc] Recv command 0x46574c44
12,463,376 UART: [fwproc] Recv'd Img size: 118548 bytes
15,991,160 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,072,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,196,273 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,756,294 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,440,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,396,360 >>> mbox cmd response: failed
14,397,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,397,518 >>> mbox cmd response: failed
14,397,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,398,095 >>> mbox cmd response: failed
Initializing fuses
2,055,273 writing to cptra_bootfsm_go
5,488,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,916,600 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,599 UART:
192,970 UART: Running Caliptra ROM ...
194,269 UART:
603,949 UART: [state] CFI Enabled
616,480 UART: [state] LifecycleState = Manufacturing
618,878 UART: [state] DebugLocked = No
620,989 UART: [state] WD Timer not started. Device not locked for debugging
625,531 UART: [kat] SHA2-256
815,440 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,227 UART: [kat] ++
826,735 UART: [kat] sha1
837,421 UART: [kat] SHA2-256
840,438 UART: [kat] SHA2-384
846,802 UART: [kat] SHA2-512-ACC
849,368 UART: [kat] ECC-384
3,289,583 UART: [kat] HMAC-384Kdf
3,303,308 UART: [kat] LMS
3,835,169 UART: [kat] --
3,841,325 UART: [cold-reset] ++
3,842,886 UART: [fht] FHT @ 0x50003400
3,852,907 UART: [idev] ++
3,853,589 UART: [idev] CDI.KEYID = 6
3,854,563 UART: [idev] SUBJECT.KEYID = 7
3,855,725 UART: [idev] UDS.KEYID = 0
3,858,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,898 UART: [idev] Erasing UDS.KEYID = 0
6,336,497 UART: [idev] Sha1 KeyId Algorithm
6,358,501 UART: [idev] --
6,363,482 UART: [ldev] ++
6,364,169 UART: [ldev] CDI.KEYID = 6
6,365,141 UART: [ldev] SUBJECT.KEYID = 5
6,366,309 UART: [ldev] AUTHORITY.KEYID = 7
6,367,434 UART: [ldev] FE.KEYID = 1
6,376,621 UART: [ldev] Erasing FE.KEYID = 1
8,852,260 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,252 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,746 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,414 UART: [ldev] --
10,644,325 UART: [fwproc] Wait for Commands...
10,645,832 UART: [fwproc] Recv command 0x46574c44
10,647,776 UART: [fwproc] Recv'd Img size: 118548 bytes
14,180,355 UART: ROM Fatal Error: 0x000B002C
14,184,012 >>> mbox cmd response: failed
14,184,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,184,794 >>> mbox cmd response: failed
14,185,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,185,367 >>> mbox cmd response: failed
Initializing fuses
2,061,501 writing to cptra_bootfsm_go
2,250,822 UART:
2,251,187 UART: Running Caliptra ROM ...
2,252,239 UART:
6,278,615 UART: [state] CFI Enabled
6,291,694 UART: [state] LifecycleState = Manufacturing
6,294,082 UART: [state] DebugLocked = No
6,296,864 UART: [state] WD Timer not started. Device not locked for debugging
6,301,658 UART: [kat] SHA2-256
6,491,569 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,502,369 UART: [kat] ++
6,503,024 UART: [kat] sha1
6,514,414 UART: [kat] SHA2-256
6,517,436 UART: [kat] SHA2-384
6,522,241 UART: [kat] SHA2-512-ACC
6,524,818 UART: [kat] ECC-384
8,965,043 UART: [kat] HMAC-384Kdf
8,978,266 UART: [kat] LMS
9,510,085 UART: [kat] --
9,515,188 UART: [cold-reset] ++
9,517,553 UART: [fht] FHT @ 0x50003400
9,528,337 UART: [idev] ++
9,529,040 UART: [idev] CDI.KEYID = 6
9,530,012 UART: [idev] SUBJECT.KEYID = 7
9,531,185 UART: [idev] UDS.KEYID = 0
9,533,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,682,919 UART: [idev] Erasing UDS.KEYID = 0
12,006,020 UART: [idev] Sha1 KeyId Algorithm
12,028,509 UART: [idev] --
12,034,611 UART: [ldev] ++
12,035,297 UART: [ldev] CDI.KEYID = 6
12,036,184 UART: [ldev] SUBJECT.KEYID = 5
12,037,400 UART: [ldev] AUTHORITY.KEYID = 7
12,038,582 UART: [ldev] FE.KEYID = 1
12,049,070 UART: [ldev] Erasing FE.KEYID = 1
14,529,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,248,277 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,263,516 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,278,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,293,775 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,313,784 UART: [ldev] --
16,319,898 UART: [fwproc] Wait for Commands...
16,322,493 UART: [fwproc] Recv command 0x46574c44
16,324,766 UART: [fwproc] Recv'd Img size: 118548 bytes
19,856,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,935,959 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,059,586 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,618,997 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,761,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,618,202 >>> mbox cmd response: failed
14,619,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,619,588 >>> mbox cmd response: failed
14,619,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,620,164 >>> mbox cmd response: failed
Initializing fuses
2,054,300 writing to cptra_bootfsm_go
9,003,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,339,943 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Manufacturing
85,915 UART: [state] DebugLocked = No
86,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,969 UART: [kat] SHA2-256
881,900 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,015 UART: [kat] ++
886,167 UART: [kat] sha1
890,381 UART: [kat] SHA2-256
892,319 UART: [kat] SHA2-384
895,304 UART: [kat] SHA2-512-ACC
897,205 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,139 UART: [cold-reset] ++
1,476,697 UART: [fht] Storing FHT @ 0x50003400
1,479,482 UART: [idev] ++
1,479,650 UART: [idev] CDI.KEYID = 6
1,480,010 UART: [idev] SUBJECT.KEYID = 7
1,480,434 UART: [idev] UDS.KEYID = 0
1,480,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,206 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,202 UART: [idev] --
1,514,423 UART: [ldev] ++
1,514,591 UART: [ldev] CDI.KEYID = 6
1,514,954 UART: [ldev] SUBJECT.KEYID = 5
1,515,380 UART: [ldev] AUTHORITY.KEYID = 7
1,515,843 UART: [ldev] FE.KEYID = 1
1,521,049 UART: [ldev] Erasing FE.KEYID = 1
1,546,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,497 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,213 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,104 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,816 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,796 UART: [ldev] --
1,585,279 UART: [fwproc] Waiting for Commands...
1,585,974 UART: [fwproc] Received command 0x46574c44
1,586,765 UART: [fwproc] Received Image of size 118548 bytes
2,957,155 UART: ROM Fatal Error: 0x000B002C
2,958,314 >>> mbox cmd response: failed
2,958,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,958,320 >>> mbox cmd response: failed
2,958,320 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,958,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,447 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,939 UART: [kat] SHA2-256
881,870 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,985 UART: [kat] ++
886,137 UART: [kat] sha1
890,417 UART: [kat] SHA2-256
892,355 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,402 UART: [kat] HMAC-384Kdf
907,132 UART: [kat] LMS
1,475,328 UART: [kat] --
1,476,275 UART: [cold-reset] ++
1,476,657 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,526 UART: [idev] Erasing UDS.KEYID = 0
1,504,622 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,160 UART: [idev] --
1,514,371 UART: [ldev] ++
1,514,539 UART: [ldev] CDI.KEYID = 6
1,514,902 UART: [ldev] SUBJECT.KEYID = 5
1,515,328 UART: [ldev] AUTHORITY.KEYID = 7
1,515,791 UART: [ldev] FE.KEYID = 1
1,521,053 UART: [ldev] Erasing FE.KEYID = 1
1,546,214 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,435 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,326 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,038 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,196 UART: [ldev] --
1,585,573 UART: [fwproc] Waiting for Commands...
1,586,404 UART: [fwproc] Received command 0x46574c44
1,587,195 UART: [fwproc] Received Image of size 118548 bytes
2,931,744 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,442 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,771 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,809,177 >>> mbox cmd response: failed
2,809,177 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,183 >>> mbox cmd response: failed
2,809,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,189 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,523 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,815 UART: [state] LifecycleState = Manufacturing
86,470 UART: [state] DebugLocked = No
87,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,690 UART: [kat] SHA2-256
882,621 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,736 UART: [kat] ++
886,888 UART: [kat] sha1
891,222 UART: [kat] SHA2-256
893,160 UART: [kat] SHA2-384
895,865 UART: [kat] SHA2-512-ACC
897,766 UART: [kat] ECC-384
903,369 UART: [kat] HMAC-384Kdf
907,923 UART: [kat] LMS
1,476,119 UART: [kat] --
1,477,014 UART: [cold-reset] ++
1,477,500 UART: [fht] Storing FHT @ 0x50003400
1,480,431 UART: [idev] ++
1,480,599 UART: [idev] CDI.KEYID = 6
1,480,959 UART: [idev] SUBJECT.KEYID = 7
1,481,383 UART: [idev] UDS.KEYID = 0
1,481,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,435 UART: [idev] Erasing UDS.KEYID = 0
1,506,221 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,749 UART: [idev] --
1,515,800 UART: [ldev] ++
1,515,968 UART: [ldev] CDI.KEYID = 6
1,516,331 UART: [ldev] SUBJECT.KEYID = 5
1,516,757 UART: [ldev] AUTHORITY.KEYID = 7
1,517,220 UART: [ldev] FE.KEYID = 1
1,522,596 UART: [ldev] Erasing FE.KEYID = 1
1,547,941 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,989 UART: [ldev] --
1,587,334 UART: [fwproc] Waiting for Commands...
1,587,993 UART: [fwproc] Received command 0x46574c44
1,588,784 UART: [fwproc] Received Image of size 118548 bytes
2,958,748 UART: ROM Fatal Error: 0x000B002C
2,959,907 >>> mbox cmd response: failed
2,959,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,913 >>> mbox cmd response: failed
2,959,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,922 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,568 UART: [kat] SHA2-256
882,499 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,614 UART: [kat] ++
886,766 UART: [kat] sha1
890,922 UART: [kat] SHA2-256
892,860 UART: [kat] SHA2-384
895,511 UART: [kat] SHA2-512-ACC
897,412 UART: [kat] ECC-384
902,641 UART: [kat] HMAC-384Kdf
907,117 UART: [kat] LMS
1,475,313 UART: [kat] --
1,476,102 UART: [cold-reset] ++
1,476,668 UART: [fht] Storing FHT @ 0x50003400
1,479,553 UART: [idev] ++
1,479,721 UART: [idev] CDI.KEYID = 6
1,480,081 UART: [idev] SUBJECT.KEYID = 7
1,480,505 UART: [idev] UDS.KEYID = 0
1,480,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,877 UART: [idev] Erasing UDS.KEYID = 0
1,506,177 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,641 UART: [idev] --
1,515,638 UART: [ldev] ++
1,515,806 UART: [ldev] CDI.KEYID = 6
1,516,169 UART: [ldev] SUBJECT.KEYID = 5
1,516,595 UART: [ldev] AUTHORITY.KEYID = 7
1,517,058 UART: [ldev] FE.KEYID = 1
1,522,342 UART: [ldev] Erasing FE.KEYID = 1
1,547,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,288 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,004 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,607 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,761 UART: [ldev] --
1,587,072 UART: [fwproc] Waiting for Commands...
1,587,805 UART: [fwproc] Received command 0x46574c44
1,588,596 UART: [fwproc] Received Image of size 118548 bytes
2,933,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,707 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,925 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,298 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,811,568 >>> mbox cmd response: failed
2,811,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,811,574 >>> mbox cmd response: failed
2,811,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,811,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,302 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,978 UART: [state] LifecycleState = Manufacturing
85,633 UART: [state] DebugLocked = No
86,141 UART: [state] WD Timer not started. Device not locked for debugging
87,352 UART: [kat] SHA2-256
890,902 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,006 UART: [kat] ++
895,158 UART: [kat] sha1
899,416 UART: [kat] SHA2-256
901,356 UART: [kat] SHA2-384
904,219 UART: [kat] SHA2-512-ACC
906,120 UART: [kat] ECC-384
915,809 UART: [kat] HMAC-384Kdf
920,213 UART: [kat] LMS
1,168,525 UART: [kat] --
1,169,478 UART: [cold-reset] ++
1,169,900 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,775 UART: [idev] Erasing UDS.KEYID = 0
1,198,363 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,378 UART: [ldev] ++
1,208,546 UART: [ldev] CDI.KEYID = 6
1,208,910 UART: [ldev] SUBJECT.KEYID = 5
1,209,337 UART: [ldev] AUTHORITY.KEYID = 7
1,209,800 UART: [ldev] FE.KEYID = 1
1,215,274 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,314 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,026 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,204 UART: [ldev] --
1,281,465 UART: [fwproc] Wait for Commands...
1,282,122 UART: [fwproc] Recv command 0x46574c44
1,282,855 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,661 UART: ROM Fatal Error: 0x000B002C
2,652,820 >>> mbox cmd response: failed
2,652,820 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,826 >>> mbox cmd response: failed
2,652,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,832 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,914 UART: [state] LifecycleState = Unprovisioned
85,569 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,302 UART: [kat] SHA2-256
890,852 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,956 UART: [kat] ++
895,108 UART: [kat] sha1
899,322 UART: [kat] SHA2-256
901,262 UART: [kat] SHA2-384
903,965 UART: [kat] SHA2-512-ACC
905,866 UART: [kat] ECC-384
915,387 UART: [kat] HMAC-384Kdf
919,949 UART: [kat] LMS
1,168,261 UART: [kat] --
1,169,144 UART: [cold-reset] ++
1,169,536 UART: [fht] FHT @ 0x50003400
1,172,190 UART: [idev] ++
1,172,358 UART: [idev] CDI.KEYID = 6
1,172,719 UART: [idev] SUBJECT.KEYID = 7
1,173,144 UART: [idev] UDS.KEYID = 0
1,173,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,319 UART: [idev] Erasing UDS.KEYID = 0
1,197,715 UART: [idev] Sha1 KeyId Algorithm
1,206,507 UART: [idev] --
1,207,536 UART: [ldev] ++
1,207,704 UART: [ldev] CDI.KEYID = 6
1,208,068 UART: [ldev] SUBJECT.KEYID = 5
1,208,495 UART: [ldev] AUTHORITY.KEYID = 7
1,208,958 UART: [ldev] FE.KEYID = 1
1,213,902 UART: [ldev] Erasing FE.KEYID = 1
1,239,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,247 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,258,963 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,264,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,624 UART: [ldev] --
1,279,019 UART: [fwproc] Wait for Commands...
1,279,706 UART: [fwproc] Recv command 0x46574c44
1,280,439 UART: [fwproc] Recv'd Img size: 118548 bytes
2,624,039 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,651,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,682,275 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,822,582 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,508,053 >>> mbox cmd response: failed
2,508,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,059 >>> mbox cmd response: failed
2,508,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,508,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,151 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Manufacturing
86,026 UART: [state] DebugLocked = No
86,538 UART: [state] WD Timer not started. Device not locked for debugging
87,645 UART: [kat] SHA2-256
891,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,299 UART: [kat] ++
895,451 UART: [kat] sha1
899,747 UART: [kat] SHA2-256
901,687 UART: [kat] SHA2-384
904,408 UART: [kat] SHA2-512-ACC
906,309 UART: [kat] ECC-384
916,402 UART: [kat] HMAC-384Kdf
920,968 UART: [kat] LMS
1,169,280 UART: [kat] --
1,170,133 UART: [cold-reset] ++
1,170,491 UART: [fht] FHT @ 0x50003400
1,173,269 UART: [idev] ++
1,173,437 UART: [idev] CDI.KEYID = 6
1,173,798 UART: [idev] SUBJECT.KEYID = 7
1,174,223 UART: [idev] UDS.KEYID = 0
1,174,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,648 UART: [idev] Erasing UDS.KEYID = 0
1,199,714 UART: [idev] Sha1 KeyId Algorithm
1,208,460 UART: [idev] --
1,209,481 UART: [ldev] ++
1,209,649 UART: [ldev] CDI.KEYID = 6
1,210,013 UART: [ldev] SUBJECT.KEYID = 5
1,210,440 UART: [ldev] AUTHORITY.KEYID = 7
1,210,903 UART: [ldev] FE.KEYID = 1
1,216,339 UART: [ldev] Erasing FE.KEYID = 1
1,243,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,485 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,413 UART: [ldev] --
1,282,738 UART: [fwproc] Wait for Commands...
1,283,495 UART: [fwproc] Recv command 0x46574c44
1,284,228 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,914 UART: ROM Fatal Error: 0x000B002C
2,655,073 >>> mbox cmd response: failed
2,655,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,079 >>> mbox cmd response: failed
2,655,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,655,085 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Unprovisioned
86,046 UART: [state] DebugLocked = No
86,698 UART: [state] WD Timer not started. Device not locked for debugging
87,947 UART: [kat] SHA2-256
891,497 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,601 UART: [kat] ++
895,753 UART: [kat] sha1
900,047 UART: [kat] SHA2-256
901,987 UART: [kat] SHA2-384
904,718 UART: [kat] SHA2-512-ACC
906,619 UART: [kat] ECC-384
916,582 UART: [kat] HMAC-384Kdf
921,324 UART: [kat] LMS
1,169,636 UART: [kat] --
1,170,683 UART: [cold-reset] ++
1,171,013 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,175,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,398 UART: [idev] Sha1 KeyId Algorithm
1,209,432 UART: [idev] --
1,210,415 UART: [ldev] ++
1,210,583 UART: [ldev] CDI.KEYID = 6
1,210,947 UART: [ldev] SUBJECT.KEYID = 5
1,211,374 UART: [ldev] AUTHORITY.KEYID = 7
1,211,837 UART: [ldev] FE.KEYID = 1
1,217,113 UART: [ldev] Erasing FE.KEYID = 1
1,243,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,441 UART: [ldev] --
1,282,702 UART: [fwproc] Wait for Commands...
1,283,431 UART: [fwproc] Recv command 0x46574c44
1,284,164 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,914 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,535 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,710 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,007 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,237 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,507,964 >>> mbox cmd response: failed
2,507,964 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,970 >>> mbox cmd response: failed
2,507,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,507,976 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,122 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,286 UART: [state] LifecycleState = Manufacturing
85,941 UART: [state] DebugLocked = No
86,533 UART: [state] WD Timer not started. Device not locked for debugging
87,768 UART: [kat] SHA2-256
893,418 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,543 UART: [kat] ++
897,695 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,768 UART: [kat] SHA2-512-ACC
908,669 UART: [kat] ECC-384
918,586 UART: [kat] HMAC-384Kdf
923,248 UART: [kat] LMS
1,171,576 UART: [kat] --
1,172,287 UART: [cold-reset] ++
1,172,713 UART: [fht] FHT @ 0x50003400
1,175,478 UART: [idev] ++
1,175,646 UART: [idev] CDI.KEYID = 6
1,176,006 UART: [idev] SUBJECT.KEYID = 7
1,176,430 UART: [idev] UDS.KEYID = 0
1,176,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,426 UART: [idev] Erasing UDS.KEYID = 0
1,200,849 UART: [idev] Sha1 KeyId Algorithm
1,209,325 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,216,697 UART: [ldev] Erasing FE.KEYID = 1
1,242,380 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,801 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,517 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,408 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,120 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,241 UART: [ldev] --
1,281,728 UART: [fwproc] Wait for Commands...
1,282,466 UART: [fwproc] Recv command 0x46574c44
1,283,194 UART: [fwproc] Recv'd Img size: 118548 bytes
2,651,768 UART: ROM Fatal Error: 0x000B002C
2,652,927 >>> mbox cmd response: failed
2,652,927 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,933 >>> mbox cmd response: failed
2,652,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,939 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,738 UART: [kat] SHA2-256
893,388 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,513 UART: [kat] ++
897,665 UART: [kat] sha1
901,779 UART: [kat] SHA2-256
903,719 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,192 UART: [kat] HMAC-384Kdf
922,768 UART: [kat] LMS
1,171,096 UART: [kat] --
1,172,045 UART: [cold-reset] ++
1,172,537 UART: [fht] FHT @ 0x50003400
1,175,394 UART: [idev] ++
1,175,562 UART: [idev] CDI.KEYID = 6
1,175,922 UART: [idev] SUBJECT.KEYID = 7
1,176,346 UART: [idev] UDS.KEYID = 0
1,176,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,344 UART: [idev] Erasing UDS.KEYID = 0
1,201,437 UART: [idev] Sha1 KeyId Algorithm
1,209,887 UART: [idev] --
1,210,801 UART: [ldev] ++
1,210,969 UART: [ldev] CDI.KEYID = 6
1,211,332 UART: [ldev] SUBJECT.KEYID = 5
1,211,758 UART: [ldev] AUTHORITY.KEYID = 7
1,212,221 UART: [ldev] FE.KEYID = 1
1,217,603 UART: [ldev] Erasing FE.KEYID = 1
1,243,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,151 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,042 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,981 UART: [ldev] --
1,283,378 UART: [fwproc] Wait for Commands...
1,283,986 UART: [fwproc] Recv command 0x46574c44
1,284,714 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,720 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,761 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,916 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,264 >>> mbox cmd response: failed
2,509,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,270 >>> mbox cmd response: failed
2,509,270 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,963 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Manufacturing
85,950 UART: [state] DebugLocked = No
86,440 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,936 UART: [kat] SHA2-256
903,876 UART: [kat] SHA2-384
906,723 UART: [kat] SHA2-512-ACC
908,624 UART: [kat] ECC-384
918,137 UART: [kat] HMAC-384Kdf
922,783 UART: [kat] LMS
1,171,111 UART: [kat] --
1,171,942 UART: [cold-reset] ++
1,172,280 UART: [fht] FHT @ 0x50003400
1,175,103 UART: [idev] ++
1,175,271 UART: [idev] CDI.KEYID = 6
1,175,631 UART: [idev] SUBJECT.KEYID = 7
1,176,055 UART: [idev] UDS.KEYID = 0
1,176,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,361 UART: [idev] Erasing UDS.KEYID = 0
1,201,442 UART: [idev] Sha1 KeyId Algorithm
1,209,868 UART: [idev] --
1,210,912 UART: [ldev] ++
1,211,080 UART: [ldev] CDI.KEYID = 6
1,211,443 UART: [ldev] SUBJECT.KEYID = 5
1,211,869 UART: [ldev] AUTHORITY.KEYID = 7
1,212,332 UART: [ldev] FE.KEYID = 1
1,217,798 UART: [ldev] Erasing FE.KEYID = 1
1,244,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,798 UART: [ldev] --
1,283,287 UART: [fwproc] Wait for Commands...
1,284,031 UART: [fwproc] Recv command 0x46574c44
1,284,759 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,043 UART: ROM Fatal Error: 0x000B002C
2,654,202 >>> mbox cmd response: failed
2,654,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,208 >>> mbox cmd response: failed
2,654,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,654,214 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,862 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
893,677 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,802 UART: [kat] ++
897,954 UART: [kat] sha1
902,236 UART: [kat] SHA2-256
904,176 UART: [kat] SHA2-384
906,913 UART: [kat] SHA2-512-ACC
908,814 UART: [kat] ECC-384
918,829 UART: [kat] HMAC-384Kdf
923,539 UART: [kat] LMS
1,171,867 UART: [kat] --
1,172,676 UART: [cold-reset] ++
1,173,032 UART: [fht] FHT @ 0x50003400
1,175,551 UART: [idev] ++
1,175,719 UART: [idev] CDI.KEYID = 6
1,176,079 UART: [idev] SUBJECT.KEYID = 7
1,176,503 UART: [idev] UDS.KEYID = 0
1,176,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,721 UART: [idev] Erasing UDS.KEYID = 0
1,201,796 UART: [idev] Sha1 KeyId Algorithm
1,210,350 UART: [idev] --
1,211,380 UART: [ldev] ++
1,211,548 UART: [ldev] CDI.KEYID = 6
1,211,911 UART: [ldev] SUBJECT.KEYID = 5
1,212,337 UART: [ldev] AUTHORITY.KEYID = 7
1,212,800 UART: [ldev] FE.KEYID = 1
1,217,952 UART: [ldev] Erasing FE.KEYID = 1
1,244,725 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,832 UART: [ldev] --
1,284,159 UART: [fwproc] Wait for Commands...
1,284,765 UART: [fwproc] Recv command 0x46574c44
1,285,493 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,579 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,848 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,103 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,511,011 >>> mbox cmd response: failed
2,511,011 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,511,017 >>> mbox cmd response: failed
2,511,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,511,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,828 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_greater_than_max_supported ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
192,124 UART:
192,493 UART: Running Caliptra ROM ...
193,624 UART:
193,774 UART: [state] CFI Enabled
259,350 UART: [state] LifecycleState = Manufacturing
261,281 UART: [state] DebugLocked = No
264,183 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,336 UART: [kat] SHA2-256
439,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,537 UART: [kat] ++
450,009 UART: [kat] sha1
460,513 UART: [kat] SHA2-256
463,200 UART: [kat] SHA2-384
469,198 UART: [kat] SHA2-512-ACC
471,548 UART: [kat] ECC-384
2,767,447 UART: [kat] HMAC-384Kdf
2,800,201 UART: [kat] LMS
3,990,516 UART: [kat] --
3,994,753 UART: [cold-reset] ++
3,996,044 UART: [fht] Storing FHT @ 0x50003400
4,008,777 UART: [idev] ++
4,009,344 UART: [idev] CDI.KEYID = 6
4,010,286 UART: [idev] SUBJECT.KEYID = 7
4,011,554 UART: [idev] UDS.KEYID = 0
4,014,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,772 UART: [idev] Erasing UDS.KEYID = 0
7,335,455 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,163 UART: [idev] --
7,361,133 UART: [ldev] ++
7,361,720 UART: [ldev] CDI.KEYID = 6
7,362,665 UART: [ldev] SUBJECT.KEYID = 5
7,363,879 UART: [ldev] AUTHORITY.KEYID = 7
7,365,114 UART: [ldev] FE.KEYID = 1
7,391,749 UART: [ldev] Erasing FE.KEYID = 1
10,728,693 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,498 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,069,351 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,101,787 UART: [ldev] --
13,107,050 UART: [fwproc] Waiting for Commands...
13,109,206 UART: [fwproc] Received command 0x46574c44
13,111,406 UART: [fwproc] Received Image of size 118548 bytes
17,249,813 UART: ROM Fatal Error: 0x000B002E
17,253,284 >>> mbox cmd response: failed
17,253,768 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,254,111 >>> mbox cmd response: failed
17,254,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,254,680 >>> mbox cmd response: failed
Initializing fuses
2,054,963 writing to cptra_bootfsm_go
2,244,271 UART:
2,244,625 UART: Running Caliptra ROM ...
2,245,715 UART:
2,245,879 UART: [state] CFI Enabled
2,306,668 UART: [state] LifecycleState = Manufacturing
2,308,606 UART: [state] DebugLocked = No
2,310,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,468 UART: [kat] SHA2-256
2,485,162 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,717 UART: [kat] ++
2,496,262 UART: [kat] sha1
2,507,482 UART: [kat] SHA2-256
2,510,134 UART: [kat] SHA2-384
2,516,452 UART: [kat] SHA2-512-ACC
2,518,808 UART: [kat] ECC-384
4,809,355 UART: [kat] HMAC-384Kdf
4,820,460 UART: [kat] LMS
6,010,739 UART: [kat] --
6,016,688 UART: [cold-reset] ++
6,018,515 UART: [fht] Storing FHT @ 0x50003400
6,030,596 UART: [idev] ++
6,031,177 UART: [idev] CDI.KEYID = 6
6,032,200 UART: [idev] SUBJECT.KEYID = 7
6,033,389 UART: [idev] UDS.KEYID = 0
6,035,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,184,884 UART: [idev] Erasing UDS.KEYID = 0
9,368,180 UART: [idev] Using Sha1 for KeyId Algorithm
9,389,674 UART: [idev] --
9,395,181 UART: [ldev] ++
9,395,809 UART: [ldev] CDI.KEYID = 6
9,396,727 UART: [ldev] SUBJECT.KEYID = 5
9,398,194 UART: [ldev] AUTHORITY.KEYID = 7
9,399,384 UART: [ldev] FE.KEYID = 1
9,444,387 UART: [ldev] Erasing FE.KEYID = 1
12,775,598 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,071,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,086,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,101,227 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,115,737 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,133,929 UART: [ldev] --
15,138,384 UART: [fwproc] Waiting for Commands...
15,140,161 UART: [fwproc] Received command 0x46574c44
15,142,347 UART: [fwproc] Received Image of size 118548 bytes
19,277,064 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,358,687 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,431,859 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,759,556 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,897 writing to cptra_bootfsm_go
3,806,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,238,467 >>> mbox cmd response: failed
17,239,549 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,239,920 >>> mbox cmd response: failed
17,240,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,240,481 >>> mbox cmd response: failed
Initializing fuses
2,049,293 writing to cptra_bootfsm_go
5,827,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,036,553 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,277 writing to cptra_bootfsm_go
193,569 UART:
193,917 UART: Running Caliptra ROM ...
195,025 UART:
604,644 UART: [state] CFI Enabled
619,286 UART: [state] LifecycleState = Manufacturing
621,177 UART: [state] DebugLocked = No
623,747 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,215 UART: [kat] SHA2-256
797,957 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,527 UART: [kat] ++
809,007 UART: [kat] sha1
820,004 UART: [kat] SHA2-256
822,755 UART: [kat] SHA2-384
828,200 UART: [kat] SHA2-512-ACC
830,597 UART: [kat] ECC-384
3,113,558 UART: [kat] HMAC-384Kdf
3,126,233 UART: [kat] LMS
4,316,322 UART: [kat] --
4,319,883 UART: [cold-reset] ++
4,321,443 UART: [fht] Storing FHT @ 0x50003400
4,331,996 UART: [idev] ++
4,332,575 UART: [idev] CDI.KEYID = 6
4,333,517 UART: [idev] SUBJECT.KEYID = 7
4,334,794 UART: [idev] UDS.KEYID = 0
4,337,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,623 UART: [idev] Erasing UDS.KEYID = 0
7,623,843 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,701 UART: [idev] --
7,648,526 UART: [ldev] ++
7,649,106 UART: [ldev] CDI.KEYID = 6
7,650,095 UART: [ldev] SUBJECT.KEYID = 5
7,651,289 UART: [ldev] AUTHORITY.KEYID = 7
7,652,537 UART: [ldev] FE.KEYID = 1
7,664,057 UART: [ldev] Erasing FE.KEYID = 1
10,948,382 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,813 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,871 UART: [ldev] --
13,311,302 UART: [fwproc] Waiting for Commands...
13,314,104 UART: [fwproc] Received command 0x46574c44
13,316,305 UART: [fwproc] Received Image of size 118548 bytes
17,451,332 UART: ROM Fatal Error: 0x000B002E
17,454,803 >>> mbox cmd response: failed
17,455,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,455,632 >>> mbox cmd response: failed
17,455,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,456,226 >>> mbox cmd response: failed
Initializing fuses
2,061,047 writing to cptra_bootfsm_go
2,250,325 UART:
2,250,687 UART: Running Caliptra ROM ...
2,251,840 UART:
3,010,849 UART: [state] CFI Enabled
3,027,781 UART: [state] LifecycleState = Manufacturing
3,029,726 UART: [state] DebugLocked = No
3,031,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,036,305 UART: [kat] SHA2-256
3,206,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,216,608 UART: [kat] ++
3,217,077 UART: [kat] sha1
3,227,811 UART: [kat] SHA2-256
3,230,510 UART: [kat] SHA2-384
3,236,180 UART: [kat] SHA2-512-ACC
3,238,537 UART: [kat] ECC-384
5,525,655 UART: [kat] HMAC-384Kdf
5,537,135 UART: [kat] LMS
6,727,208 UART: [kat] --
6,731,925 UART: [cold-reset] ++
6,733,157 UART: [fht] Storing FHT @ 0x50003400
6,745,021 UART: [idev] ++
6,745,600 UART: [idev] CDI.KEYID = 6
6,746,543 UART: [idev] SUBJECT.KEYID = 7
6,747,814 UART: [idev] UDS.KEYID = 0
6,750,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,898,932 UART: [idev] Erasing UDS.KEYID = 0
10,040,555 UART: [idev] Using Sha1 for KeyId Algorithm
10,061,486 UART: [idev] --
10,066,674 UART: [ldev] ++
10,067,287 UART: [ldev] CDI.KEYID = 6
10,068,215 UART: [ldev] SUBJECT.KEYID = 5
10,069,429 UART: [ldev] AUTHORITY.KEYID = 7
10,070,679 UART: [ldev] FE.KEYID = 1
10,081,340 UART: [ldev] Erasing FE.KEYID = 1
13,366,843 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,659,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,674,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,689,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,703,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,722,428 UART: [ldev] --
15,726,889 UART: [fwproc] Waiting for Commands...
15,728,636 UART: [fwproc] Received command 0x46574c44
15,730,837 UART: [fwproc] Received Image of size 118548 bytes
19,866,650 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,947,003 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,020,197 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,349,173 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
4,128,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,441,615 >>> mbox cmd response: failed
17,442,172 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,442,520 >>> mbox cmd response: failed
17,442,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,443,039 >>> mbox cmd response: failed
Initializing fuses
2,054,645 writing to cptra_bootfsm_go
6,550,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,604,292 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,195 UART:
192,587 UART: Running Caliptra ROM ...
193,776 UART:
193,932 UART: [state] CFI Enabled
261,645 UART: [state] LifecycleState = Manufacturing
263,570 UART: [state] DebugLocked = No
266,200 UART: [state] WD Timer not started. Device not locked for debugging
270,271 UART: [kat] SHA2-256
449,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,686 UART: [kat] ++
461,186 UART: [kat] sha1
472,067 UART: [kat] SHA2-256
474,813 UART: [kat] SHA2-384
480,091 UART: [kat] SHA2-512-ACC
482,442 UART: [kat] ECC-384
2,948,421 UART: [kat] HMAC-384Kdf
2,970,099 UART: [kat] LMS
3,446,550 UART: [kat] --
3,450,776 UART: [cold-reset] ++
3,452,287 UART: [fht] FHT @ 0x50003400
3,463,976 UART: [idev] ++
3,464,547 UART: [idev] CDI.KEYID = 6
3,465,496 UART: [idev] SUBJECT.KEYID = 7
3,466,712 UART: [idev] UDS.KEYID = 0
3,469,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,995 UART: [idev] Erasing UDS.KEYID = 0
5,986,375 UART: [idev] Sha1 KeyId Algorithm
6,010,853 UART: [idev] --
6,015,394 UART: [ldev] ++
6,015,978 UART: [ldev] CDI.KEYID = 6
6,016,905 UART: [ldev] SUBJECT.KEYID = 5
6,018,093 UART: [ldev] AUTHORITY.KEYID = 7
6,019,340 UART: [ldev] FE.KEYID = 1
6,056,558 UART: [ldev] Erasing FE.KEYID = 1
8,561,391 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,699 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,574 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,953 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,762 UART: [ldev] --
10,371,743 UART: [fwproc] Wait for Commands...
10,373,476 UART: [fwproc] Recv command 0x46574c44
10,375,469 UART: [fwproc] Recv'd Img size: 118548 bytes
13,889,362 UART: ROM Fatal Error: 0x000B002E
13,892,663 >>> mbox cmd response: failed
13,893,013 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,893,300 >>> mbox cmd response: failed
13,893,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,894,009 >>> mbox cmd response: failed
Initializing fuses
2,059,898 writing to cptra_bootfsm_go
2,249,203 UART:
2,249,549 UART: Running Caliptra ROM ...
2,250,597 UART:
2,250,753 UART: [state] CFI Enabled
2,323,364 UART: [state] LifecycleState = Manufacturing
2,325,306 UART: [state] DebugLocked = No
2,327,918 UART: [state] WD Timer not started. Device not locked for debugging
2,331,176 UART: [kat] SHA2-256
2,510,783 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,575 UART: [kat] ++
2,522,039 UART: [kat] sha1
2,533,475 UART: [kat] SHA2-256
2,536,223 UART: [kat] SHA2-384
2,541,132 UART: [kat] SHA2-512-ACC
2,543,495 UART: [kat] ECC-384
5,007,811 UART: [kat] HMAC-384Kdf
5,032,150 UART: [kat] LMS
5,508,668 UART: [kat] --
5,514,676 UART: [cold-reset] ++
5,516,859 UART: [fht] FHT @ 0x50003400
5,528,824 UART: [idev] ++
5,529,394 UART: [idev] CDI.KEYID = 6
5,530,339 UART: [idev] SUBJECT.KEYID = 7
5,531,615 UART: [idev] UDS.KEYID = 0
5,534,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,683,593 UART: [idev] Erasing UDS.KEYID = 0
8,038,831 UART: [idev] Sha1 KeyId Algorithm
8,063,631 UART: [idev] --
8,068,124 UART: [ldev] ++
8,068,704 UART: [ldev] CDI.KEYID = 6
8,069,626 UART: [ldev] SUBJECT.KEYID = 5
8,070,850 UART: [ldev] AUTHORITY.KEYID = 7
8,072,306 UART: [ldev] FE.KEYID = 1
8,108,391 UART: [ldev] Erasing FE.KEYID = 1
10,619,885 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,360 UART: [ldev] --
12,429,229 UART: [fwproc] Wait for Commands...
12,431,729 UART: [fwproc] Recv command 0x46574c44
12,433,722 UART: [fwproc] Recv'd Img size: 118548 bytes
15,945,957 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,030,248 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,103,277 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,430,944 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,962 writing to cptra_bootfsm_go
3,463,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,803,257 >>> mbox cmd response: failed
13,803,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,371 >>> mbox cmd response: failed
13,804,646 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,804,947 >>> mbox cmd response: failed
Initializing fuses
2,060,284 writing to cptra_bootfsm_go
5,508,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,303,076 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,335 writing to cptra_bootfsm_go
192,495 UART:
192,862 UART: Running Caliptra ROM ...
193,995 UART:
603,813 UART: [state] CFI Enabled
614,578 UART: [state] LifecycleState = Manufacturing
616,491 UART: [state] DebugLocked = No
618,252 UART: [state] WD Timer not started. Device not locked for debugging
622,582 UART: [kat] SHA2-256
802,245 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,002 UART: [kat] ++
813,457 UART: [kat] sha1
823,746 UART: [kat] SHA2-256
826,479 UART: [kat] SHA2-384
832,036 UART: [kat] SHA2-512-ACC
834,386 UART: [kat] ECC-384
3,276,302 UART: [kat] HMAC-384Kdf
3,289,560 UART: [kat] LMS
3,766,084 UART: [kat] --
3,770,726 UART: [cold-reset] ++
3,772,302 UART: [fht] FHT @ 0x50003400
3,783,693 UART: [idev] ++
3,784,340 UART: [idev] CDI.KEYID = 6
3,785,264 UART: [idev] SUBJECT.KEYID = 7
3,786,494 UART: [idev] UDS.KEYID = 0
3,789,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,499 UART: [idev] Erasing UDS.KEYID = 0
6,260,673 UART: [idev] Sha1 KeyId Algorithm
6,285,455 UART: [idev] --
6,291,779 UART: [ldev] ++
6,292,355 UART: [ldev] CDI.KEYID = 6
6,293,270 UART: [ldev] SUBJECT.KEYID = 5
6,294,491 UART: [ldev] AUTHORITY.KEYID = 7
6,295,728 UART: [ldev] FE.KEYID = 1
6,308,432 UART: [ldev] Erasing FE.KEYID = 1
8,786,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,795 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,547 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,142 UART: [ldev] --
10,582,226 UART: [fwproc] Wait for Commands...
10,584,823 UART: [fwproc] Recv command 0x46574c44
10,586,817 UART: [fwproc] Recv'd Img size: 118548 bytes
14,096,754 UART: ROM Fatal Error: 0x000B002E
14,100,052 >>> mbox cmd response: failed
14,100,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,100,860 >>> mbox cmd response: failed
14,101,132 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,101,424 >>> mbox cmd response: failed
Initializing fuses
2,066,806 writing to cptra_bootfsm_go
2,256,098 UART:
2,256,458 UART: Running Caliptra ROM ...
2,257,506 UART:
6,350,859 UART: [state] CFI Enabled
6,363,712 UART: [state] LifecycleState = Manufacturing
6,365,623 UART: [state] DebugLocked = No
6,366,987 UART: [state] WD Timer not started. Device not locked for debugging
6,370,251 UART: [kat] SHA2-256
6,549,920 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,560,705 UART: [kat] ++
6,561,190 UART: [kat] sha1
6,571,812 UART: [kat] SHA2-256
6,574,503 UART: [kat] SHA2-384
6,580,132 UART: [kat] SHA2-512-ACC
6,582,497 UART: [kat] ECC-384
9,021,097 UART: [kat] HMAC-384Kdf
9,033,762 UART: [kat] LMS
9,510,262 UART: [kat] --
9,513,108 UART: [cold-reset] ++
9,514,478 UART: [fht] FHT @ 0x50003400
9,526,608 UART: [idev] ++
9,527,179 UART: [idev] CDI.KEYID = 6
9,528,200 UART: [idev] SUBJECT.KEYID = 7
9,529,368 UART: [idev] UDS.KEYID = 0
9,532,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,681,298 UART: [idev] Erasing UDS.KEYID = 0
12,004,918 UART: [idev] Sha1 KeyId Algorithm
12,028,427 UART: [idev] --
12,033,506 UART: [ldev] ++
12,034,105 UART: [ldev] CDI.KEYID = 6
12,035,029 UART: [ldev] SUBJECT.KEYID = 5
12,036,200 UART: [ldev] AUTHORITY.KEYID = 7
12,037,489 UART: [ldev] FE.KEYID = 1
12,050,084 UART: [ldev] Erasing FE.KEYID = 1
14,523,588 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,244,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,260,081 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,275,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,291,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,312,808 UART: [ldev] --
16,317,632 UART: [fwproc] Wait for Commands...
16,320,232 UART: [fwproc] Recv command 0x46574c44
16,322,239 UART: [fwproc] Recv'd Img size: 118548 bytes
19,839,520 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,917,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
19,990,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,318,574 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
3,780,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,010,455 >>> mbox cmd response: failed
14,011,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,011,406 >>> mbox cmd response: failed
14,011,679 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,011,980 >>> mbox cmd response: failed
Initializing fuses
2,072,837 writing to cptra_bootfsm_go
9,631,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,329,248 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,210 UART:
192,565 UART: Running Caliptra ROM ...
193,757 UART:
193,912 UART: [state] CFI Enabled
262,117 UART: [state] LifecycleState = Manufacturing
264,541 UART: [state] DebugLocked = No
266,435 UART: [state] WD Timer not started. Device not locked for debugging
271,573 UART: [kat] SHA2-256
461,464 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,211 UART: [kat] ++
472,666 UART: [kat] sha1
484,415 UART: [kat] SHA2-256
487,427 UART: [kat] SHA2-384
494,553 UART: [kat] SHA2-512-ACC
497,135 UART: [kat] ECC-384
2,944,546 UART: [kat] HMAC-384Kdf
2,970,123 UART: [kat] LMS
3,501,923 UART: [kat] --
3,506,689 UART: [cold-reset] ++
3,507,868 UART: [fht] FHT @ 0x50003400
3,519,298 UART: [idev] ++
3,519,975 UART: [idev] CDI.KEYID = 6
3,520,916 UART: [idev] SUBJECT.KEYID = 7
3,522,189 UART: [idev] UDS.KEYID = 0
3,524,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,294 UART: [idev] Erasing UDS.KEYID = 0
6,030,289 UART: [idev] Sha1 KeyId Algorithm
6,052,837 UART: [idev] --
6,057,657 UART: [ldev] ++
6,058,383 UART: [ldev] CDI.KEYID = 6
6,059,333 UART: [ldev] SUBJECT.KEYID = 5
6,060,452 UART: [ldev] AUTHORITY.KEYID = 7
6,061,638 UART: [ldev] FE.KEYID = 1
6,100,113 UART: [ldev] Erasing FE.KEYID = 1
8,608,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,626 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,730 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,789 UART: [ldev] --
10,408,115 UART: [fwproc] Wait for Commands...
10,410,869 UART: [fwproc] Recv command 0x46574c44
10,413,128 UART: [fwproc] Recv'd Img size: 118548 bytes
13,941,776 UART: ROM Fatal Error: 0x000B002E
13,945,447 >>> mbox cmd response: failed
13,945,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,946,312 >>> mbox cmd response: failed
13,946,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,946,882 >>> mbox cmd response: failed
Initializing fuses
2,060,854 writing to cptra_bootfsm_go
2,250,180 UART:
2,250,538 UART: Running Caliptra ROM ...
2,251,676 UART:
2,251,851 UART: [state] CFI Enabled
2,305,629 UART: [state] LifecycleState = Manufacturing
2,308,056 UART: [state] DebugLocked = No
2,309,994 UART: [state] WD Timer not started. Device not locked for debugging
2,314,347 UART: [kat] SHA2-256
2,504,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,514,962 UART: [kat] ++
2,515,510 UART: [kat] sha1
2,526,897 UART: [kat] SHA2-256
2,529,928 UART: [kat] SHA2-384
2,536,627 UART: [kat] SHA2-512-ACC
2,539,199 UART: [kat] ECC-384
4,992,869 UART: [kat] HMAC-384Kdf
5,017,060 UART: [kat] LMS
5,548,782 UART: [kat] --
5,554,151 UART: [cold-reset] ++
5,556,470 UART: [fht] FHT @ 0x50003400
5,568,049 UART: [idev] ++
5,568,739 UART: [idev] CDI.KEYID = 6
5,569,711 UART: [idev] SUBJECT.KEYID = 7
5,570,815 UART: [idev] UDS.KEYID = 0
5,573,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,722,470 UART: [idev] Erasing UDS.KEYID = 0
8,075,233 UART: [idev] Sha1 KeyId Algorithm
8,096,905 UART: [idev] --
8,100,905 UART: [ldev] ++
8,101,592 UART: [ldev] CDI.KEYID = 6
8,102,504 UART: [ldev] SUBJECT.KEYID = 5
8,103,669 UART: [ldev] AUTHORITY.KEYID = 7
8,104,905 UART: [ldev] FE.KEYID = 1
8,145,586 UART: [ldev] Erasing FE.KEYID = 1
10,650,727 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,386,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,401,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,416,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,431,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,452,249 UART: [ldev] --
12,457,649 UART: [fwproc] Wait for Commands...
12,460,455 UART: [fwproc] Recv command 0x46574c44
12,462,780 UART: [fwproc] Recv'd Img size: 118548 bytes
15,989,563 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,066,412 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,190,002 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,749,455 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,835 writing to cptra_bootfsm_go
3,442,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,392,755 >>> mbox cmd response: failed
14,393,410 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,393,769 >>> mbox cmd response: failed
14,394,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,394,348 >>> mbox cmd response: failed
Initializing fuses
2,060,257 writing to cptra_bootfsm_go
5,491,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,928,569 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,605 UART:
192,974 UART: Running Caliptra ROM ...
194,158 UART:
603,689 UART: [state] CFI Enabled
616,440 UART: [state] LifecycleState = Manufacturing
618,837 UART: [state] DebugLocked = No
620,474 UART: [state] WD Timer not started. Device not locked for debugging
625,157 UART: [kat] SHA2-256
815,041 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,861 UART: [kat] ++
826,367 UART: [kat] sha1
837,034 UART: [kat] SHA2-256
840,054 UART: [kat] SHA2-384
846,700 UART: [kat] SHA2-512-ACC
849,319 UART: [kat] ECC-384
3,290,566 UART: [kat] HMAC-384Kdf
3,303,183 UART: [kat] LMS
3,834,976 UART: [kat] --
3,839,484 UART: [cold-reset] ++
3,840,343 UART: [fht] FHT @ 0x50003400
3,852,737 UART: [idev] ++
3,853,438 UART: [idev] CDI.KEYID = 6
3,854,464 UART: [idev] SUBJECT.KEYID = 7
3,855,678 UART: [idev] UDS.KEYID = 0
3,858,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,833 UART: [idev] Erasing UDS.KEYID = 0
6,335,363 UART: [idev] Sha1 KeyId Algorithm
6,358,341 UART: [idev] --
6,363,045 UART: [ldev] ++
6,363,733 UART: [ldev] CDI.KEYID = 6
6,364,684 UART: [ldev] SUBJECT.KEYID = 5
6,365,849 UART: [ldev] AUTHORITY.KEYID = 7
6,367,084 UART: [ldev] FE.KEYID = 1
6,377,803 UART: [ldev] Erasing FE.KEYID = 1
8,853,606 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,640,490 UART: [ldev] --
10,646,470 UART: [fwproc] Wait for Commands...
10,648,015 UART: [fwproc] Recv command 0x46574c44
10,650,346 UART: [fwproc] Recv'd Img size: 118548 bytes
14,176,276 UART: ROM Fatal Error: 0x000B002E
14,179,947 >>> mbox cmd response: failed
14,180,382 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,180,723 >>> mbox cmd response: failed
14,181,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,181,307 >>> mbox cmd response: failed
Initializing fuses
2,065,086 writing to cptra_bootfsm_go
2,254,412 UART:
2,254,759 UART: Running Caliptra ROM ...
2,255,902 UART:
6,279,255 UART: [state] CFI Enabled
6,293,681 UART: [state] LifecycleState = Manufacturing
6,296,052 UART: [state] DebugLocked = No
6,298,880 UART: [state] WD Timer not started. Device not locked for debugging
6,303,563 UART: [kat] SHA2-256
6,493,447 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,504,247 UART: [kat] ++
6,504,713 UART: [kat] sha1
6,515,495 UART: [kat] SHA2-256
6,518,508 UART: [kat] SHA2-384
6,523,929 UART: [kat] SHA2-512-ACC
6,526,510 UART: [kat] ECC-384
8,967,767 UART: [kat] HMAC-384Kdf
8,981,622 UART: [kat] LMS
9,513,459 UART: [kat] --
9,516,593 UART: [cold-reset] ++
9,519,016 UART: [fht] FHT @ 0x50003400
9,530,224 UART: [idev] ++
9,530,956 UART: [idev] CDI.KEYID = 6
9,531,843 UART: [idev] SUBJECT.KEYID = 7
9,533,113 UART: [idev] UDS.KEYID = 0
9,535,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,684,436 UART: [idev] Erasing UDS.KEYID = 0
12,008,774 UART: [idev] Sha1 KeyId Algorithm
12,031,957 UART: [idev] --
12,038,093 UART: [ldev] ++
12,038,795 UART: [ldev] CDI.KEYID = 6
12,039,717 UART: [ldev] SUBJECT.KEYID = 5
12,040,845 UART: [ldev] AUTHORITY.KEYID = 7
12,042,084 UART: [ldev] FE.KEYID = 1
12,055,222 UART: [ldev] Erasing FE.KEYID = 1
14,535,169 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
16,253,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,268,275 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,283,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,298,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,318,963 UART: [ldev] --
16,324,666 UART: [fwproc] Wait for Commands...
16,327,361 UART: [fwproc] Recv command 0x46574c44
16,329,630 UART: [fwproc] Recv'd Img size: 118548 bytes
19,860,877 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
19,938,124 UART: [fwproc] Load FMC at address 0x40000000 len 20044
20,061,736 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
20,621,804 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,135 writing to cptra_bootfsm_go
3,757,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,619,425 >>> mbox cmd response: failed
14,620,032 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,620,409 >>> mbox cmd response: failed
14,620,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,620,998 >>> mbox cmd response: failed
Initializing fuses
2,054,318 writing to cptra_bootfsm_go
9,000,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,337,756 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,816 UART: [state] LifecycleState = Manufacturing
85,471 UART: [state] DebugLocked = No
86,119 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,211 UART: [kat] SHA2-256
892,149 UART: [kat] SHA2-384
894,866 UART: [kat] SHA2-512-ACC
896,767 UART: [kat] ECC-384
902,364 UART: [kat] HMAC-384Kdf
906,998 UART: [kat] LMS
1,475,194 UART: [kat] --
1,476,057 UART: [cold-reset] ++
1,476,435 UART: [fht] Storing FHT @ 0x50003400
1,479,336 UART: [idev] ++
1,479,504 UART: [idev] CDI.KEYID = 6
1,479,864 UART: [idev] SUBJECT.KEYID = 7
1,480,288 UART: [idev] UDS.KEYID = 0
1,480,633 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,802 UART: [idev] Erasing UDS.KEYID = 0
1,504,758 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,380 UART: [idev] --
1,514,435 UART: [ldev] ++
1,514,603 UART: [ldev] CDI.KEYID = 6
1,514,966 UART: [ldev] SUBJECT.KEYID = 5
1,515,392 UART: [ldev] AUTHORITY.KEYID = 7
1,515,855 UART: [ldev] FE.KEYID = 1
1,520,831 UART: [ldev] Erasing FE.KEYID = 1
1,546,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,490 UART: [ldev] --
1,585,763 UART: [fwproc] Waiting for Commands...
1,586,552 UART: [fwproc] Received command 0x46574c44
1,587,343 UART: [fwproc] Received Image of size 118548 bytes
2,957,849 UART: ROM Fatal Error: 0x000B002E
2,959,008 >>> mbox cmd response: failed
2,959,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,014 >>> mbox cmd response: failed
2,959,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,959,020 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,655 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,233 UART: [kat] SHA2-256
882,164 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,279 UART: [kat] ++
886,431 UART: [kat] sha1
890,619 UART: [kat] SHA2-256
892,557 UART: [kat] SHA2-384
895,460 UART: [kat] SHA2-512-ACC
897,361 UART: [kat] ECC-384
902,928 UART: [kat] HMAC-384Kdf
907,450 UART: [kat] LMS
1,475,646 UART: [kat] --
1,476,763 UART: [cold-reset] ++
1,477,269 UART: [fht] Storing FHT @ 0x50003400
1,480,000 UART: [idev] ++
1,480,168 UART: [idev] CDI.KEYID = 6
1,480,528 UART: [idev] SUBJECT.KEYID = 7
1,480,952 UART: [idev] UDS.KEYID = 0
1,481,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,028 UART: [idev] Erasing UDS.KEYID = 0
1,505,226 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,924 UART: [idev] --
1,515,127 UART: [ldev] ++
1,515,295 UART: [ldev] CDI.KEYID = 6
1,515,658 UART: [ldev] SUBJECT.KEYID = 5
1,516,084 UART: [ldev] AUTHORITY.KEYID = 7
1,516,547 UART: [ldev] FE.KEYID = 1
1,521,589 UART: [ldev] Erasing FE.KEYID = 1
1,546,506 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,486 UART: [ldev] --
1,585,767 UART: [fwproc] Waiting for Commands...
1,586,414 UART: [fwproc] Received command 0x46574c44
1,587,205 UART: [fwproc] Received Image of size 118548 bytes
2,932,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,300 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,899 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,809,513 >>> mbox cmd response: failed
2,809,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,519 >>> mbox cmd response: failed
2,809,519 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,809,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,069 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,769 UART: [state] LifecycleState = Manufacturing
86,424 UART: [state] DebugLocked = No
86,910 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,580 UART: [kat] SHA2-256
882,511 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,626 UART: [kat] ++
886,778 UART: [kat] sha1
891,118 UART: [kat] SHA2-256
893,056 UART: [kat] SHA2-384
895,807 UART: [kat] SHA2-512-ACC
897,708 UART: [kat] ECC-384
903,815 UART: [kat] HMAC-384Kdf
908,393 UART: [kat] LMS
1,476,589 UART: [kat] --
1,477,520 UART: [cold-reset] ++
1,478,036 UART: [fht] Storing FHT @ 0x50003400
1,480,971 UART: [idev] ++
1,481,139 UART: [idev] CDI.KEYID = 6
1,481,499 UART: [idev] SUBJECT.KEYID = 7
1,481,923 UART: [idev] UDS.KEYID = 0
1,482,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,490,067 UART: [idev] Erasing UDS.KEYID = 0
1,506,985 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,745 UART: [idev] --
1,516,924 UART: [ldev] ++
1,517,092 UART: [ldev] CDI.KEYID = 6
1,517,455 UART: [ldev] SUBJECT.KEYID = 5
1,517,881 UART: [ldev] AUTHORITY.KEYID = 7
1,518,344 UART: [ldev] FE.KEYID = 1
1,523,744 UART: [ldev] Erasing FE.KEYID = 1
1,549,545 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,094 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,810 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,701 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,413 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,349 UART: [ldev] --
1,588,858 UART: [fwproc] Waiting for Commands...
1,589,683 UART: [fwproc] Received command 0x46574c44
1,590,474 UART: [fwproc] Received Image of size 118548 bytes
2,959,794 UART: ROM Fatal Error: 0x000B002E
2,960,953 >>> mbox cmd response: failed
2,960,953 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,960,959 >>> mbox cmd response: failed
2,960,959 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,960,965 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,657 UART: [state] LifecycleState = Unprovisioned
86,312 UART: [state] DebugLocked = No
86,930 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,490 UART: [kat] SHA2-256
882,421 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,536 UART: [kat] ++
886,688 UART: [kat] sha1
891,040 UART: [kat] SHA2-256
892,978 UART: [kat] SHA2-384
895,847 UART: [kat] SHA2-512-ACC
897,748 UART: [kat] ECC-384
903,223 UART: [kat] HMAC-384Kdf
908,061 UART: [kat] LMS
1,476,257 UART: [kat] --
1,476,928 UART: [cold-reset] ++
1,477,384 UART: [fht] Storing FHT @ 0x50003400
1,479,983 UART: [idev] ++
1,480,151 UART: [idev] CDI.KEYID = 6
1,480,511 UART: [idev] SUBJECT.KEYID = 7
1,480,935 UART: [idev] UDS.KEYID = 0
1,481,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,619 UART: [idev] Erasing UDS.KEYID = 0
1,505,445 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,917 UART: [idev] --
1,515,084 UART: [ldev] ++
1,515,252 UART: [ldev] CDI.KEYID = 6
1,515,615 UART: [ldev] SUBJECT.KEYID = 5
1,516,041 UART: [ldev] AUTHORITY.KEYID = 7
1,516,504 UART: [ldev] FE.KEYID = 1
1,521,646 UART: [ldev] Erasing FE.KEYID = 1
1,546,947 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,847 UART: [ldev] --
1,586,232 UART: [fwproc] Waiting for Commands...
1,586,915 UART: [fwproc] Received command 0x46574c44
1,587,706 UART: [fwproc] Received Image of size 118548 bytes
2,932,875 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,427 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,645 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,914 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,640 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,662 >>> mbox cmd response: failed
2,810,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,668 >>> mbox cmd response: failed
2,810,668 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,810,674 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,076 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,492 UART: [state] LifecycleState = Manufacturing
86,147 UART: [state] DebugLocked = No
86,683 UART: [state] WD Timer not started. Device not locked for debugging
87,880 UART: [kat] SHA2-256
891,430 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,534 UART: [kat] ++
895,686 UART: [kat] sha1
900,012 UART: [kat] SHA2-256
901,952 UART: [kat] SHA2-384
904,755 UART: [kat] SHA2-512-ACC
906,656 UART: [kat] ECC-384
916,157 UART: [kat] HMAC-384Kdf
920,815 UART: [kat] LMS
1,169,127 UART: [kat] --
1,170,132 UART: [cold-reset] ++
1,170,624 UART: [fht] FHT @ 0x50003400
1,173,326 UART: [idev] ++
1,173,494 UART: [idev] CDI.KEYID = 6
1,173,855 UART: [idev] SUBJECT.KEYID = 7
1,174,280 UART: [idev] UDS.KEYID = 0
1,174,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,171 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,435 UART: [idev] --
1,209,490 UART: [ldev] ++
1,209,658 UART: [ldev] CDI.KEYID = 6
1,210,022 UART: [ldev] SUBJECT.KEYID = 5
1,210,449 UART: [ldev] AUTHORITY.KEYID = 7
1,210,912 UART: [ldev] FE.KEYID = 1
1,215,984 UART: [ldev] Erasing FE.KEYID = 1
1,241,617 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,424 UART: [ldev] --
1,280,685 UART: [fwproc] Wait for Commands...
1,281,470 UART: [fwproc] Recv command 0x46574c44
1,282,203 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,857 UART: ROM Fatal Error: 0x000B002E
2,652,016 >>> mbox cmd response: failed
2,652,016 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,022 >>> mbox cmd response: failed
2,652,022 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,773 UART: [state] WD Timer not started. Device not locked for debugging
87,938 UART: [kat] SHA2-256
891,488 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,592 UART: [kat] ++
895,744 UART: [kat] sha1
899,978 UART: [kat] SHA2-256
901,918 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,569 UART: [kat] HMAC-384Kdf
921,133 UART: [kat] LMS
1,169,445 UART: [kat] --
1,170,154 UART: [cold-reset] ++
1,170,512 UART: [fht] FHT @ 0x50003400
1,173,134 UART: [idev] ++
1,173,302 UART: [idev] CDI.KEYID = 6
1,173,663 UART: [idev] SUBJECT.KEYID = 7
1,174,088 UART: [idev] UDS.KEYID = 0
1,174,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,029 UART: [idev] Erasing UDS.KEYID = 0
1,199,205 UART: [idev] Sha1 KeyId Algorithm
1,208,157 UART: [idev] --
1,209,110 UART: [ldev] ++
1,209,278 UART: [ldev] CDI.KEYID = 6
1,209,642 UART: [ldev] SUBJECT.KEYID = 5
1,210,069 UART: [ldev] AUTHORITY.KEYID = 7
1,210,532 UART: [ldev] FE.KEYID = 1
1,215,756 UART: [ldev] Erasing FE.KEYID = 1
1,241,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,476 UART: [ldev] --
1,280,887 UART: [fwproc] Wait for Commands...
1,281,626 UART: [fwproc] Recv command 0x46574c44
1,282,359 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,857 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,208 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,658 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,245 >>> mbox cmd response: failed
2,506,245 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,251 >>> mbox cmd response: failed
2,506,251 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,625 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,391 UART: [state] LifecycleState = Manufacturing
86,046 UART: [state] DebugLocked = No
86,682 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,775 UART: [kat] SHA2-256
901,715 UART: [kat] SHA2-384
904,414 UART: [kat] SHA2-512-ACC
906,315 UART: [kat] ECC-384
916,368 UART: [kat] HMAC-384Kdf
921,068 UART: [kat] LMS
1,169,380 UART: [kat] --
1,170,263 UART: [cold-reset] ++
1,170,791 UART: [fht] FHT @ 0x50003400
1,173,631 UART: [idev] ++
1,173,799 UART: [idev] CDI.KEYID = 6
1,174,160 UART: [idev] SUBJECT.KEYID = 7
1,174,585 UART: [idev] UDS.KEYID = 0
1,174,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,434 UART: [idev] Erasing UDS.KEYID = 0
1,199,454 UART: [idev] Sha1 KeyId Algorithm
1,208,454 UART: [idev] --
1,209,389 UART: [ldev] ++
1,209,557 UART: [ldev] CDI.KEYID = 6
1,209,921 UART: [ldev] SUBJECT.KEYID = 5
1,210,348 UART: [ldev] AUTHORITY.KEYID = 7
1,210,811 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,399 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,251 UART: [ldev] --
1,281,602 UART: [fwproc] Wait for Commands...
1,282,249 UART: [fwproc] Recv command 0x46574c44
1,282,982 UART: [fwproc] Recv'd Img size: 118548 bytes
2,650,880 UART: ROM Fatal Error: 0x000B002E
2,652,039 >>> mbox cmd response: failed
2,652,039 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,045 >>> mbox cmd response: failed
2,652,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,652,051 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,666 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
891,553 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,657 UART: [kat] ++
895,809 UART: [kat] sha1
900,127 UART: [kat] SHA2-256
902,067 UART: [kat] SHA2-384
904,750 UART: [kat] SHA2-512-ACC
906,651 UART: [kat] ECC-384
916,434 UART: [kat] HMAC-384Kdf
921,152 UART: [kat] LMS
1,169,464 UART: [kat] --
1,170,193 UART: [cold-reset] ++
1,170,681 UART: [fht] FHT @ 0x50003400
1,173,361 UART: [idev] ++
1,173,529 UART: [idev] CDI.KEYID = 6
1,173,890 UART: [idev] SUBJECT.KEYID = 7
1,174,315 UART: [idev] UDS.KEYID = 0
1,174,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,450 UART: [idev] Erasing UDS.KEYID = 0
1,199,432 UART: [idev] Sha1 KeyId Algorithm
1,208,240 UART: [idev] --
1,209,403 UART: [ldev] ++
1,209,571 UART: [ldev] CDI.KEYID = 6
1,209,935 UART: [ldev] SUBJECT.KEYID = 5
1,210,362 UART: [ldev] AUTHORITY.KEYID = 7
1,210,825 UART: [ldev] FE.KEYID = 1
1,216,037 UART: [ldev] Erasing FE.KEYID = 1
1,242,470 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,475 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,187 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,403 UART: [ldev] --
1,281,744 UART: [fwproc] Wait for Commands...
1,282,485 UART: [fwproc] Recv command 0x46574c44
1,283,218 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,490 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,757 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,932 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,165 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,506,766 >>> mbox cmd response: failed
2,506,766 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,772 >>> mbox cmd response: failed
2,506,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,506,778 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,374 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Manufacturing
85,625 UART: [state] DebugLocked = No
86,229 UART: [state] WD Timer not started. Device not locked for debugging
87,586 UART: [kat] SHA2-256
893,236 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,361 UART: [kat] ++
897,513 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,430 UART: [kat] SHA2-512-ACC
908,331 UART: [kat] ECC-384
917,844 UART: [kat] HMAC-384Kdf
922,414 UART: [kat] LMS
1,170,742 UART: [kat] --
1,171,649 UART: [cold-reset] ++
1,172,019 UART: [fht] FHT @ 0x50003400
1,174,720 UART: [idev] ++
1,174,888 UART: [idev] CDI.KEYID = 6
1,175,248 UART: [idev] SUBJECT.KEYID = 7
1,175,672 UART: [idev] UDS.KEYID = 0
1,176,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,608 UART: [idev] Erasing UDS.KEYID = 0
1,200,635 UART: [idev] Sha1 KeyId Algorithm
1,209,301 UART: [idev] --
1,210,379 UART: [ldev] ++
1,210,547 UART: [ldev] CDI.KEYID = 6
1,210,910 UART: [ldev] SUBJECT.KEYID = 5
1,211,336 UART: [ldev] AUTHORITY.KEYID = 7
1,211,799 UART: [ldev] FE.KEYID = 1
1,217,271 UART: [ldev] Erasing FE.KEYID = 1
1,242,630 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,281,912 UART: [fwproc] Wait for Commands...
1,282,656 UART: [fwproc] Recv command 0x46574c44
1,283,384 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,310 UART: ROM Fatal Error: 0x000B002E
2,653,469 >>> mbox cmd response: failed
2,653,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,475 >>> mbox cmd response: failed
2,653,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,481 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,677 UART: [kat] SHA2-256
903,617 UART: [kat] SHA2-384
906,156 UART: [kat] SHA2-512-ACC
908,057 UART: [kat] ECC-384
918,056 UART: [kat] HMAC-384Kdf
922,640 UART: [kat] LMS
1,170,968 UART: [kat] --
1,172,041 UART: [cold-reset] ++
1,172,373 UART: [fht] FHT @ 0x50003400
1,174,870 UART: [idev] ++
1,175,038 UART: [idev] CDI.KEYID = 6
1,175,398 UART: [idev] SUBJECT.KEYID = 7
1,175,822 UART: [idev] UDS.KEYID = 0
1,176,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,726 UART: [idev] Erasing UDS.KEYID = 0
1,200,409 UART: [idev] Sha1 KeyId Algorithm
1,209,023 UART: [idev] --
1,210,085 UART: [ldev] ++
1,210,253 UART: [ldev] CDI.KEYID = 6
1,210,616 UART: [ldev] SUBJECT.KEYID = 5
1,211,042 UART: [ldev] AUTHORITY.KEYID = 7
1,211,505 UART: [ldev] FE.KEYID = 1
1,216,675 UART: [ldev] Erasing FE.KEYID = 1
1,242,786 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,191 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,510 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,579 UART: [ldev] --
1,281,954 UART: [fwproc] Wait for Commands...
1,282,636 UART: [fwproc] Recv command 0x46574c44
1,283,364 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,220 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,027 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,197 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,488 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,835 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,509,068 >>> mbox cmd response: failed
2,509,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,074 >>> mbox cmd response: failed
2,509,074 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,509,080 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,553 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,367 UART: [state] LifecycleState = Manufacturing
85,022 UART: [state] DebugLocked = No
85,748 UART: [state] WD Timer not started. Device not locked for debugging
87,049 UART: [kat] SHA2-256
892,699 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,824 UART: [kat] ++
896,976 UART: [kat] sha1
901,114 UART: [kat] SHA2-256
903,054 UART: [kat] SHA2-384
905,597 UART: [kat] SHA2-512-ACC
907,498 UART: [kat] ECC-384
917,691 UART: [kat] HMAC-384Kdf
922,249 UART: [kat] LMS
1,170,577 UART: [kat] --
1,171,574 UART: [cold-reset] ++
1,171,960 UART: [fht] FHT @ 0x50003400
1,174,541 UART: [idev] ++
1,174,709 UART: [idev] CDI.KEYID = 6
1,175,069 UART: [idev] SUBJECT.KEYID = 7
1,175,493 UART: [idev] UDS.KEYID = 0
1,175,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,623 UART: [idev] Erasing UDS.KEYID = 0
1,200,394 UART: [idev] Sha1 KeyId Algorithm
1,208,992 UART: [idev] --
1,210,184 UART: [ldev] ++
1,210,352 UART: [ldev] CDI.KEYID = 6
1,210,715 UART: [ldev] SUBJECT.KEYID = 5
1,211,141 UART: [ldev] AUTHORITY.KEYID = 7
1,211,604 UART: [ldev] FE.KEYID = 1
1,216,716 UART: [ldev] Erasing FE.KEYID = 1
1,242,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,787 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,499 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,598 UART: [ldev] --
1,281,953 UART: [fwproc] Wait for Commands...
1,282,655 UART: [fwproc] Recv command 0x46574c44
1,283,383 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,373 UART: ROM Fatal Error: 0x000B002E
2,653,532 >>> mbox cmd response: failed
2,653,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,538 >>> mbox cmd response: failed
2,653,538 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,544 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,455 UART: [state] LifecycleState = Unprovisioned
86,110 UART: [state] DebugLocked = No
86,812 UART: [state] WD Timer not started. Device not locked for debugging
88,097 UART: [kat] SHA2-256
893,747 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,872 UART: [kat] ++
898,024 UART: [kat] sha1
902,342 UART: [kat] SHA2-256
904,282 UART: [kat] SHA2-384
907,217 UART: [kat] SHA2-512-ACC
909,118 UART: [kat] ECC-384
918,799 UART: [kat] HMAC-384Kdf
923,279 UART: [kat] LMS
1,171,607 UART: [kat] --
1,172,692 UART: [cold-reset] ++
1,173,024 UART: [fht] FHT @ 0x50003400
1,175,897 UART: [idev] ++
1,176,065 UART: [idev] CDI.KEYID = 6
1,176,425 UART: [idev] SUBJECT.KEYID = 7
1,176,849 UART: [idev] UDS.KEYID = 0
1,177,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,760 UART: [idev] Sha1 KeyId Algorithm
1,210,390 UART: [idev] --
1,211,496 UART: [ldev] ++
1,211,664 UART: [ldev] CDI.KEYID = 6
1,212,027 UART: [ldev] SUBJECT.KEYID = 5
1,212,453 UART: [ldev] AUTHORITY.KEYID = 7
1,212,916 UART: [ldev] FE.KEYID = 1
1,218,154 UART: [ldev] Erasing FE.KEYID = 1
1,244,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,038 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,744 UART: [ldev] --
1,284,021 UART: [fwproc] Wait for Commands...
1,284,831 UART: [fwproc] Recv command 0x46574c44
1,285,559 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,327 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,770 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,940 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,213 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,510,253 >>> mbox cmd response: failed
2,510,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,510,259 >>> mbox cmd response: failed
2,510,259 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,510,265 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,118 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,874 >>> mbox cmd response: success
test fw_load::fw_load_error_runtime_svn_less_than_fuse ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,105 writing to cptra_bootfsm_go
3,444,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,354,887 >>> mbox cmd response: failed
12,355,619 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,355,985 >>> mbox cmd response: failed
12,356,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,356,571 >>> mbox cmd response: failed
Initializing fuses
2,062,367 writing to cptra_bootfsm_go
5,504,148 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,333,491 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,446,397 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,360,720 >>> mbox cmd response: failed
12,361,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,361,845 >>> mbox cmd response: failed
12,362,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,362,491 >>> mbox cmd response: failed
Initializing fuses
2,065,487 writing to cptra_bootfsm_go
5,508,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,334,077 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,781,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,570,279 >>> mbox cmd response: failed
12,570,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,571,206 >>> mbox cmd response: failed
12,571,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,571,778 >>> mbox cmd response: failed
Initializing fuses
2,059,961 writing to cptra_bootfsm_go
11,075,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,786,218 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,773,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,571,120 >>> mbox cmd response: failed
12,571,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,072 >>> mbox cmd response: failed
12,572,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,572,697 >>> mbox cmd response: failed
Initializing fuses
2,063,556 writing to cptra_bootfsm_go
11,079,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,795,462 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,448,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,352,423 >>> mbox cmd response: failed
12,353,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,353,402 >>> mbox cmd response: failed
12,353,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,353,964 >>> mbox cmd response: failed
Initializing fuses
2,062,453 writing to cptra_bootfsm_go
5,492,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,325,911 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,951 writing to cptra_bootfsm_go
3,450,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,353,181 >>> mbox cmd response: failed
12,353,974 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,354,363 >>> mbox cmd response: failed
12,354,645 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,354,939 >>> mbox cmd response: failed
Initializing fuses
2,063,004 writing to cptra_bootfsm_go
5,527,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,374,632 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
3,777,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,566,860 >>> mbox cmd response: failed
12,567,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,568,015 >>> mbox cmd response: failed
12,568,287 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,568,579 >>> mbox cmd response: failed
Initializing fuses
2,069,005 writing to cptra_bootfsm_go
11,076,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,796,268 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,780,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,569,200 >>> mbox cmd response: failed
12,569,928 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,570,295 >>> mbox cmd response: failed
12,570,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,570,874 >>> mbox cmd response: failed
Initializing fuses
2,063,472 writing to cptra_bootfsm_go
11,076,790 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,796,801 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,731 >>> mbox cmd response: failed
1,204,731 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,737 >>> mbox cmd response: failed
1,204,737 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,531 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
891,334 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,438 UART: [kat] ++
895,590 UART: [kat] sha1
899,716 UART: [kat] SHA2-256
901,656 UART: [kat] SHA2-384
904,529 UART: [kat] SHA2-512-ACC
906,430 UART: [kat] ECC-384
916,435 UART: [kat] HMAC-384Kdf
921,037 UART: [kat] LMS
1,169,349 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,722 UART: [fht] FHT @ 0x50003400
1,173,238 UART: [idev] ++
1,173,406 UART: [idev] CDI.KEYID = 6
1,173,767 UART: [idev] SUBJECT.KEYID = 7
1,174,192 UART: [idev] UDS.KEYID = 0
1,174,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,551 UART: [idev] Erasing UDS.KEYID = 0
1,199,799 UART: [idev] Sha1 KeyId Algorithm
1,208,559 UART: [idev] --
1,209,464 UART: [ldev] ++
1,209,632 UART: [ldev] CDI.KEYID = 6
1,209,996 UART: [ldev] SUBJECT.KEYID = 5
1,210,423 UART: [ldev] AUTHORITY.KEYID = 7
1,210,886 UART: [ldev] FE.KEYID = 1
1,215,928 UART: [ldev] Erasing FE.KEYID = 1
1,242,425 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,873 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,589 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,202 UART: [ldev] --
1,281,615 UART: [fwproc] Wait for Commands...
1,282,236 UART: [fwproc] Recv command 0x46574c44
1,282,969 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,325 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,706 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,607 >>> mbox cmd response: failed
1,204,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,613 >>> mbox cmd response: failed
1,204,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,393 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,208,664 >>> mbox cmd response: failed
1,208,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,670 >>> mbox cmd response: failed
1,208,670 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,208,676 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
86,045 UART: [state] LifecycleState = Unprovisioned
86,700 UART: [state] DebugLocked = No
87,384 UART: [state] WD Timer not started. Device not locked for debugging
88,633 UART: [kat] SHA2-256
892,183 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,287 UART: [kat] ++
896,439 UART: [kat] sha1
900,647 UART: [kat] SHA2-256
902,587 UART: [kat] SHA2-384
905,230 UART: [kat] SHA2-512-ACC
907,131 UART: [kat] ECC-384
916,776 UART: [kat] HMAC-384Kdf
921,584 UART: [kat] LMS
1,169,896 UART: [kat] --
1,170,959 UART: [cold-reset] ++
1,171,473 UART: [fht] FHT @ 0x50003400
1,174,143 UART: [idev] ++
1,174,311 UART: [idev] CDI.KEYID = 6
1,174,672 UART: [idev] SUBJECT.KEYID = 7
1,175,097 UART: [idev] UDS.KEYID = 0
1,175,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,008 UART: [idev] Erasing UDS.KEYID = 0
1,200,542 UART: [idev] Sha1 KeyId Algorithm
1,209,448 UART: [idev] --
1,210,489 UART: [ldev] ++
1,210,657 UART: [ldev] CDI.KEYID = 6
1,211,021 UART: [ldev] SUBJECT.KEYID = 5
1,211,448 UART: [ldev] AUTHORITY.KEYID = 7
1,211,911 UART: [ldev] FE.KEYID = 1
1,217,211 UART: [ldev] Erasing FE.KEYID = 1
1,243,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,639 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,351 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,223 UART: [ldev] --
1,282,458 UART: [fwproc] Wait for Commands...
1,283,267 UART: [fwproc] Recv command 0x46574c44
1,284,000 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,112 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,503 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,207,846 >>> mbox cmd response: failed
1,207,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,852 >>> mbox cmd response: failed
1,207,852 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,207,858 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,606 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,487 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,358 >>> mbox cmd response: failed
1,206,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,364 >>> mbox cmd response: failed
1,206,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,370 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,162 UART: [state] LifecycleState = Unprovisioned
85,817 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
893,168 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,293 UART: [kat] ++
897,445 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,190 UART: [kat] SHA2-512-ACC
908,091 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,674 UART: [kat] LMS
1,171,002 UART: [kat] --
1,171,637 UART: [cold-reset] ++
1,172,001 UART: [fht] FHT @ 0x50003400
1,174,458 UART: [idev] ++
1,174,626 UART: [idev] CDI.KEYID = 6
1,174,986 UART: [idev] SUBJECT.KEYID = 7
1,175,410 UART: [idev] UDS.KEYID = 0
1,175,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,410 UART: [idev] Erasing UDS.KEYID = 0
1,200,517 UART: [idev] Sha1 KeyId Algorithm
1,208,993 UART: [idev] --
1,210,139 UART: [ldev] ++
1,210,307 UART: [ldev] CDI.KEYID = 6
1,210,670 UART: [ldev] SUBJECT.KEYID = 5
1,211,096 UART: [ldev] AUTHORITY.KEYID = 7
1,211,559 UART: [ldev] FE.KEYID = 1
1,216,585 UART: [ldev] Erasing FE.KEYID = 1
1,243,006 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,773 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,489 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,235 UART: [ldev] --
1,282,556 UART: [fwproc] Wait for Commands...
1,283,340 UART: [fwproc] Recv command 0x46574c44
1,284,068 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,105 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,275 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,656 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,895 >>> mbox cmd response: failed
1,205,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,901 >>> mbox cmd response: failed
1,205,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,907 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,333 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,205,512 >>> mbox cmd response: failed
1,205,512 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,518 >>> mbox cmd response: failed
1,205,518 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,205,524 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,483 UART: [state] LifecycleState = Unprovisioned
86,138 UART: [state] DebugLocked = No
86,836 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
893,821 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,946 UART: [kat] ++
898,098 UART: [kat] sha1
902,160 UART: [kat] SHA2-256
904,100 UART: [kat] SHA2-384
906,799 UART: [kat] SHA2-512-ACC
908,700 UART: [kat] ECC-384
918,525 UART: [kat] HMAC-384Kdf
923,117 UART: [kat] LMS
1,171,445 UART: [kat] --
1,172,382 UART: [cold-reset] ++
1,172,838 UART: [fht] FHT @ 0x50003400
1,175,547 UART: [idev] ++
1,175,715 UART: [idev] CDI.KEYID = 6
1,176,075 UART: [idev] SUBJECT.KEYID = 7
1,176,499 UART: [idev] UDS.KEYID = 0
1,176,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,629 UART: [idev] Erasing UDS.KEYID = 0
1,201,498 UART: [idev] Sha1 KeyId Algorithm
1,210,112 UART: [idev] --
1,211,156 UART: [ldev] ++
1,211,324 UART: [ldev] CDI.KEYID = 6
1,211,687 UART: [ldev] SUBJECT.KEYID = 5
1,212,113 UART: [ldev] AUTHORITY.KEYID = 7
1,212,576 UART: [ldev] FE.KEYID = 1
1,217,978 UART: [ldev] Erasing FE.KEYID = 1
1,244,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,264 UART: [ldev] --
1,283,585 UART: [fwproc] Wait for Commands...
1,284,165 UART: [fwproc] Recv command 0x46574c44
1,284,893 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,567 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,514 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,684 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,833 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,206,500 >>> mbox cmd response: failed
1,206,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,506 >>> mbox cmd response: failed
1,206,506 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,206,512 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,068 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
192,136 UART:
192,494 UART: Running Caliptra ROM ...
193,576 UART:
193,720 UART: [state] CFI Enabled
260,951 UART: [state] LifecycleState = Unprovisioned
262,861 UART: [state] DebugLocked = No
264,785 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,123 UART: [kat] SHA2-256
438,799 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,333 UART: [kat] ++
449,819 UART: [kat] sha1
460,261 UART: [kat] SHA2-256
462,947 UART: [kat] SHA2-384
468,656 UART: [kat] SHA2-512-ACC
471,003 UART: [kat] ECC-384
2,765,717 UART: [kat] HMAC-384Kdf
2,796,875 UART: [kat] LMS
3,987,217 UART: [kat] --
3,993,556 UART: [cold-reset] ++
3,994,775 UART: [fht] Storing FHT @ 0x50003400
4,007,430 UART: [idev] ++
4,008,004 UART: [idev] CDI.KEYID = 6
4,008,905 UART: [idev] SUBJECT.KEYID = 7
4,010,179 UART: [idev] UDS.KEYID = 0
4,013,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,707 UART: [idev] Erasing UDS.KEYID = 0
7,347,026 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,507 UART: [idev] --
7,372,964 UART: [ldev] ++
7,373,542 UART: [ldev] CDI.KEYID = 6
7,374,481 UART: [ldev] SUBJECT.KEYID = 5
7,375,695 UART: [ldev] AUTHORITY.KEYID = 7
7,376,931 UART: [ldev] FE.KEYID = 1
7,419,168 UART: [ldev] Erasing FE.KEYID = 1
10,753,672 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,874 UART: [ldev] --
13,112,601 UART: [fwproc] Waiting for Commands...
13,114,455 UART: [fwproc] Received command 0x46574c44
13,116,655 UART: [fwproc] Received Image of size 118548 bytes
15,822,938 UART: ROM Fatal Error: 0x000B0012
15,826,455 >>> mbox cmd response: failed
15,826,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,150 >>> mbox cmd response: failed
15,827,426 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,827,727 >>> mbox cmd response: failed
Initializing fuses
2,060,294 writing to cptra_bootfsm_go
2,249,600 UART:
2,249,961 UART: Running Caliptra ROM ...
2,251,009 UART:
2,251,167 UART: [state] CFI Enabled
2,306,936 UART: [state] LifecycleState = Unprovisioned
2,308,831 UART: [state] DebugLocked = No
2,311,755 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,316,219 UART: [kat] SHA2-256
2,485,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,496,425 UART: [kat] ++
2,496,887 UART: [kat] sha1
2,508,752 UART: [kat] SHA2-256
2,511,453 UART: [kat] SHA2-384
2,517,228 UART: [kat] SHA2-512-ACC
2,519,578 UART: [kat] ECC-384
4,813,044 UART: [kat] HMAC-384Kdf
4,843,317 UART: [kat] LMS
6,033,635 UART: [kat] --
6,038,237 UART: [cold-reset] ++
6,039,203 UART: [fht] Storing FHT @ 0x50003400
6,050,288 UART: [idev] ++
6,050,851 UART: [idev] CDI.KEYID = 6
6,051,789 UART: [idev] SUBJECT.KEYID = 7
6,053,064 UART: [idev] UDS.KEYID = 0
6,055,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,204,513 UART: [idev] Erasing UDS.KEYID = 0
9,389,051 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,877 UART: [idev] --
9,414,389 UART: [ldev] ++
9,414,961 UART: [ldev] CDI.KEYID = 6
9,415,899 UART: [ldev] SUBJECT.KEYID = 5
9,417,192 UART: [ldev] AUTHORITY.KEYID = 7
9,418,380 UART: [ldev] FE.KEYID = 1
9,464,801 UART: [ldev] Erasing FE.KEYID = 1
12,797,966 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,090,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,105,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,120,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,134,639 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,152,342 UART: [ldev] --
15,157,608 UART: [fwproc] Waiting for Commands...
15,159,275 UART: [fwproc] Received command 0x46574c44
15,161,465 UART: [fwproc] Received Image of size 118548 bytes
19,266,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,342,379 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,415,572 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,744,790 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,864 writing to cptra_bootfsm_go
3,808,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,569,735 >>> mbox cmd response: failed
15,570,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,570,689 >>> mbox cmd response: failed
15,570,961 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,571,255 >>> mbox cmd response: failed
Initializing fuses
2,058,630 writing to cptra_bootfsm_go
5,857,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,038,376 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
192,480 UART:
192,912 UART: Running Caliptra ROM ...
194,042 UART:
603,747 UART: [state] CFI Enabled
616,767 UART: [state] LifecycleState = Unprovisioned
618,701 UART: [state] DebugLocked = No
620,638 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,285 UART: [kat] SHA2-256
796,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,571 UART: [kat] ++
807,023 UART: [kat] sha1
817,799 UART: [kat] SHA2-256
820,505 UART: [kat] SHA2-384
826,055 UART: [kat] SHA2-512-ACC
828,463 UART: [kat] ECC-384
3,113,208 UART: [kat] HMAC-384Kdf
3,125,838 UART: [kat] LMS
4,315,964 UART: [kat] --
4,320,133 UART: [cold-reset] ++
4,322,616 UART: [fht] Storing FHT @ 0x50003400
4,334,318 UART: [idev] ++
4,334,887 UART: [idev] CDI.KEYID = 6
4,335,829 UART: [idev] SUBJECT.KEYID = 7
4,337,102 UART: [idev] UDS.KEYID = 0
4,340,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,222 UART: [idev] Erasing UDS.KEYID = 0
7,627,909 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,685 UART: [idev] --
7,652,340 UART: [ldev] ++
7,652,932 UART: [ldev] CDI.KEYID = 6
7,653,858 UART: [ldev] SUBJECT.KEYID = 5
7,655,079 UART: [ldev] AUTHORITY.KEYID = 7
7,656,323 UART: [ldev] FE.KEYID = 1
7,665,681 UART: [ldev] Erasing FE.KEYID = 1
10,955,446 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,266,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,996 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,275 UART: [ldev] --
13,319,060 UART: [fwproc] Waiting for Commands...
13,321,706 UART: [fwproc] Received command 0x46574c44
13,323,908 UART: [fwproc] Received Image of size 118548 bytes
16,029,270 UART: ROM Fatal Error: 0x000B0012
16,032,800 >>> mbox cmd response: failed
16,033,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,033,589 >>> mbox cmd response: failed
16,033,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,034,164 >>> mbox cmd response: failed
Initializing fuses
2,058,292 writing to cptra_bootfsm_go
2,247,562 UART:
2,247,904 UART: Running Caliptra ROM ...
2,249,054 UART:
4,420,055 UART: [state] CFI Enabled
4,433,141 UART: [state] LifecycleState = Unprovisioned
4,435,055 UART: [state] DebugLocked = No
4,437,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,442,841 UART: [kat] SHA2-256
4,612,619 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,623,151 UART: [kat] ++
4,623,700 UART: [kat] sha1
4,634,440 UART: [kat] SHA2-256
4,637,144 UART: [kat] SHA2-384
4,643,029 UART: [kat] SHA2-512-ACC
4,645,389 UART: [kat] ECC-384
6,931,126 UART: [kat] HMAC-384Kdf
6,943,357 UART: [kat] LMS
8,133,451 UART: [kat] --
8,138,836 UART: [cold-reset] ++
8,140,569 UART: [fht] Storing FHT @ 0x50003400
8,153,406 UART: [idev] ++
8,153,989 UART: [idev] CDI.KEYID = 6
8,154,909 UART: [idev] SUBJECT.KEYID = 7
8,156,149 UART: [idev] UDS.KEYID = 0
8,158,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,307,515 UART: [idev] Erasing UDS.KEYID = 0
11,441,807 UART: [idev] Using Sha1 for KeyId Algorithm
11,463,142 UART: [idev] --
11,467,286 UART: [ldev] ++
11,467,872 UART: [ldev] CDI.KEYID = 6
11,468,819 UART: [ldev] SUBJECT.KEYID = 5
11,470,085 UART: [ldev] AUTHORITY.KEYID = 7
11,471,193 UART: [ldev] FE.KEYID = 1
11,481,925 UART: [ldev] Erasing FE.KEYID = 1
14,770,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,063,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,078,334 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,093,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,107,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,127,301 UART: [ldev] --
17,132,258 UART: [fwproc] Waiting for Commands...
17,134,667 UART: [fwproc] Received command 0x46574c44
17,136,870 UART: [fwproc] Received Image of size 118548 bytes
21,240,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,313,570 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,386,752 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,715,706 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,255 writing to cptra_bootfsm_go
4,131,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,763,152 >>> mbox cmd response: failed
15,763,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,139 >>> mbox cmd response: failed
15,764,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,764,711 >>> mbox cmd response: failed
Initializing fuses
2,060,034 writing to cptra_bootfsm_go
8,234,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,260,472 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,349 UART:
192,716 UART: Running Caliptra ROM ...
193,907 UART:
194,062 UART: [state] CFI Enabled
265,846 UART: [state] LifecycleState = Unprovisioned
267,832 UART: [state] DebugLocked = No
269,220 UART: [state] WD Timer not started. Device not locked for debugging
272,578 UART: [kat] SHA2-256
452,237 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,058 UART: [kat] ++
463,605 UART: [kat] sha1
474,331 UART: [kat] SHA2-256
477,062 UART: [kat] SHA2-384
483,248 UART: [kat] SHA2-512-ACC
485,611 UART: [kat] ECC-384
2,948,595 UART: [kat] HMAC-384Kdf
2,971,045 UART: [kat] LMS
3,447,541 UART: [kat] --
3,452,191 UART: [cold-reset] ++
3,453,804 UART: [fht] FHT @ 0x50003400
3,465,215 UART: [idev] ++
3,465,849 UART: [idev] CDI.KEYID = 6
3,466,764 UART: [idev] SUBJECT.KEYID = 7
3,468,033 UART: [idev] UDS.KEYID = 0
3,470,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,847 UART: [idev] Erasing UDS.KEYID = 0
5,985,416 UART: [idev] Sha1 KeyId Algorithm
6,008,668 UART: [idev] --
6,013,778 UART: [ldev] ++
6,014,385 UART: [ldev] CDI.KEYID = 6
6,015,308 UART: [ldev] SUBJECT.KEYID = 5
6,016,478 UART: [ldev] AUTHORITY.KEYID = 7
6,017,774 UART: [ldev] FE.KEYID = 1
6,056,622 UART: [ldev] Erasing FE.KEYID = 1
8,563,043 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,851 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,748 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,611 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,562 UART: [ldev] --
10,369,512 UART: [fwproc] Wait for Commands...
10,372,317 UART: [fwproc] Recv command 0x46574c44
10,374,365 UART: [fwproc] Recv'd Img size: 118548 bytes
12,450,499 UART: ROM Fatal Error: 0x000B0012
12,453,737 >>> mbox cmd response: failed
12,454,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,454,529 >>> mbox cmd response: failed
12,454,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,455,104 >>> mbox cmd response: failed
Initializing fuses
2,062,276 writing to cptra_bootfsm_go
2,251,573 UART:
2,251,932 UART: Running Caliptra ROM ...
2,253,030 UART:
2,253,197 UART: [state] CFI Enabled
2,310,006 UART: [state] LifecycleState = Unprovisioned
2,311,951 UART: [state] DebugLocked = No
2,313,575 UART: [state] WD Timer not started. Device not locked for debugging
2,318,134 UART: [kat] SHA2-256
2,497,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,508,568 UART: [kat] ++
2,509,044 UART: [kat] sha1
2,521,067 UART: [kat] SHA2-256
2,523,775 UART: [kat] SHA2-384
2,528,854 UART: [kat] SHA2-512-ACC
2,531,212 UART: [kat] ECC-384
4,976,886 UART: [kat] HMAC-384Kdf
5,001,455 UART: [kat] LMS
5,477,972 UART: [kat] --
5,483,159 UART: [cold-reset] ++
5,484,397 UART: [fht] FHT @ 0x50003400
5,496,837 UART: [idev] ++
5,497,413 UART: [idev] CDI.KEYID = 6
5,498,330 UART: [idev] SUBJECT.KEYID = 7
5,499,608 UART: [idev] UDS.KEYID = 0
5,502,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,651,227 UART: [idev] Erasing UDS.KEYID = 0
8,018,957 UART: [idev] Sha1 KeyId Algorithm
8,042,258 UART: [idev] --
8,047,532 UART: [ldev] ++
8,048,119 UART: [ldev] CDI.KEYID = 6
8,049,097 UART: [ldev] SUBJECT.KEYID = 5
8,050,267 UART: [ldev] AUTHORITY.KEYID = 7
8,051,514 UART: [ldev] FE.KEYID = 1
8,090,415 UART: [ldev] Erasing FE.KEYID = 1
10,597,287 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,332,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,348,349 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,364,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,379,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,401,807 UART: [ldev] --
12,407,424 UART: [fwproc] Wait for Commands...
12,409,799 UART: [fwproc] Recv command 0x46574c44
12,411,851 UART: [fwproc] Recv'd Img size: 118548 bytes
15,895,050 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,974,021 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,047,039 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,375,480 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,464,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,313,577 >>> mbox cmd response: failed
12,314,187 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,314,587 >>> mbox cmd response: failed
12,314,864 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,315,171 >>> mbox cmd response: failed
Initializing fuses
2,061,536 writing to cptra_bootfsm_go
5,508,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,263,700 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,430 writing to cptra_bootfsm_go
192,684 UART:
193,070 UART: Running Caliptra ROM ...
194,205 UART:
604,013 UART: [state] CFI Enabled
616,778 UART: [state] LifecycleState = Unprovisioned
618,692 UART: [state] DebugLocked = No
620,102 UART: [state] WD Timer not started. Device not locked for debugging
624,060 UART: [kat] SHA2-256
803,708 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,461 UART: [kat] ++
814,910 UART: [kat] sha1
827,190 UART: [kat] SHA2-256
829,880 UART: [kat] SHA2-384
836,241 UART: [kat] SHA2-512-ACC
838,602 UART: [kat] ECC-384
3,279,418 UART: [kat] HMAC-384Kdf
3,292,089 UART: [kat] LMS
3,768,624 UART: [kat] --
3,770,954 UART: [cold-reset] ++
3,772,030 UART: [fht] FHT @ 0x50003400
3,784,151 UART: [idev] ++
3,784,728 UART: [idev] CDI.KEYID = 6
3,785,645 UART: [idev] SUBJECT.KEYID = 7
3,786,921 UART: [idev] UDS.KEYID = 0
3,789,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,604 UART: [idev] Erasing UDS.KEYID = 0
6,262,530 UART: [idev] Sha1 KeyId Algorithm
6,286,683 UART: [idev] --
6,292,246 UART: [ldev] ++
6,293,020 UART: [ldev] CDI.KEYID = 6
6,293,968 UART: [ldev] SUBJECT.KEYID = 5
6,295,082 UART: [ldev] AUTHORITY.KEYID = 7
6,296,270 UART: [ldev] FE.KEYID = 1
6,308,374 UART: [ldev] Erasing FE.KEYID = 1
8,787,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,506,067 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,968 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,656 UART: [ldev] --
10,579,548 UART: [fwproc] Wait for Commands...
10,581,058 UART: [fwproc] Recv command 0x46574c44
10,583,057 UART: [fwproc] Recv'd Img size: 118548 bytes
12,650,761 UART: ROM Fatal Error: 0x000B0012
12,653,991 >>> mbox cmd response: failed
12,654,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,654,800 >>> mbox cmd response: failed
12,655,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,655,431 >>> mbox cmd response: failed
Initializing fuses
2,060,381 writing to cptra_bootfsm_go
2,249,673 UART:
2,250,020 UART: Running Caliptra ROM ...
2,251,162 UART:
7,813,470 UART: [state] CFI Enabled
7,825,923 UART: [state] LifecycleState = Unprovisioned
7,827,838 UART: [state] DebugLocked = No
7,830,718 UART: [state] WD Timer not started. Device not locked for debugging
7,834,950 UART: [kat] SHA2-256
8,014,632 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,025,404 UART: [kat] ++
8,025,866 UART: [kat] sha1
8,037,026 UART: [kat] SHA2-256
8,039,714 UART: [kat] SHA2-384
8,044,153 UART: [kat] SHA2-512-ACC
8,046,518 UART: [kat] ECC-384
10,488,725 UART: [kat] HMAC-384Kdf
10,501,227 UART: [kat] LMS
10,977,748 UART: [kat] --
10,982,399 UART: [cold-reset] ++
10,984,828 UART: [fht] FHT @ 0x50003400
10,994,621 UART: [idev] ++
10,995,190 UART: [idev] CDI.KEYID = 6
10,996,216 UART: [idev] SUBJECT.KEYID = 7
10,997,410 UART: [idev] UDS.KEYID = 0
10,999,742 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,148,585 UART: [idev] Erasing UDS.KEYID = 0
13,474,481 UART: [idev] Sha1 KeyId Algorithm
13,498,945 UART: [idev] --
13,504,101 UART: [ldev] ++
13,504,682 UART: [ldev] CDI.KEYID = 6
13,505,597 UART: [ldev] SUBJECT.KEYID = 5
13,506,815 UART: [ldev] AUTHORITY.KEYID = 7
13,508,056 UART: [ldev] FE.KEYID = 1
13,517,736 UART: [ldev] Erasing FE.KEYID = 1
15,997,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,715,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,731,651 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,747,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,763,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,783,525 UART: [ldev] --
17,789,496 UART: [fwproc] Wait for Commands...
17,791,834 UART: [fwproc] Recv command 0x46574c44
17,793,884 UART: [fwproc] Recv'd Img size: 118548 bytes
21,270,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,349,951 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,422,967 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,751,760 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,094 writing to cptra_bootfsm_go
3,782,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,533,586 >>> mbox cmd response: failed
12,534,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,534,560 >>> mbox cmd response: failed
12,534,827 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,119 >>> mbox cmd response: failed
Initializing fuses
2,060,420 writing to cptra_bootfsm_go
11,106,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,768,897 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,288 UART:
192,646 UART: Running Caliptra ROM ...
193,823 UART:
193,985 UART: [state] CFI Enabled
266,546 UART: [state] LifecycleState = Unprovisioned
268,972 UART: [state] DebugLocked = No
270,628 UART: [state] WD Timer not started. Device not locked for debugging
275,899 UART: [kat] SHA2-256
465,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,567 UART: [kat] ++
477,028 UART: [kat] sha1
489,319 UART: [kat] SHA2-256
492,350 UART: [kat] SHA2-384
498,983 UART: [kat] SHA2-512-ACC
501,595 UART: [kat] ECC-384
2,948,660 UART: [kat] HMAC-384Kdf
2,972,242 UART: [kat] LMS
3,504,035 UART: [kat] --
3,508,687 UART: [cold-reset] ++
3,510,734 UART: [fht] FHT @ 0x50003400
3,521,652 UART: [idev] ++
3,522,361 UART: [idev] CDI.KEYID = 6
3,523,302 UART: [idev] SUBJECT.KEYID = 7
3,524,519 UART: [idev] UDS.KEYID = 0
3,527,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,503 UART: [idev] Erasing UDS.KEYID = 0
6,028,312 UART: [idev] Sha1 KeyId Algorithm
6,050,255 UART: [idev] --
6,056,306 UART: [ldev] ++
6,056,995 UART: [ldev] CDI.KEYID = 6
6,057,886 UART: [ldev] SUBJECT.KEYID = 5
6,059,106 UART: [ldev] AUTHORITY.KEYID = 7
6,060,245 UART: [ldev] FE.KEYID = 1
6,101,571 UART: [ldev] Erasing FE.KEYID = 1
8,609,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,768 UART: [ldev] --
10,415,616 UART: [fwproc] Wait for Commands...
10,418,418 UART: [fwproc] Recv command 0x46574c44
10,420,731 UART: [fwproc] Recv'd Img size: 118548 bytes
12,506,322 UART: ROM Fatal Error: 0x000B0012
12,509,986 >>> mbox cmd response: failed
12,510,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,510,654 >>> mbox cmd response: failed
12,510,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,511,221 >>> mbox cmd response: failed
Initializing fuses
2,061,976 writing to cptra_bootfsm_go
2,251,296 UART:
2,251,649 UART: Running Caliptra ROM ...
2,252,698 UART:
2,252,856 UART: [state] CFI Enabled
2,324,397 UART: [state] LifecycleState = Unprovisioned
2,326,772 UART: [state] DebugLocked = No
2,329,381 UART: [state] WD Timer not started. Device not locked for debugging
2,333,398 UART: [kat] SHA2-256
2,523,297 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,034 UART: [kat] ++
2,534,499 UART: [kat] sha1
2,545,174 UART: [kat] SHA2-256
2,548,198 UART: [kat] SHA2-384
2,554,894 UART: [kat] SHA2-512-ACC
2,557,468 UART: [kat] ECC-384
5,007,484 UART: [kat] HMAC-384Kdf
5,031,357 UART: [kat] LMS
5,563,149 UART: [kat] --
5,568,058 UART: [cold-reset] ++
5,570,323 UART: [fht] FHT @ 0x50003400
5,581,743 UART: [idev] ++
5,582,422 UART: [idev] CDI.KEYID = 6
5,583,363 UART: [idev] SUBJECT.KEYID = 7
5,584,577 UART: [idev] UDS.KEYID = 0
5,586,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,735,995 UART: [idev] Erasing UDS.KEYID = 0
8,087,515 UART: [idev] Sha1 KeyId Algorithm
8,110,406 UART: [idev] --
8,114,837 UART: [ldev] ++
8,115,520 UART: [ldev] CDI.KEYID = 6
8,116,407 UART: [ldev] SUBJECT.KEYID = 5
8,117,516 UART: [ldev] AUTHORITY.KEYID = 7
8,118,828 UART: [ldev] FE.KEYID = 1
8,159,842 UART: [ldev] Erasing FE.KEYID = 1
10,665,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,403,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,418,558 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,433,807 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,448,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,469,935 UART: [ldev] --
12,474,728 UART: [fwproc] Wait for Commands...
12,477,476 UART: [fwproc] Recv command 0x46574c44
12,479,793 UART: [fwproc] Recv'd Img size: 118548 bytes
15,966,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,045,715 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,169,291 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,729,658 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,445,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,299,980 >>> mbox cmd response: failed
12,300,528 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,300,878 >>> mbox cmd response: failed
12,301,155 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,301,455 >>> mbox cmd response: failed
Initializing fuses
2,070,454 writing to cptra_bootfsm_go
5,496,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,888,749 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
192,612 UART:
192,993 UART: Running Caliptra ROM ...
194,125 UART:
603,839 UART: [state] CFI Enabled
615,374 UART: [state] LifecycleState = Unprovisioned
617,759 UART: [state] DebugLocked = No
620,230 UART: [state] WD Timer not started. Device not locked for debugging
625,443 UART: [kat] SHA2-256
815,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,107 UART: [kat] ++
826,645 UART: [kat] sha1
838,639 UART: [kat] SHA2-256
841,629 UART: [kat] SHA2-384
847,386 UART: [kat] SHA2-512-ACC
849,972 UART: [kat] ECC-384
3,293,141 UART: [kat] HMAC-384Kdf
3,305,179 UART: [kat] LMS
3,836,975 UART: [kat] --
3,841,306 UART: [cold-reset] ++
3,842,655 UART: [fht] FHT @ 0x50003400
3,853,429 UART: [idev] ++
3,854,118 UART: [idev] CDI.KEYID = 6
3,855,029 UART: [idev] SUBJECT.KEYID = 7
3,856,256 UART: [idev] UDS.KEYID = 0
3,859,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,101 UART: [idev] Erasing UDS.KEYID = 0
6,337,731 UART: [idev] Sha1 KeyId Algorithm
6,359,141 UART: [idev] --
6,363,753 UART: [ldev] ++
6,364,509 UART: [ldev] CDI.KEYID = 6
6,365,430 UART: [ldev] SUBJECT.KEYID = 5
6,366,547 UART: [ldev] AUTHORITY.KEYID = 7
6,367,788 UART: [ldev] FE.KEYID = 1
6,378,873 UART: [ldev] Erasing FE.KEYID = 1
8,861,152 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,964 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,840 UART: [ldev] --
10,652,594 UART: [fwproc] Wait for Commands...
10,654,803 UART: [fwproc] Recv command 0x46574c44
10,657,132 UART: [fwproc] Recv'd Img size: 118548 bytes
12,740,484 UART: ROM Fatal Error: 0x000B0012
12,744,122 >>> mbox cmd response: failed
12,744,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,744,863 >>> mbox cmd response: failed
12,745,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,745,392 >>> mbox cmd response: failed
Initializing fuses
2,062,048 writing to cptra_bootfsm_go
2,251,378 UART:
2,251,732 UART: Running Caliptra ROM ...
2,252,876 UART:
7,728,929 UART: [state] CFI Enabled
7,742,681 UART: [state] LifecycleState = Unprovisioned
7,745,044 UART: [state] DebugLocked = No
7,747,738 UART: [state] WD Timer not started. Device not locked for debugging
7,751,471 UART: [kat] SHA2-256
7,941,354 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,952,162 UART: [kat] ++
7,952,767 UART: [kat] sha1
7,963,289 UART: [kat] SHA2-256
7,966,265 UART: [kat] SHA2-384
7,970,915 UART: [kat] SHA2-512-ACC
7,973,500 UART: [kat] ECC-384
10,416,117 UART: [kat] HMAC-384Kdf
10,429,930 UART: [kat] LMS
10,961,774 UART: [kat] --
10,966,484 UART: [cold-reset] ++
10,967,831 UART: [fht] FHT @ 0x50003400
10,980,165 UART: [idev] ++
10,980,882 UART: [idev] CDI.KEYID = 6
10,981,857 UART: [idev] SUBJECT.KEYID = 7
10,983,045 UART: [idev] UDS.KEYID = 0
10,985,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,134,320 UART: [idev] Erasing UDS.KEYID = 0
13,462,016 UART: [idev] Sha1 KeyId Algorithm
13,485,375 UART: [idev] --
13,490,289 UART: [ldev] ++
13,490,969 UART: [ldev] CDI.KEYID = 6
13,491,880 UART: [ldev] SUBJECT.KEYID = 5
13,493,045 UART: [ldev] AUTHORITY.KEYID = 7
13,494,286 UART: [ldev] FE.KEYID = 1
13,506,665 UART: [ldev] Erasing FE.KEYID = 1
15,986,660 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,705,469 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,720,644 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,735,828 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,750,936 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,771,629 UART: [ldev] --
17,777,829 UART: [fwproc] Wait for Commands...
17,779,873 UART: [fwproc] Recv command 0x46574c44
17,782,212 UART: [fwproc] Recv'd Img size: 118548 bytes
21,279,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,355,816 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,479,459 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,039,788 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
3,769,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,528,005 >>> mbox cmd response: failed
12,528,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,528,870 >>> mbox cmd response: failed
12,529,147 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,529,445 >>> mbox cmd response: failed
Initializing fuses
2,061,240 writing to cptra_bootfsm_go
11,097,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,384,460 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,343 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,833 UART: [kat] SHA2-256
881,764 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,879 UART: [kat] ++
886,031 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
894,762 UART: [kat] SHA2-512-ACC
896,663 UART: [kat] ECC-384
902,288 UART: [kat] HMAC-384Kdf
907,050 UART: [kat] LMS
1,475,246 UART: [kat] --
1,476,143 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,232 UART: [idev] ++
1,479,400 UART: [idev] CDI.KEYID = 6
1,479,760 UART: [idev] SUBJECT.KEYID = 7
1,480,184 UART: [idev] UDS.KEYID = 0
1,480,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,100 UART: [idev] Erasing UDS.KEYID = 0
1,504,928 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,606 UART: [idev] --
1,514,691 UART: [ldev] ++
1,514,859 UART: [ldev] CDI.KEYID = 6
1,515,222 UART: [ldev] SUBJECT.KEYID = 5
1,515,648 UART: [ldev] AUTHORITY.KEYID = 7
1,516,111 UART: [ldev] FE.KEYID = 1
1,521,013 UART: [ldev] Erasing FE.KEYID = 1
1,545,954 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,785 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,230 UART: [ldev] --
1,585,537 UART: [fwproc] Waiting for Commands...
1,586,194 UART: [fwproc] Received command 0x46574c44
1,586,985 UART: [fwproc] Received Image of size 118548 bytes
1,633,894 UART: ROM Fatal Error: 0x000B0012
1,635,051 >>> mbox cmd response: failed
1,635,051 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,057 >>> mbox cmd response: failed
1,635,057 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,063 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,298 UART: [state] LifecycleState = Unprovisioned
85,953 UART: [state] DebugLocked = No
86,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,071 UART: [kat] SHA2-256
882,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,117 UART: [kat] ++
886,269 UART: [kat] sha1
890,733 UART: [kat] SHA2-256
892,671 UART: [kat] SHA2-384
895,532 UART: [kat] SHA2-512-ACC
897,433 UART: [kat] ECC-384
903,274 UART: [kat] HMAC-384Kdf
907,812 UART: [kat] LMS
1,476,008 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,355 UART: [fht] Storing FHT @ 0x50003400
1,480,262 UART: [idev] ++
1,480,430 UART: [idev] CDI.KEYID = 6
1,480,790 UART: [idev] SUBJECT.KEYID = 7
1,481,214 UART: [idev] UDS.KEYID = 0
1,481,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,126 UART: [idev] Erasing UDS.KEYID = 0
1,505,948 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,350 UART: [idev] --
1,515,303 UART: [ldev] ++
1,515,471 UART: [ldev] CDI.KEYID = 6
1,515,834 UART: [ldev] SUBJECT.KEYID = 5
1,516,260 UART: [ldev] AUTHORITY.KEYID = 7
1,516,723 UART: [ldev] FE.KEYID = 1
1,521,773 UART: [ldev] Erasing FE.KEYID = 1
1,546,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,421 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,026 UART: [ldev] --
1,586,519 UART: [fwproc] Waiting for Commands...
1,587,196 UART: [fwproc] Received command 0x46574c44
1,587,987 UART: [fwproc] Received Image of size 118548 bytes
2,931,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,908 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,369 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,650 >>> mbox cmd response: failed
1,488,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,656 >>> mbox cmd response: failed
1,488,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,355 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,764 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,428 UART: [kat] SHA2-256
882,359 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,474 UART: [kat] ++
886,626 UART: [kat] sha1
890,812 UART: [kat] SHA2-256
892,750 UART: [kat] SHA2-384
895,323 UART: [kat] SHA2-512-ACC
897,224 UART: [kat] ECC-384
902,807 UART: [kat] HMAC-384Kdf
907,583 UART: [kat] LMS
1,475,779 UART: [kat] --
1,476,718 UART: [cold-reset] ++
1,477,092 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,755 UART: [idev] Erasing UDS.KEYID = 0
1,505,607 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,111 UART: [idev] --
1,515,012 UART: [ldev] ++
1,515,180 UART: [ldev] CDI.KEYID = 6
1,515,543 UART: [ldev] SUBJECT.KEYID = 5
1,515,969 UART: [ldev] AUTHORITY.KEYID = 7
1,516,432 UART: [ldev] FE.KEYID = 1
1,521,798 UART: [ldev] Erasing FE.KEYID = 1
1,546,833 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,279 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,975 UART: [ldev] --
1,586,250 UART: [fwproc] Waiting for Commands...
1,586,871 UART: [fwproc] Received command 0x46574c44
1,587,662 UART: [fwproc] Received Image of size 118548 bytes
1,634,471 UART: ROM Fatal Error: 0x000B0012
1,635,628 >>> mbox cmd response: failed
1,635,628 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,634 >>> mbox cmd response: failed
1,635,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,640 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,113 UART: [state] LifecycleState = Unprovisioned
85,768 UART: [state] DebugLocked = No
86,366 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,958 UART: [kat] SHA2-256
881,889 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,004 UART: [kat] ++
886,156 UART: [kat] sha1
890,598 UART: [kat] SHA2-256
892,536 UART: [kat] SHA2-384
895,329 UART: [kat] SHA2-512-ACC
897,230 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,765 UART: [kat] LMS
1,475,961 UART: [kat] --
1,476,936 UART: [cold-reset] ++
1,477,332 UART: [fht] Storing FHT @ 0x50003400
1,480,163 UART: [idev] ++
1,480,331 UART: [idev] CDI.KEYID = 6
1,480,691 UART: [idev] SUBJECT.KEYID = 7
1,481,115 UART: [idev] UDS.KEYID = 0
1,481,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,117 UART: [idev] Erasing UDS.KEYID = 0
1,506,081 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,757 UART: [idev] --
1,515,782 UART: [ldev] ++
1,515,950 UART: [ldev] CDI.KEYID = 6
1,516,313 UART: [ldev] SUBJECT.KEYID = 5
1,516,739 UART: [ldev] AUTHORITY.KEYID = 7
1,517,202 UART: [ldev] FE.KEYID = 1
1,522,420 UART: [ldev] Erasing FE.KEYID = 1
1,548,275 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,237 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,293 UART: [ldev] --
1,587,712 UART: [fwproc] Waiting for Commands...
1,588,427 UART: [fwproc] Received command 0x46574c44
1,589,218 UART: [fwproc] Received Image of size 118548 bytes
2,933,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,779 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,997 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,428 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,826 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,929 >>> mbox cmd response: failed
1,488,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,935 >>> mbox cmd response: failed
1,488,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,584 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,616 UART: [kat] SHA2-256
891,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,270 UART: [kat] ++
895,422 UART: [kat] sha1
899,652 UART: [kat] SHA2-256
901,592 UART: [kat] SHA2-384
904,357 UART: [kat] SHA2-512-ACC
906,258 UART: [kat] ECC-384
916,507 UART: [kat] HMAC-384Kdf
921,051 UART: [kat] LMS
1,169,363 UART: [kat] --
1,170,160 UART: [cold-reset] ++
1,170,638 UART: [fht] FHT @ 0x50003400
1,173,338 UART: [idev] ++
1,173,506 UART: [idev] CDI.KEYID = 6
1,173,867 UART: [idev] SUBJECT.KEYID = 7
1,174,292 UART: [idev] UDS.KEYID = 0
1,174,638 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,333 UART: [idev] Erasing UDS.KEYID = 0
1,199,497 UART: [idev] Sha1 KeyId Algorithm
1,208,439 UART: [idev] --
1,209,540 UART: [ldev] ++
1,209,708 UART: [ldev] CDI.KEYID = 6
1,210,072 UART: [ldev] SUBJECT.KEYID = 5
1,210,499 UART: [ldev] AUTHORITY.KEYID = 7
1,210,962 UART: [ldev] FE.KEYID = 1
1,216,292 UART: [ldev] Erasing FE.KEYID = 1
1,242,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,348 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,216 UART: [ldev] --
1,281,597 UART: [fwproc] Wait for Commands...
1,282,238 UART: [fwproc] Recv command 0x46574c44
1,282,971 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,119 UART: ROM Fatal Error: 0x000B0012
1,330,276 >>> mbox cmd response: failed
1,330,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,282 >>> mbox cmd response: failed
1,330,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,288 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
86,093 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
890,950 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,054 UART: [kat] ++
895,206 UART: [kat] sha1
899,596 UART: [kat] SHA2-256
901,536 UART: [kat] SHA2-384
904,127 UART: [kat] SHA2-512-ACC
906,028 UART: [kat] ECC-384
915,679 UART: [kat] HMAC-384Kdf
920,317 UART: [kat] LMS
1,168,629 UART: [kat] --
1,169,820 UART: [cold-reset] ++
1,170,258 UART: [fht] FHT @ 0x50003400
1,172,858 UART: [idev] ++
1,173,026 UART: [idev] CDI.KEYID = 6
1,173,387 UART: [idev] SUBJECT.KEYID = 7
1,173,812 UART: [idev] UDS.KEYID = 0
1,174,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,549 UART: [idev] Erasing UDS.KEYID = 0
1,198,375 UART: [idev] Sha1 KeyId Algorithm
1,207,241 UART: [idev] --
1,208,318 UART: [ldev] ++
1,208,486 UART: [ldev] CDI.KEYID = 6
1,208,850 UART: [ldev] SUBJECT.KEYID = 5
1,209,277 UART: [ldev] AUTHORITY.KEYID = 7
1,209,740 UART: [ldev] FE.KEYID = 1
1,214,906 UART: [ldev] Erasing FE.KEYID = 1
1,240,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,014 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,726 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,776 UART: [ldev] --
1,280,139 UART: [fwproc] Wait for Commands...
1,280,894 UART: [fwproc] Recv command 0x46574c44
1,281,627 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,979 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,275 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,540 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,625 >>> mbox cmd response: failed
1,185,625 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,631 >>> mbox cmd response: failed
1,185,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,082 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,903 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,584 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
891,379 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,483 UART: [kat] ++
895,635 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,538 UART: [kat] SHA2-512-ACC
906,439 UART: [kat] ECC-384
916,500 UART: [kat] HMAC-384Kdf
921,104 UART: [kat] LMS
1,169,416 UART: [kat] --
1,170,405 UART: [cold-reset] ++
1,170,749 UART: [fht] FHT @ 0x50003400
1,173,479 UART: [idev] ++
1,173,647 UART: [idev] CDI.KEYID = 6
1,174,008 UART: [idev] SUBJECT.KEYID = 7
1,174,433 UART: [idev] UDS.KEYID = 0
1,174,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,290 UART: [idev] Erasing UDS.KEYID = 0
1,199,122 UART: [idev] Sha1 KeyId Algorithm
1,207,912 UART: [idev] --
1,209,017 UART: [ldev] ++
1,209,185 UART: [ldev] CDI.KEYID = 6
1,209,549 UART: [ldev] SUBJECT.KEYID = 5
1,209,976 UART: [ldev] AUTHORITY.KEYID = 7
1,210,439 UART: [ldev] FE.KEYID = 1
1,216,023 UART: [ldev] Erasing FE.KEYID = 1
1,242,422 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,932 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,648 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,537 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,249 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,279 UART: [ldev] --
1,281,594 UART: [fwproc] Wait for Commands...
1,282,317 UART: [fwproc] Recv command 0x46574c44
1,283,050 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,590 UART: ROM Fatal Error: 0x000B0012
1,330,747 >>> mbox cmd response: failed
1,330,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,753 >>> mbox cmd response: failed
1,330,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,233 UART: [state] LifecycleState = Unprovisioned
85,888 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,631 UART: [kat] SHA2-256
891,181 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,285 UART: [kat] ++
895,437 UART: [kat] sha1
899,683 UART: [kat] SHA2-256
901,623 UART: [kat] SHA2-384
904,404 UART: [kat] SHA2-512-ACC
906,305 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
921,162 UART: [kat] LMS
1,169,474 UART: [kat] --
1,170,183 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,071 UART: [idev] ++
1,173,239 UART: [idev] CDI.KEYID = 6
1,173,600 UART: [idev] SUBJECT.KEYID = 7
1,174,025 UART: [idev] UDS.KEYID = 0
1,174,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,134 UART: [idev] Sha1 KeyId Algorithm
1,208,060 UART: [idev] --
1,209,127 UART: [ldev] ++
1,209,295 UART: [ldev] CDI.KEYID = 6
1,209,659 UART: [ldev] SUBJECT.KEYID = 5
1,210,086 UART: [ldev] AUTHORITY.KEYID = 7
1,210,549 UART: [ldev] FE.KEYID = 1
1,215,719 UART: [ldev] Erasing FE.KEYID = 1
1,242,312 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,923 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,145 UART: [ldev] --
1,281,376 UART: [fwproc] Wait for Commands...
1,281,953 UART: [fwproc] Recv command 0x46574c44
1,282,686 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,683 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,791 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,028 >>> mbox cmd response: failed
1,187,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,034 >>> mbox cmd response: failed
1,187,034 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,040 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,128 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,692 UART: [kat] SHA2-256
893,342 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,467 UART: [kat] ++
897,619 UART: [kat] sha1
901,895 UART: [kat] SHA2-256
903,835 UART: [kat] SHA2-384
906,610 UART: [kat] SHA2-512-ACC
908,511 UART: [kat] ECC-384
917,636 UART: [kat] HMAC-384Kdf
922,352 UART: [kat] LMS
1,170,680 UART: [kat] --
1,171,593 UART: [cold-reset] ++
1,171,941 UART: [fht] FHT @ 0x50003400
1,174,740 UART: [idev] ++
1,174,908 UART: [idev] CDI.KEYID = 6
1,175,268 UART: [idev] SUBJECT.KEYID = 7
1,175,692 UART: [idev] UDS.KEYID = 0
1,176,037 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,768 UART: [idev] Erasing UDS.KEYID = 0
1,200,661 UART: [idev] Sha1 KeyId Algorithm
1,209,103 UART: [idev] --
1,210,157 UART: [ldev] ++
1,210,325 UART: [ldev] CDI.KEYID = 6
1,210,688 UART: [ldev] SUBJECT.KEYID = 5
1,211,114 UART: [ldev] AUTHORITY.KEYID = 7
1,211,577 UART: [ldev] FE.KEYID = 1
1,216,473 UART: [ldev] Erasing FE.KEYID = 1
1,243,042 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,341 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,944 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,067 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,920 UART: [fwproc] Recv command 0x46574c44
1,283,648 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,433 UART: ROM Fatal Error: 0x000B0012
1,331,590 >>> mbox cmd response: failed
1,331,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,596 >>> mbox cmd response: failed
1,331,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,602 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,136 UART: [state] LifecycleState = Unprovisioned
85,791 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,444 UART: [kat] SHA2-256
893,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,219 UART: [kat] ++
897,371 UART: [kat] sha1
901,665 UART: [kat] SHA2-256
903,605 UART: [kat] SHA2-384
906,432 UART: [kat] SHA2-512-ACC
908,333 UART: [kat] ECC-384
918,108 UART: [kat] HMAC-384Kdf
922,544 UART: [kat] LMS
1,170,872 UART: [kat] --
1,171,613 UART: [cold-reset] ++
1,172,125 UART: [fht] FHT @ 0x50003400
1,174,902 UART: [idev] ++
1,175,070 UART: [idev] CDI.KEYID = 6
1,175,430 UART: [idev] SUBJECT.KEYID = 7
1,175,854 UART: [idev] UDS.KEYID = 0
1,176,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,602 UART: [idev] Erasing UDS.KEYID = 0
1,199,897 UART: [idev] Sha1 KeyId Algorithm
1,208,359 UART: [idev] --
1,209,593 UART: [ldev] ++
1,209,761 UART: [ldev] CDI.KEYID = 6
1,210,124 UART: [ldev] SUBJECT.KEYID = 5
1,210,550 UART: [ldev] AUTHORITY.KEYID = 7
1,211,013 UART: [ldev] FE.KEYID = 1
1,216,351 UART: [ldev] Erasing FE.KEYID = 1
1,242,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,131 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,734 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,823 UART: [ldev] --
1,282,260 UART: [fwproc] Wait for Commands...
1,283,010 UART: [fwproc] Recv command 0x46574c44
1,283,738 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,592 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,515 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,666 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,271 >>> mbox cmd response: failed
1,187,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,277 >>> mbox cmd response: failed
1,187,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,381 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,475 UART: [state] LifecycleState = Unprovisioned
86,130 UART: [state] DebugLocked = No
86,850 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
893,849 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,974 UART: [kat] ++
898,126 UART: [kat] sha1
902,256 UART: [kat] SHA2-256
904,196 UART: [kat] SHA2-384
907,101 UART: [kat] SHA2-512-ACC
909,002 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,703 UART: [kat] LMS
1,172,031 UART: [kat] --
1,173,118 UART: [cold-reset] ++
1,173,574 UART: [fht] FHT @ 0x50003400
1,176,321 UART: [idev] ++
1,176,489 UART: [idev] CDI.KEYID = 6
1,176,849 UART: [idev] SUBJECT.KEYID = 7
1,177,273 UART: [idev] UDS.KEYID = 0
1,177,618 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,843 UART: [idev] Erasing UDS.KEYID = 0
1,201,640 UART: [idev] Sha1 KeyId Algorithm
1,210,070 UART: [idev] --
1,211,080 UART: [ldev] ++
1,211,248 UART: [ldev] CDI.KEYID = 6
1,211,611 UART: [ldev] SUBJECT.KEYID = 5
1,212,037 UART: [ldev] AUTHORITY.KEYID = 7
1,212,500 UART: [ldev] FE.KEYID = 1
1,217,832 UART: [ldev] Erasing FE.KEYID = 1
1,243,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,750 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,641 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,353 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,420 UART: [ldev] --
1,282,861 UART: [fwproc] Wait for Commands...
1,283,459 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 118548 bytes
1,330,448 UART: ROM Fatal Error: 0x000B0012
1,331,605 >>> mbox cmd response: failed
1,331,605 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,611 >>> mbox cmd response: failed
1,331,611 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,331,617 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,693 UART: [kat] SHA2-256
893,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,468 UART: [kat] ++
897,620 UART: [kat] sha1
901,888 UART: [kat] SHA2-256
903,828 UART: [kat] SHA2-384
906,439 UART: [kat] SHA2-512-ACC
908,340 UART: [kat] ECC-384
918,023 UART: [kat] HMAC-384Kdf
922,693 UART: [kat] LMS
1,171,021 UART: [kat] --
1,171,836 UART: [cold-reset] ++
1,172,166 UART: [fht] FHT @ 0x50003400
1,175,003 UART: [idev] ++
1,175,171 UART: [idev] CDI.KEYID = 6
1,175,531 UART: [idev] SUBJECT.KEYID = 7
1,175,955 UART: [idev] UDS.KEYID = 0
1,176,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,061 UART: [idev] Erasing UDS.KEYID = 0
1,200,980 UART: [idev] Sha1 KeyId Algorithm
1,209,512 UART: [idev] --
1,210,580 UART: [ldev] ++
1,210,748 UART: [ldev] CDI.KEYID = 6
1,211,111 UART: [ldev] SUBJECT.KEYID = 5
1,211,537 UART: [ldev] AUTHORITY.KEYID = 7
1,212,000 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,243,149 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,422 UART: [ldev] --
1,282,937 UART: [fwproc] Wait for Commands...
1,283,559 UART: [fwproc] Recv command 0x46574c44
1,284,287 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,645 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,714 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,884 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,223 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,318 >>> mbox cmd response: failed
1,186,318 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,324 >>> mbox cmd response: failed
1,186,324 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,330 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,246 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,196 UART:
192,568 UART: Running Caliptra ROM ...
193,872 UART:
194,028 UART: [state] CFI Enabled
262,079 UART: [state] LifecycleState = Unprovisioned
264,056 UART: [state] DebugLocked = No
266,579 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,066 UART: [kat] SHA2-256
441,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,253 UART: [kat] ++
452,744 UART: [kat] sha1
464,755 UART: [kat] SHA2-256
467,445 UART: [kat] SHA2-384
472,617 UART: [kat] SHA2-512-ACC
474,959 UART: [kat] ECC-384
2,765,770 UART: [kat] HMAC-384Kdf
2,797,739 UART: [kat] LMS
3,988,051 UART: [kat] --
3,990,609 UART: [cold-reset] ++
3,993,032 UART: [fht] Storing FHT @ 0x50003400
4,003,597 UART: [idev] ++
4,004,176 UART: [idev] CDI.KEYID = 6
4,005,199 UART: [idev] SUBJECT.KEYID = 7
4,006,390 UART: [idev] UDS.KEYID = 0
4,009,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,609 UART: [idev] Erasing UDS.KEYID = 0
7,345,195 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,334 UART: [idev] --
7,370,470 UART: [ldev] ++
7,371,041 UART: [ldev] CDI.KEYID = 6
7,372,016 UART: [ldev] SUBJECT.KEYID = 5
7,373,184 UART: [ldev] AUTHORITY.KEYID = 7
7,374,479 UART: [ldev] FE.KEYID = 1
7,419,479 UART: [ldev] Erasing FE.KEYID = 1
10,752,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,306 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,889 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,265 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,111,329 UART: [ldev] --
13,116,714 UART: [fwproc] Waiting for Commands...
13,118,492 UART: [fwproc] Received command 0x46574c44
13,120,688 UART: [fwproc] Received Image of size 118548 bytes
15,815,181 UART: ROM Fatal Error: 0x000B0010
15,818,691 >>> mbox cmd response: failed
15,819,046 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,819,403 >>> mbox cmd response: failed
15,819,680 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,819,978 >>> mbox cmd response: failed
Initializing fuses
2,058,334 writing to cptra_bootfsm_go
2,247,687 UART:
2,248,025 UART: Running Caliptra ROM ...
2,249,183 UART:
2,249,356 UART: [state] CFI Enabled
2,322,392 UART: [state] LifecycleState = Unprovisioned
2,324,327 UART: [state] DebugLocked = No
2,326,588 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,332,087 UART: [kat] SHA2-256
2,501,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,512,243 UART: [kat] ++
2,512,726 UART: [kat] sha1
2,523,451 UART: [kat] SHA2-256
2,526,143 UART: [kat] SHA2-384
2,532,255 UART: [kat] SHA2-512-ACC
2,534,611 UART: [kat] ECC-384
4,824,812 UART: [kat] HMAC-384Kdf
4,856,049 UART: [kat] LMS
6,046,359 UART: [kat] --
6,052,285 UART: [cold-reset] ++
6,054,347 UART: [fht] Storing FHT @ 0x50003400
6,064,161 UART: [idev] ++
6,064,730 UART: [idev] CDI.KEYID = 6
6,065,696 UART: [idev] SUBJECT.KEYID = 7
6,067,014 UART: [idev] UDS.KEYID = 0
6,069,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,218,275 UART: [idev] Erasing UDS.KEYID = 0
9,402,622 UART: [idev] Using Sha1 for KeyId Algorithm
9,425,101 UART: [idev] --
9,429,324 UART: [ldev] ++
9,429,938 UART: [ldev] CDI.KEYID = 6
9,430,852 UART: [ldev] SUBJECT.KEYID = 5
9,432,141 UART: [ldev] AUTHORITY.KEYID = 7
9,433,323 UART: [ldev] FE.KEYID = 1
9,480,585 UART: [ldev] Erasing FE.KEYID = 1
12,815,217 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,107,433 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,122,022 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,136,823 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,151,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,171,453 UART: [ldev] --
15,176,608 UART: [fwproc] Waiting for Commands...
15,179,737 UART: [fwproc] Received command 0x46574c44
15,181,924 UART: [fwproc] Received Image of size 118548 bytes
19,291,291 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,364,821 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,437,998 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,767,388 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
3,807,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,553,503 >>> mbox cmd response: failed
15,554,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,554,584 >>> mbox cmd response: failed
15,554,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,555,173 >>> mbox cmd response: failed
Initializing fuses
2,056,007 writing to cptra_bootfsm_go
5,845,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,982,453 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
192,500 UART:
192,854 UART: Running Caliptra ROM ...
194,054 UART:
603,754 UART: [state] CFI Enabled
618,491 UART: [state] LifecycleState = Unprovisioned
620,395 UART: [state] DebugLocked = No
622,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,219 UART: [kat] SHA2-256
797,972 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,467 UART: [kat] ++
808,977 UART: [kat] sha1
820,503 UART: [kat] SHA2-256
823,200 UART: [kat] SHA2-384
830,048 UART: [kat] SHA2-512-ACC
832,452 UART: [kat] ECC-384
3,116,134 UART: [kat] HMAC-384Kdf
3,127,961 UART: [kat] LMS
4,318,059 UART: [kat] --
4,321,882 UART: [cold-reset] ++
4,324,509 UART: [fht] Storing FHT @ 0x50003400
4,336,061 UART: [idev] ++
4,336,636 UART: [idev] CDI.KEYID = 6
4,337,659 UART: [idev] SUBJECT.KEYID = 7
4,338,832 UART: [idev] UDS.KEYID = 0
4,341,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,887 UART: [idev] Erasing UDS.KEYID = 0
7,626,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,296 UART: [idev] --
7,651,089 UART: [ldev] ++
7,651,680 UART: [ldev] CDI.KEYID = 6
7,652,664 UART: [ldev] SUBJECT.KEYID = 5
7,653,833 UART: [ldev] AUTHORITY.KEYID = 7
7,655,129 UART: [ldev] FE.KEYID = 1
7,667,887 UART: [ldev] Erasing FE.KEYID = 1
10,955,362 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,182 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,110 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,674 UART: [ldev] --
13,315,190 UART: [fwproc] Waiting for Commands...
13,317,943 UART: [fwproc] Received command 0x46574c44
13,320,136 UART: [fwproc] Received Image of size 118548 bytes
16,018,610 UART: ROM Fatal Error: 0x000B0010
16,022,131 >>> mbox cmd response: failed
16,022,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,022,916 >>> mbox cmd response: failed
16,023,190 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,023,492 >>> mbox cmd response: failed
Initializing fuses
2,057,948 writing to cptra_bootfsm_go
2,247,202 UART:
2,247,548 UART: Running Caliptra ROM ...
2,248,629 UART:
4,438,729 UART: [state] CFI Enabled
4,451,273 UART: [state] LifecycleState = Unprovisioned
4,453,187 UART: [state] DebugLocked = No
4,455,808 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,461,186 UART: [kat] SHA2-256
4,630,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,641,477 UART: [kat] ++
4,642,032 UART: [kat] sha1
4,654,446 UART: [kat] SHA2-256
4,657,145 UART: [kat] SHA2-384
4,663,089 UART: [kat] SHA2-512-ACC
4,665,468 UART: [kat] ECC-384
6,947,956 UART: [kat] HMAC-384Kdf
6,960,133 UART: [kat] LMS
8,150,248 UART: [kat] --
8,155,343 UART: [cold-reset] ++
8,156,369 UART: [fht] Storing FHT @ 0x50003400
8,166,348 UART: [idev] ++
8,166,919 UART: [idev] CDI.KEYID = 6
8,167,866 UART: [idev] SUBJECT.KEYID = 7
8,169,141 UART: [idev] UDS.KEYID = 0
8,171,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,320,388 UART: [idev] Erasing UDS.KEYID = 0
11,458,861 UART: [idev] Using Sha1 for KeyId Algorithm
11,481,225 UART: [idev] --
11,485,816 UART: [ldev] ++
11,486,447 UART: [ldev] CDI.KEYID = 6
11,487,384 UART: [ldev] SUBJECT.KEYID = 5
11,488,624 UART: [ldev] AUTHORITY.KEYID = 7
11,489,875 UART: [ldev] FE.KEYID = 1
11,499,241 UART: [ldev] Erasing FE.KEYID = 1
14,784,902 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,078,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,092,949 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,107,770 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,122,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,142,151 UART: [ldev] --
17,147,365 UART: [fwproc] Waiting for Commands...
17,149,581 UART: [fwproc] Received command 0x46574c44
17,151,777 UART: [fwproc] Received Image of size 118548 bytes
21,258,643 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,331,724 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,404,888 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,733,802 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
4,125,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,751,888 >>> mbox cmd response: failed
15,752,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,752,802 >>> mbox cmd response: failed
15,753,079 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,753,384 >>> mbox cmd response: failed
Initializing fuses
2,058,057 writing to cptra_bootfsm_go
8,246,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,283,055 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
192,245 UART:
192,625 UART: Running Caliptra ROM ...
193,756 UART:
193,901 UART: [state] CFI Enabled
261,327 UART: [state] LifecycleState = Unprovisioned
263,289 UART: [state] DebugLocked = No
266,131 UART: [state] WD Timer not started. Device not locked for debugging
269,460 UART: [kat] SHA2-256
449,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,908 UART: [kat] ++
460,365 UART: [kat] sha1
471,568 UART: [kat] SHA2-256
474,266 UART: [kat] SHA2-384
479,878 UART: [kat] SHA2-512-ACC
482,276 UART: [kat] ECC-384
2,944,728 UART: [kat] HMAC-384Kdf
2,968,422 UART: [kat] LMS
3,444,877 UART: [kat] --
3,450,333 UART: [cold-reset] ++
3,451,361 UART: [fht] FHT @ 0x50003400
3,462,821 UART: [idev] ++
3,463,449 UART: [idev] CDI.KEYID = 6
3,464,412 UART: [idev] SUBJECT.KEYID = 7
3,465,586 UART: [idev] UDS.KEYID = 0
3,468,185 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,425 UART: [idev] Erasing UDS.KEYID = 0
5,984,888 UART: [idev] Sha1 KeyId Algorithm
6,008,309 UART: [idev] --
6,014,318 UART: [ldev] ++
6,014,901 UART: [ldev] CDI.KEYID = 6
6,015,984 UART: [ldev] SUBJECT.KEYID = 5
6,017,099 UART: [ldev] AUTHORITY.KEYID = 7
6,018,287 UART: [ldev] FE.KEYID = 1
6,054,598 UART: [ldev] Erasing FE.KEYID = 1
8,563,145 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,294,259 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,310,123 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,326,029 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,252 UART: [ldev] --
10,369,337 UART: [fwproc] Wait for Commands...
10,371,615 UART: [fwproc] Recv command 0x46574c44
10,373,608 UART: [fwproc] Recv'd Img size: 118548 bytes
12,436,691 UART: ROM Fatal Error: 0x000B0010
12,439,918 >>> mbox cmd response: failed
12,440,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,440,684 >>> mbox cmd response: failed
12,440,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,441,300 >>> mbox cmd response: failed
Initializing fuses
2,063,430 writing to cptra_bootfsm_go
2,252,714 UART:
2,253,078 UART: Running Caliptra ROM ...
2,254,226 UART:
2,254,395 UART: [state] CFI Enabled
2,324,009 UART: [state] LifecycleState = Unprovisioned
2,325,956 UART: [state] DebugLocked = No
2,327,633 UART: [state] WD Timer not started. Device not locked for debugging
2,331,115 UART: [kat] SHA2-256
2,510,766 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,521,545 UART: [kat] ++
2,522,010 UART: [kat] sha1
2,532,252 UART: [kat] SHA2-256
2,534,942 UART: [kat] SHA2-384
2,540,617 UART: [kat] SHA2-512-ACC
2,542,968 UART: [kat] ECC-384
5,005,373 UART: [kat] HMAC-384Kdf
5,030,251 UART: [kat] LMS
5,506,728 UART: [kat] --
5,510,701 UART: [cold-reset] ++
5,512,750 UART: [fht] FHT @ 0x50003400
5,524,221 UART: [idev] ++
5,524,803 UART: [idev] CDI.KEYID = 6
5,525,824 UART: [idev] SUBJECT.KEYID = 7
5,526,987 UART: [idev] UDS.KEYID = 0
5,529,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,678,709 UART: [idev] Erasing UDS.KEYID = 0
8,043,902 UART: [idev] Sha1 KeyId Algorithm
8,066,802 UART: [idev] --
8,072,083 UART: [ldev] ++
8,072,671 UART: [ldev] CDI.KEYID = 6
8,073,589 UART: [ldev] SUBJECT.KEYID = 5
8,074,808 UART: [ldev] AUTHORITY.KEYID = 7
8,076,041 UART: [ldev] FE.KEYID = 1
8,115,069 UART: [ldev] Erasing FE.KEYID = 1
10,625,338 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,576 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,375,443 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,391,328 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,406,902 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,429,812 UART: [ldev] --
12,435,785 UART: [fwproc] Wait for Commands...
12,438,478 UART: [fwproc] Recv command 0x46574c44
12,440,474 UART: [fwproc] Recv'd Img size: 118548 bytes
15,931,249 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,012,010 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,085,043 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,412,802 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,461,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,328,429 >>> mbox cmd response: failed
12,329,055 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,419 >>> mbox cmd response: failed
12,329,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,329,993 >>> mbox cmd response: failed
Initializing fuses
2,063,551 writing to cptra_bootfsm_go
5,510,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,267,051 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
192,613 UART:
192,989 UART: Running Caliptra ROM ...
194,157 UART:
603,656 UART: [state] CFI Enabled
617,061 UART: [state] LifecycleState = Unprovisioned
619,005 UART: [state] DebugLocked = No
621,634 UART: [state] WD Timer not started. Device not locked for debugging
626,365 UART: [kat] SHA2-256
806,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,811 UART: [kat] ++
817,266 UART: [kat] sha1
827,057 UART: [kat] SHA2-256
829,751 UART: [kat] SHA2-384
836,242 UART: [kat] SHA2-512-ACC
838,564 UART: [kat] ECC-384
3,280,130 UART: [kat] HMAC-384Kdf
3,292,550 UART: [kat] LMS
3,769,079 UART: [kat] --
3,774,059 UART: [cold-reset] ++
3,776,509 UART: [fht] FHT @ 0x50003400
3,788,847 UART: [idev] ++
3,789,482 UART: [idev] CDI.KEYID = 6
3,790,411 UART: [idev] SUBJECT.KEYID = 7
3,791,726 UART: [idev] UDS.KEYID = 0
3,794,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,239 UART: [idev] Erasing UDS.KEYID = 0
6,270,110 UART: [idev] Sha1 KeyId Algorithm
6,293,589 UART: [idev] --
6,299,207 UART: [ldev] ++
6,299,788 UART: [ldev] CDI.KEYID = 6
6,300,699 UART: [ldev] SUBJECT.KEYID = 5
6,301,923 UART: [ldev] AUTHORITY.KEYID = 7
6,303,162 UART: [ldev] FE.KEYID = 1
6,313,813 UART: [ldev] Erasing FE.KEYID = 1
8,794,783 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,347 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,221 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,771 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,410 UART: [ldev] --
10,591,898 UART: [fwproc] Wait for Commands...
10,595,124 UART: [fwproc] Recv command 0x46574c44
10,597,181 UART: [fwproc] Recv'd Img size: 118548 bytes
12,652,684 UART: ROM Fatal Error: 0x000B0010
12,655,971 >>> mbox cmd response: failed
12,656,379 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,656,664 >>> mbox cmd response: failed
12,656,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,657,227 >>> mbox cmd response: failed
Initializing fuses
2,060,192 writing to cptra_bootfsm_go
2,249,490 UART:
2,249,867 UART: Running Caliptra ROM ...
2,250,953 UART:
7,789,286 UART: [state] CFI Enabled
7,799,292 UART: [state] LifecycleState = Unprovisioned
7,801,220 UART: [state] DebugLocked = No
7,802,944 UART: [state] WD Timer not started. Device not locked for debugging
7,806,808 UART: [kat] SHA2-256
7,986,440 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
7,997,243 UART: [kat] ++
7,997,789 UART: [kat] sha1
8,007,777 UART: [kat] SHA2-256
8,010,488 UART: [kat] SHA2-384
8,017,337 UART: [kat] SHA2-512-ACC
8,019,711 UART: [kat] ECC-384
10,461,128 UART: [kat] HMAC-384Kdf
10,473,091 UART: [kat] LMS
10,949,627 UART: [kat] --
10,953,684 UART: [cold-reset] ++
10,955,783 UART: [fht] FHT @ 0x50003400
10,967,414 UART: [idev] ++
10,967,990 UART: [idev] CDI.KEYID = 6
10,969,009 UART: [idev] SUBJECT.KEYID = 7
10,970,182 UART: [idev] UDS.KEYID = 0
10,972,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,121,681 UART: [idev] Erasing UDS.KEYID = 0
13,450,116 UART: [idev] Sha1 KeyId Algorithm
13,472,805 UART: [idev] --
13,477,808 UART: [ldev] ++
13,478,445 UART: [ldev] CDI.KEYID = 6
13,479,379 UART: [ldev] SUBJECT.KEYID = 5
13,480,542 UART: [ldev] AUTHORITY.KEYID = 7
13,481,777 UART: [ldev] FE.KEYID = 1
13,494,589 UART: [ldev] Erasing FE.KEYID = 1
15,973,331 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,694,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,710,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,019 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,741,557 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,548 UART: [ldev] --
17,768,041 UART: [fwproc] Wait for Commands...
17,771,063 UART: [fwproc] Recv command 0x46574c44
17,773,255 UART: [fwproc] Recv'd Img size: 118548 bytes
21,259,690 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,331,728 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,404,745 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,733,172 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,309 writing to cptra_bootfsm_go
3,783,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,534,671 >>> mbox cmd response: failed
12,535,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,535,611 >>> mbox cmd response: failed
12,535,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,536,182 >>> mbox cmd response: failed
Initializing fuses
2,070,403 writing to cptra_bootfsm_go
11,110,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,771,055 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,109 writing to cptra_bootfsm_go
192,336 UART:
192,687 UART: Running Caliptra ROM ...
193,865 UART:
194,022 UART: [state] CFI Enabled
261,464 UART: [state] LifecycleState = Unprovisioned
263,889 UART: [state] DebugLocked = No
266,192 UART: [state] WD Timer not started. Device not locked for debugging
270,887 UART: [kat] SHA2-256
460,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,537 UART: [kat] ++
472,029 UART: [kat] sha1
483,277 UART: [kat] SHA2-256
486,294 UART: [kat] SHA2-384
493,363 UART: [kat] SHA2-512-ACC
495,984 UART: [kat] ECC-384
2,947,025 UART: [kat] HMAC-384Kdf
2,970,942 UART: [kat] LMS
3,502,726 UART: [kat] --
3,506,541 UART: [cold-reset] ++
3,508,808 UART: [fht] FHT @ 0x50003400
3,519,636 UART: [idev] ++
3,520,316 UART: [idev] CDI.KEYID = 6
3,521,263 UART: [idev] SUBJECT.KEYID = 7
3,522,477 UART: [idev] UDS.KEYID = 0
3,525,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,918 UART: [idev] Erasing UDS.KEYID = 0
6,029,978 UART: [idev] Sha1 KeyId Algorithm
6,052,795 UART: [idev] --
6,057,585 UART: [ldev] ++
6,058,280 UART: [ldev] CDI.KEYID = 6
6,059,216 UART: [ldev] SUBJECT.KEYID = 5
6,060,386 UART: [ldev] AUTHORITY.KEYID = 7
6,061,626 UART: [ldev] FE.KEYID = 1
6,098,963 UART: [ldev] Erasing FE.KEYID = 1
8,606,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,604 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,852 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,978 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,901 UART: [ldev] --
10,412,126 UART: [fwproc] Wait for Commands...
10,413,855 UART: [fwproc] Recv command 0x46574c44
10,416,119 UART: [fwproc] Recv'd Img size: 118548 bytes
12,488,190 UART: ROM Fatal Error: 0x000B0010
12,491,865 >>> mbox cmd response: failed
12,492,209 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,492,536 >>> mbox cmd response: failed
12,492,918 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,493,180 >>> mbox cmd response: failed
Initializing fuses
2,063,638 writing to cptra_bootfsm_go
2,252,930 UART:
2,253,278 UART: Running Caliptra ROM ...
2,254,330 UART:
2,254,488 UART: [state] CFI Enabled
2,314,513 UART: [state] LifecycleState = Unprovisioned
2,316,884 UART: [state] DebugLocked = No
2,318,220 UART: [state] WD Timer not started. Device not locked for debugging
2,323,432 UART: [kat] SHA2-256
2,513,339 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,086 UART: [kat] ++
2,524,553 UART: [kat] sha1
2,535,716 UART: [kat] SHA2-256
2,538,744 UART: [kat] SHA2-384
2,544,634 UART: [kat] SHA2-512-ACC
2,547,207 UART: [kat] ECC-384
5,002,243 UART: [kat] HMAC-384Kdf
5,025,176 UART: [kat] LMS
5,556,960 UART: [kat] --
5,561,609 UART: [cold-reset] ++
5,562,499 UART: [fht] FHT @ 0x50003400
5,574,655 UART: [idev] ++
5,575,340 UART: [idev] CDI.KEYID = 6
5,576,333 UART: [idev] SUBJECT.KEYID = 7
5,577,505 UART: [idev] UDS.KEYID = 0
5,579,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,010 UART: [idev] Erasing UDS.KEYID = 0
8,083,936 UART: [idev] Sha1 KeyId Algorithm
8,106,430 UART: [idev] --
8,112,057 UART: [ldev] ++
8,112,751 UART: [ldev] CDI.KEYID = 6
8,113,665 UART: [ldev] SUBJECT.KEYID = 5
8,114,891 UART: [ldev] AUTHORITY.KEYID = 7
8,116,071 UART: [ldev] FE.KEYID = 1
8,154,057 UART: [ldev] Erasing FE.KEYID = 1
10,659,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,122 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,366 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,481 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,834 UART: [ldev] --
12,467,543 UART: [fwproc] Wait for Commands...
12,469,377 UART: [fwproc] Recv command 0x46574c44
12,471,695 UART: [fwproc] Recv'd Img size: 118548 bytes
15,970,428 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,047,912 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,171,496 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,732,189 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
3,436,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,288,554 >>> mbox cmd response: failed
12,289,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,289,442 >>> mbox cmd response: failed
12,289,715 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,290,014 >>> mbox cmd response: failed
Initializing fuses
2,060,869 writing to cptra_bootfsm_go
5,501,047 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,889,897 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
192,599 UART:
192,953 UART: Running Caliptra ROM ...
194,149 UART:
603,657 UART: [state] CFI Enabled
616,508 UART: [state] LifecycleState = Unprovisioned
618,898 UART: [state] DebugLocked = No
621,738 UART: [state] WD Timer not started. Device not locked for debugging
626,124 UART: [kat] SHA2-256
816,045 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,807 UART: [kat] ++
827,354 UART: [kat] sha1
838,639 UART: [kat] SHA2-256
841,669 UART: [kat] SHA2-384
848,416 UART: [kat] SHA2-512-ACC
850,984 UART: [kat] ECC-384
3,292,138 UART: [kat] HMAC-384Kdf
3,304,933 UART: [kat] LMS
3,836,736 UART: [kat] --
3,841,708 UART: [cold-reset] ++
3,843,433 UART: [fht] FHT @ 0x50003400
3,855,287 UART: [idev] ++
3,855,966 UART: [idev] CDI.KEYID = 6
3,856,987 UART: [idev] SUBJECT.KEYID = 7
3,858,167 UART: [idev] UDS.KEYID = 0
3,860,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,012 UART: [idev] Erasing UDS.KEYID = 0
6,342,047 UART: [idev] Sha1 KeyId Algorithm
6,364,106 UART: [idev] --
6,370,208 UART: [ldev] ++
6,370,892 UART: [ldev] CDI.KEYID = 6
6,371,832 UART: [ldev] SUBJECT.KEYID = 5
6,373,014 UART: [ldev] AUTHORITY.KEYID = 7
6,374,258 UART: [ldev] FE.KEYID = 1
6,384,610 UART: [ldev] Erasing FE.KEYID = 1
8,864,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,827 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,926 UART: [ldev] --
10,658,122 UART: [fwproc] Wait for Commands...
10,660,930 UART: [fwproc] Recv command 0x46574c44
10,663,200 UART: [fwproc] Recv'd Img size: 118548 bytes
12,737,151 UART: ROM Fatal Error: 0x000B0010
12,740,759 >>> mbox cmd response: failed
12,741,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,492 >>> mbox cmd response: failed
12,741,778 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,742,080 >>> mbox cmd response: failed
Initializing fuses
2,060,272 writing to cptra_bootfsm_go
2,249,578 UART:
2,249,934 UART: Running Caliptra ROM ...
2,250,985 UART:
7,708,462 UART: [state] CFI Enabled
7,721,391 UART: [state] LifecycleState = Unprovisioned
7,723,755 UART: [state] DebugLocked = No
7,726,124 UART: [state] WD Timer not started. Device not locked for debugging
7,730,317 UART: [kat] SHA2-256
7,920,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,930,957 UART: [kat] ++
7,931,583 UART: [kat] sha1
7,943,138 UART: [kat] SHA2-256
7,946,159 UART: [kat] SHA2-384
7,952,111 UART: [kat] SHA2-512-ACC
7,954,693 UART: [kat] ECC-384
10,397,083 UART: [kat] HMAC-384Kdf
10,410,192 UART: [kat] LMS
10,942,041 UART: [kat] --
10,947,621 UART: [cold-reset] ++
10,948,533 UART: [fht] FHT @ 0x50003400
10,960,375 UART: [idev] ++
10,961,061 UART: [idev] CDI.KEYID = 6
10,962,036 UART: [idev] SUBJECT.KEYID = 7
10,963,199 UART: [idev] UDS.KEYID = 0
10,965,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,114,874 UART: [idev] Erasing UDS.KEYID = 0
13,440,429 UART: [idev] Sha1 KeyId Algorithm
13,461,954 UART: [idev] --
13,467,460 UART: [ldev] ++
13,468,144 UART: [ldev] CDI.KEYID = 6
13,469,054 UART: [ldev] SUBJECT.KEYID = 5
13,470,222 UART: [ldev] AUTHORITY.KEYID = 7
13,471,459 UART: [ldev] FE.KEYID = 1
13,482,002 UART: [ldev] Erasing FE.KEYID = 1
15,957,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,679,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,694,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,709,814 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,724,868 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,744,654 UART: [ldev] --
17,750,100 UART: [fwproc] Wait for Commands...
17,752,156 UART: [fwproc] Recv command 0x46574c44
17,754,500 UART: [fwproc] Recv'd Img size: 118548 bytes
21,244,441 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,324,742 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,448,327 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,009,162 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,757,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,500,411 >>> mbox cmd response: failed
12,500,996 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,348 >>> mbox cmd response: failed
12,501,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,501,931 >>> mbox cmd response: failed
Initializing fuses
2,061,658 writing to cptra_bootfsm_go
11,119,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,400,771 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,210 UART: [state] LifecycleState = Unprovisioned
85,865 UART: [state] DebugLocked = No
86,459 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,073 UART: [kat] SHA2-256
882,004 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,119 UART: [kat] ++
886,271 UART: [kat] sha1
890,505 UART: [kat] SHA2-256
892,443 UART: [kat] SHA2-384
895,048 UART: [kat] SHA2-512-ACC
896,949 UART: [kat] ECC-384
902,380 UART: [kat] HMAC-384Kdf
906,976 UART: [kat] LMS
1,475,172 UART: [kat] --
1,476,015 UART: [cold-reset] ++
1,476,563 UART: [fht] Storing FHT @ 0x50003400
1,479,562 UART: [idev] ++
1,479,730 UART: [idev] CDI.KEYID = 6
1,480,090 UART: [idev] SUBJECT.KEYID = 7
1,480,514 UART: [idev] UDS.KEYID = 0
1,480,859 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,326 UART: [idev] Erasing UDS.KEYID = 0
1,505,148 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,866 UART: [idev] --
1,514,977 UART: [ldev] ++
1,515,145 UART: [ldev] CDI.KEYID = 6
1,515,508 UART: [ldev] SUBJECT.KEYID = 5
1,515,934 UART: [ldev] AUTHORITY.KEYID = 7
1,516,397 UART: [ldev] FE.KEYID = 1
1,521,467 UART: [ldev] Erasing FE.KEYID = 1
1,546,668 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,869 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,585 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,476 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,188 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,478 UART: [ldev] --
1,585,961 UART: [fwproc] Waiting for Commands...
1,586,618 UART: [fwproc] Received command 0x46574c44
1,587,409 UART: [fwproc] Received Image of size 118548 bytes
1,630,652 UART: ROM Fatal Error: 0x000B0010
1,631,809 >>> mbox cmd response: failed
1,631,809 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,815 >>> mbox cmd response: failed
1,631,815 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,631,821 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,231 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,315 UART: [kat] SHA2-256
892,253 UART: [kat] SHA2-384
895,108 UART: [kat] SHA2-512-ACC
897,009 UART: [kat] ECC-384
902,522 UART: [kat] HMAC-384Kdf
907,092 UART: [kat] LMS
1,475,288 UART: [kat] --
1,475,969 UART: [cold-reset] ++
1,476,409 UART: [fht] Storing FHT @ 0x50003400
1,479,268 UART: [idev] ++
1,479,436 UART: [idev] CDI.KEYID = 6
1,479,796 UART: [idev] SUBJECT.KEYID = 7
1,480,220 UART: [idev] UDS.KEYID = 0
1,480,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,170 UART: [idev] Erasing UDS.KEYID = 0
1,505,138 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,804 UART: [idev] --
1,514,891 UART: [ldev] ++
1,515,059 UART: [ldev] CDI.KEYID = 6
1,515,422 UART: [ldev] SUBJECT.KEYID = 5
1,515,848 UART: [ldev] AUTHORITY.KEYID = 7
1,516,311 UART: [ldev] FE.KEYID = 1
1,521,203 UART: [ldev] Erasing FE.KEYID = 1
1,546,818 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,695 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,066 UART: [ldev] --
1,586,479 UART: [fwproc] Waiting for Commands...
1,587,272 UART: [fwproc] Received command 0x46574c44
1,588,063 UART: [fwproc] Received Image of size 118548 bytes
2,933,038 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,444 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,881 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,483,326 >>> mbox cmd response: failed
1,483,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,332 >>> mbox cmd response: failed
1,483,332 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,483,338 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,005 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,561 UART: [state] LifecycleState = Unprovisioned
86,216 UART: [state] DebugLocked = No
86,740 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,491 UART: [kat] SHA2-512-ACC
897,392 UART: [kat] ECC-384
903,305 UART: [kat] HMAC-384Kdf
908,053 UART: [kat] LMS
1,476,249 UART: [kat] --
1,477,300 UART: [cold-reset] ++
1,477,764 UART: [fht] Storing FHT @ 0x50003400
1,480,557 UART: [idev] ++
1,480,725 UART: [idev] CDI.KEYID = 6
1,481,085 UART: [idev] SUBJECT.KEYID = 7
1,481,509 UART: [idev] UDS.KEYID = 0
1,481,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,817 UART: [idev] Erasing UDS.KEYID = 0
1,506,899 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,465 UART: [idev] --
1,516,578 UART: [ldev] ++
1,516,746 UART: [ldev] CDI.KEYID = 6
1,517,109 UART: [ldev] SUBJECT.KEYID = 5
1,517,535 UART: [ldev] AUTHORITY.KEYID = 7
1,517,998 UART: [ldev] FE.KEYID = 1
1,523,392 UART: [ldev] Erasing FE.KEYID = 1
1,549,519 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,072 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,788 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,611 UART: [ldev] --
1,589,056 UART: [fwproc] Waiting for Commands...
1,589,813 UART: [fwproc] Received command 0x46574c44
1,590,604 UART: [fwproc] Received Image of size 118548 bytes
1,633,721 UART: ROM Fatal Error: 0x000B0010
1,634,878 >>> mbox cmd response: failed
1,634,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,884 >>> mbox cmd response: failed
1,634,884 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,634,890 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,619 UART: [state] LifecycleState = Unprovisioned
86,274 UART: [state] DebugLocked = No
86,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,496 UART: [kat] SHA2-256
882,427 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,542 UART: [kat] ++
886,694 UART: [kat] sha1
890,968 UART: [kat] SHA2-256
892,906 UART: [kat] SHA2-384
895,753 UART: [kat] SHA2-512-ACC
897,654 UART: [kat] ECC-384
903,597 UART: [kat] HMAC-384Kdf
908,407 UART: [kat] LMS
1,476,603 UART: [kat] --
1,477,400 UART: [cold-reset] ++
1,477,788 UART: [fht] Storing FHT @ 0x50003400
1,480,501 UART: [idev] ++
1,480,669 UART: [idev] CDI.KEYID = 6
1,481,029 UART: [idev] SUBJECT.KEYID = 7
1,481,453 UART: [idev] UDS.KEYID = 0
1,481,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,769 UART: [idev] Erasing UDS.KEYID = 0
1,506,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,935 UART: [idev] --
1,515,806 UART: [ldev] ++
1,515,974 UART: [ldev] CDI.KEYID = 6
1,516,337 UART: [ldev] SUBJECT.KEYID = 5
1,516,763 UART: [ldev] AUTHORITY.KEYID = 7
1,517,226 UART: [ldev] FE.KEYID = 1
1,522,334 UART: [ldev] Erasing FE.KEYID = 1
1,547,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,178 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,425 UART: [ldev] --
1,586,856 UART: [fwproc] Waiting for Commands...
1,587,583 UART: [fwproc] Received command 0x46574c44
1,588,374 UART: [fwproc] Received Image of size 118548 bytes
2,933,053 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,801 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,019 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,404 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,701 >>> mbox cmd response: failed
1,484,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,707 >>> mbox cmd response: failed
1,484,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,713 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,052 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,552 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,262 UART: [state] LifecycleState = Unprovisioned
85,917 UART: [state] DebugLocked = No
86,433 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
891,200 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,304 UART: [kat] ++
895,456 UART: [kat] sha1
899,630 UART: [kat] SHA2-256
901,570 UART: [kat] SHA2-384
904,367 UART: [kat] SHA2-512-ACC
906,268 UART: [kat] ECC-384
915,923 UART: [kat] HMAC-384Kdf
920,503 UART: [kat] LMS
1,168,815 UART: [kat] --
1,169,734 UART: [cold-reset] ++
1,170,224 UART: [fht] FHT @ 0x50003400
1,172,742 UART: [idev] ++
1,172,910 UART: [idev] CDI.KEYID = 6
1,173,271 UART: [idev] SUBJECT.KEYID = 7
1,173,696 UART: [idev] UDS.KEYID = 0
1,174,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,517 UART: [idev] Sha1 KeyId Algorithm
1,207,425 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,078 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,091 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,980 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,774 UART: [ldev] --
1,281,217 UART: [fwproc] Wait for Commands...
1,281,948 UART: [fwproc] Recv command 0x46574c44
1,282,681 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,391 UART: ROM Fatal Error: 0x000B0010
1,326,548 >>> mbox cmd response: failed
1,326,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,554 >>> mbox cmd response: failed
1,326,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,966 UART: [state] LifecycleState = Unprovisioned
85,621 UART: [state] DebugLocked = No
86,149 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,358 UART: [kat] SHA2-256
901,298 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
916,069 UART: [kat] HMAC-384Kdf
920,547 UART: [kat] LMS
1,168,859 UART: [kat] --
1,169,754 UART: [cold-reset] ++
1,170,202 UART: [fht] FHT @ 0x50003400
1,172,958 UART: [idev] ++
1,173,126 UART: [idev] CDI.KEYID = 6
1,173,487 UART: [idev] SUBJECT.KEYID = 7
1,173,912 UART: [idev] UDS.KEYID = 0
1,174,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,845 UART: [idev] Erasing UDS.KEYID = 0
1,198,379 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,234 UART: [ldev] ++
1,208,402 UART: [ldev] CDI.KEYID = 6
1,208,766 UART: [ldev] SUBJECT.KEYID = 5
1,209,193 UART: [ldev] AUTHORITY.KEYID = 7
1,209,656 UART: [ldev] FE.KEYID = 1
1,214,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,441 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,046 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,758 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,784 UART: [ldev] --
1,281,061 UART: [fwproc] Wait for Commands...
1,281,824 UART: [fwproc] Recv command 0x46574c44
1,282,557 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,846 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,021 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,344 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,340 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,161 >>> mbox cmd response: failed
1,181,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,167 >>> mbox cmd response: failed
1,181,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,181,173 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,675,569 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,673 UART: [state] LifecycleState = Unprovisioned
86,328 UART: [state] DebugLocked = No
86,996 UART: [state] WD Timer not started. Device not locked for debugging
88,223 UART: [kat] SHA2-256
891,773 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,877 UART: [kat] ++
896,029 UART: [kat] sha1
900,275 UART: [kat] SHA2-256
902,215 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,672 UART: [kat] HMAC-384Kdf
921,442 UART: [kat] LMS
1,169,754 UART: [kat] --
1,170,533 UART: [cold-reset] ++
1,170,931 UART: [fht] FHT @ 0x50003400
1,173,649 UART: [idev] ++
1,173,817 UART: [idev] CDI.KEYID = 6
1,174,178 UART: [idev] SUBJECT.KEYID = 7
1,174,603 UART: [idev] UDS.KEYID = 0
1,174,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,570 UART: [idev] Erasing UDS.KEYID = 0
1,200,068 UART: [idev] Sha1 KeyId Algorithm
1,208,876 UART: [idev] --
1,209,989 UART: [ldev] ++
1,210,157 UART: [ldev] CDI.KEYID = 6
1,210,521 UART: [ldev] SUBJECT.KEYID = 5
1,210,948 UART: [ldev] AUTHORITY.KEYID = 7
1,211,411 UART: [ldev] FE.KEYID = 1
1,216,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,676 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,918 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,634 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,523 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,431 UART: [ldev] --
1,281,772 UART: [fwproc] Wait for Commands...
1,282,499 UART: [fwproc] Recv command 0x46574c44
1,283,232 UART: [fwproc] Recv'd Img size: 118548 bytes
1,326,180 UART: ROM Fatal Error: 0x000B0010
1,327,337 >>> mbox cmd response: failed
1,327,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,343 >>> mbox cmd response: failed
1,327,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,327,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
87,012 UART: [state] WD Timer not started. Device not locked for debugging
88,171 UART: [kat] SHA2-256
891,721 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,825 UART: [kat] ++
895,977 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
905,008 UART: [kat] SHA2-512-ACC
906,909 UART: [kat] ECC-384
916,412 UART: [kat] HMAC-384Kdf
921,058 UART: [kat] LMS
1,169,370 UART: [kat] --
1,170,571 UART: [cold-reset] ++
1,170,983 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,174,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,108 UART: [idev] Erasing UDS.KEYID = 0
1,199,272 UART: [idev] Sha1 KeyId Algorithm
1,208,166 UART: [idev] --
1,209,153 UART: [ldev] ++
1,209,321 UART: [ldev] CDI.KEYID = 6
1,209,685 UART: [ldev] SUBJECT.KEYID = 5
1,210,112 UART: [ldev] AUTHORITY.KEYID = 7
1,210,575 UART: [ldev] FE.KEYID = 1
1,215,693 UART: [ldev] Erasing FE.KEYID = 1
1,242,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,774 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,490 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,379 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,091 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,081 UART: [ldev] --
1,281,338 UART: [fwproc] Wait for Commands...
1,282,119 UART: [fwproc] Recv command 0x46574c44
1,282,852 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,199 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,579 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,182 >>> mbox cmd response: failed
1,183,182 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,188 >>> mbox cmd response: failed
1,183,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,194 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,604 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,333 UART: [state] WD Timer not started. Device not locked for debugging
87,490 UART: [kat] SHA2-256
893,140 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,265 UART: [kat] ++
897,417 UART: [kat] sha1
901,621 UART: [kat] SHA2-256
903,561 UART: [kat] SHA2-384
906,434 UART: [kat] SHA2-512-ACC
908,335 UART: [kat] ECC-384
918,232 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,155 UART: [cold-reset] ++
1,172,701 UART: [fht] FHT @ 0x50003400
1,175,140 UART: [idev] ++
1,175,308 UART: [idev] CDI.KEYID = 6
1,175,668 UART: [idev] SUBJECT.KEYID = 7
1,176,092 UART: [idev] UDS.KEYID = 0
1,176,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,836 UART: [idev] Erasing UDS.KEYID = 0
1,201,561 UART: [idev] Sha1 KeyId Algorithm
1,210,249 UART: [idev] --
1,211,221 UART: [ldev] ++
1,211,389 UART: [ldev] CDI.KEYID = 6
1,211,752 UART: [ldev] SUBJECT.KEYID = 5
1,212,178 UART: [ldev] AUTHORITY.KEYID = 7
1,212,641 UART: [ldev] FE.KEYID = 1
1,217,841 UART: [ldev] Erasing FE.KEYID = 1
1,243,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,083 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,799 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,402 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,968 UART: [fwproc] Wait for Commands...
1,283,568 UART: [fwproc] Recv command 0x46574c44
1,284,296 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,001 UART: ROM Fatal Error: 0x000B0010
1,328,158 >>> mbox cmd response: failed
1,328,158 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,164 >>> mbox cmd response: failed
1,328,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,170 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,708 UART: [state] LifecycleState = Unprovisioned
85,363 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,138 UART: [kat] SHA2-256
892,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,913 UART: [kat] ++
897,065 UART: [kat] sha1
901,337 UART: [kat] SHA2-256
903,277 UART: [kat] SHA2-384
906,016 UART: [kat] SHA2-512-ACC
907,917 UART: [kat] ECC-384
917,950 UART: [kat] HMAC-384Kdf
922,602 UART: [kat] LMS
1,170,930 UART: [kat] --
1,172,063 UART: [cold-reset] ++
1,172,449 UART: [fht] FHT @ 0x50003400
1,174,920 UART: [idev] ++
1,175,088 UART: [idev] CDI.KEYID = 6
1,175,448 UART: [idev] SUBJECT.KEYID = 7
1,175,872 UART: [idev] UDS.KEYID = 0
1,176,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,196 UART: [idev] Erasing UDS.KEYID = 0
1,201,127 UART: [idev] Sha1 KeyId Algorithm
1,209,509 UART: [idev] --
1,210,705 UART: [ldev] ++
1,210,873 UART: [ldev] CDI.KEYID = 6
1,211,236 UART: [ldev] SUBJECT.KEYID = 5
1,211,662 UART: [ldev] AUTHORITY.KEYID = 7
1,212,125 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,141 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,748 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,654 UART: [fwproc] Wait for Commands...
1,283,360 UART: [fwproc] Recv command 0x46574c44
1,284,088 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,133 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,656 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,303 >>> mbox cmd response: failed
1,182,303 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,309 >>> mbox cmd response: failed
1,182,309 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,315 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,053 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,413 UART: [state] LifecycleState = Unprovisioned
86,068 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,929 UART: [kat] SHA2-256
893,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,704 UART: [kat] ++
897,856 UART: [kat] sha1
901,986 UART: [kat] SHA2-256
903,926 UART: [kat] SHA2-384
906,843 UART: [kat] SHA2-512-ACC
908,744 UART: [kat] ECC-384
918,443 UART: [kat] HMAC-384Kdf
923,155 UART: [kat] LMS
1,171,483 UART: [kat] --
1,172,538 UART: [cold-reset] ++
1,172,906 UART: [fht] FHT @ 0x50003400
1,175,737 UART: [idev] ++
1,175,905 UART: [idev] CDI.KEYID = 6
1,176,265 UART: [idev] SUBJECT.KEYID = 7
1,176,689 UART: [idev] UDS.KEYID = 0
1,177,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,445 UART: [idev] Erasing UDS.KEYID = 0
1,201,952 UART: [idev] Sha1 KeyId Algorithm
1,210,346 UART: [idev] --
1,211,322 UART: [ldev] ++
1,211,490 UART: [ldev] CDI.KEYID = 6
1,211,853 UART: [ldev] SUBJECT.KEYID = 5
1,212,279 UART: [ldev] AUTHORITY.KEYID = 7
1,212,742 UART: [ldev] FE.KEYID = 1
1,218,168 UART: [ldev] Erasing FE.KEYID = 1
1,244,761 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,274 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,165 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,877 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,790 UART: [ldev] --
1,284,191 UART: [fwproc] Wait for Commands...
1,284,939 UART: [fwproc] Recv command 0x46574c44
1,285,667 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,636 UART: ROM Fatal Error: 0x000B0010
1,329,793 >>> mbox cmd response: failed
1,329,793 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,799 >>> mbox cmd response: failed
1,329,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,805 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,813 UART: [kat] SHA2-256
893,463 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,588 UART: [kat] ++
897,740 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,611 UART: [kat] SHA2-512-ACC
908,512 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,613 UART: [kat] LMS
1,170,941 UART: [kat] --
1,171,906 UART: [cold-reset] ++
1,172,398 UART: [fht] FHT @ 0x50003400
1,175,203 UART: [idev] ++
1,175,371 UART: [idev] CDI.KEYID = 6
1,175,731 UART: [idev] SUBJECT.KEYID = 7
1,176,155 UART: [idev] UDS.KEYID = 0
1,176,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,933 UART: [idev] Erasing UDS.KEYID = 0
1,201,346 UART: [idev] Sha1 KeyId Algorithm
1,209,740 UART: [idev] --
1,210,780 UART: [ldev] ++
1,210,948 UART: [ldev] CDI.KEYID = 6
1,211,311 UART: [ldev] SUBJECT.KEYID = 5
1,211,737 UART: [ldev] AUTHORITY.KEYID = 7
1,212,200 UART: [ldev] FE.KEYID = 1
1,217,342 UART: [ldev] Erasing FE.KEYID = 1
1,244,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,630 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,346 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,237 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,949 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,932 UART: [ldev] --
1,283,303 UART: [fwproc] Wait for Commands...
1,284,017 UART: [fwproc] Recv command 0x46574c44
1,284,745 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,828 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,995 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,282 >>> mbox cmd response: failed
1,183,282 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,288 >>> mbox cmd response: failed
1,183,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,294 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,142 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_count_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,981 writing to cptra_bootfsm_go
192,201 UART:
192,571 UART: Running Caliptra ROM ...
193,670 UART:
193,816 UART: [state] CFI Enabled
262,122 UART: [state] LifecycleState = Unprovisioned
264,050 UART: [state] DebugLocked = No
266,055 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,543 UART: [kat] SHA2-256
440,265 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
450,750 UART: [kat] ++
451,194 UART: [kat] sha1
462,990 UART: [kat] SHA2-256
465,676 UART: [kat] SHA2-384
471,331 UART: [kat] SHA2-512-ACC
473,725 UART: [kat] ECC-384
2,766,622 UART: [kat] HMAC-384Kdf
2,798,619 UART: [kat] LMS
3,988,955 UART: [kat] --
3,995,338 UART: [cold-reset] ++
3,997,594 UART: [fht] Storing FHT @ 0x50003400
4,008,586 UART: [idev] ++
4,009,217 UART: [idev] CDI.KEYID = 6
4,010,104 UART: [idev] SUBJECT.KEYID = 7
4,011,375 UART: [idev] UDS.KEYID = 0
4,014,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,369 UART: [idev] Erasing UDS.KEYID = 0
7,345,303 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,918 UART: [idev] --
7,371,454 UART: [ldev] ++
7,372,032 UART: [ldev] CDI.KEYID = 6
7,373,015 UART: [ldev] SUBJECT.KEYID = 5
7,374,266 UART: [ldev] AUTHORITY.KEYID = 7
7,375,470 UART: [ldev] FE.KEYID = 1
7,420,480 UART: [ldev] Erasing FE.KEYID = 1
10,750,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,167 UART: [ldev] --
13,113,461 UART: [fwproc] Waiting for Commands...
13,116,752 UART: [fwproc] Received command 0x46574c44
13,118,947 UART: [fwproc] Received Image of size 118548 bytes
15,826,188 UART: ROM Fatal Error: 0x000B0040
15,829,702 >>> mbox cmd response: failed
15,830,044 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,366 >>> mbox cmd response: failed
15,830,664 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,830,998 >>> mbox cmd response: failed
Initializing fuses
2,056,318 writing to cptra_bootfsm_go
2,245,655 UART:
2,246,000 UART: Running Caliptra ROM ...
2,247,084 UART:
2,247,248 UART: [state] CFI Enabled
2,307,185 UART: [state] LifecycleState = Unprovisioned
2,309,169 UART: [state] DebugLocked = No
2,311,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,315,643 UART: [kat] SHA2-256
2,485,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,495,884 UART: [kat] ++
2,496,394 UART: [kat] sha1
2,507,017 UART: [kat] SHA2-256
2,509,709 UART: [kat] SHA2-384
2,515,061 UART: [kat] SHA2-512-ACC
2,517,420 UART: [kat] ECC-384
4,811,498 UART: [kat] HMAC-384Kdf
4,843,243 UART: [kat] LMS
6,033,515 UART: [kat] --
6,036,624 UART: [cold-reset] ++
6,038,133 UART: [fht] Storing FHT @ 0x50003400
6,049,346 UART: [idev] ++
6,049,925 UART: [idev] CDI.KEYID = 6
6,050,947 UART: [idev] SUBJECT.KEYID = 7
6,052,111 UART: [idev] UDS.KEYID = 0
6,054,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,203,596 UART: [idev] Erasing UDS.KEYID = 0
9,391,753 UART: [idev] Using Sha1 for KeyId Algorithm
9,412,992 UART: [idev] --
9,417,942 UART: [ldev] ++
9,418,580 UART: [ldev] CDI.KEYID = 6
9,419,467 UART: [ldev] SUBJECT.KEYID = 5
9,420,744 UART: [ldev] AUTHORITY.KEYID = 7
9,421,985 UART: [ldev] FE.KEYID = 1
9,466,031 UART: [ldev] Erasing FE.KEYID = 1
12,797,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,092,628 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,107,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,122,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,136,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,153,794 UART: [ldev] --
15,157,829 UART: [fwproc] Waiting for Commands...
15,160,364 UART: [fwproc] Received command 0x46574c44
15,162,628 UART: [fwproc] Received Image of size 118548 bytes
19,257,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,333,005 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,406,192 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,734,038 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
3,787,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,566,183 >>> mbox cmd response: failed
15,566,788 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,567,307 >>> mbox cmd response: failed
15,567,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,567,889 >>> mbox cmd response: failed
Initializing fuses
2,056,716 writing to cptra_bootfsm_go
5,835,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,965,592 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,209 writing to cptra_bootfsm_go
192,515 UART:
192,876 UART: Running Caliptra ROM ...
194,023 UART:
603,701 UART: [state] CFI Enabled
621,198 UART: [state] LifecycleState = Unprovisioned
623,136 UART: [state] DebugLocked = No
624,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,037 UART: [kat] SHA2-256
799,787 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,373 UART: [kat] ++
810,853 UART: [kat] sha1
822,760 UART: [kat] SHA2-256
825,509 UART: [kat] SHA2-384
830,627 UART: [kat] SHA2-512-ACC
833,026 UART: [kat] ECC-384
3,118,205 UART: [kat] HMAC-384Kdf
3,130,401 UART: [kat] LMS
4,320,511 UART: [kat] --
4,327,271 UART: [cold-reset] ++
4,328,596 UART: [fht] Storing FHT @ 0x50003400
4,338,913 UART: [idev] ++
4,339,492 UART: [idev] CDI.KEYID = 6
4,340,381 UART: [idev] SUBJECT.KEYID = 7
4,341,658 UART: [idev] UDS.KEYID = 0
4,344,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,797 UART: [idev] Erasing UDS.KEYID = 0
7,631,625 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,269 UART: [idev] --
7,656,270 UART: [ldev] ++
7,656,849 UART: [ldev] CDI.KEYID = 6
7,657,819 UART: [ldev] SUBJECT.KEYID = 5
7,659,062 UART: [ldev] AUTHORITY.KEYID = 7
7,660,312 UART: [ldev] FE.KEYID = 1
7,672,214 UART: [ldev] Erasing FE.KEYID = 1
10,964,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,258,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,273,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,287,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,302,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,320,835 UART: [ldev] --
13,325,899 UART: [fwproc] Waiting for Commands...
13,329,255 UART: [fwproc] Received command 0x46574c44
13,331,445 UART: [fwproc] Received Image of size 118548 bytes
16,033,937 UART: ROM Fatal Error: 0x000B0040
16,037,481 >>> mbox cmd response: failed
16,037,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,038,261 >>> mbox cmd response: failed
16,038,556 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,038,862 >>> mbox cmd response: failed
Initializing fuses
2,057,496 writing to cptra_bootfsm_go
2,246,793 UART:
2,247,135 UART: Running Caliptra ROM ...
2,248,225 UART:
4,418,503 UART: [state] CFI Enabled
4,432,452 UART: [state] LifecycleState = Unprovisioned
4,434,383 UART: [state] DebugLocked = No
4,435,896 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
4,439,991 UART: [kat] SHA2-256
4,609,752 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,620,292 UART: [kat] ++
4,620,868 UART: [kat] sha1
4,630,745 UART: [kat] SHA2-256
4,633,451 UART: [kat] SHA2-384
4,639,931 UART: [kat] SHA2-512-ACC
4,642,292 UART: [kat] ECC-384
6,923,926 UART: [kat] HMAC-384Kdf
6,937,047 UART: [kat] LMS
8,127,147 UART: [kat] --
8,129,933 UART: [cold-reset] ++
8,130,877 UART: [fht] Storing FHT @ 0x50003400
8,141,165 UART: [idev] ++
8,141,735 UART: [idev] CDI.KEYID = 6
8,142,636 UART: [idev] SUBJECT.KEYID = 7
8,143,912 UART: [idev] UDS.KEYID = 0
8,146,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
8,295,637 UART: [idev] Erasing UDS.KEYID = 0
11,430,417 UART: [idev] Using Sha1 for KeyId Algorithm
11,452,908 UART: [idev] --
11,456,862 UART: [ldev] ++
11,457,434 UART: [ldev] CDI.KEYID = 6
11,458,372 UART: [ldev] SUBJECT.KEYID = 5
11,459,659 UART: [ldev] AUTHORITY.KEYID = 7
11,460,906 UART: [ldev] FE.KEYID = 1
11,470,824 UART: [ldev] Erasing FE.KEYID = 1
14,761,681 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
17,056,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,071,248 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,086,055 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,100,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,120,290 UART: [ldev] --
17,125,552 UART: [fwproc] Waiting for Commands...
17,127,993 UART: [fwproc] Received command 0x46574c44
17,130,207 UART: [fwproc] Received Image of size 118548 bytes
21,231,606 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,307,093 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,380,295 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
21,709,653 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
4,124,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,758,501 >>> mbox cmd response: failed
15,759,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,759,516 >>> mbox cmd response: failed
15,759,792 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
15,760,099 >>> mbox cmd response: failed
Initializing fuses
2,056,765 writing to cptra_bootfsm_go
8,223,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,258,892 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
192,238 UART:
192,605 UART: Running Caliptra ROM ...
193,807 UART:
194,354 UART: [state] CFI Enabled
263,048 UART: [state] LifecycleState = Unprovisioned
264,997 UART: [state] DebugLocked = No
267,676 UART: [state] WD Timer not started. Device not locked for debugging
272,463 UART: [kat] SHA2-256
452,108 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,873 UART: [kat] ++
463,324 UART: [kat] sha1
474,768 UART: [kat] SHA2-256
477,462 UART: [kat] SHA2-384
482,902 UART: [kat] SHA2-512-ACC
485,299 UART: [kat] ECC-384
2,946,781 UART: [kat] HMAC-384Kdf
2,968,258 UART: [kat] LMS
3,444,759 UART: [kat] --
3,448,764 UART: [cold-reset] ++
3,450,703 UART: [fht] FHT @ 0x50003400
3,461,269 UART: [idev] ++
3,461,840 UART: [idev] CDI.KEYID = 6
3,462,859 UART: [idev] SUBJECT.KEYID = 7
3,464,021 UART: [idev] UDS.KEYID = 0
3,466,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,615,904 UART: [idev] Erasing UDS.KEYID = 0
5,986,715 UART: [idev] Sha1 KeyId Algorithm
6,010,286 UART: [idev] --
6,015,370 UART: [ldev] ++
6,015,948 UART: [ldev] CDI.KEYID = 6
6,016,874 UART: [ldev] SUBJECT.KEYID = 5
6,018,038 UART: [ldev] AUTHORITY.KEYID = 7
6,019,335 UART: [ldev] FE.KEYID = 1
6,055,005 UART: [ldev] Erasing FE.KEYID = 1
8,562,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,006 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,288 UART: [ldev] --
10,368,974 UART: [fwproc] Wait for Commands...
10,371,737 UART: [fwproc] Recv command 0x46574c44
10,373,788 UART: [fwproc] Recv'd Img size: 118548 bytes
12,441,968 UART: ROM Fatal Error: 0x000B0040
12,445,208 >>> mbox cmd response: failed
12,445,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,012 >>> mbox cmd response: failed
12,446,283 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,446,580 >>> mbox cmd response: failed
Initializing fuses
2,061,659 writing to cptra_bootfsm_go
2,250,932 UART:
2,251,267 UART: Running Caliptra ROM ...
2,252,322 UART:
2,252,477 UART: [state] CFI Enabled
2,320,124 UART: [state] LifecycleState = Unprovisioned
2,322,062 UART: [state] DebugLocked = No
2,324,271 UART: [state] WD Timer not started. Device not locked for debugging
2,328,233 UART: [kat] SHA2-256
2,507,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,661 UART: [kat] ++
2,519,124 UART: [kat] sha1
2,529,696 UART: [kat] SHA2-256
2,532,443 UART: [kat] SHA2-384
2,537,836 UART: [kat] SHA2-512-ACC
2,540,197 UART: [kat] ECC-384
5,003,199 UART: [kat] HMAC-384Kdf
5,027,698 UART: [kat] LMS
5,504,198 UART: [kat] --
5,508,884 UART: [cold-reset] ++
5,511,282 UART: [fht] FHT @ 0x50003400
5,523,243 UART: [idev] ++
5,523,821 UART: [idev] CDI.KEYID = 6
5,524,761 UART: [idev] SUBJECT.KEYID = 7
5,526,030 UART: [idev] UDS.KEYID = 0
5,528,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,677,438 UART: [idev] Erasing UDS.KEYID = 0
8,044,661 UART: [idev] Sha1 KeyId Algorithm
8,067,304 UART: [idev] --
8,072,207 UART: [ldev] ++
8,072,793 UART: [ldev] CDI.KEYID = 6
8,073,685 UART: [ldev] SUBJECT.KEYID = 5
8,074,924 UART: [ldev] AUTHORITY.KEYID = 7
8,076,165 UART: [ldev] FE.KEYID = 1
8,112,612 UART: [ldev] Erasing FE.KEYID = 1
10,618,116 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,952 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,339 UART: [ldev] --
12,429,582 UART: [fwproc] Wait for Commands...
12,432,007 UART: [fwproc] Recv command 0x46574c44
12,434,002 UART: [fwproc] Recv'd Img size: 118548 bytes
15,920,064 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,436 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,461 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,394,958 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,460,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,298,242 >>> mbox cmd response: failed
12,298,816 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,177 >>> mbox cmd response: failed
12,299,476 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,299,772 >>> mbox cmd response: failed
Initializing fuses
2,062,726 writing to cptra_bootfsm_go
5,513,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,269,088 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,378 writing to cptra_bootfsm_go
192,660 UART:
193,021 UART: Running Caliptra ROM ...
194,238 UART:
603,807 UART: [state] CFI Enabled
616,834 UART: [state] LifecycleState = Unprovisioned
618,725 UART: [state] DebugLocked = No
620,778 UART: [state] WD Timer not started. Device not locked for debugging
625,461 UART: [kat] SHA2-256
805,119 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,900 UART: [kat] ++
816,373 UART: [kat] sha1
828,333 UART: [kat] SHA2-256
831,034 UART: [kat] SHA2-384
837,459 UART: [kat] SHA2-512-ACC
839,816 UART: [kat] ECC-384
3,280,721 UART: [kat] HMAC-384Kdf
3,294,583 UART: [kat] LMS
3,771,123 UART: [kat] --
3,775,396 UART: [cold-reset] ++
3,776,378 UART: [fht] FHT @ 0x50003400
3,786,732 UART: [idev] ++
3,787,362 UART: [idev] CDI.KEYID = 6
3,788,269 UART: [idev] SUBJECT.KEYID = 7
3,789,496 UART: [idev] UDS.KEYID = 0
3,792,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,185 UART: [idev] Erasing UDS.KEYID = 0
6,264,609 UART: [idev] Sha1 KeyId Algorithm
6,287,415 UART: [idev] --
6,292,170 UART: [ldev] ++
6,292,742 UART: [ldev] CDI.KEYID = 6
6,293,629 UART: [ldev] SUBJECT.KEYID = 5
6,294,846 UART: [ldev] AUTHORITY.KEYID = 7
6,296,142 UART: [ldev] FE.KEYID = 1
6,309,247 UART: [ldev] Erasing FE.KEYID = 1
8,787,994 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,467 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,805 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,151 UART: [ldev] --
10,581,921 UART: [fwproc] Wait for Commands...
10,584,192 UART: [fwproc] Recv command 0x46574c44
10,586,187 UART: [fwproc] Recv'd Img size: 118548 bytes
12,656,130 UART: ROM Fatal Error: 0x000B0040
12,659,415 >>> mbox cmd response: failed
12,659,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,186 >>> mbox cmd response: failed
12,660,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,660,750 >>> mbox cmd response: failed
Initializing fuses
2,069,823 writing to cptra_bootfsm_go
2,259,170 UART:
2,259,526 UART: Running Caliptra ROM ...
2,260,669 UART:
7,795,535 UART: [state] CFI Enabled
7,809,644 UART: [state] LifecycleState = Unprovisioned
7,811,565 UART: [state] DebugLocked = No
7,814,260 UART: [state] WD Timer not started. Device not locked for debugging
7,817,754 UART: [kat] SHA2-256
7,997,410 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,008,158 UART: [kat] ++
8,008,627 UART: [kat] sha1
8,020,006 UART: [kat] SHA2-256
8,022,666 UART: [kat] SHA2-384
8,027,911 UART: [kat] SHA2-512-ACC
8,030,274 UART: [kat] ECC-384
10,471,287 UART: [kat] HMAC-384Kdf
10,483,726 UART: [kat] LMS
10,960,236 UART: [kat] --
10,963,698 UART: [cold-reset] ++
10,964,881 UART: [fht] FHT @ 0x50003400
10,975,211 UART: [idev] ++
10,975,786 UART: [idev] CDI.KEYID = 6
10,976,718 UART: [idev] SUBJECT.KEYID = 7
10,977,991 UART: [idev] UDS.KEYID = 0
10,980,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,129,240 UART: [idev] Erasing UDS.KEYID = 0
13,457,147 UART: [idev] Sha1 KeyId Algorithm
13,479,634 UART: [idev] --
13,483,310 UART: [ldev] ++
13,483,878 UART: [ldev] CDI.KEYID = 6
13,484,793 UART: [ldev] SUBJECT.KEYID = 5
13,486,012 UART: [ldev] AUTHORITY.KEYID = 7
13,487,247 UART: [ldev] FE.KEYID = 1
13,496,942 UART: [ldev] Erasing FE.KEYID = 1
15,973,435 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,695,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,711,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,726,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,742,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,762,904 UART: [ldev] --
17,768,729 UART: [fwproc] Wait for Commands...
17,770,357 UART: [fwproc] Recv command 0x46574c44
17,772,360 UART: [fwproc] Recv'd Img size: 118548 bytes
21,252,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,330,316 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,403,337 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
21,732,024 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,776,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,539,728 >>> mbox cmd response: failed
12,540,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,540,696 >>> mbox cmd response: failed
12,540,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,541,290 >>> mbox cmd response: failed
Initializing fuses
2,060,372 writing to cptra_bootfsm_go
11,110,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,774,895 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,041 UART:
192,410 UART: Running Caliptra ROM ...
193,596 UART:
193,750 UART: [state] CFI Enabled
263,010 UART: [state] LifecycleState = Unprovisioned
265,432 UART: [state] DebugLocked = No
268,176 UART: [state] WD Timer not started. Device not locked for debugging
272,426 UART: [kat] SHA2-256
462,301 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,086 UART: [kat] ++
473,545 UART: [kat] sha1
484,104 UART: [kat] SHA2-256
487,114 UART: [kat] SHA2-384
493,599 UART: [kat] SHA2-512-ACC
496,227 UART: [kat] ECC-384
2,945,540 UART: [kat] HMAC-384Kdf
2,969,140 UART: [kat] LMS
3,500,918 UART: [kat] --
3,505,736 UART: [cold-reset] ++
3,507,997 UART: [fht] FHT @ 0x50003400
3,520,497 UART: [idev] ++
3,521,180 UART: [idev] CDI.KEYID = 6
3,522,203 UART: [idev] SUBJECT.KEYID = 7
3,523,369 UART: [idev] UDS.KEYID = 0
3,526,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,513 UART: [idev] Erasing UDS.KEYID = 0
6,025,068 UART: [idev] Sha1 KeyId Algorithm
6,046,780 UART: [idev] --
6,051,298 UART: [ldev] ++
6,052,012 UART: [ldev] CDI.KEYID = 6
6,052,908 UART: [ldev] SUBJECT.KEYID = 5
6,054,073 UART: [ldev] AUTHORITY.KEYID = 7
6,055,257 UART: [ldev] FE.KEYID = 1
6,097,752 UART: [ldev] Erasing FE.KEYID = 1
8,605,944 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,083 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,304 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,003 UART: [ldev] --
10,410,626 UART: [fwproc] Wait for Commands...
10,413,382 UART: [fwproc] Recv command 0x46574c44
10,415,644 UART: [fwproc] Recv'd Img size: 118548 bytes
12,503,909 UART: ROM Fatal Error: 0x000B0040
12,507,568 >>> mbox cmd response: failed
12,507,937 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,332 >>> mbox cmd response: failed
12,508,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,508,907 >>> mbox cmd response: failed
Initializing fuses
2,062,607 writing to cptra_bootfsm_go
2,251,945 UART:
2,252,284 UART: Running Caliptra ROM ...
2,253,427 UART:
2,253,613 UART: [state] CFI Enabled
2,324,489 UART: [state] LifecycleState = Unprovisioned
2,326,852 UART: [state] DebugLocked = No
2,328,524 UART: [state] WD Timer not started. Device not locked for debugging
2,333,686 UART: [kat] SHA2-256
2,523,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,534,314 UART: [kat] ++
2,534,983 UART: [kat] sha1
2,545,991 UART: [kat] SHA2-256
2,549,019 UART: [kat] SHA2-384
2,554,531 UART: [kat] SHA2-512-ACC
2,557,118 UART: [kat] ECC-384
5,005,305 UART: [kat] HMAC-384Kdf
5,029,321 UART: [kat] LMS
5,561,110 UART: [kat] --
5,565,110 UART: [cold-reset] ++
5,567,265 UART: [fht] FHT @ 0x50003400
5,580,197 UART: [idev] ++
5,580,885 UART: [idev] CDI.KEYID = 6
5,581,808 UART: [idev] SUBJECT.KEYID = 7
5,583,029 UART: [idev] UDS.KEYID = 0
5,585,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,734,541 UART: [idev] Erasing UDS.KEYID = 0
8,088,887 UART: [idev] Sha1 KeyId Algorithm
8,110,923 UART: [idev] --
8,116,414 UART: [ldev] ++
8,117,114 UART: [ldev] CDI.KEYID = 6
8,118,029 UART: [ldev] SUBJECT.KEYID = 5
8,119,200 UART: [ldev] AUTHORITY.KEYID = 7
8,120,443 UART: [ldev] FE.KEYID = 1
8,159,615 UART: [ldev] Erasing FE.KEYID = 1
10,665,109 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,400,244 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,415,451 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,430,685 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,445,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,466,634 UART: [ldev] --
12,472,412 UART: [fwproc] Wait for Commands...
12,475,216 UART: [fwproc] Recv command 0x46574c44
12,477,540 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,743 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,051,806 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,175,374 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,173 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
3,444,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,308,041 >>> mbox cmd response: failed
12,308,610 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,308,965 >>> mbox cmd response: failed
12,309,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,309,531 >>> mbox cmd response: failed
Initializing fuses
2,062,052 writing to cptra_bootfsm_go
5,467,456 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,844,694 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,511 writing to cptra_bootfsm_go
192,648 UART:
193,032 UART: Running Caliptra ROM ...
194,178 UART:
603,852 UART: [state] CFI Enabled
614,215 UART: [state] LifecycleState = Unprovisioned
616,562 UART: [state] DebugLocked = No
618,705 UART: [state] WD Timer not started. Device not locked for debugging
623,196 UART: [kat] SHA2-256
813,080 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
823,863 UART: [kat] ++
824,459 UART: [kat] sha1
837,511 UART: [kat] SHA2-256
840,520 UART: [kat] SHA2-384
847,431 UART: [kat] SHA2-512-ACC
850,050 UART: [kat] ECC-384
3,288,941 UART: [kat] HMAC-384Kdf
3,301,663 UART: [kat] LMS
3,833,454 UART: [kat] --
3,838,164 UART: [cold-reset] ++
3,839,349 UART: [fht] FHT @ 0x50003400
3,851,098 UART: [idev] ++
3,851,807 UART: [idev] CDI.KEYID = 6
3,852,830 UART: [idev] SUBJECT.KEYID = 7
3,853,936 UART: [idev] UDS.KEYID = 0
3,856,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,081 UART: [idev] Erasing UDS.KEYID = 0
6,335,758 UART: [idev] Sha1 KeyId Algorithm
6,358,308 UART: [idev] --
6,363,876 UART: [ldev] ++
6,364,581 UART: [ldev] CDI.KEYID = 6
6,365,501 UART: [ldev] SUBJECT.KEYID = 5
6,366,667 UART: [ldev] AUTHORITY.KEYID = 7
6,367,856 UART: [ldev] FE.KEYID = 1
6,379,969 UART: [ldev] Erasing FE.KEYID = 1
8,857,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,233 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,636 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,733 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,924 UART: [ldev] --
10,648,595 UART: [fwproc] Wait for Commands...
10,650,591 UART: [fwproc] Recv command 0x46574c44
10,652,866 UART: [fwproc] Recv'd Img size: 118548 bytes
12,736,420 UART: ROM Fatal Error: 0x000B0040
12,740,093 >>> mbox cmd response: failed
12,740,520 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,740,861 >>> mbox cmd response: failed
12,741,139 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,741,440 >>> mbox cmd response: failed
Initializing fuses
2,061,417 writing to cptra_bootfsm_go
2,250,781 UART:
2,251,134 UART: Running Caliptra ROM ...
2,252,272 UART:
7,699,202 UART: [state] CFI Enabled
7,714,833 UART: [state] LifecycleState = Unprovisioned
7,717,253 UART: [state] DebugLocked = No
7,719,240 UART: [state] WD Timer not started. Device not locked for debugging
7,724,142 UART: [kat] SHA2-256
7,914,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
7,924,837 UART: [kat] ++
7,925,442 UART: [kat] sha1
7,936,901 UART: [kat] SHA2-256
7,939,892 UART: [kat] SHA2-384
7,947,135 UART: [kat] SHA2-512-ACC
7,949,711 UART: [kat] ECC-384
10,393,555 UART: [kat] HMAC-384Kdf
10,407,302 UART: [kat] LMS
10,939,145 UART: [kat] --
10,944,378 UART: [cold-reset] ++
10,945,936 UART: [fht] FHT @ 0x50003400
10,958,162 UART: [idev] ++
10,958,848 UART: [idev] CDI.KEYID = 6
10,959,816 UART: [idev] SUBJECT.KEYID = 7
10,960,895 UART: [idev] UDS.KEYID = 0
10,963,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,112,780 UART: [idev] Erasing UDS.KEYID = 0
13,437,390 UART: [idev] Sha1 KeyId Algorithm
13,460,838 UART: [idev] --
13,465,727 UART: [ldev] ++
13,466,418 UART: [ldev] CDI.KEYID = 6
13,467,309 UART: [ldev] SUBJECT.KEYID = 5
13,468,527 UART: [ldev] AUTHORITY.KEYID = 7
13,469,672 UART: [ldev] FE.KEYID = 1
13,480,643 UART: [ldev] Erasing FE.KEYID = 1
15,961,259 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
17,682,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
17,697,703 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
17,712,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
17,727,999 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
17,748,725 UART: [ldev] --
17,753,351 UART: [fwproc] Wait for Commands...
17,756,426 UART: [fwproc] Recv command 0x46574c44
17,758,692 UART: [fwproc] Recv'd Img size: 118548 bytes
21,248,797 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,328,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,451,789 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,011,307 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,141 writing to cptra_bootfsm_go
3,757,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,524,966 >>> mbox cmd response: failed
12,525,532 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,525,911 >>> mbox cmd response: failed
12,526,188 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,526,491 >>> mbox cmd response: failed
Initializing fuses
2,069,412 writing to cptra_bootfsm_go
11,096,641 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,388,407 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,192 UART: [state] LifecycleState = Unprovisioned
85,847 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,871 UART: [kat] SHA2-256
881,802 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,917 UART: [kat] ++
886,069 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
894,820 UART: [kat] SHA2-512-ACC
896,721 UART: [kat] ECC-384
902,316 UART: [kat] HMAC-384Kdf
906,904 UART: [kat] LMS
1,475,100 UART: [kat] --
1,475,869 UART: [cold-reset] ++
1,476,299 UART: [fht] Storing FHT @ 0x50003400
1,479,122 UART: [idev] ++
1,479,290 UART: [idev] CDI.KEYID = 6
1,479,650 UART: [idev] SUBJECT.KEYID = 7
1,480,074 UART: [idev] UDS.KEYID = 0
1,480,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,412 UART: [idev] Erasing UDS.KEYID = 0
1,504,530 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,982 UART: [idev] --
1,514,009 UART: [ldev] ++
1,514,177 UART: [ldev] CDI.KEYID = 6
1,514,540 UART: [ldev] SUBJECT.KEYID = 5
1,514,966 UART: [ldev] AUTHORITY.KEYID = 7
1,515,429 UART: [ldev] FE.KEYID = 1
1,520,467 UART: [ldev] Erasing FE.KEYID = 1
1,545,384 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,790 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,502 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,608 UART: [ldev] --
1,584,907 UART: [fwproc] Waiting for Commands...
1,585,538 UART: [fwproc] Received command 0x46574c44
1,586,329 UART: [fwproc] Received Image of size 118548 bytes
1,634,268 UART: ROM Fatal Error: 0x000B0040
1,635,425 >>> mbox cmd response: failed
1,635,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,431 >>> mbox cmd response: failed
1,635,431 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,635,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,278 UART: [state] LifecycleState = Unprovisioned
85,933 UART: [state] DebugLocked = No
86,615 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,305 UART: [kat] SHA2-256
882,236 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,351 UART: [kat] ++
886,503 UART: [kat] sha1
890,823 UART: [kat] SHA2-256
892,761 UART: [kat] SHA2-384
895,512 UART: [kat] SHA2-512-ACC
897,413 UART: [kat] ECC-384
903,100 UART: [kat] HMAC-384Kdf
907,718 UART: [kat] LMS
1,475,914 UART: [kat] --
1,476,911 UART: [cold-reset] ++
1,477,281 UART: [fht] Storing FHT @ 0x50003400
1,480,096 UART: [idev] ++
1,480,264 UART: [idev] CDI.KEYID = 6
1,480,624 UART: [idev] SUBJECT.KEYID = 7
1,481,048 UART: [idev] UDS.KEYID = 0
1,481,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,324 UART: [idev] Erasing UDS.KEYID = 0
1,506,310 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,056 UART: [idev] --
1,516,041 UART: [ldev] ++
1,516,209 UART: [ldev] CDI.KEYID = 6
1,516,572 UART: [ldev] SUBJECT.KEYID = 5
1,516,998 UART: [ldev] AUTHORITY.KEYID = 7
1,517,461 UART: [ldev] FE.KEYID = 1
1,522,351 UART: [ldev] Erasing FE.KEYID = 1
1,547,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,522 UART: [ldev] --
1,587,019 UART: [fwproc] Waiting for Commands...
1,587,642 UART: [fwproc] Received command 0x46574c44
1,588,433 UART: [fwproc] Received Image of size 118548 bytes
2,931,924 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,962 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,180 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,427 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,278 >>> mbox cmd response: failed
1,488,278 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,284 >>> mbox cmd response: failed
1,488,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,488,290 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,458 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,463 UART: [state] LifecycleState = Unprovisioned
86,118 UART: [state] DebugLocked = No
86,704 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,256 UART: [kat] SHA2-256
882,187 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,302 UART: [kat] ++
886,454 UART: [kat] sha1
890,708 UART: [kat] SHA2-256
892,646 UART: [kat] SHA2-384
895,555 UART: [kat] SHA2-512-ACC
897,456 UART: [kat] ECC-384
903,315 UART: [kat] HMAC-384Kdf
907,885 UART: [kat] LMS
1,476,081 UART: [kat] --
1,477,026 UART: [cold-reset] ++
1,477,424 UART: [fht] Storing FHT @ 0x50003400
1,480,153 UART: [idev] ++
1,480,321 UART: [idev] CDI.KEYID = 6
1,480,681 UART: [idev] SUBJECT.KEYID = 7
1,481,105 UART: [idev] UDS.KEYID = 0
1,481,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,887 UART: [idev] Erasing UDS.KEYID = 0
1,505,621 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,205 UART: [idev] --
1,515,056 UART: [ldev] ++
1,515,224 UART: [ldev] CDI.KEYID = 6
1,515,587 UART: [ldev] SUBJECT.KEYID = 5
1,516,013 UART: [ldev] AUTHORITY.KEYID = 7
1,516,476 UART: [ldev] FE.KEYID = 1
1,521,700 UART: [ldev] Erasing FE.KEYID = 1
1,546,937 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,951 UART: [ldev] --
1,586,388 UART: [fwproc] Waiting for Commands...
1,587,185 UART: [fwproc] Received command 0x46574c44
1,587,976 UART: [fwproc] Received Image of size 118548 bytes
1,635,821 UART: ROM Fatal Error: 0x000B0040
1,636,978 >>> mbox cmd response: failed
1,636,978 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,984 >>> mbox cmd response: failed
1,636,984 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,636,990 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,611 UART: [state] LifecycleState = Unprovisioned
86,266 UART: [state] DebugLocked = No
86,804 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,494 UART: [kat] SHA2-256
882,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,540 UART: [kat] ++
886,692 UART: [kat] sha1
890,998 UART: [kat] SHA2-256
892,936 UART: [kat] SHA2-384
895,567 UART: [kat] SHA2-512-ACC
897,468 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,763 UART: [kat] LMS
1,475,959 UART: [kat] --
1,476,920 UART: [cold-reset] ++
1,477,374 UART: [fht] Storing FHT @ 0x50003400
1,480,145 UART: [idev] ++
1,480,313 UART: [idev] CDI.KEYID = 6
1,480,673 UART: [idev] SUBJECT.KEYID = 7
1,481,097 UART: [idev] UDS.KEYID = 0
1,481,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,863 UART: [idev] Erasing UDS.KEYID = 0
1,505,693 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,307 UART: [idev] --
1,515,372 UART: [ldev] ++
1,515,540 UART: [ldev] CDI.KEYID = 6
1,515,903 UART: [ldev] SUBJECT.KEYID = 5
1,516,329 UART: [ldev] AUTHORITY.KEYID = 7
1,516,792 UART: [ldev] FE.KEYID = 1
1,521,782 UART: [ldev] Erasing FE.KEYID = 1
1,546,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,814 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,133 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,079 UART: [ldev] --
1,585,588 UART: [fwproc] Waiting for Commands...
1,586,373 UART: [fwproc] Received command 0x46574c44
1,587,164 UART: [fwproc] Received Image of size 118548 bytes
2,931,469 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,511 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,729 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,116 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,457 >>> mbox cmd response: failed
1,489,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,463 >>> mbox cmd response: failed
1,489,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,489,469 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,606 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,472 UART: [state] LifecycleState = Unprovisioned
86,127 UART: [state] DebugLocked = No
86,663 UART: [state] WD Timer not started. Device not locked for debugging
87,838 UART: [kat] SHA2-256
891,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,492 UART: [kat] ++
895,644 UART: [kat] sha1
899,868 UART: [kat] SHA2-256
901,808 UART: [kat] SHA2-384
904,475 UART: [kat] SHA2-512-ACC
906,376 UART: [kat] ECC-384
916,353 UART: [kat] HMAC-384Kdf
921,019 UART: [kat] LMS
1,169,331 UART: [kat] --
1,170,168 UART: [cold-reset] ++
1,170,702 UART: [fht] FHT @ 0x50003400
1,173,298 UART: [idev] ++
1,173,466 UART: [idev] CDI.KEYID = 6
1,173,827 UART: [idev] SUBJECT.KEYID = 7
1,174,252 UART: [idev] UDS.KEYID = 0
1,174,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,143 UART: [idev] Erasing UDS.KEYID = 0
1,199,185 UART: [idev] Sha1 KeyId Algorithm
1,207,913 UART: [idev] --
1,208,920 UART: [ldev] ++
1,209,088 UART: [ldev] CDI.KEYID = 6
1,209,452 UART: [ldev] SUBJECT.KEYID = 5
1,209,879 UART: [ldev] AUTHORITY.KEYID = 7
1,210,342 UART: [ldev] FE.KEYID = 1
1,215,474 UART: [ldev] Erasing FE.KEYID = 1
1,241,209 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,831 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,547 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,076 UART: [ldev] --
1,280,437 UART: [fwproc] Wait for Commands...
1,281,192 UART: [fwproc] Recv command 0x46574c44
1,281,925 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,602 UART: ROM Fatal Error: 0x000B0040
1,329,759 >>> mbox cmd response: failed
1,329,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,765 >>> mbox cmd response: failed
1,329,765 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,329,771 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,984 UART: [state] LifecycleState = Unprovisioned
85,639 UART: [state] DebugLocked = No
86,257 UART: [state] WD Timer not started. Device not locked for debugging
87,538 UART: [kat] SHA2-256
891,088 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,192 UART: [kat] ++
895,344 UART: [kat] sha1
899,732 UART: [kat] SHA2-256
901,672 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,203 UART: [kat] HMAC-384Kdf
920,633 UART: [kat] LMS
1,168,945 UART: [kat] --
1,169,708 UART: [cold-reset] ++
1,170,064 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,607 UART: [idev] Erasing UDS.KEYID = 0
1,198,941 UART: [idev] Sha1 KeyId Algorithm
1,207,885 UART: [idev] --
1,208,934 UART: [ldev] ++
1,209,102 UART: [ldev] CDI.KEYID = 6
1,209,466 UART: [ldev] SUBJECT.KEYID = 5
1,209,893 UART: [ldev] AUTHORITY.KEYID = 7
1,210,356 UART: [ldev] FE.KEYID = 1
1,215,276 UART: [ldev] Erasing FE.KEYID = 1
1,241,859 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,701 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,417 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,190 UART: [ldev] --
1,281,489 UART: [fwproc] Wait for Commands...
1,282,118 UART: [fwproc] Recv command 0x46574c44
1,282,851 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,077 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,894 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,069 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,354 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,274 >>> mbox cmd response: failed
1,186,274 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,280 >>> mbox cmd response: failed
1,186,280 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,286 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,844 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,023 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,275 UART: [state] LifecycleState = Unprovisioned
85,930 UART: [state] DebugLocked = No
86,548 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
891,267 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,371 UART: [kat] ++
895,523 UART: [kat] sha1
899,783 UART: [kat] SHA2-256
901,723 UART: [kat] SHA2-384
904,562 UART: [kat] SHA2-512-ACC
906,463 UART: [kat] ECC-384
915,874 UART: [kat] HMAC-384Kdf
920,532 UART: [kat] LMS
1,168,844 UART: [kat] --
1,169,543 UART: [cold-reset] ++
1,170,037 UART: [fht] FHT @ 0x50003400
1,172,731 UART: [idev] ++
1,172,899 UART: [idev] CDI.KEYID = 6
1,173,260 UART: [idev] SUBJECT.KEYID = 7
1,173,685 UART: [idev] UDS.KEYID = 0
1,174,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,774 UART: [idev] Erasing UDS.KEYID = 0
1,198,870 UART: [idev] Sha1 KeyId Algorithm
1,207,720 UART: [idev] --
1,208,895 UART: [ldev] ++
1,209,063 UART: [ldev] CDI.KEYID = 6
1,209,427 UART: [ldev] SUBJECT.KEYID = 5
1,209,854 UART: [ldev] AUTHORITY.KEYID = 7
1,210,317 UART: [ldev] FE.KEYID = 1
1,215,725 UART: [ldev] Erasing FE.KEYID = 1
1,242,074 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,276 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,455 UART: [ldev] --
1,280,804 UART: [fwproc] Wait for Commands...
1,281,563 UART: [fwproc] Recv command 0x46574c44
1,282,296 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,223 UART: ROM Fatal Error: 0x000B0040
1,330,380 >>> mbox cmd response: failed
1,330,380 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,386 >>> mbox cmd response: failed
1,330,386 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,392 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,061 UART: [kat] SHA2-256
891,611 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,715 UART: [kat] ++
895,867 UART: [kat] sha1
900,083 UART: [kat] SHA2-256
902,023 UART: [kat] SHA2-384
904,798 UART: [kat] SHA2-512-ACC
906,699 UART: [kat] ECC-384
916,656 UART: [kat] HMAC-384Kdf
921,280 UART: [kat] LMS
1,169,592 UART: [kat] --
1,170,453 UART: [cold-reset] ++
1,170,857 UART: [fht] FHT @ 0x50003400
1,173,723 UART: [idev] ++
1,173,891 UART: [idev] CDI.KEYID = 6
1,174,252 UART: [idev] SUBJECT.KEYID = 7
1,174,677 UART: [idev] UDS.KEYID = 0
1,175,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,404 UART: [idev] Erasing UDS.KEYID = 0
1,200,006 UART: [idev] Sha1 KeyId Algorithm
1,208,870 UART: [idev] --
1,209,789 UART: [ldev] ++
1,209,957 UART: [ldev] CDI.KEYID = 6
1,210,321 UART: [ldev] SUBJECT.KEYID = 5
1,210,748 UART: [ldev] AUTHORITY.KEYID = 7
1,211,211 UART: [ldev] FE.KEYID = 1
1,216,479 UART: [ldev] Erasing FE.KEYID = 1
1,243,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,281,920 UART: [fwproc] Wait for Commands...
1,282,537 UART: [fwproc] Recv command 0x46574c44
1,283,270 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,272 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,520 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,717 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,186,507 >>> mbox cmd response: failed
1,186,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,513 >>> mbox cmd response: failed
1,186,513 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,186,519 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,328 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.99s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
893,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,319 UART: [kat] ++
897,471 UART: [kat] sha1
901,617 UART: [kat] SHA2-256
903,557 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,626 UART: [kat] HMAC-384Kdf
922,268 UART: [kat] LMS
1,170,596 UART: [kat] --
1,171,701 UART: [cold-reset] ++
1,172,193 UART: [fht] FHT @ 0x50003400
1,174,862 UART: [idev] ++
1,175,030 UART: [idev] CDI.KEYID = 6
1,175,390 UART: [idev] SUBJECT.KEYID = 7
1,175,814 UART: [idev] UDS.KEYID = 0
1,176,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,673 UART: [idev] Sha1 KeyId Algorithm
1,208,999 UART: [idev] --
1,210,043 UART: [ldev] ++
1,210,211 UART: [ldev] CDI.KEYID = 6
1,210,574 UART: [ldev] SUBJECT.KEYID = 5
1,211,000 UART: [ldev] AUTHORITY.KEYID = 7
1,211,463 UART: [ldev] FE.KEYID = 1
1,216,283 UART: [ldev] Erasing FE.KEYID = 1
1,242,504 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,045 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,364 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,311 UART: [ldev] --
1,281,678 UART: [fwproc] Wait for Commands...
1,282,248 UART: [fwproc] Recv command 0x46574c44
1,282,976 UART: [fwproc] Recv'd Img size: 118548 bytes
1,329,279 UART: ROM Fatal Error: 0x000B0040
1,330,436 >>> mbox cmd response: failed
1,330,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,442 >>> mbox cmd response: failed
1,330,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,686 UART: [state] LifecycleState = Unprovisioned
85,341 UART: [state] DebugLocked = No
85,827 UART: [state] WD Timer not started. Device not locked for debugging
86,968 UART: [kat] SHA2-256
892,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,743 UART: [kat] ++
896,895 UART: [kat] sha1
901,275 UART: [kat] SHA2-256
903,215 UART: [kat] SHA2-384
905,890 UART: [kat] SHA2-512-ACC
907,791 UART: [kat] ECC-384
917,440 UART: [kat] HMAC-384Kdf
922,022 UART: [kat] LMS
1,170,350 UART: [kat] --
1,171,285 UART: [cold-reset] ++
1,171,655 UART: [fht] FHT @ 0x50003400
1,174,274 UART: [idev] ++
1,174,442 UART: [idev] CDI.KEYID = 6
1,174,802 UART: [idev] SUBJECT.KEYID = 7
1,175,226 UART: [idev] UDS.KEYID = 0
1,175,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,366 UART: [idev] Erasing UDS.KEYID = 0
1,200,523 UART: [idev] Sha1 KeyId Algorithm
1,208,863 UART: [idev] --
1,209,773 UART: [ldev] ++
1,209,941 UART: [ldev] CDI.KEYID = 6
1,210,304 UART: [ldev] SUBJECT.KEYID = 5
1,210,730 UART: [ldev] AUTHORITY.KEYID = 7
1,211,193 UART: [ldev] FE.KEYID = 1
1,216,615 UART: [ldev] Erasing FE.KEYID = 1
1,242,430 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,421 UART: [ldev] --
1,281,780 UART: [fwproc] Wait for Commands...
1,282,602 UART: [fwproc] Recv command 0x46574c44
1,283,330 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,661 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,170 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,187,067 >>> mbox cmd response: failed
1,187,067 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,073 >>> mbox cmd response: failed
1,187,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,187,079 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,775 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,121 UART: [kat] SHA2-256
893,771 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,896 UART: [kat] ++
898,048 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,861 UART: [kat] HMAC-384Kdf
923,543 UART: [kat] LMS
1,171,871 UART: [kat] --
1,172,688 UART: [cold-reset] ++
1,173,108 UART: [fht] FHT @ 0x50003400
1,175,831 UART: [idev] ++
1,175,999 UART: [idev] CDI.KEYID = 6
1,176,359 UART: [idev] SUBJECT.KEYID = 7
1,176,783 UART: [idev] UDS.KEYID = 0
1,177,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,605 UART: [idev] Erasing UDS.KEYID = 0
1,201,602 UART: [idev] Sha1 KeyId Algorithm
1,210,184 UART: [idev] --
1,211,354 UART: [ldev] ++
1,211,522 UART: [ldev] CDI.KEYID = 6
1,211,885 UART: [ldev] SUBJECT.KEYID = 5
1,212,311 UART: [ldev] AUTHORITY.KEYID = 7
1,212,774 UART: [ldev] FE.KEYID = 1
1,218,014 UART: [ldev] Erasing FE.KEYID = 1
1,244,713 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,308 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,844 UART: [ldev] --
1,284,123 UART: [fwproc] Wait for Commands...
1,284,781 UART: [fwproc] Recv command 0x46574c44
1,285,509 UART: [fwproc] Recv'd Img size: 118548 bytes
1,332,932 UART: ROM Fatal Error: 0x000B0040
1,334,089 >>> mbox cmd response: failed
1,334,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,095 >>> mbox cmd response: failed
1,334,095 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,334,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Unprovisioned
85,820 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,717 UART: [kat] SHA2-256
893,367 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,492 UART: [kat] ++
897,644 UART: [kat] sha1
901,788 UART: [kat] SHA2-256
903,728 UART: [kat] SHA2-384
906,547 UART: [kat] SHA2-512-ACC
908,448 UART: [kat] ECC-384
918,263 UART: [kat] HMAC-384Kdf
922,889 UART: [kat] LMS
1,171,217 UART: [kat] --
1,172,040 UART: [cold-reset] ++
1,172,406 UART: [fht] FHT @ 0x50003400
1,174,961 UART: [idev] ++
1,175,129 UART: [idev] CDI.KEYID = 6
1,175,489 UART: [idev] SUBJECT.KEYID = 7
1,175,913 UART: [idev] UDS.KEYID = 0
1,176,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,551 UART: [idev] Erasing UDS.KEYID = 0
1,202,094 UART: [idev] Sha1 KeyId Algorithm
1,210,526 UART: [idev] --
1,211,608 UART: [ldev] ++
1,211,776 UART: [ldev] CDI.KEYID = 6
1,212,139 UART: [ldev] SUBJECT.KEYID = 5
1,212,565 UART: [ldev] AUTHORITY.KEYID = 7
1,213,028 UART: [ldev] FE.KEYID = 1
1,218,470 UART: [ldev] Erasing FE.KEYID = 1
1,245,013 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,207 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,919 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,018 UART: [ldev] --
1,284,501 UART: [fwproc] Wait for Commands...
1,285,199 UART: [fwproc] Recv command 0x46574c44
1,285,927 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,145 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,226 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,533 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,228 >>> mbox cmd response: failed
1,185,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,234 >>> mbox cmd response: failed
1,185,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,240 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,358 >>> mbox cmd response: success
test fw_load::fw_load_error_toc_entry_range_arithmetic_overflow ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,317 UART:
192,660 UART: Running Caliptra ROM ...
193,856 UART:
194,007 UART: [state] CFI Enabled
264,462 UART: [state] LifecycleState = Unprovisioned
266,437 UART: [state] DebugLocked = No
267,946 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,545 UART: [kat] SHA2-256
442,217 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,718 UART: [kat] ++
453,222 UART: [kat] sha1
463,889 UART: [kat] SHA2-256
466,574 UART: [kat] SHA2-384
472,888 UART: [kat] SHA2-512-ACC
475,230 UART: [kat] ECC-384
2,773,364 UART: [kat] HMAC-384Kdf
2,786,106 UART: [kat] LMS
3,976,417 UART: [kat] --
3,980,547 UART: [cold-reset] ++
3,981,756 UART: [fht] Storing FHT @ 0x50003400
3,994,117 UART: [idev] ++
3,994,691 UART: [idev] CDI.KEYID = 6
3,995,674 UART: [idev] SUBJECT.KEYID = 7
3,996,891 UART: [idev] UDS.KEYID = 0
3,999,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,148,944 UART: [idev] Erasing UDS.KEYID = 0
7,331,619 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,701 UART: [idev] --
7,358,383 UART: [ldev] ++
7,358,969 UART: [ldev] CDI.KEYID = 6
7,359,935 UART: [ldev] SUBJECT.KEYID = 5
7,361,148 UART: [ldev] AUTHORITY.KEYID = 7
7,362,378 UART: [ldev] FE.KEYID = 1
7,407,762 UART: [ldev] Erasing FE.KEYID = 1
10,744,040 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,054,941 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,478 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,084,325 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,098,887 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,310 UART: [ldev] --
13,122,237 UART: [fwproc] Waiting for Commands...
13,125,315 UART: [fwproc] Received command 0x46574c44
13,127,506 UART: [fwproc] Received Image of size 118548 bytes
17,232,217 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,215 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,365 >>> mbox cmd response: success
17,713,938 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
17,843,161 UART: [afmc] ++
17,843,803 UART: [afmc] CDI.KEYID = 6
17,844,723 UART: [afmc] SUBJECT.KEYID = 7
17,845,832 UART: [afmc] AUTHORITY.KEYID = 5
21,078,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,378,148 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,380,429 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,394,856 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,409,584 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,424,018 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,446,105 UART: [afmc] --
23,450,399 UART: [cold-reset] --
23,455,134 UART: [state] Locking Datavault
23,460,277 UART: [state] Locking PCR0, PCR1 and PCR31
23,462,032 UART: [state] Locking ICCM
23,463,367 UART: [exit] Launching FMC @ 0x40000130
23,471,774 UART:
23,472,016 UART: Running Caliptra FMC ...
23,473,124 UART:
23,473,291 UART: [state] CFI Enabled
23,537,180 UART: [fht] FMC Alias Private Key: 7
25,878,046 UART: [art] Extend RT PCRs Done
25,879,285 UART: [art] Lock RT PCRs Done
25,881,098 UART: [art] Populate DV Done
25,886,512 UART: [fht] FMC Alias Private Key: 7
25,888,214 UART: [art] Derive CDI
25,889,030 UART: [art] Store in slot 0x4
25,945,117 UART: [art] Derive Key Pair
25,946,186 UART: [art] Store priv key in slot 0x5
29,239,396 UART: [art] Derive Key Pair - Done
29,252,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,999 UART: [art] Erasing AUTHORITY.KEYID = 7
31,542,510 UART: [art] PUB.X = CDBD7FC62510FB6715E54234CE0CFFA992F6800A3FB6BE99A17361B1DD8E4AACFF9346CFF00BF7F0C9B5A88BB35AE8F7
31,549,764 UART: [art] PUB.Y = E3CB93A914AF13C824404789C7F1B76C63CD7C4D749A2D1A26DF16534B4D3D4B9DF3589B6D25B43AD0870F523FC8745E
31,557,042 UART: [art] SIG.R = B81EF4AD46C7044B2673144A33AA8C53BBDCC6A238BA0D36CF080885E7C4418F30BEC2B3AFF6FA3EAF8B95FB3B2D8209
31,564,491 UART: [art] SIG.S = 343DDB668EB48810A4FF20F815943AD61C25CB94F564548FDBAE84111F7E60FF7B05EC228B586B5F3D80D07CED81EBF9
32,869,829 UART: Caliptra RT
32,870,546 UART: [state] CFI Enabled
33,045,915 UART: [rt] RT listening for mailbox commands...
33,048,825 UART:
33,049,083 UART: Running Caliptra ROM ...
33,050,119 UART:
33,050,275 UART: [state] CFI Enabled
33,119,782 UART: [state] LifecycleState = Unprovisioned
33,121,719 UART: [state] DebugLocked = No
33,124,350 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,128,712 UART: [kat] SHA2-256
33,298,390 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,308,857 UART: [kat] ++
33,309,309 UART: [kat] sha1
33,319,600 UART: [kat] SHA2-256
33,322,286 UART: [kat] SHA2-384
33,328,758 UART: [kat] SHA2-512-ACC
33,331,119 UART: [kat] ECC-384
35,620,574 UART: [kat] HMAC-384Kdf
35,652,507 UART: [kat] LMS
36,842,850 UART: [kat] --
36,847,509 UART: [update-reset] ++
39,650,939 >>> mbox cmd response: failed
39,652,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,801,895 UART: ROM Non-Fatal Error: 0x000B001F
39,803,330 UART: [state] Locking Datavault
39,804,403 UART: [state] Locking PCR0, PCR1 and PCR31
39,805,942 UART: [state] Locking ICCM
39,806,821 UART: [exit] Launching FMC @ 0x40000130
39,808,162 UART:
39,808,313 UART: Running Caliptra FMC ...
39,809,416 UART:
39,809,571 UART: [state] CFI Enabled
39,810,404 UART: [art] Extend RT PCRs Done
39,811,476 UART: [art] Lock RT PCRs Done
39,812,457 UART: [art] Populate DV Done
39,813,486 UART: [fht] FMC Alias Private Key: 7
39,814,723 UART: [art] Derive CDI
39,815,450 UART: [art] Store in slot 0x4
39,829,432 UART: [art] Derive Key Pair
39,830,471 UART: [art] Store priv key in slot 0x5
43,122,835 UART: [art] Derive Key Pair - Done
43,135,839 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,423,786 UART: [art] Erasing AUTHORITY.KEYID = 7
45,425,396 UART: [art] PUB.X = CDBD7FC62510FB6715E54234CE0CFFA992F6800A3FB6BE99A17361B1DD8E4AACFF9346CFF00BF7F0C9B5A88BB35AE8F7
45,432,593 UART: [art] PUB.Y = E3CB93A914AF13C824404789C7F1B76C63CD7C4D749A2D1A26DF16534B4D3D4B9DF3589B6D25B43AD0870F523FC8745E
45,439,826 UART: [art] SIG.R = B81EF4AD46C7044B2673144A33AA8C53BBDCC6A238BA0D36CF080885E7C4418F30BEC2B3AFF6FA3EAF8B95FB3B2D8209
45,447,273 UART: [art] SIG.S = 343DDB668EB48810A4FF20F815943AD61C25CB94F564548FDBAE84111F7E60FF7B05EC228B586B5F3D80D07CED81EBF9
46,752,854 UART: Caliptra RT
46,753,563 UART: [state] CFI Enabled
47,164,754 UART: [rt] RT listening for mailbox commands...
47,167,664 UART:
47,167,922 UART: Running Caliptra ROM ...
47,168,952 UART:
47,169,103 UART: [state] CFI Enabled
47,233,972 UART: [state] LifecycleState = Unprovisioned
47,235,902 UART: [state] DebugLocked = No
47,238,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
47,243,178 UART: [kat] SHA2-256
47,412,888 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,423,384 UART: [kat] ++
47,423,840 UART: [kat] sha1
47,435,642 UART: [kat] SHA2-256
47,438,335 UART: [kat] SHA2-384
47,444,698 UART: [kat] SHA2-512-ACC
47,447,108 UART: [kat] ECC-384
49,739,632 UART: [kat] HMAC-384Kdf
49,770,615 UART: [kat] LMS
50,960,914 UART: [kat] --
50,964,497 UART: [update-reset] ++
55,147,180 UART: [update-reset] Image verified using Vendor ECC Key Index 0
55,151,556 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,549,271 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
3,788,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,944,291 >>> mbox cmd response: success
17,946,046 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,639,804 UART:
23,640,210 UART: Running Caliptra FMC ...
23,641,332 UART:
23,641,521 UART: [state] CFI Enabled
23,704,913 UART: [fht] FMC Alias Private Key: 7
26,045,511 UART: [art] Extend RT PCRs Done
26,046,747 UART: [art] Lock RT PCRs Done
26,048,238 UART: [art] Populate DV Done
26,053,604 UART: [fht] FMC Alias Private Key: 7
26,055,135 UART: [art] Derive CDI
26,055,887 UART: [art] Store in slot 0x4
26,113,395 UART: [art] Derive Key Pair
26,114,401 UART: [art] Store priv key in slot 0x5
29,406,999 UART: [art] Derive Key Pair - Done
29,419,892 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,709,629 UART: [art] Erasing AUTHORITY.KEYID = 7
31,711,139 UART: [art] PUB.X = AA2AA3119566A3F5ADE3D7B0A0211BA805410F65DE24536D98C826DF5084C4301D285C9E2542BE215CCFB444FA41E902
31,718,389 UART: [art] PUB.Y = F6262C68A7D7ACBF88CBC0407B82CA8C14BF0EAC6C94A015864D0212759DC60398E87C469119D10899E7D5D6B812B5FC
31,725,640 UART: [art] SIG.R = FAC46E0A3578DC2573DC7B25D4A17D50229EE516E5F5011657C930846CB2F64E7420B2E2DCC1766C2869DC71377ED168
31,733,050 UART: [art] SIG.S = 7400B6F0DDB57A65D046B06FD0601171BC895B7D8B278A99301D8273EB7925FBC155B61538F5548E8CAC5864F4BF33DA
33,038,371 UART: Caliptra RT
33,039,091 UART: [state] CFI Enabled
33,215,727 UART: [rt] RT listening for mailbox commands...
39,628,773 >>> mbox cmd response: failed
39,630,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,779,911 UART:
39,780,232 UART: Running Caliptra FMC ...
39,781,356 UART:
39,781,514 UART: [state] CFI Enabled
39,782,431 UART: [art] Extend RT PCRs Done
39,783,572 UART: [art] Lock RT PCRs Done
39,784,641 UART: [art] Populate DV Done
39,785,671 UART: [fht] FMC Alias Private Key: 7
39,787,055 UART: [art] Derive CDI
39,787,798 UART: [art] Store in slot 0x4
39,810,920 UART: [art] Derive Key Pair
39,811,930 UART: [art] Store priv key in slot 0x5
43,104,770 UART: [art] Derive Key Pair - Done
43,117,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,405,899 UART: [art] Erasing AUTHORITY.KEYID = 7
45,407,425 UART: [art] PUB.X = AA2AA3119566A3F5ADE3D7B0A0211BA805410F65DE24536D98C826DF5084C4301D285C9E2542BE215CCFB444FA41E902
45,414,807 UART: [art] PUB.Y = F6262C68A7D7ACBF88CBC0407B82CA8C14BF0EAC6C94A015864D0212759DC60398E87C469119D10899E7D5D6B812B5FC
45,421,884 UART: [art] SIG.R = FAC46E0A3578DC2573DC7B25D4A17D50229EE516E5F5011657C930846CB2F64E7420B2E2DCC1766C2869DC71377ED168
45,429,270 UART: [art] SIG.S = 7400B6F0DDB57A65D046B06FD0601171BC895B7D8B278A99301D8273EB7925FBC155B61538F5548E8CAC5864F4BF33DA
46,734,879 UART: Caliptra RT
46,735,582 UART: [state] CFI Enabled
47,154,214 UART: [rt] RT listening for mailbox commands...
55,821,611 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.22s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,518 UART:
192,884 UART: Running Caliptra ROM ...
194,016 UART:
603,534 UART: [state] CFI Enabled
617,691 UART: [state] LifecycleState = Unprovisioned
619,641 UART: [state] DebugLocked = No
622,648 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,866 UART: [kat] SHA2-256
796,610 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,174 UART: [kat] ++
807,646 UART: [kat] sha1
819,173 UART: [kat] SHA2-256
821,859 UART: [kat] SHA2-384
827,268 UART: [kat] SHA2-512-ACC
829,679 UART: [kat] ECC-384
3,115,648 UART: [kat] HMAC-384Kdf
3,127,674 UART: [kat] LMS
4,317,795 UART: [kat] --
4,322,740 UART: [cold-reset] ++
4,324,964 UART: [fht] Storing FHT @ 0x50003400
4,335,646 UART: [idev] ++
4,336,219 UART: [idev] CDI.KEYID = 6
4,337,242 UART: [idev] SUBJECT.KEYID = 7
4,338,415 UART: [idev] UDS.KEYID = 0
4,341,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,172 UART: [idev] Erasing UDS.KEYID = 0
7,621,466 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,432 UART: [idev] --
7,647,331 UART: [ldev] ++
7,647,937 UART: [ldev] CDI.KEYID = 6
7,648,858 UART: [ldev] SUBJECT.KEYID = 5
7,650,089 UART: [ldev] AUTHORITY.KEYID = 7
7,651,334 UART: [ldev] FE.KEYID = 1
7,662,581 UART: [ldev] Erasing FE.KEYID = 1
10,954,369 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,495 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,300 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,311,005 UART: [ldev] --
13,315,186 UART: [fwproc] Waiting for Commands...
13,317,623 UART: [fwproc] Received command 0x46574c44
13,319,829 UART: [fwproc] Received Image of size 118548 bytes
17,423,888 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,848 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,178 >>> mbox cmd response: success
17,901,723 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,030,744 UART: [afmc] ++
18,031,390 UART: [afmc] CDI.KEYID = 6
18,032,291 UART: [afmc] SUBJECT.KEYID = 7
18,033,405 UART: [afmc] AUTHORITY.KEYID = 5
21,221,270 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,521,652 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,076 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,550,780 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,198 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,729 UART: [afmc] --
23,589,953 UART: [cold-reset] --
23,593,877 UART: [state] Locking Datavault
23,599,807 UART: [state] Locking PCR0, PCR1 and PCR31
23,601,514 UART: [state] Locking ICCM
23,603,239 UART: [exit] Launching FMC @ 0x40000130
23,611,640 UART:
23,611,884 UART: Running Caliptra FMC ...
23,612,991 UART:
23,613,155 UART: [state] CFI Enabled
23,621,260 UART: [fht] FMC Alias Private Key: 7
25,961,460 UART: [art] Extend RT PCRs Done
25,962,700 UART: [art] Lock RT PCRs Done
25,964,144 UART: [art] Populate DV Done
25,969,196 UART: [fht] FMC Alias Private Key: 7
25,970,743 UART: [art] Derive CDI
25,971,566 UART: [art] Store in slot 0x4
26,014,547 UART: [art] Derive Key Pair
26,015,553 UART: [art] Store priv key in slot 0x5
29,257,708 UART: [art] Derive Key Pair - Done
29,270,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,325 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,836 UART: [art] PUB.X = 04F9638FE1AB6E5648D70E4A0C4721FA511D36B10BF991448D350FC46D7C54D3CE0ACA5120E24853EAE3847A74C54D05
31,560,078 UART: [art] PUB.Y = E7F6592DA1B4C67CE29D265D2B8C66D44509517D6D16CB41B004373647E0F72FFF363C7CAB8C5AC26CD054F0AC5BA30F
31,567,373 UART: [art] SIG.R = A102BFE5C22BFA2487E8B601CA81B99AA0390007B078C07089A8236FAF064AA1EE509729479E22302FC52073D2EB000E
31,574,710 UART: [art] SIG.S = A9D0C5E0636BFC4A4583A92EDEF1FE6C94D1872083564C639ED4DBFDBB56ECE7069DDA6AECFBE44B7EAFAB2FC8D6FA27
32,879,927 UART: Caliptra RT
32,880,619 UART: [state] CFI Enabled
33,012,706 UART: [rt] RT listening for mailbox commands...
33,015,665 UART:
33,015,932 UART: Running Caliptra ROM ...
33,016,971 UART:
33,017,294 UART: [state] CFI Enabled
33,036,436 UART: [state] LifecycleState = Unprovisioned
33,038,388 UART: [state] DebugLocked = No
33,040,255 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,045,158 UART: [kat] SHA2-256
33,214,863 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,225,387 UART: [kat] ++
33,225,844 UART: [kat] sha1
33,236,930 UART: [kat] SHA2-256
33,239,637 UART: [kat] SHA2-384
33,246,076 UART: [kat] SHA2-512-ACC
33,248,434 UART: [kat] ECC-384
35,534,559 UART: [kat] HMAC-384Kdf
35,547,032 UART: [kat] LMS
36,737,125 UART: [kat] --
36,741,613 UART: [update-reset] ++
39,546,142 >>> mbox cmd response: failed
39,548,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,697,006 UART: ROM Non-Fatal Error: 0x000B001F
39,698,482 UART: [state] Locking Datavault
39,699,654 UART: [state] Locking PCR0, PCR1 and PCR31
39,701,217 UART: [state] Locking ICCM
39,702,134 UART: [exit] Launching FMC @ 0x40000130
39,703,568 UART:
39,703,735 UART: Running Caliptra FMC ...
39,704,841 UART:
39,705,008 UART: [state] CFI Enabled
39,705,937 UART: [art] Extend RT PCRs Done
39,707,083 UART: [art] Lock RT PCRs Done
39,708,160 UART: [art] Populate DV Done
39,709,197 UART: [fht] FMC Alias Private Key: 7
39,710,737 UART: [art] Derive CDI
39,711,488 UART: [art] Store in slot 0x4
39,712,560 UART: [art] Derive Key Pair
39,713,565 UART: [art] Store priv key in slot 0x5
42,907,027 UART: [art] Derive Key Pair - Done
42,919,749 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,200,009 UART: [art] Erasing AUTHORITY.KEYID = 7
45,201,659 UART: [art] PUB.X = 04F9638FE1AB6E5648D70E4A0C4721FA511D36B10BF991448D350FC46D7C54D3CE0ACA5120E24853EAE3847A74C54D05
45,208,798 UART: [art] PUB.Y = E7F6592DA1B4C67CE29D265D2B8C66D44509517D6D16CB41B004373647E0F72FFF363C7CAB8C5AC26CD054F0AC5BA30F
45,216,021 UART: [art] SIG.R = A102BFE5C22BFA2487E8B601CA81B99AA0390007B078C07089A8236FAF064AA1EE509729479E22302FC52073D2EB000E
45,223,414 UART: [art] SIG.S = A9D0C5E0636BFC4A4583A92EDEF1FE6C94D1872083564C639ED4DBFDBB56ECE7069DDA6AECFBE44B7EAFAB2FC8D6FA27
46,529,133 UART: Caliptra RT
46,529,858 UART: [state] CFI Enabled
46,898,164 UART: [rt] RT listening for mailbox commands...
46,900,862 UART:
46,901,118 UART: Running Caliptra ROM ...
46,902,232 UART:
46,902,505 UART: [state] CFI Enabled
46,919,360 UART: [state] LifecycleState = Unprovisioned
46,921,295 UART: [state] DebugLocked = No
46,922,927 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
46,928,051 UART: [kat] SHA2-256
47,097,778 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
47,108,309 UART: [kat] ++
47,108,800 UART: [kat] sha1
47,118,931 UART: [kat] SHA2-256
47,121,682 UART: [kat] SHA2-384
47,126,427 UART: [kat] SHA2-512-ACC
47,128,783 UART: [kat] ECC-384
49,413,052 UART: [kat] HMAC-384Kdf
49,425,250 UART: [kat] LMS
50,615,359 UART: [kat] --
50,622,191 UART: [update-reset] ++
54,816,157 UART: [update-reset] Image verified using Vendor ECC Key Index 0
54,820,604 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
55,218,395 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
4,131,414 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,208 >>> mbox cmd response: success
18,160,910 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
23,800,441 UART:
23,801,259 UART: Running Caliptra FMC ...
23,802,406 UART:
23,802,571 UART: [state] CFI Enabled
23,810,174 UART: [fht] FMC Alias Private Key: 7
26,149,727 UART: [art] Extend RT PCRs Done
26,151,435 UART: [art] Lock RT PCRs Done
26,152,640 UART: [art] Populate DV Done
26,158,255 UART: [fht] FMC Alias Private Key: 7
26,159,920 UART: [art] Derive CDI
26,160,752 UART: [art] Store in slot 0x4
26,203,090 UART: [art] Derive Key Pair
26,204,105 UART: [art] Store priv key in slot 0x5
29,446,311 UART: [art] Derive Key Pair - Done
29,459,219 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,079 UART: [art] Erasing AUTHORITY.KEYID = 7
31,741,598 UART: [art] PUB.X = B48B937A8FF9F30F88FE27BEF379812BBAA67F57303DED208BA912F8C48E0DA1A423CB07A01F3CBAE3231DD105FBB6C4
31,748,863 UART: [art] PUB.Y = BDF344FD15C245366967332108AF55164B1DA7C164AE307445F78D6A421CE2A22464988ACF71E7A955694C135F7883B9
31,756,097 UART: [art] SIG.R = FBFDAE9F0B6056B7408E0A463A8AECA4CC6E9FB5A6D82E7102B729E1820AC7B7CD2A16EA9896F70B03185D52166BAE29
31,763,507 UART: [art] SIG.S = D81A477AF55E519256A0D122D2B87BE4A46672EA693CD3F9E908740FB42440075D972AAE672786DA7BFF49DA32E0E48A
33,069,001 UART: Caliptra RT
33,069,715 UART: [state] CFI Enabled
33,203,355 UART: [rt] RT listening for mailbox commands...
39,554,065 >>> mbox cmd response: failed
39,556,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
39,705,162 UART:
39,705,494 UART: Running Caliptra FMC ...
39,706,628 UART:
39,706,801 UART: [state] CFI Enabled
39,707,739 UART: [art] Extend RT PCRs Done
39,708,809 UART: [art] Lock RT PCRs Done
39,709,884 UART: [art] Populate DV Done
39,710,923 UART: [fht] FMC Alias Private Key: 7
39,712,326 UART: [art] Derive CDI
39,713,076 UART: [art] Store in slot 0x4
39,714,150 UART: [art] Derive Key Pair
39,715,101 UART: [art] Store priv key in slot 0x5
42,908,470 UART: [art] Derive Key Pair - Done
42,921,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
45,201,973 UART: [art] Erasing AUTHORITY.KEYID = 7
45,203,492 UART: [art] PUB.X = B48B937A8FF9F30F88FE27BEF379812BBAA67F57303DED208BA912F8C48E0DA1A423CB07A01F3CBAE3231DD105FBB6C4
45,210,805 UART: [art] PUB.Y = BDF344FD15C245366967332108AF55164B1DA7C164AE307445F78D6A421CE2A22464988ACF71E7A955694C135F7883B9
45,217,991 UART: [art] SIG.R = FBFDAE9F0B6056B7408E0A463A8AECA4CC6E9FB5A6D82E7102B729E1820AC7B7CD2A16EA9896F70B03185D52166BAE29
45,225,387 UART: [art] SIG.S = D81A477AF55E519256A0D122D2B87BE4A46672EA693CD3F9E908740FB42440075D972AAE672786DA7BFF49DA32E0E48A
46,530,485 UART: Caliptra RT
46,531,208 UART: [state] CFI Enabled
46,910,697 UART: [rt] RT listening for mailbox commands...
55,511,073 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,353 UART:
192,734 UART: Running Caliptra ROM ...
193,929 UART:
194,087 UART: [state] CFI Enabled
259,941 UART: [state] LifecycleState = Unprovisioned
261,911 UART: [state] DebugLocked = No
263,250 UART: [state] WD Timer not started. Device not locked for debugging
267,683 UART: [kat] SHA2-256
447,324 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,122 UART: [kat] ++
458,606 UART: [kat] sha1
468,428 UART: [kat] SHA2-256
471,113 UART: [kat] SHA2-384
477,429 UART: [kat] SHA2-512-ACC
479,771 UART: [kat] ECC-384
2,925,673 UART: [kat] HMAC-384Kdf
2,947,466 UART: [kat] LMS
3,423,952 UART: [kat] --
3,428,325 UART: [cold-reset] ++
3,430,692 UART: [fht] FHT @ 0x50003400
3,441,836 UART: [idev] ++
3,442,409 UART: [idev] CDI.KEYID = 6
3,443,433 UART: [idev] SUBJECT.KEYID = 7
3,444,599 UART: [idev] UDS.KEYID = 0
3,447,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,596,478 UART: [idev] Erasing UDS.KEYID = 0
5,962,169 UART: [idev] Sha1 KeyId Algorithm
5,985,794 UART: [idev] --
5,990,636 UART: [ldev] ++
5,991,218 UART: [ldev] CDI.KEYID = 6
5,992,131 UART: [ldev] SUBJECT.KEYID = 5
5,993,353 UART: [ldev] AUTHORITY.KEYID = 7
5,994,596 UART: [ldev] FE.KEYID = 1
6,033,136 UART: [ldev] Erasing FE.KEYID = 1
8,540,415 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,017 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,289,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,305,731 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,321,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,343,113 UART: [ldev] --
10,349,089 UART: [fwproc] Wait for Commands...
10,351,784 UART: [fwproc] Recv command 0x46574c44
10,353,777 UART: [fwproc] Recv'd Img size: 118548 bytes
13,837,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,919,654 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,992,691 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,320,498 >>> mbox cmd response: success
14,322,108 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,451,182 UART: [afmc] ++
14,451,838 UART: [afmc] CDI.KEYID = 6
14,452,737 UART: [afmc] SUBJECT.KEYID = 7
14,453,856 UART: [afmc] AUTHORITY.KEYID = 5
16,867,573 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,591,684 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,593,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,609,694 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,625,722 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,641,299 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,665,932 UART: [afmc] --
18,669,968 UART: [cold-reset] --
18,675,671 UART: [state] Locking Datavault
18,680,759 UART: [state] Locking PCR0, PCR1 and PCR31
18,682,511 UART: [state] Locking ICCM
18,684,237 UART: [exit] Launching FMC @ 0x40000130
18,692,696 UART:
18,692,959 UART: Running Caliptra FMC ...
18,694,068 UART:
18,694,237 UART: [state] CFI Enabled
18,746,890 UART: [fht] FMC Alias Private Key: 7
20,513,883 UART: [art] Extend RT PCRs Done
20,515,099 UART: [art] Lock RT PCRs Done
20,516,756 UART: [art] Populate DV Done
20,522,116 UART: [fht] FMC Alias Private Key: 7
20,523,765 UART: [art] Derive CDI
20,524,588 UART: [art] Store in slot 0x4
20,579,881 UART: [art] Derive Key Pair
20,580,962 UART: [art] Store priv key in slot 0x5
23,043,309 UART: [art] Derive Key Pair - Done
23,056,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,769,509 UART: [art] Erasing AUTHORITY.KEYID = 7
24,771,018 UART: [art] PUB.X = 7D0E3EA777025A93AF4284BAAB5492DA437499DED8DAFD27377DFF5D9B56438AF37544A624673DD14DB8C66F236650A8
24,778,292 UART: [art] PUB.Y = 35DF8771AA6FA68AC3CA8AD084718975B894614C504E0CC0A9123FC53B049C89AB9C370BC83B8BD25C02C8F74E9F45FA
24,785,538 UART: [art] SIG.R = 6309E9E27D3084C204DA9BEAB7D4C8EA8FF36F0D3521E528D602E2BAEFF2655636ACB9A288C439236E02924DFC9AD25E
24,793,000 UART: [art] SIG.S = BAEE125D47056CE857E4C43587D49876B198E48EB7A39358FDCB5B3F9D8F7AA0CA0BCDC559313C3BE75DA80F19D477C0
25,771,837 UART: Caliptra RT
25,772,552 UART: [state] CFI Enabled
25,953,203 UART: [rt] RT listening for mailbox commands...
25,956,171 UART:
25,956,379 UART: Running Caliptra ROM ...
25,957,404 UART:
25,957,567 UART: [state] CFI Enabled
26,026,709 UART: [state] LifecycleState = Unprovisioned
26,028,645 UART: [state] DebugLocked = No
26,030,713 UART: [state] WD Timer not started. Device not locked for debugging
26,034,456 UART: [kat] SHA2-256
26,214,158 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,224,930 UART: [kat] ++
26,225,430 UART: [kat] sha1
26,236,696 UART: [kat] SHA2-256
26,239,400 UART: [kat] SHA2-384
26,246,100 UART: [kat] SHA2-512-ACC
26,248,455 UART: [kat] ECC-384
28,709,863 UART: [kat] HMAC-384Kdf
28,733,600 UART: [kat] LMS
29,210,057 UART: [kat] --
29,214,771 UART: [update-reset] ++
31,305,334 >>> mbox cmd response: failed
31,307,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,456,411 UART: ROM Non-Fatal Error: 0x000B001F
31,457,845 UART: [state] Locking Datavault
31,459,010 UART: [state] Locking PCR0, PCR1 and PCR31
31,460,559 UART: [state] Locking ICCM
31,461,475 UART: [exit] Launching FMC @ 0x40000130
31,462,929 UART:
31,463,097 UART: Running Caliptra FMC ...
31,464,212 UART:
31,464,376 UART: [state] CFI Enabled
31,465,220 UART: [art] Extend RT PCRs Done
31,466,301 UART: [art] Lock RT PCRs Done
31,467,373 UART: [art] Populate DV Done
31,468,352 UART: [fht] FMC Alias Private Key: 7
31,469,684 UART: [art] Derive CDI
31,470,424 UART: [art] Store in slot 0x4
31,480,857 UART: [art] Derive Key Pair
31,481,853 UART: [art] Store priv key in slot 0x5
33,944,393 UART: [art] Derive Key Pair - Done
33,957,767 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,669,669 UART: [art] Erasing AUTHORITY.KEYID = 7
35,671,183 UART: [art] PUB.X = 7D0E3EA777025A93AF4284BAAB5492DA437499DED8DAFD27377DFF5D9B56438AF37544A624673DD14DB8C66F236650A8
35,678,458 UART: [art] PUB.Y = 35DF8771AA6FA68AC3CA8AD084718975B894614C504E0CC0A9123FC53B049C89AB9C370BC83B8BD25C02C8F74E9F45FA
35,685,710 UART: [art] SIG.R = 6309E9E27D3084C204DA9BEAB7D4C8EA8FF36F0D3521E528D602E2BAEFF2655636ACB9A288C439236E02924DFC9AD25E
35,693,102 UART: [art] SIG.S = BAEE125D47056CE857E4C43587D49876B198E48EB7A39358FDCB5B3F9D8F7AA0CA0BCDC559313C3BE75DA80F19D477C0
36,672,118 UART: Caliptra RT
36,672,841 UART: [state] CFI Enabled
37,096,566 UART: [rt] RT listening for mailbox commands...
37,099,320 UART:
37,099,496 UART: Running Caliptra ROM ...
37,100,788 UART:
37,100,964 UART: [state] CFI Enabled
37,161,761 UART: [state] LifecycleState = Unprovisioned
37,163,652 UART: [state] DebugLocked = No
37,166,522 UART: [state] WD Timer not started. Device not locked for debugging
37,170,317 UART: [kat] SHA2-256
37,349,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
37,360,747 UART: [kat] ++
37,361,314 UART: [kat] sha1
37,373,131 UART: [kat] SHA2-256
37,375,778 UART: [kat] SHA2-384
37,381,929 UART: [kat] SHA2-512-ACC
37,384,280 UART: [kat] ECC-384
39,843,754 UART: [kat] HMAC-384Kdf
39,868,592 UART: [kat] LMS
40,345,070 UART: [kat] --
40,350,469 UART: [update-reset] ++
43,856,295 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,860,100 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,257,718 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
3,461,459 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,239,719 >>> mbox cmd response: success
14,241,581 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,533,037 UART:
18,533,451 UART: Running Caliptra FMC ...
18,534,576 UART:
18,534,737 UART: [state] CFI Enabled
18,601,486 UART: [fht] FMC Alias Private Key: 7
20,389,487 UART: [art] Extend RT PCRs Done
20,390,730 UART: [art] Lock RT PCRs Done
20,392,333 UART: [art] Populate DV Done
20,397,763 UART: [fht] FMC Alias Private Key: 7
20,399,420 UART: [art] Derive CDI
20,400,244 UART: [art] Store in slot 0x4
20,455,482 UART: [art] Derive Key Pair
20,456,519 UART: [art] Store priv key in slot 0x5
22,919,794 UART: [art] Derive Key Pair - Done
22,932,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,358 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,882 UART: [art] PUB.X = 5148FF0573FE6DF201E45BE243A35C87AF7FA40CD0AE60E6687C3E0DF4F6302B6938C9C679B01FABCC9974F0C737FF3A
24,654,178 UART: [art] PUB.Y = 57F00F1D5C86308519E3A14C965A85478B0C28544FE96A9CD8D975EFC45726D825F31D855EA1EDE8D344CB6F43ECC4BC
24,661,423 UART: [art] SIG.R = 4E7AF0E98CD750FF234AC3430D5B7BF0F87C057235EB9847A8228A854AC2B9CDC1E8A945CE5AC88353F8EAC0F936E75A
24,668,852 UART: [art] SIG.S = 82C3FE9061C4345FFE7365D37CFF2E3D2EA6D8BFA7617F1C1D4A5436B26DB100984FCC17FE37A7DED2772C198FC27B29
25,647,885 UART: Caliptra RT
25,648,593 UART: [state] CFI Enabled
25,828,169 UART: [rt] RT listening for mailbox commands...
31,169,909 >>> mbox cmd response: failed
31,172,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,321,345 UART:
31,321,700 UART: Running Caliptra FMC ...
31,322,791 UART:
31,322,958 UART: [state] CFI Enabled
31,323,889 UART: [art] Extend RT PCRs Done
31,325,036 UART: [art] Lock RT PCRs Done
31,326,108 UART: [art] Populate DV Done
31,327,144 UART: [fht] FMC Alias Private Key: 7
31,328,557 UART: [art] Derive CDI
31,329,305 UART: [art] Store in slot 0x4
31,353,297 UART: [art] Derive Key Pair
31,354,363 UART: [art] Store priv key in slot 0x5
33,817,123 UART: [art] Derive Key Pair - Done
33,830,340 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,541,160 UART: [art] Erasing AUTHORITY.KEYID = 7
35,542,669 UART: [art] PUB.X = 5148FF0573FE6DF201E45BE243A35C87AF7FA40CD0AE60E6687C3E0DF4F6302B6938C9C679B01FABCC9974F0C737FF3A
35,549,977 UART: [art] PUB.Y = 57F00F1D5C86308519E3A14C965A85478B0C28544FE96A9CD8D975EFC45726D825F31D855EA1EDE8D344CB6F43ECC4BC
35,557,219 UART: [art] SIG.R = 4E7AF0E98CD750FF234AC3430D5B7BF0F87C057235EB9847A8228A854AC2B9CDC1E8A945CE5AC88353F8EAC0F936E75A
35,564,621 UART: [art] SIG.S = 82C3FE9061C4345FFE7365D37CFF2E3D2EA6D8BFA7617F1C1D4A5436B26DB100984FCC17FE37A7DED2772C198FC27B29
36,543,083 UART: Caliptra RT
36,543,788 UART: [state] CFI Enabled
36,963,408 UART: [rt] RT listening for mailbox commands...
44,134,704 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,500 UART:
192,860 UART: Running Caliptra ROM ...
193,965 UART:
603,792 UART: [state] CFI Enabled
615,613 UART: [state] LifecycleState = Unprovisioned
617,507 UART: [state] DebugLocked = No
619,648 UART: [state] WD Timer not started. Device not locked for debugging
624,133 UART: [kat] SHA2-256
803,772 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,568 UART: [kat] ++
815,051 UART: [kat] sha1
825,507 UART: [kat] SHA2-256
828,205 UART: [kat] SHA2-384
835,453 UART: [kat] SHA2-512-ACC
837,855 UART: [kat] ECC-384
3,278,943 UART: [kat] HMAC-384Kdf
3,290,411 UART: [kat] LMS
3,767,963 UART: [kat] --
3,771,584 UART: [cold-reset] ++
3,773,689 UART: [fht] FHT @ 0x50003400
3,785,105 UART: [idev] ++
3,785,741 UART: [idev] CDI.KEYID = 6
3,786,657 UART: [idev] SUBJECT.KEYID = 7
3,787,933 UART: [idev] UDS.KEYID = 0
3,790,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,818 UART: [idev] Erasing UDS.KEYID = 0
6,265,184 UART: [idev] Sha1 KeyId Algorithm
6,289,083 UART: [idev] --
6,294,703 UART: [ldev] ++
6,295,306 UART: [ldev] CDI.KEYID = 6
6,296,222 UART: [ldev] SUBJECT.KEYID = 5
6,297,389 UART: [ldev] AUTHORITY.KEYID = 7
6,298,684 UART: [ldev] FE.KEYID = 1
6,308,956 UART: [ldev] Erasing FE.KEYID = 1
8,789,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,705 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,978 UART: [ldev] --
10,583,525 UART: [fwproc] Wait for Commands...
10,585,198 UART: [fwproc] Recv command 0x46574c44
10,587,193 UART: [fwproc] Recv'd Img size: 118548 bytes
14,074,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,825 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,858 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,557,425 >>> mbox cmd response: success
14,559,172 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,688,090 UART: [afmc] ++
14,688,726 UART: [afmc] CDI.KEYID = 6
14,689,622 UART: [afmc] SUBJECT.KEYID = 7
14,690,860 UART: [afmc] AUTHORITY.KEYID = 5
17,067,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,924 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,151 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,805,960 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,010 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,610 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,863,132 UART: [afmc] --
18,867,165 UART: [cold-reset] --
18,870,812 UART: [state] Locking Datavault
18,877,379 UART: [state] Locking PCR0, PCR1 and PCR31
18,879,237 UART: [state] Locking ICCM
18,880,592 UART: [exit] Launching FMC @ 0x40000130
18,888,998 UART:
18,889,240 UART: Running Caliptra FMC ...
18,890,343 UART:
18,890,508 UART: [state] CFI Enabled
18,898,451 UART: [fht] FMC Alias Private Key: 7
20,664,571 UART: [art] Extend RT PCRs Done
20,665,836 UART: [art] Lock RT PCRs Done
20,667,573 UART: [art] Populate DV Done
20,673,101 UART: [fht] FMC Alias Private Key: 7
20,674,698 UART: [art] Derive CDI
20,675,517 UART: [art] Store in slot 0x4
20,717,848 UART: [art] Derive Key Pair
20,719,058 UART: [art] Store priv key in slot 0x5
23,145,906 UART: [art] Derive Key Pair - Done
23,159,003 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,864,873 UART: [art] Erasing AUTHORITY.KEYID = 7
24,866,373 UART: [art] PUB.X = 9A85903CBB91572238A6D7AEE8D99708ECA10D4AD31EBCBB8449B728B97C09C83BE0FA5F0D03B7A2AF4186F6358E7F2B
24,873,669 UART: [art] PUB.Y = 180CCDD579ED2BA6E6331EF8BB7694747DB76A7A6C7CBB5024CEE92C4AE3266563CA5D76116A91CC18A0DE5F6925DD32
24,880,908 UART: [art] SIG.R = 992966E58383669CAAEE9AE4CEB868652F53AD3C588FF397C0E3128FE563F7FF442F5EA0C74F1785A95D30F399C4A722
24,888,366 UART: [art] SIG.S = 9444A5947A1ACA1C6E0667E475C1E3AD701D82CD8FD772C36AF09B4C4686EC97CE124DC710BFCAC64D880B46A7B2EFA9
25,867,346 UART: Caliptra RT
25,868,055 UART: [state] CFI Enabled
26,001,443 UART: [rt] RT listening for mailbox commands...
26,004,455 UART:
26,004,715 UART: Running Caliptra ROM ...
26,005,754 UART:
26,006,072 UART: [state] CFI Enabled
26,017,931 UART: [state] LifecycleState = Unprovisioned
26,019,821 UART: [state] DebugLocked = No
26,022,031 UART: [state] WD Timer not started. Device not locked for debugging
26,026,484 UART: [kat] SHA2-256
26,206,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,217,013 UART: [kat] ++
26,217,490 UART: [kat] sha1
26,228,699 UART: [kat] SHA2-256
26,231,389 UART: [kat] SHA2-384
26,236,943 UART: [kat] SHA2-512-ACC
26,239,302 UART: [kat] ECC-384
28,678,745 UART: [kat] HMAC-384Kdf
28,691,185 UART: [kat] LMS
29,167,681 UART: [kat] --
29,171,887 UART: [update-reset] ++
31,262,201 >>> mbox cmd response: failed
31,264,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,412,912 UART: ROM Non-Fatal Error: 0x000B001F
31,414,379 UART: [state] Locking Datavault
31,415,543 UART: [state] Locking PCR0, PCR1 and PCR31
31,417,088 UART: [state] Locking ICCM
31,418,011 UART: [exit] Launching FMC @ 0x40000130
31,419,444 UART:
31,419,608 UART: Running Caliptra FMC ...
31,420,719 UART:
31,420,879 UART: [state] CFI Enabled
31,421,804 UART: [art] Extend RT PCRs Done
31,423,059 UART: [art] Lock RT PCRs Done
31,424,135 UART: [art] Populate DV Done
31,425,113 UART: [fht] FMC Alias Private Key: 7
31,426,438 UART: [art] Derive CDI
31,427,173 UART: [art] Store in slot 0x4
31,428,158 UART: [art] Derive Key Pair
31,429,103 UART: [art] Store priv key in slot 0x5
33,809,925 UART: [art] Derive Key Pair - Done
33,822,871 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,529,282 UART: [art] Erasing AUTHORITY.KEYID = 7
35,530,787 UART: [art] PUB.X = 9A85903CBB91572238A6D7AEE8D99708ECA10D4AD31EBCBB8449B728B97C09C83BE0FA5F0D03B7A2AF4186F6358E7F2B
35,538,079 UART: [art] PUB.Y = 180CCDD579ED2BA6E6331EF8BB7694747DB76A7A6C7CBB5024CEE92C4AE3266563CA5D76116A91CC18A0DE5F6925DD32
35,545,374 UART: [art] SIG.R = 992966E58383669CAAEE9AE4CEB868652F53AD3C588FF397C0E3128FE563F7FF442F5EA0C74F1785A95D30F399C4A722
35,552,779 UART: [art] SIG.S = 9444A5947A1ACA1C6E0667E475C1E3AD701D82CD8FD772C36AF09B4C4686EC97CE124DC710BFCAC64D880B46A7B2EFA9
36,531,293 UART: Caliptra RT
36,532,008 UART: [state] CFI Enabled
36,898,266 UART: [rt] RT listening for mailbox commands...
36,900,904 UART:
36,901,104 UART: Running Caliptra ROM ...
36,902,153 UART:
36,902,520 UART: [state] CFI Enabled
40,318,682 UART: [state] LifecycleState = Unprovisioned
40,320,652 UART: [state] DebugLocked = No
40,323,261 UART: [state] WD Timer not started. Device not locked for debugging
40,328,039 UART: [kat] SHA2-256
40,507,715 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,518,515 UART: [kat] ++
40,518,976 UART: [kat] sha1
40,531,485 UART: [kat] SHA2-256
40,534,180 UART: [kat] SHA2-384
40,539,899 UART: [kat] SHA2-512-ACC
40,542,304 UART: [kat] ECC-384
42,985,854 UART: [kat] HMAC-384Kdf
42,998,293 UART: [kat] LMS
43,474,800 UART: [kat] --
43,480,623 UART: [update-reset] ++
46,979,232 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,982,777 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,380,374 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,780,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,434,414 >>> mbox cmd response: success
14,436,158 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
18,682,033 UART:
18,682,430 UART: Running Caliptra FMC ...
18,683,640 UART:
18,683,820 UART: [state] CFI Enabled
18,691,720 UART: [fht] FMC Alias Private Key: 7
20,457,599 UART: [art] Extend RT PCRs Done
20,458,847 UART: [art] Lock RT PCRs Done
20,460,611 UART: [art] Populate DV Done
20,465,983 UART: [fht] FMC Alias Private Key: 7
20,467,692 UART: [art] Derive CDI
20,468,512 UART: [art] Store in slot 0x4
20,511,001 UART: [art] Derive Key Pair
20,512,055 UART: [art] Store priv key in slot 0x5
22,938,689 UART: [art] Derive Key Pair - Done
22,951,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,657,753 UART: [art] Erasing AUTHORITY.KEYID = 7
24,659,276 UART: [art] PUB.X = BB0544DA85071D3E644DA4CA52565F015D6128080A2F26D8652F41B36C4625F3913844ADF5C40C6D22683AD3E47C4800
24,666,483 UART: [art] PUB.Y = 368CDAE04334A650A91A8D42059B12D8E925323F03CB20626681F227E7CFD108E2003879C92CDC591C9A9875DF31E8E0
24,673,678 UART: [art] SIG.R = 001C8ED57240B2E65DFB2E766230F5269058342659107680CBDBF95268723755BD2BDB9F0802FEB37ED397EE91E7BE87
24,681,080 UART: [art] SIG.S = A9A707E04BAC3E8265AA0218D4341D8D9ADFB524562673A362987CF577A7190E252E40EF11C2A73C004FDED7C39E0794
25,659,582 UART: Caliptra RT
25,660,302 UART: [state] CFI Enabled
25,793,226 UART: [rt] RT listening for mailbox commands...
31,043,947 >>> mbox cmd response: failed
31,046,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,195,015 UART:
31,195,357 UART: Running Caliptra FMC ...
31,196,431 UART:
31,196,594 UART: [state] CFI Enabled
31,197,527 UART: [art] Extend RT PCRs Done
31,198,670 UART: [art] Lock RT PCRs Done
31,199,751 UART: [art] Populate DV Done
31,200,789 UART: [fht] FMC Alias Private Key: 7
31,202,193 UART: [art] Derive CDI
31,202,939 UART: [art] Store in slot 0x4
31,204,005 UART: [art] Derive Key Pair
31,205,006 UART: [art] Store priv key in slot 0x5
33,582,157 UART: [art] Derive Key Pair - Done
33,595,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,301,473 UART: [art] Erasing AUTHORITY.KEYID = 7
35,302,973 UART: [art] PUB.X = BB0544DA85071D3E644DA4CA52565F015D6128080A2F26D8652F41B36C4625F3913844ADF5C40C6D22683AD3E47C4800
35,310,228 UART: [art] PUB.Y = 368CDAE04334A650A91A8D42059B12D8E925323F03CB20626681F227E7CFD108E2003879C92CDC591C9A9875DF31E8E0
35,317,466 UART: [art] SIG.R = 001C8ED57240B2E65DFB2E766230F5269058342659107680CBDBF95268723755BD2BDB9F0802FEB37ED397EE91E7BE87
35,324,805 UART: [art] SIG.S = A9A707E04BAC3E8265AA0218D4341D8D9ADFB524562673A362987CF577A7190E252E40EF11C2A73C004FDED7C39E0794
36,304,012 UART: Caliptra RT
36,304,729 UART: [state] CFI Enabled
36,679,406 UART: [rt] RT listening for mailbox commands...
47,396,441 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,232 UART:
192,596 UART: Running Caliptra ROM ...
193,777 UART:
193,929 UART: [state] CFI Enabled
264,726 UART: [state] LifecycleState = Unprovisioned
267,129 UART: [state] DebugLocked = No
269,271 UART: [state] WD Timer not started. Device not locked for debugging
274,516 UART: [kat] SHA2-256
464,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,156 UART: [kat] ++
475,619 UART: [kat] sha1
486,354 UART: [kat] SHA2-256
489,375 UART: [kat] SHA2-384
495,948 UART: [kat] SHA2-512-ACC
498,557 UART: [kat] ECC-384
2,945,527 UART: [kat] HMAC-384Kdf
2,968,737 UART: [kat] LMS
3,500,519 UART: [kat] --
3,506,027 UART: [cold-reset] ++
3,508,570 UART: [fht] FHT @ 0x50003400
3,521,015 UART: [idev] ++
3,521,701 UART: [idev] CDI.KEYID = 6
3,522,641 UART: [idev] SUBJECT.KEYID = 7
3,523,880 UART: [idev] UDS.KEYID = 0
3,526,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,674 UART: [idev] Erasing UDS.KEYID = 0
6,047,374 UART: [idev] Sha1 KeyId Algorithm
6,069,918 UART: [idev] --
6,075,003 UART: [ldev] ++
6,075,697 UART: [ldev] CDI.KEYID = 6
6,076,615 UART: [ldev] SUBJECT.KEYID = 5
6,077,785 UART: [ldev] AUTHORITY.KEYID = 7
6,079,027 UART: [ldev] FE.KEYID = 1
6,117,571 UART: [ldev] Erasing FE.KEYID = 1
8,620,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,359,396 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,425,297 UART: [ldev] --
10,430,398 UART: [fwproc] Wait for Commands...
10,432,198 UART: [fwproc] Recv command 0x46574c44
10,434,524 UART: [fwproc] Recv'd Img size: 118548 bytes
13,931,688 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,278 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,900 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,691,918 >>> mbox cmd response: success
14,693,470 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
14,822,697 UART: [afmc] ++
14,823,336 UART: [afmc] CDI.KEYID = 6
14,824,233 UART: [afmc] SUBJECT.KEYID = 7
14,825,283 UART: [afmc] AUTHORITY.KEYID = 5
17,233,446 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,973,425 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,975,343 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,990,473 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,005,615 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,020,529 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,045,210 UART: [afmc] --
19,048,056 UART: [cold-reset] --
19,052,038 UART: [state] Locking Datavault
19,057,132 UART: [state] Locking PCR0, PCR1 and PCR31
19,059,325 UART: [state] Locking ICCM
19,061,878 UART: [exit] Launching FMC @ 0x40000130
19,070,544 UART:
19,070,807 UART: Running Caliptra FMC ...
19,071,918 UART:
19,072,082 UART: [state] CFI Enabled
19,132,152 UART: [fht] FMC Alias Private Key: 7
20,899,893 UART: [art] Extend RT PCRs Done
20,901,254 UART: [art] Lock RT PCRs Done
20,902,596 UART: [art] Populate DV Done
20,907,866 UART: [fht] FMC Alias Private Key: 7
20,909,622 UART: [art] Derive CDI
20,910,442 UART: [art] Store in slot 0x4
20,965,528 UART: [art] Derive Key Pair
20,966,533 UART: [art] Store priv key in slot 0x5
23,429,344 UART: [art] Derive Key Pair - Done
23,442,446 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,155,310 UART: [art] Erasing AUTHORITY.KEYID = 7
25,156,823 UART: [art] PUB.X = F0FE98B331EFDF925DAEC1C9DBBED31FA2C7BF0EF1DE6637B634B8FEA47E320F91AECCF09DDDF865E68458E59C551A26
25,164,127 UART: [art] PUB.Y = E39117CFA7B933C8AD7C1EAA2EFBE0BEA2F051FAFB49C8B6477738B88968A2C7A0C83B9A3FE3F0646AD05E9E82981AA8
25,171,423 UART: [art] SIG.R = 1B5DF820D28B2B78C19498F1770C24E4D77BB33DCA4BB62C5ED945DB2E3F443C04C78B716FB2D264DB34DDF2220C50EC
25,178,817 UART: [art] SIG.S = 8ACC4DC5F80427592903B42B8D0CB3AE3F6D1D81AAD9AB436D72ED88FD080C0524E4BF64C5D982EAF9E99550076A1551
26,157,373 UART: Caliptra RT
26,158,068 UART: [state] CFI Enabled
26,338,910 UART: [rt] RT listening for mailbox commands...
26,341,900 UART:
26,342,093 UART: Running Caliptra ROM ...
26,343,218 UART:
26,343,382 UART: [state] CFI Enabled
26,415,922 UART: [state] LifecycleState = Unprovisioned
26,417,979 UART: [state] DebugLocked = No
26,420,005 UART: [state] WD Timer not started. Device not locked for debugging
26,423,959 UART: [kat] SHA2-256
26,613,793 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,624,565 UART: [kat] ++
26,625,056 UART: [kat] sha1
26,637,194 UART: [kat] SHA2-256
26,640,171 UART: [kat] SHA2-384
26,646,650 UART: [kat] SHA2-512-ACC
26,649,222 UART: [kat] ECC-384
29,097,246 UART: [kat] HMAC-384Kdf
29,120,137 UART: [kat] LMS
29,651,670 UART: [kat] --
29,655,448 UART: [update-reset] ++
31,752,403 >>> mbox cmd response: failed
31,754,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,904,108 UART: ROM Non-Fatal Error: 0x000B001F
31,905,583 UART: [state] Locking Datavault
31,906,751 UART: [state] Locking PCR0, PCR1 and PCR31
31,908,298 UART: [state] Locking ICCM
31,909,215 UART: [exit] Launching FMC @ 0x40000130
31,910,637 UART:
31,910,798 UART: Running Caliptra FMC ...
31,911,898 UART:
31,912,054 UART: [state] CFI Enabled
31,912,978 UART: [art] Extend RT PCRs Done
31,914,122 UART: [art] Lock RT PCRs Done
31,915,216 UART: [art] Populate DV Done
31,916,253 UART: [fht] FMC Alias Private Key: 7
31,917,572 UART: [art] Derive CDI
31,918,311 UART: [art] Store in slot 0x4
31,931,530 UART: [art] Derive Key Pair
31,932,539 UART: [art] Store priv key in slot 0x5
34,395,495 UART: [art] Derive Key Pair - Done
34,408,731 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,120,941 UART: [art] Erasing AUTHORITY.KEYID = 7
36,122,451 UART: [art] PUB.X = F0FE98B331EFDF925DAEC1C9DBBED31FA2C7BF0EF1DE6637B634B8FEA47E320F91AECCF09DDDF865E68458E59C551A26
36,129,765 UART: [art] PUB.Y = E39117CFA7B933C8AD7C1EAA2EFBE0BEA2F051FAFB49C8B6477738B88968A2C7A0C83B9A3FE3F0646AD05E9E82981AA8
36,137,044 UART: [art] SIG.R = 1B5DF820D28B2B78C19498F1770C24E4D77BB33DCA4BB62C5ED945DB2E3F443C04C78B716FB2D264DB34DDF2220C50EC
36,144,443 UART: [art] SIG.S = 8ACC4DC5F80427592903B42B8D0CB3AE3F6D1D81AAD9AB436D72ED88FD080C0524E4BF64C5D982EAF9E99550076A1551
37,123,711 UART: Caliptra RT
37,124,448 UART: [state] CFI Enabled
37,545,127 UART: [rt] RT listening for mailbox commands...
37,547,758 UART:
37,547,932 UART: Running Caliptra ROM ...
37,548,990 UART:
37,549,146 UART: [state] CFI Enabled
37,613,265 UART: [state] LifecycleState = Unprovisioned
37,615,266 UART: [state] DebugLocked = No
37,617,591 UART: [state] WD Timer not started. Device not locked for debugging
37,622,085 UART: [kat] SHA2-256
37,811,913 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
37,822,666 UART: [kat] ++
37,823,130 UART: [kat] sha1
37,833,969 UART: [kat] SHA2-256
37,836,938 UART: [kat] SHA2-384
37,843,636 UART: [kat] SHA2-512-ACC
37,846,205 UART: [kat] ECC-384
40,297,105 UART: [kat] HMAC-384Kdf
40,320,099 UART: [kat] LMS
40,851,656 UART: [kat] --
40,855,590 UART: [update-reset] ++
44,366,160 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,370,395 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,000,149 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
3,441,957 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,822,654 >>> mbox cmd response: success
14,824,758 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,110,807 UART:
19,111,209 UART: Running Caliptra FMC ...
19,112,411 UART:
19,112,590 UART: [state] CFI Enabled
19,178,433 UART: [fht] FMC Alias Private Key: 7
20,944,181 UART: [art] Extend RT PCRs Done
20,945,547 UART: [art] Lock RT PCRs Done
20,947,139 UART: [art] Populate DV Done
20,952,399 UART: [fht] FMC Alias Private Key: 7
20,954,107 UART: [art] Derive CDI
20,954,847 UART: [art] Store in slot 0x4
21,011,004 UART: [art] Derive Key Pair
21,012,022 UART: [art] Store priv key in slot 0x5
23,475,005 UART: [art] Derive Key Pair - Done
23,488,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,199,917 UART: [art] Erasing AUTHORITY.KEYID = 7
25,201,430 UART: [art] PUB.X = 9F9CE516299673698CAE23F23DAFDC8BB1C9DA88625115AB70A72720447F491640FE17D3F6678B192855EE8DB8047C77
25,208,698 UART: [art] PUB.Y = E68F4BBEF7043594BF0AAC3BDBE3F2AB6F0E1CCE5891374456DB890CA48D7545D59452D31D17690BAF37800D742948F3
25,215,906 UART: [art] SIG.R = F54ED7888A94AA2D2D3B5F38B5A9693D412B19FD63007B698050F765F26F74BD60D78CBE41A0902B2E5BA3A6AFA445F8
25,223,307 UART: [art] SIG.S = 99C25AFE9C9012DBC744EA81A018E2E2E3351A8C1B705CBC0B459FF83AACB4E14875DD0509CA61CC57B0DCFFBAB9F7E7
26,202,637 UART: Caliptra RT
26,203,328 UART: [state] CFI Enabled
26,382,304 UART: [rt] RT listening for mailbox commands...
31,716,628 >>> mbox cmd response: failed
31,718,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,867,677 UART:
31,868,002 UART: Running Caliptra FMC ...
31,869,136 UART:
31,869,306 UART: [state] CFI Enabled
31,870,236 UART: [art] Extend RT PCRs Done
31,871,399 UART: [art] Lock RT PCRs Done
31,872,478 UART: [art] Populate DV Done
31,873,510 UART: [fht] FMC Alias Private Key: 7
31,874,910 UART: [art] Derive CDI
31,875,656 UART: [art] Store in slot 0x4
31,906,063 UART: [art] Derive Key Pair
31,907,109 UART: [art] Store priv key in slot 0x5
34,369,783 UART: [art] Derive Key Pair - Done
34,382,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,095,919 UART: [art] Erasing AUTHORITY.KEYID = 7
36,097,445 UART: [art] PUB.X = 9F9CE516299673698CAE23F23DAFDC8BB1C9DA88625115AB70A72720447F491640FE17D3F6678B192855EE8DB8047C77
36,104,696 UART: [art] PUB.Y = E68F4BBEF7043594BF0AAC3BDBE3F2AB6F0E1CCE5891374456DB890CA48D7545D59452D31D17690BAF37800D742948F3
36,111,934 UART: [art] SIG.R = F54ED7888A94AA2D2D3B5F38B5A9693D412B19FD63007B698050F765F26F74BD60D78CBE41A0902B2E5BA3A6AFA445F8
36,119,323 UART: [art] SIG.S = 99C25AFE9C9012DBC744EA81A018E2E2E3351A8C1B705CBC0B459FF83AACB4E14875DD0509CA61CC57B0DCFFBAB9F7E7
37,097,756 UART: Caliptra RT
37,098,507 UART: [state] CFI Enabled
37,517,669 UART: [rt] RT listening for mailbox commands...
45,287,284 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,631 writing to cptra_bootfsm_go
193,922 UART:
194,268 UART: Running Caliptra ROM ...
195,366 UART:
605,219 UART: [state] CFI Enabled
619,166 UART: [state] LifecycleState = Unprovisioned
621,556 UART: [state] DebugLocked = No
624,125 UART: [state] WD Timer not started. Device not locked for debugging
628,821 UART: [kat] SHA2-256
818,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,483 UART: [kat] ++
830,083 UART: [kat] sha1
840,836 UART: [kat] SHA2-256
843,851 UART: [kat] SHA2-384
850,967 UART: [kat] SHA2-512-ACC
853,540 UART: [kat] ECC-384
3,295,645 UART: [kat] HMAC-384Kdf
3,307,767 UART: [kat] LMS
3,839,594 UART: [kat] --
3,843,680 UART: [cold-reset] ++
3,845,816 UART: [fht] FHT @ 0x50003400
3,856,376 UART: [idev] ++
3,857,054 UART: [idev] CDI.KEYID = 6
3,858,004 UART: [idev] SUBJECT.KEYID = 7
3,859,223 UART: [idev] UDS.KEYID = 0
3,861,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,010,840 UART: [idev] Erasing UDS.KEYID = 0
6,335,812 UART: [idev] Sha1 KeyId Algorithm
6,359,170 UART: [idev] --
6,365,435 UART: [ldev] ++
6,366,122 UART: [ldev] CDI.KEYID = 6
6,367,008 UART: [ldev] SUBJECT.KEYID = 5
6,368,231 UART: [ldev] AUTHORITY.KEYID = 7
6,369,371 UART: [ldev] FE.KEYID = 1
6,380,504 UART: [ldev] Erasing FE.KEYID = 1
8,853,817 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,100 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,426 UART: [ldev] --
10,644,267 UART: [fwproc] Wait for Commands...
10,647,272 UART: [fwproc] Recv command 0x46574c44
10,649,625 UART: [fwproc] Recv'd Img size: 118548 bytes
14,146,026 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,224,075 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,347,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,565 >>> mbox cmd response: success
14,910,104 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
15,038,861 UART: [afmc] ++
15,039,503 UART: [afmc] CDI.KEYID = 6
15,040,400 UART: [afmc] SUBJECT.KEYID = 7
15,041,827 UART: [afmc] AUTHORITY.KEYID = 5
17,418,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,734 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,825 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,997 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,895 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,714 UART: [afmc] --
19,214,573 UART: [cold-reset] --
19,219,526 UART: [state] Locking Datavault
19,225,871 UART: [state] Locking PCR0, PCR1 and PCR31
19,228,071 UART: [state] Locking ICCM
19,229,800 UART: [exit] Launching FMC @ 0x40000130
19,238,477 UART:
19,238,717 UART: Running Caliptra FMC ...
19,239,824 UART:
19,239,985 UART: [state] CFI Enabled
19,247,659 UART: [fht] FMC Alias Private Key: 7
21,014,123 UART: [art] Extend RT PCRs Done
21,015,348 UART: [art] Lock RT PCRs Done
21,017,008 UART: [art] Populate DV Done
21,022,540 UART: [fht] FMC Alias Private Key: 7
21,024,200 UART: [art] Derive CDI
21,024,965 UART: [art] Store in slot 0x4
21,067,834 UART: [art] Derive Key Pair
21,068,877 UART: [art] Store priv key in slot 0x5
23,495,693 UART: [art] Derive Key Pair - Done
23,508,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,214,940 UART: [art] Erasing AUTHORITY.KEYID = 7
25,216,454 UART: [art] PUB.X = 60B608EC1BD65BADCD75D8E880420586A968A2F77A78B785E2BB7DDFF10C72753BB44064FC48872E8AABE4BCFCB122E5
25,223,754 UART: [art] PUB.Y = DFFAC9B30262E8992D322FC621E61952A7F013A699AE29A87307E10391842404EB75D8D8296A1576F096C7107FA555C9
25,230,988 UART: [art] SIG.R = F3CEAB9C75B16366730CCF7FA259D21883BA928BF8DDBDD31DCD6901D53DFB62CD5E61C6C5207C5AC0A1AB0C8695D87C
25,238,443 UART: [art] SIG.S = 65A2DAE5F63756BFA85AC91FE24BE292CADE9EA85277AB4FC6ADB8263F62CA0BE82B2DA3A304ECCD347B699B6CB68644
26,217,968 UART: Caliptra RT
26,218,682 UART: [state] CFI Enabled
26,351,752 UART: [rt] RT listening for mailbox commands...
26,354,932 UART:
26,355,185 UART: Running Caliptra ROM ...
26,356,294 UART:
26,356,532 UART: [state] CFI Enabled
26,373,982 UART: [state] LifecycleState = Unprovisioned
26,375,818 UART: [state] DebugLocked = No
26,378,011 UART: [state] WD Timer not started. Device not locked for debugging
26,382,419 UART: [kat] SHA2-256
26,572,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,583,055 UART: [kat] ++
26,583,601 UART: [kat] sha1
26,594,550 UART: [kat] SHA2-256
26,597,570 UART: [kat] SHA2-384
26,603,240 UART: [kat] SHA2-512-ACC
26,605,817 UART: [kat] ECC-384
29,046,410 UART: [kat] HMAC-384Kdf
29,057,937 UART: [kat] LMS
29,589,542 UART: [kat] --
29,593,531 UART: [update-reset] ++
31,700,122 >>> mbox cmd response: failed
31,701,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,850,791 UART: ROM Non-Fatal Error: 0x000B001F
31,852,235 UART: [state] Locking Datavault
31,853,334 UART: [state] Locking PCR0, PCR1 and PCR31
31,854,881 UART: [state] Locking ICCM
31,855,792 UART: [exit] Launching FMC @ 0x40000130
31,857,221 UART:
31,857,378 UART: Running Caliptra FMC ...
31,858,481 UART:
31,858,642 UART: [state] CFI Enabled
31,859,561 UART: [art] Extend RT PCRs Done
31,860,702 UART: [art] Lock RT PCRs Done
31,861,767 UART: [art] Populate DV Done
31,862,798 UART: [fht] FMC Alias Private Key: 7
31,864,120 UART: [art] Derive CDI
31,864,878 UART: [art] Store in slot 0x4
31,865,943 UART: [art] Derive Key Pair
31,866,941 UART: [art] Store priv key in slot 0x5
34,250,888 UART: [art] Derive Key Pair - Done
34,263,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,969,823 UART: [art] Erasing AUTHORITY.KEYID = 7
35,971,341 UART: [art] PUB.X = 60B608EC1BD65BADCD75D8E880420586A968A2F77A78B785E2BB7DDFF10C72753BB44064FC48872E8AABE4BCFCB122E5
35,978,631 UART: [art] PUB.Y = DFFAC9B30262E8992D322FC621E61952A7F013A699AE29A87307E10391842404EB75D8D8296A1576F096C7107FA555C9
35,985,872 UART: [art] SIG.R = F3CEAB9C75B16366730CCF7FA259D21883BA928BF8DDBDD31DCD6901D53DFB62CD5E61C6C5207C5AC0A1AB0C8695D87C
35,993,268 UART: [art] SIG.S = 65A2DAE5F63756BFA85AC91FE24BE292CADE9EA85277AB4FC6ADB8263F62CA0BE82B2DA3A304ECCD347B699B6CB68644
36,972,515 UART: Caliptra RT
36,973,234 UART: [state] CFI Enabled
37,347,963 UART: [rt] RT listening for mailbox commands...
37,350,763 UART:
37,351,014 UART: Running Caliptra ROM ...
37,352,135 UART:
37,352,375 UART: [state] CFI Enabled
40,322,015 UART: [state] LifecycleState = Unprovisioned
40,323,933 UART: [state] DebugLocked = No
40,326,809 UART: [state] WD Timer not started. Device not locked for debugging
40,331,006 UART: [kat] SHA2-256
40,520,910 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,531,655 UART: [kat] ++
40,532,257 UART: [kat] sha1
40,544,642 UART: [kat] SHA2-256
40,547,609 UART: [kat] SHA2-384
40,553,383 UART: [kat] SHA2-512-ACC
40,556,012 UART: [kat] ECC-384
42,998,993 UART: [kat] HMAC-384Kdf
43,011,005 UART: [kat] LMS
43,542,654 UART: [kat] --
43,547,074 UART: [update-reset] ++
47,054,273 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,057,000 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,686,710 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,758,926 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,748 >>> mbox cmd response: success
15,044,442 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
19,297,013 UART:
19,297,444 UART: Running Caliptra FMC ...
19,298,549 UART:
19,298,704 UART: [state] CFI Enabled
19,306,239 UART: [fht] FMC Alias Private Key: 7
21,071,651 UART: [art] Extend RT PCRs Done
21,072,884 UART: [art] Lock RT PCRs Done
21,074,812 UART: [art] Populate DV Done
21,080,346 UART: [fht] FMC Alias Private Key: 7
21,082,001 UART: [art] Derive CDI
21,082,755 UART: [art] Store in slot 0x4
21,125,751 UART: [art] Derive Key Pair
21,126,757 UART: [art] Store priv key in slot 0x5
23,554,125 UART: [art] Derive Key Pair - Done
23,567,124 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,273,916 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,428 UART: [art] PUB.X = 26C0C79E0F6B062741241DE1390BB2D8C1B613827FFC4F00F41526DE627B81BD3A5A6C324147CECF7E0B6A43A7B30B9C
25,282,677 UART: [art] PUB.Y = C6AC3B3FDE10776774AFE9FFB04E52A736836519E3A516C8D5FE5166D51CB41F903C52A20D3DF10A85DBE5CFD82A0DF5
25,289,931 UART: [art] SIG.R = 773C80C473F5F4D63930AE80CAC8E4939882874872295BAD854D382A03A44EA4A2481A18239871A486E52E6B007BC326
25,297,331 UART: [art] SIG.S = 419EDC4848029CE9D828ED556C53F48CC07BB7F70C81657AD3076178693D49ED79174566699A76E2FE76B66176C19A0C
26,276,338 UART: Caliptra RT
26,277,055 UART: [state] CFI Enabled
26,409,521 UART: [rt] RT listening for mailbox commands...
31,669,273 >>> mbox cmd response: failed
31,671,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,820,120 UART:
31,820,444 UART: Running Caliptra FMC ...
31,821,597 UART:
31,821,767 UART: [state] CFI Enabled
31,822,692 UART: [art] Extend RT PCRs Done
31,823,838 UART: [art] Lock RT PCRs Done
31,824,908 UART: [art] Populate DV Done
31,825,942 UART: [fht] FMC Alias Private Key: 7
31,827,331 UART: [art] Derive CDI
31,828,078 UART: [art] Store in slot 0x4
31,829,094 UART: [art] Derive Key Pair
31,830,034 UART: [art] Store priv key in slot 0x5
34,207,034 UART: [art] Derive Key Pair - Done
34,219,886 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,925,976 UART: [art] Erasing AUTHORITY.KEYID = 7
35,927,462 UART: [art] PUB.X = 26C0C79E0F6B062741241DE1390BB2D8C1B613827FFC4F00F41526DE627B81BD3A5A6C324147CECF7E0B6A43A7B30B9C
35,934,707 UART: [art] PUB.Y = C6AC3B3FDE10776774AFE9FFB04E52A736836519E3A516C8D5FE5166D51CB41F903C52A20D3DF10A85DBE5CFD82A0DF5
35,942,015 UART: [art] SIG.R = 773C80C473F5F4D63930AE80CAC8E4939882874872295BAD854D382A03A44EA4A2481A18239871A486E52E6B007BC326
35,949,394 UART: [art] SIG.S = 419EDC4848029CE9D828ED556C53F48CC07BB7F70C81657AD3076178693D49ED79174566699A76E2FE76B66176C19A0C
36,927,767 UART: Caliptra RT
36,928,496 UART: [state] CFI Enabled
37,302,343 UART: [rt] RT listening for mailbox commands...
48,004,304 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,427 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,963 UART: [kat] SHA2-256
881,894 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,009 UART: [kat] ++
886,161 UART: [kat] sha1
890,319 UART: [kat] SHA2-256
892,257 UART: [kat] SHA2-384
895,120 UART: [kat] SHA2-512-ACC
897,021 UART: [kat] ECC-384
902,674 UART: [kat] HMAC-384Kdf
907,444 UART: [kat] LMS
1,475,640 UART: [kat] --
1,476,341 UART: [cold-reset] ++
1,476,905 UART: [fht] Storing FHT @ 0x50003400
1,479,734 UART: [idev] ++
1,479,902 UART: [idev] CDI.KEYID = 6
1,480,262 UART: [idev] SUBJECT.KEYID = 7
1,480,686 UART: [idev] UDS.KEYID = 0
1,481,031 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,738 UART: [idev] Erasing UDS.KEYID = 0
1,504,870 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,530 UART: [idev] --
1,514,509 UART: [ldev] ++
1,514,677 UART: [ldev] CDI.KEYID = 6
1,515,040 UART: [ldev] SUBJECT.KEYID = 5
1,515,466 UART: [ldev] AUTHORITY.KEYID = 7
1,515,929 UART: [ldev] FE.KEYID = 1
1,521,201 UART: [ldev] Erasing FE.KEYID = 1
1,546,410 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,126 UART: [ldev] --
1,585,593 UART: [fwproc] Waiting for Commands...
1,586,302 UART: [fwproc] Received command 0x46574c44
1,587,093 UART: [fwproc] Received Image of size 118548 bytes
2,931,849 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,403 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,621 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,912 >>> mbox cmd response: success
3,130,912 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,131,976 UART: [afmc] ++
3,132,144 UART: [afmc] CDI.KEYID = 6
3,132,506 UART: [afmc] SUBJECT.KEYID = 7
3,132,931 UART: [afmc] AUTHORITY.KEYID = 5
3,167,738 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,628 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,408 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,117 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,000 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,683 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,759 UART: [afmc] --
3,210,861 UART: [cold-reset] --
3,211,669 UART: [state] Locking Datavault
3,212,824 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,428 UART: [state] Locking ICCM
3,214,034 UART: [exit] Launching FMC @ 0x40000130
3,219,364 UART:
3,219,380 UART: Running Caliptra FMC ...
3,219,788 UART:
3,219,842 UART: [state] CFI Enabled
3,230,296 UART: [fht] FMC Alias Private Key: 7
3,348,776 UART: [art] Extend RT PCRs Done
3,349,204 UART: [art] Lock RT PCRs Done
3,351,060 UART: [art] Populate DV Done
3,359,407 UART: [fht] FMC Alias Private Key: 7
3,360,353 UART: [art] Derive CDI
3,360,633 UART: [art] Store in slot 0x4
3,445,943 UART: [art] Derive Key Pair
3,446,303 UART: [art] Store priv key in slot 0x5
3,459,492 UART: [art] Derive Key Pair - Done
3,474,364 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,003 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,768 UART: [art] PUB.X = FEE4FAD8F0ACC2F7505892E7938B5538F9F5F24D05EB617D820DA7F8963842A4A3720584B62B6BD004A4CA4159B95A92
3,497,532 UART: [art] PUB.Y = F37C68039BE1FDF03157ED2273C6868A482C86E9CDB6AE8DE0BDEE49E1D5F28D4D4E753304809C0BD6729B4C77289226
3,504,481 UART: [art] SIG.R = DA6AC3E1E1764A1C2FECFE0AFE378964417BF1442C053760D89D23E1134A4FCF5DFC179EF6C11EB313D23AA9A25B84B9
3,511,263 UART: [art] SIG.S = 8B8A077722D1D20C918CDB2C6F399B11A72EBAC9A3F443CDCEE66E72A133DD0E7E703ACEA7789FCF778943209D8DFFC3
3,534,964 UART: Caliptra RT
3,535,215 UART: [state] CFI Enabled
3,654,340 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,656,375 UART:
3,656,391 UART: Running Caliptra ROM ...
3,656,799 UART:
3,656,853 UART: [state] CFI Enabled
3,659,459 UART: [state] LifecycleState = Unprovisioned
3,660,114 UART: [state] DebugLocked = No
3,660,616 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,662,123 UART: [kat] SHA2-256
4,456,054 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,460,169 UART: [kat] ++
4,460,321 UART: [kat] sha1
4,464,619 UART: [kat] SHA2-256
4,466,557 UART: [kat] SHA2-384
4,469,394 UART: [kat] SHA2-512-ACC
4,471,294 UART: [kat] ECC-384
4,476,831 UART: [kat] HMAC-384Kdf
4,481,409 UART: [kat] LMS
5,049,605 UART: [kat] --
5,050,648 UART: [update-reset] ++
5,162,789 >>> mbox cmd response: failed
5,162,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,163,379 UART: ROM Non-Fatal Error: 0x000B001F
5,164,295 UART: [state] Locking Datavault
5,165,133 UART: [state] Locking PCR0, PCR1 and PCR31
5,165,737 UART: [state] Locking ICCM
5,166,237 UART: [exit] Launching FMC @ 0x40000130
5,171,567 UART:
5,171,583 UART: Running Caliptra FMC ...
5,171,991 UART:
5,172,045 UART: [state] CFI Enabled
5,261,338 UART: [art] Extend RT PCRs Done
5,261,766 UART: [art] Lock RT PCRs Done
5,263,095 UART: [art] Populate DV Done
5,271,352 UART: [fht] FMC Alias Private Key: 7
5,272,452 UART: [art] Derive CDI
5,272,732 UART: [art] Store in slot 0x4
5,358,280 UART: [art] Derive Key Pair
5,358,640 UART: [art] Store priv key in slot 0x5
5,371,801 UART: [art] Derive Key Pair - Done
5,386,847 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,402,488 UART: [art] Erasing AUTHORITY.KEYID = 7
5,403,253 UART: [art] PUB.X = FEE4FAD8F0ACC2F7505892E7938B5538F9F5F24D05EB617D820DA7F8963842A4A3720584B62B6BD004A4CA4159B95A92
5,410,017 UART: [art] PUB.Y = F37C68039BE1FDF03157ED2273C6868A482C86E9CDB6AE8DE0BDEE49E1D5F28D4D4E753304809C0BD6729B4C77289226
5,416,966 UART: [art] SIG.R = DA6AC3E1E1764A1C2FECFE0AFE378964417BF1442C053760D89D23E1134A4FCF5DFC179EF6C11EB313D23AA9A25B84B9
5,423,748 UART: [art] SIG.S = 8B8A077722D1D20C918CDB2C6F399B11A72EBAC9A3F443CDCEE66E72A133DD0E7E703ACEA7789FCF778943209D8DFFC3
5,448,165 UART: Caliptra RT
5,448,416 UART: [state] CFI Enabled
5,816,442 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,817,970 UART:
5,817,986 UART: Running Caliptra ROM ...
5,818,394 UART:
5,818,448 UART: [state] CFI Enabled
5,820,904 UART: [state] LifecycleState = Unprovisioned
5,821,559 UART: [state] DebugLocked = No
5,822,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,823,758 UART: [kat] SHA2-256
6,617,689 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,621,804 UART: [kat] ++
6,621,956 UART: [kat] sha1
6,626,352 UART: [kat] SHA2-256
6,628,290 UART: [kat] SHA2-384
6,631,023 UART: [kat] SHA2-512-ACC
6,632,923 UART: [kat] ECC-384
6,638,936 UART: [kat] HMAC-384Kdf
6,643,552 UART: [kat] LMS
7,211,748 UART: [kat] --
7,212,535 UART: [update-reset] ++
8,593,135 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,594,271 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,749,538 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,594 >>> mbox cmd response: success
2,981,594 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,042,833 UART:
3,042,849 UART: Running Caliptra FMC ...
3,043,257 UART:
3,043,311 UART: [state] CFI Enabled
3,053,631 UART: [fht] FMC Alias Private Key: 7
3,171,981 UART: [art] Extend RT PCRs Done
3,172,409 UART: [art] Lock RT PCRs Done
3,173,845 UART: [art] Populate DV Done
3,182,036 UART: [fht] FMC Alias Private Key: 7
3,183,188 UART: [art] Derive CDI
3,183,468 UART: [art] Store in slot 0x4
3,268,644 UART: [art] Derive Key Pair
3,269,004 UART: [art] Store priv key in slot 0x5
3,282,461 UART: [art] Derive Key Pair - Done
3,297,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,200 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,965 UART: [art] PUB.X = D5364D021168B732138011BC67BA6FAF1C9215462A4C3C46D4E3E87FBA6255BCACBD9BD854EF9A24A2E86BAD9CC3466A
3,320,748 UART: [art] PUB.Y = 5B6EB326468911CB41EBCDD4C5A3CEF2951AF411DB75A9570668646626043CAEB55C81BC5D7E597DF81461338394943D
3,327,694 UART: [art] SIG.R = 0FDEF758734C8FF82E92FFCBDDDD2438B68358C3B466E0F9162D950A6F68DDDE4B8867D83348F560D4AF42BCF07A4793
3,334,472 UART: [art] SIG.S = C1797AAD4D08083C5D4AEF4463E6F42507BFBCE91EB627643731AD4E6C2ED5F2AAC9E30DA03B2C711A3BCDB5614990F1
3,358,312 UART: Caliptra RT
3,358,563 UART: [state] CFI Enabled
3,478,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,870,561 >>> mbox cmd response: failed
4,870,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,876,465 UART:
4,876,481 UART: Running Caliptra FMC ...
4,876,889 UART:
4,876,943 UART: [state] CFI Enabled
4,965,556 UART: [art] Extend RT PCRs Done
4,965,984 UART: [art] Lock RT PCRs Done
4,967,289 UART: [art] Populate DV Done
4,975,382 UART: [fht] FMC Alias Private Key: 7
4,976,446 UART: [art] Derive CDI
4,976,726 UART: [art] Store in slot 0x4
5,061,848 UART: [art] Derive Key Pair
5,062,208 UART: [art] Store priv key in slot 0x5
5,075,109 UART: [art] Derive Key Pair - Done
5,089,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,105,226 UART: [art] Erasing AUTHORITY.KEYID = 7
5,105,991 UART: [art] PUB.X = D5364D021168B732138011BC67BA6FAF1C9215462A4C3C46D4E3E87FBA6255BCACBD9BD854EF9A24A2E86BAD9CC3466A
5,112,774 UART: [art] PUB.Y = 5B6EB326468911CB41EBCDD4C5A3CEF2951AF411DB75A9570668646626043CAEB55C81BC5D7E597DF81461338394943D
5,119,720 UART: [art] SIG.R = 0FDEF758734C8FF82E92FFCBDDDD2438B68358C3B466E0F9162D950A6F68DDDE4B8867D83348F560D4AF42BCF07A4793
5,126,498 UART: [art] SIG.S = C1797AAD4D08083C5D4AEF4463E6F42507BFBCE91EB627643731AD4E6C2ED5F2AAC9E30DA03B2C711A3BCDB5614990F1
5,150,326 UART: Caliptra RT
5,150,577 UART: [state] CFI Enabled
5,518,316 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,333,114 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,001 UART: [state] LifecycleState = Unprovisioned
85,656 UART: [state] DebugLocked = No
86,388 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,922 UART: [kat] SHA2-256
881,853 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,968 UART: [kat] ++
886,120 UART: [kat] sha1
890,414 UART: [kat] SHA2-256
892,352 UART: [kat] SHA2-384
894,965 UART: [kat] SHA2-512-ACC
896,866 UART: [kat] ECC-384
902,819 UART: [kat] HMAC-384Kdf
907,267 UART: [kat] LMS
1,475,463 UART: [kat] --
1,476,246 UART: [cold-reset] ++
1,476,652 UART: [fht] Storing FHT @ 0x50003400
1,479,563 UART: [idev] ++
1,479,731 UART: [idev] CDI.KEYID = 6
1,480,091 UART: [idev] SUBJECT.KEYID = 7
1,480,515 UART: [idev] UDS.KEYID = 0
1,480,860 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,107 UART: [idev] Erasing UDS.KEYID = 0
1,505,463 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,199 UART: [idev] --
1,515,430 UART: [ldev] ++
1,515,598 UART: [ldev] CDI.KEYID = 6
1,515,961 UART: [ldev] SUBJECT.KEYID = 5
1,516,387 UART: [ldev] AUTHORITY.KEYID = 7
1,516,850 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,689 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,260 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,976 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,867 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,467 UART: [ldev] --
1,586,824 UART: [fwproc] Waiting for Commands...
1,587,645 UART: [fwproc] Received command 0x46574c44
1,588,436 UART: [fwproc] Received Image of size 118548 bytes
2,933,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,832 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,050 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,409 >>> mbox cmd response: success
3,131,409 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,132,465 UART: [afmc] ++
3,132,633 UART: [afmc] CDI.KEYID = 6
3,132,995 UART: [afmc] SUBJECT.KEYID = 7
3,133,420 UART: [afmc] AUTHORITY.KEYID = 5
3,168,491 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,963 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,743 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,452 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,335 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,203,018 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,730 UART: [afmc] --
3,211,748 UART: [cold-reset] --
3,212,568 UART: [state] Locking Datavault
3,213,819 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,423 UART: [state] Locking ICCM
3,215,037 UART: [exit] Launching FMC @ 0x40000130
3,220,367 UART:
3,220,383 UART: Running Caliptra FMC ...
3,220,791 UART:
3,220,934 UART: [state] CFI Enabled
3,231,510 UART: [fht] FMC Alias Private Key: 7
3,350,032 UART: [art] Extend RT PCRs Done
3,350,460 UART: [art] Lock RT PCRs Done
3,351,836 UART: [art] Populate DV Done
3,360,237 UART: [fht] FMC Alias Private Key: 7
3,361,205 UART: [art] Derive CDI
3,361,485 UART: [art] Store in slot 0x4
3,447,229 UART: [art] Derive Key Pair
3,447,589 UART: [art] Store priv key in slot 0x5
3,460,928 UART: [art] Derive Key Pair - Done
3,475,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,275 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,040 UART: [art] PUB.X = A3F669FEFB3FAFE59C9994DC5263BE7AE600B27AEE2AF9E139E93866367C9CA1A0ED1432BF617EB815F7908287443E63
3,498,800 UART: [art] PUB.Y = F11F94D0E038139A47550BA4D0F95416056AAB4460244FB3A9794A672CA9D137F846776D162BDB17E820FBC116E88856
3,505,740 UART: [art] SIG.R = 441F5DC30C1FF974D12F5257A722E923E697EB4D492AB2A84F9B4CB0D504FA3FB95A6029827DDC1E70FBE856C66042EE
3,512,516 UART: [art] SIG.S = 4A88B327A9E2A64FC0239E1FB60494D329885620641DA7755A2A21AB608B2383EED9B7F2C63F778359C3D04913EA92D3
3,536,213 UART: Caliptra RT
3,536,556 UART: [state] CFI Enabled
3,656,929 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,659,018 UART:
3,659,034 UART: Running Caliptra ROM ...
3,659,442 UART:
3,659,583 UART: [state] CFI Enabled
3,661,959 UART: [state] LifecycleState = Unprovisioned
3,662,614 UART: [state] DebugLocked = No
3,663,122 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,664,815 UART: [kat] SHA2-256
4,458,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,462,861 UART: [kat] ++
4,463,013 UART: [kat] sha1
4,467,225 UART: [kat] SHA2-256
4,469,163 UART: [kat] SHA2-384
4,471,796 UART: [kat] SHA2-512-ACC
4,473,696 UART: [kat] ECC-384
4,479,605 UART: [kat] HMAC-384Kdf
4,484,337 UART: [kat] LMS
5,052,533 UART: [kat] --
5,053,376 UART: [update-reset] ++
5,165,271 >>> mbox cmd response: failed
5,165,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,165,633 UART: ROM Non-Fatal Error: 0x000B001F
5,166,523 UART: [state] Locking Datavault
5,167,493 UART: [state] Locking PCR0, PCR1 and PCR31
5,168,097 UART: [state] Locking ICCM
5,168,579 UART: [exit] Launching FMC @ 0x40000130
5,173,909 UART:
5,173,925 UART: Running Caliptra FMC ...
5,174,333 UART:
5,174,476 UART: [state] CFI Enabled
5,263,689 UART: [art] Extend RT PCRs Done
5,264,117 UART: [art] Lock RT PCRs Done
5,265,242 UART: [art] Populate DV Done
5,273,635 UART: [fht] FMC Alias Private Key: 7
5,274,707 UART: [art] Derive CDI
5,274,987 UART: [art] Store in slot 0x4
5,360,649 UART: [art] Derive Key Pair
5,361,009 UART: [art] Store priv key in slot 0x5
5,374,882 UART: [art] Derive Key Pair - Done
5,389,644 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,404,923 UART: [art] Erasing AUTHORITY.KEYID = 7
5,405,688 UART: [art] PUB.X = A3F669FEFB3FAFE59C9994DC5263BE7AE600B27AEE2AF9E139E93866367C9CA1A0ED1432BF617EB815F7908287443E63
5,412,448 UART: [art] PUB.Y = F11F94D0E038139A47550BA4D0F95416056AAB4460244FB3A9794A672CA9D137F846776D162BDB17E820FBC116E88856
5,419,388 UART: [art] SIG.R = 441F5DC30C1FF974D12F5257A722E923E697EB4D492AB2A84F9B4CB0D504FA3FB95A6029827DDC1E70FBE856C66042EE
5,426,164 UART: [art] SIG.S = 4A88B327A9E2A64FC0239E1FB60494D329885620641DA7755A2A21AB608B2383EED9B7F2C63F778359C3D04913EA92D3
5,449,879 UART: Caliptra RT
5,450,222 UART: [state] CFI Enabled
5,815,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,816,730 UART:
5,816,746 UART: Running Caliptra ROM ...
5,817,154 UART:
5,817,295 UART: [state] CFI Enabled
5,819,953 UART: [state] LifecycleState = Unprovisioned
5,820,608 UART: [state] DebugLocked = No
5,821,164 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,822,713 UART: [kat] SHA2-256
6,616,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,620,759 UART: [kat] ++
6,620,911 UART: [kat] sha1
6,625,139 UART: [kat] SHA2-256
6,627,077 UART: [kat] SHA2-384
6,629,646 UART: [kat] SHA2-512-ACC
6,631,546 UART: [kat] ECC-384
6,636,845 UART: [kat] HMAC-384Kdf
6,641,555 UART: [kat] LMS
7,209,751 UART: [kat] --
7,210,682 UART: [update-reset] ++
8,591,736 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,592,854 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,748,121 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,983 >>> mbox cmd response: success
2,980,983 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
3,042,862 UART:
3,042,878 UART: Running Caliptra FMC ...
3,043,286 UART:
3,043,429 UART: [state] CFI Enabled
3,053,871 UART: [fht] FMC Alias Private Key: 7
3,172,629 UART: [art] Extend RT PCRs Done
3,173,057 UART: [art] Lock RT PCRs Done
3,174,581 UART: [art] Populate DV Done
3,182,724 UART: [fht] FMC Alias Private Key: 7
3,183,712 UART: [art] Derive CDI
3,183,992 UART: [art] Store in slot 0x4
3,269,706 UART: [art] Derive Key Pair
3,270,066 UART: [art] Store priv key in slot 0x5
3,283,589 UART: [art] Derive Key Pair - Done
3,298,155 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,253 UART: [art] PUB.X = 7332BD208EF9DF2ABCFF8FF18CFEC68E2AF9FF7067F0F2737129182E25CAD45174E4CD6568CB46727F15551E71ED1DC9
3,321,039 UART: [art] PUB.Y = 2C91A2BA0EE6EBBF983BEA4A5E60B4F81FEBD52E1E4C38B2385643EE5EDAA49B9218ADB83AF74713490E80D1B92CB62F
3,328,007 UART: [art] SIG.R = DF1A8C271C77DE34AAD8A15E461B9265C4488398E827510ABDA5FAF364283725D36B70AB28FE2931AC259E386D8285B3
3,334,778 UART: [art] SIG.S = FB36E53C3D2636BE7FB8682BDACFB3B3455A2A9A4A38EB43092DD13CFFB3B64E119F7B1C60364A7DEBCFE6E2B0F324C2
3,359,125 UART: Caliptra RT
3,359,468 UART: [state] CFI Enabled
3,479,181 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,871,964 >>> mbox cmd response: failed
4,871,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,877,884 UART:
4,877,900 UART: Running Caliptra FMC ...
4,878,308 UART:
4,878,451 UART: [state] CFI Enabled
4,968,054 UART: [art] Extend RT PCRs Done
4,968,482 UART: [art] Lock RT PCRs Done
4,969,615 UART: [art] Populate DV Done
4,978,006 UART: [fht] FMC Alias Private Key: 7
4,979,000 UART: [art] Derive CDI
4,979,280 UART: [art] Store in slot 0x4
5,065,530 UART: [art] Derive Key Pair
5,065,890 UART: [art] Store priv key in slot 0x5
5,079,745 UART: [art] Derive Key Pair - Done
5,094,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,109,612 UART: [art] Erasing AUTHORITY.KEYID = 7
5,110,377 UART: [art] PUB.X = 7332BD208EF9DF2ABCFF8FF18CFEC68E2AF9FF7067F0F2737129182E25CAD45174E4CD6568CB46727F15551E71ED1DC9
5,117,163 UART: [art] PUB.Y = 2C91A2BA0EE6EBBF983BEA4A5E60B4F81FEBD52E1E4C38B2385643EE5EDAA49B9218ADB83AF74713490E80D1B92CB62F
5,124,131 UART: [art] SIG.R = DF1A8C271C77DE34AAD8A15E461B9265C4488398E827510ABDA5FAF364283725D36B70AB28FE2931AC259E386D8285B3
5,130,902 UART: [art] SIG.S = FB36E53C3D2636BE7FB8682BDACFB3B3455A2A9A4A38EB43092DD13CFFB3B64E119F7B1C60364A7DEBCFE6E2B0F324C2
5,155,769 UART: Caliptra RT
5,156,112 UART: [state] CFI Enabled
5,524,176 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,340,559 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.13s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,528 UART: [state] LifecycleState = Unprovisioned
86,183 UART: [state] DebugLocked = No
86,767 UART: [state] WD Timer not started. Device not locked for debugging
87,882 UART: [kat] SHA2-256
891,432 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,536 UART: [kat] ++
895,688 UART: [kat] sha1
899,982 UART: [kat] SHA2-256
901,922 UART: [kat] SHA2-384
904,857 UART: [kat] SHA2-512-ACC
906,758 UART: [kat] ECC-384
916,207 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,920 UART: [cold-reset] ++
1,170,326 UART: [fht] FHT @ 0x50003400
1,173,002 UART: [idev] ++
1,173,170 UART: [idev] CDI.KEYID = 6
1,173,531 UART: [idev] SUBJECT.KEYID = 7
1,173,956 UART: [idev] UDS.KEYID = 0
1,174,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,839 UART: [idev] Erasing UDS.KEYID = 0
1,198,491 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,390 UART: [ldev] ++
1,208,558 UART: [ldev] CDI.KEYID = 6
1,208,922 UART: [ldev] SUBJECT.KEYID = 5
1,209,349 UART: [ldev] AUTHORITY.KEYID = 7
1,209,812 UART: [ldev] FE.KEYID = 1
1,214,864 UART: [ldev] Erasing FE.KEYID = 1
1,241,321 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,671 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,998 UART: [ldev] --
1,280,313 UART: [fwproc] Wait for Commands...
1,281,120 UART: [fwproc] Recv command 0x46574c44
1,281,853 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,607 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,782 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,015 >>> mbox cmd response: success
2,826,015 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,031 UART: [afmc] ++
2,827,199 UART: [afmc] CDI.KEYID = 6
2,827,562 UART: [afmc] SUBJECT.KEYID = 7
2,827,988 UART: [afmc] AUTHORITY.KEYID = 5
2,864,057 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,020 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,769 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,360 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,061 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,816 UART: [afmc] --
2,906,701 UART: [cold-reset] --
2,907,737 UART: [state] Locking Datavault
2,908,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,600 UART: [state] Locking ICCM
2,910,186 UART: [exit] Launching FMC @ 0x40000130
2,915,516 UART:
2,915,532 UART: Running Caliptra FMC ...
2,915,940 UART:
2,915,994 UART: [state] CFI Enabled
2,926,524 UART: [fht] FMC Alias Private Key: 7
3,045,118 UART: [art] Extend RT PCRs Done
3,045,546 UART: [art] Lock RT PCRs Done
3,047,204 UART: [art] Populate DV Done
3,055,491 UART: [fht] FMC Alias Private Key: 7
3,056,601 UART: [art] Derive CDI
3,056,881 UART: [art] Store in slot 0x4
3,142,740 UART: [art] Derive Key Pair
3,143,100 UART: [art] Store priv key in slot 0x5
3,155,952 UART: [art] Derive Key Pair - Done
3,170,741 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,502 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,267 UART: [art] PUB.X = 1B67C7886F3A37F80A2D9BAC79655B69DE26C9B6E85C10F81EE97B30F9FF606029527E96A686AC1B061A932A2078EACE
3,194,039 UART: [art] PUB.Y = 6F0AED7A32DCA4E719A0AD437011C417C37DB7B53883A95EBB66D4B658E52C790B5FE3E3DED0735BF26A54B2839B7C7B
3,200,999 UART: [art] SIG.R = 9A6DAFB60B0C274E9582E1990F83B9D813042BAFF2229C893663644FB5C8F4326011D68972503714BC0898A55414A6C5
3,207,746 UART: [art] SIG.S = 43B2F14EB5D3D62FA07D866D0AEA461A7272EFD08F858D9F314C540F0EF26FE872F3A130981C10EA3802A01148F5964A
3,231,934 UART: Caliptra RT
3,232,185 UART: [state] CFI Enabled
3,351,480 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,614 UART:
3,353,630 UART: Running Caliptra ROM ...
3,354,038 UART:
3,354,093 UART: [state] CFI Enabled
3,356,695 UART: [state] LifecycleState = Unprovisioned
3,357,350 UART: [state] DebugLocked = No
3,357,928 UART: [state] WD Timer not started. Device not locked for debugging
3,359,192 UART: [kat] SHA2-256
4,162,742 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,166,846 UART: [kat] ++
4,166,998 UART: [kat] sha1
4,171,424 UART: [kat] SHA2-256
4,173,364 UART: [kat] SHA2-384
4,176,177 UART: [kat] SHA2-512-ACC
4,178,077 UART: [kat] ECC-384
4,187,756 UART: [kat] HMAC-384Kdf
4,192,288 UART: [kat] LMS
4,440,600 UART: [kat] --
4,441,590 UART: [update-reset] ++
4,530,608 >>> mbox cmd response: failed
4,530,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,531,068 UART: ROM Non-Fatal Error: 0x000B001F
4,531,830 UART: [state] Locking Datavault
4,532,632 UART: [state] Locking PCR0, PCR1 and PCR31
4,533,236 UART: [state] Locking ICCM
4,533,726 UART: [exit] Launching FMC @ 0x40000130
4,539,056 UART:
4,539,072 UART: Running Caliptra FMC ...
4,539,480 UART:
4,539,534 UART: [state] CFI Enabled
4,628,187 UART: [art] Extend RT PCRs Done
4,628,615 UART: [art] Lock RT PCRs Done
4,629,988 UART: [art] Populate DV Done
4,638,143 UART: [fht] FMC Alias Private Key: 7
4,639,127 UART: [art] Derive CDI
4,639,407 UART: [art] Store in slot 0x4
4,725,396 UART: [art] Derive Key Pair
4,725,756 UART: [art] Store priv key in slot 0x5
4,739,328 UART: [art] Derive Key Pair - Done
4,754,115 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,769,554 UART: [art] Erasing AUTHORITY.KEYID = 7
4,770,319 UART: [art] PUB.X = 1B67C7886F3A37F80A2D9BAC79655B69DE26C9B6E85C10F81EE97B30F9FF606029527E96A686AC1B061A932A2078EACE
4,777,091 UART: [art] PUB.Y = 6F0AED7A32DCA4E719A0AD437011C417C37DB7B53883A95EBB66D4B658E52C790B5FE3E3DED0735BF26A54B2839B7C7B
4,784,051 UART: [art] SIG.R = 9A6DAFB60B0C274E9582E1990F83B9D813042BAFF2229C893663644FB5C8F4326011D68972503714BC0898A55414A6C5
4,790,798 UART: [art] SIG.S = 43B2F14EB5D3D62FA07D866D0AEA461A7272EFD08F858D9F314C540F0EF26FE872F3A130981C10EA3802A01148F5964A
4,814,798 UART: Caliptra RT
4,815,049 UART: [state] CFI Enabled
5,183,339 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,185,054 UART:
5,185,070 UART: Running Caliptra ROM ...
5,185,478 UART:
5,185,533 UART: [state] CFI Enabled
5,187,901 UART: [state] LifecycleState = Unprovisioned
5,188,556 UART: [state] DebugLocked = No
5,189,156 UART: [state] WD Timer not started. Device not locked for debugging
5,190,396 UART: [kat] SHA2-256
5,993,946 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,998,050 UART: [kat] ++
5,998,202 UART: [kat] sha1
6,002,556 UART: [kat] SHA2-256
6,004,496 UART: [kat] SHA2-384
6,007,257 UART: [kat] SHA2-512-ACC
6,009,157 UART: [kat] ECC-384
6,018,906 UART: [kat] HMAC-384Kdf
6,023,548 UART: [kat] LMS
6,271,860 UART: [kat] --
6,272,820 UART: [update-reset] ++
7,631,977 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,632,966 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,788,181 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,464 >>> mbox cmd response: success
2,678,464 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,740,977 UART:
2,740,993 UART: Running Caliptra FMC ...
2,741,401 UART:
2,741,455 UART: [state] CFI Enabled
2,752,229 UART: [fht] FMC Alias Private Key: 7
2,871,965 UART: [art] Extend RT PCRs Done
2,872,393 UART: [art] Lock RT PCRs Done
2,873,639 UART: [art] Populate DV Done
2,881,930 UART: [fht] FMC Alias Private Key: 7
2,882,910 UART: [art] Derive CDI
2,883,190 UART: [art] Store in slot 0x4
2,969,181 UART: [art] Derive Key Pair
2,969,541 UART: [art] Store priv key in slot 0x5
2,982,643 UART: [art] Derive Key Pair - Done
2,997,502 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,617 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,382 UART: [art] PUB.X = 1680A6E5047D73CE0A5BFD34FCCC5B61C381B9FA3892C6102EE85CC43D0BB0BB653FDE1DA83952544CD239D99FA933BF
3,020,161 UART: [art] PUB.Y = 31C1DE3EE25861D27DBDEAA4498980E08C905E7974AB32B0FBD4264C9CF10BC253BDB2F46F097B6B1DD7E9D22A692FDB
3,027,125 UART: [art] SIG.R = 57A86D880645B978BB9AD76D213B15A20707E2A165DBE39EB4487CAB6C1D267710A44079CCAA8830C361D707D017F23E
3,033,885 UART: [art] SIG.S = A18CE58FE38C8CD8BA49E25C0F9B1A9998FFE229EB364E403702EC232C1274CE61B5AF9E996757FCB0E8DB3CCD3EB00A
3,057,792 UART: Caliptra RT
3,058,043 UART: [state] CFI Enabled
3,177,870 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,243,673 >>> mbox cmd response: failed
4,243,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,249,117 UART:
4,249,133 UART: Running Caliptra FMC ...
4,249,541 UART:
4,249,595 UART: [state] CFI Enabled
4,338,346 UART: [art] Extend RT PCRs Done
4,338,774 UART: [art] Lock RT PCRs Done
4,340,261 UART: [art] Populate DV Done
4,348,538 UART: [fht] FMC Alias Private Key: 7
4,349,466 UART: [art] Derive CDI
4,349,746 UART: [art] Store in slot 0x4
4,435,635 UART: [art] Derive Key Pair
4,435,995 UART: [art] Store priv key in slot 0x5
4,449,133 UART: [art] Derive Key Pair - Done
4,463,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,479,873 UART: [art] Erasing AUTHORITY.KEYID = 7
4,480,638 UART: [art] PUB.X = 1680A6E5047D73CE0A5BFD34FCCC5B61C381B9FA3892C6102EE85CC43D0BB0BB653FDE1DA83952544CD239D99FA933BF
4,487,417 UART: [art] PUB.Y = 31C1DE3EE25861D27DBDEAA4498980E08C905E7974AB32B0FBD4264C9CF10BC253BDB2F46F097B6B1DD7E9D22A692FDB
4,494,381 UART: [art] SIG.R = 57A86D880645B978BB9AD76D213B15A20707E2A165DBE39EB4487CAB6C1D267710A44079CCAA8830C361D707D017F23E
4,501,141 UART: [art] SIG.S = A18CE58FE38C8CD8BA49E25C0F9B1A9998FFE229EB364E403702EC232C1274CE61B5AF9E996757FCB0E8DB3CCD3EB00A
4,524,998 UART: Caliptra RT
4,525,249 UART: [state] CFI Enabled
4,893,761 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,384,181 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,686 UART: [state] WD Timer not started. Device not locked for debugging
87,921 UART: [kat] SHA2-256
891,471 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,575 UART: [kat] ++
895,727 UART: [kat] sha1
899,927 UART: [kat] SHA2-256
901,867 UART: [kat] SHA2-384
904,694 UART: [kat] SHA2-512-ACC
906,595 UART: [kat] ECC-384
916,296 UART: [kat] HMAC-384Kdf
921,038 UART: [kat] LMS
1,169,350 UART: [kat] --
1,170,213 UART: [cold-reset] ++
1,170,733 UART: [fht] FHT @ 0x50003400
1,173,549 UART: [idev] ++
1,173,717 UART: [idev] CDI.KEYID = 6
1,174,078 UART: [idev] SUBJECT.KEYID = 7
1,174,503 UART: [idev] UDS.KEYID = 0
1,174,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,210 UART: [idev] Erasing UDS.KEYID = 0
1,200,136 UART: [idev] Sha1 KeyId Algorithm
1,209,186 UART: [idev] --
1,210,173 UART: [ldev] ++
1,210,341 UART: [ldev] CDI.KEYID = 6
1,210,705 UART: [ldev] SUBJECT.KEYID = 5
1,211,132 UART: [ldev] AUTHORITY.KEYID = 7
1,211,595 UART: [ldev] FE.KEYID = 1
1,216,827 UART: [ldev] Erasing FE.KEYID = 1
1,242,614 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,092 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,919 UART: [ldev] --
1,282,144 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,935 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,660 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,835 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,218 >>> mbox cmd response: success
2,826,218 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,468 UART: [afmc] ++
2,827,636 UART: [afmc] CDI.KEYID = 6
2,827,999 UART: [afmc] SUBJECT.KEYID = 7
2,828,425 UART: [afmc] AUTHORITY.KEYID = 5
2,864,700 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,139 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,598 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,479 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,180 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,909 UART: [afmc] --
2,907,928 UART: [cold-reset] --
2,908,778 UART: [state] Locking Datavault
2,909,951 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,555 UART: [state] Locking ICCM
2,910,997 UART: [exit] Launching FMC @ 0x40000130
2,916,327 UART:
2,916,343 UART: Running Caliptra FMC ...
2,916,751 UART:
2,916,894 UART: [state] CFI Enabled
2,927,486 UART: [fht] FMC Alias Private Key: 7
3,047,040 UART: [art] Extend RT PCRs Done
3,047,468 UART: [art] Lock RT PCRs Done
3,049,060 UART: [art] Populate DV Done
3,057,079 UART: [fht] FMC Alias Private Key: 7
3,058,217 UART: [art] Derive CDI
3,058,497 UART: [art] Store in slot 0x4
3,144,496 UART: [art] Derive Key Pair
3,144,856 UART: [art] Store priv key in slot 0x5
3,158,256 UART: [art] Derive Key Pair - Done
3,172,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,089 UART: [art] PUB.X = D8893050B114620FF89CDD4B1D6D38087C2CA5E5F22C9BFAFCD4E8317961AC4481180BD522A104EA6FA9EFC7D25806D8
3,195,856 UART: [art] PUB.Y = 507403B5AE65B35C910C186FDE94845EB055143ABE6B57CF4D68635C071B787634E0DA99F9934B72C66E5F40F04F8063
3,202,795 UART: [art] SIG.R = 46E55704A14C60C8E7595EF94F0AF899BC10F5C3C10501B6419F65EB32E046007A4B5E6D714BD50AE04A387FD31896BC
3,209,532 UART: [art] SIG.S = 9CBA4D5FEF11A47B8712583C0B28B10AFB6FDCCF219AD73F2252F30CB18F7045F6139AAF58C37DFAA89A391D958DABB0
3,233,873 UART: Caliptra RT
3,234,216 UART: [state] CFI Enabled
3,353,479 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,355,459 UART:
3,355,475 UART: Running Caliptra ROM ...
3,355,883 UART:
3,356,025 UART: [state] CFI Enabled
3,358,939 UART: [state] LifecycleState = Unprovisioned
3,359,594 UART: [state] DebugLocked = No
3,360,084 UART: [state] WD Timer not started. Device not locked for debugging
3,361,316 UART: [kat] SHA2-256
4,164,866 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,168,970 UART: [kat] ++
4,169,122 UART: [kat] sha1
4,173,466 UART: [kat] SHA2-256
4,175,406 UART: [kat] SHA2-384
4,178,181 UART: [kat] SHA2-512-ACC
4,180,081 UART: [kat] ECC-384
4,190,168 UART: [kat] HMAC-384Kdf
4,194,856 UART: [kat] LMS
4,443,168 UART: [kat] --
4,444,104 UART: [update-reset] ++
4,533,994 >>> mbox cmd response: failed
4,533,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,534,530 UART: ROM Non-Fatal Error: 0x000B001F
4,535,330 UART: [state] Locking Datavault
4,536,340 UART: [state] Locking PCR0, PCR1 and PCR31
4,536,944 UART: [state] Locking ICCM
4,537,462 UART: [exit] Launching FMC @ 0x40000130
4,542,792 UART:
4,542,808 UART: Running Caliptra FMC ...
4,543,216 UART:
4,543,359 UART: [state] CFI Enabled
4,632,322 UART: [art] Extend RT PCRs Done
4,632,750 UART: [art] Lock RT PCRs Done
4,634,189 UART: [art] Populate DV Done
4,642,304 UART: [fht] FMC Alias Private Key: 7
4,643,314 UART: [art] Derive CDI
4,643,594 UART: [art] Store in slot 0x4
4,729,853 UART: [art] Derive Key Pair
4,730,213 UART: [art] Store priv key in slot 0x5
4,742,923 UART: [art] Derive Key Pair - Done
4,757,548 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,773,413 UART: [art] Erasing AUTHORITY.KEYID = 7
4,774,178 UART: [art] PUB.X = D8893050B114620FF89CDD4B1D6D38087C2CA5E5F22C9BFAFCD4E8317961AC4481180BD522A104EA6FA9EFC7D25806D8
4,780,945 UART: [art] PUB.Y = 507403B5AE65B35C910C186FDE94845EB055143ABE6B57CF4D68635C071B787634E0DA99F9934B72C66E5F40F04F8063
4,787,884 UART: [art] SIG.R = 46E55704A14C60C8E7595EF94F0AF899BC10F5C3C10501B6419F65EB32E046007A4B5E6D714BD50AE04A387FD31896BC
4,794,621 UART: [art] SIG.S = 9CBA4D5FEF11A47B8712583C0B28B10AFB6FDCCF219AD73F2252F30CB18F7045F6139AAF58C37DFAA89A391D958DABB0
4,818,566 UART: Caliptra RT
4,818,909 UART: [state] CFI Enabled
5,187,549 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,189,106 UART:
5,189,122 UART: Running Caliptra ROM ...
5,189,530 UART:
5,189,672 UART: [state] CFI Enabled
5,192,504 UART: [state] LifecycleState = Unprovisioned
5,193,159 UART: [state] DebugLocked = No
5,193,675 UART: [state] WD Timer not started. Device not locked for debugging
5,194,841 UART: [kat] SHA2-256
5,998,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,002,495 UART: [kat] ++
6,002,647 UART: [kat] sha1
6,006,907 UART: [kat] SHA2-256
6,008,847 UART: [kat] SHA2-384
6,011,776 UART: [kat] SHA2-512-ACC
6,013,676 UART: [kat] ECC-384
6,023,555 UART: [kat] HMAC-384Kdf
6,028,075 UART: [kat] LMS
6,276,387 UART: [kat] --
6,277,313 UART: [update-reset] ++
7,636,572 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,637,633 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,792,848 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,945 >>> mbox cmd response: success
2,678,945 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,741,822 UART:
2,741,838 UART: Running Caliptra FMC ...
2,742,246 UART:
2,742,389 UART: [state] CFI Enabled
2,752,951 UART: [fht] FMC Alias Private Key: 7
2,872,037 UART: [art] Extend RT PCRs Done
2,872,465 UART: [art] Lock RT PCRs Done
2,873,757 UART: [art] Populate DV Done
2,882,196 UART: [fht] FMC Alias Private Key: 7
2,883,176 UART: [art] Derive CDI
2,883,456 UART: [art] Store in slot 0x4
2,969,155 UART: [art] Derive Key Pair
2,969,515 UART: [art] Store priv key in slot 0x5
2,983,241 UART: [art] Derive Key Pair - Done
2,998,010 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,723 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,488 UART: [art] PUB.X = 526EAD526D70D4B4E1B3254FB2BE7207FD2FA68C860F35D12C2C2FFEF795BCB99649B7551AD3D1480B5F395BC1001F07
3,021,236 UART: [art] PUB.Y = 1E6CE139AD30803A8100AB6635E84AF57AA29D4EE821096BA9547C7341A065BCFF2FA80CF730D01930BCB61C3E1E300F
3,028,165 UART: [art] SIG.R = B2B55BC61EBA67E653398A23A1F0787A04B676F7ABA442B482C65C4BF558CAEE7749B79BB94E94BD1F796BC80065B9BC
3,034,924 UART: [art] SIG.S = EE489B1F92C70CE893DBA9F0A74419CE66D405B043EB1CAA66DA52FAE40CD14749ABEBFB5D11B89DD14E4761D4ED9AD2
3,058,565 UART: Caliptra RT
3,058,908 UART: [state] CFI Enabled
3,179,182 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,244,914 >>> mbox cmd response: failed
4,244,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,250,910 UART:
4,250,926 UART: Running Caliptra FMC ...
4,251,334 UART:
4,251,477 UART: [state] CFI Enabled
4,340,718 UART: [art] Extend RT PCRs Done
4,341,146 UART: [art] Lock RT PCRs Done
4,342,313 UART: [art] Populate DV Done
4,350,614 UART: [fht] FMC Alias Private Key: 7
4,351,592 UART: [art] Derive CDI
4,351,872 UART: [art] Store in slot 0x4
4,437,973 UART: [art] Derive Key Pair
4,438,333 UART: [art] Store priv key in slot 0x5
4,451,455 UART: [art] Derive Key Pair - Done
4,465,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,481,367 UART: [art] Erasing AUTHORITY.KEYID = 7
4,482,132 UART: [art] PUB.X = 526EAD526D70D4B4E1B3254FB2BE7207FD2FA68C860F35D12C2C2FFEF795BCB99649B7551AD3D1480B5F395BC1001F07
4,488,880 UART: [art] PUB.Y = 1E6CE139AD30803A8100AB6635E84AF57AA29D4EE821096BA9547C7341A065BCFF2FA80CF730D01930BCB61C3E1E300F
4,495,809 UART: [art] SIG.R = B2B55BC61EBA67E653398A23A1F0787A04B676F7ABA442B482C65C4BF558CAEE7749B79BB94E94BD1F796BC80065B9BC
4,502,568 UART: [art] SIG.S = EE489B1F92C70CE893DBA9F0A74419CE66D405B043EB1CAA66DA52FAE40CD14749ABEBFB5D11B89DD14E4761D4ED9AD2
4,526,031 UART: Caliptra RT
4,526,374 UART: [state] CFI Enabled
4,893,735 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,383,740 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Unprovisioned
85,715 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
893,436 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,561 UART: [kat] ++
897,713 UART: [kat] sha1
901,933 UART: [kat] SHA2-256
903,873 UART: [kat] SHA2-384
906,450 UART: [kat] SHA2-512-ACC
908,351 UART: [kat] ECC-384
918,364 UART: [kat] HMAC-384Kdf
923,166 UART: [kat] LMS
1,171,494 UART: [kat] --
1,172,237 UART: [cold-reset] ++
1,172,807 UART: [fht] FHT @ 0x50003400
1,175,516 UART: [idev] ++
1,175,684 UART: [idev] CDI.KEYID = 6
1,176,044 UART: [idev] SUBJECT.KEYID = 7
1,176,468 UART: [idev] UDS.KEYID = 0
1,176,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,684 UART: [idev] Erasing UDS.KEYID = 0
1,201,671 UART: [idev] Sha1 KeyId Algorithm
1,210,131 UART: [idev] --
1,211,233 UART: [ldev] ++
1,211,401 UART: [ldev] CDI.KEYID = 6
1,211,764 UART: [ldev] SUBJECT.KEYID = 5
1,212,190 UART: [ldev] AUTHORITY.KEYID = 7
1,212,653 UART: [ldev] FE.KEYID = 1
1,217,523 UART: [ldev] Erasing FE.KEYID = 1
1,243,892 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,339 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,055 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,946 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,658 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,212 UART: [fwproc] Wait for Commands...
1,283,792 UART: [fwproc] Recv command 0x46574c44
1,284,520 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,644 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,814 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,107 >>> mbox cmd response: success
2,828,107 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,829,295 UART: [afmc] ++
2,829,463 UART: [afmc] CDI.KEYID = 6
2,829,825 UART: [afmc] SUBJECT.KEYID = 7
2,830,250 UART: [afmc] AUTHORITY.KEYID = 5
2,865,421 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,664 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,412 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,121 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,894,004 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,705 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,615 UART: [afmc] --
2,908,645 UART: [cold-reset] --
2,909,479 UART: [state] Locking Datavault
2,910,526 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,130 UART: [state] Locking ICCM
2,911,568 UART: [exit] Launching FMC @ 0x40000130
2,916,898 UART:
2,916,914 UART: Running Caliptra FMC ...
2,917,322 UART:
2,917,376 UART: [state] CFI Enabled
2,927,716 UART: [fht] FMC Alias Private Key: 7
3,046,604 UART: [art] Extend RT PCRs Done
3,047,032 UART: [art] Lock RT PCRs Done
3,048,678 UART: [art] Populate DV Done
3,056,945 UART: [fht] FMC Alias Private Key: 7
3,057,943 UART: [art] Derive CDI
3,058,223 UART: [art] Store in slot 0x4
3,144,246 UART: [art] Derive Key Pair
3,144,606 UART: [art] Store priv key in slot 0x5
3,157,612 UART: [art] Derive Key Pair - Done
3,172,362 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,673 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,438 UART: [art] PUB.X = 6665EBB270BE340394180F89DB5E9BD7B944E3F2DBFE645209FCD6F8C05A88CE9A86176D7D901286B33307819EA97D5F
3,195,202 UART: [art] PUB.Y = 7304115EC7A3C0E7DA9C8CD6241F4A412E5C8A67ABF59B186C849CDD12CF9F038DA16EF40D8664C46C5B38E3AC065A78
3,202,154 UART: [art] SIG.R = D90148D212AA26C313D497C4498C3AB082084F625A09B81B60665186263EB6B10E94C55376C98FA6DD261C8279712D68
3,208,902 UART: [art] SIG.S = 6683C3890A6C629F70EAC44422792A13374A23E233791FF48F46E9E3A1A90A03D5418F0BAD32CC8D7100F32300D3A333
3,232,844 UART: Caliptra RT
3,233,095 UART: [state] CFI Enabled
3,352,570 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,186 UART:
3,354,202 UART: Running Caliptra ROM ...
3,354,610 UART:
3,354,665 UART: [state] CFI Enabled
3,357,603 UART: [state] LifecycleState = Unprovisioned
3,358,258 UART: [state] DebugLocked = No
3,358,976 UART: [state] WD Timer not started. Device not locked for debugging
3,360,284 UART: [kat] SHA2-256
4,165,934 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,170,059 UART: [kat] ++
4,170,211 UART: [kat] sha1
4,174,481 UART: [kat] SHA2-256
4,176,421 UART: [kat] SHA2-384
4,179,042 UART: [kat] SHA2-512-ACC
4,180,942 UART: [kat] ECC-384
4,190,993 UART: [kat] HMAC-384Kdf
4,195,467 UART: [kat] LMS
4,443,795 UART: [kat] --
4,444,945 UART: [update-reset] ++
4,535,522 >>> mbox cmd response: failed
4,535,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,535,900 UART: ROM Non-Fatal Error: 0x000B001F
4,536,694 UART: [state] Locking Datavault
4,537,548 UART: [state] Locking PCR0, PCR1 and PCR31
4,538,152 UART: [state] Locking ICCM
4,538,790 UART: [exit] Launching FMC @ 0x40000130
4,544,120 UART:
4,544,136 UART: Running Caliptra FMC ...
4,544,544 UART:
4,544,598 UART: [state] CFI Enabled
4,633,287 UART: [art] Extend RT PCRs Done
4,633,715 UART: [art] Lock RT PCRs Done
4,634,932 UART: [art] Populate DV Done
4,642,981 UART: [fht] FMC Alias Private Key: 7
4,644,063 UART: [art] Derive CDI
4,644,343 UART: [art] Store in slot 0x4
4,730,176 UART: [art] Derive Key Pair
4,730,536 UART: [art] Store priv key in slot 0x5
4,743,894 UART: [art] Derive Key Pair - Done
4,758,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,774,463 UART: [art] Erasing AUTHORITY.KEYID = 7
4,775,228 UART: [art] PUB.X = 6665EBB270BE340394180F89DB5E9BD7B944E3F2DBFE645209FCD6F8C05A88CE9A86176D7D901286B33307819EA97D5F
4,781,992 UART: [art] PUB.Y = 7304115EC7A3C0E7DA9C8CD6241F4A412E5C8A67ABF59B186C849CDD12CF9F038DA16EF40D8664C46C5B38E3AC065A78
4,788,944 UART: [art] SIG.R = D90148D212AA26C313D497C4498C3AB082084F625A09B81B60665186263EB6B10E94C55376C98FA6DD261C8279712D68
4,795,692 UART: [art] SIG.S = 6683C3890A6C629F70EAC44422792A13374A23E233791FF48F46E9E3A1A90A03D5418F0BAD32CC8D7100F32300D3A333
4,819,294 UART: Caliptra RT
4,819,545 UART: [state] CFI Enabled
5,186,253 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,187,890 UART:
5,187,906 UART: Running Caliptra ROM ...
5,188,314 UART:
5,188,369 UART: [state] CFI Enabled
5,190,511 UART: [state] LifecycleState = Unprovisioned
5,191,166 UART: [state] DebugLocked = No
5,191,754 UART: [state] WD Timer not started. Device not locked for debugging
5,193,056 UART: [kat] SHA2-256
5,998,706 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,002,831 UART: [kat] ++
6,002,983 UART: [kat] sha1
6,007,213 UART: [kat] SHA2-256
6,009,153 UART: [kat] SHA2-384
6,011,846 UART: [kat] SHA2-512-ACC
6,013,746 UART: [kat] ECC-384
6,023,117 UART: [kat] HMAC-384Kdf
6,027,717 UART: [kat] LMS
6,276,045 UART: [kat] --
6,277,087 UART: [update-reset] ++
7,635,757 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,636,820 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,792,035 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,112 >>> mbox cmd response: success
2,679,112 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,740,519 UART:
2,740,535 UART: Running Caliptra FMC ...
2,740,943 UART:
2,740,997 UART: [state] CFI Enabled
2,751,595 UART: [fht] FMC Alias Private Key: 7
2,871,135 UART: [art] Extend RT PCRs Done
2,871,563 UART: [art] Lock RT PCRs Done
2,872,901 UART: [art] Populate DV Done
2,880,856 UART: [fht] FMC Alias Private Key: 7
2,881,876 UART: [art] Derive CDI
2,882,156 UART: [art] Store in slot 0x4
2,968,127 UART: [art] Derive Key Pair
2,968,487 UART: [art] Store priv key in slot 0x5
2,981,611 UART: [art] Derive Key Pair - Done
2,996,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,639 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,404 UART: [art] PUB.X = 9CA86D593998EEE5C0EB95F94136A90872573832838ED62D5269AD29B6461A377C53C16E71D55B224A03B3997346BC5A
3,019,162 UART: [art] PUB.Y = 259D32AC9A295BD7EDF541592998C226E0052DD3565F8AED7DEE04AF5B2DAB9F418FEB2106E4A03752258720E1D6C336
3,026,111 UART: [art] SIG.R = 1AD31A749909BD30390B521284401CB3F3B0F86544538447BBA235901BFB8CC4D3D4F1F0903BDFACD97275A49CAD9C62
3,032,881 UART: [art] SIG.S = 24BF1E4E45DACA425BBA61362F69950617BADD2E29C96D3D27B340D645887E1CBD2F24BD80A53779EC02E7A891B722BA
3,056,971 UART: Caliptra RT
3,057,222 UART: [state] CFI Enabled
3,176,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,243,076 >>> mbox cmd response: failed
4,243,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,248,768 UART:
4,248,784 UART: Running Caliptra FMC ...
4,249,192 UART:
4,249,246 UART: [state] CFI Enabled
4,338,121 UART: [art] Extend RT PCRs Done
4,338,549 UART: [art] Lock RT PCRs Done
4,339,784 UART: [art] Populate DV Done
4,348,121 UART: [fht] FMC Alias Private Key: 7
4,349,245 UART: [art] Derive CDI
4,349,525 UART: [art] Store in slot 0x4
4,435,530 UART: [art] Derive Key Pair
4,435,890 UART: [art] Store priv key in slot 0x5
4,449,522 UART: [art] Derive Key Pair - Done
4,464,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,479,962 UART: [art] Erasing AUTHORITY.KEYID = 7
4,480,727 UART: [art] PUB.X = 9CA86D593998EEE5C0EB95F94136A90872573832838ED62D5269AD29B6461A377C53C16E71D55B224A03B3997346BC5A
4,487,485 UART: [art] PUB.Y = 259D32AC9A295BD7EDF541592998C226E0052DD3565F8AED7DEE04AF5B2DAB9F418FEB2106E4A03752258720E1D6C336
4,494,434 UART: [art] SIG.R = 1AD31A749909BD30390B521284401CB3F3B0F86544538447BBA235901BFB8CC4D3D4F1F0903BDFACD97275A49CAD9C62
4,501,204 UART: [art] SIG.S = 24BF1E4E45DACA425BBA61362F69950617BADD2E29C96D3D27B340D645887E1CBD2F24BD80A53779EC02E7A891B722BA
4,525,084 UART: Caliptra RT
4,525,335 UART: [state] CFI Enabled
4,889,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,379,521 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,564 UART: [state] WD Timer not started. Device not locked for debugging
87,897 UART: [kat] SHA2-256
893,547 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,672 UART: [kat] ++
897,824 UART: [kat] sha1
901,938 UART: [kat] SHA2-256
903,878 UART: [kat] SHA2-384
906,557 UART: [kat] SHA2-512-ACC
908,458 UART: [kat] ECC-384
918,143 UART: [kat] HMAC-384Kdf
922,853 UART: [kat] LMS
1,171,181 UART: [kat] --
1,171,918 UART: [cold-reset] ++
1,172,392 UART: [fht] FHT @ 0x50003400
1,174,939 UART: [idev] ++
1,175,107 UART: [idev] CDI.KEYID = 6
1,175,467 UART: [idev] SUBJECT.KEYID = 7
1,175,891 UART: [idev] UDS.KEYID = 0
1,176,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,463 UART: [idev] Erasing UDS.KEYID = 0
1,200,596 UART: [idev] Sha1 KeyId Algorithm
1,209,092 UART: [idev] --
1,210,264 UART: [ldev] ++
1,210,432 UART: [ldev] CDI.KEYID = 6
1,210,795 UART: [ldev] SUBJECT.KEYID = 5
1,211,221 UART: [ldev] AUTHORITY.KEYID = 7
1,211,684 UART: [ldev] FE.KEYID = 1
1,217,012 UART: [ldev] Erasing FE.KEYID = 1
1,243,717 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,098 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,989 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,701 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,794 UART: [ldev] --
1,283,247 UART: [fwproc] Wait for Commands...
1,284,045 UART: [fwproc] Recv command 0x46574c44
1,284,773 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,225 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,395 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,784 >>> mbox cmd response: success
2,826,784 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,827,962 UART: [afmc] ++
2,828,130 UART: [afmc] CDI.KEYID = 6
2,828,492 UART: [afmc] SUBJECT.KEYID = 7
2,828,917 UART: [afmc] AUTHORITY.KEYID = 5
2,864,770 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,155 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,495 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,196 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,908 UART: [afmc] --
2,907,890 UART: [cold-reset] --
2,908,742 UART: [state] Locking Datavault
2,909,779 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,383 UART: [state] Locking ICCM
2,910,975 UART: [exit] Launching FMC @ 0x40000130
2,916,305 UART:
2,916,321 UART: Running Caliptra FMC ...
2,916,729 UART:
2,916,872 UART: [state] CFI Enabled
2,927,326 UART: [fht] FMC Alias Private Key: 7
3,045,990 UART: [art] Extend RT PCRs Done
3,046,418 UART: [art] Lock RT PCRs Done
3,048,068 UART: [art] Populate DV Done
3,056,293 UART: [fht] FMC Alias Private Key: 7
3,057,405 UART: [art] Derive CDI
3,057,685 UART: [art] Store in slot 0x4
3,143,406 UART: [art] Derive Key Pair
3,143,766 UART: [art] Store priv key in slot 0x5
3,157,800 UART: [art] Derive Key Pair - Done
3,172,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,631 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,396 UART: [art] PUB.X = 71C9F30419780FABFFC0C39416BC863100D08AC52296B2E88CED88CBA1E07E283CEC5008283391211829D95F112ECC9B
3,196,139 UART: [art] PUB.Y = 6FFF87B6BA545C792B39B4F7FB0623A8721BCB783BF4234FAC8084FED675B8FA2DAF305BB5A329C17052EF46A22C64A2
3,203,102 UART: [art] SIG.R = CF2A3CD75C8057059FED12F3C7D74F5090CF1E86E4FEDCBEBC6761587F6FC647708730C1AF6EE18347068E1D33205EA4
3,209,878 UART: [art] SIG.S = 541173F8545CC9A09BE17EB710E0694BA2EAC3C0CCD91F2DEF1A10497C893C6EEC785E2F9771B4DAF835F5F66FCFB8F6
3,233,872 UART: Caliptra RT
3,234,215 UART: [state] CFI Enabled
3,354,680 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,594 UART:
3,356,610 UART: Running Caliptra ROM ...
3,357,018 UART:
3,357,160 UART: [state] CFI Enabled
3,359,828 UART: [state] LifecycleState = Unprovisioned
3,360,483 UART: [state] DebugLocked = No
3,361,219 UART: [state] WD Timer not started. Device not locked for debugging
3,362,465 UART: [kat] SHA2-256
4,168,115 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,172,240 UART: [kat] ++
4,172,392 UART: [kat] sha1
4,176,854 UART: [kat] SHA2-256
4,178,794 UART: [kat] SHA2-384
4,181,453 UART: [kat] SHA2-512-ACC
4,183,353 UART: [kat] ECC-384
4,193,248 UART: [kat] HMAC-384Kdf
4,198,038 UART: [kat] LMS
4,446,366 UART: [kat] --
4,447,226 UART: [update-reset] ++
4,536,731 >>> mbox cmd response: failed
4,536,731 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,537,209 UART: ROM Non-Fatal Error: 0x000B001F
4,538,131 UART: [state] Locking Datavault
4,538,965 UART: [state] Locking PCR0, PCR1 and PCR31
4,539,569 UART: [state] Locking ICCM
4,540,099 UART: [exit] Launching FMC @ 0x40000130
4,545,429 UART:
4,545,445 UART: Running Caliptra FMC ...
4,545,853 UART:
4,545,996 UART: [state] CFI Enabled
4,635,695 UART: [art] Extend RT PCRs Done
4,636,123 UART: [art] Lock RT PCRs Done
4,637,388 UART: [art] Populate DV Done
4,645,463 UART: [fht] FMC Alias Private Key: 7
4,646,487 UART: [art] Derive CDI
4,646,767 UART: [art] Store in slot 0x4
4,732,542 UART: [art] Derive Key Pair
4,732,902 UART: [art] Store priv key in slot 0x5
4,746,434 UART: [art] Derive Key Pair - Done
4,761,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,776,929 UART: [art] Erasing AUTHORITY.KEYID = 7
4,777,694 UART: [art] PUB.X = 71C9F30419780FABFFC0C39416BC863100D08AC52296B2E88CED88CBA1E07E283CEC5008283391211829D95F112ECC9B
4,784,437 UART: [art] PUB.Y = 6FFF87B6BA545C792B39B4F7FB0623A8721BCB783BF4234FAC8084FED675B8FA2DAF305BB5A329C17052EF46A22C64A2
4,791,400 UART: [art] SIG.R = CF2A3CD75C8057059FED12F3C7D74F5090CF1E86E4FEDCBEBC6761587F6FC647708730C1AF6EE18347068E1D33205EA4
4,798,176 UART: [art] SIG.S = 541173F8545CC9A09BE17EB710E0694BA2EAC3C0CCD91F2DEF1A10497C893C6EEC785E2F9771B4DAF835F5F66FCFB8F6
4,821,612 UART: Caliptra RT
4,821,955 UART: [state] CFI Enabled
5,183,425 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,185,106 UART:
5,185,122 UART: Running Caliptra ROM ...
5,185,530 UART:
5,185,672 UART: [state] CFI Enabled
5,188,282 UART: [state] LifecycleState = Unprovisioned
5,188,937 UART: [state] DebugLocked = No
5,189,463 UART: [state] WD Timer not started. Device not locked for debugging
5,190,721 UART: [kat] SHA2-256
5,996,371 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,000,496 UART: [kat] ++
6,000,648 UART: [kat] sha1
6,004,762 UART: [kat] SHA2-256
6,006,702 UART: [kat] SHA2-384
6,009,479 UART: [kat] SHA2-512-ACC
6,011,379 UART: [kat] ECC-384
6,020,918 UART: [kat] HMAC-384Kdf
6,025,578 UART: [kat] LMS
6,273,906 UART: [kat] --
6,274,796 UART: [update-reset] ++
7,633,330 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,634,399 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,789,614 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,631 >>> mbox cmd response: success
2,680,631 <<< Executing mbox cmd 0x46574c44 (102604 bytes) from SoC
2,743,564 UART:
2,743,580 UART: Running Caliptra FMC ...
2,743,988 UART:
2,744,131 UART: [state] CFI Enabled
2,754,775 UART: [fht] FMC Alias Private Key: 7
2,874,179 UART: [art] Extend RT PCRs Done
2,874,607 UART: [art] Lock RT PCRs Done
2,875,901 UART: [art] Populate DV Done
2,883,982 UART: [fht] FMC Alias Private Key: 7
2,885,146 UART: [art] Derive CDI
2,885,426 UART: [art] Store in slot 0x4
2,971,499 UART: [art] Derive Key Pair
2,971,859 UART: [art] Store priv key in slot 0x5
2,985,733 UART: [art] Derive Key Pair - Done
3,000,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,589 UART: [art] PUB.X = 6226093099EEEB66460B732BA53B605A7D76324309A119AAA5FDF81A86EDC94146B9A3CBC0DAC26049FAA249509779C6
3,023,354 UART: [art] PUB.Y = 124041B5573FD01DD4D7C15844B1BBCF87F95C135F73833D71B62D11E176252B8822C7D04ECA1A6BA2ED58129FA6D0EE
3,030,312 UART: [art] SIG.R = 0328D4D112D5043FF776E9E2ECBA3F16BBB823F7B422684AFBA95595834FA8F913141CE68FF42689F39E1355AA7A1FC1
3,037,084 UART: [art] SIG.S = BD432615ADD73703BD0C972D834AAE3CAC718ED5E552C69DE94F9441434DB34F4EE215CA9A4DAA99B59040618D62FB94
3,061,228 UART: Caliptra RT
3,061,571 UART: [state] CFI Enabled
3,181,304 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,249,963 >>> mbox cmd response: failed
4,249,963 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,255,727 UART:
4,255,743 UART: Running Caliptra FMC ...
4,256,151 UART:
4,256,294 UART: [state] CFI Enabled
4,345,055 UART: [art] Extend RT PCRs Done
4,345,483 UART: [art] Lock RT PCRs Done
4,346,786 UART: [art] Populate DV Done
4,355,049 UART: [fht] FMC Alias Private Key: 7
4,356,045 UART: [art] Derive CDI
4,356,325 UART: [art] Store in slot 0x4
4,442,124 UART: [art] Derive Key Pair
4,442,484 UART: [art] Store priv key in slot 0x5
4,455,514 UART: [art] Derive Key Pair - Done
4,470,584 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,486,259 UART: [art] Erasing AUTHORITY.KEYID = 7
4,487,024 UART: [art] PUB.X = 6226093099EEEB66460B732BA53B605A7D76324309A119AAA5FDF81A86EDC94146B9A3CBC0DAC26049FAA249509779C6
4,493,789 UART: [art] PUB.Y = 124041B5573FD01DD4D7C15844B1BBCF87F95C135F73833D71B62D11E176252B8822C7D04ECA1A6BA2ED58129FA6D0EE
4,500,747 UART: [art] SIG.R = 0328D4D112D5043FF776E9E2ECBA3F16BBB823F7B422684AFBA95595834FA8F913141CE68FF42689F39E1355AA7A1FC1
4,507,519 UART: [art] SIG.S = BD432615ADD73703BD0C972D834AAE3CAC718ED5E552C69DE94F9441434DB34F4EE215CA9A4DAA99B59040618D62FB94
4,531,241 UART: Caliptra RT
4,531,584 UART: [state] CFI Enabled
4,895,168 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,387,616 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_fmc_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
192,215 UART:
192,581 UART: Running Caliptra ROM ...
193,677 UART:
193,822 UART: [state] CFI Enabled
259,727 UART: [state] LifecycleState = Unprovisioned
261,648 UART: [state] DebugLocked = No
263,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
267,747 UART: [kat] SHA2-256
437,432 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,927 UART: [kat] ++
448,377 UART: [kat] sha1
458,767 UART: [kat] SHA2-256
461,461 UART: [kat] SHA2-384
468,202 UART: [kat] SHA2-512-ACC
470,545 UART: [kat] ECC-384
2,764,686 UART: [kat] HMAC-384Kdf
2,795,804 UART: [kat] LMS
3,986,108 UART: [kat] --
3,990,389 UART: [cold-reset] ++
3,992,433 UART: [fht] Storing FHT @ 0x50003400
4,003,813 UART: [idev] ++
4,004,387 UART: [idev] CDI.KEYID = 6
4,005,355 UART: [idev] SUBJECT.KEYID = 7
4,006,576 UART: [idev] UDS.KEYID = 0
4,009,914 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,224 UART: [idev] Erasing UDS.KEYID = 0
7,340,077 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,787 UART: [idev] --
7,367,149 UART: [ldev] ++
7,367,780 UART: [ldev] CDI.KEYID = 6
7,368,696 UART: [ldev] SUBJECT.KEYID = 5
7,369,918 UART: [ldev] AUTHORITY.KEYID = 7
7,371,178 UART: [ldev] FE.KEYID = 1
7,399,030 UART: [ldev] Erasing FE.KEYID = 1
10,734,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,265 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,777 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,959 UART: [ldev] --
13,115,226 UART: [fwproc] Waiting for Commands...
13,117,004 UART: [fwproc] Received command 0x46574c44
13,119,197 UART: [fwproc] Received Image of size 118548 bytes
17,227,139 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,297,021 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,370,207 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,699,240 >>> mbox cmd response: success
17,701,163 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,850,250 UART: [afmc] ++
17,850,895 UART: [afmc] CDI.KEYID = 6
17,851,792 UART: [afmc] SUBJECT.KEYID = 7
17,852,842 UART: [afmc] AUTHORITY.KEYID = 5
21,070,527 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,368,758 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,018 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,385,495 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,400,200 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,414,608 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,588 UART: [afmc] --
23,440,342 UART: [cold-reset] --
23,445,400 UART: [state] Locking Datavault
23,451,784 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,540 UART: [state] Locking ICCM
23,455,313 UART: [exit] Launching FMC @ 0x40000130
23,463,730 UART:
23,463,977 UART: Running Caliptra FMC ...
23,465,081 UART:
23,465,246 UART: [state] CFI Enabled
23,529,042 UART: [fht] FMC Alias Private Key: 7
25,870,140 UART: [art] Extend RT PCRs Done
25,871,358 UART: [art] Lock RT PCRs Done
25,872,617 UART: [art] Populate DV Done
25,878,025 UART: [fht] FMC Alias Private Key: 7
25,879,618 UART: [art] Derive CDI
25,880,439 UART: [art] Store in slot 0x4
25,937,673 UART: [art] Derive Key Pair
25,938,675 UART: [art] Store priv key in slot 0x5
29,231,599 UART: [art] Derive Key Pair - Done
29,244,485 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,533,011 UART: [art] Erasing AUTHORITY.KEYID = 7
31,534,536 UART: [art] PUB.X = 2A445880ADFAFEABB5E09F8EB3F746C91B1050FD9B43D52DD301B515A376E9A2337FBB8E5FA5960318894B9F7038361E
31,541,777 UART: [art] PUB.Y = 7BB2E97D5D740372F94A595E55483384221B63224B5874698F59DE3F6F82D8C3B98ACC159DD14856A1CC26086FFD82B3
31,549,004 UART: [art] SIG.R = C732A9398EAA19C2982B877F48D01CBA5E0F5D28CC00A97CBAD59DAD6622F9EED09D4FDF429A48A1E1DCFC9755A34FA1
31,556,486 UART: [art] SIG.S = 4D2F68B60687931E3CB8ADABE4DE8CDFD274EC48F04937624C7C15BC9357D7205908FE57EFA8B6F86F777E7C03641BCB
32,862,025 UART: Caliptra RT
32,862,748 UART: [state] CFI Enabled
33,059,218 UART: [rt] RT listening for mailbox commands...
33,062,228 UART:
33,062,487 UART: Running Caliptra ROM ...
33,063,520 UART:
33,063,677 UART: [state] CFI Enabled
33,130,412 UART: [state] LifecycleState = Unprovisioned
33,132,371 UART: [state] DebugLocked = No
33,135,360 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,139,618 UART: [kat] SHA2-256
33,309,269 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,319,783 UART: [kat] ++
33,320,331 UART: [kat] sha1
33,332,955 UART: [kat] SHA2-256
33,335,643 UART: [kat] SHA2-384
33,341,088 UART: [kat] SHA2-512-ACC
33,343,449 UART: [kat] ECC-384
35,635,275 UART: [kat] HMAC-384Kdf
35,666,780 UART: [kat] LMS
36,857,164 UART: [kat] --
36,861,228 UART: [update-reset] ++
36,962,154 >>> mbox cmd response: failed
36,964,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,113,645 UART: ROM Non-Fatal Error: 0x000B001D
37,115,078 UART: [state] Locking Datavault
37,116,161 UART: [state] Locking PCR0, PCR1 and PCR31
37,117,696 UART: [state] Locking ICCM
37,118,599 UART: [exit] Launching FMC @ 0x40000130
37,119,941 UART:
37,120,088 UART: Running Caliptra FMC ...
37,121,195 UART:
37,121,347 UART: [state] CFI Enabled
37,122,180 UART: [art] Extend RT PCRs Done
37,123,229 UART: [art] Lock RT PCRs Done
37,124,206 UART: [art] Populate DV Done
37,125,238 UART: [fht] FMC Alias Private Key: 7
37,126,480 UART: [art] Derive CDI
37,127,205 UART: [art] Store in slot 0x4
37,156,526 UART: [art] Derive Key Pair
37,157,569 UART: [art] Store priv key in slot 0x5
40,450,356 UART: [art] Derive Key Pair - Done
40,463,472 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,752,790 UART: [art] Erasing AUTHORITY.KEYID = 7
42,754,362 UART: [art] PUB.X = 2A445880ADFAFEABB5E09F8EB3F746C91B1050FD9B43D52DD301B515A376E9A2337FBB8E5FA5960318894B9F7038361E
42,761,552 UART: [art] PUB.Y = 7BB2E97D5D740372F94A595E55483384221B63224B5874698F59DE3F6F82D8C3B98ACC159DD14856A1CC26086FFD82B3
42,768,834 UART: [art] SIG.R = C732A9398EAA19C2982B877F48D01CBA5E0F5D28CC00A97CBAD59DAD6622F9EED09D4FDF429A48A1E1DCFC9755A34FA1
42,776,223 UART: [art] SIG.S = 4D2F68B60687931E3CB8ADABE4DE8CDFD274EC48F04937624C7C15BC9357D7205908FE57EFA8B6F86F777E7C03641BCB
44,081,083 UART: Caliptra RT
44,081,804 UART: [state] CFI Enabled
44,499,047 UART: [rt] RT listening for mailbox commands...
44,501,633 UART:
44,501,831 UART: Running Caliptra ROM ...
44,502,943 UART:
44,503,104 UART: [state] CFI Enabled
44,567,912 UART: [state] LifecycleState = Unprovisioned
44,569,838 UART: [state] DebugLocked = No
44,571,715 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,577,269 UART: [kat] SHA2-256
44,747,000 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,757,503 UART: [kat] ++
44,757,989 UART: [kat] sha1
44,770,012 UART: [kat] SHA2-256
44,772,717 UART: [kat] SHA2-384
44,779,517 UART: [kat] SHA2-512-ACC
44,781,866 UART: [kat] ECC-384
47,068,215 UART: [kat] HMAC-384Kdf
47,081,687 UART: [kat] LMS
48,272,058 UART: [kat] --
48,276,613 UART: [update-reset] ++
52,467,251 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,470,211 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,867,933 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,785,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,942,960 >>> mbox cmd response: success
17,945,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,630,324 UART:
23,630,746 UART: Running Caliptra FMC ...
23,631,854 UART:
23,632,017 UART: [state] CFI Enabled
23,701,611 UART: [fht] FMC Alias Private Key: 7
26,063,478 UART: [art] Extend RT PCRs Done
26,064,716 UART: [art] Lock RT PCRs Done
26,066,106 UART: [art] Populate DV Done
26,071,471 UART: [fht] FMC Alias Private Key: 7
26,073,175 UART: [art] Derive CDI
26,074,009 UART: [art] Store in slot 0x4
26,131,903 UART: [art] Derive Key Pair
26,132,908 UART: [art] Store priv key in slot 0x5
29,425,330 UART: [art] Derive Key Pair - Done
29,438,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,728,054 UART: [art] Erasing AUTHORITY.KEYID = 7
31,729,566 UART: [art] PUB.X = 31BD4E90DB954D58204D4CCB410C943CAC54ECE5978961B6EFEFC9DA6713DDB7B73F06FD7F508431F19002E7B2A783F4
31,736,818 UART: [art] PUB.Y = 50B37867005CCA31B7EFF82A25A2CE804B0A824990B5783C33AAE90E0B75E0F077F333BA21B3C61EC09DC6DA3BD8B3D6
31,744,078 UART: [art] SIG.R = 4A6EA3354C5CFB6F7E603C58F5AB098AF59A08488F96EE45A0B2BF3432B06FB6D94FB03484818D8DAACAD4FEBD8F6437
31,751,512 UART: [art] SIG.S = D2CB20DB7BCFFF1521F429D6683BF85B82C5C0E774C070B6F14B8A53B90D30C4EC13982B63CCC10DD4DB3C26F23031FF
33,056,337 UART: Caliptra RT
33,057,074 UART: [state] CFI Enabled
33,233,738 UART: [rt] RT listening for mailbox commands...
36,952,286 >>> mbox cmd response: failed
36,954,165 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,103,187 UART:
37,103,597 UART: Running Caliptra FMC ...
37,104,672 UART:
37,104,828 UART: [state] CFI Enabled
37,105,686 UART: [art] Extend RT PCRs Done
37,106,831 UART: [art] Lock RT PCRs Done
37,108,065 UART: [art] Populate DV Done
37,109,049 UART: [fht] FMC Alias Private Key: 7
37,110,461 UART: [art] Derive CDI
37,111,204 UART: [art] Store in slot 0x4
37,140,004 UART: [art] Derive Key Pair
37,141,007 UART: [art] Store priv key in slot 0x5
40,433,931 UART: [art] Derive Key Pair - Done
40,447,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,735,768 UART: [art] Erasing AUTHORITY.KEYID = 7
42,737,279 UART: [art] PUB.X = 31BD4E90DB954D58204D4CCB410C943CAC54ECE5978961B6EFEFC9DA6713DDB7B73F06FD7F508431F19002E7B2A783F4
42,744,578 UART: [art] PUB.Y = 50B37867005CCA31B7EFF82A25A2CE804B0A824990B5783C33AAE90E0B75E0F077F333BA21B3C61EC09DC6DA3BD8B3D6
42,751,856 UART: [art] SIG.R = 4A6EA3354C5CFB6F7E603C58F5AB098AF59A08488F96EE45A0B2BF3432B06FB6D94FB03484818D8DAACAD4FEBD8F6437
42,759,244 UART: [art] SIG.S = D2CB20DB7BCFFF1521F429D6683BF85B82C5C0E774C070B6F14B8A53B90D30C4EC13982B63CCC10DD4DB3C26F23031FF
44,064,050 UART: Caliptra RT
44,064,773 UART: [state] CFI Enabled
44,484,724 UART: [rt] RT listening for mailbox commands...
53,138,207 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.98s
running 1 test
0 new_unbooted
42 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,444 UART:
192,813 UART: Running Caliptra ROM ...
194,001 UART:
603,661 UART: [state] CFI Enabled
618,481 UART: [state] LifecycleState = Unprovisioned
620,409 UART: [state] DebugLocked = No
623,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,831 UART: [kat] SHA2-256
798,613 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,140 UART: [kat] ++
809,594 UART: [kat] sha1
820,854 UART: [kat] SHA2-256
823,598 UART: [kat] SHA2-384
829,901 UART: [kat] SHA2-512-ACC
832,268 UART: [kat] ECC-384
3,116,650 UART: [kat] HMAC-384Kdf
3,129,420 UART: [kat] LMS
4,319,569 UART: [kat] --
4,322,932 UART: [cold-reset] ++
4,325,520 UART: [fht] Storing FHT @ 0x50003400
4,336,685 UART: [idev] ++
4,337,267 UART: [idev] CDI.KEYID = 6
4,338,241 UART: [idev] SUBJECT.KEYID = 7
4,339,460 UART: [idev] UDS.KEYID = 0
4,342,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,916 UART: [idev] Erasing UDS.KEYID = 0
7,629,191 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,097 UART: [idev] --
7,653,676 UART: [ldev] ++
7,654,306 UART: [ldev] CDI.KEYID = 6
7,655,244 UART: [ldev] SUBJECT.KEYID = 5
7,656,464 UART: [ldev] AUTHORITY.KEYID = 7
7,657,700 UART: [ldev] FE.KEYID = 1
7,669,771 UART: [ldev] Erasing FE.KEYID = 1
10,960,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,251,157 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,265,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,280,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,295,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,066 UART: [ldev] --
13,319,016 UART: [fwproc] Waiting for Commands...
13,321,177 UART: [fwproc] Received command 0x46574c44
13,323,375 UART: [fwproc] Received Image of size 118548 bytes
17,421,163 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,498,538 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,571,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,900,929 >>> mbox cmd response: success
17,902,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,051,649 UART: [afmc] ++
18,052,287 UART: [afmc] CDI.KEYID = 6
18,053,214 UART: [afmc] SUBJECT.KEYID = 7
18,054,331 UART: [afmc] AUTHORITY.KEYID = 5
21,222,638 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,515,231 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,517,511 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,531,932 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,546,663 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,561,068 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,583,615 UART: [afmc] --
23,587,389 UART: [cold-reset] --
23,591,675 UART: [state] Locking Datavault
23,596,345 UART: [state] Locking PCR0, PCR1 and PCR31
23,598,123 UART: [state] Locking ICCM
23,600,872 UART: [exit] Launching FMC @ 0x40000130
23,609,226 UART:
23,609,468 UART: Running Caliptra FMC ...
23,610,577 UART:
23,610,746 UART: [state] CFI Enabled
23,618,812 UART: [fht] FMC Alias Private Key: 7
25,958,485 UART: [art] Extend RT PCRs Done
25,959,717 UART: [art] Lock RT PCRs Done
25,960,927 UART: [art] Populate DV Done
25,966,407 UART: [fht] FMC Alias Private Key: 7
25,968,000 UART: [art] Derive CDI
25,968,825 UART: [art] Store in slot 0x4
26,011,222 UART: [art] Derive Key Pair
26,012,270 UART: [art] Store priv key in slot 0x5
29,253,814 UART: [art] Derive Key Pair - Done
29,266,683 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,546,789 UART: [art] Erasing AUTHORITY.KEYID = 7
31,548,301 UART: [art] PUB.X = 6E33082C3DB2E3C6781E68BE2BB281E65E1B036AEE0B97A095C4D782BAC85DFC276A9220C71662AE913E25FF9BA3E12A
31,555,607 UART: [art] PUB.Y = 73E2282A08CAFC0EF3DB1DA3A288972357938C08E1110FD5B6CC35345F48FFAD01079C1363545B0974A3D706DEB03E7D
31,562,884 UART: [art] SIG.R = D0FD4918D9985E03B1F719F7DCA05EFA64F955137387B8A6029DE3FBDB674D377E01B0BFA5C77607A9FE796F33716A39
31,570,266 UART: [art] SIG.S = DB090FCC9CCBD6975FB18F93A96BF80B3F045546332DA7C815975C074FFB18836DF1DC3EFCD341CD670FA062BD1A62A2
32,875,210 UART: Caliptra RT
32,875,922 UART: [state] CFI Enabled
33,009,243 UART: [rt] RT listening for mailbox commands...
33,012,149 UART:
33,012,409 UART: Running Caliptra ROM ...
33,013,523 UART:
33,013,744 UART: [state] CFI Enabled
33,028,228 UART: [state] LifecycleState = Unprovisioned
33,030,164 UART: [state] DebugLocked = No
33,032,530 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,037,621 UART: [kat] SHA2-256
33,207,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,217,889 UART: [kat] ++
33,218,432 UART: [kat] sha1
33,229,601 UART: [kat] SHA2-256
33,232,353 UART: [kat] SHA2-384
33,237,855 UART: [kat] SHA2-512-ACC
33,240,208 UART: [kat] ECC-384
35,524,187 UART: [kat] HMAC-384Kdf
35,535,873 UART: [kat] LMS
36,725,951 UART: [kat] --
36,731,857 UART: [update-reset] ++
36,835,160 >>> mbox cmd response: failed
36,837,198 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,986,098 UART: ROM Non-Fatal Error: 0x000B001D
36,987,547 UART: [state] Locking Datavault
36,988,642 UART: [state] Locking PCR0, PCR1 and PCR31
36,990,196 UART: [state] Locking ICCM
36,991,110 UART: [exit] Launching FMC @ 0x40000130
36,992,542 UART:
36,992,703 UART: Running Caliptra FMC ...
36,993,809 UART:
36,993,973 UART: [state] CFI Enabled
36,994,896 UART: [art] Extend RT PCRs Done
36,996,039 UART: [art] Lock RT PCRs Done
36,997,114 UART: [art] Populate DV Done
36,998,151 UART: [fht] FMC Alias Private Key: 7
36,999,472 UART: [art] Derive CDI
37,000,216 UART: [art] Store in slot 0x4
37,001,288 UART: [art] Derive Key Pair
37,002,294 UART: [art] Store priv key in slot 0x5
40,199,245 UART: [art] Derive Key Pair - Done
40,212,116 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,492,437 UART: [art] Erasing AUTHORITY.KEYID = 7
42,494,086 UART: [art] PUB.X = 6E33082C3DB2E3C6781E68BE2BB281E65E1B036AEE0B97A095C4D782BAC85DFC276A9220C71662AE913E25FF9BA3E12A
42,501,292 UART: [art] PUB.Y = 73E2282A08CAFC0EF3DB1DA3A288972357938C08E1110FD5B6CC35345F48FFAD01079C1363545B0974A3D706DEB03E7D
42,508,527 UART: [art] SIG.R = D0FD4918D9985E03B1F719F7DCA05EFA64F955137387B8A6029DE3FBDB674D377E01B0BFA5C77607A9FE796F33716A39
42,515,918 UART: [art] SIG.S = DB090FCC9CCBD6975FB18F93A96BF80B3F045546332DA7C815975C074FFB18836DF1DC3EFCD341CD670FA062BD1A62A2
43,821,166 UART: Caliptra RT
43,821,913 UART: [state] CFI Enabled
44,195,033 UART: [rt] RT listening for mailbox commands...
44,197,683 UART:
44,197,942 UART: Running Caliptra ROM ...
44,199,059 UART:
44,199,333 UART: [state] CFI Enabled
44,216,626 UART: [state] LifecycleState = Unprovisioned
44,218,523 UART: [state] DebugLocked = No
44,219,801 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,224,613 UART: [kat] SHA2-256
44,394,344 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,404,866 UART: [kat] ++
44,405,409 UART: [kat] sha1
44,415,767 UART: [kat] SHA2-256
44,418,513 UART: [kat] SHA2-384
44,424,558 UART: [kat] SHA2-512-ACC
44,426,963 UART: [kat] ECC-384
46,711,058 UART: [kat] HMAC-384Kdf
46,723,088 UART: [kat] LMS
47,913,125 UART: [kat] --
47,918,795 UART: [update-reset] ++
52,115,214 UART: [update-reset] Image verified using Vendor ECC Key Index 0
52,118,730 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,516,477 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.95s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,387 writing to cptra_bootfsm_go
4,130,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,159,261 >>> mbox cmd response: success
18,161,455 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,796,280 UART:
23,796,767 UART: Running Caliptra FMC ...
23,797,883 UART:
23,798,057 UART: [state] CFI Enabled
23,805,909 UART: [fht] FMC Alias Private Key: 7
26,145,879 UART: [art] Extend RT PCRs Done
26,147,105 UART: [art] Lock RT PCRs Done
26,148,529 UART: [art] Populate DV Done
26,154,160 UART: [fht] FMC Alias Private Key: 7
26,155,709 UART: [art] Derive CDI
26,156,535 UART: [art] Store in slot 0x4
26,198,922 UART: [art] Derive Key Pair
26,199,923 UART: [art] Store priv key in slot 0x5
29,441,826 UART: [art] Derive Key Pair - Done
29,454,930 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,734,849 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,375 UART: [art] PUB.X = 2AF52AF94B08C5580F49A26F191E035362CF88E64D163762460A5C350CB46144E836F40904530D20F3A2941FA651E8F4
31,743,635 UART: [art] PUB.Y = 9163E2AE7909AD6EADEB4A4BCD821DF7979381E3D446F6DC76DD47DDC0541BF5EEB7BA5F6F37C6A57FD306E5C461B34C
31,750,896 UART: [art] SIG.R = D75F04990F14CB1EDD079A95CE0711FAB4DEA402837D6BFD2F3D44ADA00C4D556E9CDE284284F21D3AAF2E4975F0EBDC
31,758,303 UART: [art] SIG.S = 64460EDACA53E65C4D7186F8236F5E1A63CD6887770EFFD2FE001A0EDED8C113AAFA3F9ECF6D340BEA4AD7725C3AB056
33,063,524 UART: Caliptra RT
33,064,250 UART: [state] CFI Enabled
33,198,294 UART: [rt] RT listening for mailbox commands...
36,837,605 >>> mbox cmd response: failed
36,839,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,988,818 UART:
36,989,160 UART: Running Caliptra FMC ...
36,990,299 UART:
36,990,471 UART: [state] CFI Enabled
36,991,422 UART: [art] Extend RT PCRs Done
36,992,573 UART: [art] Lock RT PCRs Done
36,993,649 UART: [art] Populate DV Done
36,994,686 UART: [fht] FMC Alias Private Key: 7
36,996,082 UART: [art] Derive CDI
36,996,831 UART: [art] Store in slot 0x4
36,997,900 UART: [art] Derive Key Pair
36,998,853 UART: [art] Store priv key in slot 0x5
40,192,601 UART: [art] Derive Key Pair - Done
40,205,987 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,486,375 UART: [art] Erasing AUTHORITY.KEYID = 7
42,487,892 UART: [art] PUB.X = 2AF52AF94B08C5580F49A26F191E035362CF88E64D163762460A5C350CB46144E836F40904530D20F3A2941FA651E8F4
42,495,087 UART: [art] PUB.Y = 9163E2AE7909AD6EADEB4A4BCD821DF7979381E3D446F6DC76DD47DDC0541BF5EEB7BA5F6F37C6A57FD306E5C461B34C
42,502,385 UART: [art] SIG.R = D75F04990F14CB1EDD079A95CE0711FAB4DEA402837D6BFD2F3D44ADA00C4D556E9CDE284284F21D3AAF2E4975F0EBDC
42,509,836 UART: [art] SIG.S = 64460EDACA53E65C4D7186F8236F5E1A63CD6887770EFFD2FE001A0EDED8C113AAFA3F9ECF6D340BEA4AD7725C3AB056
43,815,691 UART: Caliptra RT
43,816,444 UART: [state] CFI Enabled
44,191,614 UART: [rt] RT listening for mailbox commands...
52,797,104 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,125 writing to cptra_bootfsm_go
192,230 UART:
192,592 UART: Running Caliptra ROM ...
193,770 UART:
193,931 UART: [state] CFI Enabled
256,831 UART: [state] LifecycleState = Unprovisioned
258,760 UART: [state] DebugLocked = No
261,066 UART: [state] WD Timer not started. Device not locked for debugging
264,634 UART: [kat] SHA2-256
444,274 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
455,015 UART: [kat] ++
455,638 UART: [kat] sha1
466,748 UART: [kat] SHA2-256
469,459 UART: [kat] SHA2-384
475,333 UART: [kat] SHA2-512-ACC
477,734 UART: [kat] ECC-384
2,924,463 UART: [kat] HMAC-384Kdf
2,944,743 UART: [kat] LMS
3,421,236 UART: [kat] --
3,425,796 UART: [cold-reset] ++
3,427,149 UART: [fht] FHT @ 0x50003400
3,438,402 UART: [idev] ++
3,439,148 UART: [idev] CDI.KEYID = 6
3,440,144 UART: [idev] SUBJECT.KEYID = 7
3,441,264 UART: [idev] UDS.KEYID = 0
3,444,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,570 UART: [idev] Erasing UDS.KEYID = 0
5,961,180 UART: [idev] Sha1 KeyId Algorithm
5,984,693 UART: [idev] --
5,990,041 UART: [ldev] ++
5,990,617 UART: [ldev] CDI.KEYID = 6
5,991,513 UART: [ldev] SUBJECT.KEYID = 5
5,992,733 UART: [ldev] AUTHORITY.KEYID = 7
5,993,973 UART: [ldev] FE.KEYID = 1
6,031,680 UART: [ldev] Erasing FE.KEYID = 1
8,540,855 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,272,029 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,287,888 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,303,789 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,319,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,341,388 UART: [ldev] --
10,347,206 UART: [fwproc] Wait for Commands...
10,350,445 UART: [fwproc] Recv command 0x46574c44
10,352,457 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,171 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,914,692 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,987,735 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,316,025 >>> mbox cmd response: success
14,317,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,469,414 UART: [afmc] ++
14,470,105 UART: [afmc] CDI.KEYID = 6
14,471,008 UART: [afmc] SUBJECT.KEYID = 7
14,472,135 UART: [afmc] AUTHORITY.KEYID = 5
16,870,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,608 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,613,782 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,629,636 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,645,671 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,244 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,615 UART: [afmc] --
18,690,486 UART: [cold-reset] --
18,693,493 UART: [state] Locking Datavault
18,698,207 UART: [state] Locking PCR0, PCR1 and PCR31
18,699,909 UART: [state] Locking ICCM
18,702,413 UART: [exit] Launching FMC @ 0x40000130
18,710,813 UART:
18,711,062 UART: Running Caliptra FMC ...
18,712,173 UART:
18,712,342 UART: [state] CFI Enabled
18,767,922 UART: [fht] FMC Alias Private Key: 7
20,534,662 UART: [art] Extend RT PCRs Done
20,535,903 UART: [art] Lock RT PCRs Done
20,537,701 UART: [art] Populate DV Done
20,543,065 UART: [fht] FMC Alias Private Key: 7
20,544,718 UART: [art] Derive CDI
20,545,558 UART: [art] Store in slot 0x4
20,600,320 UART: [art] Derive Key Pair
20,601,369 UART: [art] Store priv key in slot 0x5
23,063,977 UART: [art] Derive Key Pair - Done
23,077,358 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,789,013 UART: [art] Erasing AUTHORITY.KEYID = 7
24,790,529 UART: [art] PUB.X = A9D422E7EF86B042F1C010647311531AD7C156634D403172BD73DF971ABFC8F940D86392194FCC60ED4C348ED7206A50
24,797,727 UART: [art] PUB.Y = 867F210EB24B1808AE076E8EC5E14D2DB6C2CE33AC8330EC6F7604A9DC44D66216A1C75AA46D74C2CFDC69078DCFCC13
24,805,058 UART: [art] SIG.R = 59897CF4F141E8C50661EB3E2F173CB29431AFE51D17777A3A2651BE403F0C650FEE7EBE8A1986859D3C040257ED6376
24,812,420 UART: [art] SIG.S = A93200C49FBF0A803146211B213DBB0E3426CC04F62BA5BA0E273634ECD8A137416B8B9E58C0938F6C53FE2A61AB59EA
25,791,224 UART: Caliptra RT
25,791,924 UART: [state] CFI Enabled
25,972,557 UART: [rt] RT listening for mailbox commands...
25,975,870 UART:
25,976,046 UART: Running Caliptra ROM ...
25,977,160 UART:
25,977,338 UART: [state] CFI Enabled
26,047,117 UART: [state] LifecycleState = Unprovisioned
26,049,049 UART: [state] DebugLocked = No
26,051,881 UART: [state] WD Timer not started. Device not locked for debugging
26,056,221 UART: [kat] SHA2-256
26,235,902 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,246,682 UART: [kat] ++
26,247,153 UART: [kat] sha1
26,257,829 UART: [kat] SHA2-256
26,260,522 UART: [kat] SHA2-384
26,266,678 UART: [kat] SHA2-512-ACC
26,269,082 UART: [kat] ECC-384
28,729,734 UART: [kat] HMAC-384Kdf
28,751,622 UART: [kat] LMS
29,228,053 UART: [kat] --
29,230,915 UART: [update-reset] ++
29,271,705 >>> mbox cmd response: failed
29,274,462 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,424,092 UART: ROM Non-Fatal Error: 0x000B001D
29,425,547 UART: [state] Locking Datavault
29,426,707 UART: [state] Locking PCR0, PCR1 and PCR31
29,428,248 UART: [state] Locking ICCM
29,429,160 UART: [exit] Launching FMC @ 0x40000130
29,430,588 UART:
29,430,757 UART: Running Caliptra FMC ...
29,431,861 UART:
29,432,021 UART: [state] CFI Enabled
29,432,948 UART: [art] Extend RT PCRs Done
29,434,091 UART: [art] Lock RT PCRs Done
29,435,161 UART: [art] Populate DV Done
29,436,196 UART: [fht] FMC Alias Private Key: 7
29,437,514 UART: [art] Derive CDI
29,438,273 UART: [art] Store in slot 0x4
29,451,021 UART: [art] Derive Key Pair
29,452,049 UART: [art] Store priv key in slot 0x5
31,914,121 UART: [art] Derive Key Pair - Done
31,927,218 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,640,066 UART: [art] Erasing AUTHORITY.KEYID = 7
33,641,581 UART: [art] PUB.X = A9D422E7EF86B042F1C010647311531AD7C156634D403172BD73DF971ABFC8F940D86392194FCC60ED4C348ED7206A50
33,648,852 UART: [art] PUB.Y = 867F210EB24B1808AE076E8EC5E14D2DB6C2CE33AC8330EC6F7604A9DC44D66216A1C75AA46D74C2CFDC69078DCFCC13
33,656,153 UART: [art] SIG.R = 59897CF4F141E8C50661EB3E2F173CB29431AFE51D17777A3A2651BE403F0C650FEE7EBE8A1986859D3C040257ED6376
33,663,554 UART: [art] SIG.S = A93200C49FBF0A803146211B213DBB0E3426CC04F62BA5BA0E273634ECD8A137416B8B9E58C0938F6C53FE2A61AB59EA
34,642,312 UART: Caliptra RT
34,643,020 UART: [state] CFI Enabled
35,061,345 UART: [rt] RT listening for mailbox commands...
35,064,146 UART:
35,064,322 UART: Running Caliptra ROM ...
35,065,440 UART:
35,065,621 UART: [state] CFI Enabled
35,132,187 UART: [state] LifecycleState = Unprovisioned
35,134,115 UART: [state] DebugLocked = No
35,136,832 UART: [state] WD Timer not started. Device not locked for debugging
35,140,896 UART: [kat] SHA2-256
35,320,566 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,331,330 UART: [kat] ++
35,331,792 UART: [kat] sha1
35,341,976 UART: [kat] SHA2-256
35,344,675 UART: [kat] SHA2-384
35,351,260 UART: [kat] SHA2-512-ACC
35,353,610 UART: [kat] ECC-384
37,818,074 UART: [kat] HMAC-384Kdf
37,840,725 UART: [kat] LMS
38,317,142 UART: [kat] --
38,321,297 UART: [update-reset] ++
41,815,026 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
41,817,756 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,215,369 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,228 writing to cptra_bootfsm_go
3,464,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,237,707 >>> mbox cmd response: success
14,239,779 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,534,650 UART:
18,535,062 UART: Running Caliptra FMC ...
18,536,225 UART:
18,536,387 UART: [state] CFI Enabled
18,599,900 UART: [fht] FMC Alias Private Key: 7
20,366,428 UART: [art] Extend RT PCRs Done
20,367,659 UART: [art] Lock RT PCRs Done
20,369,241 UART: [art] Populate DV Done
20,374,711 UART: [fht] FMC Alias Private Key: 7
20,376,319 UART: [art] Derive CDI
20,377,140 UART: [art] Store in slot 0x4
20,432,645 UART: [art] Derive Key Pair
20,433,689 UART: [art] Store priv key in slot 0x5
22,896,499 UART: [art] Derive Key Pair - Done
22,909,288 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,751 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,280 UART: [art] PUB.X = 1EB1DA01C88F56EF6CDE1D2D6AFB61BDDC5419B1DC18D159026DE05FD797C5568AE881D4845600526A5D66B99E03F248
24,631,544 UART: [art] PUB.Y = 26F0BA7B7418A32A89DEB4BE6DDE87F4DA4E37E81467502B702AD9B15465CB377CC792F09F32C9D02B7125CA7E63BF5C
24,638,785 UART: [art] SIG.R = 28C8D1F3B2FBFFF77F44BAB45781061210507E377F3FFE351F02EA09EE37B4DBBC34DB2D226BC978D55AC3FDDCDE275E
24,646,250 UART: [art] SIG.S = 49E42F2476F8C471815AD603FED5893ACAA37AC7E84338F2CE3F452FD8E42B63700B47BFE42B08D19126359CF14D39DA
25,625,599 UART: Caliptra RT
25,626,315 UART: [state] CFI Enabled
25,806,515 UART: [rt] RT listening for mailbox commands...
29,103,919 >>> mbox cmd response: failed
29,105,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,254,847 UART:
29,255,158 UART: Running Caliptra FMC ...
29,256,283 UART:
29,256,451 UART: [state] CFI Enabled
29,257,396 UART: [art] Extend RT PCRs Done
29,258,542 UART: [art] Lock RT PCRs Done
29,260,666 UART: [art] Populate DV Done
29,261,665 UART: [fht] FMC Alias Private Key: 7
29,263,071 UART: [art] Derive CDI
29,263,823 UART: [art] Store in slot 0x4
29,286,506 UART: [art] Derive Key Pair
29,287,514 UART: [art] Store priv key in slot 0x5
31,750,002 UART: [art] Derive Key Pair - Done
31,762,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,475,685 UART: [art] Erasing AUTHORITY.KEYID = 7
33,477,200 UART: [art] PUB.X = 1EB1DA01C88F56EF6CDE1D2D6AFB61BDDC5419B1DC18D159026DE05FD797C5568AE881D4845600526A5D66B99E03F248
33,484,465 UART: [art] PUB.Y = 26F0BA7B7418A32A89DEB4BE6DDE87F4DA4E37E81467502B702AD9B15465CB377CC792F09F32C9D02B7125CA7E63BF5C
33,491,760 UART: [art] SIG.R = 28C8D1F3B2FBFFF77F44BAB45781061210507E377F3FFE351F02EA09EE37B4DBBC34DB2D226BC978D55AC3FDDCDE275E
33,499,197 UART: [art] SIG.S = 49E42F2476F8C471815AD603FED5893ACAA37AC7E84338F2CE3F452FD8E42B63700B47BFE42B08D19126359CF14D39DA
34,478,300 UART: Caliptra RT
34,479,045 UART: [state] CFI Enabled
34,900,656 UART: [rt] RT listening for mailbox commands...
42,067,557 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.43s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,329 writing to cptra_bootfsm_go
192,585 UART:
192,967 UART: Running Caliptra ROM ...
194,099 UART:
603,567 UART: [state] CFI Enabled
620,676 UART: [state] LifecycleState = Unprovisioned
622,622 UART: [state] DebugLocked = No
625,249 UART: [state] WD Timer not started. Device not locked for debugging
628,813 UART: [kat] SHA2-256
808,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,261 UART: [kat] ++
819,737 UART: [kat] sha1
829,856 UART: [kat] SHA2-256
832,551 UART: [kat] SHA2-384
839,286 UART: [kat] SHA2-512-ACC
841,633 UART: [kat] ECC-384
3,285,389 UART: [kat] HMAC-384Kdf
3,296,377 UART: [kat] LMS
3,772,922 UART: [kat] --
3,777,824 UART: [cold-reset] ++
3,779,522 UART: [fht] FHT @ 0x50003400
3,791,273 UART: [idev] ++
3,791,858 UART: [idev] CDI.KEYID = 6
3,792,752 UART: [idev] SUBJECT.KEYID = 7
3,794,026 UART: [idev] UDS.KEYID = 0
3,797,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,117 UART: [idev] Erasing UDS.KEYID = 0
6,268,798 UART: [idev] Sha1 KeyId Algorithm
6,293,164 UART: [idev] --
6,299,482 UART: [ldev] ++
6,300,059 UART: [ldev] CDI.KEYID = 6
6,300,950 UART: [ldev] SUBJECT.KEYID = 5
6,302,170 UART: [ldev] AUTHORITY.KEYID = 7
6,303,409 UART: [ldev] FE.KEYID = 1
6,312,793 UART: [ldev] Erasing FE.KEYID = 1
8,793,502 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,374 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,953 UART: [ldev] --
10,586,776 UART: [fwproc] Wait for Commands...
10,588,455 UART: [fwproc] Recv command 0x46574c44
10,590,474 UART: [fwproc] Recv'd Img size: 118548 bytes
14,069,716 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,143,279 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,216,295 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,544,182 >>> mbox cmd response: success
14,545,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,694,757 UART: [afmc] ++
14,695,397 UART: [afmc] CDI.KEYID = 6
14,696,293 UART: [afmc] SUBJECT.KEYID = 7
14,697,405 UART: [afmc] AUTHORITY.KEYID = 5
17,055,861 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,779,340 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,781,516 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,797,336 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,813,407 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,829,030 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,853,951 UART: [afmc] --
18,858,477 UART: [cold-reset] --
18,860,725 UART: [state] Locking Datavault
18,863,391 UART: [state] Locking PCR0, PCR1 and PCR31
18,865,158 UART: [state] Locking ICCM
18,867,697 UART: [exit] Launching FMC @ 0x40000130
18,876,096 UART:
18,876,341 UART: Running Caliptra FMC ...
18,877,446 UART:
18,877,613 UART: [state] CFI Enabled
18,885,609 UART: [fht] FMC Alias Private Key: 7
20,651,682 UART: [art] Extend RT PCRs Done
20,652,898 UART: [art] Lock RT PCRs Done
20,654,449 UART: [art] Populate DV Done
20,659,669 UART: [fht] FMC Alias Private Key: 7
20,661,244 UART: [art] Derive CDI
20,662,097 UART: [art] Store in slot 0x4
20,704,656 UART: [art] Derive Key Pair
20,705,655 UART: [art] Store priv key in slot 0x5
23,132,698 UART: [art] Derive Key Pair - Done
23,145,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,852,112 UART: [art] Erasing AUTHORITY.KEYID = 7
24,853,620 UART: [art] PUB.X = A8BA64315EC989972A50E44B70CAE3014863379CFFF8B3EDCB406CC3BACABD0B144973DA27C85E568948C85C58AD3396
24,860,860 UART: [art] PUB.Y = 6971AE59B2749CFCF2C6E505A7472791E129F630CCF2E00ED6867F5DF49D2D94B6CA3D3E84AC01E4C2825FE1DBC81D06
24,868,144 UART: [art] SIG.R = 45388021D370FF12A7F2F0D104467B07AB644E18FED30E49002E96184F6E4DD1F72D09169CD9F42FA41EE93B7AC31259
24,875,534 UART: [art] SIG.S = D92D667BD0AAFD419FB59DFA02CE3A19B792BC9483F45E412E1D8F3296615F44D7B9CAD04E9F6624A09B80106541B5CE
25,854,236 UART: Caliptra RT
25,854,957 UART: [state] CFI Enabled
25,987,763 UART: [rt] RT listening for mailbox commands...
25,990,887 UART:
25,991,139 UART: Running Caliptra ROM ...
25,992,245 UART:
25,992,483 UART: [state] CFI Enabled
26,008,642 UART: [state] LifecycleState = Unprovisioned
26,010,541 UART: [state] DebugLocked = No
26,012,034 UART: [state] WD Timer not started. Device not locked for debugging
26,016,376 UART: [kat] SHA2-256
26,196,081 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,206,875 UART: [kat] ++
26,207,421 UART: [kat] sha1
26,218,050 UART: [kat] SHA2-256
26,220,744 UART: [kat] SHA2-384
26,227,163 UART: [kat] SHA2-512-ACC
26,229,520 UART: [kat] ECC-384
28,673,608 UART: [kat] HMAC-384Kdf
28,685,686 UART: [kat] LMS
29,162,166 UART: [kat] --
29,166,722 UART: [update-reset] ++
29,208,159 >>> mbox cmd response: failed
29,210,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,359,489 UART: ROM Non-Fatal Error: 0x000B001D
29,360,933 UART: [state] Locking Datavault
29,362,092 UART: [state] Locking PCR0, PCR1 and PCR31
29,363,638 UART: [state] Locking ICCM
29,364,525 UART: [exit] Launching FMC @ 0x40000130
29,365,959 UART:
29,366,127 UART: Running Caliptra FMC ...
29,367,236 UART:
29,367,398 UART: [state] CFI Enabled
29,368,335 UART: [art] Extend RT PCRs Done
29,369,400 UART: [art] Lock RT PCRs Done
29,370,386 UART: [art] Populate DV Done
29,371,441 UART: [fht] FMC Alias Private Key: 7
29,372,684 UART: [art] Derive CDI
29,373,432 UART: [art] Store in slot 0x4
29,374,505 UART: [art] Derive Key Pair
29,375,504 UART: [art] Store priv key in slot 0x5
31,757,743 UART: [art] Derive Key Pair - Done
31,770,797 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,477,554 UART: [art] Erasing AUTHORITY.KEYID = 7
33,479,057 UART: [art] PUB.X = A8BA64315EC989972A50E44B70CAE3014863379CFFF8B3EDCB406CC3BACABD0B144973DA27C85E568948C85C58AD3396
33,486,331 UART: [art] PUB.Y = 6971AE59B2749CFCF2C6E505A7472791E129F630CCF2E00ED6867F5DF49D2D94B6CA3D3E84AC01E4C2825FE1DBC81D06
33,493,614 UART: [art] SIG.R = 45388021D370FF12A7F2F0D104467B07AB644E18FED30E49002E96184F6E4DD1F72D09169CD9F42FA41EE93B7AC31259
33,500,948 UART: [art] SIG.S = D92D667BD0AAFD419FB59DFA02CE3A19B792BC9483F45E412E1D8F3296615F44D7B9CAD04E9F6624A09B80106541B5CE
34,480,100 UART: Caliptra RT
34,480,815 UART: [state] CFI Enabled
34,852,401 UART: [rt] RT listening for mailbox commands...
34,855,363 UART:
34,855,566 UART: Running Caliptra ROM ...
34,856,605 UART:
34,856,996 UART: [state] CFI Enabled
40,323,799 UART: [state] LifecycleState = Unprovisioned
40,325,792 UART: [state] DebugLocked = No
40,327,204 UART: [state] WD Timer not started. Device not locked for debugging
40,331,120 UART: [kat] SHA2-256
40,510,875 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,521,615 UART: [kat] ++
40,522,115 UART: [kat] sha1
40,534,467 UART: [kat] SHA2-256
40,537,168 UART: [kat] SHA2-384
40,542,942 UART: [kat] SHA2-512-ACC
40,545,294 UART: [kat] ECC-384
42,987,719 UART: [kat] HMAC-384Kdf
43,000,103 UART: [kat] LMS
43,476,603 UART: [kat] --
43,481,895 UART: [update-reset] ++
46,978,551 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
46,982,199 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,379,850 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,781,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,442,180 >>> mbox cmd response: success
14,444,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,691,795 UART:
18,692,197 UART: Running Caliptra FMC ...
18,693,337 UART:
18,693,506 UART: [state] CFI Enabled
18,701,149 UART: [fht] FMC Alias Private Key: 7
20,467,376 UART: [art] Extend RT PCRs Done
20,468,601 UART: [art] Lock RT PCRs Done
20,470,339 UART: [art] Populate DV Done
20,476,123 UART: [fht] FMC Alias Private Key: 7
20,477,723 UART: [art] Derive CDI
20,478,543 UART: [art] Store in slot 0x4
20,521,519 UART: [art] Derive Key Pair
20,522,563 UART: [art] Store priv key in slot 0x5
22,949,235 UART: [art] Derive Key Pair - Done
22,962,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,408 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,913 UART: [art] PUB.X = 385E4387F4100EAFE1649FC0392EE5C42045A4E347A4E5DC26D42D99915918A31C23C9C6B131A20D5702DD525608B9F1
24,677,123 UART: [art] PUB.Y = CA21A494B1DCA226F79B87B6C55348E4B86D5EE1C9228C62C31363DAA0A0AF6DD3E22CDD25635CAE806CB363CFB85164
24,684,397 UART: [art] SIG.R = 85A7F7D2A16668D944A50F12F73A231466BE22EA80C66C482924B033251BC62C75DF84B3D59E016841FFBFF3F8E4D1D1
24,691,806 UART: [art] SIG.S = 5A1A1607E2F10B30488B9617A17538CBEF5D6FC2AE4BF6306C214901B55AC4E0D9DFDAAC3C14D53008557CFE60CBDBF5
25,670,145 UART: Caliptra RT
25,670,875 UART: [state] CFI Enabled
25,803,485 UART: [rt] RT listening for mailbox commands...
29,007,256 >>> mbox cmd response: failed
29,008,965 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,157,886 UART:
29,158,201 UART: Running Caliptra FMC ...
29,159,328 UART:
29,159,487 UART: [state] CFI Enabled
29,160,355 UART: [art] Extend RT PCRs Done
29,161,497 UART: [art] Lock RT PCRs Done
29,162,572 UART: [art] Populate DV Done
29,163,530 UART: [fht] FMC Alias Private Key: 7
29,164,904 UART: [art] Derive CDI
29,165,645 UART: [art] Store in slot 0x4
29,166,670 UART: [art] Derive Key Pair
29,167,582 UART: [art] Store priv key in slot 0x5
31,548,017 UART: [art] Derive Key Pair - Done
31,561,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,267,370 UART: [art] Erasing AUTHORITY.KEYID = 7
33,268,887 UART: [art] PUB.X = 385E4387F4100EAFE1649FC0392EE5C42045A4E347A4E5DC26D42D99915918A31C23C9C6B131A20D5702DD525608B9F1
33,276,146 UART: [art] PUB.Y = CA21A494B1DCA226F79B87B6C55348E4B86D5EE1C9228C62C31363DAA0A0AF6DD3E22CDD25635CAE806CB363CFB85164
33,283,439 UART: [art] SIG.R = 85A7F7D2A16668D944A50F12F73A231466BE22EA80C66C482924B033251BC62C75DF84B3D59E016841FFBFF3F8E4D1D1
33,290,782 UART: [art] SIG.S = 5A1A1607E2F10B30488B9617A17538CBEF5D6FC2AE4BF6306C214901B55AC4E0D9DFDAAC3C14D53008557CFE60CBDBF5
34,269,560 UART: Caliptra RT
34,270,286 UART: [state] CFI Enabled
34,644,632 UART: [rt] RT listening for mailbox commands...
47,386,928 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
192,132 UART:
192,494 UART: Running Caliptra ROM ...
193,679 UART:
193,837 UART: [state] CFI Enabled
259,580 UART: [state] LifecycleState = Unprovisioned
261,971 UART: [state] DebugLocked = No
264,547 UART: [state] WD Timer not started. Device not locked for debugging
268,376 UART: [kat] SHA2-256
458,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,043 UART: [kat] ++
469,588 UART: [kat] sha1
481,827 UART: [kat] SHA2-256
484,838 UART: [kat] SHA2-384
489,645 UART: [kat] SHA2-512-ACC
492,262 UART: [kat] ECC-384
2,942,739 UART: [kat] HMAC-384Kdf
2,966,799 UART: [kat] LMS
3,498,575 UART: [kat] --
3,503,603 UART: [cold-reset] ++
3,506,194 UART: [fht] FHT @ 0x50003400
3,517,122 UART: [idev] ++
3,517,864 UART: [idev] CDI.KEYID = 6
3,518,790 UART: [idev] SUBJECT.KEYID = 7
3,520,013 UART: [idev] UDS.KEYID = 0
3,523,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,390 UART: [idev] Erasing UDS.KEYID = 0
6,025,020 UART: [idev] Sha1 KeyId Algorithm
6,047,401 UART: [idev] --
6,051,696 UART: [ldev] ++
6,052,432 UART: [ldev] CDI.KEYID = 6
6,053,511 UART: [ldev] SUBJECT.KEYID = 5
6,054,627 UART: [ldev] AUTHORITY.KEYID = 7
6,055,814 UART: [ldev] FE.KEYID = 1
6,094,821 UART: [ldev] Erasing FE.KEYID = 1
8,600,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,312 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,702 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,279 UART: [ldev] --
10,409,254 UART: [fwproc] Wait for Commands...
10,411,895 UART: [fwproc] Recv command 0x46574c44
10,414,164 UART: [fwproc] Recv'd Img size: 118548 bytes
13,905,033 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,984,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,108,388 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,668,546 >>> mbox cmd response: success
14,670,330 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,819,474 UART: [afmc] ++
14,820,112 UART: [afmc] CDI.KEYID = 6
14,821,046 UART: [afmc] SUBJECT.KEYID = 7
14,822,160 UART: [afmc] AUTHORITY.KEYID = 5
17,225,901 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,948,635 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,950,549 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,965,639 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,980,831 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,995,693 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,018,877 UART: [afmc] --
19,022,518 UART: [cold-reset] --
19,026,416 UART: [state] Locking Datavault
19,031,133 UART: [state] Locking PCR0, PCR1 and PCR31
19,033,286 UART: [state] Locking ICCM
19,034,904 UART: [exit] Launching FMC @ 0x40000130
19,043,583 UART:
19,043,824 UART: Running Caliptra FMC ...
19,044,932 UART:
19,045,103 UART: [state] CFI Enabled
19,107,817 UART: [fht] FMC Alias Private Key: 7
20,874,049 UART: [art] Extend RT PCRs Done
20,875,269 UART: [art] Lock RT PCRs Done
20,876,817 UART: [art] Populate DV Done
20,882,237 UART: [fht] FMC Alias Private Key: 7
20,883,888 UART: [art] Derive CDI
20,884,708 UART: [art] Store in slot 0x4
20,940,871 UART: [art] Derive Key Pair
20,941,937 UART: [art] Store priv key in slot 0x5
23,404,697 UART: [art] Derive Key Pair - Done
23,417,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,130,269 UART: [art] Erasing AUTHORITY.KEYID = 7
25,131,775 UART: [art] PUB.X = A541D8339E2B2A0BA0FF10E39D6ABCF84C14EA3B97018CC66180365CE8952E11DE9D72E862816310B26BF3764806D7AE
25,139,026 UART: [art] PUB.Y = 4772FFCF98D4C4E94D5650DA917501929C04042EFCC923A1D5FDA60B9EE9B1A3687B2E5126A2E1D592B21F03539B32AA
25,146,322 UART: [art] SIG.R = AAF3C9B0731BAD992B9F6F4B1C2FD0F84FD0E9645C944AB6D3038D0A293A7987EBCA320AFFB31F07922128752547F074
25,153,659 UART: [art] SIG.S = 5925EEE43C21168137818C2DCE8C177C86F7D5856495078EEAA84849D02038384473AE0F618FC243A24350C658A68359
26,132,059 UART: Caliptra RT
26,132,775 UART: [state] CFI Enabled
26,313,641 UART: [rt] RT listening for mailbox commands...
26,316,980 UART:
26,317,151 UART: Running Caliptra ROM ...
26,318,172 UART:
26,318,325 UART: [state] CFI Enabled
26,382,932 UART: [state] LifecycleState = Unprovisioned
26,385,042 UART: [state] DebugLocked = No
26,387,466 UART: [state] WD Timer not started. Device not locked for debugging
26,392,939 UART: [kat] SHA2-256
26,582,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,593,529 UART: [kat] ++
26,594,019 UART: [kat] sha1
26,606,161 UART: [kat] SHA2-256
26,609,131 UART: [kat] SHA2-384
26,616,145 UART: [kat] SHA2-512-ACC
26,618,696 UART: [kat] ECC-384
29,071,149 UART: [kat] HMAC-384Kdf
29,094,230 UART: [kat] LMS
29,625,836 UART: [kat] --
29,630,144 UART: [update-reset] ++
29,683,272 >>> mbox cmd response: failed
29,685,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,834,877 UART: ROM Non-Fatal Error: 0x000B001D
29,836,312 UART: [state] Locking Datavault
29,837,477 UART: [state] Locking PCR0, PCR1 and PCR31
29,839,020 UART: [state] Locking ICCM
29,839,909 UART: [exit] Launching FMC @ 0x40000130
29,841,342 UART:
29,841,504 UART: Running Caliptra FMC ...
29,842,606 UART:
29,842,771 UART: [state] CFI Enabled
29,843,700 UART: [art] Extend RT PCRs Done
29,844,848 UART: [art] Lock RT PCRs Done
29,845,916 UART: [art] Populate DV Done
29,846,952 UART: [fht] FMC Alias Private Key: 7
29,848,275 UART: [art] Derive CDI
29,849,015 UART: [art] Store in slot 0x4
29,880,165 UART: [art] Derive Key Pair
29,881,191 UART: [art] Store priv key in slot 0x5
32,344,262 UART: [art] Derive Key Pair - Done
32,357,211 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,069,764 UART: [art] Erasing AUTHORITY.KEYID = 7
34,071,311 UART: [art] PUB.X = A541D8339E2B2A0BA0FF10E39D6ABCF84C14EA3B97018CC66180365CE8952E11DE9D72E862816310B26BF3764806D7AE
34,078,522 UART: [art] PUB.Y = 4772FFCF98D4C4E94D5650DA917501929C04042EFCC923A1D5FDA60B9EE9B1A3687B2E5126A2E1D592B21F03539B32AA
34,085,821 UART: [art] SIG.R = AAF3C9B0731BAD992B9F6F4B1C2FD0F84FD0E9645C944AB6D3038D0A293A7987EBCA320AFFB31F07922128752547F074
34,093,231 UART: [art] SIG.S = 5925EEE43C21168137818C2DCE8C177C86F7D5856495078EEAA84849D02038384473AE0F618FC243A24350C658A68359
35,071,897 UART: Caliptra RT
35,072,597 UART: [state] CFI Enabled
35,495,344 UART: [rt] RT listening for mailbox commands...
35,498,033 UART:
35,498,295 UART: Running Caliptra ROM ...
35,499,404 UART:
35,499,569 UART: [state] CFI Enabled
35,558,543 UART: [state] LifecycleState = Unprovisioned
35,560,616 UART: [state] DebugLocked = No
35,563,130 UART: [state] WD Timer not started. Device not locked for debugging
35,567,894 UART: [kat] SHA2-256
35,757,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,768,531 UART: [kat] ++
35,768,992 UART: [kat] sha1
35,780,959 UART: [kat] SHA2-256
35,783,931 UART: [kat] SHA2-384
35,790,030 UART: [kat] SHA2-512-ACC
35,792,607 UART: [kat] ECC-384
38,245,791 UART: [kat] HMAC-384Kdf
38,269,358 UART: [kat] LMS
38,800,899 UART: [kat] --
38,805,588 UART: [update-reset] ++
42,318,122 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
42,320,630 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,950,369 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.47s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
3,438,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,791,456 >>> mbox cmd response: success
14,793,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,069,978 UART:
19,070,406 UART: Running Caliptra FMC ...
19,071,622 UART:
19,071,797 UART: [state] CFI Enabled
19,135,238 UART: [fht] FMC Alias Private Key: 7
20,901,563 UART: [art] Extend RT PCRs Done
20,902,792 UART: [art] Lock RT PCRs Done
20,904,557 UART: [art] Populate DV Done
20,909,693 UART: [fht] FMC Alias Private Key: 7
20,911,344 UART: [art] Derive CDI
20,912,166 UART: [art] Store in slot 0x4
20,968,484 UART: [art] Derive Key Pair
20,969,528 UART: [art] Store priv key in slot 0x5
23,432,526 UART: [art] Derive Key Pair - Done
23,445,375 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,158,772 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,275 UART: [art] PUB.X = C9DEE2B8A84F359949B7785501F87707EA3DBFFDA32899F9263DF581A5215448A793A90089B4F88C1E480028C5778A9B
25,167,486 UART: [art] PUB.Y = F784EC48CDA2320F46DEA9FD5F09A9CD137B3EEB32F498A55424C1793F0908BD65816564A311BE47B64E78DD8D5FE8B4
25,174,750 UART: [art] SIG.R = F79DE3E2608501CC8D68F124726238EDA099514F21A570D786C506CD586D1654DA87CD2C2492688FC77E82D5B5033E4F
25,182,153 UART: [art] SIG.S = 0C9A7108927D419B4914C35769AF56A7F5BD1D1D2DA4FDEA2A897A160C42E4A3CF5A36ED355CE2E39747B084260FF3CF
26,161,151 UART: Caliptra RT
26,161,868 UART: [state] CFI Enabled
26,342,455 UART: [rt] RT listening for mailbox commands...
29,620,226 >>> mbox cmd response: failed
29,622,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,771,566 UART:
29,771,885 UART: Running Caliptra FMC ...
29,773,012 UART:
29,773,186 UART: [state] CFI Enabled
29,774,121 UART: [art] Extend RT PCRs Done
29,775,191 UART: [art] Lock RT PCRs Done
29,776,209 UART: [art] Populate DV Done
29,777,159 UART: [fht] FMC Alias Private Key: 7
29,778,589 UART: [art] Derive CDI
29,779,333 UART: [art] Store in slot 0x4
29,803,525 UART: [art] Derive Key Pair
29,804,531 UART: [art] Store priv key in slot 0x5
32,267,076 UART: [art] Derive Key Pair - Done
32,279,875 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,994,136 UART: [art] Erasing AUTHORITY.KEYID = 7
33,995,648 UART: [art] PUB.X = C9DEE2B8A84F359949B7785501F87707EA3DBFFDA32899F9263DF581A5215448A793A90089B4F88C1E480028C5778A9B
34,002,842 UART: [art] PUB.Y = F784EC48CDA2320F46DEA9FD5F09A9CD137B3EEB32F498A55424C1793F0908BD65816564A311BE47B64E78DD8D5FE8B4
34,010,135 UART: [art] SIG.R = F79DE3E2608501CC8D68F124726238EDA099514F21A570D786C506CD586D1654DA87CD2C2492688FC77E82D5B5033E4F
34,017,478 UART: [art] SIG.S = 0C9A7108927D419B4914C35769AF56A7F5BD1D1D2DA4FDEA2A897A160C42E4A3CF5A36ED355CE2E39747B084260FF3CF
34,996,530 UART: Caliptra RT
34,997,244 UART: [state] CFI Enabled
35,417,386 UART: [rt] RT listening for mailbox commands...
43,182,415 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.48s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
192,566 UART:
192,926 UART: Running Caliptra ROM ...
194,109 UART:
603,565 UART: [state] CFI Enabled
618,817 UART: [state] LifecycleState = Unprovisioned
621,212 UART: [state] DebugLocked = No
623,089 UART: [state] WD Timer not started. Device not locked for debugging
628,289 UART: [kat] SHA2-256
818,179 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,984 UART: [kat] ++
829,493 UART: [kat] sha1
839,997 UART: [kat] SHA2-256
843,015 UART: [kat] SHA2-384
848,952 UART: [kat] SHA2-512-ACC
851,516 UART: [kat] ECC-384
3,296,431 UART: [kat] HMAC-384Kdf
3,308,943 UART: [kat] LMS
3,840,788 UART: [kat] --
3,846,139 UART: [cold-reset] ++
3,847,540 UART: [fht] FHT @ 0x50003400
3,859,294 UART: [idev] ++
3,859,975 UART: [idev] CDI.KEYID = 6
3,860,999 UART: [idev] SUBJECT.KEYID = 7
3,862,163 UART: [idev] UDS.KEYID = 0
3,865,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,655 UART: [idev] Erasing UDS.KEYID = 0
6,338,724 UART: [idev] Sha1 KeyId Algorithm
6,359,913 UART: [idev] --
6,365,416 UART: [ldev] ++
6,366,102 UART: [ldev] CDI.KEYID = 6
6,367,016 UART: [ldev] SUBJECT.KEYID = 5
6,368,184 UART: [ldev] AUTHORITY.KEYID = 7
6,369,423 UART: [ldev] FE.KEYID = 1
6,378,250 UART: [ldev] Erasing FE.KEYID = 1
8,855,429 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,680 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,043 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,641,954 UART: [ldev] --
10,648,059 UART: [fwproc] Wait for Commands...
10,649,679 UART: [fwproc] Recv command 0x46574c44
10,652,003 UART: [fwproc] Recv'd Img size: 118548 bytes
14,155,246 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,231,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,250 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,915,614 >>> mbox cmd response: success
14,917,529 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,066,382 UART: [afmc] ++
15,067,040 UART: [afmc] CDI.KEYID = 6
15,067,974 UART: [afmc] SUBJECT.KEYID = 7
15,069,028 UART: [afmc] AUTHORITY.KEYID = 5
17,427,892 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,258 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,215 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,272 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,433 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,342 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,810 UART: [afmc] --
19,225,789 UART: [cold-reset] --
19,228,092 UART: [state] Locking Datavault
19,232,756 UART: [state] Locking PCR0, PCR1 and PCR31
19,234,953 UART: [state] Locking ICCM
19,236,403 UART: [exit] Launching FMC @ 0x40000130
19,245,087 UART:
19,245,328 UART: Running Caliptra FMC ...
19,246,434 UART:
19,246,598 UART: [state] CFI Enabled
19,254,704 UART: [fht] FMC Alias Private Key: 7
21,020,494 UART: [art] Extend RT PCRs Done
21,021,729 UART: [art] Lock RT PCRs Done
21,023,253 UART: [art] Populate DV Done
21,028,693 UART: [fht] FMC Alias Private Key: 7
21,030,300 UART: [art] Derive CDI
21,031,124 UART: [art] Store in slot 0x4
21,074,047 UART: [art] Derive Key Pair
21,075,059 UART: [art] Store priv key in slot 0x5
23,502,246 UART: [art] Derive Key Pair - Done
23,515,028 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,221,382 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,893 UART: [art] PUB.X = D98E2AE26B384480BA881C57FEC3600D8BB35ED8FAFF0F80912365586EB2F201351D634ADA5F60294CB39D7D1A399034
25,230,138 UART: [art] PUB.Y = D8D2833343DD2AF970AC1C04EF4C427C9C4DE21D64F54ED48F2E1947A3DF9E9DFDBDE4C5F504FC0DC7AB2602302283E6
25,237,431 UART: [art] SIG.R = BAD4CD466B03B97BF8D6F47E811AFAD33AE8DB8D94B2B9250F5B620B0F0BCB74680FAAA04E32EF13356BEC373C163EDB
25,244,823 UART: [art] SIG.S = ADAF6BAC1A53B87E3007EC1DAB3C134EBCD7A750FE73C4C00D05C43F7257375280397B1A3D4E20E047FFC41D1B5F8CC5
26,223,881 UART: Caliptra RT
26,224,597 UART: [state] CFI Enabled
26,357,733 UART: [rt] RT listening for mailbox commands...
26,360,745 UART:
26,361,015 UART: Running Caliptra ROM ...
26,362,129 UART:
26,362,345 UART: [state] CFI Enabled
26,375,257 UART: [state] LifecycleState = Unprovisioned
26,377,146 UART: [state] DebugLocked = No
26,378,684 UART: [state] WD Timer not started. Device not locked for debugging
26,383,596 UART: [kat] SHA2-256
26,573,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,584,225 UART: [kat] ++
26,584,823 UART: [kat] sha1
26,596,750 UART: [kat] SHA2-256
26,599,770 UART: [kat] SHA2-384
26,605,062 UART: [kat] SHA2-512-ACC
26,607,690 UART: [kat] ECC-384
29,047,705 UART: [kat] HMAC-384Kdf
29,061,561 UART: [kat] LMS
29,593,176 UART: [kat] --
29,596,461 UART: [update-reset] ++
29,653,043 >>> mbox cmd response: failed
29,655,393 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,804,344 UART: ROM Non-Fatal Error: 0x000B001D
29,805,773 UART: [state] Locking Datavault
29,806,849 UART: [state] Locking PCR0, PCR1 and PCR31
29,808,384 UART: [state] Locking ICCM
29,809,268 UART: [exit] Launching FMC @ 0x40000130
29,810,616 UART:
29,810,769 UART: Running Caliptra FMC ...
29,811,868 UART:
29,812,029 UART: [state] CFI Enabled
29,812,954 UART: [art] Extend RT PCRs Done
29,814,093 UART: [art] Lock RT PCRs Done
29,815,166 UART: [art] Populate DV Done
29,816,215 UART: [fht] FMC Alias Private Key: 7
29,817,539 UART: [art] Derive CDI
29,818,479 UART: [art] Store in slot 0x4
29,819,565 UART: [art] Derive Key Pair
29,820,568 UART: [art] Store priv key in slot 0x5
32,203,672 UART: [art] Derive Key Pair - Done
32,216,625 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,923,201 UART: [art] Erasing AUTHORITY.KEYID = 7
33,924,693 UART: [art] PUB.X = D98E2AE26B384480BA881C57FEC3600D8BB35ED8FAFF0F80912365586EB2F201351D634ADA5F60294CB39D7D1A399034
33,931,919 UART: [art] PUB.Y = D8D2833343DD2AF970AC1C04EF4C427C9C4DE21D64F54ED48F2E1947A3DF9E9DFDBDE4C5F504FC0DC7AB2602302283E6
33,939,216 UART: [art] SIG.R = BAD4CD466B03B97BF8D6F47E811AFAD33AE8DB8D94B2B9250F5B620B0F0BCB74680FAAA04E32EF13356BEC373C163EDB
33,946,664 UART: [art] SIG.S = ADAF6BAC1A53B87E3007EC1DAB3C134EBCD7A750FE73C4C00D05C43F7257375280397B1A3D4E20E047FFC41D1B5F8CC5
34,925,444 UART: Caliptra RT
34,926,159 UART: [state] CFI Enabled
35,301,210 UART: [rt] RT listening for mailbox commands...
35,303,979 UART:
35,304,263 UART: Running Caliptra ROM ...
35,305,380 UART:
35,305,596 UART: [state] CFI Enabled
40,320,256 UART: [state] LifecycleState = Unprovisioned
40,322,195 UART: [state] DebugLocked = No
40,324,646 UART: [state] WD Timer not started. Device not locked for debugging
40,328,466 UART: [kat] SHA2-256
40,518,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,529,133 UART: [kat] ++
40,529,593 UART: [kat] sha1
40,541,074 UART: [kat] SHA2-256
40,544,083 UART: [kat] SHA2-384
40,548,959 UART: [kat] SHA2-512-ACC
40,551,535 UART: [kat] ECC-384
42,992,884 UART: [kat] HMAC-384Kdf
43,006,352 UART: [kat] LMS
43,537,981 UART: [kat] --
43,541,126 UART: [update-reset] ++
47,052,850 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
47,055,870 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,685,618 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,527 writing to cptra_bootfsm_go
3,755,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,056,349 >>> mbox cmd response: success
15,058,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,308,365 UART:
19,308,795 UART: Running Caliptra FMC ...
19,309,998 UART:
19,310,176 UART: [state] CFI Enabled
19,318,103 UART: [fht] FMC Alias Private Key: 7
21,084,437 UART: [art] Extend RT PCRs Done
21,085,669 UART: [art] Lock RT PCRs Done
21,087,367 UART: [art] Populate DV Done
21,092,833 UART: [fht] FMC Alias Private Key: 7
21,094,440 UART: [art] Derive CDI
21,095,267 UART: [art] Store in slot 0x4
21,137,926 UART: [art] Derive Key Pair
21,138,933 UART: [art] Store priv key in slot 0x5
23,565,592 UART: [art] Derive Key Pair - Done
23,578,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,285,137 UART: [art] Erasing AUTHORITY.KEYID = 7
25,286,643 UART: [art] PUB.X = 124178EF76C1AD3CFCC9BF67B0A093E14A6C6F3EE190E48B9E85C9CA1E9EB7B3D6920A3A5B6FDEF42A6FB77BEFF6F058
25,293,967 UART: [art] PUB.Y = 4F27BA36F937081A53BC76B039AF95074B1DA64679101F3FE90F74C61C9BD9E56CF35B8983982BD58D92A316E70A5DDC
25,301,194 UART: [art] SIG.R = E7FD41EC178C1EB74B8E8434BCF9E0B83C788CA4663177EC63E81FD44453865B7A9F5DF4ABFED2A5F8AEC1A200D19F72
25,308,614 UART: [art] SIG.S = B85AD3C222F3010E9ACAC638321C2B6CE807F3101314AFA6FDAF987EB8153DCF02B95AF2D1A5A16A9AEAC5BBD1408C7F
26,287,982 UART: Caliptra RT
26,288,680 UART: [state] CFI Enabled
26,421,031 UART: [rt] RT listening for mailbox commands...
29,597,586 >>> mbox cmd response: failed
29,599,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,748,425 UART:
29,748,738 UART: Running Caliptra FMC ...
29,749,866 UART:
29,750,051 UART: [state] CFI Enabled
29,750,988 UART: [art] Extend RT PCRs Done
29,752,132 UART: [art] Lock RT PCRs Done
29,753,206 UART: [art] Populate DV Done
29,754,185 UART: [fht] FMC Alias Private Key: 7
29,755,592 UART: [art] Derive CDI
29,756,338 UART: [art] Store in slot 0x4
29,757,406 UART: [art] Derive Key Pair
29,758,408 UART: [art] Store priv key in slot 0x5
32,136,398 UART: [art] Derive Key Pair - Done
32,149,130 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,856,051 UART: [art] Erasing AUTHORITY.KEYID = 7
33,857,564 UART: [art] PUB.X = 124178EF76C1AD3CFCC9BF67B0A093E14A6C6F3EE190E48B9E85C9CA1E9EB7B3D6920A3A5B6FDEF42A6FB77BEFF6F058
33,864,891 UART: [art] PUB.Y = 4F27BA36F937081A53BC76B039AF95074B1DA64679101F3FE90F74C61C9BD9E56CF35B8983982BD58D92A316E70A5DDC
33,872,115 UART: [art] SIG.R = E7FD41EC178C1EB74B8E8434BCF9E0B83C788CA4663177EC63E81FD44453865B7A9F5DF4ABFED2A5F8AEC1A200D19F72
33,879,483 UART: [art] SIG.S = B85AD3C222F3010E9ACAC638321C2B6CE807F3101314AFA6FDAF987EB8153DCF02B95AF2D1A5A16A9AEAC5BBD1408C7F
34,858,219 UART: Caliptra RT
34,858,941 UART: [state] CFI Enabled
35,232,254 UART: [rt] RT listening for mailbox commands...
47,986,503 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,909 UART: [kat] SHA2-256
881,840 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,955 UART: [kat] ++
886,107 UART: [kat] sha1
890,465 UART: [kat] SHA2-256
892,403 UART: [kat] SHA2-384
895,226 UART: [kat] SHA2-512-ACC
897,127 UART: [kat] ECC-384
902,352 UART: [kat] HMAC-384Kdf
906,816 UART: [kat] LMS
1,475,012 UART: [kat] --
1,475,783 UART: [cold-reset] ++
1,476,257 UART: [fht] Storing FHT @ 0x50003400
1,478,962 UART: [idev] ++
1,479,130 UART: [idev] CDI.KEYID = 6
1,479,490 UART: [idev] SUBJECT.KEYID = 7
1,479,914 UART: [idev] UDS.KEYID = 0
1,480,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,766 UART: [idev] Erasing UDS.KEYID = 0
1,504,390 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,106 UART: [idev] --
1,514,139 UART: [ldev] ++
1,514,307 UART: [ldev] CDI.KEYID = 6
1,514,670 UART: [ldev] SUBJECT.KEYID = 5
1,515,096 UART: [ldev] AUTHORITY.KEYID = 7
1,515,559 UART: [ldev] FE.KEYID = 1
1,520,541 UART: [ldev] Erasing FE.KEYID = 1
1,545,192 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,526 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,238 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,292 UART: [ldev] --
1,584,721 UART: [fwproc] Waiting for Commands...
1,585,476 UART: [fwproc] Received command 0x46574c44
1,586,267 UART: [fwproc] Received Image of size 118548 bytes
2,930,553 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,243 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,461 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,778 >>> mbox cmd response: success
3,128,778 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,129,802 UART: [afmc] ++
3,129,970 UART: [afmc] CDI.KEYID = 6
3,130,332 UART: [afmc] SUBJECT.KEYID = 7
3,130,757 UART: [afmc] AUTHORITY.KEYID = 5
3,165,674 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,182,798 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,188,507 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,390 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,073 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,207,979 UART: [afmc] --
3,209,037 UART: [cold-reset] --
3,209,933 UART: [state] Locking Datavault
3,210,924 UART: [state] Locking PCR0, PCR1 and PCR31
3,211,528 UART: [state] Locking ICCM
3,212,042 UART: [exit] Launching FMC @ 0x40000130
3,217,372 UART:
3,217,388 UART: Running Caliptra FMC ...
3,217,796 UART:
3,217,850 UART: [state] CFI Enabled
3,228,262 UART: [fht] FMC Alias Private Key: 7
3,347,854 UART: [art] Extend RT PCRs Done
3,348,282 UART: [art] Lock RT PCRs Done
3,349,836 UART: [art] Populate DV Done
3,358,085 UART: [fht] FMC Alias Private Key: 7
3,359,135 UART: [art] Derive CDI
3,359,415 UART: [art] Store in slot 0x4
3,444,981 UART: [art] Derive Key Pair
3,445,341 UART: [art] Store priv key in slot 0x5
3,458,862 UART: [art] Derive Key Pair - Done
3,473,593 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,488,734 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,499 UART: [art] PUB.X = B240C359575BF76B1EDC3F7FB6368F2A941D0E7252454640B00D0DE6960D96618DA07F48E02C66F489D61E47DC3AC29A
3,496,261 UART: [art] PUB.Y = F4808B5598087BF3E1DE0A34C5610B4D2AFB4B0B8117F25A8F2150A29ABA1C6397850BDD5C7E70530C138926220952FC
3,503,192 UART: [art] SIG.R = 32213758DB2E9EBA1E40EAD3CE683F3CE0F81EC42D5BECBE20DAB05C59E5B01576AAE50847AA82EAEB7CABFB81DEA5A5
3,509,993 UART: [art] SIG.S = E84FDCEAD9BEDDFED315764A039EE6BC88EEE603BCB4D757B485820300E563020883F606BE932F2FA4BAE1E071F79F0A
3,533,562 UART: Caliptra RT
3,533,813 UART: [state] CFI Enabled
3,653,357 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,655,386 UART:
3,655,402 UART: Running Caliptra ROM ...
3,655,810 UART:
3,655,864 UART: [state] CFI Enabled
3,658,610 UART: [state] LifecycleState = Unprovisioned
3,659,265 UART: [state] DebugLocked = No
3,659,841 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,661,342 UART: [kat] SHA2-256
4,455,273 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,459,388 UART: [kat] ++
4,459,540 UART: [kat] sha1
4,463,798 UART: [kat] SHA2-256
4,465,736 UART: [kat] SHA2-384
4,468,569 UART: [kat] SHA2-512-ACC
4,470,469 UART: [kat] ECC-384
4,475,940 UART: [kat] HMAC-384Kdf
4,480,712 UART: [kat] LMS
5,048,908 UART: [kat] --
5,049,525 UART: [update-reset] ++
5,087,132 >>> mbox cmd response: failed
5,087,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,087,484 UART: ROM Non-Fatal Error: 0x000B001D
5,088,312 UART: [state] Locking Datavault
5,089,096 UART: [state] Locking PCR0, PCR1 and PCR31
5,089,700 UART: [state] Locking ICCM
5,090,214 UART: [exit] Launching FMC @ 0x40000130
5,095,544 UART:
5,095,560 UART: Running Caliptra FMC ...
5,095,968 UART:
5,096,022 UART: [state] CFI Enabled
5,184,839 UART: [art] Extend RT PCRs Done
5,185,267 UART: [art] Lock RT PCRs Done
5,186,258 UART: [art] Populate DV Done
5,194,389 UART: [fht] FMC Alias Private Key: 7
5,195,551 UART: [art] Derive CDI
5,195,831 UART: [art] Store in slot 0x4
5,281,435 UART: [art] Derive Key Pair
5,281,795 UART: [art] Store priv key in slot 0x5
5,295,218 UART: [art] Derive Key Pair - Done
5,310,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,325,544 UART: [art] Erasing AUTHORITY.KEYID = 7
5,326,309 UART: [art] PUB.X = B240C359575BF76B1EDC3F7FB6368F2A941D0E7252454640B00D0DE6960D96618DA07F48E02C66F489D61E47DC3AC29A
5,333,071 UART: [art] PUB.Y = F4808B5598087BF3E1DE0A34C5610B4D2AFB4B0B8117F25A8F2150A29ABA1C6397850BDD5C7E70530C138926220952FC
5,340,002 UART: [art] SIG.R = 32213758DB2E9EBA1E40EAD3CE683F3CE0F81EC42D5BECBE20DAB05C59E5B01576AAE50847AA82EAEB7CABFB81DEA5A5
5,346,803 UART: [art] SIG.S = E84FDCEAD9BEDDFED315764A039EE6BC88EEE603BCB4D757B485820300E563020883F606BE932F2FA4BAE1E071F79F0A
5,370,740 UART: Caliptra RT
5,370,991 UART: [state] CFI Enabled
5,740,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,742,346 UART:
5,742,362 UART: Running Caliptra ROM ...
5,742,770 UART:
5,742,824 UART: [state] CFI Enabled
5,745,452 UART: [state] LifecycleState = Unprovisioned
5,746,107 UART: [state] DebugLocked = No
5,746,649 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,748,122 UART: [kat] SHA2-256
6,542,053 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,546,168 UART: [kat] ++
6,546,320 UART: [kat] sha1
6,550,602 UART: [kat] SHA2-256
6,552,540 UART: [kat] SHA2-384
6,555,317 UART: [kat] SHA2-512-ACC
6,557,217 UART: [kat] ECC-384
6,562,600 UART: [kat] HMAC-384Kdf
6,567,208 UART: [kat] LMS
7,135,404 UART: [kat] --
7,136,273 UART: [update-reset] ++
8,518,559 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,519,777 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,675,044 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,980 >>> mbox cmd response: success
2,981,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,043,419 UART:
3,043,435 UART: Running Caliptra FMC ...
3,043,843 UART:
3,043,897 UART: [state] CFI Enabled
3,054,595 UART: [fht] FMC Alias Private Key: 7
3,173,073 UART: [art] Extend RT PCRs Done
3,173,501 UART: [art] Lock RT PCRs Done
3,174,797 UART: [art] Populate DV Done
3,183,068 UART: [fht] FMC Alias Private Key: 7
3,184,034 UART: [art] Derive CDI
3,184,314 UART: [art] Store in slot 0x4
3,269,720 UART: [art] Derive Key Pair
3,270,080 UART: [art] Store priv key in slot 0x5
3,282,855 UART: [art] Derive Key Pair - Done
3,297,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,075 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,840 UART: [art] PUB.X = 10FA4DB206BD9D89A461B1157C994D7B08C4CC9108225E3F7816F0628A09BB4E488CF1E8A03B70AA3C7913EB12EF53A1
3,320,606 UART: [art] PUB.Y = 626B76689DCD52A0D73BF1E4A3C7A43283B5A0D34597FC95E05E50CFC47DC88193B49A4484547AE67C6FC429B0AF75F6
3,327,564 UART: [art] SIG.R = EE2E4A49D1C6CE868C8CA3F26D5BF2ADEE0A99B1C2E7379DB60B6CF2F0E4FEADB415583344E9139582ED543B292DD238
3,334,348 UART: [art] SIG.S = E59DDFA77F4B67B40676335E0DF28C753A1F2AD96E62475F270AA1D051222C0851BEEBFEC8153BBA3FEDD4338B5FBD7C
3,358,424 UART: Caliptra RT
3,358,675 UART: [state] CFI Enabled
3,478,778 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,796,326 >>> mbox cmd response: failed
4,796,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,802,066 UART:
4,802,082 UART: Running Caliptra FMC ...
4,802,490 UART:
4,802,544 UART: [state] CFI Enabled
4,891,677 UART: [art] Extend RT PCRs Done
4,892,105 UART: [art] Lock RT PCRs Done
4,893,340 UART: [art] Populate DV Done
4,901,783 UART: [fht] FMC Alias Private Key: 7
4,902,873 UART: [art] Derive CDI
4,903,153 UART: [art] Store in slot 0x4
4,989,059 UART: [art] Derive Key Pair
4,989,419 UART: [art] Store priv key in slot 0x5
5,002,790 UART: [art] Derive Key Pair - Done
5,017,305 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,033,044 UART: [art] Erasing AUTHORITY.KEYID = 7
5,033,809 UART: [art] PUB.X = 10FA4DB206BD9D89A461B1157C994D7B08C4CC9108225E3F7816F0628A09BB4E488CF1E8A03B70AA3C7913EB12EF53A1
5,040,575 UART: [art] PUB.Y = 626B76689DCD52A0D73BF1E4A3C7A43283B5A0D34597FC95E05E50CFC47DC88193B49A4484547AE67C6FC429B0AF75F6
5,047,533 UART: [art] SIG.R = EE2E4A49D1C6CE868C8CA3F26D5BF2ADEE0A99B1C2E7379DB60B6CF2F0E4FEADB415583344E9139582ED543B292DD238
5,054,317 UART: [art] SIG.S = E59DDFA77F4B67B40676335E0DF28C753A1F2AD96E62475F270AA1D051222C0851BEEBFEC8153BBA3FEDD4338B5FBD7C
5,078,349 UART: Caliptra RT
5,078,600 UART: [state] CFI Enabled
5,446,448 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,261,518 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,481 UART: [state] LifecycleState = Unprovisioned
86,136 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,138 UART: [kat] SHA2-256
882,069 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,184 UART: [kat] ++
886,336 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
903,113 UART: [kat] HMAC-384Kdf
907,671 UART: [kat] LMS
1,475,867 UART: [kat] --
1,476,652 UART: [cold-reset] ++
1,477,088 UART: [fht] Storing FHT @ 0x50003400
1,480,101 UART: [idev] ++
1,480,269 UART: [idev] CDI.KEYID = 6
1,480,629 UART: [idev] SUBJECT.KEYID = 7
1,481,053 UART: [idev] UDS.KEYID = 0
1,481,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,725 UART: [idev] Erasing UDS.KEYID = 0
1,505,145 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,655 UART: [idev] --
1,514,560 UART: [ldev] ++
1,514,728 UART: [ldev] CDI.KEYID = 6
1,515,091 UART: [ldev] SUBJECT.KEYID = 5
1,515,517 UART: [ldev] AUTHORITY.KEYID = 7
1,515,980 UART: [ldev] FE.KEYID = 1
1,521,288 UART: [ldev] Erasing FE.KEYID = 1
1,547,191 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,859 UART: [ldev] --
1,586,280 UART: [fwproc] Waiting for Commands...
1,587,037 UART: [fwproc] Received command 0x46574c44
1,587,828 UART: [fwproc] Received Image of size 118548 bytes
2,931,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,092 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,310 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,721 >>> mbox cmd response: success
3,130,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,791 UART: [afmc] ++
3,131,959 UART: [afmc] CDI.KEYID = 6
3,132,321 UART: [afmc] SUBJECT.KEYID = 7
3,132,746 UART: [afmc] AUTHORITY.KEYID = 5
3,168,219 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,505 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,285 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,994 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,877 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,560 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,532 UART: [afmc] --
3,211,658 UART: [cold-reset] --
3,212,512 UART: [state] Locking Datavault
3,213,515 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,119 UART: [state] Locking ICCM
3,214,629 UART: [exit] Launching FMC @ 0x40000130
3,219,959 UART:
3,219,975 UART: Running Caliptra FMC ...
3,220,383 UART:
3,220,526 UART: [state] CFI Enabled
3,230,876 UART: [fht] FMC Alias Private Key: 7
3,349,462 UART: [art] Extend RT PCRs Done
3,349,890 UART: [art] Lock RT PCRs Done
3,351,848 UART: [art] Populate DV Done
3,360,287 UART: [fht] FMC Alias Private Key: 7
3,361,277 UART: [art] Derive CDI
3,361,557 UART: [art] Store in slot 0x4
3,447,305 UART: [art] Derive Key Pair
3,447,665 UART: [art] Store priv key in slot 0x5
3,460,478 UART: [art] Derive Key Pair - Done
3,475,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,177 UART: [art] PUB.X = 314846403047ED5FE6B97067C2DE2B7D900D1FF84B3D6E809523608A5577BD1AA99654FC7BBB75E972339DD61FA132EB
3,497,948 UART: [art] PUB.Y = 85C2EEF534B3B3F9F246C291CF7466C30565E4E6E3FCF4CC05B304E6F7ED3FD743BB64171A5E106DAB1973DE621501D7
3,504,898 UART: [art] SIG.R = BAA63289E75BACE5B3494B4F880155F3F9D7EF465645CC25D0E309347FD7418DD8838694804386BFB92A8E3A49F6476B
3,511,664 UART: [art] SIG.S = 96A9A4C11882E25C202390F39871418239E5D18D0C1FAE8BB361CAE1A6977FCFA762C1AAD6D40136F2F157CB60032586
3,535,193 UART: Caliptra RT
3,535,536 UART: [state] CFI Enabled
3,656,269 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,396 UART:
3,658,412 UART: Running Caliptra ROM ...
3,658,820 UART:
3,658,961 UART: [state] CFI Enabled
3,661,419 UART: [state] LifecycleState = Unprovisioned
3,662,074 UART: [state] DebugLocked = No
3,662,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,664,307 UART: [kat] SHA2-256
4,458,238 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,462,353 UART: [kat] ++
4,462,505 UART: [kat] sha1
4,466,621 UART: [kat] SHA2-256
4,468,559 UART: [kat] SHA2-384
4,471,282 UART: [kat] SHA2-512-ACC
4,473,182 UART: [kat] ECC-384
4,478,821 UART: [kat] HMAC-384Kdf
4,483,601 UART: [kat] LMS
5,051,797 UART: [kat] --
5,052,552 UART: [update-reset] ++
5,089,991 >>> mbox cmd response: failed
5,089,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,090,555 UART: ROM Non-Fatal Error: 0x000B001D
5,091,481 UART: [state] Locking Datavault
5,092,403 UART: [state] Locking PCR0, PCR1 and PCR31
5,093,007 UART: [state] Locking ICCM
5,093,617 UART: [exit] Launching FMC @ 0x40000130
5,098,947 UART:
5,098,963 UART: Running Caliptra FMC ...
5,099,371 UART:
5,099,514 UART: [state] CFI Enabled
5,188,605 UART: [art] Extend RT PCRs Done
5,189,033 UART: [art] Lock RT PCRs Done
5,190,174 UART: [art] Populate DV Done
5,198,421 UART: [fht] FMC Alias Private Key: 7
5,199,487 UART: [art] Derive CDI
5,199,767 UART: [art] Store in slot 0x4
5,285,329 UART: [art] Derive Key Pair
5,285,689 UART: [art] Store priv key in slot 0x5
5,299,204 UART: [art] Derive Key Pair - Done
5,314,099 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,329,204 UART: [art] Erasing AUTHORITY.KEYID = 7
5,329,969 UART: [art] PUB.X = 314846403047ED5FE6B97067C2DE2B7D900D1FF84B3D6E809523608A5577BD1AA99654FC7BBB75E972339DD61FA132EB
5,336,740 UART: [art] PUB.Y = 85C2EEF534B3B3F9F246C291CF7466C30565E4E6E3FCF4CC05B304E6F7ED3FD743BB64171A5E106DAB1973DE621501D7
5,343,690 UART: [art] SIG.R = BAA63289E75BACE5B3494B4F880155F3F9D7EF465645CC25D0E309347FD7418DD8838694804386BFB92A8E3A49F6476B
5,350,456 UART: [art] SIG.S = 96A9A4C11882E25C202390F39871418239E5D18D0C1FAE8BB361CAE1A6977FCFA762C1AAD6D40136F2F157CB60032586
5,373,773 UART: Caliptra RT
5,374,116 UART: [state] CFI Enabled
5,736,452 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,738,056 UART:
5,738,072 UART: Running Caliptra ROM ...
5,738,480 UART:
5,738,621 UART: [state] CFI Enabled
5,741,185 UART: [state] LifecycleState = Unprovisioned
5,741,840 UART: [state] DebugLocked = No
5,742,466 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,744,013 UART: [kat] SHA2-256
6,537,944 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,542,059 UART: [kat] ++
6,542,211 UART: [kat] sha1
6,546,391 UART: [kat] SHA2-256
6,548,329 UART: [kat] SHA2-384
6,550,926 UART: [kat] SHA2-512-ACC
6,552,826 UART: [kat] ECC-384
6,558,363 UART: [kat] HMAC-384Kdf
6,563,127 UART: [kat] LMS
7,131,323 UART: [kat] --
7,132,146 UART: [update-reset] ++
8,512,154 UART: [update-reset] Image verified using Vendor ECC Key Index 0
8,513,280 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,668,547 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,282 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,341 >>> mbox cmd response: success
2,980,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,041,836 UART:
3,041,852 UART: Running Caliptra FMC ...
3,042,260 UART:
3,042,403 UART: [state] CFI Enabled
3,052,901 UART: [fht] FMC Alias Private Key: 7
3,171,725 UART: [art] Extend RT PCRs Done
3,172,153 UART: [art] Lock RT PCRs Done
3,173,841 UART: [art] Populate DV Done
3,182,346 UART: [fht] FMC Alias Private Key: 7
3,183,326 UART: [art] Derive CDI
3,183,606 UART: [art] Store in slot 0x4
3,269,100 UART: [art] Derive Key Pair
3,269,460 UART: [art] Store priv key in slot 0x5
3,283,221 UART: [art] Derive Key Pair - Done
3,297,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,313,190 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,955 UART: [art] PUB.X = 9EBF43DF3AC53D5E90584C678675F5025079376C767C13401DA521BB51E01F2FEF2505496CBFE700D6BDB977FCA9341B
3,320,703 UART: [art] PUB.Y = BC5327FDD7A72FABC604310BF3278009490ED2E60F4E3D4FDE278EA94D3F4655AC1BA964770F477B9A14CC5355E013A0
3,327,645 UART: [art] SIG.R = 0FD1AF6973A7F0002F0004D58A4443B36617202EEFE0DD6464905D8DD26D5AF419E1BDCD57001D311F851AB719F165E4
3,334,347 UART: [art] SIG.S = BCA82D06B22532D2811B070261F95C0C995711C9597E488BC1D53FF53B062773606339316EFDB8873A981A98DE6A74A3
3,358,210 UART: Caliptra RT
3,358,553 UART: [state] CFI Enabled
3,479,203 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,797,728 >>> mbox cmd response: failed
4,797,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,803,506 UART:
4,803,522 UART: Running Caliptra FMC ...
4,803,930 UART:
4,804,073 UART: [state] CFI Enabled
4,892,798 UART: [art] Extend RT PCRs Done
4,893,226 UART: [art] Lock RT PCRs Done
4,894,415 UART: [art] Populate DV Done
4,902,888 UART: [fht] FMC Alias Private Key: 7
4,904,016 UART: [art] Derive CDI
4,904,296 UART: [art] Store in slot 0x4
4,990,140 UART: [art] Derive Key Pair
4,990,500 UART: [art] Store priv key in slot 0x5
5,004,209 UART: [art] Derive Key Pair - Done
5,018,863 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,034,234 UART: [art] Erasing AUTHORITY.KEYID = 7
5,034,999 UART: [art] PUB.X = 9EBF43DF3AC53D5E90584C678675F5025079376C767C13401DA521BB51E01F2FEF2505496CBFE700D6BDB977FCA9341B
5,041,747 UART: [art] PUB.Y = BC5327FDD7A72FABC604310BF3278009490ED2E60F4E3D4FDE278EA94D3F4655AC1BA964770F477B9A14CC5355E013A0
5,048,689 UART: [art] SIG.R = 0FD1AF6973A7F0002F0004D58A4443B36617202EEFE0DD6464905D8DD26D5AF419E1BDCD57001D311F851AB719F165E4
5,055,391 UART: [art] SIG.S = BCA82D06B22532D2811B070261F95C0C995711C9597E488BC1D53FF53B062773606339316EFDB8873A981A98DE6A74A3
5,078,820 UART: Caliptra RT
5,079,163 UART: [state] CFI Enabled
5,445,792 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,260,329 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,506 UART: [state] LifecycleState = Unprovisioned
86,161 UART: [state] DebugLocked = No
86,699 UART: [state] WD Timer not started. Device not locked for debugging
87,828 UART: [kat] SHA2-256
891,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,482 UART: [kat] ++
895,634 UART: [kat] sha1
899,796 UART: [kat] SHA2-256
901,736 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
915,535 UART: [kat] HMAC-384Kdf
920,299 UART: [kat] LMS
1,168,611 UART: [kat] --
1,169,540 UART: [cold-reset] ++
1,169,950 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,653 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,641 UART: [idev] --
1,208,708 UART: [ldev] ++
1,208,876 UART: [ldev] CDI.KEYID = 6
1,209,240 UART: [ldev] SUBJECT.KEYID = 5
1,209,667 UART: [ldev] AUTHORITY.KEYID = 7
1,210,130 UART: [ldev] FE.KEYID = 1
1,215,260 UART: [ldev] Erasing FE.KEYID = 1
1,240,989 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,099 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,815 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,646 UART: [ldev] --
1,279,925 UART: [fwproc] Wait for Commands...
1,280,670 UART: [fwproc] Recv command 0x46574c44
1,281,403 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,108 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,771 >>> mbox cmd response: success
2,823,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,824,803 UART: [afmc] ++
2,824,971 UART: [afmc] CDI.KEYID = 6
2,825,334 UART: [afmc] SUBJECT.KEYID = 7
2,825,760 UART: [afmc] AUTHORITY.KEYID = 5
2,861,149 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,920 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,379 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,260 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,961 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,708 UART: [afmc] --
2,904,665 UART: [cold-reset] --
2,905,551 UART: [state] Locking Datavault
2,906,950 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,554 UART: [state] Locking ICCM
2,907,982 UART: [exit] Launching FMC @ 0x40000130
2,913,312 UART:
2,913,328 UART: Running Caliptra FMC ...
2,913,736 UART:
2,913,790 UART: [state] CFI Enabled
2,923,850 UART: [fht] FMC Alias Private Key: 7
3,042,822 UART: [art] Extend RT PCRs Done
3,043,250 UART: [art] Lock RT PCRs Done
3,044,652 UART: [art] Populate DV Done
3,052,743 UART: [fht] FMC Alias Private Key: 7
3,053,811 UART: [art] Derive CDI
3,054,091 UART: [art] Store in slot 0x4
3,139,584 UART: [art] Derive Key Pair
3,139,944 UART: [art] Store priv key in slot 0x5
3,152,836 UART: [art] Derive Key Pair - Done
3,167,614 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,182,991 UART: [art] Erasing AUTHORITY.KEYID = 7
3,183,756 UART: [art] PUB.X = 6099CF5C8EB30424B04A8F6BEA4FE516E3913243DBEBE66F7C06D2F67B65AA9C3749DB54D66869990556A5AB752FEF5C
3,190,529 UART: [art] PUB.Y = C8106213E03B72820B26257D8105FF7CDF5E895507608362ED00ED69EA386B8D9794C2021D66C571E2DCE237B27A3F1C
3,197,443 UART: [art] SIG.R = F116B38E46A3A049CAFE26078BDCC1D24E7E21AE85FC5A194B9B9890969165B911AFC3DDCF25084F937911E18A18FD30
3,204,217 UART: [art] SIG.S = 8A5E77F52BC2AF2EE02F19987DFC5003C662E49911A5858ECFB40B0B80CBA04C97493B59E1039CBA5AA0D6DCA564671F
3,227,885 UART: Caliptra RT
3,228,136 UART: [state] CFI Enabled
3,348,144 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,350,282 UART:
3,350,298 UART: Running Caliptra ROM ...
3,350,706 UART:
3,350,761 UART: [state] CFI Enabled
3,353,425 UART: [state] LifecycleState = Unprovisioned
3,354,080 UART: [state] DebugLocked = No
3,354,716 UART: [state] WD Timer not started. Device not locked for debugging
3,355,828 UART: [kat] SHA2-256
4,159,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,163,482 UART: [kat] ++
4,163,634 UART: [kat] sha1
4,167,840 UART: [kat] SHA2-256
4,169,780 UART: [kat] SHA2-384
4,172,649 UART: [kat] SHA2-512-ACC
4,174,549 UART: [kat] ECC-384
4,184,430 UART: [kat] HMAC-384Kdf
4,188,964 UART: [kat] LMS
4,437,276 UART: [kat] --
4,438,060 UART: [update-reset] ++
4,453,511 >>> mbox cmd response: failed
4,453,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,453,917 UART: ROM Non-Fatal Error: 0x000B001D
4,454,837 UART: [state] Locking Datavault
4,455,493 UART: [state] Locking PCR0, PCR1 and PCR31
4,456,097 UART: [state] Locking ICCM
4,456,607 UART: [exit] Launching FMC @ 0x40000130
4,461,937 UART:
4,461,953 UART: Running Caliptra FMC ...
4,462,361 UART:
4,462,415 UART: [state] CFI Enabled
4,551,880 UART: [art] Extend RT PCRs Done
4,552,308 UART: [art] Lock RT PCRs Done
4,553,691 UART: [art] Populate DV Done
4,561,800 UART: [fht] FMC Alias Private Key: 7
4,562,772 UART: [art] Derive CDI
4,563,052 UART: [art] Store in slot 0x4
4,649,063 UART: [art] Derive Key Pair
4,649,423 UART: [art] Store priv key in slot 0x5
4,663,351 UART: [art] Derive Key Pair - Done
4,677,819 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,693,270 UART: [art] Erasing AUTHORITY.KEYID = 7
4,694,035 UART: [art] PUB.X = 6099CF5C8EB30424B04A8F6BEA4FE516E3913243DBEBE66F7C06D2F67B65AA9C3749DB54D66869990556A5AB752FEF5C
4,700,808 UART: [art] PUB.Y = C8106213E03B72820B26257D8105FF7CDF5E895507608362ED00ED69EA386B8D9794C2021D66C571E2DCE237B27A3F1C
4,707,722 UART: [art] SIG.R = F116B38E46A3A049CAFE26078BDCC1D24E7E21AE85FC5A194B9B9890969165B911AFC3DDCF25084F937911E18A18FD30
4,714,496 UART: [art] SIG.S = 8A5E77F52BC2AF2EE02F19987DFC5003C662E49911A5858ECFB40B0B80CBA04C97493B59E1039CBA5AA0D6DCA564671F
4,738,848 UART: Caliptra RT
4,739,099 UART: [state] CFI Enabled
5,103,494 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,021 UART:
5,105,037 UART: Running Caliptra ROM ...
5,105,445 UART:
5,105,500 UART: [state] CFI Enabled
5,108,312 UART: [state] LifecycleState = Unprovisioned
5,108,967 UART: [state] DebugLocked = No
5,109,527 UART: [state] WD Timer not started. Device not locked for debugging
5,110,873 UART: [kat] SHA2-256
5,914,423 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,918,527 UART: [kat] ++
5,918,679 UART: [kat] sha1
5,923,055 UART: [kat] SHA2-256
5,924,995 UART: [kat] SHA2-384
5,927,504 UART: [kat] SHA2-512-ACC
5,929,404 UART: [kat] ECC-384
5,939,271 UART: [kat] HMAC-384Kdf
5,943,745 UART: [kat] LMS
6,192,057 UART: [kat] --
6,192,895 UART: [update-reset] ++
7,551,012 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,552,213 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,707,428 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,996 >>> mbox cmd response: success
2,679,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,575 UART:
2,741,591 UART: Running Caliptra FMC ...
2,741,999 UART:
2,742,053 UART: [state] CFI Enabled
2,752,539 UART: [fht] FMC Alias Private Key: 7
2,871,723 UART: [art] Extend RT PCRs Done
2,872,151 UART: [art] Lock RT PCRs Done
2,873,531 UART: [art] Populate DV Done
2,881,664 UART: [fht] FMC Alias Private Key: 7
2,882,772 UART: [art] Derive CDI
2,883,052 UART: [art] Store in slot 0x4
2,968,741 UART: [art] Derive Key Pair
2,969,101 UART: [art] Store priv key in slot 0x5
2,982,023 UART: [art] Derive Key Pair - Done
2,996,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,223 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,988 UART: [art] PUB.X = 946D6B825B239A6EDAD5D5411F4D139583BD8A658616741DF3DCBBC1EF1209F6271640E8363FD680114EE5A4B326C009
3,019,754 UART: [art] PUB.Y = 77088AB9EAA7E26A35B521604EA213C510831A143D10DD2B407DE90A661187E3E3AB3A263EC4D1E7E4A30AAC75B22570
3,026,701 UART: [art] SIG.R = FD28C945CA5918114D6570E1836AD646FCB4DBA08256BCE9809741664DB818AFD9169E2AE070D8EFAB8C6B25FDB16FF6
3,033,485 UART: [art] SIG.S = D3C80A39C32188CADF4F738034E89FD7794DCDD320ECFC0A0C340A894ED70F1F8DA63F8C84E3D50A88623D92D0593B74
3,057,323 UART: Caliptra RT
3,057,574 UART: [state] CFI Enabled
3,178,152 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,169,838 >>> mbox cmd response: failed
4,169,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,175,908 UART:
4,175,924 UART: Running Caliptra FMC ...
4,176,332 UART:
4,176,386 UART: [state] CFI Enabled
4,265,811 UART: [art] Extend RT PCRs Done
4,266,239 UART: [art] Lock RT PCRs Done
4,267,342 UART: [art] Populate DV Done
4,275,553 UART: [fht] FMC Alias Private Key: 7
4,276,567 UART: [art] Derive CDI
4,276,847 UART: [art] Store in slot 0x4
4,362,296 UART: [art] Derive Key Pair
4,362,656 UART: [art] Store priv key in slot 0x5
4,376,700 UART: [art] Derive Key Pair - Done
4,391,849 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,572 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,337 UART: [art] PUB.X = 946D6B825B239A6EDAD5D5411F4D139583BD8A658616741DF3DCBBC1EF1209F6271640E8363FD680114EE5A4B326C009
4,415,103 UART: [art] PUB.Y = 77088AB9EAA7E26A35B521604EA213C510831A143D10DD2B407DE90A661187E3E3AB3A263EC4D1E7E4A30AAC75B22570
4,422,050 UART: [art] SIG.R = FD28C945CA5918114D6570E1836AD646FCB4DBA08256BCE9809741664DB818AFD9169E2AE070D8EFAB8C6B25FDB16FF6
4,428,834 UART: [art] SIG.S = D3C80A39C32188CADF4F738034E89FD7794DCDD320ECFC0A0C340A894ED70F1F8DA63F8C84E3D50A88623D92D0593B74
4,452,870 UART: Caliptra RT
4,453,121 UART: [state] CFI Enabled
4,819,198 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,308,750 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,201 UART: [state] LifecycleState = Unprovisioned
85,856 UART: [state] DebugLocked = No
86,378 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
891,231 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,335 UART: [kat] ++
895,487 UART: [kat] sha1
899,839 UART: [kat] SHA2-256
901,779 UART: [kat] SHA2-384
904,658 UART: [kat] SHA2-512-ACC
906,559 UART: [kat] ECC-384
916,336 UART: [kat] HMAC-384Kdf
920,944 UART: [kat] LMS
1,169,256 UART: [kat] --
1,170,137 UART: [cold-reset] ++
1,170,531 UART: [fht] FHT @ 0x50003400
1,173,055 UART: [idev] ++
1,173,223 UART: [idev] CDI.KEYID = 6
1,173,584 UART: [idev] SUBJECT.KEYID = 7
1,174,009 UART: [idev] UDS.KEYID = 0
1,174,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,158 UART: [idev] Erasing UDS.KEYID = 0
1,198,762 UART: [idev] Sha1 KeyId Algorithm
1,207,814 UART: [idev] --
1,208,819 UART: [ldev] ++
1,208,987 UART: [ldev] CDI.KEYID = 6
1,209,351 UART: [ldev] SUBJECT.KEYID = 5
1,209,778 UART: [ldev] AUTHORITY.KEYID = 7
1,210,241 UART: [ldev] FE.KEYID = 1
1,215,387 UART: [ldev] Erasing FE.KEYID = 1
1,241,794 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,824 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,713 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,425 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,413 UART: [ldev] --
1,280,682 UART: [fwproc] Wait for Commands...
1,281,259 UART: [fwproc] Recv command 0x46574c44
1,281,992 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,494 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,669 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,990 >>> mbox cmd response: success
2,825,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,827,236 UART: [afmc] ++
2,827,404 UART: [afmc] CDI.KEYID = 6
2,827,767 UART: [afmc] SUBJECT.KEYID = 7
2,828,193 UART: [afmc] AUTHORITY.KEYID = 5
2,864,192 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,409 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,158 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,868 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,749 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,450 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,249 UART: [afmc] --
2,907,100 UART: [cold-reset] --
2,908,102 UART: [state] Locking Datavault
2,909,147 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,751 UART: [state] Locking ICCM
2,910,205 UART: [exit] Launching FMC @ 0x40000130
2,915,535 UART:
2,915,551 UART: Running Caliptra FMC ...
2,915,959 UART:
2,916,102 UART: [state] CFI Enabled
2,926,746 UART: [fht] FMC Alias Private Key: 7
3,046,102 UART: [art] Extend RT PCRs Done
3,046,530 UART: [art] Lock RT PCRs Done
3,047,870 UART: [art] Populate DV Done
3,056,115 UART: [fht] FMC Alias Private Key: 7
3,057,277 UART: [art] Derive CDI
3,057,557 UART: [art] Store in slot 0x4
3,143,008 UART: [art] Derive Key Pair
3,143,368 UART: [art] Store priv key in slot 0x5
3,156,562 UART: [art] Derive Key Pair - Done
3,171,467 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,704 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,469 UART: [art] PUB.X = 5B7FBD988D002FBB0E9E51CE017E13E67F8160C55B96EAA1BC57EF87E80758711A3F2DF3EDCE0FF97CA691C05F1284CD
3,194,225 UART: [art] PUB.Y = B100EF76A42A59316209F76110CAD61342A8550B45EF927BED3929FBEF0E37F6970F7BF2DE18EE0218AE398D8DF5393A
3,201,146 UART: [art] SIG.R = 72625446C1A0066C6D387FDD9BD19390A2C8D4093DB67EF081ADF0C4FCA406974963BD77156A23EFE6FABEFDA600C906
3,207,894 UART: [art] SIG.S = 4B96632E1E13C9D740766A030B9A6AA6CFADCF0470214ABA153E7F4C236F386D8E1566A1CC223E430CDC248240BF1BAA
3,231,540 UART: Caliptra RT
3,231,883 UART: [state] CFI Enabled
3,352,155 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,127 UART:
3,354,143 UART: Running Caliptra ROM ...
3,354,551 UART:
3,354,693 UART: [state] CFI Enabled
3,357,247 UART: [state] LifecycleState = Unprovisioned
3,357,902 UART: [state] DebugLocked = No
3,358,634 UART: [state] WD Timer not started. Device not locked for debugging
3,359,952 UART: [kat] SHA2-256
4,163,502 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,167,606 UART: [kat] ++
4,167,758 UART: [kat] sha1
4,172,048 UART: [kat] SHA2-256
4,173,988 UART: [kat] SHA2-384
4,176,565 UART: [kat] SHA2-512-ACC
4,178,465 UART: [kat] ECC-384
4,188,094 UART: [kat] HMAC-384Kdf
4,192,938 UART: [kat] LMS
4,441,250 UART: [kat] --
4,442,304 UART: [update-reset] ++
4,457,911 >>> mbox cmd response: failed
4,457,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,458,451 UART: ROM Non-Fatal Error: 0x000B001D
4,459,427 UART: [state] Locking Datavault
4,460,183 UART: [state] Locking PCR0, PCR1 and PCR31
4,460,787 UART: [state] Locking ICCM
4,461,291 UART: [exit] Launching FMC @ 0x40000130
4,466,621 UART:
4,466,637 UART: Running Caliptra FMC ...
4,467,045 UART:
4,467,188 UART: [state] CFI Enabled
4,556,133 UART: [art] Extend RT PCRs Done
4,556,561 UART: [art] Lock RT PCRs Done
4,557,628 UART: [art] Populate DV Done
4,565,839 UART: [fht] FMC Alias Private Key: 7
4,566,933 UART: [art] Derive CDI
4,567,213 UART: [art] Store in slot 0x4
4,652,638 UART: [art] Derive Key Pair
4,652,998 UART: [art] Store priv key in slot 0x5
4,666,110 UART: [art] Derive Key Pair - Done
4,680,921 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,298 UART: [art] Erasing AUTHORITY.KEYID = 7
4,697,063 UART: [art] PUB.X = 5B7FBD988D002FBB0E9E51CE017E13E67F8160C55B96EAA1BC57EF87E80758711A3F2DF3EDCE0FF97CA691C05F1284CD
4,703,819 UART: [art] PUB.Y = B100EF76A42A59316209F76110CAD61342A8550B45EF927BED3929FBEF0E37F6970F7BF2DE18EE0218AE398D8DF5393A
4,710,740 UART: [art] SIG.R = 72625446C1A0066C6D387FDD9BD19390A2C8D4093DB67EF081ADF0C4FCA406974963BD77156A23EFE6FABEFDA600C906
4,717,488 UART: [art] SIG.S = 4B96632E1E13C9D740766A030B9A6AA6CFADCF0470214ABA153E7F4C236F386D8E1566A1CC223E430CDC248240BF1BAA
4,740,458 UART: Caliptra RT
4,740,801 UART: [state] CFI Enabled
5,107,236 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,695 UART:
5,108,711 UART: Running Caliptra ROM ...
5,109,119 UART:
5,109,261 UART: [state] CFI Enabled
5,112,073 UART: [state] LifecycleState = Unprovisioned
5,112,728 UART: [state] DebugLocked = No
5,113,264 UART: [state] WD Timer not started. Device not locked for debugging
5,114,432 UART: [kat] SHA2-256
5,917,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,922,086 UART: [kat] ++
5,922,238 UART: [kat] sha1
5,926,506 UART: [kat] SHA2-256
5,928,446 UART: [kat] SHA2-384
5,931,269 UART: [kat] SHA2-512-ACC
5,933,169 UART: [kat] ECC-384
5,942,776 UART: [kat] HMAC-384Kdf
5,947,308 UART: [kat] LMS
6,195,620 UART: [kat] --
6,196,614 UART: [update-reset] ++
7,555,525 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,556,500 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,711,715 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,159 >>> mbox cmd response: success
2,680,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,788 UART:
2,741,804 UART: Running Caliptra FMC ...
2,742,212 UART:
2,742,355 UART: [state] CFI Enabled
2,753,275 UART: [fht] FMC Alias Private Key: 7
2,872,389 UART: [art] Extend RT PCRs Done
2,872,817 UART: [art] Lock RT PCRs Done
2,874,459 UART: [art] Populate DV Done
2,882,700 UART: [fht] FMC Alias Private Key: 7
2,883,794 UART: [art] Derive CDI
2,884,074 UART: [art] Store in slot 0x4
2,969,657 UART: [art] Derive Key Pair
2,970,017 UART: [art] Store priv key in slot 0x5
2,982,877 UART: [art] Derive Key Pair - Done
2,997,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,895 UART: [art] PUB.X = 5AE33C195681E98EC90CB6AA8932D908EF7A126A9DCE2758DC8CF738DFF56D5126C37502F4CE791975E0BAB61F0D96ED
3,020,667 UART: [art] PUB.Y = F336772D1767B6A942FF6778F16545925DFDD99AE69BC862D47B2D2C41446044C408A8348A9BCACB0AA94896B0B620BD
3,027,615 UART: [art] SIG.R = E8D8B495C621BA7D6B76122283EE99F59AD34263BEA38B4EEB21D89A31D0C89265316C9BDEBA2991874E284527F1F1B8
3,034,391 UART: [art] SIG.S = 4BE73840AAEC6F9146826B7171DFC838EAFDE047D150864D87A1B0E1FDD76EB8859CB3278335F0A220AC0B6EDCC74AB6
3,058,732 UART: Caliptra RT
3,059,075 UART: [state] CFI Enabled
3,178,132 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,395 >>> mbox cmd response: failed
4,170,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,176,581 UART:
4,176,597 UART: Running Caliptra FMC ...
4,177,005 UART:
4,177,148 UART: [state] CFI Enabled
4,265,863 UART: [art] Extend RT PCRs Done
4,266,291 UART: [art] Lock RT PCRs Done
4,267,586 UART: [art] Populate DV Done
4,275,535 UART: [fht] FMC Alias Private Key: 7
4,276,473 UART: [art] Derive CDI
4,276,753 UART: [art] Store in slot 0x4
4,362,784 UART: [art] Derive Key Pair
4,363,144 UART: [art] Store priv key in slot 0x5
4,377,258 UART: [art] Derive Key Pair - Done
4,392,198 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,973 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,738 UART: [art] PUB.X = 5AE33C195681E98EC90CB6AA8932D908EF7A126A9DCE2758DC8CF738DFF56D5126C37502F4CE791975E0BAB61F0D96ED
4,415,510 UART: [art] PUB.Y = F336772D1767B6A942FF6778F16545925DFDD99AE69BC862D47B2D2C41446044C408A8348A9BCACB0AA94896B0B620BD
4,422,458 UART: [art] SIG.R = E8D8B495C621BA7D6B76122283EE99F59AD34263BEA38B4EEB21D89A31D0C89265316C9BDEBA2991874E284527F1F1B8
4,429,234 UART: [art] SIG.S = 4BE73840AAEC6F9146826B7171DFC838EAFDE047D150864D87A1B0E1FDD76EB8859CB3278335F0A220AC0B6EDCC74AB6
4,453,243 UART: Caliptra RT
4,453,586 UART: [state] CFI Enabled
4,819,528 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,309,401 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,040 UART: [state] LifecycleState = Unprovisioned
85,695 UART: [state] DebugLocked = No
86,215 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,525 UART: [kat] SHA2-256
903,465 UART: [kat] SHA2-384
906,184 UART: [kat] SHA2-512-ACC
908,085 UART: [kat] ECC-384
917,490 UART: [kat] HMAC-384Kdf
922,238 UART: [kat] LMS
1,170,566 UART: [kat] --
1,171,493 UART: [cold-reset] ++
1,172,009 UART: [fht] FHT @ 0x50003400
1,174,718 UART: [idev] ++
1,174,886 UART: [idev] CDI.KEYID = 6
1,175,246 UART: [idev] SUBJECT.KEYID = 7
1,175,670 UART: [idev] UDS.KEYID = 0
1,176,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,980 UART: [idev] Erasing UDS.KEYID = 0
1,200,671 UART: [idev] Sha1 KeyId Algorithm
1,209,203 UART: [idev] --
1,210,161 UART: [ldev] ++
1,210,329 UART: [ldev] CDI.KEYID = 6
1,210,692 UART: [ldev] SUBJECT.KEYID = 5
1,211,118 UART: [ldev] AUTHORITY.KEYID = 7
1,211,581 UART: [ldev] FE.KEYID = 1
1,216,643 UART: [ldev] Erasing FE.KEYID = 1
1,242,454 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,863 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,579 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,470 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,182 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,197 UART: [ldev] --
1,281,460 UART: [fwproc] Wait for Commands...
1,282,274 UART: [fwproc] Recv command 0x46574c44
1,283,002 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,117 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,834 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,004 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,195 >>> mbox cmd response: success
2,825,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,209 UART: [afmc] ++
2,826,377 UART: [afmc] CDI.KEYID = 6
2,826,739 UART: [afmc] SUBJECT.KEYID = 7
2,827,164 UART: [afmc] AUTHORITY.KEYID = 5
2,862,457 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,108 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,856 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,565 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,448 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,149 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,977 UART: [afmc] --
2,906,087 UART: [cold-reset] --
2,907,061 UART: [state] Locking Datavault
2,908,422 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,026 UART: [state] Locking ICCM
2,909,448 UART: [exit] Launching FMC @ 0x40000130
2,914,778 UART:
2,914,794 UART: Running Caliptra FMC ...
2,915,202 UART:
2,915,256 UART: [state] CFI Enabled
2,925,302 UART: [fht] FMC Alias Private Key: 7
3,044,104 UART: [art] Extend RT PCRs Done
3,044,532 UART: [art] Lock RT PCRs Done
3,046,086 UART: [art] Populate DV Done
3,054,429 UART: [fht] FMC Alias Private Key: 7
3,055,417 UART: [art] Derive CDI
3,055,697 UART: [art] Store in slot 0x4
3,141,622 UART: [art] Derive Key Pair
3,141,982 UART: [art] Store priv key in slot 0x5
3,155,126 UART: [art] Derive Key Pair - Done
3,170,105 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,378 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,143 UART: [art] PUB.X = 73200801DB5E9BD40A39170D8436479125EEC5ECF3A1456AFFBFAD63C73363CA24C6C6093830E66B03A097F6E63D44AF
3,192,901 UART: [art] PUB.Y = 961969165E3D653C0714079EFF93419792CD955B563A8110951260EC81C8FA6E4DF8E610D2AABE6FE744DB1F4E92B2B6
3,199,847 UART: [art] SIG.R = 67974AD1A29EF0616423C1363A2726CC3BE7111A3A8AA1A1EE4EC82B1C181588CF822A4E86F43DC5E6E263A19D684868
3,206,621 UART: [art] SIG.S = 177F9CE8F8CC53DD6D12D3C297FCC9DBB7651D64B5A00DA4A73F90559D4E7E378D665662E0D96F810F7D25F1DE694731
3,230,299 UART: Caliptra RT
3,230,550 UART: [state] CFI Enabled
3,349,594 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,384 UART:
3,351,400 UART: Running Caliptra ROM ...
3,351,808 UART:
3,351,863 UART: [state] CFI Enabled
3,354,483 UART: [state] LifecycleState = Unprovisioned
3,355,138 UART: [state] DebugLocked = No
3,355,816 UART: [state] WD Timer not started. Device not locked for debugging
3,357,020 UART: [kat] SHA2-256
4,162,670 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,166,795 UART: [kat] ++
4,166,947 UART: [kat] sha1
4,171,317 UART: [kat] SHA2-256
4,173,257 UART: [kat] SHA2-384
4,175,986 UART: [kat] SHA2-512-ACC
4,177,886 UART: [kat] ECC-384
4,187,689 UART: [kat] HMAC-384Kdf
4,192,199 UART: [kat] LMS
4,440,527 UART: [kat] --
4,441,443 UART: [update-reset] ++
4,456,758 >>> mbox cmd response: failed
4,456,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,457,220 UART: ROM Non-Fatal Error: 0x000B001D
4,458,160 UART: [state] Locking Datavault
4,458,856 UART: [state] Locking PCR0, PCR1 and PCR31
4,459,460 UART: [state] Locking ICCM
4,460,030 UART: [exit] Launching FMC @ 0x40000130
4,465,360 UART:
4,465,376 UART: Running Caliptra FMC ...
4,465,784 UART:
4,465,838 UART: [state] CFI Enabled
4,555,209 UART: [art] Extend RT PCRs Done
4,555,637 UART: [art] Lock RT PCRs Done
4,556,914 UART: [art] Populate DV Done
4,565,195 UART: [fht] FMC Alias Private Key: 7
4,566,293 UART: [art] Derive CDI
4,566,573 UART: [art] Store in slot 0x4
4,652,180 UART: [art] Derive Key Pair
4,652,540 UART: [art] Store priv key in slot 0x5
4,665,870 UART: [art] Derive Key Pair - Done
4,680,815 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,696,174 UART: [art] Erasing AUTHORITY.KEYID = 7
4,696,939 UART: [art] PUB.X = 73200801DB5E9BD40A39170D8436479125EEC5ECF3A1456AFFBFAD63C73363CA24C6C6093830E66B03A097F6E63D44AF
4,703,697 UART: [art] PUB.Y = 961969165E3D653C0714079EFF93419792CD955B563A8110951260EC81C8FA6E4DF8E610D2AABE6FE744DB1F4E92B2B6
4,710,643 UART: [art] SIG.R = 67974AD1A29EF0616423C1363A2726CC3BE7111A3A8AA1A1EE4EC82B1C181588CF822A4E86F43DC5E6E263A19D684868
4,717,417 UART: [art] SIG.S = 177F9CE8F8CC53DD6D12D3C297FCC9DBB7651D64B5A00DA4A73F90559D4E7E378D665662E0D96F810F7D25F1DE694731
4,741,027 UART: Caliptra RT
4,741,278 UART: [state] CFI Enabled
5,108,457 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,110,306 UART:
5,110,322 UART: Running Caliptra ROM ...
5,110,730 UART:
5,110,785 UART: [state] CFI Enabled
5,113,713 UART: [state] LifecycleState = Unprovisioned
5,114,368 UART: [state] DebugLocked = No
5,114,880 UART: [state] WD Timer not started. Device not locked for debugging
5,115,996 UART: [kat] SHA2-256
5,921,646 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,925,771 UART: [kat] ++
5,925,923 UART: [kat] sha1
5,930,237 UART: [kat] SHA2-256
5,932,177 UART: [kat] SHA2-384
5,935,132 UART: [kat] SHA2-512-ACC
5,937,032 UART: [kat] ECC-384
5,946,611 UART: [kat] HMAC-384Kdf
5,951,017 UART: [kat] LMS
6,199,345 UART: [kat] --
6,200,171 UART: [update-reset] ++
7,559,117 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,560,310 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,715,525 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,718 >>> mbox cmd response: success
2,678,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,643 UART:
2,740,659 UART: Running Caliptra FMC ...
2,741,067 UART:
2,741,121 UART: [state] CFI Enabled
2,751,405 UART: [fht] FMC Alias Private Key: 7
2,870,797 UART: [art] Extend RT PCRs Done
2,871,225 UART: [art] Lock RT PCRs Done
2,873,113 UART: [art] Populate DV Done
2,881,470 UART: [fht] FMC Alias Private Key: 7
2,882,602 UART: [art] Derive CDI
2,882,882 UART: [art] Store in slot 0x4
2,968,865 UART: [art] Derive Key Pair
2,969,225 UART: [art] Store priv key in slot 0x5
2,982,393 UART: [art] Derive Key Pair - Done
2,997,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,259 UART: [art] PUB.X = 83C271C33307A36AFBD50CAE1862AE4950C6C8257F43DD151AD1C545FFD18A0815A6B5864EC33F6C26CE427A72DCB699
3,020,030 UART: [art] PUB.Y = 35D3FBC8B505982AF5D27A7FA8D121C85EF225FD2C649F1AA15928E23D3A00D1452E83F27C4509697C0D1BF11624CAC9
3,026,957 UART: [art] SIG.R = CF7713015DE6C7CFDE74CD7B9AF94CF13A02C96D320C79F37CB023C6461FBADA4E803DFF6DF527484224B0C301F92641
3,033,729 UART: [art] SIG.S = 792191229EBC49D2BDD23F97B1AA72B7031D37661EBC97AEE1114B71C7C5CF87EE631B19631F777F82ED873EA043EE1D
3,057,464 UART: Caliptra RT
3,057,715 UART: [state] CFI Enabled
3,177,656 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,674 >>> mbox cmd response: failed
4,171,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,177,528 UART:
4,177,544 UART: Running Caliptra FMC ...
4,177,952 UART:
4,178,006 UART: [state] CFI Enabled
4,267,291 UART: [art] Extend RT PCRs Done
4,267,719 UART: [art] Lock RT PCRs Done
4,268,616 UART: [art] Populate DV Done
4,277,023 UART: [fht] FMC Alias Private Key: 7
4,278,011 UART: [art] Derive CDI
4,278,291 UART: [art] Store in slot 0x4
4,363,682 UART: [art] Derive Key Pair
4,364,042 UART: [art] Store priv key in slot 0x5
4,378,234 UART: [art] Derive Key Pair - Done
4,393,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,408,325 UART: [art] Erasing AUTHORITY.KEYID = 7
4,409,090 UART: [art] PUB.X = 83C271C33307A36AFBD50CAE1862AE4950C6C8257F43DD151AD1C545FFD18A0815A6B5864EC33F6C26CE427A72DCB699
4,415,861 UART: [art] PUB.Y = 35D3FBC8B505982AF5D27A7FA8D121C85EF225FD2C649F1AA15928E23D3A00D1452E83F27C4509697C0D1BF11624CAC9
4,422,788 UART: [art] SIG.R = CF7713015DE6C7CFDE74CD7B9AF94CF13A02C96D320C79F37CB023C6461FBADA4E803DFF6DF527484224B0C301F92641
4,429,560 UART: [art] SIG.S = 792191229EBC49D2BDD23F97B1AA72B7031D37661EBC97AEE1114B71C7C5CF87EE631B19631F777F82ED873EA043EE1D
4,453,279 UART: Caliptra RT
4,453,530 UART: [state] CFI Enabled
4,815,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,305,755 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,711 UART: [state] LifecycleState = Unprovisioned
85,366 UART: [state] DebugLocked = No
86,004 UART: [state] WD Timer not started. Device not locked for debugging
87,289 UART: [kat] SHA2-256
892,939 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,064 UART: [kat] ++
897,216 UART: [kat] sha1
901,232 UART: [kat] SHA2-256
903,172 UART: [kat] SHA2-384
905,789 UART: [kat] SHA2-512-ACC
907,690 UART: [kat] ECC-384
918,009 UART: [kat] HMAC-384Kdf
922,641 UART: [kat] LMS
1,170,969 UART: [kat] --
1,172,006 UART: [cold-reset] ++
1,172,586 UART: [fht] FHT @ 0x50003400
1,175,283 UART: [idev] ++
1,175,451 UART: [idev] CDI.KEYID = 6
1,175,811 UART: [idev] SUBJECT.KEYID = 7
1,176,235 UART: [idev] UDS.KEYID = 0
1,176,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,091 UART: [idev] Erasing UDS.KEYID = 0
1,201,256 UART: [idev] Sha1 KeyId Algorithm
1,209,796 UART: [idev] --
1,210,728 UART: [ldev] ++
1,210,896 UART: [ldev] CDI.KEYID = 6
1,211,259 UART: [ldev] SUBJECT.KEYID = 5
1,211,685 UART: [ldev] AUTHORITY.KEYID = 7
1,212,148 UART: [ldev] FE.KEYID = 1
1,217,306 UART: [ldev] Erasing FE.KEYID = 1
1,243,281 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,150 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,041 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,874 UART: [ldev] --
1,282,187 UART: [fwproc] Wait for Commands...
1,282,805 UART: [fwproc] Recv command 0x46574c44
1,283,533 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,038 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,535 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,874 >>> mbox cmd response: success
2,825,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,922 UART: [afmc] ++
2,827,090 UART: [afmc] CDI.KEYID = 6
2,827,452 UART: [afmc] SUBJECT.KEYID = 7
2,827,877 UART: [afmc] AUTHORITY.KEYID = 5
2,863,710 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,437 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,185 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,894 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,777 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,478 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,388 UART: [afmc] --
2,907,396 UART: [cold-reset] --
2,908,314 UART: [state] Locking Datavault
2,909,335 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,939 UART: [state] Locking ICCM
2,910,383 UART: [exit] Launching FMC @ 0x40000130
2,915,713 UART:
2,915,729 UART: Running Caliptra FMC ...
2,916,137 UART:
2,916,280 UART: [state] CFI Enabled
2,926,630 UART: [fht] FMC Alias Private Key: 7
3,045,252 UART: [art] Extend RT PCRs Done
3,045,680 UART: [art] Lock RT PCRs Done
3,047,352 UART: [art] Populate DV Done
3,055,437 UART: [fht] FMC Alias Private Key: 7
3,056,613 UART: [art] Derive CDI
3,056,893 UART: [art] Store in slot 0x4
3,142,392 UART: [art] Derive Key Pair
3,142,752 UART: [art] Store priv key in slot 0x5
3,155,816 UART: [art] Derive Key Pair - Done
3,170,743 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,388 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,153 UART: [art] PUB.X = F843BC76C4A3B36ADE29294D0463E81525D286368F46708D152E9BFDC1A3B8903C21330EC9E405CAFC7D5EE910A66895
3,193,918 UART: [art] PUB.Y = C40DB82DAD840EE4F9F1BF613077A4239CCAE1E29B0D21F1847385B99DD6D796A96CEF4B3C0AE85A781D39FFEA4DC1FF
3,200,880 UART: [art] SIG.R = 32D19169E650381408F0E71DC52D16B06E7C294DD525C4E834FF94C477D8BC9830E23B5FC5CB9409324C8450F6A56E9D
3,207,644 UART: [art] SIG.S = 23A4208F5F95FAEBA38FABC1D9EC83ED046C69042103D79C1273CAEE461ACEDF216A2C257B5CEE482E09AAA2B43A1E41
3,231,514 UART: Caliptra RT
3,231,857 UART: [state] CFI Enabled
3,351,423 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,313 UART:
3,353,329 UART: Running Caliptra ROM ...
3,353,737 UART:
3,353,879 UART: [state] CFI Enabled
3,356,627 UART: [state] LifecycleState = Unprovisioned
3,357,282 UART: [state] DebugLocked = No
3,357,886 UART: [state] WD Timer not started. Device not locked for debugging
3,359,090 UART: [kat] SHA2-256
4,164,740 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,168,865 UART: [kat] ++
4,169,017 UART: [kat] sha1
4,173,375 UART: [kat] SHA2-256
4,175,315 UART: [kat] SHA2-384
4,177,906 UART: [kat] SHA2-512-ACC
4,179,806 UART: [kat] ECC-384
4,189,179 UART: [kat] HMAC-384Kdf
4,193,811 UART: [kat] LMS
4,442,139 UART: [kat] --
4,442,997 UART: [update-reset] ++
4,458,606 >>> mbox cmd response: failed
4,458,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,459,048 UART: ROM Non-Fatal Error: 0x000B001D
4,459,890 UART: [state] Locking Datavault
4,460,712 UART: [state] Locking PCR0, PCR1 and PCR31
4,461,316 UART: [state] Locking ICCM
4,461,922 UART: [exit] Launching FMC @ 0x40000130
4,467,252 UART:
4,467,268 UART: Running Caliptra FMC ...
4,467,676 UART:
4,467,819 UART: [state] CFI Enabled
4,557,010 UART: [art] Extend RT PCRs Done
4,557,438 UART: [art] Lock RT PCRs Done
4,558,753 UART: [art] Populate DV Done
4,567,138 UART: [fht] FMC Alias Private Key: 7
4,568,110 UART: [art] Derive CDI
4,568,390 UART: [art] Store in slot 0x4
4,654,247 UART: [art] Derive Key Pair
4,654,607 UART: [art] Store priv key in slot 0x5
4,668,355 UART: [art] Derive Key Pair - Done
4,682,992 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,698,389 UART: [art] Erasing AUTHORITY.KEYID = 7
4,699,154 UART: [art] PUB.X = F843BC76C4A3B36ADE29294D0463E81525D286368F46708D152E9BFDC1A3B8903C21330EC9E405CAFC7D5EE910A66895
4,705,919 UART: [art] PUB.Y = C40DB82DAD840EE4F9F1BF613077A4239CCAE1E29B0D21F1847385B99DD6D796A96CEF4B3C0AE85A781D39FFEA4DC1FF
4,712,881 UART: [art] SIG.R = 32D19169E650381408F0E71DC52D16B06E7C294DD525C4E834FF94C477D8BC9830E23B5FC5CB9409324C8450F6A56E9D
4,719,645 UART: [art] SIG.S = 23A4208F5F95FAEBA38FABC1D9EC83ED046C69042103D79C1273CAEE461ACEDF216A2C257B5CEE482E09AAA2B43A1E41
4,743,373 UART: Caliptra RT
4,743,716 UART: [state] CFI Enabled
5,110,859 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,112,268 UART:
5,112,284 UART: Running Caliptra ROM ...
5,112,692 UART:
5,112,834 UART: [state] CFI Enabled
5,115,722 UART: [state] LifecycleState = Unprovisioned
5,116,377 UART: [state] DebugLocked = No
5,117,095 UART: [state] WD Timer not started. Device not locked for debugging
5,118,253 UART: [kat] SHA2-256
5,923,903 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,928,028 UART: [kat] ++
5,928,180 UART: [kat] sha1
5,932,464 UART: [kat] SHA2-256
5,934,404 UART: [kat] SHA2-384
5,937,163 UART: [kat] SHA2-512-ACC
5,939,063 UART: [kat] ECC-384
5,949,054 UART: [kat] HMAC-384Kdf
5,953,710 UART: [kat] LMS
6,202,038 UART: [kat] --
6,203,056 UART: [update-reset] ++
7,561,702 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
7,562,887 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,718,102 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,583 >>> mbox cmd response: success
2,678,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,084 UART:
2,741,100 UART: Running Caliptra FMC ...
2,741,508 UART:
2,741,651 UART: [state] CFI Enabled
2,752,207 UART: [fht] FMC Alias Private Key: 7
2,871,487 UART: [art] Extend RT PCRs Done
2,871,915 UART: [art] Lock RT PCRs Done
2,873,267 UART: [art] Populate DV Done
2,881,510 UART: [fht] FMC Alias Private Key: 7
2,882,642 UART: [art] Derive CDI
2,882,922 UART: [art] Store in slot 0x4
2,968,695 UART: [art] Derive Key Pair
2,969,055 UART: [art] Store priv key in slot 0x5
2,982,581 UART: [art] Derive Key Pair - Done
2,997,522 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,743 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,508 UART: [art] PUB.X = 35270A73EB14ECC4AF65FEA00A16F8EC28A3DD735918A6260E09601B2A48633A0E716C602D3FDAC7816C2585B465A9A2
3,020,269 UART: [art] PUB.Y = B1768ACC1F362A3C4BBD9425474C80EB71E4FBEA9E6305BF2F2BB1067D7F114A7A323100CA9784F11DC5EB9B7F5AFF36
3,027,209 UART: [art] SIG.R = 7EF249C1633A337E782B3AC33332E5608130843271922D14725C57303BD707459F8B1BC07C71262765CF0F2057512BE9
3,033,957 UART: [art] SIG.S = 2C0F9A783227413955CD8CD07886129FFDCD32F6441B5C862E51FCC8DD6C6EC527C85877AC62CA0B049577DDB3465DA4
3,057,714 UART: Caliptra RT
3,058,057 UART: [state] CFI Enabled
3,177,639 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,171,374 >>> mbox cmd response: failed
4,171,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,177,304 UART:
4,177,320 UART: Running Caliptra FMC ...
4,177,728 UART:
4,177,871 UART: [state] CFI Enabled
4,266,968 UART: [art] Extend RT PCRs Done
4,267,396 UART: [art] Lock RT PCRs Done
4,268,651 UART: [art] Populate DV Done
4,276,934 UART: [fht] FMC Alias Private Key: 7
4,278,028 UART: [art] Derive CDI
4,278,308 UART: [art] Store in slot 0x4
4,363,903 UART: [art] Derive Key Pair
4,364,263 UART: [art] Store priv key in slot 0x5
4,377,157 UART: [art] Derive Key Pair - Done
4,391,880 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,441 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,206 UART: [art] PUB.X = 35270A73EB14ECC4AF65FEA00A16F8EC28A3DD735918A6260E09601B2A48633A0E716C602D3FDAC7816C2585B465A9A2
4,414,967 UART: [art] PUB.Y = B1768ACC1F362A3C4BBD9425474C80EB71E4FBEA9E6305BF2F2BB1067D7F114A7A323100CA9784F11DC5EB9B7F5AFF36
4,421,907 UART: [art] SIG.R = 7EF249C1633A337E782B3AC33332E5608130843271922D14725C57303BD707459F8B1BC07C71262765CF0F2057512BE9
4,428,655 UART: [art] SIG.S = 2C0F9A783227413955CD8CD07886129FFDCD32F6441B5C862E51FCC8DD6C6EC527C85877AC62CA0B049577DDB3465DA4
4,452,382 UART: Caliptra RT
4,452,725 UART: [state] CFI Enabled
4,818,188 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,309,076 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_owner_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,022 writing to cptra_bootfsm_go
192,146 UART:
192,500 UART: Running Caliptra ROM ...
193,618 UART:
193,764 UART: [state] CFI Enabled
260,756 UART: [state] LifecycleState = Unprovisioned
262,731 UART: [state] DebugLocked = No
264,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,755 UART: [kat] SHA2-256
439,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,936 UART: [kat] ++
450,532 UART: [kat] sha1
461,655 UART: [kat] SHA2-256
464,346 UART: [kat] SHA2-384
471,351 UART: [kat] SHA2-512-ACC
473,690 UART: [kat] ECC-384
2,764,646 UART: [kat] HMAC-384Kdf
2,795,973 UART: [kat] LMS
3,986,242 UART: [kat] --
3,990,750 UART: [cold-reset] ++
3,992,151 UART: [fht] Storing FHT @ 0x50003400
4,004,351 UART: [idev] ++
4,004,974 UART: [idev] CDI.KEYID = 6
4,005,897 UART: [idev] SUBJECT.KEYID = 7
4,007,131 UART: [idev] UDS.KEYID = 0
4,010,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,159,589 UART: [idev] Erasing UDS.KEYID = 0
7,343,880 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,589 UART: [idev] --
7,369,756 UART: [ldev] ++
7,370,395 UART: [ldev] CDI.KEYID = 6
7,371,303 UART: [ldev] SUBJECT.KEYID = 5
7,372,522 UART: [ldev] AUTHORITY.KEYID = 7
7,373,818 UART: [ldev] FE.KEYID = 1
7,420,064 UART: [ldev] Erasing FE.KEYID = 1
10,754,291 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,095,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,166 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,504 UART: [ldev] --
13,132,707 UART: [fwproc] Waiting for Commands...
13,134,689 UART: [fwproc] Received command 0x46574c44
13,136,888 UART: [fwproc] Received Image of size 118548 bytes
17,242,070 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,318,285 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,391,487 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,719,547 >>> mbox cmd response: success
17,721,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,870,380 UART: [afmc] ++
17,871,031 UART: [afmc] CDI.KEYID = 6
17,871,928 UART: [afmc] SUBJECT.KEYID = 7
17,873,038 UART: [afmc] AUTHORITY.KEYID = 5
21,096,276 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,640 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,898 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,411,438 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,426,008 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,440,429 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,460,917 UART: [afmc] --
23,465,238 UART: [cold-reset] --
23,470,191 UART: [state] Locking Datavault
23,476,521 UART: [state] Locking PCR0, PCR1 and PCR31
23,478,280 UART: [state] Locking ICCM
23,480,805 UART: [exit] Launching FMC @ 0x40000130
23,489,205 UART:
23,489,450 UART: Running Caliptra FMC ...
23,490,551 UART:
23,490,714 UART: [state] CFI Enabled
23,556,492 UART: [fht] FMC Alias Private Key: 7
25,896,555 UART: [art] Extend RT PCRs Done
25,897,784 UART: [art] Lock RT PCRs Done
25,899,220 UART: [art] Populate DV Done
25,904,699 UART: [fht] FMC Alias Private Key: 7
25,906,237 UART: [art] Derive CDI
25,906,967 UART: [art] Store in slot 0x4
25,965,074 UART: [art] Derive Key Pair
25,966,122 UART: [art] Store priv key in slot 0x5
29,259,166 UART: [art] Derive Key Pair - Done
29,271,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,604 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,114 UART: [art] PUB.X = F9C14409F9DAA1678FED2268A89878B3A49CA68F6E6B7604E95625352E81564AF39D066A18B0FCD96F6398E949721A45
31,569,359 UART: [art] PUB.Y = A915013FB4CDE3D0F0C1115DCEB37955E6E16124C12738025410D2EB35DE3A2CC9728AE46A5F313CB01676A9DD6425AC
31,576,639 UART: [art] SIG.R = 29940E04A4E9E835D21512FF8A5D5657CEFD2309C29DC3B76B1DCBCD991B261EEE0877A3D4AD6A78E95172E573885D88
31,584,030 UART: [art] SIG.S = 323D055398CB96BF49D70D611CB44FF7AAACA916E442EB4FEF14E92985C1700B0E53365ED7303B466B842772B74B6199
32,888,628 UART: Caliptra RT
32,889,341 UART: [state] CFI Enabled
33,066,447 UART: [rt] RT listening for mailbox commands...
33,069,524 UART:
33,069,774 UART: Running Caliptra ROM ...
33,070,886 UART:
33,071,052 UART: [state] CFI Enabled
33,137,237 UART: [state] LifecycleState = Unprovisioned
33,139,167 UART: [state] DebugLocked = No
33,141,313 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,146,750 UART: [kat] SHA2-256
33,316,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,326,934 UART: [kat] ++
33,327,388 UART: [kat] sha1
33,339,354 UART: [kat] SHA2-256
33,342,041 UART: [kat] SHA2-384
33,347,650 UART: [kat] SHA2-512-ACC
33,349,994 UART: [kat] ECC-384
35,642,211 UART: [kat] HMAC-384Kdf
35,675,877 UART: [kat] LMS
36,866,200 UART: [kat] --
36,871,047 UART: [update-reset] ++
36,977,699 >>> mbox cmd response: failed
36,980,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,132,089 UART: ROM Non-Fatal Error: 0x000B001E
37,134,172 UART: [state] Locking Datavault
37,135,260 UART: [state] Locking PCR0, PCR1 and PCR31
37,136,725 UART: [state] Locking ICCM
37,137,655 UART: [exit] Launching FMC @ 0x40000130
37,139,094 UART:
37,139,261 UART: Running Caliptra FMC ...
37,140,366 UART:
37,140,521 UART: [state] CFI Enabled
37,141,444 UART: [art] Extend RT PCRs Done
37,142,585 UART: [art] Lock RT PCRs Done
37,143,651 UART: [art] Populate DV Done
37,144,686 UART: [fht] FMC Alias Private Key: 7
37,146,009 UART: [art] Derive CDI
37,146,777 UART: [art] Store in slot 0x4
37,172,413 UART: [art] Derive Key Pair
37,173,423 UART: [art] Store priv key in slot 0x5
40,448,118 UART: [art] Derive Key Pair - Done
40,461,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,749,219 UART: [art] Erasing AUTHORITY.KEYID = 7
42,750,840 UART: [art] PUB.X = F9C14409F9DAA1678FED2268A89878B3A49CA68F6E6B7604E95625352E81564AF39D066A18B0FCD96F6398E949721A45
42,757,999 UART: [art] PUB.Y = A915013FB4CDE3D0F0C1115DCEB37955E6E16124C12738025410D2EB35DE3A2CC9728AE46A5F313CB01676A9DD6425AC
42,765,231 UART: [art] SIG.R = 29940E04A4E9E835D21512FF8A5D5657CEFD2309C29DC3B76B1DCBCD991B261EEE0877A3D4AD6A78E95172E573885D88
42,772,677 UART: [art] SIG.S = 323D055398CB96BF49D70D611CB44FF7AAACA916E442EB4FEF14E92985C1700B0E53365ED7303B466B842772B74B6199
44,078,068 UART: Caliptra RT
44,078,927 UART: [state] CFI Enabled
44,498,058 UART: [rt] RT listening for mailbox commands...
44,500,545 UART:
44,500,719 UART: Running Caliptra ROM ...
44,501,829 UART:
44,502,028 UART: [state] CFI Enabled
44,561,615 UART: [state] LifecycleState = Unprovisioned
44,563,549 UART: [state] DebugLocked = No
44,565,159 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,569,308 UART: [kat] SHA2-256
44,739,011 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,749,538 UART: [kat] ++
44,750,075 UART: [kat] sha1
44,761,025 UART: [kat] SHA2-256
44,763,717 UART: [kat] SHA2-384
44,768,732 UART: [kat] SHA2-512-ACC
44,771,080 UART: [kat] ECC-384
47,067,155 UART: [kat] HMAC-384Kdf
47,100,718 UART: [kat] LMS
48,291,030 UART: [kat] --
48,295,534 UART: [update-reset] ++
52,485,026 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,488,378 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,886,149 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.07s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
3,805,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,967,171 >>> mbox cmd response: success
17,969,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,648,649 UART:
23,649,190 UART: Running Caliptra FMC ...
23,650,318 UART:
23,650,475 UART: [state] CFI Enabled
23,720,157 UART: [fht] FMC Alias Private Key: 7
26,081,704 UART: [art] Extend RT PCRs Done
26,082,933 UART: [art] Lock RT PCRs Done
26,084,416 UART: [art] Populate DV Done
26,089,963 UART: [fht] FMC Alias Private Key: 7
26,091,670 UART: [art] Derive CDI
26,092,488 UART: [art] Store in slot 0x4
26,150,064 UART: [art] Derive Key Pair
26,151,073 UART: [art] Store priv key in slot 0x5
29,443,841 UART: [art] Derive Key Pair - Done
29,456,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,533 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,046 UART: [art] PUB.X = 7F882447E684508404F8554D020E5B6B05798CDFB3DF6E5FBE2EB4FB988952830A504CFBA2C3B706B12BB070459D2BFB
31,754,293 UART: [art] PUB.Y = DAE080884F72ACE85E22DFE3EB9B4CEAD8C08A1C841E74A6D930457793C2DE82CE0AA169A30A20A886BE48C4F34176FC
31,761,535 UART: [art] SIG.R = 834B90BC4C3202333CBBBB4BD2038568E391D7AB3CC20EBFFBA06694BE64E825C73F3D6E031868D5297DE8A61C36E330
31,768,940 UART: [art] SIG.S = 8E805F9D369C4C53DB371BB0BC72A29D2317F6BBC704A2A59A4D1D6C06FC021CDE87F61128FAAEEA8B365DD01069FE22
33,074,269 UART: Caliptra RT
33,074,964 UART: [state] CFI Enabled
33,270,249 UART: [rt] RT listening for mailbox commands...
36,995,918 >>> mbox cmd response: failed
36,997,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,147,035 UART:
37,147,353 UART: Running Caliptra FMC ...
37,148,446 UART:
37,148,609 UART: [state] CFI Enabled
37,149,537 UART: [art] Extend RT PCRs Done
37,150,688 UART: [art] Lock RT PCRs Done
37,151,755 UART: [art] Populate DV Done
37,152,786 UART: [fht] FMC Alias Private Key: 7
37,154,176 UART: [art] Derive CDI
37,154,914 UART: [art] Store in slot 0x4
37,175,526 UART: [art] Derive Key Pair
37,176,527 UART: [art] Store priv key in slot 0x5
40,468,572 UART: [art] Derive Key Pair - Done
40,481,633 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,769,971 UART: [art] Erasing AUTHORITY.KEYID = 7
42,771,502 UART: [art] PUB.X = 7F882447E684508404F8554D020E5B6B05798CDFB3DF6E5FBE2EB4FB988952830A504CFBA2C3B706B12BB070459D2BFB
42,778,755 UART: [art] PUB.Y = DAE080884F72ACE85E22DFE3EB9B4CEAD8C08A1C841E74A6D930457793C2DE82CE0AA169A30A20A886BE48C4F34176FC
42,786,039 UART: [art] SIG.R = 834B90BC4C3202333CBBBB4BD2038568E391D7AB3CC20EBFFBA06694BE64E825C73F3D6E031868D5297DE8A61C36E330
42,793,444 UART: [art] SIG.S = 8E805F9D369C4C53DB371BB0BC72A29D2317F6BBC704A2A59A4D1D6C06FC021CDE87F61128FAAEEA8B365DD01069FE22
44,098,802 UART: Caliptra RT
44,099,527 UART: [state] CFI Enabled
44,526,448 UART: [rt] RT listening for mailbox commands...
53,209,295 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,608 UART:
192,967 UART: Running Caliptra ROM ...
194,154 UART:
603,765 UART: [state] CFI Enabled
620,020 UART: [state] LifecycleState = Unprovisioned
621,963 UART: [state] DebugLocked = No
623,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,632 UART: [kat] SHA2-256
797,376 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,916 UART: [kat] ++
808,371 UART: [kat] sha1
821,196 UART: [kat] SHA2-256
823,891 UART: [kat] SHA2-384
829,927 UART: [kat] SHA2-512-ACC
832,273 UART: [kat] ECC-384
3,118,042 UART: [kat] HMAC-384Kdf
3,130,849 UART: [kat] LMS
4,320,932 UART: [kat] --
4,325,811 UART: [cold-reset] ++
4,327,213 UART: [fht] Storing FHT @ 0x50003400
4,340,167 UART: [idev] ++
4,340,742 UART: [idev] CDI.KEYID = 6
4,341,684 UART: [idev] SUBJECT.KEYID = 7
4,342,906 UART: [idev] UDS.KEYID = 0
4,346,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,495,098 UART: [idev] Erasing UDS.KEYID = 0
7,634,144 UART: [idev] Using Sha1 for KeyId Algorithm
7,655,223 UART: [idev] --
7,660,389 UART: [ldev] ++
7,660,984 UART: [ldev] CDI.KEYID = 6
7,661,899 UART: [ldev] SUBJECT.KEYID = 5
7,663,125 UART: [ldev] AUTHORITY.KEYID = 7
7,664,367 UART: [ldev] FE.KEYID = 1
7,676,241 UART: [ldev] Erasing FE.KEYID = 1
10,961,841 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,253,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,268,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,283,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,297,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,316,049 UART: [ldev] --
13,321,355 UART: [fwproc] Waiting for Commands...
13,324,004 UART: [fwproc] Received command 0x46574c44
13,326,216 UART: [fwproc] Received Image of size 118548 bytes
17,432,727 UART: [fwproc] Image verified using Vendor ECC Key Index 3
17,504,929 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,118 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,907,410 >>> mbox cmd response: success
17,909,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,058,164 UART: [afmc] ++
18,058,797 UART: [afmc] CDI.KEYID = 6
18,059,725 UART: [afmc] SUBJECT.KEYID = 7
18,060,838 UART: [afmc] AUTHORITY.KEYID = 5
21,230,438 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,201 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,467 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
23,543,948 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
23,558,539 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
23,572,917 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
23,594,938 UART: [afmc] --
23,597,944 UART: [cold-reset] --
23,601,160 UART: [state] Locking Datavault
23,607,494 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,198 UART: [state] Locking ICCM
23,610,358 UART: [exit] Launching FMC @ 0x40000130
23,618,753 UART:
23,619,001 UART: Running Caliptra FMC ...
23,620,042 UART:
23,620,196 UART: [state] CFI Enabled
23,628,247 UART: [fht] FMC Alias Private Key: 7
25,968,088 UART: [art] Extend RT PCRs Done
25,969,323 UART: [art] Lock RT PCRs Done
25,971,094 UART: [art] Populate DV Done
25,976,587 UART: [fht] FMC Alias Private Key: 7
25,978,140 UART: [art] Derive CDI
25,978,905 UART: [art] Store in slot 0x4
26,021,613 UART: [art] Derive Key Pair
26,022,625 UART: [art] Store priv key in slot 0x5
29,264,936 UART: [art] Derive Key Pair - Done
29,278,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,436 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,953 UART: [art] PUB.X = 87E0F609671D7F86F530011642AED556711BBFD1D778EB0560762AD5684B402671F4CF58414F6C51A13F36E6275B3D0E
31,567,225 UART: [art] PUB.Y = 5387F58179023DEBE1B3668DD90BF46FBD0FFF1655E5D498C7E76F331FB797F3EDE1610927F54C2E1837BF25CDAC50DA
31,574,459 UART: [art] SIG.R = 472C82727CD148EADD9AD266B87939E5AFA85A94E151E8A6FA90725BFE34B3C3B057E81C6FCFB83BC4B47499057CB550
31,581,900 UART: [art] SIG.S = CBE46225BD3ABE21AB2416F661C7A498E14EF81BC1542D705BB6406FE6F31293977882C25BB880FD6390ACF63B1A29C1
32,886,688 UART: Caliptra RT
32,887,406 UART: [state] CFI Enabled
33,020,889 UART: [rt] RT listening for mailbox commands...
33,024,063 UART:
33,024,342 UART: Running Caliptra ROM ...
33,025,462 UART:
33,025,684 UART: [state] CFI Enabled
33,037,904 UART: [state] LifecycleState = Unprovisioned
33,039,803 UART: [state] DebugLocked = No
33,042,807 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
33,046,956 UART: [kat] SHA2-256
33,216,691 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
33,227,213 UART: [kat] ++
33,227,704 UART: [kat] sha1
33,239,457 UART: [kat] SHA2-256
33,242,154 UART: [kat] SHA2-384
33,248,621 UART: [kat] SHA2-512-ACC
33,250,986 UART: [kat] ECC-384
35,534,620 UART: [kat] HMAC-384Kdf
35,546,252 UART: [kat] LMS
36,736,291 UART: [kat] --
36,740,844 UART: [update-reset] ++
36,848,650 >>> mbox cmd response: failed
36,850,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
36,999,700 UART: ROM Non-Fatal Error: 0x000B001E
37,001,283 UART: [state] Locking Datavault
37,002,453 UART: [state] Locking PCR0, PCR1 and PCR31
37,004,003 UART: [state] Locking ICCM
37,004,981 UART: [exit] Launching FMC @ 0x40000130
37,006,418 UART:
37,006,590 UART: Running Caliptra FMC ...
37,007,700 UART:
37,007,865 UART: [state] CFI Enabled
37,008,794 UART: [art] Extend RT PCRs Done
37,009,942 UART: [art] Lock RT PCRs Done
37,011,020 UART: [art] Populate DV Done
37,012,081 UART: [fht] FMC Alias Private Key: 7
37,013,416 UART: [art] Derive CDI
37,014,157 UART: [art] Store in slot 0x4
37,015,179 UART: [art] Derive Key Pair
37,016,096 UART: [art] Store priv key in slot 0x5
40,210,873 UART: [art] Derive Key Pair - Done
40,223,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,504,322 UART: [art] Erasing AUTHORITY.KEYID = 7
42,505,912 UART: [art] PUB.X = 87E0F609671D7F86F530011642AED556711BBFD1D778EB0560762AD5684B402671F4CF58414F6C51A13F36E6275B3D0E
42,513,111 UART: [art] PUB.Y = 5387F58179023DEBE1B3668DD90BF46FBD0FFF1655E5D498C7E76F331FB797F3EDE1610927F54C2E1837BF25CDAC50DA
42,520,338 UART: [art] SIG.R = 472C82727CD148EADD9AD266B87939E5AFA85A94E151E8A6FA90725BFE34B3C3B057E81C6FCFB83BC4B47499057CB550
42,527,821 UART: [art] SIG.S = CBE46225BD3ABE21AB2416F661C7A498E14EF81BC1542D705BB6406FE6F31293977882C25BB880FD6390ACF63B1A29C1
43,833,490 UART: Caliptra RT
43,834,197 UART: [state] CFI Enabled
44,207,774 UART: [rt] RT listening for mailbox commands...
44,210,528 UART:
44,210,808 UART: Running Caliptra ROM ...
44,211,929 UART:
44,212,146 UART: [state] CFI Enabled
44,225,954 UART: [state] LifecycleState = Unprovisioned
44,227,835 UART: [state] DebugLocked = No
44,229,839 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
44,235,228 UART: [kat] SHA2-256
44,404,971 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
44,415,492 UART: [kat] ++
44,415,951 UART: [kat] sha1
44,428,191 UART: [kat] SHA2-256
44,430,888 UART: [kat] SHA2-384
44,437,418 UART: [kat] SHA2-512-ACC
44,439,773 UART: [kat] ECC-384
46,723,922 UART: [kat] HMAC-384Kdf
46,736,061 UART: [kat] LMS
47,926,133 UART: [kat] --
47,931,153 UART: [update-reset] ++
52,128,655 UART: [update-reset] Image verified using Vendor ECC Key Index 3
52,132,403 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
52,530,195 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,130,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,791 >>> mbox cmd response: success
18,167,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,810,976 UART:
23,811,403 UART: Running Caliptra FMC ...
23,812,540 UART:
23,812,713 UART: [state] CFI Enabled
23,820,387 UART: [fht] FMC Alias Private Key: 7
26,159,951 UART: [art] Extend RT PCRs Done
26,161,188 UART: [art] Lock RT PCRs Done
26,162,556 UART: [art] Populate DV Done
26,167,995 UART: [fht] FMC Alias Private Key: 7
26,169,657 UART: [art] Derive CDI
26,170,484 UART: [art] Store in slot 0x4
26,213,251 UART: [art] Derive Key Pair
26,214,258 UART: [art] Store priv key in slot 0x5
29,456,662 UART: [art] Derive Key Pair - Done
29,469,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,984 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,530 UART: [art] PUB.X = 8BB2897CE8C0F44E52DE0F0E8252F1ADE0FE99D55669F5F026FB5E44D9B364664FDDD023271989BA48C6712E47918E7E
31,758,583 UART: [art] PUB.Y = AD1D4EF48B2E58D99A44316E85A95CCB3DD95ABA50BFA96ED7D9AD5579261418C25B0FD52056C9BDA682F094165752E6
31,765,886 UART: [art] SIG.R = 1A4BF3F8ACC3D4208F216F406675337A403EA4FF64359AA2E287A421A3EBFC4B4840EF60C4A8EEB523E52312288684A5
31,773,229 UART: [art] SIG.S = 1241D3510D4C188B8F395C87FDDF733006C9CAB03D8026DB8383C0913B70C088E9C8285D8C94831E0AB1FC1A5CED3801
33,078,492 UART: Caliptra RT
33,079,219 UART: [state] CFI Enabled
33,212,998 UART: [rt] RT listening for mailbox commands...
36,855,390 >>> mbox cmd response: failed
36,857,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
37,006,197 UART:
37,006,522 UART: Running Caliptra FMC ...
37,007,578 UART:
37,007,739 UART: [state] CFI Enabled
37,008,682 UART: [art] Extend RT PCRs Done
37,009,841 UART: [art] Lock RT PCRs Done
37,010,920 UART: [art] Populate DV Done
37,011,966 UART: [fht] FMC Alias Private Key: 7
37,013,361 UART: [art] Derive CDI
37,014,111 UART: [art] Store in slot 0x4
37,015,178 UART: [art] Derive Key Pair
37,016,134 UART: [art] Store priv key in slot 0x5
40,208,106 UART: [art] Derive Key Pair - Done
40,221,119 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
42,501,480 UART: [art] Erasing AUTHORITY.KEYID = 7
42,503,002 UART: [art] PUB.X = 8BB2897CE8C0F44E52DE0F0E8252F1ADE0FE99D55669F5F026FB5E44D9B364664FDDD023271989BA48C6712E47918E7E
42,510,269 UART: [art] PUB.Y = AD1D4EF48B2E58D99A44316E85A95CCB3DD95ABA50BFA96ED7D9AD5579261418C25B0FD52056C9BDA682F094165752E6
42,517,516 UART: [art] SIG.R = 1A4BF3F8ACC3D4208F216F406675337A403EA4FF64359AA2E287A421A3EBFC4B4840EF60C4A8EEB523E52312288684A5
42,524,922 UART: [art] SIG.S = 1241D3510D4C188B8F395C87FDDF733006C9CAB03D8026DB8383C0913B70C088E9C8285D8C94831E0AB1FC1A5CED3801
43,830,166 UART: Caliptra RT
43,830,874 UART: [state] CFI Enabled
44,204,886 UART: [rt] RT listening for mailbox commands...
52,801,371 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,777 writing to cptra_bootfsm_go
192,954 UART:
193,315 UART: Running Caliptra ROM ...
194,506 UART:
194,666 UART: [state] CFI Enabled
260,938 UART: [state] LifecycleState = Unprovisioned
262,916 UART: [state] DebugLocked = No
265,676 UART: [state] WD Timer not started. Device not locked for debugging
269,848 UART: [kat] SHA2-256
449,515 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,318 UART: [kat] ++
460,779 UART: [kat] sha1
470,311 UART: [kat] SHA2-256
472,992 UART: [kat] SHA2-384
478,810 UART: [kat] SHA2-512-ACC
481,148 UART: [kat] ECC-384
2,942,539 UART: [kat] HMAC-384Kdf
2,967,284 UART: [kat] LMS
3,443,781 UART: [kat] --
3,449,305 UART: [cold-reset] ++
3,450,927 UART: [fht] FHT @ 0x50003400
3,461,695 UART: [idev] ++
3,462,266 UART: [idev] CDI.KEYID = 6
3,463,238 UART: [idev] SUBJECT.KEYID = 7
3,464,454 UART: [idev] UDS.KEYID = 0
3,467,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,935 UART: [idev] Erasing UDS.KEYID = 0
5,987,529 UART: [idev] Sha1 KeyId Algorithm
6,011,530 UART: [idev] --
6,015,734 UART: [ldev] ++
6,016,325 UART: [ldev] CDI.KEYID = 6
6,017,220 UART: [ldev] SUBJECT.KEYID = 5
6,018,464 UART: [ldev] AUTHORITY.KEYID = 7
6,019,710 UART: [ldev] FE.KEYID = 1
6,054,045 UART: [ldev] Erasing FE.KEYID = 1
8,563,080 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,762 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,607 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,060 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,485 UART: [ldev] --
10,370,486 UART: [fwproc] Wait for Commands...
10,372,108 UART: [fwproc] Recv command 0x46574c44
10,374,102 UART: [fwproc] Recv'd Img size: 118548 bytes
13,855,165 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,934,266 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,007,303 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,334,819 >>> mbox cmd response: success
14,336,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,486,682 UART: [afmc] ++
14,487,347 UART: [afmc] CDI.KEYID = 6
14,488,249 UART: [afmc] SUBJECT.KEYID = 7
14,489,304 UART: [afmc] AUTHORITY.KEYID = 5
16,876,155 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,615,190 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,631,075 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,647,103 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,662,734 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,687,100 UART: [afmc] --
18,691,564 UART: [cold-reset] --
18,694,833 UART: [state] Locking Datavault
18,699,334 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,098 UART: [state] Locking ICCM
18,702,926 UART: [exit] Launching FMC @ 0x40000130
18,711,324 UART:
18,711,562 UART: Running Caliptra FMC ...
18,712,670 UART:
18,712,830 UART: [state] CFI Enabled
18,772,289 UART: [fht] FMC Alias Private Key: 7
20,538,770 UART: [art] Extend RT PCRs Done
20,539,990 UART: [art] Lock RT PCRs Done
20,541,483 UART: [art] Populate DV Done
20,547,061 UART: [fht] FMC Alias Private Key: 7
20,548,766 UART: [art] Derive CDI
20,549,506 UART: [art] Store in slot 0x4
20,606,406 UART: [art] Derive Key Pair
20,607,450 UART: [art] Store priv key in slot 0x5
23,070,392 UART: [art] Derive Key Pair - Done
23,083,557 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,824 UART: [art] Erasing AUTHORITY.KEYID = 7
24,797,347 UART: [art] PUB.X = A948A4F10921987111CC743982BE8596C021374818955ACFA4625FFBCC4EFD86A0D2C184244111190FE277E0B0E05F2F
24,804,589 UART: [art] PUB.Y = D679E909F6989EC10ED6043BECA942DEBDC931EE245933C45BAAE2E07921FADD7B79E393C83E3729F3E3500CE50A2228
24,811,836 UART: [art] SIG.R = DE0D3FAC55EA6ECB1296E9FEF8D5C77D9602E866BDC830C8F1088E1DF3F2DC103954376BE2DC50BE5666CE6FCA301824
24,819,236 UART: [art] SIG.S = 0D5CB7FCBD4DF389B51763581F85A463791603BDAFB46299EBD1FE53BF82B5794F45E0304D29271387481007FDBC9488
25,798,505 UART: Caliptra RT
25,799,219 UART: [state] CFI Enabled
25,980,027 UART: [rt] RT listening for mailbox commands...
25,982,886 UART:
25,983,058 UART: Running Caliptra ROM ...
25,984,171 UART:
25,984,329 UART: [state] CFI Enabled
26,049,969 UART: [state] LifecycleState = Unprovisioned
26,051,898 UART: [state] DebugLocked = No
26,054,341 UART: [state] WD Timer not started. Device not locked for debugging
26,057,771 UART: [kat] SHA2-256
26,237,451 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,248,213 UART: [kat] ++
26,248,761 UART: [kat] sha1
26,258,423 UART: [kat] SHA2-256
26,261,112 UART: [kat] SHA2-384
26,267,043 UART: [kat] SHA2-512-ACC
26,269,406 UART: [kat] ECC-384
28,713,602 UART: [kat] HMAC-384Kdf
28,738,467 UART: [kat] LMS
29,214,890 UART: [kat] --
29,220,067 UART: [update-reset] ++
29,268,611 >>> mbox cmd response: failed
29,270,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,420,278 UART: ROM Non-Fatal Error: 0x000B001E
29,421,732 UART: [state] Locking Datavault
29,422,896 UART: [state] Locking PCR0, PCR1 and PCR31
29,424,460 UART: [state] Locking ICCM
29,425,374 UART: [exit] Launching FMC @ 0x40000130
29,426,803 UART:
29,426,969 UART: Running Caliptra FMC ...
29,428,072 UART:
29,428,247 UART: [state] CFI Enabled
29,429,169 UART: [art] Extend RT PCRs Done
29,430,310 UART: [art] Lock RT PCRs Done
29,431,377 UART: [art] Populate DV Done
29,432,412 UART: [fht] FMC Alias Private Key: 7
29,433,732 UART: [art] Derive CDI
29,434,474 UART: [art] Store in slot 0x4
29,460,286 UART: [art] Derive Key Pair
29,461,335 UART: [art] Store priv key in slot 0x5
31,923,999 UART: [art] Derive Key Pair - Done
31,937,015 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,647,834 UART: [art] Erasing AUTHORITY.KEYID = 7
33,649,352 UART: [art] PUB.X = A948A4F10921987111CC743982BE8596C021374818955ACFA4625FFBCC4EFD86A0D2C184244111190FE277E0B0E05F2F
33,656,573 UART: [art] PUB.Y = D679E909F6989EC10ED6043BECA942DEBDC931EE245933C45BAAE2E07921FADD7B79E393C83E3729F3E3500CE50A2228
33,663,869 UART: [art] SIG.R = DE0D3FAC55EA6ECB1296E9FEF8D5C77D9602E866BDC830C8F1088E1DF3F2DC103954376BE2DC50BE5666CE6FCA301824
33,671,275 UART: [art] SIG.S = 0D5CB7FCBD4DF389B51763581F85A463791603BDAFB46299EBD1FE53BF82B5794F45E0304D29271387481007FDBC9488
34,650,311 UART: Caliptra RT
34,651,007 UART: [state] CFI Enabled
35,075,119 UART: [rt] RT listening for mailbox commands...
35,077,524 UART:
35,077,698 UART: Running Caliptra ROM ...
35,078,729 UART:
35,078,884 UART: [state] CFI Enabled
35,137,994 UART: [state] LifecycleState = Unprovisioned
35,139,923 UART: [state] DebugLocked = No
35,142,150 UART: [state] WD Timer not started. Device not locked for debugging
35,146,317 UART: [kat] SHA2-256
35,326,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
35,336,788 UART: [kat] ++
35,337,248 UART: [kat] sha1
35,347,162 UART: [kat] SHA2-256
35,349,860 UART: [kat] SHA2-384
35,356,388 UART: [kat] SHA2-512-ACC
35,358,735 UART: [kat] ECC-384
37,820,635 UART: [kat] HMAC-384Kdf
37,846,414 UART: [kat] LMS
38,322,865 UART: [kat] --
38,328,254 UART: [update-reset] ++
41,829,994 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
41,834,171 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,231,812 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,074 writing to cptra_bootfsm_go
3,463,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,223,883 >>> mbox cmd response: success
14,225,999 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,511,666 UART:
18,512,084 UART: Running Caliptra FMC ...
18,513,257 UART:
18,513,425 UART: [state] CFI Enabled
18,579,530 UART: [fht] FMC Alias Private Key: 7
20,346,111 UART: [art] Extend RT PCRs Done
20,347,337 UART: [art] Lock RT PCRs Done
20,349,185 UART: [art] Populate DV Done
20,354,728 UART: [fht] FMC Alias Private Key: 7
20,356,336 UART: [art] Derive CDI
20,357,162 UART: [art] Store in slot 0x4
20,412,671 UART: [art] Derive Key Pair
20,413,717 UART: [art] Store priv key in slot 0x5
22,876,852 UART: [art] Derive Key Pair - Done
22,889,643 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,602,277 UART: [art] Erasing AUTHORITY.KEYID = 7
24,603,799 UART: [art] PUB.X = 065D3050AE89F8D198239C6F5890C110CCEED6F3F7AF7F87496CB9A14FB76044DCAC05400B4D2D25B8BB063ADBD3871A
24,611,069 UART: [art] PUB.Y = 4391AEB541FCAA6E0D0AEDEFFE8EB9DA1766000137F4A4C55BAA9C0E2E92E944262B466C81132D37445E13211586EFBA
24,618,306 UART: [art] SIG.R = 55C7D9BBD8D178819B13D95248AEF764D7BC38A373E5BB1F7BA14A69A59C40DCE942D0497ABB09A9F9D263C7AD38EAAC
24,625,765 UART: [art] SIG.S = 4F4EC861233966BDAC3235F45C93FA200245A9F0716F272708728167030968758DC1BA31F9DE0788C14274B96E945B86
25,604,481 UART: Caliptra RT
25,605,180 UART: [state] CFI Enabled
25,786,960 UART: [rt] RT listening for mailbox commands...
29,087,267 >>> mbox cmd response: failed
29,089,063 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,238,230 UART:
29,238,546 UART: Running Caliptra FMC ...
29,239,680 UART:
29,239,853 UART: [state] CFI Enabled
29,240,779 UART: [art] Extend RT PCRs Done
29,241,920 UART: [art] Lock RT PCRs Done
29,242,991 UART: [art] Populate DV Done
29,244,028 UART: [fht] FMC Alias Private Key: 7
29,245,380 UART: [art] Derive CDI
29,246,144 UART: [art] Store in slot 0x4
29,266,990 UART: [art] Derive Key Pair
29,268,063 UART: [art] Store priv key in slot 0x5
31,730,870 UART: [art] Derive Key Pair - Done
31,744,123 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,456,543 UART: [art] Erasing AUTHORITY.KEYID = 7
33,458,051 UART: [art] PUB.X = 065D3050AE89F8D198239C6F5890C110CCEED6F3F7AF7F87496CB9A14FB76044DCAC05400B4D2D25B8BB063ADBD3871A
33,465,372 UART: [art] PUB.Y = 4391AEB541FCAA6E0D0AEDEFFE8EB9DA1766000137F4A4C55BAA9C0E2E92E944262B466C81132D37445E13211586EFBA
33,472,614 UART: [art] SIG.R = 55C7D9BBD8D178819B13D95248AEF764D7BC38A373E5BB1F7BA14A69A59C40DCE942D0497ABB09A9F9D263C7AD38EAAC
33,480,022 UART: [art] SIG.S = 4F4EC861233966BDAC3235F45C93FA200245A9F0716F272708728167030968758DC1BA31F9DE0788C14274B96E945B86
34,458,939 UART: Caliptra RT
34,459,674 UART: [state] CFI Enabled
34,880,139 UART: [rt] RT listening for mailbox commands...
42,047,676 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,320 writing to cptra_bootfsm_go
192,584 UART:
192,940 UART: Running Caliptra ROM ...
194,120 UART:
603,674 UART: [state] CFI Enabled
617,698 UART: [state] LifecycleState = Unprovisioned
619,646 UART: [state] DebugLocked = No
621,435 UART: [state] WD Timer not started. Device not locked for debugging
625,611 UART: [kat] SHA2-256
805,268 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,051 UART: [kat] ++
816,511 UART: [kat] sha1
827,932 UART: [kat] SHA2-256
830,659 UART: [kat] SHA2-384
834,926 UART: [kat] SHA2-512-ACC
837,330 UART: [kat] ECC-384
3,278,201 UART: [kat] HMAC-384Kdf
3,290,828 UART: [kat] LMS
3,767,361 UART: [kat] --
3,771,785 UART: [cold-reset] ++
3,772,805 UART: [fht] FHT @ 0x50003400
3,783,571 UART: [idev] ++
3,784,149 UART: [idev] CDI.KEYID = 6
3,785,173 UART: [idev] SUBJECT.KEYID = 7
3,786,341 UART: [idev] UDS.KEYID = 0
3,789,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,310 UART: [idev] Erasing UDS.KEYID = 0
6,264,349 UART: [idev] Sha1 KeyId Algorithm
6,289,336 UART: [idev] --
6,294,584 UART: [ldev] ++
6,295,228 UART: [ldev] CDI.KEYID = 6
6,296,145 UART: [ldev] SUBJECT.KEYID = 5
6,297,332 UART: [ldev] AUTHORITY.KEYID = 7
6,298,575 UART: [ldev] FE.KEYID = 1
6,307,559 UART: [ldev] Erasing FE.KEYID = 1
8,782,473 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,658 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,024 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,792 UART: [ldev] --
10,576,974 UART: [fwproc] Wait for Commands...
10,579,619 UART: [fwproc] Recv command 0x46574c44
10,581,609 UART: [fwproc] Recv'd Img size: 118548 bytes
14,060,789 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,145,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,584 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,547,098 >>> mbox cmd response: success
14,548,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,697,734 UART: [afmc] ++
14,698,381 UART: [afmc] CDI.KEYID = 6
14,699,303 UART: [afmc] SUBJECT.KEYID = 7
14,700,409 UART: [afmc] AUTHORITY.KEYID = 5
17,061,959 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,005 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,786,423 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,802,059 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,818,089 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,833,672 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
18,857,607 UART: [afmc] --
18,862,125 UART: [cold-reset] --
18,867,671 UART: [state] Locking Datavault
18,872,526 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,233 UART: [state] Locking ICCM
18,875,328 UART: [exit] Launching FMC @ 0x40000130
18,883,742 UART:
18,883,985 UART: Running Caliptra FMC ...
18,885,095 UART:
18,885,263 UART: [state] CFI Enabled
18,893,586 UART: [fht] FMC Alias Private Key: 7
20,659,727 UART: [art] Extend RT PCRs Done
20,660,964 UART: [art] Lock RT PCRs Done
20,662,676 UART: [art] Populate DV Done
20,668,090 UART: [fht] FMC Alias Private Key: 7
20,669,636 UART: [art] Derive CDI
20,670,456 UART: [art] Store in slot 0x4
20,713,487 UART: [art] Derive Key Pair
20,714,519 UART: [art] Store priv key in slot 0x5
23,141,597 UART: [art] Derive Key Pair - Done
23,154,330 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,861,052 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,567 UART: [art] PUB.X = 93872F0E2958930D2C943B854E2784DEEB5654097DDC7DA6380287D6A0F51CA311DAB6F65E9FD7B8A595E3E787292B8A
24,869,864 UART: [art] PUB.Y = 14CBD4885AFE483E8E16B3FA74628E043D843FA06CC712498AB4293D8341D50F18D3E1800FA86BA3F6A3D9261A2C1E9F
24,877,053 UART: [art] SIG.R = DDF00B5D47A779A209C38094B2CEF76765E65F3D58C477B92FEF21F8E9C835C642CED42F5ABF5EDC250D20082096DDAC
24,884,501 UART: [art] SIG.S = 764E8146E7FF93869E2E80A251C82E271602BD7C7D62B621EB9DF89688C08B0C60206B7152BD24D09F479C1F19343CB2
25,863,205 UART: Caliptra RT
25,863,920 UART: [state] CFI Enabled
25,995,942 UART: [rt] RT listening for mailbox commands...
25,998,956 UART:
25,999,127 UART: Running Caliptra ROM ...
26,000,155 UART:
26,000,531 UART: [state] CFI Enabled
26,014,535 UART: [state] LifecycleState = Unprovisioned
26,016,429 UART: [state] DebugLocked = No
26,018,328 UART: [state] WD Timer not started. Device not locked for debugging
26,022,395 UART: [kat] SHA2-256
26,202,145 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
26,212,934 UART: [kat] ++
26,213,398 UART: [kat] sha1
26,224,937 UART: [kat] SHA2-256
26,227,619 UART: [kat] SHA2-384
26,231,764 UART: [kat] SHA2-512-ACC
26,234,122 UART: [kat] ECC-384
28,680,048 UART: [kat] HMAC-384Kdf
28,692,434 UART: [kat] LMS
29,168,889 UART: [kat] --
29,173,261 UART: [update-reset] ++
29,221,585 >>> mbox cmd response: failed
29,223,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,372,922 UART: ROM Non-Fatal Error: 0x000B001E
29,374,356 UART: [state] Locking Datavault
29,375,435 UART: [state] Locking PCR0, PCR1 and PCR31
29,376,996 UART: [state] Locking ICCM
29,377,878 UART: [exit] Launching FMC @ 0x40000130
29,379,226 UART:
29,379,380 UART: Running Caliptra FMC ...
29,380,487 UART:
29,380,644 UART: [state] CFI Enabled
29,381,480 UART: [art] Extend RT PCRs Done
29,382,537 UART: [art] Lock RT PCRs Done
29,383,519 UART: [art] Populate DV Done
29,384,552 UART: [fht] FMC Alias Private Key: 7
29,385,800 UART: [art] Derive CDI
29,386,530 UART: [art] Store in slot 0x4
29,387,595 UART: [art] Derive Key Pair
29,388,540 UART: [art] Store priv key in slot 0x5
31,766,699 UART: [art] Derive Key Pair - Done
31,779,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,485,765 UART: [art] Erasing AUTHORITY.KEYID = 7
33,487,249 UART: [art] PUB.X = 93872F0E2958930D2C943B854E2784DEEB5654097DDC7DA6380287D6A0F51CA311DAB6F65E9FD7B8A595E3E787292B8A
33,494,559 UART: [art] PUB.Y = 14CBD4885AFE483E8E16B3FA74628E043D843FA06CC712498AB4293D8341D50F18D3E1800FA86BA3F6A3D9261A2C1E9F
33,501,831 UART: [art] SIG.R = DDF00B5D47A779A209C38094B2CEF76765E65F3D58C477B92FEF21F8E9C835C642CED42F5ABF5EDC250D20082096DDAC
33,509,264 UART: [art] SIG.S = 764E8146E7FF93869E2E80A251C82E271602BD7C7D62B621EB9DF89688C08B0C60206B7152BD24D09F479C1F19343CB2
34,487,981 UART: Caliptra RT
34,488,694 UART: [state] CFI Enabled
34,865,402 UART: [rt] RT listening for mailbox commands...
34,868,215 UART:
34,868,386 UART: Running Caliptra ROM ...
34,869,496 UART:
34,869,818 UART: [state] CFI Enabled
40,304,630 UART: [state] LifecycleState = Unprovisioned
40,306,693 UART: [state] DebugLocked = No
40,308,418 UART: [state] WD Timer not started. Device not locked for debugging
40,312,338 UART: [kat] SHA2-256
40,492,036 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,502,829 UART: [kat] ++
40,503,319 UART: [kat] sha1
40,514,748 UART: [kat] SHA2-256
40,517,450 UART: [kat] SHA2-384
40,522,248 UART: [kat] SHA2-512-ACC
40,524,600 UART: [kat] ECC-384
42,965,859 UART: [kat] HMAC-384Kdf
42,977,658 UART: [kat] LMS
43,454,120 UART: [kat] --
43,458,106 UART: [update-reset] ++
46,951,262 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
46,955,021 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,352,664 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,407 writing to cptra_bootfsm_go
3,785,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,112 >>> mbox cmd response: success
14,447,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,694,877 UART:
18,695,299 UART: Running Caliptra FMC ...
18,696,618 UART:
18,696,793 UART: [state] CFI Enabled
18,704,728 UART: [fht] FMC Alias Private Key: 7
20,470,736 UART: [art] Extend RT PCRs Done
20,471,969 UART: [art] Lock RT PCRs Done
20,473,545 UART: [art] Populate DV Done
20,478,976 UART: [fht] FMC Alias Private Key: 7
20,480,472 UART: [art] Derive CDI
20,481,260 UART: [art] Store in slot 0x4
20,524,239 UART: [art] Derive Key Pair
20,525,249 UART: [art] Store priv key in slot 0x5
22,952,023 UART: [art] Derive Key Pair - Done
22,965,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,671,363 UART: [art] Erasing AUTHORITY.KEYID = 7
24,672,874 UART: [art] PUB.X = 6131D839AED440E56C014AA257181AF73E2B7CFAF4D21CCB6D905EE598559C33D5B9484CC55CFC9ACFD807D2E8B7BCE2
24,680,135 UART: [art] PUB.Y = C2F2AEECA60261DF575195841497D4DF13355CF37672742CE53B97437CA05B17A3B738A6C9DA3AC0CDE8CC96E0530C0C
24,687,395 UART: [art] SIG.R = ED9B9861A3ECF9489C6CCB01D1409011905DE17F96D266F31FE158A2B27BAA27F7D2A66CF32802E97470120AF911526E
24,694,851 UART: [art] SIG.S = 93D9DFED44B2FF8C7C513BC7F33ACC4C2B67680620D141737CE4CC450F1A00BAAAB9ABF7FD7203905251FE3E965A858C
25,673,798 UART: Caliptra RT
25,674,514 UART: [state] CFI Enabled
25,807,404 UART: [rt] RT listening for mailbox commands...
29,023,663 >>> mbox cmd response: failed
29,025,364 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,174,325 UART:
29,174,652 UART: Running Caliptra FMC ...
29,175,781 UART:
29,175,951 UART: [state] CFI Enabled
29,176,878 UART: [art] Extend RT PCRs Done
29,178,019 UART: [art] Lock RT PCRs Done
29,179,091 UART: [art] Populate DV Done
29,180,075 UART: [fht] FMC Alias Private Key: 7
29,181,431 UART: [art] Derive CDI
29,182,176 UART: [art] Store in slot 0x4
29,183,243 UART: [art] Derive Key Pair
29,184,244 UART: [art] Store priv key in slot 0x5
31,561,391 UART: [art] Derive Key Pair - Done
31,574,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,280,832 UART: [art] Erasing AUTHORITY.KEYID = 7
33,282,326 UART: [art] PUB.X = 6131D839AED440E56C014AA257181AF73E2B7CFAF4D21CCB6D905EE598559C33D5B9484CC55CFC9ACFD807D2E8B7BCE2
33,289,637 UART: [art] PUB.Y = C2F2AEECA60261DF575195841497D4DF13355CF37672742CE53B97437CA05B17A3B738A6C9DA3AC0CDE8CC96E0530C0C
33,296,895 UART: [art] SIG.R = ED9B9861A3ECF9489C6CCB01D1409011905DE17F96D266F31FE158A2B27BAA27F7D2A66CF32802E97470120AF911526E
33,304,292 UART: [art] SIG.S = 93D9DFED44B2FF8C7C513BC7F33ACC4C2B67680620D141737CE4CC450F1A00BAAAB9ABF7FD7203905251FE3E965A858C
34,282,622 UART: Caliptra RT
34,283,334 UART: [state] CFI Enabled
34,659,047 UART: [rt] RT listening for mailbox commands...
47,383,709 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.80s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
192,243 UART:
192,614 UART: Running Caliptra ROM ...
193,713 UART:
193,855 UART: [state] CFI Enabled
257,436 UART: [state] LifecycleState = Unprovisioned
259,860 UART: [state] DebugLocked = No
261,105 UART: [state] WD Timer not started. Device not locked for debugging
265,272 UART: [kat] SHA2-256
455,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,958 UART: [kat] ++
466,410 UART: [kat] sha1
476,751 UART: [kat] SHA2-256
479,760 UART: [kat] SHA2-384
485,904 UART: [kat] SHA2-512-ACC
488,464 UART: [kat] ECC-384
2,942,873 UART: [kat] HMAC-384Kdf
2,966,860 UART: [kat] LMS
3,498,640 UART: [kat] --
3,501,885 UART: [cold-reset] ++
3,504,097 UART: [fht] FHT @ 0x50003400
3,514,383 UART: [idev] ++
3,515,127 UART: [idev] CDI.KEYID = 6
3,516,044 UART: [idev] SUBJECT.KEYID = 7
3,517,270 UART: [idev] UDS.KEYID = 0
3,520,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,670,102 UART: [idev] Erasing UDS.KEYID = 0
6,025,591 UART: [idev] Sha1 KeyId Algorithm
6,047,866 UART: [idev] --
6,051,550 UART: [ldev] ++
6,052,241 UART: [ldev] CDI.KEYID = 6
6,053,160 UART: [ldev] SUBJECT.KEYID = 5
6,054,330 UART: [ldev] AUTHORITY.KEYID = 7
6,055,538 UART: [ldev] FE.KEYID = 1
6,093,968 UART: [ldev] Erasing FE.KEYID = 1
8,601,346 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,234 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,572 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,402,133 UART: [ldev] --
10,407,023 UART: [fwproc] Wait for Commands...
10,410,160 UART: [fwproc] Recv command 0x46574c44
10,412,467 UART: [fwproc] Recv'd Img size: 118548 bytes
13,906,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
13,982,542 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,106,116 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,665,568 >>> mbox cmd response: success
14,667,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,816,488 UART: [afmc] ++
14,817,127 UART: [afmc] CDI.KEYID = 6
14,818,057 UART: [afmc] SUBJECT.KEYID = 7
14,819,171 UART: [afmc] AUTHORITY.KEYID = 5
17,204,576 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,930,411 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,932,331 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
18,947,377 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
18,962,338 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
18,977,337 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,000,412 UART: [afmc] --
19,003,858 UART: [cold-reset] --
19,006,974 UART: [state] Locking Datavault
19,012,392 UART: [state] Locking PCR0, PCR1 and PCR31
19,014,582 UART: [state] Locking ICCM
19,016,090 UART: [exit] Launching FMC @ 0x40000130
19,024,732 UART:
19,024,975 UART: Running Caliptra FMC ...
19,026,083 UART:
19,026,265 UART: [state] CFI Enabled
19,087,515 UART: [fht] FMC Alias Private Key: 7
20,854,317 UART: [art] Extend RT PCRs Done
20,855,541 UART: [art] Lock RT PCRs Done
20,857,120 UART: [art] Populate DV Done
20,862,701 UART: [fht] FMC Alias Private Key: 7
20,864,188 UART: [art] Derive CDI
20,864,951 UART: [art] Store in slot 0x4
20,919,792 UART: [art] Derive Key Pair
20,920,850 UART: [art] Store priv key in slot 0x5
23,383,763 UART: [art] Derive Key Pair - Done
23,396,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,108,815 UART: [art] Erasing AUTHORITY.KEYID = 7
25,110,350 UART: [art] PUB.X = 3B14717B0F51D316139B7A4BC32E80E2A3C521C202D9990748F611C407CDB3FCAA1AB8BFC0612D7D65FF2F7324C516F8
25,117,554 UART: [art] PUB.Y = 24D79DB60AC87920B7C14AAD5CCE9E76EFA21EC33EED5997E3BB54D59D33D99815CB5F76006656FA3F06C9A871B122BC
25,124,845 UART: [art] SIG.R = 0122E92D4D3B4E1AC39823D219DD4E01EA384CC6E7AC2F43D08EF2A4681BC05E317E6523A73B50F1D4DF50355145BDED
25,132,283 UART: [art] SIG.S = 7276A9B4E25A77A1A774C7E80C326336962F2CC48ACEBF0C603B0E81FA89C67B779C03F607EC22DEA1DC8FFC8C5783B1
26,110,999 UART: Caliptra RT
26,111,708 UART: [state] CFI Enabled
26,292,778 UART: [rt] RT listening for mailbox commands...
26,295,731 UART:
26,295,986 UART: Running Caliptra ROM ...
26,297,018 UART:
26,297,174 UART: [state] CFI Enabled
26,363,828 UART: [state] LifecycleState = Unprovisioned
26,365,916 UART: [state] DebugLocked = No
26,367,229 UART: [state] WD Timer not started. Device not locked for debugging
26,371,458 UART: [kat] SHA2-256
26,561,327 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,572,078 UART: [kat] ++
26,572,546 UART: [kat] sha1
26,583,871 UART: [kat] SHA2-256
26,586,894 UART: [kat] SHA2-384
26,591,268 UART: [kat] SHA2-512-ACC
26,593,888 UART: [kat] ECC-384
29,048,579 UART: [kat] HMAC-384Kdf
29,071,155 UART: [kat] LMS
29,602,704 UART: [kat] --
29,605,893 UART: [update-reset] ++
29,666,954 >>> mbox cmd response: failed
29,669,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,818,441 UART: ROM Non-Fatal Error: 0x000B001E
29,819,875 UART: [state] Locking Datavault
29,821,036 UART: [state] Locking PCR0, PCR1 and PCR31
29,822,581 UART: [state] Locking ICCM
29,823,511 UART: [exit] Launching FMC @ 0x40000130
29,824,947 UART:
29,825,115 UART: Running Caliptra FMC ...
29,826,217 UART:
29,826,377 UART: [state] CFI Enabled
29,827,301 UART: [art] Extend RT PCRs Done
29,828,440 UART: [art] Lock RT PCRs Done
29,829,509 UART: [art] Populate DV Done
29,830,542 UART: [fht] FMC Alias Private Key: 7
29,831,863 UART: [art] Derive CDI
29,832,605 UART: [art] Store in slot 0x4
29,856,898 UART: [art] Derive Key Pair
29,857,946 UART: [art] Store priv key in slot 0x5
32,320,502 UART: [art] Derive Key Pair - Done
32,333,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,046,411 UART: [art] Erasing AUTHORITY.KEYID = 7
34,047,955 UART: [art] PUB.X = 3B14717B0F51D316139B7A4BC32E80E2A3C521C202D9990748F611C407CDB3FCAA1AB8BFC0612D7D65FF2F7324C516F8
34,055,169 UART: [art] PUB.Y = 24D79DB60AC87920B7C14AAD5CCE9E76EFA21EC33EED5997E3BB54D59D33D99815CB5F76006656FA3F06C9A871B122BC
34,062,413 UART: [art] SIG.R = 0122E92D4D3B4E1AC39823D219DD4E01EA384CC6E7AC2F43D08EF2A4681BC05E317E6523A73B50F1D4DF50355145BDED
34,069,812 UART: [art] SIG.S = 7276A9B4E25A77A1A774C7E80C326336962F2CC48ACEBF0C603B0E81FA89C67B779C03F607EC22DEA1DC8FFC8C5783B1
35,048,812 UART: Caliptra RT
35,049,534 UART: [state] CFI Enabled
35,466,743 UART: [rt] RT listening for mailbox commands...
35,469,281 UART:
35,469,499 UART: Running Caliptra ROM ...
35,470,615 UART:
35,470,783 UART: [state] CFI Enabled
35,538,780 UART: [state] LifecycleState = Unprovisioned
35,540,874 UART: [state] DebugLocked = No
35,543,294 UART: [state] WD Timer not started. Device not locked for debugging
35,547,364 UART: [kat] SHA2-256
35,737,191 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
35,747,982 UART: [kat] ++
35,748,474 UART: [kat] sha1
35,759,797 UART: [kat] SHA2-256
35,762,815 UART: [kat] SHA2-384
35,769,462 UART: [kat] SHA2-512-ACC
35,772,015 UART: [kat] ECC-384
38,219,650 UART: [kat] HMAC-384Kdf
38,242,840 UART: [kat] LMS
38,774,402 UART: [kat] --
38,777,962 UART: [update-reset] ++
42,287,202 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
42,291,280 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
42,920,981 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,437,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,829,448 >>> mbox cmd response: success
14,832,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,115,176 UART:
19,115,650 UART: Running Caliptra FMC ...
19,116,784 UART:
19,116,942 UART: [state] CFI Enabled
19,181,791 UART: [fht] FMC Alias Private Key: 7
20,947,786 UART: [art] Extend RT PCRs Done
20,949,014 UART: [art] Lock RT PCRs Done
20,950,623 UART: [art] Populate DV Done
20,955,895 UART: [fht] FMC Alias Private Key: 7
20,957,547 UART: [art] Derive CDI
20,958,368 UART: [art] Store in slot 0x4
21,015,435 UART: [art] Derive Key Pair
21,016,480 UART: [art] Store priv key in slot 0x5
23,480,525 UART: [art] Derive Key Pair - Done
23,493,350 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,205,959 UART: [art] Erasing AUTHORITY.KEYID = 7
25,207,460 UART: [art] PUB.X = 98C95711F7BBB62BA63C24B5D4962992A55AFD1C408DC0E046E256A6ED74FE206469988A0004B5BC88AAECF2DA2106CA
25,214,729 UART: [art] PUB.Y = 845FD03915A952A9E06531988EE5E6ED29B7ABF48F041FE20A19C5D1E266BE447A15BF5B735E2F9318C6EE09E3F95E51
25,221,962 UART: [art] SIG.R = 0ED6E02FC3CE2E227746BA76C0FB37ACD32FCE76507C19B93044AC001201984323BE050728CB69AB825F125DC804738C
25,229,334 UART: [art] SIG.S = 9ED9A721C7DD3C2261D0EC453DBEC265DC947A7992244FD914FC4C97216003982B29F7338CFDC9D8947E2F3AE147942F
26,208,501 UART: Caliptra RT
26,209,214 UART: [state] CFI Enabled
26,388,699 UART: [rt] RT listening for mailbox commands...
29,679,605 >>> mbox cmd response: failed
29,681,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,830,705 UART:
29,831,033 UART: Running Caliptra FMC ...
29,832,077 UART:
29,832,233 UART: [state] CFI Enabled
29,833,162 UART: [art] Extend RT PCRs Done
29,834,308 UART: [art] Lock RT PCRs Done
29,835,486 UART: [art] Populate DV Done
29,836,473 UART: [fht] FMC Alias Private Key: 7
29,837,876 UART: [art] Derive CDI
29,838,621 UART: [art] Store in slot 0x4
29,860,239 UART: [art] Derive Key Pair
29,861,251 UART: [art] Store priv key in slot 0x5
32,324,170 UART: [art] Derive Key Pair - Done
32,337,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,050,511 UART: [art] Erasing AUTHORITY.KEYID = 7
34,052,160 UART: [art] PUB.X = 98C95711F7BBB62BA63C24B5D4962992A55AFD1C408DC0E046E256A6ED74FE206469988A0004B5BC88AAECF2DA2106CA
34,059,337 UART: [art] PUB.Y = 845FD03915A952A9E06531988EE5E6ED29B7ABF48F041FE20A19C5D1E266BE447A15BF5B735E2F9318C6EE09E3F95E51
34,066,581 UART: [art] SIG.R = 0ED6E02FC3CE2E227746BA76C0FB37ACD32FCE76507C19B93044AC001201984323BE050728CB69AB825F125DC804738C
34,073,899 UART: [art] SIG.S = 9ED9A721C7DD3C2261D0EC453DBEC265DC947A7992244FD914FC4C97216003982B29F7338CFDC9D8947E2F3AE147942F
35,053,054 UART: Caliptra RT
35,053,772 UART: [state] CFI Enabled
35,476,583 UART: [rt] RT listening for mailbox commands...
43,231,715 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,220 writing to cptra_bootfsm_go
192,499 UART:
192,867 UART: Running Caliptra ROM ...
194,056 UART:
603,736 UART: [state] CFI Enabled
618,012 UART: [state] LifecycleState = Unprovisioned
620,438 UART: [state] DebugLocked = No
622,968 UART: [state] WD Timer not started. Device not locked for debugging
628,226 UART: [kat] SHA2-256
818,108 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,890 UART: [kat] ++
829,486 UART: [kat] sha1
841,459 UART: [kat] SHA2-256
844,443 UART: [kat] SHA2-384
849,999 UART: [kat] SHA2-512-ACC
852,619 UART: [kat] ECC-384
3,293,904 UART: [kat] HMAC-384Kdf
3,306,843 UART: [kat] LMS
3,838,676 UART: [kat] --
3,844,614 UART: [cold-reset] ++
3,846,710 UART: [fht] FHT @ 0x50003400
3,857,205 UART: [idev] ++
3,857,889 UART: [idev] CDI.KEYID = 6
3,858,861 UART: [idev] SUBJECT.KEYID = 7
3,860,086 UART: [idev] UDS.KEYID = 0
3,863,062 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,253 UART: [idev] Erasing UDS.KEYID = 0
6,338,501 UART: [idev] Sha1 KeyId Algorithm
6,359,757 UART: [idev] --
6,365,185 UART: [ldev] ++
6,365,875 UART: [ldev] CDI.KEYID = 6
6,366,766 UART: [ldev] SUBJECT.KEYID = 5
6,367,984 UART: [ldev] AUTHORITY.KEYID = 7
6,369,165 UART: [ldev] FE.KEYID = 1
6,378,318 UART: [ldev] Erasing FE.KEYID = 1
8,853,278 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,598 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,965 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,113 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,254 UART: [ldev] --
10,645,550 UART: [fwproc] Wait for Commands...
10,647,650 UART: [fwproc] Recv command 0x46574c44
10,649,919 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,481 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
14,222,896 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,467 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,907,486 >>> mbox cmd response: success
14,909,300 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,058,241 UART: [afmc] ++
15,058,891 UART: [afmc] CDI.KEYID = 6
15,059,792 UART: [afmc] SUBJECT.KEYID = 7
15,060,907 UART: [afmc] AUTHORITY.KEYID = 5
17,420,131 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,275 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,248 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
19,158,322 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
19,173,261 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
19,188,268 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
19,213,098 UART: [afmc] --
19,215,896 UART: [cold-reset] --
19,219,244 UART: [state] Locking Datavault
19,223,316 UART: [state] Locking PCR0, PCR1 and PCR31
19,225,457 UART: [state] Locking ICCM
19,228,526 UART: [exit] Launching FMC @ 0x40000130
19,237,200 UART:
19,237,446 UART: Running Caliptra FMC ...
19,238,553 UART:
19,238,715 UART: [state] CFI Enabled
19,246,493 UART: [fht] FMC Alias Private Key: 7
21,012,304 UART: [art] Extend RT PCRs Done
21,013,528 UART: [art] Lock RT PCRs Done
21,015,214 UART: [art] Populate DV Done
21,020,807 UART: [fht] FMC Alias Private Key: 7
21,022,453 UART: [art] Derive CDI
21,023,287 UART: [art] Store in slot 0x4
21,065,951 UART: [art] Derive Key Pair
21,066,980 UART: [art] Store priv key in slot 0x5
23,493,955 UART: [art] Derive Key Pair - Done
23,506,899 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,384 UART: [art] Erasing AUTHORITY.KEYID = 7
25,214,898 UART: [art] PUB.X = 1FEF2D7E30A052D178CA9C7CE34609BAC56480EF1DAF6346FC3296D26A503F4F2BF9DF094F81A006595A8D49AE07A9FE
25,222,142 UART: [art] PUB.Y = 77754591D8252DC5FCD6E787678BD8CE52F02F32E83BF751BD9EFE7CEAD8769F04F9AECB8C21BABC99AF14F23D6F79FA
25,229,481 UART: [art] SIG.R = 5EA98E64F60BA0984FC08BDC908C6F002CD256162315A159E3A92A883BAA77A52BC1A2402C4833793CF4D0AB9A2AE16F
25,236,817 UART: [art] SIG.S = DC0D6F2CE5F749AA25C474E959F841312C0398D2DF23B4865E9AFB62F4E42D9548A3E9438AB569A7D1FEC1A8ACC685D5
26,216,084 UART: Caliptra RT
26,217,009 UART: [state] CFI Enabled
26,348,933 UART: [rt] RT listening for mailbox commands...
26,352,213 UART:
26,352,464 UART: Running Caliptra ROM ...
26,353,574 UART:
26,353,845 UART: [state] CFI Enabled
26,367,403 UART: [state] LifecycleState = Unprovisioned
26,369,275 UART: [state] DebugLocked = No
26,371,468 UART: [state] WD Timer not started. Device not locked for debugging
26,375,764 UART: [kat] SHA2-256
26,565,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
26,576,406 UART: [kat] ++
26,577,007 UART: [kat] sha1
26,588,398 UART: [kat] SHA2-256
26,591,413 UART: [kat] SHA2-384
26,598,215 UART: [kat] SHA2-512-ACC
26,600,783 UART: [kat] ECC-384
29,043,213 UART: [kat] HMAC-384Kdf
29,056,803 UART: [kat] LMS
29,588,442 UART: [kat] --
29,592,832 UART: [update-reset] ++
29,654,721 >>> mbox cmd response: failed
29,657,123 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,805,957 UART: ROM Non-Fatal Error: 0x000B001E
29,807,389 UART: [state] Locking Datavault
29,808,466 UART: [state] Locking PCR0, PCR1 and PCR31
29,810,010 UART: [state] Locking ICCM
29,810,926 UART: [exit] Launching FMC @ 0x40000130
29,812,354 UART:
29,812,511 UART: Running Caliptra FMC ...
29,813,613 UART:
29,813,772 UART: [state] CFI Enabled
29,814,691 UART: [art] Extend RT PCRs Done
29,815,832 UART: [art] Lock RT PCRs Done
29,817,114 UART: [art] Populate DV Done
29,818,164 UART: [fht] FMC Alias Private Key: 7
29,819,491 UART: [art] Derive CDI
29,820,230 UART: [art] Store in slot 0x4
29,821,291 UART: [art] Derive Key Pair
29,822,305 UART: [art] Store priv key in slot 0x5
32,204,789 UART: [art] Derive Key Pair - Done
32,217,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,923,803 UART: [art] Erasing AUTHORITY.KEYID = 7
33,925,315 UART: [art] PUB.X = 1FEF2D7E30A052D178CA9C7CE34609BAC56480EF1DAF6346FC3296D26A503F4F2BF9DF094F81A006595A8D49AE07A9FE
33,932,604 UART: [art] PUB.Y = 77754591D8252DC5FCD6E787678BD8CE52F02F32E83BF751BD9EFE7CEAD8769F04F9AECB8C21BABC99AF14F23D6F79FA
33,939,856 UART: [art] SIG.R = 5EA98E64F60BA0984FC08BDC908C6F002CD256162315A159E3A92A883BAA77A52BC1A2402C4833793CF4D0AB9A2AE16F
33,947,232 UART: [art] SIG.S = DC0D6F2CE5F749AA25C474E959F841312C0398D2DF23B4865E9AFB62F4E42D9548A3E9438AB569A7D1FEC1A8ACC685D5
34,925,325 UART: Caliptra RT
34,926,017 UART: [state] CFI Enabled
35,296,853 UART: [rt] RT listening for mailbox commands...
35,299,649 UART:
35,299,900 UART: Running Caliptra ROM ...
35,301,011 UART:
35,301,230 UART: [state] CFI Enabled
40,325,607 UART: [state] LifecycleState = Unprovisioned
40,327,546 UART: [state] DebugLocked = No
40,328,945 UART: [state] WD Timer not started. Device not locked for debugging
40,333,469 UART: [kat] SHA2-256
40,523,351 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,534,150 UART: [kat] ++
40,534,699 UART: [kat] sha1
40,547,156 UART: [kat] SHA2-256
40,550,168 UART: [kat] SHA2-384
40,556,659 UART: [kat] SHA2-512-ACC
40,559,233 UART: [kat] ECC-384
43,001,797 UART: [kat] HMAC-384Kdf
43,014,081 UART: [kat] LMS
43,545,699 UART: [kat] --
43,552,060 UART: [update-reset] ++
47,061,198 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
47,065,017 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
47,694,791 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.81s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,347 writing to cptra_bootfsm_go
3,758,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,048,192 >>> mbox cmd response: success
15,050,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,297,041 UART:
19,297,471 UART: Running Caliptra FMC ...
19,298,574 UART:
19,298,734 UART: [state] CFI Enabled
19,306,899 UART: [fht] FMC Alias Private Key: 7
21,073,026 UART: [art] Extend RT PCRs Done
21,074,259 UART: [art] Lock RT PCRs Done
21,075,972 UART: [art] Populate DV Done
21,081,580 UART: [fht] FMC Alias Private Key: 7
21,083,119 UART: [art] Derive CDI
21,083,867 UART: [art] Store in slot 0x4
21,126,251 UART: [art] Derive Key Pair
21,127,255 UART: [art] Store priv key in slot 0x5
23,554,595 UART: [art] Derive Key Pair - Done
23,567,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,274,091 UART: [art] Erasing AUTHORITY.KEYID = 7
25,275,643 UART: [art] PUB.X = A7CA9DBE5BEDB04396C0ABFBD06F830E14010745B14B4CDF6FD2051AFB39FB63387B4ABF04A8D270313438F24805E92E
25,282,930 UART: [art] PUB.Y = A0095CCCAC12F31DEA3F5EB4BA79A76DE0A89346DD1D11F65BE53A326DAFF8AFF0789FBB444E8851DC34B4CB8BC5D379
25,290,224 UART: [art] SIG.R = A1FFCF173D7D607974F5B1F73BC5578C6165DADF9892A9865BC825587DA35DBBF55E87FF83ABA07B3455E7D5FEEA7944
25,297,642 UART: [art] SIG.S = 5426461EA53152C4D012DDEB246DD371E976C3E9712E1F8EB0718829E3800D99A5CAF7253D3E747631501154FE0AD4D5
26,275,867 UART: Caliptra RT
26,276,562 UART: [state] CFI Enabled
26,409,091 UART: [rt] RT listening for mailbox commands...
29,603,958 >>> mbox cmd response: failed
29,605,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
29,754,805 UART:
29,755,122 UART: Running Caliptra FMC ...
29,756,166 UART:
29,756,311 UART: [state] CFI Enabled
29,757,185 UART: [art] Extend RT PCRs Done
29,758,355 UART: [art] Lock RT PCRs Done
29,759,429 UART: [art] Populate DV Done
29,760,462 UART: [fht] FMC Alias Private Key: 7
29,761,866 UART: [art] Derive CDI
29,762,607 UART: [art] Store in slot 0x4
29,763,669 UART: [art] Derive Key Pair
29,764,673 UART: [art] Store priv key in slot 0x5
32,144,185 UART: [art] Derive Key Pair - Done
32,157,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,863,960 UART: [art] Erasing AUTHORITY.KEYID = 7
33,865,468 UART: [art] PUB.X = A7CA9DBE5BEDB04396C0ABFBD06F830E14010745B14B4CDF6FD2051AFB39FB63387B4ABF04A8D270313438F24805E92E
33,872,729 UART: [art] PUB.Y = A0095CCCAC12F31DEA3F5EB4BA79A76DE0A89346DD1D11F65BE53A326DAFF8AFF0789FBB444E8851DC34B4CB8BC5D379
33,880,043 UART: [art] SIG.R = A1FFCF173D7D607974F5B1F73BC5578C6165DADF9892A9865BC825587DA35DBBF55E87FF83ABA07B3455E7D5FEEA7944
33,887,468 UART: [art] SIG.S = 5426461EA53152C4D012DDEB246DD371E976C3E9712E1F8EB0718829E3800D99A5CAF7253D3E747631501154FE0AD4D5
34,866,866 UART: Caliptra RT
34,867,577 UART: [state] CFI Enabled
35,242,345 UART: [rt] RT listening for mailbox commands...
47,978,140 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,682 UART: [state] LifecycleState = Unprovisioned
86,337 UART: [state] DebugLocked = No
87,003 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,671 UART: [kat] SHA2-256
882,602 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,717 UART: [kat] ++
886,869 UART: [kat] sha1
891,129 UART: [kat] SHA2-256
893,067 UART: [kat] SHA2-384
895,754 UART: [kat] SHA2-512-ACC
897,655 UART: [kat] ECC-384
903,196 UART: [kat] HMAC-384Kdf
907,822 UART: [kat] LMS
1,476,018 UART: [kat] --
1,476,749 UART: [cold-reset] ++
1,477,303 UART: [fht] Storing FHT @ 0x50003400
1,480,056 UART: [idev] ++
1,480,224 UART: [idev] CDI.KEYID = 6
1,480,584 UART: [idev] SUBJECT.KEYID = 7
1,481,008 UART: [idev] UDS.KEYID = 0
1,481,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,242 UART: [idev] Erasing UDS.KEYID = 0
1,505,740 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,222 UART: [idev] --
1,515,103 UART: [ldev] ++
1,515,271 UART: [ldev] CDI.KEYID = 6
1,515,634 UART: [ldev] SUBJECT.KEYID = 5
1,516,060 UART: [ldev] AUTHORITY.KEYID = 7
1,516,523 UART: [ldev] FE.KEYID = 1
1,521,831 UART: [ldev] Erasing FE.KEYID = 1
1,546,820 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,830 UART: [ldev] --
1,586,143 UART: [fwproc] Waiting for Commands...
1,586,788 UART: [fwproc] Received command 0x46574c44
1,587,579 UART: [fwproc] Received Image of size 118548 bytes
2,931,365 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,958,535 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,046 >>> mbox cmd response: success
3,130,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,234 UART: [afmc] ++
3,131,402 UART: [afmc] CDI.KEYID = 6
3,131,764 UART: [afmc] SUBJECT.KEYID = 7
3,132,189 UART: [afmc] AUTHORITY.KEYID = 5
3,166,889 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,903 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,189,614 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,195,499 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,201,206 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,208,958 UART: [afmc] --
3,210,040 UART: [cold-reset] --
3,210,926 UART: [state] Locking Datavault
3,211,951 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,555 UART: [state] Locking ICCM
3,213,077 UART: [exit] Launching FMC @ 0x40000130
3,218,407 UART:
3,218,423 UART: Running Caliptra FMC ...
3,218,831 UART:
3,218,885 UART: [state] CFI Enabled
3,229,172 UART: [fht] FMC Alias Private Key: 7
3,348,316 UART: [art] Extend RT PCRs Done
3,348,744 UART: [art] Lock RT PCRs Done
3,350,342 UART: [art] Populate DV Done
3,358,482 UART: [fht] FMC Alias Private Key: 7
3,359,552 UART: [art] Derive CDI
3,359,832 UART: [art] Store in slot 0x4
3,445,348 UART: [art] Derive Key Pair
3,445,708 UART: [art] Store priv key in slot 0x5
3,458,971 UART: [art] Derive Key Pair - Done
3,473,699 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,122 UART: [art] Erasing AUTHORITY.KEYID = 7
3,489,887 UART: [art] PUB.X = E5496913F4E7DFE826E3A5A711DB83544C98BCCF871FA4BC07F0266E8B4B9E85EC0C40E2467BF9E42B9BF066445CF298
3,496,663 UART: [art] PUB.Y = DCF89D17DB21F8B83D0E855070B0B75AEA735EE2115256C94B9E4A2BC0415F651CB94773845D0AA2B4D4E041AD3F7DDF
3,503,621 UART: [art] SIG.R = 8657899638D3230F10C7FC9B1BEDABEA116A45E2343D0EA6ECF8140CE809B4515122054FA727ACA1FEA54852CEA226D1
3,510,386 UART: [art] SIG.S = 0691D9A262B71E66BFA5B1F8B33EC8B67926E78C5BDA24BE2D907113C03CB2A2A19B686F15505A05047538C3FA84A88C
3,534,139 UART: Caliptra RT
3,534,390 UART: [state] CFI Enabled
3,655,710 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,657,759 UART:
3,657,775 UART: Running Caliptra ROM ...
3,658,183 UART:
3,658,237 UART: [state] CFI Enabled
3,661,057 UART: [state] LifecycleState = Unprovisioned
3,661,712 UART: [state] DebugLocked = No
3,662,406 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,663,929 UART: [kat] SHA2-256
4,457,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,461,975 UART: [kat] ++
4,462,127 UART: [kat] sha1
4,466,591 UART: [kat] SHA2-256
4,468,529 UART: [kat] SHA2-384
4,471,270 UART: [kat] SHA2-512-ACC
4,473,170 UART: [kat] ECC-384
4,478,729 UART: [kat] HMAC-384Kdf
4,483,343 UART: [kat] LMS
5,051,539 UART: [kat] --
5,052,454 UART: [update-reset] ++
5,091,501 >>> mbox cmd response: failed
5,091,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,091,955 UART: ROM Non-Fatal Error: 0x000B001E
5,092,749 UART: [state] Locking Datavault
5,093,655 UART: [state] Locking PCR0, PCR1 and PCR31
5,094,259 UART: [state] Locking ICCM
5,094,789 UART: [exit] Launching FMC @ 0x40000130
5,100,119 UART:
5,100,135 UART: Running Caliptra FMC ...
5,100,543 UART:
5,100,597 UART: [state] CFI Enabled
5,189,226 UART: [art] Extend RT PCRs Done
5,189,654 UART: [art] Lock RT PCRs Done
5,190,977 UART: [art] Populate DV Done
5,199,413 UART: [fht] FMC Alias Private Key: 7
5,200,477 UART: [art] Derive CDI
5,200,757 UART: [art] Store in slot 0x4
5,286,603 UART: [art] Derive Key Pair
5,286,963 UART: [art] Store priv key in slot 0x5
5,300,358 UART: [art] Derive Key Pair - Done
5,314,832 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,330,419 UART: [art] Erasing AUTHORITY.KEYID = 7
5,331,184 UART: [art] PUB.X = E5496913F4E7DFE826E3A5A711DB83544C98BCCF871FA4BC07F0266E8B4B9E85EC0C40E2467BF9E42B9BF066445CF298
5,337,960 UART: [art] PUB.Y = DCF89D17DB21F8B83D0E855070B0B75AEA735EE2115256C94B9E4A2BC0415F651CB94773845D0AA2B4D4E041AD3F7DDF
5,344,918 UART: [art] SIG.R = 8657899638D3230F10C7FC9B1BEDABEA116A45E2343D0EA6ECF8140CE809B4515122054FA727ACA1FEA54852CEA226D1
5,351,683 UART: [art] SIG.S = 0691D9A262B71E66BFA5B1F8B33EC8B67926E78C5BDA24BE2D907113C03CB2A2A19B686F15505A05047538C3FA84A88C
5,375,078 UART: Caliptra RT
5,375,329 UART: [state] CFI Enabled
5,740,776 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,742,514 UART:
5,742,530 UART: Running Caliptra ROM ...
5,742,938 UART:
5,742,992 UART: [state] CFI Enabled
5,745,928 UART: [state] LifecycleState = Unprovisioned
5,746,583 UART: [state] DebugLocked = No
5,747,069 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,748,630 UART: [kat] SHA2-256
6,542,561 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,546,676 UART: [kat] ++
6,546,828 UART: [kat] sha1
6,551,194 UART: [kat] SHA2-256
6,553,132 UART: [kat] SHA2-384
6,555,861 UART: [kat] SHA2-512-ACC
6,557,761 UART: [kat] ECC-384
6,563,680 UART: [kat] HMAC-384Kdf
6,568,466 UART: [kat] LMS
7,136,662 UART: [kat] --
7,137,469 UART: [update-reset] ++
8,518,439 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,519,725 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,674,992 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,584 >>> mbox cmd response: success
2,978,584 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,040,860 UART:
3,040,876 UART: Running Caliptra FMC ...
3,041,284 UART:
3,041,338 UART: [state] CFI Enabled
3,051,985 UART: [fht] FMC Alias Private Key: 7
3,170,927 UART: [art] Extend RT PCRs Done
3,171,355 UART: [art] Lock RT PCRs Done
3,172,817 UART: [art] Populate DV Done
3,181,211 UART: [fht] FMC Alias Private Key: 7
3,182,235 UART: [art] Derive CDI
3,182,515 UART: [art] Store in slot 0x4
3,268,269 UART: [art] Derive Key Pair
3,268,629 UART: [art] Store priv key in slot 0x5
3,281,326 UART: [art] Derive Key Pair - Done
3,296,087 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,638 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,403 UART: [art] PUB.X = 7E590A63D77D2239C7F32E78FA541590588ABE486D47E22A2AB5A47FC5785201BFB5F99CA5128F44FDFAC60CF25C2131
3,319,172 UART: [art] PUB.Y = E99ABE376F3DA0DA8FF2982C33F229E5BC48079F38DC1B3CAD34F6CBAF3F5D0624851009F4EC09ED44BBE7235D83DE2A
3,326,132 UART: [art] SIG.R = 25908622372B705E47C4152E2E140E3B6874C1A60B23EDA8B677F882C6CE1548E4B984889E6990E3B22D404B5A1E9138
3,332,888 UART: [art] SIG.S = 0F56E52941BB44F791BDDB9D804E71FD32B719DA2C863502A5E803FB4A87C13A0D76D7D9F14FD1DD26653C75CD9CC806
3,356,217 UART: Caliptra RT
3,356,468 UART: [state] CFI Enabled
3,476,837 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,795,071 >>> mbox cmd response: failed
4,795,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,800,767 UART:
4,800,783 UART: Running Caliptra FMC ...
4,801,191 UART:
4,801,245 UART: [state] CFI Enabled
4,890,026 UART: [art] Extend RT PCRs Done
4,890,454 UART: [art] Lock RT PCRs Done
4,891,683 UART: [art] Populate DV Done
4,899,951 UART: [fht] FMC Alias Private Key: 7
4,900,921 UART: [art] Derive CDI
4,901,201 UART: [art] Store in slot 0x4
4,986,699 UART: [art] Derive Key Pair
4,987,059 UART: [art] Store priv key in slot 0x5
5,000,720 UART: [art] Derive Key Pair - Done
5,015,265 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,030,942 UART: [art] Erasing AUTHORITY.KEYID = 7
5,031,707 UART: [art] PUB.X = 7E590A63D77D2239C7F32E78FA541590588ABE486D47E22A2AB5A47FC5785201BFB5F99CA5128F44FDFAC60CF25C2131
5,038,476 UART: [art] PUB.Y = E99ABE376F3DA0DA8FF2982C33F229E5BC48079F38DC1B3CAD34F6CBAF3F5D0624851009F4EC09ED44BBE7235D83DE2A
5,045,436 UART: [art] SIG.R = 25908622372B705E47C4152E2E140E3B6874C1A60B23EDA8B677F882C6CE1548E4B984889E6990E3B22D404B5A1E9138
5,052,192 UART: [art] SIG.S = 0F56E52941BB44F791BDDB9D804E71FD32B719DA2C863502A5E803FB4A87C13A0D76D7D9F14FD1DD26653C75CD9CC806
5,075,457 UART: Caliptra RT
5,075,708 UART: [state] CFI Enabled
5,442,290 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,255,782 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,562 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,108 UART: [kat] SHA2-256
882,039 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,154 UART: [kat] ++
886,306 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,379 UART: [kat] SHA2-512-ACC
897,280 UART: [kat] ECC-384
903,075 UART: [kat] HMAC-384Kdf
907,575 UART: [kat] LMS
1,475,771 UART: [kat] --
1,476,672 UART: [cold-reset] ++
1,477,236 UART: [fht] Storing FHT @ 0x50003400
1,479,977 UART: [idev] ++
1,480,145 UART: [idev] CDI.KEYID = 6
1,480,505 UART: [idev] SUBJECT.KEYID = 7
1,480,929 UART: [idev] UDS.KEYID = 0
1,481,274 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,255 UART: [idev] Erasing UDS.KEYID = 0
1,505,753 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,325 UART: [idev] --
1,515,416 UART: [ldev] ++
1,515,584 UART: [ldev] CDI.KEYID = 6
1,515,947 UART: [ldev] SUBJECT.KEYID = 5
1,516,373 UART: [ldev] AUTHORITY.KEYID = 7
1,516,836 UART: [ldev] FE.KEYID = 1
1,522,072 UART: [ldev] Erasing FE.KEYID = 1
1,547,943 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,549 UART: [ldev] --
1,586,862 UART: [fwproc] Waiting for Commands...
1,587,505 UART: [fwproc] Received command 0x46574c44
1,588,296 UART: [fwproc] Received Image of size 118548 bytes
2,931,386 UART: [fwproc] Image verified using Vendor ECC Key Index 3
2,958,916 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,467 >>> mbox cmd response: success
3,130,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,131,481 UART: [afmc] ++
3,131,649 UART: [afmc] CDI.KEYID = 6
3,132,011 UART: [afmc] SUBJECT.KEYID = 7
3,132,436 UART: [afmc] AUTHORITY.KEYID = 5
3,168,122 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,954 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
3,190,665 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
3,196,550 UART: [afmc] SIG.R = 1B808139A82154D7829344C14F7B3DCF8F462FA097D7D853513EE4FCF41FDEC17279B80A528F0E3E44F7259FC827691F
3,202,257 UART: [afmc] SIG.S = A280234D1482F252CC9ACF9F10C4B2975C754071275AA8869D333FFCFC50C67A43378261ED7FEE9C46891DD00B478232
3,210,173 UART: [afmc] --
3,211,269 UART: [cold-reset] --
3,212,025 UART: [state] Locking Datavault
3,213,298 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,902 UART: [state] Locking ICCM
3,214,564 UART: [exit] Launching FMC @ 0x40000130
3,219,894 UART:
3,219,910 UART: Running Caliptra FMC ...
3,220,318 UART:
3,220,461 UART: [state] CFI Enabled
3,231,142 UART: [fht] FMC Alias Private Key: 7
3,350,356 UART: [art] Extend RT PCRs Done
3,350,784 UART: [art] Lock RT PCRs Done
3,352,308 UART: [art] Populate DV Done
3,360,538 UART: [fht] FMC Alias Private Key: 7
3,361,606 UART: [art] Derive CDI
3,361,886 UART: [art] Store in slot 0x4
3,447,620 UART: [art] Derive Key Pair
3,447,980 UART: [art] Store priv key in slot 0x5
3,461,507 UART: [art] Derive Key Pair - Done
3,476,215 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,746 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,511 UART: [art] PUB.X = 87BC70A325A63FBC8C1282C845DCB97012555DF617B8BBB502D777C5BD661BA0D06F7A3B7D4325D6003030F4D5AD1827
3,499,262 UART: [art] PUB.Y = 9E6C2517EF604319338460E7365ECFC65194E07A73C8042008D0B896D6465934AD1E713BD2CE647F6BA2518EC247AD4C
3,506,204 UART: [art] SIG.R = EDC9778367D82EC5D7D652CED3D513CA634E5B9DFF814F01052C8A16504C21005B519645CEB4D03EA321FB7917162D96
3,512,950 UART: [art] SIG.S = 3F4D87A92A4B89136D8CD600AE8D613C1966FD8F9320BA17FAF6CA243CD18EE90E34A12305F8A2F5EA42C2B892800E33
3,536,723 UART: Caliptra RT
3,537,066 UART: [state] CFI Enabled
3,657,200 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,658,977 UART:
3,658,993 UART: Running Caliptra ROM ...
3,659,401 UART:
3,659,542 UART: [state] CFI Enabled
3,662,848 UART: [state] LifecycleState = Unprovisioned
3,663,503 UART: [state] DebugLocked = No
3,664,157 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,665,696 UART: [kat] SHA2-256
4,459,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,463,742 UART: [kat] ++
4,463,894 UART: [kat] sha1
4,468,196 UART: [kat] SHA2-256
4,470,134 UART: [kat] SHA2-384
4,472,819 UART: [kat] SHA2-512-ACC
4,474,719 UART: [kat] ECC-384
4,480,320 UART: [kat] HMAC-384Kdf
4,484,858 UART: [kat] LMS
5,053,054 UART: [kat] --
5,053,627 UART: [update-reset] ++
5,092,952 >>> mbox cmd response: failed
5,092,952 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,093,372 UART: ROM Non-Fatal Error: 0x000B001E
5,094,212 UART: [state] Locking Datavault
5,095,002 UART: [state] Locking PCR0, PCR1 and PCR31
5,095,606 UART: [state] Locking ICCM
5,096,052 UART: [exit] Launching FMC @ 0x40000130
5,101,382 UART:
5,101,398 UART: Running Caliptra FMC ...
5,101,806 UART:
5,101,949 UART: [state] CFI Enabled
5,191,754 UART: [art] Extend RT PCRs Done
5,192,182 UART: [art] Lock RT PCRs Done
5,193,351 UART: [art] Populate DV Done
5,201,859 UART: [fht] FMC Alias Private Key: 7
5,202,989 UART: [art] Derive CDI
5,203,269 UART: [art] Store in slot 0x4
5,289,153 UART: [art] Derive Key Pair
5,289,513 UART: [art] Store priv key in slot 0x5
5,302,698 UART: [art] Derive Key Pair - Done
5,317,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,333,401 UART: [art] Erasing AUTHORITY.KEYID = 7
5,334,166 UART: [art] PUB.X = 87BC70A325A63FBC8C1282C845DCB97012555DF617B8BBB502D777C5BD661BA0D06F7A3B7D4325D6003030F4D5AD1827
5,340,917 UART: [art] PUB.Y = 9E6C2517EF604319338460E7365ECFC65194E07A73C8042008D0B896D6465934AD1E713BD2CE647F6BA2518EC247AD4C
5,347,859 UART: [art] SIG.R = EDC9778367D82EC5D7D652CED3D513CA634E5B9DFF814F01052C8A16504C21005B519645CEB4D03EA321FB7917162D96
5,354,605 UART: [art] SIG.S = 3F4D87A92A4B89136D8CD600AE8D613C1966FD8F9320BA17FAF6CA243CD18EE90E34A12305F8A2F5EA42C2B892800E33
5,377,946 UART: Caliptra RT
5,378,289 UART: [state] CFI Enabled
5,742,874 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,744,332 UART:
5,744,348 UART: Running Caliptra ROM ...
5,744,756 UART:
5,744,897 UART: [state] CFI Enabled
5,747,875 UART: [state] LifecycleState = Unprovisioned
5,748,530 UART: [state] DebugLocked = No
5,749,134 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,750,641 UART: [kat] SHA2-256
6,544,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,548,687 UART: [kat] ++
6,548,839 UART: [kat] sha1
6,552,989 UART: [kat] SHA2-256
6,554,927 UART: [kat] SHA2-384
6,557,620 UART: [kat] SHA2-512-ACC
6,559,520 UART: [kat] ECC-384
6,565,053 UART: [kat] HMAC-384Kdf
6,569,715 UART: [kat] LMS
7,137,911 UART: [kat] --
7,138,780 UART: [update-reset] ++
8,519,720 UART: [update-reset] Image verified using Vendor ECC Key Index 3
8,520,932 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
8,676,199 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,075 >>> mbox cmd response: success
2,982,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,044,013 UART:
3,044,029 UART: Running Caliptra FMC ...
3,044,437 UART:
3,044,580 UART: [state] CFI Enabled
3,055,353 UART: [fht] FMC Alias Private Key: 7
3,174,729 UART: [art] Extend RT PCRs Done
3,175,157 UART: [art] Lock RT PCRs Done
3,176,707 UART: [art] Populate DV Done
3,184,651 UART: [fht] FMC Alias Private Key: 7
3,185,601 UART: [art] Derive CDI
3,185,881 UART: [art] Store in slot 0x4
3,271,479 UART: [art] Derive Key Pair
3,271,839 UART: [art] Store priv key in slot 0x5
3,284,972 UART: [art] Derive Key Pair - Done
3,299,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,969 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,734 UART: [art] PUB.X = 2E5BF48241318902FF350BD7FE8199DFFE47614A621B9E2F1121ED36C45922B3861DE897917D1315472D49C3E7AEEFAB
3,322,502 UART: [art] PUB.Y = C35EB4362C39C5FD9BBC9D6C91391E04D38B8A8365902C6A27366DA04C18C3468F4AB29C0778D1613BE825F66F7E9ED5
3,329,452 UART: [art] SIG.R = 03C877275E3BA3483A093682F2965065B6E544A83C03A296E042E3F79746D3FEDEDECEB7A4DF198AED3DACA6E8E4E8D3
3,336,227 UART: [art] SIG.S = 22486F3659063DF6BF3B2A9A76E6B383295100E024108F36471B171B3FEF874C052ED6756BD32010393F6866C0453223
3,359,635 UART: Caliptra RT
3,359,978 UART: [state] CFI Enabled
3,479,865 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,799,360 >>> mbox cmd response: failed
4,799,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,805,040 UART:
4,805,056 UART: Running Caliptra FMC ...
4,805,464 UART:
4,805,607 UART: [state] CFI Enabled
4,894,554 UART: [art] Extend RT PCRs Done
4,894,982 UART: [art] Lock RT PCRs Done
4,896,347 UART: [art] Populate DV Done
4,904,535 UART: [fht] FMC Alias Private Key: 7
4,905,627 UART: [art] Derive CDI
4,905,907 UART: [art] Store in slot 0x4
4,991,691 UART: [art] Derive Key Pair
4,992,051 UART: [art] Store priv key in slot 0x5
5,004,902 UART: [art] Derive Key Pair - Done
5,019,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,035,133 UART: [art] Erasing AUTHORITY.KEYID = 7
5,035,898 UART: [art] PUB.X = 2E5BF48241318902FF350BD7FE8199DFFE47614A621B9E2F1121ED36C45922B3861DE897917D1315472D49C3E7AEEFAB
5,042,666 UART: [art] PUB.Y = C35EB4362C39C5FD9BBC9D6C91391E04D38B8A8365902C6A27366DA04C18C3468F4AB29C0778D1613BE825F66F7E9ED5
5,049,616 UART: [art] SIG.R = 03C877275E3BA3483A093682F2965065B6E544A83C03A296E042E3F79746D3FEDEDECEB7A4DF198AED3DACA6E8E4E8D3
5,056,391 UART: [art] SIG.S = 22486F3659063DF6BF3B2A9A76E6B383295100E024108F36471B171B3FEF874C052ED6756BD32010393F6866C0453223
5,080,141 UART: Caliptra RT
5,080,484 UART: [state] CFI Enabled
5,441,520 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,256,703 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,471 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,549 UART: [kat] SHA2-512-ACC
906,450 UART: [kat] ECC-384
916,083 UART: [kat] HMAC-384Kdf
920,481 UART: [kat] LMS
1,168,793 UART: [kat] --
1,169,828 UART: [cold-reset] ++
1,170,204 UART: [fht] FHT @ 0x50003400
1,172,846 UART: [idev] ++
1,173,014 UART: [idev] CDI.KEYID = 6
1,173,375 UART: [idev] SUBJECT.KEYID = 7
1,173,800 UART: [idev] UDS.KEYID = 0
1,174,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,891 UART: [idev] Erasing UDS.KEYID = 0
1,199,007 UART: [idev] Sha1 KeyId Algorithm
1,207,919 UART: [idev] --
1,208,890 UART: [ldev] ++
1,209,058 UART: [ldev] CDI.KEYID = 6
1,209,422 UART: [ldev] SUBJECT.KEYID = 5
1,209,849 UART: [ldev] AUTHORITY.KEYID = 7
1,210,312 UART: [ldev] FE.KEYID = 1
1,215,710 UART: [ldev] Erasing FE.KEYID = 1
1,241,849 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,926 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,484 UART: [ldev] --
1,280,925 UART: [fwproc] Wait for Commands...
1,281,712 UART: [fwproc] Recv command 0x46574c44
1,282,445 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,357 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,653,678 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,853 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,050 >>> mbox cmd response: success
2,825,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,092 UART: [afmc] ++
2,826,260 UART: [afmc] CDI.KEYID = 6
2,826,623 UART: [afmc] SUBJECT.KEYID = 7
2,827,049 UART: [afmc] AUTHORITY.KEYID = 5
2,862,395 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,800 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,549 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,885,261 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,144 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,896,857 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,904,767 UART: [afmc] --
2,905,760 UART: [cold-reset] --
2,906,744 UART: [state] Locking Datavault
2,908,115 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,719 UART: [state] Locking ICCM
2,909,193 UART: [exit] Launching FMC @ 0x40000130
2,914,523 UART:
2,914,539 UART: Running Caliptra FMC ...
2,914,947 UART:
2,915,001 UART: [state] CFI Enabled
2,925,326 UART: [fht] FMC Alias Private Key: 7
3,044,368 UART: [art] Extend RT PCRs Done
3,044,796 UART: [art] Lock RT PCRs Done
3,046,000 UART: [art] Populate DV Done
3,054,216 UART: [fht] FMC Alias Private Key: 7
3,055,148 UART: [art] Derive CDI
3,055,428 UART: [art] Store in slot 0x4
3,140,859 UART: [art] Derive Key Pair
3,141,219 UART: [art] Store priv key in slot 0x5
3,154,471 UART: [art] Derive Key Pair - Done
3,168,900 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,219 UART: [art] Erasing AUTHORITY.KEYID = 7
3,184,984 UART: [art] PUB.X = 15EAD8E23E50542A358C95EE1FF2E5F5FFE64BD86A4CA59799B28D345D910E2EB6227925332C5A6C472CA9C491AD4BF2
3,191,763 UART: [art] PUB.Y = 221A956281858B5E1E574F755A9C047E8A13B9B776EFE36DD44D14362B55331E0A21FB1AC8B69BBFB77AB2F2C1385E9F
3,198,715 UART: [art] SIG.R = F087C96C8B6C42C9A1A50CFEAAA7B43464C35E6FA3471D7FABE6703404F814027E96A778FB303BB4D7EB3927E3CFEF4E
3,205,494 UART: [art] SIG.S = 91638C6C81E6B3986546A88E3F7D067803E058CCA9D0F9D6A52508E6AE97EEF0213E092593CC03334B35168CE6350928
3,229,598 UART: Caliptra RT
3,229,849 UART: [state] CFI Enabled
3,349,102 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,351,002 UART:
3,351,018 UART: Running Caliptra ROM ...
3,351,426 UART:
3,351,481 UART: [state] CFI Enabled
3,354,255 UART: [state] LifecycleState = Unprovisioned
3,354,910 UART: [state] DebugLocked = No
3,355,508 UART: [state] WD Timer not started. Device not locked for debugging
3,356,776 UART: [kat] SHA2-256
4,160,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,164,430 UART: [kat] ++
4,164,582 UART: [kat] sha1
4,168,832 UART: [kat] SHA2-256
4,170,772 UART: [kat] SHA2-384
4,173,701 UART: [kat] SHA2-512-ACC
4,175,601 UART: [kat] ECC-384
4,184,830 UART: [kat] HMAC-384Kdf
4,189,498 UART: [kat] LMS
4,437,810 UART: [kat] --
4,438,702 UART: [update-reset] ++
4,455,336 >>> mbox cmd response: failed
4,455,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,455,520 UART: ROM Non-Fatal Error: 0x000B001E
4,456,506 UART: [state] Locking Datavault
4,457,240 UART: [state] Locking PCR0, PCR1 and PCR31
4,457,844 UART: [state] Locking ICCM
4,458,512 UART: [exit] Launching FMC @ 0x40000130
4,463,842 UART:
4,463,858 UART: Running Caliptra FMC ...
4,464,266 UART:
4,464,320 UART: [state] CFI Enabled
4,552,857 UART: [art] Extend RT PCRs Done
4,553,285 UART: [art] Lock RT PCRs Done
4,554,138 UART: [art] Populate DV Done
4,562,396 UART: [fht] FMC Alias Private Key: 7
4,563,520 UART: [art] Derive CDI
4,563,800 UART: [art] Store in slot 0x4
4,649,585 UART: [art] Derive Key Pair
4,649,945 UART: [art] Store priv key in slot 0x5
4,662,633 UART: [art] Derive Key Pair - Done
4,677,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,692,195 UART: [art] Erasing AUTHORITY.KEYID = 7
4,692,960 UART: [art] PUB.X = 15EAD8E23E50542A358C95EE1FF2E5F5FFE64BD86A4CA59799B28D345D910E2EB6227925332C5A6C472CA9C491AD4BF2
4,699,739 UART: [art] PUB.Y = 221A956281858B5E1E574F755A9C047E8A13B9B776EFE36DD44D14362B55331E0A21FB1AC8B69BBFB77AB2F2C1385E9F
4,706,691 UART: [art] SIG.R = F087C96C8B6C42C9A1A50CFEAAA7B43464C35E6FA3471D7FABE6703404F814027E96A778FB303BB4D7EB3927E3CFEF4E
4,713,470 UART: [art] SIG.S = 91638C6C81E6B3986546A88E3F7D067803E058CCA9D0F9D6A52508E6AE97EEF0213E092593CC03334B35168CE6350928
4,737,054 UART: Caliptra RT
4,737,305 UART: [state] CFI Enabled
5,104,053 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,105,584 UART:
5,105,600 UART: Running Caliptra ROM ...
5,106,008 UART:
5,106,063 UART: [state] CFI Enabled
5,108,753 UART: [state] LifecycleState = Unprovisioned
5,109,408 UART: [state] DebugLocked = No
5,109,986 UART: [state] WD Timer not started. Device not locked for debugging
5,111,194 UART: [kat] SHA2-256
5,914,744 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,918,848 UART: [kat] ++
5,919,000 UART: [kat] sha1
5,923,202 UART: [kat] SHA2-256
5,925,142 UART: [kat] SHA2-384
5,927,847 UART: [kat] SHA2-512-ACC
5,929,747 UART: [kat] ECC-384
5,939,892 UART: [kat] HMAC-384Kdf
5,944,378 UART: [kat] LMS
6,192,690 UART: [kat] --
6,193,768 UART: [update-reset] ++
7,552,396 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,553,397 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,708,612 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,412 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,635 >>> mbox cmd response: success
2,678,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,415 UART:
2,741,431 UART: Running Caliptra FMC ...
2,741,839 UART:
2,741,893 UART: [state] CFI Enabled
2,752,360 UART: [fht] FMC Alias Private Key: 7
2,871,450 UART: [art] Extend RT PCRs Done
2,871,878 UART: [art] Lock RT PCRs Done
2,873,172 UART: [art] Populate DV Done
2,881,576 UART: [fht] FMC Alias Private Key: 7
2,882,688 UART: [art] Derive CDI
2,882,968 UART: [art] Store in slot 0x4
2,969,333 UART: [art] Derive Key Pair
2,969,693 UART: [art] Store priv key in slot 0x5
2,982,955 UART: [art] Derive Key Pair - Done
2,998,133 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,488 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,253 UART: [art] PUB.X = D700ABB6B5A133E881B164D6D348253CDE6D50AC47E193CB960BA4FAC9637E4F71E04AEAA0CE6D6027112F8C946E9A38
3,021,012 UART: [art] PUB.Y = 9D9DF632C30C5C9CAF7BCA40426B610D593BDFF38ADFF17969888F0828AE1014A160A2F08F92EEB63EA051484EC74C7E
3,027,967 UART: [art] SIG.R = 88739C52EBA543A64A209C90F86CF164248DEDF47F446D052C3CFE0885F75BC9C40EAB28DED7EC41661AD794EC6F8E76
3,034,742 UART: [art] SIG.S = 157C60C13E4B397FE68DD784543212EBB62C37C9E601BA890F5AE02B50F725CC5DC31370B413B26CC4A91727A576C53F
3,058,740 UART: Caliptra RT
3,058,991 UART: [state] CFI Enabled
3,178,845 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,172,396 >>> mbox cmd response: failed
4,172,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,178,264 UART:
4,178,280 UART: Running Caliptra FMC ...
4,178,688 UART:
4,178,742 UART: [state] CFI Enabled
4,268,499 UART: [art] Extend RT PCRs Done
4,268,927 UART: [art] Lock RT PCRs Done
4,270,514 UART: [art] Populate DV Done
4,278,768 UART: [fht] FMC Alias Private Key: 7
4,279,850 UART: [art] Derive CDI
4,280,130 UART: [art] Store in slot 0x4
4,365,731 UART: [art] Derive Key Pair
4,366,091 UART: [art] Store priv key in slot 0x5
4,379,681 UART: [art] Derive Key Pair - Done
4,394,241 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,409,330 UART: [art] Erasing AUTHORITY.KEYID = 7
4,410,095 UART: [art] PUB.X = D700ABB6B5A133E881B164D6D348253CDE6D50AC47E193CB960BA4FAC9637E4F71E04AEAA0CE6D6027112F8C946E9A38
4,416,854 UART: [art] PUB.Y = 9D9DF632C30C5C9CAF7BCA40426B610D593BDFF38ADFF17969888F0828AE1014A160A2F08F92EEB63EA051484EC74C7E
4,423,809 UART: [art] SIG.R = 88739C52EBA543A64A209C90F86CF164248DEDF47F446D052C3CFE0885F75BC9C40EAB28DED7EC41661AD794EC6F8E76
4,430,584 UART: [art] SIG.S = 157C60C13E4B397FE68DD784543212EBB62C37C9E601BA890F5AE02B50F725CC5DC31370B413B26CC4A91727A576C53F
4,454,664 UART: Caliptra RT
4,454,915 UART: [state] CFI Enabled
4,814,698 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,304,535 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,129 UART: [state] LifecycleState = Unprovisioned
85,784 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,837 UART: [kat] SHA2-256
891,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,491 UART: [kat] ++
895,643 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,636 UART: [kat] SHA2-512-ACC
906,537 UART: [kat] ECC-384
916,112 UART: [kat] HMAC-384Kdf
920,764 UART: [kat] LMS
1,169,076 UART: [kat] --
1,169,817 UART: [cold-reset] ++
1,170,163 UART: [fht] FHT @ 0x50003400
1,172,871 UART: [idev] ++
1,173,039 UART: [idev] CDI.KEYID = 6
1,173,400 UART: [idev] SUBJECT.KEYID = 7
1,173,825 UART: [idev] UDS.KEYID = 0
1,174,171 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,888 UART: [idev] Erasing UDS.KEYID = 0
1,198,818 UART: [idev] Sha1 KeyId Algorithm
1,207,576 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,627 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,517 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,661 UART: [fwproc] Recv command 0x46574c44
1,283,394 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,095 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,270 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,669 >>> mbox cmd response: success
2,825,669 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,763 UART: [afmc] ++
2,826,931 UART: [afmc] CDI.KEYID = 6
2,827,294 UART: [afmc] SUBJECT.KEYID = 7
2,827,720 UART: [afmc] AUTHORITY.KEYID = 5
2,863,534 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,169 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,918 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,630 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,892,513 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,898,226 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,872 UART: [afmc] --
2,906,807 UART: [cold-reset] --
2,907,647 UART: [state] Locking Datavault
2,909,038 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,642 UART: [state] Locking ICCM
2,910,138 UART: [exit] Launching FMC @ 0x40000130
2,915,468 UART:
2,915,484 UART: Running Caliptra FMC ...
2,915,892 UART:
2,916,035 UART: [state] CFI Enabled
2,926,970 UART: [fht] FMC Alias Private Key: 7
3,046,186 UART: [art] Extend RT PCRs Done
3,046,614 UART: [art] Lock RT PCRs Done
3,048,156 UART: [art] Populate DV Done
3,056,498 UART: [fht] FMC Alias Private Key: 7
3,057,442 UART: [art] Derive CDI
3,057,722 UART: [art] Store in slot 0x4
3,143,259 UART: [art] Derive Key Pair
3,143,619 UART: [art] Store priv key in slot 0x5
3,157,359 UART: [art] Derive Key Pair - Done
3,172,146 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,045 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,810 UART: [art] PUB.X = 1A646136B90EFD9264EAAC51310C530821859F1333A7339337A76079F4B1F4F5AA3B9C8D6879B1AA504C0ABFB33425BD
3,195,570 UART: [art] PUB.Y = E7FEECB3B2F5230E70C4220C4D157ECE04561AB8EBCE5E3956D9193C6AADEF5AF2B97DAA86B3DDF655BFAF8FFE625DEC
3,202,547 UART: [art] SIG.R = 7DDCD6FDD12F53507DF06D9FA446A398418B118CFE617AA4403E5B01275E40C5A4C4DCC71CE92932C4466D264294FB40
3,209,322 UART: [art] SIG.S = 8940733A86764A4236981533CBED4871255343EE9FBA725A698B78D4DF627FAB166D6BFAAEFB08FA26E585DD37C1B54D
3,233,565 UART: Caliptra RT
3,233,908 UART: [state] CFI Enabled
3,354,192 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,356,204 UART:
3,356,220 UART: Running Caliptra ROM ...
3,356,628 UART:
3,356,770 UART: [state] CFI Enabled
3,359,230 UART: [state] LifecycleState = Unprovisioned
3,359,885 UART: [state] DebugLocked = No
3,360,469 UART: [state] WD Timer not started. Device not locked for debugging
3,361,765 UART: [kat] SHA2-256
4,165,315 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,169,419 UART: [kat] ++
4,169,571 UART: [kat] sha1
4,173,787 UART: [kat] SHA2-256
4,175,727 UART: [kat] SHA2-384
4,178,268 UART: [kat] SHA2-512-ACC
4,180,168 UART: [kat] ECC-384
4,189,669 UART: [kat] HMAC-384Kdf
4,194,179 UART: [kat] LMS
4,442,491 UART: [kat] --
4,443,437 UART: [update-reset] ++
4,459,875 >>> mbox cmd response: failed
4,459,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,460,243 UART: ROM Non-Fatal Error: 0x000B001E
4,461,105 UART: [state] Locking Datavault
4,461,895 UART: [state] Locking PCR0, PCR1 and PCR31
4,462,499 UART: [state] Locking ICCM
4,463,079 UART: [exit] Launching FMC @ 0x40000130
4,468,409 UART:
4,468,425 UART: Running Caliptra FMC ...
4,468,833 UART:
4,468,976 UART: [state] CFI Enabled
4,558,591 UART: [art] Extend RT PCRs Done
4,559,019 UART: [art] Lock RT PCRs Done
4,560,334 UART: [art] Populate DV Done
4,568,452 UART: [fht] FMC Alias Private Key: 7
4,569,534 UART: [art] Derive CDI
4,569,814 UART: [art] Store in slot 0x4
4,655,803 UART: [art] Derive Key Pair
4,656,163 UART: [art] Store priv key in slot 0x5
4,668,717 UART: [art] Derive Key Pair - Done
4,683,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,699,607 UART: [art] Erasing AUTHORITY.KEYID = 7
4,700,372 UART: [art] PUB.X = 1A646136B90EFD9264EAAC51310C530821859F1333A7339337A76079F4B1F4F5AA3B9C8D6879B1AA504C0ABFB33425BD
4,707,132 UART: [art] PUB.Y = E7FEECB3B2F5230E70C4220C4D157ECE04561AB8EBCE5E3956D9193C6AADEF5AF2B97DAA86B3DDF655BFAF8FFE625DEC
4,714,109 UART: [art] SIG.R = 7DDCD6FDD12F53507DF06D9FA446A398418B118CFE617AA4403E5B01275E40C5A4C4DCC71CE92932C4466D264294FB40
4,720,884 UART: [art] SIG.S = 8940733A86764A4236981533CBED4871255343EE9FBA725A698B78D4DF627FAB166D6BFAAEFB08FA26E585DD37C1B54D
4,744,565 UART: Caliptra RT
4,744,908 UART: [state] CFI Enabled
5,115,445 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,117,098 UART:
5,117,114 UART: Running Caliptra ROM ...
5,117,522 UART:
5,117,664 UART: [state] CFI Enabled
5,119,696 UART: [state] LifecycleState = Unprovisioned
5,120,351 UART: [state] DebugLocked = No
5,120,845 UART: [state] WD Timer not started. Device not locked for debugging
5,122,099 UART: [kat] SHA2-256
5,925,649 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
5,929,753 UART: [kat] ++
5,929,905 UART: [kat] sha1
5,934,039 UART: [kat] SHA2-256
5,935,979 UART: [kat] SHA2-384
5,938,712 UART: [kat] SHA2-512-ACC
5,940,612 UART: [kat] ECC-384
5,950,117 UART: [kat] HMAC-384Kdf
5,954,765 UART: [kat] LMS
6,203,077 UART: [kat] --
6,203,991 UART: [update-reset] ++
7,562,771 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,563,922 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,719,137 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,232 >>> mbox cmd response: success
2,679,232 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,740,768 UART:
2,740,784 UART: Running Caliptra FMC ...
2,741,192 UART:
2,741,335 UART: [state] CFI Enabled
2,751,660 UART: [fht] FMC Alias Private Key: 7
2,871,462 UART: [art] Extend RT PCRs Done
2,871,890 UART: [art] Lock RT PCRs Done
2,873,492 UART: [art] Populate DV Done
2,881,750 UART: [fht] FMC Alias Private Key: 7
2,882,924 UART: [art] Derive CDI
2,883,204 UART: [art] Store in slot 0x4
2,969,145 UART: [art] Derive Key Pair
2,969,505 UART: [art] Store priv key in slot 0x5
2,982,697 UART: [art] Derive Key Pair - Done
2,997,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,842 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,607 UART: [art] PUB.X = 4F64D30F7AD7DC45107BE4C3E1D8012272F30BA53B3CE7434DD122FBD84707B8EACD904350E5E0799A77CFAEA88829C5
3,020,377 UART: [art] PUB.Y = 27EED2E691DDA61771B101CFFC40572779E9EC726EB9BEAEAE574BDC1CC45091892057E6F6AFA041C2136CA34D93348C
3,027,338 UART: [art] SIG.R = 6D271A8326F21D1CC482647DA1D201C4AC3B7ACA54AB854182FC0375332CDCF38B7115452C9E5D3DF11651A415FC1D71
3,034,108 UART: [art] SIG.S = DCFEAEEAB7D003688DF40F2FE1015A07456E0EED8127E25C8EAEBB5A55F1A5BC0DAF8454D0D1B74BF7C357A400C35FB7
3,057,270 UART: Caliptra RT
3,057,613 UART: [state] CFI Enabled
3,177,289 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,170,773 >>> mbox cmd response: failed
4,170,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,176,551 UART:
4,176,567 UART: Running Caliptra FMC ...
4,176,975 UART:
4,177,118 UART: [state] CFI Enabled
4,266,413 UART: [art] Extend RT PCRs Done
4,266,841 UART: [art] Lock RT PCRs Done
4,268,334 UART: [art] Populate DV Done
4,276,530 UART: [fht] FMC Alias Private Key: 7
4,277,592 UART: [art] Derive CDI
4,277,872 UART: [art] Store in slot 0x4
4,363,635 UART: [art] Derive Key Pair
4,363,995 UART: [art] Store priv key in slot 0x5
4,377,041 UART: [art] Derive Key Pair - Done
4,391,753 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,407,438 UART: [art] Erasing AUTHORITY.KEYID = 7
4,408,203 UART: [art] PUB.X = 4F64D30F7AD7DC45107BE4C3E1D8012272F30BA53B3CE7434DD122FBD84707B8EACD904350E5E0799A77CFAEA88829C5
4,414,973 UART: [art] PUB.Y = 27EED2E691DDA61771B101CFFC40572779E9EC726EB9BEAEAE574BDC1CC45091892057E6F6AFA041C2136CA34D93348C
4,421,934 UART: [art] SIG.R = 6D271A8326F21D1CC482647DA1D201C4AC3B7ACA54AB854182FC0375332CDCF38B7115452C9E5D3DF11651A415FC1D71
4,428,704 UART: [art] SIG.S = DCFEAEEAB7D003688DF40F2FE1015A07456E0EED8127E25C8EAEBB5A55F1A5BC0DAF8454D0D1B74BF7C357A400C35FB7
4,452,760 UART: Caliptra RT
4,453,103 UART: [state] CFI Enabled
4,813,590 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,302,352 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,487 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,609 UART: [kat] SHA2-256
903,549 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
918,012 UART: [kat] HMAC-384Kdf
922,616 UART: [kat] LMS
1,170,944 UART: [kat] --
1,171,839 UART: [cold-reset] ++
1,172,361 UART: [fht] FHT @ 0x50003400
1,174,930 UART: [idev] ++
1,175,098 UART: [idev] CDI.KEYID = 6
1,175,458 UART: [idev] SUBJECT.KEYID = 7
1,175,882 UART: [idev] UDS.KEYID = 0
1,176,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,921 UART: [idev] Sha1 KeyId Algorithm
1,209,411 UART: [idev] --
1,210,527 UART: [ldev] ++
1,210,695 UART: [ldev] CDI.KEYID = 6
1,211,058 UART: [ldev] SUBJECT.KEYID = 5
1,211,484 UART: [ldev] AUTHORITY.KEYID = 7
1,211,947 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,711 UART: [ldev] --
1,283,008 UART: [fwproc] Wait for Commands...
1,283,620 UART: [fwproc] Recv command 0x46574c44
1,284,348 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,575 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,656,026 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,196 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,553 >>> mbox cmd response: success
2,827,553 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,828,685 UART: [afmc] ++
2,828,853 UART: [afmc] CDI.KEYID = 6
2,829,215 UART: [afmc] SUBJECT.KEYID = 7
2,829,640 UART: [afmc] AUTHORITY.KEYID = 5
2,865,160 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,761 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,509 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,888,220 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,894,105 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,899,818 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,907,725 UART: [afmc] --
2,908,637 UART: [cold-reset] --
2,909,451 UART: [state] Locking Datavault
2,910,444 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,048 UART: [state] Locking ICCM
2,911,700 UART: [exit] Launching FMC @ 0x40000130
2,917,030 UART:
2,917,046 UART: Running Caliptra FMC ...
2,917,454 UART:
2,917,508 UART: [state] CFI Enabled
2,927,815 UART: [fht] FMC Alias Private Key: 7
3,046,903 UART: [art] Extend RT PCRs Done
3,047,331 UART: [art] Lock RT PCRs Done
3,048,493 UART: [art] Populate DV Done
3,056,399 UART: [fht] FMC Alias Private Key: 7
3,057,427 UART: [art] Derive CDI
3,057,707 UART: [art] Store in slot 0x4
3,143,314 UART: [art] Derive Key Pair
3,143,674 UART: [art] Store priv key in slot 0x5
3,156,702 UART: [art] Derive Key Pair - Done
3,171,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,680 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,445 UART: [art] PUB.X = 1EF5FC1C9B2D5323B5C78F933E111A4C9BCD89B4A85F6112969CB4026A547EBCE6407DAEC8E59F1E557DD38D692632FC
3,194,226 UART: [art] PUB.Y = 0B922119A403A025903EEEECC2F8385229F221859CDD68650C8A9E3C3BA31EC126E3F1DEA1EC8418D51B0805AE209B0B
3,201,166 UART: [art] SIG.R = 280A43F5B330CEF359E2234D249BD3959163D5DD8A5D2872FA8319442BC416E1FE83E8D289AF85FEDF03C26C215DDABE
3,207,942 UART: [art] SIG.S = 45A3A7A226D1FCD8E3C87E912CF4924B7AB148C86D7014094E4175411E534CB4049CF2334AD2B4F19005AFBA9955ADE8
3,231,539 UART: Caliptra RT
3,231,790 UART: [state] CFI Enabled
3,351,052 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,353,068 UART:
3,353,084 UART: Running Caliptra ROM ...
3,353,492 UART:
3,353,547 UART: [state] CFI Enabled
3,356,435 UART: [state] LifecycleState = Unprovisioned
3,357,090 UART: [state] DebugLocked = No
3,357,700 UART: [state] WD Timer not started. Device not locked for debugging
3,358,968 UART: [kat] SHA2-256
4,164,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,168,743 UART: [kat] ++
4,168,895 UART: [kat] sha1
4,173,259 UART: [kat] SHA2-256
4,175,199 UART: [kat] SHA2-384
4,178,056 UART: [kat] SHA2-512-ACC
4,179,956 UART: [kat] ECC-384
4,190,031 UART: [kat] HMAC-384Kdf
4,194,569 UART: [kat] LMS
4,442,897 UART: [kat] --
4,443,785 UART: [update-reset] ++
4,460,578 >>> mbox cmd response: failed
4,460,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,461,128 UART: ROM Non-Fatal Error: 0x000B001E
4,462,044 UART: [state] Locking Datavault
4,462,994 UART: [state] Locking PCR0, PCR1 and PCR31
4,463,598 UART: [state] Locking ICCM
4,464,034 UART: [exit] Launching FMC @ 0x40000130
4,469,364 UART:
4,469,380 UART: Running Caliptra FMC ...
4,469,788 UART:
4,469,842 UART: [state] CFI Enabled
4,559,105 UART: [art] Extend RT PCRs Done
4,559,533 UART: [art] Lock RT PCRs Done
4,560,536 UART: [art] Populate DV Done
4,568,602 UART: [fht] FMC Alias Private Key: 7
4,569,628 UART: [art] Derive CDI
4,569,908 UART: [art] Store in slot 0x4
4,655,733 UART: [art] Derive Key Pair
4,656,093 UART: [art] Store priv key in slot 0x5
4,669,875 UART: [art] Derive Key Pair - Done
4,684,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,700,279 UART: [art] Erasing AUTHORITY.KEYID = 7
4,701,044 UART: [art] PUB.X = 1EF5FC1C9B2D5323B5C78F933E111A4C9BCD89B4A85F6112969CB4026A547EBCE6407DAEC8E59F1E557DD38D692632FC
4,707,825 UART: [art] PUB.Y = 0B922119A403A025903EEEECC2F8385229F221859CDD68650C8A9E3C3BA31EC126E3F1DEA1EC8418D51B0805AE209B0B
4,714,765 UART: [art] SIG.R = 280A43F5B330CEF359E2234D249BD3959163D5DD8A5D2872FA8319442BC416E1FE83E8D289AF85FEDF03C26C215DDABE
4,721,541 UART: [art] SIG.S = 45A3A7A226D1FCD8E3C87E912CF4924B7AB148C86D7014094E4175411E534CB4049CF2334AD2B4F19005AFBA9955ADE8
4,745,364 UART: Caliptra RT
4,745,615 UART: [state] CFI Enabled
5,107,402 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,108,851 UART:
5,108,867 UART: Running Caliptra ROM ...
5,109,275 UART:
5,109,330 UART: [state] CFI Enabled
5,112,174 UART: [state] LifecycleState = Unprovisioned
5,112,829 UART: [state] DebugLocked = No
5,113,547 UART: [state] WD Timer not started. Device not locked for debugging
5,114,653 UART: [kat] SHA2-256
5,920,303 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,924,428 UART: [kat] ++
5,924,580 UART: [kat] sha1
5,928,750 UART: [kat] SHA2-256
5,930,690 UART: [kat] SHA2-384
5,933,419 UART: [kat] SHA2-512-ACC
5,935,319 UART: [kat] ECC-384
5,945,450 UART: [kat] HMAC-384Kdf
5,950,174 UART: [kat] LMS
6,198,502 UART: [kat] --
6,199,562 UART: [update-reset] ++
7,558,804 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,559,923 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,715,138 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,676,822 >>> mbox cmd response: success
2,676,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,737,578 UART:
2,737,594 UART: Running Caliptra FMC ...
2,738,002 UART:
2,738,056 UART: [state] CFI Enabled
2,748,765 UART: [fht] FMC Alias Private Key: 7
2,868,275 UART: [art] Extend RT PCRs Done
2,868,703 UART: [art] Lock RT PCRs Done
2,869,953 UART: [art] Populate DV Done
2,878,425 UART: [fht] FMC Alias Private Key: 7
2,879,463 UART: [art] Derive CDI
2,879,743 UART: [art] Store in slot 0x4
2,965,104 UART: [art] Derive Key Pair
2,965,464 UART: [art] Store priv key in slot 0x5
2,978,388 UART: [art] Derive Key Pair - Done
2,993,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,763 UART: [art] PUB.X = CD26CD5399EAD483035E5408395FAA3C16782AD3625AC491E85D2BB795F0349648FC07D5A7C8FA768A248F6A411E1398
3,016,526 UART: [art] PUB.Y = 1D3BCE55CFDDB6DCBAAD8DEDE82526B95041FA43F5BB56118AF7F0A5E53BF283F26EF1DD9D474EFEF1861617B1630D11
3,023,499 UART: [art] SIG.R = 02CF6FF0D6E68A5698B1C75493384431CE112AF2C3DB58C7C4E8B85E0CEC234A272F513EE6E440CC9BBB13786EB55BAC
3,030,279 UART: [art] SIG.S = E02BCB78DC59B7700C70BF815C6BB68CC78647DCED2459582516625FAE806134C393641F63C79019DE10796A354D3A1C
3,053,764 UART: Caliptra RT
3,054,015 UART: [state] CFI Enabled
3,174,275 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,168,601 >>> mbox cmd response: failed
4,168,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,174,507 UART:
4,174,523 UART: Running Caliptra FMC ...
4,174,931 UART:
4,174,985 UART: [state] CFI Enabled
4,264,430 UART: [art] Extend RT PCRs Done
4,264,858 UART: [art] Lock RT PCRs Done
4,266,135 UART: [art] Populate DV Done
4,274,207 UART: [fht] FMC Alias Private Key: 7
4,275,269 UART: [art] Derive CDI
4,275,549 UART: [art] Store in slot 0x4
4,361,510 UART: [art] Derive Key Pair
4,361,870 UART: [art] Store priv key in slot 0x5
4,374,950 UART: [art] Derive Key Pair - Done
4,389,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,405,292 UART: [art] Erasing AUTHORITY.KEYID = 7
4,406,057 UART: [art] PUB.X = CD26CD5399EAD483035E5408395FAA3C16782AD3625AC491E85D2BB795F0349648FC07D5A7C8FA768A248F6A411E1398
4,412,820 UART: [art] PUB.Y = 1D3BCE55CFDDB6DCBAAD8DEDE82526B95041FA43F5BB56118AF7F0A5E53BF283F26EF1DD9D474EFEF1861617B1630D11
4,419,793 UART: [art] SIG.R = 02CF6FF0D6E68A5698B1C75493384431CE112AF2C3DB58C7C4E8B85E0CEC234A272F513EE6E440CC9BBB13786EB55BAC
4,426,573 UART: [art] SIG.S = E02BCB78DC59B7700C70BF815C6BB68CC78647DCED2459582516625FAE806134C393641F63C79019DE10796A354D3A1C
4,450,088 UART: Caliptra RT
4,450,339 UART: [state] CFI Enabled
4,812,854 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,303,057 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,873 UART: [state] LifecycleState = Unprovisioned
85,528 UART: [state] DebugLocked = No
86,246 UART: [state] WD Timer not started. Device not locked for debugging
87,459 UART: [kat] SHA2-256
893,109 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,234 UART: [kat] ++
897,386 UART: [kat] sha1
901,516 UART: [kat] SHA2-256
903,456 UART: [kat] SHA2-384
906,247 UART: [kat] SHA2-512-ACC
908,148 UART: [kat] ECC-384
917,791 UART: [kat] HMAC-384Kdf
922,449 UART: [kat] LMS
1,170,777 UART: [kat] --
1,171,630 UART: [cold-reset] ++
1,172,036 UART: [fht] FHT @ 0x50003400
1,174,831 UART: [idev] ++
1,174,999 UART: [idev] CDI.KEYID = 6
1,175,359 UART: [idev] SUBJECT.KEYID = 7
1,175,783 UART: [idev] UDS.KEYID = 0
1,176,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,729 UART: [idev] Erasing UDS.KEYID = 0
1,201,342 UART: [idev] Sha1 KeyId Algorithm
1,209,744 UART: [idev] --
1,210,586 UART: [ldev] ++
1,210,754 UART: [ldev] CDI.KEYID = 6
1,211,117 UART: [ldev] SUBJECT.KEYID = 5
1,211,543 UART: [ldev] AUTHORITY.KEYID = 7
1,212,006 UART: [ldev] FE.KEYID = 1
1,217,290 UART: [ldev] Erasing FE.KEYID = 1
1,243,307 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,508 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,324 UART: [ldev] --
1,282,619 UART: [fwproc] Wait for Commands...
1,283,429 UART: [fwproc] Recv command 0x46574c44
1,284,157 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,110 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 3
2,654,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,619 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,794 >>> mbox cmd response: success
2,825,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,826,850 UART: [afmc] ++
2,827,018 UART: [afmc] CDI.KEYID = 6
2,827,380 UART: [afmc] SUBJECT.KEYID = 7
2,827,805 UART: [afmc] AUTHORITY.KEYID = 5
2,863,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,646 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,394 UART: [afmc] PUB.X = 2E657FE996DABD77BD37122FD15D3E0F389CA3A1985026435551C045C15F1AB9868954C8FEAD680EF63AE485883D4C3C
2,886,105 UART: [afmc] PUB.Y = F3E4385A5842232049207BEDA9322D9B88673073F15FC5E1319DA2C5C892D2268275A69C43E15C1C77743939052FE2C7
2,891,990 UART: [afmc] SIG.R = DA81518086251396EEA496D8CAA08B17A4CDF01A10CBC710826AADDCFD1F1613CC540ABBF838C658E7E98A097138ED52
2,897,703 UART: [afmc] SIG.S = 0F27BB7C884A40186780715110D6802C25A3048B95F4DE271D1DEA73CB0D0E14EF37639F4B3D936DE26F10A779C47361
2,905,316 UART: [afmc] --
2,906,330 UART: [cold-reset] --
2,907,354 UART: [state] Locking Datavault
2,908,465 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,069 UART: [state] Locking ICCM
2,909,715 UART: [exit] Launching FMC @ 0x40000130
2,915,045 UART:
2,915,061 UART: Running Caliptra FMC ...
2,915,469 UART:
2,915,612 UART: [state] CFI Enabled
2,925,781 UART: [fht] FMC Alias Private Key: 7
3,045,331 UART: [art] Extend RT PCRs Done
3,045,759 UART: [art] Lock RT PCRs Done
3,047,231 UART: [art] Populate DV Done
3,055,467 UART: [fht] FMC Alias Private Key: 7
3,056,595 UART: [art] Derive CDI
3,056,875 UART: [art] Store in slot 0x4
3,142,586 UART: [art] Derive Key Pair
3,142,946 UART: [art] Store priv key in slot 0x5
3,156,494 UART: [art] Derive Key Pair - Done
3,171,279 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,878 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,643 UART: [art] PUB.X = 551B10C645B5E282037D99A14ADD90674F62D7DED84C2BD430D056A17740D4B96C2E7AA4E9F12DD0D3D6AC3C98C8F671
3,194,420 UART: [art] PUB.Y = C1C6C7B1CF7E4980714B87C9B1D27EBFB12788F48C8714112F444E7C5C5533697B239A94FB59B3F3ABE8403B8CA5B2D1
3,201,378 UART: [art] SIG.R = C1D25D87614A49F2CED1BD757D8E527B7A147AA8C42C29314C07C9DA29AC18130BD9D1F10EF2A97A3E20C78673BDDDF2
3,208,155 UART: [art] SIG.S = F19510C713E47D2BA8300633DCCCC5F0FEC5632E9E3E810D85360A8949CB9F6459322D8C01C15340ED165FECF6D926AC
3,232,321 UART: Caliptra RT
3,232,664 UART: [state] CFI Enabled
3,352,429 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,354,277 UART:
3,354,293 UART: Running Caliptra ROM ...
3,354,701 UART:
3,354,843 UART: [state] CFI Enabled
3,357,475 UART: [state] LifecycleState = Unprovisioned
3,358,130 UART: [state] DebugLocked = No
3,358,822 UART: [state] WD Timer not started. Device not locked for debugging
3,359,974 UART: [kat] SHA2-256
4,165,624 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,169,749 UART: [kat] ++
4,169,901 UART: [kat] sha1
4,174,103 UART: [kat] SHA2-256
4,176,043 UART: [kat] SHA2-384
4,178,726 UART: [kat] SHA2-512-ACC
4,180,626 UART: [kat] ECC-384
4,190,671 UART: [kat] HMAC-384Kdf
4,195,293 UART: [kat] LMS
4,443,621 UART: [kat] --
4,444,411 UART: [update-reset] ++
4,461,812 >>> mbox cmd response: failed
4,461,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,462,304 UART: ROM Non-Fatal Error: 0x000B001E
4,463,158 UART: [state] Locking Datavault
4,463,870 UART: [state] Locking PCR0, PCR1 and PCR31
4,464,474 UART: [state] Locking ICCM
4,464,970 UART: [exit] Launching FMC @ 0x40000130
4,470,300 UART:
4,470,316 UART: Running Caliptra FMC ...
4,470,724 UART:
4,470,867 UART: [state] CFI Enabled
4,560,410 UART: [art] Extend RT PCRs Done
4,560,838 UART: [art] Lock RT PCRs Done
4,562,081 UART: [art] Populate DV Done
4,570,517 UART: [fht] FMC Alias Private Key: 7
4,571,473 UART: [art] Derive CDI
4,571,753 UART: [art] Store in slot 0x4
4,657,464 UART: [art] Derive Key Pair
4,657,824 UART: [art] Store priv key in slot 0x5
4,671,050 UART: [art] Derive Key Pair - Done
4,685,653 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,700,890 UART: [art] Erasing AUTHORITY.KEYID = 7
4,701,655 UART: [art] PUB.X = 551B10C645B5E282037D99A14ADD90674F62D7DED84C2BD430D056A17740D4B96C2E7AA4E9F12DD0D3D6AC3C98C8F671
4,708,432 UART: [art] PUB.Y = C1C6C7B1CF7E4980714B87C9B1D27EBFB12788F48C8714112F444E7C5C5533697B239A94FB59B3F3ABE8403B8CA5B2D1
4,715,390 UART: [art] SIG.R = C1D25D87614A49F2CED1BD757D8E527B7A147AA8C42C29314C07C9DA29AC18130BD9D1F10EF2A97A3E20C78673BDDDF2
4,722,167 UART: [art] SIG.S = F19510C713E47D2BA8300633DCCCC5F0FEC5632E9E3E810D85360A8949CB9F6459322D8C01C15340ED165FECF6D926AC
4,746,355 UART: Caliptra RT
4,746,698 UART: [state] CFI Enabled
5,111,440 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,113,051 UART:
5,113,067 UART: Running Caliptra ROM ...
5,113,475 UART:
5,113,617 UART: [state] CFI Enabled
5,116,161 UART: [state] LifecycleState = Unprovisioned
5,116,816 UART: [state] DebugLocked = No
5,117,516 UART: [state] WD Timer not started. Device not locked for debugging
5,118,792 UART: [kat] SHA2-256
5,924,442 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
5,928,567 UART: [kat] ++
5,928,719 UART: [kat] sha1
5,932,979 UART: [kat] SHA2-256
5,934,919 UART: [kat] SHA2-384
5,937,500 UART: [kat] SHA2-512-ACC
5,939,400 UART: [kat] ECC-384
5,949,413 UART: [kat] HMAC-384Kdf
5,953,939 UART: [kat] LMS
6,202,267 UART: [kat] --
6,202,959 UART: [update-reset] ++
7,561,475 UART: [update-reset] Img verified w/ Vendor ECC Key Index 3
7,562,580 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
7,717,795 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,189 >>> mbox cmd response: success
2,679,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,741,833 UART:
2,741,849 UART: Running Caliptra FMC ...
2,742,257 UART:
2,742,400 UART: [state] CFI Enabled
2,752,857 UART: [fht] FMC Alias Private Key: 7
2,872,447 UART: [art] Extend RT PCRs Done
2,872,875 UART: [art] Lock RT PCRs Done
2,874,529 UART: [art] Populate DV Done
2,882,847 UART: [fht] FMC Alias Private Key: 7
2,883,965 UART: [art] Derive CDI
2,884,245 UART: [art] Store in slot 0x4
2,969,706 UART: [art] Derive Key Pair
2,970,066 UART: [art] Store priv key in slot 0x5
2,983,868 UART: [art] Derive Key Pair - Done
2,998,775 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,234 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,999 UART: [art] PUB.X = F4653F4C4DA49945604ADE14AD552A10BBAD76DD6EF4EBD073AC17774D4F060F670465189051041265E26D9CA17D4E2B
3,021,763 UART: [art] PUB.Y = 8118B80C111A5885122C7F8C3210F7D51DC8ABE3882505302AD65751187B329F82776017324409A81553FC2C9F464BBC
3,028,692 UART: [art] SIG.R = 2CE9343B53311D031D33B88FAC599A50EDF309A01E87D7A3FB787155AAACBE7FAB4F44DBE95ECF73056EC639D02CC275
3,035,471 UART: [art] SIG.S = 9311CBC63732FD8D4EDD630D6F6F468615E7110212DA1FC6999AEF85C1D06322B5287ADAFEE374E5B8F20ACF579A4DD6
3,059,768 UART: Caliptra RT
3,060,111 UART: [state] CFI Enabled
3,178,667 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,173,928 >>> mbox cmd response: failed
4,173,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,179,462 UART:
4,179,478 UART: Running Caliptra FMC ...
4,179,886 UART:
4,180,029 UART: [state] CFI Enabled
4,269,246 UART: [art] Extend RT PCRs Done
4,269,674 UART: [art] Lock RT PCRs Done
4,271,197 UART: [art] Populate DV Done
4,279,119 UART: [fht] FMC Alias Private Key: 7
4,280,095 UART: [art] Derive CDI
4,280,375 UART: [art] Store in slot 0x4
4,366,296 UART: [art] Derive Key Pair
4,366,656 UART: [art] Store priv key in slot 0x5
4,379,458 UART: [art] Derive Key Pair - Done
4,394,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,409,584 UART: [art] Erasing AUTHORITY.KEYID = 7
4,410,349 UART: [art] PUB.X = F4653F4C4DA49945604ADE14AD552A10BBAD76DD6EF4EBD073AC17774D4F060F670465189051041265E26D9CA17D4E2B
4,417,113 UART: [art] PUB.Y = 8118B80C111A5885122C7F8C3210F7D51DC8ABE3882505302AD65751187B329F82776017324409A81553FC2C9F464BBC
4,424,042 UART: [art] SIG.R = 2CE9343B53311D031D33B88FAC599A50EDF309A01E87D7A3FB787155AAACBE7FAB4F44DBE95ECF73056EC639D02CC275
4,430,821 UART: [art] SIG.S = 9311CBC63732FD8D4EDD630D6F6F468615E7110212DA1FC6999AEF85C1D06322B5287ADAFEE374E5B8F20ACF579A4DD6
4,455,050 UART: Caliptra RT
4,455,393 UART: [state] CFI Enabled
4,822,292 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,314,456 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_ecc_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,076 writing to cptra_bootfsm_go
192,217 UART:
192,563 UART: Running Caliptra ROM ...
193,765 UART:
193,924 UART: [state] CFI Enabled
256,750 UART: [state] LifecycleState = Unprovisioned
258,708 UART: [state] DebugLocked = No
260,095 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
265,613 UART: [kat] SHA2-256
435,316 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
445,819 UART: [kat] ++
446,315 UART: [kat] sha1
457,938 UART: [kat] SHA2-256
460,633 UART: [kat] SHA2-384
466,941 UART: [kat] SHA2-512-ACC
469,282 UART: [kat] ECC-384
2,761,326 UART: [kat] HMAC-384Kdf
2,774,611 UART: [kat] LMS
3,964,907 UART: [kat] --
3,968,157 UART: [cold-reset] ++
3,970,256 UART: [fht] Storing FHT @ 0x50003400
3,980,444 UART: [idev] ++
3,981,062 UART: [idev] CDI.KEYID = 6
3,982,148 UART: [idev] SUBJECT.KEYID = 7
3,983,280 UART: [idev] UDS.KEYID = 0
3,986,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,135,454 UART: [idev] Erasing UDS.KEYID = 0
7,318,785 UART: [idev] Using Sha1 for KeyId Algorithm
7,340,377 UART: [idev] --
7,345,021 UART: [ldev] ++
7,345,632 UART: [ldev] CDI.KEYID = 6
7,346,610 UART: [ldev] SUBJECT.KEYID = 5
7,347,776 UART: [ldev] AUTHORITY.KEYID = 7
7,349,068 UART: [ldev] FE.KEYID = 1
7,375,764 UART: [ldev] Erasing FE.KEYID = 1
10,705,261 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
12,999,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,013,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,028,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,043,037 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,061,771 UART: [ldev] --
13,066,500 UART: [fwproc] Waiting for Commands...
13,069,155 UART: [fwproc] Received command 0x46574c44
13,071,402 UART: [fwproc] Received Image of size 118548 bytes
21,687,609 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,769,927 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,843,126 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,171,522 >>> mbox cmd response: success
22,173,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,322,571 UART: [afmc] ++
22,323,220 UART: [afmc] CDI.KEYID = 6
22,324,115 UART: [afmc] SUBJECT.KEYID = 7
22,325,227 UART: [afmc] AUTHORITY.KEYID = 5
25,547,390 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,844,954 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,847,213 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,861,683 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,876,519 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,890,853 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,912,269 UART: [afmc] --
27,916,764 UART: [cold-reset] --
27,919,611 UART: [state] Locking Datavault
27,922,215 UART: [state] Locking PCR0, PCR1 and PCR31
27,923,972 UART: [state] Locking ICCM
27,926,015 UART: [exit] Launching FMC @ 0x40000130
27,934,416 UART:
27,934,653 UART: Running Caliptra FMC ...
27,935,756 UART:
27,935,917 UART: [state] CFI Enabled
28,006,208 UART: [fht] FMC Alias Private Key: 7
30,367,471 UART: [art] Extend RT PCRs Done
30,368,699 UART: [art] Lock RT PCRs Done
30,370,515 UART: [art] Populate DV Done
30,375,819 UART: [fht] FMC Alias Private Key: 7
30,377,471 UART: [art] Derive CDI
30,378,290 UART: [art] Store in slot 0x4
30,436,403 UART: [art] Derive Key Pair
30,437,443 UART: [art] Store priv key in slot 0x5
33,730,176 UART: [art] Derive Key Pair - Done
33,743,170 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
36,032,211 UART: [art] Erasing AUTHORITY.KEYID = 7
36,033,727 UART: [art] PUB.X = 05B76B864BB5A37F1F96103D15661B92A3C0EDE36242C18AE4710CEE25048A827193E934630AC18352E9092C5C9864EE
36,040,975 UART: [art] PUB.Y = AD1B001F3DFF088696E70A96E7A3826E34A07259A8E28B14F343F58E76CFB789BA480DFA3B0545716B2AF0D585B10139
36,048,204 UART: [art] SIG.R = 225295D3357EAD4D84B6FFDB01F0009EB9A0007030359D9D78E6CDF324D6BA4A393A866A54FE58276355892C6F50C6CA
36,055,604 UART: [art] SIG.S = 271D24E0D54ECFE66EA594F051DC60B37E95D8A09D1FCCF419D6D0052790E7418127D696565AD6D245A0B7844CFCD150
37,360,363 UART: Caliptra RT
37,361,051 UART: [state] CFI Enabled
37,539,209 UART: [rt] RT listening for mailbox commands...
37,542,542 UART:
37,542,708 UART: Running Caliptra ROM ...
37,543,729 UART:
37,543,878 UART: [state] CFI Enabled
37,611,824 UART: [state] LifecycleState = Unprovisioned
37,613,783 UART: [state] DebugLocked = No
37,615,937 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,620,625 UART: [kat] SHA2-256
37,790,365 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,800,844 UART: [kat] ++
37,801,327 UART: [kat] sha1
37,813,731 UART: [kat] SHA2-256
37,816,431 UART: [kat] SHA2-384
37,823,070 UART: [kat] SHA2-512-ACC
37,825,164 UART: [kat] ECC-384
40,116,448 UART: [kat] HMAC-384Kdf
40,147,950 UART: [kat] LMS
41,338,287 UART: [kat] --
41,343,049 UART: [update-reset] ++
41,454,853 >>> mbox cmd response: failed
41,457,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,606,332 UART: ROM Non-Fatal Error: 0x000B003D
41,607,763 UART: [state] Locking Datavault
41,608,837 UART: [state] Locking PCR0, PCR1 and PCR31
41,610,376 UART: [state] Locking ICCM
41,611,259 UART: [exit] Launching FMC @ 0x40000130
41,612,606 UART:
41,612,753 UART: Running Caliptra FMC ...
41,613,855 UART:
41,614,008 UART: [state] CFI Enabled
41,614,847 UART: [art] Extend RT PCRs Done
41,615,899 UART: [art] Lock RT PCRs Done
41,616,915 UART: [art] Populate DV Done
41,617,944 UART: [fht] FMC Alias Private Key: 7
41,619,189 UART: [art] Derive CDI
41,619,922 UART: [art] Store in slot 0x4
41,637,161 UART: [art] Derive Key Pair
41,638,166 UART: [art] Store priv key in slot 0x5
44,930,987 UART: [art] Derive Key Pair - Done
44,943,907 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
47,232,741 UART: [art] Erasing AUTHORITY.KEYID = 7
47,234,327 UART: [art] PUB.X = 05B76B864BB5A37F1F96103D15661B92A3C0EDE36242C18AE4710CEE25048A827193E934630AC18352E9092C5C9864EE
47,241,511 UART: [art] PUB.Y = AD1B001F3DFF088696E70A96E7A3826E34A07259A8E28B14F343F58E76CFB789BA480DFA3B0545716B2AF0D585B10139
47,248,785 UART: [art] SIG.R = 225295D3357EAD4D84B6FFDB01F0009EB9A0007030359D9D78E6CDF324D6BA4A393A866A54FE58276355892C6F50C6CA
47,256,108 UART: [art] SIG.S = 271D24E0D54ECFE66EA594F051DC60B37E95D8A09D1FCCF419D6D0052790E7418127D696565AD6D245A0B7844CFCD150
48,561,163 UART: Caliptra RT
48,561,878 UART: [state] CFI Enabled
48,979,169 UART: [rt] RT listening for mailbox commands...
48,981,913 UART:
48,982,079 UART: Running Caliptra ROM ...
48,983,196 UART:
48,983,354 UART: [state] CFI Enabled
49,045,592 UART: [state] LifecycleState = Unprovisioned
49,047,533 UART: [state] DebugLocked = No
49,049,200 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
49,054,648 UART: [kat] SHA2-256
49,224,307 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
49,234,775 UART: [kat] ++
49,235,228 UART: [kat] sha1
49,245,194 UART: [kat] SHA2-256
49,247,886 UART: [kat] SHA2-384
49,253,875 UART: [kat] SHA2-512-ACC
49,256,280 UART: [kat] ECC-384
51,548,424 UART: [kat] HMAC-384Kdf
51,559,897 UART: [kat] LMS
52,750,233 UART: [kat] --
52,756,079 UART: [update-reset] ++
61,453,807 UART: [update-reset] Image verified using Vendor ECC Key Index 0
61,458,214 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,855,971 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,785,038 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,052,599 >>> mbox cmd response: success
22,054,655 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,740,719 UART:
27,741,658 UART: Running Caliptra FMC ...
27,742,804 UART:
27,742,960 UART: [state] CFI Enabled
27,796,323 UART: [fht] FMC Alias Private Key: 7
30,137,060 UART: [art] Extend RT PCRs Done
30,138,606 UART: [art] Lock RT PCRs Done
30,139,839 UART: [art] Populate DV Done
30,145,158 UART: [fht] FMC Alias Private Key: 7
30,146,690 UART: [art] Derive CDI
30,147,486 UART: [art] Store in slot 0x4
30,206,438 UART: [art] Derive Key Pair
30,207,441 UART: [art] Store priv key in slot 0x5
33,500,601 UART: [art] Derive Key Pair - Done
33,513,795 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,801,929 UART: [art] Erasing AUTHORITY.KEYID = 7
35,803,454 UART: [art] PUB.X = 11A1FE05078BD8DC71BF77A7A009859C55BFB744EB2350E3AB1B639B96B474C31FDEB0A7C6849B77FD24D96BE304F6E4
35,810,704 UART: [art] PUB.Y = 141CB5ABCA07461CDF09D2797255D23C49FC211FC234FC041D7623E10D7CB6C09AE7CA84645B279550E5F7E204A7D262
35,817,978 UART: [art] SIG.R = F49234538751A46C719ED9008EBA3B3CFCC3C708DBF88C8C016515A33C50C0A89F5C1F2EC6EC189F324674658A4D0773
35,825,361 UART: [art] SIG.S = ED1294EDC599B85D10DF8829E021340EFB1BD53CC33797CD3DF967DB89155F5FDEC63C694B531640CC424F9706B9A8BB
37,130,348 UART: Caliptra RT
37,131,049 UART: [state] CFI Enabled
37,307,897 UART: [rt] RT listening for mailbox commands...
41,037,134 >>> mbox cmd response: failed
41,039,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,188,285 UART:
41,188,601 UART: Running Caliptra FMC ...
41,189,723 UART:
41,189,891 UART: [state] CFI Enabled
41,190,816 UART: [art] Extend RT PCRs Done
41,191,990 UART: [art] Lock RT PCRs Done
41,193,066 UART: [art] Populate DV Done
41,194,101 UART: [fht] FMC Alias Private Key: 7
41,195,499 UART: [art] Derive CDI
41,196,243 UART: [art] Store in slot 0x4
41,213,026 UART: [art] Derive Key Pair
41,214,030 UART: [art] Store priv key in slot 0x5
44,506,195 UART: [art] Derive Key Pair - Done
44,519,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,807,591 UART: [art] Erasing AUTHORITY.KEYID = 7
46,809,168 UART: [art] PUB.X = 11A1FE05078BD8DC71BF77A7A009859C55BFB744EB2350E3AB1B639B96B474C31FDEB0A7C6849B77FD24D96BE304F6E4
46,816,372 UART: [art] PUB.Y = 141CB5ABCA07461CDF09D2797255D23C49FC211FC234FC041D7623E10D7CB6C09AE7CA84645B279550E5F7E204A7D262
46,823,606 UART: [art] SIG.R = F49234538751A46C719ED9008EBA3B3CFCC3C708DBF88C8C016515A33C50C0A89F5C1F2EC6EC189F324674658A4D0773
46,830,996 UART: [art] SIG.S = ED1294EDC599B85D10DF8829E021340EFB1BD53CC33797CD3DF967DB89155F5FDEC63C694B531640CC424F9706B9A8BB
48,136,340 UART: Caliptra RT
48,137,050 UART: [state] CFI Enabled
48,554,725 UART: [rt] RT listening for mailbox commands...
61,338,947 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.39s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,601 UART:
192,951 UART: Running Caliptra ROM ...
194,137 UART:
603,733 UART: [state] CFI Enabled
619,060 UART: [state] LifecycleState = Unprovisioned
621,001 UART: [state] DebugLocked = No
623,367 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,837 UART: [kat] SHA2-256
797,582 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,132 UART: [kat] ++
808,604 UART: [kat] sha1
819,161 UART: [kat] SHA2-256
821,897 UART: [kat] SHA2-384
827,120 UART: [kat] SHA2-512-ACC
829,518 UART: [kat] ECC-384
3,112,997 UART: [kat] HMAC-384Kdf
3,126,026 UART: [kat] LMS
4,316,121 UART: [kat] --
4,320,099 UART: [cold-reset] ++
4,321,824 UART: [fht] Storing FHT @ 0x50003400
4,333,746 UART: [idev] ++
4,334,324 UART: [idev] CDI.KEYID = 6
4,335,250 UART: [idev] SUBJECT.KEYID = 7
4,336,476 UART: [idev] UDS.KEYID = 0
4,339,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,050 UART: [idev] Erasing UDS.KEYID = 0
7,624,177 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,219 UART: [idev] --
7,649,248 UART: [ldev] ++
7,649,823 UART: [ldev] CDI.KEYID = 6
7,650,741 UART: [ldev] SUBJECT.KEYID = 5
7,651,966 UART: [ldev] AUTHORITY.KEYID = 7
7,653,262 UART: [ldev] FE.KEYID = 1
7,664,618 UART: [ldev] Erasing FE.KEYID = 1
10,953,304 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,396 UART: [ldev] --
13,315,890 UART: [fwproc] Waiting for Commands...
13,318,051 UART: [fwproc] Received command 0x46574c44
13,320,266 UART: [fwproc] Received Image of size 118548 bytes
21,774,419 UART: [fwproc] Image verified using Vendor ECC Key Index 0
21,852,354 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
21,925,543 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
22,253,961 >>> mbox cmd response: success
22,255,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,404,767 UART: [afmc] ++
22,405,407 UART: [afmc] CDI.KEYID = 6
22,406,329 UART: [afmc] SUBJECT.KEYID = 7
22,407,447 UART: [afmc] AUTHORITY.KEYID = 5
25,575,942 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
27,869,631 UART: [afmc] Erasing AUTHORITY.KEYID = 5
27,871,912 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
27,886,387 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
27,901,166 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
27,915,612 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
27,935,612 UART: [afmc] --
27,938,892 UART: [cold-reset] --
27,943,735 UART: [state] Locking Datavault
27,950,350 UART: [state] Locking PCR0, PCR1 and PCR31
27,952,114 UART: [state] Locking ICCM
27,953,246 UART: [exit] Launching FMC @ 0x40000130
27,961,648 UART:
27,961,891 UART: Running Caliptra FMC ...
27,963,000 UART:
27,963,174 UART: [state] CFI Enabled
27,970,899 UART: [fht] FMC Alias Private Key: 7
30,311,271 UART: [art] Extend RT PCRs Done
30,312,516 UART: [art] Lock RT PCRs Done
30,314,214 UART: [art] Populate DV Done
30,319,749 UART: [fht] FMC Alias Private Key: 7
30,321,300 UART: [art] Derive CDI
30,322,089 UART: [art] Store in slot 0x4
30,364,469 UART: [art] Derive Key Pair
30,365,475 UART: [art] Store priv key in slot 0x5
33,607,494 UART: [art] Derive Key Pair - Done
33,620,401 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,900,829 UART: [art] Erasing AUTHORITY.KEYID = 7
35,902,344 UART: [art] PUB.X = 42D480A21B13BDD232389FDE0DD779F8C9C780C4B8F744912008AD23DE7F4E4BF78FD2309A99D80D434292BA16F50122
35,909,612 UART: [art] PUB.Y = 2BA883DA1DE5E2FE8F25E4C0B78FF31C8DD4A4144573AE147B441813DF58AA9B50B4B1D760F72553F98A5051F281862D
35,916,861 UART: [art] SIG.R = 4C80580B97CF8154672765251063E702802288DC52D43FC000A887C2B34C9F374D591096E617AD5168D7935EEA136E6B
35,924,196 UART: [art] SIG.S = 0F21F26F93881850F1BE4E1113B6053722A0ECF62F924590BBE8B08E4415538CA00CF4753C548EED5314AB8CF58539D5
37,229,082 UART: Caliptra RT
37,229,775 UART: [state] CFI Enabled
37,363,320 UART: [rt] RT listening for mailbox commands...
37,366,224 UART:
37,366,480 UART: Running Caliptra ROM ...
37,367,512 UART:
37,367,852 UART: [state] CFI Enabled
37,382,636 UART: [state] LifecycleState = Unprovisioned
37,384,525 UART: [state] DebugLocked = No
37,386,677 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
37,390,781 UART: [kat] SHA2-256
37,560,494 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
37,571,014 UART: [kat] ++
37,571,473 UART: [kat] sha1
37,581,665 UART: [kat] SHA2-256
37,584,348 UART: [kat] SHA2-384
37,589,352 UART: [kat] SHA2-512-ACC
37,591,715 UART: [kat] ECC-384
39,877,623 UART: [kat] HMAC-384Kdf
39,890,392 UART: [kat] LMS
41,080,468 UART: [kat] --
41,084,548 UART: [update-reset] ++
41,205,429 >>> mbox cmd response: failed
41,207,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,356,714 UART: ROM Non-Fatal Error: 0x000B003D
41,358,147 UART: [state] Locking Datavault
41,359,222 UART: [state] Locking PCR0, PCR1 and PCR31
41,360,762 UART: [state] Locking ICCM
41,361,646 UART: [exit] Launching FMC @ 0x40000130
41,362,995 UART:
41,363,146 UART: Running Caliptra FMC ...
41,364,248 UART:
41,364,407 UART: [state] CFI Enabled
41,365,246 UART: [art] Extend RT PCRs Done
41,366,302 UART: [art] Lock RT PCRs Done
41,367,284 UART: [art] Populate DV Done
41,368,316 UART: [fht] FMC Alias Private Key: 7
41,369,559 UART: [art] Derive CDI
41,370,312 UART: [art] Store in slot 0x4
41,371,386 UART: [art] Derive Key Pair
41,372,303 UART: [art] Store priv key in slot 0x5
44,566,733 UART: [art] Derive Key Pair - Done
44,579,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,860,373 UART: [art] Erasing AUTHORITY.KEYID = 7
46,861,942 UART: [art] PUB.X = 42D480A21B13BDD232389FDE0DD779F8C9C780C4B8F744912008AD23DE7F4E4BF78FD2309A99D80D434292BA16F50122
46,869,153 UART: [art] PUB.Y = 2BA883DA1DE5E2FE8F25E4C0B78FF31C8DD4A4144573AE147B441813DF58AA9B50B4B1D760F72553F98A5051F281862D
46,876,392 UART: [art] SIG.R = 4C80580B97CF8154672765251063E702802288DC52D43FC000A887C2B34C9F374D591096E617AD5168D7935EEA136E6B
46,883,738 UART: [art] SIG.S = 0F21F26F93881850F1BE4E1113B6053722A0ECF62F924590BBE8B08E4415538CA00CF4753C548EED5314AB8CF58539D5
48,189,155 UART: Caliptra RT
48,189,874 UART: [state] CFI Enabled
48,565,147 UART: [rt] RT listening for mailbox commands...
48,567,980 UART:
48,568,245 UART: Running Caliptra ROM ...
48,569,362 UART:
48,569,602 UART: [state] CFI Enabled
48,585,331 UART: [state] LifecycleState = Unprovisioned
48,587,224 UART: [state] DebugLocked = No
48,589,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
48,594,105 UART: [kat] SHA2-256
48,763,852 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
48,774,379 UART: [kat] ++
48,774,924 UART: [kat] sha1
48,785,170 UART: [kat] SHA2-256
48,787,900 UART: [kat] SHA2-384
48,793,848 UART: [kat] SHA2-512-ACC
48,796,214 UART: [kat] ECC-384
51,080,156 UART: [kat] HMAC-384Kdf
51,092,924 UART: [kat] LMS
52,282,984 UART: [kat] --
52,286,662 UART: [update-reset] ++
60,823,092 UART: [update-reset] Image verified using Vendor ECC Key Index 0
60,826,449 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
61,224,225 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.38s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
4,128,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,263,556 >>> mbox cmd response: success
22,265,657 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,906,736 UART:
27,907,147 UART: Running Caliptra FMC ...
27,908,268 UART:
27,908,426 UART: [state] CFI Enabled
27,916,834 UART: [fht] FMC Alias Private Key: 7
30,256,319 UART: [art] Extend RT PCRs Done
30,257,555 UART: [art] Lock RT PCRs Done
30,259,270 UART: [art] Populate DV Done
30,264,812 UART: [fht] FMC Alias Private Key: 7
30,266,531 UART: [art] Derive CDI
30,267,273 UART: [art] Store in slot 0x4
30,309,867 UART: [art] Derive Key Pair
30,310,951 UART: [art] Store priv key in slot 0x5
33,553,277 UART: [art] Derive Key Pair - Done
33,566,179 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,847,011 UART: [art] Erasing AUTHORITY.KEYID = 7
35,848,529 UART: [art] PUB.X = 61B5B519642F93BA85B639D7ED5D207EF621D4BA57E0D83E55953E8637B7070DD84DCAC800AA33B9E2991C61382D1C37
35,855,784 UART: [art] PUB.Y = E09E4311F6F10DD932800286624C891E1BEADE4FADE56266EC634E459E541DD28C1D835BBA092BC57AFF22E335A54FBA
35,863,012 UART: [art] SIG.R = D09F5EA8698B7CEC3E2F2DC2BBF83135D5B533D180AA273D5B9E7F289EE8879D48CD2AF362CE813FA5D93D54AB629E83
35,870,473 UART: [art] SIG.S = 1944123E9B70CE34977A7D320BA127C67F9FDA3AAA63DC6DF04E50CEA178D42BFF7FDE6EF7629D6DCE63860C80BAE29F
37,176,134 UART: Caliptra RT
37,176,847 UART: [state] CFI Enabled
37,310,562 UART: [rt] RT listening for mailbox commands...
40,962,067 >>> mbox cmd response: failed
40,963,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
41,112,769 UART:
41,113,086 UART: Running Caliptra FMC ...
41,114,224 UART:
41,114,400 UART: [state] CFI Enabled
41,115,333 UART: [art] Extend RT PCRs Done
41,116,480 UART: [art] Lock RT PCRs Done
41,117,556 UART: [art] Populate DV Done
41,118,594 UART: [fht] FMC Alias Private Key: 7
41,119,993 UART: [art] Derive CDI
41,120,741 UART: [art] Store in slot 0x4
41,121,810 UART: [art] Derive Key Pair
41,122,812 UART: [art] Store priv key in slot 0x5
44,318,865 UART: [art] Derive Key Pair - Done
44,331,823 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
46,611,968 UART: [art] Erasing AUTHORITY.KEYID = 7
46,613,501 UART: [art] PUB.X = 61B5B519642F93BA85B639D7ED5D207EF621D4BA57E0D83E55953E8637B7070DD84DCAC800AA33B9E2991C61382D1C37
46,620,728 UART: [art] PUB.Y = E09E4311F6F10DD932800286624C891E1BEADE4FADE56266EC634E459E541DD28C1D835BBA092BC57AFF22E335A54FBA
46,627,979 UART: [art] SIG.R = D09F5EA8698B7CEC3E2F2DC2BBF83135D5B533D180AA273D5B9E7F289EE8879D48CD2AF362CE813FA5D93D54AB629E83
46,635,382 UART: [art] SIG.S = 1944123E9B70CE34977A7D320BA127C67F9FDA3AAA63DC6DF04E50CEA178D42BFF7FDE6EF7629D6DCE63860C80BAE29F
47,940,760 UART: Caliptra RT
47,941,480 UART: [state] CFI Enabled
48,315,081 UART: [rt] RT listening for mailbox commands...
61,040,669 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.37s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,132 UART:
192,493 UART: Running Caliptra ROM ...
193,587 UART:
193,732 UART: [state] CFI Enabled
260,090 UART: [state] LifecycleState = Unprovisioned
262,075 UART: [state] DebugLocked = No
263,869 UART: [state] WD Timer not started. Device not locked for debugging
267,488 UART: [kat] SHA2-256
447,142 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
457,934 UART: [kat] ++
458,391 UART: [kat] sha1
469,435 UART: [kat] SHA2-256
472,129 UART: [kat] SHA2-384
476,978 UART: [kat] SHA2-512-ACC
479,318 UART: [kat] ECC-384
2,943,591 UART: [kat] HMAC-384Kdf
2,966,945 UART: [kat] LMS
3,443,427 UART: [kat] --
3,448,290 UART: [cold-reset] ++
3,450,442 UART: [fht] FHT @ 0x50003400
3,463,092 UART: [idev] ++
3,463,669 UART: [idev] CDI.KEYID = 6
3,464,612 UART: [idev] SUBJECT.KEYID = 7
3,465,849 UART: [idev] UDS.KEYID = 0
3,468,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,162 UART: [idev] Erasing UDS.KEYID = 0
5,980,807 UART: [idev] Sha1 KeyId Algorithm
6,003,072 UART: [idev] --
6,008,109 UART: [ldev] ++
6,008,690 UART: [ldev] CDI.KEYID = 6
6,009,623 UART: [ldev] SUBJECT.KEYID = 5
6,010,793 UART: [ldev] AUTHORITY.KEYID = 7
6,012,036 UART: [ldev] FE.KEYID = 1
6,053,156 UART: [ldev] Erasing FE.KEYID = 1
8,562,476 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,854 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,711 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,559 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,341,115 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,047 UART: [ldev] --
10,367,221 UART: [fwproc] Wait for Commands...
10,370,231 UART: [fwproc] Recv command 0x46574c44
10,372,233 UART: [fwproc] Recv'd Img size: 118548 bytes
14,900,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,982,214 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,055,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,383,236 >>> mbox cmd response: success
15,385,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,534,217 UART: [afmc] ++
15,534,850 UART: [afmc] CDI.KEYID = 6
15,535,783 UART: [afmc] SUBJECT.KEYID = 7
15,536,830 UART: [afmc] AUTHORITY.KEYID = 5
17,937,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,677,070 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,679,253 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,695,113 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,711,057 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,726,758 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,750,212 UART: [afmc] --
19,754,241 UART: [cold-reset] --
19,758,321 UART: [state] Locking Datavault
19,762,609 UART: [state] Locking PCR0, PCR1 and PCR31
19,764,362 UART: [state] Locking ICCM
19,766,136 UART: [exit] Launching FMC @ 0x40000130
19,774,587 UART:
19,774,824 UART: Running Caliptra FMC ...
19,775,929 UART:
19,776,096 UART: [state] CFI Enabled
19,834,402 UART: [fht] FMC Alias Private Key: 7
21,601,043 UART: [art] Extend RT PCRs Done
21,602,261 UART: [art] Lock RT PCRs Done
21,603,915 UART: [art] Populate DV Done
21,609,220 UART: [fht] FMC Alias Private Key: 7
21,610,758 UART: [art] Derive CDI
21,611,578 UART: [art] Store in slot 0x4
21,667,404 UART: [art] Derive Key Pair
21,668,451 UART: [art] Store priv key in slot 0x5
24,131,665 UART: [art] Derive Key Pair - Done
24,144,656 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,857,484 UART: [art] Erasing AUTHORITY.KEYID = 7
25,859,004 UART: [art] PUB.X = 55F0ED62095EC78455EA4D9CFDC5C16163017B3BCBD93AE3B666BF65767623BDC640640F8196470EC4E8727E010550C7
25,866,214 UART: [art] PUB.Y = CE6FBEB3ADA8F3F13119BC52A4D9B94A1C8C9A6F7E7C82C1901BA797F0625D340EF92E8FCD067E76EFCFDC5C17380383
25,873,504 UART: [art] SIG.R = BA21F0C812A193DEDF7454D3F2426C719C7CA9C431C14CB5D9097B54EA32F01BFB811D1FBFA5353249A8745BC457C0A6
25,880,900 UART: [art] SIG.S = B3BFE21D7B59143D623A3A91D96E73B6CD26DE66253E1D0F312F5D5CFAD0DB9AA943CFAC96DE642DA10DA8CD0FCA100D
26,859,524 UART: Caliptra RT
26,860,214 UART: [state] CFI Enabled
27,041,980 UART: [rt] RT listening for mailbox commands...
27,045,341 UART:
27,045,597 UART: Running Caliptra ROM ...
27,046,710 UART:
27,046,879 UART: [state] CFI Enabled
27,114,659 UART: [state] LifecycleState = Unprovisioned
27,116,583 UART: [state] DebugLocked = No
27,119,109 UART: [state] WD Timer not started. Device not locked for debugging
27,122,856 UART: [kat] SHA2-256
27,302,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,313,266 UART: [kat] ++
27,313,759 UART: [kat] sha1
27,324,866 UART: [kat] SHA2-256
27,327,560 UART: [kat] SHA2-384
27,333,372 UART: [kat] SHA2-512-ACC
27,335,729 UART: [kat] ECC-384
29,797,982 UART: [kat] HMAC-384Kdf
29,820,759 UART: [kat] LMS
30,297,221 UART: [kat] --
30,300,132 UART: [update-reset] ++
30,345,277 >>> mbox cmd response: failed
30,347,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,496,662 UART: ROM Non-Fatal Error: 0x000B003D
30,498,098 UART: [state] Locking Datavault
30,499,179 UART: [state] Locking PCR0, PCR1 and PCR31
30,500,720 UART: [state] Locking ICCM
30,501,605 UART: [exit] Launching FMC @ 0x40000130
30,502,951 UART:
30,503,101 UART: Running Caliptra FMC ...
30,504,201 UART:
30,504,355 UART: [state] CFI Enabled
30,505,190 UART: [art] Extend RT PCRs Done
30,506,246 UART: [art] Lock RT PCRs Done
30,507,278 UART: [art] Populate DV Done
30,508,314 UART: [fht] FMC Alias Private Key: 7
30,509,560 UART: [art] Derive CDI
30,510,287 UART: [art] Store in slot 0x4
30,543,058 UART: [art] Derive Key Pair
30,544,102 UART: [art] Store priv key in slot 0x5
33,006,789 UART: [art] Derive Key Pair - Done
33,019,477 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,732,122 UART: [art] Erasing AUTHORITY.KEYID = 7
34,733,638 UART: [art] PUB.X = 55F0ED62095EC78455EA4D9CFDC5C16163017B3BCBD93AE3B666BF65767623BDC640640F8196470EC4E8727E010550C7
34,740,896 UART: [art] PUB.Y = CE6FBEB3ADA8F3F13119BC52A4D9B94A1C8C9A6F7E7C82C1901BA797F0625D340EF92E8FCD067E76EFCFDC5C17380383
34,748,189 UART: [art] SIG.R = BA21F0C812A193DEDF7454D3F2426C719C7CA9C431C14CB5D9097B54EA32F01BFB811D1FBFA5353249A8745BC457C0A6
34,755,595 UART: [art] SIG.S = B3BFE21D7B59143D623A3A91D96E73B6CD26DE66253E1D0F312F5D5CFAD0DB9AA943CFAC96DE642DA10DA8CD0FCA100D
35,734,557 UART: Caliptra RT
35,735,271 UART: [state] CFI Enabled
36,154,956 UART: [rt] RT listening for mailbox commands...
36,157,724 UART:
36,157,897 UART: Running Caliptra ROM ...
36,159,006 UART:
36,159,172 UART: [state] CFI Enabled
36,224,696 UART: [state] LifecycleState = Unprovisioned
36,226,625 UART: [state] DebugLocked = No
36,229,420 UART: [state] WD Timer not started. Device not locked for debugging
36,232,893 UART: [kat] SHA2-256
36,412,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
36,423,381 UART: [kat] ++
36,423,930 UART: [kat] sha1
36,435,636 UART: [kat] SHA2-256
36,438,329 UART: [kat] SHA2-384
36,443,832 UART: [kat] SHA2-512-ACC
36,446,182 UART: [kat] ECC-384
38,909,939 UART: [kat] HMAC-384Kdf
38,931,041 UART: [kat] LMS
39,407,488 UART: [kat] --
39,412,287 UART: [update-reset] ++
43,959,227 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
43,962,386 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
44,360,029 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
3,456,937 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,364,148 >>> mbox cmd response: success
15,366,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,650,712 UART:
19,651,161 UART: Running Caliptra FMC ...
19,652,277 UART:
19,652,465 UART: [state] CFI Enabled
19,712,791 UART: [fht] FMC Alias Private Key: 7
21,478,527 UART: [art] Extend RT PCRs Done
21,479,752 UART: [art] Lock RT PCRs Done
21,481,764 UART: [art] Populate DV Done
21,487,010 UART: [fht] FMC Alias Private Key: 7
21,488,571 UART: [art] Derive CDI
21,489,396 UART: [art] Store in slot 0x4
21,544,746 UART: [art] Derive Key Pair
21,545,791 UART: [art] Store priv key in slot 0x5
24,008,993 UART: [art] Derive Key Pair - Done
24,021,730 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,735,429 UART: [art] Erasing AUTHORITY.KEYID = 7
25,736,929 UART: [art] PUB.X = 898ED2AAB9E0AC9E5C83624E7D759C22D2F44525A324F0A1275734272C61310426FD4ACEC222E8099714701207290877
25,744,206 UART: [art] PUB.Y = FA6B6C77CB6C723774BC35BF83E6DFC6BD5B6ED81859944978FB8CE52D68DC538B99F1F8644C0D54945D3A566BF5CB38
25,751,456 UART: [art] SIG.R = 6756A0ACD8D6A348FA48C060EA6E9E00D2D053C0D56F456DD1F564B9CD2A325F1A69C90D8D0B80B4B6D0A692F30EA149
25,758,861 UART: [art] SIG.S = B2B3D30FF4E923D16AF41E7ACCFA763B0C3A2959281E83B7512219FC9B54B78850C15F5CC84ACB1F7C9008CEC3B8AACF
26,737,182 UART: Caliptra RT
26,737,899 UART: [state] CFI Enabled
26,919,257 UART: [rt] RT listening for mailbox commands...
30,229,024 >>> mbox cmd response: failed
30,230,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,379,830 UART:
30,380,150 UART: Running Caliptra FMC ...
30,381,225 UART:
30,381,392 UART: [state] CFI Enabled
30,382,447 UART: [art] Extend RT PCRs Done
30,383,609 UART: [art] Lock RT PCRs Done
30,384,685 UART: [art] Populate DV Done
30,385,668 UART: [fht] FMC Alias Private Key: 7
30,387,061 UART: [art] Derive CDI
30,387,808 UART: [art] Store in slot 0x4
30,398,947 UART: [art] Derive Key Pair
30,399,947 UART: [art] Store priv key in slot 0x5
32,863,104 UART: [art] Derive Key Pair - Done
32,875,945 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,588,264 UART: [art] Erasing AUTHORITY.KEYID = 7
34,589,778 UART: [art] PUB.X = 898ED2AAB9E0AC9E5C83624E7D759C22D2F44525A324F0A1275734272C61310426FD4ACEC222E8099714701207290877
34,597,012 UART: [art] PUB.Y = FA6B6C77CB6C723774BC35BF83E6DFC6BD5B6ED81859944978FB8CE52D68DC538B99F1F8644C0D54945D3A566BF5CB38
34,604,301 UART: [art] SIG.R = 6756A0ACD8D6A348FA48C060EA6E9E00D2D053C0D56F456DD1F564B9CD2A325F1A69C90D8D0B80B4B6D0A692F30EA149
34,611,638 UART: [art] SIG.S = B2B3D30FF4E923D16AF41E7ACCFA763B0C3A2959281E83B7512219FC9B54B78850C15F5CC84ACB1F7C9008CEC3B8AACF
35,590,632 UART: Caliptra RT
35,591,336 UART: [state] CFI Enabled
36,010,461 UART: [rt] RT listening for mailbox commands...
44,309,405 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,440 writing to cptra_bootfsm_go
192,736 UART:
193,095 UART: Running Caliptra ROM ...
194,293 UART:
603,914 UART: [state] CFI Enabled
619,939 UART: [state] LifecycleState = Unprovisioned
621,872 UART: [state] DebugLocked = No
624,397 UART: [state] WD Timer not started. Device not locked for debugging
628,131 UART: [kat] SHA2-256
807,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,548 UART: [kat] ++
819,146 UART: [kat] sha1
830,218 UART: [kat] SHA2-256
832,905 UART: [kat] SHA2-384
839,321 UART: [kat] SHA2-512-ACC
841,712 UART: [kat] ECC-384
3,280,535 UART: [kat] HMAC-384Kdf
3,293,154 UART: [kat] LMS
3,769,655 UART: [kat] --
3,775,435 UART: [cold-reset] ++
3,777,974 UART: [fht] FHT @ 0x50003400
3,788,956 UART: [idev] ++
3,789,528 UART: [idev] CDI.KEYID = 6
3,790,552 UART: [idev] SUBJECT.KEYID = 7
3,791,717 UART: [idev] UDS.KEYID = 0
3,794,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,677 UART: [idev] Erasing UDS.KEYID = 0
6,274,668 UART: [idev] Sha1 KeyId Algorithm
6,296,861 UART: [idev] --
6,301,558 UART: [ldev] ++
6,302,131 UART: [ldev] CDI.KEYID = 6
6,303,100 UART: [ldev] SUBJECT.KEYID = 5
6,304,265 UART: [ldev] AUTHORITY.KEYID = 7
6,305,505 UART: [ldev] FE.KEYID = 1
6,317,725 UART: [ldev] Erasing FE.KEYID = 1
8,797,431 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,797 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,691 UART: [ldev] --
10,592,337 UART: [fwproc] Wait for Commands...
10,594,829 UART: [fwproc] Recv command 0x46574c44
10,596,871 UART: [fwproc] Recv'd Img size: 118548 bytes
15,131,268 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,204,663 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,277,680 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,606,039 >>> mbox cmd response: success
15,607,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,756,826 UART: [afmc] ++
15,757,471 UART: [afmc] CDI.KEYID = 6
15,758,396 UART: [afmc] SUBJECT.KEYID = 7
15,759,507 UART: [afmc] AUTHORITY.KEYID = 5
18,117,317 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,838,129 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,840,313 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
19,856,134 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
19,872,112 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
19,887,797 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
19,911,543 UART: [afmc] --
19,915,325 UART: [cold-reset] --
19,917,522 UART: [state] Locking Datavault
19,924,285 UART: [state] Locking PCR0, PCR1 and PCR31
19,926,047 UART: [state] Locking ICCM
19,927,497 UART: [exit] Launching FMC @ 0x40000130
19,935,900 UART:
19,936,138 UART: Running Caliptra FMC ...
19,937,247 UART:
19,937,415 UART: [state] CFI Enabled
19,945,412 UART: [fht] FMC Alias Private Key: 7
21,711,563 UART: [art] Extend RT PCRs Done
21,712,781 UART: [art] Lock RT PCRs Done
21,714,494 UART: [art] Populate DV Done
21,720,153 UART: [fht] FMC Alias Private Key: 7
21,721,814 UART: [art] Derive CDI
21,722,633 UART: [art] Store in slot 0x4
21,765,193 UART: [art] Derive Key Pair
21,766,219 UART: [art] Store priv key in slot 0x5
24,193,205 UART: [art] Derive Key Pair - Done
24,206,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,912,224 UART: [art] Erasing AUTHORITY.KEYID = 7
25,913,735 UART: [art] PUB.X = 2255DF139B195F9FB1A103E48EF816DE8DB0C6F8E0799B67ED8D9A21DF522F0686D9C012A0165D49406D43D6C2CBC6A4
25,920,983 UART: [art] PUB.Y = 618D7D4A735728373CCDC504CE78C1438013F31974B1BE9C51370F9DD19F3901BA5116D93FD0E7E65688980CB49F1FB5
25,928,266 UART: [art] SIG.R = E5CF261B6E85DB6EA826AA8BC06CF6976F8FFD4D388AB2012C142895FC70F127670D654ED547251B3764994196638497
25,935,602 UART: [art] SIG.S = 4986E76289D9EA46253786CAE59CD43EA7982D69FDB479BFDE63A7F5CA31C5A857582039088108FE1F5C884451387E1C
26,914,584 UART: Caliptra RT
26,915,312 UART: [state] CFI Enabled
27,048,032 UART: [rt] RT listening for mailbox commands...
27,050,991 UART:
27,051,167 UART: Running Caliptra ROM ...
27,052,277 UART:
27,052,602 UART: [state] CFI Enabled
27,065,025 UART: [state] LifecycleState = Unprovisioned
27,066,968 UART: [state] DebugLocked = No
27,069,729 UART: [state] WD Timer not started. Device not locked for debugging
27,074,503 UART: [kat] SHA2-256
27,254,233 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
27,265,024 UART: [kat] ++
27,265,489 UART: [kat] sha1
27,276,375 UART: [kat] SHA2-256
27,279,064 UART: [kat] SHA2-384
27,284,189 UART: [kat] SHA2-512-ACC
27,286,536 UART: [kat] ECC-384
29,730,600 UART: [kat] HMAC-384Kdf
29,742,077 UART: [kat] LMS
30,218,539 UART: [kat] --
30,225,014 UART: [update-reset] ++
30,277,605 >>> mbox cmd response: failed
30,279,793 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,428,610 UART: ROM Non-Fatal Error: 0x000B003D
30,430,044 UART: [state] Locking Datavault
30,431,204 UART: [state] Locking PCR0, PCR1 and PCR31
30,432,741 UART: [state] Locking ICCM
30,433,652 UART: [exit] Launching FMC @ 0x40000130
30,435,074 UART:
30,435,236 UART: Running Caliptra FMC ...
30,436,554 UART:
30,436,727 UART: [state] CFI Enabled
30,437,654 UART: [art] Extend RT PCRs Done
30,438,799 UART: [art] Lock RT PCRs Done
30,439,869 UART: [art] Populate DV Done
30,440,902 UART: [fht] FMC Alias Private Key: 7
30,442,219 UART: [art] Derive CDI
30,442,959 UART: [art] Store in slot 0x4
30,444,038 UART: [art] Derive Key Pair
30,445,040 UART: [art] Store priv key in slot 0x5
32,825,320 UART: [art] Derive Key Pair - Done
32,838,093 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,544,110 UART: [art] Erasing AUTHORITY.KEYID = 7
34,545,613 UART: [art] PUB.X = 2255DF139B195F9FB1A103E48EF816DE8DB0C6F8E0799B67ED8D9A21DF522F0686D9C012A0165D49406D43D6C2CBC6A4
34,552,891 UART: [art] PUB.Y = 618D7D4A735728373CCDC504CE78C1438013F31974B1BE9C51370F9DD19F3901BA5116D93FD0E7E65688980CB49F1FB5
34,560,127 UART: [art] SIG.R = E5CF261B6E85DB6EA826AA8BC06CF6976F8FFD4D388AB2012C142895FC70F127670D654ED547251B3764994196638497
34,567,522 UART: [art] SIG.S = 4986E76289D9EA46253786CAE59CD43EA7982D69FDB479BFDE63A7F5CA31C5A857582039088108FE1F5C884451387E1C
35,546,525 UART: Caliptra RT
35,547,220 UART: [state] CFI Enabled
35,916,918 UART: [rt] RT listening for mailbox commands...
35,919,686 UART:
35,919,861 UART: Running Caliptra ROM ...
35,920,974 UART:
35,921,301 UART: [state] CFI Enabled
40,325,059 UART: [state] LifecycleState = Unprovisioned
40,326,986 UART: [state] DebugLocked = No
40,329,759 UART: [state] WD Timer not started. Device not locked for debugging
40,334,105 UART: [kat] SHA2-256
40,513,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
40,524,618 UART: [kat] ++
40,525,075 UART: [kat] sha1
40,537,153 UART: [kat] SHA2-256
40,539,848 UART: [kat] SHA2-384
40,547,023 UART: [kat] SHA2-512-ACC
40,549,371 UART: [kat] ECC-384
42,993,067 UART: [kat] HMAC-384Kdf
43,005,099 UART: [kat] LMS
43,481,533 UART: [kat] --
43,485,532 UART: [update-reset] ++
48,046,814 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,050,610 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,448,241 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,781,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,611,496 >>> mbox cmd response: success
15,613,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,865,822 UART:
19,866,246 UART: Running Caliptra FMC ...
19,867,366 UART:
19,867,521 UART: [state] CFI Enabled
19,875,113 UART: [fht] FMC Alias Private Key: 7
21,641,143 UART: [art] Extend RT PCRs Done
21,642,370 UART: [art] Lock RT PCRs Done
21,643,938 UART: [art] Populate DV Done
21,649,563 UART: [fht] FMC Alias Private Key: 7
21,651,270 UART: [art] Derive CDI
21,652,033 UART: [art] Store in slot 0x4
21,694,697 UART: [art] Derive Key Pair
21,695,742 UART: [art] Store priv key in slot 0x5
24,122,449 UART: [art] Derive Key Pair - Done
24,135,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,841,613 UART: [art] Erasing AUTHORITY.KEYID = 7
25,843,126 UART: [art] PUB.X = 331EA196313952D836AA1413DCAE2BCC47793905FEEB4383E11539C62AFCBF717CAB409978BC633E635FC71AAE6AF07D
25,850,411 UART: [art] PUB.Y = BEA1F953F31582729598140C2AAE7F25CC0713D94140E223092E739084B738167D25D6C3D881FFC60E169DFEA040C39E
25,857,643 UART: [art] SIG.R = 3389741BD75169003C015C4222DACA8FDCE6779D84F4A8B6E1CCAC4EE9434C26CDEC93B8178247B7C7F4BACC8A481094
25,865,044 UART: [art] SIG.S = F2AAA2041C352A6EFD905CF4445648EF664EBC600A3F9D4FF1B1479D8EE802A5296E4C1D716AE02C4E0A3950BA4FA2E0
26,843,775 UART: Caliptra RT
26,844,491 UART: [state] CFI Enabled
26,977,289 UART: [rt] RT listening for mailbox commands...
30,200,406 >>> mbox cmd response: failed
30,202,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,351,145 UART:
30,351,458 UART: Running Caliptra FMC ...
30,352,584 UART:
30,352,751 UART: [state] CFI Enabled
30,353,674 UART: [art] Extend RT PCRs Done
30,354,816 UART: [art] Lock RT PCRs Done
30,355,888 UART: [art] Populate DV Done
30,356,921 UART: [fht] FMC Alias Private Key: 7
30,358,338 UART: [art] Derive CDI
30,359,086 UART: [art] Store in slot 0x4
30,360,157 UART: [art] Derive Key Pair
30,361,101 UART: [art] Store priv key in slot 0x5
32,741,512 UART: [art] Derive Key Pair - Done
32,754,508 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,461,058 UART: [art] Erasing AUTHORITY.KEYID = 7
34,462,562 UART: [art] PUB.X = 331EA196313952D836AA1413DCAE2BCC47793905FEEB4383E11539C62AFCBF717CAB409978BC633E635FC71AAE6AF07D
34,469,824 UART: [art] PUB.Y = BEA1F953F31582729598140C2AAE7F25CC0713D94140E223092E739084B738167D25D6C3D881FFC60E169DFEA040C39E
34,477,052 UART: [art] SIG.R = 3389741BD75169003C015C4222DACA8FDCE6779D84F4A8B6E1CCAC4EE9434C26CDEC93B8178247B7C7F4BACC8A481094
34,484,450 UART: [art] SIG.S = F2AAA2041C352A6EFD905CF4445648EF664EBC600A3F9D4FF1B1479D8EE802A5296E4C1D716AE02C4E0A3950BA4FA2E0
35,463,183 UART: Caliptra RT
35,463,867 UART: [state] CFI Enabled
35,835,478 UART: [rt] RT listening for mailbox commands...
48,540,064 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,226 UART:
192,581 UART: Running Caliptra ROM ...
193,762 UART:
193,923 UART: [state] CFI Enabled
263,303 UART: [state] LifecycleState = Unprovisioned
265,711 UART: [state] DebugLocked = No
268,183 UART: [state] WD Timer not started. Device not locked for debugging
272,711 UART: [kat] SHA2-256
462,564 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,336 UART: [kat] ++
473,818 UART: [kat] sha1
485,244 UART: [kat] SHA2-256
488,261 UART: [kat] SHA2-384
493,649 UART: [kat] SHA2-512-ACC
496,233 UART: [kat] ECC-384
2,940,499 UART: [kat] HMAC-384Kdf
2,966,028 UART: [kat] LMS
3,497,779 UART: [kat] --
3,503,794 UART: [cold-reset] ++
3,506,097 UART: [fht] FHT @ 0x50003400
3,517,686 UART: [idev] ++
3,518,377 UART: [idev] CDI.KEYID = 6
3,519,399 UART: [idev] SUBJECT.KEYID = 7
3,520,561 UART: [idev] UDS.KEYID = 0
3,523,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,672,577 UART: [idev] Erasing UDS.KEYID = 0
6,021,877 UART: [idev] Sha1 KeyId Algorithm
6,043,136 UART: [idev] --
6,048,227 UART: [ldev] ++
6,048,912 UART: [ldev] CDI.KEYID = 6
6,049,848 UART: [ldev] SUBJECT.KEYID = 5
6,051,017 UART: [ldev] AUTHORITY.KEYID = 7
6,052,263 UART: [ldev] FE.KEYID = 1
6,094,389 UART: [ldev] Erasing FE.KEYID = 1
8,601,923 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,335,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,350,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,747 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,886 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,848 UART: [ldev] --
10,406,851 UART: [fwproc] Wait for Commands...
10,409,709 UART: [fwproc] Recv command 0x46574c44
10,411,969 UART: [fwproc] Recv'd Img size: 118548 bytes
15,103,253 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,184,171 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,307,790 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
15,868,337 >>> mbox cmd response: success
15,870,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,019,698 UART: [afmc] ++
16,020,378 UART: [afmc] CDI.KEYID = 6
16,021,280 UART: [afmc] SUBJECT.KEYID = 7
16,022,400 UART: [afmc] AUTHORITY.KEYID = 5
18,422,025 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,145,302 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,147,212 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,162,298 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,177,537 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,192,600 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,216,250 UART: [afmc] --
20,220,664 UART: [cold-reset] --
20,226,508 UART: [state] Locking Datavault
20,233,604 UART: [state] Locking PCR0, PCR1 and PCR31
20,235,817 UART: [state] Locking ICCM
20,238,166 UART: [exit] Launching FMC @ 0x40000130
20,246,835 UART:
20,247,072 UART: Running Caliptra FMC ...
20,248,103 UART:
20,248,249 UART: [state] CFI Enabled
20,302,371 UART: [fht] FMC Alias Private Key: 7
22,068,923 UART: [art] Extend RT PCRs Done
22,070,136 UART: [art] Lock RT PCRs Done
22,071,846 UART: [art] Populate DV Done
22,077,152 UART: [fht] FMC Alias Private Key: 7
22,078,648 UART: [art] Derive CDI
22,079,387 UART: [art] Store in slot 0x4
22,135,325 UART: [art] Derive Key Pair
22,136,330 UART: [art] Store priv key in slot 0x5
24,599,531 UART: [art] Derive Key Pair - Done
24,612,073 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,325,602 UART: [art] Erasing AUTHORITY.KEYID = 7
26,327,114 UART: [art] PUB.X = 539226816FB54F14124050BDCD2E156EA696C2B547F00CB3EB71D1120E563B86D7D7B9B008413B77D7BDF5F6736F9F0F
26,334,373 UART: [art] PUB.Y = 95407BC5199AAD63D79BC3688BB38900CA060096A07D71856082141BDEF208E7F47BC09CD63B551CE619270F205BF966
26,341,558 UART: [art] SIG.R = 272ADA7CD87B981DA3FF43F42BBBB47168D83620E264F15599F555F880C416749616327FD71E2283685342964A702CF9
26,348,951 UART: [art] SIG.S = 7FADF10880C8EA4DBB4D9764BB3F0F066B3F74ED99CBE8E1ACB28FF80DF74A8924E95A5F831218ABC27FE964B6E1E248
27,327,947 UART: Caliptra RT
27,328,652 UART: [state] CFI Enabled
27,510,554 UART: [rt] RT listening for mailbox commands...
27,513,514 UART:
27,513,771 UART: Running Caliptra ROM ...
27,514,805 UART:
27,514,960 UART: [state] CFI Enabled
27,583,056 UART: [state] LifecycleState = Unprovisioned
27,585,156 UART: [state] DebugLocked = No
27,586,896 UART: [state] WD Timer not started. Device not locked for debugging
27,591,196 UART: [kat] SHA2-256
27,781,043 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,791,823 UART: [kat] ++
27,792,285 UART: [kat] sha1
27,802,095 UART: [kat] SHA2-256
27,805,117 UART: [kat] SHA2-384
27,811,217 UART: [kat] SHA2-512-ACC
27,813,788 UART: [kat] ECC-384
30,263,370 UART: [kat] HMAC-384Kdf
30,290,012 UART: [kat] LMS
30,821,547 UART: [kat] --
30,827,342 UART: [update-reset] ++
30,893,870 >>> mbox cmd response: failed
30,895,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,045,037 UART: ROM Non-Fatal Error: 0x000B003D
31,046,479 UART: [state] Locking Datavault
31,047,660 UART: [state] Locking PCR0, PCR1 and PCR31
31,049,205 UART: [state] Locking ICCM
31,050,174 UART: [exit] Launching FMC @ 0x40000130
31,051,605 UART:
31,051,772 UART: Running Caliptra FMC ...
31,052,882 UART:
31,053,046 UART: [state] CFI Enabled
31,053,972 UART: [art] Extend RT PCRs Done
31,055,115 UART: [art] Lock RT PCRs Done
31,056,187 UART: [art] Populate DV Done
31,057,223 UART: [fht] FMC Alias Private Key: 7
31,058,548 UART: [art] Derive CDI
31,059,290 UART: [art] Store in slot 0x4
31,074,723 UART: [art] Derive Key Pair
31,075,730 UART: [art] Store priv key in slot 0x5
33,538,516 UART: [art] Derive Key Pair - Done
33,551,267 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,264,573 UART: [art] Erasing AUTHORITY.KEYID = 7
35,266,083 UART: [art] PUB.X = 539226816FB54F14124050BDCD2E156EA696C2B547F00CB3EB71D1120E563B86D7D7B9B008413B77D7BDF5F6736F9F0F
35,273,344 UART: [art] PUB.Y = 95407BC5199AAD63D79BC3688BB38900CA060096A07D71856082141BDEF208E7F47BC09CD63B551CE619270F205BF966
35,280,532 UART: [art] SIG.R = 272ADA7CD87B981DA3FF43F42BBBB47168D83620E264F15599F555F880C416749616327FD71E2283685342964A702CF9
35,287,926 UART: [art] SIG.S = 7FADF10880C8EA4DBB4D9764BB3F0F066B3F74ED99CBE8E1ACB28FF80DF74A8924E95A5F831218ABC27FE964B6E1E248
36,266,636 UART: Caliptra RT
36,267,339 UART: [state] CFI Enabled
36,692,702 UART: [rt] RT listening for mailbox commands...
36,695,504 UART:
36,695,756 UART: Running Caliptra ROM ...
36,696,874 UART:
36,697,038 UART: [state] CFI Enabled
36,755,348 UART: [state] LifecycleState = Unprovisioned
36,757,410 UART: [state] DebugLocked = No
36,759,913 UART: [state] WD Timer not started. Device not locked for debugging
36,765,244 UART: [kat] SHA2-256
36,955,137 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
36,965,910 UART: [kat] ++
36,966,375 UART: [kat] sha1
36,978,720 UART: [kat] SHA2-256
36,981,730 UART: [kat] SHA2-384
36,988,584 UART: [kat] SHA2-512-ACC
36,991,155 UART: [kat] ECC-384
39,439,729 UART: [kat] HMAC-384Kdf
39,463,776 UART: [kat] LMS
39,995,342 UART: [kat] --
39,999,062 UART: [update-reset] ++
44,702,069 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
44,704,825 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
45,334,577 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,419,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,917,325 >>> mbox cmd response: success
15,919,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,200,382 UART:
20,200,806 UART: Running Caliptra FMC ...
20,202,126 UART:
20,202,302 UART: [state] CFI Enabled
20,265,643 UART: [fht] FMC Alias Private Key: 7
22,031,896 UART: [art] Extend RT PCRs Done
22,033,127 UART: [art] Lock RT PCRs Done
22,034,381 UART: [art] Populate DV Done
22,039,961 UART: [fht] FMC Alias Private Key: 7
22,041,616 UART: [art] Derive CDI
22,042,466 UART: [art] Store in slot 0x4
22,098,860 UART: [art] Derive Key Pair
22,099,914 UART: [art] Store priv key in slot 0x5
24,562,994 UART: [art] Derive Key Pair - Done
24,576,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,288,533 UART: [art] Erasing AUTHORITY.KEYID = 7
26,290,047 UART: [art] PUB.X = BAD4CAB5F9B99028BC9E8CB0A32324C2DED51081DEE5A7B9CFEB05A24980415BC3F62F99F4C3C08C2A9F05D2106CDA37
26,297,315 UART: [art] PUB.Y = 47DB2266947D2C4D5B42CE0972BB26E6E482DA582F514AEFAE7DD5DF25EFE46221CD061C92F8D126901B9F6B664886FC
26,304,628 UART: [art] SIG.R = C12230FA37DB64E0184E07E8C7D1D8863052FDA46F6F9E166AD769A721B49FE9460AF56CCCACE90BA5713571208BFF8F
26,312,027 UART: [art] SIG.S = 3BF8F02CE65E8063835FC53996FFFC590038AF2F11517F9F9822B2D0F0C15A1983CC56CCB1531C00C24697A878EDC10A
27,291,080 UART: Caliptra RT
27,291,782 UART: [state] CFI Enabled
27,485,544 UART: [rt] RT listening for mailbox commands...
30,752,971 >>> mbox cmd response: failed
30,754,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,903,871 UART:
30,904,231 UART: Running Caliptra FMC ...
30,905,370 UART:
30,905,543 UART: [state] CFI Enabled
30,906,476 UART: [art] Extend RT PCRs Done
30,907,570 UART: [art] Lock RT PCRs Done
30,908,582 UART: [art] Populate DV Done
30,909,557 UART: [fht] FMC Alias Private Key: 7
30,910,954 UART: [art] Derive CDI
30,911,698 UART: [art] Store in slot 0x4
30,943,711 UART: [art] Derive Key Pair
30,944,722 UART: [art] Store priv key in slot 0x5
33,407,561 UART: [art] Derive Key Pair - Done
33,420,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,133,005 UART: [art] Erasing AUTHORITY.KEYID = 7
35,134,519 UART: [art] PUB.X = BAD4CAB5F9B99028BC9E8CB0A32324C2DED51081DEE5A7B9CFEB05A24980415BC3F62F99F4C3C08C2A9F05D2106CDA37
35,141,666 UART: [art] PUB.Y = 47DB2266947D2C4D5B42CE0972BB26E6E482DA582F514AEFAE7DD5DF25EFE46221CD061C92F8D126901B9F6B664886FC
35,148,975 UART: [art] SIG.R = C12230FA37DB64E0184E07E8C7D1D8863052FDA46F6F9E166AD769A721B49FE9460AF56CCCACE90BA5713571208BFF8F
35,156,368 UART: [art] SIG.S = 3BF8F02CE65E8063835FC53996FFFC590038AF2F11517F9F9822B2D0F0C15A1983CC56CCB1531C00C24697A878EDC10A
36,135,395 UART: Caliptra RT
36,136,132 UART: [state] CFI Enabled
36,554,097 UART: [rt] RT listening for mailbox commands...
45,419,257 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.59s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,626 UART:
193,001 UART: Running Caliptra ROM ...
194,203 UART:
604,001 UART: [state] CFI Enabled
616,661 UART: [state] LifecycleState = Unprovisioned
619,034 UART: [state] DebugLocked = No
620,637 UART: [state] WD Timer not started. Device not locked for debugging
624,637 UART: [kat] SHA2-256
814,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,299 UART: [kat] ++
825,809 UART: [kat] sha1
836,854 UART: [kat] SHA2-256
839,830 UART: [kat] SHA2-384
844,528 UART: [kat] SHA2-512-ACC
847,148 UART: [kat] ECC-384
3,290,624 UART: [kat] HMAC-384Kdf
3,303,995 UART: [kat] LMS
3,835,805 UART: [kat] --
3,841,103 UART: [cold-reset] ++
3,843,205 UART: [fht] FHT @ 0x50003400
3,854,299 UART: [idev] ++
3,854,990 UART: [idev] CDI.KEYID = 6
3,855,909 UART: [idev] SUBJECT.KEYID = 7
3,857,126 UART: [idev] UDS.KEYID = 0
3,859,942 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,012 UART: [idev] Erasing UDS.KEYID = 0
6,335,499 UART: [idev] Sha1 KeyId Algorithm
6,357,289 UART: [idev] --
6,362,271 UART: [ldev] ++
6,362,977 UART: [ldev] CDI.KEYID = 6
6,363,893 UART: [ldev] SUBJECT.KEYID = 5
6,365,061 UART: [ldev] AUTHORITY.KEYID = 7
6,366,251 UART: [ldev] FE.KEYID = 1
6,378,256 UART: [ldev] Erasing FE.KEYID = 1
8,857,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,065 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,251 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,965 UART: [ldev] --
10,648,181 UART: [fwproc] Wait for Commands...
10,650,411 UART: [fwproc] Recv command 0x46574c44
10,652,682 UART: [fwproc] Recv'd Img size: 118548 bytes
15,342,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,422,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
15,546,545 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,106,075 >>> mbox cmd response: success
16,107,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,256,580 UART: [afmc] ++
16,257,218 UART: [afmc] CDI.KEYID = 6
16,258,115 UART: [afmc] SUBJECT.KEYID = 7
16,259,230 UART: [afmc] AUTHORITY.KEYID = 5
18,616,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,338,046 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,340,019 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
20,355,120 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
20,370,348 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
20,385,419 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
20,409,207 UART: [afmc] --
20,411,888 UART: [cold-reset] --
20,417,104 UART: [state] Locking Datavault
20,423,449 UART: [state] Locking PCR0, PCR1 and PCR31
20,425,688 UART: [state] Locking ICCM
20,428,341 UART: [exit] Launching FMC @ 0x40000130
20,437,022 UART:
20,437,266 UART: Running Caliptra FMC ...
20,438,372 UART:
20,438,538 UART: [state] CFI Enabled
20,446,531 UART: [fht] FMC Alias Private Key: 7
22,212,835 UART: [art] Extend RT PCRs Done
22,214,448 UART: [art] Lock RT PCRs Done
22,215,685 UART: [art] Populate DV Done
22,221,172 UART: [fht] FMC Alias Private Key: 7
22,222,751 UART: [art] Derive CDI
22,223,578 UART: [art] Store in slot 0x4
22,266,359 UART: [art] Derive Key Pair
22,267,401 UART: [art] Store priv key in slot 0x5
24,694,226 UART: [art] Derive Key Pair - Done
24,707,232 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,413,776 UART: [art] Erasing AUTHORITY.KEYID = 7
26,415,286 UART: [art] PUB.X = 7B94A9ADB12A8EC56769E1CC272AE9FD27C8874EF8432295D8EA7F040E737E901BAB6A77BFA3DED1C76EDD440A1130CF
26,422,593 UART: [art] PUB.Y = 1612715B124113DD6EF77F13DBC43AC7F16445ADBB91BF0358A0F2BEB4592DB3E436C9F18891D269EE56723A247E526E
26,429,860 UART: [art] SIG.R = 99FE0F38026D516B3B90153920599FD843405D2C2052A6FC662D9516001B51953C128FD1D5449F963F16F4F8BC2FE31A
26,437,217 UART: [art] SIG.S = E6D95CDD378CCCD76F987B00849E9E8D15186A4B2755A80B9009AEAF55785421B768E191514FDFC2ACFE0E00AB239773
27,415,853 UART: Caliptra RT
27,416,561 UART: [state] CFI Enabled
27,548,811 UART: [rt] RT listening for mailbox commands...
27,551,611 UART:
27,551,868 UART: Running Caliptra ROM ...
27,552,919 UART:
27,553,236 UART: [state] CFI Enabled
27,565,891 UART: [state] LifecycleState = Unprovisioned
27,567,783 UART: [state] DebugLocked = No
27,569,085 UART: [state] WD Timer not started. Device not locked for debugging
27,573,599 UART: [kat] SHA2-256
27,763,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
27,774,221 UART: [kat] ++
27,774,735 UART: [kat] sha1
27,786,374 UART: [kat] SHA2-256
27,789,382 UART: [kat] SHA2-384
27,794,956 UART: [kat] SHA2-512-ACC
27,797,582 UART: [kat] ECC-384
30,238,243 UART: [kat] HMAC-384Kdf
30,250,588 UART: [kat] LMS
30,782,199 UART: [kat] --
30,786,537 UART: [update-reset] ++
30,855,380 >>> mbox cmd response: failed
30,857,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
31,006,711 UART: ROM Non-Fatal Error: 0x000B003D
31,008,151 UART: [state] Locking Datavault
31,009,317 UART: [state] Locking PCR0, PCR1 and PCR31
31,010,865 UART: [state] Locking ICCM
31,011,787 UART: [exit] Launching FMC @ 0x40000130
31,013,221 UART:
31,013,387 UART: Running Caliptra FMC ...
31,014,492 UART:
31,014,655 UART: [state] CFI Enabled
31,015,580 UART: [art] Extend RT PCRs Done
31,016,725 UART: [art] Lock RT PCRs Done
31,017,795 UART: [art] Populate DV Done
31,018,830 UART: [fht] FMC Alias Private Key: 7
31,020,172 UART: [art] Derive CDI
31,020,913 UART: [art] Store in slot 0x4
31,021,981 UART: [art] Derive Key Pair
31,022,979 UART: [art] Store priv key in slot 0x5
33,404,187 UART: [art] Derive Key Pair - Done
33,417,134 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
35,123,519 UART: [art] Erasing AUTHORITY.KEYID = 7
35,125,001 UART: [art] PUB.X = 7B94A9ADB12A8EC56769E1CC272AE9FD27C8874EF8432295D8EA7F040E737E901BAB6A77BFA3DED1C76EDD440A1130CF
35,132,370 UART: [art] PUB.Y = 1612715B124113DD6EF77F13DBC43AC7F16445ADBB91BF0358A0F2BEB4592DB3E436C9F18891D269EE56723A247E526E
35,139,610 UART: [art] SIG.R = 99FE0F38026D516B3B90153920599FD843405D2C2052A6FC662D9516001B51953C128FD1D5449F963F16F4F8BC2FE31A
35,147,017 UART: [art] SIG.S = E6D95CDD378CCCD76F987B00849E9E8D15186A4B2755A80B9009AEAF55785421B768E191514FDFC2ACFE0E00AB239773
36,125,723 UART: Caliptra RT
36,126,441 UART: [state] CFI Enabled
36,499,757 UART: [rt] RT listening for mailbox commands...
36,502,665 UART:
36,502,836 UART: Running Caliptra ROM ...
36,503,969 UART:
36,504,293 UART: [state] CFI Enabled
40,321,105 UART: [state] LifecycleState = Unprovisioned
40,323,023 UART: [state] DebugLocked = No
40,325,424 UART: [state] WD Timer not started. Device not locked for debugging
40,330,704 UART: [kat] SHA2-256
40,520,598 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
40,531,334 UART: [kat] ++
40,531,853 UART: [kat] sha1
40,542,367 UART: [kat] SHA2-256
40,545,386 UART: [kat] SHA2-384
40,552,780 UART: [kat] SHA2-512-ACC
40,555,412 UART: [kat] ECC-384
42,996,810 UART: [kat] HMAC-384Kdf
43,011,356 UART: [kat] LMS
43,542,966 UART: [kat] --
43,547,240 UART: [update-reset] ++
48,241,887 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
48,244,684 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
48,874,437 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,187 writing to cptra_bootfsm_go
3,760,145 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,114,779 >>> mbox cmd response: success
16,116,832 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,367,199 UART:
20,367,610 UART: Running Caliptra FMC ...
20,368,753 UART:
20,368,919 UART: [state] CFI Enabled
20,376,641 UART: [fht] FMC Alias Private Key: 7
22,143,023 UART: [art] Extend RT PCRs Done
22,144,255 UART: [art] Lock RT PCRs Done
22,145,729 UART: [art] Populate DV Done
22,150,926 UART: [fht] FMC Alias Private Key: 7
22,152,574 UART: [art] Derive CDI
22,153,395 UART: [art] Store in slot 0x4
22,196,378 UART: [art] Derive Key Pair
22,197,426 UART: [art] Store priv key in slot 0x5
24,624,068 UART: [art] Derive Key Pair - Done
24,636,975 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
26,343,519 UART: [art] Erasing AUTHORITY.KEYID = 7
26,345,029 UART: [art] PUB.X = 6CD9664268B1A878FBAA6D03C8F06E67D505EB661D2572623A2788E9489DE8FD78A9BCD24055942FED656940EAF3AD93
26,352,306 UART: [art] PUB.Y = EE20171F0C45051D7A69FB216EE39463372EF158EAA4B21C9D4C8D7AAF98B199BA72F0A3DF64CFE463E4D02461A5BD8E
26,359,563 UART: [art] SIG.R = 5AF5AA8E297083FC963C0979E0F12A87E4C6A2F2F8E79547969210D5A01F599C0A110067E29337F699C2524F101384A4
26,366,902 UART: [art] SIG.S = 7BF9AF0F6E756E56C2885A6D9F3BE8F6E12A626ECBE57FD84DBE7DF3F42E4A941200D4501BAB991E8B9AA4CF62ACA7C1
27,344,994 UART: Caliptra RT
27,345,709 UART: [state] CFI Enabled
27,478,682 UART: [rt] RT listening for mailbox commands...
30,674,391 >>> mbox cmd response: failed
30,676,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,824,950 UART:
30,825,276 UART: Running Caliptra FMC ...
30,826,346 UART:
30,826,502 UART: [state] CFI Enabled
30,827,438 UART: [art] Extend RT PCRs Done
30,828,587 UART: [art] Lock RT PCRs Done
30,829,656 UART: [art] Populate DV Done
30,830,844 UART: [fht] FMC Alias Private Key: 7
30,832,249 UART: [art] Derive CDI
30,832,996 UART: [art] Store in slot 0x4
30,834,067 UART: [art] Derive Key Pair
30,835,031 UART: [art] Store priv key in slot 0x5
33,212,102 UART: [art] Derive Key Pair - Done
33,225,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,931,815 UART: [art] Erasing AUTHORITY.KEYID = 7
34,933,326 UART: [art] PUB.X = 6CD9664268B1A878FBAA6D03C8F06E67D505EB661D2572623A2788E9489DE8FD78A9BCD24055942FED656940EAF3AD93
34,940,627 UART: [art] PUB.Y = EE20171F0C45051D7A69FB216EE39463372EF158EAA4B21C9D4C8D7AAF98B199BA72F0A3DF64CFE463E4D02461A5BD8E
34,947,912 UART: [art] SIG.R = 5AF5AA8E297083FC963C0979E0F12A87E4C6A2F2F8E79547969210D5A01F599C0A110067E29337F699C2524F101384A4
34,955,258 UART: [art] SIG.S = 7BF9AF0F6E756E56C2885A6D9F3BE8F6E12A626ECBE57FD84DBE7DF3F42E4A941200D4501BAB991E8B9AA4CF62ACA7C1
35,933,969 UART: Caliptra RT
35,934,687 UART: [state] CFI Enabled
36,309,731 UART: [rt] RT listening for mailbox commands...
49,051,846 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,204 UART: [state] LifecycleState = Unprovisioned
85,859 UART: [state] DebugLocked = No
86,341 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,917 UART: [kat] SHA2-256
881,848 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,963 UART: [kat] ++
886,115 UART: [kat] sha1
890,377 UART: [kat] SHA2-256
892,315 UART: [kat] SHA2-384
895,076 UART: [kat] SHA2-512-ACC
896,977 UART: [kat] ECC-384
902,520 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,476,021 UART: [cold-reset] ++
1,476,357 UART: [fht] Storing FHT @ 0x50003400
1,479,156 UART: [idev] ++
1,479,324 UART: [idev] CDI.KEYID = 6
1,479,684 UART: [idev] SUBJECT.KEYID = 7
1,480,108 UART: [idev] UDS.KEYID = 0
1,480,453 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,002 UART: [idev] Erasing UDS.KEYID = 0
1,504,348 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,982 UART: [idev] --
1,514,125 UART: [ldev] ++
1,514,293 UART: [ldev] CDI.KEYID = 6
1,514,656 UART: [ldev] SUBJECT.KEYID = 5
1,515,082 UART: [ldev] AUTHORITY.KEYID = 7
1,515,545 UART: [ldev] FE.KEYID = 1
1,520,801 UART: [ldev] Erasing FE.KEYID = 1
1,545,900 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,399 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,636 UART: [ldev] --
1,584,969 UART: [fwproc] Waiting for Commands...
1,585,626 UART: [fwproc] Received command 0x46574c44
1,586,417 UART: [fwproc] Received Image of size 118548 bytes
5,053,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,081,373 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,112,591 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,252,802 >>> mbox cmd response: success
5,252,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,253,934 UART: [afmc] ++
5,254,102 UART: [afmc] CDI.KEYID = 6
5,254,464 UART: [afmc] SUBJECT.KEYID = 7
5,254,889 UART: [afmc] AUTHORITY.KEYID = 5
5,289,858 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,305,992 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,306,772 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,312,478 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,318,357 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,324,070 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,331,809 UART: [afmc] --
5,332,739 UART: [cold-reset] --
5,333,831 UART: [state] Locking Datavault
5,335,012 UART: [state] Locking PCR0, PCR1 and PCR31
5,335,616 UART: [state] Locking ICCM
5,336,244 UART: [exit] Launching FMC @ 0x40000130
5,341,574 UART:
5,341,590 UART: Running Caliptra FMC ...
5,341,998 UART:
5,342,052 UART: [state] CFI Enabled
5,352,636 UART: [fht] FMC Alias Private Key: 7
5,471,368 UART: [art] Extend RT PCRs Done
5,471,796 UART: [art] Lock RT PCRs Done
5,473,332 UART: [art] Populate DV Done
5,481,531 UART: [fht] FMC Alias Private Key: 7
5,482,639 UART: [art] Derive CDI
5,482,919 UART: [art] Store in slot 0x4
5,568,267 UART: [art] Derive Key Pair
5,568,627 UART: [art] Store priv key in slot 0x5
5,582,368 UART: [art] Derive Key Pair - Done
5,597,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,612,921 UART: [art] Erasing AUTHORITY.KEYID = 7
5,613,686 UART: [art] PUB.X = B31AEFC127A29B8C385EDCD0B6D987091E4EB207A64CD6C02AFDC6C67A6B5E22FDC147D77CF61264D15A905EC64653D9
5,620,468 UART: [art] PUB.Y = ADB02AF1B53CC5FD229F634982FBD5EA2CB0C38CD1F198BA8C526085227C7B8FA8F2788B9BF06A3EC8A0B41694522608
5,627,429 UART: [art] SIG.R = 2AC5D3AF9D522E41E951E91A84C0F21C3695B130FF4C6CF55673AA64CEDBE2C19ADFBB6B9410585B41EE4EE134C81E29
5,634,217 UART: [art] SIG.S = 9CB0C87082B82C4A1BF0CDDC4C55F099B3BA41CA30211959D70FF378159303445287FACD9D8890DCC2AD4C0DCC167B30
5,657,920 UART: Caliptra RT
5,658,171 UART: [state] CFI Enabled
5,778,645 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,780,642 UART:
5,780,658 UART: Running Caliptra ROM ...
5,781,066 UART:
5,781,120 UART: [state] CFI Enabled
5,783,866 UART: [state] LifecycleState = Unprovisioned
5,784,521 UART: [state] DebugLocked = No
5,785,109 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,786,696 UART: [kat] SHA2-256
6,580,627 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,584,742 UART: [kat] ++
6,584,894 UART: [kat] sha1
6,589,250 UART: [kat] SHA2-256
6,591,188 UART: [kat] SHA2-384
6,593,781 UART: [kat] SHA2-512-ACC
6,595,681 UART: [kat] ECC-384
6,601,148 UART: [kat] HMAC-384Kdf
6,605,684 UART: [kat] LMS
7,173,880 UART: [kat] --
7,174,691 UART: [update-reset] ++
7,215,350 >>> mbox cmd response: failed
7,215,350 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,215,924 UART: ROM Non-Fatal Error: 0x000B003D
7,216,714 UART: [state] Locking Datavault
7,217,436 UART: [state] Locking PCR0, PCR1 and PCR31
7,218,040 UART: [state] Locking ICCM
7,218,500 UART: [exit] Launching FMC @ 0x40000130
7,223,830 UART:
7,223,846 UART: Running Caliptra FMC ...
7,224,254 UART:
7,224,308 UART: [state] CFI Enabled
7,313,479 UART: [art] Extend RT PCRs Done
7,313,907 UART: [art] Lock RT PCRs Done
7,315,096 UART: [art] Populate DV Done
7,323,117 UART: [fht] FMC Alias Private Key: 7
7,324,145 UART: [art] Derive CDI
7,324,425 UART: [art] Store in slot 0x4
7,409,887 UART: [art] Derive Key Pair
7,410,247 UART: [art] Store priv key in slot 0x5
7,422,820 UART: [art] Derive Key Pair - Done
7,437,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,453,295 UART: [art] Erasing AUTHORITY.KEYID = 7
7,454,060 UART: [art] PUB.X = B31AEFC127A29B8C385EDCD0B6D987091E4EB207A64CD6C02AFDC6C67A6B5E22FDC147D77CF61264D15A905EC64653D9
7,460,842 UART: [art] PUB.Y = ADB02AF1B53CC5FD229F634982FBD5EA2CB0C38CD1F198BA8C526085227C7B8FA8F2788B9BF06A3EC8A0B41694522608
7,467,803 UART: [art] SIG.R = 2AC5D3AF9D522E41E951E91A84C0F21C3695B130FF4C6CF55673AA64CEDBE2C19ADFBB6B9410585B41EE4EE134C81E29
7,474,591 UART: [art] SIG.S = 9CB0C87082B82C4A1BF0CDDC4C55F099B3BA41CA30211959D70FF378159303445287FACD9D8890DCC2AD4C0DCC167B30
7,498,546 UART: Caliptra RT
7,498,797 UART: [state] CFI Enabled
7,858,220 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,859,840 UART:
7,859,856 UART: Running Caliptra ROM ...
7,860,264 UART:
7,860,318 UART: [state] CFI Enabled
7,862,866 UART: [state] LifecycleState = Unprovisioned
7,863,521 UART: [state] DebugLocked = No
7,864,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,865,574 UART: [kat] SHA2-256
8,659,505 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,663,620 UART: [kat] ++
8,663,772 UART: [kat] sha1
8,667,804 UART: [kat] SHA2-256
8,669,742 UART: [kat] SHA2-384
8,672,563 UART: [kat] SHA2-512-ACC
8,674,463 UART: [kat] ECC-384
8,680,158 UART: [kat] HMAC-384Kdf
8,684,716 UART: [kat] LMS
9,252,912 UART: [kat] --
9,253,433 UART: [update-reset] ++
12,758,289 UART: [update-reset] Image verified using Vendor ECC Key Index 0
12,759,459 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
12,914,726 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,405,026 >>> mbox cmd response: success
5,405,026 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,465,819 UART:
5,465,835 UART: Running Caliptra FMC ...
5,466,243 UART:
5,466,297 UART: [state] CFI Enabled
5,476,595 UART: [fht] FMC Alias Private Key: 7
5,596,023 UART: [art] Extend RT PCRs Done
5,596,451 UART: [art] Lock RT PCRs Done
5,597,907 UART: [art] Populate DV Done
5,606,212 UART: [fht] FMC Alias Private Key: 7
5,607,360 UART: [art] Derive CDI
5,607,640 UART: [art] Store in slot 0x4
5,693,294 UART: [art] Derive Key Pair
5,693,654 UART: [art] Store priv key in slot 0x5
5,707,131 UART: [art] Derive Key Pair - Done
5,721,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,737,567 UART: [art] Erasing AUTHORITY.KEYID = 7
5,738,332 UART: [art] PUB.X = F8E6D3EEDD8A3C30247B78AEC0FEB994AFF023805F56CF96AAFD7C607C35191ED2B3542B706FC3BE44ECCFA07ABB16DE
5,745,132 UART: [art] PUB.Y = 7D067E8CD52A413D3F828B205CBEC630E45A6C38A284F47267B25B822749BBF8F775FBDE245441DE3FEE3CB012336B2A
5,752,089 UART: [art] SIG.R = 830D598E5E844FEFB061F807206BB1AFD3FD4F99B0AF3EE9ACBFD07C585B568B2180B7315F438493E43619EA1511D433
5,758,861 UART: [art] SIG.S = 7B6419E2CAD855E8D92BF058DA42CDDBD73EFA84009078B554D2D45FF49A75709130B57AECD38EACACDFB8E929CAA5E6
5,781,955 UART: Caliptra RT
5,782,206 UART: [state] CFI Enabled
5,902,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,222,174 >>> mbox cmd response: failed
7,222,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,227,728 UART:
7,227,744 UART: Running Caliptra FMC ...
7,228,152 UART:
7,228,206 UART: [state] CFI Enabled
7,316,699 UART: [art] Extend RT PCRs Done
7,317,127 UART: [art] Lock RT PCRs Done
7,318,158 UART: [art] Populate DV Done
7,326,335 UART: [fht] FMC Alias Private Key: 7
7,327,277 UART: [art] Derive CDI
7,327,557 UART: [art] Store in slot 0x4
7,413,583 UART: [art] Derive Key Pair
7,413,943 UART: [art] Store priv key in slot 0x5
7,427,322 UART: [art] Derive Key Pair - Done
7,442,367 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,457,998 UART: [art] Erasing AUTHORITY.KEYID = 7
7,458,763 UART: [art] PUB.X = F8E6D3EEDD8A3C30247B78AEC0FEB994AFF023805F56CF96AAFD7C607C35191ED2B3542B706FC3BE44ECCFA07ABB16DE
7,465,563 UART: [art] PUB.Y = 7D067E8CD52A413D3F828B205CBEC630E45A6C38A284F47267B25B822749BBF8F775FBDE245441DE3FEE3CB012336B2A
7,472,520 UART: [art] SIG.R = 830D598E5E844FEFB061F807206BB1AFD3FD4F99B0AF3EE9ACBFD07C585B568B2180B7315F438493E43619EA1511D433
7,479,292 UART: [art] SIG.S = 7B6419E2CAD855E8D92BF058DA42CDDBD73EFA84009078B554D2D45FF49A75709130B57AECD38EACACDFB8E929CAA5E6
7,503,524 UART: Caliptra RT
7,503,775 UART: [state] CFI Enabled
7,868,830 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
13,107,626 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,915 UART: [state] LifecycleState = Unprovisioned
86,570 UART: [state] DebugLocked = No
87,176 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,676 UART: [kat] SHA2-256
882,607 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,722 UART: [kat] ++
886,874 UART: [kat] sha1
891,088 UART: [kat] SHA2-256
893,026 UART: [kat] SHA2-384
895,709 UART: [kat] SHA2-512-ACC
897,610 UART: [kat] ECC-384
903,397 UART: [kat] HMAC-384Kdf
908,087 UART: [kat] LMS
1,476,283 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,450 UART: [fht] Storing FHT @ 0x50003400
1,480,093 UART: [idev] ++
1,480,261 UART: [idev] CDI.KEYID = 6
1,480,621 UART: [idev] SUBJECT.KEYID = 7
1,481,045 UART: [idev] UDS.KEYID = 0
1,481,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,215 UART: [idev] Erasing UDS.KEYID = 0
1,505,819 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,415 UART: [idev] --
1,515,522 UART: [ldev] ++
1,515,690 UART: [ldev] CDI.KEYID = 6
1,516,053 UART: [ldev] SUBJECT.KEYID = 5
1,516,479 UART: [ldev] AUTHORITY.KEYID = 7
1,516,942 UART: [ldev] FE.KEYID = 1
1,522,200 UART: [ldev] Erasing FE.KEYID = 1
1,547,635 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,309 UART: [ldev] --
1,586,632 UART: [fwproc] Waiting for Commands...
1,587,453 UART: [fwproc] Received command 0x46574c44
1,588,244 UART: [fwproc] Received Image of size 118548 bytes
5,319,151 UART: [fwproc] Image verified using Vendor ECC Key Index 0
5,346,131 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
5,377,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
5,517,724 >>> mbox cmd response: success
5,517,724 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,518,746 UART: [afmc] ++
5,518,914 UART: [afmc] CDI.KEYID = 6
5,519,276 UART: [afmc] SUBJECT.KEYID = 7
5,519,701 UART: [afmc] AUTHORITY.KEYID = 5
5,554,760 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
5,571,302 UART: [afmc] Erasing AUTHORITY.KEYID = 5
5,572,082 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
5,577,788 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
5,583,667 UART: [afmc] SIG.R = 51EFDB610658A6ECDDC74DF3F084ABFF13F454133875087012CEEF422E321022F4A772FC5BCB9DA09717B829C84CAFE0
5,589,380 UART: [afmc] SIG.S = DEC1368F6458DEC93C0320CD0A5F6EE4602BE80C1D08F84A2AC5345F86E7120BB0526C619F5F9DE6CB3A977500F75570
5,597,065 UART: [afmc] --
5,598,045 UART: [cold-reset] --
5,598,783 UART: [state] Locking Datavault
5,599,950 UART: [state] Locking PCR0, PCR1 and PCR31
5,600,554 UART: [state] Locking ICCM
5,600,988 UART: [exit] Launching FMC @ 0x40000130
5,606,318 UART:
5,606,334 UART: Running Caliptra FMC ...
5,606,742 UART:
5,606,885 UART: [state] CFI Enabled
5,617,247 UART: [fht] FMC Alias Private Key: 7
5,736,339 UART: [art] Extend RT PCRs Done
5,736,767 UART: [art] Lock RT PCRs Done
5,738,261 UART: [art] Populate DV Done
5,746,190 UART: [fht] FMC Alias Private Key: 7
5,747,334 UART: [art] Derive CDI
5,747,614 UART: [art] Store in slot 0x4
5,833,714 UART: [art] Derive Key Pair
5,834,074 UART: [art] Store priv key in slot 0x5
5,847,615 UART: [art] Derive Key Pair - Done
5,862,480 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,878,231 UART: [art] Erasing AUTHORITY.KEYID = 7
5,878,996 UART: [art] PUB.X = 5249DE03E5F4696DD425F40FDCE3B5BBB6E484F6D413490B8227FDDD6FC9B7DE508545C5E011BDD71E20B4D472F9AE7E
5,885,775 UART: [art] PUB.Y = 53FE38B7D4F6010D6A1ECC6823F36FD066036A0E1B9A0A36CC1ADC30281513934593C7631530DE9BC744FCA441D5C52E
5,892,716 UART: [art] SIG.R = 1CB19BE3BF020ACF1295BB7A498C541AB079D0A9E988D98AA6A44368AB510E47C69DDAD3B3C7BE0ED112604A0557045A
5,899,482 UART: [art] SIG.S = 8E662C4241706DEC942B2E636C8652365EAB4A732E9DCE9DBE45D5D834E956170708A66067A09AF6A2F3795B1599CBEF
5,923,010 UART: Caliptra RT
5,923,353 UART: [state] CFI Enabled
6,043,513 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,045,392 UART:
6,045,408 UART: Running Caliptra ROM ...
6,045,816 UART:
6,045,957 UART: [state] CFI Enabled
6,048,635 UART: [state] LifecycleState = Unprovisioned
6,049,290 UART: [state] DebugLocked = No
6,049,858 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,051,407 UART: [kat] SHA2-256
6,845,338 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,849,453 UART: [kat] ++
6,849,605 UART: [kat] sha1
6,853,659 UART: [kat] SHA2-256
6,855,597 UART: [kat] SHA2-384
6,858,256 UART: [kat] SHA2-512-ACC
6,860,156 UART: [kat] ECC-384
6,866,099 UART: [kat] HMAC-384Kdf
6,870,571 UART: [kat] LMS
7,438,767 UART: [kat] --
7,439,722 UART: [update-reset] ++
7,479,305 >>> mbox cmd response: failed
7,479,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,479,779 UART: ROM Non-Fatal Error: 0x000B003D
7,480,763 UART: [state] Locking Datavault
7,481,671 UART: [state] Locking PCR0, PCR1 and PCR31
7,482,275 UART: [state] Locking ICCM
7,482,827 UART: [exit] Launching FMC @ 0x40000130
7,488,157 UART:
7,488,173 UART: Running Caliptra FMC ...
7,488,581 UART:
7,488,724 UART: [state] CFI Enabled
7,578,117 UART: [art] Extend RT PCRs Done
7,578,545 UART: [art] Lock RT PCRs Done
7,579,888 UART: [art] Populate DV Done
7,588,041 UART: [fht] FMC Alias Private Key: 7
7,589,207 UART: [art] Derive CDI
7,589,487 UART: [art] Store in slot 0x4
7,674,913 UART: [art] Derive Key Pair
7,675,273 UART: [art] Store priv key in slot 0x5
7,688,462 UART: [art] Derive Key Pair - Done
7,703,245 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,718,882 UART: [art] Erasing AUTHORITY.KEYID = 7
7,719,647 UART: [art] PUB.X = 5249DE03E5F4696DD425F40FDCE3B5BBB6E484F6D413490B8227FDDD6FC9B7DE508545C5E011BDD71E20B4D472F9AE7E
7,726,426 UART: [art] PUB.Y = 53FE38B7D4F6010D6A1ECC6823F36FD066036A0E1B9A0A36CC1ADC30281513934593C7631530DE9BC744FCA441D5C52E
7,733,367 UART: [art] SIG.R = 1CB19BE3BF020ACF1295BB7A498C541AB079D0A9E988D98AA6A44368AB510E47C69DDAD3B3C7BE0ED112604A0557045A
7,740,133 UART: [art] SIG.S = 8E662C4241706DEC942B2E636C8652365EAB4A732E9DCE9DBE45D5D834E956170708A66067A09AF6A2F3795B1599CBEF
7,764,491 UART: Caliptra RT
7,764,834 UART: [state] CFI Enabled
8,129,447 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,131,191 UART:
8,131,207 UART: Running Caliptra ROM ...
8,131,615 UART:
8,131,756 UART: [state] CFI Enabled
8,134,956 UART: [state] LifecycleState = Unprovisioned
8,135,611 UART: [state] DebugLocked = No
8,136,315 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
8,137,892 UART: [kat] SHA2-256
8,931,823 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
8,935,938 UART: [kat] ++
8,936,090 UART: [kat] sha1
8,940,230 UART: [kat] SHA2-256
8,942,168 UART: [kat] SHA2-384
8,944,909 UART: [kat] SHA2-512-ACC
8,946,809 UART: [kat] ECC-384
8,952,582 UART: [kat] HMAC-384Kdf
8,957,294 UART: [kat] LMS
9,525,490 UART: [kat] --
9,526,269 UART: [update-reset] ++
13,294,306 UART: [update-reset] Image verified using Vendor ECC Key Index 0
13,295,504 UART: [update-reset] Loading Runtime at address 0x40005000 len 92620
13,450,771 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 4.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,218,312 >>> mbox cmd response: success
5,218,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,280,187 UART:
5,280,203 UART: Running Caliptra FMC ...
5,280,611 UART:
5,280,754 UART: [state] CFI Enabled
5,291,522 UART: [fht] FMC Alias Private Key: 7
5,410,768 UART: [art] Extend RT PCRs Done
5,411,196 UART: [art] Lock RT PCRs Done
5,412,496 UART: [art] Populate DV Done
5,420,569 UART: [fht] FMC Alias Private Key: 7
5,421,545 UART: [art] Derive CDI
5,421,825 UART: [art] Store in slot 0x4
5,507,863 UART: [art] Derive Key Pair
5,508,223 UART: [art] Store priv key in slot 0x5
5,521,286 UART: [art] Derive Key Pair - Done
5,536,077 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,551,398 UART: [art] Erasing AUTHORITY.KEYID = 7
5,552,163 UART: [art] PUB.X = 2A1C09AB2B733C55156B2011A0A2E7EA0CE43DC760E3F42D57E1BAD73549C694A959A100B8C13842194BEE479CCFD829
5,558,913 UART: [art] PUB.Y = 3416B1DE2D99F118290A8966A14B53A0D827ACECAF9DF2B918A089D77D7516E740C762D0147D9634D844CE384CCFD753
5,565,864 UART: [art] SIG.R = A5EB8A7C795529EBC504C91AA73FE36E725759AF74A4647748BC748483768D26780ED7B034A2A5FFFA04BD9E874EC55B
5,572,633 UART: [art] SIG.S = 880D91B48D82BFB531B80756BADB86900B16A9F1E4F6A134F58EF55C166633BC88783111AA04047B4183D1131AEF07A7
5,596,231 UART: Caliptra RT
5,596,574 UART: [state] CFI Enabled
5,716,575 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,035,976 >>> mbox cmd response: failed
7,035,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,041,424 UART:
7,041,440 UART: Running Caliptra FMC ...
7,041,848 UART:
7,041,991 UART: [state] CFI Enabled
7,130,792 UART: [art] Extend RT PCRs Done
7,131,220 UART: [art] Lock RT PCRs Done
7,132,329 UART: [art] Populate DV Done
7,140,316 UART: [fht] FMC Alias Private Key: 7
7,141,274 UART: [art] Derive CDI
7,141,554 UART: [art] Store in slot 0x4
7,227,102 UART: [art] Derive Key Pair
7,227,462 UART: [art] Store priv key in slot 0x5
7,240,737 UART: [art] Derive Key Pair - Done
7,255,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
7,270,869 UART: [art] Erasing AUTHORITY.KEYID = 7
7,271,634 UART: [art] PUB.X = 2A1C09AB2B733C55156B2011A0A2E7EA0CE43DC760E3F42D57E1BAD73549C694A959A100B8C13842194BEE479CCFD829
7,278,384 UART: [art] PUB.Y = 3416B1DE2D99F118290A8966A14B53A0D827ACECAF9DF2B918A089D77D7516E740C762D0147D9634D844CE384CCFD753
7,285,335 UART: [art] SIG.R = A5EB8A7C795529EBC504C91AA73FE36E725759AF74A4647748BC748483768D26780ED7B034A2A5FFFA04BD9E874EC55B
7,292,104 UART: [art] SIG.S = 880D91B48D82BFB531B80756BADB86900B16A9F1E4F6A134F58EF55C166633BC88783111AA04047B4183D1131AEF07A7
7,316,684 UART: Caliptra RT
7,317,027 UART: [state] CFI Enabled
7,679,277 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
12,729,083 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,680 UART: [kat] SHA2-256
901,620 UART: [kat] SHA2-384
904,241 UART: [kat] SHA2-512-ACC
906,142 UART: [kat] ECC-384
915,803 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,208 UART: [fht] FHT @ 0x50003400
1,172,822 UART: [idev] ++
1,172,990 UART: [idev] CDI.KEYID = 6
1,173,351 UART: [idev] SUBJECT.KEYID = 7
1,173,776 UART: [idev] UDS.KEYID = 0
1,174,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,199,403 UART: [idev] Sha1 KeyId Algorithm
1,208,323 UART: [idev] --
1,209,374 UART: [ldev] ++
1,209,542 UART: [ldev] CDI.KEYID = 6
1,209,906 UART: [ldev] SUBJECT.KEYID = 5
1,210,333 UART: [ldev] AUTHORITY.KEYID = 7
1,210,796 UART: [ldev] FE.KEYID = 1
1,215,896 UART: [ldev] Erasing FE.KEYID = 1
1,241,707 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,887 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,200 UART: [ldev] --
1,280,553 UART: [fwproc] Wait for Commands...
1,281,354 UART: [fwproc] Recv command 0x46574c44
1,282,087 UART: [fwproc] Recv'd Img size: 118548 bytes
3,175,733 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,753 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,375,128 >>> mbox cmd response: success
3,375,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,376,278 UART: [afmc] ++
3,376,446 UART: [afmc] CDI.KEYID = 6
3,376,809 UART: [afmc] SUBJECT.KEYID = 7
3,377,235 UART: [afmc] AUTHORITY.KEYID = 5
3,412,792 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,429,535 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,430,284 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,991 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,868 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,447,578 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,455,106 UART: [afmc] --
3,456,153 UART: [cold-reset] --
3,457,023 UART: [state] Locking Datavault
3,458,492 UART: [state] Locking PCR0, PCR1 and PCR31
3,459,096 UART: [state] Locking ICCM
3,459,642 UART: [exit] Launching FMC @ 0x40000130
3,464,972 UART:
3,464,988 UART: Running Caliptra FMC ...
3,465,396 UART:
3,465,450 UART: [state] CFI Enabled
3,476,008 UART: [fht] FMC Alias Private Key: 7
3,595,314 UART: [art] Extend RT PCRs Done
3,595,742 UART: [art] Lock RT PCRs Done
3,597,130 UART: [art] Populate DV Done
3,605,355 UART: [fht] FMC Alias Private Key: 7
3,606,489 UART: [art] Derive CDI
3,606,769 UART: [art] Store in slot 0x4
3,692,356 UART: [art] Derive Key Pair
3,692,716 UART: [art] Store priv key in slot 0x5
3,705,610 UART: [art] Derive Key Pair - Done
3,720,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,736,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,736,792 UART: [art] PUB.X = 5A3290C575A04A39B98218377FECE626A40625EAA329BB4EB203769BE6BB069F6A2EAF36CE918664F2C41D94D289167C
3,743,557 UART: [art] PUB.Y = F5F7B5FD96D34E32B78EB40BFE7BE717B3FA13C31226876C7CE2F8D761622E35507593F7CC699C801F59AF28451AE6F4
3,750,512 UART: [art] SIG.R = FBAD7C9A243C5537DD309C213C364FF0AFBAAD8B5755E65867A8888952A5E91F183574187E3AA250FA26BD61645CA334
3,757,288 UART: [art] SIG.S = 468B953A3A0D67DA21008611149F3D74BF6E45799E08DF54BD81E0F335ADDDBD18D5F37CC10F5C951C3834CDE165B7B8
3,781,041 UART: Caliptra RT
3,781,292 UART: [state] CFI Enabled
3,901,324 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,468 UART:
3,903,484 UART: Running Caliptra ROM ...
3,903,892 UART:
3,903,947 UART: [state] CFI Enabled
3,906,793 UART: [state] LifecycleState = Unprovisioned
3,907,448 UART: [state] DebugLocked = No
3,908,108 UART: [state] WD Timer not started. Device not locked for debugging
3,909,438 UART: [kat] SHA2-256
4,712,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,717,092 UART: [kat] ++
4,717,244 UART: [kat] sha1
4,721,500 UART: [kat] SHA2-256
4,723,440 UART: [kat] SHA2-384
4,725,999 UART: [kat] SHA2-512-ACC
4,727,899 UART: [kat] ECC-384
4,737,748 UART: [kat] HMAC-384Kdf
4,742,452 UART: [kat] LMS
4,990,764 UART: [kat] --
4,991,590 UART: [update-reset] ++
5,009,110 >>> mbox cmd response: failed
5,009,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,009,682 UART: ROM Non-Fatal Error: 0x000B003D
5,010,578 UART: [state] Locking Datavault
5,011,498 UART: [state] Locking PCR0, PCR1 and PCR31
5,012,102 UART: [state] Locking ICCM
5,012,614 UART: [exit] Launching FMC @ 0x40000130
5,017,944 UART:
5,017,960 UART: Running Caliptra FMC ...
5,018,368 UART:
5,018,422 UART: [state] CFI Enabled
5,107,647 UART: [art] Extend RT PCRs Done
5,108,075 UART: [art] Lock RT PCRs Done
5,109,248 UART: [art] Populate DV Done
5,117,687 UART: [fht] FMC Alias Private Key: 7
5,118,719 UART: [art] Derive CDI
5,118,999 UART: [art] Store in slot 0x4
5,204,844 UART: [art] Derive Key Pair
5,205,204 UART: [art] Store priv key in slot 0x5
5,218,972 UART: [art] Derive Key Pair - Done
5,233,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,248,729 UART: [art] Erasing AUTHORITY.KEYID = 7
5,249,494 UART: [art] PUB.X = 5A3290C575A04A39B98218377FECE626A40625EAA329BB4EB203769BE6BB069F6A2EAF36CE918664F2C41D94D289167C
5,256,259 UART: [art] PUB.Y = F5F7B5FD96D34E32B78EB40BFE7BE717B3FA13C31226876C7CE2F8D761622E35507593F7CC699C801F59AF28451AE6F4
5,263,214 UART: [art] SIG.R = FBAD7C9A243C5537DD309C213C364FF0AFBAAD8B5755E65867A8888952A5E91F183574187E3AA250FA26BD61645CA334
5,269,990 UART: [art] SIG.S = 468B953A3A0D67DA21008611149F3D74BF6E45799E08DF54BD81E0F335ADDDBD18D5F37CC10F5C951C3834CDE165B7B8
5,293,539 UART: Caliptra RT
5,293,790 UART: [state] CFI Enabled
5,660,599 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,662,288 UART:
5,662,304 UART: Running Caliptra ROM ...
5,662,712 UART:
5,662,767 UART: [state] CFI Enabled
5,665,175 UART: [state] LifecycleState = Unprovisioned
5,665,830 UART: [state] DebugLocked = No
5,666,316 UART: [state] WD Timer not started. Device not locked for debugging
5,667,430 UART: [kat] SHA2-256
6,470,980 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,475,084 UART: [kat] ++
6,475,236 UART: [kat] sha1
6,479,596 UART: [kat] SHA2-256
6,481,536 UART: [kat] SHA2-384
6,484,087 UART: [kat] SHA2-512-ACC
6,485,987 UART: [kat] ECC-384
6,495,564 UART: [kat] HMAC-384Kdf
6,500,302 UART: [kat] LMS
6,748,614 UART: [kat] --
6,749,542 UART: [update-reset] ++
8,657,409 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,658,472 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,813,687 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,218,044 >>> mbox cmd response: success
3,218,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,280,171 UART:
3,280,187 UART: Running Caliptra FMC ...
3,280,595 UART:
3,280,649 UART: [state] CFI Enabled
3,291,303 UART: [fht] FMC Alias Private Key: 7
3,409,895 UART: [art] Extend RT PCRs Done
3,410,323 UART: [art] Lock RT PCRs Done
3,411,923 UART: [art] Populate DV Done
3,420,308 UART: [fht] FMC Alias Private Key: 7
3,421,316 UART: [art] Derive CDI
3,421,596 UART: [art] Store in slot 0x4
3,507,231 UART: [art] Derive Key Pair
3,507,591 UART: [art] Store priv key in slot 0x5
3,520,685 UART: [art] Derive Key Pair - Done
3,535,346 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,813 UART: [art] Erasing AUTHORITY.KEYID = 7
3,551,578 UART: [art] PUB.X = 53045C82D65F2894F8A5AD692ED85213C4C86895CE20BC027DD768E3BA860F9ABE7776C2C25C951769CD5D7C738B45C3
3,558,343 UART: [art] PUB.Y = 2B5F96DF67766A0672C829A3835880D1DAB8C07FF02B2C1DF89C4C78219C8A1CB14420B044F9EE1A7C0D630FE6263C1B
3,565,292 UART: [art] SIG.R = 3EEFDB8E327D91B94D7E01A31770B17168386A2E80F0DAC22A41145F1DAC86E36A6DCBADEED3F245B7BF906FB8CD2D71
3,572,081 UART: [art] SIG.S = DB7521D90A05EFAA05EFFB7E68AB417CA853053B4C5DE985822580E103107CDF78E8F59D8FCD13F82C56F1F4663E3221
3,595,672 UART: Caliptra RT
3,595,923 UART: [state] CFI Enabled
3,716,015 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,709,172 >>> mbox cmd response: failed
4,709,172 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,714,998 UART:
4,715,014 UART: Running Caliptra FMC ...
4,715,422 UART:
4,715,476 UART: [state] CFI Enabled
4,804,517 UART: [art] Extend RT PCRs Done
4,804,945 UART: [art] Lock RT PCRs Done
4,805,992 UART: [art] Populate DV Done
4,814,073 UART: [fht] FMC Alias Private Key: 7
4,815,251 UART: [art] Derive CDI
4,815,531 UART: [art] Store in slot 0x4
4,901,356 UART: [art] Derive Key Pair
4,901,716 UART: [art] Store priv key in slot 0x5
4,915,238 UART: [art] Derive Key Pair - Done
4,929,747 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,945,206 UART: [art] Erasing AUTHORITY.KEYID = 7
4,945,971 UART: [art] PUB.X = 53045C82D65F2894F8A5AD692ED85213C4C86895CE20BC027DD768E3BA860F9ABE7776C2C25C951769CD5D7C738B45C3
4,952,736 UART: [art] PUB.Y = 2B5F96DF67766A0672C829A3835880D1DAB8C07FF02B2C1DF89C4C78219C8A1CB14420B044F9EE1A7C0D630FE6263C1B
4,959,685 UART: [art] SIG.R = 3EEFDB8E327D91B94D7E01A31770B17168386A2E80F0DAC22A41145F1DAC86E36A6DCBADEED3F245B7BF906FB8CD2D71
4,966,474 UART: [art] SIG.S = DB7521D90A05EFAA05EFFB7E68AB417CA853053B4C5DE985822580E103107CDF78E8F59D8FCD13F82C56F1F4663E3221
4,990,009 UART: Caliptra RT
4,990,260 UART: [state] CFI Enabled
5,355,523 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,381,026 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,551 UART: [state] LifecycleState = Unprovisioned
86,206 UART: [state] DebugLocked = No
86,886 UART: [state] WD Timer not started. Device not locked for debugging
88,087 UART: [kat] SHA2-256
891,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,741 UART: [kat] ++
895,893 UART: [kat] sha1
900,307 UART: [kat] SHA2-256
902,247 UART: [kat] SHA2-384
904,878 UART: [kat] SHA2-512-ACC
906,779 UART: [kat] ECC-384
916,376 UART: [kat] HMAC-384Kdf
921,116 UART: [kat] LMS
1,169,428 UART: [kat] --
1,170,197 UART: [cold-reset] ++
1,170,747 UART: [fht] FHT @ 0x50003400
1,173,413 UART: [idev] ++
1,173,581 UART: [idev] CDI.KEYID = 6
1,173,942 UART: [idev] SUBJECT.KEYID = 7
1,174,367 UART: [idev] UDS.KEYID = 0
1,174,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,152 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,088 UART: [idev] --
1,209,247 UART: [ldev] ++
1,209,415 UART: [ldev] CDI.KEYID = 6
1,209,779 UART: [ldev] SUBJECT.KEYID = 5
1,210,206 UART: [ldev] AUTHORITY.KEYID = 7
1,210,669 UART: [ldev] FE.KEYID = 1
1,216,067 UART: [ldev] Erasing FE.KEYID = 1
1,242,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,652 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,368 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,257 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,969 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,107 UART: [ldev] --
1,281,496 UART: [fwproc] Wait for Commands...
1,282,183 UART: [fwproc] Recv command 0x46574c44
1,282,916 UART: [fwproc] Recv'd Img size: 118548 bytes
3,183,205 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,210,568 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,241,743 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,382,074 >>> mbox cmd response: success
3,382,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,383,214 UART: [afmc] ++
3,383,382 UART: [afmc] CDI.KEYID = 6
3,383,745 UART: [afmc] SUBJECT.KEYID = 7
3,384,171 UART: [afmc] AUTHORITY.KEYID = 5
3,419,542 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,436,109 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,436,858 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,442,565 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,448,442 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,454,152 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,461,950 UART: [afmc] --
3,462,999 UART: [cold-reset] --
3,463,715 UART: [state] Locking Datavault
3,464,854 UART: [state] Locking PCR0, PCR1 and PCR31
3,465,458 UART: [state] Locking ICCM
3,466,114 UART: [exit] Launching FMC @ 0x40000130
3,471,444 UART:
3,471,460 UART: Running Caliptra FMC ...
3,471,868 UART:
3,472,011 UART: [state] CFI Enabled
3,482,735 UART: [fht] FMC Alias Private Key: 7
3,602,057 UART: [art] Extend RT PCRs Done
3,602,485 UART: [art] Lock RT PCRs Done
3,604,271 UART: [art] Populate DV Done
3,612,640 UART: [fht] FMC Alias Private Key: 7
3,613,712 UART: [art] Derive CDI
3,613,992 UART: [art] Store in slot 0x4
3,700,209 UART: [art] Derive Key Pair
3,700,569 UART: [art] Store priv key in slot 0x5
3,713,703 UART: [art] Derive Key Pair - Done
3,728,280 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,743,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,744,742 UART: [art] PUB.X = 027E22A7AC340F598C9BD9E1F641BA87D31EABA4193E1FA2A1CD59B5DB82AAEB6E7D415E8F8D5A655F7BC6CEBD25FBA3
3,751,536 UART: [art] PUB.Y = 4F73CC093A72A453ABC74EFABF44FBCBF34D0D20B886E4EF1D4C1A92A996CB57150A724BFF435040E4C017B642676E85
3,758,491 UART: [art] SIG.R = 7EF69DC6CD05B3047C7F2E38D63A539C9653381BFD9358BAA5C7BE06B7ED9D0E7D597EA9A18EB64E58B23233A45848C2
3,765,261 UART: [art] SIG.S = 207BC7EB252A0258734575358E6B68BA9398A0BF0113B641190F3CAEA56E7D50AB43BCE73F5DA5926A0CDF9AF835DE4F
3,788,953 UART: Caliptra RT
3,789,296 UART: [state] CFI Enabled
3,909,012 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,910,734 UART:
3,910,750 UART: Running Caliptra ROM ...
3,911,158 UART:
3,911,300 UART: [state] CFI Enabled
3,914,764 UART: [state] LifecycleState = Unprovisioned
3,915,419 UART: [state] DebugLocked = No
3,916,121 UART: [state] WD Timer not started. Device not locked for debugging
3,917,383 UART: [kat] SHA2-256
4,720,933 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
4,725,037 UART: [kat] ++
4,725,189 UART: [kat] sha1
4,729,505 UART: [kat] SHA2-256
4,731,445 UART: [kat] SHA2-384
4,734,222 UART: [kat] SHA2-512-ACC
4,736,122 UART: [kat] ECC-384
4,745,687 UART: [kat] HMAC-384Kdf
4,750,395 UART: [kat] LMS
4,998,707 UART: [kat] --
4,999,447 UART: [update-reset] ++
5,017,447 >>> mbox cmd response: failed
5,017,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,018,075 UART: ROM Non-Fatal Error: 0x000B003D
5,018,891 UART: [state] Locking Datavault
5,019,851 UART: [state] Locking PCR0, PCR1 and PCR31
5,020,455 UART: [state] Locking ICCM
5,021,095 UART: [exit] Launching FMC @ 0x40000130
5,026,425 UART:
5,026,441 UART: Running Caliptra FMC ...
5,026,849 UART:
5,026,992 UART: [state] CFI Enabled
5,116,519 UART: [art] Extend RT PCRs Done
5,116,947 UART: [art] Lock RT PCRs Done
5,118,314 UART: [art] Populate DV Done
5,126,701 UART: [fht] FMC Alias Private Key: 7
5,127,831 UART: [art] Derive CDI
5,128,111 UART: [art] Store in slot 0x4
5,214,228 UART: [art] Derive Key Pair
5,214,588 UART: [art] Store priv key in slot 0x5
5,227,452 UART: [art] Derive Key Pair - Done
5,242,103 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,256,978 UART: [art] Erasing AUTHORITY.KEYID = 7
5,257,743 UART: [art] PUB.X = 027E22A7AC340F598C9BD9E1F641BA87D31EABA4193E1FA2A1CD59B5DB82AAEB6E7D415E8F8D5A655F7BC6CEBD25FBA3
5,264,537 UART: [art] PUB.Y = 4F73CC093A72A453ABC74EFABF44FBCBF34D0D20B886E4EF1D4C1A92A996CB57150A724BFF435040E4C017B642676E85
5,271,492 UART: [art] SIG.R = 7EF69DC6CD05B3047C7F2E38D63A539C9653381BFD9358BAA5C7BE06B7ED9D0E7D597EA9A18EB64E58B23233A45848C2
5,278,262 UART: [art] SIG.S = 207BC7EB252A0258734575358E6B68BA9398A0BF0113B641190F3CAEA56E7D50AB43BCE73F5DA5926A0CDF9AF835DE4F
5,301,796 UART: Caliptra RT
5,302,139 UART: [state] CFI Enabled
5,667,074 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,668,877 UART:
5,668,893 UART: Running Caliptra ROM ...
5,669,301 UART:
5,669,443 UART: [state] CFI Enabled
5,672,547 UART: [state] LifecycleState = Unprovisioned
5,673,202 UART: [state] DebugLocked = No
5,673,702 UART: [state] WD Timer not started. Device not locked for debugging
5,674,840 UART: [kat] SHA2-256
6,478,390 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
6,482,494 UART: [kat] ++
6,482,646 UART: [kat] sha1
6,486,754 UART: [kat] SHA2-256
6,488,694 UART: [kat] SHA2-384
6,491,413 UART: [kat] SHA2-512-ACC
6,493,313 UART: [kat] ECC-384
6,502,960 UART: [kat] HMAC-384Kdf
6,507,566 UART: [kat] LMS
6,755,878 UART: [kat] --
6,756,558 UART: [update-reset] ++
8,671,640 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,672,729 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,827,944 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,221,955 >>> mbox cmd response: success
3,221,955 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,284,140 UART:
3,284,156 UART: Running Caliptra FMC ...
3,284,564 UART:
3,284,707 UART: [state] CFI Enabled
3,295,439 UART: [fht] FMC Alias Private Key: 7
3,414,723 UART: [art] Extend RT PCRs Done
3,415,151 UART: [art] Lock RT PCRs Done
3,416,923 UART: [art] Populate DV Done
3,425,098 UART: [fht] FMC Alias Private Key: 7
3,426,162 UART: [art] Derive CDI
3,426,442 UART: [art] Store in slot 0x4
3,512,305 UART: [art] Derive Key Pair
3,512,665 UART: [art] Store priv key in slot 0x5
3,525,663 UART: [art] Derive Key Pair - Done
3,540,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,556,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,556,791 UART: [art] PUB.X = 8CA1F6EF5884B340635C31746BAD51E3BFF3AA4BCF9F097AC49349A65C67FABB6175AC591DEAE1DD50E0E7A5D221ED7B
3,563,582 UART: [art] PUB.Y = 15C0741D3984F5F0A0F8AEEE595D1E5CAF1E2870A7025F759CA6DFFF25547AA8CE3A76A0307BA16C617BED99F6679447
3,570,541 UART: [art] SIG.R = 3336D582BB469EC189EF60CD069279638C87EE30A60DBEC6544EBE6438D8C268D6D97B5192042C445AC088C6BC7975A1
3,577,304 UART: [art] SIG.S = 2493974B5CF43BCD432A9B5597FED12559AA6AEFA7909EB86870BEE77682A01D60CAF641A00645108BC652B9CABAA425
3,601,201 UART: Caliptra RT
3,601,544 UART: [state] CFI Enabled
3,721,314 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,715,908 >>> mbox cmd response: failed
4,715,908 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,721,954 UART:
4,721,970 UART: Running Caliptra FMC ...
4,722,378 UART:
4,722,521 UART: [state] CFI Enabled
4,812,286 UART: [art] Extend RT PCRs Done
4,812,714 UART: [art] Lock RT PCRs Done
4,814,019 UART: [art] Populate DV Done
4,822,112 UART: [fht] FMC Alias Private Key: 7
4,823,170 UART: [art] Derive CDI
4,823,450 UART: [art] Store in slot 0x4
4,909,349 UART: [art] Derive Key Pair
4,909,709 UART: [art] Store priv key in slot 0x5
4,922,825 UART: [art] Derive Key Pair - Done
4,937,357 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,952,582 UART: [art] Erasing AUTHORITY.KEYID = 7
4,953,347 UART: [art] PUB.X = 8CA1F6EF5884B340635C31746BAD51E3BFF3AA4BCF9F097AC49349A65C67FABB6175AC591DEAE1DD50E0E7A5D221ED7B
4,960,138 UART: [art] PUB.Y = 15C0741D3984F5F0A0F8AEEE595D1E5CAF1E2870A7025F759CA6DFFF25547AA8CE3A76A0307BA16C617BED99F6679447
4,967,097 UART: [art] SIG.R = 3336D582BB469EC189EF60CD069279638C87EE30A60DBEC6544EBE6438D8C268D6D97B5192042C445AC088C6BC7975A1
4,973,860 UART: [art] SIG.S = 2493974B5CF43BCD432A9B5597FED12559AA6AEFA7909EB86870BEE77682A01D60CAF641A00645108BC652B9CABAA425
4,997,939 UART: Caliptra RT
4,998,282 UART: [state] CFI Enabled
5,369,851 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,401,427 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,956 UART: [state] LifecycleState = Unprovisioned
85,611 UART: [state] DebugLocked = No
86,305 UART: [state] WD Timer not started. Device not locked for debugging
87,528 UART: [kat] SHA2-256
893,178 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,303 UART: [kat] ++
897,455 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
917,650 UART: [kat] HMAC-384Kdf
922,242 UART: [kat] LMS
1,170,570 UART: [kat] --
1,171,769 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,918 UART: [idev] ++
1,175,086 UART: [idev] CDI.KEYID = 6
1,175,446 UART: [idev] SUBJECT.KEYID = 7
1,175,870 UART: [idev] UDS.KEYID = 0
1,176,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,810 UART: [idev] Erasing UDS.KEYID = 0
1,200,845 UART: [idev] Sha1 KeyId Algorithm
1,209,283 UART: [idev] --
1,210,185 UART: [ldev] ++
1,210,353 UART: [ldev] CDI.KEYID = 6
1,210,716 UART: [ldev] SUBJECT.KEYID = 5
1,211,142 UART: [ldev] AUTHORITY.KEYID = 7
1,211,605 UART: [ldev] FE.KEYID = 1
1,216,805 UART: [ldev] Erasing FE.KEYID = 1
1,243,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,579 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,186 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,898 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,933 UART: [ldev] --
1,283,398 UART: [fwproc] Wait for Commands...
1,283,988 UART: [fwproc] Recv command 0x46574c44
1,284,716 UART: [fwproc] Recv'd Img size: 118548 bytes
3,161,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,189,213 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,220,383 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,360,680 >>> mbox cmd response: success
3,360,680 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,361,800 UART: [afmc] ++
3,361,968 UART: [afmc] CDI.KEYID = 6
3,362,330 UART: [afmc] SUBJECT.KEYID = 7
3,362,755 UART: [afmc] AUTHORITY.KEYID = 5
3,397,234 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,414,099 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,414,847 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,420,553 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,426,432 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,432,142 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,440,009 UART: [afmc] --
3,441,043 UART: [cold-reset] --
3,441,637 UART: [state] Locking Datavault
3,442,608 UART: [state] Locking PCR0, PCR1 and PCR31
3,443,212 UART: [state] Locking ICCM
3,443,684 UART: [exit] Launching FMC @ 0x40000130
3,449,014 UART:
3,449,030 UART: Running Caliptra FMC ...
3,449,438 UART:
3,449,492 UART: [state] CFI Enabled
3,459,832 UART: [fht] FMC Alias Private Key: 7
3,579,422 UART: [art] Extend RT PCRs Done
3,579,850 UART: [art] Lock RT PCRs Done
3,581,342 UART: [art] Populate DV Done
3,589,627 UART: [fht] FMC Alias Private Key: 7
3,590,635 UART: [art] Derive CDI
3,590,915 UART: [art] Store in slot 0x4
3,677,082 UART: [art] Derive Key Pair
3,677,442 UART: [art] Store priv key in slot 0x5
3,690,422 UART: [art] Derive Key Pair - Done
3,705,419 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,720,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,721,579 UART: [art] PUB.X = 00E1E91BFDC660B8B5D58A3D55F4EC9EBAF9F21418E2633619E8F6196D6EC948AC17BB10DF01EE2BAE5E76AFECE3D40F
3,728,347 UART: [art] PUB.Y = 7D5EDDEB031520025E3589E0966EFA90FBC73A5212E7C09C7F887E57AC3D44A9463DCFF85EF1FC141E876FF786569176
3,735,299 UART: [art] SIG.R = EEE7F2A0AF7CF347368862C3A3CF95643EE5EF81A4816E4EB6B022ABAA4B80703BC1F5298FFF91665310CCE3D2D18666
3,742,083 UART: [art] SIG.S = C54C24359014F04FC99B4D0263413EE50A6220A6706C4DD7AD5FBFDE8F3898FFEB453074784077B189355AE4F13BC8CD
3,766,087 UART: Caliptra RT
3,766,338 UART: [state] CFI Enabled
3,885,935 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,887,987 UART:
3,888,003 UART: Running Caliptra ROM ...
3,888,411 UART:
3,888,466 UART: [state] CFI Enabled
3,891,264 UART: [state] LifecycleState = Unprovisioned
3,891,919 UART: [state] DebugLocked = No
3,892,511 UART: [state] WD Timer not started. Device not locked for debugging
3,893,669 UART: [kat] SHA2-256
4,699,319 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,703,444 UART: [kat] ++
4,703,596 UART: [kat] sha1
4,708,042 UART: [kat] SHA2-256
4,709,982 UART: [kat] SHA2-384
4,712,727 UART: [kat] SHA2-512-ACC
4,714,627 UART: [kat] ECC-384
4,724,562 UART: [kat] HMAC-384Kdf
4,729,266 UART: [kat] LMS
4,977,594 UART: [kat] --
4,978,336 UART: [update-reset] ++
4,996,105 >>> mbox cmd response: failed
4,996,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,996,541 UART: ROM Non-Fatal Error: 0x000B003D
4,997,431 UART: [state] Locking Datavault
4,998,161 UART: [state] Locking PCR0, PCR1 and PCR31
4,998,765 UART: [state] Locking ICCM
4,999,347 UART: [exit] Launching FMC @ 0x40000130
5,004,677 UART:
5,004,693 UART: Running Caliptra FMC ...
5,005,101 UART:
5,005,155 UART: [state] CFI Enabled
5,094,072 UART: [art] Extend RT PCRs Done
5,094,500 UART: [art] Lock RT PCRs Done
5,095,499 UART: [art] Populate DV Done
5,103,788 UART: [fht] FMC Alias Private Key: 7
5,104,806 UART: [art] Derive CDI
5,105,086 UART: [art] Store in slot 0x4
5,190,625 UART: [art] Derive Key Pair
5,190,985 UART: [art] Store priv key in slot 0x5
5,204,209 UART: [art] Derive Key Pair - Done
5,218,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,234,033 UART: [art] Erasing AUTHORITY.KEYID = 7
5,234,798 UART: [art] PUB.X = 00E1E91BFDC660B8B5D58A3D55F4EC9EBAF9F21418E2633619E8F6196D6EC948AC17BB10DF01EE2BAE5E76AFECE3D40F
5,241,566 UART: [art] PUB.Y = 7D5EDDEB031520025E3589E0966EFA90FBC73A5212E7C09C7F887E57AC3D44A9463DCFF85EF1FC141E876FF786569176
5,248,518 UART: [art] SIG.R = EEE7F2A0AF7CF347368862C3A3CF95643EE5EF81A4816E4EB6B022ABAA4B80703BC1F5298FFF91665310CCE3D2D18666
5,255,302 UART: [art] SIG.S = C54C24359014F04FC99B4D0263413EE50A6220A6706C4DD7AD5FBFDE8F3898FFEB453074784077B189355AE4F13BC8CD
5,279,148 UART: Caliptra RT
5,279,399 UART: [state] CFI Enabled
5,643,633 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,645,256 UART:
5,645,272 UART: Running Caliptra ROM ...
5,645,680 UART:
5,645,735 UART: [state] CFI Enabled
5,648,429 UART: [state] LifecycleState = Unprovisioned
5,649,084 UART: [state] DebugLocked = No
5,649,642 UART: [state] WD Timer not started. Device not locked for debugging
5,650,994 UART: [kat] SHA2-256
6,456,644 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,460,769 UART: [kat] ++
6,460,921 UART: [kat] sha1
6,465,059 UART: [kat] SHA2-256
6,466,999 UART: [kat] SHA2-384
6,469,726 UART: [kat] SHA2-512-ACC
6,471,626 UART: [kat] ECC-384
6,481,539 UART: [kat] HMAC-384Kdf
6,486,283 UART: [kat] LMS
6,734,611 UART: [kat] --
6,735,347 UART: [update-reset] ++
8,626,544 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,627,617 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,782,832 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,214,288 >>> mbox cmd response: success
3,214,288 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,275,445 UART:
3,275,461 UART: Running Caliptra FMC ...
3,275,869 UART:
3,275,923 UART: [state] CFI Enabled
3,286,321 UART: [fht] FMC Alias Private Key: 7
3,405,585 UART: [art] Extend RT PCRs Done
3,406,013 UART: [art] Lock RT PCRs Done
3,407,655 UART: [art] Populate DV Done
3,415,878 UART: [fht] FMC Alias Private Key: 7
3,416,988 UART: [art] Derive CDI
3,417,268 UART: [art] Store in slot 0x4
3,503,029 UART: [art] Derive Key Pair
3,503,389 UART: [art] Store priv key in slot 0x5
3,517,065 UART: [art] Derive Key Pair - Done
3,532,152 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,547,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,548,196 UART: [art] PUB.X = 615DCA47B676BC485D8CCF75A596581AE8E346C2D8EC6B58D7B260B56D42E0C648204A9583DEE1AA1D99C6969C15FB68
3,554,976 UART: [art] PUB.Y = 0DAC2947E60333B4B474CC5239621EDB4F109EFE3B05C3784B75747BD98DEA72FE5D19755D33DEFD1E1DB64CA127B24B
3,561,931 UART: [art] SIG.R = 2C8BC4EECD3861974C7F799CB581E7A3C89158AD5B0ABEEF67F1A7FCF4E363BAC9FE132708447B631E55189BB080A384
3,568,709 UART: [art] SIG.S = 085280A21F18D13681AEAEE6FA69823A3BD72D2D973CFA2FC5F195C290E12A65078DF34A57819A45D843BBF23EF93223
3,591,895 UART: Caliptra RT
3,592,146 UART: [state] CFI Enabled
3,712,552 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,707,178 >>> mbox cmd response: failed
4,707,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,712,876 UART:
4,712,892 UART: Running Caliptra FMC ...
4,713,300 UART:
4,713,354 UART: [state] CFI Enabled
4,802,429 UART: [art] Extend RT PCRs Done
4,802,857 UART: [art] Lock RT PCRs Done
4,804,446 UART: [art] Populate DV Done
4,812,531 UART: [fht] FMC Alias Private Key: 7
4,813,653 UART: [art] Derive CDI
4,813,933 UART: [art] Store in slot 0x4
4,899,482 UART: [art] Derive Key Pair
4,899,842 UART: [art] Store priv key in slot 0x5
4,913,564 UART: [art] Derive Key Pair - Done
4,928,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,943,614 UART: [art] Erasing AUTHORITY.KEYID = 7
4,944,379 UART: [art] PUB.X = 615DCA47B676BC485D8CCF75A596581AE8E346C2D8EC6B58D7B260B56D42E0C648204A9583DEE1AA1D99C6969C15FB68
4,951,159 UART: [art] PUB.Y = 0DAC2947E60333B4B474CC5239621EDB4F109EFE3B05C3784B75747BD98DEA72FE5D19755D33DEFD1E1DB64CA127B24B
4,958,114 UART: [art] SIG.R = 2C8BC4EECD3861974C7F799CB581E7A3C89158AD5B0ABEEF67F1A7FCF4E363BAC9FE132708447B631E55189BB080A384
4,964,892 UART: [art] SIG.S = 085280A21F18D13681AEAEE6FA69823A3BD72D2D973CFA2FC5F195C290E12A65078DF34A57819A45D843BBF23EF93223
4,988,064 UART: Caliptra RT
4,988,315 UART: [state] CFI Enabled
5,358,564 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,383,313 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.98s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,337 UART: [state] LifecycleState = Unprovisioned
85,992 UART: [state] DebugLocked = No
86,482 UART: [state] WD Timer not started. Device not locked for debugging
87,593 UART: [kat] SHA2-256
893,243 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,368 UART: [kat] ++
897,520 UART: [kat] sha1
901,650 UART: [kat] SHA2-256
903,590 UART: [kat] SHA2-384
906,237 UART: [kat] SHA2-512-ACC
908,138 UART: [kat] ECC-384
917,843 UART: [kat] HMAC-384Kdf
922,433 UART: [kat] LMS
1,170,761 UART: [kat] --
1,171,812 UART: [cold-reset] ++
1,172,310 UART: [fht] FHT @ 0x50003400
1,174,967 UART: [idev] ++
1,175,135 UART: [idev] CDI.KEYID = 6
1,175,495 UART: [idev] SUBJECT.KEYID = 7
1,175,919 UART: [idev] UDS.KEYID = 0
1,176,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,447 UART: [idev] Erasing UDS.KEYID = 0
1,200,412 UART: [idev] Sha1 KeyId Algorithm
1,208,914 UART: [idev] --
1,210,022 UART: [ldev] ++
1,210,190 UART: [ldev] CDI.KEYID = 6
1,210,553 UART: [ldev] SUBJECT.KEYID = 5
1,210,979 UART: [ldev] AUTHORITY.KEYID = 7
1,211,442 UART: [ldev] FE.KEYID = 1
1,216,834 UART: [ldev] Erasing FE.KEYID = 1
1,243,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,920 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,636 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,239 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,470 UART: [ldev] --
1,282,775 UART: [fwproc] Wait for Commands...
1,283,493 UART: [fwproc] Recv command 0x46574c44
1,284,221 UART: [fwproc] Recv'd Img size: 118548 bytes
3,174,927 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
3,203,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
3,234,426 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
3,374,651 >>> mbox cmd response: success
3,374,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,375,679 UART: [afmc] ++
3,375,847 UART: [afmc] CDI.KEYID = 6
3,376,209 UART: [afmc] SUBJECT.KEYID = 7
3,376,634 UART: [afmc] AUTHORITY.KEYID = 5
3,411,973 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
3,428,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
3,429,438 UART: [afmc] PUB.X = C9CBDCB273F1E0806490CE8BD664E8302A2F61513D794E91BC265F7C39966C9096C509E29F840412563C7FC5577A1627
3,435,144 UART: [afmc] PUB.Y = 322C25B68D66AFC1053FF8FC388D3DB57BD2450B7BF9D985D80A13A6ABD1D33FF7D0E0D8ADB7A80090E28D8EDE4A5B2C
3,441,023 UART: [afmc] SIG.R = 3DC3CDE3F91C7CEB072414BA5084DC5522B1E890F666989BD786BF07426937C381E945758A5FC6D1DB387AD546B91EFC
3,446,733 UART: [afmc] SIG.S = 944BDC332E8626751810D93AF4A428C0F831F875E99675E3C7E45082FD69E0AA530FE480800DFE03E28951C36F6DD8B0
3,454,558 UART: [afmc] --
3,455,648 UART: [cold-reset] --
3,456,548 UART: [state] Locking Datavault
3,457,681 UART: [state] Locking PCR0, PCR1 and PCR31
3,458,285 UART: [state] Locking ICCM
3,458,931 UART: [exit] Launching FMC @ 0x40000130
3,464,261 UART:
3,464,277 UART: Running Caliptra FMC ...
3,464,685 UART:
3,464,828 UART: [state] CFI Enabled
3,475,214 UART: [fht] FMC Alias Private Key: 7
3,594,338 UART: [art] Extend RT PCRs Done
3,594,766 UART: [art] Lock RT PCRs Done
3,595,854 UART: [art] Populate DV Done
3,604,313 UART: [fht] FMC Alias Private Key: 7
3,605,389 UART: [art] Derive CDI
3,605,669 UART: [art] Store in slot 0x4
3,691,562 UART: [art] Derive Key Pair
3,691,922 UART: [art] Store priv key in slot 0x5
3,705,388 UART: [art] Derive Key Pair - Done
3,720,228 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,735,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,735,994 UART: [art] PUB.X = 81A1C3CCBF5393E495EA08BBA8091811C66E261BA5D3BB04ADDD02984B3043878F2B85ED97442E81969A621D97FAC2BA
3,742,762 UART: [art] PUB.Y = E4A09F8ACEC46536391B8C28F6D805B065A6C9D7A22084660811AA56EB57B78EE9F98B4A5FB7550E4DA2FF3688BEA509
3,749,710 UART: [art] SIG.R = A3DB68049A9B2C3AAAF8D4AD4F3B1F04D57D990F532E8D54FCD444A603D649C4D0AB43AE662BE94BE04895B2E94B393C
3,756,486 UART: [art] SIG.S = 3C5E49B8D19B329C68598255DE164E8DD2767C98DE0C837DD23631ECFFA204FC2356012411B917113B50E6936674CD08
3,780,848 UART: Caliptra RT
3,781,191 UART: [state] CFI Enabled
3,901,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,903,509 UART:
3,903,525 UART: Running Caliptra ROM ...
3,903,933 UART:
3,904,075 UART: [state] CFI Enabled
3,907,031 UART: [state] LifecycleState = Unprovisioned
3,907,686 UART: [state] DebugLocked = No
3,908,296 UART: [state] WD Timer not started. Device not locked for debugging
3,909,536 UART: [kat] SHA2-256
4,715,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
4,719,311 UART: [kat] ++
4,719,463 UART: [kat] sha1
4,723,725 UART: [kat] SHA2-256
4,725,665 UART: [kat] SHA2-384
4,728,270 UART: [kat] SHA2-512-ACC
4,730,170 UART: [kat] ECC-384
4,739,947 UART: [kat] HMAC-384Kdf
4,744,667 UART: [kat] LMS
4,992,995 UART: [kat] --
4,993,783 UART: [update-reset] ++
5,011,490 >>> mbox cmd response: failed
5,011,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,012,048 UART: ROM Non-Fatal Error: 0x000B003D
5,012,890 UART: [state] Locking Datavault
5,013,652 UART: [state] Locking PCR0, PCR1 and PCR31
5,014,256 UART: [state] Locking ICCM
5,014,740 UART: [exit] Launching FMC @ 0x40000130
5,020,070 UART:
5,020,086 UART: Running Caliptra FMC ...
5,020,494 UART:
5,020,637 UART: [state] CFI Enabled
5,110,046 UART: [art] Extend RT PCRs Done
5,110,474 UART: [art] Lock RT PCRs Done
5,111,819 UART: [art] Populate DV Done
5,120,228 UART: [fht] FMC Alias Private Key: 7
5,121,204 UART: [art] Derive CDI
5,121,484 UART: [art] Store in slot 0x4
5,207,501 UART: [art] Derive Key Pair
5,207,861 UART: [art] Store priv key in slot 0x5
5,221,019 UART: [art] Derive Key Pair - Done
5,235,963 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
5,251,102 UART: [art] Erasing AUTHORITY.KEYID = 7
5,251,867 UART: [art] PUB.X = 81A1C3CCBF5393E495EA08BBA8091811C66E261BA5D3BB04ADDD02984B3043878F2B85ED97442E81969A621D97FAC2BA
5,258,635 UART: [art] PUB.Y = E4A09F8ACEC46536391B8C28F6D805B065A6C9D7A22084660811AA56EB57B78EE9F98B4A5FB7550E4DA2FF3688BEA509
5,265,583 UART: [art] SIG.R = A3DB68049A9B2C3AAAF8D4AD4F3B1F04D57D990F532E8D54FCD444A603D649C4D0AB43AE662BE94BE04895B2E94B393C
5,272,359 UART: [art] SIG.S = 3C5E49B8D19B329C68598255DE164E8DD2767C98DE0C837DD23631ECFFA204FC2356012411B917113B50E6936674CD08
5,296,161 UART: Caliptra RT
5,296,504 UART: [state] CFI Enabled
5,659,641 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,661,470 UART:
5,661,486 UART: Running Caliptra ROM ...
5,661,894 UART:
5,662,036 UART: [state] CFI Enabled
5,665,284 UART: [state] LifecycleState = Unprovisioned
5,665,939 UART: [state] DebugLocked = No
5,666,635 UART: [state] WD Timer not started. Device not locked for debugging
5,667,763 UART: [kat] SHA2-256
6,473,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
6,477,538 UART: [kat] ++
6,477,690 UART: [kat] sha1
6,482,042 UART: [kat] SHA2-256
6,483,982 UART: [kat] SHA2-384
6,486,693 UART: [kat] SHA2-512-ACC
6,488,593 UART: [kat] ECC-384
6,498,392 UART: [kat] HMAC-384Kdf
6,502,980 UART: [kat] LMS
6,751,308 UART: [kat] --
6,752,200 UART: [update-reset] ++
8,657,953 UART: [update-reset] Img verified w/ Vendor ECC Key Index 0
8,658,942 UART: [update-reset] Loading Runtime at addr 0x40005000 len 92620
8,814,157 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 3.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,630 >>> mbox cmd response: success
3,216,630 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,279,007 UART:
3,279,023 UART: Running Caliptra FMC ...
3,279,431 UART:
3,279,574 UART: [state] CFI Enabled
3,289,988 UART: [fht] FMC Alias Private Key: 7
3,409,182 UART: [art] Extend RT PCRs Done
3,409,610 UART: [art] Lock RT PCRs Done
3,411,216 UART: [art] Populate DV Done
3,419,363 UART: [fht] FMC Alias Private Key: 7
3,420,487 UART: [art] Derive CDI
3,420,767 UART: [art] Store in slot 0x4
3,506,536 UART: [art] Derive Key Pair
3,506,896 UART: [art] Store priv key in slot 0x5
3,520,154 UART: [art] Derive Key Pair - Done
3,534,957 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,550,184 UART: [art] Erasing AUTHORITY.KEYID = 7
3,550,949 UART: [art] PUB.X = 09B8BFFF931C2486F4B4EC6ECCDDC4C2258DBE643B2E25B2C5EF5E59E5E67D98B4DD17E8B7F57015B3CCC1AFE3097B19
3,557,739 UART: [art] PUB.Y = 6EDC2ECAC29C2F89F2E72238EF897040507BC633935531D0C69628C4B18BC18E113AFF756423D567221D97B4A21CFE44
3,564,691 UART: [art] SIG.R = A3B9DC1A24C512FDBD5331F95FC4A3503D4682B87420EDCD776A3478BA82EDF8EB6726D6FA7D0B7F5F1708637BB81DEF
3,571,473 UART: [art] SIG.S = 7DC18CD0455FD745823BD60572D46CBB71E9A3D03848164E21411B18825A9D9BB79683B3891A0CD6D236C1CC01491E8C
3,595,204 UART: Caliptra RT
3,595,547 UART: [state] CFI Enabled
3,714,145 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
4,709,958 >>> mbox cmd response: failed
4,709,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,715,584 UART:
4,715,600 UART: Running Caliptra FMC ...
4,716,008 UART:
4,716,151 UART: [state] CFI Enabled
4,805,566 UART: [art] Extend RT PCRs Done
4,805,994 UART: [art] Lock RT PCRs Done
4,807,447 UART: [art] Populate DV Done
4,815,256 UART: [fht] FMC Alias Private Key: 7
4,816,188 UART: [art] Derive CDI
4,816,468 UART: [art] Store in slot 0x4
4,902,467 UART: [art] Derive Key Pair
4,902,827 UART: [art] Store priv key in slot 0x5
4,916,203 UART: [art] Derive Key Pair - Done
4,931,160 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
4,946,987 UART: [art] Erasing AUTHORITY.KEYID = 7
4,947,752 UART: [art] PUB.X = 09B8BFFF931C2486F4B4EC6ECCDDC4C2258DBE643B2E25B2C5EF5E59E5E67D98B4DD17E8B7F57015B3CCC1AFE3097B19
4,954,542 UART: [art] PUB.Y = 6EDC2ECAC29C2F89F2E72238EF897040507BC633935531D0C69628C4B18BC18E113AFF756423D567221D97B4A21CFE44
4,961,494 UART: [art] SIG.R = A3B9DC1A24C512FDBD5331F95FC4A3503D4682B87420EDCD776A3478BA82EDF8EB6726D6FA7D0B7F5F1708637BB81DEF
4,968,276 UART: [art] SIG.S = 7DC18CD0455FD745823BD60572D46CBB71E9A3D03848164E21411B18825A9D9BB79683B3891A0CD6D236C1CC01491E8C
4,991,365 UART: Caliptra RT
4,991,708 UART: [state] CFI Enabled
5,359,931 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,387,758 >>> mbox cmd response: success
test fw_load::fw_load_error_update_reset_vendor_lms_pub_key_idx_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
192,239 UART:
192,605 UART: Running Caliptra ROM ...
193,806 UART:
193,985 UART: [state] CFI Enabled
260,204 UART: [state] LifecycleState = Unprovisioned
262,193 UART: [state] DebugLocked = No
264,713 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,159 UART: [kat] SHA2-256
438,860 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,360 UART: [kat] ++
449,840 UART: [kat] sha1
461,582 UART: [kat] SHA2-256
464,319 UART: [kat] SHA2-384
469,521 UART: [kat] SHA2-512-ACC
471,879 UART: [kat] ECC-384
2,761,883 UART: [kat] HMAC-384Kdf
2,773,926 UART: [kat] LMS
3,964,218 UART: [kat] --
3,969,306 UART: [cold-reset] ++
3,970,563 UART: [fht] Storing FHT @ 0x50003400
3,982,162 UART: [idev] ++
3,982,731 UART: [idev] CDI.KEYID = 6
3,983,696 UART: [idev] SUBJECT.KEYID = 7
3,984,917 UART: [idev] UDS.KEYID = 0
3,988,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,137,139 UART: [idev] Erasing UDS.KEYID = 0
7,318,787 UART: [idev] Using Sha1 for KeyId Algorithm
7,339,859 UART: [idev] --
7,343,644 UART: [ldev] ++
7,344,218 UART: [ldev] CDI.KEYID = 6
7,345,182 UART: [ldev] SUBJECT.KEYID = 5
7,346,501 UART: [ldev] AUTHORITY.KEYID = 7
7,347,694 UART: [ldev] FE.KEYID = 1
7,377,362 UART: [ldev] Erasing FE.KEYID = 1
10,707,981 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,004,373 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,018,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,033,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,048,336 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,067,386 UART: [ldev] --
13,072,773 UART: [fwproc] Waiting for Commands...
13,074,610 UART: [fwproc] Received command 0x46574c44
13,076,805 UART: [fwproc] Received Image of size 118548 bytes
14,466,246 UART: ROM Fatal Error: 0x000B000D
14,469,688 >>> mbox cmd response: failed
14,470,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,470,433 >>> mbox cmd response: failed
14,470,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,470,999 >>> mbox cmd response: failed
Initializing fuses
2,057,649 writing to cptra_bootfsm_go
2,246,991 UART:
2,247,336 UART: Running Caliptra ROM ...
2,248,479 UART:
2,248,644 UART: [state] CFI Enabled
2,304,672 UART: [state] LifecycleState = Unprovisioned
2,306,568 UART: [state] DebugLocked = No
2,308,408 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,313,838 UART: [kat] SHA2-256
2,483,545 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,059 UART: [kat] ++
2,494,527 UART: [kat] sha1
2,505,954 UART: [kat] SHA2-256
2,508,652 UART: [kat] SHA2-384
2,514,600 UART: [kat] SHA2-512-ACC
2,516,982 UART: [kat] ECC-384
4,811,639 UART: [kat] HMAC-384Kdf
4,843,624 UART: [kat] LMS
6,033,928 UART: [kat] --
6,037,122 UART: [cold-reset] ++
6,038,464 UART: [fht] Storing FHT @ 0x50003400
6,051,094 UART: [idev] ++
6,051,659 UART: [idev] CDI.KEYID = 6
6,052,552 UART: [idev] SUBJECT.KEYID = 7
6,053,824 UART: [idev] UDS.KEYID = 0
6,056,492 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,685 UART: [idev] Erasing UDS.KEYID = 0
9,389,055 UART: [idev] Using Sha1 for KeyId Algorithm
9,410,503 UART: [idev] --
9,415,526 UART: [ldev] ++
9,416,103 UART: [ldev] CDI.KEYID = 6
9,417,042 UART: [ldev] SUBJECT.KEYID = 5
9,418,281 UART: [ldev] AUTHORITY.KEYID = 7
9,419,527 UART: [ldev] FE.KEYID = 1
9,466,148 UART: [ldev] Erasing FE.KEYID = 1
12,797,806 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,091,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,106,388 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,121,193 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,135,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,154,122 UART: [ldev] --
15,158,581 UART: [fwproc] Waiting for Commands...
15,160,792 UART: [fwproc] Received command 0x46574c44
15,162,982 UART: [fwproc] Received Image of size 118548 bytes
19,271,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,345,190 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,418,351 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,747,377 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,111 writing to cptra_bootfsm_go
3,807,667 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,559 >>> mbox cmd response: failed
14,279,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,279,531 >>> mbox cmd response: failed
14,279,806 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,280,108 >>> mbox cmd response: failed
Initializing fuses
2,057,742 writing to cptra_bootfsm_go
5,844,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,025,439 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.03s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,319 writing to cptra_bootfsm_go
192,637 UART:
192,984 UART: Running Caliptra ROM ...
194,175 UART:
603,812 UART: [state] CFI Enabled
615,815 UART: [state] LifecycleState = Unprovisioned
617,764 UART: [state] DebugLocked = No
619,305 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,127 UART: [kat] SHA2-256
793,884 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,399 UART: [kat] ++
804,857 UART: [kat] sha1
816,966 UART: [kat] SHA2-256
819,666 UART: [kat] SHA2-384
827,103 UART: [kat] SHA2-512-ACC
829,500 UART: [kat] ECC-384
3,114,016 UART: [kat] HMAC-384Kdf
3,127,281 UART: [kat] LMS
4,317,419 UART: [kat] --
4,322,933 UART: [cold-reset] ++
4,324,169 UART: [fht] Storing FHT @ 0x50003400
4,336,090 UART: [idev] ++
4,336,669 UART: [idev] CDI.KEYID = 6
4,337,641 UART: [idev] SUBJECT.KEYID = 7
4,338,859 UART: [idev] UDS.KEYID = 0
4,341,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,620 UART: [idev] Erasing UDS.KEYID = 0
7,623,057 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,420 UART: [idev] --
7,648,264 UART: [ldev] ++
7,648,863 UART: [ldev] CDI.KEYID = 6
7,649,758 UART: [ldev] SUBJECT.KEYID = 5
7,651,065 UART: [ldev] AUTHORITY.KEYID = 7
7,652,263 UART: [ldev] FE.KEYID = 1
7,665,566 UART: [ldev] Erasing FE.KEYID = 1
10,953,691 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,751 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,289 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,690 UART: [ldev] --
13,316,239 UART: [fwproc] Waiting for Commands...
13,319,275 UART: [fwproc] Received command 0x46574c44
13,321,511 UART: [fwproc] Received Image of size 118548 bytes
14,718,616 UART: ROM Fatal Error: 0x000B000D
14,722,111 >>> mbox cmd response: failed
14,722,531 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,722,868 >>> mbox cmd response: failed
14,723,160 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,723,466 >>> mbox cmd response: failed
Initializing fuses
2,071,114 writing to cptra_bootfsm_go
2,260,423 UART:
2,260,769 UART: Running Caliptra ROM ...
2,261,911 UART:
5,731,187 UART: [state] CFI Enabled
5,743,933 UART: [state] LifecycleState = Unprovisioned
5,745,853 UART: [state] DebugLocked = No
5,748,757 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,753,607 UART: [kat] SHA2-256
5,923,357 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,933,887 UART: [kat] ++
5,934,405 UART: [kat] sha1
5,945,636 UART: [kat] SHA2-256
5,948,338 UART: [kat] SHA2-384
5,954,066 UART: [kat] SHA2-512-ACC
5,956,429 UART: [kat] ECC-384
8,239,145 UART: [kat] HMAC-384Kdf
8,250,574 UART: [kat] LMS
9,440,663 UART: [kat] --
9,444,897 UART: [cold-reset] ++
9,446,785 UART: [fht] Storing FHT @ 0x50003400
9,458,648 UART: [idev] ++
9,459,217 UART: [idev] CDI.KEYID = 6
9,460,155 UART: [idev] SUBJECT.KEYID = 7
9,461,428 UART: [idev] UDS.KEYID = 0
9,463,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,612,582 UART: [idev] Erasing UDS.KEYID = 0
12,750,628 UART: [idev] Using Sha1 for KeyId Algorithm
12,773,795 UART: [idev] --
12,776,697 UART: [ldev] ++
12,777,280 UART: [ldev] CDI.KEYID = 6
12,778,227 UART: [ldev] SUBJECT.KEYID = 5
12,779,431 UART: [ldev] AUTHORITY.KEYID = 7
12,780,738 UART: [ldev] FE.KEYID = 1
12,791,475 UART: [ldev] Erasing FE.KEYID = 1
16,076,699 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,367,644 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,382,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,397,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,411,593 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,429,669 UART: [ldev] --
18,435,101 UART: [fwproc] Waiting for Commands...
18,437,506 UART: [fwproc] Received command 0x46574c44
18,439,731 UART: [fwproc] Received Image of size 118548 bytes
22,533,613 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,601,949 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,675,148 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,004,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
4,127,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,451,211 >>> mbox cmd response: failed
14,451,798 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,152 >>> mbox cmd response: failed
14,452,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,452,720 >>> mbox cmd response: failed
Initializing fuses
2,057,781 writing to cptra_bootfsm_go
9,531,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,556,758 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
192,339 UART:
192,698 UART: Running Caliptra ROM ...
193,891 UART:
194,084 UART: [state] CFI Enabled
260,434 UART: [state] LifecycleState = Unprovisioned
262,360 UART: [state] DebugLocked = No
264,366 UART: [state] WD Timer not started. Device not locked for debugging
268,449 UART: [kat] SHA2-256
448,117 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,922 UART: [kat] ++
459,469 UART: [kat] sha1
471,278 UART: [kat] SHA2-256
473,962 UART: [kat] SHA2-384
479,564 UART: [kat] SHA2-512-ACC
481,962 UART: [kat] ECC-384
2,942,656 UART: [kat] HMAC-384Kdf
2,964,820 UART: [kat] LMS
3,441,298 UART: [kat] --
3,445,952 UART: [cold-reset] ++
3,446,992 UART: [fht] FHT @ 0x50003400
3,458,621 UART: [idev] ++
3,459,189 UART: [idev] CDI.KEYID = 6
3,460,155 UART: [idev] SUBJECT.KEYID = 7
3,461,370 UART: [idev] UDS.KEYID = 0
3,463,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,613,102 UART: [idev] Erasing UDS.KEYID = 0
5,981,103 UART: [idev] Sha1 KeyId Algorithm
6,004,948 UART: [idev] --
6,009,165 UART: [ldev] ++
6,009,745 UART: [ldev] CDI.KEYID = 6
6,010,667 UART: [ldev] SUBJECT.KEYID = 5
6,011,834 UART: [ldev] AUTHORITY.KEYID = 7
6,013,130 UART: [ldev] FE.KEYID = 1
6,050,731 UART: [ldev] Erasing FE.KEYID = 1
8,552,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,278 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,977 UART: [ldev] --
10,371,251 UART: [fwproc] Wait for Commands...
10,374,378 UART: [fwproc] Recv command 0x46574c44
10,376,423 UART: [fwproc] Recv'd Img size: 118548 bytes
11,458,021 UART: ROM Fatal Error: 0x000B000D
11,461,293 >>> mbox cmd response: failed
11,461,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,461,920 >>> mbox cmd response: failed
11,462,191 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,462,485 >>> mbox cmd response: failed
Initializing fuses
2,060,731 writing to cptra_bootfsm_go
2,250,034 UART:
2,250,383 UART: Running Caliptra ROM ...
2,251,435 UART:
2,251,591 UART: [state] CFI Enabled
2,320,318 UART: [state] LifecycleState = Unprovisioned
2,322,259 UART: [state] DebugLocked = No
2,325,248 UART: [state] WD Timer not started. Device not locked for debugging
2,329,703 UART: [kat] SHA2-256
2,509,386 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,520,126 UART: [kat] ++
2,520,675 UART: [kat] sha1
2,530,765 UART: [kat] SHA2-256
2,533,413 UART: [kat] SHA2-384
2,540,269 UART: [kat] SHA2-512-ACC
2,542,642 UART: [kat] ECC-384
5,004,351 UART: [kat] HMAC-384Kdf
5,027,137 UART: [kat] LMS
5,503,635 UART: [kat] --
5,509,099 UART: [cold-reset] ++
5,510,772 UART: [fht] FHT @ 0x50003400
5,521,115 UART: [idev] ++
5,521,685 UART: [idev] CDI.KEYID = 6
5,522,632 UART: [idev] SUBJECT.KEYID = 7
5,523,911 UART: [idev] UDS.KEYID = 0
5,526,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,183 UART: [idev] Erasing UDS.KEYID = 0
8,039,628 UART: [idev] Sha1 KeyId Algorithm
8,064,815 UART: [idev] --
8,069,792 UART: [ldev] ++
8,070,367 UART: [ldev] CDI.KEYID = 6
8,071,337 UART: [ldev] SUBJECT.KEYID = 5
8,072,507 UART: [ldev] AUTHORITY.KEYID = 7
8,073,804 UART: [ldev] FE.KEYID = 1
8,112,406 UART: [ldev] Erasing FE.KEYID = 1
10,618,528 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,400,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,421,686 UART: [ldev] --
12,427,493 UART: [fwproc] Wait for Commands...
12,429,924 UART: [fwproc] Recv command 0x46574c44
12,431,917 UART: [fwproc] Recv'd Img size: 118548 bytes
15,928,120 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,009,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,082,249 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,410,934 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,155 writing to cptra_bootfsm_go
3,461,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,357,554 >>> mbox cmd response: failed
11,358,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,358,509 >>> mbox cmd response: failed
11,358,784 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,359,077 >>> mbox cmd response: failed
Initializing fuses
2,067,288 writing to cptra_bootfsm_go
5,519,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,292,650 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,513 writing to cptra_bootfsm_go
192,632 UART:
193,020 UART: Running Caliptra ROM ...
194,257 UART:
603,791 UART: [state] CFI Enabled
615,963 UART: [state] LifecycleState = Unprovisioned
617,925 UART: [state] DebugLocked = No
620,123 UART: [state] WD Timer not started. Device not locked for debugging
623,618 UART: [kat] SHA2-256
803,293 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,065 UART: [kat] ++
814,718 UART: [kat] sha1
825,875 UART: [kat] SHA2-256
828,726 UART: [kat] SHA2-384
834,582 UART: [kat] SHA2-512-ACC
836,991 UART: [kat] ECC-384
3,280,263 UART: [kat] HMAC-384Kdf
3,291,257 UART: [kat] LMS
3,767,753 UART: [kat] --
3,771,701 UART: [cold-reset] ++
3,773,434 UART: [fht] FHT @ 0x50003400
3,784,170 UART: [idev] ++
3,784,750 UART: [idev] CDI.KEYID = 6
3,785,680 UART: [idev] SUBJECT.KEYID = 7
3,786,900 UART: [idev] UDS.KEYID = 0
3,789,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,938,801 UART: [idev] Erasing UDS.KEYID = 0
6,261,501 UART: [idev] Sha1 KeyId Algorithm
6,284,681 UART: [idev] --
6,289,519 UART: [ldev] ++
6,290,097 UART: [ldev] CDI.KEYID = 6
6,291,019 UART: [ldev] SUBJECT.KEYID = 5
6,292,241 UART: [ldev] AUTHORITY.KEYID = 7
6,293,487 UART: [ldev] FE.KEYID = 1
6,302,410 UART: [ldev] Erasing FE.KEYID = 1
8,779,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,500,001 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,515,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,531,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,547,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,747 UART: [ldev] --
10,575,985 UART: [fwproc] Wait for Commands...
10,577,544 UART: [fwproc] Recv command 0x46574c44
10,579,595 UART: [fwproc] Recv'd Img size: 118548 bytes
11,669,932 UART: ROM Fatal Error: 0x000B000D
11,673,197 >>> mbox cmd response: failed
11,673,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,673,890 >>> mbox cmd response: failed
11,674,161 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,674,495 >>> mbox cmd response: failed
Initializing fuses
2,059,715 writing to cptra_bootfsm_go
2,249,007 UART:
2,249,352 UART: Running Caliptra ROM ...
2,250,400 UART:
8,774,216 UART: [state] CFI Enabled
8,787,631 UART: [state] LifecycleState = Unprovisioned
8,789,555 UART: [state] DebugLocked = No
8,791,761 UART: [state] WD Timer not started. Device not locked for debugging
8,796,486 UART: [kat] SHA2-256
8,976,166 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,986,912 UART: [kat] ++
8,987,405 UART: [kat] sha1
8,998,079 UART: [kat] SHA2-256
9,000,780 UART: [kat] SHA2-384
9,005,871 UART: [kat] SHA2-512-ACC
9,008,235 UART: [kat] ECC-384
11,448,719 UART: [kat] HMAC-384Kdf
11,460,734 UART: [kat] LMS
11,937,281 UART: [kat] --
11,942,409 UART: [cold-reset] ++
11,943,913 UART: [fht] FHT @ 0x50003400
11,954,349 UART: [idev] ++
11,954,955 UART: [idev] CDI.KEYID = 6
11,955,870 UART: [idev] SUBJECT.KEYID = 7
11,957,089 UART: [idev] UDS.KEYID = 0
11,959,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,108,318 UART: [idev] Erasing UDS.KEYID = 0
14,431,959 UART: [idev] Sha1 KeyId Algorithm
14,454,873 UART: [idev] --
14,460,252 UART: [ldev] ++
14,460,832 UART: [ldev] CDI.KEYID = 6
14,461,743 UART: [ldev] SUBJECT.KEYID = 5
14,462,982 UART: [ldev] AUTHORITY.KEYID = 7
14,464,220 UART: [ldev] FE.KEYID = 1
14,475,787 UART: [ldev] Erasing FE.KEYID = 1
16,952,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,672,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,688,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,704,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,719,862 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,741,335 UART: [ldev] --
18,747,198 UART: [fwproc] Wait for Commands...
18,750,331 UART: [fwproc] Recv command 0x46574c44
18,752,326 UART: [fwproc] Recv'd Img size: 118548 bytes
22,238,369 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,323,070 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,396,088 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,724,015 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,322 writing to cptra_bootfsm_go
3,784,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,559,683 >>> mbox cmd response: failed
11,560,322 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,560,692 >>> mbox cmd response: failed
11,560,966 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,561,261 >>> mbox cmd response: failed
Initializing fuses
2,067,956 writing to cptra_bootfsm_go
12,075,517 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,739,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,124 UART:
192,497 UART: Running Caliptra ROM ...
193,682 UART:
193,837 UART: [state] CFI Enabled
261,685 UART: [state] LifecycleState = Unprovisioned
264,054 UART: [state] DebugLocked = No
265,987 UART: [state] WD Timer not started. Device not locked for debugging
270,568 UART: [kat] SHA2-256
460,449 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,233 UART: [kat] ++
471,692 UART: [kat] sha1
482,305 UART: [kat] SHA2-256
485,315 UART: [kat] SHA2-384
491,843 UART: [kat] SHA2-512-ACC
494,461 UART: [kat] ECC-384
2,941,969 UART: [kat] HMAC-384Kdf
2,966,930 UART: [kat] LMS
3,498,711 UART: [kat] --
3,503,147 UART: [cold-reset] ++
3,504,654 UART: [fht] FHT @ 0x50003400
3,516,130 UART: [idev] ++
3,516,816 UART: [idev] CDI.KEYID = 6
3,517,841 UART: [idev] SUBJECT.KEYID = 7
3,519,009 UART: [idev] UDS.KEYID = 0
3,522,051 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,396 UART: [idev] Erasing UDS.KEYID = 0
6,024,450 UART: [idev] Sha1 KeyId Algorithm
6,046,620 UART: [idev] --
6,052,544 UART: [ldev] ++
6,053,241 UART: [ldev] CDI.KEYID = 6
6,054,137 UART: [ldev] SUBJECT.KEYID = 5
6,055,305 UART: [ldev] AUTHORITY.KEYID = 7
6,056,547 UART: [ldev] FE.KEYID = 1
6,094,943 UART: [ldev] Erasing FE.KEYID = 1
8,600,202 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,021 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,366,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,381,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,946 UART: [ldev] --
10,406,625 UART: [fwproc] Wait for Commands...
10,408,429 UART: [fwproc] Recv command 0x46574c44
10,410,751 UART: [fwproc] Recv'd Img size: 118548 bytes
11,505,790 UART: ROM Fatal Error: 0x000B000D
11,509,433 >>> mbox cmd response: failed
11,509,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,510,184 >>> mbox cmd response: failed
11,510,454 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,510,752 >>> mbox cmd response: failed
Initializing fuses
2,067,555 writing to cptra_bootfsm_go
2,256,865 UART:
2,257,230 UART: Running Caliptra ROM ...
2,258,369 UART:
2,258,537 UART: [state] CFI Enabled
2,331,220 UART: [state] LifecycleState = Unprovisioned
2,333,589 UART: [state] DebugLocked = No
2,334,821 UART: [state] WD Timer not started. Device not locked for debugging
2,339,378 UART: [kat] SHA2-256
2,529,267 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,540,051 UART: [kat] ++
2,540,603 UART: [kat] sha1
2,553,228 UART: [kat] SHA2-256
2,556,252 UART: [kat] SHA2-384
2,563,430 UART: [kat] SHA2-512-ACC
2,566,060 UART: [kat] ECC-384
5,020,425 UART: [kat] HMAC-384Kdf
5,040,286 UART: [kat] LMS
5,572,053 UART: [kat] --
5,575,675 UART: [cold-reset] ++
5,576,748 UART: [fht] FHT @ 0x50003400
5,588,378 UART: [idev] ++
5,589,116 UART: [idev] CDI.KEYID = 6
5,590,007 UART: [idev] SUBJECT.KEYID = 7
5,591,235 UART: [idev] UDS.KEYID = 0
5,593,576 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,742,770 UART: [idev] Erasing UDS.KEYID = 0
8,100,492 UART: [idev] Sha1 KeyId Algorithm
8,123,505 UART: [idev] --
8,128,973 UART: [ldev] ++
8,129,698 UART: [ldev] CDI.KEYID = 6
8,130,620 UART: [ldev] SUBJECT.KEYID = 5
8,131,756 UART: [ldev] AUTHORITY.KEYID = 7
8,132,999 UART: [ldev] FE.KEYID = 1
8,170,041 UART: [ldev] Erasing FE.KEYID = 1
10,678,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,413,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,429,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,444,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,459,327 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,480,298 UART: [ldev] --
12,485,462 UART: [fwproc] Wait for Commands...
12,488,379 UART: [fwproc] Recv command 0x46574c44
12,490,645 UART: [fwproc] Recv'd Img size: 118548 bytes
15,993,976 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,070,657 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,194,228 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,753,994 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,061 writing to cptra_bootfsm_go
3,440,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,304,109 >>> mbox cmd response: failed
11,304,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,305,000 >>> mbox cmd response: failed
11,305,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,305,599 >>> mbox cmd response: failed
Initializing fuses
2,060,940 writing to cptra_bootfsm_go
5,499,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,884,747 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
192,487 UART:
192,851 UART: Running Caliptra ROM ...
194,081 UART:
603,719 UART: [state] CFI Enabled
616,551 UART: [state] LifecycleState = Unprovisioned
618,966 UART: [state] DebugLocked = No
620,357 UART: [state] WD Timer not started. Device not locked for debugging
624,376 UART: [kat] SHA2-256
814,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,989 UART: [kat] ++
825,497 UART: [kat] sha1
837,518 UART: [kat] SHA2-256
840,596 UART: [kat] SHA2-384
845,546 UART: [kat] SHA2-512-ACC
848,119 UART: [kat] ECC-384
3,290,141 UART: [kat] HMAC-384Kdf
3,302,967 UART: [kat] LMS
3,834,801 UART: [kat] --
3,839,342 UART: [cold-reset] ++
3,841,887 UART: [fht] FHT @ 0x50003400
3,852,718 UART: [idev] ++
3,853,401 UART: [idev] CDI.KEYID = 6
3,854,375 UART: [idev] SUBJECT.KEYID = 7
3,855,598 UART: [idev] UDS.KEYID = 0
3,858,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,544 UART: [idev] Erasing UDS.KEYID = 0
6,333,749 UART: [idev] Sha1 KeyId Algorithm
6,355,533 UART: [idev] --
6,361,100 UART: [ldev] ++
6,361,826 UART: [ldev] CDI.KEYID = 6
6,362,754 UART: [ldev] SUBJECT.KEYID = 5
6,363,804 UART: [ldev] AUTHORITY.KEYID = 7
6,365,098 UART: [ldev] FE.KEYID = 1
6,375,533 UART: [ldev] Erasing FE.KEYID = 1
8,851,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,210 UART: [ldev] --
10,641,211 UART: [fwproc] Wait for Commands...
10,643,748 UART: [fwproc] Recv command 0x46574c44
10,646,073 UART: [fwproc] Recv'd Img size: 118548 bytes
11,742,264 UART: ROM Fatal Error: 0x000B000D
11,745,931 >>> mbox cmd response: failed
11,746,369 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,746,722 >>> mbox cmd response: failed
11,747,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,747,302 >>> mbox cmd response: failed
Initializing fuses
2,061,163 writing to cptra_bootfsm_go
2,250,459 UART:
2,250,797 UART: Running Caliptra ROM ...
2,251,935 UART:
8,704,877 UART: [state] CFI Enabled
8,718,453 UART: [state] LifecycleState = Unprovisioned
8,720,870 UART: [state] DebugLocked = No
8,723,194 UART: [state] WD Timer not started. Device not locked for debugging
8,728,583 UART: [kat] SHA2-256
8,918,420 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,929,219 UART: [kat] ++
8,929,828 UART: [kat] sha1
8,941,320 UART: [kat] SHA2-256
8,944,331 UART: [kat] SHA2-384
8,950,171 UART: [kat] SHA2-512-ACC
8,952,752 UART: [kat] ECC-384
11,395,231 UART: [kat] HMAC-384Kdf
11,406,868 UART: [kat] LMS
11,938,701 UART: [kat] --
11,943,476 UART: [cold-reset] ++
11,945,060 UART: [fht] FHT @ 0x50003400
11,956,227 UART: [idev] ++
11,956,911 UART: [idev] CDI.KEYID = 6
11,957,851 UART: [idev] SUBJECT.KEYID = 7
11,959,066 UART: [idev] UDS.KEYID = 0
11,961,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,110,492 UART: [idev] Erasing UDS.KEYID = 0
14,436,087 UART: [idev] Sha1 KeyId Algorithm
14,459,106 UART: [idev] --
14,463,618 UART: [ldev] ++
14,464,309 UART: [ldev] CDI.KEYID = 6
14,465,222 UART: [ldev] SUBJECT.KEYID = 5
14,466,384 UART: [ldev] AUTHORITY.KEYID = 7
14,467,619 UART: [ldev] FE.KEYID = 1
14,480,268 UART: [ldev] Erasing FE.KEYID = 1
16,961,744 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,681,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,696,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,712,174 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,727,280 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,747,089 UART: [ldev] --
18,752,747 UART: [fwproc] Wait for Commands...
18,755,552 UART: [fwproc] Recv command 0x46574c44
18,757,822 UART: [fwproc] Recv'd Img size: 118548 bytes
22,259,775 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,335,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,458,704 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,019,672 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,202 writing to cptra_bootfsm_go
3,761,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,541,121 >>> mbox cmd response: failed
11,541,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,035 >>> mbox cmd response: failed
11,542,316 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,542,616 >>> mbox cmd response: failed
Initializing fuses
2,060,963 writing to cptra_bootfsm_go
12,069,427 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,357,726 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,212 UART: [state] LifecycleState = Unprovisioned
85,867 UART: [state] DebugLocked = No
86,405 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,887 UART: [kat] SHA2-256
881,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,933 UART: [kat] ++
886,085 UART: [kat] sha1
890,243 UART: [kat] SHA2-256
892,181 UART: [kat] SHA2-384
894,886 UART: [kat] SHA2-512-ACC
896,787 UART: [kat] ECC-384
902,202 UART: [kat] HMAC-384Kdf
906,858 UART: [kat] LMS
1,475,054 UART: [kat] --
1,475,773 UART: [cold-reset] ++
1,476,295 UART: [fht] Storing FHT @ 0x50003400
1,479,146 UART: [idev] ++
1,479,314 UART: [idev] CDI.KEYID = 6
1,479,674 UART: [idev] SUBJECT.KEYID = 7
1,480,098 UART: [idev] UDS.KEYID = 0
1,480,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,704 UART: [idev] Erasing UDS.KEYID = 0
1,503,918 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,562 UART: [idev] --
1,513,593 UART: [ldev] ++
1,513,761 UART: [ldev] CDI.KEYID = 6
1,514,124 UART: [ldev] SUBJECT.KEYID = 5
1,514,550 UART: [ldev] AUTHORITY.KEYID = 7
1,515,013 UART: [ldev] FE.KEYID = 1
1,519,993 UART: [ldev] Erasing FE.KEYID = 1
1,545,550 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,812 UART: [ldev] --
1,585,195 UART: [fwproc] Waiting for Commands...
1,585,890 UART: [fwproc] Received command 0x46574c44
1,586,681 UART: [fwproc] Received Image of size 118548 bytes
1,624,040 UART: ROM Fatal Error: 0x000B000D
1,625,199 >>> mbox cmd response: failed
1,625,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,205 >>> mbox cmd response: failed
1,625,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,612 UART: [state] LifecycleState = Unprovisioned
86,267 UART: [state] DebugLocked = No
86,997 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,599 UART: [kat] SHA2-256
882,530 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,645 UART: [kat] ++
886,797 UART: [kat] sha1
890,969 UART: [kat] SHA2-256
892,907 UART: [kat] SHA2-384
895,682 UART: [kat] SHA2-512-ACC
897,583 UART: [kat] ECC-384
902,940 UART: [kat] HMAC-384Kdf
907,662 UART: [kat] LMS
1,475,858 UART: [kat] --
1,476,571 UART: [cold-reset] ++
1,477,131 UART: [fht] Storing FHT @ 0x50003400
1,479,796 UART: [idev] ++
1,479,964 UART: [idev] CDI.KEYID = 6
1,480,324 UART: [idev] SUBJECT.KEYID = 7
1,480,748 UART: [idev] UDS.KEYID = 0
1,481,093 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,116 UART: [idev] Erasing UDS.KEYID = 0
1,505,536 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,326 UART: [idev] --
1,515,287 UART: [ldev] ++
1,515,455 UART: [ldev] CDI.KEYID = 6
1,515,818 UART: [ldev] SUBJECT.KEYID = 5
1,516,244 UART: [ldev] AUTHORITY.KEYID = 7
1,516,707 UART: [ldev] FE.KEYID = 1
1,521,679 UART: [ldev] Erasing FE.KEYID = 1
1,547,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,391 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,107 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,776 UART: [ldev] --
1,586,225 UART: [fwproc] Waiting for Commands...
1,586,932 UART: [fwproc] Received command 0x46574c44
1,587,723 UART: [fwproc] Received Image of size 118548 bytes
2,931,288 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,784 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,002 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,451 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,137 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,208 >>> mbox cmd response: failed
1,480,208 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,214 >>> mbox cmd response: failed
1,480,214 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,599 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,341 UART: [state] LifecycleState = Unprovisioned
85,996 UART: [state] DebugLocked = No
86,488 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,112 UART: [kat] SHA2-256
882,043 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,158 UART: [kat] ++
886,310 UART: [kat] sha1
890,526 UART: [kat] SHA2-256
892,464 UART: [kat] SHA2-384
895,253 UART: [kat] SHA2-512-ACC
897,154 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,293 UART: [kat] LMS
1,475,489 UART: [kat] --
1,476,474 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,763 UART: [idev] ++
1,479,931 UART: [idev] CDI.KEYID = 6
1,480,291 UART: [idev] SUBJECT.KEYID = 7
1,480,715 UART: [idev] UDS.KEYID = 0
1,481,060 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,915 UART: [idev] Erasing UDS.KEYID = 0
1,504,921 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,639 UART: [idev] --
1,514,668 UART: [ldev] ++
1,514,836 UART: [ldev] CDI.KEYID = 6
1,515,199 UART: [ldev] SUBJECT.KEYID = 5
1,515,625 UART: [ldev] AUTHORITY.KEYID = 7
1,516,088 UART: [ldev] FE.KEYID = 1
1,521,280 UART: [ldev] Erasing FE.KEYID = 1
1,547,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,253 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,207 UART: [ldev] --
1,586,620 UART: [fwproc] Waiting for Commands...
1,587,461 UART: [fwproc] Received command 0x46574c44
1,588,252 UART: [fwproc] Received Image of size 118548 bytes
1,626,947 UART: ROM Fatal Error: 0x000B000D
1,628,106 >>> mbox cmd response: failed
1,628,106 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,112 >>> mbox cmd response: failed
1,628,112 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,628,118 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,581 UART: [state] LifecycleState = Unprovisioned
86,236 UART: [state] DebugLocked = No
86,936 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,830 UART: [kat] SHA2-256
892,768 UART: [kat] SHA2-384
895,535 UART: [kat] SHA2-512-ACC
897,436 UART: [kat] ECC-384
902,997 UART: [kat] HMAC-384Kdf
907,623 UART: [kat] LMS
1,475,819 UART: [kat] --
1,476,598 UART: [cold-reset] ++
1,476,984 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,939 UART: [idev] Erasing UDS.KEYID = 0
1,505,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,815 UART: [idev] --
1,514,736 UART: [ldev] ++
1,514,904 UART: [ldev] CDI.KEYID = 6
1,515,267 UART: [ldev] SUBJECT.KEYID = 5
1,515,693 UART: [ldev] AUTHORITY.KEYID = 7
1,516,156 UART: [ldev] FE.KEYID = 1
1,521,486 UART: [ldev] Erasing FE.KEYID = 1
1,547,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,083 UART: [ldev] --
1,586,532 UART: [fwproc] Waiting for Commands...
1,587,311 UART: [fwproc] Received command 0x46574c44
1,588,102 UART: [fwproc] Received Image of size 118548 bytes
2,932,513 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,899 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,117 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,490 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,479,515 >>> mbox cmd response: failed
1,479,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,521 >>> mbox cmd response: failed
1,479,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,479,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,224 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,220 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,548 UART: [state] LifecycleState = Unprovisioned
85,203 UART: [state] DebugLocked = No
85,895 UART: [state] WD Timer not started. Device not locked for debugging
87,040 UART: [kat] SHA2-256
890,590 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,694 UART: [kat] ++
894,846 UART: [kat] sha1
898,946 UART: [kat] SHA2-256
900,886 UART: [kat] SHA2-384
903,741 UART: [kat] SHA2-512-ACC
905,642 UART: [kat] ECC-384
915,515 UART: [kat] HMAC-384Kdf
920,207 UART: [kat] LMS
1,168,519 UART: [kat] --
1,169,266 UART: [cold-reset] ++
1,169,764 UART: [fht] FHT @ 0x50003400
1,172,566 UART: [idev] ++
1,172,734 UART: [idev] CDI.KEYID = 6
1,173,095 UART: [idev] SUBJECT.KEYID = 7
1,173,520 UART: [idev] UDS.KEYID = 0
1,173,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,771 UART: [idev] Erasing UDS.KEYID = 0
1,198,771 UART: [idev] Sha1 KeyId Algorithm
1,207,421 UART: [idev] --
1,208,526 UART: [ldev] ++
1,208,694 UART: [ldev] CDI.KEYID = 6
1,209,058 UART: [ldev] SUBJECT.KEYID = 5
1,209,485 UART: [ldev] AUTHORITY.KEYID = 7
1,209,948 UART: [ldev] FE.KEYID = 1
1,214,978 UART: [ldev] Erasing FE.KEYID = 1
1,241,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,647 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,363 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,966 UART: [ldev] --
1,280,225 UART: [fwproc] Wait for Commands...
1,280,896 UART: [fwproc] Recv command 0x46574c44
1,281,629 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,269 UART: ROM Fatal Error: 0x000B000D
1,320,428 >>> mbox cmd response: failed
1,320,428 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,434 >>> mbox cmd response: failed
1,320,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,440 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,490 UART: [state] LifecycleState = Unprovisioned
86,145 UART: [state] DebugLocked = No
86,847 UART: [state] WD Timer not started. Device not locked for debugging
87,994 UART: [kat] SHA2-256
891,544 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,648 UART: [kat] ++
895,800 UART: [kat] sha1
900,138 UART: [kat] SHA2-256
902,078 UART: [kat] SHA2-384
904,619 UART: [kat] SHA2-512-ACC
906,520 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,889 UART: [kat] LMS
1,169,201 UART: [kat] --
1,170,100 UART: [cold-reset] ++
1,170,642 UART: [fht] FHT @ 0x50003400
1,173,506 UART: [idev] ++
1,173,674 UART: [idev] CDI.KEYID = 6
1,174,035 UART: [idev] SUBJECT.KEYID = 7
1,174,460 UART: [idev] UDS.KEYID = 0
1,174,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,301 UART: [idev] Erasing UDS.KEYID = 0
1,199,193 UART: [idev] Sha1 KeyId Algorithm
1,208,141 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,216,152 UART: [ldev] Erasing FE.KEYID = 1
1,242,685 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,813 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,529 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,256 UART: [ldev] --
1,281,565 UART: [fwproc] Wait for Commands...
1,282,316 UART: [fwproc] Recv command 0x46574c44
1,283,049 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,691 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,148 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,323 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,301 >>> mbox cmd response: failed
1,177,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,307 >>> mbox cmd response: failed
1,177,307 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,313 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,259 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,595 UART: [state] LifecycleState = Unprovisioned
86,250 UART: [state] DebugLocked = No
86,962 UART: [state] WD Timer not started. Device not locked for debugging
88,111 UART: [kat] SHA2-256
891,661 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,765 UART: [kat] ++
895,917 UART: [kat] sha1
900,155 UART: [kat] SHA2-256
902,095 UART: [kat] SHA2-384
904,648 UART: [kat] SHA2-512-ACC
906,549 UART: [kat] ECC-384
916,534 UART: [kat] HMAC-384Kdf
921,166 UART: [kat] LMS
1,169,478 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,823 UART: [fht] FHT @ 0x50003400
1,173,465 UART: [idev] ++
1,173,633 UART: [idev] CDI.KEYID = 6
1,173,994 UART: [idev] SUBJECT.KEYID = 7
1,174,419 UART: [idev] UDS.KEYID = 0
1,174,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,662 UART: [idev] Erasing UDS.KEYID = 0
1,199,000 UART: [idev] Sha1 KeyId Algorithm
1,207,868 UART: [idev] --
1,208,991 UART: [ldev] ++
1,209,159 UART: [ldev] CDI.KEYID = 6
1,209,523 UART: [ldev] SUBJECT.KEYID = 5
1,209,950 UART: [ldev] AUTHORITY.KEYID = 7
1,210,413 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,424 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,760 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,649 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,361 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,429 UART: [ldev] --
1,281,692 UART: [fwproc] Wait for Commands...
1,282,463 UART: [fwproc] Recv command 0x46574c44
1,283,196 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,146 UART: ROM Fatal Error: 0x000B000D
1,322,305 >>> mbox cmd response: failed
1,322,305 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,311 >>> mbox cmd response: failed
1,322,311 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,913 UART: [state] LifecycleState = Unprovisioned
85,568 UART: [state] DebugLocked = No
86,070 UART: [state] WD Timer not started. Device not locked for debugging
87,357 UART: [kat] SHA2-256
890,907 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,011 UART: [kat] ++
895,163 UART: [kat] sha1
899,251 UART: [kat] SHA2-256
901,191 UART: [kat] SHA2-384
904,154 UART: [kat] SHA2-512-ACC
906,055 UART: [kat] ECC-384
915,684 UART: [kat] HMAC-384Kdf
920,326 UART: [kat] LMS
1,168,638 UART: [kat] --
1,169,531 UART: [cold-reset] ++
1,169,893 UART: [fht] FHT @ 0x50003400
1,172,713 UART: [idev] ++
1,172,881 UART: [idev] CDI.KEYID = 6
1,173,242 UART: [idev] SUBJECT.KEYID = 7
1,173,667 UART: [idev] UDS.KEYID = 0
1,174,013 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,508 UART: [idev] Erasing UDS.KEYID = 0
1,198,292 UART: [idev] Sha1 KeyId Algorithm
1,207,136 UART: [idev] --
1,207,979 UART: [ldev] ++
1,208,147 UART: [ldev] CDI.KEYID = 6
1,208,511 UART: [ldev] SUBJECT.KEYID = 5
1,208,938 UART: [ldev] AUTHORITY.KEYID = 7
1,209,401 UART: [ldev] FE.KEYID = 1
1,214,721 UART: [ldev] Erasing FE.KEYID = 1
1,240,724 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,319 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,031 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,231 UART: [ldev] --
1,280,658 UART: [fwproc] Wait for Commands...
1,281,247 UART: [fwproc] Recv command 0x46574c44
1,281,980 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,252 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,339 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,514 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,919 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,179,744 >>> mbox cmd response: failed
1,179,744 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,750 >>> mbox cmd response: failed
1,179,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,179,756 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,078 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,090 UART: [state] LifecycleState = Unprovisioned
85,745 UART: [state] DebugLocked = No
86,401 UART: [state] WD Timer not started. Device not locked for debugging
87,508 UART: [kat] SHA2-256
893,158 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,283 UART: [kat] ++
897,435 UART: [kat] sha1
901,789 UART: [kat] SHA2-256
903,729 UART: [kat] SHA2-384
906,388 UART: [kat] SHA2-512-ACC
908,289 UART: [kat] ECC-384
917,554 UART: [kat] HMAC-384Kdf
922,056 UART: [kat] LMS
1,170,384 UART: [kat] --
1,171,109 UART: [cold-reset] ++
1,171,539 UART: [fht] FHT @ 0x50003400
1,174,032 UART: [idev] ++
1,174,200 UART: [idev] CDI.KEYID = 6
1,174,560 UART: [idev] SUBJECT.KEYID = 7
1,174,984 UART: [idev] UDS.KEYID = 0
1,175,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,038 UART: [idev] Erasing UDS.KEYID = 0
1,200,465 UART: [idev] Sha1 KeyId Algorithm
1,208,691 UART: [idev] --
1,209,669 UART: [ldev] ++
1,209,837 UART: [ldev] CDI.KEYID = 6
1,210,200 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,485 UART: [ldev] Erasing FE.KEYID = 1
1,242,600 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,811 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,527 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,130 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,315 UART: [ldev] --
1,281,724 UART: [fwproc] Wait for Commands...
1,282,410 UART: [fwproc] Recv command 0x46574c44
1,283,138 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,779 UART: ROM Fatal Error: 0x000B000D
1,321,938 >>> mbox cmd response: failed
1,321,938 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,944 >>> mbox cmd response: failed
1,321,944 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,950 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,671 UART: [state] WD Timer not started. Device not locked for debugging
87,784 UART: [kat] SHA2-256
893,434 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,559 UART: [kat] ++
897,711 UART: [kat] sha1
901,889 UART: [kat] SHA2-256
903,829 UART: [kat] SHA2-384
906,780 UART: [kat] SHA2-512-ACC
908,681 UART: [kat] ECC-384
918,278 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,172,129 UART: [cold-reset] ++
1,172,625 UART: [fht] FHT @ 0x50003400
1,175,278 UART: [idev] ++
1,175,446 UART: [idev] CDI.KEYID = 6
1,175,806 UART: [idev] SUBJECT.KEYID = 7
1,176,230 UART: [idev] UDS.KEYID = 0
1,176,575 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,302 UART: [idev] Erasing UDS.KEYID = 0
1,201,553 UART: [idev] Sha1 KeyId Algorithm
1,210,111 UART: [idev] --
1,211,005 UART: [ldev] ++
1,211,173 UART: [ldev] CDI.KEYID = 6
1,211,536 UART: [ldev] SUBJECT.KEYID = 5
1,211,962 UART: [ldev] AUTHORITY.KEYID = 7
1,212,425 UART: [ldev] FE.KEYID = 1
1,217,449 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,593 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,309 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,897 UART: [ldev] --
1,282,360 UART: [fwproc] Wait for Commands...
1,283,134 UART: [fwproc] Recv command 0x46574c44
1,283,862 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,641 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,811 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,062 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,403 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,017 >>> mbox cmd response: failed
1,178,017 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,023 >>> mbox cmd response: failed
1,178,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,973 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,821 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,421 UART: [state] LifecycleState = Unprovisioned
86,076 UART: [state] DebugLocked = No
86,624 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,938 UART: [kat] SHA2-256
903,878 UART: [kat] SHA2-384
906,673 UART: [kat] SHA2-512-ACC
908,574 UART: [kat] ECC-384
918,269 UART: [kat] HMAC-384Kdf
922,811 UART: [kat] LMS
1,171,139 UART: [kat] --
1,172,168 UART: [cold-reset] ++
1,172,598 UART: [fht] FHT @ 0x50003400
1,175,055 UART: [idev] ++
1,175,223 UART: [idev] CDI.KEYID = 6
1,175,583 UART: [idev] SUBJECT.KEYID = 7
1,176,007 UART: [idev] UDS.KEYID = 0
1,176,352 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,399 UART: [idev] Erasing UDS.KEYID = 0
1,201,718 UART: [idev] Sha1 KeyId Algorithm
1,209,950 UART: [idev] --
1,210,830 UART: [ldev] ++
1,210,998 UART: [ldev] CDI.KEYID = 6
1,211,361 UART: [ldev] SUBJECT.KEYID = 5
1,211,787 UART: [ldev] AUTHORITY.KEYID = 7
1,212,250 UART: [ldev] FE.KEYID = 1
1,217,546 UART: [ldev] Erasing FE.KEYID = 1
1,243,741 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,693 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,734 UART: [ldev] --
1,283,131 UART: [fwproc] Wait for Commands...
1,283,703 UART: [fwproc] Recv command 0x46574c44
1,284,431 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,698 UART: ROM Fatal Error: 0x000B000D
1,322,857 >>> mbox cmd response: failed
1,322,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,863 >>> mbox cmd response: failed
1,322,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,011 UART: [state] LifecycleState = Unprovisioned
85,666 UART: [state] DebugLocked = No
86,208 UART: [state] WD Timer not started. Device not locked for debugging
87,431 UART: [kat] SHA2-256
893,081 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,206 UART: [kat] ++
897,358 UART: [kat] sha1
901,618 UART: [kat] SHA2-256
903,558 UART: [kat] SHA2-384
906,437 UART: [kat] SHA2-512-ACC
908,338 UART: [kat] ECC-384
917,775 UART: [kat] HMAC-384Kdf
922,565 UART: [kat] LMS
1,170,893 UART: [kat] --
1,171,962 UART: [cold-reset] ++
1,172,464 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,801 UART: [idev] Erasing UDS.KEYID = 0
1,200,654 UART: [idev] Sha1 KeyId Algorithm
1,209,254 UART: [idev] --
1,210,150 UART: [ldev] ++
1,210,318 UART: [ldev] CDI.KEYID = 6
1,210,681 UART: [ldev] SUBJECT.KEYID = 5
1,211,107 UART: [ldev] AUTHORITY.KEYID = 7
1,211,570 UART: [ldev] FE.KEYID = 1
1,216,918 UART: [ldev] Erasing FE.KEYID = 1
1,243,157 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,656 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,372 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,263 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,975 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,094 UART: [ldev] --
1,282,563 UART: [fwproc] Wait for Commands...
1,283,177 UART: [fwproc] Recv command 0x46574c44
1,283,905 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,859 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,236 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,467 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,934 >>> mbox cmd response: failed
1,178,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,940 >>> mbox cmd response: failed
1,178,940 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,946 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,328 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,120 writing to cptra_bootfsm_go
192,363 UART:
192,718 UART: Running Caliptra ROM ...
193,894 UART:
194,048 UART: [state] CFI Enabled
260,816 UART: [state] LifecycleState = Unprovisioned
262,796 UART: [state] DebugLocked = No
265,376 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,970 UART: [kat] SHA2-256
440,651 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,178 UART: [kat] ++
451,647 UART: [kat] sha1
462,393 UART: [kat] SHA2-256
465,126 UART: [kat] SHA2-384
470,199 UART: [kat] SHA2-512-ACC
472,543 UART: [kat] ECC-384
2,763,657 UART: [kat] HMAC-384Kdf
2,775,136 UART: [kat] LMS
3,965,429 UART: [kat] --
3,966,969 UART: [cold-reset] ++
3,969,078 UART: [fht] Storing FHT @ 0x50003400
3,980,082 UART: [idev] ++
3,980,664 UART: [idev] CDI.KEYID = 6
3,981,640 UART: [idev] SUBJECT.KEYID = 7
3,982,874 UART: [idev] UDS.KEYID = 0
3,986,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,135,163 UART: [idev] Erasing UDS.KEYID = 0
7,322,996 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,807 UART: [idev] --
7,349,864 UART: [ldev] ++
7,350,449 UART: [ldev] CDI.KEYID = 6
7,351,394 UART: [ldev] SUBJECT.KEYID = 5
7,352,616 UART: [ldev] AUTHORITY.KEYID = 7
7,353,856 UART: [ldev] FE.KEYID = 1
7,398,945 UART: [ldev] Erasing FE.KEYID = 1
10,732,396 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,045,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,059,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,074,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,089,231 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,761 UART: [ldev] --
13,112,853 UART: [fwproc] Waiting for Commands...
13,114,962 UART: [fwproc] Received command 0x46574c44
13,117,177 UART: [fwproc] Received Image of size 118548 bytes
13,183,663 UART: ROM Fatal Error: 0x000B0008
13,187,185 >>> mbox cmd response: failed
13,187,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,187,958 >>> mbox cmd response: failed
13,188,227 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,188,521 >>> mbox cmd response: failed
Initializing fuses
2,053,635 writing to cptra_bootfsm_go
2,242,957 UART:
2,243,300 UART: Running Caliptra ROM ...
2,244,350 UART:
2,244,505 UART: [state] CFI Enabled
2,301,687 UART: [state] LifecycleState = Unprovisioned
2,303,587 UART: [state] DebugLocked = No
2,305,268 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,309,730 UART: [kat] SHA2-256
2,479,447 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,489,913 UART: [kat] ++
2,490,373 UART: [kat] sha1
2,502,558 UART: [kat] SHA2-256
2,505,260 UART: [kat] SHA2-384
2,510,446 UART: [kat] SHA2-512-ACC
2,512,800 UART: [kat] ECC-384
4,806,824 UART: [kat] HMAC-384Kdf
4,837,647 UART: [kat] LMS
6,027,909 UART: [kat] --
6,031,044 UART: [cold-reset] ++
6,033,632 UART: [fht] Storing FHT @ 0x50003400
6,044,163 UART: [idev] ++
6,044,741 UART: [idev] CDI.KEYID = 6
6,045,685 UART: [idev] SUBJECT.KEYID = 7
6,046,960 UART: [idev] UDS.KEYID = 0
6,049,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,198,326 UART: [idev] Erasing UDS.KEYID = 0
9,385,572 UART: [idev] Using Sha1 for KeyId Algorithm
9,407,729 UART: [idev] --
9,411,513 UART: [ldev] ++
9,412,145 UART: [ldev] CDI.KEYID = 6
9,413,058 UART: [ldev] SUBJECT.KEYID = 5
9,414,246 UART: [ldev] AUTHORITY.KEYID = 7
9,415,484 UART: [ldev] FE.KEYID = 1
9,459,173 UART: [ldev] Erasing FE.KEYID = 1
12,791,773 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,100,729 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,115,500 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,147,831 UART: [ldev] --
15,153,366 UART: [fwproc] Waiting for Commands...
15,156,758 UART: [fwproc] Received command 0x46574c44
15,158,947 UART: [fwproc] Received Image of size 118548 bytes
19,265,257 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,337,580 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,410,768 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,739,298 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
3,809,771 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,952,142 >>> mbox cmd response: failed
12,952,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,953,059 >>> mbox cmd response: failed
12,953,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,953,631 >>> mbox cmd response: failed
Initializing fuses
2,047,643 writing to cptra_bootfsm_go
5,848,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,992,418 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,610 UART:
192,962 UART: Running Caliptra ROM ...
194,065 UART:
603,927 UART: [state] CFI Enabled
617,484 UART: [state] LifecycleState = Unprovisioned
619,481 UART: [state] DebugLocked = No
621,035 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,273 UART: [kat] SHA2-256
795,002 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,550 UART: [kat] ++
806,034 UART: [kat] sha1
816,056 UART: [kat] SHA2-256
818,768 UART: [kat] SHA2-384
823,999 UART: [kat] SHA2-512-ACC
826,346 UART: [kat] ECC-384
3,110,751 UART: [kat] HMAC-384Kdf
3,121,334 UART: [kat] LMS
4,311,447 UART: [kat] --
4,316,328 UART: [cold-reset] ++
4,318,381 UART: [fht] Storing FHT @ 0x50003400
4,330,894 UART: [idev] ++
4,331,468 UART: [idev] CDI.KEYID = 6
4,332,439 UART: [idev] SUBJECT.KEYID = 7
4,333,657 UART: [idev] UDS.KEYID = 0
4,336,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,487,287 UART: [idev] Erasing UDS.KEYID = 0
7,620,081 UART: [idev] Using Sha1 for KeyId Algorithm
7,641,858 UART: [idev] --
7,646,905 UART: [ldev] ++
7,647,482 UART: [ldev] CDI.KEYID = 6
7,648,464 UART: [ldev] SUBJECT.KEYID = 5
7,649,688 UART: [ldev] AUTHORITY.KEYID = 7
7,651,082 UART: [ldev] FE.KEYID = 1
7,664,271 UART: [ldev] Erasing FE.KEYID = 1
10,951,159 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,960 UART: [ldev] --
13,311,159 UART: [fwproc] Waiting for Commands...
13,312,943 UART: [fwproc] Received command 0x46574c44
13,315,144 UART: [fwproc] Received Image of size 118548 bytes
13,384,633 UART: ROM Fatal Error: 0x000B0008
13,388,168 >>> mbox cmd response: failed
13,388,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,388,975 >>> mbox cmd response: failed
13,389,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,389,546 >>> mbox cmd response: failed
Initializing fuses
2,052,960 writing to cptra_bootfsm_go
2,242,283 UART:
2,242,642 UART: Running Caliptra ROM ...
2,243,692 UART:
7,075,257 UART: [state] CFI Enabled
7,090,943 UART: [state] LifecycleState = Unprovisioned
7,092,870 UART: [state] DebugLocked = No
7,095,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,101,209 UART: [kat] SHA2-256
7,270,974 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,281,526 UART: [kat] ++
7,282,081 UART: [kat] sha1
7,292,124 UART: [kat] SHA2-256
7,294,813 UART: [kat] SHA2-384
7,301,518 UART: [kat] SHA2-512-ACC
7,303,862 UART: [kat] ECC-384
9,588,248 UART: [kat] HMAC-384Kdf
9,599,405 UART: [kat] LMS
10,789,523 UART: [kat] --
10,794,708 UART: [cold-reset] ++
10,795,997 UART: [fht] Storing FHT @ 0x50003400
10,807,604 UART: [idev] ++
10,808,225 UART: [idev] CDI.KEYID = 6
10,809,132 UART: [idev] SUBJECT.KEYID = 7
10,810,408 UART: [idev] UDS.KEYID = 0
10,812,744 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,961,735 UART: [idev] Erasing UDS.KEYID = 0
14,094,899 UART: [idev] Using Sha1 for KeyId Algorithm
14,117,696 UART: [idev] --
14,121,252 UART: [ldev] ++
14,121,837 UART: [ldev] CDI.KEYID = 6
14,122,811 UART: [ldev] SUBJECT.KEYID = 5
14,124,073 UART: [ldev] AUTHORITY.KEYID = 7
14,125,267 UART: [ldev] FE.KEYID = 1
14,135,434 UART: [ldev] Erasing FE.KEYID = 1
17,425,690 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,718,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,733,521 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,748,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,762,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,781,003 UART: [ldev] --
19,785,621 UART: [fwproc] Waiting for Commands...
19,788,546 UART: [fwproc] Received command 0x46574c44
19,790,740 UART: [fwproc] Received Image of size 118548 bytes
23,894,848 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,969,917 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,043,111 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,370,893 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
4,129,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,119,547 >>> mbox cmd response: failed
13,120,143 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,501 >>> mbox cmd response: failed
13,120,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,121,082 >>> mbox cmd response: failed
Initializing fuses
2,046,990 writing to cptra_bootfsm_go
10,871,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,907,128 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
192,134 UART:
192,506 UART: Running Caliptra ROM ...
193,603 UART:
193,748 UART: [state] CFI Enabled
259,732 UART: [state] LifecycleState = Unprovisioned
261,697 UART: [state] DebugLocked = No
263,541 UART: [state] WD Timer not started. Device not locked for debugging
268,024 UART: [kat] SHA2-256
447,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,428 UART: [kat] ++
458,972 UART: [kat] sha1
470,671 UART: [kat] SHA2-256
473,418 UART: [kat] SHA2-384
478,045 UART: [kat] SHA2-512-ACC
480,397 UART: [kat] ECC-384
2,960,205 UART: [kat] HMAC-384Kdf
2,982,299 UART: [kat] LMS
3,458,791 UART: [kat] --
3,462,796 UART: [cold-reset] ++
3,463,816 UART: [fht] FHT @ 0x50003400
3,474,129 UART: [idev] ++
3,474,693 UART: [idev] CDI.KEYID = 6
3,475,633 UART: [idev] SUBJECT.KEYID = 7
3,476,903 UART: [idev] UDS.KEYID = 0
3,479,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,629,021 UART: [idev] Erasing UDS.KEYID = 0
5,997,311 UART: [idev] Sha1 KeyId Algorithm
6,020,559 UART: [idev] --
6,024,832 UART: [ldev] ++
6,025,406 UART: [ldev] CDI.KEYID = 6
6,026,379 UART: [ldev] SUBJECT.KEYID = 5
6,027,568 UART: [ldev] AUTHORITY.KEYID = 7
6,028,812 UART: [ldev] FE.KEYID = 1
6,069,168 UART: [ldev] Erasing FE.KEYID = 1
8,576,552 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,312,782 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,328,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,344,520 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,360,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,380,835 UART: [ldev] --
10,386,709 UART: [fwproc] Wait for Commands...
10,388,605 UART: [fwproc] Recv command 0x46574c44
10,390,599 UART: [fwproc] Recv'd Img size: 118548 bytes
10,476,060 UART: ROM Fatal Error: 0x000B0008
10,479,319 >>> mbox cmd response: failed
10,479,762 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,057 >>> mbox cmd response: failed
10,480,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,480,656 >>> mbox cmd response: failed
Initializing fuses
2,055,322 writing to cptra_bootfsm_go
2,244,647 UART:
2,244,993 UART: Running Caliptra ROM ...
2,246,134 UART:
2,246,304 UART: [state] CFI Enabled
2,316,546 UART: [state] LifecycleState = Unprovisioned
2,318,482 UART: [state] DebugLocked = No
2,320,689 UART: [state] WD Timer not started. Device not locked for debugging
2,325,248 UART: [kat] SHA2-256
2,504,868 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,682 UART: [kat] ++
2,516,152 UART: [kat] sha1
2,528,231 UART: [kat] SHA2-256
2,530,888 UART: [kat] SHA2-384
2,537,242 UART: [kat] SHA2-512-ACC
2,539,618 UART: [kat] ECC-384
5,006,065 UART: [kat] HMAC-384Kdf
5,027,055 UART: [kat] LMS
5,503,517 UART: [kat] --
5,506,812 UART: [cold-reset] ++
5,509,401 UART: [fht] FHT @ 0x50003400
5,521,085 UART: [idev] ++
5,521,657 UART: [idev] CDI.KEYID = 6
5,522,547 UART: [idev] SUBJECT.KEYID = 7
5,523,813 UART: [idev] UDS.KEYID = 0
5,526,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,976 UART: [idev] Erasing UDS.KEYID = 0
8,042,450 UART: [idev] Sha1 KeyId Algorithm
8,066,273 UART: [idev] --
8,071,977 UART: [ldev] ++
8,072,559 UART: [ldev] CDI.KEYID = 6
8,073,453 UART: [ldev] SUBJECT.KEYID = 5
8,074,676 UART: [ldev] AUTHORITY.KEYID = 7
8,075,921 UART: [ldev] FE.KEYID = 1
8,114,089 UART: [ldev] Erasing FE.KEYID = 1
10,620,059 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,354,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,370,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,386,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,401,754 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,423,463 UART: [ldev] --
12,428,946 UART: [fwproc] Wait for Commands...
12,432,039 UART: [fwproc] Recv command 0x46574c44
12,434,094 UART: [fwproc] Recv'd Img size: 118548 bytes
15,915,529 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,000,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,073,138 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,401,139 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
3,464,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,359,646 >>> mbox cmd response: failed
10,360,240 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,360,593 >>> mbox cmd response: failed
10,360,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,361,159 >>> mbox cmd response: failed
Initializing fuses
2,055,074 writing to cptra_bootfsm_go
5,518,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,256,530 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
192,691 UART:
193,059 UART: Running Caliptra ROM ...
194,249 UART:
603,960 UART: [state] CFI Enabled
618,896 UART: [state] LifecycleState = Unprovisioned
620,840 UART: [state] DebugLocked = No
622,507 UART: [state] WD Timer not started. Device not locked for debugging
625,957 UART: [kat] SHA2-256
805,596 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,359 UART: [kat] ++
816,818 UART: [kat] sha1
827,215 UART: [kat] SHA2-256
829,909 UART: [kat] SHA2-384
836,491 UART: [kat] SHA2-512-ACC
838,893 UART: [kat] ECC-384
3,279,486 UART: [kat] HMAC-384Kdf
3,292,462 UART: [kat] LMS
3,768,974 UART: [kat] --
3,772,649 UART: [cold-reset] ++
3,775,127 UART: [fht] FHT @ 0x50003400
3,785,469 UART: [idev] ++
3,786,096 UART: [idev] CDI.KEYID = 6
3,786,990 UART: [idev] SUBJECT.KEYID = 7
3,788,282 UART: [idev] UDS.KEYID = 0
3,791,366 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,467 UART: [idev] Erasing UDS.KEYID = 0
6,261,490 UART: [idev] Sha1 KeyId Algorithm
6,286,397 UART: [idev] --
6,292,602 UART: [ldev] ++
6,293,224 UART: [ldev] CDI.KEYID = 6
6,294,149 UART: [ldev] SUBJECT.KEYID = 5
6,295,319 UART: [ldev] AUTHORITY.KEYID = 7
6,296,558 UART: [ldev] FE.KEYID = 1
6,308,836 UART: [ldev] Erasing FE.KEYID = 1
8,786,023 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,503,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,519,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,535,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,413 UART: [ldev] --
10,576,584 UART: [fwproc] Wait for Commands...
10,579,173 UART: [fwproc] Recv command 0x46574c44
10,581,172 UART: [fwproc] Recv'd Img size: 118548 bytes
10,666,323 UART: ROM Fatal Error: 0x000B0008
10,669,522 >>> mbox cmd response: failed
10,669,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,670,290 >>> mbox cmd response: failed
10,670,561 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,670,856 >>> mbox cmd response: failed
Initializing fuses
2,055,687 writing to cptra_bootfsm_go
2,245,029 UART:
2,245,410 UART: Running Caliptra ROM ...
2,246,552 UART:
9,772,345 UART: [state] CFI Enabled
9,784,836 UART: [state] LifecycleState = Unprovisioned
9,786,793 UART: [state] DebugLocked = No
9,789,656 UART: [state] WD Timer not started. Device not locked for debugging
9,794,443 UART: [kat] SHA2-256
9,974,112 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,984,859 UART: [kat] ++
9,985,408 UART: [kat] sha1
9,997,392 UART: [kat] SHA2-256
10,000,095 UART: [kat] SHA2-384
10,006,365 UART: [kat] SHA2-512-ACC
10,008,727 UART: [kat] ECC-384
12,448,536 UART: [kat] HMAC-384Kdf
12,462,169 UART: [kat] LMS
12,938,707 UART: [kat] --
12,942,859 UART: [cold-reset] ++
12,944,583 UART: [fht] FHT @ 0x50003400
12,955,024 UART: [idev] ++
12,955,595 UART: [idev] CDI.KEYID = 6
12,956,620 UART: [idev] SUBJECT.KEYID = 7
12,957,784 UART: [idev] UDS.KEYID = 0
12,960,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,110,200 UART: [idev] Erasing UDS.KEYID = 0
15,441,180 UART: [idev] Sha1 KeyId Algorithm
15,465,487 UART: [idev] --
15,471,350 UART: [ldev] ++
15,471,933 UART: [ldev] CDI.KEYID = 6
15,472,850 UART: [ldev] SUBJECT.KEYID = 5
15,474,011 UART: [ldev] AUTHORITY.KEYID = 7
15,475,306 UART: [ldev] FE.KEYID = 1
15,484,603 UART: [ldev] Erasing FE.KEYID = 1
17,968,183 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,686,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,702,432 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,718,312 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,733,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,755,755 UART: [ldev] --
19,760,865 UART: [fwproc] Wait for Commands...
19,763,735 UART: [fwproc] Recv command 0x46574c44
19,765,787 UART: [fwproc] Recv'd Img size: 118548 bytes
23,247,383 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,328,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,401,292 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,728,957 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,782,571 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,565,831 >>> mbox cmd response: failed
10,566,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,566,767 >>> mbox cmd response: failed
10,567,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,345 >>> mbox cmd response: failed
Initializing fuses
2,064,172 writing to cptra_bootfsm_go
13,079,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,744,302 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
192,254 UART:
192,603 UART: Running Caliptra ROM ...
193,792 UART:
193,951 UART: [state] CFI Enabled
260,778 UART: [state] LifecycleState = Unprovisioned
263,201 UART: [state] DebugLocked = No
264,809 UART: [state] WD Timer not started. Device not locked for debugging
270,115 UART: [kat] SHA2-256
459,992 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,733 UART: [kat] ++
471,227 UART: [kat] sha1
482,977 UART: [kat] SHA2-256
486,017 UART: [kat] SHA2-384
492,171 UART: [kat] SHA2-512-ACC
494,735 UART: [kat] ECC-384
2,945,143 UART: [kat] HMAC-384Kdf
2,968,089 UART: [kat] LMS
3,499,906 UART: [kat] --
3,501,853 UART: [cold-reset] ++
3,502,989 UART: [fht] FHT @ 0x50003400
3,513,995 UART: [idev] ++
3,514,714 UART: [idev] CDI.KEYID = 6
3,515,606 UART: [idev] SUBJECT.KEYID = 7
3,516,828 UART: [idev] UDS.KEYID = 0
3,519,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,668,869 UART: [idev] Erasing UDS.KEYID = 0
6,024,523 UART: [idev] Sha1 KeyId Algorithm
6,045,549 UART: [idev] --
6,048,933 UART: [ldev] ++
6,049,629 UART: [ldev] CDI.KEYID = 6
6,050,549 UART: [ldev] SUBJECT.KEYID = 5
6,051,716 UART: [ldev] AUTHORITY.KEYID = 7
6,052,957 UART: [ldev] FE.KEYID = 1
6,097,425 UART: [ldev] Erasing FE.KEYID = 1
8,606,026 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,699 UART: [ldev] --
10,413,605 UART: [fwproc] Wait for Commands...
10,416,678 UART: [fwproc] Recv command 0x46574c44
10,418,942 UART: [fwproc] Recv'd Img size: 118548 bytes
10,517,336 UART: ROM Fatal Error: 0x000B0008
10,520,984 >>> mbox cmd response: failed
10,521,392 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,717 >>> mbox cmd response: failed
10,521,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,522,299 >>> mbox cmd response: failed
Initializing fuses
2,054,184 writing to cptra_bootfsm_go
2,243,479 UART:
2,243,821 UART: Running Caliptra ROM ...
2,244,963 UART:
2,245,129 UART: [state] CFI Enabled
2,301,267 UART: [state] LifecycleState = Unprovisioned
2,303,645 UART: [state] DebugLocked = No
2,306,093 UART: [state] WD Timer not started. Device not locked for debugging
2,311,533 UART: [kat] SHA2-256
2,501,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,512,137 UART: [kat] ++
2,512,607 UART: [kat] sha1
2,523,935 UART: [kat] SHA2-256
2,526,973 UART: [kat] SHA2-384
2,533,409 UART: [kat] SHA2-512-ACC
2,535,984 UART: [kat] ECC-384
4,986,842 UART: [kat] HMAC-384Kdf
5,009,347 UART: [kat] LMS
5,541,130 UART: [kat] --
5,544,100 UART: [cold-reset] ++
5,546,739 UART: [fht] FHT @ 0x50003400
5,559,869 UART: [idev] ++
5,560,572 UART: [idev] CDI.KEYID = 6
5,561,536 UART: [idev] SUBJECT.KEYID = 7
5,562,755 UART: [idev] UDS.KEYID = 0
5,564,989 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,714,538 UART: [idev] Erasing UDS.KEYID = 0
8,063,739 UART: [idev] Sha1 KeyId Algorithm
8,087,239 UART: [idev] --
8,093,617 UART: [ldev] ++
8,094,306 UART: [ldev] CDI.KEYID = 6
8,095,222 UART: [ldev] SUBJECT.KEYID = 5
8,096,443 UART: [ldev] AUTHORITY.KEYID = 7
8,097,630 UART: [ldev] FE.KEYID = 1
8,137,040 UART: [ldev] Erasing FE.KEYID = 1
10,643,627 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,381,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,396,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,411,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,426,784 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,447,178 UART: [ldev] --
12,452,399 UART: [fwproc] Wait for Commands...
12,453,953 UART: [fwproc] Recv command 0x46574c44
12,456,228 UART: [fwproc] Recv'd Img size: 118548 bytes
15,944,377 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,024,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,148,184 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,708,014 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,803 writing to cptra_bootfsm_go
3,440,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,318,726 >>> mbox cmd response: failed
10,319,354 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,720 >>> mbox cmd response: failed
10,319,989 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,320,466 >>> mbox cmd response: failed
Initializing fuses
2,058,564 writing to cptra_bootfsm_go
5,485,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,856,468 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,497 UART:
192,851 UART: Running Caliptra ROM ...
194,047 UART:
603,719 UART: [state] CFI Enabled
621,982 UART: [state] LifecycleState = Unprovisioned
624,377 UART: [state] DebugLocked = No
625,815 UART: [state] WD Timer not started. Device not locked for debugging
629,857 UART: [kat] SHA2-256
819,735 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,534 UART: [kat] ++
831,043 UART: [kat] sha1
842,439 UART: [kat] SHA2-256
845,443 UART: [kat] SHA2-384
852,036 UART: [kat] SHA2-512-ACC
854,612 UART: [kat] ECC-384
3,295,311 UART: [kat] HMAC-384Kdf
3,308,844 UART: [kat] LMS
3,840,681 UART: [kat] --
3,845,509 UART: [cold-reset] ++
3,847,185 UART: [fht] FHT @ 0x50003400
3,857,533 UART: [idev] ++
3,858,212 UART: [idev] CDI.KEYID = 6
3,859,155 UART: [idev] SUBJECT.KEYID = 7
3,860,394 UART: [idev] UDS.KEYID = 0
3,863,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,297 UART: [idev] Erasing UDS.KEYID = 0
6,335,533 UART: [idev] Sha1 KeyId Algorithm
6,358,147 UART: [idev] --
6,363,688 UART: [ldev] ++
6,364,378 UART: [ldev] CDI.KEYID = 6
6,365,318 UART: [ldev] SUBJECT.KEYID = 5
6,366,489 UART: [ldev] AUTHORITY.KEYID = 7
6,367,670 UART: [ldev] FE.KEYID = 1
6,379,837 UART: [ldev] Erasing FE.KEYID = 1
8,858,227 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,226 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,409 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,538 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,644,852 UART: [ldev] --
10,650,129 UART: [fwproc] Wait for Commands...
10,652,722 UART: [fwproc] Recv command 0x46574c44
10,655,051 UART: [fwproc] Recv'd Img size: 118548 bytes
10,757,694 UART: ROM Fatal Error: 0x000B0008
10,761,343 >>> mbox cmd response: failed
10,761,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,151 >>> mbox cmd response: failed
10,762,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,762,723 >>> mbox cmd response: failed
Initializing fuses
2,054,441 writing to cptra_bootfsm_go
2,243,752 UART:
2,244,121 UART: Running Caliptra ROM ...
2,245,260 UART:
9,693,073 UART: [state] CFI Enabled
9,706,869 UART: [state] LifecycleState = Unprovisioned
9,709,234 UART: [state] DebugLocked = No
9,710,579 UART: [state] WD Timer not started. Device not locked for debugging
9,715,373 UART: [kat] SHA2-256
9,905,286 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,916,063 UART: [kat] ++
9,916,589 UART: [kat] sha1
9,927,735 UART: [kat] SHA2-256
9,930,711 UART: [kat] SHA2-384
9,937,302 UART: [kat] SHA2-512-ACC
9,939,887 UART: [kat] ECC-384
12,381,480 UART: [kat] HMAC-384Kdf
12,394,945 UART: [kat] LMS
12,926,766 UART: [kat] --
12,931,296 UART: [cold-reset] ++
12,933,123 UART: [fht] FHT @ 0x50003400
12,944,055 UART: [idev] ++
12,944,735 UART: [idev] CDI.KEYID = 6
12,945,670 UART: [idev] SUBJECT.KEYID = 7
12,946,884 UART: [idev] UDS.KEYID = 0
12,949,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,098,188 UART: [idev] Erasing UDS.KEYID = 0
15,419,527 UART: [idev] Sha1 KeyId Algorithm
15,442,648 UART: [idev] --
15,446,675 UART: [ldev] ++
15,447,364 UART: [ldev] CDI.KEYID = 6
15,448,251 UART: [ldev] SUBJECT.KEYID = 5
15,449,357 UART: [ldev] AUTHORITY.KEYID = 7
15,450,595 UART: [ldev] FE.KEYID = 1
15,463,425 UART: [ldev] Erasing FE.KEYID = 1
17,937,988 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,657,728 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,672,927 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,688,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,703,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,723,755 UART: [ldev] --
19,728,914 UART: [fwproc] Wait for Commands...
19,731,779 UART: [fwproc] Recv command 0x46574c44
19,734,102 UART: [fwproc] Recv'd Img size: 118548 bytes
23,235,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,313,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,437,331 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,997,662 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
3,760,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,538,011 >>> mbox cmd response: failed
10,538,552 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,538,893 >>> mbox cmd response: failed
10,539,223 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,539,521 >>> mbox cmd response: failed
Initializing fuses
2,060,777 writing to cptra_bootfsm_go
13,077,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,383,235 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,238 UART: [state] LifecycleState = Unprovisioned
85,893 UART: [state] DebugLocked = No
86,505 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,197 UART: [kat] SHA2-256
882,128 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,243 UART: [kat] ++
886,395 UART: [kat] sha1
890,819 UART: [kat] SHA2-256
892,757 UART: [kat] SHA2-384
895,520 UART: [kat] SHA2-512-ACC
897,421 UART: [kat] ECC-384
903,266 UART: [kat] HMAC-384Kdf
907,916 UART: [kat] LMS
1,476,112 UART: [kat] --
1,477,019 UART: [cold-reset] ++
1,477,545 UART: [fht] Storing FHT @ 0x50003400
1,480,376 UART: [idev] ++
1,480,544 UART: [idev] CDI.KEYID = 6
1,480,904 UART: [idev] SUBJECT.KEYID = 7
1,481,328 UART: [idev] UDS.KEYID = 0
1,481,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,400 UART: [idev] Erasing UDS.KEYID = 0
1,506,416 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,028 UART: [idev] --
1,516,053 UART: [ldev] ++
1,516,221 UART: [ldev] CDI.KEYID = 6
1,516,584 UART: [ldev] SUBJECT.KEYID = 5
1,517,010 UART: [ldev] AUTHORITY.KEYID = 7
1,517,473 UART: [ldev] FE.KEYID = 1
1,522,539 UART: [ldev] Erasing FE.KEYID = 1
1,547,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,149 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,865 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,626 UART: [ldev] --
1,586,947 UART: [fwproc] Waiting for Commands...
1,587,708 UART: [fwproc] Received command 0x46574c44
1,588,499 UART: [fwproc] Received Image of size 118548 bytes
1,613,072 UART: ROM Fatal Error: 0x000B0008
1,614,229 >>> mbox cmd response: failed
1,614,229 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,235 >>> mbox cmd response: failed
1,614,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,241 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,026 UART: [state] LifecycleState = Unprovisioned
85,681 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,059 UART: [kat] SHA2-256
881,990 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,105 UART: [kat] ++
886,257 UART: [kat] sha1
890,443 UART: [kat] SHA2-256
892,381 UART: [kat] SHA2-384
895,152 UART: [kat] SHA2-512-ACC
897,053 UART: [kat] ECC-384
902,526 UART: [kat] HMAC-384Kdf
907,106 UART: [kat] LMS
1,475,302 UART: [kat] --
1,476,029 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,142 UART: [idev] ++
1,479,310 UART: [idev] CDI.KEYID = 6
1,479,670 UART: [idev] SUBJECT.KEYID = 7
1,480,094 UART: [idev] UDS.KEYID = 0
1,480,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,974 UART: [idev] Erasing UDS.KEYID = 0
1,505,212 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,772 UART: [idev] --
1,514,667 UART: [ldev] ++
1,514,835 UART: [ldev] CDI.KEYID = 6
1,515,198 UART: [ldev] SUBJECT.KEYID = 5
1,515,624 UART: [ldev] AUTHORITY.KEYID = 7
1,516,087 UART: [ldev] FE.KEYID = 1
1,521,477 UART: [ldev] Erasing FE.KEYID = 1
1,546,836 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,628 UART: [ldev] --
1,586,065 UART: [fwproc] Waiting for Commands...
1,586,880 UART: [fwproc] Received command 0x46574c44
1,587,671 UART: [fwproc] Received Image of size 118548 bytes
2,933,210 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,558 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,776 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,093 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,639 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,472 >>> mbox cmd response: failed
1,466,472 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,478 >>> mbox cmd response: failed
1,466,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,466,484 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,011 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,582 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,822 UART: [kat] SHA2-256
892,760 UART: [kat] SHA2-384
895,481 UART: [kat] SHA2-512-ACC
897,382 UART: [kat] ECC-384
902,805 UART: [kat] HMAC-384Kdf
907,461 UART: [kat] LMS
1,475,657 UART: [kat] --
1,476,500 UART: [cold-reset] ++
1,476,902 UART: [fht] Storing FHT @ 0x50003400
1,479,603 UART: [idev] ++
1,479,771 UART: [idev] CDI.KEYID = 6
1,480,131 UART: [idev] SUBJECT.KEYID = 7
1,480,555 UART: [idev] UDS.KEYID = 0
1,480,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,403 UART: [idev] Erasing UDS.KEYID = 0
1,505,207 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,621 UART: [idev] --
1,514,512 UART: [ldev] ++
1,514,680 UART: [ldev] CDI.KEYID = 6
1,515,043 UART: [ldev] SUBJECT.KEYID = 5
1,515,469 UART: [ldev] AUTHORITY.KEYID = 7
1,515,932 UART: [ldev] FE.KEYID = 1
1,521,158 UART: [ldev] Erasing FE.KEYID = 1
1,546,563 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,222 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,938 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,829 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,541 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,467 UART: [ldev] --
1,585,778 UART: [fwproc] Waiting for Commands...
1,586,429 UART: [fwproc] Received command 0x46574c44
1,587,220 UART: [fwproc] Received Image of size 118548 bytes
1,612,411 UART: ROM Fatal Error: 0x000B0008
1,613,568 >>> mbox cmd response: failed
1,613,568 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,574 >>> mbox cmd response: failed
1,613,574 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,613,580 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
87,010 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,590 UART: [kat] SHA2-256
882,521 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,636 UART: [kat] ++
886,788 UART: [kat] sha1
891,220 UART: [kat] SHA2-256
893,158 UART: [kat] SHA2-384
895,981 UART: [kat] SHA2-512-ACC
897,882 UART: [kat] ECC-384
903,357 UART: [kat] HMAC-384Kdf
908,029 UART: [kat] LMS
1,476,225 UART: [kat] --
1,476,836 UART: [cold-reset] ++
1,477,412 UART: [fht] Storing FHT @ 0x50003400
1,480,365 UART: [idev] ++
1,480,533 UART: [idev] CDI.KEYID = 6
1,480,893 UART: [idev] SUBJECT.KEYID = 7
1,481,317 UART: [idev] UDS.KEYID = 0
1,481,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,719 UART: [idev] Erasing UDS.KEYID = 0
1,506,973 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,579 UART: [idev] --
1,516,554 UART: [ldev] ++
1,516,722 UART: [ldev] CDI.KEYID = 6
1,517,085 UART: [ldev] SUBJECT.KEYID = 5
1,517,511 UART: [ldev] AUTHORITY.KEYID = 7
1,517,974 UART: [ldev] FE.KEYID = 1
1,523,518 UART: [ldev] Erasing FE.KEYID = 1
1,549,201 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,563,122 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,838 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,729 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,361 UART: [ldev] --
1,588,732 UART: [fwproc] Waiting for Commands...
1,589,573 UART: [fwproc] Received command 0x46574c44
1,590,364 UART: [fwproc] Received Image of size 118548 bytes
2,935,101 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,421 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,639 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,134,020 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,296 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,465,769 >>> mbox cmd response: failed
1,465,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,775 >>> mbox cmd response: failed
1,465,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,690 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,062 UART: [state] LifecycleState = Unprovisioned
85,717 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,752 UART: [kat] SHA2-256
891,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,406 UART: [kat] ++
895,558 UART: [kat] sha1
899,898 UART: [kat] SHA2-256
901,838 UART: [kat] SHA2-384
904,437 UART: [kat] SHA2-512-ACC
906,338 UART: [kat] ECC-384
916,213 UART: [kat] HMAC-384Kdf
920,791 UART: [kat] LMS
1,169,103 UART: [kat] --
1,169,802 UART: [cold-reset] ++
1,170,262 UART: [fht] FHT @ 0x50003400
1,172,990 UART: [idev] ++
1,173,158 UART: [idev] CDI.KEYID = 6
1,173,519 UART: [idev] SUBJECT.KEYID = 7
1,173,944 UART: [idev] UDS.KEYID = 0
1,174,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,683 UART: [idev] Erasing UDS.KEYID = 0
1,198,813 UART: [idev] Sha1 KeyId Algorithm
1,207,721 UART: [idev] --
1,208,964 UART: [ldev] ++
1,209,132 UART: [ldev] CDI.KEYID = 6
1,209,496 UART: [ldev] SUBJECT.KEYID = 5
1,209,923 UART: [ldev] AUTHORITY.KEYID = 7
1,210,386 UART: [ldev] FE.KEYID = 1
1,215,596 UART: [ldev] Erasing FE.KEYID = 1
1,241,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,151 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,867 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,756 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,290 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,416 UART: [fwproc] Recv command 0x46574c44
1,282,149 UART: [fwproc] Recv'd Img size: 118548 bytes
1,306,334 UART: ROM Fatal Error: 0x000B0008
1,307,491 >>> mbox cmd response: failed
1,307,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,497 >>> mbox cmd response: failed
1,307,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,307,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,640 UART: [state] LifecycleState = Unprovisioned
86,295 UART: [state] DebugLocked = No
86,871 UART: [state] WD Timer not started. Device not locked for debugging
88,198 UART: [kat] SHA2-256
891,748 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,852 UART: [kat] ++
896,004 UART: [kat] sha1
900,278 UART: [kat] SHA2-256
902,218 UART: [kat] SHA2-384
905,011 UART: [kat] SHA2-512-ACC
906,912 UART: [kat] ECC-384
916,413 UART: [kat] HMAC-384Kdf
920,993 UART: [kat] LMS
1,169,305 UART: [kat] --
1,170,040 UART: [cold-reset] ++
1,170,480 UART: [fht] FHT @ 0x50003400
1,173,160 UART: [idev] ++
1,173,328 UART: [idev] CDI.KEYID = 6
1,173,689 UART: [idev] SUBJECT.KEYID = 7
1,174,114 UART: [idev] UDS.KEYID = 0
1,174,460 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,993 UART: [idev] Erasing UDS.KEYID = 0
1,198,631 UART: [idev] Sha1 KeyId Algorithm
1,207,397 UART: [idev] --
1,208,398 UART: [ldev] ++
1,208,566 UART: [ldev] CDI.KEYID = 6
1,208,930 UART: [ldev] SUBJECT.KEYID = 5
1,209,357 UART: [ldev] AUTHORITY.KEYID = 7
1,209,820 UART: [ldev] FE.KEYID = 1
1,215,134 UART: [ldev] Erasing FE.KEYID = 1
1,241,635 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,419 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,135 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,736 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,962 UART: [ldev] --
1,281,289 UART: [fwproc] Wait for Commands...
1,281,920 UART: [fwproc] Recv command 0x46574c44
1,282,653 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,285 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,235 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,560 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,448 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,050 >>> mbox cmd response: failed
1,163,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,056 >>> mbox cmd response: failed
1,163,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,563 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,599 UART: [state] LifecycleState = Unprovisioned
86,254 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
87,953 UART: [kat] SHA2-256
891,503 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,607 UART: [kat] ++
895,759 UART: [kat] sha1
899,969 UART: [kat] SHA2-256
901,909 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,342 UART: [kat] HMAC-384Kdf
920,758 UART: [kat] LMS
1,169,070 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,369 UART: [fht] FHT @ 0x50003400
1,173,039 UART: [idev] ++
1,173,207 UART: [idev] CDI.KEYID = 6
1,173,568 UART: [idev] SUBJECT.KEYID = 7
1,173,993 UART: [idev] UDS.KEYID = 0
1,174,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,898 UART: [idev] Erasing UDS.KEYID = 0
1,199,100 UART: [idev] Sha1 KeyId Algorithm
1,207,952 UART: [idev] --
1,209,125 UART: [ldev] ++
1,209,293 UART: [ldev] CDI.KEYID = 6
1,209,657 UART: [ldev] SUBJECT.KEYID = 5
1,210,084 UART: [ldev] AUTHORITY.KEYID = 7
1,210,547 UART: [ldev] FE.KEYID = 1
1,215,957 UART: [ldev] Erasing FE.KEYID = 1
1,242,536 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,455 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,167 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,071 UART: [ldev] --
1,281,522 UART: [fwproc] Wait for Commands...
1,282,189 UART: [fwproc] Recv command 0x46574c44
1,282,922 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,945 UART: ROM Fatal Error: 0x000B0008
1,309,102 >>> mbox cmd response: failed
1,309,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,108 >>> mbox cmd response: failed
1,309,108 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,614 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
891,487 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,591 UART: [kat] ++
895,743 UART: [kat] sha1
900,027 UART: [kat] SHA2-256
901,967 UART: [kat] SHA2-384
904,794 UART: [kat] SHA2-512-ACC
906,695 UART: [kat] ECC-384
916,186 UART: [kat] HMAC-384Kdf
920,844 UART: [kat] LMS
1,169,156 UART: [kat] --
1,170,055 UART: [cold-reset] ++
1,170,597 UART: [fht] FHT @ 0x50003400
1,173,301 UART: [idev] ++
1,173,469 UART: [idev] CDI.KEYID = 6
1,173,830 UART: [idev] SUBJECT.KEYID = 7
1,174,255 UART: [idev] UDS.KEYID = 0
1,174,601 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,490 UART: [idev] Erasing UDS.KEYID = 0
1,199,788 UART: [idev] Sha1 KeyId Algorithm
1,208,708 UART: [idev] --
1,209,907 UART: [ldev] ++
1,210,075 UART: [ldev] CDI.KEYID = 6
1,210,439 UART: [ldev] SUBJECT.KEYID = 5
1,210,866 UART: [ldev] AUTHORITY.KEYID = 7
1,211,329 UART: [ldev] FE.KEYID = 1
1,216,239 UART: [ldev] Erasing FE.KEYID = 1
1,242,250 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,287 UART: [ldev] --
1,281,552 UART: [fwproc] Wait for Commands...
1,282,187 UART: [fwproc] Recv command 0x46574c44
1,282,920 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,282 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,747 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,922 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,075 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,569 >>> mbox cmd response: failed
1,164,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,575 >>> mbox cmd response: failed
1,164,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,374 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,171 UART: [state] WD Timer not started. Device not locked for debugging
87,400 UART: [kat] SHA2-256
893,050 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,175 UART: [kat] ++
897,327 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,444 UART: [kat] SHA2-512-ACC
908,345 UART: [kat] ECC-384
918,036 UART: [kat] HMAC-384Kdf
922,522 UART: [kat] LMS
1,170,850 UART: [kat] --
1,171,905 UART: [cold-reset] ++
1,172,399 UART: [fht] FHT @ 0x50003400
1,174,890 UART: [idev] ++
1,175,058 UART: [idev] CDI.KEYID = 6
1,175,418 UART: [idev] SUBJECT.KEYID = 7
1,175,842 UART: [idev] UDS.KEYID = 0
1,176,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,902 UART: [idev] Erasing UDS.KEYID = 0
1,200,975 UART: [idev] Sha1 KeyId Algorithm
1,209,517 UART: [idev] --
1,210,763 UART: [ldev] ++
1,210,931 UART: [ldev] CDI.KEYID = 6
1,211,294 UART: [ldev] SUBJECT.KEYID = 5
1,211,720 UART: [ldev] AUTHORITY.KEYID = 7
1,212,183 UART: [ldev] FE.KEYID = 1
1,217,309 UART: [ldev] Erasing FE.KEYID = 1
1,243,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,367 UART: [ldev] --
1,282,722 UART: [fwproc] Wait for Commands...
1,283,306 UART: [fwproc] Recv command 0x46574c44
1,284,034 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,905 UART: ROM Fatal Error: 0x000B0008
1,310,062 >>> mbox cmd response: failed
1,310,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,068 >>> mbox cmd response: failed
1,310,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,582 UART: [state] LifecycleState = Unprovisioned
86,237 UART: [state] DebugLocked = No
86,859 UART: [state] WD Timer not started. Device not locked for debugging
88,118 UART: [kat] SHA2-256
893,768 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,893 UART: [kat] ++
898,045 UART: [kat] sha1
902,207 UART: [kat] SHA2-256
904,147 UART: [kat] SHA2-384
906,866 UART: [kat] SHA2-512-ACC
908,767 UART: [kat] ECC-384
918,590 UART: [kat] HMAC-384Kdf
923,162 UART: [kat] LMS
1,171,490 UART: [kat] --
1,172,333 UART: [cold-reset] ++
1,172,891 UART: [fht] FHT @ 0x50003400
1,175,524 UART: [idev] ++
1,175,692 UART: [idev] CDI.KEYID = 6
1,176,052 UART: [idev] SUBJECT.KEYID = 7
1,176,476 UART: [idev] UDS.KEYID = 0
1,176,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,542 UART: [idev] Erasing UDS.KEYID = 0
1,201,951 UART: [idev] Sha1 KeyId Algorithm
1,210,435 UART: [idev] --
1,211,689 UART: [ldev] ++
1,211,857 UART: [ldev] CDI.KEYID = 6
1,212,220 UART: [ldev] SUBJECT.KEYID = 5
1,212,646 UART: [ldev] AUTHORITY.KEYID = 7
1,213,109 UART: [ldev] FE.KEYID = 1
1,218,441 UART: [ldev] Erasing FE.KEYID = 1
1,245,140 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,669 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,276 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,988 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,099 UART: [ldev] --
1,284,408 UART: [fwproc] Wait for Commands...
1,285,034 UART: [fwproc] Recv command 0x46574c44
1,285,762 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,634 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,075 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,396 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,035 >>> mbox cmd response: failed
1,165,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,041 >>> mbox cmd response: failed
1,165,041 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,047 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,709 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,943 UART: [kat] SHA2-256
893,593 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,718 UART: [kat] ++
897,870 UART: [kat] sha1
902,180 UART: [kat] SHA2-256
904,120 UART: [kat] SHA2-384
906,759 UART: [kat] SHA2-512-ACC
908,660 UART: [kat] ECC-384
918,457 UART: [kat] HMAC-384Kdf
923,215 UART: [kat] LMS
1,171,543 UART: [kat] --
1,172,394 UART: [cold-reset] ++
1,172,756 UART: [fht] FHT @ 0x50003400
1,175,497 UART: [idev] ++
1,175,665 UART: [idev] CDI.KEYID = 6
1,176,025 UART: [idev] SUBJECT.KEYID = 7
1,176,449 UART: [idev] UDS.KEYID = 0
1,176,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,975 UART: [idev] Erasing UDS.KEYID = 0
1,201,666 UART: [idev] Sha1 KeyId Algorithm
1,210,322 UART: [idev] --
1,211,400 UART: [ldev] ++
1,211,568 UART: [ldev] CDI.KEYID = 6
1,211,931 UART: [ldev] SUBJECT.KEYID = 5
1,212,357 UART: [ldev] AUTHORITY.KEYID = 7
1,212,820 UART: [ldev] FE.KEYID = 1
1,218,222 UART: [ldev] Erasing FE.KEYID = 1
1,244,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,514 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,121 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,786 UART: [ldev] --
1,284,191 UART: [fwproc] Wait for Commands...
1,284,949 UART: [fwproc] Recv command 0x46574c44
1,285,677 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,132 UART: ROM Fatal Error: 0x000B0008
1,311,289 >>> mbox cmd response: failed
1,311,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,295 >>> mbox cmd response: failed
1,311,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,630 UART: [state] WD Timer not started. Device not locked for debugging
87,811 UART: [kat] SHA2-256
893,461 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,586 UART: [kat] ++
897,738 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,651 UART: [kat] SHA2-512-ACC
908,552 UART: [kat] ECC-384
918,229 UART: [kat] HMAC-384Kdf
922,813 UART: [kat] LMS
1,171,141 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,590 UART: [fht] FHT @ 0x50003400
1,175,291 UART: [idev] ++
1,175,459 UART: [idev] CDI.KEYID = 6
1,175,819 UART: [idev] SUBJECT.KEYID = 7
1,176,243 UART: [idev] UDS.KEYID = 0
1,176,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,031 UART: [idev] Erasing UDS.KEYID = 0
1,200,504 UART: [idev] Sha1 KeyId Algorithm
1,208,884 UART: [idev] --
1,209,850 UART: [ldev] ++
1,210,018 UART: [ldev] CDI.KEYID = 6
1,210,381 UART: [ldev] SUBJECT.KEYID = 5
1,210,807 UART: [ldev] AUTHORITY.KEYID = 7
1,211,270 UART: [ldev] FE.KEYID = 1
1,216,324 UART: [ldev] Erasing FE.KEYID = 1
1,243,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,168 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,373 UART: [fwproc] Recv command 0x46574c44
1,284,101 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,101 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,972 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,142 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,303 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,772 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,434 >>> mbox cmd response: failed
1,164,434 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,440 >>> mbox cmd response: failed
1,164,440 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,920 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,161 UART:
192,535 UART: Running Caliptra ROM ...
193,715 UART:
193,873 UART: [state] CFI Enabled
267,115 UART: [state] LifecycleState = Unprovisioned
269,048 UART: [state] DebugLocked = No
271,898 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,888 UART: [kat] SHA2-256
445,611 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,137 UART: [kat] ++
456,614 UART: [kat] sha1
466,743 UART: [kat] SHA2-256
469,437 UART: [kat] SHA2-384
474,239 UART: [kat] SHA2-512-ACC
476,580 UART: [kat] ECC-384
2,767,572 UART: [kat] HMAC-384Kdf
2,800,476 UART: [kat] LMS
3,990,772 UART: [kat] --
3,995,900 UART: [cold-reset] ++
3,998,118 UART: [fht] Storing FHT @ 0x50003400
4,010,739 UART: [idev] ++
4,011,313 UART: [idev] CDI.KEYID = 6
4,012,283 UART: [idev] SUBJECT.KEYID = 7
4,013,520 UART: [idev] UDS.KEYID = 0
4,016,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,166,020 UART: [idev] Erasing UDS.KEYID = 0
7,348,274 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,630 UART: [idev] --
7,373,736 UART: [ldev] ++
7,374,364 UART: [ldev] CDI.KEYID = 6
7,375,252 UART: [ldev] SUBJECT.KEYID = 5
7,376,527 UART: [ldev] AUTHORITY.KEYID = 7
7,377,764 UART: [ldev] FE.KEYID = 1
7,423,894 UART: [ldev] Erasing FE.KEYID = 1
10,756,995 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,056,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,071,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,085,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,100,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,118,855 UART: [ldev] --
13,123,760 UART: [fwproc] Waiting for Commands...
13,126,941 UART: [fwproc] Received command 0x46574c44
13,129,136 UART: [fwproc] Received Image of size 118548 bytes
13,203,708 UART: ROM Fatal Error: 0x000B0009
13,207,175 >>> mbox cmd response: failed
13,207,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,207,855 >>> mbox cmd response: failed
13,208,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,208,423 >>> mbox cmd response: failed
Initializing fuses
2,057,487 writing to cptra_bootfsm_go
2,246,820 UART:
2,247,197 UART: Running Caliptra ROM ...
2,248,334 UART:
2,248,505 UART: [state] CFI Enabled
2,315,967 UART: [state] LifecycleState = Unprovisioned
2,317,933 UART: [state] DebugLocked = No
2,320,522 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,665 UART: [kat] SHA2-256
2,494,368 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,882 UART: [kat] ++
2,505,339 UART: [kat] sha1
2,515,253 UART: [kat] SHA2-256
2,517,953 UART: [kat] SHA2-384
2,523,891 UART: [kat] SHA2-512-ACC
2,526,246 UART: [kat] ECC-384
4,819,427 UART: [kat] HMAC-384Kdf
4,852,028 UART: [kat] LMS
6,042,288 UART: [kat] --
6,045,691 UART: [cold-reset] ++
6,047,033 UART: [fht] Storing FHT @ 0x50003400
6,057,108 UART: [idev] ++
6,057,712 UART: [idev] CDI.KEYID = 6
6,058,623 UART: [idev] SUBJECT.KEYID = 7
6,059,906 UART: [idev] UDS.KEYID = 0
6,062,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,211,266 UART: [idev] Erasing UDS.KEYID = 0
9,399,292 UART: [idev] Using Sha1 for KeyId Algorithm
9,420,917 UART: [idev] --
9,423,603 UART: [ldev] ++
9,424,183 UART: [ldev] CDI.KEYID = 6
9,425,207 UART: [ldev] SUBJECT.KEYID = 5
9,426,423 UART: [ldev] AUTHORITY.KEYID = 7
9,427,603 UART: [ldev] FE.KEYID = 1
9,467,431 UART: [ldev] Erasing FE.KEYID = 1
12,802,476 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,448 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,131,032 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,387 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,694 UART: [ldev] --
15,185,218 UART: [fwproc] Waiting for Commands...
15,188,311 UART: [fwproc] Received command 0x46574c44
15,190,505 UART: [fwproc] Received Image of size 118548 bytes
19,292,610 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,367,608 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,440,796 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,768,644 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,785,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,912,839 >>> mbox cmd response: failed
12,913,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,913,738 >>> mbox cmd response: failed
12,914,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,914,316 >>> mbox cmd response: failed
Initializing fuses
2,053,710 writing to cptra_bootfsm_go
5,845,585 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,001,660 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,483 UART:
192,855 UART: Running Caliptra ROM ...
193,959 UART:
603,494 UART: [state] CFI Enabled
619,815 UART: [state] LifecycleState = Unprovisioned
621,777 UART: [state] DebugLocked = No
623,236 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,554 UART: [kat] SHA2-256
798,310 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,850 UART: [kat] ++
809,297 UART: [kat] sha1
820,337 UART: [kat] SHA2-256
823,066 UART: [kat] SHA2-384
829,352 UART: [kat] SHA2-512-ACC
831,704 UART: [kat] ECC-384
3,115,444 UART: [kat] HMAC-384Kdf
3,127,789 UART: [kat] LMS
4,317,896 UART: [kat] --
4,324,349 UART: [cold-reset] ++
4,326,675 UART: [fht] Storing FHT @ 0x50003400
4,338,266 UART: [idev] ++
4,338,877 UART: [idev] CDI.KEYID = 6
4,339,773 UART: [idev] SUBJECT.KEYID = 7
4,341,056 UART: [idev] UDS.KEYID = 0
4,343,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,832 UART: [idev] Erasing UDS.KEYID = 0
7,629,221 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,555 UART: [idev] --
7,655,370 UART: [ldev] ++
7,655,972 UART: [ldev] CDI.KEYID = 6
7,656,892 UART: [ldev] SUBJECT.KEYID = 5
7,658,115 UART: [ldev] AUTHORITY.KEYID = 7
7,659,355 UART: [ldev] FE.KEYID = 1
7,670,815 UART: [ldev] Erasing FE.KEYID = 1
10,958,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,841 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,442 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,314,075 UART: [ldev] --
13,319,036 UART: [fwproc] Waiting for Commands...
13,322,120 UART: [fwproc] Received command 0x46574c44
13,324,314 UART: [fwproc] Received Image of size 118548 bytes
13,400,022 UART: ROM Fatal Error: 0x000B0009
13,403,552 >>> mbox cmd response: failed
13,404,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,404,340 >>> mbox cmd response: failed
13,404,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,404,919 >>> mbox cmd response: failed
Initializing fuses
2,059,257 writing to cptra_bootfsm_go
2,248,565 UART:
2,248,899 UART: Running Caliptra ROM ...
2,250,052 UART:
7,060,244 UART: [state] CFI Enabled
7,074,047 UART: [state] LifecycleState = Unprovisioned
7,075,969 UART: [state] DebugLocked = No
7,078,204 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,082,482 UART: [kat] SHA2-256
7,252,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,262,777 UART: [kat] ++
7,263,242 UART: [kat] sha1
7,273,914 UART: [kat] SHA2-256
7,276,613 UART: [kat] SHA2-384
7,283,471 UART: [kat] SHA2-512-ACC
7,285,823 UART: [kat] ECC-384
9,570,500 UART: [kat] HMAC-384Kdf
9,581,331 UART: [kat] LMS
10,771,407 UART: [kat] --
10,776,087 UART: [cold-reset] ++
10,778,089 UART: [fht] Storing FHT @ 0x50003400
10,789,419 UART: [idev] ++
10,789,991 UART: [idev] CDI.KEYID = 6
10,790,961 UART: [idev] SUBJECT.KEYID = 7
10,792,196 UART: [idev] UDS.KEYID = 0
10,794,677 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,943,640 UART: [idev] Erasing UDS.KEYID = 0
14,081,903 UART: [idev] Using Sha1 for KeyId Algorithm
14,103,960 UART: [idev] --
14,107,529 UART: [ldev] ++
14,108,104 UART: [ldev] CDI.KEYID = 6
14,108,998 UART: [ldev] SUBJECT.KEYID = 5
14,110,333 UART: [ldev] AUTHORITY.KEYID = 7
14,111,438 UART: [ldev] FE.KEYID = 1
14,122,711 UART: [ldev] Erasing FE.KEYID = 1
17,405,363 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,697,877 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,712,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,741,848 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,762,177 UART: [ldev] --
19,767,728 UART: [fwproc] Waiting for Commands...
19,770,871 UART: [fwproc] Received command 0x46574c44
19,773,078 UART: [fwproc] Received Image of size 118548 bytes
23,884,707 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,959,053 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,032,222 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,361,358 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,126,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,118,551 >>> mbox cmd response: failed
13,119,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,119,455 >>> mbox cmd response: failed
13,119,728 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,120,026 >>> mbox cmd response: failed
Initializing fuses
2,052,691 writing to cptra_bootfsm_go
10,874,758 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,901,722 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,334 writing to cptra_bootfsm_go
192,481 UART:
192,846 UART: Running Caliptra ROM ...
193,959 UART:
194,109 UART: [state] CFI Enabled
261,472 UART: [state] LifecycleState = Unprovisioned
263,467 UART: [state] DebugLocked = No
266,263 UART: [state] WD Timer not started. Device not locked for debugging
270,168 UART: [kat] SHA2-256
449,851 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,646 UART: [kat] ++
461,130 UART: [kat] sha1
472,015 UART: [kat] SHA2-256
474,697 UART: [kat] SHA2-384
480,583 UART: [kat] SHA2-512-ACC
482,926 UART: [kat] ECC-384
2,948,661 UART: [kat] HMAC-384Kdf
2,969,865 UART: [kat] LMS
3,446,400 UART: [kat] --
3,448,630 UART: [cold-reset] ++
3,449,870 UART: [fht] FHT @ 0x50003400
3,460,804 UART: [idev] ++
3,461,375 UART: [idev] CDI.KEYID = 6
3,462,397 UART: [idev] SUBJECT.KEYID = 7
3,463,563 UART: [idev] UDS.KEYID = 0
3,466,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,616,026 UART: [idev] Erasing UDS.KEYID = 0
5,984,076 UART: [idev] Sha1 KeyId Algorithm
6,008,072 UART: [idev] --
6,012,234 UART: [ldev] ++
6,012,858 UART: [ldev] CDI.KEYID = 6
6,013,759 UART: [ldev] SUBJECT.KEYID = 5
6,014,981 UART: [ldev] AUTHORITY.KEYID = 7
6,016,228 UART: [ldev] FE.KEYID = 1
6,097,782 UART: [ldev] Erasing FE.KEYID = 1
8,606,737 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,568 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,476 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,318 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,878 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,343 UART: [ldev] --
10,412,119 UART: [fwproc] Wait for Commands...
10,414,394 UART: [fwproc] Recv command 0x46574c44
10,416,388 UART: [fwproc] Recv'd Img size: 118548 bytes
10,502,363 UART: ROM Fatal Error: 0x000B0009
10,505,631 >>> mbox cmd response: failed
10,506,075 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,418 >>> mbox cmd response: failed
10,506,700 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,506,942 >>> mbox cmd response: failed
Initializing fuses
2,054,125 writing to cptra_bootfsm_go
2,243,442 UART:
2,243,781 UART: Running Caliptra ROM ...
2,244,947 UART:
2,245,115 UART: [state] CFI Enabled
2,320,599 UART: [state] LifecycleState = Unprovisioned
2,322,537 UART: [state] DebugLocked = No
2,323,743 UART: [state] WD Timer not started. Device not locked for debugging
2,327,054 UART: [kat] SHA2-256
2,506,705 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,517,491 UART: [kat] ++
2,517,972 UART: [kat] sha1
2,529,139 UART: [kat] SHA2-256
2,531,828 UART: [kat] SHA2-384
2,537,994 UART: [kat] SHA2-512-ACC
2,540,350 UART: [kat] ECC-384
5,000,743 UART: [kat] HMAC-384Kdf
5,024,002 UART: [kat] LMS
5,500,506 UART: [kat] --
5,504,243 UART: [cold-reset] ++
5,506,671 UART: [fht] FHT @ 0x50003400
5,518,245 UART: [idev] ++
5,518,815 UART: [idev] CDI.KEYID = 6
5,519,783 UART: [idev] SUBJECT.KEYID = 7
5,521,050 UART: [idev] UDS.KEYID = 0
5,523,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,090 UART: [idev] Erasing UDS.KEYID = 0
8,039,744 UART: [idev] Sha1 KeyId Algorithm
8,064,164 UART: [idev] --
8,069,928 UART: [ldev] ++
8,070,519 UART: [ldev] CDI.KEYID = 6
8,071,443 UART: [ldev] SUBJECT.KEYID = 5
8,072,616 UART: [ldev] AUTHORITY.KEYID = 7
8,073,860 UART: [ldev] FE.KEYID = 1
8,110,869 UART: [ldev] Erasing FE.KEYID = 1
10,616,298 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,353,406 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,369,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,385,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,400,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,421,949 UART: [ldev] --
12,427,436 UART: [fwproc] Wait for Commands...
12,429,265 UART: [fwproc] Recv command 0x46574c44
12,431,257 UART: [fwproc] Recv'd Img size: 118548 bytes
15,916,635 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,995,697 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,068,748 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,396,697 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.57s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,081 writing to cptra_bootfsm_go
3,462,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,336,995 >>> mbox cmd response: failed
10,337,795 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,338,157 >>> mbox cmd response: failed
10,338,432 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,338,728 >>> mbox cmd response: failed
Initializing fuses
2,056,576 writing to cptra_bootfsm_go
5,519,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,276,347 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
192,650 UART:
193,006 UART: Running Caliptra ROM ...
194,100 UART:
603,925 UART: [state] CFI Enabled
617,265 UART: [state] LifecycleState = Unprovisioned
619,365 UART: [state] DebugLocked = No
621,564 UART: [state] WD Timer not started. Device not locked for debugging
625,466 UART: [kat] SHA2-256
805,091 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,914 UART: [kat] ++
816,453 UART: [kat] sha1
827,775 UART: [kat] SHA2-256
830,485 UART: [kat] SHA2-384
836,469 UART: [kat] SHA2-512-ACC
838,865 UART: [kat] ECC-384
3,281,564 UART: [kat] HMAC-384Kdf
3,293,156 UART: [kat] LMS
3,769,674 UART: [kat] --
3,774,348 UART: [cold-reset] ++
3,775,856 UART: [fht] FHT @ 0x50003400
3,786,360 UART: [idev] ++
3,786,931 UART: [idev] CDI.KEYID = 6
3,787,953 UART: [idev] SUBJECT.KEYID = 7
3,789,115 UART: [idev] UDS.KEYID = 0
3,792,228 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,941,794 UART: [idev] Erasing UDS.KEYID = 0
6,269,703 UART: [idev] Sha1 KeyId Algorithm
6,293,589 UART: [idev] --
6,299,604 UART: [ldev] ++
6,300,221 UART: [ldev] CDI.KEYID = 6
6,301,144 UART: [ldev] SUBJECT.KEYID = 5
6,302,314 UART: [ldev] AUTHORITY.KEYID = 7
6,303,547 UART: [ldev] FE.KEYID = 1
6,316,035 UART: [ldev] Erasing FE.KEYID = 1
8,795,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,197 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,029 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,920 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,463 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,943 UART: [ldev] --
10,587,725 UART: [fwproc] Wait for Commands...
10,589,391 UART: [fwproc] Recv command 0x46574c44
10,591,444 UART: [fwproc] Recv'd Img size: 118548 bytes
10,677,445 UART: ROM Fatal Error: 0x000B0009
10,680,717 >>> mbox cmd response: failed
10,681,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,343 >>> mbox cmd response: failed
10,681,618 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,681,908 >>> mbox cmd response: failed
Initializing fuses
2,056,904 writing to cptra_bootfsm_go
2,246,219 UART:
2,246,562 UART: Running Caliptra ROM ...
2,247,604 UART:
9,774,498 UART: [state] CFI Enabled
9,786,327 UART: [state] LifecycleState = Unprovisioned
9,788,301 UART: [state] DebugLocked = No
9,790,266 UART: [state] WD Timer not started. Device not locked for debugging
9,793,598 UART: [kat] SHA2-256
9,973,198 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,984,009 UART: [kat] ++
9,984,518 UART: [kat] sha1
9,996,382 UART: [kat] SHA2-256
9,999,085 UART: [kat] SHA2-384
10,003,897 UART: [kat] SHA2-512-ACC
10,006,315 UART: [kat] ECC-384
12,447,355 UART: [kat] HMAC-384Kdf
12,459,138 UART: [kat] LMS
12,935,674 UART: [kat] --
12,941,229 UART: [cold-reset] ++
12,942,621 UART: [fht] FHT @ 0x50003400
12,953,547 UART: [idev] ++
12,954,113 UART: [idev] CDI.KEYID = 6
12,955,098 UART: [idev] SUBJECT.KEYID = 7
12,956,324 UART: [idev] UDS.KEYID = 0
12,959,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,108,440 UART: [idev] Erasing UDS.KEYID = 0
15,435,211 UART: [idev] Sha1 KeyId Algorithm
15,459,519 UART: [idev] --
15,462,946 UART: [ldev] ++
15,463,530 UART: [ldev] CDI.KEYID = 6
15,464,422 UART: [ldev] SUBJECT.KEYID = 5
15,465,632 UART: [ldev] AUTHORITY.KEYID = 7
15,466,922 UART: [ldev] FE.KEYID = 1
15,478,943 UART: [ldev] Erasing FE.KEYID = 1
17,959,076 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,677,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,693,109 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,708,964 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,724,523 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,746,263 UART: [ldev] --
19,751,959 UART: [fwproc] Wait for Commands...
19,754,275 UART: [fwproc] Recv command 0x46574c44
19,756,269 UART: [fwproc] Recv'd Img size: 118548 bytes
23,237,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,318,256 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,391,274 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,719,113 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,449 writing to cptra_bootfsm_go
3,783,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,566,679 >>> mbox cmd response: failed
10,567,221 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,567,553 >>> mbox cmd response: failed
10,567,846 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,568,144 >>> mbox cmd response: failed
Initializing fuses
2,055,254 writing to cptra_bootfsm_go
13,086,975 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,743,736 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,922 writing to cptra_bootfsm_go
192,086 UART:
192,463 UART: Running Caliptra ROM ...
193,563 UART:
193,709 UART: [state] CFI Enabled
260,407 UART: [state] LifecycleState = Unprovisioned
262,829 UART: [state] DebugLocked = No
264,188 UART: [state] WD Timer not started. Device not locked for debugging
269,540 UART: [kat] SHA2-256
459,398 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,164 UART: [kat] ++
470,658 UART: [kat] sha1
481,864 UART: [kat] SHA2-256
484,932 UART: [kat] SHA2-384
491,139 UART: [kat] SHA2-512-ACC
493,754 UART: [kat] ECC-384
2,945,989 UART: [kat] HMAC-384Kdf
2,970,189 UART: [kat] LMS
3,501,948 UART: [kat] --
3,507,245 UART: [cold-reset] ++
3,508,915 UART: [fht] FHT @ 0x50003400
3,519,903 UART: [idev] ++
3,520,581 UART: [idev] CDI.KEYID = 6
3,521,552 UART: [idev] SUBJECT.KEYID = 7
3,522,770 UART: [idev] UDS.KEYID = 0
3,525,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,674,896 UART: [idev] Erasing UDS.KEYID = 0
6,027,939 UART: [idev] Sha1 KeyId Algorithm
6,050,588 UART: [idev] --
6,056,537 UART: [ldev] ++
6,057,228 UART: [ldev] CDI.KEYID = 6
6,058,145 UART: [ldev] SUBJECT.KEYID = 5
6,059,320 UART: [ldev] AUTHORITY.KEYID = 7
6,060,578 UART: [ldev] FE.KEYID = 1
6,097,760 UART: [ldev] Erasing FE.KEYID = 1
8,601,521 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,356 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,519 UART: [ldev] --
10,409,302 UART: [fwproc] Wait for Commands...
10,411,887 UART: [fwproc] Recv command 0x46574c44
10,414,200 UART: [fwproc] Recv'd Img size: 118548 bytes
10,515,937 UART: ROM Fatal Error: 0x000B0009
10,519,574 >>> mbox cmd response: failed
10,519,999 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,329 >>> mbox cmd response: failed
10,520,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,916 >>> mbox cmd response: failed
Initializing fuses
2,055,290 writing to cptra_bootfsm_go
2,244,795 UART:
2,245,145 UART: Running Caliptra ROM ...
2,246,193 UART:
2,246,348 UART: [state] CFI Enabled
2,304,489 UART: [state] LifecycleState = Unprovisioned
2,306,934 UART: [state] DebugLocked = No
2,309,368 UART: [state] WD Timer not started. Device not locked for debugging
2,314,472 UART: [kat] SHA2-256
2,504,372 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,515,161 UART: [kat] ++
2,515,739 UART: [kat] sha1
2,527,447 UART: [kat] SHA2-256
2,530,471 UART: [kat] SHA2-384
2,537,139 UART: [kat] SHA2-512-ACC
2,539,746 UART: [kat] ECC-384
4,986,342 UART: [kat] HMAC-384Kdf
5,010,675 UART: [kat] LMS
5,542,443 UART: [kat] --
5,547,086 UART: [cold-reset] ++
5,548,595 UART: [fht] FHT @ 0x50003400
5,561,207 UART: [idev] ++
5,561,889 UART: [idev] CDI.KEYID = 6
5,562,912 UART: [idev] SUBJECT.KEYID = 7
5,564,079 UART: [idev] UDS.KEYID = 0
5,566,463 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,716,051 UART: [idev] Erasing UDS.KEYID = 0
8,064,868 UART: [idev] Sha1 KeyId Algorithm
8,088,111 UART: [idev] --
8,091,303 UART: [ldev] ++
8,091,993 UART: [ldev] CDI.KEYID = 6
8,092,907 UART: [ldev] SUBJECT.KEYID = 5
8,094,076 UART: [ldev] AUTHORITY.KEYID = 7
8,095,261 UART: [ldev] FE.KEYID = 1
8,137,512 UART: [ldev] Erasing FE.KEYID = 1
10,642,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,379,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,394,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,409,849 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,972 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,002 UART: [ldev] --
12,451,359 UART: [fwproc] Wait for Commands...
12,453,623 UART: [fwproc] Recv command 0x46574c44
12,456,107 UART: [fwproc] Recv'd Img size: 118548 bytes
15,958,989 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,033,916 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,157,556 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,717,069 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
3,440,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,316,161 >>> mbox cmd response: failed
10,316,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,317,086 >>> mbox cmd response: failed
10,317,364 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,317,658 >>> mbox cmd response: failed
Initializing fuses
2,053,939 writing to cptra_bootfsm_go
5,473,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,834,779 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
192,546 UART:
192,911 UART: Running Caliptra ROM ...
194,014 UART:
603,880 UART: [state] CFI Enabled
616,956 UART: [state] LifecycleState = Unprovisioned
619,289 UART: [state] DebugLocked = No
621,347 UART: [state] WD Timer not started. Device not locked for debugging
625,368 UART: [kat] SHA2-256
815,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,994 UART: [kat] ++
826,530 UART: [kat] sha1
837,959 UART: [kat] SHA2-256
840,984 UART: [kat] SHA2-384
846,885 UART: [kat] SHA2-512-ACC
849,509 UART: [kat] ECC-384
3,292,984 UART: [kat] HMAC-384Kdf
3,306,159 UART: [kat] LMS
3,838,001 UART: [kat] --
3,842,436 UART: [cold-reset] ++
3,843,510 UART: [fht] FHT @ 0x50003400
3,856,499 UART: [idev] ++
3,857,175 UART: [idev] CDI.KEYID = 6
3,858,119 UART: [idev] SUBJECT.KEYID = 7
3,859,336 UART: [idev] UDS.KEYID = 0
3,862,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,295 UART: [idev] Erasing UDS.KEYID = 0
6,337,173 UART: [idev] Sha1 KeyId Algorithm
6,360,243 UART: [idev] --
6,365,349 UART: [ldev] ++
6,366,062 UART: [ldev] CDI.KEYID = 6
6,366,992 UART: [ldev] SUBJECT.KEYID = 5
6,368,020 UART: [ldev] AUTHORITY.KEYID = 7
6,369,317 UART: [ldev] FE.KEYID = 1
6,380,235 UART: [ldev] Erasing FE.KEYID = 1
8,857,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,578,135 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,593,307 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,608,494 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,594 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,513 UART: [ldev] --
10,651,645 UART: [fwproc] Wait for Commands...
10,653,743 UART: [fwproc] Recv command 0x46574c44
10,656,072 UART: [fwproc] Recv'd Img size: 118548 bytes
10,759,512 UART: ROM Fatal Error: 0x000B0009
10,763,207 >>> mbox cmd response: failed
10,763,658 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,763,988 >>> mbox cmd response: failed
10,764,264 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,764,566 >>> mbox cmd response: failed
Initializing fuses
2,054,536 writing to cptra_bootfsm_go
2,243,861 UART:
2,244,212 UART: Running Caliptra ROM ...
2,245,353 UART:
9,677,366 UART: [state] CFI Enabled
9,690,466 UART: [state] LifecycleState = Unprovisioned
9,692,838 UART: [state] DebugLocked = No
9,694,940 UART: [state] WD Timer not started. Device not locked for debugging
9,700,242 UART: [kat] SHA2-256
9,890,094 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,901,058 UART: [kat] ++
9,901,557 UART: [kat] sha1
9,912,327 UART: [kat] SHA2-256
9,915,366 UART: [kat] SHA2-384
9,920,340 UART: [kat] SHA2-512-ACC
9,922,914 UART: [kat] ECC-384
12,365,981 UART: [kat] HMAC-384Kdf
12,378,538 UART: [kat] LMS
12,910,343 UART: [kat] --
12,915,431 UART: [cold-reset] ++
12,916,510 UART: [fht] FHT @ 0x50003400
12,929,604 UART: [idev] ++
12,930,336 UART: [idev] CDI.KEYID = 6
12,931,248 UART: [idev] SUBJECT.KEYID = 7
12,932,485 UART: [idev] UDS.KEYID = 0
12,934,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,084,297 UART: [idev] Erasing UDS.KEYID = 0
15,409,953 UART: [idev] Sha1 KeyId Algorithm
15,431,776 UART: [idev] --
15,436,554 UART: [ldev] ++
15,437,300 UART: [ldev] CDI.KEYID = 6
15,438,192 UART: [ldev] SUBJECT.KEYID = 5
15,439,351 UART: [ldev] AUTHORITY.KEYID = 7
15,440,584 UART: [ldev] FE.KEYID = 1
15,453,128 UART: [ldev] Erasing FE.KEYID = 1
17,933,721 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,655,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,671,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,686,301 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,701,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,722,205 UART: [ldev] --
19,727,096 UART: [fwproc] Wait for Commands...
19,729,094 UART: [fwproc] Recv command 0x46574c44
19,731,371 UART: [fwproc] Recv'd Img size: 118548 bytes
23,217,885 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,291,554 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,415,178 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,975,827 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,755,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,523,904 >>> mbox cmd response: failed
10,524,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,789 >>> mbox cmd response: failed
10,525,058 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,525,356 >>> mbox cmd response: failed
Initializing fuses
2,050,072 writing to cptra_bootfsm_go
13,099,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,405,113 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,382 UART: [state] LifecycleState = Unprovisioned
86,037 UART: [state] DebugLocked = No
86,631 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,279 UART: [kat] SHA2-256
882,210 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,325 UART: [kat] ++
886,477 UART: [kat] sha1
890,531 UART: [kat] SHA2-256
892,469 UART: [kat] SHA2-384
895,268 UART: [kat] SHA2-512-ACC
897,169 UART: [kat] ECC-384
902,554 UART: [kat] HMAC-384Kdf
907,062 UART: [kat] LMS
1,475,258 UART: [kat] --
1,476,101 UART: [cold-reset] ++
1,476,673 UART: [fht] Storing FHT @ 0x50003400
1,479,582 UART: [idev] ++
1,479,750 UART: [idev] CDI.KEYID = 6
1,480,110 UART: [idev] SUBJECT.KEYID = 7
1,480,534 UART: [idev] UDS.KEYID = 0
1,480,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,816 UART: [idev] Erasing UDS.KEYID = 0
1,505,190 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,515,023 UART: [ldev] ++
1,515,191 UART: [ldev] CDI.KEYID = 6
1,515,554 UART: [ldev] SUBJECT.KEYID = 5
1,515,980 UART: [ldev] AUTHORITY.KEYID = 7
1,516,443 UART: [ldev] FE.KEYID = 1
1,521,837 UART: [ldev] Erasing FE.KEYID = 1
1,547,056 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,024 UART: [ldev] --
1,586,345 UART: [fwproc] Waiting for Commands...
1,587,126 UART: [fwproc] Received command 0x46574c44
1,587,917 UART: [fwproc] Received Image of size 118548 bytes
1,613,245 UART: ROM Fatal Error: 0x000B0009
1,614,402 >>> mbox cmd response: failed
1,614,402 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,408 >>> mbox cmd response: failed
1,614,408 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,414 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,423 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,449 UART: [kat] SHA2-256
892,387 UART: [kat] SHA2-384
895,160 UART: [kat] SHA2-512-ACC
897,061 UART: [kat] ECC-384
902,546 UART: [kat] HMAC-384Kdf
907,176 UART: [kat] LMS
1,475,372 UART: [kat] --
1,476,195 UART: [cold-reset] ++
1,476,679 UART: [fht] Storing FHT @ 0x50003400
1,479,366 UART: [idev] ++
1,479,534 UART: [idev] CDI.KEYID = 6
1,479,894 UART: [idev] SUBJECT.KEYID = 7
1,480,318 UART: [idev] UDS.KEYID = 0
1,480,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,240 UART: [idev] Erasing UDS.KEYID = 0
1,504,804 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,314 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,520,731 UART: [ldev] Erasing FE.KEYID = 1
1,546,890 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,933 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,660 UART: [ldev] --
1,585,953 UART: [fwproc] Waiting for Commands...
1,586,600 UART: [fwproc] Received command 0x46574c44
1,587,391 UART: [fwproc] Received Image of size 118548 bytes
2,931,726 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,590 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,808 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,097 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,021 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,465,199 >>> mbox cmd response: failed
1,465,199 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,205 >>> mbox cmd response: failed
1,465,205 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,465,211 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,118 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,783 UART: [state] LifecycleState = Unprovisioned
85,438 UART: [state] DebugLocked = No
86,022 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,552 UART: [kat] SHA2-256
881,483 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,598 UART: [kat] ++
885,750 UART: [kat] sha1
889,812 UART: [kat] SHA2-256
891,750 UART: [kat] SHA2-384
894,465 UART: [kat] SHA2-512-ACC
896,366 UART: [kat] ECC-384
902,029 UART: [kat] HMAC-384Kdf
906,609 UART: [kat] LMS
1,474,805 UART: [kat] --
1,475,650 UART: [cold-reset] ++
1,476,014 UART: [fht] Storing FHT @ 0x50003400
1,478,937 UART: [idev] ++
1,479,105 UART: [idev] CDI.KEYID = 6
1,479,465 UART: [idev] SUBJECT.KEYID = 7
1,479,889 UART: [idev] UDS.KEYID = 0
1,480,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,015 UART: [idev] Erasing UDS.KEYID = 0
1,504,749 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,343 UART: [idev] --
1,514,318 UART: [ldev] ++
1,514,486 UART: [ldev] CDI.KEYID = 6
1,514,849 UART: [ldev] SUBJECT.KEYID = 5
1,515,275 UART: [ldev] AUTHORITY.KEYID = 7
1,515,738 UART: [ldev] FE.KEYID = 1
1,520,852 UART: [ldev] Erasing FE.KEYID = 1
1,546,223 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,624 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,231 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,133 UART: [ldev] --
1,585,542 UART: [fwproc] Waiting for Commands...
1,586,175 UART: [fwproc] Received command 0x46574c44
1,586,966 UART: [fwproc] Received Image of size 118548 bytes
1,612,862 UART: ROM Fatal Error: 0x000B0009
1,614,019 >>> mbox cmd response: failed
1,614,019 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,025 >>> mbox cmd response: failed
1,614,025 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,303 UART: [state] LifecycleState = Unprovisioned
85,958 UART: [state] DebugLocked = No
86,552 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,506 UART: [kat] SHA2-256
892,444 UART: [kat] SHA2-384
895,139 UART: [kat] SHA2-512-ACC
897,040 UART: [kat] ECC-384
902,649 UART: [kat] HMAC-384Kdf
907,443 UART: [kat] LMS
1,475,639 UART: [kat] --
1,476,720 UART: [cold-reset] ++
1,477,118 UART: [fht] Storing FHT @ 0x50003400
1,479,913 UART: [idev] ++
1,480,081 UART: [idev] CDI.KEYID = 6
1,480,441 UART: [idev] SUBJECT.KEYID = 7
1,480,865 UART: [idev] UDS.KEYID = 0
1,481,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,183 UART: [idev] Erasing UDS.KEYID = 0
1,506,077 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,605 UART: [idev] --
1,515,696 UART: [ldev] ++
1,515,864 UART: [ldev] CDI.KEYID = 6
1,516,227 UART: [ldev] SUBJECT.KEYID = 5
1,516,653 UART: [ldev] AUTHORITY.KEYID = 7
1,517,116 UART: [ldev] FE.KEYID = 1
1,522,400 UART: [ldev] Erasing FE.KEYID = 1
1,547,667 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,304 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,061 UART: [ldev] --
1,587,370 UART: [fwproc] Waiting for Commands...
1,588,103 UART: [fwproc] Received command 0x46574c44
1,588,894 UART: [fwproc] Received Image of size 118548 bytes
2,933,391 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,699 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,917 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,466,998 >>> mbox cmd response: failed
1,466,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,004 >>> mbox cmd response: failed
1,467,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,018 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,420 UART: [state] LifecycleState = Unprovisioned
86,075 UART: [state] DebugLocked = No
86,659 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,250 UART: [kat] SHA2-256
902,190 UART: [kat] SHA2-384
904,989 UART: [kat] SHA2-512-ACC
906,890 UART: [kat] ECC-384
916,667 UART: [kat] HMAC-384Kdf
921,293 UART: [kat] LMS
1,169,605 UART: [kat] --
1,170,420 UART: [cold-reset] ++
1,170,888 UART: [fht] FHT @ 0x50003400
1,173,802 UART: [idev] ++
1,173,970 UART: [idev] CDI.KEYID = 6
1,174,331 UART: [idev] SUBJECT.KEYID = 7
1,174,756 UART: [idev] UDS.KEYID = 0
1,175,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,613 UART: [idev] Erasing UDS.KEYID = 0
1,199,655 UART: [idev] Sha1 KeyId Algorithm
1,208,629 UART: [idev] --
1,209,514 UART: [ldev] ++
1,209,682 UART: [ldev] CDI.KEYID = 6
1,210,046 UART: [ldev] SUBJECT.KEYID = 5
1,210,473 UART: [ldev] AUTHORITY.KEYID = 7
1,210,936 UART: [ldev] FE.KEYID = 1
1,216,018 UART: [ldev] Erasing FE.KEYID = 1
1,241,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,431 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,147 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,748 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,924 UART: [ldev] --
1,281,269 UART: [fwproc] Wait for Commands...
1,281,956 UART: [fwproc] Recv command 0x46574c44
1,282,689 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,396 UART: ROM Fatal Error: 0x000B0009
1,308,553 >>> mbox cmd response: failed
1,308,553 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,559 >>> mbox cmd response: failed
1,308,559 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,236 UART: [state] LifecycleState = Unprovisioned
85,891 UART: [state] DebugLocked = No
86,547 UART: [state] WD Timer not started. Device not locked for debugging
87,690 UART: [kat] SHA2-256
891,240 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,344 UART: [kat] ++
895,496 UART: [kat] sha1
899,860 UART: [kat] SHA2-256
901,800 UART: [kat] SHA2-384
904,591 UART: [kat] SHA2-512-ACC
906,492 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
920,843 UART: [kat] LMS
1,169,155 UART: [kat] --
1,169,938 UART: [cold-reset] ++
1,170,508 UART: [fht] FHT @ 0x50003400
1,173,074 UART: [idev] ++
1,173,242 UART: [idev] CDI.KEYID = 6
1,173,603 UART: [idev] SUBJECT.KEYID = 7
1,174,028 UART: [idev] UDS.KEYID = 0
1,174,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,033 UART: [idev] Erasing UDS.KEYID = 0
1,199,165 UART: [idev] Sha1 KeyId Algorithm
1,207,981 UART: [idev] --
1,209,066 UART: [ldev] ++
1,209,234 UART: [ldev] CDI.KEYID = 6
1,209,598 UART: [ldev] SUBJECT.KEYID = 5
1,210,025 UART: [ldev] AUTHORITY.KEYID = 7
1,210,488 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,241,839 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,395 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,111 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,000 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,870 UART: [ldev] --
1,281,235 UART: [fwproc] Wait for Commands...
1,281,976 UART: [fwproc] Recv command 0x46574c44
1,282,709 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,465 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,620 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,098 >>> mbox cmd response: failed
1,163,098 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,104 >>> mbox cmd response: failed
1,163,104 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,110 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,807 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,928 UART: [state] WD Timer not started. Device not locked for debugging
88,289 UART: [kat] SHA2-256
891,839 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,943 UART: [kat] ++
896,095 UART: [kat] sha1
900,523 UART: [kat] SHA2-256
902,463 UART: [kat] SHA2-384
905,210 UART: [kat] SHA2-512-ACC
907,111 UART: [kat] ECC-384
916,780 UART: [kat] HMAC-384Kdf
921,238 UART: [kat] LMS
1,169,550 UART: [kat] --
1,170,531 UART: [cold-reset] ++
1,170,869 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,262 UART: [idev] Erasing UDS.KEYID = 0
1,199,670 UART: [idev] Sha1 KeyId Algorithm
1,208,674 UART: [idev] --
1,209,693 UART: [ldev] ++
1,209,861 UART: [ldev] CDI.KEYID = 6
1,210,225 UART: [ldev] SUBJECT.KEYID = 5
1,210,652 UART: [ldev] AUTHORITY.KEYID = 7
1,211,115 UART: [ldev] FE.KEYID = 1
1,216,327 UART: [ldev] Erasing FE.KEYID = 1
1,242,782 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,278 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,994 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,595 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,743 UART: [ldev] --
1,282,042 UART: [fwproc] Wait for Commands...
1,282,697 UART: [fwproc] Recv command 0x46574c44
1,283,430 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,289 UART: ROM Fatal Error: 0x000B0009
1,310,446 >>> mbox cmd response: failed
1,310,446 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,452 >>> mbox cmd response: failed
1,310,452 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,458 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,331 UART: [state] LifecycleState = Unprovisioned
85,986 UART: [state] DebugLocked = No
86,706 UART: [state] WD Timer not started. Device not locked for debugging
87,935 UART: [kat] SHA2-256
891,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,589 UART: [kat] ++
895,741 UART: [kat] sha1
899,975 UART: [kat] SHA2-256
901,915 UART: [kat] SHA2-384
904,780 UART: [kat] SHA2-512-ACC
906,681 UART: [kat] ECC-384
916,518 UART: [kat] HMAC-384Kdf
921,100 UART: [kat] LMS
1,169,412 UART: [kat] --
1,170,297 UART: [cold-reset] ++
1,170,693 UART: [fht] FHT @ 0x50003400
1,173,407 UART: [idev] ++
1,173,575 UART: [idev] CDI.KEYID = 6
1,173,936 UART: [idev] SUBJECT.KEYID = 7
1,174,361 UART: [idev] UDS.KEYID = 0
1,174,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,506 UART: [idev] Erasing UDS.KEYID = 0
1,199,322 UART: [idev] Sha1 KeyId Algorithm
1,208,286 UART: [idev] --
1,209,439 UART: [ldev] ++
1,209,607 UART: [ldev] CDI.KEYID = 6
1,209,971 UART: [ldev] SUBJECT.KEYID = 5
1,210,398 UART: [ldev] AUTHORITY.KEYID = 7
1,210,861 UART: [ldev] FE.KEYID = 1
1,216,111 UART: [ldev] Erasing FE.KEYID = 1
1,242,858 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,811 UART: [ldev] --
1,282,156 UART: [fwproc] Wait for Commands...
1,282,787 UART: [fwproc] Recv command 0x46574c44
1,283,520 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,737 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,912 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,125 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,617 >>> mbox cmd response: failed
1,165,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,623 >>> mbox cmd response: failed
1,165,623 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,512 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,822 UART: [state] LifecycleState = Unprovisioned
85,477 UART: [state] DebugLocked = No
86,145 UART: [state] WD Timer not started. Device not locked for debugging
87,384 UART: [kat] SHA2-256
893,034 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,159 UART: [kat] ++
897,311 UART: [kat] sha1
901,747 UART: [kat] SHA2-256
903,687 UART: [kat] SHA2-384
906,424 UART: [kat] SHA2-512-ACC
908,325 UART: [kat] ECC-384
918,290 UART: [kat] HMAC-384Kdf
922,762 UART: [kat] LMS
1,171,090 UART: [kat] --
1,172,257 UART: [cold-reset] ++
1,172,637 UART: [fht] FHT @ 0x50003400
1,175,332 UART: [idev] ++
1,175,500 UART: [idev] CDI.KEYID = 6
1,175,860 UART: [idev] SUBJECT.KEYID = 7
1,176,284 UART: [idev] UDS.KEYID = 0
1,176,629 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,098 UART: [idev] Erasing UDS.KEYID = 0
1,201,429 UART: [idev] Sha1 KeyId Algorithm
1,209,895 UART: [idev] --
1,210,909 UART: [ldev] ++
1,211,077 UART: [ldev] CDI.KEYID = 6
1,211,440 UART: [ldev] SUBJECT.KEYID = 5
1,211,866 UART: [ldev] AUTHORITY.KEYID = 7
1,212,329 UART: [ldev] FE.KEYID = 1
1,217,271 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,630 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,342 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,397 UART: [ldev] --
1,282,782 UART: [fwproc] Wait for Commands...
1,283,498 UART: [fwproc] Recv command 0x46574c44
1,284,226 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,708 UART: ROM Fatal Error: 0x000B0009
1,310,865 >>> mbox cmd response: failed
1,310,865 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,871 >>> mbox cmd response: failed
1,310,871 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,877 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,066 UART: [state] LifecycleState = Unprovisioned
85,721 UART: [state] DebugLocked = No
86,269 UART: [state] WD Timer not started. Device not locked for debugging
87,532 UART: [kat] SHA2-256
893,182 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,307 UART: [kat] ++
897,459 UART: [kat] sha1
901,599 UART: [kat] SHA2-256
903,539 UART: [kat] SHA2-384
906,266 UART: [kat] SHA2-512-ACC
908,167 UART: [kat] ECC-384
917,808 UART: [kat] HMAC-384Kdf
922,342 UART: [kat] LMS
1,170,670 UART: [kat] --
1,171,643 UART: [cold-reset] ++
1,172,085 UART: [fht] FHT @ 0x50003400
1,174,722 UART: [idev] ++
1,174,890 UART: [idev] CDI.KEYID = 6
1,175,250 UART: [idev] SUBJECT.KEYID = 7
1,175,674 UART: [idev] UDS.KEYID = 0
1,176,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,578 UART: [idev] Erasing UDS.KEYID = 0
1,200,319 UART: [idev] Sha1 KeyId Algorithm
1,208,867 UART: [idev] --
1,210,035 UART: [ldev] ++
1,210,203 UART: [ldev] CDI.KEYID = 6
1,210,566 UART: [ldev] SUBJECT.KEYID = 5
1,210,992 UART: [ldev] AUTHORITY.KEYID = 7
1,211,455 UART: [ldev] FE.KEYID = 1
1,216,855 UART: [ldev] Erasing FE.KEYID = 1
1,242,818 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,257 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,973 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,864 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,576 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,677 UART: [ldev] --
1,281,992 UART: [fwproc] Wait for Commands...
1,282,686 UART: [fwproc] Recv command 0x46574c44
1,283,414 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,172 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,953 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,123 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,414 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,642 >>> mbox cmd response: failed
1,165,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,648 >>> mbox cmd response: failed
1,165,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,654 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,073 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,751 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,623 UART: [state] LifecycleState = Unprovisioned
86,278 UART: [state] DebugLocked = No
86,784 UART: [state] WD Timer not started. Device not locked for debugging
88,069 UART: [kat] SHA2-256
893,719 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,844 UART: [kat] ++
897,996 UART: [kat] sha1
902,424 UART: [kat] SHA2-256
904,364 UART: [kat] SHA2-384
907,077 UART: [kat] SHA2-512-ACC
908,978 UART: [kat] ECC-384
918,881 UART: [kat] HMAC-384Kdf
923,367 UART: [kat] LMS
1,171,695 UART: [kat] --
1,172,426 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,431 UART: [idev] ++
1,175,599 UART: [idev] CDI.KEYID = 6
1,175,959 UART: [idev] SUBJECT.KEYID = 7
1,176,383 UART: [idev] UDS.KEYID = 0
1,176,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,415 UART: [idev] Erasing UDS.KEYID = 0
1,201,884 UART: [idev] Sha1 KeyId Algorithm
1,210,442 UART: [idev] --
1,211,620 UART: [ldev] ++
1,211,788 UART: [ldev] CDI.KEYID = 6
1,212,151 UART: [ldev] SUBJECT.KEYID = 5
1,212,577 UART: [ldev] AUTHORITY.KEYID = 7
1,213,040 UART: [ldev] FE.KEYID = 1
1,218,118 UART: [ldev] Erasing FE.KEYID = 1
1,245,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,702 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,309 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,021 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,056 UART: [ldev] --
1,284,339 UART: [fwproc] Wait for Commands...
1,285,025 UART: [fwproc] Recv command 0x46574c44
1,285,753 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,745 UART: ROM Fatal Error: 0x000B0009
1,311,902 >>> mbox cmd response: failed
1,311,902 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,908 >>> mbox cmd response: failed
1,311,908 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,914 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,543 UART: [state] LifecycleState = Unprovisioned
86,198 UART: [state] DebugLocked = No
86,876 UART: [state] WD Timer not started. Device not locked for debugging
88,237 UART: [kat] SHA2-256
893,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,012 UART: [kat] ++
898,164 UART: [kat] sha1
902,214 UART: [kat] SHA2-256
904,154 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,413 UART: [kat] HMAC-384Kdf
923,025 UART: [kat] LMS
1,171,353 UART: [kat] --
1,172,062 UART: [cold-reset] ++
1,172,618 UART: [fht] FHT @ 0x50003400
1,175,273 UART: [idev] ++
1,175,441 UART: [idev] CDI.KEYID = 6
1,175,801 UART: [idev] SUBJECT.KEYID = 7
1,176,225 UART: [idev] UDS.KEYID = 0
1,176,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,453 UART: [idev] Erasing UDS.KEYID = 0
1,201,462 UART: [idev] Sha1 KeyId Algorithm
1,209,914 UART: [idev] --
1,210,934 UART: [ldev] ++
1,211,102 UART: [ldev] CDI.KEYID = 6
1,211,465 UART: [ldev] SUBJECT.KEYID = 5
1,211,891 UART: [ldev] AUTHORITY.KEYID = 7
1,212,354 UART: [ldev] FE.KEYID = 1
1,217,288 UART: [ldev] Erasing FE.KEYID = 1
1,243,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,795 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,566 UART: [ldev] --
1,283,033 UART: [fwproc] Wait for Commands...
1,283,755 UART: [fwproc] Recv command 0x46574c44
1,284,483 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,724 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,894 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,189 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,517 >>> mbox cmd response: failed
1,166,517 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,523 >>> mbox cmd response: failed
1,166,523 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,529 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,928 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,966 writing to cptra_bootfsm_go
192,089 UART:
192,449 UART: Running Caliptra ROM ...
193,641 UART:
193,797 UART: [state] CFI Enabled
265,059 UART: [state] LifecycleState = Unprovisioned
266,992 UART: [state] DebugLocked = No
269,567 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,895 UART: [kat] SHA2-256
444,642 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,104 UART: [kat] ++
455,602 UART: [kat] sha1
466,477 UART: [kat] SHA2-256
469,163 UART: [kat] SHA2-384
474,817 UART: [kat] SHA2-512-ACC
477,160 UART: [kat] ECC-384
2,766,260 UART: [kat] HMAC-384Kdf
2,777,208 UART: [kat] LMS
3,967,490 UART: [kat] --
3,972,218 UART: [cold-reset] ++
3,974,320 UART: [fht] Storing FHT @ 0x50003400
3,986,238 UART: [idev] ++
3,986,810 UART: [idev] CDI.KEYID = 6
3,987,775 UART: [idev] SUBJECT.KEYID = 7
3,989,013 UART: [idev] UDS.KEYID = 0
3,991,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,141,253 UART: [idev] Erasing UDS.KEYID = 0
7,322,511 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,408 UART: [idev] --
7,348,298 UART: [ldev] ++
7,348,866 UART: [ldev] CDI.KEYID = 6
7,349,839 UART: [ldev] SUBJECT.KEYID = 5
7,351,056 UART: [ldev] AUTHORITY.KEYID = 7
7,352,295 UART: [ldev] FE.KEYID = 1
7,379,425 UART: [ldev] Erasing FE.KEYID = 1
10,711,038 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,003,076 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,017,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,032,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,046,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,066,503 UART: [ldev] --
13,072,056 UART: [fwproc] Waiting for Commands...
13,075,029 UART: [fwproc] Received command 0x46574c44
13,077,223 UART: [fwproc] Received Image of size 118548 bytes
14,463,189 UART: ROM Fatal Error: 0x000B000C
14,466,646 >>> mbox cmd response: failed
14,467,085 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,467,422 >>> mbox cmd response: failed
14,467,690 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,467,989 >>> mbox cmd response: failed
Initializing fuses
2,053,622 writing to cptra_bootfsm_go
2,242,931 UART:
2,243,297 UART: Running Caliptra ROM ...
2,244,346 UART:
2,244,499 UART: [state] CFI Enabled
2,305,758 UART: [state] LifecycleState = Unprovisioned
2,307,699 UART: [state] DebugLocked = No
2,309,336 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,314,022 UART: [kat] SHA2-256
2,483,749 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,494,253 UART: [kat] ++
2,494,713 UART: [kat] sha1
2,506,085 UART: [kat] SHA2-256
2,508,785 UART: [kat] SHA2-384
2,513,806 UART: [kat] SHA2-512-ACC
2,516,152 UART: [kat] ECC-384
4,806,220 UART: [kat] HMAC-384Kdf
4,819,447 UART: [kat] LMS
6,009,780 UART: [kat] --
6,014,618 UART: [cold-reset] ++
6,016,505 UART: [fht] Storing FHT @ 0x50003400
6,027,719 UART: [idev] ++
6,028,342 UART: [idev] CDI.KEYID = 6
6,029,224 UART: [idev] SUBJECT.KEYID = 7
6,030,493 UART: [idev] UDS.KEYID = 0
6,033,044 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,182,079 UART: [idev] Erasing UDS.KEYID = 0
9,366,396 UART: [idev] Using Sha1 for KeyId Algorithm
9,389,185 UART: [idev] --
9,392,696 UART: [ldev] ++
9,393,304 UART: [ldev] CDI.KEYID = 6
9,394,256 UART: [ldev] SUBJECT.KEYID = 5
9,395,515 UART: [ldev] AUTHORITY.KEYID = 7
9,396,673 UART: [ldev] FE.KEYID = 1
9,441,180 UART: [ldev] Erasing FE.KEYID = 1
12,774,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,067,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,081,809 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,096,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,111,127 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,128,716 UART: [ldev] --
15,133,279 UART: [fwproc] Waiting for Commands...
15,136,141 UART: [fwproc] Received command 0x46574c44
15,138,384 UART: [fwproc] Received Image of size 118548 bytes
19,245,957 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,323,920 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,397,112 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,725,094 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,040 writing to cptra_bootfsm_go
3,786,570 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,255,287 >>> mbox cmd response: failed
14,255,943 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,316 >>> mbox cmd response: failed
14,256,609 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,256,911 >>> mbox cmd response: failed
Initializing fuses
2,053,205 writing to cptra_bootfsm_go
5,849,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,023,000 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,301 writing to cptra_bootfsm_go
192,552 UART:
192,897 UART: Running Caliptra ROM ...
194,083 UART:
603,821 UART: [state] CFI Enabled
617,603 UART: [state] LifecycleState = Unprovisioned
619,496 UART: [state] DebugLocked = No
621,746 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,081 UART: [kat] SHA2-256
795,797 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,337 UART: [kat] ++
806,809 UART: [kat] sha1
818,075 UART: [kat] SHA2-256
820,776 UART: [kat] SHA2-384
826,060 UART: [kat] SHA2-512-ACC
828,405 UART: [kat] ECC-384
3,114,973 UART: [kat] HMAC-384Kdf
3,126,305 UART: [kat] LMS
4,316,395 UART: [kat] --
4,321,774 UART: [cold-reset] ++
4,323,403 UART: [fht] Storing FHT @ 0x50003400
4,334,297 UART: [idev] ++
4,334,866 UART: [idev] CDI.KEYID = 6
4,335,784 UART: [idev] SUBJECT.KEYID = 7
4,337,058 UART: [idev] UDS.KEYID = 0
4,339,981 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,027 UART: [idev] Erasing UDS.KEYID = 0
7,629,103 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,768 UART: [idev] --
7,654,284 UART: [ldev] ++
7,654,864 UART: [ldev] CDI.KEYID = 6
7,655,834 UART: [ldev] SUBJECT.KEYID = 5
7,657,055 UART: [ldev] AUTHORITY.KEYID = 7
7,658,301 UART: [ldev] FE.KEYID = 1
7,669,228 UART: [ldev] Erasing FE.KEYID = 1
10,958,068 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,295 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,125 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,602 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,252 UART: [ldev] --
13,317,605 UART: [fwproc] Waiting for Commands...
13,320,849 UART: [fwproc] Received command 0x46574c44
13,323,060 UART: [fwproc] Received Image of size 118548 bytes
14,711,813 UART: ROM Fatal Error: 0x000B000C
14,715,288 >>> mbox cmd response: failed
14,715,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,055 >>> mbox cmd response: failed
14,716,326 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,716,623 >>> mbox cmd response: failed
Initializing fuses
2,052,355 writing to cptra_bootfsm_go
2,241,643 UART:
2,241,991 UART: Running Caliptra ROM ...
2,243,235 UART:
5,750,834 UART: [state] CFI Enabled
5,763,666 UART: [state] LifecycleState = Unprovisioned
5,765,617 UART: [state] DebugLocked = No
5,766,853 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
5,772,623 UART: [kat] SHA2-256
5,942,370 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
5,952,901 UART: [kat] ++
5,953,394 UART: [kat] sha1
5,963,966 UART: [kat] SHA2-256
5,966,672 UART: [kat] SHA2-384
5,971,372 UART: [kat] SHA2-512-ACC
5,973,730 UART: [kat] ECC-384
8,259,875 UART: [kat] HMAC-384Kdf
8,270,921 UART: [kat] LMS
9,461,037 UART: [kat] --
9,464,391 UART: [cold-reset] ++
9,466,493 UART: [fht] Storing FHT @ 0x50003400
9,477,569 UART: [idev] ++
9,478,142 UART: [idev] CDI.KEYID = 6
9,479,083 UART: [idev] SUBJECT.KEYID = 7
9,480,365 UART: [idev] UDS.KEYID = 0
9,482,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
9,631,996 UART: [idev] Erasing UDS.KEYID = 0
12,766,564 UART: [idev] Using Sha1 for KeyId Algorithm
12,787,209 UART: [idev] --
12,791,051 UART: [ldev] ++
12,791,626 UART: [ldev] CDI.KEYID = 6
12,792,595 UART: [ldev] SUBJECT.KEYID = 5
12,793,850 UART: [ldev] AUTHORITY.KEYID = 7
12,795,092 UART: [ldev] FE.KEYID = 1
12,807,149 UART: [ldev] Erasing FE.KEYID = 1
16,090,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,380,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,395,572 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,410,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,424,874 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,443,809 UART: [ldev] --
18,447,838 UART: [fwproc] Waiting for Commands...
18,449,509 UART: [fwproc] Received command 0x46574c44
18,451,701 UART: [fwproc] Received Image of size 118548 bytes
22,547,833 UART: [fwproc] Image verified using Vendor ECC Key Index 0
22,627,698 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
22,700,832 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
23,028,886 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
4,129,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,444,857 >>> mbox cmd response: failed
14,445,429 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,445,774 >>> mbox cmd response: failed
14,446,103 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
14,446,425 >>> mbox cmd response: failed
Initializing fuses
2,050,100 writing to cptra_bootfsm_go
9,548,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,578,988 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,164 writing to cptra_bootfsm_go
192,391 UART:
192,750 UART: Running Caliptra ROM ...
193,937 UART:
194,112 UART: [state] CFI Enabled
262,728 UART: [state] LifecycleState = Unprovisioned
264,656 UART: [state] DebugLocked = No
267,504 UART: [state] WD Timer not started. Device not locked for debugging
272,183 UART: [kat] SHA2-256
451,829 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,626 UART: [kat] ++
463,165 UART: [kat] sha1
472,975 UART: [kat] SHA2-256
475,682 UART: [kat] SHA2-384
481,698 UART: [kat] SHA2-512-ACC
484,049 UART: [kat] ECC-384
2,945,601 UART: [kat] HMAC-384Kdf
2,970,645 UART: [kat] LMS
3,447,150 UART: [kat] --
3,449,748 UART: [cold-reset] ++
3,452,285 UART: [fht] FHT @ 0x50003400
3,463,586 UART: [idev] ++
3,464,150 UART: [idev] CDI.KEYID = 6
3,465,101 UART: [idev] SUBJECT.KEYID = 7
3,466,389 UART: [idev] UDS.KEYID = 0
3,469,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,194 UART: [idev] Erasing UDS.KEYID = 0
5,982,509 UART: [idev] Sha1 KeyId Algorithm
6,005,862 UART: [idev] --
6,011,844 UART: [ldev] ++
6,012,434 UART: [ldev] CDI.KEYID = 6
6,013,324 UART: [ldev] SUBJECT.KEYID = 5
6,014,545 UART: [ldev] AUTHORITY.KEYID = 7
6,015,790 UART: [ldev] FE.KEYID = 1
6,053,913 UART: [ldev] Erasing FE.KEYID = 1
8,562,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,626 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,477 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,369 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,940 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,364,351 UART: [ldev] --
10,369,947 UART: [fwproc] Wait for Commands...
10,372,645 UART: [fwproc] Recv command 0x46574c44
10,374,644 UART: [fwproc] Recv'd Img size: 118548 bytes
11,451,400 UART: ROM Fatal Error: 0x000B000C
11,454,674 >>> mbox cmd response: failed
11,455,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,455,454 >>> mbox cmd response: failed
11,455,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,456,078 >>> mbox cmd response: failed
Initializing fuses
2,056,521 writing to cptra_bootfsm_go
2,245,844 UART:
2,246,218 UART: Running Caliptra ROM ...
2,247,357 UART:
2,247,532 UART: [state] CFI Enabled
2,319,283 UART: [state] LifecycleState = Unprovisioned
2,321,221 UART: [state] DebugLocked = No
2,323,164 UART: [state] WD Timer not started. Device not locked for debugging
2,327,724 UART: [kat] SHA2-256
2,507,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,518,172 UART: [kat] ++
2,518,722 UART: [kat] sha1
2,529,084 UART: [kat] SHA2-256
2,531,786 UART: [kat] SHA2-384
2,537,915 UART: [kat] SHA2-512-ACC
2,540,289 UART: [kat] ECC-384
5,005,964 UART: [kat] HMAC-384Kdf
5,027,966 UART: [kat] LMS
5,504,429 UART: [kat] --
5,508,968 UART: [cold-reset] ++
5,510,311 UART: [fht] FHT @ 0x50003400
5,522,645 UART: [idev] ++
5,523,215 UART: [idev] CDI.KEYID = 6
5,524,186 UART: [idev] SUBJECT.KEYID = 7
5,525,405 UART: [idev] UDS.KEYID = 0
5,528,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,677,330 UART: [idev] Erasing UDS.KEYID = 0
8,043,058 UART: [idev] Sha1 KeyId Algorithm
8,067,171 UART: [idev] --
8,072,875 UART: [ldev] ++
8,073,462 UART: [ldev] CDI.KEYID = 6
8,074,380 UART: [ldev] SUBJECT.KEYID = 5
8,075,604 UART: [ldev] AUTHORITY.KEYID = 7
8,076,843 UART: [ldev] FE.KEYID = 1
8,114,090 UART: [ldev] Erasing FE.KEYID = 1
10,621,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,357,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,373,576 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,389,451 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,405,033 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,510 UART: [ldev] --
12,433,004 UART: [fwproc] Wait for Commands...
12,434,680 UART: [fwproc] Recv command 0x46574c44
12,436,674 UART: [fwproc] Recv'd Img size: 118548 bytes
15,925,329 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,969 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,074,997 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,403,226 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,462,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,326,240 >>> mbox cmd response: failed
11,326,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,327,360 >>> mbox cmd response: failed
11,327,635 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,327,935 >>> mbox cmd response: failed
Initializing fuses
2,054,384 writing to cptra_bootfsm_go
5,508,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,267,523 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.60s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,356 writing to cptra_bootfsm_go
192,665 UART:
193,081 UART: Running Caliptra ROM ...
194,220 UART:
603,791 UART: [state] CFI Enabled
619,433 UART: [state] LifecycleState = Unprovisioned
621,373 UART: [state] DebugLocked = No
623,057 UART: [state] WD Timer not started. Device not locked for debugging
626,381 UART: [kat] SHA2-256
806,037 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,849 UART: [kat] ++
817,302 UART: [kat] sha1
828,940 UART: [kat] SHA2-256
831,625 UART: [kat] SHA2-384
837,716 UART: [kat] SHA2-512-ACC
840,059 UART: [kat] ECC-384
3,285,314 UART: [kat] HMAC-384Kdf
3,298,297 UART: [kat] LMS
3,774,782 UART: [kat] --
3,778,563 UART: [cold-reset] ++
3,780,737 UART: [fht] FHT @ 0x50003400
3,792,258 UART: [idev] ++
3,792,835 UART: [idev] CDI.KEYID = 6
3,793,802 UART: [idev] SUBJECT.KEYID = 7
3,795,026 UART: [idev] UDS.KEYID = 0
3,797,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,995 UART: [idev] Erasing UDS.KEYID = 0
6,270,130 UART: [idev] Sha1 KeyId Algorithm
6,294,563 UART: [idev] --
6,298,784 UART: [ldev] ++
6,299,416 UART: [ldev] CDI.KEYID = 6
6,300,329 UART: [ldev] SUBJECT.KEYID = 5
6,301,554 UART: [ldev] AUTHORITY.KEYID = 7
6,302,819 UART: [ldev] FE.KEYID = 1
6,312,751 UART: [ldev] Erasing FE.KEYID = 1
8,788,038 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,254 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,248 UART: [ldev] --
10,581,032 UART: [fwproc] Wait for Commands...
10,583,296 UART: [fwproc] Recv command 0x46574c44
10,585,285 UART: [fwproc] Recv'd Img size: 118548 bytes
11,668,048 UART: ROM Fatal Error: 0x000B000C
11,671,279 >>> mbox cmd response: failed
11,671,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,671,987 >>> mbox cmd response: failed
11,672,258 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,672,564 >>> mbox cmd response: failed
Initializing fuses
2,054,556 writing to cptra_bootfsm_go
2,243,898 UART:
2,244,243 UART: Running Caliptra ROM ...
2,245,502 UART:
8,786,097 UART: [state] CFI Enabled
8,800,011 UART: [state] LifecycleState = Unprovisioned
8,801,968 UART: [state] DebugLocked = No
8,804,907 UART: [state] WD Timer not started. Device not locked for debugging
8,808,228 UART: [kat] SHA2-256
8,987,887 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,998,684 UART: [kat] ++
8,999,157 UART: [kat] sha1
9,010,645 UART: [kat] SHA2-256
9,013,351 UART: [kat] SHA2-384
9,019,749 UART: [kat] SHA2-512-ACC
9,022,115 UART: [kat] ECC-384
11,463,882 UART: [kat] HMAC-384Kdf
11,474,867 UART: [kat] LMS
11,951,336 UART: [kat] --
11,957,025 UART: [cold-reset] ++
11,958,054 UART: [fht] FHT @ 0x50003400
11,970,498 UART: [idev] ++
11,971,124 UART: [idev] CDI.KEYID = 6
11,972,033 UART: [idev] SUBJECT.KEYID = 7
11,973,311 UART: [idev] UDS.KEYID = 0
11,976,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,125,241 UART: [idev] Erasing UDS.KEYID = 0
14,449,336 UART: [idev] Sha1 KeyId Algorithm
14,473,319 UART: [idev] --
14,477,289 UART: [ldev] ++
14,477,894 UART: [ldev] CDI.KEYID = 6
14,478,788 UART: [ldev] SUBJECT.KEYID = 5
14,480,001 UART: [ldev] AUTHORITY.KEYID = 7
14,481,243 UART: [ldev] FE.KEYID = 1
14,491,954 UART: [ldev] Erasing FE.KEYID = 1
16,973,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,695,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,711,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,726,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,742,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,763,974 UART: [ldev] --
18,769,566 UART: [fwproc] Wait for Commands...
18,771,291 UART: [fwproc] Recv command 0x46574c44
18,773,289 UART: [fwproc] Recv'd Img size: 118548 bytes
22,259,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,339,457 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,412,449 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,741,110 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,379 writing to cptra_bootfsm_go
3,778,379 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,552,379 >>> mbox cmd response: failed
11,552,997 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,553,349 >>> mbox cmd response: failed
11,553,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,553,980 >>> mbox cmd response: failed
Initializing fuses
2,054,215 writing to cptra_bootfsm_go
12,090,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,738,477 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.93s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,913 writing to cptra_bootfsm_go
192,051 UART:
192,439 UART: Running Caliptra ROM ...
193,568 UART:
193,718 UART: [state] CFI Enabled
261,468 UART: [state] LifecycleState = Unprovisioned
263,780 UART: [state] DebugLocked = No
266,288 UART: [state] WD Timer not started. Device not locked for debugging
271,462 UART: [kat] SHA2-256
461,073 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,832 UART: [kat] ++
472,315 UART: [kat] sha1
484,770 UART: [kat] SHA2-256
487,789 UART: [kat] SHA2-384
494,222 UART: [kat] SHA2-512-ACC
496,788 UART: [kat] ECC-384
2,947,772 UART: [kat] HMAC-384Kdf
2,972,818 UART: [kat] LMS
3,504,581 UART: [kat] --
3,507,671 UART: [cold-reset] ++
3,509,009 UART: [fht] FHT @ 0x50003400
3,520,377 UART: [idev] ++
3,521,064 UART: [idev] CDI.KEYID = 6
3,521,956 UART: [idev] SUBJECT.KEYID = 7
3,523,176 UART: [idev] UDS.KEYID = 0
3,526,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,431 UART: [idev] Erasing UDS.KEYID = 0
6,031,489 UART: [idev] Sha1 KeyId Algorithm
6,054,192 UART: [idev] --
6,059,221 UART: [ldev] ++
6,059,928 UART: [ldev] CDI.KEYID = 6
6,060,846 UART: [ldev] SUBJECT.KEYID = 5
6,062,014 UART: [ldev] AUTHORITY.KEYID = 7
6,063,201 UART: [ldev] FE.KEYID = 1
6,102,318 UART: [ldev] Erasing FE.KEYID = 1
8,608,318 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,360,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,418 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,632 UART: [ldev] --
10,415,468 UART: [fwproc] Wait for Commands...
10,417,461 UART: [fwproc] Recv command 0x46574c44
10,419,776 UART: [fwproc] Recv'd Img size: 118548 bytes
11,514,346 UART: ROM Fatal Error: 0x000B000C
11,518,014 >>> mbox cmd response: failed
11,518,455 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,518,728 >>> mbox cmd response: failed
11,519,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,519,297 >>> mbox cmd response: failed
Initializing fuses
2,055,358 writing to cptra_bootfsm_go
2,244,674 UART:
2,245,022 UART: Running Caliptra ROM ...
2,246,075 UART:
2,246,232 UART: [state] CFI Enabled
2,315,713 UART: [state] LifecycleState = Unprovisioned
2,318,143 UART: [state] DebugLocked = No
2,319,994 UART: [state] WD Timer not started. Device not locked for debugging
2,324,252 UART: [kat] SHA2-256
2,514,130 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,869 UART: [kat] ++
2,525,331 UART: [kat] sha1
2,536,767 UART: [kat] SHA2-256
2,539,788 UART: [kat] SHA2-384
2,544,927 UART: [kat] SHA2-512-ACC
2,547,500 UART: [kat] ECC-384
4,998,400 UART: [kat] HMAC-384Kdf
5,024,758 UART: [kat] LMS
5,556,521 UART: [kat] --
5,561,130 UART: [cold-reset] ++
5,563,022 UART: [fht] FHT @ 0x50003400
5,574,876 UART: [idev] ++
5,575,568 UART: [idev] CDI.KEYID = 6
5,576,590 UART: [idev] SUBJECT.KEYID = 7
5,577,773 UART: [idev] UDS.KEYID = 0
5,580,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,563 UART: [idev] Erasing UDS.KEYID = 0
8,079,060 UART: [idev] Sha1 KeyId Algorithm
8,101,556 UART: [idev] --
8,107,232 UART: [ldev] ++
8,107,925 UART: [ldev] CDI.KEYID = 6
8,108,843 UART: [ldev] SUBJECT.KEYID = 5
8,110,011 UART: [ldev] AUTHORITY.KEYID = 7
8,111,535 UART: [ldev] FE.KEYID = 1
8,151,137 UART: [ldev] Erasing FE.KEYID = 1
10,659,862 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,410,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,425,667 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,826 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,159 UART: [ldev] --
12,467,513 UART: [fwproc] Wait for Commands...
12,470,539 UART: [fwproc] Recv command 0x46574c44
12,472,859 UART: [fwproc] Recv'd Img size: 118548 bytes
15,965,819 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,041,861 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,165,473 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,725,704 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
3,440,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,314,696 >>> mbox cmd response: failed
11,315,253 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,315,617 >>> mbox cmd response: failed
11,315,895 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,316,188 >>> mbox cmd response: failed
Initializing fuses
2,058,388 writing to cptra_bootfsm_go
5,476,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,845,571 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,273 writing to cptra_bootfsm_go
192,402 UART:
192,771 UART: Running Caliptra ROM ...
193,873 UART:
603,742 UART: [state] CFI Enabled
618,438 UART: [state] LifecycleState = Unprovisioned
620,793 UART: [state] DebugLocked = No
623,685 UART: [state] WD Timer not started. Device not locked for debugging
629,157 UART: [kat] SHA2-256
819,046 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,803 UART: [kat] ++
830,403 UART: [kat] sha1
840,703 UART: [kat] SHA2-256
843,719 UART: [kat] SHA2-384
850,405 UART: [kat] SHA2-512-ACC
852,976 UART: [kat] ECC-384
3,297,228 UART: [kat] HMAC-384Kdf
3,311,535 UART: [kat] LMS
3,843,388 UART: [kat] --
3,848,681 UART: [cold-reset] ++
3,849,625 UART: [fht] FHT @ 0x50003400
3,862,667 UART: [idev] ++
3,863,346 UART: [idev] CDI.KEYID = 6
3,864,323 UART: [idev] SUBJECT.KEYID = 7
3,865,490 UART: [idev] UDS.KEYID = 0
3,868,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,017,526 UART: [idev] Erasing UDS.KEYID = 0
6,341,845 UART: [idev] Sha1 KeyId Algorithm
6,362,982 UART: [idev] --
6,366,739 UART: [ldev] ++
6,367,442 UART: [ldev] CDI.KEYID = 6
6,368,369 UART: [ldev] SUBJECT.KEYID = 5
6,369,531 UART: [ldev] AUTHORITY.KEYID = 7
6,370,716 UART: [ldev] FE.KEYID = 1
6,383,911 UART: [ldev] Erasing FE.KEYID = 1
8,866,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,586,934 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,168 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,356 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,444 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,050 UART: [ldev] --
10,658,814 UART: [fwproc] Wait for Commands...
10,660,969 UART: [fwproc] Recv command 0x46574c44
10,663,294 UART: [fwproc] Recv'd Img size: 118548 bytes
11,760,366 UART: ROM Fatal Error: 0x000B000C
11,764,044 >>> mbox cmd response: failed
11,764,483 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,764,823 >>> mbox cmd response: failed
11,765,102 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,765,402 >>> mbox cmd response: failed
Initializing fuses
2,055,431 writing to cptra_bootfsm_go
2,244,735 UART:
2,245,083 UART: Running Caliptra ROM ...
2,246,222 UART:
8,690,773 UART: [state] CFI Enabled
8,708,828 UART: [state] LifecycleState = Unprovisioned
8,711,244 UART: [state] DebugLocked = No
8,713,994 UART: [state] WD Timer not started. Device not locked for debugging
8,719,064 UART: [kat] SHA2-256
8,908,967 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,919,783 UART: [kat] ++
8,920,279 UART: [kat] sha1
8,932,474 UART: [kat] SHA2-256
8,935,510 UART: [kat] SHA2-384
8,941,423 UART: [kat] SHA2-512-ACC
8,944,002 UART: [kat] ECC-384
11,382,270 UART: [kat] HMAC-384Kdf
11,395,209 UART: [kat] LMS
11,927,036 UART: [kat] --
11,931,702 UART: [cold-reset] ++
11,932,938 UART: [fht] FHT @ 0x50003400
11,942,959 UART: [idev] ++
11,943,688 UART: [idev] CDI.KEYID = 6
11,944,606 UART: [idev] SUBJECT.KEYID = 7
11,945,826 UART: [idev] UDS.KEYID = 0
11,948,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,097,055 UART: [idev] Erasing UDS.KEYID = 0
14,424,768 UART: [idev] Sha1 KeyId Algorithm
14,447,096 UART: [idev] --
14,451,262 UART: [ldev] ++
14,451,969 UART: [ldev] CDI.KEYID = 6
14,452,881 UART: [ldev] SUBJECT.KEYID = 5
14,454,047 UART: [ldev] AUTHORITY.KEYID = 7
14,455,287 UART: [ldev] FE.KEYID = 1
14,467,344 UART: [ldev] Erasing FE.KEYID = 1
16,946,733 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,665,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,680,475 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,695,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,710,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,732,096 UART: [ldev] --
18,737,154 UART: [fwproc] Wait for Commands...
18,739,047 UART: [fwproc] Recv command 0x46574c44
18,741,322 UART: [fwproc] Recv'd Img size: 118548 bytes
22,230,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
22,309,501 UART: [fwproc] Load FMC at address 0x40000000 len 20044
22,433,148 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,992,999 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,177 writing to cptra_bootfsm_go
3,762,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,539,576 >>> mbox cmd response: failed
11,540,107 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,540,457 >>> mbox cmd response: failed
11,540,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,541,023 >>> mbox cmd response: failed
Initializing fuses
2,053,355 writing to cptra_bootfsm_go
12,077,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,358,179 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,386 UART: [state] LifecycleState = Unprovisioned
86,041 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,215 UART: [kat] SHA2-256
882,146 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,261 UART: [kat] ++
886,413 UART: [kat] sha1
890,843 UART: [kat] SHA2-256
892,781 UART: [kat] SHA2-384
895,526 UART: [kat] SHA2-512-ACC
897,427 UART: [kat] ECC-384
902,842 UART: [kat] HMAC-384Kdf
907,500 UART: [kat] LMS
1,475,696 UART: [kat] --
1,476,577 UART: [cold-reset] ++
1,477,011 UART: [fht] Storing FHT @ 0x50003400
1,479,830 UART: [idev] ++
1,479,998 UART: [idev] CDI.KEYID = 6
1,480,358 UART: [idev] SUBJECT.KEYID = 7
1,480,782 UART: [idev] UDS.KEYID = 0
1,481,127 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,450 UART: [idev] Erasing UDS.KEYID = 0
1,505,418 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,048 UART: [idev] --
1,515,275 UART: [ldev] ++
1,515,443 UART: [ldev] CDI.KEYID = 6
1,515,806 UART: [ldev] SUBJECT.KEYID = 5
1,516,232 UART: [ldev] AUTHORITY.KEYID = 7
1,516,695 UART: [ldev] FE.KEYID = 1
1,521,535 UART: [ldev] Erasing FE.KEYID = 1
1,546,262 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,453 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,344 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,056 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,978 UART: [ldev] --
1,585,441 UART: [fwproc] Waiting for Commands...
1,586,220 UART: [fwproc] Received command 0x46574c44
1,587,011 UART: [fwproc] Received Image of size 118548 bytes
1,625,097 UART: ROM Fatal Error: 0x000B000C
1,626,256 >>> mbox cmd response: failed
1,626,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,262 >>> mbox cmd response: failed
1,626,262 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,268 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,864 UART: [state] LifecycleState = Unprovisioned
85,519 UART: [state] DebugLocked = No
86,011 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,673 UART: [kat] SHA2-256
881,604 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,719 UART: [kat] ++
885,871 UART: [kat] sha1
890,103 UART: [kat] SHA2-256
892,041 UART: [kat] SHA2-384
894,900 UART: [kat] SHA2-512-ACC
896,801 UART: [kat] ECC-384
902,506 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,299 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,554 UART: [idev] ++
1,479,722 UART: [idev] CDI.KEYID = 6
1,480,082 UART: [idev] SUBJECT.KEYID = 7
1,480,506 UART: [idev] UDS.KEYID = 0
1,480,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,608 UART: [idev] Erasing UDS.KEYID = 0
1,505,256 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,886 UART: [idev] --
1,515,001 UART: [ldev] ++
1,515,169 UART: [ldev] CDI.KEYID = 6
1,515,532 UART: [ldev] SUBJECT.KEYID = 5
1,515,958 UART: [ldev] AUTHORITY.KEYID = 7
1,516,421 UART: [ldev] FE.KEYID = 1
1,521,511 UART: [ldev] Erasing FE.KEYID = 1
1,546,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,039 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,930 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,642 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,818 UART: [ldev] --
1,586,329 UART: [fwproc] Waiting for Commands...
1,587,160 UART: [fwproc] Received command 0x46574c44
1,587,951 UART: [fwproc] Received Image of size 118548 bytes
2,933,434 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,176 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,394 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,727 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.94s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,703 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,805 >>> mbox cmd response: failed
1,477,805 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,811 >>> mbox cmd response: failed
1,477,811 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,837 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,107 UART: [state] LifecycleState = Unprovisioned
85,762 UART: [state] DebugLocked = No
86,354 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,876 UART: [kat] SHA2-256
881,807 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,922 UART: [kat] ++
886,074 UART: [kat] sha1
890,162 UART: [kat] SHA2-256
892,100 UART: [kat] SHA2-384
894,705 UART: [kat] SHA2-512-ACC
896,606 UART: [kat] ECC-384
901,889 UART: [kat] HMAC-384Kdf
906,553 UART: [kat] LMS
1,474,749 UART: [kat] --
1,475,442 UART: [cold-reset] ++
1,475,848 UART: [fht] Storing FHT @ 0x50003400
1,478,689 UART: [idev] ++
1,478,857 UART: [idev] CDI.KEYID = 6
1,479,217 UART: [idev] SUBJECT.KEYID = 7
1,479,641 UART: [idev] UDS.KEYID = 0
1,479,986 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,499 UART: [idev] Erasing UDS.KEYID = 0
1,504,727 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,339 UART: [idev] --
1,514,444 UART: [ldev] ++
1,514,612 UART: [ldev] CDI.KEYID = 6
1,514,975 UART: [ldev] SUBJECT.KEYID = 5
1,515,401 UART: [ldev] AUTHORITY.KEYID = 7
1,515,864 UART: [ldev] FE.KEYID = 1
1,521,054 UART: [ldev] Erasing FE.KEYID = 1
1,547,119 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,750 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,357 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,069 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,087 UART: [ldev] --
1,586,444 UART: [fwproc] Waiting for Commands...
1,587,153 UART: [fwproc] Received command 0x46574c44
1,587,944 UART: [fwproc] Received Image of size 118548 bytes
1,625,610 UART: ROM Fatal Error: 0x000B000C
1,626,769 >>> mbox cmd response: failed
1,626,769 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,775 >>> mbox cmd response: failed
1,626,775 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,626,781 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,367 UART: [state] LifecycleState = Unprovisioned
86,022 UART: [state] DebugLocked = No
86,720 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,290 UART: [kat] SHA2-256
882,221 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,336 UART: [kat] ++
886,488 UART: [kat] sha1
890,798 UART: [kat] SHA2-256
892,736 UART: [kat] SHA2-384
895,499 UART: [kat] SHA2-512-ACC
897,400 UART: [kat] ECC-384
903,063 UART: [kat] HMAC-384Kdf
907,721 UART: [kat] LMS
1,475,917 UART: [kat] --
1,476,752 UART: [cold-reset] ++
1,477,148 UART: [fht] Storing FHT @ 0x50003400
1,480,129 UART: [idev] ++
1,480,297 UART: [idev] CDI.KEYID = 6
1,480,657 UART: [idev] SUBJECT.KEYID = 7
1,481,081 UART: [idev] UDS.KEYID = 0
1,481,426 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,941 UART: [idev] Erasing UDS.KEYID = 0
1,505,591 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,013 UART: [idev] --
1,515,174 UART: [ldev] ++
1,515,342 UART: [ldev] CDI.KEYID = 6
1,515,705 UART: [ldev] SUBJECT.KEYID = 5
1,516,131 UART: [ldev] AUTHORITY.KEYID = 7
1,516,594 UART: [ldev] FE.KEYID = 1
1,521,686 UART: [ldev] Erasing FE.KEYID = 1
1,547,263 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,594 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,310 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,201 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,023 UART: [ldev] --
1,586,306 UART: [fwproc] Waiting for Commands...
1,587,039 UART: [fwproc] Received command 0x46574c44
1,587,830 UART: [fwproc] Received Image of size 118548 bytes
2,932,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,309 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,527 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,772 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,480,076 >>> mbox cmd response: failed
1,480,076 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,082 >>> mbox cmd response: failed
1,480,082 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,480,088 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,246 UART: [state] LifecycleState = Unprovisioned
85,901 UART: [state] DebugLocked = No
86,543 UART: [state] WD Timer not started. Device not locked for debugging
87,764 UART: [kat] SHA2-256
891,314 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,418 UART: [kat] ++
895,570 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,163 UART: [kat] HMAC-384Kdf
920,747 UART: [kat] LMS
1,169,059 UART: [kat] --
1,170,206 UART: [cold-reset] ++
1,170,572 UART: [fht] FHT @ 0x50003400
1,173,312 UART: [idev] ++
1,173,480 UART: [idev] CDI.KEYID = 6
1,173,841 UART: [idev] SUBJECT.KEYID = 7
1,174,266 UART: [idev] UDS.KEYID = 0
1,174,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,389 UART: [idev] Erasing UDS.KEYID = 0
1,199,295 UART: [idev] Sha1 KeyId Algorithm
1,208,153 UART: [idev] --
1,209,442 UART: [ldev] ++
1,209,610 UART: [ldev] CDI.KEYID = 6
1,209,974 UART: [ldev] SUBJECT.KEYID = 5
1,210,401 UART: [ldev] AUTHORITY.KEYID = 7
1,210,864 UART: [ldev] FE.KEYID = 1
1,215,976 UART: [ldev] Erasing FE.KEYID = 1
1,242,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,872 UART: [ldev] --
1,281,115 UART: [fwproc] Wait for Commands...
1,281,938 UART: [fwproc] Recv command 0x46574c44
1,282,671 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,806 UART: ROM Fatal Error: 0x000B000C
1,321,965 >>> mbox cmd response: failed
1,321,965 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,971 >>> mbox cmd response: failed
1,321,971 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,977 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,888 UART: [state] LifecycleState = Unprovisioned
85,543 UART: [state] DebugLocked = No
86,223 UART: [state] WD Timer not started. Device not locked for debugging
87,418 UART: [kat] SHA2-256
890,968 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,072 UART: [kat] ++
895,224 UART: [kat] sha1
899,352 UART: [kat] SHA2-256
901,292 UART: [kat] SHA2-384
904,005 UART: [kat] SHA2-512-ACC
905,906 UART: [kat] ECC-384
915,531 UART: [kat] HMAC-384Kdf
920,019 UART: [kat] LMS
1,168,331 UART: [kat] --
1,169,260 UART: [cold-reset] ++
1,169,770 UART: [fht] FHT @ 0x50003400
1,172,466 UART: [idev] ++
1,172,634 UART: [idev] CDI.KEYID = 6
1,172,995 UART: [idev] SUBJECT.KEYID = 7
1,173,420 UART: [idev] UDS.KEYID = 0
1,173,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,569 UART: [idev] Erasing UDS.KEYID = 0
1,198,275 UART: [idev] Sha1 KeyId Algorithm
1,207,383 UART: [idev] --
1,208,416 UART: [ldev] ++
1,208,584 UART: [ldev] CDI.KEYID = 6
1,208,948 UART: [ldev] SUBJECT.KEYID = 5
1,209,375 UART: [ldev] AUTHORITY.KEYID = 7
1,209,838 UART: [ldev] FE.KEYID = 1
1,214,660 UART: [ldev] Erasing FE.KEYID = 1
1,241,045 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,369 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,278 UART: [ldev] --
1,280,529 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,939 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,254 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,429 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,626 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,844 >>> mbox cmd response: failed
1,175,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,850 >>> mbox cmd response: failed
1,175,850 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,856 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,555 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,605 UART: [state] LifecycleState = Unprovisioned
86,260 UART: [state] DebugLocked = No
86,744 UART: [state] WD Timer not started. Device not locked for debugging
87,981 UART: [kat] SHA2-256
891,531 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,635 UART: [kat] ++
895,787 UART: [kat] sha1
900,043 UART: [kat] SHA2-256
901,983 UART: [kat] SHA2-384
904,644 UART: [kat] SHA2-512-ACC
906,545 UART: [kat] ECC-384
916,446 UART: [kat] HMAC-384Kdf
921,080 UART: [kat] LMS
1,169,392 UART: [kat] --
1,170,463 UART: [cold-reset] ++
1,170,921 UART: [fht] FHT @ 0x50003400
1,173,711 UART: [idev] ++
1,173,879 UART: [idev] CDI.KEYID = 6
1,174,240 UART: [idev] SUBJECT.KEYID = 7
1,174,665 UART: [idev] UDS.KEYID = 0
1,175,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,942 UART: [idev] Erasing UDS.KEYID = 0
1,200,224 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,210,125 UART: [ldev] ++
1,210,293 UART: [ldev] CDI.KEYID = 6
1,210,657 UART: [ldev] SUBJECT.KEYID = 5
1,211,084 UART: [ldev] AUTHORITY.KEYID = 7
1,211,547 UART: [ldev] FE.KEYID = 1
1,217,029 UART: [ldev] Erasing FE.KEYID = 1
1,244,396 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,101 UART: [ldev] --
1,283,386 UART: [fwproc] Wait for Commands...
1,284,157 UART: [fwproc] Recv command 0x46574c44
1,284,890 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,789 UART: ROM Fatal Error: 0x000B000C
1,322,948 >>> mbox cmd response: failed
1,322,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,954 >>> mbox cmd response: failed
1,322,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,960 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,322 UART: [state] WD Timer not started. Device not locked for debugging
87,437 UART: [kat] SHA2-256
890,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,091 UART: [kat] ++
895,243 UART: [kat] sha1
899,409 UART: [kat] SHA2-256
901,349 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,714 UART: [kat] HMAC-384Kdf
920,304 UART: [kat] LMS
1,168,616 UART: [kat] --
1,169,563 UART: [cold-reset] ++
1,169,959 UART: [fht] FHT @ 0x50003400
1,172,477 UART: [idev] ++
1,172,645 UART: [idev] CDI.KEYID = 6
1,173,006 UART: [idev] SUBJECT.KEYID = 7
1,173,431 UART: [idev] UDS.KEYID = 0
1,173,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,430 UART: [idev] Erasing UDS.KEYID = 0
1,198,242 UART: [idev] Sha1 KeyId Algorithm
1,207,000 UART: [idev] --
1,207,973 UART: [ldev] ++
1,208,141 UART: [ldev] CDI.KEYID = 6
1,208,505 UART: [ldev] SUBJECT.KEYID = 5
1,208,932 UART: [ldev] AUTHORITY.KEYID = 7
1,209,395 UART: [ldev] FE.KEYID = 1
1,214,885 UART: [ldev] Erasing FE.KEYID = 1
1,241,510 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,563 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,359 UART: [ldev] --
1,280,568 UART: [fwproc] Wait for Commands...
1,281,215 UART: [fwproc] Recv command 0x46574c44
1,281,948 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,624 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,893 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,077 >>> mbox cmd response: failed
1,177,077 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,083 >>> mbox cmd response: failed
1,177,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,310 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,142 UART: [state] LifecycleState = Unprovisioned
85,797 UART: [state] DebugLocked = No
86,283 UART: [state] WD Timer not started. Device not locked for debugging
87,592 UART: [kat] SHA2-256
893,242 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,367 UART: [kat] ++
897,519 UART: [kat] sha1
901,605 UART: [kat] SHA2-256
903,545 UART: [kat] SHA2-384
906,346 UART: [kat] SHA2-512-ACC
908,247 UART: [kat] ECC-384
917,852 UART: [kat] HMAC-384Kdf
922,380 UART: [kat] LMS
1,170,708 UART: [kat] --
1,171,349 UART: [cold-reset] ++
1,171,721 UART: [fht] FHT @ 0x50003400
1,174,286 UART: [idev] ++
1,174,454 UART: [idev] CDI.KEYID = 6
1,174,814 UART: [idev] SUBJECT.KEYID = 7
1,175,238 UART: [idev] UDS.KEYID = 0
1,175,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,172 UART: [idev] Erasing UDS.KEYID = 0
1,200,455 UART: [idev] Sha1 KeyId Algorithm
1,209,019 UART: [idev] --
1,210,171 UART: [ldev] ++
1,210,339 UART: [ldev] CDI.KEYID = 6
1,210,702 UART: [ldev] SUBJECT.KEYID = 5
1,211,128 UART: [ldev] AUTHORITY.KEYID = 7
1,211,591 UART: [ldev] FE.KEYID = 1
1,216,765 UART: [ldev] Erasing FE.KEYID = 1
1,242,710 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,843 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,559 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,277 UART: [ldev] --
1,281,632 UART: [fwproc] Wait for Commands...
1,282,342 UART: [fwproc] Recv command 0x46574c44
1,283,070 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,670 UART: ROM Fatal Error: 0x000B000C
1,321,829 >>> mbox cmd response: failed
1,321,829 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,835 >>> mbox cmd response: failed
1,321,835 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,841 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,368 UART: [state] LifecycleState = Unprovisioned
86,023 UART: [state] DebugLocked = No
86,573 UART: [state] WD Timer not started. Device not locked for debugging
87,876 UART: [kat] SHA2-256
893,526 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,651 UART: [kat] ++
897,803 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,784 UART: [kat] SHA2-512-ACC
908,685 UART: [kat] ECC-384
918,448 UART: [kat] HMAC-384Kdf
922,958 UART: [kat] LMS
1,171,286 UART: [kat] --
1,172,247 UART: [cold-reset] ++
1,172,755 UART: [fht] FHT @ 0x50003400
1,175,476 UART: [idev] ++
1,175,644 UART: [idev] CDI.KEYID = 6
1,176,004 UART: [idev] SUBJECT.KEYID = 7
1,176,428 UART: [idev] UDS.KEYID = 0
1,176,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,632 UART: [idev] Erasing UDS.KEYID = 0
1,201,471 UART: [idev] Sha1 KeyId Algorithm
1,209,903 UART: [idev] --
1,210,985 UART: [ldev] ++
1,211,153 UART: [ldev] CDI.KEYID = 6
1,211,516 UART: [ldev] SUBJECT.KEYID = 5
1,211,942 UART: [ldev] AUTHORITY.KEYID = 7
1,212,405 UART: [ldev] FE.KEYID = 1
1,217,439 UART: [ldev] Erasing FE.KEYID = 1
1,243,888 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,317 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,033 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,924 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,479 UART: [ldev] --
1,282,982 UART: [fwproc] Wait for Commands...
1,283,762 UART: [fwproc] Recv command 0x46574c44
1,284,490 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,991 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,161 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,462 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,177,478 >>> mbox cmd response: failed
1,177,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,484 >>> mbox cmd response: failed
1,177,484 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,177,490 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,651 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,568 UART: [state] WD Timer not started. Device not locked for debugging
87,807 UART: [kat] SHA2-256
893,457 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,582 UART: [kat] ++
897,734 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,645 UART: [kat] SHA2-512-ACC
908,546 UART: [kat] ECC-384
918,345 UART: [kat] HMAC-384Kdf
922,963 UART: [kat] LMS
1,171,291 UART: [kat] --
1,172,232 UART: [cold-reset] ++
1,172,584 UART: [fht] FHT @ 0x50003400
1,175,169 UART: [idev] ++
1,175,337 UART: [idev] CDI.KEYID = 6
1,175,697 UART: [idev] SUBJECT.KEYID = 7
1,176,121 UART: [idev] UDS.KEYID = 0
1,176,466 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,051 UART: [idev] Erasing UDS.KEYID = 0
1,200,640 UART: [idev] Sha1 KeyId Algorithm
1,209,002 UART: [idev] --
1,209,952 UART: [ldev] ++
1,210,120 UART: [ldev] CDI.KEYID = 6
1,210,483 UART: [ldev] SUBJECT.KEYID = 5
1,210,909 UART: [ldev] AUTHORITY.KEYID = 7
1,211,372 UART: [ldev] FE.KEYID = 1
1,216,590 UART: [ldev] Erasing FE.KEYID = 1
1,243,607 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,578 UART: [ldev] --
1,283,067 UART: [fwproc] Wait for Commands...
1,283,685 UART: [fwproc] Recv command 0x46574c44
1,284,413 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,891 UART: ROM Fatal Error: 0x000B000C
1,323,050 >>> mbox cmd response: failed
1,323,050 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,056 >>> mbox cmd response: failed
1,323,056 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,323,062 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,925 UART: [kat] SHA2-256
893,575 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,700 UART: [kat] ++
897,852 UART: [kat] sha1
901,926 UART: [kat] SHA2-256
903,866 UART: [kat] SHA2-384
906,581 UART: [kat] SHA2-512-ACC
908,482 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,839 UART: [kat] LMS
1,171,167 UART: [kat] --
1,171,938 UART: [cold-reset] ++
1,172,422 UART: [fht] FHT @ 0x50003400
1,175,175 UART: [idev] ++
1,175,343 UART: [idev] CDI.KEYID = 6
1,175,703 UART: [idev] SUBJECT.KEYID = 7
1,176,127 UART: [idev] UDS.KEYID = 0
1,176,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,815 UART: [idev] Erasing UDS.KEYID = 0
1,201,456 UART: [idev] Sha1 KeyId Algorithm
1,209,966 UART: [idev] --
1,211,044 UART: [ldev] ++
1,211,212 UART: [ldev] CDI.KEYID = 6
1,211,575 UART: [ldev] SUBJECT.KEYID = 5
1,212,001 UART: [ldev] AUTHORITY.KEYID = 7
1,212,464 UART: [ldev] FE.KEYID = 1
1,217,646 UART: [ldev] Erasing FE.KEYID = 1
1,244,153 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,918 UART: [ldev] --
1,283,203 UART: [fwproc] Wait for Commands...
1,283,869 UART: [fwproc] Recv command 0x46574c44
1,284,597 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,315 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,646 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,816 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,195 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,178,575 >>> mbox cmd response: failed
1,178,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,581 >>> mbox cmd response: failed
1,178,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,178,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,786 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
192,230 UART:
192,584 UART: Running Caliptra ROM ...
193,764 UART:
193,935 UART: [state] CFI Enabled
264,349 UART: [state] LifecycleState = Unprovisioned
266,281 UART: [state] DebugLocked = No
267,874 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,991 UART: [kat] SHA2-256
441,713 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,200 UART: [kat] ++
452,684 UART: [kat] sha1
463,722 UART: [kat] SHA2-256
466,408 UART: [kat] SHA2-384
471,088 UART: [kat] SHA2-512-ACC
473,437 UART: [kat] ECC-384
2,767,914 UART: [kat] HMAC-384Kdf
2,799,443 UART: [kat] LMS
3,989,739 UART: [kat] --
3,994,248 UART: [cold-reset] ++
3,996,676 UART: [fht] Storing FHT @ 0x50003400
4,009,189 UART: [idev] ++
4,009,759 UART: [idev] CDI.KEYID = 6
4,010,782 UART: [idev] SUBJECT.KEYID = 7
4,011,960 UART: [idev] UDS.KEYID = 0
4,014,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,164,126 UART: [idev] Erasing UDS.KEYID = 0
7,348,071 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,100 UART: [idev] --
7,373,883 UART: [ldev] ++
7,374,457 UART: [ldev] CDI.KEYID = 6
7,375,477 UART: [ldev] SUBJECT.KEYID = 5
7,376,581 UART: [ldev] AUTHORITY.KEYID = 7
7,377,871 UART: [ldev] FE.KEYID = 1
7,423,435 UART: [ldev] Erasing FE.KEYID = 1
10,757,510 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,047 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,640 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,472 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,589 UART: [ldev] --
13,118,864 UART: [fwproc] Waiting for Commands...
13,121,476 UART: [fwproc] Received command 0x46574c44
13,123,676 UART: [fwproc] Received Image of size 118548 bytes
13,222,025 UART: ROM Fatal Error: 0x000B001C
13,225,499 >>> mbox cmd response: failed
13,225,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,226,236 >>> mbox cmd response: failed
13,226,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,226,801 >>> mbox cmd response: failed
Initializing fuses
2,062,737 writing to cptra_bootfsm_go
2,252,124 UART:
2,252,475 UART: Running Caliptra ROM ...
2,253,615 UART:
2,253,811 UART: [state] CFI Enabled
2,315,507 UART: [state] LifecycleState = Unprovisioned
2,317,456 UART: [state] DebugLocked = No
2,319,702 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,329 UART: [kat] SHA2-256
2,494,076 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,504,569 UART: [kat] ++
2,505,064 UART: [kat] sha1
2,514,682 UART: [kat] SHA2-256
2,517,391 UART: [kat] SHA2-384
2,523,492 UART: [kat] SHA2-512-ACC
2,525,898 UART: [kat] ECC-384
4,816,883 UART: [kat] HMAC-384Kdf
4,847,816 UART: [kat] LMS
6,038,114 UART: [kat] --
6,043,852 UART: [cold-reset] ++
6,046,083 UART: [fht] Storing FHT @ 0x50003400
6,058,002 UART: [idev] ++
6,058,587 UART: [idev] CDI.KEYID = 6
6,059,528 UART: [idev] SUBJECT.KEYID = 7
6,060,801 UART: [idev] UDS.KEYID = 0
6,063,092 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,212,179 UART: [idev] Erasing UDS.KEYID = 0
9,396,163 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,638 UART: [idev] --
9,423,877 UART: [ldev] ++
9,424,448 UART: [ldev] CDI.KEYID = 6
9,425,418 UART: [ldev] SUBJECT.KEYID = 5
9,426,564 UART: [ldev] AUTHORITY.KEYID = 7
9,427,863 UART: [ldev] FE.KEYID = 1
9,470,937 UART: [ldev] Erasing FE.KEYID = 1
12,801,578 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,098,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,112,744 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,127,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,142,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,161,118 UART: [ldev] --
15,165,354 UART: [fwproc] Waiting for Commands...
15,168,430 UART: [fwproc] Received command 0x46574c44
15,170,617 UART: [fwproc] Received Image of size 118548 bytes
19,280,062 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,354,487 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,427,709 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,756,446 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,805,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,962,260 >>> mbox cmd response: failed
12,962,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,963,230 >>> mbox cmd response: failed
12,963,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,963,803 >>> mbox cmd response: failed
Initializing fuses
2,049,387 writing to cptra_bootfsm_go
5,838,805 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,991,176 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
192,540 UART:
192,903 UART: Running Caliptra ROM ...
194,098 UART:
603,910 UART: [state] CFI Enabled
615,584 UART: [state] LifecycleState = Unprovisioned
617,487 UART: [state] DebugLocked = No
619,420 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,549 UART: [kat] SHA2-256
793,295 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,801 UART: [kat] ++
804,307 UART: [kat] sha1
814,376 UART: [kat] SHA2-256
817,063 UART: [kat] SHA2-384
821,650 UART: [kat] SHA2-512-ACC
823,991 UART: [kat] ECC-384
3,106,662 UART: [kat] HMAC-384Kdf
3,118,713 UART: [kat] LMS
4,308,822 UART: [kat] --
4,311,385 UART: [cold-reset] ++
4,313,440 UART: [fht] Storing FHT @ 0x50003400
4,325,145 UART: [idev] ++
4,325,725 UART: [idev] CDI.KEYID = 6
4,326,696 UART: [idev] SUBJECT.KEYID = 7
4,327,914 UART: [idev] UDS.KEYID = 0
4,330,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,479,766 UART: [idev] Erasing UDS.KEYID = 0
7,616,931 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,545 UART: [idev] --
7,642,315 UART: [ldev] ++
7,642,893 UART: [ldev] CDI.KEYID = 6
7,643,881 UART: [ldev] SUBJECT.KEYID = 5
7,645,102 UART: [ldev] AUTHORITY.KEYID = 7
7,646,342 UART: [ldev] FE.KEYID = 1
7,658,290 UART: [ldev] Erasing FE.KEYID = 1
10,942,352 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,235,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,249,743 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,264,541 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,279,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,297,789 UART: [ldev] --
13,303,124 UART: [fwproc] Waiting for Commands...
13,305,791 UART: [fwproc] Received command 0x46574c44
13,307,987 UART: [fwproc] Received Image of size 118548 bytes
13,405,422 UART: ROM Fatal Error: 0x000B001C
13,408,899 >>> mbox cmd response: failed
13,409,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,409,714 >>> mbox cmd response: failed
13,409,985 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,410,284 >>> mbox cmd response: failed
Initializing fuses
2,065,801 writing to cptra_bootfsm_go
2,255,089 UART:
2,255,449 UART: Running Caliptra ROM ...
2,256,594 UART:
7,054,926 UART: [state] CFI Enabled
7,071,629 UART: [state] LifecycleState = Unprovisioned
7,073,585 UART: [state] DebugLocked = No
7,075,803 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,081,480 UART: [kat] SHA2-256
7,251,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,261,790 UART: [kat] ++
7,262,255 UART: [kat] sha1
7,272,010 UART: [kat] SHA2-256
7,274,713 UART: [kat] SHA2-384
7,279,140 UART: [kat] SHA2-512-ACC
7,281,497 UART: [kat] ECC-384
9,562,548 UART: [kat] HMAC-384Kdf
9,573,700 UART: [kat] LMS
10,763,852 UART: [kat] --
10,767,641 UART: [cold-reset] ++
10,769,218 UART: [fht] Storing FHT @ 0x50003400
10,780,447 UART: [idev] ++
10,781,020 UART: [idev] CDI.KEYID = 6
10,781,939 UART: [idev] SUBJECT.KEYID = 7
10,783,163 UART: [idev] UDS.KEYID = 0
10,785,765 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,934,758 UART: [idev] Erasing UDS.KEYID = 0
14,073,258 UART: [idev] Using Sha1 for KeyId Algorithm
14,093,897 UART: [idev] --
14,097,583 UART: [ldev] ++
14,098,195 UART: [ldev] CDI.KEYID = 6
14,099,092 UART: [ldev] SUBJECT.KEYID = 5
14,100,363 UART: [ldev] AUTHORITY.KEYID = 7
14,101,607 UART: [ldev] FE.KEYID = 1
14,113,694 UART: [ldev] Erasing FE.KEYID = 1
17,402,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,696,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,710,911 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,725,717 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,740,229 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,028 UART: [ldev] --
19,765,630 UART: [fwproc] Waiting for Commands...
19,768,823 UART: [fwproc] Received command 0x46574c44
19,771,018 UART: [fwproc] Received Image of size 118548 bytes
23,876,024 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,954,591 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,027,775 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,355,575 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,397 writing to cptra_bootfsm_go
4,129,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,155,221 >>> mbox cmd response: failed
13,155,859 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,217 >>> mbox cmd response: failed
13,156,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,156,798 >>> mbox cmd response: failed
Initializing fuses
2,051,044 writing to cptra_bootfsm_go
10,834,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,856,298 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,265 UART:
192,638 UART: Running Caliptra ROM ...
193,731 UART:
193,876 UART: [state] CFI Enabled
265,670 UART: [state] LifecycleState = Unprovisioned
267,642 UART: [state] DebugLocked = No
269,477 UART: [state] WD Timer not started. Device not locked for debugging
272,505 UART: [kat] SHA2-256
452,187 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,954 UART: [kat] ++
463,446 UART: [kat] sha1
474,883 UART: [kat] SHA2-256
477,592 UART: [kat] SHA2-384
483,953 UART: [kat] SHA2-512-ACC
486,303 UART: [kat] ECC-384
2,945,913 UART: [kat] HMAC-384Kdf
2,970,255 UART: [kat] LMS
3,446,753 UART: [kat] --
3,452,705 UART: [cold-reset] ++
3,454,861 UART: [fht] FHT @ 0x50003400
3,465,353 UART: [idev] ++
3,465,925 UART: [idev] CDI.KEYID = 6
3,466,833 UART: [idev] SUBJECT.KEYID = 7
3,468,105 UART: [idev] UDS.KEYID = 0
3,470,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,275 UART: [idev] Erasing UDS.KEYID = 0
5,988,848 UART: [idev] Sha1 KeyId Algorithm
6,012,315 UART: [idev] --
6,017,183 UART: [ldev] ++
6,017,764 UART: [ldev] CDI.KEYID = 6
6,018,684 UART: [ldev] SUBJECT.KEYID = 5
6,019,924 UART: [ldev] AUTHORITY.KEYID = 7
6,021,166 UART: [ldev] FE.KEYID = 1
6,056,335 UART: [ldev] Erasing FE.KEYID = 1
8,563,758 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,044 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,920 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,781 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,797 UART: [ldev] --
10,371,646 UART: [fwproc] Wait for Commands...
10,373,810 UART: [fwproc] Recv command 0x46574c44
10,375,805 UART: [fwproc] Recv'd Img size: 118548 bytes
10,485,040 UART: ROM Fatal Error: 0x000B001C
10,488,271 >>> mbox cmd response: failed
10,488,694 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,489,046 >>> mbox cmd response: failed
10,489,342 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,489,644 >>> mbox cmd response: failed
Initializing fuses
2,059,895 writing to cptra_bootfsm_go
2,249,197 UART:
2,249,538 UART: Running Caliptra ROM ...
2,250,585 UART:
2,250,743 UART: [state] CFI Enabled
2,313,739 UART: [state] LifecycleState = Unprovisioned
2,315,680 UART: [state] DebugLocked = No
2,317,096 UART: [state] WD Timer not started. Device not locked for debugging
2,321,014 UART: [kat] SHA2-256
2,500,704 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,450 UART: [kat] ++
2,511,946 UART: [kat] sha1
2,522,351 UART: [kat] SHA2-256
2,525,047 UART: [kat] SHA2-384
2,531,969 UART: [kat] SHA2-512-ACC
2,534,374 UART: [kat] ECC-384
4,999,231 UART: [kat] HMAC-384Kdf
5,023,192 UART: [kat] LMS
5,499,708 UART: [kat] --
5,504,295 UART: [cold-reset] ++
5,506,674 UART: [fht] FHT @ 0x50003400
5,518,415 UART: [idev] ++
5,518,987 UART: [idev] CDI.KEYID = 6
5,519,957 UART: [idev] SUBJECT.KEYID = 7
5,521,181 UART: [idev] UDS.KEYID = 0
5,524,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,673,503 UART: [idev] Erasing UDS.KEYID = 0
8,038,456 UART: [idev] Sha1 KeyId Algorithm
8,063,684 UART: [idev] --
8,067,285 UART: [ldev] ++
8,067,875 UART: [ldev] CDI.KEYID = 6
8,068,790 UART: [ldev] SUBJECT.KEYID = 5
8,069,957 UART: [ldev] AUTHORITY.KEYID = 7
8,071,256 UART: [ldev] FE.KEYID = 1
8,108,153 UART: [ldev] Erasing FE.KEYID = 1
10,616,223 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,351,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,367,646 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,383,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,399,082 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,421,667 UART: [ldev] --
12,426,826 UART: [fwproc] Wait for Commands...
12,429,158 UART: [fwproc] Recv command 0x46574c44
12,431,149 UART: [fwproc] Recv'd Img size: 118548 bytes
15,906,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,984,347 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,057,378 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,385,913 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
3,463,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,355,638 >>> mbox cmd response: failed
10,356,293 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,356,653 >>> mbox cmd response: failed
10,356,934 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,357,234 >>> mbox cmd response: failed
Initializing fuses
2,060,397 writing to cptra_bootfsm_go
5,514,734 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,289,877 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,377 writing to cptra_bootfsm_go
192,669 UART:
193,016 UART: Running Caliptra ROM ...
194,206 UART:
603,909 UART: [state] CFI Enabled
617,359 UART: [state] LifecycleState = Unprovisioned
619,307 UART: [state] DebugLocked = No
621,945 UART: [state] WD Timer not started. Device not locked for debugging
626,168 UART: [kat] SHA2-256
805,822 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,590 UART: [kat] ++
817,044 UART: [kat] sha1
827,717 UART: [kat] SHA2-256
830,462 UART: [kat] SHA2-384
836,284 UART: [kat] SHA2-512-ACC
838,681 UART: [kat] ECC-384
3,281,337 UART: [kat] HMAC-384Kdf
3,293,195 UART: [kat] LMS
3,769,744 UART: [kat] --
3,775,689 UART: [cold-reset] ++
3,776,820 UART: [fht] FHT @ 0x50003400
3,789,831 UART: [idev] ++
3,790,402 UART: [idev] CDI.KEYID = 6
3,791,424 UART: [idev] SUBJECT.KEYID = 7
3,792,592 UART: [idev] UDS.KEYID = 0
3,795,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,944,585 UART: [idev] Erasing UDS.KEYID = 0
6,270,301 UART: [idev] Sha1 KeyId Algorithm
6,295,034 UART: [idev] --
6,300,423 UART: [ldev] ++
6,301,011 UART: [ldev] CDI.KEYID = 6
6,302,039 UART: [ldev] SUBJECT.KEYID = 5
6,303,158 UART: [ldev] AUTHORITY.KEYID = 7
6,304,399 UART: [ldev] FE.KEYID = 1
6,316,191 UART: [ldev] Erasing FE.KEYID = 1
8,794,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,388 UART: [ldev] --
10,587,954 UART: [fwproc] Wait for Commands...
10,590,703 UART: [fwproc] Recv command 0x46574c44
10,592,706 UART: [fwproc] Recv'd Img size: 118548 bytes
10,709,055 UART: ROM Fatal Error: 0x000B001C
10,712,264 >>> mbox cmd response: failed
10,712,727 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,713,112 >>> mbox cmd response: failed
10,713,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,713,684 >>> mbox cmd response: failed
Initializing fuses
2,057,490 writing to cptra_bootfsm_go
2,246,814 UART:
2,247,180 UART: Running Caliptra ROM ...
2,248,319 UART:
9,738,695 UART: [state] CFI Enabled
9,752,237 UART: [state] LifecycleState = Unprovisioned
9,754,185 UART: [state] DebugLocked = No
9,755,699 UART: [state] WD Timer not started. Device not locked for debugging
9,759,837 UART: [kat] SHA2-256
9,939,494 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,950,297 UART: [kat] ++
9,950,762 UART: [kat] sha1
9,961,603 UART: [kat] SHA2-256
9,964,304 UART: [kat] SHA2-384
9,970,036 UART: [kat] SHA2-512-ACC
9,972,418 UART: [kat] ECC-384
12,414,374 UART: [kat] HMAC-384Kdf
12,428,065 UART: [kat] LMS
12,904,556 UART: [kat] --
12,907,925 UART: [cold-reset] ++
12,910,135 UART: [fht] FHT @ 0x50003400
12,922,361 UART: [idev] ++
12,922,942 UART: [idev] CDI.KEYID = 6
12,923,858 UART: [idev] SUBJECT.KEYID = 7
12,925,135 UART: [idev] UDS.KEYID = 0
12,928,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,077,240 UART: [idev] Erasing UDS.KEYID = 0
15,398,824 UART: [idev] Sha1 KeyId Algorithm
15,423,521 UART: [idev] --
15,428,467 UART: [ldev] ++
15,429,049 UART: [ldev] CDI.KEYID = 6
15,429,962 UART: [ldev] SUBJECT.KEYID = 5
15,431,180 UART: [ldev] AUTHORITY.KEYID = 7
15,432,418 UART: [ldev] FE.KEYID = 1
15,443,770 UART: [ldev] Erasing FE.KEYID = 1
17,924,162 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,645,268 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,661,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,676,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,692,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,713,118 UART: [ldev] --
19,718,384 UART: [fwproc] Wait for Commands...
19,721,410 UART: [fwproc] Recv command 0x46574c44
19,723,461 UART: [fwproc] Recv'd Img size: 118548 bytes
23,212,751 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,287,606 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,360,631 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,689,636 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,609 writing to cptra_bootfsm_go
3,780,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,584,586 >>> mbox cmd response: failed
10,585,153 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,496 >>> mbox cmd response: failed
10,585,770 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,586,063 >>> mbox cmd response: failed
Initializing fuses
2,062,759 writing to cptra_bootfsm_go
13,054,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,724,059 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,086 writing to cptra_bootfsm_go
192,293 UART:
192,648 UART: Running Caliptra ROM ...
193,826 UART:
193,982 UART: [state] CFI Enabled
261,522 UART: [state] LifecycleState = Unprovisioned
263,891 UART: [state] DebugLocked = No
266,525 UART: [state] WD Timer not started. Device not locked for debugging
270,364 UART: [kat] SHA2-256
460,229 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,992 UART: [kat] ++
471,647 UART: [kat] sha1
482,164 UART: [kat] SHA2-256
485,140 UART: [kat] SHA2-384
491,017 UART: [kat] SHA2-512-ACC
493,589 UART: [kat] ECC-384
2,946,888 UART: [kat] HMAC-384Kdf
2,962,591 UART: [kat] LMS
3,494,388 UART: [kat] --
3,498,018 UART: [cold-reset] ++
3,499,067 UART: [fht] FHT @ 0x50003400
3,510,290 UART: [idev] ++
3,510,986 UART: [idev] CDI.KEYID = 6
3,511,907 UART: [idev] SUBJECT.KEYID = 7
3,513,131 UART: [idev] UDS.KEYID = 0
3,516,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,665,516 UART: [idev] Erasing UDS.KEYID = 0
6,020,165 UART: [idev] Sha1 KeyId Algorithm
6,043,026 UART: [idev] --
6,049,047 UART: [ldev] ++
6,049,744 UART: [ldev] CDI.KEYID = 6
6,050,663 UART: [ldev] SUBJECT.KEYID = 5
6,051,833 UART: [ldev] AUTHORITY.KEYID = 7
6,053,073 UART: [ldev] FE.KEYID = 1
6,090,850 UART: [ldev] Erasing FE.KEYID = 1
8,598,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,007 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,404 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,182 UART: [ldev] --
10,405,784 UART: [fwproc] Wait for Commands...
10,408,205 UART: [fwproc] Recv command 0x46574c44
10,410,473 UART: [fwproc] Recv'd Img size: 118548 bytes
10,541,127 UART: ROM Fatal Error: 0x000B001C
10,544,777 >>> mbox cmd response: failed
10,545,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,545,449 >>> mbox cmd response: failed
10,545,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,013 >>> mbox cmd response: failed
Initializing fuses
2,060,818 writing to cptra_bootfsm_go
2,250,137 UART:
2,250,485 UART: Running Caliptra ROM ...
2,251,534 UART:
2,251,693 UART: [state] CFI Enabled
2,314,208 UART: [state] LifecycleState = Unprovisioned
2,316,593 UART: [state] DebugLocked = No
2,318,570 UART: [state] WD Timer not started. Device not locked for debugging
2,322,319 UART: [kat] SHA2-256
2,512,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,762 UART: [kat] ++
2,523,230 UART: [kat] sha1
2,534,393 UART: [kat] SHA2-256
2,537,421 UART: [kat] SHA2-384
2,543,850 UART: [kat] SHA2-512-ACC
2,546,422 UART: [kat] ECC-384
4,998,182 UART: [kat] HMAC-384Kdf
5,024,147 UART: [kat] LMS
5,555,932 UART: [kat] --
5,559,816 UART: [cold-reset] ++
5,561,321 UART: [fht] FHT @ 0x50003400
5,572,471 UART: [idev] ++
5,573,156 UART: [idev] CDI.KEYID = 6
5,574,123 UART: [idev] SUBJECT.KEYID = 7
5,575,342 UART: [idev] UDS.KEYID = 0
5,577,656 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,726,845 UART: [idev] Erasing UDS.KEYID = 0
8,081,947 UART: [idev] Sha1 KeyId Algorithm
8,104,060 UART: [idev] --
8,109,358 UART: [ldev] ++
8,110,043 UART: [ldev] CDI.KEYID = 6
8,110,961 UART: [ldev] SUBJECT.KEYID = 5
8,112,125 UART: [ldev] AUTHORITY.KEYID = 7
8,113,364 UART: [ldev] FE.KEYID = 1
8,153,406 UART: [ldev] Erasing FE.KEYID = 1
10,659,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,394,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,409,781 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,424,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,440,125 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,460,763 UART: [ldev] --
12,466,676 UART: [fwproc] Wait for Commands...
12,469,699 UART: [fwproc] Recv command 0x46574c44
12,472,131 UART: [fwproc] Recv'd Img size: 118548 bytes
15,965,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,039,578 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,163,216 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,724,083 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,441,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,342,224 >>> mbox cmd response: failed
10,342,759 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,107 >>> mbox cmd response: failed
10,343,385 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,343,682 >>> mbox cmd response: failed
Initializing fuses
2,065,659 writing to cptra_bootfsm_go
5,489,628 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,857,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
192,458 UART:
192,946 UART: Running Caliptra ROM ...
194,058 UART:
603,627 UART: [state] CFI Enabled
616,014 UART: [state] LifecycleState = Unprovisioned
618,361 UART: [state] DebugLocked = No
620,072 UART: [state] WD Timer not started. Device not locked for debugging
624,909 UART: [kat] SHA2-256
814,823 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,584 UART: [kat] ++
826,179 UART: [kat] sha1
837,229 UART: [kat] SHA2-256
840,255 UART: [kat] SHA2-384
846,841 UART: [kat] SHA2-512-ACC
849,459 UART: [kat] ECC-384
3,291,629 UART: [kat] HMAC-384Kdf
3,305,599 UART: [kat] LMS
3,837,446 UART: [kat] --
3,841,654 UART: [cold-reset] ++
3,842,727 UART: [fht] FHT @ 0x50003400
3,854,523 UART: [idev] ++
3,855,209 UART: [idev] CDI.KEYID = 6
3,856,128 UART: [idev] SUBJECT.KEYID = 7
3,857,342 UART: [idev] UDS.KEYID = 0
3,860,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,449 UART: [idev] Erasing UDS.KEYID = 0
6,331,287 UART: [idev] Sha1 KeyId Algorithm
6,353,552 UART: [idev] --
6,358,981 UART: [ldev] ++
6,359,673 UART: [ldev] CDI.KEYID = 6
6,360,563 UART: [ldev] SUBJECT.KEYID = 5
6,361,796 UART: [ldev] AUTHORITY.KEYID = 7
6,362,903 UART: [ldev] FE.KEYID = 1
6,374,226 UART: [ldev] Erasing FE.KEYID = 1
8,853,615 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,112 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,602,482 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,574 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,791 UART: [ldev] --
10,643,647 UART: [fwproc] Wait for Commands...
10,646,838 UART: [fwproc] Recv command 0x46574c44
10,649,104 UART: [fwproc] Recv'd Img size: 118548 bytes
10,773,762 UART: ROM Fatal Error: 0x000B001C
10,777,456 >>> mbox cmd response: failed
10,777,878 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,778,203 >>> mbox cmd response: failed
10,778,475 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,778,777 >>> mbox cmd response: failed
Initializing fuses
2,059,717 writing to cptra_bootfsm_go
2,249,057 UART:
2,249,413 UART: Running Caliptra ROM ...
2,250,569 UART:
9,670,507 UART: [state] CFI Enabled
9,684,156 UART: [state] LifecycleState = Unprovisioned
9,686,526 UART: [state] DebugLocked = No
9,688,682 UART: [state] WD Timer not started. Device not locked for debugging
9,693,591 UART: [kat] SHA2-256
9,883,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,894,249 UART: [kat] ++
9,894,854 UART: [kat] sha1
9,906,354 UART: [kat] SHA2-256
9,909,325 UART: [kat] SHA2-384
9,916,522 UART: [kat] SHA2-512-ACC
9,919,154 UART: [kat] ECC-384
12,360,246 UART: [kat] HMAC-384Kdf
12,373,227 UART: [kat] LMS
12,905,017 UART: [kat] --
12,909,778 UART: [cold-reset] ++
12,910,839 UART: [fht] FHT @ 0x50003400
12,921,704 UART: [idev] ++
12,922,307 UART: [idev] CDI.KEYID = 6
12,923,382 UART: [idev] SUBJECT.KEYID = 7
12,924,491 UART: [idev] UDS.KEYID = 0
12,926,931 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,075,752 UART: [idev] Erasing UDS.KEYID = 0
15,399,701 UART: [idev] Sha1 KeyId Algorithm
15,422,622 UART: [idev] --
15,426,700 UART: [ldev] ++
15,427,400 UART: [ldev] CDI.KEYID = 6
15,428,315 UART: [ldev] SUBJECT.KEYID = 5
15,429,535 UART: [ldev] AUTHORITY.KEYID = 7
15,430,718 UART: [ldev] FE.KEYID = 1
15,442,178 UART: [ldev] Erasing FE.KEYID = 1
17,918,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,640,629 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,655,826 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,671,013 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,686,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,705,491 UART: [ldev] --
19,710,819 UART: [fwproc] Wait for Commands...
19,713,681 UART: [fwproc] Recv command 0x46574c44
19,715,954 UART: [fwproc] Recv'd Img size: 118548 bytes
23,213,076 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,287,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,411,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,972,524 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,189 writing to cptra_bootfsm_go
3,761,652 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,579,083 >>> mbox cmd response: failed
10,579,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,579,991 >>> mbox cmd response: failed
10,580,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,580,568 >>> mbox cmd response: failed
Initializing fuses
2,059,235 writing to cptra_bootfsm_go
13,042,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,323,946 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,802 UART: [state] LifecycleState = Unprovisioned
86,457 UART: [state] DebugLocked = No
86,959 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,641 UART: [kat] SHA2-256
882,572 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,687 UART: [kat] ++
886,839 UART: [kat] sha1
891,041 UART: [kat] SHA2-256
892,979 UART: [kat] SHA2-384
895,714 UART: [kat] SHA2-512-ACC
897,615 UART: [kat] ECC-384
903,014 UART: [kat] HMAC-384Kdf
907,694 UART: [kat] LMS
1,475,890 UART: [kat] --
1,476,917 UART: [cold-reset] ++
1,477,275 UART: [fht] Storing FHT @ 0x50003400
1,480,036 UART: [idev] ++
1,480,204 UART: [idev] CDI.KEYID = 6
1,480,564 UART: [idev] SUBJECT.KEYID = 7
1,480,988 UART: [idev] UDS.KEYID = 0
1,481,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,848 UART: [idev] Erasing UDS.KEYID = 0
1,505,786 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,352 UART: [idev] --
1,515,425 UART: [ldev] ++
1,515,593 UART: [ldev] CDI.KEYID = 6
1,515,956 UART: [ldev] SUBJECT.KEYID = 5
1,516,382 UART: [ldev] AUTHORITY.KEYID = 7
1,516,845 UART: [ldev] FE.KEYID = 1
1,522,073 UART: [ldev] Erasing FE.KEYID = 1
1,547,432 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,880 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,592 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,730 UART: [ldev] --
1,587,035 UART: [fwproc] Waiting for Commands...
1,587,682 UART: [fwproc] Received command 0x46574c44
1,588,473 UART: [fwproc] Received Image of size 118548 bytes
1,623,479 UART: ROM Fatal Error: 0x000B001C
1,624,638 >>> mbox cmd response: failed
1,624,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,644 >>> mbox cmd response: failed
1,624,644 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,624,650 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,577 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,277 UART: [kat] SHA2-256
882,208 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,323 UART: [kat] ++
886,475 UART: [kat] sha1
890,711 UART: [kat] SHA2-256
892,649 UART: [kat] SHA2-384
895,454 UART: [kat] SHA2-512-ACC
897,355 UART: [kat] ECC-384
902,770 UART: [kat] HMAC-384Kdf
907,526 UART: [kat] LMS
1,475,722 UART: [kat] --
1,476,317 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,512 UART: [idev] ++
1,479,680 UART: [idev] CDI.KEYID = 6
1,480,040 UART: [idev] SUBJECT.KEYID = 7
1,480,464 UART: [idev] UDS.KEYID = 0
1,480,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,672 UART: [idev] Erasing UDS.KEYID = 0
1,505,058 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,554 UART: [idev] --
1,514,667 UART: [ldev] ++
1,514,835 UART: [ldev] CDI.KEYID = 6
1,515,198 UART: [ldev] SUBJECT.KEYID = 5
1,515,624 UART: [ldev] AUTHORITY.KEYID = 7
1,516,087 UART: [ldev] FE.KEYID = 1
1,521,437 UART: [ldev] Erasing FE.KEYID = 1
1,546,920 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,169 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,060 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,772 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,852 UART: [ldev] --
1,586,215 UART: [fwproc] Waiting for Commands...
1,587,018 UART: [fwproc] Received command 0x46574c44
1,587,809 UART: [fwproc] Received Image of size 118548 bytes
2,932,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,594 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,812 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,055 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,476,873 >>> mbox cmd response: failed
1,476,873 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,879 >>> mbox cmd response: failed
1,476,879 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,476,885 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,255 UART: [state] LifecycleState = Unprovisioned
85,910 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,160 UART: [kat] SHA2-256
882,091 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,206 UART: [kat] ++
886,358 UART: [kat] sha1
890,462 UART: [kat] SHA2-256
892,400 UART: [kat] SHA2-384
895,247 UART: [kat] SHA2-512-ACC
897,148 UART: [kat] ECC-384
902,905 UART: [kat] HMAC-384Kdf
907,609 UART: [kat] LMS
1,475,805 UART: [kat] --
1,476,778 UART: [cold-reset] ++
1,477,130 UART: [fht] Storing FHT @ 0x50003400
1,480,013 UART: [idev] ++
1,480,181 UART: [idev] CDI.KEYID = 6
1,480,541 UART: [idev] SUBJECT.KEYID = 7
1,480,965 UART: [idev] UDS.KEYID = 0
1,481,310 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,506,201 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,611 UART: [idev] --
1,515,558 UART: [ldev] ++
1,515,726 UART: [ldev] CDI.KEYID = 6
1,516,089 UART: [ldev] SUBJECT.KEYID = 5
1,516,515 UART: [ldev] AUTHORITY.KEYID = 7
1,516,978 UART: [ldev] FE.KEYID = 1
1,522,186 UART: [ldev] Erasing FE.KEYID = 1
1,547,599 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,250 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,966 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,857 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,569 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,727 UART: [ldev] --
1,587,002 UART: [fwproc] Waiting for Commands...
1,587,849 UART: [fwproc] Received command 0x46574c44
1,588,640 UART: [fwproc] Received Image of size 118548 bytes
1,624,564 UART: ROM Fatal Error: 0x000B001C
1,625,723 >>> mbox cmd response: failed
1,625,723 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,729 >>> mbox cmd response: failed
1,625,729 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,271 UART: [state] LifecycleState = Unprovisioned
85,926 UART: [state] DebugLocked = No
86,496 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,214 UART: [kat] SHA2-256
882,145 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,260 UART: [kat] ++
886,412 UART: [kat] sha1
890,556 UART: [kat] SHA2-256
892,494 UART: [kat] SHA2-384
895,251 UART: [kat] SHA2-512-ACC
897,152 UART: [kat] ECC-384
902,877 UART: [kat] HMAC-384Kdf
907,561 UART: [kat] LMS
1,475,757 UART: [kat] --
1,476,576 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,575 UART: [idev] ++
1,479,743 UART: [idev] CDI.KEYID = 6
1,480,103 UART: [idev] SUBJECT.KEYID = 7
1,480,527 UART: [idev] UDS.KEYID = 0
1,480,872 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,653 UART: [idev] Erasing UDS.KEYID = 0
1,505,879 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,305 UART: [idev] --
1,515,466 UART: [ldev] ++
1,515,634 UART: [ldev] CDI.KEYID = 6
1,515,997 UART: [ldev] SUBJECT.KEYID = 5
1,516,423 UART: [ldev] AUTHORITY.KEYID = 7
1,516,886 UART: [ldev] FE.KEYID = 1
1,522,246 UART: [ldev] Erasing FE.KEYID = 1
1,547,679 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,078 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,821 UART: [ldev] --
1,587,238 UART: [fwproc] Waiting for Commands...
1,588,041 UART: [fwproc] Received command 0x46574c44
1,588,832 UART: [fwproc] Received Image of size 118548 bytes
2,932,579 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,075 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,293 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,546 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,284 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,812 >>> mbox cmd response: failed
1,477,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,818 >>> mbox cmd response: failed
1,477,818 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,154 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,120 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,645 UART: [state] WD Timer not started. Device not locked for debugging
88,002 UART: [kat] SHA2-256
891,552 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,656 UART: [kat] ++
895,808 UART: [kat] sha1
899,958 UART: [kat] SHA2-256
901,898 UART: [kat] SHA2-384
904,749 UART: [kat] SHA2-512-ACC
906,650 UART: [kat] ECC-384
916,455 UART: [kat] HMAC-384Kdf
920,911 UART: [kat] LMS
1,169,223 UART: [kat] --
1,169,858 UART: [cold-reset] ++
1,170,320 UART: [fht] FHT @ 0x50003400
1,172,944 UART: [idev] ++
1,173,112 UART: [idev] CDI.KEYID = 6
1,173,473 UART: [idev] SUBJECT.KEYID = 7
1,173,898 UART: [idev] UDS.KEYID = 0
1,174,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,975 UART: [idev] Erasing UDS.KEYID = 0
1,199,503 UART: [idev] Sha1 KeyId Algorithm
1,208,407 UART: [idev] --
1,209,386 UART: [ldev] ++
1,209,554 UART: [ldev] CDI.KEYID = 6
1,209,918 UART: [ldev] SUBJECT.KEYID = 5
1,210,345 UART: [ldev] AUTHORITY.KEYID = 7
1,210,808 UART: [ldev] FE.KEYID = 1
1,215,844 UART: [ldev] Erasing FE.KEYID = 1
1,241,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,782 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,808 UART: [ldev] --
1,281,221 UART: [fwproc] Wait for Commands...
1,281,994 UART: [fwproc] Recv command 0x46574c44
1,282,727 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,524 UART: ROM Fatal Error: 0x000B001C
1,318,683 >>> mbox cmd response: failed
1,318,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,689 >>> mbox cmd response: failed
1,318,689 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,695 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,476 UART: [kat] SHA2-256
891,026 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,130 UART: [kat] ++
895,282 UART: [kat] sha1
899,570 UART: [kat] SHA2-256
901,510 UART: [kat] SHA2-384
904,117 UART: [kat] SHA2-512-ACC
906,018 UART: [kat] ECC-384
915,757 UART: [kat] HMAC-384Kdf
920,277 UART: [kat] LMS
1,168,589 UART: [kat] --
1,169,516 UART: [cold-reset] ++
1,169,908 UART: [fht] FHT @ 0x50003400
1,172,604 UART: [idev] ++
1,172,772 UART: [idev] CDI.KEYID = 6
1,173,133 UART: [idev] SUBJECT.KEYID = 7
1,173,558 UART: [idev] UDS.KEYID = 0
1,173,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,121 UART: [idev] Erasing UDS.KEYID = 0
1,198,031 UART: [idev] Sha1 KeyId Algorithm
1,206,953 UART: [idev] --
1,207,882 UART: [ldev] ++
1,208,050 UART: [ldev] CDI.KEYID = 6
1,208,414 UART: [ldev] SUBJECT.KEYID = 5
1,208,841 UART: [ldev] AUTHORITY.KEYID = 7
1,209,304 UART: [ldev] FE.KEYID = 1
1,214,798 UART: [ldev] Erasing FE.KEYID = 1
1,240,945 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,771 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,487 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,088 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,164 UART: [ldev] --
1,280,405 UART: [fwproc] Wait for Commands...
1,281,086 UART: [fwproc] Recv command 0x46574c44
1,281,819 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,701 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,382 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,557 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,884 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,406 >>> mbox cmd response: failed
1,173,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,412 >>> mbox cmd response: failed
1,173,412 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,418 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,891 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,079 UART: [state] LifecycleState = Unprovisioned
85,734 UART: [state] DebugLocked = No
86,374 UART: [state] WD Timer not started. Device not locked for debugging
87,485 UART: [kat] SHA2-256
891,035 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,139 UART: [kat] ++
895,291 UART: [kat] sha1
899,579 UART: [kat] SHA2-256
901,519 UART: [kat] SHA2-384
904,128 UART: [kat] SHA2-512-ACC
906,029 UART: [kat] ECC-384
915,460 UART: [kat] HMAC-384Kdf
920,142 UART: [kat] LMS
1,168,454 UART: [kat] --
1,169,277 UART: [cold-reset] ++
1,169,799 UART: [fht] FHT @ 0x50003400
1,172,457 UART: [idev] ++
1,172,625 UART: [idev] CDI.KEYID = 6
1,172,986 UART: [idev] SUBJECT.KEYID = 7
1,173,411 UART: [idev] UDS.KEYID = 0
1,173,757 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,350 UART: [idev] Erasing UDS.KEYID = 0
1,198,888 UART: [idev] Sha1 KeyId Algorithm
1,207,792 UART: [idev] --
1,208,815 UART: [ldev] ++
1,208,983 UART: [ldev] CDI.KEYID = 6
1,209,347 UART: [ldev] SUBJECT.KEYID = 5
1,209,774 UART: [ldev] AUTHORITY.KEYID = 7
1,210,237 UART: [ldev] FE.KEYID = 1
1,215,581 UART: [ldev] Erasing FE.KEYID = 1
1,241,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,705 UART: [ldev] --
1,280,970 UART: [fwproc] Wait for Commands...
1,281,717 UART: [fwproc] Recv command 0x46574c44
1,282,450 UART: [fwproc] Recv'd Img size: 118548 bytes
1,317,425 UART: ROM Fatal Error: 0x000B001C
1,318,584 >>> mbox cmd response: failed
1,318,584 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,590 >>> mbox cmd response: failed
1,318,590 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,318,596 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
900,209 UART: [kat] SHA2-256
902,149 UART: [kat] SHA2-384
904,936 UART: [kat] SHA2-512-ACC
906,837 UART: [kat] ECC-384
917,078 UART: [kat] HMAC-384Kdf
921,548 UART: [kat] LMS
1,169,860 UART: [kat] --
1,170,535 UART: [cold-reset] ++
1,171,019 UART: [fht] FHT @ 0x50003400
1,173,667 UART: [idev] ++
1,173,835 UART: [idev] CDI.KEYID = 6
1,174,196 UART: [idev] SUBJECT.KEYID = 7
1,174,621 UART: [idev] UDS.KEYID = 0
1,174,967 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,482 UART: [idev] Erasing UDS.KEYID = 0
1,199,870 UART: [idev] Sha1 KeyId Algorithm
1,208,922 UART: [idev] --
1,209,971 UART: [ldev] ++
1,210,139 UART: [ldev] CDI.KEYID = 6
1,210,503 UART: [ldev] SUBJECT.KEYID = 5
1,210,930 UART: [ldev] AUTHORITY.KEYID = 7
1,211,393 UART: [ldev] FE.KEYID = 1
1,216,307 UART: [ldev] Erasing FE.KEYID = 1
1,242,300 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,698 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,587 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,445 UART: [ldev] --
1,281,722 UART: [fwproc] Wait for Commands...
1,282,311 UART: [fwproc] Recv command 0x46574c44
1,283,044 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,438 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,813 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,988 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,377 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,933 >>> mbox cmd response: failed
1,175,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,939 >>> mbox cmd response: failed
1,175,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,984 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,516 UART: [state] LifecycleState = Unprovisioned
86,171 UART: [state] DebugLocked = No
86,905 UART: [state] WD Timer not started. Device not locked for debugging
88,102 UART: [kat] SHA2-256
893,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,877 UART: [kat] ++
898,029 UART: [kat] sha1
902,201 UART: [kat] SHA2-256
904,141 UART: [kat] SHA2-384
907,102 UART: [kat] SHA2-512-ACC
909,003 UART: [kat] ECC-384
918,510 UART: [kat] HMAC-384Kdf
923,078 UART: [kat] LMS
1,171,406 UART: [kat] --
1,172,321 UART: [cold-reset] ++
1,172,899 UART: [fht] FHT @ 0x50003400
1,175,416 UART: [idev] ++
1,175,584 UART: [idev] CDI.KEYID = 6
1,175,944 UART: [idev] SUBJECT.KEYID = 7
1,176,368 UART: [idev] UDS.KEYID = 0
1,176,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,556 UART: [idev] Erasing UDS.KEYID = 0
1,201,473 UART: [idev] Sha1 KeyId Algorithm
1,209,935 UART: [idev] --
1,211,129 UART: [ldev] ++
1,211,297 UART: [ldev] CDI.KEYID = 6
1,211,660 UART: [ldev] SUBJECT.KEYID = 5
1,212,086 UART: [ldev] AUTHORITY.KEYID = 7
1,212,549 UART: [ldev] FE.KEYID = 1
1,217,695 UART: [ldev] Erasing FE.KEYID = 1
1,244,610 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,755 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,074 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,025 UART: [ldev] --
1,283,460 UART: [fwproc] Wait for Commands...
1,284,126 UART: [fwproc] Recv command 0x46574c44
1,284,854 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,602 UART: ROM Fatal Error: 0x000B001C
1,321,761 >>> mbox cmd response: failed
1,321,761 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,767 >>> mbox cmd response: failed
1,321,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,773 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,916 UART: [state] LifecycleState = Unprovisioned
85,571 UART: [state] DebugLocked = No
86,109 UART: [state] WD Timer not started. Device not locked for debugging
87,372 UART: [kat] SHA2-256
893,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,147 UART: [kat] ++
897,299 UART: [kat] sha1
901,521 UART: [kat] SHA2-256
903,461 UART: [kat] SHA2-384
906,030 UART: [kat] SHA2-512-ACC
907,931 UART: [kat] ECC-384
917,540 UART: [kat] HMAC-384Kdf
922,186 UART: [kat] LMS
1,170,514 UART: [kat] --
1,171,681 UART: [cold-reset] ++
1,172,115 UART: [fht] FHT @ 0x50003400
1,174,802 UART: [idev] ++
1,174,970 UART: [idev] CDI.KEYID = 6
1,175,330 UART: [idev] SUBJECT.KEYID = 7
1,175,754 UART: [idev] UDS.KEYID = 0
1,176,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,884 UART: [idev] Erasing UDS.KEYID = 0
1,200,701 UART: [idev] Sha1 KeyId Algorithm
1,209,329 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,018 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,217,233 UART: [ldev] Erasing FE.KEYID = 1
1,243,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,987 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,703 UART: [ldev] --
1,283,106 UART: [fwproc] Wait for Commands...
1,283,700 UART: [fwproc] Recv command 0x46574c44
1,284,428 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,030 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,611 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,781 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,064 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,620 >>> mbox cmd response: failed
1,175,620 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,626 >>> mbox cmd response: failed
1,175,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,632 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,691 UART: [state] LifecycleState = Unprovisioned
86,346 UART: [state] DebugLocked = No
86,882 UART: [state] WD Timer not started. Device not locked for debugging
88,203 UART: [kat] SHA2-256
893,853 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,978 UART: [kat] ++
898,130 UART: [kat] sha1
902,266 UART: [kat] SHA2-256
904,206 UART: [kat] SHA2-384
906,923 UART: [kat] SHA2-512-ACC
908,824 UART: [kat] ECC-384
918,995 UART: [kat] HMAC-384Kdf
923,631 UART: [kat] LMS
1,171,959 UART: [kat] --
1,172,842 UART: [cold-reset] ++
1,173,344 UART: [fht] FHT @ 0x50003400
1,175,895 UART: [idev] ++
1,176,063 UART: [idev] CDI.KEYID = 6
1,176,423 UART: [idev] SUBJECT.KEYID = 7
1,176,847 UART: [idev] UDS.KEYID = 0
1,177,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,007 UART: [idev] Erasing UDS.KEYID = 0
1,202,256 UART: [idev] Sha1 KeyId Algorithm
1,210,832 UART: [idev] --
1,211,976 UART: [ldev] ++
1,212,144 UART: [ldev] CDI.KEYID = 6
1,212,507 UART: [ldev] SUBJECT.KEYID = 5
1,212,933 UART: [ldev] AUTHORITY.KEYID = 7
1,213,396 UART: [ldev] FE.KEYID = 1
1,218,846 UART: [ldev] Erasing FE.KEYID = 1
1,245,547 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,597 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,309 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,296 UART: [ldev] --
1,284,709 UART: [fwproc] Wait for Commands...
1,285,457 UART: [fwproc] Recv command 0x46574c44
1,286,185 UART: [fwproc] Recv'd Img size: 118548 bytes
1,321,385 UART: ROM Fatal Error: 0x000B001C
1,322,544 >>> mbox cmd response: failed
1,322,544 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,550 >>> mbox cmd response: failed
1,322,550 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,322,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,870 UART: [state] WD Timer not started. Device not locked for debugging
88,181 UART: [kat] SHA2-256
893,831 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,956 UART: [kat] ++
898,108 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
907,129 UART: [kat] SHA2-512-ACC
909,030 UART: [kat] ECC-384
918,903 UART: [kat] HMAC-384Kdf
923,535 UART: [kat] LMS
1,171,863 UART: [kat] --
1,172,948 UART: [cold-reset] ++
1,173,524 UART: [fht] FHT @ 0x50003400
1,176,257 UART: [idev] ++
1,176,425 UART: [idev] CDI.KEYID = 6
1,176,785 UART: [idev] SUBJECT.KEYID = 7
1,177,209 UART: [idev] UDS.KEYID = 0
1,177,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,143 UART: [idev] Erasing UDS.KEYID = 0
1,201,820 UART: [idev] Sha1 KeyId Algorithm
1,210,186 UART: [idev] --
1,211,128 UART: [ldev] ++
1,211,296 UART: [ldev] CDI.KEYID = 6
1,211,659 UART: [ldev] SUBJECT.KEYID = 5
1,212,085 UART: [ldev] AUTHORITY.KEYID = 7
1,212,548 UART: [ldev] FE.KEYID = 1
1,218,108 UART: [ldev] Erasing FE.KEYID = 1
1,244,637 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,042 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,933 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,645 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,648 UART: [ldev] --
1,284,053 UART: [fwproc] Wait for Commands...
1,284,693 UART: [fwproc] Recv command 0x46574c44
1,285,421 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,461 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,684 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,854 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,017 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,741 >>> mbox cmd response: failed
1,174,741 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,747 >>> mbox cmd response: failed
1,174,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,826 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_signature_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,992 writing to cptra_bootfsm_go
3,467,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,429,275 >>> mbox cmd response: failed
10,429,847 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,430,196 >>> mbox cmd response: failed
10,430,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,430,827 >>> mbox cmd response: failed
Initializing fuses
2,063,658 writing to cptra_bootfsm_go
5,494,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,324,546 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
3,444,941 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,382,266 >>> mbox cmd response: failed
10,382,912 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,383,275 >>> mbox cmd response: failed
10,383,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,383,802 >>> mbox cmd response: failed
Initializing fuses
2,062,859 writing to cptra_bootfsm_go
5,493,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,321,688 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
3,780,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,627,866 >>> mbox cmd response: failed
10,628,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,628,749 >>> mbox cmd response: failed
10,629,026 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,629,325 >>> mbox cmd response: failed
Initializing fuses
2,060,949 writing to cptra_bootfsm_go
13,016,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,725,166 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
3,779,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,623,951 >>> mbox cmd response: failed
10,624,756 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,133 >>> mbox cmd response: failed
10,625,407 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,625,699 >>> mbox cmd response: failed
Initializing fuses
2,068,816 writing to cptra_bootfsm_go
13,022,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,739,661 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
3,439,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,397,292 >>> mbox cmd response: failed
10,397,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,250 >>> mbox cmd response: failed
10,398,522 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,398,815 >>> mbox cmd response: failed
Initializing fuses
2,062,994 writing to cptra_bootfsm_go
5,495,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,316,856 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,448,551 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,415,895 >>> mbox cmd response: failed
10,416,676 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,417,052 >>> mbox cmd response: failed
10,417,336 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,417,640 >>> mbox cmd response: failed
Initializing fuses
2,061,863 writing to cptra_bootfsm_go
5,511,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,345,698 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,780,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,630,062 >>> mbox cmd response: failed
10,630,683 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,044 >>> mbox cmd response: failed
10,631,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,631,610 >>> mbox cmd response: failed
Initializing fuses
2,060,395 writing to cptra_bootfsm_go
13,005,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,717,927 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
3,782,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,626,806 >>> mbox cmd response: failed
10,627,381 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,627,749 >>> mbox cmd response: failed
10,628,023 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,628,322 >>> mbox cmd response: failed
Initializing fuses
2,062,169 writing to cptra_bootfsm_go
13,017,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,726,544 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,933 >>> mbox cmd response: failed
1,198,933 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,939 >>> mbox cmd response: failed
1,198,939 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,945 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,367 UART: [state] WD Timer not started. Device not locked for debugging
87,610 UART: [kat] SHA2-256
891,160 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,264 UART: [kat] ++
895,416 UART: [kat] sha1
899,832 UART: [kat] SHA2-256
901,772 UART: [kat] SHA2-384
904,597 UART: [kat] SHA2-512-ACC
906,498 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,947 UART: [kat] LMS
1,169,259 UART: [kat] --
1,170,242 UART: [cold-reset] ++
1,170,756 UART: [fht] FHT @ 0x50003400
1,173,470 UART: [idev] ++
1,173,638 UART: [idev] CDI.KEYID = 6
1,173,999 UART: [idev] SUBJECT.KEYID = 7
1,174,424 UART: [idev] UDS.KEYID = 0
1,174,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,345 UART: [idev] Erasing UDS.KEYID = 0
1,199,779 UART: [idev] Sha1 KeyId Algorithm
1,208,837 UART: [idev] --
1,209,824 UART: [ldev] ++
1,209,992 UART: [ldev] CDI.KEYID = 6
1,210,356 UART: [ldev] SUBJECT.KEYID = 5
1,210,783 UART: [ldev] AUTHORITY.KEYID = 7
1,211,246 UART: [ldev] FE.KEYID = 1
1,216,484 UART: [ldev] Erasing FE.KEYID = 1
1,242,821 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,539 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,255 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,856 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,964 UART: [ldev] --
1,282,257 UART: [fwproc] Wait for Commands...
1,283,064 UART: [fwproc] Recv command 0x46574c44
1,283,797 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,509 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,280 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,455 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,824 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,913 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,949 >>> mbox cmd response: failed
1,197,949 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,955 >>> mbox cmd response: failed
1,197,955 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,961 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,269 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,198,304 >>> mbox cmd response: failed
1,198,304 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,310 >>> mbox cmd response: failed
1,198,310 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,198,316 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,845 UART: [state] LifecycleState = Unprovisioned
85,500 UART: [state] DebugLocked = No
85,994 UART: [state] WD Timer not started. Device not locked for debugging
87,117 UART: [kat] SHA2-256
890,667 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,771 UART: [kat] ++
894,923 UART: [kat] sha1
899,179 UART: [kat] SHA2-256
901,119 UART: [kat] SHA2-384
903,754 UART: [kat] SHA2-512-ACC
905,655 UART: [kat] ECC-384
915,836 UART: [kat] HMAC-384Kdf
920,264 UART: [kat] LMS
1,168,576 UART: [kat] --
1,169,289 UART: [cold-reset] ++
1,169,679 UART: [fht] FHT @ 0x50003400
1,172,363 UART: [idev] ++
1,172,531 UART: [idev] CDI.KEYID = 6
1,172,892 UART: [idev] SUBJECT.KEYID = 7
1,173,317 UART: [idev] UDS.KEYID = 0
1,173,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,178 UART: [idev] Erasing UDS.KEYID = 0
1,198,386 UART: [idev] Sha1 KeyId Algorithm
1,207,184 UART: [idev] --
1,208,201 UART: [ldev] ++
1,208,369 UART: [ldev] CDI.KEYID = 6
1,208,733 UART: [ldev] SUBJECT.KEYID = 5
1,209,160 UART: [ldev] AUTHORITY.KEYID = 7
1,209,623 UART: [ldev] FE.KEYID = 1
1,214,941 UART: [ldev] Erasing FE.KEYID = 1
1,241,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,964 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,281 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,277 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,311 UART: [fwproc] Recv command 0x46574c44
1,282,044 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,174 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,233 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,619 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,054 >>> mbox cmd response: failed
1,197,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,060 >>> mbox cmd response: failed
1,197,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,066 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,682 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,687 >>> mbox cmd response: failed
1,197,687 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,693 >>> mbox cmd response: failed
1,197,693 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,699 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
893,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,291 UART: [kat] ++
897,443 UART: [kat] sha1
901,881 UART: [kat] SHA2-256
903,821 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,086 UART: [kat] HMAC-384Kdf
922,614 UART: [kat] LMS
1,170,942 UART: [kat] --
1,171,687 UART: [cold-reset] ++
1,172,143 UART: [fht] FHT @ 0x50003400
1,174,878 UART: [idev] ++
1,175,046 UART: [idev] CDI.KEYID = 6
1,175,406 UART: [idev] SUBJECT.KEYID = 7
1,175,830 UART: [idev] UDS.KEYID = 0
1,176,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,606 UART: [idev] Erasing UDS.KEYID = 0
1,201,137 UART: [idev] Sha1 KeyId Algorithm
1,209,623 UART: [idev] --
1,210,761 UART: [ldev] ++
1,210,929 UART: [ldev] CDI.KEYID = 6
1,211,292 UART: [ldev] SUBJECT.KEYID = 5
1,211,718 UART: [ldev] AUTHORITY.KEYID = 7
1,212,181 UART: [ldev] FE.KEYID = 1
1,217,423 UART: [ldev] Erasing FE.KEYID = 1
1,243,688 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,355 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,071 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,962 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,674 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,579 UART: [ldev] --
1,283,016 UART: [fwproc] Wait for Commands...
1,283,674 UART: [fwproc] Recv command 0x46574c44
1,284,402 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,468 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,195 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,365 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,159 >>> mbox cmd response: failed
1,199,159 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,165 >>> mbox cmd response: failed
1,199,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,171 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,489 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,220 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,197,970 >>> mbox cmd response: failed
1,197,970 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,976 >>> mbox cmd response: failed
1,197,976 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,197,982 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,767 UART: [state] LifecycleState = Unprovisioned
86,422 UART: [state] DebugLocked = No
86,950 UART: [state] WD Timer not started. Device not locked for debugging
88,079 UART: [kat] SHA2-256
893,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,854 UART: [kat] ++
898,006 UART: [kat] sha1
902,302 UART: [kat] SHA2-256
904,242 UART: [kat] SHA2-384
907,011 UART: [kat] SHA2-512-ACC
908,912 UART: [kat] ECC-384
919,007 UART: [kat] HMAC-384Kdf
923,765 UART: [kat] LMS
1,172,093 UART: [kat] --
1,172,782 UART: [cold-reset] ++
1,173,244 UART: [fht] FHT @ 0x50003400
1,175,783 UART: [idev] ++
1,175,951 UART: [idev] CDI.KEYID = 6
1,176,311 UART: [idev] SUBJECT.KEYID = 7
1,176,735 UART: [idev] UDS.KEYID = 0
1,177,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,085 UART: [idev] Erasing UDS.KEYID = 0
1,203,020 UART: [idev] Sha1 KeyId Algorithm
1,211,512 UART: [idev] --
1,212,642 UART: [ldev] ++
1,212,810 UART: [ldev] CDI.KEYID = 6
1,213,173 UART: [ldev] SUBJECT.KEYID = 5
1,213,599 UART: [ldev] AUTHORITY.KEYID = 7
1,214,062 UART: [ldev] FE.KEYID = 1
1,219,238 UART: [ldev] Erasing FE.KEYID = 1
1,245,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,746 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,462 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,032 UART: [ldev] --
1,284,439 UART: [fwproc] Wait for Commands...
1,285,099 UART: [fwproc] Recv command 0x46574c44
1,285,827 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,395 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,394 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,564 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,775 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,054 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,808 >>> mbox cmd response: failed
1,199,808 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,814 >>> mbox cmd response: failed
1,199,814 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,820 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,554 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_ecc_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
192,023 UART:
192,396 UART: Running Caliptra ROM ...
193,491 UART:
193,637 UART: [state] CFI Enabled
261,478 UART: [state] LifecycleState = Unprovisioned
263,372 UART: [state] DebugLocked = No
264,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,064 UART: [kat] SHA2-256
438,738 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,276 UART: [kat] ++
449,724 UART: [kat] sha1
460,385 UART: [kat] SHA2-256
463,077 UART: [kat] SHA2-384
469,223 UART: [kat] SHA2-512-ACC
471,565 UART: [kat] ECC-384
2,767,467 UART: [kat] HMAC-384Kdf
2,798,717 UART: [kat] LMS
3,989,034 UART: [kat] --
3,994,464 UART: [cold-reset] ++
3,997,005 UART: [fht] Storing FHT @ 0x50003400
4,008,837 UART: [idev] ++
4,009,474 UART: [idev] CDI.KEYID = 6
4,010,394 UART: [idev] SUBJECT.KEYID = 7
4,011,619 UART: [idev] UDS.KEYID = 0
4,014,398 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,679 UART: [idev] Erasing UDS.KEYID = 0
7,347,250 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,394 UART: [idev] --
7,374,363 UART: [ldev] ++
7,374,936 UART: [ldev] CDI.KEYID = 6
7,375,960 UART: [ldev] SUBJECT.KEYID = 5
7,377,122 UART: [ldev] AUTHORITY.KEYID = 7
7,378,361 UART: [ldev] FE.KEYID = 1
7,420,721 UART: [ldev] Erasing FE.KEYID = 1
10,753,783 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,417 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,036 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,840 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,357 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,078 UART: [ldev] --
13,135,807 UART: [fwproc] Waiting for Commands...
13,137,743 UART: [fwproc] Received command 0x46574c44
13,139,934 UART: [fwproc] Received Image of size 118548 bytes
16,674,457 UART: ROM Fatal Error: 0x000B0030
16,677,875 >>> mbox cmd response: failed
16,678,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,678,671 >>> mbox cmd response: failed
16,678,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,679,239 >>> mbox cmd response: failed
Initializing fuses
2,063,956 writing to cptra_bootfsm_go
2,253,335 UART:
2,253,684 UART: Running Caliptra ROM ...
2,254,826 UART:
2,255,002 UART: [state] CFI Enabled
2,330,966 UART: [state] LifecycleState = Unprovisioned
2,332,897 UART: [state] DebugLocked = No
2,335,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,340,780 UART: [kat] SHA2-256
2,510,523 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,521,027 UART: [kat] ++
2,521,490 UART: [kat] sha1
2,532,751 UART: [kat] SHA2-256
2,535,447 UART: [kat] SHA2-384
2,540,359 UART: [kat] SHA2-512-ACC
2,542,709 UART: [kat] ECC-384
4,833,681 UART: [kat] HMAC-384Kdf
4,865,846 UART: [kat] LMS
6,056,132 UART: [kat] --
6,058,967 UART: [cold-reset] ++
6,061,292 UART: [fht] Storing FHT @ 0x50003400
6,072,078 UART: [idev] ++
6,072,699 UART: [idev] CDI.KEYID = 6
6,073,623 UART: [idev] SUBJECT.KEYID = 7
6,074,844 UART: [idev] UDS.KEYID = 0
6,077,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,226,445 UART: [idev] Erasing UDS.KEYID = 0
9,412,423 UART: [idev] Using Sha1 for KeyId Algorithm
9,435,374 UART: [idev] --
9,439,512 UART: [ldev] ++
9,440,100 UART: [ldev] CDI.KEYID = 6
9,441,084 UART: [ldev] SUBJECT.KEYID = 5
9,442,351 UART: [ldev] AUTHORITY.KEYID = 7
9,443,538 UART: [ldev] FE.KEYID = 1
9,490,209 UART: [ldev] Erasing FE.KEYID = 1
12,819,997 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,131,157 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,473 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,024 UART: [ldev] --
15,186,079 UART: [fwproc] Waiting for Commands...
15,187,910 UART: [fwproc] Received command 0x46574c44
15,190,113 UART: [fwproc] Received Image of size 118548 bytes
19,298,375 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,380,299 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,453,484 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,782,221 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,048 writing to cptra_bootfsm_go
3,786,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,358,698 >>> mbox cmd response: failed
16,359,294 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,359,643 >>> mbox cmd response: failed
16,359,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,360,203 >>> mbox cmd response: failed
Initializing fuses
2,075,870 writing to cptra_bootfsm_go
5,858,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,039,281 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,247 writing to cptra_bootfsm_go
192,552 UART:
192,961 UART: Running Caliptra ROM ...
194,103 UART:
603,792 UART: [state] CFI Enabled
620,974 UART: [state] LifecycleState = Unprovisioned
622,956 UART: [state] DebugLocked = No
624,773 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,309 UART: [kat] SHA2-256
800,041 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,604 UART: [kat] ++
811,064 UART: [kat] sha1
820,760 UART: [kat] SHA2-256
823,502 UART: [kat] SHA2-384
829,970 UART: [kat] SHA2-512-ACC
832,332 UART: [kat] ECC-384
3,114,209 UART: [kat] HMAC-384Kdf
3,125,331 UART: [kat] LMS
4,315,409 UART: [kat] --
4,319,267 UART: [cold-reset] ++
4,320,400 UART: [fht] Storing FHT @ 0x50003400
4,331,837 UART: [idev] ++
4,332,406 UART: [idev] CDI.KEYID = 6
4,333,325 UART: [idev] SUBJECT.KEYID = 7
4,334,603 UART: [idev] UDS.KEYID = 0
4,337,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,749 UART: [idev] Erasing UDS.KEYID = 0
7,620,564 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,514 UART: [idev] --
7,647,728 UART: [ldev] ++
7,648,305 UART: [ldev] CDI.KEYID = 6
7,649,296 UART: [ldev] SUBJECT.KEYID = 5
7,650,465 UART: [ldev] AUTHORITY.KEYID = 7
7,651,708 UART: [ldev] FE.KEYID = 1
7,664,632 UART: [ldev] Erasing FE.KEYID = 1
10,953,315 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,498 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,077 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,884 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,289,398 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,937 UART: [ldev] --
13,311,073 UART: [fwproc] Waiting for Commands...
13,313,565 UART: [fwproc] Received command 0x46574c44
13,315,759 UART: [fwproc] Received Image of size 118548 bytes
17,238,408 UART: ROM Fatal Error: 0x000B0030
17,241,864 >>> mbox cmd response: failed
17,242,302 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,242,653 >>> mbox cmd response: failed
17,242,924 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,243,224 >>> mbox cmd response: failed
Initializing fuses
2,060,463 writing to cptra_bootfsm_go
2,249,748 UART:
2,250,082 UART: Running Caliptra ROM ...
2,251,239 UART:
3,201,833 UART: [state] CFI Enabled
3,214,843 UART: [state] LifecycleState = Unprovisioned
3,216,751 UART: [state] DebugLocked = No
3,219,474 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,223,620 UART: [kat] SHA2-256
3,393,380 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,403,930 UART: [kat] ++
3,404,479 UART: [kat] sha1
3,416,137 UART: [kat] SHA2-256
3,418,839 UART: [kat] SHA2-384
3,423,426 UART: [kat] SHA2-512-ACC
3,425,779 UART: [kat] ECC-384
5,709,166 UART: [kat] HMAC-384Kdf
5,721,234 UART: [kat] LMS
6,911,373 UART: [kat] --
6,917,330 UART: [cold-reset] ++
6,919,056 UART: [fht] Storing FHT @ 0x50003400
6,930,386 UART: [idev] ++
6,930,954 UART: [idev] CDI.KEYID = 6
6,931,842 UART: [idev] SUBJECT.KEYID = 7
6,933,110 UART: [idev] UDS.KEYID = 0
6,935,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,084,492 UART: [idev] Erasing UDS.KEYID = 0
10,224,748 UART: [idev] Using Sha1 for KeyId Algorithm
10,247,499 UART: [idev] --
10,250,746 UART: [ldev] ++
10,251,323 UART: [ldev] CDI.KEYID = 6
10,252,262 UART: [ldev] SUBJECT.KEYID = 5
10,253,526 UART: [ldev] AUTHORITY.KEYID = 7
10,254,770 UART: [ldev] FE.KEYID = 1
10,265,494 UART: [ldev] Erasing FE.KEYID = 1
13,552,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,845,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,860,070 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,874,929 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,889,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,908,000 UART: [ldev] --
15,913,011 UART: [fwproc] Waiting for Commands...
15,916,002 UART: [fwproc] Received command 0x46574c44
15,918,201 UART: [fwproc] Received Image of size 118548 bytes
20,031,533 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,108,809 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,181,981 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,510,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.21s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
4,127,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,649,088 >>> mbox cmd response: failed
16,649,673 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,650,031 >>> mbox cmd response: failed
16,650,313 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,650,596 >>> mbox cmd response: failed
Initializing fuses
2,065,875 writing to cptra_bootfsm_go
7,341,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,376,878 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,474 UART:
192,842 UART: Running Caliptra ROM ...
194,062 UART:
194,222 UART: [state] CFI Enabled
264,999 UART: [state] LifecycleState = Unprovisioned
266,988 UART: [state] DebugLocked = No
269,780 UART: [state] WD Timer not started. Device not locked for debugging
272,884 UART: [kat] SHA2-256
452,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,307 UART: [kat] ++
463,907 UART: [kat] sha1
473,933 UART: [kat] SHA2-256
476,614 UART: [kat] SHA2-384
482,860 UART: [kat] SHA2-512-ACC
485,200 UART: [kat] ECC-384
2,949,493 UART: [kat] HMAC-384Kdf
2,971,793 UART: [kat] LMS
3,448,275 UART: [kat] --
3,451,836 UART: [cold-reset] ++
3,452,907 UART: [fht] FHT @ 0x50003400
3,465,074 UART: [idev] ++
3,465,653 UART: [idev] CDI.KEYID = 6
3,466,675 UART: [idev] SUBJECT.KEYID = 7
3,467,838 UART: [idev] UDS.KEYID = 0
3,470,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,664 UART: [idev] Erasing UDS.KEYID = 0
5,988,785 UART: [idev] Sha1 KeyId Algorithm
6,013,430 UART: [idev] --
6,017,703 UART: [ldev] ++
6,018,282 UART: [ldev] CDI.KEYID = 6
6,019,208 UART: [ldev] SUBJECT.KEYID = 5
6,020,448 UART: [ldev] AUTHORITY.KEYID = 7
6,021,640 UART: [ldev] FE.KEYID = 1
6,058,116 UART: [ldev] Erasing FE.KEYID = 1
8,564,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,232 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,524 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,045 UART: [ldev] --
10,375,967 UART: [fwproc] Wait for Commands...
10,378,165 UART: [fwproc] Recv command 0x46574c44
10,380,164 UART: [fwproc] Recv'd Img size: 118548 bytes
11,995,923 UART: ROM Fatal Error: 0x000B0030
11,999,207 >>> mbox cmd response: failed
11,999,542 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,999,882 >>> mbox cmd response: failed
12,000,173 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,000,493 >>> mbox cmd response: failed
Initializing fuses
2,056,276 writing to cptra_bootfsm_go
2,245,605 UART:
2,245,954 UART: Running Caliptra ROM ...
2,247,091 UART:
2,247,267 UART: [state] CFI Enabled
2,321,009 UART: [state] LifecycleState = Unprovisioned
2,322,951 UART: [state] DebugLocked = No
2,324,615 UART: [state] WD Timer not started. Device not locked for debugging
2,328,749 UART: [kat] SHA2-256
2,508,371 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,519,147 UART: [kat] ++
2,519,716 UART: [kat] sha1
2,531,319 UART: [kat] SHA2-256
2,534,029 UART: [kat] SHA2-384
2,539,950 UART: [kat] SHA2-512-ACC
2,542,323 UART: [kat] ECC-384
5,004,854 UART: [kat] HMAC-384Kdf
5,029,115 UART: [kat] LMS
5,505,618 UART: [kat] --
5,511,229 UART: [cold-reset] ++
5,512,783 UART: [fht] FHT @ 0x50003400
5,522,586 UART: [idev] ++
5,523,156 UART: [idev] CDI.KEYID = 6
5,524,175 UART: [idev] SUBJECT.KEYID = 7
5,525,337 UART: [idev] UDS.KEYID = 0
5,527,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,676,808 UART: [idev] Erasing UDS.KEYID = 0
8,043,875 UART: [idev] Sha1 KeyId Algorithm
8,067,920 UART: [idev] --
8,073,518 UART: [ldev] ++
8,074,108 UART: [ldev] CDI.KEYID = 6
8,075,002 UART: [ldev] SUBJECT.KEYID = 5
8,076,230 UART: [ldev] AUTHORITY.KEYID = 7
8,077,470 UART: [ldev] FE.KEYID = 1
8,116,454 UART: [ldev] Erasing FE.KEYID = 1
10,624,083 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,359,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,374,988 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,390,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,406,390 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,427,990 UART: [ldev] --
12,432,879 UART: [fwproc] Wait for Commands...
12,435,623 UART: [fwproc] Recv command 0x46574c44
12,437,633 UART: [fwproc] Recv'd Img size: 118548 bytes
15,920,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,001,060 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,074,137 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,401,906 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,459,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,889,928 >>> mbox cmd response: failed
11,890,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,890,896 >>> mbox cmd response: failed
11,891,169 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,891,467 >>> mbox cmd response: failed
Initializing fuses
2,056,352 writing to cptra_bootfsm_go
5,498,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,228,565 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
192,717 UART:
193,090 UART: Running Caliptra ROM ...
194,300 UART:
603,888 UART: [state] CFI Enabled
618,754 UART: [state] LifecycleState = Unprovisioned
620,664 UART: [state] DebugLocked = No
623,641 UART: [state] WD Timer not started. Device not locked for debugging
628,383 UART: [kat] SHA2-256
808,001 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,779 UART: [kat] ++
819,231 UART: [kat] sha1
830,851 UART: [kat] SHA2-256
833,592 UART: [kat] SHA2-384
840,386 UART: [kat] SHA2-512-ACC
842,727 UART: [kat] ECC-384
3,285,377 UART: [kat] HMAC-384Kdf
3,297,900 UART: [kat] LMS
3,774,414 UART: [kat] --
3,779,406 UART: [cold-reset] ++
3,781,677 UART: [fht] FHT @ 0x50003400
3,793,202 UART: [idev] ++
3,793,778 UART: [idev] CDI.KEYID = 6
3,794,753 UART: [idev] SUBJECT.KEYID = 7
3,795,973 UART: [idev] UDS.KEYID = 0
3,798,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,947,474 UART: [idev] Erasing UDS.KEYID = 0
6,277,755 UART: [idev] Sha1 KeyId Algorithm
6,302,436 UART: [idev] --
6,308,085 UART: [ldev] ++
6,308,677 UART: [ldev] CDI.KEYID = 6
6,309,593 UART: [ldev] SUBJECT.KEYID = 5
6,310,818 UART: [ldev] AUTHORITY.KEYID = 7
6,312,075 UART: [ldev] FE.KEYID = 1
6,323,703 UART: [ldev] Erasing FE.KEYID = 1
8,797,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,987 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,834 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,973 UART: [ldev] --
10,591,895 UART: [fwproc] Wait for Commands...
10,594,104 UART: [fwproc] Recv command 0x46574c44
10,596,146 UART: [fwproc] Recv'd Img size: 118548 bytes
12,225,960 UART: ROM Fatal Error: 0x000B0030
12,229,251 >>> mbox cmd response: failed
12,229,581 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,229,909 >>> mbox cmd response: failed
12,230,234 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,230,562 >>> mbox cmd response: failed
Initializing fuses
2,054,591 writing to cptra_bootfsm_go
2,243,885 UART:
2,244,237 UART: Running Caliptra ROM ...
2,245,285 UART:
8,237,015 UART: [state] CFI Enabled
8,248,171 UART: [state] LifecycleState = Unprovisioned
8,250,097 UART: [state] DebugLocked = No
8,252,148 UART: [state] WD Timer not started. Device not locked for debugging
8,255,320 UART: [kat] SHA2-256
8,434,971 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,445,775 UART: [kat] ++
8,446,253 UART: [kat] sha1
8,457,434 UART: [kat] SHA2-256
8,460,119 UART: [kat] SHA2-384
8,466,820 UART: [kat] SHA2-512-ACC
8,469,229 UART: [kat] ECC-384
10,909,043 UART: [kat] HMAC-384Kdf
10,922,083 UART: [kat] LMS
11,398,622 UART: [kat] --
11,403,647 UART: [cold-reset] ++
11,405,255 UART: [fht] FHT @ 0x50003400
11,418,022 UART: [idev] ++
11,418,627 UART: [idev] CDI.KEYID = 6
11,419,577 UART: [idev] SUBJECT.KEYID = 7
11,420,796 UART: [idev] UDS.KEYID = 0
11,423,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,572,056 UART: [idev] Erasing UDS.KEYID = 0
13,898,905 UART: [idev] Sha1 KeyId Algorithm
13,921,940 UART: [idev] --
13,926,855 UART: [ldev] ++
13,927,480 UART: [ldev] CDI.KEYID = 6
13,928,394 UART: [ldev] SUBJECT.KEYID = 5
13,929,611 UART: [ldev] AUTHORITY.KEYID = 7
13,930,844 UART: [ldev] FE.KEYID = 1
13,942,839 UART: [ldev] Erasing FE.KEYID = 1
16,423,625 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,142,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,158,235 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,174,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,189,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,210,894 UART: [ldev] --
18,216,752 UART: [fwproc] Wait for Commands...
18,218,307 UART: [fwproc] Recv command 0x46574c44
18,220,364 UART: [fwproc] Recv'd Img size: 118548 bytes
21,700,637 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,785,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,858,329 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,187,140 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,260 writing to cptra_bootfsm_go
3,783,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,145,167 >>> mbox cmd response: failed
12,145,672 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,146,020 >>> mbox cmd response: failed
12,146,335 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,146,629 >>> mbox cmd response: failed
Initializing fuses
2,057,692 writing to cptra_bootfsm_go
11,508,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,172,716 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,054 writing to cptra_bootfsm_go
192,292 UART:
192,646 UART: Running Caliptra ROM ...
193,791 UART:
193,936 UART: [state] CFI Enabled
262,789 UART: [state] LifecycleState = Unprovisioned
265,209 UART: [state] DebugLocked = No
267,275 UART: [state] WD Timer not started. Device not locked for debugging
271,105 UART: [kat] SHA2-256
460,947 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,736 UART: [kat] ++
472,186 UART: [kat] sha1
483,784 UART: [kat] SHA2-256
486,797 UART: [kat] SHA2-384
492,575 UART: [kat] SHA2-512-ACC
495,158 UART: [kat] ECC-384
2,948,433 UART: [kat] HMAC-384Kdf
2,971,141 UART: [kat] LMS
3,502,872 UART: [kat] --
3,508,928 UART: [cold-reset] ++
3,510,536 UART: [fht] FHT @ 0x50003400
3,521,470 UART: [idev] ++
3,522,189 UART: [idev] CDI.KEYID = 6
3,523,113 UART: [idev] SUBJECT.KEYID = 7
3,524,274 UART: [idev] UDS.KEYID = 0
3,527,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,231 UART: [idev] Erasing UDS.KEYID = 0
6,026,909 UART: [idev] Sha1 KeyId Algorithm
6,049,822 UART: [idev] --
6,053,560 UART: [ldev] ++
6,054,252 UART: [ldev] CDI.KEYID = 6
6,055,186 UART: [ldev] SUBJECT.KEYID = 5
6,056,358 UART: [ldev] AUTHORITY.KEYID = 7
6,057,547 UART: [ldev] FE.KEYID = 1
6,099,899 UART: [ldev] Erasing FE.KEYID = 1
8,604,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,338,382 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,825 UART: [ldev] --
10,410,627 UART: [fwproc] Wait for Commands...
10,412,310 UART: [fwproc] Recv command 0x46574c44
10,414,578 UART: [fwproc] Recv'd Img size: 118548 bytes
12,107,335 UART: ROM Fatal Error: 0x000B0030
12,110,759 >>> mbox cmd response: failed
12,111,145 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,111,526 >>> mbox cmd response: failed
12,111,799 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,112,099 >>> mbox cmd response: failed
Initializing fuses
2,064,197 writing to cptra_bootfsm_go
2,253,510 UART:
2,253,853 UART: Running Caliptra ROM ...
2,254,904 UART:
2,255,057 UART: [state] CFI Enabled
2,311,799 UART: [state] LifecycleState = Unprovisioned
2,314,221 UART: [state] DebugLocked = No
2,316,177 UART: [state] WD Timer not started. Device not locked for debugging
2,321,385 UART: [kat] SHA2-256
2,511,270 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,522,005 UART: [kat] ++
2,522,468 UART: [kat] sha1
2,534,327 UART: [kat] SHA2-256
2,537,339 UART: [kat] SHA2-384
2,542,476 UART: [kat] SHA2-512-ACC
2,545,050 UART: [kat] ECC-384
4,997,712 UART: [kat] HMAC-384Kdf
5,019,893 UART: [kat] LMS
5,551,643 UART: [kat] --
5,556,884 UART: [cold-reset] ++
5,559,521 UART: [fht] FHT @ 0x50003400
5,570,824 UART: [idev] ++
5,571,548 UART: [idev] CDI.KEYID = 6
5,572,440 UART: [idev] SUBJECT.KEYID = 7
5,573,661 UART: [idev] UDS.KEYID = 0
5,575,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,724,963 UART: [idev] Erasing UDS.KEYID = 0
8,073,832 UART: [idev] Sha1 KeyId Algorithm
8,097,365 UART: [idev] --
8,103,794 UART: [ldev] ++
8,104,474 UART: [ldev] CDI.KEYID = 6
8,105,365 UART: [ldev] SUBJECT.KEYID = 5
8,106,584 UART: [ldev] AUTHORITY.KEYID = 7
8,107,825 UART: [ldev] FE.KEYID = 1
8,149,237 UART: [ldev] Erasing FE.KEYID = 1
10,654,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,457,355 UART: [ldev] --
12,463,720 UART: [fwproc] Wait for Commands...
12,466,708 UART: [fwproc] Recv command 0x46574c44
12,469,031 UART: [fwproc] Recv'd Img size: 118548 bytes
15,957,425 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,036,908 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,160,529 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,719,988 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,441,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,863,697 >>> mbox cmd response: failed
11,864,425 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,864,796 >>> mbox cmd response: failed
11,865,066 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,865,369 >>> mbox cmd response: failed
Initializing fuses
2,058,646 writing to cptra_bootfsm_go
5,480,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,867,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,633 UART:
192,983 UART: Running Caliptra ROM ...
194,176 UART:
603,772 UART: [state] CFI Enabled
620,176 UART: [state] LifecycleState = Unprovisioned
622,598 UART: [state] DebugLocked = No
624,093 UART: [state] WD Timer not started. Device not locked for debugging
627,894 UART: [kat] SHA2-256
817,775 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,554 UART: [kat] ++
829,150 UART: [kat] sha1
841,031 UART: [kat] SHA2-256
844,059 UART: [kat] SHA2-384
850,592 UART: [kat] SHA2-512-ACC
853,214 UART: [kat] ECC-384
3,296,040 UART: [kat] HMAC-384Kdf
3,309,270 UART: [kat] LMS
3,841,074 UART: [kat] --
3,844,681 UART: [cold-reset] ++
3,845,657 UART: [fht] FHT @ 0x50003400
3,857,351 UART: [idev] ++
3,858,083 UART: [idev] CDI.KEYID = 6
3,858,983 UART: [idev] SUBJECT.KEYID = 7
3,860,233 UART: [idev] UDS.KEYID = 0
3,863,386 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,551 UART: [idev] Erasing UDS.KEYID = 0
6,334,868 UART: [idev] Sha1 KeyId Algorithm
6,356,889 UART: [idev] --
6,362,727 UART: [ldev] ++
6,363,412 UART: [ldev] CDI.KEYID = 6
6,364,338 UART: [ldev] SUBJECT.KEYID = 5
6,365,502 UART: [ldev] AUTHORITY.KEYID = 7
6,366,739 UART: [ldev] FE.KEYID = 1
6,377,551 UART: [ldev] Erasing FE.KEYID = 1
8,857,447 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,867 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,907 UART: [ldev] --
10,647,802 UART: [fwproc] Wait for Commands...
10,650,770 UART: [fwproc] Recv command 0x46574c44
10,653,036 UART: [fwproc] Recv'd Img size: 118548 bytes
12,337,482 UART: ROM Fatal Error: 0x000B0030
12,340,906 >>> mbox cmd response: failed
12,341,254 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,341,598 >>> mbox cmd response: failed
12,341,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,342,226 >>> mbox cmd response: failed
Initializing fuses
2,061,840 writing to cptra_bootfsm_go
2,251,154 UART:
2,251,498 UART: Running Caliptra ROM ...
2,252,552 UART:
8,122,832 UART: [state] CFI Enabled
8,137,151 UART: [state] LifecycleState = Unprovisioned
8,139,506 UART: [state] DebugLocked = No
8,142,028 UART: [state] WD Timer not started. Device not locked for debugging
8,147,314 UART: [kat] SHA2-256
8,337,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,347,970 UART: [kat] ++
8,348,492 UART: [kat] sha1
8,361,540 UART: [kat] SHA2-256
8,364,552 UART: [kat] SHA2-384
8,370,504 UART: [kat] SHA2-512-ACC
8,373,084 UART: [kat] ECC-384
10,814,069 UART: [kat] HMAC-384Kdf
10,827,443 UART: [kat] LMS
11,359,268 UART: [kat] --
11,365,588 UART: [cold-reset] ++
11,367,362 UART: [fht] FHT @ 0x50003400
11,378,299 UART: [idev] ++
11,378,975 UART: [idev] CDI.KEYID = 6
11,379,965 UART: [idev] SUBJECT.KEYID = 7
11,381,126 UART: [idev] UDS.KEYID = 0
11,383,416 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,532,390 UART: [idev] Erasing UDS.KEYID = 0
13,860,526 UART: [idev] Sha1 KeyId Algorithm
13,883,107 UART: [idev] --
13,888,483 UART: [ldev] ++
13,889,174 UART: [ldev] CDI.KEYID = 6
13,890,062 UART: [ldev] SUBJECT.KEYID = 5
13,891,169 UART: [ldev] AUTHORITY.KEYID = 7
13,892,461 UART: [ldev] FE.KEYID = 1
13,903,731 UART: [ldev] Erasing FE.KEYID = 1
16,377,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,097,408 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,112,598 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,127,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,142,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,163,653 UART: [ldev] --
18,168,547 UART: [fwproc] Wait for Commands...
18,170,754 UART: [fwproc] Recv command 0x46574c44
18,173,023 UART: [fwproc] Recv'd Img size: 118548 bytes
21,671,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,749,202 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,872,827 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,433,018 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,758,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,095,744 >>> mbox cmd response: failed
12,096,330 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,096,673 >>> mbox cmd response: failed
12,096,951 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,097,251 >>> mbox cmd response: failed
Initializing fuses
2,063,155 writing to cptra_bootfsm_go
11,527,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,807,061 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,260 UART: [state] LifecycleState = Unprovisioned
85,915 UART: [state] DebugLocked = No
86,637 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,311 UART: [kat] SHA2-256
882,242 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,357 UART: [kat] ++
886,509 UART: [kat] sha1
890,747 UART: [kat] SHA2-256
892,685 UART: [kat] SHA2-384
895,468 UART: [kat] SHA2-512-ACC
897,369 UART: [kat] ECC-384
902,984 UART: [kat] HMAC-384Kdf
907,440 UART: [kat] LMS
1,475,636 UART: [kat] --
1,476,333 UART: [cold-reset] ++
1,476,769 UART: [fht] Storing FHT @ 0x50003400
1,479,574 UART: [idev] ++
1,479,742 UART: [idev] CDI.KEYID = 6
1,480,102 UART: [idev] SUBJECT.KEYID = 7
1,480,526 UART: [idev] UDS.KEYID = 0
1,480,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,718 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,238 UART: [idev] --
1,515,285 UART: [ldev] ++
1,515,453 UART: [ldev] CDI.KEYID = 6
1,515,816 UART: [ldev] SUBJECT.KEYID = 5
1,516,242 UART: [ldev] AUTHORITY.KEYID = 7
1,516,705 UART: [ldev] FE.KEYID = 1
1,521,959 UART: [ldev] Erasing FE.KEYID = 1
1,547,202 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,815 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,531 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,422 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,134 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,098 UART: [ldev] --
1,586,599 UART: [fwproc] Waiting for Commands...
1,587,378 UART: [fwproc] Received command 0x46574c44
1,588,169 UART: [fwproc] Received Image of size 118548 bytes
2,689,261 UART: ROM Fatal Error: 0x000B0030
2,690,418 >>> mbox cmd response: failed
2,690,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,690,424 >>> mbox cmd response: failed
2,690,424 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,690,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,266 UART: [state] LifecycleState = Unprovisioned
85,921 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,223 UART: [kat] SHA2-256
882,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,269 UART: [kat] ++
886,421 UART: [kat] sha1
890,611 UART: [kat] SHA2-256
892,549 UART: [kat] SHA2-384
895,410 UART: [kat] SHA2-512-ACC
897,311 UART: [kat] ECC-384
902,906 UART: [kat] HMAC-384Kdf
907,648 UART: [kat] LMS
1,475,844 UART: [kat] --
1,477,011 UART: [cold-reset] ++
1,477,437 UART: [fht] Storing FHT @ 0x50003400
1,480,294 UART: [idev] ++
1,480,462 UART: [idev] CDI.KEYID = 6
1,480,822 UART: [idev] SUBJECT.KEYID = 7
1,481,246 UART: [idev] UDS.KEYID = 0
1,481,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,032 UART: [idev] Erasing UDS.KEYID = 0
1,505,542 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,260 UART: [idev] --
1,515,297 UART: [ldev] ++
1,515,465 UART: [ldev] CDI.KEYID = 6
1,515,828 UART: [ldev] SUBJECT.KEYID = 5
1,516,254 UART: [ldev] AUTHORITY.KEYID = 7
1,516,717 UART: [ldev] FE.KEYID = 1
1,521,725 UART: [ldev] Erasing FE.KEYID = 1
1,547,008 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,872 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,840 UART: [ldev] --
1,586,247 UART: [fwproc] Waiting for Commands...
1,586,874 UART: [fwproc] Received command 0x46574c44
1,587,665 UART: [fwproc] Received Image of size 118548 bytes
2,932,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,046 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,264 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,641 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,689,579 >>> mbox cmd response: failed
2,689,579 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,689,585 >>> mbox cmd response: failed
2,689,585 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,689,591 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,579 UART: [state] LifecycleState = Unprovisioned
86,234 UART: [state] DebugLocked = No
86,970 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,486 UART: [kat] SHA2-256
882,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,532 UART: [kat] ++
886,684 UART: [kat] sha1
890,916 UART: [kat] SHA2-256
892,854 UART: [kat] SHA2-384
895,627 UART: [kat] SHA2-512-ACC
897,528 UART: [kat] ECC-384
903,289 UART: [kat] HMAC-384Kdf
907,791 UART: [kat] LMS
1,475,987 UART: [kat] --
1,476,934 UART: [cold-reset] ++
1,477,454 UART: [fht] Storing FHT @ 0x50003400
1,480,253 UART: [idev] ++
1,480,421 UART: [idev] CDI.KEYID = 6
1,480,781 UART: [idev] SUBJECT.KEYID = 7
1,481,205 UART: [idev] UDS.KEYID = 0
1,481,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,177 UART: [idev] Erasing UDS.KEYID = 0
1,506,285 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,001 UART: [idev] --
1,516,018 UART: [ldev] ++
1,516,186 UART: [ldev] CDI.KEYID = 6
1,516,549 UART: [ldev] SUBJECT.KEYID = 5
1,516,975 UART: [ldev] AUTHORITY.KEYID = 7
1,517,438 UART: [ldev] FE.KEYID = 1
1,522,802 UART: [ldev] Erasing FE.KEYID = 1
1,547,775 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,809 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,521 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,585 UART: [ldev] --
1,586,946 UART: [fwproc] Waiting for Commands...
1,587,601 UART: [fwproc] Received command 0x46574c44
1,588,392 UART: [fwproc] Received Image of size 118548 bytes
2,876,639 UART: ROM Fatal Error: 0x000B0030
2,877,796 >>> mbox cmd response: failed
2,877,796 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,877,802 >>> mbox cmd response: failed
2,877,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,877,808 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,646 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,120 UART: [kat] SHA2-256
882,051 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,166 UART: [kat] ++
886,318 UART: [kat] sha1
890,712 UART: [kat] SHA2-256
892,650 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
903,059 UART: [kat] HMAC-384Kdf
907,865 UART: [kat] LMS
1,476,061 UART: [kat] --
1,476,646 UART: [cold-reset] ++
1,477,164 UART: [fht] Storing FHT @ 0x50003400
1,479,909 UART: [idev] ++
1,480,077 UART: [idev] CDI.KEYID = 6
1,480,437 UART: [idev] SUBJECT.KEYID = 7
1,480,861 UART: [idev] UDS.KEYID = 0
1,481,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,747 UART: [idev] Erasing UDS.KEYID = 0
1,505,723 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,331 UART: [idev] --
1,515,402 UART: [ldev] ++
1,515,570 UART: [ldev] CDI.KEYID = 6
1,515,933 UART: [ldev] SUBJECT.KEYID = 5
1,516,359 UART: [ldev] AUTHORITY.KEYID = 7
1,516,822 UART: [ldev] FE.KEYID = 1
1,521,932 UART: [ldev] Erasing FE.KEYID = 1
1,547,257 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,924 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,815 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,527 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,447 UART: [ldev] --
1,585,710 UART: [fwproc] Waiting for Commands...
1,586,461 UART: [fwproc] Received command 0x46574c44
1,587,252 UART: [fwproc] Received Image of size 118548 bytes
2,931,995 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,665 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,883 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,140 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,653,651 >>> mbox cmd response: failed
2,653,651 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,657 >>> mbox cmd response: failed
2,653,657 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,653,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,454 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,882 UART: [state] LifecycleState = Unprovisioned
85,537 UART: [state] DebugLocked = No
86,099 UART: [state] WD Timer not started. Device not locked for debugging
87,454 UART: [kat] SHA2-256
891,004 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,108 UART: [kat] ++
895,260 UART: [kat] sha1
899,468 UART: [kat] SHA2-256
901,408 UART: [kat] SHA2-384
904,255 UART: [kat] SHA2-512-ACC
906,156 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,521 UART: [kat] LMS
1,168,833 UART: [kat] --
1,169,680 UART: [cold-reset] ++
1,170,214 UART: [fht] FHT @ 0x50003400
1,172,900 UART: [idev] ++
1,173,068 UART: [idev] CDI.KEYID = 6
1,173,429 UART: [idev] SUBJECT.KEYID = 7
1,173,854 UART: [idev] UDS.KEYID = 0
1,174,200 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,603 UART: [idev] Erasing UDS.KEYID = 0
1,198,281 UART: [idev] Sha1 KeyId Algorithm
1,207,081 UART: [idev] --
1,208,230 UART: [ldev] ++
1,208,398 UART: [ldev] CDI.KEYID = 6
1,208,762 UART: [ldev] SUBJECT.KEYID = 5
1,209,189 UART: [ldev] AUTHORITY.KEYID = 7
1,209,652 UART: [ldev] FE.KEYID = 1
1,214,856 UART: [ldev] Erasing FE.KEYID = 1
1,241,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,191 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,878 UART: [ldev] --
1,280,303 UART: [fwproc] Wait for Commands...
1,281,026 UART: [fwproc] Recv command 0x46574c44
1,281,759 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,053 UART: ROM Fatal Error: 0x000B0030
1,593,210 >>> mbox cmd response: failed
1,593,210 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,216 >>> mbox cmd response: failed
1,593,216 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,222 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,398 UART: [state] LifecycleState = Unprovisioned
86,053 UART: [state] DebugLocked = No
86,701 UART: [state] WD Timer not started. Device not locked for debugging
87,892 UART: [kat] SHA2-256
891,442 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,546 UART: [kat] ++
895,698 UART: [kat] sha1
899,900 UART: [kat] SHA2-256
901,840 UART: [kat] SHA2-384
904,473 UART: [kat] SHA2-512-ACC
906,374 UART: [kat] ECC-384
916,177 UART: [kat] HMAC-384Kdf
920,769 UART: [kat] LMS
1,169,081 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,394 UART: [fht] FHT @ 0x50003400
1,173,016 UART: [idev] ++
1,173,184 UART: [idev] CDI.KEYID = 6
1,173,545 UART: [idev] SUBJECT.KEYID = 7
1,173,970 UART: [idev] UDS.KEYID = 0
1,174,316 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,657 UART: [idev] Erasing UDS.KEYID = 0
1,198,477 UART: [idev] Sha1 KeyId Algorithm
1,207,229 UART: [idev] --
1,208,220 UART: [ldev] ++
1,208,388 UART: [ldev] CDI.KEYID = 6
1,208,752 UART: [ldev] SUBJECT.KEYID = 5
1,209,179 UART: [ldev] AUTHORITY.KEYID = 7
1,209,642 UART: [ldev] FE.KEYID = 1
1,214,938 UART: [ldev] Erasing FE.KEYID = 1
1,241,147 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,108 UART: [ldev] --
1,280,543 UART: [fwproc] Wait for Commands...
1,281,242 UART: [fwproc] Recv command 0x46574c44
1,281,975 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,401 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,530 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,705 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,938 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,449,063 >>> mbox cmd response: failed
1,449,063 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,069 >>> mbox cmd response: failed
1,449,069 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,075 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,939 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,461 UART: [state] LifecycleState = Unprovisioned
86,116 UART: [state] DebugLocked = No
86,718 UART: [state] WD Timer not started. Device not locked for debugging
88,071 UART: [kat] SHA2-256
891,621 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,725 UART: [kat] ++
895,877 UART: [kat] sha1
899,935 UART: [kat] SHA2-256
901,875 UART: [kat] SHA2-384
904,594 UART: [kat] SHA2-512-ACC
906,495 UART: [kat] ECC-384
916,388 UART: [kat] HMAC-384Kdf
921,162 UART: [kat] LMS
1,169,474 UART: [kat] --
1,170,349 UART: [cold-reset] ++
1,170,721 UART: [fht] FHT @ 0x50003400
1,173,315 UART: [idev] ++
1,173,483 UART: [idev] CDI.KEYID = 6
1,173,844 UART: [idev] SUBJECT.KEYID = 7
1,174,269 UART: [idev] UDS.KEYID = 0
1,174,615 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,656 UART: [idev] Erasing UDS.KEYID = 0
1,199,500 UART: [idev] Sha1 KeyId Algorithm
1,208,318 UART: [idev] --
1,209,367 UART: [ldev] ++
1,209,535 UART: [ldev] CDI.KEYID = 6
1,209,899 UART: [ldev] SUBJECT.KEYID = 5
1,210,326 UART: [ldev] AUTHORITY.KEYID = 7
1,210,789 UART: [ldev] FE.KEYID = 1
1,216,097 UART: [ldev] Erasing FE.KEYID = 1
1,242,910 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,364 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,080 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,727 UART: [ldev] --
1,282,096 UART: [fwproc] Wait for Commands...
1,282,869 UART: [fwproc] Recv command 0x46574c44
1,283,602 UART: [fwproc] Recv'd Img size: 118548 bytes
1,584,450 UART: ROM Fatal Error: 0x000B0030
1,585,607 >>> mbox cmd response: failed
1,585,607 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,585,613 >>> mbox cmd response: failed
1,585,613 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,585,619 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Unprovisioned
85,596 UART: [state] DebugLocked = No
86,300 UART: [state] WD Timer not started. Device not locked for debugging
87,619 UART: [kat] SHA2-256
891,169 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,273 UART: [kat] ++
895,425 UART: [kat] sha1
899,729 UART: [kat] SHA2-256
901,669 UART: [kat] SHA2-384
904,310 UART: [kat] SHA2-512-ACC
906,211 UART: [kat] ECC-384
916,424 UART: [kat] HMAC-384Kdf
921,168 UART: [kat] LMS
1,169,480 UART: [kat] --
1,170,363 UART: [cold-reset] ++
1,170,927 UART: [fht] FHT @ 0x50003400
1,173,717 UART: [idev] ++
1,173,885 UART: [idev] CDI.KEYID = 6
1,174,246 UART: [idev] SUBJECT.KEYID = 7
1,174,671 UART: [idev] UDS.KEYID = 0
1,175,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,086 UART: [idev] Erasing UDS.KEYID = 0
1,200,196 UART: [idev] Sha1 KeyId Algorithm
1,209,230 UART: [idev] --
1,210,399 UART: [ldev] ++
1,210,567 UART: [ldev] CDI.KEYID = 6
1,210,931 UART: [ldev] SUBJECT.KEYID = 5
1,211,358 UART: [ldev] AUTHORITY.KEYID = 7
1,211,821 UART: [ldev] FE.KEYID = 1
1,216,911 UART: [ldev] Erasing FE.KEYID = 1
1,243,816 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,374 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,090 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,691 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,745 UART: [ldev] --
1,283,100 UART: [fwproc] Wait for Commands...
1,283,725 UART: [fwproc] Recv command 0x46574c44
1,284,458 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,439 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,614 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,803 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,449,862 >>> mbox cmd response: failed
1,449,862 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,868 >>> mbox cmd response: failed
1,449,868 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,449,874 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,831 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,816 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,148 UART: [state] LifecycleState = Unprovisioned
85,803 UART: [state] DebugLocked = No
86,421 UART: [state] WD Timer not started. Device not locked for debugging
87,634 UART: [kat] SHA2-256
893,284 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,409 UART: [kat] ++
897,561 UART: [kat] sha1
901,821 UART: [kat] SHA2-256
903,761 UART: [kat] SHA2-384
906,442 UART: [kat] SHA2-512-ACC
908,343 UART: [kat] ECC-384
917,908 UART: [kat] HMAC-384Kdf
922,356 UART: [kat] LMS
1,170,684 UART: [kat] --
1,171,529 UART: [cold-reset] ++
1,172,049 UART: [fht] FHT @ 0x50003400
1,174,732 UART: [idev] ++
1,174,900 UART: [idev] CDI.KEYID = 6
1,175,260 UART: [idev] SUBJECT.KEYID = 7
1,175,684 UART: [idev] UDS.KEYID = 0
1,176,029 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,048 UART: [idev] Erasing UDS.KEYID = 0
1,200,977 UART: [idev] Sha1 KeyId Algorithm
1,209,453 UART: [idev] --
1,210,487 UART: [ldev] ++
1,210,655 UART: [ldev] CDI.KEYID = 6
1,211,018 UART: [ldev] SUBJECT.KEYID = 5
1,211,444 UART: [ldev] AUTHORITY.KEYID = 7
1,211,907 UART: [ldev] FE.KEYID = 1
1,216,851 UART: [ldev] Erasing FE.KEYID = 1
1,242,934 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,599 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,315 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,915 UART: [ldev] --
1,282,334 UART: [fwproc] Wait for Commands...
1,282,930 UART: [fwproc] Recv command 0x46574c44
1,283,658 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,180 UART: ROM Fatal Error: 0x000B0030
1,598,337 >>> mbox cmd response: failed
1,598,337 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,343 >>> mbox cmd response: failed
1,598,343 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,666 UART: [state] LifecycleState = Unprovisioned
85,321 UART: [state] DebugLocked = No
86,021 UART: [state] WD Timer not started. Device not locked for debugging
87,198 UART: [kat] SHA2-256
892,848 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,973 UART: [kat] ++
897,125 UART: [kat] sha1
901,413 UART: [kat] SHA2-256
903,353 UART: [kat] SHA2-384
906,100 UART: [kat] SHA2-512-ACC
908,001 UART: [kat] ECC-384
917,434 UART: [kat] HMAC-384Kdf
922,012 UART: [kat] LMS
1,170,340 UART: [kat] --
1,171,125 UART: [cold-reset] ++
1,171,631 UART: [fht] FHT @ 0x50003400
1,174,424 UART: [idev] ++
1,174,592 UART: [idev] CDI.KEYID = 6
1,174,952 UART: [idev] SUBJECT.KEYID = 7
1,175,376 UART: [idev] UDS.KEYID = 0
1,175,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,428 UART: [idev] Erasing UDS.KEYID = 0
1,200,667 UART: [idev] Sha1 KeyId Algorithm
1,209,247 UART: [idev] --
1,210,315 UART: [ldev] ++
1,210,483 UART: [ldev] CDI.KEYID = 6
1,210,846 UART: [ldev] SUBJECT.KEYID = 5
1,211,272 UART: [ldev] AUTHORITY.KEYID = 7
1,211,735 UART: [ldev] FE.KEYID = 1
1,216,823 UART: [ldev] Erasing FE.KEYID = 1
1,242,764 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,928 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,640 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,495 UART: [ldev] --
1,281,876 UART: [fwproc] Wait for Commands...
1,282,456 UART: [fwproc] Recv command 0x46574c44
1,283,184 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,335 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,505 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,832 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,448,713 >>> mbox cmd response: failed
1,448,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,719 >>> mbox cmd response: failed
1,448,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,448,725 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,297 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,573 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,663 UART: [state] LifecycleState = Unprovisioned
86,318 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,095 UART: [kat] SHA2-256
893,745 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,870 UART: [kat] ++
898,022 UART: [kat] sha1
902,174 UART: [kat] SHA2-256
904,114 UART: [kat] SHA2-384
906,869 UART: [kat] SHA2-512-ACC
908,770 UART: [kat] ECC-384
918,873 UART: [kat] HMAC-384Kdf
923,521 UART: [kat] LMS
1,171,849 UART: [kat] --
1,172,880 UART: [cold-reset] ++
1,173,232 UART: [fht] FHT @ 0x50003400
1,175,983 UART: [idev] ++
1,176,151 UART: [idev] CDI.KEYID = 6
1,176,511 UART: [idev] SUBJECT.KEYID = 7
1,176,935 UART: [idev] UDS.KEYID = 0
1,177,280 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,717 UART: [idev] Erasing UDS.KEYID = 0
1,201,598 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,238 UART: [ldev] ++
1,211,406 UART: [ldev] CDI.KEYID = 6
1,211,769 UART: [ldev] SUBJECT.KEYID = 5
1,212,195 UART: [ldev] AUTHORITY.KEYID = 7
1,212,658 UART: [ldev] FE.KEYID = 1
1,217,934 UART: [ldev] Erasing FE.KEYID = 1
1,244,671 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,663 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,375 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,466 UART: [ldev] --
1,283,939 UART: [fwproc] Wait for Commands...
1,284,631 UART: [fwproc] Recv command 0x46574c44
1,285,359 UART: [fwproc] Recv'd Img size: 118548 bytes
1,598,429 UART: ROM Fatal Error: 0x000B0030
1,599,586 >>> mbox cmd response: failed
1,599,586 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,592 >>> mbox cmd response: failed
1,599,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,599,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,863 UART: [state] LifecycleState = Unprovisioned
85,518 UART: [state] DebugLocked = No
86,170 UART: [state] WD Timer not started. Device not locked for debugging
87,363 UART: [kat] SHA2-256
893,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,138 UART: [kat] ++
897,290 UART: [kat] sha1
901,584 UART: [kat] SHA2-256
903,524 UART: [kat] SHA2-384
906,097 UART: [kat] SHA2-512-ACC
907,998 UART: [kat] ECC-384
917,701 UART: [kat] HMAC-384Kdf
922,481 UART: [kat] LMS
1,170,809 UART: [kat] --
1,171,586 UART: [cold-reset] ++
1,171,918 UART: [fht] FHT @ 0x50003400
1,174,513 UART: [idev] ++
1,174,681 UART: [idev] CDI.KEYID = 6
1,175,041 UART: [idev] SUBJECT.KEYID = 7
1,175,465 UART: [idev] UDS.KEYID = 0
1,175,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,467 UART: [idev] Erasing UDS.KEYID = 0
1,200,720 UART: [idev] Sha1 KeyId Algorithm
1,209,230 UART: [idev] --
1,210,164 UART: [ldev] ++
1,210,332 UART: [ldev] CDI.KEYID = 6
1,210,695 UART: [ldev] SUBJECT.KEYID = 5
1,211,121 UART: [ldev] AUTHORITY.KEYID = 7
1,211,584 UART: [ldev] FE.KEYID = 1
1,217,030 UART: [ldev] Erasing FE.KEYID = 1
1,242,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,258 UART: [ldev] --
1,281,593 UART: [fwproc] Wait for Commands...
1,282,303 UART: [fwproc] Recv command 0x46574c44
1,283,031 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,692 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,862 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,029 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.89s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,294 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,450,632 >>> mbox cmd response: failed
1,450,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,638 >>> mbox cmd response: failed
1,450,638 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,644 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,212 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,211 UART:
192,569 UART: Running Caliptra ROM ...
193,744 UART:
193,900 UART: [state] CFI Enabled
263,006 UART: [state] LifecycleState = Unprovisioned
264,979 UART: [state] DebugLocked = No
267,286 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,349 UART: [kat] SHA2-256
441,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,586 UART: [kat] ++
452,067 UART: [kat] sha1
462,087 UART: [kat] SHA2-256
464,779 UART: [kat] SHA2-384
469,572 UART: [kat] SHA2-512-ACC
471,961 UART: [kat] ECC-384
2,766,987 UART: [kat] HMAC-384Kdf
2,798,991 UART: [kat] LMS
3,989,334 UART: [kat] --
3,994,239 UART: [cold-reset] ++
3,996,613 UART: [fht] Storing FHT @ 0x50003400
4,008,656 UART: [idev] ++
4,009,240 UART: [idev] CDI.KEYID = 6
4,010,208 UART: [idev] SUBJECT.KEYID = 7
4,011,422 UART: [idev] UDS.KEYID = 0
4,014,444 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,717 UART: [idev] Erasing UDS.KEYID = 0
7,344,883 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,081 UART: [idev] --
7,370,869 UART: [ldev] ++
7,371,440 UART: [ldev] CDI.KEYID = 6
7,372,405 UART: [ldev] SUBJECT.KEYID = 5
7,373,623 UART: [ldev] AUTHORITY.KEYID = 7
7,374,858 UART: [ldev] FE.KEYID = 1
7,421,166 UART: [ldev] Erasing FE.KEYID = 1
10,755,244 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,068,983 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,083,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,098,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,112,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,131,850 UART: [ldev] --
13,137,227 UART: [fwproc] Waiting for Commands...
13,139,003 UART: [fwproc] Received command 0x46574c44
13,141,198 UART: [fwproc] Received Image of size 118548 bytes
13,219,491 UART: ROM Fatal Error: 0x000B0032
13,222,991 >>> mbox cmd response: failed
13,223,471 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,223,855 >>> mbox cmd response: failed
13,224,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,224,426 >>> mbox cmd response: failed
Initializing fuses
2,060,596 writing to cptra_bootfsm_go
2,249,921 UART:
2,250,284 UART: Running Caliptra ROM ...
2,251,421 UART:
2,251,586 UART: [state] CFI Enabled
2,312,744 UART: [state] LifecycleState = Unprovisioned
2,314,636 UART: [state] DebugLocked = No
2,316,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,639 UART: [kat] SHA2-256
2,491,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,847 UART: [kat] ++
2,502,398 UART: [kat] sha1
2,513,620 UART: [kat] SHA2-256
2,516,323 UART: [kat] SHA2-384
2,523,345 UART: [kat] SHA2-512-ACC
2,525,720 UART: [kat] ECC-384
4,817,449 UART: [kat] HMAC-384Kdf
4,849,723 UART: [kat] LMS
6,040,030 UART: [kat] --
6,044,303 UART: [cold-reset] ++
6,045,695 UART: [fht] Storing FHT @ 0x50003400
6,057,130 UART: [idev] ++
6,057,694 UART: [idev] CDI.KEYID = 6
6,058,635 UART: [idev] SUBJECT.KEYID = 7
6,059,905 UART: [idev] UDS.KEYID = 0
6,062,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,211,322 UART: [idev] Erasing UDS.KEYID = 0
9,395,348 UART: [idev] Using Sha1 for KeyId Algorithm
9,417,548 UART: [idev] --
9,421,119 UART: [ldev] ++
9,421,687 UART: [ldev] CDI.KEYID = 6
9,422,727 UART: [ldev] SUBJECT.KEYID = 5
9,423,922 UART: [ldev] AUTHORITY.KEYID = 7
9,425,173 UART: [ldev] FE.KEYID = 1
9,472,294 UART: [ldev] Erasing FE.KEYID = 1
12,801,101 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,094,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,109,471 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,124,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,138,818 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,157,159 UART: [ldev] --
15,162,049 UART: [fwproc] Waiting for Commands...
15,164,473 UART: [fwproc] Received command 0x46574c44
15,166,662 UART: [fwproc] Received Image of size 118548 bytes
19,274,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,350,716 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,423,882 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,752,902 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,000 writing to cptra_bootfsm_go
3,787,668 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,935,605 >>> mbox cmd response: failed
12,936,206 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,936,547 >>> mbox cmd response: failed
12,936,824 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,937,117 >>> mbox cmd response: failed
Initializing fuses
2,053,692 writing to cptra_bootfsm_go
5,822,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,980,520 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,283 writing to cptra_bootfsm_go
192,436 UART:
192,842 UART: Running Caliptra ROM ...
193,951 UART:
603,451 UART: [state] CFI Enabled
617,118 UART: [state] LifecycleState = Unprovisioned
619,092 UART: [state] DebugLocked = No
621,483 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,854 UART: [kat] SHA2-256
796,564 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,110 UART: [kat] ++
807,565 UART: [kat] sha1
819,144 UART: [kat] SHA2-256
821,825 UART: [kat] SHA2-384
827,654 UART: [kat] SHA2-512-ACC
829,985 UART: [kat] ECC-384
3,115,303 UART: [kat] HMAC-384Kdf
3,128,250 UART: [kat] LMS
4,318,355 UART: [kat] --
4,323,468 UART: [cold-reset] ++
4,324,448 UART: [fht] Storing FHT @ 0x50003400
4,335,559 UART: [idev] ++
4,336,152 UART: [idev] CDI.KEYID = 6
4,337,075 UART: [idev] SUBJECT.KEYID = 7
4,338,305 UART: [idev] UDS.KEYID = 0
4,341,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,490,412 UART: [idev] Erasing UDS.KEYID = 0
7,619,678 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,924 UART: [idev] --
7,645,554 UART: [ldev] ++
7,646,141 UART: [ldev] CDI.KEYID = 6
7,647,172 UART: [ldev] SUBJECT.KEYID = 5
7,648,348 UART: [ldev] AUTHORITY.KEYID = 7
7,649,588 UART: [ldev] FE.KEYID = 1
7,658,790 UART: [ldev] Erasing FE.KEYID = 1
10,947,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,536 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,128 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,895 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,419 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,170 UART: [ldev] --
13,307,375 UART: [fwproc] Waiting for Commands...
13,310,388 UART: [fwproc] Received command 0x46574c44
13,312,593 UART: [fwproc] Received Image of size 118548 bytes
13,389,550 UART: ROM Fatal Error: 0x000B0032
13,393,074 >>> mbox cmd response: failed
13,393,510 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,393,851 >>> mbox cmd response: failed
13,394,122 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,394,421 >>> mbox cmd response: failed
Initializing fuses
2,058,995 writing to cptra_bootfsm_go
2,248,262 UART:
2,248,608 UART: Running Caliptra ROM ...
2,249,749 UART:
7,061,963 UART: [state] CFI Enabled
7,078,147 UART: [state] LifecycleState = Unprovisioned
7,080,077 UART: [state] DebugLocked = No
7,082,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,087,817 UART: [kat] SHA2-256
7,257,574 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,268,110 UART: [kat] ++
7,268,574 UART: [kat] sha1
7,280,165 UART: [kat] SHA2-256
7,282,904 UART: [kat] SHA2-384
7,289,719 UART: [kat] SHA2-512-ACC
7,292,083 UART: [kat] ECC-384
9,574,571 UART: [kat] HMAC-384Kdf
9,584,981 UART: [kat] LMS
10,775,067 UART: [kat] --
10,780,375 UART: [cold-reset] ++
10,781,507 UART: [fht] Storing FHT @ 0x50003400
10,793,367 UART: [idev] ++
10,793,984 UART: [idev] CDI.KEYID = 6
10,794,909 UART: [idev] SUBJECT.KEYID = 7
10,796,136 UART: [idev] UDS.KEYID = 0
10,798,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,947,566 UART: [idev] Erasing UDS.KEYID = 0
14,081,873 UART: [idev] Using Sha1 for KeyId Algorithm
14,103,976 UART: [idev] --
14,108,084 UART: [ldev] ++
14,108,664 UART: [ldev] CDI.KEYID = 6
14,109,651 UART: [ldev] SUBJECT.KEYID = 5
14,110,881 UART: [ldev] AUTHORITY.KEYID = 7
14,112,073 UART: [ldev] FE.KEYID = 1
14,124,462 UART: [ldev] Erasing FE.KEYID = 1
17,412,404 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,704,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,719,228 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,734,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,748,559 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,767,101 UART: [ldev] --
19,771,200 UART: [fwproc] Waiting for Commands...
19,774,175 UART: [fwproc] Received command 0x46574c44
19,776,370 UART: [fwproc] Received Image of size 118548 bytes
23,883,727 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,958,729 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,031,920 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,359,602 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
4,130,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,149,476 >>> mbox cmd response: failed
13,150,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,150,406 >>> mbox cmd response: failed
13,150,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,150,952 >>> mbox cmd response: failed
Initializing fuses
2,054,498 writing to cptra_bootfsm_go
10,837,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,873,785 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,117 writing to cptra_bootfsm_go
194,234 UART:
194,591 UART: Running Caliptra ROM ...
195,717 UART:
195,866 UART: [state] CFI Enabled
261,626 UART: [state] LifecycleState = Unprovisioned
263,552 UART: [state] DebugLocked = No
265,263 UART: [state] WD Timer not started. Device not locked for debugging
269,872 UART: [kat] SHA2-256
449,534 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,335 UART: [kat] ++
460,876 UART: [kat] sha1
471,391 UART: [kat] SHA2-256
474,097 UART: [kat] SHA2-384
478,954 UART: [kat] SHA2-512-ACC
481,352 UART: [kat] ECC-384
2,926,137 UART: [kat] HMAC-384Kdf
2,950,202 UART: [kat] LMS
3,426,713 UART: [kat] --
3,430,337 UART: [cold-reset] ++
3,432,003 UART: [fht] FHT @ 0x50003400
3,443,580 UART: [idev] ++
3,444,196 UART: [idev] CDI.KEYID = 6
3,445,120 UART: [idev] SUBJECT.KEYID = 7
3,446,346 UART: [idev] UDS.KEYID = 0
3,449,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,650 UART: [idev] Erasing UDS.KEYID = 0
5,965,370 UART: [idev] Sha1 KeyId Algorithm
5,989,222 UART: [idev] --
5,993,999 UART: [ldev] ++
5,994,584 UART: [ldev] CDI.KEYID = 6
5,995,498 UART: [ldev] SUBJECT.KEYID = 5
5,996,662 UART: [ldev] AUTHORITY.KEYID = 7
5,997,958 UART: [ldev] FE.KEYID = 1
6,037,591 UART: [ldev] Erasing FE.KEYID = 1
8,541,491 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,018 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,367 UART: [ldev] --
10,353,934 UART: [fwproc] Wait for Commands...
10,355,604 UART: [fwproc] Recv command 0x46574c44
10,357,597 UART: [fwproc] Recv'd Img size: 118548 bytes
10,446,661 UART: ROM Fatal Error: 0x000B0032
10,449,902 >>> mbox cmd response: failed
10,450,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,450,631 >>> mbox cmd response: failed
10,450,901 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,451,200 >>> mbox cmd response: failed
Initializing fuses
2,055,140 writing to cptra_bootfsm_go
2,244,481 UART:
2,244,826 UART: Running Caliptra ROM ...
2,245,965 UART:
2,246,132 UART: [state] CFI Enabled
2,316,830 UART: [state] LifecycleState = Unprovisioned
2,318,754 UART: [state] DebugLocked = No
2,320,331 UART: [state] WD Timer not started. Device not locked for debugging
2,324,620 UART: [kat] SHA2-256
2,504,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,515,019 UART: [kat] ++
2,515,524 UART: [kat] sha1
2,527,329 UART: [kat] SHA2-256
2,530,026 UART: [kat] SHA2-384
2,535,589 UART: [kat] SHA2-512-ACC
2,537,950 UART: [kat] ECC-384
5,001,561 UART: [kat] HMAC-384Kdf
5,023,996 UART: [kat] LMS
5,500,502 UART: [kat] --
5,503,744 UART: [cold-reset] ++
5,506,161 UART: [fht] FHT @ 0x50003400
5,517,206 UART: [idev] ++
5,517,785 UART: [idev] CDI.KEYID = 6
5,518,830 UART: [idev] SUBJECT.KEYID = 7
5,519,995 UART: [idev] UDS.KEYID = 0
5,522,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,671,867 UART: [idev] Erasing UDS.KEYID = 0
8,041,031 UART: [idev] Sha1 KeyId Algorithm
8,064,703 UART: [idev] --
8,070,382 UART: [ldev] ++
8,070,961 UART: [ldev] CDI.KEYID = 6
8,071,857 UART: [ldev] SUBJECT.KEYID = 5
8,073,081 UART: [ldev] AUTHORITY.KEYID = 7
8,074,325 UART: [ldev] FE.KEYID = 1
8,108,770 UART: [ldev] Erasing FE.KEYID = 1
10,615,869 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,352,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,368,176 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,384,070 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,399,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,422,350 UART: [ldev] --
12,427,292 UART: [fwproc] Wait for Commands...
12,430,094 UART: [fwproc] Recv command 0x46574c44
12,432,192 UART: [fwproc] Recv'd Img size: 118548 bytes
15,917,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,999,967 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,073,041 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,400,878 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,926 writing to cptra_bootfsm_go
3,463,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,339,146 >>> mbox cmd response: failed
10,340,038 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,340,412 >>> mbox cmd response: failed
10,340,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,340,994 >>> mbox cmd response: failed
Initializing fuses
2,058,647 writing to cptra_bootfsm_go
5,511,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,294,728 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,452 writing to cptra_bootfsm_go
192,647 UART:
193,009 UART: Running Caliptra ROM ...
194,196 UART:
603,924 UART: [state] CFI Enabled
615,331 UART: [state] LifecycleState = Unprovisioned
617,244 UART: [state] DebugLocked = No
620,194 UART: [state] WD Timer not started. Device not locked for debugging
623,775 UART: [kat] SHA2-256
803,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,194 UART: [kat] ++
814,786 UART: [kat] sha1
825,410 UART: [kat] SHA2-256
828,099 UART: [kat] SHA2-384
833,814 UART: [kat] SHA2-512-ACC
836,156 UART: [kat] ECC-384
3,276,031 UART: [kat] HMAC-384Kdf
3,288,329 UART: [kat] LMS
3,764,875 UART: [kat] --
3,767,890 UART: [cold-reset] ++
3,769,608 UART: [fht] FHT @ 0x50003400
3,780,642 UART: [idev] ++
3,781,215 UART: [idev] CDI.KEYID = 6
3,782,234 UART: [idev] SUBJECT.KEYID = 7
3,783,395 UART: [idev] UDS.KEYID = 0
3,786,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,776 UART: [idev] Erasing UDS.KEYID = 0
6,259,709 UART: [idev] Sha1 KeyId Algorithm
6,283,362 UART: [idev] --
6,287,714 UART: [ldev] ++
6,288,293 UART: [ldev] CDI.KEYID = 6
6,289,180 UART: [ldev] SUBJECT.KEYID = 5
6,290,453 UART: [ldev] AUTHORITY.KEYID = 7
6,291,689 UART: [ldev] FE.KEYID = 1
6,301,187 UART: [ldev] Erasing FE.KEYID = 1
8,780,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,501,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,517,436 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,548,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,569,265 UART: [ldev] --
10,575,182 UART: [fwproc] Wait for Commands...
10,577,743 UART: [fwproc] Recv command 0x46574c44
10,579,741 UART: [fwproc] Recv'd Img size: 118548 bytes
10,667,333 UART: ROM Fatal Error: 0x000B0032
10,670,576 >>> mbox cmd response: failed
10,670,991 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,671,318 >>> mbox cmd response: failed
10,671,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,671,884 >>> mbox cmd response: failed
Initializing fuses
2,053,888 writing to cptra_bootfsm_go
2,243,133 UART:
2,243,473 UART: Running Caliptra ROM ...
2,244,613 UART:
9,783,726 UART: [state] CFI Enabled
9,798,952 UART: [state] LifecycleState = Unprovisioned
9,800,877 UART: [state] DebugLocked = No
9,802,816 UART: [state] WD Timer not started. Device not locked for debugging
9,807,211 UART: [kat] SHA2-256
9,986,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,997,668 UART: [kat] ++
9,998,168 UART: [kat] sha1
10,010,188 UART: [kat] SHA2-256
10,012,890 UART: [kat] SHA2-384
10,020,040 UART: [kat] SHA2-512-ACC
10,022,407 UART: [kat] ECC-384
12,466,319 UART: [kat] HMAC-384Kdf
12,477,047 UART: [kat] LMS
12,953,528 UART: [kat] --
12,956,549 UART: [cold-reset] ++
12,958,558 UART: [fht] FHT @ 0x50003400
12,970,546 UART: [idev] ++
12,971,156 UART: [idev] CDI.KEYID = 6
12,972,111 UART: [idev] SUBJECT.KEYID = 7
12,973,332 UART: [idev] UDS.KEYID = 0
12,976,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,125,088 UART: [idev] Erasing UDS.KEYID = 0
15,445,885 UART: [idev] Sha1 KeyId Algorithm
15,470,295 UART: [idev] --
15,474,702 UART: [ldev] ++
15,475,286 UART: [ldev] CDI.KEYID = 6
15,476,310 UART: [ldev] SUBJECT.KEYID = 5
15,477,412 UART: [ldev] AUTHORITY.KEYID = 7
15,478,697 UART: [ldev] FE.KEYID = 1
15,489,617 UART: [ldev] Erasing FE.KEYID = 1
17,969,171 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,687,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,703,053 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,718,881 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,734,468 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,754,698 UART: [ldev] --
19,759,912 UART: [fwproc] Wait for Commands...
19,761,853 UART: [fwproc] Recv command 0x46574c44
19,763,846 UART: [fwproc] Recv'd Img size: 118548 bytes
23,246,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,326,168 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,399,186 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,728,317 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,375 writing to cptra_bootfsm_go
3,781,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,569,750 >>> mbox cmd response: failed
10,570,632 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,571,000 >>> mbox cmd response: failed
10,571,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,571,566 >>> mbox cmd response: failed
Initializing fuses
2,054,920 writing to cptra_bootfsm_go
13,083,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,746,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,020 writing to cptra_bootfsm_go
192,255 UART:
192,625 UART: Running Caliptra ROM ...
193,746 UART:
193,897 UART: [state] CFI Enabled
261,224 UART: [state] LifecycleState = Unprovisioned
263,609 UART: [state] DebugLocked = No
266,143 UART: [state] WD Timer not started. Device not locked for debugging
270,805 UART: [kat] SHA2-256
460,697 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,439 UART: [kat] ++
471,917 UART: [kat] sha1
484,317 UART: [kat] SHA2-256
487,330 UART: [kat] SHA2-384
494,230 UART: [kat] SHA2-512-ACC
496,865 UART: [kat] ECC-384
2,947,913 UART: [kat] HMAC-384Kdf
2,970,230 UART: [kat] LMS
3,502,043 UART: [kat] --
3,508,317 UART: [cold-reset] ++
3,509,940 UART: [fht] FHT @ 0x50003400
3,522,604 UART: [idev] ++
3,523,288 UART: [idev] CDI.KEYID = 6
3,524,259 UART: [idev] SUBJECT.KEYID = 7
3,525,425 UART: [idev] UDS.KEYID = 0
3,528,192 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,453 UART: [idev] Erasing UDS.KEYID = 0
6,027,658 UART: [idev] Sha1 KeyId Algorithm
6,050,472 UART: [idev] --
6,055,288 UART: [ldev] ++
6,055,979 UART: [ldev] CDI.KEYID = 6
6,056,919 UART: [ldev] SUBJECT.KEYID = 5
6,058,089 UART: [ldev] AUTHORITY.KEYID = 7
6,059,282 UART: [ldev] FE.KEYID = 1
6,097,891 UART: [ldev] Erasing FE.KEYID = 1
8,604,697 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,470 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,829 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,704 UART: [ldev] --
10,410,677 UART: [fwproc] Wait for Commands...
10,412,827 UART: [fwproc] Recv command 0x46574c44
10,415,153 UART: [fwproc] Recv'd Img size: 118548 bytes
10,520,005 UART: ROM Fatal Error: 0x000B0032
10,523,646 >>> mbox cmd response: failed
10,524,060 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,407 >>> mbox cmd response: failed
10,524,681 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,976 >>> mbox cmd response: failed
Initializing fuses
2,054,312 writing to cptra_bootfsm_go
2,243,632 UART:
2,243,990 UART: Running Caliptra ROM ...
2,245,036 UART:
2,245,195 UART: [state] CFI Enabled
2,301,130 UART: [state] LifecycleState = Unprovisioned
2,303,511 UART: [state] DebugLocked = No
2,305,042 UART: [state] WD Timer not started. Device not locked for debugging
2,310,089 UART: [kat] SHA2-256
2,499,960 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,510,755 UART: [kat] ++
2,511,222 UART: [kat] sha1
2,522,365 UART: [kat] SHA2-256
2,525,392 UART: [kat] SHA2-384
2,530,569 UART: [kat] SHA2-512-ACC
2,533,156 UART: [kat] ECC-384
4,987,053 UART: [kat] HMAC-384Kdf
5,008,523 UART: [kat] LMS
5,540,288 UART: [kat] --
5,544,876 UART: [cold-reset] ++
5,546,495 UART: [fht] FHT @ 0x50003400
5,557,047 UART: [idev] ++
5,557,733 UART: [idev] CDI.KEYID = 6
5,558,762 UART: [idev] SUBJECT.KEYID = 7
5,559,872 UART: [idev] UDS.KEYID = 0
5,562,225 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,711,416 UART: [idev] Erasing UDS.KEYID = 0
8,064,202 UART: [idev] Sha1 KeyId Algorithm
8,087,029 UART: [idev] --
8,092,819 UART: [ldev] ++
8,093,510 UART: [ldev] CDI.KEYID = 6
8,094,429 UART: [ldev] SUBJECT.KEYID = 5
8,095,596 UART: [ldev] AUTHORITY.KEYID = 7
8,096,783 UART: [ldev] FE.KEYID = 1
8,137,094 UART: [ldev] Erasing FE.KEYID = 1
10,642,069 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,378,519 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,393,700 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,408,954 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,424,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,445,412 UART: [ldev] --
12,449,933 UART: [fwproc] Wait for Commands...
12,451,562 UART: [fwproc] Recv command 0x46574c44
12,453,829 UART: [fwproc] Recv'd Img size: 118548 bytes
15,938,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,018,615 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,142,198 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,701,855 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,923 writing to cptra_bootfsm_go
3,440,238 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,331,414 >>> mbox cmd response: failed
10,331,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,332,302 >>> mbox cmd response: failed
10,332,593 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,332,888 >>> mbox cmd response: failed
Initializing fuses
2,054,490 writing to cptra_bootfsm_go
5,489,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,881,815 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
192,487 UART:
192,848 UART: Running Caliptra ROM ...
194,038 UART:
603,615 UART: [state] CFI Enabled
617,867 UART: [state] LifecycleState = Unprovisioned
620,237 UART: [state] DebugLocked = No
623,040 UART: [state] WD Timer not started. Device not locked for debugging
627,879 UART: [kat] SHA2-256
817,790 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,551 UART: [kat] ++
829,144 UART: [kat] sha1
841,060 UART: [kat] SHA2-256
844,089 UART: [kat] SHA2-384
850,836 UART: [kat] SHA2-512-ACC
853,437 UART: [kat] ECC-384
3,296,271 UART: [kat] HMAC-384Kdf
3,309,183 UART: [kat] LMS
3,841,003 UART: [kat] --
3,845,336 UART: [cold-reset] ++
3,846,461 UART: [fht] FHT @ 0x50003400
3,859,073 UART: [idev] ++
3,859,757 UART: [idev] CDI.KEYID = 6
3,860,728 UART: [idev] SUBJECT.KEYID = 7
3,861,948 UART: [idev] UDS.KEYID = 0
3,864,988 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,555 UART: [idev] Erasing UDS.KEYID = 0
6,335,617 UART: [idev] Sha1 KeyId Algorithm
6,359,570 UART: [idev] --
6,364,548 UART: [ldev] ++
6,365,237 UART: [ldev] CDI.KEYID = 6
6,366,154 UART: [ldev] SUBJECT.KEYID = 5
6,367,375 UART: [ldev] AUTHORITY.KEYID = 7
6,368,562 UART: [ldev] FE.KEYID = 1
6,379,117 UART: [ldev] Erasing FE.KEYID = 1
8,857,756 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,053 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,563 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,647,816 UART: [ldev] --
10,653,541 UART: [fwproc] Wait for Commands...
10,655,594 UART: [fwproc] Recv command 0x46574c44
10,657,919 UART: [fwproc] Recv'd Img size: 118548 bytes
10,767,114 UART: ROM Fatal Error: 0x000B0032
10,770,807 >>> mbox cmd response: failed
10,771,395 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,771,762 >>> mbox cmd response: failed
10,772,042 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,772,359 >>> mbox cmd response: failed
Initializing fuses
2,055,071 writing to cptra_bootfsm_go
2,244,386 UART:
2,244,734 UART: Running Caliptra ROM ...
2,245,893 UART:
9,684,532 UART: [state] CFI Enabled
9,698,618 UART: [state] LifecycleState = Unprovisioned
9,700,986 UART: [state] DebugLocked = No
9,702,610 UART: [state] WD Timer not started. Device not locked for debugging
9,706,336 UART: [kat] SHA2-256
9,896,028 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,906,847 UART: [kat] ++
9,907,337 UART: [kat] sha1
9,917,368 UART: [kat] SHA2-256
9,920,402 UART: [kat] SHA2-384
9,926,544 UART: [kat] SHA2-512-ACC
9,929,141 UART: [kat] ECC-384
12,370,858 UART: [kat] HMAC-384Kdf
12,382,933 UART: [kat] LMS
12,914,756 UART: [kat] --
12,919,737 UART: [cold-reset] ++
12,921,782 UART: [fht] FHT @ 0x50003400
12,933,525 UART: [idev] ++
12,934,210 UART: [idev] CDI.KEYID = 6
12,935,175 UART: [idev] SUBJECT.KEYID = 7
12,936,333 UART: [idev] UDS.KEYID = 0
12,938,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,087,761 UART: [idev] Erasing UDS.KEYID = 0
15,413,509 UART: [idev] Sha1 KeyId Algorithm
15,437,293 UART: [idev] --
15,441,018 UART: [ldev] ++
15,441,743 UART: [ldev] CDI.KEYID = 6
15,442,636 UART: [ldev] SUBJECT.KEYID = 5
15,443,796 UART: [ldev] AUTHORITY.KEYID = 7
15,445,028 UART: [ldev] FE.KEYID = 1
15,455,194 UART: [ldev] Erasing FE.KEYID = 1
17,936,137 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,655,285 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,670,465 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,685,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,700,750 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,721,912 UART: [ldev] --
19,726,485 UART: [fwproc] Wait for Commands...
19,728,643 UART: [fwproc] Recv command 0x46574c44
19,730,971 UART: [fwproc] Recv'd Img size: 118548 bytes
23,236,410 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,318,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,441,819 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,001,917 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,215 writing to cptra_bootfsm_go
3,758,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,555,075 >>> mbox cmd response: failed
10,555,627 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,555,976 >>> mbox cmd response: failed
10,556,296 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,597 >>> mbox cmd response: failed
Initializing fuses
2,049,707 writing to cptra_bootfsm_go
13,067,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,349,266 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,312 UART: [state] LifecycleState = Unprovisioned
85,967 UART: [state] DebugLocked = No
86,491 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,159 UART: [kat] SHA2-256
882,090 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,205 UART: [kat] ++
886,357 UART: [kat] sha1
890,559 UART: [kat] SHA2-256
892,497 UART: [kat] SHA2-384
895,314 UART: [kat] SHA2-512-ACC
897,215 UART: [kat] ECC-384
902,896 UART: [kat] HMAC-384Kdf
907,498 UART: [kat] LMS
1,475,694 UART: [kat] --
1,476,669 UART: [cold-reset] ++
1,477,133 UART: [fht] Storing FHT @ 0x50003400
1,480,084 UART: [idev] ++
1,480,252 UART: [idev] CDI.KEYID = 6
1,480,612 UART: [idev] SUBJECT.KEYID = 7
1,481,036 UART: [idev] UDS.KEYID = 0
1,481,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,052 UART: [idev] Erasing UDS.KEYID = 0
1,505,452 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,062 UART: [idev] --
1,515,067 UART: [ldev] ++
1,515,235 UART: [ldev] CDI.KEYID = 6
1,515,598 UART: [ldev] SUBJECT.KEYID = 5
1,516,024 UART: [ldev] AUTHORITY.KEYID = 7
1,516,487 UART: [ldev] FE.KEYID = 1
1,521,639 UART: [ldev] Erasing FE.KEYID = 1
1,546,438 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,109 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,716 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,428 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,462 UART: [ldev] --
1,585,947 UART: [fwproc] Waiting for Commands...
1,586,740 UART: [fwproc] Received command 0x46574c44
1,587,531 UART: [fwproc] Received Image of size 118548 bytes
1,613,677 UART: ROM Fatal Error: 0x000B0032
1,614,834 >>> mbox cmd response: failed
1,614,834 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,840 >>> mbox cmd response: failed
1,614,840 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,846 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,445 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,075 UART: [kat] SHA2-256
882,006 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,121 UART: [kat] ++
886,273 UART: [kat] sha1
890,589 UART: [kat] SHA2-256
892,527 UART: [kat] SHA2-384
895,300 UART: [kat] SHA2-512-ACC
897,201 UART: [kat] ECC-384
902,838 UART: [kat] HMAC-384Kdf
907,538 UART: [kat] LMS
1,475,734 UART: [kat] --
1,476,771 UART: [cold-reset] ++
1,477,279 UART: [fht] Storing FHT @ 0x50003400
1,480,052 UART: [idev] ++
1,480,220 UART: [idev] CDI.KEYID = 6
1,480,580 UART: [idev] SUBJECT.KEYID = 7
1,481,004 UART: [idev] UDS.KEYID = 0
1,481,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,854 UART: [idev] Erasing UDS.KEYID = 0
1,505,120 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,718 UART: [idev] --
1,514,975 UART: [ldev] ++
1,515,143 UART: [ldev] CDI.KEYID = 6
1,515,506 UART: [ldev] SUBJECT.KEYID = 5
1,515,932 UART: [ldev] AUTHORITY.KEYID = 7
1,516,395 UART: [ldev] FE.KEYID = 1
1,521,731 UART: [ldev] Erasing FE.KEYID = 1
1,548,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,685 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,401 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,292 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,004 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,052 UART: [ldev] --
1,587,485 UART: [fwproc] Waiting for Commands...
1,588,196 UART: [fwproc] Received command 0x46574c44
1,588,987 UART: [fwproc] Received Image of size 118548 bytes
2,933,060 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,170 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,831 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,468,225 >>> mbox cmd response: failed
1,468,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,231 >>> mbox cmd response: failed
1,468,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,953 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,531 UART: [state] LifecycleState = Unprovisioned
86,186 UART: [state] DebugLocked = No
86,920 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,500 UART: [kat] SHA2-256
882,431 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,546 UART: [kat] ++
886,698 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,599 UART: [kat] SHA2-512-ACC
897,500 UART: [kat] ECC-384
903,227 UART: [kat] HMAC-384Kdf
907,905 UART: [kat] LMS
1,476,101 UART: [kat] --
1,476,950 UART: [cold-reset] ++
1,477,340 UART: [fht] Storing FHT @ 0x50003400
1,480,183 UART: [idev] ++
1,480,351 UART: [idev] CDI.KEYID = 6
1,480,711 UART: [idev] SUBJECT.KEYID = 7
1,481,135 UART: [idev] UDS.KEYID = 0
1,481,480 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,991 UART: [idev] Erasing UDS.KEYID = 0
1,506,195 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,721 UART: [idev] --
1,515,930 UART: [ldev] ++
1,516,098 UART: [ldev] CDI.KEYID = 6
1,516,461 UART: [ldev] SUBJECT.KEYID = 5
1,516,887 UART: [ldev] AUTHORITY.KEYID = 7
1,517,350 UART: [ldev] FE.KEYID = 1
1,522,506 UART: [ldev] Erasing FE.KEYID = 1
1,548,141 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,968 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,684 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,355 UART: [ldev] --
1,587,794 UART: [fwproc] Waiting for Commands...
1,588,617 UART: [fwproc] Received command 0x46574c44
1,589,408 UART: [fwproc] Received Image of size 118548 bytes
1,615,592 UART: ROM Fatal Error: 0x000B0032
1,616,749 >>> mbox cmd response: failed
1,616,749 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,755 >>> mbox cmd response: failed
1,616,755 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,827 UART: [state] LifecycleState = Unprovisioned
86,482 UART: [state] DebugLocked = No
87,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,598 UART: [kat] SHA2-256
882,529 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,644 UART: [kat] ++
886,796 UART: [kat] sha1
891,102 UART: [kat] SHA2-256
893,040 UART: [kat] SHA2-384
895,741 UART: [kat] SHA2-512-ACC
897,642 UART: [kat] ECC-384
903,407 UART: [kat] HMAC-384Kdf
907,869 UART: [kat] LMS
1,476,065 UART: [kat] --
1,476,928 UART: [cold-reset] ++
1,477,386 UART: [fht] Storing FHT @ 0x50003400
1,480,133 UART: [idev] ++
1,480,301 UART: [idev] CDI.KEYID = 6
1,480,661 UART: [idev] SUBJECT.KEYID = 7
1,481,085 UART: [idev] UDS.KEYID = 0
1,481,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,851 UART: [idev] Erasing UDS.KEYID = 0
1,505,843 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,525 UART: [idev] --
1,515,576 UART: [ldev] ++
1,515,744 UART: [ldev] CDI.KEYID = 6
1,516,107 UART: [ldev] SUBJECT.KEYID = 5
1,516,533 UART: [ldev] AUTHORITY.KEYID = 7
1,516,996 UART: [ldev] FE.KEYID = 1
1,522,258 UART: [ldev] Erasing FE.KEYID = 1
1,548,153 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,466 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,073 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,021 UART: [ldev] --
1,587,416 UART: [fwproc] Waiting for Commands...
1,588,133 UART: [fwproc] Received command 0x46574c44
1,588,924 UART: [fwproc] Received Image of size 118548 bytes
2,932,759 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,666 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,546 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,654 >>> mbox cmd response: failed
1,467,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,660 >>> mbox cmd response: failed
1,467,660 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,666 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,910 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,978,798 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,898 UART: [state] LifecycleState = Unprovisioned
85,553 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,522 UART: [kat] SHA2-256
891,072 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,176 UART: [kat] ++
895,328 UART: [kat] sha1
899,616 UART: [kat] SHA2-256
901,556 UART: [kat] SHA2-384
904,249 UART: [kat] SHA2-512-ACC
906,150 UART: [kat] ECC-384
915,529 UART: [kat] HMAC-384Kdf
920,071 UART: [kat] LMS
1,168,383 UART: [kat] --
1,169,124 UART: [cold-reset] ++
1,169,636 UART: [fht] FHT @ 0x50003400
1,172,178 UART: [idev] ++
1,172,346 UART: [idev] CDI.KEYID = 6
1,172,707 UART: [idev] SUBJECT.KEYID = 7
1,173,132 UART: [idev] UDS.KEYID = 0
1,173,478 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,221 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,207,995 UART: [idev] --
1,208,930 UART: [ldev] ++
1,209,098 UART: [ldev] CDI.KEYID = 6
1,209,462 UART: [ldev] SUBJECT.KEYID = 5
1,209,889 UART: [ldev] AUTHORITY.KEYID = 7
1,210,352 UART: [ldev] FE.KEYID = 1
1,215,594 UART: [ldev] Erasing FE.KEYID = 1
1,241,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,293 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,182 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,894 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,982 UART: [ldev] --
1,281,185 UART: [fwproc] Wait for Commands...
1,281,880 UART: [fwproc] Recv command 0x46574c44
1,282,613 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,964 UART: ROM Fatal Error: 0x000B0032
1,310,121 >>> mbox cmd response: failed
1,310,121 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,127 >>> mbox cmd response: failed
1,310,127 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,133 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,781 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,976 UART: [kat] SHA2-256
901,916 UART: [kat] SHA2-384
904,653 UART: [kat] SHA2-512-ACC
906,554 UART: [kat] ECC-384
916,081 UART: [kat] HMAC-384Kdf
920,473 UART: [kat] LMS
1,168,785 UART: [kat] --
1,169,712 UART: [cold-reset] ++
1,170,236 UART: [fht] FHT @ 0x50003400
1,172,748 UART: [idev] ++
1,172,916 UART: [idev] CDI.KEYID = 6
1,173,277 UART: [idev] SUBJECT.KEYID = 7
1,173,702 UART: [idev] UDS.KEYID = 0
1,174,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,631 UART: [idev] Erasing UDS.KEYID = 0
1,199,025 UART: [idev] Sha1 KeyId Algorithm
1,207,729 UART: [idev] --
1,208,680 UART: [ldev] ++
1,208,848 UART: [ldev] CDI.KEYID = 6
1,209,212 UART: [ldev] SUBJECT.KEYID = 5
1,209,639 UART: [ldev] AUTHORITY.KEYID = 7
1,210,102 UART: [ldev] FE.KEYID = 1
1,215,354 UART: [ldev] Erasing FE.KEYID = 1
1,241,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,930 UART: [ldev] --
1,280,385 UART: [fwproc] Wait for Commands...
1,281,058 UART: [fwproc] Recv command 0x46574c44
1,281,791 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,199 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,518 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,656 >>> mbox cmd response: failed
1,165,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,662 >>> mbox cmd response: failed
1,165,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,668 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,005 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,443 UART: [state] LifecycleState = Unprovisioned
86,098 UART: [state] DebugLocked = No
86,752 UART: [state] WD Timer not started. Device not locked for debugging
87,865 UART: [kat] SHA2-256
891,415 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,519 UART: [kat] ++
895,671 UART: [kat] sha1
899,941 UART: [kat] SHA2-256
901,881 UART: [kat] SHA2-384
904,768 UART: [kat] SHA2-512-ACC
906,669 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,111 UART: [cold-reset] ++
1,170,589 UART: [fht] FHT @ 0x50003400
1,173,391 UART: [idev] ++
1,173,559 UART: [idev] CDI.KEYID = 6
1,173,920 UART: [idev] SUBJECT.KEYID = 7
1,174,345 UART: [idev] UDS.KEYID = 0
1,174,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,990 UART: [idev] Erasing UDS.KEYID = 0
1,199,236 UART: [idev] Sha1 KeyId Algorithm
1,208,236 UART: [idev] --
1,209,225 UART: [ldev] ++
1,209,393 UART: [ldev] CDI.KEYID = 6
1,209,757 UART: [ldev] SUBJECT.KEYID = 5
1,210,184 UART: [ldev] AUTHORITY.KEYID = 7
1,210,647 UART: [ldev] FE.KEYID = 1
1,215,657 UART: [ldev] Erasing FE.KEYID = 1
1,242,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,056 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,539 UART: [ldev] --
1,281,782 UART: [fwproc] Wait for Commands...
1,282,537 UART: [fwproc] Recv command 0x46574c44
1,283,270 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,837 UART: ROM Fatal Error: 0x000B0032
1,309,994 >>> mbox cmd response: failed
1,309,994 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,000 >>> mbox cmd response: failed
1,310,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,890 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,177 UART: [kat] SHA2-256
902,117 UART: [kat] SHA2-384
904,748 UART: [kat] SHA2-512-ACC
906,649 UART: [kat] ECC-384
916,386 UART: [kat] HMAC-384Kdf
920,826 UART: [kat] LMS
1,169,138 UART: [kat] --
1,170,107 UART: [cold-reset] ++
1,170,485 UART: [fht] FHT @ 0x50003400
1,173,245 UART: [idev] ++
1,173,413 UART: [idev] CDI.KEYID = 6
1,173,774 UART: [idev] SUBJECT.KEYID = 7
1,174,199 UART: [idev] UDS.KEYID = 0
1,174,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,164 UART: [idev] Erasing UDS.KEYID = 0
1,199,698 UART: [idev] Sha1 KeyId Algorithm
1,208,504 UART: [idev] --
1,209,469 UART: [ldev] ++
1,209,637 UART: [ldev] CDI.KEYID = 6
1,210,001 UART: [ldev] SUBJECT.KEYID = 5
1,210,428 UART: [ldev] AUTHORITY.KEYID = 7
1,210,891 UART: [ldev] FE.KEYID = 1
1,216,103 UART: [ldev] Erasing FE.KEYID = 1
1,242,932 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,963 UART: [ldev] --
1,282,186 UART: [fwproc] Wait for Commands...
1,282,963 UART: [fwproc] Recv command 0x46574c44
1,283,696 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,223 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.82s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,166,021 >>> mbox cmd response: failed
1,166,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,027 >>> mbox cmd response: failed
1,166,027 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,166,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,317 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,278 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,158 UART: [state] LifecycleState = Unprovisioned
85,813 UART: [state] DebugLocked = No
86,495 UART: [state] WD Timer not started. Device not locked for debugging
87,686 UART: [kat] SHA2-256
893,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,461 UART: [kat] ++
897,613 UART: [kat] sha1
901,929 UART: [kat] SHA2-256
903,869 UART: [kat] SHA2-384
906,576 UART: [kat] SHA2-512-ACC
908,477 UART: [kat] ECC-384
917,912 UART: [kat] HMAC-384Kdf
922,310 UART: [kat] LMS
1,170,638 UART: [kat] --
1,171,507 UART: [cold-reset] ++
1,172,011 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,156 UART: [idev] Erasing UDS.KEYID = 0
1,200,947 UART: [idev] Sha1 KeyId Algorithm
1,209,437 UART: [idev] --
1,210,483 UART: [ldev] ++
1,210,651 UART: [ldev] CDI.KEYID = 6
1,211,014 UART: [ldev] SUBJECT.KEYID = 5
1,211,440 UART: [ldev] AUTHORITY.KEYID = 7
1,211,903 UART: [ldev] FE.KEYID = 1
1,217,231 UART: [ldev] Erasing FE.KEYID = 1
1,243,488 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,555 UART: [ldev] --
1,283,054 UART: [fwproc] Wait for Commands...
1,283,734 UART: [fwproc] Recv command 0x46574c44
1,284,462 UART: [fwproc] Recv'd Img size: 118548 bytes
1,309,772 UART: ROM Fatal Error: 0x000B0032
1,310,929 >>> mbox cmd response: failed
1,310,929 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,935 >>> mbox cmd response: failed
1,310,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,310,941 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,342 UART: [state] LifecycleState = Unprovisioned
85,997 UART: [state] DebugLocked = No
86,689 UART: [state] WD Timer not started. Device not locked for debugging
88,034 UART: [kat] SHA2-256
893,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,809 UART: [kat] ++
897,961 UART: [kat] sha1
902,081 UART: [kat] SHA2-256
904,021 UART: [kat] SHA2-384
906,968 UART: [kat] SHA2-512-ACC
908,869 UART: [kat] ECC-384
918,622 UART: [kat] HMAC-384Kdf
923,396 UART: [kat] LMS
1,171,724 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,172,815 UART: [fht] FHT @ 0x50003400
1,175,622 UART: [idev] ++
1,175,790 UART: [idev] CDI.KEYID = 6
1,176,150 UART: [idev] SUBJECT.KEYID = 7
1,176,574 UART: [idev] UDS.KEYID = 0
1,176,919 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,766 UART: [idev] Erasing UDS.KEYID = 0
1,201,799 UART: [idev] Sha1 KeyId Algorithm
1,210,215 UART: [idev] --
1,211,301 UART: [ldev] ++
1,211,469 UART: [ldev] CDI.KEYID = 6
1,211,832 UART: [ldev] SUBJECT.KEYID = 5
1,212,258 UART: [ldev] AUTHORITY.KEYID = 7
1,212,721 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,244,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,331 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,047 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,938 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,650 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,701 UART: [ldev] --
1,284,118 UART: [fwproc] Wait for Commands...
1,284,924 UART: [fwproc] Recv command 0x46574c44
1,285,652 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,079 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,249 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,406 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,648 >>> mbox cmd response: failed
1,165,648 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,654 >>> mbox cmd response: failed
1,165,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,660 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,433 UART: [state] LifecycleState = Unprovisioned
86,088 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,961 UART: [kat] SHA2-256
893,611 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,736 UART: [kat] ++
897,888 UART: [kat] sha1
902,136 UART: [kat] SHA2-256
904,076 UART: [kat] SHA2-384
906,677 UART: [kat] SHA2-512-ACC
908,578 UART: [kat] ECC-384
918,315 UART: [kat] HMAC-384Kdf
922,877 UART: [kat] LMS
1,171,205 UART: [kat] --
1,172,200 UART: [cold-reset] ++
1,172,642 UART: [fht] FHT @ 0x50003400
1,175,233 UART: [idev] ++
1,175,401 UART: [idev] CDI.KEYID = 6
1,175,761 UART: [idev] SUBJECT.KEYID = 7
1,176,185 UART: [idev] UDS.KEYID = 0
1,176,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,545 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,134 UART: [idev] --
1,211,004 UART: [ldev] ++
1,211,172 UART: [ldev] CDI.KEYID = 6
1,211,535 UART: [ldev] SUBJECT.KEYID = 5
1,211,961 UART: [ldev] AUTHORITY.KEYID = 7
1,212,424 UART: [ldev] FE.KEYID = 1
1,217,506 UART: [ldev] Erasing FE.KEYID = 1
1,243,983 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,350 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,066 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,957 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,832 UART: [ldev] --
1,283,229 UART: [fwproc] Wait for Commands...
1,283,943 UART: [fwproc] Recv command 0x46574c44
1,284,671 UART: [fwproc] Recv'd Img size: 118548 bytes
1,311,055 UART: ROM Fatal Error: 0x000B0032
1,312,212 >>> mbox cmd response: failed
1,312,212 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,218 >>> mbox cmd response: failed
1,312,218 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,312,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,283 UART: [state] LifecycleState = Unprovisioned
85,938 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,643 UART: [kat] SHA2-256
893,293 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,418 UART: [kat] ++
897,570 UART: [kat] sha1
901,590 UART: [kat] SHA2-256
903,530 UART: [kat] SHA2-384
906,305 UART: [kat] SHA2-512-ACC
908,206 UART: [kat] ECC-384
918,087 UART: [kat] HMAC-384Kdf
922,777 UART: [kat] LMS
1,171,105 UART: [kat] --
1,171,768 UART: [cold-reset] ++
1,172,094 UART: [fht] FHT @ 0x50003400
1,174,929 UART: [idev] ++
1,175,097 UART: [idev] CDI.KEYID = 6
1,175,457 UART: [idev] SUBJECT.KEYID = 7
1,175,881 UART: [idev] UDS.KEYID = 0
1,176,226 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,825 UART: [idev] Erasing UDS.KEYID = 0
1,200,834 UART: [idev] Sha1 KeyId Algorithm
1,209,216 UART: [idev] --
1,210,234 UART: [ldev] ++
1,210,402 UART: [ldev] CDI.KEYID = 6
1,210,765 UART: [ldev] SUBJECT.KEYID = 5
1,211,191 UART: [ldev] AUTHORITY.KEYID = 7
1,211,654 UART: [ldev] FE.KEYID = 1
1,216,836 UART: [ldev] Erasing FE.KEYID = 1
1,243,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,974 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,865 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,577 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,432 UART: [ldev] --
1,282,921 UART: [fwproc] Wait for Commands...
1,283,639 UART: [fwproc] Recv command 0x46574c44
1,284,367 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,683 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,238 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,408 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,587 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,837 >>> mbox cmd response: failed
1,165,837 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,843 >>> mbox cmd response: failed
1,165,843 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,849 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,550 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_index_out_of_bounds ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,934 writing to cptra_bootfsm_go
192,024 UART:
192,390 UART: Running Caliptra ROM ...
193,525 UART:
193,672 UART: [state] CFI Enabled
260,561 UART: [state] LifecycleState = Unprovisioned
262,487 UART: [state] DebugLocked = No
265,082 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,851 UART: [kat] SHA2-256
440,556 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,083 UART: [kat] ++
451,541 UART: [kat] sha1
461,014 UART: [kat] SHA2-256
463,701 UART: [kat] SHA2-384
470,817 UART: [kat] SHA2-512-ACC
473,208 UART: [kat] ECC-384
2,765,089 UART: [kat] HMAC-384Kdf
2,798,464 UART: [kat] LMS
3,988,811 UART: [kat] --
3,993,680 UART: [cold-reset] ++
3,995,674 UART: [fht] Storing FHT @ 0x50003400
4,007,487 UART: [idev] ++
4,008,061 UART: [idev] CDI.KEYID = 6
4,008,995 UART: [idev] SUBJECT.KEYID = 7
4,010,224 UART: [idev] UDS.KEYID = 0
4,013,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,421 UART: [idev] Erasing UDS.KEYID = 0
7,344,783 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,775 UART: [idev] --
7,369,422 UART: [ldev] ++
7,369,996 UART: [ldev] CDI.KEYID = 6
7,370,942 UART: [ldev] SUBJECT.KEYID = 5
7,372,076 UART: [ldev] AUTHORITY.KEYID = 7
7,373,421 UART: [ldev] FE.KEYID = 1
7,420,985 UART: [ldev] Erasing FE.KEYID = 1
10,752,374 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,241 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,683 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,259 UART: [ldev] --
13,112,934 UART: [fwproc] Waiting for Commands...
13,115,951 UART: [fwproc] Received command 0x46574c44
13,118,141 UART: [fwproc] Received Image of size 118548 bytes
13,195,540 UART: ROM Fatal Error: 0x00B0003A
13,198,963 >>> mbox cmd response: failed
13,199,300 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,199,624 >>> mbox cmd response: failed
13,199,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,200,187 >>> mbox cmd response: failed
Initializing fuses
2,067,989 writing to cptra_bootfsm_go
2,257,328 UART:
2,257,672 UART: Running Caliptra ROM ...
2,258,713 UART:
2,258,866 UART: [state] CFI Enabled
2,334,927 UART: [state] LifecycleState = Unprovisioned
2,336,875 UART: [state] DebugLocked = No
2,338,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,342,977 UART: [kat] SHA2-256
2,512,670 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,523,175 UART: [kat] ++
2,523,633 UART: [kat] sha1
2,535,057 UART: [kat] SHA2-256
2,537,751 UART: [kat] SHA2-384
2,542,888 UART: [kat] SHA2-512-ACC
2,545,249 UART: [kat] ECC-384
4,836,406 UART: [kat] HMAC-384Kdf
4,848,194 UART: [kat] LMS
6,038,504 UART: [kat] --
6,043,525 UART: [cold-reset] ++
6,045,200 UART: [fht] Storing FHT @ 0x50003400
6,055,988 UART: [idev] ++
6,056,591 UART: [idev] CDI.KEYID = 6
6,057,513 UART: [idev] SUBJECT.KEYID = 7
6,058,739 UART: [idev] UDS.KEYID = 0
6,061,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,210,835 UART: [idev] Erasing UDS.KEYID = 0
9,396,291 UART: [idev] Using Sha1 for KeyId Algorithm
9,418,669 UART: [idev] --
9,423,340 UART: [ldev] ++
9,423,924 UART: [ldev] CDI.KEYID = 6
9,425,050 UART: [ldev] SUBJECT.KEYID = 5
9,426,221 UART: [ldev] AUTHORITY.KEYID = 7
9,427,427 UART: [ldev] FE.KEYID = 1
9,472,041 UART: [ldev] Erasing FE.KEYID = 1
12,806,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,118,757 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,133,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,148,210 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,162,709 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,181,952 UART: [ldev] --
15,186,369 UART: [fwproc] Waiting for Commands...
15,189,075 UART: [fwproc] Received command 0x46574c44
15,191,268 UART: [fwproc] Received Image of size 118548 bytes
19,298,715 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,378,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,451,708 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,780,782 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,806,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,957,965 >>> mbox cmd response: failed
12,958,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,958,893 >>> mbox cmd response: failed
12,959,167 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,959,462 >>> mbox cmd response: failed
Initializing fuses
2,053,620 writing to cptra_bootfsm_go
5,839,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,032,921 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
193,491 UART:
193,859 UART: Running Caliptra ROM ...
195,051 UART:
604,739 UART: [state] CFI Enabled
620,515 UART: [state] LifecycleState = Unprovisioned
622,413 UART: [state] DebugLocked = No
624,395 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,524 UART: [kat] SHA2-256
798,276 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,830 UART: [kat] ++
809,291 UART: [kat] sha1
820,553 UART: [kat] SHA2-256
823,238 UART: [kat] SHA2-384
830,191 UART: [kat] SHA2-512-ACC
832,590 UART: [kat] ECC-384
3,115,586 UART: [kat] HMAC-384Kdf
3,126,791 UART: [kat] LMS
4,316,858 UART: [kat] --
4,322,694 UART: [cold-reset] ++
4,325,191 UART: [fht] Storing FHT @ 0x50003400
4,336,754 UART: [idev] ++
4,337,383 UART: [idev] CDI.KEYID = 6
4,338,273 UART: [idev] SUBJECT.KEYID = 7
4,339,549 UART: [idev] UDS.KEYID = 0
4,342,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,506 UART: [idev] Erasing UDS.KEYID = 0
7,624,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,918 UART: [idev] --
7,649,821 UART: [ldev] ++
7,650,404 UART: [ldev] CDI.KEYID = 6
7,651,383 UART: [ldev] SUBJECT.KEYID = 5
7,652,609 UART: [ldev] AUTHORITY.KEYID = 7
7,653,851 UART: [ldev] FE.KEYID = 1
7,664,775 UART: [ldev] Erasing FE.KEYID = 1
10,954,003 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,260,662 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,020 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,308,430 UART: [ldev] --
13,312,591 UART: [fwproc] Waiting for Commands...
13,314,324 UART: [fwproc] Received command 0x46574c44
13,316,518 UART: [fwproc] Received Image of size 118548 bytes
13,393,633 UART: ROM Fatal Error: 0x00B0003A
13,397,108 >>> mbox cmd response: failed
13,397,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,397,910 >>> mbox cmd response: failed
13,398,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,398,481 >>> mbox cmd response: failed
Initializing fuses
2,056,830 writing to cptra_bootfsm_go
2,246,156 UART:
2,246,502 UART: Running Caliptra ROM ...
2,247,584 UART:
7,070,308 UART: [state] CFI Enabled
7,083,632 UART: [state] LifecycleState = Unprovisioned
7,085,638 UART: [state] DebugLocked = No
7,087,969 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,092,233 UART: [kat] SHA2-256
7,261,982 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,272,517 UART: [kat] ++
7,272,988 UART: [kat] sha1
7,283,561 UART: [kat] SHA2-256
7,286,259 UART: [kat] SHA2-384
7,290,745 UART: [kat] SHA2-512-ACC
7,293,102 UART: [kat] ECC-384
9,578,273 UART: [kat] HMAC-384Kdf
9,589,378 UART: [kat] LMS
10,779,507 UART: [kat] --
10,783,700 UART: [cold-reset] ++
10,784,670 UART: [fht] Storing FHT @ 0x50003400
10,796,645 UART: [idev] ++
10,797,219 UART: [idev] CDI.KEYID = 6
10,798,160 UART: [idev] SUBJECT.KEYID = 7
10,799,433 UART: [idev] UDS.KEYID = 0
10,801,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,950,748 UART: [idev] Erasing UDS.KEYID = 0
14,092,264 UART: [idev] Using Sha1 for KeyId Algorithm
14,114,511 UART: [idev] --
14,117,265 UART: [ldev] ++
14,117,847 UART: [ldev] CDI.KEYID = 6
14,118,770 UART: [ldev] SUBJECT.KEYID = 5
14,120,035 UART: [ldev] AUTHORITY.KEYID = 7
14,121,228 UART: [ldev] FE.KEYID = 1
14,132,030 UART: [ldev] Erasing FE.KEYID = 1
17,420,680 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,714,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,729,474 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,744,283 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,758,797 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,777,897 UART: [ldev] --
19,783,057 UART: [fwproc] Waiting for Commands...
19,785,439 UART: [fwproc] Received command 0x46574c44
19,787,633 UART: [fwproc] Received Image of size 118548 bytes
23,884,414 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,963,650 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,036,853 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,365,658 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
4,131,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,140,713 >>> mbox cmd response: failed
13,141,366 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,141,719 >>> mbox cmd response: failed
13,141,990 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,142,316 >>> mbox cmd response: failed
Initializing fuses
2,051,459 writing to cptra_bootfsm_go
10,848,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,877,806 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,206 UART:
192,561 UART: Running Caliptra ROM ...
193,750 UART:
193,907 UART: [state] CFI Enabled
261,883 UART: [state] LifecycleState = Unprovisioned
263,820 UART: [state] DebugLocked = No
265,482 UART: [state] WD Timer not started. Device not locked for debugging
269,932 UART: [kat] SHA2-256
449,606 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,403 UART: [kat] ++
460,892 UART: [kat] sha1
472,368 UART: [kat] SHA2-256
475,056 UART: [kat] SHA2-384
480,500 UART: [kat] SHA2-512-ACC
482,872 UART: [kat] ECC-384
2,946,642 UART: [kat] HMAC-384Kdf
2,969,696 UART: [kat] LMS
3,446,210 UART: [kat] --
3,449,738 UART: [cold-reset] ++
3,451,463 UART: [fht] FHT @ 0x50003400
3,462,721 UART: [idev] ++
3,463,292 UART: [idev] CDI.KEYID = 6
3,464,240 UART: [idev] SUBJECT.KEYID = 7
3,465,514 UART: [idev] UDS.KEYID = 0
3,468,545 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,870 UART: [idev] Erasing UDS.KEYID = 0
5,982,812 UART: [idev] Sha1 KeyId Algorithm
6,005,027 UART: [idev] --
6,010,120 UART: [ldev] ++
6,010,698 UART: [ldev] CDI.KEYID = 6
6,011,637 UART: [ldev] SUBJECT.KEYID = 5
6,012,864 UART: [ldev] AUTHORITY.KEYID = 7
6,014,107 UART: [ldev] FE.KEYID = 1
6,055,775 UART: [ldev] Erasing FE.KEYID = 1
8,558,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,063 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,470 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,487 UART: [ldev] --
10,370,600 UART: [fwproc] Wait for Commands...
10,372,581 UART: [fwproc] Recv command 0x46574c44
10,374,593 UART: [fwproc] Recv'd Img size: 118548 bytes
10,468,280 UART: ROM Fatal Error: 0x00B0003A
10,471,486 >>> mbox cmd response: failed
10,471,903 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,206 >>> mbox cmd response: failed
10,472,478 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,472,777 >>> mbox cmd response: failed
Initializing fuses
2,059,846 writing to cptra_bootfsm_go
2,249,178 UART:
2,249,530 UART: Running Caliptra ROM ...
2,250,583 UART:
2,250,750 UART: [state] CFI Enabled
2,313,735 UART: [state] LifecycleState = Unprovisioned
2,315,673 UART: [state] DebugLocked = No
2,317,256 UART: [state] WD Timer not started. Device not locked for debugging
2,321,217 UART: [kat] SHA2-256
2,500,864 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,511,657 UART: [kat] ++
2,512,165 UART: [kat] sha1
2,522,416 UART: [kat] SHA2-256
2,525,117 UART: [kat] SHA2-384
2,530,362 UART: [kat] SHA2-512-ACC
2,532,776 UART: [kat] ECC-384
4,995,939 UART: [kat] HMAC-384Kdf
5,018,051 UART: [kat] LMS
5,494,564 UART: [kat] --
5,499,669 UART: [cold-reset] ++
5,501,539 UART: [fht] FHT @ 0x50003400
5,511,505 UART: [idev] ++
5,512,077 UART: [idev] CDI.KEYID = 6
5,513,103 UART: [idev] SUBJECT.KEYID = 7
5,514,274 UART: [idev] UDS.KEYID = 0
5,517,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,666,473 UART: [idev] Erasing UDS.KEYID = 0
8,030,797 UART: [idev] Sha1 KeyId Algorithm
8,054,273 UART: [idev] --
8,058,341 UART: [ldev] ++
8,058,963 UART: [ldev] CDI.KEYID = 6
8,059,897 UART: [ldev] SUBJECT.KEYID = 5
8,061,076 UART: [ldev] AUTHORITY.KEYID = 7
8,062,322 UART: [ldev] FE.KEYID = 1
8,103,225 UART: [ldev] Erasing FE.KEYID = 1
10,610,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,344,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,360,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,376,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,392,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,414,353 UART: [ldev] --
12,419,435 UART: [fwproc] Wait for Commands...
12,421,488 UART: [fwproc] Recv command 0x46574c44
12,423,493 UART: [fwproc] Recv'd Img size: 118548 bytes
15,913,577 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,993,399 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,066,414 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,395,016 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,464,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,345,923 >>> mbox cmd response: failed
10,346,654 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,015 >>> mbox cmd response: failed
10,347,288 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,347,587 >>> mbox cmd response: failed
Initializing fuses
2,066,572 writing to cptra_bootfsm_go
5,527,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,285,629 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
192,620 UART:
192,984 UART: Running Caliptra ROM ...
194,167 UART:
603,982 UART: [state] CFI Enabled
619,716 UART: [state] LifecycleState = Unprovisioned
621,615 UART: [state] DebugLocked = No
623,223 UART: [state] WD Timer not started. Device not locked for debugging
627,094 UART: [kat] SHA2-256
806,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,552 UART: [kat] ++
818,088 UART: [kat] sha1
829,791 UART: [kat] SHA2-256
832,476 UART: [kat] SHA2-384
838,193 UART: [kat] SHA2-512-ACC
840,536 UART: [kat] ECC-384
3,280,285 UART: [kat] HMAC-384Kdf
3,292,098 UART: [kat] LMS
3,768,581 UART: [kat] --
3,773,707 UART: [cold-reset] ++
3,775,753 UART: [fht] FHT @ 0x50003400
3,788,413 UART: [idev] ++
3,788,982 UART: [idev] CDI.KEYID = 6
3,790,003 UART: [idev] SUBJECT.KEYID = 7
3,791,197 UART: [idev] UDS.KEYID = 0
3,794,043 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,943,119 UART: [idev] Erasing UDS.KEYID = 0
6,269,963 UART: [idev] Sha1 KeyId Algorithm
6,293,897 UART: [idev] --
6,298,202 UART: [ldev] ++
6,298,787 UART: [ldev] CDI.KEYID = 6
6,299,703 UART: [ldev] SUBJECT.KEYID = 5
6,300,923 UART: [ldev] AUTHORITY.KEYID = 7
6,302,161 UART: [ldev] FE.KEYID = 1
6,314,916 UART: [ldev] Erasing FE.KEYID = 1
8,797,877 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,518,415 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,534,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,550,122 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,565,710 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,588,604 UART: [ldev] --
10,594,313 UART: [fwproc] Wait for Commands...
10,596,954 UART: [fwproc] Recv command 0x46574c44
10,599,002 UART: [fwproc] Recv'd Img size: 118548 bytes
10,692,327 UART: ROM Fatal Error: 0x00B0003A
10,695,524 >>> mbox cmd response: failed
10,695,861 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,190 >>> mbox cmd response: failed
10,696,458 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,696,752 >>> mbox cmd response: failed
Initializing fuses
2,072,597 writing to cptra_bootfsm_go
2,261,859 UART:
2,262,226 UART: Running Caliptra ROM ...
2,263,281 UART:
9,762,502 UART: [state] CFI Enabled
9,773,128 UART: [state] LifecycleState = Unprovisioned
9,775,046 UART: [state] DebugLocked = No
9,776,561 UART: [state] WD Timer not started. Device not locked for debugging
9,780,421 UART: [kat] SHA2-256
9,960,080 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,970,859 UART: [kat] ++
9,971,411 UART: [kat] sha1
9,982,639 UART: [kat] SHA2-256
9,985,309 UART: [kat] SHA2-384
9,991,071 UART: [kat] SHA2-512-ACC
9,993,442 UART: [kat] ECC-384
12,436,035 UART: [kat] HMAC-384Kdf
12,448,375 UART: [kat] LMS
12,924,848 UART: [kat] --
12,929,492 UART: [cold-reset] ++
12,931,971 UART: [fht] FHT @ 0x50003400
12,941,928 UART: [idev] ++
12,942,502 UART: [idev] CDI.KEYID = 6
12,943,521 UART: [idev] SUBJECT.KEYID = 7
12,944,755 UART: [idev] UDS.KEYID = 0
12,947,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,096,531 UART: [idev] Erasing UDS.KEYID = 0
15,424,775 UART: [idev] Sha1 KeyId Algorithm
15,447,683 UART: [idev] --
15,454,216 UART: [ldev] ++
15,454,786 UART: [ldev] CDI.KEYID = 6
15,455,752 UART: [ldev] SUBJECT.KEYID = 5
15,456,966 UART: [ldev] AUTHORITY.KEYID = 7
15,458,197 UART: [ldev] FE.KEYID = 1
15,470,158 UART: [ldev] Erasing FE.KEYID = 1
17,944,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,667,726 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,683,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,699,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,715,018 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,737,136 UART: [ldev] --
19,741,972 UART: [fwproc] Wait for Commands...
19,744,288 UART: [fwproc] Recv command 0x46574c44
19,746,326 UART: [fwproc] Recv'd Img size: 118548 bytes
23,224,784 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,307,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,380,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,707,674 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,437 writing to cptra_bootfsm_go
3,784,343 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,571,255 >>> mbox cmd response: failed
10,571,782 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,147 >>> mbox cmd response: failed
10,572,418 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,572,709 >>> mbox cmd response: failed
Initializing fuses
2,057,865 writing to cptra_bootfsm_go
13,069,503 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,730,030 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
192,182 UART:
192,549 UART: Running Caliptra ROM ...
193,643 UART:
193,788 UART: [state] CFI Enabled
262,687 UART: [state] LifecycleState = Unprovisioned
265,115 UART: [state] DebugLocked = No
267,720 UART: [state] WD Timer not started. Device not locked for debugging
272,479 UART: [kat] SHA2-256
462,324 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,126 UART: [kat] ++
473,576 UART: [kat] sha1
484,942 UART: [kat] SHA2-256
487,955 UART: [kat] SHA2-384
493,891 UART: [kat] SHA2-512-ACC
496,450 UART: [kat] ECC-384
2,943,880 UART: [kat] HMAC-384Kdf
2,970,715 UART: [kat] LMS
3,502,528 UART: [kat] --
3,507,466 UART: [cold-reset] ++
3,508,602 UART: [fht] FHT @ 0x50003400
3,521,207 UART: [idev] ++
3,521,903 UART: [idev] CDI.KEYID = 6
3,522,877 UART: [idev] SUBJECT.KEYID = 7
3,524,094 UART: [idev] UDS.KEYID = 0
3,526,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,187 UART: [idev] Erasing UDS.KEYID = 0
6,024,689 UART: [idev] Sha1 KeyId Algorithm
6,046,072 UART: [idev] --
6,051,328 UART: [ldev] ++
6,052,018 UART: [ldev] CDI.KEYID = 6
6,052,940 UART: [ldev] SUBJECT.KEYID = 5
6,054,126 UART: [ldev] AUTHORITY.KEYID = 7
6,055,313 UART: [ldev] FE.KEYID = 1
6,092,847 UART: [ldev] Erasing FE.KEYID = 1
8,594,159 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,737 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,914 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,365,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,380,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,189 UART: [ldev] --
10,406,578 UART: [fwproc] Wait for Commands...
10,408,248 UART: [fwproc] Recv command 0x46574c44
10,410,563 UART: [fwproc] Recv'd Img size: 118548 bytes
10,516,089 UART: ROM Fatal Error: 0x00B0003A
10,519,734 >>> mbox cmd response: failed
10,520,176 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,520,514 >>> mbox cmd response: failed
10,520,812 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,521,113 >>> mbox cmd response: failed
Initializing fuses
2,062,333 writing to cptra_bootfsm_go
2,251,633 UART:
2,251,986 UART: Running Caliptra ROM ...
2,253,072 UART:
2,253,242 UART: [state] CFI Enabled
2,320,721 UART: [state] LifecycleState = Unprovisioned
2,323,094 UART: [state] DebugLocked = No
2,324,443 UART: [state] WD Timer not started. Device not locked for debugging
2,329,598 UART: [kat] SHA2-256
2,519,496 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,530,260 UART: [kat] ++
2,530,757 UART: [kat] sha1
2,542,565 UART: [kat] SHA2-256
2,545,585 UART: [kat] SHA2-384
2,551,156 UART: [kat] SHA2-512-ACC
2,553,728 UART: [kat] ECC-384
5,003,771 UART: [kat] HMAC-384Kdf
5,025,863 UART: [kat] LMS
5,557,667 UART: [kat] --
5,561,073 UART: [cold-reset] ++
5,562,584 UART: [fht] FHT @ 0x50003400
5,573,841 UART: [idev] ++
5,574,579 UART: [idev] CDI.KEYID = 6
5,575,494 UART: [idev] SUBJECT.KEYID = 7
5,576,716 UART: [idev] UDS.KEYID = 0
5,579,058 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,728,232 UART: [idev] Erasing UDS.KEYID = 0
8,083,011 UART: [idev] Sha1 KeyId Algorithm
8,104,912 UART: [idev] --
8,110,532 UART: [ldev] ++
8,111,220 UART: [ldev] CDI.KEYID = 6
8,112,134 UART: [ldev] SUBJECT.KEYID = 5
8,113,309 UART: [ldev] AUTHORITY.KEYID = 7
8,114,488 UART: [ldev] FE.KEYID = 1
8,154,796 UART: [ldev] Erasing FE.KEYID = 1
10,663,879 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,395,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,406 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,346 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,429 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,461,624 UART: [ldev] --
12,467,424 UART: [fwproc] Wait for Commands...
12,470,584 UART: [fwproc] Recv command 0x46574c44
12,472,860 UART: [fwproc] Recv'd Img size: 118548 bytes
15,966,003 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,050,666 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,174,305 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,735,449 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,442,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,318,175 >>> mbox cmd response: failed
10,318,701 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,045 >>> mbox cmd response: failed
10,319,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,319,616 >>> mbox cmd response: failed
Initializing fuses
2,053,680 writing to cptra_bootfsm_go
5,495,045 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,871,955 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
192,630 UART:
192,994 UART: Running Caliptra ROM ...
194,129 UART:
603,665 UART: [state] CFI Enabled
615,074 UART: [state] LifecycleState = Unprovisioned
617,422 UART: [state] DebugLocked = No
619,186 UART: [state] WD Timer not started. Device not locked for debugging
624,292 UART: [kat] SHA2-256
814,170 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,955 UART: [kat] ++
825,554 UART: [kat] sha1
837,203 UART: [kat] SHA2-256
840,257 UART: [kat] SHA2-384
846,095 UART: [kat] SHA2-512-ACC
848,673 UART: [kat] ECC-384
3,290,392 UART: [kat] HMAC-384Kdf
3,304,299 UART: [kat] LMS
3,836,113 UART: [kat] --
3,840,353 UART: [cold-reset] ++
3,841,380 UART: [fht] FHT @ 0x50003400
3,853,451 UART: [idev] ++
3,854,143 UART: [idev] CDI.KEYID = 6
3,855,061 UART: [idev] SUBJECT.KEYID = 7
3,856,287 UART: [idev] UDS.KEYID = 0
3,859,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,647 UART: [idev] Erasing UDS.KEYID = 0
6,331,948 UART: [idev] Sha1 KeyId Algorithm
6,353,655 UART: [idev] --
6,358,799 UART: [ldev] ++
6,359,528 UART: [ldev] CDI.KEYID = 6
6,360,449 UART: [ldev] SUBJECT.KEYID = 5
6,361,562 UART: [ldev] AUTHORITY.KEYID = 7
6,362,804 UART: [ldev] FE.KEYID = 1
6,373,730 UART: [ldev] Erasing FE.KEYID = 1
8,850,479 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,583,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,921 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,030 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,843 UART: [ldev] --
10,640,628 UART: [fwproc] Wait for Commands...
10,642,976 UART: [fwproc] Recv command 0x46574c44
10,645,256 UART: [fwproc] Recv'd Img size: 118548 bytes
10,753,810 UART: ROM Fatal Error: 0x00B0003A
10,757,429 >>> mbox cmd response: failed
10,757,841 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,190 >>> mbox cmd response: failed
10,758,464 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,758,765 >>> mbox cmd response: failed
Initializing fuses
2,058,516 writing to cptra_bootfsm_go
2,247,847 UART:
2,248,205 UART: Running Caliptra ROM ...
2,249,258 UART:
9,696,211 UART: [state] CFI Enabled
9,709,274 UART: [state] LifecycleState = Unprovisioned
9,711,646 UART: [state] DebugLocked = No
9,712,940 UART: [state] WD Timer not started. Device not locked for debugging
9,718,338 UART: [kat] SHA2-256
9,908,219 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,919,010 UART: [kat] ++
9,919,534 UART: [kat] sha1
9,931,623 UART: [kat] SHA2-256
9,934,597 UART: [kat] SHA2-384
9,941,028 UART: [kat] SHA2-512-ACC
9,943,659 UART: [kat] ECC-384
12,383,590 UART: [kat] HMAC-384Kdf
12,395,655 UART: [kat] LMS
12,927,294 UART: [kat] --
12,931,939 UART: [cold-reset] ++
12,933,957 UART: [fht] FHT @ 0x50003400
12,945,059 UART: [idev] ++
12,945,747 UART: [idev] CDI.KEYID = 6
12,946,716 UART: [idev] SUBJECT.KEYID = 7
12,947,933 UART: [idev] UDS.KEYID = 0
12,950,321 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,099,302 UART: [idev] Erasing UDS.KEYID = 0
15,423,894 UART: [idev] Sha1 KeyId Algorithm
15,445,944 UART: [idev] --
15,450,077 UART: [ldev] ++
15,450,769 UART: [ldev] CDI.KEYID = 6
15,451,654 UART: [ldev] SUBJECT.KEYID = 5
15,452,760 UART: [ldev] AUTHORITY.KEYID = 7
15,454,059 UART: [ldev] FE.KEYID = 1
15,465,735 UART: [ldev] Erasing FE.KEYID = 1
17,941,738 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,659,011 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,674,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,689,420 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,704,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,725,430 UART: [ldev] --
19,730,545 UART: [fwproc] Wait for Commands...
19,733,133 UART: [fwproc] Recv command 0x46574c44
19,735,402 UART: [fwproc] Recv'd Img size: 118548 bytes
23,230,433 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,303,235 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,426,870 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,986,936 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
3,761,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,554,713 >>> mbox cmd response: failed
10,555,279 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,555,626 >>> mbox cmd response: failed
10,555,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,556,202 >>> mbox cmd response: failed
Initializing fuses
2,056,738 writing to cptra_bootfsm_go
13,070,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,348,746 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,792 UART: [state] LifecycleState = Unprovisioned
85,447 UART: [state] DebugLocked = No
85,967 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,565 UART: [kat] SHA2-256
881,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,611 UART: [kat] ++
885,763 UART: [kat] sha1
890,091 UART: [kat] SHA2-256
892,029 UART: [kat] SHA2-384
894,990 UART: [kat] SHA2-512-ACC
896,891 UART: [kat] ECC-384
902,532 UART: [kat] HMAC-384Kdf
906,922 UART: [kat] LMS
1,475,118 UART: [kat] --
1,476,087 UART: [cold-reset] ++
1,476,633 UART: [fht] Storing FHT @ 0x50003400
1,479,364 UART: [idev] ++
1,479,532 UART: [idev] CDI.KEYID = 6
1,479,892 UART: [idev] SUBJECT.KEYID = 7
1,480,316 UART: [idev] UDS.KEYID = 0
1,480,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,332 UART: [idev] Erasing UDS.KEYID = 0
1,505,170 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,756 UART: [idev] --
1,514,731 UART: [ldev] ++
1,514,899 UART: [ldev] CDI.KEYID = 6
1,515,262 UART: [ldev] SUBJECT.KEYID = 5
1,515,688 UART: [ldev] AUTHORITY.KEYID = 7
1,516,151 UART: [ldev] FE.KEYID = 1
1,521,545 UART: [ldev] Erasing FE.KEYID = 1
1,546,532 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,049 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,765 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,656 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,486 UART: [ldev] --
1,585,799 UART: [fwproc] Waiting for Commands...
1,586,638 UART: [fwproc] Received command 0x46574c44
1,587,429 UART: [fwproc] Received Image of size 118548 bytes
1,613,338 UART: ROM Fatal Error: 0x00B0003A
1,614,499 >>> mbox cmd response: failed
1,614,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,505 >>> mbox cmd response: failed
1,614,505 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,614,511 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,020 UART: [state] LifecycleState = Unprovisioned
85,675 UART: [state] DebugLocked = No
86,239 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,869 UART: [kat] SHA2-256
881,800 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,915 UART: [kat] ++
886,067 UART: [kat] sha1
890,523 UART: [kat] SHA2-256
892,461 UART: [kat] SHA2-384
895,284 UART: [kat] SHA2-512-ACC
897,185 UART: [kat] ECC-384
902,644 UART: [kat] HMAC-384Kdf
907,086 UART: [kat] LMS
1,475,282 UART: [kat] --
1,476,197 UART: [cold-reset] ++
1,476,681 UART: [fht] Storing FHT @ 0x50003400
1,479,328 UART: [idev] ++
1,479,496 UART: [idev] CDI.KEYID = 6
1,479,856 UART: [idev] SUBJECT.KEYID = 7
1,480,280 UART: [idev] UDS.KEYID = 0
1,480,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,034 UART: [idev] Erasing UDS.KEYID = 0
1,504,236 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,650 UART: [idev] --
1,513,795 UART: [ldev] ++
1,513,963 UART: [ldev] CDI.KEYID = 6
1,514,326 UART: [ldev] SUBJECT.KEYID = 5
1,514,752 UART: [ldev] AUTHORITY.KEYID = 7
1,515,215 UART: [ldev] FE.KEYID = 1
1,520,319 UART: [ldev] Erasing FE.KEYID = 1
1,545,158 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,455 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,171 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,062 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,575,774 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,582,734 UART: [ldev] --
1,584,105 UART: [fwproc] Waiting for Commands...
1,584,936 UART: [fwproc] Received command 0x46574c44
1,585,727 UART: [fwproc] Received Image of size 118548 bytes
2,930,378 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,678 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,277 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,467,124 >>> mbox cmd response: failed
1,467,124 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,130 >>> mbox cmd response: failed
1,467,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,467,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,091 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,411 UART: [state] LifecycleState = Unprovisioned
86,066 UART: [state] DebugLocked = No
86,724 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,302 UART: [kat] SHA2-256
882,233 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,348 UART: [kat] ++
886,500 UART: [kat] sha1
890,532 UART: [kat] SHA2-256
892,470 UART: [kat] SHA2-384
895,051 UART: [kat] SHA2-512-ACC
896,952 UART: [kat] ECC-384
902,703 UART: [kat] HMAC-384Kdf
907,387 UART: [kat] LMS
1,475,583 UART: [kat] --
1,476,304 UART: [cold-reset] ++
1,476,646 UART: [fht] Storing FHT @ 0x50003400
1,479,533 UART: [idev] ++
1,479,701 UART: [idev] CDI.KEYID = 6
1,480,061 UART: [idev] SUBJECT.KEYID = 7
1,480,485 UART: [idev] UDS.KEYID = 0
1,480,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,909 UART: [idev] Erasing UDS.KEYID = 0
1,505,389 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,947 UART: [idev] --
1,515,156 UART: [ldev] ++
1,515,324 UART: [ldev] CDI.KEYID = 6
1,515,687 UART: [ldev] SUBJECT.KEYID = 5
1,516,113 UART: [ldev] AUTHORITY.KEYID = 7
1,516,576 UART: [ldev] FE.KEYID = 1
1,521,652 UART: [ldev] Erasing FE.KEYID = 1
1,547,189 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,832 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,548 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,439 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,151 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,183 UART: [ldev] --
1,586,448 UART: [fwproc] Waiting for Commands...
1,587,273 UART: [fwproc] Received command 0x46574c44
1,588,064 UART: [fwproc] Received Image of size 118548 bytes
1,615,019 UART: ROM Fatal Error: 0x00B0003A
1,616,180 >>> mbox cmd response: failed
1,616,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,186 >>> mbox cmd response: failed
1,616,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,616,192 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,541 UART: [state] LifecycleState = Unprovisioned
86,196 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,448 UART: [kat] SHA2-256
882,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,494 UART: [kat] ++
886,646 UART: [kat] sha1
890,670 UART: [kat] SHA2-256
892,608 UART: [kat] SHA2-384
895,287 UART: [kat] SHA2-512-ACC
897,188 UART: [kat] ECC-384
903,035 UART: [kat] HMAC-384Kdf
907,799 UART: [kat] LMS
1,475,995 UART: [kat] --
1,476,888 UART: [cold-reset] ++
1,477,264 UART: [fht] Storing FHT @ 0x50003400
1,480,173 UART: [idev] ++
1,480,341 UART: [idev] CDI.KEYID = 6
1,480,701 UART: [idev] SUBJECT.KEYID = 7
1,481,125 UART: [idev] UDS.KEYID = 0
1,481,470 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,391 UART: [idev] Erasing UDS.KEYID = 0
1,506,479 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,055 UART: [idev] --
1,516,056 UART: [ldev] ++
1,516,224 UART: [ldev] CDI.KEYID = 6
1,516,587 UART: [ldev] SUBJECT.KEYID = 5
1,517,013 UART: [ldev] AUTHORITY.KEYID = 7
1,517,476 UART: [ldev] FE.KEYID = 1
1,522,810 UART: [ldev] Erasing FE.KEYID = 1
1,547,851 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,563 UART: [ldev] --
1,587,062 UART: [fwproc] Waiting for Commands...
1,587,871 UART: [fwproc] Received command 0x46574c44
1,588,662 UART: [fwproc] Received Image of size 118548 bytes
2,932,255 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,093 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,311 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,694 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,944 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,468,913 >>> mbox cmd response: failed
1,468,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,919 >>> mbox cmd response: failed
1,468,919 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,468,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,972 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,968 UART: [state] LifecycleState = Unprovisioned
85,623 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
891,144 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,248 UART: [kat] ++
895,400 UART: [kat] sha1
899,462 UART: [kat] SHA2-256
901,402 UART: [kat] SHA2-384
904,111 UART: [kat] SHA2-512-ACC
906,012 UART: [kat] ECC-384
915,203 UART: [kat] HMAC-384Kdf
919,685 UART: [kat] LMS
1,167,997 UART: [kat] --
1,169,044 UART: [cold-reset] ++
1,169,474 UART: [fht] FHT @ 0x50003400
1,172,206 UART: [idev] ++
1,172,374 UART: [idev] CDI.KEYID = 6
1,172,735 UART: [idev] SUBJECT.KEYID = 7
1,173,160 UART: [idev] UDS.KEYID = 0
1,173,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,869 UART: [idev] Erasing UDS.KEYID = 0
1,197,741 UART: [idev] Sha1 KeyId Algorithm
1,206,685 UART: [idev] --
1,207,516 UART: [ldev] ++
1,207,684 UART: [ldev] CDI.KEYID = 6
1,208,048 UART: [ldev] SUBJECT.KEYID = 5
1,208,475 UART: [ldev] AUTHORITY.KEYID = 7
1,208,938 UART: [ldev] FE.KEYID = 1
1,214,248 UART: [ldev] Erasing FE.KEYID = 1
1,240,571 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,015 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,731 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,332 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,250 UART: [ldev] --
1,279,487 UART: [fwproc] Wait for Commands...
1,280,162 UART: [fwproc] Recv command 0x46574c44
1,280,895 UART: [fwproc] Recv'd Img size: 118548 bytes
1,307,277 UART: ROM Fatal Error: 0x00B0003A
1,308,438 >>> mbox cmd response: failed
1,308,438 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,444 >>> mbox cmd response: failed
1,308,444 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,308,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,365 UART: [state] WD Timer not started. Device not locked for debugging
87,688 UART: [kat] SHA2-256
891,238 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,342 UART: [kat] ++
895,494 UART: [kat] sha1
899,780 UART: [kat] SHA2-256
901,720 UART: [kat] SHA2-384
904,407 UART: [kat] SHA2-512-ACC
906,308 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,681 UART: [kat] LMS
1,168,993 UART: [kat] --
1,170,098 UART: [cold-reset] ++
1,170,600 UART: [fht] FHT @ 0x50003400
1,173,288 UART: [idev] ++
1,173,456 UART: [idev] CDI.KEYID = 6
1,173,817 UART: [idev] SUBJECT.KEYID = 7
1,174,242 UART: [idev] UDS.KEYID = 0
1,174,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,795 UART: [idev] Erasing UDS.KEYID = 0
1,198,819 UART: [idev] Sha1 KeyId Algorithm
1,207,533 UART: [idev] --
1,208,660 UART: [ldev] ++
1,208,828 UART: [ldev] CDI.KEYID = 6
1,209,192 UART: [ldev] SUBJECT.KEYID = 5
1,209,619 UART: [ldev] AUTHORITY.KEYID = 7
1,210,082 UART: [ldev] FE.KEYID = 1
1,215,386 UART: [ldev] Erasing FE.KEYID = 1
1,241,775 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,794 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,652 UART: [ldev] --
1,280,917 UART: [fwproc] Wait for Commands...
1,281,694 UART: [fwproc] Recv command 0x46574c44
1,282,427 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,042 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,217 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,606 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.00s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,165,271 >>> mbox cmd response: failed
1,165,271 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,277 >>> mbox cmd response: failed
1,165,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,165,283 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,483 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,555 UART: [state] LifecycleState = Unprovisioned
86,210 UART: [state] DebugLocked = No
86,818 UART: [state] WD Timer not started. Device not locked for debugging
87,987 UART: [kat] SHA2-256
891,537 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,641 UART: [kat] ++
895,793 UART: [kat] sha1
900,037 UART: [kat] SHA2-256
901,977 UART: [kat] SHA2-384
904,634 UART: [kat] SHA2-512-ACC
906,535 UART: [kat] ECC-384
916,448 UART: [kat] HMAC-384Kdf
920,942 UART: [kat] LMS
1,169,254 UART: [kat] --
1,170,001 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,239 UART: [idev] ++
1,173,407 UART: [idev] CDI.KEYID = 6
1,173,768 UART: [idev] SUBJECT.KEYID = 7
1,174,193 UART: [idev] UDS.KEYID = 0
1,174,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,526 UART: [idev] Erasing UDS.KEYID = 0
1,199,206 UART: [idev] Sha1 KeyId Algorithm
1,208,010 UART: [idev] --
1,209,077 UART: [ldev] ++
1,209,245 UART: [ldev] CDI.KEYID = 6
1,209,609 UART: [ldev] SUBJECT.KEYID = 5
1,210,036 UART: [ldev] AUTHORITY.KEYID = 7
1,210,499 UART: [ldev] FE.KEYID = 1
1,216,031 UART: [ldev] Erasing FE.KEYID = 1
1,242,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,330 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,931 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,033 UART: [ldev] --
1,281,290 UART: [fwproc] Wait for Commands...
1,281,907 UART: [fwproc] Recv command 0x46574c44
1,282,640 UART: [fwproc] Recv'd Img size: 118548 bytes
1,308,238 UART: ROM Fatal Error: 0x00B0003A
1,309,399 >>> mbox cmd response: failed
1,309,399 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,405 >>> mbox cmd response: failed
1,309,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,309,411 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,626 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,963 UART: [kat] SHA2-256
901,903 UART: [kat] SHA2-384
904,646 UART: [kat] SHA2-512-ACC
906,547 UART: [kat] ECC-384
916,238 UART: [kat] HMAC-384Kdf
920,820 UART: [kat] LMS
1,169,132 UART: [kat] --
1,169,755 UART: [cold-reset] ++
1,170,235 UART: [fht] FHT @ 0x50003400
1,172,855 UART: [idev] ++
1,173,023 UART: [idev] CDI.KEYID = 6
1,173,384 UART: [idev] SUBJECT.KEYID = 7
1,173,809 UART: [idev] UDS.KEYID = 0
1,174,155 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,304 UART: [idev] Sha1 KeyId Algorithm
1,208,100 UART: [idev] --
1,208,993 UART: [ldev] ++
1,209,161 UART: [ldev] CDI.KEYID = 6
1,209,525 UART: [ldev] SUBJECT.KEYID = 5
1,209,952 UART: [ldev] AUTHORITY.KEYID = 7
1,210,415 UART: [ldev] FE.KEYID = 1
1,215,663 UART: [ldev] Erasing FE.KEYID = 1
1,242,556 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,765 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,373 UART: [ldev] --
1,281,674 UART: [fwproc] Wait for Commands...
1,282,259 UART: [fwproc] Recv command 0x46574c44
1,282,992 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,514 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,271 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,446 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,853 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,164,892 >>> mbox cmd response: failed
1,164,892 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,898 >>> mbox cmd response: failed
1,164,898 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,164,904 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,224 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,006 UART: [state] LifecycleState = Unprovisioned
85,661 UART: [state] DebugLocked = No
86,263 UART: [state] WD Timer not started. Device not locked for debugging
87,606 UART: [kat] SHA2-256
893,256 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,381 UART: [kat] ++
897,533 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,600 UART: [kat] SHA2-512-ACC
908,501 UART: [kat] ECC-384
918,124 UART: [kat] HMAC-384Kdf
922,824 UART: [kat] LMS
1,171,152 UART: [kat] --
1,171,917 UART: [cold-reset] ++
1,172,467 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,138 UART: [idev] Erasing UDS.KEYID = 0
1,201,101 UART: [idev] Sha1 KeyId Algorithm
1,209,517 UART: [idev] --
1,210,697 UART: [ldev] ++
1,210,865 UART: [ldev] CDI.KEYID = 6
1,211,228 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,319 UART: [ldev] Erasing FE.KEYID = 1
1,243,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,279 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,886 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,598 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,701 UART: [ldev] --
1,283,118 UART: [fwproc] Wait for Commands...
1,283,938 UART: [fwproc] Recv command 0x46574c44
1,284,666 UART: [fwproc] Recv'd Img size: 118548 bytes
1,311,901 UART: ROM Fatal Error: 0x00B0003A
1,313,062 >>> mbox cmd response: failed
1,313,062 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,068 >>> mbox cmd response: failed
1,313,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,313,074 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,250 UART: [state] LifecycleState = Unprovisioned
85,905 UART: [state] DebugLocked = No
86,641 UART: [state] WD Timer not started. Device not locked for debugging
87,870 UART: [kat] SHA2-256
893,520 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,645 UART: [kat] ++
897,797 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
918,562 UART: [kat] HMAC-384Kdf
923,098 UART: [kat] LMS
1,171,426 UART: [kat] --
1,172,359 UART: [cold-reset] ++
1,172,719 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,382 UART: [idev] Erasing UDS.KEYID = 0
1,201,297 UART: [idev] Sha1 KeyId Algorithm
1,209,845 UART: [idev] --
1,210,899 UART: [ldev] ++
1,211,067 UART: [ldev] CDI.KEYID = 6
1,211,430 UART: [ldev] SUBJECT.KEYID = 5
1,211,856 UART: [ldev] AUTHORITY.KEYID = 7
1,212,319 UART: [ldev] FE.KEYID = 1
1,217,443 UART: [ldev] Erasing FE.KEYID = 1
1,243,644 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,289 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,005 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,896 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,813 UART: [ldev] --
1,283,316 UART: [fwproc] Wait for Commands...
1,283,970 UART: [fwproc] Recv command 0x46574c44
1,284,698 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,646 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,903 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,073 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,346 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,163,569 >>> mbox cmd response: failed
1,163,569 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,575 >>> mbox cmd response: failed
1,163,575 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,163,581 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,149 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,273 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,109 UART: [state] LifecycleState = Unprovisioned
85,764 UART: [state] DebugLocked = No
86,418 UART: [state] WD Timer not started. Device not locked for debugging
87,723 UART: [kat] SHA2-256
893,373 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,498 UART: [kat] ++
897,650 UART: [kat] sha1
901,944 UART: [kat] SHA2-256
903,884 UART: [kat] SHA2-384
906,531 UART: [kat] SHA2-512-ACC
908,432 UART: [kat] ECC-384
918,337 UART: [kat] HMAC-384Kdf
922,861 UART: [kat] LMS
1,171,189 UART: [kat] --
1,172,192 UART: [cold-reset] ++
1,172,550 UART: [fht] FHT @ 0x50003400
1,175,015 UART: [idev] ++
1,175,183 UART: [idev] CDI.KEYID = 6
1,175,543 UART: [idev] SUBJECT.KEYID = 7
1,175,967 UART: [idev] UDS.KEYID = 0
1,176,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,981 UART: [idev] Erasing UDS.KEYID = 0
1,200,766 UART: [idev] Sha1 KeyId Algorithm
1,209,000 UART: [idev] --
1,210,112 UART: [ldev] ++
1,210,280 UART: [ldev] CDI.KEYID = 6
1,210,643 UART: [ldev] SUBJECT.KEYID = 5
1,211,069 UART: [ldev] AUTHORITY.KEYID = 7
1,211,532 UART: [ldev] FE.KEYID = 1
1,216,776 UART: [ldev] Erasing FE.KEYID = 1
1,243,755 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,282 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,998 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,684 UART: [ldev] --
1,282,983 UART: [fwproc] Wait for Commands...
1,283,617 UART: [fwproc] Recv command 0x46574c44
1,284,345 UART: [fwproc] Recv'd Img size: 118548 bytes
1,310,622 UART: ROM Fatal Error: 0x00B0003A
1,311,783 >>> mbox cmd response: failed
1,311,783 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,789 >>> mbox cmd response: failed
1,311,789 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,311,795 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,343 UART: [state] LifecycleState = Unprovisioned
85,998 UART: [state] DebugLocked = No
86,506 UART: [state] WD Timer not started. Device not locked for debugging
87,805 UART: [kat] SHA2-256
893,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,580 UART: [kat] ++
897,732 UART: [kat] sha1
901,940 UART: [kat] SHA2-256
903,880 UART: [kat] SHA2-384
906,493 UART: [kat] SHA2-512-ACC
908,394 UART: [kat] ECC-384
917,923 UART: [kat] HMAC-384Kdf
922,675 UART: [kat] LMS
1,171,003 UART: [kat] --
1,171,914 UART: [cold-reset] ++
1,172,444 UART: [fht] FHT @ 0x50003400
1,175,093 UART: [idev] ++
1,175,261 UART: [idev] CDI.KEYID = 6
1,175,621 UART: [idev] SUBJECT.KEYID = 7
1,176,045 UART: [idev] UDS.KEYID = 0
1,176,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,201,496 UART: [idev] Sha1 KeyId Algorithm
1,210,030 UART: [idev] --
1,211,114 UART: [ldev] ++
1,211,282 UART: [ldev] CDI.KEYID = 6
1,211,645 UART: [ldev] SUBJECT.KEYID = 5
1,212,071 UART: [ldev] AUTHORITY.KEYID = 7
1,212,534 UART: [ldev] FE.KEYID = 1
1,218,000 UART: [ldev] Erasing FE.KEYID = 1
1,244,523 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,944 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,688 UART: [ldev] --
1,283,961 UART: [fwproc] Wait for Commands...
1,284,587 UART: [fwproc] Recv command 0x46574c44
1,285,315 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,107 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,432 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,602 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,817 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,302 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,168,014 >>> mbox cmd response: failed
1,168,014 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,168,020 >>> mbox cmd response: failed
1,168,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,168,026 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,226 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_pub_key_revoked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,463 UART:
192,836 UART: Running Caliptra ROM ...
194,017 UART:
194,178 UART: [state] CFI Enabled
263,447 UART: [state] LifecycleState = Unprovisioned
265,374 UART: [state] DebugLocked = No
267,678 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,989 UART: [kat] SHA2-256
442,739 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,214 UART: [kat] ++
453,696 UART: [kat] sha1
465,113 UART: [kat] SHA2-256
467,823 UART: [kat] SHA2-384
473,161 UART: [kat] SHA2-512-ACC
475,563 UART: [kat] ECC-384
2,767,190 UART: [kat] HMAC-384Kdf
2,800,561 UART: [kat] LMS
3,990,863 UART: [kat] --
3,994,870 UART: [cold-reset] ++
3,996,242 UART: [fht] Storing FHT @ 0x50003400
4,007,228 UART: [idev] ++
4,007,865 UART: [idev] CDI.KEYID = 6
4,008,759 UART: [idev] SUBJECT.KEYID = 7
4,010,040 UART: [idev] UDS.KEYID = 0
4,013,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,162,510 UART: [idev] Erasing UDS.KEYID = 0
7,346,469 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,577 UART: [idev] --
7,370,816 UART: [ldev] ++
7,371,400 UART: [ldev] CDI.KEYID = 6
7,372,381 UART: [ldev] SUBJECT.KEYID = 5
7,373,607 UART: [ldev] AUTHORITY.KEYID = 7
7,374,846 UART: [ldev] FE.KEYID = 1
7,401,539 UART: [ldev] Erasing FE.KEYID = 1
10,734,946 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,717 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,977 UART: [ldev] --
13,117,979 UART: [fwproc] Waiting for Commands...
13,120,555 UART: [fwproc] Received command 0x46574c44
13,122,759 UART: [fwproc] Received Image of size 118548 bytes
17,125,269 UART: ROM Fatal Error: 0x000B0033
17,128,699 >>> mbox cmd response: failed
17,129,137 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,129,473 >>> mbox cmd response: failed
17,129,739 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,130,037 >>> mbox cmd response: failed
Initializing fuses
2,060,370 writing to cptra_bootfsm_go
2,249,725 UART:
2,250,074 UART: Running Caliptra ROM ...
2,251,210 UART:
2,251,374 UART: [state] CFI Enabled
2,312,417 UART: [state] LifecycleState = Unprovisioned
2,314,351 UART: [state] DebugLocked = No
2,316,417 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,321,704 UART: [kat] SHA2-256
2,491,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,501,894 UART: [kat] ++
2,502,386 UART: [kat] sha1
2,513,976 UART: [kat] SHA2-256
2,516,672 UART: [kat] SHA2-384
2,522,604 UART: [kat] SHA2-512-ACC
2,524,962 UART: [kat] ECC-384
4,814,261 UART: [kat] HMAC-384Kdf
4,826,121 UART: [kat] LMS
6,016,434 UART: [kat] --
6,020,459 UART: [cold-reset] ++
6,021,861 UART: [fht] Storing FHT @ 0x50003400
6,032,441 UART: [idev] ++
6,033,015 UART: [idev] CDI.KEYID = 6
6,034,059 UART: [idev] SUBJECT.KEYID = 7
6,035,232 UART: [idev] UDS.KEYID = 0
6,037,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,186,775 UART: [idev] Erasing UDS.KEYID = 0
9,373,029 UART: [idev] Using Sha1 for KeyId Algorithm
9,393,620 UART: [idev] --
9,397,674 UART: [ldev] ++
9,398,246 UART: [ldev] CDI.KEYID = 6
9,399,214 UART: [ldev] SUBJECT.KEYID = 5
9,400,426 UART: [ldev] AUTHORITY.KEYID = 7
9,401,669 UART: [ldev] FE.KEYID = 1
9,449,918 UART: [ldev] Erasing FE.KEYID = 1
12,783,928 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,096,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,111,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,126,144 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,140,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,158,637 UART: [ldev] --
15,163,037 UART: [fwproc] Waiting for Commands...
15,165,195 UART: [fwproc] Received command 0x46574c44
15,167,391 UART: [fwproc] Received Image of size 118548 bytes
19,272,864 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,347,987 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,421,120 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,750,480 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.06s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,034 writing to cptra_bootfsm_go
3,805,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,544,776 >>> mbox cmd response: failed
16,545,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,545,914 >>> mbox cmd response: failed
16,546,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,546,430 >>> mbox cmd response: failed
Initializing fuses
2,070,465 writing to cptra_bootfsm_go
5,861,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,021,733 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.05s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,337 writing to cptra_bootfsm_go
192,625 UART:
192,984 UART: Running Caliptra ROM ...
194,161 UART:
603,808 UART: [state] CFI Enabled
618,102 UART: [state] LifecycleState = Unprovisioned
620,037 UART: [state] DebugLocked = No
622,940 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,039 UART: [kat] SHA2-256
797,796 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,337 UART: [kat] ++
808,824 UART: [kat] sha1
819,654 UART: [kat] SHA2-256
822,346 UART: [kat] SHA2-384
827,246 UART: [kat] SHA2-512-ACC
829,610 UART: [kat] ECC-384
3,113,523 UART: [kat] HMAC-384Kdf
3,126,404 UART: [kat] LMS
4,316,524 UART: [kat] --
4,321,529 UART: [cold-reset] ++
4,323,747 UART: [fht] Storing FHT @ 0x50003400
4,334,915 UART: [idev] ++
4,335,491 UART: [idev] CDI.KEYID = 6
4,336,384 UART: [idev] SUBJECT.KEYID = 7
4,337,658 UART: [idev] UDS.KEYID = 0
4,340,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,489,962 UART: [idev] Erasing UDS.KEYID = 0
7,622,793 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,876 UART: [idev] --
7,649,743 UART: [ldev] ++
7,650,317 UART: [ldev] CDI.KEYID = 6
7,651,424 UART: [ldev] SUBJECT.KEYID = 5
7,652,560 UART: [ldev] AUTHORITY.KEYID = 7
7,653,706 UART: [ldev] FE.KEYID = 1
7,663,334 UART: [ldev] Erasing FE.KEYID = 1
10,947,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,561 UART: [ldev] --
13,309,103 UART: [fwproc] Waiting for Commands...
13,311,964 UART: [fwproc] Received command 0x46574c44
13,314,157 UART: [fwproc] Received Image of size 118548 bytes
17,152,058 UART: ROM Fatal Error: 0x000B0033
17,155,478 >>> mbox cmd response: failed
17,155,946 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,156,306 >>> mbox cmd response: failed
17,156,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
17,156,876 >>> mbox cmd response: failed
Initializing fuses
2,060,150 writing to cptra_bootfsm_go
2,249,472 UART:
2,249,817 UART: Running Caliptra ROM ...
2,250,959 UART:
3,311,807 UART: [state] CFI Enabled
3,325,845 UART: [state] LifecycleState = Unprovisioned
3,327,758 UART: [state] DebugLocked = No
3,329,202 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,334,062 UART: [kat] SHA2-256
3,503,820 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,514,336 UART: [kat] ++
3,514,893 UART: [kat] sha1
3,525,526 UART: [kat] SHA2-256
3,528,230 UART: [kat] SHA2-384
3,534,446 UART: [kat] SHA2-512-ACC
3,536,837 UART: [kat] ECC-384
5,820,291 UART: [kat] HMAC-384Kdf
5,831,550 UART: [kat] LMS
7,021,689 UART: [kat] --
7,025,043 UART: [cold-reset] ++
7,025,960 UART: [fht] Storing FHT @ 0x50003400
7,037,452 UART: [idev] ++
7,038,022 UART: [idev] CDI.KEYID = 6
7,039,053 UART: [idev] SUBJECT.KEYID = 7
7,040,230 UART: [idev] UDS.KEYID = 0
7,042,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
7,191,806 UART: [idev] Erasing UDS.KEYID = 0
10,333,599 UART: [idev] Using Sha1 for KeyId Algorithm
10,355,586 UART: [idev] --
10,358,990 UART: [ldev] ++
10,359,620 UART: [ldev] CDI.KEYID = 6
10,360,537 UART: [ldev] SUBJECT.KEYID = 5
10,361,813 UART: [ldev] AUTHORITY.KEYID = 7
10,363,058 UART: [ldev] FE.KEYID = 1
10,372,907 UART: [ldev] Erasing FE.KEYID = 1
13,658,749 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,951,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,966,464 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,981,266 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,995,776 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,014,341 UART: [ldev] --
16,018,972 UART: [fwproc] Waiting for Commands...
16,020,996 UART: [fwproc] Received command 0x46574c44
16,023,197 UART: [fwproc] Received Image of size 118548 bytes
20,123,194 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,191,938 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,265,159 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,592,897 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
4,124,143 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,572,247 >>> mbox cmd response: failed
16,572,881 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,573,242 >>> mbox cmd response: failed
16,573,534 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
16,573,842 >>> mbox cmd response: failed
Initializing fuses
2,053,766 writing to cptra_bootfsm_go
7,411,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
21,444,242 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,122 writing to cptra_bootfsm_go
192,379 UART:
192,745 UART: Running Caliptra ROM ...
193,938 UART:
194,097 UART: [state] CFI Enabled
264,366 UART: [state] LifecycleState = Unprovisioned
266,344 UART: [state] DebugLocked = No
268,865 UART: [state] WD Timer not started. Device not locked for debugging
273,350 UART: [kat] SHA2-256
452,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,789 UART: [kat] ++
464,243 UART: [kat] sha1
475,839 UART: [kat] SHA2-256
478,512 UART: [kat] SHA2-384
484,455 UART: [kat] SHA2-512-ACC
486,803 UART: [kat] ECC-384
2,945,100 UART: [kat] HMAC-384Kdf
2,968,573 UART: [kat] LMS
3,445,068 UART: [kat] --
3,450,148 UART: [cold-reset] ++
3,451,431 UART: [fht] FHT @ 0x50003400
3,463,927 UART: [idev] ++
3,464,508 UART: [idev] CDI.KEYID = 6
3,465,530 UART: [idev] SUBJECT.KEYID = 7
3,466,697 UART: [idev] UDS.KEYID = 0
3,469,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,619,305 UART: [idev] Erasing UDS.KEYID = 0
5,987,440 UART: [idev] Sha1 KeyId Algorithm
6,011,368 UART: [idev] --
6,016,758 UART: [ldev] ++
6,017,350 UART: [ldev] CDI.KEYID = 6
6,018,272 UART: [ldev] SUBJECT.KEYID = 5
6,019,462 UART: [ldev] AUTHORITY.KEYID = 7
6,020,708 UART: [ldev] FE.KEYID = 1
6,054,533 UART: [ldev] Erasing FE.KEYID = 1
8,562,653 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,210 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,079 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,511 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,849 UART: [ldev] --
10,374,121 UART: [fwproc] Wait for Commands...
10,377,089 UART: [fwproc] Recv command 0x46574c44
10,379,082 UART: [fwproc] Recv'd Img size: 118548 bytes
11,989,352 UART: ROM Fatal Error: 0x000B0033
11,992,639 >>> mbox cmd response: failed
11,993,068 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,993,620 >>> mbox cmd response: failed
11,994,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,994,479 >>> mbox cmd response: failed
Initializing fuses
2,054,623 writing to cptra_bootfsm_go
2,243,961 UART:
2,244,303 UART: Running Caliptra ROM ...
2,245,442 UART:
2,245,613 UART: [state] CFI Enabled
2,302,620 UART: [state] LifecycleState = Unprovisioned
2,304,517 UART: [state] DebugLocked = No
2,306,503 UART: [state] WD Timer not started. Device not locked for debugging
2,310,209 UART: [kat] SHA2-256
2,489,881 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,500,625 UART: [kat] ++
2,501,179 UART: [kat] sha1
2,512,188 UART: [kat] SHA2-256
2,514,885 UART: [kat] SHA2-384
2,520,774 UART: [kat] SHA2-512-ACC
2,523,142 UART: [kat] ECC-384
4,986,461 UART: [kat] HMAC-384Kdf
5,009,877 UART: [kat] LMS
5,486,365 UART: [kat] --
5,491,979 UART: [cold-reset] ++
5,492,888 UART: [fht] FHT @ 0x50003400
5,505,493 UART: [idev] ++
5,506,072 UART: [idev] CDI.KEYID = 6
5,507,051 UART: [idev] SUBJECT.KEYID = 7
5,508,271 UART: [idev] UDS.KEYID = 0
5,511,121 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,660,325 UART: [idev] Erasing UDS.KEYID = 0
8,024,631 UART: [idev] Sha1 KeyId Algorithm
8,046,894 UART: [idev] --
8,052,088 UART: [ldev] ++
8,052,669 UART: [ldev] CDI.KEYID = 6
8,053,567 UART: [ldev] SUBJECT.KEYID = 5
8,054,787 UART: [ldev] AUTHORITY.KEYID = 7
8,055,977 UART: [ldev] FE.KEYID = 1
8,098,495 UART: [ldev] Erasing FE.KEYID = 1
10,604,093 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,340,743 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,356,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,372,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,388,001 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,408,958 UART: [ldev] --
12,415,269 UART: [fwproc] Wait for Commands...
12,416,902 UART: [fwproc] Recv command 0x46574c44
12,418,898 UART: [fwproc] Recv'd Img size: 118548 bytes
15,911,746 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,989,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,062,738 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,391,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,462,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,914,566 >>> mbox cmd response: failed
11,915,301 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,915,667 >>> mbox cmd response: failed
11,915,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,916,254 >>> mbox cmd response: failed
Initializing fuses
2,055,761 writing to cptra_bootfsm_go
5,513,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,300,239 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,754 UART:
193,103 UART: Running Caliptra ROM ...
194,275 UART:
603,767 UART: [state] CFI Enabled
617,563 UART: [state] LifecycleState = Unprovisioned
619,470 UART: [state] DebugLocked = No
621,071 UART: [state] WD Timer not started. Device not locked for debugging
625,629 UART: [kat] SHA2-256
805,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,088 UART: [kat] ++
816,630 UART: [kat] sha1
827,082 UART: [kat] SHA2-256
829,797 UART: [kat] SHA2-384
835,292 UART: [kat] SHA2-512-ACC
837,638 UART: [kat] ECC-384
3,279,394 UART: [kat] HMAC-384Kdf
3,291,629 UART: [kat] LMS
3,768,112 UART: [kat] --
3,772,379 UART: [cold-reset] ++
3,773,775 UART: [fht] FHT @ 0x50003400
3,785,785 UART: [idev] ++
3,786,361 UART: [idev] CDI.KEYID = 6
3,787,304 UART: [idev] SUBJECT.KEYID = 7
3,788,523 UART: [idev] UDS.KEYID = 0
3,791,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,484 UART: [idev] Erasing UDS.KEYID = 0
6,265,142 UART: [idev] Sha1 KeyId Algorithm
6,288,587 UART: [idev] --
6,293,771 UART: [ldev] ++
6,294,356 UART: [ldev] CDI.KEYID = 6
6,295,249 UART: [ldev] SUBJECT.KEYID = 5
6,296,472 UART: [ldev] AUTHORITY.KEYID = 7
6,297,712 UART: [ldev] FE.KEYID = 1
6,306,560 UART: [ldev] Erasing FE.KEYID = 1
8,782,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,282 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,533,974 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,549,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,575 UART: [ldev] --
10,577,222 UART: [fwproc] Wait for Commands...
10,580,189 UART: [fwproc] Recv command 0x46574c44
10,582,186 UART: [fwproc] Recv'd Img size: 118548 bytes
12,204,619 UART: ROM Fatal Error: 0x000B0033
12,207,865 >>> mbox cmd response: failed
12,208,202 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,208,528 >>> mbox cmd response: failed
12,208,802 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,209,103 >>> mbox cmd response: failed
Initializing fuses
2,055,041 writing to cptra_bootfsm_go
2,244,350 UART:
2,244,707 UART: Running Caliptra ROM ...
2,245,847 UART:
8,242,740 UART: [state] CFI Enabled
8,256,077 UART: [state] LifecycleState = Unprovisioned
8,257,994 UART: [state] DebugLocked = No
8,259,711 UART: [state] WD Timer not started. Device not locked for debugging
8,264,447 UART: [kat] SHA2-256
8,444,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
8,454,871 UART: [kat] ++
8,455,335 UART: [kat] sha1
8,465,794 UART: [kat] SHA2-256
8,468,487 UART: [kat] SHA2-384
8,474,097 UART: [kat] SHA2-512-ACC
8,476,476 UART: [kat] ECC-384
10,915,689 UART: [kat] HMAC-384Kdf
10,928,361 UART: [kat] LMS
11,404,846 UART: [kat] --
11,408,918 UART: [cold-reset] ++
11,410,433 UART: [fht] FHT @ 0x50003400
11,422,874 UART: [idev] ++
11,423,442 UART: [idev] CDI.KEYID = 6
11,424,483 UART: [idev] SUBJECT.KEYID = 7
11,425,645 UART: [idev] UDS.KEYID = 0
11,428,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,577,600 UART: [idev] Erasing UDS.KEYID = 0
13,906,732 UART: [idev] Sha1 KeyId Algorithm
13,930,659 UART: [idev] --
13,936,683 UART: [ldev] ++
13,937,261 UART: [ldev] CDI.KEYID = 6
13,938,177 UART: [ldev] SUBJECT.KEYID = 5
13,939,392 UART: [ldev] AUTHORITY.KEYID = 7
13,940,630 UART: [ldev] FE.KEYID = 1
13,951,119 UART: [ldev] Erasing FE.KEYID = 1
16,425,603 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,145,919 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,161,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,177,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,193,179 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,215,572 UART: [ldev] --
18,221,000 UART: [fwproc] Wait for Commands...
18,223,431 UART: [fwproc] Recv command 0x46574c44
18,225,433 UART: [fwproc] Recv'd Img size: 118548 bytes
21,703,617 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,779,771 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,852,797 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,181,660 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,785,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,137,124 >>> mbox cmd response: failed
12,137,662 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,138,000 >>> mbox cmd response: failed
12,138,276 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,138,569 >>> mbox cmd response: failed
Initializing fuses
2,069,146 writing to cptra_bootfsm_go
11,512,548 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,176,381 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,278 UART:
192,642 UART: Running Caliptra ROM ...
193,780 UART:
193,932 UART: [state] CFI Enabled
259,519 UART: [state] LifecycleState = Unprovisioned
261,653 UART: [state] DebugLocked = No
262,980 UART: [state] WD Timer not started. Device not locked for debugging
267,092 UART: [kat] SHA2-256
456,948 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,689 UART: [kat] ++
468,168 UART: [kat] sha1
480,024 UART: [kat] SHA2-256
483,045 UART: [kat] SHA2-384
489,788 UART: [kat] SHA2-512-ACC
492,400 UART: [kat] ECC-384
2,947,298 UART: [kat] HMAC-384Kdf
2,971,481 UART: [kat] LMS
3,503,237 UART: [kat] --
3,507,368 UART: [cold-reset] ++
3,509,032 UART: [fht] FHT @ 0x50003400
3,519,857 UART: [idev] ++
3,520,545 UART: [idev] CDI.KEYID = 6
3,521,523 UART: [idev] SUBJECT.KEYID = 7
3,522,743 UART: [idev] UDS.KEYID = 0
3,525,855 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,180 UART: [idev] Erasing UDS.KEYID = 0
6,026,172 UART: [idev] Sha1 KeyId Algorithm
6,048,184 UART: [idev] --
6,053,480 UART: [ldev] ++
6,054,171 UART: [ldev] CDI.KEYID = 6
6,055,061 UART: [ldev] SUBJECT.KEYID = 5
6,056,251 UART: [ldev] AUTHORITY.KEYID = 7
6,057,490 UART: [ldev] FE.KEYID = 1
6,098,719 UART: [ldev] Erasing FE.KEYID = 1
8,605,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,619 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,143 UART: [ldev] --
10,414,170 UART: [fwproc] Wait for Commands...
10,415,797 UART: [fwproc] Recv command 0x46574c44
10,418,064 UART: [fwproc] Recv'd Img size: 118548 bytes
12,095,261 UART: ROM Fatal Error: 0x000B0033
12,098,651 >>> mbox cmd response: failed
12,099,083 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,099,616 >>> mbox cmd response: failed
12,099,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,100,214 >>> mbox cmd response: failed
Initializing fuses
2,061,115 writing to cptra_bootfsm_go
2,250,529 UART:
2,250,884 UART: Running Caliptra ROM ...
2,252,021 UART:
2,252,206 UART: [state] CFI Enabled
2,324,173 UART: [state] LifecycleState = Unprovisioned
2,326,545 UART: [state] DebugLocked = No
2,328,809 UART: [state] WD Timer not started. Device not locked for debugging
2,333,262 UART: [kat] SHA2-256
2,523,167 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,533,952 UART: [kat] ++
2,534,498 UART: [kat] sha1
2,547,073 UART: [kat] SHA2-256
2,550,115 UART: [kat] SHA2-384
2,554,768 UART: [kat] SHA2-512-ACC
2,557,338 UART: [kat] ECC-384
5,007,596 UART: [kat] HMAC-384Kdf
5,031,229 UART: [kat] LMS
5,563,023 UART: [kat] --
5,566,981 UART: [cold-reset] ++
5,568,169 UART: [fht] FHT @ 0x50003400
5,579,652 UART: [idev] ++
5,580,341 UART: [idev] CDI.KEYID = 6
5,581,370 UART: [idev] SUBJECT.KEYID = 7
5,582,535 UART: [idev] UDS.KEYID = 0
5,584,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,733,954 UART: [idev] Erasing UDS.KEYID = 0
8,086,649 UART: [idev] Sha1 KeyId Algorithm
8,108,863 UART: [idev] --
8,113,156 UART: [ldev] ++
8,113,845 UART: [ldev] CDI.KEYID = 6
8,114,729 UART: [ldev] SUBJECT.KEYID = 5
8,115,944 UART: [ldev] AUTHORITY.KEYID = 7
8,117,180 UART: [ldev] FE.KEYID = 1
8,159,164 UART: [ldev] Erasing FE.KEYID = 1
10,667,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,401,604 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,416,746 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,432,006 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,447,077 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,467,118 UART: [ldev] --
12,472,276 UART: [fwproc] Wait for Commands...
12,474,329 UART: [fwproc] Recv command 0x46574c44
12,476,645 UART: [fwproc] Recv'd Img size: 118548 bytes
15,974,238 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,056,830 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,180,413 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,741,023 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
3,444,304 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,879,908 >>> mbox cmd response: failed
11,880,719 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,881,087 >>> mbox cmd response: failed
11,881,365 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,881,668 >>> mbox cmd response: failed
Initializing fuses
2,050,293 writing to cptra_bootfsm_go
5,467,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,869,538 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
192,454 UART:
192,835 UART: Running Caliptra ROM ...
194,045 UART:
603,743 UART: [state] CFI Enabled
617,017 UART: [state] LifecycleState = Unprovisioned
619,441 UART: [state] DebugLocked = No
621,800 UART: [state] WD Timer not started. Device not locked for debugging
626,149 UART: [kat] SHA2-256
816,022 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,791 UART: [kat] ++
827,387 UART: [kat] sha1
838,737 UART: [kat] SHA2-256
841,748 UART: [kat] SHA2-384
848,067 UART: [kat] SHA2-512-ACC
850,633 UART: [kat] ECC-384
3,293,298 UART: [kat] HMAC-384Kdf
3,306,299 UART: [kat] LMS
3,838,128 UART: [kat] --
3,843,339 UART: [cold-reset] ++
3,845,121 UART: [fht] FHT @ 0x50003400
3,857,241 UART: [idev] ++
3,857,927 UART: [idev] CDI.KEYID = 6
3,858,894 UART: [idev] SUBJECT.KEYID = 7
3,860,117 UART: [idev] UDS.KEYID = 0
3,863,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,012,250 UART: [idev] Erasing UDS.KEYID = 0
6,341,178 UART: [idev] Sha1 KeyId Algorithm
6,364,073 UART: [idev] --
6,370,436 UART: [ldev] ++
6,371,154 UART: [ldev] CDI.KEYID = 6
6,372,079 UART: [ldev] SUBJECT.KEYID = 5
6,373,202 UART: [ldev] AUTHORITY.KEYID = 7
6,374,441 UART: [ldev] FE.KEYID = 1
6,384,774 UART: [ldev] Erasing FE.KEYID = 1
8,862,486 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,761 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,626,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,194 UART: [ldev] --
10,653,950 UART: [fwproc] Wait for Commands...
10,656,534 UART: [fwproc] Recv command 0x46574c44
10,658,859 UART: [fwproc] Recv'd Img size: 118548 bytes
12,352,027 UART: ROM Fatal Error: 0x000B0033
12,355,428 >>> mbox cmd response: failed
12,355,870 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,356,211 >>> mbox cmd response: failed
12,356,494 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,356,790 >>> mbox cmd response: failed
Initializing fuses
2,054,999 writing to cptra_bootfsm_go
2,244,322 UART:
2,244,667 UART: Running Caliptra ROM ...
2,245,717 UART:
8,096,389 UART: [state] CFI Enabled
8,109,517 UART: [state] LifecycleState = Unprovisioned
8,111,894 UART: [state] DebugLocked = No
8,114,704 UART: [state] WD Timer not started. Device not locked for debugging
8,120,093 UART: [kat] SHA2-256
8,310,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
8,320,810 UART: [kat] ++
8,321,357 UART: [kat] sha1
8,332,525 UART: [kat] SHA2-256
8,335,537 UART: [kat] SHA2-384
8,341,432 UART: [kat] SHA2-512-ACC
8,344,013 UART: [kat] ECC-384
10,784,025 UART: [kat] HMAC-384Kdf
10,797,014 UART: [kat] LMS
11,328,806 UART: [kat] --
11,333,361 UART: [cold-reset] ++
11,334,921 UART: [fht] FHT @ 0x50003400
11,347,372 UART: [idev] ++
11,348,067 UART: [idev] CDI.KEYID = 6
11,349,009 UART: [idev] SUBJECT.KEYID = 7
11,350,240 UART: [idev] UDS.KEYID = 0
11,352,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,501,793 UART: [idev] Erasing UDS.KEYID = 0
13,828,359 UART: [idev] Sha1 KeyId Algorithm
13,850,561 UART: [idev] --
13,855,608 UART: [ldev] ++
13,856,300 UART: [ldev] CDI.KEYID = 6
13,857,213 UART: [ldev] SUBJECT.KEYID = 5
13,858,371 UART: [ldev] AUTHORITY.KEYID = 7
13,859,603 UART: [ldev] FE.KEYID = 1
13,870,789 UART: [ldev] Erasing FE.KEYID = 1
16,349,217 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
18,070,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,085,437 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,100,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,115,729 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,135,000 UART: [ldev] --
18,140,002 UART: [fwproc] Wait for Commands...
18,142,594 UART: [fwproc] Recv command 0x46574c44
18,144,858 UART: [fwproc] Recv'd Img size: 118548 bytes
21,644,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
21,719,176 UART: [fwproc] Load FMC at address 0x40000000 len 20044
21,842,802 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
22,403,785 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,267 writing to cptra_bootfsm_go
3,757,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,071,151 >>> mbox cmd response: failed
12,071,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,072,048 >>> mbox cmd response: failed
12,072,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,072,674 >>> mbox cmd response: failed
Initializing fuses
2,063,175 writing to cptra_bootfsm_go
11,549,686 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,835,487 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,282 UART: [state] LifecycleState = Unprovisioned
85,937 UART: [state] DebugLocked = No
86,501 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,217 UART: [kat] SHA2-256
882,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,263 UART: [kat] ++
886,415 UART: [kat] sha1
890,575 UART: [kat] SHA2-256
892,513 UART: [kat] SHA2-384
895,034 UART: [kat] SHA2-512-ACC
896,935 UART: [kat] ECC-384
902,502 UART: [kat] HMAC-384Kdf
907,022 UART: [kat] LMS
1,475,218 UART: [kat] --
1,476,313 UART: [cold-reset] ++
1,476,849 UART: [fht] Storing FHT @ 0x50003400
1,479,612 UART: [idev] ++
1,479,780 UART: [idev] CDI.KEYID = 6
1,480,140 UART: [idev] SUBJECT.KEYID = 7
1,480,564 UART: [idev] UDS.KEYID = 0
1,480,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,678 UART: [idev] Erasing UDS.KEYID = 0
1,505,458 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,104 UART: [idev] --
1,515,061 UART: [ldev] ++
1,515,229 UART: [ldev] CDI.KEYID = 6
1,515,592 UART: [ldev] SUBJECT.KEYID = 5
1,516,018 UART: [ldev] AUTHORITY.KEYID = 7
1,516,481 UART: [ldev] FE.KEYID = 1
1,521,661 UART: [ldev] Erasing FE.KEYID = 1
1,547,132 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,505 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,112 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,824 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,002 UART: [ldev] --
1,586,499 UART: [fwproc] Waiting for Commands...
1,587,310 UART: [fwproc] Received command 0x46574c44
1,588,101 UART: [fwproc] Received Image of size 118548 bytes
2,763,440 UART: ROM Fatal Error: 0x000B0033
2,764,597 >>> mbox cmd response: failed
2,764,597 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,603 >>> mbox cmd response: failed
2,764,603 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,764,609 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,041 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,717 UART: [kat] SHA2-256
881,648 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,763 UART: [kat] ++
885,915 UART: [kat] sha1
890,013 UART: [kat] SHA2-256
891,951 UART: [kat] SHA2-384
894,514 UART: [kat] SHA2-512-ACC
896,415 UART: [kat] ECC-384
901,928 UART: [kat] HMAC-384Kdf
906,504 UART: [kat] LMS
1,474,700 UART: [kat] --
1,475,619 UART: [cold-reset] ++
1,476,145 UART: [fht] Storing FHT @ 0x50003400
1,478,804 UART: [idev] ++
1,478,972 UART: [idev] CDI.KEYID = 6
1,479,332 UART: [idev] SUBJECT.KEYID = 7
1,479,756 UART: [idev] UDS.KEYID = 0
1,480,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,487,990 UART: [idev] Erasing UDS.KEYID = 0
1,504,850 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,280 UART: [idev] --
1,514,181 UART: [ldev] ++
1,514,349 UART: [ldev] CDI.KEYID = 6
1,514,712 UART: [ldev] SUBJECT.KEYID = 5
1,515,138 UART: [ldev] AUTHORITY.KEYID = 7
1,515,601 UART: [ldev] FE.KEYID = 1
1,521,045 UART: [ldev] Erasing FE.KEYID = 1
1,545,870 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,551 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,267 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,158 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,122 UART: [ldev] --
1,585,451 UART: [fwproc] Waiting for Commands...
1,586,114 UART: [fwproc] Received command 0x46574c44
1,586,905 UART: [fwproc] Received Image of size 118548 bytes
2,931,032 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,488 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,706 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,979 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,690,490 >>> mbox cmd response: failed
2,690,490 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,690,496 >>> mbox cmd response: failed
2,690,496 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,690,502 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,509 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,957 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.07s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,532 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,182 UART: [kat] SHA2-256
882,113 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,228 UART: [kat] ++
886,380 UART: [kat] sha1
890,668 UART: [kat] SHA2-256
892,606 UART: [kat] SHA2-384
895,319 UART: [kat] SHA2-512-ACC
897,220 UART: [kat] ECC-384
902,875 UART: [kat] HMAC-384Kdf
907,517 UART: [kat] LMS
1,475,713 UART: [kat] --
1,476,544 UART: [cold-reset] ++
1,476,930 UART: [fht] Storing FHT @ 0x50003400
1,479,789 UART: [idev] ++
1,479,957 UART: [idev] CDI.KEYID = 6
1,480,317 UART: [idev] SUBJECT.KEYID = 7
1,480,741 UART: [idev] UDS.KEYID = 0
1,481,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,167 UART: [idev] Erasing UDS.KEYID = 0
1,505,687 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,237 UART: [idev] --
1,515,230 UART: [ldev] ++
1,515,398 UART: [ldev] CDI.KEYID = 6
1,515,761 UART: [ldev] SUBJECT.KEYID = 5
1,516,187 UART: [ldev] AUTHORITY.KEYID = 7
1,516,650 UART: [ldev] FE.KEYID = 1
1,521,746 UART: [ldev] Erasing FE.KEYID = 1
1,548,011 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,428 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,769 UART: [ldev] --
1,587,282 UART: [fwproc] Waiting for Commands...
1,588,067 UART: [fwproc] Received command 0x46574c44
1,588,858 UART: [fwproc] Received Image of size 118548 bytes
2,801,550 UART: ROM Fatal Error: 0x000B0033
2,802,707 >>> mbox cmd response: failed
2,802,707 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,713 >>> mbox cmd response: failed
2,802,713 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,802,719 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,234 UART: [kat] SHA2-256
882,165 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,280 UART: [kat] ++
886,432 UART: [kat] sha1
890,682 UART: [kat] SHA2-256
892,620 UART: [kat] SHA2-384
895,265 UART: [kat] SHA2-512-ACC
897,166 UART: [kat] ECC-384
903,049 UART: [kat] HMAC-384Kdf
907,689 UART: [kat] LMS
1,475,885 UART: [kat] --
1,476,478 UART: [cold-reset] ++
1,477,058 UART: [fht] Storing FHT @ 0x50003400
1,479,767 UART: [idev] ++
1,479,935 UART: [idev] CDI.KEYID = 6
1,480,295 UART: [idev] SUBJECT.KEYID = 7
1,480,719 UART: [idev] UDS.KEYID = 0
1,481,064 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,569 UART: [idev] Erasing UDS.KEYID = 0
1,504,965 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,685 UART: [idev] --
1,514,716 UART: [ldev] ++
1,514,884 UART: [ldev] CDI.KEYID = 6
1,515,247 UART: [ldev] SUBJECT.KEYID = 5
1,515,673 UART: [ldev] AUTHORITY.KEYID = 7
1,516,136 UART: [ldev] FE.KEYID = 1
1,521,394 UART: [ldev] Erasing FE.KEYID = 1
1,546,931 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,426 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,142 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,033 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,025 UART: [ldev] --
1,586,484 UART: [fwproc] Waiting for Commands...
1,587,301 UART: [fwproc] Received command 0x46574c44
1,588,092 UART: [fwproc] Received Image of size 118548 bytes
2,931,283 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,847 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,065 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,420 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,306 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,692,225 >>> mbox cmd response: failed
2,692,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,692,231 >>> mbox cmd response: failed
2,692,231 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
2,692,237 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,268 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,214 UART: [state] LifecycleState = Unprovisioned
85,869 UART: [state] DebugLocked = No
86,363 UART: [state] WD Timer not started. Device not locked for debugging
87,642 UART: [kat] SHA2-256
891,192 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,296 UART: [kat] ++
895,448 UART: [kat] sha1
899,754 UART: [kat] SHA2-256
901,694 UART: [kat] SHA2-384
904,539 UART: [kat] SHA2-512-ACC
906,440 UART: [kat] ECC-384
916,107 UART: [kat] HMAC-384Kdf
920,717 UART: [kat] LMS
1,169,029 UART: [kat] --
1,169,854 UART: [cold-reset] ++
1,170,278 UART: [fht] FHT @ 0x50003400
1,172,890 UART: [idev] ++
1,173,058 UART: [idev] CDI.KEYID = 6
1,173,419 UART: [idev] SUBJECT.KEYID = 7
1,173,844 UART: [idev] UDS.KEYID = 0
1,174,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,741 UART: [idev] Erasing UDS.KEYID = 0
1,198,445 UART: [idev] Sha1 KeyId Algorithm
1,207,467 UART: [idev] --
1,208,728 UART: [ldev] ++
1,208,896 UART: [ldev] CDI.KEYID = 6
1,209,260 UART: [ldev] SUBJECT.KEYID = 5
1,209,687 UART: [ldev] AUTHORITY.KEYID = 7
1,210,150 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,399 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,288 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,000 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,086 UART: [ldev] --
1,280,491 UART: [fwproc] Wait for Commands...
1,281,200 UART: [fwproc] Recv command 0x46574c44
1,281,933 UART: [fwproc] Recv'd Img size: 118548 bytes
1,597,358 UART: ROM Fatal Error: 0x000B0033
1,598,515 >>> mbox cmd response: failed
1,598,515 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,521 >>> mbox cmd response: failed
1,598,521 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,598,527 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,227 UART: [state] WD Timer not started. Device not locked for debugging
87,428 UART: [kat] SHA2-256
890,978 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,082 UART: [kat] ++
895,234 UART: [kat] sha1
899,424 UART: [kat] SHA2-256
901,364 UART: [kat] SHA2-384
903,875 UART: [kat] SHA2-512-ACC
905,776 UART: [kat] ECC-384
915,377 UART: [kat] HMAC-384Kdf
920,109 UART: [kat] LMS
1,168,421 UART: [kat] --
1,169,412 UART: [cold-reset] ++
1,169,890 UART: [fht] FHT @ 0x50003400
1,172,570 UART: [idev] ++
1,172,738 UART: [idev] CDI.KEYID = 6
1,173,099 UART: [idev] SUBJECT.KEYID = 7
1,173,524 UART: [idev] UDS.KEYID = 0
1,173,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,571 UART: [idev] Erasing UDS.KEYID = 0
1,199,043 UART: [idev] Sha1 KeyId Algorithm
1,207,903 UART: [idev] --
1,209,006 UART: [ldev] ++
1,209,174 UART: [ldev] CDI.KEYID = 6
1,209,538 UART: [ldev] SUBJECT.KEYID = 5
1,209,965 UART: [ldev] AUTHORITY.KEYID = 7
1,210,428 UART: [ldev] FE.KEYID = 1
1,215,296 UART: [ldev] Erasing FE.KEYID = 1
1,241,303 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,807 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,523 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,124 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,286 UART: [ldev] --
1,280,557 UART: [fwproc] Wait for Commands...
1,281,258 UART: [fwproc] Recv command 0x46574c44
1,281,991 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,272 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,447 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,824 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,453,954 >>> mbox cmd response: failed
1,453,954 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,960 >>> mbox cmd response: failed
1,453,960 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,453,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,806 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,475 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,467 UART: [state] LifecycleState = Unprovisioned
86,122 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,997 UART: [kat] SHA2-256
891,547 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,651 UART: [kat] ++
895,803 UART: [kat] sha1
899,985 UART: [kat] SHA2-256
901,925 UART: [kat] SHA2-384
904,808 UART: [kat] SHA2-512-ACC
906,709 UART: [kat] ECC-384
916,404 UART: [kat] HMAC-384Kdf
921,040 UART: [kat] LMS
1,169,352 UART: [kat] --
1,170,017 UART: [cold-reset] ++
1,170,441 UART: [fht] FHT @ 0x50003400
1,172,979 UART: [idev] ++
1,173,147 UART: [idev] CDI.KEYID = 6
1,173,508 UART: [idev] SUBJECT.KEYID = 7
1,173,933 UART: [idev] UDS.KEYID = 0
1,174,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,624 UART: [idev] Erasing UDS.KEYID = 0
1,198,612 UART: [idev] Sha1 KeyId Algorithm
1,207,634 UART: [idev] --
1,208,765 UART: [ldev] ++
1,208,933 UART: [ldev] CDI.KEYID = 6
1,209,297 UART: [ldev] SUBJECT.KEYID = 5
1,209,724 UART: [ldev] AUTHORITY.KEYID = 7
1,210,187 UART: [ldev] FE.KEYID = 1
1,215,685 UART: [ldev] Erasing FE.KEYID = 1
1,242,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,230 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,946 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,835 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,547 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,282,052 UART: [fwproc] Wait for Commands...
1,282,771 UART: [fwproc] Recv command 0x46574c44
1,283,504 UART: [fwproc] Recv'd Img size: 118548 bytes
1,595,554 UART: ROM Fatal Error: 0x000B0033
1,596,711 >>> mbox cmd response: failed
1,596,711 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,717 >>> mbox cmd response: failed
1,596,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,596,723 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,539 UART: [state] LifecycleState = Unprovisioned
86,194 UART: [state] DebugLocked = No
86,704 UART: [state] WD Timer not started. Device not locked for debugging
87,841 UART: [kat] SHA2-256
891,391 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,495 UART: [kat] ++
895,647 UART: [kat] sha1
900,013 UART: [kat] SHA2-256
901,953 UART: [kat] SHA2-384
904,560 UART: [kat] SHA2-512-ACC
906,461 UART: [kat] ECC-384
916,198 UART: [kat] HMAC-384Kdf
920,790 UART: [kat] LMS
1,169,102 UART: [kat] --
1,169,851 UART: [cold-reset] ++
1,170,283 UART: [fht] FHT @ 0x50003400
1,172,945 UART: [idev] ++
1,173,113 UART: [idev] CDI.KEYID = 6
1,173,474 UART: [idev] SUBJECT.KEYID = 7
1,173,899 UART: [idev] UDS.KEYID = 0
1,174,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,118 UART: [idev] Erasing UDS.KEYID = 0
1,199,354 UART: [idev] Sha1 KeyId Algorithm
1,208,162 UART: [idev] --
1,209,283 UART: [ldev] ++
1,209,451 UART: [ldev] CDI.KEYID = 6
1,209,815 UART: [ldev] SUBJECT.KEYID = 5
1,210,242 UART: [ldev] AUTHORITY.KEYID = 7
1,210,705 UART: [ldev] FE.KEYID = 1
1,215,755 UART: [ldev] Erasing FE.KEYID = 1
1,242,522 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,162 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,878 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,475 UART: [ldev] --
1,281,702 UART: [fwproc] Wait for Commands...
1,282,425 UART: [fwproc] Recv command 0x46574c44
1,283,158 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,558 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,359 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,534 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,881 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.93s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,451,998 >>> mbox cmd response: failed
1,451,998 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,004 >>> mbox cmd response: failed
1,452,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,452,010 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,395 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,187 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.95s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,576 UART: [state] LifecycleState = Unprovisioned
86,231 UART: [state] DebugLocked = No
86,721 UART: [state] WD Timer not started. Device not locked for debugging
88,074 UART: [kat] SHA2-256
893,724 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,849 UART: [kat] ++
898,001 UART: [kat] sha1
902,201 UART: [kat] SHA2-256
904,141 UART: [kat] SHA2-384
906,956 UART: [kat] SHA2-512-ACC
908,857 UART: [kat] ECC-384
918,620 UART: [kat] HMAC-384Kdf
923,014 UART: [kat] LMS
1,171,342 UART: [kat] --
1,172,313 UART: [cold-reset] ++
1,172,679 UART: [fht] FHT @ 0x50003400
1,175,286 UART: [idev] ++
1,175,454 UART: [idev] CDI.KEYID = 6
1,175,814 UART: [idev] SUBJECT.KEYID = 7
1,176,238 UART: [idev] UDS.KEYID = 0
1,176,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,452 UART: [idev] Erasing UDS.KEYID = 0
1,202,109 UART: [idev] Sha1 KeyId Algorithm
1,210,609 UART: [idev] --
1,211,823 UART: [ldev] ++
1,211,991 UART: [ldev] CDI.KEYID = 6
1,212,354 UART: [ldev] SUBJECT.KEYID = 5
1,212,780 UART: [ldev] AUTHORITY.KEYID = 7
1,213,243 UART: [ldev] FE.KEYID = 1
1,218,441 UART: [ldev] Erasing FE.KEYID = 1
1,244,860 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,203 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,919 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,810 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,522 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,477 UART: [ldev] --
1,283,974 UART: [fwproc] Wait for Commands...
1,284,550 UART: [fwproc] Recv command 0x46574c44
1,285,278 UART: [fwproc] Recv'd Img size: 118548 bytes
1,592,409 UART: ROM Fatal Error: 0x000B0033
1,593,566 >>> mbox cmd response: failed
1,593,566 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,572 >>> mbox cmd response: failed
1,593,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,593,578 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,332 UART: [state] LifecycleState = Unprovisioned
85,987 UART: [state] DebugLocked = No
86,613 UART: [state] WD Timer not started. Device not locked for debugging
87,796 UART: [kat] SHA2-256
893,446 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,571 UART: [kat] ++
897,723 UART: [kat] sha1
901,951 UART: [kat] SHA2-256
903,891 UART: [kat] SHA2-384
906,682 UART: [kat] SHA2-512-ACC
908,583 UART: [kat] ECC-384
918,428 UART: [kat] HMAC-384Kdf
922,964 UART: [kat] LMS
1,171,292 UART: [kat] --
1,172,021 UART: [cold-reset] ++
1,172,375 UART: [fht] FHT @ 0x50003400
1,175,074 UART: [idev] ++
1,175,242 UART: [idev] CDI.KEYID = 6
1,175,602 UART: [idev] SUBJECT.KEYID = 7
1,176,026 UART: [idev] UDS.KEYID = 0
1,176,371 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,764 UART: [idev] Erasing UDS.KEYID = 0
1,201,155 UART: [idev] Sha1 KeyId Algorithm
1,209,607 UART: [idev] --
1,210,671 UART: [ldev] ++
1,210,839 UART: [ldev] CDI.KEYID = 6
1,211,202 UART: [ldev] SUBJECT.KEYID = 5
1,211,628 UART: [ldev] AUTHORITY.KEYID = 7
1,212,091 UART: [ldev] FE.KEYID = 1
1,217,399 UART: [ldev] Erasing FE.KEYID = 1
1,243,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,939 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,655 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,546 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,258 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,217 UART: [ldev] --
1,282,662 UART: [fwproc] Wait for Commands...
1,283,392 UART: [fwproc] Recv command 0x46574c44
1,284,120 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,519 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,726 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.92s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,579 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,454,436 >>> mbox cmd response: failed
1,454,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,442 >>> mbox cmd response: failed
1,454,442 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,454,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,563 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,029 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,243 UART: [state] LifecycleState = Unprovisioned
85,898 UART: [state] DebugLocked = No
86,496 UART: [state] WD Timer not started. Device not locked for debugging
87,763 UART: [kat] SHA2-256
893,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,538 UART: [kat] ++
897,690 UART: [kat] sha1
901,950 UART: [kat] SHA2-256
903,890 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,107 UART: [kat] HMAC-384Kdf
922,595 UART: [kat] LMS
1,170,923 UART: [kat] --
1,171,898 UART: [cold-reset] ++
1,172,392 UART: [fht] FHT @ 0x50003400
1,175,061 UART: [idev] ++
1,175,229 UART: [idev] CDI.KEYID = 6
1,175,589 UART: [idev] SUBJECT.KEYID = 7
1,176,013 UART: [idev] UDS.KEYID = 0
1,176,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,173 UART: [idev] Erasing UDS.KEYID = 0
1,201,338 UART: [idev] Sha1 KeyId Algorithm
1,209,668 UART: [idev] --
1,210,820 UART: [ldev] ++
1,210,988 UART: [ldev] CDI.KEYID = 6
1,211,351 UART: [ldev] SUBJECT.KEYID = 5
1,211,777 UART: [ldev] AUTHORITY.KEYID = 7
1,212,240 UART: [ldev] FE.KEYID = 1
1,217,570 UART: [ldev] Erasing FE.KEYID = 1
1,243,351 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,194 UART: [ldev] --
1,282,615 UART: [fwproc] Wait for Commands...
1,283,213 UART: [fwproc] Recv command 0x46574c44
1,283,941 UART: [fwproc] Recv'd Img size: 118548 bytes
1,594,075 UART: ROM Fatal Error: 0x000B0033
1,595,232 >>> mbox cmd response: failed
1,595,232 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,238 >>> mbox cmd response: failed
1,595,238 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,595,244 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,971 UART: [state] LifecycleState = Unprovisioned
86,626 UART: [state] DebugLocked = No
87,234 UART: [state] WD Timer not started. Device not locked for debugging
88,355 UART: [kat] SHA2-256
894,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,130 UART: [kat] ++
898,282 UART: [kat] sha1
902,498 UART: [kat] SHA2-256
904,438 UART: [kat] SHA2-384
907,051 UART: [kat] SHA2-512-ACC
908,952 UART: [kat] ECC-384
918,793 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,648 UART: [cold-reset] ++
1,172,976 UART: [fht] FHT @ 0x50003400
1,175,671 UART: [idev] ++
1,175,839 UART: [idev] CDI.KEYID = 6
1,176,199 UART: [idev] SUBJECT.KEYID = 7
1,176,623 UART: [idev] UDS.KEYID = 0
1,176,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,959 UART: [idev] Erasing UDS.KEYID = 0
1,202,380 UART: [idev] Sha1 KeyId Algorithm
1,210,924 UART: [idev] --
1,212,024 UART: [ldev] ++
1,212,192 UART: [ldev] CDI.KEYID = 6
1,212,555 UART: [ldev] SUBJECT.KEYID = 5
1,212,981 UART: [ldev] AUTHORITY.KEYID = 7
1,213,444 UART: [ldev] FE.KEYID = 1
1,218,792 UART: [ldev] Erasing FE.KEYID = 1
1,244,645 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,866 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,582 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,185 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,126 UART: [ldev] --
1,283,567 UART: [fwproc] Wait for Commands...
1,284,243 UART: [fwproc] Recv command 0x46574c44
1,284,971 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,399 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,242 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,412 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,675 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,450,907 >>> mbox cmd response: failed
1,450,907 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,913 >>> mbox cmd response: failed
1,450,913 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,450,919 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,214 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_signature_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
3,445,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,375,202 >>> mbox cmd response: failed
11,375,738 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,376,095 >>> mbox cmd response: failed
11,376,375 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,376,673 >>> mbox cmd response: failed
Initializing fuses
2,062,805 writing to cptra_bootfsm_go
5,507,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,325,589 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,447,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,406,486 >>> mbox cmd response: failed
11,407,089 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,407,446 >>> mbox cmd response: failed
11,407,718 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,408,015 >>> mbox cmd response: failed
Initializing fuses
2,056,179 writing to cptra_bootfsm_go
5,520,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,353,484 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.51s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
3,779,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,594,619 >>> mbox cmd response: failed
11,595,200 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,595,563 >>> mbox cmd response: failed
11,595,839 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,596,135 >>> mbox cmd response: failed
Initializing fuses
2,054,687 writing to cptra_bootfsm_go
12,047,850 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,754,640 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,420 writing to cptra_bootfsm_go
3,785,091 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,604,482 >>> mbox cmd response: failed
11,605,000 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,605,348 >>> mbox cmd response: failed
11,605,621 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,605,919 >>> mbox cmd response: failed
Initializing fuses
2,064,589 writing to cptra_bootfsm_go
12,042,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,746,431 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,450,142 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,401,392 >>> mbox cmd response: failed
11,402,037 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,402,420 >>> mbox cmd response: failed
11,402,760 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,403,055 >>> mbox cmd response: failed
Initializing fuses
2,055,332 writing to cptra_bootfsm_go
5,523,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,352,866 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
3,450,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,379,904 >>> mbox cmd response: failed
11,380,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,381,068 >>> mbox cmd response: failed
11,381,348 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,381,644 >>> mbox cmd response: failed
Initializing fuses
2,062,135 writing to cptra_bootfsm_go
5,499,661 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,325,703 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
3,782,247 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,588,710 >>> mbox cmd response: failed
11,589,482 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,589,843 >>> mbox cmd response: failed
11,590,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,590,426 >>> mbox cmd response: failed
Initializing fuses
2,056,391 writing to cptra_bootfsm_go
12,052,498 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,766,492 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
3,785,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
11,598,511 >>> mbox cmd response: failed
11,599,140 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,599,493 >>> mbox cmd response: failed
11,599,771 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
11,600,077 >>> mbox cmd response: failed
Initializing fuses
2,056,057 writing to cptra_bootfsm_go
12,048,464 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
22,759,706 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,451 >>> mbox cmd response: failed
1,199,451 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,457 >>> mbox cmd response: failed
1,199,457 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,463 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,626 UART: [state] LifecycleState = Unprovisioned
86,281 UART: [state] DebugLocked = No
86,791 UART: [state] WD Timer not started. Device not locked for debugging
87,986 UART: [kat] SHA2-256
891,536 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,640 UART: [kat] ++
895,792 UART: [kat] sha1
899,980 UART: [kat] SHA2-256
901,920 UART: [kat] SHA2-384
904,635 UART: [kat] SHA2-512-ACC
906,536 UART: [kat] ECC-384
916,183 UART: [kat] HMAC-384Kdf
920,715 UART: [kat] LMS
1,169,027 UART: [kat] --
1,170,114 UART: [cold-reset] ++
1,170,690 UART: [fht] FHT @ 0x50003400
1,173,306 UART: [idev] ++
1,173,474 UART: [idev] CDI.KEYID = 6
1,173,835 UART: [idev] SUBJECT.KEYID = 7
1,174,260 UART: [idev] UDS.KEYID = 0
1,174,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,407 UART: [idev] Erasing UDS.KEYID = 0
1,199,601 UART: [idev] Sha1 KeyId Algorithm
1,208,503 UART: [idev] --
1,209,652 UART: [ldev] ++
1,209,820 UART: [ldev] CDI.KEYID = 6
1,210,184 UART: [ldev] SUBJECT.KEYID = 5
1,210,611 UART: [ldev] AUTHORITY.KEYID = 7
1,211,074 UART: [ldev] FE.KEYID = 1
1,216,036 UART: [ldev] Erasing FE.KEYID = 1
1,243,017 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,489 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,205 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,094 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,758 UART: [ldev] --
1,281,961 UART: [fwproc] Wait for Commands...
1,282,530 UART: [fwproc] Recv command 0x46574c44
1,283,263 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,068 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,243 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,424 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,485 >>> mbox cmd response: failed
1,200,485 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,491 >>> mbox cmd response: failed
1,200,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,497 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,824 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,537 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,200,564 >>> mbox cmd response: failed
1,200,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,570 >>> mbox cmd response: failed
1,200,570 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,200,576 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,823 UART: [state] LifecycleState = Unprovisioned
86,478 UART: [state] DebugLocked = No
87,158 UART: [state] WD Timer not started. Device not locked for debugging
88,267 UART: [kat] SHA2-256
891,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,921 UART: [kat] ++
896,073 UART: [kat] sha1
900,205 UART: [kat] SHA2-256
902,145 UART: [kat] SHA2-384
904,734 UART: [kat] SHA2-512-ACC
906,635 UART: [kat] ECC-384
916,204 UART: [kat] HMAC-384Kdf
920,624 UART: [kat] LMS
1,168,936 UART: [kat] --
1,170,077 UART: [cold-reset] ++
1,170,561 UART: [fht] FHT @ 0x50003400
1,173,191 UART: [idev] ++
1,173,359 UART: [idev] CDI.KEYID = 6
1,173,720 UART: [idev] SUBJECT.KEYID = 7
1,174,145 UART: [idev] UDS.KEYID = 0
1,174,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,410 UART: [idev] Erasing UDS.KEYID = 0
1,199,390 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,101 UART: [ldev] ++
1,209,269 UART: [ldev] CDI.KEYID = 6
1,209,633 UART: [ldev] SUBJECT.KEYID = 5
1,210,060 UART: [ldev] AUTHORITY.KEYID = 7
1,210,523 UART: [ldev] FE.KEYID = 1
1,215,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,172 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,464 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,180 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,691 UART: [ldev] --
1,281,036 UART: [fwproc] Wait for Commands...
1,281,715 UART: [fwproc] Recv command 0x46574c44
1,282,448 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,803 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,978 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,275 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,650 >>> mbox cmd response: failed
1,201,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,656 >>> mbox cmd response: failed
1,201,656 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,662 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,684 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,201,481 >>> mbox cmd response: failed
1,201,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,487 >>> mbox cmd response: failed
1,201,487 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,201,493 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,992 UART: [state] LifecycleState = Unprovisioned
85,647 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,370 UART: [kat] SHA2-256
893,020 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,145 UART: [kat] ++
897,297 UART: [kat] sha1
901,539 UART: [kat] SHA2-256
903,479 UART: [kat] SHA2-384
906,188 UART: [kat] SHA2-512-ACC
908,089 UART: [kat] ECC-384
917,670 UART: [kat] HMAC-384Kdf
922,470 UART: [kat] LMS
1,170,798 UART: [kat] --
1,171,713 UART: [cold-reset] ++
1,172,289 UART: [fht] FHT @ 0x50003400
1,174,948 UART: [idev] ++
1,175,116 UART: [idev] CDI.KEYID = 6
1,175,476 UART: [idev] SUBJECT.KEYID = 7
1,175,900 UART: [idev] UDS.KEYID = 0
1,176,245 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,516 UART: [idev] Erasing UDS.KEYID = 0
1,200,659 UART: [idev] Sha1 KeyId Algorithm
1,209,129 UART: [idev] --
1,210,377 UART: [ldev] ++
1,210,545 UART: [ldev] CDI.KEYID = 6
1,210,908 UART: [ldev] SUBJECT.KEYID = 5
1,211,334 UART: [ldev] AUTHORITY.KEYID = 7
1,211,797 UART: [ldev] FE.KEYID = 1
1,217,183 UART: [ldev] Erasing FE.KEYID = 1
1,243,302 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,163 UART: [ldev] --
1,282,678 UART: [fwproc] Wait for Commands...
1,283,396 UART: [fwproc] Recv command 0x46574c44
1,284,124 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,661 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,831 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,024 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,949 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,199,857 >>> mbox cmd response: failed
1,199,857 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,863 >>> mbox cmd response: failed
1,199,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,199,869 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,571 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,626 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,203,250 >>> mbox cmd response: failed
1,203,250 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,256 >>> mbox cmd response: failed
1,203,256 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,203,262 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,425 UART: [state] LifecycleState = Unprovisioned
86,080 UART: [state] DebugLocked = No
86,650 UART: [state] WD Timer not started. Device not locked for debugging
87,809 UART: [kat] SHA2-256
893,459 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,584 UART: [kat] ++
897,736 UART: [kat] sha1
901,966 UART: [kat] SHA2-256
903,906 UART: [kat] SHA2-384
906,505 UART: [kat] SHA2-512-ACC
908,406 UART: [kat] ECC-384
918,343 UART: [kat] HMAC-384Kdf
923,059 UART: [kat] LMS
1,171,387 UART: [kat] --
1,172,292 UART: [cold-reset] ++
1,172,774 UART: [fht] FHT @ 0x50003400
1,175,497 UART: [idev] ++
1,175,665 UART: [idev] CDI.KEYID = 6
1,176,025 UART: [idev] SUBJECT.KEYID = 7
1,176,449 UART: [idev] UDS.KEYID = 0
1,176,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,315 UART: [idev] Erasing UDS.KEYID = 0
1,201,992 UART: [idev] Sha1 KeyId Algorithm
1,210,490 UART: [idev] --
1,211,546 UART: [ldev] ++
1,211,714 UART: [ldev] CDI.KEYID = 6
1,212,077 UART: [ldev] SUBJECT.KEYID = 5
1,212,503 UART: [ldev] AUTHORITY.KEYID = 7
1,212,966 UART: [ldev] FE.KEYID = 1
1,218,046 UART: [ldev] Erasing FE.KEYID = 1
1,244,365 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,343 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,300 UART: [ldev] --
1,283,661 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,531 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,638 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,808 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,145 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,934 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,204,352 >>> mbox cmd response: failed
1,204,352 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,358 >>> mbox cmd response: failed
1,204,358 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,204,364 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,190 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_lms_verify_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,136 writing to cptra_bootfsm_go
3,484,357 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,407,833 >>> mbox cmd response: failed
10,408,443 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,408,797 >>> mbox cmd response: failed
10,409,071 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,409,371 >>> mbox cmd response: failed
Initializing fuses
2,056,363 writing to cptra_bootfsm_go
5,486,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,370,288 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,093 writing to cptra_bootfsm_go
3,445,115 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,395,573 >>> mbox cmd response: failed
10,396,196 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,396,549 >>> mbox cmd response: failed
10,396,896 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,397,194 >>> mbox cmd response: failed
Initializing fuses
2,057,477 writing to cptra_bootfsm_go
5,484,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,322,974 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,782,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,592,007 >>> mbox cmd response: failed
10,592,945 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,593,322 >>> mbox cmd response: failed
10,593,589 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,593,883 >>> mbox cmd response: failed
Initializing fuses
2,063,906 writing to cptra_bootfsm_go
13,052,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,799,189 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
3,780,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,583,915 >>> mbox cmd response: failed
10,584,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,584,844 >>> mbox cmd response: failed
10,585,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,413 >>> mbox cmd response: failed
Initializing fuses
2,064,559 writing to cptra_bootfsm_go
13,058,370 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,803,381 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,991 writing to cptra_bootfsm_go
3,449,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,371,208 >>> mbox cmd response: failed
10,372,285 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,372,676 >>> mbox cmd response: failed
10,372,952 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,373,247 >>> mbox cmd response: failed
Initializing fuses
2,058,049 writing to cptra_bootfsm_go
5,501,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,362,751 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,461,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,392,108 >>> mbox cmd response: failed
10,392,915 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,393,287 >>> mbox cmd response: failed
10,393,564 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,393,860 >>> mbox cmd response: failed
Initializing fuses
2,064,133 writing to cptra_bootfsm_go
5,501,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,372,645 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,780,097 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,584,288 >>> mbox cmd response: failed
10,584,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,208 >>> mbox cmd response: failed
10,585,493 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,793 >>> mbox cmd response: failed
Initializing fuses
2,057,627 writing to cptra_bootfsm_go
13,057,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,806,874 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,558 writing to cptra_bootfsm_go
3,777,443 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,580,820 >>> mbox cmd response: failed
10,581,596 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,581,971 >>> mbox cmd response: failed
10,582,246 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,582,554 >>> mbox cmd response: failed
Initializing fuses
2,058,026 writing to cptra_bootfsm_go
13,056,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,811,929 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,255 >>> mbox cmd response: failed
1,183,255 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,261 >>> mbox cmd response: failed
1,183,261 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,243 UART: [state] WD Timer not started. Device not locked for debugging
87,458 UART: [kat] SHA2-256
891,008 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,112 UART: [kat] ++
895,264 UART: [kat] sha1
899,486 UART: [kat] SHA2-256
901,426 UART: [kat] SHA2-384
904,031 UART: [kat] SHA2-512-ACC
905,932 UART: [kat] ECC-384
915,321 UART: [kat] HMAC-384Kdf
919,751 UART: [kat] LMS
1,168,063 UART: [kat] --
1,169,144 UART: [cold-reset] ++
1,169,520 UART: [fht] FHT @ 0x50003400
1,172,172 UART: [idev] ++
1,172,340 UART: [idev] CDI.KEYID = 6
1,172,701 UART: [idev] SUBJECT.KEYID = 7
1,173,126 UART: [idev] UDS.KEYID = 0
1,173,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,743 UART: [idev] Erasing UDS.KEYID = 0
1,197,913 UART: [idev] Sha1 KeyId Algorithm
1,206,805 UART: [idev] --
1,207,742 UART: [ldev] ++
1,207,910 UART: [ldev] CDI.KEYID = 6
1,208,274 UART: [ldev] SUBJECT.KEYID = 5
1,208,701 UART: [ldev] AUTHORITY.KEYID = 7
1,209,164 UART: [ldev] FE.KEYID = 1
1,214,286 UART: [ldev] Erasing FE.KEYID = 1
1,241,557 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,685 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,574 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,861 UART: [fwproc] Wait for Commands...
1,281,586 UART: [fwproc] Recv command 0x46574c44
1,282,319 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,054 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,229 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,450 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,093 >>> mbox cmd response: failed
1,183,093 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,099 >>> mbox cmd response: failed
1,183,099 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,459 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,120 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,130 >>> mbox cmd response: failed
1,183,130 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,136 >>> mbox cmd response: failed
1,183,136 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,142 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,794 UART: [state] WD Timer not started. Device not locked for debugging
88,143 UART: [kat] SHA2-256
891,693 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,797 UART: [kat] ++
895,949 UART: [kat] sha1
900,245 UART: [kat] SHA2-256
902,185 UART: [kat] SHA2-384
905,054 UART: [kat] SHA2-512-ACC
906,955 UART: [kat] ECC-384
916,578 UART: [kat] HMAC-384Kdf
921,218 UART: [kat] LMS
1,169,530 UART: [kat] --
1,170,487 UART: [cold-reset] ++
1,170,853 UART: [fht] FHT @ 0x50003400
1,173,539 UART: [idev] ++
1,173,707 UART: [idev] CDI.KEYID = 6
1,174,068 UART: [idev] SUBJECT.KEYID = 7
1,174,493 UART: [idev] UDS.KEYID = 0
1,174,839 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,512 UART: [idev] Erasing UDS.KEYID = 0
1,200,060 UART: [idev] Sha1 KeyId Algorithm
1,209,078 UART: [idev] --
1,210,121 UART: [ldev] ++
1,210,289 UART: [ldev] CDI.KEYID = 6
1,210,653 UART: [ldev] SUBJECT.KEYID = 5
1,211,080 UART: [ldev] AUTHORITY.KEYID = 7
1,211,543 UART: [ldev] FE.KEYID = 1
1,216,625 UART: [ldev] Erasing FE.KEYID = 1
1,243,444 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,180 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,896 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,785 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,497 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,357 UART: [ldev] --
1,282,696 UART: [fwproc] Wait for Commands...
1,283,347 UART: [fwproc] Recv command 0x46574c44
1,284,080 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,503 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,678 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,881 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,826 >>> mbox cmd response: failed
1,182,826 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,832 >>> mbox cmd response: failed
1,182,832 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,838 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,912 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,545 >>> mbox cmd response: failed
1,182,545 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,551 >>> mbox cmd response: failed
1,182,551 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,182,557 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,520 UART: [state] LifecycleState = Unprovisioned
86,175 UART: [state] DebugLocked = No
86,799 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
893,618 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,743 UART: [kat] ++
897,895 UART: [kat] sha1
902,129 UART: [kat] SHA2-256
904,069 UART: [kat] SHA2-384
906,608 UART: [kat] SHA2-512-ACC
908,509 UART: [kat] ECC-384
918,268 UART: [kat] HMAC-384Kdf
923,012 UART: [kat] LMS
1,171,340 UART: [kat] --
1,172,381 UART: [cold-reset] ++
1,172,823 UART: [fht] FHT @ 0x50003400
1,175,506 UART: [idev] ++
1,175,674 UART: [idev] CDI.KEYID = 6
1,176,034 UART: [idev] SUBJECT.KEYID = 7
1,176,458 UART: [idev] UDS.KEYID = 0
1,176,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,476 UART: [idev] Erasing UDS.KEYID = 0
1,202,331 UART: [idev] Sha1 KeyId Algorithm
1,210,845 UART: [idev] --
1,211,883 UART: [ldev] ++
1,212,051 UART: [ldev] CDI.KEYID = 6
1,212,414 UART: [ldev] SUBJECT.KEYID = 5
1,212,840 UART: [ldev] AUTHORITY.KEYID = 7
1,213,303 UART: [ldev] FE.KEYID = 1
1,218,377 UART: [ldev] Erasing FE.KEYID = 1
1,244,360 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,799 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,406 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,233 UART: [ldev] --
1,283,730 UART: [fwproc] Wait for Commands...
1,284,518 UART: [fwproc] Recv command 0x46574c44
1,285,246 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,296 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,599 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,769 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,118 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,289 >>> mbox cmd response: failed
1,183,289 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,295 >>> mbox cmd response: failed
1,183,295 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,301 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,795 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,430 >>> mbox cmd response: failed
1,183,430 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,436 >>> mbox cmd response: failed
1,183,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,442 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,735 UART: [state] LifecycleState = Unprovisioned
86,390 UART: [state] DebugLocked = No
86,878 UART: [state] WD Timer not started. Device not locked for debugging
88,101 UART: [kat] SHA2-256
893,751 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,876 UART: [kat] ++
898,028 UART: [kat] sha1
902,332 UART: [kat] SHA2-256
904,272 UART: [kat] SHA2-384
906,833 UART: [kat] SHA2-512-ACC
908,734 UART: [kat] ECC-384
918,481 UART: [kat] HMAC-384Kdf
923,009 UART: [kat] LMS
1,171,337 UART: [kat] --
1,172,208 UART: [cold-reset] ++
1,172,732 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,645 UART: [idev] Erasing UDS.KEYID = 0
1,201,586 UART: [idev] Sha1 KeyId Algorithm
1,210,236 UART: [idev] --
1,211,180 UART: [ldev] ++
1,211,348 UART: [ldev] CDI.KEYID = 6
1,211,711 UART: [ldev] SUBJECT.KEYID = 5
1,212,137 UART: [ldev] AUTHORITY.KEYID = 7
1,212,600 UART: [ldev] FE.KEYID = 1
1,218,312 UART: [ldev] Erasing FE.KEYID = 1
1,244,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,572 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,288 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,179 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,891 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,956 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,211 UART: [fwproc] Recv command 0x46574c44
1,284,939 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,147 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,648 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,818 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,938 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,548 >>> mbox cmd response: failed
1,183,548 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,554 >>> mbox cmd response: failed
1,183,554 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,560 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,700 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,074 UART:
192,435 UART: Running Caliptra ROM ...
193,524 UART:
193,669 UART: [state] CFI Enabled
267,203 UART: [state] LifecycleState = Manufacturing
269,131 UART: [state] DebugLocked = No
270,513 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,697 UART: [kat] SHA2-256
445,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,919 UART: [kat] ++
456,366 UART: [kat] sha1
467,295 UART: [kat] SHA2-256
469,945 UART: [kat] SHA2-384
475,273 UART: [kat] SHA2-512-ACC
477,669 UART: [kat] ECC-384
2,770,180 UART: [kat] HMAC-384Kdf
2,801,157 UART: [kat] LMS
3,991,471 UART: [kat] --
3,997,090 UART: [cold-reset] ++
3,999,573 UART: [fht] Storing FHT @ 0x50003400
4,011,057 UART: [idev] ++
4,011,638 UART: [idev] CDI.KEYID = 6
4,012,606 UART: [idev] SUBJECT.KEYID = 7
4,013,820 UART: [idev] UDS.KEYID = 0
4,019,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,169,277 UART: [idev] Erasing UDS.KEYID = 0
7,349,456 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,360 UART: [idev] --
7,375,412 UART: [ldev] ++
7,375,986 UART: [ldev] CDI.KEYID = 6
7,377,006 UART: [ldev] SUBJECT.KEYID = 5
7,378,174 UART: [ldev] AUTHORITY.KEYID = 7
7,379,404 UART: [ldev] FE.KEYID = 1
7,424,631 UART: [ldev] Erasing FE.KEYID = 1
10,754,161 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,050,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,829 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,686 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,094,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,857 UART: [ldev] --
13,118,967 UART: [fwproc] Waiting for Commands...
13,121,180 UART: [fwproc] Received command 0x46574c44
13,123,424 UART: [fwproc] Received Image of size 118548 bytes
13,182,632 UART: ROM Fatal Error: 0x000B0003
13,186,155 >>> mbox cmd response: failed
13,186,588 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,186,918 >>> mbox cmd response: failed
13,187,186 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,187,481 >>> mbox cmd response: failed
Initializing fuses
2,058,502 writing to cptra_bootfsm_go
2,247,833 UART:
2,248,185 UART: Running Caliptra ROM ...
2,249,320 UART:
2,249,487 UART: [state] CFI Enabled
2,312,255 UART: [state] LifecycleState = Manufacturing
2,314,191 UART: [state] DebugLocked = No
2,316,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,320,363 UART: [kat] SHA2-256
2,490,049 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,500,552 UART: [kat] ++
2,501,034 UART: [kat] sha1
2,512,084 UART: [kat] SHA2-256
2,514,786 UART: [kat] SHA2-384
2,520,184 UART: [kat] SHA2-512-ACC
2,522,542 UART: [kat] ECC-384
4,814,350 UART: [kat] HMAC-384Kdf
4,845,703 UART: [kat] LMS
6,035,999 UART: [kat] --
6,040,072 UART: [cold-reset] ++
6,042,390 UART: [fht] Storing FHT @ 0x50003400
6,053,286 UART: [idev] ++
6,053,853 UART: [idev] CDI.KEYID = 6
6,054,791 UART: [idev] SUBJECT.KEYID = 7
6,056,061 UART: [idev] UDS.KEYID = 0
6,058,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,388 UART: [idev] Erasing UDS.KEYID = 0
9,391,641 UART: [idev] Using Sha1 for KeyId Algorithm
9,413,363 UART: [idev] --
9,418,490 UART: [ldev] ++
9,419,109 UART: [ldev] CDI.KEYID = 6
9,420,026 UART: [ldev] SUBJECT.KEYID = 5
9,421,252 UART: [ldev] AUTHORITY.KEYID = 7
9,422,491 UART: [ldev] FE.KEYID = 1
9,468,477 UART: [ldev] Erasing FE.KEYID = 1
12,803,595 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,116,337 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,130,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,145,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,160,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,179,417 UART: [ldev] --
15,183,262 UART: [fwproc] Waiting for Commands...
15,184,890 UART: [fwproc] Received command 0x46574c44
15,187,138 UART: [fwproc] Received Image of size 118548 bytes
19,324,089 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,403,465 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,476,646 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,805,364 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.76s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
3,802,840 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,933,706 >>> mbox cmd response: failed
12,934,499 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,934,856 >>> mbox cmd response: failed
12,935,128 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,935,424 >>> mbox cmd response: failed
Initializing fuses
2,058,348 writing to cptra_bootfsm_go
5,838,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,054,554 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
192,482 UART:
192,852 UART: Running Caliptra ROM ...
193,992 UART:
603,872 UART: [state] CFI Enabled
617,539 UART: [state] LifecycleState = Manufacturing
619,476 UART: [state] DebugLocked = No
621,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,453 UART: [kat] SHA2-256
795,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,698 UART: [kat] ++
806,178 UART: [kat] sha1
818,678 UART: [kat] SHA2-256
821,377 UART: [kat] SHA2-384
827,481 UART: [kat] SHA2-512-ACC
829,809 UART: [kat] ECC-384
3,113,157 UART: [kat] HMAC-384Kdf
3,126,212 UART: [kat] LMS
4,316,283 UART: [kat] --
4,320,690 UART: [cold-reset] ++
4,321,736 UART: [fht] Storing FHT @ 0x50003400
4,333,766 UART: [idev] ++
4,334,339 UART: [idev] CDI.KEYID = 6
4,335,286 UART: [idev] SUBJECT.KEYID = 7
4,336,561 UART: [idev] UDS.KEYID = 0
4,342,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,716 UART: [idev] Erasing UDS.KEYID = 0
7,623,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,855 UART: [idev] --
7,650,774 UART: [ldev] ++
7,651,354 UART: [ldev] CDI.KEYID = 6
7,652,295 UART: [ldev] SUBJECT.KEYID = 5
7,653,514 UART: [ldev] AUTHORITY.KEYID = 7
7,654,817 UART: [ldev] FE.KEYID = 1
7,666,795 UART: [ldev] Erasing FE.KEYID = 1
10,955,844 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,672 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,257 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,277,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,608 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,944 UART: [ldev] --
13,315,553 UART: [fwproc] Waiting for Commands...
13,318,532 UART: [fwproc] Received command 0x46574c44
13,320,725 UART: [fwproc] Received Image of size 118548 bytes
13,379,047 UART: ROM Fatal Error: 0x000B0003
13,382,540 >>> mbox cmd response: failed
13,383,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,383,475 >>> mbox cmd response: failed
13,383,748 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,384,048 >>> mbox cmd response: failed
Initializing fuses
2,059,782 writing to cptra_bootfsm_go
2,249,132 UART:
2,249,472 UART: Running Caliptra ROM ...
2,250,619 UART:
7,086,218 UART: [state] CFI Enabled
7,101,569 UART: [state] LifecycleState = Manufacturing
7,103,487 UART: [state] DebugLocked = No
7,104,777 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,109,630 UART: [kat] SHA2-256
7,279,409 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,289,938 UART: [kat] ++
7,290,436 UART: [kat] sha1
7,302,144 UART: [kat] SHA2-256
7,304,858 UART: [kat] SHA2-384
7,311,562 UART: [kat] SHA2-512-ACC
7,313,915 UART: [kat] ECC-384
9,598,082 UART: [kat] HMAC-384Kdf
9,609,965 UART: [kat] LMS
10,800,097 UART: [kat] --
10,804,490 UART: [cold-reset] ++
10,805,940 UART: [fht] Storing FHT @ 0x50003400
10,817,862 UART: [idev] ++
10,818,436 UART: [idev] CDI.KEYID = 6
10,819,379 UART: [idev] SUBJECT.KEYID = 7
10,820,596 UART: [idev] UDS.KEYID = 0
10,823,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,972,688 UART: [idev] Erasing UDS.KEYID = 0
14,108,769 UART: [idev] Using Sha1 for KeyId Algorithm
14,130,265 UART: [idev] --
14,133,991 UART: [ldev] ++
14,134,566 UART: [ldev] CDI.KEYID = 6
14,135,585 UART: [ldev] SUBJECT.KEYID = 5
14,136,776 UART: [ldev] AUTHORITY.KEYID = 7
14,138,014 UART: [ldev] FE.KEYID = 1
14,148,183 UART: [ldev] Erasing FE.KEYID = 1
17,440,433 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,734,161 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,748,752 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,763,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,778,058 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,797,848 UART: [ldev] --
19,802,342 UART: [fwproc] Waiting for Commands...
19,804,667 UART: [fwproc] Received command 0x46574c44
19,806,861 UART: [fwproc] Received Image of size 118548 bytes
23,943,744 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,020,339 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,093,529 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,422,657 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,381 writing to cptra_bootfsm_go
4,131,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,117,023 >>> mbox cmd response: failed
13,117,650 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,117,983 >>> mbox cmd response: failed
13,118,268 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,118,565 >>> mbox cmd response: failed
Initializing fuses
2,058,501 writing to cptra_bootfsm_go
10,881,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,954,502 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,029 writing to cptra_bootfsm_go
192,180 UART:
192,550 UART: Running Caliptra ROM ...
193,875 UART:
194,036 UART: [state] CFI Enabled
263,524 UART: [state] LifecycleState = Manufacturing
265,541 UART: [state] DebugLocked = No
267,874 UART: [state] WD Timer not started. Device not locked for debugging
271,326 UART: [kat] SHA2-256
450,977 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,756 UART: [kat] ++
462,206 UART: [kat] sha1
472,465 UART: [kat] SHA2-256
475,157 UART: [kat] SHA2-384
480,547 UART: [kat] SHA2-512-ACC
482,896 UART: [kat] ECC-384
2,924,131 UART: [kat] HMAC-384Kdf
2,949,674 UART: [kat] LMS
3,426,175 UART: [kat] --
3,431,110 UART: [cold-reset] ++
3,432,251 UART: [fht] FHT @ 0x50003400
3,443,940 UART: [idev] ++
3,444,513 UART: [idev] CDI.KEYID = 6
3,445,536 UART: [idev] SUBJECT.KEYID = 7
3,446,702 UART: [idev] UDS.KEYID = 0
3,449,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,598,980 UART: [idev] Erasing UDS.KEYID = 0
5,968,238 UART: [idev] Sha1 KeyId Algorithm
5,992,729 UART: [idev] --
5,998,569 UART: [ldev] ++
5,999,146 UART: [ldev] CDI.KEYID = 6
6,000,062 UART: [ldev] SUBJECT.KEYID = 5
6,001,290 UART: [ldev] AUTHORITY.KEYID = 7
6,002,532 UART: [ldev] FE.KEYID = 1
6,037,771 UART: [ldev] Erasing FE.KEYID = 1
8,542,004 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,280,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,158 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,011 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,564 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,952 UART: [ldev] --
10,353,589 UART: [fwproc] Wait for Commands...
10,356,342 UART: [fwproc] Recv command 0x46574c44
10,358,388 UART: [fwproc] Recv'd Img size: 118548 bytes
10,434,431 UART: ROM Fatal Error: 0x000B0003
10,437,675 >>> mbox cmd response: failed
10,438,092 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,438,439 >>> mbox cmd response: failed
10,438,714 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,439,009 >>> mbox cmd response: failed
Initializing fuses
2,054,845 writing to cptra_bootfsm_go
2,244,220 UART:
2,244,589 UART: Running Caliptra ROM ...
2,245,653 UART:
2,245,811 UART: [state] CFI Enabled
2,302,338 UART: [state] LifecycleState = Manufacturing
2,304,280 UART: [state] DebugLocked = No
2,305,482 UART: [state] WD Timer not started. Device not locked for debugging
2,310,147 UART: [kat] SHA2-256
2,489,760 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,500,588 UART: [kat] ++
2,501,051 UART: [kat] sha1
2,511,529 UART: [kat] SHA2-256
2,514,227 UART: [kat] SHA2-384
2,520,653 UART: [kat] SHA2-512-ACC
2,523,006 UART: [kat] ECC-384
4,968,378 UART: [kat] HMAC-384Kdf
4,990,097 UART: [kat] LMS
5,466,603 UART: [kat] --
5,470,332 UART: [cold-reset] ++
5,472,107 UART: [fht] FHT @ 0x50003400
5,482,929 UART: [idev] ++
5,483,494 UART: [idev] CDI.KEYID = 6
5,484,461 UART: [idev] SUBJECT.KEYID = 7
5,485,674 UART: [idev] UDS.KEYID = 0
5,488,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,638,752 UART: [idev] Erasing UDS.KEYID = 0
8,005,403 UART: [idev] Sha1 KeyId Algorithm
8,029,636 UART: [idev] --
8,035,905 UART: [ldev] ++
8,036,484 UART: [ldev] CDI.KEYID = 6
8,037,415 UART: [ldev] SUBJECT.KEYID = 5
8,038,582 UART: [ldev] AUTHORITY.KEYID = 7
8,039,876 UART: [ldev] FE.KEYID = 1
8,081,913 UART: [ldev] Erasing FE.KEYID = 1
10,589,682 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,324,139 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,339,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,355,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,371,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,392,351 UART: [ldev] --
12,397,479 UART: [fwproc] Wait for Commands...
12,400,011 UART: [fwproc] Recv command 0x46574c44
12,402,008 UART: [fwproc] Recv'd Img size: 118548 bytes
15,915,535 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,994,489 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,067,511 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,396,042 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
3,464,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,368,275 >>> mbox cmd response: failed
10,368,855 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,203 >>> mbox cmd response: failed
10,369,481 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,369,773 >>> mbox cmd response: failed
Initializing fuses
2,055,673 writing to cptra_bootfsm_go
5,505,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,327,457 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
192,549 UART:
192,927 UART: Running Caliptra ROM ...
194,102 UART:
603,803 UART: [state] CFI Enabled
620,813 UART: [state] LifecycleState = Manufacturing
622,779 UART: [state] DebugLocked = No
625,645 UART: [state] WD Timer not started. Device not locked for debugging
629,701 UART: [kat] SHA2-256
809,349 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
820,142 UART: [kat] ++
820,792 UART: [kat] sha1
831,756 UART: [kat] SHA2-256
834,479 UART: [kat] SHA2-384
841,120 UART: [kat] SHA2-512-ACC
843,475 UART: [kat] ECC-384
3,284,590 UART: [kat] HMAC-384Kdf
3,296,082 UART: [kat] LMS
3,772,567 UART: [kat] --
3,777,374 UART: [cold-reset] ++
3,778,826 UART: [fht] FHT @ 0x50003400
3,790,292 UART: [idev] ++
3,790,926 UART: [idev] CDI.KEYID = 6
3,791,863 UART: [idev] SUBJECT.KEYID = 7
3,793,092 UART: [idev] UDS.KEYID = 0
3,796,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,117 UART: [idev] Erasing UDS.KEYID = 0
6,273,982 UART: [idev] Sha1 KeyId Algorithm
6,296,939 UART: [idev] --
6,302,008 UART: [ldev] ++
6,302,583 UART: [ldev] CDI.KEYID = 6
6,303,473 UART: [ldev] SUBJECT.KEYID = 5
6,304,743 UART: [ldev] AUTHORITY.KEYID = 7
6,305,980 UART: [ldev] FE.KEYID = 1
6,317,445 UART: [ldev] Erasing FE.KEYID = 1
8,796,882 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,584 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,549,295 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,941 UART: [ldev] --
10,593,246 UART: [fwproc] Wait for Commands...
10,596,555 UART: [fwproc] Recv command 0x46574c44
10,598,554 UART: [fwproc] Recv'd Img size: 118548 bytes
10,672,950 UART: ROM Fatal Error: 0x000B0003
10,676,201 >>> mbox cmd response: failed
10,676,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,676,955 >>> mbox cmd response: failed
10,677,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,677,521 >>> mbox cmd response: failed
Initializing fuses
2,054,602 writing to cptra_bootfsm_go
2,243,903 UART:
2,244,269 UART: Running Caliptra ROM ...
2,245,417 UART:
9,792,721 UART: [state] CFI Enabled
9,806,736 UART: [state] LifecycleState = Manufacturing
9,808,652 UART: [state] DebugLocked = No
9,811,562 UART: [state] WD Timer not started. Device not locked for debugging
9,815,867 UART: [kat] SHA2-256
9,995,528 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,006,341 UART: [kat] ++
10,006,840 UART: [kat] sha1
10,017,414 UART: [kat] SHA2-256
10,020,117 UART: [kat] SHA2-384
10,026,930 UART: [kat] SHA2-512-ACC
10,029,285 UART: [kat] ECC-384
12,469,053 UART: [kat] HMAC-384Kdf
12,481,712 UART: [kat] LMS
12,958,213 UART: [kat] --
12,962,532 UART: [cold-reset] ++
12,963,981 UART: [fht] FHT @ 0x50003400
12,974,639 UART: [idev] ++
12,975,206 UART: [idev] CDI.KEYID = 6
12,976,142 UART: [idev] SUBJECT.KEYID = 7
12,977,411 UART: [idev] UDS.KEYID = 0
12,980,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,129,288 UART: [idev] Erasing UDS.KEYID = 0
15,454,420 UART: [idev] Sha1 KeyId Algorithm
15,478,087 UART: [idev] --
15,484,301 UART: [ldev] ++
15,484,875 UART: [ldev] CDI.KEYID = 6
15,485,760 UART: [ldev] SUBJECT.KEYID = 5
15,486,978 UART: [ldev] AUTHORITY.KEYID = 7
15,488,194 UART: [ldev] FE.KEYID = 1
15,498,402 UART: [ldev] Erasing FE.KEYID = 1
17,976,915 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,695,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,658 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,743,246 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,765,668 UART: [ldev] --
19,771,652 UART: [fwproc] Wait for Commands...
19,773,221 UART: [fwproc] Recv command 0x46574c44
19,775,214 UART: [fwproc] Recv'd Img size: 118548 bytes
23,290,279 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,369,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,442,740 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,771,489 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
3,783,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,552,057 >>> mbox cmd response: failed
10,552,844 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,221 >>> mbox cmd response: failed
10,553,495 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,847 >>> mbox cmd response: failed
Initializing fuses
2,056,006 writing to cptra_bootfsm_go
13,088,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,777,545 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
192,260 UART:
192,609 UART: Running Caliptra ROM ...
193,788 UART:
193,947 UART: [state] CFI Enabled
262,269 UART: [state] LifecycleState = Manufacturing
264,700 UART: [state] DebugLocked = No
266,462 UART: [state] WD Timer not started. Device not locked for debugging
271,361 UART: [kat] SHA2-256
461,227 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,032 UART: [kat] ++
472,582 UART: [kat] sha1
483,953 UART: [kat] SHA2-256
486,967 UART: [kat] SHA2-384
491,817 UART: [kat] SHA2-512-ACC
494,405 UART: [kat] ECC-384
2,949,275 UART: [kat] HMAC-384Kdf
2,972,349 UART: [kat] LMS
3,504,137 UART: [kat] --
3,508,256 UART: [cold-reset] ++
3,510,789 UART: [fht] FHT @ 0x50003400
3,522,951 UART: [idev] ++
3,523,645 UART: [idev] CDI.KEYID = 6
3,524,532 UART: [idev] SUBJECT.KEYID = 7
3,525,750 UART: [idev] UDS.KEYID = 0
3,531,733 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,681,081 UART: [idev] Erasing UDS.KEYID = 0
6,051,790 UART: [idev] Sha1 KeyId Algorithm
6,073,787 UART: [idev] --
6,080,083 UART: [ldev] ++
6,080,805 UART: [ldev] CDI.KEYID = 6
6,081,781 UART: [ldev] SUBJECT.KEYID = 5
6,082,890 UART: [ldev] AUTHORITY.KEYID = 7
6,084,071 UART: [ldev] FE.KEYID = 1
6,121,522 UART: [ldev] Erasing FE.KEYID = 1
8,630,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,364,092 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,379,300 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,394,535 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,409,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,430,091 UART: [ldev] --
10,435,633 UART: [fwproc] Wait for Commands...
10,437,145 UART: [fwproc] Recv command 0x46574c44
10,439,463 UART: [fwproc] Recv'd Img size: 118548 bytes
10,531,489 UART: ROM Fatal Error: 0x000B0003
10,535,176 >>> mbox cmd response: failed
10,535,626 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,535,966 >>> mbox cmd response: failed
10,536,235 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,536,482 >>> mbox cmd response: failed
Initializing fuses
2,056,601 writing to cptra_bootfsm_go
2,245,920 UART:
2,246,267 UART: Running Caliptra ROM ...
2,247,408 UART:
2,247,601 UART: [state] CFI Enabled
2,314,867 UART: [state] LifecycleState = Manufacturing
2,317,242 UART: [state] DebugLocked = No
2,319,554 UART: [state] WD Timer not started. Device not locked for debugging
2,324,724 UART: [kat] SHA2-256
2,514,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,525,370 UART: [kat] ++
2,525,833 UART: [kat] sha1
2,538,236 UART: [kat] SHA2-256
2,541,263 UART: [kat] SHA2-384
2,546,722 UART: [kat] SHA2-512-ACC
2,549,295 UART: [kat] ECC-384
4,997,441 UART: [kat] HMAC-384Kdf
5,022,209 UART: [kat] LMS
5,553,966 UART: [kat] --
5,559,222 UART: [cold-reset] ++
5,561,561 UART: [fht] FHT @ 0x50003400
5,572,551 UART: [idev] ++
5,573,231 UART: [idev] CDI.KEYID = 6
5,574,170 UART: [idev] SUBJECT.KEYID = 7
5,575,383 UART: [idev] UDS.KEYID = 0
5,578,114 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,727,334 UART: [idev] Erasing UDS.KEYID = 0
8,080,311 UART: [idev] Sha1 KeyId Algorithm
8,103,378 UART: [idev] --
8,108,435 UART: [ldev] ++
8,109,138 UART: [ldev] CDI.KEYID = 6
8,110,026 UART: [ldev] SUBJECT.KEYID = 5
8,111,138 UART: [ldev] AUTHORITY.KEYID = 7
8,112,424 UART: [ldev] FE.KEYID = 1
8,150,611 UART: [ldev] Erasing FE.KEYID = 1
10,657,364 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,391,215 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,406,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,421,612 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,436,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,455,923 UART: [ldev] --
12,462,006 UART: [fwproc] Wait for Commands...
12,464,812 UART: [fwproc] Recv command 0x46574c44
12,467,077 UART: [fwproc] Recv'd Img size: 118548 bytes
16,002,073 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,080,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,203,699 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,763,478 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,442,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,311,284 >>> mbox cmd response: failed
10,312,096 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,312,471 >>> mbox cmd response: failed
10,312,750 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,313,050 >>> mbox cmd response: failed
Initializing fuses
2,055,463 writing to cptra_bootfsm_go
5,479,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,913,055 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,494 UART:
192,864 UART: Running Caliptra ROM ...
194,171 UART:
603,654 UART: [state] CFI Enabled
619,656 UART: [state] LifecycleState = Manufacturing
622,049 UART: [state] DebugLocked = No
623,818 UART: [state] WD Timer not started. Device not locked for debugging
628,997 UART: [kat] SHA2-256
818,887 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,644 UART: [kat] ++
830,237 UART: [kat] sha1
843,069 UART: [kat] SHA2-256
846,089 UART: [kat] SHA2-384
851,918 UART: [kat] SHA2-512-ACC
854,540 UART: [kat] ECC-384
3,300,567 UART: [kat] HMAC-384Kdf
3,312,583 UART: [kat] LMS
3,844,433 UART: [kat] --
3,849,636 UART: [cold-reset] ++
3,851,794 UART: [fht] FHT @ 0x50003400
3,863,944 UART: [idev] ++
3,864,673 UART: [idev] CDI.KEYID = 6
3,865,601 UART: [idev] SUBJECT.KEYID = 7
3,866,826 UART: [idev] UDS.KEYID = 0
3,872,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,021,897 UART: [idev] Erasing UDS.KEYID = 0
6,343,521 UART: [idev] Sha1 KeyId Algorithm
6,365,536 UART: [idev] --
6,371,045 UART: [ldev] ++
6,371,729 UART: [ldev] CDI.KEYID = 6
6,372,695 UART: [ldev] SUBJECT.KEYID = 5
6,373,854 UART: [ldev] AUTHORITY.KEYID = 7
6,375,089 UART: [ldev] FE.KEYID = 1
6,386,875 UART: [ldev] Erasing FE.KEYID = 1
8,864,409 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,600,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,615,190 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,630,333 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,651,661 UART: [ldev] --
10,656,717 UART: [fwproc] Wait for Commands...
10,658,233 UART: [fwproc] Recv command 0x46574c44
10,660,719 UART: [fwproc] Recv'd Img size: 118548 bytes
10,748,379 UART: ROM Fatal Error: 0x000B0003
10,752,060 >>> mbox cmd response: failed
10,752,474 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,752,760 >>> mbox cmd response: failed
10,753,036 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,753,336 >>> mbox cmd response: failed
Initializing fuses
2,055,702 writing to cptra_bootfsm_go
2,245,051 UART:
2,245,402 UART: Running Caliptra ROM ...
2,246,544 UART:
9,717,582 UART: [state] CFI Enabled
9,730,101 UART: [state] LifecycleState = Manufacturing
9,732,518 UART: [state] DebugLocked = No
9,735,177 UART: [state] WD Timer not started. Device not locked for debugging
9,740,402 UART: [kat] SHA2-256
9,930,310 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,941,085 UART: [kat] ++
9,941,610 UART: [kat] sha1
9,952,932 UART: [kat] SHA2-256
9,955,964 UART: [kat] SHA2-384
9,962,341 UART: [kat] SHA2-512-ACC
9,964,918 UART: [kat] ECC-384
12,408,873 UART: [kat] HMAC-384Kdf
12,423,437 UART: [kat] LMS
12,955,252 UART: [kat] --
12,957,895 UART: [cold-reset] ++
12,959,723 UART: [fht] FHT @ 0x50003400
12,970,873 UART: [idev] ++
12,971,557 UART: [idev] CDI.KEYID = 6
12,972,496 UART: [idev] SUBJECT.KEYID = 7
12,973,711 UART: [idev] UDS.KEYID = 0
12,976,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,125,603 UART: [idev] Erasing UDS.KEYID = 0
15,450,020 UART: [idev] Sha1 KeyId Algorithm
15,473,208 UART: [idev] --
15,478,011 UART: [ldev] ++
15,478,697 UART: [ldev] CDI.KEYID = 6
15,479,582 UART: [ldev] SUBJECT.KEYID = 5
15,480,796 UART: [ldev] AUTHORITY.KEYID = 7
15,482,031 UART: [ldev] FE.KEYID = 1
15,493,409 UART: [ldev] Erasing FE.KEYID = 1
17,975,015 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,696,612 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,711,861 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,763,723 UART: [ldev] --
19,768,564 UART: [fwproc] Wait for Commands...
19,771,281 UART: [fwproc] Recv command 0x46574c44
19,773,549 UART: [fwproc] Recv'd Img size: 118548 bytes
23,299,679 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,377,076 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,500,712 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,060,755 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
3,761,698 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,522,885 >>> mbox cmd response: failed
10,523,500 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,523,858 >>> mbox cmd response: failed
10,524,133 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,524,432 >>> mbox cmd response: failed
Initializing fuses
2,056,393 writing to cptra_bootfsm_go
13,088,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,422,975 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,784 UART: [state] LifecycleState = Manufacturing
85,439 UART: [state] DebugLocked = No
85,939 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,617 UART: [kat] SHA2-256
881,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,663 UART: [kat] ++
885,815 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,994 UART: [kat] SHA2-512-ACC
896,895 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,234 UART: [kat] LMS
1,475,430 UART: [kat] --
1,476,503 UART: [cold-reset] ++
1,476,893 UART: [fht] Storing FHT @ 0x50003400
1,479,618 UART: [idev] ++
1,479,786 UART: [idev] CDI.KEYID = 6
1,480,146 UART: [idev] SUBJECT.KEYID = 7
1,480,570 UART: [idev] UDS.KEYID = 0
1,480,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,024 UART: [idev] Erasing UDS.KEYID = 0
1,505,210 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,818 UART: [idev] --
1,514,797 UART: [ldev] ++
1,514,965 UART: [ldev] CDI.KEYID = 6
1,515,328 UART: [ldev] SUBJECT.KEYID = 5
1,515,754 UART: [ldev] AUTHORITY.KEYID = 7
1,516,217 UART: [ldev] FE.KEYID = 1
1,521,775 UART: [ldev] Erasing FE.KEYID = 1
1,547,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,696 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,408 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,312 UART: [ldev] --
1,586,715 UART: [fwproc] Waiting for Commands...
1,587,500 UART: [fwproc] Received command 0x46574c44
1,588,291 UART: [fwproc] Received Image of size 118548 bytes
1,608,993 UART: ROM Fatal Error: 0x000B0003
1,610,150 >>> mbox cmd response: failed
1,610,150 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,156 >>> mbox cmd response: failed
1,610,156 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,162 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,584 UART: [state] LifecycleState = Unprovisioned
86,239 UART: [state] DebugLocked = No
86,821 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,387 UART: [kat] SHA2-256
882,318 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,433 UART: [kat] ++
886,585 UART: [kat] sha1
890,879 UART: [kat] SHA2-256
892,817 UART: [kat] SHA2-384
895,748 UART: [kat] SHA2-512-ACC
897,649 UART: [kat] ECC-384
902,972 UART: [kat] HMAC-384Kdf
907,656 UART: [kat] LMS
1,475,852 UART: [kat] --
1,476,769 UART: [cold-reset] ++
1,477,239 UART: [fht] Storing FHT @ 0x50003400
1,480,008 UART: [idev] ++
1,480,176 UART: [idev] CDI.KEYID = 6
1,480,536 UART: [idev] SUBJECT.KEYID = 7
1,480,960 UART: [idev] UDS.KEYID = 0
1,481,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,120 UART: [idev] Erasing UDS.KEYID = 0
1,505,764 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,362 UART: [idev] --
1,515,325 UART: [ldev] ++
1,515,493 UART: [ldev] CDI.KEYID = 6
1,515,856 UART: [ldev] SUBJECT.KEYID = 5
1,516,282 UART: [ldev] AUTHORITY.KEYID = 7
1,516,745 UART: [ldev] FE.KEYID = 1
1,522,055 UART: [ldev] Erasing FE.KEYID = 1
1,547,782 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,528 UART: [ldev] --
1,586,861 UART: [fwproc] Waiting for Commands...
1,587,526 UART: [fwproc] Received command 0x46574c44
1,588,317 UART: [fwproc] Received Image of size 118548 bytes
2,931,852 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,906 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,124 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,131,425 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,460,463 >>> mbox cmd response: failed
1,460,463 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,469 >>> mbox cmd response: failed
1,460,469 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,460,475 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,889 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,165 UART: [state] LifecycleState = Manufacturing
85,820 UART: [state] DebugLocked = No
86,524 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,042 UART: [kat] SHA2-256
881,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,088 UART: [kat] ++
886,240 UART: [kat] sha1
890,424 UART: [kat] SHA2-256
892,362 UART: [kat] SHA2-384
894,899 UART: [kat] SHA2-512-ACC
896,800 UART: [kat] ECC-384
902,573 UART: [kat] HMAC-384Kdf
907,261 UART: [kat] LMS
1,475,457 UART: [kat] --
1,476,168 UART: [cold-reset] ++
1,476,718 UART: [fht] Storing FHT @ 0x50003400
1,479,451 UART: [idev] ++
1,479,619 UART: [idev] CDI.KEYID = 6
1,479,979 UART: [idev] SUBJECT.KEYID = 7
1,480,403 UART: [idev] UDS.KEYID = 0
1,480,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,721 UART: [idev] Erasing UDS.KEYID = 0
1,505,517 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,175 UART: [idev] --
1,515,418 UART: [ldev] ++
1,515,586 UART: [ldev] CDI.KEYID = 6
1,515,949 UART: [ldev] SUBJECT.KEYID = 5
1,516,375 UART: [ldev] AUTHORITY.KEYID = 7
1,516,838 UART: [ldev] FE.KEYID = 1
1,521,796 UART: [ldev] Erasing FE.KEYID = 1
1,547,669 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,370 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,689 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,713 UART: [ldev] --
1,587,092 UART: [fwproc] Waiting for Commands...
1,587,809 UART: [fwproc] Received command 0x46574c44
1,588,600 UART: [fwproc] Received Image of size 118548 bytes
1,609,018 UART: ROM Fatal Error: 0x000B0003
1,610,175 >>> mbox cmd response: failed
1,610,175 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,181 >>> mbox cmd response: failed
1,610,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,610,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,509 UART: [state] LifecycleState = Unprovisioned
86,164 UART: [state] DebugLocked = No
86,758 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,400 UART: [kat] SHA2-256
882,331 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,446 UART: [kat] ++
886,598 UART: [kat] sha1
890,870 UART: [kat] SHA2-256
892,808 UART: [kat] SHA2-384
895,677 UART: [kat] SHA2-512-ACC
897,578 UART: [kat] ECC-384
903,131 UART: [kat] HMAC-384Kdf
907,841 UART: [kat] LMS
1,476,037 UART: [kat] --
1,476,800 UART: [cold-reset] ++
1,477,312 UART: [fht] Storing FHT @ 0x50003400
1,480,049 UART: [idev] ++
1,480,217 UART: [idev] CDI.KEYID = 6
1,480,577 UART: [idev] SUBJECT.KEYID = 7
1,481,001 UART: [idev] UDS.KEYID = 0
1,481,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,775 UART: [idev] Erasing UDS.KEYID = 0
1,505,619 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,141 UART: [idev] --
1,515,234 UART: [ldev] ++
1,515,402 UART: [ldev] CDI.KEYID = 6
1,515,765 UART: [ldev] SUBJECT.KEYID = 5
1,516,191 UART: [ldev] AUTHORITY.KEYID = 7
1,516,654 UART: [ldev] FE.KEYID = 1
1,522,100 UART: [ldev] Erasing FE.KEYID = 1
1,548,249 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,674 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,565 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,277 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,393 UART: [ldev] --
1,587,674 UART: [fwproc] Waiting for Commands...
1,588,329 UART: [fwproc] Received command 0x46574c44
1,589,120 UART: [fwproc] Received Image of size 118548 bytes
2,933,813 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,483 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,701 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,018 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,462,148 >>> mbox cmd response: failed
1,462,148 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,154 >>> mbox cmd response: failed
1,462,154 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,462,160 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,288 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,370 UART: [state] LifecycleState = Manufacturing
86,025 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,874 UART: [kat] SHA2-256
891,424 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,528 UART: [kat] ++
895,680 UART: [kat] sha1
900,002 UART: [kat] SHA2-256
901,942 UART: [kat] SHA2-384
904,557 UART: [kat] SHA2-512-ACC
906,458 UART: [kat] ECC-384
916,219 UART: [kat] HMAC-384Kdf
920,863 UART: [kat] LMS
1,169,175 UART: [kat] --
1,169,750 UART: [cold-reset] ++
1,170,112 UART: [fht] FHT @ 0x50003400
1,172,856 UART: [idev] ++
1,173,024 UART: [idev] CDI.KEYID = 6
1,173,385 UART: [idev] SUBJECT.KEYID = 7
1,173,810 UART: [idev] UDS.KEYID = 0
1,174,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,169 UART: [idev] Erasing UDS.KEYID = 0
1,199,649 UART: [idev] Sha1 KeyId Algorithm
1,208,527 UART: [idev] --
1,209,710 UART: [ldev] ++
1,209,878 UART: [ldev] CDI.KEYID = 6
1,210,242 UART: [ldev] SUBJECT.KEYID = 5
1,210,669 UART: [ldev] AUTHORITY.KEYID = 7
1,211,132 UART: [ldev] FE.KEYID = 1
1,216,350 UART: [ldev] Erasing FE.KEYID = 1
1,243,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,203 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,092 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,804 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,770 UART: [ldev] --
1,281,989 UART: [fwproc] Wait for Commands...
1,282,786 UART: [fwproc] Recv command 0x46574c44
1,283,519 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,177 UART: ROM Fatal Error: 0x000B0003
1,305,334 >>> mbox cmd response: failed
1,305,334 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,340 >>> mbox cmd response: failed
1,305,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,305,346 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,434 UART: [state] LifecycleState = Unprovisioned
86,089 UART: [state] DebugLocked = No
86,749 UART: [state] WD Timer not started. Device not locked for debugging
88,094 UART: [kat] SHA2-256
891,644 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,748 UART: [kat] ++
895,900 UART: [kat] sha1
900,194 UART: [kat] SHA2-256
902,134 UART: [kat] SHA2-384
904,775 UART: [kat] SHA2-512-ACC
906,676 UART: [kat] ECC-384
916,485 UART: [kat] HMAC-384Kdf
920,997 UART: [kat] LMS
1,169,309 UART: [kat] --
1,170,178 UART: [cold-reset] ++
1,170,504 UART: [fht] FHT @ 0x50003400
1,173,026 UART: [idev] ++
1,173,194 UART: [idev] CDI.KEYID = 6
1,173,555 UART: [idev] SUBJECT.KEYID = 7
1,173,980 UART: [idev] UDS.KEYID = 0
1,174,326 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,039 UART: [idev] Erasing UDS.KEYID = 0
1,199,239 UART: [idev] Sha1 KeyId Algorithm
1,207,877 UART: [idev] --
1,208,848 UART: [ldev] ++
1,209,016 UART: [ldev] CDI.KEYID = 6
1,209,380 UART: [ldev] SUBJECT.KEYID = 5
1,209,807 UART: [ldev] AUTHORITY.KEYID = 7
1,210,270 UART: [ldev] FE.KEYID = 1
1,215,416 UART: [ldev] Erasing FE.KEYID = 1
1,241,719 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,117 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,722 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,434 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,502 UART: [ldev] --
1,280,829 UART: [fwproc] Wait for Commands...
1,281,594 UART: [fwproc] Recv command 0x46574c44
1,282,327 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,587 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,701 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,888 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,160,397 >>> mbox cmd response: failed
1,160,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,403 >>> mbox cmd response: failed
1,160,403 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,160,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,994 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,055 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.58s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,799 UART: [state] LifecycleState = Manufacturing
86,454 UART: [state] DebugLocked = No
86,944 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
891,729 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,833 UART: [kat] ++
895,985 UART: [kat] sha1
900,089 UART: [kat] SHA2-256
902,029 UART: [kat] SHA2-384
904,758 UART: [kat] SHA2-512-ACC
906,659 UART: [kat] ECC-384
916,516 UART: [kat] HMAC-384Kdf
921,054 UART: [kat] LMS
1,169,366 UART: [kat] --
1,170,415 UART: [cold-reset] ++
1,170,819 UART: [fht] FHT @ 0x50003400
1,173,573 UART: [idev] ++
1,173,741 UART: [idev] CDI.KEYID = 6
1,174,102 UART: [idev] SUBJECT.KEYID = 7
1,174,527 UART: [idev] UDS.KEYID = 0
1,174,873 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,366 UART: [idev] Erasing UDS.KEYID = 0
1,199,602 UART: [idev] Sha1 KeyId Algorithm
1,208,324 UART: [idev] --
1,209,249 UART: [ldev] ++
1,209,417 UART: [ldev] CDI.KEYID = 6
1,209,781 UART: [ldev] SUBJECT.KEYID = 5
1,210,208 UART: [ldev] AUTHORITY.KEYID = 7
1,210,671 UART: [ldev] FE.KEYID = 1
1,216,105 UART: [ldev] Erasing FE.KEYID = 1
1,243,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,358 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,207 UART: [ldev] --
1,282,624 UART: [fwproc] Wait for Commands...
1,283,393 UART: [fwproc] Recv command 0x46574c44
1,284,126 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,230 UART: ROM Fatal Error: 0x000B0003
1,306,387 >>> mbox cmd response: failed
1,306,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,393 >>> mbox cmd response: failed
1,306,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,399 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,295 UART: [state] LifecycleState = Unprovisioned
85,950 UART: [state] DebugLocked = No
86,494 UART: [state] WD Timer not started. Device not locked for debugging
87,849 UART: [kat] SHA2-256
891,399 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,503 UART: [kat] ++
895,655 UART: [kat] sha1
899,903 UART: [kat] SHA2-256
901,843 UART: [kat] SHA2-384
904,432 UART: [kat] SHA2-512-ACC
906,333 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,782 UART: [kat] LMS
1,169,094 UART: [kat] --
1,169,719 UART: [cold-reset] ++
1,170,239 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,174,293 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,994 UART: [idev] Erasing UDS.KEYID = 0
1,199,084 UART: [idev] Sha1 KeyId Algorithm
1,207,916 UART: [idev] --
1,208,925 UART: [ldev] ++
1,209,093 UART: [ldev] CDI.KEYID = 6
1,209,457 UART: [ldev] SUBJECT.KEYID = 5
1,209,884 UART: [ldev] AUTHORITY.KEYID = 7
1,210,347 UART: [ldev] FE.KEYID = 1
1,215,527 UART: [ldev] Erasing FE.KEYID = 1
1,242,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,296 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,012 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,901 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,647 UART: [ldev] --
1,281,850 UART: [fwproc] Wait for Commands...
1,282,571 UART: [fwproc] Recv command 0x46574c44
1,283,304 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,122 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,345 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,520 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,891 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,161,012 >>> mbox cmd response: failed
1,161,012 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,018 >>> mbox cmd response: failed
1,161,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,161,024 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,361 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,942 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Manufacturing
85,589 UART: [state] DebugLocked = No
86,321 UART: [state] WD Timer not started. Device not locked for debugging
87,448 UART: [kat] SHA2-256
893,098 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,223 UART: [kat] ++
897,375 UART: [kat] sha1
901,593 UART: [kat] SHA2-256
903,533 UART: [kat] SHA2-384
906,438 UART: [kat] SHA2-512-ACC
908,339 UART: [kat] ECC-384
918,410 UART: [kat] HMAC-384Kdf
922,942 UART: [kat] LMS
1,171,270 UART: [kat] --
1,172,015 UART: [cold-reset] ++
1,172,513 UART: [fht] FHT @ 0x50003400
1,175,016 UART: [idev] ++
1,175,184 UART: [idev] CDI.KEYID = 6
1,175,544 UART: [idev] SUBJECT.KEYID = 7
1,175,968 UART: [idev] UDS.KEYID = 0
1,176,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,898 UART: [idev] Erasing UDS.KEYID = 0
1,201,493 UART: [idev] Sha1 KeyId Algorithm
1,209,979 UART: [idev] --
1,211,107 UART: [ldev] ++
1,211,275 UART: [ldev] CDI.KEYID = 6
1,211,638 UART: [ldev] SUBJECT.KEYID = 5
1,212,064 UART: [ldev] AUTHORITY.KEYID = 7
1,212,527 UART: [ldev] FE.KEYID = 1
1,217,395 UART: [ldev] Erasing FE.KEYID = 1
1,243,376 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,886 UART: [fwproc] Wait for Commands...
1,283,702 UART: [fwproc] Recv command 0x46574c44
1,284,430 UART: [fwproc] Recv'd Img size: 118548 bytes
1,304,896 UART: ROM Fatal Error: 0x000B0003
1,306,053 >>> mbox cmd response: failed
1,306,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,059 >>> mbox cmd response: failed
1,306,059 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,065 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,130 UART: [state] LifecycleState = Unprovisioned
85,785 UART: [state] DebugLocked = No
86,431 UART: [state] WD Timer not started. Device not locked for debugging
87,628 UART: [kat] SHA2-256
893,278 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,403 UART: [kat] ++
897,555 UART: [kat] sha1
901,947 UART: [kat] SHA2-256
903,887 UART: [kat] SHA2-384
906,708 UART: [kat] SHA2-512-ACC
908,609 UART: [kat] ECC-384
918,222 UART: [kat] HMAC-384Kdf
922,740 UART: [kat] LMS
1,171,068 UART: [kat] --
1,171,917 UART: [cold-reset] ++
1,172,461 UART: [fht] FHT @ 0x50003400
1,175,170 UART: [idev] ++
1,175,338 UART: [idev] CDI.KEYID = 6
1,175,698 UART: [idev] SUBJECT.KEYID = 7
1,176,122 UART: [idev] UDS.KEYID = 0
1,176,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,874 UART: [idev] Erasing UDS.KEYID = 0
1,200,769 UART: [idev] Sha1 KeyId Algorithm
1,209,373 UART: [idev] --
1,210,539 UART: [ldev] ++
1,210,707 UART: [ldev] CDI.KEYID = 6
1,211,070 UART: [ldev] SUBJECT.KEYID = 5
1,211,496 UART: [ldev] AUTHORITY.KEYID = 7
1,211,959 UART: [ldev] FE.KEYID = 1
1,217,495 UART: [ldev] Erasing FE.KEYID = 1
1,244,148 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,651 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,367 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,258 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,970 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,121 UART: [ldev] --
1,283,382 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,754 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,508 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,767 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,937 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,124 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,159,220 >>> mbox cmd response: failed
1,159,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,226 >>> mbox cmd response: failed
1,159,226 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,159,232 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,675 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Manufacturing
85,894 UART: [state] DebugLocked = No
86,514 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
893,519 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,644 UART: [kat] ++
897,796 UART: [kat] sha1
901,890 UART: [kat] SHA2-256
903,830 UART: [kat] SHA2-384
906,455 UART: [kat] SHA2-512-ACC
908,356 UART: [kat] ECC-384
918,151 UART: [kat] HMAC-384Kdf
922,835 UART: [kat] LMS
1,171,163 UART: [kat] --
1,172,064 UART: [cold-reset] ++
1,172,466 UART: [fht] FHT @ 0x50003400
1,175,237 UART: [idev] ++
1,175,405 UART: [idev] CDI.KEYID = 6
1,175,765 UART: [idev] SUBJECT.KEYID = 7
1,176,189 UART: [idev] UDS.KEYID = 0
1,176,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,993 UART: [idev] Erasing UDS.KEYID = 0
1,201,150 UART: [idev] Sha1 KeyId Algorithm
1,209,506 UART: [idev] --
1,210,592 UART: [ldev] ++
1,210,760 UART: [ldev] CDI.KEYID = 6
1,211,123 UART: [ldev] SUBJECT.KEYID = 5
1,211,549 UART: [ldev] AUTHORITY.KEYID = 7
1,212,012 UART: [ldev] FE.KEYID = 1
1,217,376 UART: [ldev] Erasing FE.KEYID = 1
1,243,237 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,090 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,697 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,624 UART: [ldev] --
1,283,069 UART: [fwproc] Wait for Commands...
1,283,843 UART: [fwproc] Recv command 0x46574c44
1,284,571 UART: [fwproc] Recv'd Img size: 118548 bytes
1,305,437 UART: ROM Fatal Error: 0x000B0003
1,306,594 >>> mbox cmd response: failed
1,306,594 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,600 >>> mbox cmd response: failed
1,306,600 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,306,606 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,709 UART: [state] LifecycleState = Unprovisioned
86,364 UART: [state] DebugLocked = No
87,000 UART: [state] WD Timer not started. Device not locked for debugging
88,179 UART: [kat] SHA2-256
893,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,954 UART: [kat] ++
898,106 UART: [kat] sha1
902,404 UART: [kat] SHA2-256
904,344 UART: [kat] SHA2-384
907,205 UART: [kat] SHA2-512-ACC
909,106 UART: [kat] ECC-384
919,197 UART: [kat] HMAC-384Kdf
923,793 UART: [kat] LMS
1,172,121 UART: [kat] --
1,173,356 UART: [cold-reset] ++
1,173,928 UART: [fht] FHT @ 0x50003400
1,176,627 UART: [idev] ++
1,176,795 UART: [idev] CDI.KEYID = 6
1,177,155 UART: [idev] SUBJECT.KEYID = 7
1,177,579 UART: [idev] UDS.KEYID = 0
1,177,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,723 UART: [idev] Erasing UDS.KEYID = 0
1,202,864 UART: [idev] Sha1 KeyId Algorithm
1,211,338 UART: [idev] --
1,212,380 UART: [ldev] ++
1,212,548 UART: [ldev] CDI.KEYID = 6
1,212,911 UART: [ldev] SUBJECT.KEYID = 5
1,213,337 UART: [ldev] AUTHORITY.KEYID = 7
1,213,800 UART: [ldev] FE.KEYID = 1
1,218,768 UART: [ldev] Erasing FE.KEYID = 1
1,245,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,348 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,064 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,955 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,667 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,666 UART: [ldev] --
1,284,009 UART: [fwproc] Wait for Commands...
1,284,589 UART: [fwproc] Recv command 0x46574c44
1,285,317 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,169 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,442 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,612 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,781 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,264 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,162,015 >>> mbox cmd response: failed
1,162,015 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,021 >>> mbox cmd response: failed
1,162,021 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,162,027 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,056 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,174 UART:
192,527 UART: Running Caliptra ROM ...
193,721 UART:
193,872 UART: [state] CFI Enabled
262,272 UART: [state] LifecycleState = Unprovisioned
264,218 UART: [state] DebugLocked = No
267,060 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,571 UART: [kat] SHA2-256
441,287 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,761 UART: [kat] ++
452,349 UART: [kat] sha1
463,339 UART: [kat] SHA2-256
466,072 UART: [kat] SHA2-384
473,194 UART: [kat] SHA2-512-ACC
475,563 UART: [kat] ECC-384
2,768,819 UART: [kat] HMAC-384Kdf
2,799,207 UART: [kat] LMS
3,989,507 UART: [kat] --
3,992,460 UART: [cold-reset] ++
3,994,784 UART: [fht] Storing FHT @ 0x50003400
4,006,224 UART: [idev] ++
4,006,800 UART: [idev] CDI.KEYID = 6
4,007,772 UART: [idev] SUBJECT.KEYID = 7
4,008,988 UART: [idev] UDS.KEYID = 0
4,012,153 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,161,521 UART: [idev] Erasing UDS.KEYID = 0
7,344,826 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,601 UART: [idev] --
7,370,924 UART: [ldev] ++
7,371,507 UART: [ldev] CDI.KEYID = 6
7,372,499 UART: [ldev] SUBJECT.KEYID = 5
7,373,664 UART: [ldev] AUTHORITY.KEYID = 7
7,374,957 UART: [ldev] FE.KEYID = 1
7,423,625 UART: [ldev] Erasing FE.KEYID = 1
10,754,709 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,654 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,509 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,777 UART: [ldev] --
13,115,755 UART: [fwproc] Waiting for Commands...
13,117,551 UART: [fwproc] Received command 0x46574c44
13,119,747 UART: [fwproc] Received Image of size 118548 bytes
13,217,275 UART: ROM Fatal Error: 0x000B001B
13,220,802 >>> mbox cmd response: failed
13,221,241 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,221,601 >>> mbox cmd response: failed
13,221,874 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,222,172 >>> mbox cmd response: failed
Initializing fuses
2,056,238 writing to cptra_bootfsm_go
2,245,606 UART:
2,245,960 UART: Running Caliptra ROM ...
2,247,096 UART:
2,247,287 UART: [state] CFI Enabled
2,316,720 UART: [state] LifecycleState = Unprovisioned
2,318,664 UART: [state] DebugLocked = No
2,320,007 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,324,914 UART: [kat] SHA2-256
2,494,640 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,505,154 UART: [kat] ++
2,505,660 UART: [kat] sha1
2,516,766 UART: [kat] SHA2-256
2,519,462 UART: [kat] SHA2-384
2,525,668 UART: [kat] SHA2-512-ACC
2,528,020 UART: [kat] ECC-384
4,821,974 UART: [kat] HMAC-384Kdf
4,855,907 UART: [kat] LMS
6,046,223 UART: [kat] --
6,051,259 UART: [cold-reset] ++
6,053,555 UART: [fht] Storing FHT @ 0x50003400
6,065,206 UART: [idev] ++
6,065,832 UART: [idev] CDI.KEYID = 6
6,066,726 UART: [idev] SUBJECT.KEYID = 7
6,067,999 UART: [idev] UDS.KEYID = 0
6,070,375 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,219,589 UART: [idev] Erasing UDS.KEYID = 0
9,399,920 UART: [idev] Using Sha1 for KeyId Algorithm
9,421,464 UART: [idev] --
9,424,954 UART: [ldev] ++
9,425,534 UART: [ldev] CDI.KEYID = 6
9,426,506 UART: [ldev] SUBJECT.KEYID = 5
9,427,769 UART: [ldev] AUTHORITY.KEYID = 7
9,429,006 UART: [ldev] FE.KEYID = 1
9,456,134 UART: [ldev] Erasing FE.KEYID = 1
12,787,448 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,086,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,100,778 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,115,577 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,130,087 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,149,939 UART: [ldev] --
15,155,494 UART: [fwproc] Waiting for Commands...
15,157,383 UART: [fwproc] Received command 0x46574c44
15,159,576 UART: [fwproc] Received Image of size 118548 bytes
19,269,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,352,639 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,425,843 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,753,863 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,988 writing to cptra_bootfsm_go
3,787,223 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,961,129 >>> mbox cmd response: failed
12,961,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,962,051 >>> mbox cmd response: failed
12,962,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,962,618 >>> mbox cmd response: failed
Initializing fuses
2,052,512 writing to cptra_bootfsm_go
5,820,468 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
19,950,960 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,308 UART:
192,673 UART: Running Caliptra ROM ...
194,734 UART:
603,428 UART: [state] CFI Enabled
617,806 UART: [state] LifecycleState = Unprovisioned
619,751 UART: [state] DebugLocked = No
622,778 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,184 UART: [kat] SHA2-256
797,901 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,449 UART: [kat] ++
808,902 UART: [kat] sha1
819,946 UART: [kat] SHA2-256
822,644 UART: [kat] SHA2-384
829,816 UART: [kat] SHA2-512-ACC
832,161 UART: [kat] ECC-384
3,118,285 UART: [kat] HMAC-384Kdf
3,130,374 UART: [kat] LMS
4,320,504 UART: [kat] --
4,324,879 UART: [cold-reset] ++
4,327,035 UART: [fht] Storing FHT @ 0x50003400
4,337,554 UART: [idev] ++
4,338,124 UART: [idev] CDI.KEYID = 6
4,339,094 UART: [idev] SUBJECT.KEYID = 7
4,340,321 UART: [idev] UDS.KEYID = 0
4,343,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,492,825 UART: [idev] Erasing UDS.KEYID = 0
7,627,074 UART: [idev] Using Sha1 for KeyId Algorithm
7,650,175 UART: [idev] --
7,655,285 UART: [ldev] ++
7,655,876 UART: [ldev] CDI.KEYID = 6
7,656,850 UART: [ldev] SUBJECT.KEYID = 5
7,658,073 UART: [ldev] AUTHORITY.KEYID = 7
7,659,321 UART: [ldev] FE.KEYID = 1
7,670,951 UART: [ldev] Erasing FE.KEYID = 1
10,959,000 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,662 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,217 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,862 UART: [ldev] --
13,320,278 UART: [fwproc] Waiting for Commands...
13,322,074 UART: [fwproc] Received command 0x46574c44
13,324,278 UART: [fwproc] Received Image of size 118548 bytes
13,421,439 UART: ROM Fatal Error: 0x000B001B
13,424,911 >>> mbox cmd response: failed
13,425,340 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,425,675 >>> mbox cmd response: failed
13,425,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,426,244 >>> mbox cmd response: failed
Initializing fuses
2,054,558 writing to cptra_bootfsm_go
2,243,883 UART:
2,244,223 UART: Running Caliptra ROM ...
2,245,395 UART:
7,040,857 UART: [state] CFI Enabled
7,055,211 UART: [state] LifecycleState = Unprovisioned
7,057,129 UART: [state] DebugLocked = No
7,060,096 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,065,067 UART: [kat] SHA2-256
7,234,818 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,245,351 UART: [kat] ++
7,245,848 UART: [kat] sha1
7,256,443 UART: [kat] SHA2-256
7,259,128 UART: [kat] SHA2-384
7,264,156 UART: [kat] SHA2-512-ACC
7,266,512 UART: [kat] ECC-384
9,550,466 UART: [kat] HMAC-384Kdf
9,563,243 UART: [kat] LMS
10,753,353 UART: [kat] --
10,759,010 UART: [cold-reset] ++
10,761,389 UART: [fht] Storing FHT @ 0x50003400
10,771,627 UART: [idev] ++
10,772,240 UART: [idev] CDI.KEYID = 6
10,773,159 UART: [idev] SUBJECT.KEYID = 7
10,774,379 UART: [idev] UDS.KEYID = 0
10,776,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,925,747 UART: [idev] Erasing UDS.KEYID = 0
14,062,565 UART: [idev] Using Sha1 for KeyId Algorithm
14,085,633 UART: [idev] --
14,090,931 UART: [ldev] ++
14,091,509 UART: [ldev] CDI.KEYID = 6
14,092,481 UART: [ldev] SUBJECT.KEYID = 5
14,093,684 UART: [ldev] AUTHORITY.KEYID = 7
14,094,939 UART: [ldev] FE.KEYID = 1
14,106,890 UART: [ldev] Erasing FE.KEYID = 1
17,393,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,685,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,700,418 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,715,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,729,761 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,749,518 UART: [ldev] --
19,754,852 UART: [fwproc] Waiting for Commands...
19,757,935 UART: [fwproc] Received command 0x46574c44
19,760,125 UART: [fwproc] Received Image of size 118548 bytes
23,859,662 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,939,197 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,012,379 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,340,915 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,132,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,165,110 >>> mbox cmd response: failed
13,165,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,166,144 >>> mbox cmd response: failed
13,166,419 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,166,720 >>> mbox cmd response: failed
Initializing fuses
2,048,588 writing to cptra_bootfsm_go
10,830,499 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,859,340 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,498 UART:
192,856 UART: Running Caliptra ROM ...
194,059 UART:
194,219 UART: [state] CFI Enabled
261,503 UART: [state] LifecycleState = Unprovisioned
263,420 UART: [state] DebugLocked = No
265,561 UART: [state] WD Timer not started. Device not locked for debugging
269,947 UART: [kat] SHA2-256
449,598 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,380 UART: [kat] ++
460,840 UART: [kat] sha1
472,802 UART: [kat] SHA2-256
475,486 UART: [kat] SHA2-384
482,224 UART: [kat] SHA2-512-ACC
484,575 UART: [kat] ECC-384
2,946,180 UART: [kat] HMAC-384Kdf
2,969,870 UART: [kat] LMS
3,446,377 UART: [kat] --
3,451,398 UART: [cold-reset] ++
3,453,709 UART: [fht] FHT @ 0x50003400
3,464,744 UART: [idev] ++
3,465,320 UART: [idev] CDI.KEYID = 6
3,466,291 UART: [idev] SUBJECT.KEYID = 7
3,467,507 UART: [idev] UDS.KEYID = 0
3,470,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,474 UART: [idev] Erasing UDS.KEYID = 0
5,986,562 UART: [idev] Sha1 KeyId Algorithm
6,010,933 UART: [idev] --
6,015,045 UART: [ldev] ++
6,015,634 UART: [ldev] CDI.KEYID = 6
6,016,551 UART: [ldev] SUBJECT.KEYID = 5
6,017,717 UART: [ldev] AUTHORITY.KEYID = 7
6,019,013 UART: [ldev] FE.KEYID = 1
6,054,777 UART: [ldev] Erasing FE.KEYID = 1
8,563,673 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,086 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,925 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,771 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,449 UART: [ldev] --
10,372,089 UART: [fwproc] Wait for Commands...
10,374,682 UART: [fwproc] Recv command 0x46574c44
10,376,729 UART: [fwproc] Recv'd Img size: 118548 bytes
10,488,436 UART: ROM Fatal Error: 0x000B001B
10,491,694 >>> mbox cmd response: failed
10,492,114 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,452 >>> mbox cmd response: failed
10,492,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,492,963 >>> mbox cmd response: failed
Initializing fuses
2,059,599 writing to cptra_bootfsm_go
2,248,918 UART:
2,249,411 UART: Running Caliptra ROM ...
2,250,486 UART:
2,250,655 UART: [state] CFI Enabled
2,311,998 UART: [state] LifecycleState = Unprovisioned
2,313,939 UART: [state] DebugLocked = No
2,315,500 UART: [state] WD Timer not started. Device not locked for debugging
2,319,691 UART: [kat] SHA2-256
2,499,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,510,108 UART: [kat] ++
2,510,662 UART: [kat] sha1
2,521,400 UART: [kat] SHA2-256
2,524,109 UART: [kat] SHA2-384
2,529,297 UART: [kat] SHA2-512-ACC
2,531,704 UART: [kat] ECC-384
4,995,123 UART: [kat] HMAC-384Kdf
5,017,300 UART: [kat] LMS
5,493,755 UART: [kat] --
5,499,120 UART: [cold-reset] ++
5,501,547 UART: [fht] FHT @ 0x50003400
5,512,579 UART: [idev] ++
5,513,161 UART: [idev] CDI.KEYID = 6
5,514,141 UART: [idev] SUBJECT.KEYID = 7
5,515,360 UART: [idev] UDS.KEYID = 0
5,518,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,667,512 UART: [idev] Erasing UDS.KEYID = 0
8,035,033 UART: [idev] Sha1 KeyId Algorithm
8,058,919 UART: [idev] --
8,064,095 UART: [ldev] ++
8,064,698 UART: [ldev] CDI.KEYID = 6
8,065,620 UART: [ldev] SUBJECT.KEYID = 5
8,066,792 UART: [ldev] AUTHORITY.KEYID = 7
8,068,092 UART: [ldev] FE.KEYID = 1
8,102,779 UART: [ldev] Erasing FE.KEYID = 1
10,609,463 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,343,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,359,704 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,375,578 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,391,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,413,199 UART: [ldev] --
12,417,875 UART: [fwproc] Wait for Commands...
12,419,493 UART: [fwproc] Recv command 0x46574c44
12,421,486 UART: [fwproc] Recv'd Img size: 118548 bytes
15,897,923 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
15,977,450 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,050,525 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,379,130 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.56s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,464,534 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,362,429 >>> mbox cmd response: failed
10,363,045 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,363,407 >>> mbox cmd response: failed
10,363,686 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,363,987 >>> mbox cmd response: failed
Initializing fuses
2,067,406 writing to cptra_bootfsm_go
5,512,372 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,276,919 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.55s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,514 UART:
192,889 UART: Running Caliptra ROM ...
194,033 UART:
603,758 UART: [state] CFI Enabled
619,761 UART: [state] LifecycleState = Unprovisioned
621,670 UART: [state] DebugLocked = No
623,022 UART: [state] WD Timer not started. Device not locked for debugging
626,679 UART: [kat] SHA2-256
806,300 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,124 UART: [kat] ++
817,581 UART: [kat] sha1
828,351 UART: [kat] SHA2-256
831,042 UART: [kat] SHA2-384
837,357 UART: [kat] SHA2-512-ACC
839,683 UART: [kat] ECC-384
3,282,603 UART: [kat] HMAC-384Kdf
3,295,561 UART: [kat] LMS
3,772,041 UART: [kat] --
3,776,274 UART: [cold-reset] ++
3,777,898 UART: [fht] FHT @ 0x50003400
3,790,399 UART: [idev] ++
3,790,969 UART: [idev] CDI.KEYID = 6
3,791,908 UART: [idev] SUBJECT.KEYID = 7
3,793,166 UART: [idev] UDS.KEYID = 0
3,796,244 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,203 UART: [idev] Erasing UDS.KEYID = 0
6,273,981 UART: [idev] Sha1 KeyId Algorithm
6,296,832 UART: [idev] --
6,301,320 UART: [ldev] ++
6,301,893 UART: [ldev] CDI.KEYID = 6
6,302,865 UART: [ldev] SUBJECT.KEYID = 5
6,304,031 UART: [ldev] AUTHORITY.KEYID = 7
6,305,274 UART: [ldev] FE.KEYID = 1
6,317,659 UART: [ldev] Erasing FE.KEYID = 1
8,797,041 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,519,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,535,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,551,248 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,566,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,587,794 UART: [ldev] --
10,593,815 UART: [fwproc] Wait for Commands...
10,596,556 UART: [fwproc] Recv command 0x46574c44
10,598,566 UART: [fwproc] Recv'd Img size: 118548 bytes
10,715,960 UART: ROM Fatal Error: 0x000B001B
10,719,167 >>> mbox cmd response: failed
10,719,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,719,942 >>> mbox cmd response: failed
10,720,211 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,720,508 >>> mbox cmd response: failed
Initializing fuses
2,059,934 writing to cptra_bootfsm_go
2,249,254 UART:
2,249,647 UART: Running Caliptra ROM ...
2,250,700 UART:
9,734,541 UART: [state] CFI Enabled
9,750,883 UART: [state] LifecycleState = Unprovisioned
9,752,807 UART: [state] DebugLocked = No
9,754,207 UART: [state] WD Timer not started. Device not locked for debugging
9,758,771 UART: [kat] SHA2-256
9,938,438 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,949,186 UART: [kat] ++
9,949,680 UART: [kat] sha1
9,960,354 UART: [kat] SHA2-256
9,963,046 UART: [kat] SHA2-384
9,970,510 UART: [kat] SHA2-512-ACC
9,972,869 UART: [kat] ECC-384
12,416,116 UART: [kat] HMAC-384Kdf
12,429,913 UART: [kat] LMS
12,906,429 UART: [kat] --
12,909,683 UART: [cold-reset] ++
12,912,271 UART: [fht] FHT @ 0x50003400
12,925,125 UART: [idev] ++
12,925,727 UART: [idev] CDI.KEYID = 6
12,926,640 UART: [idev] SUBJECT.KEYID = 7
12,927,915 UART: [idev] UDS.KEYID = 0
12,930,846 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,079,860 UART: [idev] Erasing UDS.KEYID = 0
15,404,121 UART: [idev] Sha1 KeyId Algorithm
15,427,247 UART: [idev] --
15,432,052 UART: [ldev] ++
15,432,679 UART: [ldev] CDI.KEYID = 6
15,433,563 UART: [ldev] SUBJECT.KEYID = 5
15,434,775 UART: [ldev] AUTHORITY.KEYID = 7
15,436,066 UART: [ldev] FE.KEYID = 1
15,449,356 UART: [ldev] Erasing FE.KEYID = 1
17,930,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,647,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,663,806 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,679,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,695,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,716,858 UART: [ldev] --
19,722,918 UART: [fwproc] Wait for Commands...
19,724,919 UART: [fwproc] Recv command 0x46574c44
19,726,968 UART: [fwproc] Recv'd Img size: 118548 bytes
23,212,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,293,548 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,366,575 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,695,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
3,779,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,584,202 >>> mbox cmd response: failed
10,584,747 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,096 >>> mbox cmd response: failed
10,585,378 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,585,670 >>> mbox cmd response: failed
Initializing fuses
2,058,589 writing to cptra_bootfsm_go
13,071,053 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,737,105 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.94s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
192,027 UART:
192,419 UART: Running Caliptra ROM ...
193,549 UART:
193,706 UART: [state] CFI Enabled
265,063 UART: [state] LifecycleState = Unprovisioned
267,150 UART: [state] DebugLocked = No
269,456 UART: [state] WD Timer not started. Device not locked for debugging
273,892 UART: [kat] SHA2-256
463,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,511 UART: [kat] ++
474,992 UART: [kat] sha1
486,993 UART: [kat] SHA2-256
489,997 UART: [kat] SHA2-384
496,099 UART: [kat] SHA2-512-ACC
498,669 UART: [kat] ECC-384
2,948,318 UART: [kat] HMAC-384Kdf
2,971,834 UART: [kat] LMS
3,503,603 UART: [kat] --
3,507,985 UART: [cold-reset] ++
3,508,957 UART: [fht] FHT @ 0x50003400
3,520,105 UART: [idev] ++
3,520,786 UART: [idev] CDI.KEYID = 6
3,521,757 UART: [idev] SUBJECT.KEYID = 7
3,522,976 UART: [idev] UDS.KEYID = 0
3,526,003 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,138 UART: [idev] Erasing UDS.KEYID = 0
6,030,818 UART: [idev] Sha1 KeyId Algorithm
6,052,971 UART: [idev] --
6,058,059 UART: [ldev] ++
6,058,748 UART: [ldev] CDI.KEYID = 6
6,059,657 UART: [ldev] SUBJECT.KEYID = 5
6,060,877 UART: [ldev] AUTHORITY.KEYID = 7
6,062,061 UART: [ldev] FE.KEYID = 1
6,102,990 UART: [ldev] Erasing FE.KEYID = 1
8,609,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,299 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,628 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,449 UART: [ldev] --
10,415,490 UART: [fwproc] Wait for Commands...
10,416,955 UART: [fwproc] Recv command 0x46574c44
10,418,949 UART: [fwproc] Recv'd Img size: 118548 bytes
10,549,521 UART: ROM Fatal Error: 0x000B001B
10,553,163 >>> mbox cmd response: failed
10,553,577 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,553,912 >>> mbox cmd response: failed
10,554,183 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,554,479 >>> mbox cmd response: failed
Initializing fuses
2,059,029 writing to cptra_bootfsm_go
2,248,351 UART:
2,248,701 UART: Running Caliptra ROM ...
2,249,841 UART:
2,250,012 UART: [state] CFI Enabled
2,320,583 UART: [state] LifecycleState = Unprovisioned
2,323,012 UART: [state] DebugLocked = No
2,325,384 UART: [state] WD Timer not started. Device not locked for debugging
2,330,708 UART: [kat] SHA2-256
2,520,612 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,531,349 UART: [kat] ++
2,531,810 UART: [kat] sha1
2,542,235 UART: [kat] SHA2-256
2,545,265 UART: [kat] SHA2-384
2,550,991 UART: [kat] SHA2-512-ACC
2,553,561 UART: [kat] ECC-384
5,001,719 UART: [kat] HMAC-384Kdf
5,025,617 UART: [kat] LMS
5,557,399 UART: [kat] --
5,563,091 UART: [cold-reset] ++
5,565,147 UART: [fht] FHT @ 0x50003400
5,577,594 UART: [idev] ++
5,578,338 UART: [idev] CDI.KEYID = 6
5,579,252 UART: [idev] SUBJECT.KEYID = 7
5,580,471 UART: [idev] UDS.KEYID = 0
5,582,723 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,731,901 UART: [idev] Erasing UDS.KEYID = 0
8,084,790 UART: [idev] Sha1 KeyId Algorithm
8,106,597 UART: [idev] --
8,110,955 UART: [ldev] ++
8,111,651 UART: [ldev] CDI.KEYID = 6
8,112,538 UART: [ldev] SUBJECT.KEYID = 5
8,113,755 UART: [ldev] AUTHORITY.KEYID = 7
8,114,882 UART: [ldev] FE.KEYID = 1
8,153,410 UART: [ldev] Erasing FE.KEYID = 1
10,663,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,396,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,411,650 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,426,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,441,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,463,531 UART: [ldev] --
12,469,016 UART: [fwproc] Wait for Commands...
12,470,799 UART: [fwproc] Recv command 0x46574c44
12,473,061 UART: [fwproc] Recv'd Img size: 118548 bytes
15,966,503 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,043,397 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,167,013 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,727,099 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
3,417,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,321,953 >>> mbox cmd response: failed
10,322,547 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,322,909 >>> mbox cmd response: failed
10,323,181 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,323,482 >>> mbox cmd response: failed
Initializing fuses
2,054,622 writing to cptra_bootfsm_go
5,478,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,861,621 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.58s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
192,670 UART:
193,649 UART: Running Caliptra ROM ...
194,837 UART:
603,793 UART: [state] CFI Enabled
620,653 UART: [state] LifecycleState = Unprovisioned
623,065 UART: [state] DebugLocked = No
625,297 UART: [state] WD Timer not started. Device not locked for debugging
630,469 UART: [kat] SHA2-256
820,365 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,173 UART: [kat] ++
831,675 UART: [kat] sha1
843,113 UART: [kat] SHA2-256
846,139 UART: [kat] SHA2-384
851,443 UART: [kat] SHA2-512-ACC
854,026 UART: [kat] ECC-384
3,293,397 UART: [kat] HMAC-384Kdf
3,306,155 UART: [kat] LMS
3,838,007 UART: [kat] --
3,842,958 UART: [cold-reset] ++
3,844,375 UART: [fht] FHT @ 0x50003400
3,855,648 UART: [idev] ++
3,856,342 UART: [idev] CDI.KEYID = 6
3,857,279 UART: [idev] SUBJECT.KEYID = 7
3,858,500 UART: [idev] UDS.KEYID = 0
3,861,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,011,536 UART: [idev] Erasing UDS.KEYID = 0
6,339,841 UART: [idev] Sha1 KeyId Algorithm
6,363,243 UART: [idev] --
6,368,571 UART: [ldev] ++
6,369,275 UART: [ldev] CDI.KEYID = 6
6,370,206 UART: [ldev] SUBJECT.KEYID = 5
6,371,378 UART: [ldev] AUTHORITY.KEYID = 7
6,372,566 UART: [ldev] FE.KEYID = 1
6,382,463 UART: [ldev] Erasing FE.KEYID = 1
8,861,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,024 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,230 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,394 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,704 UART: [ldev] --
10,651,684 UART: [fwproc] Wait for Commands...
10,653,358 UART: [fwproc] Recv command 0x46574c44
10,655,631 UART: [fwproc] Recv'd Img size: 118548 bytes
10,771,899 UART: ROM Fatal Error: 0x000B001B
10,775,600 >>> mbox cmd response: failed
10,776,073 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,776,424 >>> mbox cmd response: failed
10,776,709 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,776,956 >>> mbox cmd response: failed
Initializing fuses
2,058,934 writing to cptra_bootfsm_go
2,248,316 UART:
2,248,690 UART: Running Caliptra ROM ...
2,249,776 UART:
9,675,351 UART: [state] CFI Enabled
9,689,732 UART: [state] LifecycleState = Unprovisioned
9,692,123 UART: [state] DebugLocked = No
9,693,525 UART: [state] WD Timer not started. Device not locked for debugging
9,698,157 UART: [kat] SHA2-256
9,888,003 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,898,812 UART: [kat] ++
9,899,309 UART: [kat] sha1
9,910,695 UART: [kat] SHA2-256
9,913,714 UART: [kat] SHA2-384
9,920,971 UART: [kat] SHA2-512-ACC
9,923,554 UART: [kat] ECC-384
12,365,715 UART: [kat] HMAC-384Kdf
12,379,577 UART: [kat] LMS
12,911,358 UART: [kat] --
12,914,614 UART: [cold-reset] ++
12,916,335 UART: [fht] FHT @ 0x50003400
12,926,779 UART: [idev] ++
12,927,480 UART: [idev] CDI.KEYID = 6
12,928,502 UART: [idev] SUBJECT.KEYID = 7
12,929,610 UART: [idev] UDS.KEYID = 0
12,932,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,081,102 UART: [idev] Erasing UDS.KEYID = 0
15,403,224 UART: [idev] Sha1 KeyId Algorithm
15,426,774 UART: [idev] --
15,431,282 UART: [ldev] ++
15,431,977 UART: [ldev] CDI.KEYID = 6
15,432,857 UART: [ldev] SUBJECT.KEYID = 5
15,433,963 UART: [ldev] AUTHORITY.KEYID = 7
15,435,251 UART: [ldev] FE.KEYID = 1
15,445,872 UART: [ldev] Erasing FE.KEYID = 1
17,923,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,643,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,658,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,673,945 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,689,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,709,957 UART: [ldev] --
19,715,072 UART: [fwproc] Wait for Commands...
19,716,797 UART: [fwproc] Recv command 0x46574c44
19,719,069 UART: [fwproc] Recv'd Img size: 118548 bytes
23,220,012 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,296,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,419,587 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,979,503 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
3,756,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,561,040 >>> mbox cmd response: failed
10,562,035 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,562,421 >>> mbox cmd response: failed
10,562,699 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,563,022 >>> mbox cmd response: failed
Initializing fuses
2,056,183 writing to cptra_bootfsm_go
13,062,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,329,175 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Unprovisioned
85,875 UART: [state] DebugLocked = No
86,605 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,301 UART: [kat] SHA2-256
882,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,347 UART: [kat] ++
886,499 UART: [kat] sha1
890,667 UART: [kat] SHA2-256
892,605 UART: [kat] SHA2-384
895,344 UART: [kat] SHA2-512-ACC
897,245 UART: [kat] ECC-384
903,036 UART: [kat] HMAC-384Kdf
907,822 UART: [kat] LMS
1,476,018 UART: [kat] --
1,477,079 UART: [cold-reset] ++
1,477,431 UART: [fht] Storing FHT @ 0x50003400
1,480,276 UART: [idev] ++
1,480,444 UART: [idev] CDI.KEYID = 6
1,480,804 UART: [idev] SUBJECT.KEYID = 7
1,481,228 UART: [idev] UDS.KEYID = 0
1,481,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,380 UART: [idev] Erasing UDS.KEYID = 0
1,506,368 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,034 UART: [idev] --
1,515,929 UART: [ldev] ++
1,516,097 UART: [ldev] CDI.KEYID = 6
1,516,460 UART: [ldev] SUBJECT.KEYID = 5
1,516,886 UART: [ldev] AUTHORITY.KEYID = 7
1,517,349 UART: [ldev] FE.KEYID = 1
1,522,573 UART: [ldev] Erasing FE.KEYID = 1
1,547,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,085 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,801 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,692 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,404 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,592 UART: [ldev] --
1,586,909 UART: [fwproc] Waiting for Commands...
1,587,772 UART: [fwproc] Received command 0x46574c44
1,588,563 UART: [fwproc] Received Image of size 118548 bytes
1,624,740 UART: ROM Fatal Error: 0x000B001B
1,625,899 >>> mbox cmd response: failed
1,625,899 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,905 >>> mbox cmd response: failed
1,625,905 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,911 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,172 UART: [state] LifecycleState = Unprovisioned
85,827 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,141 UART: [kat] SHA2-256
882,072 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,187 UART: [kat] ++
886,339 UART: [kat] sha1
890,487 UART: [kat] SHA2-256
892,425 UART: [kat] SHA2-384
895,350 UART: [kat] SHA2-512-ACC
897,251 UART: [kat] ECC-384
902,890 UART: [kat] HMAC-384Kdf
907,570 UART: [kat] LMS
1,475,766 UART: [kat] --
1,476,855 UART: [cold-reset] ++
1,477,401 UART: [fht] Storing FHT @ 0x50003400
1,480,140 UART: [idev] ++
1,480,308 UART: [idev] CDI.KEYID = 6
1,480,668 UART: [idev] SUBJECT.KEYID = 7
1,481,092 UART: [idev] UDS.KEYID = 0
1,481,437 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,260 UART: [idev] Erasing UDS.KEYID = 0
1,505,686 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,374 UART: [idev] --
1,515,269 UART: [ldev] ++
1,515,437 UART: [ldev] CDI.KEYID = 6
1,515,800 UART: [ldev] SUBJECT.KEYID = 5
1,516,226 UART: [ldev] AUTHORITY.KEYID = 7
1,516,689 UART: [ldev] FE.KEYID = 1
1,522,077 UART: [ldev] Erasing FE.KEYID = 1
1,547,608 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,981 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,532 UART: [ldev] --
1,586,955 UART: [fwproc] Waiting for Commands...
1,587,626 UART: [fwproc] Received command 0x46574c44
1,588,417 UART: [fwproc] Received Image of size 118548 bytes
2,932,242 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,300 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,518 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,801 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,665 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,634 >>> mbox cmd response: failed
1,477,634 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,640 >>> mbox cmd response: failed
1,477,640 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,817 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,507 UART: [state] LifecycleState = Unprovisioned
86,162 UART: [state] DebugLocked = No
86,864 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,520 UART: [kat] SHA2-256
882,451 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,566 UART: [kat] ++
886,718 UART: [kat] sha1
890,958 UART: [kat] SHA2-256
892,896 UART: [kat] SHA2-384
895,853 UART: [kat] SHA2-512-ACC
897,754 UART: [kat] ECC-384
903,489 UART: [kat] HMAC-384Kdf
908,123 UART: [kat] LMS
1,476,319 UART: [kat] --
1,477,254 UART: [cold-reset] ++
1,477,648 UART: [fht] Storing FHT @ 0x50003400
1,480,517 UART: [idev] ++
1,480,685 UART: [idev] CDI.KEYID = 6
1,481,045 UART: [idev] SUBJECT.KEYID = 7
1,481,469 UART: [idev] UDS.KEYID = 0
1,481,814 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,811 UART: [idev] Erasing UDS.KEYID = 0
1,506,619 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,095 UART: [idev] --
1,515,972 UART: [ldev] ++
1,516,140 UART: [ldev] CDI.KEYID = 6
1,516,503 UART: [ldev] SUBJECT.KEYID = 5
1,516,929 UART: [ldev] AUTHORITY.KEYID = 7
1,517,392 UART: [ldev] FE.KEYID = 1
1,522,586 UART: [ldev] Erasing FE.KEYID = 1
1,548,361 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,246 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,962 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,853 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,565 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,593 UART: [ldev] --
1,587,856 UART: [fwproc] Waiting for Commands...
1,588,591 UART: [fwproc] Received command 0x46574c44
1,589,382 UART: [fwproc] Received Image of size 118548 bytes
1,624,371 UART: ROM Fatal Error: 0x000B001B
1,625,530 >>> mbox cmd response: failed
1,625,530 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,536 >>> mbox cmd response: failed
1,625,536 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,625,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,309 UART: [state] LifecycleState = Unprovisioned
85,964 UART: [state] DebugLocked = No
86,620 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,262 UART: [kat] SHA2-256
882,193 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,308 UART: [kat] ++
886,460 UART: [kat] sha1
890,522 UART: [kat] SHA2-256
892,460 UART: [kat] SHA2-384
895,267 UART: [kat] SHA2-512-ACC
897,168 UART: [kat] ECC-384
902,603 UART: [kat] HMAC-384Kdf
907,039 UART: [kat] LMS
1,475,235 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,772 UART: [fht] Storing FHT @ 0x50003400
1,479,421 UART: [idev] ++
1,479,589 UART: [idev] CDI.KEYID = 6
1,479,949 UART: [idev] SUBJECT.KEYID = 7
1,480,373 UART: [idev] UDS.KEYID = 0
1,480,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,567 UART: [idev] Erasing UDS.KEYID = 0
1,505,197 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,667 UART: [idev] --
1,514,814 UART: [ldev] ++
1,514,982 UART: [ldev] CDI.KEYID = 6
1,515,345 UART: [ldev] SUBJECT.KEYID = 5
1,515,771 UART: [ldev] AUTHORITY.KEYID = 7
1,516,234 UART: [ldev] FE.KEYID = 1
1,521,414 UART: [ldev] Erasing FE.KEYID = 1
1,547,225 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,686 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,402 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,293 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,005 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,077 UART: [ldev] --
1,586,536 UART: [fwproc] Waiting for Commands...
1,587,335 UART: [fwproc] Received command 0x46574c44
1,588,126 UART: [fwproc] Received Image of size 118548 bytes
2,932,169 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,371 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,589 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,978 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.90s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,477,767 >>> mbox cmd response: failed
1,477,767 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,773 >>> mbox cmd response: failed
1,477,773 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,477,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,634 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,074 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,068 UART: [state] LifecycleState = Unprovisioned
85,723 UART: [state] DebugLocked = No
86,247 UART: [state] WD Timer not started. Device not locked for debugging
87,386 UART: [kat] SHA2-256
890,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,040 UART: [kat] ++
895,192 UART: [kat] sha1
899,426 UART: [kat] SHA2-256
901,366 UART: [kat] SHA2-384
904,087 UART: [kat] SHA2-512-ACC
905,988 UART: [kat] ECC-384
915,475 UART: [kat] HMAC-384Kdf
919,979 UART: [kat] LMS
1,168,291 UART: [kat] --
1,169,310 UART: [cold-reset] ++
1,169,870 UART: [fht] FHT @ 0x50003400
1,172,426 UART: [idev] ++
1,172,594 UART: [idev] CDI.KEYID = 6
1,172,955 UART: [idev] SUBJECT.KEYID = 7
1,173,380 UART: [idev] UDS.KEYID = 0
1,173,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,287 UART: [idev] Erasing UDS.KEYID = 0
1,197,871 UART: [idev] Sha1 KeyId Algorithm
1,206,673 UART: [idev] --
1,207,934 UART: [ldev] ++
1,208,102 UART: [ldev] CDI.KEYID = 6
1,208,466 UART: [ldev] SUBJECT.KEYID = 5
1,208,893 UART: [ldev] AUTHORITY.KEYID = 7
1,209,356 UART: [ldev] FE.KEYID = 1
1,214,338 UART: [ldev] Erasing FE.KEYID = 1
1,240,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,446 UART: [ldev] --
1,279,883 UART: [fwproc] Wait for Commands...
1,280,700 UART: [fwproc] Recv command 0x46574c44
1,281,433 UART: [fwproc] Recv'd Img size: 118548 bytes
1,316,457 UART: ROM Fatal Error: 0x000B001B
1,317,616 >>> mbox cmd response: failed
1,317,616 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,622 >>> mbox cmd response: failed
1,317,622 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,317,628 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,100 UART: [state] LifecycleState = Unprovisioned
85,755 UART: [state] DebugLocked = No
86,391 UART: [state] WD Timer not started. Device not locked for debugging
87,544 UART: [kat] SHA2-256
891,094 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,198 UART: [kat] ++
895,350 UART: [kat] sha1
899,554 UART: [kat] SHA2-256
901,494 UART: [kat] SHA2-384
904,121 UART: [kat] SHA2-512-ACC
906,022 UART: [kat] ECC-384
915,645 UART: [kat] HMAC-384Kdf
920,239 UART: [kat] LMS
1,168,551 UART: [kat] --
1,169,202 UART: [cold-reset] ++
1,169,642 UART: [fht] FHT @ 0x50003400
1,172,344 UART: [idev] ++
1,172,512 UART: [idev] CDI.KEYID = 6
1,172,873 UART: [idev] SUBJECT.KEYID = 7
1,173,298 UART: [idev] UDS.KEYID = 0
1,173,644 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,180,561 UART: [idev] Erasing UDS.KEYID = 0
1,198,421 UART: [idev] Sha1 KeyId Algorithm
1,207,335 UART: [idev] --
1,208,546 UART: [ldev] ++
1,208,714 UART: [ldev] CDI.KEYID = 6
1,209,078 UART: [ldev] SUBJECT.KEYID = 5
1,209,505 UART: [ldev] AUTHORITY.KEYID = 7
1,209,968 UART: [ldev] FE.KEYID = 1
1,215,032 UART: [ldev] Erasing FE.KEYID = 1
1,241,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,089 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,805 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,694 UART: [ldev] --
1,280,973 UART: [fwproc] Wait for Commands...
1,281,558 UART: [fwproc] Recv command 0x46574c44
1,282,291 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,971 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,312 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,487 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,720 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.96s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,334 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,173,433 >>> mbox cmd response: failed
1,173,433 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,439 >>> mbox cmd response: failed
1,173,439 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,173,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,759 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,789 UART: [kat] SHA2-256
891,339 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,443 UART: [kat] ++
895,595 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,674 UART: [kat] SHA2-512-ACC
906,575 UART: [kat] ECC-384
916,558 UART: [kat] HMAC-384Kdf
921,268 UART: [kat] LMS
1,169,580 UART: [kat] --
1,170,361 UART: [cold-reset] ++
1,170,771 UART: [fht] FHT @ 0x50003400
1,173,485 UART: [idev] ++
1,173,653 UART: [idev] CDI.KEYID = 6
1,174,014 UART: [idev] SUBJECT.KEYID = 7
1,174,439 UART: [idev] UDS.KEYID = 0
1,174,785 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,350 UART: [idev] Erasing UDS.KEYID = 0
1,200,064 UART: [idev] Sha1 KeyId Algorithm
1,208,894 UART: [idev] --
1,209,715 UART: [ldev] ++
1,209,883 UART: [ldev] CDI.KEYID = 6
1,210,247 UART: [ldev] SUBJECT.KEYID = 5
1,210,674 UART: [ldev] AUTHORITY.KEYID = 7
1,211,137 UART: [ldev] FE.KEYID = 1
1,216,659 UART: [ldev] Erasing FE.KEYID = 1
1,242,668 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,302 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,191 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,991 UART: [ldev] --
1,282,326 UART: [fwproc] Wait for Commands...
1,282,911 UART: [fwproc] Recv command 0x46574c44
1,283,644 UART: [fwproc] Recv'd Img size: 118548 bytes
1,319,132 UART: ROM Fatal Error: 0x000B001B
1,320,291 >>> mbox cmd response: failed
1,320,291 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,297 >>> mbox cmd response: failed
1,320,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,320,303 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,979 UART: [state] LifecycleState = Unprovisioned
85,634 UART: [state] DebugLocked = No
86,160 UART: [state] WD Timer not started. Device not locked for debugging
87,267 UART: [kat] SHA2-256
890,817 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,921 UART: [kat] ++
895,073 UART: [kat] sha1
899,353 UART: [kat] SHA2-256
901,293 UART: [kat] SHA2-384
904,072 UART: [kat] SHA2-512-ACC
905,973 UART: [kat] ECC-384
915,846 UART: [kat] HMAC-384Kdf
920,486 UART: [kat] LMS
1,168,798 UART: [kat] --
1,169,395 UART: [cold-reset] ++
1,169,827 UART: [fht] FHT @ 0x50003400
1,172,615 UART: [idev] ++
1,172,783 UART: [idev] CDI.KEYID = 6
1,173,144 UART: [idev] SUBJECT.KEYID = 7
1,173,569 UART: [idev] UDS.KEYID = 0
1,173,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,386 UART: [idev] Erasing UDS.KEYID = 0
1,198,476 UART: [idev] Sha1 KeyId Algorithm
1,207,154 UART: [idev] --
1,208,359 UART: [ldev] ++
1,208,527 UART: [ldev] CDI.KEYID = 6
1,208,891 UART: [ldev] SUBJECT.KEYID = 5
1,209,318 UART: [ldev] AUTHORITY.KEYID = 7
1,209,781 UART: [ldev] FE.KEYID = 1
1,215,143 UART: [ldev] Erasing FE.KEYID = 1
1,241,254 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,744 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,460 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,349 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,143 UART: [ldev] --
1,280,594 UART: [fwproc] Wait for Commands...
1,281,309 UART: [fwproc] Recv command 0x46574c44
1,282,042 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,070 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,597 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,169 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,174,636 >>> mbox cmd response: failed
1,174,636 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,642 >>> mbox cmd response: failed
1,174,642 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,174,648 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,328 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.85s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,190 UART: [state] LifecycleState = Unprovisioned
85,845 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,542 UART: [kat] SHA2-256
893,192 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,317 UART: [kat] ++
897,469 UART: [kat] sha1
901,545 UART: [kat] SHA2-256
903,485 UART: [kat] SHA2-384
906,390 UART: [kat] SHA2-512-ACC
908,291 UART: [kat] ECC-384
917,678 UART: [kat] HMAC-384Kdf
922,306 UART: [kat] LMS
1,170,634 UART: [kat] --
1,171,655 UART: [cold-reset] ++
1,172,061 UART: [fht] FHT @ 0x50003400
1,174,626 UART: [idev] ++
1,174,794 UART: [idev] CDI.KEYID = 6
1,175,154 UART: [idev] SUBJECT.KEYID = 7
1,175,578 UART: [idev] UDS.KEYID = 0
1,175,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,200,115 UART: [idev] Sha1 KeyId Algorithm
1,208,607 UART: [idev] --
1,209,815 UART: [ldev] ++
1,209,983 UART: [ldev] CDI.KEYID = 6
1,210,346 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,629 UART: [ldev] Erasing FE.KEYID = 1
1,242,772 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,726 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,505 UART: [ldev] --
1,281,848 UART: [fwproc] Wait for Commands...
1,282,650 UART: [fwproc] Recv command 0x46574c44
1,283,378 UART: [fwproc] Recv'd Img size: 118548 bytes
1,318,717 UART: ROM Fatal Error: 0x000B001B
1,319,876 >>> mbox cmd response: failed
1,319,876 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,882 >>> mbox cmd response: failed
1,319,882 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,319,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,218 UART: [state] LifecycleState = Unprovisioned
85,873 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,712 UART: [kat] SHA2-256
893,362 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,487 UART: [kat] ++
897,639 UART: [kat] sha1
901,795 UART: [kat] SHA2-256
903,735 UART: [kat] SHA2-384
906,340 UART: [kat] SHA2-512-ACC
908,241 UART: [kat] ECC-384
918,058 UART: [kat] HMAC-384Kdf
922,508 UART: [kat] LMS
1,170,836 UART: [kat] --
1,171,847 UART: [cold-reset] ++
1,172,329 UART: [fht] FHT @ 0x50003400
1,174,938 UART: [idev] ++
1,175,106 UART: [idev] CDI.KEYID = 6
1,175,466 UART: [idev] SUBJECT.KEYID = 7
1,175,890 UART: [idev] UDS.KEYID = 0
1,176,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,148 UART: [idev] Erasing UDS.KEYID = 0
1,201,481 UART: [idev] Sha1 KeyId Algorithm
1,209,909 UART: [idev] --
1,211,033 UART: [ldev] ++
1,211,201 UART: [ldev] CDI.KEYID = 6
1,211,564 UART: [ldev] SUBJECT.KEYID = 5
1,211,990 UART: [ldev] AUTHORITY.KEYID = 7
1,212,453 UART: [ldev] FE.KEYID = 1
1,217,769 UART: [ldev] Erasing FE.KEYID = 1
1,244,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,063 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,670 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,629 UART: [ldev] --
1,284,050 UART: [fwproc] Wait for Commands...
1,284,874 UART: [fwproc] Recv command 0x46574c44
1,285,602 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,221 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,391 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,686 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,407 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,176,691 >>> mbox cmd response: failed
1,176,691 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,697 >>> mbox cmd response: failed
1,176,697 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,176,703 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,255 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,959 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,251 UART: [state] LifecycleState = Unprovisioned
85,906 UART: [state] DebugLocked = No
86,394 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
918,187 UART: [kat] HMAC-384Kdf
922,837 UART: [kat] LMS
1,171,165 UART: [kat] --
1,171,964 UART: [cold-reset] ++
1,172,292 UART: [fht] FHT @ 0x50003400
1,174,995 UART: [idev] ++
1,175,163 UART: [idev] CDI.KEYID = 6
1,175,523 UART: [idev] SUBJECT.KEYID = 7
1,175,947 UART: [idev] UDS.KEYID = 0
1,176,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,085 UART: [idev] Erasing UDS.KEYID = 0
1,201,372 UART: [idev] Sha1 KeyId Algorithm
1,209,624 UART: [idev] --
1,210,702 UART: [ldev] ++
1,210,870 UART: [ldev] CDI.KEYID = 6
1,211,233 UART: [ldev] SUBJECT.KEYID = 5
1,211,659 UART: [ldev] AUTHORITY.KEYID = 7
1,212,122 UART: [ldev] FE.KEYID = 1
1,217,366 UART: [ldev] Erasing FE.KEYID = 1
1,244,021 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,454 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,061 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,773 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,772 UART: [ldev] --
1,283,145 UART: [fwproc] Wait for Commands...
1,283,967 UART: [fwproc] Recv command 0x46574c44
1,284,695 UART: [fwproc] Recv'd Img size: 118548 bytes
1,320,622 UART: ROM Fatal Error: 0x000B001B
1,321,781 >>> mbox cmd response: failed
1,321,781 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,787 >>> mbox cmd response: failed
1,321,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,321,793 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,661 UART: [state] LifecycleState = Unprovisioned
86,316 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,183 UART: [kat] SHA2-256
893,833 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,958 UART: [kat] ++
898,110 UART: [kat] sha1
902,352 UART: [kat] SHA2-256
904,292 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,339 UART: [kat] HMAC-384Kdf
922,819 UART: [kat] LMS
1,171,147 UART: [kat] --
1,172,222 UART: [cold-reset] ++
1,172,612 UART: [fht] FHT @ 0x50003400
1,175,177 UART: [idev] ++
1,175,345 UART: [idev] CDI.KEYID = 6
1,175,705 UART: [idev] SUBJECT.KEYID = 7
1,176,129 UART: [idev] UDS.KEYID = 0
1,176,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,377 UART: [idev] Erasing UDS.KEYID = 0
1,202,126 UART: [idev] Sha1 KeyId Algorithm
1,210,558 UART: [idev] --
1,211,470 UART: [ldev] ++
1,211,638 UART: [ldev] CDI.KEYID = 6
1,212,001 UART: [ldev] SUBJECT.KEYID = 5
1,212,427 UART: [ldev] AUTHORITY.KEYID = 7
1,212,890 UART: [ldev] FE.KEYID = 1
1,218,058 UART: [ldev] Erasing FE.KEYID = 1
1,244,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,723 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,344 UART: [ldev] --
1,283,807 UART: [fwproc] Wait for Commands...
1,284,487 UART: [fwproc] Recv command 0x46574c44
1,285,215 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,583 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,800 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,970 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,199 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,175,120 >>> mbox cmd response: failed
1,175,120 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,126 >>> mbox cmd response: failed
1,175,126 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,175,132 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,106 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_invalid_arg ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,156 UART:
192,522 UART: Running Caliptra ROM ...
193,708 UART:
193,865 UART: [state] CFI Enabled
263,133 UART: [state] LifecycleState = Manufacturing
265,054 UART: [state] DebugLocked = No
268,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,441 UART: [kat] SHA2-256
443,148 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,648 UART: [kat] ++
454,186 UART: [kat] sha1
464,211 UART: [kat] SHA2-256
466,901 UART: [kat] SHA2-384
473,211 UART: [kat] SHA2-512-ACC
475,608 UART: [kat] ECC-384
2,766,229 UART: [kat] HMAC-384Kdf
2,779,551 UART: [kat] LMS
3,969,830 UART: [kat] --
3,973,240 UART: [cold-reset] ++
3,974,796 UART: [fht] Storing FHT @ 0x50003400
3,986,717 UART: [idev] ++
3,987,289 UART: [idev] CDI.KEYID = 6
3,988,228 UART: [idev] SUBJECT.KEYID = 7
3,989,518 UART: [idev] UDS.KEYID = 0
3,995,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,144,579 UART: [idev] Erasing UDS.KEYID = 0
7,326,295 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,794 UART: [idev] --
7,350,337 UART: [ldev] ++
7,350,968 UART: [ldev] CDI.KEYID = 6
7,351,853 UART: [ldev] SUBJECT.KEYID = 5
7,353,043 UART: [ldev] AUTHORITY.KEYID = 7
7,354,390 UART: [ldev] FE.KEYID = 1
7,402,496 UART: [ldev] Erasing FE.KEYID = 1
10,736,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,047,321 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,894 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,091,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,354 UART: [ldev] --
13,114,519 UART: [fwproc] Waiting for Commands...
13,116,731 UART: [fwproc] Received command 0x46574c44
13,118,978 UART: [fwproc] Received Image of size 118548 bytes
13,208,930 UART: ROM Fatal Error: 0x000B0005
13,212,407 >>> mbox cmd response: failed
13,212,858 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,213,190 >>> mbox cmd response: failed
13,213,459 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,213,755 >>> mbox cmd response: failed
Initializing fuses
2,063,305 writing to cptra_bootfsm_go
2,252,621 UART:
2,252,952 UART: Running Caliptra ROM ...
2,253,994 UART:
2,254,151 UART: [state] CFI Enabled
2,326,387 UART: [state] LifecycleState = Manufacturing
2,328,319 UART: [state] DebugLocked = No
2,330,515 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
2,336,275 UART: [kat] SHA2-256
2,505,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,516,464 UART: [kat] ++
2,516,924 UART: [kat] sha1
2,528,157 UART: [kat] SHA2-256
2,530,870 UART: [kat] SHA2-384
2,536,381 UART: [kat] SHA2-512-ACC
2,538,791 UART: [kat] ECC-384
4,830,116 UART: [kat] HMAC-384Kdf
4,860,494 UART: [kat] LMS
6,050,818 UART: [kat] --
6,056,199 UART: [cold-reset] ++
6,058,195 UART: [fht] Storing FHT @ 0x50003400
6,070,873 UART: [idev] ++
6,071,440 UART: [idev] CDI.KEYID = 6
6,072,382 UART: [idev] SUBJECT.KEYID = 7
6,073,650 UART: [idev] UDS.KEYID = 0
6,076,434 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,225,654 UART: [idev] Erasing UDS.KEYID = 0
9,406,995 UART: [idev] Using Sha1 for KeyId Algorithm
9,429,292 UART: [idev] --
9,433,834 UART: [ldev] ++
9,434,401 UART: [ldev] CDI.KEYID = 6
9,435,345 UART: [ldev] SUBJECT.KEYID = 5
9,436,600 UART: [ldev] AUTHORITY.KEYID = 7
9,437,843 UART: [ldev] FE.KEYID = 1
9,484,156 UART: [ldev] Erasing FE.KEYID = 1
12,817,105 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,131,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,145,864 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,160,693 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,175,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,193,111 UART: [ldev] --
15,198,545 UART: [fwproc] Waiting for Commands...
15,200,534 UART: [fwproc] Received command 0x46574c44
15,202,733 UART: [fwproc] Received Image of size 118548 bytes
19,340,702 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,418,968 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,492,150 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
19,820,478 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,931 writing to cptra_bootfsm_go
3,809,818 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,980,765 >>> mbox cmd response: failed
12,981,436 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,981,793 >>> mbox cmd response: failed
12,982,123 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
12,982,420 >>> mbox cmd response: failed
Initializing fuses
2,070,903 writing to cptra_bootfsm_go
5,863,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,074,717 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,394 writing to cptra_bootfsm_go
192,550 UART:
192,941 UART: Running Caliptra ROM ...
194,121 UART:
603,895 UART: [state] CFI Enabled
617,666 UART: [state] LifecycleState = Manufacturing
619,613 UART: [state] DebugLocked = No
621,432 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,516 UART: [kat] SHA2-256
795,300 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,858 UART: [kat] ++
806,392 UART: [kat] sha1
817,876 UART: [kat] SHA2-256
820,617 UART: [kat] SHA2-384
825,463 UART: [kat] SHA2-512-ACC
827,863 UART: [kat] ECC-384
3,113,637 UART: [kat] HMAC-384Kdf
3,125,046 UART: [kat] LMS
4,315,197 UART: [kat] --
4,320,783 UART: [cold-reset] ++
4,321,869 UART: [fht] Storing FHT @ 0x50003400
4,333,579 UART: [idev] ++
4,334,151 UART: [idev] CDI.KEYID = 6
4,335,177 UART: [idev] SUBJECT.KEYID = 7
4,336,350 UART: [idev] UDS.KEYID = 0
4,342,024 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,491,131 UART: [idev] Erasing UDS.KEYID = 0
7,626,761 UART: [idev] Using Sha1 for KeyId Algorithm
7,649,557 UART: [idev] --
7,652,371 UART: [ldev] ++
7,652,956 UART: [ldev] CDI.KEYID = 6
7,653,933 UART: [ldev] SUBJECT.KEYID = 5
7,655,163 UART: [ldev] AUTHORITY.KEYID = 7
7,656,428 UART: [ldev] FE.KEYID = 1
7,666,010 UART: [ldev] Erasing FE.KEYID = 1
10,957,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,808 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,403 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,235 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,752 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,827 UART: [ldev] --
13,314,860 UART: [fwproc] Waiting for Commands...
13,317,239 UART: [fwproc] Received command 0x46574c44
13,319,433 UART: [fwproc] Received Image of size 118548 bytes
13,413,757 UART: ROM Fatal Error: 0x000B0005
13,417,284 >>> mbox cmd response: failed
13,417,716 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,418,045 >>> mbox cmd response: failed
13,418,317 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,418,635 >>> mbox cmd response: failed
Initializing fuses
2,065,726 writing to cptra_bootfsm_go
2,255,008 UART:
2,255,354 UART: Running Caliptra ROM ...
2,256,502 UART:
7,048,145 UART: [state] CFI Enabled
7,066,190 UART: [state] LifecycleState = Manufacturing
7,068,123 UART: [state] DebugLocked = No
7,071,112 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,075,862 UART: [kat] SHA2-256
7,245,623 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,256,158 UART: [kat] ++
7,256,716 UART: [kat] sha1
7,268,157 UART: [kat] SHA2-256
7,270,853 UART: [kat] SHA2-384
7,277,171 UART: [kat] SHA2-512-ACC
7,279,535 UART: [kat] ECC-384
9,563,203 UART: [kat] HMAC-384Kdf
9,575,756 UART: [kat] LMS
10,765,865 UART: [kat] --
10,770,455 UART: [cold-reset] ++
10,771,794 UART: [fht] Storing FHT @ 0x50003400
10,783,288 UART: [idev] ++
10,783,865 UART: [idev] CDI.KEYID = 6
10,784,828 UART: [idev] SUBJECT.KEYID = 7
10,786,053 UART: [idev] UDS.KEYID = 0
10,789,020 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,938,026 UART: [idev] Erasing UDS.KEYID = 0
14,074,639 UART: [idev] Using Sha1 for KeyId Algorithm
14,096,306 UART: [idev] --
14,099,104 UART: [ldev] ++
14,099,700 UART: [ldev] CDI.KEYID = 6
14,100,651 UART: [ldev] SUBJECT.KEYID = 5
14,101,850 UART: [ldev] AUTHORITY.KEYID = 7
14,103,154 UART: [ldev] FE.KEYID = 1
14,115,672 UART: [ldev] Erasing FE.KEYID = 1
17,403,831 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,698,556 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,713,181 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,727,925 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,742,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,760,540 UART: [ldev] --
19,765,759 UART: [fwproc] Waiting for Commands...
19,767,583 UART: [fwproc] Received command 0x46574c44
19,769,788 UART: [fwproc] Received Image of size 118548 bytes
23,911,503 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,991,570 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,064,774 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
24,392,776 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
4,134,961 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,159,977 >>> mbox cmd response: failed
13,160,717 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,076 >>> mbox cmd response: failed
13,161,353 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
13,161,648 >>> mbox cmd response: failed
Initializing fuses
2,062,797 writing to cptra_bootfsm_go
10,833,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,910,128 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
192,207 UART:
192,572 UART: Running Caliptra ROM ...
193,710 UART:
193,863 UART: [state] CFI Enabled
263,698 UART: [state] LifecycleState = Manufacturing
265,711 UART: [state] DebugLocked = No
267,643 UART: [state] WD Timer not started. Device not locked for debugging
271,800 UART: [kat] SHA2-256
451,495 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,260 UART: [kat] ++
462,742 UART: [kat] sha1
473,406 UART: [kat] SHA2-256
476,099 UART: [kat] SHA2-384
481,388 UART: [kat] SHA2-512-ACC
483,785 UART: [kat] ECC-384
2,946,358 UART: [kat] HMAC-384Kdf
2,968,431 UART: [kat] LMS
3,444,969 UART: [kat] --
3,448,746 UART: [cold-reset] ++
3,450,408 UART: [fht] FHT @ 0x50003400
3,462,305 UART: [idev] ++
3,462,947 UART: [idev] CDI.KEYID = 6
3,463,860 UART: [idev] SUBJECT.KEYID = 7
3,465,074 UART: [idev] UDS.KEYID = 0
3,467,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,477 UART: [idev] Erasing UDS.KEYID = 0
5,986,359 UART: [idev] Sha1 KeyId Algorithm
6,009,870 UART: [idev] --
6,016,036 UART: [ldev] ++
6,016,618 UART: [ldev] CDI.KEYID = 6
6,017,538 UART: [ldev] SUBJECT.KEYID = 5
6,018,762 UART: [ldev] AUTHORITY.KEYID = 7
6,020,000 UART: [ldev] FE.KEYID = 1
6,057,089 UART: [ldev] Erasing FE.KEYID = 1
8,563,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,614 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,530 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,065 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,508 UART: [ldev] --
10,369,806 UART: [fwproc] Wait for Commands...
10,372,848 UART: [fwproc] Recv command 0x46574c44
10,374,845 UART: [fwproc] Recv'd Img size: 118548 bytes
10,481,214 UART: ROM Fatal Error: 0x000B0005
10,484,464 >>> mbox cmd response: failed
10,484,860 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,201 >>> mbox cmd response: failed
10,485,473 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,485,771 >>> mbox cmd response: failed
Initializing fuses
2,055,636 writing to cptra_bootfsm_go
2,244,917 UART:
2,245,257 UART: Running Caliptra ROM ...
2,246,402 UART:
2,246,575 UART: [state] CFI Enabled
2,319,127 UART: [state] LifecycleState = Manufacturing
2,321,062 UART: [state] DebugLocked = No
2,323,000 UART: [state] WD Timer not started. Device not locked for debugging
2,326,213 UART: [kat] SHA2-256
2,505,889 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,516,683 UART: [kat] ++
2,517,184 UART: [kat] sha1
2,528,533 UART: [kat] SHA2-256
2,531,246 UART: [kat] SHA2-384
2,536,974 UART: [kat] SHA2-512-ACC
2,539,348 UART: [kat] ECC-384
5,003,585 UART: [kat] HMAC-384Kdf
5,026,854 UART: [kat] LMS
5,503,355 UART: [kat] --
5,507,620 UART: [cold-reset] ++
5,509,240 UART: [fht] FHT @ 0x50003400
5,520,815 UART: [idev] ++
5,521,388 UART: [idev] CDI.KEYID = 6
5,522,407 UART: [idev] SUBJECT.KEYID = 7
5,523,570 UART: [idev] UDS.KEYID = 0
5,526,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,675,725 UART: [idev] Erasing UDS.KEYID = 0
8,043,426 UART: [idev] Sha1 KeyId Algorithm
8,067,923 UART: [idev] --
8,073,767 UART: [ldev] ++
8,074,345 UART: [ldev] CDI.KEYID = 6
8,075,284 UART: [ldev] SUBJECT.KEYID = 5
8,076,455 UART: [ldev] AUTHORITY.KEYID = 7
8,077,752 UART: [ldev] FE.KEYID = 1
8,113,152 UART: [ldev] Erasing FE.KEYID = 1
10,617,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,356,381 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,372,301 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,388,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,403,712 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,425,425 UART: [ldev] --
12,430,426 UART: [fwproc] Wait for Commands...
12,432,794 UART: [fwproc] Recv command 0x46574c44
12,434,785 UART: [fwproc] Recv'd Img size: 118548 bytes
15,950,838 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,029,706 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,102,701 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,431,652 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.46s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,104 writing to cptra_bootfsm_go
3,465,355 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,374,688 >>> mbox cmd response: failed
10,375,361 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,375,740 >>> mbox cmd response: failed
10,376,018 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,376,324 >>> mbox cmd response: failed
Initializing fuses
2,064,958 writing to cptra_bootfsm_go
5,519,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,353,424 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.45s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,298 writing to cptra_bootfsm_go
192,569 UART:
192,948 UART: Running Caliptra ROM ...
194,120 UART:
603,755 UART: [state] CFI Enabled
618,035 UART: [state] LifecycleState = Manufacturing
619,942 UART: [state] DebugLocked = No
622,892 UART: [state] WD Timer not started. Device not locked for debugging
627,269 UART: [kat] SHA2-256
806,913 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,723 UART: [kat] ++
818,261 UART: [kat] sha1
828,988 UART: [kat] SHA2-256
831,673 UART: [kat] SHA2-384
838,308 UART: [kat] SHA2-512-ACC
840,650 UART: [kat] ECC-384
3,282,714 UART: [kat] HMAC-384Kdf
3,294,724 UART: [kat] LMS
3,771,218 UART: [kat] --
3,775,373 UART: [cold-reset] ++
3,777,208 UART: [fht] FHT @ 0x50003400
3,787,761 UART: [idev] ++
3,788,386 UART: [idev] CDI.KEYID = 6
3,789,305 UART: [idev] SUBJECT.KEYID = 7
3,790,582 UART: [idev] UDS.KEYID = 0
3,793,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,859 UART: [idev] Erasing UDS.KEYID = 0
6,266,492 UART: [idev] Sha1 KeyId Algorithm
6,290,158 UART: [idev] --
6,295,769 UART: [ldev] ++
6,296,343 UART: [ldev] CDI.KEYID = 6
6,297,262 UART: [ldev] SUBJECT.KEYID = 5
6,298,480 UART: [ldev] AUTHORITY.KEYID = 7
6,299,717 UART: [ldev] FE.KEYID = 1
6,313,232 UART: [ldev] Erasing FE.KEYID = 1
8,793,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,411 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,232 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,842 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,415 UART: [ldev] --
10,588,201 UART: [fwproc] Wait for Commands...
10,590,317 UART: [fwproc] Recv command 0x46574c44
10,592,307 UART: [fwproc] Recv'd Img size: 118548 bytes
10,696,498 UART: ROM Fatal Error: 0x000B0005
10,699,752 >>> mbox cmd response: failed
10,700,163 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,700,502 >>> mbox cmd response: failed
10,700,772 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,701,072 >>> mbox cmd response: failed
Initializing fuses
2,058,385 writing to cptra_bootfsm_go
2,247,685 UART:
2,248,057 UART: Running Caliptra ROM ...
2,249,200 UART:
9,769,598 UART: [state] CFI Enabled
9,783,216 UART: [state] LifecycleState = Manufacturing
9,785,144 UART: [state] DebugLocked = No
9,786,322 UART: [state] WD Timer not started. Device not locked for debugging
9,790,119 UART: [kat] SHA2-256
9,969,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
9,980,545 UART: [kat] ++
9,981,008 UART: [kat] sha1
9,992,769 UART: [kat] SHA2-256
9,995,467 UART: [kat] SHA2-384
10,000,651 UART: [kat] SHA2-512-ACC
10,003,011 UART: [kat] ECC-384
12,442,892 UART: [kat] HMAC-384Kdf
12,456,686 UART: [kat] LMS
12,933,169 UART: [kat] --
12,937,774 UART: [cold-reset] ++
12,939,012 UART: [fht] FHT @ 0x50003400
12,950,343 UART: [idev] ++
12,950,917 UART: [idev] CDI.KEYID = 6
12,951,858 UART: [idev] SUBJECT.KEYID = 7
12,953,130 UART: [idev] UDS.KEYID = 0
12,955,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,104,994 UART: [idev] Erasing UDS.KEYID = 0
15,428,885 UART: [idev] Sha1 KeyId Algorithm
15,453,086 UART: [idev] --
15,457,573 UART: [ldev] ++
15,458,146 UART: [ldev] CDI.KEYID = 6
15,459,118 UART: [ldev] SUBJECT.KEYID = 5
15,460,282 UART: [ldev] AUTHORITY.KEYID = 7
15,461,572 UART: [ldev] FE.KEYID = 1
15,473,438 UART: [ldev] Erasing FE.KEYID = 1
17,953,912 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,673,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,688,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,704,792 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,720,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,741,690 UART: [ldev] --
19,747,385 UART: [fwproc] Wait for Commands...
19,749,915 UART: [fwproc] Recv command 0x46574c44
19,751,961 UART: [fwproc] Recv'd Img size: 118548 bytes
23,262,711 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,339,409 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,412,432 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
23,739,887 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,779,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,582,024 >>> mbox cmd response: failed
10,582,580 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,582,951 >>> mbox cmd response: failed
10,583,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,583,521 >>> mbox cmd response: failed
Initializing fuses
2,067,813 writing to cptra_bootfsm_go
13,058,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
23,754,869 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
192,126 UART:
192,491 UART: Running Caliptra ROM ...
193,596 UART:
193,758 UART: [state] CFI Enabled
261,217 UART: [state] LifecycleState = Manufacturing
263,586 UART: [state] DebugLocked = No
265,152 UART: [state] WD Timer not started. Device not locked for debugging
269,100 UART: [kat] SHA2-256
458,978 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,743 UART: [kat] ++
470,194 UART: [kat] sha1
480,969 UART: [kat] SHA2-256
483,975 UART: [kat] SHA2-384
489,903 UART: [kat] SHA2-512-ACC
492,468 UART: [kat] ECC-384
2,947,923 UART: [kat] HMAC-384Kdf
2,968,379 UART: [kat] LMS
3,500,163 UART: [kat] --
3,504,488 UART: [cold-reset] ++
3,506,985 UART: [fht] FHT @ 0x50003400
3,518,669 UART: [idev] ++
3,519,360 UART: [idev] CDI.KEYID = 6
3,520,332 UART: [idev] SUBJECT.KEYID = 7
3,521,494 UART: [idev] UDS.KEYID = 0
3,527,096 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,676,423 UART: [idev] Erasing UDS.KEYID = 0
6,025,861 UART: [idev] Sha1 KeyId Algorithm
6,048,517 UART: [idev] --
6,052,790 UART: [ldev] ++
6,053,480 UART: [ldev] CDI.KEYID = 6
6,054,394 UART: [ldev] SUBJECT.KEYID = 5
6,055,558 UART: [ldev] AUTHORITY.KEYID = 7
6,056,799 UART: [ldev] FE.KEYID = 1
6,097,649 UART: [ldev] Erasing FE.KEYID = 1
8,601,359 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,705 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,909 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,787 UART: [ldev] --
10,413,868 UART: [fwproc] Wait for Commands...
10,415,269 UART: [fwproc] Recv command 0x46574c44
10,417,583 UART: [fwproc] Recv'd Img size: 118548 bytes
10,541,623 UART: ROM Fatal Error: 0x000B0005
10,545,257 >>> mbox cmd response: failed
10,545,695 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,039 >>> mbox cmd response: failed
10,546,314 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,546,607 >>> mbox cmd response: failed
Initializing fuses
2,064,119 writing to cptra_bootfsm_go
2,253,452 UART:
2,253,805 UART: Running Caliptra ROM ...
2,254,942 UART:
2,255,131 UART: [state] CFI Enabled
2,314,513 UART: [state] LifecycleState = Manufacturing
2,316,938 UART: [state] DebugLocked = No
2,319,629 UART: [state] WD Timer not started. Device not locked for debugging
2,323,648 UART: [kat] SHA2-256
2,513,548 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,524,302 UART: [kat] ++
2,524,828 UART: [kat] sha1
2,536,691 UART: [kat] SHA2-256
2,539,679 UART: [kat] SHA2-384
2,545,084 UART: [kat] SHA2-512-ACC
2,547,713 UART: [kat] ECC-384
5,001,091 UART: [kat] HMAC-384Kdf
5,024,034 UART: [kat] LMS
5,555,785 UART: [kat] --
5,561,654 UART: [cold-reset] ++
5,562,756 UART: [fht] FHT @ 0x50003400
5,574,027 UART: [idev] ++
5,574,714 UART: [idev] CDI.KEYID = 6
5,575,847 UART: [idev] SUBJECT.KEYID = 7
5,576,957 UART: [idev] UDS.KEYID = 0
5,579,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,729,049 UART: [idev] Erasing UDS.KEYID = 0
8,079,058 UART: [idev] Sha1 KeyId Algorithm
8,101,287 UART: [idev] --
8,105,018 UART: [ldev] ++
8,105,710 UART: [ldev] CDI.KEYID = 6
8,106,625 UART: [ldev] SUBJECT.KEYID = 5
8,107,790 UART: [ldev] AUTHORITY.KEYID = 7
8,109,025 UART: [ldev] FE.KEYID = 1
8,151,980 UART: [ldev] Erasing FE.KEYID = 1
10,660,054 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
12,398,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
12,413,473 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
12,428,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
12,443,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
12,465,456 UART: [ldev] --
12,471,072 UART: [fwproc] Wait for Commands...
12,472,643 UART: [fwproc] Recv command 0x46574c44
12,474,906 UART: [fwproc] Recv'd Img size: 118548 bytes
16,002,570 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,080,544 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,204,113 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,765,296 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
3,457,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,365,069 >>> mbox cmd response: failed
10,366,267 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,366,646 >>> mbox cmd response: failed
10,366,921 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,367,214 >>> mbox cmd response: failed
Initializing fuses
2,060,081 writing to cptra_bootfsm_go
5,484,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,906,773 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.48s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,559 UART:
192,924 UART: Running Caliptra ROM ...
194,052 UART:
603,731 UART: [state] CFI Enabled
616,761 UART: [state] LifecycleState = Manufacturing
619,099 UART: [state] DebugLocked = No
621,893 UART: [state] WD Timer not started. Device not locked for debugging
626,909 UART: [kat] SHA2-256
816,804 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,618 UART: [kat] ++
828,127 UART: [kat] sha1
839,444 UART: [kat] SHA2-256
842,459 UART: [kat] SHA2-384
849,530 UART: [kat] SHA2-512-ACC
852,124 UART: [kat] ECC-384
3,294,121 UART: [kat] HMAC-384Kdf
3,307,077 UART: [kat] LMS
3,838,881 UART: [kat] --
3,843,414 UART: [cold-reset] ++
3,844,922 UART: [fht] FHT @ 0x50003400
3,856,883 UART: [idev] ++
3,857,564 UART: [idev] CDI.KEYID = 6
3,858,531 UART: [idev] SUBJECT.KEYID = 7
3,859,745 UART: [idev] UDS.KEYID = 0
3,865,578 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,014,533 UART: [idev] Erasing UDS.KEYID = 0
6,337,238 UART: [idev] Sha1 KeyId Algorithm
6,358,627 UART: [idev] --
6,363,469 UART: [ldev] ++
6,364,189 UART: [ldev] CDI.KEYID = 6
6,365,126 UART: [ldev] SUBJECT.KEYID = 5
6,366,294 UART: [ldev] AUTHORITY.KEYID = 7
6,367,474 UART: [ldev] FE.KEYID = 1
6,377,313 UART: [ldev] Erasing FE.KEYID = 1
8,848,493 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,351 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,738 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,635,457 UART: [ldev] --
10,640,346 UART: [fwproc] Wait for Commands...
10,641,862 UART: [fwproc] Recv command 0x46574c44
10,643,856 UART: [fwproc] Recv'd Img size: 118548 bytes
10,761,678 UART: ROM Fatal Error: 0x000B0005
10,765,327 >>> mbox cmd response: failed
10,765,787 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,126 >>> mbox cmd response: failed
10,766,405 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,766,706 >>> mbox cmd response: failed
Initializing fuses
2,058,013 writing to cptra_bootfsm_go
2,247,333 UART:
2,247,678 UART: Running Caliptra ROM ...
2,248,825 UART:
9,699,062 UART: [state] CFI Enabled
9,714,858 UART: [state] LifecycleState = Manufacturing
9,717,217 UART: [state] DebugLocked = No
9,718,668 UART: [state] WD Timer not started. Device not locked for debugging
9,722,658 UART: [kat] SHA2-256
9,912,515 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
9,923,327 UART: [kat] ++
9,923,797 UART: [kat] sha1
9,935,502 UART: [kat] SHA2-256
9,938,527 UART: [kat] SHA2-384
9,944,311 UART: [kat] SHA2-512-ACC
9,946,894 UART: [kat] ECC-384
12,386,899 UART: [kat] HMAC-384Kdf
12,400,811 UART: [kat] LMS
12,932,609 UART: [kat] --
12,938,983 UART: [cold-reset] ++
12,939,872 UART: [fht] FHT @ 0x50003400
12,952,110 UART: [idev] ++
12,952,790 UART: [idev] CDI.KEYID = 6
12,953,807 UART: [idev] SUBJECT.KEYID = 7
12,954,913 UART: [idev] UDS.KEYID = 0
12,958,199 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,107,416 UART: [idev] Erasing UDS.KEYID = 0
15,433,145 UART: [idev] Sha1 KeyId Algorithm
15,454,448 UART: [idev] --
15,458,867 UART: [ldev] ++
15,459,546 UART: [ldev] CDI.KEYID = 6
15,460,434 UART: [ldev] SUBJECT.KEYID = 5
15,461,648 UART: [ldev] AUTHORITY.KEYID = 7
15,462,885 UART: [ldev] FE.KEYID = 1
15,475,126 UART: [ldev] Erasing FE.KEYID = 1
17,951,107 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
19,671,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,686,348 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,701,525 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,716,636 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,736,760 UART: [ldev] --
19,742,887 UART: [fwproc] Wait for Commands...
19,744,946 UART: [fwproc] Recv command 0x46574c44
19,747,273 UART: [fwproc] Recv'd Img size: 118548 bytes
23,284,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
23,360,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
23,484,014 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
24,044,233 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,175 writing to cptra_bootfsm_go
3,761,066 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
10,567,662 >>> mbox cmd response: failed
10,568,292 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,568,659 >>> mbox cmd response: failed
10,569,008 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
10,569,317 >>> mbox cmd response: failed
Initializing fuses
2,058,563 writing to cptra_bootfsm_go
13,055,254 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
24,390,967 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,060 UART: [state] LifecycleState = Manufacturing
85,715 UART: [state] DebugLocked = No
86,335 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,301 UART: [kat] SHA2-256
892,239 UART: [kat] SHA2-384
895,074 UART: [kat] SHA2-512-ACC
896,975 UART: [kat] ECC-384
902,518 UART: [kat] HMAC-384Kdf
907,150 UART: [kat] LMS
1,475,346 UART: [kat] --
1,476,527 UART: [cold-reset] ++
1,476,909 UART: [fht] Storing FHT @ 0x50003400
1,479,510 UART: [idev] ++
1,479,678 UART: [idev] CDI.KEYID = 6
1,480,038 UART: [idev] SUBJECT.KEYID = 7
1,480,462 UART: [idev] UDS.KEYID = 0
1,480,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,456 UART: [idev] Erasing UDS.KEYID = 0
1,505,014 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,550 UART: [idev] --
1,514,659 UART: [ldev] ++
1,514,827 UART: [ldev] CDI.KEYID = 6
1,515,190 UART: [ldev] SUBJECT.KEYID = 5
1,515,616 UART: [ldev] AUTHORITY.KEYID = 7
1,516,079 UART: [ldev] FE.KEYID = 1
1,521,325 UART: [ldev] Erasing FE.KEYID = 1
1,546,466 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,613 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,504 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,262 UART: [ldev] --
1,585,529 UART: [fwproc] Waiting for Commands...
1,586,174 UART: [fwproc] Received command 0x46574c44
1,586,965 UART: [fwproc] Received Image of size 118548 bytes
1,632,062 UART: ROM Fatal Error: 0x000B0005
1,633,219 >>> mbox cmd response: failed
1,633,219 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,225 >>> mbox cmd response: failed
1,633,225 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,231 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,116 UART: [state] LifecycleState = Unprovisioned
85,771 UART: [state] DebugLocked = No
86,415 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,033 UART: [kat] SHA2-256
881,964 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,079 UART: [kat] ++
886,231 UART: [kat] sha1
890,385 UART: [kat] SHA2-256
892,323 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,776 UART: [kat] HMAC-384Kdf
907,276 UART: [kat] LMS
1,475,472 UART: [kat] --
1,476,171 UART: [cold-reset] ++
1,476,529 UART: [fht] Storing FHT @ 0x50003400
1,479,502 UART: [idev] ++
1,479,670 UART: [idev] CDI.KEYID = 6
1,480,030 UART: [idev] SUBJECT.KEYID = 7
1,480,454 UART: [idev] UDS.KEYID = 0
1,480,799 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,464 UART: [idev] Erasing UDS.KEYID = 0
1,505,278 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,876 UART: [idev] --
1,514,919 UART: [ldev] ++
1,515,087 UART: [ldev] CDI.KEYID = 6
1,515,450 UART: [ldev] SUBJECT.KEYID = 5
1,515,876 UART: [ldev] AUTHORITY.KEYID = 7
1,516,339 UART: [ldev] FE.KEYID = 1
1,521,417 UART: [ldev] Erasing FE.KEYID = 1
1,547,070 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,881 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,597 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,488 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,466 UART: [ldev] --
1,586,831 UART: [fwproc] Waiting for Commands...
1,587,632 UART: [fwproc] Received command 0x46574c44
1,588,423 UART: [fwproc] Received Image of size 118548 bytes
2,932,914 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,982 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,200 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,401 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,486,804 >>> mbox cmd response: failed
1,486,804 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,810 >>> mbox cmd response: failed
1,486,810 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,486,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,269 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,669 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Manufacturing
86,172 UART: [state] DebugLocked = No
86,772 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,384 UART: [kat] SHA2-256
882,315 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,430 UART: [kat] ++
886,582 UART: [kat] sha1
890,944 UART: [kat] SHA2-256
892,882 UART: [kat] SHA2-384
895,587 UART: [kat] SHA2-512-ACC
897,488 UART: [kat] ECC-384
902,733 UART: [kat] HMAC-384Kdf
907,369 UART: [kat] LMS
1,475,565 UART: [kat] --
1,476,396 UART: [cold-reset] ++
1,476,834 UART: [fht] Storing FHT @ 0x50003400
1,479,633 UART: [idev] ++
1,479,801 UART: [idev] CDI.KEYID = 6
1,480,161 UART: [idev] SUBJECT.KEYID = 7
1,480,585 UART: [idev] UDS.KEYID = 0
1,480,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,003 UART: [idev] Erasing UDS.KEYID = 0
1,505,729 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,313 UART: [idev] --
1,515,334 UART: [ldev] ++
1,515,502 UART: [ldev] CDI.KEYID = 6
1,515,865 UART: [ldev] SUBJECT.KEYID = 5
1,516,291 UART: [ldev] AUTHORITY.KEYID = 7
1,516,754 UART: [ldev] FE.KEYID = 1
1,522,148 UART: [ldev] Erasing FE.KEYID = 1
1,546,577 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,784 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,500 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,041 UART: [ldev] --
1,585,544 UART: [fwproc] Waiting for Commands...
1,586,261 UART: [fwproc] Received command 0x46574c44
1,587,052 UART: [fwproc] Received Image of size 118548 bytes
1,632,065 UART: ROM Fatal Error: 0x000B0005
1,633,222 >>> mbox cmd response: failed
1,633,222 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,228 >>> mbox cmd response: failed
1,633,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,633,234 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,115 UART: [state] LifecycleState = Unprovisioned
85,770 UART: [state] DebugLocked = No
86,478 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,070 UART: [kat] SHA2-256
882,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,116 UART: [kat] ++
886,268 UART: [kat] sha1
890,624 UART: [kat] SHA2-256
892,562 UART: [kat] SHA2-384
895,199 UART: [kat] SHA2-512-ACC
897,100 UART: [kat] ECC-384
902,699 UART: [kat] HMAC-384Kdf
907,531 UART: [kat] LMS
1,475,727 UART: [kat] --
1,476,620 UART: [cold-reset] ++
1,476,996 UART: [fht] Storing FHT @ 0x50003400
1,479,883 UART: [idev] ++
1,480,051 UART: [idev] CDI.KEYID = 6
1,480,411 UART: [idev] SUBJECT.KEYID = 7
1,480,835 UART: [idev] UDS.KEYID = 0
1,481,180 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,093 UART: [idev] Erasing UDS.KEYID = 0
1,506,051 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,815 UART: [idev] --
1,515,958 UART: [ldev] ++
1,516,126 UART: [ldev] CDI.KEYID = 6
1,516,489 UART: [ldev] SUBJECT.KEYID = 5
1,516,915 UART: [ldev] AUTHORITY.KEYID = 7
1,517,378 UART: [ldev] FE.KEYID = 1
1,522,720 UART: [ldev] Erasing FE.KEYID = 1
1,548,163 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,606 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,322 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,925 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,047 UART: [ldev] --
1,587,470 UART: [fwproc] Waiting for Commands...
1,588,205 UART: [fwproc] Received command 0x46574c44
1,588,996 UART: [fwproc] Received Image of size 118548 bytes
2,933,735 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,247 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,882 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,346 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,484,501 >>> mbox cmd response: failed
1,484,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,507 >>> mbox cmd response: failed
1,484,507 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,484,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,112 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,860 UART: [state] LifecycleState = Manufacturing
85,515 UART: [state] DebugLocked = No
86,173 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
890,838 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,942 UART: [kat] ++
895,094 UART: [kat] sha1
899,326 UART: [kat] SHA2-256
901,266 UART: [kat] SHA2-384
903,863 UART: [kat] SHA2-512-ACC
905,764 UART: [kat] ECC-384
915,595 UART: [kat] HMAC-384Kdf
920,137 UART: [kat] LMS
1,168,449 UART: [kat] --
1,169,046 UART: [cold-reset] ++
1,169,398 UART: [fht] FHT @ 0x50003400
1,171,850 UART: [idev] ++
1,172,018 UART: [idev] CDI.KEYID = 6
1,172,379 UART: [idev] SUBJECT.KEYID = 7
1,172,804 UART: [idev] UDS.KEYID = 0
1,173,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,179 UART: [idev] Erasing UDS.KEYID = 0
1,197,839 UART: [idev] Sha1 KeyId Algorithm
1,206,751 UART: [idev] --
1,207,922 UART: [ldev] ++
1,208,090 UART: [ldev] CDI.KEYID = 6
1,208,454 UART: [ldev] SUBJECT.KEYID = 5
1,208,881 UART: [ldev] AUTHORITY.KEYID = 7
1,209,344 UART: [ldev] FE.KEYID = 1
1,214,546 UART: [ldev] Erasing FE.KEYID = 1
1,240,315 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,607 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,212 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,270,924 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,277,980 UART: [ldev] --
1,279,291 UART: [fwproc] Wait for Commands...
1,279,902 UART: [fwproc] Recv command 0x46574c44
1,280,635 UART: [fwproc] Recv'd Img size: 118548 bytes
1,325,127 UART: ROM Fatal Error: 0x000B0005
1,326,284 >>> mbox cmd response: failed
1,326,284 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,290 >>> mbox cmd response: failed
1,326,290 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,326,296 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,489 UART: [state] WD Timer not started. Device not locked for debugging
87,614 UART: [kat] SHA2-256
891,164 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,268 UART: [kat] ++
895,420 UART: [kat] sha1
899,826 UART: [kat] SHA2-256
901,766 UART: [kat] SHA2-384
904,655 UART: [kat] SHA2-512-ACC
906,556 UART: [kat] ECC-384
916,483 UART: [kat] HMAC-384Kdf
921,011 UART: [kat] LMS
1,169,323 UART: [kat] --
1,170,234 UART: [cold-reset] ++
1,170,576 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,977 UART: [idev] Erasing UDS.KEYID = 0
1,199,149 UART: [idev] Sha1 KeyId Algorithm
1,207,933 UART: [idev] --
1,208,822 UART: [ldev] ++
1,208,990 UART: [ldev] CDI.KEYID = 6
1,209,354 UART: [ldev] SUBJECT.KEYID = 5
1,209,781 UART: [ldev] AUTHORITY.KEYID = 7
1,210,244 UART: [ldev] FE.KEYID = 1
1,215,252 UART: [ldev] Erasing FE.KEYID = 1
1,241,469 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,975 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,691 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,332 UART: [ldev] --
1,280,691 UART: [fwproc] Wait for Commands...
1,281,310 UART: [fwproc] Recv command 0x46574c44
1,282,043 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,861 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,334 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,509 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,823,884 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,643 >>> mbox cmd response: failed
1,183,643 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,649 >>> mbox cmd response: failed
1,183,649 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,183,655 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,933 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,669 UART: [state] LifecycleState = Manufacturing
86,324 UART: [state] DebugLocked = No
87,036 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
891,765 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,869 UART: [kat] ++
896,021 UART: [kat] sha1
900,385 UART: [kat] SHA2-256
902,325 UART: [kat] SHA2-384
905,240 UART: [kat] SHA2-512-ACC
907,141 UART: [kat] ECC-384
917,022 UART: [kat] HMAC-384Kdf
921,528 UART: [kat] LMS
1,169,840 UART: [kat] --
1,170,759 UART: [cold-reset] ++
1,171,263 UART: [fht] FHT @ 0x50003400
1,174,069 UART: [idev] ++
1,174,237 UART: [idev] CDI.KEYID = 6
1,174,598 UART: [idev] SUBJECT.KEYID = 7
1,175,023 UART: [idev] UDS.KEYID = 0
1,175,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,626 UART: [idev] Erasing UDS.KEYID = 0
1,199,504 UART: [idev] Sha1 KeyId Algorithm
1,208,148 UART: [idev] --
1,209,209 UART: [ldev] ++
1,209,377 UART: [ldev] CDI.KEYID = 6
1,209,741 UART: [ldev] SUBJECT.KEYID = 5
1,210,168 UART: [ldev] AUTHORITY.KEYID = 7
1,210,631 UART: [ldev] FE.KEYID = 1
1,216,089 UART: [ldev] Erasing FE.KEYID = 1
1,242,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,600 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,205 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,917 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,875 UART: [ldev] --
1,281,320 UART: [fwproc] Wait for Commands...
1,282,075 UART: [fwproc] Recv command 0x46574c44
1,282,808 UART: [fwproc] Recv'd Img size: 118548 bytes
1,327,706 UART: ROM Fatal Error: 0x000B0005
1,328,863 >>> mbox cmd response: failed
1,328,863 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,869 >>> mbox cmd response: failed
1,328,869 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,328,875 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,267 UART: [state] LifecycleState = Unprovisioned
85,922 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,801 UART: [kat] SHA2-256
891,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,455 UART: [kat] ++
895,607 UART: [kat] sha1
899,731 UART: [kat] SHA2-256
901,671 UART: [kat] SHA2-384
904,470 UART: [kat] SHA2-512-ACC
906,371 UART: [kat] ECC-384
916,004 UART: [kat] HMAC-384Kdf
920,734 UART: [kat] LMS
1,169,046 UART: [kat] --
1,169,981 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,172,999 UART: [idev] ++
1,173,167 UART: [idev] CDI.KEYID = 6
1,173,528 UART: [idev] SUBJECT.KEYID = 7
1,173,953 UART: [idev] UDS.KEYID = 0
1,174,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,912 UART: [idev] Erasing UDS.KEYID = 0
1,198,744 UART: [idev] Sha1 KeyId Algorithm
1,207,412 UART: [idev] --
1,208,467 UART: [ldev] ++
1,208,635 UART: [ldev] CDI.KEYID = 6
1,208,999 UART: [ldev] SUBJECT.KEYID = 5
1,209,426 UART: [ldev] AUTHORITY.KEYID = 7
1,209,889 UART: [ldev] FE.KEYID = 1
1,215,229 UART: [ldev] Erasing FE.KEYID = 1
1,241,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,794 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,510 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,399 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,111 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,161 UART: [ldev] --
1,280,494 UART: [fwproc] Wait for Commands...
1,281,191 UART: [fwproc] Recv command 0x46574c44
1,281,924 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,894 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,287 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,462 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,707 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,004 >>> mbox cmd response: failed
1,185,004 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,010 >>> mbox cmd response: failed
1,185,010 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,928 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,642 UART: [state] LifecycleState = Manufacturing
86,297 UART: [state] DebugLocked = No
87,009 UART: [state] WD Timer not started. Device not locked for debugging
88,292 UART: [kat] SHA2-256
893,942 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,067 UART: [kat] ++
898,219 UART: [kat] sha1
902,359 UART: [kat] SHA2-256
904,299 UART: [kat] SHA2-384
907,034 UART: [kat] SHA2-512-ACC
908,935 UART: [kat] ECC-384
918,312 UART: [kat] HMAC-384Kdf
922,838 UART: [kat] LMS
1,171,166 UART: [kat] --
1,172,005 UART: [cold-reset] ++
1,172,543 UART: [fht] FHT @ 0x50003400
1,174,976 UART: [idev] ++
1,175,144 UART: [idev] CDI.KEYID = 6
1,175,504 UART: [idev] SUBJECT.KEYID = 7
1,175,928 UART: [idev] UDS.KEYID = 0
1,176,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,106 UART: [idev] Erasing UDS.KEYID = 0
1,200,811 UART: [idev] Sha1 KeyId Algorithm
1,209,307 UART: [idev] --
1,210,385 UART: [ldev] ++
1,210,553 UART: [ldev] CDI.KEYID = 6
1,210,916 UART: [ldev] SUBJECT.KEYID = 5
1,211,342 UART: [ldev] AUTHORITY.KEYID = 7
1,211,805 UART: [ldev] FE.KEYID = 1
1,217,145 UART: [ldev] Erasing FE.KEYID = 1
1,243,656 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,433 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,552 UART: [fwproc] Recv command 0x46574c44
1,284,280 UART: [fwproc] Recv'd Img size: 118548 bytes
1,328,891 UART: ROM Fatal Error: 0x000B0005
1,330,048 >>> mbox cmd response: failed
1,330,048 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,054 >>> mbox cmd response: failed
1,330,054 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,330,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,862 UART: [state] LifecycleState = Unprovisioned
85,517 UART: [state] DebugLocked = No
86,199 UART: [state] WD Timer not started. Device not locked for debugging
87,414 UART: [kat] SHA2-256
893,064 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,189 UART: [kat] ++
897,341 UART: [kat] sha1
901,503 UART: [kat] SHA2-256
903,443 UART: [kat] SHA2-384
905,982 UART: [kat] SHA2-512-ACC
907,883 UART: [kat] ECC-384
917,530 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,219 UART: [cold-reset] ++
1,171,635 UART: [fht] FHT @ 0x50003400
1,174,168 UART: [idev] ++
1,174,336 UART: [idev] CDI.KEYID = 6
1,174,696 UART: [idev] SUBJECT.KEYID = 7
1,175,120 UART: [idev] UDS.KEYID = 0
1,175,465 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,238 UART: [idev] Erasing UDS.KEYID = 0
1,200,233 UART: [idev] Sha1 KeyId Algorithm
1,208,781 UART: [idev] --
1,209,847 UART: [ldev] ++
1,210,015 UART: [ldev] CDI.KEYID = 6
1,210,378 UART: [ldev] SUBJECT.KEYID = 5
1,210,804 UART: [ldev] AUTHORITY.KEYID = 7
1,211,267 UART: [ldev] FE.KEYID = 1
1,216,279 UART: [ldev] Erasing FE.KEYID = 1
1,242,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,387 UART: [ldev] --
1,281,690 UART: [fwproc] Wait for Commands...
1,282,378 UART: [fwproc] Recv command 0x46574c44
1,283,106 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,639 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,809 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,188 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,391 >>> mbox cmd response: failed
1,185,391 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,397 >>> mbox cmd response: failed
1,185,397 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,185,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,285 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,963 UART: [state] LifecycleState = Manufacturing
86,618 UART: [state] DebugLocked = No
87,112 UART: [state] WD Timer not started. Device not locked for debugging
88,229 UART: [kat] SHA2-256
893,879 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,004 UART: [kat] ++
898,156 UART: [kat] sha1
902,490 UART: [kat] SHA2-256
904,430 UART: [kat] SHA2-384
907,369 UART: [kat] SHA2-512-ACC
909,270 UART: [kat] ECC-384
919,387 UART: [kat] HMAC-384Kdf
923,953 UART: [kat] LMS
1,172,281 UART: [kat] --
1,173,332 UART: [cold-reset] ++
1,173,660 UART: [fht] FHT @ 0x50003400
1,176,313 UART: [idev] ++
1,176,481 UART: [idev] CDI.KEYID = 6
1,176,841 UART: [idev] SUBJECT.KEYID = 7
1,177,265 UART: [idev] UDS.KEYID = 0
1,177,610 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,565 UART: [idev] Erasing UDS.KEYID = 0
1,202,672 UART: [idev] Sha1 KeyId Algorithm
1,211,082 UART: [idev] --
1,212,120 UART: [ldev] ++
1,212,288 UART: [ldev] CDI.KEYID = 6
1,212,651 UART: [ldev] SUBJECT.KEYID = 5
1,213,077 UART: [ldev] AUTHORITY.KEYID = 7
1,213,540 UART: [ldev] FE.KEYID = 1
1,218,838 UART: [ldev] Erasing FE.KEYID = 1
1,244,997 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,836 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,443 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,212 UART: [ldev] --
1,284,575 UART: [fwproc] Wait for Commands...
1,285,325 UART: [fwproc] Recv command 0x46574c44
1,286,053 UART: [fwproc] Recv'd Img size: 118548 bytes
1,331,334 UART: ROM Fatal Error: 0x000B0005
1,332,491 >>> mbox cmd response: failed
1,332,491 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,497 >>> mbox cmd response: failed
1,332,497 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,332,503 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,419 UART: [state] LifecycleState = Unprovisioned
86,074 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,727 UART: [kat] SHA2-256
893,377 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,502 UART: [kat] ++
897,654 UART: [kat] sha1
901,742 UART: [kat] SHA2-256
903,682 UART: [kat] SHA2-384
906,319 UART: [kat] SHA2-512-ACC
908,220 UART: [kat] ECC-384
917,845 UART: [kat] HMAC-384Kdf
922,427 UART: [kat] LMS
1,170,755 UART: [kat] --
1,171,580 UART: [cold-reset] ++
1,171,924 UART: [fht] FHT @ 0x50003400
1,174,649 UART: [idev] ++
1,174,817 UART: [idev] CDI.KEYID = 6
1,175,177 UART: [idev] SUBJECT.KEYID = 7
1,175,601 UART: [idev] UDS.KEYID = 0
1,175,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,909 UART: [idev] Erasing UDS.KEYID = 0
1,200,434 UART: [idev] Sha1 KeyId Algorithm
1,208,996 UART: [idev] --
1,209,922 UART: [ldev] ++
1,210,090 UART: [ldev] CDI.KEYID = 6
1,210,453 UART: [ldev] SUBJECT.KEYID = 5
1,210,879 UART: [ldev] AUTHORITY.KEYID = 7
1,211,342 UART: [ldev] FE.KEYID = 1
1,216,486 UART: [ldev] Erasing FE.KEYID = 1
1,242,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,520 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,236 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,748 UART: [ldev] --
1,282,203 UART: [fwproc] Wait for Commands...
1,282,991 UART: [fwproc] Recv command 0x46574c44
1,283,719 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,524 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,694 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,965 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,662 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,572 >>> mbox cmd response: failed
1,184,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,578 >>> mbox cmd response: failed
1,184,578 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
1,184,584 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,858 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,848 >>> mbox cmd response: success
test fw_load::fw_load_error_vendor_pub_key_digest_mismatch ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
191,523 UART:
191,903 UART: Running Caliptra ROM ...
193,016 UART:
193,168 UART: [state] CFI Enabled
263,992 UART: [state] LifecycleState = Unprovisioned
266,115 UART: [state] DebugLocked = Yes
268,078 UART: [state] Starting the Watchdog Timer 40000000 cycles
272,890 UART: [kat] SHA2-256
442,579 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,088 UART: [kat] ++
453,585 UART: [kat] sha1
463,107 UART: [kat] SHA2-256
465,808 UART: [kat] SHA2-384
470,870 UART: [kat] SHA2-512-ACC
473,267 UART: [kat] ECC-384
2,766,385 UART: [kat] HMAC-384Kdf
2,799,492 UART: [kat] LMS
3,989,791 UART: [kat] --
3,994,030 UART: [cold-reset] ++
3,995,215 UART: [fht] Storing FHT @ 0x50003400
4,006,813 UART: [idev] ++
4,007,391 UART: [idev] CDI.KEYID = 6
4,008,334 UART: [idev] SUBJECT.KEYID = 7
4,009,603 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,296 UART:
193,207 UART: Running Caliptra ROM ...
194,371 UART:
194,520 UART: [state] CFI Enabled
254,184 UART: [state] LifecycleState = Manufacturing
256,146 UART: [state] DebugLocked = Yes
257,566 UART: [state] Starting the Watchdog Timer 40000000 cycles
262,775 UART: [kat] SHA2-256
432,479 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,993 UART: [kat] ++
443,504 UART: [kat] sha1
454,717 UART: [kat] SHA2-256
457,414 UART: [kat] SHA2-384
463,030 UART: [kat] SHA2-512-ACC
465,385 UART: [kat] ECC-384
2,756,491 UART: [kat] HMAC-384Kdf
2,787,374 UART: [kat] LMS
3,977,647 UART: [kat] --
3,981,174 UART: [cold-reset] ++
3,983,329 UART: [fht] Storing FHT @ 0x50003400
3,995,511 UART: [idev] ++
3,996,082 UART: [idev] CDI.KEYID = 6
3,996,994 UART: [idev] SUBJECT.KEYID = 7
3,998,280 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,097 writing to cptra_bootfsm_go
191,738 UART:
192,087 UART: Running Caliptra ROM ...
193,174 UART:
193,315 UART: [state] CFI Enabled
259,373 UART: [state] LifecycleState = Unknown
261,057 UART: [state] DebugLocked = Yes
264,177 UART: [state] Starting the Watchdog Timer 40000000 cycles
269,349 UART: [kat] SHA2-256
439,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,585 UART: [kat] ++
450,051 UART: [kat] sha1
460,063 UART: [kat] SHA2-256
462,803 UART: [kat] SHA2-384
467,598 UART: [kat] SHA2-512-ACC
469,940 UART: [kat] ECC-384
2,762,481 UART: [kat] HMAC-384Kdf
2,779,787 UART: [kat] LMS
3,970,067 UART: [kat] --
3,974,485 UART: [cold-reset] ++
3,976,428 UART: [fht] Storing FHT @ 0x50003400
3,988,187 UART: [idev] ++
3,988,761 UART: [idev] CDI.KEYID = 6
3,989,704 UART: [idev] SUBJECT.KEYID = 7
3,990,891 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
191,809 UART:
192,758 UART: Running Caliptra ROM ...
193,937 UART:
194,086 UART: [state] CFI Enabled
267,033 UART: [state] LifecycleState = Production
268,887 UART: [state] DebugLocked = Yes
271,285 UART: [state] Starting the Watchdog Timer 40000000 cycles
277,177 UART: [kat] SHA2-256
446,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,385 UART: [kat] ++
457,939 UART: [kat] sha1
468,774 UART: [kat] SHA2-256
471,460 UART: [kat] SHA2-384
475,829 UART: [kat] SHA2-512-ACC
478,178 UART: [kat] ECC-384
2,768,951 UART: [kat] HMAC-384Kdf
2,780,779 UART: [kat] LMS
3,971,065 UART: [kat] --
3,975,409 UART: [cold-reset] ++
3,977,839 UART: [fht] Storing FHT @ 0x50003400
3,988,737 UART: [idev] ++
3,989,343 UART: [idev] CDI.KEYID = 6
3,990,262 UART: [idev] SUBJECT.KEYID = 7
3,991,479 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,446 writing to cptra_bootfsm_go
192,585 UART:
193,467 UART: Running Caliptra ROM ...
194,633 UART:
194,781 UART: [state] CFI Enabled
264,407 UART: [state] LifecycleState = Unprovisioned
266,318 UART: [state] DebugLocked = No
268,089 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,963 UART: [kat] SHA2-256
442,680 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,211 UART: [kat] ++
453,708 UART: [kat] sha1
465,610 UART: [kat] SHA2-256
468,325 UART: [kat] SHA2-384
472,650 UART: [kat] SHA2-512-ACC
475,048 UART: [kat] ECC-384
2,766,558 UART: [kat] HMAC-384Kdf
2,777,890 UART: [kat] LMS
3,968,184 UART: [kat] --
3,972,636 UART: [cold-reset] ++
3,975,061 UART: [fht] Storing FHT @ 0x50003400
3,986,442 UART: [idev] ++
3,987,051 UART: [idev] CDI.KEYID = 6
3,987,948 UART: [idev] SUBJECT.KEYID = 7
3,989,221 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,170 writing to cptra_bootfsm_go
192,414 UART:
192,761 UART: Running Caliptra ROM ...
193,963 UART:
194,122 UART: [state] CFI Enabled
270,985 UART: [state] LifecycleState = Manufacturing
272,898 UART: [state] DebugLocked = No
275,311 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
279,309 UART: [kat] SHA2-256
449,028 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
459,510 UART: [kat] ++
460,002 UART: [kat] sha1
472,181 UART: [kat] SHA2-256
474,871 UART: [kat] SHA2-384
480,915 UART: [kat] SHA2-512-ACC
483,297 UART: [kat] ECC-384
2,773,904 UART: [kat] HMAC-384Kdf
2,804,985 UART: [kat] LMS
3,995,301 UART: [kat] --
4,000,740 UART: [cold-reset] ++
4,001,952 UART: [fht] Storing FHT @ 0x50003400
4,014,804 UART: [idev] ++
4,015,382 UART: [idev] CDI.KEYID = 6
4,016,292 UART: [idev] SUBJECT.KEYID = 7
4,017,569 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,046 writing to cptra_bootfsm_go
192,267 UART:
192,615 UART: Running Caliptra ROM ...
193,814 UART:
193,968 UART: [state] CFI Enabled
266,323 UART: [state] LifecycleState = Unknown
268,009 UART: [state] DebugLocked = No
270,531 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,108 UART: [kat] SHA2-256
444,831 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,310 UART: [kat] ++
455,819 UART: [kat] sha1
466,963 UART: [kat] SHA2-256
469,640 UART: [kat] SHA2-384
476,273 UART: [kat] SHA2-512-ACC
478,613 UART: [kat] ECC-384
2,765,722 UART: [kat] HMAC-384Kdf
2,779,288 UART: [kat] LMS
3,969,574 UART: [kat] --
3,975,649 UART: [cold-reset] ++
3,976,679 UART: [fht] Storing FHT @ 0x50003400
3,989,539 UART: [idev] ++
3,990,110 UART: [idev] CDI.KEYID = 6
3,991,130 UART: [idev] SUBJECT.KEYID = 7
3,992,292 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
192,110 UART:
192,476 UART: Running Caliptra ROM ...
193,676 UART:
193,834 UART: [state] CFI Enabled
262,844 UART: [state] LifecycleState = Production
264,702 UART: [state] DebugLocked = No
266,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,233 UART: [kat] SHA2-256
440,908 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,415 UART: [kat] ++
451,961 UART: [kat] sha1
464,241 UART: [kat] SHA2-256
466,926 UART: [kat] SHA2-384
472,634 UART: [kat] SHA2-512-ACC
474,980 UART: [kat] ECC-384
2,766,449 UART: [kat] HMAC-384Kdf
2,798,236 UART: [kat] LMS
3,988,558 UART: [kat] --
3,992,696 UART: [cold-reset] ++
3,995,342 UART: [fht] Storing FHT @ 0x50003400
4,005,854 UART: [idev] ++
4,006,425 UART: [idev] CDI.KEYID = 6
4,007,366 UART: [idev] SUBJECT.KEYID = 7
4,008,671 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
2,888 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,208 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,035 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,649 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,944 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,133 writing to cptra_bootfsm_go
191,742 UART:
192,119 UART: Running Caliptra ROM ...
193,243 UART:
602,840 UART: [state] CFI Enabled
615,575 UART: [state] LifecycleState = Unprovisioned
617,492 UART: [state] DebugLocked = Yes
618,857 UART: [state] Starting the Watchdog Timer 40000000 cycles
624,086 UART: [kat] SHA2-256
793,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,378 UART: [kat] ++
804,884 UART: [kat] sha1
816,575 UART: [kat] SHA2-256
819,321 UART: [kat] SHA2-384
825,256 UART: [kat] SHA2-512-ACC
827,621 UART: [kat] ECC-384
3,113,566 UART: [kat] HMAC-384Kdf
3,125,172 UART: [kat] LMS
4,315,316 UART: [kat] --
4,318,722 UART: [cold-reset] ++
4,321,256 UART: [fht] Storing FHT @ 0x50003400
4,332,747 UART: [idev] ++
4,333,328 UART: [idev] CDI.KEYID = 6
4,334,305 UART: [idev] SUBJECT.KEYID = 7
4,335,524 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,589 UART:
193,461 UART: Running Caliptra ROM ...
194,644 UART:
603,900 UART: [state] CFI Enabled
617,554 UART: [state] LifecycleState = Manufacturing
619,480 UART: [state] DebugLocked = Yes
622,033 UART: [state] Starting the Watchdog Timer 40000000 cycles
627,109 UART: [kat] SHA2-256
796,921 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,444 UART: [kat] ++
808,003 UART: [kat] sha1
819,005 UART: [kat] SHA2-256
821,690 UART: [kat] SHA2-384
825,997 UART: [kat] SHA2-512-ACC
828,396 UART: [kat] ECC-384
3,113,583 UART: [kat] HMAC-384Kdf
3,124,048 UART: [kat] LMS
4,314,128 UART: [kat] --
4,318,323 UART: [cold-reset] ++
4,319,890 UART: [fht] Storing FHT @ 0x50003400
4,331,646 UART: [idev] ++
4,332,224 UART: [idev] CDI.KEYID = 6
4,333,113 UART: [idev] SUBJECT.KEYID = 7
4,334,383 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
191,858 UART:
192,222 UART: Running Caliptra ROM ...
193,344 UART:
603,077 UART: [state] CFI Enabled
615,830 UART: [state] LifecycleState = Unknown
617,508 UART: [state] DebugLocked = Yes
620,138 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,077 UART: [kat] SHA2-256
795,832 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,353 UART: [kat] ++
806,908 UART: [kat] sha1
819,305 UART: [kat] SHA2-256
821,995 UART: [kat] SHA2-384
827,975 UART: [kat] SHA2-512-ACC
830,314 UART: [kat] ECC-384
3,115,723 UART: [kat] HMAC-384Kdf
3,127,057 UART: [kat] LMS
4,317,209 UART: [kat] --
4,322,097 UART: [cold-reset] ++
4,323,718 UART: [fht] Storing FHT @ 0x50003400
4,335,154 UART: [idev] ++
4,335,781 UART: [idev] CDI.KEYID = 6
4,336,687 UART: [idev] SUBJECT.KEYID = 7
4,337,959 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
191,975 UART:
192,812 UART: Running Caliptra ROM ...
196,776 UART:
603,239 UART: [state] CFI Enabled
616,189 UART: [state] LifecycleState = Production
617,967 UART: [state] DebugLocked = Yes
620,904 UART: [state] Starting the Watchdog Timer 40000000 cycles
625,602 UART: [kat] SHA2-256
795,385 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,915 UART: [kat] ++
806,479 UART: [kat] sha1
817,910 UART: [kat] SHA2-256
820,596 UART: [kat] SHA2-384
825,661 UART: [kat] SHA2-512-ACC
828,012 UART: [kat] ECC-384
3,111,894 UART: [kat] HMAC-384Kdf
3,123,462 UART: [kat] LMS
4,313,572 UART: [kat] --
4,318,390 UART: [cold-reset] ++
4,319,469 UART: [fht] Storing FHT @ 0x50003400
4,331,339 UART: [idev] ++
4,331,913 UART: [idev] CDI.KEYID = 6
4,332,936 UART: [idev] SUBJECT.KEYID = 7
4,334,103 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
192,632 UART:
193,615 UART: Running Caliptra ROM ...
194,788 UART:
603,801 UART: [state] CFI Enabled
614,535 UART: [state] LifecycleState = Unprovisioned
616,474 UART: [state] DebugLocked = No
618,293 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
622,455 UART: [kat] SHA2-256
792,197 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
802,737 UART: [kat] ++
803,327 UART: [kat] sha1
813,243 UART: [kat] SHA2-256
815,928 UART: [kat] SHA2-384
821,907 UART: [kat] SHA2-512-ACC
824,258 UART: [kat] ECC-384
3,108,346 UART: [kat] HMAC-384Kdf
3,120,601 UART: [kat] LMS
4,310,704 UART: [kat] --
4,315,649 UART: [cold-reset] ++
4,316,678 UART: [fht] Storing FHT @ 0x50003400
4,329,088 UART: [idev] ++
4,329,677 UART: [idev] CDI.KEYID = 6
4,330,702 UART: [idev] SUBJECT.KEYID = 7
4,331,913 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
192,449 UART:
192,813 UART: Running Caliptra ROM ...
193,914 UART:
603,646 UART: [state] CFI Enabled
619,586 UART: [state] LifecycleState = Manufacturing
621,517 UART: [state] DebugLocked = No
624,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,912 UART: [kat] SHA2-256
798,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,215 UART: [kat] ++
809,668 UART: [kat] sha1
821,088 UART: [kat] SHA2-256
823,835 UART: [kat] SHA2-384
829,351 UART: [kat] SHA2-512-ACC
831,712 UART: [kat] ECC-384
3,115,589 UART: [kat] HMAC-384Kdf
3,126,911 UART: [kat] LMS
4,317,026 UART: [kat] --
4,320,699 UART: [cold-reset] ++
4,321,933 UART: [fht] Storing FHT @ 0x50003400
4,333,154 UART: [idev] ++
4,333,724 UART: [idev] CDI.KEYID = 6
4,334,746 UART: [idev] SUBJECT.KEYID = 7
4,335,911 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
192,593 UART:
192,949 UART: Running Caliptra ROM ...
194,050 UART:
603,878 UART: [state] CFI Enabled
616,820 UART: [state] LifecycleState = Unknown
618,566 UART: [state] DebugLocked = No
620,822 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,123 UART: [kat] SHA2-256
795,851 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,387 UART: [kat] ++
806,871 UART: [kat] sha1
818,237 UART: [kat] SHA2-256
820,985 UART: [kat] SHA2-384
825,564 UART: [kat] SHA2-512-ACC
827,925 UART: [kat] ECC-384
3,112,123 UART: [kat] HMAC-384Kdf
3,124,815 UART: [kat] LMS
4,314,912 UART: [kat] --
4,320,389 UART: [cold-reset] ++
4,322,115 UART: [fht] Storing FHT @ 0x50003400
4,333,713 UART: [idev] ++
4,334,285 UART: [idev] CDI.KEYID = 6
4,335,310 UART: [idev] SUBJECT.KEYID = 7
4,336,477 UART: [idev] UDS.KEYID = 0
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
192,382 UART:
192,776 UART: Running Caliptra ROM ...
193,985 UART:
603,650 UART: [state] CFI Enabled
615,463 UART: [state] LifecycleState = Production
617,254 UART: [state] DebugLocked = No
619,671 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,143 UART: [kat] SHA2-256
793,922 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,452 UART: [kat] ++
804,930 UART: [kat] sha1
816,951 UART: [kat] SHA2-256
819,631 UART: [kat] SHA2-384
824,371 UART: [kat] SHA2-512-ACC
826,720 UART: [kat] ECC-384
3,109,026 UART: [kat] HMAC-384Kdf
3,120,035 UART: [kat] LMS
4,310,136 UART: [kat] --
4,313,887 UART: [cold-reset] ++
4,315,076 UART: [fht] Storing FHT @ 0x50003400
4,326,191 UART: [idev] ++
4,326,768 UART: [idev] CDI.KEYID = 6
4,327,715 UART: [idev] SUBJECT.KEYID = 7
4,328,988 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.00s
running 1 test
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
4,134 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
20,200 writing to cptra_bootfsm_go
0 new_unbooted
41 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,324 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,242 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,341 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,355 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
191,681 UART:
192,073 UART: Running Caliptra ROM ...
193,356 UART:
193,519 UART: [state] CFI Enabled
264,211 UART: [state] LifecycleState = Unprovisioned
266,174 UART: [state] DebugLocked = Yes
267,995 UART: [state] Starting the WD Timer 40000000 cycles
273,181 UART: [kat] SHA2-256
452,873 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,623 UART: [kat] ++
464,120 UART: [kat] sha1
474,630 UART: [kat] SHA2-256
477,331 UART: [kat] SHA2-384
483,206 UART: [kat] SHA2-512-ACC
485,548 UART: [kat] ECC-384
2,946,003 UART: [kat] HMAC-384Kdf
2,970,157 UART: [kat] LMS
3,446,698 UART: [kat] --
3,451,071 UART: [cold-reset] ++
3,452,908 UART: [fht] FHT @ 0x50003400
3,464,717 UART: [idev] ++
3,465,289 UART: [idev] CDI.KEYID = 6
3,466,294 UART: [idev] SUBJECT.KEYID = 7
3,467,460 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,822 writing to cptra_bootfsm_go
192,933 UART:
193,774 UART: Running Caliptra ROM ...
194,954 UART:
195,105 UART: [state] CFI Enabled
264,085 UART: [state] LifecycleState = Manufacturing
266,080 UART: [state] DebugLocked = Yes
268,050 UART: [state] Starting the WD Timer 40000000 cycles
272,270 UART: [kat] SHA2-256
451,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,726 UART: [kat] ++
463,293 UART: [kat] sha1
474,333 UART: [kat] SHA2-256
477,025 UART: [kat] SHA2-384
482,048 UART: [kat] SHA2-512-ACC
484,450 UART: [kat] ECC-384
2,946,625 UART: [kat] HMAC-384Kdf
2,970,908 UART: [kat] LMS
3,447,447 UART: [kat] --
3,452,139 UART: [cold-reset] ++
3,453,857 UART: [fht] FHT @ 0x50003400
3,464,079 UART: [idev] ++
3,464,653 UART: [idev] CDI.KEYID = 6
3,465,667 UART: [idev] SUBJECT.KEYID = 7
3,466,829 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
10,988 writing to cptra_bootfsm_go
199,586 UART:
200,339 UART: Running Caliptra ROM ...
201,484 UART:
201,639 UART: [state] CFI Enabled
276,677 UART: [state] LifecycleState = Unknown
278,396 UART: [state] DebugLocked = Yes
281,011 UART: [state] Starting the WD Timer 40000000 cycles
286,325 UART: [kat] SHA2-256
465,959 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
476,790 UART: [kat] ++
477,326 UART: [kat] sha1
489,052 UART: [kat] SHA2-256
491,750 UART: [kat] SHA2-384
498,616 UART: [kat] SHA2-512-ACC
501,015 UART: [kat] ECC-384
2,956,262 UART: [kat] HMAC-384Kdf
2,980,950 UART: [kat] LMS
3,457,469 UART: [kat] --
3,460,780 UART: [cold-reset] ++
3,463,045 UART: [fht] FHT @ 0x50003400
3,473,551 UART: [idev] ++
3,474,127 UART: [idev] CDI.KEYID = 6
3,475,146 UART: [idev] SUBJECT.KEYID = 7
3,476,424 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
13,589 writing to cptra_bootfsm_go
202,202 UART:
203,127 UART: Running Caliptra ROM ...
204,254 UART:
204,411 UART: [state] CFI Enabled
278,478 UART: [state] LifecycleState = Production
280,293 UART: [state] DebugLocked = Yes
281,718 UART: [state] Starting the WD Timer 40000000 cycles
285,937 UART: [kat] SHA2-256
465,620 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
476,383 UART: [kat] ++
476,905 UART: [kat] sha1
487,166 UART: [kat] SHA2-256
489,858 UART: [kat] SHA2-384
496,545 UART: [kat] SHA2-512-ACC
498,945 UART: [kat] ECC-384
2,963,315 UART: [kat] HMAC-384Kdf
2,985,201 UART: [kat] LMS
3,461,656 UART: [kat] --
3,466,465 UART: [cold-reset] ++
3,467,860 UART: [fht] FHT @ 0x50003400
3,478,892 UART: [idev] ++
3,479,468 UART: [idev] CDI.KEYID = 6
3,480,382 UART: [idev] SUBJECT.KEYID = 7
3,481,652 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,650 writing to cptra_bootfsm_go
192,891 UART:
193,663 UART: Running Caliptra ROM ...
194,821 UART:
194,971 UART: [state] CFI Enabled
267,535 UART: [state] LifecycleState = Unprovisioned
269,468 UART: [state] DebugLocked = No
270,706 UART: [state] WD Timer not started. Device not locked for debugging
274,334 UART: [kat] SHA2-256
453,989 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,790 UART: [kat] ++
465,274 UART: [kat] sha1
477,725 UART: [kat] SHA2-256
480,420 UART: [kat] SHA2-384
485,216 UART: [kat] SHA2-512-ACC
487,618 UART: [kat] ECC-384
2,951,316 UART: [kat] HMAC-384Kdf
2,974,242 UART: [kat] LMS
3,450,695 UART: [kat] --
3,454,911 UART: [cold-reset] ++
3,457,119 UART: [fht] FHT @ 0x50003400
3,469,084 UART: [idev] ++
3,469,663 UART: [idev] CDI.KEYID = 6
3,470,611 UART: [idev] SUBJECT.KEYID = 7
3,471,875 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,073 writing to cptra_bootfsm_go
192,315 UART:
192,677 UART: Running Caliptra ROM ...
193,880 UART:
194,039 UART: [state] CFI Enabled
261,281 UART: [state] LifecycleState = Manufacturing
263,264 UART: [state] DebugLocked = No
265,950 UART: [state] WD Timer not started. Device not locked for debugging
269,554 UART: [kat] SHA2-256
449,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,964 UART: [kat] ++
460,469 UART: [kat] sha1
472,734 UART: [kat] SHA2-256
475,412 UART: [kat] SHA2-384
480,216 UART: [kat] SHA2-512-ACC
482,558 UART: [kat] ECC-384
2,945,253 UART: [kat] HMAC-384Kdf
2,968,194 UART: [kat] LMS
3,444,709 UART: [kat] --
3,449,510 UART: [cold-reset] ++
3,450,472 UART: [fht] FHT @ 0x50003400
3,460,877 UART: [idev] ++
3,461,446 UART: [idev] CDI.KEYID = 6
3,462,416 UART: [idev] SUBJECT.KEYID = 7
3,463,631 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
192,291 UART:
192,642 UART: Running Caliptra ROM ...
193,825 UART:
193,977 UART: [state] CFI Enabled
262,407 UART: [state] LifecycleState = Unknown
264,075 UART: [state] DebugLocked = No
265,520 UART: [state] WD Timer not started. Device not locked for debugging
269,331 UART: [kat] SHA2-256
448,987 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,733 UART: [kat] ++
460,326 UART: [kat] sha1
472,700 UART: [kat] SHA2-256
475,387 UART: [kat] SHA2-384
481,325 UART: [kat] SHA2-512-ACC
483,676 UART: [kat] ECC-384
2,942,259 UART: [kat] HMAC-384Kdf
2,966,487 UART: [kat] LMS
3,443,025 UART: [kat] --
3,447,935 UART: [cold-reset] ++
3,448,956 UART: [fht] FHT @ 0x50003400
3,462,092 UART: [idev] ++
3,462,662 UART: [idev] CDI.KEYID = 6
3,463,608 UART: [idev] SUBJECT.KEYID = 7
3,464,821 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,112 writing to cptra_bootfsm_go
192,327 UART:
192,681 UART: Running Caliptra ROM ...
193,781 UART:
193,927 UART: [state] CFI Enabled
256,802 UART: [state] LifecycleState = Production
258,637 UART: [state] DebugLocked = No
261,614 UART: [state] WD Timer not started. Device not locked for debugging
265,665 UART: [kat] SHA2-256
445,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
456,066 UART: [kat] ++
456,527 UART: [kat] sha1
468,417 UART: [kat] SHA2-256
471,116 UART: [kat] SHA2-384
477,867 UART: [kat] SHA2-512-ACC
480,207 UART: [kat] ECC-384
2,941,854 UART: [kat] HMAC-384Kdf
2,965,983 UART: [kat] LMS
3,442,478 UART: [kat] --
3,447,066 UART: [cold-reset] ++
3,449,708 UART: [fht] FHT @ 0x50003400
3,461,769 UART: [idev] ++
3,462,357 UART: [idev] CDI.KEYID = 6
3,463,328 UART: [idev] SUBJECT.KEYID = 7
3,464,492 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
29,935 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
17,716 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,760 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,965 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
191,987 UART:
192,363 UART: Running Caliptra ROM ...
193,540 UART:
603,313 UART: [state] CFI Enabled
613,088 UART: [state] LifecycleState = Unprovisioned
615,017 UART: [state] DebugLocked = Yes
616,546 UART: [state] Starting the WD Timer 40000000 cycles
620,821 UART: [kat] SHA2-256
800,479 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,221 UART: [kat] ++
811,706 UART: [kat] sha1
823,400 UART: [kat] SHA2-256
826,092 UART: [kat] SHA2-384
831,594 UART: [kat] SHA2-512-ACC
833,946 UART: [kat] ECC-384
3,277,297 UART: [kat] HMAC-384Kdf
3,289,973 UART: [kat] LMS
3,766,495 UART: [kat] --
3,769,029 UART: [cold-reset] ++
3,770,268 UART: [fht] FHT @ 0x50003400
3,780,550 UART: [idev] ++
3,781,118 UART: [idev] CDI.KEYID = 6
3,782,086 UART: [idev] SUBJECT.KEYID = 7
3,783,311 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
6,893 writing to cptra_bootfsm_go
196,165 UART:
196,932 UART: Running Caliptra ROM ...
198,114 UART:
607,310 UART: [state] CFI Enabled
621,441 UART: [state] LifecycleState = Manufacturing
623,376 UART: [state] DebugLocked = Yes
626,313 UART: [state] Starting the WD Timer 40000000 cycles
632,055 UART: [kat] SHA2-256
811,697 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
822,512 UART: [kat] ++
823,002 UART: [kat] sha1
835,296 UART: [kat] SHA2-256
838,000 UART: [kat] SHA2-384
843,935 UART: [kat] SHA2-512-ACC
846,282 UART: [kat] ECC-384
3,287,931 UART: [kat] HMAC-384Kdf
3,300,556 UART: [kat] LMS
3,777,095 UART: [kat] --
3,781,690 UART: [cold-reset] ++
3,784,179 UART: [fht] FHT @ 0x50003400
3,795,559 UART: [idev] ++
3,796,130 UART: [idev] CDI.KEYID = 6
3,797,075 UART: [idev] SUBJECT.KEYID = 7
3,798,313 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
22,275 writing to cptra_bootfsm_go
210,862 UART:
211,794 UART: Running Caliptra ROM ...
212,955 UART:
622,013 UART: [state] CFI Enabled
634,127 UART: [state] LifecycleState = Unknown
635,803 UART: [state] DebugLocked = Yes
637,710 UART: [state] Starting the WD Timer 40000000 cycles
642,903 UART: [kat] SHA2-256
822,564 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
833,359 UART: [kat] ++
833,843 UART: [kat] sha1
846,098 UART: [kat] SHA2-256
848,798 UART: [kat] SHA2-384
855,972 UART: [kat] SHA2-512-ACC
858,315 UART: [kat] ECC-384
3,298,558 UART: [kat] HMAC-384Kdf
3,309,291 UART: [kat] LMS
3,785,799 UART: [kat] --
3,788,992 UART: [cold-reset] ++
3,791,520 UART: [fht] FHT @ 0x50003400
3,803,475 UART: [idev] ++
3,804,067 UART: [idev] CDI.KEYID = 6
3,804,986 UART: [idev] SUBJECT.KEYID = 7
3,806,156 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
4,118 writing to cptra_bootfsm_go
192,738 UART:
193,471 UART: Running Caliptra ROM ...
194,587 UART:
604,026 UART: [state] CFI Enabled
614,954 UART: [state] LifecycleState = Production
616,737 UART: [state] DebugLocked = Yes
619,410 UART: [state] Starting the WD Timer 40000000 cycles
624,598 UART: [kat] SHA2-256
804,277 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,043 UART: [kat] ++
815,595 UART: [kat] sha1
827,916 UART: [kat] SHA2-256
830,607 UART: [kat] SHA2-384
836,970 UART: [kat] SHA2-512-ACC
839,331 UART: [kat] ECC-384
3,281,204 UART: [kat] HMAC-384Kdf
3,293,621 UART: [kat] LMS
3,770,153 UART: [kat] --
3,773,724 UART: [cold-reset] ++
3,775,395 UART: [fht] FHT @ 0x50003400
3,786,542 UART: [idev] ++
3,787,173 UART: [idev] CDI.KEYID = 6
3,788,089 UART: [idev] SUBJECT.KEYID = 7
3,789,364 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
22,676 writing to cptra_bootfsm_go
212,179 UART:
212,935 UART: Running Caliptra ROM ...
214,089 UART:
623,303 UART: [state] CFI Enabled
635,674 UART: [state] LifecycleState = Unprovisioned
637,625 UART: [state] DebugLocked = No
639,876 UART: [state] WD Timer not started. Device not locked for debugging
643,699 UART: [kat] SHA2-256
823,388 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
834,170 UART: [kat] ++
834,627 UART: [kat] sha1
846,734 UART: [kat] SHA2-256
849,428 UART: [kat] SHA2-384
856,057 UART: [kat] SHA2-512-ACC
858,406 UART: [kat] ECC-384
3,301,182 UART: [kat] HMAC-384Kdf
3,313,856 UART: [kat] LMS
3,790,388 UART: [kat] --
3,793,843 UART: [cold-reset] ++
3,795,192 UART: [fht] FHT @ 0x50003400
3,808,172 UART: [idev] ++
3,808,767 UART: [idev] CDI.KEYID = 6
3,809,790 UART: [idev] SUBJECT.KEYID = 7
3,810,957 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
4,206 writing to cptra_bootfsm_go
193,510 UART:
193,872 UART: Running Caliptra ROM ...
195,089 UART:
604,793 UART: [state] CFI Enabled
621,300 UART: [state] LifecycleState = Manufacturing
623,249 UART: [state] DebugLocked = No
625,279 UART: [state] WD Timer not started. Device not locked for debugging
628,945 UART: [kat] SHA2-256
808,584 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,368 UART: [kat] ++
819,815 UART: [kat] sha1
830,696 UART: [kat] SHA2-256
833,389 UART: [kat] SHA2-384
839,703 UART: [kat] SHA2-512-ACC
842,104 UART: [kat] ECC-384
3,285,954 UART: [kat] HMAC-384Kdf
3,298,695 UART: [kat] LMS
3,775,215 UART: [kat] --
3,781,805 UART: [cold-reset] ++
3,783,912 UART: [fht] FHT @ 0x50003400
3,796,089 UART: [idev] ++
3,796,665 UART: [idev] CDI.KEYID = 6
3,797,635 UART: [idev] SUBJECT.KEYID = 7
3,798,858 UART: [idev] UDS.KEYID = 0
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,323 writing to cptra_bootfsm_go
192,675 UART:
193,047 UART: Running Caliptra ROM ...
194,236 UART:
603,713 UART: [state] CFI Enabled
619,429 UART: [state] LifecycleState = Unknown
621,070 UART: [state] DebugLocked = No
623,865 UART: [state] WD Timer not started. Device not locked for debugging
627,687 UART: [kat] SHA2-256
807,351 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,105 UART: [kat] ++
818,702 UART: [kat] sha1
829,752 UART: [kat] SHA2-256
832,444 UART: [kat] SHA2-384
839,255 UART: [kat] SHA2-512-ACC
841,605 UART: [kat] ECC-384
3,284,357 UART: [kat] HMAC-384Kdf
3,296,649 UART: [kat] LMS
3,773,138 UART: [kat] --
3,777,446 UART: [cold-reset] ++
3,779,952 UART: [fht] FHT @ 0x50003400
3,789,859 UART: [idev] ++
3,790,427 UART: [idev] CDI.KEYID = 6
3,791,342 UART: [idev] SUBJECT.KEYID = 7
3,792,614 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,482 writing to cptra_bootfsm_go
192,616 UART:
192,973 UART: Running Caliptra ROM ...
194,063 UART:
603,615 UART: [state] CFI Enabled
614,662 UART: [state] LifecycleState = Production
616,441 UART: [state] DebugLocked = No
618,173 UART: [state] WD Timer not started. Device not locked for debugging
621,904 UART: [kat] SHA2-256
801,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,329 UART: [kat] ++
812,800 UART: [kat] sha1
822,491 UART: [kat] SHA2-256
825,229 UART: [kat] SHA2-384
831,322 UART: [kat] SHA2-512-ACC
833,671 UART: [kat] ECC-384
3,274,964 UART: [kat] HMAC-384Kdf
3,288,344 UART: [kat] LMS
3,764,898 UART: [kat] --
3,770,894 UART: [cold-reset] ++
3,771,805 UART: [fht] FHT @ 0x50003400
3,782,573 UART: [idev] ++
3,783,148 UART: [idev] CDI.KEYID = 6
3,784,067 UART: [idev] SUBJECT.KEYID = 7
3,785,347 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,344 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
51,865 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,913 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
8,650 writing to cptra_bootfsm_go
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,067 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,237 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,441 writing to cptra_bootfsm_go
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
191,648 UART:
192,041 UART: Running Caliptra ROM ...
193,222 UART:
193,380 UART: [state] CFI Enabled
260,481 UART: [state] LifecycleState = Unprovisioned
262,885 UART: [state] DebugLocked = Yes
264,799 UART: [state] Starting the WD Timer 40000000 cycles
270,250 UART: [kat] SHA2-256
460,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,938 UART: [kat] ++
471,494 UART: [kat] sha1
483,409 UART: [kat] SHA2-256
486,412 UART: [kat] SHA2-384
492,182 UART: [kat] SHA2-512-ACC
494,743 UART: [kat] ECC-384
2,944,744 UART: [kat] HMAC-384Kdf
2,967,698 UART: [kat] LMS
3,499,460 UART: [kat] --
3,503,587 UART: [cold-reset] ++
3,505,694 UART: [fht] FHT @ 0x50003400
3,516,198 UART: [idev] ++
3,516,879 UART: [idev] CDI.KEYID = 6
3,517,824 UART: [idev] SUBJECT.KEYID = 7
3,519,039 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,140 writing to cptra_bootfsm_go
192,474 UART:
193,355 UART: Running Caliptra ROM ...
194,527 UART:
194,684 UART: [state] CFI Enabled
267,353 UART: [state] LifecycleState = Manufacturing
269,759 UART: [state] DebugLocked = Yes
273,584 UART: [state] Starting the WD Timer 40000000 cycles
276,653 UART: [kat] SHA2-256
466,533 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,281 UART: [kat] ++
477,860 UART: [kat] sha1
489,664 UART: [kat] SHA2-256
492,688 UART: [kat] SHA2-384
500,398 UART: [kat] SHA2-512-ACC
503,022 UART: [kat] ECC-384
2,953,039 UART: [kat] HMAC-384Kdf
2,978,862 UART: [kat] LMS
3,510,649 UART: [kat] --
3,513,050 UART: [cold-reset] ++
3,513,922 UART: [fht] FHT @ 0x50003400
3,526,274 UART: [idev] ++
3,526,955 UART: [idev] CDI.KEYID = 6
3,527,919 UART: [idev] SUBJECT.KEYID = 7
3,529,088 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,137 writing to cptra_bootfsm_go
191,735 UART:
192,595 UART: Running Caliptra ROM ...
193,732 UART:
193,884 UART: [state] CFI Enabled
258,678 UART: [state] LifecycleState = Unknown
260,709 UART: [state] DebugLocked = Yes
263,265 UART: [state] Starting the WD Timer 40000000 cycles
268,990 UART: [kat] SHA2-256
458,904 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,624 UART: [kat] ++
470,218 UART: [kat] sha1
482,044 UART: [kat] SHA2-256
485,073 UART: [kat] SHA2-384
491,332 UART: [kat] SHA2-512-ACC
493,893 UART: [kat] ECC-384
2,939,353 UART: [kat] HMAC-384Kdf
2,963,417 UART: [kat] LMS
3,495,152 UART: [kat] --
3,498,544 UART: [cold-reset] ++
3,499,952 UART: [fht] FHT @ 0x50003400
3,511,924 UART: [idev] ++
3,512,605 UART: [idev] CDI.KEYID = 6
3,513,547 UART: [idev] SUBJECT.KEYID = 7
3,514,682 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,205 writing to cptra_bootfsm_go
191,848 UART:
192,723 UART: Running Caliptra ROM ...
193,915 UART:
194,089 UART: [state] CFI Enabled
252,090 UART: [state] LifecycleState = Production
254,340 UART: [state] DebugLocked = Yes
255,880 UART: [state] Starting the WD Timer 40000000 cycles
260,422 UART: [kat] SHA2-256
450,343 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
461,096 UART: [kat] ++
461,703 UART: [kat] sha1
472,941 UART: [kat] SHA2-256
475,963 UART: [kat] SHA2-384
482,431 UART: [kat] SHA2-512-ACC
485,049 UART: [kat] ECC-384
2,935,474 UART: [kat] HMAC-384Kdf
2,958,907 UART: [kat] LMS
3,490,657 UART: [kat] --
3,494,866 UART: [cold-reset] ++
3,496,120 UART: [fht] FHT @ 0x50003400
3,508,025 UART: [idev] ++
3,508,710 UART: [idev] CDI.KEYID = 6
3,509,681 UART: [idev] SUBJECT.KEYID = 7
3,510,899 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
32,909 writing to cptra_bootfsm_go
222,681 UART:
223,404 UART: Running Caliptra ROM ...
224,569 UART:
224,714 UART: [state] CFI Enabled
282,745 UART: [state] LifecycleState = Unprovisioned
285,150 UART: [state] DebugLocked = No
286,380 UART: [state] WD Timer not started. Device not locked for debugging
290,797 UART: [kat] SHA2-256
480,684 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
491,407 UART: [kat] ++
492,320 UART: [kat] sha1
503,378 UART: [kat] SHA2-256
506,355 UART: [kat] SHA2-384
511,481 UART: [kat] SHA2-512-ACC
514,096 UART: [kat] ECC-384
2,972,601 UART: [kat] HMAC-384Kdf
2,995,922 UART: [kat] LMS
3,527,728 UART: [kat] --
3,532,352 UART: [cold-reset] ++
3,533,538 UART: [fht] FHT @ 0x50003400
3,543,996 UART: [idev] ++
3,544,684 UART: [idev] CDI.KEYID = 6
3,545,657 UART: [idev] SUBJECT.KEYID = 7
3,546,878 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
5,120 writing to cptra_bootfsm_go
194,373 UART:
194,724 UART: Running Caliptra ROM ...
195,952 UART:
196,111 UART: [state] CFI Enabled
259,078 UART: [state] LifecycleState = Manufacturing
261,477 UART: [state] DebugLocked = No
263,244 UART: [state] WD Timer not started. Device not locked for debugging
267,120 UART: [kat] SHA2-256
457,024 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,788 UART: [kat] ++
468,269 UART: [kat] sha1
479,874 UART: [kat] SHA2-256
482,895 UART: [kat] SHA2-384
489,096 UART: [kat] SHA2-512-ACC
491,659 UART: [kat] ECC-384
2,944,963 UART: [kat] HMAC-384Kdf
2,965,907 UART: [kat] LMS
3,497,643 UART: [kat] --
3,500,697 UART: [cold-reset] ++
3,501,723 UART: [fht] FHT @ 0x50003400
3,512,493 UART: [idev] ++
3,513,185 UART: [idev] CDI.KEYID = 6
3,514,207 UART: [idev] SUBJECT.KEYID = 7
3,515,376 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,191 UART:
192,547 UART: Running Caliptra ROM ...
193,767 UART:
193,927 UART: [state] CFI Enabled
257,541 UART: [state] LifecycleState = Unknown
259,610 UART: [state] DebugLocked = No
262,236 UART: [state] WD Timer not started. Device not locked for debugging
266,326 UART: [kat] SHA2-256
456,183 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,978 UART: [kat] ++
467,461 UART: [kat] sha1
479,072 UART: [kat] SHA2-256
482,102 UART: [kat] SHA2-384
488,357 UART: [kat] SHA2-512-ACC
490,969 UART: [kat] ECC-384
2,943,869 UART: [kat] HMAC-384Kdf
2,967,488 UART: [kat] LMS
3,499,269 UART: [kat] --
3,503,966 UART: [cold-reset] ++
3,505,793 UART: [fht] FHT @ 0x50003400
3,516,343 UART: [idev] ++
3,517,035 UART: [idev] CDI.KEYID = 6
3,518,008 UART: [idev] SUBJECT.KEYID = 7
3,519,177 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
192,182 UART:
192,546 UART: Running Caliptra ROM ...
193,679 UART:
193,823 UART: [state] CFI Enabled
261,365 UART: [state] LifecycleState = Production
263,605 UART: [state] DebugLocked = No
265,553 UART: [state] WD Timer not started. Device not locked for debugging
269,532 UART: [kat] SHA2-256
459,424 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,221 UART: [kat] ++
470,673 UART: [kat] sha1
481,888 UART: [kat] SHA2-256
484,928 UART: [kat] SHA2-384
491,544 UART: [kat] SHA2-512-ACC
494,154 UART: [kat] ECC-384
2,940,472 UART: [kat] HMAC-384Kdf
2,966,933 UART: [kat] LMS
3,498,715 UART: [kat] --
3,502,875 UART: [cold-reset] ++
3,504,060 UART: [fht] FHT @ 0x50003400
3,514,993 UART: [idev] ++
3,515,674 UART: [idev] CDI.KEYID = 6
3,516,644 UART: [idev] SUBJECT.KEYID = 7
3,517,867 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
2,985 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
14,423 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,072 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,807 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
2,995 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.60s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,197 writing to cptra_bootfsm_go
191,817 UART:
192,200 UART: Running Caliptra ROM ...
193,359 UART:
602,861 UART: [state] CFI Enabled
619,663 UART: [state] LifecycleState = Unprovisioned
622,083 UART: [state] DebugLocked = Yes
623,398 UART: [state] Starting the WD Timer 40000000 cycles
628,845 UART: [kat] SHA2-256
818,694 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,522 UART: [kat] ++
830,147 UART: [kat] sha1
841,473 UART: [kat] SHA2-256
844,495 UART: [kat] SHA2-384
849,670 UART: [kat] SHA2-512-ACC
852,289 UART: [kat] ECC-384
3,293,484 UART: [kat] HMAC-384Kdf
3,307,201 UART: [kat] LMS
3,839,045 UART: [kat] --
3,843,402 UART: [cold-reset] ++
3,844,426 UART: [fht] FHT @ 0x50003400
3,857,332 UART: [idev] ++
3,858,014 UART: [idev] CDI.KEYID = 6
3,858,958 UART: [idev] SUBJECT.KEYID = 7
3,860,175 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
19,327 writing to cptra_bootfsm_go
209,994 UART:
210,830 UART: Running Caliptra ROM ...
211,971 UART:
621,336 UART: [state] CFI Enabled
633,951 UART: [state] LifecycleState = Manufacturing
636,339 UART: [state] DebugLocked = Yes
638,576 UART: [state] Starting the WD Timer 40000000 cycles
644,685 UART: [kat] SHA2-256
834,542 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
845,385 UART: [kat] ++
845,941 UART: [kat] sha1
858,068 UART: [kat] SHA2-256
861,095 UART: [kat] SHA2-384
866,870 UART: [kat] SHA2-512-ACC
869,417 UART: [kat] ECC-384
3,310,875 UART: [kat] HMAC-384Kdf
3,325,010 UART: [kat] LMS
3,856,847 UART: [kat] --
3,862,406 UART: [cold-reset] ++
3,863,979 UART: [fht] FHT @ 0x50003400
3,875,835 UART: [idev] ++
3,876,569 UART: [idev] CDI.KEYID = 6
3,877,456 UART: [idev] SUBJECT.KEYID = 7
3,878,728 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
51,906 writing to cptra_bootfsm_go
240,521 UART:
241,145 UART: Running Caliptra ROM ...
242,315 UART:
651,676 UART: [state] CFI Enabled
664,875 UART: [state] LifecycleState = Unknown
666,933 UART: [state] DebugLocked = Yes
669,764 UART: [state] Starting the WD Timer 40000000 cycles
674,907 UART: [kat] SHA2-256
864,800 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
875,610 UART: [kat] ++
876,125 UART: [kat] sha1
887,787 UART: [kat] SHA2-256
890,817 UART: [kat] SHA2-384
897,889 UART: [kat] SHA2-512-ACC
900,465 UART: [kat] ECC-384
3,341,700 UART: [kat] HMAC-384Kdf
3,354,771 UART: [kat] LMS
3,886,607 UART: [kat] --
3,889,740 UART: [cold-reset] ++
3,892,218 UART: [fht] FHT @ 0x50003400
3,905,148 UART: [idev] ++
3,905,856 UART: [idev] CDI.KEYID = 6
3,906,771 UART: [idev] SUBJECT.KEYID = 7
3,907,995 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
191,916 UART:
192,764 UART: Running Caliptra ROM ...
193,961 UART:
603,247 UART: [state] CFI Enabled
620,268 UART: [state] LifecycleState = Production
622,455 UART: [state] DebugLocked = Yes
624,474 UART: [state] Starting the WD Timer 40000000 cycles
629,244 UART: [kat] SHA2-256
819,154 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,001 UART: [kat] ++
830,555 UART: [kat] sha1
841,365 UART: [kat] SHA2-256
844,382 UART: [kat] SHA2-384
850,304 UART: [kat] SHA2-512-ACC
852,870 UART: [kat] ECC-384
3,295,841 UART: [kat] HMAC-384Kdf
3,309,385 UART: [kat] LMS
3,841,236 UART: [kat] --
3,845,629 UART: [cold-reset] ++
3,846,603 UART: [fht] FHT @ 0x50003400
3,858,137 UART: [idev] ++
3,858,877 UART: [idev] CDI.KEYID = 6
3,859,786 UART: [idev] SUBJECT.KEYID = 7
3,861,003 UART: [idev] UDS.KEYID = 0
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
193,927 UART:
194,819 UART: Running Caliptra ROM ...
195,974 UART:
605,115 UART: [state] CFI Enabled
620,687 UART: [state] LifecycleState = Unprovisioned
623,018 UART: [state] DebugLocked = No
625,547 UART: [state] WD Timer not started. Device not locked for debugging
630,677 UART: [kat] SHA2-256
820,570 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,370 UART: [kat] ++
831,956 UART: [kat] sha1
842,845 UART: [kat] SHA2-256
845,863 UART: [kat] SHA2-384
852,336 UART: [kat] SHA2-512-ACC
854,957 UART: [kat] ECC-384
3,296,200 UART: [kat] HMAC-384Kdf
3,308,352 UART: [kat] LMS
3,840,196 UART: [kat] --
3,844,949 UART: [cold-reset] ++
3,846,405 UART: [fht] FHT @ 0x50003400
3,857,346 UART: [idev] ++
3,858,026 UART: [idev] CDI.KEYID = 6
3,859,050 UART: [idev] SUBJECT.KEYID = 7
3,860,167 UART: [idev] UDS.KEYID = 0
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,576 UART:
192,976 UART: Running Caliptra ROM ...
194,197 UART:
603,890 UART: [state] CFI Enabled
618,041 UART: [state] LifecycleState = Manufacturing
620,365 UART: [state] DebugLocked = No
622,399 UART: [state] WD Timer not started. Device not locked for debugging
626,993 UART: [kat] SHA2-256
816,829 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,661 UART: [kat] ++
828,262 UART: [kat] sha1
838,882 UART: [kat] SHA2-256
841,898 UART: [kat] SHA2-384
848,156 UART: [kat] SHA2-512-ACC
850,717 UART: [kat] ECC-384
3,292,945 UART: [kat] HMAC-384Kdf
3,306,023 UART: [kat] LMS
3,837,821 UART: [kat] --
3,842,893 UART: [cold-reset] ++
3,845,533 UART: [fht] FHT @ 0x50003400
3,857,111 UART: [idev] ++
3,857,866 UART: [idev] CDI.KEYID = 6
3,858,766 UART: [idev] SUBJECT.KEYID = 7
3,859,882 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
192,476 UART:
192,859 UART: Running Caliptra ROM ...
194,071 UART:
603,696 UART: [state] CFI Enabled
618,139 UART: [state] LifecycleState = Unknown
620,129 UART: [state] DebugLocked = No
622,587 UART: [state] WD Timer not started. Device not locked for debugging
627,670 UART: [kat] SHA2-256
817,534 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,328 UART: [kat] ++
828,930 UART: [kat] sha1
839,548 UART: [kat] SHA2-256
842,565 UART: [kat] SHA2-384
848,281 UART: [kat] SHA2-512-ACC
850,848 UART: [kat] ECC-384
3,291,721 UART: [kat] HMAC-384Kdf
3,306,305 UART: [kat] LMS
3,838,097 UART: [kat] --
3,842,364 UART: [cold-reset] ++
3,844,951 UART: [fht] FHT @ 0x50003400
3,857,174 UART: [idev] ++
3,857,903 UART: [idev] CDI.KEYID = 6
3,858,798 UART: [idev] SUBJECT.KEYID = 7
3,860,022 UART: [idev] UDS.KEYID = 0
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,287 writing to cptra_bootfsm_go
192,518 UART:
192,879 UART: Running Caliptra ROM ...
194,082 UART:
603,547 UART: [state] CFI Enabled
618,153 UART: [state] LifecycleState = Production
620,380 UART: [state] DebugLocked = No
623,009 UART: [state] WD Timer not started. Device not locked for debugging
627,230 UART: [kat] SHA2-256
817,153 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,917 UART: [kat] ++
828,425 UART: [kat] sha1
840,836 UART: [kat] SHA2-256
843,837 UART: [kat] SHA2-384
850,102 UART: [kat] SHA2-512-ACC
852,667 UART: [kat] ECC-384
3,296,770 UART: [kat] HMAC-384Kdf
3,309,942 UART: [kat] LMS
3,841,775 UART: [kat] --
3,846,846 UART: [cold-reset] ++
3,848,463 UART: [fht] FHT @ 0x50003400
3,860,262 UART: [idev] ++
3,860,962 UART: [idev] CDI.KEYID = 6
3,861,883 UART: [idev] SUBJECT.KEYID = 7
3,863,105 UART: [idev] UDS.KEYID = 0
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
4,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
5,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
6,
),
}
Initializing fuses
31,395 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
34,188 writing to cptra_bootfsm_go
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
1,
),
}
Initializing fuses
3,265 writing to cptra_bootfsm_go
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
2,
),
}
Initializing fuses
3,315 writing to cptra_bootfsm_go
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
3,
),
}
Initializing fuses
3,488 writing to cptra_bootfsm_go
test jtag_locked::jtag_locked ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,440,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,322,439 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
3,449,939 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,321,918 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
3,780,479 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,555,469 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
3,774,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,560,794 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,083 writing to cptra_bootfsm_go
3,440,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,358,548 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
3,447,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,361,296 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,775,389 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,548,407 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,776,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,547,790 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,308 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,999 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,006 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,469 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,235 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,311 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,666 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,715 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,728,634 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,647 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,730,245 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,727,566 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_fw_load ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,911 writing to cptra_bootfsm_go
191,521 UART:
191,924 UART: Running Caliptra ROM ...
193,028 UART:
193,181 UART: [state] CFI Enabled
263,979 UART: [state] LifecycleState = Production
265,799 UART: [state] DebugLocked = Yes
267,136 UART: [state] Starting the Watchdog Timer 40000000 cycles
271,828 UART: [kat] SHA2-256
441,614 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,063 UART: [kat] ++
452,569 UART: [kat] sha1
464,478 UART: [kat] SHA2-256
467,164 UART: [kat] SHA2-384
473,957 UART: [kat] SHA2-512-ACC
476,357 UART: [kat] ECC-384
2,765,141 UART: [kat] HMAC-384Kdf
2,778,692 UART: [kat] LMS
3,969,006 UART: [kat] --
3,973,128 UART: [cold-reset] ++
3,975,122 UART: [fht] Storing FHT @ 0x50003400
3,986,660 UART: [idev] ++
3,987,226 UART: [idev] CDI.KEYID = 6
3,988,188 UART: [idev] SUBJECT.KEYID = 7
3,989,408 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
191,812 UART:
192,237 UART: Running Caliptra ROM ...
193,416 UART:
602,882 UART: [state] CFI Enabled
618,363 UART: [state] LifecycleState = Production
620,129 UART: [state] DebugLocked = Yes
621,928 UART: [state] Starting the Watchdog Timer 40000000 cycles
626,838 UART: [kat] SHA2-256
796,638 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,189 UART: [kat] ++
807,715 UART: [kat] sha1
819,442 UART: [kat] SHA2-256
822,169 UART: [kat] SHA2-384
828,105 UART: [kat] SHA2-512-ACC
830,457 UART: [kat] ECC-384
3,114,003 UART: [kat] HMAC-384Kdf
3,127,041 UART: [kat] LMS
4,317,174 UART: [kat] --
4,320,933 UART: [cold-reset] ++
4,323,630 UART: [fht] Storing FHT @ 0x50003400
4,335,440 UART: [idev] ++
4,336,056 UART: [idev] CDI.KEYID = 6
4,336,958 UART: [idev] SUBJECT.KEYID = 7
4,338,238 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,504 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
191,888 UART:
192,265 UART: Running Caliptra ROM ...
193,447 UART:
193,605 UART: [state] CFI Enabled
264,776 UART: [state] LifecycleState = Production
266,641 UART: [state] DebugLocked = Yes
268,948 UART: [state] Starting the WD Timer 40000000 cycles
273,757 UART: [kat] SHA2-256
453,445 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,219 UART: [kat] ++
464,758 UART: [kat] sha1
475,002 UART: [kat] SHA2-256
477,700 UART: [kat] SHA2-384
483,586 UART: [kat] SHA2-512-ACC
485,985 UART: [kat] ECC-384
2,948,282 UART: [kat] HMAC-384Kdf
2,968,978 UART: [kat] LMS
3,445,476 UART: [kat] --
3,449,546 UART: [cold-reset] ++
3,452,030 UART: [fht] FHT @ 0x50003400
3,462,637 UART: [idev] ++
3,463,215 UART: [idev] CDI.KEYID = 6
3,464,210 UART: [idev] SUBJECT.KEYID = 7
3,465,383 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
6,146 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,372 writing to cptra_bootfsm_go
192,006 UART:
192,367 UART: Running Caliptra ROM ...
193,585 UART:
603,136 UART: [state] CFI Enabled
619,390 UART: [state] LifecycleState = Production
621,246 UART: [state] DebugLocked = Yes
622,564 UART: [state] Starting the WD Timer 40000000 cycles
627,641 UART: [kat] SHA2-256
807,338 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,097 UART: [kat] ++
818,555 UART: [kat] sha1
828,816 UART: [kat] SHA2-256
831,512 UART: [kat] SHA2-384
837,497 UART: [kat] SHA2-512-ACC
839,894 UART: [kat] ECC-384
3,281,227 UART: [kat] HMAC-384Kdf
3,293,641 UART: [kat] LMS
3,770,138 UART: [kat] --
3,774,825 UART: [cold-reset] ++
3,777,473 UART: [fht] FHT @ 0x50003400
3,789,157 UART: [idev] ++
3,789,728 UART: [idev] CDI.KEYID = 6
3,790,701 UART: [idev] SUBJECT.KEYID = 7
3,791,916 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
6,015 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,886 writing to cptra_bootfsm_go
191,508 UART:
191,868 UART: Running Caliptra ROM ...
192,949 UART:
193,119 UART: [state] CFI Enabled
261,040 UART: [state] LifecycleState = Production
262,962 UART: [state] DebugLocked = Yes
265,739 UART: [state] Starting the WD Timer 40000000 cycles
271,841 UART: [kat] SHA2-256
461,682 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,438 UART: [kat] ++
472,981 UART: [kat] sha1
482,860 UART: [kat] SHA2-256
485,879 UART: [kat] SHA2-384
491,434 UART: [kat] SHA2-512-ACC
494,002 UART: [kat] ECC-384
2,949,566 UART: [kat] HMAC-384Kdf
2,970,526 UART: [kat] LMS
3,502,276 UART: [kat] --
3,507,027 UART: [cold-reset] ++
3,508,131 UART: [fht] FHT @ 0x50003400
3,519,282 UART: [idev] ++
3,519,967 UART: [idev] CDI.KEYID = 6
3,520,936 UART: [idev] SUBJECT.KEYID = 7
3,522,159 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
191,813 UART:
192,171 UART: Running Caliptra ROM ...
193,360 UART:
603,050 UART: [state] CFI Enabled
616,992 UART: [state] LifecycleState = Production
619,189 UART: [state] DebugLocked = Yes
620,775 UART: [state] Starting the WD Timer 40000000 cycles
626,678 UART: [kat] SHA2-256
816,572 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,371 UART: [kat] ++
827,961 UART: [kat] sha1
840,596 UART: [kat] SHA2-256
843,613 UART: [kat] SHA2-384
849,699 UART: [kat] SHA2-512-ACC
852,261 UART: [kat] ECC-384
3,293,967 UART: [kat] HMAC-384Kdf
3,306,758 UART: [kat] LMS
3,838,562 UART: [kat] --
3,843,496 UART: [cold-reset] ++
3,845,167 UART: [fht] FHT @ 0x50003400
3,856,282 UART: [idev] ++
3,856,963 UART: [idev] CDI.KEYID = 6
3,857,904 UART: [idev] SUBJECT.KEYID = 7
3,859,128 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.19s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,159 UART: [state] LifecycleState = Production
85,767 UART: [state] DebugLocked = Yes
86,415 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,087 UART: [kat] SHA2-256
882,018 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,133 UART: [kat] ++
886,285 UART: [kat] sha1
890,745 UART: [kat] SHA2-256
892,683 UART: [kat] SHA2-384
895,254 UART: [kat] SHA2-512-ACC
897,155 UART: [kat] ECC-384
902,878 UART: [kat] HMAC-384Kdf
907,372 UART: [kat] LMS
1,475,568 UART: [kat] --
1,476,631 UART: [cold-reset] ++
1,477,098 UART: [fht] Storing FHT @ 0x50003400
1,479,643 UART: [idev] ++
1,479,811 UART: [idev] CDI.KEYID = 6
1,480,171 UART: [idev] SUBJECT.KEYID = 7
1,480,595 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,772 UART: [state] LifecycleState = Production
86,380 UART: [state] DebugLocked = Yes
87,050 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,826 UART: [kat] SHA2-256
882,757 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,872 UART: [kat] ++
887,024 UART: [kat] sha1
891,252 UART: [kat] SHA2-256
893,190 UART: [kat] SHA2-384
895,915 UART: [kat] SHA2-512-ACC
897,816 UART: [kat] ECC-384
903,607 UART: [kat] HMAC-384Kdf
908,459 UART: [kat] LMS
1,476,655 UART: [kat] --
1,477,570 UART: [cold-reset] ++
1,477,943 UART: [fht] Storing FHT @ 0x50003400
1,480,764 UART: [idev] ++
1,480,932 UART: [idev] CDI.KEYID = 6
1,481,292 UART: [idev] SUBJECT.KEYID = 7
1,481,716 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,941 UART: [state] LifecycleState = Production
85,549 UART: [state] DebugLocked = Yes
86,127 UART: [state] Starting the WD Timer 40000000 cycles
87,598 UART: [kat] SHA2-256
891,148 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,252 UART: [kat] ++
895,404 UART: [kat] sha1
899,622 UART: [kat] SHA2-256
901,562 UART: [kat] SHA2-384
904,517 UART: [kat] SHA2-512-ACC
906,418 UART: [kat] ECC-384
916,385 UART: [kat] HMAC-384Kdf
921,057 UART: [kat] LMS
1,169,369 UART: [kat] --
1,170,416 UART: [cold-reset] ++
1,170,883 UART: [fht] FHT @ 0x50003400
1,173,517 UART: [idev] ++
1,173,685 UART: [idev] CDI.KEYID = 6
1,174,046 UART: [idev] SUBJECT.KEYID = 7
1,174,471 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,284 UART: [state] LifecycleState = Production
85,892 UART: [state] DebugLocked = Yes
86,510 UART: [state] Starting the WD Timer 40000000 cycles
88,049 UART: [kat] SHA2-256
891,599 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,703 UART: [kat] ++
895,855 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,746 UART: [kat] SHA2-512-ACC
906,647 UART: [kat] ECC-384
916,224 UART: [kat] HMAC-384Kdf
920,876 UART: [kat] LMS
1,169,188 UART: [kat] --
1,169,927 UART: [cold-reset] ++
1,170,396 UART: [fht] FHT @ 0x50003400
1,173,188 UART: [idev] ++
1,173,356 UART: [idev] CDI.KEYID = 6
1,173,717 UART: [idev] SUBJECT.KEYID = 7
1,174,142 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,907 UART: [state] LifecycleState = Production
85,515 UART: [state] DebugLocked = Yes
86,083 UART: [state] Starting the WD Timer 40000000 cycles
87,678 UART: [kat] SHA2-256
893,328 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,453 UART: [kat] ++
897,605 UART: [kat] sha1
901,675 UART: [kat] SHA2-256
903,615 UART: [kat] SHA2-384
906,404 UART: [kat] SHA2-512-ACC
908,305 UART: [kat] ECC-384
917,976 UART: [kat] HMAC-384Kdf
922,624 UART: [kat] LMS
1,170,952 UART: [kat] --
1,171,971 UART: [cold-reset] ++
1,172,532 UART: [fht] FHT @ 0x50003400
1,174,987 UART: [idev] ++
1,175,155 UART: [idev] CDI.KEYID = 6
1,175,515 UART: [idev] SUBJECT.KEYID = 7
1,175,939 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,436 UART: [state] LifecycleState = Production
86,044 UART: [state] DebugLocked = Yes
86,718 UART: [state] Starting the WD Timer 40000000 cycles
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,452 UART: [kat] SHA2-256
904,392 UART: [kat] SHA2-384
907,035 UART: [kat] SHA2-512-ACC
908,936 UART: [kat] ECC-384
918,529 UART: [kat] HMAC-384Kdf
923,063 UART: [kat] LMS
1,171,391 UART: [kat] --
1,172,390 UART: [cold-reset] ++
1,172,875 UART: [fht] FHT @ 0x50003400
1,175,550 UART: [idev] ++
1,175,718 UART: [idev] CDI.KEYID = 6
1,176,078 UART: [idev] SUBJECT.KEYID = 7
1,176,502 UART: [idev] UDS.KEYID = 0
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
test security_parameters::attempt_ssp_access_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,947 writing to cptra_bootfsm_go
191,591 UART:
191,959 UART: Running Caliptra ROM ...
193,063 UART:
193,213 UART: [state] CFI Enabled
263,962 UART: [state] LifecycleState = Production
265,759 UART: [state] DebugLocked = Yes
268,547 UART: [state] Starting the Watchdog Timer 40000000 cycles
273,134 UART: [kat] SHA2-256
442,857 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,338 UART: [kat] ++
453,922 UART: [kat] sha1
465,679 UART: [kat] SHA2-256
468,342 UART: [kat] SHA2-384
472,775 UART: [kat] SHA2-512-ACC
475,148 UART: [kat] ECC-384
2,765,737 UART: [kat] HMAC-384Kdf
2,778,386 UART: [kat] LMS
3,968,682 UART: [kat] --
3,974,613 UART: [cold-reset] ++
3,976,340 UART: [fht] Storing FHT @ 0x50003400
3,987,542 UART: [idev] ++
3,988,110 UART: [idev] CDI.KEYID = 6
3,989,023 UART: [idev] SUBJECT.KEYID = 7
3,990,277 UART: [idev] UDS.KEYID = 0
3,991,334 ready_for_fw is high
3,991,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,140,742 UART: [idev] Erasing UDS.KEYID = 0
7,326,142 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,900 UART: [idev] --
7,351,524 UART: [ldev] ++
7,352,097 UART: [ldev] CDI.KEYID = 6
7,353,064 UART: [ldev] SUBJECT.KEYID = 5
7,354,280 UART: [ldev] AUTHORITY.KEYID = 7
7,355,569 UART: [ldev] FE.KEYID = 1
7,400,715 UART: [ldev] Erasing FE.KEYID = 1
10,733,267 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,328 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,040,858 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,055,546 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,069,874 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,089,047 UART: [ldev] --
13,094,159 UART: [fwproc] Waiting for Commands...
13,096,319 UART: [fwproc] Received command 0x46574c44
13,098,530 UART: [fwproc] Received Image of size 118548 bytes
17,238,078 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,473 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,662 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,364 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,783,638 ready_for_fw is high
3,784,132 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,987,115 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
191,935 UART:
192,298 UART: Running Caliptra ROM ...
193,423 UART:
602,939 UART: [state] CFI Enabled
614,062 UART: [state] LifecycleState = Production
615,849 UART: [state] DebugLocked = Yes
617,851 UART: [state] Starting the Watchdog Timer 40000000 cycles
624,009 UART: [kat] SHA2-256
793,769 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,277 UART: [kat] ++
804,803 UART: [kat] sha1
814,406 UART: [kat] SHA2-256
817,071 UART: [kat] SHA2-384
822,649 UART: [kat] SHA2-512-ACC
825,024 UART: [kat] ECC-384
3,109,023 UART: [kat] HMAC-384Kdf
3,120,496 UART: [kat] LMS
4,310,570 UART: [kat] --
4,314,903 UART: [cold-reset] ++
4,317,270 UART: [fht] Storing FHT @ 0x50003400
4,328,899 UART: [idev] ++
4,329,467 UART: [idev] CDI.KEYID = 6
4,330,386 UART: [idev] SUBJECT.KEYID = 7
4,331,641 UART: [idev] UDS.KEYID = 0
4,332,574 ready_for_fw is high
4,332,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,481,804 UART: [idev] Erasing UDS.KEYID = 0
7,617,321 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,208 UART: [idev] --
7,643,907 UART: [ldev] ++
7,644,501 UART: [ldev] CDI.KEYID = 6
7,645,437 UART: [ldev] SUBJECT.KEYID = 5
7,646,665 UART: [ldev] AUTHORITY.KEYID = 7
7,647,902 UART: [ldev] FE.KEYID = 1
7,657,908 UART: [ldev] Erasing FE.KEYID = 1
10,946,091 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,163 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
13,256,701 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
13,271,342 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
13,285,704 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
13,305,236 UART: [ldev] --
13,309,479 UART: [fwproc] Waiting for Commands...
13,311,855 UART: [fwproc] Received command 0x46574c44
13,314,045 UART: [fwproc] Received Image of size 118548 bytes
17,447,520 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,522,625 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,595,802 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,924,358 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
4,128,344 ready_for_fw is high
4,128,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,186,389 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.03s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,976 writing to cptra_bootfsm_go
191,578 UART:
191,953 UART: Running Caliptra ROM ...
193,105 UART:
193,301 UART: [state] CFI Enabled
265,249 UART: [state] LifecycleState = Production
267,066 UART: [state] DebugLocked = Yes
269,226 UART: [state] Starting the WD Timer 40000000 cycles
273,611 UART: [kat] SHA2-256
453,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,025 UART: [kat] ++
464,538 UART: [kat] sha1
475,123 UART: [kat] SHA2-256
477,791 UART: [kat] SHA2-384
482,872 UART: [kat] SHA2-512-ACC
485,252 UART: [kat] ECC-384
2,947,716 UART: [kat] HMAC-384Kdf
2,970,778 UART: [kat] LMS
3,447,330 UART: [kat] --
3,451,490 UART: [cold-reset] ++
3,453,574 UART: [fht] FHT @ 0x50003400
3,464,775 UART: [idev] ++
3,465,351 UART: [idev] CDI.KEYID = 6
3,466,310 UART: [idev] SUBJECT.KEYID = 7
3,467,559 UART: [idev] UDS.KEYID = 0
3,468,466 ready_for_fw is high
3,468,716 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,822 UART: [idev] Erasing UDS.KEYID = 0
5,987,498 UART: [idev] Sha1 KeyId Algorithm
6,011,281 UART: [idev] --
6,015,716 UART: [ldev] ++
6,016,296 UART: [ldev] CDI.KEYID = 6
6,017,238 UART: [ldev] SUBJECT.KEYID = 5
6,018,404 UART: [ldev] AUTHORITY.KEYID = 7
6,019,695 UART: [ldev] FE.KEYID = 1
6,058,271 UART: [ldev] Erasing FE.KEYID = 1
8,562,981 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,210 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,317,010 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,332,875 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,348,646 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,370,713 UART: [ldev] --
10,376,353 UART: [fwproc] Wait for Commands...
10,378,899 UART: [fwproc] Recv command 0x46574c44
10,380,895 UART: [fwproc] Recv'd Img size: 118548 bytes
13,896,677 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,971,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,044,947 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,373,067 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,457,262 ready_for_fw is high
3,457,663 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,243,366 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,402 writing to cptra_bootfsm_go
192,004 UART:
192,382 UART: Running Caliptra ROM ...
193,511 UART:
603,029 UART: [state] CFI Enabled
616,989 UART: [state] LifecycleState = Production
618,759 UART: [state] DebugLocked = Yes
620,244 UART: [state] Starting the WD Timer 40000000 cycles
624,638 UART: [kat] SHA2-256
804,333 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,107 UART: [kat] ++
815,557 UART: [kat] sha1
825,918 UART: [kat] SHA2-256
828,652 UART: [kat] SHA2-384
835,435 UART: [kat] SHA2-512-ACC
837,820 UART: [kat] ECC-384
3,280,950 UART: [kat] HMAC-384Kdf
3,292,129 UART: [kat] LMS
3,768,665 UART: [kat] --
3,774,016 UART: [cold-reset] ++
3,776,038 UART: [fht] FHT @ 0x50003400
3,787,598 UART: [idev] ++
3,788,168 UART: [idev] CDI.KEYID = 6
3,789,083 UART: [idev] SUBJECT.KEYID = 7
3,790,342 UART: [idev] UDS.KEYID = 0
3,791,292 ready_for_fw is high
3,791,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,377 UART: [idev] Erasing UDS.KEYID = 0
6,264,368 UART: [idev] Sha1 KeyId Algorithm
6,289,171 UART: [idev] --
6,292,876 UART: [ldev] ++
6,293,460 UART: [ldev] CDI.KEYID = 6
6,294,345 UART: [ldev] SUBJECT.KEYID = 5
6,295,566 UART: [ldev] AUTHORITY.KEYID = 7
6,296,859 UART: [ldev] FE.KEYID = 1
6,306,461 UART: [ldev] Erasing FE.KEYID = 1
8,783,090 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,122 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,520,997 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,536,772 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,552,531 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,574,284 UART: [ldev] --
10,580,472 UART: [fwproc] Wait for Commands...
10,583,384 UART: [fwproc] Recv command 0x46574c44
10,585,372 UART: [fwproc] Recv'd Img size: 118548 bytes
14,105,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,186,987 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,260,012 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,588,283 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,636 writing to cptra_bootfsm_go
3,784,914 ready_for_fw is high
3,785,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,468,987 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,013 writing to cptra_bootfsm_go
191,655 UART:
192,019 UART: Running Caliptra ROM ...
193,227 UART:
193,395 UART: [state] CFI Enabled
261,842 UART: [state] LifecycleState = Production
264,096 UART: [state] DebugLocked = Yes
266,794 UART: [state] Starting the WD Timer 40000000 cycles
272,808 UART: [kat] SHA2-256
462,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,457 UART: [kat] ++
473,919 UART: [kat] sha1
485,058 UART: [kat] SHA2-256
488,087 UART: [kat] SHA2-384
494,026 UART: [kat] SHA2-512-ACC
496,618 UART: [kat] ECC-384
2,945,962 UART: [kat] HMAC-384Kdf
2,971,150 UART: [kat] LMS
3,502,890 UART: [kat] --
3,504,495 UART: [cold-reset] ++
3,506,586 UART: [fht] FHT @ 0x50003400
3,518,532 UART: [idev] ++
3,519,248 UART: [idev] CDI.KEYID = 6
3,520,181 UART: [idev] SUBJECT.KEYID = 7
3,521,371 UART: [idev] UDS.KEYID = 0
3,522,305 ready_for_fw is high
3,522,506 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,671,565 UART: [idev] Erasing UDS.KEYID = 0
6,029,056 UART: [idev] Sha1 KeyId Algorithm
6,051,737 UART: [idev] --
6,057,418 UART: [ldev] ++
6,058,108 UART: [ldev] CDI.KEYID = 6
6,059,024 UART: [ldev] SUBJECT.KEYID = 5
6,060,195 UART: [ldev] AUTHORITY.KEYID = 7
6,061,435 UART: [ldev] FE.KEYID = 1
6,101,004 UART: [ldev] Erasing FE.KEYID = 1
8,605,290 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,260 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,357,457 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,372,558 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,387,530 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,407,713 UART: [ldev] --
10,412,463 UART: [fwproc] Wait for Commands...
10,415,645 UART: [fwproc] Recv command 0x46574c44
10,417,585 UART: [fwproc] Recv'd Img size: 118548 bytes
13,946,708 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,140 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,149,772 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,710,859 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
2,895 writing to cptra_bootfsm_go
3,438,264 ready_for_fw is high
3,438,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,866,474 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
191,905 UART:
192,278 UART: Running Caliptra ROM ...
193,386 UART:
603,000 UART: [state] CFI Enabled
615,253 UART: [state] LifecycleState = Production
617,396 UART: [state] DebugLocked = Yes
619,880 UART: [state] Starting the WD Timer 40000000 cycles
625,477 UART: [kat] SHA2-256
815,395 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,231 UART: [kat] ++
826,685 UART: [kat] sha1
839,424 UART: [kat] SHA2-256
842,454 UART: [kat] SHA2-384
848,668 UART: [kat] SHA2-512-ACC
851,255 UART: [kat] ECC-384
3,292,745 UART: [kat] HMAC-384Kdf
3,306,501 UART: [kat] LMS
3,838,352 UART: [kat] --
3,841,505 UART: [cold-reset] ++
3,843,589 UART: [fht] FHT @ 0x50003400
3,855,992 UART: [idev] ++
3,856,642 UART: [idev] CDI.KEYID = 6
3,857,682 UART: [idev] SUBJECT.KEYID = 7
3,858,943 UART: [idev] UDS.KEYID = 0
3,859,859 ready_for_fw is high
3,860,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,963 UART: [idev] Erasing UDS.KEYID = 0
6,336,460 UART: [idev] Sha1 KeyId Algorithm
6,359,863 UART: [idev] --
6,365,736 UART: [ldev] ++
6,366,427 UART: [ldev] CDI.KEYID = 6
6,367,344 UART: [ldev] SUBJECT.KEYID = 5
6,368,510 UART: [ldev] AUTHORITY.KEYID = 7
6,369,745 UART: [ldev] FE.KEYID = 1
6,383,260 UART: [ldev] Erasing FE.KEYID = 1
8,860,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,582,242 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
10,597,411 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
10,612,528 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
10,627,467 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
10,648,843 UART: [ldev] --
10,654,441 UART: [fwproc] Wait for Commands...
10,656,106 UART: [fwproc] Recv command 0x46574c44
10,658,071 UART: [fwproc] Recv'd Img size: 118548 bytes
14,190,259 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,270,349 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,393,982 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,953,430 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
3,764,438 ready_for_fw is high
3,764,894 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,097,036 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,975 UART: [state] LifecycleState = Production
85,583 UART: [state] DebugLocked = Yes
86,115 UART: [state] Starting the Watchdog Timer 40000000 cycles
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,503 UART: [kat] SHA2-256
892,441 UART: [kat] SHA2-384
895,196 UART: [kat] SHA2-512-ACC
897,097 UART: [kat] ECC-384
902,590 UART: [kat] HMAC-384Kdf
907,182 UART: [kat] LMS
1,475,378 UART: [kat] --
1,476,445 UART: [cold-reset] ++
1,477,016 UART: [fht] Storing FHT @ 0x50003400
1,479,735 UART: [idev] ++
1,479,903 UART: [idev] CDI.KEYID = 6
1,480,263 UART: [idev] SUBJECT.KEYID = 7
1,480,687 UART: [idev] UDS.KEYID = 0
1,481,032 ready_for_fw is high
1,481,032 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,696 UART: [idev] Erasing UDS.KEYID = 0
1,505,361 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,964 UART: [idev] --
1,515,039 UART: [ldev] ++
1,515,207 UART: [ldev] CDI.KEYID = 6
1,515,570 UART: [ldev] SUBJECT.KEYID = 5
1,515,996 UART: [ldev] AUTHORITY.KEYID = 7
1,516,459 UART: [ldev] FE.KEYID = 1
1,521,819 UART: [ldev] Erasing FE.KEYID = 1
1,547,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,483 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,177 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,049 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,577,755 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,584,809 UART: [ldev] --
1,586,174 UART: [fwproc] Waiting for Commands...
1,586,893 UART: [fwproc] Received command 0x46574c44
1,587,684 UART: [fwproc] Received Image of size 118548 bytes
2,957,981 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,972 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,190 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,508 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,022 ready_for_fw is high
1,363,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,005,496 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,608 UART: [state] LifecycleState = Production
86,216 UART: [state] DebugLocked = Yes
86,950 UART: [state] Starting the Watchdog Timer 40000000 cycles
88,626 UART: [kat] SHA2-256
882,557 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,672 UART: [kat] ++
886,824 UART: [kat] sha1
891,158 UART: [kat] SHA2-256
893,096 UART: [kat] SHA2-384
895,877 UART: [kat] SHA2-512-ACC
897,778 UART: [kat] ECC-384
903,503 UART: [kat] HMAC-384Kdf
908,215 UART: [kat] LMS
1,476,411 UART: [kat] --
1,477,220 UART: [cold-reset] ++
1,477,737 UART: [fht] Storing FHT @ 0x50003400
1,480,520 UART: [idev] ++
1,480,688 UART: [idev] CDI.KEYID = 6
1,481,048 UART: [idev] SUBJECT.KEYID = 7
1,481,472 UART: [idev] UDS.KEYID = 0
1,481,817 ready_for_fw is high
1,481,817 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,201 UART: [idev] Erasing UDS.KEYID = 0
1,505,926 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,483 UART: [idev] --
1,515,520 UART: [ldev] ++
1,515,688 UART: [ldev] CDI.KEYID = 6
1,516,051 UART: [ldev] SUBJECT.KEYID = 5
1,516,477 UART: [ldev] AUTHORITY.KEYID = 7
1,516,940 UART: [ldev] FE.KEYID = 1
1,522,390 UART: [ldev] Erasing FE.KEYID = 1
1,547,645 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,954 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,566,648 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,572,520 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,578,226 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,585,296 UART: [ldev] --
1,586,651 UART: [fwproc] Waiting for Commands...
1,587,282 UART: [fwproc] Received command 0x46574c44
1,588,073 UART: [fwproc] Received Image of size 118548 bytes
2,958,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,985,993 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,017,211 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,157,571 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,299 ready_for_fw is high
1,363,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,463 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.05s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,933 UART: [state] LifecycleState = Production
85,541 UART: [state] DebugLocked = Yes
86,201 UART: [state] Starting the WD Timer 40000000 cycles
87,738 UART: [kat] SHA2-256
891,288 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,392 UART: [kat] ++
895,544 UART: [kat] sha1
899,956 UART: [kat] SHA2-256
901,896 UART: [kat] SHA2-384
904,731 UART: [kat] SHA2-512-ACC
906,632 UART: [kat] ECC-384
916,017 UART: [kat] HMAC-384Kdf
920,611 UART: [kat] LMS
1,168,923 UART: [kat] --
1,169,762 UART: [cold-reset] ++
1,170,279 UART: [fht] FHT @ 0x50003400
1,172,915 UART: [idev] ++
1,173,083 UART: [idev] CDI.KEYID = 6
1,173,444 UART: [idev] SUBJECT.KEYID = 7
1,173,869 UART: [idev] UDS.KEYID = 0
1,174,215 ready_for_fw is high
1,174,215 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,861 UART: [idev] Erasing UDS.KEYID = 0
1,198,930 UART: [idev] Sha1 KeyId Algorithm
1,207,897 UART: [idev] --
1,208,872 UART: [ldev] ++
1,209,040 UART: [ldev] CDI.KEYID = 6
1,209,404 UART: [ldev] SUBJECT.KEYID = 5
1,209,831 UART: [ldev] AUTHORITY.KEYID = 7
1,210,294 UART: [ldev] FE.KEYID = 1
1,215,636 UART: [ldev] Erasing FE.KEYID = 1
1,242,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,759 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,453 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,323 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,029 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,111 UART: [ldev] --
1,281,556 UART: [fwproc] Wait for Commands...
1,282,153 UART: [fwproc] Recv command 0x46574c44
1,282,886 UART: [fwproc] Recv'd Img size: 118548 bytes
2,652,102 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,679,108 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,710,283 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,850,607 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.10s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,447 ready_for_fw is high
1,059,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,760 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,408 UART: [state] LifecycleState = Production
86,016 UART: [state] DebugLocked = Yes
86,538 UART: [state] Starting the WD Timer 40000000 cycles
88,079 UART: [kat] SHA2-256
891,629 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,733 UART: [kat] ++
895,885 UART: [kat] sha1
899,921 UART: [kat] SHA2-256
901,861 UART: [kat] SHA2-384
904,642 UART: [kat] SHA2-512-ACC
906,543 UART: [kat] ECC-384
916,366 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,099 UART: [cold-reset] ++
1,170,506 UART: [fht] FHT @ 0x50003400
1,173,302 UART: [idev] ++
1,173,470 UART: [idev] CDI.KEYID = 6
1,173,831 UART: [idev] SUBJECT.KEYID = 7
1,174,256 UART: [idev] UDS.KEYID = 0
1,174,602 ready_for_fw is high
1,174,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,586 UART: [idev] Erasing UDS.KEYID = 0
1,200,119 UART: [idev] Sha1 KeyId Algorithm
1,209,064 UART: [idev] --
1,210,317 UART: [ldev] ++
1,210,485 UART: [ldev] CDI.KEYID = 6
1,210,849 UART: [ldev] SUBJECT.KEYID = 5
1,211,276 UART: [ldev] AUTHORITY.KEYID = 7
1,211,739 UART: [ldev] FE.KEYID = 1
1,217,193 UART: [ldev] Erasing FE.KEYID = 1
1,243,746 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,498 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,263,192 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,269,062 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,274,768 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,281,858 UART: [ldev] --
1,283,293 UART: [fwproc] Wait for Commands...
1,283,982 UART: [fwproc] Recv command 0x46574c44
1,284,715 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,841 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,883 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,712,058 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,852,362 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,580 ready_for_fw is high
1,060,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,849 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.08s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,959 UART: [state] LifecycleState = Production
85,567 UART: [state] DebugLocked = Yes
86,175 UART: [state] Starting the WD Timer 40000000 cycles
87,778 UART: [kat] SHA2-256
893,428 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,553 UART: [kat] ++
897,705 UART: [kat] sha1
901,837 UART: [kat] SHA2-256
903,777 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
917,842 UART: [kat] HMAC-384Kdf
922,458 UART: [kat] LMS
1,170,786 UART: [kat] --
1,171,625 UART: [cold-reset] ++
1,172,040 UART: [fht] FHT @ 0x50003400
1,174,721 UART: [idev] ++
1,174,889 UART: [idev] CDI.KEYID = 6
1,175,249 UART: [idev] SUBJECT.KEYID = 7
1,175,673 UART: [idev] UDS.KEYID = 0
1,176,018 ready_for_fw is high
1,176,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,910 UART: [idev] Erasing UDS.KEYID = 0
1,200,886 UART: [idev] Sha1 KeyId Algorithm
1,209,365 UART: [idev] --
1,210,289 UART: [ldev] ++
1,210,457 UART: [ldev] CDI.KEYID = 6
1,210,820 UART: [ldev] SUBJECT.KEYID = 5
1,211,246 UART: [ldev] AUTHORITY.KEYID = 7
1,211,709 UART: [ldev] FE.KEYID = 1
1,216,441 UART: [ldev] Erasing FE.KEYID = 1
1,242,584 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,085 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,261,779 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,267,651 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,273,357 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,280,386 UART: [ldev] --
1,281,739 UART: [fwproc] Wait for Commands...
1,282,469 UART: [fwproc] Recv command 0x46574c44
1,283,197 UART: [fwproc] Recv'd Img size: 118548 bytes
2,653,255 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,680,401 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,711,571 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,851,877 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.03s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,248 ready_for_fw is high
1,061,248 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,646 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.01s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,220 UART: [state] LifecycleState = Production
85,828 UART: [state] DebugLocked = Yes
86,540 UART: [state] Starting the WD Timer 40000000 cycles
88,045 UART: [kat] SHA2-256
893,695 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,820 UART: [kat] ++
897,972 UART: [kat] sha1
902,116 UART: [kat] SHA2-256
904,056 UART: [kat] SHA2-384
906,989 UART: [kat] SHA2-512-ACC
908,890 UART: [kat] ECC-384
918,385 UART: [kat] HMAC-384Kdf
923,039 UART: [kat] LMS
1,171,367 UART: [kat] --
1,172,238 UART: [cold-reset] ++
1,172,741 UART: [fht] FHT @ 0x50003400
1,175,420 UART: [idev] ++
1,175,588 UART: [idev] CDI.KEYID = 6
1,175,948 UART: [idev] SUBJECT.KEYID = 7
1,176,372 UART: [idev] UDS.KEYID = 0
1,176,717 ready_for_fw is high
1,176,717 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,607 UART: [idev] Erasing UDS.KEYID = 0
1,202,119 UART: [idev] Sha1 KeyId Algorithm
1,210,504 UART: [idev] --
1,211,584 UART: [ldev] ++
1,211,752 UART: [ldev] CDI.KEYID = 6
1,212,115 UART: [ldev] SUBJECT.KEYID = 5
1,212,541 UART: [ldev] AUTHORITY.KEYID = 7
1,213,004 UART: [ldev] FE.KEYID = 1
1,218,230 UART: [ldev] Erasing FE.KEYID = 1
1,244,573 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,454 UART: [ldev] PUB.X = 842C00AF05ACCCEB14514E2D37B0C3AAA218F15057F1DCB824A214980B744688A0888A0297FA7DC5E1EAD8CA1291DB22
1,264,148 UART: [ldev] PUB.Y = 9C28EB8678BCE800822C07228F416AE49D218E5DA2F2D1A8A27DC19ADF668A74628999D222B40159D8076FAFBB8C5EDB
1,270,020 UART: [ldev] SIG.R = 9B0E199181F690A7433460D81D69C4A56352A3C893CF4C11BEE1A18D47A6B56378423F8A85F234B4AB5A1801F6E7FF92
1,275,726 UART: [ldev] SIG.S = E121CF21FE4409819501FD29ADF529A9016A2EA315BF65AB2AE5827CEFF1B859BD7E60CF15C72A64EACF2B7B9BFF42D3
1,282,875 UART: [ldev] --
1,284,388 UART: [fwproc] Wait for Commands...
1,284,994 UART: [fwproc] Recv command 0x46574c44
1,285,722 UART: [fwproc] Recv'd Img size: 118548 bytes
2,655,850 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,682,582 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,713,752 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,854,048 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
7,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 ready_for_fw is high
1,060,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,706,575 >>> mbox cmd response: success
test security_parameters::attempt_ssp_access_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.96s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
192,061 UART:
192,461 UART: Running Caliptra ROM ...
193,668 UART:
193,825 UART: [state] CFI Enabled
263,672 UART: [state] LifecycleState = Unprovisioned
265,595 UART: [state] DebugLocked = No
267,072 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,171 UART: [kat] SHA2-256
441,843 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,400 UART: [kat] ++
452,855 UART: [kat] sha1
463,089 UART: [kat] SHA2-256
465,762 UART: [kat] SHA2-384
472,541 UART: [kat] SHA2-512-ACC
474,844 UART: [kat] ECC-384
2,768,573 UART: [kat] HMAC-384Kdf
2,800,007 UART: [kat] LMS
3,990,275 UART: [kat] --
3,994,926 UART: [cold-reset] ++
3,997,430 UART: [fht] Storing FHT @ 0x50003400
4,009,411 UART: [idev] ++
4,009,988 UART: [idev] CDI.KEYID = 6
4,010,906 UART: [idev] SUBJECT.KEYID = 7
4,012,163 UART: [idev] UDS.KEYID = 0
4,014,036 ready_for_fw is high
4,014,298 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,348 UART: [idev] Erasing UDS.KEYID = 0
7,346,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,222 UART: [idev] --
7,373,309 UART: [ldev] ++
7,373,924 UART: [ldev] CDI.KEYID = 6
7,374,839 UART: [ldev] SUBJECT.KEYID = 5
7,376,064 UART: [ldev] AUTHORITY.KEYID = 7
7,377,327 UART: [ldev] FE.KEYID = 1
7,422,990 UART: [ldev] Erasing FE.KEYID = 1
10,754,753 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,063,532 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,078,068 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,092,932 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,107,460 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,262 UART: [ldev] --
13,130,041 UART: [fwproc] Waiting for Commands...
13,131,983 UART: [fwproc] Received command 0x46574c44
13,134,226 UART: [fwproc] Received Image of size 118548 bytes
17,241,961 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,310,314 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,383,505 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,712,259 >>> mbox cmd response: success
17,712,698 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,716,800 UART: [afmc] ++
17,717,483 UART: [afmc] CDI.KEYID = 6
17,718,373 UART: [afmc] SUBJECT.KEYID = 7
17,719,595 UART: [afmc] AUTHORITY.KEYID = 5
21,088,301 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,386,033 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,388,296 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,402,722 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,417,444 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,431,841 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,453,700 UART: [afmc] --
23,458,146 UART: [cold-reset] --
23,462,443 UART: [state] Locking Datavault
23,466,230 UART: [state] Locking PCR0, PCR1 and PCR31
23,467,979 UART: [state] Locking ICCM
23,469,563 UART: [exit] Launching FMC @ 0x40000130
23,477,922 UART:
23,478,159 UART: Running Caliptra FMC ...
23,479,185 UART:
23,479,330 UART: [state] CFI Enabled
23,546,923 UART: [fht] FMC Alias Private Key: 7
25,886,811 UART: [art] Extend RT PCRs Done
25,888,032 UART: [art] Lock RT PCRs Done
25,889,739 UART: [art] Populate DV Done
25,895,423 UART: [fht] FMC Alias Private Key: 7
25,896,912 UART: [art] Derive CDI
25,897,670 UART: [art] Store in slot 0x4
25,955,338 UART: [art] Derive Key Pair
25,956,378 UART: [art] Store priv key in slot 0x5
29,249,496 UART: [art] Derive Key Pair - Done
29,262,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,551,444 UART: [art] Erasing AUTHORITY.KEYID = 7
31,552,976 UART: [art] PUB.X = F3912C418817000E88C31909A0CFE97464DC28F16DBDB39E80D15059A5B92D966484C5F0A767F7355B9D62499705AAEE
31,560,228 UART: [art] PUB.Y = 11026466E63CF9DC3314E5325826F7ED8C1E3564E609BFE29412AC92DC82419009FA1ADC4B6329C6E0763EE21254325E
31,567,449 UART: [art] SIG.R = 0133E8CBBCAA1A752DC94B1D2F7D7FB4263B2159364A6A712B68611F56744D155B7AA21C42A8FDC0BF724D42C4C16884
31,574,834 UART: [art] SIG.S = 6139562C524B4796370E9BD0C0795B30CEDE91E1E9FF13338525D1BB247C2A0B7C085D34BF2DB2DA31EA0E1BE09CBB0F
32,879,957 UART: Caliptra RT
32,880,655 UART: [state] CFI Enabled
33,057,729 UART: [rt] RT listening for mailbox commands...
33,089,201 UART: [rt]cmd =0x46505344, len=4
33,198,782 >>> mbox cmd response data (8 bytes)
33,199,325 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,199,619 UART: Fatal Error: 0x000E0008
33,200,749 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,807,482 ready_for_fw is high
3,807,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,988,166 >>> mbox cmd response: success
17,988,894 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,668,232 UART:
23,668,659 UART: Running Caliptra FMC ...
23,669,837 UART:
23,670,001 UART: [state] CFI Enabled
23,720,341 UART: [fht] FMC Alias Private Key: 7
26,061,124 UART: [art] Extend RT PCRs Done
26,062,363 UART: [art] Lock RT PCRs Done
26,063,984 UART: [art] Populate DV Done
26,069,412 UART: [fht] FMC Alias Private Key: 7
26,071,069 UART: [art] Derive CDI
26,071,813 UART: [art] Store in slot 0x4
26,128,616 UART: [art] Derive Key Pair
26,129,664 UART: [art] Store priv key in slot 0x5
29,422,150 UART: [art] Derive Key Pair - Done
29,434,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,676 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,543 UART: [art] PUB.X = B79CD426B3F26B57740CAF8929CDBBB14A6F5E51178303121B78DC88FABEA1EB3EFCA58C8D8045B40E90A33FB7F0B35E
31,732,473 UART: [art] PUB.Y = FE1D1ED020BA7566B2D5198379114F965A48EF4B3F4F4127E54DD3E620C9FA521B9D9C89D3B4B049175A4A53601D34F2
31,739,759 UART: [art] SIG.R = A38044EEB28394048AC64BD8CC41860A11978F70C2EECF90E0F45C87E84A2343442900EBC380A7F6C9AA30F4ADC1F44A
31,747,095 UART: [art] SIG.S = BDDC2F7D4FCE8B97F31BB5852A99552D1BAD0A174FFC00D8610DE8FCD403CD1D9D82A618D932615DEF5E7F53FDAF7CE0
33,052,431 UART: Caliptra RT
33,053,170 UART: [state] CFI Enabled
33,230,804 UART: [rt] RT listening for mailbox commands...
33,262,460 UART: [rt]cmd =0x46505344, len=4
33,372,605 >>> mbox cmd response data (8 bytes)
33,373,228 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,373,545 UART: Fatal Error: 0x000E0008
33,374,578 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,366 writing to cptra_bootfsm_go
193,534 UART:
193,898 UART: Running Caliptra ROM ...
194,991 UART:
604,904 UART: [state] CFI Enabled
621,925 UART: [state] LifecycleState = Unprovisioned
623,820 UART: [state] DebugLocked = No
625,498 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,585 UART: [kat] SHA2-256
800,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
810,877 UART: [kat] ++
811,363 UART: [kat] sha1
822,603 UART: [kat] SHA2-256
825,265 UART: [kat] SHA2-384
832,263 UART: [kat] SHA2-512-ACC
834,680 UART: [kat] ECC-384
3,118,585 UART: [kat] HMAC-384Kdf
3,130,766 UART: [kat] LMS
4,320,841 UART: [kat] --
4,326,776 UART: [cold-reset] ++
4,328,169 UART: [fht] Storing FHT @ 0x50003400
4,340,039 UART: [idev] ++
4,340,626 UART: [idev] CDI.KEYID = 6
4,341,668 UART: [idev] SUBJECT.KEYID = 7
4,342,855 UART: [idev] UDS.KEYID = 0
4,343,973 ready_for_fw is high
4,344,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,493,162 UART: [idev] Erasing UDS.KEYID = 0
7,630,087 UART: [idev] Using Sha1 for KeyId Algorithm
7,652,002 UART: [idev] --
7,655,852 UART: [ldev] ++
7,656,433 UART: [ldev] CDI.KEYID = 6
7,657,461 UART: [ldev] SUBJECT.KEYID = 5
7,658,635 UART: [ldev] AUTHORITY.KEYID = 7
7,659,877 UART: [ldev] FE.KEYID = 1
7,670,534 UART: [ldev] Erasing FE.KEYID = 1
10,961,122 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,252,906 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,267,512 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,282,289 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,296,808 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,315,057 UART: [ldev] --
13,320,224 UART: [fwproc] Waiting for Commands...
13,322,452 UART: [fwproc] Received command 0x46574c44
13,324,659 UART: [fwproc] Received Image of size 118548 bytes
17,430,204 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,510,456 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,583,638 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,912,720 >>> mbox cmd response: success
17,913,148 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,916,910 UART: [afmc] ++
17,917,504 UART: [afmc] CDI.KEYID = 6
17,918,423 UART: [afmc] SUBJECT.KEYID = 7
17,919,664 UART: [afmc] AUTHORITY.KEYID = 5
21,231,770 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,048 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,362 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,541,779 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,503 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,570,904 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,909 UART: [afmc] --
23,595,914 UART: [cold-reset] --
23,600,051 UART: [state] Locking Datavault
23,606,321 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,042 UART: [state] Locking ICCM
23,609,936 UART: [exit] Launching FMC @ 0x40000130
23,618,339 UART:
23,618,582 UART: Running Caliptra FMC ...
23,619,689 UART:
23,619,868 UART: [state] CFI Enabled
23,628,194 UART: [fht] FMC Alias Private Key: 7
25,968,384 UART: [art] Extend RT PCRs Done
25,969,619 UART: [art] Lock RT PCRs Done
25,971,383 UART: [art] Populate DV Done
25,977,177 UART: [fht] FMC Alias Private Key: 7
25,978,775 UART: [art] Derive CDI
25,979,542 UART: [art] Store in slot 0x4
26,022,092 UART: [art] Derive Key Pair
26,023,150 UART: [art] Store priv key in slot 0x5
29,265,093 UART: [art] Derive Key Pair - Done
29,277,993 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,112 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,624 UART: [art] PUB.X = 7A9E80DA1B541C763FFFDBBF6E12B74D78C77E9045D1218AB142D043BCC2674652472CFEA76122F403483FA759A2027F
31,566,870 UART: [art] PUB.Y = 543EBD1D0F2DEF59308A3DECBEB6DE3B8B8D005279F07278B02D1C75C49E071AD407FCB6F41F804F7BBB6ACACD65EDCC
31,574,107 UART: [art] SIG.R = F08FD1ED3FB79C1DC52699E5153C324E7E22C26FCAAF3BBE468935E46ADC7719E003D372375D0A6B0A76345F7ABC3B7E
31,581,512 UART: [art] SIG.S = 0BBAB0E6F0339ABD79E9250FA2FDF724E16D24C0ECFE1F0329A6DB2BE109DE33B9E1FD745682018CB848AF61BDE7176C
32,886,673 UART: Caliptra RT
32,887,394 UART: [state] CFI Enabled
33,020,558 UART: [rt] RT listening for mailbox commands...
33,051,972 UART: [rt]cmd =0x46505344, len=4
33,161,898 >>> mbox cmd response data (8 bytes)
33,162,445 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,162,733 UART: Fatal Error: 0x000E0008
33,163,880 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,318 writing to cptra_bootfsm_go
4,126,987 ready_for_fw is high
4,127,619 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,165,122 >>> mbox cmd response: success
18,165,787 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,801,849 UART:
23,802,257 UART: Running Caliptra FMC ...
23,803,392 UART:
23,803,552 UART: [state] CFI Enabled
23,811,377 UART: [fht] FMC Alias Private Key: 7
26,151,328 UART: [art] Extend RT PCRs Done
26,152,562 UART: [art] Lock RT PCRs Done
26,154,208 UART: [art] Populate DV Done
26,159,704 UART: [fht] FMC Alias Private Key: 7
26,161,251 UART: [art] Derive CDI
26,162,073 UART: [art] Store in slot 0x4
26,204,692 UART: [art] Derive Key Pair
26,205,737 UART: [art] Store priv key in slot 0x5
29,447,502 UART: [art] Derive Key Pair - Done
29,460,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,740,869 UART: [art] Erasing AUTHORITY.KEYID = 7
31,742,379 UART: [art] PUB.X = 83D8E682646B6720E348463E22121B65F8EF523A9ABEF50C75449EEF6243E4D7B9A6E090FE084ECF92C141FAB2A77F24
31,749,645 UART: [art] PUB.Y = 069E741D5833B69550E17001C247488DA981EF52B83C27182F4750B7464240AE1F46B0F563A018F72B462524552611CF
31,756,855 UART: [art] SIG.R = 505AEFA9CA0D1C6D27E7419116E4489E77CB9E78DFB6C221A4D26C8D435B903FE01F19F7A762050BC59A858E36DB3855
31,764,260 UART: [art] SIG.S = 695982DCA6282F70D0ADF4C19487721F5B337FE60A67C918C2B31CD93EE03C7E7BDFA9A9F0588D9545E92226A93B98EF
33,069,677 UART: Caliptra RT
33,070,397 UART: [state] CFI Enabled
33,204,040 UART: [rt] RT listening for mailbox commands...
33,235,300 UART: [rt]cmd =0x46505344, len=4
33,345,194 >>> mbox cmd response data (8 bytes)
33,345,753 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,346,039 UART: Fatal Error: 0x000E0008
33,347,174 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
192,442 UART:
192,802 UART: Running Caliptra ROM ...
194,006 UART:
194,175 UART: [state] CFI Enabled
260,785 UART: [state] LifecycleState = Unprovisioned
262,705 UART: [state] DebugLocked = No
264,245 UART: [state] WD Timer not started. Device not locked for debugging
267,797 UART: [kat] SHA2-256
447,447 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,195 UART: [kat] ++
458,701 UART: [kat] sha1
469,725 UART: [kat] SHA2-256
472,388 UART: [kat] SHA2-384
477,891 UART: [kat] SHA2-512-ACC
480,263 UART: [kat] ECC-384
2,926,175 UART: [kat] HMAC-384Kdf
2,948,302 UART: [kat] LMS
3,424,836 UART: [kat] --
3,429,717 UART: [cold-reset] ++
3,430,737 UART: [fht] FHT @ 0x50003400
3,441,503 UART: [idev] ++
3,442,077 UART: [idev] CDI.KEYID = 6
3,442,971 UART: [idev] SUBJECT.KEYID = 7
3,444,295 UART: [idev] UDS.KEYID = 0
3,445,200 ready_for_fw is high
3,445,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,594,510 UART: [idev] Erasing UDS.KEYID = 0
5,964,823 UART: [idev] Sha1 KeyId Algorithm
5,987,344 UART: [idev] --
5,992,835 UART: [ldev] ++
5,993,419 UART: [ldev] CDI.KEYID = 6
5,994,308 UART: [ldev] SUBJECT.KEYID = 5
5,995,523 UART: [ldev] AUTHORITY.KEYID = 7
5,996,818 UART: [ldev] FE.KEYID = 1
6,035,090 UART: [ldev] Erasing FE.KEYID = 1
8,536,345 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,274,787 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,290,638 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,306,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,322,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,344,911 UART: [ldev] --
10,351,222 UART: [fwproc] Wait for Commands...
10,353,383 UART: [fwproc] Recv command 0x46574c44
10,355,430 UART: [fwproc] Recv'd Img size: 118548 bytes
13,835,695 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,919,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,992,451 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,320,512 >>> mbox cmd response: success
14,320,964 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,324,514 UART: [afmc] ++
14,325,160 UART: [afmc] CDI.KEYID = 6
14,326,080 UART: [afmc] SUBJECT.KEYID = 7
14,327,307 UART: [afmc] AUTHORITY.KEYID = 5
16,873,256 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,611,996 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,034 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,661,594 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,501 UART: [afmc] --
18,689,837 UART: [cold-reset] --
18,692,678 UART: [state] Locking Datavault
18,698,523 UART: [state] Locking PCR0, PCR1 and PCR31
18,700,267 UART: [state] Locking ICCM
18,702,597 UART: [exit] Launching FMC @ 0x40000130
18,710,996 UART:
18,711,244 UART: Running Caliptra FMC ...
18,712,351 UART:
18,712,510 UART: [state] CFI Enabled
18,770,625 UART: [fht] FMC Alias Private Key: 7
20,536,530 UART: [art] Extend RT PCRs Done
20,537,889 UART: [art] Lock RT PCRs Done
20,539,063 UART: [art] Populate DV Done
20,544,456 UART: [fht] FMC Alias Private Key: 7
20,546,163 UART: [art] Derive CDI
20,546,986 UART: [art] Store in slot 0x4
20,602,600 UART: [art] Derive Key Pair
20,603,606 UART: [art] Store priv key in slot 0x5
23,066,011 UART: [art] Derive Key Pair - Done
23,078,953 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,791,787 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,302 UART: [art] PUB.X = 0BD1B75B689B37B2BEF831637743809D4FC7C8A2CF5C77C28AA963197C3799BBBD6D829708CFB1EDB34097A40F4B4386
24,800,563 UART: [art] PUB.Y = C650C6853062D9ACB04D0CABE98A59CF92EE62E0CA9C2023949B9D956B5E5CC8B1C078D8FCABDA9BB0E132555596952B
24,807,804 UART: [art] SIG.R = 381683647624898974A5B14E6E368FBBC9E5587E342BD1FE84E8C6597D1A46CDE3835F77B42B49E2DDFC81E8106DE486
24,815,205 UART: [art] SIG.S = 683BFA20F96B465E2663EFF440DF5025AACD28DFF2879C5E0BFD2401FA393639C74CB70B324AB2781EBB6BC533BCDAB1
25,794,544 UART: Caliptra RT
25,795,605 UART: [state] CFI Enabled
25,984,934 UART: [rt] RT listening for mailbox commands...
26,016,304 UART: [rt]cmd =0x46505344, len=4
26,126,302 >>> mbox cmd response data (8 bytes)
26,126,925 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,127,252 UART: Fatal Error: 0x000E0008
26,128,286 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,220 writing to cptra_bootfsm_go
3,461,543 ready_for_fw is high
3,462,217 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,213,634 >>> mbox cmd response: success
14,214,261 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,492,950 UART:
18,493,348 UART: Running Caliptra FMC ...
18,494,550 UART:
18,494,719 UART: [state] CFI Enabled
18,561,651 UART: [fht] FMC Alias Private Key: 7
20,327,912 UART: [art] Extend RT PCRs Done
20,329,140 UART: [art] Lock RT PCRs Done
20,330,337 UART: [art] Populate DV Done
20,335,517 UART: [fht] FMC Alias Private Key: 7
20,337,126 UART: [art] Derive CDI
20,337,947 UART: [art] Store in slot 0x4
20,394,322 UART: [art] Derive Key Pair
20,395,323 UART: [art] Store priv key in slot 0x5
22,858,068 UART: [art] Derive Key Pair - Done
22,871,373 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,583,480 UART: [art] Erasing AUTHORITY.KEYID = 7
24,585,013 UART: [art] PUB.X = F228E4223EEF5957D2AA5F8FFC7A2C751276DE3F3CF0C61CC6E233D8759A87D1B4259C7AF571F6D124797A989EABE978
24,592,283 UART: [art] PUB.Y = 4A9F7C93C89EBD194983A3568F5A9593D127719A0CF7C8133AFEC2C75EFCB4068E2A745C788668EAD617A8025B89C8D9
24,599,523 UART: [art] SIG.R = 6CBF3912E761ECE9D04AF285852CEE4FC64ACB0F15E9C9CEB9E575D9EA59CF3714E965ED587BDE25981DFC570F82D184
24,606,938 UART: [art] SIG.S = BFE730E94AD626794A742FE4C1F71A4750CC2EBADA782EE95216C0E1324F0655D4EAE3773261507CF2F9217CF63C6964
25,585,746 UART: Caliptra RT
25,586,480 UART: [state] CFI Enabled
25,765,474 UART: [rt] RT listening for mailbox commands...
25,796,957 UART: [rt]cmd =0x46505344, len=4
25,907,152 >>> mbox cmd response data (8 bytes)
25,907,704 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,908,006 UART: Fatal Error: 0x000E0008
25,909,250 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,563 UART:
192,986 UART: Running Caliptra ROM ...
194,332 UART:
603,936 UART: [state] CFI Enabled
616,043 UART: [state] LifecycleState = Unprovisioned
618,004 UART: [state] DebugLocked = No
619,970 UART: [state] WD Timer not started. Device not locked for debugging
624,460 UART: [kat] SHA2-256
804,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,902 UART: [kat] ++
815,363 UART: [kat] sha1
826,593 UART: [kat] SHA2-256
829,325 UART: [kat] SHA2-384
835,036 UART: [kat] SHA2-512-ACC
837,345 UART: [kat] ECC-384
3,278,402 UART: [kat] HMAC-384Kdf
3,291,730 UART: [kat] LMS
3,768,362 UART: [kat] --
3,772,510 UART: [cold-reset] ++
3,774,168 UART: [fht] FHT @ 0x50003400
3,784,943 UART: [idev] ++
3,785,509 UART: [idev] CDI.KEYID = 6
3,786,464 UART: [idev] SUBJECT.KEYID = 7
3,787,712 UART: [idev] UDS.KEYID = 0
3,788,687 ready_for_fw is high
3,788,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,937,901 UART: [idev] Erasing UDS.KEYID = 0
6,267,184 UART: [idev] Sha1 KeyId Algorithm
6,290,855 UART: [idev] --
6,295,825 UART: [ldev] ++
6,296,403 UART: [ldev] CDI.KEYID = 6
6,297,324 UART: [ldev] SUBJECT.KEYID = 5
6,298,487 UART: [ldev] AUTHORITY.KEYID = 7
6,299,799 UART: [ldev] FE.KEYID = 1
6,309,435 UART: [ldev] Erasing FE.KEYID = 1
8,789,224 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,719 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,615 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,469 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,553,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,465 UART: [ldev] --
10,580,392 UART: [fwproc] Wait for Commands...
10,582,932 UART: [fwproc] Recv command 0x46574c44
10,584,926 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,440 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,151,532 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,224,547 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,552,218 >>> mbox cmd response: success
14,552,640 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,557,128 UART: [afmc] ++
14,557,715 UART: [afmc] CDI.KEYID = 6
14,558,602 UART: [afmc] SUBJECT.KEYID = 7
14,559,873 UART: [afmc] AUTHORITY.KEYID = 5
17,062,263 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,784,949 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,787,190 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,803,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,819,074 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,834,626 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,860,025 UART: [afmc] --
18,863,251 UART: [cold-reset] --
18,867,327 UART: [state] Locking Datavault
18,872,518 UART: [state] Locking PCR0, PCR1 and PCR31
18,874,277 UART: [state] Locking ICCM
18,876,995 UART: [exit] Launching FMC @ 0x40000130
18,885,416 UART:
18,885,651 UART: Running Caliptra FMC ...
18,886,757 UART:
18,886,919 UART: [state] CFI Enabled
18,894,974 UART: [fht] FMC Alias Private Key: 7
20,660,847 UART: [art] Extend RT PCRs Done
20,662,090 UART: [art] Lock RT PCRs Done
20,663,440 UART: [art] Populate DV Done
20,668,968 UART: [fht] FMC Alias Private Key: 7
20,670,559 UART: [art] Derive CDI
20,671,299 UART: [art] Store in slot 0x4
20,714,001 UART: [art] Derive Key Pair
20,715,006 UART: [art] Store priv key in slot 0x5
23,142,201 UART: [art] Derive Key Pair - Done
23,154,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,860,687 UART: [art] Erasing AUTHORITY.KEYID = 7
24,862,578 UART: [art] PUB.X = 6F235B437025D37AA1CE03AB723DF9EE8A52DD9B173D0366CA5B1F0C94DA83057FD9B591AE434480A5542598D00CA582
24,869,462 UART: [art] PUB.Y = 09B1929E3CCD7091CCBA727921E7B62B9361964EC8AADE512D2341B2E3DAE0688F19DFBFB173EFB22DF29D00D31DF125
24,876,693 UART: [art] SIG.R = F5EC1EBFBEEADE0CEE37FAC07E5CF4CE659F3B6F52F602975C6CEF3CF0D2844A060C1B0588EB0AFED21145C40D8DD94B
24,884,160 UART: [art] SIG.S = 639ABB22A98032A7A0E8070EDC0CF4DB5BE19D72D1634A428DDBEDF38ADFD9CE12D639B2DB55526679B941C729F8AF4A
25,862,751 UART: Caliptra RT
25,863,477 UART: [state] CFI Enabled
25,995,461 UART: [rt] RT listening for mailbox commands...
26,026,932 UART: [rt]cmd =0x46505344, len=4
26,137,305 >>> mbox cmd response data (8 bytes)
26,137,935 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,138,255 UART: Fatal Error: 0x000E0008
26,139,381 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
3,786,147 ready_for_fw is high
3,786,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,456,781 >>> mbox cmd response: success
14,457,265 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,706,504 UART:
18,706,886 UART: Running Caliptra FMC ...
18,708,135 UART:
18,708,310 UART: [state] CFI Enabled
18,715,705 UART: [fht] FMC Alias Private Key: 7
20,481,555 UART: [art] Extend RT PCRs Done
20,482,810 UART: [art] Lock RT PCRs Done
20,484,608 UART: [art] Populate DV Done
20,490,038 UART: [fht] FMC Alias Private Key: 7
20,491,590 UART: [art] Derive CDI
20,492,357 UART: [art] Store in slot 0x4
20,535,059 UART: [art] Derive Key Pair
20,536,073 UART: [art] Store priv key in slot 0x5
22,963,213 UART: [art] Derive Key Pair - Done
22,976,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,281 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,793 UART: [art] PUB.X = 7BF377BBCD3F1DED0FE61F9442232B13F298005AAAD6074B51329D71E823F0E3FC44EE56BE5D50AFA018DCEFE4766052
24,691,051 UART: [art] PUB.Y = 91368A1CC97FCA51ADA08E9915100EA6D8CBF4D8C006BB0DEC218F01D5438FC37DCEB2CAACA5F8CA85DA351515DAACCC
24,698,367 UART: [art] SIG.R = 0393436D5287B794F6EDB856F768CA4026DEA9F780E4A882E1B70AC6DE91CA3433F361EC19BE48D1DA08387D0323A093
24,705,783 UART: [art] SIG.S = 8777614E91057D567A82D94A89EE7015FEE54859B4D669C9FE39C45C8629D308DFBC68BE6DA8DF12F6AE0FBE6A29FCF9
25,684,442 UART: Caliptra RT
25,685,142 UART: [state] CFI Enabled
25,818,050 UART: [rt] RT listening for mailbox commands...
25,849,408 UART: [rt]cmd =0x46505344, len=4
25,959,708 >>> mbox cmd response data (8 bytes)
25,960,297 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
25,960,616 UART: Fatal Error: 0x000E0008
25,961,654 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,047 writing to cptra_bootfsm_go
192,304 UART:
192,678 UART: Running Caliptra ROM ...
193,861 UART:
194,018 UART: [state] CFI Enabled
268,400 UART: [state] LifecycleState = Unprovisioned
270,813 UART: [state] DebugLocked = No
273,446 UART: [state] WD Timer not started. Device not locked for debugging
278,915 UART: [kat] SHA2-256
468,752 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,554 UART: [kat] ++
480,048 UART: [kat] sha1
490,932 UART: [kat] SHA2-256
493,942 UART: [kat] SHA2-384
500,221 UART: [kat] SHA2-512-ACC
502,821 UART: [kat] ECC-384
2,949,984 UART: [kat] HMAC-384Kdf
2,974,296 UART: [kat] LMS
3,506,104 UART: [kat] --
3,509,558 UART: [cold-reset] ++
3,511,357 UART: [fht] FHT @ 0x50003400
3,521,986 UART: [idev] ++
3,522,708 UART: [idev] CDI.KEYID = 6
3,523,639 UART: [idev] SUBJECT.KEYID = 7
3,524,824 UART: [idev] UDS.KEYID = 0
3,526,093 ready_for_fw is high
3,526,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,385 UART: [idev] Erasing UDS.KEYID = 0
6,032,372 UART: [idev] Sha1 KeyId Algorithm
6,054,390 UART: [idev] --
6,059,173 UART: [ldev] ++
6,059,877 UART: [ldev] CDI.KEYID = 6
6,060,797 UART: [ldev] SUBJECT.KEYID = 5
6,061,933 UART: [ldev] AUTHORITY.KEYID = 7
6,063,172 UART: [ldev] FE.KEYID = 1
6,103,047 UART: [ldev] Erasing FE.KEYID = 1
8,607,887 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,345,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,361,166 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,376,412 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,391,540 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,412,620 UART: [ldev] --
10,418,918 UART: [fwproc] Wait for Commands...
10,421,992 UART: [fwproc] Recv command 0x46574c44
10,424,255 UART: [fwproc] Recv'd Img size: 118548 bytes
13,928,571 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,791 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,359 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,681,652 >>> mbox cmd response: success
14,682,071 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,685,780 UART: [afmc] ++
14,686,506 UART: [afmc] CDI.KEYID = 6
14,687,702 UART: [afmc] SUBJECT.KEYID = 7
14,689,138 UART: [afmc] AUTHORITY.KEYID = 5
17,213,673 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,939,233 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,941,136 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,956,245 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,971,366 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,986,275 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,011,337 UART: [afmc] --
19,014,811 UART: [cold-reset] --
19,018,634 UART: [state] Locking Datavault
19,024,599 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,798 UART: [state] Locking ICCM
19,029,603 UART: [exit] Launching FMC @ 0x40000130
19,038,277 UART:
19,038,516 UART: Running Caliptra FMC ...
19,039,622 UART:
19,039,799 UART: [state] CFI Enabled
19,097,268 UART: [fht] FMC Alias Private Key: 7
20,863,981 UART: [art] Extend RT PCRs Done
20,865,209 UART: [art] Lock RT PCRs Done
20,866,623 UART: [art] Populate DV Done
20,872,093 UART: [fht] FMC Alias Private Key: 7
20,873,746 UART: [art] Derive CDI
20,874,564 UART: [art] Store in slot 0x4
20,930,510 UART: [art] Derive Key Pair
20,931,557 UART: [art] Store priv key in slot 0x5
23,394,752 UART: [art] Derive Key Pair - Done
23,407,788 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,362 UART: [art] Erasing AUTHORITY.KEYID = 7
25,121,875 UART: [art] PUB.X = B073DE8966D320FDB97850DA6182F338E19C519456F43234804F6857DA7C803AFE6F5504CB8090C59274F13F83E12528
25,129,129 UART: [art] PUB.Y = C1DE73740BC356B1DD6229B83CEBFDA807160237733DE04D4DE3C42B0020A5EE36B4E588BD4AA9313DF7EF47070C0451
25,136,362 UART: [art] SIG.R = 377F672F6059A59B69809E50DCE71B629516896FCCA6DDD1FC145BA7A0529B6D1A85A920F15E6CD5462F3B3D8C32FEFA
25,143,765 UART: [art] SIG.S = 555E3333F9FB5A7BA1151ECB15AE4762F0DF06C1E0B594EFDA7A70EE318C07C6CEBA72F77F27C80C9B2C0618F5DDDEC8
26,122,369 UART: Caliptra RT
26,123,092 UART: [state] CFI Enabled
26,304,830 UART: [rt] RT listening for mailbox commands...
26,336,465 UART: [rt]cmd =0x46505344, len=4
26,446,426 >>> mbox cmd response data (8 bytes)
26,446,948 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,447,237 UART: Fatal Error: 0x000E0008
26,448,361 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,909 writing to cptra_bootfsm_go
3,442,157 ready_for_fw is high
3,442,813 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,813,973 >>> mbox cmd response: success
14,814,561 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,089,339 UART:
19,089,754 UART: Running Caliptra FMC ...
19,090,910 UART:
19,091,078 UART: [state] CFI Enabled
19,141,119 UART: [fht] FMC Alias Private Key: 7
20,907,059 UART: [art] Extend RT PCRs Done
20,908,878 UART: [art] Lock RT PCRs Done
20,909,906 UART: [art] Populate DV Done
20,915,031 UART: [fht] FMC Alias Private Key: 7
20,916,652 UART: [art] Derive CDI
20,917,436 UART: [art] Store in slot 0x4
20,973,959 UART: [art] Derive Key Pair
20,975,024 UART: [art] Store priv key in slot 0x5
23,438,343 UART: [art] Derive Key Pair - Done
23,451,370 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,165,223 UART: [art] Erasing AUTHORITY.KEYID = 7
25,166,754 UART: [art] PUB.X = 8AE34EEE9B98A59BEE0A7B95AAED3D8DFDF8962D837356AE9E4EF165559E51E770E143BBD089CEDDDCC5542EB6F82887
25,174,006 UART: [art] PUB.Y = 4E066F59E9BF21CB4E0B61C9CFE6114CBA61846F917C2F9AC63DD8899C021A0BFDC8931079FFD64C4A93EA5C7C630B9D
25,181,298 UART: [art] SIG.R = 0C1AEBE17E4E53A090D76FAA4B7B1D645A46895C04234D3CD40C550B21C7DA04929ABCB3CDA5995E2E8556B21AA7E081
25,188,695 UART: [art] SIG.S = A9FDADC8BF5F099A3CE545FEABC5E7886B2A5B470AA8386F836E552DE18E22B74305586700A782176303460CB7E19FB1
26,167,137 UART: Caliptra RT
26,167,843 UART: [state] CFI Enabled
26,349,843 UART: [rt] RT listening for mailbox commands...
26,381,424 UART: [rt]cmd =0x46505344, len=4
26,491,813 >>> mbox cmd response data (8 bytes)
26,492,404 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,492,909 UART: Fatal Error: 0x000E0008
26,494,063 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
192,499 UART:
192,860 UART: Running Caliptra ROM ...
193,966 UART:
603,923 UART: [state] CFI Enabled
619,018 UART: [state] LifecycleState = Unprovisioned
621,407 UART: [state] DebugLocked = No
623,030 UART: [state] WD Timer not started. Device not locked for debugging
627,872 UART: [kat] SHA2-256
817,782 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,577 UART: [kat] ++
829,120 UART: [kat] sha1
840,295 UART: [kat] SHA2-256
843,305 UART: [kat] SHA2-384
850,083 UART: [kat] SHA2-512-ACC
852,683 UART: [kat] ECC-384
3,292,154 UART: [kat] HMAC-384Kdf
3,305,700 UART: [kat] LMS
3,837,555 UART: [kat] --
3,841,654 UART: [cold-reset] ++
3,843,460 UART: [fht] FHT @ 0x50003400
3,854,308 UART: [idev] ++
3,854,968 UART: [idev] CDI.KEYID = 6
3,855,925 UART: [idev] SUBJECT.KEYID = 7
3,857,179 UART: [idev] UDS.KEYID = 0
3,858,093 ready_for_fw is high
3,858,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,007,295 UART: [idev] Erasing UDS.KEYID = 0
6,334,654 UART: [idev] Sha1 KeyId Algorithm
6,356,986 UART: [idev] --
6,361,045 UART: [ldev] ++
6,361,736 UART: [ldev] CDI.KEYID = 6
6,362,652 UART: [ldev] SUBJECT.KEYID = 5
6,363,875 UART: [ldev] AUTHORITY.KEYID = 7
6,365,060 UART: [ldev] FE.KEYID = 1
6,375,170 UART: [ldev] Erasing FE.KEYID = 1
8,853,437 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,570,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,115 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,616,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,131 UART: [ldev] --
10,642,117 UART: [fwproc] Wait for Commands...
10,644,875 UART: [fwproc] Recv command 0x46574c44
10,647,142 UART: [fwproc] Recv'd Img size: 118548 bytes
14,148,295 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,234,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,358,363 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,919,297 >>> mbox cmd response: success
14,919,729 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,922,626 UART: [afmc] ++
14,923,321 UART: [afmc] CDI.KEYID = 6
14,924,514 UART: [afmc] SUBJECT.KEYID = 7
14,926,007 UART: [afmc] AUTHORITY.KEYID = 5
17,430,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,150,909 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,152,888 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,167,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,115 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,015 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,851 UART: [afmc] --
19,225,566 UART: [cold-reset] --
19,230,679 UART: [state] Locking Datavault
19,235,774 UART: [state] Locking PCR0, PCR1 and PCR31
19,237,921 UART: [state] Locking ICCM
19,240,778 UART: [exit] Launching FMC @ 0x40000130
19,249,409 UART:
19,249,650 UART: Running Caliptra FMC ...
19,250,756 UART:
19,250,916 UART: [state] CFI Enabled
19,259,095 UART: [fht] FMC Alias Private Key: 7
21,025,429 UART: [art] Extend RT PCRs Done
21,026,658 UART: [art] Lock RT PCRs Done
21,028,157 UART: [art] Populate DV Done
21,033,525 UART: [fht] FMC Alias Private Key: 7
21,035,233 UART: [art] Derive CDI
21,036,057 UART: [art] Store in slot 0x4
21,078,610 UART: [art] Derive Key Pair
21,079,616 UART: [art] Store priv key in slot 0x5
23,505,869 UART: [art] Derive Key Pair - Done
23,518,709 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,958 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,471 UART: [art] PUB.X = D0F125849529561D10ED43AB0B0904AEA127590C7F6A0DC100D35FE4AC0BE4EE97BCB4A70F97CB2E70610ECF39224A2E
25,233,720 UART: [art] PUB.Y = DB2DBD379294402203656ABCCAC09E2BB8E866F404DEB08065662BF8B702E0C42E29B7E2D777E070464C2FF89FF8CCA7
25,241,019 UART: [art] SIG.R = 8CED3409B00B59B19490539AF8AAFBA2B7236D1AD35E321691EEDEEF1EC08358B5AE4523311C562053C851126564E1F3
25,248,359 UART: [art] SIG.S = 2C23497EC15D5BAB95AF8DCD79766B9C384E3D91F9D85558C6BD62B2DD270C229CCC6BB42034BFCB51BB41A6C4F5FB87
26,227,281 UART: Caliptra RT
26,227,975 UART: [state] CFI Enabled
26,360,318 UART: [rt] RT listening for mailbox commands...
26,391,554 UART: [rt]cmd =0x46505344, len=4
26,501,586 >>> mbox cmd response data (8 bytes)
26,502,118 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,502,410 UART: Fatal Error: 0x000E0008
26,503,557 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,757,845 ready_for_fw is high
3,758,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,051,308 >>> mbox cmd response: success
15,051,820 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,304,651 UART:
19,305,047 UART: Running Caliptra FMC ...
19,306,220 UART:
19,306,380 UART: [state] CFI Enabled
19,314,203 UART: [fht] FMC Alias Private Key: 7
21,079,262 UART: [art] Extend RT PCRs Done
21,080,517 UART: [art] Lock RT PCRs Done
21,082,314 UART: [art] Populate DV Done
21,088,007 UART: [fht] FMC Alias Private Key: 7
21,089,669 UART: [art] Derive CDI
21,090,495 UART: [art] Store in slot 0x4
21,132,933 UART: [art] Derive Key Pair
21,133,937 UART: [art] Store priv key in slot 0x5
23,560,506 UART: [art] Derive Key Pair - Done
23,573,345 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,280,008 UART: [art] Erasing AUTHORITY.KEYID = 7
25,281,529 UART: [art] PUB.X = 1562DF6E89B94340C06DD79BA9504EE92FB3B1DFB0D9E9C8E07A746A84C2CE31681D7CBB71CB9EB5C61EE7A92D3398B8
25,288,795 UART: [art] PUB.Y = 89B08D4C0A0C55C8BD35235340BB0593CAE8C141610CC9EE5E703021210A4E4A4225D7928294C7BC3709B33D6D526BDB
25,296,005 UART: [art] SIG.R = 5E1D1214A665DC6C8D424E09C9542ADB879D847DE4328C44A57C925699894FDB22C83516394A97622960FAF7B8CEAA51
25,303,412 UART: [art] SIG.S = E8CA23F9096EC0978EA1A53D054276506C8FFF05110B632231CAE4FFD681AE45208DBFEB358A80A98346D73BA68F37F5
26,281,666 UART: Caliptra RT
26,282,353 UART: [state] CFI Enabled
26,414,181 UART: [rt] RT listening for mailbox commands...
26,445,802 UART: [rt]cmd =0x46505344, len=4
26,555,647 >>> mbox cmd response data (8 bytes)
26,556,164 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
26,556,459 UART: Fatal Error: 0x000E0008
26,557,587 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,824 UART: [state] LifecycleState = Unprovisioned
85,479 UART: [state] DebugLocked = No
85,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,617 UART: [kat] SHA2-256
881,548 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,663 UART: [kat] ++
885,815 UART: [kat] sha1
889,997 UART: [kat] SHA2-256
891,935 UART: [kat] SHA2-384
894,868 UART: [kat] SHA2-512-ACC
896,769 UART: [kat] ECC-384
902,112 UART: [kat] HMAC-384Kdf
906,814 UART: [kat] LMS
1,475,010 UART: [kat] --
1,476,135 UART: [cold-reset] ++
1,476,481 UART: [fht] Storing FHT @ 0x50003400
1,479,214 UART: [idev] ++
1,479,382 UART: [idev] CDI.KEYID = 6
1,479,742 UART: [idev] SUBJECT.KEYID = 7
1,480,166 UART: [idev] UDS.KEYID = 0
1,480,511 ready_for_fw is high
1,480,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,120 UART: [idev] Erasing UDS.KEYID = 0
1,504,750 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,496 UART: [idev] --
1,514,391 UART: [ldev] ++
1,514,559 UART: [ldev] CDI.KEYID = 6
1,514,922 UART: [ldev] SUBJECT.KEYID = 5
1,515,348 UART: [ldev] AUTHORITY.KEYID = 7
1,515,811 UART: [ldev] FE.KEYID = 1
1,520,955 UART: [ldev] Erasing FE.KEYID = 1
1,546,144 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,040 UART: [ldev] --
1,585,475 UART: [fwproc] Waiting for Commands...
1,586,156 UART: [fwproc] Received command 0x46574c44
1,586,947 UART: [fwproc] Received Image of size 118548 bytes
2,931,569 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,139 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,357 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,620 >>> mbox cmd response: success
3,130,620 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,131,790 UART: [afmc] ++
3,131,958 UART: [afmc] CDI.KEYID = 6
3,132,320 UART: [afmc] SUBJECT.KEYID = 7
3,132,745 UART: [afmc] AUTHORITY.KEYID = 5
3,167,622 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,972 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,184,752 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,461 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,344 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,027 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,941 UART: [afmc] --
3,211,073 UART: [cold-reset] --
3,211,991 UART: [state] Locking Datavault
3,213,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,806 UART: [state] Locking ICCM
3,214,236 UART: [exit] Launching FMC @ 0x40000130
3,219,566 UART:
3,219,582 UART: Running Caliptra FMC ...
3,219,990 UART:
3,220,044 UART: [state] CFI Enabled
3,230,612 UART: [fht] FMC Alias Private Key: 7
3,349,364 UART: [art] Extend RT PCRs Done
3,349,792 UART: [art] Lock RT PCRs Done
3,351,542 UART: [art] Populate DV Done
3,359,733 UART: [fht] FMC Alias Private Key: 7
3,360,915 UART: [art] Derive CDI
3,361,195 UART: [art] Store in slot 0x4
3,446,999 UART: [art] Derive Key Pair
3,447,359 UART: [art] Store priv key in slot 0x5
3,460,612 UART: [art] Derive Key Pair - Done
3,476,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,679 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,444 UART: [art] PUB.X = 427FA0A5BC25024F846C2CE1B56B9D4A903F5752A9402DE09EC988B0B11BC80E3DC896816C2D3ABEB3D5318D61107040
3,499,214 UART: [art] PUB.Y = BB5E2E67A2BDC81B581765C83042170E1090A8E4470B8FAD55111DD79A7D8A9215779011AD7F7E163A300B5E2D2D0BCE
3,506,158 UART: [art] SIG.R = B064640C07EFC16148C5E1ACB49574785C240E229DA5AB0FB3F819F51D1CD54860636A4EE750AF9F6DB2C0AF62C68364
3,512,924 UART: [art] SIG.S = 756FC748B411026DB9A7F6C991DB48E2EB4A4E4372A2D09CDFB709B88141D6A314645F3AFA0ECB0B5AC0A66F3523D491
3,537,502 UART: Caliptra RT
3,537,753 UART: [state] CFI Enabled
3,657,785 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,688,267 UART: [rt]cmd =0x46505344, len=4
3,797,030 >>> mbox cmd response data (8 bytes)
3,797,031 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,797,067 UART: Fatal Error: 0x000E0008
3,798,190 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,473 ready_for_fw is high
1,362,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,968 >>> mbox cmd response: success
2,980,968 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,043,309 UART:
3,043,325 UART: Running Caliptra FMC ...
3,043,733 UART:
3,043,787 UART: [state] CFI Enabled
3,054,463 UART: [fht] FMC Alias Private Key: 7
3,173,443 UART: [art] Extend RT PCRs Done
3,173,871 UART: [art] Lock RT PCRs Done
3,175,161 UART: [art] Populate DV Done
3,183,220 UART: [fht] FMC Alias Private Key: 7
3,184,232 UART: [art] Derive CDI
3,184,512 UART: [art] Store in slot 0x4
3,270,148 UART: [art] Derive Key Pair
3,270,508 UART: [art] Store priv key in slot 0x5
3,283,565 UART: [art] Derive Key Pair - Done
3,298,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,025 UART: [art] Erasing AUTHORITY.KEYID = 7
3,314,790 UART: [art] PUB.X = 49E5877BA807FC94F3180CD1FEC9F8AA0364BD1DA62014312554FF14C85A1989D3C15EC7E7D9BB8B3C5BB2102191FAB4
3,321,563 UART: [art] PUB.Y = A4BD7F2C50386E33674CFCA7CFBDAE616692C99E1F4D6197B1DB1F58F40ED0E218CD2BEED918D76E4D5CDC8166D33671
3,328,530 UART: [art] SIG.R = 79E58BC4CAF6915CAF3FBAD123BF72F6B5B9DA2ED395686DDE5A1A4B0067E7D77E1AA01B0480D03B9344A8E600CF3C7A
3,335,275 UART: [art] SIG.S = 661434F82A7A90F8B16F9F77D42A0F6C195C1AEE5EA050E193C3CCE9DF18492D01E8B285277A153147EAA7F868DC6E63
3,358,625 UART: Caliptra RT
3,358,876 UART: [state] CFI Enabled
3,479,225 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,509,659 UART: [rt]cmd =0x46505344, len=4
3,617,940 >>> mbox cmd response data (8 bytes)
3,617,941 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,617,977 UART: Fatal Error: 0x000E0008
3,619,100 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,965 UART: [state] LifecycleState = Unprovisioned
86,620 UART: [state] DebugLocked = No
87,146 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,746 UART: [kat] SHA2-256
882,677 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,792 UART: [kat] ++
886,944 UART: [kat] sha1
891,214 UART: [kat] SHA2-256
893,152 UART: [kat] SHA2-384
896,047 UART: [kat] SHA2-512-ACC
897,948 UART: [kat] ECC-384
903,695 UART: [kat] HMAC-384Kdf
908,173 UART: [kat] LMS
1,476,369 UART: [kat] --
1,476,984 UART: [cold-reset] ++
1,477,494 UART: [fht] Storing FHT @ 0x50003400
1,480,223 UART: [idev] ++
1,480,391 UART: [idev] CDI.KEYID = 6
1,480,751 UART: [idev] SUBJECT.KEYID = 7
1,481,175 UART: [idev] UDS.KEYID = 0
1,481,520 ready_for_fw is high
1,481,520 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,489,439 UART: [idev] Erasing UDS.KEYID = 0
1,506,179 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,895 UART: [idev] --
1,515,948 UART: [ldev] ++
1,516,116 UART: [ldev] CDI.KEYID = 6
1,516,479 UART: [ldev] SUBJECT.KEYID = 5
1,516,905 UART: [ldev] AUTHORITY.KEYID = 7
1,517,368 UART: [ldev] FE.KEYID = 1
1,522,672 UART: [ldev] Erasing FE.KEYID = 1
1,547,853 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,380 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,096 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,867 UART: [ldev] --
1,587,188 UART: [fwproc] Waiting for Commands...
1,588,057 UART: [fwproc] Received command 0x46574c44
1,588,848 UART: [fwproc] Received Image of size 118548 bytes
2,933,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,960,458 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,991,676 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,132,045 >>> mbox cmd response: success
3,132,045 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,133,075 UART: [afmc] ++
3,133,243 UART: [afmc] CDI.KEYID = 6
3,133,605 UART: [afmc] SUBJECT.KEYID = 7
3,134,030 UART: [afmc] AUTHORITY.KEYID = 5
3,168,791 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,897 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,386 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,269 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,952 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,898 UART: [afmc] --
3,211,976 UART: [cold-reset] --
3,212,934 UART: [state] Locking Datavault
3,214,323 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,927 UART: [state] Locking ICCM
3,215,583 UART: [exit] Launching FMC @ 0x40000130
3,220,913 UART:
3,220,929 UART: Running Caliptra FMC ...
3,221,337 UART:
3,221,480 UART: [state] CFI Enabled
3,231,990 UART: [fht] FMC Alias Private Key: 7
3,350,878 UART: [art] Extend RT PCRs Done
3,351,306 UART: [art] Lock RT PCRs Done
3,352,704 UART: [art] Populate DV Done
3,361,063 UART: [fht] FMC Alias Private Key: 7
3,362,129 UART: [art] Derive CDI
3,362,409 UART: [art] Store in slot 0x4
3,448,219 UART: [art] Derive Key Pair
3,448,579 UART: [art] Store priv key in slot 0x5
3,461,516 UART: [art] Derive Key Pair - Done
3,476,266 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,661 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,426 UART: [art] PUB.X = 662EECD190A4A5FF3B88BF1935328FB507BA00642DC9D8B911A707CF5E50186878CA82ED8F95C9D3A735797002F43F44
3,499,169 UART: [art] PUB.Y = EB8585CE11447309271DB58607AAAD7C1417936C297A4E5AEBC11A521B78D542DF84EF9C8A8692BEF8785C3396408C2A
3,506,117 UART: [art] SIG.R = C1BAF4E7B93C45B86589BBD5D93FF6F0DBFD791F7052E94AC4CF1C048117940720BD6233931B6AFA2A5560602B31F63C
3,512,891 UART: [art] SIG.S = 094E90B60AA02FA4F2AD26F661DF03F8ECAF731F4ED76D08B1F9B6C1B2430A7566F4034E7B51868BA94235F8C6AEB1B7
3,536,879 UART: Caliptra RT
3,537,222 UART: [state] CFI Enabled
3,657,688 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,818 UART: [rt]cmd =0x46505344, len=4
3,796,405 >>> mbox cmd response data (8 bytes)
3,796,406 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,796,442 UART: Fatal Error: 0x000E0008
3,797,565 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 ready_for_fw is high
1,362,496 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,435 >>> mbox cmd response: success
2,982,435 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,043,810 UART:
3,043,826 UART: Running Caliptra FMC ...
3,044,234 UART:
3,044,377 UART: [state] CFI Enabled
3,054,895 UART: [fht] FMC Alias Private Key: 7
3,173,889 UART: [art] Extend RT PCRs Done
3,174,317 UART: [art] Lock RT PCRs Done
3,175,771 UART: [art] Populate DV Done
3,184,092 UART: [fht] FMC Alias Private Key: 7
3,185,082 UART: [art] Derive CDI
3,185,362 UART: [art] Store in slot 0x4
3,270,726 UART: [art] Derive Key Pair
3,271,086 UART: [art] Store priv key in slot 0x5
3,284,433 UART: [art] Derive Key Pair - Done
3,299,496 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,903 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,668 UART: [art] PUB.X = 8B2A0CBFE282956EC7725A18549634C4D4ADB49409D444E99257CB4DE57E748BABACEA78DC0D7F9F977F2929D1F27C0F
3,322,440 UART: [art] PUB.Y = B1F12FCA5ADB4B79DAB3635D15893214F5BA62A2EE7C4040069693CD3D55419D8D1D5998E3F8BF6D9CBC07B56BC2EE83
3,329,400 UART: [art] SIG.R = 6943BA7E63BB9BB757A19CB8D3CE44F364C19749F958EF8703D25DF92CD1745613F02E729E3E4415AA65E5AC1D3E7152
3,336,173 UART: [art] SIG.S = 7724D926D89881D182D00C39F1A720E10AAFA66B9BE72573BDB4C3C45F51C25584DEB56B5587A6542077686ADBCB857E
3,359,621 UART: Caliptra RT
3,359,964 UART: [state] CFI Enabled
3,479,751 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,003 UART: [rt]cmd =0x46505344, len=4
3,618,508 >>> mbox cmd response data (8 bytes)
3,618,509 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,618,545 UART: Fatal Error: 0x000E0008
3,619,668 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,538 UART: [state] LifecycleState = Unprovisioned
86,193 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
87,998 UART: [kat] SHA2-256
891,548 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,652 UART: [kat] ++
895,804 UART: [kat] sha1
900,004 UART: [kat] SHA2-256
901,944 UART: [kat] SHA2-384
904,669 UART: [kat] SHA2-512-ACC
906,570 UART: [kat] ECC-384
916,225 UART: [kat] HMAC-384Kdf
921,031 UART: [kat] LMS
1,169,343 UART: [kat] --
1,170,078 UART: [cold-reset] ++
1,170,442 UART: [fht] FHT @ 0x50003400
1,172,966 UART: [idev] ++
1,173,134 UART: [idev] CDI.KEYID = 6
1,173,495 UART: [idev] SUBJECT.KEYID = 7
1,173,920 UART: [idev] UDS.KEYID = 0
1,174,266 ready_for_fw is high
1,174,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,601 UART: [idev] Erasing UDS.KEYID = 0
1,199,201 UART: [idev] Sha1 KeyId Algorithm
1,208,039 UART: [idev] --
1,209,038 UART: [ldev] ++
1,209,206 UART: [ldev] CDI.KEYID = 6
1,209,570 UART: [ldev] SUBJECT.KEYID = 5
1,209,997 UART: [ldev] AUTHORITY.KEYID = 7
1,210,460 UART: [ldev] FE.KEYID = 1
1,215,858 UART: [ldev] Erasing FE.KEYID = 1
1,241,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,387 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,103 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,704 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,990 UART: [ldev] --
1,281,435 UART: [fwproc] Wait for Commands...
1,282,126 UART: [fwproc] Recv command 0x46574c44
1,282,859 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,328 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,298 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,639 >>> mbox cmd response: success
2,825,639 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,826,817 UART: [afmc] ++
2,826,985 UART: [afmc] CDI.KEYID = 6
2,827,348 UART: [afmc] SUBJECT.KEYID = 7
2,827,774 UART: [afmc] AUTHORITY.KEYID = 5
2,863,833 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,753 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,463 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,344 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,045 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,814 UART: [afmc] --
2,906,653 UART: [cold-reset] --
2,907,299 UART: [state] Locking Datavault
2,908,646 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,250 UART: [state] Locking ICCM
2,909,802 UART: [exit] Launching FMC @ 0x40000130
2,915,132 UART:
2,915,148 UART: Running Caliptra FMC ...
2,915,556 UART:
2,915,610 UART: [state] CFI Enabled
2,926,250 UART: [fht] FMC Alias Private Key: 7
3,045,070 UART: [art] Extend RT PCRs Done
3,045,498 UART: [art] Lock RT PCRs Done
3,046,854 UART: [art] Populate DV Done
3,054,811 UART: [fht] FMC Alias Private Key: 7
3,055,907 UART: [art] Derive CDI
3,056,187 UART: [art] Store in slot 0x4
3,141,850 UART: [art] Derive Key Pair
3,142,210 UART: [art] Store priv key in slot 0x5
3,155,222 UART: [art] Derive Key Pair - Done
3,169,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,338 UART: [art] PUB.X = 85392858DCBE9EC7666DDA1E9E162DCFD7FF5E96E37819DA92BBAFE2197E4850558D01BA18205F877532861836A15EE4
3,193,111 UART: [art] PUB.Y = CEDDEC20834B31F91E9C9DE25E9FE263897A27AD6BBAD0361FDFAC48B73DF4C593D2179B3EB763A8479F2ADA98C7FF81
3,200,085 UART: [art] SIG.R = 306D0E60CA092E0EB8FDC5E63AC50FC78AE8363C367A63B3A52E1F4F416F4D9CFD13D3BEF6EAEE1CBD5193F709E6F229
3,206,864 UART: [art] SIG.S = 6CB1096D9554D60DF8190C6D6921B6048EA59CA397AF513A9C5B84EBC86EDF14397B6C9340D05A79BD3DAEBEB56D2CF8
3,231,172 UART: Caliptra RT
3,231,423 UART: [state] CFI Enabled
3,351,281 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,967 UART: [rt]cmd =0x46505344, len=4
3,490,386 >>> mbox cmd response data (8 bytes)
3,490,387 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,490,423 UART: Fatal Error: 0x000E0008
3,491,546 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,216 ready_for_fw is high
1,058,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,154 >>> mbox cmd response: success
2,677,154 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,738,657 UART:
2,738,673 UART: Running Caliptra FMC ...
2,739,081 UART:
2,739,135 UART: [state] CFI Enabled
2,749,415 UART: [fht] FMC Alias Private Key: 7
2,867,649 UART: [art] Extend RT PCRs Done
2,868,077 UART: [art] Lock RT PCRs Done
2,869,569 UART: [art] Populate DV Done
2,877,858 UART: [fht] FMC Alias Private Key: 7
2,878,880 UART: [art] Derive CDI
2,879,160 UART: [art] Store in slot 0x4
2,965,049 UART: [art] Derive Key Pair
2,965,409 UART: [art] Store priv key in slot 0x5
2,978,637 UART: [art] Derive Key Pair - Done
2,993,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,806 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,571 UART: [art] PUB.X = 0E82A8315F45BFF6625C6A5676AF32BE44487CD50130ABAECF0E0D552DC7AE05E7D278C5054335BF212EB2E8BCFD59E6
3,016,339 UART: [art] PUB.Y = 4ED759C56B8CD3BB91E67D5A5369ABBA420351ED8051B8568D91B60B6A24D9C6C062D0D373CCD3D6B19BB49AB6A5E36E
3,023,299 UART: [art] SIG.R = C9515B79AE5E505A581583A3423CDAF58FE06847E64F6DD70B2DD90F8CB80A19AE3DE226A3F753903D5E52B09F24F5AD
3,030,072 UART: [art] SIG.S = DC14EF807325903EA107BEF04F28FD5C3F1CE11CE06BBBA202E7DC23BB0F454D32BA165F2F1A6A8F7FBD62F60F6E6B28
3,053,824 UART: Caliptra RT
3,054,075 UART: [state] CFI Enabled
3,173,349 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,203,877 UART: [rt]cmd =0x46505344, len=4
3,312,392 >>> mbox cmd response data (8 bytes)
3,312,393 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,312,429 UART: Fatal Error: 0x000E0008
3,313,552 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,393 UART: [state] LifecycleState = Unprovisioned
86,048 UART: [state] DebugLocked = No
86,572 UART: [state] WD Timer not started. Device not locked for debugging
87,679 UART: [kat] SHA2-256
891,229 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,333 UART: [kat] ++
895,485 UART: [kat] sha1
899,719 UART: [kat] SHA2-256
901,659 UART: [kat] SHA2-384
904,292 UART: [kat] SHA2-512-ACC
906,193 UART: [kat] ECC-384
916,152 UART: [kat] HMAC-384Kdf
921,006 UART: [kat] LMS
1,169,318 UART: [kat] --
1,170,347 UART: [cold-reset] ++
1,170,729 UART: [fht] FHT @ 0x50003400
1,173,563 UART: [idev] ++
1,173,731 UART: [idev] CDI.KEYID = 6
1,174,092 UART: [idev] SUBJECT.KEYID = 7
1,174,517 UART: [idev] UDS.KEYID = 0
1,174,863 ready_for_fw is high
1,174,863 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,408 UART: [idev] Erasing UDS.KEYID = 0
1,199,542 UART: [idev] Sha1 KeyId Algorithm
1,208,204 UART: [idev] --
1,209,239 UART: [ldev] ++
1,209,407 UART: [ldev] CDI.KEYID = 6
1,209,771 UART: [ldev] SUBJECT.KEYID = 5
1,210,198 UART: [ldev] AUTHORITY.KEYID = 7
1,210,661 UART: [ldev] FE.KEYID = 1
1,215,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,136 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,366 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,082 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,683 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,687 UART: [ldev] --
1,280,946 UART: [fwproc] Wait for Commands...
1,281,737 UART: [fwproc] Recv command 0x46574c44
1,282,470 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,619 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,261 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,514 >>> mbox cmd response: success
2,824,514 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,825,532 UART: [afmc] ++
2,825,700 UART: [afmc] CDI.KEYID = 6
2,826,063 UART: [afmc] SUBJECT.KEYID = 7
2,826,489 UART: [afmc] AUTHORITY.KEYID = 5
2,862,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,861 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,320 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,201 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,902 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,835 UART: [afmc] --
2,905,664 UART: [cold-reset] --
2,906,322 UART: [state] Locking Datavault
2,907,323 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,927 UART: [state] Locking ICCM
2,908,557 UART: [exit] Launching FMC @ 0x40000130
2,913,887 UART:
2,913,903 UART: Running Caliptra FMC ...
2,914,311 UART:
2,914,454 UART: [state] CFI Enabled
2,924,904 UART: [fht] FMC Alias Private Key: 7
3,044,074 UART: [art] Extend RT PCRs Done
3,044,502 UART: [art] Lock RT PCRs Done
3,045,978 UART: [art] Populate DV Done
3,054,239 UART: [fht] FMC Alias Private Key: 7
3,055,359 UART: [art] Derive CDI
3,055,639 UART: [art] Store in slot 0x4
3,141,542 UART: [art] Derive Key Pair
3,141,902 UART: [art] Store priv key in slot 0x5
3,154,970 UART: [art] Derive Key Pair - Done
3,169,704 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,866 UART: [art] PUB.X = 20F4458AA908BE7D73DEB439E7B724306355CE2517D42063A61E6BF64CDA3EB327519FE01E25A523313A1506EE2C00D2
3,192,610 UART: [art] PUB.Y = F58F4C9D581CD62CB1235A18997EE2F9D5393D0F2B2DC40C51062A3DBBC8914CD6F77C305506DD048B1A02F751A7106B
3,199,550 UART: [art] SIG.R = 1F255E22B27767E3C66CD4FE3A70145D2F6035C0E355B0D394998E4ABDFA7115616CA422CDBDB496B26CBBB15A5B96E9
3,206,332 UART: [art] SIG.S = 9B8B5AA2FC68AE2CDA686A1B2E5CA84B6FDC17F0CC033E28E38D15FF933A5E54CEA260F21C98D1829C1CB8E912B5BB18
3,230,453 UART: Caliptra RT
3,230,796 UART: [state] CFI Enabled
3,351,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,695 UART: [rt]cmd =0x46505344, len=4
3,490,164 >>> mbox cmd response data (8 bytes)
3,490,165 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,490,201 UART: Fatal Error: 0x000E0008
3,491,324 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,515 ready_for_fw is high
1,059,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,409 >>> mbox cmd response: success
2,679,409 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,742,048 UART:
2,742,064 UART: Running Caliptra FMC ...
2,742,472 UART:
2,742,615 UART: [state] CFI Enabled
2,753,381 UART: [fht] FMC Alias Private Key: 7
2,872,331 UART: [art] Extend RT PCRs Done
2,872,759 UART: [art] Lock RT PCRs Done
2,874,275 UART: [art] Populate DV Done
2,882,750 UART: [fht] FMC Alias Private Key: 7
2,883,758 UART: [art] Derive CDI
2,884,038 UART: [art] Store in slot 0x4
2,969,711 UART: [art] Derive Key Pair
2,970,071 UART: [art] Store priv key in slot 0x5
2,983,391 UART: [art] Derive Key Pair - Done
2,998,083 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,130 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,895 UART: [art] PUB.X = 6993DA5616EA2D9690A3F1D8B5B3F17A37E6CAB4E34A8E0EB78E74ECE038D9BB9DEE77A74CC2E31B251F969E2F402FB9
3,020,682 UART: [art] PUB.Y = DEF47DC1A397495264E04D0D4B2C2706C6160F60969442A79775E8AB0D3FA36017F875A9DF0F5500C88D4078CA24458E
3,027,593 UART: [art] SIG.R = 28115F8F09D98A5A1D5C51F9DD927F0A04E56F08ED52EB0E56ABDC5CC9A08308CBC40C7562740FB90F4766D6826D7145
3,034,344 UART: [art] SIG.S = F5362FFB1AB06EFDA70ED687E9D5537B1DF7613B59EDF44F8EF311B942CC21ED6756B5FB8ED05AEDA6CAD9C1AAF52B51
3,058,161 UART: Caliptra RT
3,058,504 UART: [state] CFI Enabled
3,177,097 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,241 UART: [rt]cmd =0x46505344, len=4
3,315,616 >>> mbox cmd response data (8 bytes)
3,315,617 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,315,653 UART: Fatal Error: 0x000E0008
3,316,776 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,554 UART: [state] LifecycleState = Unprovisioned
86,209 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
901,987 UART: [kat] SHA2-256
903,927 UART: [kat] SHA2-384
906,624 UART: [kat] SHA2-512-ACC
908,525 UART: [kat] ECC-384
918,690 UART: [kat] HMAC-384Kdf
923,144 UART: [kat] LMS
1,171,472 UART: [kat] --
1,172,399 UART: [cold-reset] ++
1,172,739 UART: [fht] FHT @ 0x50003400
1,175,376 UART: [idev] ++
1,175,544 UART: [idev] CDI.KEYID = 6
1,175,904 UART: [idev] SUBJECT.KEYID = 7
1,176,328 UART: [idev] UDS.KEYID = 0
1,176,673 ready_for_fw is high
1,176,673 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,602 UART: [idev] Erasing UDS.KEYID = 0
1,201,587 UART: [idev] Sha1 KeyId Algorithm
1,210,043 UART: [idev] --
1,211,081 UART: [ldev] ++
1,211,249 UART: [ldev] CDI.KEYID = 6
1,211,612 UART: [ldev] SUBJECT.KEYID = 5
1,212,038 UART: [ldev] AUTHORITY.KEYID = 7
1,212,501 UART: [ldev] FE.KEYID = 1
1,217,699 UART: [ldev] Erasing FE.KEYID = 1
1,244,294 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,501 UART: [ldev] --
1,283,980 UART: [fwproc] Wait for Commands...
1,284,654 UART: [fwproc] Recv command 0x46574c44
1,285,382 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,170 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,340 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,619 >>> mbox cmd response: success
2,829,619 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,830,827 UART: [afmc] ++
2,830,995 UART: [afmc] CDI.KEYID = 6
2,831,357 UART: [afmc] SUBJECT.KEYID = 7
2,831,782 UART: [afmc] AUTHORITY.KEYID = 5
2,867,047 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,356 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,104 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,813 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,696 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,397 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,099 UART: [afmc] --
2,910,167 UART: [cold-reset] --
2,911,159 UART: [state] Locking Datavault
2,912,278 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,882 UART: [state] Locking ICCM
2,913,396 UART: [exit] Launching FMC @ 0x40000130
2,918,726 UART:
2,918,742 UART: Running Caliptra FMC ...
2,919,150 UART:
2,919,204 UART: [state] CFI Enabled
2,929,864 UART: [fht] FMC Alias Private Key: 7
3,048,702 UART: [art] Extend RT PCRs Done
3,049,130 UART: [art] Lock RT PCRs Done
3,050,794 UART: [art] Populate DV Done
3,059,023 UART: [fht] FMC Alias Private Key: 7
3,060,121 UART: [art] Derive CDI
3,060,401 UART: [art] Store in slot 0x4
3,146,288 UART: [art] Derive Key Pair
3,146,648 UART: [art] Store priv key in slot 0x5
3,159,712 UART: [art] Derive Key Pair - Done
3,174,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,426 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,191 UART: [art] PUB.X = 6F01F9A5682E97A99EC8CFF862792F71432CB205A59CD92EE7457EC8B1D40C9E29650D1A8811565CB3B9C66BDBE17E4D
3,197,959 UART: [art] PUB.Y = 38ED9A7E8DD96480ECBFEE2A41DC83CF808367970DB757BE4884F55128073A104BEE380A34DE5AEB705633A76703EDD4
3,204,907 UART: [art] SIG.R = 2B65AB55751879027324923CB4E03255A37A94B6D4C13847979409D538C6EC96810769809ADDA0569EA8BF9D07799C81
3,211,653 UART: [art] SIG.S = DC7F7CF0A996317FD5C5AEA2D4D349A64B776C8FC0E9EFC8A4A7B4615CBB5E5A4F81B692C2B01B532F3B8C0AF97C6F40
3,235,824 UART: Caliptra RT
3,236,075 UART: [state] CFI Enabled
3,356,274 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,898 UART: [rt]cmd =0x46505344, len=4
3,495,349 >>> mbox cmd response data (8 bytes)
3,495,350 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,495,386 UART: Fatal Error: 0x000E0008
3,496,509 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,347 ready_for_fw is high
1,059,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,112 >>> mbox cmd response: success
2,680,112 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,742,901 UART:
2,742,917 UART: Running Caliptra FMC ...
2,743,325 UART:
2,743,379 UART: [state] CFI Enabled
2,753,763 UART: [fht] FMC Alias Private Key: 7
2,872,731 UART: [art] Extend RT PCRs Done
2,873,159 UART: [art] Lock RT PCRs Done
2,874,843 UART: [art] Populate DV Done
2,882,918 UART: [fht] FMC Alias Private Key: 7
2,883,918 UART: [art] Derive CDI
2,884,198 UART: [art] Store in slot 0x4
2,969,819 UART: [art] Derive Key Pair
2,970,179 UART: [art] Store priv key in slot 0x5
2,983,091 UART: [art] Derive Key Pair - Done
2,998,012 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,013,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,222 UART: [art] PUB.X = 0AAC8E58C34799FFB102E0F8424F26E99BAAFF4E9FAEF829E33E2015F2D3AC743DF2402725F50C78696D563EF48A0CA2
3,020,994 UART: [art] PUB.Y = 404BBB083C56F19104B51B9AF038D9D281EEA6DD1461B469A94FADAF6848019C3AF7DF660275C675C7BB223724A73EBA
3,027,942 UART: [art] SIG.R = AC40E55E40DC4F0CD2D861DE339F933A035CEAE40681E81346F50A03D294E0230E73FA40B2124A472C041F914D7CCEAA
3,034,701 UART: [art] SIG.S = EA71EC3D25CFD6CEA047B5840BD1A44997A9A85F464705F1CB8F6E2946F0053EC077F0DF59E63900C61D0018FACDB8C2
3,058,166 UART: Caliptra RT
3,058,417 UART: [state] CFI Enabled
3,177,733 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,009 UART: [rt]cmd =0x46505344, len=4
3,316,422 >>> mbox cmd response data (8 bytes)
3,316,423 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,316,459 UART: Fatal Error: 0x000E0008
3,317,582 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,643 UART: [state] LifecycleState = Unprovisioned
86,298 UART: [state] DebugLocked = No
86,922 UART: [state] WD Timer not started. Device not locked for debugging
88,107 UART: [kat] SHA2-256
893,757 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,882 UART: [kat] ++
898,034 UART: [kat] sha1
902,210 UART: [kat] SHA2-256
904,150 UART: [kat] SHA2-384
906,979 UART: [kat] SHA2-512-ACC
908,880 UART: [kat] ECC-384
918,401 UART: [kat] HMAC-384Kdf
923,097 UART: [kat] LMS
1,171,425 UART: [kat] --
1,172,260 UART: [cold-reset] ++
1,172,704 UART: [fht] FHT @ 0x50003400
1,175,565 UART: [idev] ++
1,175,733 UART: [idev] CDI.KEYID = 6
1,176,093 UART: [idev] SUBJECT.KEYID = 7
1,176,517 UART: [idev] UDS.KEYID = 0
1,176,862 ready_for_fw is high
1,176,862 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,647 UART: [idev] Erasing UDS.KEYID = 0
1,202,268 UART: [idev] Sha1 KeyId Algorithm
1,210,826 UART: [idev] --
1,211,926 UART: [ldev] ++
1,212,094 UART: [ldev] CDI.KEYID = 6
1,212,457 UART: [ldev] SUBJECT.KEYID = 5
1,212,883 UART: [ldev] AUTHORITY.KEYID = 7
1,213,346 UART: [ldev] FE.KEYID = 1
1,218,662 UART: [ldev] Erasing FE.KEYID = 1
1,244,593 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,084 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,800 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,691 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,403 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,450 UART: [ldev] --
1,283,877 UART: [fwproc] Wait for Commands...
1,284,619 UART: [fwproc] Recv command 0x46574c44
1,285,347 UART: [fwproc] Recv'd Img size: 118548 bytes
2,630,564 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,927 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,097 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,292 >>> mbox cmd response: success
2,829,292 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,830,404 UART: [afmc] ++
2,830,572 UART: [afmc] CDI.KEYID = 6
2,830,934 UART: [afmc] SUBJECT.KEYID = 7
2,831,359 UART: [afmc] AUTHORITY.KEYID = 5
2,867,324 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,677 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,425 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,134 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,017 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,718 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,528 UART: [afmc] --
2,910,468 UART: [cold-reset] --
2,911,330 UART: [state] Locking Datavault
2,912,431 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,035 UART: [state] Locking ICCM
2,913,697 UART: [exit] Launching FMC @ 0x40000130
2,919,027 UART:
2,919,043 UART: Running Caliptra FMC ...
2,919,451 UART:
2,919,594 UART: [state] CFI Enabled
2,930,150 UART: [fht] FMC Alias Private Key: 7
3,049,254 UART: [art] Extend RT PCRs Done
3,049,682 UART: [art] Lock RT PCRs Done
3,051,484 UART: [art] Populate DV Done
3,059,821 UART: [fht] FMC Alias Private Key: 7
3,060,843 UART: [art] Derive CDI
3,061,123 UART: [art] Store in slot 0x4
3,146,816 UART: [art] Derive Key Pair
3,147,176 UART: [art] Store priv key in slot 0x5
3,160,658 UART: [art] Derive Key Pair - Done
3,175,428 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,943 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,708 UART: [art] PUB.X = 1D8B493DB571F0A2600C932BB141BEAD8986798F6AEE0E15687A30D637BD81DF2203DB5A2457367B52EE157B16B91631
3,198,471 UART: [art] PUB.Y = CE8464695EDD714B9F7B2289126322F76B1A3E7D2A6FF11A386E21E53E644FC7D7BD066A0B74DABEF1D9040B0D6F626E
3,205,418 UART: [art] SIG.R = B8D4E53190714D1C979DFB01DC4C93C1C14EDCA82EB9AE02C9D08DE535FCC8C9399CB85A09C0B40AF54FE16E11D5E69E
3,212,198 UART: [art] SIG.S = 0FC08BB86BC0770AF2132826898C6F26BAF36CAE16C59FBB7891ECFB061B422ED27A9B50B08799BFB52C381DD581A609
3,236,186 UART: Caliptra RT
3,236,529 UART: [state] CFI Enabled
3,356,840 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,387,418 UART: [rt]cmd =0x46505344, len=4
3,495,949 >>> mbox cmd response data (8 bytes)
3,495,950 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,495,986 UART: Fatal Error: 0x000E0008
3,497,109 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,494 ready_for_fw is high
1,061,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,785 >>> mbox cmd response: success
2,681,785 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,744,020 UART:
2,744,036 UART: Running Caliptra FMC ...
2,744,444 UART:
2,744,587 UART: [state] CFI Enabled
2,755,237 UART: [fht] FMC Alias Private Key: 7
2,874,309 UART: [art] Extend RT PCRs Done
2,874,737 UART: [art] Lock RT PCRs Done
2,875,829 UART: [art] Populate DV Done
2,883,930 UART: [fht] FMC Alias Private Key: 7
2,885,048 UART: [art] Derive CDI
2,885,328 UART: [art] Store in slot 0x4
2,971,281 UART: [art] Derive Key Pair
2,971,641 UART: [art] Store priv key in slot 0x5
2,985,635 UART: [art] Derive Key Pair - Done
3,000,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,015,494 UART: [art] Erasing AUTHORITY.KEYID = 7
3,016,259 UART: [art] PUB.X = 1095CDC89FF74DC6FCB015BBB7D6FFC75E93E5C2B7555A7E8D931D2CE2D0DF08A89343014FC6E9055A0E8B1555D7F116
3,023,033 UART: [art] PUB.Y = 91F26A969BBCB09F36982D732C4341CB7E7E05D4BBADF0FFE47054F70E746F53D1B44EF34CBA83D16066CE91BDCB6FC2
3,029,997 UART: [art] SIG.R = CCC3A198E45A811366B76ACA1DAC22779578798D75D2401BD49F1A4B27E1634C89050A1F00BB1A7B9ECF66E2C20F6781
3,036,742 UART: [art] SIG.S = F6753463676E44DF4DB4B3721B281063B084D442896881E85CCE8450940B26AC7D0BCE932FCF7369366D8A3B9F0755AC
3,060,647 UART: Caliptra RT
3,060,990 UART: [state] CFI Enabled
3,180,616 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,934 UART: [rt]cmd =0x46505344, len=4
3,319,259 >>> mbox cmd response data (8 bytes)
3,319,260 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
3,319,296 UART: Fatal Error: 0x000E0008
3,320,419 >>> mbox cmd response: failed
test security_parameters::zeroize_check_inaccessible ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,004 writing to cptra_bootfsm_go
5,660,421 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
5,659,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,415 writing to cptra_bootfsm_go
6,004,101 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,551 writing to cptra_bootfsm_go
5,993,834 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,134 writing to cptra_bootfsm_go
5,670,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,127 writing to cptra_bootfsm_go
5,664,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
5,989,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
6,012,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,299 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,358 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,559 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,625 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
test self_tests::fw_load_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.61s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,160 writing to cptra_bootfsm_go
192,369 UART:
192,729 UART: Running Caliptra ROM ...
193,886 UART:
194,040 UART: [state] CFI Enabled
262,564 UART: [state] LifecycleState = Unprovisioned
264,532 UART: [state] DebugLocked = No
265,863 UART: [state] WD Timer not started. Device not locked for debugging
270,534 UART: [kat] SHA2-256
450,177 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,638 UART: ROM integrity test failed
461,899 UART: ROM Fatal Error: 0x90080001
2,721,697 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,871,294 >>> mbox cmd response: failed
2,871,867 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,020,742 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
192,282 UART:
192,657 UART: Running Caliptra ROM ...
193,840 UART:
193,994 UART: [state] CFI Enabled
263,621 UART: [state] LifecycleState = Unprovisioned
265,562 UART: [state] DebugLocked = No
267,535 UART: [state] WD Timer not started. Device not locked for debugging
271,719 UART: [kat] SHA2-256
451,387 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,800 UART: ROM integrity test failed
463,075 UART: ROM Fatal Error: 0x90080001
2,721,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,871,027 >>> mbox cmd response: failed
2,871,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,020,712 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,302 writing to cptra_bootfsm_go
192,604 UART:
193,148 UART: Running Caliptra ROM ...
194,259 UART:
603,997 UART: [state] CFI Enabled
619,137 UART: [state] LifecycleState = Unprovisioned
621,053 UART: [state] DebugLocked = No
623,846 UART: [state] WD Timer not started. Device not locked for debugging
628,038 UART: [kat] SHA2-256
807,682 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,171 UART: ROM integrity test failed
819,434 UART: ROM Fatal Error: 0x90080001
3,077,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,227,325 >>> mbox cmd response: failed
3,227,902 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,376,752 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,636 UART:
193,026 UART: Running Caliptra ROM ...
194,196 UART:
603,684 UART: [state] CFI Enabled
614,608 UART: [state] LifecycleState = Unprovisioned
616,529 UART: [state] DebugLocked = No
618,069 UART: [state] WD Timer not started. Device not locked for debugging
621,829 UART: [kat] SHA2-256
801,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
811,913 UART: ROM integrity test failed
813,141 UART: ROM Fatal Error: 0x90080001
3,069,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,219,021 >>> mbox cmd response: failed
3,219,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,368,428 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,451 UART:
192,895 UART: Running Caliptra ROM ...
194,012 UART:
194,170 UART: [state] CFI Enabled
262,535 UART: [state] LifecycleState = Unprovisioned
264,481 UART: [state] DebugLocked = No
267,009 UART: [state] WD Timer not started. Device not locked for debugging
270,893 UART: [kat] SHA2-256
450,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,980 UART: ROM integrity test failed
462,246 UART: ROM Fatal Error: 0x90080001
2,712,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,862,394 >>> mbox cmd response: failed
2,862,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,011,881 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
192,185 UART:
192,560 UART: Running Caliptra ROM ...
193,694 UART:
193,849 UART: [state] CFI Enabled
264,063 UART: [state] LifecycleState = Unprovisioned
265,963 UART: [state] DebugLocked = No
268,107 UART: [state] WD Timer not started. Device not locked for debugging
272,568 UART: [kat] SHA2-256
452,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,660 UART: ROM integrity test failed
463,918 UART: ROM Fatal Error: 0x90080001
2,715,204 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,865,172 >>> mbox cmd response: failed
2,865,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,014,630 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,598 UART:
192,972 UART: Running Caliptra ROM ...
195,101 UART:
603,845 UART: [state] CFI Enabled
617,609 UART: [state] LifecycleState = Unprovisioned
619,537 UART: [state] DebugLocked = No
621,242 UART: [state] WD Timer not started. Device not locked for debugging
624,519 UART: [kat] SHA2-256
804,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,607 UART: ROM integrity test failed
815,865 UART: ROM Fatal Error: 0x90080001
3,065,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,416 >>> mbox cmd response: failed
3,216,022 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,364,896 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,500 writing to cptra_bootfsm_go
192,840 UART:
193,237 UART: Running Caliptra ROM ...
194,401 UART:
603,856 UART: [state] CFI Enabled
615,943 UART: [state] LifecycleState = Unprovisioned
617,853 UART: [state] DebugLocked = No
619,468 UART: [state] WD Timer not started. Device not locked for debugging
623,657 UART: [kat] SHA2-256
803,331 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
813,779 UART: ROM integrity test failed
815,036 UART: ROM Fatal Error: 0x90080001
3,066,010 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,215,756 >>> mbox cmd response: failed
3,216,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,365,208 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,146 writing to cptra_bootfsm_go
192,386 UART:
192,743 UART: Running Caliptra ROM ...
193,903 UART:
194,060 UART: [state] CFI Enabled
259,294 UART: [state] LifecycleState = Unprovisioned
261,208 UART: [state] DebugLocked = No
264,160 UART: [state] WD Timer not started. Device not locked for debugging
268,295 UART: [kat] SHA2-256
447,990 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
458,374 UART: ROM integrity test failed
459,695 UART: ROM Fatal Error: 0x90080001
2,724,205 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,874,449 >>> mbox cmd response: failed
2,875,030 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,023,906 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
192,266 UART:
192,626 UART: Running Caliptra ROM ...
193,703 UART:
193,848 UART: [state] CFI Enabled
261,864 UART: [state] LifecycleState = Unprovisioned
263,813 UART: [state] DebugLocked = No
265,526 UART: [state] WD Timer not started. Device not locked for debugging
269,819 UART: [kat] SHA2-256
449,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,945 UART: ROM integrity test failed
461,377 UART: ROM Fatal Error: 0x90080001
2,718,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,867,905 >>> mbox cmd response: failed
2,868,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,017,190 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,427 writing to cptra_bootfsm_go
192,638 UART:
193,017 UART: Running Caliptra ROM ...
194,199 UART:
603,822 UART: [state] CFI Enabled
620,445 UART: [state] LifecycleState = Unprovisioned
622,380 UART: [state] DebugLocked = No
624,389 UART: [state] WD Timer not started. Device not locked for debugging
627,900 UART: [kat] SHA2-256
807,554 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,980 UART: ROM integrity test failed
819,241 UART: ROM Fatal Error: 0x90080001
3,082,685 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,232,699 >>> mbox cmd response: failed
3,233,260 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,382,315 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "da0e8578403150d59eb8098e4db59eca2926c7c0cd01ad72ea34647775a702a6a28f1b750e747e65735128f46d528fe6",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,288 writing to cptra_bootfsm_go
192,457 UART:
192,844 UART: Running Caliptra ROM ...
194,007 UART:
603,777 UART: [state] CFI Enabled
617,533 UART: [state] LifecycleState = Unprovisioned
619,447 UART: [state] DebugLocked = No
621,851 UART: [state] WD Timer not started. Device not locked for debugging
625,011 UART: [kat] SHA2-256
804,691 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,099 UART: ROM integrity test failed
816,368 UART: ROM Fatal Error: 0x90080001
3,076,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,226,748 >>> mbox cmd response: failed
3,227,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,376,028 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,224 UART: [state] LifecycleState = Unprovisioned
85,879 UART: [state] DebugLocked = No
86,361 UART: [state] WD Timer not started. Device not locked for debugging
87,516 UART: [kat] SHA2-256
891,066 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,012 UART: ROM integrity test failed
895,459 UART: ROM Fatal Error: 0x90080001
897,074 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,080 >>> mbox cmd response: failed
897,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,086 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,296 UART: [state] LifecycleState = Unprovisioned
85,951 UART: [state] DebugLocked = No
86,571 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
891,480 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,426 UART: ROM integrity test failed
895,873 UART: ROM Fatal Error: 0x90080001
897,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,494 >>> mbox cmd response: failed
897,494 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,500 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,762 UART: [state] WD Timer not started. Device not locked for debugging
88,033 UART: [kat] SHA2-256
891,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,529 UART: ROM integrity test failed
895,976 UART: ROM Fatal Error: 0x90080001
897,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,597 >>> mbox cmd response: failed
897,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,603 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,431 UART: [state] LifecycleState = Unprovisioned
86,086 UART: [state] DebugLocked = No
86,640 UART: [state] WD Timer not started. Device not locked for debugging
87,979 UART: [kat] SHA2-256
891,529 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,475 UART: ROM integrity test failed
895,922 UART: ROM Fatal Error: 0x90080001
897,537 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,543 >>> mbox cmd response: failed
897,543 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,549 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,213 UART: [state] WD Timer not started. Device not locked for debugging
87,332 UART: [kat] SHA2-256
890,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,828 UART: ROM integrity test failed
895,275 UART: ROM Fatal Error: 0x90080001
896,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,896 >>> mbox cmd response: failed
896,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,902 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,211 UART: [state] WD Timer not started. Device not locked for debugging
87,354 UART: [kat] SHA2-256
890,904 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,850 UART: ROM integrity test failed
895,297 UART: ROM Fatal Error: 0x90080001
896,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,918 >>> mbox cmd response: failed
896,918 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,924 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.49s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,775 UART: [state] LifecycleState = Unprovisioned
86,430 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,681 UART: ROM integrity test failed
896,128 UART: ROM Fatal Error: 0x90080001
897,743 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,749 >>> mbox cmd response: failed
897,749 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,755 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,369 UART: [state] LifecycleState = Unprovisioned
86,024 UART: [state] DebugLocked = No
86,574 UART: [state] WD Timer not started. Device not locked for debugging
87,707 UART: [kat] SHA2-256
891,257 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,203 UART: ROM integrity test failed
895,650 UART: ROM Fatal Error: 0x90080001
897,265 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,271 >>> mbox cmd response: failed
897,271 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,277 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.57s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,806 UART: [state] LifecycleState = Unprovisioned
85,461 UART: [state] DebugLocked = No
86,067 UART: [state] WD Timer not started. Device not locked for debugging
87,212 UART: [kat] SHA2-256
890,762 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,708 UART: ROM integrity test failed
895,155 UART: ROM Fatal Error: 0x90080001
896,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,776 >>> mbox cmd response: failed
896,776 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,782 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,004 UART: [state] LifecycleState = Unprovisioned
85,659 UART: [state] DebugLocked = No
86,265 UART: [state] WD Timer not started. Device not locked for debugging
87,398 UART: [kat] SHA2-256
890,948 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,894 UART: ROM integrity test failed
895,341 UART: ROM Fatal Error: 0x90080001
896,956 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,962 >>> mbox cmd response: failed
896,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
896,968 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,397 UART: [state] LifecycleState = Unprovisioned
86,052 UART: [state] DebugLocked = No
86,768 UART: [state] WD Timer not started. Device not locked for debugging
87,977 UART: [kat] SHA2-256
891,527 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,473 UART: ROM integrity test failed
895,920 UART: ROM Fatal Error: 0x90080001
897,535 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,541 >>> mbox cmd response: failed
897,541 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,547 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "620c5c945c86b717970bff97db8c6ba1ae9c9dce941e77343a1c2f7aed9f52e342ee29ac71957da2470cd03cb4714b11",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
86,902 UART: [state] WD Timer not started. Device not locked for debugging
88,019 UART: [kat] SHA2-256
891,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,515 UART: ROM integrity test failed
895,962 UART: ROM Fatal Error: 0x90080001
897,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,583 >>> mbox cmd response: failed
897,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
897,589 >>> mbox cmd response: failed
test self_tests::integrity_check_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
2,710,046 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,859,874 >>> mbox cmd response: failed
2,860,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,009,987 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,434,602 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,293,082 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,052 writing to cptra_bootfsm_go
2,709,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,859,275 >>> mbox cmd response: failed
2,859,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,680 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,446,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,288,057 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,509 writing to cptra_bootfsm_go
3,062,438 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,212,685 >>> mbox cmd response: failed
3,213,256 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,362,126 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,177,276 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,149 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,057,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,705 >>> mbox cmd response: failed
3,207,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,356,126 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
20,181,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,885 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,704,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,854,282 >>> mbox cmd response: failed
2,854,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,003,556 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,429,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,081 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
2,713,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,863,205 >>> mbox cmd response: failed
2,863,761 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,013,183 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,437,413 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,252,049 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,252 writing to cptra_bootfsm_go
3,059,632 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,356 >>> mbox cmd response: failed
3,209,933 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,809 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,176,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,610 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,349 writing to cptra_bootfsm_go
3,074,948 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,224,709 >>> mbox cmd response: failed
3,225,286 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,374,139 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
20,180,477 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,331 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,664 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,672 >>> mbox cmd response: failed
817,672 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,678 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,066 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,788 >>> mbox cmd response: failed
817,788 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,794 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,364 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,287 >>> mbox cmd response: failed
817,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,333 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,035 >>> mbox cmd response: failed
818,035 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,041 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,594 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,543 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,078 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,086 >>> mbox cmd response: failed
818,086 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,092 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,307 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,556 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,740 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,748 >>> mbox cmd response: failed
817,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,754 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,528 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
817,907 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,915 >>> mbox cmd response: failed
817,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
817,921 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,587 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
818,069 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,077 >>> mbox cmd response: failed
818,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
818,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,596 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,893 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
192,183 UART:
192,538 UART: Running Caliptra ROM ...
193,726 UART:
193,881 UART: [state] CFI Enabled
263,204 UART: [state] LifecycleState = Unprovisioned
265,181 UART: [state] DebugLocked = No
268,141 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,310 UART: [kat] SHA2-256
442,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,527 UART: [kat] ++
453,006 UART: [kat] sha1
462,963 UART: [kat] SHA2-256
465,681 UART: [kat] SHA2-384
471,644 UART: [kat] SHA2-512-ACC
474,034 UART: [kat] ECC-384
2,767,273 UART: [kat] HMAC-384Kdf
2,799,729 UART: [kat] LMS
3,990,022 UART: [kat] --
3,993,841 UART: [cold-reset] ++
3,994,792 UART: [fht] Storing FHT @ 0x50003400
4,004,929 UART: [idev] ++
4,005,500 UART: [idev] CDI.KEYID = 6
4,006,544 UART: [idev] SUBJECT.KEYID = 7
4,007,728 UART: [idev] UDS.KEYID = 0
4,008,828 ready_for_fw is high
4,009,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,349 UART: [idev] Erasing UDS.KEYID = 0
7,346,450 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,285 UART: [idev] --
7,373,827 UART: [ldev] ++
7,374,408 UART: [ldev] CDI.KEYID = 6
7,375,385 UART: [ldev] SUBJECT.KEYID = 5
7,376,603 UART: [ldev] AUTHORITY.KEYID = 7
7,377,835 UART: [ldev] FE.KEYID = 1
7,407,555 UART: [ldev] Erasing FE.KEYID = 1
10,740,454 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,055,108 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,069,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,084,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,099,032 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,451 UART: [ldev] --
13,122,900 UART: [fwproc] Waiting for Commands...
13,126,148 UART: [fwproc] Received command 0x46574c44
13,128,339 UART: [fwproc] Received Image of size 119428 bytes
17,246,737 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,928 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,398,116 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,729,488 >>> mbox cmd response: success
17,734,358 UART: [afmc] ++
17,734,950 UART: [afmc] CDI.KEYID = 6
17,735,974 UART: [afmc] SUBJECT.KEYID = 7
17,737,139 UART: [afmc] AUTHORITY.KEYID = 5
21,100,799 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,401,940 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,404,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,418,629 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,433,355 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,447,819 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,469,879 UART: [afmc] --
23,473,095 UART: [cold-reset] --
23,477,290 UART: [state] Locking Datavault
23,483,349 UART: [state] Locking PCR0, PCR1 and PCR31
23,485,052 UART: [state] Locking ICCM
23,487,852 UART: [exit] Launching FMC @ 0x40000130
23,496,255 UART:
23,496,500 UART: Running Caliptra FMC ...
23,497,607 UART:
23,497,771 UART: [state] CFI Enabled
23,560,894 UART: [fht] FMC Alias Private Key: 7
25,901,263 UART: [art] Extend RT PCRs Done
25,902,487 UART: [art] Lock RT PCRs Done
25,904,279 UART: [art] Populate DV Done
25,909,712 UART: [fht] FMC Alias Private Key: 7
25,911,241 UART: [art] Derive CDI
25,912,012 UART: [art] Store in slot 0x4
25,969,921 UART: [art] Derive Key Pair
25,970,926 UART: [art] Store priv key in slot 0x5
29,264,010 UART: [art] Derive Key Pair - Done
29,277,176 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,249 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,770 UART: [art] PUB.X = 2B527E2975FE261A73C1BA6CF64D139CF1E316DDA7271DFBC8E375B2E4FB26D4261C7A7F64B222500B95808E6979C980
31,575,052 UART: [art] PUB.Y = CA08AF43B96A648703B82F2174CF788C512E3FF28DA8BAF7E7EFC6DF3259D9C03F7411360092094F194A208F88FE214B
31,582,270 UART: [art] SIG.R = FA72EA6D60D89FD2FB6D66CD1AE8767942080B47F7761E6E2AD3D605E2E03AA8706637BE2E2AA2DCFC95C1A0F71B6023
31,589,730 UART: [art] SIG.S = F2D5BE6E904149E5CA77A1AB610F483B730E53995742CD3F28C5974FDDEA02600A05E9C07C84D24E911C06161DE33126
32,894,925 UART: Caliptra RT
32,895,647 UART: [state] CFI Enabled
33,073,010 UART: [rt] RT listening for mailbox commands...
33,074,877 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,104,429 UART: [rt]cmd =0x46504c54, len=4
33,106,119 >>> mbox cmd response data (8 bytes)
33,107,117 UART: [rt] FIPS self test
33,108,074 UART: [kat] ++
33,108,572 UART: [kat] sha1
33,112,921 UART: [kat] SHA2-256
33,114,802 UART: [kat] SHA2-384
33,117,867 UART: [kat] SHA2-512-ACC
33,120,107 UART: [kat] ECC-384
33,122,008 UART: Fatal Error: 0x90040004
33,157,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,307,188 >>> mbox cmd response: failed
33,307,862 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,457,771 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,117 UART:
190,423 UART: Running Caliptra ROM ...
191,539 UART:
191,688 UART: [state] CFI Enabled
266,877 UART: [state] LifecycleState = Unprovisioned
268,846 UART: [state] DebugLocked = No
271,738 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,247 UART: [kat] SHA2-256
445,973 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,493 UART: [kat] ++
456,944 UART: [kat] sha1
468,846 UART: [kat] SHA2-256
471,532 UART: [kat] SHA2-384
476,918 UART: [kat] SHA2-512-ACC
479,261 UART: [kat] ECC-384
2,768,203 UART: [kat] HMAC-384Kdf
2,799,520 UART: [kat] LMS
3,989,818 UART: [kat] --
3,996,372 UART: [cold-reset] ++
3,998,312 UART: [fht] Storing FHT @ 0x50003400
4,008,715 UART: [idev] ++
4,009,293 UART: [idev] CDI.KEYID = 6
4,010,207 UART: [idev] SUBJECT.KEYID = 7
4,011,483 UART: [idev] UDS.KEYID = 0
4,012,997 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,163,073 UART: [idev] Erasing UDS.KEYID = 0
7,345,618 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,422 UART: [idev] --
7,372,739 UART: [ldev] ++
7,373,306 UART: [ldev] CDI.KEYID = 6
7,374,249 UART: [ldev] SUBJECT.KEYID = 5
7,375,520 UART: [ldev] AUTHORITY.KEYID = 7
7,376,693 UART: [ldev] FE.KEYID = 1
7,421,724 UART: [ldev] Erasing FE.KEYID = 1
10,754,474 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,067,745 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,082,280 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,097,162 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,111,635 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,375 UART: [ldev] --
13,133,448 UART: [fwproc] Waiting for Commands...
13,136,034 UART: [fwproc] Received command 0x46574c44
13,138,222 UART: [fwproc] Received Image of size 119428 bytes
17,249,937 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,322,201 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,727,376 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,930 writing to cptra_bootfsm_go
3,805,000 ready_for_fw is high
3,805,445 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,977,513 >>> mbox cmd response: success
23,670,238 UART:
23,670,707 UART: Running Caliptra FMC ...
23,671,822 UART:
23,672,008 UART: [state] CFI Enabled
23,740,790 UART: [fht] FMC Alias Private Key: 7
26,081,282 UART: [art] Extend RT PCRs Done
26,082,516 UART: [art] Lock RT PCRs Done
26,084,260 UART: [art] Populate DV Done
26,089,693 UART: [fht] FMC Alias Private Key: 7
26,091,403 UART: [art] Derive CDI
26,092,228 UART: [art] Store in slot 0x4
26,149,823 UART: [art] Derive Key Pair
26,150,864 UART: [art] Store priv key in slot 0x5
29,443,770 UART: [art] Derive Key Pair - Done
29,456,464 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,910 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,422 UART: [art] PUB.X = E5B3BF15A2298D15CCD8B09C6534DCAA981F866B71EB4A9EE488154BF30C8A5A56FF6702BD180DDCEEC7255C97E5CC87
31,754,765 UART: [art] PUB.Y = 3E0F2C59BF507305B6AAB27B024A91E288DA58BE56589D0DF8419A9301A4C945FB4EB918AF4009A2A4721E70ED2805F0
31,761,990 UART: [art] SIG.R = E0B84205AF950FB34B78BCF47E1566292AA12E1F64F35EDA3135EF08F68DE170189ACFF3BBF3BABCAAB59CB23C9DD922
31,769,429 UART: [art] SIG.S = D4F13F3543348CDCD3FB45880A391CDBE6424EF4B29254FAD0E9B4342AD7DFACFDDC462CEFF01A092A78E7600EC85399
33,075,017 UART: Caliptra RT
33,075,743 UART: [state] CFI Enabled
33,253,543 UART: [rt] RT listening for mailbox commands...
33,255,406 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,285,152 UART: [rt]cmd =0x46504c54, len=4
33,286,627 >>> mbox cmd response data (8 bytes)
33,287,566 UART: [rt] FIPS self test
33,288,513 UART: [kat] ++
33,288,969 UART: [kat] sha1
33,293,319 UART: [kat] SHA2-256
33,295,197 UART: [kat] SHA2-384
33,298,268 UART: [kat] SHA2-512-ACC
33,300,565 UART: [kat] ECC-384
33,302,584 UART: Fatal Error: 0x90040004
33,337,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,488,048 >>> mbox cmd response: failed
33,488,706 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,638,597 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
3,784,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,942,188 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,312 writing to cptra_bootfsm_go
192,434 UART:
192,804 UART: Running Caliptra ROM ...
193,987 UART:
603,575 UART: [state] CFI Enabled
617,939 UART: [state] LifecycleState = Unprovisioned
619,816 UART: [state] DebugLocked = No
622,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,551 UART: [kat] SHA2-256
797,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,866 UART: [kat] ++
808,403 UART: [kat] sha1
818,932 UART: [kat] SHA2-256
821,582 UART: [kat] SHA2-384
827,546 UART: [kat] SHA2-512-ACC
829,964 UART: [kat] ECC-384
3,113,441 UART: [kat] HMAC-384Kdf
3,125,049 UART: [kat] LMS
4,315,183 UART: [kat] --
4,319,323 UART: [cold-reset] ++
4,320,278 UART: [fht] Storing FHT @ 0x50003400
4,333,542 UART: [idev] ++
4,334,116 UART: [idev] CDI.KEYID = 6
4,335,035 UART: [idev] SUBJECT.KEYID = 7
4,336,296 UART: [idev] UDS.KEYID = 0
4,337,287 ready_for_fw is high
4,337,534 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,614 UART: [idev] Erasing UDS.KEYID = 0
7,621,979 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,134 UART: [idev] --
7,647,712 UART: [ldev] ++
7,648,291 UART: [ldev] CDI.KEYID = 6
7,649,319 UART: [ldev] SUBJECT.KEYID = 5
7,650,430 UART: [ldev] AUTHORITY.KEYID = 7
7,651,721 UART: [ldev] FE.KEYID = 1
7,662,861 UART: [ldev] Erasing FE.KEYID = 1
10,950,050 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,242,470 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,074 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,870 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,286,368 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,857 UART: [ldev] --
13,311,220 UART: [fwproc] Waiting for Commands...
13,314,148 UART: [fwproc] Received command 0x46574c44
13,316,344 UART: [fwproc] Received Image of size 119428 bytes
17,433,460 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,767 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,910 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,912,082 >>> mbox cmd response: success
17,916,438 UART: [afmc] ++
17,917,030 UART: [afmc] CDI.KEYID = 6
17,917,979 UART: [afmc] SUBJECT.KEYID = 7
17,919,198 UART: [afmc] AUTHORITY.KEYID = 5
21,233,826 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,528,828 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,531,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,545,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,560,265 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,574,693 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,595,982 UART: [afmc] --
23,598,989 UART: [cold-reset] --
23,604,310 UART: [state] Locking Datavault
23,608,175 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,931 UART: [state] Locking ICCM
23,611,792 UART: [exit] Launching FMC @ 0x40000130
23,620,189 UART:
23,620,436 UART: Running Caliptra FMC ...
23,621,463 UART:
23,621,614 UART: [state] CFI Enabled
23,629,993 UART: [fht] FMC Alias Private Key: 7
25,970,296 UART: [art] Extend RT PCRs Done
25,971,538 UART: [art] Lock RT PCRs Done
25,973,091 UART: [art] Populate DV Done
25,978,461 UART: [fht] FMC Alias Private Key: 7
25,979,952 UART: [art] Derive CDI
25,980,689 UART: [art] Store in slot 0x4
26,023,472 UART: [art] Derive Key Pair
26,024,521 UART: [art] Store priv key in slot 0x5
29,266,442 UART: [art] Derive Key Pair - Done
29,279,607 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,559,895 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,405 UART: [art] PUB.X = 4A9F6AEBF715B63097D2E0FD2F80A1CFC39ED87F93BF86B456D00FD4A310451FD14FE0EE42EB61A8D00456EBF1ABFCBD
31,568,732 UART: [art] PUB.Y = 54E28800C0397688B8557347C0C92184D11369A135FDAD9B80B6E13AA4A0BCFC3C1F5D3B8305AA894F4AA997ADAB03C9
31,575,984 UART: [art] SIG.R = C705EF3E41BEAED5CD7127B1A3EA2205C43113E127250324F317FB2D9FEB468A51219B8DB360B333ABAEF84013B405B9
31,583,391 UART: [art] SIG.S = F20DA7EC542B43106418FC1D0E6535D458796095D34B19E1817420D22CFD79A124BEDEC0E6470DE8AA9BA6B1D5909726
32,888,032 UART: Caliptra RT
32,888,754 UART: [state] CFI Enabled
33,021,878 UART: [rt] RT listening for mailbox commands...
33,023,738 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,053,169 UART: [rt]cmd =0x46504c54, len=4
33,054,705 >>> mbox cmd response data (8 bytes)
33,055,799 UART: [rt] FIPS self test
33,056,751 UART: [kat] ++
33,057,208 UART: [kat] sha1
33,061,580 UART: [kat] SHA2-256
33,063,531 UART: [kat] SHA2-384
33,066,399 UART: [kat] SHA2-512-ACC
33,068,652 UART: [kat] ECC-384
33,070,669 UART: Fatal Error: 0x90040004
33,105,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,255,775 >>> mbox cmd response: failed
33,256,442 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,406,383 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,001 UART:
190,300 UART: Running Caliptra ROM ...
191,331 UART:
7,123,418 UART: [state] CFI Enabled
7,136,605 UART: [state] LifecycleState = Unprovisioned
7,138,545 UART: [state] DebugLocked = No
7,141,322 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,145,628 UART: [kat] SHA2-256
7,315,350 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,325,884 UART: [kat] ++
7,326,349 UART: [kat] sha1
7,338,522 UART: [kat] SHA2-256
7,341,231 UART: [kat] SHA2-384
7,347,127 UART: [kat] SHA2-512-ACC
7,349,503 UART: [kat] ECC-384
9,633,559 UART: [kat] HMAC-384Kdf
9,646,869 UART: [kat] LMS
10,836,994 UART: [kat] --
10,841,152 UART: [cold-reset] ++
10,843,143 UART: [fht] Storing FHT @ 0x50003400
10,854,844 UART: [idev] ++
10,855,433 UART: [idev] CDI.KEYID = 6
10,856,350 UART: [idev] SUBJECT.KEYID = 7
10,857,586 UART: [idev] UDS.KEYID = 0
10,859,244 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,009,001 UART: [idev] Erasing UDS.KEYID = 0
14,147,884 UART: [idev] Using Sha1 for KeyId Algorithm
14,169,652 UART: [idev] --
14,175,167 UART: [ldev] ++
14,175,794 UART: [ldev] CDI.KEYID = 6
14,176,687 UART: [ldev] SUBJECT.KEYID = 5
14,177,960 UART: [ldev] AUTHORITY.KEYID = 7
14,179,197 UART: [ldev] FE.KEYID = 1
14,189,824 UART: [ldev] Erasing FE.KEYID = 1
17,480,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,770,614 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,785,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,800,015 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,814,528 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,835,212 UART: [ldev] --
19,840,178 UART: [fwproc] Waiting for Commands...
19,843,419 UART: [fwproc] Received command 0x46574c44
19,845,610 UART: [fwproc] Received Image of size 119428 bytes
23,961,922 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,044,902 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,118,067 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,450,141 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,126,442 ready_for_fw is high
4,127,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,173,580 >>> mbox cmd response: success
23,816,757 UART:
23,817,169 UART: Running Caliptra FMC ...
23,818,290 UART:
23,818,450 UART: [state] CFI Enabled
23,826,113 UART: [fht] FMC Alias Private Key: 7
26,165,780 UART: [art] Extend RT PCRs Done
26,167,008 UART: [art] Lock RT PCRs Done
26,168,458 UART: [art] Populate DV Done
26,174,102 UART: [fht] FMC Alias Private Key: 7
26,175,607 UART: [art] Derive CDI
26,176,349 UART: [art] Store in slot 0x4
26,219,056 UART: [art] Derive Key Pair
26,220,084 UART: [art] Store priv key in slot 0x5
29,462,099 UART: [art] Derive Key Pair - Done
29,475,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,755,548 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,061 UART: [art] PUB.X = BC3B37C7F5EEAE534B4C34F456A96D3A42B02251D5BC4496116A956DAE3BAF8EE3F34C356F97332B5162DB2480AAF633
31,764,372 UART: [art] PUB.Y = B7A2305920D9494A49551E54A932413A230DE6D2063BA5E48C6E57C4F496787E81362FE2F9C53A435C94144AFC17B8B0
31,771,599 UART: [art] SIG.R = 47240A991E1874D3012FB738C6E8A9C6B8594CEFDE5C1101D351533B064A3113673B96F561DC5C8004E8A3D4D2461E9A
31,778,942 UART: [art] SIG.S = D2AEE131836C6879713A447FABEF95CEAA02087436C786323C0416A1E844F2635D89223912C709C333FF0C0E1526BD49
33,083,523 UART: Caliptra RT
33,084,246 UART: [state] CFI Enabled
33,217,264 UART: [rt] RT listening for mailbox commands...
33,219,130 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,248,925 UART: [rt]cmd =0x46504c54, len=4
33,250,402 >>> mbox cmd response data (8 bytes)
33,251,514 UART: [rt] FIPS self test
33,252,468 UART: [kat] ++
33,252,943 UART: [kat] sha1
33,257,350 UART: [kat] SHA2-256
33,259,230 UART: [kat] SHA2-384
33,262,140 UART: [kat] SHA2-512-ACC
33,264,381 UART: [kat] ECC-384
33,266,308 UART: Fatal Error: 0x90040004
33,301,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,451,481 >>> mbox cmd response: failed
33,452,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,602,024 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
10,438,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,479,215 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,281 writing to cptra_bootfsm_go
192,394 UART:
192,775 UART: Running Caliptra ROM ...
193,993 UART:
194,156 UART: [state] CFI Enabled
268,056 UART: [state] LifecycleState = Unprovisioned
269,973 UART: [state] DebugLocked = No
271,798 UART: [state] WD Timer not started. Device not locked for debugging
275,784 UART: [kat] SHA2-256
455,472 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,274 UART: [kat] ++
466,830 UART: [kat] sha1
477,076 UART: [kat] SHA2-256
479,735 UART: [kat] SHA2-384
484,526 UART: [kat] SHA2-512-ACC
486,908 UART: [kat] ECC-384
2,947,873 UART: [kat] HMAC-384Kdf
2,970,634 UART: [kat] LMS
3,447,063 UART: [kat] --
3,453,359 UART: [cold-reset] ++
3,454,806 UART: [fht] FHT @ 0x50003400
3,466,384 UART: [idev] ++
3,466,997 UART: [idev] CDI.KEYID = 6
3,467,917 UART: [idev] SUBJECT.KEYID = 7
3,469,173 UART: [idev] UDS.KEYID = 0
3,470,110 ready_for_fw is high
3,470,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,395 UART: [idev] Erasing UDS.KEYID = 0
5,988,619 UART: [idev] Sha1 KeyId Algorithm
6,012,444 UART: [idev] --
6,017,527 UART: [ldev] ++
6,018,109 UART: [ldev] CDI.KEYID = 6
6,019,024 UART: [ldev] SUBJECT.KEYID = 5
6,020,250 UART: [ldev] AUTHORITY.KEYID = 7
6,021,488 UART: [ldev] FE.KEYID = 1
6,057,421 UART: [ldev] Erasing FE.KEYID = 1
8,567,563 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,588 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,498 UART: [ldev] --
10,372,177 UART: [fwproc] Wait for Commands...
10,375,163 UART: [fwproc] Recv command 0x46574c44
10,377,214 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,388 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,401 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,356,008 >>> mbox cmd response: success
14,360,063 UART: [afmc] ++
14,360,660 UART: [afmc] CDI.KEYID = 6
14,361,688 UART: [afmc] SUBJECT.KEYID = 7
14,362,797 UART: [afmc] AUTHORITY.KEYID = 5
16,897,285 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,618,338 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,620,528 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,636,330 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,652,392 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,001 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,692,584 UART: [afmc] --
18,696,465 UART: [cold-reset] --
18,700,443 UART: [state] Locking Datavault
18,705,266 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,025 UART: [state] Locking ICCM
18,708,376 UART: [exit] Launching FMC @ 0x40000130
18,716,779 UART:
18,717,020 UART: Running Caliptra FMC ...
18,718,128 UART:
18,718,299 UART: [state] CFI Enabled
18,774,958 UART: [fht] FMC Alias Private Key: 7
20,542,134 UART: [art] Extend RT PCRs Done
20,543,360 UART: [art] Lock RT PCRs Done
20,544,910 UART: [art] Populate DV Done
20,550,244 UART: [fht] FMC Alias Private Key: 7
20,551,954 UART: [art] Derive CDI
20,552,799 UART: [art] Store in slot 0x4
20,607,911 UART: [art] Derive Key Pair
20,608,952 UART: [art] Store priv key in slot 0x5
23,071,721 UART: [art] Derive Key Pair - Done
23,084,665 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,797,464 UART: [art] Erasing AUTHORITY.KEYID = 7
24,798,972 UART: [art] PUB.X = 94425432ABB3F710B6FA68C143312BA500583DFB7E96EA1BA6EAAE0E213848515ED22AF9400E4673B7D5934E318C8D06
24,806,229 UART: [art] PUB.Y = 851308E2F92E5B8F4E6342EBEBB2B055A723C2C05AF41745535DA165C160718B4B246885FC549945B29AC7FE96FBAA33
24,813,473 UART: [art] SIG.R = 53505B38DDD60E3771DE0F916E608DB8698B9EEE92477610CAB2C43CF29415B24252B3BE4B767970661F5D08BA1BD271
24,820,872 UART: [art] SIG.S = 0CF28E7C09D8631E95E0D3F261743061D33610D9748626DD32A303B995B1FEF77F1902E584AC1733CDBE359EB659FC51
25,800,034 UART: Caliptra RT
25,800,742 UART: [state] CFI Enabled
25,979,600 UART: [rt] RT listening for mailbox commands...
25,981,457 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,011,221 UART: [rt]cmd =0x46504c54, len=4
26,012,640 >>> mbox cmd response data (8 bytes)
26,013,761 UART: [rt] FIPS self test
26,014,720 UART: [kat] ++
26,015,177 UART: [kat] sha1
26,019,585 UART: [kat] SHA2-256
26,021,523 UART: [kat] SHA2-384
26,024,470 UART: [kat] SHA2-512-ACC
26,026,752 UART: [kat] ECC-384
26,028,505 UART: Fatal Error: 0x90040004
26,063,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,214,089 >>> mbox cmd response: failed
26,214,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,364,686 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,012 UART:
190,312 UART: Running Caliptra ROM ...
191,361 UART:
191,508 UART: [state] CFI Enabled
264,101 UART: [state] LifecycleState = Unprovisioned
266,081 UART: [state] DebugLocked = No
267,602 UART: [state] WD Timer not started. Device not locked for debugging
271,444 UART: [kat] SHA2-256
451,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,853 UART: [kat] ++
462,305 UART: [kat] sha1
474,000 UART: [kat] SHA2-256
476,698 UART: [kat] SHA2-384
482,199 UART: [kat] SHA2-512-ACC
484,541 UART: [kat] ECC-384
2,945,712 UART: [kat] HMAC-384Kdf
2,970,891 UART: [kat] LMS
3,447,396 UART: [kat] --
3,452,862 UART: [cold-reset] ++
3,455,073 UART: [fht] FHT @ 0x50003400
3,466,829 UART: [idev] ++
3,467,400 UART: [idev] CDI.KEYID = 6
3,468,322 UART: [idev] SUBJECT.KEYID = 7
3,469,604 UART: [idev] UDS.KEYID = 0
3,471,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,339 UART: [idev] Erasing UDS.KEYID = 0
5,983,435 UART: [idev] Sha1 KeyId Algorithm
6,007,374 UART: [idev] --
6,012,781 UART: [ldev] ++
6,013,358 UART: [ldev] CDI.KEYID = 6
6,014,331 UART: [ldev] SUBJECT.KEYID = 5
6,015,498 UART: [ldev] AUTHORITY.KEYID = 7
6,016,741 UART: [ldev] FE.KEYID = 1
6,059,002 UART: [ldev] Erasing FE.KEYID = 1
8,562,088 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,020 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,907 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,758 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,349,324 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,178 UART: [ldev] --
10,374,906 UART: [fwproc] Wait for Commands...
10,376,744 UART: [fwproc] Recv command 0x46574c44
10,378,788 UART: [fwproc] Recv'd Img size: 119428 bytes
13,879,231 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,964,123 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,037,143 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,368,990 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,045 writing to cptra_bootfsm_go
3,460,455 ready_for_fw is high
3,461,162 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,250,592 >>> mbox cmd response: success
18,536,007 UART:
18,536,442 UART: Running Caliptra FMC ...
18,537,558 UART:
18,537,725 UART: [state] CFI Enabled
18,604,352 UART: [fht] FMC Alias Private Key: 7
20,370,407 UART: [art] Extend RT PCRs Done
20,371,649 UART: [art] Lock RT PCRs Done
20,373,334 UART: [art] Populate DV Done
20,378,666 UART: [fht] FMC Alias Private Key: 7
20,380,321 UART: [art] Derive CDI
20,381,141 UART: [art] Store in slot 0x4
20,437,056 UART: [art] Derive Key Pair
20,438,114 UART: [art] Store priv key in slot 0x5
22,900,750 UART: [art] Derive Key Pair - Done
22,913,760 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,073 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,588 UART: [art] PUB.X = F0D52A3F9ABA740CFB27546ABA7C4B9AAB0CE7A06A5A59787E88DB7954BE91D7EACEC75A9710AEDF517BCA0D6A4598FC
24,635,878 UART: [art] PUB.Y = 6A51E14C451F4E8F2B9C9A059ADD01B63ECBB75050E37EB69FF792493327B026C12A4C8C1FBD4CAB8F29EF3A8FF492D1
24,643,148 UART: [art] SIG.R = 8E46D34B0663D1708B4999525B0BF90BAF7A755F92C9D3F2C7BF4D2BDFA2C5A61A24AC188D69E3FEF43DC9FD78388FD4
24,650,517 UART: [art] SIG.S = DC18E81ADAF1C3A97B4E43C0BA4DFA60D815179A5D22799352CD9C06D0B88F809E1EDEE354D36692124628581DD5D288
25,630,143 UART: Caliptra RT
25,630,854 UART: [state] CFI Enabled
25,810,665 UART: [rt] RT listening for mailbox commands...
25,812,517 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,842,290 UART: [rt]cmd =0x46504c54, len=4
25,843,764 >>> mbox cmd response data (8 bytes)
25,844,976 UART: [rt] FIPS self test
25,845,946 UART: [kat] ++
25,846,407 UART: [kat] sha1
25,850,627 UART: [kat] SHA2-256
25,852,569 UART: [kat] SHA2-384
25,855,724 UART: [kat] SHA2-512-ACC
25,857,708 UART: [kat] ECC-384
25,859,769 UART: Fatal Error: 0x90040004
25,894,989 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,045,016 >>> mbox cmd response: failed
26,045,690 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,195,592 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,461,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,266,497 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,497 UART:
192,863 UART: Running Caliptra ROM ...
194,000 UART:
603,635 UART: [state] CFI Enabled
617,167 UART: [state] LifecycleState = Unprovisioned
619,058 UART: [state] DebugLocked = No
620,743 UART: [state] WD Timer not started. Device not locked for debugging
624,934 UART: [kat] SHA2-256
804,555 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,350 UART: [kat] ++
815,888 UART: [kat] sha1
825,356 UART: [kat] SHA2-256
828,018 UART: [kat] SHA2-384
835,011 UART: [kat] SHA2-512-ACC
837,390 UART: [kat] ECC-384
3,277,999 UART: [kat] HMAC-384Kdf
3,290,983 UART: [kat] LMS
3,767,472 UART: [kat] --
3,774,448 UART: [cold-reset] ++
3,776,176 UART: [fht] FHT @ 0x50003400
3,787,103 UART: [idev] ++
3,787,687 UART: [idev] CDI.KEYID = 6
3,788,731 UART: [idev] SUBJECT.KEYID = 7
3,789,918 UART: [idev] UDS.KEYID = 0
3,790,853 ready_for_fw is high
3,791,092 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,941,217 UART: [idev] Erasing UDS.KEYID = 0
6,265,574 UART: [idev] Sha1 KeyId Algorithm
6,289,405 UART: [idev] --
6,294,461 UART: [ldev] ++
6,295,046 UART: [ldev] CDI.KEYID = 6
6,295,982 UART: [ldev] SUBJECT.KEYID = 5
6,297,149 UART: [ldev] AUTHORITY.KEYID = 7
6,298,392 UART: [ldev] FE.KEYID = 1
6,310,287 UART: [ldev] Erasing FE.KEYID = 1
8,786,370 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,228 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,971 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,531 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,814 UART: [ldev] --
10,579,496 UART: [fwproc] Wait for Commands...
10,581,547 UART: [fwproc] Recv command 0x46574c44
10,583,537 UART: [fwproc] Recv'd Img size: 119428 bytes
14,087,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,673 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,246,692 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,578,139 >>> mbox cmd response: success
14,582,771 UART: [afmc] ++
14,583,356 UART: [afmc] CDI.KEYID = 6
14,584,379 UART: [afmc] SUBJECT.KEYID = 7
14,585,548 UART: [afmc] AUTHORITY.KEYID = 5
17,084,769 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,805,066 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,807,303 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,823,132 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,839,161 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,854,783 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,880,735 UART: [afmc] --
18,885,040 UART: [cold-reset] --
18,889,237 UART: [state] Locking Datavault
18,896,164 UART: [state] Locking PCR0, PCR1 and PCR31
18,897,928 UART: [state] Locking ICCM
18,900,103 UART: [exit] Launching FMC @ 0x40000130
18,908,502 UART:
18,908,748 UART: Running Caliptra FMC ...
18,909,801 UART:
18,909,957 UART: [state] CFI Enabled
18,918,091 UART: [fht] FMC Alias Private Key: 7
20,684,571 UART: [art] Extend RT PCRs Done
20,685,840 UART: [art] Lock RT PCRs Done
20,687,621 UART: [art] Populate DV Done
20,693,125 UART: [fht] FMC Alias Private Key: 7
20,694,768 UART: [art] Derive CDI
20,695,506 UART: [art] Store in slot 0x4
20,738,584 UART: [art] Derive Key Pair
20,739,586 UART: [art] Store priv key in slot 0x5
23,166,491 UART: [art] Derive Key Pair - Done
23,179,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,885,807 UART: [art] Erasing AUTHORITY.KEYID = 7
24,887,319 UART: [art] PUB.X = E7E7806F01A8F4DFDC744D2A475EF3DC6573B5B33E5E52B471AC74EA1F23F8697223F5D41FBE760BF6617C54F1D1F7AF
24,894,607 UART: [art] PUB.Y = EFC42C1D6925A3363D0240AA5BF015392BF584FA5F3680BE440925E0943EDD95874F6722E853F56547B4FF0DA0F5F688
24,901,827 UART: [art] SIG.R = E11D829B9559E2C8965E4BD399D39A471A428A75C1F26D6D528AEABA643F67428C7A578E7B7A0B9E6B3C48D073E84FE4
24,909,245 UART: [art] SIG.S = 6766A2EF6431208E83CE409E270E822F4827BBAC8288A1C558F9B810257E5C8D6330FAF62DFE31C2C5CA40E8AC51D01C
25,888,187 UART: Caliptra RT
25,888,925 UART: [state] CFI Enabled
26,021,128 UART: [rt] RT listening for mailbox commands...
26,022,993 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,052,735 UART: [rt]cmd =0x46504c54, len=4
26,054,217 >>> mbox cmd response data (8 bytes)
26,055,331 UART: [rt] FIPS self test
26,056,298 UART: [kat] ++
26,056,760 UART: [kat] sha1
26,061,060 UART: [kat] SHA2-256
26,062,998 UART: [kat] SHA2-384
26,065,989 UART: [kat] SHA2-512-ACC
26,068,240 UART: [kat] ECC-384
26,069,978 UART: Fatal Error: 0x90040004
26,105,136 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,255,165 >>> mbox cmd response: failed
26,255,815 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,405,749 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,085 UART:
190,378 UART: Running Caliptra ROM ...
191,407 UART:
14,130,569 UART: [state] CFI Enabled
14,142,912 UART: [state] LifecycleState = Unprovisioned
14,144,818 UART: [state] DebugLocked = No
14,146,184 UART: [state] WD Timer not started. Device not locked for debugging
14,149,406 UART: [kat] SHA2-256
14,329,061 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,339,830 UART: [kat] ++
14,340,293 UART: [kat] sha1
14,351,773 UART: [kat] SHA2-256
14,354,467 UART: [kat] SHA2-384
14,360,568 UART: [kat] SHA2-512-ACC
14,362,906 UART: [kat] ECC-384
16,805,280 UART: [kat] HMAC-384Kdf
16,816,822 UART: [kat] LMS
17,293,344 UART: [kat] --
17,295,935 UART: [cold-reset] ++
17,297,868 UART: [fht] FHT @ 0x50003400
17,309,559 UART: [idev] ++
17,310,127 UART: [idev] CDI.KEYID = 6
17,311,146 UART: [idev] SUBJECT.KEYID = 7
17,312,328 UART: [idev] UDS.KEYID = 0
17,313,861 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,463,756 UART: [idev] Erasing UDS.KEYID = 0
19,786,744 UART: [idev] Sha1 KeyId Algorithm
19,810,557 UART: [idev] --
19,814,039 UART: [ldev] ++
19,814,616 UART: [ldev] CDI.KEYID = 6
19,815,501 UART: [ldev] SUBJECT.KEYID = 5
19,816,768 UART: [ldev] AUTHORITY.KEYID = 7
19,818,002 UART: [ldev] FE.KEYID = 1
19,829,336 UART: [ldev] Erasing FE.KEYID = 1
22,311,081 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,028,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,044,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,060,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,075,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,098,621 UART: [ldev] --
24,104,536 UART: [fwproc] Wait for Commands...
24,106,693 UART: [fwproc] Recv command 0x46574c44
24,108,685 UART: [fwproc] Recv'd Img size: 119428 bytes
27,607,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,684,086 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,757,121 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,087,640 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
3,783,732 ready_for_fw is high
3,784,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,119 >>> mbox cmd response: success
18,712,805 UART:
18,713,184 UART: Running Caliptra FMC ...
18,714,389 UART:
18,714,558 UART: [state] CFI Enabled
18,722,191 UART: [fht] FMC Alias Private Key: 7
20,488,444 UART: [art] Extend RT PCRs Done
20,489,682 UART: [art] Lock RT PCRs Done
20,491,180 UART: [art] Populate DV Done
20,496,460 UART: [fht] FMC Alias Private Key: 7
20,498,048 UART: [art] Derive CDI
20,498,805 UART: [art] Store in slot 0x4
20,541,564 UART: [art] Derive Key Pair
20,542,568 UART: [art] Store priv key in slot 0x5
22,969,427 UART: [art] Derive Key Pair - Done
22,982,500 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,776 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,318 UART: [art] PUB.X = 5407BD2148993E088EEA75D630FC18B6AE521DB4F74E2992A60FC590B5FE816458320C32E33D476B0CC2D8CDD337344E
24,697,528 UART: [art] PUB.Y = 83D9B1E12B0228EFEACB54F716B9A253252C4B43438385644CAB66D91387EEB0086F93475500D24DEFE391C63E968624
24,704,799 UART: [art] SIG.R = 461AC281B1D74D28F23521D9F9DB8E4E9DBF93768E9586EE1BA0D4DB104B43065E02E4D1E045500526F36CB0A0FB4461
24,712,153 UART: [art] SIG.S = 50061DFD80F4EDE1DFF9F0A30938F67928D169953742BE193BE574A9FCDA185E8A7F22B2542E05156E71B4CFF87DC2C6
25,690,548 UART: Caliptra RT
25,691,254 UART: [state] CFI Enabled
25,825,181 UART: [rt] RT listening for mailbox commands...
25,827,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,856,795 UART: [rt]cmd =0x46504c54, len=4
25,858,415 >>> mbox cmd response data (8 bytes)
25,859,486 UART: [rt] FIPS self test
25,860,434 UART: [kat] ++
25,860,893 UART: [kat] sha1
25,865,301 UART: [kat] SHA2-256
25,867,205 UART: [kat] SHA2-384
25,870,331 UART: [kat] SHA2-512-ACC
25,872,574 UART: [kat] ECC-384
25,874,234 UART: Fatal Error: 0x90040004
25,909,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,059,404 >>> mbox cmd response: failed
26,060,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,210,355 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
17,507,512 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,190,217 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,894 writing to cptra_bootfsm_go
192,035 UART:
192,403 UART: Running Caliptra ROM ...
193,607 UART:
193,766 UART: [state] CFI Enabled
263,458 UART: [state] LifecycleState = Unprovisioned
265,861 UART: [state] DebugLocked = No
267,762 UART: [state] WD Timer not started. Device not locked for debugging
272,458 UART: [kat] SHA2-256
462,393 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,125 UART: [kat] ++
473,577 UART: [kat] sha1
485,451 UART: [kat] SHA2-256
488,467 UART: [kat] SHA2-384
493,685 UART: [kat] SHA2-512-ACC
496,349 UART: [kat] ECC-384
2,952,956 UART: [kat] HMAC-384Kdf
2,974,498 UART: [kat] LMS
3,506,262 UART: [kat] --
3,511,622 UART: [cold-reset] ++
3,513,637 UART: [fht] FHT @ 0x50003400
3,525,861 UART: [idev] ++
3,526,578 UART: [idev] CDI.KEYID = 6
3,527,491 UART: [idev] SUBJECT.KEYID = 7
3,528,677 UART: [idev] UDS.KEYID = 0
3,529,606 ready_for_fw is high
3,529,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,679,965 UART: [idev] Erasing UDS.KEYID = 0
6,031,264 UART: [idev] Sha1 KeyId Algorithm
6,053,213 UART: [idev] --
6,058,679 UART: [ldev] ++
6,059,369 UART: [ldev] CDI.KEYID = 6
6,060,282 UART: [ldev] SUBJECT.KEYID = 5
6,061,504 UART: [ldev] AUTHORITY.KEYID = 7
6,062,689 UART: [ldev] FE.KEYID = 1
6,103,645 UART: [ldev] Erasing FE.KEYID = 1
8,611,546 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,348,144 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,363,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,378,527 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,393,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,414,649 UART: [ldev] --
10,420,709 UART: [fwproc] Wait for Commands...
10,422,595 UART: [fwproc] Recv command 0x46574c44
10,424,926 UART: [fwproc] Recv'd Img size: 119428 bytes
13,934,858 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,136,262 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,701,985 >>> mbox cmd response: success
14,706,885 UART: [afmc] ++
14,707,591 UART: [afmc] CDI.KEYID = 6
14,708,834 UART: [afmc] SUBJECT.KEYID = 7
14,710,271 UART: [afmc] AUTHORITY.KEYID = 5
17,246,703 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,986,407 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,988,318 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,003,409 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,018,590 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,033,464 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,055,713 UART: [afmc] --
19,059,637 UART: [cold-reset] --
19,063,630 UART: [state] Locking Datavault
19,070,939 UART: [state] Locking PCR0, PCR1 and PCR31
19,073,131 UART: [state] Locking ICCM
19,074,797 UART: [exit] Launching FMC @ 0x40000130
19,083,470 UART:
19,083,712 UART: Running Caliptra FMC ...
19,084,818 UART:
19,084,981 UART: [state] CFI Enabled
19,151,487 UART: [fht] FMC Alias Private Key: 7
20,917,832 UART: [art] Extend RT PCRs Done
20,919,054 UART: [art] Lock RT PCRs Done
20,920,638 UART: [art] Populate DV Done
20,926,000 UART: [fht] FMC Alias Private Key: 7
20,927,604 UART: [art] Derive CDI
20,928,430 UART: [art] Store in slot 0x4
20,983,635 UART: [art] Derive Key Pair
20,984,686 UART: [art] Store priv key in slot 0x5
23,446,922 UART: [art] Derive Key Pair - Done
23,460,019 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,172,912 UART: [art] Erasing AUTHORITY.KEYID = 7
25,174,426 UART: [art] PUB.X = 018E755EA27FC85ACFDB5A7601E9C8781EC488D5429AACA8B37FE1F64B38E6BA0D0C71F52CA679B8A43A7FF9E439D3A5
25,181,680 UART: [art] PUB.Y = 6CBA47C3B84393E77576F88E7CDBA6E4BBDAC45B01A49359AE13FA99467E9B311F92F258FCBC8EEF48AEDF33BECCC53B
25,188,970 UART: [art] SIG.R = BE736BA68FD9BDDA007CCBA15182131E39A257FD39FC35A90593A3B0BD25E20774B63510BE5F336E57E779BB075FBE70
25,196,366 UART: [art] SIG.S = B6D70E15C068180DA43DDBAEC69CDD3E5B61F858DED40E71C63B79A7B7A95DE8B722F400E0401DCF3577D54B2F56DC81
26,175,106 UART: Caliptra RT
26,175,822 UART: [state] CFI Enabled
26,356,670 UART: [rt] RT listening for mailbox commands...
26,358,528 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,388,325 UART: [rt]cmd =0x46504c54, len=4
26,389,850 >>> mbox cmd response data (8 bytes)
26,390,813 UART: [rt] FIPS self test
26,391,754 UART: [kat] ++
26,392,211 UART: [kat] sha1
26,396,453 UART: [kat] SHA2-256
26,398,336 UART: [kat] SHA2-384
26,401,355 UART: [kat] SHA2-512-ACC
26,403,649 UART: [kat] ECC-384
26,405,817 UART: Fatal Error: 0x90040004
26,441,754 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,591,879 >>> mbox cmd response: failed
26,592,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,742,501 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
190,107 UART:
190,387 UART: Running Caliptra ROM ...
191,501 UART:
191,657 UART: [state] CFI Enabled
261,165 UART: [state] LifecycleState = Unprovisioned
263,520 UART: [state] DebugLocked = No
265,083 UART: [state] WD Timer not started. Device not locked for debugging
269,147 UART: [kat] SHA2-256
459,016 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
469,788 UART: [kat] ++
470,321 UART: [kat] sha1
481,530 UART: [kat] SHA2-256
484,541 UART: [kat] SHA2-384
490,260 UART: [kat] SHA2-512-ACC
492,834 UART: [kat] ECC-384
2,949,869 UART: [kat] HMAC-384Kdf
2,970,522 UART: [kat] LMS
3,502,286 UART: [kat] --
3,506,730 UART: [cold-reset] ++
3,508,884 UART: [fht] FHT @ 0x50003400
3,519,064 UART: [idev] ++
3,519,788 UART: [idev] CDI.KEYID = 6
3,520,683 UART: [idev] SUBJECT.KEYID = 7
3,521,905 UART: [idev] UDS.KEYID = 0
3,523,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,548 UART: [idev] Erasing UDS.KEYID = 0
6,029,724 UART: [idev] Sha1 KeyId Algorithm
6,051,660 UART: [idev] --
6,056,758 UART: [ldev] ++
6,057,453 UART: [ldev] CDI.KEYID = 6
6,058,368 UART: [ldev] SUBJECT.KEYID = 5
6,059,537 UART: [ldev] AUTHORITY.KEYID = 7
6,060,781 UART: [ldev] FE.KEYID = 1
6,099,088 UART: [ldev] Erasing FE.KEYID = 1
8,606,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,419 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,539 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,768 UART: [ldev] --
10,414,275 UART: [fwproc] Wait for Commands...
10,417,351 UART: [fwproc] Recv command 0x46574c44
10,419,674 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,007,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,925 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,695,945 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,439,979 ready_for_fw is high
3,440,614 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,857,232 >>> mbox cmd response: success
19,162,017 UART:
19,162,412 UART: Running Caliptra FMC ...
19,163,548 UART:
19,163,707 UART: [state] CFI Enabled
19,228,152 UART: [fht] FMC Alias Private Key: 7
20,994,236 UART: [art] Extend RT PCRs Done
20,995,467 UART: [art] Lock RT PCRs Done
20,997,126 UART: [art] Populate DV Done
21,002,447 UART: [fht] FMC Alias Private Key: 7
21,004,029 UART: [art] Derive CDI
21,004,782 UART: [art] Store in slot 0x4
21,061,632 UART: [art] Derive Key Pair
21,062,684 UART: [art] Store priv key in slot 0x5
23,525,703 UART: [art] Derive Key Pair - Done
23,538,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,251,009 UART: [art] Erasing AUTHORITY.KEYID = 7
25,252,530 UART: [art] PUB.X = 9960787DB91B63450A40A96F48923A3BD6CEB981B1AB097D18FC63E77AB8EB45C4FFC6D590539516643A809D35C185EA
25,259,789 UART: [art] PUB.Y = CCB9B61D61E1BFE324629918EAEEFB4897B205F8FBD8CA14CCED510A692FD9B93732DAD790DCBDA7C7D30B8829D945F4
25,267,074 UART: [art] SIG.R = 73CC74A6FC98D745BF9647DF1FAD1FA50489F16DCD3736B5988A0ABE5DA22F5C7856A5A28418FD698E0776296D9717CC
25,274,474 UART: [art] SIG.S = 92BA7E4D46CBF576A66B6800FF5DD79DFCF1E885C1A40BD4D9302749478CF375D417CE72472C335C6C09736D48ACECDA
26,253,427 UART: Caliptra RT
26,254,120 UART: [state] CFI Enabled
26,435,324 UART: [rt] RT listening for mailbox commands...
26,437,187 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,467,041 UART: [rt]cmd =0x46504c54, len=4
26,468,579 >>> mbox cmd response data (8 bytes)
26,469,653 UART: [rt] FIPS self test
26,470,608 UART: [kat] ++
26,471,069 UART: [kat] sha1
26,475,424 UART: [kat] SHA2-256
26,477,306 UART: [kat] SHA2-384
26,480,322 UART: [kat] SHA2-512-ACC
26,482,565 UART: [kat] ECC-384
26,484,355 UART: Fatal Error: 0x90040004
26,519,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,669,889 >>> mbox cmd response: failed
26,670,539 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,820,479 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,440,592 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,850,668 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
192,563 UART:
192,924 UART: Running Caliptra ROM ...
194,141 UART:
603,639 UART: [state] CFI Enabled
615,598 UART: [state] LifecycleState = Unprovisioned
617,981 UART: [state] DebugLocked = No
619,929 UART: [state] WD Timer not started. Device not locked for debugging
623,691 UART: [kat] SHA2-256
813,287 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,078 UART: [kat] ++
824,614 UART: [kat] sha1
835,633 UART: [kat] SHA2-256
838,645 UART: [kat] SHA2-384
845,209 UART: [kat] SHA2-512-ACC
847,797 UART: [kat] ECC-384
3,291,493 UART: [kat] HMAC-384Kdf
3,304,668 UART: [kat] LMS
3,836,500 UART: [kat] --
3,841,109 UART: [cold-reset] ++
3,843,314 UART: [fht] FHT @ 0x50003400
3,854,737 UART: [idev] ++
3,855,381 UART: [idev] CDI.KEYID = 6
3,856,421 UART: [idev] SUBJECT.KEYID = 7
3,857,534 UART: [idev] UDS.KEYID = 0
3,858,467 ready_for_fw is high
3,858,677 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,008,688 UART: [idev] Erasing UDS.KEYID = 0
6,332,806 UART: [idev] Sha1 KeyId Algorithm
6,356,145 UART: [idev] --
6,360,413 UART: [ldev] ++
6,361,094 UART: [ldev] CDI.KEYID = 6
6,362,012 UART: [ldev] SUBJECT.KEYID = 5
6,363,178 UART: [ldev] AUTHORITY.KEYID = 7
6,364,415 UART: [ldev] FE.KEYID = 1
6,374,042 UART: [ldev] Erasing FE.KEYID = 1
8,856,886 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,552 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,638,892 UART: [ldev] --
10,644,146 UART: [fwproc] Wait for Commands...
10,646,698 UART: [fwproc] Recv command 0x46574c44
10,648,967 UART: [fwproc] Recv'd Img size: 119428 bytes
14,164,735 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,247,703 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,371,329 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,936,359 >>> mbox cmd response: success
14,941,155 UART: [afmc] ++
14,941,860 UART: [afmc] CDI.KEYID = 6
14,943,049 UART: [afmc] SUBJECT.KEYID = 7
14,944,509 UART: [afmc] AUTHORITY.KEYID = 5
17,448,073 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,169,444 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,171,412 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,186,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,201,623 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,216,577 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,240,632 UART: [afmc] --
19,244,444 UART: [cold-reset] --
19,249,115 UART: [state] Locking Datavault
19,255,608 UART: [state] Locking PCR0, PCR1 and PCR31
19,257,750 UART: [state] Locking ICCM
19,260,264 UART: [exit] Launching FMC @ 0x40000130
19,268,933 UART:
19,269,172 UART: Running Caliptra FMC ...
19,270,202 UART:
19,270,372 UART: [state] CFI Enabled
19,278,429 UART: [fht] FMC Alias Private Key: 7
21,044,820 UART: [art] Extend RT PCRs Done
21,046,099 UART: [art] Lock RT PCRs Done
21,047,868 UART: [art] Populate DV Done
21,053,280 UART: [fht] FMC Alias Private Key: 7
21,054,994 UART: [art] Derive CDI
21,055,772 UART: [art] Store in slot 0x4
21,098,510 UART: [art] Derive Key Pair
21,099,522 UART: [art] Store priv key in slot 0x5
23,526,986 UART: [art] Derive Key Pair - Done
23,539,765 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,246,249 UART: [art] Erasing AUTHORITY.KEYID = 7
25,247,750 UART: [art] PUB.X = 2C5DBAAAC4FC8F962040D01EB454B5184C765E2A982511D8E29E7726D19F7EDB2DB496F6CAD6E180A87230042A36AE63
25,255,035 UART: [art] PUB.Y = BD3648215EA4A0AC1F378C41C7F378D6EA8AFEAE6A2F6744B44C25B18E0F38C223561EDC726A89721B5292FE5DD36C50
25,262,312 UART: [art] SIG.R = E90CA6761192447AA69B92D1C2E06DFF95D30F95BA52A2CD0A6AD060193677577040E3032C7DF06A602491B8C5644B0D
25,269,694 UART: [art] SIG.S = D0ACC13767B5E3E862796716D2A0247A903F832F21B603FCF75E781820D15F5B3B16FEC807A583C27D1E7E1B9CE7B1B1
26,247,786 UART: Caliptra RT
26,248,476 UART: [state] CFI Enabled
26,381,681 UART: [rt] RT listening for mailbox commands...
26,383,531 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,413,330 UART: [rt]cmd =0x46504c54, len=4
26,414,838 >>> mbox cmd response data (8 bytes)
26,415,914 UART: [rt] FIPS self test
26,416,862 UART: [kat] ++
26,417,325 UART: [kat] sha1
26,421,680 UART: [kat] SHA2-256
26,423,618 UART: [kat] SHA2-384
26,426,527 UART: [kat] SHA2-512-ACC
26,428,821 UART: [kat] ECC-384
26,430,665 UART: Fatal Error: 0x90040004
26,465,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,615,902 >>> mbox cmd response: failed
26,616,557 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,766,884 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,221 UART:
190,512 UART: Running Caliptra ROM ...
191,622 UART:
13,766,575 UART: [state] CFI Enabled
13,780,688 UART: [state] LifecycleState = Unprovisioned
13,783,053 UART: [state] DebugLocked = No
13,784,727 UART: [state] WD Timer not started. Device not locked for debugging
13,789,088 UART: [kat] SHA2-256
13,978,976 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,989,729 UART: [kat] ++
13,990,333 UART: [kat] sha1
14,002,008 UART: [kat] SHA2-256
14,005,047 UART: [kat] SHA2-384
14,011,965 UART: [kat] SHA2-512-ACC
14,014,547 UART: [kat] ECC-384
16,459,217 UART: [kat] HMAC-384Kdf
16,471,449 UART: [kat] LMS
17,003,255 UART: [kat] --
17,007,324 UART: [cold-reset] ++
17,009,808 UART: [fht] FHT @ 0x50003400
17,021,659 UART: [idev] ++
17,022,348 UART: [idev] CDI.KEYID = 6
17,023,370 UART: [idev] SUBJECT.KEYID = 7
17,024,536 UART: [idev] UDS.KEYID = 0
17,026,074 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,175,999 UART: [idev] Erasing UDS.KEYID = 0
19,505,851 UART: [idev] Sha1 KeyId Algorithm
19,528,024 UART: [idev] --
19,532,619 UART: [ldev] ++
19,533,302 UART: [ldev] CDI.KEYID = 6
19,534,213 UART: [ldev] SUBJECT.KEYID = 5
19,535,430 UART: [ldev] AUTHORITY.KEYID = 7
19,536,609 UART: [ldev] FE.KEYID = 1
19,548,390 UART: [ldev] Erasing FE.KEYID = 1
22,026,406 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,745,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,761,069 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,776,306 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,791,440 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,811,794 UART: [ldev] --
23,817,712 UART: [fwproc] Wait for Commands...
23,820,627 UART: [fwproc] Recv command 0x46574c44
23,822,897 UART: [fwproc] Recv'd Img size: 119428 bytes
27,327,386 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,408,392 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,532,022 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,096,765 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,173 writing to cptra_bootfsm_go
3,759,711 ready_for_fw is high
3,760,312 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,065,909 >>> mbox cmd response: success
19,321,325 UART:
19,321,740 UART: Running Caliptra FMC ...
19,322,944 UART:
19,323,124 UART: [state] CFI Enabled
19,330,544 UART: [fht] FMC Alias Private Key: 7
21,096,638 UART: [art] Extend RT PCRs Done
21,097,871 UART: [art] Lock RT PCRs Done
21,099,911 UART: [art] Populate DV Done
21,105,352 UART: [fht] FMC Alias Private Key: 7
21,107,063 UART: [art] Derive CDI
21,107,890 UART: [art] Store in slot 0x4
21,150,386 UART: [art] Derive Key Pair
21,151,437 UART: [art] Store priv key in slot 0x5
23,578,143 UART: [art] Derive Key Pair - Done
23,591,079 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,297,502 UART: [art] Erasing AUTHORITY.KEYID = 7
25,299,019 UART: [art] PUB.X = D45588018801C84695C310DDDEBCC4FCEC67353968B1C3A68A587C5F58A00C449BA7900D30A6DC8484C83D70B7D41607
25,306,285 UART: [art] PUB.Y = 4D7163F2F0EEB77AE59C7A23C1B0C6F2B6F2D0FF0A30A3C949D02E2AA733DFE1FDA71E2287499975045B12911FED805E
25,313,500 UART: [art] SIG.R = 425697F8521BBC9948E86E56599BD64A9088ED1AE251C874C09132C4A8E1208098190249A45BCDEA7A98FDC59D206023
25,320,870 UART: [art] SIG.S = E6619401CA70433BE3D94BECAA69CFF42581E2B21C50FA8D7FEAFD99185AF03DA0868123946BD74F47D5D9007835457A
26,299,669 UART: Caliptra RT
26,300,384 UART: [state] CFI Enabled
26,432,690 UART: [rt] RT listening for mailbox commands...
26,434,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,464,296 UART: [rt]cmd =0x46504c54, len=4
26,465,834 >>> mbox cmd response data (8 bytes)
26,466,829 UART: [rt] FIPS self test
26,467,781 UART: [kat] ++
26,468,237 UART: [kat] sha1
26,472,479 UART: [kat] SHA2-256
26,474,360 UART: [kat] SHA2-384
26,477,220 UART: [kat] SHA2-512-ACC
26,479,515 UART: [kat] ECC-384
26,481,548 UART: Fatal Error: 0x90040004
26,516,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,666,926 >>> mbox cmd response: failed
26,667,528 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,817,457 >>> mbox cmd response: failed
Initializing fuses
928 writing to cptra_bootfsm_go
16,870,289 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,176,137 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,561 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,283 UART: [kat] SHA2-256
882,214 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,329 UART: [kat] ++
886,481 UART: [kat] sha1
890,833 UART: [kat] SHA2-256
892,771 UART: [kat] SHA2-384
895,526 UART: [kat] SHA2-512-ACC
897,427 UART: [kat] ECC-384
902,834 UART: [kat] HMAC-384Kdf
907,566 UART: [kat] LMS
1,475,762 UART: [kat] --
1,476,541 UART: [cold-reset] ++
1,477,033 UART: [fht] Storing FHT @ 0x50003400
1,479,836 UART: [idev] ++
1,480,004 UART: [idev] CDI.KEYID = 6
1,480,364 UART: [idev] SUBJECT.KEYID = 7
1,480,788 UART: [idev] UDS.KEYID = 0
1,481,133 ready_for_fw is high
1,481,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,406 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,028 UART: [idev] --
1,515,087 UART: [ldev] ++
1,515,255 UART: [ldev] CDI.KEYID = 6
1,515,618 UART: [ldev] SUBJECT.KEYID = 5
1,516,044 UART: [ldev] AUTHORITY.KEYID = 7
1,516,507 UART: [ldev] FE.KEYID = 1
1,521,721 UART: [ldev] Erasing FE.KEYID = 1
1,546,760 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,087 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,694 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,406 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,526 UART: [ldev] --
1,586,035 UART: [fwproc] Waiting for Commands...
1,586,878 UART: [fwproc] Received command 0x46574c44
1,587,669 UART: [fwproc] Received Image of size 119428 bytes
2,942,195 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,618 >>> mbox cmd response: success
3,143,640 UART: [afmc] ++
3,143,808 UART: [afmc] CDI.KEYID = 6
3,144,170 UART: [afmc] SUBJECT.KEYID = 7
3,144,595 UART: [afmc] AUTHORITY.KEYID = 5
3,179,748 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,082 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,862 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,571 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,454 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,137 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,939 UART: [afmc] --
3,222,903 UART: [cold-reset] --
3,223,801 UART: [state] Locking Datavault
3,225,142 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,746 UART: [state] Locking ICCM
3,226,178 UART: [exit] Launching FMC @ 0x40000130
3,231,508 UART:
3,231,524 UART: Running Caliptra FMC ...
3,231,932 UART:
3,231,986 UART: [state] CFI Enabled
3,242,340 UART: [fht] FMC Alias Private Key: 7
3,361,058 UART: [art] Extend RT PCRs Done
3,361,486 UART: [art] Lock RT PCRs Done
3,362,698 UART: [art] Populate DV Done
3,370,983 UART: [fht] FMC Alias Private Key: 7
3,371,943 UART: [art] Derive CDI
3,372,223 UART: [art] Store in slot 0x4
3,458,293 UART: [art] Derive Key Pair
3,458,653 UART: [art] Store priv key in slot 0x5
3,472,606 UART: [art] Derive Key Pair - Done
3,487,528 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,042 UART: [art] PUB.X = 96654C976F1C1E7E02F84E7AAF74B7523A08FBDA70D3A97553C13836125126EA57FC9EA69A9358145229E98B7D590B22
3,510,801 UART: [art] PUB.Y = C45219231A06DC23378A1B8196871A2C0792C6CB40E4B64CD90280097665896DE590127ED102BC89739B326EDF557AFD
3,517,730 UART: [art] SIG.R = 48D097B09D4E4327EB91EA16DA0F81F5DEA08EBD711346A6418AFD52322A76F65C719F7F977E2A2B4FA33F957AF79B6C
3,524,509 UART: [art] SIG.S = 1BC70CE31D9A739DF2292E98D8AB06E1C27B026444CC8A40AB1BF15FD8B96AE47E158FD36B4D65A88D034903B2D14E09
3,548,003 UART: Caliptra RT
3,548,254 UART: [state] CFI Enabled
3,669,375 UART: [rt] RT listening for mailbox commands...
3,670,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,839 UART: [rt]cmd =0x46504c54, len=4
3,701,077 >>> mbox cmd response data (8 bytes)
3,701,284 UART: [rt] FIPS self test
3,701,612 UART: [kat] ++
3,701,764 UART: [kat] sha1
3,706,078 UART: [kat] SHA2-256
3,708,100 UART: [kat] SHA2-384
3,710,903 UART: [kat] SHA2-512-ACC
3,712,830 UART: [kat] ECC-384
3,714,481 UART: Fatal Error: 0x90040004
3,716,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,025 >>> mbox cmd response: failed
3,716,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,030 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,870 UART: [state] LifecycleState = Unprovisioned
85,525 UART: [state] DebugLocked = No
86,135 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,725 UART: [kat] SHA2-256
881,656 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,771 UART: [kat] ++
885,923 UART: [kat] sha1
890,119 UART: [kat] SHA2-256
892,057 UART: [kat] SHA2-384
894,992 UART: [kat] SHA2-512-ACC
896,893 UART: [kat] ECC-384
902,298 UART: [kat] HMAC-384Kdf
906,840 UART: [kat] LMS
1,475,036 UART: [kat] --
1,475,837 UART: [cold-reset] ++
1,476,267 UART: [fht] Storing FHT @ 0x50003400
1,479,040 UART: [idev] ++
1,479,208 UART: [idev] CDI.KEYID = 6
1,479,568 UART: [idev] SUBJECT.KEYID = 7
1,479,992 UART: [idev] UDS.KEYID = 0
1,480,337 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,118 UART: [idev] Erasing UDS.KEYID = 0
1,504,574 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,148 UART: [idev] --
1,514,065 UART: [ldev] ++
1,514,233 UART: [ldev] CDI.KEYID = 6
1,514,596 UART: [ldev] SUBJECT.KEYID = 5
1,515,022 UART: [ldev] AUTHORITY.KEYID = 7
1,515,485 UART: [ldev] FE.KEYID = 1
1,520,681 UART: [ldev] Erasing FE.KEYID = 1
1,546,138 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,390 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,102 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,134 UART: [ldev] --
1,585,517 UART: [fwproc] Waiting for Commands...
1,586,208 UART: [fwproc] Received command 0x46574c44
1,586,999 UART: [fwproc] Received Image of size 119428 bytes
2,942,041 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,876 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 ready_for_fw is high
1,362,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,276 >>> mbox cmd response: success
3,054,069 UART:
3,054,085 UART: Running Caliptra FMC ...
3,054,493 UART:
3,054,547 UART: [state] CFI Enabled
3,065,087 UART: [fht] FMC Alias Private Key: 7
3,184,149 UART: [art] Extend RT PCRs Done
3,184,577 UART: [art] Lock RT PCRs Done
3,186,137 UART: [art] Populate DV Done
3,194,178 UART: [fht] FMC Alias Private Key: 7
3,195,186 UART: [art] Derive CDI
3,195,466 UART: [art] Store in slot 0x4
3,281,040 UART: [art] Derive Key Pair
3,281,400 UART: [art] Store priv key in slot 0x5
3,294,531 UART: [art] Derive Key Pair - Done
3,309,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,621 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,386 UART: [art] PUB.X = AB798560F11E20015C006D5DF5A6F132CEBCEB7475F9D0B556EABD19C33FD82D9E019DA2EA0639433C9CB34B54C6B7F1
3,332,141 UART: [art] PUB.Y = AA4527D756A358C4DCEB671349ED53384300E36A893C87E722522541BBFA6D9293D966FF7523C33C9EEBCF75460DC50D
3,339,067 UART: [art] SIG.R = 1AC59B7D9019B4D5FFA5054D33B8087E6219EDA2C2FDD8CF5AC3FE759D9556FB716CFECCBCEA0EBF7EE3D3D2FB0ECA43
3,345,861 UART: [art] SIG.S = DF052A299FD6E8A90877235E1395A2B2B0D3BE9E240B9F11AD570D18538ABA2F3B942E1AD90B67FD537655AE95CBAD8C
3,369,806 UART: Caliptra RT
3,370,057 UART: [state] CFI Enabled
3,489,459 UART: [rt] RT listening for mailbox commands...
3,490,122 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,885 UART: [rt]cmd =0x46504c54, len=4
3,521,155 >>> mbox cmd response data (8 bytes)
3,521,312 UART: [rt] FIPS self test
3,521,640 UART: [kat] ++
3,521,792 UART: [kat] sha1
3,526,136 UART: [kat] SHA2-256
3,528,158 UART: [kat] SHA2-384
3,531,123 UART: [kat] SHA2-512-ACC
3,533,050 UART: [kat] ECC-384
3,534,907 UART: Fatal Error: 0x90040004
3,536,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,451 >>> mbox cmd response: failed
3,536,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,456 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,415 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,874 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,179 UART: [state] LifecycleState = Unprovisioned
85,834 UART: [state] DebugLocked = No
86,544 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,470 UART: [kat] SHA2-256
892,408 UART: [kat] SHA2-384
895,205 UART: [kat] SHA2-512-ACC
897,106 UART: [kat] ECC-384
902,713 UART: [kat] HMAC-384Kdf
907,241 UART: [kat] LMS
1,475,437 UART: [kat] --
1,476,492 UART: [cold-reset] ++
1,476,866 UART: [fht] Storing FHT @ 0x50003400
1,479,513 UART: [idev] ++
1,479,681 UART: [idev] CDI.KEYID = 6
1,480,041 UART: [idev] SUBJECT.KEYID = 7
1,480,465 UART: [idev] UDS.KEYID = 0
1,480,810 ready_for_fw is high
1,480,810 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,045 UART: [idev] Erasing UDS.KEYID = 0
1,504,823 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,349 UART: [idev] --
1,514,258 UART: [ldev] ++
1,514,426 UART: [ldev] CDI.KEYID = 6
1,514,789 UART: [ldev] SUBJECT.KEYID = 5
1,515,215 UART: [ldev] AUTHORITY.KEYID = 7
1,515,678 UART: [ldev] FE.KEYID = 1
1,521,006 UART: [ldev] Erasing FE.KEYID = 1
1,546,573 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,070 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,786 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,677 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,263 UART: [ldev] --
1,585,716 UART: [fwproc] Waiting for Commands...
1,586,529 UART: [fwproc] Received command 0x46574c44
1,587,320 UART: [fwproc] Received Image of size 119428 bytes
2,942,904 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,010 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,228 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,751 >>> mbox cmd response: success
3,144,979 UART: [afmc] ++
3,145,147 UART: [afmc] CDI.KEYID = 6
3,145,509 UART: [afmc] SUBJECT.KEYID = 7
3,145,934 UART: [afmc] AUTHORITY.KEYID = 5
3,180,813 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,229 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,009 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,718 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,601 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,284 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,250 UART: [afmc] --
3,224,352 UART: [cold-reset] --
3,225,370 UART: [state] Locking Datavault
3,226,601 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,205 UART: [state] Locking ICCM
3,227,769 UART: [exit] Launching FMC @ 0x40000130
3,233,099 UART:
3,233,115 UART: Running Caliptra FMC ...
3,233,523 UART:
3,233,666 UART: [state] CFI Enabled
3,244,238 UART: [fht] FMC Alias Private Key: 7
3,362,618 UART: [art] Extend RT PCRs Done
3,363,046 UART: [art] Lock RT PCRs Done
3,364,280 UART: [art] Populate DV Done
3,372,591 UART: [fht] FMC Alias Private Key: 7
3,373,683 UART: [art] Derive CDI
3,373,963 UART: [art] Store in slot 0x4
3,459,551 UART: [art] Derive Key Pair
3,459,911 UART: [art] Store priv key in slot 0x5
3,473,154 UART: [art] Derive Key Pair - Done
3,488,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,770 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,535 UART: [art] PUB.X = 3E8CF54AAF1A98580F499DC6897DFD9846295BBC7585B6B92E1EF4C64C4CF88355247115B9365AE8AF44252C7809E813
3,511,301 UART: [art] PUB.Y = 6E6AE21987B193C9F429DCD24887750E909EBF192DA1FE2F370AEC911BCF69723340DCECEC9AD2A21F0E66E91CBFD506
3,518,257 UART: [art] SIG.R = 697FA0B8AC65068294FE522B0962B74524C2EB096A1C20A2C7E3D686A93C7001FF336804D42C89F0F5FFEB080B350FD8
3,525,007 UART: [art] SIG.S = 31016D596D1A6D8B19AD2C7BBCB6F662BCF8F7742CF6669CABC737AB2C7B7B14F5798FBED9E4F0DBBB8DD5460EA32C72
3,549,255 UART: Caliptra RT
3,549,598 UART: [state] CFI Enabled
3,669,787 UART: [rt] RT listening for mailbox commands...
3,670,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,365 UART: [rt]cmd =0x46504c54, len=4
3,701,599 >>> mbox cmd response data (8 bytes)
3,701,842 UART: [rt] FIPS self test
3,702,170 UART: [kat] ++
3,702,322 UART: [kat] sha1
3,706,516 UART: [kat] SHA2-256
3,708,538 UART: [kat] SHA2-384
3,711,401 UART: [kat] SHA2-512-ACC
3,713,328 UART: [kat] ECC-384
3,714,799 UART: Fatal Error: 0x90040004
3,716,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,343 >>> mbox cmd response: failed
3,716,343 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,348 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,699 UART: [state] LifecycleState = Unprovisioned
86,354 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,424 UART: [kat] SHA2-256
882,355 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,470 UART: [kat] ++
886,622 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,469 UART: [kat] SHA2-512-ACC
897,370 UART: [kat] ECC-384
902,881 UART: [kat] HMAC-384Kdf
907,633 UART: [kat] LMS
1,475,829 UART: [kat] --
1,476,918 UART: [cold-reset] ++
1,477,356 UART: [fht] Storing FHT @ 0x50003400
1,480,309 UART: [idev] ++
1,480,477 UART: [idev] CDI.KEYID = 6
1,480,837 UART: [idev] SUBJECT.KEYID = 7
1,481,261 UART: [idev] UDS.KEYID = 0
1,481,606 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,425 UART: [idev] Erasing UDS.KEYID = 0
1,505,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,905 UART: [idev] --
1,514,956 UART: [ldev] ++
1,515,124 UART: [ldev] CDI.KEYID = 6
1,515,487 UART: [ldev] SUBJECT.KEYID = 5
1,515,913 UART: [ldev] AUTHORITY.KEYID = 7
1,516,376 UART: [ldev] FE.KEYID = 1
1,521,462 UART: [ldev] Erasing FE.KEYID = 1
1,546,439 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,254 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,970 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,861 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,573 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,641 UART: [ldev] --
1,585,944 UART: [fwproc] Waiting for Commands...
1,586,741 UART: [fwproc] Received command 0x46574c44
1,587,532 UART: [fwproc] Received Image of size 119428 bytes
2,942,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,388 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,606 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,018 ready_for_fw is high
1,363,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,175 >>> mbox cmd response: success
3,054,808 UART:
3,054,824 UART: Running Caliptra FMC ...
3,055,232 UART:
3,055,375 UART: [state] CFI Enabled
3,066,135 UART: [fht] FMC Alias Private Key: 7
3,184,703 UART: [art] Extend RT PCRs Done
3,185,131 UART: [art] Lock RT PCRs Done
3,186,881 UART: [art] Populate DV Done
3,195,222 UART: [fht] FMC Alias Private Key: 7
3,196,184 UART: [art] Derive CDI
3,196,464 UART: [art] Store in slot 0x4
3,282,166 UART: [art] Derive Key Pair
3,282,526 UART: [art] Store priv key in slot 0x5
3,295,819 UART: [art] Derive Key Pair - Done
3,310,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,960 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,725 UART: [art] PUB.X = 2F586031D81458BAC934A1422746D8569AD0A9857248501863B1D01B924B3C765BB9FFCA186B0B01E1BCB5996E7F57ED
3,333,489 UART: [art] PUB.Y = 4A789E618D0465D1B5A2798A88728364196ACF968AF94A116035AFC66FF3A1270609F9D31BFB6C2FA331D43FC9E38EAD
3,340,436 UART: [art] SIG.R = 57DC7649BFD4AC6A9C8D2B4E244B77D98DD1C152CCFDC257AD78FA9812AF63A1A0C266CE10F501CE15EDCBB9A185E631
3,347,227 UART: [art] SIG.S = 640718B78E3D7F085EB1426085138AAC00C2F5EC2A22586B34FF8F39A3F52ACAB00B39DF32918B906842D9254AB285F0
3,371,200 UART: Caliptra RT
3,371,543 UART: [state] CFI Enabled
3,492,238 UART: [rt] RT listening for mailbox commands...
3,492,901 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,444 UART: [rt]cmd =0x46504c54, len=4
3,523,498 >>> mbox cmd response data (8 bytes)
3,523,859 UART: [rt] FIPS self test
3,524,187 UART: [kat] ++
3,524,339 UART: [kat] sha1
3,528,533 UART: [kat] SHA2-256
3,530,555 UART: [kat] SHA2-384
3,533,206 UART: [kat] SHA2-512-ACC
3,535,133 UART: [kat] ECC-384
3,536,904 UART: Fatal Error: 0x90040004
3,538,443 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,448 >>> mbox cmd response: failed
3,538,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,453 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,192 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,893 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,432 UART: [state] LifecycleState = Unprovisioned
86,087 UART: [state] DebugLocked = No
86,707 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
899,892 UART: [kat] SHA2-256
901,832 UART: [kat] SHA2-384
904,481 UART: [kat] SHA2-512-ACC
906,382 UART: [kat] ECC-384
916,421 UART: [kat] HMAC-384Kdf
921,025 UART: [kat] LMS
1,169,337 UART: [kat] --
1,170,022 UART: [cold-reset] ++
1,170,528 UART: [fht] FHT @ 0x50003400
1,173,176 UART: [idev] ++
1,173,344 UART: [idev] CDI.KEYID = 6
1,173,705 UART: [idev] SUBJECT.KEYID = 7
1,174,130 UART: [idev] UDS.KEYID = 0
1,174,476 ready_for_fw is high
1,174,476 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,047 UART: [idev] Erasing UDS.KEYID = 0
1,199,167 UART: [idev] Sha1 KeyId Algorithm
1,207,991 UART: [idev] --
1,208,994 UART: [ldev] ++
1,209,162 UART: [ldev] CDI.KEYID = 6
1,209,526 UART: [ldev] SUBJECT.KEYID = 5
1,209,953 UART: [ldev] AUTHORITY.KEYID = 7
1,210,416 UART: [ldev] FE.KEYID = 1
1,215,746 UART: [ldev] Erasing FE.KEYID = 1
1,242,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,107 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,823 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,712 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,424 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,440 UART: [ldev] --
1,281,807 UART: [fwproc] Wait for Commands...
1,282,554 UART: [fwproc] Recv command 0x46574c44
1,283,287 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,053 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,228 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,843 >>> mbox cmd response: success
2,840,075 UART: [afmc] ++
2,840,243 UART: [afmc] CDI.KEYID = 6
2,840,606 UART: [afmc] SUBJECT.KEYID = 7
2,841,032 UART: [afmc] AUTHORITY.KEYID = 5
2,876,797 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,098 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,847 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,557 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,438 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,139 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,824 UART: [afmc] --
2,919,637 UART: [cold-reset] --
2,920,649 UART: [state] Locking Datavault
2,921,820 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,424 UART: [state] Locking ICCM
2,922,938 UART: [exit] Launching FMC @ 0x40000130
2,928,268 UART:
2,928,284 UART: Running Caliptra FMC ...
2,928,692 UART:
2,928,746 UART: [state] CFI Enabled
2,939,508 UART: [fht] FMC Alias Private Key: 7
3,057,952 UART: [art] Extend RT PCRs Done
3,058,380 UART: [art] Lock RT PCRs Done
3,059,758 UART: [art] Populate DV Done
3,067,839 UART: [fht] FMC Alias Private Key: 7
3,068,789 UART: [art] Derive CDI
3,069,069 UART: [art] Store in slot 0x4
3,154,654 UART: [art] Derive Key Pair
3,155,014 UART: [art] Store priv key in slot 0x5
3,168,208 UART: [art] Derive Key Pair - Done
3,182,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,827 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,592 UART: [art] PUB.X = E3A3C19485BD7D6DA06D789B85D7CB6641C039003DE10E670CD75E8EEF32FB14C4B240676CCA6CFACA3488B3248AD837
3,205,348 UART: [art] PUB.Y = 5A99916806EA2733E87EFF9832E42A251D2CB35777CFF6599541C92B059F854C01ACEF120701461B915E70B4265435FA
3,212,277 UART: [art] SIG.R = A998CF52F87E7AD299FCB339F28A631F147C850FED78A68E4DE128C58D7D7BAE97F7521DE0A934A7D2D406A298D6F059
3,219,053 UART: [art] SIG.S = A160FF22AB73F0169068E8C6D17BFE3BCFEC05BF9498B43B8B2949F5A5CCF8A38EC6E23AC778F92E83FE301F61A8651F
3,242,748 UART: Caliptra RT
3,242,999 UART: [state] CFI Enabled
3,362,927 UART: [rt] RT listening for mailbox commands...
3,363,590 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,609 UART: [rt]cmd =0x46504c54, len=4
3,394,711 >>> mbox cmd response data (8 bytes)
3,394,922 UART: [rt] FIPS self test
3,395,250 UART: [kat] ++
3,395,402 UART: [kat] sha1
3,399,580 UART: [kat] SHA2-256
3,401,602 UART: [kat] SHA2-384
3,404,401 UART: [kat] SHA2-512-ACC
3,406,328 UART: [kat] ECC-384
3,407,881 UART: Fatal Error: 0x90040004
3,409,420 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,425 >>> mbox cmd response: failed
3,409,425 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,430 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,118 UART: [state] LifecycleState = Unprovisioned
85,773 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,638 UART: [kat] SHA2-256
891,188 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,292 UART: [kat] ++
895,444 UART: [kat] sha1
899,738 UART: [kat] SHA2-256
901,678 UART: [kat] SHA2-384
904,275 UART: [kat] SHA2-512-ACC
906,176 UART: [kat] ECC-384
916,137 UART: [kat] HMAC-384Kdf
920,601 UART: [kat] LMS
1,168,913 UART: [kat] --
1,169,852 UART: [cold-reset] ++
1,170,380 UART: [fht] FHT @ 0x50003400
1,172,892 UART: [idev] ++
1,173,060 UART: [idev] CDI.KEYID = 6
1,173,421 UART: [idev] SUBJECT.KEYID = 7
1,173,846 UART: [idev] UDS.KEYID = 0
1,174,192 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,691 UART: [idev] Erasing UDS.KEYID = 0
1,199,175 UART: [idev] Sha1 KeyId Algorithm
1,208,159 UART: [idev] --
1,209,408 UART: [ldev] ++
1,209,576 UART: [ldev] CDI.KEYID = 6
1,209,940 UART: [ldev] SUBJECT.KEYID = 5
1,210,367 UART: [ldev] AUTHORITY.KEYID = 7
1,210,830 UART: [ldev] FE.KEYID = 1
1,215,964 UART: [ldev] Erasing FE.KEYID = 1
1,241,851 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,458 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,170 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,342 UART: [ldev] --
1,280,597 UART: [fwproc] Wait for Commands...
1,281,358 UART: [fwproc] Recv command 0x46574c44
1,282,091 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,839 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,014 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,515 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,694 ready_for_fw is high
1,058,694 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,750 >>> mbox cmd response: success
2,749,873 UART:
2,749,889 UART: Running Caliptra FMC ...
2,750,297 UART:
2,750,351 UART: [state] CFI Enabled
2,760,723 UART: [fht] FMC Alias Private Key: 7
2,878,725 UART: [art] Extend RT PCRs Done
2,879,153 UART: [art] Lock RT PCRs Done
2,880,393 UART: [art] Populate DV Done
2,888,548 UART: [fht] FMC Alias Private Key: 7
2,889,522 UART: [art] Derive CDI
2,889,802 UART: [art] Store in slot 0x4
2,975,993 UART: [art] Derive Key Pair
2,976,353 UART: [art] Store priv key in slot 0x5
2,989,383 UART: [art] Derive Key Pair - Done
3,004,489 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,019,846 UART: [art] Erasing AUTHORITY.KEYID = 7
3,020,611 UART: [art] PUB.X = 84C0054DCCF91DE7D2489A2F140C9D62B6CC8F761BE37927DE8FE66687E393BF8A718FEC14F2AF7E38628E23174201C4
3,027,380 UART: [art] PUB.Y = C959B27CF268566FCC6D03B17681AA062A1E4F5C65160DAF3F226FE7C5213394E2A8F7C466B3BE23518971762DBFC789
3,034,325 UART: [art] SIG.R = D505239A188C480A6EEE1CC6A862B4E0BABB22D6E3FE42E0D7761AA3C4C35FA920620FFE83CAFDF31B90AAB0330E9593
3,041,103 UART: [art] SIG.S = 0605F3A8645BE823049BD3A31D1E4896FBE8EE2C105AF07C674DCB60A8DB9C7BBACA4D5243D62AE93116D58AE056BADD
3,064,986 UART: Caliptra RT
3,065,237 UART: [state] CFI Enabled
3,185,610 UART: [rt] RT listening for mailbox commands...
3,186,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,192 UART: [rt]cmd =0x46504c54, len=4
3,217,366 >>> mbox cmd response data (8 bytes)
3,217,685 UART: [rt] FIPS self test
3,218,013 UART: [kat] ++
3,218,165 UART: [kat] sha1
3,222,471 UART: [kat] SHA2-256
3,224,493 UART: [kat] SHA2-384
3,227,314 UART: [kat] SHA2-512-ACC
3,229,241 UART: [kat] ECC-384
3,231,028 UART: Fatal Error: 0x90040004
3,232,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,572 >>> mbox cmd response: failed
3,232,572 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,577 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,782 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,742 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.02s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,753 UART: [state] LifecycleState = Unprovisioned
86,408 UART: [state] DebugLocked = No
86,974 UART: [state] WD Timer not started. Device not locked for debugging
88,303 UART: [kat] SHA2-256
891,853 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,957 UART: [kat] ++
896,109 UART: [kat] sha1
900,529 UART: [kat] SHA2-256
902,469 UART: [kat] SHA2-384
905,100 UART: [kat] SHA2-512-ACC
907,001 UART: [kat] ECC-384
917,102 UART: [kat] HMAC-384Kdf
921,690 UART: [kat] LMS
1,170,002 UART: [kat] --
1,170,991 UART: [cold-reset] ++
1,171,529 UART: [fht] FHT @ 0x50003400
1,174,183 UART: [idev] ++
1,174,351 UART: [idev] CDI.KEYID = 6
1,174,712 UART: [idev] SUBJECT.KEYID = 7
1,175,137 UART: [idev] UDS.KEYID = 0
1,175,483 ready_for_fw is high
1,175,483 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,180 UART: [idev] Erasing UDS.KEYID = 0
1,200,258 UART: [idev] Sha1 KeyId Algorithm
1,209,198 UART: [idev] --
1,210,311 UART: [ldev] ++
1,210,479 UART: [ldev] CDI.KEYID = 6
1,210,843 UART: [ldev] SUBJECT.KEYID = 5
1,211,270 UART: [ldev] AUTHORITY.KEYID = 7
1,211,733 UART: [ldev] FE.KEYID = 1
1,217,067 UART: [ldev] Erasing FE.KEYID = 1
1,243,578 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,022 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,339 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,353 UART: [ldev] --
1,282,688 UART: [fwproc] Wait for Commands...
1,283,453 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,729 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,122 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,297 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,864 >>> mbox cmd response: success
2,840,054 UART: [afmc] ++
2,840,222 UART: [afmc] CDI.KEYID = 6
2,840,585 UART: [afmc] SUBJECT.KEYID = 7
2,841,011 UART: [afmc] AUTHORITY.KEYID = 5
2,875,788 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,393 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,852 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,733 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,434 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,127 UART: [afmc] --
2,919,164 UART: [cold-reset] --
2,919,952 UART: [state] Locking Datavault
2,921,123 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,727 UART: [state] Locking ICCM
2,922,271 UART: [exit] Launching FMC @ 0x40000130
2,927,601 UART:
2,927,617 UART: Running Caliptra FMC ...
2,928,025 UART:
2,928,168 UART: [state] CFI Enabled
2,938,900 UART: [fht] FMC Alias Private Key: 7
3,057,502 UART: [art] Extend RT PCRs Done
3,057,930 UART: [art] Lock RT PCRs Done
3,059,532 UART: [art] Populate DV Done
3,067,561 UART: [fht] FMC Alias Private Key: 7
3,068,623 UART: [art] Derive CDI
3,068,903 UART: [art] Store in slot 0x4
3,154,366 UART: [art] Derive Key Pair
3,154,726 UART: [art] Store priv key in slot 0x5
3,168,124 UART: [art] Derive Key Pair - Done
3,183,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,573 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,338 UART: [art] PUB.X = 05948E925336F002C94ABCFDFDA801368784982F6A08BD0FB1708B2ED19881868920CF6C732030DB388EBEF5D047C4E9
3,206,095 UART: [art] PUB.Y = F4E0FF56796442754A56CF484B0FB70AB4CA8316EF22DC5B75DE326C61E2BC90053F69BEF1D5B65F9A7E0B2FCC12BC1C
3,213,053 UART: [art] SIG.R = 0C3C528202EF95DC56FC3ED71B0E2E58787519E8FB86AA8C7B6B3DF6161FF1992772B9FDC6BB113231B8F570869E4A3E
3,219,824 UART: [art] SIG.S = 04BF330F7860ABAF1A8258C51A40A0AF378FD2976C436113D7D9E4191494959AA829408CB08706A102CB2BF6E4A1FDF8
3,243,398 UART: Caliptra RT
3,243,741 UART: [state] CFI Enabled
3,363,731 UART: [rt] RT listening for mailbox commands...
3,364,394 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,091 UART: [rt]cmd =0x46504c54, len=4
3,395,251 >>> mbox cmd response data (8 bytes)
3,395,590 UART: [rt] FIPS self test
3,395,918 UART: [kat] ++
3,396,070 UART: [kat] sha1
3,400,194 UART: [kat] SHA2-256
3,402,216 UART: [kat] SHA2-384
3,404,913 UART: [kat] SHA2-512-ACC
3,406,840 UART: [kat] ECC-384
3,408,393 UART: Fatal Error: 0x90040004
3,409,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,937 >>> mbox cmd response: failed
3,409,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,409,942 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,927 UART: [state] LifecycleState = Unprovisioned
85,582 UART: [state] DebugLocked = No
86,086 UART: [state] WD Timer not started. Device not locked for debugging
87,367 UART: [kat] SHA2-256
890,917 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,021 UART: [kat] ++
895,173 UART: [kat] sha1
899,487 UART: [kat] SHA2-256
901,427 UART: [kat] SHA2-384
904,084 UART: [kat] SHA2-512-ACC
905,985 UART: [kat] ECC-384
915,370 UART: [kat] HMAC-384Kdf
920,068 UART: [kat] LMS
1,168,380 UART: [kat] --
1,169,013 UART: [cold-reset] ++
1,169,515 UART: [fht] FHT @ 0x50003400
1,172,149 UART: [idev] ++
1,172,317 UART: [idev] CDI.KEYID = 6
1,172,678 UART: [idev] SUBJECT.KEYID = 7
1,173,103 UART: [idev] UDS.KEYID = 0
1,173,449 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,212 UART: [idev] Erasing UDS.KEYID = 0
1,198,192 UART: [idev] Sha1 KeyId Algorithm
1,206,960 UART: [idev] --
1,207,789 UART: [ldev] ++
1,207,957 UART: [ldev] CDI.KEYID = 6
1,208,321 UART: [ldev] SUBJECT.KEYID = 5
1,208,748 UART: [ldev] AUTHORITY.KEYID = 7
1,209,211 UART: [ldev] FE.KEYID = 1
1,214,509 UART: [ldev] Erasing FE.KEYID = 1
1,241,320 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,970 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,686 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,575 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,287 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,187 UART: [ldev] --
1,280,572 UART: [fwproc] Wait for Commands...
1,281,185 UART: [fwproc] Recv command 0x46574c44
1,281,918 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,370 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,545 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,102 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,427 ready_for_fw is high
1,060,427 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,989 >>> mbox cmd response: success
2,753,290 UART:
2,753,306 UART: Running Caliptra FMC ...
2,753,714 UART:
2,753,857 UART: [state] CFI Enabled
2,764,683 UART: [fht] FMC Alias Private Key: 7
2,883,521 UART: [art] Extend RT PCRs Done
2,883,949 UART: [art] Lock RT PCRs Done
2,885,715 UART: [art] Populate DV Done
2,894,054 UART: [fht] FMC Alias Private Key: 7
2,895,040 UART: [art] Derive CDI
2,895,320 UART: [art] Store in slot 0x4
2,980,635 UART: [art] Derive Key Pair
2,980,995 UART: [art] Store priv key in slot 0x5
2,994,489 UART: [art] Derive Key Pair - Done
3,009,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,069 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,834 UART: [art] PUB.X = 24272938817EE59BBACCD111EA5CA7ADEFD7354D04AB1941C642D6E9FFD057034B35CD1E5C41E39175A9BE066BAE792F
3,032,611 UART: [art] PUB.Y = 06D3C2F4A4EFEBA33EA38B8FFE4D80C04EEDD0DDAC2A914B1511BA8902795D358D494B17B1391B763ABD32DEE9AB3705
3,039,574 UART: [art] SIG.R = 299ED2E3EDCC54005758403BEBE32C141DBC56046438135E92A8518B4123585A4CE54AB5A6994C6C85E35C6AD2FB684F
3,046,323 UART: [art] SIG.S = 739885BD14E97EC1E99B2C7E6515E8F56BE7CB22D348BCC250A3D47AE5A322D23809C9A2EEF4E3510EBAE54C968C28BE
3,069,569 UART: Caliptra RT
3,069,912 UART: [state] CFI Enabled
3,188,890 UART: [rt] RT listening for mailbox commands...
3,189,553 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,422 UART: [rt]cmd =0x46504c54, len=4
3,220,584 >>> mbox cmd response data (8 bytes)
3,220,791 UART: [rt] FIPS self test
3,221,119 UART: [kat] ++
3,221,271 UART: [kat] sha1
3,225,651 UART: [kat] SHA2-256
3,227,673 UART: [kat] SHA2-384
3,230,400 UART: [kat] SHA2-512-ACC
3,232,327 UART: [kat] ECC-384
3,233,570 UART: Fatal Error: 0x90040004
3,235,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,114 >>> mbox cmd response: failed
3,235,114 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,673 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.76s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,096 UART: [state] LifecycleState = Unprovisioned
85,751 UART: [state] DebugLocked = No
86,481 UART: [state] WD Timer not started. Device not locked for debugging
87,612 UART: [kat] SHA2-256
893,262 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,387 UART: [kat] ++
897,539 UART: [kat] sha1
901,753 UART: [kat] SHA2-256
903,693 UART: [kat] SHA2-384
906,250 UART: [kat] SHA2-512-ACC
908,151 UART: [kat] ECC-384
917,942 UART: [kat] HMAC-384Kdf
922,622 UART: [kat] LMS
1,170,950 UART: [kat] --
1,171,639 UART: [cold-reset] ++
1,172,177 UART: [fht] FHT @ 0x50003400
1,174,872 UART: [idev] ++
1,175,040 UART: [idev] CDI.KEYID = 6
1,175,400 UART: [idev] SUBJECT.KEYID = 7
1,175,824 UART: [idev] UDS.KEYID = 0
1,176,169 ready_for_fw is high
1,176,169 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,754 UART: [idev] Erasing UDS.KEYID = 0
1,201,403 UART: [idev] Sha1 KeyId Algorithm
1,209,875 UART: [idev] --
1,211,001 UART: [ldev] ++
1,211,169 UART: [ldev] CDI.KEYID = 6
1,211,532 UART: [ldev] SUBJECT.KEYID = 5
1,211,958 UART: [ldev] AUTHORITY.KEYID = 7
1,212,421 UART: [ldev] FE.KEYID = 1
1,217,343 UART: [ldev] Erasing FE.KEYID = 1
1,243,846 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,269 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,985 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,876 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,588 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,609 UART: [ldev] --
1,283,120 UART: [fwproc] Wait for Commands...
1,283,896 UART: [fwproc] Recv command 0x46574c44
1,284,624 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,037 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,496 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,159 >>> mbox cmd response: success
2,842,289 UART: [afmc] ++
2,842,457 UART: [afmc] CDI.KEYID = 6
2,842,819 UART: [afmc] SUBJECT.KEYID = 7
2,843,244 UART: [afmc] AUTHORITY.KEYID = 5
2,878,303 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,526 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,118 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,819 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,835 UART: [afmc] --
2,921,891 UART: [cold-reset] --
2,922,711 UART: [state] Locking Datavault
2,923,826 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,430 UART: [state] Locking ICCM
2,924,964 UART: [exit] Launching FMC @ 0x40000130
2,930,294 UART:
2,930,310 UART: Running Caliptra FMC ...
2,930,718 UART:
2,930,772 UART: [state] CFI Enabled
2,941,632 UART: [fht] FMC Alias Private Key: 7
3,061,232 UART: [art] Extend RT PCRs Done
3,061,660 UART: [art] Lock RT PCRs Done
3,062,962 UART: [art] Populate DV Done
3,071,171 UART: [fht] FMC Alias Private Key: 7
3,072,227 UART: [art] Derive CDI
3,072,507 UART: [art] Store in slot 0x4
3,158,350 UART: [art] Derive Key Pair
3,158,710 UART: [art] Store priv key in slot 0x5
3,171,940 UART: [art] Derive Key Pair - Done
3,186,671 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,202,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,203,303 UART: [art] PUB.X = DA110F99FC3BE2AC395DBDA311DC8E13A06A8B0BDAFE25F64DAD06529D8D4DEC5622F5D7CEAF8E159AEC924432543210
3,210,088 UART: [art] PUB.Y = 7FB7831AEAE277B444DBC4AF27B607454DFC0E111AC05970F4AD7D797A6C4BB3DE066B5474E66214FCF69BF1DF4545D4
3,217,045 UART: [art] SIG.R = 5F9FF0552B6B447F7972C6AA18CE102FF193DA9659C74FA6F559FE5C6A310D61C1E6F6230E182802A594F6BFCC6B81DF
3,223,818 UART: [art] SIG.S = 0195D72AE9D5C48D3CB56B4FD0114355643E44A93615DC6DF6A2F52D0D887B737D90FE9857392AE2EE9CCF5ADA72B98C
3,247,786 UART: Caliptra RT
3,248,037 UART: [state] CFI Enabled
3,366,923 UART: [rt] RT listening for mailbox commands...
3,367,586 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,067 UART: [rt]cmd =0x46504c54, len=4
3,398,195 >>> mbox cmd response data (8 bytes)
3,398,508 UART: [rt] FIPS self test
3,398,836 UART: [kat] ++
3,398,988 UART: [kat] sha1
3,403,094 UART: [kat] SHA2-256
3,405,116 UART: [kat] SHA2-384
3,408,005 UART: [kat] SHA2-512-ACC
3,409,932 UART: [kat] ECC-384
3,411,533 UART: Fatal Error: 0x90040004
3,413,072 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,077 >>> mbox cmd response: failed
3,413,077 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,082 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,456 UART: [state] LifecycleState = Unprovisioned
86,111 UART: [state] DebugLocked = No
86,787 UART: [state] WD Timer not started. Device not locked for debugging
88,110 UART: [kat] SHA2-256
893,760 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,885 UART: [kat] ++
898,037 UART: [kat] sha1
902,279 UART: [kat] SHA2-256
904,219 UART: [kat] SHA2-384
906,836 UART: [kat] SHA2-512-ACC
908,737 UART: [kat] ECC-384
918,446 UART: [kat] HMAC-384Kdf
922,896 UART: [kat] LMS
1,171,224 UART: [kat] --
1,171,997 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,052 UART: [idev] ++
1,175,220 UART: [idev] CDI.KEYID = 6
1,175,580 UART: [idev] SUBJECT.KEYID = 7
1,176,004 UART: [idev] UDS.KEYID = 0
1,176,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,886 UART: [idev] Erasing UDS.KEYID = 0
1,200,459 UART: [idev] Sha1 KeyId Algorithm
1,208,813 UART: [idev] --
1,209,919 UART: [ldev] ++
1,210,087 UART: [ldev] CDI.KEYID = 6
1,210,450 UART: [ldev] SUBJECT.KEYID = 5
1,210,876 UART: [ldev] AUTHORITY.KEYID = 7
1,211,339 UART: [ldev] FE.KEYID = 1
1,216,677 UART: [ldev] Erasing FE.KEYID = 1
1,243,204 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,803 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,519 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,410 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,122 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,321 UART: [ldev] --
1,282,606 UART: [fwproc] Wait for Commands...
1,283,242 UART: [fwproc] Recv command 0x46574c44
1,283,970 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,603 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,502 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,672 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,161 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,351 ready_for_fw is high
1,060,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,506 >>> mbox cmd response: success
2,752,383 UART:
2,752,399 UART: Running Caliptra FMC ...
2,752,807 UART:
2,752,861 UART: [state] CFI Enabled
2,763,103 UART: [fht] FMC Alias Private Key: 7
2,882,727 UART: [art] Extend RT PCRs Done
2,883,155 UART: [art] Lock RT PCRs Done
2,884,947 UART: [art] Populate DV Done
2,893,108 UART: [fht] FMC Alias Private Key: 7
2,894,236 UART: [art] Derive CDI
2,894,516 UART: [art] Store in slot 0x4
2,980,181 UART: [art] Derive Key Pair
2,980,541 UART: [art] Store priv key in slot 0x5
2,994,119 UART: [art] Derive Key Pair - Done
3,008,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,880 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,645 UART: [art] PUB.X = B2474FBF78030D233ECECFCFD582B60714B7F2E0DF554663EB95DE2864B65E3D1FB61677A5266D78675561ADFD4811D0
3,031,414 UART: [art] PUB.Y = 1B17FC99E35605EB9B22718E51EDC7E3724D47F17D617CB1E357E484324C2BE422FC02222A07202B6A60589F0D567CE4
3,038,352 UART: [art] SIG.R = D0946713716BC7822D1C3F505D539E71C086E25FF6DFA27E681F32EC5E9A1889A6FB1C4430650C8E017D260FF299D0F6
3,045,115 UART: [art] SIG.S = 633F23B20373CF391E6D01B5E6F57C3F76AABA1D6441C74EFA42439384ED4E1F7A89D56BCF37FD03CC8196C87D53A57C
3,068,804 UART: Caliptra RT
3,069,055 UART: [state] CFI Enabled
3,188,736 UART: [rt] RT listening for mailbox commands...
3,189,399 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,238 UART: [rt]cmd =0x46504c54, len=4
3,220,414 >>> mbox cmd response data (8 bytes)
3,220,769 UART: [rt] FIPS self test
3,221,097 UART: [kat] ++
3,221,249 UART: [kat] sha1
3,225,579 UART: [kat] SHA2-256
3,227,601 UART: [kat] SHA2-384
3,230,342 UART: [kat] SHA2-512-ACC
3,232,269 UART: [kat] ECC-384
3,233,824 UART: Fatal Error: 0x90040004
3,235,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,368 >>> mbox cmd response: failed
3,235,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,648 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,655 UART: [state] LifecycleState = Unprovisioned
86,310 UART: [state] DebugLocked = No
86,948 UART: [state] WD Timer not started. Device not locked for debugging
88,193 UART: [kat] SHA2-256
893,843 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,968 UART: [kat] ++
898,120 UART: [kat] sha1
902,400 UART: [kat] SHA2-256
904,340 UART: [kat] SHA2-384
907,135 UART: [kat] SHA2-512-ACC
909,036 UART: [kat] ECC-384
918,877 UART: [kat] HMAC-384Kdf
923,457 UART: [kat] LMS
1,171,785 UART: [kat] --
1,172,480 UART: [cold-reset] ++
1,172,896 UART: [fht] FHT @ 0x50003400
1,175,383 UART: [idev] ++
1,175,551 UART: [idev] CDI.KEYID = 6
1,175,911 UART: [idev] SUBJECT.KEYID = 7
1,176,335 UART: [idev] UDS.KEYID = 0
1,176,680 ready_for_fw is high
1,176,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,275 UART: [idev] Erasing UDS.KEYID = 0
1,201,690 UART: [idev] Sha1 KeyId Algorithm
1,210,334 UART: [idev] --
1,211,436 UART: [ldev] ++
1,211,604 UART: [ldev] CDI.KEYID = 6
1,211,967 UART: [ldev] SUBJECT.KEYID = 5
1,212,393 UART: [ldev] AUTHORITY.KEYID = 7
1,212,856 UART: [ldev] FE.KEYID = 1
1,217,914 UART: [ldev] Erasing FE.KEYID = 1
1,244,911 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,912 UART: [ldev] --
1,284,357 UART: [fwproc] Wait for Commands...
1,284,931 UART: [fwproc] Recv command 0x46574c44
1,285,659 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,109 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,652 >>> mbox cmd response: success
2,841,700 UART: [afmc] ++
2,841,868 UART: [afmc] CDI.KEYID = 6
2,842,230 UART: [afmc] SUBJECT.KEYID = 7
2,842,655 UART: [afmc] AUTHORITY.KEYID = 5
2,878,354 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,998 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,258 UART: [afmc] --
2,921,364 UART: [cold-reset] --
2,922,156 UART: [state] Locking Datavault
2,923,511 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,115 UART: [state] Locking ICCM
2,924,635 UART: [exit] Launching FMC @ 0x40000130
2,929,965 UART:
2,929,981 UART: Running Caliptra FMC ...
2,930,389 UART:
2,930,532 UART: [state] CFI Enabled
2,940,900 UART: [fht] FMC Alias Private Key: 7
3,059,744 UART: [art] Extend RT PCRs Done
3,060,172 UART: [art] Lock RT PCRs Done
3,061,712 UART: [art] Populate DV Done
3,069,871 UART: [fht] FMC Alias Private Key: 7
3,070,911 UART: [art] Derive CDI
3,071,191 UART: [art] Store in slot 0x4
3,156,918 UART: [art] Derive Key Pair
3,157,278 UART: [art] Store priv key in slot 0x5
3,170,900 UART: [art] Derive Key Pair - Done
3,185,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,177 UART: [art] PUB.X = 1423555B9E61FDF5C782BB552AAF0A4E13D91AAA5D202AB640B884838FADECA553838C5816D905615C510DC23B9EAF55
3,208,948 UART: [art] PUB.Y = BFCC5A13B8313F08383E7FB5665F662C4BF04C6AF41E39DEDE9C5AD021538FAC3128DE0D78B89FADE6681851A3DE6A3A
3,215,912 UART: [art] SIG.R = 158653AE6468213CB5CE48366AF20E8E34C5201793DEB05F8A3478DEEBCA1164E4B1457ECDC75E8705FED93244C1C287
3,222,682 UART: [art] SIG.S = 8331CADFC29E978BEF3FE78C2FF83A0601449A7D2D2E608C80F426CD3C6E4F59ECBE1222D39ADC8686D620AD8A3E1E73
3,246,956 UART: Caliptra RT
3,247,299 UART: [state] CFI Enabled
3,366,962 UART: [rt] RT listening for mailbox commands...
3,367,625 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,454 UART: [rt]cmd =0x46504c54, len=4
3,398,712 >>> mbox cmd response data (8 bytes)
3,398,949 UART: [rt] FIPS self test
3,399,277 UART: [kat] ++
3,399,429 UART: [kat] sha1
3,403,749 UART: [kat] SHA2-256
3,405,771 UART: [kat] SHA2-384
3,408,494 UART: [kat] SHA2-512-ACC
3,410,421 UART: [kat] ECC-384
3,411,818 UART: Fatal Error: 0x90040004
3,413,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,362 >>> mbox cmd response: failed
3,413,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,413,367 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,949 UART: [kat] SHA2-256
893,599 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,724 UART: [kat] ++
897,876 UART: [kat] sha1
902,340 UART: [kat] SHA2-256
904,280 UART: [kat] SHA2-384
906,953 UART: [kat] SHA2-512-ACC
908,854 UART: [kat] ECC-384
918,599 UART: [kat] HMAC-384Kdf
923,459 UART: [kat] LMS
1,171,787 UART: [kat] --
1,172,674 UART: [cold-reset] ++
1,173,164 UART: [fht] FHT @ 0x50003400
1,175,943 UART: [idev] ++
1,176,111 UART: [idev] CDI.KEYID = 6
1,176,471 UART: [idev] SUBJECT.KEYID = 7
1,176,895 UART: [idev] UDS.KEYID = 0
1,177,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,051 UART: [idev] Erasing UDS.KEYID = 0
1,201,824 UART: [idev] Sha1 KeyId Algorithm
1,210,250 UART: [idev] --
1,211,394 UART: [ldev] ++
1,211,562 UART: [ldev] CDI.KEYID = 6
1,211,925 UART: [ldev] SUBJECT.KEYID = 5
1,212,351 UART: [ldev] AUTHORITY.KEYID = 7
1,212,814 UART: [ldev] FE.KEYID = 1
1,217,970 UART: [ldev] Erasing FE.KEYID = 1
1,244,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,089 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,801 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,840 UART: [ldev] --
1,284,325 UART: [fwproc] Wait for Commands...
1,284,929 UART: [fwproc] Recv command 0x46574c44
1,285,657 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,950 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,789 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,959 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,472 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,592 ready_for_fw is high
1,060,592 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,013 >>> mbox cmd response: success
2,754,364 UART:
2,754,380 UART: Running Caliptra FMC ...
2,754,788 UART:
2,754,931 UART: [state] CFI Enabled
2,765,803 UART: [fht] FMC Alias Private Key: 7
2,885,107 UART: [art] Extend RT PCRs Done
2,885,535 UART: [art] Lock RT PCRs Done
2,887,147 UART: [art] Populate DV Done
2,895,328 UART: [fht] FMC Alias Private Key: 7
2,896,382 UART: [art] Derive CDI
2,896,662 UART: [art] Store in slot 0x4
2,982,081 UART: [art] Derive Key Pair
2,982,441 UART: [art] Store priv key in slot 0x5
2,995,593 UART: [art] Derive Key Pair - Done
3,010,590 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,015 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,780 UART: [art] PUB.X = 6BA3338EBD2C1E160D25AB956A97EAAB4769BD7E748923C25DF7CCC692659113A1E7413EE98623D6B587B0AE2067D686
3,033,553 UART: [art] PUB.Y = C6FC29C647051DD8335B365AEE48E76ECAE0910BD9781598C93D55BF8BA83EBBC6A2165F0BD229D8B43F26C2A3DA2C34
3,040,510 UART: [art] SIG.R = BDB017FA901D3322EFA4E52F3EFF7AC05A85F9EF967C1C3BF232D4CF304EB47FA4E8FBBD3099495474C2CB9EA5AFC497
3,047,306 UART: [art] SIG.S = 2AF745B82697A65748F7A47CC8AA217904DB11B7BE957D9F31761C4097C6AE4C115AE27E7AF73ADCBEEE33268596AD38
3,071,397 UART: Caliptra RT
3,071,740 UART: [state] CFI Enabled
3,189,625 UART: [rt] RT listening for mailbox commands...
3,190,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,261 UART: [rt]cmd =0x46504c54, len=4
3,221,573 >>> mbox cmd response data (8 bytes)
3,221,920 UART: [rt] FIPS self test
3,222,248 UART: [kat] ++
3,222,400 UART: [kat] sha1
3,226,620 UART: [kat] SHA2-256
3,228,642 UART: [kat] SHA2-384
3,231,523 UART: [kat] SHA2-512-ACC
3,233,450 UART: [kat] ECC-384
3,235,275 UART: Fatal Error: 0x90040004
3,236,814 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,819 >>> mbox cmd response: failed
3,236,819 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,824 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,513 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,019 writing to cptra_bootfsm_go
5,148,996 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,298,756 >>> mbox cmd response: failed
5,299,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,448,198 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,433,803 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,296,290 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,113 writing to cptra_bootfsm_go
5,153,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,303,067 >>> mbox cmd response: failed
5,303,645 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,452,590 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,431,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,733 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
5,493,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,643,784 >>> mbox cmd response: failed
5,644,338 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,793,238 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
17,847,268 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,548,658 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
5,491,203 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,640,823 >>> mbox cmd response: failed
5,641,382 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,790,335 >>> mbox cmd response: failed
Initializing fuses
991 writing to cptra_bootfsm_go
17,858,531 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,578,142 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,151 writing to cptra_bootfsm_go
5,141,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,291,654 >>> mbox cmd response: failed
5,292,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,441,070 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,431,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,033 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
5,162,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,312,135 >>> mbox cmd response: failed
5,312,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,461,596 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,443,775 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,264,458 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,368 writing to cptra_bootfsm_go
5,502,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,652,347 >>> mbox cmd response: failed
5,652,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,802,989 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
17,840,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,558,739 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
5,495,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,645,276 >>> mbox cmd response: failed
5,645,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,794,705 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
17,853,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,571,034 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,490 >>> mbox cmd response: failed
825,490 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,496 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,189 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,164 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,718 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,726 >>> mbox cmd response: failed
824,726 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,732 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,978 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,243 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,251 >>> mbox cmd response: failed
825,251 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,257 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,057 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,483 >>> mbox cmd response: failed
825,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,489 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,397 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
824,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,912 >>> mbox cmd response: failed
824,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
824,918 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,614 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,544 >>> mbox cmd response: failed
825,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,550 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,424 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,015 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,023 >>> mbox cmd response: failed
826,023 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,029 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,889 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,527 >>> mbox cmd response: failed
825,527 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,533 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,144 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,499 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,066 UART:
192,459 UART: Running Caliptra ROM ...
193,641 UART:
193,798 UART: [state] CFI Enabled
261,947 UART: [state] LifecycleState = Unprovisioned
263,874 UART: [state] DebugLocked = No
265,403 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,700 UART: [kat] SHA2-256
439,389 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,845 UART: [kat] ++
450,367 UART: [kat] sha1
461,885 UART: [kat] SHA2-256
464,616 UART: [kat] SHA2-384
469,827 UART: [kat] SHA2-512-ACC
472,199 UART: [kat] ECC-384
2,765,626 UART: [kat] HMAC-384Kdf
2,799,253 UART: [kat] LMS
3,989,571 UART: [kat] --
3,995,498 UART: [cold-reset] ++
3,996,870 UART: [fht] Storing FHT @ 0x50003400
4,007,647 UART: [idev] ++
4,008,220 UART: [idev] CDI.KEYID = 6
4,009,265 UART: [idev] SUBJECT.KEYID = 7
4,010,448 UART: [idev] UDS.KEYID = 0
4,011,494 ready_for_fw is high
4,011,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,949 UART: [idev] Erasing UDS.KEYID = 0
7,347,892 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,101 UART: [idev] --
7,374,077 UART: [ldev] ++
7,374,649 UART: [ldev] CDI.KEYID = 6
7,375,592 UART: [ldev] SUBJECT.KEYID = 5
7,376,862 UART: [ldev] AUTHORITY.KEYID = 7
7,378,113 UART: [ldev] FE.KEYID = 1
7,421,963 UART: [ldev] Erasing FE.KEYID = 1
10,752,983 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,817 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,064,397 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,079,219 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,753 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,112,533 UART: [ldev] --
13,117,697 UART: [fwproc] Waiting for Commands...
13,119,802 UART: [fwproc] Received command 0x46574c44
13,121,990 UART: [fwproc] Received Image of size 119428 bytes
17,232,612 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,308,231 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,713,834 >>> mbox cmd response: success
17,717,685 UART: [afmc] ++
17,718,347 UART: [afmc] CDI.KEYID = 6
17,719,263 UART: [afmc] SUBJECT.KEYID = 7
17,720,480 UART: [afmc] AUTHORITY.KEYID = 5
21,093,346 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,395,089 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,511 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,424,232 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,634 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,461,455 UART: [afmc] --
23,466,114 UART: [cold-reset] --
23,471,717 UART: [state] Locking Datavault
23,477,284 UART: [state] Locking PCR0, PCR1 and PCR31
23,479,052 UART: [state] Locking ICCM
23,481,372 UART: [exit] Launching FMC @ 0x40000130
23,489,769 UART:
23,490,025 UART: Running Caliptra FMC ...
23,491,138 UART:
23,491,305 UART: [state] CFI Enabled
23,554,790 UART: [fht] FMC Alias Private Key: 7
25,895,164 UART: [art] Extend RT PCRs Done
25,896,411 UART: [art] Lock RT PCRs Done
25,898,037 UART: [art] Populate DV Done
25,903,350 UART: [fht] FMC Alias Private Key: 7
25,904,954 UART: [art] Derive CDI
25,905,776 UART: [art] Store in slot 0x4
25,963,040 UART: [art] Derive Key Pair
25,964,076 UART: [art] Store priv key in slot 0x5
29,256,679 UART: [art] Derive Key Pair - Done
29,269,682 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,858 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,364 UART: [art] PUB.X = ECAFAB1C46AF2ED42954EB3EBECED863E0FE661354275805F630CB69F9350AA4983FCF0E3CD751F4B1CCA1FC472A9833
31,566,672 UART: [art] PUB.Y = DD2E900E5355A8FA8564F7540C4327D736EF3D4C23BACCBAE0524D46321BA138898F690BE66ACC814817FDCED448A05D
31,573,933 UART: [art] SIG.R = 224345690E0F78DFBA58C8FDD4C9EFB2D2066555A4459D78AE413360C8E8EB1CA1D42F2C78340F0D4E43B3A148D1916A
31,581,296 UART: [art] SIG.S = 195C2CDF6600E2FC7BFFA8D0FD5F99CABC4B9B3C5C1B506C130915AE13E73F66042B5BA62149489361C4EFEFB6A10340
32,886,889 UART: Caliptra RT
32,887,608 UART: [state] CFI Enabled
33,064,669 UART: [rt] RT listening for mailbox commands...
33,066,538 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,096,145 UART: [rt]cmd =0x46504c54, len=4
33,097,825 >>> mbox cmd response data (8 bytes)
33,098,970 UART: [rt] FIPS self test
33,099,925 UART: [kat] ++
33,100,383 UART: [kat] sha1
33,104,730 UART: [kat] SHA2-256
33,106,660 UART: [kat] SHA2-384
33,109,457 UART: [kat] SHA2-512-ACC
33,111,751 UART: [kat] ECC-384
36,382,107 UART: Fatal Error: 0x90040005
36,417,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,567,400 >>> mbox cmd response: failed
36,568,065 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,717,973 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
190,119 UART:
190,416 UART: Running Caliptra ROM ...
191,443 UART:
191,584 UART: [state] CFI Enabled
259,505 UART: [state] LifecycleState = Unprovisioned
261,423 UART: [state] DebugLocked = No
264,054 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
268,997 UART: [kat] SHA2-256
438,731 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,243 UART: [kat] ++
449,719 UART: [kat] sha1
460,867 UART: [kat] SHA2-256
463,552 UART: [kat] SHA2-384
469,533 UART: [kat] SHA2-512-ACC
471,936 UART: [kat] ECC-384
2,763,413 UART: [kat] HMAC-384Kdf
2,776,502 UART: [kat] LMS
3,966,823 UART: [kat] --
3,973,210 UART: [cold-reset] ++
3,974,454 UART: [fht] Storing FHT @ 0x50003400
3,985,937 UART: [idev] ++
3,986,504 UART: [idev] CDI.KEYID = 6
3,987,524 UART: [idev] SUBJECT.KEYID = 7
3,988,687 UART: [idev] UDS.KEYID = 0
3,990,306 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,140,447 UART: [idev] Erasing UDS.KEYID = 0
7,321,308 UART: [idev] Using Sha1 for KeyId Algorithm
7,343,274 UART: [idev] --
7,346,185 UART: [ldev] ++
7,346,765 UART: [ldev] CDI.KEYID = 6
7,347,706 UART: [ldev] SUBJECT.KEYID = 5
7,348,928 UART: [ldev] AUTHORITY.KEYID = 7
7,350,218 UART: [ldev] FE.KEYID = 1
7,398,622 UART: [ldev] Erasing FE.KEYID = 1
10,728,434 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,025,875 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,466 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,323 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,069,833 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,087,401 UART: [ldev] --
13,091,880 UART: [fwproc] Waiting for Commands...
13,094,391 UART: [fwproc] Received command 0x46574c44
13,096,589 UART: [fwproc] Received Image of size 119428 bytes
17,222,473 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,301,299 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,374,489 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,705,141 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,785,986 ready_for_fw is high
3,786,622 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,974,427 >>> mbox cmd response: success
23,673,099 UART:
23,673,509 UART: Running Caliptra FMC ...
23,674,663 UART:
23,674,832 UART: [state] CFI Enabled
23,741,540 UART: [fht] FMC Alias Private Key: 7
26,081,607 UART: [art] Extend RT PCRs Done
26,082,834 UART: [art] Lock RT PCRs Done
26,084,436 UART: [art] Populate DV Done
26,089,875 UART: [fht] FMC Alias Private Key: 7
26,091,518 UART: [art] Derive CDI
26,092,266 UART: [art] Store in slot 0x4
26,149,711 UART: [art] Derive Key Pair
26,150,714 UART: [art] Store priv key in slot 0x5
29,443,456 UART: [art] Derive Key Pair - Done
29,456,515 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,058 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,574 UART: [art] PUB.X = 1703B15723C607AB24F81BB1106C7DF5E77ECCE77543D426F55E40F15D04F99E16231F914EA53FDF6832BEC6CEBD3A37
31,754,842 UART: [art] PUB.Y = 3DEE9B46CC56623E93A53A68DB87F409A08E64C4FEBE96E7AF553682410E8FA8301AC9412D603AFE662A94B29E968711
31,762,072 UART: [art] SIG.R = B1DD4BA03F302139762CA920FB8E72EF24C3ECC7A9D1E6BD8962B07409F41A74F1073E612502FC05FB3B59E00C73FF61
31,769,494 UART: [art] SIG.S = 94DD3B550C9D2B9FE2087329257916760C8333C14843DC82942F2F5175E78752A161DC4F171F291093B2A3D8C28C64F1
33,074,741 UART: Caliptra RT
33,075,454 UART: [state] CFI Enabled
33,252,450 UART: [rt] RT listening for mailbox commands...
33,254,335 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,284,259 UART: [rt]cmd =0x46504c54, len=4
33,285,674 >>> mbox cmd response data (8 bytes)
33,286,626 UART: [rt] FIPS self test
33,287,572 UART: [kat] ++
33,288,028 UART: [kat] sha1
33,292,339 UART: [kat] SHA2-256
33,294,265 UART: [kat] SHA2-384
33,297,346 UART: [kat] SHA2-512-ACC
33,299,588 UART: [kat] ECC-384
36,570,755 UART: Fatal Error: 0x90040005
36,606,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,756,080 >>> mbox cmd response: failed
36,756,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,907,045 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,797,892 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,976,108 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,358 writing to cptra_bootfsm_go
192,649 UART:
193,044 UART: Running Caliptra ROM ...
194,186 UART:
603,923 UART: [state] CFI Enabled
619,741 UART: [state] LifecycleState = Unprovisioned
621,745 UART: [state] DebugLocked = No
623,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,336 UART: [kat] SHA2-256
797,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,686 UART: [kat] ++
808,168 UART: [kat] sha1
818,838 UART: [kat] SHA2-256
821,500 UART: [kat] SHA2-384
827,283 UART: [kat] SHA2-512-ACC
829,661 UART: [kat] ECC-384
3,113,427 UART: [kat] HMAC-384Kdf
3,124,535 UART: [kat] LMS
4,314,679 UART: [kat] --
4,319,228 UART: [cold-reset] ++
4,321,601 UART: [fht] Storing FHT @ 0x50003400
4,333,110 UART: [idev] ++
4,333,752 UART: [idev] CDI.KEYID = 6
4,334,647 UART: [idev] SUBJECT.KEYID = 7
4,335,899 UART: [idev] UDS.KEYID = 0
4,337,001 ready_for_fw is high
4,337,256 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,324 UART: [idev] Erasing UDS.KEYID = 0
7,620,229 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,486 UART: [idev] --
7,646,195 UART: [ldev] ++
7,646,782 UART: [ldev] CDI.KEYID = 6
7,647,730 UART: [ldev] SUBJECT.KEYID = 5
7,648,953 UART: [ldev] AUTHORITY.KEYID = 7
7,650,196 UART: [ldev] FE.KEYID = 1
7,660,987 UART: [ldev] Erasing FE.KEYID = 1
10,947,855 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,082 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,671 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,471 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,989 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,360 UART: [ldev] --
13,309,417 UART: [fwproc] Waiting for Commands...
13,311,684 UART: [fwproc] Received command 0x46574c44
13,313,879 UART: [fwproc] Received Image of size 119428 bytes
17,427,080 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,502,687 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,575,820 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,907,166 >>> mbox cmd response: success
17,911,674 UART: [afmc] ++
17,912,271 UART: [afmc] CDI.KEYID = 6
17,913,163 UART: [afmc] SUBJECT.KEYID = 7
17,914,439 UART: [afmc] AUTHORITY.KEYID = 5
21,233,359 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,365 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,620 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,547,011 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,763 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,155 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,155 UART: [afmc] --
23,602,487 UART: [cold-reset] --
23,605,978 UART: [state] Locking Datavault
23,610,533 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,238 UART: [state] Locking ICCM
23,614,776 UART: [exit] Launching FMC @ 0x40000130
23,623,178 UART:
23,623,424 UART: Running Caliptra FMC ...
23,624,536 UART:
23,624,702 UART: [state] CFI Enabled
23,632,287 UART: [fht] FMC Alias Private Key: 7
25,971,964 UART: [art] Extend RT PCRs Done
25,973,276 UART: [art] Lock RT PCRs Done
25,974,835 UART: [art] Populate DV Done
25,980,259 UART: [fht] FMC Alias Private Key: 7
25,981,968 UART: [art] Derive CDI
25,982,712 UART: [art] Store in slot 0x4
26,025,689 UART: [art] Derive Key Pair
26,026,700 UART: [art] Store priv key in slot 0x5
29,268,592 UART: [art] Derive Key Pair - Done
29,281,437 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,840 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,719 UART: [art] PUB.X = 8E3BD8E47035466D237D0501067B31705909D56A4F52802A03CA17FBE6C1110A63049F90012196287A090711E35F402E
31,570,549 UART: [art] PUB.Y = 341673227AFD9E5B10D24D5D81ECD55DFE263D3EBC7F7511BEA7F9D76FD83EFF32989A510891AC74DC4BD0C64593C4DC
31,577,844 UART: [art] SIG.R = A34B7D7875992D6C9B43B97CE29E11BD80248087EF4E41270593DE189015C3AA2A6B9E39F51F75E841910D56B8FB0E96
31,585,196 UART: [art] SIG.S = 4E9F55E9AF8D6B0AFD7D7B0F2B20B9E0CE61752D2DA912E36233E718AB567970793EE906CF16DC74B1AF281770DB1D90
32,890,015 UART: Caliptra RT
32,890,736 UART: [state] CFI Enabled
33,024,559 UART: [rt] RT listening for mailbox commands...
33,026,441 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,055,998 UART: [rt]cmd =0x46504c54, len=4
33,057,532 >>> mbox cmd response data (8 bytes)
33,058,609 UART: [rt] FIPS self test
33,059,572 UART: [kat] ++
33,060,027 UART: [kat] sha1
33,064,442 UART: [kat] SHA2-256
33,066,326 UART: [kat] SHA2-384
33,069,320 UART: [kat] SHA2-512-ACC
33,071,611 UART: [kat] ECC-384
36,310,575 UART: Fatal Error: 0x90040005
36,345,803 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,495,836 >>> mbox cmd response: failed
36,496,508 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,646,459 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,125 UART:
190,414 UART: Running Caliptra ROM ...
191,524 UART:
3,880,073 UART: [state] CFI Enabled
3,895,535 UART: [state] LifecycleState = Unprovisioned
3,897,458 UART: [state] DebugLocked = No
3,900,500 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,905,615 UART: [kat] SHA2-256
4,075,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,085,861 UART: [kat] ++
4,086,325 UART: [kat] sha1
4,098,571 UART: [kat] SHA2-256
4,101,288 UART: [kat] SHA2-384
4,106,690 UART: [kat] SHA2-512-ACC
4,109,052 UART: [kat] ECC-384
6,392,375 UART: [kat] HMAC-384Kdf
6,405,036 UART: [kat] LMS
7,595,146 UART: [kat] --
7,600,235 UART: [cold-reset] ++
7,602,017 UART: [fht] Storing FHT @ 0x50003400
7,612,977 UART: [idev] ++
7,613,553 UART: [idev] CDI.KEYID = 6
7,614,527 UART: [idev] SUBJECT.KEYID = 7
7,615,748 UART: [idev] UDS.KEYID = 0
7,617,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,767,177 UART: [idev] Erasing UDS.KEYID = 0
10,902,644 UART: [idev] Using Sha1 for KeyId Algorithm
10,925,052 UART: [idev] --
10,929,535 UART: [ldev] ++
10,930,117 UART: [ldev] CDI.KEYID = 6
10,931,061 UART: [ldev] SUBJECT.KEYID = 5
10,932,283 UART: [ldev] AUTHORITY.KEYID = 7
10,933,577 UART: [ldev] FE.KEYID = 1
10,945,606 UART: [ldev] Erasing FE.KEYID = 1
14,237,253 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,531,030 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,545,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,560,459 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,574,966 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,593,908 UART: [ldev] --
16,599,321 UART: [fwproc] Waiting for Commands...
16,602,143 UART: [fwproc] Received command 0x46574c44
16,604,341 UART: [fwproc] Received Image of size 119428 bytes
20,728,634 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,806,249 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,879,384 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,211,302 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
4,133,984 ready_for_fw is high
4,134,610 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,191,260 >>> mbox cmd response: success
23,833,406 UART:
23,833,908 UART: Running Caliptra FMC ...
23,835,029 UART:
23,835,199 UART: [state] CFI Enabled
23,842,577 UART: [fht] FMC Alias Private Key: 7
26,182,484 UART: [art] Extend RT PCRs Done
26,183,720 UART: [art] Lock RT PCRs Done
26,185,251 UART: [art] Populate DV Done
26,190,623 UART: [fht] FMC Alias Private Key: 7
26,192,174 UART: [art] Derive CDI
26,193,000 UART: [art] Store in slot 0x4
26,235,612 UART: [art] Derive Key Pair
26,236,640 UART: [art] Store priv key in slot 0x5
29,478,614 UART: [art] Derive Key Pair - Done
29,491,620 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,772,234 UART: [art] Erasing AUTHORITY.KEYID = 7
31,773,752 UART: [art] PUB.X = 8A74BF7DA574D328F155FCCA62BBB0584EA4C29BE777DA3B6769D3764E60F78255901E6C23A545250B68BF2E4724D168
31,781,006 UART: [art] PUB.Y = 399405746C772221C45E1C616CB968825DFBC7EB95517F1E038768CB48166E9C3B51254937EA3AE4A577BC0371838064
31,788,300 UART: [art] SIG.R = 7C133DBEF33B8172705864AB4986E548D3C881EBCE181FB26B3669FC5074AC400F855575C593C1991AA685D8BA3D287D
31,795,654 UART: [art] SIG.S = 3036A066BDAFE028A3EF1139CF77F18C3B3D061DC9CD3A534503724B17C5DF4D276957CBB32DD2588CA8FA970A48F3B4
33,100,639 UART: Caliptra RT
33,101,359 UART: [state] CFI Enabled
33,234,679 UART: [rt] RT listening for mailbox commands...
33,236,555 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,266,469 UART: [rt]cmd =0x46504c54, len=4
33,268,258 >>> mbox cmd response data (8 bytes)
33,269,064 UART: [rt] FIPS self test
33,270,015 UART: [kat] ++
33,270,493 UART: [kat] sha1
33,274,791 UART: [kat] SHA2-256
33,276,727 UART: [kat] SHA2-384
33,279,805 UART: [kat] SHA2-512-ACC
33,282,049 UART: [kat] ECC-384
36,521,375 UART: Fatal Error: 0x90040005
36,556,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,706,577 >>> mbox cmd response: failed
36,707,256 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,857,116 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
7,205,497 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,263,146 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,068 writing to cptra_bootfsm_go
192,215 UART:
192,577 UART: Running Caliptra ROM ...
193,738 UART:
193,888 UART: [state] CFI Enabled
263,094 UART: [state] LifecycleState = Unprovisioned
265,006 UART: [state] DebugLocked = No
267,547 UART: [state] WD Timer not started. Device not locked for debugging
270,693 UART: [kat] SHA2-256
450,314 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,143 UART: [kat] ++
461,686 UART: [kat] sha1
473,639 UART: [kat] SHA2-256
476,364 UART: [kat] SHA2-384
482,287 UART: [kat] SHA2-512-ACC
484,669 UART: [kat] ECC-384
2,950,126 UART: [kat] HMAC-384Kdf
2,971,603 UART: [kat] LMS
3,448,098 UART: [kat] --
3,453,356 UART: [cold-reset] ++
3,455,579 UART: [fht] FHT @ 0x50003400
3,467,512 UART: [idev] ++
3,468,091 UART: [idev] CDI.KEYID = 6
3,469,132 UART: [idev] SUBJECT.KEYID = 7
3,470,314 UART: [idev] UDS.KEYID = 0
3,471,254 ready_for_fw is high
3,471,481 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,748 UART: [idev] Erasing UDS.KEYID = 0
5,987,343 UART: [idev] Sha1 KeyId Algorithm
6,011,187 UART: [idev] --
6,017,728 UART: [ldev] ++
6,018,312 UART: [ldev] CDI.KEYID = 6
6,019,232 UART: [ldev] SUBJECT.KEYID = 5
6,020,452 UART: [ldev] AUTHORITY.KEYID = 7
6,021,690 UART: [ldev] FE.KEYID = 1
6,057,905 UART: [ldev] Erasing FE.KEYID = 1
8,565,512 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,269 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,114 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,981 UART: [ldev] --
10,372,551 UART: [fwproc] Wait for Commands...
10,375,892 UART: [fwproc] Recv command 0x46574c44
10,377,889 UART: [fwproc] Recv'd Img size: 119428 bytes
13,864,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,440 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,477 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,348,628 >>> mbox cmd response: success
14,352,922 UART: [afmc] ++
14,353,515 UART: [afmc] CDI.KEYID = 6
14,354,429 UART: [afmc] SUBJECT.KEYID = 7
14,355,648 UART: [afmc] AUTHORITY.KEYID = 5
16,894,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,636,906 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,095 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,654,896 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,670,957 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,521 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,710,428 UART: [afmc] --
18,714,482 UART: [cold-reset] --
18,718,406 UART: [state] Locking Datavault
18,723,765 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,479 UART: [state] Locking ICCM
18,727,633 UART: [exit] Launching FMC @ 0x40000130
18,736,090 UART:
18,736,338 UART: Running Caliptra FMC ...
18,737,392 UART:
18,737,550 UART: [state] CFI Enabled
18,793,250 UART: [fht] FMC Alias Private Key: 7
20,559,667 UART: [art] Extend RT PCRs Done
20,560,966 UART: [art] Lock RT PCRs Done
20,562,465 UART: [art] Populate DV Done
20,567,997 UART: [fht] FMC Alias Private Key: 7
20,569,644 UART: [art] Derive CDI
20,570,464 UART: [art] Store in slot 0x4
20,625,517 UART: [art] Derive Key Pair
20,626,559 UART: [art] Store priv key in slot 0x5
23,089,098 UART: [art] Derive Key Pair - Done
23,101,869 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,174 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,694 UART: [art] PUB.X = 3892426DC2A0D0868E50FB7D8BFC322DA0D2793E124FAA4B1DD5A1DDAFD53BCF36229412A9EB0E50ED8E6CDD4E1DF5ED
24,823,015 UART: [art] PUB.Y = 32EE0071E9B13E89D5D4761F925FA51AB39A7F537D6D2BF1F98F4E5D8220D16038B3E385D262623F8B9DFEE0EC6DF00E
24,830,266 UART: [art] SIG.R = 1DFEBDC88A9CD2C369793ECACAC9CF1F1A6074F717DAD0BF8CA2C56DB75B8B275D8B00F9DD2DC0086CF4A24D1F386E0B
24,837,667 UART: [art] SIG.S = F0CB08EDA1A25B2F11B4E18B39FC8A892B8E32E919794A06C95A66D3E07365E83D60E0705EBBAE36BAA52BFF0F00A374
25,816,308 UART: Caliptra RT
25,817,023 UART: [state] CFI Enabled
25,997,272 UART: [rt] RT listening for mailbox commands...
25,999,137 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,028,952 UART: [rt]cmd =0x46504c54, len=4
26,030,424 >>> mbox cmd response data (8 bytes)
26,031,332 UART: [rt] FIPS self test
26,032,229 UART: [kat] ++
26,032,732 UART: [kat] sha1
26,037,086 UART: [kat] SHA2-256
26,039,028 UART: [kat] SHA2-384
26,041,848 UART: [kat] SHA2-512-ACC
26,044,146 UART: [kat] ECC-384
28,484,296 UART: Fatal Error: 0x90040005
28,519,542 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,669,567 >>> mbox cmd response: failed
28,670,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,820,123 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,005 UART:
190,305 UART: Running Caliptra ROM ...
191,425 UART:
191,579 UART: [state] CFI Enabled
260,858 UART: [state] LifecycleState = Unprovisioned
262,783 UART: [state] DebugLocked = No
264,759 UART: [state] WD Timer not started. Device not locked for debugging
268,922 UART: [kat] SHA2-256
448,563 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
459,348 UART: [kat] ++
459,896 UART: [kat] sha1
471,430 UART: [kat] SHA2-256
474,134 UART: [kat] SHA2-384
479,530 UART: [kat] SHA2-512-ACC
481,927 UART: [kat] ECC-384
2,939,595 UART: [kat] HMAC-384Kdf
2,962,315 UART: [kat] LMS
3,438,802 UART: [kat] --
3,443,770 UART: [cold-reset] ++
3,445,973 UART: [fht] FHT @ 0x50003400
3,458,462 UART: [idev] ++
3,459,033 UART: [idev] CDI.KEYID = 6
3,459,984 UART: [idev] SUBJECT.KEYID = 7
3,461,199 UART: [idev] UDS.KEYID = 0
3,462,936 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,613,126 UART: [idev] Erasing UDS.KEYID = 0
5,979,694 UART: [idev] Sha1 KeyId Algorithm
6,004,420 UART: [idev] --
6,009,366 UART: [ldev] ++
6,009,944 UART: [ldev] CDI.KEYID = 6
6,010,863 UART: [ldev] SUBJECT.KEYID = 5
6,012,087 UART: [ldev] AUTHORITY.KEYID = 7
6,013,335 UART: [ldev] FE.KEYID = 1
6,050,502 UART: [ldev] Erasing FE.KEYID = 1
8,556,456 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,293,465 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,309,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,325,211 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,340,767 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,116 UART: [ldev] --
10,368,292 UART: [fwproc] Wait for Commands...
10,370,180 UART: [fwproc] Recv command 0x46574c44
10,372,172 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,528 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,558 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,356,298 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
3,463,441 ready_for_fw is high
3,463,870 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,262,602 >>> mbox cmd response: success
18,555,108 UART:
18,555,517 UART: Running Caliptra FMC ...
18,556,677 UART:
18,556,846 UART: [state] CFI Enabled
18,626,546 UART: [fht] FMC Alias Private Key: 7
20,392,724 UART: [art] Extend RT PCRs Done
20,393,960 UART: [art] Lock RT PCRs Done
20,395,323 UART: [art] Populate DV Done
20,400,765 UART: [fht] FMC Alias Private Key: 7
20,402,314 UART: [art] Derive CDI
20,403,135 UART: [art] Store in slot 0x4
20,459,547 UART: [art] Derive Key Pair
20,460,605 UART: [art] Store priv key in slot 0x5
22,923,519 UART: [art] Derive Key Pair - Done
22,936,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,650,752 UART: [art] Erasing AUTHORITY.KEYID = 7
24,652,241 UART: [art] PUB.X = F3A36F96F19250BAEA35F31DE2A6B81F90A9E39D07886C7508EC544A324AEF0FE46A814C88D026B5F98D463CD95F0D42
24,659,513 UART: [art] PUB.Y = CBA84851B6AF319F3DF9AFBF7DC07163223D132716CB1EC9757A0FDFC8B931383604EA359DD32D7B8C4C16D70E85DA8B
24,666,794 UART: [art] SIG.R = 7B69C39767C9B22D55A50E745459ED07AF02DC69EF900BE77B869550757F064AD735A93E1E9B22547F596FB3004150B0
24,674,120 UART: [art] SIG.S = B05A1C394E6BF12193959B60F5A637E0D4B1B711EF3AC67606937B08A207CB0E5F579092C3FA7DF1B516D6EDCE46DC10
25,653,186 UART: Caliptra RT
25,653,902 UART: [state] CFI Enabled
25,833,445 UART: [rt] RT listening for mailbox commands...
25,835,306 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,865,271 UART: [rt]cmd =0x46504c54, len=4
25,866,836 >>> mbox cmd response data (8 bytes)
25,867,956 UART: [rt] FIPS self test
25,868,909 UART: [kat] ++
25,869,387 UART: [kat] sha1
25,873,741 UART: [kat] SHA2-256
25,875,624 UART: [kat] SHA2-384
25,878,485 UART: [kat] SHA2-512-ACC
25,880,781 UART: [kat] ECC-384
28,321,347 UART: Fatal Error: 0x90040005
28,356,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,506,804 >>> mbox cmd response: failed
28,507,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,657,386 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,452,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,244,819 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
192,488 UART:
192,879 UART: Running Caliptra ROM ...
194,047 UART:
603,499 UART: [state] CFI Enabled
617,320 UART: [state] LifecycleState = Unprovisioned
619,280 UART: [state] DebugLocked = No
620,474 UART: [state] WD Timer not started. Device not locked for debugging
623,613 UART: [kat] SHA2-256
803,258 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,041 UART: [kat] ++
814,503 UART: [kat] sha1
825,169 UART: [kat] SHA2-256
827,854 UART: [kat] SHA2-384
834,989 UART: [kat] SHA2-512-ACC
837,301 UART: [kat] ECC-384
3,280,820 UART: [kat] HMAC-384Kdf
3,293,554 UART: [kat] LMS
3,770,004 UART: [kat] --
3,774,859 UART: [cold-reset] ++
3,777,152 UART: [fht] FHT @ 0x50003400
3,788,701 UART: [idev] ++
3,789,277 UART: [idev] CDI.KEYID = 6
3,790,318 UART: [idev] SUBJECT.KEYID = 7
3,791,498 UART: [idev] UDS.KEYID = 0
3,792,429 ready_for_fw is high
3,792,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,696 UART: [idev] Erasing UDS.KEYID = 0
6,265,695 UART: [idev] Sha1 KeyId Algorithm
6,290,178 UART: [idev] --
6,296,365 UART: [ldev] ++
6,296,946 UART: [ldev] CDI.KEYID = 6
6,297,860 UART: [ldev] SUBJECT.KEYID = 5
6,299,080 UART: [ldev] AUTHORITY.KEYID = 7
6,300,318 UART: [ldev] FE.KEYID = 1
6,310,322 UART: [ldev] Erasing FE.KEYID = 1
8,789,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,803 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,190 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,241 UART: [ldev] --
10,583,158 UART: [fwproc] Wait for Commands...
10,585,809 UART: [fwproc] Recv command 0x46574c44
10,587,800 UART: [fwproc] Recv'd Img size: 119428 bytes
14,078,752 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,071 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,102 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,562,319 >>> mbox cmd response: success
14,565,740 UART: [afmc] ++
14,566,330 UART: [afmc] CDI.KEYID = 6
14,567,221 UART: [afmc] SUBJECT.KEYID = 7
14,568,445 UART: [afmc] AUTHORITY.KEYID = 5
17,078,156 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,163 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,402 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,223 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,255 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,890 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,782 UART: [afmc] --
18,879,328 UART: [cold-reset] --
18,883,376 UART: [state] Locking Datavault
18,888,145 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,912 UART: [state] Locking ICCM
18,892,278 UART: [exit] Launching FMC @ 0x40000130
18,900,683 UART:
18,900,921 UART: Running Caliptra FMC ...
18,902,031 UART:
18,902,194 UART: [state] CFI Enabled
18,910,521 UART: [fht] FMC Alias Private Key: 7
20,677,415 UART: [art] Extend RT PCRs Done
20,678,770 UART: [art] Lock RT PCRs Done
20,680,346 UART: [art] Populate DV Done
20,685,924 UART: [fht] FMC Alias Private Key: 7
20,687,629 UART: [art] Derive CDI
20,688,445 UART: [art] Store in slot 0x4
20,730,825 UART: [art] Derive Key Pair
20,731,850 UART: [art] Store priv key in slot 0x5
23,158,197 UART: [art] Derive Key Pair - Done
23,171,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,944 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,503 UART: [art] PUB.X = 820605634DE6BC7F5B08DE231D50D6E7C8099B890080349AB0B321F0FD8473F3C93F19C0C97275F86B05BB5BDD4F5CCF
24,886,691 UART: [art] PUB.Y = 683C997CFB1B05E0AC72AF3FAB4F154E0591886B8E884D162F6BCA5EE1E368D77D482B0177B935D6DCA1F4A5C09E26A8
24,893,954 UART: [art] SIG.R = 7F4FD421A2F36FC35669FE1BABEF908FF2315A1F255F63F950B399E8BD65D34BCC586B89FDB955D50D0B7F184462DFC0
24,901,388 UART: [art] SIG.S = 88D5CBDBF1218FA839EAC97F0A3BF1676B78B69A17E5E1D375E7C571A5BADC43F0684571EF57B55D02101FC0AE0BFC39
25,880,166 UART: Caliptra RT
25,880,883 UART: [state] CFI Enabled
26,012,919 UART: [rt] RT listening for mailbox commands...
26,014,770 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,044,425 UART: [rt]cmd =0x46504c54, len=4
26,045,938 >>> mbox cmd response data (8 bytes)
26,047,280 UART: [rt] FIPS self test
26,048,239 UART: [kat] ++
26,048,716 UART: [kat] sha1
26,053,056 UART: [kat] SHA2-256
26,054,997 UART: [kat] SHA2-384
26,058,128 UART: [kat] SHA2-512-ACC
26,060,371 UART: [kat] ECC-384
28,484,296 UART: Fatal Error: 0x90040005
28,519,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,669,506 >>> mbox cmd response: failed
28,670,151 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,820,092 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,098 UART:
190,397 UART: Running Caliptra ROM ...
191,428 UART:
11,715,282 UART: [state] CFI Enabled
11,729,764 UART: [state] LifecycleState = Unprovisioned
11,731,695 UART: [state] DebugLocked = No
11,733,474 UART: [state] WD Timer not started. Device not locked for debugging
11,737,012 UART: [kat] SHA2-256
11,916,646 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,927,445 UART: [kat] ++
11,927,948 UART: [kat] sha1
11,937,431 UART: [kat] SHA2-256
11,940,006 UART: [kat] SHA2-384
11,945,797 UART: [kat] SHA2-512-ACC
11,948,160 UART: [kat] ECC-384
14,390,410 UART: [kat] HMAC-384Kdf
14,403,448 UART: [kat] LMS
14,879,909 UART: [kat] --
14,884,978 UART: [cold-reset] ++
14,886,535 UART: [fht] FHT @ 0x50003400
14,897,802 UART: [idev] ++
14,898,416 UART: [idev] CDI.KEYID = 6
14,899,336 UART: [idev] SUBJECT.KEYID = 7
14,900,561 UART: [idev] UDS.KEYID = 0
14,902,162 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,051,972 UART: [idev] Erasing UDS.KEYID = 0
17,381,217 UART: [idev] Sha1 KeyId Algorithm
17,405,098 UART: [idev] --
17,410,067 UART: [ldev] ++
17,410,697 UART: [ldev] CDI.KEYID = 6
17,411,605 UART: [ldev] SUBJECT.KEYID = 5
17,412,820 UART: [ldev] AUTHORITY.KEYID = 7
17,414,052 UART: [ldev] FE.KEYID = 1
17,425,242 UART: [ldev] Erasing FE.KEYID = 1
19,908,926 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,629,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,645,564 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,661,385 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,676,921 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,698,074 UART: [ldev] --
21,704,192 UART: [fwproc] Wait for Commands...
21,706,789 UART: [fwproc] Recv command 0x46574c44
21,708,782 UART: [fwproc] Recv'd Img size: 119428 bytes
25,205,408 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,283,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,356,652 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,687,993 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,779,973 ready_for_fw is high
3,780,445 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,443,497 >>> mbox cmd response: success
18,699,349 UART:
18,699,749 UART: Running Caliptra FMC ...
18,700,957 UART:
18,701,136 UART: [state] CFI Enabled
18,709,101 UART: [fht] FMC Alias Private Key: 7
20,474,583 UART: [art] Extend RT PCRs Done
20,475,818 UART: [art] Lock RT PCRs Done
20,477,184 UART: [art] Populate DV Done
20,482,461 UART: [fht] FMC Alias Private Key: 7
20,484,007 UART: [art] Derive CDI
20,484,782 UART: [art] Store in slot 0x4
20,527,651 UART: [art] Derive Key Pair
20,528,690 UART: [art] Store priv key in slot 0x5
22,955,980 UART: [art] Derive Key Pair - Done
22,969,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,675,529 UART: [art] Erasing AUTHORITY.KEYID = 7
24,677,052 UART: [art] PUB.X = 1E0C67904954917309160273D2B9E6395F0FCA113F67F1B9A48756462F0E6C1A317BC8D3C4FDFA7620A54ED544AEEAF5
24,684,315 UART: [art] PUB.Y = 7A991238DE65E8E4C359EF6703DE4C0DA260B6BBFED164170EC3153D102F27D0C66A64E7BAD361365D5446381BFBD428
24,691,565 UART: [art] SIG.R = 00BFA841DA76F8CE0A2396367853AEE114C78DED231B9CE662410B293CD1D63AAA398479361E8D749C38AEEA073D189C
24,698,924 UART: [art] SIG.S = 630BBDC1F1D518D9EE599358809EFB1C1A5F9039566684E504B077D9DB41C01B2ED66AB8C20C9B6697C413C9770D0744
25,677,444 UART: Caliptra RT
25,678,149 UART: [state] CFI Enabled
25,811,208 UART: [rt] RT listening for mailbox commands...
25,813,062 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,842,744 UART: [rt]cmd =0x46504c54, len=4
25,844,379 >>> mbox cmd response data (8 bytes)
25,845,641 UART: [rt] FIPS self test
25,846,589 UART: [kat] ++
25,847,048 UART: [kat] sha1
25,851,509 UART: [kat] SHA2-256
25,853,429 UART: [kat] SHA2-384
25,856,276 UART: [kat] SHA2-512-ACC
25,858,527 UART: [kat] ECC-384
28,282,423 UART: Fatal Error: 0x90040005
28,317,674 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,467,706 >>> mbox cmd response: failed
28,468,308 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,618,233 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
15,081,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,763,255 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,329 UART:
192,697 UART: Running Caliptra ROM ...
193,840 UART:
193,995 UART: [state] CFI Enabled
262,189 UART: [state] LifecycleState = Unprovisioned
264,536 UART: [state] DebugLocked = No
266,860 UART: [state] WD Timer not started. Device not locked for debugging
270,910 UART: [kat] SHA2-256
460,788 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,595 UART: [kat] ++
472,045 UART: [kat] sha1
483,633 UART: [kat] SHA2-256
486,651 UART: [kat] SHA2-384
491,747 UART: [kat] SHA2-512-ACC
494,375 UART: [kat] ECC-384
2,945,703 UART: [kat] HMAC-384Kdf
2,968,040 UART: [kat] LMS
3,499,786 UART: [kat] --
3,506,486 UART: [cold-reset] ++
3,508,211 UART: [fht] FHT @ 0x50003400
3,519,476 UART: [idev] ++
3,520,125 UART: [idev] CDI.KEYID = 6
3,521,165 UART: [idev] SUBJECT.KEYID = 7
3,522,276 UART: [idev] UDS.KEYID = 0
3,523,236 ready_for_fw is high
3,523,476 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,741 UART: [idev] Erasing UDS.KEYID = 0
6,024,790 UART: [idev] Sha1 KeyId Algorithm
6,046,910 UART: [idev] --
6,050,370 UART: [ldev] ++
6,051,064 UART: [ldev] CDI.KEYID = 6
6,051,985 UART: [ldev] SUBJECT.KEYID = 5
6,053,153 UART: [ldev] AUTHORITY.KEYID = 7
6,054,394 UART: [ldev] FE.KEYID = 1
6,097,397 UART: [ldev] Erasing FE.KEYID = 1
8,601,987 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,600 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,755 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,873 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,207 UART: [ldev] --
10,408,434 UART: [fwproc] Wait for Commands...
10,410,001 UART: [fwproc] Recv command 0x46574c44
10,412,328 UART: [fwproc] Recv'd Img size: 119428 bytes
13,917,323 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,991,836 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,115,451 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,681,151 >>> mbox cmd response: success
14,685,777 UART: [afmc] ++
14,686,483 UART: [afmc] CDI.KEYID = 6
14,687,671 UART: [afmc] SUBJECT.KEYID = 7
14,689,169 UART: [afmc] AUTHORITY.KEYID = 5
17,230,961 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,954,256 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,956,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,971,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,986,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,001,343 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,025,912 UART: [afmc] --
19,030,372 UART: [cold-reset] --
19,034,619 UART: [state] Locking Datavault
19,040,305 UART: [state] Locking PCR0, PCR1 and PCR31
19,042,455 UART: [state] Locking ICCM
19,043,832 UART: [exit] Launching FMC @ 0x40000130
19,052,505 UART:
19,052,785 UART: Running Caliptra FMC ...
19,053,827 UART:
19,053,981 UART: [state] CFI Enabled
19,110,079 UART: [fht] FMC Alias Private Key: 7
20,876,867 UART: [art] Extend RT PCRs Done
20,878,089 UART: [art] Lock RT PCRs Done
20,880,126 UART: [art] Populate DV Done
20,885,617 UART: [fht] FMC Alias Private Key: 7
20,887,172 UART: [art] Derive CDI
20,887,914 UART: [art] Store in slot 0x4
20,942,687 UART: [art] Derive Key Pair
20,943,731 UART: [art] Store priv key in slot 0x5
23,406,045 UART: [art] Derive Key Pair - Done
23,419,271 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,131,021 UART: [art] Erasing AUTHORITY.KEYID = 7
25,132,533 UART: [art] PUB.X = 2ADE62C6195DF3F26EB47139AA8F99FCFD58D6D3D757D8B5A8EB00C6E35860706CDF86E6EE082E3BA603450FD438545B
25,139,793 UART: [art] PUB.Y = A9ABDB8CAFDA5B5A632CAF07725DB0ABB55ADD351935097A32FCA24B3E72FC50D5BE46FA42719FF62FCA584CB2E88BC5
25,147,096 UART: [art] SIG.R = 43C201F6EB5FE62162DFF7704985C73A4BC3AE11A8C546913A5109580FD9B1DC7DBEA169CFBD3838C819D2CF3B5F0095
25,154,451 UART: [art] SIG.S = AA0BA0154C1C976E5D635F43239D761DBE9B18059E939323CD26EAEBCAC64D44D2AED7F081B1E92D7CCAB599CBF723FD
26,133,396 UART: Caliptra RT
26,134,093 UART: [state] CFI Enabled
26,314,540 UART: [rt] RT listening for mailbox commands...
26,316,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,161 UART: [rt]cmd =0x46504c54, len=4
26,347,833 >>> mbox cmd response data (8 bytes)
26,348,909 UART: [rt] FIPS self test
26,349,860 UART: [kat] ++
26,350,319 UART: [kat] sha1
26,354,618 UART: [kat] SHA2-256
26,356,553 UART: [kat] SHA2-384
26,359,498 UART: [kat] SHA2-512-ACC
26,361,748 UART: [kat] ECC-384
28,802,195 UART: Fatal Error: 0x90040005
28,837,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,987,704 >>> mbox cmd response: failed
28,988,317 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,138,205 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,055 UART:
190,351 UART: Running Caliptra ROM ...
191,383 UART:
191,529 UART: [state] CFI Enabled
257,795 UART: [state] LifecycleState = Unprovisioned
260,199 UART: [state] DebugLocked = No
263,012 UART: [state] WD Timer not started. Device not locked for debugging
267,507 UART: [kat] SHA2-256
457,426 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,181 UART: [kat] ++
468,629 UART: [kat] sha1
478,421 UART: [kat] SHA2-256
481,410 UART: [kat] SHA2-384
487,513 UART: [kat] SHA2-512-ACC
490,074 UART: [kat] ECC-384
2,938,421 UART: [kat] HMAC-384Kdf
2,963,304 UART: [kat] LMS
3,495,079 UART: [kat] --
3,499,517 UART: [cold-reset] ++
3,501,187 UART: [fht] FHT @ 0x50003400
3,514,068 UART: [idev] ++
3,514,801 UART: [idev] CDI.KEYID = 6
3,515,725 UART: [idev] SUBJECT.KEYID = 7
3,516,952 UART: [idev] UDS.KEYID = 0
3,518,465 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,668,417 UART: [idev] Erasing UDS.KEYID = 0
6,020,401 UART: [idev] Sha1 KeyId Algorithm
6,042,452 UART: [idev] --
6,046,888 UART: [ldev] ++
6,047,581 UART: [ldev] CDI.KEYID = 6
6,048,501 UART: [ldev] SUBJECT.KEYID = 5
6,049,670 UART: [ldev] AUTHORITY.KEYID = 7
6,050,928 UART: [ldev] FE.KEYID = 1
6,090,642 UART: [ldev] Erasing FE.KEYID = 1
8,597,919 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,148 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,347,323 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,362,567 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,377,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,397,838 UART: [ldev] --
10,402,741 UART: [fwproc] Wait for Commands...
10,404,410 UART: [fwproc] Recv command 0x46574c44
10,406,726 UART: [fwproc] Recv'd Img size: 119428 bytes
13,916,368 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,514 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,687,219 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,994 writing to cptra_bootfsm_go
3,441,426 ready_for_fw is high
3,441,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,863,279 >>> mbox cmd response: success
19,166,287 UART:
19,166,715 UART: Running Caliptra FMC ...
19,167,864 UART:
19,168,037 UART: [state] CFI Enabled
19,233,352 UART: [fht] FMC Alias Private Key: 7
20,999,576 UART: [art] Extend RT PCRs Done
21,000,806 UART: [art] Lock RT PCRs Done
21,002,556 UART: [art] Populate DV Done
21,008,379 UART: [fht] FMC Alias Private Key: 7
21,010,092 UART: [art] Derive CDI
21,010,918 UART: [art] Store in slot 0x4
21,065,263 UART: [art] Derive Key Pair
21,066,300 UART: [art] Store priv key in slot 0x5
23,529,425 UART: [art] Derive Key Pair - Done
23,542,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,254,369 UART: [art] Erasing AUTHORITY.KEYID = 7
25,255,876 UART: [art] PUB.X = 0DE6B1C3B4F1B887D87AE7DAC6E5C42612F79FCA70506F78D7660FF1D989D65707E0F97BB6ED655B80189E11DA1C9366
25,263,108 UART: [art] PUB.Y = A2F2FAB500F718CAE263BE94CD0FDE8F971F2ADA198116571AA38F19C4A93B5DE21642D34CCFEC057BB6D958E67145FD
25,270,385 UART: [art] SIG.R = 2C153902F56A7E7A37021860F2B8836A22B3AE5D4A0CF7C262DF14FC36058B441CCCEC93D0F63C28288CD2DED7864B75
25,277,764 UART: [art] SIG.S = D0FC6726030F79728FC38DA7E7CB6E05F50CAEF5FEB116C99801D6648EFD0252B7D0349FD9DE699BD0ED914A863C9CBB
26,256,295 UART: Caliptra RT
26,256,994 UART: [state] CFI Enabled
26,437,809 UART: [rt] RT listening for mailbox commands...
26,439,664 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,469,427 UART: [rt]cmd =0x46504c54, len=4
26,471,063 >>> mbox cmd response data (8 bytes)
26,472,226 UART: [rt] FIPS self test
26,473,174 UART: [kat] ++
26,473,649 UART: [kat] sha1
26,477,815 UART: [kat] SHA2-256
26,479,707 UART: [kat] SHA2-384
26,482,564 UART: [kat] SHA2-512-ACC
26,484,805 UART: [kat] ECC-384
28,926,218 UART: Fatal Error: 0x90040005
28,961,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,111,425 >>> mbox cmd response: failed
29,112,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,262,619 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,433,357 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,839,232 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
192,512 UART:
192,877 UART: Running Caliptra ROM ...
194,080 UART:
603,602 UART: [state] CFI Enabled
618,550 UART: [state] LifecycleState = Unprovisioned
620,571 UART: [state] DebugLocked = No
623,233 UART: [state] WD Timer not started. Device not locked for debugging
626,911 UART: [kat] SHA2-256
816,577 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,390 UART: [kat] ++
827,918 UART: [kat] sha1
839,297 UART: [kat] SHA2-256
842,312 UART: [kat] SHA2-384
847,387 UART: [kat] SHA2-512-ACC
849,979 UART: [kat] ECC-384
3,289,095 UART: [kat] HMAC-384Kdf
3,300,761 UART: [kat] LMS
3,832,582 UART: [kat] --
3,837,004 UART: [cold-reset] ++
3,838,950 UART: [fht] FHT @ 0x50003400
3,850,727 UART: [idev] ++
3,851,373 UART: [idev] CDI.KEYID = 6
3,852,417 UART: [idev] SUBJECT.KEYID = 7
3,853,525 UART: [idev] UDS.KEYID = 0
3,854,476 ready_for_fw is high
3,854,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,004,738 UART: [idev] Erasing UDS.KEYID = 0
6,328,546 UART: [idev] Sha1 KeyId Algorithm
6,351,530 UART: [idev] --
6,356,936 UART: [ldev] ++
6,357,629 UART: [ldev] CDI.KEYID = 6
6,358,557 UART: [ldev] SUBJECT.KEYID = 5
6,359,720 UART: [ldev] AUTHORITY.KEYID = 7
6,360,962 UART: [ldev] FE.KEYID = 1
6,373,449 UART: [ldev] Erasing FE.KEYID = 1
8,851,927 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,569,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,901 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,600,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,615,247 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,496 UART: [ldev] --
10,641,104 UART: [fwproc] Wait for Commands...
10,643,806 UART: [fwproc] Recv command 0x46574c44
10,646,077 UART: [fwproc] Recv'd Img size: 119428 bytes
14,162,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,246,573 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,370,200 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,935,886 >>> mbox cmd response: success
14,939,689 UART: [afmc] ++
14,940,396 UART: [afmc] CDI.KEYID = 6
14,941,593 UART: [afmc] SUBJECT.KEYID = 7
14,943,037 UART: [afmc] AUTHORITY.KEYID = 5
17,447,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,170,402 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,172,368 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,187,454 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,202,626 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,217,533 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,240,671 UART: [afmc] --
19,244,322 UART: [cold-reset] --
19,248,619 UART: [state] Locking Datavault
19,252,628 UART: [state] Locking PCR0, PCR1 and PCR31
19,254,831 UART: [state] Locking ICCM
19,256,772 UART: [exit] Launching FMC @ 0x40000130
19,265,399 UART:
19,265,685 UART: Running Caliptra FMC ...
19,266,720 UART:
19,266,874 UART: [state] CFI Enabled
19,275,383 UART: [fht] FMC Alias Private Key: 7
21,041,344 UART: [art] Extend RT PCRs Done
21,042,568 UART: [art] Lock RT PCRs Done
21,044,230 UART: [art] Populate DV Done
21,049,594 UART: [fht] FMC Alias Private Key: 7
21,051,102 UART: [art] Derive CDI
21,051,842 UART: [art] Store in slot 0x4
21,094,924 UART: [art] Derive Key Pair
21,095,928 UART: [art] Store priv key in slot 0x5
23,523,032 UART: [art] Derive Key Pair - Done
23,535,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,242,092 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,607 UART: [art] PUB.X = 8EDCDA764B833CA487BF7E0B4B970B8954B6ACFFCBBB18913BB9A40A4F7396BE7D7EBB2AA5C22D140B1B0B0EC6B0B733
25,250,943 UART: [art] PUB.Y = 9D35367D6CA80FAF8DD4188A845AC15282B174E5616C6CFBAB027968E4C74B551EFCD60EA74833F5AC3F878A0B1ECEA1
25,258,209 UART: [art] SIG.R = 52F01361B0CF03A3257C5934ABA457ABA8B6B34B0C6FCC02AC2D39ADD39E5004810065E56772558F51BCE2B402776CE8
25,265,610 UART: [art] SIG.S = 4BD7F870AD2FD25E17194A19B52E5A53515F9558FDAADB7DF8ED28968DE1FEF6757F95BCD27FB46EE455E6A9E0536CCD
26,244,312 UART: Caliptra RT
26,245,016 UART: [state] CFI Enabled
26,378,717 UART: [rt] RT listening for mailbox commands...
26,380,567 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,410,409 UART: [rt]cmd =0x46504c54, len=4
26,412,204 >>> mbox cmd response data (8 bytes)
26,413,229 UART: [rt] FIPS self test
26,414,169 UART: [kat] ++
26,414,667 UART: [kat] sha1
26,418,931 UART: [kat] SHA2-256
26,420,866 UART: [kat] SHA2-384
26,423,886 UART: [kat] SHA2-512-ACC
26,426,129 UART: [kat] ECC-384
28,849,975 UART: Fatal Error: 0x90040005
28,885,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,035,355 >>> mbox cmd response: failed
29,035,986 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,185,872 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,044 UART:
190,357 UART: Running Caliptra ROM ...
191,389 UART:
11,336,781 UART: [state] CFI Enabled
11,351,598 UART: [state] LifecycleState = Unprovisioned
11,354,006 UART: [state] DebugLocked = No
11,356,077 UART: [state] WD Timer not started. Device not locked for debugging
11,361,290 UART: [kat] SHA2-256
11,551,189 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,561,935 UART: [kat] ++
11,562,454 UART: [kat] sha1
11,574,966 UART: [kat] SHA2-256
11,577,984 UART: [kat] SHA2-384
11,582,573 UART: [kat] SHA2-512-ACC
11,585,145 UART: [kat] ECC-384
14,026,735 UART: [kat] HMAC-384Kdf
14,040,107 UART: [kat] LMS
14,571,940 UART: [kat] --
14,576,523 UART: [cold-reset] ++
14,578,779 UART: [fht] FHT @ 0x50003400
14,589,387 UART: [idev] ++
14,590,073 UART: [idev] CDI.KEYID = 6
14,591,013 UART: [idev] SUBJECT.KEYID = 7
14,592,240 UART: [idev] UDS.KEYID = 0
14,593,731 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,743,710 UART: [idev] Erasing UDS.KEYID = 0
17,072,861 UART: [idev] Sha1 KeyId Algorithm
17,095,349 UART: [idev] --
17,099,349 UART: [ldev] ++
17,100,040 UART: [ldev] CDI.KEYID = 6
17,100,954 UART: [ldev] SUBJECT.KEYID = 5
17,102,119 UART: [ldev] AUTHORITY.KEYID = 7
17,103,358 UART: [ldev] FE.KEYID = 1
17,112,028 UART: [ldev] Erasing FE.KEYID = 1
19,590,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,309,146 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,324,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,339,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,354,631 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,375,612 UART: [ldev] --
21,381,056 UART: [fwproc] Wait for Commands...
21,384,037 UART: [fwproc] Recv command 0x46574c44
21,386,313 UART: [fwproc] Recv'd Img size: 119428 bytes
24,893,868 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,973,676 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,097,286 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,662,659 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,233 writing to cptra_bootfsm_go
3,758,348 ready_for_fw is high
3,758,889 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,083,822 >>> mbox cmd response: success
19,339,132 UART:
19,339,520 UART: Running Caliptra FMC ...
19,340,668 UART:
19,340,831 UART: [state] CFI Enabled
19,349,169 UART: [fht] FMC Alias Private Key: 7
21,115,850 UART: [art] Extend RT PCRs Done
21,117,095 UART: [art] Lock RT PCRs Done
21,118,625 UART: [art] Populate DV Done
21,124,235 UART: [fht] FMC Alias Private Key: 7
21,125,843 UART: [art] Derive CDI
21,126,589 UART: [art] Store in slot 0x4
21,169,244 UART: [art] Derive Key Pair
21,170,351 UART: [art] Store priv key in slot 0x5
23,597,546 UART: [art] Derive Key Pair - Done
23,610,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,316,515 UART: [art] Erasing AUTHORITY.KEYID = 7
25,318,020 UART: [art] PUB.X = 2F4B685DFE3C9148EFD22B960B42F1FE5E1AF94C4C05B2CE2D0385BCDE28A2CDA2BEAB4D4EA357C2C5C53F8DA7F8C085
25,325,376 UART: [art] PUB.Y = C2EAF32526A24AD9F4F01FADE1116324263695145D54AA52C858EEFEDD04878339C23076CCD01CE52F3533595767BA67
25,332,587 UART: [art] SIG.R = 2CFEF27F72D09C3A03935DFCD583939C98B301B0E18F459BD46AA9915B75BF4080FFE062AC241EEC6D08B177C01D324F
25,339,959 UART: [art] SIG.S = 79407FBFA116259471CAA9A48AC3A317F45A5172ED487886ED39EAB9B01E13FD6461BA58097AFEC137632C0E094E288C
26,318,789 UART: Caliptra RT
26,319,510 UART: [state] CFI Enabled
26,452,296 UART: [rt] RT listening for mailbox commands...
26,454,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,483,777 UART: [rt]cmd =0x46504c54, len=4
26,485,249 >>> mbox cmd response data (8 bytes)
26,486,023 UART: [rt] FIPS self test
26,486,970 UART: [kat] ++
26,487,427 UART: [kat] sha1
26,491,615 UART: [kat] SHA2-256
26,493,566 UART: [kat] SHA2-384
26,496,595 UART: [kat] SHA2-512-ACC
26,498,840 UART: [kat] ECC-384
28,922,672 UART: Fatal Error: 0x90040005
28,957,975 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,107,937 >>> mbox cmd response: failed
29,108,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,258,496 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
14,425,660 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,733,643 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,098 UART: [state] LifecycleState = Unprovisioned
85,753 UART: [state] DebugLocked = No
86,487 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,201 UART: [kat] SHA2-256
882,132 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,247 UART: [kat] ++
886,399 UART: [kat] sha1
890,483 UART: [kat] SHA2-256
892,421 UART: [kat] SHA2-384
895,222 UART: [kat] SHA2-512-ACC
897,123 UART: [kat] ECC-384
902,726 UART: [kat] HMAC-384Kdf
907,340 UART: [kat] LMS
1,475,536 UART: [kat] --
1,476,403 UART: [cold-reset] ++
1,476,895 UART: [fht] Storing FHT @ 0x50003400
1,479,884 UART: [idev] ++
1,480,052 UART: [idev] CDI.KEYID = 6
1,480,412 UART: [idev] SUBJECT.KEYID = 7
1,480,836 UART: [idev] UDS.KEYID = 0
1,481,181 ready_for_fw is high
1,481,181 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,656 UART: [idev] Erasing UDS.KEYID = 0
1,505,002 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,636 UART: [idev] --
1,514,585 UART: [ldev] ++
1,514,753 UART: [ldev] CDI.KEYID = 6
1,515,116 UART: [ldev] SUBJECT.KEYID = 5
1,515,542 UART: [ldev] AUTHORITY.KEYID = 7
1,516,005 UART: [ldev] FE.KEYID = 1
1,521,351 UART: [ldev] Erasing FE.KEYID = 1
1,546,492 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,853 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,569 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,460 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,172 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,400 UART: [ldev] --
1,585,749 UART: [fwproc] Waiting for Commands...
1,586,538 UART: [fwproc] Received command 0x46574c44
1,587,329 UART: [fwproc] Received Image of size 119428 bytes
2,942,811 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,217 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,435 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,184 >>> mbox cmd response: success
3,143,246 UART: [afmc] ++
3,143,414 UART: [afmc] CDI.KEYID = 6
3,143,776 UART: [afmc] SUBJECT.KEYID = 7
3,144,201 UART: [afmc] AUTHORITY.KEYID = 5
3,179,526 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,886 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,666 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,375 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,258 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,941 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,899 UART: [afmc] --
3,222,957 UART: [cold-reset] --
3,223,785 UART: [state] Locking Datavault
3,224,920 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,524 UART: [state] Locking ICCM
3,226,066 UART: [exit] Launching FMC @ 0x40000130
3,231,396 UART:
3,231,412 UART: Running Caliptra FMC ...
3,231,820 UART:
3,231,874 UART: [state] CFI Enabled
3,242,732 UART: [fht] FMC Alias Private Key: 7
3,361,802 UART: [art] Extend RT PCRs Done
3,362,230 UART: [art] Lock RT PCRs Done
3,363,742 UART: [art] Populate DV Done
3,372,131 UART: [fht] FMC Alias Private Key: 7
3,373,271 UART: [art] Derive CDI
3,373,551 UART: [art] Store in slot 0x4
3,459,895 UART: [art] Derive Key Pair
3,460,255 UART: [art] Store priv key in slot 0x5
3,473,320 UART: [art] Derive Key Pair - Done
3,488,407 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,692 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,457 UART: [art] PUB.X = E2AD9FFBB384266886F5D1DC5A5B5C483C449C6867427C138A973D39C038B3569F100036B3E9EE39397B183BB69A4127
3,511,203 UART: [art] PUB.Y = B26218B69D41F640C99B0C4D029A7CD23765355B396EA4B56823FAF001DC7D6C2D8899ECAFE5A86A54DC118D29058894
3,518,145 UART: [art] SIG.R = 6027744CF7B14DB9EB6C2DECBB1C10E21BE5C885F511EC1C76EA7484901DEE291B21979267081FFA158BA348226E1086
3,524,918 UART: [art] SIG.S = F9601B9E43F28506E5D9547F5D4A8F14E1DBD3D0A1B12AC12B2FCF41F994387C2361AE961C47BE9FA312236ABAABFC9A
3,548,815 UART: Caliptra RT
3,549,066 UART: [state] CFI Enabled
3,668,946 UART: [rt] RT listening for mailbox commands...
3,669,609 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,304 UART: [rt]cmd =0x46504c54, len=4
3,700,354 >>> mbox cmd response data (8 bytes)
3,700,603 UART: [rt] FIPS self test
3,700,931 UART: [kat] ++
3,701,083 UART: [kat] sha1
3,705,297 UART: [kat] SHA2-256
3,707,319 UART: [kat] SHA2-384
3,710,096 UART: [kat] SHA2-512-ACC
3,712,023 UART: [kat] ECC-384
3,720,564 UART: Fatal Error: 0x90040005
3,722,103 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,108 >>> mbox cmd response: failed
3,722,108 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,722,113 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,948 UART: [state] LifecycleState = Unprovisioned
85,603 UART: [state] DebugLocked = No
86,329 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,863 UART: [kat] SHA2-256
881,794 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,909 UART: [kat] ++
886,061 UART: [kat] sha1
890,137 UART: [kat] SHA2-256
892,075 UART: [kat] SHA2-384
894,854 UART: [kat] SHA2-512-ACC
896,755 UART: [kat] ECC-384
902,456 UART: [kat] HMAC-384Kdf
906,938 UART: [kat] LMS
1,475,134 UART: [kat] --
1,475,799 UART: [cold-reset] ++
1,476,169 UART: [fht] Storing FHT @ 0x50003400
1,479,126 UART: [idev] ++
1,479,294 UART: [idev] CDI.KEYID = 6
1,479,654 UART: [idev] SUBJECT.KEYID = 7
1,480,078 UART: [idev] UDS.KEYID = 0
1,480,423 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,970 UART: [idev] Erasing UDS.KEYID = 0
1,504,020 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,550 UART: [idev] --
1,513,729 UART: [ldev] ++
1,513,897 UART: [ldev] CDI.KEYID = 6
1,514,260 UART: [ldev] SUBJECT.KEYID = 5
1,514,686 UART: [ldev] AUTHORITY.KEYID = 7
1,515,149 UART: [ldev] FE.KEYID = 1
1,520,261 UART: [ldev] Erasing FE.KEYID = 1
1,546,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,982 UART: [ldev] --
1,585,425 UART: [fwproc] Waiting for Commands...
1,586,040 UART: [fwproc] Received command 0x46574c44
1,586,831 UART: [fwproc] Received Image of size 119428 bytes
2,941,323 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,553 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,771 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,386 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,141 ready_for_fw is high
1,362,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,618 >>> mbox cmd response: success
3,052,995 UART:
3,053,011 UART: Running Caliptra FMC ...
3,053,419 UART:
3,053,473 UART: [state] CFI Enabled
3,064,055 UART: [fht] FMC Alias Private Key: 7
3,183,579 UART: [art] Extend RT PCRs Done
3,184,007 UART: [art] Lock RT PCRs Done
3,185,411 UART: [art] Populate DV Done
3,193,312 UART: [fht] FMC Alias Private Key: 7
3,194,284 UART: [art] Derive CDI
3,194,564 UART: [art] Store in slot 0x4
3,280,430 UART: [art] Derive Key Pair
3,280,790 UART: [art] Store priv key in slot 0x5
3,294,043 UART: [art] Derive Key Pair - Done
3,309,156 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,825 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,590 UART: [art] PUB.X = C98F9FE552E95F20F3024AE04C27B6085D1B903F7997024BE45341CD99A8E422D35E01086792C357BA85300502E03E7E
3,331,333 UART: [art] PUB.Y = 0B265C241B053480A77F05B3AAD32980C16E3933BA906C7671F07A2522B558F8355B8ABFFB5CD976E70D25A4D1D41323
3,338,271 UART: [art] SIG.R = 79113D821CC5E69CC798BC128BB3DBBA92D71E8771963BD16788DCDFF5D01D855385F26D0D60B8DF5E55803C4B2DC123
3,345,048 UART: [art] SIG.S = 3AED3EBE0A2775EF282B4C4C7A7C85949A5BD9A417A9095BB6FBC0B62E00C2D99233694768AF76AC19AF70E5D32709DA
3,368,167 UART: Caliptra RT
3,368,418 UART: [state] CFI Enabled
3,488,833 UART: [rt] RT listening for mailbox commands...
3,489,496 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,015 UART: [rt]cmd =0x46504c54, len=4
3,520,073 >>> mbox cmd response data (8 bytes)
3,520,330 UART: [rt] FIPS self test
3,520,658 UART: [kat] ++
3,520,810 UART: [kat] sha1
3,525,070 UART: [kat] SHA2-256
3,527,092 UART: [kat] SHA2-384
3,529,929 UART: [kat] SHA2-512-ACC
3,531,856 UART: [kat] ECC-384
3,540,651 UART: Fatal Error: 0x90040005
3,542,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,542,195 >>> mbox cmd response: failed
3,542,195 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,542,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,523 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,962 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,353 UART: [state] LifecycleState = Unprovisioned
86,008 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,378 UART: [kat] SHA2-256
882,309 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,424 UART: [kat] ++
886,576 UART: [kat] sha1
890,852 UART: [kat] SHA2-256
892,790 UART: [kat] SHA2-384
895,619 UART: [kat] SHA2-512-ACC
897,520 UART: [kat] ECC-384
903,269 UART: [kat] HMAC-384Kdf
907,751 UART: [kat] LMS
1,475,947 UART: [kat] --
1,476,900 UART: [cold-reset] ++
1,477,460 UART: [fht] Storing FHT @ 0x50003400
1,480,105 UART: [idev] ++
1,480,273 UART: [idev] CDI.KEYID = 6
1,480,633 UART: [idev] SUBJECT.KEYID = 7
1,481,057 UART: [idev] UDS.KEYID = 0
1,481,402 ready_for_fw is high
1,481,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,095 UART: [idev] Erasing UDS.KEYID = 0
1,506,341 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,035 UART: [idev] --
1,516,092 UART: [ldev] ++
1,516,260 UART: [ldev] CDI.KEYID = 6
1,516,623 UART: [ldev] SUBJECT.KEYID = 5
1,517,049 UART: [ldev] AUTHORITY.KEYID = 7
1,517,512 UART: [ldev] FE.KEYID = 1
1,522,744 UART: [ldev] Erasing FE.KEYID = 1
1,548,195 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,894 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,610 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,501 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,213 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,295 UART: [ldev] --
1,587,674 UART: [fwproc] Waiting for Commands...
1,588,337 UART: [fwproc] Received command 0x46574c44
1,589,128 UART: [fwproc] Received Image of size 119428 bytes
2,944,254 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,946 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,921 >>> mbox cmd response: success
3,145,929 UART: [afmc] ++
3,146,097 UART: [afmc] CDI.KEYID = 6
3,146,459 UART: [afmc] SUBJECT.KEYID = 7
3,146,884 UART: [afmc] AUTHORITY.KEYID = 5
3,182,347 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,817 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,597 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,306 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,211,189 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,872 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,680 UART: [afmc] --
3,225,668 UART: [cold-reset] --
3,226,352 UART: [state] Locking Datavault
3,227,675 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,279 UART: [state] Locking ICCM
3,228,833 UART: [exit] Launching FMC @ 0x40000130
3,234,163 UART:
3,234,179 UART: Running Caliptra FMC ...
3,234,587 UART:
3,234,730 UART: [state] CFI Enabled
3,245,630 UART: [fht] FMC Alias Private Key: 7
3,364,676 UART: [art] Extend RT PCRs Done
3,365,104 UART: [art] Lock RT PCRs Done
3,366,724 UART: [art] Populate DV Done
3,374,927 UART: [fht] FMC Alias Private Key: 7
3,375,855 UART: [art] Derive CDI
3,376,135 UART: [art] Store in slot 0x4
3,461,999 UART: [art] Derive Key Pair
3,462,359 UART: [art] Store priv key in slot 0x5
3,475,504 UART: [art] Derive Key Pair - Done
3,490,044 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,345 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,110 UART: [art] PUB.X = B022B20ECD1821B107E501E35F94EF30350B7E81F1A853C8CD6C6FF16EC37611237A84160768844DADBA1015D0AAFB61
3,512,871 UART: [art] PUB.Y = 7B1045BA4BD05CAC90BA906FD7FF151B891D65BB5D6CFBFE27E79DE9126E1A31C8BE6F7016A2903EC16D81E360870CCB
3,519,838 UART: [art] SIG.R = 6362909AEE2992D5EBD0A5B84505B44AC4D4F694F53465EADF39B59B9AFA8F2BDB33C2DDAE490D8FDDC74C23A7B4CD2C
3,526,628 UART: [art] SIG.S = 5D1F3F348F9BBC2F308E05AE81DADE24C1014523C95E1CA1076E84A72B17458DA59ADEF071809C71D54B4B2B6125504A
3,550,229 UART: Caliptra RT
3,550,572 UART: [state] CFI Enabled
3,670,429 UART: [rt] RT listening for mailbox commands...
3,671,092 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,807 UART: [rt]cmd =0x46504c54, len=4
3,701,889 >>> mbox cmd response data (8 bytes)
3,702,242 UART: [rt] FIPS self test
3,702,570 UART: [kat] ++
3,702,722 UART: [kat] sha1
3,706,804 UART: [kat] SHA2-256
3,708,826 UART: [kat] SHA2-384
3,711,705 UART: [kat] SHA2-512-ACC
3,713,632 UART: [kat] ECC-384
3,722,479 UART: Fatal Error: 0x90040005
3,724,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,023 >>> mbox cmd response: failed
3,724,023 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,028 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,329 UART: [state] LifecycleState = Unprovisioned
85,984 UART: [state] DebugLocked = No
86,480 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,174 UART: [kat] SHA2-256
882,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,220 UART: [kat] ++
886,372 UART: [kat] sha1
890,548 UART: [kat] SHA2-256
892,486 UART: [kat] SHA2-384
895,045 UART: [kat] SHA2-512-ACC
896,946 UART: [kat] ECC-384
902,563 UART: [kat] HMAC-384Kdf
907,079 UART: [kat] LMS
1,475,275 UART: [kat] --
1,476,180 UART: [cold-reset] ++
1,476,660 UART: [fht] Storing FHT @ 0x50003400
1,479,659 UART: [idev] ++
1,479,827 UART: [idev] CDI.KEYID = 6
1,480,187 UART: [idev] SUBJECT.KEYID = 7
1,480,611 UART: [idev] UDS.KEYID = 0
1,480,956 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,579 UART: [idev] Erasing UDS.KEYID = 0
1,505,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,033 UART: [idev] --
1,515,210 UART: [ldev] ++
1,515,378 UART: [ldev] CDI.KEYID = 6
1,515,741 UART: [ldev] SUBJECT.KEYID = 5
1,516,167 UART: [ldev] AUTHORITY.KEYID = 7
1,516,630 UART: [ldev] FE.KEYID = 1
1,522,218 UART: [ldev] Erasing FE.KEYID = 1
1,548,283 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,114 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,419 UART: [ldev] --
1,587,914 UART: [fwproc] Waiting for Commands...
1,588,615 UART: [fwproc] Received command 0x46574c44
1,589,406 UART: [fwproc] Received Image of size 119428 bytes
2,944,688 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,972,258 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,476 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,145,027 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 ready_for_fw is high
1,362,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,373 >>> mbox cmd response: success
3,056,108 UART:
3,056,124 UART: Running Caliptra FMC ...
3,056,532 UART:
3,056,675 UART: [state] CFI Enabled
3,066,991 UART: [fht] FMC Alias Private Key: 7
3,185,185 UART: [art] Extend RT PCRs Done
3,185,613 UART: [art] Lock RT PCRs Done
3,187,481 UART: [art] Populate DV Done
3,195,782 UART: [fht] FMC Alias Private Key: 7
3,196,950 UART: [art] Derive CDI
3,197,230 UART: [art] Store in slot 0x4
3,283,396 UART: [art] Derive Key Pair
3,283,756 UART: [art] Store priv key in slot 0x5
3,296,959 UART: [art] Derive Key Pair - Done
3,311,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,882 UART: [art] PUB.X = 9538E13E1161E2B871882DACEF483086E6A8C33E2A9837CCF9866F72A8DD4424C482359CE8A54C4D27E8FE5A7D14D1A6
3,334,658 UART: [art] PUB.Y = 2CD7ECEE878CE8C6F91F29D4DC7B4D532C3BACE439709FF543C5C50A34FC14112184823D47DE1C894474642E385C465A
3,341,613 UART: [art] SIG.R = 9EE9741F3E97561D6721ECA1D7CA7A0822C5BD98C30386498E2B142F926708AE879100EEFA67624EC603966E39431E35
3,348,345 UART: [art] SIG.S = 487A30CF58D4AE5AB76721340ADB4AFDB23E3888C0652A55584D55A133810AAE82CA8D974A4CCE75D3905B3D0B227CD0
3,371,980 UART: Caliptra RT
3,372,323 UART: [state] CFI Enabled
3,493,205 UART: [rt] RT listening for mailbox commands...
3,493,868 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,377 UART: [rt]cmd =0x46504c54, len=4
3,524,575 >>> mbox cmd response data (8 bytes)
3,524,780 UART: [rt] FIPS self test
3,525,108 UART: [kat] ++
3,525,260 UART: [kat] sha1
3,529,408 UART: [kat] SHA2-256
3,531,430 UART: [kat] SHA2-384
3,534,267 UART: [kat] SHA2-512-ACC
3,536,194 UART: [kat] ECC-384
3,545,319 UART: Fatal Error: 0x90040005
3,546,858 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,546,863 >>> mbox cmd response: failed
3,546,863 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,546,868 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,996,483 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,461 UART: [state] WD Timer not started. Device not locked for debugging
87,822 UART: [kat] SHA2-256
891,372 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,476 UART: [kat] ++
895,628 UART: [kat] sha1
900,102 UART: [kat] SHA2-256
902,042 UART: [kat] SHA2-384
904,849 UART: [kat] SHA2-512-ACC
906,750 UART: [kat] ECC-384
916,189 UART: [kat] HMAC-384Kdf
920,729 UART: [kat] LMS
1,169,041 UART: [kat] --
1,169,902 UART: [cold-reset] ++
1,170,288 UART: [fht] FHT @ 0x50003400
1,172,854 UART: [idev] ++
1,173,022 UART: [idev] CDI.KEYID = 6
1,173,383 UART: [idev] SUBJECT.KEYID = 7
1,173,808 UART: [idev] UDS.KEYID = 0
1,174,154 ready_for_fw is high
1,174,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,539 UART: [idev] Erasing UDS.KEYID = 0
1,198,411 UART: [idev] Sha1 KeyId Algorithm
1,207,137 UART: [idev] --
1,208,010 UART: [ldev] ++
1,208,178 UART: [ldev] CDI.KEYID = 6
1,208,542 UART: [ldev] SUBJECT.KEYID = 5
1,208,969 UART: [ldev] AUTHORITY.KEYID = 7
1,209,432 UART: [ldev] FE.KEYID = 1
1,214,780 UART: [ldev] Erasing FE.KEYID = 1
1,241,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,641 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,357 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,958 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,078 UART: [ldev] --
1,280,413 UART: [fwproc] Wait for Commands...
1,281,162 UART: [fwproc] Recv command 0x46574c44
1,281,895 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,723 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,898 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,581 >>> mbox cmd response: success
2,837,797 UART: [afmc] ++
2,837,965 UART: [afmc] CDI.KEYID = 6
2,838,328 UART: [afmc] SUBJECT.KEYID = 7
2,838,754 UART: [afmc] AUTHORITY.KEYID = 5
2,874,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,298 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,047 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,757 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,638 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,339 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,104 UART: [afmc] --
2,917,089 UART: [cold-reset] --
2,917,771 UART: [state] Locking Datavault
2,919,338 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,942 UART: [state] Locking ICCM
2,920,568 UART: [exit] Launching FMC @ 0x40000130
2,925,898 UART:
2,925,914 UART: Running Caliptra FMC ...
2,926,322 UART:
2,926,376 UART: [state] CFI Enabled
2,937,144 UART: [fht] FMC Alias Private Key: 7
3,055,826 UART: [art] Extend RT PCRs Done
3,056,254 UART: [art] Lock RT PCRs Done
3,057,910 UART: [art] Populate DV Done
3,066,149 UART: [fht] FMC Alias Private Key: 7
3,067,277 UART: [art] Derive CDI
3,067,557 UART: [art] Store in slot 0x4
3,153,256 UART: [art] Derive Key Pair
3,153,616 UART: [art] Store priv key in slot 0x5
3,166,440 UART: [art] Derive Key Pair - Done
3,181,386 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,535 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,300 UART: [art] PUB.X = EE6F0E0B6770598514D640DA5C3415A3BCD76E28BDD15E3A5048B554434AAB27AA241FD9BDF1CA9049DEADE984D49658
3,204,078 UART: [art] PUB.Y = C25BAB2EBACAC419961C47B1EFA8B4F4FB766BD70124791AECBA13E71803A102CDF80D17C43AB37C832D80210D954E11
3,211,029 UART: [art] SIG.R = AAC212B92E5EC3404B0FA16AC19C784EECE9527E8BE5B34BF1AB772631F78A4FE26645B14D08406D1CFEEBA43BF78488
3,217,811 UART: [art] SIG.S = C7F1E40FBFE1AE1F732D6197BE945F7A955D707BF2A69FF6FE8D90019874E46B76B538BA7E461B7F10E52959EF01E80F
3,242,045 UART: Caliptra RT
3,242,296 UART: [state] CFI Enabled
3,362,298 UART: [rt] RT listening for mailbox commands...
3,362,961 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,816 UART: [rt]cmd =0x46504c54, len=4
3,394,082 >>> mbox cmd response data (8 bytes)
3,394,349 UART: [rt] FIPS self test
3,394,677 UART: [kat] ++
3,394,829 UART: [kat] sha1
3,399,081 UART: [kat] SHA2-256
3,401,103 UART: [kat] SHA2-384
3,403,954 UART: [kat] SHA2-512-ACC
3,405,881 UART: [kat] ECC-384
3,414,748 UART: Fatal Error: 0x90040005
3,416,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,292 >>> mbox cmd response: failed
3,416,292 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,416,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,964 UART: [state] LifecycleState = Unprovisioned
85,619 UART: [state] DebugLocked = No
86,153 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,044 UART: [kat] ++
895,196 UART: [kat] sha1
899,390 UART: [kat] SHA2-256
901,330 UART: [kat] SHA2-384
903,923 UART: [kat] SHA2-512-ACC
905,824 UART: [kat] ECC-384
915,517 UART: [kat] HMAC-384Kdf
919,937 UART: [kat] LMS
1,168,249 UART: [kat] --
1,169,298 UART: [cold-reset] ++
1,169,862 UART: [fht] FHT @ 0x50003400
1,172,618 UART: [idev] ++
1,172,786 UART: [idev] CDI.KEYID = 6
1,173,147 UART: [idev] SUBJECT.KEYID = 7
1,173,572 UART: [idev] UDS.KEYID = 0
1,173,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,257 UART: [idev] Erasing UDS.KEYID = 0
1,198,545 UART: [idev] Sha1 KeyId Algorithm
1,207,449 UART: [idev] --
1,208,542 UART: [ldev] ++
1,208,710 UART: [ldev] CDI.KEYID = 6
1,209,074 UART: [ldev] SUBJECT.KEYID = 5
1,209,501 UART: [ldev] AUTHORITY.KEYID = 7
1,209,964 UART: [ldev] FE.KEYID = 1
1,215,444 UART: [ldev] Erasing FE.KEYID = 1
1,241,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,577 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,466 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,178 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,212 UART: [ldev] --
1,280,503 UART: [fwproc] Wait for Commands...
1,281,296 UART: [fwproc] Recv command 0x46574c44
1,282,029 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,348 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,259 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,434 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,147 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,298 ready_for_fw is high
1,059,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,392 >>> mbox cmd response: success
2,752,003 UART:
2,752,019 UART: Running Caliptra FMC ...
2,752,427 UART:
2,752,481 UART: [state] CFI Enabled
2,763,079 UART: [fht] FMC Alias Private Key: 7
2,882,431 UART: [art] Extend RT PCRs Done
2,882,859 UART: [art] Lock RT PCRs Done
2,884,555 UART: [art] Populate DV Done
2,892,630 UART: [fht] FMC Alias Private Key: 7
2,893,728 UART: [art] Derive CDI
2,894,008 UART: [art] Store in slot 0x4
2,980,237 UART: [art] Derive Key Pair
2,980,597 UART: [art] Store priv key in slot 0x5
2,993,751 UART: [art] Derive Key Pair - Done
3,008,468 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,051 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,816 UART: [art] PUB.X = C9C1BF64E412C240CA7FCD7F33AB04DE60919265CA69790A8DF544C8F819BC9DD5B07349211C970E851C43B3461FD614
3,031,583 UART: [art] PUB.Y = 82B772DE2EF2AE79D77C662D732E168578ECA945B647EF67DF55C828E9FB790D8B749478ACECF1D1BB84BEA6639F509A
3,038,544 UART: [art] SIG.R = D19A2B1620648B68A65560F189234C50379F26EBF1EF8A485543DB5BD63E99572EE39F8171F3FB2DE61D0A6B0F60290C
3,045,307 UART: [art] SIG.S = 7B4543455A2FA5A71B921BA4DE15959B16F72804CF18A61BB08A10396333DBD9E4757D155D9C7E9147C09020BB37A676
3,068,680 UART: Caliptra RT
3,068,931 UART: [state] CFI Enabled
3,188,148 UART: [rt] RT listening for mailbox commands...
3,188,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,492 UART: [rt]cmd =0x46504c54, len=4
3,219,526 >>> mbox cmd response data (8 bytes)
3,219,655 UART: [rt] FIPS self test
3,219,983 UART: [kat] ++
3,220,135 UART: [kat] sha1
3,224,419 UART: [kat] SHA2-256
3,226,441 UART: [kat] SHA2-384
3,229,160 UART: [kat] SHA2-512-ACC
3,231,087 UART: [kat] ECC-384
3,239,878 UART: Fatal Error: 0x90040005
3,241,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,241,422 >>> mbox cmd response: failed
3,241,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,241,427 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,742 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,000 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,381 UART: [state] LifecycleState = Unprovisioned
86,036 UART: [state] DebugLocked = No
86,714 UART: [state] WD Timer not started. Device not locked for debugging
87,983 UART: [kat] SHA2-256
891,533 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,637 UART: [kat] ++
895,789 UART: [kat] sha1
899,869 UART: [kat] SHA2-256
901,809 UART: [kat] SHA2-384
904,586 UART: [kat] SHA2-512-ACC
906,487 UART: [kat] ECC-384
916,248 UART: [kat] HMAC-384Kdf
920,992 UART: [kat] LMS
1,169,304 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,171,007 UART: [fht] FHT @ 0x50003400
1,173,595 UART: [idev] ++
1,173,763 UART: [idev] CDI.KEYID = 6
1,174,124 UART: [idev] SUBJECT.KEYID = 7
1,174,549 UART: [idev] UDS.KEYID = 0
1,174,895 ready_for_fw is high
1,174,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,036 UART: [idev] Erasing UDS.KEYID = 0
1,200,354 UART: [idev] Sha1 KeyId Algorithm
1,209,152 UART: [idev] --
1,209,969 UART: [ldev] ++
1,210,137 UART: [ldev] CDI.KEYID = 6
1,210,501 UART: [ldev] SUBJECT.KEYID = 5
1,210,928 UART: [ldev] AUTHORITY.KEYID = 7
1,211,391 UART: [ldev] FE.KEYID = 1
1,216,929 UART: [ldev] Erasing FE.KEYID = 1
1,242,842 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,809 UART: [ldev] --
1,282,246 UART: [fwproc] Wait for Commands...
1,282,985 UART: [fwproc] Recv command 0x46574c44
1,283,718 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,891 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,358 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,533 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,018 >>> mbox cmd response: success
2,840,220 UART: [afmc] ++
2,840,388 UART: [afmc] CDI.KEYID = 6
2,840,751 UART: [afmc] SUBJECT.KEYID = 7
2,841,177 UART: [afmc] AUTHORITY.KEYID = 5
2,876,796 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,335 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,084 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,794 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,675 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,376 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,957 UART: [afmc] --
2,920,020 UART: [cold-reset] --
2,921,020 UART: [state] Locking Datavault
2,922,433 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,037 UART: [state] Locking ICCM
2,923,509 UART: [exit] Launching FMC @ 0x40000130
2,928,839 UART:
2,928,855 UART: Running Caliptra FMC ...
2,929,263 UART:
2,929,406 UART: [state] CFI Enabled
2,940,080 UART: [fht] FMC Alias Private Key: 7
3,059,122 UART: [art] Extend RT PCRs Done
3,059,550 UART: [art] Lock RT PCRs Done
3,061,000 UART: [art] Populate DV Done
3,069,285 UART: [fht] FMC Alias Private Key: 7
3,070,405 UART: [art] Derive CDI
3,070,685 UART: [art] Store in slot 0x4
3,156,942 UART: [art] Derive Key Pair
3,157,302 UART: [art] Store priv key in slot 0x5
3,171,062 UART: [art] Derive Key Pair - Done
3,185,962 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,257 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,022 UART: [art] PUB.X = 1C8E83669D61333B9963727F6DF6D8F54B5673AE349B4EB8D6FD44CE0AAA484A8CB30CD422D0CA8941E1AC1DACA6C608
3,208,799 UART: [art] PUB.Y = 299A862097767AEE9578BF5581D9E9C858B5825B903425733F63C8A7E578BBC27B128CE1DC23112B2B090AA5C3132292
3,215,737 UART: [art] SIG.R = FA6130DF418CD13F693A074072C8BE2D34B2C36FF963F06A305AC840AABAD46BF7EB6B4E4243432F61319E3360063B43
3,222,507 UART: [art] SIG.S = 82EA936446E6EEDC50D5F1F15BD8431871EE05FF4DD2A207D0F74A8CC25A17FB6056D331E281C6C767B282A494B6693C
3,245,971 UART: Caliptra RT
3,246,314 UART: [state] CFI Enabled
3,365,638 UART: [rt] RT listening for mailbox commands...
3,366,301 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,926 UART: [rt]cmd =0x46504c54, len=4
3,396,970 >>> mbox cmd response data (8 bytes)
3,397,233 UART: [rt] FIPS self test
3,397,561 UART: [kat] ++
3,397,713 UART: [kat] sha1
3,401,985 UART: [kat] SHA2-256
3,404,007 UART: [kat] SHA2-384
3,406,904 UART: [kat] SHA2-512-ACC
3,408,831 UART: [kat] ECC-384
3,418,230 UART: Fatal Error: 0x90040005
3,419,769 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,774 >>> mbox cmd response: failed
3,419,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,779 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,203 UART: [state] LifecycleState = Unprovisioned
85,858 UART: [state] DebugLocked = No
86,420 UART: [state] WD Timer not started. Device not locked for debugging
87,773 UART: [kat] SHA2-256
891,323 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,427 UART: [kat] ++
895,579 UART: [kat] sha1
899,807 UART: [kat] SHA2-256
901,747 UART: [kat] SHA2-384
904,262 UART: [kat] SHA2-512-ACC
906,163 UART: [kat] ECC-384
916,132 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,029 UART: [cold-reset] ++
1,170,439 UART: [fht] FHT @ 0x50003400
1,173,061 UART: [idev] ++
1,173,229 UART: [idev] CDI.KEYID = 6
1,173,590 UART: [idev] SUBJECT.KEYID = 7
1,174,015 UART: [idev] UDS.KEYID = 0
1,174,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,948 UART: [idev] Erasing UDS.KEYID = 0
1,199,476 UART: [idev] Sha1 KeyId Algorithm
1,208,448 UART: [idev] --
1,209,493 UART: [ldev] ++
1,209,661 UART: [ldev] CDI.KEYID = 6
1,210,025 UART: [ldev] SUBJECT.KEYID = 5
1,210,452 UART: [ldev] AUTHORITY.KEYID = 7
1,210,915 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,164 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,999 UART: [ldev] --
1,281,408 UART: [fwproc] Wait for Commands...
1,282,009 UART: [fwproc] Recv command 0x46574c44
1,282,742 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,727 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,808 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,983 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,650 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,713 ready_for_fw is high
1,059,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,813 >>> mbox cmd response: success
2,752,906 UART:
2,752,922 UART: Running Caliptra FMC ...
2,753,330 UART:
2,753,473 UART: [state] CFI Enabled
2,764,357 UART: [fht] FMC Alias Private Key: 7
2,883,185 UART: [art] Extend RT PCRs Done
2,883,613 UART: [art] Lock RT PCRs Done
2,884,817 UART: [art] Populate DV Done
2,892,932 UART: [fht] FMC Alias Private Key: 7
2,894,108 UART: [art] Derive CDI
2,894,388 UART: [art] Store in slot 0x4
2,980,183 UART: [art] Derive Key Pair
2,980,543 UART: [art] Store priv key in slot 0x5
2,993,693 UART: [art] Derive Key Pair - Done
3,008,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,665 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,430 UART: [art] PUB.X = C8397A56968F67142D762D9A520CD9C35B736AB5ADC14092FC19C04AAF6CE4C5C81303BC51B277111E00F2547307E8F5
3,032,171 UART: [art] PUB.Y = F7AA89EB62673E61BEDD2CE2EEAAB3E86BCBF50E5AA0123CB019F7BF3EB93D5834048E779CFDC15128F785C4EA1F2E89
3,039,141 UART: [art] SIG.R = 4DA6B58E5021E099163CE0C5D04054FB84B244158A4A66862A077CB4BAF4655DE77787EA57E97248D88DDDDBFF1F5A6E
3,045,918 UART: [art] SIG.S = B1C514BC37939167F5B0FFDD4F91C937BEC14F62EAAC87F88C2E41575DB0C555FDEAA2244CBFADF08148569B1361FEE7
3,069,610 UART: Caliptra RT
3,069,953 UART: [state] CFI Enabled
3,188,742 UART: [rt] RT listening for mailbox commands...
3,189,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,418 UART: [rt]cmd =0x46504c54, len=4
3,220,760 >>> mbox cmd response data (8 bytes)
3,221,017 UART: [rt] FIPS self test
3,221,345 UART: [kat] ++
3,221,497 UART: [kat] sha1
3,225,865 UART: [kat] SHA2-256
3,227,887 UART: [kat] SHA2-384
3,230,804 UART: [kat] SHA2-512-ACC
3,232,731 UART: [kat] ECC-384
3,241,052 UART: Fatal Error: 0x90040005
3,242,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,596 >>> mbox cmd response: failed
3,242,596 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,655 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,455 UART: [state] WD Timer not started. Device not locked for debugging
87,648 UART: [kat] SHA2-256
893,298 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,423 UART: [kat] ++
897,575 UART: [kat] sha1
901,777 UART: [kat] SHA2-256
903,717 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,150 UART: [kat] HMAC-384Kdf
922,668 UART: [kat] LMS
1,170,996 UART: [kat] --
1,172,043 UART: [cold-reset] ++
1,172,577 UART: [fht] FHT @ 0x50003400
1,175,272 UART: [idev] ++
1,175,440 UART: [idev] CDI.KEYID = 6
1,175,800 UART: [idev] SUBJECT.KEYID = 7
1,176,224 UART: [idev] UDS.KEYID = 0
1,176,569 ready_for_fw is high
1,176,569 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,274 UART: [idev] Erasing UDS.KEYID = 0
1,201,193 UART: [idev] Sha1 KeyId Algorithm
1,209,789 UART: [idev] --
1,210,917 UART: [ldev] ++
1,211,085 UART: [ldev] CDI.KEYID = 6
1,211,448 UART: [ldev] SUBJECT.KEYID = 5
1,211,874 UART: [ldev] AUTHORITY.KEYID = 7
1,212,337 UART: [ldev] FE.KEYID = 1
1,217,369 UART: [ldev] Erasing FE.KEYID = 1
1,244,292 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,991 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,707 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,598 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,489 UART: [ldev] --
1,283,812 UART: [fwproc] Wait for Commands...
1,284,464 UART: [fwproc] Recv command 0x46574c44
1,285,192 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,791 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,150 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,320 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,871 >>> mbox cmd response: success
2,840,057 UART: [afmc] ++
2,840,225 UART: [afmc] CDI.KEYID = 6
2,840,587 UART: [afmc] SUBJECT.KEYID = 7
2,841,012 UART: [afmc] AUTHORITY.KEYID = 5
2,876,137 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,440 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,188 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,897 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,780 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,481 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,273 UART: [afmc] --
2,919,349 UART: [cold-reset] --
2,920,193 UART: [state] Locking Datavault
2,921,614 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,218 UART: [state] Locking ICCM
2,922,716 UART: [exit] Launching FMC @ 0x40000130
2,928,046 UART:
2,928,062 UART: Running Caliptra FMC ...
2,928,470 UART:
2,928,524 UART: [state] CFI Enabled
2,938,990 UART: [fht] FMC Alias Private Key: 7
3,057,926 UART: [art] Extend RT PCRs Done
3,058,354 UART: [art] Lock RT PCRs Done
3,060,028 UART: [art] Populate DV Done
3,068,335 UART: [fht] FMC Alias Private Key: 7
3,069,477 UART: [art] Derive CDI
3,069,757 UART: [art] Store in slot 0x4
3,155,694 UART: [art] Derive Key Pair
3,156,054 UART: [art] Store priv key in slot 0x5
3,169,500 UART: [art] Derive Key Pair - Done
3,184,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,405 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,170 UART: [art] PUB.X = E43E67E9D7B8B0603E6908BFF86DF7EC2DD272C0E3F66724D8C27EB7F721560EB48753C87116CF113D3D19D5243C3506
3,207,935 UART: [art] PUB.Y = A678E2CDEBA4F3AB76E5BA5F2A520B3C33D8612DF0E2C03EC2DAB00E294F8B6244BA07BA8ED1C2179779F86FB13B114F
3,214,898 UART: [art] SIG.R = 6F2B7CD45408FAF754AB11F1F5239CAA736F35F967DA106A2BF43EC0B5D25D243739BD57EB85281B7D8F91372BCDAA83
3,221,679 UART: [art] SIG.S = F975DA2FC3B92781959E42B192832FB766A1409C6A24287293E32351C620CFAFEA6A8FC113F146C2DE1EF8D7FE8A8048
3,245,313 UART: Caliptra RT
3,245,564 UART: [state] CFI Enabled
3,365,989 UART: [rt] RT listening for mailbox commands...
3,366,652 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,823 UART: [rt]cmd =0x46504c54, len=4
3,398,101 >>> mbox cmd response data (8 bytes)
3,398,416 UART: [rt] FIPS self test
3,398,744 UART: [kat] ++
3,398,896 UART: [kat] sha1
3,403,200 UART: [kat] SHA2-256
3,405,222 UART: [kat] SHA2-384
3,408,087 UART: [kat] SHA2-512-ACC
3,410,014 UART: [kat] ECC-384
3,419,107 UART: Fatal Error: 0x90040005
3,420,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,651 >>> mbox cmd response: failed
3,420,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,656 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,872 UART: [state] LifecycleState = Unprovisioned
85,527 UART: [state] DebugLocked = No
86,131 UART: [state] WD Timer not started. Device not locked for debugging
87,308 UART: [kat] SHA2-256
892,958 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,083 UART: [kat] ++
897,235 UART: [kat] sha1
901,469 UART: [kat] SHA2-256
903,409 UART: [kat] SHA2-384
906,106 UART: [kat] SHA2-512-ACC
908,007 UART: [kat] ECC-384
917,492 UART: [kat] HMAC-384Kdf
922,126 UART: [kat] LMS
1,170,454 UART: [kat] --
1,171,419 UART: [cold-reset] ++
1,171,819 UART: [fht] FHT @ 0x50003400
1,174,274 UART: [idev] ++
1,174,442 UART: [idev] CDI.KEYID = 6
1,174,802 UART: [idev] SUBJECT.KEYID = 7
1,175,226 UART: [idev] UDS.KEYID = 0
1,175,571 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,358 UART: [idev] Erasing UDS.KEYID = 0
1,201,097 UART: [idev] Sha1 KeyId Algorithm
1,209,723 UART: [idev] --
1,210,735 UART: [ldev] ++
1,210,903 UART: [ldev] CDI.KEYID = 6
1,211,266 UART: [ldev] SUBJECT.KEYID = 5
1,211,692 UART: [ldev] AUTHORITY.KEYID = 7
1,212,155 UART: [ldev] FE.KEYID = 1
1,217,511 UART: [ldev] Erasing FE.KEYID = 1
1,243,694 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,329 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,045 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,936 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,648 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,697 UART: [ldev] --
1,283,062 UART: [fwproc] Wait for Commands...
1,283,724 UART: [fwproc] Recv command 0x46574c44
1,284,452 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,009 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,576 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,746 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,431 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,736 >>> mbox cmd response: success
2,754,531 UART:
2,754,547 UART: Running Caliptra FMC ...
2,754,955 UART:
2,755,009 UART: [state] CFI Enabled
2,765,271 UART: [fht] FMC Alias Private Key: 7
2,884,173 UART: [art] Extend RT PCRs Done
2,884,601 UART: [art] Lock RT PCRs Done
2,886,435 UART: [art] Populate DV Done
2,894,424 UART: [fht] FMC Alias Private Key: 7
2,895,520 UART: [art] Derive CDI
2,895,800 UART: [art] Store in slot 0x4
2,981,863 UART: [art] Derive Key Pair
2,982,223 UART: [art] Store priv key in slot 0x5
2,995,321 UART: [art] Derive Key Pair - Done
3,010,253 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,720 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,485 UART: [art] PUB.X = 2AEAE0606731B06285764BF9852AAC8DB34DF0F360D4CFA3AD999DF46623C5EC379E27C2D836FCE6D0B3C678789E33BE
3,033,269 UART: [art] PUB.Y = 5014C8B703C8F2FB8CAA742DCA391CD15A9CBEEE4DA394BBACAFDF2E9395B8E806E1932A2533EF8AC334F100B73D2E67
3,040,215 UART: [art] SIG.R = 9B3293E590435450AA9D50A24C7871F5B2B23B494DF07D40DE7BEA8D15BAFB9764FD4F5C512182956662226F9F8D7F29
3,046,987 UART: [art] SIG.S = 3EC62B1040AA6DC9A0085B172DBE38B7537AC494EA99E5609E836B15C61A5F318A49260EC95274A0FB372ADCACA6629B
3,071,105 UART: Caliptra RT
3,071,356 UART: [state] CFI Enabled
3,192,105 UART: [rt] RT listening for mailbox commands...
3,192,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,491 UART: [rt]cmd =0x46504c54, len=4
3,223,575 >>> mbox cmd response data (8 bytes)
3,223,834 UART: [rt] FIPS self test
3,224,162 UART: [kat] ++
3,224,314 UART: [kat] sha1
3,228,430 UART: [kat] SHA2-256
3,230,452 UART: [kat] SHA2-384
3,233,465 UART: [kat] SHA2-512-ACC
3,235,392 UART: [kat] ECC-384
3,244,567 UART: Fatal Error: 0x90040005
3,246,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,111 >>> mbox cmd response: failed
3,246,111 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,498 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,621 UART: [state] LifecycleState = Unprovisioned
86,276 UART: [state] DebugLocked = No
86,888 UART: [state] WD Timer not started. Device not locked for debugging
88,215 UART: [kat] SHA2-256
893,865 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,990 UART: [kat] ++
898,142 UART: [kat] sha1
902,320 UART: [kat] SHA2-256
904,260 UART: [kat] SHA2-384
906,947 UART: [kat] SHA2-512-ACC
908,848 UART: [kat] ECC-384
918,475 UART: [kat] HMAC-384Kdf
922,989 UART: [kat] LMS
1,171,317 UART: [kat] --
1,172,344 UART: [cold-reset] ++
1,172,704 UART: [fht] FHT @ 0x50003400
1,175,349 UART: [idev] ++
1,175,517 UART: [idev] CDI.KEYID = 6
1,175,877 UART: [idev] SUBJECT.KEYID = 7
1,176,301 UART: [idev] UDS.KEYID = 0
1,176,646 ready_for_fw is high
1,176,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,973 UART: [idev] Erasing UDS.KEYID = 0
1,201,886 UART: [idev] Sha1 KeyId Algorithm
1,210,348 UART: [idev] --
1,211,392 UART: [ldev] ++
1,211,560 UART: [ldev] CDI.KEYID = 6
1,211,923 UART: [ldev] SUBJECT.KEYID = 5
1,212,349 UART: [ldev] AUTHORITY.KEYID = 7
1,212,812 UART: [ldev] FE.KEYID = 1
1,218,090 UART: [ldev] Erasing FE.KEYID = 1
1,243,767 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,160 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,876 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,767 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,479 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,518 UART: [ldev] --
1,282,959 UART: [fwproc] Wait for Commands...
1,283,775 UART: [fwproc] Recv command 0x46574c44
1,284,503 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,082 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,761 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,310 >>> mbox cmd response: success
2,839,470 UART: [afmc] ++
2,839,638 UART: [afmc] CDI.KEYID = 6
2,840,000 UART: [afmc] SUBJECT.KEYID = 7
2,840,425 UART: [afmc] AUTHORITY.KEYID = 5
2,876,424 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,683 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,431 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,023 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,724 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,624 UART: [afmc] --
2,919,544 UART: [cold-reset] --
2,920,460 UART: [state] Locking Datavault
2,921,699 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,303 UART: [state] Locking ICCM
2,922,745 UART: [exit] Launching FMC @ 0x40000130
2,928,075 UART:
2,928,091 UART: Running Caliptra FMC ...
2,928,499 UART:
2,928,642 UART: [state] CFI Enabled
2,939,324 UART: [fht] FMC Alias Private Key: 7
3,058,342 UART: [art] Extend RT PCRs Done
3,058,770 UART: [art] Lock RT PCRs Done
3,060,176 UART: [art] Populate DV Done
3,068,339 UART: [fht] FMC Alias Private Key: 7
3,069,345 UART: [art] Derive CDI
3,069,625 UART: [art] Store in slot 0x4
3,155,014 UART: [art] Derive Key Pair
3,155,374 UART: [art] Store priv key in slot 0x5
3,168,874 UART: [art] Derive Key Pair - Done
3,183,887 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,091 UART: [art] PUB.X = 7087A7915FFDE2AC5E513245989AABE29ADEA7B717B0A112DE3806B1CFA41E40876B10AE165508E9B373378F666B8B2E
3,206,863 UART: [art] PUB.Y = 888EEF35B3CB58D486B463EEDB9A2B6D11379E51AE8196E5222BF0BAE46574CCC589AFAD7AB261C99214A4AE69805B93
3,213,827 UART: [art] SIG.R = 371D1A4636E2258F973C1F1A9178B6BFC7AD4F46F82E673D4F2561A27D601C74E4F453672A9FE98DA3F13E587638889C
3,220,597 UART: [art] SIG.S = F7FE2428E3154944FEA54FA11BDFCB4F86F8946C38F62EB0176007C7414E22B0B2AB01887AD5381ADABAFD75716DCA31
3,244,619 UART: Caliptra RT
3,244,962 UART: [state] CFI Enabled
3,365,571 UART: [rt] RT listening for mailbox commands...
3,366,234 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,985 UART: [rt]cmd =0x46504c54, len=4
3,397,003 >>> mbox cmd response data (8 bytes)
3,397,292 UART: [rt] FIPS self test
3,397,620 UART: [kat] ++
3,397,772 UART: [kat] sha1
3,402,034 UART: [kat] SHA2-256
3,404,056 UART: [kat] SHA2-384
3,406,787 UART: [kat] SHA2-512-ACC
3,408,714 UART: [kat] ECC-384
3,417,899 UART: Fatal Error: 0x90040005
3,419,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,443 >>> mbox cmd response: failed
3,419,443 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,448 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,317 UART: [state] LifecycleState = Unprovisioned
85,972 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,757 UART: [kat] SHA2-256
893,407 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,532 UART: [kat] ++
897,684 UART: [kat] sha1
901,854 UART: [kat] SHA2-256
903,794 UART: [kat] SHA2-384
906,411 UART: [kat] SHA2-512-ACC
908,312 UART: [kat] ECC-384
918,131 UART: [kat] HMAC-384Kdf
922,665 UART: [kat] LMS
1,170,993 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,458 UART: [fht] FHT @ 0x50003400
1,175,077 UART: [idev] ++
1,175,245 UART: [idev] CDI.KEYID = 6
1,175,605 UART: [idev] SUBJECT.KEYID = 7
1,176,029 UART: [idev] UDS.KEYID = 0
1,176,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,145 UART: [idev] Erasing UDS.KEYID = 0
1,201,066 UART: [idev] Sha1 KeyId Algorithm
1,209,706 UART: [idev] --
1,210,744 UART: [ldev] ++
1,210,912 UART: [ldev] CDI.KEYID = 6
1,211,275 UART: [ldev] SUBJECT.KEYID = 5
1,211,701 UART: [ldev] AUTHORITY.KEYID = 7
1,212,164 UART: [ldev] FE.KEYID = 1
1,217,512 UART: [ldev] Erasing FE.KEYID = 1
1,244,279 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,222 UART: [ldev] --
1,283,573 UART: [fwproc] Wait for Commands...
1,284,169 UART: [fwproc] Recv command 0x46574c44
1,284,897 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,873 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,043 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,602 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,200 ready_for_fw is high
1,061,200 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,639 >>> mbox cmd response: success
2,753,120 UART:
2,753,136 UART: Running Caliptra FMC ...
2,753,544 UART:
2,753,687 UART: [state] CFI Enabled
2,764,773 UART: [fht] FMC Alias Private Key: 7
2,884,279 UART: [art] Extend RT PCRs Done
2,884,707 UART: [art] Lock RT PCRs Done
2,886,069 UART: [art] Populate DV Done
2,894,698 UART: [fht] FMC Alias Private Key: 7
2,895,830 UART: [art] Derive CDI
2,896,110 UART: [art] Store in slot 0x4
2,981,853 UART: [art] Derive Key Pair
2,982,213 UART: [art] Store priv key in slot 0x5
2,995,361 UART: [art] Derive Key Pair - Done
3,009,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,870 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,635 UART: [art] PUB.X = 6828BE5724A0D7A9AD2B3437AEFF68323B7394425F26E0D423ACA13009FA40545A1B5DDD6AD5C149E63BF7E258209561
3,033,406 UART: [art] PUB.Y = B46EB2B29D72A7622FBDEE55EC669665AFAD09A520D7D8FE8C7D701F173F9080CEF49D7D955D11C82D0A6E96D2A6EB59
3,040,368 UART: [art] SIG.R = DAF3746F0E70206CEAC01F7CE87D4EBBDE8A9243424E75A28B00E2331D3F5D7AB9BA1E445C0BD02760EBA5FDEEB4A171
3,047,134 UART: [art] SIG.S = F20FD844BFAB81714AE67E67089B6314C83E40B312455AB3A830644BDBC0D4BA00F9E8705531CAA8DBC03B0B470C6694
3,071,288 UART: Caliptra RT
3,071,631 UART: [state] CFI Enabled
3,191,893 UART: [rt] RT listening for mailbox commands...
3,192,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,405 UART: [rt]cmd =0x46504c54, len=4
3,223,485 >>> mbox cmd response data (8 bytes)
3,223,680 UART: [rt] FIPS self test
3,224,008 UART: [kat] ++
3,224,160 UART: [kat] sha1
3,228,350 UART: [kat] SHA2-256
3,230,372 UART: [kat] SHA2-384
3,233,259 UART: [kat] SHA2-512-ACC
3,235,186 UART: [kat] ECC-384
3,243,949 UART: Fatal Error: 0x90040005
3,245,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,493 >>> mbox cmd response: failed
3,245,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,841 >>> mbox cmd response: success
test self_tests::kat_ecc384_deterministic_key_gen_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
3,436,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,585,826 >>> mbox cmd response: failed
3,586,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,735,276 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,470,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,322,749 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,015 writing to cptra_bootfsm_go
3,443,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,593,710 >>> mbox cmd response: failed
3,594,266 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,743,135 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,437,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,270,805 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
3,780,694 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,930,520 >>> mbox cmd response: failed
3,931,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,079,935 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
19,561,998 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,278,526 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
3,785,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,935,517 >>> mbox cmd response: failed
3,936,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,084,966 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
19,553,990 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,274,625 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
3,438,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,588,464 >>> mbox cmd response: failed
3,589,009 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,737,882 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,435,784 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,290,842 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
3,439,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,589,777 >>> mbox cmd response: failed
3,590,351 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,739,580 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,437,701 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,524 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.91s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,392 writing to cptra_bootfsm_go
3,796,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,946,644 >>> mbox cmd response: failed
3,947,201 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,096,578 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
19,545,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,252,368 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,618 writing to cptra_bootfsm_go
3,792,392 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,942,179 >>> mbox cmd response: failed
3,942,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,091,591 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
19,544,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,257,472 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,755 >>> mbox cmd response: failed
819,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,761 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,235 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,552 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,719 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,727 >>> mbox cmd response: failed
819,727 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,733 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,567 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,560 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,670 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,678 >>> mbox cmd response: failed
820,678 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,684 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,962 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,607 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.60s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,100 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,108 >>> mbox cmd response: failed
820,108 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,114 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,921 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,279 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,287 >>> mbox cmd response: failed
820,287 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,293 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,114 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,365 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,373 >>> mbox cmd response: failed
819,373 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,379 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,653 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,140 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
820,606 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,614 >>> mbox cmd response: failed
820,614 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
820,620 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,733 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
819,804 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,812 >>> mbox cmd response: failed
819,812 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
819,818 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,754 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,027 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,069 writing to cptra_bootfsm_go
192,224 UART:
192,595 UART: Running Caliptra ROM ...
193,787 UART:
193,946 UART: [state] CFI Enabled
260,949 UART: [state] LifecycleState = Unprovisioned
262,905 UART: [state] DebugLocked = No
264,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,481 UART: [kat] SHA2-256
439,232 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,748 UART: [kat] ++
450,196 UART: [kat] sha1
461,907 UART: [kat] SHA2-256
464,648 UART: [kat] SHA2-384
471,918 UART: [kat] SHA2-512-ACC
474,289 UART: [kat] ECC-384
2,766,347 UART: [kat] HMAC-384Kdf
2,779,029 UART: [kat] LMS
3,969,296 UART: [kat] --
3,974,530 UART: [cold-reset] ++
3,976,046 UART: [fht] Storing FHT @ 0x50003400
3,988,176 UART: [idev] ++
3,988,834 UART: [idev] CDI.KEYID = 6
3,989,947 UART: [idev] SUBJECT.KEYID = 7
3,991,088 UART: [idev] UDS.KEYID = 0
3,992,205 ready_for_fw is high
3,992,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,142,741 UART: [idev] Erasing UDS.KEYID = 0
7,326,826 UART: [idev] Using Sha1 for KeyId Algorithm
7,350,045 UART: [idev] --
7,353,014 UART: [ldev] ++
7,353,582 UART: [ldev] CDI.KEYID = 6
7,354,515 UART: [ldev] SUBJECT.KEYID = 5
7,355,677 UART: [ldev] AUTHORITY.KEYID = 7
7,357,024 UART: [ldev] FE.KEYID = 1
7,401,839 UART: [ldev] Erasing FE.KEYID = 1
10,734,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,561 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,520 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,415 UART: [ldev] --
13,094,609 UART: [fwproc] Waiting for Commands...
13,097,796 UART: [fwproc] Received command 0x46574c44
13,099,987 UART: [fwproc] Received Image of size 119428 bytes
17,213,008 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,290,882 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,364,075 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,695,073 >>> mbox cmd response: success
17,698,521 UART: [afmc] ++
17,699,117 UART: [afmc] CDI.KEYID = 6
17,700,134 UART: [afmc] SUBJECT.KEYID = 7
17,701,303 UART: [afmc] AUTHORITY.KEYID = 5
21,074,145 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,371,384 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,373,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,388,094 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,402,831 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,417,230 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,437,998 UART: [afmc] --
23,441,590 UART: [cold-reset] --
23,445,717 UART: [state] Locking Datavault
23,449,080 UART: [state] Locking PCR0, PCR1 and PCR31
23,450,783 UART: [state] Locking ICCM
23,452,532 UART: [exit] Launching FMC @ 0x40000130
23,460,923 UART:
23,461,158 UART: Running Caliptra FMC ...
23,462,183 UART:
23,462,330 UART: [state] CFI Enabled
23,534,002 UART: [fht] FMC Alias Private Key: 7
25,873,977 UART: [art] Extend RT PCRs Done
25,875,208 UART: [art] Lock RT PCRs Done
25,876,750 UART: [art] Populate DV Done
25,882,213 UART: [fht] FMC Alias Private Key: 7
25,883,708 UART: [art] Derive CDI
25,884,471 UART: [art] Store in slot 0x4
25,942,429 UART: [art] Derive Key Pair
25,943,428 UART: [art] Store priv key in slot 0x5
29,236,096 UART: [art] Derive Key Pair - Done
29,249,045 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,690 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,202 UART: [art] PUB.X = 105A73DFCAB204A0012B10E06DFAF530BCB73169B580C852EF08B43B46F6108354F40130EC5118445252CADB7EB1FA11
31,547,620 UART: [art] PUB.Y = 3E2B48A9D22EE51BFD8FECFA1ACF03F02325B8126E4ACF462EF75046EC6FC645ADB7E09A04525B07FC4CC7C37B2747F9
31,554,745 UART: [art] SIG.R = 595C700E00F0D48F2927451E007198C905E4E63D3A936F7ED8E2A87E60ADBAD545CC12312C7815C04CA2C3E77107B42D
31,562,111 UART: [art] SIG.S = 7AB9B84C70A464B3647256B298A066EE6B1D1BC74AED0F44BECA1246ABF3FCBC540F8DB8528ADF0AB2E5F1F0A8C3A527
32,867,292 UART: Caliptra RT
32,868,005 UART: [state] CFI Enabled
33,044,143 UART: [rt] RT listening for mailbox commands...
33,046,004 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,075,518 UART: [rt]cmd =0x46504c54, len=4
33,076,993 >>> mbox cmd response data (8 bytes)
33,077,710 UART: [rt] FIPS self test
33,078,667 UART: [kat] ++
33,079,127 UART: [kat] sha1
33,083,367 UART: [kat] SHA2-256
33,085,304 UART: [kat] SHA2-384
33,088,165 UART: [kat] SHA2-512-ACC
33,090,407 UART: [kat] ECC-384
34,067,520 UART: Fatal Error: 0x90040004
34,102,796 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,252,817 >>> mbox cmd response: failed
34,253,465 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,403,374 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,123 UART:
190,418 UART: Running Caliptra ROM ...
191,473 UART:
191,617 UART: [state] CFI Enabled
250,966 UART: [state] LifecycleState = Unprovisioned
252,903 UART: [state] DebugLocked = No
255,571 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
260,292 UART: [kat] SHA2-256
430,025 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
440,527 UART: [kat] ++
441,058 UART: [kat] sha1
451,459 UART: [kat] SHA2-256
454,200 UART: [kat] SHA2-384
460,518 UART: [kat] SHA2-512-ACC
462,858 UART: [kat] ECC-384
2,751,519 UART: [kat] HMAC-384Kdf
2,763,153 UART: [kat] LMS
3,953,447 UART: [kat] --
3,956,924 UART: [cold-reset] ++
3,957,892 UART: [fht] Storing FHT @ 0x50003400
3,968,890 UART: [idev] ++
3,969,456 UART: [idev] CDI.KEYID = 6
3,970,473 UART: [idev] SUBJECT.KEYID = 7
3,971,638 UART: [idev] UDS.KEYID = 0
3,973,249 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,123,381 UART: [idev] Erasing UDS.KEYID = 0
7,312,813 UART: [idev] Using Sha1 for KeyId Algorithm
7,335,234 UART: [idev] --
7,339,396 UART: [ldev] ++
7,340,043 UART: [ldev] CDI.KEYID = 6
7,340,961 UART: [ldev] SUBJECT.KEYID = 5
7,342,180 UART: [ldev] AUTHORITY.KEYID = 7
7,343,412 UART: [ldev] FE.KEYID = 1
7,386,803 UART: [ldev] Erasing FE.KEYID = 1
10,718,555 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,012,440 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,026,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,041,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,056,334 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,075,789 UART: [ldev] --
13,080,481 UART: [fwproc] Waiting for Commands...
13,082,100 UART: [fwproc] Received command 0x46574c44
13,084,299 UART: [fwproc] Received Image of size 119428 bytes
17,202,130 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,273,080 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,346,243 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,677,983 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
3,798,455 ready_for_fw is high
3,798,977 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,991,605 >>> mbox cmd response: success
23,691,040 UART:
23,691,460 UART: Running Caliptra FMC ...
23,692,582 UART:
23,692,743 UART: [state] CFI Enabled
23,758,864 UART: [fht] FMC Alias Private Key: 7
26,099,642 UART: [art] Extend RT PCRs Done
26,100,877 UART: [art] Lock RT PCRs Done
26,102,407 UART: [art] Populate DV Done
26,107,730 UART: [fht] FMC Alias Private Key: 7
26,109,281 UART: [art] Derive CDI
26,110,100 UART: [art] Store in slot 0x4
26,167,824 UART: [art] Derive Key Pair
26,168,862 UART: [art] Store priv key in slot 0x5
29,461,809 UART: [art] Derive Key Pair - Done
29,474,492 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,764,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,928 UART: [art] PUB.X = 80BCFD19DBB4CB8FA32E5B8571437CFB02FA891EC2DB7D50F1FD20A15CCD8B455AC67F00EFA181B902333E6EF2B3C0FE
31,773,205 UART: [art] PUB.Y = 24AFD190146850071FEFC72599D99A8DF05672399AABBEF9D8807942D50E1597DE3BC457FB37DD44ADA09E4D438E8C5B
31,780,471 UART: [art] SIG.R = 824DB3D59BB826E7A8E557E36A3A6E609F1AE45F30248AC6644FD712C4639C56CC26702248F7CF41621A96BED5A3BC09
31,787,852 UART: [art] SIG.S = 6B7126F2750B58A364E99BD0D5E8BAF9D83C625E08C4B76F673F865EDE96A1FB7884CA0092D06B6E5C643EA0D86FF9B8
33,093,142 UART: Caliptra RT
33,093,867 UART: [state] CFI Enabled
33,289,967 UART: [rt] RT listening for mailbox commands...
33,291,832 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,321,572 UART: [rt]cmd =0x46504c54, len=4
33,322,971 >>> mbox cmd response data (8 bytes)
33,324,483 UART: [rt] FIPS self test
33,325,437 UART: [kat] ++
33,325,939 UART: [kat] sha1
33,330,344 UART: [kat] SHA2-256
33,332,225 UART: [kat] SHA2-384
33,335,205 UART: [kat] SHA2-512-ACC
33,337,451 UART: [kat] ECC-384
34,312,782 UART: Fatal Error: 0x90040004
34,348,056 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,498,040 >>> mbox cmd response: failed
34,498,701 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,648,652 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,793,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,949,176 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.75s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,552 UART:
192,916 UART: Running Caliptra ROM ...
194,103 UART:
603,856 UART: [state] CFI Enabled
618,086 UART: [state] LifecycleState = Unprovisioned
620,043 UART: [state] DebugLocked = No
622,372 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,534 UART: [kat] SHA2-256
796,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,785 UART: [kat] ++
807,313 UART: [kat] sha1
818,403 UART: [kat] SHA2-256
821,132 UART: [kat] SHA2-384
826,914 UART: [kat] SHA2-512-ACC
829,297 UART: [kat] ECC-384
3,113,594 UART: [kat] HMAC-384Kdf
3,125,990 UART: [kat] LMS
4,316,078 UART: [kat] --
4,320,802 UART: [cold-reset] ++
4,322,324 UART: [fht] Storing FHT @ 0x50003400
4,334,593 UART: [idev] ++
4,335,175 UART: [idev] CDI.KEYID = 6
4,336,110 UART: [idev] SUBJECT.KEYID = 7
4,337,363 UART: [idev] UDS.KEYID = 0
4,338,461 ready_for_fw is high
4,338,703 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,755 UART: [idev] Erasing UDS.KEYID = 0
7,623,002 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,254 UART: [idev] --
7,648,426 UART: [ldev] ++
7,649,006 UART: [ldev] CDI.KEYID = 6
7,650,040 UART: [ldev] SUBJECT.KEYID = 5
7,651,232 UART: [ldev] AUTHORITY.KEYID = 7
7,652,469 UART: [ldev] FE.KEYID = 1
7,662,827 UART: [ldev] Erasing FE.KEYID = 1
10,951,666 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,844 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,785 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,457 UART: [ldev] --
13,311,384 UART: [fwproc] Waiting for Commands...
13,313,599 UART: [fwproc] Received command 0x46574c44
13,315,845 UART: [fwproc] Received Image of size 119428 bytes
17,431,044 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,865 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,020 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,910,269 >>> mbox cmd response: success
17,914,025 UART: [afmc] ++
17,914,630 UART: [afmc] CDI.KEYID = 6
17,915,710 UART: [afmc] SUBJECT.KEYID = 7
17,916,825 UART: [afmc] AUTHORITY.KEYID = 5
21,230,923 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,525,489 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,527,747 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,542,140 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,556,888 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,571,268 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,592,500 UART: [afmc] --
23,595,656 UART: [cold-reset] --
23,599,046 UART: [state] Locking Datavault
23,604,145 UART: [state] Locking PCR0, PCR1 and PCR31
23,605,912 UART: [state] Locking ICCM
23,607,903 UART: [exit] Launching FMC @ 0x40000130
23,616,269 UART:
23,616,519 UART: Running Caliptra FMC ...
23,617,625 UART:
23,617,792 UART: [state] CFI Enabled
23,625,625 UART: [fht] FMC Alias Private Key: 7
25,965,639 UART: [art] Extend RT PCRs Done
25,966,875 UART: [art] Lock RT PCRs Done
25,968,399 UART: [art] Populate DV Done
25,974,033 UART: [fht] FMC Alias Private Key: 7
25,975,533 UART: [art] Derive CDI
25,976,273 UART: [art] Store in slot 0x4
26,019,075 UART: [art] Derive Key Pair
26,020,157 UART: [art] Store priv key in slot 0x5
29,262,108 UART: [art] Derive Key Pair - Done
29,274,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,210 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,737 UART: [art] PUB.X = E7B6C5432003A71AC41981CC25F273D9E9EACB48FC2D98F35F16C533D712DC3A5A690D34672D5ED59832AB1AF8800DF1
31,563,999 UART: [art] PUB.Y = 3467B4537B13F6EC42DA3131E9253D44B352F955623B8D0A9752EE2595ECD23894306A8C8879D1E77905D10BD079F0F4
31,571,241 UART: [art] SIG.R = 028B3EBECE25BD9B4D8F98A44A8A6DD56723C8A8C4232B9DFFB6A60F70C36214B83429442CB35E7C60CB33BAF8FDA12C
31,578,635 UART: [art] SIG.S = 5BDBBABD1E39483EB1BE1E078FE297004121C9C0BEE8EFF621610F124C3EAFC02F7A2DF83C23129A825B909180FBB8C3
32,883,801 UART: Caliptra RT
32,884,517 UART: [state] CFI Enabled
33,018,813 UART: [rt] RT listening for mailbox commands...
33,020,669 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,050,302 UART: [rt]cmd =0x46504c54, len=4
33,052,026 >>> mbox cmd response data (8 bytes)
33,053,350 UART: [rt] FIPS self test
33,054,304 UART: [kat] ++
33,054,757 UART: [kat] sha1
33,058,891 UART: [kat] SHA2-256
33,060,825 UART: [kat] SHA2-384
33,063,739 UART: [kat] SHA2-512-ACC
33,065,948 UART: [kat] ECC-384
34,029,785 UART: Fatal Error: 0x90040004
34,065,002 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,214,962 >>> mbox cmd response: failed
34,215,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,365,830 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,118 UART:
190,401 UART: Running Caliptra ROM ...
191,457 UART:
6,168,236 UART: [state] CFI Enabled
6,183,252 UART: [state] LifecycleState = Unprovisioned
6,185,424 UART: [state] DebugLocked = No
6,187,362 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
6,192,000 UART: [kat] SHA2-256
6,361,730 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
6,372,260 UART: [kat] ++
6,372,746 UART: [kat] sha1
6,383,155 UART: [kat] SHA2-256
6,385,857 UART: [kat] SHA2-384
6,391,093 UART: [kat] SHA2-512-ACC
6,393,457 UART: [kat] ECC-384
8,676,859 UART: [kat] HMAC-384Kdf
8,688,384 UART: [kat] LMS
9,878,470 UART: [kat] --
9,881,785 UART: [cold-reset] ++
9,883,616 UART: [fht] Storing FHT @ 0x50003400
9,895,161 UART: [idev] ++
9,895,741 UART: [idev] CDI.KEYID = 6
9,896,657 UART: [idev] SUBJECT.KEYID = 7
9,897,880 UART: [idev] UDS.KEYID = 0
9,899,544 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
10,049,477 UART: [idev] Erasing UDS.KEYID = 0
13,185,357 UART: [idev] Using Sha1 for KeyId Algorithm
13,207,018 UART: [idev] --
13,210,964 UART: [ldev] ++
13,211,533 UART: [ldev] CDI.KEYID = 6
13,212,474 UART: [ldev] SUBJECT.KEYID = 5
13,213,687 UART: [ldev] AUTHORITY.KEYID = 7
13,214,922 UART: [ldev] FE.KEYID = 1
13,226,253 UART: [ldev] Erasing FE.KEYID = 1
16,514,350 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
18,809,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
18,824,237 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
18,839,057 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
18,853,579 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
18,872,301 UART: [ldev] --
18,877,809 UART: [fwproc] Waiting for Commands...
18,879,809 UART: [fwproc] Received command 0x46574c44
18,882,006 UART: [fwproc] Received Image of size 119428 bytes
22,999,686 UART: [fwproc] Image verified using Vendor ECC Key Index 0
23,070,631 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
23,143,823 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
23,474,587 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,336 writing to cptra_bootfsm_go
4,133,172 ready_for_fw is high
4,133,810 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,176,653 >>> mbox cmd response: success
23,820,380 UART:
23,820,785 UART: Running Caliptra FMC ...
23,821,906 UART:
23,822,068 UART: [state] CFI Enabled
23,829,641 UART: [fht] FMC Alias Private Key: 7
26,169,661 UART: [art] Extend RT PCRs Done
26,170,912 UART: [art] Lock RT PCRs Done
26,172,668 UART: [art] Populate DV Done
26,178,143 UART: [fht] FMC Alias Private Key: 7
26,179,855 UART: [art] Derive CDI
26,180,682 UART: [art] Store in slot 0x4
26,223,612 UART: [art] Derive Key Pair
26,224,620 UART: [art] Store priv key in slot 0x5
29,466,623 UART: [art] Derive Key Pair - Done
29,479,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,760,080 UART: [art] Erasing AUTHORITY.KEYID = 7
31,761,601 UART: [art] PUB.X = 4EEAB6C4E7FD1FB38F769E1BF87909FDCE1FBB8667E37E4AF023C7936FF75E0BA05778B639C81B3D1B5C8855718F4C2B
31,768,930 UART: [art] PUB.Y = 4E57DD56AEF212D802E764E657A1AD7FC9B8B636E0BC67BA17166C783C43A77FD5F3FEC0A050ADE8FD411C24A7B1BE2C
31,776,168 UART: [art] SIG.R = 2779872D5BFBB982D64E81C333E2DA35E83688671A2B0BB4A60378588FD3F567C9B54C9A17EE2D28140FF96CD8CC307E
31,783,627 UART: [art] SIG.S = 8255BF634F49A26EFAD5AB4C9CBE2E430CAA72031161B3A3C24AAED1FB97ABD27659B3686552874C8C252171D28B22F6
33,089,048 UART: Caliptra RT
33,089,785 UART: [state] CFI Enabled
33,221,893 UART: [rt] RT listening for mailbox commands...
33,223,754 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,253,493 UART: [rt]cmd =0x46504c54, len=4
33,254,862 >>> mbox cmd response data (8 bytes)
33,255,975 UART: [rt] FIPS self test
33,256,925 UART: [kat] ++
33,257,383 UART: [kat] sha1
33,261,789 UART: [kat] SHA2-256
33,263,674 UART: [kat] SHA2-384
33,266,639 UART: [kat] SHA2-512-ACC
33,268,939 UART: [kat] ECC-384
34,232,502 UART: Fatal Error: 0x90040004
34,267,879 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,417,918 >>> mbox cmd response: failed
34,418,537 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
34,568,418 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
9,492,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
23,540,685 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,102 writing to cptra_bootfsm_go
192,243 UART:
192,610 UART: Running Caliptra ROM ...
193,814 UART:
193,972 UART: [state] CFI Enabled
262,735 UART: [state] LifecycleState = Unprovisioned
264,636 UART: [state] DebugLocked = No
266,764 UART: [state] WD Timer not started. Device not locked for debugging
270,883 UART: [kat] SHA2-256
450,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,323 UART: [kat] ++
461,868 UART: [kat] sha1
473,393 UART: [kat] SHA2-256
476,121 UART: [kat] SHA2-384
482,609 UART: [kat] SHA2-512-ACC
484,979 UART: [kat] ECC-384
2,947,804 UART: [kat] HMAC-384Kdf
2,973,212 UART: [kat] LMS
3,449,700 UART: [kat] --
3,453,917 UART: [cold-reset] ++
3,455,506 UART: [fht] FHT @ 0x50003400
3,466,632 UART: [idev] ++
3,467,205 UART: [idev] CDI.KEYID = 6
3,468,110 UART: [idev] SUBJECT.KEYID = 7
3,469,311 UART: [idev] UDS.KEYID = 0
3,470,283 ready_for_fw is high
3,470,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,706 UART: [idev] Erasing UDS.KEYID = 0
5,988,576 UART: [idev] Sha1 KeyId Algorithm
6,010,849 UART: [idev] --
6,014,531 UART: [ldev] ++
6,015,113 UART: [ldev] CDI.KEYID = 6
6,016,089 UART: [ldev] SUBJECT.KEYID = 5
6,017,258 UART: [ldev] AUTHORITY.KEYID = 7
6,018,500 UART: [ldev] FE.KEYID = 1
6,049,312 UART: [ldev] Erasing FE.KEYID = 1
8,554,252 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,457 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,324,260 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,360,097 UART: [ldev] --
10,365,053 UART: [fwproc] Wait for Commands...
10,367,100 UART: [fwproc] Recv command 0x46574c44
10,369,102 UART: [fwproc] Recv'd Img size: 119428 bytes
13,869,189 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,512 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,551 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,392 >>> mbox cmd response: success
14,358,123 UART: [afmc] ++
14,358,719 UART: [afmc] CDI.KEYID = 6
14,359,695 UART: [afmc] SUBJECT.KEYID = 7
14,361,092 UART: [afmc] AUTHORITY.KEYID = 5
16,890,151 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,631,565 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,633,751 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,649,613 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,665,620 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,681,335 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,706,897 UART: [afmc] --
18,711,090 UART: [cold-reset] --
18,715,015 UART: [state] Locking Datavault
18,718,974 UART: [state] Locking PCR0, PCR1 and PCR31
18,720,735 UART: [state] Locking ICCM
18,721,971 UART: [exit] Launching FMC @ 0x40000130
18,730,368 UART:
18,730,617 UART: Running Caliptra FMC ...
18,731,722 UART:
18,731,889 UART: [state] CFI Enabled
18,789,659 UART: [fht] FMC Alias Private Key: 7
20,556,280 UART: [art] Extend RT PCRs Done
20,557,507 UART: [art] Lock RT PCRs Done
20,558,701 UART: [art] Populate DV Done
20,564,117 UART: [fht] FMC Alias Private Key: 7
20,565,770 UART: [art] Derive CDI
20,566,588 UART: [art] Store in slot 0x4
20,622,496 UART: [art] Derive Key Pair
20,623,542 UART: [art] Store priv key in slot 0x5
23,085,937 UART: [art] Derive Key Pair - Done
23,098,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,812,660 UART: [art] Erasing AUTHORITY.KEYID = 7
24,814,165 UART: [art] PUB.X = D354645FF8006A30996E6EB125669A68B9F82D1C5B4040D62F220B6868DA788FF44EE1A90CDB0335F49667026DF21ADC
24,821,421 UART: [art] PUB.Y = 4C10CAF742DE9DE1DA8F216A49616B986FFDCE2ABFC89E94805229F528AE0A7B49C394247F95BFB36DC7EAD3F98889D7
24,828,720 UART: [art] SIG.R = 1AA860FE708079161E07342F79F3AF3B072EAFAA1B51DD5C36ABCFFBA3CB2EC1BAB7A6AE841E6A5192E2C5231FB96486
24,836,130 UART: [art] SIG.S = F4AADA338DA7D85CD3A1CBEB6BF176F43335A25F843F9B82453369A92A7A179F8BAA69F17BFC390FCB88D057DB2FED26
25,815,208 UART: Caliptra RT
25,815,928 UART: [state] CFI Enabled
25,996,746 UART: [rt] RT listening for mailbox commands...
25,998,630 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,028,477 UART: [rt]cmd =0x46504c54, len=4
26,029,848 >>> mbox cmd response data (8 bytes)
26,030,848 UART: [rt] FIPS self test
26,031,744 UART: [kat] ++
26,032,198 UART: [kat] sha1
26,036,550 UART: [kat] SHA2-256
26,038,491 UART: [kat] SHA2-384
26,041,349 UART: [kat] SHA2-512-ACC
26,043,581 UART: [kat] ECC-384
26,778,690 UART: Fatal Error: 0x90040004
26,813,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,963,902 >>> mbox cmd response: failed
26,964,534 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,114,513 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
190,018 UART:
190,318 UART: Running Caliptra ROM ...
191,430 UART:
191,602 UART: [state] CFI Enabled
255,582 UART: [state] LifecycleState = Unprovisioned
257,498 UART: [state] DebugLocked = No
260,335 UART: [state] WD Timer not started. Device not locked for debugging
264,502 UART: [kat] SHA2-256
444,171 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,966 UART: [kat] ++
455,423 UART: [kat] sha1
467,870 UART: [kat] SHA2-256
470,559 UART: [kat] SHA2-384
476,615 UART: [kat] SHA2-512-ACC
479,015 UART: [kat] ECC-384
2,941,772 UART: [kat] HMAC-384Kdf
2,963,111 UART: [kat] LMS
3,439,607 UART: [kat] --
3,444,141 UART: [cold-reset] ++
3,446,675 UART: [fht] FHT @ 0x50003400
3,458,737 UART: [idev] ++
3,459,314 UART: [idev] CDI.KEYID = 6
3,460,256 UART: [idev] SUBJECT.KEYID = 7
3,461,529 UART: [idev] UDS.KEYID = 0
3,463,020 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,613,460 UART: [idev] Erasing UDS.KEYID = 0
5,976,816 UART: [idev] Sha1 KeyId Algorithm
6,000,648 UART: [idev] --
6,004,385 UART: [ldev] ++
6,004,987 UART: [ldev] CDI.KEYID = 6
6,005,904 UART: [ldev] SUBJECT.KEYID = 5
6,007,075 UART: [ldev] AUTHORITY.KEYID = 7
6,008,373 UART: [ldev] FE.KEYID = 1
6,049,551 UART: [ldev] Erasing FE.KEYID = 1
8,553,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,292,170 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,308,037 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,323,885 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,339,438 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,362,286 UART: [ldev] --
10,368,533 UART: [fwproc] Wait for Commands...
10,370,516 UART: [fwproc] Recv command 0x46574c44
10,372,521 UART: [fwproc] Recv'd Img size: 119428 bytes
13,863,306 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,945,004 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,018,044 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,349,042 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,184 writing to cptra_bootfsm_go
3,460,290 ready_for_fw is high
3,460,732 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,232,594 >>> mbox cmd response: success
18,513,860 UART:
18,514,259 UART: Running Caliptra FMC ...
18,515,478 UART:
18,515,655 UART: [state] CFI Enabled
18,582,933 UART: [fht] FMC Alias Private Key: 7
20,349,479 UART: [art] Extend RT PCRs Done
20,350,713 UART: [art] Lock RT PCRs Done
20,352,399 UART: [art] Populate DV Done
20,357,776 UART: [fht] FMC Alias Private Key: 7
20,359,378 UART: [art] Derive CDI
20,360,196 UART: [art] Store in slot 0x4
20,415,515 UART: [art] Derive Key Pair
20,416,562 UART: [art] Store priv key in slot 0x5
22,879,524 UART: [art] Derive Key Pair - Done
22,892,662 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,604,172 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,692 UART: [art] PUB.X = 6743AEB4953BB800449D2C5A6DD8534135422FF1401E47B1FBE650502E2E13684D60A040ABE422E65CCA32F214B1E160
24,612,923 UART: [art] PUB.Y = D3D149172BA98010807636B4245FC943E6F9BB2D496F29CC62A30A622D5B6F472A52F6BDD9D8FF239436A27DCD8A7C10
24,620,203 UART: [art] SIG.R = DFE57317F46E7143D9592253158A45A6593392DCE3A4F3DE60A5A673C3044683BCC59B6FB806FEE734F0FEC2433099D1
24,627,574 UART: [art] SIG.S = AA80C1DC66A479AC54F6F1A48563C86E78C5019355B048F656BBD40C4F56BDA10B472829D36E65E543113A18D044A558
25,606,111 UART: Caliptra RT
25,606,834 UART: [state] CFI Enabled
25,787,598 UART: [rt] RT listening for mailbox commands...
25,789,460 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,819,163 UART: [rt]cmd =0x46504c54, len=4
25,820,689 >>> mbox cmd response data (8 bytes)
25,821,540 UART: [rt] FIPS self test
25,822,424 UART: [kat] ++
25,822,927 UART: [kat] sha1
25,827,549 UART: [kat] SHA2-256
25,829,440 UART: [kat] SHA2-384
25,832,330 UART: [kat] SHA2-512-ACC
25,834,622 UART: [kat] ECC-384
26,569,006 UART: Fatal Error: 0x90040004
26,604,304 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,754,337 >>> mbox cmd response: failed
26,755,006 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,904,996 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,453,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,265,329 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,317 writing to cptra_bootfsm_go
192,667 UART:
193,036 UART: Running Caliptra ROM ...
194,248 UART:
603,798 UART: [state] CFI Enabled
616,774 UART: [state] LifecycleState = Unprovisioned
618,729 UART: [state] DebugLocked = No
620,548 UART: [state] WD Timer not started. Device not locked for debugging
625,178 UART: [kat] SHA2-256
804,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,632 UART: [kat] ++
816,193 UART: [kat] sha1
827,078 UART: [kat] SHA2-256
829,812 UART: [kat] SHA2-384
834,244 UART: [kat] SHA2-512-ACC
836,631 UART: [kat] ECC-384
3,278,937 UART: [kat] HMAC-384Kdf
3,290,276 UART: [kat] LMS
3,766,818 UART: [kat] --
3,770,604 UART: [cold-reset] ++
3,772,895 UART: [fht] FHT @ 0x50003400
3,784,305 UART: [idev] ++
3,784,871 UART: [idev] CDI.KEYID = 6
3,785,756 UART: [idev] SUBJECT.KEYID = 7
3,787,075 UART: [idev] UDS.KEYID = 0
3,787,979 ready_for_fw is high
3,788,191 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,938,187 UART: [idev] Erasing UDS.KEYID = 0
6,264,400 UART: [idev] Sha1 KeyId Algorithm
6,289,085 UART: [idev] --
6,294,437 UART: [ldev] ++
6,295,008 UART: [ldev] CDI.KEYID = 6
6,295,897 UART: [ldev] SUBJECT.KEYID = 5
6,297,117 UART: [ldev] AUTHORITY.KEYID = 7
6,298,413 UART: [ldev] FE.KEYID = 1
6,311,684 UART: [ldev] Erasing FE.KEYID = 1
8,785,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,162 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,022 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,603 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,624 UART: [ldev] --
10,581,687 UART: [fwproc] Wait for Commands...
10,583,543 UART: [fwproc] Recv command 0x46574c44
10,585,542 UART: [fwproc] Recv'd Img size: 119428 bytes
14,086,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,161,987 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,016 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,565,599 >>> mbox cmd response: success
14,570,048 UART: [afmc] ++
14,570,651 UART: [afmc] CDI.KEYID = 6
14,571,539 UART: [afmc] SUBJECT.KEYID = 7
14,572,812 UART: [afmc] AUTHORITY.KEYID = 5
17,073,475 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,796,932 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,799,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,814,979 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,831,014 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,846,601 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,871,334 UART: [afmc] --
18,875,696 UART: [cold-reset] --
18,877,835 UART: [state] Locking Datavault
18,883,077 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,802 UART: [state] Locking ICCM
18,886,609 UART: [exit] Launching FMC @ 0x40000130
18,895,009 UART:
18,895,259 UART: Running Caliptra FMC ...
18,896,365 UART:
18,896,532 UART: [state] CFI Enabled
18,904,747 UART: [fht] FMC Alias Private Key: 7
20,670,981 UART: [art] Extend RT PCRs Done
20,672,211 UART: [art] Lock RT PCRs Done
20,673,848 UART: [art] Populate DV Done
20,679,376 UART: [fht] FMC Alias Private Key: 7
20,681,078 UART: [art] Derive CDI
20,681,930 UART: [art] Store in slot 0x4
20,724,383 UART: [art] Derive Key Pair
20,725,425 UART: [art] Store priv key in slot 0x5
23,152,707 UART: [art] Derive Key Pair - Done
23,165,817 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,871,907 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,417 UART: [art] PUB.X = 5D225294170825DB2B722573288214AE24FB7E1FF0A853CD0B86010525073B912BADEDC8E132D366043B18B027678CA5
24,880,658 UART: [art] PUB.Y = ADD8A17DBC7BCC551AF8F7CB51506774BBE8D79DBD103B1F67CE3F52C374C4D749FFEC800DEABA994048F48B6EB9B3B8
24,887,951 UART: [art] SIG.R = 1EC8DC10F3266520A1B46A1A50CA544113B673B1A2BB12FD5FCC2F22863C27A75B92E1A50C711E8EEBFA37939D535C97
24,895,337 UART: [art] SIG.S = 5CA1EABDF210D82B20C5944E71F58675BEFA5B71EF98D90848E3DEA16D041E089C7FFF1683E9B8902A02F3866BFEF917
25,874,141 UART: Caliptra RT
25,874,859 UART: [state] CFI Enabled
26,007,240 UART: [rt] RT listening for mailbox commands...
26,009,091 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,038,846 UART: [rt]cmd =0x46504c54, len=4
26,040,544 >>> mbox cmd response data (8 bytes)
26,041,735 UART: [rt] FIPS self test
26,042,685 UART: [kat] ++
26,043,144 UART: [kat] sha1
26,047,444 UART: [kat] SHA2-256
26,049,331 UART: [kat] SHA2-384
26,052,350 UART: [kat] SHA2-512-ACC
26,054,648 UART: [kat] ECC-384
26,776,956 UART: Fatal Error: 0x90040004
26,812,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,962,338 >>> mbox cmd response: failed
26,962,970 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,112,707 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
190,072 UART:
190,364 UART: Running Caliptra ROM ...
191,496 UART:
13,424,989 UART: [state] CFI Enabled
13,438,966 UART: [state] LifecycleState = Unprovisioned
13,440,887 UART: [state] DebugLocked = No
13,443,307 UART: [state] WD Timer not started. Device not locked for debugging
13,446,531 UART: [kat] SHA2-256
13,626,157 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
13,636,953 UART: [kat] ++
13,637,438 UART: [kat] sha1
13,648,223 UART: [kat] SHA2-256
13,650,920 UART: [kat] SHA2-384
13,657,288 UART: [kat] SHA2-512-ACC
13,659,690 UART: [kat] ECC-384
16,098,272 UART: [kat] HMAC-384Kdf
16,109,700 UART: [kat] LMS
16,586,175 UART: [kat] --
16,591,210 UART: [cold-reset] ++
16,593,363 UART: [fht] FHT @ 0x50003400
16,605,261 UART: [idev] ++
16,605,828 UART: [idev] CDI.KEYID = 6
16,606,770 UART: [idev] SUBJECT.KEYID = 7
16,608,040 UART: [idev] UDS.KEYID = 0
16,609,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,759,529 UART: [idev] Erasing UDS.KEYID = 0
19,089,333 UART: [idev] Sha1 KeyId Algorithm
19,112,354 UART: [idev] --
19,118,614 UART: [ldev] ++
19,119,184 UART: [ldev] CDI.KEYID = 6
19,120,121 UART: [ldev] SUBJECT.KEYID = 5
19,121,339 UART: [ldev] AUTHORITY.KEYID = 7
19,122,575 UART: [ldev] FE.KEYID = 1
19,133,266 UART: [ldev] Erasing FE.KEYID = 1
21,611,407 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,332,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,348,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,364,463 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,380,036 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,400,924 UART: [ldev] --
23,405,497 UART: [fwproc] Wait for Commands...
23,407,757 UART: [fwproc] Recv command 0x46574c44
23,409,751 UART: [fwproc] Recv'd Img size: 119428 bytes
26,905,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,979,346 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,052,360 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,383,669 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
3,781,163 ready_for_fw is high
3,781,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,465,134 >>> mbox cmd response: success
18,720,933 UART:
18,721,334 UART: Running Caliptra FMC ...
18,722,456 UART:
18,722,619 UART: [state] CFI Enabled
18,730,966 UART: [fht] FMC Alias Private Key: 7
20,496,568 UART: [art] Extend RT PCRs Done
20,497,805 UART: [art] Lock RT PCRs Done
20,499,328 UART: [art] Populate DV Done
20,504,662 UART: [fht] FMC Alias Private Key: 7
20,506,370 UART: [art] Derive CDI
20,507,216 UART: [art] Store in slot 0x4
20,549,833 UART: [art] Derive Key Pair
20,550,877 UART: [art] Store priv key in slot 0x5
22,978,058 UART: [art] Derive Key Pair - Done
22,991,277 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,697,804 UART: [art] Erasing AUTHORITY.KEYID = 7
24,699,317 UART: [art] PUB.X = 09D458907EEC3E31D9492735ED0E6B0C78C9BB29CCBB49696E073ABE7B46C9369A5292EC23BD87135A309C04C1D5604A
24,706,632 UART: [art] PUB.Y = 5082273E12258C4A6AB8FAD5D65807540453FC9969793B5CCF0F9EB844B56441D7678370C9C4ECBB605CD632A38B08A2
24,713,872 UART: [art] SIG.R = 404F2F3E2164A51133AE47169D27C52914AD668A163360AD9E461C9A99697794D10B915F0571F453721BDE80CD8C2700
24,721,219 UART: [art] SIG.S = FAE0A2CF43868F96CEE2A1829CBD795DFE066AF3AF9AE5402F44C8D58D02715E9A1675D086CC544ECDEAEDB131D64687
25,700,139 UART: Caliptra RT
25,700,856 UART: [state] CFI Enabled
25,833,726 UART: [rt] RT listening for mailbox commands...
25,835,584 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,865,545 UART: [rt]cmd =0x46504c54, len=4
25,867,030 >>> mbox cmd response data (8 bytes)
25,868,113 UART: [rt] FIPS self test
25,869,062 UART: [kat] ++
25,869,568 UART: [kat] sha1
25,873,889 UART: [kat] SHA2-256
25,875,814 UART: [kat] SHA2-384
25,878,835 UART: [kat] SHA2-512-ACC
25,881,076 UART: [kat] ECC-384
26,603,268 UART: Fatal Error: 0x90040004
26,638,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,788,489 >>> mbox cmd response: failed
26,789,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,939,080 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
16,768,470 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,437,143 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,178 UART:
192,556 UART: Running Caliptra ROM ...
193,715 UART:
193,865 UART: [state] CFI Enabled
266,689 UART: [state] LifecycleState = Unprovisioned
269,110 UART: [state] DebugLocked = No
271,222 UART: [state] WD Timer not started. Device not locked for debugging
275,335 UART: [kat] SHA2-256
465,176 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,971 UART: [kat] ++
476,451 UART: [kat] sha1
487,258 UART: [kat] SHA2-256
490,275 UART: [kat] SHA2-384
496,388 UART: [kat] SHA2-512-ACC
498,999 UART: [kat] ECC-384
2,945,401 UART: [kat] HMAC-384Kdf
2,970,583 UART: [kat] LMS
3,502,364 UART: [kat] --
3,508,529 UART: [cold-reset] ++
3,510,625 UART: [fht] FHT @ 0x50003400
3,521,970 UART: [idev] ++
3,522,682 UART: [idev] CDI.KEYID = 6
3,523,640 UART: [idev] SUBJECT.KEYID = 7
3,524,822 UART: [idev] UDS.KEYID = 0
3,525,727 ready_for_fw is high
3,525,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,127 UART: [idev] Erasing UDS.KEYID = 0
6,027,664 UART: [idev] Sha1 KeyId Algorithm
6,049,718 UART: [idev] --
6,054,528 UART: [ldev] ++
6,055,218 UART: [ldev] CDI.KEYID = 6
6,056,134 UART: [ldev] SUBJECT.KEYID = 5
6,057,220 UART: [ldev] AUTHORITY.KEYID = 7
6,058,520 UART: [ldev] FE.KEYID = 1
6,099,826 UART: [ldev] Erasing FE.KEYID = 1
8,607,040 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,336,724 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,351,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,792 UART: [ldev] --
10,407,601 UART: [fwproc] Wait for Commands...
10,410,196 UART: [fwproc] Recv command 0x46574c44
10,412,507 UART: [fwproc] Recv'd Img size: 119428 bytes
13,926,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,125,947 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,691,690 >>> mbox cmd response: success
14,696,329 UART: [afmc] ++
14,697,033 UART: [afmc] CDI.KEYID = 6
14,698,174 UART: [afmc] SUBJECT.KEYID = 7
14,699,718 UART: [afmc] AUTHORITY.KEYID = 5
17,232,185 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,975,007 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,976,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,991,966 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,007,143 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,022,057 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,045,986 UART: [afmc] --
19,048,775 UART: [cold-reset] --
19,052,249 UART: [state] Locking Datavault
19,057,923 UART: [state] Locking PCR0, PCR1 and PCR31
19,060,129 UART: [state] Locking ICCM
19,063,094 UART: [exit] Launching FMC @ 0x40000130
19,071,770 UART:
19,072,018 UART: Running Caliptra FMC ...
19,073,154 UART:
19,073,318 UART: [state] CFI Enabled
19,133,365 UART: [fht] FMC Alias Private Key: 7
20,899,931 UART: [art] Extend RT PCRs Done
20,901,164 UART: [art] Lock RT PCRs Done
20,902,772 UART: [art] Populate DV Done
20,908,244 UART: [fht] FMC Alias Private Key: 7
20,909,729 UART: [art] Derive CDI
20,910,470 UART: [art] Store in slot 0x4
20,966,155 UART: [art] Derive Key Pair
20,967,156 UART: [art] Store priv key in slot 0x5
23,429,870 UART: [art] Derive Key Pair - Done
23,443,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,156,069 UART: [art] Erasing AUTHORITY.KEYID = 7
25,157,587 UART: [art] PUB.X = 3F75DF1D5C99E1DD0B10BB9252C439F7B7833E7AD5209A41BD6509672B4640804B96CC7CE9D8ABB13FE5BB68C4088EE5
25,164,841 UART: [art] PUB.Y = 5C56F1B1040B66BAC40AE6F5CA157A2B56402529D1DE3612A32E0C4C86AD855032BE8098A45EFB04C67953C9C26D2A04
25,172,109 UART: [art] SIG.R = 15386F9995EE1823A548D1F20335DE3ED13B34B46F24899BDF9039447A1F078FD24D2EA598627DE1AFD119EFA9CF5CF1
25,179,511 UART: [art] SIG.S = 2319D228E0040286D79135FE0C1EBEFCA8DED049C81FDBE263E0816AFC7476E64499773C21E48F09E13AE52AE30A1006
26,158,485 UART: Caliptra RT
26,159,178 UART: [state] CFI Enabled
26,339,406 UART: [rt] RT listening for mailbox commands...
26,341,288 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,371,042 UART: [rt]cmd =0x46504c54, len=4
26,372,587 >>> mbox cmd response data (8 bytes)
26,373,934 UART: [rt] FIPS self test
26,374,880 UART: [kat] ++
26,375,339 UART: [kat] sha1
26,379,745 UART: [kat] SHA2-256
26,381,689 UART: [kat] SHA2-384
26,384,708 UART: [kat] SHA2-512-ACC
26,386,963 UART: [kat] ECC-384
27,122,135 UART: Fatal Error: 0x90040004
27,157,521 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,307,641 >>> mbox cmd response: failed
27,308,236 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,458,138 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,067 UART:
190,361 UART: Running Caliptra ROM ...
191,418 UART:
191,566 UART: [state] CFI Enabled
257,555 UART: [state] LifecycleState = Unprovisioned
259,963 UART: [state] DebugLocked = No
262,915 UART: [state] WD Timer not started. Device not locked for debugging
267,678 UART: [kat] SHA2-256
457,545 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
468,319 UART: [kat] ++
468,878 UART: [kat] sha1
480,408 UART: [kat] SHA2-256
483,463 UART: [kat] SHA2-384
488,648 UART: [kat] SHA2-512-ACC
491,267 UART: [kat] ECC-384
2,939,856 UART: [kat] HMAC-384Kdf
2,962,276 UART: [kat] LMS
3,494,045 UART: [kat] --
3,498,849 UART: [cold-reset] ++
3,499,764 UART: [fht] FHT @ 0x50003400
3,511,967 UART: [idev] ++
3,512,837 UART: [idev] CDI.KEYID = 6
3,513,732 UART: [idev] SUBJECT.KEYID = 7
3,514,785 UART: [idev] UDS.KEYID = 0
3,516,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,666,475 UART: [idev] Erasing UDS.KEYID = 0
6,021,035 UART: [idev] Sha1 KeyId Algorithm
6,042,976 UART: [idev] --
6,047,520 UART: [ldev] ++
6,048,207 UART: [ldev] CDI.KEYID = 6
6,049,097 UART: [ldev] SUBJECT.KEYID = 5
6,050,208 UART: [ldev] AUTHORITY.KEYID = 7
6,051,504 UART: [ldev] FE.KEYID = 1
6,091,675 UART: [ldev] Erasing FE.KEYID = 1
8,594,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,333,496 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,719 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,003 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,400,987 UART: [ldev] --
10,405,849 UART: [fwproc] Wait for Commands...
10,408,926 UART: [fwproc] Recv command 0x46574c44
10,411,212 UART: [fwproc] Recv'd Img size: 119428 bytes
13,914,638 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,990,417 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,114,071 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,678,779 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,440,807 ready_for_fw is high
3,441,410 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,841,877 >>> mbox cmd response: success
19,135,874 UART:
19,136,269 UART: Running Caliptra FMC ...
19,137,446 UART:
19,137,610 UART: [state] CFI Enabled
19,203,141 UART: [fht] FMC Alias Private Key: 7
20,969,521 UART: [art] Extend RT PCRs Done
20,970,747 UART: [art] Lock RT PCRs Done
20,972,405 UART: [art] Populate DV Done
20,978,094 UART: [fht] FMC Alias Private Key: 7
20,979,714 UART: [art] Derive CDI
20,980,651 UART: [art] Store in slot 0x4
21,035,603 UART: [art] Derive Key Pair
21,036,622 UART: [art] Store priv key in slot 0x5
23,498,859 UART: [art] Derive Key Pair - Done
23,511,541 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,534 UART: [art] Erasing AUTHORITY.KEYID = 7
25,226,073 UART: [art] PUB.X = E8C077C4595DD29D281D046BC4027A96DBA7DC3D40ECD1EC819114F66DB7825F3C56DAE5D576F0E8C4B608E7E8AA654E
25,233,363 UART: [art] PUB.Y = EEFFD12B63320929EB1F0D23EF0C2D8C129FAADC60D89454D54EF129F31F4A44E174266809CD35E6535F426269A73DC5
25,240,573 UART: [art] SIG.R = F9797E544D52313BD7072828023EDB16AB4F1836253D737113C067300A9493D331C978276ED7572A1F67962B4A0B6383
25,247,946 UART: [art] SIG.S = 8C962056E594379A7386E025109A92D2D7C87D4932A7AE483CC4BD23A7CDA490B1FE7C3996E2711219C2722F632B3166
26,227,494 UART: Caliptra RT
26,228,193 UART: [state] CFI Enabled
26,409,382 UART: [rt] RT listening for mailbox commands...
26,411,261 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,441,003 UART: [rt]cmd =0x46504c54, len=4
26,442,539 >>> mbox cmd response data (8 bytes)
26,443,884 UART: [rt] FIPS self test
26,444,848 UART: [kat] ++
26,445,305 UART: [kat] sha1
26,449,764 UART: [kat] SHA2-256
26,451,698 UART: [kat] SHA2-384
26,454,443 UART: [kat] SHA2-512-ACC
26,456,738 UART: [kat] ECC-384
27,190,848 UART: Fatal Error: 0x90040004
27,226,266 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,376,202 >>> mbox cmd response: failed
27,376,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,526,807 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,429,328 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,833,241 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
192,644 UART:
192,994 UART: Running Caliptra ROM ...
194,192 UART:
603,714 UART: [state] CFI Enabled
620,307 UART: [state] LifecycleState = Unprovisioned
622,613 UART: [state] DebugLocked = No
625,592 UART: [state] WD Timer not started. Device not locked for debugging
630,363 UART: [kat] SHA2-256
820,207 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,999 UART: [kat] ++
831,528 UART: [kat] sha1
842,971 UART: [kat] SHA2-256
846,049 UART: [kat] SHA2-384
853,542 UART: [kat] SHA2-512-ACC
856,134 UART: [kat] ECC-384
3,299,075 UART: [kat] HMAC-384Kdf
3,311,693 UART: [kat] LMS
3,843,468 UART: [kat] --
3,848,035 UART: [cold-reset] ++
3,849,981 UART: [fht] FHT @ 0x50003400
3,861,487 UART: [idev] ++
3,862,202 UART: [idev] CDI.KEYID = 6
3,863,124 UART: [idev] SUBJECT.KEYID = 7
3,864,306 UART: [idev] UDS.KEYID = 0
3,865,234 ready_for_fw is high
3,865,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,015,407 UART: [idev] Erasing UDS.KEYID = 0
6,342,498 UART: [idev] Sha1 KeyId Algorithm
6,364,876 UART: [idev] --
6,368,497 UART: [ldev] ++
6,369,187 UART: [ldev] CDI.KEYID = 6
6,370,099 UART: [ldev] SUBJECT.KEYID = 5
6,371,267 UART: [ldev] AUTHORITY.KEYID = 7
6,372,504 UART: [ldev] FE.KEYID = 1
6,383,052 UART: [ldev] Erasing FE.KEYID = 1
8,859,762 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,202 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,624,679 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,494 UART: [ldev] --
10,651,179 UART: [fwproc] Wait for Commands...
10,652,847 UART: [fwproc] Recv command 0x46574c44
10,655,170 UART: [fwproc] Recv'd Img size: 119428 bytes
14,160,278 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,905 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,535 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,924,540 >>> mbox cmd response: success
14,929,359 UART: [afmc] ++
14,930,057 UART: [afmc] CDI.KEYID = 6
14,931,222 UART: [afmc] SUBJECT.KEYID = 7
14,932,757 UART: [afmc] AUTHORITY.KEYID = 5
17,433,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,158,247 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,160,212 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,175,280 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,190,475 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,205,380 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,229,154 UART: [afmc] --
19,233,453 UART: [cold-reset] --
19,236,674 UART: [state] Locking Datavault
19,241,764 UART: [state] Locking PCR0, PCR1 and PCR31
19,243,957 UART: [state] Locking ICCM
19,246,305 UART: [exit] Launching FMC @ 0x40000130
19,254,973 UART:
19,255,209 UART: Running Caliptra FMC ...
19,256,241 UART:
19,256,390 UART: [state] CFI Enabled
19,264,731 UART: [fht] FMC Alias Private Key: 7
21,030,318 UART: [art] Extend RT PCRs Done
21,031,545 UART: [art] Lock RT PCRs Done
21,033,363 UART: [art] Populate DV Done
21,038,778 UART: [fht] FMC Alias Private Key: 7
21,040,432 UART: [art] Derive CDI
21,041,253 UART: [art] Store in slot 0x4
21,083,581 UART: [art] Derive Key Pair
21,084,587 UART: [art] Store priv key in slot 0x5
23,511,738 UART: [art] Derive Key Pair - Done
23,525,001 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,231,529 UART: [art] Erasing AUTHORITY.KEYID = 7
25,233,037 UART: [art] PUB.X = 8A347B3BC72C0245908CD448AA2E6EEED39929D65C807B060FF51F69157CC20563BD202372522DD7F7BFB8B789029748
25,240,268 UART: [art] PUB.Y = 7B8E2A10E6714CE77102E5EB0135ED99E2350F8CF1D9A193E23D85883FE47525D545AF49E63A5305D6DB96F401F641EF
25,247,534 UART: [art] SIG.R = 351498653044DE409582C5B2272CF20B8B76B83E194E7B146419531D24A61C64B2D9A360334036ED1875ECBA4FC5A7D7
25,254,914 UART: [art] SIG.S = C952138B09EB63354FFC230C85BFF10BB6F4DDEE96A928172E23A8E562EDC477689F1DC16F0939179FB6CBE333AB8539
26,234,046 UART: Caliptra RT
26,234,762 UART: [state] CFI Enabled
26,367,706 UART: [rt] RT listening for mailbox commands...
26,369,553 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,399,173 UART: [rt]cmd =0x46504c54, len=4
26,400,627 >>> mbox cmd response data (8 bytes)
26,402,024 UART: [rt] FIPS self test
26,402,979 UART: [kat] ++
26,403,428 UART: [kat] sha1
26,407,610 UART: [kat] SHA2-256
26,409,542 UART: [kat] SHA2-384
26,412,563 UART: [kat] SHA2-512-ACC
26,414,855 UART: [kat] ECC-384
27,137,684 UART: Fatal Error: 0x90040004
27,172,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,322,963 >>> mbox cmd response: failed
27,323,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,473,590 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
189,989 UART:
190,280 UART: Running Caliptra ROM ...
191,307 UART:
13,056,389 UART: [state] CFI Enabled
13,069,201 UART: [state] LifecycleState = Unprovisioned
13,071,628 UART: [state] DebugLocked = No
13,073,109 UART: [state] WD Timer not started. Device not locked for debugging
13,076,823 UART: [kat] SHA2-256
13,266,720 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,277,481 UART: [kat] ++
13,278,004 UART: [kat] sha1
13,288,899 UART: [kat] SHA2-256
13,291,894 UART: [kat] SHA2-384
13,298,113 UART: [kat] SHA2-512-ACC
13,300,683 UART: [kat] ECC-384
15,743,425 UART: [kat] HMAC-384Kdf
15,755,814 UART: [kat] LMS
16,287,625 UART: [kat] --
16,291,887 UART: [cold-reset] ++
16,294,253 UART: [fht] FHT @ 0x50003400
16,307,072 UART: [idev] ++
16,307,761 UART: [idev] CDI.KEYID = 6
16,308,781 UART: [idev] SUBJECT.KEYID = 7
16,309,940 UART: [idev] UDS.KEYID = 0
16,311,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
16,461,642 UART: [idev] Erasing UDS.KEYID = 0
18,785,550 UART: [idev] Sha1 KeyId Algorithm
18,806,891 UART: [idev] --
18,812,798 UART: [ldev] ++
18,813,483 UART: [ldev] CDI.KEYID = 6
18,814,421 UART: [ldev] SUBJECT.KEYID = 5
18,815,583 UART: [ldev] AUTHORITY.KEYID = 7
18,816,815 UART: [ldev] FE.KEYID = 1
18,827,272 UART: [ldev] Erasing FE.KEYID = 1
21,309,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,029,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,045,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,060,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,075,389 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,096,511 UART: [ldev] --
23,102,215 UART: [fwproc] Wait for Commands...
23,104,755 UART: [fwproc] Recv command 0x46574c44
23,107,072 UART: [fwproc] Recv'd Img size: 119428 bytes
26,618,436 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
26,698,827 UART: [fwproc] Load FMC at address 0x40000000 len 20044
26,822,456 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
27,387,688 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
3,750,053 ready_for_fw is high
3,750,506 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,051,592 >>> mbox cmd response: success
19,304,857 UART:
19,305,270 UART: Running Caliptra FMC ...
19,306,430 UART:
19,306,593 UART: [state] CFI Enabled
19,314,680 UART: [fht] FMC Alias Private Key: 7
21,081,219 UART: [art] Extend RT PCRs Done
21,082,440 UART: [art] Lock RT PCRs Done
21,084,293 UART: [art] Populate DV Done
21,089,556 UART: [fht] FMC Alias Private Key: 7
21,091,158 UART: [art] Derive CDI
21,091,985 UART: [art] Store in slot 0x4
21,134,606 UART: [art] Derive Key Pair
21,135,651 UART: [art] Store priv key in slot 0x5
23,562,497 UART: [art] Derive Key Pair - Done
23,575,329 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,779 UART: [art] Erasing AUTHORITY.KEYID = 7
25,283,297 UART: [art] PUB.X = 0914DCE30C4477E2765FEDD1A2F7A82915EC1D212F74645925E34434F6AF1E70455AEFEFE7ED7C55D19275F432FEE375
25,290,581 UART: [art] PUB.Y = B5FF5FBFE5261A39C02DEB60797EB7DE0837E3F5D8487E8A5F641AF238FDD1D2DC48E4FCCD93F52FD06EA3B688A51BC8
25,297,836 UART: [art] SIG.R = 9E3E23BCB47C90A614F99D25AD498BC9FBC01C835F6902B3D5D68A8405F3A18A7CA034B4D860CF2FA3DC629730DA4EF1
25,305,279 UART: [art] SIG.S = E0CE978AEC8517DAB9DD5461942A85496472F65D51F759080D15A2BEFEA6850FBCA6B54DBAED42B4488A56257B22FC6F
26,283,965 UART: Caliptra RT
26,284,670 UART: [state] CFI Enabled
26,417,191 UART: [rt] RT listening for mailbox commands...
26,419,051 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,448,594 UART: [rt]cmd =0x46504c54, len=4
26,450,286 >>> mbox cmd response data (8 bytes)
26,451,550 UART: [rt] FIPS self test
26,452,497 UART: [kat] ++
26,452,948 UART: [kat] sha1
26,457,243 UART: [kat] SHA2-256
26,459,181 UART: [kat] SHA2-384
26,461,937 UART: [kat] SHA2-512-ACC
26,464,230 UART: [kat] ECC-384
27,186,829 UART: Fatal Error: 0x90040004
27,222,103 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,372,477 >>> mbox cmd response: failed
27,373,169 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,523,165 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
16,162,738 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
27,464,247 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,076 UART: [state] LifecycleState = Unprovisioned
85,731 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,913 UART: [kat] SHA2-256
881,844 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,959 UART: [kat] ++
886,111 UART: [kat] sha1
890,489 UART: [kat] SHA2-256
892,427 UART: [kat] SHA2-384
895,066 UART: [kat] SHA2-512-ACC
896,967 UART: [kat] ECC-384
902,562 UART: [kat] HMAC-384Kdf
907,206 UART: [kat] LMS
1,475,402 UART: [kat] --
1,476,203 UART: [cold-reset] ++
1,476,745 UART: [fht] Storing FHT @ 0x50003400
1,479,378 UART: [idev] ++
1,479,546 UART: [idev] CDI.KEYID = 6
1,479,906 UART: [idev] SUBJECT.KEYID = 7
1,480,330 UART: [idev] UDS.KEYID = 0
1,480,675 ready_for_fw is high
1,480,675 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,186 UART: [idev] Erasing UDS.KEYID = 0
1,505,486 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,264 UART: [idev] --
1,515,147 UART: [ldev] ++
1,515,315 UART: [ldev] CDI.KEYID = 6
1,515,678 UART: [ldev] SUBJECT.KEYID = 5
1,516,104 UART: [ldev] AUTHORITY.KEYID = 7
1,516,567 UART: [ldev] FE.KEYID = 1
1,521,789 UART: [ldev] Erasing FE.KEYID = 1
1,547,230 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,207 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,098 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,810 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,900 UART: [ldev] --
1,586,285 UART: [fwproc] Waiting for Commands...
1,587,092 UART: [fwproc] Received command 0x46574c44
1,587,883 UART: [fwproc] Received Image of size 119428 bytes
2,943,161 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,955 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,173 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,694 >>> mbox cmd response: success
3,144,708 UART: [afmc] ++
3,144,876 UART: [afmc] CDI.KEYID = 6
3,145,238 UART: [afmc] SUBJECT.KEYID = 7
3,145,663 UART: [afmc] AUTHORITY.KEYID = 5
3,180,342 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,524 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,304 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,013 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,896 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,579 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,629 UART: [afmc] --
3,223,643 UART: [cold-reset] --
3,224,485 UART: [state] Locking Datavault
3,225,590 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,194 UART: [state] Locking ICCM
3,226,762 UART: [exit] Launching FMC @ 0x40000130
3,232,092 UART:
3,232,108 UART: Running Caliptra FMC ...
3,232,516 UART:
3,232,570 UART: [state] CFI Enabled
3,243,046 UART: [fht] FMC Alias Private Key: 7
3,362,426 UART: [art] Extend RT PCRs Done
3,362,854 UART: [art] Lock RT PCRs Done
3,364,522 UART: [art] Populate DV Done
3,372,977 UART: [fht] FMC Alias Private Key: 7
3,373,941 UART: [art] Derive CDI
3,374,221 UART: [art] Store in slot 0x4
3,460,061 UART: [art] Derive Key Pair
3,460,421 UART: [art] Store priv key in slot 0x5
3,473,254 UART: [art] Derive Key Pair - Done
3,487,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,391 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,156 UART: [art] PUB.X = 7B251B8A01ED569770697961AE9C233AA1589845944FCEFF8D533818898370FE368992847E8D30634455B32FABFB0C1F
3,510,914 UART: [art] PUB.Y = 051C5F936423237B1F2FFE7F3DA92559933EE4071E467361645200E6A8EEFB5319615BD648A4DC1C6A1FA3C429BE616F
3,517,838 UART: [art] SIG.R = BB2F262C598CC4D529B0435F05C35280AFE5411A430865A34BC18B1BA94AEC37930744EDFD245EC139F0386C180D8854
3,524,598 UART: [art] SIG.S = DE01DEF6E1C6452F5D14F4D09446F9812FC56D82C7780FCAD5AC5FD69F2BE06D2D175ED47D25919EBF7B0445010F1F0A
3,548,886 UART: Caliptra RT
3,549,137 UART: [state] CFI Enabled
3,668,732 UART: [rt] RT listening for mailbox commands...
3,669,395 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,292 UART: [rt]cmd =0x46504c54, len=4
3,700,508 >>> mbox cmd response data (8 bytes)
3,700,871 UART: [rt] FIPS self test
3,701,199 UART: [kat] ++
3,701,351 UART: [kat] sha1
3,705,569 UART: [kat] SHA2-256
3,707,591 UART: [kat] SHA2-384
3,710,276 UART: [kat] SHA2-512-ACC
3,712,203 UART: [kat] ECC-384
3,715,985 UART: Fatal Error: 0x90040004
3,717,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,529 >>> mbox cmd response: failed
3,717,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,717,534 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,151 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,731 UART: [kat] SHA2-256
881,662 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,777 UART: [kat] ++
885,929 UART: [kat] sha1
890,189 UART: [kat] SHA2-256
892,127 UART: [kat] SHA2-384
894,836 UART: [kat] SHA2-512-ACC
896,737 UART: [kat] ECC-384
902,322 UART: [kat] HMAC-384Kdf
906,944 UART: [kat] LMS
1,475,140 UART: [kat] --
1,475,879 UART: [cold-reset] ++
1,476,217 UART: [fht] Storing FHT @ 0x50003400
1,479,106 UART: [idev] ++
1,479,274 UART: [idev] CDI.KEYID = 6
1,479,634 UART: [idev] SUBJECT.KEYID = 7
1,480,058 UART: [idev] UDS.KEYID = 0
1,480,403 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,702 UART: [idev] Erasing UDS.KEYID = 0
1,504,158 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,788 UART: [idev] --
1,513,855 UART: [ldev] ++
1,514,023 UART: [ldev] CDI.KEYID = 6
1,514,386 UART: [ldev] SUBJECT.KEYID = 5
1,514,812 UART: [ldev] AUTHORITY.KEYID = 7
1,515,275 UART: [ldev] FE.KEYID = 1
1,520,319 UART: [ldev] Erasing FE.KEYID = 1
1,545,128 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,558,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,178 UART: [ldev] --
1,584,633 UART: [fwproc] Waiting for Commands...
1,585,316 UART: [fwproc] Received command 0x46574c44
1,586,107 UART: [fwproc] Received Image of size 119428 bytes
2,941,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,926 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,297 ready_for_fw is high
1,362,297 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,592 >>> mbox cmd response: success
3,053,313 UART:
3,053,329 UART: Running Caliptra FMC ...
3,053,737 UART:
3,053,791 UART: [state] CFI Enabled
3,063,973 UART: [fht] FMC Alias Private Key: 7
3,182,709 UART: [art] Extend RT PCRs Done
3,183,137 UART: [art] Lock RT PCRs Done
3,184,729 UART: [art] Populate DV Done
3,192,778 UART: [fht] FMC Alias Private Key: 7
3,193,902 UART: [art] Derive CDI
3,194,182 UART: [art] Store in slot 0x4
3,280,188 UART: [art] Derive Key Pair
3,280,548 UART: [art] Store priv key in slot 0x5
3,293,641 UART: [art] Derive Key Pair - Done
3,308,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,180 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,945 UART: [art] PUB.X = 75E8D1C7376D85DD395C5FF93517ED0FD333BB4207B74AEC0D6436EE6AAD6ED110C11C404D41A259714C6862B07F7B57
3,331,714 UART: [art] PUB.Y = 0048A0DDBD7F15A55B09A64BD696E64FAA187555E3F566C4D60F5E337EECE5D55B30F0449293F277145E90758DAA9464
3,338,640 UART: [art] SIG.R = F2553EF3FA12B30FADE46540A10E7F0E5374A2B046384026FE44723EE7C6618A709AA04C40998438366B29CA3FACDF7A
3,345,407 UART: [art] SIG.S = 85A266DC6ACFEDD72E2D933EFF397B2E92D834BAEAEAE116EE4B140B8B55A0DF715CC1495F4A29E058E84599BD2EFA8C
3,369,086 UART: Caliptra RT
3,369,337 UART: [state] CFI Enabled
3,489,654 UART: [rt] RT listening for mailbox commands...
3,490,317 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,904 UART: [rt]cmd =0x46504c54, len=4
3,521,028 >>> mbox cmd response data (8 bytes)
3,521,355 UART: [rt] FIPS self test
3,521,683 UART: [kat] ++
3,521,835 UART: [kat] sha1
3,526,029 UART: [kat] SHA2-256
3,528,051 UART: [kat] SHA2-384
3,530,928 UART: [kat] SHA2-512-ACC
3,532,855 UART: [kat] ECC-384
3,536,967 UART: Fatal Error: 0x90040004
3,538,506 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,511 >>> mbox cmd response: failed
3,538,511 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,538,516 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,422 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,942 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,518 UART: [kat] SHA2-256
882,449 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,564 UART: [kat] ++
886,716 UART: [kat] sha1
891,112 UART: [kat] SHA2-256
893,050 UART: [kat] SHA2-384
895,629 UART: [kat] SHA2-512-ACC
897,530 UART: [kat] ECC-384
903,235 UART: [kat] HMAC-384Kdf
908,033 UART: [kat] LMS
1,476,229 UART: [kat] --
1,477,276 UART: [cold-reset] ++
1,477,710 UART: [fht] Storing FHT @ 0x50003400
1,480,339 UART: [idev] ++
1,480,507 UART: [idev] CDI.KEYID = 6
1,480,867 UART: [idev] SUBJECT.KEYID = 7
1,481,291 UART: [idev] UDS.KEYID = 0
1,481,636 ready_for_fw is high
1,481,636 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,171 UART: [idev] Erasing UDS.KEYID = 0
1,506,343 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,867 UART: [idev] --
1,516,016 UART: [ldev] ++
1,516,184 UART: [ldev] CDI.KEYID = 6
1,516,547 UART: [ldev] SUBJECT.KEYID = 5
1,516,973 UART: [ldev] AUTHORITY.KEYID = 7
1,517,436 UART: [ldev] FE.KEYID = 1
1,522,806 UART: [ldev] Erasing FE.KEYID = 1
1,548,175 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,841 UART: [ldev] --
1,587,250 UART: [fwproc] Waiting for Commands...
1,588,061 UART: [fwproc] Received command 0x46574c44
1,588,852 UART: [fwproc] Received Image of size 119428 bytes
2,944,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,736 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,655 >>> mbox cmd response: success
3,145,759 UART: [afmc] ++
3,145,927 UART: [afmc] CDI.KEYID = 6
3,146,289 UART: [afmc] SUBJECT.KEYID = 7
3,146,714 UART: [afmc] AUTHORITY.KEYID = 5
3,182,123 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,503 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,283 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,992 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,875 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,558 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,408 UART: [afmc] --
3,225,444 UART: [cold-reset] --
3,226,298 UART: [state] Locking Datavault
3,227,777 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,381 UART: [state] Locking ICCM
3,228,957 UART: [exit] Launching FMC @ 0x40000130
3,234,287 UART:
3,234,303 UART: Running Caliptra FMC ...
3,234,711 UART:
3,234,854 UART: [state] CFI Enabled
3,245,794 UART: [fht] FMC Alias Private Key: 7
3,365,204 UART: [art] Extend RT PCRs Done
3,365,632 UART: [art] Lock RT PCRs Done
3,366,968 UART: [art] Populate DV Done
3,375,011 UART: [fht] FMC Alias Private Key: 7
3,375,991 UART: [art] Derive CDI
3,376,271 UART: [art] Store in slot 0x4
3,462,095 UART: [art] Derive Key Pair
3,462,455 UART: [art] Store priv key in slot 0x5
3,475,028 UART: [art] Derive Key Pair - Done
3,489,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,505,581 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,346 UART: [art] PUB.X = 2B2B05BBEF7084787B137F9FDCC98260F24F1D50A2D88F691243CC9EDF2AE134E2BADE22C6D3A41B76D91D07D09FDB33
3,513,128 UART: [art] PUB.Y = 6F2FC5A76D2FCC4A4839C4064EF2AEBBD3AD026B40BE7FBC54208423D8CBC877C57D21345F5CA877B1B7EF3DF1D29768
3,520,092 UART: [art] SIG.R = D82D12C19B6AD5EF694001B213FF396317A7CD1225074F3BF9E2551539B9107D126C3DC2C197A43BCADF937C0DDAB16B
3,526,863 UART: [art] SIG.S = 7B707B9DA59071820C79C52ED2DF8F33E008E6C6F9AD50C04A737B2472A6A2AE6C1DEA73C86AF94492E41CB539AB4B7D
3,550,725 UART: Caliptra RT
3,551,068 UART: [state] CFI Enabled
3,671,726 UART: [rt] RT listening for mailbox commands...
3,672,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,388 UART: [rt]cmd =0x46504c54, len=4
3,703,586 >>> mbox cmd response data (8 bytes)
3,703,725 UART: [rt] FIPS self test
3,704,053 UART: [kat] ++
3,704,205 UART: [kat] sha1
3,708,539 UART: [kat] SHA2-256
3,710,561 UART: [kat] SHA2-384
3,713,544 UART: [kat] SHA2-512-ACC
3,715,471 UART: [kat] ECC-384
3,719,451 UART: Fatal Error: 0x90040004
3,720,990 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,720,995 >>> mbox cmd response: failed
3,720,995 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,721,000 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,517 UART: [state] LifecycleState = Unprovisioned
86,172 UART: [state] DebugLocked = No
86,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,374 UART: [kat] SHA2-256
882,305 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,420 UART: [kat] ++
886,572 UART: [kat] sha1
890,816 UART: [kat] SHA2-256
892,754 UART: [kat] SHA2-384
895,649 UART: [kat] SHA2-512-ACC
897,550 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,697 UART: [kat] LMS
1,475,893 UART: [kat] --
1,476,870 UART: [cold-reset] ++
1,477,198 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,983 UART: [idev] Erasing UDS.KEYID = 0
1,506,187 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,033 UART: [idev] --
1,515,922 UART: [ldev] ++
1,516,090 UART: [ldev] CDI.KEYID = 6
1,516,453 UART: [ldev] SUBJECT.KEYID = 5
1,516,879 UART: [ldev] AUTHORITY.KEYID = 7
1,517,342 UART: [ldev] FE.KEYID = 1
1,522,840 UART: [ldev] Erasing FE.KEYID = 1
1,548,613 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,445 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,215 UART: [ldev] --
1,587,714 UART: [fwproc] Waiting for Commands...
1,588,379 UART: [fwproc] Received command 0x46574c44
1,589,170 UART: [fwproc] Received Image of size 119428 bytes
2,944,180 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,148 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,366 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,993 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,872 ready_for_fw is high
1,362,872 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,379 >>> mbox cmd response: success
3,053,794 UART:
3,053,810 UART: Running Caliptra FMC ...
3,054,218 UART:
3,054,361 UART: [state] CFI Enabled
3,064,989 UART: [fht] FMC Alias Private Key: 7
3,183,655 UART: [art] Extend RT PCRs Done
3,184,083 UART: [art] Lock RT PCRs Done
3,185,729 UART: [art] Populate DV Done
3,194,058 UART: [fht] FMC Alias Private Key: 7
3,195,098 UART: [art] Derive CDI
3,195,378 UART: [art] Store in slot 0x4
3,281,176 UART: [art] Derive Key Pair
3,281,536 UART: [art] Store priv key in slot 0x5
3,295,429 UART: [art] Derive Key Pair - Done
3,310,784 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,641 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,406 UART: [art] PUB.X = 155B3C2BAE183AF344430350C3927659F4F36A06568E84C2A6AC09E25F2D524EEB44C5057B849C1B2E94839BB49E39C7
3,334,164 UART: [art] PUB.Y = 07F601821269667E95AF1C2EC14308DD5BADFC7B3D07E05EB7BCF9BAF9A246741A005A2DC7211E75C2FD078A96969D90
3,341,087 UART: [art] SIG.R = F492FA593AC457728C17DB8BE6F8BC5CF1A1B6ECE92C8A30CC0F391E51993D9FBC73C11F10C5ED9B262FD9F36F19A02B
3,347,876 UART: [art] SIG.S = F859A1F44CA8CE944D9E6BAECA00DA99A4A65CE76DA0C63D889A3CF54AE5CA0692C59FFAADE6819E93B80C38F71E7D01
3,372,225 UART: Caliptra RT
3,372,568 UART: [state] CFI Enabled
3,491,491 UART: [rt] RT listening for mailbox commands...
3,492,154 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,163 UART: [rt]cmd =0x46504c54, len=4
3,523,441 >>> mbox cmd response data (8 bytes)
3,523,604 UART: [rt] FIPS self test
3,523,932 UART: [kat] ++
3,524,084 UART: [kat] sha1
3,528,230 UART: [kat] SHA2-256
3,530,252 UART: [kat] SHA2-384
3,532,967 UART: [kat] SHA2-512-ACC
3,534,894 UART: [kat] ECC-384
3,538,658 UART: Fatal Error: 0x90040004
3,540,197 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,540,202 >>> mbox cmd response: failed
3,540,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,540,207 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,182 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,147 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,330 UART: [state] LifecycleState = Unprovisioned
85,985 UART: [state] DebugLocked = No
86,685 UART: [state] WD Timer not started. Device not locked for debugging
87,968 UART: [kat] SHA2-256
891,518 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,622 UART: [kat] ++
895,774 UART: [kat] sha1
900,074 UART: [kat] SHA2-256
902,014 UART: [kat] SHA2-384
904,709 UART: [kat] SHA2-512-ACC
906,610 UART: [kat] ECC-384
916,341 UART: [kat] HMAC-384Kdf
920,989 UART: [kat] LMS
1,169,301 UART: [kat] --
1,170,248 UART: [cold-reset] ++
1,170,788 UART: [fht] FHT @ 0x50003400
1,173,396 UART: [idev] ++
1,173,564 UART: [idev] CDI.KEYID = 6
1,173,925 UART: [idev] SUBJECT.KEYID = 7
1,174,350 UART: [idev] UDS.KEYID = 0
1,174,696 ready_for_fw is high
1,174,696 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,353 UART: [idev] Erasing UDS.KEYID = 0
1,199,369 UART: [idev] Sha1 KeyId Algorithm
1,208,349 UART: [idev] --
1,209,424 UART: [ldev] ++
1,209,592 UART: [ldev] CDI.KEYID = 6
1,209,956 UART: [ldev] SUBJECT.KEYID = 5
1,210,383 UART: [ldev] AUTHORITY.KEYID = 7
1,210,846 UART: [ldev] FE.KEYID = 1
1,215,866 UART: [ldev] Erasing FE.KEYID = 1
1,242,363 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,238 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,382 UART: [fwproc] Recv command 0x46574c44
1,283,115 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,226 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,331 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,506 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,147 >>> mbox cmd response: success
2,839,319 UART: [afmc] ++
2,839,487 UART: [afmc] CDI.KEYID = 6
2,839,850 UART: [afmc] SUBJECT.KEYID = 7
2,840,276 UART: [afmc] AUTHORITY.KEYID = 5
2,874,907 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,468 UART: [afmc] --
2,918,519 UART: [cold-reset] --
2,919,467 UART: [state] Locking Datavault
2,920,776 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,380 UART: [state] Locking ICCM
2,921,972 UART: [exit] Launching FMC @ 0x40000130
2,927,302 UART:
2,927,318 UART: Running Caliptra FMC ...
2,927,726 UART:
2,927,780 UART: [state] CFI Enabled
2,938,288 UART: [fht] FMC Alias Private Key: 7
3,057,398 UART: [art] Extend RT PCRs Done
3,057,826 UART: [art] Lock RT PCRs Done
3,059,378 UART: [art] Populate DV Done
3,067,653 UART: [fht] FMC Alias Private Key: 7
3,068,623 UART: [art] Derive CDI
3,068,903 UART: [art] Store in slot 0x4
3,154,424 UART: [art] Derive Key Pair
3,154,784 UART: [art] Store priv key in slot 0x5
3,168,310 UART: [art] Derive Key Pair - Done
3,183,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,150 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,915 UART: [art] PUB.X = A06E87F339BC6D48BD4122BA15999F34D4686D1890987C77C25ACD63C4C1F0A8946D54D1305B1C2C2D661E72757EBCAE
3,205,691 UART: [art] PUB.Y = 4BE823822E682C4C87DF25AA769DCEF99EC943480DA99BB32570816D8B138297E521FBEEE6AD095615537E663B9B5467
3,212,637 UART: [art] SIG.R = BE5989542E0D9F3410F2E30117990DFF25DD4CE80BB8B07DB95092659B65F37CFC50813AF7466CCE37CA0FC1E21C4F1F
3,219,404 UART: [art] SIG.S = E415E03F44EA0E8507ADB1324A537A2619DC48E3BBCC167F4B9F975922DE897D5FFDFAC3D7D2017A50712C0483DDBE20
3,243,702 UART: Caliptra RT
3,243,953 UART: [state] CFI Enabled
3,363,757 UART: [rt] RT listening for mailbox commands...
3,364,420 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,309 UART: [rt]cmd =0x46504c54, len=4
3,395,443 >>> mbox cmd response data (8 bytes)
3,395,754 UART: [rt] FIPS self test
3,396,082 UART: [kat] ++
3,396,234 UART: [kat] sha1
3,400,580 UART: [kat] SHA2-256
3,402,602 UART: [kat] SHA2-384
3,405,505 UART: [kat] SHA2-512-ACC
3,407,432 UART: [kat] ECC-384
3,410,840 UART: Fatal Error: 0x90040004
3,412,379 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,384 >>> mbox cmd response: failed
3,412,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,389 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,697 UART: [state] WD Timer not started. Device not locked for debugging
87,942 UART: [kat] SHA2-256
891,492 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,596 UART: [kat] ++
895,748 UART: [kat] sha1
900,086 UART: [kat] SHA2-256
902,026 UART: [kat] SHA2-384
904,869 UART: [kat] SHA2-512-ACC
906,770 UART: [kat] ECC-384
916,387 UART: [kat] HMAC-384Kdf
920,871 UART: [kat] LMS
1,169,183 UART: [kat] --
1,170,250 UART: [cold-reset] ++
1,170,618 UART: [fht] FHT @ 0x50003400
1,173,182 UART: [idev] ++
1,173,350 UART: [idev] CDI.KEYID = 6
1,173,711 UART: [idev] SUBJECT.KEYID = 7
1,174,136 UART: [idev] UDS.KEYID = 0
1,174,482 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,081 UART: [idev] Erasing UDS.KEYID = 0
1,198,979 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,838 UART: [ldev] ++
1,209,006 UART: [ldev] CDI.KEYID = 6
1,209,370 UART: [ldev] SUBJECT.KEYID = 5
1,209,797 UART: [ldev] AUTHORITY.KEYID = 7
1,210,260 UART: [ldev] FE.KEYID = 1
1,215,282 UART: [ldev] Erasing FE.KEYID = 1
1,241,485 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,243 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,959 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,848 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,560 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,576 UART: [ldev] --
1,280,875 UART: [fwproc] Wait for Commands...
1,281,654 UART: [fwproc] Recv command 0x46574c44
1,282,387 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,538 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,209 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,384 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,095 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,998 ready_for_fw is high
1,058,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,254 >>> mbox cmd response: success
2,753,863 UART:
2,753,879 UART: Running Caliptra FMC ...
2,754,287 UART:
2,754,341 UART: [state] CFI Enabled
2,764,999 UART: [fht] FMC Alias Private Key: 7
2,884,477 UART: [art] Extend RT PCRs Done
2,884,905 UART: [art] Lock RT PCRs Done
2,886,385 UART: [art] Populate DV Done
2,894,904 UART: [fht] FMC Alias Private Key: 7
2,895,962 UART: [art] Derive CDI
2,896,242 UART: [art] Store in slot 0x4
2,982,117 UART: [art] Derive Key Pair
2,982,477 UART: [art] Store priv key in slot 0x5
2,996,077 UART: [art] Derive Key Pair - Done
3,010,569 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,902 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,667 UART: [art] PUB.X = E0EB6719543BD5595F860B1C8DC490AF83CAA928C0DC0B6EC5DFE29598ECB45F51ADEA7FA9BC6C1CD12934E1AE50D5EA
3,033,459 UART: [art] PUB.Y = 419148ABA1F431A70C2CFEA5716F85FD3E19DEF385EC6B322DD8A2E6447D6BA661B9E59689804C217F3A51721ABCE906
3,040,413 UART: [art] SIG.R = 4E0745D5D5D40D87BE0A5DC827639C9E951798DDE195DC0703ADBE1E090257F06BAEF5E845A2B8EDBA9A4397AA90E168
3,047,176 UART: [art] SIG.S = B5F065DC9388CB90DE051E4A07428911A7BBF593C7719178FCE73FF412BFA85729C78A88E6858EDBFFD0E2475BB4FCF7
3,070,394 UART: Caliptra RT
3,070,645 UART: [state] CFI Enabled
3,190,868 UART: [rt] RT listening for mailbox commands...
3,191,531 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,496 UART: [rt]cmd =0x46504c54, len=4
3,222,638 >>> mbox cmd response data (8 bytes)
3,222,821 UART: [rt] FIPS self test
3,223,149 UART: [kat] ++
3,223,301 UART: [kat] sha1
3,227,419 UART: [kat] SHA2-256
3,229,441 UART: [kat] SHA2-384
3,232,428 UART: [kat] SHA2-512-ACC
3,234,355 UART: [kat] ECC-384
3,237,699 UART: Fatal Error: 0x90040004
3,239,238 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,243 >>> mbox cmd response: failed
3,239,243 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,239,248 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,360 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,192 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,840 UART: [state] WD Timer not started. Device not locked for debugging
88,027 UART: [kat] SHA2-256
891,577 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,681 UART: [kat] ++
895,833 UART: [kat] sha1
900,039 UART: [kat] SHA2-256
901,979 UART: [kat] SHA2-384
904,514 UART: [kat] SHA2-512-ACC
906,415 UART: [kat] ECC-384
916,488 UART: [kat] HMAC-384Kdf
921,140 UART: [kat] LMS
1,169,452 UART: [kat] --
1,170,089 UART: [cold-reset] ++
1,170,503 UART: [fht] FHT @ 0x50003400
1,172,951 UART: [idev] ++
1,173,119 UART: [idev] CDI.KEYID = 6
1,173,480 UART: [idev] SUBJECT.KEYID = 7
1,173,905 UART: [idev] UDS.KEYID = 0
1,174,251 ready_for_fw is high
1,174,251 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,086 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,130 UART: [idev] --
1,209,185 UART: [ldev] ++
1,209,353 UART: [ldev] CDI.KEYID = 6
1,209,717 UART: [ldev] SUBJECT.KEYID = 5
1,210,144 UART: [ldev] AUTHORITY.KEYID = 7
1,210,607 UART: [ldev] FE.KEYID = 1
1,215,699 UART: [ldev] Erasing FE.KEYID = 1
1,241,450 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,074 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,790 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,679 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,391 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,664 UART: [fwproc] Wait for Commands...
1,281,351 UART: [fwproc] Recv command 0x46574c44
1,282,084 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,905 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,169 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,696 >>> mbox cmd response: success
2,837,864 UART: [afmc] ++
2,838,032 UART: [afmc] CDI.KEYID = 6
2,838,395 UART: [afmc] SUBJECT.KEYID = 7
2,838,821 UART: [afmc] AUTHORITY.KEYID = 5
2,874,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,406 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,988 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,833 UART: [afmc] --
2,917,860 UART: [cold-reset] --
2,918,730 UART: [state] Locking Datavault
2,920,045 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,649 UART: [state] Locking ICCM
2,921,293 UART: [exit] Launching FMC @ 0x40000130
2,926,623 UART:
2,926,639 UART: Running Caliptra FMC ...
2,927,047 UART:
2,927,190 UART: [state] CFI Enabled
2,937,710 UART: [fht] FMC Alias Private Key: 7
3,056,708 UART: [art] Extend RT PCRs Done
3,057,136 UART: [art] Lock RT PCRs Done
3,058,522 UART: [art] Populate DV Done
3,066,843 UART: [fht] FMC Alias Private Key: 7
3,067,935 UART: [art] Derive CDI
3,068,215 UART: [art] Store in slot 0x4
3,154,384 UART: [art] Derive Key Pair
3,154,744 UART: [art] Store priv key in slot 0x5
3,168,640 UART: [art] Derive Key Pair - Done
3,183,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,516 UART: [art] PUB.X = 680C30CACE995D831AECEE3FCBDCB6FA0E0B0195E7F5671407380E733CC26D0F874FA742778EB1CD148652965D28368D
3,206,275 UART: [art] PUB.Y = 317C27E76F6786C4CEDCFFB38DC406E9E6A4D704CDEB1106D8841D242D1393F4C93BC9E8342563569D464F589A921EAC
3,213,224 UART: [art] SIG.R = 282FA8D9C64552BAD09F0489CB97E1E39467DD8000B284ADDD1551586878708483929D9A040D55C709C5A00B2B136EA2
3,219,953 UART: [art] SIG.S = 76652A3F6D63588E05C2842F8D5175220C2044405C31690C5F0CC1718AC98E9BCF844859D31E6968B2F163E919199A59
3,243,549 UART: Caliptra RT
3,243,892 UART: [state] CFI Enabled
3,363,418 UART: [rt] RT listening for mailbox commands...
3,364,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,184 UART: [rt]cmd =0x46504c54, len=4
3,395,280 >>> mbox cmd response data (8 bytes)
3,395,585 UART: [rt] FIPS self test
3,395,913 UART: [kat] ++
3,396,065 UART: [kat] sha1
3,400,255 UART: [kat] SHA2-256
3,402,277 UART: [kat] SHA2-384
3,405,272 UART: [kat] SHA2-512-ACC
3,407,199 UART: [kat] ECC-384
3,411,049 UART: Fatal Error: 0x90040004
3,412,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,593 >>> mbox cmd response: failed
3,412,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,598 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,703 UART: [state] LifecycleState = Unprovisioned
86,358 UART: [state] DebugLocked = No
86,842 UART: [state] WD Timer not started. Device not locked for debugging
88,199 UART: [kat] SHA2-256
891,749 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,853 UART: [kat] ++
896,005 UART: [kat] sha1
900,249 UART: [kat] SHA2-256
902,189 UART: [kat] SHA2-384
904,846 UART: [kat] SHA2-512-ACC
906,747 UART: [kat] ECC-384
916,692 UART: [kat] HMAC-384Kdf
921,304 UART: [kat] LMS
1,169,616 UART: [kat] --
1,170,629 UART: [cold-reset] ++
1,171,135 UART: [fht] FHT @ 0x50003400
1,173,877 UART: [idev] ++
1,174,045 UART: [idev] CDI.KEYID = 6
1,174,406 UART: [idev] SUBJECT.KEYID = 7
1,174,831 UART: [idev] UDS.KEYID = 0
1,175,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,584 UART: [idev] Erasing UDS.KEYID = 0
1,199,926 UART: [idev] Sha1 KeyId Algorithm
1,208,768 UART: [idev] --
1,209,671 UART: [ldev] ++
1,209,839 UART: [ldev] CDI.KEYID = 6
1,210,203 UART: [ldev] SUBJECT.KEYID = 5
1,210,630 UART: [ldev] AUTHORITY.KEYID = 7
1,211,093 UART: [ldev] FE.KEYID = 1
1,215,953 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,990 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,595 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,375 UART: [ldev] --
1,281,754 UART: [fwproc] Wait for Commands...
1,282,531 UART: [fwproc] Recv command 0x46574c44
1,283,264 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,139 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,156 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,331 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,014 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,267 ready_for_fw is high
1,059,267 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,951 >>> mbox cmd response: success
2,752,634 UART:
2,752,650 UART: Running Caliptra FMC ...
2,753,058 UART:
2,753,201 UART: [state] CFI Enabled
2,763,879 UART: [fht] FMC Alias Private Key: 7
2,883,167 UART: [art] Extend RT PCRs Done
2,883,595 UART: [art] Lock RT PCRs Done
2,884,995 UART: [art] Populate DV Done
2,893,226 UART: [fht] FMC Alias Private Key: 7
2,894,284 UART: [art] Derive CDI
2,894,564 UART: [art] Store in slot 0x4
2,980,309 UART: [art] Derive Key Pair
2,980,669 UART: [art] Store priv key in slot 0x5
2,993,935 UART: [art] Derive Key Pair - Done
3,008,947 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,893 UART: [art] PUB.X = F0C4745730F3F0A4181A6F43011105B8D7A4396216E75E2519256F30E6E8F4CE384EF2A883AC589F04DD89DAB6C2B326
3,031,654 UART: [art] PUB.Y = D7C1CCE81BC73A56E05FB0914C2F3072CF1318D24FBC803EE997E6C5F730448A2B64A7D19281EC2A076C3D71E36D1D1D
3,038,613 UART: [art] SIG.R = 2A5C65ADEA1DE1816B0621323F0D843E1FC4E23BA02855202FBBABE1D793D56395054B5A4AF47F8485595B5417F927D6
3,045,378 UART: [art] SIG.S = 93DA6A26FA8124BD794E9C4B8E2C8022AEBF8D639133168064C470A4CF3C4B1E57C43D7A0A52BB5DD5E93F75190BD096
3,069,524 UART: Caliptra RT
3,069,867 UART: [state] CFI Enabled
3,189,234 UART: [rt] RT listening for mailbox commands...
3,189,897 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,614 UART: [rt]cmd =0x46504c54, len=4
3,220,912 >>> mbox cmd response data (8 bytes)
3,221,079 UART: [rt] FIPS self test
3,221,407 UART: [kat] ++
3,221,559 UART: [kat] sha1
3,225,799 UART: [kat] SHA2-256
3,227,821 UART: [kat] SHA2-384
3,230,566 UART: [kat] SHA2-512-ACC
3,232,493 UART: [kat] ECC-384
3,236,241 UART: Fatal Error: 0x90040004
3,237,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,785 >>> mbox cmd response: failed
3,237,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,237,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,417 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,308 UART: [state] LifecycleState = Unprovisioned
85,963 UART: [state] DebugLocked = No
86,661 UART: [state] WD Timer not started. Device not locked for debugging
88,016 UART: [kat] SHA2-256
893,666 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,791 UART: [kat] ++
897,943 UART: [kat] sha1
901,949 UART: [kat] SHA2-256
903,889 UART: [kat] SHA2-384
906,678 UART: [kat] SHA2-512-ACC
908,579 UART: [kat] ECC-384
918,020 UART: [kat] HMAC-384Kdf
922,650 UART: [kat] LMS
1,170,978 UART: [kat] --
1,171,983 UART: [cold-reset] ++
1,172,563 UART: [fht] FHT @ 0x50003400
1,175,174 UART: [idev] ++
1,175,342 UART: [idev] CDI.KEYID = 6
1,175,702 UART: [idev] SUBJECT.KEYID = 7
1,176,126 UART: [idev] UDS.KEYID = 0
1,176,471 ready_for_fw is high
1,176,471 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,028 UART: [idev] Erasing UDS.KEYID = 0
1,201,431 UART: [idev] Sha1 KeyId Algorithm
1,210,017 UART: [idev] --
1,211,121 UART: [ldev] ++
1,211,289 UART: [ldev] CDI.KEYID = 6
1,211,652 UART: [ldev] SUBJECT.KEYID = 5
1,212,078 UART: [ldev] AUTHORITY.KEYID = 7
1,212,541 UART: [ldev] FE.KEYID = 1
1,217,721 UART: [ldev] Erasing FE.KEYID = 1
1,243,666 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,993 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,709 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,312 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,385 UART: [ldev] --
1,282,684 UART: [fwproc] Wait for Commands...
1,283,448 UART: [fwproc] Recv command 0x46574c44
1,284,176 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,675 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,132 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,847 >>> mbox cmd response: success
2,839,931 UART: [afmc] ++
2,840,099 UART: [afmc] CDI.KEYID = 6
2,840,461 UART: [afmc] SUBJECT.KEYID = 7
2,840,886 UART: [afmc] AUTHORITY.KEYID = 5
2,876,231 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,344 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,801 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,684 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,385 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,307 UART: [afmc] --
2,919,301 UART: [cold-reset] --
2,919,997 UART: [state] Locking Datavault
2,921,286 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,890 UART: [state] Locking ICCM
2,922,332 UART: [exit] Launching FMC @ 0x40000130
2,927,662 UART:
2,927,678 UART: Running Caliptra FMC ...
2,928,086 UART:
2,928,140 UART: [state] CFI Enabled
2,938,494 UART: [fht] FMC Alias Private Key: 7
3,057,420 UART: [art] Extend RT PCRs Done
3,057,848 UART: [art] Lock RT PCRs Done
3,059,308 UART: [art] Populate DV Done
3,067,617 UART: [fht] FMC Alias Private Key: 7
3,068,601 UART: [art] Derive CDI
3,068,881 UART: [art] Store in slot 0x4
3,154,826 UART: [art] Derive Key Pair
3,155,186 UART: [art] Store priv key in slot 0x5
3,168,348 UART: [art] Derive Key Pair - Done
3,182,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,435 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,200 UART: [art] PUB.X = C70FF98F1690235FF40607DC45CB71D32E725069B3BCFE3A63983AED9C5AF7F6CF8844BC03E19D2DF36E78C162410FDC
3,205,969 UART: [art] PUB.Y = 679759668F19EE3D1E41166E823CF94620A7B70E22C0ABFEA0A5FE8CDE755C287B0B8B98AE6098F9D1E5945BC9F034F3
3,212,923 UART: [art] SIG.R = AAACC37FFB8377F2EBE47C00E38A0E9DBBAAFBAB8E25735A362F04F02E20FBFBAE89B43DA1368F9382EE7B1F6369B1B2
3,219,695 UART: [art] SIG.S = EBE4BD0702A2FDE49434CD8EADC158B979ED46FC268DFB66150D7F280607AB8697B37748A9DB2C036C03BBC5611A10C4
3,243,696 UART: Caliptra RT
3,243,947 UART: [state] CFI Enabled
3,363,637 UART: [rt] RT listening for mailbox commands...
3,364,300 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,947 UART: [rt]cmd =0x46504c54, len=4
3,395,091 >>> mbox cmd response data (8 bytes)
3,395,296 UART: [rt] FIPS self test
3,395,624 UART: [kat] ++
3,395,776 UART: [kat] sha1
3,400,078 UART: [kat] SHA2-256
3,402,100 UART: [kat] SHA2-384
3,404,861 UART: [kat] SHA2-512-ACC
3,406,788 UART: [kat] ECC-384
3,410,474 UART: Fatal Error: 0x90040004
3,412,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,018 >>> mbox cmd response: failed
3,412,018 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,023 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,930 UART: [kat] SHA2-256
893,580 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,705 UART: [kat] ++
897,857 UART: [kat] sha1
902,169 UART: [kat] SHA2-256
904,109 UART: [kat] SHA2-384
906,790 UART: [kat] SHA2-512-ACC
908,691 UART: [kat] ECC-384
918,350 UART: [kat] HMAC-384Kdf
923,034 UART: [kat] LMS
1,171,362 UART: [kat] --
1,172,055 UART: [cold-reset] ++
1,172,489 UART: [fht] FHT @ 0x50003400
1,175,300 UART: [idev] ++
1,175,468 UART: [idev] CDI.KEYID = 6
1,175,828 UART: [idev] SUBJECT.KEYID = 7
1,176,252 UART: [idev] UDS.KEYID = 0
1,176,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,288 UART: [idev] Erasing UDS.KEYID = 0
1,201,565 UART: [idev] Sha1 KeyId Algorithm
1,210,073 UART: [idev] --
1,211,105 UART: [ldev] ++
1,211,273 UART: [ldev] CDI.KEYID = 6
1,211,636 UART: [ldev] SUBJECT.KEYID = 5
1,212,062 UART: [ldev] AUTHORITY.KEYID = 7
1,212,525 UART: [ldev] FE.KEYID = 1
1,217,891 UART: [ldev] Erasing FE.KEYID = 1
1,244,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,541 UART: [ldev] --
1,283,866 UART: [fwproc] Wait for Commands...
1,284,554 UART: [fwproc] Recv command 0x46574c44
1,285,282 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,832 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,479 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,333 ready_for_fw is high
1,060,333 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,436 >>> mbox cmd response: success
2,752,291 UART:
2,752,307 UART: Running Caliptra FMC ...
2,752,715 UART:
2,752,769 UART: [state] CFI Enabled
2,763,389 UART: [fht] FMC Alias Private Key: 7
2,882,329 UART: [art] Extend RT PCRs Done
2,882,757 UART: [art] Lock RT PCRs Done
2,884,523 UART: [art] Populate DV Done
2,892,438 UART: [fht] FMC Alias Private Key: 7
2,893,482 UART: [art] Derive CDI
2,893,762 UART: [art] Store in slot 0x4
2,979,209 UART: [art] Derive Key Pair
2,979,569 UART: [art] Store priv key in slot 0x5
2,992,713 UART: [art] Derive Key Pair - Done
3,007,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,663 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,428 UART: [art] PUB.X = FADEB49DF35BB682E11E913FDCDE22AF7DCB87622C867F86A0112D6834C6B5D90D572047503AAF44CD4FE1C756F7694A
3,030,211 UART: [art] PUB.Y = 850EF04B55B0CB4DF115CC96340C5F5348786309CDC965571CDFDE4FEA5ECBE8F8C21DFC47850BFAF89200309427C5D9
3,037,141 UART: [art] SIG.R = 9ECA316C044DA8AC366614279C8269EEF635F10E3AEB3FDB0A65096D52F592030F52A867AEA42619254ECEED8B47B417
3,043,901 UART: [art] SIG.S = 93231482CF38575CB3D1783379354F867B0CDAC5FDF7685474FB227C8F8F5DA60975F702D8DE37BFF05D0ABF739E5FD0
3,067,599 UART: Caliptra RT
3,067,850 UART: [state] CFI Enabled
3,187,984 UART: [rt] RT listening for mailbox commands...
3,188,647 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,338 UART: [rt]cmd =0x46504c54, len=4
3,219,406 >>> mbox cmd response data (8 bytes)
3,219,567 UART: [rt] FIPS self test
3,219,895 UART: [kat] ++
3,220,047 UART: [kat] sha1
3,224,347 UART: [kat] SHA2-256
3,226,369 UART: [kat] SHA2-384
3,229,384 UART: [kat] SHA2-512-ACC
3,231,311 UART: [kat] ECC-384
3,235,067 UART: Fatal Error: 0x90040004
3,236,606 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,611 >>> mbox cmd response: failed
3,236,611 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,236,616 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,385 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,158 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,027 UART: [state] LifecycleState = Unprovisioned
85,682 UART: [state] DebugLocked = No
86,294 UART: [state] WD Timer not started. Device not locked for debugging
87,551 UART: [kat] SHA2-256
893,201 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,326 UART: [kat] ++
897,478 UART: [kat] sha1
901,680 UART: [kat] SHA2-256
903,620 UART: [kat] SHA2-384
906,431 UART: [kat] SHA2-512-ACC
908,332 UART: [kat] ECC-384
918,347 UART: [kat] HMAC-384Kdf
922,997 UART: [kat] LMS
1,171,325 UART: [kat] --
1,172,332 UART: [cold-reset] ++
1,172,720 UART: [fht] FHT @ 0x50003400
1,175,279 UART: [idev] ++
1,175,447 UART: [idev] CDI.KEYID = 6
1,175,807 UART: [idev] SUBJECT.KEYID = 7
1,176,231 UART: [idev] UDS.KEYID = 0
1,176,576 ready_for_fw is high
1,176,576 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,945 UART: [idev] Erasing UDS.KEYID = 0
1,201,136 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,500 UART: [ldev] ++
1,210,668 UART: [ldev] CDI.KEYID = 6
1,211,031 UART: [ldev] SUBJECT.KEYID = 5
1,211,457 UART: [ldev] AUTHORITY.KEYID = 7
1,211,920 UART: [ldev] FE.KEYID = 1
1,217,340 UART: [ldev] Erasing FE.KEYID = 1
1,243,753 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,120 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,836 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,727 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,418 UART: [ldev] --
1,282,745 UART: [fwproc] Wait for Commands...
1,283,565 UART: [fwproc] Recv command 0x46574c44
1,284,293 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,617 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,787 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,306 >>> mbox cmd response: success
2,839,462 UART: [afmc] ++
2,839,630 UART: [afmc] CDI.KEYID = 6
2,839,992 UART: [afmc] SUBJECT.KEYID = 7
2,840,417 UART: [afmc] AUTHORITY.KEYID = 5
2,876,016 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,161 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,618 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,501 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,202 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,202 UART: [afmc] --
2,919,092 UART: [cold-reset] --
2,920,054 UART: [state] Locking Datavault
2,921,141 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,745 UART: [state] Locking ICCM
2,922,309 UART: [exit] Launching FMC @ 0x40000130
2,927,639 UART:
2,927,655 UART: Running Caliptra FMC ...
2,928,063 UART:
2,928,206 UART: [state] CFI Enabled
2,939,076 UART: [fht] FMC Alias Private Key: 7
3,057,942 UART: [art] Extend RT PCRs Done
3,058,370 UART: [art] Lock RT PCRs Done
3,059,926 UART: [art] Populate DV Done
3,068,377 UART: [fht] FMC Alias Private Key: 7
3,069,397 UART: [art] Derive CDI
3,069,677 UART: [art] Store in slot 0x4
3,155,464 UART: [art] Derive Key Pair
3,155,824 UART: [art] Store priv key in slot 0x5
3,169,074 UART: [art] Derive Key Pair - Done
3,183,901 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,160 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,925 UART: [art] PUB.X = 15019F2E098F470256806630A9439EB53EC65212502DE7A540544654D3B4DB733F694A32DCC6F06B6864D2A60A1605C4
3,206,670 UART: [art] PUB.Y = E7F2C3FBA13B28923D4DC25E136A9F437E3944BD8F4D19B0A4A728D35DDB0CCAD162C78717B05A4D3E8D82C23826ED45
3,213,631 UART: [art] SIG.R = FE47D272F56F63FAB2FDDFBEF88C101543CE50709A996B5B48F885ACB91DAC6BBDA07A984577D7DD12454F1234970F86
3,220,412 UART: [art] SIG.S = 184DFF2AA9D6912E620FC15B831C5BE77E8ED97C31A92D6671608D4F556F97953B692E220868AF6859E403B9D6AE5789
3,243,755 UART: Caliptra RT
3,244,098 UART: [state] CFI Enabled
3,365,129 UART: [rt] RT listening for mailbox commands...
3,365,792 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,621 UART: [rt]cmd =0x46504c54, len=4
3,396,977 >>> mbox cmd response data (8 bytes)
3,397,148 UART: [rt] FIPS self test
3,397,476 UART: [kat] ++
3,397,628 UART: [kat] sha1
3,401,930 UART: [kat] SHA2-256
3,403,952 UART: [kat] SHA2-384
3,406,819 UART: [kat] SHA2-512-ACC
3,408,746 UART: [kat] ECC-384
3,412,800 UART: Fatal Error: 0x90040004
3,414,339 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,344 >>> mbox cmd response: failed
3,414,344 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,349 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,061 UART: [state] LifecycleState = Unprovisioned
85,716 UART: [state] DebugLocked = No
86,306 UART: [state] WD Timer not started. Device not locked for debugging
87,597 UART: [kat] SHA2-256
893,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,372 UART: [kat] ++
897,524 UART: [kat] sha1
901,602 UART: [kat] SHA2-256
903,542 UART: [kat] SHA2-384
906,299 UART: [kat] SHA2-512-ACC
908,200 UART: [kat] ECC-384
917,589 UART: [kat] HMAC-384Kdf
922,317 UART: [kat] LMS
1,170,645 UART: [kat] --
1,171,608 UART: [cold-reset] ++
1,172,088 UART: [fht] FHT @ 0x50003400
1,174,899 UART: [idev] ++
1,175,067 UART: [idev] CDI.KEYID = 6
1,175,427 UART: [idev] SUBJECT.KEYID = 7
1,175,851 UART: [idev] UDS.KEYID = 0
1,176,196 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,989 UART: [idev] Erasing UDS.KEYID = 0
1,201,820 UART: [idev] Sha1 KeyId Algorithm
1,210,274 UART: [idev] --
1,211,292 UART: [ldev] ++
1,211,460 UART: [ldev] CDI.KEYID = 6
1,211,823 UART: [ldev] SUBJECT.KEYID = 5
1,212,249 UART: [ldev] AUTHORITY.KEYID = 7
1,212,712 UART: [ldev] FE.KEYID = 1
1,217,916 UART: [ldev] Erasing FE.KEYID = 1
1,244,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,776 UART: [ldev] --
1,283,053 UART: [fwproc] Wait for Commands...
1,283,783 UART: [fwproc] Recv command 0x46574c44
1,284,511 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,625 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,795 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,296 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,880 ready_for_fw is high
1,060,880 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,291 >>> mbox cmd response: success
2,754,692 UART:
2,754,708 UART: Running Caliptra FMC ...
2,755,116 UART:
2,755,259 UART: [state] CFI Enabled
2,766,065 UART: [fht] FMC Alias Private Key: 7
2,885,517 UART: [art] Extend RT PCRs Done
2,885,945 UART: [art] Lock RT PCRs Done
2,887,601 UART: [art] Populate DV Done
2,895,842 UART: [fht] FMC Alias Private Key: 7
2,896,994 UART: [art] Derive CDI
2,897,274 UART: [art] Store in slot 0x4
2,983,141 UART: [art] Derive Key Pair
2,983,501 UART: [art] Store priv key in slot 0x5
2,996,991 UART: [art] Derive Key Pair - Done
3,011,981 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,431 UART: [art] PUB.X = 9F0CB4935EE6893573AFB021B3634F25A777DC8EF43E252B9EDACC7D479BAE25DD08F5D97568C06B033552FC69612C8F
3,035,202 UART: [art] PUB.Y = AF1C76C3AB598D4B32005CA8314ABA733A6E0B0E23BEA3684B8B68F6859CE50DCEA20FC3196619197B714781285FBC30
3,042,126 UART: [art] SIG.R = 723CB2E1E7EE58CC9D6369233CD286FAE8F74938E039409FBD6790C7D03DFEC41ECF637AE56F83DC5F099A01D97C9A29
3,048,904 UART: [art] SIG.S = B4E121ECBC3BD83CA0D02FC20B8458E9850F393359BB6E05C3F04A4AD3452A17571A48C66273A6292A04B721B03FADF0
3,072,828 UART: Caliptra RT
3,073,171 UART: [state] CFI Enabled
3,194,454 UART: [rt] RT listening for mailbox commands...
3,195,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,225,020 UART: [rt]cmd =0x46504c54, len=4
3,226,144 >>> mbox cmd response data (8 bytes)
3,226,427 UART: [rt] FIPS self test
3,226,755 UART: [kat] ++
3,226,907 UART: [kat] sha1
3,230,945 UART: [kat] SHA2-256
3,232,967 UART: [kat] SHA2-384
3,235,902 UART: [kat] SHA2-512-ACC
3,237,829 UART: [kat] ECC-384
3,241,591 UART: Fatal Error: 0x90040004
3,243,130 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,135 >>> mbox cmd response: failed
3,243,135 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,140 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,721 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_generate_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.13s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,082 writing to cptra_bootfsm_go
5,167,471 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,317,383 >>> mbox cmd response: failed
5,317,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,467,393 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,438,911 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,755 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,028 writing to cptra_bootfsm_go
5,158,234 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,308,004 >>> mbox cmd response: failed
5,308,590 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,457,455 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,429,845 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,258,348 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,824 writing to cptra_bootfsm_go
5,497,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,647,009 >>> mbox cmd response: failed
5,647,562 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,796,421 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
17,848,323 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,565,266 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
5,500,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,651,528 >>> mbox cmd response: failed
5,652,752 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,802,033 >>> mbox cmd response: failed
Initializing fuses
1,038 writing to cptra_bootfsm_go
17,845,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,557,878 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
5,150,524 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,300,164 >>> mbox cmd response: failed
5,300,750 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,449,707 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,435,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,676 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,157,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,307,346 >>> mbox cmd response: failed
5,307,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,456,755 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,425,917 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,269 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,434 writing to cptra_bootfsm_go
5,505,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,655,130 >>> mbox cmd response: failed
5,655,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,804,604 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
17,828,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,545,104 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
5,501,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,651,518 >>> mbox cmd response: failed
5,652,068 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,800,924 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
17,840,924 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,561,807 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,439 >>> mbox cmd response: failed
825,439 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,283 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,624 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,183 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,191 >>> mbox cmd response: failed
825,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,197 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,767 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,306 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,810 >>> mbox cmd response: failed
825,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,394 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,087 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,376 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,384 >>> mbox cmd response: failed
826,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,390 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,798 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,705,054 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,399 >>> mbox cmd response: failed
825,399 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,405 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,692 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
825,303 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,311 >>> mbox cmd response: failed
825,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
825,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,417 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,514 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,704 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,712 >>> mbox cmd response: failed
826,712 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,718 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,976 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,243 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,036 >>> mbox cmd response: failed
826,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,042 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,128 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,795 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
192,314 UART:
192,674 UART: Running Caliptra ROM ...
193,853 UART:
194,002 UART: [state] CFI Enabled
262,749 UART: [state] LifecycleState = Unprovisioned
264,737 UART: [state] DebugLocked = No
267,694 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,561 UART: [kat] SHA2-256
442,267 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,790 UART: [kat] ++
453,238 UART: [kat] sha1
463,163 UART: [kat] SHA2-256
465,830 UART: [kat] SHA2-384
471,681 UART: [kat] SHA2-512-ACC
474,114 UART: [kat] ECC-384
2,768,122 UART: [kat] HMAC-384Kdf
2,797,566 UART: [kat] LMS
3,987,851 UART: [kat] --
3,992,381 UART: [cold-reset] ++
3,994,564 UART: [fht] Storing FHT @ 0x50003400
4,007,337 UART: [idev] ++
4,007,917 UART: [idev] CDI.KEYID = 6
4,008,832 UART: [idev] SUBJECT.KEYID = 7
4,010,087 UART: [idev] UDS.KEYID = 0
4,011,126 ready_for_fw is high
4,011,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,561 UART: [idev] Erasing UDS.KEYID = 0
7,341,176 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,900 UART: [idev] --
7,365,538 UART: [ldev] ++
7,366,122 UART: [ldev] CDI.KEYID = 6
7,367,092 UART: [ldev] SUBJECT.KEYID = 5
7,368,318 UART: [ldev] AUTHORITY.KEYID = 7
7,369,551 UART: [ldev] FE.KEYID = 1
7,399,971 UART: [ldev] Erasing FE.KEYID = 1
10,731,380 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,372 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,040,995 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,055,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,307 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,922 UART: [ldev] --
13,094,138 UART: [fwproc] Waiting for Commands...
13,096,299 UART: [fwproc] Received command 0x46574c44
13,098,507 UART: [fwproc] Received Image of size 119428 bytes
17,207,689 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,283,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,357,061 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,688,757 >>> mbox cmd response: success
17,692,199 UART: [afmc] ++
17,692,798 UART: [afmc] CDI.KEYID = 6
17,693,707 UART: [afmc] SUBJECT.KEYID = 7
17,694,985 UART: [afmc] AUTHORITY.KEYID = 5
21,049,761 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,349,028 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,351,292 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,365,788 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,380,472 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,394,870 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,416,235 UART: [afmc] --
23,420,825 UART: [cold-reset] --
23,424,475 UART: [state] Locking Datavault
23,430,369 UART: [state] Locking PCR0, PCR1 and PCR31
23,432,068 UART: [state] Locking ICCM
23,434,911 UART: [exit] Launching FMC @ 0x40000130
23,443,269 UART:
23,443,512 UART: Running Caliptra FMC ...
23,444,618 UART:
23,444,783 UART: [state] CFI Enabled
23,508,722 UART: [fht] FMC Alias Private Key: 7
25,849,505 UART: [art] Extend RT PCRs Done
25,850,734 UART: [art] Lock RT PCRs Done
25,852,259 UART: [art] Populate DV Done
25,857,845 UART: [fht] FMC Alias Private Key: 7
25,859,393 UART: [art] Derive CDI
25,860,211 UART: [art] Store in slot 0x4
25,918,101 UART: [art] Derive Key Pair
25,919,144 UART: [art] Store priv key in slot 0x5
29,211,729 UART: [art] Derive Key Pair - Done
29,224,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,512,998 UART: [art] Erasing AUTHORITY.KEYID = 7
31,514,516 UART: [art] PUB.X = 6DE4EDDB176B39CC5698F3B95514D328DBB3A9FE07A97150C1C77138BC1DB76C6D7EE34FCD6C42486E25D96B39841003
31,521,797 UART: [art] PUB.Y = F9B31AE6509BEE1652F972EE4F06F15623FEBE0B1E5FD4D4DD1BEB752762D67596E920EC95736823A98F1856A4703E4B
31,529,053 UART: [art] SIG.R = 42B89663AC82702C9462DD1A618FE3F1292402A92238F287BDDB1419524750C8F59C38CC6307C81B2421D0F146EBB1AD
31,536,431 UART: [art] SIG.S = CB42AC0D2E9F624EB7A4E59BA1CE23C31581CD671D2FCEF4F227B4D08454AD35994D1669F14197C5F7F26BE3B1157ED7
32,840,950 UART: Caliptra RT
32,841,668 UART: [state] CFI Enabled
33,017,802 UART: [rt] RT listening for mailbox commands...
33,019,666 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,049,331 UART: [rt]cmd =0x46504c54, len=4
33,051,105 >>> mbox cmd response data (8 bytes)
33,052,454 UART: [rt] FIPS self test
33,053,421 UART: [kat] ++
33,053,883 UART: [kat] sha1
33,058,182 UART: [kat] SHA2-256
33,060,119 UART: [kat] SHA2-384
33,063,140 UART: [kat] SHA2-512-ACC
33,065,435 UART: [kat] ECC-384
36,337,851 UART: Fatal Error: 0x90040003
36,373,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,523,529 >>> mbox cmd response: failed
36,524,211 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,674,137 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
190,009 UART:
190,308 UART: Running Caliptra ROM ...
191,335 UART:
191,494 UART: [state] CFI Enabled
257,485 UART: [state] LifecycleState = Unprovisioned
259,405 UART: [state] DebugLocked = No
261,837 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
266,996 UART: [kat] SHA2-256
436,709 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
447,229 UART: [kat] ++
447,673 UART: [kat] sha1
457,633 UART: [kat] SHA2-256
460,318 UART: [kat] SHA2-384
465,809 UART: [kat] SHA2-512-ACC
468,209 UART: [kat] ECC-384
2,760,533 UART: [kat] HMAC-384Kdf
2,792,058 UART: [kat] LMS
3,982,334 UART: [kat] --
3,985,746 UART: [cold-reset] ++
3,986,839 UART: [fht] Storing FHT @ 0x50003400
3,997,410 UART: [idev] ++
3,997,973 UART: [idev] CDI.KEYID = 6
3,998,913 UART: [idev] SUBJECT.KEYID = 7
4,000,186 UART: [idev] UDS.KEYID = 0
4,001,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,151,850 UART: [idev] Erasing UDS.KEYID = 0
7,340,441 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,497 UART: [idev] --
7,365,163 UART: [ldev] ++
7,365,734 UART: [ldev] CDI.KEYID = 6
7,366,699 UART: [ldev] SUBJECT.KEYID = 5
7,367,916 UART: [ldev] AUTHORITY.KEYID = 7
7,369,180 UART: [ldev] FE.KEYID = 1
7,414,596 UART: [ldev] Erasing FE.KEYID = 1
10,746,046 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,042,353 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,056,953 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,071,762 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,318 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,082 UART: [ldev] --
13,110,655 UART: [fwproc] Waiting for Commands...
13,113,895 UART: [fwproc] Received command 0x46574c44
13,116,081 UART: [fwproc] Received Image of size 119428 bytes
17,242,017 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,056 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,237 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,719,637 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
3,785,949 ready_for_fw is high
3,786,612 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,987,973 >>> mbox cmd response: success
23,676,182 UART:
23,676,922 UART: Running Caliptra FMC ...
23,678,042 UART:
23,678,205 UART: [state] CFI Enabled
23,746,554 UART: [fht] FMC Alias Private Key: 7
26,087,069 UART: [art] Extend RT PCRs Done
26,088,298 UART: [art] Lock RT PCRs Done
26,089,663 UART: [art] Populate DV Done
26,095,056 UART: [fht] FMC Alias Private Key: 7
26,096,768 UART: [art] Derive CDI
26,097,610 UART: [art] Store in slot 0x4
26,155,046 UART: [art] Derive Key Pair
26,156,079 UART: [art] Store priv key in slot 0x5
29,448,864 UART: [art] Derive Key Pair - Done
29,461,874 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,749,732 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,245 UART: [art] PUB.X = E68BF4D138AD1EF763AB051518450568AB229E118A6B35DB32C6BC2FEEFF816FFB11B2D08A592812A43E76781AC97645
31,758,484 UART: [art] PUB.Y = ABD5D1179C4A70FE4F65506333DFA66F969F26135965910BD177DD4678087A592AB51CE537AE4F3BB5F8A533F2169318
31,765,743 UART: [art] SIG.R = 24032DBAB913D71F8EDF194C785D4BF0A56AE2681B13EF6FD067B42C242815E23D0AD07F83FAC53DCEB56B37CBFE7C72
31,773,173 UART: [art] SIG.S = 279EFA57A08022CA4566AE1853F2A497CDC03294D251A4CE4181055C803489538FBCA91843FCE4920304D51C73077DD8
33,078,128 UART: Caliptra RT
33,078,844 UART: [state] CFI Enabled
33,256,435 UART: [rt] RT listening for mailbox commands...
33,258,291 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,287,938 UART: [rt]cmd =0x46504c54, len=4
33,289,727 >>> mbox cmd response data (8 bytes)
33,290,656 UART: [rt] FIPS self test
33,291,611 UART: [kat] ++
33,292,065 UART: [kat] sha1
33,296,471 UART: [kat] SHA2-256
33,298,404 UART: [kat] SHA2-384
33,301,420 UART: [kat] SHA2-512-ACC
33,303,660 UART: [kat] ECC-384
36,575,357 UART: Fatal Error: 0x90040003
36,610,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,760,768 >>> mbox cmd response: failed
36,761,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,911,228 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
3,775,234 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,953,944 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,238 writing to cptra_bootfsm_go
192,572 UART:
192,948 UART: Running Caliptra ROM ...
194,051 UART:
603,829 UART: [state] CFI Enabled
619,407 UART: [state] LifecycleState = Unprovisioned
621,358 UART: [state] DebugLocked = No
623,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,265 UART: [kat] SHA2-256
798,005 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,516 UART: [kat] ++
808,998 UART: [kat] sha1
820,018 UART: [kat] SHA2-256
822,666 UART: [kat] SHA2-384
828,532 UART: [kat] SHA2-512-ACC
830,907 UART: [kat] ECC-384
3,112,032 UART: [kat] HMAC-384Kdf
3,123,446 UART: [kat] LMS
4,313,590 UART: [kat] --
4,319,120 UART: [cold-reset] ++
4,320,499 UART: [fht] Storing FHT @ 0x50003400
4,330,858 UART: [idev] ++
4,331,426 UART: [idev] CDI.KEYID = 6
4,332,318 UART: [idev] SUBJECT.KEYID = 7
4,333,570 UART: [idev] UDS.KEYID = 0
4,334,566 ready_for_fw is high
4,334,809 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,879 UART: [idev] Erasing UDS.KEYID = 0
7,624,700 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,797 UART: [idev] --
7,650,153 UART: [ldev] ++
7,650,729 UART: [ldev] CDI.KEYID = 6
7,651,670 UART: [ldev] SUBJECT.KEYID = 5
7,652,913 UART: [ldev] AUTHORITY.KEYID = 7
7,654,152 UART: [ldev] FE.KEYID = 1
7,663,972 UART: [ldev] Erasing FE.KEYID = 1
10,956,765 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,246,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,182 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,275,978 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,290,485 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,843 UART: [ldev] --
13,314,855 UART: [fwproc] Waiting for Commands...
13,317,020 UART: [fwproc] Received command 0x46574c44
13,319,214 UART: [fwproc] Received Image of size 119428 bytes
17,436,842 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,516,749 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,589,896 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,921,700 >>> mbox cmd response: success
17,925,909 UART: [afmc] ++
17,926,507 UART: [afmc] CDI.KEYID = 6
17,927,431 UART: [afmc] SUBJECT.KEYID = 7
17,928,708 UART: [afmc] AUTHORITY.KEYID = 5
21,240,079 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,536,066 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,538,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,552,753 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,567,456 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,581,890 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,155 UART: [afmc] --
23,605,702 UART: [cold-reset] --
23,609,190 UART: [state] Locking Datavault
23,613,740 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,454 UART: [state] Locking ICCM
23,617,965 UART: [exit] Launching FMC @ 0x40000130
23,626,372 UART:
23,626,647 UART: Running Caliptra FMC ...
23,627,765 UART:
23,627,947 UART: [state] CFI Enabled
23,635,683 UART: [fht] FMC Alias Private Key: 7
25,975,495 UART: [art] Extend RT PCRs Done
25,976,725 UART: [art] Lock RT PCRs Done
25,978,459 UART: [art] Populate DV Done
25,983,983 UART: [fht] FMC Alias Private Key: 7
25,985,481 UART: [art] Derive CDI
25,986,250 UART: [art] Store in slot 0x4
26,029,270 UART: [art] Derive Key Pair
26,030,314 UART: [art] Store priv key in slot 0x5
29,272,073 UART: [art] Derive Key Pair - Done
29,284,927 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,565,265 UART: [art] Erasing AUTHORITY.KEYID = 7
31,566,796 UART: [art] PUB.X = 212A68F6EC8DE07AF54CDFDC37EE455AC486D41CACDEB7F198EB028709E6FFA8C9F56374A8796108E2AD2C01682B154F
31,574,062 UART: [art] PUB.Y = 3C30FCC6862BD0443DD642C06830E86B7988E265CC1E33715E8D99865060B849CB535397BD5255573538288D049D3C67
31,581,258 UART: [art] SIG.R = E5E2EC6EBAB22B215A07C833B585D31808FBEBB750171A2CE488B66A6968258DA96E03F531CC6D4E32F31DD9BDFC1EF0
31,588,709 UART: [art] SIG.S = FB77A70D6D61C69350281900381AE516F4B398EB3539EADD2F950C9E1CAAD72DE2B1E1AD8C145FA8A530C6D3DC82AECD
32,893,942 UART: Caliptra RT
32,894,656 UART: [state] CFI Enabled
33,028,265 UART: [rt] RT listening for mailbox commands...
33,030,119 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,059,793 UART: [rt]cmd =0x46504c54, len=4
33,061,289 >>> mbox cmd response data (8 bytes)
33,062,501 UART: [rt] FIPS self test
33,063,455 UART: [kat] ++
33,063,916 UART: [kat] sha1
33,068,216 UART: [kat] SHA2-256
33,070,097 UART: [kat] SHA2-384
33,073,128 UART: [kat] SHA2-512-ACC
33,075,401 UART: [kat] ECC-384
36,316,311 UART: Fatal Error: 0x90040003
36,351,689 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,501,715 >>> mbox cmd response: failed
36,502,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,652,129 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,106 UART:
190,424 UART: Running Caliptra ROM ...
191,453 UART:
3,874,801 UART: [state] CFI Enabled
3,892,079 UART: [state] LifecycleState = Unprovisioned
3,893,999 UART: [state] DebugLocked = No
3,896,550 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,901,280 UART: [kat] SHA2-256
4,071,068 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,081,603 UART: [kat] ++
4,082,070 UART: [kat] sha1
4,092,526 UART: [kat] SHA2-256
4,095,261 UART: [kat] SHA2-384
4,101,316 UART: [kat] SHA2-512-ACC
4,103,676 UART: [kat] ECC-384
6,389,603 UART: [kat] HMAC-384Kdf
6,400,129 UART: [kat] LMS
7,590,223 UART: [kat] --
7,594,651 UART: [cold-reset] ++
7,596,315 UART: [fht] Storing FHT @ 0x50003400
7,607,267 UART: [idev] ++
7,607,836 UART: [idev] CDI.KEYID = 6
7,608,942 UART: [idev] SUBJECT.KEYID = 7
7,610,067 UART: [idev] UDS.KEYID = 0
7,611,655 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,761,449 UART: [idev] Erasing UDS.KEYID = 0
10,897,479 UART: [idev] Using Sha1 for KeyId Algorithm
10,919,187 UART: [idev] --
10,922,972 UART: [ldev] ++
10,923,543 UART: [ldev] CDI.KEYID = 6
10,924,486 UART: [ldev] SUBJECT.KEYID = 5
10,925,762 UART: [ldev] AUTHORITY.KEYID = 7
10,926,918 UART: [ldev] FE.KEYID = 1
10,939,859 UART: [ldev] Erasing FE.KEYID = 1
14,230,541 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,524,706 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,539,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,554,141 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,568,669 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,588,420 UART: [ldev] --
16,592,685 UART: [fwproc] Waiting for Commands...
16,595,771 UART: [fwproc] Received command 0x46574c44
16,598,019 UART: [fwproc] Received Image of size 119428 bytes
20,714,227 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,783,602 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,856,773 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,187,610 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,128,644 ready_for_fw is high
4,129,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,184,868 >>> mbox cmd response: success
23,824,833 UART:
23,825,247 UART: Running Caliptra FMC ...
23,826,400 UART:
23,826,570 UART: [state] CFI Enabled
23,834,565 UART: [fht] FMC Alias Private Key: 7
26,174,784 UART: [art] Extend RT PCRs Done
26,176,019 UART: [art] Lock RT PCRs Done
26,177,468 UART: [art] Populate DV Done
26,182,863 UART: [fht] FMC Alias Private Key: 7
26,184,539 UART: [art] Derive CDI
26,185,373 UART: [art] Store in slot 0x4
26,227,929 UART: [art] Derive Key Pair
26,228,942 UART: [art] Store priv key in slot 0x5
29,471,004 UART: [art] Derive Key Pair - Done
29,483,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,972 UART: [art] Erasing AUTHORITY.KEYID = 7
31,765,492 UART: [art] PUB.X = 361A5524E277738B0FE27BC1C393991D2AA1AAC262C64513F3E580EE6CB1915A3ACF879AD92471539C30289FC056AE74
31,772,801 UART: [art] PUB.Y = 4F6C00508218F1B6746DA62B78970F10FBDA7EC95AFA73AAC9FE15F797FD46F7B1F0C12D75089247268F397D101714AC
31,780,048 UART: [art] SIG.R = 64AA3CC74F022E1A150040A73A54C24BF03A64E04BEACEC0093C31D6473931CB184200CA8C69F5D3E8AB2A2C130125DC
31,787,424 UART: [art] SIG.S = 9F8A02DE8AF841B1CCF02832EFE2ECCFCFBE1390F4E4E36FCD614E62ACFE614F48ABD60E62DA2E63AF4FBD7B4FB26AA4
33,092,211 UART: Caliptra RT
33,092,936 UART: [state] CFI Enabled
33,225,419 UART: [rt] RT listening for mailbox commands...
33,227,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,257,201 UART: [rt]cmd =0x46504c54, len=4
33,258,841 >>> mbox cmd response data (8 bytes)
33,259,585 UART: [rt] FIPS self test
33,260,534 UART: [kat] ++
33,260,991 UART: [kat] sha1
33,265,341 UART: [kat] SHA2-256
33,267,274 UART: [kat] SHA2-384
33,270,184 UART: [kat] SHA2-512-ACC
33,272,426 UART: [kat] ECC-384
36,513,217 UART: Fatal Error: 0x90040003
36,548,477 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,698,498 >>> mbox cmd response: failed
36,699,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,849,039 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
7,208,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,259,385 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,021 writing to cptra_bootfsm_go
192,221 UART:
192,599 UART: Running Caliptra ROM ...
193,714 UART:
193,862 UART: [state] CFI Enabled
265,117 UART: [state] LifecycleState = Unprovisioned
267,026 UART: [state] DebugLocked = No
268,270 UART: [state] WD Timer not started. Device not locked for debugging
272,544 UART: [kat] SHA2-256
452,197 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,023 UART: [kat] ++
463,516 UART: [kat] sha1
475,536 UART: [kat] SHA2-256
478,223 UART: [kat] SHA2-384
483,513 UART: [kat] SHA2-512-ACC
485,889 UART: [kat] ECC-384
2,947,803 UART: [kat] HMAC-384Kdf
2,971,990 UART: [kat] LMS
3,448,505 UART: [kat] --
3,454,502 UART: [cold-reset] ++
3,455,802 UART: [fht] FHT @ 0x50003400
3,466,074 UART: [idev] ++
3,466,643 UART: [idev] CDI.KEYID = 6
3,467,686 UART: [idev] SUBJECT.KEYID = 7
3,468,867 UART: [idev] UDS.KEYID = 0
3,469,801 ready_for_fw is high
3,470,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,257 UART: [idev] Erasing UDS.KEYID = 0
5,986,825 UART: [idev] Sha1 KeyId Algorithm
6,011,836 UART: [idev] --
6,016,972 UART: [ldev] ++
6,017,552 UART: [ldev] CDI.KEYID = 6
6,018,477 UART: [ldev] SUBJECT.KEYID = 5
6,019,696 UART: [ldev] AUTHORITY.KEYID = 7
6,020,937 UART: [ldev] FE.KEYID = 1
6,057,363 UART: [ldev] Erasing FE.KEYID = 1
8,562,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,733 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,632 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,155 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,631 UART: [ldev] --
10,376,805 UART: [fwproc] Wait for Commands...
10,379,673 UART: [fwproc] Recv command 0x46574c44
10,381,669 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,024 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,031 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,496 >>> mbox cmd response: success
14,358,326 UART: [afmc] ++
14,358,919 UART: [afmc] CDI.KEYID = 6
14,359,891 UART: [afmc] SUBJECT.KEYID = 7
14,361,119 UART: [afmc] AUTHORITY.KEYID = 5
16,891,311 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,671 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,466 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,571 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,138 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,927 UART: [afmc] --
18,695,429 UART: [cold-reset] --
18,698,088 UART: [state] Locking Datavault
18,705,082 UART: [state] Locking PCR0, PCR1 and PCR31
18,706,842 UART: [state] Locking ICCM
18,709,158 UART: [exit] Launching FMC @ 0x40000130
18,717,611 UART:
18,717,860 UART: Running Caliptra FMC ...
18,718,967 UART:
18,719,148 UART: [state] CFI Enabled
18,772,150 UART: [fht] FMC Alias Private Key: 7
20,560,132 UART: [art] Extend RT PCRs Done
20,561,353 UART: [art] Lock RT PCRs Done
20,563,038 UART: [art] Populate DV Done
20,568,350 UART: [fht] FMC Alias Private Key: 7
20,570,002 UART: [art] Derive CDI
20,570,830 UART: [art] Store in slot 0x4
20,625,015 UART: [art] Derive Key Pair
20,626,086 UART: [art] Store priv key in slot 0x5
23,089,089 UART: [art] Derive Key Pair - Done
23,101,939 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,048 UART: [art] Erasing AUTHORITY.KEYID = 7
24,815,559 UART: [art] PUB.X = 5F158292131F6CDE24678017497A6AF335E1C6EAB1A664AEFB153D5333715F2C88DEFE35A6B8B9A635AFE51D1AFEDC3B
24,822,828 UART: [art] PUB.Y = 25C989C29E0666E656C20E78617686EC4317D099FAF75D1661EAA77BFE3A9B449D2BAA3D91F3641AC22517FD712D0045
24,830,069 UART: [art] SIG.R = CA537588294BE4A5CFDE20750176A4A5A720073932208593153C6903FCFA037029855CD7C244D7B52E0CA723F15701A0
24,837,421 UART: [art] SIG.S = EFDBDAC1B99C840EE39E4567C2EA1B23D25C45D52C9FE0307D4C6CACC8D42F8C6E32AA5430EAFE2517BE6F1BD7C1BFCD
25,816,619 UART: Caliptra RT
25,817,353 UART: [state] CFI Enabled
25,994,255 UART: [rt] RT listening for mailbox commands...
25,996,121 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,026,044 UART: [rt]cmd =0x46504c54, len=4
26,027,526 >>> mbox cmd response data (8 bytes)
26,028,866 UART: [rt] FIPS self test
26,029,822 UART: [kat] ++
26,030,298 UART: [kat] sha1
26,034,688 UART: [kat] SHA2-256
26,036,635 UART: [kat] SHA2-384
26,039,494 UART: [kat] SHA2-512-ACC
26,041,743 UART: [kat] ECC-384
28,486,263 UART: Fatal Error: 0x90040003
28,521,496 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,671,528 >>> mbox cmd response: failed
28,672,182 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,822,119 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
190,098 UART:
190,391 UART: Running Caliptra ROM ...
191,425 UART:
191,568 UART: [state] CFI Enabled
255,322 UART: [state] LifecycleState = Unprovisioned
257,256 UART: [state] DebugLocked = No
259,898 UART: [state] WD Timer not started. Device not locked for debugging
263,028 UART: [kat] SHA2-256
442,680 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
453,496 UART: [kat] ++
453,958 UART: [kat] sha1
463,920 UART: [kat] SHA2-256
466,613 UART: [kat] SHA2-384
473,079 UART: [kat] SHA2-512-ACC
475,478 UART: [kat] ECC-384
2,938,154 UART: [kat] HMAC-384Kdf
2,959,309 UART: [kat] LMS
3,435,836 UART: [kat] --
3,439,937 UART: [cold-reset] ++
3,442,426 UART: [fht] FHT @ 0x50003400
3,452,786 UART: [idev] ++
3,453,417 UART: [idev] CDI.KEYID = 6
3,454,332 UART: [idev] SUBJECT.KEYID = 7
3,455,607 UART: [idev] UDS.KEYID = 0
3,457,124 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,607,293 UART: [idev] Erasing UDS.KEYID = 0
5,975,198 UART: [idev] Sha1 KeyId Algorithm
5,998,807 UART: [idev] --
6,004,806 UART: [ldev] ++
6,005,386 UART: [ldev] CDI.KEYID = 6
6,006,304 UART: [ldev] SUBJECT.KEYID = 5
6,007,525 UART: [ldev] AUTHORITY.KEYID = 7
6,008,764 UART: [ldev] FE.KEYID = 1
6,045,443 UART: [ldev] Erasing FE.KEYID = 1
8,554,611 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,285,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,301,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,317,296 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,332,854 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,353,691 UART: [ldev] --
10,359,407 UART: [fwproc] Wait for Commands...
10,362,653 UART: [fwproc] Recv command 0x46574c44
10,364,645 UART: [fwproc] Recv'd Img size: 119428 bytes
13,858,940 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,049 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,055 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,347,240 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,990 writing to cptra_bootfsm_go
3,461,742 ready_for_fw is high
3,462,400 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,233,741 >>> mbox cmd response: success
18,517,194 UART:
18,517,619 UART: Running Caliptra FMC ...
18,518,786 UART:
18,518,957 UART: [state] CFI Enabled
18,582,762 UART: [fht] FMC Alias Private Key: 7
20,349,051 UART: [art] Extend RT PCRs Done
20,350,383 UART: [art] Lock RT PCRs Done
20,351,991 UART: [art] Populate DV Done
20,357,135 UART: [fht] FMC Alias Private Key: 7
20,358,641 UART: [art] Derive CDI
20,359,415 UART: [art] Store in slot 0x4
20,415,706 UART: [art] Derive Key Pair
20,416,705 UART: [art] Store priv key in slot 0x5
22,879,909 UART: [art] Derive Key Pair - Done
22,893,036 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,605,072 UART: [art] Erasing AUTHORITY.KEYID = 7
24,606,579 UART: [art] PUB.X = 553B387CA940FEAA98600B4D85BD31EB9FD0BB0934DC99192E02731075224ADDAA3166361E3E9571DB915DBD7C64545C
24,613,919 UART: [art] PUB.Y = 00A0E102012B164B0A4DC65C5D7C4FF85A9E10B015701AB2128A6A52D15B5D80E751944B30E8FAAA05B0DBFA979471A2
24,621,104 UART: [art] SIG.R = 4B89F38F291767EDC63A7B9A914FFA8C98EE36A272C3FAE8B7D12548425E30AA6AA6DA3659D6E8D26D7AD7A280F53CCE
24,628,522 UART: [art] SIG.S = 0A60138E3D642E00A7A6185B3E3963B1D5D936B3B4B5A8D063946CE9D754B321F7FDDAE26D8C0DD67C334B230DBDDBFA
25,607,287 UART: Caliptra RT
25,607,994 UART: [state] CFI Enabled
25,788,152 UART: [rt] RT listening for mailbox commands...
25,790,009 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,819,886 UART: [rt]cmd =0x46504c54, len=4
25,821,468 >>> mbox cmd response data (8 bytes)
25,822,423 UART: [rt] FIPS self test
25,823,387 UART: [kat] ++
25,823,846 UART: [kat] sha1
25,828,143 UART: [kat] SHA2-256
25,830,055 UART: [kat] SHA2-384
25,833,029 UART: [kat] SHA2-512-ACC
25,835,334 UART: [kat] ECC-384
28,277,852 UART: Fatal Error: 0x90040003
28,313,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,463,191 >>> mbox cmd response: failed
28,463,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,614,184 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,451,643 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,225,183 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,445 UART:
192,824 UART: Running Caliptra ROM ...
194,030 UART:
603,666 UART: [state] CFI Enabled
617,410 UART: [state] LifecycleState = Unprovisioned
619,294 UART: [state] DebugLocked = No
621,109 UART: [state] WD Timer not started. Device not locked for debugging
624,690 UART: [kat] SHA2-256
804,369 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,115 UART: [kat] ++
815,673 UART: [kat] sha1
826,624 UART: [kat] SHA2-256
829,285 UART: [kat] SHA2-384
835,425 UART: [kat] SHA2-512-ACC
837,763 UART: [kat] ECC-384
3,279,566 UART: [kat] HMAC-384Kdf
3,291,879 UART: [kat] LMS
3,768,364 UART: [kat] --
3,772,645 UART: [cold-reset] ++
3,773,652 UART: [fht] FHT @ 0x50003400
3,785,763 UART: [idev] ++
3,786,329 UART: [idev] CDI.KEYID = 6
3,787,216 UART: [idev] SUBJECT.KEYID = 7
3,788,557 UART: [idev] UDS.KEYID = 0
3,789,466 ready_for_fw is high
3,789,676 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,939,660 UART: [idev] Erasing UDS.KEYID = 0
6,269,761 UART: [idev] Sha1 KeyId Algorithm
6,292,618 UART: [idev] --
6,296,752 UART: [ldev] ++
6,297,335 UART: [ldev] CDI.KEYID = 6
6,298,310 UART: [ldev] SUBJECT.KEYID = 5
6,299,473 UART: [ldev] AUTHORITY.KEYID = 7
6,300,709 UART: [ldev] FE.KEYID = 1
6,312,871 UART: [ldev] Erasing FE.KEYID = 1
8,789,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,721 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,524,624 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,540,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,022 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,282 UART: [ldev] --
10,582,663 UART: [fwproc] Wait for Commands...
10,585,094 UART: [fwproc] Recv command 0x46574c44
10,587,094 UART: [fwproc] Recv'd Img size: 119428 bytes
14,072,502 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,148,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,221,126 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,552,913 >>> mbox cmd response: success
14,556,807 UART: [afmc] ++
14,557,411 UART: [afmc] CDI.KEYID = 6
14,558,323 UART: [afmc] SUBJECT.KEYID = 7
14,559,542 UART: [afmc] AUTHORITY.KEYID = 5
17,065,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,787,968 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,790,207 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,806,048 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,822,071 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,837,645 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,861,665 UART: [afmc] --
18,865,046 UART: [cold-reset] --
18,868,754 UART: [state] Locking Datavault
18,873,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,875,277 UART: [state] Locking ICCM
18,877,589 UART: [exit] Launching FMC @ 0x40000130
18,885,986 UART:
18,886,224 UART: Running Caliptra FMC ...
18,887,334 UART:
18,887,503 UART: [state] CFI Enabled
18,895,556 UART: [fht] FMC Alias Private Key: 7
20,662,182 UART: [art] Extend RT PCRs Done
20,663,403 UART: [art] Lock RT PCRs Done
20,665,034 UART: [art] Populate DV Done
20,670,505 UART: [fht] FMC Alias Private Key: 7
20,672,162 UART: [art] Derive CDI
20,672,986 UART: [art] Store in slot 0x4
20,715,260 UART: [art] Derive Key Pair
20,716,304 UART: [art] Store priv key in slot 0x5
23,142,618 UART: [art] Derive Key Pair - Done
23,155,589 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,862,141 UART: [art] Erasing AUTHORITY.KEYID = 7
24,863,647 UART: [art] PUB.X = E4EF96D7E1ECDC60C00FAD4E6604F9914D2DC336B82FD25482C48D7E89C917194D1521A4AA8D790635A30BFB5E9E22FC
24,870,927 UART: [art] PUB.Y = 9048662B77675767CB5CCDEA8465EE5915307F5997F89E95C417AC5A2670B9345F491A1FE4F3259A7BFE7CF6A248C358
24,878,188 UART: [art] SIG.R = 71B61743821478B22D7BD9532479F3F22DE726A8B21FE56F66C9E296583A6B3BCA99E34F310D0F7201FB8002934879F7
24,885,565 UART: [art] SIG.S = 1B333E2125C102F6777447D4BBB0858F6EEFCAAB5FEF057DBD027E036CEA9DE732EA816FC79A340B0EFAC1FF1C00BBCD
25,865,129 UART: Caliptra RT
25,865,848 UART: [state] CFI Enabled
25,998,451 UART: [rt] RT listening for mailbox commands...
26,000,351 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,030,005 UART: [rt]cmd =0x46504c54, len=4
26,031,597 >>> mbox cmd response data (8 bytes)
26,032,564 UART: [rt] FIPS self test
26,033,519 UART: [kat] ++
26,033,974 UART: [kat] sha1
26,038,379 UART: [kat] SHA2-256
26,040,318 UART: [kat] SHA2-384
26,043,293 UART: [kat] SHA2-512-ACC
26,045,596 UART: [kat] ECC-384
28,471,631 UART: Fatal Error: 0x90040003
28,506,928 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,656,893 >>> mbox cmd response: failed
28,657,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,807,448 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
190,028 UART:
190,315 UART: Running Caliptra ROM ...
191,344 UART:
11,710,898 UART: [state] CFI Enabled
11,724,050 UART: [state] LifecycleState = Unprovisioned
11,725,976 UART: [state] DebugLocked = No
11,727,581 UART: [state] WD Timer not started. Device not locked for debugging
11,730,632 UART: [kat] SHA2-256
11,910,302 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,921,047 UART: [kat] ++
11,921,542 UART: [kat] sha1
11,932,540 UART: [kat] SHA2-256
11,935,240 UART: [kat] SHA2-384
11,941,606 UART: [kat] SHA2-512-ACC
11,944,016 UART: [kat] ECC-384
14,387,087 UART: [kat] HMAC-384Kdf
14,399,849 UART: [kat] LMS
14,876,368 UART: [kat] --
14,881,326 UART: [cold-reset] ++
14,883,636 UART: [fht] FHT @ 0x50003400
14,895,702 UART: [idev] ++
14,896,326 UART: [idev] CDI.KEYID = 6
14,897,216 UART: [idev] SUBJECT.KEYID = 7
14,898,481 UART: [idev] UDS.KEYID = 0
14,900,035 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,049,941 UART: [idev] Erasing UDS.KEYID = 0
17,377,966 UART: [idev] Sha1 KeyId Algorithm
17,401,725 UART: [idev] --
17,406,059 UART: [ldev] ++
17,406,653 UART: [ldev] CDI.KEYID = 6
17,407,565 UART: [ldev] SUBJECT.KEYID = 5
17,408,806 UART: [ldev] AUTHORITY.KEYID = 7
17,410,040 UART: [ldev] FE.KEYID = 1
17,421,609 UART: [ldev] Erasing FE.KEYID = 1
19,900,539 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,620,838 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,636,695 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,652,569 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,668,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,689,744 UART: [ldev] --
21,695,221 UART: [fwproc] Wait for Commands...
21,697,431 UART: [fwproc] Recv command 0x46574c44
21,699,426 UART: [fwproc] Recv'd Img size: 119428 bytes
25,202,962 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,279,484 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,352,499 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,684,496 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,638 writing to cptra_bootfsm_go
3,778,094 ready_for_fw is high
3,778,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,471,301 >>> mbox cmd response: success
18,722,166 UART:
18,722,558 UART: Running Caliptra FMC ...
18,723,709 UART:
18,723,879 UART: [state] CFI Enabled
18,731,855 UART: [fht] FMC Alias Private Key: 7
20,497,739 UART: [art] Extend RT PCRs Done
20,498,970 UART: [art] Lock RT PCRs Done
20,500,762 UART: [art] Populate DV Done
20,505,974 UART: [fht] FMC Alias Private Key: 7
20,507,645 UART: [art] Derive CDI
20,508,471 UART: [art] Store in slot 0x4
20,551,247 UART: [art] Derive Key Pair
20,552,297 UART: [art] Store priv key in slot 0x5
22,979,095 UART: [art] Derive Key Pair - Done
22,992,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,698,850 UART: [art] Erasing AUTHORITY.KEYID = 7
24,700,359 UART: [art] PUB.X = 61EB2053461257C3EBDE040926C8CE7AF393B65BD3CE0ACC6EFF76155AF04DD15052B1890E44276499EE2681D1C92E86
24,707,686 UART: [art] PUB.Y = 432256CCB04A0F5015C3DD7630D04D3FC15CADB28EA0512EA360532250DE67430C8A0DE96C3BF84D5C86C0F0AE96FA59
24,714,910 UART: [art] SIG.R = 05B8D1CF4B76448026BFF97244D08825F5E2F028ED332A4F908C3FB55C780BC039BAA1D5A9BE843628AD9AB9DA1CB45D
24,722,323 UART: [art] SIG.S = A17A6F05DC086E7C2FC2F0B0BF873B731371B7F57C74AFCA96FDD10045896F0E7B4D92A9C8D15D8B6C24898DA5611685
25,700,933 UART: Caliptra RT
25,701,634 UART: [state] CFI Enabled
25,834,643 UART: [rt] RT listening for mailbox commands...
25,836,504 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,866,414 UART: [rt]cmd =0x46504c54, len=4
25,868,015 >>> mbox cmd response data (8 bytes)
25,869,112 UART: [rt] FIPS self test
25,870,059 UART: [kat] ++
25,870,517 UART: [kat] sha1
25,874,924 UART: [kat] SHA2-256
25,876,817 UART: [kat] SHA2-384
25,879,780 UART: [kat] SHA2-512-ACC
25,882,078 UART: [kat] ECC-384
28,307,766 UART: Fatal Error: 0x90040003
28,343,003 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,493,017 >>> mbox cmd response: failed
28,493,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,643,599 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
15,066,689 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,736,708 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
192,230 UART:
192,593 UART: Running Caliptra ROM ...
193,790 UART:
193,947 UART: [state] CFI Enabled
261,406 UART: [state] LifecycleState = Unprovisioned
263,781 UART: [state] DebugLocked = No
265,967 UART: [state] WD Timer not started. Device not locked for debugging
270,952 UART: [kat] SHA2-256
460,840 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,600 UART: [kat] ++
472,081 UART: [kat] sha1
484,769 UART: [kat] SHA2-256
487,825 UART: [kat] SHA2-384
492,763 UART: [kat] SHA2-512-ACC
495,352 UART: [kat] ECC-384
2,948,697 UART: [kat] HMAC-384Kdf
2,971,117 UART: [kat] LMS
3,502,921 UART: [kat] --
3,507,755 UART: [cold-reset] ++
3,509,693 UART: [fht] FHT @ 0x50003400
3,521,023 UART: [idev] ++
3,521,811 UART: [idev] CDI.KEYID = 6
3,522,708 UART: [idev] SUBJECT.KEYID = 7
3,523,895 UART: [idev] UDS.KEYID = 0
3,524,800 ready_for_fw is high
3,525,039 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,136 UART: [idev] Erasing UDS.KEYID = 0
6,029,806 UART: [idev] Sha1 KeyId Algorithm
6,050,855 UART: [idev] --
6,055,628 UART: [ldev] ++
6,056,341 UART: [ldev] CDI.KEYID = 6
6,057,422 UART: [ldev] SUBJECT.KEYID = 5
6,058,538 UART: [ldev] AUTHORITY.KEYID = 7
6,059,722 UART: [ldev] FE.KEYID = 1
6,088,917 UART: [ldev] Erasing FE.KEYID = 1
8,596,564 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,316,592 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,332,105 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,346,890 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,362,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,382,822 UART: [ldev] --
10,387,389 UART: [fwproc] Wait for Commands...
10,390,464 UART: [fwproc] Recv command 0x46574c44
10,392,727 UART: [fwproc] Recv'd Img size: 119428 bytes
13,894,090 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,970,087 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,093,734 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,659,471 >>> mbox cmd response: success
14,662,996 UART: [afmc] ++
14,663,698 UART: [afmc] CDI.KEYID = 6
14,664,867 UART: [afmc] SUBJECT.KEYID = 7
14,666,356 UART: [afmc] AUTHORITY.KEYID = 5
17,191,412 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,913,989 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,915,860 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,930,947 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,946,123 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,961,082 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,985,037 UART: [afmc] --
18,988,855 UART: [cold-reset] --
18,991,480 UART: [state] Locking Datavault
18,997,110 UART: [state] Locking PCR0, PCR1 and PCR31
18,999,307 UART: [state] Locking ICCM
19,000,869 UART: [exit] Launching FMC @ 0x40000130
19,009,542 UART:
19,009,786 UART: Running Caliptra FMC ...
19,010,897 UART:
19,011,060 UART: [state] CFI Enabled
19,071,281 UART: [fht] FMC Alias Private Key: 7
20,859,219 UART: [art] Extend RT PCRs Done
20,860,456 UART: [art] Lock RT PCRs Done
20,861,628 UART: [art] Populate DV Done
20,867,048 UART: [fht] FMC Alias Private Key: 7
20,868,708 UART: [art] Derive CDI
20,869,477 UART: [art] Store in slot 0x4
20,925,225 UART: [art] Derive Key Pair
20,926,271 UART: [art] Store priv key in slot 0x5
23,388,938 UART: [art] Derive Key Pair - Done
23,401,668 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,044 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,712 UART: [art] PUB.X = B35605125895BAA1F3674D45E783F6D2F111106C3CBBEEBFDE273BC843B5270FD90DA4CB4C66E0CC665F39916143CF47
25,123,834 UART: [art] PUB.Y = 5E8D6C087AD93B1940C768300DE6815A88EF26FB9DBB78F15933427FDA847FC8888C0E9E75DD8A7ED2B93CFF0799CD69
25,131,082 UART: [art] SIG.R = 97D22F4827BABB7C851334BCA8FC4606D9652857698F3BE0B0E7D37E097F126A59146C549048CC09F6379BEC81526B1F
25,138,431 UART: [art] SIG.S = EB21F3F0CAEAA2DF248265C613CB986E4E4C272224BD23C547F793DBF52AA7F30F473F8E967FB7417D33CE88735B6BB7
26,117,567 UART: Caliptra RT
26,118,306 UART: [state] CFI Enabled
26,298,017 UART: [rt] RT listening for mailbox commands...
26,299,890 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,329,645 UART: [rt]cmd =0x46504c54, len=4
26,331,213 >>> mbox cmd response data (8 bytes)
26,332,360 UART: [rt] FIPS self test
26,333,313 UART: [kat] ++
26,333,766 UART: [kat] sha1
26,338,170 UART: [kat] SHA2-256
26,340,048 UART: [kat] SHA2-384
26,343,098 UART: [kat] SHA2-512-ACC
26,345,386 UART: [kat] ECC-384
28,788,755 UART: Fatal Error: 0x90040003
28,824,145 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,974,152 >>> mbox cmd response: failed
28,974,836 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,124,751 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,018 UART:
190,320 UART: Running Caliptra ROM ...
191,350 UART:
191,493 UART: [state] CFI Enabled
256,633 UART: [state] LifecycleState = Unprovisioned
259,044 UART: [state] DebugLocked = No
261,729 UART: [state] WD Timer not started. Device not locked for debugging
266,058 UART: [kat] SHA2-256
455,936 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
466,700 UART: [kat] ++
467,233 UART: [kat] sha1
477,632 UART: [kat] SHA2-256
480,622 UART: [kat] SHA2-384
485,288 UART: [kat] SHA2-512-ACC
487,855 UART: [kat] ECC-384
2,935,662 UART: [kat] HMAC-384Kdf
2,962,153 UART: [kat] LMS
3,493,906 UART: [kat] --
3,495,707 UART: [cold-reset] ++
3,497,809 UART: [fht] FHT @ 0x50003400
3,510,418 UART: [idev] ++
3,511,104 UART: [idev] CDI.KEYID = 6
3,512,190 UART: [idev] SUBJECT.KEYID = 7
3,513,310 UART: [idev] UDS.KEYID = 0
3,514,831 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,664,784 UART: [idev] Erasing UDS.KEYID = 0
6,018,342 UART: [idev] Sha1 KeyId Algorithm
6,041,628 UART: [idev] --
6,047,738 UART: [ldev] ++
6,048,500 UART: [ldev] CDI.KEYID = 6
6,049,420 UART: [ldev] SUBJECT.KEYID = 5
6,050,529 UART: [ldev] AUTHORITY.KEYID = 7
6,051,769 UART: [ldev] FE.KEYID = 1
6,090,299 UART: [ldev] Erasing FE.KEYID = 1
8,595,282 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,334,318 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,349,511 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,364,769 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,379,852 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,401,776 UART: [ldev] --
10,407,495 UART: [fwproc] Wait for Commands...
10,410,574 UART: [fwproc] Recv command 0x46574c44
10,412,893 UART: [fwproc] Recv'd Img size: 119428 bytes
13,918,647 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,675 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,122,262 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,044 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
3,439,467 ready_for_fw is high
3,439,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,837,581 >>> mbox cmd response: success
19,128,832 UART:
19,129,238 UART: Running Caliptra FMC ...
19,130,360 UART:
19,130,516 UART: [state] CFI Enabled
19,198,207 UART: [fht] FMC Alias Private Key: 7
20,964,464 UART: [art] Extend RT PCRs Done
20,965,691 UART: [art] Lock RT PCRs Done
20,967,295 UART: [art] Populate DV Done
20,972,611 UART: [fht] FMC Alias Private Key: 7
20,974,211 UART: [art] Derive CDI
20,974,953 UART: [art] Store in slot 0x4
21,030,765 UART: [art] Derive Key Pair
21,031,837 UART: [art] Store priv key in slot 0x5
23,494,443 UART: [art] Derive Key Pair - Done
23,507,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,220,873 UART: [art] Erasing AUTHORITY.KEYID = 7
25,222,380 UART: [art] PUB.X = 0B96F9EFF833D2413D6D42AF573EEDF90F1BA4505EED759DF4C9DEDEF5968796C3DB0BBA3981773ED00A287A5397976B
25,229,659 UART: [art] PUB.Y = 1832F16A247767FBA5586CC29FE4AD835719B83015654A11D0724DA7C58363F1C3DF4A758BCB72510E758C56A4E9B497
25,236,880 UART: [art] SIG.R = 5AD8B11EDC07D039DDED26AE6B367B5DFCF3D9D7862C07A1851C08FF7CACA29661BF2D3F5AAB6878A76DAA71EDB11F09
25,244,340 UART: [art] SIG.S = 1A0613099212562D51BBC0670630EE18CF59DBF2DE3E9BE1A1D277821581124A7CA46075A7A0B779FABEFA2B959FC000
26,223,039 UART: Caliptra RT
26,223,752 UART: [state] CFI Enabled
26,403,220 UART: [rt] RT listening for mailbox commands...
26,405,079 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,434,771 UART: [rt]cmd =0x46504c54, len=4
26,436,304 >>> mbox cmd response data (8 bytes)
26,437,419 UART: [rt] FIPS self test
26,438,359 UART: [kat] ++
26,438,837 UART: [kat] sha1
26,443,179 UART: [kat] SHA2-256
26,445,100 UART: [kat] SHA2-384
26,448,132 UART: [kat] SHA2-512-ACC
26,450,434 UART: [kat] ECC-384
28,893,243 UART: Fatal Error: 0x90040003
28,928,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,078,663 >>> mbox cmd response: failed
29,079,314 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,229,204 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,430,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,842,917 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,435 writing to cptra_bootfsm_go
193,708 UART:
194,065 UART: Running Caliptra ROM ...
195,179 UART:
604,724 UART: [state] CFI Enabled
617,565 UART: [state] LifecycleState = Unprovisioned
619,596 UART: [state] DebugLocked = No
621,122 UART: [state] WD Timer not started. Device not locked for debugging
625,736 UART: [kat] SHA2-256
815,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,444 UART: [kat] ++
826,895 UART: [kat] sha1
837,918 UART: [kat] SHA2-256
840,930 UART: [kat] SHA2-384
845,444 UART: [kat] SHA2-512-ACC
848,050 UART: [kat] ECC-384
3,292,257 UART: [kat] HMAC-384Kdf
3,305,984 UART: [kat] LMS
3,837,834 UART: [kat] --
3,842,228 UART: [cold-reset] ++
3,843,940 UART: [fht] FHT @ 0x50003400
3,855,085 UART: [idev] ++
3,855,805 UART: [idev] CDI.KEYID = 6
3,856,760 UART: [idev] SUBJECT.KEYID = 7
3,857,943 UART: [idev] UDS.KEYID = 0
3,858,877 ready_for_fw is high
3,859,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,088 UART: [idev] Erasing UDS.KEYID = 0
6,336,842 UART: [idev] Sha1 KeyId Algorithm
6,357,876 UART: [idev] --
6,361,819 UART: [ldev] ++
6,362,524 UART: [ldev] CDI.KEYID = 6
6,363,410 UART: [ldev] SUBJECT.KEYID = 5
6,364,627 UART: [ldev] AUTHORITY.KEYID = 7
6,365,758 UART: [ldev] FE.KEYID = 1
6,375,821 UART: [ldev] Erasing FE.KEYID = 1
8,855,141 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,575,409 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,590,596 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,605,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,777 UART: [ldev] --
10,648,898 UART: [fwproc] Wait for Commands...
10,650,356 UART: [fwproc] Recv command 0x46574c44
10,652,356 UART: [fwproc] Recv'd Img size: 119428 bytes
14,162,095 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,242,139 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,787 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,874 >>> mbox cmd response: success
14,935,156 UART: [afmc] ++
14,935,866 UART: [afmc] CDI.KEYID = 6
14,937,035 UART: [afmc] SUBJECT.KEYID = 7
14,938,534 UART: [afmc] AUTHORITY.KEYID = 5
17,446,902 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,170,301 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,172,311 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,187,347 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,202,511 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,217,443 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,242,287 UART: [afmc] --
19,246,744 UART: [cold-reset] --
19,250,125 UART: [state] Locking Datavault
19,254,513 UART: [state] Locking PCR0, PCR1 and PCR31
19,256,674 UART: [state] Locking ICCM
19,258,537 UART: [exit] Launching FMC @ 0x40000130
19,267,204 UART:
19,267,441 UART: Running Caliptra FMC ...
19,268,468 UART:
19,268,616 UART: [state] CFI Enabled
19,276,558 UART: [fht] FMC Alias Private Key: 7
21,042,604 UART: [art] Extend RT PCRs Done
21,043,833 UART: [art] Lock RT PCRs Done
21,045,331 UART: [art] Populate DV Done
21,050,803 UART: [fht] FMC Alias Private Key: 7
21,052,346 UART: [art] Derive CDI
21,053,118 UART: [art] Store in slot 0x4
21,096,040 UART: [art] Derive Key Pair
21,097,051 UART: [art] Store priv key in slot 0x5
23,523,833 UART: [art] Derive Key Pair - Done
23,536,906 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,523 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,048 UART: [art] PUB.X = F194AC3F2CB19EB0061D6177A9DCAB1F13AF1E3C8324B0A75C9D74DED7148F07FB100EBC1E63E1F9AA515CFDF20BC6CD
25,252,335 UART: [art] PUB.Y = 1C0CF0E7336596689C163E7B142D59A138A4CCEE0E97BDC802A150DCCC2440F46E0D13C87E18C94E811FD6719B5FCAFE
25,259,593 UART: [art] SIG.R = 597030EC4E2136914EEA4421239F2FD191297C6223A349C1EECC754E5445C239555A5B43449B62523169F09B0EAE10BC
25,266,961 UART: [art] SIG.S = F626C9941DFF05113D1D968B008CB1A2679FFAC6ABA067A3D1316FA2E52CC9F3F754011063A0E8A00126C2EF9F6BFC9F
26,245,387 UART: Caliptra RT
26,246,103 UART: [state] CFI Enabled
26,379,238 UART: [rt] RT listening for mailbox commands...
26,381,089 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,410,801 UART: [rt]cmd =0x46504c54, len=4
26,412,577 >>> mbox cmd response data (8 bytes)
26,413,545 UART: [rt] FIPS self test
26,414,499 UART: [kat] ++
26,414,957 UART: [kat] sha1
26,419,418 UART: [kat] SHA2-256
26,421,316 UART: [kat] SHA2-384
26,424,390 UART: [kat] SHA2-512-ACC
26,426,684 UART: [kat] ECC-384
28,852,427 UART: Fatal Error: 0x90040003
28,887,814 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,037,715 >>> mbox cmd response: failed
29,038,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,188,290 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,091 UART:
190,386 UART: Running Caliptra ROM ...
191,499 UART:
11,343,906 UART: [state] CFI Enabled
11,360,812 UART: [state] LifecycleState = Unprovisioned
11,363,177 UART: [state] DebugLocked = No
11,365,321 UART: [state] WD Timer not started. Device not locked for debugging
11,370,542 UART: [kat] SHA2-256
11,560,452 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,571,200 UART: [kat] ++
11,571,723 UART: [kat] sha1
11,583,209 UART: [kat] SHA2-256
11,586,237 UART: [kat] SHA2-384
11,592,503 UART: [kat] SHA2-512-ACC
11,595,080 UART: [kat] ECC-384
14,036,814 UART: [kat] HMAC-384Kdf
14,049,972 UART: [kat] LMS
14,581,801 UART: [kat] --
14,585,553 UART: [cold-reset] ++
14,587,865 UART: [fht] FHT @ 0x50003400
14,600,038 UART: [idev] ++
14,600,721 UART: [idev] CDI.KEYID = 6
14,601,760 UART: [idev] SUBJECT.KEYID = 7
14,602,929 UART: [idev] UDS.KEYID = 0
14,604,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,754,398 UART: [idev] Erasing UDS.KEYID = 0
17,083,861 UART: [idev] Sha1 KeyId Algorithm
17,106,669 UART: [idev] --
17,111,197 UART: [ldev] ++
17,111,933 UART: [ldev] CDI.KEYID = 6
17,112,844 UART: [ldev] SUBJECT.KEYID = 5
17,114,004 UART: [ldev] AUTHORITY.KEYID = 7
17,115,242 UART: [ldev] FE.KEYID = 1
17,127,083 UART: [ldev] Erasing FE.KEYID = 1
19,604,135 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,320,405 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,335,593 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,350,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,365,896 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,387,425 UART: [ldev] --
21,392,109 UART: [fwproc] Wait for Commands...
21,393,781 UART: [fwproc] Recv command 0x46574c44
21,396,101 UART: [fwproc] Recv'd Img size: 119428 bytes
24,911,967 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,991,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,115,082 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,679,908 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,231 writing to cptra_bootfsm_go
3,758,920 ready_for_fw is high
3,759,605 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,069,780 >>> mbox cmd response: success
19,322,236 UART:
19,322,650 UART: Running Caliptra FMC ...
19,323,794 UART:
19,323,958 UART: [state] CFI Enabled
19,331,704 UART: [fht] FMC Alias Private Key: 7
21,098,112 UART: [art] Extend RT PCRs Done
21,099,344 UART: [art] Lock RT PCRs Done
21,101,183 UART: [art] Populate DV Done
21,106,768 UART: [fht] FMC Alias Private Key: 7
21,108,316 UART: [art] Derive CDI
21,109,136 UART: [art] Store in slot 0x4
21,151,634 UART: [art] Derive Key Pair
21,152,682 UART: [art] Store priv key in slot 0x5
23,579,013 UART: [art] Derive Key Pair - Done
23,591,966 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,297,996 UART: [art] Erasing AUTHORITY.KEYID = 7
25,299,507 UART: [art] PUB.X = 905EC66C806F5DDAF99FC389B138DA1735B2328BB090BBCE5CD586596B398483CE6E37C07886736EE0A29307BE13C2D0
25,306,807 UART: [art] PUB.Y = 76916AEE59E7305F1C541F944A166B6E22F301751A33D4A8A3596EE0A45BF4553152493D2798DC7892C40FFD00E2DC5A
25,314,033 UART: [art] SIG.R = D4EC88F390447F88C0AC45B7A2416B50D2D72B6B2B22FC16E3BFA89ACD9822566B090BCDA2F1E598046D48C7D9006018
25,321,409 UART: [art] SIG.S = ECF0DB2CE05A57044C92CEDC5B5093D92076078421B0DC9DFF430E8CA3D3257D92EE159CD3EE894A7E448DF63B877FAA
26,300,396 UART: Caliptra RT
26,301,089 UART: [state] CFI Enabled
26,433,157 UART: [rt] RT listening for mailbox commands...
26,435,001 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,464,488 UART: [rt]cmd =0x46504c54, len=4
26,466,119 >>> mbox cmd response data (8 bytes)
26,467,282 UART: [rt] FIPS self test
26,468,228 UART: [kat] ++
26,468,686 UART: [kat] sha1
26,473,033 UART: [kat] SHA2-256
26,474,911 UART: [kat] SHA2-384
26,477,744 UART: [kat] SHA2-512-ACC
26,479,976 UART: [kat] ECC-384
28,905,958 UART: Fatal Error: 0x90040003
28,941,251 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,091,268 >>> mbox cmd response: failed
29,091,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,242,142 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
14,438,599 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,738,449 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,547 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,117 UART: [kat] SHA2-256
882,048 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,163 UART: [kat] ++
886,315 UART: [kat] sha1
890,581 UART: [kat] SHA2-256
892,519 UART: [kat] SHA2-384
895,280 UART: [kat] SHA2-512-ACC
897,181 UART: [kat] ECC-384
903,172 UART: [kat] HMAC-384Kdf
907,900 UART: [kat] LMS
1,476,096 UART: [kat] --
1,477,137 UART: [cold-reset] ++
1,477,667 UART: [fht] Storing FHT @ 0x50003400
1,480,386 UART: [idev] ++
1,480,554 UART: [idev] CDI.KEYID = 6
1,480,914 UART: [idev] SUBJECT.KEYID = 7
1,481,338 UART: [idev] UDS.KEYID = 0
1,481,683 ready_for_fw is high
1,481,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,476 UART: [idev] Erasing UDS.KEYID = 0
1,506,228 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,644 UART: [idev] --
1,515,691 UART: [ldev] ++
1,515,859 UART: [ldev] CDI.KEYID = 6
1,516,222 UART: [ldev] SUBJECT.KEYID = 5
1,516,648 UART: [ldev] AUTHORITY.KEYID = 7
1,517,111 UART: [ldev] FE.KEYID = 1
1,522,351 UART: [ldev] Erasing FE.KEYID = 1
1,547,520 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,554 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,266 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,460 UART: [ldev] --
1,586,905 UART: [fwproc] Waiting for Commands...
1,587,734 UART: [fwproc] Received command 0x46574c44
1,588,525 UART: [fwproc] Received Image of size 119428 bytes
2,943,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,531 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,749 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,264 >>> mbox cmd response: success
3,144,328 UART: [afmc] ++
3,144,496 UART: [afmc] CDI.KEYID = 6
3,144,858 UART: [afmc] SUBJECT.KEYID = 7
3,145,283 UART: [afmc] AUTHORITY.KEYID = 5
3,180,818 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,162 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,942 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,651 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,534 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,217 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,103 UART: [afmc] --
3,224,221 UART: [cold-reset] --
3,225,307 UART: [state] Locking Datavault
3,226,410 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,014 UART: [state] Locking ICCM
3,227,682 UART: [exit] Launching FMC @ 0x40000130
3,233,012 UART:
3,233,028 UART: Running Caliptra FMC ...
3,233,436 UART:
3,233,490 UART: [state] CFI Enabled
3,244,052 UART: [fht] FMC Alias Private Key: 7
3,363,282 UART: [art] Extend RT PCRs Done
3,363,710 UART: [art] Lock RT PCRs Done
3,365,214 UART: [art] Populate DV Done
3,373,147 UART: [fht] FMC Alias Private Key: 7
3,374,089 UART: [art] Derive CDI
3,374,369 UART: [art] Store in slot 0x4
3,460,111 UART: [art] Derive Key Pair
3,460,471 UART: [art] Store priv key in slot 0x5
3,473,944 UART: [art] Derive Key Pair - Done
3,488,291 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,606 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,371 UART: [art] PUB.X = E0CD3578A1E739F5DC3FA62EFE55A320F12B572A648C5C60C640835A9E8DD75F928E596025C74C9C9B4CCD2565D3EEE7
3,511,153 UART: [art] PUB.Y = A90CE7ADCF95CC308ED568E9381CDF8F4F4C9210A25D9407C67C1B1C654330A063DCCC6BEDE94673C99F83F7929674EA
3,518,111 UART: [art] SIG.R = 51DB408820C77858FB805A8DDBE088C1E2FC36B44F81783F6A0B0022F98157E6BAF9A0C887EC4C1612D878CDA0F31930
3,524,862 UART: [art] SIG.S = 8169896B6E3F9BAA54BC910D2BE461C35DC8DFDFE8EFE459ED6C18DBE694F49EFF56ACFEA14B1BAD072FA35197C25187
3,548,526 UART: Caliptra RT
3,548,777 UART: [state] CFI Enabled
3,669,067 UART: [rt] RT listening for mailbox commands...
3,669,730 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,443 UART: [rt]cmd =0x46504c54, len=4
3,700,683 >>> mbox cmd response data (8 bytes)
3,701,030 UART: [rt] FIPS self test
3,701,358 UART: [kat] ++
3,701,510 UART: [kat] sha1
3,705,726 UART: [kat] SHA2-256
3,707,748 UART: [kat] SHA2-384
3,710,777 UART: [kat] SHA2-512-ACC
3,712,704 UART: [kat] ECC-384
3,722,302 UART: Fatal Error: 0x90040003
3,723,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,846 >>> mbox cmd response: failed
3,723,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,723,851 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,874 UART: [state] LifecycleState = Unprovisioned
85,529 UART: [state] DebugLocked = No
86,245 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,971 UART: [kat] SHA2-256
881,902 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,017 UART: [kat] ++
886,169 UART: [kat] sha1
890,423 UART: [kat] SHA2-256
892,361 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,604 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,397 UART: [cold-reset] ++
1,476,887 UART: [fht] Storing FHT @ 0x50003400
1,479,666 UART: [idev] ++
1,479,834 UART: [idev] CDI.KEYID = 6
1,480,194 UART: [idev] SUBJECT.KEYID = 7
1,480,618 UART: [idev] UDS.KEYID = 0
1,480,963 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,504 UART: [idev] Erasing UDS.KEYID = 0
1,504,470 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,236 UART: [idev] --
1,514,167 UART: [ldev] ++
1,514,335 UART: [ldev] CDI.KEYID = 6
1,514,698 UART: [ldev] SUBJECT.KEYID = 5
1,515,124 UART: [ldev] AUTHORITY.KEYID = 7
1,515,587 UART: [ldev] FE.KEYID = 1
1,520,597 UART: [ldev] Erasing FE.KEYID = 1
1,545,978 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,289 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,180 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,038 UART: [ldev] --
1,585,493 UART: [fwproc] Waiting for Commands...
1,586,140 UART: [fwproc] Received command 0x46574c44
1,586,931 UART: [fwproc] Received Image of size 119428 bytes
2,941,701 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,449 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,667 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,312 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,273 ready_for_fw is high
1,363,273 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,782 >>> mbox cmd response: success
3,055,495 UART:
3,055,511 UART: Running Caliptra FMC ...
3,055,919 UART:
3,055,973 UART: [state] CFI Enabled
3,066,557 UART: [fht] FMC Alias Private Key: 7
3,185,851 UART: [art] Extend RT PCRs Done
3,186,279 UART: [art] Lock RT PCRs Done
3,188,187 UART: [art] Populate DV Done
3,196,372 UART: [fht] FMC Alias Private Key: 7
3,197,412 UART: [art] Derive CDI
3,197,692 UART: [art] Store in slot 0x4
3,283,684 UART: [art] Derive Key Pair
3,284,044 UART: [art] Store priv key in slot 0x5
3,297,351 UART: [art] Derive Key Pair - Done
3,312,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,328,011 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,776 UART: [art] PUB.X = D51190D82B19DA7AB70FEF0258061DE74E05EDD7CC5CB02D0BB23276D44E7252D62CEE80792F56DA423A0DC5287BF9A5
3,335,542 UART: [art] PUB.Y = E38FD360302C56A8A5A70A10A990C8821970E36D24CFF08EC0AE2F18FBE518E5585035D778BCF71E9A2EC5FCA75F9B5B
3,342,503 UART: [art] SIG.R = 6D32DFFEE1580A32794AE25CF19F9DC23C040CEEED104F6E7595BAC836776F38E373246B3BDEFAB458D34E7F43A930D7
3,349,280 UART: [art] SIG.S = E88FAD2D371C3855B673BFDFBCA9ED9F427B1BB5533337C60B9698A9117329DF667EE12D77C455885CC308807FAFD7C1
3,374,140 UART: Caliptra RT
3,374,391 UART: [state] CFI Enabled
3,495,311 UART: [rt] RT listening for mailbox commands...
3,495,974 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,561 UART: [rt]cmd =0x46504c54, len=4
3,526,931 >>> mbox cmd response data (8 bytes)
3,527,216 UART: [rt] FIPS self test
3,527,544 UART: [kat] ++
3,527,696 UART: [kat] sha1
3,531,804 UART: [kat] SHA2-256
3,533,826 UART: [kat] SHA2-384
3,536,683 UART: [kat] SHA2-512-ACC
3,538,610 UART: [kat] ECC-384
3,548,654 UART: Fatal Error: 0x90040003
3,550,193 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,550,198 >>> mbox cmd response: failed
3,550,198 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,550,203 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,699 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,664 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,805 UART: [state] LifecycleState = Unprovisioned
86,460 UART: [state] DebugLocked = No
87,076 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,704 UART: [kat] SHA2-256
882,635 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,750 UART: [kat] ++
886,902 UART: [kat] sha1
891,220 UART: [kat] SHA2-256
893,158 UART: [kat] SHA2-384
895,911 UART: [kat] SHA2-512-ACC
897,812 UART: [kat] ECC-384
903,437 UART: [kat] HMAC-384Kdf
908,081 UART: [kat] LMS
1,476,277 UART: [kat] --
1,476,972 UART: [cold-reset] ++
1,477,408 UART: [fht] Storing FHT @ 0x50003400
1,480,311 UART: [idev] ++
1,480,479 UART: [idev] CDI.KEYID = 6
1,480,839 UART: [idev] SUBJECT.KEYID = 7
1,481,263 UART: [idev] UDS.KEYID = 0
1,481,608 ready_for_fw is high
1,481,608 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,553 UART: [idev] Erasing UDS.KEYID = 0
1,506,511 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,109 UART: [idev] --
1,516,000 UART: [ldev] ++
1,516,168 UART: [ldev] CDI.KEYID = 6
1,516,531 UART: [ldev] SUBJECT.KEYID = 5
1,516,957 UART: [ldev] AUTHORITY.KEYID = 7
1,517,420 UART: [ldev] FE.KEYID = 1
1,522,914 UART: [ldev] Erasing FE.KEYID = 1
1,548,063 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,266 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,157 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,869 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,961 UART: [ldev] --
1,587,280 UART: [fwproc] Waiting for Commands...
1,588,073 UART: [fwproc] Received command 0x46574c44
1,588,864 UART: [fwproc] Received Image of size 119428 bytes
2,944,224 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,736 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,954 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,589 >>> mbox cmd response: success
3,145,851 UART: [afmc] ++
3,146,019 UART: [afmc] CDI.KEYID = 6
3,146,381 UART: [afmc] SUBJECT.KEYID = 7
3,146,806 UART: [afmc] AUTHORITY.KEYID = 5
3,182,217 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,595 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,205,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,967 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,650 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,450 UART: [afmc] --
3,225,380 UART: [cold-reset] --
3,226,236 UART: [state] Locking Datavault
3,227,573 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,177 UART: [state] Locking ICCM
3,228,843 UART: [exit] Launching FMC @ 0x40000130
3,234,173 UART:
3,234,189 UART: Running Caliptra FMC ...
3,234,597 UART:
3,234,740 UART: [state] CFI Enabled
3,245,196 UART: [fht] FMC Alias Private Key: 7
3,364,580 UART: [art] Extend RT PCRs Done
3,365,008 UART: [art] Lock RT PCRs Done
3,366,390 UART: [art] Populate DV Done
3,374,411 UART: [fht] FMC Alias Private Key: 7
3,375,475 UART: [art] Derive CDI
3,375,755 UART: [art] Store in slot 0x4
3,461,605 UART: [art] Derive Key Pair
3,461,965 UART: [art] Store priv key in slot 0x5
3,475,630 UART: [art] Derive Key Pair - Done
3,490,240 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,506,039 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,804 UART: [art] PUB.X = 04A626F2067B2AF83B19DB482B1E15B978DDFD196516964DE4A83507E10BA9A12D53536E8A6303905A49A2E3970F1964
3,513,552 UART: [art] PUB.Y = 8F293A46200379FD81B465E1CA87307C9BB2175B1C0A9D078319F484A95A712C45F99064961B88E9A73B6A9B03F7C581
3,520,484 UART: [art] SIG.R = 737513ED1D3A5BA35411EF104070989AA3820C713899990311D81FA2677DED53CE2B1E5A05D6C8CECB507105E517361C
3,527,240 UART: [art] SIG.S = 2EF3517B2D4CA7E745FFE33270AF42DC1DCBA3A7209DB2E47D705A3E9365075BE6BD79C8BAD8D07CAB39EAF07C079178
3,551,152 UART: Caliptra RT
3,551,495 UART: [state] CFI Enabled
3,671,514 UART: [rt] RT listening for mailbox commands...
3,672,177 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,720 UART: [rt]cmd =0x46504c54, len=4
3,703,076 >>> mbox cmd response data (8 bytes)
3,703,195 UART: [rt] FIPS self test
3,703,523 UART: [kat] ++
3,703,675 UART: [kat] sha1
3,707,957 UART: [kat] SHA2-256
3,709,979 UART: [kat] SHA2-384
3,713,030 UART: [kat] SHA2-512-ACC
3,714,957 UART: [kat] ECC-384
3,724,961 UART: Fatal Error: 0x90040003
3,726,500 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,726,505 >>> mbox cmd response: failed
3,726,505 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,726,510 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,047 UART: [state] LifecycleState = Unprovisioned
85,702 UART: [state] DebugLocked = No
86,294 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,846 UART: [kat] SHA2-256
881,777 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,892 UART: [kat] ++
886,044 UART: [kat] sha1
890,294 UART: [kat] SHA2-256
892,232 UART: [kat] SHA2-384
894,929 UART: [kat] SHA2-512-ACC
896,830 UART: [kat] ECC-384
902,395 UART: [kat] HMAC-384Kdf
907,225 UART: [kat] LMS
1,475,421 UART: [kat] --
1,476,380 UART: [cold-reset] ++
1,476,750 UART: [fht] Storing FHT @ 0x50003400
1,479,321 UART: [idev] ++
1,479,489 UART: [idev] CDI.KEYID = 6
1,479,849 UART: [idev] SUBJECT.KEYID = 7
1,480,273 UART: [idev] UDS.KEYID = 0
1,480,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,637 UART: [idev] Erasing UDS.KEYID = 0
1,505,601 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,265 UART: [idev] --
1,515,222 UART: [ldev] ++
1,515,390 UART: [ldev] CDI.KEYID = 6
1,515,753 UART: [ldev] SUBJECT.KEYID = 5
1,516,179 UART: [ldev] AUTHORITY.KEYID = 7
1,516,642 UART: [ldev] FE.KEYID = 1
1,521,922 UART: [ldev] Erasing FE.KEYID = 1
1,547,245 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,870 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,586 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,477 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,221 UART: [ldev] --
1,586,648 UART: [fwproc] Waiting for Commands...
1,587,339 UART: [fwproc] Received command 0x46574c44
1,588,130 UART: [fwproc] Received Image of size 119428 bytes
2,941,920 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,510 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,728 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,479 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,932 ready_for_fw is high
1,362,932 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,331 >>> mbox cmd response: success
3,054,706 UART:
3,054,722 UART: Running Caliptra FMC ...
3,055,130 UART:
3,055,273 UART: [state] CFI Enabled
3,065,959 UART: [fht] FMC Alias Private Key: 7
3,184,997 UART: [art] Extend RT PCRs Done
3,185,425 UART: [art] Lock RT PCRs Done
3,187,361 UART: [art] Populate DV Done
3,195,610 UART: [fht] FMC Alias Private Key: 7
3,196,756 UART: [art] Derive CDI
3,197,036 UART: [art] Store in slot 0x4
3,282,304 UART: [art] Derive Key Pair
3,282,664 UART: [art] Store priv key in slot 0x5
3,296,209 UART: [art] Derive Key Pair - Done
3,310,790 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,571 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,336 UART: [art] PUB.X = 972A7FC479C7E9A6ECA5544BA1F2FF3AD4035053A1A8CFB3821E69B325BF6C21E1768258A591F24AE3466CA85540F842
3,334,109 UART: [art] PUB.Y = 526D1E0EDC56C36A968D1939CBCED7146D698CC11CFA3F851151F0C44D29523BEC257C4BFDC4940A1078B7963B023E3E
3,341,060 UART: [art] SIG.R = 1CC1610D1195F095A7E2FE956DBCB36336EA980ADC6C329B7119130DF0063EDD267B1520CFB1F49C3264BEE67CB2F70D
3,347,827 UART: [art] SIG.S = 068115333480B3C687A1A152F6A09B8F1F2C6717DB03A7B6238BD1C649F8E875DBFA9D2DAF27B65C2AD7BBAA221FB79F
3,372,207 UART: Caliptra RT
3,372,550 UART: [state] CFI Enabled
3,492,713 UART: [rt] RT listening for mailbox commands...
3,493,376 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,425 UART: [rt]cmd =0x46504c54, len=4
3,524,611 >>> mbox cmd response data (8 bytes)
3,524,728 UART: [rt] FIPS self test
3,525,056 UART: [kat] ++
3,525,208 UART: [kat] sha1
3,529,372 UART: [kat] SHA2-256
3,531,394 UART: [kat] SHA2-384
3,534,233 UART: [kat] SHA2-512-ACC
3,536,160 UART: [kat] ECC-384
3,546,072 UART: Fatal Error: 0x90040003
3,547,611 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,616 >>> mbox cmd response: failed
3,547,616 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,621 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,174 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,529 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.51s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,526 UART: [state] LifecycleState = Unprovisioned
86,181 UART: [state] DebugLocked = No
86,901 UART: [state] WD Timer not started. Device not locked for debugging
88,258 UART: [kat] SHA2-256
891,808 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,912 UART: [kat] ++
896,064 UART: [kat] sha1
900,346 UART: [kat] SHA2-256
902,286 UART: [kat] SHA2-384
905,035 UART: [kat] SHA2-512-ACC
906,936 UART: [kat] ECC-384
916,505 UART: [kat] HMAC-384Kdf
921,289 UART: [kat] LMS
1,169,601 UART: [kat] --
1,170,430 UART: [cold-reset] ++
1,170,868 UART: [fht] FHT @ 0x50003400
1,173,574 UART: [idev] ++
1,173,742 UART: [idev] CDI.KEYID = 6
1,174,103 UART: [idev] SUBJECT.KEYID = 7
1,174,528 UART: [idev] UDS.KEYID = 0
1,174,874 ready_for_fw is high
1,174,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,419 UART: [idev] Erasing UDS.KEYID = 0
1,199,431 UART: [idev] Sha1 KeyId Algorithm
1,208,087 UART: [idev] --
1,209,198 UART: [ldev] ++
1,209,366 UART: [ldev] CDI.KEYID = 6
1,209,730 UART: [ldev] SUBJECT.KEYID = 5
1,210,157 UART: [ldev] AUTHORITY.KEYID = 7
1,210,620 UART: [ldev] FE.KEYID = 1
1,215,662 UART: [ldev] Erasing FE.KEYID = 1
1,241,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,947 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,663 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,552 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,264 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,114 UART: [ldev] --
1,280,323 UART: [fwproc] Wait for Commands...
1,281,066 UART: [fwproc] Recv command 0x46574c44
1,281,799 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,952 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,802 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,501 >>> mbox cmd response: success
2,836,709 UART: [afmc] ++
2,836,877 UART: [afmc] CDI.KEYID = 6
2,837,240 UART: [afmc] SUBJECT.KEYID = 7
2,837,666 UART: [afmc] AUTHORITY.KEYID = 5
2,872,595 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,888,912 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,889,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,252 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,906,953 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,914,716 UART: [afmc] --
2,915,603 UART: [cold-reset] --
2,916,311 UART: [state] Locking Datavault
2,917,374 UART: [state] Locking PCR0, PCR1 and PCR31
2,917,978 UART: [state] Locking ICCM
2,918,512 UART: [exit] Launching FMC @ 0x40000130
2,923,842 UART:
2,923,858 UART: Running Caliptra FMC ...
2,924,266 UART:
2,924,320 UART: [state] CFI Enabled
2,934,884 UART: [fht] FMC Alias Private Key: 7
3,053,978 UART: [art] Extend RT PCRs Done
3,054,406 UART: [art] Lock RT PCRs Done
3,055,844 UART: [art] Populate DV Done
3,063,843 UART: [fht] FMC Alias Private Key: 7
3,064,919 UART: [art] Derive CDI
3,065,199 UART: [art] Store in slot 0x4
3,150,972 UART: [art] Derive Key Pair
3,151,332 UART: [art] Store priv key in slot 0x5
3,164,720 UART: [art] Derive Key Pair - Done
3,179,556 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,079 UART: [art] Erasing AUTHORITY.KEYID = 7
3,195,844 UART: [art] PUB.X = CCBEF4873E870879CFC45C01DEC634F177081F2ABE64261E6D149A34F2A314CA8C4E3E4AADED622A2FC6DBD490C1C684
3,202,625 UART: [art] PUB.Y = 5F3DA3B8E5DA30A740E31A3F6D194DE26DB28EB879352F493BF72557B042F0D908E4BDBE30262C11D765F67C3CA6AF45
3,209,584 UART: [art] SIG.R = B9BEA20D043D75702249297A095C0BC920EF2715A1858954DCD74B9CD8EC84A4F7042720839B2C2E83E55683F92AB0D7
3,216,339 UART: [art] SIG.S = 40823B5327EB51C2413043AA6CC8642B4894254AFF4CDD4DBD4BBBDC5548489934BF50AFAEE36CA46002D753F0833179
3,240,772 UART: Caliptra RT
3,241,023 UART: [state] CFI Enabled
3,360,128 UART: [rt] RT listening for mailbox commands...
3,360,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,800 UART: [rt]cmd =0x46504c54, len=4
3,391,986 >>> mbox cmd response data (8 bytes)
3,392,349 UART: [rt] FIPS self test
3,392,677 UART: [kat] ++
3,392,829 UART: [kat] sha1
3,397,003 UART: [kat] SHA2-256
3,399,025 UART: [kat] SHA2-384
3,401,720 UART: [kat] SHA2-512-ACC
3,403,647 UART: [kat] ECC-384
3,412,823 UART: Fatal Error: 0x90040003
3,414,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,367 >>> mbox cmd response: failed
3,414,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,414,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,910 UART: [state] LifecycleState = Unprovisioned
85,565 UART: [state] DebugLocked = No
86,115 UART: [state] WD Timer not started. Device not locked for debugging
87,390 UART: [kat] SHA2-256
890,940 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,044 UART: [kat] ++
895,196 UART: [kat] sha1
899,368 UART: [kat] SHA2-256
901,308 UART: [kat] SHA2-384
903,917 UART: [kat] SHA2-512-ACC
905,818 UART: [kat] ECC-384
915,685 UART: [kat] HMAC-384Kdf
920,305 UART: [kat] LMS
1,168,617 UART: [kat] --
1,169,610 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,790 UART: [idev] ++
1,172,958 UART: [idev] CDI.KEYID = 6
1,173,319 UART: [idev] SUBJECT.KEYID = 7
1,173,744 UART: [idev] UDS.KEYID = 0
1,174,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,515 UART: [idev] Erasing UDS.KEYID = 0
1,198,559 UART: [idev] Sha1 KeyId Algorithm
1,207,517 UART: [idev] --
1,208,652 UART: [ldev] ++
1,208,820 UART: [ldev] CDI.KEYID = 6
1,209,184 UART: [ldev] SUBJECT.KEYID = 5
1,209,611 UART: [ldev] AUTHORITY.KEYID = 7
1,210,074 UART: [ldev] FE.KEYID = 1
1,215,204 UART: [ldev] Erasing FE.KEYID = 1
1,241,559 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,734 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,446 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,456 UART: [ldev] --
1,280,707 UART: [fwproc] Wait for Commands...
1,281,466 UART: [fwproc] Recv command 0x46574c44
1,282,199 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,790 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,464 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,101 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,454 ready_for_fw is high
1,059,454 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,042 >>> mbox cmd response: success
2,751,691 UART:
2,751,707 UART: Running Caliptra FMC ...
2,752,115 UART:
2,752,169 UART: [state] CFI Enabled
2,762,487 UART: [fht] FMC Alias Private Key: 7
2,881,013 UART: [art] Extend RT PCRs Done
2,881,441 UART: [art] Lock RT PCRs Done
2,883,113 UART: [art] Populate DV Done
2,891,632 UART: [fht] FMC Alias Private Key: 7
2,892,770 UART: [art] Derive CDI
2,893,050 UART: [art] Store in slot 0x4
2,978,791 UART: [art] Derive Key Pair
2,979,151 UART: [art] Store priv key in slot 0x5
2,992,157 UART: [art] Derive Key Pair - Done
3,006,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,178 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,943 UART: [art] PUB.X = C12EAC9EB52CBFF2A86E2EBC7E1969F28B5FB1706B983EFAF76561AA19C5F7E31B351DF294F5897FA6AA0288E8281219
3,029,726 UART: [art] PUB.Y = 3D097F82927C8AA4D50F6CE6532337EA41370B3B14B4C54FAE1716442713A22457AF9EE9A4B402B5A64778306C0E5BED
3,036,663 UART: [art] SIG.R = 8C7D141527332ADB36C2CCB9E6EFA8E0EA27473E13023FDD2989EBD15C73C7A8874ABDAD2062A480AB8528B4B3FE49DD
3,043,448 UART: [art] SIG.S = 4BC50366557999805A5759A1B8B8EFE4F9A7E72EF25B7FB4B3B7BFD98261761F3B5924B2807822680C42A057EBE0B8DF
3,067,314 UART: Caliptra RT
3,067,565 UART: [state] CFI Enabled
3,187,854 UART: [rt] RT listening for mailbox commands...
3,188,517 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,328 UART: [rt]cmd =0x46504c54, len=4
3,219,526 >>> mbox cmd response data (8 bytes)
3,219,795 UART: [rt] FIPS self test
3,220,123 UART: [kat] ++
3,220,275 UART: [kat] sha1
3,224,419 UART: [kat] SHA2-256
3,226,441 UART: [kat] SHA2-384
3,229,146 UART: [kat] SHA2-512-ACC
3,231,073 UART: [kat] ECC-384
3,240,541 UART: Fatal Error: 0x90040003
3,242,080 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,085 >>> mbox cmd response: failed
3,242,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,242,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,704 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,238 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,289 UART: [state] LifecycleState = Unprovisioned
85,944 UART: [state] DebugLocked = No
86,430 UART: [state] WD Timer not started. Device not locked for debugging
87,749 UART: [kat] SHA2-256
891,299 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,403 UART: [kat] ++
895,555 UART: [kat] sha1
899,827 UART: [kat] SHA2-256
901,767 UART: [kat] SHA2-384
904,318 UART: [kat] SHA2-512-ACC
906,219 UART: [kat] ECC-384
916,478 UART: [kat] HMAC-384Kdf
921,214 UART: [kat] LMS
1,169,526 UART: [kat] --
1,170,369 UART: [cold-reset] ++
1,170,869 UART: [fht] FHT @ 0x50003400
1,173,603 UART: [idev] ++
1,173,771 UART: [idev] CDI.KEYID = 6
1,174,132 UART: [idev] SUBJECT.KEYID = 7
1,174,557 UART: [idev] UDS.KEYID = 0
1,174,903 ready_for_fw is high
1,174,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,770 UART: [idev] Erasing UDS.KEYID = 0
1,199,854 UART: [idev] Sha1 KeyId Algorithm
1,208,722 UART: [idev] --
1,209,769 UART: [ldev] ++
1,209,937 UART: [ldev] CDI.KEYID = 6
1,210,301 UART: [ldev] SUBJECT.KEYID = 5
1,210,728 UART: [ldev] AUTHORITY.KEYID = 7
1,211,191 UART: [ldev] FE.KEYID = 1
1,216,437 UART: [ldev] Erasing FE.KEYID = 1
1,243,102 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,346 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,062 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,951 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,875 UART: [ldev] --
1,282,256 UART: [fwproc] Wait for Commands...
1,283,059 UART: [fwproc] Recv command 0x46574c44
1,283,792 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,125 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,541 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,104 >>> mbox cmd response: success
2,839,118 UART: [afmc] ++
2,839,286 UART: [afmc] CDI.KEYID = 6
2,839,649 UART: [afmc] SUBJECT.KEYID = 7
2,840,075 UART: [afmc] AUTHORITY.KEYID = 5
2,875,880 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,997 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,746 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,456 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,337 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,038 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,809 UART: [afmc] --
2,918,726 UART: [cold-reset] --
2,919,708 UART: [state] Locking Datavault
2,920,903 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,507 UART: [state] Locking ICCM
2,921,969 UART: [exit] Launching FMC @ 0x40000130
2,927,299 UART:
2,927,315 UART: Running Caliptra FMC ...
2,927,723 UART:
2,927,866 UART: [state] CFI Enabled
2,938,280 UART: [fht] FMC Alias Private Key: 7
3,057,922 UART: [art] Extend RT PCRs Done
3,058,350 UART: [art] Lock RT PCRs Done
3,059,920 UART: [art] Populate DV Done
3,068,141 UART: [fht] FMC Alias Private Key: 7
3,069,185 UART: [art] Derive CDI
3,069,465 UART: [art] Store in slot 0x4
3,155,238 UART: [art] Derive Key Pair
3,155,598 UART: [art] Store priv key in slot 0x5
3,169,102 UART: [art] Derive Key Pair - Done
3,183,634 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,283 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,048 UART: [art] PUB.X = 041C821603C74C0652A05F6693BFA427712FD17F9DDD2CC758F1B0CFCF3D37C7FF5339703B73425E5FA7CB93B8FBF63E
3,206,821 UART: [art] PUB.Y = C19C78F86B53A05E0768063697B8D5D6654158CE773835783E1530C8C32761DBF0C28856D119D36A4F0D4FB460F187A8
3,213,754 UART: [art] SIG.R = 5AC20F788661B60DA0F6A010FBDA7F857A7293AD7424B4B9F53775332102AD1CE7E5E6560564563D96533B6035C2CCEF
3,220,514 UART: [art] SIG.S = A3125E0EC231DCB0D9F925EB9080D7EB01CED216428889368F476B5FC5338992D56670F10BAAD52E07CAB69F51F6BD7F
3,243,872 UART: Caliptra RT
3,244,215 UART: [state] CFI Enabled
3,363,792 UART: [rt] RT listening for mailbox commands...
3,364,455 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,414 UART: [rt]cmd =0x46504c54, len=4
3,395,762 >>> mbox cmd response data (8 bytes)
3,395,933 UART: [rt] FIPS self test
3,396,261 UART: [kat] ++
3,396,413 UART: [kat] sha1
3,400,613 UART: [kat] SHA2-256
3,402,635 UART: [kat] SHA2-384
3,405,384 UART: [kat] SHA2-512-ACC
3,407,311 UART: [kat] ECC-384
3,417,133 UART: Fatal Error: 0x90040003
3,418,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,677 >>> mbox cmd response: failed
3,418,677 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,899 UART: [state] LifecycleState = Unprovisioned
86,554 UART: [state] DebugLocked = No
87,058 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
891,719 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,823 UART: [kat] ++
895,975 UART: [kat] sha1
900,131 UART: [kat] SHA2-256
902,071 UART: [kat] SHA2-384
904,840 UART: [kat] SHA2-512-ACC
906,741 UART: [kat] ECC-384
916,466 UART: [kat] HMAC-384Kdf
921,102 UART: [kat] LMS
1,169,414 UART: [kat] --
1,170,389 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,367 UART: [idev] ++
1,173,535 UART: [idev] CDI.KEYID = 6
1,173,896 UART: [idev] SUBJECT.KEYID = 7
1,174,321 UART: [idev] UDS.KEYID = 0
1,174,667 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,572 UART: [idev] Erasing UDS.KEYID = 0
1,200,146 UART: [idev] Sha1 KeyId Algorithm
1,209,020 UART: [idev] --
1,210,107 UART: [ldev] ++
1,210,275 UART: [ldev] CDI.KEYID = 6
1,210,639 UART: [ldev] SUBJECT.KEYID = 5
1,211,066 UART: [ldev] AUTHORITY.KEYID = 7
1,211,529 UART: [ldev] FE.KEYID = 1
1,216,555 UART: [ldev] Erasing FE.KEYID = 1
1,242,918 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,506 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,111 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,823 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,917 UART: [ldev] --
1,282,208 UART: [fwproc] Wait for Commands...
1,282,813 UART: [fwproc] Recv command 0x46574c44
1,283,546 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,895 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,812 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,987 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,712 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,643 ready_for_fw is high
1,059,643 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,655 >>> mbox cmd response: success
2,752,484 UART:
2,752,500 UART: Running Caliptra FMC ...
2,752,908 UART:
2,753,051 UART: [state] CFI Enabled
2,763,625 UART: [fht] FMC Alias Private Key: 7
2,882,131 UART: [art] Extend RT PCRs Done
2,882,559 UART: [art] Lock RT PCRs Done
2,884,191 UART: [art] Populate DV Done
2,892,232 UART: [fht] FMC Alias Private Key: 7
2,893,326 UART: [art] Derive CDI
2,893,606 UART: [art] Store in slot 0x4
2,979,405 UART: [art] Derive Key Pair
2,979,765 UART: [art] Store priv key in slot 0x5
2,992,995 UART: [art] Derive Key Pair - Done
3,007,852 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,115 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,880 UART: [art] PUB.X = 6D1707CBFA0DD5818462BC7387EE7C181D5DD3315C6311B4369D71EE83CC0D1E01362986467C0A2FA43A372A395B0A91
3,030,634 UART: [art] PUB.Y = 7F444F1DE06274B46695FF0CD8CC1F7738B54F01F8FC12FE5703081B54224041C66703EEB9E8FB845E4D60BF07996AFB
3,037,572 UART: [art] SIG.R = 84B9CE11BCC0D6E9FB6FC4AE7B66795A2880A4CE7093576CAA850AFC82658532856FA753673497F1EA5238A5A8AAB946
3,044,347 UART: [art] SIG.S = 6C179351F5A0FDC685D0998433DD0709A38B89FC5AFC32066CE3E60CBF92EB9C5B0F5208160DAA0899502CDF35D6F121
3,068,341 UART: Caliptra RT
3,068,684 UART: [state] CFI Enabled
3,189,009 UART: [rt] RT listening for mailbox commands...
3,189,672 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,401 UART: [rt]cmd =0x46504c54, len=4
3,220,575 >>> mbox cmd response data (8 bytes)
3,220,798 UART: [rt] FIPS self test
3,221,126 UART: [kat] ++
3,221,278 UART: [kat] sha1
3,225,478 UART: [kat] SHA2-256
3,227,500 UART: [kat] SHA2-384
3,230,339 UART: [kat] SHA2-512-ACC
3,232,266 UART: [kat] ECC-384
3,241,996 UART: Fatal Error: 0x90040003
3,243,535 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,540 >>> mbox cmd response: failed
3,243,540 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,899 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,280 UART: [state] LifecycleState = Unprovisioned
85,935 UART: [state] DebugLocked = No
86,537 UART: [state] WD Timer not started. Device not locked for debugging
87,650 UART: [kat] SHA2-256
893,300 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,425 UART: [kat] ++
897,577 UART: [kat] sha1
901,817 UART: [kat] SHA2-256
903,757 UART: [kat] SHA2-384
906,694 UART: [kat] SHA2-512-ACC
908,595 UART: [kat] ECC-384
918,764 UART: [kat] HMAC-384Kdf
923,436 UART: [kat] LMS
1,171,764 UART: [kat] --
1,172,743 UART: [cold-reset] ++
1,173,321 UART: [fht] FHT @ 0x50003400
1,176,038 UART: [idev] ++
1,176,206 UART: [idev] CDI.KEYID = 6
1,176,566 UART: [idev] SUBJECT.KEYID = 7
1,176,990 UART: [idev] UDS.KEYID = 0
1,177,335 ready_for_fw is high
1,177,335 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,870 UART: [idev] Erasing UDS.KEYID = 0
1,202,159 UART: [idev] Sha1 KeyId Algorithm
1,210,771 UART: [idev] --
1,211,839 UART: [ldev] ++
1,212,007 UART: [ldev] CDI.KEYID = 6
1,212,370 UART: [ldev] SUBJECT.KEYID = 5
1,212,796 UART: [ldev] AUTHORITY.KEYID = 7
1,213,259 UART: [ldev] FE.KEYID = 1
1,218,333 UART: [ldev] Erasing FE.KEYID = 1
1,244,390 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,931 UART: [ldev] --
1,283,362 UART: [fwproc] Wait for Commands...
1,284,010 UART: [fwproc] Recv command 0x46574c44
1,284,738 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,521 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,962 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,132 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,627 >>> mbox cmd response: success
2,839,869 UART: [afmc] ++
2,840,037 UART: [afmc] CDI.KEYID = 6
2,840,399 UART: [afmc] SUBJECT.KEYID = 7
2,840,824 UART: [afmc] AUTHORITY.KEYID = 5
2,876,383 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,710 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,458 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,167 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,050 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,751 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,575 UART: [afmc] --
2,919,681 UART: [cold-reset] --
2,920,551 UART: [state] Locking Datavault
2,921,538 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,142 UART: [state] Locking ICCM
2,922,642 UART: [exit] Launching FMC @ 0x40000130
2,927,972 UART:
2,927,988 UART: Running Caliptra FMC ...
2,928,396 UART:
2,928,450 UART: [state] CFI Enabled
2,938,692 UART: [fht] FMC Alias Private Key: 7
3,057,990 UART: [art] Extend RT PCRs Done
3,058,418 UART: [art] Lock RT PCRs Done
3,060,150 UART: [art] Populate DV Done
3,068,395 UART: [fht] FMC Alias Private Key: 7
3,069,393 UART: [art] Derive CDI
3,069,673 UART: [art] Store in slot 0x4
3,155,442 UART: [art] Derive Key Pair
3,155,802 UART: [art] Store priv key in slot 0x5
3,169,386 UART: [art] Derive Key Pair - Done
3,184,032 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,913 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,678 UART: [art] PUB.X = 17CB263EE108341E9544EB648EF9B018803A1FA82BCDE62AAF8F0D174B0AD49E387691D934BCCF3E405ABA25E6E79A84
3,207,453 UART: [art] PUB.Y = 68D9EA64515C1296C779C4673E0A5A6CBF489CF45607B454199E8B45EEDF4B48286BE0879D3C9DB29151E07C1D8E0AC1
3,214,400 UART: [art] SIG.R = 8DA2D3F34DEADEF289F5CF18CEB3FEA9B0CB56751A83B78FA9F22D17F08F22759EE34AF57900275BE8791E93EF982953
3,221,164 UART: [art] SIG.S = 9EE3965B189655673D2339AF62B843C82B8C1E627E5968755CD9AD29DC5BE153D18F0661A555094B65CD3BFC4A970186
3,244,771 UART: Caliptra RT
3,245,022 UART: [state] CFI Enabled
3,363,808 UART: [rt] RT listening for mailbox commands...
3,364,471 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,456 UART: [rt]cmd =0x46504c54, len=4
3,395,538 >>> mbox cmd response data (8 bytes)
3,395,795 UART: [rt] FIPS self test
3,396,123 UART: [kat] ++
3,396,275 UART: [kat] sha1
3,400,441 UART: [kat] SHA2-256
3,402,463 UART: [kat] SHA2-384
3,405,400 UART: [kat] SHA2-512-ACC
3,407,327 UART: [kat] ECC-384
3,416,417 UART: Fatal Error: 0x90040003
3,417,956 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,961 >>> mbox cmd response: failed
3,417,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,417,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,562 UART: [state] LifecycleState = Unprovisioned
86,217 UART: [state] DebugLocked = No
86,933 UART: [state] WD Timer not started. Device not locked for debugging
88,226 UART: [kat] SHA2-256
893,876 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,001 UART: [kat] ++
898,153 UART: [kat] sha1
902,395 UART: [kat] SHA2-256
904,335 UART: [kat] SHA2-384
907,128 UART: [kat] SHA2-512-ACC
909,029 UART: [kat] ECC-384
918,342 UART: [kat] HMAC-384Kdf
922,886 UART: [kat] LMS
1,171,214 UART: [kat] --
1,172,311 UART: [cold-reset] ++
1,172,665 UART: [fht] FHT @ 0x50003400
1,175,232 UART: [idev] ++
1,175,400 UART: [idev] CDI.KEYID = 6
1,175,760 UART: [idev] SUBJECT.KEYID = 7
1,176,184 UART: [idev] UDS.KEYID = 0
1,176,529 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,214 UART: [idev] Erasing UDS.KEYID = 0
1,201,261 UART: [idev] Sha1 KeyId Algorithm
1,209,703 UART: [idev] --
1,210,729 UART: [ldev] ++
1,210,897 UART: [ldev] CDI.KEYID = 6
1,211,260 UART: [ldev] SUBJECT.KEYID = 5
1,211,686 UART: [ldev] AUTHORITY.KEYID = 7
1,212,149 UART: [ldev] FE.KEYID = 1
1,217,119 UART: [ldev] Erasing FE.KEYID = 1
1,243,686 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,299 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,015 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,906 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,618 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,659 UART: [ldev] --
1,283,144 UART: [fwproc] Wait for Commands...
1,283,840 UART: [fwproc] Recv command 0x46574c44
1,284,568 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,011 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,408 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,578 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,261 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,173 ready_for_fw is high
1,060,173 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,886 >>> mbox cmd response: success
2,753,481 UART:
2,753,497 UART: Running Caliptra FMC ...
2,753,905 UART:
2,753,959 UART: [state] CFI Enabled
2,764,219 UART: [fht] FMC Alias Private Key: 7
2,883,613 UART: [art] Extend RT PCRs Done
2,884,041 UART: [art] Lock RT PCRs Done
2,885,705 UART: [art] Populate DV Done
2,893,990 UART: [fht] FMC Alias Private Key: 7
2,894,940 UART: [art] Derive CDI
2,895,220 UART: [art] Store in slot 0x4
2,980,727 UART: [art] Derive Key Pair
2,981,087 UART: [art] Store priv key in slot 0x5
2,994,003 UART: [art] Derive Key Pair - Done
3,008,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,252 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,017 UART: [art] PUB.X = B4A5D0BDD18DE2198399F257A9145B16F744515F32559A54310CB614DD833A51CC5774D653206712EC886DAE6DB119CD
3,031,784 UART: [art] PUB.Y = E58B2FB00A9C3A9D447D1CFC2836EEA5B620D23DD26ECC3FC7AE736143FB1767A499ECF6FD296302E9CC0A0E432580C5
3,038,740 UART: [art] SIG.R = 6C14DF01324C10809BB770E93FAA35AE0957CF1318BE4A6C143767774A1F0ADCBE9C7430312DBCE4E6D3625D607339FC
3,045,509 UART: [art] SIG.S = B91A287515F2ADBB090A700AFC2E15C5B28A10D448D9403BF782E68F7F4236AAC73E53A64EFB2568EFEED4FF683E03DB
3,068,869 UART: Caliptra RT
3,069,120 UART: [state] CFI Enabled
3,189,057 UART: [rt] RT listening for mailbox commands...
3,189,720 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,541 UART: [rt]cmd =0x46504c54, len=4
3,220,627 >>> mbox cmd response data (8 bytes)
3,220,896 UART: [rt] FIPS self test
3,221,224 UART: [kat] ++
3,221,376 UART: [kat] sha1
3,225,804 UART: [kat] SHA2-256
3,227,826 UART: [kat] SHA2-384
3,230,745 UART: [kat] SHA2-512-ACC
3,232,672 UART: [kat] ECC-384
3,242,016 UART: Fatal Error: 0x90040003
3,243,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,560 >>> mbox cmd response: failed
3,243,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,161 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,086 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,049 UART: [state] LifecycleState = Unprovisioned
85,704 UART: [state] DebugLocked = No
86,384 UART: [state] WD Timer not started. Device not locked for debugging
87,595 UART: [kat] SHA2-256
893,245 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,370 UART: [kat] ++
897,522 UART: [kat] sha1
901,988 UART: [kat] SHA2-256
903,928 UART: [kat] SHA2-384
906,713 UART: [kat] SHA2-512-ACC
908,614 UART: [kat] ECC-384
918,789 UART: [kat] HMAC-384Kdf
923,655 UART: [kat] LMS
1,171,983 UART: [kat] --
1,173,000 UART: [cold-reset] ++
1,173,334 UART: [fht] FHT @ 0x50003400
1,175,937 UART: [idev] ++
1,176,105 UART: [idev] CDI.KEYID = 6
1,176,465 UART: [idev] SUBJECT.KEYID = 7
1,176,889 UART: [idev] UDS.KEYID = 0
1,177,234 ready_for_fw is high
1,177,234 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,049 UART: [idev] Erasing UDS.KEYID = 0
1,201,574 UART: [idev] Sha1 KeyId Algorithm
1,209,928 UART: [idev] --
1,210,856 UART: [ldev] ++
1,211,024 UART: [ldev] CDI.KEYID = 6
1,211,387 UART: [ldev] SUBJECT.KEYID = 5
1,211,813 UART: [ldev] AUTHORITY.KEYID = 7
1,212,276 UART: [ldev] FE.KEYID = 1
1,217,524 UART: [ldev] Erasing FE.KEYID = 1
1,243,843 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,330 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,046 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,937 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,649 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,706 UART: [ldev] --
1,283,045 UART: [fwproc] Wait for Commands...
1,283,723 UART: [fwproc] Recv command 0x46574c44
1,284,451 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,759 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,929 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,540 >>> mbox cmd response: success
2,840,628 UART: [afmc] ++
2,840,796 UART: [afmc] CDI.KEYID = 6
2,841,158 UART: [afmc] SUBJECT.KEYID = 7
2,841,583 UART: [afmc] AUTHORITY.KEYID = 5
2,877,334 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,111 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,859 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,568 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,451 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,152 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,976 UART: [afmc] --
2,920,906 UART: [cold-reset] --
2,921,696 UART: [state] Locking Datavault
2,922,789 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,393 UART: [state] Locking ICCM
2,923,925 UART: [exit] Launching FMC @ 0x40000130
2,929,255 UART:
2,929,271 UART: Running Caliptra FMC ...
2,929,679 UART:
2,929,822 UART: [state] CFI Enabled
2,940,308 UART: [fht] FMC Alias Private Key: 7
3,059,224 UART: [art] Extend RT PCRs Done
3,059,652 UART: [art] Lock RT PCRs Done
3,061,312 UART: [art] Populate DV Done
3,069,311 UART: [fht] FMC Alias Private Key: 7
3,070,257 UART: [art] Derive CDI
3,070,537 UART: [art] Store in slot 0x4
3,156,344 UART: [art] Derive Key Pair
3,156,704 UART: [art] Store priv key in slot 0x5
3,169,902 UART: [art] Derive Key Pair - Done
3,184,499 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,916 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,681 UART: [art] PUB.X = 457A8B9EF63A4B0D2FB84AA2C2E54E11C15C979C0ABFF67CD6A7787000EB5F88258D15074B6307F60D5D7C52764889C8
3,207,420 UART: [art] PUB.Y = 6A4D1958417CA86328137FC1998542FE1079B43656180ADCB9ED7F187B34ECC74E2FAA4255689C31A3130C1AFEED0185
3,214,363 UART: [art] SIG.R = 68EFC91BCE7B8C6684844199EB4E85C1A6037334A22CECF5C0BC16250916A96E61A1050F353BF24BAE9704D012EB9F0E
3,221,123 UART: [art] SIG.S = 2E3D8190DED3AEEF0399406851C2461FE79E8313DFA4913E068C6533CE982DFA5B53AB9E620C1976B0B794E1159EFA9F
3,244,640 UART: Caliptra RT
3,244,983 UART: [state] CFI Enabled
3,365,147 UART: [rt] RT listening for mailbox commands...
3,365,810 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,769 UART: [rt]cmd =0x46504c54, len=4
3,396,873 >>> mbox cmd response data (8 bytes)
3,397,240 UART: [rt] FIPS self test
3,397,568 UART: [kat] ++
3,397,720 UART: [kat] sha1
3,401,940 UART: [kat] SHA2-256
3,403,962 UART: [kat] SHA2-384
3,406,691 UART: [kat] SHA2-512-ACC
3,408,618 UART: [kat] ECC-384
3,418,010 UART: Fatal Error: 0x90040003
3,419,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,554 >>> mbox cmd response: failed
3,419,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,559 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,563 UART: [state] LifecycleState = Unprovisioned
86,218 UART: [state] DebugLocked = No
86,916 UART: [state] WD Timer not started. Device not locked for debugging
88,169 UART: [kat] SHA2-256
893,819 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,944 UART: [kat] ++
898,096 UART: [kat] sha1
902,308 UART: [kat] SHA2-256
904,248 UART: [kat] SHA2-384
906,961 UART: [kat] SHA2-512-ACC
908,862 UART: [kat] ECC-384
918,359 UART: [kat] HMAC-384Kdf
923,127 UART: [kat] LMS
1,171,455 UART: [kat] --
1,172,166 UART: [cold-reset] ++
1,172,610 UART: [fht] FHT @ 0x50003400
1,175,329 UART: [idev] ++
1,175,497 UART: [idev] CDI.KEYID = 6
1,175,857 UART: [idev] SUBJECT.KEYID = 7
1,176,281 UART: [idev] UDS.KEYID = 0
1,176,626 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,863 UART: [idev] Erasing UDS.KEYID = 0
1,200,892 UART: [idev] Sha1 KeyId Algorithm
1,209,364 UART: [idev] --
1,210,564 UART: [ldev] ++
1,210,732 UART: [ldev] CDI.KEYID = 6
1,211,095 UART: [ldev] SUBJECT.KEYID = 5
1,211,521 UART: [ldev] AUTHORITY.KEYID = 7
1,211,984 UART: [ldev] FE.KEYID = 1
1,217,110 UART: [ldev] Erasing FE.KEYID = 1
1,243,831 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,234 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,950 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,841 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,553 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,570 UART: [ldev] --
1,282,957 UART: [fwproc] Wait for Commands...
1,283,665 UART: [fwproc] Recv command 0x46574c44
1,284,393 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,660 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,425 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,595 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,138 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 ready_for_fw is high
1,060,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,637 >>> mbox cmd response: success
2,755,910 UART:
2,755,926 UART: Running Caliptra FMC ...
2,756,334 UART:
2,756,477 UART: [state] CFI Enabled
2,767,275 UART: [fht] FMC Alias Private Key: 7
2,886,283 UART: [art] Extend RT PCRs Done
2,886,711 UART: [art] Lock RT PCRs Done
2,888,363 UART: [art] Populate DV Done
2,896,638 UART: [fht] FMC Alias Private Key: 7
2,897,622 UART: [art] Derive CDI
2,897,902 UART: [art] Store in slot 0x4
2,983,655 UART: [art] Derive Key Pair
2,984,015 UART: [art] Store priv key in slot 0x5
2,997,737 UART: [art] Derive Key Pair - Done
3,012,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,677 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,442 UART: [art] PUB.X = A51548199D5D6730634769D2377F6987D581A6B3C46C567771674D5AEEA3E4F9FEBEF4E972AF14546D1F52F9315CFBB3
3,036,214 UART: [art] PUB.Y = 071390AF7EBC10F32291F3C887AA78A6CB3EF9F932FDCC6733D90B214B914996BF2B250804B5E6320EE22F614A532E83
3,043,153 UART: [art] SIG.R = 15860F98DF62368D384B61EE13D6078A28534DADB47D856A0E3523175732757333058F46461C6D302703DFA874AEA71B
3,049,898 UART: [art] SIG.S = D18A7291FE8C5CF5D086C4DFF70819EA81DDC5850A0CAB87960AFF51F024C6263C0E5A8C9C3E92552542B614797BC6DF
3,073,209 UART: Caliptra RT
3,073,552 UART: [state] CFI Enabled
3,192,565 UART: [rt] RT listening for mailbox commands...
3,193,228 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,333 UART: [rt]cmd =0x46504c54, len=4
3,224,465 >>> mbox cmd response data (8 bytes)
3,224,590 UART: [rt] FIPS self test
3,224,918 UART: [kat] ++
3,225,070 UART: [kat] sha1
3,229,294 UART: [kat] SHA2-256
3,231,316 UART: [kat] SHA2-384
3,233,965 UART: [kat] SHA2-512-ACC
3,235,892 UART: [kat] ECC-384
3,245,678 UART: Fatal Error: 0x90040003
3,247,217 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,222 >>> mbox cmd response: failed
3,247,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,247,227 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,038 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,431 >>> mbox cmd response: success
test self_tests::kat_ecc384_signature_verify_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
276,517 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,059 writing to cptra_bootfsm_go
276,850 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
654,222 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,462 writing to cptra_bootfsm_go
653,369 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,119 writing to cptra_bootfsm_go
275,912 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,903 writing to cptra_bootfsm_go
276,236 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,257 writing to cptra_bootfsm_go
619,223 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.22s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,300 writing to cptra_bootfsm_go
652,787 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output has been running for over 60 seconds
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 108.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 8.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 9.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,914 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
test self_tests::kat_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 10.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,067 writing to cptra_bootfsm_go
5,156,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,306,113 >>> mbox cmd response: failed
5,306,681 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,455,602 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,429,523 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,265,906 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,001 writing to cptra_bootfsm_go
5,156,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,306,870 >>> mbox cmd response: failed
5,307,447 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,456,354 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,433,227 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,804 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,465 writing to cptra_bootfsm_go
5,508,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,658,597 >>> mbox cmd response: failed
5,659,175 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,808,031 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
17,835,325 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,546,336 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,369 writing to cptra_bootfsm_go
5,504,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,654,627 >>> mbox cmd response: failed
5,655,353 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,804,125 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
17,838,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,548,308 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,967 writing to cptra_bootfsm_go
5,155,786 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,305,390 >>> mbox cmd response: failed
5,305,943 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,454,844 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,430,219 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,258,089 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
5,155,174 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,304,981 >>> mbox cmd response: failed
5,305,568 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,454,451 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,431,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,270,072 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,389 writing to cptra_bootfsm_go
5,509,391 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,659,344 >>> mbox cmd response: failed
5,659,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,809,123 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
17,829,815 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,535,554 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,295 writing to cptra_bootfsm_go
5,499,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,648,840 >>> mbox cmd response: failed
5,649,420 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,798,315 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,849,549 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,557,769 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,113 >>> mbox cmd response: failed
827,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,277 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,858 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,885 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,893 >>> mbox cmd response: failed
826,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,899 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,405 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,330 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,210 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,218 >>> mbox cmd response: failed
827,218 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,224 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,682 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,139 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,214 >>> mbox cmd response: failed
827,214 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,495 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,797 >>> mbox cmd response: failed
826,797 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,829 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,032 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
826,721 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,729 >>> mbox cmd response: failed
826,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
826,735 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,440 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,422 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,430 >>> mbox cmd response: failed
827,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,436 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,978 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,595 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
827,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,836 >>> mbox cmd response: failed
827,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
827,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,782 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,687 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,007 writing to cptra_bootfsm_go
192,287 UART:
192,657 UART: Running Caliptra ROM ...
193,786 UART:
193,931 UART: [state] CFI Enabled
264,216 UART: [state] LifecycleState = Unprovisioned
266,264 UART: [state] DebugLocked = No
269,020 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,920 UART: [kat] SHA2-256
443,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,167 UART: [kat] ++
454,614 UART: [kat] sha1
464,498 UART: [kat] SHA2-256
467,224 UART: [kat] SHA2-384
472,648 UART: [kat] SHA2-512-ACC
475,026 UART: [kat] ECC-384
2,766,396 UART: [kat] HMAC-384Kdf
2,798,179 UART: [kat] LMS
3,988,520 UART: [kat] --
3,992,233 UART: [cold-reset] ++
3,993,814 UART: [fht] Storing FHT @ 0x50003400
4,005,586 UART: [idev] ++
4,006,155 UART: [idev] CDI.KEYID = 6
4,007,201 UART: [idev] SUBJECT.KEYID = 7
4,008,401 UART: [idev] UDS.KEYID = 0
4,009,448 ready_for_fw is high
4,009,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,863 UART: [idev] Erasing UDS.KEYID = 0
7,344,684 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,634 UART: [idev] --
7,373,024 UART: [ldev] ++
7,373,620 UART: [ldev] CDI.KEYID = 6
7,374,596 UART: [ldev] SUBJECT.KEYID = 5
7,375,677 UART: [ldev] AUTHORITY.KEYID = 7
7,377,028 UART: [ldev] FE.KEYID = 1
7,420,562 UART: [ldev] Erasing FE.KEYID = 1
10,751,719 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,044,200 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,058,738 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,073,610 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,088,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,107,368 UART: [ldev] --
13,111,666 UART: [fwproc] Waiting for Commands...
13,114,672 UART: [fwproc] Received command 0x46574c44
13,116,872 UART: [fwproc] Received Image of size 119428 bytes
17,233,999 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,313,023 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,386,172 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,717,240 >>> mbox cmd response: success
17,721,340 UART: [afmc] ++
17,721,934 UART: [afmc] CDI.KEYID = 6
17,722,898 UART: [afmc] SUBJECT.KEYID = 7
17,724,112 UART: [afmc] AUTHORITY.KEYID = 5
21,094,586 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,462 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,717 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,153 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,883 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,281 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,460,330 UART: [afmc] --
23,464,681 UART: [cold-reset] --
23,469,341 UART: [state] Locking Datavault
23,475,362 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,118 UART: [state] Locking ICCM
23,478,293 UART: [exit] Launching FMC @ 0x40000130
23,486,688 UART:
23,486,923 UART: Running Caliptra FMC ...
23,488,029 UART:
23,488,197 UART: [state] CFI Enabled
23,552,608 UART: [fht] FMC Alias Private Key: 7
25,893,194 UART: [art] Extend RT PCRs Done
25,894,413 UART: [art] Lock RT PCRs Done
25,895,657 UART: [art] Populate DV Done
25,901,135 UART: [fht] FMC Alias Private Key: 7
25,902,890 UART: [art] Derive CDI
25,903,703 UART: [art] Store in slot 0x4
25,962,354 UART: [art] Derive Key Pair
25,963,392 UART: [art] Store priv key in slot 0x5
29,256,064 UART: [art] Derive Key Pair - Done
29,269,339 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,558,635 UART: [art] Erasing AUTHORITY.KEYID = 7
31,560,150 UART: [art] PUB.X = D560D3F9545A23B99046C458D6B4F1FD07E5DA3E5CA94A309D115B2E46652AFC91A8AAE6853D0532E1C326C8236F9538
31,567,424 UART: [art] PUB.Y = A1F54E1640049934EA7B7E8F1E7538BA94BD1D951DE77D6FD3EE658449484D8B71A144E2E12E325E8ACB626ED1BF522A
31,574,649 UART: [art] SIG.R = FB118B2D14BEF30A18522CE5FAA4A878BA15EBF5AED9DD3F78153323D9E6AA9A595AB946D5843710EF0A377FBF82B202
31,582,069 UART: [art] SIG.S = 76AB6938AF57E0770F1247593DF19B039EE79DF80DF77F5DF4F066C1D95B7FA0ADAFA1F3423A8C428507C1CC23BD9EB2
32,887,192 UART: Caliptra RT
32,887,892 UART: [state] CFI Enabled
33,064,670 UART: [rt] RT listening for mailbox commands...
33,066,675 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,096,414 UART: [rt]cmd =0x46504c54, len=4
33,097,994 >>> mbox cmd response data (8 bytes)
33,099,136 UART: [rt] FIPS self test
33,100,093 UART: [kat] ++
33,100,546 UART: [kat] sha1
33,104,895 UART: [kat] SHA2-256
33,106,830 UART: [kat] SHA2-384
33,109,793 UART: [kat] SHA2-512-ACC
33,112,028 UART: [kat] ECC-384
36,385,938 UART: [kat] HMAC-384Kdf
36,387,040 UART: Fatal Error: 0x90030001
36,422,183 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,572,155 >>> mbox cmd response: failed
36,572,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,722,741 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,108 UART:
190,403 UART: Running Caliptra ROM ...
191,430 UART:
191,570 UART: [state] CFI Enabled
253,140 UART: [state] LifecycleState = Unprovisioned
255,071 UART: [state] DebugLocked = No
257,123 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,411 UART: [kat] SHA2-256
431,129 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,675 UART: [kat] ++
442,118 UART: [kat] sha1
453,748 UART: [kat] SHA2-256
456,439 UART: [kat] SHA2-384
460,584 UART: [kat] SHA2-512-ACC
462,942 UART: [kat] ECC-384
2,755,732 UART: [kat] HMAC-384Kdf
2,769,908 UART: [kat] LMS
3,960,199 UART: [kat] --
3,964,006 UART: [cold-reset] ++
3,966,169 UART: [fht] Storing FHT @ 0x50003400
3,976,462 UART: [idev] ++
3,977,031 UART: [idev] CDI.KEYID = 6
3,977,921 UART: [idev] SUBJECT.KEYID = 7
3,979,189 UART: [idev] UDS.KEYID = 0
3,980,763 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,130,868 UART: [idev] Erasing UDS.KEYID = 0
7,313,981 UART: [idev] Using Sha1 for KeyId Algorithm
7,336,495 UART: [idev] --
7,340,923 UART: [ldev] ++
7,341,498 UART: [ldev] CDI.KEYID = 6
7,342,537 UART: [ldev] SUBJECT.KEYID = 5
7,343,701 UART: [ldev] AUTHORITY.KEYID = 7
7,344,935 UART: [ldev] FE.KEYID = 1
7,390,400 UART: [ldev] Erasing FE.KEYID = 1
10,721,603 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,017,034 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,031,628 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,046,478 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,060,941 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,081,229 UART: [ldev] --
13,085,267 UART: [fwproc] Waiting for Commands...
13,087,531 UART: [fwproc] Received command 0x46574c44
13,089,724 UART: [fwproc] Received Image of size 119428 bytes
17,209,411 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,288,405 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,361,592 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,693,870 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,927 writing to cptra_bootfsm_go
3,806,956 ready_for_fw is high
3,807,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,989,739 >>> mbox cmd response: success
23,671,363 UART:
23,671,776 UART: Running Caliptra FMC ...
23,672,934 UART:
23,673,092 UART: [state] CFI Enabled
23,742,719 UART: [fht] FMC Alias Private Key: 7
26,083,013 UART: [art] Extend RT PCRs Done
26,084,276 UART: [art] Lock RT PCRs Done
26,085,812 UART: [art] Populate DV Done
26,091,465 UART: [fht] FMC Alias Private Key: 7
26,093,120 UART: [art] Derive CDI
26,093,865 UART: [art] Store in slot 0x4
26,151,012 UART: [art] Derive Key Pair
26,152,019 UART: [art] Store priv key in slot 0x5
29,444,137 UART: [art] Derive Key Pair - Done
29,457,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,745,279 UART: [art] Erasing AUTHORITY.KEYID = 7
31,746,789 UART: [art] PUB.X = 135E5839D722B8291E58A33E50BA1FB303DF91A15D227EE2A90A8078C44869A838CA3A5B7886A482C1EB90572D6A6FC6
31,754,017 UART: [art] PUB.Y = 97CC53537A395BA55DE5CAAB2217958E1551BB1C6B4E6B51C9F86394F514DD997239C30BE8B6272E3791F815C062F0A8
31,761,289 UART: [art] SIG.R = 4DE88BCF87AAEE729C7BD9AC363EB8A995526FFFECB288890AE932DB7ED985BBE95689841614C7B2C27D11C2CF79D39F
31,768,761 UART: [art] SIG.S = 9CF96C786BABBF163A15012F23A3E9D0F16A0FFFE075E3354B3A11DF576F69CA19EDFB7D27A4A1D05DC7A429663A80E1
33,073,541 UART: Caliptra RT
33,074,248 UART: [state] CFI Enabled
33,249,716 UART: [rt] RT listening for mailbox commands...
33,251,593 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,281,335 UART: [rt]cmd =0x46504c54, len=4
33,283,092 >>> mbox cmd response data (8 bytes)
33,284,143 UART: [rt] FIPS self test
33,285,103 UART: [kat] ++
33,285,557 UART: [kat] sha1
33,289,823 UART: [kat] SHA2-256
33,291,710 UART: [kat] SHA2-384
33,294,729 UART: [kat] SHA2-512-ACC
33,296,967 UART: [kat] ECC-384
36,570,407 UART: [kat] HMAC-384Kdf
36,571,831 UART: Fatal Error: 0x90030001
36,607,012 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,756,965 >>> mbox cmd response: failed
36,757,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,907,514 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,797,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,993,790 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,279 writing to cptra_bootfsm_go
192,565 UART:
192,921 UART: Running Caliptra ROM ...
194,128 UART:
603,914 UART: [state] CFI Enabled
614,669 UART: [state] LifecycleState = Unprovisioned
616,611 UART: [state] DebugLocked = No
619,454 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,606 UART: [kat] SHA2-256
794,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,878 UART: [kat] ++
805,360 UART: [kat] sha1
816,662 UART: [kat] SHA2-256
819,344 UART: [kat] SHA2-384
825,487 UART: [kat] SHA2-512-ACC
827,792 UART: [kat] ECC-384
3,112,551 UART: [kat] HMAC-384Kdf
3,124,270 UART: [kat] LMS
4,314,362 UART: [kat] --
4,317,455 UART: [cold-reset] ++
4,318,975 UART: [fht] Storing FHT @ 0x50003400
4,330,615 UART: [idev] ++
4,331,185 UART: [idev] CDI.KEYID = 6
4,332,226 UART: [idev] SUBJECT.KEYID = 7
4,333,413 UART: [idev] UDS.KEYID = 0
4,334,494 ready_for_fw is high
4,334,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,741 UART: [idev] Erasing UDS.KEYID = 0
7,621,607 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,238 UART: [idev] --
7,647,295 UART: [ldev] ++
7,647,875 UART: [ldev] CDI.KEYID = 6
7,648,851 UART: [ldev] SUBJECT.KEYID = 5
7,650,077 UART: [ldev] AUTHORITY.KEYID = 7
7,651,322 UART: [ldev] FE.KEYID = 1
7,662,846 UART: [ldev] Erasing FE.KEYID = 1
10,947,713 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,144 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,968 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,494 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,301,986 UART: [ldev] --
13,306,663 UART: [fwproc] Waiting for Commands...
13,308,769 UART: [fwproc] Received command 0x46574c44
13,310,961 UART: [fwproc] Received Image of size 119428 bytes
17,426,868 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,499,235 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,572,431 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,903,915 >>> mbox cmd response: success
17,908,048 UART: [afmc] ++
17,908,655 UART: [afmc] CDI.KEYID = 6
17,909,628 UART: [afmc] SUBJECT.KEYID = 7
17,910,852 UART: [afmc] AUTHORITY.KEYID = 5
21,226,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,519,864 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,522,128 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,536,522 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,551,286 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,565,662 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,588,127 UART: [afmc] --
23,592,710 UART: [cold-reset] --
23,597,146 UART: [state] Locking Datavault
23,604,349 UART: [state] Locking PCR0, PCR1 and PCR31
23,606,106 UART: [state] Locking ICCM
23,608,535 UART: [exit] Launching FMC @ 0x40000130
23,616,934 UART:
23,617,184 UART: Running Caliptra FMC ...
23,618,294 UART:
23,618,463 UART: [state] CFI Enabled
23,626,193 UART: [fht] FMC Alias Private Key: 7
25,965,875 UART: [art] Extend RT PCRs Done
25,967,104 UART: [art] Lock RT PCRs Done
25,968,467 UART: [art] Populate DV Done
25,973,826 UART: [fht] FMC Alias Private Key: 7
25,975,370 UART: [art] Derive CDI
25,976,190 UART: [art] Store in slot 0x4
26,018,953 UART: [art] Derive Key Pair
26,020,018 UART: [art] Store priv key in slot 0x5
29,261,973 UART: [art] Derive Key Pair - Done
29,274,838 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,036 UART: [art] Erasing AUTHORITY.KEYID = 7
31,556,545 UART: [art] PUB.X = 312EC1ECDC54DBADDD07E6DED3F8AEC292D21C569FEAA35DFC7E592145F98B160FD5C323F19F27C511C367981614A357
31,563,870 UART: [art] PUB.Y = DF5EC72EF9882724F79AA5E699D1DACF54D5B281C1C7AF7158796B69F632A10F6518330729BB6B6572A491746B6E4209
31,571,062 UART: [art] SIG.R = EEA2B27FE048B54CAF5B655527AD0ED88AA256DD010B7C57296AC2CBD998994806035E8D13CEAFEC3DA8C7FD58F2325B
31,578,527 UART: [art] SIG.S = 6FF5964CBC19447A54286E4A923173A8611F972510CFE8E30E0EFB4DFAC8F727E6AEBDBF2BD4CCA7172BE04D17C64B78
32,883,067 UART: Caliptra RT
32,883,789 UART: [state] CFI Enabled
33,016,566 UART: [rt] RT listening for mailbox commands...
33,018,421 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,048,231 UART: [rt]cmd =0x46504c54, len=4
33,049,885 >>> mbox cmd response data (8 bytes)
33,050,873 UART: [rt] FIPS self test
33,051,827 UART: [kat] ++
33,052,303 UART: [kat] sha1
33,056,608 UART: [kat] SHA2-256
33,058,552 UART: [kat] SHA2-384
33,061,581 UART: [kat] SHA2-512-ACC
33,063,830 UART: [kat] ECC-384
36,306,476 UART: [kat] HMAC-384Kdf
36,307,959 UART: Fatal Error: 0x90030001
36,343,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,493,097 >>> mbox cmd response: failed
36,493,724 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,643,655 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
189,996 UART:
190,287 UART: Running Caliptra ROM ...
191,314 UART:
3,886,111 UART: [state] CFI Enabled
3,900,668 UART: [state] LifecycleState = Unprovisioned
3,902,613 UART: [state] DebugLocked = No
3,904,901 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,908,943 UART: [kat] SHA2-256
4,078,655 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,089,239 UART: [kat] ++
4,089,707 UART: [kat] sha1
4,100,222 UART: [kat] SHA2-256
4,102,917 UART: [kat] SHA2-384
4,107,779 UART: [kat] SHA2-512-ACC
4,110,134 UART: [kat] ECC-384
6,393,652 UART: [kat] HMAC-384Kdf
6,405,454 UART: [kat] LMS
7,595,559 UART: [kat] --
7,599,552 UART: [cold-reset] ++
7,600,907 UART: [fht] Storing FHT @ 0x50003400
7,612,574 UART: [idev] ++
7,613,142 UART: [idev] CDI.KEYID = 6
7,614,087 UART: [idev] SUBJECT.KEYID = 7
7,615,309 UART: [idev] UDS.KEYID = 0
7,616,858 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,767,136 UART: [idev] Erasing UDS.KEYID = 0
10,900,716 UART: [idev] Using Sha1 for KeyId Algorithm
10,924,003 UART: [idev] --
10,928,867 UART: [ldev] ++
10,929,438 UART: [ldev] CDI.KEYID = 6
10,930,380 UART: [ldev] SUBJECT.KEYID = 5
10,931,653 UART: [ldev] AUTHORITY.KEYID = 7
10,932,808 UART: [ldev] FE.KEYID = 1
10,944,081 UART: [ldev] Erasing FE.KEYID = 1
14,234,800 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,526,954 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,541,565 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,556,363 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,570,880 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,589,599 UART: [ldev] --
16,593,734 UART: [fwproc] Waiting for Commands...
16,595,513 UART: [fwproc] Received command 0x46574c44
16,597,707 UART: [fwproc] Received Image of size 119428 bytes
20,710,028 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,783,633 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,856,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,188,428 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,225 writing to cptra_bootfsm_go
4,125,491 ready_for_fw is high
4,125,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,168,694 >>> mbox cmd response: success
23,812,412 UART:
23,812,798 UART: Running Caliptra FMC ...
23,813,917 UART:
23,814,078 UART: [state] CFI Enabled
23,821,985 UART: [fht] FMC Alias Private Key: 7
26,162,122 UART: [art] Extend RT PCRs Done
26,163,357 UART: [art] Lock RT PCRs Done
26,165,089 UART: [art] Populate DV Done
26,170,360 UART: [fht] FMC Alias Private Key: 7
26,172,072 UART: [art] Derive CDI
26,172,820 UART: [art] Store in slot 0x4
26,215,219 UART: [art] Derive Key Pair
26,216,266 UART: [art] Store priv key in slot 0x5
29,458,476 UART: [art] Derive Key Pair - Done
29,471,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,821 UART: [art] Erasing AUTHORITY.KEYID = 7
31,753,350 UART: [art] PUB.X = 3FBC678924E56C21BCA07D5CA2CF687A80A8900642F5B88225DCFE9CCCD73E442A851F3FB305E230D1D8ABF90883F30E
31,760,612 UART: [art] PUB.Y = 1A45ED0D59624D77599BFD1DC939EBC43761A5DACCBBF082A941889C2C9E628F140B80CBD7609BCCD5A2036924D2C76D
31,767,914 UART: [art] SIG.R = 943052122EFB19D68F907FD85890D03B81AEE0D8850BF278B9AE72332976E61052E668DE2C4A1A24E2DBA34A4055E6C2
31,775,305 UART: [art] SIG.S = 1D38FD828056B2D3200B2E30B0A3A20B9FAC852E6C2E802A780A0FA58ED6CC26970D9C9C981095CD10C2E509FA84292F
33,080,004 UART: Caliptra RT
33,080,723 UART: [state] CFI Enabled
33,213,460 UART: [rt] RT listening for mailbox commands...
33,215,343 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,244,980 UART: [rt]cmd =0x46504c54, len=4
33,246,378 >>> mbox cmd response data (8 bytes)
33,247,728 UART: [rt] FIPS self test
33,248,679 UART: [kat] ++
33,249,133 UART: [kat] sha1
33,253,593 UART: [kat] SHA2-256
33,255,471 UART: [kat] SHA2-384
33,258,412 UART: [kat] SHA2-512-ACC
33,260,703 UART: [kat] ECC-384
36,503,608 UART: [kat] HMAC-384Kdf
36,505,047 UART: Fatal Error: 0x90030001
36,540,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,690,350 >>> mbox cmd response: failed
36,691,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,840,978 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
7,218,236 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,260,472 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,198 writing to cptra_bootfsm_go
192,539 UART:
192,914 UART: Running Caliptra ROM ...
194,147 UART:
194,324 UART: [state] CFI Enabled
264,527 UART: [state] LifecycleState = Unprovisioned
266,524 UART: [state] DebugLocked = No
268,851 UART: [state] WD Timer not started. Device not locked for debugging
273,260 UART: [kat] SHA2-256
452,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,744 UART: [kat] ++
464,291 UART: [kat] sha1
475,250 UART: [kat] SHA2-256
477,952 UART: [kat] SHA2-384
484,631 UART: [kat] SHA2-512-ACC
487,020 UART: [kat] ECC-384
2,948,447 UART: [kat] HMAC-384Kdf
2,969,294 UART: [kat] LMS
3,445,801 UART: [kat] --
3,448,883 UART: [cold-reset] ++
3,450,060 UART: [fht] FHT @ 0x50003400
3,460,975 UART: [idev] ++
3,461,575 UART: [idev] CDI.KEYID = 6
3,462,471 UART: [idev] SUBJECT.KEYID = 7
3,463,724 UART: [idev] UDS.KEYID = 0
3,464,729 ready_for_fw is high
3,464,939 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,615,139 UART: [idev] Erasing UDS.KEYID = 0
5,985,312 UART: [idev] Sha1 KeyId Algorithm
6,009,025 UART: [idev] --
6,013,171 UART: [ldev] ++
6,013,760 UART: [ldev] CDI.KEYID = 6
6,014,661 UART: [ldev] SUBJECT.KEYID = 5
6,015,888 UART: [ldev] AUTHORITY.KEYID = 7
6,017,133 UART: [ldev] FE.KEYID = 1
6,057,579 UART: [ldev] Erasing FE.KEYID = 1
8,565,295 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,439 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,307 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,892 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,263 UART: [ldev] --
10,375,584 UART: [fwproc] Wait for Commands...
10,377,685 UART: [fwproc] Recv command 0x46574c44
10,379,678 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,335 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,320 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,339 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,359,397 >>> mbox cmd response: success
14,363,630 UART: [afmc] ++
14,364,228 UART: [afmc] CDI.KEYID = 6
14,365,153 UART: [afmc] SUBJECT.KEYID = 7
14,366,394 UART: [afmc] AUTHORITY.KEYID = 5
16,899,115 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,693 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,872 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,724 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,687,295 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,990 UART: [afmc] --
18,717,239 UART: [cold-reset] --
18,722,113 UART: [state] Locking Datavault
18,727,160 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,875 UART: [state] Locking ICCM
18,731,512 UART: [exit] Launching FMC @ 0x40000130
18,739,965 UART:
18,740,204 UART: Running Caliptra FMC ...
18,741,315 UART:
18,741,499 UART: [state] CFI Enabled
18,793,155 UART: [fht] FMC Alias Private Key: 7
20,560,298 UART: [art] Extend RT PCRs Done
20,561,524 UART: [art] Lock RT PCRs Done
20,563,215 UART: [art] Populate DV Done
20,568,582 UART: [fht] FMC Alias Private Key: 7
20,570,283 UART: [art] Derive CDI
20,571,099 UART: [art] Store in slot 0x4
20,626,417 UART: [art] Derive Key Pair
20,627,422 UART: [art] Store priv key in slot 0x5
23,090,232 UART: [art] Derive Key Pair - Done
23,102,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,568 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,080 UART: [art] PUB.X = 962EA1B15F0F2F4EEC3D86D0C367FA539E3E748FE47683933142186FD5F2864670FE5F39A1D0400CD8EB978ABCFD454F
24,824,392 UART: [art] PUB.Y = 6816D07C374FF1D0067B339725AA373A7080AAD37327DEAF5B7DFB964D625FEF58EB82A33640F4EC38D1B46E0E4470BA
24,831,644 UART: [art] SIG.R = EB05EBEBA8C2AF3816E6906D57501091A589F07EA42FAAF5DA8CDEC0DA8E08E78A7B12B7CCA097927E4BD31A82D3F241
24,839,066 UART: [art] SIG.S = 29415F7E8BC8A5629DAA5239CE44975F36833D733E03B5A1BA95293B05E814D1ED4AE61F511CCF6D35A5F28B062939D3
25,818,162 UART: Caliptra RT
25,818,857 UART: [state] CFI Enabled
25,998,306 UART: [rt] RT listening for mailbox commands...
26,000,161 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,029,770 UART: [rt]cmd =0x46504c54, len=4
26,031,461 >>> mbox cmd response data (8 bytes)
26,032,757 UART: [rt] FIPS self test
26,033,705 UART: [kat] ++
26,034,159 UART: [kat] sha1
26,038,730 UART: [kat] SHA2-256
26,040,609 UART: [kat] SHA2-384
26,043,439 UART: [kat] SHA2-512-ACC
26,045,684 UART: [kat] ECC-384
28,489,178 UART: [kat] HMAC-384Kdf
28,490,388 UART: Fatal Error: 0x90030001
28,525,634 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,676,040 >>> mbox cmd response: failed
28,676,695 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,826,601 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
190,104 UART:
190,396 UART: Running Caliptra ROM ...
191,426 UART:
191,568 UART: [state] CFI Enabled
249,625 UART: [state] LifecycleState = Unprovisioned
251,542 UART: [state] DebugLocked = No
253,765 UART: [state] WD Timer not started. Device not locked for debugging
257,440 UART: [kat] SHA2-256
437,089 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,907 UART: [kat] ++
448,393 UART: [kat] sha1
458,725 UART: [kat] SHA2-256
461,395 UART: [kat] SHA2-384
468,519 UART: [kat] SHA2-512-ACC
470,922 UART: [kat] ECC-384
2,945,760 UART: [kat] HMAC-384Kdf
2,970,261 UART: [kat] LMS
3,446,771 UART: [kat] --
3,451,627 UART: [cold-reset] ++
3,453,073 UART: [fht] FHT @ 0x50003400
3,464,384 UART: [idev] ++
3,464,955 UART: [idev] CDI.KEYID = 6
3,465,898 UART: [idev] SUBJECT.KEYID = 7
3,467,167 UART: [idev] UDS.KEYID = 0
3,468,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,618,844 UART: [idev] Erasing UDS.KEYID = 0
5,986,008 UART: [idev] Sha1 KeyId Algorithm
6,010,645 UART: [idev] --
6,016,267 UART: [ldev] ++
6,016,847 UART: [ldev] CDI.KEYID = 6
6,017,764 UART: [ldev] SUBJECT.KEYID = 5
6,018,988 UART: [ldev] AUTHORITY.KEYID = 7
6,020,227 UART: [ldev] FE.KEYID = 1
6,055,913 UART: [ldev] Erasing FE.KEYID = 1
8,561,800 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,014 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,798 UART: [ldev] --
10,373,359 UART: [fwproc] Wait for Commands...
10,376,419 UART: [fwproc] Recv command 0x46574c44
10,378,439 UART: [fwproc] Recv'd Img size: 119428 bytes
13,878,024 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,960,872 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,033,899 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,364,880 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,834 writing to cptra_bootfsm_go
3,460,728 ready_for_fw is high
3,461,333 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,251,708 >>> mbox cmd response: success
18,534,078 UART:
18,534,476 UART: Running Caliptra FMC ...
18,535,628 UART:
18,535,798 UART: [state] CFI Enabled
18,599,930 UART: [fht] FMC Alias Private Key: 7
20,366,117 UART: [art] Extend RT PCRs Done
20,367,353 UART: [art] Lock RT PCRs Done
20,369,209 UART: [art] Populate DV Done
20,374,706 UART: [fht] FMC Alias Private Key: 7
20,376,255 UART: [art] Derive CDI
20,377,080 UART: [art] Store in slot 0x4
20,432,689 UART: [art] Derive Key Pair
20,433,737 UART: [art] Store priv key in slot 0x5
22,896,573 UART: [art] Derive Key Pair - Done
22,909,354 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,621,983 UART: [art] Erasing AUTHORITY.KEYID = 7
24,623,490 UART: [art] PUB.X = 487CD4640EF6A79914F7460289A7BD2F92C2070239FA404882CA936B9D454217E496E987D2F9A68668F177CD7849D862
24,630,783 UART: [art] PUB.Y = 901E8D89096C0166E430D610E67F05F3F0C7AAA4BAC240962B4C607775ED2596CB5D7C583A6E80DEC7B5F8B29740DB0B
24,637,991 UART: [art] SIG.R = A3953A7A90DFDCC9F78E3A104605404B48DFF158386DC9C6D7FBF2897EC454A7F613837AFDCDB49EFDAEC17BA23C957F
24,645,457 UART: [art] SIG.S = 64F8208C4D941F8C040B08EC60F6BEB1DDD982B44461102938BFD274B121E36AC356F989CD0AE16D99A8E7F8936B045C
25,624,084 UART: Caliptra RT
25,624,804 UART: [state] CFI Enabled
25,803,220 UART: [rt] RT listening for mailbox commands...
25,805,078 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,834,654 UART: [rt]cmd =0x46504c54, len=4
25,836,345 >>> mbox cmd response data (8 bytes)
25,837,391 UART: [rt] FIPS self test
25,838,342 UART: [kat] ++
25,838,799 UART: [kat] sha1
25,843,032 UART: [kat] SHA2-256
25,844,970 UART: [kat] SHA2-384
25,847,919 UART: [kat] SHA2-512-ACC
25,850,223 UART: [kat] ECC-384
28,296,188 UART: [kat] HMAC-384Kdf
28,297,672 UART: Fatal Error: 0x90030001
28,332,976 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,483,030 >>> mbox cmd response: failed
28,483,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,633,465 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,442,109 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,236,680 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,453 writing to cptra_bootfsm_go
192,558 UART:
192,993 UART: Running Caliptra ROM ...
194,158 UART:
603,695 UART: [state] CFI Enabled
617,332 UART: [state] LifecycleState = Unprovisioned
619,322 UART: [state] DebugLocked = No
622,222 UART: [state] WD Timer not started. Device not locked for debugging
625,995 UART: [kat] SHA2-256
805,679 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,402 UART: [kat] ++
817,012 UART: [kat] sha1
827,621 UART: [kat] SHA2-256
830,344 UART: [kat] SHA2-384
835,350 UART: [kat] SHA2-512-ACC
837,728 UART: [kat] ECC-384
3,279,946 UART: [kat] HMAC-384Kdf
3,292,272 UART: [kat] LMS
3,768,803 UART: [kat] --
3,775,010 UART: [cold-reset] ++
3,776,384 UART: [fht] FHT @ 0x50003400
3,787,941 UART: [idev] ++
3,788,518 UART: [idev] CDI.KEYID = 6
3,789,438 UART: [idev] SUBJECT.KEYID = 7
3,790,693 UART: [idev] UDS.KEYID = 0
3,791,626 ready_for_fw is high
3,791,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,941,933 UART: [idev] Erasing UDS.KEYID = 0
6,267,379 UART: [idev] Sha1 KeyId Algorithm
6,292,344 UART: [idev] --
6,297,536 UART: [ldev] ++
6,298,152 UART: [ldev] CDI.KEYID = 6
6,299,073 UART: [ldev] SUBJECT.KEYID = 5
6,300,248 UART: [ldev] AUTHORITY.KEYID = 7
6,301,509 UART: [ldev] FE.KEYID = 1
6,313,782 UART: [ldev] Erasing FE.KEYID = 1
8,797,914 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,517,272 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,533,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,763 UART: [ldev] --
10,591,743 UART: [fwproc] Wait for Commands...
10,594,279 UART: [fwproc] Recv command 0x46574c44
10,596,275 UART: [fwproc] Recv'd Img size: 119428 bytes
14,088,642 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,255 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,567,552 >>> mbox cmd response: success
14,572,380 UART: [afmc] ++
14,572,995 UART: [afmc] CDI.KEYID = 6
14,573,912 UART: [afmc] SUBJECT.KEYID = 7
14,575,135 UART: [afmc] AUTHORITY.KEYID = 5
17,079,316 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,800,347 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,802,588 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,818,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,834,436 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,850,025 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,225 UART: [afmc] --
18,878,268 UART: [cold-reset] --
18,881,053 UART: [state] Locking Datavault
18,888,036 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,805 UART: [state] Locking ICCM
18,892,174 UART: [exit] Launching FMC @ 0x40000130
18,900,575 UART:
18,900,838 UART: Running Caliptra FMC ...
18,901,951 UART:
18,902,117 UART: [state] CFI Enabled
18,910,008 UART: [fht] FMC Alias Private Key: 7
20,676,057 UART: [art] Extend RT PCRs Done
20,677,289 UART: [art] Lock RT PCRs Done
20,678,490 UART: [art] Populate DV Done
20,684,014 UART: [fht] FMC Alias Private Key: 7
20,685,666 UART: [art] Derive CDI
20,686,486 UART: [art] Store in slot 0x4
20,728,871 UART: [art] Derive Key Pair
20,729,912 UART: [art] Store priv key in slot 0x5
23,156,673 UART: [art] Derive Key Pair - Done
23,169,509 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,875,895 UART: [art] Erasing AUTHORITY.KEYID = 7
24,877,403 UART: [art] PUB.X = 271BBAC3C02C00FD5FCBA52D1FAC20F3A2D9DB4DE8D588374DA62C9635985E5C9519540924F27E74C8A97B9E7CF08242
24,884,711 UART: [art] PUB.Y = 93716D7A5BF737FFB87BF785A3DE93EDCEDC29875BD6DF6667FADCDA11AF4EF8FBCDDAF577D8563DE7C4D037BD7570A7
24,891,979 UART: [art] SIG.R = E2A6652848BC24999A770EE3F789CE8F801E0D4A66B9963AAEEBE622818E69D084186820D77B13A0CAA1AC379BE11C83
24,899,365 UART: [art] SIG.S = D87A10BB8D58565D92A18140121E5E113864F057BF732892F43BA86A74451204E9A9CF7B8A37CE9727B292EF82C83DFA
25,878,019 UART: Caliptra RT
25,878,714 UART: [state] CFI Enabled
26,011,139 UART: [rt] RT listening for mailbox commands...
26,012,991 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,042,458 UART: [rt]cmd =0x46504c54, len=4
26,043,987 >>> mbox cmd response data (8 bytes)
26,045,310 UART: [rt] FIPS self test
26,046,255 UART: [kat] ++
26,046,712 UART: [kat] sha1
26,051,230 UART: [kat] SHA2-256
26,053,171 UART: [kat] SHA2-384
26,056,187 UART: [kat] SHA2-512-ACC
26,058,453 UART: [kat] ECC-384
28,485,973 UART: [kat] HMAC-384Kdf
28,487,615 UART: Fatal Error: 0x90030001
28,522,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,672,788 >>> mbox cmd response: failed
28,673,387 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,823,327 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,159 UART:
190,474 UART: Running Caliptra ROM ...
191,507 UART:
11,709,055 UART: [state] CFI Enabled
11,721,439 UART: [state] LifecycleState = Unprovisioned
11,723,365 UART: [state] DebugLocked = No
11,726,002 UART: [state] WD Timer not started. Device not locked for debugging
11,729,765 UART: [kat] SHA2-256
11,909,402 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,920,164 UART: [kat] ++
11,920,656 UART: [kat] sha1
11,932,196 UART: [kat] SHA2-256
11,934,895 UART: [kat] SHA2-384
11,940,086 UART: [kat] SHA2-512-ACC
11,942,446 UART: [kat] ECC-384
14,383,893 UART: [kat] HMAC-384Kdf
14,396,611 UART: [kat] LMS
14,873,092 UART: [kat] --
14,878,652 UART: [cold-reset] ++
14,881,010 UART: [fht] FHT @ 0x50003400
14,893,125 UART: [idev] ++
14,893,694 UART: [idev] CDI.KEYID = 6
14,894,637 UART: [idev] SUBJECT.KEYID = 7
14,895,906 UART: [idev] UDS.KEYID = 0
14,897,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,047,327 UART: [idev] Erasing UDS.KEYID = 0
17,371,182 UART: [idev] Sha1 KeyId Algorithm
17,395,370 UART: [idev] --
17,401,073 UART: [ldev] ++
17,401,657 UART: [ldev] CDI.KEYID = 6
17,402,543 UART: [ldev] SUBJECT.KEYID = 5
17,403,754 UART: [ldev] AUTHORITY.KEYID = 7
17,405,043 UART: [ldev] FE.KEYID = 1
17,415,400 UART: [ldev] Erasing FE.KEYID = 1
19,899,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,616,548 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,632,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,648,251 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,663,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,684,620 UART: [ldev] --
21,689,802 UART: [fwproc] Wait for Commands...
21,691,699 UART: [fwproc] Recv command 0x46574c44
21,693,697 UART: [fwproc] Recv'd Img size: 119428 bytes
25,190,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,271,719 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,344,745 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,676,420 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,781,644 ready_for_fw is high
3,782,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,466,207 >>> mbox cmd response: success
18,710,108 UART:
18,710,489 UART: Running Caliptra FMC ...
18,711,634 UART:
18,711,802 UART: [state] CFI Enabled
18,719,990 UART: [fht] FMC Alias Private Key: 7
20,486,201 UART: [art] Extend RT PCRs Done
20,487,431 UART: [art] Lock RT PCRs Done
20,488,983 UART: [art] Populate DV Done
20,494,256 UART: [fht] FMC Alias Private Key: 7
20,495,970 UART: [art] Derive CDI
20,496,955 UART: [art] Store in slot 0x4
20,539,528 UART: [art] Derive Key Pair
20,540,538 UART: [art] Store priv key in slot 0x5
22,967,086 UART: [art] Derive Key Pair - Done
22,980,299 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,686,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,688,159 UART: [art] PUB.X = E5584EF900F79AA5259CA8D4539CCE46C0D6094F0B6C9142301774A7A89C99A358A71EDC082A26B946198DEBA36D297E
24,695,415 UART: [art] PUB.Y = AFA9F672B9F8F1A5A21A36A33670ECE1467CA4AD123149C445D2E63B892F16A5AFE0E5626D6459657064994181AF82A3
24,702,664 UART: [art] SIG.R = 0435E0711B6E108775BE864BAC2C8A4A137D613639EC150CDF911B1B54DE064749272C7DF03702C335AA6DCFA4670110
24,710,020 UART: [art] SIG.S = 029888098C2688AE4E2464ECD0EC329BBAB70883EF31F580E25FEB0AC2DE6067C545F52E46318ABFD5928FC2436B1CDE
25,688,599 UART: Caliptra RT
25,689,320 UART: [state] CFI Enabled
25,822,200 UART: [rt] RT listening for mailbox commands...
25,824,058 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,853,577 UART: [rt]cmd =0x46504c54, len=4
25,855,163 >>> mbox cmd response data (8 bytes)
25,856,579 UART: [rt] FIPS self test
25,857,724 UART: [kat] ++
25,858,187 UART: [kat] sha1
25,862,489 UART: [kat] SHA2-256
25,864,420 UART: [kat] SHA2-384
25,867,223 UART: [kat] SHA2-512-ACC
25,869,466 UART: [kat] ECC-384
28,296,678 UART: [kat] HMAC-384Kdf
28,298,316 UART: Fatal Error: 0x90030001
28,333,491 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,483,419 >>> mbox cmd response: failed
28,484,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,634,328 >>> mbox cmd response: failed
Initializing fuses
929 writing to cptra_bootfsm_go
15,063,797 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,735,366 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
192,157 UART:
192,520 UART: Running Caliptra ROM ...
193,698 UART:
193,855 UART: [state] CFI Enabled
267,936 UART: [state] LifecycleState = Unprovisioned
270,312 UART: [state] DebugLocked = No
273,134 UART: [state] WD Timer not started. Device not locked for debugging
278,598 UART: [kat] SHA2-256
468,468 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
479,275 UART: [kat] ++
479,754 UART: [kat] sha1
490,210 UART: [kat] SHA2-256
493,237 UART: [kat] SHA2-384
499,588 UART: [kat] SHA2-512-ACC
502,183 UART: [kat] ECC-384
2,963,603 UART: [kat] HMAC-384Kdf
2,986,537 UART: [kat] LMS
3,518,263 UART: [kat] --
3,522,978 UART: [cold-reset] ++
3,524,276 UART: [fht] FHT @ 0x50003400
3,535,478 UART: [idev] ++
3,536,193 UART: [idev] CDI.KEYID = 6
3,537,078 UART: [idev] SUBJECT.KEYID = 7
3,538,330 UART: [idev] UDS.KEYID = 0
3,539,239 ready_for_fw is high
3,539,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,689,726 UART: [idev] Erasing UDS.KEYID = 0
6,043,790 UART: [idev] Sha1 KeyId Algorithm
6,067,088 UART: [idev] --
6,073,203 UART: [ldev] ++
6,073,888 UART: [ldev] CDI.KEYID = 6
6,074,818 UART: [ldev] SUBJECT.KEYID = 5
6,076,004 UART: [ldev] AUTHORITY.KEYID = 7
6,077,191 UART: [ldev] FE.KEYID = 1
6,115,552 UART: [ldev] Erasing FE.KEYID = 1
8,623,291 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,357,438 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,372,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,387,839 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,402,943 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,423,192 UART: [ldev] --
10,429,543 UART: [fwproc] Wait for Commands...
10,431,165 UART: [fwproc] Recv command 0x46574c44
10,433,484 UART: [fwproc] Recv'd Img size: 119428 bytes
13,939,504 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,024,223 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,147,856 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,714,302 >>> mbox cmd response: success
14,718,528 UART: [afmc] ++
14,719,240 UART: [afmc] CDI.KEYID = 6
14,720,433 UART: [afmc] SUBJECT.KEYID = 7
14,721,872 UART: [afmc] AUTHORITY.KEYID = 5
17,249,046 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,972,158 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,974,072 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,989,166 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,004,331 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,019,193 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,042,911 UART: [afmc] --
19,045,706 UART: [cold-reset] --
19,049,522 UART: [state] Locking Datavault
19,056,562 UART: [state] Locking PCR0, PCR1 and PCR31
19,058,756 UART: [state] Locking ICCM
19,061,566 UART: [exit] Launching FMC @ 0x40000130
19,070,210 UART:
19,070,454 UART: Running Caliptra FMC ...
19,071,488 UART:
19,071,642 UART: [state] CFI Enabled
19,129,902 UART: [fht] FMC Alias Private Key: 7
20,896,145 UART: [art] Extend RT PCRs Done
20,897,376 UART: [art] Lock RT PCRs Done
20,899,033 UART: [art] Populate DV Done
20,904,450 UART: [fht] FMC Alias Private Key: 7
20,906,155 UART: [art] Derive CDI
20,906,970 UART: [art] Store in slot 0x4
20,963,273 UART: [art] Derive Key Pair
20,964,344 UART: [art] Store priv key in slot 0x5
23,427,290 UART: [art] Derive Key Pair - Done
23,440,399 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,152,841 UART: [art] Erasing AUTHORITY.KEYID = 7
25,154,381 UART: [art] PUB.X = 04CE8A9A743EC73F99B9C6D11BB8E561844FDBD86F587093A846CA85770CBA76381D0B29E7B13360A55A8F2E1987FCB1
25,161,622 UART: [art] PUB.Y = C01FB3D5B18659241A70765D485C69186CC932749C2D663919EBDE81AA3656028476E0E56F0FE9CF9228200CD1A4374F
25,168,828 UART: [art] SIG.R = BC66B9C3BBE1EA3F4C284299E72AEA824805ED1C91BE5EB475ABA0DE4F13E217290828CF9C5EA2027124FC2515270256
25,176,232 UART: [art] SIG.S = 3517D1BE864C21D9ADF5E520AE1D1B9E3430601F654846006F9CEE47862C40224C4F33A9D06114A5A0DB4EEF84BF19D8
26,154,857 UART: Caliptra RT
26,155,553 UART: [state] CFI Enabled
26,336,600 UART: [rt] RT listening for mailbox commands...
26,338,445 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,368,236 UART: [rt]cmd =0x46504c54, len=4
26,369,582 >>> mbox cmd response data (8 bytes)
26,370,612 UART: [rt] FIPS self test
26,371,563 UART: [kat] ++
26,372,022 UART: [kat] sha1
26,376,375 UART: [kat] SHA2-256
26,378,307 UART: [kat] SHA2-384
26,381,215 UART: [kat] SHA2-512-ACC
26,383,490 UART: [kat] ECC-384
28,827,501 UART: [kat] HMAC-384Kdf
28,828,826 UART: Fatal Error: 0x90030001
28,864,214 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,014,555 >>> mbox cmd response: failed
29,015,197 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,165,163 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
190,093 UART:
190,387 UART: Running Caliptra ROM ...
191,449 UART:
191,595 UART: [state] CFI Enabled
253,586 UART: [state] LifecycleState = Unprovisioned
255,989 UART: [state] DebugLocked = No
258,728 UART: [state] WD Timer not started. Device not locked for debugging
264,218 UART: [kat] SHA2-256
454,084 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,854 UART: [kat] ++
465,305 UART: [kat] sha1
477,471 UART: [kat] SHA2-256
480,469 UART: [kat] SHA2-384
486,517 UART: [kat] SHA2-512-ACC
489,136 UART: [kat] ECC-384
2,934,755 UART: [kat] HMAC-384Kdf
2,956,543 UART: [kat] LMS
3,488,296 UART: [kat] --
3,493,595 UART: [cold-reset] ++
3,496,072 UART: [fht] FHT @ 0x50003400
3,506,678 UART: [idev] ++
3,507,358 UART: [idev] CDI.KEYID = 6
3,508,325 UART: [idev] SUBJECT.KEYID = 7
3,509,587 UART: [idev] UDS.KEYID = 0
3,511,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,661,060 UART: [idev] Erasing UDS.KEYID = 0
6,025,218 UART: [idev] Sha1 KeyId Algorithm
6,047,703 UART: [idev] --
6,053,974 UART: [ldev] ++
6,054,660 UART: [ldev] CDI.KEYID = 6
6,055,577 UART: [ldev] SUBJECT.KEYID = 5
6,056,765 UART: [ldev] AUTHORITY.KEYID = 7
6,058,001 UART: [ldev] FE.KEYID = 1
6,096,701 UART: [ldev] Erasing FE.KEYID = 1
8,600,161 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,353,161 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,368,365 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,383,492 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,758 UART: [ldev] --
10,410,505 UART: [fwproc] Wait for Commands...
10,412,024 UART: [fwproc] Recv command 0x46574c44
10,414,345 UART: [fwproc] Recv'd Img size: 119428 bytes
13,928,151 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,948 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,569 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,692,145 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,983 writing to cptra_bootfsm_go
3,417,194 ready_for_fw is high
3,417,734 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,821,407 >>> mbox cmd response: success
19,111,218 UART:
19,111,620 UART: Running Caliptra FMC ...
19,112,781 UART:
19,112,959 UART: [state] CFI Enabled
19,180,157 UART: [fht] FMC Alias Private Key: 7
20,967,693 UART: [art] Extend RT PCRs Done
20,968,922 UART: [art] Lock RT PCRs Done
20,970,498 UART: [art] Populate DV Done
20,975,831 UART: [fht] FMC Alias Private Key: 7
20,977,324 UART: [art] Derive CDI
20,978,092 UART: [art] Store in slot 0x4
21,033,792 UART: [art] Derive Key Pair
21,034,840 UART: [art] Store priv key in slot 0x5
23,497,978 UART: [art] Derive Key Pair - Done
23,511,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,224,190 UART: [art] Erasing AUTHORITY.KEYID = 7
25,225,697 UART: [art] PUB.X = E3D28C342623C164BFFB0376BEA57C2DE473BD34FA30022A08159CC35984504C394FD13A1C909086D30992CAD3DC35F4
25,232,979 UART: [art] PUB.Y = CD63216D1BE453761AA8F3CDCEBE9270BAD7BBB0223A0C2556CC68BFFB0B88DD565AC3C134E4E34408F15F7CBAD9339D
25,240,268 UART: [art] SIG.R = 40AFD20EB8E59590424185933CFC13DDE02933287F1C7EEA5A580C155E38994EC8F923C5EE5CD1D7246F89B5C0ABBB7B
25,247,669 UART: [art] SIG.S = B31E0C883B2ECE5DEE17E8436E7BACED27B8197110BAB568F20613C8089BBBF81DE42FFD394A24BF203A90D24BE72ADE
26,226,732 UART: Caliptra RT
26,227,446 UART: [state] CFI Enabled
26,408,123 UART: [rt] RT listening for mailbox commands...
26,409,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,439,711 UART: [rt]cmd =0x46504c54, len=4
26,441,187 >>> mbox cmd response data (8 bytes)
26,441,970 UART: [rt] FIPS self test
26,442,830 UART: [kat] ++
26,443,278 UART: [kat] sha1
26,447,725 UART: [kat] SHA2-256
26,449,663 UART: [kat] SHA2-384
26,452,678 UART: [kat] SHA2-512-ACC
26,454,920 UART: [kat] ECC-384
28,899,537 UART: [kat] HMAC-384Kdf
28,900,876 UART: Fatal Error: 0x90030001
28,936,124 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,086,098 >>> mbox cmd response: failed
29,086,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,236,719 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,425,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,843,187 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
192,600 UART:
192,971 UART: Running Caliptra ROM ...
194,116 UART:
603,655 UART: [state] CFI Enabled
619,396 UART: [state] LifecycleState = Unprovisioned
621,774 UART: [state] DebugLocked = No
624,304 UART: [state] WD Timer not started. Device not locked for debugging
628,716 UART: [kat] SHA2-256
818,596 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,396 UART: [kat] ++
830,070 UART: [kat] sha1
840,400 UART: [kat] SHA2-256
843,432 UART: [kat] SHA2-384
849,503 UART: [kat] SHA2-512-ACC
852,100 UART: [kat] ECC-384
3,295,518 UART: [kat] HMAC-384Kdf
3,307,278 UART: [kat] LMS
3,839,089 UART: [kat] --
3,844,276 UART: [cold-reset] ++
3,846,218 UART: [fht] FHT @ 0x50003400
3,857,987 UART: [idev] ++
3,858,705 UART: [idev] CDI.KEYID = 6
3,859,665 UART: [idev] SUBJECT.KEYID = 7
3,860,844 UART: [idev] UDS.KEYID = 0
3,861,780 ready_for_fw is high
3,862,005 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,012,088 UART: [idev] Erasing UDS.KEYID = 0
6,339,396 UART: [idev] Sha1 KeyId Algorithm
6,362,593 UART: [idev] --
6,367,540 UART: [ldev] ++
6,368,235 UART: [ldev] CDI.KEYID = 6
6,369,121 UART: [ldev] SUBJECT.KEYID = 5
6,370,341 UART: [ldev] AUTHORITY.KEYID = 7
6,371,524 UART: [ldev] FE.KEYID = 1
6,381,042 UART: [ldev] Erasing FE.KEYID = 1
8,861,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,579,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,594,798 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,609,979 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,104 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,646,589 UART: [ldev] --
10,652,724 UART: [fwproc] Wait for Commands...
10,654,724 UART: [fwproc] Recv command 0x46574c44
10,657,046 UART: [fwproc] Recv'd Img size: 119428 bytes
14,162,745 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,222 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,841 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,933 >>> mbox cmd response: success
14,935,675 UART: [afmc] ++
14,936,380 UART: [afmc] CDI.KEYID = 6
14,937,562 UART: [afmc] SUBJECT.KEYID = 7
14,939,051 UART: [afmc] AUTHORITY.KEYID = 5
17,446,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,167,058 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,169,027 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,184,097 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,199,256 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,214,142 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,238,391 UART: [afmc] --
19,242,396 UART: [cold-reset] --
19,246,485 UART: [state] Locking Datavault
19,252,226 UART: [state] Locking PCR0, PCR1 and PCR31
19,254,417 UART: [state] Locking ICCM
19,257,005 UART: [exit] Launching FMC @ 0x40000130
19,265,684 UART:
19,265,924 UART: Running Caliptra FMC ...
19,267,048 UART:
19,267,211 UART: [state] CFI Enabled
19,274,938 UART: [fht] FMC Alias Private Key: 7
21,041,688 UART: [art] Extend RT PCRs Done
21,042,896 UART: [art] Lock RT PCRs Done
21,044,313 UART: [art] Populate DV Done
21,049,565 UART: [fht] FMC Alias Private Key: 7
21,051,163 UART: [art] Derive CDI
21,051,929 UART: [art] Store in slot 0x4
21,094,752 UART: [art] Derive Key Pair
21,095,819 UART: [art] Store priv key in slot 0x5
23,522,921 UART: [art] Derive Key Pair - Done
23,535,813 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,242,009 UART: [art] Erasing AUTHORITY.KEYID = 7
25,243,514 UART: [art] PUB.X = 209F07A395345FF16BFEEC2ADF0A9C872B37DD3807B483C2286DB3202C1AA3BC1A632A05FF1EFDEDA1F1E30AFFFFD986
25,250,810 UART: [art] PUB.Y = 710037A548DB67D4BC5532552C580E8D6BC1AACE075C24D183F375DEA70CEEA9F109A22FC6D5560699A4A4B7D895B006
25,258,036 UART: [art] SIG.R = B13869A886A223AD5CE7DBF854FD7E9706D6CBB9F58BAAD8F069FBFECC114AD4346EC68FFA03E68CF645565EB8B892F2
25,265,466 UART: [art] SIG.S = 5BFDC0EDB3673B0B1C65B47109ACDB735C66D89F0E6FB9C76135F8C40ADA91099425171A02F164844C86AF6478CE030E
26,244,261 UART: Caliptra RT
26,244,953 UART: [state] CFI Enabled
26,378,712 UART: [rt] RT listening for mailbox commands...
26,380,566 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,410,413 UART: [rt]cmd =0x46504c54, len=4
26,412,150 >>> mbox cmd response data (8 bytes)
26,413,487 UART: [rt] FIPS self test
26,414,435 UART: [kat] ++
26,414,888 UART: [kat] sha1
26,419,213 UART: [kat] SHA2-256
26,421,097 UART: [kat] SHA2-384
26,424,222 UART: [kat] SHA2-512-ACC
26,426,500 UART: [kat] ECC-384
28,853,647 UART: [kat] HMAC-384Kdf
28,855,077 UART: Fatal Error: 0x90030001
28,890,237 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,040,248 >>> mbox cmd response: failed
29,040,878 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,190,817 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,101 UART:
190,390 UART: Running Caliptra ROM ...
191,417 UART:
11,347,914 UART: [state] CFI Enabled
11,364,905 UART: [state] LifecycleState = Unprovisioned
11,367,268 UART: [state] DebugLocked = No
11,369,960 UART: [state] WD Timer not started. Device not locked for debugging
11,374,479 UART: [kat] SHA2-256
11,564,370 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,575,124 UART: [kat] ++
11,575,850 UART: [kat] sha1
11,587,876 UART: [kat] SHA2-256
11,590,893 UART: [kat] SHA2-384
11,597,591 UART: [kat] SHA2-512-ACC
11,600,171 UART: [kat] ECC-384
14,042,747 UART: [kat] HMAC-384Kdf
14,055,679 UART: [kat] LMS
14,587,538 UART: [kat] --
14,591,794 UART: [cold-reset] ++
14,592,705 UART: [fht] FHT @ 0x50003400
14,604,230 UART: [idev] ++
14,604,946 UART: [idev] CDI.KEYID = 6
14,605,863 UART: [idev] SUBJECT.KEYID = 7
14,607,026 UART: [idev] UDS.KEYID = 0
14,608,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,758,331 UART: [idev] Erasing UDS.KEYID = 0
17,078,348 UART: [idev] Sha1 KeyId Algorithm
17,100,152 UART: [idev] --
17,104,637 UART: [ldev] ++
17,105,322 UART: [ldev] CDI.KEYID = 6
17,106,204 UART: [ldev] SUBJECT.KEYID = 5
17,107,421 UART: [ldev] AUTHORITY.KEYID = 7
17,108,597 UART: [ldev] FE.KEYID = 1
17,119,818 UART: [ldev] Erasing FE.KEYID = 1
19,598,241 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,315,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,330,795 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,345,969 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,361,078 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,381,419 UART: [ldev] --
21,386,468 UART: [fwproc] Wait for Commands...
21,388,316 UART: [fwproc] Recv command 0x46574c44
21,390,642 UART: [fwproc] Recv'd Img size: 119428 bytes
24,905,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,979,760 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,103,405 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,669,179 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,752,131 ready_for_fw is high
3,752,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,065,742 >>> mbox cmd response: success
19,323,595 UART:
19,323,997 UART: Running Caliptra FMC ...
19,325,151 UART:
19,325,315 UART: [state] CFI Enabled
19,333,465 UART: [fht] FMC Alias Private Key: 7
21,099,743 UART: [art] Extend RT PCRs Done
21,100,984 UART: [art] Lock RT PCRs Done
21,102,671 UART: [art] Populate DV Done
21,107,901 UART: [fht] FMC Alias Private Key: 7
21,109,448 UART: [art] Derive CDI
21,110,218 UART: [art] Store in slot 0x4
21,152,766 UART: [art] Derive Key Pair
21,153,815 UART: [art] Store priv key in slot 0x5
23,580,878 UART: [art] Derive Key Pair - Done
23,593,872 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,299,654 UART: [art] Erasing AUTHORITY.KEYID = 7
25,301,164 UART: [art] PUB.X = 7E50439024D2A80E0E179DF404205B88D8CB9870A9947FAD687C63C3D175E3F9425A9FE584BD9984BFCB30B0F80E6228
25,308,451 UART: [art] PUB.Y = 7A04F407923FFFA4A0707508170ADFB1C1811C51D7B6417E2E451A1B60F846C9C1A1654E6641AD6AE0592BE2285CCC27
25,315,671 UART: [art] SIG.R = DA0A4555BE92C883C53B6D3C2727C17FB80FC1DB1651B0FF06361CB077BE487CC577EC665A89B7A7DBD21B429253B054
25,323,053 UART: [art] SIG.S = D93953B9F812BFB595799D49E1BDE1CC3EA047A6B8425D6A827F742DFDC67A13C4A71CFD0482EE3C6650E2C98B9B7B5F
26,301,664 UART: Caliptra RT
26,302,374 UART: [state] CFI Enabled
26,434,232 UART: [rt] RT listening for mailbox commands...
26,436,097 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,465,740 UART: [rt]cmd =0x46504c54, len=4
26,467,383 >>> mbox cmd response data (8 bytes)
26,468,614 UART: [rt] FIPS self test
26,469,559 UART: [kat] ++
26,470,017 UART: [kat] sha1
26,474,592 UART: [kat] SHA2-256
26,476,474 UART: [kat] SHA2-384
26,479,437 UART: [kat] SHA2-512-ACC
26,481,678 UART: [kat] ECC-384
28,909,255 UART: [kat] HMAC-384Kdf
28,910,566 UART: Fatal Error: 0x90030001
28,945,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,096,052 >>> mbox cmd response: failed
29,096,737 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,246,617 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
14,438,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,751,098 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,622 UART: [state] LifecycleState = Unprovisioned
86,277 UART: [state] DebugLocked = No
86,843 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,367 UART: [kat] SHA2-256
882,298 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,413 UART: [kat] ++
886,565 UART: [kat] sha1
890,613 UART: [kat] SHA2-256
892,551 UART: [kat] SHA2-384
895,132 UART: [kat] SHA2-512-ACC
897,033 UART: [kat] ECC-384
902,828 UART: [kat] HMAC-384Kdf
907,516 UART: [kat] LMS
1,475,712 UART: [kat] --
1,476,665 UART: [cold-reset] ++
1,477,041 UART: [fht] Storing FHT @ 0x50003400
1,479,990 UART: [idev] ++
1,480,158 UART: [idev] CDI.KEYID = 6
1,480,518 UART: [idev] SUBJECT.KEYID = 7
1,480,942 UART: [idev] UDS.KEYID = 0
1,481,287 ready_for_fw is high
1,481,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,880 UART: [idev] Erasing UDS.KEYID = 0
1,504,646 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,116 UART: [idev] --
1,514,011 UART: [ldev] ++
1,514,179 UART: [ldev] CDI.KEYID = 6
1,514,542 UART: [ldev] SUBJECT.KEYID = 5
1,514,968 UART: [ldev] AUTHORITY.KEYID = 7
1,515,431 UART: [ldev] FE.KEYID = 1
1,520,869 UART: [ldev] Erasing FE.KEYID = 1
1,546,372 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,041 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,757 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,648 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,434 UART: [ldev] --
1,585,813 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 119428 bytes
2,942,831 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,479 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,697 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,462 >>> mbox cmd response: success
3,144,576 UART: [afmc] ++
3,144,744 UART: [afmc] CDI.KEYID = 6
3,145,106 UART: [afmc] SUBJECT.KEYID = 7
3,145,531 UART: [afmc] AUTHORITY.KEYID = 5
3,180,384 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,246 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,026 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,735 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,618 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,301 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,259 UART: [afmc] --
3,224,157 UART: [cold-reset] --
3,225,137 UART: [state] Locking Datavault
3,226,186 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,790 UART: [state] Locking ICCM
3,227,372 UART: [exit] Launching FMC @ 0x40000130
3,232,702 UART:
3,232,718 UART: Running Caliptra FMC ...
3,233,126 UART:
3,233,180 UART: [state] CFI Enabled
3,243,942 UART: [fht] FMC Alias Private Key: 7
3,362,866 UART: [art] Extend RT PCRs Done
3,363,294 UART: [art] Lock RT PCRs Done
3,364,860 UART: [art] Populate DV Done
3,372,821 UART: [fht] FMC Alias Private Key: 7
3,373,889 UART: [art] Derive CDI
3,374,169 UART: [art] Store in slot 0x4
3,459,821 UART: [art] Derive Key Pair
3,460,181 UART: [art] Store priv key in slot 0x5
3,473,368 UART: [art] Derive Key Pair - Done
3,487,751 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,326 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,091 UART: [art] PUB.X = F5C65D5BC628DBCF279607E9547C504FCC6AA5C012F16DCBC30928EF4D590AE556B184E210E8489C76D73601E840EEFF
3,510,861 UART: [art] PUB.Y = D71335FD50B5CDB0320AD4D68D0C22118AC9FD4044E5F23FEFFC7E4674F323A03F8758B16CF3E3373248586AC3C259E1
3,517,813 UART: [art] SIG.R = 0E4C38B9BBAEC74C7E6AC8A31F1E408FE40DC15FFBD2A652CF3BC73C582D5AD90850289E0A93B257C9CBAF87B6D6C55F
3,524,597 UART: [art] SIG.S = A6759B0C8116306746E78AD9522D4C296A421F0546085EC7784B5F7B4F1035238947F00787E0775A1882C0D4D28E5BA8
3,547,897 UART: Caliptra RT
3,548,148 UART: [state] CFI Enabled
3,668,018 UART: [rt] RT listening for mailbox commands...
3,668,681 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,850 UART: [rt]cmd =0x46504c54, len=4
3,700,044 >>> mbox cmd response data (8 bytes)
3,700,257 UART: [rt] FIPS self test
3,700,585 UART: [kat] ++
3,700,737 UART: [kat] sha1
3,704,999 UART: [kat] SHA2-256
3,707,021 UART: [kat] SHA2-384
3,709,954 UART: [kat] SHA2-512-ACC
3,711,881 UART: [kat] ECC-384
3,722,359 UART: [kat] HMAC-384Kdf
3,723,485 UART: Fatal Error: 0x90030001
3,725,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,029 >>> mbox cmd response: failed
3,725,029 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,725,034 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,028 UART: [state] LifecycleState = Unprovisioned
85,683 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,769 UART: [kat] SHA2-256
881,700 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,815 UART: [kat] ++
885,967 UART: [kat] sha1
890,297 UART: [kat] SHA2-256
892,235 UART: [kat] SHA2-384
894,822 UART: [kat] SHA2-512-ACC
896,723 UART: [kat] ECC-384
902,338 UART: [kat] HMAC-384Kdf
907,056 UART: [kat] LMS
1,475,252 UART: [kat] --
1,475,999 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,362 UART: [idev] ++
1,479,530 UART: [idev] CDI.KEYID = 6
1,479,890 UART: [idev] SUBJECT.KEYID = 7
1,480,314 UART: [idev] UDS.KEYID = 0
1,480,659 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,578 UART: [idev] Erasing UDS.KEYID = 0
1,505,594 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,078 UART: [idev] --
1,515,187 UART: [ldev] ++
1,515,355 UART: [ldev] CDI.KEYID = 6
1,515,718 UART: [ldev] SUBJECT.KEYID = 5
1,516,144 UART: [ldev] AUTHORITY.KEYID = 7
1,516,607 UART: [ldev] FE.KEYID = 1
1,522,023 UART: [ldev] Erasing FE.KEYID = 1
1,547,930 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,361 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,252 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,964 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,076 UART: [ldev] --
1,587,353 UART: [fwproc] Waiting for Commands...
1,587,970 UART: [fwproc] Received command 0x46574c44
1,588,761 UART: [fwproc] Received Image of size 119428 bytes
2,943,357 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,535 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,753 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,368 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.45s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,311 ready_for_fw is high
1,362,311 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,622 >>> mbox cmd response: success
3,053,151 UART:
3,053,167 UART: Running Caliptra FMC ...
3,053,575 UART:
3,053,629 UART: [state] CFI Enabled
3,064,043 UART: [fht] FMC Alias Private Key: 7
3,183,189 UART: [art] Extend RT PCRs Done
3,183,617 UART: [art] Lock RT PCRs Done
3,185,301 UART: [art] Populate DV Done
3,193,552 UART: [fht] FMC Alias Private Key: 7
3,194,720 UART: [art] Derive CDI
3,195,000 UART: [art] Store in slot 0x4
3,280,522 UART: [art] Derive Key Pair
3,280,882 UART: [art] Store priv key in slot 0x5
3,294,075 UART: [art] Derive Key Pair - Done
3,308,728 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,687 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,452 UART: [art] PUB.X = 081B26553236F340EFA29C215F2609A1E13211D19948C7976C8D458122856AF777D16D55397AA155A3BB369CDB3374EB
3,332,208 UART: [art] PUB.Y = 4D64126C6B1908E01693258C07FE4E5AD43AF71C84E24BA0CA8A2DD5808D60E92498D67DC492ED4689DF1FD2B66425C7
3,339,158 UART: [art] SIG.R = AA3840BA9EEBD71A7B483542BD143902D25E4B1D2C344E0E3A2B6F913F5E99D4DD1A37E787A5F1C568F9A831C4508875
3,345,930 UART: [art] SIG.S = 26A2F1319F3A0369DFB18E94152F33459A62BFBD86680CDE9B68AFDF0EEDF0E754240EEDAA3E92817FF8D6D866C6EB06
3,370,617 UART: Caliptra RT
3,370,868 UART: [state] CFI Enabled
3,491,220 UART: [rt] RT listening for mailbox commands...
3,491,883 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,574 UART: [rt]cmd =0x46504c54, len=4
3,522,750 >>> mbox cmd response data (8 bytes)
3,522,945 UART: [rt] FIPS self test
3,523,273 UART: [kat] ++
3,523,425 UART: [kat] sha1
3,527,761 UART: [kat] SHA2-256
3,529,783 UART: [kat] SHA2-384
3,532,512 UART: [kat] SHA2-512-ACC
3,534,439 UART: [kat] ECC-384
3,544,615 UART: [kat] HMAC-384Kdf
3,545,515 UART: Fatal Error: 0x90030001
3,547,054 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,059 >>> mbox cmd response: failed
3,547,059 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,064 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,004 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,585 UART: [state] LifecycleState = Unprovisioned
86,240 UART: [state] DebugLocked = No
86,752 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,230 UART: [kat] SHA2-256
882,161 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,276 UART: [kat] ++
886,428 UART: [kat] sha1
890,794 UART: [kat] SHA2-256
892,732 UART: [kat] SHA2-384
895,295 UART: [kat] SHA2-512-ACC
897,196 UART: [kat] ECC-384
902,837 UART: [kat] HMAC-384Kdf
907,481 UART: [kat] LMS
1,475,677 UART: [kat] --
1,476,498 UART: [cold-reset] ++
1,476,876 UART: [fht] Storing FHT @ 0x50003400
1,479,629 UART: [idev] ++
1,479,797 UART: [idev] CDI.KEYID = 6
1,480,157 UART: [idev] SUBJECT.KEYID = 7
1,480,581 UART: [idev] UDS.KEYID = 0
1,480,926 ready_for_fw is high
1,480,926 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,625 UART: [idev] Erasing UDS.KEYID = 0
1,505,225 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,935 UART: [idev] --
1,515,092 UART: [ldev] ++
1,515,260 UART: [ldev] CDI.KEYID = 6
1,515,623 UART: [ldev] SUBJECT.KEYID = 5
1,516,049 UART: [ldev] AUTHORITY.KEYID = 7
1,516,512 UART: [ldev] FE.KEYID = 1
1,521,832 UART: [ldev] Erasing FE.KEYID = 1
1,547,097 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,638 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,354 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,245 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,957 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,889 UART: [ldev] --
1,586,320 UART: [fwproc] Waiting for Commands...
1,587,047 UART: [fwproc] Received command 0x46574c44
1,587,838 UART: [fwproc] Received Image of size 119428 bytes
2,942,980 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,088 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,306 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,015 >>> mbox cmd response: success
3,145,247 UART: [afmc] ++
3,145,415 UART: [afmc] CDI.KEYID = 6
3,145,777 UART: [afmc] SUBJECT.KEYID = 7
3,146,202 UART: [afmc] AUTHORITY.KEYID = 5
3,181,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,635 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,415 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,124 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,007 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,690 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,522 UART: [afmc] --
3,224,552 UART: [cold-reset] --
3,225,382 UART: [state] Locking Datavault
3,226,759 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,363 UART: [state] Locking ICCM
3,227,825 UART: [exit] Launching FMC @ 0x40000130
3,233,155 UART:
3,233,171 UART: Running Caliptra FMC ...
3,233,579 UART:
3,233,722 UART: [state] CFI Enabled
3,244,310 UART: [fht] FMC Alias Private Key: 7
3,363,522 UART: [art] Extend RT PCRs Done
3,363,950 UART: [art] Lock RT PCRs Done
3,365,616 UART: [art] Populate DV Done
3,373,497 UART: [fht] FMC Alias Private Key: 7
3,374,577 UART: [art] Derive CDI
3,374,857 UART: [art] Store in slot 0x4
3,460,841 UART: [art] Derive Key Pair
3,461,201 UART: [art] Store priv key in slot 0x5
3,474,470 UART: [art] Derive Key Pair - Done
3,489,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,425 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,190 UART: [art] PUB.X = 5C5C48B73633BD82837FF3C2ADCBD164DDFA4205D14C0F4E7118963EA5C3F91D179452991FE90EBEF1E573E4C91A4CB2
3,511,965 UART: [art] PUB.Y = 8BE22607467CDC29F72939622DAA4D098D664477DF1374ED3292717EACD276645A43C302322FB8E4D0AA69201142C815
3,518,900 UART: [art] SIG.R = 4238D4213329B81B8DF7AECE7B1A8A7F967E1EE402E4180C957AA6998E41B5670B0C4223F2B25F3548A5685C4993EBE3
3,525,660 UART: [art] SIG.S = 7EAEF99EEDD6408A8658ED92AE7913D382C759A95D3458F4BF1DD612D2A2B28231DF8E50317FEFC397BC44EDCBB8505D
3,549,556 UART: Caliptra RT
3,549,899 UART: [state] CFI Enabled
3,668,330 UART: [rt] RT listening for mailbox commands...
3,668,993 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,722 UART: [rt]cmd =0x46504c54, len=4
3,699,986 >>> mbox cmd response data (8 bytes)
3,700,321 UART: [rt] FIPS self test
3,700,649 UART: [kat] ++
3,700,801 UART: [kat] sha1
3,704,991 UART: [kat] SHA2-256
3,707,013 UART: [kat] SHA2-384
3,709,672 UART: [kat] SHA2-512-ACC
3,711,599 UART: [kat] ECC-384
3,721,701 UART: [kat] HMAC-384Kdf
3,722,823 UART: Fatal Error: 0x90030001
3,724,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,367 >>> mbox cmd response: failed
3,724,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,724,372 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,848 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,358 UART: [kat] SHA2-256
882,289 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,404 UART: [kat] ++
886,556 UART: [kat] sha1
890,866 UART: [kat] SHA2-256
892,804 UART: [kat] SHA2-384
895,799 UART: [kat] SHA2-512-ACC
897,700 UART: [kat] ECC-384
903,671 UART: [kat] HMAC-384Kdf
908,319 UART: [kat] LMS
1,476,515 UART: [kat] --
1,477,698 UART: [cold-reset] ++
1,478,276 UART: [fht] Storing FHT @ 0x50003400
1,480,979 UART: [idev] ++
1,481,147 UART: [idev] CDI.KEYID = 6
1,481,507 UART: [idev] SUBJECT.KEYID = 7
1,481,931 UART: [idev] UDS.KEYID = 0
1,482,276 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,490,031 UART: [idev] Erasing UDS.KEYID = 0
1,506,901 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,625 UART: [idev] --
1,516,746 UART: [ldev] ++
1,516,914 UART: [ldev] CDI.KEYID = 6
1,517,277 UART: [ldev] SUBJECT.KEYID = 5
1,517,703 UART: [ldev] AUTHORITY.KEYID = 7
1,518,166 UART: [ldev] FE.KEYID = 1
1,523,628 UART: [ldev] Erasing FE.KEYID = 1
1,549,107 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,872 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,588 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,580,191 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,283 UART: [ldev] --
1,588,658 UART: [fwproc] Waiting for Commands...
1,589,447 UART: [fwproc] Received command 0x46574c44
1,590,238 UART: [fwproc] Received Image of size 119428 bytes
2,944,784 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,972,278 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,003,496 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,145,141 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,760 ready_for_fw is high
1,362,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,827 >>> mbox cmd response: success
3,054,206 UART:
3,054,222 UART: Running Caliptra FMC ...
3,054,630 UART:
3,054,773 UART: [state] CFI Enabled
3,065,275 UART: [fht] FMC Alias Private Key: 7
3,184,105 UART: [art] Extend RT PCRs Done
3,184,533 UART: [art] Lock RT PCRs Done
3,186,161 UART: [art] Populate DV Done
3,194,382 UART: [fht] FMC Alias Private Key: 7
3,195,510 UART: [art] Derive CDI
3,195,790 UART: [art] Store in slot 0x4
3,281,366 UART: [art] Derive Key Pair
3,281,726 UART: [art] Store priv key in slot 0x5
3,294,641 UART: [art] Derive Key Pair - Done
3,309,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,962 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,727 UART: [art] PUB.X = 0F8363463967D19219514E6C27F01C58DE92C70564436659E48C692957F4F12D5CA7F53307A03F7D8310DA1D63E49561
3,332,474 UART: [art] PUB.Y = 8A93D9D02B5DC4906E850312F25C3AECBBB7F143BADD84121F63B77051A6A134903BC4F51A4C030DBB8765401FC10429
3,339,418 UART: [art] SIG.R = DE10FE51853C511EA114522B5A505A46F65199F709F7A27EFA5568CBBB09EA0FDD96B13F1AC3F7AE48B35AF20131FA82
3,346,190 UART: [art] SIG.S = E7879915BD99C51C1B410B48A1388C78282C80834CA05503A224355E05E45917C5047CD75AA5EADADD26AB6237118A9B
3,370,004 UART: Caliptra RT
3,370,347 UART: [state] CFI Enabled
3,491,216 UART: [rt] RT listening for mailbox commands...
3,491,879 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,594 UART: [rt]cmd =0x46504c54, len=4
3,522,864 >>> mbox cmd response data (8 bytes)
3,523,151 UART: [rt] FIPS self test
3,523,479 UART: [kat] ++
3,523,631 UART: [kat] sha1
3,528,069 UART: [kat] SHA2-256
3,530,091 UART: [kat] SHA2-384
3,532,856 UART: [kat] SHA2-512-ACC
3,534,783 UART: [kat] ECC-384
3,544,679 UART: [kat] HMAC-384Kdf
3,545,601 UART: Fatal Error: 0x90030001
3,547,140 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,145 >>> mbox cmd response: failed
3,547,145 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,547,150 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,620 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,697 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,868 UART: [state] LifecycleState = Unprovisioned
85,523 UART: [state] DebugLocked = No
86,091 UART: [state] WD Timer not started. Device not locked for debugging
87,340 UART: [kat] SHA2-256
890,890 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,994 UART: [kat] ++
895,146 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
903,953 UART: [kat] SHA2-512-ACC
905,854 UART: [kat] ECC-384
915,459 UART: [kat] HMAC-384Kdf
919,825 UART: [kat] LMS
1,168,137 UART: [kat] --
1,169,272 UART: [cold-reset] ++
1,169,652 UART: [fht] FHT @ 0x50003400
1,172,278 UART: [idev] ++
1,172,446 UART: [idev] CDI.KEYID = 6
1,172,807 UART: [idev] SUBJECT.KEYID = 7
1,173,232 UART: [idev] UDS.KEYID = 0
1,173,578 ready_for_fw is high
1,173,578 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,069 UART: [idev] Erasing UDS.KEYID = 0
1,198,075 UART: [idev] Sha1 KeyId Algorithm
1,207,095 UART: [idev] --
1,208,226 UART: [ldev] ++
1,208,394 UART: [ldev] CDI.KEYID = 6
1,208,758 UART: [ldev] SUBJECT.KEYID = 5
1,209,185 UART: [ldev] AUTHORITY.KEYID = 7
1,209,648 UART: [ldev] FE.KEYID = 1
1,214,778 UART: [ldev] Erasing FE.KEYID = 1
1,240,985 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,040 UART: [ldev] --
1,280,473 UART: [fwproc] Wait for Commands...
1,281,284 UART: [fwproc] Recv command 0x46574c44
1,282,017 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,938 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,273 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,448 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,085 >>> mbox cmd response: success
2,838,223 UART: [afmc] ++
2,838,391 UART: [afmc] CDI.KEYID = 6
2,838,754 UART: [afmc] SUBJECT.KEYID = 7
2,839,180 UART: [afmc] AUTHORITY.KEYID = 5
2,874,247 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,094 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,843 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,553 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,434 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,135 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,050 UART: [afmc] --
2,917,873 UART: [cold-reset] --
2,918,809 UART: [state] Locking Datavault
2,920,070 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,674 UART: [state] Locking ICCM
2,921,126 UART: [exit] Launching FMC @ 0x40000130
2,926,456 UART:
2,926,472 UART: Running Caliptra FMC ...
2,926,880 UART:
2,926,934 UART: [state] CFI Enabled
2,937,554 UART: [fht] FMC Alias Private Key: 7
3,056,326 UART: [art] Extend RT PCRs Done
3,056,754 UART: [art] Lock RT PCRs Done
3,058,330 UART: [art] Populate DV Done
3,066,507 UART: [fht] FMC Alias Private Key: 7
3,067,543 UART: [art] Derive CDI
3,067,823 UART: [art] Store in slot 0x4
3,153,732 UART: [art] Derive Key Pair
3,154,092 UART: [art] Store priv key in slot 0x5
3,166,980 UART: [art] Derive Key Pair - Done
3,181,555 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,977 UART: [art] PUB.X = 492441983E7754B39A65F4D493F1A68246271D02FC0E5F4B424651C156C28F534E576A547017D696D2853219A521CB82
3,204,725 UART: [art] PUB.Y = 9D8A6EA21362473C09777D1CE51ACB9922E0F1063182814BC5B385EDBD4EEF0FC3ACB33FA8CA1C9154771F5185D97DCA
3,211,680 UART: [art] SIG.R = 7E501B7BF8ABBC5977933D6C38DB49B77BFAA828121E1C4BF48271A2AF498511B8BAA0B5D9688D220BF6228AB9BCA60B
3,218,460 UART: [art] SIG.S = 80A707B364FBD1E813F489769779F8F7A12F391735FA5B2C04222CDF912C6B7DB61B25FA5B60EE257BFD77429D632F6A
3,241,984 UART: Caliptra RT
3,242,235 UART: [state] CFI Enabled
3,362,246 UART: [rt] RT listening for mailbox commands...
3,362,909 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,978 UART: [rt]cmd =0x46504c54, len=4
3,394,230 >>> mbox cmd response data (8 bytes)
3,394,541 UART: [rt] FIPS self test
3,394,869 UART: [kat] ++
3,395,021 UART: [kat] sha1
3,399,259 UART: [kat] SHA2-256
3,401,281 UART: [kat] SHA2-384
3,404,082 UART: [kat] SHA2-512-ACC
3,406,009 UART: [kat] ECC-384
3,416,143 UART: [kat] HMAC-384Kdf
3,417,255 UART: Fatal Error: 0x90030001
3,418,794 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,799 >>> mbox cmd response: failed
3,418,799 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,418,804 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,360 UART: [state] LifecycleState = Unprovisioned
86,015 UART: [state] DebugLocked = No
86,631 UART: [state] WD Timer not started. Device not locked for debugging
87,920 UART: [kat] SHA2-256
891,470 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,574 UART: [kat] ++
895,726 UART: [kat] sha1
899,886 UART: [kat] SHA2-256
901,826 UART: [kat] SHA2-384
904,637 UART: [kat] SHA2-512-ACC
906,538 UART: [kat] ECC-384
916,459 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,218 UART: [cold-reset] ++
1,170,664 UART: [fht] FHT @ 0x50003400
1,173,294 UART: [idev] ++
1,173,462 UART: [idev] CDI.KEYID = 6
1,173,823 UART: [idev] SUBJECT.KEYID = 7
1,174,248 UART: [idev] UDS.KEYID = 0
1,174,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,429 UART: [idev] Erasing UDS.KEYID = 0
1,199,547 UART: [idev] Sha1 KeyId Algorithm
1,208,355 UART: [idev] --
1,209,380 UART: [ldev] ++
1,209,548 UART: [ldev] CDI.KEYID = 6
1,209,912 UART: [ldev] SUBJECT.KEYID = 5
1,210,339 UART: [ldev] AUTHORITY.KEYID = 7
1,210,802 UART: [ldev] FE.KEYID = 1
1,216,014 UART: [ldev] Erasing FE.KEYID = 1
1,241,787 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,562 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,274 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,488 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,344 UART: [fwproc] Recv command 0x46574c44
1,282,077 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,770 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,147 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,322 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,971 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,074 ready_for_fw is high
1,059,074 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,154 >>> mbox cmd response: success
2,750,631 UART:
2,750,647 UART: Running Caliptra FMC ...
2,751,055 UART:
2,751,109 UART: [state] CFI Enabled
2,761,373 UART: [fht] FMC Alias Private Key: 7
2,880,087 UART: [art] Extend RT PCRs Done
2,880,515 UART: [art] Lock RT PCRs Done
2,882,027 UART: [art] Populate DV Done
2,890,366 UART: [fht] FMC Alias Private Key: 7
2,891,412 UART: [art] Derive CDI
2,891,692 UART: [art] Store in slot 0x4
2,976,897 UART: [art] Derive Key Pair
2,977,257 UART: [art] Store priv key in slot 0x5
2,990,947 UART: [art] Derive Key Pair - Done
3,006,163 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,752 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,517 UART: [art] PUB.X = 347B653F8B47B92977690A7D5A2B6EC18EDF9F4E8D7971542714F8A697703F1A7D82C719074F5C0EB317E6A06BA2EEBF
3,029,284 UART: [art] PUB.Y = 143BB45BB74CA89485F878B149A6B323C569A54A51CEFEB18A0193B0B4D4939ACAA2C0444250850913DDCB4C40D5EFD0
3,036,238 UART: [art] SIG.R = 35521177097F24DE01150D0F595087A0B39630452AC76F9D42E241E6A428692F77F4F649A489EA5176DA4C8FBB7249C6
3,042,988 UART: [art] SIG.S = FD56A65CADFD3C8B29861296DE07B2D89B96430BF36F9FA6D997682CC6E3598B989BE7ACB0AEC3CC70350DAF84600EA2
3,066,754 UART: Caliptra RT
3,067,005 UART: [state] CFI Enabled
3,187,350 UART: [rt] RT listening for mailbox commands...
3,188,013 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,852 UART: [rt]cmd =0x46504c54, len=4
3,219,180 >>> mbox cmd response data (8 bytes)
3,219,343 UART: [rt] FIPS self test
3,219,671 UART: [kat] ++
3,219,823 UART: [kat] sha1
3,224,069 UART: [kat] SHA2-256
3,226,091 UART: [kat] SHA2-384
3,229,078 UART: [kat] SHA2-512-ACC
3,231,005 UART: [kat] ECC-384
3,241,173 UART: [kat] HMAC-384Kdf
3,242,317 UART: Fatal Error: 0x90030001
3,243,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,861 >>> mbox cmd response: failed
3,243,861 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,243,866 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,494 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,437 UART: [state] LifecycleState = Unprovisioned
86,092 UART: [state] DebugLocked = No
86,606 UART: [state] WD Timer not started. Device not locked for debugging
87,747 UART: [kat] SHA2-256
891,297 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,401 UART: [kat] ++
895,553 UART: [kat] sha1
899,695 UART: [kat] SHA2-256
901,635 UART: [kat] SHA2-384
904,504 UART: [kat] SHA2-512-ACC
906,405 UART: [kat] ECC-384
916,556 UART: [kat] HMAC-384Kdf
921,170 UART: [kat] LMS
1,169,482 UART: [kat] --
1,170,199 UART: [cold-reset] ++
1,170,737 UART: [fht] FHT @ 0x50003400
1,173,189 UART: [idev] ++
1,173,357 UART: [idev] CDI.KEYID = 6
1,173,718 UART: [idev] SUBJECT.KEYID = 7
1,174,143 UART: [idev] UDS.KEYID = 0
1,174,489 ready_for_fw is high
1,174,489 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,174 UART: [idev] Erasing UDS.KEYID = 0
1,199,164 UART: [idev] Sha1 KeyId Algorithm
1,208,042 UART: [idev] --
1,209,147 UART: [ldev] ++
1,209,315 UART: [ldev] CDI.KEYID = 6
1,209,679 UART: [ldev] SUBJECT.KEYID = 5
1,210,106 UART: [ldev] AUTHORITY.KEYID = 7
1,210,569 UART: [ldev] FE.KEYID = 1
1,216,025 UART: [ldev] Erasing FE.KEYID = 1
1,242,304 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,383 UART: [ldev] --
1,281,830 UART: [fwproc] Wait for Commands...
1,282,605 UART: [fwproc] Recv command 0x46574c44
1,283,338 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,811 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,564 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,739 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,274 >>> mbox cmd response: success
2,839,296 UART: [afmc] ++
2,839,464 UART: [afmc] CDI.KEYID = 6
2,839,827 UART: [afmc] SUBJECT.KEYID = 7
2,840,253 UART: [afmc] AUTHORITY.KEYID = 5
2,876,066 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,313 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,062 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,653 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,354 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,163 UART: [afmc] --
2,919,180 UART: [cold-reset] --
2,920,074 UART: [state] Locking Datavault
2,921,321 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,925 UART: [state] Locking ICCM
2,922,463 UART: [exit] Launching FMC @ 0x40000130
2,927,793 UART:
2,927,809 UART: Running Caliptra FMC ...
2,928,217 UART:
2,928,360 UART: [state] CFI Enabled
2,939,060 UART: [fht] FMC Alias Private Key: 7
3,058,262 UART: [art] Extend RT PCRs Done
3,058,690 UART: [art] Lock RT PCRs Done
3,060,600 UART: [art] Populate DV Done
3,068,547 UART: [fht] FMC Alias Private Key: 7
3,069,715 UART: [art] Derive CDI
3,069,995 UART: [art] Store in slot 0x4
3,155,670 UART: [art] Derive Key Pair
3,156,030 UART: [art] Store priv key in slot 0x5
3,169,802 UART: [art] Derive Key Pair - Done
3,184,771 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,316 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,081 UART: [art] PUB.X = D770A102DE23C590D242C46A6AB13F50622EB31AABD23384BB17343A964202235E092C0EBFAD0CEE09DD9958F3E183E0
3,207,841 UART: [art] PUB.Y = 78B5E4EC832A9466451B4E42B9CB690A3EA82E579003AC2457EFE76E527E5788B4D1E81375710B05F9328E6FE04349C9
3,214,777 UART: [art] SIG.R = 473FA49DBF13BBA8EE27B82E69D8C3CF9DED70A27BCB01ECA7D0565303832584C6F037324DEF0DA10651A9838BC94909
3,221,544 UART: [art] SIG.S = CFA358715E7F1871E6984C4FF95CB7FBA2AC5031AA6610194EC9F3FE0E53F489D6176104031EAECE59BE9BD97DFE9B71
3,244,845 UART: Caliptra RT
3,245,188 UART: [state] CFI Enabled
3,364,279 UART: [rt] RT listening for mailbox commands...
3,364,942 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,775 UART: [rt]cmd =0x46504c54, len=4
3,395,893 >>> mbox cmd response data (8 bytes)
3,396,138 UART: [rt] FIPS self test
3,396,466 UART: [kat] ++
3,396,618 UART: [kat] sha1
3,400,780 UART: [kat] SHA2-256
3,402,802 UART: [kat] SHA2-384
3,405,837 UART: [kat] SHA2-512-ACC
3,407,764 UART: [kat] ECC-384
3,417,962 UART: [kat] HMAC-384Kdf
3,419,080 UART: Fatal Error: 0x90030001
3,420,619 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,624 >>> mbox cmd response: failed
3,420,624 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,629 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,239 UART: [state] LifecycleState = Unprovisioned
85,894 UART: [state] DebugLocked = No
86,560 UART: [state] WD Timer not started. Device not locked for debugging
87,847 UART: [kat] SHA2-256
891,397 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,501 UART: [kat] ++
895,653 UART: [kat] sha1
899,799 UART: [kat] SHA2-256
901,739 UART: [kat] SHA2-384
904,510 UART: [kat] SHA2-512-ACC
906,411 UART: [kat] ECC-384
916,192 UART: [kat] HMAC-384Kdf
920,888 UART: [kat] LMS
1,169,200 UART: [kat] --
1,170,379 UART: [cold-reset] ++
1,170,773 UART: [fht] FHT @ 0x50003400
1,173,459 UART: [idev] ++
1,173,627 UART: [idev] CDI.KEYID = 6
1,173,988 UART: [idev] SUBJECT.KEYID = 7
1,174,413 UART: [idev] UDS.KEYID = 0
1,174,759 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,260 UART: [idev] Erasing UDS.KEYID = 0
1,199,462 UART: [idev] Sha1 KeyId Algorithm
1,208,332 UART: [idev] --
1,209,479 UART: [ldev] ++
1,209,647 UART: [ldev] CDI.KEYID = 6
1,210,011 UART: [ldev] SUBJECT.KEYID = 5
1,210,438 UART: [ldev] AUTHORITY.KEYID = 7
1,210,901 UART: [ldev] FE.KEYID = 1
1,216,155 UART: [ldev] Erasing FE.KEYID = 1
1,242,626 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,128 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,844 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,733 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,445 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,679 UART: [ldev] --
1,282,132 UART: [fwproc] Wait for Commands...
1,282,853 UART: [fwproc] Recv command 0x46574c44
1,283,586 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,471 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,864 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,039 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,558 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,351 ready_for_fw is high
1,059,351 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,877 >>> mbox cmd response: success
2,752,322 UART:
2,752,338 UART: Running Caliptra FMC ...
2,752,746 UART:
2,752,889 UART: [state] CFI Enabled
2,763,593 UART: [fht] FMC Alias Private Key: 7
2,882,109 UART: [art] Extend RT PCRs Done
2,882,537 UART: [art] Lock RT PCRs Done
2,884,135 UART: [art] Populate DV Done
2,892,470 UART: [fht] FMC Alias Private Key: 7
2,893,592 UART: [art] Derive CDI
2,893,872 UART: [art] Store in slot 0x4
2,979,917 UART: [art] Derive Key Pair
2,980,277 UART: [art] Store priv key in slot 0x5
2,993,665 UART: [art] Derive Key Pair - Done
3,008,400 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,457 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,222 UART: [art] PUB.X = FACCBB28E8D758B4A295B7A68DD749CFBE5316A030DA6710616CE583560A46BB329A8D77539ED1D3D2ABD5B674C74395
3,031,001 UART: [art] PUB.Y = 815001F909D382227D33989D657628C6FDCFC45461FC0A9B10F7FE7C64B3929E53EBB2BB5CCEDEBEA973D8AF78C27C60
3,037,956 UART: [art] SIG.R = 1DF9FAE8F4405F67186DBBF0DD4A8A29148A8AD007BD3379F637B4AB72E844695DC008393EF688093E63DDCD417234A0
3,044,725 UART: [art] SIG.S = E334D35E0C8A62C8CA25218F1314BF817B96CD56BCAF1F8FF96DE340ED9116C033AEC119B83A488B83D85F30F39B3448
3,068,608 UART: Caliptra RT
3,068,951 UART: [state] CFI Enabled
3,188,766 UART: [rt] RT listening for mailbox commands...
3,189,429 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,284 UART: [rt]cmd =0x46504c54, len=4
3,220,468 >>> mbox cmd response data (8 bytes)
3,220,733 UART: [rt] FIPS self test
3,221,061 UART: [kat] ++
3,221,213 UART: [kat] sha1
3,225,509 UART: [kat] SHA2-256
3,227,531 UART: [kat] SHA2-384
3,230,616 UART: [kat] SHA2-512-ACC
3,232,543 UART: [kat] ECC-384
3,242,607 UART: [kat] HMAC-384Kdf
3,243,769 UART: Fatal Error: 0x90030001
3,245,308 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,313 >>> mbox cmd response: failed
3,245,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,318 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,907 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.78s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,081 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,529 UART: [kat] SHA2-256
903,469 UART: [kat] SHA2-384
906,164 UART: [kat] SHA2-512-ACC
908,065 UART: [kat] ECC-384
917,616 UART: [kat] HMAC-384Kdf
922,234 UART: [kat] LMS
1,170,562 UART: [kat] --
1,171,473 UART: [cold-reset] ++
1,171,813 UART: [fht] FHT @ 0x50003400
1,174,476 UART: [idev] ++
1,174,644 UART: [idev] CDI.KEYID = 6
1,175,004 UART: [idev] SUBJECT.KEYID = 7
1,175,428 UART: [idev] UDS.KEYID = 0
1,175,773 ready_for_fw is high
1,175,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,418 UART: [idev] Erasing UDS.KEYID = 0
1,200,051 UART: [idev] Sha1 KeyId Algorithm
1,208,437 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,128 UART: [ldev] SUBJECT.KEYID = 5
1,210,554 UART: [ldev] AUTHORITY.KEYID = 7
1,211,017 UART: [ldev] FE.KEYID = 1
1,216,003 UART: [ldev] Erasing FE.KEYID = 1
1,242,200 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,747 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,463 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,354 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,066 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,414 UART: [fwproc] Wait for Commands...
1,282,114 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,868 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,038 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,751 >>> mbox cmd response: success
2,838,011 UART: [afmc] ++
2,838,179 UART: [afmc] CDI.KEYID = 6
2,838,541 UART: [afmc] SUBJECT.KEYID = 7
2,838,966 UART: [afmc] AUTHORITY.KEYID = 5
2,874,921 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,530 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,278 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,987 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,870 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,571 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,373 UART: [afmc] --
2,918,369 UART: [cold-reset] --
2,919,091 UART: [state] Locking Datavault
2,920,222 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,826 UART: [state] Locking ICCM
2,921,282 UART: [exit] Launching FMC @ 0x40000130
2,926,612 UART:
2,926,628 UART: Running Caliptra FMC ...
2,927,036 UART:
2,927,090 UART: [state] CFI Enabled
2,937,554 UART: [fht] FMC Alias Private Key: 7
3,057,024 UART: [art] Extend RT PCRs Done
3,057,452 UART: [art] Lock RT PCRs Done
3,059,054 UART: [art] Populate DV Done
3,067,235 UART: [fht] FMC Alias Private Key: 7
3,068,193 UART: [art] Derive CDI
3,068,473 UART: [art] Store in slot 0x4
3,154,364 UART: [art] Derive Key Pair
3,154,724 UART: [art] Store priv key in slot 0x5
3,168,466 UART: [art] Derive Key Pair - Done
3,183,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,843 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,608 UART: [art] PUB.X = 5B298B0B38DEA470C2912F7DF1B71FD5D2B37AD628B0E051AEB0BC9A562F6196F709BA7CF21E01354D9CF5BECE5A0A80
3,206,386 UART: [art] PUB.Y = 5EF8C4380D5FA55047D6F921BB9592430507B4DC38AD435C9BD092D0990E8656198F8C23888B3939E1B0CC016E515839
3,213,315 UART: [art] SIG.R = F284C02498A4BA2CDD60F6DBEBECB402863E31C75368B5E01C706F37D40FC09B9A4F2D66F0C2009926AE7737887FF38F
3,220,067 UART: [art] SIG.S = 41E61A859090F6826527C0DE380B3A172DEBEC7ACE6ED7E2E9786B0929AD3F35D70DB993C6850F53BF914DA3958F0B01
3,243,461 UART: Caliptra RT
3,243,712 UART: [state] CFI Enabled
3,363,601 UART: [rt] RT listening for mailbox commands...
3,364,264 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,101 UART: [rt]cmd =0x46504c54, len=4
3,395,327 >>> mbox cmd response data (8 bytes)
3,395,678 UART: [rt] FIPS self test
3,396,006 UART: [kat] ++
3,396,158 UART: [kat] sha1
3,400,224 UART: [kat] SHA2-256
3,402,246 UART: [kat] SHA2-384
3,405,129 UART: [kat] SHA2-512-ACC
3,407,056 UART: [kat] ECC-384
3,417,218 UART: [kat] HMAC-384Kdf
3,418,052 UART: Fatal Error: 0x90030001
3,419,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,596 >>> mbox cmd response: failed
3,419,596 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,419,601 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,180 UART: [state] LifecycleState = Unprovisioned
85,835 UART: [state] DebugLocked = No
86,567 UART: [state] WD Timer not started. Device not locked for debugging
87,734 UART: [kat] SHA2-256
893,384 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,509 UART: [kat] ++
897,661 UART: [kat] sha1
901,755 UART: [kat] SHA2-256
903,695 UART: [kat] SHA2-384
906,470 UART: [kat] SHA2-512-ACC
908,371 UART: [kat] ECC-384
917,934 UART: [kat] HMAC-384Kdf
922,416 UART: [kat] LMS
1,170,744 UART: [kat] --
1,171,673 UART: [cold-reset] ++
1,172,121 UART: [fht] FHT @ 0x50003400
1,174,808 UART: [idev] ++
1,174,976 UART: [idev] CDI.KEYID = 6
1,175,336 UART: [idev] SUBJECT.KEYID = 7
1,175,760 UART: [idev] UDS.KEYID = 0
1,176,105 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,996 UART: [idev] Erasing UDS.KEYID = 0
1,200,863 UART: [idev] Sha1 KeyId Algorithm
1,209,299 UART: [idev] --
1,210,513 UART: [ldev] ++
1,210,681 UART: [ldev] CDI.KEYID = 6
1,211,044 UART: [ldev] SUBJECT.KEYID = 5
1,211,470 UART: [ldev] AUTHORITY.KEYID = 7
1,211,933 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,243,608 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,473 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,189 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,080 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,792 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,785 UART: [ldev] --
1,283,288 UART: [fwproc] Wait for Commands...
1,283,952 UART: [fwproc] Recv command 0x46574c44
1,284,680 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,451 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,504 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,674 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,385 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,015 ready_for_fw is high
1,061,015 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,088 >>> mbox cmd response: success
2,753,541 UART:
2,753,557 UART: Running Caliptra FMC ...
2,753,965 UART:
2,754,019 UART: [state] CFI Enabled
2,764,381 UART: [fht] FMC Alias Private Key: 7
2,883,371 UART: [art] Extend RT PCRs Done
2,883,799 UART: [art] Lock RT PCRs Done
2,884,893 UART: [art] Populate DV Done
2,893,202 UART: [fht] FMC Alias Private Key: 7
2,894,206 UART: [art] Derive CDI
2,894,486 UART: [art] Store in slot 0x4
2,980,283 UART: [art] Derive Key Pair
2,980,643 UART: [art] Store priv key in slot 0x5
2,993,537 UART: [art] Derive Key Pair - Done
3,008,501 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,810 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,575 UART: [art] PUB.X = 5D301763A6D8A9641ABCA2223C863E0C92338CAC839F5F5009F4FFF3E4097F3844A6A7995BD05D3C9045F3162BEC1EBF
3,031,344 UART: [art] PUB.Y = B8E7A66EC790B3E71CE1197452FCBBFA4FED51570EB1B207425D7D4D178516342E6326CF514835C5B8854B8E9934515E
3,038,290 UART: [art] SIG.R = 7741BADB80082C5462EF7EF71120C3493F1AFA95BCBB01D10D1BF8C1E445ADB923888A53D4266877BAE85C0D37041879
3,045,051 UART: [art] SIG.S = F41CCFEBA6F9213510A6010C040CE3BD86FC1DD506098751C7740CA8163D7DB8B661C5993AAE149CED672062B262218D
3,069,164 UART: Caliptra RT
3,069,415 UART: [state] CFI Enabled
3,188,888 UART: [rt] RT listening for mailbox commands...
3,189,551 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,442 UART: [rt]cmd =0x46504c54, len=4
3,220,646 >>> mbox cmd response data (8 bytes)
3,220,933 UART: [rt] FIPS self test
3,221,261 UART: [kat] ++
3,221,413 UART: [kat] sha1
3,225,617 UART: [kat] SHA2-256
3,227,639 UART: [kat] SHA2-384
3,230,460 UART: [kat] SHA2-512-ACC
3,232,387 UART: [kat] ECC-384
3,242,259 UART: [kat] HMAC-384Kdf
3,243,301 UART: Fatal Error: 0x90030001
3,244,840 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,845 >>> mbox cmd response: failed
3,244,845 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,244,850 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,869 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,666 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,277 UART: [state] LifecycleState = Unprovisioned
85,932 UART: [state] DebugLocked = No
86,438 UART: [state] WD Timer not started. Device not locked for debugging
87,571 UART: [kat] SHA2-256
893,221 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,346 UART: [kat] ++
897,498 UART: [kat] sha1
901,594 UART: [kat] SHA2-256
903,534 UART: [kat] SHA2-384
906,407 UART: [kat] SHA2-512-ACC
908,308 UART: [kat] ECC-384
917,719 UART: [kat] HMAC-384Kdf
922,177 UART: [kat] LMS
1,170,505 UART: [kat] --
1,171,672 UART: [cold-reset] ++
1,172,166 UART: [fht] FHT @ 0x50003400
1,174,803 UART: [idev] ++
1,174,971 UART: [idev] CDI.KEYID = 6
1,175,331 UART: [idev] SUBJECT.KEYID = 7
1,175,755 UART: [idev] UDS.KEYID = 0
1,176,100 ready_for_fw is high
1,176,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,697 UART: [idev] Erasing UDS.KEYID = 0
1,201,108 UART: [idev] Sha1 KeyId Algorithm
1,209,528 UART: [idev] --
1,210,528 UART: [ldev] ++
1,210,696 UART: [ldev] CDI.KEYID = 6
1,211,059 UART: [ldev] SUBJECT.KEYID = 5
1,211,485 UART: [ldev] AUTHORITY.KEYID = 7
1,211,948 UART: [ldev] FE.KEYID = 1
1,217,046 UART: [ldev] Erasing FE.KEYID = 1
1,243,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,116 UART: [ldev] --
1,282,565 UART: [fwproc] Wait for Commands...
1,283,305 UART: [fwproc] Recv command 0x46574c44
1,284,033 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,556 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,947 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,117 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,698 >>> mbox cmd response: success
2,838,780 UART: [afmc] ++
2,838,948 UART: [afmc] CDI.KEYID = 6
2,839,310 UART: [afmc] SUBJECT.KEYID = 7
2,839,735 UART: [afmc] AUTHORITY.KEYID = 5
2,875,956 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,441 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,189 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,781 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,482 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,386 UART: [afmc] --
2,919,466 UART: [cold-reset] --
2,920,304 UART: [state] Locking Datavault
2,921,303 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,907 UART: [state] Locking ICCM
2,922,555 UART: [exit] Launching FMC @ 0x40000130
2,927,885 UART:
2,927,901 UART: Running Caliptra FMC ...
2,928,309 UART:
2,928,452 UART: [state] CFI Enabled
2,938,770 UART: [fht] FMC Alias Private Key: 7
3,057,740 UART: [art] Extend RT PCRs Done
3,058,168 UART: [art] Lock RT PCRs Done
3,059,680 UART: [art] Populate DV Done
3,067,907 UART: [fht] FMC Alias Private Key: 7
3,069,083 UART: [art] Derive CDI
3,069,363 UART: [art] Store in slot 0x4
3,155,046 UART: [art] Derive Key Pair
3,155,406 UART: [art] Store priv key in slot 0x5
3,168,482 UART: [art] Derive Key Pair - Done
3,183,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,572 UART: [art] PUB.X = 2E239A901D162175A135171FC3C68B1C0C72F1923E66C9D929C531FB18025D4C20D7F37CEAFE3C7024C2A9633E0123CE
3,206,335 UART: [art] PUB.Y = 859477B04DC0B54BF0BC8458951E4D64D7962B9C6477950CBC86A14BCDD379991F03FA4069E9C42F9F47500DD82FC20F
3,213,277 UART: [art] SIG.R = 55AD4C055D55153B58D3A3425FAEF07052D2E53D76774B9D6728313900B567126B7283399E4577FB7C29CE3E05A77FE6
3,220,013 UART: [art] SIG.S = 3BA845B06C6A7A34BB49CECDE3A1715F40E4BBD3BA9955F5D6A94D77E9FA28B55F01D15AD075BF274EC8EB084A6BCEF4
3,243,685 UART: Caliptra RT
3,244,028 UART: [state] CFI Enabled
3,364,292 UART: [rt] RT listening for mailbox commands...
3,364,955 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,878 UART: [rt]cmd =0x46504c54, len=4
3,396,036 >>> mbox cmd response data (8 bytes)
3,396,161 UART: [rt] FIPS self test
3,396,489 UART: [kat] ++
3,396,641 UART: [kat] sha1
3,400,687 UART: [kat] SHA2-256
3,402,709 UART: [kat] SHA2-384
3,405,630 UART: [kat] SHA2-512-ACC
3,407,557 UART: [kat] ECC-384
3,417,825 UART: [kat] HMAC-384Kdf
3,418,743 UART: Fatal Error: 0x90030001
3,420,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,287 >>> mbox cmd response: failed
3,420,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,292 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,887 UART: [state] LifecycleState = Unprovisioned
86,542 UART: [state] DebugLocked = No
87,114 UART: [state] WD Timer not started. Device not locked for debugging
88,247 UART: [kat] SHA2-256
893,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,022 UART: [kat] ++
898,174 UART: [kat] sha1
902,596 UART: [kat] SHA2-256
904,536 UART: [kat] SHA2-384
907,255 UART: [kat] SHA2-512-ACC
909,156 UART: [kat] ECC-384
918,695 UART: [kat] HMAC-384Kdf
923,283 UART: [kat] LMS
1,171,611 UART: [kat] --
1,172,364 UART: [cold-reset] ++
1,172,876 UART: [fht] FHT @ 0x50003400
1,175,489 UART: [idev] ++
1,175,657 UART: [idev] CDI.KEYID = 6
1,176,017 UART: [idev] SUBJECT.KEYID = 7
1,176,441 UART: [idev] UDS.KEYID = 0
1,176,786 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,175 UART: [idev] Erasing UDS.KEYID = 0
1,201,206 UART: [idev] Sha1 KeyId Algorithm
1,209,694 UART: [idev] --
1,210,646 UART: [ldev] ++
1,210,814 UART: [ldev] CDI.KEYID = 6
1,211,177 UART: [ldev] SUBJECT.KEYID = 5
1,211,603 UART: [ldev] AUTHORITY.KEYID = 7
1,212,066 UART: [ldev] FE.KEYID = 1
1,217,658 UART: [ldev] Erasing FE.KEYID = 1
1,244,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,009 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,721 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,872 UART: [ldev] --
1,283,197 UART: [fwproc] Wait for Commands...
1,283,811 UART: [fwproc] Recv command 0x46574c44
1,284,539 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,954 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,365 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,535 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,146 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,906 ready_for_fw is high
1,060,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,783 >>> mbox cmd response: success
2,753,200 UART:
2,753,216 UART: Running Caliptra FMC ...
2,753,624 UART:
2,753,767 UART: [state] CFI Enabled
2,764,631 UART: [fht] FMC Alias Private Key: 7
2,883,743 UART: [art] Extend RT PCRs Done
2,884,171 UART: [art] Lock RT PCRs Done
2,885,531 UART: [art] Populate DV Done
2,894,048 UART: [fht] FMC Alias Private Key: 7
2,895,210 UART: [art] Derive CDI
2,895,490 UART: [art] Store in slot 0x4
2,981,185 UART: [art] Derive Key Pair
2,981,545 UART: [art] Store priv key in slot 0x5
2,994,581 UART: [art] Derive Key Pair - Done
3,009,447 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,542 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,307 UART: [art] PUB.X = C47BF6749996DA6CEB82C66BC4761F9EE53179EDC486D0CEB918359EFEDE977307EF19FC95B8B379B78E8BD6657130A8
3,032,086 UART: [art] PUB.Y = F54DBEACF4912807EBD1DBA7CD5E2195D16DE12D218207808573DB652CCDF0A49FA47E5F810FAF4419DF1B89432A7F2D
3,039,045 UART: [art] SIG.R = FCCB2FA0F087FE852111E3DF4246DAA05B9BAEAEFA2BFB2927B4757F83A6FAF735CB3DFE424E76DF75D86B6C72162950
3,045,839 UART: [art] SIG.S = 367F013690BA266EA7A4051FEF87F6D89EC0916917D6B6408FC0B44C0D71B5B2B85B590B406CE3C6DF37DEDA7381067B
3,069,694 UART: Caliptra RT
3,070,037 UART: [state] CFI Enabled
3,189,438 UART: [rt] RT listening for mailbox commands...
3,190,101 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,058 UART: [rt]cmd =0x46504c54, len=4
3,221,200 >>> mbox cmd response data (8 bytes)
3,221,379 UART: [rt] FIPS self test
3,221,707 UART: [kat] ++
3,221,859 UART: [kat] sha1
3,226,243 UART: [kat] SHA2-256
3,228,265 UART: [kat] SHA2-384
3,231,062 UART: [kat] SHA2-512-ACC
3,232,989 UART: [kat] ECC-384
3,242,881 UART: [kat] HMAC-384Kdf
3,243,689 UART: Fatal Error: 0x90030001
3,245,228 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,233 >>> mbox cmd response: failed
3,245,233 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,245,238 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,024 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,253 >>> mbox cmd response: success
test self_tests::kat_hmac384_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
5,175,146 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,324,949 >>> mbox cmd response: failed
5,325,525 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,474,390 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,427,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,266,932 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,005 writing to cptra_bootfsm_go
5,182,580 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,332,351 >>> mbox cmd response: failed
5,332,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,482,477 >>> mbox cmd response: failed
Initializing fuses
1,158 writing to cptra_bootfsm_go
3,443,905 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,271,511 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,450 writing to cptra_bootfsm_go
5,519,675 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,669,758 >>> mbox cmd response: failed
5,670,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,819,220 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
17,811,309 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,531,039 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
5,507,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,657,018 >>> mbox cmd response: failed
5,657,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,806,423 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,841,345 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,550,624 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,044 writing to cptra_bootfsm_go
5,178,385 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,328,195 >>> mbox cmd response: failed
5,328,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,477,679 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,430,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,557 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
5,184,080 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,333,899 >>> mbox cmd response: failed
5,334,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,483,187 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
3,446,871 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,834 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
5,522,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,672,717 >>> mbox cmd response: failed
5,673,495 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,822,366 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
17,806,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,524,499 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,259 writing to cptra_bootfsm_go
5,525,139 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,674,932 >>> mbox cmd response: failed
5,675,486 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,824,344 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
17,814,770 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,531,556 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,600 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,608 >>> mbox cmd response: failed
830,608 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,614 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,833 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,440 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,270 >>> mbox cmd response: failed
830,270 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,276 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,713 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,396 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,679 >>> mbox cmd response: failed
830,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,685 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,792 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,770 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
830,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,501 >>> mbox cmd response: failed
830,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
830,507 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,855 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
829,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
829,816 >>> mbox cmd response: failed
829,816 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
829,822 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,268 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
829,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
829,836 >>> mbox cmd response: failed
829,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
829,842 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,468 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,113 >>> mbox cmd response: failed
831,113 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,119 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,138 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,375 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
831,281 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,289 >>> mbox cmd response: failed
831,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
831,295 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,079 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.65s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,904 writing to cptra_bootfsm_go
192,057 UART:
192,417 UART: Running Caliptra ROM ...
193,507 UART:
193,651 UART: [state] CFI Enabled
261,550 UART: [state] LifecycleState = Unprovisioned
263,553 UART: [state] DebugLocked = No
265,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
270,815 UART: [kat] SHA2-256
440,501 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,022 UART: [kat] ++
451,477 UART: [kat] sha1
461,810 UART: [kat] SHA2-256
464,543 UART: [kat] SHA2-384
470,683 UART: [kat] SHA2-512-ACC
473,056 UART: [kat] ECC-384
2,757,775 UART: [kat] HMAC-384Kdf
2,768,659 UART: [kat] LMS
3,958,934 UART: [kat] --
3,963,383 UART: [cold-reset] ++
3,965,963 UART: [fht] Storing FHT @ 0x50003400
3,976,528 UART: [idev] ++
3,977,185 UART: [idev] CDI.KEYID = 6
3,978,075 UART: [idev] SUBJECT.KEYID = 7
3,979,327 UART: [idev] UDS.KEYID = 0
3,980,304 ready_for_fw is high
3,980,537 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,130,808 UART: [idev] Erasing UDS.KEYID = 0
7,311,771 UART: [idev] Using Sha1 for KeyId Algorithm
7,333,416 UART: [idev] --
7,338,467 UART: [ldev] ++
7,339,046 UART: [ldev] CDI.KEYID = 6
7,339,938 UART: [ldev] SUBJECT.KEYID = 5
7,341,209 UART: [ldev] AUTHORITY.KEYID = 7
7,342,446 UART: [ldev] FE.KEYID = 1
7,389,908 UART: [ldev] Erasing FE.KEYID = 1
10,721,024 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,028,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,043,261 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,058,067 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,072,633 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,748 UART: [ldev] --
13,094,794 UART: [fwproc] Waiting for Commands...
13,097,600 UART: [fwproc] Received command 0x46574c44
13,099,790 UART: [fwproc] Received Image of size 119428 bytes
17,218,351 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,296,365 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,369,550 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,701,554 >>> mbox cmd response: success
17,705,223 UART: [afmc] ++
17,705,807 UART: [afmc] CDI.KEYID = 6
17,706,751 UART: [afmc] SUBJECT.KEYID = 7
17,708,020 UART: [afmc] AUTHORITY.KEYID = 5
21,075,502 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,741 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,055 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,479 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,176 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,587 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,693 UART: [afmc] --
23,447,042 UART: [cold-reset] --
23,451,552 UART: [state] Locking Datavault
23,457,614 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,367 UART: [state] Locking ICCM
23,460,764 UART: [exit] Launching FMC @ 0x40000130
23,469,159 UART:
23,469,394 UART: Running Caliptra FMC ...
23,470,499 UART:
23,470,662 UART: [state] CFI Enabled
23,533,618 UART: [fht] FMC Alias Private Key: 7
25,873,869 UART: [art] Extend RT PCRs Done
25,875,093 UART: [art] Lock RT PCRs Done
25,876,775 UART: [art] Populate DV Done
25,882,222 UART: [fht] FMC Alias Private Key: 7
25,883,730 UART: [art] Derive CDI
25,884,493 UART: [art] Store in slot 0x4
25,943,104 UART: [art] Derive Key Pair
25,944,106 UART: [art] Store priv key in slot 0x5
29,236,919 UART: [art] Derive Key Pair - Done
29,249,940 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,537,898 UART: [art] Erasing AUTHORITY.KEYID = 7
31,539,413 UART: [art] PUB.X = 89D602275C8B06A18625C9CDE79254CAA590F4341C42E6B52A860E653B7D6DF2C35C73CD38B33BC51CC75BF83B6D8AAA
31,546,695 UART: [art] PUB.Y = CA86D8A53A6C688D6B447D85892189845CFED83288AB175C36E699AD6437C684D5C3DEE6999C8DFEEB94321E661D05BE
31,553,953 UART: [art] SIG.R = C1ADBEC5B60B6E3F92F116421625B2ECB496AA30F27DCB900A841429BFCB7ADDEB5A8E5C154308B41BB42F47826F9824
31,561,413 UART: [art] SIG.S = 2C353C923CD2E8B032A051745672BA89E800239732186C953C712D4FBE75D0FD962818F83B3ED80C3BDCD0902EDA84B7
32,866,435 UART: Caliptra RT
32,867,176 UART: [state] CFI Enabled
33,044,890 UART: [rt] RT listening for mailbox commands...
33,046,752 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,076,549 UART: [rt]cmd =0x46504c54, len=4
33,078,218 >>> mbox cmd response data (8 bytes)
33,079,366 UART: [rt] FIPS self test
33,080,319 UART: [kat] ++
33,080,778 UART: [kat] sha1
33,085,075 UART: [kat] SHA2-256
33,087,017 UART: [kat] SHA2-384
33,089,821 UART: [kat] SHA2-512-ACC
33,092,115 UART: [kat] ECC-384
36,365,271 UART: [kat] HMAC-384Kdf
36,372,804 UART: Fatal Error: 0x90030002
36,407,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,558,008 >>> mbox cmd response: failed
36,558,674 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,708,623 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
190,100 UART:
190,385 UART: Running Caliptra ROM ...
191,497 UART:
191,648 UART: [state] CFI Enabled
252,241 UART: [state] LifecycleState = Unprovisioned
254,163 UART: [state] DebugLocked = No
255,661 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
261,142 UART: [kat] SHA2-256
430,850 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
441,365 UART: [kat] ++
441,812 UART: [kat] sha1
453,659 UART: [kat] SHA2-256
456,345 UART: [kat] SHA2-384
463,254 UART: [kat] SHA2-512-ACC
465,601 UART: [kat] ECC-384
2,753,672 UART: [kat] HMAC-384Kdf
2,765,905 UART: [kat] LMS
3,956,216 UART: [kat] --
3,960,502 UART: [cold-reset] ++
3,962,065 UART: [fht] Storing FHT @ 0x50003400
3,971,878 UART: [idev] ++
3,972,486 UART: [idev] CDI.KEYID = 6
3,973,405 UART: [idev] SUBJECT.KEYID = 7
3,974,628 UART: [idev] UDS.KEYID = 0
3,976,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,126,251 UART: [idev] Erasing UDS.KEYID = 0
7,310,890 UART: [idev] Using Sha1 for KeyId Algorithm
7,333,769 UART: [idev] --
7,337,975 UART: [ldev] ++
7,338,559 UART: [ldev] CDI.KEYID = 6
7,339,529 UART: [ldev] SUBJECT.KEYID = 5
7,340,749 UART: [ldev] AUTHORITY.KEYID = 7
7,341,984 UART: [ldev] FE.KEYID = 1
7,389,513 UART: [ldev] Erasing FE.KEYID = 1
10,725,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,036,586 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,051,172 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,066,021 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,080,542 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,099,625 UART: [ldev] --
13,104,911 UART: [fwproc] Waiting for Commands...
13,107,988 UART: [fwproc] Received command 0x46574c44
13,110,177 UART: [fwproc] Received Image of size 119428 bytes
17,228,748 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,069 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,258 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,708,148 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,954 writing to cptra_bootfsm_go
3,804,924 ready_for_fw is high
3,805,384 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,995,756 >>> mbox cmd response: success
23,678,328 UART:
23,678,775 UART: Running Caliptra FMC ...
23,679,899 UART:
23,680,065 UART: [state] CFI Enabled
23,749,802 UART: [fht] FMC Alias Private Key: 7
26,090,131 UART: [art] Extend RT PCRs Done
26,091,384 UART: [art] Lock RT PCRs Done
26,093,151 UART: [art] Populate DV Done
26,098,659 UART: [fht] FMC Alias Private Key: 7
26,100,262 UART: [art] Derive CDI
26,101,098 UART: [art] Store in slot 0x4
26,150,417 UART: [art] Derive Key Pair
26,151,418 UART: [art] Store priv key in slot 0x5
29,443,934 UART: [art] Derive Key Pair - Done
29,456,820 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,479 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,992 UART: [art] PUB.X = 86A5F9765D32E4176F913C2169942F64B80A6792BE179A50680F7608B14528B59CDB42A8FA1AC57A66CCA4FDAC8466CB
31,755,334 UART: [art] PUB.Y = 9D3DE89CAB21F10BA1FADE98AAD6349D3B1D0F4F42B93D6EA4F9571D3605774950CD5D2790AD6A0A2BEB67AF9B60F207
31,762,554 UART: [art] SIG.R = 04FD5B2A334375CB32C8DAD67988711F937139633199E5B49C930EA3CB8169370E4F6A7FC5FCA2374747A68DBFFA2D3B
31,769,935 UART: [art] SIG.S = D459BC8AC5AE8441BC1C608BAEFEAC1782C35003BF3B0374B7384CBCA091F108359BD38DC2007D2860CC6BB7302ED547
33,075,238 UART: Caliptra RT
33,075,981 UART: [state] CFI Enabled
33,253,026 UART: [rt] RT listening for mailbox commands...
33,254,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,284,662 UART: [rt]cmd =0x46504c54, len=4
33,286,242 >>> mbox cmd response data (8 bytes)
33,287,520 UART: [rt] FIPS self test
33,288,502 UART: [kat] ++
33,288,965 UART: [kat] sha1
33,293,264 UART: [kat] SHA2-256
33,295,143 UART: [kat] SHA2-384
33,298,104 UART: [kat] SHA2-512-ACC
33,300,394 UART: [kat] ECC-384
36,574,067 UART: [kat] HMAC-384Kdf
36,581,282 UART: Fatal Error: 0x90030002
36,616,463 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,766,439 >>> mbox cmd response: failed
36,767,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,917,063 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,791,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,992,805 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,522 UART:
193,192 UART: Running Caliptra ROM ...
194,500 UART:
603,706 UART: [state] CFI Enabled
615,374 UART: [state] LifecycleState = Unprovisioned
617,323 UART: [state] DebugLocked = No
619,062 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,579 UART: [kat] SHA2-256
794,321 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
804,906 UART: [kat] ++
805,377 UART: [kat] sha1
814,981 UART: [kat] SHA2-256
817,720 UART: [kat] SHA2-384
823,794 UART: [kat] SHA2-512-ACC
826,171 UART: [kat] ECC-384
3,109,134 UART: [kat] HMAC-384Kdf
3,121,219 UART: [kat] LMS
4,311,340 UART: [kat] --
4,317,289 UART: [cold-reset] ++
4,318,670 UART: [fht] Storing FHT @ 0x50003400
4,329,877 UART: [idev] ++
4,330,451 UART: [idev] CDI.KEYID = 6
4,331,341 UART: [idev] SUBJECT.KEYID = 7
4,332,596 UART: [idev] UDS.KEYID = 0
4,333,675 ready_for_fw is high
4,333,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,012 UART: [idev] Erasing UDS.KEYID = 0
7,617,822 UART: [idev] Using Sha1 for KeyId Algorithm
7,639,933 UART: [idev] --
7,644,030 UART: [ldev] ++
7,644,623 UART: [ldev] CDI.KEYID = 6
7,645,597 UART: [ldev] SUBJECT.KEYID = 5
7,646,822 UART: [ldev] AUTHORITY.KEYID = 7
7,648,064 UART: [ldev] FE.KEYID = 1
7,660,291 UART: [ldev] Erasing FE.KEYID = 1
10,948,509 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,239,384 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,253,967 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,268,820 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,283,328 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,302,602 UART: [ldev] --
13,307,066 UART: [fwproc] Waiting for Commands...
13,310,446 UART: [fwproc] Received command 0x46574c44
13,312,644 UART: [fwproc] Received Image of size 119428 bytes
17,430,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,509,457 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,647 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,914,125 >>> mbox cmd response: success
17,918,820 UART: [afmc] ++
17,919,410 UART: [afmc] CDI.KEYID = 6
17,920,325 UART: [afmc] SUBJECT.KEYID = 7
17,921,550 UART: [afmc] AUTHORITY.KEYID = 5
21,236,351 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,070 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,337 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,546,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,561,469 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,575,909 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,596,396 UART: [afmc] --
23,600,484 UART: [cold-reset] --
23,604,136 UART: [state] Locking Datavault
23,610,529 UART: [state] Locking PCR0, PCR1 and PCR31
23,612,293 UART: [state] Locking ICCM
23,614,665 UART: [exit] Launching FMC @ 0x40000130
23,623,067 UART:
23,623,314 UART: Running Caliptra FMC ...
23,624,427 UART:
23,624,598 UART: [state] CFI Enabled
23,632,663 UART: [fht] FMC Alias Private Key: 7
25,972,798 UART: [art] Extend RT PCRs Done
25,974,018 UART: [art] Lock RT PCRs Done
25,975,594 UART: [art] Populate DV Done
25,981,012 UART: [fht] FMC Alias Private Key: 7
25,982,721 UART: [art] Derive CDI
25,983,557 UART: [art] Store in slot 0x4
26,025,835 UART: [art] Derive Key Pair
26,026,846 UART: [art] Store priv key in slot 0x5
29,268,336 UART: [art] Derive Key Pair - Done
29,281,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,646 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,147 UART: [art] PUB.X = 6E81B8B5D992F3419F96D0F6CC54C39B4679A9E100AD33EB4E48E2591AF22A5C262BBF4AFE7095FCC3FE9B75E478D73D
31,570,405 UART: [art] PUB.Y = 5D73D8B56D906B75CFB81BFDE1FEC89A10BF48A4EAC715A34C3CF54FFB5D6B8C9D49DBFD7ECAAEB9CE8669135BA50426
31,577,712 UART: [art] SIG.R = 0CE4327DF5C476EA63DDA465B5119BA1CF3F3A0959450AC5A1A6CE1CAC0589BC2E79794719176601DA352C4FE8E142C5
31,585,123 UART: [art] SIG.S = 39C4FAB4D4881EC6E399F0F230BA364666A04CE59C6E0E983229FA70F4DF3B67F4331D8E8AB6791FD1ED7E649906C460
32,890,220 UART: Caliptra RT
32,890,937 UART: [state] CFI Enabled
33,024,598 UART: [rt] RT listening for mailbox commands...
33,026,467 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,039 UART: [rt]cmd =0x46504c54, len=4
33,057,630 >>> mbox cmd response data (8 bytes)
33,058,576 UART: [rt] FIPS self test
33,059,535 UART: [kat] ++
33,059,998 UART: [kat] sha1
33,064,246 UART: [kat] SHA2-256
33,066,143 UART: [kat] SHA2-384
33,069,006 UART: [kat] SHA2-512-ACC
33,071,256 UART: [kat] ECC-384
36,313,930 UART: [kat] HMAC-384Kdf
36,319,467 UART: Fatal Error: 0x90030002
36,354,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,504,760 >>> mbox cmd response: failed
36,505,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,655,317 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,114 UART:
190,436 UART: Running Caliptra ROM ...
191,555 UART:
3,881,454 UART: [state] CFI Enabled
3,898,514 UART: [state] LifecycleState = Unprovisioned
3,900,429 UART: [state] DebugLocked = No
3,902,149 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,907,646 UART: [kat] SHA2-256
4,077,436 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
4,087,972 UART: [kat] ++
4,088,522 UART: [kat] sha1
4,099,148 UART: [kat] SHA2-256
4,101,884 UART: [kat] SHA2-384
4,107,667 UART: [kat] SHA2-512-ACC
4,110,082 UART: [kat] ECC-384
6,394,835 UART: [kat] HMAC-384Kdf
6,407,718 UART: [kat] LMS
7,597,839 UART: [kat] --
7,603,351 UART: [cold-reset] ++
7,604,587 UART: [fht] Storing FHT @ 0x50003400
7,615,920 UART: [idev] ++
7,616,491 UART: [idev] CDI.KEYID = 6
7,617,596 UART: [idev] SUBJECT.KEYID = 7
7,618,656 UART: [idev] UDS.KEYID = 0
7,620,230 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
7,769,973 UART: [idev] Erasing UDS.KEYID = 0
10,902,237 UART: [idev] Using Sha1 for KeyId Algorithm
10,924,397 UART: [idev] --
10,928,550 UART: [ldev] ++
10,929,123 UART: [ldev] CDI.KEYID = 6
10,930,094 UART: [ldev] SUBJECT.KEYID = 5
10,931,260 UART: [ldev] AUTHORITY.KEYID = 7
10,932,548 UART: [ldev] FE.KEYID = 1
10,945,432 UART: [ldev] Erasing FE.KEYID = 1
14,236,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
16,528,867 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
16,543,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
16,558,243 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
16,572,749 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
16,593,074 UART: [ldev] --
16,597,602 UART: [fwproc] Waiting for Commands...
16,600,142 UART: [fwproc] Received command 0x46574c44
16,602,344 UART: [fwproc] Received Image of size 119428 bytes
20,718,896 UART: [fwproc] Image verified using Vendor ECC Key Index 0
20,796,596 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,869,792 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
21,201,762 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,194 writing to cptra_bootfsm_go
4,130,248 ready_for_fw is high
4,130,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,188,174 >>> mbox cmd response: success
23,827,111 UART:
23,827,507 UART: Running Caliptra FMC ...
23,828,612 UART:
23,828,770 UART: [state] CFI Enabled
23,836,293 UART: [fht] FMC Alias Private Key: 7
26,175,818 UART: [art] Extend RT PCRs Done
26,177,053 UART: [art] Lock RT PCRs Done
26,178,511 UART: [art] Populate DV Done
26,183,828 UART: [fht] FMC Alias Private Key: 7
26,185,323 UART: [art] Derive CDI
26,186,065 UART: [art] Store in slot 0x4
26,228,898 UART: [art] Derive Key Pair
26,229,948 UART: [art] Store priv key in slot 0x5
29,472,331 UART: [art] Derive Key Pair - Done
29,485,395 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,765,531 UART: [art] Erasing AUTHORITY.KEYID = 7
31,767,052 UART: [art] PUB.X = 0566D30E5068B732EA3CF13153A25CEABA03BC4FDA6CCD7BF89CD747DE6EDAF6B331A51F18F88E36A02A4CC182ACAEFD
31,774,365 UART: [art] PUB.Y = 6D7461BD026977977563D5BB74BBAC356F6B989662F894B1FD294D3E14BEB8805BDBF9EDE5599AFBE109FB772C4F7DA4
31,781,651 UART: [art] SIG.R = 32525D1BFEAA5206CECD950409AFC8A7C27608BEF01D0B4A7BBB641EA010053455897B456934AB4B6FF9967E93B4D44C
31,789,050 UART: [art] SIG.S = 9EEF541CD168B7A059373651BEA2AA8361990F11DEF4999DE939BE5C94C505BEC2351FF842872D46A7D1917443B875F5
33,094,457 UART: Caliptra RT
33,095,189 UART: [state] CFI Enabled
33,227,979 UART: [rt] RT listening for mailbox commands...
33,229,859 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,259,641 UART: [rt]cmd =0x46504c54, len=4
33,261,463 >>> mbox cmd response data (8 bytes)
33,262,523 UART: [rt] FIPS self test
33,263,477 UART: [kat] ++
33,263,933 UART: [kat] sha1
33,268,103 UART: [kat] SHA2-256
33,269,998 UART: [kat] SHA2-384
33,273,024 UART: [kat] SHA2-512-ACC
33,275,272 UART: [kat] ECC-384
36,518,471 UART: [kat] HMAC-384Kdf
36,523,792 UART: Fatal Error: 0x90030002
36,559,141 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,709,126 >>> mbox cmd response: failed
36,709,727 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
36,859,626 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
7,200,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
21,243,494 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,066 writing to cptra_bootfsm_go
192,187 UART:
192,594 UART: Running Caliptra ROM ...
193,722 UART:
193,869 UART: [state] CFI Enabled
266,116 UART: [state] LifecycleState = Unprovisioned
268,029 UART: [state] DebugLocked = No
270,273 UART: [state] WD Timer not started. Device not locked for debugging
273,474 UART: [kat] SHA2-256
453,125 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,863 UART: [kat] ++
464,319 UART: [kat] sha1
474,980 UART: [kat] SHA2-256
477,654 UART: [kat] SHA2-384
484,429 UART: [kat] SHA2-512-ACC
486,803 UART: [kat] ECC-384
2,946,842 UART: [kat] HMAC-384Kdf
2,970,675 UART: [kat] LMS
3,447,218 UART: [kat] --
3,450,948 UART: [cold-reset] ++
3,452,616 UART: [fht] FHT @ 0x50003400
3,464,665 UART: [idev] ++
3,465,238 UART: [idev] CDI.KEYID = 6
3,466,280 UART: [idev] SUBJECT.KEYID = 7
3,467,393 UART: [idev] UDS.KEYID = 0
3,468,455 ready_for_fw is high
3,468,688 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,618,904 UART: [idev] Erasing UDS.KEYID = 0
5,985,410 UART: [idev] Sha1 KeyId Algorithm
6,009,641 UART: [idev] --
6,014,622 UART: [ldev] ++
6,015,204 UART: [ldev] CDI.KEYID = 6
6,016,181 UART: [ldev] SUBJECT.KEYID = 5
6,017,353 UART: [ldev] AUTHORITY.KEYID = 7
6,018,616 UART: [ldev] FE.KEYID = 1
6,056,716 UART: [ldev] Erasing FE.KEYID = 1
8,563,916 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,352 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,206 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,503 UART: [ldev] --
10,376,090 UART: [fwproc] Wait for Commands...
10,378,798 UART: [fwproc] Recv command 0x46574c44
10,380,791 UART: [fwproc] Recv'd Img size: 119428 bytes
13,877,240 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,880 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,024,899 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,824 >>> mbox cmd response: success
14,360,544 UART: [afmc] ++
14,361,158 UART: [afmc] CDI.KEYID = 6
14,362,049 UART: [afmc] SUBJECT.KEYID = 7
14,363,271 UART: [afmc] AUTHORITY.KEYID = 5
16,893,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,615,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,617,592 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,633,388 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,649,446 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,011 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,690,622 UART: [afmc] --
18,694,579 UART: [cold-reset] --
18,698,297 UART: [state] Locking Datavault
18,705,278 UART: [state] Locking PCR0, PCR1 and PCR31
18,707,035 UART: [state] Locking ICCM
18,709,032 UART: [exit] Launching FMC @ 0x40000130
18,717,435 UART:
18,717,702 UART: Running Caliptra FMC ...
18,718,816 UART:
18,718,985 UART: [state] CFI Enabled
18,772,434 UART: [fht] FMC Alias Private Key: 7
20,538,079 UART: [art] Extend RT PCRs Done
20,539,303 UART: [art] Lock RT PCRs Done
20,541,121 UART: [art] Populate DV Done
20,546,429 UART: [fht] FMC Alias Private Key: 7
20,548,082 UART: [art] Derive CDI
20,548,829 UART: [art] Store in slot 0x4
20,605,058 UART: [art] Derive Key Pair
20,606,068 UART: [art] Store priv key in slot 0x5
23,069,073 UART: [art] Derive Key Pair - Done
23,082,068 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,794,476 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,979 UART: [art] PUB.X = 753C232BE794DE50F7244C7127D9C9CB53F7CF3DF02E7E2C04D129D2ED6DA78CBFFC7AAF1C49CEB208DB1299FDFBA6D8
24,803,302 UART: [art] PUB.Y = CF2772D10048A74E6D5EBC8F13F1A539CB327942ED87EEC4208CD44F888FE9E44632BD1B28E3FAB6DA8A09FD39C438AF
24,810,604 UART: [art] SIG.R = B618DD36E17DEF23CFB4820D8AE2B8555597E54E423D3973F81CA2F44B571AF45CE5CD01BC0DAB21959AFB2B0B7F8A82
24,818,001 UART: [art] SIG.S = 0F3C1E0E004D6141427E648DE663F3F50CD5BCB86EDE4F9A0D750113EC0F206733E017EA565CFB755022F3C096680347
25,796,388 UART: Caliptra RT
25,797,101 UART: [state] CFI Enabled
25,978,978 UART: [rt] RT listening for mailbox commands...
25,980,835 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,010,470 UART: [rt]cmd =0x46504c54, len=4
26,012,049 >>> mbox cmd response data (8 bytes)
26,013,330 UART: [rt] FIPS self test
26,014,287 UART: [kat] ++
26,014,747 UART: [kat] sha1
26,019,099 UART: [kat] SHA2-256
26,021,042 UART: [kat] SHA2-384
26,024,015 UART: [kat] SHA2-512-ACC
26,026,260 UART: [kat] ECC-384
28,469,242 UART: [kat] HMAC-384Kdf
28,495,394 UART: Fatal Error: 0x90030002
28,530,789 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,680,644 >>> mbox cmd response: failed
28,681,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,831,230 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,024 UART:
190,317 UART: Running Caliptra ROM ...
191,349 UART:
191,493 UART: [state] CFI Enabled
246,255 UART: [state] LifecycleState = Unprovisioned
248,142 UART: [state] DebugLocked = No
250,786 UART: [state] WD Timer not started. Device not locked for debugging
255,001 UART: [kat] SHA2-256
434,673 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
445,438 UART: [kat] ++
445,887 UART: [kat] sha1
455,523 UART: [kat] SHA2-256
458,215 UART: [kat] SHA2-384
464,250 UART: [kat] SHA2-512-ACC
466,595 UART: [kat] ECC-384
2,912,174 UART: [kat] HMAC-384Kdf
2,933,803 UART: [kat] LMS
3,410,285 UART: [kat] --
3,415,359 UART: [cold-reset] ++
3,416,651 UART: [fht] FHT @ 0x50003400
3,427,900 UART: [idev] ++
3,428,474 UART: [idev] CDI.KEYID = 6
3,429,496 UART: [idev] SUBJECT.KEYID = 7
3,430,660 UART: [idev] UDS.KEYID = 0
3,432,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,582,354 UART: [idev] Erasing UDS.KEYID = 0
5,947,083 UART: [idev] Sha1 KeyId Algorithm
5,970,699 UART: [idev] --
5,974,973 UART: [ldev] ++
5,975,550 UART: [ldev] CDI.KEYID = 6
5,976,471 UART: [ldev] SUBJECT.KEYID = 5
5,977,692 UART: [ldev] AUTHORITY.KEYID = 7
5,978,932 UART: [ldev] FE.KEYID = 1
6,017,506 UART: [ldev] Erasing FE.KEYID = 1
8,525,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,260,248 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,276,086 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,291,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,307,506 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,328,592 UART: [ldev] --
10,333,671 UART: [fwproc] Wait for Commands...
10,335,348 UART: [fwproc] Recv command 0x46574c44
10,337,347 UART: [fwproc] Recv'd Img size: 119428 bytes
13,826,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,910,231 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,983,241 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,314,809 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,148 writing to cptra_bootfsm_go
3,458,088 ready_for_fw is high
3,458,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,227,725 >>> mbox cmd response: success
18,513,418 UART:
18,513,873 UART: Running Caliptra FMC ...
18,514,997 UART:
18,515,150 UART: [state] CFI Enabled
18,584,102 UART: [fht] FMC Alias Private Key: 7
20,371,310 UART: [art] Extend RT PCRs Done
20,372,535 UART: [art] Lock RT PCRs Done
20,374,220 UART: [art] Populate DV Done
20,379,496 UART: [fht] FMC Alias Private Key: 7
20,381,177 UART: [art] Derive CDI
20,382,011 UART: [art] Store in slot 0x4
20,438,094 UART: [art] Derive Key Pair
20,439,106 UART: [art] Store priv key in slot 0x5
22,902,433 UART: [art] Derive Key Pair - Done
22,915,397 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,373 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,889 UART: [art] PUB.X = DE115DFD6BADFD564D5E5D8C61FA24607790F7E14C9BD172A708ADCCCFD1A9A96D08114D2B4B47300EBFC3F124F20925
24,636,182 UART: [art] PUB.Y = C012EF6C418092EB5F30A647228280A5FD013A88C35AC1F2633FEFD444151896FB07CE196EADD8C93C69C5BC012A7381
24,643,423 UART: [art] SIG.R = 4DF70CF3606564A150E08A5469E6A43E58DEDB76E9F455B4291DE26277744DF2B49E510FF0DFE48375B86026440C4D4C
24,650,790 UART: [art] SIG.S = 152931A18375A971EFDE30C22127BE0C02DB9CBA406A08EE84CA2060875B0A3DA82B96D709CC26E6456D51DC4611B46E
25,629,342 UART: Caliptra RT
25,630,049 UART: [state] CFI Enabled
25,825,294 UART: [rt] RT listening for mailbox commands...
25,827,157 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,857,037 UART: [rt]cmd =0x46504c54, len=4
25,858,753 >>> mbox cmd response data (8 bytes)
25,859,813 UART: [rt] FIPS self test
25,860,763 UART: [kat] ++
25,861,266 UART: [kat] sha1
25,865,621 UART: [kat] SHA2-256
25,867,500 UART: [kat] SHA2-384
25,870,632 UART: [kat] SHA2-512-ACC
25,872,934 UART: [kat] ECC-384
28,316,127 UART: [kat] HMAC-384Kdf
28,322,634 UART: Fatal Error: 0x90030002
28,357,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,507,844 >>> mbox cmd response: failed
28,508,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,658,850 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,447,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,235,518 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.26s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,649 UART:
193,030 UART: Running Caliptra ROM ...
194,170 UART:
603,830 UART: [state] CFI Enabled
617,642 UART: [state] LifecycleState = Unprovisioned
619,522 UART: [state] DebugLocked = No
622,429 UART: [state] WD Timer not started. Device not locked for debugging
625,925 UART: [kat] SHA2-256
805,618 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,352 UART: [kat] ++
816,832 UART: [kat] sha1
827,011 UART: [kat] SHA2-256
829,683 UART: [kat] SHA2-384
834,337 UART: [kat] SHA2-512-ACC
836,722 UART: [kat] ECC-384
3,275,271 UART: [kat] HMAC-384Kdf
3,287,092 UART: [kat] LMS
3,763,641 UART: [kat] --
3,767,994 UART: [cold-reset] ++
3,769,723 UART: [fht] FHT @ 0x50003400
3,781,302 UART: [idev] ++
3,781,910 UART: [idev] CDI.KEYID = 6
3,782,826 UART: [idev] SUBJECT.KEYID = 7
3,784,082 UART: [idev] UDS.KEYID = 0
3,785,021 ready_for_fw is high
3,785,236 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,935,056 UART: [idev] Erasing UDS.KEYID = 0
6,263,589 UART: [idev] Sha1 KeyId Algorithm
6,286,671 UART: [idev] --
6,292,725 UART: [ldev] ++
6,293,303 UART: [ldev] CDI.KEYID = 6
6,294,215 UART: [ldev] SUBJECT.KEYID = 5
6,295,440 UART: [ldev] AUTHORITY.KEYID = 7
6,296,678 UART: [ldev] FE.KEYID = 1
6,308,139 UART: [ldev] Erasing FE.KEYID = 1
8,787,001 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,508,003 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,739 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,263 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,641 UART: [ldev] --
10,581,844 UART: [fwproc] Wait for Commands...
10,583,523 UART: [fwproc] Recv command 0x46574c44
10,585,519 UART: [fwproc] Recv'd Img size: 119428 bytes
14,083,099 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,171,619 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,244,642 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,576,740 >>> mbox cmd response: success
14,581,237 UART: [afmc] ++
14,581,825 UART: [afmc] CDI.KEYID = 6
14,582,741 UART: [afmc] SUBJECT.KEYID = 7
14,583,961 UART: [afmc] AUTHORITY.KEYID = 5
17,087,996 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,810,185 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,407 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,828,259 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,844,293 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,859,834 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,157 UART: [afmc] --
18,887,592 UART: [cold-reset] --
18,893,029 UART: [state] Locking Datavault
18,900,344 UART: [state] Locking PCR0, PCR1 and PCR31
18,902,146 UART: [state] Locking ICCM
18,903,660 UART: [exit] Launching FMC @ 0x40000130
18,912,061 UART:
18,912,315 UART: Running Caliptra FMC ...
18,913,371 UART:
18,913,524 UART: [state] CFI Enabled
18,921,840 UART: [fht] FMC Alias Private Key: 7
20,688,138 UART: [art] Extend RT PCRs Done
20,689,385 UART: [art] Lock RT PCRs Done
20,690,934 UART: [art] Populate DV Done
20,696,085 UART: [fht] FMC Alias Private Key: 7
20,697,630 UART: [art] Derive CDI
20,698,370 UART: [art] Store in slot 0x4
20,740,967 UART: [art] Derive Key Pair
20,742,011 UART: [art] Store priv key in slot 0x5
23,168,845 UART: [art] Derive Key Pair - Done
23,182,227 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,888,376 UART: [art] Erasing AUTHORITY.KEYID = 7
24,889,889 UART: [art] PUB.X = 702DEEE7695F330CCA27D1E99D37A0D2EA6B607E0678FD58E568736DB4A7B44C17AB9BC66737AD5F04EDECF2680EF790
24,897,248 UART: [art] PUB.Y = 5E44EF55355064B7AB5F39220A9D633C89622823E06927C4C1E1717925AA20DEB632D9C4EBD3A5CC35E60D0AF6C21812
24,904,416 UART: [art] SIG.R = D0D4B8583D4B158965FC26D831A1B3AD912255E91FB3ED5FA87497CBBD4F932A7C147B6C4CB4AB5EA9086EE89F47438D
24,911,869 UART: [art] SIG.S = 449FE992A04F98D691C544BF81A1C7ACCDC1EC7D155CA90812FE4EB167D17E4115F5C120291E59C42877132839FF7D1C
25,890,595 UART: Caliptra RT
25,891,305 UART: [state] CFI Enabled
26,025,370 UART: [rt] RT listening for mailbox commands...
26,027,232 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,056,934 UART: [rt]cmd =0x46504c54, len=4
26,058,528 >>> mbox cmd response data (8 bytes)
26,059,866 UART: [rt] FIPS self test
26,060,823 UART: [kat] ++
26,061,284 UART: [kat] sha1
26,065,581 UART: [kat] SHA2-256
26,067,462 UART: [kat] SHA2-384
26,070,378 UART: [kat] SHA2-512-ACC
26,072,674 UART: [kat] ECC-384
28,500,432 UART: [kat] HMAC-384Kdf
28,505,803 UART: Fatal Error: 0x90030002
28,541,027 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,691,000 >>> mbox cmd response: failed
28,691,616 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,841,517 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,101 UART:
190,396 UART: Running Caliptra ROM ...
191,427 UART:
11,695,799 UART: [state] CFI Enabled
11,707,176 UART: [state] LifecycleState = Unprovisioned
11,709,090 UART: [state] DebugLocked = No
11,712,022 UART: [state] WD Timer not started. Device not locked for debugging
11,715,557 UART: [kat] SHA2-256
11,895,202 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,906,005 UART: [kat] ++
11,906,561 UART: [kat] sha1
11,916,653 UART: [kat] SHA2-256
11,919,349 UART: [kat] SHA2-384
11,925,203 UART: [kat] SHA2-512-ACC
11,927,560 UART: [kat] ECC-384
14,370,676 UART: [kat] HMAC-384Kdf
14,383,062 UART: [kat] LMS
14,859,601 UART: [kat] --
14,864,780 UART: [cold-reset] ++
14,865,905 UART: [fht] FHT @ 0x50003400
14,877,462 UART: [idev] ++
14,878,030 UART: [idev] CDI.KEYID = 6
14,878,976 UART: [idev] SUBJECT.KEYID = 7
14,880,195 UART: [idev] UDS.KEYID = 0
14,881,763 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,031,744 UART: [idev] Erasing UDS.KEYID = 0
17,357,289 UART: [idev] Sha1 KeyId Algorithm
17,381,653 UART: [idev] --
17,386,244 UART: [ldev] ++
17,386,839 UART: [ldev] CDI.KEYID = 6
17,387,752 UART: [ldev] SUBJECT.KEYID = 5
17,388,972 UART: [ldev] AUTHORITY.KEYID = 7
17,390,208 UART: [ldev] FE.KEYID = 1
17,402,421 UART: [ldev] Erasing FE.KEYID = 1
19,878,113 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,598,113 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,613,992 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,629,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,645,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,666,582 UART: [ldev] --
21,672,355 UART: [fwproc] Wait for Commands...
21,674,845 UART: [fwproc] Recv command 0x46574c44
21,676,842 UART: [fwproc] Recv'd Img size: 119428 bytes
25,173,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,255,268 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,328,266 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,660,223 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,456 writing to cptra_bootfsm_go
3,779,064 ready_for_fw is high
3,779,464 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,464,169 >>> mbox cmd response: success
18,717,361 UART:
18,717,767 UART: Running Caliptra FMC ...
18,719,098 UART:
18,719,282 UART: [state] CFI Enabled
18,726,984 UART: [fht] FMC Alias Private Key: 7
20,493,732 UART: [art] Extend RT PCRs Done
20,494,983 UART: [art] Lock RT PCRs Done
20,496,559 UART: [art] Populate DV Done
20,502,058 UART: [fht] FMC Alias Private Key: 7
20,503,772 UART: [art] Derive CDI
20,504,547 UART: [art] Store in slot 0x4
20,547,679 UART: [art] Derive Key Pair
20,548,736 UART: [art] Store priv key in slot 0x5
22,976,031 UART: [art] Derive Key Pair - Done
22,989,136 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,695,670 UART: [art] Erasing AUTHORITY.KEYID = 7
24,697,180 UART: [art] PUB.X = 7E4E5E2FC48AD6BBA59666A5D22709354049A2F7FCCAF978E054E97460BCC6484408AC51A97CB2141736C98D6B091E06
24,704,461 UART: [art] PUB.Y = 24733DFFB509874411EF82F32D85C1A408F52D72F6BE517803C01D71BD0126D0D909442DB7F6E785684D6E687AE144BE
24,711,668 UART: [art] SIG.R = 1DA7E711F9C9C1A5A42C3582EE5F4E0E7DD90EC25A83CA2657AF465420025C4C71782A2CB97C6E002715C21A4474A02F
24,719,073 UART: [art] SIG.S = F422C9865A857EA1E26BF69A6A7C3B8AA2AB79F759428AAB8E30BAE326240A28371044ED4BD91F99CECE9D6059504B8F
25,698,153 UART: Caliptra RT
25,698,856 UART: [state] CFI Enabled
25,831,622 UART: [rt] RT listening for mailbox commands...
25,833,475 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,862,959 UART: [rt]cmd =0x46504c54, len=4
25,864,762 >>> mbox cmd response data (8 bytes)
25,865,771 UART: [rt] FIPS self test
25,866,724 UART: [kat] ++
25,867,183 UART: [kat] sha1
25,871,642 UART: [kat] SHA2-256
25,873,521 UART: [kat] SHA2-384
25,876,708 UART: [kat] SHA2-512-ACC
25,879,004 UART: [kat] ECC-384
28,306,605 UART: [kat] HMAC-384Kdf
28,312,185 UART: Fatal Error: 0x90030002
28,347,359 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,497,696 >>> mbox cmd response: failed
28,498,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,648,324 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
15,057,680 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,734,760 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,050 writing to cptra_bootfsm_go
192,280 UART:
192,645 UART: Running Caliptra ROM ...
193,863 UART:
194,020 UART: [state] CFI Enabled
263,489 UART: [state] LifecycleState = Unprovisioned
265,890 UART: [state] DebugLocked = No
268,792 UART: [state] WD Timer not started. Device not locked for debugging
274,116 UART: [kat] SHA2-256
463,956 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,778 UART: [kat] ++
475,260 UART: [kat] sha1
487,064 UART: [kat] SHA2-256
490,086 UART: [kat] SHA2-384
495,236 UART: [kat] SHA2-512-ACC
497,823 UART: [kat] ECC-384
2,950,834 UART: [kat] HMAC-384Kdf
2,973,160 UART: [kat] LMS
3,504,927 UART: [kat] --
3,508,870 UART: [cold-reset] ++
3,511,315 UART: [fht] FHT @ 0x50003400
3,522,235 UART: [idev] ++
3,522,883 UART: [idev] CDI.KEYID = 6
3,523,867 UART: [idev] SUBJECT.KEYID = 7
3,525,049 UART: [idev] UDS.KEYID = 0
3,525,979 ready_for_fw is high
3,526,181 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,336 UART: [idev] Erasing UDS.KEYID = 0
6,031,239 UART: [idev] Sha1 KeyId Algorithm
6,053,288 UART: [idev] --
6,056,801 UART: [ldev] ++
6,057,510 UART: [ldev] CDI.KEYID = 6
6,058,429 UART: [ldev] SUBJECT.KEYID = 5
6,059,595 UART: [ldev] AUTHORITY.KEYID = 7
6,060,781 UART: [ldev] FE.KEYID = 1
6,100,300 UART: [ldev] Erasing FE.KEYID = 1
8,610,214 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,560 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,706 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,977 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,079 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,208 UART: [ldev] --
10,416,300 UART: [fwproc] Wait for Commands...
10,418,028 UART: [fwproc] Recv command 0x46574c44
10,420,292 UART: [fwproc] Recv'd Img size: 119428 bytes
13,926,014 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,006,645 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,130,269 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,695,208 >>> mbox cmd response: success
14,699,379 UART: [afmc] ++
14,700,091 UART: [afmc] CDI.KEYID = 6
14,701,365 UART: [afmc] SUBJECT.KEYID = 7
14,702,811 UART: [afmc] AUTHORITY.KEYID = 5
17,234,157 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,961,452 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,361 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,978,467 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,993,654 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,008,505 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,213 UART: [afmc] --
19,035,939 UART: [cold-reset] --
19,038,943 UART: [state] Locking Datavault
19,044,306 UART: [state] Locking PCR0, PCR1 and PCR31
19,046,445 UART: [state] Locking ICCM
19,049,307 UART: [exit] Launching FMC @ 0x40000130
19,057,987 UART:
19,058,229 UART: Running Caliptra FMC ...
19,059,361 UART:
19,059,526 UART: [state] CFI Enabled
19,118,370 UART: [fht] FMC Alias Private Key: 7
20,883,929 UART: [art] Extend RT PCRs Done
20,885,148 UART: [art] Lock RT PCRs Done
20,886,729 UART: [art] Populate DV Done
20,892,197 UART: [fht] FMC Alias Private Key: 7
20,893,687 UART: [art] Derive CDI
20,894,450 UART: [art] Store in slot 0x4
20,951,921 UART: [art] Derive Key Pair
20,952,960 UART: [art] Store priv key in slot 0x5
23,415,626 UART: [art] Derive Key Pair - Done
23,428,247 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,142,152 UART: [art] Erasing AUTHORITY.KEYID = 7
25,143,662 UART: [art] PUB.X = 9FCDB7E6629FABD2E8BEADA9FA28F9F656B19C4A8C2612DADB50A8F9D631A80F5DA6630950E87EE96A1DD8AAC8573EEA
25,150,915 UART: [art] PUB.Y = C1F7C816542B8E2A2D44C764141CCDF0C41C050CDBAADBE867C8AC47B8E57FD2C5AF0D73B427F13FD26573D3CB0A479A
25,158,226 UART: [art] SIG.R = CC95115736F8BBF2C070AB9E10FBCBFE696EA5770AA613A5DEA58EE2F43D7836E11862EEAD8F93598BB4F7A4BA9C9A23
25,165,627 UART: [art] SIG.S = A5730B9F2308386CFABD8B9F95DA05E3EAE0091CB66EE94D5AEDFDAC3DA9B0D72889F33901D70281DC0FB7ED0235940A
26,144,673 UART: Caliptra RT
26,145,369 UART: [state] CFI Enabled
26,324,414 UART: [rt] RT listening for mailbox commands...
26,326,265 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,356,114 UART: [rt]cmd =0x46504c54, len=4
26,357,633 >>> mbox cmd response data (8 bytes)
26,358,924 UART: [rt] FIPS self test
26,359,866 UART: [kat] ++
26,360,317 UART: [kat] sha1
26,364,722 UART: [kat] SHA2-256
26,366,652 UART: [kat] SHA2-384
26,369,514 UART: [kat] SHA2-512-ACC
26,371,806 UART: [kat] ECC-384
28,816,589 UART: [kat] HMAC-384Kdf
28,842,259 UART: Fatal Error: 0x90030002
28,877,655 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,028,000 >>> mbox cmd response: failed
29,028,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,178,579 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,986 UART:
190,272 UART: Running Caliptra ROM ...
191,305 UART:
191,449 UART: [state] CFI Enabled
246,160 UART: [state] LifecycleState = Unprovisioned
248,519 UART: [state] DebugLocked = No
251,038 UART: [state] WD Timer not started. Device not locked for debugging
256,459 UART: [kat] SHA2-256
446,391 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
457,120 UART: [kat] ++
457,658 UART: [kat] sha1
468,927 UART: [kat] SHA2-256
471,946 UART: [kat] SHA2-384
477,870 UART: [kat] SHA2-512-ACC
480,423 UART: [kat] ECC-384
2,930,183 UART: [kat] HMAC-384Kdf
2,954,720 UART: [kat] LMS
3,486,370 UART: [kat] --
3,491,293 UART: [cold-reset] ++
3,492,907 UART: [fht] FHT @ 0x50003400
3,504,389 UART: [idev] ++
3,505,079 UART: [idev] CDI.KEYID = 6
3,506,050 UART: [idev] SUBJECT.KEYID = 7
3,507,278 UART: [idev] UDS.KEYID = 0
3,508,791 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,658,934 UART: [idev] Erasing UDS.KEYID = 0
6,010,587 UART: [idev] Sha1 KeyId Algorithm
6,034,477 UART: [idev] --
6,039,024 UART: [ldev] ++
6,039,725 UART: [ldev] CDI.KEYID = 6
6,040,641 UART: [ldev] SUBJECT.KEYID = 5
6,041,811 UART: [ldev] AUTHORITY.KEYID = 7
6,042,993 UART: [ldev] FE.KEYID = 1
6,083,098 UART: [ldev] Erasing FE.KEYID = 1
8,591,496 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,325,302 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,340,497 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,355,687 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,370,815 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,390,752 UART: [ldev] --
10,396,018 UART: [fwproc] Wait for Commands...
10,398,508 UART: [fwproc] Recv command 0x46574c44
10,400,831 UART: [fwproc] Recv'd Img size: 119428 bytes
13,906,434 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,110 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,110,736 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,675,860 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.31s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,456,598 ready_for_fw is high
3,457,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,860,758 >>> mbox cmd response: success
19,149,736 UART:
19,150,121 UART: Running Caliptra FMC ...
19,151,265 UART:
19,151,423 UART: [state] CFI Enabled
19,219,491 UART: [fht] FMC Alias Private Key: 7
20,986,382 UART: [art] Extend RT PCRs Done
20,987,610 UART: [art] Lock RT PCRs Done
20,989,106 UART: [art] Populate DV Done
20,994,484 UART: [fht] FMC Alias Private Key: 7
20,996,144 UART: [art] Derive CDI
20,997,103 UART: [art] Store in slot 0x4
21,052,680 UART: [art] Derive Key Pair
21,053,737 UART: [art] Store priv key in slot 0x5
23,516,263 UART: [art] Derive Key Pair - Done
23,529,647 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,388 UART: [art] Erasing AUTHORITY.KEYID = 7
25,244,905 UART: [art] PUB.X = D72AE3368DC918842D2962DB5A7F1E0D34C03DA556E25263423A60A434F8C41E965230C245ACA2C5BF7011A5C3B04B43
25,252,158 UART: [art] PUB.Y = A23B1F7D86C31B9DF0155480A0DA752B445F87D86358676FBA8844FA73126006B229BF2537602C090E0A645A54CE0B53
25,259,388 UART: [art] SIG.R = B6E34FD65393CFDEA871625402503C0EA3DDB670E094B3CE1666BF1AC03C2A6A8EAE7C52E7482B54B672DC2C971C9AB1
25,266,776 UART: [art] SIG.S = 07F21F5638367EE2C396FED599861B4A6DD30B63D77CBA18198A12C4FA9F6AAF69EE0DBE7226D8209423E248492D5155
26,245,937 UART: Caliptra RT
26,246,639 UART: [state] CFI Enabled
26,427,189 UART: [rt] RT listening for mailbox commands...
26,429,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,848 UART: [rt]cmd =0x46504c54, len=4
26,460,375 >>> mbox cmd response data (8 bytes)
26,461,656 UART: [rt] FIPS self test
26,462,599 UART: [kat] ++
26,463,054 UART: [kat] sha1
26,467,457 UART: [kat] SHA2-256
26,469,388 UART: [kat] SHA2-384
26,472,464 UART: [kat] SHA2-512-ACC
26,474,701 UART: [kat] ECC-384
28,918,041 UART: [kat] HMAC-384Kdf
28,923,446 UART: Fatal Error: 0x90030002
28,958,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,108,620 >>> mbox cmd response: failed
29,109,193 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,259,156 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,424,383 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,808,349 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,707 UART:
193,065 UART: Running Caliptra ROM ...
194,261 UART:
603,902 UART: [state] CFI Enabled
616,575 UART: [state] LifecycleState = Unprovisioned
618,957 UART: [state] DebugLocked = No
620,151 UART: [state] WD Timer not started. Device not locked for debugging
623,882 UART: [kat] SHA2-256
813,749 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,555 UART: [kat] ++
825,080 UART: [kat] sha1
835,750 UART: [kat] SHA2-256
838,767 UART: [kat] SHA2-384
844,914 UART: [kat] SHA2-512-ACC
847,508 UART: [kat] ECC-384
3,290,475 UART: [kat] HMAC-384Kdf
3,303,431 UART: [kat] LMS
3,835,279 UART: [kat] --
3,840,863 UART: [cold-reset] ++
3,843,092 UART: [fht] FHT @ 0x50003400
3,855,363 UART: [idev] ++
3,856,076 UART: [idev] CDI.KEYID = 6
3,857,056 UART: [idev] SUBJECT.KEYID = 7
3,858,242 UART: [idev] UDS.KEYID = 0
3,859,148 ready_for_fw is high
3,859,355 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,009,346 UART: [idev] Erasing UDS.KEYID = 0
6,338,430 UART: [idev] Sha1 KeyId Algorithm
6,360,866 UART: [idev] --
6,365,888 UART: [ldev] ++
6,366,574 UART: [ldev] CDI.KEYID = 6
6,367,456 UART: [ldev] SUBJECT.KEYID = 5
6,368,671 UART: [ldev] AUTHORITY.KEYID = 7
6,369,851 UART: [ldev] FE.KEYID = 1
6,379,827 UART: [ldev] Erasing FE.KEYID = 1
8,860,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,580,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,595,539 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,610,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,625,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,369 UART: [ldev] --
10,650,157 UART: [fwproc] Wait for Commands...
10,652,366 UART: [fwproc] Recv command 0x46574c44
10,654,695 UART: [fwproc] Recv'd Img size: 119428 bytes
14,159,505 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,235,556 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,359,188 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,924,865 >>> mbox cmd response: success
14,929,356 UART: [afmc] ++
14,930,059 UART: [afmc] CDI.KEYID = 6
14,931,230 UART: [afmc] SUBJECT.KEYID = 7
14,932,771 UART: [afmc] AUTHORITY.KEYID = 5
17,433,992 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,154,916 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,156,871 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,171,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,187,139 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,202,031 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,225,561 UART: [afmc] --
19,228,781 UART: [cold-reset] --
19,233,837 UART: [state] Locking Datavault
19,240,335 UART: [state] Locking PCR0, PCR1 and PCR31
19,242,474 UART: [state] Locking ICCM
19,244,628 UART: [exit] Launching FMC @ 0x40000130
19,253,300 UART:
19,253,547 UART: Running Caliptra FMC ...
19,254,654 UART:
19,254,818 UART: [state] CFI Enabled
19,262,934 UART: [fht] FMC Alias Private Key: 7
21,029,202 UART: [art] Extend RT PCRs Done
21,030,448 UART: [art] Lock RT PCRs Done
21,031,838 UART: [art] Populate DV Done
21,037,260 UART: [fht] FMC Alias Private Key: 7
21,038,964 UART: [art] Derive CDI
21,039,708 UART: [art] Store in slot 0x4
21,082,682 UART: [art] Derive Key Pair
21,083,690 UART: [art] Store priv key in slot 0x5
23,510,594 UART: [art] Derive Key Pair - Done
23,523,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,229,731 UART: [art] Erasing AUTHORITY.KEYID = 7
25,231,245 UART: [art] PUB.X = 607ED69D790FFEDFF8689778942735D5258FEEEE6A3B637CEA20BAE92EBF6A12CEC64BF1570E219C22F84996F15A4A3C
25,238,478 UART: [art] PUB.Y = 4A113BFECE1B3C21F3A6DB5B6D8F833EBE4EA8BFA5B631FAB7E1330BCA5BD1750CA68FA9E684AAB89D869B2C485D84E4
25,245,801 UART: [art] SIG.R = 024882721FDEF2A253C92344C0E04A23DD5245D4F87A309936321CDAA2684F5D0821B00190DBCC900CC95CE0B32D9CFD
25,253,175 UART: [art] SIG.S = D8AA0EF54A95A96E42106325CE6921CD9D03969C4AF3FA35725B4E588123CDD06385F678135A846AA611E0DB87C23899
26,232,070 UART: Caliptra RT
26,232,788 UART: [state] CFI Enabled
26,365,813 UART: [rt] RT listening for mailbox commands...
26,367,671 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,397,464 UART: [rt]cmd =0x46504c54, len=4
26,399,077 >>> mbox cmd response data (8 bytes)
26,400,091 UART: [rt] FIPS self test
26,401,039 UART: [kat] ++
26,401,498 UART: [kat] sha1
26,405,690 UART: [kat] SHA2-256
26,407,630 UART: [kat] SHA2-384
26,410,434 UART: [kat] SHA2-512-ACC
26,412,728 UART: [kat] ECC-384
28,840,241 UART: [kat] HMAC-384Kdf
28,845,831 UART: Fatal Error: 0x90030002
28,881,213 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,031,198 >>> mbox cmd response: failed
29,031,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,181,737 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
189,983 UART:
190,263 UART: Running Caliptra ROM ...
191,291 UART:
11,348,044 UART: [state] CFI Enabled
11,360,628 UART: [state] LifecycleState = Unprovisioned
11,363,014 UART: [state] DebugLocked = No
11,364,908 UART: [state] WD Timer not started. Device not locked for debugging
11,370,131 UART: [kat] SHA2-256
11,560,026 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,570,829 UART: [kat] ++
11,571,373 UART: [kat] sha1
11,583,357 UART: [kat] SHA2-256
11,586,377 UART: [kat] SHA2-384
11,593,157 UART: [kat] SHA2-512-ACC
11,595,739 UART: [kat] ECC-384
14,036,955 UART: [kat] HMAC-384Kdf
14,051,082 UART: [kat] LMS
14,582,865 UART: [kat] --
14,589,128 UART: [cold-reset] ++
14,590,370 UART: [fht] FHT @ 0x50003400
14,602,060 UART: [idev] ++
14,602,746 UART: [idev] CDI.KEYID = 6
14,603,717 UART: [idev] SUBJECT.KEYID = 7
14,604,851 UART: [idev] UDS.KEYID = 0
14,606,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,756,386 UART: [idev] Erasing UDS.KEYID = 0
17,084,042 UART: [idev] Sha1 KeyId Algorithm
17,106,418 UART: [idev] --
17,111,864 UART: [ldev] ++
17,112,565 UART: [ldev] CDI.KEYID = 6
17,113,450 UART: [ldev] SUBJECT.KEYID = 5
17,114,661 UART: [ldev] AUTHORITY.KEYID = 7
17,115,896 UART: [ldev] FE.KEYID = 1
17,124,551 UART: [ldev] Erasing FE.KEYID = 1
19,596,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,315,754 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,330,939 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,346,117 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,361,272 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,382,967 UART: [ldev] --
21,388,455 UART: [fwproc] Wait for Commands...
21,391,481 UART: [fwproc] Recv command 0x46574c44
21,393,808 UART: [fwproc] Recv'd Img size: 119428 bytes
24,900,069 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,979,746 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,103,405 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,669,613 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,755,237 ready_for_fw is high
3,755,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,075,606 >>> mbox cmd response: success
19,331,305 UART:
19,331,707 UART: Running Caliptra FMC ...
19,332,913 UART:
19,333,102 UART: [state] CFI Enabled
19,341,222 UART: [fht] FMC Alias Private Key: 7
21,107,491 UART: [art] Extend RT PCRs Done
21,108,736 UART: [art] Lock RT PCRs Done
21,110,419 UART: [art] Populate DV Done
21,115,903 UART: [fht] FMC Alias Private Key: 7
21,117,416 UART: [art] Derive CDI
21,118,241 UART: [art] Store in slot 0x4
21,161,061 UART: [art] Derive Key Pair
21,162,070 UART: [art] Store priv key in slot 0x5
23,588,912 UART: [art] Derive Key Pair - Done
23,601,816 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,308,001 UART: [art] Erasing AUTHORITY.KEYID = 7
25,309,525 UART: [art] PUB.X = 418893A1D3049D0390870F2CEE95C58BF9BFB420A3BEB1B7C52F33CC052AEB3A0D3FAB6F417BE7019847770E15C48C6A
25,316,757 UART: [art] PUB.Y = 583BE131070B5905A3B834D4699B0A6D0BFE89E905F90DF978F59D37A1AE6F1E546C5250C4DDABA7E69D2B3A73F45394
25,324,021 UART: [art] SIG.R = EF887471AB4B00A873FAC0522456B92DA6CCD7E293980C3C2DB54FD9C70E1CC55B60992FEA46B03C099541631197A784
25,331,398 UART: [art] SIG.S = ABA0DD743F12083C9072126A6FBD2D6E9027DD9962542A30F2BD4BDDA9770FB16E96B1BDE72ED179A14A33D8DDDE20CB
26,310,834 UART: Caliptra RT
26,311,548 UART: [state] CFI Enabled
26,444,653 UART: [rt] RT listening for mailbox commands...
26,446,501 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,475,987 UART: [rt]cmd =0x46504c54, len=4
26,477,516 >>> mbox cmd response data (8 bytes)
26,478,676 UART: [rt] FIPS self test
26,479,631 UART: [kat] ++
26,480,085 UART: [kat] sha1
26,484,496 UART: [kat] SHA2-256
26,486,430 UART: [kat] SHA2-384
26,489,393 UART: [kat] SHA2-512-ACC
26,491,633 UART: [kat] ECC-384
28,919,002 UART: [kat] HMAC-384Kdf
28,924,274 UART: Fatal Error: 0x90030002
28,959,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,109,640 >>> mbox cmd response: failed
29,110,290 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,260,170 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
14,433,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,736,166 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,352 UART: [state] LifecycleState = Unprovisioned
86,007 UART: [state] DebugLocked = No
86,563 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,165 UART: [kat] SHA2-256
882,096 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,211 UART: [kat] ++
886,363 UART: [kat] sha1
890,617 UART: [kat] SHA2-256
892,555 UART: [kat] SHA2-384
895,318 UART: [kat] SHA2-512-ACC
897,219 UART: [kat] ECC-384
902,448 UART: [kat] HMAC-384Kdf
907,196 UART: [kat] LMS
1,475,392 UART: [kat] --
1,476,171 UART: [cold-reset] ++
1,476,703 UART: [fht] Storing FHT @ 0x50003400
1,479,604 UART: [idev] ++
1,479,772 UART: [idev] CDI.KEYID = 6
1,480,132 UART: [idev] SUBJECT.KEYID = 7
1,480,556 UART: [idev] UDS.KEYID = 0
1,480,901 ready_for_fw is high
1,480,901 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,396 UART: [idev] Erasing UDS.KEYID = 0
1,504,920 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,690 UART: [idev] --
1,514,905 UART: [ldev] ++
1,515,073 UART: [ldev] CDI.KEYID = 6
1,515,436 UART: [ldev] SUBJECT.KEYID = 5
1,515,862 UART: [ldev] AUTHORITY.KEYID = 7
1,516,325 UART: [ldev] FE.KEYID = 1
1,521,591 UART: [ldev] Erasing FE.KEYID = 1
1,547,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,675 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,282 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,994 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,046 UART: [ldev] --
1,586,427 UART: [fwproc] Waiting for Commands...
1,587,152 UART: [fwproc] Received command 0x46574c44
1,587,943 UART: [fwproc] Received Image of size 119428 bytes
2,942,525 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,327 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,545 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,162 >>> mbox cmd response: success
3,144,228 UART: [afmc] ++
3,144,396 UART: [afmc] CDI.KEYID = 6
3,144,758 UART: [afmc] SUBJECT.KEYID = 7
3,145,183 UART: [afmc] AUTHORITY.KEYID = 5
3,180,226 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,674 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,454 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,163 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,046 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,729 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,507 UART: [afmc] --
3,223,395 UART: [cold-reset] --
3,224,115 UART: [state] Locking Datavault
3,225,206 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,810 UART: [state] Locking ICCM
3,226,344 UART: [exit] Launching FMC @ 0x40000130
3,231,674 UART:
3,231,690 UART: Running Caliptra FMC ...
3,232,098 UART:
3,232,152 UART: [state] CFI Enabled
3,243,018 UART: [fht] FMC Alias Private Key: 7
3,361,886 UART: [art] Extend RT PCRs Done
3,362,314 UART: [art] Lock RT PCRs Done
3,363,864 UART: [art] Populate DV Done
3,372,175 UART: [fht] FMC Alias Private Key: 7
3,373,287 UART: [art] Derive CDI
3,373,567 UART: [art] Store in slot 0x4
3,459,511 UART: [art] Derive Key Pair
3,459,871 UART: [art] Store priv key in slot 0x5
3,473,000 UART: [art] Derive Key Pair - Done
3,487,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,682 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,447 UART: [art] PUB.X = 31F8A3B290F22C340F0CB22615EA9DC11EF6067E1AACA60DADE0F3440A5B56B8501013BBF8621EC2C7C8C087CD8C5936
3,511,216 UART: [art] PUB.Y = AE93BAF2FE5A1E3946933D4D3A4B22F334867ACD60F24DDF27A0ED0CDC3AA6162739DB583BF2FD319A4F7DD98FEDB161
3,518,187 UART: [art] SIG.R = D565308525C761EC401B5B5FB626BD155EE3EB92CFBD49213C743021F7E619450397BBF3753439B10D74D7A5D8F8F8F6
3,524,953 UART: [art] SIG.S = F2375DD88356623433EF00B22E310A61FB24AA14633645E89813583D05706999257E3D8B1329FEDA4D73D5B223F61E5E
3,548,903 UART: Caliptra RT
3,549,154 UART: [state] CFI Enabled
3,669,787 UART: [rt] RT listening for mailbox commands...
3,670,450 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,139 UART: [rt]cmd =0x46504c54, len=4
3,701,267 >>> mbox cmd response data (8 bytes)
3,701,454 UART: [rt] FIPS self test
3,701,782 UART: [kat] ++
3,701,934 UART: [kat] sha1
3,706,180 UART: [kat] SHA2-256
3,708,202 UART: [kat] SHA2-384
3,711,045 UART: [kat] SHA2-512-ACC
3,712,972 UART: [kat] ECC-384
3,723,150 UART: [kat] HMAC-384Kdf
3,727,663 UART: Fatal Error: 0x90030002
3,729,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,729,207 >>> mbox cmd response: failed
3,729,207 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,729,212 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,112 UART: [state] LifecycleState = Unprovisioned
85,767 UART: [state] DebugLocked = No
86,253 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,761 UART: [kat] SHA2-256
881,692 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,807 UART: [kat] ++
885,959 UART: [kat] sha1
890,401 UART: [kat] SHA2-256
892,339 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,120 UART: [kat] HMAC-384Kdf
906,656 UART: [kat] LMS
1,474,852 UART: [kat] --
1,475,935 UART: [cold-reset] ++
1,476,501 UART: [fht] Storing FHT @ 0x50003400
1,479,212 UART: [idev] ++
1,479,380 UART: [idev] CDI.KEYID = 6
1,479,740 UART: [idev] SUBJECT.KEYID = 7
1,480,164 UART: [idev] UDS.KEYID = 0
1,480,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,166 UART: [idev] Erasing UDS.KEYID = 0
1,504,672 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,422 UART: [idev] --
1,514,569 UART: [ldev] ++
1,514,737 UART: [ldev] CDI.KEYID = 6
1,515,100 UART: [ldev] SUBJECT.KEYID = 5
1,515,526 UART: [ldev] AUTHORITY.KEYID = 7
1,515,989 UART: [ldev] FE.KEYID = 1
1,521,471 UART: [ldev] Erasing FE.KEYID = 1
1,546,788 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,169 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,885 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,776 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,488 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,730 UART: [ldev] --
1,586,121 UART: [fwproc] Waiting for Commands...
1,586,774 UART: [fwproc] Received command 0x46574c44
1,587,565 UART: [fwproc] Received Image of size 119428 bytes
2,942,537 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,451 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,669 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,328 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,439 ready_for_fw is high
1,362,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,955 >>> mbox cmd response: success
3,053,386 UART:
3,053,402 UART: Running Caliptra FMC ...
3,053,810 UART:
3,053,864 UART: [state] CFI Enabled
3,064,754 UART: [fht] FMC Alias Private Key: 7
3,183,160 UART: [art] Extend RT PCRs Done
3,183,588 UART: [art] Lock RT PCRs Done
3,184,948 UART: [art] Populate DV Done
3,193,225 UART: [fht] FMC Alias Private Key: 7
3,194,191 UART: [art] Derive CDI
3,194,471 UART: [art] Store in slot 0x4
3,280,513 UART: [art] Derive Key Pair
3,280,873 UART: [art] Store priv key in slot 0x5
3,293,790 UART: [art] Derive Key Pair - Done
3,308,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,161 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,926 UART: [art] PUB.X = 79C15DDA2F6AD7805AE74B0E918169526429B551EF72673CF76F1B1D55EF3BF277497042799563B7DE43FA0CAEACB1B6
3,331,698 UART: [art] PUB.Y = F33D646868D670EE5BAEB370D93231F92BA5B18DD6B2EB02427F2F014F2C73DCC0C4D97B68A7FA63DBDE933E8975FBD4
3,338,660 UART: [art] SIG.R = D27DC8CF35FD6EF903224FADC6F51C952472B0F5BF97AD0BDD84BD7A7DC614D9B4110DA3EEBB6511D96E4FACF01FA17A
3,345,451 UART: [art] SIG.S = 0EBB6954873A7D13D997ECC572A10365D9A0BAF49E56D6763D1505FAE8EE35B2768BA5E04A851CEC75DA07D76F641258
3,368,997 UART: Caliptra RT
3,369,248 UART: [state] CFI Enabled
3,490,218 UART: [rt] RT listening for mailbox commands...
3,490,881 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,644 UART: [rt]cmd =0x46504c54, len=4
3,521,958 >>> mbox cmd response data (8 bytes)
3,522,189 UART: [rt] FIPS self test
3,522,517 UART: [kat] ++
3,522,669 UART: [kat] sha1
3,526,977 UART: [kat] SHA2-256
3,528,999 UART: [kat] SHA2-384
3,531,754 UART: [kat] SHA2-512-ACC
3,533,681 UART: [kat] ECC-384
3,543,433 UART: [kat] HMAC-384Kdf
3,547,922 UART: Fatal Error: 0x90030002
3,549,461 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,549,466 >>> mbox cmd response: failed
3,549,466 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,549,471 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,411 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,617 UART: [state] LifecycleState = Unprovisioned
86,272 UART: [state] DebugLocked = No
86,892 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,398 UART: [kat] SHA2-256
882,329 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,444 UART: [kat] ++
886,596 UART: [kat] sha1
890,820 UART: [kat] SHA2-256
892,758 UART: [kat] SHA2-384
895,639 UART: [kat] SHA2-512-ACC
897,540 UART: [kat] ECC-384
903,171 UART: [kat] HMAC-384Kdf
907,895 UART: [kat] LMS
1,476,091 UART: [kat] --
1,477,132 UART: [cold-reset] ++
1,477,536 UART: [fht] Storing FHT @ 0x50003400
1,480,337 UART: [idev] ++
1,480,505 UART: [idev] CDI.KEYID = 6
1,480,865 UART: [idev] SUBJECT.KEYID = 7
1,481,289 UART: [idev] UDS.KEYID = 0
1,481,634 ready_for_fw is high
1,481,634 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,509 UART: [idev] Erasing UDS.KEYID = 0
1,506,063 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,463 UART: [idev] --
1,515,308 UART: [ldev] ++
1,515,476 UART: [ldev] CDI.KEYID = 6
1,515,839 UART: [ldev] SUBJECT.KEYID = 5
1,516,265 UART: [ldev] AUTHORITY.KEYID = 7
1,516,728 UART: [ldev] FE.KEYID = 1
1,522,384 UART: [ldev] Erasing FE.KEYID = 1
1,548,309 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,054 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,661 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,373 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,439 UART: [ldev] --
1,587,920 UART: [fwproc] Waiting for Commands...
1,588,599 UART: [fwproc] Received command 0x46574c44
1,589,390 UART: [fwproc] Received Image of size 119428 bytes
2,944,394 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,316 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,534 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,165 >>> mbox cmd response: success
3,144,181 UART: [afmc] ++
3,144,349 UART: [afmc] CDI.KEYID = 6
3,144,711 UART: [afmc] SUBJECT.KEYID = 7
3,145,136 UART: [afmc] AUTHORITY.KEYID = 5
3,179,767 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,981 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,761 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,470 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,353 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,036 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,910 UART: [afmc] --
3,222,984 UART: [cold-reset] --
3,223,822 UART: [state] Locking Datavault
3,225,207 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,811 UART: [state] Locking ICCM
3,226,437 UART: [exit] Launching FMC @ 0x40000130
3,231,767 UART:
3,231,783 UART: Running Caliptra FMC ...
3,232,191 UART:
3,232,334 UART: [state] CFI Enabled
3,242,954 UART: [fht] FMC Alias Private Key: 7
3,361,550 UART: [art] Extend RT PCRs Done
3,361,978 UART: [art] Lock RT PCRs Done
3,362,968 UART: [art] Populate DV Done
3,371,073 UART: [fht] FMC Alias Private Key: 7
3,372,099 UART: [art] Derive CDI
3,372,379 UART: [art] Store in slot 0x4
3,458,053 UART: [art] Derive Key Pair
3,458,413 UART: [art] Store priv key in slot 0x5
3,471,726 UART: [art] Derive Key Pair - Done
3,486,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,277 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,042 UART: [art] PUB.X = E74B499F2B263E33DFC4C4D4EA40CE77B9648B7B5BC5C41C5F10079BA2627F57BEA89195753D1D1E601EB02C5443F6BE
3,509,821 UART: [art] PUB.Y = BBD61E0E185F310ADFA6E1B44FB67441C0371C0092D992D76F13437166869AF8EBE926B34D91997498A1A8AC93228C96
3,516,743 UART: [art] SIG.R = 64384E3779F6D01AF4C46A8B1EBEABBB26B67913D1915092D207869D25A49028D0F3B3412EACDDC19994BAC994E6F075
3,523,516 UART: [art] SIG.S = D440E087E1634DD5EC8F24E61D6829466CA6A1AF8CAA0B007254D1D0F62B5A27D24C0FE85B4C8BBA0BE53B62DF89B44D
3,547,127 UART: Caliptra RT
3,547,470 UART: [state] CFI Enabled
3,667,610 UART: [rt] RT listening for mailbox commands...
3,668,273 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,132 UART: [rt]cmd =0x46504c54, len=4
3,699,346 >>> mbox cmd response data (8 bytes)
3,699,527 UART: [rt] FIPS self test
3,699,855 UART: [kat] ++
3,700,007 UART: [kat] sha1
3,704,031 UART: [kat] SHA2-256
3,706,053 UART: [kat] SHA2-384
3,708,914 UART: [kat] SHA2-512-ACC
3,710,841 UART: [kat] ECC-384
3,720,799 UART: [kat] HMAC-384Kdf
3,725,568 UART: Fatal Error: 0x90030002
3,727,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,112 >>> mbox cmd response: failed
3,727,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,727,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,677 UART: [state] LifecycleState = Unprovisioned
86,332 UART: [state] DebugLocked = No
87,048 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,620 UART: [kat] SHA2-256
882,551 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,666 UART: [kat] ++
886,818 UART: [kat] sha1
890,924 UART: [kat] SHA2-256
892,862 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
902,827 UART: [kat] HMAC-384Kdf
907,275 UART: [kat] LMS
1,475,471 UART: [kat] --
1,476,216 UART: [cold-reset] ++
1,476,718 UART: [fht] Storing FHT @ 0x50003400
1,479,379 UART: [idev] ++
1,479,547 UART: [idev] CDI.KEYID = 6
1,479,907 UART: [idev] SUBJECT.KEYID = 7
1,480,331 UART: [idev] UDS.KEYID = 0
1,480,676 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,263 UART: [idev] Erasing UDS.KEYID = 0
1,505,283 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,965 UART: [idev] --
1,514,870 UART: [ldev] ++
1,515,038 UART: [ldev] CDI.KEYID = 6
1,515,401 UART: [ldev] SUBJECT.KEYID = 5
1,515,827 UART: [ldev] AUTHORITY.KEYID = 7
1,516,290 UART: [ldev] FE.KEYID = 1
1,521,500 UART: [ldev] Erasing FE.KEYID = 1
1,547,303 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,738 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,454 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,009 UART: [ldev] --
1,586,362 UART: [fwproc] Waiting for Commands...
1,587,017 UART: [fwproc] Received command 0x46574c44
1,587,808 UART: [fwproc] Received Image of size 119428 bytes
2,942,684 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,690 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,908 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,537 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,644 ready_for_fw is high
1,362,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,227 >>> mbox cmd response: success
3,054,558 UART:
3,054,574 UART: Running Caliptra FMC ...
3,054,982 UART:
3,055,125 UART: [state] CFI Enabled
3,065,843 UART: [fht] FMC Alias Private Key: 7
3,184,881 UART: [art] Extend RT PCRs Done
3,185,309 UART: [art] Lock RT PCRs Done
3,186,901 UART: [art] Populate DV Done
3,195,056 UART: [fht] FMC Alias Private Key: 7
3,196,124 UART: [art] Derive CDI
3,196,404 UART: [art] Store in slot 0x4
3,282,646 UART: [art] Derive Key Pair
3,283,006 UART: [art] Store priv key in slot 0x5
3,296,801 UART: [art] Derive Key Pair - Done
3,311,304 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,751 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,516 UART: [art] PUB.X = 590475BF58C14B1BDE50A3DFCDFE4FE1E647F9E40D398CC1F54E4375563DADE3D6148D60EBF36BC3955A1C9487D162E6
3,334,296 UART: [art] PUB.Y = 20A249E3436E3798975740858A44A252DE31F989D3C60C632587DE3C1BD328F0EDAFFEBEA67463649A9D3C4D11C21CEF
3,341,249 UART: [art] SIG.R = B1B50C5F19D6F039D9F209A7ED2AF533D6AC2FBC451ECA9CA330ECA72338DA3454DFC661933310332FE63A673F891020
3,348,023 UART: [art] SIG.S = 782686A1CE01A3540723F9B2F92AF7B52CAC840010F6229C67C4F3E4A76D62BAF791567A4A0673482C68EF222C0209DA
3,371,366 UART: Caliptra RT
3,371,709 UART: [state] CFI Enabled
3,491,707 UART: [rt] RT listening for mailbox commands...
3,492,370 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,099 UART: [rt]cmd =0x46504c54, len=4
3,523,219 >>> mbox cmd response data (8 bytes)
3,523,400 UART: [rt] FIPS self test
3,523,728 UART: [kat] ++
3,523,880 UART: [kat] sha1
3,528,220 UART: [kat] SHA2-256
3,530,242 UART: [kat] SHA2-384
3,533,175 UART: [kat] SHA2-512-ACC
3,535,102 UART: [kat] ECC-384
3,545,124 UART: [kat] HMAC-384Kdf
3,550,043 UART: Fatal Error: 0x90030002
3,551,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,551,587 >>> mbox cmd response: failed
3,551,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,551,592 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,062 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,995,511 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,556 UART: [state] LifecycleState = Unprovisioned
85,211 UART: [state] DebugLocked = No
85,897 UART: [state] WD Timer not started. Device not locked for debugging
87,066 UART: [kat] SHA2-256
890,616 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,720 UART: [kat] ++
894,872 UART: [kat] sha1
899,120 UART: [kat] SHA2-256
901,060 UART: [kat] SHA2-384
903,739 UART: [kat] SHA2-512-ACC
905,640 UART: [kat] ECC-384
915,383 UART: [kat] HMAC-384Kdf
920,037 UART: [kat] LMS
1,168,349 UART: [kat] --
1,169,360 UART: [cold-reset] ++
1,169,762 UART: [fht] FHT @ 0x50003400
1,172,560 UART: [idev] ++
1,172,728 UART: [idev] CDI.KEYID = 6
1,173,089 UART: [idev] SUBJECT.KEYID = 7
1,173,514 UART: [idev] UDS.KEYID = 0
1,173,860 ready_for_fw is high
1,173,860 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,881 UART: [idev] Erasing UDS.KEYID = 0
1,199,269 UART: [idev] Sha1 KeyId Algorithm
1,208,107 UART: [idev] --
1,209,172 UART: [ldev] ++
1,209,340 UART: [ldev] CDI.KEYID = 6
1,209,704 UART: [ldev] SUBJECT.KEYID = 5
1,210,131 UART: [ldev] AUTHORITY.KEYID = 7
1,210,594 UART: [ldev] FE.KEYID = 1
1,215,584 UART: [ldev] Erasing FE.KEYID = 1
1,241,601 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,959 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,675 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,564 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,276 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,186 UART: [ldev] --
1,280,569 UART: [fwproc] Wait for Commands...
1,281,296 UART: [fwproc] Recv command 0x46574c44
1,282,029 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,632 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,161 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,336 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,815 >>> mbox cmd response: success
2,836,911 UART: [afmc] ++
2,837,079 UART: [afmc] CDI.KEYID = 6
2,837,442 UART: [afmc] SUBJECT.KEYID = 7
2,837,868 UART: [afmc] AUTHORITY.KEYID = 5
2,873,651 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,568 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,317 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,908 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,609 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,296 UART: [afmc] --
2,917,259 UART: [cold-reset] --
2,918,217 UART: [state] Locking Datavault
2,919,314 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,918 UART: [state] Locking ICCM
2,920,570 UART: [exit] Launching FMC @ 0x40000130
2,925,900 UART:
2,925,916 UART: Running Caliptra FMC ...
2,926,324 UART:
2,926,378 UART: [state] CFI Enabled
2,936,820 UART: [fht] FMC Alias Private Key: 7
3,056,086 UART: [art] Extend RT PCRs Done
3,056,514 UART: [art] Lock RT PCRs Done
3,058,076 UART: [art] Populate DV Done
3,066,247 UART: [fht] FMC Alias Private Key: 7
3,067,223 UART: [art] Derive CDI
3,067,503 UART: [art] Store in slot 0x4
3,153,342 UART: [art] Derive Key Pair
3,153,702 UART: [art] Store priv key in slot 0x5
3,166,862 UART: [art] Derive Key Pair - Done
3,181,835 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,390 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,155 UART: [art] PUB.X = 481F8B3E881AE97C5C9DE16086F1454CCF8AEE8CCE51F76422A27DB479B1772B856AE1C0B8BF909F59DC67C184308316
3,204,933 UART: [art] PUB.Y = 4D6ABD2DBAF6E67A1DF0C399DA90482C5CCAFA7EDF7FF074C5AD3A1AAA718A542E2B8F5BEF193389CE5362DB3EC81B41
3,211,915 UART: [art] SIG.R = 54C66D0CF34CC61C19F9B9AFA39BDE4C635C0754D78A5D511394333569BA6DED49C52338CEFDAAAD35ECE69117A95129
3,218,693 UART: [art] SIG.S = 1AB4D624EC6FEDB790D169E87D33B111F9480B1F2D931266157624546DA02AB158873568863715CBD33BB1BB4219EE28
3,242,364 UART: Caliptra RT
3,242,615 UART: [state] CFI Enabled
3,361,191 UART: [rt] RT listening for mailbox commands...
3,361,854 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,413 UART: [rt]cmd =0x46504c54, len=4
3,392,559 >>> mbox cmd response data (8 bytes)
3,392,778 UART: [rt] FIPS self test
3,393,106 UART: [kat] ++
3,393,258 UART: [kat] sha1
3,397,438 UART: [kat] SHA2-256
3,399,460 UART: [kat] SHA2-384
3,402,183 UART: [kat] SHA2-512-ACC
3,404,110 UART: [kat] ECC-384
3,414,500 UART: [kat] HMAC-384Kdf
3,419,168 UART: Fatal Error: 0x90030002
3,420,707 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,712 >>> mbox cmd response: failed
3,420,712 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,420,717 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,034 UART: [state] LifecycleState = Unprovisioned
85,689 UART: [state] DebugLocked = No
86,337 UART: [state] WD Timer not started. Device not locked for debugging
87,618 UART: [kat] SHA2-256
891,168 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,272 UART: [kat] ++
895,424 UART: [kat] sha1
899,718 UART: [kat] SHA2-256
901,658 UART: [kat] SHA2-384
904,319 UART: [kat] SHA2-512-ACC
906,220 UART: [kat] ECC-384
916,405 UART: [kat] HMAC-384Kdf
920,951 UART: [kat] LMS
1,169,263 UART: [kat] --
1,170,104 UART: [cold-reset] ++
1,170,448 UART: [fht] FHT @ 0x50003400
1,172,946 UART: [idev] ++
1,173,114 UART: [idev] CDI.KEYID = 6
1,173,475 UART: [idev] SUBJECT.KEYID = 7
1,173,900 UART: [idev] UDS.KEYID = 0
1,174,246 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,099 UART: [idev] Erasing UDS.KEYID = 0
1,198,699 UART: [idev] Sha1 KeyId Algorithm
1,207,369 UART: [idev] --
1,208,388 UART: [ldev] ++
1,208,556 UART: [ldev] CDI.KEYID = 6
1,208,920 UART: [ldev] SUBJECT.KEYID = 5
1,209,347 UART: [ldev] AUTHORITY.KEYID = 7
1,209,810 UART: [ldev] FE.KEYID = 1
1,214,698 UART: [ldev] Erasing FE.KEYID = 1
1,241,335 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,667 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,383 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,272 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,984 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,064 UART: [ldev] --
1,280,419 UART: [fwproc] Wait for Commands...
1,281,122 UART: [fwproc] Recv command 0x46574c44
1,281,855 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,058 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,587 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,762 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,263 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,012 ready_for_fw is high
1,059,012 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,594 >>> mbox cmd response: success
2,751,207 UART:
2,751,223 UART: Running Caliptra FMC ...
2,751,631 UART:
2,751,685 UART: [state] CFI Enabled
2,762,183 UART: [fht] FMC Alias Private Key: 7
2,881,467 UART: [art] Extend RT PCRs Done
2,881,895 UART: [art] Lock RT PCRs Done
2,883,387 UART: [art] Populate DV Done
2,891,596 UART: [fht] FMC Alias Private Key: 7
2,892,550 UART: [art] Derive CDI
2,892,830 UART: [art] Store in slot 0x4
2,978,599 UART: [art] Derive Key Pair
2,978,959 UART: [art] Store priv key in slot 0x5
2,992,535 UART: [art] Derive Key Pair - Done
3,007,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,895 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,660 UART: [art] PUB.X = D8255ED72B7E1529F58CD389C9297DA9794FF7CB8A9FBCD678017A48FEDDA5E2AE010DBF38E8D551A22664CADAEFD7E2
3,030,445 UART: [art] PUB.Y = 55895EB20761261C07652381D7DC0BDA87D65CF0B6EE5E45E879A7D43F6EEEB5BAD16A694C282ADB9C146C0ECC44B5FE
3,037,401 UART: [art] SIG.R = AEF4C73751F10053C7B2C93448510EF96EE75953E22E8EC6CCB7F22FA00D45D76117C4A8C460E66FF8CEC92F0F684EFE
3,044,154 UART: [art] SIG.S = 54223F92ACF9A53ADA3B0256D091344908C2D2A578506F06DFEBF36C436B807C1274FDD51C5F459A39C24D1D3A86CAE7
3,067,599 UART: Caliptra RT
3,067,850 UART: [state] CFI Enabled
3,186,879 UART: [rt] RT listening for mailbox commands...
3,187,542 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,271 UART: [rt]cmd =0x46504c54, len=4
3,218,339 >>> mbox cmd response data (8 bytes)
3,218,652 UART: [rt] FIPS self test
3,218,980 UART: [kat] ++
3,219,132 UART: [kat] sha1
3,223,520 UART: [kat] SHA2-256
3,225,542 UART: [kat] SHA2-384
3,228,367 UART: [kat] SHA2-512-ACC
3,230,294 UART: [kat] ECC-384
3,240,254 UART: [kat] HMAC-384Kdf
3,245,114 UART: Fatal Error: 0x90030002
3,246,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,658 >>> mbox cmd response: failed
3,246,658 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,246,663 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,002 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.99s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,515 UART: [state] LifecycleState = Unprovisioned
86,170 UART: [state] DebugLocked = No
86,864 UART: [state] WD Timer not started. Device not locked for debugging
88,219 UART: [kat] SHA2-256
891,769 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,873 UART: [kat] ++
896,025 UART: [kat] sha1
900,185 UART: [kat] SHA2-256
902,125 UART: [kat] SHA2-384
904,690 UART: [kat] SHA2-512-ACC
906,591 UART: [kat] ECC-384
916,396 UART: [kat] HMAC-384Kdf
920,922 UART: [kat] LMS
1,169,234 UART: [kat] --
1,170,377 UART: [cold-reset] ++
1,170,759 UART: [fht] FHT @ 0x50003400
1,173,307 UART: [idev] ++
1,173,475 UART: [idev] CDI.KEYID = 6
1,173,836 UART: [idev] SUBJECT.KEYID = 7
1,174,261 UART: [idev] UDS.KEYID = 0
1,174,607 ready_for_fw is high
1,174,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,460 UART: [idev] Erasing UDS.KEYID = 0
1,199,870 UART: [idev] Sha1 KeyId Algorithm
1,208,760 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,061 UART: [ldev] Erasing FE.KEYID = 1
1,242,386 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,042 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,758 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,647 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,359 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,473 UART: [ldev] --
1,281,824 UART: [fwproc] Wait for Commands...
1,282,429 UART: [fwproc] Recv command 0x46574c44
1,283,162 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,709 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,064 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,239 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,724 >>> mbox cmd response: success
2,838,930 UART: [afmc] ++
2,839,098 UART: [afmc] CDI.KEYID = 6
2,839,461 UART: [afmc] SUBJECT.KEYID = 7
2,839,887 UART: [afmc] AUTHORITY.KEYID = 5
2,875,462 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,983 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,732 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,442 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,323 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,024 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,731 UART: [afmc] --
2,918,588 UART: [cold-reset] --
2,919,476 UART: [state] Locking Datavault
2,920,563 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,167 UART: [state] Locking ICCM
2,921,793 UART: [exit] Launching FMC @ 0x40000130
2,927,123 UART:
2,927,139 UART: Running Caliptra FMC ...
2,927,547 UART:
2,927,690 UART: [state] CFI Enabled
2,937,830 UART: [fht] FMC Alias Private Key: 7
3,057,510 UART: [art] Extend RT PCRs Done
3,057,938 UART: [art] Lock RT PCRs Done
3,059,340 UART: [art] Populate DV Done
3,067,673 UART: [fht] FMC Alias Private Key: 7
3,068,829 UART: [art] Derive CDI
3,069,109 UART: [art] Store in slot 0x4
3,154,916 UART: [art] Derive Key Pair
3,155,276 UART: [art] Store priv key in slot 0x5
3,168,080 UART: [art] Derive Key Pair - Done
3,183,278 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,649 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,414 UART: [art] PUB.X = 62D3068DA6789154E3EAFF574F1C88D11639EC3B692BC0336245BF41ACAA65F9EBFCA3861347F7C8C1BFB707A15ADB41
3,206,192 UART: [art] PUB.Y = 4FCBC69B4239832DA96A69C98FE3FCDF33B2736525B7218B5109EACD6858F6DD85F92B92C03C66E627B4A496E109CE5E
3,213,146 UART: [art] SIG.R = E6C696ADF2A4CA7602D6F2A678F74BED3430825B4AAFCDBCF317D93E2788E69C7B7951C9306693465B697CAEA028E4A2
3,219,925 UART: [art] SIG.S = 3BC1E4E251BAA06F7A8B5B97B1437E3E81E12CC0181779EC3B609722FD20192F07B9A001FC548A4B43FDDEE8AB5E8651
3,243,731 UART: Caliptra RT
3,244,074 UART: [state] CFI Enabled
3,363,929 UART: [rt] RT listening for mailbox commands...
3,364,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,597 UART: [rt]cmd =0x46504c54, len=4
3,395,827 >>> mbox cmd response data (8 bytes)
3,396,190 UART: [rt] FIPS self test
3,396,518 UART: [kat] ++
3,396,670 UART: [kat] sha1
3,400,828 UART: [kat] SHA2-256
3,402,850 UART: [kat] SHA2-384
3,405,629 UART: [kat] SHA2-512-ACC
3,407,556 UART: [kat] ECC-384
3,417,796 UART: [kat] HMAC-384Kdf
3,422,448 UART: Fatal Error: 0x90030002
3,423,987 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,992 >>> mbox cmd response: failed
3,423,992 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,423,997 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,355 UART: [state] LifecycleState = Unprovisioned
86,010 UART: [state] DebugLocked = No
86,520 UART: [state] WD Timer not started. Device not locked for debugging
87,689 UART: [kat] SHA2-256
891,239 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,343 UART: [kat] ++
895,495 UART: [kat] sha1
899,621 UART: [kat] SHA2-256
901,561 UART: [kat] SHA2-384
904,208 UART: [kat] SHA2-512-ACC
906,109 UART: [kat] ECC-384
915,658 UART: [kat] HMAC-384Kdf
920,518 UART: [kat] LMS
1,168,830 UART: [kat] --
1,169,875 UART: [cold-reset] ++
1,170,383 UART: [fht] FHT @ 0x50003400
1,172,909 UART: [idev] ++
1,173,077 UART: [idev] CDI.KEYID = 6
1,173,438 UART: [idev] SUBJECT.KEYID = 7
1,173,863 UART: [idev] UDS.KEYID = 0
1,174,209 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,950 UART: [idev] Erasing UDS.KEYID = 0
1,199,288 UART: [idev] Sha1 KeyId Algorithm
1,208,138 UART: [idev] --
1,209,291 UART: [ldev] ++
1,209,459 UART: [ldev] CDI.KEYID = 6
1,209,823 UART: [ldev] SUBJECT.KEYID = 5
1,210,250 UART: [ldev] AUTHORITY.KEYID = 7
1,210,713 UART: [ldev] FE.KEYID = 1
1,215,757 UART: [ldev] Erasing FE.KEYID = 1
1,242,708 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,344 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,949 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,661 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,655 UART: [ldev] --
1,282,098 UART: [fwproc] Wait for Commands...
1,282,729 UART: [fwproc] Recv command 0x46574c44
1,283,462 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,207 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,296 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,471 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,978 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,273 ready_for_fw is high
1,059,273 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,557 >>> mbox cmd response: success
2,754,738 UART:
2,754,754 UART: Running Caliptra FMC ...
2,755,162 UART:
2,755,305 UART: [state] CFI Enabled
2,765,431 UART: [fht] FMC Alias Private Key: 7
2,884,249 UART: [art] Extend RT PCRs Done
2,884,677 UART: [art] Lock RT PCRs Done
2,886,277 UART: [art] Populate DV Done
2,894,478 UART: [fht] FMC Alias Private Key: 7
2,895,432 UART: [art] Derive CDI
2,895,712 UART: [art] Store in slot 0x4
2,981,607 UART: [art] Derive Key Pair
2,981,967 UART: [art] Store priv key in slot 0x5
2,996,335 UART: [art] Derive Key Pair - Done
3,011,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,817 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,582 UART: [art] PUB.X = A9B294B290A07F0797F95A26E8AB040803B2E6E74AE6CDD92ADFAADA69213B3C9CD73139E5EE8FB259DE0195B2422D44
3,034,351 UART: [art] PUB.Y = A6EA1674BC92C27C034ED391255B2C086EAED6C5C6E2991D3053F9B0245AD64E2E17A546102B9BE9011355107A5F40B4
3,041,294 UART: [art] SIG.R = 6B830D2EDC16D804603C12FA5F0863B9350D24557C0FF119A3966BA59AB65C5311165395B4E3DBA0F7656A3FC74353E4
3,048,049 UART: [art] SIG.S = FE29FDA6C9CEDCD5973E189D6EA418F5B1E2790FF9523B30B26FC4DDB42912F595B4A61A7164BF8A1C2702CBC07D2381
3,072,085 UART: Caliptra RT
3,072,428 UART: [state] CFI Enabled
3,192,309 UART: [rt] RT listening for mailbox commands...
3,192,972 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,571 UART: [rt]cmd =0x46504c54, len=4
3,223,741 >>> mbox cmd response data (8 bytes)
3,224,096 UART: [rt] FIPS self test
3,224,424 UART: [kat] ++
3,224,576 UART: [kat] sha1
3,228,692 UART: [kat] SHA2-256
3,230,714 UART: [kat] SHA2-384
3,233,739 UART: [kat] SHA2-512-ACC
3,235,666 UART: [kat] ECC-384
3,245,986 UART: [kat] HMAC-384Kdf
3,250,768 UART: Fatal Error: 0x90030002
3,252,307 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,312 >>> mbox cmd response: failed
3,252,312 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,317 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,833 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,063 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,483 UART: [state] WD Timer not started. Device not locked for debugging
87,630 UART: [kat] SHA2-256
893,280 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,405 UART: [kat] ++
897,557 UART: [kat] sha1
901,787 UART: [kat] SHA2-256
903,727 UART: [kat] SHA2-384
906,648 UART: [kat] SHA2-512-ACC
908,549 UART: [kat] ECC-384
918,608 UART: [kat] HMAC-384Kdf
923,002 UART: [kat] LMS
1,171,330 UART: [kat] --
1,172,329 UART: [cold-reset] ++
1,172,843 UART: [fht] FHT @ 0x50003400
1,175,486 UART: [idev] ++
1,175,654 UART: [idev] CDI.KEYID = 6
1,176,014 UART: [idev] SUBJECT.KEYID = 7
1,176,438 UART: [idev] UDS.KEYID = 0
1,176,783 ready_for_fw is high
1,176,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,252 UART: [idev] Erasing UDS.KEYID = 0
1,201,435 UART: [idev] Sha1 KeyId Algorithm
1,209,805 UART: [idev] --
1,210,859 UART: [ldev] ++
1,211,027 UART: [ldev] CDI.KEYID = 6
1,211,390 UART: [ldev] SUBJECT.KEYID = 5
1,211,816 UART: [ldev] AUTHORITY.KEYID = 7
1,212,279 UART: [ldev] FE.KEYID = 1
1,217,659 UART: [ldev] Erasing FE.KEYID = 1
1,244,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,821 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,537 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,428 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,140 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,133 UART: [ldev] --
1,283,418 UART: [fwproc] Wait for Commands...
1,284,024 UART: [fwproc] Recv command 0x46574c44
1,284,752 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,091 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,054 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,224 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,763 >>> mbox cmd response: success
2,839,887 UART: [afmc] ++
2,840,055 UART: [afmc] CDI.KEYID = 6
2,840,417 UART: [afmc] SUBJECT.KEYID = 7
2,840,842 UART: [afmc] AUTHORITY.KEYID = 5
2,875,659 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,014 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,762 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,471 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,354 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,055 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,873 UART: [afmc] --
2,918,927 UART: [cold-reset] --
2,919,795 UART: [state] Locking Datavault
2,920,828 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,432 UART: [state] Locking ICCM
2,922,032 UART: [exit] Launching FMC @ 0x40000130
2,927,362 UART:
2,927,378 UART: Running Caliptra FMC ...
2,927,786 UART:
2,927,840 UART: [state] CFI Enabled
2,938,484 UART: [fht] FMC Alias Private Key: 7
3,056,690 UART: [art] Extend RT PCRs Done
3,057,118 UART: [art] Lock RT PCRs Done
3,059,056 UART: [art] Populate DV Done
3,067,337 UART: [fht] FMC Alias Private Key: 7
3,068,455 UART: [art] Derive CDI
3,068,735 UART: [art] Store in slot 0x4
3,154,224 UART: [art] Derive Key Pair
3,154,584 UART: [art] Store priv key in slot 0x5
3,167,668 UART: [art] Derive Key Pair - Done
3,182,352 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,201 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,966 UART: [art] PUB.X = 50299487B723DB58BAF6F4DED70934EDD4B7936F733FE42DA687754FA2CB8876027DE933B26A7218CCF4D7F8061A3942
3,205,731 UART: [art] PUB.Y = 0F8BA7C89889852EC44BF77FFA38930A783F47D8EDF970CE2F89F3E231A55F4FEF3BF0FFDE693D6E0D6B6523E13537E2
3,212,688 UART: [art] SIG.R = B78964DBF40BBDC7D68D6ACD88BEB9D9B308756871E8647BFEF98DB78DABCFE274334AD24314391B8FD55CB714A01FC7
3,219,472 UART: [art] SIG.S = B6003407C5BD23203A32D6CDB0CEAF7AF7AEE9D6FD88B48B65060BB1370B2B548C0143202D852D31B665685596614E4B
3,243,025 UART: Caliptra RT
3,243,276 UART: [state] CFI Enabled
3,363,064 UART: [rt] RT listening for mailbox commands...
3,363,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,810 UART: [rt]cmd =0x46504c54, len=4
3,394,876 >>> mbox cmd response data (8 bytes)
3,395,063 UART: [rt] FIPS self test
3,395,391 UART: [kat] ++
3,395,543 UART: [kat] sha1
3,399,691 UART: [kat] SHA2-256
3,401,713 UART: [kat] SHA2-384
3,404,666 UART: [kat] SHA2-512-ACC
3,406,593 UART: [kat] ECC-384
3,416,465 UART: [kat] HMAC-384Kdf
3,421,241 UART: Fatal Error: 0x90030002
3,422,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,422,785 >>> mbox cmd response: failed
3,422,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,422,790 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,328 UART: [state] LifecycleState = Unprovisioned
85,983 UART: [state] DebugLocked = No
86,473 UART: [state] WD Timer not started. Device not locked for debugging
87,832 UART: [kat] SHA2-256
893,482 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,607 UART: [kat] ++
897,759 UART: [kat] sha1
902,029 UART: [kat] SHA2-256
903,969 UART: [kat] SHA2-384
906,672 UART: [kat] SHA2-512-ACC
908,573 UART: [kat] ECC-384
918,652 UART: [kat] HMAC-384Kdf
923,232 UART: [kat] LMS
1,171,560 UART: [kat] --
1,172,161 UART: [cold-reset] ++
1,172,725 UART: [fht] FHT @ 0x50003400
1,175,252 UART: [idev] ++
1,175,420 UART: [idev] CDI.KEYID = 6
1,175,780 UART: [idev] SUBJECT.KEYID = 7
1,176,204 UART: [idev] UDS.KEYID = 0
1,176,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,984 UART: [idev] Erasing UDS.KEYID = 0
1,201,303 UART: [idev] Sha1 KeyId Algorithm
1,209,799 UART: [idev] --
1,210,871 UART: [ldev] ++
1,211,039 UART: [ldev] CDI.KEYID = 6
1,211,402 UART: [ldev] SUBJECT.KEYID = 5
1,211,828 UART: [ldev] AUTHORITY.KEYID = 7
1,212,291 UART: [ldev] FE.KEYID = 1
1,217,543 UART: [ldev] Erasing FE.KEYID = 1
1,243,494 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,838 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,550 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,717 UART: [ldev] --
1,283,054 UART: [fwproc] Wait for Commands...
1,283,772 UART: [fwproc] Recv command 0x46574c44
1,284,500 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,159 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,654 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,824 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,537 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.60s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,665 ready_for_fw is high
1,060,665 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,030 >>> mbox cmd response: success
2,754,389 UART:
2,754,405 UART: Running Caliptra FMC ...
2,754,813 UART:
2,754,867 UART: [state] CFI Enabled
2,765,179 UART: [fht] FMC Alias Private Key: 7
2,883,759 UART: [art] Extend RT PCRs Done
2,884,187 UART: [art] Lock RT PCRs Done
2,885,975 UART: [art] Populate DV Done
2,894,360 UART: [fht] FMC Alias Private Key: 7
2,895,398 UART: [art] Derive CDI
2,895,678 UART: [art] Store in slot 0x4
2,981,493 UART: [art] Derive Key Pair
2,981,853 UART: [art] Store priv key in slot 0x5
2,995,497 UART: [art] Derive Key Pair - Done
3,010,166 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,483 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,248 UART: [art] PUB.X = AE097FAFB4E9C003E713F13A4801700DC5B98B4D86C6D0B6260F8B8E36ADE097F58150FE487F98EB2C0BD2908817ED2B
3,033,012 UART: [art] PUB.Y = 4A5971FB6B8E5ED4228962AF12B349DBD8F426302C3879E2DB99664DAD2895F4125BE62C1ED958BCE557975FC17F0962
3,039,963 UART: [art] SIG.R = F5968F59F82851DA844E8D06BB76B64502E08A38746A438CC7D979CAC5B629EB8CDEB4CAE7FD5DC58460178F97FF31D0
3,046,739 UART: [art] SIG.S = 329FB886AAB372F55913EC74253B44917D67D30CDFB6674A6DC1D8C864A1A186D5F8059163A407B1B4F673835A3FF205
3,070,591 UART: Caliptra RT
3,070,842 UART: [state] CFI Enabled
3,190,981 UART: [rt] RT listening for mailbox commands...
3,191,644 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,747 UART: [rt]cmd =0x46504c54, len=4
3,222,875 >>> mbox cmd response data (8 bytes)
3,223,212 UART: [rt] FIPS self test
3,223,540 UART: [kat] ++
3,223,692 UART: [kat] sha1
3,228,110 UART: [kat] SHA2-256
3,230,132 UART: [kat] SHA2-384
3,233,125 UART: [kat] SHA2-512-ACC
3,235,052 UART: [kat] ECC-384
3,245,606 UART: [kat] HMAC-384Kdf
3,250,056 UART: Fatal Error: 0x90030002
3,251,595 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,251,600 >>> mbox cmd response: failed
3,251,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,251,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,137 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,716 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,123 UART: [state] LifecycleState = Unprovisioned
85,778 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,477 UART: [kat] SHA2-256
893,127 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,252 UART: [kat] ++
897,404 UART: [kat] sha1
901,508 UART: [kat] SHA2-256
903,448 UART: [kat] SHA2-384
906,353 UART: [kat] SHA2-512-ACC
908,254 UART: [kat] ECC-384
917,757 UART: [kat] HMAC-384Kdf
922,289 UART: [kat] LMS
1,170,617 UART: [kat] --
1,171,680 UART: [cold-reset] ++
1,172,228 UART: [fht] FHT @ 0x50003400
1,174,967 UART: [idev] ++
1,175,135 UART: [idev] CDI.KEYID = 6
1,175,495 UART: [idev] SUBJECT.KEYID = 7
1,175,919 UART: [idev] UDS.KEYID = 0
1,176,264 ready_for_fw is high
1,176,264 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,943 UART: [idev] Erasing UDS.KEYID = 0
1,201,204 UART: [idev] Sha1 KeyId Algorithm
1,209,724 UART: [idev] --
1,210,912 UART: [ldev] ++
1,211,080 UART: [ldev] CDI.KEYID = 6
1,211,443 UART: [ldev] SUBJECT.KEYID = 5
1,211,869 UART: [ldev] AUTHORITY.KEYID = 7
1,212,332 UART: [ldev] FE.KEYID = 1
1,217,680 UART: [ldev] Erasing FE.KEYID = 1
1,244,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,138 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,854 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,745 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,457 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,760 UART: [ldev] --
1,284,195 UART: [fwproc] Wait for Commands...
1,284,885 UART: [fwproc] Recv command 0x46574c44
1,285,613 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,166 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,669,463 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,700,633 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,842,224 >>> mbox cmd response: success
2,843,456 UART: [afmc] ++
2,843,624 UART: [afmc] CDI.KEYID = 6
2,843,986 UART: [afmc] SUBJECT.KEYID = 7
2,844,411 UART: [afmc] AUTHORITY.KEYID = 5
2,880,074 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,896,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,897,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,902,890 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,908,773 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,914,474 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,922,198 UART: [afmc] --
2,923,286 UART: [cold-reset] --
2,924,284 UART: [state] Locking Datavault
2,925,219 UART: [state] Locking PCR0, PCR1 and PCR31
2,925,823 UART: [state] Locking ICCM
2,926,303 UART: [exit] Launching FMC @ 0x40000130
2,931,633 UART:
2,931,649 UART: Running Caliptra FMC ...
2,932,057 UART:
2,932,200 UART: [state] CFI Enabled
2,942,896 UART: [fht] FMC Alias Private Key: 7
3,062,612 UART: [art] Extend RT PCRs Done
3,063,040 UART: [art] Lock RT PCRs Done
3,064,604 UART: [art] Populate DV Done
3,072,779 UART: [fht] FMC Alias Private Key: 7
3,073,817 UART: [art] Derive CDI
3,074,097 UART: [art] Store in slot 0x4
3,160,274 UART: [art] Derive Key Pair
3,160,634 UART: [art] Store priv key in slot 0x5
3,174,550 UART: [art] Derive Key Pair - Done
3,189,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,204,814 UART: [art] Erasing AUTHORITY.KEYID = 7
3,205,579 UART: [art] PUB.X = 029CE7FF79DB5775574E79EDFCA0E8F30FA4746E48A76CC1D7569BA70005DA1FED077D10FB89602B9F974D8529353A7D
3,212,325 UART: [art] PUB.Y = B3B8C09B6D1035F7A2F1049DC2259315E430166FF0D65DEEE5A5A73625BA59E1FE2B7CD2D7FDCD08EFEA3DE2080A8893
3,219,281 UART: [art] SIG.R = B8B149AA75158B06A5D2627536BB76132D7FF24C9588A689F00D2F40BD6ED2E62944C0F8425B1B651281CF6FB2B7D11A
3,226,049 UART: [art] SIG.S = 0D8CFE8DE8D132686A356033F011CADBAB381861247552E67C7CBC0BBBEC42965E1F6599D33A572D6FBC85B82A3E99ED
3,250,291 UART: Caliptra RT
3,250,634 UART: [state] CFI Enabled
3,370,019 UART: [rt] RT listening for mailbox commands...
3,370,682 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,400,407 UART: [rt]cmd =0x46504c54, len=4
3,401,671 >>> mbox cmd response data (8 bytes)
3,401,866 UART: [rt] FIPS self test
3,402,194 UART: [kat] ++
3,402,346 UART: [kat] sha1
3,406,506 UART: [kat] SHA2-256
3,408,528 UART: [kat] SHA2-384
3,411,521 UART: [kat] SHA2-512-ACC
3,413,448 UART: [kat] ECC-384
3,423,930 UART: [kat] HMAC-384Kdf
3,428,598 UART: Fatal Error: 0x90030002
3,430,137 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,430,142 >>> mbox cmd response: failed
3,430,142 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,430,147 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,753 UART: [kat] SHA2-256
893,403 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,528 UART: [kat] ++
897,680 UART: [kat] sha1
901,956 UART: [kat] SHA2-256
903,896 UART: [kat] SHA2-384
906,593 UART: [kat] SHA2-512-ACC
908,494 UART: [kat] ECC-384
917,689 UART: [kat] HMAC-384Kdf
922,359 UART: [kat] LMS
1,170,687 UART: [kat] --
1,171,540 UART: [cold-reset] ++
1,172,104 UART: [fht] FHT @ 0x50003400
1,174,855 UART: [idev] ++
1,175,023 UART: [idev] CDI.KEYID = 6
1,175,383 UART: [idev] SUBJECT.KEYID = 7
1,175,807 UART: [idev] UDS.KEYID = 0
1,176,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,267 UART: [idev] Erasing UDS.KEYID = 0
1,200,052 UART: [idev] Sha1 KeyId Algorithm
1,208,472 UART: [idev] --
1,209,508 UART: [ldev] ++
1,209,676 UART: [ldev] CDI.KEYID = 6
1,210,039 UART: [ldev] SUBJECT.KEYID = 5
1,210,465 UART: [ldev] AUTHORITY.KEYID = 7
1,210,928 UART: [ldev] FE.KEYID = 1
1,216,282 UART: [ldev] Erasing FE.KEYID = 1
1,243,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,524 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,240 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,131 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,843 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,914 UART: [ldev] --
1,282,349 UART: [fwproc] Wait for Commands...
1,283,157 UART: [fwproc] Recv command 0x46574c44
1,283,885 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,684 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,983 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,153 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,630 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,802 ready_for_fw is high
1,060,802 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,269 >>> mbox cmd response: success
2,754,410 UART:
2,754,426 UART: Running Caliptra FMC ...
2,754,834 UART:
2,754,977 UART: [state] CFI Enabled
2,765,207 UART: [fht] FMC Alias Private Key: 7
2,884,849 UART: [art] Extend RT PCRs Done
2,885,277 UART: [art] Lock RT PCRs Done
2,887,135 UART: [art] Populate DV Done
2,895,498 UART: [fht] FMC Alias Private Key: 7
2,896,680 UART: [art] Derive CDI
2,896,960 UART: [art] Store in slot 0x4
2,982,749 UART: [art] Derive Key Pair
2,983,109 UART: [art] Store priv key in slot 0x5
2,996,435 UART: [art] Derive Key Pair - Done
3,011,360 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,949 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,714 UART: [art] PUB.X = A9C4099BD36DD0AE30126C7D3342D79140BD8F94A44C9AF31CAA406693CBA2D1340DE0671F86F862DEAEB156E7034C09
3,034,482 UART: [art] PUB.Y = DD07B933D7C0E64DC132FA4E3BCBB0CFF3320F445B3250DDBB2C9B6DBC7725E562AE94AA6ECF5D8E56A7818C3FAE4DDB
3,041,458 UART: [art] SIG.R = 333225F07FFD3902A5EABFF766700A07FC0964A3971DFA8333E598D595A43F15AA33D711065371138DCA77B93E80803A
3,048,211 UART: [art] SIG.S = 5A84532A21A0BF2D939213368E2D6BA002411F56C45BCCC5320B71C7BA1661104472BF475024376655CE46D04002C08A
3,071,954 UART: Caliptra RT
3,072,297 UART: [state] CFI Enabled
3,192,509 UART: [rt] RT listening for mailbox commands...
3,193,172 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,069 UART: [rt]cmd =0x46504c54, len=4
3,224,111 >>> mbox cmd response data (8 bytes)
3,224,306 UART: [rt] FIPS self test
3,224,634 UART: [kat] ++
3,224,786 UART: [kat] sha1
3,229,098 UART: [kat] SHA2-256
3,231,120 UART: [kat] SHA2-384
3,234,151 UART: [kat] SHA2-512-ACC
3,236,078 UART: [kat] ECC-384
3,246,310 UART: [kat] HMAC-384Kdf
3,250,898 UART: Fatal Error: 0x90030002
3,252,437 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,442 >>> mbox cmd response: failed
3,252,442 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,252,447 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,900 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,119 >>> mbox cmd response: success
test self_tests::kat_hmac384_tag_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,103 writing to cptra_bootfsm_go
5,729,898 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,879,637 >>> mbox cmd response: failed
5,880,195 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,028,956 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,442,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,442 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,167 writing to cptra_bootfsm_go
5,722,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,872,373 >>> mbox cmd response: failed
5,872,960 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,021,832 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,435,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,722 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,276 writing to cptra_bootfsm_go
6,058,252 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,784 >>> mbox cmd response: failed
6,209,342 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,358,258 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
17,286,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,001,019 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,307 writing to cptra_bootfsm_go
6,055,692 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,205,521 >>> mbox cmd response: failed
6,206,079 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,354,912 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
17,289,396 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,999,665 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,996 writing to cptra_bootfsm_go
5,746,335 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,896,078 >>> mbox cmd response: failed
5,896,660 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,045,527 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
3,456,695 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,313,583 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,116 writing to cptra_bootfsm_go
5,732,184 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
5,881,940 >>> mbox cmd response: failed
5,882,526 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,031,397 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,427,809 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,118 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
14,615 writing to cptra_bootfsm_go
6,067,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,217,381 >>> mbox cmd response: failed
6,217,954 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,367,178 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
17,273,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
28,001,322 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,384 writing to cptra_bootfsm_go
6,058,290 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,208,237 >>> mbox cmd response: failed
6,208,808 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
6,357,691 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
17,284,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
27,986,908 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,912 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,920 >>> mbox cmd response: failed
1,095,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,926 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,164 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,980 >>> mbox cmd response: failed
1,095,980 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,986 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,452 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.88s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,041 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,049 >>> mbox cmd response: failed
1,096,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,055 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,518 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,011 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,507 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,515 >>> mbox cmd response: failed
1,096,515 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,521 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,505 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,982 >>> mbox cmd response: failed
1,095,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,026 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.55s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,094,882 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,094,890 >>> mbox cmd response: failed
1,094,890 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,094,896 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,036 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,096,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,903 >>> mbox cmd response: failed
1,096,903 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,096,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,603 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,095,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,987 >>> mbox cmd response: failed
1,095,987 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,095,993 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,696 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,483 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,008 writing to cptra_bootfsm_go
192,221 UART:
192,572 UART: Running Caliptra ROM ...
193,760 UART:
193,920 UART: [state] CFI Enabled
263,597 UART: [state] LifecycleState = Unprovisioned
265,586 UART: [state] DebugLocked = No
267,923 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,015 UART: [kat] SHA2-256
441,720 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,254 UART: [kat] ++
452,700 UART: [kat] sha1
463,222 UART: [kat] SHA2-256
465,978 UART: [kat] SHA2-384
471,304 UART: [kat] SHA2-512-ACC
473,684 UART: [kat] ECC-384
2,765,886 UART: [kat] HMAC-384Kdf
2,799,596 UART: [kat] LMS
3,989,943 UART: [kat] --
3,994,743 UART: [cold-reset] ++
3,997,179 UART: [fht] Storing FHT @ 0x50003400
4,008,023 UART: [idev] ++
4,008,596 UART: [idev] CDI.KEYID = 6
4,009,577 UART: [idev] SUBJECT.KEYID = 7
4,010,836 UART: [idev] UDS.KEYID = 0
4,011,788 ready_for_fw is high
4,011,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,162,176 UART: [idev] Erasing UDS.KEYID = 0
7,345,592 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,919 UART: [idev] --
7,370,061 UART: [ldev] ++
7,370,643 UART: [ldev] CDI.KEYID = 6
7,371,626 UART: [ldev] SUBJECT.KEYID = 5
7,372,846 UART: [ldev] AUTHORITY.KEYID = 7
7,374,080 UART: [ldev] FE.KEYID = 1
7,420,861 UART: [ldev] Erasing FE.KEYID = 1
10,753,444 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,226 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,681 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,214 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,997 UART: [ldev] --
13,113,981 UART: [fwproc] Waiting for Commands...
13,116,793 UART: [fwproc] Received command 0x46574c44
13,118,985 UART: [fwproc] Received Image of size 119428 bytes
17,245,253 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,326,194 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,399,334 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,730,180 >>> mbox cmd response: success
17,734,579 UART: [afmc] ++
17,735,178 UART: [afmc] CDI.KEYID = 6
17,736,094 UART: [afmc] SUBJECT.KEYID = 7
17,737,322 UART: [afmc] AUTHORITY.KEYID = 5
21,104,264 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,404,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,406,394 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,420,818 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,435,546 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,449,959 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,470,298 UART: [afmc] --
23,474,757 UART: [cold-reset] --
23,477,753 UART: [state] Locking Datavault
23,484,084 UART: [state] Locking PCR0, PCR1 and PCR31
23,485,788 UART: [state] Locking ICCM
23,487,182 UART: [exit] Launching FMC @ 0x40000130
23,495,572 UART:
23,495,808 UART: Running Caliptra FMC ...
23,496,912 UART:
23,497,078 UART: [state] CFI Enabled
23,563,222 UART: [fht] FMC Alias Private Key: 7
25,903,392 UART: [art] Extend RT PCRs Done
25,904,639 UART: [art] Lock RT PCRs Done
25,905,995 UART: [art] Populate DV Done
25,911,343 UART: [fht] FMC Alias Private Key: 7
25,913,013 UART: [art] Derive CDI
25,913,838 UART: [art] Store in slot 0x4
25,971,693 UART: [art] Derive Key Pair
25,972,695 UART: [art] Store priv key in slot 0x5
29,264,929 UART: [art] Derive Key Pair - Done
29,278,026 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,911 UART: [art] Erasing AUTHORITY.KEYID = 7
31,568,424 UART: [art] PUB.X = 6D9BDFACCE80D56559AD0A56FC5B475F73BAF9560E62869649621A760CEE59031337C545012988EA299C1709E552118B
31,575,707 UART: [art] PUB.Y = D6B3E37A0402940CD96D3CF3928F6A853A587A88B8689F2F32A4415A54114F605714694100C0A01B897238916E2F935E
31,582,909 UART: [art] SIG.R = 768A0E48FB876F2E38EFFC8EC7424F6062DF900A2928367B4603273167ABD93BF0163221F03DAC249D80CF309C968701
31,590,320 UART: [art] SIG.S = C4CD42B35674D0CDCD8ACD0127F7ABBBE0FC8531CD27B1F0D9FEE3DD388789385DBE1A77C92248E09C6BC4AEE67BBF34
32,895,843 UART: Caliptra RT
32,896,562 UART: [state] CFI Enabled
33,073,376 UART: [rt] RT listening for mailbox commands...
33,075,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,105,200 UART: [rt]cmd =0x46504c54, len=4
33,106,846 >>> mbox cmd response data (8 bytes)
33,108,011 UART: [rt] FIPS self test
33,108,967 UART: [kat] ++
33,109,415 UART: [kat] sha1
33,113,816 UART: [kat] SHA2-256
33,115,746 UART: [kat] SHA2-384
33,118,661 UART: [kat] SHA2-512-ACC
33,120,895 UART: [kat] ECC-384
36,393,916 UART: [kat] HMAC-384Kdf
36,400,911 UART: [kat] LMS
37,178,528 UART: Fatal Error: 0x90070002
37,213,975 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,364,066 >>> mbox cmd response: failed
37,364,761 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,514,707 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
189,998 UART:
190,298 UART: Running Caliptra ROM ...
191,408 UART:
191,558 UART: [state] CFI Enabled
259,385 UART: [state] LifecycleState = Unprovisioned
261,307 UART: [state] DebugLocked = No
264,196 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,358 UART: [kat] SHA2-256
439,064 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,563 UART: [kat] ++
450,044 UART: [kat] sha1
461,359 UART: [kat] SHA2-256
464,064 UART: [kat] SHA2-384
470,101 UART: [kat] SHA2-512-ACC
472,432 UART: [kat] ECC-384
2,761,460 UART: [kat] HMAC-384Kdf
2,772,334 UART: [kat] LMS
3,962,589 UART: [kat] --
3,966,595 UART: [cold-reset] ++
3,968,741 UART: [fht] Storing FHT @ 0x50003400
3,980,008 UART: [idev] ++
3,980,582 UART: [idev] CDI.KEYID = 6
3,981,518 UART: [idev] SUBJECT.KEYID = 7
3,982,787 UART: [idev] UDS.KEYID = 0
3,984,334 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,134,433 UART: [idev] Erasing UDS.KEYID = 0
7,321,740 UART: [idev] Using Sha1 for KeyId Algorithm
7,344,853 UART: [idev] --
7,348,652 UART: [ldev] ++
7,349,227 UART: [ldev] CDI.KEYID = 6
7,350,167 UART: [ldev] SUBJECT.KEYID = 5
7,351,377 UART: [ldev] AUTHORITY.KEYID = 7
7,352,678 UART: [ldev] FE.KEYID = 1
7,395,118 UART: [ldev] Erasing FE.KEYID = 1
10,731,601 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,043,013 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,057,594 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,072,440 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,086,952 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,106,039 UART: [ldev] --
13,110,435 UART: [fwproc] Waiting for Commands...
13,112,249 UART: [fwproc] Received command 0x46574c44
13,114,466 UART: [fwproc] Received Image of size 119428 bytes
17,226,601 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,303,032 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,376,230 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,708,500 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.88s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,785,296 ready_for_fw is high
3,785,780 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,943,547 >>> mbox cmd response: success
23,628,703 UART:
23,629,080 UART: Running Caliptra FMC ...
23,630,235 UART:
23,630,394 UART: [state] CFI Enabled
23,697,059 UART: [fht] FMC Alias Private Key: 7
26,037,310 UART: [art] Extend RT PCRs Done
26,038,535 UART: [art] Lock RT PCRs Done
26,040,495 UART: [art] Populate DV Done
26,046,082 UART: [fht] FMC Alias Private Key: 7
26,047,789 UART: [art] Derive CDI
26,048,635 UART: [art] Store in slot 0x4
26,107,212 UART: [art] Derive Key Pair
26,108,259 UART: [art] Store priv key in slot 0x5
29,401,311 UART: [art] Derive Key Pair - Done
29,414,322 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,703,115 UART: [art] Erasing AUTHORITY.KEYID = 7
31,704,625 UART: [art] PUB.X = AB858D9E841365D12D492C3FCFCA2EB78C9004FB455FF86FDF2CEA983A1E67E0C4158B442AE23D1E1D2795B3DC365FBD
31,711,926 UART: [art] PUB.Y = 66C862E65B4DBAC9D2F77962EFB8AF075336A2999DB75A20BF018512AA3BEE338657C78AA2D6337A0A96CB9F818D6C1F
31,719,207 UART: [art] SIG.R = 172CD5F70A27C9FBB84C91653510BF5AC4944F0B1E0CF90CE72D0EDE96353882A936BB294AE72B1A937A4564CB62FFBC
31,726,593 UART: [art] SIG.S = 3467F94D272BC8F5A550A41C3C0E67ED626EDD6C6B4DAB3D6FC905534483DDEF2B2A9AF5C69933C2E9A641F87706E365
33,031,849 UART: Caliptra RT
33,032,570 UART: [state] CFI Enabled
33,209,308 UART: [rt] RT listening for mailbox commands...
33,211,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,240,832 UART: [rt]cmd =0x46504c54, len=4
33,242,338 >>> mbox cmd response data (8 bytes)
33,243,693 UART: [rt] FIPS self test
33,244,650 UART: [kat] ++
33,245,102 UART: [kat] sha1
33,249,603 UART: [kat] SHA2-256
33,251,544 UART: [kat] SHA2-384
33,254,560 UART: [kat] SHA2-512-ACC
33,256,855 UART: [kat] ECC-384
36,530,804 UART: [kat] HMAC-384Kdf
36,537,543 UART: [kat] LMS
37,315,082 UART: Fatal Error: 0x90070002
37,350,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,500,361 >>> mbox cmd response: failed
37,500,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,650,867 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,798,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,955,596 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.90s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,357 writing to cptra_bootfsm_go
192,735 UART:
193,112 UART: Running Caliptra ROM ...
194,302 UART:
604,026 UART: [state] CFI Enabled
617,859 UART: [state] LifecycleState = Unprovisioned
619,774 UART: [state] DebugLocked = No
621,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
626,197 UART: [kat] SHA2-256
795,923 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,503 UART: [kat] ++
806,953 UART: [kat] sha1
816,767 UART: [kat] SHA2-256
819,498 UART: [kat] SHA2-384
826,210 UART: [kat] SHA2-512-ACC
828,592 UART: [kat] ECC-384
3,112,568 UART: [kat] HMAC-384Kdf
3,124,994 UART: [kat] LMS
4,315,082 UART: [kat] --
4,318,312 UART: [cold-reset] ++
4,319,831 UART: [fht] Storing FHT @ 0x50003400
4,331,320 UART: [idev] ++
4,331,891 UART: [idev] CDI.KEYID = 6
4,332,812 UART: [idev] SUBJECT.KEYID = 7
4,334,063 UART: [idev] UDS.KEYID = 0
4,335,140 ready_for_fw is high
4,335,381 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,485,842 UART: [idev] Erasing UDS.KEYID = 0
7,621,173 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,980 UART: [idev] --
7,648,251 UART: [ldev] ++
7,648,840 UART: [ldev] CDI.KEYID = 6
7,649,816 UART: [ldev] SUBJECT.KEYID = 5
7,650,982 UART: [ldev] AUTHORITY.KEYID = 7
7,652,300 UART: [ldev] FE.KEYID = 1
7,664,451 UART: [ldev] Erasing FE.KEYID = 1
10,951,302 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,456 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,075 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,307,052 UART: [ldev] --
13,311,356 UART: [fwproc] Waiting for Commands...
13,313,565 UART: [fwproc] Received command 0x46574c44
13,315,760 UART: [fwproc] Received Image of size 119428 bytes
17,429,128 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,508,891 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,582,084 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,914,038 >>> mbox cmd response: success
17,918,336 UART: [afmc] ++
17,918,950 UART: [afmc] CDI.KEYID = 6
17,919,867 UART: [afmc] SUBJECT.KEYID = 7
17,921,092 UART: [afmc] AUTHORITY.KEYID = 5
21,237,435 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,534,508 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,536,823 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,551,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,565,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,580,389 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,602,916 UART: [afmc] --
23,606,570 UART: [cold-reset] --
23,610,232 UART: [state] Locking Datavault
23,614,838 UART: [state] Locking PCR0, PCR1 and PCR31
23,616,596 UART: [state] Locking ICCM
23,617,724 UART: [exit] Launching FMC @ 0x40000130
23,626,123 UART:
23,626,390 UART: Running Caliptra FMC ...
23,627,503 UART:
23,627,667 UART: [state] CFI Enabled
23,635,501 UART: [fht] FMC Alias Private Key: 7
25,975,896 UART: [art] Extend RT PCRs Done
25,977,125 UART: [art] Lock RT PCRs Done
25,978,623 UART: [art] Populate DV Done
25,984,098 UART: [fht] FMC Alias Private Key: 7
25,985,806 UART: [art] Derive CDI
25,986,631 UART: [art] Store in slot 0x4
26,029,508 UART: [art] Derive Key Pair
26,030,521 UART: [art] Store priv key in slot 0x5
29,272,930 UART: [art] Derive Key Pair - Done
29,286,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,566,322 UART: [art] Erasing AUTHORITY.KEYID = 7
31,567,840 UART: [art] PUB.X = B5213E4E5D6093AB4E6C4D864218AACBD144D683E9954F98B853EF89503744491E419C9659F2E394D0B505F38FD45A36
31,575,127 UART: [art] PUB.Y = 73EEB8CE987EF72FCE74BCCF7DC440D1B56191634D34906F8873B65CD8B13EDBE6F5FC3CEFC5C9D2931DE14B4CD8BCD1
31,582,390 UART: [art] SIG.R = 25B9B2448720605AF1872192AE40A466C092650476996E4EC83564619379E21CE8AAA4B62D5D737BDF2D5D16A428C313
31,589,738 UART: [art] SIG.S = 296D9974758C8A51761A6FE6B02F0D30E434B1DD79BDC7BDF006330EC0953B935CC6A0A32A1BD395E5214F9B1E3866EC
32,894,827 UART: Caliptra RT
32,895,530 UART: [state] CFI Enabled
33,029,504 UART: [rt] RT listening for mailbox commands...
33,031,359 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,060,987 UART: [rt]cmd =0x46504c54, len=4
33,062,354 >>> mbox cmd response data (8 bytes)
33,063,674 UART: [rt] FIPS self test
33,064,631 UART: [kat] ++
33,065,084 UART: [kat] sha1
33,069,652 UART: [kat] SHA2-256
33,071,534 UART: [kat] SHA2-384
33,074,529 UART: [kat] SHA2-512-ACC
33,076,766 UART: [kat] ECC-384
36,319,778 UART: [kat] HMAC-384Kdf
36,325,800 UART: [kat] LMS
37,103,515 UART: Fatal Error: 0x90070002
37,138,788 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,288,840 >>> mbox cmd response: failed
37,289,476 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,439,417 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
189,997 UART:
190,295 UART: Running Caliptra ROM ...
191,406 UART:
3,088,096 UART: [state] CFI Enabled
3,101,483 UART: [state] LifecycleState = Unprovisioned
3,103,421 UART: [state] DebugLocked = No
3,104,820 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
3,109,744 UART: [kat] SHA2-256
3,279,496 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
3,290,022 UART: [kat] ++
3,290,573 UART: [kat] sha1
3,301,851 UART: [kat] SHA2-256
3,304,551 UART: [kat] SHA2-384
3,311,785 UART: [kat] SHA2-512-ACC
3,314,143 UART: [kat] ECC-384
5,599,627 UART: [kat] HMAC-384Kdf
5,611,698 UART: [kat] LMS
6,801,774 UART: [kat] --
6,805,036 UART: [cold-reset] ++
6,807,307 UART: [fht] Storing FHT @ 0x50003400
6,819,115 UART: [idev] ++
6,819,684 UART: [idev] CDI.KEYID = 6
6,820,598 UART: [idev] SUBJECT.KEYID = 7
6,821,893 UART: [idev] UDS.KEYID = 0
6,823,429 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
6,973,331 UART: [idev] Erasing UDS.KEYID = 0
10,109,468 UART: [idev] Using Sha1 for KeyId Algorithm
10,131,988 UART: [idev] --
10,137,496 UART: [ldev] ++
10,138,114 UART: [ldev] CDI.KEYID = 6
10,139,087 UART: [ldev] SUBJECT.KEYID = 5
10,140,257 UART: [ldev] AUTHORITY.KEYID = 7
10,141,554 UART: [ldev] FE.KEYID = 1
10,154,965 UART: [ldev] Erasing FE.KEYID = 1
13,439,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
15,732,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
15,746,560 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
15,761,416 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
15,775,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
15,794,284 UART: [ldev] --
15,799,284 UART: [fwproc] Waiting for Commands...
15,802,531 UART: [fwproc] Received command 0x46574c44
15,804,728 UART: [fwproc] Received Image of size 119428 bytes
19,919,387 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,993,722 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
20,066,897 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
20,398,507 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,321 writing to cptra_bootfsm_go
4,129,091 ready_for_fw is high
4,129,511 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,181,366 >>> mbox cmd response: success
23,822,006 UART:
23,822,403 UART: Running Caliptra FMC ...
23,823,555 UART:
23,823,744 UART: [state] CFI Enabled
23,831,488 UART: [fht] FMC Alias Private Key: 7
26,171,578 UART: [art] Extend RT PCRs Done
26,172,844 UART: [art] Lock RT PCRs Done
26,174,505 UART: [art] Populate DV Done
26,179,731 UART: [fht] FMC Alias Private Key: 7
26,181,229 UART: [art] Derive CDI
26,182,005 UART: [art] Store in slot 0x4
26,224,340 UART: [art] Derive Key Pair
26,225,386 UART: [art] Store priv key in slot 0x5
29,467,700 UART: [art] Derive Key Pair - Done
29,480,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,760,954 UART: [art] Erasing AUTHORITY.KEYID = 7
31,762,469 UART: [art] PUB.X = CD3087887CAF13B0D6D9F433F4DD42BB7733E50D3772D8D543F8992AEBD1978AE78866FAC963C91655CE4AF7D883B851
31,769,715 UART: [art] PUB.Y = 7A7EC38B66294E1BEAF2080CC138D72080261F17EFFF7E8CCCC31BBB600ECD4FE1FED656D5801BAA2ACE47422988CB1E
31,777,009 UART: [art] SIG.R = 0D1452867628BABB9DF23D728B6ACF6C079C13B3E2A26E9CF2F426E88A846563243444C2B9A83B00E2F56134F9F3B4E4
31,784,442 UART: [art] SIG.S = 6B2EBDAFE1A13EABE670FD917E5A589A3AD9C36732D4E4A3C89B7D805B74F9A84F4A72168786C0E0780062434A1D1506
33,089,198 UART: Caliptra RT
33,089,902 UART: [state] CFI Enabled
33,222,375 UART: [rt] RT listening for mailbox commands...
33,224,231 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,253,990 UART: [rt]cmd =0x46504c54, len=4
33,255,736 >>> mbox cmd response data (8 bytes)
33,256,804 UART: [rt] FIPS self test
33,257,753 UART: [kat] ++
33,258,212 UART: [kat] sha1
33,262,575 UART: [kat] SHA2-256
33,264,447 UART: [kat] SHA2-384
33,267,528 UART: [kat] SHA2-512-ACC
33,269,774 UART: [kat] ECC-384
36,512,776 UART: [kat] HMAC-384Kdf
36,518,796 UART: [kat] LMS
37,296,379 UART: Fatal Error: 0x90070002
37,331,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,481,652 >>> mbox cmd response: failed
37,482,305 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
37,632,238 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
6,424,673 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
20,484,127 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
192,475 UART:
192,861 UART: Running Caliptra ROM ...
194,030 UART:
194,188 UART: [state] CFI Enabled
264,945 UART: [state] LifecycleState = Unprovisioned
266,876 UART: [state] DebugLocked = No
269,137 UART: [state] WD Timer not started. Device not locked for debugging
273,154 UART: [kat] SHA2-256
452,755 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,575 UART: [kat] ++
464,028 UART: [kat] sha1
475,340 UART: [kat] SHA2-256
477,999 UART: [kat] SHA2-384
482,508 UART: [kat] SHA2-512-ACC
484,884 UART: [kat] ECC-384
2,948,409 UART: [kat] HMAC-384Kdf
2,972,641 UART: [kat] LMS
3,449,130 UART: [kat] --
3,454,413 UART: [cold-reset] ++
3,455,437 UART: [fht] FHT @ 0x50003400
3,467,621 UART: [idev] ++
3,468,192 UART: [idev] CDI.KEYID = 6
3,469,156 UART: [idev] SUBJECT.KEYID = 7
3,470,427 UART: [idev] UDS.KEYID = 0
3,471,337 ready_for_fw is high
3,471,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,811 UART: [idev] Erasing UDS.KEYID = 0
5,988,036 UART: [idev] Sha1 KeyId Algorithm
6,012,844 UART: [idev] --
6,016,686 UART: [ldev] ++
6,017,318 UART: [ldev] CDI.KEYID = 6
6,018,204 UART: [ldev] SUBJECT.KEYID = 5
6,019,425 UART: [ldev] AUTHORITY.KEYID = 7
6,020,670 UART: [ldev] FE.KEYID = 1
6,058,577 UART: [ldev] Erasing FE.KEYID = 1
8,563,531 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,329 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,963 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,956 UART: [ldev] --
10,375,647 UART: [fwproc] Wait for Commands...
10,377,468 UART: [fwproc] Recv command 0x46574c44
10,379,475 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,420 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,955,516 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,028,546 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,663 >>> mbox cmd response: success
14,365,618 UART: [afmc] ++
14,366,212 UART: [afmc] CDI.KEYID = 6
14,367,187 UART: [afmc] SUBJECT.KEYID = 7
14,368,407 UART: [afmc] AUTHORITY.KEYID = 5
16,912,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,655,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,658,013 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,673,829 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,689,840 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,705,471 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,729,806 UART: [afmc] --
18,732,981 UART: [cold-reset] --
18,736,692 UART: [state] Locking Datavault
18,741,239 UART: [state] Locking PCR0, PCR1 and PCR31
18,742,994 UART: [state] Locking ICCM
18,744,983 UART: [exit] Launching FMC @ 0x40000130
18,753,385 UART:
18,753,627 UART: Running Caliptra FMC ...
18,754,736 UART:
18,754,902 UART: [state] CFI Enabled
18,812,567 UART: [fht] FMC Alias Private Key: 7
20,578,994 UART: [art] Extend RT PCRs Done
20,580,220 UART: [art] Lock RT PCRs Done
20,582,055 UART: [art] Populate DV Done
20,587,307 UART: [fht] FMC Alias Private Key: 7
20,589,015 UART: [art] Derive CDI
20,589,841 UART: [art] Store in slot 0x4
20,644,835 UART: [art] Derive Key Pair
20,645,884 UART: [art] Store priv key in slot 0x5
23,108,906 UART: [art] Derive Key Pair - Done
23,121,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,835,402 UART: [art] Erasing AUTHORITY.KEYID = 7
24,836,893 UART: [art] PUB.X = 876007895D793404E0F037F97D8506F71584045903DCE5C1B5D9A298EC2507113FF793765493AD6A40CEB1EAA1BD7579
24,844,145 UART: [art] PUB.Y = 84482AB33ED6F254F15A06C16B24BF21E5E739DE8585087990528790745FF13DF68094F73813FC2A03F47E50C932EFF5
24,851,389 UART: [art] SIG.R = B67F20C446F7912FCC533963816BB7C037BC8B7A05D7E1A6578F97892D2B50119B172FDB806A434087BF77FAFE56ED5E
24,858,823 UART: [art] SIG.S = AC73EBE59C3F6D2D3E6676CA6057949C7B47ED7362D845D78BF4B55D45ABE50AF4F615E7B49CC516A0935D70925B099E
25,837,809 UART: Caliptra RT
25,838,526 UART: [state] CFI Enabled
26,019,650 UART: [rt] RT listening for mailbox commands...
26,021,527 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,051,109 UART: [rt]cmd =0x46504c54, len=4
26,052,575 >>> mbox cmd response data (8 bytes)
26,053,645 UART: [rt] FIPS self test
26,054,605 UART: [kat] ++
26,055,069 UART: [kat] sha1
26,059,478 UART: [kat] SHA2-256
26,061,367 UART: [kat] SHA2-384
26,064,497 UART: [kat] SHA2-512-ACC
26,066,746 UART: [kat] ECC-384
28,510,427 UART: [kat] HMAC-384Kdf
28,537,700 UART: [kat] LMS
28,769,342 UART: Fatal Error: 0x90070002
28,804,701 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,954,746 >>> mbox cmd response: failed
28,955,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,105,315 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,001 UART:
190,318 UART: Running Caliptra ROM ...
191,357 UART:
191,501 UART: [state] CFI Enabled
250,390 UART: [state] LifecycleState = Unprovisioned
252,311 UART: [state] DebugLocked = No
253,989 UART: [state] WD Timer not started. Device not locked for debugging
257,450 UART: [kat] SHA2-256
437,063 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
447,848 UART: [kat] ++
448,296 UART: [kat] sha1
458,044 UART: [kat] SHA2-256
460,736 UART: [kat] SHA2-384
466,683 UART: [kat] SHA2-512-ACC
469,066 UART: [kat] ECC-384
2,912,721 UART: [kat] HMAC-384Kdf
2,937,589 UART: [kat] LMS
3,414,122 UART: [kat] --
3,419,370 UART: [cold-reset] ++
3,420,284 UART: [fht] FHT @ 0x50003400
3,432,843 UART: [idev] ++
3,433,445 UART: [idev] CDI.KEYID = 6
3,434,338 UART: [idev] SUBJECT.KEYID = 7
3,435,613 UART: [idev] UDS.KEYID = 0
3,437,104 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,587,369 UART: [idev] Erasing UDS.KEYID = 0
5,954,728 UART: [idev] Sha1 KeyId Algorithm
5,977,924 UART: [idev] --
5,982,462 UART: [ldev] ++
5,983,052 UART: [ldev] CDI.KEYID = 6
5,983,938 UART: [ldev] SUBJECT.KEYID = 5
5,985,208 UART: [ldev] AUTHORITY.KEYID = 7
5,986,628 UART: [ldev] FE.KEYID = 1
6,025,407 UART: [ldev] Erasing FE.KEYID = 1
8,531,310 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,266,884 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,282,751 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,298,600 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,314,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,335,434 UART: [ldev] --
10,340,489 UART: [fwproc] Wait for Commands...
10,342,051 UART: [fwproc] Recv command 0x46574c44
10,344,050 UART: [fwproc] Recv'd Img size: 119428 bytes
13,840,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,918,665 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,991,709 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,323,273 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.29s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,184 writing to cptra_bootfsm_go
3,463,404 ready_for_fw is high
3,463,870 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,991 >>> mbox cmd response: success
18,535,519 UART:
18,535,923 UART: Running Caliptra FMC ...
18,537,053 UART:
18,537,219 UART: [state] CFI Enabled
18,587,939 UART: [fht] FMC Alias Private Key: 7
20,374,765 UART: [art] Extend RT PCRs Done
20,375,995 UART: [art] Lock RT PCRs Done
20,377,743 UART: [art] Populate DV Done
20,383,075 UART: [fht] FMC Alias Private Key: 7
20,384,658 UART: [art] Derive CDI
20,385,488 UART: [art] Store in slot 0x4
20,441,101 UART: [art] Derive Key Pair
20,442,150 UART: [art] Store priv key in slot 0x5
22,904,773 UART: [art] Derive Key Pair - Done
22,917,724 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,630,615 UART: [art] Erasing AUTHORITY.KEYID = 7
24,632,122 UART: [art] PUB.X = 8D8114C59D0F43AC025E6F8DB273EDA2525F974806DB7DCF75BCD2447B597017EEACEE7446C87A06156353BD91D25440
24,639,407 UART: [art] PUB.Y = 9CDF0E7CC757F7F8676F009467761E7F397BA9C19F7558A4DF4359DD9CCF09650919EB2718C07C07751B7476678610D8
24,646,613 UART: [art] SIG.R = CE891677771623BBFEB45977CB79CB33C524F7352AD66B6A724E266F81808D7A7F45B9A82749D41546447E23C437286C
24,654,060 UART: [art] SIG.S = A32692D4315B303F1650522B4AF6C2667700D8FC596019B7E43E44C2388F0F3132EECBC2AEE36660E2484E7F1026DEC7
25,632,994 UART: Caliptra RT
25,633,699 UART: [state] CFI Enabled
25,811,346 UART: [rt] RT listening for mailbox commands...
25,813,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,842,897 UART: [rt]cmd =0x46504c54, len=4
25,844,484 >>> mbox cmd response data (8 bytes)
25,845,597 UART: [rt] FIPS self test
25,846,567 UART: [kat] ++
25,847,020 UART: [kat] sha1
25,851,262 UART: [kat] SHA2-256
25,853,204 UART: [kat] SHA2-384
25,856,131 UART: [kat] SHA2-512-ACC
25,858,440 UART: [kat] ECC-384
28,304,433 UART: [kat] HMAC-384Kdf
28,330,698 UART: [kat] LMS
28,562,334 UART: Fatal Error: 0x90070002
28,597,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,747,849 >>> mbox cmd response: failed
28,748,481 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,898,439 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,445,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,229,637 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,376 writing to cptra_bootfsm_go
192,534 UART:
192,897 UART: Running Caliptra ROM ...
194,015 UART:
603,903 UART: [state] CFI Enabled
621,523 UART: [state] LifecycleState = Unprovisioned
623,534 UART: [state] DebugLocked = No
625,933 UART: [state] WD Timer not started. Device not locked for debugging
629,353 UART: [kat] SHA2-256
808,979 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,783 UART: [kat] ++
820,235 UART: [kat] sha1
830,546 UART: [kat] SHA2-256
833,281 UART: [kat] SHA2-384
838,070 UART: [kat] SHA2-512-ACC
840,452 UART: [kat] ECC-384
3,283,371 UART: [kat] HMAC-384Kdf
3,295,825 UART: [kat] LMS
3,772,356 UART: [kat] --
3,776,142 UART: [cold-reset] ++
3,778,217 UART: [fht] FHT @ 0x50003400
3,789,909 UART: [idev] ++
3,790,503 UART: [idev] CDI.KEYID = 6
3,791,390 UART: [idev] SUBJECT.KEYID = 7
3,792,640 UART: [idev] UDS.KEYID = 0
3,793,620 ready_for_fw is high
3,793,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,824 UART: [idev] Erasing UDS.KEYID = 0
6,268,215 UART: [idev] Sha1 KeyId Algorithm
6,292,860 UART: [idev] --
6,297,815 UART: [ldev] ++
6,298,401 UART: [ldev] CDI.KEYID = 6
6,299,319 UART: [ldev] SUBJECT.KEYID = 5
6,300,537 UART: [ldev] AUTHORITY.KEYID = 7
6,301,776 UART: [ldev] FE.KEYID = 1
6,313,341 UART: [ldev] Erasing FE.KEYID = 1
8,791,771 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,225 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,136 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,547,966 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,563,526 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,585,219 UART: [ldev] --
10,591,187 UART: [fwproc] Wait for Commands...
10,593,125 UART: [fwproc] Recv command 0x46574c44
10,595,117 UART: [fwproc] Recv'd Img size: 119428 bytes
14,083,206 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,766 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,788 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,558,271 >>> mbox cmd response: success
14,562,914 UART: [afmc] ++
14,563,501 UART: [afmc] CDI.KEYID = 6
14,564,414 UART: [afmc] SUBJECT.KEYID = 7
14,565,637 UART: [afmc] AUTHORITY.KEYID = 5
17,068,505 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,663 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,833 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,654 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,731 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,272 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,867,022 UART: [afmc] --
18,871,061 UART: [cold-reset] --
18,874,710 UART: [state] Locking Datavault
18,879,634 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,336 UART: [state] Locking ICCM
18,883,705 UART: [exit] Launching FMC @ 0x40000130
18,892,112 UART:
18,892,356 UART: Running Caliptra FMC ...
18,893,463 UART:
18,893,641 UART: [state] CFI Enabled
18,901,860 UART: [fht] FMC Alias Private Key: 7
20,668,304 UART: [art] Extend RT PCRs Done
20,669,528 UART: [art] Lock RT PCRs Done
20,670,836 UART: [art] Populate DV Done
20,676,142 UART: [fht] FMC Alias Private Key: 7
20,677,730 UART: [art] Derive CDI
20,678,549 UART: [art] Store in slot 0x4
20,721,412 UART: [art] Derive Key Pair
20,722,452 UART: [art] Store priv key in slot 0x5
23,148,939 UART: [art] Derive Key Pair - Done
23,162,043 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,098 UART: [art] Erasing AUTHORITY.KEYID = 7
24,869,600 UART: [art] PUB.X = 2F2E44DA6D9A2B0D5065417BC9CF17EC96CBD771A9DD40F0BB19259940B60CEA3A7E55E9BE2134EFC9CDA374443F777F
24,876,877 UART: [art] PUB.Y = 1D3105B209A3C12203653D7BA27A7E35E8743D23577E65DAA6A58B3E8EA37F933D763166CECCD2C3560C4E3C58E31C9E
24,884,140 UART: [art] SIG.R = 1675CD2DF5ABD04A7180FBB4DE905FFF192E937885CEA232396D7D250D338E61A38F7E0F39E8D1503C8B3194D504394B
24,891,507 UART: [art] SIG.S = 1C40F6B4146638C8E6E4B8A1C68DA7C3DFFD532F82024E75DD558D92DB82B0BAC909879E632D752D1A83918C5924D347
25,870,377 UART: Caliptra RT
25,871,120 UART: [state] CFI Enabled
26,003,757 UART: [rt] RT listening for mailbox commands...
26,005,627 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,035,279 UART: [rt]cmd =0x46504c54, len=4
26,036,977 >>> mbox cmd response data (8 bytes)
26,038,001 UART: [rt] FIPS self test
26,038,961 UART: [kat] ++
26,039,422 UART: [kat] sha1
26,043,939 UART: [kat] SHA2-256
26,045,817 UART: [kat] SHA2-384
26,048,728 UART: [kat] SHA2-512-ACC
26,050,974 UART: [kat] ECC-384
28,478,914 UART: [kat] HMAC-384Kdf
28,484,769 UART: [kat] LMS
28,716,442 UART: Fatal Error: 0x90070002
28,751,706 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,901,681 >>> mbox cmd response: failed
28,902,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,052,640 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,124 UART:
190,409 UART: Running Caliptra ROM ...
191,519 UART:
11,477,470 UART: [state] CFI Enabled
11,494,748 UART: [state] LifecycleState = Unprovisioned
11,496,680 UART: [state] DebugLocked = No
11,498,369 UART: [state] WD Timer not started. Device not locked for debugging
11,502,167 UART: [kat] SHA2-256
11,681,770 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
11,692,576 UART: [kat] ++
11,693,070 UART: [kat] sha1
11,703,067 UART: [kat] SHA2-256
11,705,777 UART: [kat] SHA2-384
11,712,044 UART: [kat] SHA2-512-ACC
11,714,408 UART: [kat] ECC-384
14,159,188 UART: [kat] HMAC-384Kdf
14,171,470 UART: [kat] LMS
14,647,995 UART: [kat] --
14,653,446 UART: [cold-reset] ++
14,654,674 UART: [fht] FHT @ 0x50003400
14,665,115 UART: [idev] ++
14,665,689 UART: [idev] CDI.KEYID = 6
14,666,601 UART: [idev] SUBJECT.KEYID = 7
14,667,875 UART: [idev] UDS.KEYID = 0
14,669,397 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,819,303 UART: [idev] Erasing UDS.KEYID = 0
17,148,728 UART: [idev] Sha1 KeyId Algorithm
17,172,692 UART: [idev] --
17,178,129 UART: [ldev] ++
17,178,719 UART: [ldev] CDI.KEYID = 6
17,179,633 UART: [ldev] SUBJECT.KEYID = 5
17,180,800 UART: [ldev] AUTHORITY.KEYID = 7
17,182,092 UART: [ldev] FE.KEYID = 1
17,194,477 UART: [ldev] Erasing FE.KEYID = 1
19,673,501 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,393,664 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,409,530 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,425,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,440,960 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,461,081 UART: [ldev] --
21,467,107 UART: [fwproc] Wait for Commands...
21,469,262 UART: [fwproc] Recv command 0x46574c44
21,471,251 UART: [fwproc] Recv'd Img size: 119428 bytes
24,962,764 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
25,046,307 UART: [fwproc] Load FMC at address 0x40000000 len 20044
25,119,329 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,450,499 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,783,339 ready_for_fw is high
3,783,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,464,600 >>> mbox cmd response: success
18,707,615 UART:
18,708,001 UART: Running Caliptra FMC ...
18,709,155 UART:
18,709,319 UART: [state] CFI Enabled
18,717,100 UART: [fht] FMC Alias Private Key: 7
20,483,337 UART: [art] Extend RT PCRs Done
20,484,569 UART: [art] Lock RT PCRs Done
20,485,817 UART: [art] Populate DV Done
20,491,190 UART: [fht] FMC Alias Private Key: 7
20,492,691 UART: [art] Derive CDI
20,493,459 UART: [art] Store in slot 0x4
20,536,426 UART: [art] Derive Key Pair
20,537,429 UART: [art] Store priv key in slot 0x5
22,964,268 UART: [art] Derive Key Pair - Done
22,977,268 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,511 UART: [art] Erasing AUTHORITY.KEYID = 7
24,685,025 UART: [art] PUB.X = F7747857D1C74153B1CF018AA3D1C0FEA4FE6DCFA23E8141A1CA41B014BBE3F1CF80B151A5FD798F2AA76C9635233038
24,692,293 UART: [art] PUB.Y = 129661411E54CC059B04519649BB752637BE75356772C08BD0A85F9AD60FE9D20FCB96144BAB33639A9E631B97CB81C1
24,699,498 UART: [art] SIG.R = E4D843E7F60B48A908AFE97B2F76B0D89D2842884CD45708B2FF0CD0D8F5683F17711CDDE93BDEC552B25832D67B5F71
24,706,912 UART: [art] SIG.S = 69B4350A0EEF9DF0BD7E7D1705988D727C7A16C0DFE1234EC07A65EF48EFDE42195CB76890FC906A38367BF24BCC35A3
25,686,246 UART: Caliptra RT
25,686,950 UART: [state] CFI Enabled
25,819,330 UART: [rt] RT listening for mailbox commands...
25,821,169 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,850,722 UART: [rt]cmd =0x46504c54, len=4
25,852,411 >>> mbox cmd response data (8 bytes)
25,853,633 UART: [rt] FIPS self test
25,854,584 UART: [kat] ++
25,855,042 UART: [kat] sha1
25,859,398 UART: [kat] SHA2-256
25,861,337 UART: [kat] SHA2-384
25,864,161 UART: [kat] SHA2-512-ACC
25,866,459 UART: [kat] ECC-384
28,294,385 UART: [kat] HMAC-384Kdf
28,300,456 UART: [kat] LMS
28,532,128 UART: Fatal Error: 0x90070002
28,567,515 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,717,494 >>> mbox cmd response: failed
28,718,148 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,867,933 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
14,844,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,523,832 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,224 UART:
192,602 UART: Running Caliptra ROM ...
193,796 UART:
193,954 UART: [state] CFI Enabled
264,244 UART: [state] LifecycleState = Unprovisioned
266,609 UART: [state] DebugLocked = No
268,861 UART: [state] WD Timer not started. Device not locked for debugging
273,143 UART: [kat] SHA2-256
463,005 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,813 UART: [kat] ++
474,263 UART: [kat] sha1
486,279 UART: [kat] SHA2-256
489,297 UART: [kat] SHA2-384
494,512 UART: [kat] SHA2-512-ACC
497,102 UART: [kat] ECC-384
2,948,648 UART: [kat] HMAC-384Kdf
2,971,901 UART: [kat] LMS
3,503,661 UART: [kat] --
3,506,455 UART: [cold-reset] ++
3,507,470 UART: [fht] FHT @ 0x50003400
3,518,373 UART: [idev] ++
3,519,086 UART: [idev] CDI.KEYID = 6
3,519,996 UART: [idev] SUBJECT.KEYID = 7
3,521,250 UART: [idev] UDS.KEYID = 0
3,522,160 ready_for_fw is high
3,522,374 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,672,581 UART: [idev] Erasing UDS.KEYID = 0
6,027,174 UART: [idev] Sha1 KeyId Algorithm
6,050,088 UART: [idev] --
6,054,343 UART: [ldev] ++
6,055,039 UART: [ldev] CDI.KEYID = 6
6,055,960 UART: [ldev] SUBJECT.KEYID = 5
6,057,126 UART: [ldev] AUTHORITY.KEYID = 7
6,058,366 UART: [ldev] FE.KEYID = 1
6,099,917 UART: [ldev] Erasing FE.KEYID = 1
8,604,030 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,558 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,718 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,981 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,135 UART: [ldev] --
10,410,813 UART: [fwproc] Wait for Commands...
10,412,751 UART: [fwproc] Recv command 0x46574c44
10,415,012 UART: [fwproc] Recv'd Img size: 119428 bytes
13,925,944 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,005,497 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,129,134 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,694,797 >>> mbox cmd response: success
14,699,645 UART: [afmc] ++
14,700,354 UART: [afmc] CDI.KEYID = 6
14,701,468 UART: [afmc] SUBJECT.KEYID = 7
14,703,009 UART: [afmc] AUTHORITY.KEYID = 5
17,230,556 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,955,439 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,957,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,972,408 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,987,595 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,002,495 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,026,157 UART: [afmc] --
19,030,190 UART: [cold-reset] --
19,035,896 UART: [state] Locking Datavault
19,041,905 UART: [state] Locking PCR0, PCR1 and PCR31
19,044,099 UART: [state] Locking ICCM
19,046,636 UART: [exit] Launching FMC @ 0x40000130
19,055,312 UART:
19,055,554 UART: Running Caliptra FMC ...
19,056,664 UART:
19,056,826 UART: [state] CFI Enabled
19,113,359 UART: [fht] FMC Alias Private Key: 7
20,879,797 UART: [art] Extend RT PCRs Done
20,881,040 UART: [art] Lock RT PCRs Done
20,882,969 UART: [art] Populate DV Done
20,888,177 UART: [fht] FMC Alias Private Key: 7
20,889,777 UART: [art] Derive CDI
20,890,520 UART: [art] Store in slot 0x4
20,945,139 UART: [art] Derive Key Pair
20,946,192 UART: [art] Store priv key in slot 0x5
23,409,052 UART: [art] Derive Key Pair - Done
23,422,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,133,728 UART: [art] Erasing AUTHORITY.KEYID = 7
25,135,241 UART: [art] PUB.X = C823F8F6FFE041391566B9358D6469A23DA00BDBDE9FE80967FBA4A49B29468BA531AA1446BF5F8B8C968744B505471D
25,142,501 UART: [art] PUB.Y = FA5AEBFC569CFCB973F86C37442D343B4053877F24DAA4CB24CC308EF2541289EDE353BC2F8E96D0849705B2CB8F3B4B
25,149,780 UART: [art] SIG.R = A3E3BE3946F9A067EE09D1AEE8C438A702284AB57AD21C6D5FC3CD0962EE6DD13D211DD2421625759E8B7FBF09FF7994
25,157,190 UART: [art] SIG.S = CC7461E63B1A11957A88E77641D352268996B8A753E77E13DD3DE8AF66F5D8BA699F149D44CE01867D8615F0363B2E22
26,136,247 UART: Caliptra RT
26,136,946 UART: [state] CFI Enabled
26,314,889 UART: [rt] RT listening for mailbox commands...
26,316,749 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,346,753 UART: [rt]cmd =0x46504c54, len=4
26,348,276 >>> mbox cmd response data (8 bytes)
26,349,693 UART: [rt] FIPS self test
26,350,680 UART: [kat] ++
26,351,142 UART: [kat] sha1
26,355,278 UART: [kat] SHA2-256
26,357,162 UART: [kat] SHA2-384
26,360,235 UART: [kat] SHA2-512-ACC
26,362,474 UART: [kat] ECC-384
28,807,270 UART: [kat] HMAC-384Kdf
28,834,496 UART: [kat] LMS
29,066,100 UART: Fatal Error: 0x90070002
29,101,525 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,251,932 >>> mbox cmd response: failed
29,252,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,402,538 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,098 UART:
190,397 UART: Running Caliptra ROM ...
191,429 UART:
191,569 UART: [state] CFI Enabled
252,542 UART: [state] LifecycleState = Unprovisioned
254,955 UART: [state] DebugLocked = No
256,740 UART: [state] WD Timer not started. Device not locked for debugging
261,778 UART: [kat] SHA2-256
451,650 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
462,469 UART: [kat] ++
462,921 UART: [kat] sha1
473,631 UART: [kat] SHA2-256
476,645 UART: [kat] SHA2-384
482,968 UART: [kat] SHA2-512-ACC
485,585 UART: [kat] ECC-384
2,933,327 UART: [kat] HMAC-384Kdf
2,956,466 UART: [kat] LMS
3,488,261 UART: [kat] --
3,490,968 UART: [cold-reset] ++
3,492,103 UART: [fht] FHT @ 0x50003400
3,504,228 UART: [idev] ++
3,504,918 UART: [idev] CDI.KEYID = 6
3,505,943 UART: [idev] SUBJECT.KEYID = 7
3,507,252 UART: [idev] UDS.KEYID = 0
3,508,844 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,658,802 UART: [idev] Erasing UDS.KEYID = 0
6,018,037 UART: [idev] Sha1 KeyId Algorithm
6,041,228 UART: [idev] --
6,046,005 UART: [ldev] ++
6,046,699 UART: [ldev] CDI.KEYID = 6
6,047,615 UART: [ldev] SUBJECT.KEYID = 5
6,048,785 UART: [ldev] AUTHORITY.KEYID = 7
6,050,022 UART: [ldev] FE.KEYID = 1
6,084,245 UART: [ldev] Erasing FE.KEYID = 1
8,593,248 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,326,412 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,341,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,356,819 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,371,945 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,391,810 UART: [ldev] --
10,397,631 UART: [fwproc] Wait for Commands...
10,399,415 UART: [fwproc] Recv command 0x46574c44
10,401,734 UART: [fwproc] Recv'd Img size: 119428 bytes
13,911,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,199 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,677,921 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.32s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,974 writing to cptra_bootfsm_go
3,440,024 ready_for_fw is high
3,440,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,842,541 >>> mbox cmd response: success
19,148,695 UART:
19,149,160 UART: Running Caliptra FMC ...
19,150,290 UART:
19,150,462 UART: [state] CFI Enabled
19,219,352 UART: [fht] FMC Alias Private Key: 7
20,986,189 UART: [art] Extend RT PCRs Done
20,987,412 UART: [art] Lock RT PCRs Done
20,988,991 UART: [art] Populate DV Done
20,994,475 UART: [fht] FMC Alias Private Key: 7
20,996,072 UART: [art] Derive CDI
20,996,900 UART: [art] Store in slot 0x4
21,052,225 UART: [art] Derive Key Pair
21,053,279 UART: [art] Store priv key in slot 0x5
23,515,996 UART: [art] Derive Key Pair - Done
23,529,059 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,346 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,854 UART: [art] PUB.X = 60D2C710BB4ED6DF846DA944A1D39B3009F41219367359F1B89684FE142D24B17C69D8C93BBC225E66313B61DC77A6B3
25,250,143 UART: [art] PUB.Y = D42BE8E0C85EB94A2C2CC016CB07F044973CCD9D0A6D56CF9896075A43EFCE66F41A62E35661C8538A99DD5FF72DD08A
25,257,409 UART: [art] SIG.R = AD3BF3902496D3D0B34FA9B79E63517484FB9554917D3C7AD5A912360F8ABDD5762FC8E7DBA6057B86872F5DB3EDCDB0
25,264,788 UART: [art] SIG.S = 39A68654B72895BD4EC3DD2989760861052A39D7B3608E8DC3063867B474C7C122429402E73B1B663F6F783B0A3CB5E6
26,244,160 UART: Caliptra RT
26,244,860 UART: [state] CFI Enabled
26,424,290 UART: [rt] RT listening for mailbox commands...
26,426,156 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,456,083 UART: [rt]cmd =0x46504c54, len=4
26,457,506 >>> mbox cmd response data (8 bytes)
26,458,610 UART: [rt] FIPS self test
26,459,553 UART: [kat] ++
26,460,008 UART: [kat] sha1
26,464,546 UART: [kat] SHA2-256
26,466,659 UART: [kat] SHA2-384
26,469,393 UART: [kat] SHA2-512-ACC
26,471,652 UART: [kat] ECC-384
28,915,722 UART: [kat] HMAC-384Kdf
28,942,044 UART: [kat] LMS
29,173,696 UART: Fatal Error: 0x90070002
29,209,387 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,359,464 >>> mbox cmd response: failed
29,360,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,510,054 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,423,507 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,824,261 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.33s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,278 writing to cptra_bootfsm_go
192,523 UART:
192,879 UART: Running Caliptra ROM ...
194,068 UART:
603,806 UART: [state] CFI Enabled
618,125 UART: [state] LifecycleState = Unprovisioned
620,511 UART: [state] DebugLocked = No
622,758 UART: [state] WD Timer not started. Device not locked for debugging
627,446 UART: [kat] SHA2-256
817,291 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,088 UART: [kat] ++
828,706 UART: [kat] sha1
840,586 UART: [kat] SHA2-256
843,603 UART: [kat] SHA2-384
849,600 UART: [kat] SHA2-512-ACC
852,190 UART: [kat] ECC-384
3,295,865 UART: [kat] HMAC-384Kdf
3,310,377 UART: [kat] LMS
3,842,215 UART: [kat] --
3,847,231 UART: [cold-reset] ++
3,848,322 UART: [fht] FHT @ 0x50003400
3,859,228 UART: [idev] ++
3,859,934 UART: [idev] CDI.KEYID = 6
3,860,819 UART: [idev] SUBJECT.KEYID = 7
3,862,067 UART: [idev] UDS.KEYID = 0
3,862,994 ready_for_fw is high
3,863,199 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,013,156 UART: [idev] Erasing UDS.KEYID = 0
6,340,086 UART: [idev] Sha1 KeyId Algorithm
6,363,559 UART: [idev] --
6,367,767 UART: [ldev] ++
6,368,456 UART: [ldev] CDI.KEYID = 6
6,369,375 UART: [ldev] SUBJECT.KEYID = 5
6,370,539 UART: [ldev] AUTHORITY.KEYID = 7
6,371,775 UART: [ldev] FE.KEYID = 1
6,384,748 UART: [ldev] Erasing FE.KEYID = 1
8,864,358 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,566 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,422 UART: [ldev] --
10,655,764 UART: [fwproc] Wait for Commands...
10,657,443 UART: [fwproc] Recv command 0x46574c44
10,659,719 UART: [fwproc] Recv'd Img size: 119428 bytes
14,162,190 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,237,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,361,608 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,559 >>> mbox cmd response: success
14,931,174 UART: [afmc] ++
14,931,886 UART: [afmc] CDI.KEYID = 6
14,933,005 UART: [afmc] SUBJECT.KEYID = 7
14,934,564 UART: [afmc] AUTHORITY.KEYID = 5
17,431,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,533 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,497 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,621 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,752 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,682 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,222,655 UART: [afmc] --
19,226,957 UART: [cold-reset] --
19,230,020 UART: [state] Locking Datavault
19,237,274 UART: [state] Locking PCR0, PCR1 and PCR31
19,239,418 UART: [state] Locking ICCM
19,242,117 UART: [exit] Launching FMC @ 0x40000130
19,250,738 UART:
19,250,980 UART: Running Caliptra FMC ...
19,252,087 UART:
19,252,252 UART: [state] CFI Enabled
19,260,251 UART: [fht] FMC Alias Private Key: 7
21,026,363 UART: [art] Extend RT PCRs Done
21,027,598 UART: [art] Lock RT PCRs Done
21,029,472 UART: [art] Populate DV Done
21,034,808 UART: [fht] FMC Alias Private Key: 7
21,036,336 UART: [art] Derive CDI
21,037,082 UART: [art] Store in slot 0x4
21,079,685 UART: [art] Derive Key Pair
21,080,693 UART: [art] Store priv key in slot 0x5
23,507,277 UART: [art] Derive Key Pair - Done
23,520,449 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,227,093 UART: [art] Erasing AUTHORITY.KEYID = 7
25,228,601 UART: [art] PUB.X = DCFE936CEEA3C3917CC500A9A4BCB4B432FD961DEDB1774A2EF221B7365EBBB684933F7E345E6D219E278006A22B039D
25,235,843 UART: [art] PUB.Y = 8F3E4C7E013B366864E220B8A82428A925F15099D5EB4A3ADC1367F173A971D364019FF523C0C2D6E2FCF3B906FFB503
25,243,106 UART: [art] SIG.R = EC4EF66B3F357FD3BC4EF0EC05EAB23294F84C791D40ED63D0153ED24A609163DA266C6AA42288AA58B6F7EDF92EC980
25,250,486 UART: [art] SIG.S = 7AB68A742C6FBE9B239D9C380978C4FB1954D0835F3F7E8BABB0BCD29786DF7469356702953DAE908D9C15E06270917D
26,229,396 UART: Caliptra RT
26,230,109 UART: [state] CFI Enabled
26,362,042 UART: [rt] RT listening for mailbox commands...
26,363,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,393,389 UART: [rt]cmd =0x46504c54, len=4
26,395,002 >>> mbox cmd response data (8 bytes)
26,396,292 UART: [rt] FIPS self test
26,397,242 UART: [kat] ++
26,397,700 UART: [kat] sha1
26,402,166 UART: [kat] SHA2-256
26,404,097 UART: [kat] SHA2-384
26,406,907 UART: [kat] SHA2-512-ACC
26,409,152 UART: [kat] ECC-384
28,836,979 UART: [kat] HMAC-384Kdf
28,842,776 UART: [kat] LMS
29,074,586 UART: Fatal Error: 0x90070002
29,109,869 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,259,891 >>> mbox cmd response: failed
29,260,566 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,410,484 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
190,104 UART:
190,397 UART: Running Caliptra ROM ...
191,516 UART:
11,118,793 UART: [state] CFI Enabled
11,129,943 UART: [state] LifecycleState = Unprovisioned
11,132,305 UART: [state] DebugLocked = No
11,133,916 UART: [state] WD Timer not started. Device not locked for debugging
11,139,088 UART: [kat] SHA2-256
11,328,980 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
11,339,789 UART: [kat] ++
11,340,338 UART: [kat] sha1
11,351,350 UART: [kat] SHA2-256
11,354,374 UART: [kat] SHA2-384
11,360,477 UART: [kat] SHA2-512-ACC
11,363,076 UART: [kat] ECC-384
13,807,126 UART: [kat] HMAC-384Kdf
13,821,028 UART: [kat] LMS
14,352,876 UART: [kat] --
14,357,628 UART: [cold-reset] ++
14,359,079 UART: [fht] FHT @ 0x50003400
14,371,858 UART: [idev] ++
14,372,538 UART: [idev] CDI.KEYID = 6
14,373,478 UART: [idev] SUBJECT.KEYID = 7
14,374,751 UART: [idev] UDS.KEYID = 0
14,376,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,526,150 UART: [idev] Erasing UDS.KEYID = 0
16,851,037 UART: [idev] Sha1 KeyId Algorithm
16,874,560 UART: [idev] --
16,878,500 UART: [ldev] ++
16,879,184 UART: [ldev] CDI.KEYID = 6
16,880,113 UART: [ldev] SUBJECT.KEYID = 5
16,881,277 UART: [ldev] AUTHORITY.KEYID = 7
16,882,515 UART: [ldev] FE.KEYID = 1
16,895,322 UART: [ldev] Erasing FE.KEYID = 1
19,374,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
21,094,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
21,110,060 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
21,125,291 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
21,140,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
21,160,771 UART: [ldev] --
21,166,522 UART: [fwproc] Wait for Commands...
21,169,497 UART: [fwproc] Recv command 0x46574c44
21,171,767 UART: [fwproc] Recv'd Img size: 119428 bytes
24,686,526 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
24,764,185 UART: [fwproc] Load FMC at address 0x40000000 len 20044
24,887,764 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
25,452,668 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,115 writing to cptra_bootfsm_go
3,756,181 ready_for_fw is high
3,756,835 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,066,478 >>> mbox cmd response: success
19,318,652 UART:
19,319,050 UART: Running Caliptra FMC ...
19,320,285 UART:
19,320,462 UART: [state] CFI Enabled
19,328,360 UART: [fht] FMC Alias Private Key: 7
21,094,022 UART: [art] Extend RT PCRs Done
21,095,260 UART: [art] Lock RT PCRs Done
21,096,467 UART: [art] Populate DV Done
21,101,954 UART: [fht] FMC Alias Private Key: 7
21,103,505 UART: [art] Derive CDI
21,104,270 UART: [art] Store in slot 0x4
21,147,193 UART: [art] Derive Key Pair
21,148,244 UART: [art] Store priv key in slot 0x5
23,575,489 UART: [art] Derive Key Pair - Done
23,588,564 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,294,804 UART: [art] Erasing AUTHORITY.KEYID = 7
25,296,319 UART: [art] PUB.X = F6496222CDF476A26D44B5E6E900A3CC6B80621BC2794BBC08AD7E5D3F199C3D6452AA41F2620DED4C1A991DDC61B9F8
25,303,611 UART: [art] PUB.Y = B73C5139DF35C3E7A69E5760D74B8CC3970369AE75E57EB27395076ACEC4A038CB01E46887DDD220C3E3E22C9B6F5E79
25,310,827 UART: [art] SIG.R = 4505936779CDF6AA6A80F05526011CB26DEEB011D887388145551784A020E2BF7ADA7C06CE1D46A9F6B62D60E2012523
25,318,203 UART: [art] SIG.S = AD7F513A7AEC51E8902F43CF0DC5C9C02387464531B9500DAD3BAB8660D463FF953D909980CBF0E2857681ACC4B594C4
26,296,304 UART: Caliptra RT
26,297,014 UART: [state] CFI Enabled
26,429,653 UART: [rt] RT listening for mailbox commands...
26,431,510 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,461,217 UART: [rt]cmd =0x46504c54, len=4
26,462,802 >>> mbox cmd response data (8 bytes)
26,464,010 UART: [rt] FIPS self test
26,464,969 UART: [kat] ++
26,465,428 UART: [kat] sha1
26,469,675 UART: [kat] SHA2-256
26,471,571 UART: [kat] SHA2-384
26,474,592 UART: [kat] SHA2-512-ACC
26,476,890 UART: [kat] ECC-384
28,904,696 UART: [kat] HMAC-384Kdf
28,910,657 UART: [kat] LMS
29,142,281 UART: Fatal Error: 0x90070002
29,177,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,327,502 >>> mbox cmd response: failed
29,328,099 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
29,477,983 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
14,197,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
25,501,199 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,082 UART: [state] LifecycleState = Unprovisioned
85,737 UART: [state] DebugLocked = No
86,339 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,905 UART: [kat] SHA2-256
881,836 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,951 UART: [kat] ++
886,103 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,918 UART: [kat] SHA2-512-ACC
896,819 UART: [kat] ECC-384
902,500 UART: [kat] HMAC-384Kdf
907,216 UART: [kat] LMS
1,475,412 UART: [kat] --
1,476,323 UART: [cold-reset] ++
1,476,783 UART: [fht] Storing FHT @ 0x50003400
1,479,618 UART: [idev] ++
1,479,786 UART: [idev] CDI.KEYID = 6
1,480,146 UART: [idev] SUBJECT.KEYID = 7
1,480,570 UART: [idev] UDS.KEYID = 0
1,480,915 ready_for_fw is high
1,480,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,074 UART: [idev] Erasing UDS.KEYID = 0
1,505,846 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,670 UART: [idev] --
1,515,853 UART: [ldev] ++
1,516,021 UART: [ldev] CDI.KEYID = 6
1,516,384 UART: [ldev] SUBJECT.KEYID = 5
1,516,810 UART: [ldev] AUTHORITY.KEYID = 7
1,517,273 UART: [ldev] FE.KEYID = 1
1,522,231 UART: [ldev] Erasing FE.KEYID = 1
1,547,542 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,021 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,912 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,624 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,524 UART: [ldev] --
1,586,787 UART: [fwproc] Waiting for Commands...
1,587,538 UART: [fwproc] Received command 0x46574c44
1,588,329 UART: [fwproc] Received Image of size 119428 bytes
2,943,709 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,715 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,933 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,592 >>> mbox cmd response: success
3,145,844 UART: [afmc] ++
3,146,012 UART: [afmc] CDI.KEYID = 6
3,146,374 UART: [afmc] SUBJECT.KEYID = 7
3,146,799 UART: [afmc] AUTHORITY.KEYID = 5
3,181,718 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,692 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,472 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,181 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,064 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,747 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,585 UART: [afmc] --
3,224,583 UART: [cold-reset] --
3,225,305 UART: [state] Locking Datavault
3,226,202 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,806 UART: [state] Locking ICCM
3,227,356 UART: [exit] Launching FMC @ 0x40000130
3,232,686 UART:
3,232,702 UART: Running Caliptra FMC ...
3,233,110 UART:
3,233,164 UART: [state] CFI Enabled
3,243,776 UART: [fht] FMC Alias Private Key: 7
3,363,080 UART: [art] Extend RT PCRs Done
3,363,508 UART: [art] Lock RT PCRs Done
3,365,020 UART: [art] Populate DV Done
3,373,273 UART: [fht] FMC Alias Private Key: 7
3,374,233 UART: [art] Derive CDI
3,374,513 UART: [art] Store in slot 0x4
3,460,361 UART: [art] Derive Key Pair
3,460,721 UART: [art] Store priv key in slot 0x5
3,474,304 UART: [art] Derive Key Pair - Done
3,488,950 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,607 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,372 UART: [art] PUB.X = 9F3117F86D5BB28D4274CE51E5D12FF9F1A7DBB2FE9C25666C2C92C2FF73D14F550C6B3F27B72AA0BAFD0D0C0DAA87B9
3,512,154 UART: [art] PUB.Y = F22F4663FF7845008F0549BDC6838C83186BC4A939122A810CB8C6FE55F87062673053D5F91F315E01563F7DEF41EA75
3,519,069 UART: [art] SIG.R = B6A9D8035F2680B147E3F334EE45182C3333EC0D29A882983D4DB5E37595364A2BB36F0758138FA0A49B628A5B50B25E
3,525,828 UART: [art] SIG.S = B39C62DC6E04BABD6435A013FA79239F54EC0ADCD3BEA621FF8A31CC26BCB0391D99CBD0ABFA1FC743A122931C5C594C
3,550,216 UART: Caliptra RT
3,550,467 UART: [state] CFI Enabled
3,671,280 UART: [rt] RT listening for mailbox commands...
3,671,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,701,720 UART: [rt]cmd =0x46504c54, len=4
3,702,770 >>> mbox cmd response data (8 bytes)
3,702,939 UART: [rt] FIPS self test
3,703,267 UART: [kat] ++
3,703,419 UART: [kat] sha1
3,707,729 UART: [kat] SHA2-256
3,709,751 UART: [kat] SHA2-384
3,712,582 UART: [kat] SHA2-512-ACC
3,714,509 UART: [kat] ECC-384
3,724,643 UART: [kat] HMAC-384Kdf
3,729,128 UART: [kat] LMS
4,834,934 UART: Fatal Error: 0x90070002
4,836,473 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,836,478 >>> mbox cmd response: failed
4,836,478 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,836,483 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,259 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,809 UART: [kat] SHA2-256
881,740 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,855 UART: [kat] ++
886,007 UART: [kat] sha1
890,179 UART: [kat] SHA2-256
892,117 UART: [kat] SHA2-384
894,828 UART: [kat] SHA2-512-ACC
896,729 UART: [kat] ECC-384
902,476 UART: [kat] HMAC-384Kdf
907,296 UART: [kat] LMS
1,475,492 UART: [kat] --
1,476,233 UART: [cold-reset] ++
1,476,585 UART: [fht] Storing FHT @ 0x50003400
1,479,504 UART: [idev] ++
1,479,672 UART: [idev] CDI.KEYID = 6
1,480,032 UART: [idev] SUBJECT.KEYID = 7
1,480,456 UART: [idev] UDS.KEYID = 0
1,480,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,582 UART: [idev] Erasing UDS.KEYID = 0
1,505,224 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,738 UART: [idev] --
1,514,979 UART: [ldev] ++
1,515,147 UART: [ldev] CDI.KEYID = 6
1,515,510 UART: [ldev] SUBJECT.KEYID = 5
1,515,936 UART: [ldev] AUTHORITY.KEYID = 7
1,516,399 UART: [ldev] FE.KEYID = 1
1,521,469 UART: [ldev] Erasing FE.KEYID = 1
1,546,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,565 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,172 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,008 UART: [ldev] --
1,585,445 UART: [fwproc] Waiting for Commands...
1,586,236 UART: [fwproc] Received command 0x46574c44
1,587,027 UART: [fwproc] Received Image of size 119428 bytes
2,942,651 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,743 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,961 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,488 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 3.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,765 ready_for_fw is high
1,362,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,062 >>> mbox cmd response: success
3,055,601 UART:
3,055,617 UART: Running Caliptra FMC ...
3,056,025 UART:
3,056,079 UART: [state] CFI Enabled
3,066,491 UART: [fht] FMC Alias Private Key: 7
3,185,587 UART: [art] Extend RT PCRs Done
3,186,015 UART: [art] Lock RT PCRs Done
3,187,695 UART: [art] Populate DV Done
3,196,050 UART: [fht] FMC Alias Private Key: 7
3,197,092 UART: [art] Derive CDI
3,197,372 UART: [art] Store in slot 0x4
3,283,232 UART: [art] Derive Key Pair
3,283,592 UART: [art] Store priv key in slot 0x5
3,296,719 UART: [art] Derive Key Pair - Done
3,311,254 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,063 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,828 UART: [art] PUB.X = 8C46B12DD2077725C26BC27ADADD45990D3469A76337749B35C2FF835D3A1648B15F456EC15C9293CB5412424A582090
3,334,586 UART: [art] PUB.Y = B617A7EEF26BCBEFB341FC9EA2C45968DA97AE74EE24683857FF65CD473213854D5767F6AC7C52F2C4DF009F831AAC43
3,341,530 UART: [art] SIG.R = 01C93917723573037454427828C9A7F0285633369AE8F16556049B0ACF33A5991D7E9C4DF5C3A59991DAB9226B1A5A79
3,348,276 UART: [art] SIG.S = 9FA50D188B39295BC822AE288277A3F3CB7617AF4EA78FEB9174763CAE878BF6B2E2090E270D7568969975220D6F9E39
3,372,441 UART: Caliptra RT
3,372,692 UART: [state] CFI Enabled
3,491,602 UART: [rt] RT listening for mailbox commands...
3,492,265 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,068 UART: [rt]cmd =0x46504c54, len=4
3,523,102 >>> mbox cmd response data (8 bytes)
3,523,463 UART: [rt] FIPS self test
3,523,791 UART: [kat] ++
3,523,943 UART: [kat] sha1
3,528,137 UART: [kat] SHA2-256
3,530,159 UART: [kat] SHA2-384
3,533,038 UART: [kat] SHA2-512-ACC
3,534,965 UART: [kat] ECC-384
3,544,847 UART: [kat] HMAC-384Kdf
3,549,382 UART: [kat] LMS
4,655,026 UART: Fatal Error: 0x90070002
4,656,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,656,570 >>> mbox cmd response: failed
4,656,570 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,656,575 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,361 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,900 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.40s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,477 UART: [state] LifecycleState = Unprovisioned
86,132 UART: [state] DebugLocked = No
86,728 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,244 UART: [kat] SHA2-256
882,175 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,290 UART: [kat] ++
886,442 UART: [kat] sha1
890,690 UART: [kat] SHA2-256
892,628 UART: [kat] SHA2-384
895,457 UART: [kat] SHA2-512-ACC
897,358 UART: [kat] ECC-384
902,937 UART: [kat] HMAC-384Kdf
907,653 UART: [kat] LMS
1,475,849 UART: [kat] --
1,476,838 UART: [cold-reset] ++
1,477,406 UART: [fht] Storing FHT @ 0x50003400
1,479,997 UART: [idev] ++
1,480,165 UART: [idev] CDI.KEYID = 6
1,480,525 UART: [idev] SUBJECT.KEYID = 7
1,480,949 UART: [idev] UDS.KEYID = 0
1,481,294 ready_for_fw is high
1,481,294 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,059 UART: [idev] Erasing UDS.KEYID = 0
1,506,131 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,913 UART: [idev] --
1,515,866 UART: [ldev] ++
1,516,034 UART: [ldev] CDI.KEYID = 6
1,516,397 UART: [ldev] SUBJECT.KEYID = 5
1,516,823 UART: [ldev] AUTHORITY.KEYID = 7
1,517,286 UART: [ldev] FE.KEYID = 1
1,522,362 UART: [ldev] Erasing FE.KEYID = 1
1,547,725 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,136 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,455 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,353 UART: [ldev] --
1,586,802 UART: [fwproc] Waiting for Commands...
1,587,489 UART: [fwproc] Received command 0x46574c44
1,588,280 UART: [fwproc] Received Image of size 119428 bytes
2,942,238 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,884 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,102 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,647 >>> mbox cmd response: success
3,143,745 UART: [afmc] ++
3,143,913 UART: [afmc] CDI.KEYID = 6
3,144,275 UART: [afmc] SUBJECT.KEYID = 7
3,144,700 UART: [afmc] AUTHORITY.KEYID = 5
3,180,009 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,123 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,903 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,612 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,495 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,178 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,120 UART: [afmc] --
3,223,008 UART: [cold-reset] --
3,223,916 UART: [state] Locking Datavault
3,225,079 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,683 UART: [state] Locking ICCM
3,226,109 UART: [exit] Launching FMC @ 0x40000130
3,231,439 UART:
3,231,455 UART: Running Caliptra FMC ...
3,231,863 UART:
3,232,006 UART: [state] CFI Enabled
3,242,616 UART: [fht] FMC Alias Private Key: 7
3,361,346 UART: [art] Extend RT PCRs Done
3,361,774 UART: [art] Lock RT PCRs Done
3,363,412 UART: [art] Populate DV Done
3,371,807 UART: [fht] FMC Alias Private Key: 7
3,372,879 UART: [art] Derive CDI
3,373,159 UART: [art] Store in slot 0x4
3,459,077 UART: [art] Derive Key Pair
3,459,437 UART: [art] Store priv key in slot 0x5
3,472,264 UART: [art] Derive Key Pair - Done
3,486,925 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,742 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,507 UART: [art] PUB.X = 6B7704467407DBE1C1813EECCE0B7C0B838435878784E783C4A41BCE3CE7E421CFCF80FE545B860525938DAB69700C3C
3,510,265 UART: [art] PUB.Y = 35B2E3150D841D816DDC50D4F83454F31853CD28BB63C150BAE09CC9716A87D6D371353CDA1E883363CCD803D7C1B220
3,517,213 UART: [art] SIG.R = BC8D5F93353554E8670B26C09BA0CF31E79E801CD3CF15F5E901EF150C7A80A342BE1EA3D442A9874F3670DC96ECDC9E
3,523,988 UART: [art] SIG.S = A90E1FAF83E78A3F68B11E2D3261CE2AE176ED18A7EA3B861770DBFCA572CB04682F8ABD16B6E2FC5DB3578919C8F4F4
3,547,694 UART: Caliptra RT
3,548,037 UART: [state] CFI Enabled
3,668,418 UART: [rt] RT listening for mailbox commands...
3,669,081 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,770 UART: [rt]cmd =0x46504c54, len=4
3,700,028 >>> mbox cmd response data (8 bytes)
3,700,219 UART: [rt] FIPS self test
3,700,547 UART: [kat] ++
3,700,699 UART: [kat] sha1
3,704,931 UART: [kat] SHA2-256
3,706,953 UART: [kat] SHA2-384
3,709,676 UART: [kat] SHA2-512-ACC
3,711,603 UART: [kat] ECC-384
3,721,879 UART: [kat] HMAC-384Kdf
3,726,482 UART: [kat] LMS
4,832,304 UART: Fatal Error: 0x90070002
4,833,843 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,833,848 >>> mbox cmd response: failed
4,833,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,833,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,185 UART: [state] LifecycleState = Unprovisioned
85,840 UART: [state] DebugLocked = No
86,482 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,188 UART: [kat] SHA2-256
882,119 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,234 UART: [kat] ++
886,386 UART: [kat] sha1
890,460 UART: [kat] SHA2-256
892,398 UART: [kat] SHA2-384
895,105 UART: [kat] SHA2-512-ACC
897,006 UART: [kat] ECC-384
902,123 UART: [kat] HMAC-384Kdf
906,923 UART: [kat] LMS
1,475,119 UART: [kat] --
1,475,882 UART: [cold-reset] ++
1,476,454 UART: [fht] Storing FHT @ 0x50003400
1,479,095 UART: [idev] ++
1,479,263 UART: [idev] CDI.KEYID = 6
1,479,623 UART: [idev] SUBJECT.KEYID = 7
1,480,047 UART: [idev] UDS.KEYID = 0
1,480,392 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,183 UART: [idev] Erasing UDS.KEYID = 0
1,504,857 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,613 UART: [idev] --
1,514,790 UART: [ldev] ++
1,514,958 UART: [ldev] CDI.KEYID = 6
1,515,321 UART: [ldev] SUBJECT.KEYID = 5
1,515,747 UART: [ldev] AUTHORITY.KEYID = 7
1,516,210 UART: [ldev] FE.KEYID = 1
1,521,364 UART: [ldev] Erasing FE.KEYID = 1
1,546,557 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,437 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,149 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,145 UART: [ldev] --
1,585,652 UART: [fwproc] Waiting for Commands...
1,586,381 UART: [fwproc] Received command 0x46574c44
1,587,172 UART: [fwproc] Received Image of size 119428 bytes
2,942,982 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,198 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,416 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,167 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,202 ready_for_fw is high
1,362,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,033 >>> mbox cmd response: success
3,053,186 UART:
3,053,202 UART: Running Caliptra FMC ...
3,053,610 UART:
3,053,753 UART: [state] CFI Enabled
3,064,619 UART: [fht] FMC Alias Private Key: 7
3,183,531 UART: [art] Extend RT PCRs Done
3,183,959 UART: [art] Lock RT PCRs Done
3,185,341 UART: [art] Populate DV Done
3,193,570 UART: [fht] FMC Alias Private Key: 7
3,194,588 UART: [art] Derive CDI
3,194,868 UART: [art] Store in slot 0x4
3,280,882 UART: [art] Derive Key Pair
3,281,242 UART: [art] Store priv key in slot 0x5
3,294,351 UART: [art] Derive Key Pair - Done
3,309,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,154 UART: [art] PUB.X = F0AE927F497364DECB57D815E379F1B32CFDE6212EC47F133D8D24B4253223776E54F7080ED58B644D4FE851613B8FDC
3,331,924 UART: [art] PUB.Y = F759D4BC3BE30EBC5874DD98C85474551409EA9AE93A7162FB6B9666F3245D9C804517C519A399914324F0A187E1E5E3
3,338,866 UART: [art] SIG.R = 4CFCB164746A31CF90081751CCD90FA47D356397E21C2DD9C1687F66F03EC4A2BB0669586329250C8A666E57D3C720D9
3,345,624 UART: [art] SIG.S = 264038E9A4559D3B363248153E899BF835BD905BC35EE6B43541A89A2FDEE07B40D7C1711E19F1F95F58378D6FEE3758
3,368,704 UART: Caliptra RT
3,369,047 UART: [state] CFI Enabled
3,489,262 UART: [rt] RT listening for mailbox commands...
3,489,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,004 UART: [rt]cmd =0x46504c54, len=4
3,521,264 >>> mbox cmd response data (8 bytes)
3,521,601 UART: [rt] FIPS self test
3,521,929 UART: [kat] ++
3,522,081 UART: [kat] sha1
3,526,285 UART: [kat] SHA2-256
3,528,307 UART: [kat] SHA2-384
3,531,056 UART: [kat] SHA2-512-ACC
3,532,983 UART: [kat] ECC-384
3,542,889 UART: [kat] HMAC-384Kdf
3,547,596 UART: [kat] LMS
4,653,360 UART: Fatal Error: 0x90070002
4,654,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,654,904 >>> mbox cmd response: failed
4,654,904 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,654,909 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,378 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,793 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,274 UART: [state] LifecycleState = Unprovisioned
85,929 UART: [state] DebugLocked = No
86,575 UART: [state] WD Timer not started. Device not locked for debugging
87,728 UART: [kat] SHA2-256
891,278 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,382 UART: [kat] ++
895,534 UART: [kat] sha1
899,784 UART: [kat] SHA2-256
901,724 UART: [kat] SHA2-384
904,633 UART: [kat] SHA2-512-ACC
906,534 UART: [kat] ECC-384
916,123 UART: [kat] HMAC-384Kdf
920,695 UART: [kat] LMS
1,169,007 UART: [kat] --
1,169,960 UART: [cold-reset] ++
1,170,388 UART: [fht] FHT @ 0x50003400
1,173,082 UART: [idev] ++
1,173,250 UART: [idev] CDI.KEYID = 6
1,173,611 UART: [idev] SUBJECT.KEYID = 7
1,174,036 UART: [idev] UDS.KEYID = 0
1,174,382 ready_for_fw is high
1,174,382 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,799 UART: [idev] Erasing UDS.KEYID = 0
1,198,843 UART: [idev] Sha1 KeyId Algorithm
1,207,863 UART: [idev] --
1,208,812 UART: [ldev] ++
1,208,980 UART: [ldev] CDI.KEYID = 6
1,209,344 UART: [ldev] SUBJECT.KEYID = 5
1,209,771 UART: [ldev] AUTHORITY.KEYID = 7
1,210,234 UART: [ldev] FE.KEYID = 1
1,215,332 UART: [ldev] Erasing FE.KEYID = 1
1,241,011 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,119 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,724 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,436 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,578 UART: [ldev] --
1,279,915 UART: [fwproc] Wait for Commands...
1,280,622 UART: [fwproc] Recv command 0x46574c44
1,281,355 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,590 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,985 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,160 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,703 >>> mbox cmd response: success
2,836,949 UART: [afmc] ++
2,837,117 UART: [afmc] CDI.KEYID = 6
2,837,480 UART: [afmc] SUBJECT.KEYID = 7
2,837,906 UART: [afmc] AUTHORITY.KEYID = 5
2,873,111 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,464 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,213 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,923 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,804 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,505 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,274 UART: [afmc] --
2,916,127 UART: [cold-reset] --
2,916,979 UART: [state] Locking Datavault
2,917,996 UART: [state] Locking PCR0, PCR1 and PCR31
2,918,600 UART: [state] Locking ICCM
2,919,096 UART: [exit] Launching FMC @ 0x40000130
2,924,426 UART:
2,924,442 UART: Running Caliptra FMC ...
2,924,850 UART:
2,924,904 UART: [state] CFI Enabled
2,934,998 UART: [fht] FMC Alias Private Key: 7
3,053,610 UART: [art] Extend RT PCRs Done
3,054,038 UART: [art] Lock RT PCRs Done
3,055,670 UART: [art] Populate DV Done
3,063,959 UART: [fht] FMC Alias Private Key: 7
3,065,059 UART: [art] Derive CDI
3,065,339 UART: [art] Store in slot 0x4
3,150,924 UART: [art] Derive Key Pair
3,151,284 UART: [art] Store priv key in slot 0x5
3,164,530 UART: [art] Derive Key Pair - Done
3,179,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,194,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,195,318 UART: [art] PUB.X = 1AC0FC5B31249250C9AE2559ABD3B937BF8A4F37F8FB995DAE48880762D36A4902C457A6981E1A4E5BF3C87F44097DF4
3,202,087 UART: [art] PUB.Y = AE12F228F663C8752C683CE0FA0D7B09BCDF7C52F37A98EFD712B06E3B19426546CF25C50CED25C272A64A0FDE58D13E
3,209,041 UART: [art] SIG.R = 3CA9A84D3B312D9144359154886A7F6C26790B56C0B7FC195AF462B8230BBFABF12B42BDE783B7A8A1FC4F68AC19622C
3,215,815 UART: [art] SIG.S = E1E6AC9648DC0E5A4300C8B5FB5F263A80051FA741EEBBC09BE8525622997F3BAA0F13B18F86A3C71A59CB92196510B8
3,239,882 UART: Caliptra RT
3,240,133 UART: [state] CFI Enabled
3,359,364 UART: [rt] RT listening for mailbox commands...
3,360,027 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,870 UART: [rt]cmd =0x46504c54, len=4
3,391,042 >>> mbox cmd response data (8 bytes)
3,391,321 UART: [rt] FIPS self test
3,391,649 UART: [kat] ++
3,391,801 UART: [kat] sha1
3,395,987 UART: [kat] SHA2-256
3,398,009 UART: [kat] SHA2-384
3,400,888 UART: [kat] SHA2-512-ACC
3,402,815 UART: [kat] ECC-384
3,412,701 UART: [kat] HMAC-384Kdf
3,417,319 UART: [kat] LMS
3,690,193 UART: Fatal Error: 0x90070002
3,691,732 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,691,737 >>> mbox cmd response: failed
3,691,737 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,691,742 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,110 UART: [state] LifecycleState = Unprovisioned
85,765 UART: [state] DebugLocked = No
86,303 UART: [state] WD Timer not started. Device not locked for debugging
87,416 UART: [kat] SHA2-256
890,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,070 UART: [kat] ++
895,222 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,099 UART: [kat] SHA2-512-ACC
906,000 UART: [kat] ECC-384
916,019 UART: [kat] HMAC-384Kdf
920,817 UART: [kat] LMS
1,169,129 UART: [kat] --
1,169,856 UART: [cold-reset] ++
1,170,402 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,417 UART: [idev] Erasing UDS.KEYID = 0
1,199,765 UART: [idev] Sha1 KeyId Algorithm
1,208,695 UART: [idev] --
1,209,952 UART: [ldev] ++
1,210,120 UART: [ldev] CDI.KEYID = 6
1,210,484 UART: [ldev] SUBJECT.KEYID = 5
1,210,911 UART: [ldev] AUTHORITY.KEYID = 7
1,211,374 UART: [ldev] FE.KEYID = 1
1,216,444 UART: [ldev] Erasing FE.KEYID = 1
1,242,847 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,071 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,787 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,676 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,388 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,492 UART: [ldev] --
1,281,795 UART: [fwproc] Wait for Commands...
1,282,478 UART: [fwproc] Recv command 0x46574c44
1,283,211 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,254 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,227 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,402 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,083 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,752 ready_for_fw is high
1,059,752 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,102 >>> mbox cmd response: success
2,752,095 UART:
2,752,111 UART: Running Caliptra FMC ...
2,752,519 UART:
2,752,573 UART: [state] CFI Enabled
2,762,917 UART: [fht] FMC Alias Private Key: 7
2,882,175 UART: [art] Extend RT PCRs Done
2,882,603 UART: [art] Lock RT PCRs Done
2,883,991 UART: [art] Populate DV Done
2,892,088 UART: [fht] FMC Alias Private Key: 7
2,893,060 UART: [art] Derive CDI
2,893,340 UART: [art] Store in slot 0x4
2,979,289 UART: [art] Derive Key Pair
2,979,649 UART: [art] Store priv key in slot 0x5
2,993,157 UART: [art] Derive Key Pair - Done
3,008,025 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,514 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,279 UART: [art] PUB.X = 561A621E085B219ACDB1F3B7C67D769BEBBA41D88ADCF2F401F73B54D084B42C08548C89154EB94BAB72988EF9369786
3,031,048 UART: [art] PUB.Y = 26AF45D3DF74974B738637DEB59FB0D98F7FF2C3F9308DC81D78EB087C41495B7C18FAE8B5110DD6C6EC09A6146A65AF
3,038,003 UART: [art] SIG.R = 77736E57027CFEEA723D1C7B18245BBFA532AAACCC3A56048ED9E88F144E32029761AA8A89AF48EAD7D278D8C1F72913
3,044,776 UART: [art] SIG.S = 15CA27F28DF0C96D496C6A0026B80D3B3B16CDBF54CDAEAC556865DB4100BFFED5C09A240AF544481D7C88BE63B870AC
3,068,906 UART: Caliptra RT
3,069,157 UART: [state] CFI Enabled
3,188,379 UART: [rt] RT listening for mailbox commands...
3,189,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,061 UART: [rt]cmd =0x46504c54, len=4
3,220,129 >>> mbox cmd response data (8 bytes)
3,220,484 UART: [rt] FIPS self test
3,220,812 UART: [kat] ++
3,220,964 UART: [kat] sha1
3,225,322 UART: [kat] SHA2-256
3,227,344 UART: [kat] SHA2-384
3,230,101 UART: [kat] SHA2-512-ACC
3,232,028 UART: [kat] ECC-384
3,242,286 UART: [kat] HMAC-384Kdf
3,247,178 UART: [kat] LMS
3,520,044 UART: Fatal Error: 0x90070002
3,521,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,521,588 >>> mbox cmd response: failed
3,521,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,521,593 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,934 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,834 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,435 UART: [state] LifecycleState = Unprovisioned
86,090 UART: [state] DebugLocked = No
86,656 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
899,943 UART: [kat] SHA2-256
901,883 UART: [kat] SHA2-384
904,704 UART: [kat] SHA2-512-ACC
906,605 UART: [kat] ECC-384
916,316 UART: [kat] HMAC-384Kdf
920,988 UART: [kat] LMS
1,169,300 UART: [kat] --
1,170,195 UART: [cold-reset] ++
1,170,709 UART: [fht] FHT @ 0x50003400
1,173,179 UART: [idev] ++
1,173,347 UART: [idev] CDI.KEYID = 6
1,173,708 UART: [idev] SUBJECT.KEYID = 7
1,174,133 UART: [idev] UDS.KEYID = 0
1,174,479 ready_for_fw is high
1,174,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,144 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,232 UART: [idev] --
1,209,413 UART: [ldev] ++
1,209,581 UART: [ldev] CDI.KEYID = 6
1,209,945 UART: [ldev] SUBJECT.KEYID = 5
1,210,372 UART: [ldev] AUTHORITY.KEYID = 7
1,210,835 UART: [ldev] FE.KEYID = 1
1,216,177 UART: [ldev] Erasing FE.KEYID = 1
1,242,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,502 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,107 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,819 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,841 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,757 UART: [fwproc] Recv command 0x46574c44
1,283,490 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,699 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,361 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,028 >>> mbox cmd response: success
2,839,254 UART: [afmc] ++
2,839,422 UART: [afmc] CDI.KEYID = 6
2,839,785 UART: [afmc] SUBJECT.KEYID = 7
2,840,211 UART: [afmc] AUTHORITY.KEYID = 5
2,875,834 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,887 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,636 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,346 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,227 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,928 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,715 UART: [afmc] --
2,918,652 UART: [cold-reset] --
2,919,366 UART: [state] Locking Datavault
2,920,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,395 UART: [state] Locking ICCM
2,921,845 UART: [exit] Launching FMC @ 0x40000130
2,927,175 UART:
2,927,191 UART: Running Caliptra FMC ...
2,927,599 UART:
2,927,742 UART: [state] CFI Enabled
2,938,262 UART: [fht] FMC Alias Private Key: 7
3,057,040 UART: [art] Extend RT PCRs Done
3,057,468 UART: [art] Lock RT PCRs Done
3,058,918 UART: [art] Populate DV Done
3,067,185 UART: [fht] FMC Alias Private Key: 7
3,068,233 UART: [art] Derive CDI
3,068,513 UART: [art] Store in slot 0x4
3,154,340 UART: [art] Derive Key Pair
3,154,700 UART: [art] Store priv key in slot 0x5
3,168,572 UART: [art] Derive Key Pair - Done
3,183,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,523 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,288 UART: [art] PUB.X = 4AC4695B453C23DFE69D37BFB6D94D6B25596F18FB660889D796D6F44A4507DA1C42D239C0AAFFDB7D5B519104642CB2
3,207,059 UART: [art] PUB.Y = 105D31B09DD68377CFB9CD53BBC89E5343FA30F5219B6CE679C5724090E988C16F8F03117EA76C14CBBA82355BFBDA42
3,214,016 UART: [art] SIG.R = FEA65841B528903BEF3FCEDE87CBE5791C49F0897CA139E10F61FA307E6C6E4B667D0FFC533BA4F3563A2852C33186B7
3,220,792 UART: [art] SIG.S = 4D4C584ADAFDCD9F11D2D08DA3483F920FBD0B6FE0A2498368F792DEAED3D4CDCBC064E00C36535E86929DA72290FAD7
3,244,257 UART: Caliptra RT
3,244,600 UART: [state] CFI Enabled
3,364,401 UART: [rt] RT listening for mailbox commands...
3,365,064 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,661 UART: [rt]cmd =0x46504c54, len=4
3,395,983 >>> mbox cmd response data (8 bytes)
3,396,308 UART: [rt] FIPS self test
3,396,636 UART: [kat] ++
3,396,788 UART: [kat] sha1
3,401,146 UART: [kat] SHA2-256
3,403,168 UART: [kat] SHA2-384
3,406,013 UART: [kat] SHA2-512-ACC
3,407,940 UART: [kat] ECC-384
3,417,876 UART: [kat] HMAC-384Kdf
3,422,566 UART: [kat] LMS
3,695,408 UART: Fatal Error: 0x90070002
3,696,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,952 >>> mbox cmd response: failed
3,696,952 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,957 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,653 UART: [state] LifecycleState = Unprovisioned
86,308 UART: [state] DebugLocked = No
86,936 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
891,735 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,839 UART: [kat] ++
895,991 UART: [kat] sha1
900,301 UART: [kat] SHA2-256
902,241 UART: [kat] SHA2-384
905,004 UART: [kat] SHA2-512-ACC
906,905 UART: [kat] ECC-384
916,790 UART: [kat] HMAC-384Kdf
921,614 UART: [kat] LMS
1,169,926 UART: [kat] --
1,170,861 UART: [cold-reset] ++
1,171,329 UART: [fht] FHT @ 0x50003400
1,173,847 UART: [idev] ++
1,174,015 UART: [idev] CDI.KEYID = 6
1,174,376 UART: [idev] SUBJECT.KEYID = 7
1,174,801 UART: [idev] UDS.KEYID = 0
1,175,147 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,932 UART: [idev] Erasing UDS.KEYID = 0
1,200,174 UART: [idev] Sha1 KeyId Algorithm
1,208,960 UART: [idev] --
1,210,065 UART: [ldev] ++
1,210,233 UART: [ldev] CDI.KEYID = 6
1,210,597 UART: [ldev] SUBJECT.KEYID = 5
1,211,024 UART: [ldev] AUTHORITY.KEYID = 7
1,211,487 UART: [ldev] FE.KEYID = 1
1,216,909 UART: [ldev] Erasing FE.KEYID = 1
1,243,196 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,116 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,832 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,721 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,479 UART: [ldev] --
1,281,682 UART: [fwproc] Wait for Commands...
1,282,401 UART: [fwproc] Recv command 0x46574c44
1,283,134 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,557 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,018 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,193 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,754 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,315 ready_for_fw is high
1,060,315 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,467 >>> mbox cmd response: success
2,753,220 UART:
2,753,236 UART: Running Caliptra FMC ...
2,753,644 UART:
2,753,787 UART: [state] CFI Enabled
2,764,491 UART: [fht] FMC Alias Private Key: 7
2,883,763 UART: [art] Extend RT PCRs Done
2,884,191 UART: [art] Lock RT PCRs Done
2,885,401 UART: [art] Populate DV Done
2,893,522 UART: [fht] FMC Alias Private Key: 7
2,894,596 UART: [art] Derive CDI
2,894,876 UART: [art] Store in slot 0x4
2,980,541 UART: [art] Derive Key Pair
2,980,901 UART: [art] Store priv key in slot 0x5
2,993,729 UART: [art] Derive Key Pair - Done
3,008,379 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,950 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,715 UART: [art] PUB.X = 7D86F137B876EE985D8DD059A04F0036D966CF1ED09292584BF4E899015CB1D8775CE179CB03999779FB554F17A7CA1B
3,031,459 UART: [art] PUB.Y = A9C0813B5F68DA3BAF3843E8380CA4A04E3C198456C0E9A1C9A26DAAC37EC2B516072A86164161A9D399C1958E065D74
3,038,404 UART: [art] SIG.R = 31B7F7C84D60173063024D618E35E50A01F059661AB26284B6055F3AB03216DA203A7FE5ADC38311F73ADFAE2D31F5D7
3,045,164 UART: [art] SIG.S = 4BC4949F4C37D8CBBE90162637228C59CCE53B4DBDF321CC82F580156C890882EB795594342EED3A55A3D7C317B02D4B
3,068,657 UART: Caliptra RT
3,069,000 UART: [state] CFI Enabled
3,189,502 UART: [rt] RT listening for mailbox commands...
3,190,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,212 UART: [rt]cmd =0x46504c54, len=4
3,221,496 >>> mbox cmd response data (8 bytes)
3,221,615 UART: [rt] FIPS self test
3,221,943 UART: [kat] ++
3,222,095 UART: [kat] sha1
3,226,157 UART: [kat] SHA2-256
3,228,179 UART: [kat] SHA2-384
3,231,108 UART: [kat] SHA2-512-ACC
3,233,035 UART: [kat] ECC-384
3,243,363 UART: [kat] HMAC-384Kdf
3,247,987 UART: [kat] LMS
3,520,901 UART: Fatal Error: 0x90070002
3,522,440 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,445 >>> mbox cmd response: failed
3,522,445 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,522,450 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,605 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,857 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,527 UART: [state] WD Timer not started. Device not locked for debugging
87,708 UART: [kat] SHA2-256
893,358 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,483 UART: [kat] ++
897,635 UART: [kat] sha1
901,869 UART: [kat] SHA2-256
903,809 UART: [kat] SHA2-384
906,658 UART: [kat] SHA2-512-ACC
908,559 UART: [kat] ECC-384
918,608 UART: [kat] HMAC-384Kdf
923,372 UART: [kat] LMS
1,171,700 UART: [kat] --
1,172,875 UART: [cold-reset] ++
1,173,343 UART: [fht] FHT @ 0x50003400
1,176,012 UART: [idev] ++
1,176,180 UART: [idev] CDI.KEYID = 6
1,176,540 UART: [idev] SUBJECT.KEYID = 7
1,176,964 UART: [idev] UDS.KEYID = 0
1,177,309 ready_for_fw is high
1,177,309 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,978 UART: [idev] Erasing UDS.KEYID = 0
1,202,079 UART: [idev] Sha1 KeyId Algorithm
1,210,551 UART: [idev] --
1,211,655 UART: [ldev] ++
1,211,823 UART: [ldev] CDI.KEYID = 6
1,212,186 UART: [ldev] SUBJECT.KEYID = 5
1,212,612 UART: [ldev] AUTHORITY.KEYID = 7
1,213,075 UART: [ldev] FE.KEYID = 1
1,218,433 UART: [ldev] Erasing FE.KEYID = 1
1,244,322 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,301 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,017 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,908 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,620 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,677 UART: [ldev] --
1,284,154 UART: [fwproc] Wait for Commands...
1,284,880 UART: [fwproc] Recv command 0x46574c44
1,285,608 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,014 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,184 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,867 >>> mbox cmd response: success
2,841,111 UART: [afmc] ++
2,841,279 UART: [afmc] CDI.KEYID = 6
2,841,641 UART: [afmc] SUBJECT.KEYID = 7
2,842,066 UART: [afmc] AUTHORITY.KEYID = 5
2,877,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,422 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,170 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,879 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,762 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,463 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,419 UART: [afmc] --
2,920,361 UART: [cold-reset] --
2,921,093 UART: [state] Locking Datavault
2,922,256 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,860 UART: [state] Locking ICCM
2,923,294 UART: [exit] Launching FMC @ 0x40000130
2,928,624 UART:
2,928,640 UART: Running Caliptra FMC ...
2,929,048 UART:
2,929,102 UART: [state] CFI Enabled
2,939,458 UART: [fht] FMC Alias Private Key: 7
3,058,068 UART: [art] Extend RT PCRs Done
3,058,496 UART: [art] Lock RT PCRs Done
3,059,912 UART: [art] Populate DV Done
3,068,349 UART: [fht] FMC Alias Private Key: 7
3,069,475 UART: [art] Derive CDI
3,069,755 UART: [art] Store in slot 0x4
3,155,400 UART: [art] Derive Key Pair
3,155,760 UART: [art] Store priv key in slot 0x5
3,168,508 UART: [art] Derive Key Pair - Done
3,183,432 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,801 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,566 UART: [art] PUB.X = 71FE5BA430DF4A5C3DEE57978AF4C7D30C934A458F99A9826CF568DF89648716A9346379F29DDBF1E5A40C6416685FFD
3,206,338 UART: [art] PUB.Y = 2B37CF8B151BD2E52BCC60A1ED9A5257FE8C371B2DFBB6DB3C11DAE31077E98DE7EEB5C1E7E2251D3B2976EFFE6A3D50
3,213,316 UART: [art] SIG.R = 1B2A56FA6E5820DFE20A0E6D2422C0DCF468635ABBCDDE8D6E8674F91A58BE59E7F2E4D1B7A3DCFAE908A6F1D39B9C57
3,220,103 UART: [art] SIG.S = EBCE9BA1DEF440FF916C36F8C14AA6D5A14AE2C46B663233AACDAB0D680426BEFCF6C9D2BB2E42A49954FBA2AAB58598
3,243,867 UART: Caliptra RT
3,244,118 UART: [state] CFI Enabled
3,363,653 UART: [rt] RT listening for mailbox commands...
3,364,316 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,973 UART: [rt]cmd =0x46504c54, len=4
3,395,269 >>> mbox cmd response data (8 bytes)
3,395,498 UART: [rt] FIPS self test
3,395,826 UART: [kat] ++
3,395,978 UART: [kat] sha1
3,400,322 UART: [kat] SHA2-256
3,402,344 UART: [kat] SHA2-384
3,405,153 UART: [kat] SHA2-512-ACC
3,407,080 UART: [kat] ECC-384
3,417,156 UART: [kat] HMAC-384Kdf
3,421,894 UART: [kat] LMS
3,694,626 UART: Fatal Error: 0x90070002
3,696,165 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,170 >>> mbox cmd response: failed
3,696,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,696,175 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,502 UART: [state] LifecycleState = Unprovisioned
86,157 UART: [state] DebugLocked = No
86,687 UART: [state] WD Timer not started. Device not locked for debugging
87,820 UART: [kat] SHA2-256
893,470 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,595 UART: [kat] ++
897,747 UART: [kat] sha1
902,177 UART: [kat] SHA2-256
904,117 UART: [kat] SHA2-384
906,964 UART: [kat] SHA2-512-ACC
908,865 UART: [kat] ECC-384
918,610 UART: [kat] HMAC-384Kdf
923,092 UART: [kat] LMS
1,171,420 UART: [kat] --
1,172,233 UART: [cold-reset] ++
1,172,637 UART: [fht] FHT @ 0x50003400
1,175,078 UART: [idev] ++
1,175,246 UART: [idev] CDI.KEYID = 6
1,175,606 UART: [idev] SUBJECT.KEYID = 7
1,176,030 UART: [idev] UDS.KEYID = 0
1,176,375 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,982 UART: [idev] Erasing UDS.KEYID = 0
1,200,827 UART: [idev] Sha1 KeyId Algorithm
1,209,365 UART: [idev] --
1,210,269 UART: [ldev] ++
1,210,437 UART: [ldev] CDI.KEYID = 6
1,210,800 UART: [ldev] SUBJECT.KEYID = 5
1,211,226 UART: [ldev] AUTHORITY.KEYID = 7
1,211,689 UART: [ldev] FE.KEYID = 1
1,216,981 UART: [ldev] Erasing FE.KEYID = 1
1,243,226 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,709 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,425 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,316 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,028 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,167 UART: [ldev] --
1,282,502 UART: [fwproc] Wait for Commands...
1,283,196 UART: [fwproc] Recv command 0x46574c44
1,283,924 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,793 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,348 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,518 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,017 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,269 ready_for_fw is high
1,060,269 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,968 >>> mbox cmd response: success
2,752,705 UART:
2,752,721 UART: Running Caliptra FMC ...
2,753,129 UART:
2,753,183 UART: [state] CFI Enabled
2,763,659 UART: [fht] FMC Alias Private Key: 7
2,882,761 UART: [art] Extend RT PCRs Done
2,883,189 UART: [art] Lock RT PCRs Done
2,884,925 UART: [art] Populate DV Done
2,892,932 UART: [fht] FMC Alias Private Key: 7
2,894,070 UART: [art] Derive CDI
2,894,350 UART: [art] Store in slot 0x4
2,980,575 UART: [art] Derive Key Pair
2,980,935 UART: [art] Store priv key in slot 0x5
2,993,885 UART: [art] Derive Key Pair - Done
3,008,565 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,156 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,921 UART: [art] PUB.X = 9296254A57BD02BC906692F842BC3129EE563DD70027CC7E3B16C6BCEA57DF67473965D491F459B8F83B965CEF920144
3,031,663 UART: [art] PUB.Y = 306D8D88CCE15BD5712D7C662D645C16CAB1FDC79C777188478B3FEE7C8B8EACF7C84E420E1D7783130AA0D289D687AB
3,038,621 UART: [art] SIG.R = 9B735D1EB0EC5E51041B96DAB6B07F053D113D092DEF942A724D3441313B706E5BEAA3D28217FC351B508FE3B9F409E9
3,045,387 UART: [art] SIG.S = 8E289AD403ACF2B9D35471EB2D665D97C8724E5D116979F1DD390BA11E867D9F7BC537A8618D9254B74EBF2F55FD4B9B
3,069,099 UART: Caliptra RT
3,069,350 UART: [state] CFI Enabled
3,187,938 UART: [rt] RT listening for mailbox commands...
3,188,601 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,494 UART: [rt]cmd =0x46504c54, len=4
3,219,580 >>> mbox cmd response data (8 bytes)
3,219,901 UART: [rt] FIPS self test
3,220,229 UART: [kat] ++
3,220,381 UART: [kat] sha1
3,224,555 UART: [kat] SHA2-256
3,226,577 UART: [kat] SHA2-384
3,229,350 UART: [kat] SHA2-512-ACC
3,231,277 UART: [kat] ECC-384
3,241,461 UART: [kat] HMAC-384Kdf
3,246,169 UART: [kat] LMS
3,518,949 UART: Fatal Error: 0x90070002
3,520,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,520,493 >>> mbox cmd response: failed
3,520,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,520,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,600 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,468 UART: [state] WD Timer not started. Device not locked for debugging
87,735 UART: [kat] SHA2-256
893,385 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,510 UART: [kat] ++
897,662 UART: [kat] sha1
901,972 UART: [kat] SHA2-256
903,912 UART: [kat] SHA2-384
906,549 UART: [kat] SHA2-512-ACC
908,450 UART: [kat] ECC-384
918,305 UART: [kat] HMAC-384Kdf
922,905 UART: [kat] LMS
1,171,233 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,490 UART: [fht] FHT @ 0x50003400
1,175,141 UART: [idev] ++
1,175,309 UART: [idev] CDI.KEYID = 6
1,175,669 UART: [idev] SUBJECT.KEYID = 7
1,176,093 UART: [idev] UDS.KEYID = 0
1,176,438 ready_for_fw is high
1,176,438 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,119 UART: [idev] Erasing UDS.KEYID = 0
1,200,948 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,572 UART: [ldev] ++
1,210,740 UART: [ldev] CDI.KEYID = 6
1,211,103 UART: [ldev] SUBJECT.KEYID = 5
1,211,529 UART: [ldev] AUTHORITY.KEYID = 7
1,211,992 UART: [ldev] FE.KEYID = 1
1,217,130 UART: [ldev] Erasing FE.KEYID = 1
1,243,239 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,904 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,620 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,511 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,223 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,212 UART: [ldev] --
1,282,659 UART: [fwproc] Wait for Commands...
1,283,259 UART: [fwproc] Recv command 0x46574c44
1,283,987 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,056 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,685 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,228 >>> mbox cmd response: success
2,838,320 UART: [afmc] ++
2,838,488 UART: [afmc] CDI.KEYID = 6
2,838,850 UART: [afmc] SUBJECT.KEYID = 7
2,839,275 UART: [afmc] AUTHORITY.KEYID = 5
2,875,202 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,627 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,375 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,084 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,967 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,668 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,466 UART: [afmc] --
2,918,400 UART: [cold-reset] --
2,919,012 UART: [state] Locking Datavault
2,920,383 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,987 UART: [state] Locking ICCM
2,921,409 UART: [exit] Launching FMC @ 0x40000130
2,926,739 UART:
2,926,755 UART: Running Caliptra FMC ...
2,927,163 UART:
2,927,306 UART: [state] CFI Enabled
2,937,818 UART: [fht] FMC Alias Private Key: 7
3,057,172 UART: [art] Extend RT PCRs Done
3,057,600 UART: [art] Lock RT PCRs Done
3,059,442 UART: [art] Populate DV Done
3,067,749 UART: [fht] FMC Alias Private Key: 7
3,068,825 UART: [art] Derive CDI
3,069,105 UART: [art] Store in slot 0x4
3,155,040 UART: [art] Derive Key Pair
3,155,400 UART: [art] Store priv key in slot 0x5
3,168,784 UART: [art] Derive Key Pair - Done
3,183,688 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,520 UART: [art] PUB.X = 65BB98C135FCD0309665036BE2BAF0B7A05F8CC9BE76C008275C0AAFBB2774DF4647921A52557F6FDEBB7840DC2624E9
3,206,293 UART: [art] PUB.Y = B7B07C915C53676566D8AF23337D5F2372DF1A44079761D82EAADA681143F66ECDD131C2514EC1CA6EE44F859B453530
3,213,242 UART: [art] SIG.R = 7A1E513885D542BF46303D090D6550832A8D92098533546CBCFD2EC7BFB21F852C4B54D10F5EDEEE0F99FA5F31DFD2D3
3,220,009 UART: [art] SIG.S = A51A32339784DC4583FA8C411A4B4826F2F97E15C6E11FE73BDC3C635188851A3353AFCD2774C03B3DC81E0B9655BDBF
3,244,422 UART: Caliptra RT
3,244,765 UART: [state] CFI Enabled
3,365,344 UART: [rt] RT listening for mailbox commands...
3,366,007 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,782 UART: [rt]cmd =0x46504c54, len=4
3,397,022 >>> mbox cmd response data (8 bytes)
3,397,219 UART: [rt] FIPS self test
3,397,547 UART: [kat] ++
3,397,699 UART: [kat] sha1
3,401,959 UART: [kat] SHA2-256
3,403,981 UART: [kat] SHA2-384
3,406,786 UART: [kat] SHA2-512-ACC
3,408,713 UART: [kat] ECC-384
3,419,165 UART: [kat] HMAC-384Kdf
3,423,933 UART: [kat] LMS
3,696,671 UART: Fatal Error: 0x90070002
3,698,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,215 >>> mbox cmd response: failed
3,698,215 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,698,220 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,765 UART: [state] LifecycleState = Unprovisioned
86,420 UART: [state] DebugLocked = No
87,018 UART: [state] WD Timer not started. Device not locked for debugging
88,185 UART: [kat] SHA2-256
893,835 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,960 UART: [kat] ++
898,112 UART: [kat] sha1
902,166 UART: [kat] SHA2-256
904,106 UART: [kat] SHA2-384
906,851 UART: [kat] SHA2-512-ACC
908,752 UART: [kat] ECC-384
918,675 UART: [kat] HMAC-384Kdf
923,119 UART: [kat] LMS
1,171,447 UART: [kat] --
1,172,148 UART: [cold-reset] ++
1,172,540 UART: [fht] FHT @ 0x50003400
1,175,275 UART: [idev] ++
1,175,443 UART: [idev] CDI.KEYID = 6
1,175,803 UART: [idev] SUBJECT.KEYID = 7
1,176,227 UART: [idev] UDS.KEYID = 0
1,176,572 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,941 UART: [idev] Erasing UDS.KEYID = 0
1,200,896 UART: [idev] Sha1 KeyId Algorithm
1,209,260 UART: [idev] --
1,210,410 UART: [ldev] ++
1,210,578 UART: [ldev] CDI.KEYID = 6
1,210,941 UART: [ldev] SUBJECT.KEYID = 5
1,211,367 UART: [ldev] AUTHORITY.KEYID = 7
1,211,830 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,197 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,840 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,447 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,159 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,190 UART: [ldev] --
1,282,637 UART: [fwproc] Wait for Commands...
1,283,341 UART: [fwproc] Recv command 0x46574c44
1,284,069 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,482 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,993 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,163 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,766 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.42s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,504 ready_for_fw is high
1,060,504 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,459 >>> mbox cmd response: success
2,752,174 UART:
2,752,190 UART: Running Caliptra FMC ...
2,752,598 UART:
2,752,741 UART: [state] CFI Enabled
2,763,319 UART: [fht] FMC Alias Private Key: 7
2,882,405 UART: [art] Extend RT PCRs Done
2,882,833 UART: [art] Lock RT PCRs Done
2,883,963 UART: [art] Populate DV Done
2,892,080 UART: [fht] FMC Alias Private Key: 7
2,893,052 UART: [art] Derive CDI
2,893,332 UART: [art] Store in slot 0x4
2,979,259 UART: [art] Derive Key Pair
2,979,619 UART: [art] Store priv key in slot 0x5
2,992,787 UART: [art] Derive Key Pair - Done
3,007,403 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,736 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,501 UART: [art] PUB.X = 778F8DCF4182B8B1BAF1B947AE496E39E1B87B559F375AD6DC57C8C36597B045B15BB5F4831706E94F7AAC768DF87CB2
3,030,280 UART: [art] PUB.Y = F772EB6BF4FC8542EB2D1B2AFD025EA79AA23053278A5F27F6C5E4081D5EC01647AA02E6DAED06B3ACB99577EF7113B5
3,037,236 UART: [art] SIG.R = 86C9BCBA7B514CC5684A6180F4B33B10D6949F74CBB65B387D1841B899C25DDAD93DB02F0D346D98A96940074B2FCC21
3,044,008 UART: [art] SIG.S = B01A50763F6BEA6B782D770A22A25BC68CE90D4AED67B5BD271118C7C62BFBBFAD0351CD1CCE4D8B039CAF165ACBF0C2
3,066,930 UART: Caliptra RT
3,067,273 UART: [state] CFI Enabled
3,187,931 UART: [rt] RT listening for mailbox commands...
3,188,594 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,313 UART: [rt]cmd =0x46504c54, len=4
3,219,293 >>> mbox cmd response data (8 bytes)
3,219,432 UART: [rt] FIPS self test
3,219,760 UART: [kat] ++
3,219,912 UART: [kat] sha1
3,224,060 UART: [kat] SHA2-256
3,226,082 UART: [kat] SHA2-384
3,229,085 UART: [kat] SHA2-512-ACC
3,231,012 UART: [kat] ECC-384
3,240,772 UART: [kat] HMAC-384Kdf
3,245,250 UART: [kat] LMS
3,518,064 UART: Fatal Error: 0x90070002
3,519,603 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,608 >>> mbox cmd response: failed
3,519,608 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,519,613 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,804 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,711 >>> mbox cmd response: success
test self_tests::kat_lms_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.63s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,207 writing to cptra_bootfsm_go
2,684,945 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,834,699 >>> mbox cmd response: failed
2,835,272 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,984,188 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,445,709 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,311 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,017 writing to cptra_bootfsm_go
2,681,825 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,831,629 >>> mbox cmd response: failed
2,832,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,906 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
3,429,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,258,492 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,426 writing to cptra_bootfsm_go
3,050,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,199,924 >>> mbox cmd response: failed
3,200,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,349,431 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
20,177,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,896,770 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,354 writing to cptra_bootfsm_go
3,034,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,184,646 >>> mbox cmd response: failed
3,185,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,334,065 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,179,191 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,895,671 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,606 writing to cptra_bootfsm_go
2,686,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,836,146 >>> mbox cmd response: failed
2,836,710 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,986,262 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
3,443,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,302,015 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
2,680,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,830,606 >>> mbox cmd response: failed
2,831,176 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,039 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,430,088 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,299,217 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,478 writing to cptra_bootfsm_go
3,039,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,188,872 >>> mbox cmd response: failed
3,189,425 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,338,144 >>> mbox cmd response: failed
Initializing fuses
971 writing to cptra_bootfsm_go
20,161,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,209 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,459 writing to cptra_bootfsm_go
3,035,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,184,729 >>> mbox cmd response: failed
3,185,289 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,334,143 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
20,178,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,880,143 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,130 >>> mbox cmd response: failed
806,130 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,136 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,944 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,714 >>> mbox cmd response: failed
806,714 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,720 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,369 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,148 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.53s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,347 >>> mbox cmd response: failed
807,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,353 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,141 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,569 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,577 >>> mbox cmd response: failed
806,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,583 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,543 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
806,360 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,368 >>> mbox cmd response: failed
806,368 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
806,374 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,840 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,016 >>> mbox cmd response: failed
807,016 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,022 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,995 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,014 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,261 >>> mbox cmd response: failed
807,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,800 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,509 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
807,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,327 >>> mbox cmd response: failed
807,327 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
807,333 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,233 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.62s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,952 writing to cptra_bootfsm_go
192,076 UART:
192,445 UART: Running Caliptra ROM ...
193,587 UART:
193,742 UART: [state] CFI Enabled
260,731 UART: [state] LifecycleState = Unprovisioned
262,710 UART: [state] DebugLocked = No
265,534 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,262 UART: [kat] SHA2-256
440,945 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,453 UART: [kat] ++
451,902 UART: [kat] sha1
463,697 UART: [kat] SHA2-256
466,350 UART: [kat] SHA2-384
472,117 UART: [kat] SHA2-512-ACC
474,439 UART: [kat] ECC-384
2,766,826 UART: [kat] HMAC-384Kdf
2,798,758 UART: [kat] LMS
3,989,123 UART: [kat] --
3,991,802 UART: [cold-reset] ++
3,993,107 UART: [fht] Storing FHT @ 0x50003400
4,005,019 UART: [idev] ++
4,005,596 UART: [idev] CDI.KEYID = 6
4,006,503 UART: [idev] SUBJECT.KEYID = 7
4,007,823 UART: [idev] UDS.KEYID = 0
4,008,889 ready_for_fw is high
4,009,122 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,179 UART: [idev] Erasing UDS.KEYID = 0
7,339,971 UART: [idev] Using Sha1 for KeyId Algorithm
7,362,472 UART: [idev] --
7,365,011 UART: [ldev] ++
7,365,591 UART: [ldev] CDI.KEYID = 6
7,366,562 UART: [ldev] SUBJECT.KEYID = 5
7,367,883 UART: [ldev] AUTHORITY.KEYID = 7
7,369,072 UART: [ldev] FE.KEYID = 1
7,416,327 UART: [ldev] Erasing FE.KEYID = 1
10,748,078 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,041,217 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,055,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,070,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,085,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,105,475 UART: [ldev] --
13,109,392 UART: [fwproc] Waiting for Commands...
13,112,196 UART: [fwproc] Received command 0x46574c44
13,114,388 UART: [fwproc] Received Image of size 119428 bytes
17,229,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,880 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,051 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,712,009 >>> mbox cmd response: success
17,716,682 UART: [afmc] ++
17,717,277 UART: [afmc] CDI.KEYID = 6
17,718,191 UART: [afmc] SUBJECT.KEYID = 7
17,719,462 UART: [afmc] AUTHORITY.KEYID = 5
21,085,909 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,384,385 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,386,661 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,401,093 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,415,820 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,430,210 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,452,014 UART: [afmc] --
23,455,215 UART: [cold-reset] --
23,459,406 UART: [state] Locking Datavault
23,465,032 UART: [state] Locking PCR0, PCR1 and PCR31
23,466,790 UART: [state] Locking ICCM
23,469,261 UART: [exit] Launching FMC @ 0x40000130
23,477,659 UART:
23,477,905 UART: Running Caliptra FMC ...
23,479,010 UART:
23,479,173 UART: [state] CFI Enabled
23,546,834 UART: [fht] FMC Alias Private Key: 7
25,908,307 UART: [art] Extend RT PCRs Done
25,909,552 UART: [art] Lock RT PCRs Done
25,911,237 UART: [art] Populate DV Done
25,916,329 UART: [fht] FMC Alias Private Key: 7
25,918,083 UART: [art] Derive CDI
25,918,900 UART: [art] Store in slot 0x4
25,976,753 UART: [art] Derive Key Pair
25,977,798 UART: [art] Store priv key in slot 0x5
29,270,698 UART: [art] Derive Key Pair - Done
29,283,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,572,050 UART: [art] Erasing AUTHORITY.KEYID = 7
31,573,558 UART: [art] PUB.X = 2713A240537EC3D1D52155DCC46416D4939C69398C90B6E9A80A2BC8EE03CC5B12C3C0554273D37635D9445E61A88F6B
31,580,831 UART: [art] PUB.Y = 11FA734A3000C6C8BEAC02C0DD0F3625DC285C35DC4BE5F645C26D75D0689ECDF1E570F7E578B481633A4E7A3A1B2819
31,588,084 UART: [art] SIG.R = D53F93AFDD195CB3C6724C2707671A404AA63AABD4EB0D5979B8665E8264F90E7F91C785E41231C83BC5FACE5A596994
31,595,510 UART: [art] SIG.S = EF6FEDE6DB2CEFA649ABBAA1328A4D1D77EF120FC11F59E9807CBFD18AA6CDC589D20D0015DB13AF5D41E686CBF643A5
32,900,636 UART: Caliptra RT
32,901,354 UART: [state] CFI Enabled
33,078,370 UART: [rt] RT listening for mailbox commands...
33,080,229 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,110,084 UART: [rt]cmd =0x46504c54, len=4
33,111,614 >>> mbox cmd response data (8 bytes)
33,112,587 UART: [rt] FIPS self test
33,113,536 UART: [kat] ++
33,113,990 UART: [kat] sha1
33,114,615 UART: Fatal Error: 0x90060001
33,149,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,300,021 >>> mbox cmd response: failed
33,300,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,450,599 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
190,049 UART:
190,340 UART: Running Caliptra ROM ...
191,386 UART:
191,530 UART: [state] CFI Enabled
254,608 UART: [state] LifecycleState = Unprovisioned
256,528 UART: [state] DebugLocked = No
257,987 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
263,473 UART: [kat] SHA2-256
433,207 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
443,695 UART: [kat] ++
444,227 UART: [kat] sha1
455,486 UART: [kat] SHA2-256
458,176 UART: [kat] SHA2-384
463,826 UART: [kat] SHA2-512-ACC
466,220 UART: [kat] ECC-384
2,757,365 UART: [kat] HMAC-384Kdf
2,790,130 UART: [kat] LMS
3,980,429 UART: [kat] --
3,984,471 UART: [cold-reset] ++
3,985,386 UART: [fht] Storing FHT @ 0x50003400
3,996,766 UART: [idev] ++
3,997,376 UART: [idev] CDI.KEYID = 6
3,998,293 UART: [idev] SUBJECT.KEYID = 7
3,999,517 UART: [idev] UDS.KEYID = 0
4,001,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,151,063 UART: [idev] Erasing UDS.KEYID = 0
7,337,465 UART: [idev] Using Sha1 for KeyId Algorithm
7,358,748 UART: [idev] --
7,363,320 UART: [ldev] ++
7,363,951 UART: [ldev] CDI.KEYID = 6
7,364,864 UART: [ldev] SUBJECT.KEYID = 5
7,366,078 UART: [ldev] AUTHORITY.KEYID = 7
7,367,373 UART: [ldev] FE.KEYID = 1
7,411,990 UART: [ldev] Erasing FE.KEYID = 1
10,748,770 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,061,205 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,105,144 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,124,777 UART: [ldev] --
13,129,569 UART: [fwproc] Waiting for Commands...
13,131,619 UART: [fwproc] Received command 0x46574c44
13,133,809 UART: [fwproc] Received Image of size 119428 bytes
17,250,807 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,876 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,403,012 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,734,492 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,950 writing to cptra_bootfsm_go
3,783,877 ready_for_fw is high
3,784,312 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,958,401 >>> mbox cmd response: success
23,651,852 UART:
23,652,251 UART: Running Caliptra FMC ...
23,653,384 UART:
23,653,540 UART: [state] CFI Enabled
23,718,702 UART: [fht] FMC Alias Private Key: 7
26,059,067 UART: [art] Extend RT PCRs Done
26,060,299 UART: [art] Lock RT PCRs Done
26,062,251 UART: [art] Populate DV Done
26,067,690 UART: [fht] FMC Alias Private Key: 7
26,069,291 UART: [art] Derive CDI
26,070,113 UART: [art] Store in slot 0x4
26,127,212 UART: [art] Derive Key Pair
26,128,252 UART: [art] Store priv key in slot 0x5
29,421,163 UART: [art] Derive Key Pair - Done
29,434,438 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,127 UART: [art] Erasing AUTHORITY.KEYID = 7
31,724,637 UART: [art] PUB.X = 4E9DBA37665CC3880F43371675B8958C2FFFC60515AF84C07450E53E5F367E8FFC648CBCA9F68042F6285E9B6983872C
31,731,922 UART: [art] PUB.Y = 79360ED00F4B7F39A9243F7EB29C9C19C0366A1EEDC20B9F65C8AA392B9FEDDB7C487BFE12946D9ACA8CAEAE9277D432
31,739,191 UART: [art] SIG.R = 3F13C43149F7594BBD4320D5D066C4B9BACE641478DEE4AC9EFBA469639D0FB1F19811AF57B903BA63BCF23B178D7F3E
31,746,574 UART: [art] SIG.S = ACAAEC7E22E5455BBC0CA256D172098AF13AE41B05FDB0482BDF7E7DE4CEC398B788C632F5912BD946EABC6B5BE6B9F0
33,052,252 UART: Caliptra RT
33,052,982 UART: [state] CFI Enabled
33,228,307 UART: [rt] RT listening for mailbox commands...
33,230,160 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,259,962 UART: [rt]cmd =0x46504c54, len=4
33,261,527 >>> mbox cmd response data (8 bytes)
33,262,866 UART: [rt] FIPS self test
33,263,814 UART: [kat] ++
33,264,267 UART: [kat] sha1
33,264,780 UART: Fatal Error: 0x90060001
33,299,937 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,449,915 >>> mbox cmd response: failed
33,450,513 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,600,452 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
3,796,486 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,987,117 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
192,513 UART:
192,899 UART: Running Caliptra ROM ...
194,092 UART:
603,800 UART: [state] CFI Enabled
617,397 UART: [state] LifecycleState = Unprovisioned
619,352 UART: [state] DebugLocked = No
621,462 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,983 UART: [kat] SHA2-256
795,746 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,291 UART: [kat] ++
806,747 UART: [kat] sha1
817,557 UART: [kat] SHA2-256
820,219 UART: [kat] SHA2-384
825,649 UART: [kat] SHA2-512-ACC
828,037 UART: [kat] ECC-384
3,110,213 UART: [kat] HMAC-384Kdf
3,121,860 UART: [kat] LMS
4,312,003 UART: [kat] --
4,316,838 UART: [cold-reset] ++
4,318,858 UART: [fht] Storing FHT @ 0x50003400
4,330,493 UART: [idev] ++
4,331,067 UART: [idev] CDI.KEYID = 6
4,332,110 UART: [idev] SUBJECT.KEYID = 7
4,333,295 UART: [idev] UDS.KEYID = 0
4,334,397 ready_for_fw is high
4,334,640 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,484,739 UART: [idev] Erasing UDS.KEYID = 0
7,622,479 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,467 UART: [idev] --
7,647,714 UART: [ldev] ++
7,648,293 UART: [ldev] CDI.KEYID = 6
7,649,321 UART: [ldev] SUBJECT.KEYID = 5
7,650,490 UART: [ldev] AUTHORITY.KEYID = 7
7,651,727 UART: [ldev] FE.KEYID = 1
7,663,087 UART: [ldev] Erasing FE.KEYID = 1
10,952,805 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,444 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,262,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,843 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,341 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,270 UART: [ldev] --
13,313,850 UART: [fwproc] Waiting for Commands...
13,316,401 UART: [fwproc] Received command 0x46574c44
13,318,650 UART: [fwproc] Received Image of size 119428 bytes
17,434,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,513,004 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,586,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,917,201 >>> mbox cmd response: success
17,921,718 UART: [afmc] ++
17,922,312 UART: [afmc] CDI.KEYID = 6
17,923,286 UART: [afmc] SUBJECT.KEYID = 7
17,924,505 UART: [afmc] AUTHORITY.KEYID = 5
21,238,669 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,532,161 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,534,432 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,902 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,563,569 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,013 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,034 UART: [afmc] --
23,602,149 UART: [cold-reset] --
23,606,989 UART: [state] Locking Datavault
23,613,269 UART: [state] Locking PCR0, PCR1 and PCR31
23,615,033 UART: [state] Locking ICCM
23,617,246 UART: [exit] Launching FMC @ 0x40000130
23,625,659 UART:
23,625,960 UART: Running Caliptra FMC ...
23,627,089 UART:
23,627,261 UART: [state] CFI Enabled
23,635,213 UART: [fht] FMC Alias Private Key: 7
25,975,440 UART: [art] Extend RT PCRs Done
25,976,678 UART: [art] Lock RT PCRs Done
25,978,393 UART: [art] Populate DV Done
25,983,885 UART: [fht] FMC Alias Private Key: 7
25,985,549 UART: [art] Derive CDI
25,986,373 UART: [art] Store in slot 0x4
26,028,756 UART: [art] Derive Key Pair
26,029,807 UART: [art] Store priv key in slot 0x5
29,271,487 UART: [art] Derive Key Pair - Done
29,284,594 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,341 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,861 UART: [art] PUB.X = EC116FAAD8B5D6806A65FABFB99691E64786B33FE53B70EFAA13D10096FB481B228C551B65FF3720BBADF61A753849DE
31,573,127 UART: [art] PUB.Y = 19618247CA4480C1CC1BDBE55F400A4F41E37BCDD77F59738B20E526A8E17FB8DEDABBC6324E1FB51010E5B967ABB43E
31,580,432 UART: [art] SIG.R = 9298D2DB1B9966FB8139060D639728710CA48431FFC9F41BFD754E292EB14C9C3567B00179773A8A2C17AA7E80234B28
31,587,844 UART: [art] SIG.S = 61BB19CB7BDF9057CE6C3EA6AF70FB7AF3779228463080C767FF50B0B4C20C23DE49ABC353924EF6C4EA1A7FBF257BDE
32,893,155 UART: Caliptra RT
32,893,877 UART: [state] CFI Enabled
33,028,131 UART: [rt] RT listening for mailbox commands...
33,029,996 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,060,025 UART: [rt]cmd =0x46504c54, len=4
33,061,539 >>> mbox cmd response data (8 bytes)
33,062,634 UART: [rt] FIPS self test
33,063,597 UART: [kat] ++
33,064,058 UART: [kat] sha1
33,064,581 UART: Fatal Error: 0x90060001
33,099,736 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,249,752 >>> mbox cmd response: failed
33,250,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,400,290 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,091 UART:
190,392 UART: Running Caliptra ROM ...
191,424 UART:
7,131,773 UART: [state] CFI Enabled
7,146,218 UART: [state] LifecycleState = Unprovisioned
7,148,141 UART: [state] DebugLocked = No
7,149,485 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,154,936 UART: [kat] SHA2-256
7,324,624 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,335,204 UART: [kat] ++
7,335,755 UART: [kat] sha1
7,347,027 UART: [kat] SHA2-256
7,349,719 UART: [kat] SHA2-384
7,355,987 UART: [kat] SHA2-512-ACC
7,358,397 UART: [kat] ECC-384
9,641,974 UART: [kat] HMAC-384Kdf
9,654,108 UART: [kat] LMS
10,844,232 UART: [kat] --
10,849,086 UART: [cold-reset] ++
10,851,086 UART: [fht] Storing FHT @ 0x50003400
10,860,908 UART: [idev] ++
10,861,516 UART: [idev] CDI.KEYID = 6
10,862,407 UART: [idev] SUBJECT.KEYID = 7
10,863,684 UART: [idev] UDS.KEYID = 0
10,865,180 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,014,956 UART: [idev] Erasing UDS.KEYID = 0
14,147,767 UART: [idev] Using Sha1 for KeyId Algorithm
14,171,054 UART: [idev] --
14,173,759 UART: [ldev] ++
14,174,329 UART: [ldev] CDI.KEYID = 6
14,175,296 UART: [ldev] SUBJECT.KEYID = 5
14,176,459 UART: [ldev] AUTHORITY.KEYID = 7
14,177,758 UART: [ldev] FE.KEYID = 1
14,188,685 UART: [ldev] Erasing FE.KEYID = 1
17,476,908 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,769,809 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,784,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,799,218 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,813,732 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,833,958 UART: [ldev] --
19,839,564 UART: [fwproc] Waiting for Commands...
19,841,725 UART: [fwproc] Received command 0x46574c44
19,843,922 UART: [fwproc] Received Image of size 119428 bytes
23,963,176 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,040,878 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,114,074 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,445,156 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,352 writing to cptra_bootfsm_go
4,123,099 ready_for_fw is high
4,123,581 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,156,949 >>> mbox cmd response: success
23,797,158 UART:
23,797,549 UART: Running Caliptra FMC ...
23,798,693 UART:
23,798,863 UART: [state] CFI Enabled
23,806,980 UART: [fht] FMC Alias Private Key: 7
26,146,648 UART: [art] Extend RT PCRs Done
26,147,889 UART: [art] Lock RT PCRs Done
26,149,690 UART: [art] Populate DV Done
26,155,022 UART: [fht] FMC Alias Private Key: 7
26,156,575 UART: [art] Derive CDI
26,157,403 UART: [art] Store in slot 0x4
26,199,899 UART: [art] Derive Key Pair
26,200,905 UART: [art] Store priv key in slot 0x5
29,442,892 UART: [art] Derive Key Pair - Done
29,455,904 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,938 UART: [art] Erasing AUTHORITY.KEYID = 7
31,737,460 UART: [art] PUB.X = C7F57F666B2E537A402DA6C0E4CAAB161B377C51C3B910750BC9E4AC9AED71825886052E5E142687C188C83FD58E2DC4
31,744,718 UART: [art] PUB.Y = 5BC6CD73A85E5039A84F984CD08446D388E67D52CA48456C05FEBF0DB4A8E942250DD833ADE142205C536AFE3A56459A
31,752,002 UART: [art] SIG.R = 51E9B6FFF9D3335701FA229534B71B7D9FD4147D1471F28FB5A601307D67BF80039C3852A001A9699125AB1684289B6E
31,759,348 UART: [art] SIG.S = 29F09F1EC0E66EE1D5C1D575464122CFEE62448724782985F415AEA0A4BD19F10B0EB8D8F0022E9B28B85F06464E1815
33,064,375 UART: Caliptra RT
33,065,102 UART: [state] CFI Enabled
33,198,625 UART: [rt] RT listening for mailbox commands...
33,200,494 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,230,010 UART: [rt]cmd =0x46504c54, len=4
33,231,490 >>> mbox cmd response data (8 bytes)
33,232,986 UART: [rt] FIPS self test
33,233,938 UART: [kat] ++
33,234,391 UART: [kat] sha1
33,235,020 UART: Fatal Error: 0x90060001
33,270,264 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,420,295 >>> mbox cmd response: failed
33,420,896 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,570,682 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
10,478,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,544,478 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,070 writing to cptra_bootfsm_go
192,192 UART:
192,564 UART: Running Caliptra ROM ...
193,715 UART:
193,862 UART: [state] CFI Enabled
268,079 UART: [state] LifecycleState = Unprovisioned
270,001 UART: [state] DebugLocked = No
271,696 UART: [state] WD Timer not started. Device not locked for debugging
275,046 UART: [kat] SHA2-256
454,659 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
465,470 UART: [kat] ++
465,954 UART: [kat] sha1
477,333 UART: [kat] SHA2-256
479,999 UART: [kat] SHA2-384
485,720 UART: [kat] SHA2-512-ACC
488,097 UART: [kat] ECC-384
2,950,198 UART: [kat] HMAC-384Kdf
2,974,029 UART: [kat] LMS
3,450,485 UART: [kat] --
3,455,038 UART: [cold-reset] ++
3,457,123 UART: [fht] FHT @ 0x50003400
3,469,028 UART: [idev] ++
3,469,597 UART: [idev] CDI.KEYID = 6
3,470,636 UART: [idev] SUBJECT.KEYID = 7
3,471,817 UART: [idev] UDS.KEYID = 0
3,472,769 ready_for_fw is high
3,472,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,623,148 UART: [idev] Erasing UDS.KEYID = 0
5,990,755 UART: [idev] Sha1 KeyId Algorithm
6,013,906 UART: [idev] --
6,019,738 UART: [ldev] ++
6,020,328 UART: [ldev] CDI.KEYID = 6
6,021,246 UART: [ldev] SUBJECT.KEYID = 5
6,022,470 UART: [ldev] AUTHORITY.KEYID = 7
6,023,713 UART: [ldev] FE.KEYID = 1
6,064,609 UART: [ldev] Erasing FE.KEYID = 1
8,572,798 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,309,322 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,325,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,341,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,356,634 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,377,610 UART: [ldev] --
10,383,423 UART: [fwproc] Wait for Commands...
10,386,389 UART: [fwproc] Recv command 0x46574c44
10,388,382 UART: [fwproc] Recv'd Img size: 119428 bytes
13,886,150 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,965,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,038,565 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,369,310 >>> mbox cmd response: success
14,374,120 UART: [afmc] ++
14,374,719 UART: [afmc] CDI.KEYID = 6
14,375,675 UART: [afmc] SUBJECT.KEYID = 7
14,376,894 UART: [afmc] AUTHORITY.KEYID = 5
16,926,055 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,668,199 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,670,410 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,686,172 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,702,249 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,717,817 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,742,922 UART: [afmc] --
18,747,189 UART: [cold-reset] --
18,751,488 UART: [state] Locking Datavault
18,755,879 UART: [state] Locking PCR0, PCR1 and PCR31
18,757,630 UART: [state] Locking ICCM
18,759,654 UART: [exit] Launching FMC @ 0x40000130
18,768,060 UART:
18,768,305 UART: Running Caliptra FMC ...
18,769,411 UART:
18,769,574 UART: [state] CFI Enabled
18,824,106 UART: [fht] FMC Alias Private Key: 7
20,590,502 UART: [art] Extend RT PCRs Done
20,591,716 UART: [art] Lock RT PCRs Done
20,593,296 UART: [art] Populate DV Done
20,598,621 UART: [fht] FMC Alias Private Key: 7
20,600,109 UART: [art] Derive CDI
20,600,877 UART: [art] Store in slot 0x4
20,656,566 UART: [art] Derive Key Pair
20,657,601 UART: [art] Store priv key in slot 0x5
23,120,656 UART: [art] Derive Key Pair - Done
23,133,756 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,845,962 UART: [art] Erasing AUTHORITY.KEYID = 7
24,847,480 UART: [art] PUB.X = 399BF4D75FFA66C67E42648F984CD1741D13BDF4F9EFD9404C630D6A35C8FD74FD70A3DB0726B48A7EF670A696B8B8AB
24,854,736 UART: [art] PUB.Y = 25442B0E59CE15A4D34E7D4316133F7D8373B1C8438040045A9ED6DCEF375EFF469EFFDD190378DE9E9AAF4C851048FB
24,862,039 UART: [art] SIG.R = B87956D4520DF6679FEF64663217226FA78913967066D17FB0ED7251B8617236D64587E88B2746BB8AB64CC4F7E4EA95
24,869,389 UART: [art] SIG.S = 270615E4AAA4454BC2421D3B2751590ACC55EEAD6B3DA54728646E98D0ECED5300644DF6007BD0B2AAF40156E79784AE
25,848,576 UART: Caliptra RT
25,849,271 UART: [state] CFI Enabled
26,030,246 UART: [rt] RT listening for mailbox commands...
26,032,128 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,061,905 UART: [rt]cmd =0x46504c54, len=4
26,063,546 >>> mbox cmd response data (8 bytes)
26,064,619 UART: [rt] FIPS self test
26,065,570 UART: [kat] ++
26,066,026 UART: [kat] sha1
26,066,767 UART: Fatal Error: 0x90060001
26,102,090 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,252,137 >>> mbox cmd response: failed
26,252,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,402,577 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,054 UART:
190,358 UART: Running Caliptra ROM ...
191,480 UART:
191,637 UART: [state] CFI Enabled
257,220 UART: [state] LifecycleState = Unprovisioned
259,189 UART: [state] DebugLocked = No
260,681 UART: [state] WD Timer not started. Device not locked for debugging
264,368 UART: [kat] SHA2-256
444,020 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
454,803 UART: [kat] ++
455,347 UART: [kat] sha1
466,611 UART: [kat] SHA2-256
469,347 UART: [kat] SHA2-384
476,297 UART: [kat] SHA2-512-ACC
478,639 UART: [kat] ECC-384
2,938,688 UART: [kat] HMAC-384Kdf
2,972,609 UART: [kat] LMS
3,449,131 UART: [kat] --
3,453,409 UART: [cold-reset] ++
3,454,595 UART: [fht] FHT @ 0x50003400
3,466,897 UART: [idev] ++
3,467,465 UART: [idev] CDI.KEYID = 6
3,468,495 UART: [idev] SUBJECT.KEYID = 7
3,469,660 UART: [idev] UDS.KEYID = 0
3,471,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,399 UART: [idev] Erasing UDS.KEYID = 0
5,990,405 UART: [idev] Sha1 KeyId Algorithm
6,013,577 UART: [idev] --
6,019,886 UART: [ldev] ++
6,020,474 UART: [ldev] CDI.KEYID = 6
6,021,404 UART: [ldev] SUBJECT.KEYID = 5
6,022,628 UART: [ldev] AUTHORITY.KEYID = 7
6,023,871 UART: [ldev] FE.KEYID = 1
6,058,019 UART: [ldev] Erasing FE.KEYID = 1
8,563,440 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,683 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,556 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,401 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,049 UART: [ldev] --
10,374,734 UART: [fwproc] Wait for Commands...
10,376,942 UART: [fwproc] Recv command 0x46574c44
10,378,935 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,426 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,958,487 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,031,504 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,362,739 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,100 writing to cptra_bootfsm_go
3,461,315 ready_for_fw is high
3,461,725 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,250,931 >>> mbox cmd response: success
18,552,125 UART:
18,552,564 UART: Running Caliptra FMC ...
18,553,736 UART:
18,553,906 UART: [state] CFI Enabled
18,618,306 UART: [fht] FMC Alias Private Key: 7
20,384,641 UART: [art] Extend RT PCRs Done
20,385,869 UART: [art] Lock RT PCRs Done
20,387,931 UART: [art] Populate DV Done
20,393,215 UART: [fht] FMC Alias Private Key: 7
20,394,747 UART: [art] Derive CDI
20,395,525 UART: [art] Store in slot 0x4
20,450,848 UART: [art] Derive Key Pair
20,451,852 UART: [art] Store priv key in slot 0x5
22,914,310 UART: [art] Derive Key Pair - Done
22,926,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,640,225 UART: [art] Erasing AUTHORITY.KEYID = 7
24,641,743 UART: [art] PUB.X = F19EF9E7BF743DE9C272B242A32633A20B778FEC738CFB6096335C39E9262F2C10FB9C275C476FE7B7DC6C2E6CEEE915
24,649,046 UART: [art] PUB.Y = 142340ABE4BA766C6AC664E678718DDB2FB60B97AA119BD99C053E94F830197DD2BDD1F3448FB64C08B500EA4CA77D78
24,656,225 UART: [art] SIG.R = FF62E97735119AF34CBE8CC543D4E16868E0D81CDF0F08074CB2B4442B99A89A9E62E81A0BD07E685F7F52169DC500C1
24,663,655 UART: [art] SIG.S = 7E5D0BEA011BBFE155C897E97B1B37E246176CEE46F6E0E8C6521E7810DB4F124846F1260DEF4DDEA96380EC39DC22D6
25,642,400 UART: Caliptra RT
25,643,121 UART: [state] CFI Enabled
25,823,309 UART: [rt] RT listening for mailbox commands...
25,825,183 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,854,848 UART: [rt]cmd =0x46504c54, len=4
25,856,359 >>> mbox cmd response data (8 bytes)
25,857,263 UART: [rt] FIPS self test
25,858,209 UART: [kat] ++
25,858,668 UART: [kat] sha1
25,859,346 UART: Fatal Error: 0x90060001
25,894,558 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,044,528 >>> mbox cmd response: failed
26,045,211 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,195,147 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,451,400 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,234,984 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
192,566 UART:
192,936 UART: Running Caliptra ROM ...
194,151 UART:
603,664 UART: [state] CFI Enabled
617,977 UART: [state] LifecycleState = Unprovisioned
619,867 UART: [state] DebugLocked = No
621,264 UART: [state] WD Timer not started. Device not locked for debugging
625,202 UART: [kat] SHA2-256
804,893 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,615 UART: [kat] ++
816,224 UART: [kat] sha1
827,393 UART: [kat] SHA2-256
830,046 UART: [kat] SHA2-384
834,915 UART: [kat] SHA2-512-ACC
837,298 UART: [kat] ECC-384
3,279,346 UART: [kat] HMAC-384Kdf
3,292,859 UART: [kat] LMS
3,769,343 UART: [kat] --
3,773,341 UART: [cold-reset] ++
3,774,237 UART: [fht] FHT @ 0x50003400
3,785,011 UART: [idev] ++
3,785,588 UART: [idev] CDI.KEYID = 6
3,786,626 UART: [idev] SUBJECT.KEYID = 7
3,787,806 UART: [idev] UDS.KEYID = 0
3,788,741 ready_for_fw is high
3,788,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,939,001 UART: [idev] Erasing UDS.KEYID = 0
6,262,656 UART: [idev] Sha1 KeyId Algorithm
6,287,055 UART: [idev] --
6,291,196 UART: [ldev] ++
6,291,792 UART: [ldev] CDI.KEYID = 6
6,292,863 UART: [ldev] SUBJECT.KEYID = 5
6,293,972 UART: [ldev] AUTHORITY.KEYID = 7
6,295,153 UART: [ldev] FE.KEYID = 1
6,307,050 UART: [ldev] Erasing FE.KEYID = 1
8,789,499 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,509,516 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,525,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,541,209 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,556,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,577,209 UART: [ldev] --
10,582,637 UART: [fwproc] Wait for Commands...
10,584,641 UART: [fwproc] Recv command 0x46574c44
10,586,633 UART: [fwproc] Recv'd Img size: 119428 bytes
14,079,892 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,188 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,207 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,566,488 >>> mbox cmd response: success
14,571,049 UART: [afmc] ++
14,571,659 UART: [afmc] CDI.KEYID = 6
14,572,580 UART: [afmc] SUBJECT.KEYID = 7
14,573,822 UART: [afmc] AUTHORITY.KEYID = 5
17,074,798 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,033 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,873 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,952 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,537 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,873,099 UART: [afmc] --
18,876,979 UART: [cold-reset] --
18,880,035 UART: [state] Locking Datavault
18,886,913 UART: [state] Locking PCR0, PCR1 and PCR31
18,888,687 UART: [state] Locking ICCM
18,890,928 UART: [exit] Launching FMC @ 0x40000130
18,899,345 UART:
18,899,587 UART: Running Caliptra FMC ...
18,900,695 UART:
18,900,888 UART: [state] CFI Enabled
18,908,995 UART: [fht] FMC Alias Private Key: 7
20,674,864 UART: [art] Extend RT PCRs Done
20,676,076 UART: [art] Lock RT PCRs Done
20,677,519 UART: [art] Populate DV Done
20,682,925 UART: [fht] FMC Alias Private Key: 7
20,684,610 UART: [art] Derive CDI
20,685,443 UART: [art] Store in slot 0x4
20,728,043 UART: [art] Derive Key Pair
20,729,057 UART: [art] Store priv key in slot 0x5
23,155,566 UART: [art] Derive Key Pair - Done
23,168,458 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,955 UART: [art] Erasing AUTHORITY.KEYID = 7
24,876,437 UART: [art] PUB.X = FB029823CA478991EE0E27ED6A3A2C09C36D1ABC213ABE8C1E8A6FBE0D565AF3E3883841787529576BA6F7BC2D3E995A
24,883,726 UART: [art] PUB.Y = 0851CB685B9EA056DEB1BCDA7B3F24323C8DCDE0B5A19FB27A65050363D01A925EF3014F6A74E00CFFD78C8F983EBE39
24,891,052 UART: [art] SIG.R = 5E0174F6AAC42FEA57577B2A2905C38CF387914FAE6618FE45B157538FEBBAE64B732225B8486E893C661727B42DCD41
24,898,448 UART: [art] SIG.S = 1471A1337BEC098A781FD73AE4A3AA5B0E2CAF590D097DE201A752BF12D1DCB39A3399E54EA31D7FDE5CF814F58D74F1
25,877,391 UART: Caliptra RT
25,878,113 UART: [state] CFI Enabled
26,011,293 UART: [rt] RT listening for mailbox commands...
26,013,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,042,779 UART: [rt]cmd =0x46504c54, len=4
26,044,291 >>> mbox cmd response data (8 bytes)
26,045,468 UART: [rt] FIPS self test
26,046,427 UART: [kat] ++
26,046,886 UART: [kat] sha1
26,047,405 UART: Fatal Error: 0x90060001
26,082,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,232,525 >>> mbox cmd response: failed
26,233,175 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,383,109 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,014 UART:
190,317 UART: Running Caliptra ROM ...
191,347 UART:
14,151,631 UART: [state] CFI Enabled
14,165,931 UART: [state] LifecycleState = Unprovisioned
14,167,846 UART: [state] DebugLocked = No
14,170,213 UART: [state] WD Timer not started. Device not locked for debugging
14,173,959 UART: [kat] SHA2-256
14,353,583 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,364,381 UART: [kat] ++
14,364,872 UART: [kat] sha1
14,376,518 UART: [kat] SHA2-256
14,379,216 UART: [kat] SHA2-384
14,385,190 UART: [kat] SHA2-512-ACC
14,387,556 UART: [kat] ECC-384
16,832,734 UART: [kat] HMAC-384Kdf
16,845,561 UART: [kat] LMS
17,322,075 UART: [kat] --
17,328,200 UART: [cold-reset] ++
17,330,516 UART: [fht] FHT @ 0x50003400
17,341,723 UART: [idev] ++
17,342,337 UART: [idev] CDI.KEYID = 6
17,343,252 UART: [idev] SUBJECT.KEYID = 7
17,344,479 UART: [idev] UDS.KEYID = 0
17,346,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,495,783 UART: [idev] Erasing UDS.KEYID = 0
19,818,597 UART: [idev] Sha1 KeyId Algorithm
19,842,908 UART: [idev] --
19,846,852 UART: [ldev] ++
19,847,484 UART: [ldev] CDI.KEYID = 6
19,848,370 UART: [ldev] SUBJECT.KEYID = 5
19,849,606 UART: [ldev] AUTHORITY.KEYID = 7
19,850,849 UART: [ldev] FE.KEYID = 1
19,862,985 UART: [ldev] Erasing FE.KEYID = 1
22,339,901 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,059,400 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,075,281 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,091,126 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,106,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,129,598 UART: [ldev] --
24,134,387 UART: [fwproc] Wait for Commands...
24,136,219 UART: [fwproc] Recv command 0x46574c44
24,138,375 UART: [fwproc] Recv'd Img size: 119428 bytes
27,629,113 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,711,807 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,784,854 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,116,383 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,333 writing to cptra_bootfsm_go
3,784,986 ready_for_fw is high
3,785,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,480,033 >>> mbox cmd response: success
18,729,723 UART:
18,730,130 UART: Running Caliptra FMC ...
18,731,277 UART:
18,731,443 UART: [state] CFI Enabled
18,739,183 UART: [fht] FMC Alias Private Key: 7
20,505,089 UART: [art] Extend RT PCRs Done
20,506,328 UART: [art] Lock RT PCRs Done
20,507,845 UART: [art] Populate DV Done
20,513,450 UART: [fht] FMC Alias Private Key: 7
20,515,050 UART: [art] Derive CDI
20,516,037 UART: [art] Store in slot 0x4
20,558,678 UART: [art] Derive Key Pair
20,559,692 UART: [art] Store priv key in slot 0x5
22,986,391 UART: [art] Derive Key Pair - Done
22,999,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,705,525 UART: [art] Erasing AUTHORITY.KEYID = 7
24,707,037 UART: [art] PUB.X = E8A4CEC4578B2D0C15CDBC5BA3E8B93B0075162E6B6A1507AF1E2B40F98FC91812C1BAC4FBEEB2CD5031607A2564B2F1
24,714,299 UART: [art] PUB.Y = F80B25EA0C629FC989838578548EED1E8F684DB445216CC2BD7E14961260A7C55B0C93616A2569CC5AF878F676FA59CD
24,721,556 UART: [art] SIG.R = ACCA07F551A2E3E6B21443A41EDCADA5FF3B0A2894E35BE666160CAB35449AB35547BC1E9E4E98988D553BED2924699E
24,728,958 UART: [art] SIG.S = D9C2BD85F4D4E536BD4AB5AE76777CAC473E59576DDB12DFA4C94A24429829BEDCED13DF097230FDEF723C998F329EDB
25,707,629 UART: Caliptra RT
25,708,331 UART: [state] CFI Enabled
25,841,233 UART: [rt] RT listening for mailbox commands...
25,843,088 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,872,719 UART: [rt]cmd =0x46504c54, len=4
25,874,522 >>> mbox cmd response data (8 bytes)
25,875,360 UART: [rt] FIPS self test
25,876,876 UART: [kat] ++
25,877,337 UART: [kat] sha1
25,877,856 UART: Fatal Error: 0x90060001
25,912,928 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,062,971 >>> mbox cmd response: failed
26,063,621 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,213,550 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
17,505,465 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,177,080 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,979 writing to cptra_bootfsm_go
192,088 UART:
192,453 UART: Running Caliptra ROM ...
193,639 UART:
193,796 UART: [state] CFI Enabled
264,381 UART: [state] LifecycleState = Unprovisioned
266,795 UART: [state] DebugLocked = No
269,682 UART: [state] WD Timer not started. Device not locked for debugging
275,010 UART: [kat] SHA2-256
464,872 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,681 UART: [kat] ++
476,171 UART: [kat] sha1
487,149 UART: [kat] SHA2-256
490,171 UART: [kat] SHA2-384
496,738 UART: [kat] SHA2-512-ACC
499,331 UART: [kat] ECC-384
2,951,163 UART: [kat] HMAC-384Kdf
2,973,066 UART: [kat] LMS
3,504,855 UART: [kat] --
3,510,159 UART: [cold-reset] ++
3,512,674 UART: [fht] FHT @ 0x50003400
3,523,810 UART: [idev] ++
3,524,454 UART: [idev] CDI.KEYID = 6
3,525,441 UART: [idev] SUBJECT.KEYID = 7
3,526,644 UART: [idev] UDS.KEYID = 0
3,527,568 ready_for_fw is high
3,527,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,971 UART: [idev] Erasing UDS.KEYID = 0
6,029,754 UART: [idev] Sha1 KeyId Algorithm
6,052,830 UART: [idev] --
6,057,674 UART: [ldev] ++
6,058,377 UART: [ldev] CDI.KEYID = 6
6,059,306 UART: [ldev] SUBJECT.KEYID = 5
6,060,474 UART: [ldev] AUTHORITY.KEYID = 7
6,061,719 UART: [ldev] FE.KEYID = 1
6,101,324 UART: [ldev] Erasing FE.KEYID = 1
8,607,072 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,150 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,353 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,576 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,718 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,844 UART: [ldev] --
10,415,465 UART: [fwproc] Wait for Commands...
10,418,216 UART: [fwproc] Recv command 0x46574c44
10,420,501 UART: [fwproc] Recv'd Img size: 119428 bytes
13,935,854 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,321 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,954 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,701,948 >>> mbox cmd response: success
14,705,661 UART: [afmc] ++
14,706,366 UART: [afmc] CDI.KEYID = 6
14,707,609 UART: [afmc] SUBJECT.KEYID = 7
14,709,039 UART: [afmc] AUTHORITY.KEYID = 5
17,237,891 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,569 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,510 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,554 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,741 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,683 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,760 UART: [afmc] --
19,032,948 UART: [cold-reset] --
19,037,099 UART: [state] Locking Datavault
19,043,062 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,260 UART: [state] Locking ICCM
19,047,094 UART: [exit] Launching FMC @ 0x40000130
19,055,773 UART:
19,056,026 UART: Running Caliptra FMC ...
19,057,064 UART:
19,057,219 UART: [state] CFI Enabled
19,117,815 UART: [fht] FMC Alias Private Key: 7
20,884,359 UART: [art] Extend RT PCRs Done
20,885,580 UART: [art] Lock RT PCRs Done
20,887,260 UART: [art] Populate DV Done
20,892,563 UART: [fht] FMC Alias Private Key: 7
20,894,210 UART: [art] Derive CDI
20,895,029 UART: [art] Store in slot 0x4
20,950,205 UART: [art] Derive Key Pair
20,951,253 UART: [art] Store priv key in slot 0x5
23,413,903 UART: [art] Derive Key Pair - Done
23,426,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,658 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,173 UART: [art] PUB.X = 874B83EC5078F111562283E3A00074D8040F260875C4439514863289FBA657D7447AF227E83F7EDF6A481B3A5D485234
25,148,324 UART: [art] PUB.Y = 08C180D3492D1A3B175EC0F1164B70EDE5DF9F34325F0C49436C83B628F323772BB0C1BB7A67C62E4FB32348A1298370
25,155,619 UART: [art] SIG.R = 10861B8BC19C41384568FE1836750AACAC03B16E3DD97323411F222376477FC5092EEA4CDE07FFA8800D9D6A3D29F14B
25,163,002 UART: [art] SIG.S = FE44EC1F5B7A973DD876335BDAD916EBEE7F52A2FB63B40033880158FA129F4A09EC51589133AA9234F8E7A2F99957EF
26,141,948 UART: Caliptra RT
26,142,646 UART: [state] CFI Enabled
26,321,669 UART: [rt] RT listening for mailbox commands...
26,323,548 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,353,293 UART: [rt]cmd =0x46504c54, len=4
26,354,879 >>> mbox cmd response data (8 bytes)
26,355,834 UART: [rt] FIPS self test
26,356,800 UART: [kat] ++
26,357,259 UART: [kat] sha1
26,358,047 UART: Fatal Error: 0x90060001
26,393,450 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,543,499 >>> mbox cmd response: failed
26,544,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,694,102 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,102 UART:
190,399 UART: Running Caliptra ROM ...
191,459 UART:
191,607 UART: [state] CFI Enabled
258,264 UART: [state] LifecycleState = Unprovisioned
260,618 UART: [state] DebugLocked = No
262,056 UART: [state] WD Timer not started. Device not locked for debugging
266,582 UART: [kat] SHA2-256
456,498 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
467,251 UART: [kat] ++
467,706 UART: [kat] sha1
479,112 UART: [kat] SHA2-256
482,132 UART: [kat] SHA2-384
489,034 UART: [kat] SHA2-512-ACC
491,600 UART: [kat] ECC-384
2,940,625 UART: [kat] HMAC-384Kdf
2,963,482 UART: [kat] LMS
3,495,283 UART: [kat] --
3,499,561 UART: [cold-reset] ++
3,501,931 UART: [fht] FHT @ 0x50003400
3,513,344 UART: [idev] ++
3,514,061 UART: [idev] CDI.KEYID = 6
3,514,980 UART: [idev] SUBJECT.KEYID = 7
3,516,221 UART: [idev] UDS.KEYID = 0
3,517,730 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,667,918 UART: [idev] Erasing UDS.KEYID = 0
6,019,292 UART: [idev] Sha1 KeyId Algorithm
6,040,526 UART: [idev] --
6,045,177 UART: [ldev] ++
6,045,863 UART: [ldev] CDI.KEYID = 6
6,046,776 UART: [ldev] SUBJECT.KEYID = 5
6,047,944 UART: [ldev] AUTHORITY.KEYID = 7
6,049,129 UART: [ldev] FE.KEYID = 1
6,090,355 UART: [ldev] Erasing FE.KEYID = 1
8,597,960 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,332,833 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,348,025 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,363,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,378,382 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,399,548 UART: [ldev] --
10,405,044 UART: [fwproc] Wait for Commands...
10,406,878 UART: [fwproc] Recv command 0x46574c44
10,409,198 UART: [fwproc] Recv'd Img size: 119428 bytes
13,919,813 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,994,551 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,209 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,683,370 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,925 writing to cptra_bootfsm_go
3,439,343 ready_for_fw is high
3,439,778 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,842,464 >>> mbox cmd response: success
19,130,564 UART:
19,130,981 UART: Running Caliptra FMC ...
19,132,145 UART:
19,132,315 UART: [state] CFI Enabled
19,200,739 UART: [fht] FMC Alias Private Key: 7
20,967,107 UART: [art] Extend RT PCRs Done
20,968,356 UART: [art] Lock RT PCRs Done
20,969,986 UART: [art] Populate DV Done
20,975,244 UART: [fht] FMC Alias Private Key: 7
20,976,789 UART: [art] Derive CDI
20,977,613 UART: [art] Store in slot 0x4
21,033,297 UART: [art] Derive Key Pair
21,034,314 UART: [art] Store priv key in slot 0x5
23,497,653 UART: [art] Derive Key Pair - Done
23,510,545 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,223,079 UART: [art] Erasing AUTHORITY.KEYID = 7
25,224,595 UART: [art] PUB.X = 7DCCD8FA9385D3FF14D83152DB89D99D3F0F4FA21208EB1847E7F9C9F804168EFA564723A366FD37B86FEC8B9A2970D7
25,231,833 UART: [art] PUB.Y = 180F5F138BA0485C07542CCA57557D16C24ED4562725522574A51B84C24C60C614C77B2134ADDF0519B558379891BC4B
25,239,054 UART: [art] SIG.R = 7CABAE3B731002298E016E5018391E7E6D8F374E2210808DD48ADBB95AC434C25C707EF6A0DBBE4CB4A6E888E9E2066D
25,246,441 UART: [art] SIG.S = 648D61E64183C24C47FBB1FE04EF4C8C45564FA4DACEBB5AAB07D68C5BDA7F3F2696593314D62AD31FC8BA04D9CCC7D9
26,225,578 UART: Caliptra RT
26,226,296 UART: [state] CFI Enabled
26,406,473 UART: [rt] RT listening for mailbox commands...
26,408,336 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,438,102 UART: [rt]cmd =0x46504c54, len=4
26,439,772 >>> mbox cmd response data (8 bytes)
26,440,719 UART: [rt] FIPS self test
26,441,670 UART: [kat] ++
26,442,127 UART: [kat] sha1
26,442,729 UART: Fatal Error: 0x90060001
26,477,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,627,853 >>> mbox cmd response: failed
26,628,512 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,778,455 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,430,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,847,006 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,829 UART:
193,191 UART: Running Caliptra ROM ...
194,395 UART:
604,252 UART: [state] CFI Enabled
620,630 UART: [state] LifecycleState = Unprovisioned
623,065 UART: [state] DebugLocked = No
625,312 UART: [state] WD Timer not started. Device not locked for debugging
629,649 UART: [kat] SHA2-256
819,511 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,310 UART: [kat] ++
830,765 UART: [kat] sha1
841,287 UART: [kat] SHA2-256
844,297 UART: [kat] SHA2-384
849,862 UART: [kat] SHA2-512-ACC
852,454 UART: [kat] ECC-384
3,295,153 UART: [kat] HMAC-384Kdf
3,307,832 UART: [kat] LMS
3,839,650 UART: [kat] --
3,844,284 UART: [cold-reset] ++
3,846,504 UART: [fht] FHT @ 0x50003400
3,856,716 UART: [idev] ++
3,857,431 UART: [idev] CDI.KEYID = 6
3,858,350 UART: [idev] SUBJECT.KEYID = 7
3,859,531 UART: [idev] UDS.KEYID = 0
3,860,462 ready_for_fw is high
3,860,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,691 UART: [idev] Erasing UDS.KEYID = 0
6,337,909 UART: [idev] Sha1 KeyId Algorithm
6,361,572 UART: [idev] --
6,365,456 UART: [ldev] ++
6,366,147 UART: [ldev] CDI.KEYID = 6
6,367,111 UART: [ldev] SUBJECT.KEYID = 5
6,368,278 UART: [ldev] AUTHORITY.KEYID = 7
6,369,457 UART: [ldev] FE.KEYID = 1
6,380,276 UART: [ldev] Erasing FE.KEYID = 1
8,861,119 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,635 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,825 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,623,011 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,645,277 UART: [ldev] --
10,650,775 UART: [fwproc] Wait for Commands...
10,653,854 UART: [fwproc] Recv command 0x46574c44
10,656,123 UART: [fwproc] Recv'd Img size: 119428 bytes
14,166,547 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,100 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,364,735 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,757 >>> mbox cmd response: success
14,934,752 UART: [afmc] ++
14,935,482 UART: [afmc] CDI.KEYID = 6
14,936,686 UART: [afmc] SUBJECT.KEYID = 7
14,938,132 UART: [afmc] AUTHORITY.KEYID = 5
17,442,365 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,161,475 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,163,438 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,178,586 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,193,724 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,208,615 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,231,807 UART: [afmc] --
19,234,540 UART: [cold-reset] --
19,239,650 UART: [state] Locking Datavault
19,245,230 UART: [state] Locking PCR0, PCR1 and PCR31
19,247,422 UART: [state] Locking ICCM
19,250,173 UART: [exit] Launching FMC @ 0x40000130
19,258,852 UART:
19,259,132 UART: Running Caliptra FMC ...
19,260,245 UART:
19,260,405 UART: [state] CFI Enabled
19,268,240 UART: [fht] FMC Alias Private Key: 7
21,034,612 UART: [art] Extend RT PCRs Done
21,035,845 UART: [art] Lock RT PCRs Done
21,037,208 UART: [art] Populate DV Done
21,042,591 UART: [fht] FMC Alias Private Key: 7
21,044,194 UART: [art] Derive CDI
21,045,018 UART: [art] Store in slot 0x4
21,087,460 UART: [art] Derive Key Pair
21,088,470 UART: [art] Store priv key in slot 0x5
23,515,189 UART: [art] Derive Key Pair - Done
23,528,196 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,234,620 UART: [art] Erasing AUTHORITY.KEYID = 7
25,236,119 UART: [art] PUB.X = 0A99131C65F9DB7E7B8CACB6578A50E37CA692D2D56DC2EC2B2E9081D353392EBD69EB5419F3DE6425965C35AC32AD07
25,243,404 UART: [art] PUB.Y = B409D7E9A3E1459D062A606E2010043A79484A7E951C23162D32D7C9C071DC7138A5C1D2026AF80731620C7645F97603
25,250,664 UART: [art] SIG.R = 3AC2A2CEC98CA8BDEFADB7D07B37659A9244D2F6AA6B8F5E0A0789CF5C27C85000A950CD5DD3240FD1C8132AFE0F04A3
25,258,065 UART: [art] SIG.S = 51C8347756F51811E81D5D17D1B7F453A145B0B15886F1D458B7D48E112E8891F8701FC5AC056C5519008534B7D42328
26,236,187 UART: Caliptra RT
26,236,902 UART: [state] CFI Enabled
26,369,093 UART: [rt] RT listening for mailbox commands...
26,370,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,400,505 UART: [rt]cmd =0x46504c54, len=4
26,401,958 >>> mbox cmd response data (8 bytes)
26,403,082 UART: [rt] FIPS self test
26,404,043 UART: [kat] ++
26,404,499 UART: [kat] sha1
26,405,007 UART: Fatal Error: 0x90060001
26,440,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,590,109 >>> mbox cmd response: failed
26,590,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,740,639 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,089 UART:
190,383 UART: Running Caliptra ROM ...
191,411 UART:
13,795,848 UART: [state] CFI Enabled
13,812,146 UART: [state] LifecycleState = Unprovisioned
13,814,511 UART: [state] DebugLocked = No
13,816,226 UART: [state] WD Timer not started. Device not locked for debugging
13,820,367 UART: [kat] SHA2-256
14,010,266 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,021,076 UART: [kat] ++
14,021,625 UART: [kat] sha1
14,032,114 UART: [kat] SHA2-256
14,035,128 UART: [kat] SHA2-384
14,040,323 UART: [kat] SHA2-512-ACC
14,042,909 UART: [kat] ECC-384
16,487,202 UART: [kat] HMAC-384Kdf
16,500,627 UART: [kat] LMS
17,032,468 UART: [kat] --
17,036,406 UART: [cold-reset] ++
17,038,779 UART: [fht] FHT @ 0x50003400
17,049,842 UART: [idev] ++
17,050,523 UART: [idev] CDI.KEYID = 6
17,051,546 UART: [idev] SUBJECT.KEYID = 7
17,052,657 UART: [idev] UDS.KEYID = 0
17,054,196 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,204,086 UART: [idev] Erasing UDS.KEYID = 0
19,529,057 UART: [idev] Sha1 KeyId Algorithm
19,552,082 UART: [idev] --
19,555,735 UART: [ldev] ++
19,556,479 UART: [ldev] CDI.KEYID = 6
19,557,395 UART: [ldev] SUBJECT.KEYID = 5
19,558,554 UART: [ldev] AUTHORITY.KEYID = 7
19,559,733 UART: [ldev] FE.KEYID = 1
19,569,416 UART: [ldev] Erasing FE.KEYID = 1
22,047,095 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,764,305 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,779,493 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,794,671 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,809,796 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,829,670 UART: [ldev] --
23,834,562 UART: [fwproc] Wait for Commands...
23,836,993 UART: [fwproc] Recv command 0x46574c44
23,839,264 UART: [fwproc] Recv'd Img size: 119428 bytes
27,349,607 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,430,292 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,553,939 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,119,757 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,268 writing to cptra_bootfsm_go
3,752,763 ready_for_fw is high
3,753,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,056,903 >>> mbox cmd response: success
19,314,101 UART:
19,314,491 UART: Running Caliptra FMC ...
19,315,705 UART:
19,315,874 UART: [state] CFI Enabled
19,323,771 UART: [fht] FMC Alias Private Key: 7
21,089,924 UART: [art] Extend RT PCRs Done
21,091,160 UART: [art] Lock RT PCRs Done
21,092,714 UART: [art] Populate DV Done
21,097,811 UART: [fht] FMC Alias Private Key: 7
21,099,316 UART: [art] Derive CDI
21,100,111 UART: [art] Store in slot 0x4
21,142,931 UART: [art] Derive Key Pair
21,143,938 UART: [art] Store priv key in slot 0x5
23,570,769 UART: [art] Derive Key Pair - Done
23,584,161 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,290,681 UART: [art] Erasing AUTHORITY.KEYID = 7
25,292,195 UART: [art] PUB.X = 0EE60A9C187B5A7BD73677B0F3C456AB1CE82C1CEB10E61C89C62D04CBD5DB0EFB3B3518D069B3681E621813D3D58CCF
25,299,493 UART: [art] PUB.Y = C486E8AB2E69551727DCAEC98991CBE9B2150B625079C6DC64406B3215AFC99C345E8571C316464D49ECE0567167ABBF
25,306,713 UART: [art] SIG.R = CD8C944177E8AEAF72DE5F2EB07E510CFF6989F264E3DE0FC84116B2EF0E64A8A292928910ACC3BD0C760214746EB381
25,314,097 UART: [art] SIG.S = 9D8D5A0A82378935FC333FD6BA46FF1D6647697D30DE5B0E90A0ED626F86C5180FFA71371ACD05CC489F161F7A5193C3
26,293,079 UART: Caliptra RT
26,293,772 UART: [state] CFI Enabled
26,426,497 UART: [rt] RT listening for mailbox commands...
26,428,376 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,022 UART: [rt]cmd =0x46504c54, len=4
26,459,484 >>> mbox cmd response data (8 bytes)
26,460,665 UART: [rt] FIPS self test
26,461,620 UART: [kat] ++
26,462,078 UART: [kat] sha1
26,462,597 UART: Fatal Error: 0x90060001
26,497,744 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,647,706 >>> mbox cmd response: failed
26,648,286 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,798,152 >>> mbox cmd response: failed
Initializing fuses
921 writing to cptra_bootfsm_go
16,889,502 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,210,863 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,072 UART: [state] LifecycleState = Unprovisioned
85,727 UART: [state] DebugLocked = No
86,441 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,095 UART: [kat] SHA2-256
882,026 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,141 UART: [kat] ++
886,293 UART: [kat] sha1
890,313 UART: [kat] SHA2-256
892,251 UART: [kat] SHA2-384
894,936 UART: [kat] SHA2-512-ACC
896,837 UART: [kat] ECC-384
902,406 UART: [kat] HMAC-384Kdf
907,040 UART: [kat] LMS
1,475,236 UART: [kat] --
1,476,025 UART: [cold-reset] ++
1,476,407 UART: [fht] Storing FHT @ 0x50003400
1,479,292 UART: [idev] ++
1,479,460 UART: [idev] CDI.KEYID = 6
1,479,820 UART: [idev] SUBJECT.KEYID = 7
1,480,244 UART: [idev] UDS.KEYID = 0
1,480,589 ready_for_fw is high
1,480,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,852 UART: [idev] Erasing UDS.KEYID = 0
1,504,518 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,928 UART: [idev] --
1,513,999 UART: [ldev] ++
1,514,167 UART: [ldev] CDI.KEYID = 6
1,514,530 UART: [ldev] SUBJECT.KEYID = 5
1,514,956 UART: [ldev] AUTHORITY.KEYID = 7
1,515,419 UART: [ldev] FE.KEYID = 1
1,520,725 UART: [ldev] Erasing FE.KEYID = 1
1,546,392 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,075 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,791 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,682 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,394 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,512 UART: [ldev] --
1,585,905 UART: [fwproc] Waiting for Commands...
1,586,766 UART: [fwproc] Received command 0x46574c44
1,587,557 UART: [fwproc] Received Image of size 119428 bytes
2,942,863 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,499 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,717 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,280 >>> mbox cmd response: success
3,143,332 UART: [afmc] ++
3,143,500 UART: [afmc] CDI.KEYID = 6
3,143,862 UART: [afmc] SUBJECT.KEYID = 7
3,144,287 UART: [afmc] AUTHORITY.KEYID = 5
3,179,614 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,212 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,701 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,584 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,267 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,269 UART: [afmc] --
3,223,323 UART: [cold-reset] --
3,224,071 UART: [state] Locking Datavault
3,225,324 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,928 UART: [state] Locking ICCM
3,226,576 UART: [exit] Launching FMC @ 0x40000130
3,231,906 UART:
3,231,922 UART: Running Caliptra FMC ...
3,232,330 UART:
3,232,384 UART: [state] CFI Enabled
3,242,540 UART: [fht] FMC Alias Private Key: 7
3,361,652 UART: [art] Extend RT PCRs Done
3,362,080 UART: [art] Lock RT PCRs Done
3,363,548 UART: [art] Populate DV Done
3,371,681 UART: [fht] FMC Alias Private Key: 7
3,372,735 UART: [art] Derive CDI
3,373,015 UART: [art] Store in slot 0x4
3,459,027 UART: [art] Derive Key Pair
3,459,387 UART: [art] Store priv key in slot 0x5
3,472,658 UART: [art] Derive Key Pair - Done
3,487,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,662 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,427 UART: [art] PUB.X = 5CF1520BF9B5E68C3F89A65E9AF755CFA0F89A3150FB5341A920F405D775B5DEEA3808E81141DA45F83301E6165A292C
3,510,191 UART: [art] PUB.Y = C2554E42C1C97356CFEDAC8FD23A7E3EC952A7DC2F94583A1ECDACA0F9081E30015BA13B6038E48DA5F8386F80452561
3,517,147 UART: [art] SIG.R = 8B8BD0CBCA45406C570344AE2370B40024CD8BF146A45466A361BA677511C20AAB346869FC650C7A90F7753B0696C13B
3,523,883 UART: [art] SIG.S = ABA2F3B96E2D2B0DE44706B4A5E9BD7827ED505E67E6BE9270BAE06FA48399C814F5625F9BC95115E1ADD15FE3F6C18F
3,547,641 UART: Caliptra RT
3,547,892 UART: [state] CFI Enabled
3,668,351 UART: [rt] RT listening for mailbox commands...
3,669,014 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,801 UART: [rt]cmd =0x46504c54, len=4
3,700,073 >>> mbox cmd response data (8 bytes)
3,700,230 UART: [rt] FIPS self test
3,700,558 UART: [kat] ++
3,700,710 UART: [kat] sha1
3,701,646 UART: Fatal Error: 0x90060001
3,703,185 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,703,190 >>> mbox cmd response: failed
3,703,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,703,195 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,904 UART: [state] LifecycleState = Unprovisioned
85,559 UART: [state] DebugLocked = No
86,063 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,773 UART: [kat] SHA2-256
881,704 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,819 UART: [kat] ++
885,971 UART: [kat] sha1
890,347 UART: [kat] SHA2-256
892,285 UART: [kat] SHA2-384
895,250 UART: [kat] SHA2-512-ACC
897,151 UART: [kat] ECC-384
902,744 UART: [kat] HMAC-384Kdf
907,232 UART: [kat] LMS
1,475,428 UART: [kat] --
1,476,431 UART: [cold-reset] ++
1,476,919 UART: [fht] Storing FHT @ 0x50003400
1,479,644 UART: [idev] ++
1,479,812 UART: [idev] CDI.KEYID = 6
1,480,172 UART: [idev] SUBJECT.KEYID = 7
1,480,596 UART: [idev] UDS.KEYID = 0
1,480,941 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,798 UART: [idev] Erasing UDS.KEYID = 0
1,505,074 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,648 UART: [idev] --
1,514,811 UART: [ldev] ++
1,514,979 UART: [ldev] CDI.KEYID = 6
1,515,342 UART: [ldev] SUBJECT.KEYID = 5
1,515,768 UART: [ldev] AUTHORITY.KEYID = 7
1,516,231 UART: [ldev] FE.KEYID = 1
1,521,385 UART: [ldev] Erasing FE.KEYID = 1
1,546,442 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,626 UART: [ldev] --
1,585,945 UART: [fwproc] Waiting for Commands...
1,586,778 UART: [fwproc] Received command 0x46574c44
1,587,569 UART: [fwproc] Received Image of size 119428 bytes
2,942,591 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,137 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,355 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,878 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,213 ready_for_fw is high
1,363,213 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,846 >>> mbox cmd response: success
3,054,833 UART:
3,054,849 UART: Running Caliptra FMC ...
3,055,257 UART:
3,055,311 UART: [state] CFI Enabled
3,065,985 UART: [fht] FMC Alias Private Key: 7
3,184,929 UART: [art] Extend RT PCRs Done
3,185,357 UART: [art] Lock RT PCRs Done
3,186,939 UART: [art] Populate DV Done
3,195,032 UART: [fht] FMC Alias Private Key: 7
3,196,106 UART: [art] Derive CDI
3,196,386 UART: [art] Store in slot 0x4
3,281,968 UART: [art] Derive Key Pair
3,282,328 UART: [art] Store priv key in slot 0x5
3,294,975 UART: [art] Derive Key Pair - Done
3,309,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,381 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,146 UART: [art] PUB.X = 03F0539EAAA85DBC0AAD005257FEB53FBEE00196F143FAFE993993E32EECD15F54EBE3D75DD528FA696289F05B1BB56B
3,332,907 UART: [art] PUB.Y = 6182F9346EA826F5586B9477B845ED0F34317ED4BFEDF5AB2AA5B3610F8F10534550AEB1AE8042777463DFAC281F4C86
3,339,857 UART: [art] SIG.R = 0A12FF0E91D9AC67D6F24324387C0A476007F8CE396A770FFA44675BF63AA628A889D5F0C1F255DEB763BB071B6EA8C1
3,346,619 UART: [art] SIG.S = 343428FAA99D3352E0E007814A7DEA5460EFD533D96873BCBF4DD75B3664D8FAC0CCD08D29EAD5F417C80E7B7460DD70
3,370,615 UART: Caliptra RT
3,370,866 UART: [state] CFI Enabled
3,490,095 UART: [rt] RT listening for mailbox commands...
3,490,758 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,601 UART: [rt]cmd =0x46504c54, len=4
3,521,859 >>> mbox cmd response data (8 bytes)
3,522,066 UART: [rt] FIPS self test
3,522,394 UART: [kat] ++
3,522,546 UART: [kat] sha1
3,523,344 UART: Fatal Error: 0x90060001
3,524,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,888 >>> mbox cmd response: failed
3,524,888 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,524,893 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,692 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,485 UART: [state] LifecycleState = Unprovisioned
86,140 UART: [state] DebugLocked = No
86,868 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,444 UART: [kat] SHA2-256
882,375 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,490 UART: [kat] ++
886,642 UART: [kat] sha1
890,808 UART: [kat] SHA2-256
892,746 UART: [kat] SHA2-384
895,559 UART: [kat] SHA2-512-ACC
897,460 UART: [kat] ECC-384
903,103 UART: [kat] HMAC-384Kdf
907,751 UART: [kat] LMS
1,475,947 UART: [kat] --
1,476,688 UART: [cold-reset] ++
1,477,160 UART: [fht] Storing FHT @ 0x50003400
1,479,915 UART: [idev] ++
1,480,083 UART: [idev] CDI.KEYID = 6
1,480,443 UART: [idev] SUBJECT.KEYID = 7
1,480,867 UART: [idev] UDS.KEYID = 0
1,481,212 ready_for_fw is high
1,481,212 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,023 UART: [idev] Erasing UDS.KEYID = 0
1,506,235 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,997 UART: [idev] --
1,516,098 UART: [ldev] ++
1,516,266 UART: [ldev] CDI.KEYID = 6
1,516,629 UART: [ldev] SUBJECT.KEYID = 5
1,517,055 UART: [ldev] AUTHORITY.KEYID = 7
1,517,518 UART: [ldev] FE.KEYID = 1
1,523,246 UART: [ldev] Erasing FE.KEYID = 1
1,548,219 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,582 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,298 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,189 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,901 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,805 UART: [ldev] --
1,587,180 UART: [fwproc] Waiting for Commands...
1,587,853 UART: [fwproc] Received command 0x46574c44
1,588,644 UART: [fwproc] Received Image of size 119428 bytes
2,943,388 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,712 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,930 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,477 >>> mbox cmd response: success
3,144,615 UART: [afmc] ++
3,144,783 UART: [afmc] CDI.KEYID = 6
3,145,145 UART: [afmc] SUBJECT.KEYID = 7
3,145,570 UART: [afmc] AUTHORITY.KEYID = 5
3,180,551 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,609 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,389 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,981 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,664 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,424 UART: [afmc] --
3,223,484 UART: [cold-reset] --
3,224,504 UART: [state] Locking Datavault
3,225,611 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,215 UART: [state] Locking ICCM
3,226,671 UART: [exit] Launching FMC @ 0x40000130
3,232,001 UART:
3,232,017 UART: Running Caliptra FMC ...
3,232,425 UART:
3,232,568 UART: [state] CFI Enabled
3,243,080 UART: [fht] FMC Alias Private Key: 7
3,362,168 UART: [art] Extend RT PCRs Done
3,362,596 UART: [art] Lock RT PCRs Done
3,364,138 UART: [art] Populate DV Done
3,372,141 UART: [fht] FMC Alias Private Key: 7
3,373,241 UART: [art] Derive CDI
3,373,521 UART: [art] Store in slot 0x4
3,459,293 UART: [art] Derive Key Pair
3,459,653 UART: [art] Store priv key in slot 0x5
3,473,322 UART: [art] Derive Key Pair - Done
3,488,331 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,968 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,733 UART: [art] PUB.X = F1D2067EA14C9188E4FECBB653E7F75384B410FE56FC30B906A62C5D1B9664BCD765CF09B4FFA32C70F221D8E6EBF066
3,511,510 UART: [art] PUB.Y = 3952F5C460EA82D5AAB1411158F5DD588C523E7D597FB1E5C54B88BAAD3A197B754AB72A8F9B441388BCECAB79E78947
3,518,472 UART: [art] SIG.R = 490A4D387CED2C45D64DDB518646625C2A1C5A3D69334EC66664C887FD5D41D7FF2A58F5AD6A977F1B96D2BA0EBA4B4C
3,525,252 UART: [art] SIG.S = 047542DB2BC4F7F582034ECA7C6485736DE26408CF3281639FD520E183901044C27EE8A60E6D8C40D71F404636E3B84B
3,548,500 UART: Caliptra RT
3,548,843 UART: [state] CFI Enabled
3,669,408 UART: [rt] RT listening for mailbox commands...
3,670,071 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,726 UART: [rt]cmd =0x46504c54, len=4
3,700,670 >>> mbox cmd response data (8 bytes)
3,700,935 UART: [rt] FIPS self test
3,701,263 UART: [kat] ++
3,701,415 UART: [kat] sha1
3,702,315 UART: Fatal Error: 0x90060001
3,703,854 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,703,859 >>> mbox cmd response: failed
3,703,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,703,864 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,209 UART: [state] LifecycleState = Unprovisioned
85,864 UART: [state] DebugLocked = No
86,600 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,328 UART: [kat] SHA2-256
882,259 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,374 UART: [kat] ++
886,526 UART: [kat] sha1
890,814 UART: [kat] SHA2-256
892,752 UART: [kat] SHA2-384
895,297 UART: [kat] SHA2-512-ACC
897,198 UART: [kat] ECC-384
902,583 UART: [kat] HMAC-384Kdf
907,103 UART: [kat] LMS
1,475,299 UART: [kat] --
1,476,232 UART: [cold-reset] ++
1,476,558 UART: [fht] Storing FHT @ 0x50003400
1,479,305 UART: [idev] ++
1,479,473 UART: [idev] CDI.KEYID = 6
1,479,833 UART: [idev] SUBJECT.KEYID = 7
1,480,257 UART: [idev] UDS.KEYID = 0
1,480,602 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,945 UART: [idev] Erasing UDS.KEYID = 0
1,504,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,157 UART: [idev] --
1,514,264 UART: [ldev] ++
1,514,432 UART: [ldev] CDI.KEYID = 6
1,514,795 UART: [ldev] SUBJECT.KEYID = 5
1,515,221 UART: [ldev] AUTHORITY.KEYID = 7
1,515,684 UART: [ldev] FE.KEYID = 1
1,521,218 UART: [ldev] Erasing FE.KEYID = 1
1,546,743 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,653 UART: [ldev] --
1,586,034 UART: [fwproc] Waiting for Commands...
1,586,897 UART: [fwproc] Received command 0x46574c44
1,587,688 UART: [fwproc] Received Image of size 119428 bytes
2,941,890 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,862 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,080 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,687 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,202 ready_for_fw is high
1,363,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,447 >>> mbox cmd response: success
3,055,842 UART:
3,055,858 UART: Running Caliptra FMC ...
3,056,266 UART:
3,056,409 UART: [state] CFI Enabled
3,066,889 UART: [fht] FMC Alias Private Key: 7
3,186,115 UART: [art] Extend RT PCRs Done
3,186,543 UART: [art] Lock RT PCRs Done
3,187,887 UART: [art] Populate DV Done
3,196,012 UART: [fht] FMC Alias Private Key: 7
3,196,986 UART: [art] Derive CDI
3,197,266 UART: [art] Store in slot 0x4
3,283,052 UART: [art] Derive Key Pair
3,283,412 UART: [art] Store priv key in slot 0x5
3,296,813 UART: [art] Derive Key Pair - Done
3,311,782 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,053 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,818 UART: [art] PUB.X = EFE696ACDD26160E84C637B3E0E99446D7BD9E94D88020EBE007367D2CF822D998AA0C23B8E59F5E4BD126065DD24CB0
3,334,588 UART: [art] PUB.Y = C3144005ADF4FA2EE47F93E0330E5895477534DCFE44CDE5CD1C7D8EFA64F744B87A402CB070AD959F1124B98FD324EA
3,341,546 UART: [art] SIG.R = 7C88D5D537EC83C702B73DA77258188DB8DEBC38FF3A285C57F78CF89B7C5F839B6DEB0CFB6CD34964C2E53323E1E476
3,348,324 UART: [art] SIG.S = FB48F7EB8E3D1FCEFEB3DF221436EC2108CE5C921DBE726196C8BDB27F77528B409C154FA527EF907A6934CF39E9535D
3,371,487 UART: Caliptra RT
3,371,830 UART: [state] CFI Enabled
3,492,224 UART: [rt] RT listening for mailbox commands...
3,492,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,602 UART: [rt]cmd =0x46504c54, len=4
3,523,642 >>> mbox cmd response data (8 bytes)
3,523,931 UART: [rt] FIPS self test
3,524,259 UART: [kat] ++
3,524,411 UART: [kat] sha1
3,525,383 UART: Fatal Error: 0x90060001
3,526,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,927 >>> mbox cmd response: failed
3,526,927 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,526,932 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,504 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,393 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,908 UART: [state] LifecycleState = Unprovisioned
85,563 UART: [state] DebugLocked = No
86,133 UART: [state] WD Timer not started. Device not locked for debugging
87,286 UART: [kat] SHA2-256
890,836 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,940 UART: [kat] ++
895,092 UART: [kat] sha1
899,222 UART: [kat] SHA2-256
901,162 UART: [kat] SHA2-384
903,699 UART: [kat] SHA2-512-ACC
905,600 UART: [kat] ECC-384
915,467 UART: [kat] HMAC-384Kdf
920,035 UART: [kat] LMS
1,168,347 UART: [kat] --
1,169,296 UART: [cold-reset] ++
1,169,724 UART: [fht] FHT @ 0x50003400
1,172,312 UART: [idev] ++
1,172,480 UART: [idev] CDI.KEYID = 6
1,172,841 UART: [idev] SUBJECT.KEYID = 7
1,173,266 UART: [idev] UDS.KEYID = 0
1,173,612 ready_for_fw is high
1,173,612 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,263 UART: [idev] Erasing UDS.KEYID = 0
1,198,079 UART: [idev] Sha1 KeyId Algorithm
1,206,935 UART: [idev] --
1,207,960 UART: [ldev] ++
1,208,128 UART: [ldev] CDI.KEYID = 6
1,208,492 UART: [ldev] SUBJECT.KEYID = 5
1,208,919 UART: [ldev] AUTHORITY.KEYID = 7
1,209,382 UART: [ldev] FE.KEYID = 1
1,214,622 UART: [ldev] Erasing FE.KEYID = 1
1,241,403 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,961 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,677 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,264 UART: [ldev] --
1,280,573 UART: [fwproc] Wait for Commands...
1,281,264 UART: [fwproc] Recv command 0x46574c44
1,281,997 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,350 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,187 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,362 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,015 >>> mbox cmd response: success
2,837,135 UART: [afmc] ++
2,837,303 UART: [afmc] CDI.KEYID = 6
2,837,666 UART: [afmc] SUBJECT.KEYID = 7
2,838,092 UART: [afmc] AUTHORITY.KEYID = 5
2,873,923 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,212 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,671 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,552 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,253 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,078 UART: [afmc] --
2,916,997 UART: [cold-reset] --
2,917,813 UART: [state] Locking Datavault
2,919,082 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,686 UART: [state] Locking ICCM
2,920,320 UART: [exit] Launching FMC @ 0x40000130
2,925,650 UART:
2,925,666 UART: Running Caliptra FMC ...
2,926,074 UART:
2,926,128 UART: [state] CFI Enabled
2,936,950 UART: [fht] FMC Alias Private Key: 7
3,055,578 UART: [art] Extend RT PCRs Done
3,056,006 UART: [art] Lock RT PCRs Done
3,057,534 UART: [art] Populate DV Done
3,065,935 UART: [fht] FMC Alias Private Key: 7
3,066,907 UART: [art] Derive CDI
3,067,187 UART: [art] Store in slot 0x4
3,153,158 UART: [art] Derive Key Pair
3,153,518 UART: [art] Store priv key in slot 0x5
3,166,720 UART: [art] Derive Key Pair - Done
3,181,383 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,668 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,433 UART: [art] PUB.X = A5F0AA6CA78BE2736E62880D2979DF59CEB90B0B78BD916A7A18B0E764586DC406EB74BC77D05F78AF67A075AC576CBE
3,204,207 UART: [art] PUB.Y = E2EC00A48C51874918EB7AD391FA0DB4C4A9366465BED829A250F7EFF5FE0D854AC599F06767D5F230561B406745C686
3,211,133 UART: [art] SIG.R = 8D6CF6A577E751C7760D971D796CD869E3DE3713A31F413A75B2F83670CC7F2C68F2B9346B385F640CAC64EC4A95703D
3,217,901 UART: [art] SIG.S = 826B20A1AD63E3121CBC84B1B81A9FFB1FE3D0978A417DB58F183E7062F216F6CCE6A587E2FF05CEC85568891808CC91
3,240,951 UART: Caliptra RT
3,241,202 UART: [state] CFI Enabled
3,359,726 UART: [rt] RT listening for mailbox commands...
3,360,389 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,389,848 UART: [rt]cmd =0x46504c54, len=4
3,390,762 >>> mbox cmd response data (8 bytes)
3,390,945 UART: [rt] FIPS self test
3,391,273 UART: [kat] ++
3,391,425 UART: [kat] sha1
3,392,285 UART: Fatal Error: 0x90060001
3,393,824 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,393,829 >>> mbox cmd response: failed
3,393,829 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,393,834 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,128 UART: [state] LifecycleState = Unprovisioned
85,783 UART: [state] DebugLocked = No
86,279 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
891,138 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,242 UART: [kat] ++
895,394 UART: [kat] sha1
899,690 UART: [kat] SHA2-256
901,630 UART: [kat] SHA2-384
904,179 UART: [kat] SHA2-512-ACC
906,080 UART: [kat] ECC-384
915,989 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,632 UART: [cold-reset] ++
1,170,200 UART: [fht] FHT @ 0x50003400
1,172,716 UART: [idev] ++
1,172,884 UART: [idev] CDI.KEYID = 6
1,173,245 UART: [idev] SUBJECT.KEYID = 7
1,173,670 UART: [idev] UDS.KEYID = 0
1,174,016 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,707 UART: [idev] Erasing UDS.KEYID = 0
1,198,493 UART: [idev] Sha1 KeyId Algorithm
1,207,553 UART: [idev] --
1,208,554 UART: [ldev] ++
1,208,722 UART: [ldev] CDI.KEYID = 6
1,209,086 UART: [ldev] SUBJECT.KEYID = 5
1,209,513 UART: [ldev] AUTHORITY.KEYID = 7
1,209,976 UART: [ldev] FE.KEYID = 1
1,214,920 UART: [ldev] Erasing FE.KEYID = 1
1,241,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,819 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,535 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,424 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,136 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,318 UART: [ldev] --
1,280,703 UART: [fwproc] Wait for Commands...
1,281,432 UART: [fwproc] Recv command 0x46574c44
1,282,165 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,522 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,717 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,892 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,405 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,648 ready_for_fw is high
1,058,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,687,368 >>> mbox cmd response: success
2,748,847 UART:
2,748,863 UART: Running Caliptra FMC ...
2,749,271 UART:
2,749,325 UART: [state] CFI Enabled
2,760,147 UART: [fht] FMC Alias Private Key: 7
2,879,769 UART: [art] Extend RT PCRs Done
2,880,197 UART: [art] Lock RT PCRs Done
2,881,829 UART: [art] Populate DV Done
2,890,034 UART: [fht] FMC Alias Private Key: 7
2,890,976 UART: [art] Derive CDI
2,891,256 UART: [art] Store in slot 0x4
2,977,213 UART: [art] Derive Key Pair
2,977,573 UART: [art] Store priv key in slot 0x5
2,990,871 UART: [art] Derive Key Pair - Done
3,005,833 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,021,292 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,057 UART: [art] PUB.X = 00627515C977CA85E1E4FEE5135109BBA3F8076053638235CCFF8E1BB0176A45D101E289F8C4D42A4A20E032582FCAB3
3,028,798 UART: [art] PUB.Y = 5E98C88E2DB8216481FAE793A1C8E2A16278A724591EC13D2D9DAB22402EC924E85677E26BE4F74689378A7D4EAC25BF
3,035,754 UART: [art] SIG.R = C4D3CE39E074BC65347CC87237287E9F1EF60411F78642635A870099A59F1B7B83FE47D30A181BA27F993163AF2A4C4D
3,042,496 UART: [art] SIG.S = 70F82926C041635B9973158124D4123129211875CA4A8684BE383A879248DA31C30D076FE898D178472485E34A2D96BC
3,066,262 UART: Caliptra RT
3,066,513 UART: [state] CFI Enabled
3,186,132 UART: [rt] RT listening for mailbox commands...
3,186,795 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,216,464 UART: [rt]cmd =0x46504c54, len=4
3,217,600 >>> mbox cmd response data (8 bytes)
3,217,933 UART: [rt] FIPS self test
3,218,261 UART: [kat] ++
3,218,413 UART: [kat] sha1
3,218,949 UART: Fatal Error: 0x90060001
3,220,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,220,493 >>> mbox cmd response: failed
3,220,493 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,220,498 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,850 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,314 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,671 UART: [state] LifecycleState = Unprovisioned
86,326 UART: [state] DebugLocked = No
87,022 UART: [state] WD Timer not started. Device not locked for debugging
88,283 UART: [kat] SHA2-256
891,833 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,937 UART: [kat] ++
896,089 UART: [kat] sha1
900,289 UART: [kat] SHA2-256
902,229 UART: [kat] SHA2-384
905,058 UART: [kat] SHA2-512-ACC
906,959 UART: [kat] ECC-384
916,606 UART: [kat] HMAC-384Kdf
921,338 UART: [kat] LMS
1,169,650 UART: [kat] --
1,170,421 UART: [cold-reset] ++
1,170,817 UART: [fht] FHT @ 0x50003400
1,173,543 UART: [idev] ++
1,173,711 UART: [idev] CDI.KEYID = 6
1,174,072 UART: [idev] SUBJECT.KEYID = 7
1,174,497 UART: [idev] UDS.KEYID = 0
1,174,843 ready_for_fw is high
1,174,843 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,462 UART: [idev] Erasing UDS.KEYID = 0
1,199,992 UART: [idev] Sha1 KeyId Algorithm
1,208,820 UART: [idev] --
1,209,991 UART: [ldev] ++
1,210,159 UART: [ldev] CDI.KEYID = 6
1,210,523 UART: [ldev] SUBJECT.KEYID = 5
1,210,950 UART: [ldev] AUTHORITY.KEYID = 7
1,211,413 UART: [ldev] FE.KEYID = 1
1,216,901 UART: [ldev] Erasing FE.KEYID = 1
1,243,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,941 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,653 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,809 UART: [ldev] --
1,283,256 UART: [fwproc] Wait for Commands...
1,283,843 UART: [fwproc] Recv command 0x46574c44
1,284,576 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,282 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,457 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,052 >>> mbox cmd response: success
2,839,084 UART: [afmc] ++
2,839,252 UART: [afmc] CDI.KEYID = 6
2,839,615 UART: [afmc] SUBJECT.KEYID = 7
2,840,041 UART: [afmc] AUTHORITY.KEYID = 5
2,875,856 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,473 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,222 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,932 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,813 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,514 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,299 UART: [afmc] --
2,919,124 UART: [cold-reset] --
2,919,872 UART: [state] Locking Datavault
2,921,233 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,837 UART: [state] Locking ICCM
2,922,457 UART: [exit] Launching FMC @ 0x40000130
2,927,787 UART:
2,927,803 UART: Running Caliptra FMC ...
2,928,211 UART:
2,928,354 UART: [state] CFI Enabled
2,938,862 UART: [fht] FMC Alias Private Key: 7
3,057,610 UART: [art] Extend RT PCRs Done
3,058,038 UART: [art] Lock RT PCRs Done
3,059,212 UART: [art] Populate DV Done
3,067,711 UART: [fht] FMC Alias Private Key: 7
3,068,831 UART: [art] Derive CDI
3,069,111 UART: [art] Store in slot 0x4
3,155,068 UART: [art] Derive Key Pair
3,155,428 UART: [art] Store priv key in slot 0x5
3,168,782 UART: [art] Derive Key Pair - Done
3,183,107 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,364 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,129 UART: [art] PUB.X = DBE5963DC3C8CF4C005C37EFC13473F91E3EAA7AE331E3FA6C21A6A1B166EA9F19264048F4CA6A1CE3A89DA02C29036D
3,205,894 UART: [art] PUB.Y = 385D518DEBC742D79468DE1D77202D83EA8B228881598336C6F1A2230F47AD2F01E7D77BDA75D25549E33C65987D7B28
3,212,836 UART: [art] SIG.R = 04B3F793625D9D7C9B00421A4BA4E731DF6E6109B88EA2B8F5AD1AF0EE5F8949B27441FB911E336E4BC0585AF977E78D
3,219,588 UART: [art] SIG.S = 236A1F3878EB438B30DEBA3DAEDE0BC373500F1B9975F5C526FAC526F3D6C5BF0190E55E4955E00C0A4279DA5BD927CE
3,243,265 UART: Caliptra RT
3,243,608 UART: [state] CFI Enabled
3,363,482 UART: [rt] RT listening for mailbox commands...
3,364,145 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,050 UART: [rt]cmd =0x46504c54, len=4
3,395,152 >>> mbox cmd response data (8 bytes)
3,395,433 UART: [rt] FIPS self test
3,395,761 UART: [kat] ++
3,395,913 UART: [kat] sha1
3,396,731 UART: Fatal Error: 0x90060001
3,398,270 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,398,275 >>> mbox cmd response: failed
3,398,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,398,280 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,257 UART: [state] LifecycleState = Unprovisioned
85,912 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,939 UART: [kat] SHA2-256
891,489 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,593 UART: [kat] ++
895,745 UART: [kat] sha1
899,859 UART: [kat] SHA2-256
901,799 UART: [kat] SHA2-384
904,526 UART: [kat] SHA2-512-ACC
906,427 UART: [kat] ECC-384
916,502 UART: [kat] HMAC-384Kdf
921,190 UART: [kat] LMS
1,169,502 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,170,779 UART: [fht] FHT @ 0x50003400
1,173,553 UART: [idev] ++
1,173,721 UART: [idev] CDI.KEYID = 6
1,174,082 UART: [idev] SUBJECT.KEYID = 7
1,174,507 UART: [idev] UDS.KEYID = 0
1,174,853 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,478 UART: [idev] Erasing UDS.KEYID = 0
1,199,436 UART: [idev] Sha1 KeyId Algorithm
1,208,238 UART: [idev] --
1,209,221 UART: [ldev] ++
1,209,389 UART: [ldev] CDI.KEYID = 6
1,209,753 UART: [ldev] SUBJECT.KEYID = 5
1,210,180 UART: [ldev] AUTHORITY.KEYID = 7
1,210,643 UART: [ldev] FE.KEYID = 1
1,216,189 UART: [ldev] Erasing FE.KEYID = 1
1,242,194 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,209 UART: [ldev] --
1,281,618 UART: [fwproc] Wait for Commands...
1,282,361 UART: [fwproc] Recv command 0x46574c44
1,283,094 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,048 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,223 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,826 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,889 ready_for_fw is high
1,059,889 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,421 >>> mbox cmd response: success
2,753,798 UART:
2,753,814 UART: Running Caliptra FMC ...
2,754,222 UART:
2,754,365 UART: [state] CFI Enabled
2,764,663 UART: [fht] FMC Alias Private Key: 7
2,884,359 UART: [art] Extend RT PCRs Done
2,884,787 UART: [art] Lock RT PCRs Done
2,885,907 UART: [art] Populate DV Done
2,894,174 UART: [fht] FMC Alias Private Key: 7
2,895,136 UART: [art] Derive CDI
2,895,416 UART: [art] Store in slot 0x4
2,981,369 UART: [art] Derive Key Pair
2,981,729 UART: [art] Store priv key in slot 0x5
2,995,209 UART: [art] Derive Key Pair - Done
3,009,954 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,395 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,160 UART: [art] PUB.X = A4025268197AE1748EB3A691AB5708EE112E59E1C417B849705BDDEBD168D031E2044527518B78D997B2339A0E0BBEF3
3,032,915 UART: [art] PUB.Y = BFFFF71C0F33F1C0B923D7AF0B94FE50A29BB30541761C03A13B1446AF0838EBBA97AD4EA5115A2B910B6FBCA2BA6BB0
3,039,871 UART: [art] SIG.R = 474F56481972FE088AFC74D044C46D323496934D1C71EEA541FE75810B8D8E6F953F51BDC13190DC3BBD551BC473815B
3,046,637 UART: [art] SIG.S = BB3FD56863D5EB1D918361B289F528EC0E77450A78D4B98A20223ACF12BFEEFDBC5FDE0A9A1851BBA36EBA9A529008C1
3,070,263 UART: Caliptra RT
3,070,606 UART: [state] CFI Enabled
3,190,379 UART: [rt] RT listening for mailbox commands...
3,191,042 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,675 UART: [rt]cmd =0x46504c54, len=4
3,221,899 >>> mbox cmd response data (8 bytes)
3,222,122 UART: [rt] FIPS self test
3,222,450 UART: [kat] ++
3,222,602 UART: [kat] sha1
3,223,378 UART: Fatal Error: 0x90060001
3,224,917 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,922 >>> mbox cmd response: failed
3,224,922 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,927 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,303 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,178 UART: [state] LifecycleState = Unprovisioned
85,833 UART: [state] DebugLocked = No
86,513 UART: [state] WD Timer not started. Device not locked for debugging
87,762 UART: [kat] SHA2-256
893,412 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,537 UART: [kat] ++
897,689 UART: [kat] sha1
901,863 UART: [kat] SHA2-256
903,803 UART: [kat] SHA2-384
906,526 UART: [kat] SHA2-512-ACC
908,427 UART: [kat] ECC-384
918,206 UART: [kat] HMAC-384Kdf
922,906 UART: [kat] LMS
1,171,234 UART: [kat] --
1,171,931 UART: [cold-reset] ++
1,172,511 UART: [fht] FHT @ 0x50003400
1,175,256 UART: [idev] ++
1,175,424 UART: [idev] CDI.KEYID = 6
1,175,784 UART: [idev] SUBJECT.KEYID = 7
1,176,208 UART: [idev] UDS.KEYID = 0
1,176,553 ready_for_fw is high
1,176,553 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,494 UART: [idev] Erasing UDS.KEYID = 0
1,201,541 UART: [idev] Sha1 KeyId Algorithm
1,210,145 UART: [idev] --
1,211,103 UART: [ldev] ++
1,211,271 UART: [ldev] CDI.KEYID = 6
1,211,634 UART: [ldev] SUBJECT.KEYID = 5
1,212,060 UART: [ldev] AUTHORITY.KEYID = 7
1,212,523 UART: [ldev] FE.KEYID = 1
1,217,743 UART: [ldev] Erasing FE.KEYID = 1
1,244,286 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,925 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,641 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,532 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,244 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,147 UART: [ldev] --
1,283,586 UART: [fwproc] Wait for Commands...
1,284,274 UART: [fwproc] Recv command 0x46574c44
1,285,002 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,940 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,110 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,791 >>> mbox cmd response: success
2,840,889 UART: [afmc] ++
2,841,057 UART: [afmc] CDI.KEYID = 6
2,841,419 UART: [afmc] SUBJECT.KEYID = 7
2,841,844 UART: [afmc] AUTHORITY.KEYID = 5
2,877,351 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,690 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,438 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,147 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,731 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,781 UART: [afmc] --
2,920,827 UART: [cold-reset] --
2,921,881 UART: [state] Locking Datavault
2,923,024 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,628 UART: [state] Locking ICCM
2,924,052 UART: [exit] Launching FMC @ 0x40000130
2,929,382 UART:
2,929,398 UART: Running Caliptra FMC ...
2,929,806 UART:
2,929,860 UART: [state] CFI Enabled
2,940,218 UART: [fht] FMC Alias Private Key: 7
3,058,566 UART: [art] Extend RT PCRs Done
3,058,994 UART: [art] Lock RT PCRs Done
3,060,530 UART: [art] Populate DV Done
3,068,873 UART: [fht] FMC Alias Private Key: 7
3,070,001 UART: [art] Derive CDI
3,070,281 UART: [art] Store in slot 0x4
3,155,938 UART: [art] Derive Key Pair
3,156,298 UART: [art] Store priv key in slot 0x5
3,169,100 UART: [art] Derive Key Pair - Done
3,183,941 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,208 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,973 UART: [art] PUB.X = 941E813891CE367876BE8ADB71650EB40B803A60205544C06411DBF58B77B5703552E421060275D6561371CFAF8957AF
3,206,721 UART: [art] PUB.Y = EF22CC94D29998E77B4FB9D24461AF5B79C93A2F3925ED11FA10672A4DA87CF58BF35DA12EDEFB5BED671FB35D1D8F30
3,213,693 UART: [art] SIG.R = 743BA350DFEE86B04C434464C8FE58E5DF82740F24F500E23BA116F8A86662C18FE98B90B56C8F46BBD8932E10069E95
3,220,439 UART: [art] SIG.S = BAECBF615DC437E976B8D8108DB5DB410BCE5256CF580910ED9598126254ADE8767139BB832F3133DA641F8CDA45F80A
3,244,524 UART: Caliptra RT
3,244,775 UART: [state] CFI Enabled
3,364,770 UART: [rt] RT listening for mailbox commands...
3,365,433 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,366 UART: [rt]cmd =0x46504c54, len=4
3,396,354 >>> mbox cmd response data (8 bytes)
3,396,559 UART: [rt] FIPS self test
3,396,887 UART: [kat] ++
3,397,039 UART: [kat] sha1
3,397,787 UART: Fatal Error: 0x90060001
3,399,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,399,331 >>> mbox cmd response: failed
3,399,331 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,399,336 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,084 UART: [state] LifecycleState = Unprovisioned
85,739 UART: [state] DebugLocked = No
86,419 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
893,222 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,347 UART: [kat] ++
897,499 UART: [kat] sha1
901,645 UART: [kat] SHA2-256
903,585 UART: [kat] SHA2-384
906,296 UART: [kat] SHA2-512-ACC
908,197 UART: [kat] ECC-384
917,886 UART: [kat] HMAC-384Kdf
922,628 UART: [kat] LMS
1,170,956 UART: [kat] --
1,171,873 UART: [cold-reset] ++
1,172,225 UART: [fht] FHT @ 0x50003400
1,174,824 UART: [idev] ++
1,174,992 UART: [idev] CDI.KEYID = 6
1,175,352 UART: [idev] SUBJECT.KEYID = 7
1,175,776 UART: [idev] UDS.KEYID = 0
1,176,121 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,130 UART: [idev] Erasing UDS.KEYID = 0
1,201,599 UART: [idev] Sha1 KeyId Algorithm
1,209,979 UART: [idev] --
1,211,197 UART: [ldev] ++
1,211,365 UART: [ldev] CDI.KEYID = 6
1,211,728 UART: [ldev] SUBJECT.KEYID = 5
1,212,154 UART: [ldev] AUTHORITY.KEYID = 7
1,212,617 UART: [ldev] FE.KEYID = 1
1,218,045 UART: [ldev] Erasing FE.KEYID = 1
1,243,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,043 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,759 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,650 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,362 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,279 UART: [ldev] --
1,282,772 UART: [fwproc] Wait for Commands...
1,283,368 UART: [fwproc] Recv command 0x46574c44
1,284,096 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,317 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,246 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,416 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,101 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,897 ready_for_fw is high
1,059,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,806 >>> mbox cmd response: success
2,751,749 UART:
2,751,765 UART: Running Caliptra FMC ...
2,752,173 UART:
2,752,227 UART: [state] CFI Enabled
2,763,027 UART: [fht] FMC Alias Private Key: 7
2,883,043 UART: [art] Extend RT PCRs Done
2,883,471 UART: [art] Lock RT PCRs Done
2,885,505 UART: [art] Populate DV Done
2,893,694 UART: [fht] FMC Alias Private Key: 7
2,894,778 UART: [art] Derive CDI
2,895,058 UART: [art] Store in slot 0x4
2,981,201 UART: [art] Derive Key Pair
2,981,561 UART: [art] Store priv key in slot 0x5
2,994,699 UART: [art] Derive Key Pair - Done
3,009,188 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,361 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,126 UART: [art] PUB.X = B0C983C33711B05FA7A2B073ADD8FB3C143F44DB581D6C05EBF3CF7914D2B9DB8670BA694F535EAEC87A9DED5CE0E2CB
3,031,919 UART: [art] PUB.Y = 6BF5AF203888C2732F5AE7DDFCE0950FE00C96134EAA7CDE48FA8D08B87F45E8393A5250B2E390AB4D32904BD1A50DCA
3,038,875 UART: [art] SIG.R = 02DFFA4B326402CBD3EFA202B7854A53F1D963BFEE2DB86D228E348A8AD3BA6DB92150830DB79660B960C2CCD04F4470
3,045,647 UART: [art] SIG.S = 1B6C0EBB6622F9FE411CE9D47D10436360ABBDCDB394283FFB53953D60C5388C4A79B47E3E014BA6DDF18F70B465B843
3,069,119 UART: Caliptra RT
3,069,370 UART: [state] CFI Enabled
3,189,030 UART: [rt] RT listening for mailbox commands...
3,189,693 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,300 UART: [rt]cmd =0x46504c54, len=4
3,220,360 >>> mbox cmd response data (8 bytes)
3,220,541 UART: [rt] FIPS self test
3,220,869 UART: [kat] ++
3,221,021 UART: [kat] sha1
3,221,749 UART: Fatal Error: 0x90060001
3,223,288 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,293 >>> mbox cmd response: failed
3,223,293 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,223,298 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,751 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,762 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,980 UART: [state] WD Timer not started. Device not locked for debugging
88,339 UART: [kat] SHA2-256
893,989 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,114 UART: [kat] ++
898,266 UART: [kat] sha1
902,418 UART: [kat] SHA2-256
904,358 UART: [kat] SHA2-384
907,117 UART: [kat] SHA2-512-ACC
909,018 UART: [kat] ECC-384
918,793 UART: [kat] HMAC-384Kdf
923,317 UART: [kat] LMS
1,171,645 UART: [kat] --
1,172,424 UART: [cold-reset] ++
1,172,932 UART: [fht] FHT @ 0x50003400
1,175,675 UART: [idev] ++
1,175,843 UART: [idev] CDI.KEYID = 6
1,176,203 UART: [idev] SUBJECT.KEYID = 7
1,176,627 UART: [idev] UDS.KEYID = 0
1,176,972 ready_for_fw is high
1,176,972 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,729 UART: [idev] Erasing UDS.KEYID = 0
1,202,264 UART: [idev] Sha1 KeyId Algorithm
1,210,730 UART: [idev] --
1,211,718 UART: [ldev] ++
1,211,886 UART: [ldev] CDI.KEYID = 6
1,212,249 UART: [ldev] SUBJECT.KEYID = 5
1,212,675 UART: [ldev] AUTHORITY.KEYID = 7
1,213,138 UART: [ldev] FE.KEYID = 1
1,218,136 UART: [ldev] Erasing FE.KEYID = 1
1,244,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,340 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,056 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,947 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,659 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,736 UART: [ldev] --
1,284,077 UART: [fwproc] Wait for Commands...
1,284,721 UART: [fwproc] Recv command 0x46574c44
1,285,449 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,818 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,515 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,685 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,272 >>> mbox cmd response: success
2,841,310 UART: [afmc] ++
2,841,478 UART: [afmc] CDI.KEYID = 6
2,841,840 UART: [afmc] SUBJECT.KEYID = 7
2,842,265 UART: [afmc] AUTHORITY.KEYID = 5
2,877,738 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,870 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,753 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,454 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,318 UART: [afmc] --
2,921,430 UART: [cold-reset] --
2,922,218 UART: [state] Locking Datavault
2,923,157 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,761 UART: [state] Locking ICCM
2,924,247 UART: [exit] Launching FMC @ 0x40000130
2,929,577 UART:
2,929,593 UART: Running Caliptra FMC ...
2,930,001 UART:
2,930,144 UART: [state] CFI Enabled
2,940,666 UART: [fht] FMC Alias Private Key: 7
3,059,282 UART: [art] Extend RT PCRs Done
3,059,710 UART: [art] Lock RT PCRs Done
3,061,204 UART: [art] Populate DV Done
3,069,515 UART: [fht] FMC Alias Private Key: 7
3,070,619 UART: [art] Derive CDI
3,070,899 UART: [art] Store in slot 0x4
3,156,692 UART: [art] Derive Key Pair
3,157,052 UART: [art] Store priv key in slot 0x5
3,170,536 UART: [art] Derive Key Pair - Done
3,185,229 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,830 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,595 UART: [art] PUB.X = BADF2A7ACF54B0161223BD237371CA97BBD67852731FBE80E06E9CEF91A37C62C750EF83FA96B601A850D74D0E03BB23
3,208,370 UART: [art] PUB.Y = 31B0CC07815A8DD4AEF38BB76A8A59DF11600B56DC43F19848989DA0E102572BA9D87F9890D01308A8B6672F3F29E1E7
3,215,312 UART: [art] SIG.R = 42B937AD32DD8A2D4696AFCC1504B6754F8FCBF6AB017E2ABAF0FD50279DF4B1B8CE1AFF7F8D8A6DC5A03BD141C9656E
3,222,104 UART: [art] SIG.S = 8FA2B248102148D95A21222FF8BF4C937DC358BDF5745B81453F6D187FF7A8DD6F9CE96D96A0ACD9CF174FE3EA00AEF6
3,245,806 UART: Caliptra RT
3,246,149 UART: [state] CFI Enabled
3,365,754 UART: [rt] RT listening for mailbox commands...
3,366,417 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,256 UART: [rt]cmd =0x46504c54, len=4
3,397,400 >>> mbox cmd response data (8 bytes)
3,397,679 UART: [rt] FIPS self test
3,398,007 UART: [kat] ++
3,398,159 UART: [kat] sha1
3,399,081 UART: Fatal Error: 0x90060001
3,400,620 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,625 >>> mbox cmd response: failed
3,400,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,630 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,638 UART: [state] WD Timer not started. Device not locked for debugging
87,845 UART: [kat] SHA2-256
893,495 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,620 UART: [kat] ++
897,772 UART: [kat] sha1
902,176 UART: [kat] SHA2-256
904,116 UART: [kat] SHA2-384
906,985 UART: [kat] SHA2-512-ACC
908,886 UART: [kat] ECC-384
918,417 UART: [kat] HMAC-384Kdf
923,067 UART: [kat] LMS
1,171,395 UART: [kat] --
1,172,338 UART: [cold-reset] ++
1,172,772 UART: [fht] FHT @ 0x50003400
1,175,557 UART: [idev] ++
1,175,725 UART: [idev] CDI.KEYID = 6
1,176,085 UART: [idev] SUBJECT.KEYID = 7
1,176,509 UART: [idev] UDS.KEYID = 0
1,176,854 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,899 UART: [idev] Erasing UDS.KEYID = 0
1,202,792 UART: [idev] Sha1 KeyId Algorithm
1,211,336 UART: [idev] --
1,212,452 UART: [ldev] ++
1,212,620 UART: [ldev] CDI.KEYID = 6
1,212,983 UART: [ldev] SUBJECT.KEYID = 5
1,213,409 UART: [ldev] AUTHORITY.KEYID = 7
1,213,872 UART: [ldev] FE.KEYID = 1
1,219,000 UART: [ldev] Erasing FE.KEYID = 1
1,245,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,406 UART: [ldev] --
1,284,887 UART: [fwproc] Wait for Commands...
1,285,469 UART: [fwproc] Recv command 0x46574c44
1,286,197 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,565 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,735 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,230 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,626 ready_for_fw is high
1,059,626 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,819 >>> mbox cmd response: success
2,753,420 UART:
2,753,436 UART: Running Caliptra FMC ...
2,753,844 UART:
2,753,987 UART: [state] CFI Enabled
2,764,971 UART: [fht] FMC Alias Private Key: 7
2,884,227 UART: [art] Extend RT PCRs Done
2,884,655 UART: [art] Lock RT PCRs Done
2,886,143 UART: [art] Populate DV Done
2,894,442 UART: [fht] FMC Alias Private Key: 7
2,895,434 UART: [art] Derive CDI
2,895,714 UART: [art] Store in slot 0x4
2,981,865 UART: [art] Derive Key Pair
2,982,225 UART: [art] Store priv key in slot 0x5
2,994,781 UART: [art] Derive Key Pair - Done
3,009,461 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,203 UART: [art] PUB.X = 7A9DDECDD42767F0D22EE59388E3B612B01DDE3DB5E8D0165E73E768F311C328D1F723650D995A1387161624C37CA220
3,032,972 UART: [art] PUB.Y = A9850725CCC948E7EC2A67B00E63A2E96762BA689DF6084684E1D6FAC39243A9FC67E5FF8AD0B1121BC7E18C69DECD09
3,039,924 UART: [art] SIG.R = 5444691568A6B76A43234E100218377C581F01EF6235B567BBBBA55342DBEC391A10DF52BBE6C4D8D0FF526233099B12
3,046,683 UART: [art] SIG.S = 252CA27A64128C80046F33A27F0191B3C099572F6A29B974F58A739F030823FF50F234CBB6DDE549FF9122FB25650142
3,069,810 UART: Caliptra RT
3,070,153 UART: [state] CFI Enabled
3,189,059 UART: [rt] RT listening for mailbox commands...
3,189,722 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,621 UART: [rt]cmd =0x46504c54, len=4
3,220,807 >>> mbox cmd response data (8 bytes)
3,221,086 UART: [rt] FIPS self test
3,221,414 UART: [kat] ++
3,221,566 UART: [kat] sha1
3,222,534 UART: Fatal Error: 0x90060001
3,224,073 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,078 >>> mbox cmd response: failed
3,224,078 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,224,083 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,222 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,597 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,193 writing to cptra_bootfsm_go
2,692,001 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,841,778 >>> mbox cmd response: failed
2,842,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,991,420 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
3,442,777 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,274,108 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
2,689,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,839,321 >>> mbox cmd response: failed
2,839,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,990,274 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,437,693 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,275,881 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,306 writing to cptra_bootfsm_go
3,045,920 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,703 >>> mbox cmd response: failed
3,196,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,130 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
20,167,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,836 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,340 writing to cptra_bootfsm_go
3,043,197 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,192,934 >>> mbox cmd response: failed
3,193,505 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,342,378 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
20,176,141 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,377 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
2,700,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,410 >>> mbox cmd response: failed
2,851,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,063 >>> mbox cmd response: failed
Initializing fuses
1,017 writing to cptra_bootfsm_go
3,433,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,264,593 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,032 writing to cptra_bootfsm_go
2,691,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,841,152 >>> mbox cmd response: failed
2,841,706 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,990,568 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,442,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,306,029 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
3,037,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,187,310 >>> mbox cmd response: failed
3,187,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,336,746 >>> mbox cmd response: failed
Initializing fuses
988 writing to cptra_bootfsm_go
20,182,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,891,605 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
3,043,766 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,193,601 >>> mbox cmd response: failed
3,194,160 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,343,015 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,181,362 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,482 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,623 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,631 >>> mbox cmd response: failed
810,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,637 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,887 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,834 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,745 >>> mbox cmd response: failed
810,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,751 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,865 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,458 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,424 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,432 >>> mbox cmd response: failed
810,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,438 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,390 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,759 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,884 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,892 >>> mbox cmd response: failed
810,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,898 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,873 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,431 >>> mbox cmd response: failed
810,431 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,437 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,837 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,600 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,511 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,519 >>> mbox cmd response: failed
810,519 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,525 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,659 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,606 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,950 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,958 >>> mbox cmd response: failed
810,958 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,964 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,206 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,519 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
810,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,874 >>> mbox cmd response: failed
810,874 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
810,880 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,561 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,107 writing to cptra_bootfsm_go
192,294 UART:
192,660 UART: Running Caliptra ROM ...
193,855 UART:
194,008 UART: [state] CFI Enabled
262,328 UART: [state] LifecycleState = Unprovisioned
264,312 UART: [state] DebugLocked = No
265,710 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,294 UART: [kat] SHA2-256
441,001 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,521 UART: [kat] ++
452,017 UART: [kat] sha1
462,917 UART: [kat] SHA2-256
465,608 UART: [kat] SHA2-384
470,258 UART: [kat] SHA2-512-ACC
472,627 UART: [kat] ECC-384
2,766,937 UART: [kat] HMAC-384Kdf
2,799,419 UART: [kat] LMS
3,989,684 UART: [kat] --
3,994,325 UART: [cold-reset] ++
3,995,287 UART: [fht] Storing FHT @ 0x50003400
4,005,427 UART: [idev] ++
4,006,078 UART: [idev] CDI.KEYID = 6
4,007,009 UART: [idev] SUBJECT.KEYID = 7
4,008,197 UART: [idev] UDS.KEYID = 0
4,009,302 ready_for_fw is high
4,009,559 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,871 UART: [idev] Erasing UDS.KEYID = 0
7,345,889 UART: [idev] Using Sha1 for KeyId Algorithm
7,368,856 UART: [idev] --
7,371,671 UART: [ldev] ++
7,372,249 UART: [ldev] CDI.KEYID = 6
7,373,222 UART: [ldev] SUBJECT.KEYID = 5
7,374,443 UART: [ldev] AUTHORITY.KEYID = 7
7,375,679 UART: [ldev] FE.KEYID = 1
7,422,294 UART: [ldev] Erasing FE.KEYID = 1
10,752,137 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,050 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,077,860 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,392 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,195 UART: [ldev] --
13,114,555 UART: [fwproc] Waiting for Commands...
13,117,487 UART: [fwproc] Received command 0x46574c44
13,119,676 UART: [fwproc] Received Image of size 119428 bytes
17,232,286 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,307,987 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,381,177 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,712,162 >>> mbox cmd response: success
17,716,478 UART: [afmc] ++
17,717,073 UART: [afmc] CDI.KEYID = 6
17,717,988 UART: [afmc] SUBJECT.KEYID = 7
17,719,203 UART: [afmc] AUTHORITY.KEYID = 5
21,093,028 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,392,376 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,394,647 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,409,070 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,423,792 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,438,203 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,459,741 UART: [afmc] --
23,462,911 UART: [cold-reset] --
23,465,589 UART: [state] Locking Datavault
23,470,514 UART: [state] Locking PCR0, PCR1 and PCR31
23,472,268 UART: [state] Locking ICCM
23,473,494 UART: [exit] Launching FMC @ 0x40000130
23,481,892 UART:
23,482,131 UART: Running Caliptra FMC ...
23,483,238 UART:
23,483,406 UART: [state] CFI Enabled
23,553,024 UART: [fht] FMC Alias Private Key: 7
25,915,228 UART: [art] Extend RT PCRs Done
25,916,448 UART: [art] Lock RT PCRs Done
25,918,315 UART: [art] Populate DV Done
25,923,836 UART: [fht] FMC Alias Private Key: 7
25,925,484 UART: [art] Derive CDI
25,926,314 UART: [art] Store in slot 0x4
25,983,739 UART: [art] Derive Key Pair
25,984,776 UART: [art] Store priv key in slot 0x5
29,277,593 UART: [art] Derive Key Pair - Done
29,290,537 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,579,020 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,530 UART: [art] PUB.X = 5BE7E3FF5D3841906FCE1C18306725F056FE960B0F0B1EFD9C734D419135986596EFFDD3D6CA19B987469B6BF59FA01F
31,587,815 UART: [art] PUB.Y = F204117C597980194C624BACDF3FAEFDDDD0496DA850071EB2021E8CAF93012B0063F8F76000A0FDD6EB928AFD5EBCCE
31,595,082 UART: [art] SIG.R = 79B17EB1D11D58FEBE8D0F86D8E39498ECAA213511143AD0850D8ED040ED9BC55153854AD1B0978B78A4E12FE16FAB26
31,602,500 UART: [art] SIG.S = 2C9204D961A0C1CDE6AA9806A62F3A9A63BB3EB8E34C32EABCFF1B1AD1F62D860C8BBA1E4C27AE4466BAC87F8D46A291
32,907,464 UART: Caliptra RT
32,908,177 UART: [state] CFI Enabled
33,083,702 UART: [rt] RT listening for mailbox commands...
33,085,561 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,115,237 UART: [rt]cmd =0x46504c54, len=4
33,116,901 >>> mbox cmd response data (8 bytes)
33,118,209 UART: [rt] FIPS self test
33,119,155 UART: [kat] ++
33,119,601 UART: [kat] sha1
33,124,004 UART: Fatal Error: 0x90060002
33,159,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,309,175 >>> mbox cmd response: failed
33,309,817 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,459,715 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
190,095 UART:
190,386 UART: Running Caliptra ROM ...
191,499 UART:
191,648 UART: [state] CFI Enabled
253,265 UART: [state] LifecycleState = Unprovisioned
255,186 UART: [state] DebugLocked = No
257,660 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
262,544 UART: [kat] SHA2-256
432,257 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
442,769 UART: [kat] ++
443,216 UART: [kat] sha1
453,393 UART: [kat] SHA2-256
456,074 UART: [kat] SHA2-384
462,056 UART: [kat] SHA2-512-ACC
464,408 UART: [kat] ECC-384
2,753,328 UART: [kat] HMAC-384Kdf
2,765,798 UART: [kat] LMS
3,956,137 UART: [kat] --
3,959,181 UART: [cold-reset] ++
3,960,953 UART: [fht] Storing FHT @ 0x50003400
3,973,302 UART: [idev] ++
3,973,869 UART: [idev] CDI.KEYID = 6
3,974,852 UART: [idev] SUBJECT.KEYID = 7
3,976,068 UART: [idev] UDS.KEYID = 0
3,977,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,127,690 UART: [idev] Erasing UDS.KEYID = 0
7,312,476 UART: [idev] Using Sha1 for KeyId Algorithm
7,334,772 UART: [idev] --
7,338,690 UART: [ldev] ++
7,339,271 UART: [ldev] CDI.KEYID = 6
7,340,213 UART: [ldev] SUBJECT.KEYID = 5
7,341,429 UART: [ldev] AUTHORITY.KEYID = 7
7,342,716 UART: [ldev] FE.KEYID = 1
7,387,530 UART: [ldev] Erasing FE.KEYID = 1
10,724,047 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,034,764 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,049,350 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,064,202 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,078,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,098,101 UART: [ldev] --
13,103,480 UART: [fwproc] Waiting for Commands...
13,106,447 UART: [fwproc] Received command 0x46574c44
13,108,637 UART: [fwproc] Received Image of size 119428 bytes
17,226,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,295,369 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,368,554 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,699,480 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
3,807,467 ready_for_fw is high
3,807,903 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,010,403 >>> mbox cmd response: success
23,698,332 UART:
23,698,770 UART: Running Caliptra FMC ...
23,699,885 UART:
23,700,042 UART: [state] CFI Enabled
23,766,712 UART: [fht] FMC Alias Private Key: 7
26,127,713 UART: [art] Extend RT PCRs Done
26,128,953 UART: [art] Lock RT PCRs Done
26,130,717 UART: [art] Populate DV Done
26,136,251 UART: [fht] FMC Alias Private Key: 7
26,137,746 UART: [art] Derive CDI
26,138,507 UART: [art] Store in slot 0x4
26,196,257 UART: [art] Derive Key Pair
26,197,300 UART: [art] Store priv key in slot 0x5
29,490,343 UART: [art] Derive Key Pair - Done
29,503,353 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,791,453 UART: [art] Erasing AUTHORITY.KEYID = 7
31,792,961 UART: [art] PUB.X = B80F260BFFA6891E0B9CF853A7332887567D951FA725BE3F8C95015913BB4464F48B955AF2463E135CE5E027A61655FC
31,800,195 UART: [art] PUB.Y = 34755CA743EC43F6326EB2D2B255015E07F49A025D94BA2ECD1DE8CDDCD22774CC2AFDDB09CAFFF031AF684AA92D02BE
31,807,476 UART: [art] SIG.R = AA00C8AC02B0EFBA35E046F95BB99911978C8EE42F9915EC2B02DE0CA6D383F828079571C78BD78630C8861361692B19
31,814,863 UART: [art] SIG.S = 63B2EBE5EFCE69CF4B8BAAE4A160E9C01D7E1B865BCC7F568CAFDB1008D878B216140F23D86ADE63F8461EEC852C282E
33,119,352 UART: Caliptra RT
33,120,066 UART: [state] CFI Enabled
33,296,089 UART: [rt] RT listening for mailbox commands...
33,297,947 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,327,698 UART: [rt]cmd =0x46504c54, len=4
33,329,168 >>> mbox cmd response data (8 bytes)
33,330,183 UART: [rt] FIPS self test
33,331,122 UART: [kat] ++
33,331,572 UART: [kat] sha1
33,335,712 UART: Fatal Error: 0x90060002
33,371,095 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,521,137 >>> mbox cmd response: failed
33,521,800 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,671,549 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,772,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,953,398 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,284 writing to cptra_bootfsm_go
192,556 UART:
192,926 UART: Running Caliptra ROM ...
194,077 UART:
603,700 UART: [state] CFI Enabled
618,822 UART: [state] LifecycleState = Unprovisioned
620,754 UART: [state] DebugLocked = No
623,088 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,191 UART: [kat] SHA2-256
796,946 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,475 UART: [kat] ++
808,018 UART: [kat] sha1
819,121 UART: [kat] SHA2-256
821,775 UART: [kat] SHA2-384
828,339 UART: [kat] SHA2-512-ACC
830,722 UART: [kat] ECC-384
3,114,732 UART: [kat] HMAC-384Kdf
3,127,206 UART: [kat] LMS
4,317,296 UART: [kat] --
4,320,824 UART: [cold-reset] ++
4,322,978 UART: [fht] Storing FHT @ 0x50003400
4,334,175 UART: [idev] ++
4,334,762 UART: [idev] CDI.KEYID = 6
4,335,656 UART: [idev] SUBJECT.KEYID = 7
4,336,909 UART: [idev] UDS.KEYID = 0
4,337,913 ready_for_fw is high
4,338,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,488,635 UART: [idev] Erasing UDS.KEYID = 0
7,627,164 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,175 UART: [idev] --
7,652,272 UART: [ldev] ++
7,652,864 UART: [ldev] CDI.KEYID = 6
7,653,786 UART: [ldev] SUBJECT.KEYID = 5
7,655,009 UART: [ldev] AUTHORITY.KEYID = 7
7,656,257 UART: [ldev] FE.KEYID = 1
7,668,821 UART: [ldev] Erasing FE.KEYID = 1
10,959,846 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,249,969 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,293,855 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,312,420 UART: [ldev] --
13,317,526 UART: [fwproc] Waiting for Commands...
13,319,140 UART: [fwproc] Received command 0x46574c44
13,321,330 UART: [fwproc] Received Image of size 119428 bytes
17,444,802 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,519,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,592,409 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,924,673 >>> mbox cmd response: success
17,929,131 UART: [afmc] ++
17,929,728 UART: [afmc] CDI.KEYID = 6
17,930,721 UART: [afmc] SUBJECT.KEYID = 7
17,931,948 UART: [afmc] AUTHORITY.KEYID = 5
21,246,360 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,539,106 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,541,422 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,555,811 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,570,545 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,584,987 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,606,971 UART: [afmc] --
23,610,515 UART: [cold-reset] --
23,613,789 UART: [state] Locking Datavault
23,618,934 UART: [state] Locking PCR0, PCR1 and PCR31
23,620,646 UART: [state] Locking ICCM
23,623,021 UART: [exit] Launching FMC @ 0x40000130
23,631,428 UART:
23,631,671 UART: Running Caliptra FMC ...
23,632,796 UART:
23,632,962 UART: [state] CFI Enabled
23,640,909 UART: [fht] FMC Alias Private Key: 7
25,980,726 UART: [art] Extend RT PCRs Done
25,981,955 UART: [art] Lock RT PCRs Done
25,983,714 UART: [art] Populate DV Done
25,989,184 UART: [fht] FMC Alias Private Key: 7
25,990,895 UART: [art] Derive CDI
25,991,639 UART: [art] Store in slot 0x4
26,034,294 UART: [art] Derive Key Pair
26,035,304 UART: [art] Store priv key in slot 0x5
29,277,287 UART: [art] Derive Key Pair - Done
29,290,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,570,858 UART: [art] Erasing AUTHORITY.KEYID = 7
31,572,375 UART: [art] PUB.X = C9FACDE4FCBCF2FD6EED2CAD133807960961F3EE6C44CB3D952DC8A02CBB45940B4F6DEF1D919532E16E6904F2A633C3
31,579,634 UART: [art] PUB.Y = 62BBB148E410D25B1C9A48FD8D931F360DF523313FE36754E6AD23088D1EFEA9A1E7784C1EEDF8AF81C68EB6A6DB32ED
31,586,948 UART: [art] SIG.R = AE96066C42576003BCA4159C7698FA2022A7DE04F1EF0C4C2E8F8484F6855E923FD88421D072CC8FFE0038D35759E3A7
31,594,305 UART: [art] SIG.S = EED652F209F4F766192D2A1ABB964C3C7E39E027AEC5355885C2749D2B37C4CAB01BFF39D15A1AF9B7BEED5435C7A944
32,899,364 UART: Caliptra RT
32,900,065 UART: [state] CFI Enabled
33,032,912 UART: [rt] RT listening for mailbox commands...
33,034,770 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,064,342 UART: [rt]cmd =0x46504c54, len=4
33,065,977 >>> mbox cmd response data (8 bytes)
33,067,173 UART: [rt] FIPS self test
33,068,127 UART: [kat] ++
33,068,584 UART: [kat] sha1
33,072,888 UART: Fatal Error: 0x90060002
33,108,225 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,258,251 >>> mbox cmd response: failed
33,258,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,408,715 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
190,025 UART:
190,342 UART: Running Caliptra ROM ...
191,371 UART:
7,116,832 UART: [state] CFI Enabled
7,132,052 UART: [state] LifecycleState = Unprovisioned
7,134,056 UART: [state] DebugLocked = No
7,136,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,140,858 UART: [kat] SHA2-256
7,310,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,321,145 UART: [kat] ++
7,321,608 UART: [kat] sha1
7,333,202 UART: [kat] SHA2-256
7,335,900 UART: [kat] SHA2-384
7,341,140 UART: [kat] SHA2-512-ACC
7,343,517 UART: [kat] ECC-384
9,627,784 UART: [kat] HMAC-384Kdf
9,639,638 UART: [kat] LMS
10,829,754 UART: [kat] --
10,833,389 UART: [cold-reset] ++
10,835,819 UART: [fht] Storing FHT @ 0x50003400
10,846,817 UART: [idev] ++
10,847,407 UART: [idev] CDI.KEYID = 6
10,848,320 UART: [idev] SUBJECT.KEYID = 7
10,849,596 UART: [idev] UDS.KEYID = 0
10,851,129 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,001,031 UART: [idev] Erasing UDS.KEYID = 0
14,136,360 UART: [idev] Using Sha1 for KeyId Algorithm
14,157,144 UART: [idev] --
14,160,067 UART: [ldev] ++
14,160,694 UART: [ldev] CDI.KEYID = 6
14,161,640 UART: [ldev] SUBJECT.KEYID = 5
14,162,805 UART: [ldev] AUTHORITY.KEYID = 7
14,164,042 UART: [ldev] FE.KEYID = 1
14,173,559 UART: [ldev] Erasing FE.KEYID = 1
17,462,617 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,753,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,768,544 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,783,345 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,797,857 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,816,843 UART: [ldev] --
19,822,113 UART: [fwproc] Waiting for Commands...
19,824,385 UART: [fwproc] Received command 0x46574c44
19,826,579 UART: [fwproc] Received Image of size 119428 bytes
23,935,461 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,011,275 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,084,407 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,415,349 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,395 writing to cptra_bootfsm_go
4,126,664 ready_for_fw is high
4,127,084 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,188,332 >>> mbox cmd response: success
23,826,297 UART:
23,826,730 UART: Running Caliptra FMC ...
23,827,856 UART:
23,828,025 UART: [state] CFI Enabled
23,835,695 UART: [fht] FMC Alias Private Key: 7
26,175,476 UART: [art] Extend RT PCRs Done
26,176,712 UART: [art] Lock RT PCRs Done
26,178,043 UART: [art] Populate DV Done
26,183,373 UART: [fht] FMC Alias Private Key: 7
26,185,034 UART: [art] Derive CDI
26,185,866 UART: [art] Store in slot 0x4
26,228,750 UART: [art] Derive Key Pair
26,229,802 UART: [art] Store priv key in slot 0x5
29,472,038 UART: [art] Derive Key Pair - Done
29,485,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,765,524 UART: [art] Erasing AUTHORITY.KEYID = 7
31,767,027 UART: [art] PUB.X = E14D629F3DDFED5E5062046856294DB1F9634856DA371DF610583079671E90D2FF7DF29DA51DE79F2DFDF4E3274A354C
31,774,277 UART: [art] PUB.Y = 7BA59330996204CA65D95378E7E5859363C614D1114DAF21A06EF31798D8D780AFA8E9C49358536DE90AB18834BCC030
31,781,508 UART: [art] SIG.R = F02B0BD49BBA175BAB72FE1593C3ECBD8526D2F978B5EB7D83C13F286B71D96BFC7B74C87BB34ADCE7976D150C153211
31,788,962 UART: [art] SIG.S = 98C73BA5F1E48041D8F2B279C9D3EE84D1B69300FAB81ED6830B6FCCC9CE3CC5A0961E7E17F912B40337F072D102BF38
33,094,493 UART: Caliptra RT
33,095,217 UART: [state] CFI Enabled
33,227,870 UART: [rt] RT listening for mailbox commands...
33,229,736 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,259,598 UART: [rt]cmd =0x46504c54, len=4
33,261,057 >>> mbox cmd response data (8 bytes)
33,261,913 UART: [rt] FIPS self test
33,262,819 UART: [kat] ++
33,263,264 UART: [kat] sha1
33,267,451 UART: Fatal Error: 0x90060002
33,302,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,697 >>> mbox cmd response: failed
33,453,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,603,654 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
10,451,638 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,501,862 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,251 writing to cptra_bootfsm_go
192,414 UART:
192,773 UART: Running Caliptra ROM ...
193,990 UART:
194,146 UART: [state] CFI Enabled
264,369 UART: [state] LifecycleState = Unprovisioned
266,297 UART: [state] DebugLocked = No
268,977 UART: [state] WD Timer not started. Device not locked for debugging
273,472 UART: [kat] SHA2-256
453,060 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,869 UART: [kat] ++
464,384 UART: [kat] sha1
475,220 UART: [kat] SHA2-256
477,859 UART: [kat] SHA2-384
483,159 UART: [kat] SHA2-512-ACC
485,538 UART: [kat] ECC-384
2,946,260 UART: [kat] HMAC-384Kdf
2,972,145 UART: [kat] LMS
3,448,630 UART: [kat] --
3,453,055 UART: [cold-reset] ++
3,454,713 UART: [fht] FHT @ 0x50003400
3,466,196 UART: [idev] ++
3,466,844 UART: [idev] CDI.KEYID = 6
3,467,727 UART: [idev] SUBJECT.KEYID = 7
3,468,976 UART: [idev] UDS.KEYID = 0
3,469,953 ready_for_fw is high
3,470,162 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,363 UART: [idev] Erasing UDS.KEYID = 0
5,988,468 UART: [idev] Sha1 KeyId Algorithm
6,012,340 UART: [idev] --
6,017,562 UART: [ldev] ++
6,018,149 UART: [ldev] CDI.KEYID = 6
6,019,040 UART: [ldev] SUBJECT.KEYID = 5
6,020,266 UART: [ldev] AUTHORITY.KEYID = 7
6,021,511 UART: [ldev] FE.KEYID = 1
6,058,445 UART: [ldev] Erasing FE.KEYID = 1
8,567,352 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,830 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,680 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,278 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,530 UART: [ldev] --
10,373,399 UART: [fwproc] Wait for Commands...
10,375,358 UART: [fwproc] Recv command 0x46574c44
10,377,352 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,248 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,128 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,150 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,356,807 >>> mbox cmd response: success
14,361,363 UART: [afmc] ++
14,361,973 UART: [afmc] CDI.KEYID = 6
14,362,956 UART: [afmc] SUBJECT.KEYID = 7
14,364,128 UART: [afmc] AUTHORITY.KEYID = 5
16,896,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,638,484 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,640,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,656,482 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,672,535 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,688,095 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,712,576 UART: [afmc] --
18,715,969 UART: [cold-reset] --
18,720,066 UART: [state] Locking Datavault
18,726,839 UART: [state] Locking PCR0, PCR1 and PCR31
18,728,547 UART: [state] Locking ICCM
18,730,376 UART: [exit] Launching FMC @ 0x40000130
18,738,829 UART:
18,739,068 UART: Running Caliptra FMC ...
18,740,176 UART:
18,740,344 UART: [state] CFI Enabled
18,794,499 UART: [fht] FMC Alias Private Key: 7
20,560,943 UART: [art] Extend RT PCRs Done
20,562,153 UART: [art] Lock RT PCRs Done
20,563,700 UART: [art] Populate DV Done
20,569,329 UART: [fht] FMC Alias Private Key: 7
20,570,812 UART: [art] Derive CDI
20,571,570 UART: [art] Store in slot 0x4
20,626,798 UART: [art] Derive Key Pair
20,627,798 UART: [art] Store priv key in slot 0x5
23,090,169 UART: [art] Derive Key Pair - Done
23,103,226 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,815,600 UART: [art] Erasing AUTHORITY.KEYID = 7
24,817,096 UART: [art] PUB.X = 307AA52E7EA7709D466D9693535CB95FC8AF6E97EFCA3C9BD285BEB9150308082F36ACF447EA8EB3DD1CCD28EFDC05D8
24,824,400 UART: [art] PUB.Y = F87C0729A793F9331DFFE4262388C61A9EA2B9150AC32E8B7823ED0BFAA501F155091F49C028A2AA6225906130CA441D
24,831,641 UART: [art] SIG.R = 992228C825F2070F9C1904CF0EA9A8935CDD17E274438B17B91F1D1395F05507FC8AED6DC9841A1D5E10D6541B706291
24,839,052 UART: [art] SIG.S = A5B7D37685DB8BFD2E7667F8F03A7806BA643F56395EC8B95BE955524BF08D0E9F797D1D2E219AE0C8C8329D5BD673C9
25,818,241 UART: Caliptra RT
25,818,951 UART: [state] CFI Enabled
25,998,663 UART: [rt] RT listening for mailbox commands...
26,000,512 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,030,329 UART: [rt]cmd =0x46504c54, len=4
26,031,916 >>> mbox cmd response data (8 bytes)
26,033,289 UART: [rt] FIPS self test
26,034,236 UART: [kat] ++
26,034,693 UART: [kat] sha1
26,038,997 UART: Fatal Error: 0x90060002
26,074,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,224,179 >>> mbox cmd response: failed
26,224,858 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,374,798 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
189,995 UART:
190,285 UART: Running Caliptra ROM ...
191,401 UART:
191,557 UART: [state] CFI Enabled
249,783 UART: [state] LifecycleState = Unprovisioned
251,720 UART: [state] DebugLocked = No
254,462 UART: [state] WD Timer not started. Device not locked for debugging
258,892 UART: [kat] SHA2-256
438,452 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
449,258 UART: [kat] ++
449,711 UART: [kat] sha1
459,296 UART: [kat] SHA2-256
461,987 UART: [kat] SHA2-384
467,916 UART: [kat] SHA2-512-ACC
470,253 UART: [kat] ECC-384
2,931,447 UART: [kat] HMAC-384Kdf
2,956,273 UART: [kat] LMS
3,432,750 UART: [kat] --
3,438,320 UART: [cold-reset] ++
3,439,235 UART: [fht] FHT @ 0x50003400
3,450,969 UART: [idev] ++
3,451,602 UART: [idev] CDI.KEYID = 6
3,452,536 UART: [idev] SUBJECT.KEYID = 7
3,453,757 UART: [idev] UDS.KEYID = 0
3,455,390 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,605,538 UART: [idev] Erasing UDS.KEYID = 0
5,974,806 UART: [idev] Sha1 KeyId Algorithm
5,999,070 UART: [idev] --
6,004,907 UART: [ldev] ++
6,005,485 UART: [ldev] CDI.KEYID = 6
6,006,376 UART: [ldev] SUBJECT.KEYID = 5
6,007,598 UART: [ldev] AUTHORITY.KEYID = 7
6,008,842 UART: [ldev] FE.KEYID = 1
6,042,940 UART: [ldev] Erasing FE.KEYID = 1
8,549,651 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,282,653 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,298,503 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,314,392 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,329,976 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,352,375 UART: [ldev] --
10,357,604 UART: [fwproc] Wait for Commands...
10,359,219 UART: [fwproc] Recv command 0x46574c44
10,361,213 UART: [fwproc] Recv'd Img size: 119428 bytes
13,859,475 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,938,968 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,011,833 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,343,152 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,099 writing to cptra_bootfsm_go
3,463,134 ready_for_fw is high
3,463,587 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,225,095 >>> mbox cmd response: success
18,514,932 UART:
18,515,351 UART: Running Caliptra FMC ...
18,516,507 UART:
18,516,677 UART: [state] CFI Enabled
18,581,095 UART: [fht] FMC Alias Private Key: 7
20,347,190 UART: [art] Extend RT PCRs Done
20,348,416 UART: [art] Lock RT PCRs Done
20,349,881 UART: [art] Populate DV Done
20,355,152 UART: [fht] FMC Alias Private Key: 7
20,356,662 UART: [art] Derive CDI
20,357,434 UART: [art] Store in slot 0x4
20,413,561 UART: [art] Derive Key Pair
20,414,601 UART: [art] Store priv key in slot 0x5
22,877,610 UART: [art] Derive Key Pair - Done
22,890,562 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,603,593 UART: [art] Erasing AUTHORITY.KEYID = 7
24,605,097 UART: [art] PUB.X = A20AD723E54050009A5CB9D844A6FE128CAA43F4EAD51661E1390413C16672D4FBCE1732E1D885A2A76EC480CD25B7FA
24,612,329 UART: [art] PUB.Y = BE77A3E412753F696B336201CE020A0B5D277843B91F8B2A87D46E584161F92D325C8F85B351B87E917AD43D2AA9E66E
24,619,601 UART: [art] SIG.R = FF929C9574174A50B7942BAF1B22C6C3BC2D265AF2004CA316C01876C157525B3802531A7B8D4034C22A4C6882BE293C
24,626,933 UART: [art] SIG.S = 5BF6408B9613547BADFC2F7DF10335D38FC935F9820BF0385F0BEEB49A9A3AF38977674FEEA968C991A650DD130DC745
25,606,343 UART: Caliptra RT
25,607,054 UART: [state] CFI Enabled
25,786,343 UART: [rt] RT listening for mailbox commands...
25,788,225 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,817,927 UART: [rt]cmd =0x46504c54, len=4
25,819,533 >>> mbox cmd response data (8 bytes)
25,820,829 UART: [rt] FIPS self test
25,821,773 UART: [kat] ++
25,822,225 UART: [kat] sha1
25,826,357 UART: Fatal Error: 0x90060002
25,861,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,011,733 >>> mbox cmd response: failed
26,012,409 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,162,303 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,449,048 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,248,959 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,438 writing to cptra_bootfsm_go
192,738 UART:
193,088 UART: Running Caliptra ROM ...
194,332 UART:
603,776 UART: [state] CFI Enabled
617,620 UART: [state] LifecycleState = Unprovisioned
619,603 UART: [state] DebugLocked = No
621,930 UART: [state] WD Timer not started. Device not locked for debugging
626,489 UART: [kat] SHA2-256
806,092 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,899 UART: [kat] ++
817,389 UART: [kat] sha1
828,909 UART: [kat] SHA2-256
831,574 UART: [kat] SHA2-384
837,000 UART: [kat] SHA2-512-ACC
839,386 UART: [kat] ECC-384
3,281,365 UART: [kat] HMAC-384Kdf
3,292,600 UART: [kat] LMS
3,769,157 UART: [kat] --
3,772,397 UART: [cold-reset] ++
3,774,332 UART: [fht] FHT @ 0x50003400
3,785,458 UART: [idev] ++
3,786,027 UART: [idev] CDI.KEYID = 6
3,787,020 UART: [idev] SUBJECT.KEYID = 7
3,788,211 UART: [idev] UDS.KEYID = 0
3,789,143 ready_for_fw is high
3,789,389 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,000 UART: [idev] Erasing UDS.KEYID = 0
6,260,092 UART: [idev] Sha1 KeyId Algorithm
6,283,728 UART: [idev] --
6,287,569 UART: [ldev] ++
6,288,140 UART: [ldev] CDI.KEYID = 6
6,289,109 UART: [ldev] SUBJECT.KEYID = 5
6,290,298 UART: [ldev] AUTHORITY.KEYID = 7
6,291,535 UART: [ldev] FE.KEYID = 1
6,304,962 UART: [ldev] Erasing FE.KEYID = 1
8,783,678 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,502,958 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,518,779 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,534,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,550,248 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,571,294 UART: [ldev] --
10,576,843 UART: [fwproc] Wait for Commands...
10,578,678 UART: [fwproc] Recv command 0x46574c44
10,580,673 UART: [fwproc] Recv'd Img size: 119428 bytes
14,077,158 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,157,135 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,230,152 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,560,659 >>> mbox cmd response: success
14,564,056 UART: [afmc] ++
14,564,650 UART: [afmc] CDI.KEYID = 6
14,565,695 UART: [afmc] SUBJECT.KEYID = 7
14,566,809 UART: [afmc] AUTHORITY.KEYID = 5
17,072,469 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,794,666 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,796,865 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,812,686 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,828,760 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,844,295 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,868,193 UART: [afmc] --
18,871,746 UART: [cold-reset] --
18,876,862 UART: [state] Locking Datavault
18,882,769 UART: [state] Locking PCR0, PCR1 and PCR31
18,884,477 UART: [state] Locking ICCM
18,887,061 UART: [exit] Launching FMC @ 0x40000130
18,895,471 UART:
18,895,713 UART: Running Caliptra FMC ...
18,896,840 UART:
18,897,013 UART: [state] CFI Enabled
18,904,807 UART: [fht] FMC Alias Private Key: 7
20,670,761 UART: [art] Extend RT PCRs Done
20,671,978 UART: [art] Lock RT PCRs Done
20,674,041 UART: [art] Populate DV Done
20,679,405 UART: [fht] FMC Alias Private Key: 7
20,681,124 UART: [art] Derive CDI
20,681,941 UART: [art] Store in slot 0x4
20,725,090 UART: [art] Derive Key Pair
20,726,136 UART: [art] Store priv key in slot 0x5
23,153,200 UART: [art] Derive Key Pair - Done
23,165,944 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,872,269 UART: [art] Erasing AUTHORITY.KEYID = 7
24,873,825 UART: [art] PUB.X = 6475A65864A5D1DCDF5E4EB68A2DFCD8B4CEE143323C8EC37AE48C7AB4EE580F0A586B43AA4A5B272B75CDF3B9563DD9
24,881,052 UART: [art] PUB.Y = 14801265D5EDDDD088FFBCD0A9D147D83FA0073CA4A342ADC53114ED3AD91E7DD964C170385AF26301D9996F27DF78C6
24,888,341 UART: [art] SIG.R = 62C6827B02FF91808A820FC2D67DF7E04BF1526EC85C7AD3DEBDCBF9AB4147CBECAE6ACD7FD65C08BE4EF7BFA08D9650
24,895,780 UART: [art] SIG.S = E52CBDFDC160EBB33169B4784708459D8A68FE8870E7EDC17028031453350FBDDD246E0F7410EC5377F9618AE207060A
25,874,207 UART: Caliptra RT
25,874,906 UART: [state] CFI Enabled
26,008,090 UART: [rt] RT listening for mailbox commands...
26,009,965 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,039,584 UART: [rt]cmd =0x46504c54, len=4
26,041,227 >>> mbox cmd response data (8 bytes)
26,042,423 UART: [rt] FIPS self test
26,043,365 UART: [kat] ++
26,043,819 UART: [kat] sha1
26,047,955 UART: Fatal Error: 0x90060002
26,083,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,233,317 >>> mbox cmd response: failed
26,233,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,383,895 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
189,993 UART:
190,283 UART: Running Caliptra ROM ...
191,400 UART:
14,149,333 UART: [state] CFI Enabled
14,165,732 UART: [state] LifecycleState = Unprovisioned
14,167,672 UART: [state] DebugLocked = No
14,169,146 UART: [state] WD Timer not started. Device not locked for debugging
14,173,060 UART: [kat] SHA2-256
14,352,707 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,363,500 UART: [kat] ++
14,363,963 UART: [kat] sha1
14,374,583 UART: [kat] SHA2-256
14,377,277 UART: [kat] SHA2-384
14,382,620 UART: [kat] SHA2-512-ACC
14,384,992 UART: [kat] ECC-384
16,827,808 UART: [kat] HMAC-384Kdf
16,841,443 UART: [kat] LMS
17,317,965 UART: [kat] --
17,324,130 UART: [cold-reset] ++
17,325,310 UART: [fht] FHT @ 0x50003400
17,336,855 UART: [idev] ++
17,337,415 UART: [idev] CDI.KEYID = 6
17,338,353 UART: [idev] SUBJECT.KEYID = 7
17,339,620 UART: [idev] UDS.KEYID = 0
17,341,184 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,491,072 UART: [idev] Erasing UDS.KEYID = 0
19,816,821 UART: [idev] Sha1 KeyId Algorithm
19,840,313 UART: [idev] --
19,844,932 UART: [ldev] ++
19,845,511 UART: [ldev] CDI.KEYID = 6
19,846,468 UART: [ldev] SUBJECT.KEYID = 5
19,847,626 UART: [ldev] AUTHORITY.KEYID = 7
19,848,913 UART: [ldev] FE.KEYID = 1
19,860,995 UART: [ldev] Erasing FE.KEYID = 1
22,336,973 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,056,913 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,072,769 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,088,624 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,104,216 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,126,332 UART: [ldev] --
24,131,221 UART: [fwproc] Wait for Commands...
24,133,376 UART: [fwproc] Recv command 0x46574c44
24,135,362 UART: [fwproc] Recv'd Img size: 119428 bytes
27,633,479 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,715,994 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,789,007 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,119,988 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,777,096 ready_for_fw is high
3,777,768 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,453,092 >>> mbox cmd response: success
18,704,703 UART:
18,705,103 UART: Running Caliptra FMC ...
18,706,310 UART:
18,706,489 UART: [state] CFI Enabled
18,714,457 UART: [fht] FMC Alias Private Key: 7
20,479,712 UART: [art] Extend RT PCRs Done
20,480,947 UART: [art] Lock RT PCRs Done
20,482,524 UART: [art] Populate DV Done
20,487,955 UART: [fht] FMC Alias Private Key: 7
20,489,449 UART: [art] Derive CDI
20,490,216 UART: [art] Store in slot 0x4
20,532,736 UART: [art] Derive Key Pair
20,533,782 UART: [art] Store priv key in slot 0x5
22,960,897 UART: [art] Derive Key Pair - Done
22,973,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,679,681 UART: [art] Erasing AUTHORITY.KEYID = 7
24,681,195 UART: [art] PUB.X = D64CDEA907CA9EB7EB2E4D416C0C4C94A0B9B91AB4B711E1E6A4D9DF23FEDD2BA71FEEB08C7FA086FDA9288876E9743F
24,688,513 UART: [art] PUB.Y = 68B809D9B1F3E078A252528E788142427F0A1879B96C2491C43D1C44D2B1A2AAF4BF90E6D6F0EF573E4E9CA6E47C3D20
24,695,770 UART: [art] SIG.R = 35074D6988D5183DFBDB3F90B309276D4599B6A2CB8BB05BA8D0CDD20BCCEAF82D90595FA9A052523D675D0011252F19
24,703,119 UART: [art] SIG.S = DD027A7CAF7A13D25E51AF4175E4523F259B4432F243FFF4131F4E161C589AF6E63C082A17716190514A6916720923D4
25,682,208 UART: Caliptra RT
25,682,928 UART: [state] CFI Enabled
25,815,814 UART: [rt] RT listening for mailbox commands...
25,817,668 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,847,310 UART: [rt]cmd =0x46504c54, len=4
25,848,843 >>> mbox cmd response data (8 bytes)
25,849,994 UART: [rt] FIPS self test
25,850,967 UART: [kat] ++
25,851,420 UART: [kat] sha1
25,855,608 UART: Fatal Error: 0x90060002
25,890,988 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,040,956 >>> mbox cmd response: failed
26,041,604 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,191,537 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,511,978 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,204,649 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,053 writing to cptra_bootfsm_go
192,269 UART:
192,626 UART: Running Caliptra ROM ...
193,810 UART:
193,965 UART: [state] CFI Enabled
265,277 UART: [state] LifecycleState = Unprovisioned
267,690 UART: [state] DebugLocked = No
269,024 UART: [state] WD Timer not started. Device not locked for debugging
274,030 UART: [kat] SHA2-256
463,911 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,725 UART: [kat] ++
475,215 UART: [kat] sha1
487,375 UART: [kat] SHA2-256
490,394 UART: [kat] SHA2-384
495,961 UART: [kat] SHA2-512-ACC
498,549 UART: [kat] ECC-384
2,948,905 UART: [kat] HMAC-384Kdf
2,971,098 UART: [kat] LMS
3,502,867 UART: [kat] --
3,507,513 UART: [cold-reset] ++
3,508,742 UART: [fht] FHT @ 0x50003400
3,521,413 UART: [idev] ++
3,522,148 UART: [idev] CDI.KEYID = 6
3,523,037 UART: [idev] SUBJECT.KEYID = 7
3,524,313 UART: [idev] UDS.KEYID = 0
3,525,252 ready_for_fw is high
3,525,487 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,734 UART: [idev] Erasing UDS.KEYID = 0
6,029,839 UART: [idev] Sha1 KeyId Algorithm
6,052,139 UART: [idev] --
6,055,827 UART: [ldev] ++
6,056,524 UART: [ldev] CDI.KEYID = 6
6,057,597 UART: [ldev] SUBJECT.KEYID = 5
6,058,713 UART: [ldev] AUTHORITY.KEYID = 7
6,059,896 UART: [ldev] FE.KEYID = 1
6,099,943 UART: [ldev] Erasing FE.KEYID = 1
8,606,309 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,649 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,857 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,051 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,184 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,323 UART: [ldev] --
10,414,254 UART: [fwproc] Wait for Commands...
10,416,140 UART: [fwproc] Recv command 0x46574c44
10,418,412 UART: [fwproc] Recv'd Img size: 119428 bytes
13,922,126 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,000,738 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,124,362 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,690,813 >>> mbox cmd response: success
14,695,378 UART: [afmc] ++
14,696,091 UART: [afmc] CDI.KEYID = 6
14,697,290 UART: [afmc] SUBJECT.KEYID = 7
14,698,725 UART: [afmc] AUTHORITY.KEYID = 5
17,239,740 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,979,051 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,980,961 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,996,069 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,011,195 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,026,106 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,198 UART: [afmc] --
19,054,707 UART: [cold-reset] --
19,057,764 UART: [state] Locking Datavault
19,065,347 UART: [state] Locking PCR0, PCR1 and PCR31
19,067,585 UART: [state] Locking ICCM
19,069,566 UART: [exit] Launching FMC @ 0x40000130
19,078,236 UART:
19,078,483 UART: Running Caliptra FMC ...
19,079,513 UART:
19,079,663 UART: [state] CFI Enabled
19,138,945 UART: [fht] FMC Alias Private Key: 7
20,905,452 UART: [art] Extend RT PCRs Done
20,906,678 UART: [art] Lock RT PCRs Done
20,908,086 UART: [art] Populate DV Done
20,913,623 UART: [fht] FMC Alias Private Key: 7
20,915,161 UART: [art] Derive CDI
20,915,903 UART: [art] Store in slot 0x4
20,971,587 UART: [art] Derive Key Pair
20,972,634 UART: [art] Store priv key in slot 0x5
23,435,817 UART: [art] Derive Key Pair - Done
23,448,934 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,161,698 UART: [art] Erasing AUTHORITY.KEYID = 7
25,163,221 UART: [art] PUB.X = AB6EC3AC7BA7258DA63A26474B29541FA7FC3E6AFB07EF74933DD6367CDC3745E7ED9816480E220F75AE8DCCDCCA8FC8
25,170,484 UART: [art] PUB.Y = 405AF4973B0212F6BE5F4851B78426AA6B4E769F90218F1B1DD2B7251777814D217D93E304C32B90D84AD928AB7FDADA
25,177,719 UART: [art] SIG.R = FD8E109D6886C2306BA342B92634CDF0F8686F0EB5612EAEA6A3E09FD8C48AEB1258025DC5F8BE4A6CB2E3427D64754F
25,185,121 UART: [art] SIG.S = 2599A8ED866CF36A4B3C6902254A27D2394507797998973C047F14ED296884A2E02EFC8EE88F415123DD8D3E4D264707
26,163,919 UART: Caliptra RT
26,164,632 UART: [state] CFI Enabled
26,345,949 UART: [rt] RT listening for mailbox commands...
26,347,825 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,377,403 UART: [rt]cmd =0x46504c54, len=4
26,378,824 >>> mbox cmd response data (8 bytes)
26,380,003 UART: [rt] FIPS self test
26,380,953 UART: [kat] ++
26,381,409 UART: [kat] sha1
26,385,597 UART: Fatal Error: 0x90060002
26,420,977 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,570,974 >>> mbox cmd response: failed
26,571,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,721,532 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,093 UART:
190,392 UART: Running Caliptra ROM ...
191,507 UART:
191,678 UART: [state] CFI Enabled
254,976 UART: [state] LifecycleState = Unprovisioned
257,386 UART: [state] DebugLocked = No
259,958 UART: [state] WD Timer not started. Device not locked for debugging
265,052 UART: [kat] SHA2-256
454,926 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
465,746 UART: [kat] ++
466,200 UART: [kat] sha1
477,892 UART: [kat] SHA2-256
480,944 UART: [kat] SHA2-384
486,342 UART: [kat] SHA2-512-ACC
488,955 UART: [kat] ECC-384
2,934,890 UART: [kat] HMAC-384Kdf
2,958,025 UART: [kat] LMS
3,489,828 UART: [kat] --
3,495,414 UART: [cold-reset] ++
3,496,995 UART: [fht] FHT @ 0x50003400
3,508,310 UART: [idev] ++
3,509,030 UART: [idev] CDI.KEYID = 6
3,509,924 UART: [idev] SUBJECT.KEYID = 7
3,511,199 UART: [idev] UDS.KEYID = 0
3,512,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,662,674 UART: [idev] Erasing UDS.KEYID = 0
6,014,081 UART: [idev] Sha1 KeyId Algorithm
6,035,921 UART: [idev] --
6,040,465 UART: [ldev] ++
6,041,153 UART: [ldev] CDI.KEYID = 6
6,042,072 UART: [ldev] SUBJECT.KEYID = 5
6,043,240 UART: [ldev] AUTHORITY.KEYID = 7
6,044,480 UART: [ldev] FE.KEYID = 1
6,087,060 UART: [ldev] Erasing FE.KEYID = 1
8,594,344 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,723 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,922 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,171 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,141 UART: [ldev] --
10,398,841 UART: [fwproc] Wait for Commands...
10,401,434 UART: [fwproc] Recv command 0x46574c44
10,403,754 UART: [fwproc] Recv'd Img size: 119428 bytes
13,905,163 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,978,066 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,101,645 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,667,697 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
3,439,290 ready_for_fw is high
3,439,670 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,839,019 >>> mbox cmd response: success
19,130,125 UART:
19,130,552 UART: Running Caliptra FMC ...
19,131,726 UART:
19,131,901 UART: [state] CFI Enabled
19,197,659 UART: [fht] FMC Alias Private Key: 7
20,985,203 UART: [art] Extend RT PCRs Done
20,986,417 UART: [art] Lock RT PCRs Done
20,988,237 UART: [art] Populate DV Done
20,993,550 UART: [fht] FMC Alias Private Key: 7
20,995,202 UART: [art] Derive CDI
20,996,025 UART: [art] Store in slot 0x4
21,051,770 UART: [art] Derive Key Pair
21,052,823 UART: [art] Store priv key in slot 0x5
23,528,649 UART: [art] Derive Key Pair - Done
23,541,552 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,254,299 UART: [art] Erasing AUTHORITY.KEYID = 7
25,255,798 UART: [art] PUB.X = 9516B4469F527AB627782B1E1F46E0834A85B0819A44969229851AE7E0A5C45F585D73D4E60013417C04E80D7B35BC83
25,263,049 UART: [art] PUB.Y = 395E5A22A5C8FE4510D878FD251AD4A65F8B89B47C1617E498B00711B2C978E71264721DB70741191A4A04DE457E219B
25,270,266 UART: [art] SIG.R = 3161FFC2D1D18E7C57F42EE375D331371EBCACE0FDDACAE419700990841E63C11B9C2E3BD1C27192D100C6CB714D0A41
25,277,667 UART: [art] SIG.S = B7981597A334048EB1CED4A985C63D83365F67543128134B20C035B85740A78F601DC5176039D73CE4629A1FDEEE706E
26,256,695 UART: Caliptra RT
26,257,412 UART: [state] CFI Enabled
26,437,138 UART: [rt] RT listening for mailbox commands...
26,439,006 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,468,827 UART: [rt]cmd =0x46504c54, len=4
26,470,611 >>> mbox cmd response data (8 bytes)
26,471,668 UART: [rt] FIPS self test
26,472,615 UART: [kat] ++
26,473,068 UART: [kat] sha1
26,477,147 UART: Fatal Error: 0x90060002
26,512,352 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,662,323 >>> mbox cmd response: failed
26,662,988 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,812,963 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,424,756 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,819,414 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
192,596 UART:
192,967 UART: Running Caliptra ROM ...
194,117 UART:
603,915 UART: [state] CFI Enabled
618,166 UART: [state] LifecycleState = Unprovisioned
620,553 UART: [state] DebugLocked = No
622,452 UART: [state] WD Timer not started. Device not locked for debugging
627,786 UART: [kat] SHA2-256
817,672 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,392 UART: [kat] ++
828,941 UART: [kat] sha1
840,674 UART: [kat] SHA2-256
843,689 UART: [kat] SHA2-384
849,183 UART: [kat] SHA2-512-ACC
851,779 UART: [kat] ECC-384
3,295,428 UART: [kat] HMAC-384Kdf
3,308,894 UART: [kat] LMS
3,840,675 UART: [kat] --
3,847,315 UART: [cold-reset] ++
3,849,351 UART: [fht] FHT @ 0x50003400
3,860,702 UART: [idev] ++
3,861,419 UART: [idev] CDI.KEYID = 6
3,862,347 UART: [idev] SUBJECT.KEYID = 7
3,863,525 UART: [idev] UDS.KEYID = 0
3,864,455 ready_for_fw is high
3,864,686 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,014,777 UART: [idev] Erasing UDS.KEYID = 0
6,336,110 UART: [idev] Sha1 KeyId Algorithm
6,357,591 UART: [idev] --
6,362,562 UART: [ldev] ++
6,363,245 UART: [ldev] CDI.KEYID = 6
6,364,154 UART: [ldev] SUBJECT.KEYID = 5
6,365,315 UART: [ldev] AUTHORITY.KEYID = 7
6,366,553 UART: [ldev] FE.KEYID = 1
6,377,478 UART: [ldev] Erasing FE.KEYID = 1
8,857,480 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,080 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,479 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,805 UART: [ldev] --
10,647,767 UART: [fwproc] Wait for Commands...
10,649,601 UART: [fwproc] Recv command 0x46574c44
10,651,938 UART: [fwproc] Recv'd Img size: 119428 bytes
14,165,726 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,904 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,479 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,932,271 >>> mbox cmd response: success
14,936,543 UART: [afmc] ++
14,937,253 UART: [afmc] CDI.KEYID = 6
14,938,497 UART: [afmc] SUBJECT.KEYID = 7
14,939,941 UART: [afmc] AUTHORITY.KEYID = 5
17,443,949 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,017 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,165,947 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,074 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,234 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,292 UART: [afmc] --
19,237,893 UART: [cold-reset] --
19,242,194 UART: [state] Locking Datavault
19,247,289 UART: [state] Locking PCR0, PCR1 and PCR31
19,249,479 UART: [state] Locking ICCM
19,251,147 UART: [exit] Launching FMC @ 0x40000130
19,259,763 UART:
19,260,002 UART: Running Caliptra FMC ...
19,261,112 UART:
19,261,274 UART: [state] CFI Enabled
19,269,380 UART: [fht] FMC Alias Private Key: 7
21,035,355 UART: [art] Extend RT PCRs Done
21,036,569 UART: [art] Lock RT PCRs Done
21,038,120 UART: [art] Populate DV Done
21,043,384 UART: [fht] FMC Alias Private Key: 7
21,045,038 UART: [art] Derive CDI
21,045,877 UART: [art] Store in slot 0x4
21,088,417 UART: [art] Derive Key Pair
21,089,438 UART: [art] Store priv key in slot 0x5
23,516,931 UART: [art] Derive Key Pair - Done
23,529,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,236,168 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,658 UART: [art] PUB.X = 45FA7F2429794F6DDA096870CC264B2A7A3F552A2FF996CBBBACBBDFF517B9EAB3F15EA4ABE460B28E0691759106C647
25,244,997 UART: [art] PUB.Y = 40E580F5FC0F76E86C08D38B48647EF44306F7801BB3A98EF0F7385FEC330352843C2720C5D1019E1B4E4CD1C6C801DC
25,252,198 UART: [art] SIG.R = 9A6C716FCAF140CB02F56608696E7F9970B852EB4BED125E84A550424F84651ECB3EAA3EF9BEC1A1B1C992779CCBD901
25,259,624 UART: [art] SIG.S = 3543BA84DA73E51AF7930386E5EFEEEAAB88F91865C5C3CFB430F23A99775FB6ED56559CB5C288DE3B8371CD0A7269F5
26,238,919 UART: Caliptra RT
26,239,637 UART: [state] CFI Enabled
26,372,195 UART: [rt] RT listening for mailbox commands...
26,374,046 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,403,685 UART: [rt]cmd =0x46504c54, len=4
26,405,155 >>> mbox cmd response data (8 bytes)
26,406,526 UART: [rt] FIPS self test
26,407,509 UART: [kat] ++
26,407,968 UART: [kat] sha1
26,412,000 UART: Fatal Error: 0x90060002
26,447,219 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,597,156 >>> mbox cmd response: failed
26,597,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,747,644 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
190,126 UART:
190,408 UART: Running Caliptra ROM ...
191,461 UART:
13,782,170 UART: [state] CFI Enabled
13,794,567 UART: [state] LifecycleState = Unprovisioned
13,796,927 UART: [state] DebugLocked = No
13,798,346 UART: [state] WD Timer not started. Device not locked for debugging
13,803,257 UART: [kat] SHA2-256
13,993,166 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,003,918 UART: [kat] ++
14,004,525 UART: [kat] sha1
14,015,052 UART: [kat] SHA2-256
14,018,083 UART: [kat] SHA2-384
14,025,107 UART: [kat] SHA2-512-ACC
14,027,737 UART: [kat] ECC-384
16,470,392 UART: [kat] HMAC-384Kdf
16,482,958 UART: [kat] LMS
17,014,824 UART: [kat] --
17,019,777 UART: [cold-reset] ++
17,022,229 UART: [fht] FHT @ 0x50003400
17,033,492 UART: [idev] ++
17,034,179 UART: [idev] CDI.KEYID = 6
17,035,088 UART: [idev] SUBJECT.KEYID = 7
17,036,316 UART: [idev] UDS.KEYID = 0
17,038,003 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,187,880 UART: [idev] Erasing UDS.KEYID = 0
19,510,993 UART: [idev] Sha1 KeyId Algorithm
19,532,130 UART: [idev] --
19,536,508 UART: [ldev] ++
19,537,192 UART: [ldev] CDI.KEYID = 6
19,538,101 UART: [ldev] SUBJECT.KEYID = 5
19,539,260 UART: [ldev] AUTHORITY.KEYID = 7
19,540,496 UART: [ldev] FE.KEYID = 1
19,551,419 UART: [ldev] Erasing FE.KEYID = 1
22,029,734 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,748,862 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,764,043 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,779,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,794,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,815,410 UART: [ldev] --
23,821,325 UART: [fwproc] Wait for Commands...
23,823,735 UART: [fwproc] Recv command 0x46574c44
23,826,070 UART: [fwproc] Recv'd Img size: 119428 bytes
27,327,530 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,400,333 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,523,967 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,089,518 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,758,957 ready_for_fw is high
3,759,437 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,065,176 >>> mbox cmd response: success
19,324,291 UART:
19,324,741 UART: Running Caliptra FMC ...
19,325,870 UART:
19,326,027 UART: [state] CFI Enabled
19,333,897 UART: [fht] FMC Alias Private Key: 7
21,100,074 UART: [art] Extend RT PCRs Done
21,101,306 UART: [art] Lock RT PCRs Done
21,102,529 UART: [art] Populate DV Done
21,107,846 UART: [fht] FMC Alias Private Key: 7
21,109,337 UART: [art] Derive CDI
21,110,078 UART: [art] Store in slot 0x4
21,152,844 UART: [art] Derive Key Pair
21,153,892 UART: [art] Store priv key in slot 0x5
23,580,705 UART: [art] Derive Key Pair - Done
23,593,454 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,299,573 UART: [art] Erasing AUTHORITY.KEYID = 7
25,301,107 UART: [art] PUB.X = 816CEBA05F912374895CC1052CFCA4A0BAB91D24EAE519ED4CCE38F25F7F68D1024A190B6D69A6388E792139847473CF
25,308,337 UART: [art] PUB.Y = 52BDF5B664B096674E409E3DBAB71388FFE39C9970778FFC7D3F1565D5427A2B808F08F57242457F9BFB41B206CBF6B8
25,315,618 UART: [art] SIG.R = B12D92C55D23B2C32754791789FE4D400ADD558B6D1FFFEA0821D244E53FD9ADF50A41BABD3AC9810234F56F14BD1A05
25,322,991 UART: [art] SIG.S = F769E6309C74F774D55817B7FCB0F71249B3622B532FB85312CF8BEFDCB380ECA9A8C9BD8BAB70DFF33B6A048AF0E9D0
26,301,838 UART: Caliptra RT
26,302,572 UART: [state] CFI Enabled
26,436,063 UART: [rt] RT listening for mailbox commands...
26,437,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,467,904 UART: [rt]cmd =0x46504c54, len=4
26,469,487 >>> mbox cmd response data (8 bytes)
26,470,767 UART: [rt] FIPS self test
26,471,709 UART: [kat] ++
26,472,158 UART: [kat] sha1
26,476,184 UART: Fatal Error: 0x90060002
26,511,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,661,974 >>> mbox cmd response: failed
26,662,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,812,402 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
16,869,233 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,166,931 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,000 UART: [state] LifecycleState = Unprovisioned
85,655 UART: [state] DebugLocked = No
86,237 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,881 UART: [kat] SHA2-256
881,812 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,927 UART: [kat] ++
886,079 UART: [kat] sha1
890,251 UART: [kat] SHA2-256
892,189 UART: [kat] SHA2-384
894,984 UART: [kat] SHA2-512-ACC
896,885 UART: [kat] ECC-384
902,658 UART: [kat] HMAC-384Kdf
907,168 UART: [kat] LMS
1,475,364 UART: [kat] --
1,476,169 UART: [cold-reset] ++
1,476,727 UART: [fht] Storing FHT @ 0x50003400
1,479,518 UART: [idev] ++
1,479,686 UART: [idev] CDI.KEYID = 6
1,480,046 UART: [idev] SUBJECT.KEYID = 7
1,480,470 UART: [idev] UDS.KEYID = 0
1,480,815 ready_for_fw is high
1,480,815 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,228 UART: [idev] Erasing UDS.KEYID = 0
1,504,352 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,930 UART: [idev] --
1,513,993 UART: [ldev] ++
1,514,161 UART: [ldev] CDI.KEYID = 6
1,514,524 UART: [ldev] SUBJECT.KEYID = 5
1,514,950 UART: [ldev] AUTHORITY.KEYID = 7
1,515,413 UART: [ldev] FE.KEYID = 1
1,520,529 UART: [ldev] Erasing FE.KEYID = 1
1,545,470 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,097 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,813 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,704 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,416 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,450 UART: [ldev] --
1,584,827 UART: [fwproc] Waiting for Commands...
1,585,656 UART: [fwproc] Received command 0x46574c44
1,586,447 UART: [fwproc] Received Image of size 119428 bytes
2,941,401 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,769 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,987 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,664 >>> mbox cmd response: success
3,143,696 UART: [afmc] ++
3,143,864 UART: [afmc] CDI.KEYID = 6
3,144,226 UART: [afmc] SUBJECT.KEYID = 7
3,144,651 UART: [afmc] AUTHORITY.KEYID = 5
3,179,428 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,716 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,496 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,088 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,771 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,595 UART: [afmc] --
3,222,489 UART: [cold-reset] --
3,223,609 UART: [state] Locking Datavault
3,224,802 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,406 UART: [state] Locking ICCM
3,225,962 UART: [exit] Launching FMC @ 0x40000130
3,231,292 UART:
3,231,308 UART: Running Caliptra FMC ...
3,231,716 UART:
3,231,770 UART: [state] CFI Enabled
3,242,230 UART: [fht] FMC Alias Private Key: 7
3,361,796 UART: [art] Extend RT PCRs Done
3,362,224 UART: [art] Lock RT PCRs Done
3,363,380 UART: [art] Populate DV Done
3,371,791 UART: [fht] FMC Alias Private Key: 7
3,372,793 UART: [art] Derive CDI
3,373,073 UART: [art] Store in slot 0x4
3,459,141 UART: [art] Derive Key Pair
3,459,501 UART: [art] Store priv key in slot 0x5
3,472,540 UART: [art] Derive Key Pair - Done
3,487,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,001 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,766 UART: [art] PUB.X = 8AE572B067A554327266F0B0C167FE9B593D912368EBBF0427415C44262BDE0A56FA72418FEE3F444D12BC93078772E3
3,510,525 UART: [art] PUB.Y = 5220420F131E74461233FB3E9E4981665808BBCC580B91BE25D4D117E3FB35F04B26496F568D37F49748D48B8E7F040C
3,517,454 UART: [art] SIG.R = 629C81CDF3717ABCC7FBF685058277DE573928B948E8776936C3E0DB0D87DD6599D14063669B3882374DC6AC61678E07
3,524,211 UART: [art] SIG.S = EFAF7865FB8BD90BA7D8640E864C04A4E5C43892899139907532B3F39DFEEBA8CCC11715BD8EB1176E38CFE4C45E9D4A
3,548,102 UART: Caliptra RT
3,548,353 UART: [state] CFI Enabled
3,668,869 UART: [rt] RT listening for mailbox commands...
3,669,532 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,227 UART: [rt]cmd =0x46504c54, len=4
3,700,341 >>> mbox cmd response data (8 bytes)
3,700,524 UART: [rt] FIPS self test
3,700,852 UART: [kat] ++
3,701,004 UART: [kat] sha1
3,705,457 UART: Fatal Error: 0x90060002
3,706,996 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,001 >>> mbox cmd response: failed
3,707,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,707,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,511 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,109 UART: [kat] SHA2-256
882,040 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,155 UART: [kat] ++
886,307 UART: [kat] sha1
890,515 UART: [kat] SHA2-256
892,453 UART: [kat] SHA2-384
895,198 UART: [kat] SHA2-512-ACC
897,099 UART: [kat] ECC-384
902,428 UART: [kat] HMAC-384Kdf
907,198 UART: [kat] LMS
1,475,394 UART: [kat] --
1,476,043 UART: [cold-reset] ++
1,476,435 UART: [fht] Storing FHT @ 0x50003400
1,479,448 UART: [idev] ++
1,479,616 UART: [idev] CDI.KEYID = 6
1,479,976 UART: [idev] SUBJECT.KEYID = 7
1,480,400 UART: [idev] UDS.KEYID = 0
1,480,745 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,232 UART: [idev] Erasing UDS.KEYID = 0
1,505,238 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,884 UART: [idev] --
1,515,013 UART: [ldev] ++
1,515,181 UART: [ldev] CDI.KEYID = 6
1,515,544 UART: [ldev] SUBJECT.KEYID = 5
1,515,970 UART: [ldev] AUTHORITY.KEYID = 7
1,516,433 UART: [ldev] FE.KEYID = 1
1,521,573 UART: [ldev] Erasing FE.KEYID = 1
1,546,794 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,951 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,667 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,558 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,270 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,278 UART: [ldev] --
1,585,539 UART: [fwproc] Waiting for Commands...
1,586,232 UART: [fwproc] Received command 0x46574c44
1,587,023 UART: [fwproc] Received Image of size 119428 bytes
2,941,563 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,253 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,036 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,951 ready_for_fw is high
1,361,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,742 >>> mbox cmd response: success
3,054,359 UART:
3,054,375 UART: Running Caliptra FMC ...
3,054,783 UART:
3,054,837 UART: [state] CFI Enabled
3,065,153 UART: [fht] FMC Alias Private Key: 7
3,184,309 UART: [art] Extend RT PCRs Done
3,184,737 UART: [art] Lock RT PCRs Done
3,186,465 UART: [art] Populate DV Done
3,194,728 UART: [fht] FMC Alias Private Key: 7
3,195,692 UART: [art] Derive CDI
3,195,972 UART: [art] Store in slot 0x4
3,281,634 UART: [art] Derive Key Pair
3,281,994 UART: [art] Store priv key in slot 0x5
3,294,889 UART: [art] Derive Key Pair - Done
3,309,470 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,091 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,856 UART: [art] PUB.X = E8716DF2DFC218593EB2767CCD741EB5424C5BE27C5EA712AB0B68D6D26AF12B506B15FEA56F30D12EF1650ECD120E4E
3,332,635 UART: [art] PUB.Y = F06D7DD07E12A9A5618B10860EA3C1E8F5164C1142104E6A0EF3322D97B399583E4C9734093238173720D8DFD6092A63
3,339,565 UART: [art] SIG.R = CBA48DA302C656664B726290135FD5BE2D879538D9172FF264FED4BC135C93E757521D99F18F292064538D421604944C
3,346,321 UART: [art] SIG.S = EED561A5B82240FB96E4E81BA31D2FC11335EDF658A019418329FF66E1158B86F23AC5399F538350592F1DBB28237785
3,370,431 UART: Caliptra RT
3,370,682 UART: [state] CFI Enabled
3,490,913 UART: [rt] RT listening for mailbox commands...
3,491,576 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,289 UART: [rt]cmd =0x46504c54, len=4
3,522,647 >>> mbox cmd response data (8 bytes)
3,522,942 UART: [rt] FIPS self test
3,523,270 UART: [kat] ++
3,523,422 UART: [kat] sha1
3,527,657 UART: Fatal Error: 0x90060002
3,529,196 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,201 >>> mbox cmd response: failed
3,529,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,206 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,753 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,788 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,909 UART: [state] LifecycleState = Unprovisioned
86,564 UART: [state] DebugLocked = No
87,292 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,780 UART: [kat] SHA2-256
882,711 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,826 UART: [kat] ++
886,978 UART: [kat] sha1
891,092 UART: [kat] SHA2-256
893,030 UART: [kat] SHA2-384
895,781 UART: [kat] SHA2-512-ACC
897,682 UART: [kat] ECC-384
903,361 UART: [kat] HMAC-384Kdf
908,145 UART: [kat] LMS
1,476,341 UART: [kat] --
1,477,166 UART: [cold-reset] ++
1,477,656 UART: [fht] Storing FHT @ 0x50003400
1,480,485 UART: [idev] ++
1,480,653 UART: [idev] CDI.KEYID = 6
1,481,013 UART: [idev] SUBJECT.KEYID = 7
1,481,437 UART: [idev] UDS.KEYID = 0
1,481,782 ready_for_fw is high
1,481,782 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,125 UART: [idev] Erasing UDS.KEYID = 0
1,505,845 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,333 UART: [idev] --
1,515,348 UART: [ldev] ++
1,515,516 UART: [ldev] CDI.KEYID = 6
1,515,879 UART: [ldev] SUBJECT.KEYID = 5
1,516,305 UART: [ldev] AUTHORITY.KEYID = 7
1,516,768 UART: [ldev] FE.KEYID = 1
1,522,328 UART: [ldev] Erasing FE.KEYID = 1
1,548,449 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,892 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,608 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,211 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,213 UART: [ldev] --
1,587,510 UART: [fwproc] Waiting for Commands...
1,588,199 UART: [fwproc] Received command 0x46574c44
1,588,990 UART: [fwproc] Received Image of size 119428 bytes
2,944,442 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,290 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,508 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,183 >>> mbox cmd response: success
3,145,343 UART: [afmc] ++
3,145,511 UART: [afmc] CDI.KEYID = 6
3,145,873 UART: [afmc] SUBJECT.KEYID = 7
3,146,298 UART: [afmc] AUTHORITY.KEYID = 5
3,181,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,081 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,861 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,570 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,453 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,136 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,098 UART: [afmc] --
3,224,994 UART: [cold-reset] --
3,225,796 UART: [state] Locking Datavault
3,227,085 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,689 UART: [state] Locking ICCM
3,228,321 UART: [exit] Launching FMC @ 0x40000130
3,233,651 UART:
3,233,667 UART: Running Caliptra FMC ...
3,234,075 UART:
3,234,218 UART: [state] CFI Enabled
3,244,652 UART: [fht] FMC Alias Private Key: 7
3,364,122 UART: [art] Extend RT PCRs Done
3,364,550 UART: [art] Lock RT PCRs Done
3,366,010 UART: [art] Populate DV Done
3,374,113 UART: [fht] FMC Alias Private Key: 7
3,375,077 UART: [art] Derive CDI
3,375,357 UART: [art] Store in slot 0x4
3,461,383 UART: [art] Derive Key Pair
3,461,743 UART: [art] Store priv key in slot 0x5
3,474,490 UART: [art] Derive Key Pair - Done
3,489,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,648 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,413 UART: [art] PUB.X = 675129A76844A77E20B6A4194408C1212031686BB55BCAC2703C5E0C7808C5C83BB11BD1B95382ECE8A48AF39369355A
3,512,170 UART: [art] PUB.Y = DE98BFEFE5F7084DCDDDA02DBA3836A39CA98429112286A87989D9A9E34FF406F7A7F1CC28286126004F2AAD78A2094A
3,519,101 UART: [art] SIG.R = 56705CA0976066959114ADE54FE4BE40D685911E3DD2B289BB4B168FA33D299AC349B9F1B7BAC3C2BD92385D01AC8959
3,525,874 UART: [art] SIG.S = A6E6DABE26E560B387B526EF6DE6326BF26596A601C5452287E32DE396BCE5A479BE755AA44D96DA47A5ADEDB703C5F3
3,550,136 UART: Caliptra RT
3,550,479 UART: [state] CFI Enabled
3,670,389 UART: [rt] RT listening for mailbox commands...
3,671,052 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,867 UART: [rt]cmd =0x46504c54, len=4
3,701,965 >>> mbox cmd response data (8 bytes)
3,702,084 UART: [rt] FIPS self test
3,702,412 UART: [kat] ++
3,702,564 UART: [kat] sha1
3,707,061 UART: Fatal Error: 0x90060002
3,708,600 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,605 >>> mbox cmd response: failed
3,708,605 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,610 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,748 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,406 UART: [kat] SHA2-256
882,337 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,452 UART: [kat] ++
886,604 UART: [kat] sha1
890,846 UART: [kat] SHA2-256
892,784 UART: [kat] SHA2-384
895,657 UART: [kat] SHA2-512-ACC
897,558 UART: [kat] ECC-384
903,509 UART: [kat] HMAC-384Kdf
908,115 UART: [kat] LMS
1,476,311 UART: [kat] --
1,477,178 UART: [cold-reset] ++
1,477,552 UART: [fht] Storing FHT @ 0x50003400
1,480,245 UART: [idev] ++
1,480,413 UART: [idev] CDI.KEYID = 6
1,480,773 UART: [idev] SUBJECT.KEYID = 7
1,481,197 UART: [idev] UDS.KEYID = 0
1,481,542 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,247 UART: [idev] Erasing UDS.KEYID = 0
1,505,707 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,257 UART: [idev] --
1,515,208 UART: [ldev] ++
1,515,376 UART: [ldev] CDI.KEYID = 6
1,515,739 UART: [ldev] SUBJECT.KEYID = 5
1,516,165 UART: [ldev] AUTHORITY.KEYID = 7
1,516,628 UART: [ldev] FE.KEYID = 1
1,521,976 UART: [ldev] Erasing FE.KEYID = 1
1,547,311 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,016 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,732 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,623 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,335 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,447 UART: [ldev] --
1,586,730 UART: [fwproc] Waiting for Commands...
1,587,433 UART: [fwproc] Received command 0x46574c44
1,588,224 UART: [fwproc] Received Image of size 119428 bytes
2,942,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,598 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,816 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,551 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,146 ready_for_fw is high
1,363,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,795 >>> mbox cmd response: success
3,053,170 UART:
3,053,186 UART: Running Caliptra FMC ...
3,053,594 UART:
3,053,737 UART: [state] CFI Enabled
3,064,635 UART: [fht] FMC Alias Private Key: 7
3,182,951 UART: [art] Extend RT PCRs Done
3,183,379 UART: [art] Lock RT PCRs Done
3,184,773 UART: [art] Populate DV Done
3,192,982 UART: [fht] FMC Alias Private Key: 7
3,194,020 UART: [art] Derive CDI
3,194,300 UART: [art] Store in slot 0x4
3,279,626 UART: [art] Derive Key Pair
3,279,986 UART: [art] Store priv key in slot 0x5
3,293,679 UART: [art] Derive Key Pair - Done
3,308,378 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,553 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,318 UART: [art] PUB.X = 2765B4E581A5F820A7098CD53D091305B3F79096AD15680427E9002EBE6BB8FB8160D6F7F851AB3574165C3D6D5F649D
3,331,052 UART: [art] PUB.Y = 98A283366F1183086B05E4F3737D645243B100E4B73DE44B991F11040E403150B9859F94CAB1450F53E5ED1D0F596EBD
3,337,956 UART: [art] SIG.R = 6735FD16B96E7EC8B0DA607D4ECB9BF0E1D22A836384E39042FF1C6C2CF479CABF2A5FAF8EEF05AE043A4F3587476146
3,344,738 UART: [art] SIG.S = 769591FD026FDF9DD568B9A0B8729499A60C2BF55A7D84F056163A5AE4A1079CD52F87AB8B2647F62CAA42E5615976CD
3,368,367 UART: Caliptra RT
3,368,710 UART: [state] CFI Enabled
3,489,375 UART: [rt] RT listening for mailbox commands...
3,490,038 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,991 UART: [rt]cmd =0x46504c54, len=4
3,521,193 >>> mbox cmd response data (8 bytes)
3,521,470 UART: [rt] FIPS self test
3,521,798 UART: [kat] ++
3,521,950 UART: [kat] sha1
3,526,339 UART: Fatal Error: 0x90060002
3,527,878 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,883 >>> mbox cmd response: failed
3,527,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,527,888 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,964 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,939 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,052 UART: [state] LifecycleState = Unprovisioned
85,707 UART: [state] DebugLocked = No
86,313 UART: [state] WD Timer not started. Device not locked for debugging
87,432 UART: [kat] SHA2-256
890,982 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,086 UART: [kat] ++
895,238 UART: [kat] sha1
899,480 UART: [kat] SHA2-256
901,420 UART: [kat] SHA2-384
904,053 UART: [kat] SHA2-512-ACC
905,954 UART: [kat] ECC-384
915,541 UART: [kat] HMAC-384Kdf
920,215 UART: [kat] LMS
1,168,527 UART: [kat] --
1,169,562 UART: [cold-reset] ++
1,170,006 UART: [fht] FHT @ 0x50003400
1,172,772 UART: [idev] ++
1,172,940 UART: [idev] CDI.KEYID = 6
1,173,301 UART: [idev] SUBJECT.KEYID = 7
1,173,726 UART: [idev] UDS.KEYID = 0
1,174,072 ready_for_fw is high
1,174,072 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,911 UART: [idev] Erasing UDS.KEYID = 0
1,199,009 UART: [idev] Sha1 KeyId Algorithm
1,207,959 UART: [idev] --
1,209,064 UART: [ldev] ++
1,209,232 UART: [ldev] CDI.KEYID = 6
1,209,596 UART: [ldev] SUBJECT.KEYID = 5
1,210,023 UART: [ldev] AUTHORITY.KEYID = 7
1,210,486 UART: [ldev] FE.KEYID = 1
1,215,824 UART: [ldev] Erasing FE.KEYID = 1
1,242,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,821 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,710 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,422 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,334 UART: [ldev] --
1,281,563 UART: [fwproc] Wait for Commands...
1,282,286 UART: [fwproc] Recv command 0x46574c44
1,283,019 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,774 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,011 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,186 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,913 >>> mbox cmd response: success
2,840,069 UART: [afmc] ++
2,840,237 UART: [afmc] CDI.KEYID = 6
2,840,600 UART: [afmc] SUBJECT.KEYID = 7
2,841,026 UART: [afmc] AUTHORITY.KEYID = 5
2,876,143 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,430 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,179 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,889 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,770 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,471 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,368 UART: [afmc] --
2,919,227 UART: [cold-reset] --
2,920,247 UART: [state] Locking Datavault
2,921,478 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,082 UART: [state] Locking ICCM
2,922,668 UART: [exit] Launching FMC @ 0x40000130
2,927,998 UART:
2,928,014 UART: Running Caliptra FMC ...
2,928,422 UART:
2,928,476 UART: [state] CFI Enabled
2,938,662 UART: [fht] FMC Alias Private Key: 7
3,057,846 UART: [art] Extend RT PCRs Done
3,058,274 UART: [art] Lock RT PCRs Done
3,059,560 UART: [art] Populate DV Done
3,067,873 UART: [fht] FMC Alias Private Key: 7
3,068,985 UART: [art] Derive CDI
3,069,265 UART: [art] Store in slot 0x4
3,154,720 UART: [art] Derive Key Pair
3,155,080 UART: [art] Store priv key in slot 0x5
3,168,034 UART: [art] Derive Key Pair - Done
3,182,511 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,966 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,731 UART: [art] PUB.X = 5F99ECC4A0BCEE7B67A808D70FB313699B765FC31B71293A1DA05CEAF6E83BC481235CB40850FA1362159413F44F8990
3,205,498 UART: [art] PUB.Y = 744CC13C60EBDFCB386451C8848A00619D213D5ECFAACE43FDA5E1E6979F24141FE4A6B989C53A8AB72FA81BB63C88D3
3,212,444 UART: [art] SIG.R = 4782015891AC011F3E9EB479E68F6B41E65E567DDA57502000E03F191F490BF1A913378F5471DAE637718D5AEC2209C3
3,219,176 UART: [art] SIG.S = CA5960AA1C93A3A969309F24FC8ED84391C2398BAF6F7BE3F2EBABA113F849326AF789A03B2A8CCBE65D67E71B671694
3,243,512 UART: Caliptra RT
3,243,763 UART: [state] CFI Enabled
3,363,896 UART: [rt] RT listening for mailbox commands...
3,364,559 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,362 UART: [rt]cmd =0x46504c54, len=4
3,395,616 >>> mbox cmd response data (8 bytes)
3,395,845 UART: [rt] FIPS self test
3,396,173 UART: [kat] ++
3,396,325 UART: [kat] sha1
3,400,608 UART: Fatal Error: 0x90060002
3,402,147 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,152 >>> mbox cmd response: failed
3,402,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,157 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,106 UART: [state] LifecycleState = Unprovisioned
85,761 UART: [state] DebugLocked = No
86,369 UART: [state] WD Timer not started. Device not locked for debugging
87,636 UART: [kat] SHA2-256
891,186 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,290 UART: [kat] ++
895,442 UART: [kat] sha1
899,482 UART: [kat] SHA2-256
901,422 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,415 UART: [kat] LMS
1,168,727 UART: [kat] --
1,169,554 UART: [cold-reset] ++
1,169,902 UART: [fht] FHT @ 0x50003400
1,172,532 UART: [idev] ++
1,172,700 UART: [idev] CDI.KEYID = 6
1,173,061 UART: [idev] SUBJECT.KEYID = 7
1,173,486 UART: [idev] UDS.KEYID = 0
1,173,832 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,457 UART: [idev] Erasing UDS.KEYID = 0
1,198,789 UART: [idev] Sha1 KeyId Algorithm
1,207,873 UART: [idev] --
1,208,802 UART: [ldev] ++
1,208,970 UART: [ldev] CDI.KEYID = 6
1,209,334 UART: [ldev] SUBJECT.KEYID = 5
1,209,761 UART: [ldev] AUTHORITY.KEYID = 7
1,210,224 UART: [ldev] FE.KEYID = 1
1,215,268 UART: [ldev] Erasing FE.KEYID = 1
1,242,123 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,967 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,683 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,502 UART: [ldev] --
1,281,749 UART: [fwproc] Wait for Commands...
1,282,462 UART: [fwproc] Recv command 0x46574c44
1,283,195 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,376 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,037 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,212 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,801 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,784 ready_for_fw is high
1,059,784 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,146 >>> mbox cmd response: success
2,753,227 UART:
2,753,243 UART: Running Caliptra FMC ...
2,753,651 UART:
2,753,705 UART: [state] CFI Enabled
2,763,917 UART: [fht] FMC Alias Private Key: 7
2,883,241 UART: [art] Extend RT PCRs Done
2,883,669 UART: [art] Lock RT PCRs Done
2,885,265 UART: [art] Populate DV Done
2,893,536 UART: [fht] FMC Alias Private Key: 7
2,894,672 UART: [art] Derive CDI
2,894,952 UART: [art] Store in slot 0x4
2,980,487 UART: [art] Derive Key Pair
2,980,847 UART: [art] Store priv key in slot 0x5
2,994,037 UART: [art] Derive Key Pair - Done
3,008,769 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,062 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,827 UART: [art] PUB.X = BB21CFCEB5E0379B8E59593F105EE85AA6A086DDC3FAE894DC3DFB89649C73F120605DF954C3EC3B1423EAB8230E318E
3,031,612 UART: [art] PUB.Y = 467B4B7906631E6C20F90EF559347DF7E51AB57E17ABC85185A7E0B5FBA049CCB2A65DBE7700D26C107EFEDCD590AF36
3,038,550 UART: [art] SIG.R = EF8118F1CF88AD2EDA39539D7A231C6A2959D8FFC1157D8B6512EAA7833ED565B2666070347CC4768317B493E727F588
3,045,320 UART: [art] SIG.S = C18C8D13E806D8682E0BB841EBA776F49CBCE2CA96AB57B86D796F2D137CAC1895414545F1BBEDD1FEEAD1ED21664189
3,068,838 UART: Caliptra RT
3,069,089 UART: [state] CFI Enabled
3,188,999 UART: [rt] RT listening for mailbox commands...
3,189,662 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,255 UART: [rt]cmd =0x46504c54, len=4
3,220,317 >>> mbox cmd response data (8 bytes)
3,220,674 UART: [rt] FIPS self test
3,221,002 UART: [kat] ++
3,221,154 UART: [kat] sha1
3,225,367 UART: Fatal Error: 0x90060002
3,226,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,911 >>> mbox cmd response: failed
3,226,911 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,916 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,692 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,850 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,057 UART: [state] LifecycleState = Unprovisioned
85,712 UART: [state] DebugLocked = No
86,238 UART: [state] WD Timer not started. Device not locked for debugging
87,471 UART: [kat] SHA2-256
891,021 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,125 UART: [kat] ++
895,277 UART: [kat] sha1
899,605 UART: [kat] SHA2-256
901,545 UART: [kat] SHA2-384
904,348 UART: [kat] SHA2-512-ACC
906,249 UART: [kat] ECC-384
915,926 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,170,073 UART: [cold-reset] ++
1,170,495 UART: [fht] FHT @ 0x50003400
1,173,121 UART: [idev] ++
1,173,289 UART: [idev] CDI.KEYID = 6
1,173,650 UART: [idev] SUBJECT.KEYID = 7
1,174,075 UART: [idev] UDS.KEYID = 0
1,174,421 ready_for_fw is high
1,174,421 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,234 UART: [idev] Erasing UDS.KEYID = 0
1,199,740 UART: [idev] Sha1 KeyId Algorithm
1,208,432 UART: [idev] --
1,209,485 UART: [ldev] ++
1,209,653 UART: [ldev] CDI.KEYID = 6
1,210,017 UART: [ldev] SUBJECT.KEYID = 5
1,210,444 UART: [ldev] AUTHORITY.KEYID = 7
1,210,907 UART: [ldev] FE.KEYID = 1
1,215,991 UART: [ldev] Erasing FE.KEYID = 1
1,242,568 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,130 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,735 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,447 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,611 UART: [ldev] --
1,281,852 UART: [fwproc] Wait for Commands...
1,282,625 UART: [fwproc] Recv command 0x46574c44
1,283,358 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,043 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,348 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,523 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,050 >>> mbox cmd response: success
2,839,230 UART: [afmc] ++
2,839,398 UART: [afmc] CDI.KEYID = 6
2,839,761 UART: [afmc] SUBJECT.KEYID = 7
2,840,187 UART: [afmc] AUTHORITY.KEYID = 5
2,875,760 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,805 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,264 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,145 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,673 UART: [afmc] --
2,918,648 UART: [cold-reset] --
2,919,380 UART: [state] Locking Datavault
2,920,375 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,979 UART: [state] Locking ICCM
2,921,603 UART: [exit] Launching FMC @ 0x40000130
2,926,933 UART:
2,926,949 UART: Running Caliptra FMC ...
2,927,357 UART:
2,927,500 UART: [state] CFI Enabled
2,938,102 UART: [fht] FMC Alias Private Key: 7
3,056,906 UART: [art] Extend RT PCRs Done
3,057,334 UART: [art] Lock RT PCRs Done
3,058,736 UART: [art] Populate DV Done
3,067,133 UART: [fht] FMC Alias Private Key: 7
3,068,229 UART: [art] Derive CDI
3,068,509 UART: [art] Store in slot 0x4
3,154,138 UART: [art] Derive Key Pair
3,154,498 UART: [art] Store priv key in slot 0x5
3,167,606 UART: [art] Derive Key Pair - Done
3,182,285 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,816 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,581 UART: [art] PUB.X = 4A3CEC4685D43F2445112649ED72A833DD0EABC0411BB7AAC31BA365204002E1288F58F94CAADEA678609BEEDAF5F7E5
3,205,361 UART: [art] PUB.Y = 060302BB85FB0035C0D92D1EDF25EF67AF0440016D1A30EFDFB60FCE5F1FC7A194516E06C8B7EB5E1E123D42E5928BAF
3,212,286 UART: [art] SIG.R = 4AC62CFDF50867C7DF4E465482988FE941CFAB7AD3CEE18F977744B05D5E73F3398EDF1FD1BBEC0C172268120AB8062D
3,219,060 UART: [art] SIG.S = AF088E77221110CA449A387433C8A34D7A6571AD77C4476F0927A9D69814C6335172B2EF8D0FD02A7A48B6BED0129F58
3,243,305 UART: Caliptra RT
3,243,648 UART: [state] CFI Enabled
3,362,669 UART: [rt] RT listening for mailbox commands...
3,363,332 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,335 UART: [rt]cmd =0x46504c54, len=4
3,394,469 >>> mbox cmd response data (8 bytes)
3,394,684 UART: [rt] FIPS self test
3,395,012 UART: [kat] ++
3,395,164 UART: [kat] sha1
3,399,457 UART: Fatal Error: 0x90060002
3,400,996 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,001 >>> mbox cmd response: failed
3,401,001 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,006 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,618 UART: [state] WD Timer not started. Device not locked for debugging
87,869 UART: [kat] SHA2-256
891,419 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,523 UART: [kat] ++
895,675 UART: [kat] sha1
899,939 UART: [kat] SHA2-256
901,879 UART: [kat] SHA2-384
904,542 UART: [kat] SHA2-512-ACC
906,443 UART: [kat] ECC-384
916,262 UART: [kat] HMAC-384Kdf
920,796 UART: [kat] LMS
1,169,108 UART: [kat] --
1,170,049 UART: [cold-reset] ++
1,170,615 UART: [fht] FHT @ 0x50003400
1,173,273 UART: [idev] ++
1,173,441 UART: [idev] CDI.KEYID = 6
1,173,802 UART: [idev] SUBJECT.KEYID = 7
1,174,227 UART: [idev] UDS.KEYID = 0
1,174,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,018 UART: [idev] Erasing UDS.KEYID = 0
1,198,826 UART: [idev] Sha1 KeyId Algorithm
1,207,594 UART: [idev] --
1,208,639 UART: [ldev] ++
1,208,807 UART: [ldev] CDI.KEYID = 6
1,209,171 UART: [ldev] SUBJECT.KEYID = 5
1,209,598 UART: [ldev] AUTHORITY.KEYID = 7
1,210,061 UART: [ldev] FE.KEYID = 1
1,215,413 UART: [ldev] Erasing FE.KEYID = 1
1,241,696 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,402 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,118 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,007 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,719 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,859 UART: [ldev] --
1,281,240 UART: [fwproc] Wait for Commands...
1,281,833 UART: [fwproc] Recv command 0x46574c44
1,282,566 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,464 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,639 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,218 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,663 ready_for_fw is high
1,059,663 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,119 >>> mbox cmd response: success
2,751,774 UART:
2,751,790 UART: Running Caliptra FMC ...
2,752,198 UART:
2,752,341 UART: [state] CFI Enabled
2,762,911 UART: [fht] FMC Alias Private Key: 7
2,881,945 UART: [art] Extend RT PCRs Done
2,882,373 UART: [art] Lock RT PCRs Done
2,883,685 UART: [art] Populate DV Done
2,892,266 UART: [fht] FMC Alias Private Key: 7
2,893,282 UART: [art] Derive CDI
2,893,562 UART: [art] Store in slot 0x4
2,979,343 UART: [art] Derive Key Pair
2,979,703 UART: [art] Store priv key in slot 0x5
2,992,833 UART: [art] Derive Key Pair - Done
3,007,575 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,324 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,089 UART: [art] PUB.X = 41C20220061F956E6CAA8487B93E475A7526DC8BF517B438D2FE26062FA9392254A26FE1E011B03651B146B0A6FC5F8F
3,030,850 UART: [art] PUB.Y = DF80572174B4389E21099719226FE0A83DB713D8966116FDD5534BF2AA40FE3D370D4D1045015579DFEB01D17D41FAAB
3,037,790 UART: [art] SIG.R = C388F378F50DD9BFBEB0F72D3557919E52EE241947AC683CCFBDA45730605F9735DBCCB99415FB62AB70D7D6DBA03D73
3,044,573 UART: [art] SIG.S = 39AC53809E0A4526A1B8EA6D13A0C61BDDB8356E362980EC5A0793746CA52E6B55EC7933D1051890B1EC2AF0F58A24F9
3,068,736 UART: Caliptra RT
3,069,079 UART: [state] CFI Enabled
3,188,714 UART: [rt] RT listening for mailbox commands...
3,189,377 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,306 UART: [rt]cmd =0x46504c54, len=4
3,220,512 >>> mbox cmd response data (8 bytes)
3,220,859 UART: [rt] FIPS self test
3,221,187 UART: [kat] ++
3,221,339 UART: [kat] sha1
3,225,556 UART: Fatal Error: 0x90060002
3,227,095 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,100 >>> mbox cmd response: failed
3,227,100 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,105 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,419 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,465 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,924 UART: [state] LifecycleState = Unprovisioned
85,579 UART: [state] DebugLocked = No
86,143 UART: [state] WD Timer not started. Device not locked for debugging
87,334 UART: [kat] SHA2-256
892,984 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,109 UART: [kat] ++
897,261 UART: [kat] sha1
901,721 UART: [kat] SHA2-256
903,661 UART: [kat] SHA2-384
906,410 UART: [kat] SHA2-512-ACC
908,311 UART: [kat] ECC-384
917,658 UART: [kat] HMAC-384Kdf
922,252 UART: [kat] LMS
1,170,580 UART: [kat] --
1,171,567 UART: [cold-reset] ++
1,171,905 UART: [fht] FHT @ 0x50003400
1,174,686 UART: [idev] ++
1,174,854 UART: [idev] CDI.KEYID = 6
1,175,214 UART: [idev] SUBJECT.KEYID = 7
1,175,638 UART: [idev] UDS.KEYID = 0
1,175,983 ready_for_fw is high
1,175,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,606 UART: [idev] Erasing UDS.KEYID = 0
1,200,771 UART: [idev] Sha1 KeyId Algorithm
1,209,127 UART: [idev] --
1,210,007 UART: [ldev] ++
1,210,175 UART: [ldev] CDI.KEYID = 6
1,210,538 UART: [ldev] SUBJECT.KEYID = 5
1,210,964 UART: [ldev] AUTHORITY.KEYID = 7
1,211,427 UART: [ldev] FE.KEYID = 1
1,216,363 UART: [ldev] Erasing FE.KEYID = 1
1,243,144 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,403 UART: [ldev] --
1,282,846 UART: [fwproc] Wait for Commands...
1,283,458 UART: [fwproc] Recv command 0x46574c44
1,284,186 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,081 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,988 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,158 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,659 >>> mbox cmd response: success
2,839,813 UART: [afmc] ++
2,839,981 UART: [afmc] CDI.KEYID = 6
2,840,343 UART: [afmc] SUBJECT.KEYID = 7
2,840,768 UART: [afmc] AUTHORITY.KEYID = 5
2,875,881 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,262 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,010 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,719 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,602 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,303 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,085 UART: [afmc] --
2,919,043 UART: [cold-reset] --
2,919,933 UART: [state] Locking Datavault
2,920,874 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,478 UART: [state] Locking ICCM
2,922,078 UART: [exit] Launching FMC @ 0x40000130
2,927,408 UART:
2,927,424 UART: Running Caliptra FMC ...
2,927,832 UART:
2,927,886 UART: [state] CFI Enabled
2,938,586 UART: [fht] FMC Alias Private Key: 7
3,057,232 UART: [art] Extend RT PCRs Done
3,057,660 UART: [art] Lock RT PCRs Done
3,059,176 UART: [art] Populate DV Done
3,067,437 UART: [fht] FMC Alias Private Key: 7
3,068,477 UART: [art] Derive CDI
3,068,757 UART: [art] Store in slot 0x4
3,154,264 UART: [art] Derive Key Pair
3,154,624 UART: [art] Store priv key in slot 0x5
3,168,022 UART: [art] Derive Key Pair - Done
3,182,764 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,749 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,514 UART: [art] PUB.X = 15CF5A9C3FD60A1783F4A3F6E75A12C3572D273D8F5606CDAF6998162B114FB00319B841CC3F608E59FD1A1856D77D5D
3,206,281 UART: [art] PUB.Y = BADBF762B1AFE4B8D53FE336340037CD0B0BE3A49E691743978FA48A2CF86C3F67E92AF6E4F9980C0D2D577D24B24EB3
3,213,213 UART: [art] SIG.R = AE426AB849D9BBDECC2C280989D07115DA7967AD992BB7C98F07DB8E9E36EF5CFE3980F1C313A6D94CD9B6C51D84057F
3,219,992 UART: [art] SIG.S = 30DC150E00BE7D9C0440DFA65A5EA1215446C0CDF5714E99C89F25AA87449FE25A90C9FBCA53C9AA5DAB8E6342571D9B
3,243,696 UART: Caliptra RT
3,243,947 UART: [state] CFI Enabled
3,365,024 UART: [rt] RT listening for mailbox commands...
3,365,687 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,522 UART: [rt]cmd =0x46504c54, len=4
3,396,588 >>> mbox cmd response data (8 bytes)
3,396,713 UART: [rt] FIPS self test
3,397,041 UART: [kat] ++
3,397,193 UART: [kat] sha1
3,401,460 UART: Fatal Error: 0x90060002
3,402,999 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,004 >>> mbox cmd response: failed
3,403,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,009 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,950 UART: [state] LifecycleState = Unprovisioned
85,605 UART: [state] DebugLocked = No
86,125 UART: [state] WD Timer not started. Device not locked for debugging
87,324 UART: [kat] SHA2-256
892,974 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,099 UART: [kat] ++
897,251 UART: [kat] sha1
901,477 UART: [kat] SHA2-256
903,417 UART: [kat] SHA2-384
906,114 UART: [kat] SHA2-512-ACC
908,015 UART: [kat] ECC-384
917,946 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,171,527 UART: [cold-reset] ++
1,171,901 UART: [fht] FHT @ 0x50003400
1,174,556 UART: [idev] ++
1,174,724 UART: [idev] CDI.KEYID = 6
1,175,084 UART: [idev] SUBJECT.KEYID = 7
1,175,508 UART: [idev] UDS.KEYID = 0
1,175,853 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,530 UART: [idev] Erasing UDS.KEYID = 0
1,201,197 UART: [idev] Sha1 KeyId Algorithm
1,209,643 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,556 UART: [ldev] AUTHORITY.KEYID = 7
1,212,019 UART: [ldev] FE.KEYID = 1
1,217,115 UART: [ldev] Erasing FE.KEYID = 1
1,243,256 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,589 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,305 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,196 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,908 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,989 UART: [ldev] --
1,282,310 UART: [fwproc] Wait for Commands...
1,283,052 UART: [fwproc] Recv command 0x46574c44
1,283,780 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,759 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,570 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,740 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,327 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,837 ready_for_fw is high
1,060,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,498 >>> mbox cmd response: success
2,756,319 UART:
2,756,335 UART: Running Caliptra FMC ...
2,756,743 UART:
2,756,797 UART: [state] CFI Enabled
2,767,077 UART: [fht] FMC Alias Private Key: 7
2,886,247 UART: [art] Extend RT PCRs Done
2,886,675 UART: [art] Lock RT PCRs Done
2,888,341 UART: [art] Populate DV Done
2,896,636 UART: [fht] FMC Alias Private Key: 7
2,897,740 UART: [art] Derive CDI
2,898,020 UART: [art] Store in slot 0x4
2,983,815 UART: [art] Derive Key Pair
2,984,175 UART: [art] Store priv key in slot 0x5
2,997,067 UART: [art] Derive Key Pair - Done
3,011,850 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,189 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,954 UART: [art] PUB.X = BD5E03B484BECABEAABFB258B32DF59570238851744F450EDEC3FFE4DC7D4A94E6E1DD7C7A2FFFA6EB4F186E7F01A646
3,034,745 UART: [art] PUB.Y = 106F9AC74D2BF8C6A4F2A20DDEC1F886A6A8CEC8ACD8E44A8D76A222DCBE058F40A3299315FC618C99EC2CCA5DE3A1CD
3,041,719 UART: [art] SIG.R = 36B254887BFC95A71947631452DB55FAA56CDA8FA177A7CF8A40557B45861A1DC61CBA9516F29D64E8728894CB85D17E
3,048,493 UART: [art] SIG.S = D67DF115542F08CA12627A7A88F014C7C504DDA05234F6C782FCADFF50239345873F1310B9280785C2C336CA6E1434FB
3,071,900 UART: Caliptra RT
3,072,151 UART: [state] CFI Enabled
3,191,224 UART: [rt] RT listening for mailbox commands...
3,191,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,078 UART: [rt]cmd =0x46504c54, len=4
3,223,162 >>> mbox cmd response data (8 bytes)
3,223,345 UART: [rt] FIPS self test
3,223,673 UART: [kat] ++
3,223,825 UART: [kat] sha1
3,228,312 UART: Fatal Error: 0x90060002
3,229,851 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,856 >>> mbox cmd response: failed
3,229,856 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,861 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,713 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,984 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,549 UART: [state] LifecycleState = Unprovisioned
86,204 UART: [state] DebugLocked = No
86,910 UART: [state] WD Timer not started. Device not locked for debugging
88,251 UART: [kat] SHA2-256
893,901 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,026 UART: [kat] ++
898,178 UART: [kat] sha1
902,410 UART: [kat] SHA2-256
904,350 UART: [kat] SHA2-384
907,139 UART: [kat] SHA2-512-ACC
909,040 UART: [kat] ECC-384
919,153 UART: [kat] HMAC-384Kdf
923,917 UART: [kat] LMS
1,172,245 UART: [kat] --
1,172,946 UART: [cold-reset] ++
1,173,482 UART: [fht] FHT @ 0x50003400
1,176,065 UART: [idev] ++
1,176,233 UART: [idev] CDI.KEYID = 6
1,176,593 UART: [idev] SUBJECT.KEYID = 7
1,177,017 UART: [idev] UDS.KEYID = 0
1,177,362 ready_for_fw is high
1,177,362 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,141 UART: [idev] Erasing UDS.KEYID = 0
1,202,724 UART: [idev] Sha1 KeyId Algorithm
1,211,018 UART: [idev] --
1,211,946 UART: [ldev] ++
1,212,114 UART: [ldev] CDI.KEYID = 6
1,212,477 UART: [ldev] SUBJECT.KEYID = 5
1,212,903 UART: [ldev] AUTHORITY.KEYID = 7
1,213,366 UART: [ldev] FE.KEYID = 1
1,218,262 UART: [ldev] Erasing FE.KEYID = 1
1,245,277 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,900 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,616 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,507 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,276,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,208 UART: [ldev] --
1,284,697 UART: [fwproc] Wait for Commands...
1,285,491 UART: [fwproc] Recv command 0x46574c44
1,286,219 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,934 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,409 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,579 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,134 >>> mbox cmd response: success
2,842,214 UART: [afmc] ++
2,842,382 UART: [afmc] CDI.KEYID = 6
2,842,744 UART: [afmc] SUBJECT.KEYID = 7
2,843,169 UART: [afmc] AUTHORITY.KEYID = 5
2,878,940 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,895,433 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,896,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,901,890 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,907,773 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,913,474 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,921,270 UART: [afmc] --
2,922,324 UART: [cold-reset] --
2,922,960 UART: [state] Locking Datavault
2,924,063 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,667 UART: [state] Locking ICCM
2,925,257 UART: [exit] Launching FMC @ 0x40000130
2,930,587 UART:
2,930,603 UART: Running Caliptra FMC ...
2,931,011 UART:
2,931,154 UART: [state] CFI Enabled
2,941,944 UART: [fht] FMC Alias Private Key: 7
3,061,114 UART: [art] Extend RT PCRs Done
3,061,542 UART: [art] Lock RT PCRs Done
3,062,950 UART: [art] Populate DV Done
3,070,889 UART: [fht] FMC Alias Private Key: 7
3,071,879 UART: [art] Derive CDI
3,072,159 UART: [art] Store in slot 0x4
3,157,860 UART: [art] Derive Key Pair
3,158,220 UART: [art] Store priv key in slot 0x5
3,171,252 UART: [art] Derive Key Pair - Done
3,185,959 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,508 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,273 UART: [art] PUB.X = 6383C363FF326340E0C36C4A6AD5A00236E6ACA84CF37084BD4274DBBB9854B496ACCF7442737E3646E583391187EF25
3,209,040 UART: [art] PUB.Y = B27176EB6CE5FDA7C3F5330821012AF4A051DB2A583E3A50DDFE592E99BC5875633C06BB5A78A41CFE558F28B791F52F
3,215,993 UART: [art] SIG.R = 37A28BC1EE5E7245BF645E7F7A607069CF3724F39D2AA7EC51318045374EBC1465ACB4D8176042F8A0463A40605C8A02
3,222,760 UART: [art] SIG.S = 97BDF36F6ABC0595993B42A9C37EB6E9F3A66CE5A0F54F0B9EDE5BE2E8EB64299567A8FD9A51555AA1E97801C02ACC56
3,246,911 UART: Caliptra RT
3,247,254 UART: [state] CFI Enabled
3,366,741 UART: [rt] RT listening for mailbox commands...
3,367,404 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,327 UART: [rt]cmd =0x46504c54, len=4
3,398,629 >>> mbox cmd response data (8 bytes)
3,398,860 UART: [rt] FIPS self test
3,399,188 UART: [kat] ++
3,399,340 UART: [kat] sha1
3,403,511 UART: Fatal Error: 0x90060002
3,405,050 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,055 >>> mbox cmd response: failed
3,405,055 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,060 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,582 UART: [state] WD Timer not started. Device not locked for debugging
87,709 UART: [kat] SHA2-256
893,359 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,484 UART: [kat] ++
897,636 UART: [kat] sha1
901,908 UART: [kat] SHA2-256
903,848 UART: [kat] SHA2-384
906,511 UART: [kat] SHA2-512-ACC
908,412 UART: [kat] ECC-384
917,961 UART: [kat] HMAC-384Kdf
922,481 UART: [kat] LMS
1,170,809 UART: [kat] --
1,171,698 UART: [cold-reset] ++
1,172,204 UART: [fht] FHT @ 0x50003400
1,174,867 UART: [idev] ++
1,175,035 UART: [idev] CDI.KEYID = 6
1,175,395 UART: [idev] SUBJECT.KEYID = 7
1,175,819 UART: [idev] UDS.KEYID = 0
1,176,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,077 UART: [idev] Erasing UDS.KEYID = 0
1,200,406 UART: [idev] Sha1 KeyId Algorithm
1,209,104 UART: [idev] --
1,210,102 UART: [ldev] ++
1,210,270 UART: [ldev] CDI.KEYID = 6
1,210,633 UART: [ldev] SUBJECT.KEYID = 5
1,211,059 UART: [ldev] AUTHORITY.KEYID = 7
1,211,522 UART: [ldev] FE.KEYID = 1
1,216,628 UART: [ldev] Erasing FE.KEYID = 1
1,242,961 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,646 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,362 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,253 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,965 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,886 UART: [ldev] --
1,282,305 UART: [fwproc] Wait for Commands...
1,282,947 UART: [fwproc] Recv command 0x46574c44
1,283,675 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,262 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,143 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,313 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,782 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,376 ready_for_fw is high
1,060,376 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,139 >>> mbox cmd response: success
2,753,190 UART:
2,753,206 UART: Running Caliptra FMC ...
2,753,614 UART:
2,753,757 UART: [state] CFI Enabled
2,764,503 UART: [fht] FMC Alias Private Key: 7
2,883,411 UART: [art] Extend RT PCRs Done
2,883,839 UART: [art] Lock RT PCRs Done
2,885,743 UART: [art] Populate DV Done
2,894,066 UART: [fht] FMC Alias Private Key: 7
2,895,222 UART: [art] Derive CDI
2,895,502 UART: [art] Store in slot 0x4
2,980,861 UART: [art] Derive Key Pair
2,981,221 UART: [art] Store priv key in slot 0x5
2,994,577 UART: [art] Derive Key Pair - Done
3,009,332 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,591 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,356 UART: [art] PUB.X = B78D900845A332109DA8D2B2D7295EEA759D25B4A36AE607B3E81FAF3C6BFCCA050EA6DFAB17CA45D111EC312712B394
3,032,130 UART: [art] PUB.Y = 0BA74E2745A98B8B36C15A1E670E309FA65398207D87341790D1A23442AB2A4AF495F1FDAFFC1C9DFE9194AF574D7F2C
3,039,084 UART: [art] SIG.R = FF3E55F28A2AC05F0403416237A20357D4494BE4C73F0600EB39F534DA81265C702886FC887BCA10D96D11BE857035FF
3,045,820 UART: [art] SIG.S = 7F785241582750683C1506A32F5A8FF293AB8699C4DCB31CC142123DD2D3704064F838823571BCBEAB5DFDC3187C9251
3,069,645 UART: Caliptra RT
3,069,988 UART: [state] CFI Enabled
3,188,897 UART: [rt] RT listening for mailbox commands...
3,189,560 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,525 UART: [rt]cmd =0x46504c54, len=4
3,220,795 >>> mbox cmd response data (8 bytes)
3,221,114 UART: [rt] FIPS self test
3,221,442 UART: [kat] ++
3,221,594 UART: [kat] sha1
3,226,045 UART: Fatal Error: 0x90060002
3,227,584 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,589 >>> mbox cmd response: failed
3,227,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,594 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,054 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,679 >>> mbox cmd response: success
test self_tests::kat_sha1_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.08s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,041 writing to cptra_bootfsm_go
2,515,166 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,664,962 >>> mbox cmd response: failed
2,665,542 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,814,422 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,445,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,278,856 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,975 writing to cptra_bootfsm_go
2,510,940 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,660,581 >>> mbox cmd response: failed
2,661,161 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,047 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
3,431,936 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,283,279 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,510 writing to cptra_bootfsm_go
2,872,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,022,098 >>> mbox cmd response: failed
3,022,689 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,171,412 >>> mbox cmd response: failed
Initializing fuses
1,596 writing to cptra_bootfsm_go
20,173,879 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,884,614 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,494 writing to cptra_bootfsm_go
2,860,635 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,010,211 >>> mbox cmd response: failed
3,010,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,159,590 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
20,177,122 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,309 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,948 writing to cptra_bootfsm_go
2,516,349 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,666,307 >>> mbox cmd response: failed
2,666,878 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,815,625 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,444,588 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,273,222 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,936 writing to cptra_bootfsm_go
2,519,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,669,132 >>> mbox cmd response: failed
2,669,921 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,818,672 >>> mbox cmd response: failed
Initializing fuses
974 writing to cptra_bootfsm_go
3,443,262 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,273,307 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,204 writing to cptra_bootfsm_go
2,871,324 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,021,114 >>> mbox cmd response: failed
3,021,683 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,170,569 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,175,236 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,881,731 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,399 writing to cptra_bootfsm_go
2,881,484 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,031,197 >>> mbox cmd response: failed
3,031,773 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,180,636 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,180,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,900,053 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,040 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,048 >>> mbox cmd response: failed
86,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,054 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,064 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,900 >>> mbox cmd response: failed
85,900 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,906 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,346 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.12s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,253 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,261 >>> mbox cmd response: failed
86,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,892 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,849 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,017 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,025 >>> mbox cmd response: failed
86,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,031 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,504 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,557 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,536 >>> mbox cmd response: failed
85,536 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,542 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,852 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
85,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,896 >>> mbox cmd response: failed
85,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
85,902 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,976 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,231 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,239 >>> mbox cmd response: failed
86,239 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,245 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,332 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,791 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
86,087 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,095 >>> mbox cmd response: failed
86,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
86,101 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,413 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,030 writing to cptra_bootfsm_go
192,238 UART:
192,601 UART: Running Caliptra ROM ...
193,783 UART:
193,935 UART: [state] CFI Enabled
262,687 UART: [state] LifecycleState = Unprovisioned
264,662 UART: [state] DebugLocked = No
266,133 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,229 UART: [kat] SHA2-256
440,910 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,387 UART: [kat] ++
451,923 UART: [kat] sha1
464,395 UART: [kat] SHA2-256
467,100 UART: [kat] SHA2-384
473,316 UART: [kat] SHA2-512-ACC
475,688 UART: [kat] ECC-384
2,761,744 UART: [kat] HMAC-384Kdf
2,777,358 UART: [kat] LMS
3,967,674 UART: [kat] --
3,971,349 UART: [cold-reset] ++
3,972,938 UART: [fht] Storing FHT @ 0x50003400
3,985,017 UART: [idev] ++
3,985,640 UART: [idev] CDI.KEYID = 6
3,986,564 UART: [idev] SUBJECT.KEYID = 7
3,987,825 UART: [idev] UDS.KEYID = 0
3,988,810 ready_for_fw is high
3,989,033 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,139,222 UART: [idev] Erasing UDS.KEYID = 0
7,325,204 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,380 UART: [idev] --
7,351,734 UART: [ldev] ++
7,352,315 UART: [ldev] CDI.KEYID = 6
7,353,363 UART: [ldev] SUBJECT.KEYID = 5
7,354,475 UART: [ldev] AUTHORITY.KEYID = 7
7,355,764 UART: [ldev] FE.KEYID = 1
7,398,983 UART: [ldev] Erasing FE.KEYID = 1
10,731,559 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,024,450 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,038,999 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,053,863 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,068,360 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,088,109 UART: [ldev] --
13,092,464 UART: [fwproc] Waiting for Commands...
13,094,566 UART: [fwproc] Received command 0x46574c44
13,096,758 UART: [fwproc] Received Image of size 119428 bytes
17,219,015 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,298,509 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,371,663 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,702,859 >>> mbox cmd response: success
17,707,728 UART: [afmc] ++
17,708,374 UART: [afmc] CDI.KEYID = 6
17,709,295 UART: [afmc] SUBJECT.KEYID = 7
17,710,513 UART: [afmc] AUTHORITY.KEYID = 5
21,066,143 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,369,600 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,371,846 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,386,322 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,401,042 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,415,446 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,436,962 UART: [afmc] --
23,441,646 UART: [cold-reset] --
23,445,886 UART: [state] Locking Datavault
23,451,625 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,328 UART: [state] Locking ICCM
23,455,403 UART: [exit] Launching FMC @ 0x40000130
23,463,805 UART:
23,464,045 UART: Running Caliptra FMC ...
23,465,150 UART:
23,465,307 UART: [state] CFI Enabled
23,527,093 UART: [fht] FMC Alias Private Key: 7
25,867,008 UART: [art] Extend RT PCRs Done
25,868,231 UART: [art] Lock RT PCRs Done
25,869,674 UART: [art] Populate DV Done
25,875,035 UART: [fht] FMC Alias Private Key: 7
25,876,520 UART: [art] Derive CDI
25,877,279 UART: [art] Store in slot 0x4
25,935,455 UART: [art] Derive Key Pair
25,936,497 UART: [art] Store priv key in slot 0x5
29,229,637 UART: [art] Derive Key Pair - Done
29,242,700 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,531,535 UART: [art] Erasing AUTHORITY.KEYID = 7
31,533,052 UART: [art] PUB.X = E6E13D75FC1DB98F3E85820E3592821C94DEB1503F5D26B0B70E841D918C68F0DF3D7D8A1E9F4D25F2BD8A4ED19E5737
31,540,326 UART: [art] PUB.Y = F758C708D8B0624BC317888B0B167C36AFBC97C0994DB2E081817B0A65622AE22014F4B3107DFA48065D8A818F32CBA9
31,547,556 UART: [art] SIG.R = E7DBA1E28CE86CA895EAC9A31778D77DD820C688C07277EBBB48D05D00F685774EE23B48D22C7E6F74C36AE58A91B0CE
31,554,975 UART: [art] SIG.S = 1167DE6184A85886402D1FB2AB83B648963A006F9A2F115ACC78CB8260C9DCDEB5C88C775ABE9F3F7EEECB2B91F2642C
32,860,453 UART: Caliptra RT
32,861,156 UART: [state] CFI Enabled
33,039,931 UART: [rt] RT listening for mailbox commands...
33,041,811 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,071,788 UART: [rt]cmd =0x46504c54, len=4
33,073,255 >>> mbox cmd response data (8 bytes)
33,074,258 UART: [rt] FIPS self test
33,075,210 UART: [kat] ++
33,075,664 UART: [kat] sha1
33,080,073 UART: [kat] SHA2-256
33,080,819 UART: Fatal Error: 0x90010001
33,116,087 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,266,079 >>> mbox cmd response: failed
33,266,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,416,516 >>> mbox cmd response: failed
Initializing fuses
1,130 writing to cptra_bootfsm_go
190,252 UART:
190,543 UART: Running Caliptra ROM ...
191,566 UART:
191,707 UART: [state] CFI Enabled
250,518 UART: [state] LifecycleState = Unprovisioned
252,433 UART: [state] DebugLocked = No
254,192 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
259,617 UART: [kat] SHA2-256
429,317 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
439,802 UART: [kat] ++
440,416 UART: [kat] sha1
450,763 UART: [kat] SHA2-256
453,444 UART: [kat] SHA2-384
459,588 UART: [kat] SHA2-512-ACC
461,928 UART: [kat] ECC-384
2,752,263 UART: [kat] HMAC-384Kdf
2,764,009 UART: [kat] LMS
3,954,292 UART: [kat] --
3,959,829 UART: [cold-reset] ++
3,961,169 UART: [fht] Storing FHT @ 0x50003400
3,972,022 UART: [idev] ++
3,972,587 UART: [idev] CDI.KEYID = 6
3,973,525 UART: [idev] SUBJECT.KEYID = 7
3,974,798 UART: [idev] UDS.KEYID = 0
3,976,289 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,126,385 UART: [idev] Erasing UDS.KEYID = 0
7,310,088 UART: [idev] Using Sha1 for KeyId Algorithm
7,332,875 UART: [idev] --
7,335,791 UART: [ldev] ++
7,336,361 UART: [ldev] CDI.KEYID = 6
7,337,323 UART: [ldev] SUBJECT.KEYID = 5
7,338,539 UART: [ldev] AUTHORITY.KEYID = 7
7,339,833 UART: [ldev] FE.KEYID = 1
7,386,180 UART: [ldev] Erasing FE.KEYID = 1
10,716,076 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,010,534 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,025,073 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,039,934 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,054,482 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,074,566 UART: [ldev] --
13,079,570 UART: [fwproc] Waiting for Commands...
13,082,112 UART: [fwproc] Received command 0x46574c44
13,084,322 UART: [fwproc] Received Image of size 119428 bytes
17,196,384 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,267,012 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,340,151 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,671,605 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
3,797,273 ready_for_fw is high
3,797,916 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,991,161 >>> mbox cmd response: success
23,689,005 UART:
23,689,432 UART: Running Caliptra FMC ...
23,690,545 UART:
23,690,712 UART: [state] CFI Enabled
23,759,360 UART: [fht] FMC Alias Private Key: 7
26,099,761 UART: [art] Extend RT PCRs Done
26,100,996 UART: [art] Lock RT PCRs Done
26,102,789 UART: [art] Populate DV Done
26,108,479 UART: [fht] FMC Alias Private Key: 7
26,110,136 UART: [art] Derive CDI
26,110,874 UART: [art] Store in slot 0x4
26,166,808 UART: [art] Derive Key Pair
26,167,875 UART: [art] Store priv key in slot 0x5
29,460,764 UART: [art] Derive Key Pair - Done
29,473,991 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,763,041 UART: [art] Erasing AUTHORITY.KEYID = 7
31,764,560 UART: [art] PUB.X = FC2C7CB84F2689FACC66F188B1FD56CAE43B735F603DF389FEDABB9E2FDA464CE5310813E069267F2B4BE5F20FE607E4
31,771,894 UART: [art] PUB.Y = 40ACC68BFEFD49A3A73EA5B74F3CBDF7AAF7C46360FEC6B11DC943E8BEEF0C330A8813B8FC97DD0256DA68567C5A935C
31,779,121 UART: [art] SIG.R = FAF240E68BCB6D6BE2682F6F173E4DE7D126B8B9DEAB63D64CD939E2C39E139D08FD0D3616C19F36C4FFE099CDF228A0
31,786,556 UART: [art] SIG.S = F004C281A52EC7AC888AC2B4D0ABC227A4D5B49563781ADE83872A3745546E2541F4BB8BEAE7504E80496351D366DBD8
33,091,382 UART: Caliptra RT
33,092,105 UART: [state] CFI Enabled
33,282,141 UART: [rt] RT listening for mailbox commands...
33,283,997 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,313,896 UART: [rt]cmd =0x46504c54, len=4
33,315,348 >>> mbox cmd response data (8 bytes)
33,316,424 UART: [rt] FIPS self test
33,317,389 UART: [kat] ++
33,317,845 UART: [kat] sha1
33,322,112 UART: [kat] SHA2-256
33,322,978 UART: Fatal Error: 0x90010001
33,358,192 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,508,210 >>> mbox cmd response: failed
33,508,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,658,796 >>> mbox cmd response: failed
Initializing fuses
937 writing to cptra_bootfsm_go
3,791,140 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,979,962 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,578 writing to cptra_bootfsm_go
192,732 UART:
193,218 UART: Running Caliptra ROM ...
194,352 UART:
603,769 UART: [state] CFI Enabled
619,224 UART: [state] LifecycleState = Unprovisioned
621,180 UART: [state] DebugLocked = No
624,140 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
629,299 UART: [kat] SHA2-256
799,021 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,543 UART: [kat] ++
810,152 UART: [kat] sha1
820,991 UART: [kat] SHA2-256
823,727 UART: [kat] SHA2-384
830,176 UART: [kat] SHA2-512-ACC
832,453 UART: [kat] ECC-384
3,114,441 UART: [kat] HMAC-384Kdf
3,127,973 UART: [kat] LMS
4,318,108 UART: [kat] --
4,322,418 UART: [cold-reset] ++
4,323,937 UART: [fht] Storing FHT @ 0x50003400
4,335,212 UART: [idev] ++
4,335,792 UART: [idev] CDI.KEYID = 6
4,336,832 UART: [idev] SUBJECT.KEYID = 7
4,338,017 UART: [idev] UDS.KEYID = 0
4,339,060 ready_for_fw is high
4,339,324 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,393 UART: [idev] Erasing UDS.KEYID = 0
7,621,763 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,527 UART: [idev] --
7,646,639 UART: [ldev] ++
7,647,219 UART: [ldev] CDI.KEYID = 6
7,648,191 UART: [ldev] SUBJECT.KEYID = 5
7,649,414 UART: [ldev] AUTHORITY.KEYID = 7
7,650,658 UART: [ldev] FE.KEYID = 1
7,662,175 UART: [ldev] Erasing FE.KEYID = 1
10,951,385 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,562 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,143 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,998 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,507 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,340 UART: [ldev] --
13,310,964 UART: [fwproc] Waiting for Commands...
13,313,649 UART: [fwproc] Received command 0x46574c44
13,315,871 UART: [fwproc] Received Image of size 119428 bytes
17,430,688 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,932 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,580,140 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,911,754 >>> mbox cmd response: success
17,916,532 UART: [afmc] ++
17,917,141 UART: [afmc] CDI.KEYID = 6
17,918,059 UART: [afmc] SUBJECT.KEYID = 7
17,919,344 UART: [afmc] AUTHORITY.KEYID = 5
21,230,086 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,521,415 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,523,669 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,538,122 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,552,847 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,567,266 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,589,905 UART: [afmc] --
23,594,335 UART: [cold-reset] --
23,597,344 UART: [state] Locking Datavault
23,602,002 UART: [state] Locking PCR0, PCR1 and PCR31
23,603,771 UART: [state] Locking ICCM
23,606,335 UART: [exit] Launching FMC @ 0x40000130
23,614,684 UART:
23,614,933 UART: Running Caliptra FMC ...
23,616,047 UART:
23,616,216 UART: [state] CFI Enabled
23,624,272 UART: [fht] FMC Alias Private Key: 7
25,963,799 UART: [art] Extend RT PCRs Done
25,965,035 UART: [art] Lock RT PCRs Done
25,966,618 UART: [art] Populate DV Done
25,971,660 UART: [fht] FMC Alias Private Key: 7
25,973,268 UART: [art] Derive CDI
25,974,091 UART: [art] Store in slot 0x4
26,017,040 UART: [art] Derive Key Pair
26,018,054 UART: [art] Store priv key in slot 0x5
29,259,903 UART: [art] Derive Key Pair - Done
29,272,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,512 UART: [art] Erasing AUTHORITY.KEYID = 7
31,555,031 UART: [art] PUB.X = C4F9487C231F6AB351D3DD19F16BF5F97C7A61929D065D5676374490721D7F433A3B79AF4F7C69DE1BFDF61DFA495745
31,562,294 UART: [art] PUB.Y = AC7F53E2586AFD437CC396176E004E776CEEE89BAA6A58EEC9AE075559D94EE13E621F6EA56B172F20DDDAB6F40168F8
31,569,550 UART: [art] SIG.R = 724FE17C455378877186838039BD09A317EF40D037681911D6DDE08AB2F3F8DAD757A6C5C58F91E863A6B70F798FFAA5
31,576,958 UART: [art] SIG.S = EBD0A0E9508A18E3C10F93CABD14A6FDBDF9E6A1650204DDCE62BEFB5FAD4F8813D7B637EFB763E33F8B7930A453C6A7
32,882,347 UART: Caliptra RT
32,883,055 UART: [state] CFI Enabled
33,015,985 UART: [rt] RT listening for mailbox commands...
33,017,846 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,047,585 UART: [rt]cmd =0x46504c54, len=4
33,049,232 >>> mbox cmd response data (8 bytes)
33,050,484 UART: [rt] FIPS self test
33,051,461 UART: [kat] ++
33,051,920 UART: [kat] sha1
33,056,380 UART: [kat] SHA2-256
33,057,191 UART: Fatal Error: 0x90010001
33,092,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,242,574 >>> mbox cmd response: failed
33,243,189 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,393,468 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
190,124 UART:
190,422 UART: Running Caliptra ROM ...
191,480 UART:
7,135,360 UART: [state] CFI Enabled
7,147,995 UART: [state] LifecycleState = Unprovisioned
7,149,909 UART: [state] DebugLocked = No
7,152,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,157,409 UART: [kat] SHA2-256
7,327,154 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,337,715 UART: [kat] ++
7,338,214 UART: [kat] sha1
7,349,161 UART: [kat] SHA2-256
7,351,870 UART: [kat] SHA2-384
7,357,979 UART: [kat] SHA2-512-ACC
7,360,378 UART: [kat] ECC-384
9,642,969 UART: [kat] HMAC-384Kdf
9,655,663 UART: [kat] LMS
10,845,814 UART: [kat] --
10,851,665 UART: [cold-reset] ++
10,854,311 UART: [fht] Storing FHT @ 0x50003400
10,866,339 UART: [idev] ++
10,866,910 UART: [idev] CDI.KEYID = 6
10,867,955 UART: [idev] SUBJECT.KEYID = 7
10,869,069 UART: [idev] UDS.KEYID = 0
10,870,709 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,020,641 UART: [idev] Erasing UDS.KEYID = 0
14,154,623 UART: [idev] Using Sha1 for KeyId Algorithm
14,176,736 UART: [idev] --
14,181,872 UART: [ldev] ++
14,182,442 UART: [ldev] CDI.KEYID = 6
14,183,380 UART: [ldev] SUBJECT.KEYID = 5
14,184,652 UART: [ldev] AUTHORITY.KEYID = 7
14,185,889 UART: [ldev] FE.KEYID = 1
14,197,164 UART: [ldev] Erasing FE.KEYID = 1
17,480,984 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,773,621 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,788,222 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,803,023 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,817,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,835,696 UART: [ldev] --
19,840,426 UART: [fwproc] Waiting for Commands...
19,842,954 UART: [fwproc] Received command 0x46574c44
19,845,151 UART: [fwproc] Received Image of size 119428 bytes
23,960,104 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,034,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,107,539 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,439,433 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,363 writing to cptra_bootfsm_go
4,137,983 ready_for_fw is high
4,138,459 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,180,438 >>> mbox cmd response: success
23,820,200 UART:
23,820,635 UART: Running Caliptra FMC ...
23,821,756 UART:
23,821,920 UART: [state] CFI Enabled
23,829,636 UART: [fht] FMC Alias Private Key: 7
26,169,313 UART: [art] Extend RT PCRs Done
26,170,554 UART: [art] Lock RT PCRs Done
26,172,027 UART: [art] Populate DV Done
26,177,320 UART: [fht] FMC Alias Private Key: 7
26,178,880 UART: [art] Derive CDI
26,179,706 UART: [art] Store in slot 0x4
26,222,687 UART: [art] Derive Key Pair
26,223,702 UART: [art] Store priv key in slot 0x5
29,465,770 UART: [art] Derive Key Pair - Done
29,479,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,759,417 UART: [art] Erasing AUTHORITY.KEYID = 7
31,761,087 UART: [art] PUB.X = 1467B41390A9CD66E19A0D07918AC7ACB20CCACB4CC0137663E3050D946C5CFC3871270C88606320114B996B5C580227
31,768,135 UART: [art] PUB.Y = A9FBE1EC14F4673445C8B45F5027D04A9CAAF0FAA1348414C96F7A3C3DAE1F233C12C72B5E0E76194A7E7C9237091B03
31,775,419 UART: [art] SIG.R = DBC4A3B9E629520CB4125EF9A05CCB25A601108E5EA0B3B6419AD132E83794EFE39BE4A7B2FD24F06FFCD8012A5EC701
31,782,819 UART: [art] SIG.S = 6163D74CB5E778996E0F5BE4C23B0D35134461A77F79DDBD2A7F343ACE2CB82A89C2303AF02F51B5C9548CA27627DADD
33,087,977 UART: Caliptra RT
33,088,705 UART: [state] CFI Enabled
33,222,326 UART: [rt] RT listening for mailbox commands...
33,224,201 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,253,973 UART: [rt]cmd =0x46504c54, len=4
33,255,664 >>> mbox cmd response data (8 bytes)
33,256,615 UART: [rt] FIPS self test
33,257,562 UART: [kat] ++
33,258,019 UART: [kat] sha1
33,262,266 UART: [kat] SHA2-256
33,263,013 UART: Fatal Error: 0x90010001
33,298,411 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,448,380 >>> mbox cmd response: failed
33,449,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,598,781 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
10,460,842 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,498,690 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,210 writing to cptra_bootfsm_go
192,368 UART:
192,751 UART: Running Caliptra ROM ...
193,958 UART:
194,136 UART: [state] CFI Enabled
267,687 UART: [state] LifecycleState = Unprovisioned
269,617 UART: [state] DebugLocked = No
271,493 UART: [state] WD Timer not started. Device not locked for debugging
275,797 UART: [kat] SHA2-256
455,485 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,221 UART: [kat] ++
466,675 UART: [kat] sha1
478,052 UART: [kat] SHA2-256
480,788 UART: [kat] SHA2-384
487,707 UART: [kat] SHA2-512-ACC
490,087 UART: [kat] ECC-384
2,950,886 UART: [kat] HMAC-384Kdf
2,974,431 UART: [kat] LMS
3,450,903 UART: [kat] --
3,453,789 UART: [cold-reset] ++
3,455,680 UART: [fht] FHT @ 0x50003400
3,465,676 UART: [idev] ++
3,466,320 UART: [idev] CDI.KEYID = 6
3,467,209 UART: [idev] SUBJECT.KEYID = 7
3,468,457 UART: [idev] UDS.KEYID = 0
3,469,439 ready_for_fw is high
3,469,662 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,850 UART: [idev] Erasing UDS.KEYID = 0
5,989,192 UART: [idev] Sha1 KeyId Algorithm
6,012,657 UART: [idev] --
6,016,982 UART: [ldev] ++
6,017,559 UART: [ldev] CDI.KEYID = 6
6,018,547 UART: [ldev] SUBJECT.KEYID = 5
6,019,716 UART: [ldev] AUTHORITY.KEYID = 7
6,020,956 UART: [ldev] FE.KEYID = 1
6,061,976 UART: [ldev] Erasing FE.KEYID = 1
8,571,181 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,303,553 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,419 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,991 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,379 UART: [ldev] --
10,378,654 UART: [fwproc] Wait for Commands...
10,380,700 UART: [fwproc] Recv command 0x46574c44
10,382,693 UART: [fwproc] Recv'd Img size: 119428 bytes
13,876,910 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,957,326 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,030,306 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,362,381 >>> mbox cmd response: success
14,366,043 UART: [afmc] ++
14,366,638 UART: [afmc] CDI.KEYID = 6
14,367,618 UART: [afmc] SUBJECT.KEYID = 7
14,368,803 UART: [afmc] AUTHORITY.KEYID = 5
16,900,754 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,626,979 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,629,165 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,644,961 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,661,018 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,676,624 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,701,066 UART: [afmc] --
18,704,563 UART: [cold-reset] --
18,709,937 UART: [state] Locking Datavault
18,714,004 UART: [state] Locking PCR0, PCR1 and PCR31
18,715,767 UART: [state] Locking ICCM
18,717,327 UART: [exit] Launching FMC @ 0x40000130
18,725,729 UART:
18,725,968 UART: Running Caliptra FMC ...
18,727,070 UART:
18,727,260 UART: [state] CFI Enabled
18,783,293 UART: [fht] FMC Alias Private Key: 7
20,571,108 UART: [art] Extend RT PCRs Done
20,572,338 UART: [art] Lock RT PCRs Done
20,574,163 UART: [art] Populate DV Done
20,579,741 UART: [fht] FMC Alias Private Key: 7
20,581,234 UART: [art] Derive CDI
20,581,979 UART: [art] Store in slot 0x4
20,636,964 UART: [art] Derive Key Pair
20,638,006 UART: [art] Store priv key in slot 0x5
23,100,505 UART: [art] Derive Key Pair - Done
23,113,558 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,826,345 UART: [art] Erasing AUTHORITY.KEYID = 7
24,827,851 UART: [art] PUB.X = D0353C7859D69931A45B7842130886AEAE238B1C146F06DC1EE9AD1A4EAE0466B35060B6969887AFD301C211484E3FC1
24,835,126 UART: [art] PUB.Y = 79D8966081A708C4BC30C07844D1003CD9EEF3F099BBB60C988ED4B424103E56BD30FDB6528A14AB329901E7A872A12E
24,842,321 UART: [art] SIG.R = 398D89DB239446C17437155BF83281530750E0D44BC3933D796055F6E3637CE55718D08D51024DCA5E69F8FA5F84E979
24,849,691 UART: [art] SIG.S = DD7C1B6DEF57B6F2B01CEDA952F67DB200182FD0F77E28E225A656E75E32921604936902E55E39001D44E2F093BF7C0B
25,828,501 UART: Caliptra RT
25,829,205 UART: [state] CFI Enabled
26,009,922 UART: [rt] RT listening for mailbox commands...
26,011,797 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,041,725 UART: [rt]cmd =0x46504c54, len=4
26,043,293 >>> mbox cmd response data (8 bytes)
26,044,326 UART: [rt] FIPS self test
26,045,288 UART: [kat] ++
26,045,747 UART: [kat] sha1
26,050,099 UART: [kat] SHA2-256
26,050,920 UART: Fatal Error: 0x90010001
26,086,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,236,164 >>> mbox cmd response: failed
26,236,831 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,386,723 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
190,098 UART:
190,389 UART: Running Caliptra ROM ...
191,502 UART:
191,649 UART: [state] CFI Enabled
250,509 UART: [state] LifecycleState = Unprovisioned
252,428 UART: [state] DebugLocked = No
254,512 UART: [state] WD Timer not started. Device not locked for debugging
257,922 UART: [kat] SHA2-256
437,561 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
448,324 UART: [kat] ++
448,859 UART: [kat] sha1
460,015 UART: [kat] SHA2-256
462,704 UART: [kat] SHA2-384
468,038 UART: [kat] SHA2-512-ACC
470,403 UART: [kat] ECC-384
2,912,990 UART: [kat] HMAC-384Kdf
2,936,129 UART: [kat] LMS
3,412,619 UART: [kat] --
3,416,337 UART: [cold-reset] ++
3,417,569 UART: [fht] FHT @ 0x50003400
3,428,955 UART: [idev] ++
3,429,576 UART: [idev] CDI.KEYID = 6
3,430,462 UART: [idev] SUBJECT.KEYID = 7
3,431,736 UART: [idev] UDS.KEYID = 0
3,433,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,583,554 UART: [idev] Erasing UDS.KEYID = 0
5,949,836 UART: [idev] Sha1 KeyId Algorithm
5,974,421 UART: [idev] --
5,980,660 UART: [ldev] ++
5,981,243 UART: [ldev] CDI.KEYID = 6
5,982,181 UART: [ldev] SUBJECT.KEYID = 5
5,983,348 UART: [ldev] AUTHORITY.KEYID = 7
5,984,585 UART: [ldev] FE.KEYID = 1
6,015,597 UART: [ldev] Erasing FE.KEYID = 1
8,523,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,256,208 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,272,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,287,967 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,303,544 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,325,263 UART: [ldev] --
10,331,344 UART: [fwproc] Wait for Commands...
10,333,285 UART: [fwproc] Recv command 0x46574c44
10,335,281 UART: [fwproc] Recv'd Img size: 119428 bytes
13,834,119 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,913,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,986,037 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,316,842 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,156 writing to cptra_bootfsm_go
3,460,688 ready_for_fw is high
3,461,123 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,252,437 >>> mbox cmd response: success
18,534,994 UART:
18,535,397 UART: Running Caliptra FMC ...
18,536,738 UART:
18,536,910 UART: [state] CFI Enabled
18,598,061 UART: [fht] FMC Alias Private Key: 7
20,364,430 UART: [art] Extend RT PCRs Done
20,365,665 UART: [art] Lock RT PCRs Done
20,367,582 UART: [art] Populate DV Done
20,372,803 UART: [fht] FMC Alias Private Key: 7
20,374,515 UART: [art] Derive CDI
20,375,359 UART: [art] Store in slot 0x4
20,430,100 UART: [art] Derive Key Pair
20,431,126 UART: [art] Store priv key in slot 0x5
22,893,438 UART: [art] Derive Key Pair - Done
22,906,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,619,297 UART: [art] Erasing AUTHORITY.KEYID = 7
24,620,806 UART: [art] PUB.X = 72C02FA786090B7295D7B4307455EB5474725D5E10F94A64E597DABA3BC745D167BEC7A977576231DF2D6DA4C1189A35
24,628,093 UART: [art] PUB.Y = 5A549A71B4A0111B386B49FDE3C59BF3D4FE4A6A8FDF3D574DE10522BE29F1C4CC37FB978743A04D5E7EFA9AFAA14534
24,635,374 UART: [art] SIG.R = 443DEB7405ACCB0D582857BC2D066093BD0D7F67B43F557AC85FD2FD3454B8F2A82D9B317A561FFF940A32EA1F83DA7D
24,642,755 UART: [art] SIG.S = 7F961C43D3449FD6C993A259A7395DB08BF74BD85F77FADAC0C960DA3F2F498028DA275E5717AB1EA6CB1F2B00F19C38
25,621,579 UART: Caliptra RT
25,622,296 UART: [state] CFI Enabled
25,802,328 UART: [rt] RT listening for mailbox commands...
25,804,190 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,834,046 UART: [rt]cmd =0x46504c54, len=4
25,835,448 >>> mbox cmd response data (8 bytes)
25,836,526 UART: [rt] FIPS self test
25,837,487 UART: [kat] ++
25,837,946 UART: [kat] sha1
25,842,318 UART: [kat] SHA2-256
25,843,182 UART: Fatal Error: 0x90010001
25,878,398 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,028,371 >>> mbox cmd response: failed
26,029,016 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,178,954 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
3,423,850 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,210,840 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,361 writing to cptra_bootfsm_go
192,623 UART:
193,031 UART: Running Caliptra ROM ...
194,204 UART:
603,712 UART: [state] CFI Enabled
621,286 UART: [state] LifecycleState = Unprovisioned
623,171 UART: [state] DebugLocked = No
624,569 UART: [state] WD Timer not started. Device not locked for debugging
628,283 UART: [kat] SHA2-256
808,000 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,755 UART: [kat] ++
819,242 UART: [kat] sha1
831,541 UART: [kat] SHA2-256
834,200 UART: [kat] SHA2-384
839,710 UART: [kat] SHA2-512-ACC
842,087 UART: [kat] ECC-384
3,281,960 UART: [kat] HMAC-384Kdf
3,293,195 UART: [kat] LMS
3,769,704 UART: [kat] --
3,776,366 UART: [cold-reset] ++
3,778,525 UART: [fht] FHT @ 0x50003400
3,789,512 UART: [idev] ++
3,790,083 UART: [idev] CDI.KEYID = 6
3,790,980 UART: [idev] SUBJECT.KEYID = 7
3,792,237 UART: [idev] UDS.KEYID = 0
3,793,248 ready_for_fw is high
3,793,502 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,943,555 UART: [idev] Erasing UDS.KEYID = 0
6,268,574 UART: [idev] Sha1 KeyId Algorithm
6,293,548 UART: [idev] --
6,297,658 UART: [ldev] ++
6,298,233 UART: [ldev] CDI.KEYID = 6
6,299,146 UART: [ldev] SUBJECT.KEYID = 5
6,300,368 UART: [ldev] AUTHORITY.KEYID = 7
6,301,609 UART: [ldev] FE.KEYID = 1
6,313,074 UART: [ldev] Erasing FE.KEYID = 1
8,794,384 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,850 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,696 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,107 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,259 UART: [ldev] --
10,586,019 UART: [fwproc] Wait for Commands...
10,588,351 UART: [fwproc] Recv command 0x46574c44
10,590,345 UART: [fwproc] Recv'd Img size: 119428 bytes
14,085,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,163,125 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,236,142 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,566,967 >>> mbox cmd response: success
14,571,344 UART: [afmc] ++
14,571,948 UART: [afmc] CDI.KEYID = 6
14,572,867 UART: [afmc] SUBJECT.KEYID = 7
14,574,091 UART: [afmc] AUTHORITY.KEYID = 5
17,077,571 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,799,029 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,224 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,817,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,833,114 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,717 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,496 UART: [afmc] --
18,879,127 UART: [cold-reset] --
18,883,262 UART: [state] Locking Datavault
18,889,097 UART: [state] Locking PCR0, PCR1 and PCR31
18,890,881 UART: [state] Locking ICCM
18,893,015 UART: [exit] Launching FMC @ 0x40000130
18,901,469 UART:
18,901,707 UART: Running Caliptra FMC ...
18,902,736 UART:
18,902,886 UART: [state] CFI Enabled
18,911,425 UART: [fht] FMC Alias Private Key: 7
20,676,624 UART: [art] Extend RT PCRs Done
20,677,838 UART: [art] Lock RT PCRs Done
20,679,906 UART: [art] Populate DV Done
20,685,322 UART: [fht] FMC Alias Private Key: 7
20,686,936 UART: [art] Derive CDI
20,687,754 UART: [art] Store in slot 0x4
20,730,305 UART: [art] Derive Key Pair
20,731,373 UART: [art] Store priv key in slot 0x5
23,158,055 UART: [art] Derive Key Pair - Done
23,171,273 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,436 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,936 UART: [art] PUB.X = 5101C57995384E2CF62702B4B2B7B6AADA51FBA81F87AD91ED1B0A9FB07F6A97C1B598DCAFBA07FCA0A1172B38600705
24,886,310 UART: [art] PUB.Y = 564BDD1B1F1211647FFA31E2262A5EFCDDA44916A21F31CE5877B270B016F2895DCF2ADE4B47D8BB24DA4B5A6EA3C2E8
24,893,554 UART: [art] SIG.R = 4E057B3CF95ACCBFF51EB112207FBD4309406363369F7359485EB4812C40B1D99D9B1BE188E939F23AA09283EF3B6D8B
24,900,934 UART: [art] SIG.S = 1CB9014BE511079F3556E6436042110D45DA4F7ACF83A51351DFA3C35BC0AF545B3025050C1441249D561BE8BE5C9558
25,879,400 UART: Caliptra RT
25,880,095 UART: [state] CFI Enabled
26,012,618 UART: [rt] RT listening for mailbox commands...
26,014,502 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,044,195 UART: [rt]cmd =0x46504c54, len=4
26,045,766 >>> mbox cmd response data (8 bytes)
26,046,946 UART: [rt] FIPS self test
26,047,897 UART: [kat] ++
26,048,357 UART: [kat] sha1
26,052,794 UART: [kat] SHA2-256
26,053,650 UART: Fatal Error: 0x90010001
26,089,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,238,936 >>> mbox cmd response: failed
26,239,557 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,389,434 >>> mbox cmd response: failed
Initializing fuses
994 writing to cptra_bootfsm_go
190,054 UART:
190,355 UART: Running Caliptra ROM ...
191,470 UART:
14,135,743 UART: [state] CFI Enabled
14,149,867 UART: [state] LifecycleState = Unprovisioned
14,151,793 UART: [state] DebugLocked = No
14,153,678 UART: [state] WD Timer not started. Device not locked for debugging
14,157,761 UART: [kat] SHA2-256
14,337,389 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,348,189 UART: [kat] ++
14,348,737 UART: [kat] sha1
14,359,258 UART: [kat] SHA2-256
14,361,957 UART: [kat] SHA2-384
14,367,838 UART: [kat] SHA2-512-ACC
14,370,192 UART: [kat] ECC-384
16,812,258 UART: [kat] HMAC-384Kdf
16,824,266 UART: [kat] LMS
17,300,827 UART: [kat] --
17,305,973 UART: [cold-reset] ++
17,306,936 UART: [fht] FHT @ 0x50003400
17,318,778 UART: [idev] ++
17,319,347 UART: [idev] CDI.KEYID = 6
17,320,290 UART: [idev] SUBJECT.KEYID = 7
17,321,565 UART: [idev] UDS.KEYID = 0
17,323,083 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,473,006 UART: [idev] Erasing UDS.KEYID = 0
19,798,693 UART: [idev] Sha1 KeyId Algorithm
19,823,764 UART: [idev] --
19,829,430 UART: [ldev] ++
19,830,005 UART: [ldev] CDI.KEYID = 6
19,830,894 UART: [ldev] SUBJECT.KEYID = 5
19,832,109 UART: [ldev] AUTHORITY.KEYID = 7
19,833,399 UART: [ldev] FE.KEYID = 1
19,844,727 UART: [ldev] Erasing FE.KEYID = 1
22,324,624 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,046,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,061,926 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,077,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,093,305 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,114,718 UART: [ldev] --
24,119,727 UART: [fwproc] Wait for Commands...
24,121,995 UART: [fwproc] Recv command 0x46574c44
24,124,042 UART: [fwproc] Recv'd Img size: 119428 bytes
27,616,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,700,056 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,773,083 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,104,423 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,779,783 ready_for_fw is high
3,780,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,456,674 >>> mbox cmd response: success
18,710,786 UART:
18,711,200 UART: Running Caliptra FMC ...
18,712,423 UART:
18,712,595 UART: [state] CFI Enabled
18,720,716 UART: [fht] FMC Alias Private Key: 7
20,487,122 UART: [art] Extend RT PCRs Done
20,488,359 UART: [art] Lock RT PCRs Done
20,490,186 UART: [art] Populate DV Done
20,495,461 UART: [fht] FMC Alias Private Key: 7
20,497,225 UART: [art] Derive CDI
20,498,049 UART: [art] Store in slot 0x4
20,540,606 UART: [art] Derive Key Pair
20,541,654 UART: [art] Store priv key in slot 0x5
22,968,586 UART: [art] Derive Key Pair - Done
22,981,798 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,688,018 UART: [art] Erasing AUTHORITY.KEYID = 7
24,689,526 UART: [art] PUB.X = 996EDA82149C72F1EA72B2C3D485681575D96764600C9531D68044FC8A8AF9D69AE39E9C926777134CDCB59475B7CEB2
24,696,807 UART: [art] PUB.Y = 1A9FF1176F477E0FD6757C1685F2035A87FF6069ADAC106C19CACA6B939F5E3C4119194B5729045D36FCA8320D0B9D57
24,704,047 UART: [art] SIG.R = CA74DC89743F3F6DE275E5D86740EDC8C9F6AA0CCBF0E34572C6B8DCB937EF33B314355C6262A3C5C6D5896233F5447C
24,711,451 UART: [art] SIG.S = 850CCA256762FF6B65A762AA5174CCB9E88A8AB985F7C13D0016ADA7BFA866B1EF8FCE5B213F083F05789DB823513010
25,690,114 UART: Caliptra RT
25,690,831 UART: [state] CFI Enabled
25,822,534 UART: [rt] RT listening for mailbox commands...
25,824,392 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,854,031 UART: [rt]cmd =0x46504c54, len=4
25,855,614 >>> mbox cmd response data (8 bytes)
25,856,842 UART: [rt] FIPS self test
25,857,793 UART: [kat] ++
25,858,249 UART: [kat] sha1
25,862,658 UART: [kat] SHA2-256
25,863,401 UART: Fatal Error: 0x90010001
25,898,834 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,048,830 >>> mbox cmd response: failed
26,049,467 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,199,354 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
17,507,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,189,287 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,959 writing to cptra_bootfsm_go
192,130 UART:
192,500 UART: Running Caliptra ROM ...
193,687 UART:
193,846 UART: [state] CFI Enabled
264,095 UART: [state] LifecycleState = Unprovisioned
266,524 UART: [state] DebugLocked = No
267,998 UART: [state] WD Timer not started. Device not locked for debugging
271,915 UART: [kat] SHA2-256
461,763 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,558 UART: [kat] ++
473,042 UART: [kat] sha1
483,788 UART: [kat] SHA2-256
486,800 UART: [kat] SHA2-384
493,598 UART: [kat] SHA2-512-ACC
496,190 UART: [kat] ECC-384
2,948,594 UART: [kat] HMAC-384Kdf
2,972,485 UART: [kat] LMS
3,504,272 UART: [kat] --
3,509,709 UART: [cold-reset] ++
3,511,085 UART: [fht] FHT @ 0x50003400
3,522,359 UART: [idev] ++
3,523,033 UART: [idev] CDI.KEYID = 6
3,523,960 UART: [idev] SUBJECT.KEYID = 7
3,525,217 UART: [idev] UDS.KEYID = 0
3,526,150 ready_for_fw is high
3,526,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,505 UART: [idev] Erasing UDS.KEYID = 0
6,029,747 UART: [idev] Sha1 KeyId Algorithm
6,051,966 UART: [idev] --
6,056,560 UART: [ldev] ++
6,057,249 UART: [ldev] CDI.KEYID = 6
6,058,167 UART: [ldev] SUBJECT.KEYID = 5
6,059,386 UART: [ldev] AUTHORITY.KEYID = 7
6,060,571 UART: [ldev] FE.KEYID = 1
6,100,385 UART: [ldev] Erasing FE.KEYID = 1
8,606,781 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,678 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,096 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,198 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,318 UART: [ldev] --
10,417,036 UART: [fwproc] Wait for Commands...
10,418,930 UART: [fwproc] Recv command 0x46574c44
10,421,264 UART: [fwproc] Recv'd Img size: 119428 bytes
13,933,631 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,012,257 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,877 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,701,676 >>> mbox cmd response: success
14,704,993 UART: [afmc] ++
14,705,695 UART: [afmc] CDI.KEYID = 6
14,706,886 UART: [afmc] SUBJECT.KEYID = 7
14,708,375 UART: [afmc] AUTHORITY.KEYID = 5
17,236,721 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,381 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,393 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,522 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,431 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,030,842 UART: [afmc] --
19,034,395 UART: [cold-reset] --
19,040,373 UART: [state] Locking Datavault
19,046,614 UART: [state] Locking PCR0, PCR1 and PCR31
19,048,785 UART: [state] Locking ICCM
19,051,227 UART: [exit] Launching FMC @ 0x40000130
19,059,906 UART:
19,060,150 UART: Running Caliptra FMC ...
19,061,258 UART:
19,061,426 UART: [state] CFI Enabled
19,115,957 UART: [fht] FMC Alias Private Key: 7
20,882,827 UART: [art] Extend RT PCRs Done
20,884,046 UART: [art] Lock RT PCRs Done
20,885,783 UART: [art] Populate DV Done
20,891,170 UART: [fht] FMC Alias Private Key: 7
20,892,661 UART: [art] Derive CDI
20,893,400 UART: [art] Store in slot 0x4
20,948,760 UART: [art] Derive Key Pair
20,949,765 UART: [art] Store priv key in slot 0x5
23,412,857 UART: [art] Derive Key Pair - Done
23,425,687 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,138,421 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,932 UART: [art] PUB.X = D49C9EC0C66D4EC5DDE64B4FD5336581BB639AC9047B4A1127FD95FC5315B1FD9F6BC566E6CB3F29300A0A41085D93F8
25,147,248 UART: [art] PUB.Y = F3FD476101F440097E3F896EDE6F4D3B0812CB709C5CF618F2DE83DE3E29D6FB221E085A055A2BF3F58C46F47BDA5BE9
25,154,484 UART: [art] SIG.R = F8850641890917C4DBF201114FCBF7436505607CDCA47AFE82571FED219DE4D214CAB0EA933641F9764A0A76CE1DCDB3
25,161,883 UART: [art] SIG.S = 9A4D64593C0AB9EDC85832504FDF29C6404ED1CB77C813DA83D3F9E10DDE5C1A7F7BCFBD44B2973147347A6287BEC2FD
26,140,944 UART: Caliptra RT
26,141,674 UART: [state] CFI Enabled
26,322,289 UART: [rt] RT listening for mailbox commands...
26,324,150 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,354,011 UART: [rt]cmd =0x46504c54, len=4
26,355,662 >>> mbox cmd response data (8 bytes)
26,356,582 UART: [rt] FIPS self test
26,357,535 UART: [kat] ++
26,357,992 UART: [kat] sha1
26,362,347 UART: [kat] SHA2-256
26,363,091 UART: Fatal Error: 0x90010001
26,398,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,548,208 >>> mbox cmd response: failed
26,548,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,698,717 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,127 UART:
190,414 UART: Running Caliptra ROM ...
191,532 UART:
191,683 UART: [state] CFI Enabled
251,523 UART: [state] LifecycleState = Unprovisioned
253,891 UART: [state] DebugLocked = No
255,751 UART: [state] WD Timer not started. Device not locked for debugging
259,434 UART: [kat] SHA2-256
449,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
460,088 UART: [kat] ++
460,544 UART: [kat] sha1
470,829 UART: [kat] SHA2-256
473,838 UART: [kat] SHA2-384
479,436 UART: [kat] SHA2-512-ACC
482,002 UART: [kat] ECC-384
2,937,275 UART: [kat] HMAC-384Kdf
2,957,562 UART: [kat] LMS
3,489,350 UART: [kat] --
3,493,851 UART: [cold-reset] ++
3,495,032 UART: [fht] FHT @ 0x50003400
3,507,429 UART: [idev] ++
3,508,115 UART: [idev] CDI.KEYID = 6
3,509,028 UART: [idev] SUBJECT.KEYID = 7
3,510,252 UART: [idev] UDS.KEYID = 0
3,511,781 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,661,893 UART: [idev] Erasing UDS.KEYID = 0
6,018,049 UART: [idev] Sha1 KeyId Algorithm
6,040,469 UART: [idev] --
6,044,719 UART: [ldev] ++
6,045,364 UART: [ldev] CDI.KEYID = 6
6,046,288 UART: [ldev] SUBJECT.KEYID = 5
6,047,456 UART: [ldev] AUTHORITY.KEYID = 7
6,048,712 UART: [ldev] FE.KEYID = 1
6,087,344 UART: [ldev] Erasing FE.KEYID = 1
8,595,516 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,327,231 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,342,382 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,357,617 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,372,755 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,392,909 UART: [ldev] --
10,399,135 UART: [fwproc] Wait for Commands...
10,400,922 UART: [fwproc] Recv command 0x46574c44
10,403,191 UART: [fwproc] Recv'd Img size: 119428 bytes
13,911,516 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,988,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,673 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,676,785 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
3,438,026 ready_for_fw is high
3,438,636 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,867,004 >>> mbox cmd response: success
19,158,095 UART:
19,158,502 UART: Running Caliptra FMC ...
19,159,629 UART:
19,159,816 UART: [state] CFI Enabled
19,224,771 UART: [fht] FMC Alias Private Key: 7
20,991,339 UART: [art] Extend RT PCRs Done
20,992,573 UART: [art] Lock RT PCRs Done
20,994,282 UART: [art] Populate DV Done
20,999,870 UART: [fht] FMC Alias Private Key: 7
21,001,421 UART: [art] Derive CDI
21,002,165 UART: [art] Store in slot 0x4
21,057,918 UART: [art] Derive Key Pair
21,058,974 UART: [art] Store priv key in slot 0x5
23,521,731 UART: [art] Derive Key Pair - Done
23,534,402 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,248,143 UART: [art] Erasing AUTHORITY.KEYID = 7
25,249,664 UART: [art] PUB.X = A3AB5AD166F2D020312E3AF158CF1198FA957F430268C9C6EF553B48C72167EA04DE1B47FCD9BAF4A2D5610A1E4EE797
25,256,953 UART: [art] PUB.Y = 5277F552B9B8919D3027A0DD3A848CC767A3B084B21B07EA510B854156E975AEA14E856C09219965556F3E31BABF4A09
25,264,169 UART: [art] SIG.R = 180FABE6EDD4CD91CD12D2EBD208E72C3EBE3E762A1F09C4AA5169DE424774E3925B42C0707616EFE5E08DAFB20DDA17
25,271,631 UART: [art] SIG.S = 284D6B26A57203908BFBA598B99E4E926F45195A8D0338DF235637668B01FAA87BD9C2C75BFEF9270DC68CF36C388C81
26,250,808 UART: Caliptra RT
26,251,510 UART: [state] CFI Enabled
26,431,748 UART: [rt] RT listening for mailbox commands...
26,433,604 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,463,239 UART: [rt]cmd =0x46504c54, len=4
26,464,882 >>> mbox cmd response data (8 bytes)
26,466,261 UART: [rt] FIPS self test
26,467,205 UART: [kat] ++
26,467,655 UART: [kat] sha1
26,472,062 UART: [kat] SHA2-256
26,472,972 UART: Fatal Error: 0x90010001
26,508,273 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,658,307 >>> mbox cmd response: failed
26,658,945 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,808,688 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,404,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,817,960 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,249 writing to cptra_bootfsm_go
192,541 UART:
192,924 UART: Running Caliptra ROM ...
194,057 UART:
603,505 UART: [state] CFI Enabled
617,621 UART: [state] LifecycleState = Unprovisioned
619,945 UART: [state] DebugLocked = No
621,981 UART: [state] WD Timer not started. Device not locked for debugging
626,394 UART: [kat] SHA2-256
816,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,069 UART: [kat] ++
827,563 UART: [kat] sha1
840,361 UART: [kat] SHA2-256
843,398 UART: [kat] SHA2-384
849,111 UART: [kat] SHA2-512-ACC
851,698 UART: [kat] ECC-384
3,294,687 UART: [kat] HMAC-384Kdf
3,307,534 UART: [kat] LMS
3,839,344 UART: [kat] --
3,845,687 UART: [cold-reset] ++
3,848,052 UART: [fht] FHT @ 0x50003400
3,860,405 UART: [idev] ++
3,861,091 UART: [idev] CDI.KEYID = 6
3,862,018 UART: [idev] SUBJECT.KEYID = 7
3,863,204 UART: [idev] UDS.KEYID = 0
3,864,133 ready_for_fw is high
3,864,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,014,396 UART: [idev] Erasing UDS.KEYID = 0
6,340,647 UART: [idev] Sha1 KeyId Algorithm
6,363,691 UART: [idev] --
6,369,469 UART: [ldev] ++
6,370,158 UART: [ldev] CDI.KEYID = 6
6,371,044 UART: [ldev] SUBJECT.KEYID = 5
6,372,267 UART: [ldev] AUTHORITY.KEYID = 7
6,373,505 UART: [ldev] FE.KEYID = 1
6,385,860 UART: [ldev] Erasing FE.KEYID = 1
8,868,467 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,587,423 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,602,603 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,617,782 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,632,929 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,653,125 UART: [ldev] --
10,658,319 UART: [fwproc] Wait for Commands...
10,659,892 UART: [fwproc] Recv command 0x46574c44
10,662,168 UART: [fwproc] Recv'd Img size: 119428 bytes
14,166,681 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,243,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,367,007 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,933,101 >>> mbox cmd response: success
14,936,818 UART: [afmc] ++
14,937,526 UART: [afmc] CDI.KEYID = 6
14,938,719 UART: [afmc] SUBJECT.KEYID = 7
14,940,155 UART: [afmc] AUTHORITY.KEYID = 5
17,442,009 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,162,818 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,164,787 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,179,851 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,195,021 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,209,907 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,234,312 UART: [afmc] --
19,237,654 UART: [cold-reset] --
19,243,165 UART: [state] Locking Datavault
19,250,091 UART: [state] Locking PCR0, PCR1 and PCR31
19,252,293 UART: [state] Locking ICCM
19,253,857 UART: [exit] Launching FMC @ 0x40000130
19,262,532 UART:
19,262,770 UART: Running Caliptra FMC ...
19,263,874 UART:
19,264,034 UART: [state] CFI Enabled
19,272,088 UART: [fht] FMC Alias Private Key: 7
21,038,280 UART: [art] Extend RT PCRs Done
21,039,509 UART: [art] Lock RT PCRs Done
21,040,762 UART: [art] Populate DV Done
21,046,397 UART: [fht] FMC Alias Private Key: 7
21,048,105 UART: [art] Derive CDI
21,048,927 UART: [art] Store in slot 0x4
21,092,285 UART: [art] Derive Key Pair
21,093,348 UART: [art] Store priv key in slot 0x5
23,520,488 UART: [art] Derive Key Pair - Done
23,533,642 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,239,497 UART: [art] Erasing AUTHORITY.KEYID = 7
25,241,006 UART: [art] PUB.X = 4039897B2CB70420E2711360F4B32D6081DBF2B46A78B24BD6D50D2D87B07EF488F391A1992BA13D6E1FBD524B89D267
25,248,245 UART: [art] PUB.Y = CF5B82D8E90D686D9AECCE487B62613789235AB7CD3E5C478CF256DFAFF48FAB852C2C7453B21E75A298B577501FD557
25,255,514 UART: [art] SIG.R = 8B3C6D7BE77F446F824D9A39C6A1DD62B0884A29B0F91AB39E4AA71C476D78413C5DFB09CEFE6FA087C71EF2717D9768
25,262,938 UART: [art] SIG.S = E5A0B66ACDE79993FCB9052182BD94438395E5C43BD1FE4AC26F5A8D1247D07B2255BE40A8BED5758CB75B3C84095024
26,241,913 UART: Caliptra RT
26,242,604 UART: [state] CFI Enabled
26,376,636 UART: [rt] RT listening for mailbox commands...
26,378,488 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,408,337 UART: [rt]cmd =0x46504c54, len=4
26,409,963 >>> mbox cmd response data (8 bytes)
26,411,189 UART: [rt] FIPS self test
26,412,135 UART: [kat] ++
26,412,609 UART: [kat] sha1
26,416,847 UART: [kat] SHA2-256
26,417,730 UART: Fatal Error: 0x90010001
26,452,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,602,962 >>> mbox cmd response: failed
26,603,593 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,753,476 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,116 UART:
190,426 UART: Running Caliptra ROM ...
191,539 UART:
13,780,740 UART: [state] CFI Enabled
13,794,850 UART: [state] LifecycleState = Unprovisioned
13,797,202 UART: [state] DebugLocked = No
13,800,024 UART: [state] WD Timer not started. Device not locked for debugging
13,805,211 UART: [kat] SHA2-256
13,995,119 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,005,864 UART: [kat] ++
14,006,393 UART: [kat] sha1
14,016,586 UART: [kat] SHA2-256
14,019,613 UART: [kat] SHA2-384
14,025,779 UART: [kat] SHA2-512-ACC
14,028,355 UART: [kat] ECC-384
16,471,201 UART: [kat] HMAC-384Kdf
16,485,271 UART: [kat] LMS
17,017,095 UART: [kat] --
17,020,794 UART: [cold-reset] ++
17,023,258 UART: [fht] FHT @ 0x50003400
17,034,266 UART: [idev] ++
17,034,959 UART: [idev] CDI.KEYID = 6
17,035,873 UART: [idev] SUBJECT.KEYID = 7
17,037,115 UART: [idev] UDS.KEYID = 0
17,038,644 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,188,546 UART: [idev] Erasing UDS.KEYID = 0
19,513,063 UART: [idev] Sha1 KeyId Algorithm
19,536,977 UART: [idev] --
19,541,735 UART: [ldev] ++
19,542,418 UART: [ldev] CDI.KEYID = 6
19,543,301 UART: [ldev] SUBJECT.KEYID = 5
19,544,514 UART: [ldev] AUTHORITY.KEYID = 7
19,545,696 UART: [ldev] FE.KEYID = 1
19,556,346 UART: [ldev] Erasing FE.KEYID = 1
22,034,253 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,753,362 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,768,554 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,783,743 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,798,888 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,819,350 UART: [ldev] --
23,824,388 UART: [fwproc] Wait for Commands...
23,827,106 UART: [fwproc] Recv command 0x46574c44
23,829,434 UART: [fwproc] Recv'd Img size: 119428 bytes
27,339,291 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,414,579 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,538,223 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,104,242 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,755,653 ready_for_fw is high
3,756,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,062,686 >>> mbox cmd response: success
19,312,508 UART:
19,312,924 UART: Running Caliptra FMC ...
19,314,061 UART:
19,314,219 UART: [state] CFI Enabled
19,322,078 UART: [fht] FMC Alias Private Key: 7
21,088,784 UART: [art] Extend RT PCRs Done
21,090,006 UART: [art] Lock RT PCRs Done
21,091,671 UART: [art] Populate DV Done
21,097,153 UART: [fht] FMC Alias Private Key: 7
21,098,710 UART: [art] Derive CDI
21,099,452 UART: [art] Store in slot 0x4
21,142,321 UART: [art] Derive Key Pair
21,143,367 UART: [art] Store priv key in slot 0x5
23,569,771 UART: [art] Derive Key Pair - Done
23,583,048 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,217 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,848 UART: [art] PUB.X = 0EF5E95E4C185F5ED29E149B8E9B3CBDFDF9F642EDBCB54DF7BDA697D79EFD71DCDB468FB977BA69D88E24EA2440CA85
25,298,035 UART: [art] PUB.Y = D80066B7BDB01C0989CE44D1ECCDC5A6836A3FA6E6801C169AAD3ECBB3CCC2CBE7809B149BCA71317F6AB50D162E011D
25,305,276 UART: [art] SIG.R = 20294F20A6BABB4E6558E62CA30BBCF52B0433CCC9BC3D707B05D4249312A5B32A7AF080320E73D9CBC09681FE7D61FF
25,312,719 UART: [art] SIG.S = 9F8ECAAD4B2A07101BEE4052399C68AB445DDE7FD8237608C85C16C0DCA4A47CC88DD628198896BFCED0BFB81AFF349E
26,292,012 UART: Caliptra RT
26,292,728 UART: [state] CFI Enabled
26,425,787 UART: [rt] RT listening for mailbox commands...
26,427,639 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,457,454 UART: [rt]cmd =0x46504c54, len=4
26,458,935 >>> mbox cmd response data (8 bytes)
26,460,024 UART: [rt] FIPS self test
26,460,984 UART: [kat] ++
26,461,441 UART: [kat] sha1
26,465,850 UART: [kat] SHA2-256
26,466,656 UART: Fatal Error: 0x90010001
26,502,037 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,651,969 >>> mbox cmd response: failed
26,652,597 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,802,356 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
16,886,917 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,196,446 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,044 UART: [state] LifecycleState = Unprovisioned
85,699 UART: [state] DebugLocked = No
86,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,985 UART: [kat] SHA2-256
881,916 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,031 UART: [kat] ++
886,183 UART: [kat] sha1
890,255 UART: [kat] SHA2-256
892,193 UART: [kat] SHA2-384
894,974 UART: [kat] SHA2-512-ACC
896,875 UART: [kat] ECC-384
902,672 UART: [kat] HMAC-384Kdf
907,116 UART: [kat] LMS
1,475,312 UART: [kat] --
1,476,497 UART: [cold-reset] ++
1,476,931 UART: [fht] Storing FHT @ 0x50003400
1,479,852 UART: [idev] ++
1,480,020 UART: [idev] CDI.KEYID = 6
1,480,380 UART: [idev] SUBJECT.KEYID = 7
1,480,804 UART: [idev] UDS.KEYID = 0
1,481,149 ready_for_fw is high
1,481,149 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,724 UART: [idev] Erasing UDS.KEYID = 0
1,505,196 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,900 UART: [idev] --
1,514,905 UART: [ldev] ++
1,515,073 UART: [ldev] CDI.KEYID = 6
1,515,436 UART: [ldev] SUBJECT.KEYID = 5
1,515,862 UART: [ldev] AUTHORITY.KEYID = 7
1,516,325 UART: [ldev] FE.KEYID = 1
1,521,483 UART: [ldev] Erasing FE.KEYID = 1
1,547,028 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,339 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,230 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,942 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,008 UART: [ldev] --
1,586,455 UART: [fwproc] Waiting for Commands...
1,587,286 UART: [fwproc] Received command 0x46574c44
1,588,077 UART: [fwproc] Received Image of size 119428 bytes
2,943,319 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,559 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,777 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,314 >>> mbox cmd response: success
3,144,346 UART: [afmc] ++
3,144,514 UART: [afmc] CDI.KEYID = 6
3,144,876 UART: [afmc] SUBJECT.KEYID = 7
3,145,301 UART: [afmc] AUTHORITY.KEYID = 5
3,180,378 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,514 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,294 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,003 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,886 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,569 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,445 UART: [afmc] --
3,223,547 UART: [cold-reset] --
3,224,139 UART: [state] Locking Datavault
3,225,428 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,032 UART: [state] Locking ICCM
3,226,528 UART: [exit] Launching FMC @ 0x40000130
3,231,858 UART:
3,231,874 UART: Running Caliptra FMC ...
3,232,282 UART:
3,232,336 UART: [state] CFI Enabled
3,242,636 UART: [fht] FMC Alias Private Key: 7
3,360,684 UART: [art] Extend RT PCRs Done
3,361,112 UART: [art] Lock RT PCRs Done
3,362,758 UART: [art] Populate DV Done
3,370,939 UART: [fht] FMC Alias Private Key: 7
3,371,895 UART: [art] Derive CDI
3,372,175 UART: [art] Store in slot 0x4
3,457,737 UART: [art] Derive Key Pair
3,458,097 UART: [art] Store priv key in slot 0x5
3,471,216 UART: [art] Derive Key Pair - Done
3,486,109 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,476 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,241 UART: [art] PUB.X = 03BF88BF3C2CCC07C151AAB030968946901B961DE3EEEF4CFC95DAC6B023B84E0D79220451BAE19C51A3003AE8373C95
3,508,989 UART: [art] PUB.Y = 1F0E8B6E052FF7334C8966E8C9E3DAB37ACF845DBB5E9C3CEEC24AB238BCDB2594DC1AD6E04E18972C0217911632C5B9
3,515,948 UART: [art] SIG.R = 1DEAB7B1E8FDE154F67A541D826026DA5EE48ADAD1B148E5D15E4DBD8C5A6789DAD763E3617A7EC697FAA8B71E4D67A3
3,522,742 UART: [art] SIG.S = 00FC5EC5FC90756083D30D66E56804424D8162968F4641726CDBDE4F24DAE000667086BB6344640BA08C5493F0408800
3,546,449 UART: Caliptra RT
3,546,700 UART: [state] CFI Enabled
3,666,380 UART: [rt] RT listening for mailbox commands...
3,667,043 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,696,866 UART: [rt]cmd =0x46504c54, len=4
3,698,030 >>> mbox cmd response data (8 bytes)
3,698,301 UART: [rt] FIPS self test
3,698,629 UART: [kat] ++
3,698,781 UART: [kat] sha1
3,702,953 UART: [kat] SHA2-256
3,703,563 UART: Fatal Error: 0x90010001
3,705,102 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,705,107 >>> mbox cmd response: failed
3,705,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,705,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,760 UART: [state] LifecycleState = Unprovisioned
86,415 UART: [state] DebugLocked = No
86,965 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,555 UART: [kat] SHA2-256
882,486 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,601 UART: [kat] ++
886,753 UART: [kat] sha1
890,909 UART: [kat] SHA2-256
892,847 UART: [kat] SHA2-384
895,706 UART: [kat] SHA2-512-ACC
897,607 UART: [kat] ECC-384
902,992 UART: [kat] HMAC-384Kdf
907,396 UART: [kat] LMS
1,475,592 UART: [kat] --
1,476,757 UART: [cold-reset] ++
1,477,271 UART: [fht] Storing FHT @ 0x50003400
1,479,932 UART: [idev] ++
1,480,100 UART: [idev] CDI.KEYID = 6
1,480,460 UART: [idev] SUBJECT.KEYID = 7
1,480,884 UART: [idev] UDS.KEYID = 0
1,481,229 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,012 UART: [idev] Erasing UDS.KEYID = 0
1,505,244 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,768 UART: [idev] --
1,514,729 UART: [ldev] ++
1,514,897 UART: [ldev] CDI.KEYID = 6
1,515,260 UART: [ldev] SUBJECT.KEYID = 5
1,515,686 UART: [ldev] AUTHORITY.KEYID = 7
1,516,149 UART: [ldev] FE.KEYID = 1
1,521,349 UART: [ldev] Erasing FE.KEYID = 1
1,546,620 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,179 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,895 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,786 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,498 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,678 UART: [ldev] --
1,586,085 UART: [fwproc] Waiting for Commands...
1,586,894 UART: [fwproc] Received command 0x46574c44
1,587,685 UART: [fwproc] Received Image of size 119428 bytes
2,941,597 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,569 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,787 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,514 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,053 ready_for_fw is high
1,363,053 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,492 >>> mbox cmd response: success
3,054,417 UART:
3,054,433 UART: Running Caliptra FMC ...
3,054,841 UART:
3,054,895 UART: [state] CFI Enabled
3,065,193 UART: [fht] FMC Alias Private Key: 7
3,184,869 UART: [art] Extend RT PCRs Done
3,185,297 UART: [art] Lock RT PCRs Done
3,186,651 UART: [art] Populate DV Done
3,194,892 UART: [fht] FMC Alias Private Key: 7
3,195,852 UART: [art] Derive CDI
3,196,132 UART: [art] Store in slot 0x4
3,281,868 UART: [art] Derive Key Pair
3,282,228 UART: [art] Store priv key in slot 0x5
3,295,355 UART: [art] Derive Key Pair - Done
3,310,005 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,170 UART: [art] Erasing AUTHORITY.KEYID = 7
3,325,935 UART: [art] PUB.X = 853E7FC681C244C9AFF98125AE41370066C5AB50794B7DF89BA77019D5104D9B532CB1ECA7120436BAC6823F5ED65AB8
3,332,686 UART: [art] PUB.Y = 9A92A68C0AC3669421BFB6E90F042958B295A40F80724DF8366A973054449F57BF26DFB2DEC4EB1BB44FAFAF574E434A
3,339,634 UART: [art] SIG.R = 88D37D3736A2D4C25A6FD647F9D5CB105A2F9852FF738E6227A6789E453A2D13FD5C4D006D0A265D2AF2CA82E5B3B831
3,346,387 UART: [art] SIG.S = 8F8D96474C4A83C296DDD2F1F2BB9D2B22FFA9342E81D4C25ABDADC09AE028CF1DD7D7F2C567B0A47C9A3F844172F944
3,370,361 UART: Caliptra RT
3,370,612 UART: [state] CFI Enabled
3,491,309 UART: [rt] RT listening for mailbox commands...
3,491,972 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,873 UART: [rt]cmd =0x46504c54, len=4
3,523,079 >>> mbox cmd response data (8 bytes)
3,523,402 UART: [rt] FIPS self test
3,523,730 UART: [kat] ++
3,523,882 UART: [kat] sha1
3,527,964 UART: [kat] SHA2-256
3,528,528 UART: Fatal Error: 0x90010001
3,530,067 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,072 >>> mbox cmd response: failed
3,530,072 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,077 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,923 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,940 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,383 UART: [state] LifecycleState = Unprovisioned
86,038 UART: [state] DebugLocked = No
86,674 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,402 UART: [kat] SHA2-256
882,333 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,448 UART: [kat] ++
886,600 UART: [kat] sha1
890,704 UART: [kat] SHA2-256
892,642 UART: [kat] SHA2-384
895,451 UART: [kat] SHA2-512-ACC
897,352 UART: [kat] ECC-384
902,975 UART: [kat] HMAC-384Kdf
907,519 UART: [kat] LMS
1,475,715 UART: [kat] --
1,476,626 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,973 UART: [idev] ++
1,480,141 UART: [idev] CDI.KEYID = 6
1,480,501 UART: [idev] SUBJECT.KEYID = 7
1,480,925 UART: [idev] UDS.KEYID = 0
1,481,270 ready_for_fw is high
1,481,270 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,045 UART: [idev] Erasing UDS.KEYID = 0
1,505,643 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,131 UART: [idev] --
1,515,310 UART: [ldev] ++
1,515,478 UART: [ldev] CDI.KEYID = 6
1,515,841 UART: [ldev] SUBJECT.KEYID = 5
1,516,267 UART: [ldev] AUTHORITY.KEYID = 7
1,516,730 UART: [ldev] FE.KEYID = 1
1,521,964 UART: [ldev] Erasing FE.KEYID = 1
1,547,863 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,104 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,995 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,707 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,657 UART: [ldev] --
1,587,078 UART: [fwproc] Waiting for Commands...
1,587,793 UART: [fwproc] Received command 0x46574c44
1,588,584 UART: [fwproc] Received Image of size 119428 bytes
2,942,282 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,274 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,492 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,205 >>> mbox cmd response: success
3,143,405 UART: [afmc] ++
3,143,573 UART: [afmc] CDI.KEYID = 6
3,143,935 UART: [afmc] SUBJECT.KEYID = 7
3,144,360 UART: [afmc] AUTHORITY.KEYID = 5
3,179,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,599 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,379 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,088 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,971 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,654 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,596 UART: [afmc] --
3,222,502 UART: [cold-reset] --
3,223,268 UART: [state] Locking Datavault
3,224,459 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,063 UART: [state] Locking ICCM
3,225,497 UART: [exit] Launching FMC @ 0x40000130
3,230,827 UART:
3,230,843 UART: Running Caliptra FMC ...
3,231,251 UART:
3,231,394 UART: [state] CFI Enabled
3,241,948 UART: [fht] FMC Alias Private Key: 7
3,360,764 UART: [art] Extend RT PCRs Done
3,361,192 UART: [art] Lock RT PCRs Done
3,362,952 UART: [art] Populate DV Done
3,371,351 UART: [fht] FMC Alias Private Key: 7
3,372,453 UART: [art] Derive CDI
3,372,733 UART: [art] Store in slot 0x4
3,458,637 UART: [art] Derive Key Pair
3,458,997 UART: [art] Store priv key in slot 0x5
3,472,168 UART: [art] Derive Key Pair - Done
3,486,848 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,101 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,866 UART: [art] PUB.X = 7B8A1563066A15CD66614BF8E463F81E20394FE166DAF506F0189236123087E93532FE023958FD2160792757A3176248
3,509,609 UART: [art] PUB.Y = 558A796FECA424E4D5BACDF7BFAC4EC932F4B6DE47354EE57FE9A145D39451BE36F53C43DD61617B9C635F50F996ECCD
3,516,581 UART: [art] SIG.R = 5F9789DAC281EFCF821060ACD36C9903F4140A74C56F0EE1109333C023CEB3F40746EDF606D2327769D2D8BE03BBB992
3,523,339 UART: [art] SIG.S = 7ADA06001CF4B064A8660998E5520D34A14CE4E90CE15519154C22EF98C17C44073087D3B845BE3DF6CD66773F2C07ED
3,547,089 UART: Caliptra RT
3,547,432 UART: [state] CFI Enabled
3,668,135 UART: [rt] RT listening for mailbox commands...
3,668,798 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,667 UART: [rt]cmd =0x46504c54, len=4
3,699,989 >>> mbox cmd response data (8 bytes)
3,700,102 UART: [rt] FIPS self test
3,700,430 UART: [kat] ++
3,700,582 UART: [kat] sha1
3,704,934 UART: [kat] SHA2-256
3,705,304 UART: Fatal Error: 0x90010001
3,706,843 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,848 >>> mbox cmd response: failed
3,706,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,706,853 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,226 UART: [kat] SHA2-256
882,157 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,272 UART: [kat] ++
886,424 UART: [kat] sha1
890,658 UART: [kat] SHA2-256
892,596 UART: [kat] SHA2-384
895,311 UART: [kat] SHA2-512-ACC
897,212 UART: [kat] ECC-384
903,021 UART: [kat] HMAC-384Kdf
907,623 UART: [kat] LMS
1,475,819 UART: [kat] --
1,476,550 UART: [cold-reset] ++
1,477,098 UART: [fht] Storing FHT @ 0x50003400
1,479,955 UART: [idev] ++
1,480,123 UART: [idev] CDI.KEYID = 6
1,480,483 UART: [idev] SUBJECT.KEYID = 7
1,480,907 UART: [idev] UDS.KEYID = 0
1,481,252 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,205 UART: [idev] Erasing UDS.KEYID = 0
1,505,579 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,253 UART: [idev] --
1,515,460 UART: [ldev] ++
1,515,628 UART: [ldev] CDI.KEYID = 6
1,515,991 UART: [ldev] SUBJECT.KEYID = 5
1,516,417 UART: [ldev] AUTHORITY.KEYID = 7
1,516,880 UART: [ldev] FE.KEYID = 1
1,522,128 UART: [ldev] Erasing FE.KEYID = 1
1,547,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,477 UART: [ldev] --
1,586,846 UART: [fwproc] Waiting for Commands...
1,587,679 UART: [fwproc] Received command 0x46574c44
1,588,470 UART: [fwproc] Received Image of size 119428 bytes
2,943,824 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,970 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,188 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,933 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,352 ready_for_fw is high
1,363,352 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,823 >>> mbox cmd response: success
3,056,726 UART:
3,056,742 UART: Running Caliptra FMC ...
3,057,150 UART:
3,057,293 UART: [state] CFI Enabled
3,067,841 UART: [fht] FMC Alias Private Key: 7
3,186,971 UART: [art] Extend RT PCRs Done
3,187,399 UART: [art] Lock RT PCRs Done
3,189,151 UART: [art] Populate DV Done
3,197,302 UART: [fht] FMC Alias Private Key: 7
3,198,414 UART: [art] Derive CDI
3,198,694 UART: [art] Store in slot 0x4
3,284,586 UART: [art] Derive Key Pair
3,284,946 UART: [art] Store priv key in slot 0x5
3,298,109 UART: [art] Derive Key Pair - Done
3,312,938 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,328,351 UART: [art] Erasing AUTHORITY.KEYID = 7
3,329,116 UART: [art] PUB.X = 08F138FDDA51382692D26967A734758A7D195FFF6FEB1828575561C4B8E2C28AC4C9AE6A3EE66241478600C1C0FBCBC1
3,335,867 UART: [art] PUB.Y = 64689A0DA78895F2E9A5DCF93833C1FFFAB4DB8AA7DED13073B39C180294FE404D0664EC4C4AC72FDCEDA0ADED6E4FBA
3,342,838 UART: [art] SIG.R = 07E986C614CD9FD67F6722EAAB822FA6F2F1BBFDA1DE8CD36FAE1406BE85FD3D5598FC7C2FF4883F905FA89E56A26AF4
3,349,628 UART: [art] SIG.S = 0360159AF901339909AC3FC25BC2AD0F4F3C0EEBF01B9DEBDD6C3586EB73D333A973D23D8E77BA67944FB61567698B15
3,373,221 UART: Caliptra RT
3,373,564 UART: [state] CFI Enabled
3,495,083 UART: [rt] RT listening for mailbox commands...
3,495,746 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,525,745 UART: [rt]cmd =0x46504c54, len=4
3,527,013 >>> mbox cmd response data (8 bytes)
3,527,172 UART: [rt] FIPS self test
3,527,500 UART: [kat] ++
3,527,652 UART: [kat] sha1
3,532,032 UART: [kat] SHA2-256
3,532,406 UART: Fatal Error: 0x90010001
3,533,945 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,950 >>> mbox cmd response: failed
3,533,950 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,955 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,591 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,124 UART: [state] LifecycleState = Unprovisioned
85,779 UART: [state] DebugLocked = No
86,345 UART: [state] WD Timer not started. Device not locked for debugging
87,696 UART: [kat] SHA2-256
891,246 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,350 UART: [kat] ++
895,502 UART: [kat] sha1
899,798 UART: [kat] SHA2-256
901,738 UART: [kat] SHA2-384
904,349 UART: [kat] SHA2-512-ACC
906,250 UART: [kat] ECC-384
916,077 UART: [kat] HMAC-384Kdf
920,757 UART: [kat] LMS
1,169,069 UART: [kat] --
1,169,980 UART: [cold-reset] ++
1,170,520 UART: [fht] FHT @ 0x50003400
1,173,198 UART: [idev] ++
1,173,366 UART: [idev] CDI.KEYID = 6
1,173,727 UART: [idev] SUBJECT.KEYID = 7
1,174,152 UART: [idev] UDS.KEYID = 0
1,174,498 ready_for_fw is high
1,174,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,343 UART: [idev] Erasing UDS.KEYID = 0
1,199,389 UART: [idev] Sha1 KeyId Algorithm
1,208,217 UART: [idev] --
1,209,360 UART: [ldev] ++
1,209,528 UART: [ldev] CDI.KEYID = 6
1,209,892 UART: [ldev] SUBJECT.KEYID = 5
1,210,319 UART: [ldev] AUTHORITY.KEYID = 7
1,210,782 UART: [ldev] FE.KEYID = 1
1,216,160 UART: [ldev] Erasing FE.KEYID = 1
1,242,387 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,023 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,739 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,628 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,340 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,484 UART: [ldev] --
1,281,721 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,700 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,591 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,766 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,485 >>> mbox cmd response: success
2,838,739 UART: [afmc] ++
2,838,907 UART: [afmc] CDI.KEYID = 6
2,839,270 UART: [afmc] SUBJECT.KEYID = 7
2,839,696 UART: [afmc] AUTHORITY.KEYID = 5
2,874,643 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,942 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,691 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,401 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,282 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,983 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,966 UART: [afmc] --
2,917,973 UART: [cold-reset] --
2,919,115 UART: [state] Locking Datavault
2,920,254 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,858 UART: [state] Locking ICCM
2,921,442 UART: [exit] Launching FMC @ 0x40000130
2,926,772 UART:
2,926,788 UART: Running Caliptra FMC ...
2,927,196 UART:
2,927,250 UART: [state] CFI Enabled
2,938,066 UART: [fht] FMC Alias Private Key: 7
3,057,170 UART: [art] Extend RT PCRs Done
3,057,598 UART: [art] Lock RT PCRs Done
3,058,744 UART: [art] Populate DV Done
3,066,973 UART: [fht] FMC Alias Private Key: 7
3,067,907 UART: [art] Derive CDI
3,068,187 UART: [art] Store in slot 0x4
3,154,036 UART: [art] Derive Key Pair
3,154,396 UART: [art] Store priv key in slot 0x5
3,167,580 UART: [art] Derive Key Pair - Done
3,182,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,790 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,555 UART: [art] PUB.X = 8FB4283249E2B651B622085254C146991E31EFC5D1FF6F87141D34D990422C71B62DA873F3F6F143B40675CB831F452D
3,205,313 UART: [art] PUB.Y = 222A85CCF26C9E996CCCBBE8463253ACED1D01B3946EF3EEC8EA839EE30DA92BD0318E36C4572F95CD2CD80F9BADE40D
3,212,277 UART: [art] SIG.R = 92732C12A1F32EFE4A53558D4141978901FBC8356EEEA73E3AC285561577FE29F8B701076D2900271E0E169FB7E84276
3,219,007 UART: [art] SIG.S = BBB0389E3D0173F12D7CD1CDC07CE9FA9CA11CFD2316FCEB96354F83FD650E3B237CDDCB938A8F3E66CEA1146C939767
3,242,871 UART: Caliptra RT
3,243,122 UART: [state] CFI Enabled
3,362,752 UART: [rt] RT listening for mailbox commands...
3,363,415 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,460 UART: [rt]cmd =0x46504c54, len=4
3,394,482 >>> mbox cmd response data (8 bytes)
3,394,701 UART: [rt] FIPS self test
3,395,029 UART: [kat] ++
3,395,181 UART: [kat] sha1
3,399,397 UART: [kat] SHA2-256
3,399,895 UART: Fatal Error: 0x90010001
3,401,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,439 >>> mbox cmd response: failed
3,401,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,401,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,108 UART: [state] LifecycleState = Unprovisioned
85,763 UART: [state] DebugLocked = No
86,327 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,638 UART: [kat] SHA2-256
901,578 UART: [kat] SHA2-384
904,381 UART: [kat] SHA2-512-ACC
906,282 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,988 UART: [cold-reset] ++
1,170,322 UART: [fht] FHT @ 0x50003400
1,172,992 UART: [idev] ++
1,173,160 UART: [idev] CDI.KEYID = 6
1,173,521 UART: [idev] SUBJECT.KEYID = 7
1,173,946 UART: [idev] UDS.KEYID = 0
1,174,292 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,967 UART: [idev] Erasing UDS.KEYID = 0
1,199,039 UART: [idev] Sha1 KeyId Algorithm
1,207,961 UART: [idev] --
1,208,886 UART: [ldev] ++
1,209,054 UART: [ldev] CDI.KEYID = 6
1,209,418 UART: [ldev] SUBJECT.KEYID = 5
1,209,845 UART: [ldev] AUTHORITY.KEYID = 7
1,210,308 UART: [ldev] FE.KEYID = 1
1,215,744 UART: [ldev] Erasing FE.KEYID = 1
1,241,683 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,219 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,935 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,824 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,536 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,536 UART: [ldev] --
1,280,831 UART: [fwproc] Wait for Commands...
1,281,540 UART: [fwproc] Recv command 0x46574c44
1,282,273 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,488 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,092 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,577 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,032 ready_for_fw is high
1,059,032 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,744 >>> mbox cmd response: success
2,753,825 UART:
2,753,841 UART: Running Caliptra FMC ...
2,754,249 UART:
2,754,303 UART: [state] CFI Enabled
2,764,861 UART: [fht] FMC Alias Private Key: 7
2,883,529 UART: [art] Extend RT PCRs Done
2,883,957 UART: [art] Lock RT PCRs Done
2,885,565 UART: [art] Populate DV Done
2,893,776 UART: [fht] FMC Alias Private Key: 7
2,894,734 UART: [art] Derive CDI
2,895,014 UART: [art] Store in slot 0x4
2,980,719 UART: [art] Derive Key Pair
2,981,079 UART: [art] Store priv key in slot 0x5
2,994,229 UART: [art] Derive Key Pair - Done
3,008,693 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,128 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,893 UART: [art] PUB.X = A04F9D17DDC74F151FD8D362C07FED412E309ADB08786DCC4B6040C1ADDFE2C040C444905094455247DFC8F1916EC487
3,031,670 UART: [art] PUB.Y = 4A4ECEC6EB2657757B5560F17D1349D08BD645AC03BE4D59ABE7A63683A011EAE8BB0A8C752F57AF9E328320C62EA913
3,038,626 UART: [art] SIG.R = CA176D38A2C894EDD1FCA8FFA688156452A4D84BA127225437489EE1504BB3FE1C5C33B17D6543BADF7C77ABE42DE788
3,045,410 UART: [art] SIG.S = BFEAA37F2BF062901686EE1BCDF9482386C271B05140D6F1398952FDA28F77CC3EB2A9F8310463540087126B6E6B52B6
3,068,957 UART: Caliptra RT
3,069,208 UART: [state] CFI Enabled
3,188,540 UART: [rt] RT listening for mailbox commands...
3,189,203 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,900 UART: [rt]cmd =0x46504c54, len=4
3,220,026 >>> mbox cmd response data (8 bytes)
3,220,379 UART: [rt] FIPS self test
3,220,707 UART: [kat] ++
3,220,859 UART: [kat] sha1
3,225,041 UART: [kat] SHA2-256
3,225,445 UART: Fatal Error: 0x90010001
3,226,984 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,989 >>> mbox cmd response: failed
3,226,989 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,994 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,598 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,132 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,375 UART: [state] LifecycleState = Unprovisioned
86,030 UART: [state] DebugLocked = No
86,672 UART: [state] WD Timer not started. Device not locked for debugging
88,023 UART: [kat] SHA2-256
891,573 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,677 UART: [kat] ++
895,829 UART: [kat] sha1
899,925 UART: [kat] SHA2-256
901,865 UART: [kat] SHA2-384
904,512 UART: [kat] SHA2-512-ACC
906,413 UART: [kat] ECC-384
916,584 UART: [kat] HMAC-384Kdf
921,182 UART: [kat] LMS
1,169,494 UART: [kat] --
1,170,459 UART: [cold-reset] ++
1,170,945 UART: [fht] FHT @ 0x50003400
1,173,707 UART: [idev] ++
1,173,875 UART: [idev] CDI.KEYID = 6
1,174,236 UART: [idev] SUBJECT.KEYID = 7
1,174,661 UART: [idev] UDS.KEYID = 0
1,175,007 ready_for_fw is high
1,175,007 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,474 UART: [idev] Erasing UDS.KEYID = 0
1,199,818 UART: [idev] Sha1 KeyId Algorithm
1,208,744 UART: [idev] --
1,209,813 UART: [ldev] ++
1,209,981 UART: [ldev] CDI.KEYID = 6
1,210,345 UART: [ldev] SUBJECT.KEYID = 5
1,210,772 UART: [ldev] AUTHORITY.KEYID = 7
1,211,235 UART: [ldev] FE.KEYID = 1
1,216,509 UART: [ldev] Erasing FE.KEYID = 1
1,243,014 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,886 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,602 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,491 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,191 UART: [ldev] --
1,282,636 UART: [fwproc] Wait for Commands...
1,283,221 UART: [fwproc] Recv command 0x46574c44
1,283,954 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,422 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,597 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,168 >>> mbox cmd response: success
2,838,220 UART: [afmc] ++
2,838,388 UART: [afmc] CDI.KEYID = 6
2,838,751 UART: [afmc] SUBJECT.KEYID = 7
2,839,177 UART: [afmc] AUTHORITY.KEYID = 5
2,875,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,135 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,884 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,594 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,475 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,176 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,771 UART: [afmc] --
2,918,656 UART: [cold-reset] --
2,919,256 UART: [state] Locking Datavault
2,920,771 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,375 UART: [state] Locking ICCM
2,921,963 UART: [exit] Launching FMC @ 0x40000130
2,927,293 UART:
2,927,309 UART: Running Caliptra FMC ...
2,927,717 UART:
2,927,860 UART: [state] CFI Enabled
2,938,396 UART: [fht] FMC Alias Private Key: 7
3,057,106 UART: [art] Extend RT PCRs Done
3,057,534 UART: [art] Lock RT PCRs Done
3,059,166 UART: [art] Populate DV Done
3,067,345 UART: [fht] FMC Alias Private Key: 7
3,068,381 UART: [art] Derive CDI
3,068,661 UART: [art] Store in slot 0x4
3,154,400 UART: [art] Derive Key Pair
3,154,760 UART: [art] Store priv key in slot 0x5
3,168,160 UART: [art] Derive Key Pair - Done
3,182,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,783 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,548 UART: [art] PUB.X = 4190EDB25985C5ABA001015D87110AB2031FD8D730B739E8F0E0BAF8C6CD90FA2423DC1C7437BBB4B004957A05198C74
3,205,306 UART: [art] PUB.Y = 2F0B5CB6DD4A7B1DD807BA1C9E629E935D365EE1D5937F0D3D8C52656DB5366C2DB05455279B08302FA91D2746DD6BF4
3,212,254 UART: [art] SIG.R = 24DA42A0AA2DC2849419E85D2E8427D147ACC6BFDD1EBB88C62591A1FB089B0FDCDDA3A4E9D2A23E474DC212669CC8DF
3,219,042 UART: [art] SIG.S = 9F95E814AF40C4C57B2FD79EC3AABD50C4B940796D57F8C5B9AB378BAE6F293B2E904FD740D242A14CD04BE8E8183387
3,242,830 UART: Caliptra RT
3,243,173 UART: [state] CFI Enabled
3,363,462 UART: [rt] RT listening for mailbox commands...
3,364,125 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,092 UART: [rt]cmd =0x46504c54, len=4
3,395,238 >>> mbox cmd response data (8 bytes)
3,395,523 UART: [rt] FIPS self test
3,395,851 UART: [kat] ++
3,396,003 UART: [kat] sha1
3,400,311 UART: [kat] SHA2-256
3,400,721 UART: Fatal Error: 0x90010001
3,402,260 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,265 >>> mbox cmd response: failed
3,402,265 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,270 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,923 UART: [state] LifecycleState = Unprovisioned
85,578 UART: [state] DebugLocked = No
86,064 UART: [state] WD Timer not started. Device not locked for debugging
87,291 UART: [kat] SHA2-256
890,841 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,945 UART: [kat] ++
895,097 UART: [kat] sha1
899,349 UART: [kat] SHA2-256
901,289 UART: [kat] SHA2-384
904,008 UART: [kat] SHA2-512-ACC
905,909 UART: [kat] ECC-384
915,834 UART: [kat] HMAC-384Kdf
920,410 UART: [kat] LMS
1,168,722 UART: [kat] --
1,169,575 UART: [cold-reset] ++
1,170,089 UART: [fht] FHT @ 0x50003400
1,172,767 UART: [idev] ++
1,172,935 UART: [idev] CDI.KEYID = 6
1,173,296 UART: [idev] SUBJECT.KEYID = 7
1,173,721 UART: [idev] UDS.KEYID = 0
1,174,067 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,720 UART: [idev] Erasing UDS.KEYID = 0
1,198,776 UART: [idev] Sha1 KeyId Algorithm
1,207,474 UART: [idev] --
1,208,683 UART: [ldev] ++
1,208,851 UART: [ldev] CDI.KEYID = 6
1,209,215 UART: [ldev] SUBJECT.KEYID = 5
1,209,642 UART: [ldev] AUTHORITY.KEYID = 7
1,210,105 UART: [ldev] FE.KEYID = 1
1,215,325 UART: [ldev] Erasing FE.KEYID = 1
1,241,590 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,978 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,694 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,583 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,295 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,327 UART: [ldev] --
1,280,684 UART: [fwproc] Wait for Commands...
1,281,307 UART: [fwproc] Recv command 0x46574c44
1,282,040 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,513 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,944 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,119 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,666 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,573 ready_for_fw is high
1,059,573 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,833 >>> mbox cmd response: success
2,754,708 UART:
2,754,724 UART: Running Caliptra FMC ...
2,755,132 UART:
2,755,275 UART: [state] CFI Enabled
2,766,287 UART: [fht] FMC Alias Private Key: 7
2,885,611 UART: [art] Extend RT PCRs Done
2,886,039 UART: [art] Lock RT PCRs Done
2,887,573 UART: [art] Populate DV Done
2,895,570 UART: [fht] FMC Alias Private Key: 7
2,896,596 UART: [art] Derive CDI
2,896,876 UART: [art] Store in slot 0x4
2,982,361 UART: [art] Derive Key Pair
2,982,721 UART: [art] Store priv key in slot 0x5
2,996,049 UART: [art] Derive Key Pair - Done
3,011,126 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,253 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,018 UART: [art] PUB.X = C758484FC83E50C897BF84023FBF617C23EFAD585819BF4D28149A2842B3A300334A53A25BBB8FF6A1186BCC54E7E289
3,033,769 UART: [art] PUB.Y = 60CA98CBA254E8FEC8DEB038237A8681C568AA05B30422020797597D730A68AF15FCCC931588621DED0BD64999012AB6
3,040,700 UART: [art] SIG.R = 4DB44CE033B6EA6F8BE1B6F9347D6F533A3C8E49AED97D32019F359F05E43FA736DBC9C66F826E99A031797F1EAA7B27
3,047,478 UART: [art] SIG.S = 427504D1D7CF1D2A39D7FC0B55CA28F736483C0EDBCD31E1D029272C209997D7C870BF9DBB8513F3C369877C3E7E4BE5
3,071,341 UART: Caliptra RT
3,071,684 UART: [state] CFI Enabled
3,191,482 UART: [rt] RT listening for mailbox commands...
3,192,145 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,126 UART: [rt]cmd =0x46504c54, len=4
3,223,272 >>> mbox cmd response data (8 bytes)
3,223,541 UART: [rt] FIPS self test
3,223,869 UART: [kat] ++
3,224,021 UART: [kat] sha1
3,228,163 UART: [kat] SHA2-256
3,228,687 UART: Fatal Error: 0x90010001
3,230,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,231 >>> mbox cmd response: failed
3,230,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,236 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,881 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,277 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,609 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,835 UART: [kat] SHA2-256
903,775 UART: [kat] SHA2-384
906,518 UART: [kat] SHA2-512-ACC
908,419 UART: [kat] ECC-384
918,570 UART: [kat] HMAC-384Kdf
923,006 UART: [kat] LMS
1,171,334 UART: [kat] --
1,172,215 UART: [cold-reset] ++
1,172,727 UART: [fht] FHT @ 0x50003400
1,175,386 UART: [idev] ++
1,175,554 UART: [idev] CDI.KEYID = 6
1,175,914 UART: [idev] SUBJECT.KEYID = 7
1,176,338 UART: [idev] UDS.KEYID = 0
1,176,683 ready_for_fw is high
1,176,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,400 UART: [idev] Erasing UDS.KEYID = 0
1,201,073 UART: [idev] Sha1 KeyId Algorithm
1,209,537 UART: [idev] --
1,210,543 UART: [ldev] ++
1,210,711 UART: [ldev] CDI.KEYID = 6
1,211,074 UART: [ldev] SUBJECT.KEYID = 5
1,211,500 UART: [ldev] AUTHORITY.KEYID = 7
1,211,963 UART: [ldev] FE.KEYID = 1
1,217,009 UART: [ldev] Erasing FE.KEYID = 1
1,243,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,227 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,943 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,661 UART: [ldev] --
1,283,034 UART: [fwproc] Wait for Commands...
1,283,662 UART: [fwproc] Recv command 0x46574c44
1,284,390 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,545 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,374 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,077 >>> mbox cmd response: success
2,840,139 UART: [afmc] ++
2,840,307 UART: [afmc] CDI.KEYID = 6
2,840,669 UART: [afmc] SUBJECT.KEYID = 7
2,841,094 UART: [afmc] AUTHORITY.KEYID = 5
2,876,405 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,662 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,371 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,254 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,955 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,793 UART: [afmc] --
2,919,717 UART: [cold-reset] --
2,920,283 UART: [state] Locking Datavault
2,921,438 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,042 UART: [state] Locking ICCM
2,922,520 UART: [exit] Launching FMC @ 0x40000130
2,927,850 UART:
2,927,866 UART: Running Caliptra FMC ...
2,928,274 UART:
2,928,328 UART: [state] CFI Enabled
2,938,850 UART: [fht] FMC Alias Private Key: 7
3,058,188 UART: [art] Extend RT PCRs Done
3,058,616 UART: [art] Lock RT PCRs Done
3,060,338 UART: [art] Populate DV Done
3,068,215 UART: [fht] FMC Alias Private Key: 7
3,069,217 UART: [art] Derive CDI
3,069,497 UART: [art] Store in slot 0x4
3,154,892 UART: [art] Derive Key Pair
3,155,252 UART: [art] Store priv key in slot 0x5
3,168,560 UART: [art] Derive Key Pair - Done
3,183,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,789 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,554 UART: [art] PUB.X = 6D8A82D32D012749868614BEBA84EF3116D7751E304CB1F235099C1AC2EDA14B2B534EF725C0F710D2C85206A34CF426
3,206,317 UART: [art] PUB.Y = 13E297AD06278B60F077E6C019FB11D7A1B90B60BBF4BD80CD40CDBBEB4A4AE1653CB155385F9FFD55B39B592FB50006
3,213,252 UART: [art] SIG.R = 55F70AF4A0139930094C17579C8F2FEA06CFE17FE0D8DFBFF7A2DB827222E51EC351D1BEED13D4DA43CE46F7C81DA121
3,220,033 UART: [art] SIG.S = 31223FD164F7A896200E03199C263A07737AE333CB15E5137B5988E894F5DAD97D5E89A09717859F71C76F6422FBFBA5
3,243,498 UART: Caliptra RT
3,243,749 UART: [state] CFI Enabled
3,363,069 UART: [rt] RT listening for mailbox commands...
3,363,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,835 UART: [rt]cmd =0x46504c54, len=4
3,394,993 >>> mbox cmd response data (8 bytes)
3,395,302 UART: [rt] FIPS self test
3,395,630 UART: [kat] ++
3,395,782 UART: [kat] sha1
3,400,096 UART: [kat] SHA2-256
3,400,638 UART: Fatal Error: 0x90010001
3,402,177 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,182 >>> mbox cmd response: failed
3,402,182 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,187 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,437 UART: [state] WD Timer not started. Device not locked for debugging
87,560 UART: [kat] SHA2-256
893,210 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,335 UART: [kat] ++
897,487 UART: [kat] sha1
901,639 UART: [kat] SHA2-256
903,579 UART: [kat] SHA2-384
906,562 UART: [kat] SHA2-512-ACC
908,463 UART: [kat] ECC-384
918,146 UART: [kat] HMAC-384Kdf
922,856 UART: [kat] LMS
1,171,184 UART: [kat] --
1,171,993 UART: [cold-reset] ++
1,172,337 UART: [fht] FHT @ 0x50003400
1,175,062 UART: [idev] ++
1,175,230 UART: [idev] CDI.KEYID = 6
1,175,590 UART: [idev] SUBJECT.KEYID = 7
1,176,014 UART: [idev] UDS.KEYID = 0
1,176,359 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,008 UART: [idev] Erasing UDS.KEYID = 0
1,201,085 UART: [idev] Sha1 KeyId Algorithm
1,209,497 UART: [idev] --
1,210,565 UART: [ldev] ++
1,210,733 UART: [ldev] CDI.KEYID = 6
1,211,096 UART: [ldev] SUBJECT.KEYID = 5
1,211,522 UART: [ldev] AUTHORITY.KEYID = 7
1,211,985 UART: [ldev] FE.KEYID = 1
1,217,161 UART: [ldev] Erasing FE.KEYID = 1
1,242,736 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,249 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,965 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,856 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,568 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,625 UART: [ldev] --
1,282,080 UART: [fwproc] Wait for Commands...
1,282,684 UART: [fwproc] Recv command 0x46574c44
1,283,412 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,411 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,620 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,790 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,463 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,275 ready_for_fw is high
1,059,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,252 >>> mbox cmd response: success
2,752,753 UART:
2,752,769 UART: Running Caliptra FMC ...
2,753,177 UART:
2,753,231 UART: [state] CFI Enabled
2,764,135 UART: [fht] FMC Alias Private Key: 7
2,883,009 UART: [art] Extend RT PCRs Done
2,883,437 UART: [art] Lock RT PCRs Done
2,884,799 UART: [art] Populate DV Done
2,893,090 UART: [fht] FMC Alias Private Key: 7
2,894,190 UART: [art] Derive CDI
2,894,470 UART: [art] Store in slot 0x4
2,980,687 UART: [art] Derive Key Pair
2,981,047 UART: [art] Store priv key in slot 0x5
2,994,519 UART: [art] Derive Key Pair - Done
3,009,090 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,231 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,996 UART: [art] PUB.X = EE60470F81EB79ABFD7B705493265E36E61DDE2024DDD0DF43000913B7A621938455D3268DB3FA5E15DF0683BCAB53DF
3,031,745 UART: [art] PUB.Y = 85463E19EB23B92974E0C73B062BFAA806398248E3FBD37C682D004EFF7BE2B6A69714094D74FA2153D548BEC72F40FD
3,038,670 UART: [art] SIG.R = 0315DA5922B96CD4486893E4077FF2BBE62FA95BFB0E9C25C16340C54D9C0B07D521234917E5AB678E06F80C1C79C3AF
3,045,425 UART: [art] SIG.S = 5C08F786D353AFDF7B7A48BD08CF6DD365D0FAF3C08FE6DD594039B1E117180F73038542ED8BFAECF94C5DC0E21A257E
3,069,071 UART: Caliptra RT
3,069,322 UART: [state] CFI Enabled
3,188,624 UART: [rt] RT listening for mailbox commands...
3,189,287 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,832 UART: [rt]cmd =0x46504c54, len=4
3,220,000 >>> mbox cmd response data (8 bytes)
3,220,217 UART: [rt] FIPS self test
3,220,545 UART: [kat] ++
3,220,697 UART: [kat] sha1
3,224,699 UART: [kat] SHA2-256
3,225,097 UART: Fatal Error: 0x90010001
3,226,636 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,641 >>> mbox cmd response: failed
3,226,641 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,226,646 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,371 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,060 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,471 UART: [state] LifecycleState = Unprovisioned
86,126 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,204 UART: [kat] SHA2-256
904,144 UART: [kat] SHA2-384
906,813 UART: [kat] SHA2-512-ACC
908,714 UART: [kat] ECC-384
918,723 UART: [kat] HMAC-384Kdf
923,455 UART: [kat] LMS
1,171,783 UART: [kat] --
1,172,746 UART: [cold-reset] ++
1,173,292 UART: [fht] FHT @ 0x50003400
1,176,067 UART: [idev] ++
1,176,235 UART: [idev] CDI.KEYID = 6
1,176,595 UART: [idev] SUBJECT.KEYID = 7
1,177,019 UART: [idev] UDS.KEYID = 0
1,177,364 ready_for_fw is high
1,177,364 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,627 UART: [idev] Erasing UDS.KEYID = 0
1,201,218 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,608 UART: [ldev] ++
1,210,776 UART: [ldev] CDI.KEYID = 6
1,211,139 UART: [ldev] SUBJECT.KEYID = 5
1,211,565 UART: [ldev] AUTHORITY.KEYID = 7
1,212,028 UART: [ldev] FE.KEYID = 1
1,217,334 UART: [ldev] Erasing FE.KEYID = 1
1,243,445 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,974 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,690 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,581 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,293 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,392 UART: [ldev] --
1,282,805 UART: [fwproc] Wait for Commands...
1,283,615 UART: [fwproc] Recv command 0x46574c44
1,284,343 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,748 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,449 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,619 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,194 >>> mbox cmd response: success
2,840,256 UART: [afmc] ++
2,840,424 UART: [afmc] CDI.KEYID = 6
2,840,786 UART: [afmc] SUBJECT.KEYID = 7
2,841,211 UART: [afmc] AUTHORITY.KEYID = 5
2,876,484 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,091 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,839 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,548 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,431 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,132 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,932 UART: [afmc] --
2,919,948 UART: [cold-reset] --
2,921,002 UART: [state] Locking Datavault
2,921,969 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,573 UART: [state] Locking ICCM
2,923,113 UART: [exit] Launching FMC @ 0x40000130
2,928,443 UART:
2,928,459 UART: Running Caliptra FMC ...
2,928,867 UART:
2,929,010 UART: [state] CFI Enabled
2,939,758 UART: [fht] FMC Alias Private Key: 7
3,058,964 UART: [art] Extend RT PCRs Done
3,059,392 UART: [art] Lock RT PCRs Done
3,061,190 UART: [art] Populate DV Done
3,069,249 UART: [fht] FMC Alias Private Key: 7
3,070,245 UART: [art] Derive CDI
3,070,525 UART: [art] Store in slot 0x4
3,156,314 UART: [art] Derive Key Pair
3,156,674 UART: [art] Store priv key in slot 0x5
3,170,652 UART: [art] Derive Key Pair - Done
3,185,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,893 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,658 UART: [art] PUB.X = A6A2F5BAA146B3BA86CA3602B8041964C17E70CEE9F4B32A7414EB4C2ED34F0F483FF693D1706D03F944E9228AE57AAB
3,208,430 UART: [art] PUB.Y = 0D19608C1D950AD68FA9E271C7268AA609F32B44EC53679ABB901EC887BB9D3DAF16089CE331D6FE090D2F8F9BF02E86
3,215,374 UART: [art] SIG.R = B594D9CDD9AB5001B2D7DDC0C95B0E1E36388EEF3D6AC211DA9E82F8A840ADF940595BB8D2ECD093DA4B929CAB7621A7
3,222,162 UART: [art] SIG.S = 45EE2F563CD44EF41930F346383F2BA984B9446BF2A1168939D2F227A3EF5732497D77F9D51E04A9FEE69C3C22AF3479
3,246,287 UART: Caliptra RT
3,246,630 UART: [state] CFI Enabled
3,366,497 UART: [rt] RT listening for mailbox commands...
3,367,160 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,909 UART: [rt]cmd =0x46504c54, len=4
3,398,149 >>> mbox cmd response data (8 bytes)
3,398,476 UART: [rt] FIPS self test
3,398,804 UART: [kat] ++
3,398,956 UART: [kat] sha1
3,403,422 UART: [kat] SHA2-256
3,403,996 UART: Fatal Error: 0x90010001
3,405,535 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,540 >>> mbox cmd response: failed
3,405,540 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,545 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,279 UART: [state] LifecycleState = Unprovisioned
85,934 UART: [state] DebugLocked = No
86,542 UART: [state] WD Timer not started. Device not locked for debugging
87,725 UART: [kat] SHA2-256
893,375 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,500 UART: [kat] ++
897,652 UART: [kat] sha1
901,910 UART: [kat] SHA2-256
903,850 UART: [kat] SHA2-384
906,623 UART: [kat] SHA2-512-ACC
908,524 UART: [kat] ECC-384
918,735 UART: [kat] HMAC-384Kdf
923,385 UART: [kat] LMS
1,171,713 UART: [kat] --
1,172,718 UART: [cold-reset] ++
1,173,234 UART: [fht] FHT @ 0x50003400
1,175,901 UART: [idev] ++
1,176,069 UART: [idev] CDI.KEYID = 6
1,176,429 UART: [idev] SUBJECT.KEYID = 7
1,176,853 UART: [idev] UDS.KEYID = 0
1,177,198 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,573 UART: [idev] Erasing UDS.KEYID = 0
1,201,682 UART: [idev] Sha1 KeyId Algorithm
1,210,232 UART: [idev] --
1,211,242 UART: [ldev] ++
1,211,410 UART: [ldev] CDI.KEYID = 6
1,211,773 UART: [ldev] SUBJECT.KEYID = 5
1,212,199 UART: [ldev] AUTHORITY.KEYID = 7
1,212,662 UART: [ldev] FE.KEYID = 1
1,217,782 UART: [ldev] Erasing FE.KEYID = 1
1,244,797 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,091 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,803 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,022 UART: [ldev] --
1,284,363 UART: [fwproc] Wait for Commands...
1,284,949 UART: [fwproc] Recv command 0x46574c44
1,285,677 UART: [fwproc] Recv'd Img size: 119428 bytes
2,641,758 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,981 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,700,151 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,668 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,358 ready_for_fw is high
1,061,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,949 >>> mbox cmd response: success
2,755,074 UART:
2,755,090 UART: Running Caliptra FMC ...
2,755,498 UART:
2,755,641 UART: [state] CFI Enabled
2,766,725 UART: [fht] FMC Alias Private Key: 7
2,885,347 UART: [art] Extend RT PCRs Done
2,885,775 UART: [art] Lock RT PCRs Done
2,887,363 UART: [art] Populate DV Done
2,895,610 UART: [fht] FMC Alias Private Key: 7
2,896,566 UART: [art] Derive CDI
2,896,846 UART: [art] Store in slot 0x4
2,982,663 UART: [art] Derive Key Pair
2,983,023 UART: [art] Store priv key in slot 0x5
2,996,015 UART: [art] Derive Key Pair - Done
3,011,054 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,907 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,672 UART: [art] PUB.X = 456EEFA223AF9227C51B668FF21CEEE26153E8548BCAF2FE204ECEACE64318D9C7ED32FAA2E15927CF0BB6FF5E869C9F
3,034,465 UART: [art] PUB.Y = F4C8DA8A7AB7D0451FBC154474EE1E204013DC000227108AD822543CF661B3C06AD77F5366064090F3442C37B50DC488
3,041,382 UART: [art] SIG.R = D01EE9AFEA3AD38C987DC220FE8579F2F185970B4D3ECFC88735D77485A0F723942E2899C4D093B0516AB8F956E2D7E5
3,048,157 UART: [art] SIG.S = EAF1D52A0155FB21D0AF71BEA4EDCBADD6EAB0335C17FF9E98A432ADB6D0D1D3F4B98133226C00F5EDAEA6EF18860404
3,071,922 UART: Caliptra RT
3,072,265 UART: [state] CFI Enabled
3,192,615 UART: [rt] RT listening for mailbox commands...
3,193,278 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,887 UART: [rt]cmd =0x46504c54, len=4
3,223,937 >>> mbox cmd response data (8 bytes)
3,224,148 UART: [rt] FIPS self test
3,224,476 UART: [kat] ++
3,224,628 UART: [kat] sha1
3,228,826 UART: [kat] SHA2-256
3,229,404 UART: Fatal Error: 0x90010001
3,230,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,948 >>> mbox cmd response: failed
3,230,948 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,953 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,076 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,435 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,196 writing to cptra_bootfsm_go
2,510,870 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,660,611 >>> mbox cmd response: failed
2,661,167 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,039 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
3,428,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,043 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
2,510,554 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,660,352 >>> mbox cmd response: failed
2,661,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,810,052 >>> mbox cmd response: failed
Initializing fuses
983 writing to cptra_bootfsm_go
3,430,469 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,257,074 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,272 writing to cptra_bootfsm_go
2,865,925 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,015,687 >>> mbox cmd response: failed
3,016,257 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,165,670 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
20,171,922 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,889,744 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,432 writing to cptra_bootfsm_go
2,870,105 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,019,886 >>> mbox cmd response: failed
3,020,457 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,169,169 >>> mbox cmd response: failed
Initializing fuses
964 writing to cptra_bootfsm_go
20,166,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,623 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,110 writing to cptra_bootfsm_go
2,516,909 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,666,720 >>> mbox cmd response: failed
2,667,275 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,816,151 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
3,462,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,728 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,106 writing to cptra_bootfsm_go
2,512,339 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,662,034 >>> mbox cmd response: failed
2,662,597 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,811,478 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,446,577 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,279,054 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
2,867,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,017,102 >>> mbox cmd response: failed
3,017,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,166,826 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
20,174,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,756 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,188 writing to cptra_bootfsm_go
2,878,216 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,028,495 >>> mbox cmd response: failed
3,029,099 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,178,451 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,175,971 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,052 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.71s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,552 >>> mbox cmd response: failed
87,552 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,558 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,674 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,746 >>> mbox cmd response: failed
87,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,583 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,272 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,473 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,481 >>> mbox cmd response: failed
87,481 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,487 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,400 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,593 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.13s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,415 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,423 >>> mbox cmd response: failed
87,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,429 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,018 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,423 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,314 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,322 >>> mbox cmd response: failed
87,322 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,328 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,877 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,224 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,102 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,110 >>> mbox cmd response: failed
87,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,116 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,991 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,058 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
88,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,313 >>> mbox cmd response: failed
88,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
88,319 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,674 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,207 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
87,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,763 >>> mbox cmd response: failed
87,763 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
87,769 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,129 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.04s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,953 writing to cptra_bootfsm_go
192,108 UART:
192,462 UART: Running Caliptra ROM ...
193,562 UART:
193,708 UART: [state] CFI Enabled
265,947 UART: [state] LifecycleState = Unprovisioned
267,945 UART: [state] DebugLocked = No
269,275 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,581 UART: [kat] SHA2-256
443,268 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,743 UART: [kat] ++
454,221 UART: [kat] sha1
464,174 UART: [kat] SHA2-256
466,835 UART: [kat] SHA2-384
473,892 UART: [kat] SHA2-512-ACC
476,274 UART: [kat] ECC-384
2,766,453 UART: [kat] HMAC-384Kdf
2,798,896 UART: [kat] LMS
3,989,248 UART: [kat] --
3,992,409 UART: [cold-reset] ++
3,993,989 UART: [fht] Storing FHT @ 0x50003400
4,005,620 UART: [idev] ++
4,006,192 UART: [idev] CDI.KEYID = 6
4,007,089 UART: [idev] SUBJECT.KEYID = 7
4,008,345 UART: [idev] UDS.KEYID = 0
4,009,341 ready_for_fw is high
4,009,575 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,159,828 UART: [idev] Erasing UDS.KEYID = 0
7,340,298 UART: [idev] Using Sha1 for KeyId Algorithm
7,361,759 UART: [idev] --
7,366,026 UART: [ldev] ++
7,366,604 UART: [ldev] CDI.KEYID = 6
7,367,627 UART: [ldev] SUBJECT.KEYID = 5
7,368,808 UART: [ldev] AUTHORITY.KEYID = 7
7,370,044 UART: [ldev] FE.KEYID = 1
7,414,362 UART: [ldev] Erasing FE.KEYID = 1
10,748,750 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,060,734 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,075,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,090,154 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,104,654 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,125,053 UART: [ldev] --
13,130,219 UART: [fwproc] Waiting for Commands...
13,132,268 UART: [fwproc] Received command 0x46574c44
13,134,457 UART: [fwproc] Received Image of size 119428 bytes
17,247,682 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,321,883 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,395,081 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,726,223 >>> mbox cmd response: success
17,730,195 UART: [afmc] ++
17,730,784 UART: [afmc] CDI.KEYID = 6
17,731,697 UART: [afmc] SUBJECT.KEYID = 7
17,732,968 UART: [afmc] AUTHORITY.KEYID = 5
21,107,778 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,403,835 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,406,092 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,420,569 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,435,294 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,449,691 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,470,302 UART: [afmc] --
23,474,435 UART: [cold-reset] --
23,479,536 UART: [state] Locking Datavault
23,485,302 UART: [state] Locking PCR0, PCR1 and PCR31
23,487,100 UART: [state] Locking ICCM
23,488,721 UART: [exit] Launching FMC @ 0x40000130
23,497,138 UART:
23,497,381 UART: Running Caliptra FMC ...
23,498,486 UART:
23,498,651 UART: [state] CFI Enabled
23,564,785 UART: [fht] FMC Alias Private Key: 7
25,905,194 UART: [art] Extend RT PCRs Done
25,906,462 UART: [art] Lock RT PCRs Done
25,907,900 UART: [art] Populate DV Done
25,913,157 UART: [fht] FMC Alias Private Key: 7
25,914,652 UART: [art] Derive CDI
25,915,416 UART: [art] Store in slot 0x4
25,972,733 UART: [art] Derive Key Pair
25,973,768 UART: [art] Store priv key in slot 0x5
29,266,804 UART: [art] Derive Key Pair - Done
29,279,580 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,568,372 UART: [art] Erasing AUTHORITY.KEYID = 7
31,569,894 UART: [art] PUB.X = CADEF50EBAC666A115A0193EBEE09AEC59893A30E31A9ED962174218B2AE957744FC443FCC9154CB7D393EA9416A502C
31,577,183 UART: [art] PUB.Y = EE41581B6B80D9D371D40D340BAE11DB74AB4618FD9717F067DC0167F2CE199680CE120D68EF52AAA42540F23AB0CA8C
31,584,390 UART: [art] SIG.R = 1DE9F42139C1A9BB225FE57A7564CA4B7D286E530BC1C5B42E3DBA3D4321F70D831FF99630E6465E5C63393581455771
31,591,807 UART: [art] SIG.S = 794CF71DDCBBB6274EB02605FE4A5D8E827115F18B9C069DF7EB1E6CA23F33F6B7469475B631A03A3EA896490CFE8436
32,896,814 UART: Caliptra RT
32,897,527 UART: [state] CFI Enabled
33,076,040 UART: [rt] RT listening for mailbox commands...
33,077,898 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,107,798 UART: [rt]cmd =0x46504c54, len=4
33,109,246 >>> mbox cmd response data (8 bytes)
33,110,288 UART: [rt] FIPS self test
33,111,235 UART: [kat] ++
33,111,688 UART: [kat] sha1
33,116,302 UART: [kat] SHA2-256
33,117,694 UART: Fatal Error: 0x90010002
33,152,901 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,302,939 >>> mbox cmd response: failed
33,303,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,453,464 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,035 UART:
190,330 UART: Running Caliptra ROM ...
191,354 UART:
191,492 UART: [state] CFI Enabled
249,111 UART: [state] LifecycleState = Unprovisioned
250,993 UART: [state] DebugLocked = No
252,983 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
258,294 UART: [kat] SHA2-256
428,035 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
438,501 UART: [kat] ++
439,011 UART: [kat] sha1
450,022 UART: [kat] SHA2-256
452,717 UART: [kat] SHA2-384
457,454 UART: [kat] SHA2-512-ACC
459,793 UART: [kat] ECC-384
2,752,604 UART: [kat] HMAC-384Kdf
2,783,810 UART: [kat] LMS
3,974,107 UART: [kat] --
3,976,543 UART: [cold-reset] ++
3,979,234 UART: [fht] Storing FHT @ 0x50003400
3,991,313 UART: [idev] ++
3,991,885 UART: [idev] CDI.KEYID = 6
3,992,850 UART: [idev] SUBJECT.KEYID = 7
3,994,068 UART: [idev] UDS.KEYID = 0
3,995,651 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,145,737 UART: [idev] Erasing UDS.KEYID = 0
7,332,217 UART: [idev] Using Sha1 for KeyId Algorithm
7,355,149 UART: [idev] --
7,357,962 UART: [ldev] ++
7,358,533 UART: [ldev] CDI.KEYID = 6
7,359,497 UART: [ldev] SUBJECT.KEYID = 5
7,360,718 UART: [ldev] AUTHORITY.KEYID = 7
7,361,954 UART: [ldev] FE.KEYID = 1
7,406,680 UART: [ldev] Erasing FE.KEYID = 1
10,738,364 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,032,275 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,046,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,061,737 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,076,232 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,094,909 UART: [ldev] --
13,099,478 UART: [fwproc] Waiting for Commands...
13,101,370 UART: [fwproc] Received command 0x46574c44
13,103,561 UART: [fwproc] Received Image of size 119428 bytes
17,219,077 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,299,877 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,373,071 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,704,875 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,900 writing to cptra_bootfsm_go
3,785,063 ready_for_fw is high
3,785,545 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,975,241 >>> mbox cmd response: success
23,672,487 UART:
23,672,893 UART: Running Caliptra FMC ...
23,674,011 UART:
23,674,176 UART: [state] CFI Enabled
23,724,600 UART: [fht] FMC Alias Private Key: 7
26,065,700 UART: [art] Extend RT PCRs Done
26,067,310 UART: [art] Lock RT PCRs Done
26,068,545 UART: [art] Populate DV Done
26,073,883 UART: [fht] FMC Alias Private Key: 7
26,075,594 UART: [art] Derive CDI
26,076,338 UART: [art] Store in slot 0x4
26,136,374 UART: [art] Derive Key Pair
26,137,425 UART: [art] Store priv key in slot 0x5
29,430,099 UART: [art] Derive Key Pair - Done
29,443,046 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,735,434 UART: [art] Erasing AUTHORITY.KEYID = 7
31,736,955 UART: [art] PUB.X = 2FF390AF03287F6A025D5CC99996B8048318A93AA8C65F27B49790B1023F9539C486D4E366C2824DB7922B3D4A5633CD
31,744,192 UART: [art] PUB.Y = 3169DC56AFB8F4061C88DA91609675C243AA41A4D0502A2807136078BBDEA90F791AFBF4ABF4B194541B495DA8CEEF2D
31,751,486 UART: [art] SIG.R = 55A589EA80652DE23CC5F6B523AC980FD232930FA840296EA3085FFA154675B1DD1DE30B7143C335AD2A5AA4C9C817D0
31,758,910 UART: [art] SIG.S = 6064BF7C2BDBE0E062D6F84697828A8ED0C2DDDE97B7CD6413F92A04BABE9EDFB7E77C8B3525865787409133F9780BCD
33,064,512 UART: Caliptra RT
33,065,229 UART: [state] CFI Enabled
33,255,377 UART: [rt] RT listening for mailbox commands...
33,257,239 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,287,290 UART: [rt]cmd =0x46504c54, len=4
33,289,087 >>> mbox cmd response data (8 bytes)
33,290,176 UART: [rt] FIPS self test
33,291,116 UART: [kat] ++
33,291,571 UART: [kat] sha1
33,296,009 UART: [kat] SHA2-256
33,297,675 UART: Fatal Error: 0x90010002
33,332,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,482,810 >>> mbox cmd response: failed
33,483,490 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,633,811 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,765,628 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,950,023 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,277 writing to cptra_bootfsm_go
192,454 UART:
192,846 UART: Running Caliptra ROM ...
194,055 UART:
603,729 UART: [state] CFI Enabled
616,955 UART: [state] LifecycleState = Unprovisioned
618,905 UART: [state] DebugLocked = No
621,791 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,241 UART: [kat] SHA2-256
796,950 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,516 UART: [kat] ++
808,002 UART: [kat] sha1
819,032 UART: [kat] SHA2-256
821,773 UART: [kat] SHA2-384
827,136 UART: [kat] SHA2-512-ACC
829,524 UART: [kat] ECC-384
3,113,351 UART: [kat] HMAC-384Kdf
3,125,536 UART: [kat] LMS
4,315,644 UART: [kat] --
4,319,610 UART: [cold-reset] ++
4,320,631 UART: [fht] Storing FHT @ 0x50003400
4,332,681 UART: [idev] ++
4,333,258 UART: [idev] CDI.KEYID = 6
4,334,145 UART: [idev] SUBJECT.KEYID = 7
4,335,399 UART: [idev] UDS.KEYID = 0
4,336,385 ready_for_fw is high
4,336,605 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,601 UART: [idev] Erasing UDS.KEYID = 0
7,622,220 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,481 UART: [idev] --
7,648,457 UART: [ldev] ++
7,649,034 UART: [ldev] CDI.KEYID = 6
7,650,062 UART: [ldev] SUBJECT.KEYID = 5
7,651,234 UART: [ldev] AUTHORITY.KEYID = 7
7,652,498 UART: [ldev] FE.KEYID = 1
7,662,458 UART: [ldev] Erasing FE.KEYID = 1
10,949,121 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,613 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,200 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,997 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,546 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,014 UART: [ldev] --
13,308,299 UART: [fwproc] Waiting for Commands...
13,311,654 UART: [fwproc] Received command 0x46574c44
13,313,844 UART: [fwproc] Received Image of size 119428 bytes
17,424,804 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,494,634 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,567,836 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,899,819 >>> mbox cmd response: success
17,904,126 UART: [afmc] ++
17,904,738 UART: [afmc] CDI.KEYID = 6
17,905,629 UART: [afmc] SUBJECT.KEYID = 7
17,906,903 UART: [afmc] AUTHORITY.KEYID = 5
21,221,052 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,516,429 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,518,702 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,533,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,547,860 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,562,281 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,585,027 UART: [afmc] --
23,588,634 UART: [cold-reset] --
23,592,504 UART: [state] Locking Datavault
23,598,774 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,552 UART: [state] Locking ICCM
23,601,794 UART: [exit] Launching FMC @ 0x40000130
23,610,201 UART:
23,610,465 UART: Running Caliptra FMC ...
23,611,578 UART:
23,611,747 UART: [state] CFI Enabled
23,619,912 UART: [fht] FMC Alias Private Key: 7
25,960,423 UART: [art] Extend RT PCRs Done
25,961,658 UART: [art] Lock RT PCRs Done
25,963,184 UART: [art] Populate DV Done
25,968,605 UART: [fht] FMC Alias Private Key: 7
25,970,261 UART: [art] Derive CDI
25,971,085 UART: [art] Store in slot 0x4
26,013,646 UART: [art] Derive Key Pair
26,014,697 UART: [art] Store priv key in slot 0x5
29,257,089 UART: [art] Derive Key Pair - Done
29,269,716 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,549,933 UART: [art] Erasing AUTHORITY.KEYID = 7
31,551,448 UART: [art] PUB.X = ADE359F358200D326A687E13F97D0CCE8C664D3D0DDE391B19F4AE8876119347A2A1054F26F69AF44426DB6A8F0746F3
31,558,726 UART: [art] PUB.Y = F367DEC7EC5EA36A47A9BEF08514FB5494CAE6ABA65E360769929FA3E8811370C7A30E4B841811FD38C218A53DC7F643
31,565,973 UART: [art] SIG.R = BB0669F96AEA91FA58F39D174B7721CFB9BFEE07EAC22B8E9EC2F94A0843CC066AC061719AE286219E439E7FE0E6F25E
31,573,385 UART: [art] SIG.S = 047EDDE9C361979826027FA50239D45FC3AF0DEE90F853D71E94CC6FACBDBD443ECC79062924FC2DF9C76DC32F959C87
32,878,579 UART: Caliptra RT
32,879,299 UART: [state] CFI Enabled
33,012,841 UART: [rt] RT listening for mailbox commands...
33,014,706 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,044,345 UART: [rt]cmd =0x46504c54, len=4
33,045,798 >>> mbox cmd response data (8 bytes)
33,046,810 UART: [rt] FIPS self test
33,047,757 UART: [kat] ++
33,048,218 UART: [kat] sha1
33,052,521 UART: [kat] SHA2-256
33,054,028 UART: Fatal Error: 0x90010002
33,089,250 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,239,219 >>> mbox cmd response: failed
33,239,849 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,389,730 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,162 UART:
190,457 UART: Running Caliptra ROM ...
191,487 UART:
7,128,648 UART: [state] CFI Enabled
7,145,347 UART: [state] LifecycleState = Unprovisioned
7,147,271 UART: [state] DebugLocked = No
7,148,586 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,153,538 UART: [kat] SHA2-256
7,323,296 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,333,825 UART: [kat] ++
7,334,290 UART: [kat] sha1
7,344,587 UART: [kat] SHA2-256
7,347,256 UART: [kat] SHA2-384
7,352,336 UART: [kat] SHA2-512-ACC
7,354,690 UART: [kat] ECC-384
9,640,451 UART: [kat] HMAC-384Kdf
9,652,866 UART: [kat] LMS
10,842,998 UART: [kat] --
10,847,524 UART: [cold-reset] ++
10,849,467 UART: [fht] Storing FHT @ 0x50003400
10,861,006 UART: [idev] ++
10,861,582 UART: [idev] CDI.KEYID = 6
10,862,608 UART: [idev] SUBJECT.KEYID = 7
10,863,771 UART: [idev] UDS.KEYID = 0
10,865,409 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,015,301 UART: [idev] Erasing UDS.KEYID = 0
14,151,365 UART: [idev] Using Sha1 for KeyId Algorithm
14,174,107 UART: [idev] --
14,179,262 UART: [ldev] ++
14,179,837 UART: [ldev] CDI.KEYID = 6
14,180,858 UART: [ldev] SUBJECT.KEYID = 5
14,182,022 UART: [ldev] AUTHORITY.KEYID = 7
14,183,311 UART: [ldev] FE.KEYID = 1
14,193,909 UART: [ldev] Erasing FE.KEYID = 1
17,481,059 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,775,625 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,790,218 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,045 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,819,567 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,838,564 UART: [ldev] --
19,843,131 UART: [fwproc] Waiting for Commands...
19,846,378 UART: [fwproc] Received command 0x46574c44
19,848,572 UART: [fwproc] Received Image of size 119428 bytes
23,969,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,050,069 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,123,206 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,455,206 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
4,129,334 ready_for_fw is high
4,129,785 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,178,024 >>> mbox cmd response: success
23,813,822 UART:
23,814,266 UART: Running Caliptra FMC ...
23,815,389 UART:
23,815,559 UART: [state] CFI Enabled
23,823,578 UART: [fht] FMC Alias Private Key: 7
26,163,729 UART: [art] Extend RT PCRs Done
26,164,967 UART: [art] Lock RT PCRs Done
26,166,385 UART: [art] Populate DV Done
26,172,077 UART: [fht] FMC Alias Private Key: 7
26,173,666 UART: [art] Derive CDI
26,174,450 UART: [art] Store in slot 0x4
26,217,111 UART: [art] Derive Key Pair
26,218,124 UART: [art] Store priv key in slot 0x5
29,460,033 UART: [art] Derive Key Pair - Done
29,473,214 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,753,385 UART: [art] Erasing AUTHORITY.KEYID = 7
31,754,900 UART: [art] PUB.X = A27186CFDAE384A814B5FCBA0B0CAEF025799FCCCDFE1F1510D691BB05C26B69A53845F623ACDD7CE5EA61AB52679205
31,762,172 UART: [art] PUB.Y = EA7D29C2073A80296CB77153022548B1158BF6E0E1A76D39ABD27AC96D37D556B367AC0CEA5AF561A9C8B980CC9837D5
31,769,401 UART: [art] SIG.R = 941346D69E77F90A410135E771C8329E10363F44D29EB3FEF5A1161D530C59214304D74F464577252F87E475FC2BA96F
31,776,797 UART: [art] SIG.S = 6D38AB348F192DCD75F7C1C7263DA927E6DCB9BA28BEC6CDF472354789CB51937FFB07B84FACC6B6DA19DBB3E202C117
33,082,032 UART: Caliptra RT
33,082,759 UART: [state] CFI Enabled
33,216,211 UART: [rt] RT listening for mailbox commands...
33,218,078 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,247,820 UART: [rt]cmd =0x46504c54, len=4
33,249,238 >>> mbox cmd response data (8 bytes)
33,250,624 UART: [rt] FIPS self test
33,251,568 UART: [kat] ++
33,252,025 UART: [kat] sha1
33,256,488 UART: [kat] SHA2-256
33,258,046 UART: Fatal Error: 0x90010002
33,293,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,443,218 >>> mbox cmd response: failed
33,443,887 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,593,831 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,465,619 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,506,054 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
192,224 UART:
192,587 UART: Running Caliptra ROM ...
193,735 UART:
193,886 UART: [state] CFI Enabled
262,582 UART: [state] LifecycleState = Unprovisioned
264,491 UART: [state] DebugLocked = No
267,100 UART: [state] WD Timer not started. Device not locked for debugging
271,816 UART: [kat] SHA2-256
451,450 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,255 UART: [kat] ++
462,796 UART: [kat] sha1
473,826 UART: [kat] SHA2-256
476,504 UART: [kat] SHA2-384
483,573 UART: [kat] SHA2-512-ACC
485,960 UART: [kat] ECC-384
2,947,845 UART: [kat] HMAC-384Kdf
2,970,607 UART: [kat] LMS
3,447,139 UART: [kat] --
3,452,557 UART: [cold-reset] ++
3,454,639 UART: [fht] FHT @ 0x50003400
3,465,488 UART: [idev] ++
3,466,054 UART: [idev] CDI.KEYID = 6
3,467,097 UART: [idev] SUBJECT.KEYID = 7
3,468,285 UART: [idev] UDS.KEYID = 0
3,469,216 ready_for_fw is high
3,469,433 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,345 UART: [idev] Erasing UDS.KEYID = 0
5,988,654 UART: [idev] Sha1 KeyId Algorithm
6,013,316 UART: [idev] --
6,018,511 UART: [ldev] ++
6,019,095 UART: [ldev] CDI.KEYID = 6
6,020,022 UART: [ldev] SUBJECT.KEYID = 5
6,021,251 UART: [ldev] AUTHORITY.KEYID = 7
6,022,416 UART: [ldev] FE.KEYID = 1
6,058,433 UART: [ldev] Erasing FE.KEYID = 1
8,564,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,298,298 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,145 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,044 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,345,622 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,662 UART: [ldev] --
10,373,436 UART: [fwproc] Wait for Commands...
10,375,276 UART: [fwproc] Recv command 0x46574c44
10,377,276 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,153 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,460 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,491 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,103 >>> mbox cmd response: success
14,358,911 UART: [afmc] ++
14,359,512 UART: [afmc] CDI.KEYID = 6
14,360,436 UART: [afmc] SUBJECT.KEYID = 7
14,361,655 UART: [afmc] AUTHORITY.KEYID = 5
16,894,301 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,616,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,618,522 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,634,316 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,650,375 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,665,944 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,689,537 UART: [afmc] --
18,693,231 UART: [cold-reset] --
18,696,531 UART: [state] Locking Datavault
18,701,297 UART: [state] Locking PCR0, PCR1 and PCR31
18,703,067 UART: [state] Locking ICCM
18,705,331 UART: [exit] Launching FMC @ 0x40000130
18,713,731 UART:
18,713,970 UART: Running Caliptra FMC ...
18,715,081 UART:
18,715,252 UART: [state] CFI Enabled
18,773,080 UART: [fht] FMC Alias Private Key: 7
20,539,300 UART: [art] Extend RT PCRs Done
20,540,540 UART: [art] Lock RT PCRs Done
20,542,016 UART: [art] Populate DV Done
20,547,382 UART: [fht] FMC Alias Private Key: 7
20,548,933 UART: [art] Derive CDI
20,549,754 UART: [art] Store in slot 0x4
20,605,879 UART: [art] Derive Key Pair
20,606,939 UART: [art] Store priv key in slot 0x5
23,069,342 UART: [art] Derive Key Pair - Done
23,082,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,795,331 UART: [art] Erasing AUTHORITY.KEYID = 7
24,796,834 UART: [art] PUB.X = A4B35D0786AFC342B73A1D38E2CB53258C4AED6876024500B83F31DAB8ACD6C41067838112C25ED01E65D5D5545B2B83
24,804,100 UART: [art] PUB.Y = 45762A36861EC86F2AF7D2349C03EC50BEABA0899D024E0CB5F7C578E5896B9BD85752F1E4B08CAE2EE2834D606DE43A
24,811,395 UART: [art] SIG.R = 516F79AD3EC908FBB27BF4807E50B775404049850047D9094B6E83F19025238D6401E23C957523BBAD7F59B3BEC78C69
24,818,739 UART: [art] SIG.S = 71D51F1664E93876B2FEFF243C34755FEF1BADBA3B9A3E0555C5CD6C2328B12D1613331764590A0F551969778EFD254A
25,797,508 UART: Caliptra RT
25,798,240 UART: [state] CFI Enabled
25,979,302 UART: [rt] RT listening for mailbox commands...
25,981,165 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,010,933 UART: [rt]cmd =0x46504c54, len=4
26,012,511 >>> mbox cmd response data (8 bytes)
26,014,022 UART: [rt] FIPS self test
26,014,974 UART: [kat] ++
26,015,452 UART: [kat] sha1
26,019,642 UART: [kat] SHA2-256
26,021,145 UART: Fatal Error: 0x90010002
26,056,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,206,395 >>> mbox cmd response: failed
26,207,079 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,357,167 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,034 UART:
190,330 UART: Running Caliptra ROM ...
191,366 UART:
191,509 UART: [state] CFI Enabled
244,604 UART: [state] LifecycleState = Unprovisioned
246,625 UART: [state] DebugLocked = No
248,147 UART: [state] WD Timer not started. Device not locked for debugging
251,896 UART: [kat] SHA2-256
431,511 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
442,328 UART: [kat] ++
442,777 UART: [kat] sha1
454,250 UART: [kat] SHA2-256
456,937 UART: [kat] SHA2-384
463,025 UART: [kat] SHA2-512-ACC
465,380 UART: [kat] ECC-384
2,911,462 UART: [kat] HMAC-384Kdf
2,933,594 UART: [kat] LMS
3,410,099 UART: [kat] --
3,415,349 UART: [cold-reset] ++
3,417,288 UART: [fht] FHT @ 0x50003400
3,428,707 UART: [idev] ++
3,429,282 UART: [idev] CDI.KEYID = 6
3,430,173 UART: [idev] SUBJECT.KEYID = 7
3,431,463 UART: [idev] UDS.KEYID = 0
3,432,967 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,583,163 UART: [idev] Erasing UDS.KEYID = 0
5,952,235 UART: [idev] Sha1 KeyId Algorithm
5,975,518 UART: [idev] --
5,980,661 UART: [ldev] ++
5,981,291 UART: [ldev] CDI.KEYID = 6
5,982,179 UART: [ldev] SUBJECT.KEYID = 5
5,983,395 UART: [ldev] AUTHORITY.KEYID = 7
5,984,632 UART: [ldev] FE.KEYID = 1
6,018,601 UART: [ldev] Erasing FE.KEYID = 1
8,531,138 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,263,491 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,279,340 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,295,213 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,310,778 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,333,305 UART: [ldev] --
10,339,448 UART: [fwproc] Wait for Commands...
10,340,963 UART: [fwproc] Recv command 0x46574c44
10,342,961 UART: [fwproc] Recv'd Img size: 119428 bytes
13,839,510 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,919,866 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,992,878 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,324,083 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,179 writing to cptra_bootfsm_go
3,459,209 ready_for_fw is high
3,459,727 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,912 >>> mbox cmd response: success
18,535,616 UART:
18,536,047 UART: Running Caliptra FMC ...
18,537,377 UART:
18,537,553 UART: [state] CFI Enabled
18,604,571 UART: [fht] FMC Alias Private Key: 7
20,371,000 UART: [art] Extend RT PCRs Done
20,372,215 UART: [art] Lock RT PCRs Done
20,374,063 UART: [art] Populate DV Done
20,379,282 UART: [fht] FMC Alias Private Key: 7
20,380,994 UART: [art] Derive CDI
20,381,823 UART: [art] Store in slot 0x4
20,437,459 UART: [art] Derive Key Pair
20,438,469 UART: [art] Store priv key in slot 0x5
22,901,595 UART: [art] Derive Key Pair - Done
22,914,448 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,627,471 UART: [art] Erasing AUTHORITY.KEYID = 7
24,628,974 UART: [art] PUB.X = B24997128C9CC3B03A4969917371279EF1B1759EFED838BE7D7958759788D8036D87AA8ABF4A6C2AA85F9C1200F04BF8
24,636,206 UART: [art] PUB.Y = 7856F60BEBAF259BFF19455308EA2016E1FA0190848456775581CD12416ED00E92670531B79AD869DB340C8E3463055E
24,643,434 UART: [art] SIG.R = 2741E8642D299B5238FE2DBF50DF9E008BD3B45429CED37A816CD7466B60BC58E0B310D79C76C01A7266707980B676CB
24,650,806 UART: [art] SIG.S = 7851C84487118AF0A4961E8DB66867F961FD08D7E6593B9C7C3EFAB3CCA3ACB1AB39CC21F9274B1E597B2CFBD852EDC8
25,629,886 UART: Caliptra RT
25,630,596 UART: [state] CFI Enabled
25,810,453 UART: [rt] RT listening for mailbox commands...
25,812,310 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,842,028 UART: [rt]cmd =0x46504c54, len=4
25,843,506 >>> mbox cmd response data (8 bytes)
25,844,630 UART: [rt] FIPS self test
25,845,589 UART: [kat] ++
25,846,040 UART: [kat] sha1
25,850,501 UART: [kat] SHA2-256
25,851,948 UART: Fatal Error: 0x90010002
25,887,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,037,097 >>> mbox cmd response: failed
26,037,778 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,187,731 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
3,448,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,280,019 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,266 writing to cptra_bootfsm_go
192,529 UART:
192,913 UART: Running Caliptra ROM ...
194,063 UART:
603,688 UART: [state] CFI Enabled
619,766 UART: [state] LifecycleState = Unprovisioned
621,667 UART: [state] DebugLocked = No
623,918 UART: [state] WD Timer not started. Device not locked for debugging
627,483 UART: [kat] SHA2-256
807,151 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
817,946 UART: [kat] ++
818,405 UART: [kat] sha1
829,522 UART: [kat] SHA2-256
832,217 UART: [kat] SHA2-384
838,005 UART: [kat] SHA2-512-ACC
840,395 UART: [kat] ECC-384
3,281,719 UART: [kat] HMAC-384Kdf
3,294,747 UART: [kat] LMS
3,771,290 UART: [kat] --
3,775,924 UART: [cold-reset] ++
3,777,502 UART: [fht] FHT @ 0x50003400
3,788,361 UART: [idev] ++
3,788,983 UART: [idev] CDI.KEYID = 6
3,789,908 UART: [idev] SUBJECT.KEYID = 7
3,791,165 UART: [idev] UDS.KEYID = 0
3,792,099 ready_for_fw is high
3,792,316 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,942,349 UART: [idev] Erasing UDS.KEYID = 0
6,269,403 UART: [idev] Sha1 KeyId Algorithm
6,292,646 UART: [idev] --
6,297,731 UART: [ldev] ++
6,298,309 UART: [ldev] CDI.KEYID = 6
6,299,195 UART: [ldev] SUBJECT.KEYID = 5
6,300,412 UART: [ldev] AUTHORITY.KEYID = 7
6,301,707 UART: [ldev] FE.KEYID = 1
6,314,333 UART: [ldev] Erasing FE.KEYID = 1
8,791,012 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,388 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,232 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,630 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,816 UART: [ldev] --
10,586,339 UART: [fwproc] Wait for Commands...
10,589,151 UART: [fwproc] Recv command 0x46574c44
10,591,145 UART: [fwproc] Recv'd Img size: 119428 bytes
14,091,713 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,173,898 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,246,919 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,578,782 >>> mbox cmd response: success
14,582,697 UART: [afmc] ++
14,583,321 UART: [afmc] CDI.KEYID = 6
14,584,214 UART: [afmc] SUBJECT.KEYID = 7
14,585,377 UART: [afmc] AUTHORITY.KEYID = 5
17,088,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,809,986 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,812,177 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,828,018 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,844,088 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,859,631 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,884,667 UART: [afmc] --
18,888,320 UART: [cold-reset] --
18,892,237 UART: [state] Locking Datavault
18,897,225 UART: [state] Locking PCR0, PCR1 and PCR31
18,898,985 UART: [state] Locking ICCM
18,900,981 UART: [exit] Launching FMC @ 0x40000130
18,909,420 UART:
18,909,664 UART: Running Caliptra FMC ...
18,910,774 UART:
18,910,933 UART: [state] CFI Enabled
18,918,820 UART: [fht] FMC Alias Private Key: 7
20,684,674 UART: [art] Extend RT PCRs Done
20,685,901 UART: [art] Lock RT PCRs Done
20,687,667 UART: [art] Populate DV Done
20,693,189 UART: [fht] FMC Alias Private Key: 7
20,694,787 UART: [art] Derive CDI
20,695,606 UART: [art] Store in slot 0x4
20,738,319 UART: [art] Derive Key Pair
20,739,319 UART: [art] Store priv key in slot 0x5
23,166,348 UART: [art] Derive Key Pair - Done
23,179,666 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,885,889 UART: [art] Erasing AUTHORITY.KEYID = 7
24,887,392 UART: [art] PUB.X = 7DD2AB29A70452B5564D33623BBBA39B69F90C086628F86627924A06D0E1B490AEC59AD0BA7410AA9FFBFE37CD09683E
24,894,632 UART: [art] PUB.Y = A547C327403E32C21166C717B719811275E5AE515EFD2D29609B0D0ECC982EC6128392C83226CE46D9EBCA07E6BDB9DD
24,901,881 UART: [art] SIG.R = 6BAF3183604F1B7258A4FC878A7B18FE45AEEC9394AFC1C7D0D3B3157693C8D59B64D09955BAB1BE0A881D9BD7E10F13
24,909,319 UART: [art] SIG.S = 54C38929FF03A02D609EDCD59CDBC962E2F83A8F7C5AADAF23307D37A7BA638612756A70028F8693F516AA12A2110184
25,887,957 UART: Caliptra RT
25,888,669 UART: [state] CFI Enabled
26,020,645 UART: [rt] RT listening for mailbox commands...
26,022,500 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,052,239 UART: [rt]cmd =0x46504c54, len=4
26,053,929 >>> mbox cmd response data (8 bytes)
26,055,153 UART: [rt] FIPS self test
26,056,095 UART: [kat] ++
26,056,604 UART: [kat] sha1
26,060,963 UART: [kat] SHA2-256
26,062,413 UART: Fatal Error: 0x90010002
26,097,623 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,247,580 >>> mbox cmd response: failed
26,248,184 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,398,113 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
190,109 UART:
190,394 UART: Running Caliptra ROM ...
191,450 UART:
14,137,817 UART: [state] CFI Enabled
14,150,814 UART: [state] LifecycleState = Unprovisioned
14,152,727 UART: [state] DebugLocked = No
14,154,609 UART: [state] WD Timer not started. Device not locked for debugging
14,158,363 UART: [kat] SHA2-256
14,338,044 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,348,818 UART: [kat] ++
14,349,283 UART: [kat] sha1
14,361,521 UART: [kat] SHA2-256
14,364,214 UART: [kat] SHA2-384
14,371,069 UART: [kat] SHA2-512-ACC
14,373,484 UART: [kat] ECC-384
16,816,072 UART: [kat] HMAC-384Kdf
16,828,631 UART: [kat] LMS
17,305,182 UART: [kat] --
17,310,214 UART: [cold-reset] ++
17,312,534 UART: [fht] FHT @ 0x50003400
17,324,250 UART: [idev] ++
17,324,826 UART: [idev] CDI.KEYID = 6
17,325,796 UART: [idev] SUBJECT.KEYID = 7
17,327,018 UART: [idev] UDS.KEYID = 0
17,328,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,478,496 UART: [idev] Erasing UDS.KEYID = 0
19,803,973 UART: [idev] Sha1 KeyId Algorithm
19,828,016 UART: [idev] --
19,832,389 UART: [ldev] ++
19,832,960 UART: [ldev] CDI.KEYID = 6
19,833,871 UART: [ldev] SUBJECT.KEYID = 5
19,835,088 UART: [ldev] AUTHORITY.KEYID = 7
19,836,348 UART: [ldev] FE.KEYID = 1
19,847,157 UART: [ldev] Erasing FE.KEYID = 1
22,324,823 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,041,453 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,057,328 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,073,175 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,088,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,110,712 UART: [ldev] --
24,116,909 UART: [fwproc] Wait for Commands...
24,119,984 UART: [fwproc] Recv command 0x46574c44
24,121,985 UART: [fwproc] Recv'd Img size: 119428 bytes
27,625,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,701,194 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,774,213 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,104,874 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,454 writing to cptra_bootfsm_go
3,780,181 ready_for_fw is high
3,780,625 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,456,742 >>> mbox cmd response: success
18,705,735 UART:
18,706,148 UART: Running Caliptra FMC ...
18,707,290 UART:
18,707,461 UART: [state] CFI Enabled
18,715,108 UART: [fht] FMC Alias Private Key: 7
20,481,446 UART: [art] Extend RT PCRs Done
20,482,680 UART: [art] Lock RT PCRs Done
20,484,472 UART: [art] Populate DV Done
20,489,972 UART: [fht] FMC Alias Private Key: 7
20,491,664 UART: [art] Derive CDI
20,492,498 UART: [art] Store in slot 0x4
20,534,722 UART: [art] Derive Key Pair
20,535,731 UART: [art] Store priv key in slot 0x5
22,962,940 UART: [art] Derive Key Pair - Done
22,975,560 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,167 UART: [art] Erasing AUTHORITY.KEYID = 7
24,683,678 UART: [art] PUB.X = 2ACABBA5FA0285CCCD57EDC0C48426132370F4B740DA3761D2BE2470C5272CDDB4D1C48E3315B9A922514911A3CEFB50
24,691,016 UART: [art] PUB.Y = 0268F7D03AD653808A4123E2E0D297534AD1E97482AB7818BE88CD4F66CD1D92362E6232EB2C6085286BA968F6E99848
24,698,219 UART: [art] SIG.R = B1216FFDF6108945C6739B40CCF429E21F872E3225A2A2BA19FD66010ABBD3821431DE3828CD26D6D4B6066DED91ACE8
24,705,626 UART: [art] SIG.S = B2BACD5536901144289D5B9DE66B9B5ADC255ACB667AF5D56100C795CBBB09A87FE264AADB344BE4F9B64D0A061631BC
25,684,457 UART: Caliptra RT
25,685,175 UART: [state] CFI Enabled
25,816,832 UART: [rt] RT listening for mailbox commands...
25,818,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,848,465 UART: [rt]cmd =0x46504c54, len=4
25,849,917 >>> mbox cmd response data (8 bytes)
25,851,128 UART: [rt] FIPS self test
25,852,080 UART: [kat] ++
25,852,540 UART: [kat] sha1
25,856,892 UART: [kat] SHA2-256
25,858,443 UART: Fatal Error: 0x90010002
25,893,525 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,043,468 >>> mbox cmd response: failed
26,044,086 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,193,966 >>> mbox cmd response: failed
Initializing fuses
934 writing to cptra_bootfsm_go
17,521,860 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,217,283 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
192,096 UART:
192,470 UART: Running Caliptra ROM ...
193,655 UART:
193,829 UART: [state] CFI Enabled
261,807 UART: [state] LifecycleState = Unprovisioned
264,225 UART: [state] DebugLocked = No
266,198 UART: [state] WD Timer not started. Device not locked for debugging
270,837 UART: [kat] SHA2-256
460,696 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,510 UART: [kat] ++
472,006 UART: [kat] sha1
483,443 UART: [kat] SHA2-256
486,461 UART: [kat] SHA2-384
492,672 UART: [kat] SHA2-512-ACC
495,261 UART: [kat] ECC-384
2,947,769 UART: [kat] HMAC-384Kdf
2,971,681 UART: [kat] LMS
3,503,451 UART: [kat] --
3,507,804 UART: [cold-reset] ++
3,509,955 UART: [fht] FHT @ 0x50003400
3,523,070 UART: [idev] ++
3,523,791 UART: [idev] CDI.KEYID = 6
3,524,703 UART: [idev] SUBJECT.KEYID = 7
3,525,986 UART: [idev] UDS.KEYID = 0
3,526,922 ready_for_fw is high
3,527,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,339 UART: [idev] Erasing UDS.KEYID = 0
6,027,474 UART: [idev] Sha1 KeyId Algorithm
6,050,169 UART: [idev] --
6,056,204 UART: [ldev] ++
6,056,907 UART: [ldev] CDI.KEYID = 6
6,057,827 UART: [ldev] SUBJECT.KEYID = 5
6,058,999 UART: [ldev] AUTHORITY.KEYID = 7
6,060,240 UART: [ldev] FE.KEYID = 1
6,098,278 UART: [ldev] Erasing FE.KEYID = 1
8,605,314 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,339,326 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,354,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,369,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,384,913 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,557 UART: [ldev] --
10,412,271 UART: [fwproc] Wait for Commands...
10,414,050 UART: [fwproc] Recv command 0x46574c44
10,416,367 UART: [fwproc] Recv'd Img size: 119428 bytes
13,928,873 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,002,413 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,040 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,691,099 >>> mbox cmd response: success
14,694,902 UART: [afmc] ++
14,695,609 UART: [afmc] CDI.KEYID = 6
14,696,768 UART: [afmc] SUBJECT.KEYID = 7
14,698,304 UART: [afmc] AUTHORITY.KEYID = 5
17,231,683 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,959,259 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,961,181 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,976,277 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,991,467 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,006,367 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,029,331 UART: [afmc] --
19,033,100 UART: [cold-reset] --
19,037,670 UART: [state] Locking Datavault
19,043,140 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,286 UART: [state] Locking ICCM
19,048,036 UART: [exit] Launching FMC @ 0x40000130
19,056,713 UART:
19,056,956 UART: Running Caliptra FMC ...
19,058,064 UART:
19,058,229 UART: [state] CFI Enabled
19,113,998 UART: [fht] FMC Alias Private Key: 7
20,880,297 UART: [art] Extend RT PCRs Done
20,881,522 UART: [art] Lock RT PCRs Done
20,883,149 UART: [art] Populate DV Done
20,888,573 UART: [fht] FMC Alias Private Key: 7
20,890,119 UART: [art] Derive CDI
20,890,857 UART: [art] Store in slot 0x4
20,946,600 UART: [art] Derive Key Pair
20,947,643 UART: [art] Store priv key in slot 0x5
23,410,685 UART: [art] Derive Key Pair - Done
23,423,529 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,135,947 UART: [art] Erasing AUTHORITY.KEYID = 7
25,137,461 UART: [art] PUB.X = 5634545E0609357C074E566158A70CD363499AE8FD150BA31EAF9CD14D9F7FD2B37B4CE04DC363FD878ACC785E983BAD
25,144,712 UART: [art] PUB.Y = 0DFA4B936DA2077DBEB13DE074350BD34A778939C51047078F1BD955A198BC86EB28E4A897B1C7ADF8AE55907EB69820
25,151,957 UART: [art] SIG.R = 4E86AAD3CA04295A85155749320A11B587840118F99BB20BF299B9272E64091DD68287BBA6C638FBB9B98C0770F4F4F5
25,159,353 UART: [art] SIG.S = 9239D297E0D8DAD678E7002C807D3653C8337AA6D83D1E4FBB43D4AEF37189B241B7A1674574F877DAB58C92DB7DD8ED
26,139,043 UART: Caliptra RT
26,139,758 UART: [state] CFI Enabled
26,318,961 UART: [rt] RT listening for mailbox commands...
26,320,833 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,350,767 UART: [rt]cmd =0x46504c54, len=4
26,352,249 >>> mbox cmd response data (8 bytes)
26,353,429 UART: [rt] FIPS self test
26,354,387 UART: [kat] ++
26,354,837 UART: [kat] sha1
26,359,237 UART: [kat] SHA2-256
26,360,626 UART: Fatal Error: 0x90010002
26,395,900 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,545,953 >>> mbox cmd response: failed
26,546,526 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,696,414 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
190,076 UART:
190,372 UART: Running Caliptra ROM ...
191,422 UART:
191,564 UART: [state] CFI Enabled
249,787 UART: [state] LifecycleState = Unprovisioned
252,137 UART: [state] DebugLocked = No
254,249 UART: [state] WD Timer not started. Device not locked for debugging
258,300 UART: [kat] SHA2-256
448,174 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,937 UART: [kat] ++
459,385 UART: [kat] sha1
470,638 UART: [kat] SHA2-256
473,634 UART: [kat] SHA2-384
480,215 UART: [kat] SHA2-512-ACC
482,828 UART: [kat] ECC-384
2,933,217 UART: [kat] HMAC-384Kdf
2,956,256 UART: [kat] LMS
3,487,996 UART: [kat] --
3,490,086 UART: [cold-reset] ++
3,491,761 UART: [fht] FHT @ 0x50003400
3,504,251 UART: [idev] ++
3,504,985 UART: [idev] CDI.KEYID = 6
3,505,914 UART: [idev] SUBJECT.KEYID = 7
3,507,137 UART: [idev] UDS.KEYID = 0
3,508,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,658,605 UART: [idev] Erasing UDS.KEYID = 0
6,016,556 UART: [idev] Sha1 KeyId Algorithm
6,039,466 UART: [idev] --
6,043,844 UART: [ldev] ++
6,044,535 UART: [ldev] CDI.KEYID = 6
6,045,426 UART: [ldev] SUBJECT.KEYID = 5
6,046,646 UART: [ldev] AUTHORITY.KEYID = 7
6,047,776 UART: [ldev] FE.KEYID = 1
6,086,619 UART: [ldev] Erasing FE.KEYID = 1
8,594,225 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,328,209 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,343,342 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,358,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,373,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,394,877 UART: [ldev] --
10,400,861 UART: [fwproc] Wait for Commands...
10,403,661 UART: [fwproc] Recv command 0x46574c44
10,405,983 UART: [fwproc] Recv'd Img size: 119428 bytes
13,916,474 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,995,374 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,118,990 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,683,945 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
3,438,293 ready_for_fw is high
3,438,898 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,852,553 >>> mbox cmd response: success
19,151,634 UART:
19,152,041 UART: Running Caliptra FMC ...
19,153,196 UART:
19,153,357 UART: [state] CFI Enabled
19,219,973 UART: [fht] FMC Alias Private Key: 7
20,986,694 UART: [art] Extend RT PCRs Done
20,987,925 UART: [art] Lock RT PCRs Done
20,989,310 UART: [art] Populate DV Done
20,994,685 UART: [fht] FMC Alias Private Key: 7
20,996,338 UART: [art] Derive CDI
20,997,083 UART: [art] Store in slot 0x4
21,052,029 UART: [art] Derive Key Pair
21,053,079 UART: [art] Store priv key in slot 0x5
23,516,142 UART: [art] Derive Key Pair - Done
23,529,145 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,241,176 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,700 UART: [art] PUB.X = 2B4C7F25916F047D77993906A3581D1A9516F8F31E5E4D9E93C39F5DEEAD00A430E7914A9C46FAD17EF5637C1A5E0A29
25,249,960 UART: [art] PUB.Y = 75D68C1C2E12788EE37D5A77C5D6D8DDBBBAD4B7162582D33626DF55D6842AAF768612343368E6FA740B8527FCE3C044
25,257,207 UART: [art] SIG.R = 0C97B480C0FDB213B89C641C8835707D8E4E54990C0522E7CDFEA671195A560E1907EA7F3D8AB17500D0B6CDC3FAA98D
25,264,530 UART: [art] SIG.S = 74F126569111D67E9CB42A7D038A642C98F2E886161C268D3FFE7395302DC70469B1182122EC59B9ADF5490A4571C48B
26,243,556 UART: Caliptra RT
26,244,248 UART: [state] CFI Enabled
26,424,384 UART: [rt] RT listening for mailbox commands...
26,426,238 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,455,881 UART: [rt]cmd =0x46504c54, len=4
26,457,551 >>> mbox cmd response data (8 bytes)
26,458,674 UART: [rt] FIPS self test
26,459,624 UART: [kat] ++
26,460,078 UART: [kat] sha1
26,464,490 UART: [kat] SHA2-256
26,466,044 UART: Fatal Error: 0x90010002
26,501,213 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,651,144 >>> mbox cmd response: failed
26,651,767 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,801,676 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,422,760 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,827,633 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,612 UART:
192,959 UART: Running Caliptra ROM ...
194,177 UART:
603,590 UART: [state] CFI Enabled
616,971 UART: [state] LifecycleState = Unprovisioned
619,360 UART: [state] DebugLocked = No
622,245 UART: [state] WD Timer not started. Device not locked for debugging
627,219 UART: [kat] SHA2-256
817,132 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
827,922 UART: [kat] ++
828,446 UART: [kat] sha1
841,315 UART: [kat] SHA2-256
843,045 UART: [kat] SHA2-384
849,975 UART: [kat] SHA2-512-ACC
852,514 UART: [kat] ECC-384
3,294,087 UART: [kat] HMAC-384Kdf
3,306,823 UART: [kat] LMS
3,838,647 UART: [kat] --
3,845,927 UART: [cold-reset] ++
3,848,235 UART: [fht] FHT @ 0x50003400
3,859,999 UART: [idev] ++
3,860,717 UART: [idev] CDI.KEYID = 6
3,861,640 UART: [idev] SUBJECT.KEYID = 7
3,862,823 UART: [idev] UDS.KEYID = 0
3,863,753 ready_for_fw is high
3,863,953 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,013,932 UART: [idev] Erasing UDS.KEYID = 0
6,339,240 UART: [idev] Sha1 KeyId Algorithm
6,362,182 UART: [idev] --
6,367,697 UART: [ldev] ++
6,368,401 UART: [ldev] CDI.KEYID = 6
6,369,291 UART: [ldev] SUBJECT.KEYID = 5
6,370,456 UART: [ldev] AUTHORITY.KEYID = 7
6,371,693 UART: [ldev] FE.KEYID = 1
6,382,997 UART: [ldev] Erasing FE.KEYID = 1
8,859,692 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,577,018 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,592,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,607,384 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,483 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,978 UART: [ldev] --
10,649,231 UART: [fwproc] Wait for Commands...
10,650,796 UART: [fwproc] Recv command 0x46574c44
10,653,121 UART: [fwproc] Recv'd Img size: 119428 bytes
14,164,314 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,238,871 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,362,497 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,927,240 >>> mbox cmd response: success
14,931,417 UART: [afmc] ++
14,932,119 UART: [afmc] CDI.KEYID = 6
14,933,279 UART: [afmc] SUBJECT.KEYID = 7
14,934,815 UART: [afmc] AUTHORITY.KEYID = 5
17,442,867 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,165,054 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,167,025 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,182,098 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,197,303 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,212,197 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,923 UART: [afmc] --
19,239,316 UART: [cold-reset] --
19,242,748 UART: [state] Locking Datavault
19,246,330 UART: [state] Locking PCR0, PCR1 and PCR31
19,248,491 UART: [state] Locking ICCM
19,251,297 UART: [exit] Launching FMC @ 0x40000130
19,259,971 UART:
19,260,214 UART: Running Caliptra FMC ...
19,261,323 UART:
19,261,484 UART: [state] CFI Enabled
19,269,383 UART: [fht] FMC Alias Private Key: 7
21,035,377 UART: [art] Extend RT PCRs Done
21,036,600 UART: [art] Lock RT PCRs Done
21,038,367 UART: [art] Populate DV Done
21,043,623 UART: [fht] FMC Alias Private Key: 7
21,045,273 UART: [art] Derive CDI
21,046,017 UART: [art] Store in slot 0x4
21,088,565 UART: [art] Derive Key Pair
21,089,570 UART: [art] Store priv key in slot 0x5
23,516,402 UART: [art] Derive Key Pair - Done
23,529,473 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,235,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,237,393 UART: [art] PUB.X = 19C91A26557EB5EA29DF0E02A9B0A88A692E5A62C37B397F51AAF97DB997DFCB851843775996D574DBC79EAA6786A266
25,244,622 UART: [art] PUB.Y = 45CA8E67B95D3A6A2C4D3083335D3C812662F2A53A5BCCB4EA3520A6812A407F1FA1A6F55BBE7A7570863F84D496EA1B
25,251,937 UART: [art] SIG.R = A481D634345A02AD8DD60E7759ACD8F7B22D511C995383DA65F22C66D2188428B67B0B4EC861CDE00E3D5172BEA8D3C4
25,259,322 UART: [art] SIG.S = 1F4D9665503DF4D1BFE273AE1DA16C62F1C00B57BF2B4561483ECD6C27125190125DE074F30275337F7825AE28C2428C
26,238,612 UART: Caliptra RT
26,239,301 UART: [state] CFI Enabled
26,371,854 UART: [rt] RT listening for mailbox commands...
26,373,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,403,281 UART: [rt]cmd =0x46504c54, len=4
26,404,838 >>> mbox cmd response data (8 bytes)
26,406,238 UART: [rt] FIPS self test
26,407,184 UART: [kat] ++
26,407,638 UART: [kat] sha1
26,411,828 UART: [kat] SHA2-256
26,413,399 UART: Fatal Error: 0x90010002
26,448,485 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,598,481 >>> mbox cmd response: failed
26,599,086 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,749,397 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,008 UART:
190,306 UART: Running Caliptra ROM ...
191,338 UART:
13,786,871 UART: [state] CFI Enabled
13,799,768 UART: [state] LifecycleState = Unprovisioned
13,802,159 UART: [state] DebugLocked = No
13,805,125 UART: [state] WD Timer not started. Device not locked for debugging
13,809,595 UART: [kat] SHA2-256
13,999,483 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,010,245 UART: [kat] ++
14,010,962 UART: [kat] sha1
14,022,676 UART: [kat] SHA2-256
14,025,701 UART: [kat] SHA2-384
14,031,801 UART: [kat] SHA2-512-ACC
14,034,378 UART: [kat] ECC-384
16,474,835 UART: [kat] HMAC-384Kdf
16,488,471 UART: [kat] LMS
17,020,260 UART: [kat] --
17,024,272 UART: [cold-reset] ++
17,026,326 UART: [fht] FHT @ 0x50003400
17,037,801 UART: [idev] ++
17,038,481 UART: [idev] CDI.KEYID = 6
17,039,418 UART: [idev] SUBJECT.KEYID = 7
17,040,636 UART: [idev] UDS.KEYID = 0
17,042,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,192,157 UART: [idev] Erasing UDS.KEYID = 0
19,517,479 UART: [idev] Sha1 KeyId Algorithm
19,540,294 UART: [idev] --
19,544,775 UART: [ldev] ++
19,545,462 UART: [ldev] CDI.KEYID = 6
19,546,374 UART: [ldev] SUBJECT.KEYID = 5
19,547,473 UART: [ldev] AUTHORITY.KEYID = 7
19,548,763 UART: [ldev] FE.KEYID = 1
19,558,923 UART: [ldev] Erasing FE.KEYID = 1
22,040,382 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,759,006 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,774,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,789,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,804,530 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,824,813 UART: [ldev] --
23,831,005 UART: [fwproc] Wait for Commands...
23,833,134 UART: [fwproc] Recv command 0x46574c44
23,835,461 UART: [fwproc] Recv'd Img size: 119428 bytes
27,339,865 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,414,885 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,538,517 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,103,431 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,269 writing to cptra_bootfsm_go
3,758,278 ready_for_fw is high
3,758,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,067,160 >>> mbox cmd response: success
19,320,305 UART:
19,320,689 UART: Running Caliptra FMC ...
19,321,890 UART:
19,322,062 UART: [state] CFI Enabled
19,329,798 UART: [fht] FMC Alias Private Key: 7
21,095,666 UART: [art] Extend RT PCRs Done
21,096,892 UART: [art] Lock RT PCRs Done
21,098,747 UART: [art] Populate DV Done
21,104,440 UART: [fht] FMC Alias Private Key: 7
21,106,161 UART: [art] Derive CDI
21,106,985 UART: [art] Store in slot 0x4
21,149,320 UART: [art] Derive Key Pair
21,150,370 UART: [art] Store priv key in slot 0x5
23,577,085 UART: [art] Derive Key Pair - Done
23,589,976 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,296,399 UART: [art] Erasing AUTHORITY.KEYID = 7
25,297,906 UART: [art] PUB.X = C641B166F9FCE5192E5ADED0DA34065280EE47288D970669C4F7AA33454A41D10B8915852BFF70C064DE1C75055FC118
25,305,205 UART: [art] PUB.Y = EE473B7FD9F84ED734256F463DD97D8498D8BE8006F9451F54C10A2929440A88C774746733149EC607EFEC65A9DC4A44
25,312,410 UART: [art] SIG.R = 78D4D0DB5F61C99F18A3162DC19FB0A9BBABACE90A7B64AEB57370F8FAE3C7E1B14ADCE90181654F66AB89722DDFA13B
25,319,845 UART: [art] SIG.S = 878D20653D88FB6A60DDDC3833D0529015342D7DBAE5F6CC93B117D6B12A833ABE6B09356070F678E799BF7CA422F5EE
26,298,706 UART: Caliptra RT
26,299,419 UART: [state] CFI Enabled
26,432,332 UART: [rt] RT listening for mailbox commands...
26,434,194 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,464,038 UART: [rt]cmd =0x46504c54, len=4
26,465,810 >>> mbox cmd response data (8 bytes)
26,467,233 UART: [rt] FIPS self test
26,468,182 UART: [kat] ++
26,468,636 UART: [kat] sha1
26,473,206 UART: [kat] SHA2-256
26,474,764 UART: Fatal Error: 0x90010002
26,510,143 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,660,120 >>> mbox cmd response: failed
26,660,700 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,810,491 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
16,876,795 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,178,605 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,646 UART: [state] LifecycleState = Unprovisioned
85,301 UART: [state] DebugLocked = No
85,931 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,507 UART: [kat] SHA2-256
881,438 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,553 UART: [kat] ++
885,705 UART: [kat] sha1
890,175 UART: [kat] SHA2-256
892,113 UART: [kat] SHA2-384
895,020 UART: [kat] SHA2-512-ACC
896,921 UART: [kat] ECC-384
902,334 UART: [kat] HMAC-384Kdf
907,102 UART: [kat] LMS
1,475,298 UART: [kat] --
1,476,475 UART: [cold-reset] ++
1,476,863 UART: [fht] Storing FHT @ 0x50003400
1,479,624 UART: [idev] ++
1,479,792 UART: [idev] CDI.KEYID = 6
1,480,152 UART: [idev] SUBJECT.KEYID = 7
1,480,576 UART: [idev] UDS.KEYID = 0
1,480,921 ready_for_fw is high
1,480,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,346 UART: [idev] Erasing UDS.KEYID = 0
1,505,676 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,284 UART: [idev] --
1,515,375 UART: [ldev] ++
1,515,543 UART: [ldev] CDI.KEYID = 6
1,515,906 UART: [ldev] SUBJECT.KEYID = 5
1,516,332 UART: [ldev] AUTHORITY.KEYID = 7
1,516,795 UART: [ldev] FE.KEYID = 1
1,522,021 UART: [ldev] Erasing FE.KEYID = 1
1,547,424 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,123 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,839 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,560 UART: [ldev] --
1,587,075 UART: [fwproc] Waiting for Commands...
1,587,876 UART: [fwproc] Received command 0x46574c44
1,588,667 UART: [fwproc] Received Image of size 119428 bytes
2,943,191 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,685 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,506 >>> mbox cmd response: success
3,144,530 UART: [afmc] ++
3,144,698 UART: [afmc] CDI.KEYID = 6
3,145,060 UART: [afmc] SUBJECT.KEYID = 7
3,145,485 UART: [afmc] AUTHORITY.KEYID = 5
3,181,524 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,594 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,374 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,083 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,966 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,649 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,545 UART: [afmc] --
3,224,429 UART: [cold-reset] --
3,225,137 UART: [state] Locking Datavault
3,226,460 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,064 UART: [state] Locking ICCM
3,227,710 UART: [exit] Launching FMC @ 0x40000130
3,233,040 UART:
3,233,056 UART: Running Caliptra FMC ...
3,233,464 UART:
3,233,518 UART: [state] CFI Enabled
3,244,206 UART: [fht] FMC Alias Private Key: 7
3,363,074 UART: [art] Extend RT PCRs Done
3,363,502 UART: [art] Lock RT PCRs Done
3,365,142 UART: [art] Populate DV Done
3,373,179 UART: [fht] FMC Alias Private Key: 7
3,374,249 UART: [art] Derive CDI
3,374,529 UART: [art] Store in slot 0x4
3,460,129 UART: [art] Derive Key Pair
3,460,489 UART: [art] Store priv key in slot 0x5
3,473,706 UART: [art] Derive Key Pair - Done
3,488,606 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,648 UART: [art] PUB.X = FA7198567D09EDD62F3285F8C1F9D696C77B98742A651A6DBD337ACB1AB4200AA0B0ABA79DDD51CBDC4F212A2D7F6A97
3,511,432 UART: [art] PUB.Y = 5FC50056DA306968E6BB05FBC29E3912D2751433AEF0D3362D1874C60E293323EB8D5814A62E83C9E86E1BCA79491244
3,518,352 UART: [art] SIG.R = 470CDED89C9739C68432169AFB1B6124BCF1EFE8886F0D963E55D2481A04FD653E9338679BE407DAB7EC48DC618533BD
3,525,118 UART: [art] SIG.S = 8B7166994EB088EB53ED43F3DCFF5F57E3E7DB4C12FA8E538BAE491C43E710A6AFD77A83BE73D1668DDA17416669FF3D
3,548,438 UART: Caliptra RT
3,548,689 UART: [state] CFI Enabled
3,669,053 UART: [rt] RT listening for mailbox commands...
3,669,716 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,457 UART: [rt]cmd =0x46504c54, len=4
3,700,601 >>> mbox cmd response data (8 bytes)
3,700,902 UART: [rt] FIPS self test
3,701,230 UART: [kat] ++
3,701,382 UART: [kat] sha1
3,705,764 UART: [kat] SHA2-256
3,707,858 UART: Fatal Error: 0x90010002
3,709,397 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,402 >>> mbox cmd response: failed
3,709,402 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,407 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,920 UART: [state] LifecycleState = Unprovisioned
85,575 UART: [state] DebugLocked = No
86,093 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,767 UART: [kat] SHA2-256
881,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,813 UART: [kat] ++
885,965 UART: [kat] sha1
890,317 UART: [kat] SHA2-256
892,255 UART: [kat] SHA2-384
894,972 UART: [kat] SHA2-512-ACC
896,873 UART: [kat] ECC-384
902,220 UART: [kat] HMAC-384Kdf
906,868 UART: [kat] LMS
1,475,064 UART: [kat] --
1,476,027 UART: [cold-reset] ++
1,476,519 UART: [fht] Storing FHT @ 0x50003400
1,479,252 UART: [idev] ++
1,479,420 UART: [idev] CDI.KEYID = 6
1,479,780 UART: [idev] SUBJECT.KEYID = 7
1,480,204 UART: [idev] UDS.KEYID = 0
1,480,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,740 UART: [idev] Erasing UDS.KEYID = 0
1,504,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,804 UART: [idev] --
1,513,851 UART: [ldev] ++
1,514,019 UART: [ldev] CDI.KEYID = 6
1,514,382 UART: [ldev] SUBJECT.KEYID = 5
1,514,808 UART: [ldev] AUTHORITY.KEYID = 7
1,515,271 UART: [ldev] FE.KEYID = 1
1,520,515 UART: [ldev] Erasing FE.KEYID = 1
1,546,356 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,340 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,052 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,028 UART: [ldev] --
1,585,301 UART: [fwproc] Waiting for Commands...
1,586,130 UART: [fwproc] Received command 0x46574c44
1,586,921 UART: [fwproc] Received Image of size 119428 bytes
2,942,307 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,131 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,349 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,014 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,049 ready_for_fw is high
1,363,049 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,286 >>> mbox cmd response: success
3,052,139 UART:
3,052,155 UART: Running Caliptra FMC ...
3,052,563 UART:
3,052,617 UART: [state] CFI Enabled
3,063,477 UART: [fht] FMC Alias Private Key: 7
3,181,905 UART: [art] Extend RT PCRs Done
3,182,333 UART: [art] Lock RT PCRs Done
3,184,239 UART: [art] Populate DV Done
3,192,656 UART: [fht] FMC Alias Private Key: 7
3,193,792 UART: [art] Derive CDI
3,194,072 UART: [art] Store in slot 0x4
3,279,736 UART: [art] Derive Key Pair
3,280,096 UART: [art] Store priv key in slot 0x5
3,293,427 UART: [art] Derive Key Pair - Done
3,308,314 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,325 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,090 UART: [art] PUB.X = 02F71F38FF5E7042F29E356C4A7E5DE15B06A28927F7526118BEEA6A744F82D2FBA0048F4A210E76EF64D491D0072A62
3,330,849 UART: [art] PUB.Y = 48A226704412306E58712219617F1A827BE6B5752DEE8D6E4CB5A97674A5003455B9183E75169E4D3202D3AD7FE41620
3,337,762 UART: [art] SIG.R = B82204477DC964AA4B289BBAB53756AFD72A49A5B8925C03BFFF2C6166DE3EDA5626D8F1808F482DD6A76FD60F9CBB62
3,344,539 UART: [art] SIG.S = D44ACF72A47CDA36BC4A1A5E561D086891E2145BB01067739E91EC65A99BCFFE0CF7AD3403B0F9172D3687F45F83ED64
3,367,870 UART: Caliptra RT
3,368,121 UART: [state] CFI Enabled
3,488,690 UART: [rt] RT listening for mailbox commands...
3,489,353 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,519,368 UART: [rt]cmd =0x46504c54, len=4
3,520,522 >>> mbox cmd response data (8 bytes)
3,520,847 UART: [rt] FIPS self test
3,521,175 UART: [kat] ++
3,521,327 UART: [kat] sha1
3,525,611 UART: [kat] SHA2-256
3,527,563 UART: Fatal Error: 0x90010002
3,529,102 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,107 >>> mbox cmd response: failed
3,529,107 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,529,112 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,939 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,392 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,385 UART: [state] LifecycleState = Unprovisioned
86,040 UART: [state] DebugLocked = No
86,594 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,196 UART: [kat] SHA2-256
882,127 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,242 UART: [kat] ++
886,394 UART: [kat] sha1
890,550 UART: [kat] SHA2-256
892,488 UART: [kat] SHA2-384
895,431 UART: [kat] SHA2-512-ACC
897,332 UART: [kat] ECC-384
902,977 UART: [kat] HMAC-384Kdf
907,787 UART: [kat] LMS
1,475,983 UART: [kat] --
1,476,944 UART: [cold-reset] ++
1,477,302 UART: [fht] Storing FHT @ 0x50003400
1,480,191 UART: [idev] ++
1,480,359 UART: [idev] CDI.KEYID = 6
1,480,719 UART: [idev] SUBJECT.KEYID = 7
1,481,143 UART: [idev] UDS.KEYID = 0
1,481,488 ready_for_fw is high
1,481,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,483 UART: [idev] Erasing UDS.KEYID = 0
1,506,049 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,675 UART: [idev] --
1,515,860 UART: [ldev] ++
1,516,028 UART: [ldev] CDI.KEYID = 6
1,516,391 UART: [ldev] SUBJECT.KEYID = 5
1,516,817 UART: [ldev] AUTHORITY.KEYID = 7
1,517,280 UART: [ldev] FE.KEYID = 1
1,522,472 UART: [ldev] Erasing FE.KEYID = 1
1,548,051 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,368 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,084 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,975 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,687 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,755 UART: [ldev] --
1,587,118 UART: [fwproc] Waiting for Commands...
1,587,899 UART: [fwproc] Received command 0x46574c44
1,588,690 UART: [fwproc] Received Image of size 119428 bytes
2,944,076 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,318 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,536 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,053 >>> mbox cmd response: success
3,144,261 UART: [afmc] ++
3,144,429 UART: [afmc] CDI.KEYID = 6
3,144,791 UART: [afmc] SUBJECT.KEYID = 7
3,145,216 UART: [afmc] AUTHORITY.KEYID = 5
3,180,233 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,525 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,305 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,014 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,897 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,580 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,406 UART: [afmc] --
3,223,400 UART: [cold-reset] --
3,224,264 UART: [state] Locking Datavault
3,225,411 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,015 UART: [state] Locking ICCM
3,226,683 UART: [exit] Launching FMC @ 0x40000130
3,232,013 UART:
3,232,029 UART: Running Caliptra FMC ...
3,232,437 UART:
3,232,580 UART: [state] CFI Enabled
3,243,316 UART: [fht] FMC Alias Private Key: 7
3,362,352 UART: [art] Extend RT PCRs Done
3,362,780 UART: [art] Lock RT PCRs Done
3,364,676 UART: [art] Populate DV Done
3,372,693 UART: [fht] FMC Alias Private Key: 7
3,373,653 UART: [art] Derive CDI
3,373,933 UART: [art] Store in slot 0x4
3,459,645 UART: [art] Derive Key Pair
3,460,005 UART: [art] Store priv key in slot 0x5
3,473,642 UART: [art] Derive Key Pair - Done
3,488,639 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,126 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,891 UART: [art] PUB.X = B8E8D464CBE2E2610969F08CCCB18FB85204D8C2FDAC487DA4E6DE47BA5126CE420FA52B9A48BF35E909B316C6CC35FF
3,511,671 UART: [art] PUB.Y = F04695933BDC1919C2D02FC805CFF075152762B1DBCFB7F753A9D71CE72EDE5695BEE8F90BF22B3A7D777EBCC6807C08
3,518,628 UART: [art] SIG.R = 0522DAB289FCCEB3E30D70A4EE70BD7A90F90FB1B96362222E9BFE02115E5D18D7F497593B43EFCCC437351A4265DEF0
3,525,400 UART: [art] SIG.S = 7750B84997F40D9BFD027FC9850848F064F34F2C2D7529DE6E7AD7F8FD0C072B385E672533E1323258A35B3437812B24
3,549,345 UART: Caliptra RT
3,549,688 UART: [state] CFI Enabled
3,669,437 UART: [rt] RT listening for mailbox commands...
3,670,100 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,997 UART: [rt]cmd =0x46504c54, len=4
3,701,031 >>> mbox cmd response data (8 bytes)
3,701,328 UART: [rt] FIPS self test
3,701,656 UART: [kat] ++
3,701,808 UART: [kat] sha1
3,705,900 UART: [kat] SHA2-256
3,707,874 UART: Fatal Error: 0x90010002
3,709,413 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,418 >>> mbox cmd response: failed
3,709,418 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,709,423 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,918 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,412 UART: [kat] SHA2-256
882,343 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,458 UART: [kat] ++
886,610 UART: [kat] sha1
891,008 UART: [kat] SHA2-256
892,946 UART: [kat] SHA2-384
895,763 UART: [kat] SHA2-512-ACC
897,664 UART: [kat] ECC-384
902,995 UART: [kat] HMAC-384Kdf
907,503 UART: [kat] LMS
1,475,699 UART: [kat] --
1,476,598 UART: [cold-reset] ++
1,477,076 UART: [fht] Storing FHT @ 0x50003400
1,479,849 UART: [idev] ++
1,480,017 UART: [idev] CDI.KEYID = 6
1,480,377 UART: [idev] SUBJECT.KEYID = 7
1,480,801 UART: [idev] UDS.KEYID = 0
1,481,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,831 UART: [idev] Erasing UDS.KEYID = 0
1,505,717 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,231 UART: [idev] --
1,515,132 UART: [ldev] ++
1,515,300 UART: [ldev] CDI.KEYID = 6
1,515,663 UART: [ldev] SUBJECT.KEYID = 5
1,516,089 UART: [ldev] AUTHORITY.KEYID = 7
1,516,552 UART: [ldev] FE.KEYID = 1
1,521,888 UART: [ldev] Erasing FE.KEYID = 1
1,547,533 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,798 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,514 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,405 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,117 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,079 UART: [ldev] --
1,586,498 UART: [fwproc] Waiting for Commands...
1,587,151 UART: [fwproc] Received command 0x46574c44
1,587,942 UART: [fwproc] Received Image of size 119428 bytes
2,943,188 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,654 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,872 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,597 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,496 ready_for_fw is high
1,362,496 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,893 >>> mbox cmd response: success
3,054,740 UART:
3,054,756 UART: Running Caliptra FMC ...
3,055,164 UART:
3,055,307 UART: [state] CFI Enabled
3,066,243 UART: [fht] FMC Alias Private Key: 7
3,184,431 UART: [art] Extend RT PCRs Done
3,184,859 UART: [art] Lock RT PCRs Done
3,186,771 UART: [art] Populate DV Done
3,195,286 UART: [fht] FMC Alias Private Key: 7
3,196,460 UART: [art] Derive CDI
3,196,740 UART: [art] Store in slot 0x4
3,282,386 UART: [art] Derive Key Pair
3,282,746 UART: [art] Store priv key in slot 0x5
3,295,947 UART: [art] Derive Key Pair - Done
3,310,652 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,463 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,228 UART: [art] PUB.X = D2C018B5593C85FC7C3DC649C18B07B1C329BA95455218404509B702132C264B0F952243BFC9B86A318B07B0409819BD
3,333,977 UART: [art] PUB.Y = 70986A841C68320A4B2FC8B55930DED4F7D01381B82AB795F9632BC939A4EA45570BA48A0E001B609638100D3DEB4BD8
3,340,895 UART: [art] SIG.R = 0F55535E7D481A615561F3826A7A0B4DB56A61E1968157122436E82422F9F9E0C16EF6510DEF99A6F60652AC7A75CAF0
3,347,651 UART: [art] SIG.S = ADB7E890B247388D69BAAABD96E15234B59AB64C957166CD09B751D61897F76A271522269CCA3936562518AC85D6DB37
3,371,304 UART: Caliptra RT
3,371,647 UART: [state] CFI Enabled
3,492,417 UART: [rt] RT listening for mailbox commands...
3,493,080 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,963 UART: [rt]cmd =0x46504c54, len=4
3,524,033 >>> mbox cmd response data (8 bytes)
3,524,198 UART: [rt] FIPS self test
3,524,526 UART: [kat] ++
3,524,678 UART: [kat] sha1
3,528,936 UART: [kat] SHA2-256
3,530,854 UART: Fatal Error: 0x90010002
3,532,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,398 >>> mbox cmd response: failed
3,532,398 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,532,403 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,126 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,487 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,317 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
891,002 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,106 UART: [kat] ++
895,258 UART: [kat] sha1
899,428 UART: [kat] SHA2-256
901,368 UART: [kat] SHA2-384
903,911 UART: [kat] SHA2-512-ACC
905,812 UART: [kat] ECC-384
915,537 UART: [kat] HMAC-384Kdf
919,887 UART: [kat] LMS
1,168,199 UART: [kat] --
1,169,044 UART: [cold-reset] ++
1,169,596 UART: [fht] FHT @ 0x50003400
1,172,134 UART: [idev] ++
1,172,302 UART: [idev] CDI.KEYID = 6
1,172,663 UART: [idev] SUBJECT.KEYID = 7
1,173,088 UART: [idev] UDS.KEYID = 0
1,173,434 ready_for_fw is high
1,173,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,245 UART: [idev] Erasing UDS.KEYID = 0
1,198,159 UART: [idev] Sha1 KeyId Algorithm
1,206,897 UART: [idev] --
1,207,946 UART: [ldev] ++
1,208,114 UART: [ldev] CDI.KEYID = 6
1,208,478 UART: [ldev] SUBJECT.KEYID = 5
1,208,905 UART: [ldev] AUTHORITY.KEYID = 7
1,209,368 UART: [ldev] FE.KEYID = 1
1,214,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,143 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,273 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,878 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,590 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,580 UART: [ldev] --
1,279,917 UART: [fwproc] Wait for Commands...
1,280,602 UART: [fwproc] Recv command 0x46574c44
1,281,335 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,478 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,661,917 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,092 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,834,739 >>> mbox cmd response: success
2,835,839 UART: [afmc] ++
2,836,007 UART: [afmc] CDI.KEYID = 6
2,836,370 UART: [afmc] SUBJECT.KEYID = 7
2,836,796 UART: [afmc] AUTHORITY.KEYID = 5
2,872,061 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,888,940 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,889,689 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,895,399 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,901,280 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,906,981 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,914,672 UART: [afmc] --
2,915,651 UART: [cold-reset] --
2,916,653 UART: [state] Locking Datavault
2,918,060 UART: [state] Locking PCR0, PCR1 and PCR31
2,918,664 UART: [state] Locking ICCM
2,919,084 UART: [exit] Launching FMC @ 0x40000130
2,924,414 UART:
2,924,430 UART: Running Caliptra FMC ...
2,924,838 UART:
2,924,892 UART: [state] CFI Enabled
2,935,352 UART: [fht] FMC Alias Private Key: 7
3,054,320 UART: [art] Extend RT PCRs Done
3,054,748 UART: [art] Lock RT PCRs Done
3,056,072 UART: [art] Populate DV Done
3,064,191 UART: [fht] FMC Alias Private Key: 7
3,065,351 UART: [art] Derive CDI
3,065,631 UART: [art] Store in slot 0x4
3,151,622 UART: [art] Derive Key Pair
3,151,982 UART: [art] Store priv key in slot 0x5
3,164,876 UART: [art] Derive Key Pair - Done
3,179,744 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,117 UART: [art] Erasing AUTHORITY.KEYID = 7
3,195,882 UART: [art] PUB.X = 162CA5D48C2AABF5A8777146CEA3BCC4D394F6A587228AC699A7805BFCF3D8B4324DA71DE30F5DB4E15E7C9430AE9164
3,202,665 UART: [art] PUB.Y = F302DD182B94B320843AF652BB1844E0EB2B9FDE78E97A875CE2B2D4F70BE3F1C32256D95EE2EB213095CA0A5D245624
3,209,616 UART: [art] SIG.R = 322181475ADE48FACDF0E1FAE3D514875E1D269E00FC563278E29C4B5339EA46B1293E64CA4E336CA25BE0B76447B84A
3,216,372 UART: [art] SIG.S = 2B5C3543A28FC1559445D0F4D3C9412E6925A000632E5645E498031A221B4398404A4A15110D5534647A1B6B5CE08F70
3,240,298 UART: Caliptra RT
3,240,549 UART: [state] CFI Enabled
3,360,051 UART: [rt] RT listening for mailbox commands...
3,360,714 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,390,499 UART: [rt]cmd =0x46504c54, len=4
3,391,609 >>> mbox cmd response data (8 bytes)
3,391,936 UART: [rt] FIPS self test
3,392,264 UART: [kat] ++
3,392,416 UART: [kat] sha1
3,396,514 UART: [kat] SHA2-256
3,398,600 UART: Fatal Error: 0x90010002
3,400,139 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,144 >>> mbox cmd response: failed
3,400,144 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,400,149 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,666 UART: [state] LifecycleState = Unprovisioned
86,321 UART: [state] DebugLocked = No
87,029 UART: [state] WD Timer not started. Device not locked for debugging
88,332 UART: [kat] SHA2-256
891,882 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,986 UART: [kat] ++
896,138 UART: [kat] sha1
900,196 UART: [kat] SHA2-256
902,136 UART: [kat] SHA2-384
905,139 UART: [kat] SHA2-512-ACC
907,040 UART: [kat] ECC-384
917,047 UART: [kat] HMAC-384Kdf
921,609 UART: [kat] LMS
1,169,921 UART: [kat] --
1,170,808 UART: [cold-reset] ++
1,171,254 UART: [fht] FHT @ 0x50003400
1,174,050 UART: [idev] ++
1,174,218 UART: [idev] CDI.KEYID = 6
1,174,579 UART: [idev] SUBJECT.KEYID = 7
1,175,004 UART: [idev] UDS.KEYID = 0
1,175,350 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,071 UART: [idev] Erasing UDS.KEYID = 0
1,199,769 UART: [idev] Sha1 KeyId Algorithm
1,208,691 UART: [idev] --
1,209,714 UART: [ldev] ++
1,209,882 UART: [ldev] CDI.KEYID = 6
1,210,246 UART: [ldev] SUBJECT.KEYID = 5
1,210,673 UART: [ldev] AUTHORITY.KEYID = 7
1,211,136 UART: [ldev] FE.KEYID = 1
1,216,304 UART: [ldev] Erasing FE.KEYID = 1
1,242,189 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,845 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,561 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,450 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,162 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,172 UART: [ldev] --
1,281,551 UART: [fwproc] Wait for Commands...
1,282,232 UART: [fwproc] Recv command 0x46574c44
1,282,965 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,626 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,681 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,856 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,497 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,686 ready_for_fw is high
1,059,686 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,398 >>> mbox cmd response: success
2,751,579 UART:
2,751,595 UART: Running Caliptra FMC ...
2,752,003 UART:
2,752,057 UART: [state] CFI Enabled
2,762,463 UART: [fht] FMC Alias Private Key: 7
2,881,885 UART: [art] Extend RT PCRs Done
2,882,313 UART: [art] Lock RT PCRs Done
2,883,495 UART: [art] Populate DV Done
2,891,740 UART: [fht] FMC Alias Private Key: 7
2,892,818 UART: [art] Derive CDI
2,893,098 UART: [art] Store in slot 0x4
2,978,789 UART: [art] Derive Key Pair
2,979,149 UART: [art] Store priv key in slot 0x5
2,991,723 UART: [art] Derive Key Pair - Done
3,006,796 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,230 UART: [art] PUB.X = 21ECC190591FC50B07ECC23972F5280E788FBD2A56F5F0038BA3A2A73D62C90C1052246AC5D26263296A781027D03B5B
3,029,985 UART: [art] PUB.Y = 5A9984775F01729A1A37A0A561F36B15B9B5180EC6A24C87FC8BBADD8127B2187B21AD71FD2CF84E37B0423250A700C5
3,036,911 UART: [art] SIG.R = 37FB8681AB938A141E142DB8A9CB7A821F8F09A6B66EE1E4146B2E16A9571EAE206AEAA79C37D0236FB926F8F05932EF
3,043,690 UART: [art] SIG.S = DE8F0AF37779418540C28DFBF60F1ADF2CFCE6D7DC6DB59242147E795D49D99E8BD2F740EC2458FBD55EFE2F865113ED
3,067,164 UART: Caliptra RT
3,067,415 UART: [state] CFI Enabled
3,187,242 UART: [rt] RT listening for mailbox commands...
3,187,905 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,864 UART: [rt]cmd =0x46504c54, len=4
3,218,910 >>> mbox cmd response data (8 bytes)
3,219,113 UART: [rt] FIPS self test
3,219,441 UART: [kat] ++
3,219,593 UART: [kat] sha1
3,223,757 UART: [kat] SHA2-256
3,225,837 UART: Fatal Error: 0x90010002
3,227,376 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,381 >>> mbox cmd response: failed
3,227,381 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,386 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,172 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,664 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,999 UART: [state] LifecycleState = Unprovisioned
85,654 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,359 UART: [kat] SHA2-256
890,909 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,013 UART: [kat] ++
895,165 UART: [kat] sha1
899,363 UART: [kat] SHA2-256
901,303 UART: [kat] SHA2-384
904,110 UART: [kat] SHA2-512-ACC
906,011 UART: [kat] ECC-384
915,858 UART: [kat] HMAC-384Kdf
920,570 UART: [kat] LMS
1,168,882 UART: [kat] --
1,169,603 UART: [cold-reset] ++
1,170,107 UART: [fht] FHT @ 0x50003400
1,172,825 UART: [idev] ++
1,172,993 UART: [idev] CDI.KEYID = 6
1,173,354 UART: [idev] SUBJECT.KEYID = 7
1,173,779 UART: [idev] UDS.KEYID = 0
1,174,125 ready_for_fw is high
1,174,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,920 UART: [idev] Erasing UDS.KEYID = 0
1,199,020 UART: [idev] Sha1 KeyId Algorithm
1,207,876 UART: [idev] --
1,209,075 UART: [ldev] ++
1,209,243 UART: [ldev] CDI.KEYID = 6
1,209,607 UART: [ldev] SUBJECT.KEYID = 5
1,210,034 UART: [ldev] AUTHORITY.KEYID = 7
1,210,497 UART: [ldev] FE.KEYID = 1
1,215,641 UART: [ldev] Erasing FE.KEYID = 1
1,242,170 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,046 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,762 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,651 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,363 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,487 UART: [ldev] --
1,281,718 UART: [fwproc] Wait for Commands...
1,282,437 UART: [fwproc] Recv command 0x46574c44
1,283,170 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,263 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,963 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,636 >>> mbox cmd response: success
2,838,682 UART: [afmc] ++
2,838,850 UART: [afmc] CDI.KEYID = 6
2,839,213 UART: [afmc] SUBJECT.KEYID = 7
2,839,639 UART: [afmc] AUTHORITY.KEYID = 5
2,874,822 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,353 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,102 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,812 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,693 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,394 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,059 UART: [afmc] --
2,917,902 UART: [cold-reset] --
2,918,668 UART: [state] Locking Datavault
2,919,901 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,505 UART: [state] Locking ICCM
2,921,053 UART: [exit] Launching FMC @ 0x40000130
2,926,383 UART:
2,926,399 UART: Running Caliptra FMC ...
2,926,807 UART:
2,926,950 UART: [state] CFI Enabled
2,937,512 UART: [fht] FMC Alias Private Key: 7
3,056,890 UART: [art] Extend RT PCRs Done
3,057,318 UART: [art] Lock RT PCRs Done
3,058,910 UART: [art] Populate DV Done
3,067,131 UART: [fht] FMC Alias Private Key: 7
3,068,209 UART: [art] Derive CDI
3,068,489 UART: [art] Store in slot 0x4
3,154,484 UART: [art] Derive Key Pair
3,154,844 UART: [art] Store priv key in slot 0x5
3,168,160 UART: [art] Derive Key Pair - Done
3,182,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,047 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,812 UART: [art] PUB.X = 9BB0890B8A2C7B9DAE9A7F34D5593C841D62986574DCE49562AA85C10D1BF53C76CDF50F1B2C91F9844DE5E923139447
3,205,579 UART: [art] PUB.Y = C999828A4FA7CEE2ACE2E898692FF4FE83504D2C9EEAE38C9F6264796862274224F7DA7F4C58A8EB49AFAB809599DEEB
3,212,545 UART: [art] SIG.R = 9DCB27E0E1BE7907FAA35D87931DF82B459F3DE16C84D80597013A144FF9F7C63B66F688023E51BA32435B52297F4BB8
3,219,307 UART: [art] SIG.S = 9F60528D370093C60FBE2259F7E6CC2607B21057D0F601503D323DDB9E4B55CC4BC832F42691C31E77E66956BD203968
3,243,152 UART: Caliptra RT
3,243,495 UART: [state] CFI Enabled
3,363,175 UART: [rt] RT listening for mailbox commands...
3,363,838 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,801 UART: [rt]cmd =0x46504c54, len=4
3,395,003 >>> mbox cmd response data (8 bytes)
3,395,362 UART: [rt] FIPS self test
3,395,690 UART: [kat] ++
3,395,842 UART: [kat] sha1
3,400,150 UART: [kat] SHA2-256
3,402,204 UART: Fatal Error: 0x90010002
3,403,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,748 >>> mbox cmd response: failed
3,403,748 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,181 UART: [state] LifecycleState = Unprovisioned
85,836 UART: [state] DebugLocked = No
86,480 UART: [state] WD Timer not started. Device not locked for debugging
87,713 UART: [kat] SHA2-256
891,263 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,367 UART: [kat] ++
895,519 UART: [kat] sha1
899,613 UART: [kat] SHA2-256
901,553 UART: [kat] SHA2-384
904,382 UART: [kat] SHA2-512-ACC
906,283 UART: [kat] ECC-384
916,256 UART: [kat] HMAC-384Kdf
920,864 UART: [kat] LMS
1,169,176 UART: [kat] --
1,169,893 UART: [cold-reset] ++
1,170,395 UART: [fht] FHT @ 0x50003400
1,172,985 UART: [idev] ++
1,173,153 UART: [idev] CDI.KEYID = 6
1,173,514 UART: [idev] SUBJECT.KEYID = 7
1,173,939 UART: [idev] UDS.KEYID = 0
1,174,285 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,722 UART: [idev] Erasing UDS.KEYID = 0
1,198,650 UART: [idev] Sha1 KeyId Algorithm
1,207,662 UART: [idev] --
1,208,771 UART: [ldev] ++
1,208,939 UART: [ldev] CDI.KEYID = 6
1,209,303 UART: [ldev] SUBJECT.KEYID = 5
1,209,730 UART: [ldev] AUTHORITY.KEYID = 7
1,210,193 UART: [ldev] FE.KEYID = 1
1,215,631 UART: [ldev] Erasing FE.KEYID = 1
1,242,050 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,284 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,000 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,889 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,601 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,873 UART: [ldev] --
1,281,284 UART: [fwproc] Wait for Commands...
1,281,999 UART: [fwproc] Recv command 0x46574c44
1,282,732 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,499 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,052 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,227 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,920 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,303 ready_for_fw is high
1,059,303 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,697 >>> mbox cmd response: success
2,754,506 UART:
2,754,522 UART: Running Caliptra FMC ...
2,754,930 UART:
2,755,073 UART: [state] CFI Enabled
2,765,657 UART: [fht] FMC Alias Private Key: 7
2,884,393 UART: [art] Extend RT PCRs Done
2,884,821 UART: [art] Lock RT PCRs Done
2,886,189 UART: [art] Populate DV Done
2,894,270 UART: [fht] FMC Alias Private Key: 7
2,895,228 UART: [art] Derive CDI
2,895,508 UART: [art] Store in slot 0x4
2,981,171 UART: [art] Derive Key Pair
2,981,531 UART: [art] Store priv key in slot 0x5
2,995,297 UART: [art] Derive Key Pair - Done
3,010,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,882 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,647 UART: [art] PUB.X = ED377AFA3E783E0406CAFAB92345E9A2B493A26A7C9D8749ED9D88D07546533C69E325F07CA1771DC25834B8187BF6FF
3,033,419 UART: [art] PUB.Y = C1A5F4B3C76A0C593B3A134007338B1F7ABA1D5C790A6262D533CE266DF94FE406697ADF7F82B1D6C2441974F9A37EBD
3,040,367 UART: [art] SIG.R = 8072AC09D3C23311EFF9610D270C2740D876703EAEB82198E11592407B2FF984787A3E71054D153D558455E0AF487AA4
3,047,117 UART: [art] SIG.S = 02FEC9E3DEF1A59890CF4AC48B40416B232B572214211F2CDFF1789093FA3894970C927E030684AA46DDDE8184A85B0B
3,070,616 UART: Caliptra RT
3,070,959 UART: [state] CFI Enabled
3,190,652 UART: [rt] RT listening for mailbox commands...
3,191,315 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,130 UART: [rt]cmd =0x46504c54, len=4
3,222,202 >>> mbox cmd response data (8 bytes)
3,222,503 UART: [rt] FIPS self test
3,222,831 UART: [kat] ++
3,222,983 UART: [kat] sha1
3,227,033 UART: [kat] SHA2-256
3,229,133 UART: Fatal Error: 0x90010002
3,230,672 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,677 >>> mbox cmd response: failed
3,230,677 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,682 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,083 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,611 UART: [state] WD Timer not started. Device not locked for debugging
87,730 UART: [kat] SHA2-256
893,380 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,505 UART: [kat] ++
897,657 UART: [kat] sha1
901,995 UART: [kat] SHA2-256
903,935 UART: [kat] SHA2-384
906,786 UART: [kat] SHA2-512-ACC
908,687 UART: [kat] ECC-384
918,462 UART: [kat] HMAC-384Kdf
923,150 UART: [kat] LMS
1,171,478 UART: [kat] --
1,172,551 UART: [cold-reset] ++
1,173,071 UART: [fht] FHT @ 0x50003400
1,175,894 UART: [idev] ++
1,176,062 UART: [idev] CDI.KEYID = 6
1,176,422 UART: [idev] SUBJECT.KEYID = 7
1,176,846 UART: [idev] UDS.KEYID = 0
1,177,191 ready_for_fw is high
1,177,191 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,826 UART: [idev] Erasing UDS.KEYID = 0
1,201,871 UART: [idev] Sha1 KeyId Algorithm
1,210,495 UART: [idev] --
1,211,365 UART: [ldev] ++
1,211,533 UART: [ldev] CDI.KEYID = 6
1,211,896 UART: [ldev] SUBJECT.KEYID = 5
1,212,322 UART: [ldev] AUTHORITY.KEYID = 7
1,212,785 UART: [ldev] FE.KEYID = 1
1,218,015 UART: [ldev] Erasing FE.KEYID = 1
1,244,388 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,751 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,467 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,358 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,070 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,053 UART: [ldev] --
1,283,328 UART: [fwproc] Wait for Commands...
1,284,026 UART: [fwproc] Recv command 0x46574c44
1,284,754 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,409 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,238 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,408 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,925 >>> mbox cmd response: success
2,840,123 UART: [afmc] ++
2,840,291 UART: [afmc] CDI.KEYID = 6
2,840,653 UART: [afmc] SUBJECT.KEYID = 7
2,841,078 UART: [afmc] AUTHORITY.KEYID = 5
2,876,911 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,468 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,216 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,925 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,808 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,509 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,417 UART: [afmc] --
2,920,371 UART: [cold-reset] --
2,921,367 UART: [state] Locking Datavault
2,922,354 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,958 UART: [state] Locking ICCM
2,923,410 UART: [exit] Launching FMC @ 0x40000130
2,928,740 UART:
2,928,756 UART: Running Caliptra FMC ...
2,929,164 UART:
2,929,218 UART: [state] CFI Enabled
2,939,758 UART: [fht] FMC Alias Private Key: 7
3,058,318 UART: [art] Extend RT PCRs Done
3,058,746 UART: [art] Lock RT PCRs Done
3,060,310 UART: [art] Populate DV Done
3,068,459 UART: [fht] FMC Alias Private Key: 7
3,069,467 UART: [art] Derive CDI
3,069,747 UART: [art] Store in slot 0x4
3,155,850 UART: [art] Derive Key Pair
3,156,210 UART: [art] Store priv key in slot 0x5
3,169,166 UART: [art] Derive Key Pair - Done
3,183,736 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,031 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,796 UART: [art] PUB.X = 258B49F4431460CC931784AE75B61E33C61B3D2E5302D5F924E25C911AE6F179EA58736EB1EEAF50E59068C9496A26DA
3,206,565 UART: [art] PUB.Y = BCA7B01EB3B2B03DB250AB59C73874C08357F72128FC6502841658E2494C2A87CE42F85CA34CF1DD9839B6F7F7899557
3,213,514 UART: [art] SIG.R = 6A04C40AE1F018052F22B33479F2C9CF4213A00ADB2E69659BF9E0AD76956E17B10DCA1E06DD4ED1D235BB749A2E7551
3,220,276 UART: [art] SIG.S = BE959659DED088F868694066A1DFADD0C80DD68A916B484598F161D86429A60653E00AADDB1BD76AEE4C2938F95C37DC
3,244,277 UART: Caliptra RT
3,244,528 UART: [state] CFI Enabled
3,363,957 UART: [rt] RT listening for mailbox commands...
3,364,620 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,323 UART: [rt]cmd =0x46504c54, len=4
3,395,449 >>> mbox cmd response data (8 bytes)
3,395,720 UART: [rt] FIPS self test
3,396,048 UART: [kat] ++
3,396,200 UART: [kat] sha1
3,400,462 UART: [kat] SHA2-256
3,402,374 UART: Fatal Error: 0x90010002
3,403,913 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,918 >>> mbox cmd response: failed
3,403,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,465 UART: [state] WD Timer not started. Device not locked for debugging
87,594 UART: [kat] SHA2-256
893,244 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,369 UART: [kat] ++
897,521 UART: [kat] sha1
901,731 UART: [kat] SHA2-256
903,671 UART: [kat] SHA2-384
906,308 UART: [kat] SHA2-512-ACC
908,209 UART: [kat] ECC-384
917,972 UART: [kat] HMAC-384Kdf
922,514 UART: [kat] LMS
1,170,842 UART: [kat] --
1,171,779 UART: [cold-reset] ++
1,172,153 UART: [fht] FHT @ 0x50003400
1,174,632 UART: [idev] ++
1,174,800 UART: [idev] CDI.KEYID = 6
1,175,160 UART: [idev] SUBJECT.KEYID = 7
1,175,584 UART: [idev] UDS.KEYID = 0
1,175,929 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,544 UART: [idev] Erasing UDS.KEYID = 0
1,200,139 UART: [idev] Sha1 KeyId Algorithm
1,208,809 UART: [idev] --
1,209,863 UART: [ldev] ++
1,210,031 UART: [ldev] CDI.KEYID = 6
1,210,394 UART: [ldev] SUBJECT.KEYID = 5
1,210,820 UART: [ldev] AUTHORITY.KEYID = 7
1,211,283 UART: [ldev] FE.KEYID = 1
1,216,419 UART: [ldev] Erasing FE.KEYID = 1
1,242,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,189 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,905 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,796 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,508 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,387 UART: [ldev] --
1,281,858 UART: [fwproc] Wait for Commands...
1,282,582 UART: [fwproc] Recv command 0x46574c44
1,283,310 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,741 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,460 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,111 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,947 ready_for_fw is high
1,059,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,726 >>> mbox cmd response: success
2,751,947 UART:
2,751,963 UART: Running Caliptra FMC ...
2,752,371 UART:
2,752,425 UART: [state] CFI Enabled
2,762,683 UART: [fht] FMC Alias Private Key: 7
2,881,051 UART: [art] Extend RT PCRs Done
2,881,479 UART: [art] Lock RT PCRs Done
2,883,245 UART: [art] Populate DV Done
2,891,470 UART: [fht] FMC Alias Private Key: 7
2,892,442 UART: [art] Derive CDI
2,892,722 UART: [art] Store in slot 0x4
2,978,457 UART: [art] Derive Key Pair
2,978,817 UART: [art] Store priv key in slot 0x5
2,992,337 UART: [art] Derive Key Pair - Done
3,006,897 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,254 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,019 UART: [art] PUB.X = 7E8F931F3DB682CF9CC661376CEEDD16215A00314D04F766B88FF4751D13198CA90968DFD13630B3041A5D297C3FB98F
3,029,762 UART: [art] PUB.Y = E5F3F5D9F2E21350FFB1B3AAFC33B679CC5CBE68B64421ADECE7D085761780A98BB45ACE4B90F8EA21523C2BF87AC851
3,036,734 UART: [art] SIG.R = 079782A22E7DA6241A0CD749B484901EB598A96EEAF66F4562DE2069F8796943A762F85C0B331B09C0C1A235C9ED1375
3,043,490 UART: [art] SIG.S = 1B9913A4D2A4746EF6C75AF753388AB3752BBFAF628F65B47B0EB616CF938E62F461DB1DD5719D4249CDEB0D48A8DAAA
3,067,540 UART: Caliptra RT
3,067,791 UART: [state] CFI Enabled
3,186,753 UART: [rt] RT listening for mailbox commands...
3,187,416 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,165 UART: [rt]cmd =0x46504c54, len=4
3,218,467 >>> mbox cmd response data (8 bytes)
3,218,692 UART: [rt] FIPS self test
3,219,020 UART: [kat] ++
3,219,172 UART: [kat] sha1
3,223,470 UART: [kat] SHA2-256
3,225,576 UART: Fatal Error: 0x90010002
3,227,115 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,120 >>> mbox cmd response: failed
3,227,120 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,227,125 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,307 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,700 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,447 UART: [state] LifecycleState = Unprovisioned
86,102 UART: [state] DebugLocked = No
86,642 UART: [state] WD Timer not started. Device not locked for debugging
88,003 UART: [kat] SHA2-256
893,653 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,778 UART: [kat] ++
897,930 UART: [kat] sha1
902,122 UART: [kat] SHA2-256
904,062 UART: [kat] SHA2-384
906,749 UART: [kat] SHA2-512-ACC
908,650 UART: [kat] ECC-384
918,615 UART: [kat] HMAC-384Kdf
923,207 UART: [kat] LMS
1,171,535 UART: [kat] --
1,172,718 UART: [cold-reset] ++
1,173,066 UART: [fht] FHT @ 0x50003400
1,175,679 UART: [idev] ++
1,175,847 UART: [idev] CDI.KEYID = 6
1,176,207 UART: [idev] SUBJECT.KEYID = 7
1,176,631 UART: [idev] UDS.KEYID = 0
1,176,976 ready_for_fw is high
1,176,976 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,247 UART: [idev] Erasing UDS.KEYID = 0
1,201,216 UART: [idev] Sha1 KeyId Algorithm
1,209,548 UART: [idev] --
1,210,486 UART: [ldev] ++
1,210,654 UART: [ldev] CDI.KEYID = 6
1,211,017 UART: [ldev] SUBJECT.KEYID = 5
1,211,443 UART: [ldev] AUTHORITY.KEYID = 7
1,211,906 UART: [ldev] FE.KEYID = 1
1,217,158 UART: [ldev] Erasing FE.KEYID = 1
1,243,393 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,780 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,496 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,387 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,099 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,060 UART: [ldev] --
1,282,559 UART: [fwproc] Wait for Commands...
1,283,175 UART: [fwproc] Recv command 0x46574c44
1,283,903 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,472 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,851 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,021 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,620 >>> mbox cmd response: success
2,839,742 UART: [afmc] ++
2,839,910 UART: [afmc] CDI.KEYID = 6
2,840,272 UART: [afmc] SUBJECT.KEYID = 7
2,840,697 UART: [afmc] AUTHORITY.KEYID = 5
2,876,152 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,923 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,671 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,380 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,263 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,964 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,670 UART: [afmc] --
2,919,600 UART: [cold-reset] --
2,920,508 UART: [state] Locking Datavault
2,921,841 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,445 UART: [state] Locking ICCM
2,923,115 UART: [exit] Launching FMC @ 0x40000130
2,928,445 UART:
2,928,461 UART: Running Caliptra FMC ...
2,928,869 UART:
2,929,012 UART: [state] CFI Enabled
2,939,642 UART: [fht] FMC Alias Private Key: 7
3,059,006 UART: [art] Extend RT PCRs Done
3,059,434 UART: [art] Lock RT PCRs Done
3,061,018 UART: [art] Populate DV Done
3,069,503 UART: [fht] FMC Alias Private Key: 7
3,070,521 UART: [art] Derive CDI
3,070,801 UART: [art] Store in slot 0x4
3,156,534 UART: [art] Derive Key Pair
3,156,894 UART: [art] Store priv key in slot 0x5
3,170,104 UART: [art] Derive Key Pair - Done
3,185,128 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,705 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,470 UART: [art] PUB.X = 0AEF1ABD8B14C15D2C228A32AA3BAEC36B488884DBCEC2EC94381CCA3F84F0E923F7EECA03C54FA3731BEED855D20EE4
3,208,261 UART: [art] PUB.Y = C036A3F1C9980EB6E32A7DF5070A5F659DBCB711CA71FA5494D93F34CD9DB22DCC899BB6649360068084EA5C2CDED34A
3,215,215 UART: [art] SIG.R = 4243BBEBB9109865433FA9764609CE3F77B081D6B99A0E93A4D0CF6942F2CEDD799FCB7C6F0250B7B0F0E2211C8199BD
3,221,986 UART: [art] SIG.S = 4BB1A5CE5BECFCF5094A4B643A844A57EE505CC680C151BF9F6DD74CEA1B99EF6E215CC48A96FA47756F87AADC4A6173
3,246,541 UART: Caliptra RT
3,246,884 UART: [state] CFI Enabled
3,367,224 UART: [rt] RT listening for mailbox commands...
3,367,887 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,596 UART: [rt]cmd =0x46504c54, len=4
3,398,594 >>> mbox cmd response data (8 bytes)
3,398,887 UART: [rt] FIPS self test
3,399,215 UART: [kat] ++
3,399,367 UART: [kat] sha1
3,403,543 UART: [kat] SHA2-256
3,405,541 UART: Fatal Error: 0x90010002
3,407,080 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,085 >>> mbox cmd response: failed
3,407,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,090 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,305 UART: [state] LifecycleState = Unprovisioned
85,960 UART: [state] DebugLocked = No
86,658 UART: [state] WD Timer not started. Device not locked for debugging
87,911 UART: [kat] SHA2-256
893,561 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,686 UART: [kat] ++
897,838 UART: [kat] sha1
901,932 UART: [kat] SHA2-256
903,872 UART: [kat] SHA2-384
906,501 UART: [kat] SHA2-512-ACC
908,402 UART: [kat] ECC-384
918,255 UART: [kat] HMAC-384Kdf
922,865 UART: [kat] LMS
1,171,193 UART: [kat] --
1,172,004 UART: [cold-reset] ++
1,172,406 UART: [fht] FHT @ 0x50003400
1,175,227 UART: [idev] ++
1,175,395 UART: [idev] CDI.KEYID = 6
1,175,755 UART: [idev] SUBJECT.KEYID = 7
1,176,179 UART: [idev] UDS.KEYID = 0
1,176,524 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,111 UART: [idev] Erasing UDS.KEYID = 0
1,201,106 UART: [idev] Sha1 KeyId Algorithm
1,209,466 UART: [idev] --
1,210,566 UART: [ldev] ++
1,210,734 UART: [ldev] CDI.KEYID = 6
1,211,097 UART: [ldev] SUBJECT.KEYID = 5
1,211,523 UART: [ldev] AUTHORITY.KEYID = 7
1,211,986 UART: [ldev] FE.KEYID = 1
1,217,206 UART: [ldev] Erasing FE.KEYID = 1
1,244,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,674 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,390 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,281 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,993 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,028 UART: [ldev] --
1,283,421 UART: [fwproc] Wait for Commands...
1,284,063 UART: [fwproc] Recv command 0x46574c44
1,284,791 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,370 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,627 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,797 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,328 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,202 ready_for_fw is high
1,061,202 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,694,433 >>> mbox cmd response: success
2,757,286 UART:
2,757,302 UART: Running Caliptra FMC ...
2,757,710 UART:
2,757,853 UART: [state] CFI Enabled
2,768,461 UART: [fht] FMC Alias Private Key: 7
2,886,895 UART: [art] Extend RT PCRs Done
2,887,323 UART: [art] Lock RT PCRs Done
2,889,207 UART: [art] Populate DV Done
2,897,424 UART: [fht] FMC Alias Private Key: 7
2,898,432 UART: [art] Derive CDI
2,898,712 UART: [art] Store in slot 0x4
2,984,559 UART: [art] Derive Key Pair
2,984,919 UART: [art] Store priv key in slot 0x5
2,998,467 UART: [art] Derive Key Pair - Done
3,012,725 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,438 UART: [art] Erasing AUTHORITY.KEYID = 7
3,029,203 UART: [art] PUB.X = 3537914FC0A696C92A36AEBF667681C453E9D21F29D571C12C1C41781BFB2AA296F478120F29C78AAAAB6FF6DA8EA1B7
3,035,982 UART: [art] PUB.Y = 682EAAA4399CA69EB5CE7A2C0083211033611AC11B337831415868D9E88A5C45286FAB3E0F411EE36A602DAC03FEE93D
3,042,910 UART: [art] SIG.R = 7AB2CB5C5280ADD6EE2B437E08835EB5A3928879D000FECE6D384D8054550B594A40755D3CEAE03AAC2A0B350F4FBA02
3,049,657 UART: [art] SIG.S = A2B5EF2D5EAD8EDE8AC096014AE9523D25D269A9F2FEC5FF3B483DCEDF39DDA875523BE6A65044B3D8096588E7AE2440
3,073,649 UART: Caliptra RT
3,073,992 UART: [state] CFI Enabled
3,194,013 UART: [rt] RT listening for mailbox commands...
3,194,676 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,481 UART: [rt]cmd =0x46504c54, len=4
3,225,843 >>> mbox cmd response data (8 bytes)
3,226,038 UART: [rt] FIPS self test
3,226,366 UART: [kat] ++
3,226,518 UART: [kat] sha1
3,230,764 UART: [kat] SHA2-256
3,232,706 UART: Fatal Error: 0x90010002
3,234,245 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,250 >>> mbox cmd response: failed
3,234,250 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,255 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,134 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,581 >>> mbox cmd response: success
test self_tests::kat_sha256_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,709,467 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,859,271 >>> mbox cmd response: failed
2,859,841 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,008,690 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
3,453,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,615 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,012 writing to cptra_bootfsm_go
2,702,488 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,302 >>> mbox cmd response: failed
2,852,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,002,273 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
3,430,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,255,384 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,292 writing to cptra_bootfsm_go
3,057,687 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,506 >>> mbox cmd response: failed
3,208,067 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,356,975 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,178,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,885,930 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,294 writing to cptra_bootfsm_go
3,046,530 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,196,352 >>> mbox cmd response: failed
3,196,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,820 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,170,565 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,243 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,114 writing to cptra_bootfsm_go
2,697,888 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,713 >>> mbox cmd response: failed
2,848,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,175 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
3,430,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,171 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
2,701,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,917 >>> mbox cmd response: failed
2,851,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,364 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,435,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,228 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,982 writing to cptra_bootfsm_go
3,056,598 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,937 >>> mbox cmd response: failed
3,207,605 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,356,356 >>> mbox cmd response: failed
Initializing fuses
972 writing to cptra_bootfsm_go
20,183,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,887,563 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
3,057,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,191 >>> mbox cmd response: failed
3,207,769 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,356,630 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
20,176,406 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,899,068 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,258 >>> mbox cmd response: failed
815,258 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,264 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,401 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,976 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,178 >>> mbox cmd response: failed
815,178 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,184 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,319 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,706 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,359 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,367 >>> mbox cmd response: failed
815,367 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,373 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,240 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,921 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,573 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,581 >>> mbox cmd response: failed
815,581 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,587 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,581 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,474 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,482 >>> mbox cmd response: failed
815,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,488 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,604 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,170 >>> mbox cmd response: failed
815,170 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,176 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,085 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,590 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,849 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,857 >>> mbox cmd response: failed
814,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,863 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,050 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,801 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,075 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,083 >>> mbox cmd response: failed
815,083 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,089 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,748 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,651 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
192,049 UART:
192,416 UART: Running Caliptra ROM ...
193,497 UART:
193,643 UART: [state] CFI Enabled
263,376 UART: [state] LifecycleState = Unprovisioned
265,298 UART: [state] DebugLocked = No
267,891 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,404 UART: [kat] SHA2-256
442,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,608 UART: [kat] ++
453,064 UART: [kat] sha1
464,554 UART: [kat] SHA2-256
467,294 UART: [kat] SHA2-384
473,572 UART: [kat] SHA2-512-ACC
475,957 UART: [kat] ECC-384
2,766,451 UART: [kat] HMAC-384Kdf
2,778,226 UART: [kat] LMS
3,968,552 UART: [kat] --
3,974,129 UART: [cold-reset] ++
3,976,176 UART: [fht] Storing FHT @ 0x50003400
3,987,176 UART: [idev] ++
3,987,748 UART: [idev] CDI.KEYID = 6
3,988,785 UART: [idev] SUBJECT.KEYID = 7
3,989,962 UART: [idev] UDS.KEYID = 0
3,991,013 ready_for_fw is high
3,991,278 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,571 UART: [idev] Erasing UDS.KEYID = 0
7,325,656 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,799 UART: [idev] --
7,352,040 UART: [ldev] ++
7,352,630 UART: [ldev] CDI.KEYID = 6
7,353,557 UART: [ldev] SUBJECT.KEYID = 5
7,354,780 UART: [ldev] AUTHORITY.KEYID = 7
7,356,015 UART: [ldev] FE.KEYID = 1
7,403,151 UART: [ldev] Erasing FE.KEYID = 1
10,745,697 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,039,458 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,054,048 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,068,850 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,083,381 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,102,328 UART: [ldev] --
13,107,199 UART: [fwproc] Waiting for Commands...
13,109,199 UART: [fwproc] Received command 0x46574c44
13,111,384 UART: [fwproc] Received Image of size 119428 bytes
17,228,427 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,306,681 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,379,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,710,672 >>> mbox cmd response: success
17,714,929 UART: [afmc] ++
17,715,521 UART: [afmc] CDI.KEYID = 6
17,716,433 UART: [afmc] SUBJECT.KEYID = 7
17,717,706 UART: [afmc] AUTHORITY.KEYID = 5
21,086,098 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,387,615 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,389,932 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,404,355 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,419,078 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,433,507 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,455,252 UART: [afmc] --
23,458,635 UART: [cold-reset] --
23,464,392 UART: [state] Locking Datavault
23,469,966 UART: [state] Locking PCR0, PCR1 and PCR31
23,471,721 UART: [state] Locking ICCM
23,473,278 UART: [exit] Launching FMC @ 0x40000130
23,481,669 UART:
23,481,909 UART: Running Caliptra FMC ...
23,483,015 UART:
23,483,182 UART: [state] CFI Enabled
23,549,404 UART: [fht] FMC Alias Private Key: 7
25,889,589 UART: [art] Extend RT PCRs Done
25,890,810 UART: [art] Lock RT PCRs Done
25,892,591 UART: [art] Populate DV Done
25,898,237 UART: [fht] FMC Alias Private Key: 7
25,899,799 UART: [art] Derive CDI
25,900,619 UART: [art] Store in slot 0x4
25,957,991 UART: [art] Derive Key Pair
25,958,986 UART: [art] Store priv key in slot 0x5
29,251,815 UART: [art] Derive Key Pair - Done
29,264,865 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,553,382 UART: [art] Erasing AUTHORITY.KEYID = 7
31,554,942 UART: [art] PUB.X = 1B8FCFF573E8C23312F80D3D8C45B4FAE1C50611131470E24B1FCFB5CC10B0A11E3DF786D3F67AE71476FB1C25CAE4A9
31,562,222 UART: [art] PUB.Y = 58C61F5335A7E1D1CEFA6781EED89FB458C7AB647C2BD29064DB21A10C4D3500D6B7B10D9B2572C0ABCB67620501FB96
31,569,483 UART: [art] SIG.R = 8C99FADA493168C4A5B2B432AE2A14EEDD6FC4611F2C14AADC7752D42F768374B56B0F308C0A40DC42A064273AB5B2BA
31,576,894 UART: [art] SIG.S = BF99AFFF14E43657EA354F42C5D651ABF648BE697E6E3620787E34A5286E3E16CF21F363730199C8E54826C0791F1F24
32,882,421 UART: Caliptra RT
32,883,138 UART: [state] CFI Enabled
33,060,563 UART: [rt] RT listening for mailbox commands...
33,062,422 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,092,173 UART: [rt]cmd =0x46504c54, len=4
33,093,865 >>> mbox cmd response data (8 bytes)
33,095,017 UART: [rt] FIPS self test
33,095,977 UART: [kat] ++
33,096,473 UART: [kat] sha1
33,100,770 UART: [kat] SHA2-256
33,102,708 UART: [kat] SHA2-384
33,105,504 UART: [kat] SHA2-512-ACC
33,106,390 UART: Droping operation
33,107,162 UART: Fatal Error: 0x90050002
33,142,263 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,292,290 >>> mbox cmd response: failed
33,292,950 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,442,836 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
190,025 UART:
190,334 UART: Running Caliptra ROM ...
191,362 UART:
191,504 UART: [state] CFI Enabled
263,993 UART: [state] LifecycleState = Unprovisioned
265,967 UART: [state] DebugLocked = No
268,664 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,500 UART: [kat] SHA2-256
443,190 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,701 UART: [kat] ++
454,179 UART: [kat] sha1
465,007 UART: [kat] SHA2-256
467,701 UART: [kat] SHA2-384
472,922 UART: [kat] SHA2-512-ACC
475,318 UART: [kat] ECC-384
2,769,010 UART: [kat] HMAC-384Kdf
2,800,739 UART: [kat] LMS
3,991,036 UART: [kat] --
3,994,340 UART: [cold-reset] ++
3,995,304 UART: [fht] Storing FHT @ 0x50003400
4,006,654 UART: [idev] ++
4,007,225 UART: [idev] CDI.KEYID = 6
4,008,171 UART: [idev] SUBJECT.KEYID = 7
4,009,389 UART: [idev] UDS.KEYID = 0
4,010,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,161,131 UART: [idev] Erasing UDS.KEYID = 0
7,348,232 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,133 UART: [idev] --
7,373,997 UART: [ldev] ++
7,374,574 UART: [ldev] CDI.KEYID = 6
7,375,540 UART: [ldev] SUBJECT.KEYID = 5
7,376,758 UART: [ldev] AUTHORITY.KEYID = 7
7,377,999 UART: [ldev] FE.KEYID = 1
7,422,701 UART: [ldev] Erasing FE.KEYID = 1
10,755,535 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,049,286 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,718 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,093,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,113,070 UART: [ldev] --
13,118,235 UART: [fwproc] Waiting for Commands...
13,120,283 UART: [fwproc] Received command 0x46574c44
13,122,469 UART: [fwproc] Received Image of size 119428 bytes
17,239,033 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,316,844 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,390,018 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,721,166 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,807,530 ready_for_fw is high
3,808,117 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,014,861 >>> mbox cmd response: success
23,717,094 UART:
23,717,592 UART: Running Caliptra FMC ...
23,718,721 UART:
23,718,885 UART: [state] CFI Enabled
23,788,098 UART: [fht] FMC Alias Private Key: 7
26,128,562 UART: [art] Extend RT PCRs Done
26,129,792 UART: [art] Lock RT PCRs Done
26,131,318 UART: [art] Populate DV Done
26,136,637 UART: [fht] FMC Alias Private Key: 7
26,138,204 UART: [art] Derive CDI
26,139,026 UART: [art] Store in slot 0x4
26,196,887 UART: [art] Derive Key Pair
26,197,930 UART: [art] Store priv key in slot 0x5
29,490,776 UART: [art] Derive Key Pair - Done
29,503,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,792,965 UART: [art] Erasing AUTHORITY.KEYID = 7
31,794,483 UART: [art] PUB.X = 63BC019111D9BE7108E256C3CF80492C8B36B4066C606F5E0A6C91F736C15DFE3BF7C1A9CFF5254D57284D216702957A
31,801,714 UART: [art] PUB.Y = E8704939B958835FE59AF9F7D2917B4CF7465757791C3E61FB629E15B00DFBCF0A2F1983252BCAADEE504D9B5FC30ABA
31,808,966 UART: [art] SIG.R = B4736CC1D365FE2DEE6C9BF55146B4610599614A11C0AAC00D256B1E4F28EE24A042D6A09ECD98E285F67F39A8DFF016
31,816,408 UART: [art] SIG.S = 283E2B1C82A08916D1FA349F4E8B8ECE6D9E85ADB8361D17C0247CFA27D5E3858CE9BDCE43707BF2C801D6360C59C59D
33,121,890 UART: Caliptra RT
33,122,610 UART: [state] CFI Enabled
33,299,777 UART: [rt] RT listening for mailbox commands...
33,301,638 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,331,385 UART: [rt]cmd =0x46504c54, len=4
33,333,090 >>> mbox cmd response data (8 bytes)
33,333,998 UART: [rt] FIPS self test
33,334,941 UART: [kat] ++
33,335,394 UART: [kat] sha1
33,339,745 UART: [kat] SHA2-256
33,341,675 UART: [kat] SHA2-384
33,344,551 UART: [kat] SHA2-512-ACC
33,345,482 UART: Droping operation
33,346,509 UART: Fatal Error: 0x90050002
33,381,669 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,531,751 >>> mbox cmd response: failed
33,532,396 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,682,256 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
3,785,634 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,962,141 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,645 UART:
193,016 UART: Running Caliptra ROM ...
194,167 UART:
604,059 UART: [state] CFI Enabled
621,237 UART: [state] LifecycleState = Unprovisioned
623,133 UART: [state] DebugLocked = No
625,514 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
630,956 UART: [kat] SHA2-256
800,687 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
811,250 UART: [kat] ++
811,725 UART: [kat] sha1
822,678 UART: [kat] SHA2-256
825,414 UART: [kat] SHA2-384
830,563 UART: [kat] SHA2-512-ACC
832,879 UART: [kat] ECC-384
3,113,774 UART: [kat] HMAC-384Kdf
3,125,476 UART: [kat] LMS
4,315,600 UART: [kat] --
4,319,538 UART: [cold-reset] ++
4,321,905 UART: [fht] Storing FHT @ 0x50003400
4,333,608 UART: [idev] ++
4,334,187 UART: [idev] CDI.KEYID = 6
4,335,100 UART: [idev] SUBJECT.KEYID = 7
4,336,358 UART: [idev] UDS.KEYID = 0
4,337,408 ready_for_fw is high
4,337,641 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,677 UART: [idev] Erasing UDS.KEYID = 0
7,622,747 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,086 UART: [idev] --
7,649,473 UART: [ldev] ++
7,650,064 UART: [ldev] CDI.KEYID = 6
7,651,097 UART: [ldev] SUBJECT.KEYID = 5
7,652,270 UART: [ldev] AUTHORITY.KEYID = 7
7,653,512 UART: [ldev] FE.KEYID = 1
7,664,735 UART: [ldev] Erasing FE.KEYID = 1
10,948,465 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,788 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,255,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,270,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,681 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,303,187 UART: [ldev] --
13,308,402 UART: [fwproc] Waiting for Commands...
13,310,530 UART: [fwproc] Received command 0x46574c44
13,312,733 UART: [fwproc] Received Image of size 119428 bytes
17,431,294 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,504,250 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,577,444 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,909,743 >>> mbox cmd response: success
17,913,903 UART: [afmc] ++
17,914,544 UART: [afmc] CDI.KEYID = 6
17,915,637 UART: [afmc] SUBJECT.KEYID = 7
17,916,749 UART: [afmc] AUTHORITY.KEYID = 5
21,228,448 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,524,018 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,526,303 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,540,710 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,555,413 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,569,872 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,591,927 UART: [afmc] --
23,596,453 UART: [cold-reset] --
23,601,403 UART: [state] Locking Datavault
23,608,113 UART: [state] Locking PCR0, PCR1 and PCR31
23,609,819 UART: [state] Locking ICCM
23,611,704 UART: [exit] Launching FMC @ 0x40000130
23,620,103 UART:
23,620,346 UART: Running Caliptra FMC ...
23,621,454 UART:
23,621,629 UART: [state] CFI Enabled
23,629,520 UART: [fht] FMC Alias Private Key: 7
25,970,366 UART: [art] Extend RT PCRs Done
25,972,160 UART: [art] Lock RT PCRs Done
25,973,307 UART: [art] Populate DV Done
25,978,642 UART: [fht] FMC Alias Private Key: 7
25,980,242 UART: [art] Derive CDI
25,981,119 UART: [art] Store in slot 0x4
26,023,679 UART: [art] Derive Key Pair
26,024,899 UART: [art] Store priv key in slot 0x5
29,267,172 UART: [art] Derive Key Pair - Done
29,280,194 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,473 UART: [art] Erasing AUTHORITY.KEYID = 7
31,562,031 UART: [art] PUB.X = E8292B5C7F3EABA3C3F2634236990D7EA32CFF18C25ED82A8AA2C59D7ADE33CA0A11FC3F411188B1D4A57DD2A68B88EA
31,569,246 UART: [art] PUB.Y = 1CC87650EA01DC3D5C80130BE955EB1220B5402BA8DD390504BEEC4EF79182EFF169D977A53632ED904A40BF5025800E
31,576,497 UART: [art] SIG.R = 3C6045E772F69EFA963996CF9777AC6C6EFD3EE71BF79EE598EB1189B64F415B991A4BCC70F31D143009F472200EA8A0
31,583,900 UART: [art] SIG.S = CA59D626B166F2D103D4CA150583E23C5499353A3690A71FC142979C921DC2CA53BA41507B46AFAA8FB152A396798567
32,888,808 UART: Caliptra RT
32,889,523 UART: [state] CFI Enabled
33,022,588 UART: [rt] RT listening for mailbox commands...
33,024,453 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,054,076 UART: [rt]cmd =0x46504c54, len=4
33,055,658 >>> mbox cmd response data (8 bytes)
33,056,646 UART: [rt] FIPS self test
33,057,602 UART: [kat] ++
33,058,059 UART: [kat] sha1
33,062,450 UART: [kat] SHA2-256
33,064,348 UART: [kat] SHA2-384
33,067,315 UART: [kat] SHA2-512-ACC
33,068,210 UART: Droping operation
33,068,987 UART: Fatal Error: 0x90050002
33,104,240 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,254,197 >>> mbox cmd response: failed
33,254,875 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,404,777 >>> mbox cmd response: failed
Initializing fuses
968 writing to cptra_bootfsm_go
190,131 UART:
190,420 UART: Running Caliptra ROM ...
191,550 UART:
7,128,275 UART: [state] CFI Enabled
7,145,375 UART: [state] LifecycleState = Unprovisioned
7,147,355 UART: [state] DebugLocked = No
7,149,180 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,153,704 UART: [kat] SHA2-256
7,323,433 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,333,992 UART: [kat] ++
7,334,457 UART: [kat] sha1
7,344,920 UART: [kat] SHA2-256
7,347,616 UART: [kat] SHA2-384
7,353,142 UART: [kat] SHA2-512-ACC
7,355,497 UART: [kat] ECC-384
9,640,193 UART: [kat] HMAC-384Kdf
9,653,017 UART: [kat] LMS
10,843,125 UART: [kat] --
10,848,336 UART: [cold-reset] ++
10,850,116 UART: [fht] Storing FHT @ 0x50003400
10,862,034 UART: [idev] ++
10,862,611 UART: [idev] CDI.KEYID = 6
10,863,549 UART: [idev] SUBJECT.KEYID = 7
10,864,770 UART: [idev] UDS.KEYID = 0
10,866,340 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,016,578 UART: [idev] Erasing UDS.KEYID = 0
14,145,663 UART: [idev] Using Sha1 for KeyId Algorithm
14,168,228 UART: [idev] --
14,171,497 UART: [ldev] ++
14,172,083 UART: [ldev] CDI.KEYID = 6
14,173,057 UART: [ldev] SUBJECT.KEYID = 5
14,174,234 UART: [ldev] AUTHORITY.KEYID = 7
14,175,528 UART: [ldev] FE.KEYID = 1
14,186,559 UART: [ldev] Erasing FE.KEYID = 1
17,474,677 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,767,375 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,781,969 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,796,764 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,811,275 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,829,823 UART: [ldev] --
19,834,603 UART: [fwproc] Waiting for Commands...
19,836,936 UART: [fwproc] Received command 0x46574c44
19,839,126 UART: [fwproc] Received Image of size 119428 bytes
23,948,666 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,021,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,094,858 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,426,702 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,304 writing to cptra_bootfsm_go
4,131,250 ready_for_fw is high
4,131,783 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,174,655 >>> mbox cmd response: success
23,817,162 UART:
23,817,569 UART: Running Caliptra FMC ...
23,818,690 UART:
23,818,860 UART: [state] CFI Enabled
23,826,784 UART: [fht] FMC Alias Private Key: 7
26,166,306 UART: [art] Extend RT PCRs Done
26,167,542 UART: [art] Lock RT PCRs Done
26,169,233 UART: [art] Populate DV Done
26,174,661 UART: [fht] FMC Alias Private Key: 7
26,176,268 UART: [art] Derive CDI
26,177,093 UART: [art] Store in slot 0x4
26,219,445 UART: [art] Derive Key Pair
26,220,497 UART: [art] Store priv key in slot 0x5
29,462,663 UART: [art] Derive Key Pair - Done
29,475,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,756,062 UART: [art] Erasing AUTHORITY.KEYID = 7
31,757,582 UART: [art] PUB.X = E23DAF973D8BB3476E0257BDFBA9E293A070E10D229E582A56040CF3963E93F2AA3A24E3236ACB057B595ACE8F922FF3
31,764,836 UART: [art] PUB.Y = BB6C59864AD679E50EC0278D8A4F7FC5ECDFB565CDA5AC7D4FC24D7C0AF0A294AEAA5E247D46F2BE1895B959190DEBF5
31,772,131 UART: [art] SIG.R = C5D105800FC078BA204E5F0534539D87B096D2601B740717C79B6F3B1857B401E57751934D2A0E329CCB18513D1289AF
31,779,476 UART: [art] SIG.S = 6CBBFD3F21CB72616DE7EBD9A592565281331CF543B77D5B1E4F51995998B89AC667265D3E06CB9A841488741D5D6CFF
33,084,303 UART: Caliptra RT
33,085,015 UART: [state] CFI Enabled
33,219,241 UART: [rt] RT listening for mailbox commands...
33,221,097 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,250,620 UART: [rt]cmd =0x46504c54, len=4
33,252,177 >>> mbox cmd response data (8 bytes)
33,253,308 UART: [rt] FIPS self test
33,254,263 UART: [kat] ++
33,254,721 UART: [kat] sha1
33,259,127 UART: [kat] SHA2-256
33,261,007 UART: [kat] SHA2-384
33,263,764 UART: [kat] SHA2-512-ACC
33,264,656 UART: Droping operation
33,265,513 UART: Fatal Error: 0x90050002
33,300,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,450,711 >>> mbox cmd response: failed
33,451,387 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,601,272 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
10,457,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,512,205 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,214 writing to cptra_bootfsm_go
192,437 UART:
192,809 UART: Running Caliptra ROM ...
193,965 UART:
194,112 UART: [state] CFI Enabled
261,991 UART: [state] LifecycleState = Unprovisioned
264,017 UART: [state] DebugLocked = No
266,295 UART: [state] WD Timer not started. Device not locked for debugging
269,865 UART: [kat] SHA2-256
449,463 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,257 UART: [kat] ++
460,744 UART: [kat] sha1
471,771 UART: [kat] SHA2-256
474,506 UART: [kat] SHA2-384
480,577 UART: [kat] SHA2-512-ACC
482,951 UART: [kat] ECC-384
2,927,423 UART: [kat] HMAC-384Kdf
2,949,630 UART: [kat] LMS
3,426,128 UART: [kat] --
3,428,922 UART: [cold-reset] ++
3,430,365 UART: [fht] FHT @ 0x50003400
3,442,351 UART: [idev] ++
3,442,927 UART: [idev] CDI.KEYID = 6
3,443,911 UART: [idev] SUBJECT.KEYID = 7
3,445,164 UART: [idev] UDS.KEYID = 0
3,446,091 ready_for_fw is high
3,446,301 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,596,497 UART: [idev] Erasing UDS.KEYID = 0
5,966,210 UART: [idev] Sha1 KeyId Algorithm
5,989,417 UART: [idev] --
5,994,832 UART: [ldev] ++
5,995,404 UART: [ldev] CDI.KEYID = 6
5,996,380 UART: [ldev] SUBJECT.KEYID = 5
5,997,562 UART: [ldev] AUTHORITY.KEYID = 7
5,998,803 UART: [ldev] FE.KEYID = 1
6,036,747 UART: [ldev] Erasing FE.KEYID = 1
8,545,632 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,279,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,295,833 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,311,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,327,260 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,349,225 UART: [ldev] --
10,354,616 UART: [fwproc] Wait for Commands...
10,356,935 UART: [fwproc] Recv command 0x46574c44
10,358,929 UART: [fwproc] Recv'd Img size: 119428 bytes
13,851,257 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,933,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,006,693 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,337,402 >>> mbox cmd response: success
14,340,929 UART: [afmc] ++
14,341,520 UART: [afmc] CDI.KEYID = 6
14,343,008 UART: [afmc] SUBJECT.KEYID = 7
14,344,163 UART: [afmc] AUTHORITY.KEYID = 5
16,875,555 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,093 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,279 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,087 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,199 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,668,749 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,694,357 UART: [afmc] --
18,698,556 UART: [cold-reset] --
18,702,478 UART: [state] Locking Datavault
18,707,030 UART: [state] Locking PCR0, PCR1 and PCR31
18,708,790 UART: [state] Locking ICCM
18,711,165 UART: [exit] Launching FMC @ 0x40000130
18,719,590 UART:
18,719,833 UART: Running Caliptra FMC ...
18,720,946 UART:
18,721,110 UART: [state] CFI Enabled
18,776,545 UART: [fht] FMC Alias Private Key: 7
20,542,903 UART: [art] Extend RT PCRs Done
20,544,112 UART: [art] Lock RT PCRs Done
20,545,495 UART: [art] Populate DV Done
20,551,074 UART: [fht] FMC Alias Private Key: 7
20,552,731 UART: [art] Derive CDI
20,553,548 UART: [art] Store in slot 0x4
20,609,794 UART: [art] Derive Key Pair
20,610,867 UART: [art] Store priv key in slot 0x5
23,073,718 UART: [art] Derive Key Pair - Done
23,086,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,800,010 UART: [art] Erasing AUTHORITY.KEYID = 7
24,801,534 UART: [art] PUB.X = 5229F0D4AFF3D1E323475F81A4D85ACE9BC2F72C3889D09EFA906CD21BD81605D0A678E0EFA81BA7B7B4371014C6B92A
24,808,797 UART: [art] PUB.Y = 228A576CC1827D8854277E3246FF7605CD386DA82AD497FB4595FA231EB68FAC13BA4F0E22DEF86100814712F6EC74C4
24,816,051 UART: [art] SIG.R = 6D9C7D4906B5830C1BFAB2D8F23C64907C42FBB877E3DAE701604B04B886FBEBF3BA37C2B3E1D7DE2A8209E9AE665FB0
24,823,498 UART: [art] SIG.S = A9E9E7FFA8CB0DDBD0234A49B7EA83690055E682599C9D171EA7BEED87534321DAA0F8C56D887B195FE4BA8BB2335DDB
25,802,316 UART: Caliptra RT
25,803,033 UART: [state] CFI Enabled
25,985,173 UART: [rt] RT listening for mailbox commands...
25,987,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,016,736 UART: [rt]cmd =0x46504c54, len=4
26,018,485 >>> mbox cmd response data (8 bytes)
26,019,494 UART: [rt] FIPS self test
26,020,440 UART: [kat] ++
26,020,898 UART: [kat] sha1
26,025,211 UART: [kat] SHA2-256
26,027,135 UART: [kat] SHA2-384
26,030,114 UART: [kat] SHA2-512-ACC
26,031,039 UART: Droping operation
26,031,828 UART: Fatal Error: 0x90050002
26,067,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,217,029 >>> mbox cmd response: failed
26,217,696 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,367,581 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,126 UART:
190,416 UART: Running Caliptra ROM ...
191,442 UART:
191,586 UART: [state] CFI Enabled
266,802 UART: [state] LifecycleState = Unprovisioned
268,723 UART: [state] DebugLocked = No
269,969 UART: [state] WD Timer not started. Device not locked for debugging
273,482 UART: [kat] SHA2-256
453,175 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,956 UART: [kat] ++
464,621 UART: [kat] sha1
474,862 UART: [kat] SHA2-256
477,556 UART: [kat] SHA2-384
482,560 UART: [kat] SHA2-512-ACC
484,914 UART: [kat] ECC-384
2,927,500 UART: [kat] HMAC-384Kdf
2,951,494 UART: [kat] LMS
3,427,976 UART: [kat] --
3,433,111 UART: [cold-reset] ++
3,434,127 UART: [fht] FHT @ 0x50003400
3,445,409 UART: [idev] ++
3,446,033 UART: [idev] CDI.KEYID = 6
3,446,929 UART: [idev] SUBJECT.KEYID = 7
3,448,197 UART: [idev] UDS.KEYID = 0
3,449,708 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,599,837 UART: [idev] Erasing UDS.KEYID = 0
5,967,590 UART: [idev] Sha1 KeyId Algorithm
5,991,382 UART: [idev] --
5,996,489 UART: [ldev] ++
5,997,080 UART: [ldev] CDI.KEYID = 6
5,997,975 UART: [ldev] SUBJECT.KEYID = 5
5,999,194 UART: [ldev] AUTHORITY.KEYID = 7
6,000,486 UART: [ldev] FE.KEYID = 1
6,038,479 UART: [ldev] Erasing FE.KEYID = 1
8,544,765 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,278,923 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,294,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,310,660 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,326,219 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,372 UART: [ldev] --
10,354,689 UART: [fwproc] Wait for Commands...
10,357,061 UART: [fwproc] Recv command 0x46574c44
10,359,067 UART: [fwproc] Recv'd Img size: 119428 bytes
13,855,809 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,935,611 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,008,608 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,340,399 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
3,462,099 ready_for_fw is high
3,462,742 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,262,532 >>> mbox cmd response: success
18,555,547 UART:
18,555,952 UART: Running Caliptra FMC ...
18,557,108 UART:
18,557,274 UART: [state] CFI Enabled
18,625,734 UART: [fht] FMC Alias Private Key: 7
20,391,606 UART: [art] Extend RT PCRs Done
20,392,834 UART: [art] Lock RT PCRs Done
20,394,603 UART: [art] Populate DV Done
20,400,094 UART: [fht] FMC Alias Private Key: 7
20,401,595 UART: [art] Derive CDI
20,402,338 UART: [art] Store in slot 0x4
20,458,843 UART: [art] Derive Key Pair
20,459,887 UART: [art] Store priv key in slot 0x5
22,922,449 UART: [art] Derive Key Pair - Done
22,935,347 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,648,310 UART: [art] Erasing AUTHORITY.KEYID = 7
24,649,828 UART: [art] PUB.X = 59C3ABB53A85C69729D6446DC9AB7BCB155180E080E66C87A853A5ACD1CE6A4BC4D501EEE87E43893CB46B53EDDE5BF4
24,657,112 UART: [art] PUB.Y = 222F3F701BF60958B9ACDE2FBE8FF8AE324E05BECC42A8DC6253BE32264007514DFAC2EA98E5F9BD1D09493BE15FFAA6
24,664,385 UART: [art] SIG.R = A4A2988274A091A249B73AC4728DE110ADD4CFD682FCBA277CF51AB4345735FC931896B906C51C454317C2B56C54DB24
24,672,353 UART: [art] SIG.S = EA9A5555C2BFC1C94277647C05151173574816D95E5D43DFAFE2482B5A055ABCCD707F1F4DE1C0373CF79BD4FE575E6E
25,651,191 UART: Caliptra RT
25,651,896 UART: [state] CFI Enabled
25,831,214 UART: [rt] RT listening for mailbox commands...
25,833,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,862,870 UART: [rt]cmd =0x46504c54, len=4
25,864,399 >>> mbox cmd response data (8 bytes)
25,865,516 UART: [rt] FIPS self test
25,866,464 UART: [kat] ++
25,866,915 UART: [kat] sha1
25,871,211 UART: [kat] SHA2-256
25,873,136 UART: [kat] SHA2-384
25,876,194 UART: [kat] SHA2-512-ACC
25,877,082 UART: Droping operation
25,877,892 UART: Fatal Error: 0x90050002
25,912,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,062,975 >>> mbox cmd response: failed
26,063,631 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,213,584 >>> mbox cmd response: failed
Initializing fuses
967 writing to cptra_bootfsm_go
3,440,729 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,217,972 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,351 writing to cptra_bootfsm_go
192,648 UART:
193,002 UART: Running Caliptra ROM ...
194,149 UART:
604,021 UART: [state] CFI Enabled
614,994 UART: [state] LifecycleState = Unprovisioned
616,974 UART: [state] DebugLocked = No
619,014 UART: [state] WD Timer not started. Device not locked for debugging
623,651 UART: [kat] SHA2-256
803,329 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,117 UART: [kat] ++
814,656 UART: [kat] sha1
824,194 UART: [kat] SHA2-256
826,928 UART: [kat] SHA2-384
833,064 UART: [kat] SHA2-512-ACC
835,442 UART: [kat] ECC-384
3,277,748 UART: [kat] HMAC-384Kdf
3,291,704 UART: [kat] LMS
3,768,178 UART: [kat] --
3,774,335 UART: [cold-reset] ++
3,775,861 UART: [fht] FHT @ 0x50003400
3,786,988 UART: [idev] ++
3,787,585 UART: [idev] CDI.KEYID = 6
3,788,574 UART: [idev] SUBJECT.KEYID = 7
3,789,755 UART: [idev] UDS.KEYID = 0
3,790,810 ready_for_fw is high
3,791,041 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,940,995 UART: [idev] Erasing UDS.KEYID = 0
6,266,960 UART: [idev] Sha1 KeyId Algorithm
6,291,051 UART: [idev] --
6,295,541 UART: [ldev] ++
6,296,112 UART: [ldev] CDI.KEYID = 6
6,297,026 UART: [ldev] SUBJECT.KEYID = 5
6,298,246 UART: [ldev] AUTHORITY.KEYID = 7
6,299,486 UART: [ldev] FE.KEYID = 1
6,311,540 UART: [ldev] Erasing FE.KEYID = 1
8,788,175 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,515 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,428 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,250 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,554,806 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,768 UART: [ldev] --
10,582,747 UART: [fwproc] Wait for Commands...
10,584,852 UART: [fwproc] Recv command 0x46574c44
10,586,842 UART: [fwproc] Recv'd Img size: 119428 bytes
14,083,464 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,164,410 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,237,425 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,568,036 >>> mbox cmd response: success
14,571,922 UART: [afmc] ++
14,572,518 UART: [afmc] CDI.KEYID = 6
14,573,446 UART: [afmc] SUBJECT.KEYID = 7
14,574,663 UART: [afmc] AUTHORITY.KEYID = 5
17,085,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,806,319 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,808,500 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,824,332 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,840,414 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,856,003 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,879,580 UART: [afmc] --
18,883,777 UART: [cold-reset] --
18,887,758 UART: [state] Locking Datavault
18,894,292 UART: [state] Locking PCR0, PCR1 and PCR31
18,896,012 UART: [state] Locking ICCM
18,897,523 UART: [exit] Launching FMC @ 0x40000130
18,905,981 UART:
18,906,225 UART: Running Caliptra FMC ...
18,907,332 UART:
18,907,499 UART: [state] CFI Enabled
18,915,437 UART: [fht] FMC Alias Private Key: 7
20,681,446 UART: [art] Extend RT PCRs Done
20,682,669 UART: [art] Lock RT PCRs Done
20,683,927 UART: [art] Populate DV Done
20,689,343 UART: [fht] FMC Alias Private Key: 7
20,691,042 UART: [art] Derive CDI
20,691,870 UART: [art] Store in slot 0x4
20,734,691 UART: [art] Derive Key Pair
20,735,732 UART: [art] Store priv key in slot 0x5
23,162,778 UART: [art] Derive Key Pair - Done
23,175,559 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,881,902 UART: [art] Erasing AUTHORITY.KEYID = 7
24,883,410 UART: [art] PUB.X = B0094867021085FE8B839293422C43918D19613B44340F5F60DB293321FEA451133FDFDC76EC64D1E78CD015BCD278C8
24,890,653 UART: [art] PUB.Y = DAC272F522510F72FBE112D44E36156EED0310CD9A9FF50D6E70F01FC8EA031FEEFDDF0661C51D4A59880A07AA0A82EE
24,897,927 UART: [art] SIG.R = 6465220B0C431E9E1E4718F976905051805636413E9AFE4964BA830593B010DAF836C10EC1A496D672583E9FF9E22D18
24,905,314 UART: [art] SIG.S = 94E0D803BD402DF392DB023F6063D664C7BA19636AC6B0C9A1F48C435370DC1B97135D54828A873ED3A14CE695D27BC6
25,884,056 UART: Caliptra RT
25,884,807 UART: [state] CFI Enabled
26,018,360 UART: [rt] RT listening for mailbox commands...
26,020,221 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,049,768 UART: [rt]cmd =0x46504c54, len=4
26,051,199 >>> mbox cmd response data (8 bytes)
26,052,215 UART: [rt] FIPS self test
26,053,164 UART: [kat] ++
26,053,619 UART: [kat] sha1
26,058,217 UART: [kat] SHA2-256
26,060,105 UART: [kat] SHA2-384
26,063,019 UART: [kat] SHA2-512-ACC
26,063,912 UART: Droping operation
26,064,719 UART: Fatal Error: 0x90050002
26,100,057 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,250,093 >>> mbox cmd response: failed
26,250,767 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,400,980 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,124 UART:
190,425 UART: Running Caliptra ROM ...
191,489 UART:
14,134,902 UART: [state] CFI Enabled
14,144,689 UART: [state] LifecycleState = Unprovisioned
14,146,603 UART: [state] DebugLocked = No
14,149,532 UART: [state] WD Timer not started. Device not locked for debugging
14,153,387 UART: [kat] SHA2-256
14,333,046 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,343,791 UART: [kat] ++
14,344,255 UART: [kat] sha1
14,356,601 UART: [kat] SHA2-256
14,359,292 UART: [kat] SHA2-384
14,364,495 UART: [kat] SHA2-512-ACC
14,366,858 UART: [kat] ECC-384
16,808,159 UART: [kat] HMAC-384Kdf
16,821,637 UART: [kat] LMS
17,298,184 UART: [kat] --
17,301,694 UART: [cold-reset] ++
17,304,284 UART: [fht] FHT @ 0x50003400
17,315,804 UART: [idev] ++
17,316,371 UART: [idev] CDI.KEYID = 6
17,317,312 UART: [idev] SUBJECT.KEYID = 7
17,318,582 UART: [idev] UDS.KEYID = 0
17,320,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,469,969 UART: [idev] Erasing UDS.KEYID = 0
19,797,988 UART: [idev] Sha1 KeyId Algorithm
19,821,006 UART: [idev] --
19,825,654 UART: [ldev] ++
19,826,299 UART: [ldev] CDI.KEYID = 6
19,827,189 UART: [ldev] SUBJECT.KEYID = 5
19,828,404 UART: [ldev] AUTHORITY.KEYID = 7
19,829,586 UART: [ldev] FE.KEYID = 1
19,841,667 UART: [ldev] Erasing FE.KEYID = 1
22,324,597 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,043,896 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,059,770 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,075,620 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,091,212 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,112,520 UART: [ldev] --
24,118,438 UART: [fwproc] Wait for Commands...
24,121,199 UART: [fwproc] Recv command 0x46574c44
24,123,246 UART: [fwproc] Recv'd Img size: 119428 bytes
27,617,256 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,702,520 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,775,567 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,107,670 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,781,793 ready_for_fw is high
3,782,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,455,045 >>> mbox cmd response: success
18,704,190 UART:
18,704,602 UART: Running Caliptra FMC ...
18,705,740 UART:
18,705,903 UART: [state] CFI Enabled
18,713,828 UART: [fht] FMC Alias Private Key: 7
20,479,821 UART: [art] Extend RT PCRs Done
20,481,056 UART: [art] Lock RT PCRs Done
20,482,501 UART: [art] Populate DV Done
20,488,142 UART: [fht] FMC Alias Private Key: 7
20,489,849 UART: [art] Derive CDI
20,490,594 UART: [art] Store in slot 0x4
20,533,416 UART: [art] Derive Key Pair
20,534,461 UART: [art] Store priv key in slot 0x5
22,961,241 UART: [art] Derive Key Pair - Done
22,974,297 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,681,055 UART: [art] Erasing AUTHORITY.KEYID = 7
24,682,553 UART: [art] PUB.X = 08CE5C203C5DC10DD5704440016737E89C17A08F8FC91600C727DB87A6FB7AEBB16B4D6D9D09A6AD6DD59B8DF2C5DD07
24,689,833 UART: [art] PUB.Y = 107E3938B8A71A0211734FB4D23C38CD1E38A87CB21D52FC49BD1A32B9D695171519B99F86A8D9F72C89717BE791636C
24,697,057 UART: [art] SIG.R = 5EBC2D7E279002299B2D06216482906B40BF2BC511075F95FC2D8C890D0C382086F8F5B92C128768F9159424C0A32185
24,704,419 UART: [art] SIG.S = 7A5A5FCB8D47CCE6D4E3B7F3CFB642F2C5F4945345A45EDC9189001B6CF0879E002A989EC687EAE4DEB5C62B10618321
25,683,481 UART: Caliptra RT
25,684,196 UART: [state] CFI Enabled
25,816,399 UART: [rt] RT listening for mailbox commands...
25,818,263 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,848,193 UART: [rt]cmd =0x46504c54, len=4
25,849,839 >>> mbox cmd response data (8 bytes)
25,851,047 UART: [rt] FIPS self test
25,851,995 UART: [kat] ++
25,852,449 UART: [kat] sha1
25,856,804 UART: [kat] SHA2-256
25,858,741 UART: [kat] SHA2-384
25,861,758 UART: [kat] SHA2-512-ACC
25,862,649 UART: Droping operation
25,863,453 UART: Fatal Error: 0x90050002
25,898,795 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,048,786 >>> mbox cmd response: failed
26,049,454 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,199,244 >>> mbox cmd response: failed
Initializing fuses
933 writing to cptra_bootfsm_go
17,512,960 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,198,330 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,130 writing to cptra_bootfsm_go
192,291 UART:
192,648 UART: Running Caliptra ROM ...
193,838 UART:
193,988 UART: [state] CFI Enabled
261,463 UART: [state] LifecycleState = Unprovisioned
263,881 UART: [state] DebugLocked = No
266,347 UART: [state] WD Timer not started. Device not locked for debugging
271,631 UART: [kat] SHA2-256
461,506 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,241 UART: [kat] ++
472,861 UART: [kat] sha1
484,952 UART: [kat] SHA2-256
487,971 UART: [kat] SHA2-384
493,970 UART: [kat] SHA2-512-ACC
496,569 UART: [kat] ECC-384
2,949,197 UART: [kat] HMAC-384Kdf
2,972,312 UART: [kat] LMS
3,504,037 UART: [kat] --
3,506,762 UART: [cold-reset] ++
3,509,420 UART: [fht] FHT @ 0x50003400
3,519,700 UART: [idev] ++
3,520,379 UART: [idev] CDI.KEYID = 6
3,521,299 UART: [idev] SUBJECT.KEYID = 7
3,522,578 UART: [idev] UDS.KEYID = 0
3,523,786 ready_for_fw is high
3,524,012 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,674,198 UART: [idev] Erasing UDS.KEYID = 0
6,031,354 UART: [idev] Sha1 KeyId Algorithm
6,054,000 UART: [idev] --
6,060,068 UART: [ldev] ++
6,060,763 UART: [ldev] CDI.KEYID = 6
6,061,678 UART: [ldev] SUBJECT.KEYID = 5
6,062,845 UART: [ldev] AUTHORITY.KEYID = 7
6,064,031 UART: [ldev] FE.KEYID = 1
6,100,760 UART: [ldev] Erasing FE.KEYID = 1
8,607,336 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,636 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,038 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,157 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,435 UART: [ldev] --
10,415,688 UART: [fwproc] Wait for Commands...
10,418,123 UART: [fwproc] Recv command 0x46574c44
10,420,389 UART: [fwproc] Recv'd Img size: 119428 bytes
13,922,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,089 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,119,717 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,685,330 >>> mbox cmd response: success
14,689,292 UART: [afmc] ++
14,689,996 UART: [afmc] CDI.KEYID = 6
14,691,237 UART: [afmc] SUBJECT.KEYID = 7
14,692,673 UART: [afmc] AUTHORITY.KEYID = 5
17,238,015 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,980,326 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,982,240 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,997,356 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,012,491 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,027,408 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,051,085 UART: [afmc] --
19,054,001 UART: [cold-reset] --
19,056,851 UART: [state] Locking Datavault
19,062,489 UART: [state] Locking PCR0, PCR1 and PCR31
19,064,686 UART: [state] Locking ICCM
19,067,656 UART: [exit] Launching FMC @ 0x40000130
19,076,339 UART:
19,076,595 UART: Running Caliptra FMC ...
19,077,708 UART:
19,077,873 UART: [state] CFI Enabled
19,137,868 UART: [fht] FMC Alias Private Key: 7
20,904,731 UART: [art] Extend RT PCRs Done
20,905,963 UART: [art] Lock RT PCRs Done
20,907,589 UART: [art] Populate DV Done
20,913,339 UART: [fht] FMC Alias Private Key: 7
20,914,886 UART: [art] Derive CDI
20,915,711 UART: [art] Store in slot 0x4
20,970,379 UART: [art] Derive Key Pair
20,971,425 UART: [art] Store priv key in slot 0x5
23,433,955 UART: [art] Derive Key Pair - Done
23,446,740 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,159,314 UART: [art] Erasing AUTHORITY.KEYID = 7
25,160,826 UART: [art] PUB.X = 76A15EC5417563C8B355D04526E4209191D527D80ED08EE7276B91D6C8597EF7F35828E2728BA078097156C45B093FC1
25,168,082 UART: [art] PUB.Y = 5322314CCAD73F4C4D5D09967A9DBC1E5132EA74CA3C6B16470EA91C7CB5BC6CAEFF1F3BB7C5CB90BF64161A512F8BCB
25,175,329 UART: [art] SIG.R = FC6CBADC1AC072D612518A0EF47527A1F2418682D775B47B7DA9CBA036784E8674048B9596D91C5D99320C8E1393AAE7
25,182,725 UART: [art] SIG.S = AFC67F4312FEC6238F85F1AD2C2BB9E2375B692D74F53AC8703901D715CD24EBBE9672781CD59C6FE29A1E2150E840BF
26,161,797 UART: Caliptra RT
26,162,508 UART: [state] CFI Enabled
26,342,530 UART: [rt] RT listening for mailbox commands...
26,344,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,373,926 UART: [rt]cmd =0x46504c54, len=4
26,375,616 >>> mbox cmd response data (8 bytes)
26,376,757 UART: [rt] FIPS self test
26,377,705 UART: [kat] ++
26,378,158 UART: [kat] sha1
26,382,539 UART: [kat] SHA2-256
26,384,476 UART: [kat] SHA2-384
26,387,384 UART: [kat] SHA2-512-ACC
26,388,277 UART: Droping operation
26,389,057 UART: Fatal Error: 0x90050002
26,424,408 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,574,402 >>> mbox cmd response: failed
26,574,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,724,886 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,107 UART:
190,402 UART: Running Caliptra ROM ...
191,431 UART:
191,574 UART: [state] CFI Enabled
264,974 UART: [state] LifecycleState = Unprovisioned
267,056 UART: [state] DebugLocked = No
268,250 UART: [state] WD Timer not started. Device not locked for debugging
272,084 UART: [kat] SHA2-256
461,908 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,704 UART: [kat] ++
473,160 UART: [kat] sha1
483,878 UART: [kat] SHA2-256
486,886 UART: [kat] SHA2-384
493,894 UART: [kat] SHA2-512-ACC
496,503 UART: [kat] ECC-384
2,948,110 UART: [kat] HMAC-384Kdf
2,972,864 UART: [kat] LMS
3,504,593 UART: [kat] --
3,507,945 UART: [cold-reset] ++
3,509,592 UART: [fht] FHT @ 0x50003400
3,521,666 UART: [idev] ++
3,522,352 UART: [idev] CDI.KEYID = 6
3,523,375 UART: [idev] SUBJECT.KEYID = 7
3,524,540 UART: [idev] UDS.KEYID = 0
3,526,045 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,150 UART: [idev] Erasing UDS.KEYID = 0
6,028,809 UART: [idev] Sha1 KeyId Algorithm
6,052,366 UART: [idev] --
6,058,310 UART: [ldev] ++
6,059,002 UART: [ldev] CDI.KEYID = 6
6,059,924 UART: [ldev] SUBJECT.KEYID = 5
6,061,110 UART: [ldev] AUTHORITY.KEYID = 7
6,062,301 UART: [ldev] FE.KEYID = 1
6,101,203 UART: [ldev] Erasing FE.KEYID = 1
8,610,115 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,796 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,947 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,199 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,301 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,103 UART: [ldev] --
10,415,593 UART: [fwproc] Wait for Commands...
10,418,613 UART: [fwproc] Recv command 0x46574c44
10,420,928 UART: [fwproc] Recv'd Img size: 119428 bytes
13,929,290 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,546 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,172 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,700,099 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,441,797 ready_for_fw is high
3,442,313 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,832,608 >>> mbox cmd response: success
19,115,225 UART:
19,115,686 UART: Running Caliptra FMC ...
19,116,829 UART:
19,116,995 UART: [state] CFI Enabled
19,180,853 UART: [fht] FMC Alias Private Key: 7
20,946,834 UART: [art] Extend RT PCRs Done
20,948,066 UART: [art] Lock RT PCRs Done
20,949,940 UART: [art] Populate DV Done
20,955,523 UART: [fht] FMC Alias Private Key: 7
20,957,181 UART: [art] Derive CDI
20,958,005 UART: [art] Store in slot 0x4
21,013,608 UART: [art] Derive Key Pair
21,014,660 UART: [art] Store priv key in slot 0x5
23,476,755 UART: [art] Derive Key Pair - Done
23,489,649 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,202,207 UART: [art] Erasing AUTHORITY.KEYID = 7
25,203,726 UART: [art] PUB.X = CAEE57A69118C4114939D2F924F9AFA918157866B448FD200196D13A2AFB662BF2B6384EC1C0248D2F1513D792F8E3AE
25,210,984 UART: [art] PUB.Y = 2267629F11277C60F342CB4B7EB628190431C676202D83C2293669F37EE4DB886A35B835BEBE769F5E1FE19C59650DA6
25,218,201 UART: [art] SIG.R = C509C312B43C2A9D67480614520E9E513459B13D30B04FDFA1792D4DFDED1E445B1E38B302E1861A44CB715D62E11C3B
25,225,635 UART: [art] SIG.S = 09A94524FF83C9A02345656487B7883BC3C395007793965F4D8D2D444BC0F32E234F18D1A201B254BAB7D898CEC97D4E
26,204,297 UART: Caliptra RT
26,204,993 UART: [state] CFI Enabled
26,384,585 UART: [rt] RT listening for mailbox commands...
26,386,440 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,416,244 UART: [rt]cmd =0x46504c54, len=4
26,417,769 >>> mbox cmd response data (8 bytes)
26,419,052 UART: [rt] FIPS self test
26,419,995 UART: [kat] ++
26,420,445 UART: [kat] sha1
26,424,738 UART: [kat] SHA2-256
26,426,615 UART: [kat] SHA2-384
26,429,500 UART: [kat] SHA2-512-ACC
26,430,384 UART: Droping operation
26,431,242 UART: Fatal Error: 0x90050002
26,466,703 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,616,756 >>> mbox cmd response: failed
26,617,397 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,767,343 >>> mbox cmd response: failed
Initializing fuses
930 writing to cptra_bootfsm_go
3,432,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,840,033 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,190 writing to cptra_bootfsm_go
192,515 UART:
192,881 UART: Running Caliptra ROM ...
194,075 UART:
603,653 UART: [state] CFI Enabled
620,250 UART: [state] LifecycleState = Unprovisioned
622,657 UART: [state] DebugLocked = No
625,335 UART: [state] WD Timer not started. Device not locked for debugging
630,452 UART: [kat] SHA2-256
820,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
831,162 UART: [kat] ++
831,696 UART: [kat] sha1
842,440 UART: [kat] SHA2-256
845,447 UART: [kat] SHA2-384
852,740 UART: [kat] SHA2-512-ACC
855,304 UART: [kat] ECC-384
3,297,707 UART: [kat] HMAC-384Kdf
3,311,399 UART: [kat] LMS
3,843,196 UART: [kat] --
3,848,628 UART: [cold-reset] ++
3,850,022 UART: [fht] FHT @ 0x50003400
3,860,452 UART: [idev] ++
3,861,163 UART: [idev] CDI.KEYID = 6
3,862,054 UART: [idev] SUBJECT.KEYID = 7
3,863,306 UART: [idev] UDS.KEYID = 0
3,864,214 ready_for_fw is high
3,864,431 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,014,446 UART: [idev] Erasing UDS.KEYID = 0
6,342,188 UART: [idev] Sha1 KeyId Algorithm
6,364,526 UART: [idev] --
6,369,732 UART: [ldev] ++
6,370,459 UART: [ldev] CDI.KEYID = 6
6,371,391 UART: [ldev] SUBJECT.KEYID = 5
6,372,506 UART: [ldev] AUTHORITY.KEYID = 7
6,373,690 UART: [ldev] FE.KEYID = 1
6,387,255 UART: [ldev] Erasing FE.KEYID = 1
8,864,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,258 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,499 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,783 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,193 UART: [ldev] --
10,655,256 UART: [fwproc] Wait for Commands...
10,657,686 UART: [fwproc] Recv command 0x46574c44
10,659,956 UART: [fwproc] Recv'd Img size: 119428 bytes
14,166,956 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,241,876 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,365,512 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,930,399 >>> mbox cmd response: success
14,934,359 UART: [afmc] ++
14,935,065 UART: [afmc] CDI.KEYID = 6
14,936,320 UART: [afmc] SUBJECT.KEYID = 7
14,937,721 UART: [afmc] AUTHORITY.KEYID = 5
17,443,579 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,164,080 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,166,040 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,181,127 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,196,247 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,211,184 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,235,370 UART: [afmc] --
19,239,135 UART: [cold-reset] --
19,243,863 UART: [state] Locking Datavault
19,249,986 UART: [state] Locking PCR0, PCR1 and PCR31
19,252,214 UART: [state] Locking ICCM
19,254,054 UART: [exit] Launching FMC @ 0x40000130
19,262,681 UART:
19,262,919 UART: Running Caliptra FMC ...
19,264,027 UART:
19,264,227 UART: [state] CFI Enabled
19,272,112 UART: [fht] FMC Alias Private Key: 7
21,038,273 UART: [art] Extend RT PCRs Done
21,039,499 UART: [art] Lock RT PCRs Done
21,041,237 UART: [art] Populate DV Done
21,046,602 UART: [fht] FMC Alias Private Key: 7
21,048,036 UART: [art] Derive CDI
21,048,817 UART: [art] Store in slot 0x4
21,091,146 UART: [art] Derive Key Pair
21,092,196 UART: [art] Store priv key in slot 0x5
23,519,231 UART: [art] Derive Key Pair - Done
23,532,287 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,238,692 UART: [art] Erasing AUTHORITY.KEYID = 7
25,240,200 UART: [art] PUB.X = BFE7BD9099FA9F9CDF3C8CFE41FE50F05D804BEA1B1F687FD9C618B1C8A5E74A2A864398C2FC6EB7F768DFC701C5B2EC
25,247,564 UART: [art] PUB.Y = A874523F6702ADDB17F5A4422F51CDCF67454AFDA8B608E0C82D51D07569C78EBE7C457BCCD6CA537A67475421DA8BF7
25,254,837 UART: [art] SIG.R = A847192C357495EB264E02AF32B6E21A3A92D0F8BED2E70BA07BFB0A172A271266AF1ED305C7476ADFCB37C018453DE9
25,262,226 UART: [art] SIG.S = 5CD01188C0CC865088EA9CED886A703DA78AD36700D3B937DFF9B7A5F34D334E848A20266DB8176C033586BE3D30C2E4
26,241,152 UART: Caliptra RT
26,241,874 UART: [state] CFI Enabled
26,373,830 UART: [rt] RT listening for mailbox commands...
26,375,691 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,405,340 UART: [rt]cmd =0x46504c54, len=4
26,406,929 >>> mbox cmd response data (8 bytes)
26,407,883 UART: [rt] FIPS self test
26,408,833 UART: [kat] ++
26,409,288 UART: [kat] sha1
26,413,564 UART: [kat] SHA2-256
26,415,503 UART: [kat] SHA2-384
26,418,461 UART: [kat] SHA2-512-ACC
26,419,356 UART: Droping operation
26,420,133 UART: Fatal Error: 0x90050002
26,455,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,605,376 >>> mbox cmd response: failed
26,606,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,755,917 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,166 UART:
190,456 UART: Running Caliptra ROM ...
191,567 UART:
13,768,394 UART: [state] CFI Enabled
13,779,988 UART: [state] LifecycleState = Unprovisioned
13,782,428 UART: [state] DebugLocked = No
13,784,043 UART: [state] WD Timer not started. Device not locked for debugging
13,789,272 UART: [kat] SHA2-256
13,979,112 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,989,929 UART: [kat] ++
13,990,451 UART: [kat] sha1
14,001,255 UART: [kat] SHA2-256
14,004,285 UART: [kat] SHA2-384
14,010,573 UART: [kat] SHA2-512-ACC
14,013,192 UART: [kat] ECC-384
16,454,995 UART: [kat] HMAC-384Kdf
16,469,349 UART: [kat] LMS
17,001,188 UART: [kat] --
17,005,279 UART: [cold-reset] ++
17,006,682 UART: [fht] FHT @ 0x50003400
17,019,303 UART: [idev] ++
17,019,986 UART: [idev] CDI.KEYID = 6
17,021,004 UART: [idev] SUBJECT.KEYID = 7
17,022,178 UART: [idev] UDS.KEYID = 0
17,023,715 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,173,657 UART: [idev] Erasing UDS.KEYID = 0
19,501,420 UART: [idev] Sha1 KeyId Algorithm
19,525,217 UART: [idev] --
19,530,573 UART: [ldev] ++
19,531,188 UART: [ldev] CDI.KEYID = 6
19,532,080 UART: [ldev] SUBJECT.KEYID = 5
19,533,105 UART: [ldev] AUTHORITY.KEYID = 7
19,534,394 UART: [ldev] FE.KEYID = 1
19,544,045 UART: [ldev] Erasing FE.KEYID = 1
22,026,729 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,744,980 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,760,170 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,775,376 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,790,441 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,810,568 UART: [ldev] --
23,815,402 UART: [fwproc] Wait for Commands...
23,817,120 UART: [fwproc] Recv command 0x46574c44
23,819,384 UART: [fwproc] Recv'd Img size: 119428 bytes
27,325,574 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,404,593 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,528,218 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,093,762 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,350 writing to cptra_bootfsm_go
3,758,592 ready_for_fw is high
3,759,204 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,070,112 >>> mbox cmd response: success
19,327,032 UART:
19,327,436 UART: Running Caliptra FMC ...
19,328,643 UART:
19,328,816 UART: [state] CFI Enabled
19,336,670 UART: [fht] FMC Alias Private Key: 7
21,103,053 UART: [art] Extend RT PCRs Done
21,104,296 UART: [art] Lock RT PCRs Done
21,106,229 UART: [art] Populate DV Done
21,111,597 UART: [fht] FMC Alias Private Key: 7
21,113,269 UART: [art] Derive CDI
21,114,016 UART: [art] Store in slot 0x4
21,156,941 UART: [art] Derive Key Pair
21,157,948 UART: [art] Store priv key in slot 0x5
23,584,299 UART: [art] Derive Key Pair - Done
23,597,138 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,303,881 UART: [art] Erasing AUTHORITY.KEYID = 7
25,305,397 UART: [art] PUB.X = 880772906E2C99037B369C8EE456B141218CE1CE947C5BB03CCC71911BC9355219B8934A7235DEA7776912CA6326A5CB
25,312,640 UART: [art] PUB.Y = E70164A757D67B2407D3DDB4C5E3BDC776E1871167CF966CD8F41FF873DCD5E7867C5243F548B90FF28671B035ED19EB
25,319,907 UART: [art] SIG.R = E696E95387E5363A9D3E298476510C7DF69706EB0526C01E7D6B53745589FCC1707C622E7E2C9B56F110ECA3FF9B227A
25,327,287 UART: [art] SIG.S = FD3C2AF45030251A9FE9A286164A143FC7885B561B6A3A0D5DBCEE13A42EF04C26AD0F0FF0CC6135B54F793C12A6FE09
26,305,797 UART: Caliptra RT
26,306,497 UART: [state] CFI Enabled
26,439,007 UART: [rt] RT listening for mailbox commands...
26,440,860 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,470,599 UART: [rt]cmd =0x46504c54, len=4
26,472,131 >>> mbox cmd response data (8 bytes)
26,473,518 UART: [rt] FIPS self test
26,474,467 UART: [kat] ++
26,474,925 UART: [kat] sha1
26,479,256 UART: [kat] SHA2-256
26,481,147 UART: [kat] SHA2-384
26,483,957 UART: [kat] SHA2-512-ACC
26,484,849 UART: Droping operation
26,485,705 UART: Fatal Error: 0x90050002
26,520,867 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,670,873 >>> mbox cmd response: failed
26,671,479 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,821,390 >>> mbox cmd response: failed
Initializing fuses
935 writing to cptra_bootfsm_go
16,858,908 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,165,654 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,396 UART: [state] LifecycleState = Unprovisioned
86,051 UART: [state] DebugLocked = No
86,733 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,423 UART: [kat] SHA2-256
882,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,469 UART: [kat] ++
886,621 UART: [kat] sha1
890,925 UART: [kat] SHA2-256
892,863 UART: [kat] SHA2-384
895,830 UART: [kat] SHA2-512-ACC
897,731 UART: [kat] ECC-384
903,182 UART: [kat] HMAC-384Kdf
907,552 UART: [kat] LMS
1,475,748 UART: [kat] --
1,476,487 UART: [cold-reset] ++
1,477,043 UART: [fht] Storing FHT @ 0x50003400
1,479,728 UART: [idev] ++
1,479,896 UART: [idev] CDI.KEYID = 6
1,480,256 UART: [idev] SUBJECT.KEYID = 7
1,480,680 UART: [idev] UDS.KEYID = 0
1,481,025 ready_for_fw is high
1,481,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,776 UART: [idev] Erasing UDS.KEYID = 0
1,505,378 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,018 UART: [idev] --
1,515,105 UART: [ldev] ++
1,515,273 UART: [ldev] CDI.KEYID = 6
1,515,636 UART: [ldev] SUBJECT.KEYID = 5
1,516,062 UART: [ldev] AUTHORITY.KEYID = 7
1,516,525 UART: [ldev] FE.KEYID = 1
1,521,681 UART: [ldev] Erasing FE.KEYID = 1
1,547,292 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,587 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,303 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,194 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,906 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,008 UART: [ldev] --
1,586,393 UART: [fwproc] Waiting for Commands...
1,587,216 UART: [fwproc] Received command 0x46574c44
1,588,007 UART: [fwproc] Received Image of size 119428 bytes
2,942,940 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,620 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,838 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,467 >>> mbox cmd response: success
3,144,513 UART: [afmc] ++
3,144,681 UART: [afmc] CDI.KEYID = 6
3,145,043 UART: [afmc] SUBJECT.KEYID = 7
3,145,468 UART: [afmc] AUTHORITY.KEYID = 5
3,180,401 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,957 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,737 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,446 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,329 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,012 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,790 UART: [afmc] --
3,223,890 UART: [cold-reset] --
3,224,802 UART: [state] Locking Datavault
3,226,177 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,781 UART: [state] Locking ICCM
3,227,253 UART: [exit] Launching FMC @ 0x40000130
3,232,583 UART:
3,232,599 UART: Running Caliptra FMC ...
3,233,007 UART:
3,233,061 UART: [state] CFI Enabled
3,243,573 UART: [fht] FMC Alias Private Key: 7
3,362,485 UART: [art] Extend RT PCRs Done
3,362,913 UART: [art] Lock RT PCRs Done
3,364,359 UART: [art] Populate DV Done
3,372,302 UART: [fht] FMC Alias Private Key: 7
3,373,362 UART: [art] Derive CDI
3,373,642 UART: [art] Store in slot 0x4
3,459,936 UART: [art] Derive Key Pair
3,460,296 UART: [art] Store priv key in slot 0x5
3,473,441 UART: [art] Derive Key Pair - Done
3,488,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,908 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,673 UART: [art] PUB.X = C0B63A0A743C28596BBBC90F1A46285CCF0050C3EEB43C3AD24835131EC9059C1679D69A4107F2B7C1AB308F09161846
3,511,408 UART: [art] PUB.Y = CFC38BAB307582A88ECC7F91EB7CEBB9BB70C37B4EC0914D208F0F73FE1863DC87AF7A8CAE15F1308E2408542FEF9735
3,518,372 UART: [art] SIG.R = 7CAE048AEBA726E5CE6F6AB8D7D31A5668BBA6E8958297DA0B93486C6205F1CB69089FB9F42168E371B5B088D32039A1
3,525,138 UART: [art] SIG.S = 87B857648CED546F37525A27BA8D7D4DC1C545CA6E4FBF341A8A2685FAB6D54693BCEB90474E6BA13BF0DB798D0E7EE2
3,548,381 UART: Caliptra RT
3,548,632 UART: [state] CFI Enabled
3,669,690 UART: [rt] RT listening for mailbox commands...
3,670,353 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,102 UART: [rt]cmd =0x46504c54, len=4
3,701,128 >>> mbox cmd response data (8 bytes)
3,701,471 UART: [rt] FIPS self test
3,701,799 UART: [kat] ++
3,701,951 UART: [kat] sha1
3,706,297 UART: [kat] SHA2-256
3,708,319 UART: [kat] SHA2-384
3,711,170 UART: [kat] SHA2-512-ACC
3,711,575 UART: Droping operation
3,711,982 UART: Fatal Error: 0x90050002
3,713,521 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,526 >>> mbox cmd response: failed
3,713,526 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,531 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,814 UART: [state] LifecycleState = Unprovisioned
85,469 UART: [state] DebugLocked = No
86,171 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,677 UART: [kat] SHA2-256
881,608 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,723 UART: [kat] ++
885,875 UART: [kat] sha1
890,031 UART: [kat] SHA2-256
891,969 UART: [kat] SHA2-384
894,638 UART: [kat] SHA2-512-ACC
896,539 UART: [kat] ECC-384
902,284 UART: [kat] HMAC-384Kdf
907,118 UART: [kat] LMS
1,475,314 UART: [kat] --
1,476,393 UART: [cold-reset] ++
1,476,777 UART: [fht] Storing FHT @ 0x50003400
1,479,650 UART: [idev] ++
1,479,818 UART: [idev] CDI.KEYID = 6
1,480,178 UART: [idev] SUBJECT.KEYID = 7
1,480,602 UART: [idev] UDS.KEYID = 0
1,480,947 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,284 UART: [idev] Erasing UDS.KEYID = 0
1,504,420 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,960 UART: [idev] --
1,513,863 UART: [ldev] ++
1,514,031 UART: [ldev] CDI.KEYID = 6
1,514,394 UART: [ldev] SUBJECT.KEYID = 5
1,514,820 UART: [ldev] AUTHORITY.KEYID = 7
1,515,283 UART: [ldev] FE.KEYID = 1
1,520,545 UART: [ldev] Erasing FE.KEYID = 1
1,545,652 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,564,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,800 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,512 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,592 UART: [ldev] --
1,585,069 UART: [fwproc] Waiting for Commands...
1,585,724 UART: [fwproc] Received command 0x46574c44
1,586,515 UART: [fwproc] Received Image of size 119428 bytes
2,941,174 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,246 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,464 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,013 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,967 ready_for_fw is high
1,362,967 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,132 >>> mbox cmd response: success
3,055,239 UART:
3,055,255 UART: Running Caliptra FMC ...
3,055,663 UART:
3,055,717 UART: [state] CFI Enabled
3,065,983 UART: [fht] FMC Alias Private Key: 7
3,184,793 UART: [art] Extend RT PCRs Done
3,185,221 UART: [art] Lock RT PCRs Done
3,186,705 UART: [art] Populate DV Done
3,194,942 UART: [fht] FMC Alias Private Key: 7
3,195,904 UART: [art] Derive CDI
3,196,184 UART: [art] Store in slot 0x4
3,281,694 UART: [art] Derive Key Pair
3,282,054 UART: [art] Store priv key in slot 0x5
3,295,137 UART: [art] Derive Key Pair - Done
3,309,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,221 UART: [art] PUB.X = 7F59302746FB1D82A221FF4AC66E245B3DFC16D0F118FE6B82E9E582922EBB8B36AA4EAE0FAF893F2CF22BB99F2433DF
3,333,008 UART: [art] PUB.Y = F9643B2312F337F65DEEEEFE78433AD4186D3636E82846D4828F9B77B4EF438041036EEC053932006E7075A156A91A5B
3,339,926 UART: [art] SIG.R = 3BEAA614959AA65E04E8ED55520655AF134D0A20E32F6B435549E5C14D46D938995034F298E8B09308DF7D13F40B0823
3,346,674 UART: [art] SIG.S = A2D07F9463FC7990C59D90F981BAEEC9634D277757CF86241CF3F0A4B621ACBC883AA340A5F03EE71646C46F1862FFB9
3,370,536 UART: Caliptra RT
3,370,787 UART: [state] CFI Enabled
3,491,729 UART: [rt] RT listening for mailbox commands...
3,492,392 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,073 UART: [rt]cmd =0x46504c54, len=4
3,523,137 >>> mbox cmd response data (8 bytes)
3,523,410 UART: [rt] FIPS self test
3,523,738 UART: [kat] ++
3,523,890 UART: [kat] sha1
3,528,176 UART: [kat] SHA2-256
3,530,198 UART: [kat] SHA2-384
3,533,125 UART: [kat] SHA2-512-ACC
3,533,530 UART: Droping operation
3,533,951 UART: Fatal Error: 0x90050002
3,535,490 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,495 >>> mbox cmd response: failed
3,535,495 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,500 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,536 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,675 UART: [state] LifecycleState = Unprovisioned
86,330 UART: [state] DebugLocked = No
87,012 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,550 UART: [kat] SHA2-256
882,481 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,596 UART: [kat] ++
886,748 UART: [kat] sha1
890,986 UART: [kat] SHA2-256
892,924 UART: [kat] SHA2-384
895,611 UART: [kat] SHA2-512-ACC
897,512 UART: [kat] ECC-384
903,365 UART: [kat] HMAC-384Kdf
908,031 UART: [kat] LMS
1,476,227 UART: [kat] --
1,477,286 UART: [cold-reset] ++
1,477,830 UART: [fht] Storing FHT @ 0x50003400
1,480,443 UART: [idev] ++
1,480,611 UART: [idev] CDI.KEYID = 6
1,480,971 UART: [idev] SUBJECT.KEYID = 7
1,481,395 UART: [idev] UDS.KEYID = 0
1,481,740 ready_for_fw is high
1,481,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,343 UART: [idev] Erasing UDS.KEYID = 0
1,506,561 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,193 UART: [idev] --
1,516,284 UART: [ldev] ++
1,516,452 UART: [ldev] CDI.KEYID = 6
1,516,815 UART: [ldev] SUBJECT.KEYID = 5
1,517,241 UART: [ldev] AUTHORITY.KEYID = 7
1,517,704 UART: [ldev] FE.KEYID = 1
1,523,358 UART: [ldev] Erasing FE.KEYID = 1
1,548,517 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,980 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,871 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,583 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,487 UART: [ldev] --
1,587,776 UART: [fwproc] Waiting for Commands...
1,588,485 UART: [fwproc] Received command 0x46574c44
1,589,276 UART: [fwproc] Received Image of size 119428 bytes
2,944,462 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,644 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,862 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,531 >>> mbox cmd response: success
3,145,621 UART: [afmc] ++
3,145,789 UART: [afmc] CDI.KEYID = 6
3,146,151 UART: [afmc] SUBJECT.KEYID = 7
3,146,576 UART: [afmc] AUTHORITY.KEYID = 5
3,181,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,772 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,655 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,338 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,104 UART: [afmc] --
3,225,000 UART: [cold-reset] --
3,225,854 UART: [state] Locking Datavault
3,226,907 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,511 UART: [state] Locking ICCM
3,228,109 UART: [exit] Launching FMC @ 0x40000130
3,233,439 UART:
3,233,455 UART: Running Caliptra FMC ...
3,233,863 UART:
3,234,006 UART: [state] CFI Enabled
3,244,532 UART: [fht] FMC Alias Private Key: 7
3,363,994 UART: [art] Extend RT PCRs Done
3,364,422 UART: [art] Lock RT PCRs Done
3,365,802 UART: [art] Populate DV Done
3,374,229 UART: [fht] FMC Alias Private Key: 7
3,375,255 UART: [art] Derive CDI
3,375,535 UART: [art] Store in slot 0x4
3,461,021 UART: [art] Derive Key Pair
3,461,381 UART: [art] Store priv key in slot 0x5
3,474,422 UART: [art] Derive Key Pair - Done
3,489,018 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,227 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,992 UART: [art] PUB.X = DAF37C8E16C3C3D789C34E46B80396A943007EB52DDB5E72A6AE21EA514D7DF3A535086444E26991C7554C24672B68F5
3,511,736 UART: [art] PUB.Y = 7EAB749B35B3CDA66B681E97CFA909D4B86DA100CD072CA437EFEB70FD6B7B0A9494A47685A6D115C37037A271289FCC
3,518,669 UART: [art] SIG.R = B16A16C2F9CAB5B32F610C99946264203362DE515AA3F70E91995A383D02E2E35F841DA1BDD31B6A1C026C34AAF6E34A
3,525,435 UART: [art] SIG.S = 2F13524920B12FFB765C43DCBB9AD782232C05E08D49B010D72F115246FC27DE2633516942FFAC3C2481B2F5282CF77A
3,549,272 UART: Caliptra RT
3,549,615 UART: [state] CFI Enabled
3,669,873 UART: [rt] RT listening for mailbox commands...
3,670,536 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,405 UART: [rt]cmd =0x46504c54, len=4
3,701,555 >>> mbox cmd response data (8 bytes)
3,701,720 UART: [rt] FIPS self test
3,702,048 UART: [kat] ++
3,702,200 UART: [kat] sha1
3,706,532 UART: [kat] SHA2-256
3,708,554 UART: [kat] SHA2-384
3,711,403 UART: [kat] SHA2-512-ACC
3,711,808 UART: Droping operation
3,712,443 UART: Fatal Error: 0x90050002
3,713,982 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,987 >>> mbox cmd response: failed
3,713,987 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,992 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,153 UART: [state] LifecycleState = Unprovisioned
85,808 UART: [state] DebugLocked = No
86,512 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,056 UART: [kat] SHA2-256
881,987 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,102 UART: [kat] ++
886,254 UART: [kat] sha1
890,394 UART: [kat] SHA2-256
892,332 UART: [kat] SHA2-384
894,997 UART: [kat] SHA2-512-ACC
896,898 UART: [kat] ECC-384
902,445 UART: [kat] HMAC-384Kdf
907,137 UART: [kat] LMS
1,475,333 UART: [kat] --
1,476,392 UART: [cold-reset] ++
1,476,910 UART: [fht] Storing FHT @ 0x50003400
1,479,543 UART: [idev] ++
1,479,711 UART: [idev] CDI.KEYID = 6
1,480,071 UART: [idev] SUBJECT.KEYID = 7
1,480,495 UART: [idev] UDS.KEYID = 0
1,480,840 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,507 UART: [idev] Erasing UDS.KEYID = 0
1,505,069 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,771 UART: [idev] --
1,514,590 UART: [ldev] ++
1,514,758 UART: [ldev] CDI.KEYID = 6
1,515,121 UART: [ldev] SUBJECT.KEYID = 5
1,515,547 UART: [ldev] AUTHORITY.KEYID = 7
1,516,010 UART: [ldev] FE.KEYID = 1
1,521,448 UART: [ldev] Erasing FE.KEYID = 1
1,547,209 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,370 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,261 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,973 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,055 UART: [ldev] --
1,586,320 UART: [fwproc] Waiting for Commands...
1,587,145 UART: [fwproc] Received command 0x46574c44
1,587,936 UART: [fwproc] Received Image of size 119428 bytes
2,943,226 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,882 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,100 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,855 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,490 ready_for_fw is high
1,362,490 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,053 >>> mbox cmd response: success
3,055,418 UART:
3,055,434 UART: Running Caliptra FMC ...
3,055,842 UART:
3,055,985 UART: [state] CFI Enabled
3,066,451 UART: [fht] FMC Alias Private Key: 7
3,185,251 UART: [art] Extend RT PCRs Done
3,185,679 UART: [art] Lock RT PCRs Done
3,187,085 UART: [art] Populate DV Done
3,195,408 UART: [fht] FMC Alias Private Key: 7
3,196,362 UART: [art] Derive CDI
3,196,642 UART: [art] Store in slot 0x4
3,282,816 UART: [art] Derive Key Pair
3,283,176 UART: [art] Store priv key in slot 0x5
3,296,795 UART: [art] Derive Key Pair - Done
3,311,224 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,953 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,718 UART: [art] PUB.X = F0D8DEE2EDE31F0DA7C3983083FBD3D276F85B28CD45D1F3B700CB658B7B9C849F321D23EA614F58A1BF5973FF72F56F
3,334,481 UART: [art] PUB.Y = 32260BE82D445E33C78BBEF993D75BB1222E5FBD2DC5B0D5B43A342D92F3D7BB7E9E75662F6C4A0E6A5DB0BD8380DB92
3,341,443 UART: [art] SIG.R = 25A9307D28EAD1C5136F9F32046CEEE7A9D2D40CDB9AC906E7B28989CB4E603E06615B63678EA84D945182441C24226B
3,348,203 UART: [art] SIG.S = D02514B6405344CB401722C2B243AB9B7039D331FF7EA4F215122199D08D9BE04C6279F5013748F145380D7F19CBD527
3,372,035 UART: Caliptra RT
3,372,378 UART: [state] CFI Enabled
3,492,828 UART: [rt] RT listening for mailbox commands...
3,493,491 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,200 UART: [rt]cmd =0x46504c54, len=4
3,524,450 >>> mbox cmd response data (8 bytes)
3,524,791 UART: [rt] FIPS self test
3,525,119 UART: [kat] ++
3,525,271 UART: [kat] sha1
3,529,407 UART: [kat] SHA2-256
3,531,429 UART: [kat] SHA2-384
3,534,128 UART: [kat] SHA2-512-ACC
3,534,533 UART: Droping operation
3,535,144 UART: Fatal Error: 0x90050002
3,536,683 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,688 >>> mbox cmd response: failed
3,536,688 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,693 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,406 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,813 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,494 UART: [state] LifecycleState = Unprovisioned
86,149 UART: [state] DebugLocked = No
86,817 UART: [state] WD Timer not started. Device not locked for debugging
88,018 UART: [kat] SHA2-256
891,568 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,672 UART: [kat] ++
895,824 UART: [kat] sha1
899,922 UART: [kat] SHA2-256
901,862 UART: [kat] SHA2-384
904,727 UART: [kat] SHA2-512-ACC
906,628 UART: [kat] ECC-384
916,351 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,304 UART: [cold-reset] ++
1,170,854 UART: [fht] FHT @ 0x50003400
1,173,574 UART: [idev] ++
1,173,742 UART: [idev] CDI.KEYID = 6
1,174,103 UART: [idev] SUBJECT.KEYID = 7
1,174,528 UART: [idev] UDS.KEYID = 0
1,174,874 ready_for_fw is high
1,174,874 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,533 UART: [idev] Erasing UDS.KEYID = 0
1,199,335 UART: [idev] Sha1 KeyId Algorithm
1,208,203 UART: [idev] --
1,209,090 UART: [ldev] ++
1,209,258 UART: [ldev] CDI.KEYID = 6
1,209,622 UART: [ldev] SUBJECT.KEYID = 5
1,210,049 UART: [ldev] AUTHORITY.KEYID = 7
1,210,512 UART: [ldev] FE.KEYID = 1
1,215,688 UART: [ldev] Erasing FE.KEYID = 1
1,241,947 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,267 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,983 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,872 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,584 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,554 UART: [ldev] --
1,280,805 UART: [fwproc] Wait for Commands...
1,281,456 UART: [fwproc] Recv command 0x46574c44
1,282,189 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,942 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,323 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,498 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,033 >>> mbox cmd response: success
2,837,249 UART: [afmc] ++
2,837,417 UART: [afmc] CDI.KEYID = 6
2,837,780 UART: [afmc] SUBJECT.KEYID = 7
2,838,206 UART: [afmc] AUTHORITY.KEYID = 5
2,874,127 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,914 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,663 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,373 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,254 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,955 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,782 UART: [afmc] --
2,917,803 UART: [cold-reset] --
2,918,719 UART: [state] Locking Datavault
2,919,824 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,428 UART: [state] Locking ICCM
2,920,888 UART: [exit] Launching FMC @ 0x40000130
2,926,218 UART:
2,926,234 UART: Running Caliptra FMC ...
2,926,642 UART:
2,926,696 UART: [state] CFI Enabled
2,936,846 UART: [fht] FMC Alias Private Key: 7
3,055,786 UART: [art] Extend RT PCRs Done
3,056,214 UART: [art] Lock RT PCRs Done
3,058,196 UART: [art] Populate DV Done
3,066,261 UART: [fht] FMC Alias Private Key: 7
3,067,433 UART: [art] Derive CDI
3,067,713 UART: [art] Store in slot 0x4
3,153,404 UART: [art] Derive Key Pair
3,153,764 UART: [art] Store priv key in slot 0x5
3,166,330 UART: [art] Derive Key Pair - Done
3,181,185 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,196,934 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,699 UART: [art] PUB.X = 5481196AAC1046603E9F7D3B6C38D9B2B175607F39EFD9BD76E866360F67872647E3F963B220105851D3C4788A8E18E2
3,204,458 UART: [art] PUB.Y = 27C2412F7D9A0C2F48C1D7A107CE3DCB6F70FE7F039E901A1B8CDDFD94A4D9CED69E06851B89604D9C126A4705A8A76B
3,211,409 UART: [art] SIG.R = 8C5DDA3E0862C4948A74F2DE030BCFA9EFE3A2A4E8A2C60AB905A51982599EB5E8E84BC9B5443712DB3439D915BFC289
3,218,178 UART: [art] SIG.S = E0D1E98817AE037E87AB5E87E1C57473C81F39E2CF4F35222721DB7F9D16931755BF6895D60E8AFB471CB42B76825651
3,242,012 UART: Caliptra RT
3,242,263 UART: [state] CFI Enabled
3,362,359 UART: [rt] RT listening for mailbox commands...
3,363,022 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,039 UART: [rt]cmd =0x46504c54, len=4
3,394,351 >>> mbox cmd response data (8 bytes)
3,394,524 UART: [rt] FIPS self test
3,394,852 UART: [kat] ++
3,395,004 UART: [kat] sha1
3,399,152 UART: [kat] SHA2-256
3,401,174 UART: [kat] SHA2-384
3,404,057 UART: [kat] SHA2-512-ACC
3,404,462 UART: Droping operation
3,405,021 UART: Fatal Error: 0x90050002
3,406,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,565 >>> mbox cmd response: failed
3,406,565 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,570 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,970 UART: [state] LifecycleState = Unprovisioned
85,625 UART: [state] DebugLocked = No
86,159 UART: [state] WD Timer not started. Device not locked for debugging
87,502 UART: [kat] SHA2-256
891,052 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,156 UART: [kat] ++
895,308 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,335 UART: [kat] SHA2-512-ACC
906,236 UART: [kat] ECC-384
915,769 UART: [kat] HMAC-384Kdf
920,439 UART: [kat] LMS
1,168,751 UART: [kat] --
1,169,536 UART: [cold-reset] ++
1,170,086 UART: [fht] FHT @ 0x50003400
1,172,702 UART: [idev] ++
1,172,870 UART: [idev] CDI.KEYID = 6
1,173,231 UART: [idev] SUBJECT.KEYID = 7
1,173,656 UART: [idev] UDS.KEYID = 0
1,174,002 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,267 UART: [idev] Erasing UDS.KEYID = 0
1,198,403 UART: [idev] Sha1 KeyId Algorithm
1,207,253 UART: [idev] --
1,208,500 UART: [ldev] ++
1,208,668 UART: [ldev] CDI.KEYID = 6
1,209,032 UART: [ldev] SUBJECT.KEYID = 5
1,209,459 UART: [ldev] AUTHORITY.KEYID = 7
1,209,922 UART: [ldev] FE.KEYID = 1
1,215,310 UART: [ldev] Erasing FE.KEYID = 1
1,241,273 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,155 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,871 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,760 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,472 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,504 UART: [ldev] --
1,280,933 UART: [fwproc] Wait for Commands...
1,281,658 UART: [fwproc] Recv command 0x46574c44
1,282,391 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,320 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,063 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,238 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,841 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,112 ready_for_fw is high
1,059,112 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,090 >>> mbox cmd response: success
2,753,217 UART:
2,753,233 UART: Running Caliptra FMC ...
2,753,641 UART:
2,753,695 UART: [state] CFI Enabled
2,763,817 UART: [fht] FMC Alias Private Key: 7
2,883,065 UART: [art] Extend RT PCRs Done
2,883,493 UART: [art] Lock RT PCRs Done
2,884,805 UART: [art] Populate DV Done
2,893,148 UART: [fht] FMC Alias Private Key: 7
2,894,082 UART: [art] Derive CDI
2,894,362 UART: [art] Store in slot 0x4
2,980,453 UART: [art] Derive Key Pair
2,980,813 UART: [art] Store priv key in slot 0x5
2,994,307 UART: [art] Derive Key Pair - Done
3,008,761 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,212 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,977 UART: [art] PUB.X = DA4CAB31B7E5B10127ACA022B73E33803FFC0F8E743EB3221F363F8C0A987E6EFA8C91EC5166F98542065AB3AA6120C2
3,031,747 UART: [art] PUB.Y = 82D538A879008E50B3DD933105643B6273078D8B425D48ACCA9E257486F03E74375EBC304B22FC7A1549A3BF20B5281D
3,038,665 UART: [art] SIG.R = 8D990466AAA2F29AB6154FEA6D635BB119880A378C3ED80AD121DA3DFD88B03802C7EB7DC2168D4FB5E5E31EA06D8AF1
3,045,441 UART: [art] SIG.S = 7CD92B2BA15F3C3AC3996904FD013D96A090C2DDCC7BA98844A9D5E9BCFF91267F28F762C288BCC4467D741765ED63AF
3,069,531 UART: Caliptra RT
3,069,782 UART: [state] CFI Enabled
3,188,663 UART: [rt] RT listening for mailbox commands...
3,189,326 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,237 UART: [rt]cmd =0x46504c54, len=4
3,220,341 >>> mbox cmd response data (8 bytes)
3,220,666 UART: [rt] FIPS self test
3,220,994 UART: [kat] ++
3,221,146 UART: [kat] sha1
3,225,352 UART: [kat] SHA2-256
3,227,374 UART: [kat] SHA2-384
3,230,343 UART: [kat] SHA2-512-ACC
3,230,748 UART: Droping operation
3,231,375 UART: Fatal Error: 0x90050002
3,232,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,919 >>> mbox cmd response: failed
3,232,919 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,924 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,416 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,116 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,503 UART: [state] LifecycleState = Unprovisioned
86,158 UART: [state] DebugLocked = No
86,750 UART: [state] WD Timer not started. Device not locked for debugging
87,931 UART: [kat] SHA2-256
891,481 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,585 UART: [kat] ++
895,737 UART: [kat] sha1
900,007 UART: [kat] SHA2-256
901,947 UART: [kat] SHA2-384
904,876 UART: [kat] SHA2-512-ACC
906,777 UART: [kat] ECC-384
916,586 UART: [kat] HMAC-384Kdf
921,086 UART: [kat] LMS
1,169,398 UART: [kat] --
1,170,207 UART: [cold-reset] ++
1,170,551 UART: [fht] FHT @ 0x50003400
1,173,157 UART: [idev] ++
1,173,325 UART: [idev] CDI.KEYID = 6
1,173,686 UART: [idev] SUBJECT.KEYID = 7
1,174,111 UART: [idev] UDS.KEYID = 0
1,174,457 ready_for_fw is high
1,174,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,090 UART: [idev] Erasing UDS.KEYID = 0
1,198,738 UART: [idev] Sha1 KeyId Algorithm
1,207,620 UART: [idev] --
1,208,649 UART: [ldev] ++
1,208,817 UART: [ldev] CDI.KEYID = 6
1,209,181 UART: [ldev] SUBJECT.KEYID = 5
1,209,608 UART: [ldev] AUTHORITY.KEYID = 7
1,210,071 UART: [ldev] FE.KEYID = 1
1,215,187 UART: [ldev] Erasing FE.KEYID = 1
1,241,740 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,212 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,928 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,817 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,425 UART: [ldev] --
1,280,714 UART: [fwproc] Wait for Commands...
1,281,481 UART: [fwproc] Recv command 0x46574c44
1,282,214 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,213 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,624 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,799 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,308 >>> mbox cmd response: success
2,837,330 UART: [afmc] ++
2,837,498 UART: [afmc] CDI.KEYID = 6
2,837,861 UART: [afmc] SUBJECT.KEYID = 7
2,838,287 UART: [afmc] AUTHORITY.KEYID = 5
2,874,290 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,771 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,520 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,230 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,111 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,812 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,565 UART: [afmc] --
2,917,506 UART: [cold-reset] --
2,918,490 UART: [state] Locking Datavault
2,919,785 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,389 UART: [state] Locking ICCM
2,920,895 UART: [exit] Launching FMC @ 0x40000130
2,926,225 UART:
2,926,241 UART: Running Caliptra FMC ...
2,926,649 UART:
2,926,792 UART: [state] CFI Enabled
2,937,580 UART: [fht] FMC Alias Private Key: 7
3,056,494 UART: [art] Extend RT PCRs Done
3,056,922 UART: [art] Lock RT PCRs Done
3,058,504 UART: [art] Populate DV Done
3,066,735 UART: [fht] FMC Alias Private Key: 7
3,067,825 UART: [art] Derive CDI
3,068,105 UART: [art] Store in slot 0x4
3,153,424 UART: [art] Derive Key Pair
3,153,784 UART: [art] Store priv key in slot 0x5
3,167,634 UART: [art] Derive Key Pair - Done
3,182,706 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,983 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,748 UART: [art] PUB.X = 67F5C9ED321B6B30C33FF182037B1A58336B9AB6861C58D270A68E171D76BAEA7FA06EF8657E13817773659B5370556D
3,205,513 UART: [art] PUB.Y = B00BA493ACADA0F1F212C93ED47259839047C19131BC190BA88C282DF6CC260A98AEF439FE84B548EBAA6CC44CCE82E6
3,212,472 UART: [art] SIG.R = 798CD603499560B6464C99BF899E9FC8AB19F71295CC56E92147D103B7B002CA792D9F425B3B8919BF591A93BA2AE639
3,219,233 UART: [art] SIG.S = 0496697F6C4470BA851866A127BE2EC4DA0B1DAD31B0B276A2CE48D609CDAD829FF52A67473139C14E1399F277B7B7A6
3,243,508 UART: Caliptra RT
3,243,851 UART: [state] CFI Enabled
3,364,217 UART: [rt] RT listening for mailbox commands...
3,364,880 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,699 UART: [rt]cmd =0x46504c54, len=4
3,395,703 >>> mbox cmd response data (8 bytes)
3,395,914 UART: [rt] FIPS self test
3,396,242 UART: [kat] ++
3,396,394 UART: [kat] sha1
3,400,858 UART: [kat] SHA2-256
3,402,880 UART: [kat] SHA2-384
3,405,813 UART: [kat] SHA2-512-ACC
3,406,218 UART: Droping operation
3,406,803 UART: Fatal Error: 0x90050002
3,408,342 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,347 >>> mbox cmd response: failed
3,408,347 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,352 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,755 UART: [state] LifecycleState = Unprovisioned
86,410 UART: [state] DebugLocked = No
87,102 UART: [state] WD Timer not started. Device not locked for debugging
88,335 UART: [kat] SHA2-256
891,885 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,989 UART: [kat] ++
896,141 UART: [kat] sha1
900,397 UART: [kat] SHA2-256
902,337 UART: [kat] SHA2-384
904,948 UART: [kat] SHA2-512-ACC
906,849 UART: [kat] ECC-384
916,688 UART: [kat] HMAC-384Kdf
921,440 UART: [kat] LMS
1,169,752 UART: [kat] --
1,170,501 UART: [cold-reset] ++
1,170,881 UART: [fht] FHT @ 0x50003400
1,173,441 UART: [idev] ++
1,173,609 UART: [idev] CDI.KEYID = 6
1,173,970 UART: [idev] SUBJECT.KEYID = 7
1,174,395 UART: [idev] UDS.KEYID = 0
1,174,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,632 UART: [idev] Erasing UDS.KEYID = 0
1,199,838 UART: [idev] Sha1 KeyId Algorithm
1,208,642 UART: [idev] --
1,209,667 UART: [ldev] ++
1,209,835 UART: [ldev] CDI.KEYID = 6
1,210,199 UART: [ldev] SUBJECT.KEYID = 5
1,210,626 UART: [ldev] AUTHORITY.KEYID = 7
1,211,089 UART: [ldev] FE.KEYID = 1
1,216,253 UART: [ldev] Erasing FE.KEYID = 1
1,242,752 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,174 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,890 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,779 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,491 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,629 UART: [ldev] --
1,281,866 UART: [fwproc] Wait for Commands...
1,282,573 UART: [fwproc] Recv command 0x46574c44
1,283,306 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,177 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,172 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,347 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,832 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,921 ready_for_fw is high
1,059,921 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,295 >>> mbox cmd response: success
2,751,278 UART:
2,751,294 UART: Running Caliptra FMC ...
2,751,702 UART:
2,751,845 UART: [state] CFI Enabled
2,762,439 UART: [fht] FMC Alias Private Key: 7
2,881,169 UART: [art] Extend RT PCRs Done
2,881,597 UART: [art] Lock RT PCRs Done
2,883,253 UART: [art] Populate DV Done
2,891,448 UART: [fht] FMC Alias Private Key: 7
2,892,406 UART: [art] Derive CDI
2,892,686 UART: [art] Store in slot 0x4
2,978,701 UART: [art] Derive Key Pair
2,979,061 UART: [art] Store priv key in slot 0x5
2,992,001 UART: [art] Derive Key Pair - Done
3,006,629 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,022,823 UART: [art] PUB.X = 1FAAE720578105C389C590F97891DAAA86FDBFB0C0B417F7080110BEAF9938CB35C8C71137BE5D727BF2921A53D2F1CA
3,029,596 UART: [art] PUB.Y = 90D1BB6C1A75E61390FA46D59B27C6354FBD9B3DF438BD86F0E3E282CB1E39BAA231A3E8A2E20B1478EEF4A236BAF09F
3,036,563 UART: [art] SIG.R = 532998B34DAA0071C80794823370D8B358E9B885EF73137AD374142AA6280526F97140AC442CB0CD97CF7B29C9EAC963
3,043,301 UART: [art] SIG.S = A7EDFBA07A3572AC0DDC350FF6F52FAAAB8B93D89BABBB2D4DD2EAA590C3184B818D4AD8505F55B16B829897F170AFAC
3,066,963 UART: Caliptra RT
3,067,306 UART: [state] CFI Enabled
3,187,629 UART: [rt] RT listening for mailbox commands...
3,188,292 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,131 UART: [rt]cmd =0x46504c54, len=4
3,219,195 >>> mbox cmd response data (8 bytes)
3,219,464 UART: [rt] FIPS self test
3,219,792 UART: [kat] ++
3,219,944 UART: [kat] sha1
3,224,080 UART: [kat] SHA2-256
3,226,102 UART: [kat] SHA2-384
3,228,969 UART: [kat] SHA2-512-ACC
3,229,374 UART: Droping operation
3,229,999 UART: Fatal Error: 0x90050002
3,231,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,543 >>> mbox cmd response: failed
3,231,543 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,548 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,485 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,993 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,650 UART: [state] LifecycleState = Unprovisioned
85,305 UART: [state] DebugLocked = No
85,813 UART: [state] WD Timer not started. Device not locked for debugging
87,156 UART: [kat] SHA2-256
892,806 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,931 UART: [kat] ++
897,083 UART: [kat] sha1
901,311 UART: [kat] SHA2-256
903,251 UART: [kat] SHA2-384
905,966 UART: [kat] SHA2-512-ACC
907,867 UART: [kat] ECC-384
917,270 UART: [kat] HMAC-384Kdf
921,920 UART: [kat] LMS
1,170,248 UART: [kat] --
1,170,923 UART: [cold-reset] ++
1,171,343 UART: [fht] FHT @ 0x50003400
1,173,958 UART: [idev] ++
1,174,126 UART: [idev] CDI.KEYID = 6
1,174,486 UART: [idev] SUBJECT.KEYID = 7
1,174,910 UART: [idev] UDS.KEYID = 0
1,175,255 ready_for_fw is high
1,175,255 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,108 UART: [idev] Erasing UDS.KEYID = 0
1,200,341 UART: [idev] Sha1 KeyId Algorithm
1,208,827 UART: [idev] --
1,209,759 UART: [ldev] ++
1,209,927 UART: [ldev] CDI.KEYID = 6
1,210,290 UART: [ldev] SUBJECT.KEYID = 5
1,210,716 UART: [ldev] AUTHORITY.KEYID = 7
1,211,179 UART: [ldev] FE.KEYID = 1
1,216,381 UART: [ldev] Erasing FE.KEYID = 1
1,242,780 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,513 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,229 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,120 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,832 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,031 UART: [ldev] --
1,282,376 UART: [fwproc] Wait for Commands...
1,283,038 UART: [fwproc] Recv command 0x46574c44
1,283,766 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,157 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,850 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,020 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,647 >>> mbox cmd response: success
2,839,659 UART: [afmc] ++
2,839,827 UART: [afmc] CDI.KEYID = 6
2,840,189 UART: [afmc] SUBJECT.KEYID = 7
2,840,614 UART: [afmc] AUTHORITY.KEYID = 5
2,876,203 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,678 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,426 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,135 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,018 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,719 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,547 UART: [afmc] --
2,919,485 UART: [cold-reset] --
2,920,069 UART: [state] Locking Datavault
2,921,290 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,894 UART: [state] Locking ICCM
2,922,368 UART: [exit] Launching FMC @ 0x40000130
2,927,698 UART:
2,927,714 UART: Running Caliptra FMC ...
2,928,122 UART:
2,928,176 UART: [state] CFI Enabled
2,938,116 UART: [fht] FMC Alias Private Key: 7
3,056,994 UART: [art] Extend RT PCRs Done
3,057,422 UART: [art] Lock RT PCRs Done
3,058,910 UART: [art] Populate DV Done
3,067,139 UART: [fht] FMC Alias Private Key: 7
3,068,135 UART: [art] Derive CDI
3,068,415 UART: [art] Store in slot 0x4
3,154,248 UART: [art] Derive Key Pair
3,154,608 UART: [art] Store priv key in slot 0x5
3,167,368 UART: [art] Derive Key Pair - Done
3,181,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,179 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,944 UART: [art] PUB.X = 24B2871FA8C055A6356137913A68D5CEB07819EC4B84ED3FBD7CE3EFE8021E08038F91862922D0A5D44E2B1D010DE395
3,204,703 UART: [art] PUB.Y = 30167C56BCBB8FBA9C0C7BBAED9F64147E8C9F6A5F8EB993FFBED706C3DBA70C21F809BC40D8ED4123AE3D7107BD4962
3,211,664 UART: [art] SIG.R = 1DD05ADB8942C44E1B065E9C109FADD97372DA7BCBB463EFBBF1B65B0C74D8C60D9C4D2611778FD6F7852CF570654BAC
3,218,445 UART: [art] SIG.S = BC37B2BE6C4CF5097092A0AE6D782B3CC3B3746E9805F36D0DAE557A8613230B1DEDF27E407FF867B8B592F2E43E95D6
3,242,437 UART: Caliptra RT
3,242,688 UART: [state] CFI Enabled
3,362,213 UART: [rt] RT listening for mailbox commands...
3,362,876 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,461 UART: [rt]cmd =0x46504c54, len=4
3,393,527 >>> mbox cmd response data (8 bytes)
3,393,738 UART: [rt] FIPS self test
3,394,066 UART: [kat] ++
3,394,218 UART: [kat] sha1
3,398,440 UART: [kat] SHA2-256
3,400,462 UART: [kat] SHA2-384
3,403,171 UART: [kat] SHA2-512-ACC
3,403,576 UART: Droping operation
3,404,007 UART: Fatal Error: 0x90050002
3,405,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,551 >>> mbox cmd response: failed
3,405,551 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,556 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,167 UART: [state] WD Timer not started. Device not locked for debugging
87,500 UART: [kat] SHA2-256
893,150 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,275 UART: [kat] ++
897,427 UART: [kat] sha1
901,663 UART: [kat] SHA2-256
903,603 UART: [kat] SHA2-384
906,170 UART: [kat] SHA2-512-ACC
908,071 UART: [kat] ECC-384
918,072 UART: [kat] HMAC-384Kdf
922,710 UART: [kat] LMS
1,171,038 UART: [kat] --
1,171,847 UART: [cold-reset] ++
1,172,339 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,208 UART: [idev] Erasing UDS.KEYID = 0
1,200,981 UART: [idev] Sha1 KeyId Algorithm
1,209,277 UART: [idev] --
1,210,301 UART: [ldev] ++
1,210,469 UART: [ldev] CDI.KEYID = 6
1,210,832 UART: [ldev] SUBJECT.KEYID = 5
1,211,258 UART: [ldev] AUTHORITY.KEYID = 7
1,211,721 UART: [ldev] FE.KEYID = 1
1,217,013 UART: [ldev] Erasing FE.KEYID = 1
1,243,554 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,291 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,007 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,898 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,610 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,539 UART: [ldev] --
1,282,994 UART: [fwproc] Wait for Commands...
1,283,780 UART: [fwproc] Recv command 0x46574c44
1,284,508 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,762 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,932 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,503 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,561 ready_for_fw is high
1,060,561 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,502 >>> mbox cmd response: success
2,752,585 UART:
2,752,601 UART: Running Caliptra FMC ...
2,753,009 UART:
2,753,063 UART: [state] CFI Enabled
2,763,189 UART: [fht] FMC Alias Private Key: 7
2,882,475 UART: [art] Extend RT PCRs Done
2,882,903 UART: [art] Lock RT PCRs Done
2,884,401 UART: [art] Populate DV Done
2,892,700 UART: [fht] FMC Alias Private Key: 7
2,893,684 UART: [art] Derive CDI
2,893,964 UART: [art] Store in slot 0x4
2,979,863 UART: [art] Derive Key Pair
2,980,223 UART: [art] Store priv key in slot 0x5
2,993,289 UART: [art] Derive Key Pair - Done
3,008,086 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,757 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,522 UART: [art] PUB.X = 33A61DD48CC38DA3FD02086BE911F98139BC372665170440B691F43CDF05772A8339B6E596C9C2A15053545A74EC9DBD
3,031,280 UART: [art] PUB.Y = 0CCC82E1CECBA352AEC1E6D4C8E187F126A16AFF0CACDED9DA2A3E6392E21CDBB8D354F9713EE3931271E3F2C44F8AEB
3,038,256 UART: [art] SIG.R = 7FA9F9BC02728FA20693ED5111C94F53F2FAF96E9B607029DF4222D6C4E6F31071DEABB0E0B46032D8070BAA3C683F6F
3,045,026 UART: [art] SIG.S = DFA18FF33AB422F8FCBA5D7AD25DE669B066CBC1F98D7775917FC313A18384AC4599FFB9094DE8D2B9598DC79E7E70C3
3,068,505 UART: Caliptra RT
3,068,756 UART: [state] CFI Enabled
3,187,761 UART: [rt] RT listening for mailbox commands...
3,188,424 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,327 UART: [rt]cmd =0x46504c54, len=4
3,219,433 >>> mbox cmd response data (8 bytes)
3,219,648 UART: [rt] FIPS self test
3,219,976 UART: [kat] ++
3,220,128 UART: [kat] sha1
3,224,176 UART: [kat] SHA2-256
3,226,198 UART: [kat] SHA2-384
3,229,153 UART: [kat] SHA2-512-ACC
3,229,558 UART: Droping operation
3,229,981 UART: Fatal Error: 0x90050002
3,231,520 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,525 >>> mbox cmd response: failed
3,231,525 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,530 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,833 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,576 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,449 UART: [state] LifecycleState = Unprovisioned
86,104 UART: [state] DebugLocked = No
86,616 UART: [state] WD Timer not started. Device not locked for debugging
87,829 UART: [kat] SHA2-256
893,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,604 UART: [kat] ++
897,756 UART: [kat] sha1
901,960 UART: [kat] SHA2-256
903,900 UART: [kat] SHA2-384
906,705 UART: [kat] SHA2-512-ACC
908,606 UART: [kat] ECC-384
917,933 UART: [kat] HMAC-384Kdf
922,741 UART: [kat] LMS
1,171,069 UART: [kat] --
1,172,136 UART: [cold-reset] ++
1,172,498 UART: [fht] FHT @ 0x50003400
1,175,115 UART: [idev] ++
1,175,283 UART: [idev] CDI.KEYID = 6
1,175,643 UART: [idev] SUBJECT.KEYID = 7
1,176,067 UART: [idev] UDS.KEYID = 0
1,176,412 ready_for_fw is high
1,176,412 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,927 UART: [idev] Erasing UDS.KEYID = 0
1,200,812 UART: [idev] Sha1 KeyId Algorithm
1,209,124 UART: [idev] --
1,210,208 UART: [ldev] ++
1,210,376 UART: [ldev] CDI.KEYID = 6
1,210,739 UART: [ldev] SUBJECT.KEYID = 5
1,211,165 UART: [ldev] AUTHORITY.KEYID = 7
1,211,628 UART: [ldev] FE.KEYID = 1
1,217,160 UART: [ldev] Erasing FE.KEYID = 1
1,243,371 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,732 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,448 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,051 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,164 UART: [ldev] --
1,282,551 UART: [fwproc] Wait for Commands...
1,283,317 UART: [fwproc] Recv command 0x46574c44
1,284,045 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,215 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,036 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,206 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,891 >>> mbox cmd response: success
2,838,991 UART: [afmc] ++
2,839,159 UART: [afmc] CDI.KEYID = 6
2,839,521 UART: [afmc] SUBJECT.KEYID = 7
2,839,946 UART: [afmc] AUTHORITY.KEYID = 5
2,875,569 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,286 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,034 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,743 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,626 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,327 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,277 UART: [afmc] --
2,919,409 UART: [cold-reset] --
2,920,355 UART: [state] Locking Datavault
2,921,598 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,202 UART: [state] Locking ICCM
2,922,674 UART: [exit] Launching FMC @ 0x40000130
2,928,004 UART:
2,928,020 UART: Running Caliptra FMC ...
2,928,428 UART:
2,928,571 UART: [state] CFI Enabled
2,939,259 UART: [fht] FMC Alias Private Key: 7
3,058,061 UART: [art] Extend RT PCRs Done
3,058,489 UART: [art] Lock RT PCRs Done
3,059,829 UART: [art] Populate DV Done
3,068,118 UART: [fht] FMC Alias Private Key: 7
3,069,280 UART: [art] Derive CDI
3,069,560 UART: [art] Store in slot 0x4
3,155,531 UART: [art] Derive Key Pair
3,155,891 UART: [art] Store priv key in slot 0x5
3,169,299 UART: [art] Derive Key Pair - Done
3,184,242 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,501 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,266 UART: [art] PUB.X = AFB966FF55C1C615770B9F872E80C6B238EEDDD6DDC7E85EDD6743E7CB5AF08E20C9EB1074F7D7473B325E0FFF6B76B2
3,207,052 UART: [art] PUB.Y = 7AF76E429B44F4C00DACC15F7394385481EFD415B5183B01FF8FA9134D6760AD2A5F420A74BD01C88120CA7CEB8AE89F
3,214,002 UART: [art] SIG.R = A65BD9462A20153E1FEA01BFF05861F5E1C5F5E353B6D52ACE25403D668226217CC5FBE4DBCDE8CF417F3D4EDF0D7027
3,220,784 UART: [art] SIG.S = 5E5EFCFBAD4EE5DF7763E4912B80F39FF52F88DDC533CDC0DBEA9DA56C051FA5091623EDC0C7B7E3905DE277B4CFDCDF
3,244,688 UART: Caliptra RT
3,245,031 UART: [state] CFI Enabled
3,363,776 UART: [rt] RT listening for mailbox commands...
3,364,439 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,162 UART: [rt]cmd =0x46504c54, len=4
3,395,480 >>> mbox cmd response data (8 bytes)
3,395,711 UART: [rt] FIPS self test
3,396,039 UART: [kat] ++
3,396,191 UART: [kat] sha1
3,400,479 UART: [kat] SHA2-256
3,402,501 UART: [kat] SHA2-384
3,405,222 UART: [kat] SHA2-512-ACC
3,405,627 UART: Droping operation
3,406,050 UART: Fatal Error: 0x90050002
3,407,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,594 >>> mbox cmd response: failed
3,407,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,231 UART: [state] LifecycleState = Unprovisioned
85,886 UART: [state] DebugLocked = No
86,470 UART: [state] WD Timer not started. Device not locked for debugging
87,683 UART: [kat] SHA2-256
893,333 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,458 UART: [kat] ++
897,610 UART: [kat] sha1
901,852 UART: [kat] SHA2-256
903,792 UART: [kat] SHA2-384
906,323 UART: [kat] SHA2-512-ACC
908,224 UART: [kat] ECC-384
918,157 UART: [kat] HMAC-384Kdf
922,805 UART: [kat] LMS
1,171,133 UART: [kat] --
1,172,268 UART: [cold-reset] ++
1,172,640 UART: [fht] FHT @ 0x50003400
1,175,385 UART: [idev] ++
1,175,553 UART: [idev] CDI.KEYID = 6
1,175,913 UART: [idev] SUBJECT.KEYID = 7
1,176,337 UART: [idev] UDS.KEYID = 0
1,176,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,517 UART: [idev] Erasing UDS.KEYID = 0
1,201,684 UART: [idev] Sha1 KeyId Algorithm
1,210,262 UART: [idev] --
1,211,212 UART: [ldev] ++
1,211,380 UART: [ldev] CDI.KEYID = 6
1,211,743 UART: [ldev] SUBJECT.KEYID = 5
1,212,169 UART: [ldev] AUTHORITY.KEYID = 7
1,212,632 UART: [ldev] FE.KEYID = 1
1,218,176 UART: [ldev] Erasing FE.KEYID = 1
1,244,643 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,266 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,982 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,873 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,585 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,704 UART: [ldev] --
1,284,007 UART: [fwproc] Wait for Commands...
1,284,803 UART: [fwproc] Recv command 0x46574c44
1,285,531 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,299 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,700 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,870 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,431 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.22s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,474 ready_for_fw is high
1,059,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,653 >>> mbox cmd response: success
2,751,992 UART:
2,752,008 UART: Running Caliptra FMC ...
2,752,416 UART:
2,752,559 UART: [state] CFI Enabled
2,762,849 UART: [fht] FMC Alias Private Key: 7
2,882,043 UART: [art] Extend RT PCRs Done
2,882,471 UART: [art] Lock RT PCRs Done
2,884,131 UART: [art] Populate DV Done
2,892,118 UART: [fht] FMC Alias Private Key: 7
2,893,140 UART: [art] Derive CDI
2,893,420 UART: [art] Store in slot 0x4
2,979,591 UART: [art] Derive Key Pair
2,979,951 UART: [art] Store priv key in slot 0x5
2,993,509 UART: [art] Derive Key Pair - Done
3,007,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,799 UART: [art] PUB.X = 4696530BA5AB4A19CEE33F4880E7DAADB7D7BC896F119B45D18F136CF7725B6E8EADFBF57ACEE2E5A1A2A95B51DA807D
3,030,592 UART: [art] PUB.Y = 56C6C254917E055A959142316B6A2BE95F2F8692A6B8D73A878B414BF5E175A2E61DB97169DB3FB5C26BE2343C5C2E66
3,037,541 UART: [art] SIG.R = 590DD3E9D23F64F47F5E81883342E9902A43732AE5FEDEA704A833AB8F987DA3B4FF6154A00F7C16A4EDCA29FB5863BE
3,044,316 UART: [art] SIG.S = 37F81621AFF5D9520FB278E21D28F64EA0412A10B885EC65334B1BBF6255F5A64EA24F848A6091DCA7A11F53CFB1E415
3,067,653 UART: Caliptra RT
3,067,996 UART: [state] CFI Enabled
3,188,064 UART: [rt] RT listening for mailbox commands...
3,188,727 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,242 UART: [rt]cmd =0x46504c54, len=4
3,219,296 >>> mbox cmd response data (8 bytes)
3,219,543 UART: [rt] FIPS self test
3,219,871 UART: [kat] ++
3,220,023 UART: [kat] sha1
3,224,209 UART: [kat] SHA2-256
3,226,231 UART: [kat] SHA2-384
3,229,272 UART: [kat] SHA2-512-ACC
3,229,677 UART: Droping operation
3,230,158 UART: Fatal Error: 0x90050002
3,231,697 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,702 >>> mbox cmd response: failed
3,231,702 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,707 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,460 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,031 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,009 writing to cptra_bootfsm_go
2,697,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,792 >>> mbox cmd response: failed
2,847,347 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,251 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
3,434,904 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,650 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
2,702,381 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,296 >>> mbox cmd response: failed
2,852,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,001,867 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
3,435,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,254,995 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,451 writing to cptra_bootfsm_go
3,056,522 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,298 >>> mbox cmd response: failed
3,206,864 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,574 >>> mbox cmd response: failed
Initializing fuses
987 writing to cptra_bootfsm_go
20,175,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,881,231 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,393 writing to cptra_bootfsm_go
3,049,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,199,200 >>> mbox cmd response: failed
3,199,780 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,348,482 >>> mbox cmd response: failed
Initializing fuses
970 writing to cptra_bootfsm_go
20,179,587 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,879,037 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,124 writing to cptra_bootfsm_go
2,698,221 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,848,032 >>> mbox cmd response: failed
2,848,620 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,997,536 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,430,454 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,268,011 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,999 writing to cptra_bootfsm_go
2,702,055 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,851,877 >>> mbox cmd response: failed
2,852,436 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,001,921 >>> mbox cmd response: failed
Initializing fuses
978 writing to cptra_bootfsm_go
3,433,866 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,987 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,410 writing to cptra_bootfsm_go
3,059,643 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,209,378 >>> mbox cmd response: failed
3,209,964 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,358,831 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
20,165,452 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,890,334 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
3,058,005 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,608 >>> mbox cmd response: failed
3,208,168 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,357,027 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
20,174,843 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,892,955 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,508 >>> mbox cmd response: failed
816,508 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,514 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,489 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,046 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,604 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,612 >>> mbox cmd response: failed
816,612 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,618 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,207 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,620 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,267 >>> mbox cmd response: failed
816,267 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,082,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,113 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,729 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,737 >>> mbox cmd response: failed
816,737 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,743 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,828 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,957 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,186 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,194 >>> mbox cmd response: failed
816,194 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,200 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,881 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,078 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,312 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,320 >>> mbox cmd response: failed
816,320 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,326 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,745 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,664 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,555 >>> mbox cmd response: failed
816,555 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,561 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,702 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,459 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
816,539 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,547 >>> mbox cmd response: failed
816,547 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
816,553 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,708 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,255 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,024 writing to cptra_bootfsm_go
192,289 UART:
192,664 UART: Running Caliptra ROM ...
193,864 UART:
194,024 UART: [state] CFI Enabled
267,182 UART: [state] LifecycleState = Unprovisioned
269,177 UART: [state] DebugLocked = No
271,144 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,877 UART: [kat] SHA2-256
445,583 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,111 UART: [kat] ++
456,609 UART: [kat] sha1
467,059 UART: [kat] SHA2-256
469,798 UART: [kat] SHA2-384
475,015 UART: [kat] SHA2-512-ACC
477,390 UART: [kat] ECC-384
2,766,017 UART: [kat] HMAC-384Kdf
2,777,601 UART: [kat] LMS
3,967,853 UART: [kat] --
3,971,091 UART: [cold-reset] ++
3,972,178 UART: [fht] Storing FHT @ 0x50003400
3,984,706 UART: [idev] ++
3,985,316 UART: [idev] CDI.KEYID = 6
3,986,205 UART: [idev] SUBJECT.KEYID = 7
3,987,462 UART: [idev] UDS.KEYID = 0
3,988,420 ready_for_fw is high
3,988,630 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,138,904 UART: [idev] Erasing UDS.KEYID = 0
7,324,475 UART: [idev] Using Sha1 for KeyId Algorithm
7,346,512 UART: [idev] --
7,349,894 UART: [ldev] ++
7,350,476 UART: [ldev] CDI.KEYID = 6
7,351,500 UART: [ldev] SUBJECT.KEYID = 5
7,352,677 UART: [ldev] AUTHORITY.KEYID = 7
7,353,918 UART: [ldev] FE.KEYID = 1
7,382,234 UART: [ldev] Erasing FE.KEYID = 1
10,717,623 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,434 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,059,883 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,397 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,335 UART: [ldev] --
13,097,435 UART: [fwproc] Waiting for Commands...
13,099,145 UART: [fwproc] Received command 0x46574c44
13,101,349 UART: [fwproc] Received Image of size 119428 bytes
17,216,122 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,291,666 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,364,851 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,696,948 >>> mbox cmd response: success
17,700,742 UART: [afmc] ++
17,701,341 UART: [afmc] CDI.KEYID = 6
17,702,314 UART: [afmc] SUBJECT.KEYID = 7
17,703,531 UART: [afmc] AUTHORITY.KEYID = 5
21,070,705 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,374,930 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,377,237 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,391,691 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,406,363 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,420,787 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,442,691 UART: [afmc] --
23,446,283 UART: [cold-reset] --
23,451,116 UART: [state] Locking Datavault
23,457,612 UART: [state] Locking PCR0, PCR1 and PCR31
23,459,310 UART: [state] Locking ICCM
23,460,376 UART: [exit] Launching FMC @ 0x40000130
23,468,790 UART:
23,469,031 UART: Running Caliptra FMC ...
23,470,067 UART:
23,470,219 UART: [state] CFI Enabled
23,535,066 UART: [fht] FMC Alias Private Key: 7
25,875,722 UART: [art] Extend RT PCRs Done
25,876,937 UART: [art] Lock RT PCRs Done
25,878,317 UART: [art] Populate DV Done
25,883,735 UART: [fht] FMC Alias Private Key: 7
25,885,436 UART: [art] Derive CDI
25,886,169 UART: [art] Store in slot 0x4
25,943,208 UART: [art] Derive Key Pair
25,944,248 UART: [art] Store priv key in slot 0x5
29,236,927 UART: [art] Derive Key Pair - Done
29,249,879 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,538,807 UART: [art] Erasing AUTHORITY.KEYID = 7
31,540,335 UART: [art] PUB.X = 61DE04F9C038275F0EF42501F32D10CAE815C695F88213199B3289402FD22263DF5479055CC38AEE33AAA730AA0F1D3A
31,547,560 UART: [art] PUB.Y = ABE60990911978771A65815E7ADE27B95452DBBA1415741493A2AA0CF0B79A2842E5F498141698B972751627C46595FE
31,554,785 UART: [art] SIG.R = 2FD99F5DC988FE05A1445EFCDD95630DAC36CB6E013B9FADEC575C07AF56D8DEA937DB92DE15D497FA9B76A6661F7780
31,562,210 UART: [art] SIG.S = 5F1090D0EEAD79D5FAF670195D114BF6C0C3D42F922AA73E2613BD563C6025B09A464EFC799A67162DAF82335B9CDE78
32,867,592 UART: Caliptra RT
32,868,312 UART: [state] CFI Enabled
33,045,170 UART: [rt] RT listening for mailbox commands...
33,047,024 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,076,982 UART: [rt]cmd =0x46504c54, len=4
33,078,512 >>> mbox cmd response data (8 bytes)
33,079,591 UART: [rt] FIPS self test
33,080,533 UART: [kat] ++
33,080,990 UART: [kat] sha1
33,085,446 UART: [kat] SHA2-256
33,087,326 UART: [kat] SHA2-384
33,090,340 UART: [kat] SHA2-512-ACC
33,091,358 UART: Droping operation
33,092,215 UART: Fatal Error: 0x90050003
33,127,601 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,277,574 >>> mbox cmd response: failed
33,278,221 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,428,123 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,013 UART:
190,312 UART: Running Caliptra ROM ...
191,337 UART:
191,479 UART: [state] CFI Enabled
247,854 UART: [state] LifecycleState = Unprovisioned
249,773 UART: [state] DebugLocked = No
251,933 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
257,145 UART: [kat] SHA2-256
426,833 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
437,324 UART: [kat] ++
437,840 UART: [kat] sha1
448,069 UART: [kat] SHA2-256
450,764 UART: [kat] SHA2-384
455,716 UART: [kat] SHA2-512-ACC
458,055 UART: [kat] ECC-384
2,752,853 UART: [kat] HMAC-384Kdf
2,784,032 UART: [kat] LMS
3,974,332 UART: [kat] --
3,978,434 UART: [cold-reset] ++
3,979,399 UART: [fht] Storing FHT @ 0x50003400
3,991,532 UART: [idev] ++
3,992,140 UART: [idev] CDI.KEYID = 6
3,993,058 UART: [idev] SUBJECT.KEYID = 7
3,994,285 UART: [idev] UDS.KEYID = 0
3,995,871 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,145,825 UART: [idev] Erasing UDS.KEYID = 0
7,331,216 UART: [idev] Using Sha1 for KeyId Algorithm
7,353,256 UART: [idev] --
7,357,557 UART: [ldev] ++
7,358,136 UART: [ldev] CDI.KEYID = 6
7,359,046 UART: [ldev] SUBJECT.KEYID = 5
7,360,200 UART: [ldev] AUTHORITY.KEYID = 7
7,361,541 UART: [ldev] FE.KEYID = 1
7,406,914 UART: [ldev] Erasing FE.KEYID = 1
10,742,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,054,390 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,083,830 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,098,286 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,117,602 UART: [ldev] --
13,121,668 UART: [fwproc] Waiting for Commands...
13,124,103 UART: [fwproc] Received command 0x46574c44
13,126,296 UART: [fwproc] Received Image of size 119428 bytes
17,242,320 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,320,237 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,393,400 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,724,208 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,940 writing to cptra_bootfsm_go
3,784,851 ready_for_fw is high
3,785,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,936,911 >>> mbox cmd response: success
23,631,439 UART:
23,631,837 UART: Running Caliptra FMC ...
23,632,987 UART:
23,633,148 UART: [state] CFI Enabled
23,698,772 UART: [fht] FMC Alias Private Key: 7
26,060,063 UART: [art] Extend RT PCRs Done
26,061,306 UART: [art] Lock RT PCRs Done
26,062,752 UART: [art] Populate DV Done
26,068,128 UART: [fht] FMC Alias Private Key: 7
26,069,672 UART: [art] Derive CDI
26,070,410 UART: [art] Store in slot 0x4
26,127,723 UART: [art] Derive Key Pair
26,128,769 UART: [art] Store priv key in slot 0x5
29,421,646 UART: [art] Derive Key Pair - Done
29,434,703 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,721,752 UART: [art] Erasing AUTHORITY.KEYID = 7
31,723,261 UART: [art] PUB.X = B3FDE498EEEB4455D467E7FA2A2A920C5F9B463C3440E53FE55BE145DCE0B73A707AD968F95035CB34E44FEAAE43698E
31,730,581 UART: [art] PUB.Y = 2C5A2FAB9B1A36890C1200626A41976FFDF9311D7BC7E9C098240198357A7A2AD442331E362315AD2E228B414C97FD17
31,737,747 UART: [art] SIG.R = 88CA630A0BA1A9D7E52425B237243FC252592BA76D3BFE8E9F10982F34E61B3A1678BBDA9E1F5DDD6A4359A234E5C389
31,745,179 UART: [art] SIG.S = C5D372404BC0CE32FA16B6D9E8FC42E2A9E7A22654D1B812DC675345666A73E42602CB1E192B8014033C60EF8EF7DC5C
33,050,377 UART: Caliptra RT
33,051,084 UART: [state] CFI Enabled
33,226,617 UART: [rt] RT listening for mailbox commands...
33,228,472 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,149 UART: [rt]cmd =0x46504c54, len=4
33,259,706 >>> mbox cmd response data (8 bytes)
33,260,876 UART: [rt] FIPS self test
33,261,832 UART: [kat] ++
33,262,286 UART: [kat] sha1
33,266,708 UART: [kat] SHA2-256
33,268,589 UART: [kat] SHA2-384
33,271,658 UART: [kat] SHA2-512-ACC
33,272,655 UART: Droping operation
33,273,509 UART: Fatal Error: 0x90050003
33,308,664 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,458,979 >>> mbox cmd response: failed
33,459,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,609,560 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
3,797,538 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,970,193 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,343 writing to cptra_bootfsm_go
192,503 UART:
192,894 UART: Running Caliptra ROM ...
194,011 UART:
603,632 UART: [state] CFI Enabled
619,144 UART: [state] LifecycleState = Unprovisioned
621,102 UART: [state] DebugLocked = No
623,726 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,247 UART: [kat] SHA2-256
797,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,504 UART: [kat] ++
809,027 UART: [kat] sha1
820,759 UART: [kat] SHA2-256
823,428 UART: [kat] SHA2-384
830,349 UART: [kat] SHA2-512-ACC
832,722 UART: [kat] ECC-384
3,117,268 UART: [kat] HMAC-384Kdf
3,128,540 UART: [kat] LMS
4,318,630 UART: [kat] --
4,323,362 UART: [cold-reset] ++
4,325,079 UART: [fht] Storing FHT @ 0x50003400
4,337,158 UART: [idev] ++
4,337,738 UART: [idev] CDI.KEYID = 6
4,338,780 UART: [idev] SUBJECT.KEYID = 7
4,339,961 UART: [idev] UDS.KEYID = 0
4,340,955 ready_for_fw is high
4,341,190 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,491,235 UART: [idev] Erasing UDS.KEYID = 0
7,630,575 UART: [idev] Using Sha1 for KeyId Algorithm
7,653,025 UART: [idev] --
7,656,652 UART: [ldev] ++
7,657,232 UART: [ldev] CDI.KEYID = 6
7,658,202 UART: [ldev] SUBJECT.KEYID = 5
7,659,420 UART: [ldev] AUTHORITY.KEYID = 7
7,660,660 UART: [ldev] FE.KEYID = 1
7,671,820 UART: [ldev] Erasing FE.KEYID = 1
10,954,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,250 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,099 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,613 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,538 UART: [ldev] --
13,312,081 UART: [fwproc] Waiting for Commands...
13,315,213 UART: [fwproc] Received command 0x46574c44
13,317,404 UART: [fwproc] Received Image of size 119428 bytes
17,433,363 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,512,686 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,585,865 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,917,995 >>> mbox cmd response: success
17,921,973 UART: [afmc] ++
17,922,619 UART: [afmc] CDI.KEYID = 6
17,923,526 UART: [afmc] SUBJECT.KEYID = 7
17,924,789 UART: [afmc] AUTHORITY.KEYID = 5
21,239,838 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,531,381 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,533,639 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,548,075 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,820 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,577,229 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,598,718 UART: [afmc] --
23,603,341 UART: [cold-reset] --
23,606,978 UART: [state] Locking Datavault
23,611,607 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,380 UART: [state] Locking ICCM
23,614,404 UART: [exit] Launching FMC @ 0x40000130
23,622,803 UART:
23,623,044 UART: Running Caliptra FMC ...
23,624,095 UART:
23,624,251 UART: [state] CFI Enabled
23,632,520 UART: [fht] FMC Alias Private Key: 7
25,972,670 UART: [art] Extend RT PCRs Done
25,973,902 UART: [art] Lock RT PCRs Done
25,975,538 UART: [art] Populate DV Done
25,980,793 UART: [fht] FMC Alias Private Key: 7
25,982,505 UART: [art] Derive CDI
25,983,249 UART: [art] Store in slot 0x4
26,025,628 UART: [art] Derive Key Pair
26,026,670 UART: [art] Store priv key in slot 0x5
29,268,851 UART: [art] Derive Key Pair - Done
29,281,471 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,561,725 UART: [art] Erasing AUTHORITY.KEYID = 7
31,563,241 UART: [art] PUB.X = EFE028E448AEF16AEE32EE27C2D4C355BAF1477ACB8AFE2FFAE9E5D887F101D812ECA5F9A3470B6B64E86144FF7C5F29
31,570,509 UART: [art] PUB.Y = 6729149A9FBEC65CE9DA99B5CED4FF955ADCA479CA008B900B3BDC5EBB1CA85008C96A1A3D6B5A2D8BF8301936B13202
31,577,772 UART: [art] SIG.R = 2CAFC14A7EAC368EE87B5AB84846257FDF5C362F000E3C9B56938A954927411BB6C0190FBE50D1CA29E2EB2DFE407248
31,585,185 UART: [art] SIG.S = 921E64A8685E27DB4668BAD40CA1DE35C1D05376E87D93B30D102BC7DFA57B6C515E5CC5C749B5D99660E75778B4A7CA
32,890,803 UART: Caliptra RT
32,891,509 UART: [state] CFI Enabled
33,024,336 UART: [rt] RT listening for mailbox commands...
33,026,191 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,056,094 UART: [rt]cmd =0x46504c54, len=4
33,057,711 >>> mbox cmd response data (8 bytes)
33,058,694 UART: [rt] FIPS self test
33,059,645 UART: [kat] ++
33,060,101 UART: [kat] sha1
33,064,450 UART: [kat] SHA2-256
33,066,387 UART: [kat] SHA2-384
33,069,310 UART: [kat] SHA2-512-ACC
33,070,309 UART: Droping operation
33,071,193 UART: Fatal Error: 0x90050003
33,106,310 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,256,238 >>> mbox cmd response: failed
33,256,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,406,745 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,014 UART:
190,334 UART: Running Caliptra ROM ...
191,452 UART:
7,119,590 UART: [state] CFI Enabled
7,133,591 UART: [state] LifecycleState = Unprovisioned
7,135,511 UART: [state] DebugLocked = No
7,138,334 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,143,234 UART: [kat] SHA2-256
7,312,954 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,323,502 UART: [kat] ++
7,323,990 UART: [kat] sha1
7,336,022 UART: [kat] SHA2-256
7,338,731 UART: [kat] SHA2-384
7,344,834 UART: [kat] SHA2-512-ACC
7,347,188 UART: [kat] ECC-384
9,632,700 UART: [kat] HMAC-384Kdf
9,645,084 UART: [kat] LMS
10,835,223 UART: [kat] --
10,841,335 UART: [cold-reset] ++
10,843,361 UART: [fht] Storing FHT @ 0x50003400
10,855,936 UART: [idev] ++
10,856,565 UART: [idev] CDI.KEYID = 6
10,857,477 UART: [idev] SUBJECT.KEYID = 7
10,858,696 UART: [idev] UDS.KEYID = 0
10,860,334 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,010,447 UART: [idev] Erasing UDS.KEYID = 0
14,151,350 UART: [idev] Using Sha1 for KeyId Algorithm
14,173,538 UART: [idev] --
14,177,645 UART: [ldev] ++
14,178,225 UART: [ldev] CDI.KEYID = 6
14,179,193 UART: [ldev] SUBJECT.KEYID = 5
14,180,359 UART: [ldev] AUTHORITY.KEYID = 7
14,181,653 UART: [ldev] FE.KEYID = 1
14,192,086 UART: [ldev] Erasing FE.KEYID = 1
17,481,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,776,494 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,791,088 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,914 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,820,439 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,839,534 UART: [ldev] --
19,844,861 UART: [fwproc] Waiting for Commands...
19,847,721 UART: [fwproc] Received command 0x46574c44
19,849,929 UART: [fwproc] Received Image of size 119428 bytes
23,970,791 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,045,202 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,118,381 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,450,213 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,261 writing to cptra_bootfsm_go
4,130,798 ready_for_fw is high
4,131,248 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,174,987 >>> mbox cmd response: success
23,810,218 UART:
23,810,615 UART: Running Caliptra FMC ...
23,811,733 UART:
23,811,922 UART: [state] CFI Enabled
23,820,154 UART: [fht] FMC Alias Private Key: 7
26,160,865 UART: [art] Extend RT PCRs Done
26,162,813 UART: [art] Lock RT PCRs Done
26,163,845 UART: [art] Populate DV Done
26,169,459 UART: [fht] FMC Alias Private Key: 7
26,171,082 UART: [art] Derive CDI
26,171,925 UART: [art] Store in slot 0x4
26,214,610 UART: [art] Derive Key Pair
26,215,796 UART: [art] Store priv key in slot 0x5
29,457,671 UART: [art] Derive Key Pair - Done
29,471,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,373 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,898 UART: [art] PUB.X = B212D575C4F3DF3830BAFDD326694E6185EDE687F70E51C66505930FE1FB47569190624B0691E66CB97D3BB1D496BD6D
31,760,151 UART: [art] PUB.Y = 3F723BB118F1262C7CB75A0F757C33D857A96551FE811665FE4A72AE782BC1A318A69E2F472B405A0A8D9B73F36156D6
31,767,420 UART: [art] SIG.R = 3AEB536AEC19926E47FB31D064764ED270F03D67D3D26A6402E9C310ACCE24912F32BB51B08E4BDA78279F44F0010400
31,774,759 UART: [art] SIG.S = 6A2065240C9BE516B3BDA5B87EC3EFF88D1F6A4FDDC8CD5570E13E1A7897F1F1B721A53F0C1E2403AC0BBBA5091B8E56
33,080,360 UART: Caliptra RT
33,081,073 UART: [state] CFI Enabled
33,214,969 UART: [rt] RT listening for mailbox commands...
33,216,838 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,246,547 UART: [rt]cmd =0x46504c54, len=4
33,248,189 >>> mbox cmd response data (8 bytes)
33,249,402 UART: [rt] FIPS self test
33,250,358 UART: [kat] ++
33,250,817 UART: [kat] sha1
33,255,095 UART: [kat] SHA2-256
33,256,982 UART: [kat] SHA2-384
33,259,890 UART: [kat] SHA2-512-ACC
33,260,890 UART: Droping operation
33,261,809 UART: Fatal Error: 0x90050003
33,296,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,446,952 >>> mbox cmd response: failed
33,447,632 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,597,516 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
10,445,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,494,647 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,123 writing to cptra_bootfsm_go
192,359 UART:
192,733 UART: Running Caliptra ROM ...
193,945 UART:
194,103 UART: [state] CFI Enabled
264,307 UART: [state] LifecycleState = Unprovisioned
266,296 UART: [state] DebugLocked = No
268,478 UART: [state] WD Timer not started. Device not locked for debugging
271,470 UART: [kat] SHA2-256
451,162 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,961 UART: [kat] ++
462,523 UART: [kat] sha1
474,055 UART: [kat] SHA2-256
476,749 UART: [kat] SHA2-384
483,535 UART: [kat] SHA2-512-ACC
485,922 UART: [kat] ECC-384
2,949,738 UART: [kat] HMAC-384Kdf
2,972,798 UART: [kat] LMS
3,449,314 UART: [kat] --
3,452,553 UART: [cold-reset] ++
3,453,719 UART: [fht] FHT @ 0x50003400
3,463,987 UART: [idev] ++
3,464,559 UART: [idev] CDI.KEYID = 6
3,465,527 UART: [idev] SUBJECT.KEYID = 7
3,466,775 UART: [idev] UDS.KEYID = 0
3,467,774 ready_for_fw is high
3,468,017 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,618,324 UART: [idev] Erasing UDS.KEYID = 0
5,986,891 UART: [idev] Sha1 KeyId Algorithm
6,010,865 UART: [idev] --
6,016,208 UART: [ldev] ++
6,016,800 UART: [ldev] CDI.KEYID = 6
6,017,729 UART: [ldev] SUBJECT.KEYID = 5
6,018,953 UART: [ldev] AUTHORITY.KEYID = 7
6,020,196 UART: [ldev] FE.KEYID = 1
6,057,858 UART: [ldev] Erasing FE.KEYID = 1
8,564,413 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,313 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,211 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,064 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,656 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,479 UART: [ldev] --
10,374,103 UART: [fwproc] Wait for Commands...
10,377,253 UART: [fwproc] Recv command 0x46574c44
10,379,246 UART: [fwproc] Recv'd Img size: 119428 bytes
13,865,786 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,940,877 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,013,901 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,345,894 >>> mbox cmd response: success
14,350,535 UART: [afmc] ++
14,351,135 UART: [afmc] CDI.KEYID = 6
14,352,051 UART: [afmc] SUBJECT.KEYID = 7
14,353,274 UART: [afmc] AUTHORITY.KEYID = 5
16,898,630 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,639,803 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,641,987 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,657,845 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,673,842 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,689,404 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,715,244 UART: [afmc] --
18,719,702 UART: [cold-reset] --
18,724,495 UART: [state] Locking Datavault
18,730,618 UART: [state] Locking PCR0, PCR1 and PCR31
18,732,380 UART: [state] Locking ICCM
18,734,107 UART: [exit] Launching FMC @ 0x40000130
18,742,559 UART:
18,742,798 UART: Running Caliptra FMC ...
18,743,905 UART:
18,744,068 UART: [state] CFI Enabled
18,798,808 UART: [fht] FMC Alias Private Key: 7
20,586,633 UART: [art] Extend RT PCRs Done
20,587,866 UART: [art] Lock RT PCRs Done
20,589,519 UART: [art] Populate DV Done
20,594,934 UART: [fht] FMC Alias Private Key: 7
20,596,484 UART: [art] Derive CDI
20,597,273 UART: [art] Store in slot 0x4
20,652,750 UART: [art] Derive Key Pair
20,653,850 UART: [art] Store priv key in slot 0x5
23,116,337 UART: [art] Derive Key Pair - Done
23,129,396 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,842,767 UART: [art] Erasing AUTHORITY.KEYID = 7
24,844,274 UART: [art] PUB.X = CF34A5CBD328D01B06D85525DE2FB7DCE6110D64C1A3AEB9985A1705EDB2D200FA969DA00B19C37D60CDFE71E94DBB2C
24,851,534 UART: [art] PUB.Y = 90EC61F90EF1800671FED45261F28AEF78DCBC3017A9819016C004793B1FE439AC29E9503C586EA1D37DA5D3634D98F3
24,858,838 UART: [art] SIG.R = 3DCAC535F5A25840A61695EC1C8A0BE4247FA8C871FF926F8D60B8F96302D8D806829B7B8A0FB663B1325F1427F9C209
24,866,189 UART: [art] SIG.S = EBE43A09EC018E1299935305015ACD4163BF60005D48A87174808C41C707231EFCACC3D8DE9367F4D7A4C54A0857A920
25,845,242 UART: Caliptra RT
25,845,939 UART: [state] CFI Enabled
26,027,856 UART: [rt] RT listening for mailbox commands...
26,029,709 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,059,131 UART: [rt]cmd =0x46504c54, len=4
26,060,769 >>> mbox cmd response data (8 bytes)
26,061,915 UART: [rt] FIPS self test
26,062,874 UART: [kat] ++
26,063,333 UART: [kat] sha1
26,067,688 UART: [kat] SHA2-256
26,069,621 UART: [kat] SHA2-384
26,072,549 UART: [kat] SHA2-512-ACC
26,073,534 UART: Droping operation
26,074,350 UART: Fatal Error: 0x90050003
26,109,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,259,517 >>> mbox cmd response: failed
26,260,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,410,483 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,141 UART:
190,430 UART: Running Caliptra ROM ...
191,482 UART:
191,626 UART: [state] CFI Enabled
265,238 UART: [state] LifecycleState = Unprovisioned
267,154 UART: [state] DebugLocked = No
268,670 UART: [state] WD Timer not started. Device not locked for debugging
272,508 UART: [kat] SHA2-256
452,184 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,978 UART: [kat] ++
463,440 UART: [kat] sha1
472,859 UART: [kat] SHA2-256
475,543 UART: [kat] SHA2-384
480,878 UART: [kat] SHA2-512-ACC
483,218 UART: [kat] ECC-384
2,944,359 UART: [kat] HMAC-384Kdf
2,970,686 UART: [kat] LMS
3,447,205 UART: [kat] --
3,453,649 UART: [cold-reset] ++
3,455,002 UART: [fht] FHT @ 0x50003400
3,466,534 UART: [idev] ++
3,467,108 UART: [idev] CDI.KEYID = 6
3,468,074 UART: [idev] SUBJECT.KEYID = 7
3,469,350 UART: [idev] UDS.KEYID = 0
3,470,861 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,528 UART: [idev] Erasing UDS.KEYID = 0
5,984,762 UART: [idev] Sha1 KeyId Algorithm
6,009,343 UART: [idev] --
6,015,073 UART: [ldev] ++
6,015,655 UART: [ldev] CDI.KEYID = 6
6,016,548 UART: [ldev] SUBJECT.KEYID = 5
6,017,768 UART: [ldev] AUTHORITY.KEYID = 7
6,019,062 UART: [ldev] FE.KEYID = 1
6,055,736 UART: [ldev] Erasing FE.KEYID = 1
8,562,641 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,143 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,972 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,874 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,435 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,126 UART: [ldev] --
10,372,606 UART: [fwproc] Wait for Commands...
10,374,166 UART: [fwproc] Recv command 0x46574c44
10,376,211 UART: [fwproc] Recv'd Img size: 119428 bytes
13,873,103 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,951,952 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,021 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,355,552 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,064 writing to cptra_bootfsm_go
3,461,109 ready_for_fw is high
3,461,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,264,279 >>> mbox cmd response: success
18,555,270 UART:
18,555,672 UART: Running Caliptra FMC ...
18,556,822 UART:
18,556,987 UART: [state] CFI Enabled
18,626,048 UART: [fht] FMC Alias Private Key: 7
20,392,524 UART: [art] Extend RT PCRs Done
20,393,757 UART: [art] Lock RT PCRs Done
20,395,443 UART: [art] Populate DV Done
20,400,835 UART: [fht] FMC Alias Private Key: 7
20,402,508 UART: [art] Derive CDI
20,403,329 UART: [art] Store in slot 0x4
20,458,806 UART: [art] Derive Key Pair
20,459,845 UART: [art] Store priv key in slot 0x5
22,922,877 UART: [art] Derive Key Pair - Done
22,935,759 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,648,546 UART: [art] Erasing AUTHORITY.KEYID = 7
24,650,058 UART: [art] PUB.X = 2234CE5C732EB15B5C6EFE9C0896A94F9F1C477E2E2D02ABF0CAAA834EB6436C3C1FB41425BCF7405D4403A1723F2E49
24,657,355 UART: [art] PUB.Y = 303BC5E12FF5ACFB59C125577ACAB85C0C9E7ED8F9DD0A49FAD460E29D6076094247A4E05C792BBB29A394BEEFD546EB
24,664,638 UART: [art] SIG.R = AA1B0034E460B3E64DF1C207C1ABD46F31E0ACF01295C1FCA9291C306834A6B09487787F242566CAE310DA05545130C8
24,671,963 UART: [art] SIG.S = 718F42FFCE977EB2E950560AE43754ED0E6D4FE1C39E44784116E58EA9D4F793EFC180B154F74A14342B1B27EE40D71F
25,651,482 UART: Caliptra RT
25,652,189 UART: [state] CFI Enabled
25,831,884 UART: [rt] RT listening for mailbox commands...
25,833,755 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,863,563 UART: [rt]cmd =0x46504c54, len=4
25,865,117 >>> mbox cmd response data (8 bytes)
25,866,448 UART: [rt] FIPS self test
25,867,398 UART: [kat] ++
25,867,857 UART: [kat] sha1
25,872,376 UART: [kat] SHA2-256
25,874,313 UART: [kat] SHA2-384
25,877,279 UART: [kat] SHA2-512-ACC
25,878,290 UART: Droping operation
25,879,127 UART: Fatal Error: 0x90050003
25,914,469 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,064,474 >>> mbox cmd response: failed
26,065,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,215,097 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,458,846 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,253,405 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,548 writing to cptra_bootfsm_go
192,742 UART:
193,109 UART: Running Caliptra ROM ...
194,306 UART:
604,109 UART: [state] CFI Enabled
617,489 UART: [state] LifecycleState = Unprovisioned
619,436 UART: [state] DebugLocked = No
620,850 UART: [state] WD Timer not started. Device not locked for debugging
624,055 UART: [kat] SHA2-256
803,710 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,502 UART: [kat] ++
814,999 UART: [kat] sha1
827,440 UART: [kat] SHA2-256
830,162 UART: [kat] SHA2-384
835,098 UART: [kat] SHA2-512-ACC
837,482 UART: [kat] ECC-384
3,278,631 UART: [kat] HMAC-384Kdf
3,290,302 UART: [kat] LMS
3,766,824 UART: [kat] --
3,770,778 UART: [cold-reset] ++
3,772,792 UART: [fht] FHT @ 0x50003400
3,783,994 UART: [idev] ++
3,784,565 UART: [idev] CDI.KEYID = 6
3,785,620 UART: [idev] SUBJECT.KEYID = 7
3,786,728 UART: [idev] UDS.KEYID = 0
3,787,790 ready_for_fw is high
3,788,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,938,002 UART: [idev] Erasing UDS.KEYID = 0
6,265,033 UART: [idev] Sha1 KeyId Algorithm
6,287,980 UART: [idev] --
6,293,600 UART: [ldev] ++
6,294,178 UART: [ldev] CDI.KEYID = 6
6,295,066 UART: [ldev] SUBJECT.KEYID = 5
6,296,288 UART: [ldev] AUTHORITY.KEYID = 7
6,297,533 UART: [ldev] FE.KEYID = 1
6,311,303 UART: [ldev] Erasing FE.KEYID = 1
8,790,220 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,982 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,870 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,707 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,150 UART: [ldev] --
10,581,800 UART: [fwproc] Wait for Commands...
10,584,558 UART: [fwproc] Recv command 0x46574c44
10,586,553 UART: [fwproc] Recv'd Img size: 119428 bytes
14,082,292 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,158,338 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,231,361 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,563,456 >>> mbox cmd response: success
14,566,964 UART: [afmc] ++
14,567,691 UART: [afmc] CDI.KEYID = 6
14,568,591 UART: [afmc] SUBJECT.KEYID = 7
14,569,700 UART: [afmc] AUTHORITY.KEYID = 5
17,075,052 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,785 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,800,990 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,821 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,849 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,438 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,874,447 UART: [afmc] --
18,878,522 UART: [cold-reset] --
18,881,374 UART: [state] Locking Datavault
18,887,327 UART: [state] Locking PCR0, PCR1 and PCR31
18,889,095 UART: [state] Locking ICCM
18,890,935 UART: [exit] Launching FMC @ 0x40000130
18,899,333 UART:
18,899,572 UART: Running Caliptra FMC ...
18,900,684 UART:
18,900,847 UART: [state] CFI Enabled
18,909,168 UART: [fht] FMC Alias Private Key: 7
20,676,006 UART: [art] Extend RT PCRs Done
20,677,248 UART: [art] Lock RT PCRs Done
20,679,233 UART: [art] Populate DV Done
20,684,917 UART: [fht] FMC Alias Private Key: 7
20,686,407 UART: [art] Derive CDI
20,687,144 UART: [art] Store in slot 0x4
20,730,004 UART: [art] Derive Key Pair
20,731,048 UART: [art] Store priv key in slot 0x5
23,158,333 UART: [art] Derive Key Pair - Done
23,171,542 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,878,123 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,632 UART: [art] PUB.X = 21BE29E83D5A04AE474ACAA75E83ADCBAF0E20395FB11294DBE4E42E96AB86BC369CC2DC0AAD34FE70D522BAA55FC16A
24,886,925 UART: [art] PUB.Y = E83CDDF4150310BCE63D60681A57073D784B4EEE939BC4BD74D13B4B6E733155751BA24BD5F46D95EB3627D84757DBA4
24,894,198 UART: [art] SIG.R = 09F938A0454D14D5FEEA973A49D5DCC5AE10D954BDCAF058DB49B0CCF62784E076C9C18D4C19A97E4FAB2DE63131153A
24,901,575 UART: [art] SIG.S = E586659B48FB2F9E0667D289182715659022566B815BC4860AFF3EBA1B219CA616D6B30B96B7134E7C4D3B41BA1527E3
25,879,904 UART: Caliptra RT
25,880,599 UART: [state] CFI Enabled
26,013,303 UART: [rt] RT listening for mailbox commands...
26,015,152 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,044,849 UART: [rt]cmd =0x46504c54, len=4
26,046,542 >>> mbox cmd response data (8 bytes)
26,047,543 UART: [rt] FIPS self test
26,048,495 UART: [kat] ++
26,048,997 UART: [kat] sha1
26,053,406 UART: [kat] SHA2-256
26,055,341 UART: [kat] SHA2-384
26,058,251 UART: [kat] SHA2-512-ACC
26,059,250 UART: Droping operation
26,060,054 UART: Fatal Error: 0x90050003
26,095,301 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,245,294 >>> mbox cmd response: failed
26,245,951 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,396,192 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
190,121 UART:
190,414 UART: Running Caliptra ROM ...
191,444 UART:
14,127,353 UART: [state] CFI Enabled
14,142,665 UART: [state] LifecycleState = Unprovisioned
14,144,595 UART: [state] DebugLocked = No
14,146,800 UART: [state] WD Timer not started. Device not locked for debugging
14,151,184 UART: [kat] SHA2-256
14,330,854 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,341,601 UART: [kat] ++
14,342,088 UART: [kat] sha1
14,352,681 UART: [kat] SHA2-256
14,355,378 UART: [kat] SHA2-384
14,361,048 UART: [kat] SHA2-512-ACC
14,363,371 UART: [kat] ECC-384
16,807,612 UART: [kat] HMAC-384Kdf
16,820,655 UART: [kat] LMS
17,297,133 UART: [kat] --
17,301,285 UART: [cold-reset] ++
17,302,636 UART: [fht] FHT @ 0x50003400
17,313,890 UART: [idev] ++
17,314,455 UART: [idev] CDI.KEYID = 6
17,315,423 UART: [idev] SUBJECT.KEYID = 7
17,316,640 UART: [idev] UDS.KEYID = 0
17,318,226 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,468,154 UART: [idev] Erasing UDS.KEYID = 0
19,801,121 UART: [idev] Sha1 KeyId Algorithm
19,824,512 UART: [idev] --
19,828,984 UART: [ldev] ++
19,829,643 UART: [ldev] CDI.KEYID = 6
19,830,555 UART: [ldev] SUBJECT.KEYID = 5
19,831,718 UART: [ldev] AUTHORITY.KEYID = 7
19,832,956 UART: [ldev] FE.KEYID = 1
19,844,334 UART: [ldev] Erasing FE.KEYID = 1
22,321,192 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,041,860 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,057,763 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,073,614 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,089,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,110,952 UART: [ldev] --
24,116,920 UART: [fwproc] Wait for Commands...
24,119,677 UART: [fwproc] Recv command 0x46574c44
24,121,666 UART: [fwproc] Recv'd Img size: 119428 bytes
27,616,000 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,698,421 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,771,448 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,102,327 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,776,508 ready_for_fw is high
3,776,914 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,449,677 >>> mbox cmd response: success
18,705,689 UART:
18,706,098 UART: Running Caliptra FMC ...
18,707,223 UART:
18,707,380 UART: [state] CFI Enabled
18,715,307 UART: [fht] FMC Alias Private Key: 7
20,481,835 UART: [art] Extend RT PCRs Done
20,483,064 UART: [art] Lock RT PCRs Done
20,484,559 UART: [art] Populate DV Done
20,489,940 UART: [fht] FMC Alias Private Key: 7
20,491,472 UART: [art] Derive CDI
20,492,215 UART: [art] Store in slot 0x4
20,535,195 UART: [art] Derive Key Pair
20,536,206 UART: [art] Store priv key in slot 0x5
22,963,418 UART: [art] Derive Key Pair - Done
22,976,490 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,682,536 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,052 UART: [art] PUB.X = 04311E39A2221F94D4CEE27B6C46569226007EA847DAA1797801372D3B44D0B445330B5D3F3EA1B274C8409B33000599
24,691,257 UART: [art] PUB.Y = 38B7D6FE34877F737A677622D0989304476F3EE87B455BAF340403544E547FA475A652790DB72AF50DB576B26A574BD0
24,698,518 UART: [art] SIG.R = DC7CFE2B8E2C638B9EE690DA74AE94C2EDB1F1797F0123F87234BC060CDB44E920F7211AA4E73735DC01CAFC5B9D4F85
24,705,922 UART: [art] SIG.S = A9A6111E8A031DC2C8A172179CE549C1C83D82490157E78243D360BC709C633D60B6D6B2D0CAC9811ADB41F00D5BBD3D
25,685,089 UART: Caliptra RT
25,685,810 UART: [state] CFI Enabled
25,818,445 UART: [rt] RT listening for mailbox commands...
25,820,311 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,850,058 UART: [rt]cmd =0x46504c54, len=4
25,851,728 >>> mbox cmd response data (8 bytes)
25,852,722 UART: [rt] FIPS self test
25,853,677 UART: [kat] ++
25,854,132 UART: [kat] sha1
25,858,667 UART: [kat] SHA2-256
25,860,615 UART: [kat] SHA2-384
25,863,578 UART: [kat] SHA2-512-ACC
25,864,525 UART: Droping operation
25,865,411 UART: Fatal Error: 0x90050003
25,900,624 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,050,630 >>> mbox cmd response: failed
26,051,285 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,201,163 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
17,497,528 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,183,240 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,955 writing to cptra_bootfsm_go
192,101 UART:
192,481 UART: Running Caliptra ROM ...
193,597 UART:
193,749 UART: [state] CFI Enabled
267,733 UART: [state] LifecycleState = Unprovisioned
270,071 UART: [state] DebugLocked = No
272,900 UART: [state] WD Timer not started. Device not locked for debugging
277,022 UART: [kat] SHA2-256
466,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
477,655 UART: [kat] ++
478,110 UART: [kat] sha1
489,934 UART: [kat] SHA2-256
492,953 UART: [kat] SHA2-384
497,672 UART: [kat] SHA2-512-ACC
500,260 UART: [kat] ECC-384
2,948,725 UART: [kat] HMAC-384Kdf
2,972,198 UART: [kat] LMS
3,503,963 UART: [kat] --
3,508,739 UART: [cold-reset] ++
3,510,042 UART: [fht] FHT @ 0x50003400
3,521,310 UART: [idev] ++
3,521,959 UART: [idev] CDI.KEYID = 6
3,522,946 UART: [idev] SUBJECT.KEYID = 7
3,524,127 UART: [idev] UDS.KEYID = 0
3,525,056 ready_for_fw is high
3,525,274 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,675,453 UART: [idev] Erasing UDS.KEYID = 0
6,029,474 UART: [idev] Sha1 KeyId Algorithm
6,053,214 UART: [idev] --
6,057,255 UART: [ldev] ++
6,057,954 UART: [ldev] CDI.KEYID = 6
6,058,869 UART: [ldev] SUBJECT.KEYID = 5
6,060,034 UART: [ldev] AUTHORITY.KEYID = 7
6,061,223 UART: [ldev] FE.KEYID = 1
6,101,688 UART: [ldev] Erasing FE.KEYID = 1
8,607,020 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,691 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,846 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,375,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,208 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,398 UART: [ldev] --
10,416,666 UART: [fwproc] Wait for Commands...
10,419,684 UART: [fwproc] Recv command 0x46574c44
10,422,032 UART: [fwproc] Recv'd Img size: 119428 bytes
13,936,787 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,011,777 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,135,349 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,700,852 >>> mbox cmd response: success
14,704,171 UART: [afmc] ++
14,704,931 UART: [afmc] CDI.KEYID = 6
14,706,123 UART: [afmc] SUBJECT.KEYID = 7
14,707,559 UART: [afmc] AUTHORITY.KEYID = 5
17,233,366 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,723 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,642 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,731 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,989,920 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,004,805 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,027,942 UART: [afmc] --
19,032,327 UART: [cold-reset] --
19,037,224 UART: [state] Locking Datavault
19,042,911 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,052 UART: [state] Locking ICCM
19,047,917 UART: [exit] Launching FMC @ 0x40000130
19,056,599 UART:
19,056,847 UART: Running Caliptra FMC ...
19,057,886 UART:
19,058,038 UART: [state] CFI Enabled
19,117,272 UART: [fht] FMC Alias Private Key: 7
20,883,834 UART: [art] Extend RT PCRs Done
20,885,063 UART: [art] Lock RT PCRs Done
20,886,455 UART: [art] Populate DV Done
20,892,087 UART: [fht] FMC Alias Private Key: 7
20,893,689 UART: [art] Derive CDI
20,894,508 UART: [art] Store in slot 0x4
20,949,994 UART: [art] Derive Key Pair
20,951,035 UART: [art] Store priv key in slot 0x5
23,413,388 UART: [art] Derive Key Pair - Done
23,426,333 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,219 UART: [art] Erasing AUTHORITY.KEYID = 7
25,141,726 UART: [art] PUB.X = 401ECC6E17E628B68CED36A0BCB8C2F6CB06016A71A6D580A67D987A5F735C67DA304AB0842C4BD4B5450BB8CDAF4548
25,149,038 UART: [art] PUB.Y = B5BA433FB6043F6707B6A0318D87B85E6C5EC5C2161BF5049EA572175973FC02C2B7A95EEC12D2A78098214C512A98DF
25,156,287 UART: [art] SIG.R = ED93CB8E1044AD5983D6072D7982282553C6A6F975DAB0183E90F40DD49E130FF3F27291E30AEBEDD0A79C50362C5D2E
25,163,733 UART: [art] SIG.S = A5658F4F4E9A64A4663DC485E6237122BA563CD6E38B51119D63A800224E094FCBC4670914AA62237C24A69AF5323A98
26,142,341 UART: Caliptra RT
26,143,033 UART: [state] CFI Enabled
26,322,357 UART: [rt] RT listening for mailbox commands...
26,324,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,353,951 UART: [rt]cmd =0x46504c54, len=4
26,355,425 >>> mbox cmd response data (8 bytes)
26,356,781 UART: [rt] FIPS self test
26,357,752 UART: [kat] ++
26,358,208 UART: [kat] sha1
26,362,579 UART: [kat] SHA2-256
26,364,453 UART: [kat] SHA2-384
26,367,322 UART: [kat] SHA2-512-ACC
26,368,324 UART: Droping operation
26,369,245 UART: Fatal Error: 0x90050003
26,404,456 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,554,480 >>> mbox cmd response: failed
26,555,146 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,705,426 >>> mbox cmd response: failed
Initializing fuses
958 writing to cptra_bootfsm_go
190,108 UART:
190,432 UART: Running Caliptra ROM ...
191,587 UART:
191,764 UART: [state] CFI Enabled
268,600 UART: [state] LifecycleState = Unprovisioned
271,016 UART: [state] DebugLocked = No
272,349 UART: [state] WD Timer not started. Device not locked for debugging
277,821 UART: [kat] SHA2-256
467,705 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,471 UART: [kat] ++
478,954 UART: [kat] sha1
490,380 UART: [kat] SHA2-256
493,404 UART: [kat] SHA2-384
499,388 UART: [kat] SHA2-512-ACC
502,010 UART: [kat] ECC-384
2,953,157 UART: [kat] HMAC-384Kdf
2,967,276 UART: [kat] LMS
3,499,068 UART: [kat] --
3,505,395 UART: [cold-reset] ++
3,507,083 UART: [fht] FHT @ 0x50003400
3,519,000 UART: [idev] ++
3,519,698 UART: [idev] CDI.KEYID = 6
3,520,611 UART: [idev] SUBJECT.KEYID = 7
3,521,836 UART: [idev] UDS.KEYID = 0
3,523,355 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,673,475 UART: [idev] Erasing UDS.KEYID = 0
6,045,370 UART: [idev] Sha1 KeyId Algorithm
6,067,463 UART: [idev] --
6,073,539 UART: [ldev] ++
6,074,239 UART: [ldev] CDI.KEYID = 6
6,075,155 UART: [ldev] SUBJECT.KEYID = 5
6,076,327 UART: [ldev] AUTHORITY.KEYID = 7
6,077,513 UART: [ldev] FE.KEYID = 1
6,115,822 UART: [ldev] Erasing FE.KEYID = 1
8,619,255 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,358,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,374,058 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,389,246 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,404,386 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,426,000 UART: [ldev] --
10,432,356 UART: [fwproc] Wait for Commands...
10,434,415 UART: [fwproc] Recv command 0x46574c44
10,436,678 UART: [fwproc] Recv'd Img size: 119428 bytes
13,947,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,026,109 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,149,744 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,715,506 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,036 writing to cptra_bootfsm_go
3,415,995 ready_for_fw is high
3,416,417 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,829,311 >>> mbox cmd response: success
19,107,599 UART:
19,107,999 UART: Running Caliptra FMC ...
19,109,158 UART:
19,109,331 UART: [state] CFI Enabled
19,175,452 UART: [fht] FMC Alias Private Key: 7
20,942,234 UART: [art] Extend RT PCRs Done
20,943,472 UART: [art] Lock RT PCRs Done
20,945,102 UART: [art] Populate DV Done
20,950,586 UART: [fht] FMC Alias Private Key: 7
20,952,328 UART: [art] Derive CDI
20,953,100 UART: [art] Store in slot 0x4
21,007,889 UART: [art] Derive Key Pair
21,008,900 UART: [art] Store priv key in slot 0x5
23,471,552 UART: [art] Derive Key Pair - Done
23,484,132 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,197,259 UART: [art] Erasing AUTHORITY.KEYID = 7
25,198,783 UART: [art] PUB.X = DED238A84A8104177046B362A8577906EF53B6F14009A3DFDDCCDAE9CE98CBEB079DF5BB3AC2EB9F8A57476102B26892
25,206,012 UART: [art] PUB.Y = 7341E2D72935A1A83FB9D9659540581430CE536112B68CC2318CEF054FBA3E9B8A2EEF8B4D96199F5EB4B6883BDCBCB7
25,213,291 UART: [art] SIG.R = 7C4295490C2E77D64137D7671A6DF7636B6214B47EDA114C5F25A9B10BF222863FBB96951AAC0A17F41F20805E2A88F5
25,220,633 UART: [art] SIG.S = 27588E522DD47402CC8A5F608545E66F5AA91232AA39E22EB2AD0866E8D98D127266097C3DDA0D8B83FABC9A165EAFFB
26,199,679 UART: Caliptra RT
26,200,422 UART: [state] CFI Enabled
26,379,102 UART: [rt] RT listening for mailbox commands...
26,380,969 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,410,919 UART: [rt]cmd =0x46504c54, len=4
26,412,590 >>> mbox cmd response data (8 bytes)
26,413,530 UART: [rt] FIPS self test
26,414,489 UART: [kat] ++
26,414,947 UART: [kat] sha1
26,419,349 UART: [kat] SHA2-256
26,421,281 UART: [kat] SHA2-384
26,424,140 UART: [kat] SHA2-512-ACC
26,425,149 UART: Droping operation
26,425,995 UART: Fatal Error: 0x90050003
26,461,103 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,611,130 >>> mbox cmd response: failed
26,611,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,761,741 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
3,418,081 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,815,346 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.19s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,636 UART:
193,006 UART: Running Caliptra ROM ...
194,153 UART:
603,881 UART: [state] CFI Enabled
615,560 UART: [state] LifecycleState = Unprovisioned
617,869 UART: [state] DebugLocked = No
620,179 UART: [state] WD Timer not started. Device not locked for debugging
623,941 UART: [kat] SHA2-256
813,866 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,626 UART: [kat] ++
825,155 UART: [kat] sha1
836,958 UART: [kat] SHA2-256
839,972 UART: [kat] SHA2-384
845,967 UART: [kat] SHA2-512-ACC
848,554 UART: [kat] ECC-384
3,291,853 UART: [kat] HMAC-384Kdf
3,304,727 UART: [kat] LMS
3,836,571 UART: [kat] --
3,840,495 UART: [cold-reset] ++
3,843,075 UART: [fht] FHT @ 0x50003400
3,853,938 UART: [idev] ++
3,854,691 UART: [idev] CDI.KEYID = 6
3,855,610 UART: [idev] SUBJECT.KEYID = 7
3,856,798 UART: [idev] UDS.KEYID = 0
3,858,091 ready_for_fw is high
3,858,311 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,008,142 UART: [idev] Erasing UDS.KEYID = 0
6,332,878 UART: [idev] Sha1 KeyId Algorithm
6,354,912 UART: [idev] --
6,360,263 UART: [ldev] ++
6,360,955 UART: [ldev] CDI.KEYID = 6
6,361,878 UART: [ldev] SUBJECT.KEYID = 5
6,363,041 UART: [ldev] AUTHORITY.KEYID = 7
6,364,223 UART: [ldev] FE.KEYID = 1
6,374,384 UART: [ldev] Erasing FE.KEYID = 1
8,857,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,447 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,629 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,812 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,621,910 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,577 UART: [ldev] --
10,648,742 UART: [fwproc] Wait for Commands...
10,651,598 UART: [fwproc] Recv command 0x46574c44
10,653,891 UART: [fwproc] Recv'd Img size: 119428 bytes
14,166,821 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,248,498 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,372,131 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,937,591 >>> mbox cmd response: success
14,941,207 UART: [afmc] ++
14,941,911 UART: [afmc] CDI.KEYID = 6
14,943,155 UART: [afmc] SUBJECT.KEYID = 7
14,944,588 UART: [afmc] AUTHORITY.KEYID = 5
17,446,371 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,166,826 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,168,780 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,183,898 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,199,030 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,213,954 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,238,075 UART: [afmc] --
19,241,735 UART: [cold-reset] --
19,245,656 UART: [state] Locking Datavault
19,252,904 UART: [state] Locking PCR0, PCR1 and PCR31
19,255,045 UART: [state] Locking ICCM
19,256,341 UART: [exit] Launching FMC @ 0x40000130
19,264,687 UART:
19,264,927 UART: Running Caliptra FMC ...
19,266,033 UART:
19,266,204 UART: [state] CFI Enabled
19,274,419 UART: [fht] FMC Alias Private Key: 7
21,040,355 UART: [art] Extend RT PCRs Done
21,041,614 UART: [art] Lock RT PCRs Done
21,043,055 UART: [art] Populate DV Done
21,048,278 UART: [fht] FMC Alias Private Key: 7
21,049,960 UART: [art] Derive CDI
21,050,741 UART: [art] Store in slot 0x4
21,093,459 UART: [art] Derive Key Pair
21,094,472 UART: [art] Store priv key in slot 0x5
23,521,353 UART: [art] Derive Key Pair - Done
23,534,294 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,240,521 UART: [art] Erasing AUTHORITY.KEYID = 7
25,242,027 UART: [art] PUB.X = AE6BBBA64D14A153D2ADB7B56B0AE3C47E4C575BB7C8642BA1D24680B0A67AD0B1929D28F23F9C29E8CBA5D8B087C7B4
25,249,323 UART: [art] PUB.Y = E7874E0E34AD32073F15D0DEEFAA3C25812922F860DAE9436DCE832AE14D9F5F9B0278EF5E8B07A3F95154DDE7AD2695
25,256,587 UART: [art] SIG.R = 920DC0729E5CB94BCECA173F5A14CB9D478C6069CB4EE1B0FC721682FCFF1D7B8F096CCCE6FCA2EB7A3D19C478BA691E
25,264,020 UART: [art] SIG.S = 328CD6E8322035120B49EE26C59F8A941FDF864319FF2DCBF8F5C1C2C6CE21AE52EA22EAE3A21FE88ECD264E86027844
26,243,190 UART: Caliptra RT
26,243,900 UART: [state] CFI Enabled
26,376,751 UART: [rt] RT listening for mailbox commands...
26,378,613 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,408,525 UART: [rt]cmd =0x46504c54, len=4
26,410,090 >>> mbox cmd response data (8 bytes)
26,411,144 UART: [rt] FIPS self test
26,412,091 UART: [kat] ++
26,412,548 UART: [kat] sha1
26,417,098 UART: [kat] SHA2-256
26,418,985 UART: [kat] SHA2-384
26,421,841 UART: [kat] SHA2-512-ACC
26,422,841 UART: Droping operation
26,423,642 UART: Fatal Error: 0x90050003
26,458,795 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,608,745 >>> mbox cmd response: failed
26,609,425 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,759,357 >>> mbox cmd response: failed
Initializing fuses
1,001 writing to cptra_bootfsm_go
190,092 UART:
190,391 UART: Running Caliptra ROM ...
191,516 UART:
13,777,588 UART: [state] CFI Enabled
13,790,052 UART: [state] LifecycleState = Unprovisioned
13,792,418 UART: [state] DebugLocked = No
13,794,108 UART: [state] WD Timer not started. Device not locked for debugging
13,798,476 UART: [kat] SHA2-256
13,988,326 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
13,999,078 UART: [kat] ++
13,999,684 UART: [kat] sha1
14,011,395 UART: [kat] SHA2-256
14,014,428 UART: [kat] SHA2-384
14,020,484 UART: [kat] SHA2-512-ACC
14,023,058 UART: [kat] ECC-384
16,467,421 UART: [kat] HMAC-384Kdf
16,481,396 UART: [kat] LMS
17,013,218 UART: [kat] --
17,016,022 UART: [cold-reset] ++
17,017,853 UART: [fht] FHT @ 0x50003400
17,030,191 UART: [idev] ++
17,030,874 UART: [idev] CDI.KEYID = 6
17,031,896 UART: [idev] SUBJECT.KEYID = 7
17,033,006 UART: [idev] UDS.KEYID = 0
17,034,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,184,438 UART: [idev] Erasing UDS.KEYID = 0
19,509,178 UART: [idev] Sha1 KeyId Algorithm
19,532,472 UART: [idev] --
19,538,688 UART: [ldev] ++
19,539,379 UART: [ldev] CDI.KEYID = 6
19,540,266 UART: [ldev] SUBJECT.KEYID = 5
19,541,483 UART: [ldev] AUTHORITY.KEYID = 7
19,542,739 UART: [ldev] FE.KEYID = 1
19,553,987 UART: [ldev] Erasing FE.KEYID = 1
22,033,595 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,752,187 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,767,385 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,782,608 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,797,671 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,818,168 UART: [ldev] --
23,823,777 UART: [fwproc] Wait for Commands...
23,825,397 UART: [fwproc] Recv command 0x46574c44
23,827,672 UART: [fwproc] Recv'd Img size: 119428 bytes
27,338,349 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,411,158 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,534,736 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,101,225 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,199 writing to cptra_bootfsm_go
3,756,027 ready_for_fw is high
3,756,518 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,070,861 >>> mbox cmd response: success
19,324,124 UART:
19,324,515 UART: Running Caliptra FMC ...
19,325,656 UART:
19,325,814 UART: [state] CFI Enabled
19,333,550 UART: [fht] FMC Alias Private Key: 7
21,099,290 UART: [art] Extend RT PCRs Done
21,100,521 UART: [art] Lock RT PCRs Done
21,102,282 UART: [art] Populate DV Done
21,107,387 UART: [fht] FMC Alias Private Key: 7
21,108,990 UART: [art] Derive CDI
21,109,810 UART: [art] Store in slot 0x4
21,152,791 UART: [art] Derive Key Pair
21,153,798 UART: [art] Store priv key in slot 0x5
23,580,438 UART: [art] Derive Key Pair - Done
23,593,455 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,300,036 UART: [art] Erasing AUTHORITY.KEYID = 7
25,301,553 UART: [art] PUB.X = 07594E9E987A811599549F343565CCD5F61BA6D86DD13E308839A9A0E383E3ECEFDADB09C703A141626BD2ECB389936E
25,308,793 UART: [art] PUB.Y = 133046CB63D07FFC5E9157D626B79C8947CA4B3D38205CD7317F38A1021E6BA88D423929AF780584F78D8772FE07CA35
25,316,027 UART: [art] SIG.R = E7F311E49B4C84298A68AB7CD9EEAC9E1B75E71021463F76C293FF1A15373B2BBA77B1C0A184E643A9B837836CADC9C5
25,323,429 UART: [art] SIG.S = D5ABC407F999130FB30FA9A7D335677EA7E9141F001D7EAB2626DD31F1E3B261B9571A03B13D691AA0BB838C5B0FB516
26,302,309 UART: Caliptra RT
26,303,023 UART: [state] CFI Enabled
26,435,769 UART: [rt] RT listening for mailbox commands...
26,437,634 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,467,325 UART: [rt]cmd =0x46504c54, len=4
26,468,853 >>> mbox cmd response data (8 bytes)
26,470,046 UART: [rt] FIPS self test
26,470,997 UART: [kat] ++
26,471,451 UART: [kat] sha1
26,475,751 UART: [kat] SHA2-256
26,477,678 UART: [kat] SHA2-384
26,480,476 UART: [kat] SHA2-512-ACC
26,481,477 UART: Droping operation
26,482,334 UART: Fatal Error: 0x90050003
26,517,582 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,667,417 >>> mbox cmd response: failed
26,667,994 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,817,875 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
16,874,078 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,172,426 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,150 UART: [state] LifecycleState = Unprovisioned
85,805 UART: [state] DebugLocked = No
86,291 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,819 UART: [kat] SHA2-256
881,750 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,865 UART: [kat] ++
886,017 UART: [kat] sha1
890,327 UART: [kat] SHA2-256
892,265 UART: [kat] SHA2-384
894,780 UART: [kat] SHA2-512-ACC
896,681 UART: [kat] ECC-384
902,206 UART: [kat] HMAC-384Kdf
906,850 UART: [kat] LMS
1,475,046 UART: [kat] --
1,476,245 UART: [cold-reset] ++
1,476,765 UART: [fht] Storing FHT @ 0x50003400
1,479,682 UART: [idev] ++
1,479,850 UART: [idev] CDI.KEYID = 6
1,480,210 UART: [idev] SUBJECT.KEYID = 7
1,480,634 UART: [idev] UDS.KEYID = 0
1,480,979 ready_for_fw is high
1,480,979 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,652 UART: [idev] Erasing UDS.KEYID = 0
1,505,606 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,046 UART: [idev] --
1,515,011 UART: [ldev] ++
1,515,179 UART: [ldev] CDI.KEYID = 6
1,515,542 UART: [ldev] SUBJECT.KEYID = 5
1,515,968 UART: [ldev] AUTHORITY.KEYID = 7
1,516,431 UART: [ldev] FE.KEYID = 1
1,521,539 UART: [ldev] Erasing FE.KEYID = 1
1,547,084 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,767 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,483 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,374 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,086 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,102 UART: [ldev] --
1,586,397 UART: [fwproc] Waiting for Commands...
1,587,238 UART: [fwproc] Received command 0x46574c44
1,588,029 UART: [fwproc] Received Image of size 119428 bytes
2,942,717 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,823 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,041 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,700 >>> mbox cmd response: success
3,143,940 UART: [afmc] ++
3,144,108 UART: [afmc] CDI.KEYID = 6
3,144,470 UART: [afmc] SUBJECT.KEYID = 7
3,144,895 UART: [afmc] AUTHORITY.KEYID = 5
3,180,084 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,478 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,258 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,967 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,850 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,533 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,222,467 UART: [afmc] --
3,223,501 UART: [cold-reset] --
3,224,127 UART: [state] Locking Datavault
3,225,266 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,870 UART: [state] Locking ICCM
3,226,316 UART: [exit] Launching FMC @ 0x40000130
3,231,646 UART:
3,231,662 UART: Running Caliptra FMC ...
3,232,070 UART:
3,232,124 UART: [state] CFI Enabled
3,242,636 UART: [fht] FMC Alias Private Key: 7
3,361,936 UART: [art] Extend RT PCRs Done
3,362,364 UART: [art] Lock RT PCRs Done
3,363,818 UART: [art] Populate DV Done
3,371,953 UART: [fht] FMC Alias Private Key: 7
3,372,955 UART: [art] Derive CDI
3,373,235 UART: [art] Store in slot 0x4
3,458,711 UART: [art] Derive Key Pair
3,459,071 UART: [art] Store priv key in slot 0x5
3,472,384 UART: [art] Derive Key Pair - Done
3,486,946 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,481 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,246 UART: [art] PUB.X = 1BD24D7003D3FFC1395BFEEB44866293E5DC99341E2BAB02CB422D279E3D9338D53BDDF70278CB99869DE19F7340ABBE
3,510,021 UART: [art] PUB.Y = B5EA2460EF1F4FC908966C76B19EFFB1894B38430EE4856FE271FA1BFFC3A39F7AA94356DEBD64284B0C6660620B6CA8
3,516,973 UART: [art] SIG.R = 477559FBE61C42E98EE5743EABA5BFB0C8312D8E7CBB9A4B33492EDEE3CD225B091C3557279420A0EB427F0B703B99CF
3,523,751 UART: [art] SIG.S = E73F8877BA9E32E95CDC0785BBDBB810E1CD9CA59CBA87914094C67EF0BBCAE487AA2713063188AAF0DE82E1D0E63AC8
3,547,837 UART: Caliptra RT
3,548,088 UART: [state] CFI Enabled
3,668,640 UART: [rt] RT listening for mailbox commands...
3,669,303 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,022 UART: [rt]cmd =0x46504c54, len=4
3,700,234 >>> mbox cmd response data (8 bytes)
3,700,571 UART: [rt] FIPS self test
3,700,899 UART: [kat] ++
3,701,051 UART: [kat] sha1
3,705,471 UART: [kat] SHA2-256
3,707,493 UART: [kat] SHA2-384
3,710,524 UART: [kat] SHA2-512-ACC
3,712,007 UART: Droping operation
3,712,472 UART: Fatal Error: 0x90050003
3,714,011 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,016 >>> mbox cmd response: failed
3,714,016 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,714,021 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,201 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,713 UART: [kat] SHA2-256
881,644 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,759 UART: [kat] ++
885,911 UART: [kat] sha1
890,145 UART: [kat] SHA2-256
892,083 UART: [kat] SHA2-384
894,850 UART: [kat] SHA2-512-ACC
896,751 UART: [kat] ECC-384
902,250 UART: [kat] HMAC-384Kdf
906,760 UART: [kat] LMS
1,474,956 UART: [kat] --
1,475,977 UART: [cold-reset] ++
1,476,549 UART: [fht] Storing FHT @ 0x50003400
1,479,270 UART: [idev] ++
1,479,438 UART: [idev] CDI.KEYID = 6
1,479,798 UART: [idev] SUBJECT.KEYID = 7
1,480,222 UART: [idev] UDS.KEYID = 0
1,480,567 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,570 UART: [idev] Erasing UDS.KEYID = 0
1,505,356 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,088 UART: [idev] --
1,515,117 UART: [ldev] ++
1,515,285 UART: [ldev] CDI.KEYID = 6
1,515,648 UART: [ldev] SUBJECT.KEYID = 5
1,516,074 UART: [ldev] AUTHORITY.KEYID = 7
1,516,537 UART: [ldev] FE.KEYID = 1
1,521,733 UART: [ldev] Erasing FE.KEYID = 1
1,546,956 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,471 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,187 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,078 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,790 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,734 UART: [ldev] --
1,586,025 UART: [fwproc] Waiting for Commands...
1,586,644 UART: [fwproc] Received command 0x46574c44
1,587,435 UART: [fwproc] Received Image of size 119428 bytes
2,942,265 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,597 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,815 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,386 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,657 ready_for_fw is high
1,362,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,430 >>> mbox cmd response: success
3,054,777 UART:
3,054,793 UART: Running Caliptra FMC ...
3,055,201 UART:
3,055,255 UART: [state] CFI Enabled
3,065,825 UART: [fht] FMC Alias Private Key: 7
3,184,761 UART: [art] Extend RT PCRs Done
3,185,189 UART: [art] Lock RT PCRs Done
3,186,641 UART: [art] Populate DV Done
3,194,608 UART: [fht] FMC Alias Private Key: 7
3,195,756 UART: [art] Derive CDI
3,196,036 UART: [art] Store in slot 0x4
3,281,876 UART: [art] Derive Key Pair
3,282,236 UART: [art] Store priv key in slot 0x5
3,295,741 UART: [art] Derive Key Pair - Done
3,310,986 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,807 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,572 UART: [art] PUB.X = 7024406ED719574C764536D131A1965B83A0B2F1102C403831BF2C89DF8D0E0AB6184CC75CBE22718302B8A011BC88C7
3,334,329 UART: [art] PUB.Y = 8DF78FA9A74A5210347E53BBE7316FDB05A7A3B898E328FE87ADA8B9E1954510437AF0385690EE1E456D641D83466AD1
3,341,280 UART: [art] SIG.R = D4719FA455A6B88894409775FF4227999EC2723CC6257B8CF5CA6EE0D7358DEB387387A0190AEEC6DC752A2279284267
3,348,045 UART: [art] SIG.S = 781E7BBACA365C2F857DBB5539A252417222F6376D6FF9253F3ECD592B46DCB4AF3DE3EAD7DA4352FBCFB4FB855DAB56
3,371,739 UART: Caliptra RT
3,371,990 UART: [state] CFI Enabled
3,492,412 UART: [rt] RT listening for mailbox commands...
3,493,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,854 UART: [rt]cmd =0x46504c54, len=4
3,524,174 >>> mbox cmd response data (8 bytes)
3,524,441 UART: [rt] FIPS self test
3,524,769 UART: [kat] ++
3,524,921 UART: [kat] sha1
3,529,141 UART: [kat] SHA2-256
3,531,163 UART: [kat] SHA2-384
3,534,090 UART: [kat] SHA2-512-ACC
3,535,573 UART: Droping operation
3,536,200 UART: Fatal Error: 0x90050003
3,537,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,537,744 >>> mbox cmd response: failed
3,537,744 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,537,749 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,765 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,848 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,389 UART: [state] LifecycleState = Unprovisioned
86,044 UART: [state] DebugLocked = No
86,630 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,180 UART: [kat] SHA2-256
882,111 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,226 UART: [kat] ++
886,378 UART: [kat] sha1
890,648 UART: [kat] SHA2-256
892,586 UART: [kat] SHA2-384
895,147 UART: [kat] SHA2-512-ACC
897,048 UART: [kat] ECC-384
902,817 UART: [kat] HMAC-384Kdf
907,479 UART: [kat] LMS
1,475,675 UART: [kat] --
1,476,642 UART: [cold-reset] ++
1,477,022 UART: [fht] Storing FHT @ 0x50003400
1,479,741 UART: [idev] ++
1,479,909 UART: [idev] CDI.KEYID = 6
1,480,269 UART: [idev] SUBJECT.KEYID = 7
1,480,693 UART: [idev] UDS.KEYID = 0
1,481,038 ready_for_fw is high
1,481,038 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,721 UART: [idev] Erasing UDS.KEYID = 0
1,505,531 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,189 UART: [idev] --
1,515,272 UART: [ldev] ++
1,515,440 UART: [ldev] CDI.KEYID = 6
1,515,803 UART: [ldev] SUBJECT.KEYID = 5
1,516,229 UART: [ldev] AUTHORITY.KEYID = 7
1,516,692 UART: [ldev] FE.KEYID = 1
1,522,028 UART: [ldev] Erasing FE.KEYID = 1
1,548,087 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,552 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,268 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,159 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,871 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,991 UART: [ldev] --
1,587,284 UART: [fwproc] Waiting for Commands...
1,587,969 UART: [fwproc] Received command 0x46574c44
1,588,760 UART: [fwproc] Received Image of size 119428 bytes
2,944,444 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,716 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,934 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,547 >>> mbox cmd response: success
3,145,639 UART: [afmc] ++
3,145,807 UART: [afmc] CDI.KEYID = 6
3,146,169 UART: [afmc] SUBJECT.KEYID = 7
3,146,594 UART: [afmc] AUTHORITY.KEYID = 5
3,182,077 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,425 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,199,205 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,914 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,797 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,480 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,224,532 UART: [afmc] --
3,225,628 UART: [cold-reset] --
3,226,586 UART: [state] Locking Datavault
3,227,853 UART: [state] Locking PCR0, PCR1 and PCR31
3,228,457 UART: [state] Locking ICCM
3,228,973 UART: [exit] Launching FMC @ 0x40000130
3,234,303 UART:
3,234,319 UART: Running Caliptra FMC ...
3,234,727 UART:
3,234,870 UART: [state] CFI Enabled
3,245,518 UART: [fht] FMC Alias Private Key: 7
3,364,212 UART: [art] Extend RT PCRs Done
3,364,640 UART: [art] Lock RT PCRs Done
3,366,226 UART: [art] Populate DV Done
3,374,429 UART: [fht] FMC Alias Private Key: 7
3,375,507 UART: [art] Derive CDI
3,375,787 UART: [art] Store in slot 0x4
3,461,809 UART: [art] Derive Key Pair
3,462,169 UART: [art] Store priv key in slot 0x5
3,475,626 UART: [art] Derive Key Pair - Done
3,490,733 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,506,034 UART: [art] Erasing AUTHORITY.KEYID = 7
3,506,799 UART: [art] PUB.X = 9C43B1ABDDCA51173CDDCEEB3F78B0C38A82457F5A7B3A9076ACAE505C8F31DBE7D95A628D1F80D88C3D56CD49BD51CF
3,513,597 UART: [art] PUB.Y = C7C5548E09F92D1ED1AB262E71AA691464C6432BAD0BC598E722816093927793792132AEAB5878ED34871CE3C7147CC1
3,520,539 UART: [art] SIG.R = 40B5000E14806FFD7EA4DF48C084DF122B82D66EA723FDD690035FF6086EFA0BCA73B2C0033FA811AD0A0E50377D122B
3,527,278 UART: [art] SIG.S = AE9B5600832DEE7178FFD921F47F195DE15E0209D64B7BC8EFE394FC23C04B452E57B25A2011BA7C1DE28E1971293340
3,550,574 UART: Caliptra RT
3,550,917 UART: [state] CFI Enabled
3,671,569 UART: [rt] RT listening for mailbox commands...
3,672,232 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,702,269 UART: [rt]cmd =0x46504c54, len=4
3,703,269 >>> mbox cmd response data (8 bytes)
3,703,428 UART: [rt] FIPS self test
3,703,756 UART: [kat] ++
3,703,908 UART: [kat] sha1
3,708,116 UART: [kat] SHA2-256
3,710,138 UART: [kat] SHA2-384
3,713,025 UART: [kat] SHA2-512-ACC
3,714,508 UART: Droping operation
3,714,895 UART: Fatal Error: 0x90050003
3,716,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,439 >>> mbox cmd response: failed
3,716,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,716,444 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,249 UART: [state] LifecycleState = Unprovisioned
85,904 UART: [state] DebugLocked = No
86,634 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,264 UART: [kat] SHA2-256
882,195 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,310 UART: [kat] ++
886,462 UART: [kat] sha1
890,550 UART: [kat] SHA2-256
892,488 UART: [kat] SHA2-384
895,223 UART: [kat] SHA2-512-ACC
897,124 UART: [kat] ECC-384
903,005 UART: [kat] HMAC-384Kdf
907,431 UART: [kat] LMS
1,475,627 UART: [kat] --
1,476,600 UART: [cold-reset] ++
1,476,998 UART: [fht] Storing FHT @ 0x50003400
1,479,747 UART: [idev] ++
1,479,915 UART: [idev] CDI.KEYID = 6
1,480,275 UART: [idev] SUBJECT.KEYID = 7
1,480,699 UART: [idev] UDS.KEYID = 0
1,481,044 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,605 UART: [idev] Erasing UDS.KEYID = 0
1,505,487 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,125 UART: [idev] --
1,515,128 UART: [ldev] ++
1,515,296 UART: [ldev] CDI.KEYID = 6
1,515,659 UART: [ldev] SUBJECT.KEYID = 5
1,516,085 UART: [ldev] AUTHORITY.KEYID = 7
1,516,548 UART: [ldev] FE.KEYID = 1
1,521,968 UART: [ldev] Erasing FE.KEYID = 1
1,547,027 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,151 UART: [ldev] --
1,586,512 UART: [fwproc] Waiting for Commands...
1,587,289 UART: [fwproc] Received command 0x46574c44
1,588,080 UART: [fwproc] Received Image of size 119428 bytes
2,942,508 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,404 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,622 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,191 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,110 ready_for_fw is high
1,362,110 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,607 >>> mbox cmd response: success
3,054,646 UART:
3,054,662 UART: Running Caliptra FMC ...
3,055,070 UART:
3,055,213 UART: [state] CFI Enabled
3,065,731 UART: [fht] FMC Alias Private Key: 7
3,184,641 UART: [art] Extend RT PCRs Done
3,185,069 UART: [art] Lock RT PCRs Done
3,186,531 UART: [art] Populate DV Done
3,194,562 UART: [fht] FMC Alias Private Key: 7
3,195,492 UART: [art] Derive CDI
3,195,772 UART: [art] Store in slot 0x4
3,281,166 UART: [art] Derive Key Pair
3,281,526 UART: [art] Store priv key in slot 0x5
3,295,349 UART: [art] Derive Key Pair - Done
3,310,182 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,556 UART: [art] PUB.X = D6B8FEFF9618F86256A380E2B4EF6F6654F645BC11D205134A794E14E036B7B261D9E7958489406A705A47279FC56CED
3,333,323 UART: [art] PUB.Y = 9CAC915A107C063B21F591CD13036208591C4F1F585F08FAC6CEEBF453E3177007731442147FD86333A449341DD0E10A
3,340,251 UART: [art] SIG.R = 4AF7C04F9E95D81306FC7A427605BA30C175D8B6C8A2060EFF160A2E6976554836B45720220954DF25F7A42D4DA52739
3,346,999 UART: [art] SIG.S = F2DF46EB1D6D7C26CF83E07849F0B69523975715B1ED32688DF7B5A91E6047E168BEA09A1B738A2CF0A20B6E0CA4C5F4
3,370,653 UART: Caliptra RT
3,370,996 UART: [state] CFI Enabled
3,491,506 UART: [rt] RT listening for mailbox commands...
3,492,169 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,930 UART: [rt]cmd =0x46504c54, len=4
3,523,138 >>> mbox cmd response data (8 bytes)
3,523,387 UART: [rt] FIPS self test
3,523,715 UART: [kat] ++
3,523,867 UART: [kat] sha1
3,528,189 UART: [kat] SHA2-256
3,530,211 UART: [kat] SHA2-384
3,533,106 UART: [kat] SHA2-512-ACC
3,534,589 UART: Droping operation
3,535,016 UART: Fatal Error: 0x90050003
3,536,555 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,560 >>> mbox cmd response: failed
3,536,560 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,565 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,410 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,723 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,268 UART: [state] LifecycleState = Unprovisioned
85,923 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,746 UART: [kat] SHA2-256
891,296 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,400 UART: [kat] ++
895,552 UART: [kat] sha1
899,842 UART: [kat] SHA2-256
901,782 UART: [kat] SHA2-384
904,523 UART: [kat] SHA2-512-ACC
906,424 UART: [kat] ECC-384
916,171 UART: [kat] HMAC-384Kdf
920,665 UART: [kat] LMS
1,168,977 UART: [kat] --
1,169,806 UART: [cold-reset] ++
1,170,294 UART: [fht] FHT @ 0x50003400
1,173,020 UART: [idev] ++
1,173,188 UART: [idev] CDI.KEYID = 6
1,173,549 UART: [idev] SUBJECT.KEYID = 7
1,173,974 UART: [idev] UDS.KEYID = 0
1,174,320 ready_for_fw is high
1,174,320 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,875 UART: [idev] Erasing UDS.KEYID = 0
1,199,225 UART: [idev] Sha1 KeyId Algorithm
1,207,953 UART: [idev] --
1,208,922 UART: [ldev] ++
1,209,090 UART: [ldev] CDI.KEYID = 6
1,209,454 UART: [ldev] SUBJECT.KEYID = 5
1,209,881 UART: [ldev] AUTHORITY.KEYID = 7
1,210,344 UART: [ldev] FE.KEYID = 1
1,215,288 UART: [ldev] Erasing FE.KEYID = 1
1,241,695 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,125 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,841 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,730 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,442 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,346 UART: [ldev] --
1,280,613 UART: [fwproc] Wait for Commands...
1,281,336 UART: [fwproc] Recv command 0x46574c44
1,282,069 UART: [fwproc] Recv'd Img size: 119428 bytes
2,635,648 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,693,742 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,459 >>> mbox cmd response: success
2,836,707 UART: [afmc] ++
2,836,875 UART: [afmc] CDI.KEYID = 6
2,837,238 UART: [afmc] SUBJECT.KEYID = 7
2,837,664 UART: [afmc] AUTHORITY.KEYID = 5
2,873,103 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,889,802 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,890,551 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,896,261 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,142 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,907,843 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,915,430 UART: [afmc] --
2,916,333 UART: [cold-reset] --
2,917,163 UART: [state] Locking Datavault
2,918,554 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,158 UART: [state] Locking ICCM
2,919,778 UART: [exit] Launching FMC @ 0x40000130
2,925,108 UART:
2,925,124 UART: Running Caliptra FMC ...
2,925,532 UART:
2,925,586 UART: [state] CFI Enabled
2,935,776 UART: [fht] FMC Alias Private Key: 7
3,054,062 UART: [art] Extend RT PCRs Done
3,054,490 UART: [art] Lock RT PCRs Done
3,055,956 UART: [art] Populate DV Done
3,064,123 UART: [fht] FMC Alias Private Key: 7
3,065,069 UART: [art] Derive CDI
3,065,349 UART: [art] Store in slot 0x4
3,150,894 UART: [art] Derive Key Pair
3,151,254 UART: [art] Store priv key in slot 0x5
3,165,434 UART: [art] Derive Key Pair - Done
3,180,371 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,824 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,589 UART: [art] PUB.X = 4D565B55C83E90B59E0F44B8FED40A4BBE8BE56CF687A8542CDBF167B6EEF978B07E66FFDAD53D91E3456C9E19E1A1BC
3,203,377 UART: [art] PUB.Y = 03039C1FDA2F1E8E9EC0C7F3793907EC13FD0C0DF34165055E385325B755F7266BA723BB3450B707C0258B8CC73C5058
3,210,306 UART: [art] SIG.R = A1A1BF588EDC2E9AF497D0F2873A66F315BD03D80E72B00B1B19B1569839A761A7D1A65FC5FF79E8BC53F5A79E75709A
3,217,079 UART: [art] SIG.S = BBC4405CCCFE95C66FBE5B3F0FE40ABBC6509C687EF59A3287D56208E1F25E0AD4CD221B3D669D18B7B8940084169C02
3,240,724 UART: Caliptra RT
3,240,975 UART: [state] CFI Enabled
3,360,543 UART: [rt] RT listening for mailbox commands...
3,361,206 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,391,205 UART: [rt]cmd =0x46504c54, len=4
3,392,323 >>> mbox cmd response data (8 bytes)
3,392,594 UART: [rt] FIPS self test
3,392,922 UART: [kat] ++
3,393,074 UART: [kat] sha1
3,397,410 UART: [kat] SHA2-256
3,399,432 UART: [kat] SHA2-384
3,402,279 UART: [kat] SHA2-512-ACC
3,403,762 UART: Droping operation
3,404,371 UART: Fatal Error: 0x90050003
3,405,910 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,915 >>> mbox cmd response: failed
3,405,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,920 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,183 UART: [state] WD Timer not started. Device not locked for debugging
87,518 UART: [kat] SHA2-256
891,068 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,172 UART: [kat] ++
895,324 UART: [kat] sha1
899,594 UART: [kat] SHA2-256
901,534 UART: [kat] SHA2-384
904,247 UART: [kat] SHA2-512-ACC
906,148 UART: [kat] ECC-384
915,961 UART: [kat] HMAC-384Kdf
920,537 UART: [kat] LMS
1,168,849 UART: [kat] --
1,169,830 UART: [cold-reset] ++
1,170,270 UART: [fht] FHT @ 0x50003400
1,173,022 UART: [idev] ++
1,173,190 UART: [idev] CDI.KEYID = 6
1,173,551 UART: [idev] SUBJECT.KEYID = 7
1,173,976 UART: [idev] UDS.KEYID = 0
1,174,322 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,277 UART: [idev] Erasing UDS.KEYID = 0
1,198,839 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,754 UART: [ldev] ++
1,208,922 UART: [ldev] CDI.KEYID = 6
1,209,286 UART: [ldev] SUBJECT.KEYID = 5
1,209,713 UART: [ldev] AUTHORITY.KEYID = 7
1,210,176 UART: [ldev] FE.KEYID = 1
1,215,442 UART: [ldev] Erasing FE.KEYID = 1
1,241,971 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,595 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,311 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,200 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,912 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,136 UART: [ldev] --
1,281,367 UART: [fwproc] Wait for Commands...
1,282,028 UART: [fwproc] Recv command 0x46574c44
1,282,761 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,310 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,564 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,091 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,370 ready_for_fw is high
1,058,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,068 >>> mbox cmd response: success
2,750,927 UART:
2,750,943 UART: Running Caliptra FMC ...
2,751,351 UART:
2,751,405 UART: [state] CFI Enabled
2,762,117 UART: [fht] FMC Alias Private Key: 7
2,881,535 UART: [art] Extend RT PCRs Done
2,881,963 UART: [art] Lock RT PCRs Done
2,883,913 UART: [art] Populate DV Done
2,892,258 UART: [fht] FMC Alias Private Key: 7
2,893,388 UART: [art] Derive CDI
2,893,668 UART: [art] Store in slot 0x4
2,979,175 UART: [art] Derive Key Pair
2,979,535 UART: [art] Store priv key in slot 0x5
2,992,535 UART: [art] Derive Key Pair - Done
3,007,162 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,439 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,204 UART: [art] PUB.X = 7CDDEC0463AB1C659D97ED2C4ACD33355E616E847F9048BB4BE3B004E4180F5B92DE53226F6C76417598739746D0E223
3,029,967 UART: [art] PUB.Y = 968D1EE6EAD2AA7BB6E45A8E47FE4143E2A630F0E564BA056F6E52E0A2BE561E9F24F9FB6A9B9D105A20CCF20C6C52E1
3,036,933 UART: [art] SIG.R = 7533DE0B1F4943ADFB742EC2D7961C7D07A3DCFA10B13879D4ECD94D4B181E779631B737DF05B7A1CC2B0A9F55D7CB57
3,043,707 UART: [art] SIG.S = 146286557B7BC80B9908E9E71673649C8E797C7899F9A64B40A8642214A9A83DD10304A2F8CB1CD4F9F65AE04A1C23CC
3,067,043 UART: Caliptra RT
3,067,294 UART: [state] CFI Enabled
3,187,168 UART: [rt] RT listening for mailbox commands...
3,187,831 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,217,534 UART: [rt]cmd =0x46504c54, len=4
3,218,696 >>> mbox cmd response data (8 bytes)
3,218,823 UART: [rt] FIPS self test
3,219,151 UART: [kat] ++
3,219,303 UART: [kat] sha1
3,223,353 UART: [kat] SHA2-256
3,225,375 UART: [kat] SHA2-384
3,228,202 UART: [kat] SHA2-512-ACC
3,229,685 UART: Droping operation
3,230,140 UART: Fatal Error: 0x90050003
3,231,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,684 >>> mbox cmd response: failed
3,231,684 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,689 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,614 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.03s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,965 UART: [state] LifecycleState = Unprovisioned
85,620 UART: [state] DebugLocked = No
86,226 UART: [state] WD Timer not started. Device not locked for debugging
87,521 UART: [kat] SHA2-256
891,071 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,175 UART: [kat] ++
895,327 UART: [kat] sha1
899,675 UART: [kat] SHA2-256
901,615 UART: [kat] SHA2-384
904,380 UART: [kat] SHA2-512-ACC
906,281 UART: [kat] ECC-384
915,842 UART: [kat] HMAC-384Kdf
920,586 UART: [kat] LMS
1,168,898 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,511 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,174,519 ready_for_fw is high
1,174,519 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,176 UART: [idev] Erasing UDS.KEYID = 0
1,199,388 UART: [idev] Sha1 KeyId Algorithm
1,208,466 UART: [idev] --
1,209,597 UART: [ldev] ++
1,209,765 UART: [ldev] CDI.KEYID = 6
1,210,129 UART: [ldev] SUBJECT.KEYID = 5
1,210,556 UART: [ldev] AUTHORITY.KEYID = 7
1,211,019 UART: [ldev] FE.KEYID = 1
1,216,377 UART: [ldev] Erasing FE.KEYID = 1
1,243,276 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,986 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,702 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,591 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,303 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,371 UART: [ldev] --
1,282,798 UART: [fwproc] Wait for Commands...
1,283,511 UART: [fwproc] Recv command 0x46574c44
1,284,244 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,515 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,434 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,609 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,100 >>> mbox cmd response: success
2,840,350 UART: [afmc] ++
2,840,518 UART: [afmc] CDI.KEYID = 6
2,840,881 UART: [afmc] SUBJECT.KEYID = 7
2,841,307 UART: [afmc] AUTHORITY.KEYID = 5
2,877,762 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,894,357 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,895,106 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,816 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,697 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,912,398 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,920,325 UART: [afmc] --
2,921,296 UART: [cold-reset] --
2,922,196 UART: [state] Locking Datavault
2,923,423 UART: [state] Locking PCR0, PCR1 and PCR31
2,924,027 UART: [state] Locking ICCM
2,924,453 UART: [exit] Launching FMC @ 0x40000130
2,929,783 UART:
2,929,799 UART: Running Caliptra FMC ...
2,930,207 UART:
2,930,350 UART: [state] CFI Enabled
2,941,286 UART: [fht] FMC Alias Private Key: 7
3,060,428 UART: [art] Extend RT PCRs Done
3,060,856 UART: [art] Lock RT PCRs Done
3,062,322 UART: [art] Populate DV Done
3,070,489 UART: [fht] FMC Alias Private Key: 7
3,071,441 UART: [art] Derive CDI
3,071,721 UART: [art] Store in slot 0x4
3,157,714 UART: [art] Derive Key Pair
3,158,074 UART: [art] Store priv key in slot 0x5
3,171,872 UART: [art] Derive Key Pair - Done
3,186,486 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,809 UART: [art] Erasing AUTHORITY.KEYID = 7
3,202,574 UART: [art] PUB.X = 636F41D96D04D5664ED8B62A5AD77BD291DC7E5EAAE79EFE9676CC7063792662151DCB6DD37F4FD2F12A26259154888C
3,209,349 UART: [art] PUB.Y = 4FBA01897431C5C4A9F33D965427E4032012598923031DD0F6DAE079A272240675EF5281E637A4FA4DF3C31D9171E192
3,216,279 UART: [art] SIG.R = 96EA8B5C7561B7447C1DCFCD45E0C85DF4E4235B13AD5BD961EAE28AF27302875D20AF7A018DC59095BE8D5BC86984F8
3,223,057 UART: [art] SIG.S = 0BF9B0A5AB26D7843203CDF9DF00B836A967DA0A74C0F34CA3D179C73C03907F4EF78EB5766BA6C97B76A4A45D31C530
3,246,969 UART: Caliptra RT
3,247,312 UART: [state] CFI Enabled
3,367,055 UART: [rt] RT listening for mailbox commands...
3,367,718 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,573 UART: [rt]cmd =0x46504c54, len=4
3,398,877 >>> mbox cmd response data (8 bytes)
3,399,100 UART: [rt] FIPS self test
3,399,428 UART: [kat] ++
3,399,580 UART: [kat] sha1
3,403,932 UART: [kat] SHA2-256
3,405,954 UART: [kat] SHA2-384
3,408,717 UART: [kat] SHA2-512-ACC
3,410,200 UART: Droping operation
3,410,833 UART: Fatal Error: 0x90050003
3,412,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,377 >>> mbox cmd response: failed
3,412,377 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,412,382 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,719 UART: [state] LifecycleState = Unprovisioned
86,374 UART: [state] DebugLocked = No
86,938 UART: [state] WD Timer not started. Device not locked for debugging
88,093 UART: [kat] SHA2-256
891,643 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,747 UART: [kat] ++
895,899 UART: [kat] sha1
900,275 UART: [kat] SHA2-256
902,215 UART: [kat] SHA2-384
904,986 UART: [kat] SHA2-512-ACC
906,887 UART: [kat] ECC-384
916,810 UART: [kat] HMAC-384Kdf
921,552 UART: [kat] LMS
1,169,864 UART: [kat] --
1,170,693 UART: [cold-reset] ++
1,171,261 UART: [fht] FHT @ 0x50003400
1,173,833 UART: [idev] ++
1,174,001 UART: [idev] CDI.KEYID = 6
1,174,362 UART: [idev] SUBJECT.KEYID = 7
1,174,787 UART: [idev] UDS.KEYID = 0
1,175,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,330 UART: [idev] Erasing UDS.KEYID = 0
1,200,888 UART: [idev] Sha1 KeyId Algorithm
1,209,598 UART: [idev] --
1,210,715 UART: [ldev] ++
1,210,883 UART: [ldev] CDI.KEYID = 6
1,211,247 UART: [ldev] SUBJECT.KEYID = 5
1,211,674 UART: [ldev] AUTHORITY.KEYID = 7
1,212,137 UART: [ldev] FE.KEYID = 1
1,217,429 UART: [ldev] Erasing FE.KEYID = 1
1,243,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,830 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,546 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,435 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,147 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,121 UART: [ldev] --
1,282,392 UART: [fwproc] Wait for Commands...
1,283,007 UART: [fwproc] Recv command 0x46574c44
1,283,740 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,839 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,736 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,911 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,414 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,789 ready_for_fw is high
1,059,789 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,775 >>> mbox cmd response: success
2,752,288 UART:
2,752,304 UART: Running Caliptra FMC ...
2,752,712 UART:
2,752,855 UART: [state] CFI Enabled
2,763,671 UART: [fht] FMC Alias Private Key: 7
2,883,055 UART: [art] Extend RT PCRs Done
2,883,483 UART: [art] Lock RT PCRs Done
2,884,963 UART: [art] Populate DV Done
2,893,280 UART: [fht] FMC Alias Private Key: 7
2,894,318 UART: [art] Derive CDI
2,894,598 UART: [art] Store in slot 0x4
2,980,099 UART: [art] Derive Key Pair
2,980,459 UART: [art] Store priv key in slot 0x5
2,994,131 UART: [art] Derive Key Pair - Done
3,009,263 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,932 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,697 UART: [art] PUB.X = 975B76C8569FE1C85212E900EF42AB5E480F4ED3E5EBD09C90360D58180E3958D232D49CA2E44A44AAD570A1BAC7D3BB
3,032,448 UART: [art] PUB.Y = 7C84EBC53ADB401F2243C6365EE9D21D19C8B2ACAC9E3FEA47F9284CFED6994E0727454E22AE0F64CCD4440414BEDF0B
3,039,406 UART: [art] SIG.R = 13A5A166089CACEEB465D8DDB0E4F6790209C743CB02889A2EF20765B954CA1A21BAF61FC99402296C7459EAE7B8F6CE
3,046,170 UART: [art] SIG.S = 8178BDCBD3E334B2CB3B27BCD49762127ED70269F4B4981647DFA1C752137815D60BAD4B0C266059529A735AD96783D3
3,069,421 UART: Caliptra RT
3,069,764 UART: [state] CFI Enabled
3,190,265 UART: [rt] RT listening for mailbox commands...
3,190,928 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,503 UART: [rt]cmd =0x46504c54, len=4
3,221,547 >>> mbox cmd response data (8 bytes)
3,221,834 UART: [rt] FIPS self test
3,222,162 UART: [kat] ++
3,222,314 UART: [kat] sha1
3,226,402 UART: [kat] SHA2-256
3,228,424 UART: [kat] SHA2-384
3,231,117 UART: [kat] SHA2-512-ACC
3,232,600 UART: Droping operation
3,233,109 UART: Fatal Error: 0x90050003
3,234,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,653 >>> mbox cmd response: failed
3,234,653 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,234,658 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,717 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,593 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,088 UART: [state] LifecycleState = Unprovisioned
85,743 UART: [state] DebugLocked = No
86,477 UART: [state] WD Timer not started. Device not locked for debugging
87,782 UART: [kat] SHA2-256
893,432 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,557 UART: [kat] ++
897,709 UART: [kat] sha1
901,847 UART: [kat] SHA2-256
903,787 UART: [kat] SHA2-384
906,622 UART: [kat] SHA2-512-ACC
908,523 UART: [kat] ECC-384
918,110 UART: [kat] HMAC-384Kdf
922,862 UART: [kat] LMS
1,171,190 UART: [kat] --
1,171,987 UART: [cold-reset] ++
1,172,463 UART: [fht] FHT @ 0x50003400
1,175,144 UART: [idev] ++
1,175,312 UART: [idev] CDI.KEYID = 6
1,175,672 UART: [idev] SUBJECT.KEYID = 7
1,176,096 UART: [idev] UDS.KEYID = 0
1,176,441 ready_for_fw is high
1,176,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,772 UART: [idev] Erasing UDS.KEYID = 0
1,200,869 UART: [idev] Sha1 KeyId Algorithm
1,209,329 UART: [idev] --
1,210,325 UART: [ldev] ++
1,210,493 UART: [ldev] CDI.KEYID = 6
1,210,856 UART: [ldev] SUBJECT.KEYID = 5
1,211,282 UART: [ldev] AUTHORITY.KEYID = 7
1,211,745 UART: [ldev] FE.KEYID = 1
1,216,781 UART: [ldev] Erasing FE.KEYID = 1
1,242,776 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,492 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,204 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,331 UART: [ldev] --
1,281,806 UART: [fwproc] Wait for Commands...
1,282,564 UART: [fwproc] Recv command 0x46574c44
1,283,292 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,405 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,374 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,981 >>> mbox cmd response: success
2,840,035 UART: [afmc] ++
2,840,203 UART: [afmc] CDI.KEYID = 6
2,840,565 UART: [afmc] SUBJECT.KEYID = 7
2,840,990 UART: [afmc] AUTHORITY.KEYID = 5
2,876,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,810 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,558 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,150 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,851 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,625 UART: [afmc] --
2,919,687 UART: [cold-reset] --
2,920,573 UART: [state] Locking Datavault
2,921,908 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,512 UART: [state] Locking ICCM
2,923,088 UART: [exit] Launching FMC @ 0x40000130
2,928,418 UART:
2,928,434 UART: Running Caliptra FMC ...
2,928,842 UART:
2,928,896 UART: [state] CFI Enabled
2,939,412 UART: [fht] FMC Alias Private Key: 7
3,058,650 UART: [art] Extend RT PCRs Done
3,059,078 UART: [art] Lock RT PCRs Done
3,060,744 UART: [art] Populate DV Done
3,069,139 UART: [fht] FMC Alias Private Key: 7
3,070,211 UART: [art] Derive CDI
3,070,491 UART: [art] Store in slot 0x4
3,155,834 UART: [art] Derive Key Pair
3,156,194 UART: [art] Store priv key in slot 0x5
3,169,854 UART: [art] Derive Key Pair - Done
3,184,799 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,456 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,221 UART: [art] PUB.X = 846F1CDEEAEE835D8FD8DF42904E44222D53FC7BBB902FDAC46150E491AD90B73E94FF74506BFABAD05DEFCBEDA49A3B
3,208,023 UART: [art] PUB.Y = 6671256747FFE17F9C256204AC4083D9262635A051DCE3A2207D5E715828460056AC4E58FA7E7510A6476BFB12695997
3,214,936 UART: [art] SIG.R = BE56394CE2ADA67527A1D90857A0DDAD93E6E13B7FFF8F950DCDA72646C96C97347D1BC8B72AA5BBDD4EF76A4AD42A14
3,221,724 UART: [art] SIG.S = 5486ACE867F69B928A50B6E54CA44A340E69802267DE59F49AB0523BAF88C920AE70D44C72C842F5A8B83A025875244E
3,245,230 UART: Caliptra RT
3,245,481 UART: [state] CFI Enabled
3,365,436 UART: [rt] RT listening for mailbox commands...
3,366,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,166 UART: [rt]cmd =0x46504c54, len=4
3,397,346 >>> mbox cmd response data (8 bytes)
3,397,593 UART: [rt] FIPS self test
3,397,921 UART: [kat] ++
3,398,073 UART: [kat] sha1
3,402,247 UART: [kat] SHA2-256
3,404,269 UART: [kat] SHA2-384
3,407,190 UART: [kat] SHA2-512-ACC
3,408,673 UART: Droping operation
3,409,254 UART: Fatal Error: 0x90050003
3,410,793 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,798 >>> mbox cmd response: failed
3,410,798 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,803 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,054 UART: [state] LifecycleState = Unprovisioned
85,709 UART: [state] DebugLocked = No
86,235 UART: [state] WD Timer not started. Device not locked for debugging
87,380 UART: [kat] SHA2-256
893,030 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,155 UART: [kat] ++
897,307 UART: [kat] sha1
901,651 UART: [kat] SHA2-256
903,591 UART: [kat] SHA2-384
906,356 UART: [kat] SHA2-512-ACC
908,257 UART: [kat] ECC-384
918,190 UART: [kat] HMAC-384Kdf
922,678 UART: [kat] LMS
1,171,006 UART: [kat] --
1,172,145 UART: [cold-reset] ++
1,172,629 UART: [fht] FHT @ 0x50003400
1,175,160 UART: [idev] ++
1,175,328 UART: [idev] CDI.KEYID = 6
1,175,688 UART: [idev] SUBJECT.KEYID = 7
1,176,112 UART: [idev] UDS.KEYID = 0
1,176,457 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,292 UART: [idev] Erasing UDS.KEYID = 0
1,201,369 UART: [idev] Sha1 KeyId Algorithm
1,209,781 UART: [idev] --
1,210,967 UART: [ldev] ++
1,211,135 UART: [ldev] CDI.KEYID = 6
1,211,498 UART: [ldev] SUBJECT.KEYID = 5
1,211,924 UART: [ldev] AUTHORITY.KEYID = 7
1,212,387 UART: [ldev] FE.KEYID = 1
1,217,643 UART: [ldev] Erasing FE.KEYID = 1
1,243,576 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,829 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,545 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,436 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,148 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,233 UART: [ldev] --
1,282,746 UART: [fwproc] Wait for Commands...
1,283,316 UART: [fwproc] Recv command 0x46574c44
1,284,044 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,397 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,290 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,460 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,083 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,991 ready_for_fw is high
1,059,991 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,748 >>> mbox cmd response: success
2,752,409 UART:
2,752,425 UART: Running Caliptra FMC ...
2,752,833 UART:
2,752,887 UART: [state] CFI Enabled
2,763,523 UART: [fht] FMC Alias Private Key: 7
2,882,599 UART: [art] Extend RT PCRs Done
2,883,027 UART: [art] Lock RT PCRs Done
2,884,283 UART: [art] Populate DV Done
2,892,392 UART: [fht] FMC Alias Private Key: 7
2,893,476 UART: [art] Derive CDI
2,893,756 UART: [art] Store in slot 0x4
2,979,907 UART: [art] Derive Key Pair
2,980,267 UART: [art] Store priv key in slot 0x5
2,993,545 UART: [art] Derive Key Pair - Done
3,008,516 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,826 UART: [art] PUB.X = 8EA36A50AD2106E9F1F4497EACFAECF0F5B00317736F7D9460B63B31025E6482C17FC4D72F14113CC031F6F7F77EC73C
3,031,597 UART: [art] PUB.Y = CCAA79A617DB7D658A9D1311FEFA34674CCE70F46321E42ABF7C588B17B07A916A2CDCFE6793809E077F8DB67257FFC2
3,038,560 UART: [art] SIG.R = CF591C135194CE5F0361B67F3DB523AE6BCF1186EE49E84B5FA9006C2B92249BD2C7529CEC7FF7BE1DCDFDC9F7E9F4C9
3,045,329 UART: [art] SIG.S = 41F6A25BB19717E1228644C89F18C70EB61EB432CF2C88DE8D9CAE64FB9635B48DB7852BA150D8A3F6F8486F291315E5
3,069,130 UART: Caliptra RT
3,069,381 UART: [state] CFI Enabled
3,188,368 UART: [rt] RT listening for mailbox commands...
3,189,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,780 UART: [rt]cmd =0x46504c54, len=4
3,220,106 >>> mbox cmd response data (8 bytes)
3,220,305 UART: [rt] FIPS self test
3,220,633 UART: [kat] ++
3,220,785 UART: [kat] sha1
3,224,879 UART: [kat] SHA2-256
3,226,901 UART: [kat] SHA2-384
3,229,688 UART: [kat] SHA2-512-ACC
3,231,171 UART: Droping operation
3,231,724 UART: Fatal Error: 0x90050003
3,233,263 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,268 >>> mbox cmd response: failed
3,233,268 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,273 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,864 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.09s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,935 UART: [state] LifecycleState = Unprovisioned
85,590 UART: [state] DebugLocked = No
86,262 UART: [state] WD Timer not started. Device not locked for debugging
87,467 UART: [kat] SHA2-256
893,117 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,242 UART: [kat] ++
897,394 UART: [kat] sha1
901,592 UART: [kat] SHA2-256
903,532 UART: [kat] SHA2-384
906,301 UART: [kat] SHA2-512-ACC
908,202 UART: [kat] ECC-384
917,709 UART: [kat] HMAC-384Kdf
922,505 UART: [kat] LMS
1,170,833 UART: [kat] --
1,171,610 UART: [cold-reset] ++
1,172,042 UART: [fht] FHT @ 0x50003400
1,174,743 UART: [idev] ++
1,174,911 UART: [idev] CDI.KEYID = 6
1,175,271 UART: [idev] SUBJECT.KEYID = 7
1,175,695 UART: [idev] UDS.KEYID = 0
1,176,040 ready_for_fw is high
1,176,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,105 UART: [idev] Erasing UDS.KEYID = 0
1,200,782 UART: [idev] Sha1 KeyId Algorithm
1,209,038 UART: [idev] --
1,210,272 UART: [ldev] ++
1,210,440 UART: [ldev] CDI.KEYID = 6
1,210,803 UART: [ldev] SUBJECT.KEYID = 5
1,211,229 UART: [ldev] AUTHORITY.KEYID = 7
1,211,692 UART: [ldev] FE.KEYID = 1
1,217,194 UART: [ldev] Erasing FE.KEYID = 1
1,243,583 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,378 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,094 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,985 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,697 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,844 UART: [ldev] --
1,283,207 UART: [fwproc] Wait for Commands...
1,284,011 UART: [fwproc] Recv command 0x46574c44
1,284,739 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,298 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,703 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,873 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,562 >>> mbox cmd response: success
2,840,768 UART: [afmc] ++
2,840,936 UART: [afmc] CDI.KEYID = 6
2,841,298 UART: [afmc] SUBJECT.KEYID = 7
2,841,723 UART: [afmc] AUTHORITY.KEYID = 5
2,877,322 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,851 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,599 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,308 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,191 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,892 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,898 UART: [afmc] --
2,920,912 UART: [cold-reset] --
2,921,504 UART: [state] Locking Datavault
2,922,791 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,395 UART: [state] Locking ICCM
2,923,979 UART: [exit] Launching FMC @ 0x40000130
2,929,309 UART:
2,929,325 UART: Running Caliptra FMC ...
2,929,733 UART:
2,929,876 UART: [state] CFI Enabled
2,940,764 UART: [fht] FMC Alias Private Key: 7
3,059,344 UART: [art] Extend RT PCRs Done
3,059,772 UART: [art] Lock RT PCRs Done
3,061,568 UART: [art] Populate DV Done
3,070,069 UART: [fht] FMC Alias Private Key: 7
3,071,027 UART: [art] Derive CDI
3,071,307 UART: [art] Store in slot 0x4
3,156,950 UART: [art] Derive Key Pair
3,157,310 UART: [art] Store priv key in slot 0x5
3,170,400 UART: [art] Derive Key Pair - Done
3,185,081 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,822 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,587 UART: [art] PUB.X = EE2118BFF117527469F8C7A9BF8241CC5F54FC46051BC8249AB76D1518C97CE47A1E72068E4CAC998457ADCE9C664EEE
3,208,363 UART: [art] PUB.Y = 94B267CE244B6FCC7F16C898691056F9C745ED5753FA30C7EEA3D47D2F2D2CD6E0D99669490AAD99F6698970A1139003
3,215,309 UART: [art] SIG.R = 4AAC9A4F4130C0573D3C303908F1D40B523AC0B09BA11FFBD71D9AB5E9FBF73B5EBCB64C606B58F09E1E6908CC14EEAF
3,222,094 UART: [art] SIG.S = E6E5C5B91414FD1D4EA1E96594DB330F5E069A91005D8BF9AD35F0B7A84944CA36126BD8AB5824F8FEA189DA5D9BE0E2
3,245,782 UART: Caliptra RT
3,246,125 UART: [state] CFI Enabled
3,365,430 UART: [rt] RT listening for mailbox commands...
3,366,093 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,926 UART: [rt]cmd =0x46504c54, len=4
3,396,882 >>> mbox cmd response data (8 bytes)
3,397,221 UART: [rt] FIPS self test
3,397,549 UART: [kat] ++
3,397,701 UART: [kat] sha1
3,401,983 UART: [kat] SHA2-256
3,404,005 UART: [kat] SHA2-384
3,406,792 UART: [kat] SHA2-512-ACC
3,408,275 UART: Droping operation
3,408,896 UART: Fatal Error: 0x90050003
3,410,435 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,440 >>> mbox cmd response: failed
3,410,440 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,445 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,161 UART: [state] LifecycleState = Unprovisioned
85,816 UART: [state] DebugLocked = No
86,380 UART: [state] WD Timer not started. Device not locked for debugging
87,681 UART: [kat] SHA2-256
893,331 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,456 UART: [kat] ++
897,608 UART: [kat] sha1
901,920 UART: [kat] SHA2-256
903,860 UART: [kat] SHA2-384
906,487 UART: [kat] SHA2-512-ACC
908,388 UART: [kat] ECC-384
918,043 UART: [kat] HMAC-384Kdf
922,635 UART: [kat] LMS
1,170,963 UART: [kat] --
1,171,984 UART: [cold-reset] ++
1,172,452 UART: [fht] FHT @ 0x50003400
1,175,059 UART: [idev] ++
1,175,227 UART: [idev] CDI.KEYID = 6
1,175,587 UART: [idev] SUBJECT.KEYID = 7
1,176,011 UART: [idev] UDS.KEYID = 0
1,176,356 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,079 UART: [idev] Erasing UDS.KEYID = 0
1,201,498 UART: [idev] Sha1 KeyId Algorithm
1,210,022 UART: [idev] --
1,211,178 UART: [ldev] ++
1,211,346 UART: [ldev] CDI.KEYID = 6
1,211,709 UART: [ldev] SUBJECT.KEYID = 5
1,212,135 UART: [ldev] AUTHORITY.KEYID = 7
1,212,598 UART: [ldev] FE.KEYID = 1
1,217,640 UART: [ldev] Erasing FE.KEYID = 1
1,244,457 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,336 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,052 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,730 UART: [ldev] --
1,284,159 UART: [fwproc] Wait for Commands...
1,284,799 UART: [fwproc] Recv command 0x46574c44
1,285,527 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,644 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,469 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,639 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,198 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,786 ready_for_fw is high
1,059,786 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,525 >>> mbox cmd response: success
2,752,048 UART:
2,752,064 UART: Running Caliptra FMC ...
2,752,472 UART:
2,752,615 UART: [state] CFI Enabled
2,763,403 UART: [fht] FMC Alias Private Key: 7
2,882,487 UART: [art] Extend RT PCRs Done
2,882,915 UART: [art] Lock RT PCRs Done
2,884,329 UART: [art] Populate DV Done
2,892,674 UART: [fht] FMC Alias Private Key: 7
2,893,784 UART: [art] Derive CDI
2,894,064 UART: [art] Store in slot 0x4
2,980,003 UART: [art] Derive Key Pair
2,980,363 UART: [art] Store priv key in slot 0x5
2,992,837 UART: [art] Derive Key Pair - Done
3,007,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,294 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,059 UART: [art] PUB.X = C6BD81CF907C8E093D500F9FD5712E42DF67FCF7D54130A7634B2B5746F430A7C1BBBA72003B21C7976A7A5D5CC09E5F
3,030,813 UART: [art] PUB.Y = 42EDC2FE209C67FC1A64224D9C36EA3725C2C75F0A2D31A775878C0F2E82906A80D80230E7CAFB30B8330C3B306C96BC
3,037,759 UART: [art] SIG.R = D35686CED953C75E5E6D591655777B1154083EE1E25F635E801B4EA0EFEBA05D1AAE197A6F453FE48F950827BA0F3C04
3,044,525 UART: [art] SIG.S = 928D14E7C7D465F8A67B02891DC0FF2951EDFF5F97ABDF4925F87AB0CED73D271EC6AF1192F86D622FEAD25EFDF447C8
3,068,282 UART: Caliptra RT
3,068,625 UART: [state] CFI Enabled
3,188,765 UART: [rt] RT listening for mailbox commands...
3,189,428 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,297 UART: [rt]cmd =0x46504c54, len=4
3,220,389 >>> mbox cmd response data (8 bytes)
3,220,614 UART: [rt] FIPS self test
3,220,942 UART: [kat] ++
3,221,094 UART: [kat] sha1
3,225,314 UART: [kat] SHA2-256
3,227,336 UART: [kat] SHA2-384
3,230,119 UART: [kat] SHA2-512-ACC
3,231,602 UART: Droping operation
3,232,063 UART: Fatal Error: 0x90050003
3,233,602 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,607 >>> mbox cmd response: failed
3,233,607 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,612 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,300 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,587 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.11s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,088 writing to cptra_bootfsm_go
2,702,117 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,851,881 >>> mbox cmd response: failed
2,852,446 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,001,275 >>> mbox cmd response: failed
Initializing fuses
975 writing to cptra_bootfsm_go
3,428,140 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,261,017 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,049 writing to cptra_bootfsm_go
2,707,202 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,857,128 >>> mbox cmd response: failed
2,857,707 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,007,266 >>> mbox cmd response: failed
Initializing fuses
969 writing to cptra_bootfsm_go
3,447,451 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,272,136 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,484 writing to cptra_bootfsm_go
3,056,789 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,208,266 >>> mbox cmd response: failed
3,208,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,357,725 >>> mbox cmd response: failed
Initializing fuses
980 writing to cptra_bootfsm_go
20,178,613 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,895,937 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,303 writing to cptra_bootfsm_go
3,056,259 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,033 >>> mbox cmd response: failed
3,206,627 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,500 >>> mbox cmd response: failed
Initializing fuses
965 writing to cptra_bootfsm_go
20,174,374 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,879,258 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,921 writing to cptra_bootfsm_go
2,697,135 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,155 >>> mbox cmd response: failed
2,847,728 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,644 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,431,631 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,260,936 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,385 writing to cptra_bootfsm_go
2,697,528 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,234 >>> mbox cmd response: failed
2,847,794 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,663 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
3,434,501 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,259,167 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,282 writing to cptra_bootfsm_go
3,055,984 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,205,590 >>> mbox cmd response: failed
3,206,152 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,051 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,170,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,881,439 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
3,066,671 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,216,578 >>> mbox cmd response: failed
3,217,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,366,682 >>> mbox cmd response: failed
Initializing fuses
976 writing to cptra_bootfsm_go
20,165,409 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,874,189 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,098 >>> mbox cmd response: failed
815,098 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,104 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,493 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,710 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,974 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,982 >>> mbox cmd response: failed
814,982 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,969 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,288 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,875 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,883 >>> mbox cmd response: failed
815,883 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,164 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,349 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,993 >>> mbox cmd response: failed
815,993 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,999 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,124 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,497 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,158 >>> mbox cmd response: failed
815,158 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,679 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,628 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.22s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,856 >>> mbox cmd response: failed
814,856 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,862 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,441 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,898 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,341 >>> mbox cmd response: failed
815,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,514 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,739 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,103 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,111 >>> mbox cmd response: failed
815,111 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,117 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,036 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,513 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,087 writing to cptra_bootfsm_go
192,303 UART:
192,675 UART: Running Caliptra ROM ...
193,863 UART:
194,024 UART: [state] CFI Enabled
262,149 UART: [state] LifecycleState = Unprovisioned
264,062 UART: [state] DebugLocked = No
266,321 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,401 UART: [kat] SHA2-256
441,105 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
451,551 UART: [kat] ++
452,158 UART: [kat] sha1
462,359 UART: [kat] SHA2-256
465,015 UART: [kat] SHA2-384
472,036 UART: [kat] SHA2-512-ACC
474,380 UART: [kat] ECC-384
2,766,721 UART: [kat] HMAC-384Kdf
2,777,972 UART: [kat] LMS
3,968,223 UART: [kat] --
3,973,648 UART: [cold-reset] ++
3,975,585 UART: [fht] Storing FHT @ 0x50003400
3,987,365 UART: [idev] ++
3,987,977 UART: [idev] CDI.KEYID = 6
3,988,869 UART: [idev] SUBJECT.KEYID = 7
3,989,889 UART: [idev] UDS.KEYID = 0
3,990,991 ready_for_fw is high
3,991,210 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,141,234 UART: [idev] Erasing UDS.KEYID = 0
7,325,418 UART: [idev] Using Sha1 for KeyId Algorithm
7,347,752 UART: [idev] --
7,350,920 UART: [ldev] ++
7,351,504 UART: [ldev] CDI.KEYID = 6
7,352,392 UART: [ldev] SUBJECT.KEYID = 5
7,353,667 UART: [ldev] AUTHORITY.KEYID = 7
7,354,923 UART: [ldev] FE.KEYID = 1
7,401,447 UART: [ldev] Erasing FE.KEYID = 1
10,731,654 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,027,880 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,042,461 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,057,320 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,071,903 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,090,203 UART: [ldev] --
13,094,499 UART: [fwproc] Waiting for Commands...
13,097,846 UART: [fwproc] Received command 0x46574c44
13,100,039 UART: [fwproc] Received Image of size 119428 bytes
17,214,132 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,287,239 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,360,377 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,691,348 >>> mbox cmd response: success
17,695,948 UART: [afmc] ++
17,696,558 UART: [afmc] CDI.KEYID = 6
17,697,479 UART: [afmc] SUBJECT.KEYID = 7
17,698,703 UART: [afmc] AUTHORITY.KEYID = 5
21,069,826 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,372,920 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,375,206 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,389,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,404,355 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,418,760 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,439,886 UART: [afmc] --
23,444,138 UART: [cold-reset] --
23,447,302 UART: [state] Locking Datavault
23,451,418 UART: [state] Locking PCR0, PCR1 and PCR31
23,453,123 UART: [state] Locking ICCM
23,454,250 UART: [exit] Launching FMC @ 0x40000130
23,462,642 UART:
23,462,900 UART: Running Caliptra FMC ...
23,464,005 UART:
23,464,177 UART: [state] CFI Enabled
23,531,240 UART: [fht] FMC Alias Private Key: 7
25,871,662 UART: [art] Extend RT PCRs Done
25,872,901 UART: [art] Lock RT PCRs Done
25,874,780 UART: [art] Populate DV Done
25,880,137 UART: [fht] FMC Alias Private Key: 7
25,881,837 UART: [art] Derive CDI
25,882,578 UART: [art] Store in slot 0x4
25,940,053 UART: [art] Derive Key Pair
25,941,099 UART: [art] Store priv key in slot 0x5
29,234,171 UART: [art] Derive Key Pair - Done
29,247,385 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,253 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,764 UART: [art] PUB.X = 72820DA607F162C4D5311C8C725C752FBBDA32D8ACE363E11E5F4335F9B9D6A587372B9C7612FE2BE110A4CFF1605B3C
31,545,058 UART: [art] PUB.Y = 19340E7EF7A3F8A96EEEEF237B1EA3B97D3A886F86320D363769F475A30AD9FD3A53D932F3ECBA99C7BA57F5B2AD25C9
31,552,329 UART: [art] SIG.R = 8CD8C41C3C4AE2BD00973CD273EFF5158DFDBDDAF1B94936063C60F6FE587C52D31D7CBD1E14F5F9FF9B46FEF7405692
31,559,745 UART: [art] SIG.S = 428627FE1E0AADAE0AE99DBB42DD86A290A9AE026564E50299E56B03A53FF8B23FC7ABE4315B2F23582C3A8AA258CEE8
32,865,298 UART: Caliptra RT
32,866,014 UART: [state] CFI Enabled
33,042,211 UART: [rt] RT listening for mailbox commands...
33,044,075 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,073,710 UART: [rt]cmd =0x46504c54, len=4
33,075,125 >>> mbox cmd response data (8 bytes)
33,076,061 UART: [rt] FIPS self test
33,077,017 UART: [kat] ++
33,077,479 UART: [kat] sha1
33,081,776 UART: [kat] SHA2-256
33,083,663 UART: [kat] SHA2-384
33,086,736 UART: [kat] SHA2-512-ACC
33,087,624 UART: Fatal Error: 0x90050001
33,123,031 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,273,033 >>> mbox cmd response: failed
33,273,703 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,423,446 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,104 UART:
190,422 UART: Running Caliptra ROM ...
191,478 UART:
191,620 UART: [state] CFI Enabled
267,540 UART: [state] LifecycleState = Unprovisioned
269,464 UART: [state] DebugLocked = No
270,852 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,058 UART: [kat] SHA2-256
445,729 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
456,225 UART: [kat] ++
456,695 UART: [kat] sha1
467,250 UART: [kat] SHA2-256
469,939 UART: [kat] SHA2-384
475,758 UART: [kat] SHA2-512-ACC
478,096 UART: [kat] ECC-384
2,772,548 UART: [kat] HMAC-384Kdf
2,803,358 UART: [kat] LMS
3,993,637 UART: [kat] --
3,998,470 UART: [cold-reset] ++
4,001,050 UART: [fht] Storing FHT @ 0x50003400
4,013,094 UART: [idev] ++
4,013,707 UART: [idev] CDI.KEYID = 6
4,014,626 UART: [idev] SUBJECT.KEYID = 7
4,015,847 UART: [idev] UDS.KEYID = 0
4,017,483 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,167,981 UART: [idev] Erasing UDS.KEYID = 0
7,348,653 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,989 UART: [idev] --
7,374,339 UART: [ldev] ++
7,374,974 UART: [ldev] CDI.KEYID = 6
7,375,885 UART: [ldev] SUBJECT.KEYID = 5
7,377,101 UART: [ldev] AUTHORITY.KEYID = 7
7,378,392 UART: [ldev] FE.KEYID = 1
7,425,603 UART: [ldev] Erasing FE.KEYID = 1
10,761,761 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,074,314 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,088,909 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,103,768 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,118,271 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,135,620 UART: [ldev] --
13,140,089 UART: [fwproc] Waiting for Commands...
13,143,230 UART: [fwproc] Received command 0x46574c44
13,145,436 UART: [fwproc] Received Image of size 119428 bytes
17,259,230 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,335,898 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,409,088 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,740,930 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,920 writing to cptra_bootfsm_go
3,783,346 ready_for_fw is high
3,783,822 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,982,863 >>> mbox cmd response: success
23,675,328 UART:
23,675,740 UART: Running Caliptra FMC ...
23,676,905 UART:
23,677,077 UART: [state] CFI Enabled
23,744,428 UART: [fht] FMC Alias Private Key: 7
26,084,604 UART: [art] Extend RT PCRs Done
26,085,856 UART: [art] Lock RT PCRs Done
26,087,459 UART: [art] Populate DV Done
26,092,843 UART: [fht] FMC Alias Private Key: 7
26,094,446 UART: [art] Derive CDI
26,095,271 UART: [art] Store in slot 0x4
26,154,709 UART: [art] Derive Key Pair
26,155,747 UART: [art] Store priv key in slot 0x5
29,448,575 UART: [art] Derive Key Pair - Done
29,461,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,750,226 UART: [art] Erasing AUTHORITY.KEYID = 7
31,751,743 UART: [art] PUB.X = 0524A82A235F634266149FACEECC8771A7C2D1A6D735D5C137CF4DAC2A97482FF4CCF3EFC3EA99698B73DDEADA8CA8C4
31,759,021 UART: [art] PUB.Y = 77320A161E0BAA76ACF933AAD681A837D09689540F2C832C9F0888C514116A88F8A6D0807E609FAFB04EEE62BBAA1788
31,766,318 UART: [art] SIG.R = 0D66850E565EFF6C8AAB6F720AAECF1EBCEEC3919C057FA0BFA489DB805511CFDD4DAC63905F268371949EF2DF07200C
31,773,696 UART: [art] SIG.S = F0B4ACFE457550AE98C702D8A2D53795268BC041A6614630AA72729D0AA9D3DFF13742E989691166BEE4DEC3D015D5BD
33,079,557 UART: Caliptra RT
33,080,262 UART: [state] CFI Enabled
33,256,944 UART: [rt] RT listening for mailbox commands...
33,258,805 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,288,380 UART: [rt]cmd =0x46504c54, len=4
33,289,959 >>> mbox cmd response data (8 bytes)
33,291,024 UART: [rt] FIPS self test
33,291,975 UART: [kat] ++
33,292,429 UART: [kat] sha1
33,296,888 UART: [kat] SHA2-256
33,298,821 UART: [kat] SHA2-384
33,301,839 UART: [kat] SHA2-512-ACC
33,302,726 UART: Fatal Error: 0x90050001
33,338,380 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,488,496 >>> mbox cmd response: failed
33,489,161 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,639,066 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
3,788,622 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,967,935 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,291 writing to cptra_bootfsm_go
192,416 UART:
192,786 UART: Running Caliptra ROM ...
193,886 UART:
603,521 UART: [state] CFI Enabled
617,624 UART: [state] LifecycleState = Unprovisioned
619,580 UART: [state] DebugLocked = No
621,261 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,917 UART: [kat] SHA2-256
795,668 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,251 UART: [kat] ++
806,705 UART: [kat] sha1
818,879 UART: [kat] SHA2-256
821,575 UART: [kat] SHA2-384
827,644 UART: [kat] SHA2-512-ACC
829,953 UART: [kat] ECC-384
3,114,285 UART: [kat] HMAC-384Kdf
3,125,981 UART: [kat] LMS
4,316,062 UART: [kat] --
4,319,579 UART: [cold-reset] ++
4,322,230 UART: [fht] Storing FHT @ 0x50003400
4,333,526 UART: [idev] ++
4,334,143 UART: [idev] CDI.KEYID = 6
4,335,065 UART: [idev] SUBJECT.KEYID = 7
4,336,326 UART: [idev] UDS.KEYID = 0
4,337,506 ready_for_fw is high
4,337,739 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,487,584 UART: [idev] Erasing UDS.KEYID = 0
7,621,871 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,393 UART: [idev] --
7,648,885 UART: [ldev] ++
7,649,461 UART: [ldev] CDI.KEYID = 6
7,650,347 UART: [ldev] SUBJECT.KEYID = 5
7,651,623 UART: [ldev] AUTHORITY.KEYID = 7
7,652,865 UART: [ldev] FE.KEYID = 1
7,661,954 UART: [ldev] Erasing FE.KEYID = 1
10,955,351 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,250,265 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,264,860 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,279,657 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,294,189 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,313,277 UART: [ldev] --
13,317,745 UART: [fwproc] Waiting for Commands...
13,320,443 UART: [fwproc] Received command 0x46574c44
13,322,631 UART: [fwproc] Received Image of size 119428 bytes
17,428,330 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,200 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,388 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,911,658 >>> mbox cmd response: success
17,916,494 UART: [afmc] ++
17,917,083 UART: [afmc] CDI.KEYID = 6
17,918,004 UART: [afmc] SUBJECT.KEYID = 7
17,919,228 UART: [afmc] AUTHORITY.KEYID = 5
21,231,863 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,526,896 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,529,161 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,543,627 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,558,301 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,572,729 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,656 UART: [afmc] --
23,597,712 UART: [cold-reset] --
23,601,147 UART: [state] Locking Datavault
23,606,568 UART: [state] Locking PCR0, PCR1 and PCR31
23,608,277 UART: [state] Locking ICCM
23,610,487 UART: [exit] Launching FMC @ 0x40000130
23,618,873 UART:
23,619,129 UART: Running Caliptra FMC ...
23,620,239 UART:
23,620,406 UART: [state] CFI Enabled
23,628,245 UART: [fht] FMC Alias Private Key: 7
25,968,648 UART: [art] Extend RT PCRs Done
25,969,866 UART: [art] Lock RT PCRs Done
25,971,310 UART: [art] Populate DV Done
25,976,586 UART: [fht] FMC Alias Private Key: 7
25,978,134 UART: [art] Derive CDI
25,978,905 UART: [art] Store in slot 0x4
26,021,448 UART: [art] Derive Key Pair
26,022,490 UART: [art] Store priv key in slot 0x5
29,264,438 UART: [art] Derive Key Pair - Done
29,277,406 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,557,608 UART: [art] Erasing AUTHORITY.KEYID = 7
31,559,123 UART: [art] PUB.X = 2B8E824B13CB18793D069FCB6B093A1C6E7391028B106533F899612EA88EA1BA7BDD82D164E87DB907B3F5DE12848C9A
31,566,382 UART: [art] PUB.Y = C2FD8D2B0ED02707DF3EEFDF904AFA1864214583B625FED3F8D8FF472AB82CF19633F5424F922FE48EF9CB5E2E352470
31,573,631 UART: [art] SIG.R = 24F5EEDB86B6E0B992806033306F56F07CDC4EF63AFB7F0AC99D24EB3BC107E4AE2B9FE7B221B3CA33AC631FDC64A929
31,581,085 UART: [art] SIG.S = 695BCB8F3C9F421A83D01257B1497C71CA6569D51A753E8573560778C0BA918DBB0245FECE117264F7DEDA13B6ABA25A
32,885,867 UART: Caliptra RT
32,886,584 UART: [state] CFI Enabled
33,019,546 UART: [rt] RT listening for mailbox commands...
33,021,411 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,051,064 UART: [rt]cmd =0x46504c54, len=4
33,052,579 >>> mbox cmd response data (8 bytes)
33,053,515 UART: [rt] FIPS self test
33,054,468 UART: [kat] ++
33,054,927 UART: [kat] sha1
33,059,337 UART: [kat] SHA2-256
33,061,225 UART: [kat] SHA2-384
33,064,351 UART: [kat] SHA2-512-ACC
33,065,244 UART: Fatal Error: 0x90050001
33,100,461 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,250,375 >>> mbox cmd response: failed
33,250,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,400,850 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,140 UART:
190,446 UART: Running Caliptra ROM ...
191,561 UART:
7,131,705 UART: [state] CFI Enabled
7,147,278 UART: [state] LifecycleState = Unprovisioned
7,149,218 UART: [state] DebugLocked = No
7,152,232 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,157,351 UART: [kat] SHA2-256
7,327,097 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,337,635 UART: [kat] ++
7,338,192 UART: [kat] sha1
7,349,416 UART: [kat] SHA2-256
7,352,168 UART: [kat] SHA2-384
7,357,621 UART: [kat] SHA2-512-ACC
7,360,031 UART: [kat] ECC-384
9,646,449 UART: [kat] HMAC-384Kdf
9,657,806 UART: [kat] LMS
10,847,916 UART: [kat] --
10,853,181 UART: [cold-reset] ++
10,855,690 UART: [fht] Storing FHT @ 0x50003400
10,867,451 UART: [idev] ++
10,868,022 UART: [idev] CDI.KEYID = 6
10,868,914 UART: [idev] SUBJECT.KEYID = 7
10,870,188 UART: [idev] UDS.KEYID = 0
10,871,762 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,021,739 UART: [idev] Erasing UDS.KEYID = 0
14,160,643 UART: [idev] Using Sha1 for KeyId Algorithm
14,181,833 UART: [idev] --
14,186,537 UART: [ldev] ++
14,187,113 UART: [ldev] CDI.KEYID = 6
14,188,087 UART: [ldev] SUBJECT.KEYID = 5
14,189,311 UART: [ldev] AUTHORITY.KEYID = 7
14,190,551 UART: [ldev] FE.KEYID = 1
14,203,064 UART: [ldev] Erasing FE.KEYID = 1
17,488,641 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,782,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,796,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,811,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,825,933 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,844,275 UART: [ldev] --
19,848,465 UART: [fwproc] Waiting for Commands...
19,850,352 UART: [fwproc] Received command 0x46574c44
19,852,545 UART: [fwproc] Received Image of size 119428 bytes
23,967,167 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,043,035 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,116,219 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,447,459 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,223 writing to cptra_bootfsm_go
4,128,208 ready_for_fw is high
4,128,806 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,175,325 >>> mbox cmd response: success
23,813,758 UART:
23,814,165 UART: Running Caliptra FMC ...
23,815,292 UART:
23,815,452 UART: [state] CFI Enabled
23,823,469 UART: [fht] FMC Alias Private Key: 7
26,164,109 UART: [art] Extend RT PCRs Done
26,165,383 UART: [art] Lock RT PCRs Done
26,167,103 UART: [art] Populate DV Done
26,172,694 UART: [fht] FMC Alias Private Key: 7
26,174,192 UART: [art] Derive CDI
26,174,962 UART: [art] Store in slot 0x4
26,217,824 UART: [art] Derive Key Pair
26,218,828 UART: [art] Store priv key in slot 0x5
29,461,153 UART: [art] Derive Key Pair - Done
29,474,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,754,611 UART: [art] Erasing AUTHORITY.KEYID = 7
31,756,140 UART: [art] PUB.X = E4D6C7D37D8A596B1A608AAD03186AAD4859513B338DA9AA55BB2F645F85140B00065AECCEBF5986A5004EEF08DD6489
31,763,388 UART: [art] PUB.Y = A3A6C76F84230A87AAB2F273C0FF84B4E218BDA79334DA2E6A502A391FE98F2534CD057C18932413822B47048305E03B
31,770,616 UART: [art] SIG.R = DBC61B1490A91219BCC81ABD20BBF851653C19D7C6438145E19C95C2BCA8F7351A262FCF2DBAA8F0789831B410D08693
31,778,018 UART: [art] SIG.S = 19F1E9D114E082FE18F11BF753D955BDDC7C258B510609CADDE2EC266A4AD2BE17BB58293D64CAA78F59A2D6162BFD6A
33,082,462 UART: Caliptra RT
33,083,184 UART: [state] CFI Enabled
33,215,718 UART: [rt] RT listening for mailbox commands...
33,217,591 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,247,335 UART: [rt]cmd =0x46504c54, len=4
33,248,812 >>> mbox cmd response data (8 bytes)
33,249,646 UART: [rt] FIPS self test
33,250,598 UART: [kat] ++
33,251,060 UART: [kat] sha1
33,255,587 UART: [kat] SHA2-256
33,257,525 UART: [kat] SHA2-384
33,260,385 UART: [kat] SHA2-512-ACC
33,261,406 UART: Fatal Error: 0x90050001
33,296,815 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,446,862 >>> mbox cmd response: failed
33,447,499 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,597,438 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
10,462,060 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,514,705 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,118 writing to cptra_bootfsm_go
192,373 UART:
192,732 UART: Running Caliptra ROM ...
193,961 UART:
194,120 UART: [state] CFI Enabled
267,556 UART: [state] LifecycleState = Unprovisioned
269,474 UART: [state] DebugLocked = No
270,877 UART: [state] WD Timer not started. Device not locked for debugging
273,935 UART: [kat] SHA2-256
453,558 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,377 UART: [kat] ++
464,859 UART: [kat] sha1
476,238 UART: [kat] SHA2-256
478,970 UART: [kat] SHA2-384
485,316 UART: [kat] SHA2-512-ACC
487,692 UART: [kat] ECC-384
2,949,875 UART: [kat] HMAC-384Kdf
2,971,692 UART: [kat] LMS
3,448,148 UART: [kat] --
3,454,001 UART: [cold-reset] ++
3,455,164 UART: [fht] FHT @ 0x50003400
3,465,009 UART: [idev] ++
3,465,577 UART: [idev] CDI.KEYID = 6
3,466,540 UART: [idev] SUBJECT.KEYID = 7
3,467,787 UART: [idev] UDS.KEYID = 0
3,468,800 ready_for_fw is high
3,469,033 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,280 UART: [idev] Erasing UDS.KEYID = 0
5,988,062 UART: [idev] Sha1 KeyId Algorithm
6,011,516 UART: [idev] --
6,015,574 UART: [ldev] ++
6,016,209 UART: [ldev] CDI.KEYID = 6
6,017,117 UART: [ldev] SUBJECT.KEYID = 5
6,018,282 UART: [ldev] AUTHORITY.KEYID = 7
6,019,577 UART: [ldev] FE.KEYID = 1
6,057,676 UART: [ldev] Erasing FE.KEYID = 1
8,568,441 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,302,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,318,783 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,334,637 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,350,195 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,837 UART: [ldev] --
10,378,147 UART: [fwproc] Wait for Commands...
10,380,753 UART: [fwproc] Recv command 0x46574c44
10,382,748 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,204 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,956,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,029,600 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,360,227 >>> mbox cmd response: success
14,364,169 UART: [afmc] ++
14,364,816 UART: [afmc] CDI.KEYID = 6
14,365,711 UART: [afmc] SUBJECT.KEYID = 7
14,366,928 UART: [afmc] AUTHORITY.KEYID = 5
16,900,662 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,992 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,646,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,662,027 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,678,078 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,693,687 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,718,443 UART: [afmc] --
18,721,504 UART: [cold-reset] --
18,725,752 UART: [state] Locking Datavault
18,733,162 UART: [state] Locking PCR0, PCR1 and PCR31
18,734,864 UART: [state] Locking ICCM
18,736,281 UART: [exit] Launching FMC @ 0x40000130
18,744,682 UART:
18,744,933 UART: Running Caliptra FMC ...
18,746,039 UART:
18,746,208 UART: [state] CFI Enabled
18,799,599 UART: [fht] FMC Alias Private Key: 7
20,566,284 UART: [art] Extend RT PCRs Done
20,567,518 UART: [art] Lock RT PCRs Done
20,569,068 UART: [art] Populate DV Done
20,574,540 UART: [fht] FMC Alias Private Key: 7
20,576,082 UART: [art] Derive CDI
20,576,824 UART: [art] Store in slot 0x4
20,631,972 UART: [art] Derive Key Pair
20,633,018 UART: [art] Store priv key in slot 0x5
23,095,731 UART: [art] Derive Key Pair - Done
23,108,678 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,819,076 UART: [art] Erasing AUTHORITY.KEYID = 7
24,820,592 UART: [art] PUB.X = 229D55C677940BCB7CA054E647DB70B5CD22AC3C8B1A4D569954F73580EE14D9FACE71D1D15CB7652F5533CFE0090297
24,827,864 UART: [art] PUB.Y = C241801C16B23005908B8FB3F3A93BABE1077D000307FC983568D4B2E84929CCE00E5F124D23051C402742A4F74D8C26
24,835,108 UART: [art] SIG.R = CA7DA4F40872AC5C67E2EC746A7389C134DF9BA78BF5D668018A2C7881FD1A368BF66F6D6073E40D0D9B80C7309282FC
24,842,505 UART: [art] SIG.S = FF4672CA14CAEF5DCFAE791505A3FEC89A9230450B2FD3A10574A16FDBEA4FE984D102447F1AFE80663E2B7D08B76E04
25,821,293 UART: Caliptra RT
25,822,009 UART: [state] CFI Enabled
26,002,946 UART: [rt] RT listening for mailbox commands...
26,004,812 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,034,450 UART: [rt]cmd =0x46504c54, len=4
26,036,037 >>> mbox cmd response data (8 bytes)
26,037,378 UART: [rt] FIPS self test
26,038,323 UART: [kat] ++
26,038,787 UART: [kat] sha1
26,043,144 UART: [kat] SHA2-256
26,045,034 UART: [kat] SHA2-384
26,047,970 UART: [kat] SHA2-512-ACC
26,048,918 UART: Fatal Error: 0x90050001
26,084,346 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,234,432 >>> mbox cmd response: failed
26,235,063 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,385,013 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
190,030 UART:
190,328 UART: Running Caliptra ROM ...
191,359 UART:
191,507 UART: [state] CFI Enabled
264,257 UART: [state] LifecycleState = Unprovisioned
266,179 UART: [state] DebugLocked = No
268,177 UART: [state] WD Timer not started. Device not locked for debugging
271,690 UART: [kat] SHA2-256
451,346 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,105 UART: [kat] ++
462,572 UART: [kat] sha1
473,829 UART: [kat] SHA2-256
476,505 UART: [kat] SHA2-384
482,875 UART: [kat] SHA2-512-ACC
485,276 UART: [kat] ECC-384
2,951,672 UART: [kat] HMAC-384Kdf
2,971,592 UART: [kat] LMS
3,448,095 UART: [kat] --
3,453,178 UART: [cold-reset] ++
3,455,443 UART: [fht] FHT @ 0x50003400
3,466,264 UART: [idev] ++
3,466,835 UART: [idev] CDI.KEYID = 6
3,467,778 UART: [idev] SUBJECT.KEYID = 7
3,469,052 UART: [idev] UDS.KEYID = 0
3,470,577 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,621,168 UART: [idev] Erasing UDS.KEYID = 0
5,989,841 UART: [idev] Sha1 KeyId Algorithm
6,013,472 UART: [idev] --
6,018,228 UART: [ldev] ++
6,018,810 UART: [ldev] CDI.KEYID = 6
6,019,728 UART: [ldev] SUBJECT.KEYID = 5
6,020,949 UART: [ldev] AUTHORITY.KEYID = 7
6,022,187 UART: [ldev] FE.KEYID = 1
6,064,088 UART: [ldev] Erasing FE.KEYID = 1
8,572,156 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,305,760 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,321,591 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,337,498 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,353,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,373,429 UART: [ldev] --
10,378,239 UART: [fwproc] Wait for Commands...
10,380,448 UART: [fwproc] Recv command 0x46574c44
10,382,495 UART: [fwproc] Recv'd Img size: 119428 bytes
13,870,585 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,950,679 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,023,677 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,354,692 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
3,462,724 ready_for_fw is high
3,463,340 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,237,620 >>> mbox cmd response: success
18,528,340 UART:
18,528,744 UART: Running Caliptra FMC ...
18,529,868 UART:
18,530,027 UART: [state] CFI Enabled
18,598,712 UART: [fht] FMC Alias Private Key: 7
20,365,132 UART: [art] Extend RT PCRs Done
20,366,376 UART: [art] Lock RT PCRs Done
20,367,872 UART: [art] Populate DV Done
20,373,104 UART: [fht] FMC Alias Private Key: 7
20,374,655 UART: [art] Derive CDI
20,375,476 UART: [art] Store in slot 0x4
20,431,281 UART: [art] Derive Key Pair
20,432,328 UART: [art] Store priv key in slot 0x5
22,895,504 UART: [art] Derive Key Pair - Done
22,908,685 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,620,239 UART: [art] Erasing AUTHORITY.KEYID = 7
24,621,750 UART: [art] PUB.X = 87A5781B8F8C531BB7DF4097F7AC0FBD0A61AC1663DADFF2A99AAE5B6CA1CEA3DCAD4EE17CB619E5B18F811ABEE3B8B5
24,629,033 UART: [art] PUB.Y = 2285A045FF1D39E63AE92D6A6B5B9E012B0C79F188C32EE5594D1AC446DDEED192809802040CE2D5E59F732096A00634
24,636,309 UART: [art] SIG.R = 5B1C63C901592BAECCDCBDF222E5D5E7E3FDE426136092F81352154E66F977A580DEC376A00786A9C2EFDF337AC2B9EB
24,643,678 UART: [art] SIG.S = 5551E44DC0BFB65739013A87D7EEA4EDC22A10A1BCE8B96D7E9AE0FB1F5A8D34BC5BA8E02FED5EBF0BE2B61A06BFC4C8
25,623,028 UART: Caliptra RT
25,623,736 UART: [state] CFI Enabled
25,803,134 UART: [rt] RT listening for mailbox commands...
25,804,988 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,834,750 UART: [rt]cmd =0x46504c54, len=4
25,836,284 >>> mbox cmd response data (8 bytes)
25,837,439 UART: [rt] FIPS self test
25,838,380 UART: [kat] ++
25,838,836 UART: [kat] sha1
25,843,435 UART: [kat] SHA2-256
25,845,373 UART: [kat] SHA2-384
25,848,301 UART: [kat] SHA2-512-ACC
25,849,249 UART: Fatal Error: 0x90050001
25,884,642 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,035,065 >>> mbox cmd response: failed
26,035,732 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,185,635 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
3,440,863 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,219,165 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,541 writing to cptra_bootfsm_go
192,852 UART:
193,222 UART: Running Caliptra ROM ...
194,460 UART:
603,837 UART: [state] CFI Enabled
615,534 UART: [state] LifecycleState = Unprovisioned
617,443 UART: [state] DebugLocked = No
619,047 UART: [state] WD Timer not started. Device not locked for debugging
622,283 UART: [kat] SHA2-256
801,874 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,670 UART: [kat] ++
813,164 UART: [kat] sha1
823,691 UART: [kat] SHA2-256
826,352 UART: [kat] SHA2-384
831,707 UART: [kat] SHA2-512-ACC
834,080 UART: [kat] ECC-384
3,276,186 UART: [kat] HMAC-384Kdf
3,287,942 UART: [kat] LMS
3,764,430 UART: [kat] --
3,769,381 UART: [cold-reset] ++
3,771,109 UART: [fht] FHT @ 0x50003400
3,782,741 UART: [idev] ++
3,783,315 UART: [idev] CDI.KEYID = 6
3,784,232 UART: [idev] SUBJECT.KEYID = 7
3,785,503 UART: [idev] UDS.KEYID = 0
3,786,434 ready_for_fw is high
3,786,686 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,936,748 UART: [idev] Erasing UDS.KEYID = 0
6,265,484 UART: [idev] Sha1 KeyId Algorithm
6,289,200 UART: [idev] --
6,294,119 UART: [ldev] ++
6,294,734 UART: [ldev] CDI.KEYID = 6
6,295,656 UART: [ldev] SUBJECT.KEYID = 5
6,296,827 UART: [ldev] AUTHORITY.KEYID = 7
6,298,065 UART: [ldev] FE.KEYID = 1
6,310,101 UART: [ldev] Erasing FE.KEYID = 1
8,787,306 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,505,354 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,521,186 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,537,036 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,552,676 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,574,804 UART: [ldev] --
10,580,993 UART: [fwproc] Wait for Commands...
10,584,284 UART: [fwproc] Recv command 0x46574c44
10,586,281 UART: [fwproc] Recv'd Img size: 119428 bytes
14,080,484 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,160,362 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,233,431 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,565,476 >>> mbox cmd response: success
14,569,935 UART: [afmc] ++
14,570,527 UART: [afmc] CDI.KEYID = 6
14,571,475 UART: [afmc] SUBJECT.KEYID = 7
14,572,692 UART: [afmc] AUTHORITY.KEYID = 5
17,075,297 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,798,824 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,801,063 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,816,905 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,832,932 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,848,519 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,872,931 UART: [afmc] --
18,876,491 UART: [cold-reset] --
18,879,005 UART: [state] Locking Datavault
18,884,639 UART: [state] Locking PCR0, PCR1 and PCR31
18,886,342 UART: [state] Locking ICCM
18,889,088 UART: [exit] Launching FMC @ 0x40000130
18,897,489 UART:
18,897,725 UART: Running Caliptra FMC ...
18,898,830 UART:
18,898,989 UART: [state] CFI Enabled
18,907,199 UART: [fht] FMC Alias Private Key: 7
20,673,883 UART: [art] Extend RT PCRs Done
20,675,108 UART: [art] Lock RT PCRs Done
20,677,003 UART: [art] Populate DV Done
20,682,310 UART: [fht] FMC Alias Private Key: 7
20,683,902 UART: [art] Derive CDI
20,684,643 UART: [art] Store in slot 0x4
20,727,125 UART: [art] Derive Key Pair
20,728,166 UART: [art] Store priv key in slot 0x5
23,155,199 UART: [art] Derive Key Pair - Done
23,168,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,874,462 UART: [art] Erasing AUTHORITY.KEYID = 7
24,875,976 UART: [art] PUB.X = 20A334412033011F2B350F454E0FEA85AFF9FEF33F557592B50AA4CDD61218BA1F39215D24CC5890A12ECC1BCE2A9B0E
24,883,257 UART: [art] PUB.Y = 6C7AF9F322E2B900E8DDC169A05B29461D08D8FDAD68B7AC8D849BFB303889B56B4DCA2959D3017B61F03DA83167F46D
24,890,532 UART: [art] SIG.R = A9D8BF8EE836092D86DE37258EC269ECC1A267A01589ACF185457DDDED4D028F928DD469FE4D3F8D893CC1F3EC5CBA45
24,897,901 UART: [art] SIG.S = 3C0C9D850A2D51A3ADD2F1B7B96C26E7B2BF08F19152887342E0386B852A5F03129697B42F6F2AA4C8CAF2F2F28BF1EC
25,877,035 UART: Caliptra RT
25,877,730 UART: [state] CFI Enabled
26,010,071 UART: [rt] RT listening for mailbox commands...
26,011,968 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,041,667 UART: [rt]cmd =0x46504c54, len=4
26,043,156 >>> mbox cmd response data (8 bytes)
26,044,602 UART: [rt] FIPS self test
26,045,551 UART: [kat] ++
26,046,011 UART: [kat] sha1
26,050,472 UART: [kat] SHA2-256
26,052,354 UART: [kat] SHA2-384
26,055,174 UART: [kat] SHA2-512-ACC
26,056,218 UART: Fatal Error: 0x90050001
26,091,439 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,241,442 >>> mbox cmd response: failed
26,242,085 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,392,388 >>> mbox cmd response: failed
Initializing fuses
945 writing to cptra_bootfsm_go
190,052 UART:
190,349 UART: Running Caliptra ROM ...
191,466 UART:
14,137,703 UART: [state] CFI Enabled
14,151,657 UART: [state] LifecycleState = Unprovisioned
14,153,622 UART: [state] DebugLocked = No
14,156,435 UART: [state] WD Timer not started. Device not locked for debugging
14,161,164 UART: [kat] SHA2-256
14,340,831 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,351,627 UART: [kat] ++
14,352,101 UART: [kat] sha1
14,363,524 UART: [kat] SHA2-256
14,366,214 UART: [kat] SHA2-384
14,372,584 UART: [kat] SHA2-512-ACC
14,374,942 UART: [kat] ECC-384
16,815,521 UART: [kat] HMAC-384Kdf
16,827,763 UART: [kat] LMS
17,304,298 UART: [kat] --
17,309,692 UART: [cold-reset] ++
17,311,798 UART: [fht] FHT @ 0x50003400
17,323,315 UART: [idev] ++
17,323,881 UART: [idev] CDI.KEYID = 6
17,324,851 UART: [idev] SUBJECT.KEYID = 7
17,326,121 UART: [idev] UDS.KEYID = 0
17,327,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,477,555 UART: [idev] Erasing UDS.KEYID = 0
19,806,284 UART: [idev] Sha1 KeyId Algorithm
19,829,944 UART: [idev] --
19,833,644 UART: [ldev] ++
19,834,276 UART: [ldev] CDI.KEYID = 6
19,835,184 UART: [ldev] SUBJECT.KEYID = 5
19,836,404 UART: [ldev] AUTHORITY.KEYID = 7
19,837,660 UART: [ldev] FE.KEYID = 1
19,848,148 UART: [ldev] Erasing FE.KEYID = 1
22,326,662 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,045,000 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,060,835 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,076,690 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,092,299 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,115,237 UART: [ldev] --
24,120,397 UART: [fwproc] Wait for Commands...
24,123,094 UART: [fwproc] Recv command 0x46574c44
24,125,099 UART: [fwproc] Recv'd Img size: 119428 bytes
27,620,703 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,701,008 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,774,029 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,105,264 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
39 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,607 writing to cptra_bootfsm_go
3,780,498 ready_for_fw is high
3,781,125 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,456,171 >>> mbox cmd response: success
18,708,462 UART:
18,708,898 UART: Running Caliptra FMC ...
18,710,049 UART:
18,710,212 UART: [state] CFI Enabled
18,717,919 UART: [fht] FMC Alias Private Key: 7
20,484,442 UART: [art] Extend RT PCRs Done
20,485,686 UART: [art] Lock RT PCRs Done
20,487,430 UART: [art] Populate DV Done
20,492,811 UART: [fht] FMC Alias Private Key: 7
20,494,480 UART: [art] Derive CDI
20,495,306 UART: [art] Store in slot 0x4
20,537,869 UART: [art] Derive Key Pair
20,538,914 UART: [art] Store priv key in slot 0x5
22,966,112 UART: [art] Derive Key Pair - Done
22,978,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,685,390 UART: [art] Erasing AUTHORITY.KEYID = 7
24,686,920 UART: [art] PUB.X = E8ADA0F08F96413E1B53DBDDC1AADAA54A28B8E1BC1591CABB496C229639562DD592D84AFF3721A4018FB2D364000BA3
24,694,228 UART: [art] PUB.Y = 846950BB4AA62F237E700E412A93D8B4F9E96EE788F3E7B0BF613352668690A4F28DF05807DB3ABB0A06AF079B42A5B3
24,701,439 UART: [art] SIG.R = 8F545CD0F2CE1D503D7F9B902CE1D6472C333C8BB9F1AC8B285AC76487B0DAFEF4E8E0BB77B379CC70E5B706C9E669DD
24,708,849 UART: [art] SIG.S = EA60ABB13C6EA5DD0A972099003646A5913F30278EA0AC103F42AFC1B9734DB4A6836E9038D8D2C44BF646624D63D93A
25,687,355 UART: Caliptra RT
25,688,071 UART: [state] CFI Enabled
25,821,428 UART: [rt] RT listening for mailbox commands...
25,823,290 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,853,094 UART: [rt]cmd =0x46504c54, len=4
25,854,631 >>> mbox cmd response data (8 bytes)
25,855,795 UART: [rt] FIPS self test
25,856,738 UART: [kat] ++
25,857,192 UART: [kat] sha1
25,861,544 UART: [kat] SHA2-256
25,863,485 UART: [kat] SHA2-384
25,866,288 UART: [kat] SHA2-512-ACC
25,867,176 UART: Fatal Error: 0x90050001
25,902,554 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,052,445 >>> mbox cmd response: failed
26,053,083 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,203,024 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
17,502,266 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,191,479 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,960 writing to cptra_bootfsm_go
192,048 UART:
192,416 UART: Running Caliptra ROM ...
193,601 UART:
193,760 UART: [state] CFI Enabled
265,923 UART: [state] LifecycleState = Unprovisioned
268,326 UART: [state] DebugLocked = No
270,571 UART: [state] WD Timer not started. Device not locked for debugging
275,607 UART: [kat] SHA2-256
465,497 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
476,249 UART: [kat] ++
476,744 UART: [kat] sha1
488,001 UART: [kat] SHA2-256
491,032 UART: [kat] SHA2-384
497,458 UART: [kat] SHA2-512-ACC
499,994 UART: [kat] ECC-384
2,946,179 UART: [kat] HMAC-384Kdf
2,972,078 UART: [kat] LMS
3,503,809 UART: [kat] --
3,508,087 UART: [cold-reset] ++
3,510,389 UART: [fht] FHT @ 0x50003400
3,522,228 UART: [idev] ++
3,522,866 UART: [idev] CDI.KEYID = 6
3,523,824 UART: [idev] SUBJECT.KEYID = 7
3,525,072 UART: [idev] UDS.KEYID = 0
3,525,982 ready_for_fw is high
3,526,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,370 UART: [idev] Erasing UDS.KEYID = 0
6,031,107 UART: [idev] Sha1 KeyId Algorithm
6,053,498 UART: [idev] --
6,058,911 UART: [ldev] ++
6,059,601 UART: [ldev] CDI.KEYID = 6
6,060,530 UART: [ldev] SUBJECT.KEYID = 5
6,061,699 UART: [ldev] AUTHORITY.KEYID = 7
6,062,940 UART: [ldev] FE.KEYID = 1
6,101,520 UART: [ldev] Erasing FE.KEYID = 1
8,608,933 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,110 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,260 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,370,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,385,641 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,405,679 UART: [ldev] --
10,410,405 UART: [fwproc] Wait for Commands...
10,412,359 UART: [fwproc] Recv command 0x46574c44
10,414,688 UART: [fwproc] Recv'd Img size: 119428 bytes
13,927,611 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,003,174 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,126,769 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,691,803 >>> mbox cmd response: success
14,696,532 UART: [afmc] ++
14,697,239 UART: [afmc] CDI.KEYID = 6
14,698,430 UART: [afmc] SUBJECT.KEYID = 7
14,699,867 UART: [afmc] AUTHORITY.KEYID = 5
17,236,998 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,960,719 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,962,641 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,977,770 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,992,913 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,007,763 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,171 UART: [afmc] --
19,035,099 UART: [cold-reset] --
19,038,813 UART: [state] Locking Datavault
19,043,586 UART: [state] Locking PCR0, PCR1 and PCR31
19,045,782 UART: [state] Locking ICCM
19,048,747 UART: [exit] Launching FMC @ 0x40000130
19,057,434 UART:
19,057,714 UART: Running Caliptra FMC ...
19,058,834 UART:
19,059,001 UART: [state] CFI Enabled
19,118,130 UART: [fht] FMC Alias Private Key: 7
20,884,581 UART: [art] Extend RT PCRs Done
20,885,807 UART: [art] Lock RT PCRs Done
20,887,168 UART: [art] Populate DV Done
20,892,642 UART: [fht] FMC Alias Private Key: 7
20,894,124 UART: [art] Derive CDI
20,894,903 UART: [art] Store in slot 0x4
20,950,990 UART: [art] Derive Key Pair
20,951,996 UART: [art] Store priv key in slot 0x5
23,414,726 UART: [art] Derive Key Pair - Done
23,427,828 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,140,596 UART: [art] Erasing AUTHORITY.KEYID = 7
25,142,108 UART: [art] PUB.X = 9456C95C27BDAEC1561028610EC3579BD0D1759AD90C77FC17273D4613B0FE1317468E61985D94F350E6F97076F93AFF
25,149,362 UART: [art] PUB.Y = BE0FB6CC5EBF629A2220AC0F11247AE7E3C557F7164ED9C8D8BD570E4AA315985A520ED5DA83B18B094F8D65739F80B2
25,156,657 UART: [art] SIG.R = 78D4CE4AB6AB7E40FE7513DE61CC88710E38AE97E1496FF7EF26A84E5385E8297A051CEC08D741119FD3697647847E0D
25,164,001 UART: [art] SIG.S = 9E18B9D7EC1D0F16FCD164AB8A3C375838EA5CDA6F1A3776725EBA5C4A7E13AD0F63BDC10615457C32EC0CC4B8E86D9B
26,142,825 UART: Caliptra RT
26,143,541 UART: [state] CFI Enabled
26,325,822 UART: [rt] RT listening for mailbox commands...
26,327,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,357,365 UART: [rt]cmd =0x46504c54, len=4
26,358,873 >>> mbox cmd response data (8 bytes)
26,359,850 UART: [rt] FIPS self test
26,360,833 UART: [kat] ++
26,361,292 UART: [kat] sha1
26,365,486 UART: [kat] SHA2-256
26,367,421 UART: [kat] SHA2-384
26,370,390 UART: [kat] SHA2-512-ACC
26,371,276 UART: Fatal Error: 0x90050001
26,406,425 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,556,448 >>> mbox cmd response: failed
26,557,106 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,707,054 >>> mbox cmd response: failed
Initializing fuses
947 writing to cptra_bootfsm_go
189,999 UART:
190,293 UART: Running Caliptra ROM ...
191,326 UART:
191,467 UART: [state] CFI Enabled
255,820 UART: [state] LifecycleState = Unprovisioned
258,194 UART: [state] DebugLocked = No
259,516 UART: [state] WD Timer not started. Device not locked for debugging
263,516 UART: [kat] SHA2-256
453,413 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
464,173 UART: [kat] ++
464,656 UART: [kat] sha1
477,703 UART: [kat] SHA2-256
480,719 UART: [kat] SHA2-384
485,674 UART: [kat] SHA2-512-ACC
488,240 UART: [kat] ECC-384
2,943,634 UART: [kat] HMAC-384Kdf
2,967,144 UART: [kat] LMS
3,498,903 UART: [kat] --
3,503,894 UART: [cold-reset] ++
3,504,857 UART: [fht] FHT @ 0x50003400
3,517,506 UART: [idev] ++
3,518,185 UART: [idev] CDI.KEYID = 6
3,519,209 UART: [idev] SUBJECT.KEYID = 7
3,520,322 UART: [idev] UDS.KEYID = 0
3,521,839 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,671,934 UART: [idev] Erasing UDS.KEYID = 0
6,018,997 UART: [idev] Sha1 KeyId Algorithm
6,041,900 UART: [idev] --
6,047,064 UART: [ldev] ++
6,047,767 UART: [ldev] CDI.KEYID = 6
6,048,679 UART: [ldev] SUBJECT.KEYID = 5
6,049,850 UART: [ldev] AUTHORITY.KEYID = 7
6,051,033 UART: [ldev] FE.KEYID = 1
6,081,291 UART: [ldev] Erasing FE.KEYID = 1
8,581,969 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,708 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,923 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,103 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,242 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,388,493 UART: [ldev] --
10,393,820 UART: [fwproc] Wait for Commands...
10,396,623 UART: [fwproc] Recv command 0x46574c44
10,398,943 UART: [fwproc] Recv'd Img size: 119428 bytes
13,909,366 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,987,937 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,111,545 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,677,760 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
3,440,751 ready_for_fw is high
3,441,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,844,423 >>> mbox cmd response: success
19,152,526 UART:
19,152,936 UART: Running Caliptra FMC ...
19,154,073 UART:
19,154,235 UART: [state] CFI Enabled
19,222,089 UART: [fht] FMC Alias Private Key: 7
20,988,452 UART: [art] Extend RT PCRs Done
20,989,686 UART: [art] Lock RT PCRs Done
20,991,075 UART: [art] Populate DV Done
20,996,339 UART: [fht] FMC Alias Private Key: 7
20,997,939 UART: [art] Derive CDI
20,998,762 UART: [art] Store in slot 0x4
21,054,680 UART: [art] Derive Key Pair
21,055,731 UART: [art] Store priv key in slot 0x5
23,518,693 UART: [art] Derive Key Pair - Done
23,531,587 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,245,055 UART: [art] Erasing AUTHORITY.KEYID = 7
25,246,573 UART: [art] PUB.X = FC4B3FA76DFDC1DC5D6EC5B50E9B2A3D8D5E2E4EAE124CA1A5C30820F7BAA6B827D310736B7150A52A0CB759F8599818
25,253,864 UART: [art] PUB.Y = E5C61EE95365E334A16F7FEAAD72EE9484635CAC15CBAA6D6F7B806B0B46FECC7DF79B452F6597E169438E694F74D1CD
25,261,082 UART: [art] SIG.R = 8A1EF37D7A86069576B06F8AA7D969C96DFC73CAF2C4C27D0D6496E16CBB5C7F11B1D437F3A8CA73A8162EB6A3F3DF8F
25,268,552 UART: [art] SIG.S = DE86D32AEF577F27783E9DD40E8B2C39B4E03FC3F319BD994B22CA4C5415369FE5E907CDB615D33566C509F26C922DA1
26,247,191 UART: Caliptra RT
26,247,925 UART: [state] CFI Enabled
26,429,250 UART: [rt] RT listening for mailbox commands...
26,431,111 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,460,597 UART: [rt]cmd =0x46504c54, len=4
26,462,278 >>> mbox cmd response data (8 bytes)
26,463,279 UART: [rt] FIPS self test
26,464,239 UART: [kat] ++
26,464,696 UART: [kat] sha1
26,469,292 UART: [kat] SHA2-256
26,471,178 UART: [kat] SHA2-384
26,474,087 UART: [kat] SHA2-512-ACC
26,475,144 UART: Fatal Error: 0x90050001
26,510,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,660,332 >>> mbox cmd response: failed
26,661,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,810,905 >>> mbox cmd response: failed
Initializing fuses
948 writing to cptra_bootfsm_go
3,421,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,824,442 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,222 writing to cptra_bootfsm_go
192,578 UART:
192,961 UART: Running Caliptra ROM ...
194,158 UART:
603,930 UART: [state] CFI Enabled
616,484 UART: [state] LifecycleState = Unprovisioned
618,906 UART: [state] DebugLocked = No
621,303 UART: [state] WD Timer not started. Device not locked for debugging
625,423 UART: [kat] SHA2-256
815,277 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,062 UART: [kat] ++
826,679 UART: [kat] sha1
836,786 UART: [kat] SHA2-256
839,805 UART: [kat] SHA2-384
845,023 UART: [kat] SHA2-512-ACC
847,617 UART: [kat] ECC-384
3,289,839 UART: [kat] HMAC-384Kdf
3,302,536 UART: [kat] LMS
3,834,315 UART: [kat] --
3,840,023 UART: [cold-reset] ++
3,841,612 UART: [fht] FHT @ 0x50003400
3,853,236 UART: [idev] ++
3,853,898 UART: [idev] CDI.KEYID = 6
3,854,939 UART: [idev] SUBJECT.KEYID = 7
3,856,048 UART: [idev] UDS.KEYID = 0
3,856,985 ready_for_fw is high
3,857,238 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,007,236 UART: [idev] Erasing UDS.KEYID = 0
6,333,497 UART: [idev] Sha1 KeyId Algorithm
6,355,509 UART: [idev] --
6,360,644 UART: [ldev] ++
6,361,325 UART: [ldev] CDI.KEYID = 6
6,362,209 UART: [ldev] SUBJECT.KEYID = 5
6,363,425 UART: [ldev] AUTHORITY.KEYID = 7
6,364,661 UART: [ldev] FE.KEYID = 1
6,375,452 UART: [ldev] Erasing FE.KEYID = 1
8,852,079 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,568,943 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,584,141 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,599,330 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,614,453 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,634,201 UART: [ldev] --
10,639,803 UART: [fwproc] Wait for Commands...
10,641,419 UART: [fwproc] Recv command 0x46574c44
10,643,735 UART: [fwproc] Recv'd Img size: 119428 bytes
14,157,365 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,232,006 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,355,642 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,920,509 >>> mbox cmd response: success
14,924,340 UART: [afmc] ++
14,925,048 UART: [afmc] CDI.KEYID = 6
14,926,164 UART: [afmc] SUBJECT.KEYID = 7
14,927,704 UART: [afmc] AUTHORITY.KEYID = 5
17,429,876 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,151,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,153,140 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,168,216 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,183,362 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,198,270 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,221,255 UART: [afmc] --
19,224,150 UART: [cold-reset] --
19,226,938 UART: [state] Locking Datavault
19,231,656 UART: [state] Locking PCR0, PCR1 and PCR31
19,233,846 UART: [state] Locking ICCM
19,235,460 UART: [exit] Launching FMC @ 0x40000130
19,244,078 UART:
19,244,320 UART: Running Caliptra FMC ...
19,245,422 UART:
19,245,583 UART: [state] CFI Enabled
19,253,472 UART: [fht] FMC Alias Private Key: 7
21,019,513 UART: [art] Extend RT PCRs Done
21,020,741 UART: [art] Lock RT PCRs Done
21,022,184 UART: [art] Populate DV Done
21,027,604 UART: [fht] FMC Alias Private Key: 7
21,029,202 UART: [art] Derive CDI
21,029,945 UART: [art] Store in slot 0x4
21,072,375 UART: [art] Derive Key Pair
21,073,379 UART: [art] Store priv key in slot 0x5
23,499,642 UART: [art] Derive Key Pair - Done
23,512,645 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,218,919 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,425 UART: [art] PUB.X = 770C3BAB2C6261D2107DF623FA6B82BEEB6385E6C2126F34A708A574FBBC23E0BA67BFDEDDF04CEB257403DE2673C553
25,227,711 UART: [art] PUB.Y = E0BE44F287417A43E1F97A7E866599A441451AC0D5EB6F4CF86F1731CC761B4263007B537C7084D61E6508E75B9C1D42
25,234,926 UART: [art] SIG.R = BCDE1676766FE179A6672D8DE5A7854F0424AF6BA4794BC4E7B1135EB08A57C13E7C93B26E2F011106E22BE16EBF422A
25,242,300 UART: [art] SIG.S = 0F82AFB15C5659F6E1B86A294ED52AA4972544A84ACFC66FB5037812EBBD1675F45F9D018D88B9FA6E405DEEA357A68A
26,221,255 UART: Caliptra RT
26,221,962 UART: [state] CFI Enabled
26,354,832 UART: [rt] RT listening for mailbox commands...
26,356,686 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,386,436 UART: [rt]cmd =0x46504c54, len=4
26,387,780 >>> mbox cmd response data (8 bytes)
26,388,921 UART: [rt] FIPS self test
26,389,869 UART: [kat] ++
26,390,328 UART: [kat] sha1
26,394,571 UART: [kat] SHA2-256
26,396,449 UART: [kat] SHA2-384
26,399,416 UART: [kat] SHA2-512-ACC
26,400,316 UART: Fatal Error: 0x90050001
26,435,471 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,585,483 >>> mbox cmd response: failed
26,586,135 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,736,046 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
190,034 UART:
190,326 UART: Running Caliptra ROM ...
191,441 UART:
13,799,737 UART: [state] CFI Enabled
13,813,797 UART: [state] LifecycleState = Unprovisioned
13,816,161 UART: [state] DebugLocked = No
13,818,201 UART: [state] WD Timer not started. Device not locked for debugging
13,823,379 UART: [kat] SHA2-256
14,013,269 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,024,069 UART: [kat] ++
14,024,625 UART: [kat] sha1
14,037,093 UART: [kat] SHA2-256
14,040,122 UART: [kat] SHA2-384
14,046,215 UART: [kat] SHA2-512-ACC
14,048,816 UART: [kat] ECC-384
16,486,974 UART: [kat] HMAC-384Kdf
16,498,941 UART: [kat] LMS
17,030,768 UART: [kat] --
17,033,629 UART: [cold-reset] ++
17,036,109 UART: [fht] FHT @ 0x50003400
17,048,392 UART: [idev] ++
17,049,080 UART: [idev] CDI.KEYID = 6
17,050,105 UART: [idev] SUBJECT.KEYID = 7
17,051,271 UART: [idev] UDS.KEYID = 0
17,053,069 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,203,322 UART: [idev] Erasing UDS.KEYID = 0
19,529,578 UART: [idev] Sha1 KeyId Algorithm
19,552,167 UART: [idev] --
19,557,681 UART: [ldev] ++
19,558,366 UART: [ldev] CDI.KEYID = 6
19,559,296 UART: [ldev] SUBJECT.KEYID = 5
19,560,619 UART: [ldev] AUTHORITY.KEYID = 7
19,561,819 UART: [ldev] FE.KEYID = 1
19,570,585 UART: [ldev] Erasing FE.KEYID = 1
22,049,705 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,766,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,781,721 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,796,902 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,811,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,832,254 UART: [ldev] --
23,836,884 UART: [fwproc] Wait for Commands...
23,839,742 UART: [fwproc] Recv command 0x46574c44
23,842,068 UART: [fwproc] Recv'd Img size: 119428 bytes
27,351,057 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,423,720 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,547,319 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,112,919 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
3,753,530 ready_for_fw is high
3,753,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,051,649 >>> mbox cmd response: success
19,306,749 UART:
19,307,147 UART: Running Caliptra FMC ...
19,308,275 UART:
19,308,437 UART: [state] CFI Enabled
19,316,609 UART: [fht] FMC Alias Private Key: 7
21,082,353 UART: [art] Extend RT PCRs Done
21,083,584 UART: [art] Lock RT PCRs Done
21,085,351 UART: [art] Populate DV Done
21,090,667 UART: [fht] FMC Alias Private Key: 7
21,092,222 UART: [art] Derive CDI
21,092,992 UART: [art] Store in slot 0x4
21,135,763 UART: [art] Derive Key Pair
21,136,769 UART: [art] Store priv key in slot 0x5
23,563,799 UART: [art] Derive Key Pair - Done
23,576,774 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,283,338 UART: [art] Erasing AUTHORITY.KEYID = 7
25,284,863 UART: [art] PUB.X = C26F8B5EA4F538F23F1A9B41A3B846BFFAE3ABA95DEA2446B3AC68AB0D9D940014B06E2192959A7C26CCDF9C556315CD
25,292,114 UART: [art] PUB.Y = 52E8FA75469C3E38BAC84E781F1B4C8C33D8C513996B4BA55B289E3D18ECE2DC4DBC188AE37897BB130C72B598B7CC7F
25,299,370 UART: [art] SIG.R = B65A54183DDE1A48211FA952B1C1B92A96A81D8C7F9A9127ED66E320B62DD8A09DC6FAD15582D1E1D6ED921BF2C34120
25,306,822 UART: [art] SIG.S = 0CBBAFB9535C602D1ADB300018B4CF62519CE8373A80791FD3BC16890B8C071EC272B7357D5A8F7D653CC28FD55957EB
26,285,363 UART: Caliptra RT
26,286,115 UART: [state] CFI Enabled
26,419,615 UART: [rt] RT listening for mailbox commands...
26,421,479 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,451,088 UART: [rt]cmd =0x46504c54, len=4
26,452,679 >>> mbox cmd response data (8 bytes)
26,454,025 UART: [rt] FIPS self test
26,454,978 UART: [kat] ++
26,455,433 UART: [kat] sha1
26,459,891 UART: [kat] SHA2-256
26,461,778 UART: [kat] SHA2-384
26,464,527 UART: [kat] SHA2-512-ACC
26,465,583 UART: Fatal Error: 0x90050001
26,500,974 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,650,866 >>> mbox cmd response: failed
26,651,509 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,801,448 >>> mbox cmd response: failed
Initializing fuses
953 writing to cptra_bootfsm_go
16,888,897 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,185,086 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,377 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,045 UART: [kat] SHA2-256
881,976 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,091 UART: [kat] ++
886,243 UART: [kat] sha1
890,557 UART: [kat] SHA2-256
892,495 UART: [kat] SHA2-384
895,158 UART: [kat] SHA2-512-ACC
897,059 UART: [kat] ECC-384
902,620 UART: [kat] HMAC-384Kdf
907,160 UART: [kat] LMS
1,475,356 UART: [kat] --
1,476,321 UART: [cold-reset] ++
1,476,785 UART: [fht] Storing FHT @ 0x50003400
1,479,522 UART: [idev] ++
1,479,690 UART: [idev] CDI.KEYID = 6
1,480,050 UART: [idev] SUBJECT.KEYID = 7
1,480,474 UART: [idev] UDS.KEYID = 0
1,480,819 ready_for_fw is high
1,480,819 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,734 UART: [idev] Erasing UDS.KEYID = 0
1,505,326 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,120 UART: [idev] --
1,515,153 UART: [ldev] ++
1,515,321 UART: [ldev] CDI.KEYID = 6
1,515,684 UART: [ldev] SUBJECT.KEYID = 5
1,516,110 UART: [ldev] AUTHORITY.KEYID = 7
1,516,573 UART: [ldev] FE.KEYID = 1
1,521,595 UART: [ldev] Erasing FE.KEYID = 1
1,546,390 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,965 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,681 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,572 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,284 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,324 UART: [ldev] --
1,585,617 UART: [fwproc] Waiting for Commands...
1,586,304 UART: [fwproc] Received command 0x46574c44
1,587,095 UART: [fwproc] Received Image of size 119428 bytes
2,942,697 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,835 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,053 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,760 >>> mbox cmd response: success
3,143,788 UART: [afmc] ++
3,143,956 UART: [afmc] CDI.KEYID = 6
3,144,318 UART: [afmc] SUBJECT.KEYID = 7
3,144,743 UART: [afmc] AUTHORITY.KEYID = 5
3,178,688 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,194,916 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,195,696 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,405 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,288 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,212,971 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,961 UART: [afmc] --
3,221,975 UART: [cold-reset] --
3,222,577 UART: [state] Locking Datavault
3,223,458 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,062 UART: [state] Locking ICCM
3,224,732 UART: [exit] Launching FMC @ 0x40000130
3,230,062 UART:
3,230,078 UART: Running Caliptra FMC ...
3,230,486 UART:
3,230,540 UART: [state] CFI Enabled
3,240,902 UART: [fht] FMC Alias Private Key: 7
3,360,280 UART: [art] Extend RT PCRs Done
3,360,708 UART: [art] Lock RT PCRs Done
3,362,530 UART: [art] Populate DV Done
3,371,143 UART: [fht] FMC Alias Private Key: 7
3,372,167 UART: [art] Derive CDI
3,372,447 UART: [art] Store in slot 0x4
3,458,065 UART: [art] Derive Key Pair
3,458,425 UART: [art] Store priv key in slot 0x5
3,471,792 UART: [art] Derive Key Pair - Done
3,486,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,175 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,940 UART: [art] PUB.X = 89B760768077871E48CD732D7A72F423AA9A62D92770786FB2568AD171F8BA2033A7635868EF66B58B83D83F6FDEC50B
3,509,705 UART: [art] PUB.Y = 3FADFCF732E22B9379266DFC8B0413A6DF8C32CCD3DC1930B2C0AB1F511E04488740848FBE98BBA890C7B3FFF99538C4
3,516,665 UART: [art] SIG.R = 1200BE978E6B18B308B5278A1DA94D07A96965352E68F1BD9CEC1939C0C54539BD06EB456A7D7629969530FB9CD25F79
3,523,404 UART: [art] SIG.S = 2FD4BA630CBE7BAA3C1F077016DB985885B971CE048EAEBD9AF5D0D8B1ACCA7AA8C97D96A9DB7C500EC3F7AF47193839
3,547,726 UART: Caliptra RT
3,547,977 UART: [state] CFI Enabled
3,668,530 UART: [rt] RT listening for mailbox commands...
3,669,193 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,038 UART: [rt]cmd =0x46504c54, len=4
3,700,126 >>> mbox cmd response data (8 bytes)
3,700,285 UART: [rt] FIPS self test
3,700,613 UART: [kat] ++
3,700,765 UART: [kat] sha1
3,705,007 UART: [kat] SHA2-256
3,707,029 UART: [kat] SHA2-384
3,709,726 UART: [kat] SHA2-512-ACC
3,710,210 UART: Fatal Error: 0x90050001
3,711,749 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,754 >>> mbox cmd response: failed
3,711,754 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,711,759 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,152 UART: [state] LifecycleState = Unprovisioned
85,807 UART: [state] DebugLocked = No
86,503 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,983 UART: [kat] SHA2-256
881,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,029 UART: [kat] ++
886,181 UART: [kat] sha1
890,549 UART: [kat] SHA2-256
892,487 UART: [kat] SHA2-384
895,320 UART: [kat] SHA2-512-ACC
897,221 UART: [kat] ECC-384
902,866 UART: [kat] HMAC-384Kdf
907,446 UART: [kat] LMS
1,475,642 UART: [kat] --
1,476,553 UART: [cold-reset] ++
1,476,935 UART: [fht] Storing FHT @ 0x50003400
1,479,726 UART: [idev] ++
1,479,894 UART: [idev] CDI.KEYID = 6
1,480,254 UART: [idev] SUBJECT.KEYID = 7
1,480,678 UART: [idev] UDS.KEYID = 0
1,481,023 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,228 UART: [idev] Erasing UDS.KEYID = 0
1,504,658 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,146 UART: [idev] --
1,514,351 UART: [ldev] ++
1,514,519 UART: [ldev] CDI.KEYID = 6
1,514,882 UART: [ldev] SUBJECT.KEYID = 5
1,515,308 UART: [ldev] AUTHORITY.KEYID = 7
1,515,771 UART: [ldev] FE.KEYID = 1
1,520,783 UART: [ldev] Erasing FE.KEYID = 1
1,546,910 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,401 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,117 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,008 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,720 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,832 UART: [ldev] --
1,586,147 UART: [fwproc] Waiting for Commands...
1,586,864 UART: [fwproc] Received command 0x46574c44
1,587,655 UART: [fwproc] Received Image of size 119428 bytes
2,942,619 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,417 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,635 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,380 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,543 ready_for_fw is high
1,362,543 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,268 >>> mbox cmd response: success
3,052,187 UART:
3,052,203 UART: Running Caliptra FMC ...
3,052,611 UART:
3,052,665 UART: [state] CFI Enabled
3,063,113 UART: [fht] FMC Alias Private Key: 7
3,182,139 UART: [art] Extend RT PCRs Done
3,182,567 UART: [art] Lock RT PCRs Done
3,184,047 UART: [art] Populate DV Done
3,192,302 UART: [fht] FMC Alias Private Key: 7
3,193,476 UART: [art] Derive CDI
3,193,756 UART: [art] Store in slot 0x4
3,279,498 UART: [art] Derive Key Pair
3,279,858 UART: [art] Store priv key in slot 0x5
3,293,211 UART: [art] Derive Key Pair - Done
3,307,727 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,323,778 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,543 UART: [art] PUB.X = 50E55BD88E321FA0A12269B6B88DE347536E7245CE0ADDC5E553621501778A28D51D81A7102DFC31507400EBEA1435DF
3,331,287 UART: [art] PUB.Y = 407AC7CE1C8E498095E7BC94A20EA3DB3DDC70E9912BAEDC28B477C7E25FB0733E2E04A6C282A698CBAEBD01FB4660A8
3,338,250 UART: [art] SIG.R = 63EE41BF90D73A6D8BD5BC048CB34C7751059CE0362217EC661ACDA1F31849504D27C1FCAA2E2824E5391DDA49615925
3,345,020 UART: [art] SIG.S = E4876263323CA4758F0D83CC43654A1935DDAA20E6EFF67F297DB6C558080C58FD66BF132C9783F7D3611F976430C582
3,369,125 UART: Caliptra RT
3,369,376 UART: [state] CFI Enabled
3,489,652 UART: [rt] RT listening for mailbox commands...
3,490,315 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,198 UART: [rt]cmd =0x46504c54, len=4
3,521,410 >>> mbox cmd response data (8 bytes)
3,521,667 UART: [rt] FIPS self test
3,521,995 UART: [kat] ++
3,522,147 UART: [kat] sha1
3,526,363 UART: [kat] SHA2-256
3,528,385 UART: [kat] SHA2-384
3,531,382 UART: [kat] SHA2-512-ACC
3,532,018 UART: Fatal Error: 0x90050001
3,533,557 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,562 >>> mbox cmd response: failed
3,533,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,533,567 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,899 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,990,122 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,438 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,976 UART: [kat] SHA2-256
881,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,022 UART: [kat] ++
886,174 UART: [kat] sha1
890,456 UART: [kat] SHA2-256
892,394 UART: [kat] SHA2-384
895,309 UART: [kat] SHA2-512-ACC
897,210 UART: [kat] ECC-384
902,809 UART: [kat] HMAC-384Kdf
907,321 UART: [kat] LMS
1,475,517 UART: [kat] --
1,476,354 UART: [cold-reset] ++
1,476,828 UART: [fht] Storing FHT @ 0x50003400
1,479,701 UART: [idev] ++
1,479,869 UART: [idev] CDI.KEYID = 6
1,480,229 UART: [idev] SUBJECT.KEYID = 7
1,480,653 UART: [idev] UDS.KEYID = 0
1,480,998 ready_for_fw is high
1,480,998 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,681 UART: [idev] Erasing UDS.KEYID = 0
1,505,305 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,831 UART: [idev] --
1,514,896 UART: [ldev] ++
1,515,064 UART: [ldev] CDI.KEYID = 6
1,515,427 UART: [ldev] SUBJECT.KEYID = 5
1,515,853 UART: [ldev] AUTHORITY.KEYID = 7
1,516,316 UART: [ldev] FE.KEYID = 1
1,521,844 UART: [ldev] Erasing FE.KEYID = 1
1,547,715 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,324 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,040 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,931 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,643 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,663 UART: [ldev] --
1,587,168 UART: [fwproc] Waiting for Commands...
1,587,947 UART: [fwproc] Received command 0x46574c44
1,588,738 UART: [fwproc] Received Image of size 119428 bytes
2,944,266 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,178 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,396 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,111 >>> mbox cmd response: success
3,145,363 UART: [afmc] ++
3,145,531 UART: [afmc] CDI.KEYID = 6
3,145,893 UART: [afmc] SUBJECT.KEYID = 7
3,146,318 UART: [afmc] AUTHORITY.KEYID = 5
3,180,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,153 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,933 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,642 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,525 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,208 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,250 UART: [afmc] --
3,224,238 UART: [cold-reset] --
3,224,946 UART: [state] Locking Datavault
3,226,225 UART: [state] Locking PCR0, PCR1 and PCR31
3,226,829 UART: [state] Locking ICCM
3,227,411 UART: [exit] Launching FMC @ 0x40000130
3,232,741 UART:
3,232,757 UART: Running Caliptra FMC ...
3,233,165 UART:
3,233,308 UART: [state] CFI Enabled
3,244,272 UART: [fht] FMC Alias Private Key: 7
3,363,306 UART: [art] Extend RT PCRs Done
3,363,734 UART: [art] Lock RT PCRs Done
3,365,424 UART: [art] Populate DV Done
3,373,823 UART: [fht] FMC Alias Private Key: 7
3,374,955 UART: [art] Derive CDI
3,375,235 UART: [art] Store in slot 0x4
3,460,955 UART: [art] Derive Key Pair
3,461,315 UART: [art] Store priv key in slot 0x5
3,474,068 UART: [art] Derive Key Pair - Done
3,488,616 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,503,737 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,502 UART: [art] PUB.X = 7E749A5B46878B11DAE1987CB1F2442CDEDD08ED50B177C0353011CAEF03DF864B8CA9D2BF687688F91289047772E0F4
3,511,269 UART: [art] PUB.Y = 9D2B2A99C22B6D0B76E0D37ABB69775FE7049F024162E776491C0291A74274F15FF333F7EC5A1F7F42D3A469BD4BCFB5
3,518,215 UART: [art] SIG.R = FB0F9BB0B053BF905479686FC4CDC2BE78A83467D0C54A97931D7D029BEB9E8292CED5BEF77C597F8164561A835EEDB8
3,524,993 UART: [art] SIG.S = 0694445B93853F799E33839A98DFFC6DD002BA58B85D1B814965210C19B1133D66FD55F05C9A8202AD7FBDAC13224545
3,549,111 UART: Caliptra RT
3,549,454 UART: [state] CFI Enabled
3,670,262 UART: [rt] RT listening for mailbox commands...
3,670,925 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,784 UART: [rt]cmd =0x46504c54, len=4
3,701,854 >>> mbox cmd response data (8 bytes)
3,702,023 UART: [rt] FIPS self test
3,702,351 UART: [kat] ++
3,702,503 UART: [kat] sha1
3,706,757 UART: [kat] SHA2-256
3,708,779 UART: [kat] SHA2-384
3,711,620 UART: [kat] SHA2-512-ACC
3,712,298 UART: Fatal Error: 0x90050001
3,713,837 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,842 >>> mbox cmd response: failed
3,713,842 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,713,847 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,116 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,734 UART: [kat] SHA2-256
882,665 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,780 UART: [kat] ++
886,932 UART: [kat] sha1
891,256 UART: [kat] SHA2-256
893,194 UART: [kat] SHA2-384
895,797 UART: [kat] SHA2-512-ACC
897,698 UART: [kat] ECC-384
902,921 UART: [kat] HMAC-384Kdf
907,501 UART: [kat] LMS
1,475,697 UART: [kat] --
1,476,690 UART: [cold-reset] ++
1,477,168 UART: [fht] Storing FHT @ 0x50003400
1,480,101 UART: [idev] ++
1,480,269 UART: [idev] CDI.KEYID = 6
1,480,629 UART: [idev] SUBJECT.KEYID = 7
1,481,053 UART: [idev] UDS.KEYID = 0
1,481,398 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,265 UART: [idev] Erasing UDS.KEYID = 0
1,506,525 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,255 UART: [idev] --
1,516,488 UART: [ldev] ++
1,516,656 UART: [ldev] CDI.KEYID = 6
1,517,019 UART: [ldev] SUBJECT.KEYID = 5
1,517,445 UART: [ldev] AUTHORITY.KEYID = 7
1,517,908 UART: [ldev] FE.KEYID = 1
1,523,068 UART: [ldev] Erasing FE.KEYID = 1
1,548,523 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,058 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,774 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,665 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,663 UART: [ldev] --
1,588,086 UART: [fwproc] Waiting for Commands...
1,588,827 UART: [fwproc] Received command 0x46574c44
1,589,618 UART: [fwproc] Received Image of size 119428 bytes
2,944,182 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,628 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,846 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,539 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,424 ready_for_fw is high
1,362,424 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,317 >>> mbox cmd response: success
3,056,034 UART:
3,056,050 UART: Running Caliptra FMC ...
3,056,458 UART:
3,056,601 UART: [state] CFI Enabled
3,067,411 UART: [fht] FMC Alias Private Key: 7
3,186,143 UART: [art] Extend RT PCRs Done
3,186,571 UART: [art] Lock RT PCRs Done
3,188,155 UART: [art] Populate DV Done
3,196,278 UART: [fht] FMC Alias Private Key: 7
3,197,294 UART: [art] Derive CDI
3,197,574 UART: [art] Store in slot 0x4
3,283,456 UART: [art] Derive Key Pair
3,283,816 UART: [art] Store priv key in slot 0x5
3,296,919 UART: [art] Derive Key Pair - Done
3,311,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,026 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,791 UART: [art] PUB.X = 62BF1D1201CB557192232B1C175A71EC4043FE4F49502C274C0F0541A968BF34B3E7D926812F62B18C918D96B4D0F9CA
3,334,552 UART: [art] PUB.Y = 567A3B1021CF58DA3D2C9BD0EEBDF56087D0D2AE1F3A9DCAA128F822784CCB1CCF854DF52A39E480C3C7F8A5B7332651
3,341,522 UART: [art] SIG.R = 2657FA1AD1FDA8B680E484B83888C29728486F3E1D8AF6C4B92C6807DE3A008ED4191BC3BD8684965509B4F9665FFD6B
3,348,270 UART: [art] SIG.S = 1FFB584917A1AA8F20713A40EAAE3B57BDE16D0A1458E4D53C798C60E872F39EBB82CC2872289F90589898A112353A8F
3,372,327 UART: Caliptra RT
3,372,670 UART: [state] CFI Enabled
3,493,021 UART: [rt] RT listening for mailbox commands...
3,493,684 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,281 UART: [rt]cmd =0x46504c54, len=4
3,524,409 >>> mbox cmd response data (8 bytes)
3,524,746 UART: [rt] FIPS self test
3,525,074 UART: [kat] ++
3,525,226 UART: [kat] sha1
3,529,326 UART: [kat] SHA2-256
3,531,348 UART: [kat] SHA2-384
3,534,059 UART: [kat] SHA2-512-ACC
3,534,751 UART: Fatal Error: 0x90050001
3,536,290 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,295 >>> mbox cmd response: failed
3,536,295 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,300 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,838 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,994,001 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,541 UART: [state] WD Timer not started. Device not locked for debugging
87,760 UART: [kat] SHA2-256
891,310 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,414 UART: [kat] ++
895,566 UART: [kat] sha1
899,912 UART: [kat] SHA2-256
901,852 UART: [kat] SHA2-384
904,429 UART: [kat] SHA2-512-ACC
906,330 UART: [kat] ECC-384
915,805 UART: [kat] HMAC-384Kdf
920,371 UART: [kat] LMS
1,168,683 UART: [kat] --
1,169,770 UART: [cold-reset] ++
1,170,346 UART: [fht] FHT @ 0x50003400
1,172,960 UART: [idev] ++
1,173,128 UART: [idev] CDI.KEYID = 6
1,173,489 UART: [idev] SUBJECT.KEYID = 7
1,173,914 UART: [idev] UDS.KEYID = 0
1,174,260 ready_for_fw is high
1,174,260 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,083 UART: [idev] Erasing UDS.KEYID = 0
1,198,685 UART: [idev] Sha1 KeyId Algorithm
1,207,473 UART: [idev] --
1,208,568 UART: [ldev] ++
1,208,736 UART: [ldev] CDI.KEYID = 6
1,209,100 UART: [ldev] SUBJECT.KEYID = 5
1,209,527 UART: [ldev] AUTHORITY.KEYID = 7
1,209,990 UART: [ldev] FE.KEYID = 1
1,215,552 UART: [ldev] Erasing FE.KEYID = 1
1,241,289 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,763 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,479 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,368 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,080 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,008 UART: [ldev] --
1,280,371 UART: [fwproc] Wait for Commands...
1,281,100 UART: [fwproc] Recv command 0x46574c44
1,281,833 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,863 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,038 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,711 >>> mbox cmd response: success
2,837,875 UART: [afmc] ++
2,838,043 UART: [afmc] CDI.KEYID = 6
2,838,406 UART: [afmc] SUBJECT.KEYID = 7
2,838,832 UART: [afmc] AUTHORITY.KEYID = 5
2,874,883 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,374 UART: [afmc] --
2,918,347 UART: [cold-reset] --
2,919,181 UART: [state] Locking Datavault
2,920,206 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,810 UART: [state] Locking ICCM
2,921,428 UART: [exit] Launching FMC @ 0x40000130
2,926,758 UART:
2,926,774 UART: Running Caliptra FMC ...
2,927,182 UART:
2,927,236 UART: [state] CFI Enabled
2,937,612 UART: [fht] FMC Alias Private Key: 7
3,056,514 UART: [art] Extend RT PCRs Done
3,056,942 UART: [art] Lock RT PCRs Done
3,058,376 UART: [art] Populate DV Done
3,066,803 UART: [fht] FMC Alias Private Key: 7
3,067,833 UART: [art] Derive CDI
3,068,113 UART: [art] Store in slot 0x4
3,153,438 UART: [art] Derive Key Pair
3,153,798 UART: [art] Store priv key in slot 0x5
3,167,398 UART: [art] Derive Key Pair - Done
3,182,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,660 UART: [art] Erasing AUTHORITY.KEYID = 7
3,198,425 UART: [art] PUB.X = 972D5309FFBF1B9345479989D32846B814910341598B08877EB13D7CF317D3BAC7E0A2C10C66B11EBDF3F9E36D2D61AC
3,205,187 UART: [art] PUB.Y = 3684E1BFAF1C73C7D2F598B4B2DA02FB35202DC72391E547D96BD2BD85F89116E37AA77AB5489698F0C3D510EA17BFF1
3,212,146 UART: [art] SIG.R = BC2F03C8395605D1D020AD252ED8F2CDCCD8E150F38CCF0D30D73FBABC472513186E3CB44C55E6C2F2A8E45AB409B966
3,218,922 UART: [art] SIG.S = 740502BE439055D07ECC430D042E96CE1A6EB4AD12C8C83C596AB698645176E322AF5F4B18CADE2E62ED77D6ECFBA437
3,243,114 UART: Caliptra RT
3,243,365 UART: [state] CFI Enabled
3,362,668 UART: [rt] RT listening for mailbox commands...
3,363,331 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,412 UART: [rt]cmd =0x46504c54, len=4
3,394,596 >>> mbox cmd response data (8 bytes)
3,394,943 UART: [rt] FIPS self test
3,395,271 UART: [kat] ++
3,395,423 UART: [kat] sha1
3,399,685 UART: [kat] SHA2-256
3,401,707 UART: [kat] SHA2-384
3,404,536 UART: [kat] SHA2-512-ACC
3,405,196 UART: Fatal Error: 0x90050001
3,406,735 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,740 >>> mbox cmd response: failed
3,406,740 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,745 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,030 UART: [state] LifecycleState = Unprovisioned
85,685 UART: [state] DebugLocked = No
86,179 UART: [state] WD Timer not started. Device not locked for debugging
87,300 UART: [kat] SHA2-256
890,850 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,954 UART: [kat] ++
895,106 UART: [kat] sha1
899,394 UART: [kat] SHA2-256
901,334 UART: [kat] SHA2-384
904,129 UART: [kat] SHA2-512-ACC
906,030 UART: [kat] ECC-384
915,781 UART: [kat] HMAC-384Kdf
920,445 UART: [kat] LMS
1,168,757 UART: [kat] --
1,169,810 UART: [cold-reset] ++
1,170,312 UART: [fht] FHT @ 0x50003400
1,172,924 UART: [idev] ++
1,173,092 UART: [idev] CDI.KEYID = 6
1,173,453 UART: [idev] SUBJECT.KEYID = 7
1,173,878 UART: [idev] UDS.KEYID = 0
1,174,224 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,529 UART: [idev] Erasing UDS.KEYID = 0
1,198,037 UART: [idev] Sha1 KeyId Algorithm
1,206,791 UART: [idev] --
1,207,858 UART: [ldev] ++
1,208,026 UART: [ldev] CDI.KEYID = 6
1,208,390 UART: [ldev] SUBJECT.KEYID = 5
1,208,817 UART: [ldev] AUTHORITY.KEYID = 7
1,209,280 UART: [ldev] FE.KEYID = 1
1,214,642 UART: [ldev] Erasing FE.KEYID = 1
1,240,461 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,697 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,413 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,302 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,014 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,196 UART: [ldev] --
1,279,645 UART: [fwproc] Wait for Commands...
1,280,446 UART: [fwproc] Recv command 0x46574c44
1,281,179 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,512 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,299 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,474 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,175 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.36s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,448 ready_for_fw is high
1,059,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,058 >>> mbox cmd response: success
2,752,099 UART:
2,752,115 UART: Running Caliptra FMC ...
2,752,523 UART:
2,752,577 UART: [state] CFI Enabled
2,763,375 UART: [fht] FMC Alias Private Key: 7
2,882,315 UART: [art] Extend RT PCRs Done
2,882,743 UART: [art] Lock RT PCRs Done
2,884,345 UART: [art] Populate DV Done
2,892,662 UART: [fht] FMC Alias Private Key: 7
2,893,774 UART: [art] Derive CDI
2,894,054 UART: [art] Store in slot 0x4
2,980,409 UART: [art] Derive Key Pair
2,980,769 UART: [art] Store priv key in slot 0x5
2,994,775 UART: [art] Derive Key Pair - Done
3,009,905 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,528 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,293 UART: [art] PUB.X = AD7D716D4D869BCC275CF87844168A47A470AAF49884EDAA4D2261E8C6FB3D79A161EEC3B6C910329274B66D1FE840A7
3,033,073 UART: [art] PUB.Y = DCFE71AEF12D85B3148FC478FB7F226982AC95B7825478031D19E25E5B8CF63BBA9BD37418827BD5D85E81CBA4A8ED0E
3,040,033 UART: [art] SIG.R = 9BF1ED20AD4C8C8389FE2CF6BF1B3A487ECDAE58995E830526CA5D5499AA13C2C970E38EA97620FBFC8210208BC5C8A9
3,046,818 UART: [art] SIG.S = 2322A08D4F04EE098F3C7A1665DBA123D060729CE59783C925C50F9D1D40B356E396D8E8F2B7BD8BE276D0624EFAA207
3,070,758 UART: Caliptra RT
3,071,009 UART: [state] CFI Enabled
3,190,280 UART: [rt] RT listening for mailbox commands...
3,190,943 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,826 UART: [rt]cmd =0x46504c54, len=4
3,221,976 >>> mbox cmd response data (8 bytes)
3,222,143 UART: [rt] FIPS self test
3,222,471 UART: [kat] ++
3,222,623 UART: [kat] sha1
3,226,851 UART: [kat] SHA2-256
3,228,873 UART: [kat] SHA2-384
3,231,752 UART: [kat] SHA2-512-ACC
3,232,374 UART: Fatal Error: 0x90050001
3,233,913 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,918 >>> mbox cmd response: failed
3,233,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,923 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,866 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,782 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.04s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,237 UART: [state] LifecycleState = Unprovisioned
85,892 UART: [state] DebugLocked = No
86,512 UART: [state] WD Timer not started. Device not locked for debugging
87,855 UART: [kat] SHA2-256
891,405 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,509 UART: [kat] ++
895,661 UART: [kat] sha1
899,881 UART: [kat] SHA2-256
901,821 UART: [kat] SHA2-384
904,676 UART: [kat] SHA2-512-ACC
906,577 UART: [kat] ECC-384
916,398 UART: [kat] HMAC-384Kdf
920,996 UART: [kat] LMS
1,169,308 UART: [kat] --
1,170,091 UART: [cold-reset] ++
1,170,575 UART: [fht] FHT @ 0x50003400
1,173,219 UART: [idev] ++
1,173,387 UART: [idev] CDI.KEYID = 6
1,173,748 UART: [idev] SUBJECT.KEYID = 7
1,174,173 UART: [idev] UDS.KEYID = 0
1,174,519 ready_for_fw is high
1,174,519 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,760 UART: [idev] Erasing UDS.KEYID = 0
1,198,996 UART: [idev] Sha1 KeyId Algorithm
1,207,826 UART: [idev] --
1,208,799 UART: [ldev] ++
1,208,967 UART: [ldev] CDI.KEYID = 6
1,209,331 UART: [ldev] SUBJECT.KEYID = 5
1,209,758 UART: [ldev] AUTHORITY.KEYID = 7
1,210,221 UART: [ldev] FE.KEYID = 1
1,215,737 UART: [ldev] Erasing FE.KEYID = 1
1,241,464 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,375 UART: [ldev] --
1,280,768 UART: [fwproc] Wait for Commands...
1,281,387 UART: [fwproc] Recv command 0x46574c44
1,282,120 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,555 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,842 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,017 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,530 >>> mbox cmd response: success
2,838,686 UART: [afmc] ++
2,838,854 UART: [afmc] CDI.KEYID = 6
2,839,217 UART: [afmc] SUBJECT.KEYID = 7
2,839,643 UART: [afmc] AUTHORITY.KEYID = 5
2,875,006 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,243 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,992 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,702 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,583 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,284 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,917 UART: [afmc] --
2,917,900 UART: [cold-reset] --
2,918,542 UART: [state] Locking Datavault
2,919,885 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,489 UART: [state] Locking ICCM
2,921,095 UART: [exit] Launching FMC @ 0x40000130
2,926,425 UART:
2,926,441 UART: Running Caliptra FMC ...
2,926,849 UART:
2,926,992 UART: [state] CFI Enabled
2,937,644 UART: [fht] FMC Alias Private Key: 7
3,057,176 UART: [art] Extend RT PCRs Done
3,057,604 UART: [art] Lock RT PCRs Done
3,059,068 UART: [art] Populate DV Done
3,067,073 UART: [fht] FMC Alias Private Key: 7
3,068,007 UART: [art] Derive CDI
3,068,287 UART: [art] Store in slot 0x4
3,153,940 UART: [art] Derive Key Pair
3,154,300 UART: [art] Store priv key in slot 0x5
3,168,162 UART: [art] Derive Key Pair - Done
3,183,216 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,165 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,930 UART: [art] PUB.X = EC857B3B4A492EA39150676AA12CB375A47D4C1701E0DBE2D60B21F33C9E28BEC623F285846AFF441430DA20886FB277
3,206,700 UART: [art] PUB.Y = 1237EAA474DFC5BE47B108C30C4E66D211A8E44AEC0653496833C9FCADF702D9ACE180AC7F989245CDA9A75033EB8AE4
3,213,654 UART: [art] SIG.R = 1090DF5F55DC6D66A808F6E243247549D78B8D6F0B7ED27F5868045569FF4174CA26FCCC796FA2F22E38FC3FDB019F58
3,220,420 UART: [art] SIG.S = CDF8C437366D33D5D807CC13A94691801D6B33F01C45A0918E0B00749664EEEDC1EFB471E671D08F5066D6B9FB3DC07D
3,244,212 UART: Caliptra RT
3,244,555 UART: [state] CFI Enabled
3,364,290 UART: [rt] RT listening for mailbox commands...
3,364,953 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,722 UART: [rt]cmd =0x46504c54, len=4
3,395,742 >>> mbox cmd response data (8 bytes)
3,396,021 UART: [rt] FIPS self test
3,396,349 UART: [kat] ++
3,396,501 UART: [kat] sha1
3,400,875 UART: [kat] SHA2-256
3,402,897 UART: [kat] SHA2-384
3,405,858 UART: [kat] SHA2-512-ACC
3,406,484 UART: Fatal Error: 0x90050001
3,408,023 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,028 >>> mbox cmd response: failed
3,408,028 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,313 UART: [state] LifecycleState = Unprovisioned
85,968 UART: [state] DebugLocked = No
86,488 UART: [state] WD Timer not started. Device not locked for debugging
87,759 UART: [kat] SHA2-256
891,309 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,413 UART: [kat] ++
895,565 UART: [kat] sha1
899,819 UART: [kat] SHA2-256
901,759 UART: [kat] SHA2-384
904,570 UART: [kat] SHA2-512-ACC
906,471 UART: [kat] ECC-384
916,222 UART: [kat] HMAC-384Kdf
920,832 UART: [kat] LMS
1,169,144 UART: [kat] --
1,170,041 UART: [cold-reset] ++
1,170,533 UART: [fht] FHT @ 0x50003400
1,173,291 UART: [idev] ++
1,173,459 UART: [idev] CDI.KEYID = 6
1,173,820 UART: [idev] SUBJECT.KEYID = 7
1,174,245 UART: [idev] UDS.KEYID = 0
1,174,591 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,498 UART: [idev] Erasing UDS.KEYID = 0
1,199,078 UART: [idev] Sha1 KeyId Algorithm
1,208,136 UART: [idev] --
1,209,357 UART: [ldev] ++
1,209,525 UART: [ldev] CDI.KEYID = 6
1,209,889 UART: [ldev] SUBJECT.KEYID = 5
1,210,316 UART: [ldev] AUTHORITY.KEYID = 7
1,210,779 UART: [ldev] FE.KEYID = 1
1,216,447 UART: [ldev] Erasing FE.KEYID = 1
1,242,852 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,482 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,198 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,749 UART: [ldev] --
1,282,120 UART: [fwproc] Wait for Commands...
1,282,855 UART: [fwproc] Recv command 0x46574c44
1,283,588 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,767 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,368 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,543 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,104 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,383 ready_for_fw is high
1,059,383 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,939 >>> mbox cmd response: success
2,752,666 UART:
2,752,682 UART: Running Caliptra FMC ...
2,753,090 UART:
2,753,233 UART: [state] CFI Enabled
2,763,561 UART: [fht] FMC Alias Private Key: 7
2,882,555 UART: [art] Extend RT PCRs Done
2,882,983 UART: [art] Lock RT PCRs Done
2,884,615 UART: [art] Populate DV Done
2,892,816 UART: [fht] FMC Alias Private Key: 7
2,893,998 UART: [art] Derive CDI
2,894,278 UART: [art] Store in slot 0x4
2,980,117 UART: [art] Derive Key Pair
2,980,477 UART: [art] Store priv key in slot 0x5
2,994,199 UART: [art] Derive Key Pair - Done
3,009,121 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,642 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,407 UART: [art] PUB.X = 1FF14DF76D85EF0CD5139F6A596944667216343CA7F5E76DAC35378767E793FB52C2316183A8D837F67674B6F863F344
3,032,168 UART: [art] PUB.Y = 12D25E0762F7797CB8AF85A95B1780CFFB0DFD931A5A628294E50E72C70EFC532465545BBA9BF75408735AFC3F9A4254
3,039,109 UART: [art] SIG.R = 632630D78AF1E166EF4750D9F37FB91167EDBCB890E532675F9D8CB5D08B15F9254F3F68F35236523139A11B2BF736B3
3,045,879 UART: [art] SIG.S = 89F76BE60FFA95CD48EB56CAF10088A0769BE4D63E722CEEF2F61032B74EE7711C1BAA1088C5F28BE6FB3AFAF5FBC6F2
3,069,450 UART: Caliptra RT
3,069,793 UART: [state] CFI Enabled
3,189,856 UART: [rt] RT listening for mailbox commands...
3,190,519 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,302 UART: [rt]cmd =0x46504c54, len=4
3,221,552 >>> mbox cmd response data (8 bytes)
3,221,805 UART: [rt] FIPS self test
3,222,133 UART: [kat] ++
3,222,285 UART: [kat] sha1
3,226,531 UART: [kat] SHA2-256
3,228,553 UART: [kat] SHA2-384
3,231,248 UART: [kat] SHA2-512-ACC
3,231,860 UART: Fatal Error: 0x90050001
3,233,399 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,404 >>> mbox cmd response: failed
3,233,404 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,409 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,825 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,735 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,244 UART: [state] LifecycleState = Unprovisioned
85,899 UART: [state] DebugLocked = No
86,425 UART: [state] WD Timer not started. Device not locked for debugging
87,588 UART: [kat] SHA2-256
893,238 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,363 UART: [kat] ++
897,515 UART: [kat] sha1
901,711 UART: [kat] SHA2-256
903,651 UART: [kat] SHA2-384
906,492 UART: [kat] SHA2-512-ACC
908,393 UART: [kat] ECC-384
918,008 UART: [kat] HMAC-384Kdf
922,572 UART: [kat] LMS
1,170,900 UART: [kat] --
1,171,693 UART: [cold-reset] ++
1,172,253 UART: [fht] FHT @ 0x50003400
1,174,752 UART: [idev] ++
1,174,920 UART: [idev] CDI.KEYID = 6
1,175,280 UART: [idev] SUBJECT.KEYID = 7
1,175,704 UART: [idev] UDS.KEYID = 0
1,176,049 ready_for_fw is high
1,176,049 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,458 UART: [idev] Erasing UDS.KEYID = 0
1,200,761 UART: [idev] Sha1 KeyId Algorithm
1,209,271 UART: [idev] --
1,210,461 UART: [ldev] ++
1,210,629 UART: [ldev] CDI.KEYID = 6
1,210,992 UART: [ldev] SUBJECT.KEYID = 5
1,211,418 UART: [ldev] AUTHORITY.KEYID = 7
1,211,881 UART: [ldev] FE.KEYID = 1
1,216,793 UART: [ldev] Erasing FE.KEYID = 1
1,242,778 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,171 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,887 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,778 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,525 UART: [ldev] --
1,281,814 UART: [fwproc] Wait for Commands...
1,282,562 UART: [fwproc] Recv command 0x46574c44
1,283,290 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,021 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,424 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,594 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,257 >>> mbox cmd response: success
2,839,311 UART: [afmc] ++
2,839,479 UART: [afmc] CDI.KEYID = 6
2,839,841 UART: [afmc] SUBJECT.KEYID = 7
2,840,266 UART: [afmc] AUTHORITY.KEYID = 5
2,875,661 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,090 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,799 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,682 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,383 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,435 UART: [afmc] --
2,919,549 UART: [cold-reset] --
2,920,453 UART: [state] Locking Datavault
2,921,714 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,318 UART: [state] Locking ICCM
2,922,744 UART: [exit] Launching FMC @ 0x40000130
2,928,074 UART:
2,928,090 UART: Running Caliptra FMC ...
2,928,498 UART:
2,928,552 UART: [state] CFI Enabled
2,939,210 UART: [fht] FMC Alias Private Key: 7
3,058,742 UART: [art] Extend RT PCRs Done
3,059,170 UART: [art] Lock RT PCRs Done
3,060,736 UART: [art] Populate DV Done
3,068,981 UART: [fht] FMC Alias Private Key: 7
3,069,973 UART: [art] Derive CDI
3,070,253 UART: [art] Store in slot 0x4
3,156,616 UART: [art] Derive Key Pair
3,156,976 UART: [art] Store priv key in slot 0x5
3,169,562 UART: [art] Derive Key Pair - Done
3,184,321 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,460 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,225 UART: [art] PUB.X = EFE9E51AF1A2A0FD09434D7EB84F858DFFD6EBD3B2161113A1E7D5D657C4187837B79B96C172E21159C388C49F1C1BA3
3,207,004 UART: [art] PUB.Y = DF13F271EAC46C25C7CBB51CCAE125F5349530CD555778A2B017C0E1CF0019679EB6D69A8D4B78D7EC352232245E9CC8
3,213,942 UART: [art] SIG.R = F85FD5186349F83718F8A20BD4CC26122423797339B167C5DE9AC1A4E4E7F798E31D8DA74BB926A70DAC6999165B9D61
3,220,708 UART: [art] SIG.S = D72BB0894EA347DF56FDCFABB6E62D5C7E97B2299E299F6965599E7FD8CB39761C667BC0C118C86ECB19476E9297B7A1
3,244,562 UART: Caliptra RT
3,244,813 UART: [state] CFI Enabled
3,365,555 UART: [rt] RT listening for mailbox commands...
3,366,218 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,147 UART: [rt]cmd =0x46504c54, len=4
3,397,255 >>> mbox cmd response data (8 bytes)
3,397,388 UART: [rt] FIPS self test
3,397,716 UART: [kat] ++
3,397,868 UART: [kat] sha1
3,402,094 UART: [kat] SHA2-256
3,404,116 UART: [kat] SHA2-384
3,406,933 UART: [kat] SHA2-512-ACC
3,407,439 UART: Fatal Error: 0x90050001
3,408,978 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,983 >>> mbox cmd response: failed
3,408,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,408,988 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,302 UART: [state] LifecycleState = Unprovisioned
85,957 UART: [state] DebugLocked = No
86,627 UART: [state] WD Timer not started. Device not locked for debugging
87,794 UART: [kat] SHA2-256
893,444 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,569 UART: [kat] ++
897,721 UART: [kat] sha1
901,949 UART: [kat] SHA2-256
903,889 UART: [kat] SHA2-384
906,512 UART: [kat] SHA2-512-ACC
908,413 UART: [kat] ECC-384
918,026 UART: [kat] HMAC-384Kdf
922,668 UART: [kat] LMS
1,170,996 UART: [kat] --
1,172,049 UART: [cold-reset] ++
1,172,431 UART: [fht] FHT @ 0x50003400
1,175,092 UART: [idev] ++
1,175,260 UART: [idev] CDI.KEYID = 6
1,175,620 UART: [idev] SUBJECT.KEYID = 7
1,176,044 UART: [idev] UDS.KEYID = 0
1,176,389 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,860 UART: [idev] Erasing UDS.KEYID = 0
1,201,133 UART: [idev] Sha1 KeyId Algorithm
1,209,673 UART: [idev] --
1,210,889 UART: [ldev] ++
1,211,057 UART: [ldev] CDI.KEYID = 6
1,211,420 UART: [ldev] SUBJECT.KEYID = 5
1,211,846 UART: [ldev] AUTHORITY.KEYID = 7
1,212,309 UART: [ldev] FE.KEYID = 1
1,217,581 UART: [ldev] Erasing FE.KEYID = 1
1,244,620 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,055 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,771 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,662 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,374 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,519 UART: [ldev] --
1,284,020 UART: [fwproc] Wait for Commands...
1,284,816 UART: [fwproc] Recv command 0x46574c44
1,285,544 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,375 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,914 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,084 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,725 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,661 ready_for_fw is high
1,060,661 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,048 >>> mbox cmd response: success
2,753,033 UART:
2,753,049 UART: Running Caliptra FMC ...
2,753,457 UART:
2,753,511 UART: [state] CFI Enabled
2,763,893 UART: [fht] FMC Alias Private Key: 7
2,883,501 UART: [art] Extend RT PCRs Done
2,883,929 UART: [art] Lock RT PCRs Done
2,885,253 UART: [art] Populate DV Done
2,893,384 UART: [fht] FMC Alias Private Key: 7
2,894,424 UART: [art] Derive CDI
2,894,704 UART: [art] Store in slot 0x4
2,980,593 UART: [art] Derive Key Pair
2,980,953 UART: [art] Store priv key in slot 0x5
2,994,393 UART: [art] Derive Key Pair - Done
3,009,342 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,709 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,474 UART: [art] PUB.X = 5AB2F23460A8DFB3F964724BF7D84A2306BF9863BB9D1D5E5C925B031EF28BFA46685E19DBF141DA99883095A8F6CE94
3,032,248 UART: [art] PUB.Y = 929FA15E9BF516003B9128436206E524445305FE9FCB6AA584B1EA896EBE631590F0BD3D0EED1E3B327E0559BD5AEB88
3,039,172 UART: [art] SIG.R = 711C445109B106BCE0BB9118F4A83DA71E4342552342D251B0E01E0A7A145ADA33F815159C28E2F2BD47C72C5B09E0A6
3,045,932 UART: [art] SIG.S = 99F05520F67D63BF5BE519B98C9D1FAEDADB265538D5806080839375A8F2E036992513D1D6F30A1F29928B2977B16298
3,069,681 UART: Caliptra RT
3,069,932 UART: [state] CFI Enabled
3,188,949 UART: [rt] RT listening for mailbox commands...
3,189,612 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,265 UART: [rt]cmd =0x46504c54, len=4
3,220,261 >>> mbox cmd response data (8 bytes)
3,220,436 UART: [rt] FIPS self test
3,220,764 UART: [kat] ++
3,220,916 UART: [kat] sha1
3,225,292 UART: [kat] SHA2-256
3,227,314 UART: [kat] SHA2-384
3,230,081 UART: [kat] SHA2-512-ACC
3,230,615 UART: Fatal Error: 0x90050001
3,232,154 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,159 >>> mbox cmd response: failed
3,232,159 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,164 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,523 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,694 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,213 UART: [state] LifecycleState = Unprovisioned
85,868 UART: [state] DebugLocked = No
86,526 UART: [state] WD Timer not started. Device not locked for debugging
87,663 UART: [kat] SHA2-256
893,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,438 UART: [kat] ++
897,590 UART: [kat] sha1
901,802 UART: [kat] SHA2-256
903,742 UART: [kat] SHA2-384
906,395 UART: [kat] SHA2-512-ACC
908,296 UART: [kat] ECC-384
918,097 UART: [kat] HMAC-384Kdf
922,599 UART: [kat] LMS
1,170,927 UART: [kat] --
1,171,910 UART: [cold-reset] ++
1,172,246 UART: [fht] FHT @ 0x50003400
1,174,665 UART: [idev] ++
1,174,833 UART: [idev] CDI.KEYID = 6
1,175,193 UART: [idev] SUBJECT.KEYID = 7
1,175,617 UART: [idev] UDS.KEYID = 0
1,175,962 ready_for_fw is high
1,175,962 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,671 UART: [idev] Erasing UDS.KEYID = 0
1,201,122 UART: [idev] Sha1 KeyId Algorithm
1,209,612 UART: [idev] --
1,210,816 UART: [ldev] ++
1,210,984 UART: [ldev] CDI.KEYID = 6
1,211,347 UART: [ldev] SUBJECT.KEYID = 5
1,211,773 UART: [ldev] AUTHORITY.KEYID = 7
1,212,236 UART: [ldev] FE.KEYID = 1
1,217,436 UART: [ldev] Erasing FE.KEYID = 1
1,244,055 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,574 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,290 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,181 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,893 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,046 UART: [ldev] --
1,283,429 UART: [fwproc] Wait for Commands...
1,284,217 UART: [fwproc] Recv command 0x46574c44
1,284,945 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,736 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,647 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,817 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,332 >>> mbox cmd response: success
2,840,586 UART: [afmc] ++
2,840,754 UART: [afmc] CDI.KEYID = 6
2,841,116 UART: [afmc] SUBJECT.KEYID = 7
2,841,541 UART: [afmc] AUTHORITY.KEYID = 5
2,876,602 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,285 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,033 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,742 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,625 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,326 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,050 UART: [afmc] --
2,919,950 UART: [cold-reset] --
2,920,710 UART: [state] Locking Datavault
2,921,513 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,117 UART: [state] Locking ICCM
2,922,727 UART: [exit] Launching FMC @ 0x40000130
2,928,057 UART:
2,928,073 UART: Running Caliptra FMC ...
2,928,481 UART:
2,928,624 UART: [state] CFI Enabled
2,939,134 UART: [fht] FMC Alias Private Key: 7
3,058,542 UART: [art] Extend RT PCRs Done
3,058,970 UART: [art] Lock RT PCRs Done
3,060,572 UART: [art] Populate DV Done
3,068,799 UART: [fht] FMC Alias Private Key: 7
3,069,943 UART: [art] Derive CDI
3,070,223 UART: [art] Store in slot 0x4
3,155,886 UART: [art] Derive Key Pair
3,156,246 UART: [art] Store priv key in slot 0x5
3,170,298 UART: [art] Derive Key Pair - Done
3,185,231 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,201,172 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,937 UART: [art] PUB.X = 78985AB69A9CBA61DBE181B41538DBB5E77D6E9CD93CE2C84BB82C08D84FAC3666073B7EA389987CDE5BB6B363B87373
3,208,715 UART: [art] PUB.Y = 7D30BF92932A38B4F97CBB891DF5956110742B95BCD14C1CD68AD996A764D131F6E675E53DBDA17CB94B06D3F899FDBF
3,215,676 UART: [art] SIG.R = 0AA2679A772CAFB7A7CAB6C86C2B82AFC8C62A16FA30C3877030C08AE2D5B5A3E546008587814F11352AAC8C6B0B1864
3,222,428 UART: [art] SIG.S = 88631332D1137C9884570EA14BB8234EE309F28E75946C5F83E114D0D0251B8DBFCE622E293EBD187F3721E6B9C3CB14
3,246,566 UART: Caliptra RT
3,246,909 UART: [state] CFI Enabled
3,367,458 UART: [rt] RT listening for mailbox commands...
3,368,121 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,397,712 UART: [rt]cmd =0x46504c54, len=4
3,398,764 >>> mbox cmd response data (8 bytes)
3,399,039 UART: [rt] FIPS self test
3,399,367 UART: [kat] ++
3,399,519 UART: [kat] sha1
3,403,879 UART: [kat] SHA2-256
3,405,901 UART: [kat] SHA2-384
3,408,698 UART: [kat] SHA2-512-ACC
3,409,268 UART: Fatal Error: 0x90050001
3,410,807 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,812 >>> mbox cmd response: failed
3,410,812 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,817 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,694 UART: [state] WD Timer not started. Device not locked for debugging
87,937 UART: [kat] SHA2-256
893,587 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,712 UART: [kat] ++
897,864 UART: [kat] sha1
901,894 UART: [kat] SHA2-256
903,834 UART: [kat] SHA2-384
906,461 UART: [kat] SHA2-512-ACC
908,362 UART: [kat] ECC-384
918,197 UART: [kat] HMAC-384Kdf
922,843 UART: [kat] LMS
1,171,171 UART: [kat] --
1,172,256 UART: [cold-reset] ++
1,172,780 UART: [fht] FHT @ 0x50003400
1,175,585 UART: [idev] ++
1,175,753 UART: [idev] CDI.KEYID = 6
1,176,113 UART: [idev] SUBJECT.KEYID = 7
1,176,537 UART: [idev] UDS.KEYID = 0
1,176,882 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,593 UART: [idev] Erasing UDS.KEYID = 0
1,201,530 UART: [idev] Sha1 KeyId Algorithm
1,209,896 UART: [idev] --
1,210,936 UART: [ldev] ++
1,211,104 UART: [ldev] CDI.KEYID = 6
1,211,467 UART: [ldev] SUBJECT.KEYID = 5
1,211,893 UART: [ldev] AUTHORITY.KEYID = 7
1,212,356 UART: [ldev] FE.KEYID = 1
1,217,706 UART: [ldev] Erasing FE.KEYID = 1
1,244,201 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,926 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,642 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,533 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,245 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,320 UART: [ldev] --
1,283,751 UART: [fwproc] Wait for Commands...
1,284,415 UART: [fwproc] Recv command 0x46574c44
1,285,143 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,846 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,691 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,861 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,456 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,278 ready_for_fw is high
1,061,278 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,727 >>> mbox cmd response: success
2,754,990 UART:
2,755,006 UART: Running Caliptra FMC ...
2,755,414 UART:
2,755,557 UART: [state] CFI Enabled
2,766,319 UART: [fht] FMC Alias Private Key: 7
2,884,889 UART: [art] Extend RT PCRs Done
2,885,317 UART: [art] Lock RT PCRs Done
2,886,827 UART: [art] Populate DV Done
2,895,302 UART: [fht] FMC Alias Private Key: 7
2,896,302 UART: [art] Derive CDI
2,896,582 UART: [art] Store in slot 0x4
2,982,627 UART: [art] Derive Key Pair
2,982,987 UART: [art] Store priv key in slot 0x5
2,996,073 UART: [art] Derive Key Pair - Done
3,011,024 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,026,625 UART: [art] Erasing AUTHORITY.KEYID = 7
3,027,390 UART: [art] PUB.X = 2616C9BDE7069B447404EDE7D8EBEC0FEA5C33D9D2934A9A7B1A3EB5312E669B3F6F518DAAE192BD66DDEF99062BF44F
3,034,170 UART: [art] PUB.Y = A3D081F4F8D7B9DDFACFC3562FEDE27F6E0EFB3EA30AC6E8646230E5C6D4BDBFA3F132BD24AA9CB40A8A2DE393BDE59C
3,041,149 UART: [art] SIG.R = 0D56E51CCBB75AB72EF290EFE7565220B5657D5420D89BFDAED0FEF63B43D4DBCFB60DA4A13D485A0A839508CB1023E0
3,047,927 UART: [art] SIG.S = F07011FD259D4C8152BF8E396ECBE73616557CE3A9D232EBA3109AC4D799F7066FD4BCE32D7A7C3FA3110DA325A94284
3,071,669 UART: Caliptra RT
3,072,012 UART: [state] CFI Enabled
3,191,445 UART: [rt] RT listening for mailbox commands...
3,192,108 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,222,093 UART: [rt]cmd =0x46504c54, len=4
3,223,197 >>> mbox cmd response data (8 bytes)
3,223,342 UART: [rt] FIPS self test
3,223,670 UART: [kat] ++
3,223,822 UART: [kat] sha1
3,228,002 UART: [kat] SHA2-256
3,230,024 UART: [kat] SHA2-384
3,233,039 UART: [kat] SHA2-512-ACC
3,233,599 UART: Fatal Error: 0x90050001
3,235,138 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,143 >>> mbox cmd response: failed
3,235,143 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,148 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,918 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,779 >>> mbox cmd response: success
test self_tests::kat_sha2_512_384acc_digest_start_op_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.12s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
2,695,636 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,845,227 >>> mbox cmd response: failed
2,845,783 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,995,170 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,433,582 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,267,689 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,063 writing to cptra_bootfsm_go
2,692,187 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,842,151 >>> mbox cmd response: failed
2,842,741 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,991,498 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
3,440,048 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,278 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,545 writing to cptra_bootfsm_go
3,045,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,195,940 >>> mbox cmd response: failed
3,196,502 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,345,402 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
20,165,089 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,878,720 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
40 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,477 writing to cptra_bootfsm_go
3,045,028 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,194,930 >>> mbox cmd response: failed
3,195,491 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,344,390 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
20,166,997 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,876,107 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,965 writing to cptra_bootfsm_go
2,696,966 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,846,905 >>> mbox cmd response: failed
2,847,482 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,281 >>> mbox cmd response: failed
Initializing fuses
962 writing to cptra_bootfsm_go
3,433,034 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,248,142 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,089 writing to cptra_bootfsm_go
2,693,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,843,714 >>> mbox cmd response: failed
2,844,301 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,993,163 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
3,439,014 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,270,813 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,360 writing to cptra_bootfsm_go
3,057,077 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,207,450 >>> mbox cmd response: failed
3,208,049 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,356,929 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
20,174,250 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,886,105 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,299 writing to cptra_bootfsm_go
3,050,072 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,199,882 >>> mbox cmd response: failed
3,200,442 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,349,294 >>> mbox cmd response: failed
Initializing fuses
963 writing to cptra_bootfsm_go
20,161,104 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,880,700 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,802 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,810 >>> mbox cmd response: failed
812,810 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,816 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,291 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,126 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,650 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,658 >>> mbox cmd response: failed
812,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,664 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,125 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,570 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
813,019 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,027 >>> mbox cmd response: failed
813,027 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
813,033 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,222 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,379 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,923 >>> mbox cmd response: failed
812,923 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,929 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,848 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,867 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.32s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,738 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,746 >>> mbox cmd response: failed
812,746 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,752 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,869 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,932 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,838 >>> mbox cmd response: failed
812,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,844 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,329 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,830 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.57s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,827 >>> mbox cmd response: failed
812,827 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,833 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,500 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,803 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
812,411 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,419 >>> mbox cmd response: failed
812,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
812,425 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,896 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,875 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,201 UART:
192,553 UART: Running Caliptra ROM ...
193,708 UART:
193,856 UART: [state] CFI Enabled
261,207 UART: [state] LifecycleState = Unprovisioned
263,178 UART: [state] DebugLocked = No
265,508 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
269,540 UART: [kat] SHA2-256
439,282 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
449,738 UART: [kat] ++
450,285 UART: [kat] sha1
462,720 UART: [kat] SHA2-256
465,387 UART: [kat] SHA2-384
471,434 UART: [kat] SHA2-512-ACC
473,779 UART: [kat] ECC-384
2,763,999 UART: [kat] HMAC-384Kdf
2,795,400 UART: [kat] LMS
3,985,701 UART: [kat] --
3,991,968 UART: [cold-reset] ++
3,994,318 UART: [fht] Storing FHT @ 0x50003400
4,006,666 UART: [idev] ++
4,007,251 UART: [idev] CDI.KEYID = 6
4,008,173 UART: [idev] SUBJECT.KEYID = 7
4,009,429 UART: [idev] UDS.KEYID = 0
4,010,490 ready_for_fw is high
4,010,727 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,160,999 UART: [idev] Erasing UDS.KEYID = 0
7,343,386 UART: [idev] Using Sha1 for KeyId Algorithm
7,364,914 UART: [idev] --
7,368,399 UART: [ldev] ++
7,368,981 UART: [ldev] CDI.KEYID = 6
7,370,025 UART: [ldev] SUBJECT.KEYID = 5
7,371,195 UART: [ldev] AUTHORITY.KEYID = 7
7,372,431 UART: [ldev] FE.KEYID = 1
7,419,055 UART: [ldev] Erasing FE.KEYID = 1
10,753,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,065,484 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,080,067 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,094,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,109,465 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,128,038 UART: [ldev] --
13,132,658 UART: [fwproc] Waiting for Commands...
13,134,654 UART: [fwproc] Received command 0x46574c44
13,136,841 UART: [fwproc] Received Image of size 119428 bytes
17,248,488 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,324,231 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,397,360 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,729,610 >>> mbox cmd response: success
17,733,056 UART: [afmc] ++
17,733,655 UART: [afmc] CDI.KEYID = 6
17,734,621 UART: [afmc] SUBJECT.KEYID = 7
17,735,835 UART: [afmc] AUTHORITY.KEYID = 5
21,092,541 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,024 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,396,288 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,410,707 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,425,483 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,439,919 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,462,499 UART: [afmc] --
23,465,664 UART: [cold-reset] --
23,467,636 UART: [state] Locking Datavault
23,473,970 UART: [state] Locking PCR0, PCR1 and PCR31
23,475,722 UART: [state] Locking ICCM
23,478,253 UART: [exit] Launching FMC @ 0x40000130
23,486,649 UART:
23,486,892 UART: Running Caliptra FMC ...
23,487,997 UART:
23,488,155 UART: [state] CFI Enabled
23,552,960 UART: [fht] FMC Alias Private Key: 7
25,914,094 UART: [art] Extend RT PCRs Done
25,915,332 UART: [art] Lock RT PCRs Done
25,917,097 UART: [art] Populate DV Done
25,922,734 UART: [fht] FMC Alias Private Key: 7
25,924,385 UART: [art] Derive CDI
25,925,151 UART: [art] Store in slot 0x4
25,983,485 UART: [art] Derive Key Pair
25,984,485 UART: [art] Store priv key in slot 0x5
29,277,126 UART: [art] Derive Key Pair - Done
29,289,696 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,578,873 UART: [art] Erasing AUTHORITY.KEYID = 7
31,580,387 UART: [art] PUB.X = C56C25EC22ADDE1AD8D3199DCF914E810A03AD47B83232B81EFE53DBEEEF1E7497236C0BDCAF187C8829E114B891B4F7
31,587,669 UART: [art] PUB.Y = BBFF61C4B987A594E7435C1D18A0A650AE6FB80C6A7899DA3F5665A178C3031458D3EAD21525F7EFDEB2DD3D660DB6E1
31,594,975 UART: [art] SIG.R = C4A698FCA6A29F3211C1B5BFF7EB7677D01DF27DE83F0DE289BBC973EAD9CAD90793A2FDAA8A95385FC63313D50CB26C
31,602,360 UART: [art] SIG.S = 7513697A06E0C6D2DAB46F41FEE44E2B7FA76341AACDD1B44813B5E16329EFF76D99C5EE810EE92A4C1A31C5A9864374
32,907,738 UART: Caliptra RT
32,908,438 UART: [state] CFI Enabled
33,086,349 UART: [rt] RT listening for mailbox commands...
33,088,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,118,093 UART: [rt]cmd =0x46504c54, len=4
33,119,617 >>> mbox cmd response data (8 bytes)
33,120,488 UART: [rt] FIPS self test
33,121,440 UART: [kat] ++
33,121,895 UART: [kat] sha1
33,126,382 UART: [kat] SHA2-256
33,128,263 UART: [kat] SHA2-384
33,129,351 UART: Fatal Error: 0x90020001
33,164,564 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,314,554 >>> mbox cmd response: failed
33,315,178 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,465,039 >>> mbox cmd response: failed
Initializing fuses
943 writing to cptra_bootfsm_go
189,987 UART:
190,281 UART: Running Caliptra ROM ...
191,390 UART:
191,538 UART: [state] CFI Enabled
246,094 UART: [state] LifecycleState = Unprovisioned
248,072 UART: [state] DebugLocked = No
250,263 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
254,611 UART: [kat] SHA2-256
424,323 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
434,826 UART: [kat] ++
435,301 UART: [kat] sha1
445,636 UART: [kat] SHA2-256
448,306 UART: [kat] SHA2-384
453,747 UART: [kat] SHA2-512-ACC
456,138 UART: [kat] ECC-384
2,749,744 UART: [kat] HMAC-384Kdf
2,761,813 UART: [kat] LMS
3,952,128 UART: [kat] --
3,955,120 UART: [cold-reset] ++
3,956,194 UART: [fht] Storing FHT @ 0x50003400
3,968,120 UART: [idev] ++
3,968,736 UART: [idev] CDI.KEYID = 6
3,969,651 UART: [idev] SUBJECT.KEYID = 7
3,970,873 UART: [idev] UDS.KEYID = 0
3,972,498 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,122,498 UART: [idev] Erasing UDS.KEYID = 0
7,308,183 UART: [idev] Using Sha1 for KeyId Algorithm
7,330,496 UART: [idev] --
7,334,849 UART: [ldev] ++
7,335,484 UART: [ldev] CDI.KEYID = 6
7,336,374 UART: [ldev] SUBJECT.KEYID = 5
7,337,644 UART: [ldev] AUTHORITY.KEYID = 7
7,338,880 UART: [ldev] FE.KEYID = 1
7,385,043 UART: [ldev] Erasing FE.KEYID = 1
10,714,197 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,009,105 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,023,647 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,038,499 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,053,017 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,072,768 UART: [ldev] --
13,076,846 UART: [fwproc] Waiting for Commands...
13,079,022 UART: [fwproc] Received command 0x46574c44
13,081,218 UART: [fwproc] Received Image of size 119428 bytes
17,201,099 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,271,622 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,344,814 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,676,232 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,997 writing to cptra_bootfsm_go
3,783,252 ready_for_fw is high
3,783,817 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,926,412 >>> mbox cmd response: success
23,607,849 UART:
23,608,249 UART: Running Caliptra FMC ...
23,609,372 UART:
23,609,552 UART: [state] CFI Enabled
23,678,977 UART: [fht] FMC Alias Private Key: 7
26,018,552 UART: [art] Extend RT PCRs Done
26,019,783 UART: [art] Lock RT PCRs Done
26,021,494 UART: [art] Populate DV Done
26,026,977 UART: [fht] FMC Alias Private Key: 7
26,028,471 UART: [art] Derive CDI
26,029,212 UART: [art] Store in slot 0x4
26,087,176 UART: [art] Derive Key Pair
26,088,222 UART: [art] Store priv key in slot 0x5
29,380,662 UART: [art] Derive Key Pair - Done
29,393,561 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,682,025 UART: [art] Erasing AUTHORITY.KEYID = 7
31,683,542 UART: [art] PUB.X = 3BE543136C293DC05E28DED7109E096E0D340281E9C159753442AE447BC6248102940FAA47BC515FFAE80E8F8E65E48E
31,690,770 UART: [art] PUB.Y = E2A9E52717FC5A5B7AA5CFDEA851F79AC59D2543E3B75C1C0CD3D79687FD01305560C82C50FC96B8841814D6DF42FC45
31,698,035 UART: [art] SIG.R = 777DFFD519D671924CE1F1FC2E4C03211079A0513A223965A0E1190E260E0BD4DFB62BC7D9EEEA9761A4F32841BB4382
31,705,443 UART: [art] SIG.S = 9F1EF8DE7DC92C71C4ED39C0E5806F51B0A1538027CC7288714DAD121AF7B4CC241D106539F89C31F57266163188EB0D
33,010,740 UART: Caliptra RT
33,011,467 UART: [state] CFI Enabled
33,187,728 UART: [rt] RT listening for mailbox commands...
33,189,610 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,219,131 UART: [rt]cmd =0x46504c54, len=4
33,220,710 >>> mbox cmd response data (8 bytes)
33,222,105 UART: [rt] FIPS self test
33,223,057 UART: [kat] ++
33,223,515 UART: [kat] sha1
33,228,082 UART: [kat] SHA2-256
33,229,972 UART: [kat] SHA2-384
33,231,096 UART: Fatal Error: 0x90020001
33,266,494 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,416,349 >>> mbox cmd response: failed
33,416,965 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,566,939 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
3,791,719 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,981,288 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,262 writing to cptra_bootfsm_go
192,593 UART:
192,970 UART: Running Caliptra ROM ...
194,113 UART:
603,694 UART: [state] CFI Enabled
620,612 UART: [state] LifecycleState = Unprovisioned
622,561 UART: [state] DebugLocked = No
624,314 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,549 UART: [kat] SHA2-256
798,284 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,811 UART: [kat] ++
809,352 UART: [kat] sha1
820,309 UART: [kat] SHA2-256
823,037 UART: [kat] SHA2-384
829,179 UART: [kat] SHA2-512-ACC
831,562 UART: [kat] ECC-384
3,114,948 UART: [kat] HMAC-384Kdf
3,127,829 UART: [kat] LMS
4,317,912 UART: [kat] --
4,321,874 UART: [cold-reset] ++
4,324,316 UART: [fht] Storing FHT @ 0x50003400
4,335,162 UART: [idev] ++
4,335,743 UART: [idev] CDI.KEYID = 6
4,336,655 UART: [idev] SUBJECT.KEYID = 7
4,337,908 UART: [idev] UDS.KEYID = 0
4,338,949 ready_for_fw is high
4,339,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,489,200 UART: [idev] Erasing UDS.KEYID = 0
7,624,240 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,779 UART: [idev] --
7,648,565 UART: [ldev] ++
7,649,152 UART: [ldev] CDI.KEYID = 6
7,650,124 UART: [ldev] SUBJECT.KEYID = 5
7,651,289 UART: [ldev] AUTHORITY.KEYID = 7
7,652,593 UART: [ldev] FE.KEYID = 1
7,662,903 UART: [ldev] Erasing FE.KEYID = 1
10,947,504 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,240,414 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,254,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,269,802 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,284,345 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,304,094 UART: [ldev] --
13,308,309 UART: [fwproc] Waiting for Commands...
13,311,440 UART: [fwproc] Received command 0x46574c44
13,313,686 UART: [fwproc] Received Image of size 119428 bytes
17,430,714 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,773 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,578,962 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,910,914 >>> mbox cmd response: success
17,915,471 UART: [afmc] ++
17,916,062 UART: [afmc] CDI.KEYID = 6
17,916,955 UART: [afmc] SUBJECT.KEYID = 7
17,918,175 UART: [afmc] AUTHORITY.KEYID = 5
21,234,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,530,639 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,532,952 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,547,351 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,562,086 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,576,504 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,599,349 UART: [afmc] --
23,602,403 UART: [cold-reset] --
23,606,969 UART: [state] Locking Datavault
23,611,681 UART: [state] Locking PCR0, PCR1 and PCR31
23,613,388 UART: [state] Locking ICCM
23,615,439 UART: [exit] Launching FMC @ 0x40000130
23,623,837 UART:
23,624,090 UART: Running Caliptra FMC ...
23,625,206 UART:
23,625,372 UART: [state] CFI Enabled
23,633,051 UART: [fht] FMC Alias Private Key: 7
25,973,378 UART: [art] Extend RT PCRs Done
25,974,602 UART: [art] Lock RT PCRs Done
25,976,174 UART: [art] Populate DV Done
25,981,861 UART: [fht] FMC Alias Private Key: 7
25,983,317 UART: [art] Derive CDI
25,984,088 UART: [art] Store in slot 0x4
26,026,843 UART: [art] Derive Key Pair
26,027,850 UART: [art] Store priv key in slot 0x5
29,270,499 UART: [art] Derive Key Pair - Done
29,283,608 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,564,168 UART: [art] Erasing AUTHORITY.KEYID = 7
31,565,678 UART: [art] PUB.X = 5129EC557002C5F96037EBBBA8912321C487BA4C72E963835FC6CA1147F316319CD8DB76AE7BB97B8E48F7C1BA2E27D4
31,572,994 UART: [art] PUB.Y = CB1A14D76FA492AEE2A4480BA9066C25815DCA0AB2A145650DC782D4460CB93A74FF4E450CA1A10289D83E8A9B6A3712
31,580,237 UART: [art] SIG.R = EFF55987A835B31FD1D7C905CE1277C447CCAE32D3E90093206BDC7759A9A03F7311C41565542829690622BAA3112EFB
31,587,583 UART: [art] SIG.S = 8F83AEB4EDB8F9DFCB79C1EE970C5FC50E83BA35DCAB8256809F63F4D80F750CC3EC3AC76F9FA6F306BCC3BC046D3813
32,893,093 UART: Caliptra RT
32,893,792 UART: [state] CFI Enabled
33,026,880 UART: [rt] RT listening for mailbox commands...
33,028,735 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,058,355 UART: [rt]cmd =0x46504c54, len=4
33,059,906 >>> mbox cmd response data (8 bytes)
33,061,213 UART: [rt] FIPS self test
33,062,165 UART: [kat] ++
33,062,623 UART: [kat] sha1
33,066,952 UART: [kat] SHA2-256
33,068,893 UART: [kat] SHA2-384
33,070,083 UART: Fatal Error: 0x90020001
33,105,474 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,255,451 >>> mbox cmd response: failed
33,256,014 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,406,258 >>> mbox cmd response: failed
Initializing fuses
944 writing to cptra_bootfsm_go
190,077 UART:
190,377 UART: Running Caliptra ROM ...
191,488 UART:
7,127,682 UART: [state] CFI Enabled
7,141,513 UART: [state] LifecycleState = Unprovisioned
7,143,438 UART: [state] DebugLocked = No
7,146,182 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,150,165 UART: [kat] SHA2-256
7,319,914 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,330,444 UART: [kat] ++
7,330,939 UART: [kat] sha1
7,342,695 UART: [kat] SHA2-256
7,345,393 UART: [kat] SHA2-384
7,351,791 UART: [kat] SHA2-512-ACC
7,354,163 UART: [kat] ECC-384
9,638,135 UART: [kat] HMAC-384Kdf
9,649,771 UART: [kat] LMS
10,839,874 UART: [kat] --
10,842,916 UART: [cold-reset] ++
10,845,143 UART: [fht] Storing FHT @ 0x50003400
10,857,980 UART: [idev] ++
10,858,561 UART: [idev] CDI.KEYID = 6
10,859,474 UART: [idev] SUBJECT.KEYID = 7
10,860,744 UART: [idev] UDS.KEYID = 0
10,862,264 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,012,650 UART: [idev] Erasing UDS.KEYID = 0
14,150,294 UART: [idev] Using Sha1 for KeyId Algorithm
14,172,864 UART: [idev] --
14,177,130 UART: [ldev] ++
14,177,704 UART: [ldev] CDI.KEYID = 6
14,178,675 UART: [ldev] SUBJECT.KEYID = 5
14,179,895 UART: [ldev] AUTHORITY.KEYID = 7
14,181,133 UART: [ldev] FE.KEYID = 1
14,192,271 UART: [ldev] Erasing FE.KEYID = 1
17,483,540 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,776,507 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,791,106 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,805,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,820,405 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,838,680 UART: [ldev] --
19,842,884 UART: [fwproc] Waiting for Commands...
19,844,663 UART: [fwproc] Received command 0x46574c44
19,846,857 UART: [fwproc] Received Image of size 119428 bytes
23,962,854 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,042,236 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,115,430 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,446,674 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,332 writing to cptra_bootfsm_go
4,124,266 ready_for_fw is high
4,124,870 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,180,882 >>> mbox cmd response: success
23,825,074 UART:
23,825,604 UART: Running Caliptra FMC ...
23,826,759 UART:
23,826,927 UART: [state] CFI Enabled
23,834,199 UART: [fht] FMC Alias Private Key: 7
26,174,328 UART: [art] Extend RT PCRs Done
26,175,580 UART: [art] Lock RT PCRs Done
26,177,402 UART: [art] Populate DV Done
26,183,003 UART: [fht] FMC Alias Private Key: 7
26,184,506 UART: [art] Derive CDI
26,185,253 UART: [art] Store in slot 0x4
26,227,690 UART: [art] Derive Key Pair
26,228,699 UART: [art] Store priv key in slot 0x5
29,471,348 UART: [art] Derive Key Pair - Done
29,484,411 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,765,139 UART: [art] Erasing AUTHORITY.KEYID = 7
31,766,653 UART: [art] PUB.X = D8B5A5F152C5FC1A9784123C271BA769E3F67F696309981532180B5C4E1870567AAA75C7F69990F4281A9C56B6354A8E
31,773,857 UART: [art] PUB.Y = 6A55D16E9B353DC57E26EE19A86A31C1690515BB5CADC310F15C626AE0C4EB46D1835B200254376967F67693427F3AE2
31,781,111 UART: [art] SIG.R = DF70202BC805B30FCB4B6FB54CD2DDA98B0FD89DF0CD8C958D895B4FAECA923150F272461631DB3E9A8E7CA0F218006D
31,788,507 UART: [art] SIG.S = 52D7740B1CEF575F91861CEEBB088308545AD620DFC429736B3F78FD72AE0BE77152F7E79D6DD6DDF9C2ED57301CB15A
33,092,407 UART: Caliptra RT
33,093,132 UART: [state] CFI Enabled
33,226,592 UART: [rt] RT listening for mailbox commands...
33,228,467 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,163 UART: [rt]cmd =0x46504c54, len=4
33,259,965 >>> mbox cmd response data (8 bytes)
33,260,987 UART: [rt] FIPS self test
33,261,937 UART: [kat] ++
33,262,397 UART: [kat] sha1
33,266,695 UART: [kat] SHA2-256
33,268,577 UART: [kat] SHA2-384
33,269,811 UART: Fatal Error: 0x90020001
33,305,200 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,455,234 >>> mbox cmd response: failed
33,455,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,605,768 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
10,445,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,492,387 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,221 writing to cptra_bootfsm_go
192,312 UART:
192,678 UART: Running Caliptra ROM ...
193,890 UART:
194,048 UART: [state] CFI Enabled
266,713 UART: [state] LifecycleState = Unprovisioned
268,617 UART: [state] DebugLocked = No
270,586 UART: [state] WD Timer not started. Device not locked for debugging
274,156 UART: [kat] SHA2-256
453,801 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,613 UART: [kat] ++
465,171 UART: [kat] sha1
475,940 UART: [kat] SHA2-256
478,658 UART: [kat] SHA2-384
484,950 UART: [kat] SHA2-512-ACC
487,330 UART: [kat] ECC-384
2,947,650 UART: [kat] HMAC-384Kdf
2,970,148 UART: [kat] LMS
3,446,598 UART: [kat] --
3,450,180 UART: [cold-reset] ++
3,452,408 UART: [fht] FHT @ 0x50003400
3,465,377 UART: [idev] ++
3,466,022 UART: [idev] CDI.KEYID = 6
3,466,954 UART: [idev] SUBJECT.KEYID = 7
3,468,207 UART: [idev] UDS.KEYID = 0
3,469,141 ready_for_fw is high
3,469,372 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,619,704 UART: [idev] Erasing UDS.KEYID = 0
5,988,101 UART: [idev] Sha1 KeyId Algorithm
6,011,993 UART: [idev] --
6,016,894 UART: [ldev] ++
6,017,484 UART: [ldev] CDI.KEYID = 6
6,018,374 UART: [ldev] SUBJECT.KEYID = 5
6,019,599 UART: [ldev] AUTHORITY.KEYID = 7
6,020,846 UART: [ldev] FE.KEYID = 1
6,057,890 UART: [ldev] Erasing FE.KEYID = 1
8,562,529 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,035 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,892 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,474 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,244 UART: [ldev] --
10,372,870 UART: [fwproc] Wait for Commands...
10,374,453 UART: [fwproc] Recv command 0x46574c44
10,376,451 UART: [fwproc] Recv'd Img size: 119428 bytes
13,867,214 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,944,649 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,017,663 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,348,839 >>> mbox cmd response: success
14,352,083 UART: [afmc] ++
14,352,687 UART: [afmc] CDI.KEYID = 6
14,353,613 UART: [afmc] SUBJECT.KEYID = 7
14,354,830 UART: [afmc] AUTHORITY.KEYID = 5
16,896,054 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,637,143 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,639,381 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,655,179 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,671,229 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,686,780 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,711,497 UART: [afmc] --
18,715,156 UART: [cold-reset] --
18,718,852 UART: [state] Locking Datavault
18,723,409 UART: [state] Locking PCR0, PCR1 and PCR31
18,725,167 UART: [state] Locking ICCM
18,726,779 UART: [exit] Launching FMC @ 0x40000130
18,735,234 UART:
18,735,477 UART: Running Caliptra FMC ...
18,736,588 UART:
18,736,769 UART: [state] CFI Enabled
18,795,941 UART: [fht] FMC Alias Private Key: 7
20,562,142 UART: [art] Extend RT PCRs Done
20,563,363 UART: [art] Lock RT PCRs Done
20,564,992 UART: [art] Populate DV Done
20,570,568 UART: [fht] FMC Alias Private Key: 7
20,572,223 UART: [art] Derive CDI
20,573,062 UART: [art] Store in slot 0x4
20,628,647 UART: [art] Derive Key Pair
20,629,653 UART: [art] Store priv key in slot 0x5
23,092,032 UART: [art] Derive Key Pair - Done
23,105,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,818,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,819,875 UART: [art] PUB.X = FEC65160B35BB7FA10DB2E24BD4E5F86F12B3E2748BB3B5B4739F1E3AF4C42AE25700FEAD3368D8C8EDD73ADED2EB276
24,827,189 UART: [art] PUB.Y = D415F67EA4E0E679A99880A1A19E57893A149996FE2D90A2C33DDCEDE36DAC8307D1647A56AF5B4AE9228634F44864A0
24,834,488 UART: [art] SIG.R = AFB33B9D1FB0448F32AA4CB39CB16130F6783CA6B887B6BD70ABC6BA9C31AEA498682433D7C662DF4663C755AE5122E4
24,841,895 UART: [art] SIG.S = 96CF2A2176E97D718196D001091F3F49AA836749D3D909655309C4813BFD3AF9EE0E222B8D1FF1AB439206A310BA2CC6
25,820,518 UART: Caliptra RT
25,821,224 UART: [state] CFI Enabled
26,001,730 UART: [rt] RT listening for mailbox commands...
26,003,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,033,556 UART: [rt]cmd =0x46504c54, len=4
26,035,087 >>> mbox cmd response data (8 bytes)
26,036,516 UART: [rt] FIPS self test
26,037,466 UART: [kat] ++
26,037,917 UART: [kat] sha1
26,042,108 UART: [kat] SHA2-256
26,044,042 UART: [kat] SHA2-384
26,045,122 UART: Fatal Error: 0x90020001
26,080,452 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,230,302 >>> mbox cmd response: failed
26,230,942 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,380,828 >>> mbox cmd response: failed
Initializing fuses
946 writing to cptra_bootfsm_go
190,041 UART:
190,336 UART: Running Caliptra ROM ...
191,363 UART:
191,507 UART: [state] CFI Enabled
246,464 UART: [state] LifecycleState = Unprovisioned
248,350 UART: [state] DebugLocked = No
250,590 UART: [state] WD Timer not started. Device not locked for debugging
254,578 UART: [kat] SHA2-256
434,232 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
445,019 UART: [kat] ++
445,565 UART: [kat] sha1
456,614 UART: [kat] SHA2-256
459,300 UART: [kat] SHA2-384
465,493 UART: [kat] SHA2-512-ACC
467,888 UART: [kat] ECC-384
2,914,343 UART: [kat] HMAC-384Kdf
2,933,921 UART: [kat] LMS
3,410,406 UART: [kat] --
3,414,613 UART: [cold-reset] ++
3,415,904 UART: [fht] FHT @ 0x50003400
3,427,070 UART: [idev] ++
3,427,649 UART: [idev] CDI.KEYID = 6
3,428,536 UART: [idev] SUBJECT.KEYID = 7
3,429,807 UART: [idev] UDS.KEYID = 0
3,431,358 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,581,642 UART: [idev] Erasing UDS.KEYID = 0
5,950,176 UART: [idev] Sha1 KeyId Algorithm
5,973,147 UART: [idev] --
5,979,461 UART: [ldev] ++
5,980,037 UART: [ldev] CDI.KEYID = 6
5,980,924 UART: [ldev] SUBJECT.KEYID = 5
5,982,141 UART: [ldev] AUTHORITY.KEYID = 7
5,983,435 UART: [ldev] FE.KEYID = 1
6,021,448 UART: [ldev] Erasing FE.KEYID = 1
8,531,188 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,263,193 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,279,057 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,294,916 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,310,477 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,331,596 UART: [ldev] --
10,336,310 UART: [fwproc] Wait for Commands...
10,339,445 UART: [fwproc] Recv command 0x46574c44
10,341,439 UART: [fwproc] Recv'd Img size: 119428 bytes
13,839,061 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,920,127 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,993,146 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,324,277 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,142 writing to cptra_bootfsm_go
3,463,015 ready_for_fw is high
3,463,451 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,259,942 >>> mbox cmd response: success
18,556,198 UART:
18,556,593 UART: Running Caliptra FMC ...
18,557,726 UART:
18,557,883 UART: [state] CFI Enabled
18,624,492 UART: [fht] FMC Alias Private Key: 7
20,391,251 UART: [art] Extend RT PCRs Done
20,392,490 UART: [art] Lock RT PCRs Done
20,393,954 UART: [art] Populate DV Done
20,399,227 UART: [fht] FMC Alias Private Key: 7
20,400,938 UART: [art] Derive CDI
20,401,687 UART: [art] Store in slot 0x4
20,456,626 UART: [art] Derive Key Pair
20,457,694 UART: [art] Store priv key in slot 0x5
22,919,988 UART: [art] Derive Key Pair - Done
22,932,787 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,322 UART: [art] Erasing AUTHORITY.KEYID = 7
24,646,849 UART: [art] PUB.X = EDF79F32EB35741CD26E2375338F03F675036E27C42F568611092848DCECC53EAF1A0151EB7066D5A6612CBDA9C8F20E
24,654,079 UART: [art] PUB.Y = 3661E0F7DC00DF86EB7EE760AF4CAF0D9CD89BC96C55A99C0809B4FF29C11C458636F063EE8822B73DFD9C2B0C5A4E1B
24,661,318 UART: [art] SIG.R = 8FF25AE2F3B535BF455CCAB9CDC9699C666A0D5E69ED5509C0ECCC2EAE130A2451DA4222039983BA3A30D4B678F8724C
24,668,742 UART: [art] SIG.S = 78A00B28EB74489A4CCF776959B26457DFC808E773EAC900ABDB5D72D1BFD61991FE966DE637290D38A70A204E88BBCF
25,647,685 UART: Caliptra RT
25,648,415 UART: [state] CFI Enabled
25,828,514 UART: [rt] RT listening for mailbox commands...
25,830,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,860,375 UART: [rt]cmd =0x46504c54, len=4
25,861,964 >>> mbox cmd response data (8 bytes)
25,862,809 UART: [rt] FIPS self test
25,863,761 UART: [kat] ++
25,864,237 UART: [kat] sha1
25,868,699 UART: [kat] SHA2-256
25,870,637 UART: [kat] SHA2-384
25,871,716 UART: Fatal Error: 0x90020001
25,907,102 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,057,127 >>> mbox cmd response: failed
26,057,787 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,207,588 >>> mbox cmd response: failed
Initializing fuses
936 writing to cptra_bootfsm_go
3,446,368 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,219,368 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,383 writing to cptra_bootfsm_go
192,535 UART:
192,901 UART: Running Caliptra ROM ...
194,104 UART:
603,829 UART: [state] CFI Enabled
620,639 UART: [state] LifecycleState = Unprovisioned
622,526 UART: [state] DebugLocked = No
624,485 UART: [state] WD Timer not started. Device not locked for debugging
628,463 UART: [kat] SHA2-256
808,115 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,913 UART: [kat] ++
819,392 UART: [kat] sha1
830,271 UART: [kat] SHA2-256
833,006 UART: [kat] SHA2-384
840,433 UART: [kat] SHA2-512-ACC
842,808 UART: [kat] ECC-384
3,283,447 UART: [kat] HMAC-384Kdf
3,296,280 UART: [kat] LMS
3,772,809 UART: [kat] --
3,778,508 UART: [cold-reset] ++
3,779,452 UART: [fht] FHT @ 0x50003400
3,791,777 UART: [idev] ++
3,792,342 UART: [idev] CDI.KEYID = 6
3,793,262 UART: [idev] SUBJECT.KEYID = 7
3,794,516 UART: [idev] UDS.KEYID = 0
3,795,462 ready_for_fw is high
3,795,694 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,945,742 UART: [idev] Erasing UDS.KEYID = 0
6,272,564 UART: [idev] Sha1 KeyId Algorithm
6,296,408 UART: [idev] --
6,301,486 UART: [ldev] ++
6,302,060 UART: [ldev] CDI.KEYID = 6
6,303,010 UART: [ldev] SUBJECT.KEYID = 5
6,304,229 UART: [ldev] AUTHORITY.KEYID = 7
6,305,466 UART: [ldev] FE.KEYID = 1
6,316,602 UART: [ldev] Erasing FE.KEYID = 1
8,792,418 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,510,861 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,526,730 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,542,606 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,228 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,580,325 UART: [ldev] --
10,586,635 UART: [fwproc] Wait for Commands...
10,588,792 UART: [fwproc] Recv command 0x46574c44
10,590,787 UART: [fwproc] Recv'd Img size: 119428 bytes
14,080,730 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,155,389 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,228,414 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,559,409 >>> mbox cmd response: success
14,564,370 UART: [afmc] ++
14,564,963 UART: [afmc] CDI.KEYID = 6
14,565,870 UART: [afmc] SUBJECT.KEYID = 7
14,567,089 UART: [afmc] AUTHORITY.KEYID = 5
17,069,260 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,650 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,794,892 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,709 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,826,753 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,346 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,780 UART: [afmc] --
18,871,032 UART: [cold-reset] --
18,874,615 UART: [state] Locking Datavault
18,879,766 UART: [state] Locking PCR0, PCR1 and PCR31
18,881,533 UART: [state] Locking ICCM
18,883,306 UART: [exit] Launching FMC @ 0x40000130
18,891,709 UART:
18,891,949 UART: Running Caliptra FMC ...
18,893,053 UART:
18,893,222 UART: [state] CFI Enabled
18,901,811 UART: [fht] FMC Alias Private Key: 7
20,668,555 UART: [art] Extend RT PCRs Done
20,669,780 UART: [art] Lock RT PCRs Done
20,671,511 UART: [art] Populate DV Done
20,677,114 UART: [fht] FMC Alias Private Key: 7
20,678,659 UART: [art] Derive CDI
20,679,481 UART: [art] Store in slot 0x4
20,722,192 UART: [art] Derive Key Pair
20,723,237 UART: [art] Store priv key in slot 0x5
23,150,369 UART: [art] Derive Key Pair - Done
23,163,372 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,869,985 UART: [art] Erasing AUTHORITY.KEYID = 7
24,871,495 UART: [art] PUB.X = 76EA5B1D36F2800EAF64033D22D62BF33AABE41CB6486D6CD7525C70D7EAA1D57B51C91B07E7EA9C62214F38071BFAC6
24,878,555 UART: [art] PUB.Y = 0F6565AD2339311FEA55E975364478EEAFF99EC8D7B29D1FF449C47955BF80776E0AC34FC06213B55192B03AC1F68CEF
24,885,829 UART: [art] SIG.R = D982BEB5F01DD3095734CEC7594E179BBDC5E3F3D5CDDFD5EF7586438DC06812D81751BE10DC1D4043D717035D9F4E59
24,893,259 UART: [art] SIG.S = B7193B3B279F677DB349BB6DDA8AED8EB78A53FC00A7B109E299ED0A92AAFB86B854CC578E21133E6B89BBD6DCB6A950
25,872,681 UART: Caliptra RT
25,873,393 UART: [state] CFI Enabled
26,006,019 UART: [rt] RT listening for mailbox commands...
26,007,880 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,037,648 UART: [rt]cmd =0x46504c54, len=4
26,039,240 >>> mbox cmd response data (8 bytes)
26,040,576 UART: [rt] FIPS self test
26,041,531 UART: [kat] ++
26,041,993 UART: [kat] sha1
26,046,346 UART: [kat] SHA2-256
26,048,279 UART: [kat] SHA2-384
26,049,460 UART: Fatal Error: 0x90020001
26,084,781 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,234,814 >>> mbox cmd response: failed
26,235,435 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,385,159 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
189,984 UART:
190,268 UART: Running Caliptra ROM ...
191,315 UART:
14,147,780 UART: [state] CFI Enabled
14,161,893 UART: [state] LifecycleState = Unprovisioned
14,163,814 UART: [state] DebugLocked = No
14,165,840 UART: [state] WD Timer not started. Device not locked for debugging
14,169,712 UART: [kat] SHA2-256
14,349,378 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,360,172 UART: [kat] ++
14,360,659 UART: [kat] sha1
14,371,440 UART: [kat] SHA2-256
14,374,140 UART: [kat] SHA2-384
14,379,374 UART: [kat] SHA2-512-ACC
14,381,782 UART: [kat] ECC-384
16,820,756 UART: [kat] HMAC-384Kdf
16,833,631 UART: [kat] LMS
17,310,091 UART: [kat] --
17,314,049 UART: [cold-reset] ++
17,315,824 UART: [fht] FHT @ 0x50003400
17,326,693 UART: [idev] ++
17,327,268 UART: [idev] CDI.KEYID = 6
17,328,291 UART: [idev] SUBJECT.KEYID = 7
17,329,454 UART: [idev] UDS.KEYID = 0
17,331,000 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,480,943 UART: [idev] Erasing UDS.KEYID = 0
19,809,060 UART: [idev] Sha1 KeyId Algorithm
19,831,927 UART: [idev] --
19,836,465 UART: [ldev] ++
19,837,032 UART: [ldev] CDI.KEYID = 6
19,837,970 UART: [ldev] SUBJECT.KEYID = 5
19,839,180 UART: [ldev] AUTHORITY.KEYID = 7
19,840,470 UART: [ldev] FE.KEYID = 1
19,854,006 UART: [ldev] Erasing FE.KEYID = 1
22,332,840 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,053,549 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,069,441 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,085,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,100,875 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,122,288 UART: [ldev] --
24,127,559 UART: [fwproc] Wait for Commands...
24,130,796 UART: [fwproc] Recv command 0x46574c44
24,132,843 UART: [fwproc] Recv'd Img size: 119428 bytes
27,627,622 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,701,977 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,774,992 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,106,707 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,316 writing to cptra_bootfsm_go
3,779,187 ready_for_fw is high
3,779,831 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,462,065 >>> mbox cmd response: success
18,713,799 UART:
18,714,229 UART: Running Caliptra FMC ...
18,715,545 UART:
18,715,722 UART: [state] CFI Enabled
18,723,519 UART: [fht] FMC Alias Private Key: 7
20,489,882 UART: [art] Extend RT PCRs Done
20,491,099 UART: [art] Lock RT PCRs Done
20,492,731 UART: [art] Populate DV Done
20,498,002 UART: [fht] FMC Alias Private Key: 7
20,499,554 UART: [art] Derive CDI
20,500,319 UART: [art] Store in slot 0x4
20,542,378 UART: [art] Derive Key Pair
20,543,423 UART: [art] Store priv key in slot 0x5
22,970,316 UART: [art] Derive Key Pair - Done
22,983,058 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,689,444 UART: [art] Erasing AUTHORITY.KEYID = 7
24,690,932 UART: [art] PUB.X = 2DF460806067EF54F859AF305136CB8DE794565CFA08F6A448EA191AF20A50AE62EF1F040FCC489E4C7A074F46300F46
24,698,195 UART: [art] PUB.Y = 1A3763474322A593DD47CC1E943C857CB4BE961944383DF316630F2BDCF347B4FE41C068AF4B33D9D6B3BE5BA1DC034C
24,705,453 UART: [art] SIG.R = E45517711090CA9BDBA78A91F56F247896DA9C0DC0B830FA2CD58D0E4DEF9ADD673FCF134CEC275A0A6CD698F78F76A5
24,712,854 UART: [art] SIG.S = 76E2BD53B230695032C107ABB4FE35F55C8B84B74573807AF1D7C2C2A6B2EE441CDE022DD7530F5B24EF3E8923907F54
25,691,775 UART: Caliptra RT
25,692,497 UART: [state] CFI Enabled
25,824,802 UART: [rt] RT listening for mailbox commands...
25,826,651 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,856,335 UART: [rt]cmd =0x46504c54, len=4
25,857,916 >>> mbox cmd response data (8 bytes)
25,859,069 UART: [rt] FIPS self test
25,860,017 UART: [kat] ++
25,860,472 UART: [kat] sha1
25,864,658 UART: [kat] SHA2-256
25,866,588 UART: [kat] SHA2-384
25,867,553 UART: Fatal Error: 0x90020001
25,902,928 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,052,973 >>> mbox cmd response: failed
26,053,617 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,203,495 >>> mbox cmd response: failed
Initializing fuses
940 writing to cptra_bootfsm_go
17,506,907 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,192,371 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,247 UART:
192,606 UART: Running Caliptra ROM ...
193,721 UART:
193,868 UART: [state] CFI Enabled
262,847 UART: [state] LifecycleState = Unprovisioned
265,249 UART: [state] DebugLocked = No
267,237 UART: [state] WD Timer not started. Device not locked for debugging
271,851 UART: [kat] SHA2-256
461,729 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,547 UART: [kat] ++
473,027 UART: [kat] sha1
484,556 UART: [kat] SHA2-256
487,585 UART: [kat] SHA2-384
492,309 UART: [kat] SHA2-512-ACC
494,902 UART: [kat] ECC-384
2,948,305 UART: [kat] HMAC-384Kdf
2,972,042 UART: [kat] LMS
3,503,822 UART: [kat] --
3,509,341 UART: [cold-reset] ++
3,510,441 UART: [fht] FHT @ 0x50003400
3,522,139 UART: [idev] ++
3,522,791 UART: [idev] CDI.KEYID = 6
3,523,833 UART: [idev] SUBJECT.KEYID = 7
3,524,943 UART: [idev] UDS.KEYID = 0
3,525,887 ready_for_fw is high
3,526,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,676,785 UART: [idev] Erasing UDS.KEYID = 0
6,027,292 UART: [idev] Sha1 KeyId Algorithm
6,049,010 UART: [idev] --
6,052,936 UART: [ldev] ++
6,053,631 UART: [ldev] CDI.KEYID = 6
6,054,567 UART: [ldev] SUBJECT.KEYID = 5
6,055,738 UART: [ldev] AUTHORITY.KEYID = 7
6,056,979 UART: [ldev] FE.KEYID = 1
6,099,822 UART: [ldev] Erasing FE.KEYID = 1
8,607,631 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,165 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,405 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,722 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,403,372 UART: [ldev] --
10,408,590 UART: [fwproc] Wait for Commands...
10,410,638 UART: [fwproc] Recv command 0x46574c44
10,412,900 UART: [fwproc] Recv'd Img size: 119428 bytes
13,915,199 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,996,973 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,548 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,686,116 >>> mbox cmd response: success
14,689,639 UART: [afmc] ++
14,690,370 UART: [afmc] CDI.KEYID = 6
14,691,567 UART: [afmc] SUBJECT.KEYID = 7
14,693,056 UART: [afmc] AUTHORITY.KEYID = 5
17,228,729 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,953,413 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,955,323 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,970,416 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,985,604 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,000,513 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,023,658 UART: [afmc] --
19,026,789 UART: [cold-reset] --
19,030,391 UART: [state] Locking Datavault
19,037,052 UART: [state] Locking PCR0, PCR1 and PCR31
19,039,252 UART: [state] Locking ICCM
19,041,763 UART: [exit] Launching FMC @ 0x40000130
19,050,439 UART:
19,050,682 UART: Running Caliptra FMC ...
19,051,786 UART:
19,051,956 UART: [state] CFI Enabled
19,109,513 UART: [fht] FMC Alias Private Key: 7
20,875,935 UART: [art] Extend RT PCRs Done
20,877,153 UART: [art] Lock RT PCRs Done
20,879,136 UART: [art] Populate DV Done
20,884,449 UART: [fht] FMC Alias Private Key: 7
20,885,941 UART: [art] Derive CDI
20,886,685 UART: [art] Store in slot 0x4
20,934,854 UART: [art] Derive Key Pair
20,935,892 UART: [art] Store priv key in slot 0x5
23,399,062 UART: [art] Derive Key Pair - Done
23,412,061 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,124,301 UART: [art] Erasing AUTHORITY.KEYID = 7
25,125,811 UART: [art] PUB.X = 6BCD61267C8D9FC6DAE6E8D7C737F52F738F57EE0C0B40753A39F6E5A307E14010CF2CFEFF08EFF94CFBF9DE4BD13326
25,133,086 UART: [art] PUB.Y = 2A879D8D183F3B79E7F68BF3D41280DD718EF9E884747DB3528A0A7F4C2A961393139A2746B510B61A60AE7FE9E32710
25,140,325 UART: [art] SIG.R = AE895EA3E32B58BB920057723EAA26577B24DD4AACD74FF339E294EBF6A1FA19B341FF4F3E12160DEFF8D6CC269C8D6D
25,147,726 UART: [art] SIG.S = F773D84951B38B5C1E2A7D2AC4660C3DD890C67D23007C706873C1822F5E9318F8D4A82F4C99F015672C9F89E4445DF1
26,126,217 UART: Caliptra RT
26,126,910 UART: [state] CFI Enabled
26,307,969 UART: [rt] RT listening for mailbox commands...
26,309,822 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,339,346 UART: [rt]cmd =0x46504c54, len=4
26,340,707 >>> mbox cmd response data (8 bytes)
26,341,395 UART: [rt] FIPS self test
26,342,345 UART: [kat] ++
26,342,803 UART: [kat] sha1
26,347,211 UART: [kat] SHA2-256
26,349,148 UART: [kat] SHA2-384
26,350,619 UART: Fatal Error: 0x90020001
26,385,989 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,536,321 >>> mbox cmd response: failed
26,536,942 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,686,754 >>> mbox cmd response: failed
Initializing fuses
941 writing to cptra_bootfsm_go
189,998 UART:
190,282 UART: Running Caliptra ROM ...
191,317 UART:
191,462 UART: [state] CFI Enabled
248,057 UART: [state] LifecycleState = Unprovisioned
250,473 UART: [state] DebugLocked = No
252,530 UART: [state] WD Timer not started. Device not locked for debugging
257,610 UART: [kat] SHA2-256
447,527 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
458,257 UART: [kat] ++
458,709 UART: [kat] sha1
470,509 UART: [kat] SHA2-256
473,519 UART: [kat] SHA2-384
479,336 UART: [kat] SHA2-512-ACC
481,944 UART: [kat] ECC-384
2,931,135 UART: [kat] HMAC-384Kdf
2,954,862 UART: [kat] LMS
3,486,655 UART: [kat] --
3,491,305 UART: [cold-reset] ++
3,493,848 UART: [fht] FHT @ 0x50003400
3,505,649 UART: [idev] ++
3,506,333 UART: [idev] CDI.KEYID = 6
3,507,355 UART: [idev] SUBJECT.KEYID = 7
3,508,463 UART: [idev] UDS.KEYID = 0
3,509,983 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,660,119 UART: [idev] Erasing UDS.KEYID = 0
6,032,974 UART: [idev] Sha1 KeyId Algorithm
6,055,298 UART: [idev] --
6,060,160 UART: [ldev] ++
6,060,849 UART: [ldev] CDI.KEYID = 6
6,061,737 UART: [ldev] SUBJECT.KEYID = 5
6,062,957 UART: [ldev] AUTHORITY.KEYID = 7
6,064,142 UART: [ldev] FE.KEYID = 1
6,103,469 UART: [ldev] Erasing FE.KEYID = 1
8,613,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,571 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,723 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,987 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,390,064 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,411,176 UART: [ldev] --
10,417,272 UART: [fwproc] Wait for Commands...
10,419,070 UART: [fwproc] Recv command 0x46574c44
10,421,344 UART: [fwproc] Recv'd Img size: 119428 bytes
13,932,228 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,009,346 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,918 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,698,897 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
3,436,834 ready_for_fw is high
3,437,267 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,845,104 >>> mbox cmd response: success
19,158,368 UART:
19,158,811 UART: Running Caliptra FMC ...
19,159,934 UART:
19,160,099 UART: [state] CFI Enabled
19,222,486 UART: [fht] FMC Alias Private Key: 7
20,988,894 UART: [art] Extend RT PCRs Done
20,990,129 UART: [art] Lock RT PCRs Done
20,991,707 UART: [art] Populate DV Done
20,996,927 UART: [fht] FMC Alias Private Key: 7
20,998,471 UART: [art] Derive CDI
20,999,316 UART: [art] Store in slot 0x4
21,055,174 UART: [art] Derive Key Pair
21,056,226 UART: [art] Store priv key in slot 0x5
23,518,248 UART: [art] Derive Key Pair - Done
23,531,092 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,243,898 UART: [art] Erasing AUTHORITY.KEYID = 7
25,245,416 UART: [art] PUB.X = 90217CA079E0300E544003C7CB4EE33CA955CCCB4DD42894F0558A979DF7A343BBF1A2E7159F5FB8CB445227DDAD9419
25,252,723 UART: [art] PUB.Y = 1F02F73598A39F34602D42AB4F4C0A0CEC1DFAFBCD2FDD7864657078B2A30AA7D129969819C6715ACD3EC2CA725A280F
25,259,957 UART: [art] SIG.R = 824E9A5F70D4D7762649A86E2E80239A5D0C63B359130C896104A1DDA9E06017EEF1BD7FE4482A40D99195D3CC3E3E07
25,267,344 UART: [art] SIG.S = 72A6ED962FFF8F87353C178698223292600F6B79BF81D6CDC24A2182CB13B2CDC1212CE8B4618E00008AA802D6793463
26,245,823 UART: Caliptra RT
26,246,515 UART: [state] CFI Enabled
26,426,057 UART: [rt] RT listening for mailbox commands...
26,427,918 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,457,946 UART: [rt]cmd =0x46504c54, len=4
26,459,558 >>> mbox cmd response data (8 bytes)
26,460,751 UART: [rt] FIPS self test
26,461,701 UART: [kat] ++
26,462,159 UART: [kat] sha1
26,466,509 UART: [kat] SHA2-256
26,468,445 UART: [kat] SHA2-384
26,469,569 UART: Fatal Error: 0x90020001
26,504,777 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,655,148 >>> mbox cmd response: failed
26,655,820 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,805,719 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,422,646 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,823,530 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,468 UART:
192,840 UART: Running Caliptra ROM ...
193,995 UART:
603,576 UART: [state] CFI Enabled
616,819 UART: [state] LifecycleState = Unprovisioned
619,196 UART: [state] DebugLocked = No
621,866 UART: [state] WD Timer not started. Device not locked for debugging
625,628 UART: [kat] SHA2-256
815,540 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,331 UART: [kat] ++
826,812 UART: [kat] sha1
838,655 UART: [kat] SHA2-256
841,646 UART: [kat] SHA2-384
847,366 UART: [kat] SHA2-512-ACC
849,956 UART: [kat] ECC-384
3,295,385 UART: [kat] HMAC-384Kdf
3,307,933 UART: [kat] LMS
3,839,723 UART: [kat] --
3,843,818 UART: [cold-reset] ++
3,845,398 UART: [fht] FHT @ 0x50003400
3,856,384 UART: [idev] ++
3,857,099 UART: [idev] CDI.KEYID = 6
3,857,988 UART: [idev] SUBJECT.KEYID = 7
3,859,240 UART: [idev] UDS.KEYID = 0
3,860,150 ready_for_fw is high
3,860,370 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,010,380 UART: [idev] Erasing UDS.KEYID = 0
6,335,430 UART: [idev] Sha1 KeyId Algorithm
6,356,260 UART: [idev] --
6,361,639 UART: [ldev] ++
6,362,336 UART: [ldev] CDI.KEYID = 6
6,363,253 UART: [ldev] SUBJECT.KEYID = 5
6,364,357 UART: [ldev] AUTHORITY.KEYID = 7
6,365,650 UART: [ldev] FE.KEYID = 1
6,377,219 UART: [ldev] Erasing FE.KEYID = 1
8,856,525 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,192 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,588,373 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,665 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,560 UART: [ldev] --
10,644,504 UART: [fwproc] Wait for Commands...
10,647,251 UART: [fwproc] Recv command 0x46574c44
10,649,540 UART: [fwproc] Recv'd Img size: 119428 bytes
14,152,454 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,443 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,122 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,913,822 >>> mbox cmd response: success
14,918,550 UART: [afmc] ++
14,919,251 UART: [afmc] CDI.KEYID = 6
14,920,357 UART: [afmc] SUBJECT.KEYID = 7
14,921,897 UART: [afmc] AUTHORITY.KEYID = 5
17,423,190 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,696 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,610 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,745 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,865 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,759 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,216,842 UART: [afmc] --
19,220,513 UART: [cold-reset] --
19,224,272 UART: [state] Locking Datavault
19,228,662 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,847 UART: [state] Locking ICCM
19,232,887 UART: [exit] Launching FMC @ 0x40000130
19,241,558 UART:
19,241,798 UART: Running Caliptra FMC ...
19,242,904 UART:
19,243,065 UART: [state] CFI Enabled
19,251,171 UART: [fht] FMC Alias Private Key: 7
21,017,769 UART: [art] Extend RT PCRs Done
21,019,001 UART: [art] Lock RT PCRs Done
21,020,772 UART: [art] Populate DV Done
21,026,026 UART: [fht] FMC Alias Private Key: 7
21,027,729 UART: [art] Derive CDI
21,028,474 UART: [art] Store in slot 0x4
21,071,253 UART: [art] Derive Key Pair
21,072,299 UART: [art] Store priv key in slot 0x5
23,498,514 UART: [art] Derive Key Pair - Done
23,511,190 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,598 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,107 UART: [art] PUB.X = EF233405CCCBC2BCC262120071198020BDAD7D75D33649F9E905171465505FEFB0849780B6FCED85620B6688A0BF54C6
25,226,340 UART: [art] PUB.Y = 775D7C482CA795BD0AD3C54D1A54948D7EF5AE05C2845C6077AFBAD06DA5078522B025BE9DFED636B624A3123D55D271
25,233,631 UART: [art] SIG.R = DA27F3FDA1CCC8FE6D14056B8A233C905D7E704B213C57563681823E2192839C4BE55DAB3FFCA0ABEB1C1EC36398A6E3
25,241,015 UART: [art] SIG.S = CCAB38ADB0CA62485DAF7BE3427D9E8FA251DE857A610D925D0A2D14F259BF5E8A6F095A50718F206A1BEC470CC21358
26,219,428 UART: Caliptra RT
26,220,145 UART: [state] CFI Enabled
26,353,046 UART: [rt] RT listening for mailbox commands...
26,354,906 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,384,584 UART: [rt]cmd =0x46504c54, len=4
26,386,277 >>> mbox cmd response data (8 bytes)
26,387,458 UART: [rt] FIPS self test
26,388,425 UART: [kat] ++
26,388,877 UART: [kat] sha1
26,393,176 UART: [kat] SHA2-256
26,395,116 UART: [kat] SHA2-384
26,396,298 UART: Fatal Error: 0x90020001
26,431,682 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,581,525 >>> mbox cmd response: failed
26,582,113 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,732,418 >>> mbox cmd response: failed
Initializing fuses
932 writing to cptra_bootfsm_go
190,100 UART:
190,390 UART: Running Caliptra ROM ...
191,424 UART:
13,796,210 UART: [state] CFI Enabled
13,809,456 UART: [state] LifecycleState = Unprovisioned
13,811,511 UART: [state] DebugLocked = No
13,813,956 UART: [state] WD Timer not started. Device not locked for debugging
13,819,233 UART: [kat] SHA2-256
14,009,125 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,019,907 UART: [kat] ++
14,020,449 UART: [kat] sha1
14,031,396 UART: [kat] SHA2-256
14,034,375 UART: [kat] SHA2-384
14,039,781 UART: [kat] SHA2-512-ACC
14,042,360 UART: [kat] ECC-384
16,484,597 UART: [kat] HMAC-384Kdf
16,498,360 UART: [kat] LMS
17,030,190 UART: [kat] --
17,035,985 UART: [cold-reset] ++
17,037,009 UART: [fht] FHT @ 0x50003400
17,048,756 UART: [idev] ++
17,049,453 UART: [idev] CDI.KEYID = 6
17,050,422 UART: [idev] SUBJECT.KEYID = 7
17,051,586 UART: [idev] UDS.KEYID = 0
17,053,133 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,203,086 UART: [idev] Erasing UDS.KEYID = 0
19,527,172 UART: [idev] Sha1 KeyId Algorithm
19,549,428 UART: [idev] --
19,554,695 UART: [ldev] ++
19,555,386 UART: [ldev] CDI.KEYID = 6
19,556,298 UART: [ldev] SUBJECT.KEYID = 5
19,557,457 UART: [ldev] AUTHORITY.KEYID = 7
19,558,688 UART: [ldev] FE.KEYID = 1
19,567,987 UART: [ldev] Erasing FE.KEYID = 1
22,044,022 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,763,271 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,778,485 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,793,652 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,808,779 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,829,394 UART: [ldev] --
23,834,942 UART: [fwproc] Wait for Commands...
23,837,369 UART: [fwproc] Recv command 0x46574c44
23,839,641 UART: [fwproc] Recv'd Img size: 119428 bytes
27,344,860 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,417,881 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,541,526 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,107,713 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
3,754,982 ready_for_fw is high
3,755,448 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,060,064 >>> mbox cmd response: success
19,316,075 UART:
19,316,472 UART: Running Caliptra FMC ...
19,317,606 UART:
19,317,764 UART: [state] CFI Enabled
19,325,506 UART: [fht] FMC Alias Private Key: 7
21,091,860 UART: [art] Extend RT PCRs Done
21,093,095 UART: [art] Lock RT PCRs Done
21,094,595 UART: [art] Populate DV Done
21,100,291 UART: [fht] FMC Alias Private Key: 7
21,101,896 UART: [art] Derive CDI
21,102,642 UART: [art] Store in slot 0x4
21,145,466 UART: [art] Derive Key Pair
21,146,512 UART: [art] Store priv key in slot 0x5
23,573,494 UART: [art] Derive Key Pair - Done
23,586,290 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,292,602 UART: [art] Erasing AUTHORITY.KEYID = 7
25,294,115 UART: [art] PUB.X = 596981A9F3C8EF0D222B42243CF3F965C5F787E7D030399D680B03067C963DD27F641B1AD0323765F8E22CB4B079D573
25,301,355 UART: [art] PUB.Y = 80D9C52CE8E62D732D95AA55D7A18F3762B3E21AEA320D5FA51B8EC3735FAF74BA6C292E2CD3C29B7D2DFE1EBE74C9EC
25,308,663 UART: [art] SIG.R = 262CE6D938E76EDCBE02019B0E2504A5B44CE95FDD139F8345AB40C9841EBDA2EC7DA913552DF3AFE693AF0697EADC9F
25,316,102 UART: [art] SIG.S = 8CE80ECA0AC57D225F09DDD0F426E978B2F6933E57F72CDF0E0D61FAC0B6AF9BC078CDA386B184A1D1326082DED9C5F7
26,295,183 UART: Caliptra RT
26,295,895 UART: [state] CFI Enabled
26,428,742 UART: [rt] RT listening for mailbox commands...
26,430,592 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,460,237 UART: [rt]cmd =0x46504c54, len=4
26,461,711 >>> mbox cmd response data (8 bytes)
26,463,045 UART: [rt] FIPS self test
26,463,997 UART: [kat] ++
26,464,447 UART: [kat] sha1
26,468,870 UART: [kat] SHA2-256
26,470,803 UART: [kat] SHA2-384
26,472,012 UART: Fatal Error: 0x90020001
26,507,393 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,657,286 >>> mbox cmd response: failed
26,657,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,807,837 >>> mbox cmd response: failed
Initializing fuses
942 writing to cptra_bootfsm_go
16,886,467 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,206,092 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,684 UART: [state] LifecycleState = Unprovisioned
85,339 UART: [state] DebugLocked = No
85,879 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,375 UART: [kat] SHA2-256
881,306 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,421 UART: [kat] ++
885,573 UART: [kat] sha1
889,835 UART: [kat] SHA2-256
891,773 UART: [kat] SHA2-384
894,326 UART: [kat] SHA2-512-ACC
896,227 UART: [kat] ECC-384
901,760 UART: [kat] HMAC-384Kdf
906,266 UART: [kat] LMS
1,474,462 UART: [kat] --
1,475,603 UART: [cold-reset] ++
1,476,183 UART: [fht] Storing FHT @ 0x50003400
1,478,874 UART: [idev] ++
1,479,042 UART: [idev] CDI.KEYID = 6
1,479,402 UART: [idev] SUBJECT.KEYID = 7
1,479,826 UART: [idev] UDS.KEYID = 0
1,480,171 ready_for_fw is high
1,480,171 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,487,892 UART: [idev] Erasing UDS.KEYID = 0
1,504,532 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,080 UART: [idev] --
1,514,023 UART: [ldev] ++
1,514,191 UART: [ldev] CDI.KEYID = 6
1,514,554 UART: [ldev] SUBJECT.KEYID = 5
1,514,980 UART: [ldev] AUTHORITY.KEYID = 7
1,515,443 UART: [ldev] FE.KEYID = 1
1,520,735 UART: [ldev] Erasing FE.KEYID = 1
1,546,402 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,377 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,093 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,984 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,696 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,784 UART: [ldev] --
1,586,063 UART: [fwproc] Waiting for Commands...
1,586,828 UART: [fwproc] Received command 0x46574c44
1,587,619 UART: [fwproc] Received Image of size 119428 bytes
2,943,055 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,347 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,565 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,086 >>> mbox cmd response: success
3,144,154 UART: [afmc] ++
3,144,322 UART: [afmc] CDI.KEYID = 6
3,144,684 UART: [afmc] SUBJECT.KEYID = 7
3,145,109 UART: [afmc] AUTHORITY.KEYID = 5
3,179,758 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,196,060 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,840 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,549 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,432 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,214,115 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,789 UART: [afmc] --
3,222,787 UART: [cold-reset] --
3,223,737 UART: [state] Locking Datavault
3,224,804 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,408 UART: [state] Locking ICCM
3,225,924 UART: [exit] Launching FMC @ 0x40000130
3,231,254 UART:
3,231,270 UART: Running Caliptra FMC ...
3,231,678 UART:
3,231,732 UART: [state] CFI Enabled
3,242,446 UART: [fht] FMC Alias Private Key: 7
3,361,726 UART: [art] Extend RT PCRs Done
3,362,154 UART: [art] Lock RT PCRs Done
3,363,960 UART: [art] Populate DV Done
3,372,181 UART: [fht] FMC Alias Private Key: 7
3,373,231 UART: [art] Derive CDI
3,373,511 UART: [art] Store in slot 0x4
3,459,263 UART: [art] Derive Key Pair
3,459,623 UART: [art] Store priv key in slot 0x5
3,472,552 UART: [art] Derive Key Pair - Done
3,487,113 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,436 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,201 UART: [art] PUB.X = B8FE97D37C39DD23E450008CB3CA645650B3E134DCE32ECCDA8FEC1A3EFBFDC3481D292C56EE7CA5C25087FFF0CDFB3C
3,509,981 UART: [art] PUB.Y = E6FA930F3DA8F1299670067B66F8A9039D06BA09655EA8247ECF4D00483197A19DBAA4F76F306F337E1E5B7F7D945410
3,516,896 UART: [art] SIG.R = 4A1DDD92643E33ADF72F0759E21058F4255E92AD9A98F25723906CA35DBFC520D2ED6F986BAAABE81DDCB78674B05B3C
3,523,679 UART: [art] SIG.S = 94A21AF756CCC8C99F750CDB093D0B906A8320AFCA63F6E43BBEC15AAF0DBA0642CD5CFEA8CBD2496C1A8993657229D3
3,547,910 UART: Caliptra RT
3,548,161 UART: [state] CFI Enabled
3,667,999 UART: [rt] RT listening for mailbox commands...
3,668,662 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,698,401 UART: [rt]cmd =0x46504c54, len=4
3,699,605 >>> mbox cmd response data (8 bytes)
3,699,754 UART: [rt] FIPS self test
3,700,082 UART: [kat] ++
3,700,234 UART: [kat] sha1
3,704,302 UART: [kat] SHA2-256
3,706,324 UART: [kat] SHA2-384
3,707,204 UART: Fatal Error: 0x90020001
3,708,743 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,748 >>> mbox cmd response: failed
3,708,748 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,708,753 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,990 UART: [state] LifecycleState = Unprovisioned
85,645 UART: [state] DebugLocked = No
86,153 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,793 UART: [kat] SHA2-256
881,724 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,839 UART: [kat] ++
885,991 UART: [kat] sha1
890,387 UART: [kat] SHA2-256
892,325 UART: [kat] SHA2-384
895,294 UART: [kat] SHA2-512-ACC
897,195 UART: [kat] ECC-384
902,942 UART: [kat] HMAC-384Kdf
907,342 UART: [kat] LMS
1,475,538 UART: [kat] --
1,476,325 UART: [cold-reset] ++
1,476,715 UART: [fht] Storing FHT @ 0x50003400
1,479,586 UART: [idev] ++
1,479,754 UART: [idev] CDI.KEYID = 6
1,480,114 UART: [idev] SUBJECT.KEYID = 7
1,480,538 UART: [idev] UDS.KEYID = 0
1,480,883 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,588 UART: [idev] Erasing UDS.KEYID = 0
1,504,690 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,342 UART: [idev] --
1,514,305 UART: [ldev] ++
1,514,473 UART: [ldev] CDI.KEYID = 6
1,514,836 UART: [ldev] SUBJECT.KEYID = 5
1,515,262 UART: [ldev] AUTHORITY.KEYID = 7
1,515,725 UART: [ldev] FE.KEYID = 1
1,520,817 UART: [ldev] Erasing FE.KEYID = 1
1,545,860 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,395 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,286 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,998 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,896 UART: [ldev] --
1,585,171 UART: [fwproc] Waiting for Commands...
1,585,842 UART: [fwproc] Received command 0x46574c44
1,586,633 UART: [fwproc] Received Image of size 119428 bytes
2,941,183 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,968,663 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,999,881 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,141,404 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.52s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,375 ready_for_fw is high
1,362,375 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,352 >>> mbox cmd response: success
3,054,335 UART:
3,054,351 UART: Running Caliptra FMC ...
3,054,759 UART:
3,054,813 UART: [state] CFI Enabled
3,065,419 UART: [fht] FMC Alias Private Key: 7
3,183,921 UART: [art] Extend RT PCRs Done
3,184,349 UART: [art] Lock RT PCRs Done
3,185,877 UART: [art] Populate DV Done
3,194,062 UART: [fht] FMC Alias Private Key: 7
3,195,162 UART: [art] Derive CDI
3,195,442 UART: [art] Store in slot 0x4
3,281,486 UART: [art] Derive Key Pair
3,281,846 UART: [art] Store priv key in slot 0x5
3,295,263 UART: [art] Derive Key Pair - Done
3,309,902 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,797 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,562 UART: [art] PUB.X = AC6B5A7EED4FEACB9B6E78903B1ECDE7EF0FE1C195A5ECD488E872824DE091FC1541173D8EFD3582CCE2841F215B9B6D
3,333,355 UART: [art] PUB.Y = 2257218BDE514E416032135BB475265B011E31DE9890BFC5549C2045B4C640CF5683B00ECFF32EF4AE8654BC86BEDC7F
3,340,305 UART: [art] SIG.R = 1687FA52E5CB6A115402EE887EEB049EB14F0669EAF457DDE32BCCC05F9D2247A0B2BBAFE51DFE2CD864D91C2B533579
3,347,086 UART: [art] SIG.S = 5717CB05A53521A933408EA5C7C63E64AB7ECF12C0A840B1900F9985FACDAB6A25A7A0FF550188CEE0B4C534E9DED26C
3,370,861 UART: Caliptra RT
3,371,112 UART: [state] CFI Enabled
3,490,693 UART: [rt] RT listening for mailbox commands...
3,491,356 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,521,147 UART: [rt]cmd =0x46504c54, len=4
3,522,283 >>> mbox cmd response data (8 bytes)
3,522,420 UART: [rt] FIPS self test
3,522,748 UART: [kat] ++
3,522,900 UART: [kat] sha1
3,527,216 UART: [kat] SHA2-256
3,529,238 UART: [kat] SHA2-384
3,529,964 UART: Fatal Error: 0x90020001
3,531,503 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,508 >>> mbox cmd response: failed
3,531,508 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,531,513 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,637 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,514 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,403 UART: [state] LifecycleState = Unprovisioned
86,058 UART: [state] DebugLocked = No
86,554 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,176 UART: [kat] SHA2-256
882,107 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,222 UART: [kat] ++
886,374 UART: [kat] sha1
890,492 UART: [kat] SHA2-256
892,430 UART: [kat] SHA2-384
895,155 UART: [kat] SHA2-512-ACC
897,056 UART: [kat] ECC-384
902,825 UART: [kat] HMAC-384Kdf
907,473 UART: [kat] LMS
1,475,669 UART: [kat] --
1,476,666 UART: [cold-reset] ++
1,477,192 UART: [fht] Storing FHT @ 0x50003400
1,480,001 UART: [idev] ++
1,480,169 UART: [idev] CDI.KEYID = 6
1,480,529 UART: [idev] SUBJECT.KEYID = 7
1,480,953 UART: [idev] UDS.KEYID = 0
1,481,298 ready_for_fw is high
1,481,298 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,131 UART: [idev] Erasing UDS.KEYID = 0
1,506,553 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,143 UART: [idev] --
1,516,190 UART: [ldev] ++
1,516,358 UART: [ldev] CDI.KEYID = 6
1,516,721 UART: [ldev] SUBJECT.KEYID = 5
1,517,147 UART: [ldev] AUTHORITY.KEYID = 7
1,517,610 UART: [ldev] FE.KEYID = 1
1,522,638 UART: [ldev] Erasing FE.KEYID = 1
1,547,909 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,273 UART: [ldev] --
1,587,718 UART: [fwproc] Waiting for Commands...
1,588,543 UART: [fwproc] Received command 0x46574c44
1,589,334 UART: [fwproc] Received Image of size 119428 bytes
2,944,016 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,260 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,478 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,069 >>> mbox cmd response: success
3,145,215 UART: [afmc] ++
3,145,383 UART: [afmc] CDI.KEYID = 6
3,145,745 UART: [afmc] SUBJECT.KEYID = 7
3,146,170 UART: [afmc] AUTHORITY.KEYID = 5
3,181,639 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,198,011 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,791 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,204,500 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,210,383 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,216,066 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,904 UART: [afmc] --
3,224,884 UART: [cold-reset] --
3,225,652 UART: [state] Locking Datavault
3,226,761 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,365 UART: [state] Locking ICCM
3,227,797 UART: [exit] Launching FMC @ 0x40000130
3,233,127 UART:
3,233,143 UART: Running Caliptra FMC ...
3,233,551 UART:
3,233,694 UART: [state] CFI Enabled
3,244,234 UART: [fht] FMC Alias Private Key: 7
3,363,466 UART: [art] Extend RT PCRs Done
3,363,894 UART: [art] Lock RT PCRs Done
3,365,332 UART: [art] Populate DV Done
3,373,451 UART: [fht] FMC Alias Private Key: 7
3,374,389 UART: [art] Derive CDI
3,374,669 UART: [art] Store in slot 0x4
3,460,819 UART: [art] Derive Key Pair
3,461,179 UART: [art] Store priv key in slot 0x5
3,474,594 UART: [art] Derive Key Pair - Done
3,489,366 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,857 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,622 UART: [art] PUB.X = A2E01C95337ACE42451F74E9F1D9AEE450F40F64EF208B24D36984A2AAE81335C3CE6A0FF7B6C92520D753806FA9624A
3,512,394 UART: [art] PUB.Y = E35CB6D9935100B96FA3B18875071C66615DB66FBFD9FD053388A67AFA5B3BF5DE6C9D255445873C3ECE2656C159B75D
3,519,324 UART: [art] SIG.R = A2F6CF4D32FB48DCBDBE791E233B49B3C9136450AC181B316CFFB7E12A1AA8EBF9016D35827D681967951113A1A32CEB
3,526,105 UART: [art] SIG.S = BB15E7782F369770B6DBF1C9617BA5D9DB9337A0A2B1A20ABB9B680F068251FFC593A638663A78F93E1D711C219BA437
3,548,836 UART: Caliptra RT
3,549,179 UART: [state] CFI Enabled
3,669,348 UART: [rt] RT listening for mailbox commands...
3,670,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,238 UART: [rt]cmd =0x46504c54, len=4
3,701,420 >>> mbox cmd response data (8 bytes)
3,701,765 UART: [rt] FIPS self test
3,702,093 UART: [kat] ++
3,702,245 UART: [kat] sha1
3,706,499 UART: [kat] SHA2-256
3,708,521 UART: [kat] SHA2-384
3,709,279 UART: Fatal Error: 0x90020001
3,710,818 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,823 >>> mbox cmd response: failed
3,710,823 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,710,828 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,491 UART: [state] LifecycleState = Unprovisioned
86,146 UART: [state] DebugLocked = No
86,668 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,190 UART: [kat] SHA2-256
882,121 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,236 UART: [kat] ++
886,388 UART: [kat] sha1
890,444 UART: [kat] SHA2-256
892,382 UART: [kat] SHA2-384
895,113 UART: [kat] SHA2-512-ACC
897,014 UART: [kat] ECC-384
902,659 UART: [kat] HMAC-384Kdf
907,229 UART: [kat] LMS
1,475,425 UART: [kat] --
1,476,554 UART: [cold-reset] ++
1,477,040 UART: [fht] Storing FHT @ 0x50003400
1,479,979 UART: [idev] ++
1,480,147 UART: [idev] CDI.KEYID = 6
1,480,507 UART: [idev] SUBJECT.KEYID = 7
1,480,931 UART: [idev] UDS.KEYID = 0
1,481,276 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,889 UART: [idev] Erasing UDS.KEYID = 0
1,505,705 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,343 UART: [idev] --
1,515,570 UART: [ldev] ++
1,515,738 UART: [ldev] CDI.KEYID = 6
1,516,101 UART: [ldev] SUBJECT.KEYID = 5
1,516,527 UART: [ldev] AUTHORITY.KEYID = 7
1,516,990 UART: [ldev] FE.KEYID = 1
1,522,520 UART: [ldev] Erasing FE.KEYID = 1
1,547,651 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,186 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,902 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,527 UART: [ldev] --
1,586,790 UART: [fwproc] Waiting for Commands...
1,587,409 UART: [fwproc] Received command 0x46574c44
1,588,200 UART: [fwproc] Received Image of size 119428 bytes
2,943,692 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,524 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,742 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,485 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,516 ready_for_fw is high
1,362,516 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,991,761 >>> mbox cmd response: success
3,053,680 UART:
3,053,696 UART: Running Caliptra FMC ...
3,054,104 UART:
3,054,247 UART: [state] CFI Enabled
3,064,557 UART: [fht] FMC Alias Private Key: 7
3,183,653 UART: [art] Extend RT PCRs Done
3,184,081 UART: [art] Lock RT PCRs Done
3,185,683 UART: [art] Populate DV Done
3,193,924 UART: [fht] FMC Alias Private Key: 7
3,195,002 UART: [art] Derive CDI
3,195,282 UART: [art] Store in slot 0x4
3,281,224 UART: [art] Derive Key Pair
3,281,584 UART: [art] Store priv key in slot 0x5
3,295,047 UART: [art] Derive Key Pair - Done
3,309,735 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,325,380 UART: [art] Erasing AUTHORITY.KEYID = 7
3,326,145 UART: [art] PUB.X = CC63A20022F94B0E173C772C3C3B0ED3F619F73D57F2D8855C89BA41B2E84D943F38D8044313DED146B11F656F517BE8
3,332,888 UART: [art] PUB.Y = AA70D4ED33E98E075BE9514A8902995D93DD1ACA952841D2003E185B78703EB4226B51485966D2BD0B6773954AF0FC5F
3,339,807 UART: [art] SIG.R = 081327316A508F2BF8E6F4B843D1C768EA3CC485B22D46D815EEFA03FB29091CA6452FDDC8EB117FCA1F63DFD7735AD1
3,346,584 UART: [art] SIG.S = 0B99F0E39D19CB243288F46FA5523D29A7D0071E2D5F3857DAADB07EC7E5A70AB6DCB7A03C2DB278A53C22647514908E
3,370,053 UART: Caliptra RT
3,370,396 UART: [state] CFI Enabled
3,489,783 UART: [rt] RT listening for mailbox commands...
3,490,446 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,547 UART: [rt]cmd =0x46504c54, len=4
3,521,717 >>> mbox cmd response data (8 bytes)
3,522,046 UART: [rt] FIPS self test
3,522,374 UART: [kat] ++
3,522,526 UART: [kat] sha1
3,526,678 UART: [kat] SHA2-256
3,528,700 UART: [kat] SHA2-384
3,529,376 UART: Fatal Error: 0x90020001
3,530,915 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,920 >>> mbox cmd response: failed
3,530,920 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,530,925 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,943 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.16s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,866 UART: [state] LifecycleState = Unprovisioned
85,521 UART: [state] DebugLocked = No
86,207 UART: [state] WD Timer not started. Device not locked for debugging
87,382 UART: [kat] SHA2-256
890,932 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,036 UART: [kat] ++
895,188 UART: [kat] sha1
899,412 UART: [kat] SHA2-256
901,352 UART: [kat] SHA2-384
904,101 UART: [kat] SHA2-512-ACC
906,002 UART: [kat] ECC-384
915,625 UART: [kat] HMAC-384Kdf
920,297 UART: [kat] LMS
1,168,609 UART: [kat] --
1,169,534 UART: [cold-reset] ++
1,170,084 UART: [fht] FHT @ 0x50003400
1,172,740 UART: [idev] ++
1,172,908 UART: [idev] CDI.KEYID = 6
1,173,269 UART: [idev] SUBJECT.KEYID = 7
1,173,694 UART: [idev] UDS.KEYID = 0
1,174,040 ready_for_fw is high
1,174,040 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,813 UART: [idev] Erasing UDS.KEYID = 0
1,199,131 UART: [idev] Sha1 KeyId Algorithm
1,208,081 UART: [idev] --
1,209,070 UART: [ldev] ++
1,209,238 UART: [ldev] CDI.KEYID = 6
1,209,602 UART: [ldev] SUBJECT.KEYID = 5
1,210,029 UART: [ldev] AUTHORITY.KEYID = 7
1,210,492 UART: [ldev] FE.KEYID = 1
1,215,848 UART: [ldev] Erasing FE.KEYID = 1
1,242,249 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,775 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,491 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,380 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,092 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,212 UART: [ldev] --
1,281,535 UART: [fwproc] Wait for Commands...
1,282,318 UART: [fwproc] Recv command 0x46574c44
1,283,051 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,974 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,357 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,532 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,057 >>> mbox cmd response: success
2,838,227 UART: [afmc] ++
2,838,395 UART: [afmc] CDI.KEYID = 6
2,838,758 UART: [afmc] SUBJECT.KEYID = 7
2,839,184 UART: [afmc] AUTHORITY.KEYID = 5
2,874,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,550 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,299 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,009 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,890 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,591 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,168 UART: [afmc] --
2,917,187 UART: [cold-reset] --
2,918,157 UART: [state] Locking Datavault
2,919,418 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,022 UART: [state] Locking ICCM
2,920,500 UART: [exit] Launching FMC @ 0x40000130
2,925,830 UART:
2,925,846 UART: Running Caliptra FMC ...
2,926,254 UART:
2,926,308 UART: [state] CFI Enabled
2,936,630 UART: [fht] FMC Alias Private Key: 7
3,055,370 UART: [art] Extend RT PCRs Done
3,055,798 UART: [art] Lock RT PCRs Done
3,056,854 UART: [art] Populate DV Done
3,065,161 UART: [fht] FMC Alias Private Key: 7
3,066,109 UART: [art] Derive CDI
3,066,389 UART: [art] Store in slot 0x4
3,151,786 UART: [art] Derive Key Pair
3,152,146 UART: [art] Store priv key in slot 0x5
3,165,408 UART: [art] Derive Key Pair - Done
3,180,066 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,195,613 UART: [art] Erasing AUTHORITY.KEYID = 7
3,196,378 UART: [art] PUB.X = 71FABFFBE6FA36E314557706406924A450383F378D30D246B4184CC4350E7D87A20E41F7F346CC09084513E81DCBC702
3,203,128 UART: [art] PUB.Y = BA3C3BF640066501046C7E514D74A232C052D2262C31E095B33822DD63B65DF4B76DAB702DB43DBD16857FA53C183294
3,210,069 UART: [art] SIG.R = 8F0AD9F5C8C9F479A24018779508815F471B3A6B6F37FAF0F0049E3C7C1D74E71E50BE4F4E3CCF1B33CAD27880C35F46
3,216,840 UART: [art] SIG.S = A597F93649AF73965011684DF65D50236094B0814B88662EA844E7E99A20282C16440906B7B3B767D91E5F06AC6A5C18
3,240,647 UART: Caliptra RT
3,240,898 UART: [state] CFI Enabled
3,361,674 UART: [rt] RT listening for mailbox commands...
3,362,337 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,404 UART: [rt]cmd =0x46504c54, len=4
3,393,504 >>> mbox cmd response data (8 bytes)
3,393,679 UART: [rt] FIPS self test
3,394,007 UART: [kat] ++
3,394,159 UART: [kat] sha1
3,398,435 UART: [kat] SHA2-256
3,400,457 UART: [kat] SHA2-384
3,401,087 UART: Fatal Error: 0x90020001
3,402,626 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,631 >>> mbox cmd response: failed
3,402,631 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,402,636 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,164 UART: [state] LifecycleState = Unprovisioned
85,819 UART: [state] DebugLocked = No
86,405 UART: [state] WD Timer not started. Device not locked for debugging
87,584 UART: [kat] SHA2-256
891,134 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,238 UART: [kat] ++
895,390 UART: [kat] sha1
899,512 UART: [kat] SHA2-256
901,452 UART: [kat] SHA2-384
904,323 UART: [kat] SHA2-512-ACC
906,224 UART: [kat] ECC-384
915,867 UART: [kat] HMAC-384Kdf
920,575 UART: [kat] LMS
1,168,887 UART: [kat] --
1,169,798 UART: [cold-reset] ++
1,170,190 UART: [fht] FHT @ 0x50003400
1,172,852 UART: [idev] ++
1,173,020 UART: [idev] CDI.KEYID = 6
1,173,381 UART: [idev] SUBJECT.KEYID = 7
1,173,806 UART: [idev] UDS.KEYID = 0
1,174,152 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,611 UART: [idev] Erasing UDS.KEYID = 0
1,198,809 UART: [idev] Sha1 KeyId Algorithm
1,207,663 UART: [idev] --
1,208,690 UART: [ldev] ++
1,208,858 UART: [ldev] CDI.KEYID = 6
1,209,222 UART: [ldev] SUBJECT.KEYID = 5
1,209,649 UART: [ldev] AUTHORITY.KEYID = 7
1,210,112 UART: [ldev] FE.KEYID = 1
1,215,536 UART: [ldev] Erasing FE.KEYID = 1
1,241,861 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,411 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,127 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,016 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,728 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,918 UART: [ldev] --
1,281,303 UART: [fwproc] Wait for Commands...
1,281,940 UART: [fwproc] Recv command 0x46574c44
1,282,673 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,662,925 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,100 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,835,625 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,546 ready_for_fw is high
1,059,546 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,644 >>> mbox cmd response: success
2,753,775 UART:
2,753,791 UART: Running Caliptra FMC ...
2,754,199 UART:
2,754,253 UART: [state] CFI Enabled
2,764,787 UART: [fht] FMC Alias Private Key: 7
2,883,241 UART: [art] Extend RT PCRs Done
2,883,669 UART: [art] Lock RT PCRs Done
2,885,213 UART: [art] Populate DV Done
2,893,356 UART: [fht] FMC Alias Private Key: 7
2,894,394 UART: [art] Derive CDI
2,894,674 UART: [art] Store in slot 0x4
2,980,335 UART: [art] Derive Key Pair
2,980,695 UART: [art] Store priv key in slot 0x5
2,993,955 UART: [art] Derive Key Pair - Done
3,008,721 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,348 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,113 UART: [art] PUB.X = 26D0F1D7F31635BEE0168FEBF6D87FE23219959EBB9D8C2C8794AED63C71FDA1AD78D5D318EE9CF5249336E7BC86B126
3,031,899 UART: [art] PUB.Y = F154A929427F1AB91620959E6B9A5510E24DC741B42E8A7855D8A75AE20685B692B897B741D687EE579AEC75FF5D9394
3,038,844 UART: [art] SIG.R = 553F72BDD9720EB1CCD27B367ECCDE895AA0BC9BBADB93116A96D307EF66F1C10B48523E5CBDD9AAAF698277B8FC05E9
3,045,628 UART: [art] SIG.S = 2B8B88327480543577772AF031C6499C42CFA9BB22E6793A972B12EBE752B25E1BD059E100C5C9B5B47C6771B468DAC4
3,069,172 UART: Caliptra RT
3,069,423 UART: [state] CFI Enabled
3,188,637 UART: [rt] RT listening for mailbox commands...
3,189,300 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,219,219 UART: [rt]cmd =0x46504c54, len=4
3,220,357 >>> mbox cmd response data (8 bytes)
3,220,578 UART: [rt] FIPS self test
3,220,906 UART: [kat] ++
3,221,058 UART: [kat] sha1
3,225,314 UART: [kat] SHA2-256
3,227,336 UART: [kat] SHA2-384
3,228,308 UART: Fatal Error: 0x90020001
3,229,847 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,852 >>> mbox cmd response: failed
3,229,852 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,229,857 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,562 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,688,924 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.06s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,144 UART: [state] WD Timer not started. Device not locked for debugging
87,457 UART: [kat] SHA2-256
891,007 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,111 UART: [kat] ++
895,263 UART: [kat] sha1
899,481 UART: [kat] SHA2-256
901,421 UART: [kat] SHA2-384
904,218 UART: [kat] SHA2-512-ACC
906,119 UART: [kat] ECC-384
915,702 UART: [kat] HMAC-384Kdf
920,220 UART: [kat] LMS
1,168,532 UART: [kat] --
1,169,399 UART: [cold-reset] ++
1,169,863 UART: [fht] FHT @ 0x50003400
1,172,421 UART: [idev] ++
1,172,589 UART: [idev] CDI.KEYID = 6
1,172,950 UART: [idev] SUBJECT.KEYID = 7
1,173,375 UART: [idev] UDS.KEYID = 0
1,173,721 ready_for_fw is high
1,173,721 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,572 UART: [idev] Erasing UDS.KEYID = 0
1,199,166 UART: [idev] Sha1 KeyId Algorithm
1,208,142 UART: [idev] --
1,209,231 UART: [ldev] ++
1,209,399 UART: [ldev] CDI.KEYID = 6
1,209,763 UART: [ldev] SUBJECT.KEYID = 5
1,210,190 UART: [ldev] AUTHORITY.KEYID = 7
1,210,653 UART: [ldev] FE.KEYID = 1
1,215,773 UART: [ldev] Erasing FE.KEYID = 1
1,241,958 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,500 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,216 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,105 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,817 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,727 UART: [ldev] --
1,281,024 UART: [fwproc] Wait for Commands...
1,281,763 UART: [fwproc] Recv command 0x46574c44
1,282,496 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,965 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,112 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,287 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,980 >>> mbox cmd response: success
2,839,086 UART: [afmc] ++
2,839,254 UART: [afmc] CDI.KEYID = 6
2,839,617 UART: [afmc] SUBJECT.KEYID = 7
2,840,043 UART: [afmc] AUTHORITY.KEYID = 5
2,876,106 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,703 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,452 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,162 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,043 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,744 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,449 UART: [afmc] --
2,919,438 UART: [cold-reset] --
2,920,446 UART: [state] Locking Datavault
2,921,745 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,349 UART: [state] Locking ICCM
2,922,937 UART: [exit] Launching FMC @ 0x40000130
2,928,267 UART:
2,928,283 UART: Running Caliptra FMC ...
2,928,691 UART:
2,928,834 UART: [state] CFI Enabled
2,939,580 UART: [fht] FMC Alias Private Key: 7
3,059,060 UART: [art] Extend RT PCRs Done
3,059,488 UART: [art] Lock RT PCRs Done
3,060,992 UART: [art] Populate DV Done
3,069,555 UART: [fht] FMC Alias Private Key: 7
3,070,503 UART: [art] Derive CDI
3,070,783 UART: [art] Store in slot 0x4
3,156,552 UART: [art] Derive Key Pair
3,156,912 UART: [art] Store priv key in slot 0x5
3,169,882 UART: [art] Derive Key Pair - Done
3,184,630 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,061 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,826 UART: [art] PUB.X = 9EC6022ED1B4F57DAD27FA9AC9FED4A8BE16DF38B7890D93FAC67EB47648464C4587D7B47CE57F25436F94033FF448FD
3,207,603 UART: [art] PUB.Y = 42AFC062960D7E3209CA9B03302BD4A647CFFD9ECD6B2DAFDB082AE9D11483BE7AB144D1520B8CED3B2CC9631BDD6027
3,214,560 UART: [art] SIG.R = 0499E92D41A3BE828F41B14FE0ECB25396AEC9524AE291379DAF8E71D587A655F66D853526BACB80731C192F8484D28A
3,221,331 UART: [art] SIG.S = E75529AD52ED6F8D73022132601B9E1A2DE225184F1836B3C100ACBE33DD0D7CB8571A1A45A130444CFDABFD86441694
3,245,069 UART: Caliptra RT
3,245,412 UART: [state] CFI Enabled
3,366,153 UART: [rt] RT listening for mailbox commands...
3,366,816 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,503 UART: [rt]cmd =0x46504c54, len=4
3,397,841 >>> mbox cmd response data (8 bytes)
3,398,042 UART: [rt] FIPS self test
3,398,370 UART: [kat] ++
3,398,522 UART: [kat] sha1
3,402,604 UART: [kat] SHA2-256
3,404,626 UART: [kat] SHA2-384
3,405,642 UART: Fatal Error: 0x90020001
3,407,181 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,186 >>> mbox cmd response: failed
3,407,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,191 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,821 UART: [state] LifecycleState = Unprovisioned
86,476 UART: [state] DebugLocked = No
87,098 UART: [state] WD Timer not started. Device not locked for debugging
88,369 UART: [kat] SHA2-256
891,919 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,023 UART: [kat] ++
896,175 UART: [kat] sha1
900,545 UART: [kat] SHA2-256
902,485 UART: [kat] SHA2-384
905,240 UART: [kat] SHA2-512-ACC
907,141 UART: [kat] ECC-384
916,742 UART: [kat] HMAC-384Kdf
921,408 UART: [kat] LMS
1,169,720 UART: [kat] --
1,170,847 UART: [cold-reset] ++
1,171,223 UART: [fht] FHT @ 0x50003400
1,173,713 UART: [idev] ++
1,173,881 UART: [idev] CDI.KEYID = 6
1,174,242 UART: [idev] SUBJECT.KEYID = 7
1,174,667 UART: [idev] UDS.KEYID = 0
1,175,013 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,718 UART: [idev] Erasing UDS.KEYID = 0
1,199,856 UART: [idev] Sha1 KeyId Algorithm
1,208,620 UART: [idev] --
1,209,737 UART: [ldev] ++
1,209,905 UART: [ldev] CDI.KEYID = 6
1,210,269 UART: [ldev] SUBJECT.KEYID = 5
1,210,696 UART: [ldev] AUTHORITY.KEYID = 7
1,211,159 UART: [ldev] FE.KEYID = 1
1,216,243 UART: [ldev] Erasing FE.KEYID = 1
1,242,208 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,786 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,502 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,391 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,103 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,055 UART: [ldev] --
1,281,372 UART: [fwproc] Wait for Commands...
1,282,015 UART: [fwproc] Recv command 0x46574c44
1,282,748 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,795 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,572 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,747 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,382 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,841 ready_for_fw is high
1,059,841 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,397 >>> mbox cmd response: success
2,752,234 UART:
2,752,250 UART: Running Caliptra FMC ...
2,752,658 UART:
2,752,801 UART: [state] CFI Enabled
2,763,507 UART: [fht] FMC Alias Private Key: 7
2,882,561 UART: [art] Extend RT PCRs Done
2,882,989 UART: [art] Lock RT PCRs Done
2,884,383 UART: [art] Populate DV Done
2,892,586 UART: [fht] FMC Alias Private Key: 7
2,893,618 UART: [art] Derive CDI
2,893,898 UART: [art] Store in slot 0x4
2,979,545 UART: [art] Derive Key Pair
2,979,905 UART: [art] Store priv key in slot 0x5
2,993,123 UART: [art] Derive Key Pair - Done
3,008,306 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,062 UART: [art] PUB.X = 5776AA2FF3041AB7A09783F32131EEFB8877FDAA43E22F435CE8E9BF756C5F79869C3AC791D1DF3BDB780D2EB80270E9
3,030,837 UART: [art] PUB.Y = 42E921277C47E4A20E457E30B248213C589EAD338CA3EC40366B9AA81B3AE9B9F841D3E548B622A93610C61584F2487E
3,037,782 UART: [art] SIG.R = ACAB4D530005A4D8F073696B49D4572BE3498D6B09B16210FBEC68745C3E16636F6357F24EFDA2D89462FA2A5F484F9D
3,044,530 UART: [art] SIG.S = 8019A5ED1978272F8F3F2BF4F08565BF5CD8018EA95A44976240E63AD70582AAE92F757590FFC721088DC6D1CCE4C907
3,068,422 UART: Caliptra RT
3,068,765 UART: [state] CFI Enabled
3,189,455 UART: [rt] RT listening for mailbox commands...
3,190,118 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,009 UART: [rt]cmd =0x46504c54, len=4
3,221,215 >>> mbox cmd response data (8 bytes)
3,221,440 UART: [rt] FIPS self test
3,221,768 UART: [kat] ++
3,221,920 UART: [kat] sha1
3,226,090 UART: [kat] SHA2-256
3,228,112 UART: [kat] SHA2-384
3,228,786 UART: Fatal Error: 0x90020001
3,230,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,330 >>> mbox cmd response: failed
3,230,330 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,773 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,679 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.25s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,786 UART: [state] LifecycleState = Unprovisioned
85,441 UART: [state] DebugLocked = No
86,043 UART: [state] WD Timer not started. Device not locked for debugging
87,392 UART: [kat] SHA2-256
893,042 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,167 UART: [kat] ++
897,319 UART: [kat] sha1
901,447 UART: [kat] SHA2-256
903,387 UART: [kat] SHA2-384
906,290 UART: [kat] SHA2-512-ACC
908,191 UART: [kat] ECC-384
917,662 UART: [kat] HMAC-384Kdf
922,052 UART: [kat] LMS
1,170,380 UART: [kat] --
1,170,955 UART: [cold-reset] ++
1,171,341 UART: [fht] FHT @ 0x50003400
1,174,156 UART: [idev] ++
1,174,324 UART: [idev] CDI.KEYID = 6
1,174,684 UART: [idev] SUBJECT.KEYID = 7
1,175,108 UART: [idev] UDS.KEYID = 0
1,175,453 ready_for_fw is high
1,175,453 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,183,218 UART: [idev] Erasing UDS.KEYID = 0
1,199,891 UART: [idev] Sha1 KeyId Algorithm
1,208,181 UART: [idev] --
1,209,245 UART: [ldev] ++
1,209,413 UART: [ldev] CDI.KEYID = 6
1,209,776 UART: [ldev] SUBJECT.KEYID = 5
1,210,202 UART: [ldev] AUTHORITY.KEYID = 7
1,210,665 UART: [ldev] FE.KEYID = 1
1,215,889 UART: [ldev] Erasing FE.KEYID = 1
1,242,400 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,937 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,653 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,544 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,256 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,235 UART: [ldev] --
1,281,694 UART: [fwproc] Wait for Commands...
1,282,314 UART: [fwproc] Recv command 0x46574c44
1,283,042 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,325 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,936 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,106 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,699 >>> mbox cmd response: success
2,838,827 UART: [afmc] ++
2,838,995 UART: [afmc] CDI.KEYID = 6
2,839,357 UART: [afmc] SUBJECT.KEYID = 7
2,839,782 UART: [afmc] AUTHORITY.KEYID = 5
2,875,067 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,876 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,624 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,333 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,216 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,917 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,761 UART: [afmc] --
2,918,801 UART: [cold-reset] --
2,919,585 UART: [state] Locking Datavault
2,920,810 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,414 UART: [state] Locking ICCM
2,921,864 UART: [exit] Launching FMC @ 0x40000130
2,927,194 UART:
2,927,210 UART: Running Caliptra FMC ...
2,927,618 UART:
2,927,672 UART: [state] CFI Enabled
2,938,288 UART: [fht] FMC Alias Private Key: 7
3,057,338 UART: [art] Extend RT PCRs Done
3,057,766 UART: [art] Lock RT PCRs Done
3,059,034 UART: [art] Populate DV Done
3,067,315 UART: [fht] FMC Alias Private Key: 7
3,068,491 UART: [art] Derive CDI
3,068,771 UART: [art] Store in slot 0x4
3,154,464 UART: [art] Derive Key Pair
3,154,824 UART: [art] Store priv key in slot 0x5
3,167,342 UART: [art] Derive Key Pair - Done
3,181,929 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,154 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,919 UART: [art] PUB.X = CF08D2A84F769488917A91B39DE53B56F110D9A7A7F2C52B16F1D9BDFBF4D0FB91DA9610666DE9EE8B70A80C77AEA647
3,204,699 UART: [art] PUB.Y = 95B55129791D4FB67F8B03D823EC2336AB78E8A5DF8799B0242D02B899393A98C0D428C8C051C86E2883F2B3EF33710A
3,211,638 UART: [art] SIG.R = 2C3C6C360258DC755BBBF0A01ABE6DF236AB0E04800749161BF040A755F95F2FB205912F03C18EFE0DEC3C314C4500C3
3,218,375 UART: [art] SIG.S = B95AD0D8C75BBC06E160F5ADD2057C397FE5C91A8C63C5100F374FC6EA9F2ABA5B08380B6F0264407DC1BF99A4BF6719
3,241,993 UART: Caliptra RT
3,242,244 UART: [state] CFI Enabled
3,362,527 UART: [rt] RT listening for mailbox commands...
3,363,190 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,969 UART: [rt]cmd =0x46504c54, len=4
3,394,191 >>> mbox cmd response data (8 bytes)
3,394,424 UART: [rt] FIPS self test
3,394,752 UART: [kat] ++
3,394,904 UART: [kat] sha1
3,399,132 UART: [kat] SHA2-256
3,401,154 UART: [kat] SHA2-384
3,401,902 UART: Fatal Error: 0x90020001
3,403,441 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,446 >>> mbox cmd response: failed
3,403,446 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,403,451 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,728 UART: [state] LifecycleState = Unprovisioned
86,383 UART: [state] DebugLocked = No
87,013 UART: [state] WD Timer not started. Device not locked for debugging
88,174 UART: [kat] SHA2-256
893,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,949 UART: [kat] ++
898,101 UART: [kat] sha1
902,329 UART: [kat] SHA2-256
904,269 UART: [kat] SHA2-384
907,180 UART: [kat] SHA2-512-ACC
909,081 UART: [kat] ECC-384
918,730 UART: [kat] HMAC-384Kdf
923,110 UART: [kat] LMS
1,171,438 UART: [kat] --
1,172,487 UART: [cold-reset] ++
1,172,895 UART: [fht] FHT @ 0x50003400
1,175,568 UART: [idev] ++
1,175,736 UART: [idev] CDI.KEYID = 6
1,176,096 UART: [idev] SUBJECT.KEYID = 7
1,176,520 UART: [idev] UDS.KEYID = 0
1,176,865 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,778 UART: [idev] Erasing UDS.KEYID = 0
1,201,625 UART: [idev] Sha1 KeyId Algorithm
1,210,117 UART: [idev] --
1,211,325 UART: [ldev] ++
1,211,493 UART: [ldev] CDI.KEYID = 6
1,211,856 UART: [ldev] SUBJECT.KEYID = 5
1,212,282 UART: [ldev] AUTHORITY.KEYID = 7
1,212,745 UART: [ldev] FE.KEYID = 1
1,218,067 UART: [ldev] Erasing FE.KEYID = 1
1,243,856 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,461 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,177 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,068 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,780 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,025 UART: [ldev] --
1,283,452 UART: [fwproc] Wait for Commands...
1,284,156 UART: [fwproc] Recv command 0x46574c44
1,284,884 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,321 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,668,204 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,699,374 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,841,057 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,279 ready_for_fw is high
1,060,279 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,782 >>> mbox cmd response: success
2,753,087 UART:
2,753,103 UART: Running Caliptra FMC ...
2,753,511 UART:
2,753,565 UART: [state] CFI Enabled
2,764,035 UART: [fht] FMC Alias Private Key: 7
2,882,961 UART: [art] Extend RT PCRs Done
2,883,389 UART: [art] Lock RT PCRs Done
2,884,979 UART: [art] Populate DV Done
2,893,216 UART: [fht] FMC Alias Private Key: 7
2,894,342 UART: [art] Derive CDI
2,894,622 UART: [art] Store in slot 0x4
2,980,653 UART: [art] Derive Key Pair
2,981,013 UART: [art] Store priv key in slot 0x5
2,994,655 UART: [art] Derive Key Pair - Done
3,009,180 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,901 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,666 UART: [art] PUB.X = B2DB2570A2667EE4D64CE3BC30D2543271DD21B683063AB735C6EBAAB85B0EDA666BAAEE43A01E67297DDC43C104E3C2
3,032,445 UART: [art] PUB.Y = E354DBB1D0A78B743FAD0D52D75DD65AAD41DDE1E05FC6F76DA4620E1E3C077B489D285B8CDB766F86276DECF3431551
3,039,404 UART: [art] SIG.R = 40345F8B84A4961A190AE3AA0A662DECB4F6307B5FB245B1AFD357116C50993795C6092648AF286DE2E5C1753534CD87
3,046,165 UART: [art] SIG.S = 1EBC7FED84253715B8303B1FF5E60E20738C9A03BBB9285A16F9192B1E83ADA5120F3B7D4C10EF8375B1A1CB0778B65E
3,070,279 UART: Caliptra RT
3,070,530 UART: [state] CFI Enabled
3,190,378 UART: [rt] RT listening for mailbox commands...
3,191,041 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,990 UART: [rt]cmd =0x46504c54, len=4
3,222,156 >>> mbox cmd response data (8 bytes)
3,222,345 UART: [rt] FIPS self test
3,222,673 UART: [kat] ++
3,222,825 UART: [kat] sha1
3,226,993 UART: [kat] SHA2-256
3,229,015 UART: [kat] SHA2-384
3,229,883 UART: Fatal Error: 0x90020001
3,231,422 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,427 >>> mbox cmd response: failed
3,231,427 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,231,432 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,231 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,208 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,407 UART: [state] LifecycleState = Unprovisioned
86,062 UART: [state] DebugLocked = No
86,678 UART: [state] WD Timer not started. Device not locked for debugging
87,933 UART: [kat] SHA2-256
893,583 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,708 UART: [kat] ++
897,860 UART: [kat] sha1
902,088 UART: [kat] SHA2-256
904,028 UART: [kat] SHA2-384
906,731 UART: [kat] SHA2-512-ACC
908,632 UART: [kat] ECC-384
918,167 UART: [kat] HMAC-384Kdf
922,829 UART: [kat] LMS
1,171,157 UART: [kat] --
1,171,892 UART: [cold-reset] ++
1,172,334 UART: [fht] FHT @ 0x50003400
1,175,041 UART: [idev] ++
1,175,209 UART: [idev] CDI.KEYID = 6
1,175,569 UART: [idev] SUBJECT.KEYID = 7
1,175,993 UART: [idev] UDS.KEYID = 0
1,176,338 ready_for_fw is high
1,176,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,095 UART: [idev] Erasing UDS.KEYID = 0
1,201,596 UART: [idev] Sha1 KeyId Algorithm
1,210,060 UART: [idev] --
1,211,224 UART: [ldev] ++
1,211,392 UART: [ldev] CDI.KEYID = 6
1,211,755 UART: [ldev] SUBJECT.KEYID = 5
1,212,181 UART: [ldev] AUTHORITY.KEYID = 7
1,212,644 UART: [ldev] FE.KEYID = 1
1,217,554 UART: [ldev] Erasing FE.KEYID = 1
1,244,151 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,603 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,368 UART: [ldev] --
1,283,777 UART: [fwproc] Wait for Commands...
1,284,551 UART: [fwproc] Recv command 0x46574c44
1,285,279 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,961 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,848 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,018 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,561 >>> mbox cmd response: success
2,840,815 UART: [afmc] ++
2,840,983 UART: [afmc] CDI.KEYID = 6
2,841,345 UART: [afmc] SUBJECT.KEYID = 7
2,841,770 UART: [afmc] AUTHORITY.KEYID = 5
2,876,871 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,506 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,254 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,963 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,846 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,547 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,317 UART: [afmc] --
2,920,287 UART: [cold-reset] --
2,921,039 UART: [state] Locking Datavault
2,922,006 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,610 UART: [state] Locking ICCM
2,923,220 UART: [exit] Launching FMC @ 0x40000130
2,928,550 UART:
2,928,566 UART: Running Caliptra FMC ...
2,928,974 UART:
2,929,117 UART: [state] CFI Enabled
2,940,233 UART: [fht] FMC Alias Private Key: 7
3,059,253 UART: [art] Extend RT PCRs Done
3,059,681 UART: [art] Lock RT PCRs Done
3,061,241 UART: [art] Populate DV Done
3,069,480 UART: [fht] FMC Alias Private Key: 7
3,070,538 UART: [art] Derive CDI
3,070,818 UART: [art] Store in slot 0x4
3,156,725 UART: [art] Derive Key Pair
3,157,085 UART: [art] Store priv key in slot 0x5
3,170,423 UART: [art] Derive Key Pair - Done
3,185,067 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,700 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,465 UART: [art] PUB.X = 88FE7236F3D5BCF32A26AC2C9E36D6CF47DC5BCBCFC147B737271C3A586B5CF9BE7EE4B0848980845968A9CF6A25E497
3,208,251 UART: [art] PUB.Y = 85B525688AFF9BCD2DC08ACFDAC162479A4B4950A3967E6D75FF5F4E498F8406F93C6926BEDCF11F38CF62CE647325DB
3,215,214 UART: [art] SIG.R = 482B2ABEC7CCFF41A6936892851872E71D2C4D7A10D6D6E08AE52C161E43306229315353E51DB85C3DF50062FCD12BA2
3,221,966 UART: [art] SIG.S = 850D393492DD105D459FFA9516CC5469A2B859F165EF406590D5A01C48F10480F3D6997B83093C052AC1526F4D0832F4
3,246,029 UART: Caliptra RT
3,246,372 UART: [state] CFI Enabled
3,365,543 UART: [rt] RT listening for mailbox commands...
3,366,206 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,909 UART: [rt]cmd =0x46504c54, len=4
3,397,073 >>> mbox cmd response data (8 bytes)
3,397,230 UART: [rt] FIPS self test
3,397,558 UART: [kat] ++
3,397,710 UART: [kat] sha1
3,401,898 UART: [kat] SHA2-256
3,403,920 UART: [kat] SHA2-384
3,404,748 UART: Fatal Error: 0x90020001
3,406,287 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,292 >>> mbox cmd response: failed
3,406,292 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,406,297 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,831 UART: [state] LifecycleState = Unprovisioned
86,486 UART: [state] DebugLocked = No
87,146 UART: [state] WD Timer not started. Device not locked for debugging
88,485 UART: [kat] SHA2-256
894,135 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,260 UART: [kat] ++
898,412 UART: [kat] sha1
902,608 UART: [kat] SHA2-256
904,548 UART: [kat] SHA2-384
907,349 UART: [kat] SHA2-512-ACC
909,250 UART: [kat] ECC-384
918,755 UART: [kat] HMAC-384Kdf
923,361 UART: [kat] LMS
1,171,689 UART: [kat] --
1,172,552 UART: [cold-reset] ++
1,173,110 UART: [fht] FHT @ 0x50003400
1,175,615 UART: [idev] ++
1,175,783 UART: [idev] CDI.KEYID = 6
1,176,143 UART: [idev] SUBJECT.KEYID = 7
1,176,567 UART: [idev] UDS.KEYID = 0
1,176,912 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,331 UART: [idev] Erasing UDS.KEYID = 0
1,201,556 UART: [idev] Sha1 KeyId Algorithm
1,209,962 UART: [idev] --
1,211,060 UART: [ldev] ++
1,211,228 UART: [ldev] CDI.KEYID = 6
1,211,591 UART: [ldev] SUBJECT.KEYID = 5
1,212,017 UART: [ldev] AUTHORITY.KEYID = 7
1,212,480 UART: [ldev] FE.KEYID = 1
1,217,776 UART: [ldev] Erasing FE.KEYID = 1
1,244,263 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,048 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,764 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,655 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,367 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,464 UART: [ldev] --
1,283,875 UART: [fwproc] Wait for Commands...
1,284,447 UART: [fwproc] Recv command 0x46574c44
1,285,175 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,493 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,398 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,697,568 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,223 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.18s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,726 ready_for_fw is high
1,060,726 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,692,953 >>> mbox cmd response: success
2,755,356 UART:
2,755,372 UART: Running Caliptra FMC ...
2,755,780 UART:
2,755,923 UART: [state] CFI Enabled
2,766,843 UART: [fht] FMC Alias Private Key: 7
2,886,201 UART: [art] Extend RT PCRs Done
2,886,629 UART: [art] Lock RT PCRs Done
2,887,981 UART: [art] Populate DV Done
2,896,374 UART: [fht] FMC Alias Private Key: 7
2,897,538 UART: [art] Derive CDI
2,897,818 UART: [art] Store in slot 0x4
2,983,843 UART: [art] Derive Key Pair
2,984,203 UART: [art] Store priv key in slot 0x5
2,997,953 UART: [art] Derive Key Pair - Done
3,012,663 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,028,052 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,817 UART: [art] PUB.X = 3435D4E9372B69566D51547A2798BDB5685A7DD430D0289A51EA2231EBE32DBAD718BD5D152524BE24C205C96088633E
3,035,582 UART: [art] PUB.Y = 1FAE1AAB6803CB81A4F9584E49B42CADB4FB0A2A137B7994089FDB41FA883F4794B67627A17274A6AA487CE9C589636E
3,042,533 UART: [art] SIG.R = F367026DE53EF2D43763329653306104DB28F089141A30F2386047B012030DC9280484F5AF438F48B32446B965881BD3
3,049,270 UART: [art] SIG.S = 1A7B1D9A25723A16114CD825A083C6811EF232C37C0887C29D6566B3636490270B6BDCEF04DDEF4DB56BAA62AF6132D2
3,073,667 UART: Caliptra RT
3,074,010 UART: [state] CFI Enabled
3,193,915 UART: [rt] RT listening for mailbox commands...
3,194,578 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,224,403 UART: [rt]cmd =0x46504c54, len=4
3,225,673 >>> mbox cmd response data (8 bytes)
3,225,910 UART: [rt] FIPS self test
3,226,238 UART: [kat] ++
3,226,390 UART: [kat] sha1
3,230,610 UART: [kat] SHA2-256
3,232,632 UART: [kat] SHA2-384
3,233,522 UART: Fatal Error: 0x90020001
3,235,061 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,066 >>> mbox cmd response: failed
3,235,066 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,235,071 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,896 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,867 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_failure_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,969 writing to cptra_bootfsm_go
2,697,510 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,847,300 >>> mbox cmd response: failed
2,847,876 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,996,748 >>> mbox cmd response: failed
Initializing fuses
981 writing to cptra_bootfsm_go
3,435,616 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,269,483 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,117 writing to cptra_bootfsm_go
2,694,475 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,844,310 >>> mbox cmd response: failed
2,844,857 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,993,722 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
3,457,230 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,301,675 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,796 writing to cptra_bootfsm_go
3,050,472 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,200,247 >>> mbox cmd response: failed
3,200,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,349,672 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
20,170,081 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,888,972 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,116 writing to cptra_bootfsm_go
3,048,893 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,198,501 >>> mbox cmd response: failed
3,199,071 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,347,949 >>> mbox cmd response: failed
Initializing fuses
966 writing to cptra_bootfsm_go
20,171,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,882,368 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,071 writing to cptra_bootfsm_go
2,702,450 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,852,167 >>> mbox cmd response: failed
2,852,730 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,001,811 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
3,426,095 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,285,401 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,938 writing to cptra_bootfsm_go
2,701,061 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,850,827 >>> mbox cmd response: failed
2,851,410 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,000,272 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
3,430,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,262,216 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.87s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,442 writing to cptra_bootfsm_go
3,055,979 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,206,259 >>> mbox cmd response: failed
3,206,842 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,355,700 >>> mbox cmd response: failed
Initializing fuses
952 writing to cptra_bootfsm_go
20,171,295 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,291 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e4a6e84d10c5cb600ce5d03b9982d81e87e79adcb837148cf574480c760186d8f6ad8169edbfc3093a6fe79785ca3328",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
3,054,242 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,204,245 >>> mbox cmd response: failed
3,204,811 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,353,711 >>> mbox cmd response: failed
Initializing fuses
961 writing to cptra_bootfsm_go
20,168,233 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
30,883,811 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,751 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,759 >>> mbox cmd response: failed
814,759 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,765 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,755 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,970 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,591 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,599 >>> mbox cmd response: failed
814,599 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,605 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,897 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,132 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,822 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,830 >>> mbox cmd response: failed
814,830 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,836 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,586 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,704,717 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,000 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,008 >>> mbox cmd response: failed
815,008 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,014 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,076 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,702,373 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,333 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,341 >>> mbox cmd response: failed
815,341 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,347 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,080,561 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,096 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,977 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,985 >>> mbox cmd response: failed
814,985 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,991 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,700,962 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
814,756 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,764 >>> mbox cmd response: failed
814,764 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
814,770 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,408 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,701,405 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.24s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
815,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,440 >>> mbox cmd response: failed
815,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
815,446 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "b38628d28386a98b8ad032eb38f0d677b490d5592d8f118ab0052603a4eaee6e6ad0543952e4288211f6f94aeeb79ccb",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,081,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,703,651 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,995 writing to cptra_bootfsm_go
193,222 UART:
193,569 UART: Running Caliptra ROM ...
194,664 UART:
194,812 UART: [state] CFI Enabled
265,854 UART: [state] LifecycleState = Unprovisioned
267,825 UART: [state] DebugLocked = No
269,421 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,649 UART: [kat] SHA2-256
444,324 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,841 UART: [kat] ++
455,323 UART: [kat] sha1
466,787 UART: [kat] SHA2-256
469,447 UART: [kat] SHA2-384
475,365 UART: [kat] SHA2-512-ACC
477,738 UART: [kat] ECC-384
2,767,648 UART: [kat] HMAC-384Kdf
2,780,816 UART: [kat] LMS
3,971,138 UART: [kat] --
3,973,804 UART: [cold-reset] ++
3,975,171 UART: [fht] Storing FHT @ 0x50003400
3,985,459 UART: [idev] ++
3,986,029 UART: [idev] CDI.KEYID = 6
3,986,942 UART: [idev] SUBJECT.KEYID = 7
3,988,191 UART: [idev] UDS.KEYID = 0
3,989,218 ready_for_fw is high
3,989,432 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,139,620 UART: [idev] Erasing UDS.KEYID = 0
7,328,082 UART: [idev] Using Sha1 for KeyId Algorithm
7,349,983 UART: [idev] --
7,353,280 UART: [ldev] ++
7,353,917 UART: [ldev] CDI.KEYID = 6
7,354,807 UART: [ldev] SUBJECT.KEYID = 5
7,356,080 UART: [ldev] AUTHORITY.KEYID = 7
7,357,316 UART: [ldev] FE.KEYID = 1
7,404,171 UART: [ldev] Erasing FE.KEYID = 1
10,735,111 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,030,577 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,045,193 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,060,054 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,074,555 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,093,927 UART: [ldev] --
13,098,117 UART: [fwproc] Waiting for Commands...
13,099,953 UART: [fwproc] Received command 0x46574c44
13,102,171 UART: [fwproc] Received Image of size 119428 bytes
17,217,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,293,966 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,367,134 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,698,292 >>> mbox cmd response: success
17,702,562 UART: [afmc] ++
17,703,153 UART: [afmc] CDI.KEYID = 6
17,704,043 UART: [afmc] SUBJECT.KEYID = 7
17,705,314 UART: [afmc] AUTHORITY.KEYID = 5
21,073,113 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,373,965 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,376,275 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,390,699 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,405,426 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,419,818 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,440,283 UART: [afmc] --
23,444,778 UART: [cold-reset] --
23,449,445 UART: [state] Locking Datavault
23,453,951 UART: [state] Locking PCR0, PCR1 and PCR31
23,455,706 UART: [state] Locking ICCM
23,457,534 UART: [exit] Launching FMC @ 0x40000130
23,465,879 UART:
23,466,123 UART: Running Caliptra FMC ...
23,467,229 UART:
23,467,389 UART: [state] CFI Enabled
23,534,530 UART: [fht] FMC Alias Private Key: 7
25,874,845 UART: [art] Extend RT PCRs Done
25,876,071 UART: [art] Lock RT PCRs Done
25,877,730 UART: [art] Populate DV Done
25,883,252 UART: [fht] FMC Alias Private Key: 7
25,884,899 UART: [art] Derive CDI
25,885,638 UART: [art] Store in slot 0x4
25,935,226 UART: [art] Derive Key Pair
25,936,269 UART: [art] Store priv key in slot 0x5
29,228,890 UART: [art] Derive Key Pair - Done
29,241,563 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,530,027 UART: [art] Erasing AUTHORITY.KEYID = 7
31,531,540 UART: [art] PUB.X = 7D7ADA852D7741B40C384B7B7F230B7A99DD1F9A41034F0966CE85D65CBDFD05F43EA999221405114B8F6FF83A8CE7DE
31,538,770 UART: [art] PUB.Y = 86A249B235000779C1E27868EFA4CDEF75034D70C87F747802C0666DF0BCC6A05E14E50A483E02FD230C4A4CD2189945
31,546,032 UART: [art] SIG.R = 0FAFB9119B8C19562713490B86A822834463C79414607C5E89DF9641BA58495B2F52DB7455275F5218EA5DE53358033E
31,553,349 UART: [art] SIG.S = 7C4B7A6BFAE8700CFF53AE1AAE9CE4DC4DF696AC75E81FEB0C0ECCC8BFD02BA145800DE044EF6EC6EB9A9EFD0C2F9F7E
32,858,871 UART: Caliptra RT
32,859,573 UART: [state] CFI Enabled
33,035,905 UART: [rt] RT listening for mailbox commands...
33,037,759 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,067,453 UART: [rt]cmd =0x46504c54, len=4
33,069,083 >>> mbox cmd response data (8 bytes)
33,070,032 UART: [rt] FIPS self test
33,071,006 UART: [kat] ++
33,071,468 UART: [kat] sha1
33,075,875 UART: [kat] SHA2-256
33,077,809 UART: [kat] SHA2-384
33,080,241 UART: Fatal Error: 0x90020002
33,115,454 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,265,428 >>> mbox cmd response: failed
33,266,097 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,415,985 >>> mbox cmd response: failed
Initializing fuses
954 writing to cptra_bootfsm_go
190,006 UART:
190,301 UART: Running Caliptra ROM ...
191,328 UART:
191,471 UART: [state] CFI Enabled
267,184 UART: [state] LifecycleState = Unprovisioned
269,172 UART: [state] DebugLocked = No
272,067 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
277,118 UART: [kat] SHA2-256
446,782 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,322 UART: [kat] ++
457,856 UART: [kat] sha1
469,068 UART: [kat] SHA2-256
471,746 UART: [kat] SHA2-384
477,233 UART: [kat] SHA2-512-ACC
479,570 UART: [kat] ECC-384
2,770,314 UART: [kat] HMAC-384Kdf
2,802,488 UART: [kat] LMS
3,992,778 UART: [kat] --
3,996,958 UART: [cold-reset] ++
3,998,297 UART: [fht] Storing FHT @ 0x50003400
4,010,165 UART: [idev] ++
4,010,751 UART: [idev] CDI.KEYID = 6
4,011,638 UART: [idev] SUBJECT.KEYID = 7
4,012,912 UART: [idev] UDS.KEYID = 0
4,014,458 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,164,636 UART: [idev] Erasing UDS.KEYID = 0
7,349,675 UART: [idev] Using Sha1 for KeyId Algorithm
7,370,965 UART: [idev] --
7,374,851 UART: [ldev] ++
7,375,421 UART: [ldev] CDI.KEYID = 6
7,376,359 UART: [ldev] SUBJECT.KEYID = 5
7,377,573 UART: [ldev] AUTHORITY.KEYID = 7
7,378,861 UART: [ldev] FE.KEYID = 1
7,427,126 UART: [ldev] Erasing FE.KEYID = 1
10,757,427 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,051,407 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,065,989 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,080,866 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,095,377 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,114,205 UART: [ldev] --
13,119,257 UART: [fwproc] Waiting for Commands...
13,121,633 UART: [fwproc] Received command 0x46574c44
13,123,821 UART: [fwproc] Received Image of size 119428 bytes
17,239,111 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,309,466 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,382,602 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,714,616 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,058 writing to cptra_bootfsm_go
3,786,477 ready_for_fw is high
3,786,906 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,971,479 >>> mbox cmd response: success
23,670,448 UART:
23,670,864 UART: Running Caliptra FMC ...
23,672,015 UART:
23,672,207 UART: [state] CFI Enabled
23,722,492 UART: [fht] FMC Alias Private Key: 7
26,063,376 UART: [art] Extend RT PCRs Done
26,064,613 UART: [art] Lock RT PCRs Done
26,066,382 UART: [art] Populate DV Done
26,071,701 UART: [fht] FMC Alias Private Key: 7
26,073,252 UART: [art] Derive CDI
26,073,993 UART: [art] Store in slot 0x4
26,131,414 UART: [art] Derive Key Pair
26,132,463 UART: [art] Store priv key in slot 0x5
29,425,396 UART: [art] Derive Key Pair - Done
29,438,440 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,727,290 UART: [art] Erasing AUTHORITY.KEYID = 7
31,728,807 UART: [art] PUB.X = F668B9123BBE7319686B389BE0DA800A4351BB429F60267563262EAD1BA7BA104CBF6EBF2246364438F832CA60BD33E3
31,736,030 UART: [art] PUB.Y = 71CEFC16667BDDFA914E40ADA553AA5DE049A6F78B427E537FE1DA3253866B872AB70166A4D35817580CB5A7A8EE9A8B
31,743,291 UART: [art] SIG.R = 49ED21AF9F13138D97CBFA47E50C91C380B033BA79F5EC84F87C993D60CDD54554ADDA8E6EF19CCC9A6585D4768756AD
31,750,747 UART: [art] SIG.S = EDF951614A337FF5C02F58D0D2EFB5D5C2EFA99EBA21AEC73C8F3D97D7886D66F02D2CF4FD1E94910B95D85853C9000A
33,055,691 UART: Caliptra RT
33,056,403 UART: [state] CFI Enabled
33,234,284 UART: [rt] RT listening for mailbox commands...
33,236,143 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,265,667 UART: [rt]cmd =0x46504c54, len=4
33,267,250 >>> mbox cmd response data (8 bytes)
33,268,088 UART: [rt] FIPS self test
33,269,035 UART: [kat] ++
33,269,493 UART: [kat] sha1
33,273,895 UART: [kat] SHA2-256
33,275,831 UART: [kat] SHA2-384
33,278,116 UART: Fatal Error: 0x90020002
33,313,338 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,463,391 >>> mbox cmd response: failed
33,464,044 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,613,969 >>> mbox cmd response: failed
Initializing fuses
960 writing to cptra_bootfsm_go
3,769,291 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,942,929 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.69s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,270 writing to cptra_bootfsm_go
192,542 UART:
192,919 UART: Running Caliptra ROM ...
194,060 UART:
603,839 UART: [state] CFI Enabled
618,660 UART: [state] LifecycleState = Unprovisioned
620,573 UART: [state] DebugLocked = No
622,830 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,142 UART: [kat] SHA2-256
797,887 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
808,468 UART: [kat] ++
809,008 UART: [kat] sha1
820,256 UART: [kat] SHA2-256
822,988 UART: [kat] SHA2-384
828,208 UART: [kat] SHA2-512-ACC
830,585 UART: [kat] ECC-384
3,113,501 UART: [kat] HMAC-384Kdf
3,125,651 UART: [kat] LMS
4,315,769 UART: [kat] --
4,319,580 UART: [cold-reset] ++
4,321,381 UART: [fht] Storing FHT @ 0x50003400
4,332,232 UART: [idev] ++
4,332,814 UART: [idev] CDI.KEYID = 6
4,333,736 UART: [idev] SUBJECT.KEYID = 7
4,334,994 UART: [idev] UDS.KEYID = 0
4,336,048 ready_for_fw is high
4,336,289 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,283 UART: [idev] Erasing UDS.KEYID = 0
7,617,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,640,226 UART: [idev] --
7,645,424 UART: [ldev] ++
7,646,001 UART: [ldev] CDI.KEYID = 6
7,646,978 UART: [ldev] SUBJECT.KEYID = 5
7,648,220 UART: [ldev] AUTHORITY.KEYID = 7
7,649,463 UART: [ldev] FE.KEYID = 1
7,659,831 UART: [ldev] Erasing FE.KEYID = 1
10,946,684 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,237,654 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,252,214 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,267,027 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,281,561 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,300,943 UART: [ldev] --
13,305,191 UART: [fwproc] Waiting for Commands...
13,307,407 UART: [fwproc] Received command 0x46574c44
13,309,600 UART: [fwproc] Received Image of size 119428 bytes
17,426,507 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,505,985 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,131 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,911,093 >>> mbox cmd response: success
17,914,554 UART: [afmc] ++
17,915,149 UART: [afmc] CDI.KEYID = 6
17,916,048 UART: [afmc] SUBJECT.KEYID = 7
17,917,329 UART: [afmc] AUTHORITY.KEYID = 5
21,232,544 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,527,874 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,530,142 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,544,537 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,559,297 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,573,709 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,594,199 UART: [afmc] --
23,598,663 UART: [cold-reset] --
23,603,826 UART: [state] Locking Datavault
23,609,619 UART: [state] Locking PCR0, PCR1 and PCR31
23,611,324 UART: [state] Locking ICCM
23,613,018 UART: [exit] Launching FMC @ 0x40000130
23,621,387 UART:
23,621,641 UART: Running Caliptra FMC ...
23,622,671 UART:
23,622,824 UART: [state] CFI Enabled
23,631,258 UART: [fht] FMC Alias Private Key: 7
25,971,292 UART: [art] Extend RT PCRs Done
25,972,523 UART: [art] Lock RT PCRs Done
25,974,319 UART: [art] Populate DV Done
25,979,528 UART: [fht] FMC Alias Private Key: 7
25,981,295 UART: [art] Derive CDI
25,982,040 UART: [art] Store in slot 0x4
26,024,968 UART: [art] Derive Key Pair
26,025,979 UART: [art] Store priv key in slot 0x5
29,267,398 UART: [art] Derive Key Pair - Done
29,280,186 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,560,378 UART: [art] Erasing AUTHORITY.KEYID = 7
31,561,912 UART: [art] PUB.X = 87CBAF05069198C83F2EAA2123307933C95391E27B68D299A31A80BB1B47231C53089355C5A3E67613B60661639A7B03
31,569,117 UART: [art] PUB.Y = 3FCAF7802B2AA9DB12A125BB2B71310595CB497D8AA0992AA2ADDBF0D3B8A76AE1B73B5ECE3AFCCB2F312FB00865EE9C
31,576,400 UART: [art] SIG.R = 6D746F2429A99E3662C3A4D5F75A717C2A90153932C0AF41F3638D247FC4A8462B5458FD4D7EC8DFC90E2518AF8AB9FD
31,583,816 UART: [art] SIG.S = 9EF13BB629E16976C60FB825DDA1B7A537A3C8D36C60EA18340D03AD7FF74702ED926FD252EF959E2D4AC9454BDEDAC6
32,889,016 UART: Caliptra RT
32,889,726 UART: [state] CFI Enabled
33,022,713 UART: [rt] RT listening for mailbox commands...
33,024,600 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,054,567 UART: [rt]cmd =0x46504c54, len=4
33,055,943 >>> mbox cmd response data (8 bytes)
33,057,305 UART: [rt] FIPS self test
33,058,258 UART: [kat] ++
33,058,719 UART: [kat] sha1
33,063,018 UART: [kat] SHA2-256
33,064,957 UART: [kat] SHA2-384
33,067,333 UART: Fatal Error: 0x90020002
33,102,691 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,252,734 >>> mbox cmd response: failed
33,253,405 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,403,142 >>> mbox cmd response: failed
Initializing fuses
956 writing to cptra_bootfsm_go
190,107 UART:
190,403 UART: Running Caliptra ROM ...
191,517 UART:
7,118,926 UART: [state] CFI Enabled
7,132,827 UART: [state] LifecycleState = Unprovisioned
7,134,777 UART: [state] DebugLocked = No
7,137,425 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
7,141,411 UART: [kat] SHA2-256
7,311,144 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
7,321,679 UART: [kat] ++
7,322,245 UART: [kat] sha1
7,333,691 UART: [kat] SHA2-256
7,336,399 UART: [kat] SHA2-384
7,342,071 UART: [kat] SHA2-512-ACC
7,344,428 UART: [kat] ECC-384
9,628,069 UART: [kat] HMAC-384Kdf
9,640,047 UART: [kat] LMS
10,830,152 UART: [kat] --
10,834,759 UART: [cold-reset] ++
10,837,292 UART: [fht] Storing FHT @ 0x50003400
10,850,077 UART: [idev] ++
10,850,650 UART: [idev] CDI.KEYID = 6
10,851,565 UART: [idev] SUBJECT.KEYID = 7
10,852,840 UART: [idev] UDS.KEYID = 0
10,854,375 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
11,004,285 UART: [idev] Erasing UDS.KEYID = 0
14,138,872 UART: [idev] Using Sha1 for KeyId Algorithm
14,160,587 UART: [idev] --
14,164,425 UART: [ldev] ++
14,165,003 UART: [ldev] CDI.KEYID = 6
14,165,927 UART: [ldev] SUBJECT.KEYID = 5
14,167,324 UART: [ldev] AUTHORITY.KEYID = 7
14,168,554 UART: [ldev] FE.KEYID = 1
14,179,861 UART: [ldev] Erasing FE.KEYID = 1
17,471,665 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
19,765,580 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
19,780,192 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
19,794,992 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
19,809,504 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
19,828,444 UART: [ldev] --
19,833,227 UART: [fwproc] Waiting for Commands...
19,835,120 UART: [fwproc] Received command 0x46574c44
19,837,335 UART: [fwproc] Received Image of size 119428 bytes
23,954,799 UART: [fwproc] Image verified using Vendor ECC Key Index 0
24,036,570 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
24,109,751 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
24,441,489 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.01s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,264 writing to cptra_bootfsm_go
4,129,812 ready_for_fw is high
4,130,442 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,177,314 >>> mbox cmd response: success
23,821,398 UART:
23,821,798 UART: Running Caliptra FMC ...
23,822,984 UART:
23,823,159 UART: [state] CFI Enabled
23,830,899 UART: [fht] FMC Alias Private Key: 7
26,171,328 UART: [art] Extend RT PCRs Done
26,172,557 UART: [art] Lock RT PCRs Done
26,174,348 UART: [art] Populate DV Done
26,179,878 UART: [fht] FMC Alias Private Key: 7
26,181,376 UART: [art] Derive CDI
26,182,120 UART: [art] Store in slot 0x4
26,224,678 UART: [art] Derive Key Pair
26,225,723 UART: [art] Store priv key in slot 0x5
29,467,628 UART: [art] Derive Key Pair - Done
29,480,893 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,760,836 UART: [art] Erasing AUTHORITY.KEYID = 7
31,762,348 UART: [art] PUB.X = 6D0A3B5A3C9F810E794C0D3F359431F17E0493D453C13F8D58FD79EABA8E29411AA29DB0A747543127E4351E7503A25D
31,769,600 UART: [art] PUB.Y = EC1A7CA9024B446DBD5E69841FDDF3567A20F82160579C9B609E3D94C326CC8D5EB8749773AC6D4C324F9EE49434B7ED
31,776,858 UART: [art] SIG.R = C306C1F51E642782C60F8A5F99D8E5B9B4CA6AEC7B4994D199328929150CA7C4CDB9715E6CA2454538171135C734FDF0
31,784,399 UART: [art] SIG.S = 2C371E13527D3111EC04ECCF623AA94C5C031D71B3750513737DF3FF1E3F6D6AA6AA54068981EF0990CAB4EA41B599E3
33,089,045 UART: Caliptra RT
33,089,765 UART: [state] CFI Enabled
33,222,873 UART: [rt] RT listening for mailbox commands...
33,224,853 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,254,589 UART: [rt]cmd =0x46504c54, len=4
33,256,015 >>> mbox cmd response data (8 bytes)
33,257,191 UART: [rt] FIPS self test
33,258,141 UART: [kat] ++
33,258,600 UART: [kat] sha1
33,262,954 UART: [kat] SHA2-256
33,264,843 UART: [kat] SHA2-384
33,267,056 UART: Fatal Error: 0x90020002
33,302,282 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,452,298 >>> mbox cmd response: failed
33,452,943 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
33,602,872 >>> mbox cmd response: failed
Initializing fuses
939 writing to cptra_bootfsm_go
10,458,895 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
24,508,221 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.02s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,027 writing to cptra_bootfsm_go
192,239 UART:
192,609 UART: Running Caliptra ROM ...
193,840 UART:
194,000 UART: [state] CFI Enabled
266,322 UART: [state] LifecycleState = Unprovisioned
268,237 UART: [state] DebugLocked = No
269,640 UART: [state] WD Timer not started. Device not locked for debugging
274,260 UART: [kat] SHA2-256
453,947 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,753 UART: [kat] ++
465,289 UART: [kat] sha1
477,518 UART: [kat] SHA2-256
480,169 UART: [kat] SHA2-384
486,109 UART: [kat] SHA2-512-ACC
488,490 UART: [kat] ECC-384
2,947,842 UART: [kat] HMAC-384Kdf
2,973,646 UART: [kat] LMS
3,450,162 UART: [kat] --
3,455,668 UART: [cold-reset] ++
3,456,757 UART: [fht] FHT @ 0x50003400
3,466,818 UART: [idev] ++
3,467,467 UART: [idev] CDI.KEYID = 6
3,468,386 UART: [idev] SUBJECT.KEYID = 7
3,469,638 UART: [idev] UDS.KEYID = 0
3,470,570 ready_for_fw is high
3,470,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,620,979 UART: [idev] Erasing UDS.KEYID = 0
5,989,614 UART: [idev] Sha1 KeyId Algorithm
6,013,439 UART: [idev] --
6,019,518 UART: [ldev] ++
6,020,098 UART: [ldev] CDI.KEYID = 6
6,021,178 UART: [ldev] SUBJECT.KEYID = 5
6,022,289 UART: [ldev] AUTHORITY.KEYID = 7
6,023,470 UART: [ldev] FE.KEYID = 1
6,061,328 UART: [ldev] Erasing FE.KEYID = 1
8,569,368 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,304,103 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,319,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,335,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,351,426 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,372,055 UART: [ldev] --
10,377,073 UART: [fwproc] Wait for Commands...
10,379,990 UART: [fwproc] Recv command 0x46574c44
10,381,979 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,051 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,952,680 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,025,703 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,357,382 >>> mbox cmd response: success
14,362,265 UART: [afmc] ++
14,362,879 UART: [afmc] CDI.KEYID = 6
14,363,801 UART: [afmc] SUBJECT.KEYID = 7
14,365,030 UART: [afmc] AUTHORITY.KEYID = 5
16,903,253 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,643,607 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,645,799 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,661,661 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,677,716 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,693,316 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,717,226 UART: [afmc] --
18,720,128 UART: [cold-reset] --
18,724,531 UART: [state] Locking Datavault
18,729,535 UART: [state] Locking PCR0, PCR1 and PCR31
18,731,242 UART: [state] Locking ICCM
18,733,989 UART: [exit] Launching FMC @ 0x40000130
18,742,445 UART:
18,742,686 UART: Running Caliptra FMC ...
18,743,789 UART:
18,743,956 UART: [state] CFI Enabled
18,800,480 UART: [fht] FMC Alias Private Key: 7
20,566,537 UART: [art] Extend RT PCRs Done
20,567,765 UART: [art] Lock RT PCRs Done
20,569,396 UART: [art] Populate DV Done
20,574,867 UART: [fht] FMC Alias Private Key: 7
20,576,514 UART: [art] Derive CDI
20,577,330 UART: [art] Store in slot 0x4
20,633,667 UART: [art] Derive Key Pair
20,634,715 UART: [art] Store priv key in slot 0x5
23,096,882 UART: [art] Derive Key Pair - Done
23,110,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,822,724 UART: [art] Erasing AUTHORITY.KEYID = 7
24,824,235 UART: [art] PUB.X = 8DB411BC9A56ACE2FC5F1E13EB8AE671D4CF0F620D693890D01D47168EABC00302EB5DF499B627BB28FE07F2EC5424FA
24,831,492 UART: [art] PUB.Y = 5E957EDDAEF1E0E00F7BF1AA16EFF768518DCA27DEA45FA985054E2C50B86F310B5CB467760491CE4F58CDFE4F7E0527
24,838,800 UART: [art] SIG.R = C8D8C5E0A287390739FDD2B395895CA6A6C9B2758B51E89EC53645D07D64E01755B47484F000146B9219B8C9BE2EA000
24,846,184 UART: [art] SIG.S = 75975364FB413620A3A72469BCBAE7B69EA8991D0CAF8493E6F201071E54ABFC388AAD6013EF78D1EDF97B8E2B7748EF
25,825,340 UART: Caliptra RT
25,826,036 UART: [state] CFI Enabled
26,004,359 UART: [rt] RT listening for mailbox commands...
26,006,225 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,036,156 UART: [rt]cmd =0x46504c54, len=4
26,037,794 >>> mbox cmd response data (8 bytes)
26,038,770 UART: [rt] FIPS self test
26,039,725 UART: [kat] ++
26,040,237 UART: [kat] sha1
26,044,674 UART: [kat] SHA2-256
26,046,610 UART: [kat] SHA2-384
26,048,990 UART: Fatal Error: 0x90020002
26,084,218 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,234,176 >>> mbox cmd response: failed
26,234,801 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,385,150 >>> mbox cmd response: failed
Initializing fuses
959 writing to cptra_bootfsm_go
190,026 UART:
190,346 UART: Running Caliptra ROM ...
191,381 UART:
191,527 UART: [state] CFI Enabled
264,444 UART: [state] LifecycleState = Unprovisioned
266,421 UART: [state] DebugLocked = No
268,103 UART: [state] WD Timer not started. Device not locked for debugging
272,179 UART: [kat] SHA2-256
451,791 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,583 UART: [kat] ++
463,042 UART: [kat] sha1
473,280 UART: [kat] SHA2-256
476,024 UART: [kat] SHA2-384
481,579 UART: [kat] SHA2-512-ACC
483,978 UART: [kat] ECC-384
2,931,008 UART: [kat] HMAC-384Kdf
2,952,686 UART: [kat] LMS
3,429,155 UART: [kat] --
3,434,345 UART: [cold-reset] ++
3,436,877 UART: [fht] FHT @ 0x50003400
3,448,672 UART: [idev] ++
3,449,250 UART: [idev] CDI.KEYID = 6
3,450,276 UART: [idev] SUBJECT.KEYID = 7
3,451,462 UART: [idev] UDS.KEYID = 0
3,453,053 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,603,189 UART: [idev] Erasing UDS.KEYID = 0
5,967,480 UART: [idev] Sha1 KeyId Algorithm
5,991,901 UART: [idev] --
5,998,197 UART: [ldev] ++
5,998,831 UART: [ldev] CDI.KEYID = 6
5,999,748 UART: [ldev] SUBJECT.KEYID = 5
6,000,918 UART: [ldev] AUTHORITY.KEYID = 7
6,002,217 UART: [ldev] FE.KEYID = 1
6,039,452 UART: [ldev] Erasing FE.KEYID = 1
8,545,946 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,281,079 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,296,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,312,831 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,328,384 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,348,337 UART: [ldev] --
10,354,036 UART: [fwproc] Wait for Commands...
10,356,357 UART: [fwproc] Recv command 0x46574c44
10,358,352 UART: [fwproc] Recv'd Img size: 119428 bytes
13,850,465 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,923,751 UART: [fwproc] Load FMC at address 0x40000000 len 20044
13,996,774 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,328,331 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.15s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,463,433 ready_for_fw is high
3,464,004 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,264,074 >>> mbox cmd response: success
18,556,933 UART:
18,557,345 UART: Running Caliptra FMC ...
18,558,473 UART:
18,558,632 UART: [state] CFI Enabled
18,625,430 UART: [fht] FMC Alias Private Key: 7
20,391,503 UART: [art] Extend RT PCRs Done
20,392,722 UART: [art] Lock RT PCRs Done
20,394,142 UART: [art] Populate DV Done
20,399,734 UART: [fht] FMC Alias Private Key: 7
20,401,292 UART: [art] Derive CDI
20,402,120 UART: [art] Store in slot 0x4
20,456,692 UART: [art] Derive Key Pair
20,457,734 UART: [art] Store priv key in slot 0x5
22,920,041 UART: [art] Derive Key Pair - Done
22,933,110 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,645,823 UART: [art] Erasing AUTHORITY.KEYID = 7
24,647,332 UART: [art] PUB.X = 5BD895633D19767A3E9D627F51AEDC0AED01414E737E68B6814C43F56170EDF5C7EC844E47FA7D25E693C92F22D97696
24,654,572 UART: [art] PUB.Y = 5944D986AF940ABCD84CB27835B188B32890755A7BF48C9BF3780B6EE8DEBA5C71B3C66FF84EA91E24C1CBA9DBE06699
24,661,844 UART: [art] SIG.R = 22881AADC1A6042243302E8E8BD4DE969E5771D51B85E4B1CEF0EDE0FAA35892043015F9344AFB62509B5F914C8D81B9
24,669,222 UART: [art] SIG.S = F972887B37E26457CCF48C99CC27A580827F207F34DDFFA644655EBB9B37C7C1955DDED4EA0C3BF47B6C8A3ECC8FD798
25,648,194 UART: Caliptra RT
25,648,914 UART: [state] CFI Enabled
25,828,424 UART: [rt] RT listening for mailbox commands...
25,830,269 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,860,081 UART: [rt]cmd =0x46504c54, len=4
25,861,661 >>> mbox cmd response data (8 bytes)
25,862,719 UART: [rt] FIPS self test
25,863,661 UART: [kat] ++
25,864,117 UART: [kat] sha1
25,868,580 UART: [kat] SHA2-256
25,870,512 UART: [kat] SHA2-384
25,872,874 UART: Fatal Error: 0x90020002
25,908,047 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,058,009 >>> mbox cmd response: failed
26,058,671 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,208,572 >>> mbox cmd response: failed
Initializing fuses
973 writing to cptra_bootfsm_go
3,443,309 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,240,321 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.14s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,400 writing to cptra_bootfsm_go
192,566 UART:
192,963 UART: Running Caliptra ROM ...
194,119 UART:
603,903 UART: [state] CFI Enabled
616,171 UART: [state] LifecycleState = Unprovisioned
618,142 UART: [state] DebugLocked = No
620,538 UART: [state] WD Timer not started. Device not locked for debugging
624,182 UART: [kat] SHA2-256
803,785 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
814,616 UART: [kat] ++
815,069 UART: [kat] sha1
826,380 UART: [kat] SHA2-256
829,110 UART: [kat] SHA2-384
834,538 UART: [kat] SHA2-512-ACC
836,912 UART: [kat] ECC-384
3,277,293 UART: [kat] HMAC-384Kdf
3,288,834 UART: [kat] LMS
3,765,308 UART: [kat] --
3,770,656 UART: [cold-reset] ++
3,772,235 UART: [fht] FHT @ 0x50003400
3,783,870 UART: [idev] ++
3,784,440 UART: [idev] CDI.KEYID = 6
3,785,481 UART: [idev] SUBJECT.KEYID = 7
3,786,661 UART: [idev] UDS.KEYID = 0
3,787,599 ready_for_fw is high
3,787,827 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,937,880 UART: [idev] Erasing UDS.KEYID = 0
6,266,681 UART: [idev] Sha1 KeyId Algorithm
6,289,705 UART: [idev] --
6,294,457 UART: [ldev] ++
6,295,031 UART: [ldev] CDI.KEYID = 6
6,296,022 UART: [ldev] SUBJECT.KEYID = 5
6,297,194 UART: [ldev] AUTHORITY.KEYID = 7
6,298,431 UART: [ldev] FE.KEYID = 1
6,312,434 UART: [ldev] Erasing FE.KEYID = 1
8,789,616 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,427 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,305 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,870 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,579,551 UART: [ldev] --
10,584,447 UART: [fwproc] Wait for Commands...
10,587,577 UART: [fwproc] Recv command 0x46574c44
10,589,579 UART: [fwproc] Recv'd Img size: 119428 bytes
14,085,176 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,563 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,586 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,567,367 >>> mbox cmd response: success
14,571,832 UART: [afmc] ++
14,572,430 UART: [afmc] CDI.KEYID = 6
14,573,349 UART: [afmc] SUBJECT.KEYID = 7
14,574,567 UART: [afmc] AUTHORITY.KEYID = 5
17,079,694 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,803,191 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,805,380 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,821,207 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,837,291 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,852,884 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,877,195 UART: [afmc] --
18,881,352 UART: [cold-reset] --
18,885,382 UART: [state] Locking Datavault
18,892,147 UART: [state] Locking PCR0, PCR1 and PCR31
18,893,916 UART: [state] Locking ICCM
18,896,524 UART: [exit] Launching FMC @ 0x40000130
18,904,925 UART:
18,905,164 UART: Running Caliptra FMC ...
18,906,273 UART:
18,906,437 UART: [state] CFI Enabled
18,914,703 UART: [fht] FMC Alias Private Key: 7
20,681,490 UART: [art] Extend RT PCRs Done
20,682,729 UART: [art] Lock RT PCRs Done
20,684,365 UART: [art] Populate DV Done
20,689,891 UART: [fht] FMC Alias Private Key: 7
20,691,433 UART: [art] Derive CDI
20,692,251 UART: [art] Store in slot 0x4
20,734,742 UART: [art] Derive Key Pair
20,735,789 UART: [art] Store priv key in slot 0x5
23,162,711 UART: [art] Derive Key Pair - Done
23,175,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,882,403 UART: [art] Erasing AUTHORITY.KEYID = 7
24,883,906 UART: [art] PUB.X = AA5882974ECF023B08201D29A1F22E27B432BFB83C075A768E9EF900E21A9C0E65E4DC1BB8A720964353645DD6894B55
24,891,205 UART: [art] PUB.Y = 764D10705F6DEAA14CAFBD9FE15346C106FB5BD147FD42B97E5B1C9229C050DDA3F2D8EB4AA21ED70A8998B50FAA8E3B
24,898,486 UART: [art] SIG.R = BE1E331827B5526D9030C6402B3DD04FD96FCA6761084289089543EF9CE21CBAB2C558FDDA585AC011FB670FAB65D963
24,905,874 UART: [art] SIG.S = 60D9D4E3F49A1E56CCEAE5C5827690580EFFD1D15CBDDAA091341F6E181350666D6EAAFBE53509C4EBACBF6E51649F90
25,884,915 UART: Caliptra RT
25,885,632 UART: [state] CFI Enabled
26,017,736 UART: [rt] RT listening for mailbox commands...
26,019,598 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,049,354 UART: [rt]cmd =0x46504c54, len=4
26,050,952 >>> mbox cmd response data (8 bytes)
26,052,452 UART: [rt] FIPS self test
26,053,404 UART: [kat] ++
26,053,863 UART: [kat] sha1
26,058,109 UART: [kat] SHA2-256
26,060,047 UART: [kat] SHA2-384
26,062,333 UART: Fatal Error: 0x90020002
26,097,723 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,247,713 >>> mbox cmd response: failed
26,248,318 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,398,198 >>> mbox cmd response: failed
Initializing fuses
949 writing to cptra_bootfsm_go
190,091 UART:
190,384 UART: Running Caliptra ROM ...
191,415 UART:
14,121,540 UART: [state] CFI Enabled
14,137,707 UART: [state] LifecycleState = Unprovisioned
14,139,626 UART: [state] DebugLocked = No
14,140,941 UART: [state] WD Timer not started. Device not locked for debugging
14,145,334 UART: [kat] SHA2-256
14,324,973 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
14,335,748 UART: [kat] ++
14,336,213 UART: [kat] sha1
14,347,043 UART: [kat] SHA2-256
14,349,689 UART: [kat] SHA2-384
14,354,338 UART: [kat] SHA2-512-ACC
14,356,692 UART: [kat] ECC-384
16,797,803 UART: [kat] HMAC-384Kdf
16,810,797 UART: [kat] LMS
17,287,322 UART: [kat] --
17,291,800 UART: [cold-reset] ++
17,292,765 UART: [fht] FHT @ 0x50003400
17,305,179 UART: [idev] ++
17,305,749 UART: [idev] CDI.KEYID = 6
17,306,690 UART: [idev] SUBJECT.KEYID = 7
17,307,964 UART: [idev] UDS.KEYID = 0
17,309,488 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,459,403 UART: [idev] Erasing UDS.KEYID = 0
19,788,861 UART: [idev] Sha1 KeyId Algorithm
19,812,955 UART: [idev] --
19,817,767 UART: [ldev] ++
19,818,343 UART: [ldev] CDI.KEYID = 6
19,819,253 UART: [ldev] SUBJECT.KEYID = 5
19,820,477 UART: [ldev] AUTHORITY.KEYID = 7
19,821,715 UART: [ldev] FE.KEYID = 1
19,832,443 UART: [ldev] Erasing FE.KEYID = 1
22,310,155 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
24,029,948 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
24,045,772 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
24,061,654 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
24,077,251 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
24,098,573 UART: [ldev] --
24,104,668 UART: [fwproc] Wait for Commands...
24,107,928 UART: [fwproc] Recv command 0x46574c44
24,109,921 UART: [fwproc] Recv'd Img size: 119428 bytes
27,602,414 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,683,900 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,756,926 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,087,779 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
3,773,571 ready_for_fw is high
3,774,170 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,451,381 >>> mbox cmd response: success
18,705,041 UART:
18,705,857 UART: Running Caliptra FMC ...
18,706,987 UART:
18,707,156 UART: [state] CFI Enabled
18,714,986 UART: [fht] FMC Alias Private Key: 7
20,481,340 UART: [art] Extend RT PCRs Done
20,482,615 UART: [art] Lock RT PCRs Done
20,483,953 UART: [art] Populate DV Done
20,489,690 UART: [fht] FMC Alias Private Key: 7
20,491,191 UART: [art] Derive CDI
20,491,942 UART: [art] Store in slot 0x4
20,534,838 UART: [art] Derive Key Pair
20,535,849 UART: [art] Store priv key in slot 0x5
22,963,521 UART: [art] Derive Key Pair - Done
22,976,487 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,683,288 UART: [art] Erasing AUTHORITY.KEYID = 7
24,684,811 UART: [art] PUB.X = 9BBA9CD0D77823FC3509E6B8C5E9BF6B2F21EA2F4E6F336D6EB6AD6A84D0E35D2D743746F237082486A8D3036AE704DE
24,692,070 UART: [art] PUB.Y = BA4283251C6A9B9C87563B448D54D32FAEAA51EEA204917FC499530F195166073445E1098E0B80266EAD99174D8194FE
24,699,342 UART: [art] SIG.R = F86B6D38A8D545CCC49B602A685CAD762E512042E09EC477C583045AFD8B2F23E9450A346CDCD7FD4FC49FAE1103E89D
24,706,748 UART: [art] SIG.S = 09A93E661AFB8693BEFA71F632BC24284FF0F20782DD8427BEA5DB1E4F8187C20C7F8387AC13CCFA23807BEF08B06105
25,686,179 UART: Caliptra RT
25,686,886 UART: [state] CFI Enabled
25,820,441 UART: [rt] RT listening for mailbox commands...
25,822,308 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,852,253 UART: [rt]cmd =0x46504c54, len=4
25,853,707 >>> mbox cmd response data (8 bytes)
25,854,511 UART: [rt] FIPS self test
25,855,461 UART: [kat] ++
25,855,924 UART: [kat] sha1
25,860,386 UART: [kat] SHA2-256
25,862,265 UART: [kat] SHA2-384
25,864,584 UART: Fatal Error: 0x90020002
25,899,766 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,049,769 >>> mbox cmd response: failed
26,050,436 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,200,327 >>> mbox cmd response: failed
Initializing fuses
950 writing to cptra_bootfsm_go
17,507,705 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,198,461 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,153 writing to cptra_bootfsm_go
192,342 UART:
192,708 UART: Running Caliptra ROM ...
193,900 UART:
194,056 UART: [state] CFI Enabled
262,556 UART: [state] LifecycleState = Unprovisioned
264,957 UART: [state] DebugLocked = No
266,926 UART: [state] WD Timer not started. Device not locked for debugging
271,605 UART: [kat] SHA2-256
461,516 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,241 UART: [kat] ++
472,694 UART: [kat] sha1
485,301 UART: [kat] SHA2-256
488,324 UART: [kat] SHA2-384
494,715 UART: [kat] SHA2-512-ACC
497,288 UART: [kat] ECC-384
2,950,191 UART: [kat] HMAC-384Kdf
2,972,920 UART: [kat] LMS
3,504,730 UART: [kat] --
3,507,668 UART: [cold-reset] ++
3,509,752 UART: [fht] FHT @ 0x50003400
3,520,313 UART: [idev] ++
3,521,023 UART: [idev] CDI.KEYID = 6
3,521,939 UART: [idev] SUBJECT.KEYID = 7
3,523,194 UART: [idev] UDS.KEYID = 0
3,524,124 ready_for_fw is high
3,524,349 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,674,618 UART: [idev] Erasing UDS.KEYID = 0
6,031,517 UART: [idev] Sha1 KeyId Algorithm
6,054,057 UART: [idev] --
6,057,796 UART: [ldev] ++
6,058,483 UART: [ldev] CDI.KEYID = 6
6,059,508 UART: [ldev] SUBJECT.KEYID = 5
6,060,620 UART: [ldev] AUTHORITY.KEYID = 7
6,061,801 UART: [ldev] FE.KEYID = 1
6,102,006 UART: [ldev] Erasing FE.KEYID = 1
8,607,622 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,343,352 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,358,551 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,373,749 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,388,853 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,062 UART: [ldev] --
10,415,075 UART: [fwproc] Wait for Commands...
10,416,788 UART: [fwproc] Recv command 0x46574c44
10,419,136 UART: [fwproc] Recv'd Img size: 119428 bytes
13,923,778 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,999,718 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,123,350 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,688,975 >>> mbox cmd response: success
14,693,841 UART: [afmc] ++
14,694,548 UART: [afmc] CDI.KEYID = 6
14,695,738 UART: [afmc] SUBJECT.KEYID = 7
14,697,228 UART: [afmc] AUTHORITY.KEYID = 5
17,236,912 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,962,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,963,939 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,979,053 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,994,184 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,009,037 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,032,923 UART: [afmc] --
19,036,760 UART: [cold-reset] --
19,041,983 UART: [state] Locking Datavault
19,047,081 UART: [state] Locking PCR0, PCR1 and PCR31
19,049,226 UART: [state] Locking ICCM
19,051,016 UART: [exit] Launching FMC @ 0x40000130
19,059,666 UART:
19,059,918 UART: Running Caliptra FMC ...
19,061,028 UART:
19,061,195 UART: [state] CFI Enabled
19,119,398 UART: [fht] FMC Alias Private Key: 7
20,885,956 UART: [art] Extend RT PCRs Done
20,887,238 UART: [art] Lock RT PCRs Done
20,888,629 UART: [art] Populate DV Done
20,893,979 UART: [fht] FMC Alias Private Key: 7
20,895,455 UART: [art] Derive CDI
20,896,205 UART: [art] Store in slot 0x4
20,948,283 UART: [art] Derive Key Pair
20,949,293 UART: [art] Store priv key in slot 0x5
23,412,080 UART: [art] Derive Key Pair - Done
23,425,097 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,137,926 UART: [art] Erasing AUTHORITY.KEYID = 7
25,139,442 UART: [art] PUB.X = 32B0BF2EBF94563BB19CDC1DC9D092FFBA0E088655C0B42EFF85A608F387B88DBAD0C41CD68EA9C427A30D227D796F76
25,146,705 UART: [art] PUB.Y = 5CA1290E54913887BFCD0C538DAB40C2BE8EF2204C1A817167A9E08BADA10D7B602B43FE95A7D89B3EC6912E663D71E6
25,154,001 UART: [art] SIG.R = 88694BA4CC364FF4764A6F839F4D018BA2BD30927896F12F876076CDB3BEC0288B7CF6C4A54A0ABFA93F86E0E927E33D
25,161,350 UART: [art] SIG.S = 070A6873FABEEC281098A0BC116EEA9D742480B41C53E88068DCA896E6B862544BCFC51AD9934E019E911261D553E724
26,139,668 UART: Caliptra RT
26,140,381 UART: [state] CFI Enabled
26,319,925 UART: [rt] RT listening for mailbox commands...
26,321,783 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,351,487 UART: [rt]cmd =0x46504c54, len=4
26,352,878 >>> mbox cmd response data (8 bytes)
26,354,088 UART: [rt] FIPS self test
26,355,068 UART: [kat] ++
26,355,528 UART: [kat] sha1
26,359,799 UART: [kat] SHA2-256
26,361,749 UART: [kat] SHA2-384
26,364,065 UART: Fatal Error: 0x90020002
26,399,219 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,549,251 >>> mbox cmd response: failed
26,549,913 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,699,851 >>> mbox cmd response: failed
Initializing fuses
955 writing to cptra_bootfsm_go
190,154 UART:
190,454 UART: Running Caliptra ROM ...
191,486 UART:
191,631 UART: [state] CFI Enabled
245,749 UART: [state] LifecycleState = Unprovisioned
248,087 UART: [state] DebugLocked = No
249,468 UART: [state] WD Timer not started. Device not locked for debugging
253,903 UART: [kat] SHA2-256
443,779 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
454,549 UART: [kat] ++
455,032 UART: [kat] sha1
466,085 UART: [kat] SHA2-256
469,105 UART: [kat] SHA2-384
474,225 UART: [kat] SHA2-512-ACC
476,840 UART: [kat] ECC-384
2,928,738 UART: [kat] HMAC-384Kdf
2,955,983 UART: [kat] LMS
3,487,735 UART: [kat] --
3,493,159 UART: [cold-reset] ++
3,495,694 UART: [fht] FHT @ 0x50003400
3,507,226 UART: [idev] ++
3,507,925 UART: [idev] CDI.KEYID = 6
3,508,810 UART: [idev] SUBJECT.KEYID = 7
3,510,081 UART: [idev] UDS.KEYID = 0
3,511,586 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,661,771 UART: [idev] Erasing UDS.KEYID = 0
6,010,237 UART: [idev] Sha1 KeyId Algorithm
6,033,727 UART: [idev] --
6,040,017 UART: [ldev] ++
6,040,713 UART: [ldev] CDI.KEYID = 6
6,041,600 UART: [ldev] SUBJECT.KEYID = 5
6,042,767 UART: [ldev] AUTHORITY.KEYID = 7
6,044,007 UART: [ldev] FE.KEYID = 1
6,081,944 UART: [ldev] Erasing FE.KEYID = 1
8,589,037 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,740 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,352,960 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,300 UART: [ldev] --
10,394,031 UART: [fwproc] Wait for Commands...
10,396,842 UART: [fwproc] Recv command 0x46574c44
10,399,167 UART: [fwproc] Recv'd Img size: 119428 bytes
13,908,083 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,989,418 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,113,003 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,678,634 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.18s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,014 writing to cptra_bootfsm_go
3,417,533 ready_for_fw is high
3,418,098 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,814,117 >>> mbox cmd response: success
19,124,116 UART:
19,124,507 UART: Running Caliptra FMC ...
19,125,634 UART:
19,125,790 UART: [state] CFI Enabled
19,192,215 UART: [fht] FMC Alias Private Key: 7
20,959,054 UART: [art] Extend RT PCRs Done
20,960,287 UART: [art] Lock RT PCRs Done
20,961,781 UART: [art] Populate DV Done
20,967,197 UART: [fht] FMC Alias Private Key: 7
20,968,850 UART: [art] Derive CDI
20,969,592 UART: [art] Store in slot 0x4
21,024,901 UART: [art] Derive Key Pair
21,025,911 UART: [art] Store priv key in slot 0x5
23,488,597 UART: [art] Derive Key Pair - Done
23,501,873 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,216,330 UART: [art] Erasing AUTHORITY.KEYID = 7
25,217,860 UART: [art] PUB.X = 2660BDB5C757C9F3994F1D5F06CBD1F2C3536BC237DED8E0D4829D19AC0B56A30EA68FD2E3AF3C461BD1279C5B5E2357
25,225,143 UART: [art] PUB.Y = 609A26733666C137855537E3C17F38CD8E0ACD43280315B2DECC1B7AA03CDAF3F0F80260E4E101FBE62219F316F24BF0
25,232,412 UART: [art] SIG.R = 18600BABF02FAA989AFCD911409740898D49B20D6168C388FD1EF79201ADE51950BF2F7D10EB058DC506B6616CD21C13
25,239,792 UART: [art] SIG.S = 6072D80437423FDF47F692B8E617DEE8116A6A12C8D14B691F498A332497C86819E79A095BA0DB602B3A9A1A13F2A48A
26,218,546 UART: Caliptra RT
26,219,251 UART: [state] CFI Enabled
26,401,543 UART: [rt] RT listening for mailbox commands...
26,403,398 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,433,000 UART: [rt]cmd =0x46504c54, len=4
26,434,598 >>> mbox cmd response data (8 bytes)
26,435,702 UART: [rt] FIPS self test
26,436,643 UART: [kat] ++
26,437,099 UART: [kat] sha1
26,441,479 UART: [kat] SHA2-256
26,443,417 UART: [kat] SHA2-384
26,445,731 UART: Fatal Error: 0x90020002
26,481,058 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,630,959 >>> mbox cmd response: failed
26,631,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,781,463 >>> mbox cmd response: failed
Initializing fuses
938 writing to cptra_bootfsm_go
3,427,326 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,875,334 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,516 writing to cptra_bootfsm_go
192,703 UART:
193,079 UART: Running Caliptra ROM ...
194,199 UART:
603,789 UART: [state] CFI Enabled
616,481 UART: [state] LifecycleState = Unprovisioned
618,880 UART: [state] DebugLocked = No
620,975 UART: [state] WD Timer not started. Device not locked for debugging
625,302 UART: [kat] SHA2-256
815,169 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
825,961 UART: [kat] ++
826,490 UART: [kat] sha1
837,010 UART: [kat] SHA2-256
840,031 UART: [kat] SHA2-384
845,035 UART: [kat] SHA2-512-ACC
847,629 UART: [kat] ECC-384
3,288,020 UART: [kat] HMAC-384Kdf
3,300,553 UART: [kat] LMS
3,832,417 UART: [kat] --
3,837,340 UART: [cold-reset] ++
3,839,920 UART: [fht] FHT @ 0x50003400
3,850,919 UART: [idev] ++
3,851,694 UART: [idev] CDI.KEYID = 6
3,852,617 UART: [idev] SUBJECT.KEYID = 7
3,853,806 UART: [idev] UDS.KEYID = 0
3,854,738 ready_for_fw is high
3,854,944 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,004,826 UART: [idev] Erasing UDS.KEYID = 0
6,329,833 UART: [idev] Sha1 KeyId Algorithm
6,353,128 UART: [idev] --
6,358,092 UART: [ldev] ++
6,358,776 UART: [ldev] CDI.KEYID = 6
6,359,718 UART: [ldev] SUBJECT.KEYID = 5
6,360,882 UART: [ldev] AUTHORITY.KEYID = 7
6,362,119 UART: [ldev] FE.KEYID = 1
6,370,476 UART: [ldev] Erasing FE.KEYID = 1
8,847,709 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,567,791 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,582,979 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,598,160 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,613,296 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,633,266 UART: [ldev] --
10,638,601 UART: [fwproc] Wait for Commands...
10,641,515 UART: [fwproc] Recv command 0x46574c44
10,643,785 UART: [fwproc] Recv'd Img size: 119428 bytes
14,146,613 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,223,366 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,346,957 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,911,773 >>> mbox cmd response: success
14,916,181 UART: [afmc] ++
14,916,888 UART: [afmc] CDI.KEYID = 6
14,918,050 UART: [afmc] SUBJECT.KEYID = 7
14,919,599 UART: [afmc] AUTHORITY.KEYID = 5
17,421,479 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,431 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,400 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,469 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,634 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,528 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,215,125 UART: [afmc] --
19,219,106 UART: [cold-reset] --
19,222,227 UART: [state] Locking Datavault
19,229,752 UART: [state] Locking PCR0, PCR1 and PCR31
19,231,954 UART: [state] Locking ICCM
19,234,651 UART: [exit] Launching FMC @ 0x40000130
19,243,326 UART:
19,243,566 UART: Running Caliptra FMC ...
19,244,676 UART:
19,244,841 UART: [state] CFI Enabled
19,252,895 UART: [fht] FMC Alias Private Key: 7
21,018,933 UART: [art] Extend RT PCRs Done
21,020,153 UART: [art] Lock RT PCRs Done
21,021,756 UART: [art] Populate DV Done
21,027,121 UART: [fht] FMC Alias Private Key: 7
21,028,825 UART: [art] Derive CDI
21,029,573 UART: [art] Store in slot 0x4
21,072,596 UART: [art] Derive Key Pair
21,073,646 UART: [art] Store priv key in slot 0x5
23,500,315 UART: [art] Derive Key Pair - Done
23,513,102 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,219,326 UART: [art] Erasing AUTHORITY.KEYID = 7
25,220,826 UART: [art] PUB.X = 3F05AE5FBB9EE4A27391478B0CD6FB4D4C11670D7A8CA179249B727FDCA297A7A4A14ED7443A77E03E6F169A1DD6D205
25,228,095 UART: [art] PUB.Y = C58EE6C9262E3F18BA707471B12CCAF781FBF53119F7F6449260781E52601916B4BE811CFB3D7D70FA0AEA0AB98F216B
25,235,359 UART: [art] SIG.R = E95DC2AFB6466601CCB10A22898053F47F5A1DA4B751E08958FA134A81125C533E78B933A81E436138CFE54BB46D8E7C
25,242,723 UART: [art] SIG.S = BC7AB5784E106541FD0E678035169D1AC2ACB973E7284049FA67B3D4E2E5946B4550D363D9BB6BB6FA17F96794914539
26,221,870 UART: Caliptra RT
26,222,604 UART: [state] CFI Enabled
26,356,098 UART: [rt] RT listening for mailbox commands...
26,357,962 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,387,857 UART: [rt]cmd =0x46504c54, len=4
26,389,385 >>> mbox cmd response data (8 bytes)
26,390,720 UART: [rt] FIPS self test
26,391,667 UART: [kat] ++
26,392,119 UART: [kat] sha1
26,396,630 UART: [kat] SHA2-256
26,398,560 UART: [kat] SHA2-384
26,400,880 UART: Fatal Error: 0x90020002
26,436,208 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,586,190 >>> mbox cmd response: failed
26,586,813 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,736,749 >>> mbox cmd response: failed
Initializing fuses
957 writing to cptra_bootfsm_go
190,000 UART:
190,296 UART: Running Caliptra ROM ...
191,325 UART:
13,793,232 UART: [state] CFI Enabled
13,809,091 UART: [state] LifecycleState = Unprovisioned
13,811,516 UART: [state] DebugLocked = No
13,814,313 UART: [state] WD Timer not started. Device not locked for debugging
13,818,346 UART: [kat] SHA2-256
14,008,205 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
14,019,012 UART: [kat] ++
14,019,625 UART: [kat] sha1
14,031,178 UART: [kat] SHA2-256
14,034,207 UART: [kat] SHA2-384
14,040,853 UART: [kat] SHA2-512-ACC
14,043,430 UART: [kat] ECC-384
16,485,138 UART: [kat] HMAC-384Kdf
16,499,699 UART: [kat] LMS
17,031,528 UART: [kat] --
17,037,251 UART: [cold-reset] ++
17,039,024 UART: [fht] FHT @ 0x50003400
17,051,091 UART: [idev] ++
17,051,780 UART: [idev] CDI.KEYID = 6
17,052,697 UART: [idev] SUBJECT.KEYID = 7
17,053,920 UART: [idev] UDS.KEYID = 0
17,055,453 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,205,380 UART: [idev] Erasing UDS.KEYID = 0
19,531,223 UART: [idev] Sha1 KeyId Algorithm
19,555,070 UART: [idev] --
19,559,552 UART: [ldev] ++
19,560,236 UART: [ldev] CDI.KEYID = 6
19,561,147 UART: [ldev] SUBJECT.KEYID = 5
19,562,331 UART: [ldev] AUTHORITY.KEYID = 7
19,563,514 UART: [ldev] FE.KEYID = 1
19,574,865 UART: [ldev] Erasing FE.KEYID = 1
22,056,924 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
23,776,679 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
23,791,855 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
23,807,097 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
23,822,200 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
23,842,047 UART: [ldev] --
23,848,352 UART: [fwproc] Wait for Commands...
23,850,196 UART: [fwproc] Recv command 0x46574c44
23,852,519 UART: [fwproc] Recv'd Img size: 119428 bytes
27,366,937 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
27,445,465 UART: [fwproc] Load FMC at address 0x40000000 len 20044
27,569,089 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
28,134,006 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.86s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,346 writing to cptra_bootfsm_go
3,759,808 ready_for_fw is high
3,760,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,060,228 >>> mbox cmd response: success
19,316,696 UART:
19,317,084 UART: Running Caliptra FMC ...
19,318,240 UART:
19,318,407 UART: [state] CFI Enabled
19,326,262 UART: [fht] FMC Alias Private Key: 7
21,092,230 UART: [art] Extend RT PCRs Done
21,093,469 UART: [art] Lock RT PCRs Done
21,094,841 UART: [art] Populate DV Done
21,100,270 UART: [fht] FMC Alias Private Key: 7
21,101,950 UART: [art] Derive CDI
21,102,777 UART: [art] Store in slot 0x4
21,145,257 UART: [art] Derive Key Pair
21,146,282 UART: [art] Store priv key in slot 0x5
23,573,318 UART: [art] Derive Key Pair - Done
23,586,149 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,292,374 UART: [art] Erasing AUTHORITY.KEYID = 7
25,293,903 UART: [art] PUB.X = CC2715D9758F9A22815FFE01F53F680E15B70BD8FE38B6CFEBAC4722B488FE95237D5E0C31C9DAB7A59D04716E735928
25,301,167 UART: [art] PUB.Y = F0DD003DF187C9C79C6DB7758AF8CEF57B0F80A78B087F535CA216A99F4E1681816038CE0B05C5AB653B60C9E95D91DA
25,308,391 UART: [art] SIG.R = B54ABC4988CFDD981D7DEA169466854C0A191EDC74E11D0F0E84661F4FF68EC0F7B93F0D4DFCA7FAE7D4B9981E71824C
25,315,826 UART: [art] SIG.S = B893EEEFECB452D5E79BF407F6888A24CA0D4BDDF20428F1705FFBA292C8C47CBAFC777897224D6A3931535C25E58E5F
26,294,832 UART: Caliptra RT
26,295,526 UART: [state] CFI Enabled
26,427,292 UART: [rt] RT listening for mailbox commands...
26,429,144 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,458,849 UART: [rt]cmd =0x46504c54, len=4
26,460,503 >>> mbox cmd response data (8 bytes)
26,461,661 UART: [rt] FIPS self test
26,462,616 UART: [kat] ++
26,463,074 UART: [kat] sha1
26,467,583 UART: [kat] SHA2-256
26,469,484 UART: [kat] SHA2-384
26,471,563 UART: Fatal Error: 0x90020002
26,506,774 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,656,754 >>> mbox cmd response: failed
26,657,406 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
26,807,289 >>> mbox cmd response: failed
Initializing fuses
951 writing to cptra_bootfsm_go
16,887,657 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
28,200,239 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.87s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,258 UART: [state] LifecycleState = Unprovisioned
85,913 UART: [state] DebugLocked = No
86,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,185 UART: [kat] SHA2-256
882,116 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,231 UART: [kat] ++
886,383 UART: [kat] sha1
890,595 UART: [kat] SHA2-256
892,533 UART: [kat] SHA2-384
895,352 UART: [kat] SHA2-512-ACC
897,253 UART: [kat] ECC-384
902,858 UART: [kat] HMAC-384Kdf
907,454 UART: [kat] LMS
1,475,650 UART: [kat] --
1,476,413 UART: [cold-reset] ++
1,476,955 UART: [fht] Storing FHT @ 0x50003400
1,479,708 UART: [idev] ++
1,479,876 UART: [idev] CDI.KEYID = 6
1,480,236 UART: [idev] SUBJECT.KEYID = 7
1,480,660 UART: [idev] UDS.KEYID = 0
1,481,005 ready_for_fw is high
1,481,005 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,690 UART: [idev] Erasing UDS.KEYID = 0
1,505,762 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,346 UART: [idev] --
1,515,365 UART: [ldev] ++
1,515,533 UART: [ldev] CDI.KEYID = 6
1,515,896 UART: [ldev] SUBJECT.KEYID = 5
1,516,322 UART: [ldev] AUTHORITY.KEYID = 7
1,516,785 UART: [ldev] FE.KEYID = 1
1,521,925 UART: [ldev] Erasing FE.KEYID = 1
1,547,544 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,397 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,113 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,004 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,716 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,606 UART: [ldev] --
1,587,111 UART: [fwproc] Waiting for Commands...
1,587,796 UART: [fwproc] Received command 0x46574c44
1,588,587 UART: [fwproc] Received Image of size 119428 bytes
2,943,729 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,971,333 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,551 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,144,210 >>> mbox cmd response: success
3,145,290 UART: [afmc] ++
3,145,458 UART: [afmc] CDI.KEYID = 6
3,145,820 UART: [afmc] SUBJECT.KEYID = 7
3,146,245 UART: [afmc] AUTHORITY.KEYID = 5
3,181,232 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,464 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,198,244 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,953 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,836 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,519 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,479 UART: [afmc] --
3,224,457 UART: [cold-reset] --
3,225,251 UART: [state] Locking Datavault
3,226,588 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,192 UART: [state] Locking ICCM
3,227,758 UART: [exit] Launching FMC @ 0x40000130
3,233,088 UART:
3,233,104 UART: Running Caliptra FMC ...
3,233,512 UART:
3,233,566 UART: [state] CFI Enabled
3,244,316 UART: [fht] FMC Alias Private Key: 7
3,363,050 UART: [art] Extend RT PCRs Done
3,363,478 UART: [art] Lock RT PCRs Done
3,365,086 UART: [art] Populate DV Done
3,373,505 UART: [fht] FMC Alias Private Key: 7
3,374,645 UART: [art] Derive CDI
3,374,925 UART: [art] Store in slot 0x4
3,460,563 UART: [art] Derive Key Pair
3,460,923 UART: [art] Store priv key in slot 0x5
3,474,080 UART: [art] Derive Key Pair - Done
3,489,094 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,365 UART: [art] Erasing AUTHORITY.KEYID = 7
3,505,130 UART: [art] PUB.X = 419F4491B9D85A414714ED4680BE2037924E18487B3BDFF6467282BDE0551C58B09AE659DFE977C792BDEE688A436F56
3,511,900 UART: [art] PUB.Y = 376C12F6AC57BA4B6AA15FC4F3E831CF6CB2B034F6902485B6AFD37462A434D6C2ED0F9C199E6E3A866D94397ACC0C66
3,518,858 UART: [art] SIG.R = 918886A28379FD57654473C31BEF039003259CE3CF106096F2F8EF84761B325620B10CABC96EB121F9A00ACCCD173C83
3,525,616 UART: [art] SIG.S = 660B4DF4310731D342777994794614511BADE4933D6B52E7838F792D4699637A64EB9D15FA8AFB8C9DF7F20B6DE2F1FA
3,549,471 UART: Caliptra RT
3,549,722 UART: [state] CFI Enabled
3,669,630 UART: [rt] RT listening for mailbox commands...
3,670,293 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,692 UART: [rt]cmd =0x46504c54, len=4
3,700,908 >>> mbox cmd response data (8 bytes)
3,701,197 UART: [rt] FIPS self test
3,701,525 UART: [kat] ++
3,701,677 UART: [kat] sha1
3,705,999 UART: [kat] SHA2-256
3,708,021 UART: [kat] SHA2-384
3,710,736 UART: Fatal Error: 0x90020002
3,712,275 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,280 >>> mbox cmd response: failed
3,712,280 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,285 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,922 UART: [state] LifecycleState = Unprovisioned
85,577 UART: [state] DebugLocked = No
86,177 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,735 UART: [kat] SHA2-256
881,666 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,781 UART: [kat] ++
885,933 UART: [kat] sha1
890,159 UART: [kat] SHA2-256
892,097 UART: [kat] SHA2-384
894,690 UART: [kat] SHA2-512-ACC
896,591 UART: [kat] ECC-384
902,076 UART: [kat] HMAC-384Kdf
906,752 UART: [kat] LMS
1,474,948 UART: [kat] --
1,475,821 UART: [cold-reset] ++
1,476,305 UART: [fht] Storing FHT @ 0x50003400
1,479,072 UART: [idev] ++
1,479,240 UART: [idev] CDI.KEYID = 6
1,479,600 UART: [idev] SUBJECT.KEYID = 7
1,480,024 UART: [idev] UDS.KEYID = 0
1,480,369 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,080 UART: [idev] Erasing UDS.KEYID = 0
1,504,952 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,386 UART: [idev] --
1,514,431 UART: [ldev] ++
1,514,599 UART: [ldev] CDI.KEYID = 6
1,514,962 UART: [ldev] SUBJECT.KEYID = 5
1,515,388 UART: [ldev] AUTHORITY.KEYID = 7
1,515,851 UART: [ldev] FE.KEYID = 1
1,520,799 UART: [ldev] Erasing FE.KEYID = 1
1,546,234 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,765 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,372 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,084 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,154 UART: [ldev] --
1,585,471 UART: [fwproc] Waiting for Commands...
1,586,324 UART: [fwproc] Received command 0x46574c44
1,587,115 UART: [fwproc] Received Image of size 119428 bytes
2,941,449 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,109 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,327 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,004 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,707 ready_for_fw is high
1,362,707 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,993,720 >>> mbox cmd response: success
3,055,397 UART:
3,055,413 UART: Running Caliptra FMC ...
3,055,821 UART:
3,055,875 UART: [state] CFI Enabled
3,066,517 UART: [fht] FMC Alias Private Key: 7
3,185,389 UART: [art] Extend RT PCRs Done
3,185,817 UART: [art] Lock RT PCRs Done
3,187,335 UART: [art] Populate DV Done
3,195,730 UART: [fht] FMC Alias Private Key: 7
3,196,714 UART: [art] Derive CDI
3,196,994 UART: [art] Store in slot 0x4
3,282,610 UART: [art] Derive Key Pair
3,282,970 UART: [art] Store priv key in slot 0x5
3,296,279 UART: [art] Derive Key Pair - Done
3,311,098 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,815 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,580 UART: [art] PUB.X = 5354EFFCBF4B933451FF046749AEA9F44CDA49869C71E44B07305FA2AB8D96199A7522494CAA0D812391986B571F281C
3,334,343 UART: [art] PUB.Y = 8094F1453CCEA663C6F0DCE396031F652ACCB787827754B6500B9643157D777CFDCC150ACA38D678DA8206D87E7D67F8
3,341,285 UART: [art] SIG.R = 571D8A7EDA42B904F011C19710A7D7A4584409E451D77992E9AAF6C9927F0E9A210BD18052E2C9C3B7D72BEF351489D3
3,348,045 UART: [art] SIG.S = 024045AA2D94D717108AF1332B47E2E4CD8AE38C8526295928D9CA9ECA1889B5D14A60AEFA0AA2F6DE017629B69E3D29
3,372,112 UART: Caliptra RT
3,372,363 UART: [state] CFI Enabled
3,492,470 UART: [rt] RT listening for mailbox commands...
3,493,133 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,522,982 UART: [rt]cmd =0x46504c54, len=4
3,524,236 >>> mbox cmd response data (8 bytes)
3,524,367 UART: [rt] FIPS self test
3,524,695 UART: [kat] ++
3,524,847 UART: [kat] sha1
3,529,301 UART: [kat] SHA2-256
3,531,323 UART: [kat] SHA2-384
3,534,050 UART: Fatal Error: 0x90020002
3,535,589 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,594 >>> mbox cmd response: failed
3,535,594 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,535,599 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,879 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,314 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.19s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
84,869 UART: [state] LifecycleState = Unprovisioned
85,524 UART: [state] DebugLocked = No
86,064 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,668 UART: [kat] SHA2-256
881,599 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,714 UART: [kat] ++
885,866 UART: [kat] sha1
890,184 UART: [kat] SHA2-256
892,122 UART: [kat] SHA2-384
894,841 UART: [kat] SHA2-512-ACC
896,742 UART: [kat] ECC-384
902,033 UART: [kat] HMAC-384Kdf
906,595 UART: [kat] LMS
1,474,791 UART: [kat] --
1,475,724 UART: [cold-reset] ++
1,476,168 UART: [fht] Storing FHT @ 0x50003400
1,478,819 UART: [idev] ++
1,478,987 UART: [idev] CDI.KEYID = 6
1,479,347 UART: [idev] SUBJECT.KEYID = 7
1,479,771 UART: [idev] UDS.KEYID = 0
1,480,116 ready_for_fw is high
1,480,116 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,219 UART: [idev] Erasing UDS.KEYID = 0
1,505,191 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,709 UART: [idev] --
1,514,672 UART: [ldev] ++
1,514,840 UART: [ldev] CDI.KEYID = 6
1,515,203 UART: [ldev] SUBJECT.KEYID = 5
1,515,629 UART: [ldev] AUTHORITY.KEYID = 7
1,516,092 UART: [ldev] FE.KEYID = 1
1,521,272 UART: [ldev] Erasing FE.KEYID = 1
1,546,281 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,096 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,812 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,703 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,415 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,371 UART: [ldev] --
1,585,640 UART: [fwproc] Waiting for Commands...
1,586,371 UART: [fwproc] Received command 0x46574c44
1,587,162 UART: [fwproc] Received Image of size 119428 bytes
2,942,368 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,969,304 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,000,522 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,142,213 >>> mbox cmd response: success
3,143,299 UART: [afmc] ++
3,143,467 UART: [afmc] CDI.KEYID = 6
3,143,829 UART: [afmc] SUBJECT.KEYID = 7
3,144,254 UART: [afmc] AUTHORITY.KEYID = 5
3,178,903 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,194,945 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,195,725 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,201,434 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,207,317 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,000 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,220,772 UART: [afmc] --
3,221,768 UART: [cold-reset] --
3,222,480 UART: [state] Locking Datavault
3,223,855 UART: [state] Locking PCR0, PCR1 and PCR31
3,224,459 UART: [state] Locking ICCM
3,225,073 UART: [exit] Launching FMC @ 0x40000130
3,230,403 UART:
3,230,419 UART: Running Caliptra FMC ...
3,230,827 UART:
3,230,970 UART: [state] CFI Enabled
3,241,632 UART: [fht] FMC Alias Private Key: 7
3,360,672 UART: [art] Extend RT PCRs Done
3,361,100 UART: [art] Lock RT PCRs Done
3,362,800 UART: [art] Populate DV Done
3,371,103 UART: [fht] FMC Alias Private Key: 7
3,372,079 UART: [art] Derive CDI
3,372,359 UART: [art] Store in slot 0x4
3,457,951 UART: [art] Derive Key Pair
3,458,311 UART: [art] Store priv key in slot 0x5
3,472,028 UART: [art] Derive Key Pair - Done
3,487,171 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,502,732 UART: [art] Erasing AUTHORITY.KEYID = 7
3,503,497 UART: [art] PUB.X = 8011F7313B04B7EC52E690CFFDBB46E9EA75DD3C3FE67ACFCD498BFF97CCEFE33260F3F353D9D95EBDA07871DB7D6018
3,510,290 UART: [art] PUB.Y = 2D1E4430E48F224A1A5A35694089C6C328D7892B152D5F8EEF07814B46BDA79F3F61B031F7F33F437B335458337F7A4D
3,517,235 UART: [art] SIG.R = CB25A08821706A765D53EF930CBB822FEA6B352810F8D157C0A69FA02A1302961235AED8503082324711771EE69632ED
3,523,993 UART: [art] SIG.S = 51DCD103FD884CC3D9396AE6F4C2598C6C03A3E9FD1748E7602F8E2F8AB4D864231918290E726CE57DB67EA4AEE038EA
3,547,984 UART: Caliptra RT
3,548,327 UART: [state] CFI Enabled
3,668,789 UART: [rt] RT listening for mailbox commands...
3,669,452 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,699,543 UART: [rt]cmd =0x46504c54, len=4
3,700,823 >>> mbox cmd response data (8 bytes)
3,700,940 UART: [rt] FIPS self test
3,701,268 UART: [kat] ++
3,701,420 UART: [kat] sha1
3,705,844 UART: [kat] SHA2-256
3,707,866 UART: [kat] SHA2-384
3,710,507 UART: Fatal Error: 0x90020002
3,712,046 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,051 >>> mbox cmd response: failed
3,712,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,712,056 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,573 UART: [state] LifecycleState = Unprovisioned
86,228 UART: [state] DebugLocked = No
86,712 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,440 UART: [kat] SHA2-256
882,371 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,486 UART: [kat] ++
886,638 UART: [kat] sha1
890,908 UART: [kat] SHA2-256
892,846 UART: [kat] SHA2-384
895,711 UART: [kat] SHA2-512-ACC
897,612 UART: [kat] ECC-384
903,233 UART: [kat] HMAC-384Kdf
907,915 UART: [kat] LMS
1,476,111 UART: [kat] --
1,477,058 UART: [cold-reset] ++
1,477,560 UART: [fht] Storing FHT @ 0x50003400
1,480,291 UART: [idev] ++
1,480,459 UART: [idev] CDI.KEYID = 6
1,480,819 UART: [idev] SUBJECT.KEYID = 7
1,481,243 UART: [idev] UDS.KEYID = 0
1,481,588 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,093 UART: [idev] Erasing UDS.KEYID = 0
1,505,447 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,229 UART: [idev] --
1,515,172 UART: [ldev] ++
1,515,340 UART: [ldev] CDI.KEYID = 6
1,515,703 UART: [ldev] SUBJECT.KEYID = 5
1,516,129 UART: [ldev] AUTHORITY.KEYID = 7
1,516,592 UART: [ldev] FE.KEYID = 1
1,521,810 UART: [ldev] Erasing FE.KEYID = 1
1,546,619 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,462 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,178 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,781 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,749 UART: [ldev] --
1,586,202 UART: [fwproc] Waiting for Commands...
1,586,899 UART: [fwproc] Received command 0x46574c44
1,587,690 UART: [fwproc] Received Image of size 119428 bytes
2,943,342 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,822 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,040 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,673 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,278 ready_for_fw is high
1,362,278 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,907 >>> mbox cmd response: success
3,054,674 UART:
3,054,690 UART: Running Caliptra FMC ...
3,055,098 UART:
3,055,241 UART: [state] CFI Enabled
3,065,851 UART: [fht] FMC Alias Private Key: 7
3,184,873 UART: [art] Extend RT PCRs Done
3,185,301 UART: [art] Lock RT PCRs Done
3,186,829 UART: [art] Populate DV Done
3,194,998 UART: [fht] FMC Alias Private Key: 7
3,196,052 UART: [art] Derive CDI
3,196,332 UART: [art] Store in slot 0x4
3,282,432 UART: [art] Derive Key Pair
3,282,792 UART: [art] Store priv key in slot 0x5
3,296,101 UART: [art] Derive Key Pair - Done
3,311,051 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,326,998 UART: [art] Erasing AUTHORITY.KEYID = 7
3,327,763 UART: [art] PUB.X = 5C08CA9BBB6DEDE834B03AD9CA6B61ECA299054C9F567577F0CBA9D6080161F0D54C656B19051BD15BDC6D833D9798EB
3,334,534 UART: [art] PUB.Y = B957359A4B5060CDD4E649162518628930F3ACFA99E2A50BF34DD9C76F25A1F5E72F6507D1D7CAC536F61B9EA5421299
3,341,482 UART: [art] SIG.R = 642CA2A7AD7DBF69B09EBC1BBA9B4963E81C6BB0333441B362933F897F5C05A436240B4DFAB135A021CB13F06D431206
3,348,251 UART: [art] SIG.S = 8FE5587AE9F0964D00F93349A8FD20079214FF2454DF0879219B30D25F09FDCAC7C419AFC7818C1D055C05B1EC468E02
3,371,705 UART: Caliptra RT
3,372,048 UART: [state] CFI Enabled
3,493,226 UART: [rt] RT listening for mailbox commands...
3,493,889 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,523,666 UART: [rt]cmd =0x46504c54, len=4
3,524,930 >>> mbox cmd response data (8 bytes)
3,525,073 UART: [rt] FIPS self test
3,525,401 UART: [kat] ++
3,525,553 UART: [kat] sha1
3,529,927 UART: [kat] SHA2-256
3,531,949 UART: [kat] SHA2-384
3,534,486 UART: Fatal Error: 0x90020002
3,536,025 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,030 >>> mbox cmd response: failed
3,536,030 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,536,035 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,848 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,539 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.17s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,372 UART: [state] LifecycleState = Unprovisioned
86,027 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,948 UART: [kat] SHA2-256
891,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,602 UART: [kat] ++
895,754 UART: [kat] sha1
900,046 UART: [kat] SHA2-256
901,986 UART: [kat] SHA2-384
904,755 UART: [kat] SHA2-512-ACC
906,656 UART: [kat] ECC-384
916,517 UART: [kat] HMAC-384Kdf
920,931 UART: [kat] LMS
1,169,243 UART: [kat] --
1,170,224 UART: [cold-reset] ++
1,170,694 UART: [fht] FHT @ 0x50003400
1,173,394 UART: [idev] ++
1,173,562 UART: [idev] CDI.KEYID = 6
1,173,923 UART: [idev] SUBJECT.KEYID = 7
1,174,348 UART: [idev] UDS.KEYID = 0
1,174,694 ready_for_fw is high
1,174,694 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,115 UART: [idev] Erasing UDS.KEYID = 0
1,199,359 UART: [idev] Sha1 KeyId Algorithm
1,208,249 UART: [idev] --
1,209,286 UART: [ldev] ++
1,209,454 UART: [ldev] CDI.KEYID = 6
1,209,818 UART: [ldev] SUBJECT.KEYID = 5
1,210,245 UART: [ldev] AUTHORITY.KEYID = 7
1,210,708 UART: [ldev] FE.KEYID = 1
1,216,040 UART: [ldev] Erasing FE.KEYID = 1
1,242,411 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,442 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,154 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,370 UART: [ldev] --
1,281,663 UART: [fwproc] Wait for Commands...
1,282,296 UART: [fwproc] Recv command 0x46574c44
1,283,029 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,702 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,939 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,114 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,695 >>> mbox cmd response: success
2,838,729 UART: [afmc] ++
2,838,897 UART: [afmc] CDI.KEYID = 6
2,839,260 UART: [afmc] SUBJECT.KEYID = 7
2,839,686 UART: [afmc] AUTHORITY.KEYID = 5
2,874,983 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,570 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,319 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,029 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,910 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,611 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,324 UART: [afmc] --
2,918,327 UART: [cold-reset] --
2,919,131 UART: [state] Locking Datavault
2,920,044 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,648 UART: [state] Locking ICCM
2,921,196 UART: [exit] Launching FMC @ 0x40000130
2,926,526 UART:
2,926,542 UART: Running Caliptra FMC ...
2,926,950 UART:
2,927,004 UART: [state] CFI Enabled
2,937,668 UART: [fht] FMC Alias Private Key: 7
3,056,086 UART: [art] Extend RT PCRs Done
3,056,514 UART: [art] Lock RT PCRs Done
3,057,748 UART: [art] Populate DV Done
3,066,269 UART: [fht] FMC Alias Private Key: 7
3,067,315 UART: [art] Derive CDI
3,067,595 UART: [art] Store in slot 0x4
3,153,604 UART: [art] Derive Key Pair
3,153,964 UART: [art] Store priv key in slot 0x5
3,166,922 UART: [art] Derive Key Pair - Done
3,181,493 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,210 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,975 UART: [art] PUB.X = 39662A077E25A9F3C8A9BEC3B81326F961A656739B6C6C448137A7637B3159B28807F748323B6F8C9F057507C0FA4ED3
3,204,727 UART: [art] PUB.Y = B3E606A0B729AE4FAF1018C1E7D7E214809C99300E99846C19E7CE2E2F7F09727F3171C036CBBDB6B5E4FA4F9B024E7D
3,211,677 UART: [art] SIG.R = 64DA9D21EEBE19392861EBF61F43138EFA87E887322597EC03EBB2991AD096EC4F62C21502F3B09089F60827B3BC0684
3,218,437 UART: [art] SIG.S = 66EE9AABCE480A05B8BBB98F0AF9559A484FB301554DA6D9258F7573EFF04F6DEB481F132DA62071A41476F06F015B9E
3,242,264 UART: Caliptra RT
3,242,515 UART: [state] CFI Enabled
3,362,521 UART: [rt] RT listening for mailbox commands...
3,363,184 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,392,883 UART: [rt]cmd =0x46504c54, len=4
3,394,023 >>> mbox cmd response data (8 bytes)
3,394,358 UART: [rt] FIPS self test
3,394,686 UART: [kat] ++
3,394,838 UART: [kat] sha1
3,399,202 UART: [kat] SHA2-256
3,401,224 UART: [kat] SHA2-384
3,403,649 UART: Fatal Error: 0x90020002
3,405,188 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,193 >>> mbox cmd response: failed
3,405,193 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,198 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,912 UART: [state] LifecycleState = Unprovisioned
85,567 UART: [state] DebugLocked = No
86,111 UART: [state] WD Timer not started. Device not locked for debugging
87,438 UART: [kat] SHA2-256
890,988 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,092 UART: [kat] ++
895,244 UART: [kat] sha1
899,438 UART: [kat] SHA2-256
901,378 UART: [kat] SHA2-384
904,257 UART: [kat] SHA2-512-ACC
906,158 UART: [kat] ECC-384
915,949 UART: [kat] HMAC-384Kdf
920,541 UART: [kat] LMS
1,168,853 UART: [kat] --
1,169,496 UART: [cold-reset] ++
1,169,892 UART: [fht] FHT @ 0x50003400
1,172,522 UART: [idev] ++
1,172,690 UART: [idev] CDI.KEYID = 6
1,173,051 UART: [idev] SUBJECT.KEYID = 7
1,173,476 UART: [idev] UDS.KEYID = 0
1,173,822 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,525 UART: [idev] Erasing UDS.KEYID = 0
1,198,825 UART: [idev] Sha1 KeyId Algorithm
1,207,515 UART: [idev] --
1,208,346 UART: [ldev] ++
1,208,514 UART: [ldev] CDI.KEYID = 6
1,208,878 UART: [ldev] SUBJECT.KEYID = 5
1,209,305 UART: [ldev] AUTHORITY.KEYID = 7
1,209,768 UART: [ldev] FE.KEYID = 1
1,215,124 UART: [ldev] Erasing FE.KEYID = 1
1,241,199 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,907 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,623 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,512 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,224 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,184 UART: [ldev] --
1,280,453 UART: [fwproc] Wait for Commands...
1,281,274 UART: [fwproc] Recv command 0x46574c44
1,282,007 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,062 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,919 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,094 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,567 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,236 ready_for_fw is high
1,059,236 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,774 >>> mbox cmd response: success
2,751,353 UART:
2,751,369 UART: Running Caliptra FMC ...
2,751,777 UART:
2,751,831 UART: [state] CFI Enabled
2,762,003 UART: [fht] FMC Alias Private Key: 7
2,880,745 UART: [art] Extend RT PCRs Done
2,881,173 UART: [art] Lock RT PCRs Done
2,882,681 UART: [art] Populate DV Done
2,891,056 UART: [fht] FMC Alias Private Key: 7
2,892,238 UART: [art] Derive CDI
2,892,518 UART: [art] Store in slot 0x4
2,978,891 UART: [art] Derive Key Pair
2,979,251 UART: [art] Store priv key in slot 0x5
2,991,877 UART: [art] Derive Key Pair - Done
3,006,676 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,022,431 UART: [art] Erasing AUTHORITY.KEYID = 7
3,023,196 UART: [art] PUB.X = F8A13950A25E29BC3460B66AF7E830DD12452E9879416984D7D134E69654D5E8CA182AA4B04C4B15CBD4403BA2420B13
3,029,963 UART: [art] PUB.Y = 398EA9C29A82605602EE713D2AFA79059EF02F515C80BE82445B653FE5EF6CC4CFD94DC15F6EFE1ABD428330EEA1C46A
3,036,925 UART: [art] SIG.R = 3C4696509F2C7067E34F822D62A5BCE0457D57D0320F86FA9F0EC31A42A260AA2714E4B3BF633EB6BC1A38BB33F034CF
3,043,699 UART: [art] SIG.S = FC7F7630B2E346FA60AC5AC4DD2BC5660B87A39BC175B789C259D9C5E44D4BF8DFD6328E1B661A7D8BA9E377D3B3D7F7
3,067,424 UART: Caliptra RT
3,067,675 UART: [state] CFI Enabled
3,188,138 UART: [rt] RT listening for mailbox commands...
3,188,801 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,364 UART: [rt]cmd =0x46504c54, len=4
3,219,422 >>> mbox cmd response data (8 bytes)
3,219,767 UART: [rt] FIPS self test
3,220,095 UART: [kat] ++
3,220,247 UART: [kat] sha1
3,224,555 UART: [kat] SHA2-256
3,226,577 UART: [kat] SHA2-384
3,229,332 UART: Fatal Error: 0x90020002
3,230,871 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,876 >>> mbox cmd response: failed
3,230,876 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,881 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,242 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,138 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.05s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,263 UART: [state] LifecycleState = Unprovisioned
85,918 UART: [state] DebugLocked = No
86,446 UART: [state] WD Timer not started. Device not locked for debugging
87,719 UART: [kat] SHA2-256
891,269 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,373 UART: [kat] ++
895,525 UART: [kat] sha1
899,687 UART: [kat] SHA2-256
901,627 UART: [kat] SHA2-384
904,320 UART: [kat] SHA2-512-ACC
906,221 UART: [kat] ECC-384
916,094 UART: [kat] HMAC-384Kdf
920,542 UART: [kat] LMS
1,168,854 UART: [kat] --
1,169,337 UART: [cold-reset] ++
1,169,915 UART: [fht] FHT @ 0x50003400
1,172,559 UART: [idev] ++
1,172,727 UART: [idev] CDI.KEYID = 6
1,173,088 UART: [idev] SUBJECT.KEYID = 7
1,173,513 UART: [idev] UDS.KEYID = 0
1,173,859 ready_for_fw is high
1,173,859 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,178 UART: [idev] Erasing UDS.KEYID = 0
1,198,264 UART: [idev] Sha1 KeyId Algorithm
1,207,190 UART: [idev] --
1,208,163 UART: [ldev] ++
1,208,331 UART: [ldev] CDI.KEYID = 6
1,208,695 UART: [ldev] SUBJECT.KEYID = 5
1,209,122 UART: [ldev] AUTHORITY.KEYID = 7
1,209,585 UART: [ldev] FE.KEYID = 1
1,214,879 UART: [ldev] Erasing FE.KEYID = 1
1,242,036 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,820 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,425 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,109 UART: [ldev] --
1,281,462 UART: [fwproc] Wait for Commands...
1,282,089 UART: [fwproc] Recv command 0x46574c44
1,282,822 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,271 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,224 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,399 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,942 >>> mbox cmd response: success
2,838,004 UART: [afmc] ++
2,838,172 UART: [afmc] CDI.KEYID = 6
2,838,535 UART: [afmc] SUBJECT.KEYID = 7
2,838,961 UART: [afmc] AUTHORITY.KEYID = 5
2,873,990 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,890,623 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,082 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,902,963 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,908,664 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,439 UART: [afmc] --
2,917,438 UART: [cold-reset] --
2,918,234 UART: [state] Locking Datavault
2,919,243 UART: [state] Locking PCR0, PCR1 and PCR31
2,919,847 UART: [state] Locking ICCM
2,920,341 UART: [exit] Launching FMC @ 0x40000130
2,925,671 UART:
2,925,687 UART: Running Caliptra FMC ...
2,926,095 UART:
2,926,238 UART: [state] CFI Enabled
2,937,126 UART: [fht] FMC Alias Private Key: 7
3,056,012 UART: [art] Extend RT PCRs Done
3,056,440 UART: [art] Lock RT PCRs Done
3,058,146 UART: [art] Populate DV Done
3,066,469 UART: [fht] FMC Alias Private Key: 7
3,067,599 UART: [art] Derive CDI
3,067,879 UART: [art] Store in slot 0x4
3,153,920 UART: [art] Derive Key Pair
3,154,280 UART: [art] Store priv key in slot 0x5
3,168,048 UART: [art] Derive Key Pair - Done
3,182,670 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,477 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,242 UART: [art] PUB.X = 229C5A1591A7C5528C8AFE4883FD65226F2EBB354EE3B0FB87AD8C2D69208690EEAE0BE9F590BD92A38A0470D79DEE26
3,206,020 UART: [art] PUB.Y = 54C5FE5E03265640940F7E3B601D24B67C188DF73614B5E192F0D8E0A7528F190342464B089D4A795E56A66598E9AC38
3,212,950 UART: [art] SIG.R = BD2AA11608EFB7924D6919396819509D488BC4CE6C0F9EA508B3952A21E7FBD7761581D5838001D63AEC252D28F0D815
3,219,708 UART: [art] SIG.S = 1CE00FB568123D1DB98968D7D363FE119F60C41ACC04223EE1558C185DF3BD877B55E466FCDB50974A9391AED9D6BBEC
3,243,130 UART: Caliptra RT
3,243,473 UART: [state] CFI Enabled
3,362,840 UART: [rt] RT listening for mailbox commands...
3,363,503 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,186 UART: [rt]cmd =0x46504c54, len=4
3,394,326 >>> mbox cmd response data (8 bytes)
3,394,447 UART: [rt] FIPS self test
3,394,775 UART: [kat] ++
3,394,927 UART: [kat] sha1
3,399,101 UART: [kat] SHA2-256
3,401,123 UART: [kat] SHA2-384
3,403,786 UART: Fatal Error: 0x90020002
3,405,325 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,330 >>> mbox cmd response: failed
3,405,330 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,405,335 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,835 UART: [state] LifecycleState = Unprovisioned
86,490 UART: [state] DebugLocked = No
87,104 UART: [state] WD Timer not started. Device not locked for debugging
88,375 UART: [kat] SHA2-256
891,925 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
896,029 UART: [kat] ++
896,181 UART: [kat] sha1
900,235 UART: [kat] SHA2-256
902,175 UART: [kat] SHA2-384
904,962 UART: [kat] SHA2-512-ACC
906,863 UART: [kat] ECC-384
916,758 UART: [kat] HMAC-384Kdf
921,420 UART: [kat] LMS
1,169,732 UART: [kat] --
1,170,451 UART: [cold-reset] ++
1,170,861 UART: [fht] FHT @ 0x50003400
1,173,495 UART: [idev] ++
1,173,663 UART: [idev] CDI.KEYID = 6
1,174,024 UART: [idev] SUBJECT.KEYID = 7
1,174,449 UART: [idev] UDS.KEYID = 0
1,174,795 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,528 UART: [idev] Erasing UDS.KEYID = 0
1,199,948 UART: [idev] Sha1 KeyId Algorithm
1,208,648 UART: [idev] --
1,209,661 UART: [ldev] ++
1,209,829 UART: [ldev] CDI.KEYID = 6
1,210,193 UART: [ldev] SUBJECT.KEYID = 5
1,210,620 UART: [ldev] AUTHORITY.KEYID = 7
1,211,083 UART: [ldev] FE.KEYID = 1
1,216,491 UART: [ldev] Erasing FE.KEYID = 1
1,242,402 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,818 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,534 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,423 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,135 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,201 UART: [ldev] --
1,281,430 UART: [fwproc] Wait for Commands...
1,282,109 UART: [fwproc] Recv command 0x46574c44
1,282,842 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,591 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,186 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,361 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,856 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,295 ready_for_fw is high
1,060,295 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,057 >>> mbox cmd response: success
2,753,908 UART:
2,753,924 UART: Running Caliptra FMC ...
2,754,332 UART:
2,754,475 UART: [state] CFI Enabled
2,765,255 UART: [fht] FMC Alias Private Key: 7
2,883,533 UART: [art] Extend RT PCRs Done
2,883,961 UART: [art] Lock RT PCRs Done
2,885,479 UART: [art] Populate DV Done
2,893,718 UART: [fht] FMC Alias Private Key: 7
2,894,758 UART: [art] Derive CDI
2,895,038 UART: [art] Store in slot 0x4
2,980,485 UART: [art] Derive Key Pair
2,980,845 UART: [art] Store priv key in slot 0x5
2,994,651 UART: [art] Derive Key Pair - Done
3,009,222 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,185 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,950 UART: [art] PUB.X = 794C3F93729B340B1F0A1C3945F7486267E2FD2DF66BDFF4322FC6A4957B9317F16936D641E9B9450E538DE629DF581B
3,032,711 UART: [art] PUB.Y = CC5A8DC109FB5AB7B82028A7FEE86B4C231BFD763F833712CA945BC841CDF48F97A77237C2A95542F1478E1C6819DC48
3,039,668 UART: [art] SIG.R = 37332D645D01F38B8AC33CBFED1B0011EFC6ACC57C4D6EA7322F84D6004354BBB9F36DF2C7BD2F69AACE29983492DCCE
3,046,413 UART: [art] SIG.S = 157AC3F6455F9FDD49A9A9C15AF0FAB80D992D7472BDEF09BADE6F5069F88AC16CA99FB01D5758CC05764808BFA7EB78
3,070,295 UART: Caliptra RT
3,070,638 UART: [state] CFI Enabled
3,190,134 UART: [rt] RT listening for mailbox commands...
3,190,797 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,966 UART: [rt]cmd =0x46504c54, len=4
3,222,104 >>> mbox cmd response data (8 bytes)
3,222,263 UART: [rt] FIPS self test
3,222,591 UART: [kat] ++
3,222,743 UART: [kat] sha1
3,227,103 UART: [kat] SHA2-256
3,229,125 UART: [kat] SHA2-384
3,231,718 UART: Fatal Error: 0x90020002
3,233,257 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,262 >>> mbox cmd response: failed
3,233,262 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,233,267 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,977 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,655 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.24s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,306 UART: [state] LifecycleState = Unprovisioned
85,961 UART: [state] DebugLocked = No
86,517 UART: [state] WD Timer not started. Device not locked for debugging
87,682 UART: [kat] SHA2-256
893,332 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,457 UART: [kat] ++
897,609 UART: [kat] sha1
901,681 UART: [kat] SHA2-256
903,621 UART: [kat] SHA2-384
906,394 UART: [kat] SHA2-512-ACC
908,295 UART: [kat] ECC-384
917,976 UART: [kat] HMAC-384Kdf
922,560 UART: [kat] LMS
1,170,888 UART: [kat] --
1,171,887 UART: [cold-reset] ++
1,172,273 UART: [fht] FHT @ 0x50003400
1,174,770 UART: [idev] ++
1,174,938 UART: [idev] CDI.KEYID = 6
1,175,298 UART: [idev] SUBJECT.KEYID = 7
1,175,722 UART: [idev] UDS.KEYID = 0
1,176,067 ready_for_fw is high
1,176,067 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,074 UART: [idev] Erasing UDS.KEYID = 0
1,200,969 UART: [idev] Sha1 KeyId Algorithm
1,209,431 UART: [idev] --
1,210,433 UART: [ldev] ++
1,210,601 UART: [ldev] CDI.KEYID = 6
1,210,964 UART: [ldev] SUBJECT.KEYID = 5
1,211,390 UART: [ldev] AUTHORITY.KEYID = 7
1,211,853 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,542 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,129 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,845 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,736 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,448 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,541 UART: [ldev] --
1,282,882 UART: [fwproc] Wait for Commands...
1,283,550 UART: [fwproc] Recv command 0x46574c44
1,284,278 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,549 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,784 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,954 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,439 >>> mbox cmd response: success
2,839,679 UART: [afmc] ++
2,839,847 UART: [afmc] CDI.KEYID = 6
2,840,209 UART: [afmc] SUBJECT.KEYID = 7
2,840,634 UART: [afmc] AUTHORITY.KEYID = 5
2,875,093 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,536 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,284 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,993 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,876 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,577 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,483 UART: [afmc] --
2,918,427 UART: [cold-reset] --
2,919,015 UART: [state] Locking Datavault
2,920,216 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,820 UART: [state] Locking ICCM
2,921,354 UART: [exit] Launching FMC @ 0x40000130
2,926,684 UART:
2,926,700 UART: Running Caliptra FMC ...
2,927,108 UART:
2,927,162 UART: [state] CFI Enabled
2,937,804 UART: [fht] FMC Alias Private Key: 7
3,057,268 UART: [art] Extend RT PCRs Done
3,057,696 UART: [art] Lock RT PCRs Done
3,059,344 UART: [art] Populate DV Done
3,067,515 UART: [fht] FMC Alias Private Key: 7
3,068,553 UART: [art] Derive CDI
3,068,833 UART: [art] Store in slot 0x4
3,154,312 UART: [art] Derive Key Pair
3,154,672 UART: [art] Store priv key in slot 0x5
3,168,130 UART: [art] Derive Key Pair - Done
3,183,141 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,198,536 UART: [art] Erasing AUTHORITY.KEYID = 7
3,199,301 UART: [art] PUB.X = 7AF2C6D1FB778157DAE9E8F3B4D9C8D171C6255560E1352B49BC6A1BFC80B307E26928DF96554FAA18C680A9290911C5
3,206,071 UART: [art] PUB.Y = 5928202A7070D8900B0BA7DF9C08612EE5AC4848EDF07624C732DE19091623D02FC38F630259A81B011CF02C7D22D116
3,212,999 UART: [art] SIG.R = 3C5229088BD885CAB99BC2827D35982E8958CC5E9DB01609D50E7F82B8AF54682475EF1360CA77C8169C4AC778661D56
3,219,758 UART: [art] SIG.S = 0D9F0617916EB97F1F433BF8A820F09A323F87D832AD148C21722467B984EDC5050830F43696AE2C30D524770431351A
3,244,021 UART: Caliptra RT
3,244,272 UART: [state] CFI Enabled
3,364,614 UART: [rt] RT listening for mailbox commands...
3,365,277 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,395,006 UART: [rt]cmd =0x46504c54, len=4
3,395,932 >>> mbox cmd response data (8 bytes)
3,396,045 UART: [rt] FIPS self test
3,396,373 UART: [kat] ++
3,396,525 UART: [kat] sha1
3,400,721 UART: [kat] SHA2-256
3,402,743 UART: [kat] SHA2-384
3,405,694 UART: Fatal Error: 0x90020002
3,407,233 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,238 >>> mbox cmd response: failed
3,407,238 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,407,243 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,766 UART: [state] LifecycleState = Unprovisioned
85,421 UART: [state] DebugLocked = No
85,933 UART: [state] WD Timer not started. Device not locked for debugging
87,174 UART: [kat] SHA2-256
892,824 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
896,949 UART: [kat] ++
897,101 UART: [kat] sha1
901,211 UART: [kat] SHA2-256
903,151 UART: [kat] SHA2-384
906,030 UART: [kat] SHA2-512-ACC
907,931 UART: [kat] ECC-384
917,328 UART: [kat] HMAC-384Kdf
921,898 UART: [kat] LMS
1,170,226 UART: [kat] --
1,170,999 UART: [cold-reset] ++
1,171,383 UART: [fht] FHT @ 0x50003400
1,173,986 UART: [idev] ++
1,174,154 UART: [idev] CDI.KEYID = 6
1,174,514 UART: [idev] SUBJECT.KEYID = 7
1,174,938 UART: [idev] UDS.KEYID = 0
1,175,283 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,182,532 UART: [idev] Erasing UDS.KEYID = 0
1,199,379 UART: [idev] Sha1 KeyId Algorithm
1,207,763 UART: [idev] --
1,208,659 UART: [ldev] ++
1,208,827 UART: [ldev] CDI.KEYID = 6
1,209,190 UART: [ldev] SUBJECT.KEYID = 5
1,209,616 UART: [ldev] AUTHORITY.KEYID = 7
1,210,079 UART: [ldev] FE.KEYID = 1
1,215,417 UART: [ldev] Erasing FE.KEYID = 1
1,240,968 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,609 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,325 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,216 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,928 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,797 UART: [ldev] --
1,280,110 UART: [fwproc] Wait for Commands...
1,280,682 UART: [fwproc] Recv command 0x46574c44
1,281,410 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,143 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,002 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,172 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,749 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.15s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,263 ready_for_fw is high
1,060,263 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,858 >>> mbox cmd response: success
2,752,387 UART:
2,752,403 UART: Running Caliptra FMC ...
2,752,811 UART:
2,752,865 UART: [state] CFI Enabled
2,763,277 UART: [fht] FMC Alias Private Key: 7
2,882,409 UART: [art] Extend RT PCRs Done
2,882,837 UART: [art] Lock RT PCRs Done
2,884,587 UART: [art] Populate DV Done
2,892,914 UART: [fht] FMC Alias Private Key: 7
2,894,012 UART: [art] Derive CDI
2,894,292 UART: [art] Store in slot 0x4
2,979,953 UART: [art] Derive Key Pair
2,980,313 UART: [art] Store priv key in slot 0x5
2,993,687 UART: [art] Derive Key Pair - Done
3,008,551 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,964 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,729 UART: [art] PUB.X = CA7136C0AE8118287BA8244B41E6E1CA0A01C1DF013F43D3B14A95919B10BA61B9DD095ADD9E77896CEE996ED245AE60
3,031,499 UART: [art] PUB.Y = 42AED85D832D82C6E216E8FAFD2C529DB6DC39F0A86580F3311EF0DAEC1E00D33B62FCF7F6EBEEBC48269BD5900A11F6
3,038,448 UART: [art] SIG.R = D39A672C5C20C9C2229810F0F1153B292B84C943359A3F2524601033AA9714530D9755D286E3C1A2499C42DAD48C5580
3,045,203 UART: [art] SIG.S = 8E615298F581F842B076FADC89ED850A4E7B6C633EF778BAD8EA386DB32BF075C87F3B19285EF8A4253F4E2042EE1B4B
3,068,492 UART: Caliptra RT
3,068,743 UART: [state] CFI Enabled
3,188,069 UART: [rt] RT listening for mailbox commands...
3,188,732 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,371 UART: [rt]cmd =0x46504c54, len=4
3,219,399 >>> mbox cmd response data (8 bytes)
3,219,666 UART: [rt] FIPS self test
3,219,994 UART: [kat] ++
3,220,146 UART: [kat] sha1
3,224,606 UART: [kat] SHA2-256
3,226,628 UART: [kat] SHA2-384
3,229,417 UART: Fatal Error: 0x90020002
3,230,956 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,961 >>> mbox cmd response: failed
3,230,961 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,230,966 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,741 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,690,530 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,547 UART: [state] LifecycleState = Unprovisioned
86,202 UART: [state] DebugLocked = No
86,758 UART: [state] WD Timer not started. Device not locked for debugging
87,923 UART: [kat] SHA2-256
893,573 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,698 UART: [kat] ++
897,850 UART: [kat] sha1
902,250 UART: [kat] SHA2-256
904,190 UART: [kat] SHA2-384
907,005 UART: [kat] SHA2-512-ACC
908,906 UART: [kat] ECC-384
918,549 UART: [kat] HMAC-384Kdf
923,143 UART: [kat] LMS
1,171,471 UART: [kat] --
1,172,408 UART: [cold-reset] ++
1,172,892 UART: [fht] FHT @ 0x50003400
1,175,321 UART: [idev] ++
1,175,489 UART: [idev] CDI.KEYID = 6
1,175,849 UART: [idev] SUBJECT.KEYID = 7
1,176,273 UART: [idev] UDS.KEYID = 0
1,176,618 ready_for_fw is high
1,176,618 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,369 UART: [idev] Erasing UDS.KEYID = 0
1,201,826 UART: [idev] Sha1 KeyId Algorithm
1,210,098 UART: [idev] --
1,210,990 UART: [ldev] ++
1,211,158 UART: [ldev] CDI.KEYID = 6
1,211,521 UART: [ldev] SUBJECT.KEYID = 5
1,211,947 UART: [ldev] AUTHORITY.KEYID = 7
1,212,410 UART: [ldev] FE.KEYID = 1
1,217,702 UART: [ldev] Erasing FE.KEYID = 1
1,243,731 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,546 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,262 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,153 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,865 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,924 UART: [ldev] --
1,283,327 UART: [fwproc] Wait for Commands...
1,284,015 UART: [fwproc] Recv command 0x46574c44
1,284,743 UART: [fwproc] Recv'd Img size: 119428 bytes
2,639,652 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,666,965 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,135 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,624 >>> mbox cmd response: success
2,840,720 UART: [afmc] ++
2,840,888 UART: [afmc] CDI.KEYID = 6
2,841,250 UART: [afmc] SUBJECT.KEYID = 7
2,841,675 UART: [afmc] AUTHORITY.KEYID = 5
2,876,844 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,541 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,289 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,998 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,881 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,582 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,588 UART: [afmc] --
2,920,610 UART: [cold-reset] --
2,921,352 UART: [state] Locking Datavault
2,922,617 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,221 UART: [state] Locking ICCM
2,923,647 UART: [exit] Launching FMC @ 0x40000130
2,928,977 UART:
2,928,993 UART: Running Caliptra FMC ...
2,929,401 UART:
2,929,544 UART: [state] CFI Enabled
2,940,336 UART: [fht] FMC Alias Private Key: 7
3,059,440 UART: [art] Extend RT PCRs Done
3,059,868 UART: [art] Lock RT PCRs Done
3,061,494 UART: [art] Populate DV Done
3,069,623 UART: [fht] FMC Alias Private Key: 7
3,070,787 UART: [art] Derive CDI
3,071,067 UART: [art] Store in slot 0x4
3,157,184 UART: [art] Derive Key Pair
3,157,544 UART: [art] Store priv key in slot 0x5
3,170,970 UART: [art] Derive Key Pair - Done
3,185,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,849 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,614 UART: [art] PUB.X = 582CD2EBA8363ED132870842EE95047D2F9D809E76BF71C7FC1D6E66760AA0301A7C889004CD791BEC3A351F0C65EC8D
3,208,377 UART: [art] PUB.Y = 5CA7FF7BBC717FBE3B96C9A76BE5357EBC75F011F88754EB9D41607C14B2F4DDD683A7BD6F6C4468344EA8A8DD3C2918
3,215,345 UART: [art] SIG.R = DC95BBCBBB2449174E7DD92F5A067108C36E1A0519F0E289EFDF8F1EBD213E70F2FDAFF0F6AE037FC857AF4C72DDE101
3,222,126 UART: [art] SIG.S = D0246DB0FE24009EA41B108203918AEF26B0667CB773889CCB253A6E6F2902EA3E8C614047AA868FEBAE9B3A648998AA
3,246,480 UART: Caliptra RT
3,246,823 UART: [state] CFI Enabled
3,367,415 UART: [rt] RT listening for mailbox commands...
3,368,078 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,398,141 UART: [rt]cmd =0x46504c54, len=4
3,399,231 >>> mbox cmd response data (8 bytes)
3,399,344 UART: [rt] FIPS self test
3,399,672 UART: [kat] ++
3,399,824 UART: [kat] sha1
3,403,920 UART: [kat] SHA2-256
3,405,942 UART: [kat] SHA2-384
3,408,467 UART: Fatal Error: 0x90020002
3,410,006 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,011 >>> mbox cmd response: failed
3,410,011 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,410,016 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,607 UART: [state] LifecycleState = Unprovisioned
86,262 UART: [state] DebugLocked = No
86,968 UART: [state] WD Timer not started. Device not locked for debugging
88,243 UART: [kat] SHA2-256
893,893 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,018 UART: [kat] ++
898,170 UART: [kat] sha1
902,484 UART: [kat] SHA2-256
904,424 UART: [kat] SHA2-384
907,245 UART: [kat] SHA2-512-ACC
909,146 UART: [kat] ECC-384
918,797 UART: [kat] HMAC-384Kdf
923,507 UART: [kat] LMS
1,171,835 UART: [kat] --
1,172,744 UART: [cold-reset] ++
1,173,268 UART: [fht] FHT @ 0x50003400
1,175,869 UART: [idev] ++
1,176,037 UART: [idev] CDI.KEYID = 6
1,176,397 UART: [idev] SUBJECT.KEYID = 7
1,176,821 UART: [idev] UDS.KEYID = 0
1,177,166 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,985 UART: [idev] Erasing UDS.KEYID = 0
1,201,886 UART: [idev] Sha1 KeyId Algorithm
1,210,548 UART: [idev] --
1,211,556 UART: [ldev] ++
1,211,724 UART: [ldev] CDI.KEYID = 6
1,212,087 UART: [ldev] SUBJECT.KEYID = 5
1,212,513 UART: [ldev] AUTHORITY.KEYID = 7
1,212,976 UART: [ldev] FE.KEYID = 1
1,218,106 UART: [ldev] Erasing FE.KEYID = 1
1,245,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,530 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,246 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,137 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,849 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,283,002 UART: [ldev] --
1,284,335 UART: [fwproc] Wait for Commands...
1,285,127 UART: [fwproc] Recv command 0x46574c44
1,285,855 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,028 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,015 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,185 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,839,830 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,434 ready_for_fw is high
1,060,434 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,323 >>> mbox cmd response: success
2,752,248 UART:
2,752,264 UART: Running Caliptra FMC ...
2,752,672 UART:
2,752,815 UART: [state] CFI Enabled
2,763,225 UART: [fht] FMC Alias Private Key: 7
2,883,025 UART: [art] Extend RT PCRs Done
2,883,453 UART: [art] Lock RT PCRs Done
2,885,321 UART: [art] Populate DV Done
2,893,486 UART: [fht] FMC Alias Private Key: 7
2,894,598 UART: [art] Derive CDI
2,894,878 UART: [art] Store in slot 0x4
2,980,635 UART: [art] Derive Key Pair
2,980,995 UART: [art] Store priv key in slot 0x5
2,994,413 UART: [art] Derive Key Pair - Done
3,009,387 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,874 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,639 UART: [art] PUB.X = 7912583B21DF9E275B82B3B434471A807EFE8E5C85928AA3FFEDF57F1561E29816153EF97DEE6AE88D48C54EE88FA1C9
3,032,419 UART: [art] PUB.Y = 9F8BA966B7967CCBFFF1FE1EA45A7F5ADCF09FE6B14D8D7E7C9FCF4DBB85FD26C82CF8FD9B51F2B504D467380C675039
3,039,391 UART: [art] SIG.R = 886C0C1D255E2452C8048326DA00720D1C55D87A6DD8B3FF702BABFE837509FF322E622A3E4B70B56C2A9541B3242868
3,046,127 UART: [art] SIG.S = E4173868448C27112FB8691C2D900E2272C71DFAE2BAD20EBC9B38D43D32C12A93F98DC272E9F5DC3BDCD4CA8D92A474
3,069,933 UART: Caliptra RT
3,070,276 UART: [state] CFI Enabled
3,190,102 UART: [rt] RT listening for mailbox commands...
3,190,765 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,592 UART: [rt]cmd =0x46504c54, len=4
3,221,584 >>> mbox cmd response data (8 bytes)
3,221,907 UART: [rt] FIPS self test
3,222,235 UART: [kat] ++
3,222,387 UART: [kat] sha1
3,226,697 UART: [kat] SHA2-256
3,228,719 UART: [kat] SHA2-384
3,231,340 UART: Fatal Error: 0x90020002
3,232,879 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,884 >>> mbox cmd response: failed
3,232,884 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,232,889 >>> mbox cmd response: failed
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,164 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,694,135 >>> mbox cmd response: success
test self_tests::kat_sha384_digest_mismatch_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.10s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,902 writing to cptra_bootfsm_go
192,134 UART:
192,526 UART: Running Caliptra ROM ...
193,681 UART:
193,833 UART: [state] CFI Enabled
263,229 UART: [state] LifecycleState = Unprovisioned
265,186 UART: [state] DebugLocked = No
267,810 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,547 UART: [kat] SHA2-256
442,230 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,737 UART: [kat] ++
453,216 UART: [kat] sha1
464,414 UART: [kat] SHA2-256
467,095 UART: [kat] SHA2-384
472,806 UART: [kat] SHA2-512-ACC
475,153 UART: [kat] ECC-384
2,765,690 UART: [kat] HMAC-384Kdf
2,798,465 UART: [kat] LMS
3,988,800 UART: [kat] --
3,992,271 UART: [cold-reset] ++
3,993,402 UART: [fht] Storing FHT @ 0x50003400
4,003,479 UART: [idev] ++
4,004,070 UART: [idev] CDI.KEYID = 6
4,004,964 UART: [idev] SUBJECT.KEYID = 7
4,006,242 UART: [idev] UDS.KEYID = 0
4,007,332 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,034,023 UART: [idev] Erasing UDS.KEYID = 0
7,344,410 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,899 UART: [idev] --
7,370,764 UART: [ldev] ++
7,371,374 UART: [ldev] CDI.KEYID = 6
7,372,303 UART: [ldev] SUBJECT.KEYID = 5
7,373,523 UART: [ldev] AUTHORITY.KEYID = 7
7,374,758 UART: [ldev] FE.KEYID = 1
7,422,022 UART: [ldev] Erasing FE.KEYID = 1
10,752,802 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,264 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,060,852 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,664 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,175 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,787 UART: [ldev] --
13,113,940 UART: [fwproc] Waiting for Commands...
13,116,042 UART: [fwproc] Received command 0x46505652
13,118,447 UART: [rt] FIPS Version
13,120,094 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
3,781,124 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,799,456 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.64s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,554 UART:
192,903 UART: Running Caliptra ROM ...
194,060 UART:
603,899 UART: [state] CFI Enabled
615,300 UART: [state] LifecycleState = Unprovisioned
617,221 UART: [state] DebugLocked = No
619,525 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
623,675 UART: [kat] SHA2-256
793,417 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
803,956 UART: [kat] ++
804,550 UART: [kat] sha1
815,114 UART: [kat] SHA2-256
817,796 UART: [kat] SHA2-384
822,970 UART: [kat] SHA2-512-ACC
825,319 UART: [kat] ECC-384
3,111,582 UART: [kat] HMAC-384Kdf
3,123,949 UART: [kat] LMS
4,314,040 UART: [kat] --
4,317,658 UART: [cold-reset] ++
4,320,181 UART: [fht] Storing FHT @ 0x50003400
4,331,080 UART: [idev] ++
4,331,660 UART: [idev] CDI.KEYID = 6
4,332,607 UART: [idev] SUBJECT.KEYID = 7
4,333,825 UART: [idev] UDS.KEYID = 0
4,334,879 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,351,449 UART: [idev] Erasing UDS.KEYID = 0
7,623,014 UART: [idev] Using Sha1 for KeyId Algorithm
7,643,806 UART: [idev] --
7,647,000 UART: [ldev] ++
7,647,581 UART: [ldev] CDI.KEYID = 6
7,648,524 UART: [ldev] SUBJECT.KEYID = 5
7,649,744 UART: [ldev] AUTHORITY.KEYID = 7
7,651,060 UART: [ldev] FE.KEYID = 1
7,662,615 UART: [ldev] Erasing FE.KEYID = 1
10,954,447 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,245,062 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,668 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,274,484 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,996 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,697 UART: [ldev] --
13,311,266 UART: [fwproc] Waiting for Commands...
13,313,154 UART: [fwproc] Received command 0x46505652
13,315,567 UART: [rt] FIPS Version
13,317,172 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,185 writing to cptra_bootfsm_go
4,125,006 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,037,975 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.66s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,051 writing to cptra_bootfsm_go
192,293 UART:
192,665 UART: Running Caliptra ROM ...
193,748 UART:
193,918 UART: [state] CFI Enabled
263,733 UART: [state] LifecycleState = Unprovisioned
265,687 UART: [state] DebugLocked = No
267,673 UART: [state] WD Timer not started. Device not locked for debugging
270,630 UART: [kat] SHA2-256
450,316 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
461,069 UART: [kat] ++
461,535 UART: [kat] sha1
472,196 UART: [kat] SHA2-256
474,891 UART: [kat] SHA2-384
481,639 UART: [kat] SHA2-512-ACC
483,984 UART: [kat] ECC-384
2,947,155 UART: [kat] HMAC-384Kdf
2,969,658 UART: [kat] LMS
3,446,193 UART: [kat] --
3,451,755 UART: [cold-reset] ++
3,454,086 UART: [fht] FHT @ 0x50003400
3,465,878 UART: [idev] ++
3,466,490 UART: [idev] CDI.KEYID = 6
3,467,410 UART: [idev] SUBJECT.KEYID = 7
3,468,632 UART: [idev] UDS.KEYID = 0
3,469,736 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,499,912 UART: [idev] Erasing UDS.KEYID = 0
5,982,673 UART: [idev] Sha1 KeyId Algorithm
6,006,679 UART: [idev] --
6,011,339 UART: [ldev] ++
6,011,919 UART: [ldev] CDI.KEYID = 6
6,012,891 UART: [ldev] SUBJECT.KEYID = 5
6,014,060 UART: [ldev] AUTHORITY.KEYID = 7
6,015,305 UART: [ldev] FE.KEYID = 1
6,055,677 UART: [ldev] Erasing FE.KEYID = 1
8,565,784 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,033 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,877 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,719 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,590 UART: [ldev] --
10,371,323 UART: [fwproc] Wait for Commands...
10,372,990 UART: [fwproc] Recv command 0x46505652
10,375,261 UART: [rt] FIPS Version
10,376,771 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,162 writing to cptra_bootfsm_go
3,460,555 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,290,214 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,380 writing to cptra_bootfsm_go
192,673 UART:
193,038 UART: Running Caliptra ROM ...
194,216 UART:
603,791 UART: [state] CFI Enabled
616,768 UART: [state] LifecycleState = Unprovisioned
618,643 UART: [state] DebugLocked = No
621,107 UART: [state] WD Timer not started. Device not locked for debugging
625,573 UART: [kat] SHA2-256
805,213 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,043 UART: [kat] ++
816,589 UART: [kat] sha1
827,262 UART: [kat] SHA2-256
829,962 UART: [kat] SHA2-384
835,516 UART: [kat] SHA2-512-ACC
837,913 UART: [kat] ECC-384
3,278,140 UART: [kat] HMAC-384Kdf
3,290,871 UART: [kat] LMS
3,767,378 UART: [kat] --
3,773,318 UART: [cold-reset] ++
3,774,987 UART: [fht] FHT @ 0x50003400
3,786,859 UART: [idev] ++
3,787,439 UART: [idev] CDI.KEYID = 6
3,788,358 UART: [idev] SUBJECT.KEYID = 7
3,789,634 UART: [idev] UDS.KEYID = 0
3,790,637 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,807,911 UART: [idev] Erasing UDS.KEYID = 0
6,266,301 UART: [idev] Sha1 KeyId Algorithm
6,290,303 UART: [idev] --
6,295,363 UART: [ldev] ++
6,296,003 UART: [ldev] CDI.KEYID = 6
6,296,932 UART: [ldev] SUBJECT.KEYID = 5
6,298,104 UART: [ldev] AUTHORITY.KEYID = 7
6,299,340 UART: [ldev] FE.KEYID = 1
6,310,856 UART: [ldev] Erasing FE.KEYID = 1
8,789,763 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,735 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,496 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,559,049 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,824 UART: [ldev] --
10,588,069 UART: [fwproc] Wait for Commands...
10,589,961 UART: [fwproc] Recv command 0x46505652
10,592,177 UART: [rt] FIPS Version
10,593,758 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,869 writing to cptra_bootfsm_go
3,779,570 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,492,525 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,977 writing to cptra_bootfsm_go
192,219 UART:
192,633 UART: Running Caliptra ROM ...
193,803 UART:
193,965 UART: [state] CFI Enabled
264,719 UART: [state] LifecycleState = Unprovisioned
266,832 UART: [state] DebugLocked = No
268,969 UART: [state] WD Timer not started. Device not locked for debugging
273,322 UART: [kat] SHA2-256
463,184 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,922 UART: [kat] ++
474,412 UART: [kat] sha1
484,867 UART: [kat] SHA2-256
487,880 UART: [kat] SHA2-384
494,409 UART: [kat] SHA2-512-ACC
496,995 UART: [kat] ECC-384
2,946,602 UART: [kat] HMAC-384Kdf
2,969,054 UART: [kat] LMS
3,500,812 UART: [kat] --
3,504,646 UART: [cold-reset] ++
3,505,833 UART: [fht] FHT @ 0x50003400
3,517,628 UART: [idev] ++
3,518,315 UART: [idev] CDI.KEYID = 6
3,519,279 UART: [idev] SUBJECT.KEYID = 7
3,520,497 UART: [idev] UDS.KEYID = 0
3,521,781 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,540,676 UART: [idev] Erasing UDS.KEYID = 0
6,024,626 UART: [idev] Sha1 KeyId Algorithm
6,046,894 UART: [idev] --
6,051,112 UART: [ldev] ++
6,051,806 UART: [ldev] CDI.KEYID = 6
6,052,726 UART: [ldev] SUBJECT.KEYID = 5
6,053,913 UART: [ldev] AUTHORITY.KEYID = 7
6,055,101 UART: [ldev] FE.KEYID = 1
6,096,056 UART: [ldev] Erasing FE.KEYID = 1
8,602,789 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,337,432 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,352,666 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,367,798 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,382,918 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,404,469 UART: [ldev] --
10,410,724 UART: [fwproc] Wait for Commands...
10,412,371 UART: [fwproc] Recv command 0x46505652
10,414,879 UART: [rt] FIPS Version
10,416,615 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,893 writing to cptra_bootfsm_go
3,440,439 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,247,571 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,159 writing to cptra_bootfsm_go
192,473 UART:
192,826 UART: Running Caliptra ROM ...
193,989 UART:
603,862 UART: [state] CFI Enabled
614,809 UART: [state] LifecycleState = Unprovisioned
617,165 UART: [state] DebugLocked = No
618,549 UART: [state] WD Timer not started. Device not locked for debugging
623,526 UART: [kat] SHA2-256
813,438 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
824,195 UART: [kat] ++
824,783 UART: [kat] sha1
835,614 UART: [kat] SHA2-256
838,669 UART: [kat] SHA2-384
844,811 UART: [kat] SHA2-512-ACC
847,372 UART: [kat] ECC-384
3,289,019 UART: [kat] HMAC-384Kdf
3,301,497 UART: [kat] LMS
3,833,334 UART: [kat] --
3,838,808 UART: [cold-reset] ++
3,840,027 UART: [fht] FHT @ 0x50003400
3,851,841 UART: [idev] ++
3,852,533 UART: [idev] CDI.KEYID = 6
3,853,560 UART: [idev] SUBJECT.KEYID = 7
3,854,690 UART: [idev] UDS.KEYID = 0
3,855,696 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,870,193 UART: [idev] Erasing UDS.KEYID = 0
6,325,528 UART: [idev] Sha1 KeyId Algorithm
6,346,942 UART: [idev] --
6,351,646 UART: [ldev] ++
6,352,333 UART: [ldev] CDI.KEYID = 6
6,353,248 UART: [ldev] SUBJECT.KEYID = 5
6,354,465 UART: [ldev] AUTHORITY.KEYID = 7
6,355,643 UART: [ldev] FE.KEYID = 1
6,366,676 UART: [ldev] Erasing FE.KEYID = 1
8,843,448 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,565,163 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,580,337 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,595,568 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,610,692 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,630,849 UART: [ldev] --
10,636,122 UART: [fwproc] Wait for Commands...
10,638,759 UART: [fwproc] Recv command 0x46505652
10,641,355 UART: [rt] FIPS Version
10,643,031 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.54s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,191 writing to cptra_bootfsm_go
3,758,982 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,470,210 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,848 UART: [state] LifecycleState = Unprovisioned
85,503 UART: [state] DebugLocked = No
86,221 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,839 UART: [kat] SHA2-256
881,770 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,885 UART: [kat] ++
886,037 UART: [kat] sha1
890,097 UART: [kat] SHA2-256
892,035 UART: [kat] SHA2-384
894,838 UART: [kat] SHA2-512-ACC
896,739 UART: [kat] ECC-384
902,098 UART: [kat] HMAC-384Kdf
906,714 UART: [kat] LMS
1,474,910 UART: [kat] --
1,475,643 UART: [cold-reset] ++
1,476,107 UART: [fht] Storing FHT @ 0x50003400
1,478,908 UART: [idev] ++
1,479,076 UART: [idev] CDI.KEYID = 6
1,479,436 UART: [idev] SUBJECT.KEYID = 7
1,479,860 UART: [idev] UDS.KEYID = 0
1,480,205 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,487,372 UART: [idev] Erasing UDS.KEYID = 0
1,503,890 UART: [idev] Using Sha1 for KeyId Algorithm
1,512,742 UART: [idev] --
1,513,937 UART: [ldev] ++
1,514,105 UART: [ldev] CDI.KEYID = 6
1,514,468 UART: [ldev] SUBJECT.KEYID = 5
1,514,894 UART: [ldev] AUTHORITY.KEYID = 7
1,515,357 UART: [ldev] FE.KEYID = 1
1,520,359 UART: [ldev] Erasing FE.KEYID = 1
1,546,026 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,293 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,009 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,900 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,612 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,538 UART: [ldev] --
1,585,023 UART: [fwproc] Waiting for Commands...
1,585,838 UART: [fwproc] Received command 0x46505652
1,586,720 UART: [rt] FIPS Version
1,587,273 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.59s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,363 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,246 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,999 UART: [state] LifecycleState = Unprovisioned
86,654 UART: [state] DebugLocked = No
87,222 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,906 UART: [kat] SHA2-256
882,837 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,952 UART: [kat] ++
887,104 UART: [kat] sha1
891,220 UART: [kat] SHA2-256
893,158 UART: [kat] SHA2-384
896,007 UART: [kat] SHA2-512-ACC
897,908 UART: [kat] ECC-384
903,547 UART: [kat] HMAC-384Kdf
908,085 UART: [kat] LMS
1,476,281 UART: [kat] --
1,477,298 UART: [cold-reset] ++
1,477,820 UART: [fht] Storing FHT @ 0x50003400
1,480,777 UART: [idev] ++
1,480,945 UART: [idev] CDI.KEYID = 6
1,481,305 UART: [idev] SUBJECT.KEYID = 7
1,481,729 UART: [idev] UDS.KEYID = 0
1,482,074 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,843 UART: [idev] Erasing UDS.KEYID = 0
1,506,809 UART: [idev] Using Sha1 for KeyId Algorithm
1,515,507 UART: [idev] --
1,516,674 UART: [ldev] ++
1,516,842 UART: [ldev] CDI.KEYID = 6
1,517,205 UART: [ldev] SUBJECT.KEYID = 5
1,517,631 UART: [ldev] AUTHORITY.KEYID = 7
1,518,094 UART: [ldev] FE.KEYID = 1
1,523,244 UART: [ldev] Erasing FE.KEYID = 1
1,549,083 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,668 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,568,384 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,574,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,987 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,587,159 UART: [ldev] --
1,588,668 UART: [fwproc] Waiting for Commands...
1,589,361 UART: [fwproc] Received command 0x46505652
1,590,243 UART: [rt] FIPS Version
1,590,796 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,574 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,442,881 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,954 UART: [state] LifecycleState = Unprovisioned
85,609 UART: [state] DebugLocked = No
86,193 UART: [state] WD Timer not started. Device not locked for debugging
87,378 UART: [kat] SHA2-256
890,928 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,032 UART: [kat] ++
895,184 UART: [kat] sha1
899,432 UART: [kat] SHA2-256
901,372 UART: [kat] SHA2-384
904,233 UART: [kat] SHA2-512-ACC
906,134 UART: [kat] ECC-384
916,007 UART: [kat] HMAC-384Kdf
920,507 UART: [kat] LMS
1,168,819 UART: [kat] --
1,169,542 UART: [cold-reset] ++
1,170,016 UART: [fht] FHT @ 0x50003400
1,172,720 UART: [idev] ++
1,172,888 UART: [idev] CDI.KEYID = 6
1,173,249 UART: [idev] SUBJECT.KEYID = 7
1,173,674 UART: [idev] UDS.KEYID = 0
1,174,020 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,675 UART: [idev] Erasing UDS.KEYID = 0
1,198,927 UART: [idev] Sha1 KeyId Algorithm
1,207,747 UART: [idev] --
1,208,836 UART: [ldev] ++
1,209,004 UART: [ldev] CDI.KEYID = 6
1,209,368 UART: [ldev] SUBJECT.KEYID = 5
1,209,795 UART: [ldev] AUTHORITY.KEYID = 7
1,210,258 UART: [ldev] FE.KEYID = 1
1,215,094 UART: [ldev] Erasing FE.KEYID = 1
1,241,399 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,485 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,201 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,090 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,802 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,756 UART: [ldev] --
1,280,095 UART: [fwproc] Wait for Commands...
1,280,794 UART: [fwproc] Recv command 0x46505652
1,281,618 UART: [rt] FIPS Version
1,282,178 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,622 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,585 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.47s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,187 UART: [state] LifecycleState = Unprovisioned
85,842 UART: [state] DebugLocked = No
86,416 UART: [state] WD Timer not started. Device not locked for debugging
87,537 UART: [kat] SHA2-256
891,087 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,191 UART: [kat] ++
895,343 UART: [kat] sha1
899,635 UART: [kat] SHA2-256
901,575 UART: [kat] SHA2-384
904,082 UART: [kat] SHA2-512-ACC
905,983 UART: [kat] ECC-384
915,472 UART: [kat] HMAC-384Kdf
920,102 UART: [kat] LMS
1,168,414 UART: [kat] --
1,169,329 UART: [cold-reset] ++
1,169,833 UART: [fht] FHT @ 0x50003400
1,172,523 UART: [idev] ++
1,172,691 UART: [idev] CDI.KEYID = 6
1,173,052 UART: [idev] SUBJECT.KEYID = 7
1,173,477 UART: [idev] UDS.KEYID = 0
1,173,823 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,120 UART: [idev] Erasing UDS.KEYID = 0
1,198,710 UART: [idev] Sha1 KeyId Algorithm
1,207,700 UART: [idev] --
1,208,767 UART: [ldev] ++
1,208,935 UART: [ldev] CDI.KEYID = 6
1,209,299 UART: [ldev] SUBJECT.KEYID = 5
1,209,726 UART: [ldev] AUTHORITY.KEYID = 7
1,210,189 UART: [ldev] FE.KEYID = 1
1,215,419 UART: [ldev] Erasing FE.KEYID = 1
1,241,634 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,188 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,904 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,793 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,505 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,681 UART: [ldev] --
1,281,116 UART: [fwproc] Wait for Commands...
1,281,795 UART: [fwproc] Recv command 0x46505652
1,282,619 UART: [rt] FIPS Version
1,283,179 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.50s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,045 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,600 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,348 UART: [state] LifecycleState = Unprovisioned
86,003 UART: [state] DebugLocked = No
86,503 UART: [state] WD Timer not started. Device not locked for debugging
87,808 UART: [kat] SHA2-256
893,458 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,583 UART: [kat] ++
897,735 UART: [kat] sha1
901,973 UART: [kat] SHA2-256
903,913 UART: [kat] SHA2-384
906,546 UART: [kat] SHA2-512-ACC
908,447 UART: [kat] ECC-384
918,458 UART: [kat] HMAC-384Kdf
923,016 UART: [kat] LMS
1,171,344 UART: [kat] --
1,172,181 UART: [cold-reset] ++
1,172,583 UART: [fht] FHT @ 0x50003400
1,175,154 UART: [idev] ++
1,175,322 UART: [idev] CDI.KEYID = 6
1,175,682 UART: [idev] SUBJECT.KEYID = 7
1,176,106 UART: [idev] UDS.KEYID = 0
1,176,451 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,812 UART: [idev] Erasing UDS.KEYID = 0
1,201,065 UART: [idev] Sha1 KeyId Algorithm
1,209,555 UART: [idev] --
1,210,697 UART: [ldev] ++
1,210,865 UART: [ldev] CDI.KEYID = 6
1,211,228 UART: [ldev] SUBJECT.KEYID = 5
1,211,654 UART: [ldev] AUTHORITY.KEYID = 7
1,212,117 UART: [ldev] FE.KEYID = 1
1,217,129 UART: [ldev] Erasing FE.KEYID = 1
1,244,112 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,619 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,335 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,226 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,938 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,011 UART: [ldev] --
1,283,472 UART: [fwproc] Wait for Commands...
1,284,154 UART: [fwproc] Recv command 0x46505652
1,284,975 UART: [rt] FIPS Version
1,285,529 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,629 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,121 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,559 UART: [state] LifecycleState = Unprovisioned
86,214 UART: [state] DebugLocked = No
86,802 UART: [state] WD Timer not started. Device not locked for debugging
88,117 UART: [kat] SHA2-256
893,767 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,892 UART: [kat] ++
898,044 UART: [kat] sha1
902,314 UART: [kat] SHA2-256
904,254 UART: [kat] SHA2-384
906,975 UART: [kat] SHA2-512-ACC
908,876 UART: [kat] ECC-384
918,773 UART: [kat] HMAC-384Kdf
923,439 UART: [kat] LMS
1,171,767 UART: [kat] --
1,172,628 UART: [cold-reset] ++
1,172,994 UART: [fht] FHT @ 0x50003400
1,175,549 UART: [idev] ++
1,175,717 UART: [idev] CDI.KEYID = 6
1,176,077 UART: [idev] SUBJECT.KEYID = 7
1,176,501 UART: [idev] UDS.KEYID = 0
1,176,846 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,385 UART: [idev] Erasing UDS.KEYID = 0
1,201,714 UART: [idev] Sha1 KeyId Algorithm
1,210,196 UART: [idev] --
1,211,182 UART: [ldev] ++
1,211,350 UART: [ldev] CDI.KEYID = 6
1,211,713 UART: [ldev] SUBJECT.KEYID = 5
1,212,139 UART: [ldev] AUTHORITY.KEYID = 7
1,212,602 UART: [ldev] FE.KEYID = 1
1,217,694 UART: [ldev] Erasing FE.KEYID = 1
1,243,899 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,578 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,294 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,185 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,897 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,984 UART: [ldev] --
1,283,373 UART: [fwproc] Wait for Commands...
1,284,137 UART: [fwproc] Recv command 0x46505652
1,284,958 UART: [rt] FIPS Version
1,285,512 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.45s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,778 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,822 >>> mbox cmd response data (36 bytes)
test services::check_version_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,033 writing to cptra_bootfsm_go
192,195 UART:
192,551 UART: Running Caliptra ROM ...
193,762 UART:
193,939 UART: [state] CFI Enabled
263,778 UART: [state] LifecycleState = Unprovisioned
265,692 UART: [state] DebugLocked = No
267,169 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,747 UART: [kat] SHA2-256
442,460 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,967 UART: [kat] ++
453,612 UART: [kat] sha1
463,582 UART: [kat] SHA2-256
466,319 UART: [kat] SHA2-384
471,046 UART: [kat] SHA2-512-ACC
473,428 UART: [kat] ECC-384
2,767,468 UART: [kat] HMAC-384Kdf
2,797,711 UART: [kat] LMS
3,988,007 UART: [kat] --
3,993,100 UART: [cold-reset] ++
3,994,565 UART: [fht] Storing FHT @ 0x50003400
4,005,769 UART: [idev] ++
4,006,340 UART: [idev] CDI.KEYID = 6
4,007,380 UART: [idev] SUBJECT.KEYID = 7
4,008,565 UART: [idev] UDS.KEYID = 0
4,009,654 ready_for_fw is high
4,009,886 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,158,968 UART: [idev] Erasing UDS.KEYID = 0
7,343,987 UART: [idev] Using Sha1 for KeyId Algorithm
7,365,744 UART: [idev] --
7,368,771 UART: [ldev] ++
7,369,341 UART: [ldev] CDI.KEYID = 6
7,370,310 UART: [ldev] SUBJECT.KEYID = 5
7,371,530 UART: [ldev] AUTHORITY.KEYID = 7
7,372,820 UART: [ldev] FE.KEYID = 1
7,400,741 UART: [ldev] Erasing FE.KEYID = 1
10,731,970 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,026,911 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,041,501 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,056,353 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,070,847 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,089,402 UART: [ldev] --
13,094,899 UART: [fwproc] Waiting for Commands...
13,096,836 UART: [fwproc] Received command 0x46574c44
13,099,038 UART: [fwproc] Received Image of size 118548 bytes
17,201,287 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,277,146 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,350,320 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,679,622 >>> mbox cmd response: success
17,680,162 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,683,871 UART: [afmc] ++
17,684,461 UART: [afmc] CDI.KEYID = 6
17,685,396 UART: [afmc] SUBJECT.KEYID = 7
17,686,619 UART: [afmc] AUTHORITY.KEYID = 5
21,050,007 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,352,056 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,354,332 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,368,755 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,383,481 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,397,937 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,419,799 UART: [afmc] --
23,424,302 UART: [cold-reset] --
23,428,984 UART: [state] Locking Datavault
23,433,543 UART: [state] Locking PCR0, PCR1 and PCR31
23,435,302 UART: [state] Locking ICCM
23,437,026 UART: [exit] Launching FMC @ 0x40000130
23,445,378 UART:
23,445,619 UART: Running Caliptra FMC ...
23,446,746 UART:
23,446,918 UART: [state] CFI Enabled
23,512,654 UART: [fht] FMC Alias Private Key: 7
25,852,951 UART: [art] Extend RT PCRs Done
25,854,171 UART: [art] Lock RT PCRs Done
25,855,550 UART: [art] Populate DV Done
25,860,802 UART: [fht] FMC Alias Private Key: 7
25,862,401 UART: [art] Derive CDI
25,863,144 UART: [art] Store in slot 0x4
25,920,754 UART: [art] Derive Key Pair
25,921,795 UART: [art] Store priv key in slot 0x5
29,214,815 UART: [art] Derive Key Pair - Done
29,227,599 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,516,774 UART: [art] Erasing AUTHORITY.KEYID = 7
31,518,719 UART: [art] PUB.X = 497BA42C48662401DB394455311ADB450002131A4AAB7977E22A1AC05E5F18628CC35CB35FF975308A9604A2DF46944A
31,525,541 UART: [art] PUB.Y = 057B8CAE8C1A7A036FB67D2E434445BA0EE65D8ED3B69B5FB02B0ABAE99613F52C6BEDBE5A07F6A3164E40A638CDCF20
31,532,798 UART: [art] SIG.R = 62B5A06B7ACE9679C885CACBC71FAE5DCA1BB1081BC99D9DB910870189AF314BEC183EC375092D4B5606BE1CBFFFAB0C
31,540,247 UART: [art] SIG.S = 3C6B9FCE91F4E20A41B8B7CD85264E5F9973FD9E56D2EA7DABBF9196258D95C00D2340EC446300724A396ED66BED3F6E
32,844,940 UART: Caliptra RT
32,845,674 UART: [state] CFI Enabled
33,025,404 UART: [rt] RT listening for mailbox commands...
33,056,551 UART: [rt]cmd =0x46505652, len=4
33,057,806 UART: [rt] FIPS Version
33,059,029 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,963 writing to cptra_bootfsm_go
3,805,847 ready_for_fw is high
3,806,336 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,988,345 >>> mbox cmd response: success
17,989,153 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,669,805 UART:
23,670,201 UART: Running Caliptra FMC ...
23,671,346 UART:
23,671,505 UART: [state] CFI Enabled
23,724,650 UART: [fht] FMC Alias Private Key: 7
26,064,827 UART: [art] Extend RT PCRs Done
26,066,061 UART: [art] Lock RT PCRs Done
26,067,811 UART: [art] Populate DV Done
26,073,124 UART: [fht] FMC Alias Private Key: 7
26,074,773 UART: [art] Derive CDI
26,075,615 UART: [art] Store in slot 0x4
26,133,076 UART: [art] Derive Key Pair
26,134,121 UART: [art] Store priv key in slot 0x5
29,427,597 UART: [art] Derive Key Pair - Done
29,440,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,729,634 UART: [art] Erasing AUTHORITY.KEYID = 7
31,731,157 UART: [art] PUB.X = 50EB6E3AEB18D9BACE9C6A549ED70BCC0DCBD58982F13E2E8C6963032E7AF1163FDE1CFF920B2F1ECE35BA5973C61262
31,738,408 UART: [art] PUB.Y = D6718A0A17EE320C503D4228DBD9B065306BE94EB20BE82DB828884CA8080BCB63F5AD010FD615564C48052CB660BE96
31,745,669 UART: [art] SIG.R = 6C04C787B1C440BD82DB526BDE032ECB382A0BB1FB9A0B83A1E005D2C8C9B9C1CD3139FD1E11AC046CBE3713EA79A722
31,753,063 UART: [art] SIG.S = 6A1A113C3079CE408ED4AAAF438B88BEB01FC932CA82FE054D3526CC34A3EDBB1C9ABBA7AEDE3577F767B6F295A18CFD
33,058,102 UART: Caliptra RT
33,058,823 UART: [state] CFI Enabled
33,236,623 UART: [rt] RT listening for mailbox commands...
33,268,043 UART: [rt]cmd =0x46505652, len=4
33,269,300 UART: [rt] FIPS Version
33,270,517 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,311 writing to cptra_bootfsm_go
192,488 UART:
192,867 UART: Running Caliptra ROM ...
194,003 UART:
603,757 UART: [state] CFI Enabled
616,026 UART: [state] LifecycleState = Unprovisioned
617,927 UART: [state] DebugLocked = No
619,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
624,999 UART: [kat] SHA2-256
794,694 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,271 UART: [kat] ++
805,754 UART: [kat] sha1
817,581 UART: [kat] SHA2-256
820,254 UART: [kat] SHA2-384
827,104 UART: [kat] SHA2-512-ACC
829,484 UART: [kat] ECC-384
3,112,551 UART: [kat] HMAC-384Kdf
3,124,285 UART: [kat] LMS
4,314,356 UART: [kat] --
4,320,107 UART: [cold-reset] ++
4,322,056 UART: [fht] Storing FHT @ 0x50003400
4,333,422 UART: [idev] ++
4,334,098 UART: [idev] CDI.KEYID = 6
4,335,195 UART: [idev] SUBJECT.KEYID = 7
4,336,309 UART: [idev] UDS.KEYID = 0
4,337,440 ready_for_fw is high
4,337,691 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,486,663 UART: [idev] Erasing UDS.KEYID = 0
7,625,963 UART: [idev] Using Sha1 for KeyId Algorithm
7,646,661 UART: [idev] --
7,649,853 UART: [ldev] ++
7,650,433 UART: [ldev] CDI.KEYID = 6
7,651,461 UART: [ldev] SUBJECT.KEYID = 5
7,652,625 UART: [ldev] AUTHORITY.KEYID = 7
7,653,861 UART: [ldev] FE.KEYID = 1
7,665,596 UART: [ldev] Erasing FE.KEYID = 1
10,951,823 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,487 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,259,072 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,875 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,427 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,021 UART: [ldev] --
13,310,164 UART: [fwproc] Waiting for Commands...
13,311,846 UART: [fwproc] Received command 0x46574c44
13,314,061 UART: [fwproc] Received Image of size 118548 bytes
17,414,156 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,486,019 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,559,198 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,887,432 >>> mbox cmd response: success
17,887,991 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,891,965 UART: [afmc] ++
17,892,553 UART: [afmc] CDI.KEYID = 6
17,893,475 UART: [afmc] SUBJECT.KEYID = 7
17,894,757 UART: [afmc] AUTHORITY.KEYID = 5
21,211,821 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,504,903 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,507,167 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,521,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,536,361 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,550,782 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,571,628 UART: [afmc] --
23,575,282 UART: [cold-reset] --
23,578,615 UART: [state] Locking Datavault
23,584,410 UART: [state] Locking PCR0, PCR1 and PCR31
23,586,118 UART: [state] Locking ICCM
23,588,763 UART: [exit] Launching FMC @ 0x40000130
23,597,169 UART:
23,597,414 UART: Running Caliptra FMC ...
23,598,527 UART:
23,598,697 UART: [state] CFI Enabled
23,607,056 UART: [fht] FMC Alias Private Key: 7
25,947,193 UART: [art] Extend RT PCRs Done
25,948,425 UART: [art] Lock RT PCRs Done
25,950,062 UART: [art] Populate DV Done
25,955,486 UART: [fht] FMC Alias Private Key: 7
25,957,041 UART: [art] Derive CDI
25,957,890 UART: [art] Store in slot 0x4
26,000,171 UART: [art] Derive Key Pair
26,001,183 UART: [art] Store priv key in slot 0x5
29,242,960 UART: [art] Derive Key Pair - Done
29,255,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,536,122 UART: [art] Erasing AUTHORITY.KEYID = 7
31,537,638 UART: [art] PUB.X = B32B802129FDC94A7AA319CF8D6A2A89C61459EFF0EBBEF5BCA95C539340FF621B7BB0347BFF5D2728CCA4D35722545A
31,544,882 UART: [art] PUB.Y = A6C28C35613F7C329EB686E1859A9A046172E4AB6BE6E57A46A41D35BDA7ACF6FBD05485E38255B5A1E9CEF9C908767D
31,552,164 UART: [art] SIG.R = 80F3B4CF76D75582AC96B22979609B26DE359F4B15B3BED992663EA8C6FD0117ABB30ECB13CC17946676B3537E876B9C
31,559,556 UART: [art] SIG.S = 880A38D6C08BEE14FE5A6C60FC97BD1CCCAC1CE0ADBE719A67428CC44A48DC9FF4ABF6D6CD445820FBC42D1FEDDCBE57
32,865,047 UART: Caliptra RT
32,865,765 UART: [state] CFI Enabled
32,999,368 UART: [rt] RT listening for mailbox commands...
33,030,358 UART: [rt]cmd =0x46505652, len=4
33,031,618 UART: [rt] FIPS Version
33,032,782 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,305 writing to cptra_bootfsm_go
4,126,841 ready_for_fw is high
4,127,261 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,143,664 >>> mbox cmd response: success
18,144,467 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,784,498 UART:
23,785,025 UART: Running Caliptra FMC ...
23,786,168 UART:
23,786,324 UART: [state] CFI Enabled
23,794,266 UART: [fht] FMC Alias Private Key: 7
26,133,848 UART: [art] Extend RT PCRs Done
26,135,085 UART: [art] Lock RT PCRs Done
26,136,799 UART: [art] Populate DV Done
26,142,345 UART: [fht] FMC Alias Private Key: 7
26,143,875 UART: [art] Derive CDI
26,144,620 UART: [art] Store in slot 0x4
26,187,078 UART: [art] Derive Key Pair
26,188,095 UART: [art] Store priv key in slot 0x5
29,430,152 UART: [art] Derive Key Pair - Done
29,442,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,723,483 UART: [art] Erasing AUTHORITY.KEYID = 7
31,725,002 UART: [art] PUB.X = 168EE86D0794B08A2BED9D06EBB8BDCED3513E54A3534CE0F6553AC815042051880AEF6968790E11073287DC8F645535
31,732,268 UART: [art] PUB.Y = A6BC8DF10926A0D902CAE571E1495F48C47C95E4884B11927B0F5A34C39050A7038E1ABB85AF917393194FCB2A708777
31,739,654 UART: [art] SIG.R = 5D4FE15F6D89C28A279F86045F1717C019BE3D7EF0E8171F097D5A369DF597BB4C0275CB923E8988BB4D22B110C42BFB
31,746,915 UART: [art] SIG.S = A86B4729655FD8B31EFE8F9997D1080A3F9BA77531DF1FDC94B7FC3B418784D82A2D54305F33D6D7D43A5EC65356EBF0
33,052,444 UART: Caliptra RT
33,053,160 UART: [state] CFI Enabled
33,186,179 UART: [rt] RT listening for mailbox commands...
33,217,606 UART: [rt]cmd =0x46505652, len=4
33,218,865 UART: [rt] FIPS Version
33,220,087 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,244 writing to cptra_bootfsm_go
192,566 UART:
192,928 UART: Running Caliptra ROM ...
194,146 UART:
194,302 UART: [state] CFI Enabled
265,158 UART: [state] LifecycleState = Unprovisioned
267,077 UART: [state] DebugLocked = No
269,270 UART: [state] WD Timer not started. Device not locked for debugging
274,030 UART: [kat] SHA2-256
453,622 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,431 UART: [kat] ++
464,939 UART: [kat] sha1
476,818 UART: [kat] SHA2-256
479,556 UART: [kat] SHA2-384
485,411 UART: [kat] SHA2-512-ACC
487,786 UART: [kat] ECC-384
2,946,493 UART: [kat] HMAC-384Kdf
2,972,461 UART: [kat] LMS
3,448,934 UART: [kat] --
3,452,534 UART: [cold-reset] ++
3,453,768 UART: [fht] FHT @ 0x50003400
3,464,258 UART: [idev] ++
3,464,831 UART: [idev] CDI.KEYID = 6
3,465,874 UART: [idev] SUBJECT.KEYID = 7
3,467,055 UART: [idev] UDS.KEYID = 0
3,467,990 ready_for_fw is high
3,468,190 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,617,292 UART: [idev] Erasing UDS.KEYID = 0
5,988,045 UART: [idev] Sha1 KeyId Algorithm
6,012,371 UART: [idev] --
6,017,669 UART: [ldev] ++
6,018,246 UART: [ldev] CDI.KEYID = 6
6,019,142 UART: [ldev] SUBJECT.KEYID = 5
6,020,363 UART: [ldev] AUTHORITY.KEYID = 7
6,021,661 UART: [ldev] FE.KEYID = 1
6,058,498 UART: [ldev] Erasing FE.KEYID = 1
8,562,808 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,301,475 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,317,387 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,333,242 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,369,879 UART: [ldev] --
10,375,047 UART: [fwproc] Wait for Commands...
10,377,707 UART: [fwproc] Recv command 0x46574c44
10,379,753 UART: [fwproc] Recv'd Img size: 118548 bytes
13,861,880 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,289 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,333 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,344,443 >>> mbox cmd response: success
14,344,993 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,348,562 UART: [afmc] ++
14,349,206 UART: [afmc] CDI.KEYID = 6
14,350,121 UART: [afmc] SUBJECT.KEYID = 7
14,351,339 UART: [afmc] AUTHORITY.KEYID = 5
16,890,172 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,617,021 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,619,230 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,635,031 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,651,082 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,666,667 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,691,422 UART: [afmc] --
18,694,907 UART: [cold-reset] --
18,698,468 UART: [state] Locking Datavault
18,703,865 UART: [state] Locking PCR0, PCR1 and PCR31
18,705,632 UART: [state] Locking ICCM
18,706,813 UART: [exit] Launching FMC @ 0x40000130
18,715,213 UART:
18,715,455 UART: Running Caliptra FMC ...
18,716,562 UART:
18,716,739 UART: [state] CFI Enabled
18,772,811 UART: [fht] FMC Alias Private Key: 7
20,559,881 UART: [art] Extend RT PCRs Done
20,561,102 UART: [art] Lock RT PCRs Done
20,562,813 UART: [art] Populate DV Done
20,568,121 UART: [fht] FMC Alias Private Key: 7
20,569,626 UART: [art] Derive CDI
20,570,392 UART: [art] Store in slot 0x4
20,625,618 UART: [art] Derive Key Pair
20,626,662 UART: [art] Store priv key in slot 0x5
23,088,811 UART: [art] Derive Key Pair - Done
23,101,691 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,814,626 UART: [art] Erasing AUTHORITY.KEYID = 7
24,816,133 UART: [art] PUB.X = 9F6A23F1B4131D8E5FC99704892B195C9FC76A9BD5C1AD9851632630885592618509B7BAFB18A42E143D63D10948B333
24,823,398 UART: [art] PUB.Y = 5616D249DB9E3424A5C1EB923FBE763AAFF1551BB7F7EC1CA70502B4A056652F194F32B4632C53A7AAC22F50260E341F
24,830,635 UART: [art] SIG.R = 26AEB5641AFEFCEFE13EBFCC0508D7C7B5110B8E42FC5ADDAD07F3D0E73A3259FA712CC88BAE907C6A5CE01CF6CAE72F
24,838,088 UART: [art] SIG.S = 8D624361AEF3FF8283156514CE5F741111715B845D12733BAA8B515C3281B3ACCFEA57D143E5ED462E8C44B9995A6C12
25,817,147 UART: Caliptra RT
25,817,997 UART: [state] CFI Enabled
25,997,706 UART: [rt] RT listening for mailbox commands...
26,029,141 UART: [rt]cmd =0x46505652, len=4
26,030,401 UART: [rt] FIPS Version
26,031,480 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,011 writing to cptra_bootfsm_go
3,463,384 ready_for_fw is high
3,463,851 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,199,327 >>> mbox cmd response: success
14,200,240 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,495,647 UART:
18,496,045 UART: Running Caliptra FMC ...
18,497,203 UART:
18,497,387 UART: [state] CFI Enabled
18,564,570 UART: [fht] FMC Alias Private Key: 7
20,330,578 UART: [art] Extend RT PCRs Done
20,331,803 UART: [art] Lock RT PCRs Done
20,333,066 UART: [art] Populate DV Done
20,338,650 UART: [fht] FMC Alias Private Key: 7
20,340,356 UART: [art] Derive CDI
20,341,177 UART: [art] Store in slot 0x4
20,397,495 UART: [art] Derive Key Pair
20,398,495 UART: [art] Store priv key in slot 0x5
22,861,539 UART: [art] Derive Key Pair - Done
22,874,435 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,587,209 UART: [art] Erasing AUTHORITY.KEYID = 7
24,588,732 UART: [art] PUB.X = 8E38192FB87CA8F4201415DEA204A8CB2C160AB1B68A76355DDA1AC95FDFC2FA875657B104EC450B0B002E3F0974A924
24,595,978 UART: [art] PUB.Y = A3D08FD539C9C1CEDF038CC9D2D43FD84160F7E683FD91E777EA93AA0E0F9D0231B341EF9A0B19233FD249C3E5A5884B
24,603,245 UART: [art] SIG.R = DDD590E40769EB539CC3315F3EDAD9C49A1BA7728EBF1C441D594324B9090D77C2C9A278F9C6CA87FA0FC4D06857FDB5
24,610,673 UART: [art] SIG.S = BD880820563B36186B6FFBB498140BF48F34BB17D98727E6CA364CE9ECC46C79317992F759FBEC22069007014362256E
25,589,429 UART: Caliptra RT
25,590,150 UART: [state] CFI Enabled
25,771,151 UART: [rt] RT listening for mailbox commands...
25,802,189 UART: [rt]cmd =0x46505652, len=4
25,803,445 UART: [rt] FIPS Version
25,804,667 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,168 writing to cptra_bootfsm_go
193,598 UART:
193,955 UART: Running Caliptra ROM ...
195,065 UART:
604,995 UART: [state] CFI Enabled
617,394 UART: [state] LifecycleState = Unprovisioned
619,277 UART: [state] DebugLocked = No
621,592 UART: [state] WD Timer not started. Device not locked for debugging
624,714 UART: [kat] SHA2-256
804,367 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,154 UART: [kat] ++
815,763 UART: [kat] sha1
827,077 UART: [kat] SHA2-256
829,763 UART: [kat] SHA2-384
835,769 UART: [kat] SHA2-512-ACC
838,146 UART: [kat] ECC-384
3,280,971 UART: [kat] HMAC-384Kdf
3,291,913 UART: [kat] LMS
3,768,396 UART: [kat] --
3,774,739 UART: [cold-reset] ++
3,775,755 UART: [fht] FHT @ 0x50003400
3,787,304 UART: [idev] ++
3,787,881 UART: [idev] CDI.KEYID = 6
3,788,918 UART: [idev] SUBJECT.KEYID = 7
3,790,104 UART: [idev] UDS.KEYID = 0
3,791,042 ready_for_fw is high
3,791,285 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,940,258 UART: [idev] Erasing UDS.KEYID = 0
6,269,098 UART: [idev] Sha1 KeyId Algorithm
6,292,374 UART: [idev] --
6,296,973 UART: [ldev] ++
6,297,544 UART: [ldev] CDI.KEYID = 6
6,298,429 UART: [ldev] SUBJECT.KEYID = 5
6,299,699 UART: [ldev] AUTHORITY.KEYID = 7
6,300,937 UART: [ldev] FE.KEYID = 1
6,311,241 UART: [ldev] Erasing FE.KEYID = 1
8,792,977 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,513,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,529,701 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,545,538 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,561,137 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,319 UART: [ldev] --
10,585,905 UART: [fwproc] Wait for Commands...
10,588,284 UART: [fwproc] Recv command 0x46574c44
10,590,281 UART: [fwproc] Recv'd Img size: 118548 bytes
14,063,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,145,908 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,218,919 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,548,048 >>> mbox cmd response: success
14,548,626 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,552,030 UART: [afmc] ++
14,552,623 UART: [afmc] CDI.KEYID = 6
14,553,604 UART: [afmc] SUBJECT.KEYID = 7
14,554,706 UART: [afmc] AUTHORITY.KEYID = 5
17,058,633 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,781,976 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,784,164 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,799,959 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,816,045 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,831,627 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,856,267 UART: [afmc] --
18,859,562 UART: [cold-reset] --
18,863,643 UART: [state] Locking Datavault
18,868,574 UART: [state] Locking PCR0, PCR1 and PCR31
18,870,334 UART: [state] Locking ICCM
18,873,078 UART: [exit] Launching FMC @ 0x40000130
18,881,480 UART:
18,881,718 UART: Running Caliptra FMC ...
18,882,824 UART:
18,882,991 UART: [state] CFI Enabled
18,890,845 UART: [fht] FMC Alias Private Key: 7
20,657,166 UART: [art] Extend RT PCRs Done
20,658,393 UART: [art] Lock RT PCRs Done
20,659,720 UART: [art] Populate DV Done
20,665,302 UART: [fht] FMC Alias Private Key: 7
20,666,946 UART: [art] Derive CDI
20,667,690 UART: [art] Store in slot 0x4
20,709,928 UART: [art] Derive Key Pair
20,710,933 UART: [art] Store priv key in slot 0x5
23,137,590 UART: [art] Derive Key Pair - Done
23,150,421 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,856,339 UART: [art] Erasing AUTHORITY.KEYID = 7
24,857,849 UART: [art] PUB.X = 8BF8F47C47DFC7644579E86BD34B3AE864B5FC482781398A0E93D2F84D407323B4B7A4FE589FAA19BDB2167382604FD8
24,865,113 UART: [art] PUB.Y = 4CF42F988930FFEFCB83419E7BCAC70474FC91BE6544B5CA4231F24DAB8A4CEF01E86A1C01E65129AA6B75251D295068
24,872,361 UART: [art] SIG.R = 7B7F9104CAEE8EAD3F92B7842C5593D1F11446BE8F3B6358664779E353BBBCC87C0236924DB00120EC2AB3B268D3B229
24,879,776 UART: [art] SIG.S = BB1ABAD57E24C803B8E646F0DC55D409B6DAB916FBC52037C81D53DD0C3C26F6027720F17B4F184F9E652CCA41E23861
25,858,641 UART: Caliptra RT
25,859,354 UART: [state] CFI Enabled
25,992,843 UART: [rt] RT listening for mailbox commands...
26,024,191 UART: [rt]cmd =0x46505652, len=4
26,025,474 UART: [rt] FIPS Version
26,026,534 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
3,779,637 ready_for_fw is high
3,780,196 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,439,251 >>> mbox cmd response: success
14,439,907 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,689,685 UART:
18,690,101 UART: Running Caliptra FMC ...
18,691,288 UART:
18,691,445 UART: [state] CFI Enabled
18,699,219 UART: [fht] FMC Alias Private Key: 7
20,465,444 UART: [art] Extend RT PCRs Done
20,466,670 UART: [art] Lock RT PCRs Done
20,468,436 UART: [art] Populate DV Done
20,473,784 UART: [fht] FMC Alias Private Key: 7
20,475,338 UART: [art] Derive CDI
20,476,082 UART: [art] Store in slot 0x4
20,518,845 UART: [art] Derive Key Pair
20,519,845 UART: [art] Store priv key in slot 0x5
22,946,426 UART: [art] Derive Key Pair - Done
22,959,208 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,665,746 UART: [art] Erasing AUTHORITY.KEYID = 7
24,667,250 UART: [art] PUB.X = 41A6AA25987FC843DA46A1FB958D6981B94E543353BC9357A1EA99DDC6C8EEF2B721F4A82510497E05DA6CA3082F8650
24,674,526 UART: [art] PUB.Y = 73AFF18AE1DB957003E5B485473BE3724E6A6D89F8A686D28505F031E6823C5FE0AAF3E958B92BEA8E36C19A00AB8367
24,681,789 UART: [art] SIG.R = D9319DA6515F1C4C83070737048185F586E0032E1BDAE919815FEE6A3975150D80D783DF3F7919C540A6074358EB1160
24,689,135 UART: [art] SIG.S = 90F4B73549E3BE02C97BEBB75A8B7B6940A0CA03B49E7BDF3B531A5ED32D8F66A5F07D366913B159394BCD56FF0C45AB
25,667,918 UART: Caliptra RT
25,668,749 UART: [state] CFI Enabled
25,801,743 UART: [rt] RT listening for mailbox commands...
25,833,409 UART: [rt]cmd =0x46505652, len=4
25,834,682 UART: [rt] FIPS Version
25,835,793 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,039 writing to cptra_bootfsm_go
192,148 UART:
192,536 UART: Running Caliptra ROM ...
193,686 UART:
193,835 UART: [state] CFI Enabled
267,778 UART: [state] LifecycleState = Unprovisioned
270,200 UART: [state] DebugLocked = No
273,092 UART: [state] WD Timer not started. Device not locked for debugging
278,350 UART: [kat] SHA2-256
468,247 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
478,982 UART: [kat] ++
479,464 UART: [kat] sha1
490,990 UART: [kat] SHA2-256
494,009 UART: [kat] SHA2-384
499,091 UART: [kat] SHA2-512-ACC
501,639 UART: [kat] ECC-384
2,951,324 UART: [kat] HMAC-384Kdf
2,973,581 UART: [kat] LMS
3,505,345 UART: [kat] --
3,510,059 UART: [cold-reset] ++
3,511,007 UART: [fht] FHT @ 0x50003400
3,521,503 UART: [idev] ++
3,522,217 UART: [idev] CDI.KEYID = 6
3,523,257 UART: [idev] SUBJECT.KEYID = 7
3,524,365 UART: [idev] UDS.KEYID = 0
3,525,297 ready_for_fw is high
3,525,516 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,675,034 UART: [idev] Erasing UDS.KEYID = 0
6,031,804 UART: [idev] Sha1 KeyId Algorithm
6,054,275 UART: [idev] --
6,058,689 UART: [ldev] ++
6,059,410 UART: [ldev] CDI.KEYID = 6
6,060,328 UART: [ldev] SUBJECT.KEYID = 5
6,061,501 UART: [ldev] AUTHORITY.KEYID = 7
6,062,688 UART: [ldev] FE.KEYID = 1
6,100,664 UART: [ldev] Erasing FE.KEYID = 1
8,608,890 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,014 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,316 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,421 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,503 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,171 UART: [ldev] --
10,415,257 UART: [fwproc] Wait for Commands...
10,417,411 UART: [fwproc] Recv command 0x46574c44
10,419,673 UART: [fwproc] Recv'd Img size: 118548 bytes
13,921,422 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,998,149 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,121,770 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,682,383 >>> mbox cmd response: success
14,682,966 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,685,715 UART: [afmc] ++
14,686,417 UART: [afmc] CDI.KEYID = 6
14,687,523 UART: [afmc] SUBJECT.KEYID = 7
14,689,059 UART: [afmc] AUTHORITY.KEYID = 5
17,214,584 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,189 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,105 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,185 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,369 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,227 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,009,310 UART: [afmc] --
19,012,603 UART: [cold-reset] --
19,017,501 UART: [state] Locking Datavault
19,021,589 UART: [state] Locking PCR0, PCR1 and PCR31
19,023,788 UART: [state] Locking ICCM
19,025,190 UART: [exit] Launching FMC @ 0x40000130
19,033,863 UART:
19,034,103 UART: Running Caliptra FMC ...
19,035,212 UART:
19,035,375 UART: [state] CFI Enabled
19,094,297 UART: [fht] FMC Alias Private Key: 7
20,860,970 UART: [art] Extend RT PCRs Done
20,862,187 UART: [art] Lock RT PCRs Done
20,863,534 UART: [art] Populate DV Done
20,868,948 UART: [fht] FMC Alias Private Key: 7
20,870,483 UART: [art] Derive CDI
20,871,219 UART: [art] Store in slot 0x4
20,926,878 UART: [art] Derive Key Pair
20,927,921 UART: [art] Store priv key in slot 0x5
23,390,799 UART: [art] Derive Key Pair - Done
23,403,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,115,396 UART: [art] Erasing AUTHORITY.KEYID = 7
25,116,911 UART: [art] PUB.X = 44C1B48EA857D06FDB7AC826B055F23F09FAD0AF2488C16A43F4EFCC0BA5C2FEBAE21836E6B4F28E1809191145502B4D
25,124,179 UART: [art] PUB.Y = 880310812F116EC58A9803F3140EE1A48211EF7E9DEBC0025EA9EDA2A5690AF6F50B12CBA712083F1A277BE61B931D70
25,131,478 UART: [art] SIG.R = FE336F78CA2F488B7A75DAEDC2C8A4C405FFCF375FB8513DA77EB4C93E249492C2A57CB3F54749292ADD1AD6E6CED25D
25,138,874 UART: [art] SIG.S = 3269679CE54CA20A9BB1FA37CCB97B4EF2F0F6C58ABAC41DE5A94207BC844DE7886CD48B3BF921FF3D5F40847E340331
26,117,918 UART: Caliptra RT
26,118,610 UART: [state] CFI Enabled
26,298,930 UART: [rt] RT listening for mailbox commands...
26,330,510 UART: [rt]cmd =0x46505652, len=4
26,331,763 UART: [rt] FIPS Version
26,332,926 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,056 writing to cptra_bootfsm_go
3,441,101 ready_for_fw is high
3,441,929 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,833,136 >>> mbox cmd response: success
14,833,838 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,112,227 UART:
19,112,610 UART: Running Caliptra FMC ...
19,113,843 UART:
19,114,013 UART: [state] CFI Enabled
19,180,770 UART: [fht] FMC Alias Private Key: 7
20,947,353 UART: [art] Extend RT PCRs Done
20,948,580 UART: [art] Lock RT PCRs Done
20,950,127 UART: [art] Populate DV Done
20,955,503 UART: [fht] FMC Alias Private Key: 7
20,957,001 UART: [art] Derive CDI
20,957,775 UART: [art] Store in slot 0x4
21,014,208 UART: [art] Derive Key Pair
21,015,258 UART: [art] Store priv key in slot 0x5
23,478,262 UART: [art] Derive Key Pair - Done
23,491,484 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,204,469 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,971 UART: [art] PUB.X = C6D63279E7DAAC94D9DFF53FC5ED142E309070EB47901750C8BF0F639FA4526EF7F4FA6C3AFD7653DCC2C2145379A221
25,213,232 UART: [art] PUB.Y = 551D0ED4317EFF1837FC6659C158CEEA3EB9A6B34AD9A816374BF7DEC6937E5B309726EB62AA113D9B62E10DA8410147
25,220,505 UART: [art] SIG.R = 7918E2787D79C0464AA5467F46AC2B0F81305510316AC69FCC5CBC77D94FF561C2A25A5BE07E42BC3387C433D4821348
25,227,885 UART: [art] SIG.S = F0FC7E1F0218642D9A51FA3317C78E463B5DFD60D8D7EB2CFE4943CA4547C5EC615EF2247F737AA61E4912028D0F1E64
26,206,823 UART: Caliptra RT
26,207,540 UART: [state] CFI Enabled
26,388,728 UART: [rt] RT listening for mailbox commands...
26,419,941 UART: [rt]cmd =0x46505652, len=4
26,421,227 UART: [rt] FIPS Version
26,422,503 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,129 writing to cptra_bootfsm_go
193,449 UART:
193,829 UART: Running Caliptra ROM ...
194,927 UART:
604,589 UART: [state] CFI Enabled
619,551 UART: [state] LifecycleState = Unprovisioned
621,872 UART: [state] DebugLocked = No
624,759 UART: [state] WD Timer not started. Device not locked for debugging
628,518 UART: [kat] SHA2-256
818,194 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,990 UART: [kat] ++
829,518 UART: [kat] sha1
840,395 UART: [kat] SHA2-256
843,475 UART: [kat] SHA2-384
848,832 UART: [kat] SHA2-512-ACC
851,418 UART: [kat] ECC-384
3,291,525 UART: [kat] HMAC-384Kdf
3,305,681 UART: [kat] LMS
3,837,493 UART: [kat] --
3,841,073 UART: [cold-reset] ++
3,843,683 UART: [fht] FHT @ 0x50003400
3,854,960 UART: [idev] ++
3,855,669 UART: [idev] CDI.KEYID = 6
3,856,628 UART: [idev] SUBJECT.KEYID = 7
3,857,804 UART: [idev] UDS.KEYID = 0
3,858,714 ready_for_fw is high
3,858,928 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,008,182 UART: [idev] Erasing UDS.KEYID = 0
6,334,931 UART: [idev] Sha1 KeyId Algorithm
6,356,992 UART: [idev] --
6,362,289 UART: [ldev] ++
6,362,977 UART: [ldev] CDI.KEYID = 6
6,363,866 UART: [ldev] SUBJECT.KEYID = 5
6,365,085 UART: [ldev] AUTHORITY.KEYID = 7
6,366,348 UART: [ldev] FE.KEYID = 1
6,377,243 UART: [ldev] Erasing FE.KEYID = 1
8,855,930 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,573,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,101 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,278 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,619,409 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,639,748 UART: [ldev] --
10,644,429 UART: [fwproc] Wait for Commands...
10,646,731 UART: [fwproc] Recv command 0x46574c44
10,649,009 UART: [fwproc] Recv'd Img size: 118548 bytes
14,145,816 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,526 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,119 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,908,751 >>> mbox cmd response: success
14,909,311 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,912,402 UART: [afmc] ++
14,913,106 UART: [afmc] CDI.KEYID = 6
14,914,354 UART: [afmc] SUBJECT.KEYID = 7
14,915,792 UART: [afmc] AUTHORITY.KEYID = 5
17,419,219 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,141,592 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,143,561 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,158,633 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,173,793 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,188,731 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,212,989 UART: [afmc] --
19,217,351 UART: [cold-reset] --
19,222,418 UART: [state] Locking Datavault
19,228,271 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,471 UART: [state] Locking ICCM
19,231,763 UART: [exit] Launching FMC @ 0x40000130
19,240,412 UART:
19,240,659 UART: Running Caliptra FMC ...
19,241,766 UART:
19,241,929 UART: [state] CFI Enabled
19,249,980 UART: [fht] FMC Alias Private Key: 7
21,015,911 UART: [art] Extend RT PCRs Done
21,017,135 UART: [art] Lock RT PCRs Done
21,018,412 UART: [art] Populate DV Done
21,023,942 UART: [fht] FMC Alias Private Key: 7
21,025,541 UART: [art] Derive CDI
21,026,284 UART: [art] Store in slot 0x4
21,068,937 UART: [art] Derive Key Pair
21,069,983 UART: [art] Store priv key in slot 0x5
23,497,893 UART: [art] Derive Key Pair - Done
23,510,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,573 UART: [art] Erasing AUTHORITY.KEYID = 7
25,219,109 UART: [art] PUB.X = 5EE20A8BA0FF0FEB46EEC557CF0818E5B349250BC730B26F773A559274BED1E7EC1554ADA755D52A3369506D935CB634
25,226,357 UART: [art] PUB.Y = 6821D145D7C6412C33C842FCFDEAFC88EA5A4744A4FAE4FCA75ADD30736305079A88B28C7403B293A8ABE213AF2DA771
25,233,584 UART: [art] SIG.R = B063755073729C1DFE2DA56B4C6EEA8FD024C6FCA94AE99D798A811D1AB39A9258F3ABBA928F8A47811CB0613485874A
25,240,983 UART: [art] SIG.S = 7583CD170BEE299287DF47A1B2F7E06C4DCAD3B87D997E00F8C2291877E7470851BD544C2D9189D1FC7EB6EAB3DE8791
26,219,823 UART: Caliptra RT
26,220,512 UART: [state] CFI Enabled
26,353,089 UART: [rt] RT listening for mailbox commands...
26,384,397 UART: [rt]cmd =0x46505652, len=4
26,385,646 UART: [rt] FIPS Version
26,386,861 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
44 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,219 writing to cptra_bootfsm_go
3,758,225 ready_for_fw is high
3,758,819 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,044,624 >>> mbox cmd response: success
15,045,277 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,295,452 UART:
19,295,860 UART: Running Caliptra FMC ...
19,297,100 UART:
19,297,266 UART: [state] CFI Enabled
19,305,468 UART: [fht] FMC Alias Private Key: 7
21,071,525 UART: [art] Extend RT PCRs Done
21,072,753 UART: [art] Lock RT PCRs Done
21,074,384 UART: [art] Populate DV Done
21,079,695 UART: [fht] FMC Alias Private Key: 7
21,081,193 UART: [art] Derive CDI
21,081,958 UART: [art] Store in slot 0x4
21,124,290 UART: [art] Derive Key Pair
21,125,336 UART: [art] Store priv key in slot 0x5
23,552,063 UART: [art] Derive Key Pair - Done
23,565,080 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,271,302 UART: [art] Erasing AUTHORITY.KEYID = 7
25,272,809 UART: [art] PUB.X = 5DE21D817A8F304F8B428FB7FAE67A4DDD29D5125C3AC63AC4B840A1357AD244C87F2B6C3630B9D827EC224C41A577CB
25,280,089 UART: [art] PUB.Y = 34B7AD6ECAF7468094FBC45DAD052A395B0F23CD7F27BADE077CD93A725AA3A514700EBE38DBC1D5420EB7848AEC7F2E
25,287,403 UART: [art] SIG.R = 58A5A05A1D60F4D8993B97C9E0643650ADC4DEA4C77751C5B65FE1F78B3B2F3923524551BFD8D1048FE321944F81D7A6
25,294,825 UART: [art] SIG.S = 3147F18839B884184C7B6C254B130C3677A7DB94A90ADF94DD868733387DF7416170A85CC5B7C528BC3521BC920802FD
26,273,770 UART: Caliptra RT
26,274,462 UART: [state] CFI Enabled
26,406,335 UART: [rt] RT listening for mailbox commands...
26,437,855 UART: [rt]cmd =0x46505652, len=4
26,439,108 UART: [rt] FIPS Version
26,440,271 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,281 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,907 UART: [kat] SHA2-256
881,838 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,953 UART: [kat] ++
886,105 UART: [kat] sha1
890,329 UART: [kat] SHA2-256
892,267 UART: [kat] SHA2-384
894,916 UART: [kat] SHA2-512-ACC
896,817 UART: [kat] ECC-384
902,790 UART: [kat] HMAC-384Kdf
907,180 UART: [kat] LMS
1,475,376 UART: [kat] --
1,476,345 UART: [cold-reset] ++
1,476,779 UART: [fht] Storing FHT @ 0x50003400
1,479,630 UART: [idev] ++
1,479,798 UART: [idev] CDI.KEYID = 6
1,480,158 UART: [idev] SUBJECT.KEYID = 7
1,480,582 UART: [idev] UDS.KEYID = 0
1,480,927 ready_for_fw is high
1,480,927 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,606 UART: [idev] Erasing UDS.KEYID = 0
1,505,166 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,726 UART: [idev] --
1,514,595 UART: [ldev] ++
1,514,763 UART: [ldev] CDI.KEYID = 6
1,515,126 UART: [ldev] SUBJECT.KEYID = 5
1,515,552 UART: [ldev] AUTHORITY.KEYID = 7
1,516,015 UART: [ldev] FE.KEYID = 1
1,521,397 UART: [ldev] Erasing FE.KEYID = 1
1,546,832 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,581 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,297 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,188 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,900 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,952 UART: [ldev] --
1,586,245 UART: [fwproc] Waiting for Commands...
1,587,066 UART: [fwproc] Received command 0x46574c44
1,587,857 UART: [fwproc] Received Image of size 118548 bytes
2,932,329 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,253 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,471 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,678 >>> mbox cmd response: success
3,130,678 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,131,920 UART: [afmc] ++
3,132,088 UART: [afmc] CDI.KEYID = 6
3,132,450 UART: [afmc] SUBJECT.KEYID = 7
3,132,875 UART: [afmc] AUTHORITY.KEYID = 5
3,168,536 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,854 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,634 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,191,343 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,197,226 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,909 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,661 UART: [afmc] --
3,211,569 UART: [cold-reset] --
3,212,477 UART: [state] Locking Datavault
3,213,568 UART: [state] Locking PCR0, PCR1 and PCR31
3,214,172 UART: [state] Locking ICCM
3,214,636 UART: [exit] Launching FMC @ 0x40000130
3,219,966 UART:
3,219,982 UART: Running Caliptra FMC ...
3,220,390 UART:
3,220,444 UART: [state] CFI Enabled
3,231,116 UART: [fht] FMC Alias Private Key: 7
3,350,686 UART: [art] Extend RT PCRs Done
3,351,114 UART: [art] Lock RT PCRs Done
3,352,924 UART: [art] Populate DV Done
3,361,061 UART: [fht] FMC Alias Private Key: 7
3,362,045 UART: [art] Derive CDI
3,362,325 UART: [art] Store in slot 0x4
3,448,263 UART: [art] Derive Key Pair
3,448,623 UART: [art] Store priv key in slot 0x5
3,462,040 UART: [art] Derive Key Pair - Done
3,476,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,491,715 UART: [art] Erasing AUTHORITY.KEYID = 7
3,492,480 UART: [art] PUB.X = 83E1F5256E2709C4A4EB41CD59EDD4A3114AF8894F49D58FDDAE791A7CE942E557359DC6C759354C7E6930E8CA0D0657
3,499,249 UART: [art] PUB.Y = C7A185910B5DC1E24DBFABF223E645D084AAE046F54443AF20269A0E5047EBB56C9C5276326FFFDD35D012BE345CD600
3,506,183 UART: [art] SIG.R = 394D221F47D87BDB37D70FBED09E76AC71C21047A938BB0A2CB546163FF991C5F8C90F284DE4DD3013A99D7BCAEBDD46
3,512,962 UART: [art] SIG.S = 2D7298D395C1A0844F0E9A737C18564BFD72D208DA5C85A8EB835BD130BBA5C71309760DAEE1668E1AFA26E2E30978E6
3,536,635 UART: Caliptra RT
3,536,886 UART: [state] CFI Enabled
3,657,427 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,687,919 UART: [rt]cmd =0x46505652, len=4
3,688,579 UART: [rt] FIPS Version
3,689,674 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.67s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,025 ready_for_fw is high
1,362,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,486 >>> mbox cmd response: success
2,979,486 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,040,741 UART:
3,040,757 UART: Running Caliptra FMC ...
3,041,165 UART:
3,041,219 UART: [state] CFI Enabled
3,051,729 UART: [fht] FMC Alias Private Key: 7
3,170,441 UART: [art] Extend RT PCRs Done
3,170,869 UART: [art] Lock RT PCRs Done
3,172,403 UART: [art] Populate DV Done
3,180,626 UART: [fht] FMC Alias Private Key: 7
3,181,636 UART: [art] Derive CDI
3,181,916 UART: [art] Store in slot 0x4
3,268,152 UART: [art] Derive Key Pair
3,268,512 UART: [art] Store priv key in slot 0x5
3,281,589 UART: [art] Derive Key Pair - Done
3,296,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,058 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,823 UART: [art] PUB.X = 7415129F33CF444EF3E4775C9013A94516FF53BB18946346588C01343582F1234BB41EC879D5A37C2730FF99E54EBF1A
3,319,584 UART: [art] PUB.Y = 3510F1ABA0BE59AD104332D9516DC8ED1112768D1342710409AD2EEB51C6869CAB335037657C084E0652060575F98940
3,326,506 UART: [art] SIG.R = 5F1CEAFCED6BD921E086C2AFAC930E954A0AAF90D496895B976F25844EF183C1E4C7E0659D150775282D6AD34B103DD1
3,333,279 UART: [art] SIG.S = 722FDF156E910DB02FDF97E93BBFC72AA7B829DD465E12718C769FBCC4330B9C73DED2F4A726B76FDDBC3E92AFEFB713
3,356,841 UART: Caliptra RT
3,357,092 UART: [state] CFI Enabled
3,477,033 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,857 UART: [rt]cmd =0x46505652, len=4
3,508,517 UART: [rt] FIPS Version
3,509,572 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,622 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,284 UART: [kat] SHA2-256
882,215 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,330 UART: [kat] ++
886,482 UART: [kat] sha1
890,734 UART: [kat] SHA2-256
892,672 UART: [kat] SHA2-384
895,573 UART: [kat] SHA2-512-ACC
897,474 UART: [kat] ECC-384
902,895 UART: [kat] HMAC-384Kdf
907,619 UART: [kat] LMS
1,475,815 UART: [kat] --
1,476,612 UART: [cold-reset] ++
1,476,994 UART: [fht] Storing FHT @ 0x50003400
1,479,839 UART: [idev] ++
1,480,007 UART: [idev] CDI.KEYID = 6
1,480,367 UART: [idev] SUBJECT.KEYID = 7
1,480,791 UART: [idev] UDS.KEYID = 0
1,481,136 ready_for_fw is high
1,481,136 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,927 UART: [idev] Erasing UDS.KEYID = 0
1,505,759 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,563 UART: [idev] --
1,515,630 UART: [ldev] ++
1,515,798 UART: [ldev] CDI.KEYID = 6
1,516,161 UART: [ldev] SUBJECT.KEYID = 5
1,516,587 UART: [ldev] AUTHORITY.KEYID = 7
1,517,050 UART: [ldev] FE.KEYID = 1
1,522,206 UART: [ldev] Erasing FE.KEYID = 1
1,547,501 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,914 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,630 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,521 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,233 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,155 UART: [ldev] --
1,586,608 UART: [fwproc] Waiting for Commands...
1,587,439 UART: [fwproc] Received command 0x46574c44
1,588,230 UART: [fwproc] Received Image of size 118548 bytes
2,932,758 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,959,376 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,990,594 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,130,825 >>> mbox cmd response: success
3,130,825 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,132,015 UART: [afmc] ++
3,132,183 UART: [afmc] CDI.KEYID = 6
3,132,545 UART: [afmc] SUBJECT.KEYID = 7
3,132,970 UART: [afmc] AUTHORITY.KEYID = 5
3,168,129 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,184,319 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,185,099 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,190,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,196,691 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,202,374 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,210,166 UART: [afmc] --
3,211,206 UART: [cold-reset] --
3,212,210 UART: [state] Locking Datavault
3,213,353 UART: [state] Locking PCR0, PCR1 and PCR31
3,213,957 UART: [state] Locking ICCM
3,214,579 UART: [exit] Launching FMC @ 0x40000130
3,219,909 UART:
3,219,925 UART: Running Caliptra FMC ...
3,220,333 UART:
3,220,476 UART: [state] CFI Enabled
3,230,846 UART: [fht] FMC Alias Private Key: 7
3,349,988 UART: [art] Extend RT PCRs Done
3,350,416 UART: [art] Lock RT PCRs Done
3,352,068 UART: [art] Populate DV Done
3,360,287 UART: [fht] FMC Alias Private Key: 7
3,361,261 UART: [art] Derive CDI
3,361,541 UART: [art] Store in slot 0x4
3,447,359 UART: [art] Derive Key Pair
3,447,719 UART: [art] Store priv key in slot 0x5
3,460,912 UART: [art] Derive Key Pair - Done
3,475,622 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,490,933 UART: [art] Erasing AUTHORITY.KEYID = 7
3,491,698 UART: [art] PUB.X = 42587F260567359B8850F28853E69A28B77669A015C177CE857D31421B5FA460CA68B5122777F5E4A2CB4E453AF29BB2
3,498,457 UART: [art] PUB.Y = 503DB7B024DE44A1CBCA7A137A0AA7DD9A81346C6496B2BB56CF8FA0562A427DD37DAD1A3A2611B3FEF6A24CC8659B49
3,505,424 UART: [art] SIG.R = 3036B088E99C219BC55B427D5AC2CDF75452CF8119667B1F890028E641BB9719CED6E138AE7BB0B345F4285B7E2FE47C
3,512,178 UART: [art] SIG.S = 9512A25B9A2153A995C465D629EC176130306683C9FD615A403836CA75BF6E3BEC15EE6A6D182DAE343F59F95DC69E0E
3,536,377 UART: Caliptra RT
3,536,720 UART: [state] CFI Enabled
3,656,444 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,686,874 UART: [rt]cmd =0x46505652, len=4
3,687,534 UART: [rt] FIPS Version
3,688,709 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,380 ready_for_fw is high
1,363,380 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,982,341 >>> mbox cmd response: success
2,982,341 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,044,118 UART:
3,044,134 UART: Running Caliptra FMC ...
3,044,542 UART:
3,044,685 UART: [state] CFI Enabled
3,055,001 UART: [fht] FMC Alias Private Key: 7
3,174,563 UART: [art] Extend RT PCRs Done
3,174,991 UART: [art] Lock RT PCRs Done
3,176,557 UART: [art] Populate DV Done
3,184,610 UART: [fht] FMC Alias Private Key: 7
3,185,786 UART: [art] Derive CDI
3,186,066 UART: [art] Store in slot 0x4
3,271,700 UART: [art] Derive Key Pair
3,272,060 UART: [art] Store priv key in slot 0x5
3,284,805 UART: [art] Derive Key Pair - Done
3,299,576 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,971 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,736 UART: [art] PUB.X = F280906126738F4965D285988B099EBEA864C707D510D87993ECCB8B13754AC331E0B8DE3FEFDDDD9DD0EDEE65F59DBA
3,322,516 UART: [art] PUB.Y = 1627462AB616499E02EBE6A4D4A26FD8297929398ADD7282D45DE6BB6443D8217F8991D9C074DBEC6D79440A32BBF7A4
3,329,464 UART: [art] SIG.R = 7E19921F986F2E3B7D9FA746933CFE1EEC85F92D787BCC306E459A70FDB15F9CC120A01B4D94AAD1DA6A5580FEA1F792
3,336,252 UART: [art] SIG.S = 10DA29071CE5E10F4181BD3137460115A30DB9A298C9DE5EFA3594ACA6AED801FF01F904EDA4CC8A0A57B1904B4EF819
3,359,920 UART: Caliptra RT
3,360,263 UART: [state] CFI Enabled
3,480,868 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,376 UART: [rt]cmd =0x46505652, len=4
3,512,036 UART: [rt] FIPS Version
3,512,951 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,104 UART: [state] LifecycleState = Unprovisioned
85,759 UART: [state] DebugLocked = No
86,397 UART: [state] WD Timer not started. Device not locked for debugging
87,572 UART: [kat] SHA2-256
891,122 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,226 UART: [kat] ++
895,378 UART: [kat] sha1
899,648 UART: [kat] SHA2-256
901,588 UART: [kat] SHA2-384
904,277 UART: [kat] SHA2-512-ACC
906,178 UART: [kat] ECC-384
915,731 UART: [kat] HMAC-384Kdf
920,191 UART: [kat] LMS
1,168,503 UART: [kat] --
1,169,530 UART: [cold-reset] ++
1,169,874 UART: [fht] FHT @ 0x50003400
1,172,358 UART: [idev] ++
1,172,526 UART: [idev] CDI.KEYID = 6
1,172,887 UART: [idev] SUBJECT.KEYID = 7
1,173,312 UART: [idev] UDS.KEYID = 0
1,173,658 ready_for_fw is high
1,173,658 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,371 UART: [idev] Erasing UDS.KEYID = 0
1,198,449 UART: [idev] Sha1 KeyId Algorithm
1,207,273 UART: [idev] --
1,208,376 UART: [ldev] ++
1,208,544 UART: [ldev] CDI.KEYID = 6
1,208,908 UART: [ldev] SUBJECT.KEYID = 5
1,209,335 UART: [ldev] AUTHORITY.KEYID = 7
1,209,798 UART: [ldev] FE.KEYID = 1
1,215,218 UART: [ldev] Erasing FE.KEYID = 1
1,241,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,183 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,899 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,788 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,500 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,730 UART: [ldev] --
1,281,183 UART: [fwproc] Wait for Commands...
1,281,764 UART: [fwproc] Recv command 0x46574c44
1,282,497 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,856 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,483 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,658 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,015 >>> mbox cmd response: success
2,826,015 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,069 UART: [afmc] ++
2,827,237 UART: [afmc] CDI.KEYID = 6
2,827,600 UART: [afmc] SUBJECT.KEYID = 7
2,828,026 UART: [afmc] AUTHORITY.KEYID = 5
2,863,939 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,654 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,403 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,113 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,994 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,695 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,414 UART: [afmc] --
2,907,277 UART: [cold-reset] --
2,908,219 UART: [state] Locking Datavault
2,909,384 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,988 UART: [state] Locking ICCM
2,910,510 UART: [exit] Launching FMC @ 0x40000130
2,915,840 UART:
2,915,856 UART: Running Caliptra FMC ...
2,916,264 UART:
2,916,318 UART: [state] CFI Enabled
2,926,466 UART: [fht] FMC Alias Private Key: 7
3,045,252 UART: [art] Extend RT PCRs Done
3,045,680 UART: [art] Lock RT PCRs Done
3,047,434 UART: [art] Populate DV Done
3,055,865 UART: [fht] FMC Alias Private Key: 7
3,056,935 UART: [art] Derive CDI
3,057,215 UART: [art] Store in slot 0x4
3,142,870 UART: [art] Derive Key Pair
3,143,230 UART: [art] Store priv key in slot 0x5
3,156,852 UART: [art] Derive Key Pair - Done
3,171,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,538 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,303 UART: [art] PUB.X = 9C6470A0F1CDA280008D10B4AF87CC8F9AC48CB090C036676E9B61435A2758CF2D06297DE8F71114766FE2E6E20C82F2
3,195,049 UART: [art] PUB.Y = 7EA5BF02564E2CCC04E524F82E2DDD7A5F1D76B32346A2CD1081CDB332F42AB325C76426B97C1244A86ADF254F6266C3
3,202,003 UART: [art] SIG.R = BA14DE61420B6D3AAF229A5B254761728924D3BC8C6465DD09514C1A0123AF2FFB6A4FF05C0D9C867C3A5493D5F772F2
3,208,769 UART: [art] SIG.S = 866D4A7610DE0C5F61C951356B94ACFA75AAF95AD2CB3A401F9F800CA12CC8FB9AA8D5C20A3F5B2FAB9749C5B337CCF5
3,232,250 UART: Caliptra RT
3,232,501 UART: [state] CFI Enabled
3,352,007 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,457 UART: [rt]cmd =0x46505652, len=4
3,383,117 UART: [rt] FIPS Version
3,384,220 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,732 ready_for_fw is high
1,058,732 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,678 >>> mbox cmd response: success
2,679,678 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,491 UART:
2,741,507 UART: Running Caliptra FMC ...
2,741,915 UART:
2,741,969 UART: [state] CFI Enabled
2,752,767 UART: [fht] FMC Alias Private Key: 7
2,872,187 UART: [art] Extend RT PCRs Done
2,872,615 UART: [art] Lock RT PCRs Done
2,874,159 UART: [art] Populate DV Done
2,882,210 UART: [fht] FMC Alias Private Key: 7
2,883,344 UART: [art] Derive CDI
2,883,624 UART: [art] Store in slot 0x4
2,969,419 UART: [art] Derive Key Pair
2,969,779 UART: [art] Store priv key in slot 0x5
2,983,389 UART: [art] Derive Key Pair - Done
2,998,646 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,461 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,226 UART: [art] PUB.X = AB5F148306248043A69E732CC57ED3A7A9F539CB13E7F640041201634FD2FA2AC14674087707AC2A8281E15E8B77878D
3,021,977 UART: [art] PUB.Y = 4143A286640E308D3A8984F7F3CD16EE5272FC5B6268CFC3A90C07F9A75613865D5D6322884E7E5D23E28F674AAED14B
3,028,920 UART: [art] SIG.R = FBE6310A2ECA121C55C0FAD36414F394F62F8F8BD793D5B93D24650A716F6E6897E141A2548EDD8105E46CEFBA5DDECA
3,035,699 UART: [art] SIG.S = 466ED473A38A2D49AF180E8AB7DDABFC6FF8F5C57C2653724B0CF1518953A198087050668CB1969FBDD0918C408A23E1
3,059,406 UART: Caliptra RT
3,059,657 UART: [state] CFI Enabled
3,179,662 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,374 UART: [rt]cmd =0x46505652, len=4
3,211,034 UART: [rt] FIPS Version
3,211,937 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,409 UART: [state] LifecycleState = Unprovisioned
86,064 UART: [state] DebugLocked = No
86,646 UART: [state] WD Timer not started. Device not locked for debugging
87,941 UART: [kat] SHA2-256
891,491 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,595 UART: [kat] ++
895,747 UART: [kat] sha1
900,053 UART: [kat] SHA2-256
901,993 UART: [kat] SHA2-384
904,610 UART: [kat] SHA2-512-ACC
906,511 UART: [kat] ECC-384
916,180 UART: [kat] HMAC-384Kdf
920,824 UART: [kat] LMS
1,169,136 UART: [kat] --
1,169,963 UART: [cold-reset] ++
1,170,381 UART: [fht] FHT @ 0x50003400
1,173,197 UART: [idev] ++
1,173,365 UART: [idev] CDI.KEYID = 6
1,173,726 UART: [idev] SUBJECT.KEYID = 7
1,174,151 UART: [idev] UDS.KEYID = 0
1,174,497 ready_for_fw is high
1,174,497 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,340 UART: [idev] Erasing UDS.KEYID = 0
1,199,424 UART: [idev] Sha1 KeyId Algorithm
1,208,420 UART: [idev] --
1,209,513 UART: [ldev] ++
1,209,681 UART: [ldev] CDI.KEYID = 6
1,210,045 UART: [ldev] SUBJECT.KEYID = 5
1,210,472 UART: [ldev] AUTHORITY.KEYID = 7
1,210,935 UART: [ldev] FE.KEYID = 1
1,216,391 UART: [ldev] Erasing FE.KEYID = 1
1,242,680 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,504 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,220 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,109 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,821 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,001 UART: [ldev] --
1,282,304 UART: [fwproc] Wait for Commands...
1,283,075 UART: [fwproc] Recv command 0x46574c44
1,283,808 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,473 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,906 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,081 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,412 >>> mbox cmd response: success
2,826,412 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,827,484 UART: [afmc] ++
2,827,652 UART: [afmc] CDI.KEYID = 6
2,828,015 UART: [afmc] SUBJECT.KEYID = 7
2,828,441 UART: [afmc] AUTHORITY.KEYID = 5
2,863,612 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,971 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,720 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,430 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,311 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,012 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,837 UART: [afmc] --
2,906,670 UART: [cold-reset] --
2,907,734 UART: [state] Locking Datavault
2,908,845 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,449 UART: [state] Locking ICCM
2,910,075 UART: [exit] Launching FMC @ 0x40000130
2,915,405 UART:
2,915,421 UART: Running Caliptra FMC ...
2,915,829 UART:
2,915,972 UART: [state] CFI Enabled
2,926,790 UART: [fht] FMC Alias Private Key: 7
3,045,908 UART: [art] Extend RT PCRs Done
3,046,336 UART: [art] Lock RT PCRs Done
3,047,746 UART: [art] Populate DV Done
3,056,051 UART: [fht] FMC Alias Private Key: 7
3,057,035 UART: [art] Derive CDI
3,057,315 UART: [art] Store in slot 0x4
3,143,674 UART: [art] Derive Key Pair
3,144,034 UART: [art] Store priv key in slot 0x5
3,157,850 UART: [art] Derive Key Pair - Done
3,172,125 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,529 UART: [art] PUB.X = 4701000224D106B965CAF2BA022FF1799DF3DE27D6C9F7A6E73F38A74311FCBB7818E2D2EFF2166CBD63BD025B590635
3,195,267 UART: [art] PUB.Y = 4CAE94727D738853B80C3FCDF97D89E14C72FCDFABEFDA64148B745DFADEC77CEAFE1A25C414587BE7199BE28E23BC3D
3,202,242 UART: [art] SIG.R = 78C09FC9CA00324B5F3B7EF7CFDD5D905D924698A09763535CBB1A5C86EF567793B1FC633F222CA7A322137D35FF9085
3,208,996 UART: [art] SIG.S = 2F960122F4A1517EB8A7E83BF18233D6E1D6C9CC09AAA0CE6CBF723A2196D177C2154FDC4DD389E02ACDB0608CCD6C65
3,232,748 UART: Caliptra RT
3,233,091 UART: [state] CFI Enabled
3,352,939 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,225 UART: [rt]cmd =0x46505652, len=4
3,383,885 UART: [rt] FIPS Version
3,384,884 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.38s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,331 ready_for_fw is high
1,060,331 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,057 >>> mbox cmd response: success
2,680,057 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,816 UART:
2,741,832 UART: Running Caliptra FMC ...
2,742,240 UART:
2,742,383 UART: [state] CFI Enabled
2,753,231 UART: [fht] FMC Alias Private Key: 7
2,872,255 UART: [art] Extend RT PCRs Done
2,872,683 UART: [art] Lock RT PCRs Done
2,874,221 UART: [art] Populate DV Done
2,882,318 UART: [fht] FMC Alias Private Key: 7
2,883,424 UART: [art] Derive CDI
2,883,704 UART: [art] Store in slot 0x4
2,969,777 UART: [art] Derive Key Pair
2,970,137 UART: [art] Store priv key in slot 0x5
2,983,857 UART: [art] Derive Key Pair - Done
2,999,017 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,924 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,689 UART: [art] PUB.X = 7C0D824CDC304621110EBB8566E963D0361BBBD85D0CD0820C500D9B752AC9E83C3C73309D48864DE698BBF2E40BCB78
3,022,449 UART: [art] PUB.Y = 96770CAEBA2C3D11B28103EDA42FF5B01EE1AEF7C75B55E36F24F43ECE8E44CEAB01C12B434562AC2A393D0A508C10A1
3,029,407 UART: [art] SIG.R = BF1A710474388F80EE12B51511049087B585C02DB8BE71F167982DFA9281F184803D1957BCA0CD30CDCB8D6667E4D7DE
3,036,175 UART: [art] SIG.S = C810A1306C6EEFB4F01712781B91E733728D6CB54755042C58D8C67D9B134A9433B658318C06143699A5332FF4ABE0CF
3,060,289 UART: Caliptra RT
3,060,632 UART: [state] CFI Enabled
3,180,726 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,211,052 UART: [rt]cmd =0x46505652, len=4
3,211,712 UART: [rt] FIPS Version
3,212,903 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,102 UART: [state] LifecycleState = Unprovisioned
85,757 UART: [state] DebugLocked = No
86,387 UART: [state] WD Timer not started. Device not locked for debugging
87,626 UART: [kat] SHA2-256
893,276 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,401 UART: [kat] ++
897,553 UART: [kat] sha1
901,633 UART: [kat] SHA2-256
903,573 UART: [kat] SHA2-384
906,206 UART: [kat] SHA2-512-ACC
908,107 UART: [kat] ECC-384
917,914 UART: [kat] HMAC-384Kdf
922,468 UART: [kat] LMS
1,170,796 UART: [kat] --
1,171,865 UART: [cold-reset] ++
1,172,247 UART: [fht] FHT @ 0x50003400
1,174,834 UART: [idev] ++
1,175,002 UART: [idev] CDI.KEYID = 6
1,175,362 UART: [idev] SUBJECT.KEYID = 7
1,175,786 UART: [idev] UDS.KEYID = 0
1,176,131 ready_for_fw is high
1,176,131 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,998 UART: [idev] Erasing UDS.KEYID = 0
1,201,047 UART: [idev] Sha1 KeyId Algorithm
1,209,427 UART: [idev] --
1,210,665 UART: [ldev] ++
1,210,833 UART: [ldev] CDI.KEYID = 6
1,211,196 UART: [ldev] SUBJECT.KEYID = 5
1,211,622 UART: [ldev] AUTHORITY.KEYID = 7
1,212,085 UART: [ldev] FE.KEYID = 1
1,217,275 UART: [ldev] Erasing FE.KEYID = 1
1,243,884 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,077 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,793 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,684 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,396 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,417 UART: [ldev] --
1,282,870 UART: [fwproc] Wait for Commands...
1,283,514 UART: [fwproc] Recv command 0x46574c44
1,284,242 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,097 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,764 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,934 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,169 >>> mbox cmd response: success
2,827,169 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,183 UART: [afmc] ++
2,828,351 UART: [afmc] CDI.KEYID = 6
2,828,713 UART: [afmc] SUBJECT.KEYID = 7
2,829,138 UART: [afmc] AUTHORITY.KEYID = 5
2,864,937 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,594 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,342 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,051 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,934 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,635 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,485 UART: [afmc] --
2,908,479 UART: [cold-reset] --
2,909,407 UART: [state] Locking Datavault
2,910,472 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,076 UART: [state] Locking ICCM
2,911,522 UART: [exit] Launching FMC @ 0x40000130
2,916,852 UART:
2,916,868 UART: Running Caliptra FMC ...
2,917,276 UART:
2,917,330 UART: [state] CFI Enabled
2,927,860 UART: [fht] FMC Alias Private Key: 7
3,046,904 UART: [art] Extend RT PCRs Done
3,047,332 UART: [art] Lock RT PCRs Done
3,048,850 UART: [art] Populate DV Done
3,057,405 UART: [fht] FMC Alias Private Key: 7
3,058,435 UART: [art] Derive CDI
3,058,715 UART: [art] Store in slot 0x4
3,144,556 UART: [art] Derive Key Pair
3,144,916 UART: [art] Store priv key in slot 0x5
3,158,420 UART: [art] Derive Key Pair - Done
3,173,374 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,189,191 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,956 UART: [art] PUB.X = 7C87B6BAB5B0E424FA284F6FA639F7832C2C54CFFB9A3638EB31679ED269A0618015E399548429B7BE3F0ABAEA3DDBDD
3,196,741 UART: [art] PUB.Y = 23C0E1D4443C8E3E18F36FAEEDECFA4CDC9A20220AEFD8ACF0504BB695BFB035F41C9861298669F39CC8D8D4E41ECE3B
3,203,714 UART: [art] SIG.R = EF9330B2CA1DB09D2FF60362B3A6B3871F972960837E57B09CFF34CE0639736687A91BD2C83645C379373B136DE41483
3,210,474 UART: [art] SIG.S = 24E0DFB2FD8233A43103A1594B58FBB396E606FE4A323435C96B52A327196370FDD835093B30C2EB56F98285E69CE36C
3,234,239 UART: Caliptra RT
3,234,490 UART: [state] CFI Enabled
3,354,701 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,385,289 UART: [rt]cmd =0x46505652, len=4
3,385,949 UART: [rt] FIPS Version
3,387,138 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,273 ready_for_fw is high
1,060,273 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,268 >>> mbox cmd response: success
2,678,268 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,761 UART:
2,740,777 UART: Running Caliptra FMC ...
2,741,185 UART:
2,741,239 UART: [state] CFI Enabled
2,751,617 UART: [fht] FMC Alias Private Key: 7
2,870,621 UART: [art] Extend RT PCRs Done
2,871,049 UART: [art] Lock RT PCRs Done
2,872,783 UART: [art] Populate DV Done
2,880,822 UART: [fht] FMC Alias Private Key: 7
2,881,752 UART: [art] Derive CDI
2,882,032 UART: [art] Store in slot 0x4
2,968,387 UART: [art] Derive Key Pair
2,968,747 UART: [art] Store priv key in slot 0x5
2,981,697 UART: [art] Derive Key Pair - Done
2,996,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,697 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,462 UART: [art] PUB.X = 18EC15CBD5CAA91F2998B7123370345C67C8008E01BE60CDCF8A2060AFFA51CD5B1E59F241A521F3E50CA89D2856C92D
3,019,216 UART: [art] PUB.Y = 282610232E52C26F3597F872DCAD8C0EFBD7D3807A72E324705D18D55C4505201DDFC4A2DCF62D05A195825103462C0E
3,026,151 UART: [art] SIG.R = 44DD678E5B540E108145454C26A286799A1EEE48633BC781CFC6FB3BDEB379540B5916F85F1CC9B739A721127771DE68
3,032,915 UART: [art] SIG.S = 846A02F170BB5F088C2DD48448FDAF4A9F4C314CE39450C67E25DB0C561D8C1CC3CB89259C702201DFB562F76CC25B9F
3,056,841 UART: Caliptra RT
3,057,092 UART: [state] CFI Enabled
3,176,725 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,497 UART: [rt]cmd =0x46505652, len=4
3,208,157 UART: [rt] FIPS Version
3,209,024 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,793 UART: [state] LifecycleState = Unprovisioned
86,448 UART: [state] DebugLocked = No
87,008 UART: [state] WD Timer not started. Device not locked for debugging
88,275 UART: [kat] SHA2-256
893,925 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,050 UART: [kat] ++
898,202 UART: [kat] sha1
902,364 UART: [kat] SHA2-256
904,304 UART: [kat] SHA2-384
906,915 UART: [kat] SHA2-512-ACC
908,816 UART: [kat] ECC-384
918,729 UART: [kat] HMAC-384Kdf
923,325 UART: [kat] LMS
1,171,653 UART: [kat] --
1,172,176 UART: [cold-reset] ++
1,172,688 UART: [fht] FHT @ 0x50003400
1,175,133 UART: [idev] ++
1,175,301 UART: [idev] CDI.KEYID = 6
1,175,661 UART: [idev] SUBJECT.KEYID = 7
1,176,085 UART: [idev] UDS.KEYID = 0
1,176,430 ready_for_fw is high
1,176,430 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,291 UART: [idev] Erasing UDS.KEYID = 0
1,201,348 UART: [idev] Sha1 KeyId Algorithm
1,209,732 UART: [idev] --
1,210,782 UART: [ldev] ++
1,210,950 UART: [ldev] CDI.KEYID = 6
1,211,313 UART: [ldev] SUBJECT.KEYID = 5
1,211,739 UART: [ldev] AUTHORITY.KEYID = 7
1,212,202 UART: [ldev] FE.KEYID = 1
1,217,438 UART: [ldev] Erasing FE.KEYID = 1
1,244,533 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,890 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,606 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,497 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,209 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,364 UART: [ldev] --
1,283,647 UART: [fwproc] Wait for Commands...
1,284,277 UART: [fwproc] Recv command 0x46574c44
1,285,005 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,830 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,459 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,629 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,828,800 >>> mbox cmd response: success
2,828,800 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,898 UART: [afmc] ++
2,830,066 UART: [afmc] CDI.KEYID = 6
2,830,428 UART: [afmc] SUBJECT.KEYID = 7
2,830,853 UART: [afmc] AUTHORITY.KEYID = 5
2,866,688 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,087 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,883,835 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,889,544 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,895,427 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,128 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,164 UART: [afmc] --
2,910,088 UART: [cold-reset] --
2,911,144 UART: [state] Locking Datavault
2,912,203 UART: [state] Locking PCR0, PCR1 and PCR31
2,912,807 UART: [state] Locking ICCM
2,913,419 UART: [exit] Launching FMC @ 0x40000130
2,918,749 UART:
2,918,765 UART: Running Caliptra FMC ...
2,919,173 UART:
2,919,316 UART: [state] CFI Enabled
2,930,040 UART: [fht] FMC Alias Private Key: 7
3,048,700 UART: [art] Extend RT PCRs Done
3,049,128 UART: [art] Lock RT PCRs Done
3,050,642 UART: [art] Populate DV Done
3,058,841 UART: [fht] FMC Alias Private Key: 7
3,060,003 UART: [art] Derive CDI
3,060,283 UART: [art] Store in slot 0x4
3,146,430 UART: [art] Derive Key Pair
3,146,790 UART: [art] Store priv key in slot 0x5
3,160,248 UART: [art] Derive Key Pair - Done
3,174,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,108 UART: [art] Erasing AUTHORITY.KEYID = 7
3,190,873 UART: [art] PUB.X = D942DEA3229BFC6C7667E051CF6EFD9A6D212C08BBCE6B70568B116B12140D9CA0E47E29AC73B01809059E4A729471BF
3,197,641 UART: [art] PUB.Y = A0F48A8152560F8AF7D50A40350584BB20F8879BB829F225CCFE3F62E2A64009C0932244BDE7A0A8C5705A03F2CC6E18
3,204,580 UART: [art] SIG.R = 2FDC3358B1D2003257AB2A883CB2B299FA29F2419D1E1B41DF7C68BBD4F9BA2BD57775B6793FFDF6D7C1A965C02B36DB
3,211,346 UART: [art] SIG.S = DB97561A1FEC7AB99392530159E0D302D76B5A9844BA8267B6A6D38D168A55F8BA43D0216B1B83D06263D6FA70476B83
3,236,144 UART: Caliptra RT
3,236,487 UART: [state] CFI Enabled
3,356,482 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,670 UART: [rt]cmd =0x46505652, len=4
3,387,330 UART: [rt] FIPS Version
3,388,343 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,428 ready_for_fw is high
1,060,428 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,043 >>> mbox cmd response: success
2,681,043 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,904 UART:
2,743,920 UART: Running Caliptra FMC ...
2,744,328 UART:
2,744,471 UART: [state] CFI Enabled
2,754,943 UART: [fht] FMC Alias Private Key: 7
2,873,967 UART: [art] Extend RT PCRs Done
2,874,395 UART: [art] Lock RT PCRs Done
2,875,953 UART: [art] Populate DV Done
2,884,206 UART: [fht] FMC Alias Private Key: 7
2,885,290 UART: [art] Derive CDI
2,885,570 UART: [art] Store in slot 0x4
2,971,161 UART: [art] Derive Key Pair
2,971,521 UART: [art] Store priv key in slot 0x5
2,984,657 UART: [art] Derive Key Pair - Done
2,999,284 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,791 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,556 UART: [art] PUB.X = 9E264515539388F3F8A6E6B2C9C274DCBD6E52C500A89DB21DD92A589ECAF37E87BE3647CB8C85F2408DC883ECEE8839
3,022,316 UART: [art] PUB.Y = B36789E48B14B55E7B0AE8A20151CA9C24724E3068D610DADCBD207B83F57F001ECCB8BAF04633055772EA475D873C86
3,029,241 UART: [art] SIG.R = 2FF4BF8519362E324E18F631F9E20A41EC010433ED14AE0999AA60594C2EA8E1C25BA3BEDE672B1CEAF69772F3D2B048
3,036,011 UART: [art] SIG.S = CDA55C2B52BBFEA4A9D0F6D4BA3370CFEEC849BE17B78BE31BCBFD2EA4AF9726B3FFF7A079E936B2BDE23C167D5B32C1
3,059,837 UART: Caliptra RT
3,060,180 UART: [state] CFI Enabled
3,179,777 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,531 UART: [rt]cmd =0x46505652, len=4
3,211,191 UART: [rt] FIPS Version
3,212,312 >>> mbox cmd response data (36 bytes)
test services::check_version_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,984 writing to cptra_bootfsm_go
192,210 UART:
192,559 UART: Running Caliptra ROM ...
193,715 UART:
193,870 UART: [state] CFI Enabled
265,563 UART: [state] LifecycleState = Unprovisioned
267,536 UART: [state] DebugLocked = No
268,816 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,833 UART: [kat] SHA2-256
442,544 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,069 UART: [kat] ++
453,610 UART: [kat] sha1
464,222 UART: [kat] SHA2-256
466,901 UART: [kat] SHA2-384
472,840 UART: [kat] SHA2-512-ACC
475,237 UART: [kat] ECC-384
2,764,632 UART: [kat] HMAC-384Kdf
2,776,814 UART: [kat] LMS
3,967,152 UART: [kat] --
3,972,574 UART: [cold-reset] ++
3,974,356 UART: [fht] Storing FHT @ 0x50003400
3,987,299 UART: [idev] ++
3,987,916 UART: [idev] CDI.KEYID = 6
3,988,830 UART: [idev] SUBJECT.KEYID = 7
3,990,073 UART: [idev] UDS.KEYID = 0
4,076,122 UART: [idev] Erasing UDS.KEYID = 0
4,078,318 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,322,579 UART: [idev] Using Sha1 for KeyId Algorithm
7,342,853 UART: [idev] --
7,346,158 UART: [ldev] ++
7,346,748 UART: [ldev] CDI.KEYID = 6
7,347,633 UART: [ldev] SUBJECT.KEYID = 5
7,348,905 UART: [ldev] AUTHORITY.KEYID = 7
7,350,139 UART: [ldev] FE.KEYID = 1
7,376,828 UART: [ldev] Erasing FE.KEYID = 1
10,710,467 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,022,792 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,037,327 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,052,187 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,066,745 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,085,866 UART: [ldev] --
13,089,791 UART: [fwproc] Waiting for Commands...
13,092,890 UART: [fwproc] Received command 0x46505652
13,095,305 UART: [rt] FIPS Version
13,096,931 >>> mbox cmd response data (36 bytes)
13,097,746 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,098,492 UART: [fwproc] Received command 0x46504c54
13,101,105 UART: [kat] SHA2-256
13,270,674 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,281,037 UART: [kat] ++
13,281,520 UART: [kat] sha1
13,291,113 UART: [kat] SHA2-256
13,293,811 UART: [kat] SHA2-384
13,298,191 UART: [kat] SHA2-512-ACC
13,300,603 UART: [kat] ECC-384
15,584,834 UART: [kat] HMAC-384Kdf
15,616,938 UART: [kat] LMS
16,806,464 UART: [kat] --
16,807,145 >>> mbox cmd response data (8 bytes)
16,807,516 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,808,866 UART: [fwproc] Received command 0x46504c67
16,811,567 >>> mbox cmd response data (8 bytes)
16,811,888 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,813,392 UART: [fwproc] Received command 0x43415053
16,816,403 >>> mbox cmd response data (24 bytes)
16,816,870 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,817,983 UART: [fwproc] Received command 0x4d454153
16,826,997 >>> mbox cmd response data (12 bytes)
16,827,418 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,828,169 UART: [fwproc] Received command 0x46505344
16,830,962 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,914 writing to cptra_bootfsm_go
3,870,399 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,826,948 >>> mbox cmd response data (36 bytes)
12,828,128 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,354,137 >>> mbox cmd response data (8 bytes)
16,354,666 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,356,424 >>> mbox cmd response data (8 bytes)
16,356,923 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,358,766 >>> mbox cmd response data (24 bytes)
16,359,327 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,368,111 >>> mbox cmd response data (12 bytes)
16,368,562 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,370,505 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,226 writing to cptra_bootfsm_go
192,522 UART:
192,904 UART: Running Caliptra ROM ...
194,091 UART:
603,824 UART: [state] CFI Enabled
618,883 UART: [state] LifecycleState = Unprovisioned
620,825 UART: [state] DebugLocked = No
623,827 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
628,959 UART: [kat] SHA2-256
798,698 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
809,242 UART: [kat] ++
809,724 UART: [kat] sha1
820,769 UART: [kat] SHA2-256
823,459 UART: [kat] SHA2-384
829,696 UART: [kat] SHA2-512-ACC
832,051 UART: [kat] ECC-384
3,113,555 UART: [kat] HMAC-384Kdf
3,124,732 UART: [kat] LMS
4,314,851 UART: [kat] --
4,320,229 UART: [cold-reset] ++
4,322,173 UART: [fht] Storing FHT @ 0x50003400
4,332,527 UART: [idev] ++
4,333,095 UART: [idev] CDI.KEYID = 6
4,334,009 UART: [idev] SUBJECT.KEYID = 7
4,335,291 UART: [idev] UDS.KEYID = 0
4,421,829 UART: [idev] Erasing UDS.KEYID = 0
4,424,419 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
7,625,205 UART: [idev] Using Sha1 for KeyId Algorithm
7,648,127 UART: [idev] --
7,652,785 UART: [ldev] ++
7,653,372 UART: [ldev] CDI.KEYID = 6
7,654,346 UART: [ldev] SUBJECT.KEYID = 5
7,655,574 UART: [ldev] AUTHORITY.KEYID = 7
7,656,761 UART: [ldev] FE.KEYID = 1
7,668,606 UART: [ldev] Erasing FE.KEYID = 1
10,956,500 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,248,666 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,263,258 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,278,088 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,292,621 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,310,659 UART: [ldev] --
13,314,598 UART: [fwproc] Waiting for Commands...
13,316,493 UART: [fwproc] Received command 0x46505652
13,318,912 UART: [rt] FIPS Version
13,320,590 >>> mbox cmd response data (36 bytes)
13,321,432 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,322,387 UART: [fwproc] Received command 0x46504c54
13,324,925 UART: [kat] SHA2-256
13,494,577 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,504,933 UART: [kat] ++
13,505,396 UART: [kat] sha1
13,517,137 UART: [kat] SHA2-256
13,519,839 UART: [kat] SHA2-384
13,526,390 UART: [kat] SHA2-512-ACC
13,528,745 UART: [kat] ECC-384
15,814,511 UART: [kat] HMAC-384Kdf
15,826,796 UART: [kat] LMS
17,016,226 UART: [kat] --
17,016,949 >>> mbox cmd response data (8 bytes)
17,017,308 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,018,778 UART: [fwproc] Received command 0x46504c67
17,021,431 >>> mbox cmd response data (8 bytes)
17,021,760 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
17,022,195 UART: [fwproc] Received command 0x43415053
17,025,219 >>> mbox cmd response data (24 bytes)
17,025,728 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
17,027,435 UART: [fwproc] Received command 0x4d454153
17,036,453 >>> mbox cmd response data (12 bytes)
17,036,885 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,037,398 UART: [fwproc] Received command 0x46505344
17,040,153 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.86s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,308 writing to cptra_bootfsm_go
4,214,259 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,046,033 >>> mbox cmd response data (36 bytes)
13,047,207 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,542,777 >>> mbox cmd response data (8 bytes)
16,543,321 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,544,538 >>> mbox cmd response data (8 bytes)
16,544,905 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
16,546,792 >>> mbox cmd response data (24 bytes)
16,547,364 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
16,555,666 >>> mbox cmd response data (12 bytes)
16,556,132 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
16,558,304 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,080 writing to cptra_bootfsm_go
192,245 UART:
192,646 UART: Running Caliptra ROM ...
193,835 UART:
193,995 UART: [state] CFI Enabled
265,303 UART: [state] LifecycleState = Unprovisioned
267,255 UART: [state] DebugLocked = No
269,281 UART: [state] WD Timer not started. Device not locked for debugging
274,023 UART: [kat] SHA2-256
453,637 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,438 UART: [kat] ++
464,919 UART: [kat] sha1
475,750 UART: [kat] SHA2-256
478,436 UART: [kat] SHA2-384
483,825 UART: [kat] SHA2-512-ACC
486,218 UART: [kat] ECC-384
2,947,300 UART: [kat] HMAC-384Kdf
2,969,364 UART: [kat] LMS
3,445,863 UART: [kat] --
3,450,927 UART: [cold-reset] ++
3,452,027 UART: [fht] FHT @ 0x50003400
3,462,393 UART: [idev] ++
3,462,968 UART: [idev] CDI.KEYID = 6
3,463,990 UART: [idev] SUBJECT.KEYID = 7
3,465,152 UART: [idev] UDS.KEYID = 0
3,546,184 UART: [idev] Erasing UDS.KEYID = 0
3,548,387 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
5,983,361 UART: [idev] Sha1 KeyId Algorithm
6,007,394 UART: [idev] --
6,011,906 UART: [ldev] ++
6,012,538 UART: [ldev] CDI.KEYID = 6
6,013,442 UART: [ldev] SUBJECT.KEYID = 5
6,014,613 UART: [ldev] AUTHORITY.KEYID = 7
6,015,855 UART: [ldev] FE.KEYID = 1
6,054,265 UART: [ldev] Erasing FE.KEYID = 1
8,563,466 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,295,550 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,311,430 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,327,275 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,342,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,363,282 UART: [ldev] --
10,369,588 UART: [fwproc] Wait for Commands...
10,371,527 UART: [fwproc] Recv command 0x46505652
10,373,736 UART: [rt] FIPS Version
10,375,253 >>> mbox cmd response data (36 bytes)
10,376,065 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,376,501 UART: [fwproc] Recv command 0x46504c54
10,378,836 UART: [kat] SHA2-256
10,558,484 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,569,567 UART: [kat] ++
10,570,062 UART: [kat] sha1
10,581,060 UART: [kat] SHA2-256
10,583,768 UART: [kat] SHA2-384
10,589,598 UART: [kat] SHA2-512-ACC
10,591,952 UART: [kat] ECC-384
13,055,717 UART: [kat] HMAC-384Kdf
13,078,879 UART: [kat] LMS
13,555,398 UART: [kat] --
13,556,045 >>> mbox cmd response data (8 bytes)
13,556,394 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,556,832 UART: [fwproc] Recv command 0x46504c67
13,559,272 >>> mbox cmd response data (8 bytes)
13,559,592 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,560,077 UART: [fwproc] Recv command 0x43415053
13,562,788 >>> mbox cmd response data (24 bytes)
13,563,276 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,564,928 UART: [fwproc] Recv command 0x4d454153
13,574,123 >>> mbox cmd response data (12 bytes)
13,574,544 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,575,197 UART: [fwproc] Recv command 0x46505344
13,577,685 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,193 writing to cptra_bootfsm_go
3,543,279 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,252,878 >>> mbox cmd response data (36 bytes)
10,254,405 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,440,464 >>> mbox cmd response data (8 bytes)
13,441,651 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,444,163 >>> mbox cmd response data (8 bytes)
13,444,533 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,445,830 >>> mbox cmd response data (24 bytes)
13,446,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,454,351 >>> mbox cmd response data (12 bytes)
13,454,779 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,456,244 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,328 writing to cptra_bootfsm_go
192,601 UART:
192,990 UART: Running Caliptra ROM ...
194,113 UART:
603,941 UART: [state] CFI Enabled
617,975 UART: [state] LifecycleState = Unprovisioned
619,900 UART: [state] DebugLocked = No
621,630 UART: [state] WD Timer not started. Device not locked for debugging
625,609 UART: [kat] SHA2-256
805,266 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,080 UART: [kat] ++
816,536 UART: [kat] sha1
827,976 UART: [kat] SHA2-256
830,669 UART: [kat] SHA2-384
836,114 UART: [kat] SHA2-512-ACC
838,515 UART: [kat] ECC-384
3,281,944 UART: [kat] HMAC-384Kdf
3,293,696 UART: [kat] LMS
3,770,206 UART: [kat] --
3,775,088 UART: [cold-reset] ++
3,777,092 UART: [fht] FHT @ 0x50003400
3,788,512 UART: [idev] ++
3,789,148 UART: [idev] CDI.KEYID = 6
3,790,066 UART: [idev] SUBJECT.KEYID = 7
3,791,290 UART: [idev] UDS.KEYID = 0
3,872,520 UART: [idev] Erasing UDS.KEYID = 0
3,874,716 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,271,384 UART: [idev] Sha1 KeyId Algorithm
6,295,213 UART: [idev] --
6,301,471 UART: [ldev] ++
6,302,061 UART: [ldev] CDI.KEYID = 6
6,303,016 UART: [ldev] SUBJECT.KEYID = 5
6,304,201 UART: [ldev] AUTHORITY.KEYID = 7
6,305,441 UART: [ldev] FE.KEYID = 1
6,316,533 UART: [ldev] Erasing FE.KEYID = 1
8,795,560 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,516,769 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,532,673 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,548,510 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,564,061 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,586,082 UART: [ldev] --
10,591,794 UART: [fwproc] Wait for Commands...
10,594,288 UART: [fwproc] Recv command 0x46505652
10,596,553 UART: [rt] FIPS Version
10,598,066 >>> mbox cmd response data (36 bytes)
10,598,992 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,599,443 UART: [fwproc] Recv command 0x46504c54
10,601,754 UART: [kat] SHA2-256
10,781,453 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,792,524 UART: [kat] ++
10,793,020 UART: [kat] sha1
10,803,870 UART: [kat] SHA2-256
10,806,615 UART: [kat] SHA2-384
10,814,008 UART: [kat] SHA2-512-ACC
10,816,373 UART: [kat] ECC-384
13,256,134 UART: [kat] HMAC-384Kdf
13,268,199 UART: [kat] LMS
13,744,672 UART: [kat] --
13,745,373 >>> mbox cmd response data (8 bytes)
13,745,723 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,746,484 UART: [fwproc] Recv command 0x46504c67
13,748,949 >>> mbox cmd response data (8 bytes)
13,749,269 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,749,770 UART: [fwproc] Recv command 0x43415053
13,752,483 >>> mbox cmd response data (24 bytes)
13,752,948 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,754,494 UART: [fwproc] Recv command 0x4d454153
13,763,690 >>> mbox cmd response data (12 bytes)
13,764,117 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,765,308 UART: [fwproc] Recv command 0x46505344
13,767,744 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,158 writing to cptra_bootfsm_go
3,865,648 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,497,322 >>> mbox cmd response data (36 bytes)
10,498,478 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,647,116 >>> mbox cmd response data (8 bytes)
13,647,627 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,650,141 >>> mbox cmd response data (8 bytes)
13,650,546 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,652,008 >>> mbox cmd response data (24 bytes)
13,652,458 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,659,980 >>> mbox cmd response data (12 bytes)
13,660,460 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,662,682 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,945 writing to cptra_bootfsm_go
192,055 UART:
192,486 UART: Running Caliptra ROM ...
193,567 UART:
193,715 UART: [state] CFI Enabled
260,787 UART: [state] LifecycleState = Unprovisioned
263,196 UART: [state] DebugLocked = No
265,940 UART: [state] WD Timer not started. Device not locked for debugging
269,654 UART: [kat] SHA2-256
459,544 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
470,297 UART: [kat] ++
470,784 UART: [kat] sha1
482,426 UART: [kat] SHA2-256
485,442 UART: [kat] SHA2-384
491,102 UART: [kat] SHA2-512-ACC
493,686 UART: [kat] ECC-384
2,950,117 UART: [kat] HMAC-384Kdf
2,969,551 UART: [kat] LMS
3,501,294 UART: [kat] --
3,504,646 UART: [cold-reset] ++
3,506,155 UART: [fht] FHT @ 0x50003400
3,518,604 UART: [idev] ++
3,519,296 UART: [idev] CDI.KEYID = 6
3,520,238 UART: [idev] SUBJECT.KEYID = 7
3,521,454 UART: [idev] UDS.KEYID = 0
3,607,497 UART: [idev] Erasing UDS.KEYID = 0
3,609,751 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,026,807 UART: [idev] Sha1 KeyId Algorithm
6,049,632 UART: [idev] --
6,054,138 UART: [ldev] ++
6,054,888 UART: [ldev] CDI.KEYID = 6
6,055,817 UART: [ldev] SUBJECT.KEYID = 5
6,056,935 UART: [ldev] AUTHORITY.KEYID = 7
6,058,122 UART: [ldev] FE.KEYID = 1
6,097,645 UART: [ldev] Erasing FE.KEYID = 1
8,611,898 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,095 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,312 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,513 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,663 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,408,993 UART: [ldev] --
10,414,814 UART: [fwproc] Wait for Commands...
10,417,401 UART: [fwproc] Recv command 0x46505652
10,419,945 UART: [rt] FIPS Version
10,421,621 >>> mbox cmd response data (36 bytes)
10,422,378 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,423,312 UART: [fwproc] Recv command 0x46504c54
10,425,812 UART: [kat] SHA2-256
10,615,578 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,626,380 UART: [kat] ++
10,626,849 UART: [kat] sha1
10,637,797 UART: [kat] SHA2-256
10,640,816 UART: [kat] SHA2-384
10,645,623 UART: [kat] SHA2-512-ACC
10,648,192 UART: [kat] ECC-384
13,100,525 UART: [kat] HMAC-384Kdf
13,126,043 UART: [kat] LMS
13,657,879 UART: [kat] --
13,658,544 >>> mbox cmd response data (8 bytes)
13,658,886 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,659,706 UART: [fwproc] Recv command 0x46504c67
13,662,202 >>> mbox cmd response data (8 bytes)
13,662,523 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,663,704 UART: [fwproc] Recv command 0x43415053
13,666,687 >>> mbox cmd response data (24 bytes)
13,667,161 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,668,222 UART: [fwproc] Recv command 0x4d454153
13,677,629 >>> mbox cmd response data (12 bytes)
13,678,047 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,678,592 UART: [fwproc] Recv command 0x46505344
13,681,301 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,091 writing to cptra_bootfsm_go
3,523,042 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,244,679 >>> mbox cmd response data (36 bytes)
10,245,903 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,385,314 >>> mbox cmd response data (8 bytes)
13,385,839 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,387,268 >>> mbox cmd response data (8 bytes)
13,387,683 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,389,364 >>> mbox cmd response data (24 bytes)
13,389,933 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,398,340 >>> mbox cmd response data (12 bytes)
13,398,756 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,400,708 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,200 writing to cptra_bootfsm_go
192,545 UART:
192,903 UART: Running Caliptra ROM ...
194,016 UART:
603,880 UART: [state] CFI Enabled
615,765 UART: [state] LifecycleState = Unprovisioned
618,202 UART: [state] DebugLocked = No
621,092 UART: [state] WD Timer not started. Device not locked for debugging
625,621 UART: [kat] SHA2-256
815,500 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,310 UART: [kat] ++
826,845 UART: [kat] sha1
838,540 UART: [kat] SHA2-256
841,573 UART: [kat] SHA2-384
847,168 UART: [kat] SHA2-512-ACC
849,754 UART: [kat] ECC-384
3,291,441 UART: [kat] HMAC-384Kdf
3,303,613 UART: [kat] LMS
3,835,467 UART: [kat] --
3,839,419 UART: [cold-reset] ++
3,840,656 UART: [fht] FHT @ 0x50003400
3,852,076 UART: [idev] ++
3,852,789 UART: [idev] CDI.KEYID = 6
3,853,713 UART: [idev] SUBJECT.KEYID = 7
3,854,932 UART: [idev] UDS.KEYID = 0
3,941,261 UART: [idev] Erasing UDS.KEYID = 0
3,943,462 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
6,334,981 UART: [idev] Sha1 KeyId Algorithm
6,357,128 UART: [idev] --
6,362,313 UART: [ldev] ++
6,363,041 UART: [ldev] CDI.KEYID = 6
6,363,970 UART: [ldev] SUBJECT.KEYID = 5
6,365,078 UART: [ldev] AUTHORITY.KEYID = 7
6,366,318 UART: [ldev] FE.KEYID = 1
6,377,620 UART: [ldev] Erasing FE.KEYID = 1
8,853,715 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,574,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,589,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,604,923 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,620,047 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,642,159 UART: [ldev] --
10,647,879 UART: [fwproc] Wait for Commands...
10,650,630 UART: [fwproc] Recv command 0x46505652
10,653,178 UART: [rt] FIPS Version
10,654,856 >>> mbox cmd response data (36 bytes)
10,655,588 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
10,656,396 UART: [fwproc] Recv command 0x46504c54
10,658,577 UART: [kat] SHA2-256
10,848,341 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,859,138 UART: [kat] ++
10,859,685 UART: [kat] sha1
10,870,789 UART: [kat] SHA2-256
10,873,817 UART: [kat] SHA2-384
10,879,651 UART: [kat] SHA2-512-ACC
10,882,227 UART: [kat] ECC-384
13,322,814 UART: [kat] HMAC-384Kdf
13,335,769 UART: [kat] LMS
13,867,654 UART: [kat] --
13,868,323 >>> mbox cmd response data (8 bytes)
13,868,675 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,869,328 UART: [fwproc] Recv command 0x46504c67
13,871,835 >>> mbox cmd response data (8 bytes)
13,872,153 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,873,669 UART: [fwproc] Recv command 0x43415053
13,876,384 >>> mbox cmd response data (24 bytes)
13,876,889 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,879,027 UART: [fwproc] Recv command 0x4d454153
13,888,717 >>> mbox cmd response data (12 bytes)
13,889,151 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,890,079 UART: [fwproc] Recv command 0x46505344
13,892,802 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,254 writing to cptra_bootfsm_go
3,842,096 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,466,196 >>> mbox cmd response data (36 bytes)
10,467,448 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,590,651 >>> mbox cmd response data (8 bytes)
13,591,166 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,592,325 >>> mbox cmd response data (8 bytes)
13,592,637 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
13,594,151 >>> mbox cmd response data (24 bytes)
13,594,721 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
13,603,627 >>> mbox cmd response data (12 bytes)
13,604,049 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
13,605,573 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,048 UART: [state] LifecycleState = Unprovisioned
85,703 UART: [state] DebugLocked = No
86,393 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,027 UART: [kat] SHA2-256
881,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,073 UART: [kat] ++
886,225 UART: [kat] sha1
890,455 UART: [kat] SHA2-256
892,393 UART: [kat] SHA2-384
894,978 UART: [kat] SHA2-512-ACC
896,879 UART: [kat] ECC-384
902,358 UART: [kat] HMAC-384Kdf
906,824 UART: [kat] LMS
1,475,020 UART: [kat] --
1,475,951 UART: [cold-reset] ++
1,476,423 UART: [fht] Storing FHT @ 0x50003400
1,479,360 UART: [idev] ++
1,479,528 UART: [idev] CDI.KEYID = 6
1,479,888 UART: [idev] SUBJECT.KEYID = 7
1,480,312 UART: [idev] UDS.KEYID = 0
1,480,657 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,488,528 UART: [idev] Erasing UDS.KEYID = 0
1,505,146 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,976 UART: [idev] --
1,514,957 UART: [ldev] ++
1,515,125 UART: [ldev] CDI.KEYID = 6
1,515,488 UART: [ldev] SUBJECT.KEYID = 5
1,515,914 UART: [ldev] AUTHORITY.KEYID = 7
1,516,377 UART: [ldev] FE.KEYID = 1
1,521,295 UART: [ldev] Erasing FE.KEYID = 1
1,546,720 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,503 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,219 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,110 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,822 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,806 UART: [ldev] --
1,586,145 UART: [fwproc] Waiting for Commands...
1,586,776 UART: [fwproc] Received command 0x46505652
1,587,658 UART: [rt] FIPS Version
1,588,211 >>> mbox cmd response data (36 bytes)
1,588,212 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,588,334 UART: [fwproc] Received command 0x46504c54
1,589,241 UART: [kat] SHA2-256
2,383,172 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,287 UART: [kat] ++
2,387,439 UART: [kat] sha1
2,391,667 UART: [kat] SHA2-256
2,393,605 UART: [kat] SHA2-384
2,396,334 UART: [kat] SHA2-512-ACC
2,398,234 UART: [kat] ECC-384
2,403,893 UART: [kat] HMAC-384Kdf
2,408,493 UART: [kat] LMS
2,976,689 UART: [kat] --
2,976,927 >>> mbox cmd response data (8 bytes)
2,976,928 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,096 UART: [fwproc] Received command 0x46504c67
2,978,050 >>> mbox cmd response data (8 bytes)
2,978,051 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,978,345 UART: [fwproc] Received command 0x43415053
2,979,393 >>> mbox cmd response data (24 bytes)
2,979,394 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,979,582 UART: [fwproc] Received command 0x4d454153
2,983,646 >>> mbox cmd response data (12 bytes)
2,983,647 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,983,739 UART: [fwproc] Received command 0x46505344
2,984,687 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.97s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,599 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,440,788 >>> mbox cmd response data (36 bytes)
1,440,789 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,715,696 >>> mbox cmd response data (8 bytes)
2,715,697 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,083 >>> mbox cmd response data (8 bytes)
2,716,084 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,716,594 >>> mbox cmd response data (24 bytes)
2,716,595 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,720,145 >>> mbox cmd response data (12 bytes)
2,720,146 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,720,627 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,371 UART: [state] LifecycleState = Unprovisioned
86,026 UART: [state] DebugLocked = No
86,692 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,242 UART: [kat] SHA2-256
882,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,288 UART: [kat] ++
886,440 UART: [kat] sha1
890,840 UART: [kat] SHA2-256
892,778 UART: [kat] SHA2-384
895,491 UART: [kat] SHA2-512-ACC
897,392 UART: [kat] ECC-384
903,083 UART: [kat] HMAC-384Kdf
907,691 UART: [kat] LMS
1,475,887 UART: [kat] --
1,476,944 UART: [cold-reset] ++
1,477,432 UART: [fht] Storing FHT @ 0x50003400
1,480,217 UART: [idev] ++
1,480,385 UART: [idev] CDI.KEYID = 6
1,480,745 UART: [idev] SUBJECT.KEYID = 7
1,481,169 UART: [idev] UDS.KEYID = 0
1,481,514 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,221 UART: [idev] Erasing UDS.KEYID = 0
1,505,961 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,611 UART: [idev] --
1,515,860 UART: [ldev] ++
1,516,028 UART: [ldev] CDI.KEYID = 6
1,516,391 UART: [ldev] SUBJECT.KEYID = 5
1,516,817 UART: [ldev] AUTHORITY.KEYID = 7
1,517,280 UART: [ldev] FE.KEYID = 1
1,522,576 UART: [ldev] Erasing FE.KEYID = 1
1,548,285 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,740 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,456 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,347 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,059 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,237 UART: [ldev] --
1,587,724 UART: [fwproc] Waiting for Commands...
1,588,569 UART: [fwproc] Received command 0x46505652
1,589,451 UART: [rt] FIPS Version
1,590,004 >>> mbox cmd response data (36 bytes)
1,590,005 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,590,143 UART: [fwproc] Received command 0x46504c54
1,591,050 UART: [kat] SHA2-256
2,384,981 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,389,096 UART: [kat] ++
2,389,248 UART: [kat] sha1
2,393,686 UART: [kat] SHA2-256
2,395,624 UART: [kat] SHA2-384
2,398,429 UART: [kat] SHA2-512-ACC
2,400,329 UART: [kat] ECC-384
2,406,056 UART: [kat] HMAC-384Kdf
2,410,732 UART: [kat] LMS
2,978,928 UART: [kat] --
2,979,166 >>> mbox cmd response data (8 bytes)
2,979,167 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,979,265 UART: [fwproc] Received command 0x46504c67
2,980,219 >>> mbox cmd response data (8 bytes)
2,980,220 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,980,426 UART: [fwproc] Received command 0x43415053
2,981,474 >>> mbox cmd response data (24 bytes)
2,981,475 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,981,611 UART: [fwproc] Received command 0x4d454153
2,985,675 >>> mbox cmd response data (12 bytes)
2,985,676 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,985,798 UART: [fwproc] Received command 0x46505344
2,986,746 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.14s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,014 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,327 >>> mbox cmd response data (36 bytes)
1,441,328 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,169 >>> mbox cmd response data (8 bytes)
2,716,170 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,546 >>> mbox cmd response data (8 bytes)
2,716,547 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,717,079 >>> mbox cmd response data (24 bytes)
2,717,080 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,720,574 >>> mbox cmd response data (12 bytes)
2,720,575 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,721,050 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.77s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,726 UART: [state] LifecycleState = Unprovisioned
85,381 UART: [state] DebugLocked = No
86,029 UART: [state] WD Timer not started. Device not locked for debugging
87,146 UART: [kat] SHA2-256
890,696 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
894,800 UART: [kat] ++
894,952 UART: [kat] sha1
899,184 UART: [kat] SHA2-256
901,124 UART: [kat] SHA2-384
904,097 UART: [kat] SHA2-512-ACC
905,998 UART: [kat] ECC-384
915,591 UART: [kat] HMAC-384Kdf
920,155 UART: [kat] LMS
1,168,467 UART: [kat] --
1,169,280 UART: [cold-reset] ++
1,169,794 UART: [fht] FHT @ 0x50003400
1,172,476 UART: [idev] ++
1,172,644 UART: [idev] CDI.KEYID = 6
1,173,005 UART: [idev] SUBJECT.KEYID = 7
1,173,430 UART: [idev] UDS.KEYID = 0
1,173,776 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,147 UART: [idev] Erasing UDS.KEYID = 0
1,198,419 UART: [idev] Sha1 KeyId Algorithm
1,207,263 UART: [idev] --
1,208,422 UART: [ldev] ++
1,208,590 UART: [ldev] CDI.KEYID = 6
1,208,954 UART: [ldev] SUBJECT.KEYID = 5
1,209,381 UART: [ldev] AUTHORITY.KEYID = 7
1,209,844 UART: [ldev] FE.KEYID = 1
1,215,106 UART: [ldev] Erasing FE.KEYID = 1
1,241,555 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,999 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,715 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,604 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,316 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,386 UART: [ldev] --
1,280,699 UART: [fwproc] Wait for Commands...
1,281,470 UART: [fwproc] Recv command 0x46505652
1,282,294 UART: [rt] FIPS Version
1,282,854 >>> mbox cmd response data (36 bytes)
1,282,855 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,282,926 UART: [fwproc] Recv command 0x46504c54
1,283,777 UART: [kat] SHA2-256
2,087,327 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,091,431 UART: [kat] ++
2,091,583 UART: [kat] sha1
2,095,725 UART: [kat] SHA2-256
2,097,665 UART: [kat] SHA2-384
2,100,368 UART: [kat] SHA2-512-ACC
2,102,268 UART: [kat] ECC-384
2,111,979 UART: [kat] HMAC-384Kdf
2,116,749 UART: [kat] LMS
2,365,061 UART: [kat] --
2,365,302 >>> mbox cmd response data (8 bytes)
2,365,303 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,370 UART: [fwproc] Recv command 0x46504c67
2,366,271 >>> mbox cmd response data (8 bytes)
2,366,272 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,366,513 UART: [fwproc] Recv command 0x43415053
2,367,506 >>> mbox cmd response data (24 bytes)
2,367,507 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,367,574 UART: [fwproc] Recv command 0x4d454153
2,371,597 >>> mbox cmd response data (12 bytes)
2,371,598 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,371,875 UART: [fwproc] Recv command 0x46505344
2,372,775 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,286 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,521 >>> mbox cmd response data (36 bytes)
1,139,522 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,110,873 >>> mbox cmd response data (8 bytes)
2,110,874 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,336 >>> mbox cmd response data (8 bytes)
2,111,337 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,111,814 >>> mbox cmd response data (24 bytes)
2,111,815 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,115,431 >>> mbox cmd response data (12 bytes)
2,115,432 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,115,771 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.67s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,521 UART: [state] LifecycleState = Unprovisioned
86,176 UART: [state] DebugLocked = No
86,734 UART: [state] WD Timer not started. Device not locked for debugging
87,859 UART: [kat] SHA2-256
891,409 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,513 UART: [kat] ++
895,665 UART: [kat] sha1
900,153 UART: [kat] SHA2-256
902,093 UART: [kat] SHA2-384
904,606 UART: [kat] SHA2-512-ACC
906,507 UART: [kat] ECC-384
915,694 UART: [kat] HMAC-384Kdf
920,348 UART: [kat] LMS
1,168,660 UART: [kat] --
1,169,363 UART: [cold-reset] ++
1,169,837 UART: [fht] FHT @ 0x50003400
1,172,351 UART: [idev] ++
1,172,519 UART: [idev] CDI.KEYID = 6
1,172,880 UART: [idev] SUBJECT.KEYID = 7
1,173,305 UART: [idev] UDS.KEYID = 0
1,173,651 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,632 UART: [idev] Erasing UDS.KEYID = 0
1,198,600 UART: [idev] Sha1 KeyId Algorithm
1,207,660 UART: [idev] --
1,208,699 UART: [ldev] ++
1,208,867 UART: [ldev] CDI.KEYID = 6
1,209,231 UART: [ldev] SUBJECT.KEYID = 5
1,209,658 UART: [ldev] AUTHORITY.KEYID = 7
1,210,121 UART: [ldev] FE.KEYID = 1
1,215,397 UART: [ldev] Erasing FE.KEYID = 1
1,241,810 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,127 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,839 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,785 UART: [ldev] --
1,281,004 UART: [fwproc] Wait for Commands...
1,281,621 UART: [fwproc] Recv command 0x46505652
1,282,445 UART: [rt] FIPS Version
1,283,005 >>> mbox cmd response data (36 bytes)
1,283,006 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,113 UART: [fwproc] Recv command 0x46504c54
1,283,964 UART: [kat] SHA2-256
2,087,514 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,091,618 UART: [kat] ++
2,091,770 UART: [kat] sha1
2,095,914 UART: [kat] SHA2-256
2,097,854 UART: [kat] SHA2-384
2,100,513 UART: [kat] SHA2-512-ACC
2,102,413 UART: [kat] ECC-384
2,112,252 UART: [kat] HMAC-384Kdf
2,116,860 UART: [kat] LMS
2,365,172 UART: [kat] --
2,365,413 >>> mbox cmd response data (8 bytes)
2,365,414 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,365,719 UART: [fwproc] Recv command 0x46504c67
2,366,620 >>> mbox cmd response data (8 bytes)
2,366,621 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,366,928 UART: [fwproc] Recv command 0x43415053
2,367,921 >>> mbox cmd response data (24 bytes)
2,367,922 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,368,049 UART: [fwproc] Recv command 0x4d454153
2,372,072 >>> mbox cmd response data (12 bytes)
2,372,073 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,372,366 UART: [fwproc] Recv command 0x46505344
2,373,266 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,589 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,678 >>> mbox cmd response data (36 bytes)
1,140,679 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,318 >>> mbox cmd response data (8 bytes)
2,112,319 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,731 >>> mbox cmd response data (8 bytes)
2,112,732 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,113,177 >>> mbox cmd response data (24 bytes)
2,113,178 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,116,576 >>> mbox cmd response data (12 bytes)
2,116,577 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,116,836 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,390 UART: [state] LifecycleState = Unprovisioned
86,045 UART: [state] DebugLocked = No
86,755 UART: [state] WD Timer not started. Device not locked for debugging
87,888 UART: [kat] SHA2-256
893,538 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,663 UART: [kat] ++
897,815 UART: [kat] sha1
902,019 UART: [kat] SHA2-256
903,959 UART: [kat] SHA2-384
906,560 UART: [kat] SHA2-512-ACC
908,461 UART: [kat] ECC-384
917,860 UART: [kat] HMAC-384Kdf
922,448 UART: [kat] LMS
1,170,776 UART: [kat] --
1,171,721 UART: [cold-reset] ++
1,172,217 UART: [fht] FHT @ 0x50003400
1,174,876 UART: [idev] ++
1,175,044 UART: [idev] CDI.KEYID = 6
1,175,404 UART: [idev] SUBJECT.KEYID = 7
1,175,828 UART: [idev] UDS.KEYID = 0
1,176,173 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,824 UART: [idev] Erasing UDS.KEYID = 0
1,200,289 UART: [idev] Sha1 KeyId Algorithm
1,208,633 UART: [idev] --
1,209,527 UART: [ldev] ++
1,209,695 UART: [ldev] CDI.KEYID = 6
1,210,058 UART: [ldev] SUBJECT.KEYID = 5
1,210,484 UART: [ldev] AUTHORITY.KEYID = 7
1,210,947 UART: [ldev] FE.KEYID = 1
1,215,821 UART: [ldev] Erasing FE.KEYID = 1
1,241,714 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,229 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,945 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,836 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,548 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,485 UART: [ldev] --
1,280,938 UART: [fwproc] Wait for Commands...
1,281,608 UART: [fwproc] Recv command 0x46505652
1,282,429 UART: [rt] FIPS Version
1,282,983 >>> mbox cmd response data (36 bytes)
1,282,984 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,283,066 UART: [fwproc] Recv command 0x46504c54
1,283,912 UART: [kat] SHA2-256
2,089,562 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,687 UART: [kat] ++
2,093,839 UART: [kat] sha1
2,098,197 UART: [kat] SHA2-256
2,100,137 UART: [kat] SHA2-384
2,102,662 UART: [kat] SHA2-512-ACC
2,104,562 UART: [kat] ECC-384
2,114,525 UART: [kat] HMAC-384Kdf
2,118,941 UART: [kat] LMS
2,367,269 UART: [kat] --
2,367,507 >>> mbox cmd response data (8 bytes)
2,367,508 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,593 UART: [fwproc] Recv command 0x46504c67
2,368,486 >>> mbox cmd response data (8 bytes)
2,368,487 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,368,692 UART: [fwproc] Recv command 0x43415053
2,369,675 >>> mbox cmd response data (24 bytes)
2,369,676 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,369,911 UART: [fwproc] Recv command 0x4d454153
2,373,920 >>> mbox cmd response data (12 bytes)
2,373,921 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,374,172 UART: [fwproc] Recv command 0x46505344
2,375,059 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,391 >>> mbox cmd response data (36 bytes)
1,140,392 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,113,052 >>> mbox cmd response data (8 bytes)
2,113,053 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,447 >>> mbox cmd response data (8 bytes)
2,113,448 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,114,032 >>> mbox cmd response data (24 bytes)
2,114,033 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,117,435 >>> mbox cmd response data (12 bytes)
2,117,436 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,117,762 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,373 UART: [state] LifecycleState = Unprovisioned
86,028 UART: [state] DebugLocked = No
86,690 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
893,517 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,642 UART: [kat] ++
897,794 UART: [kat] sha1
901,976 UART: [kat] SHA2-256
903,916 UART: [kat] SHA2-384
906,607 UART: [kat] SHA2-512-ACC
908,508 UART: [kat] ECC-384
918,407 UART: [kat] HMAC-384Kdf
923,061 UART: [kat] LMS
1,171,389 UART: [kat] --
1,172,242 UART: [cold-reset] ++
1,172,572 UART: [fht] FHT @ 0x50003400
1,175,317 UART: [idev] ++
1,175,485 UART: [idev] CDI.KEYID = 6
1,175,845 UART: [idev] SUBJECT.KEYID = 7
1,176,269 UART: [idev] UDS.KEYID = 0
1,176,614 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,183,927 UART: [idev] Erasing UDS.KEYID = 0
1,201,350 UART: [idev] Sha1 KeyId Algorithm
1,209,930 UART: [idev] --
1,210,804 UART: [ldev] ++
1,210,972 UART: [ldev] CDI.KEYID = 6
1,211,335 UART: [ldev] SUBJECT.KEYID = 5
1,211,761 UART: [ldev] AUTHORITY.KEYID = 7
1,212,224 UART: [ldev] FE.KEYID = 1
1,217,440 UART: [ldev] Erasing FE.KEYID = 1
1,243,935 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,640 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,356 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,247 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,959 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,002 UART: [ldev] --
1,283,295 UART: [fwproc] Wait for Commands...
1,283,895 UART: [fwproc] Recv command 0x46505652
1,284,716 UART: [rt] FIPS Version
1,285,270 >>> mbox cmd response data (36 bytes)
1,285,271 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,285,423 UART: [fwproc] Recv command 0x46504c54
1,286,269 UART: [kat] SHA2-256
2,091,919 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,096,044 UART: [kat] ++
2,096,196 UART: [kat] sha1
2,100,272 UART: [kat] SHA2-256
2,102,212 UART: [kat] SHA2-384
2,105,029 UART: [kat] SHA2-512-ACC
2,106,929 UART: [kat] ECC-384
2,116,444 UART: [kat] HMAC-384Kdf
2,121,078 UART: [kat] LMS
2,369,406 UART: [kat] --
2,369,644 >>> mbox cmd response data (8 bytes)
2,369,645 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,369,942 UART: [fwproc] Recv command 0x46504c67
2,370,835 >>> mbox cmd response data (8 bytes)
2,370,836 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,371,023 UART: [fwproc] Recv command 0x43415053
2,372,006 >>> mbox cmd response data (24 bytes)
2,372,007 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,372,306 UART: [fwproc] Recv command 0x4d454153
2,376,315 >>> mbox cmd response data (12 bytes)
2,376,316 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,376,551 UART: [fwproc] Recv command 0x46505344
2,377,438 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,430 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,141,010 >>> mbox cmd response data (36 bytes)
1,141,011 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,114,087 >>> mbox cmd response data (8 bytes)
2,114,088 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,114,358 >>> mbox cmd response data (8 bytes)
2,114,359 <<< Executing mbox cmd 0x43415053 (4 bytes) from SoC
2,114,815 >>> mbox cmd response data (24 bytes)
2,114,816 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
2,118,184 >>> mbox cmd response data (12 bytes)
2,118,185 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,118,533 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,962 writing to cptra_bootfsm_go
192,162 UART:
192,521 UART: Running Caliptra ROM ...
193,709 UART:
193,864 UART: [state] CFI Enabled
266,579 UART: [state] LifecycleState = Unprovisioned
268,498 UART: [state] DebugLocked = No
270,469 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
275,494 UART: [kat] SHA2-256
445,182 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
455,680 UART: [kat] ++
456,138 UART: [kat] sha1
466,663 UART: [kat] SHA2-256
469,400 UART: [kat] SHA2-384
474,616 UART: [kat] SHA2-512-ACC
476,991 UART: [kat] ECC-384
2,770,644 UART: [kat] HMAC-384Kdf
2,801,142 UART: [kat] LMS
3,991,472 UART: [kat] --
3,996,818 UART: [cold-reset] ++
3,998,751 UART: [fht] Storing FHT @ 0x50003400
4,010,375 UART: [idev] ++
4,010,952 UART: [idev] CDI.KEYID = 6
4,011,882 UART: [idev] SUBJECT.KEYID = 7
4,013,153 UART: [idev] UDS.KEYID = 0
4,014,213 ready_for_fw is high
4,014,445 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,542 UART: [idev] Erasing UDS.KEYID = 0
7,345,917 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,182 UART: [idev] --
7,372,156 UART: [ldev] ++
7,372,732 UART: [ldev] CDI.KEYID = 6
7,373,678 UART: [ldev] SUBJECT.KEYID = 5
7,374,904 UART: [ldev] AUTHORITY.KEYID = 7
7,376,201 UART: [ldev] FE.KEYID = 1
7,422,347 UART: [ldev] Erasing FE.KEYID = 1
10,756,810 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,066,779 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,081,371 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,096,195 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,110,713 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,129,972 UART: [ldev] --
13,134,262 UART: [fwproc] Waiting for Commands...
13,136,697 UART: [fwproc] Received command 0x46574c44
13,138,882 UART: [fwproc] Received Image of size 118548 bytes
17,248,640 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,329,203 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,402,338 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,730,850 >>> mbox cmd response: success
17,733,855 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,735,285 UART: [afmc] ++
17,735,879 UART: [afmc] CDI.KEYID = 6
17,736,791 UART: [afmc] SUBJECT.KEYID = 7
17,738,066 UART: [afmc] AUTHORITY.KEYID = 5
21,108,180 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,409,717 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,411,999 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,426,420 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,441,145 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,455,540 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,476,954 UART: [afmc] --
23,481,356 UART: [cold-reset] --
23,486,079 UART: [state] Locking Datavault
23,491,858 UART: [state] Locking PCR0, PCR1 and PCR31
23,493,576 UART: [state] Locking ICCM
23,494,900 UART: [exit] Launching FMC @ 0x40000130
23,503,297 UART:
23,503,531 UART: Running Caliptra FMC ...
23,504,634 UART:
23,504,790 UART: [state] CFI Enabled
23,569,518 UART: [fht] FMC Alias Private Key: 7
25,909,686 UART: [art] Extend RT PCRs Done
25,910,938 UART: [art] Lock RT PCRs Done
25,912,701 UART: [art] Populate DV Done
25,918,281 UART: [fht] FMC Alias Private Key: 7
25,919,877 UART: [art] Derive CDI
25,920,699 UART: [art] Store in slot 0x4
25,968,542 UART: [art] Derive Key Pair
25,969,585 UART: [art] Store priv key in slot 0x5
29,262,414 UART: [art] Derive Key Pair - Done
29,275,521 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,563,411 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,923 UART: [art] PUB.X = C3F96D670FE2650D9E89EA94499A8A593D1FB84CE433635754BA3C25069AB429E658CF2C5A9FF2C4D74ABCBFBF559D10
31,572,249 UART: [art] PUB.Y = 57AE921AE5A7BC97EFEB7199FE154F026D10F01DE8A36C623D345A34151AC1F33E08BA2C1DEC911F058DCBA0B91EE467
31,579,501 UART: [art] SIG.R = 0E3498847EB3FCC2331BA11454D65FC142F846BB0305FFD75E85AE0F68DDB017529FFE336397ACA834E3A3335EE33433
31,586,887 UART: [art] SIG.S = DE538311DBA85E44D69D9BA1F214FF993BDF95DBC0C336BD0F2438502AAC8F46D3B824BBD22C5E149D206DBB51B46B17
32,891,969 UART: Caliptra RT
32,892,669 UART: [state] CFI Enabled
33,069,393 UART: [rt] RT listening for mailbox commands...
33,100,749 UART: [rt]cmd =0x46505652, len=4
33,102,021 UART: [rt] FIPS Version
33,103,404 >>> mbox cmd response data (36 bytes)
33,104,241 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,133,816 UART: [rt]cmd =0x46504c54, len=4
33,135,353 >>> mbox cmd response data (8 bytes)
33,135,700 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,165,993 UART: [rt]cmd =0x46504c67, len=4
33,167,489 >>> mbox cmd response: failed
33,168,258 UART: [rt] FIPS self test
33,169,197 UART: [kat] ++
33,169,648 UART: [kat] sha1
33,173,971 UART: [kat] SHA2-256
33,175,801 UART: [kat] SHA2-384
33,178,520 UART: [kat] SHA2-512-ACC
33,180,752 UART: [kat] ECC-384
36,454,787 UART: [kat] HMAC-384Kdf
36,462,770 UART: [kat] LMS
36,878,418 UART: [kat] --
40,907,561 UART: [rt] Verify complete
41,009,434 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,039,446 UART: [rt]cmd =0x46504c67, len=4
41,041,038 >>> mbox cmd response data (8 bytes)
41,041,398 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,071,157 UART: [rt]cmd =0x49444543, len=4
41,078,139 >>> mbox cmd response data (37 bytes)
41,078,727 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,108,486 UART: [rt]cmd =0x49444549, len=4
41,111,387 >>> mbox cmd response data (104 bytes)
41,112,267 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,142,031 UART: [rt]cmd =0x49444550, len=4
41,152,538 >>> mbox cmd response data (8 bytes)
41,152,944 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,182,710 UART: [rt]cmd =0x4c444556, len=4
41,193,830 >>> mbox cmd response data (687 bytes)
41,197,363 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,227,262 UART: [rt]cmd =0x43455246, len=4
41,240,240 >>> mbox cmd response data (920 bytes)
41,244,794 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,274,653 UART: [rt]cmd =0x43455252, len=4
41,286,046 >>> mbox cmd response data (783 bytes)
41,290,771 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,322,329 UART: [rt]cmd =0x53494756, len=196
42,614,190 >>> mbox cmd response data (8 bytes)
42,614,683 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,645,233 UART: [rt]cmd =0x4d454153, len=108
42,664,397 >>> mbox cmd response data (12 bytes)
42,664,854 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,694,655 UART: [rt]cmd =0x494e464f, len=4
42,698,906 >>> mbox cmd response data (312 bytes)
42,701,459 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,731,492 UART: [rt]cmd =0x54514754, len=24
42,734,030 >>> mbox cmd response data (8 bytes)
42,734,452 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,764,218 UART: [rt]cmd =0x47544744, len=8
42,767,111 >>> mbox cmd response data (104 bytes)
42,768,018 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,797,926 UART: [rt]cmd =0x50435252, len=8
42,799,938 >>> mbox cmd response data (8 bytes)
42,800,297 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,830,364 UART: [rt]cmd =0x50435251, len=36
43,988,877 >>> mbox cmd response data (1848 bytes)
43,997,770 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,028,102 UART: [rt]cmd =0x50435245, len=56
44,031,029 >>> mbox cmd response data (8 bytes)
44,031,481 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,061,270 UART: [rt]cmd =0x44504543, len=20
44,081,895 >>> mbox cmd response data (44 bytes)
44,082,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,112,517 UART: [rt]cmd =0x44504543, len=24
44,158,339 >>> mbox cmd response data (40 bytes)
44,159,043 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,189,628 UART: [rt]cmd =0x44504543, len=96
44,229,117 >>> mbox cmd response data (56 bytes)
44,229,889 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,260,141 UART: [rt]cmd =0x44504543, len=92
52,340,235 >>> mbox cmd response data (6284 bytes)
52,369,933 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,400,892 UART: [rt]cmd =0x44504543, len=136
58,033,599 >>> mbox cmd response data (136 bytes)
58,034,938 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,065,012 UART: [rt]cmd =0x44504543, len=40
58,104,874 >>> mbox cmd response data (40 bytes)
58,105,555 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,135,478 UART: [rt]cmd =0x44504543, len=28
58,178,067 >>> mbox cmd response data (2076 bytes)
58,187,976 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,218,105 UART: [rt]cmd =0x44504543, len=36
58,248,110 >>> mbox cmd response data (24 bytes)
58,248,676 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,278,437 UART: [rt]cmd =0x4453424c, len=4
61,596,885 >>> mbox cmd response data (8 bytes)
61,597,376 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,626,982 UART: [rt]cmd =0x46505344, len=4
61,737,126 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.20s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,003 writing to cptra_bootfsm_go
3,804,989 ready_for_fw is high
3,805,440 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,965,221 >>> mbox cmd response: success
17,968,526 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,652,726 UART:
23,653,109 UART: Running Caliptra FMC ...
23,654,351 UART:
23,654,523 UART: [state] CFI Enabled
23,725,219 UART: [fht] FMC Alias Private Key: 7
26,086,788 UART: [art] Extend RT PCRs Done
26,088,020 UART: [art] Lock RT PCRs Done
26,089,937 UART: [art] Populate DV Done
26,095,365 UART: [fht] FMC Alias Private Key: 7
26,096,966 UART: [art] Derive CDI
26,097,809 UART: [art] Store in slot 0x4
26,155,116 UART: [art] Derive Key Pair
26,156,206 UART: [art] Store priv key in slot 0x5
29,449,148 UART: [art] Derive Key Pair - Done
29,462,147 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,751,195 UART: [art] Erasing AUTHORITY.KEYID = 7
31,752,704 UART: [art] PUB.X = 4B1712918FE56069E4DF0DBC62B0177D0428AC5538A30EE1E5650C29AA1BC8E883A1D1F3874475F13771B228CF21B5E6
31,759,949 UART: [art] PUB.Y = AF8376CB4B1709D2E71675FEAA9C029F7B627C7DA6F9809937A02AD4DE1FF05CFAB3CB1CB8BC87601453244B9AF1813A
31,767,260 UART: [art] SIG.R = 5201D06AA0DD159D564C924D47D145450EFD7EB58B9B58200B41D5602F3CD5BD8901C5D2BB048F768CB9DD50E2D0F871
31,774,660 UART: [art] SIG.S = 8119229194D9C3A0C0D3A3E74FF4758A7B69D0D6574B08F490FA512A77FB40866128169E174DB2039961C6993E72653F
33,079,980 UART: Caliptra RT
33,080,699 UART: [state] CFI Enabled
33,258,131 UART: [rt] RT listening for mailbox commands...
33,289,228 UART: [rt]cmd =0x46505652, len=4
33,290,479 UART: [rt] FIPS Version
33,291,637 >>> mbox cmd response data (36 bytes)
33,292,367 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,321,926 UART: [rt]cmd =0x46504c54, len=4
33,323,543 >>> mbox cmd response data (8 bytes)
33,323,879 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,353,584 UART: [rt]cmd =0x46504c67, len=4
33,354,876 >>> mbox cmd response: failed
33,356,115 UART: [rt] FIPS self test
33,357,047 UART: [kat] ++
33,357,550 UART: [kat] sha1
33,362,045 UART: [kat] SHA2-256
33,363,842 UART: [kat] SHA2-384
33,366,492 UART: [kat] SHA2-512-ACC
33,368,709 UART: [kat] ECC-384
36,644,272 UART: [kat] HMAC-384Kdf
36,651,413 UART: [kat] LMS
37,067,077 UART: [kat] --
41,076,635 UART: [rt] Verify complete
41,197,418 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,227,220 UART: [rt]cmd =0x46504c67, len=4
41,228,724 >>> mbox cmd response data (8 bytes)
41,229,096 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,258,798 UART: [rt]cmd =0x49444543, len=4
41,265,996 >>> mbox cmd response data (37 bytes)
41,266,576 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,296,169 UART: [rt]cmd =0x49444549, len=4
41,298,991 >>> mbox cmd response data (104 bytes)
41,299,774 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,329,412 UART: [rt]cmd =0x49444550, len=4
41,339,879 >>> mbox cmd response data (8 bytes)
41,340,293 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,369,940 UART: [rt]cmd =0x4c444556, len=4
41,381,024 >>> mbox cmd response data (687 bytes)
41,384,564 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,414,268 UART: [rt]cmd =0x43455246, len=4
41,427,280 >>> mbox cmd response data (920 bytes)
41,431,839 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,461,743 UART: [rt]cmd =0x43455252, len=4
41,473,325 >>> mbox cmd response data (783 bytes)
41,478,050 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,509,614 UART: [rt]cmd =0x53494756, len=196
42,800,922 >>> mbox cmd response data (8 bytes)
42,801,924 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,832,577 UART: [rt]cmd =0x4d454153, len=108
42,850,443 >>> mbox cmd response data (12 bytes)
42,850,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,880,753 UART: [rt]cmd =0x494e464f, len=4
42,885,109 >>> mbox cmd response data (312 bytes)
42,887,803 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,917,879 UART: [rt]cmd =0x54514754, len=24
42,920,558 >>> mbox cmd response data (8 bytes)
42,921,124 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,950,866 UART: [rt]cmd =0x47544744, len=8
42,953,956 >>> mbox cmd response data (104 bytes)
42,954,928 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,984,561 UART: [rt]cmd =0x50435252, len=8
42,986,359 >>> mbox cmd response data (8 bytes)
42,987,252 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
43,017,475 UART: [rt]cmd =0x50435251, len=36
44,177,892 >>> mbox cmd response data (1848 bytes)
44,187,098 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,217,500 UART: [rt]cmd =0x50435245, len=56
44,220,677 >>> mbox cmd response data (8 bytes)
44,221,149 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,251,153 UART: [rt]cmd =0x44504543, len=20
44,271,386 >>> mbox cmd response data (44 bytes)
44,272,143 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,302,043 UART: [rt]cmd =0x44504543, len=24
44,347,919 >>> mbox cmd response data (40 bytes)
44,348,622 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,379,099 UART: [rt]cmd =0x44504543, len=96
44,417,887 >>> mbox cmd response data (56 bytes)
44,418,619 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,449,101 UART: [rt]cmd =0x44504543, len=92
52,490,093 >>> mbox cmd response data (6284 bytes)
52,519,946 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,551,130 UART: [rt]cmd =0x44504543, len=136
58,184,381 >>> mbox cmd response data (136 bytes)
58,185,646 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,215,596 UART: [rt]cmd =0x44504543, len=40
58,255,871 >>> mbox cmd response data (40 bytes)
58,256,582 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,286,392 UART: [rt]cmd =0x44504543, len=28
58,329,469 >>> mbox cmd response data (2076 bytes)
58,339,380 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,369,405 UART: [rt]cmd =0x44504543, len=36
58,399,463 >>> mbox cmd response data (24 bytes)
58,400,042 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,429,601 UART: [rt]cmd =0x4453424c, len=4
61,748,283 >>> mbox cmd response data (8 bytes)
61,748,801 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,778,735 UART: [rt]cmd =0x46505344, len=4
61,888,838 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,234 writing to cptra_bootfsm_go
192,353 UART:
192,727 UART: Running Caliptra ROM ...
193,921 UART:
603,579 UART: [state] CFI Enabled
617,054 UART: [state] LifecycleState = Unprovisioned
619,031 UART: [state] DebugLocked = No
620,774 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,364 UART: [kat] SHA2-256
795,092 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,690 UART: [kat] ++
806,163 UART: [kat] sha1
815,982 UART: [kat] SHA2-256
818,642 UART: [kat] SHA2-384
823,506 UART: [kat] SHA2-512-ACC
825,885 UART: [kat] ECC-384
3,110,306 UART: [kat] HMAC-384Kdf
3,121,202 UART: [kat] LMS
4,311,261 UART: [kat] --
4,315,360 UART: [cold-reset] ++
4,316,664 UART: [fht] Storing FHT @ 0x50003400
4,327,307 UART: [idev] ++
4,327,877 UART: [idev] CDI.KEYID = 6
4,328,769 UART: [idev] SUBJECT.KEYID = 7
4,330,022 UART: [idev] UDS.KEYID = 0
4,331,052 ready_for_fw is high
4,331,292 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,480,278 UART: [idev] Erasing UDS.KEYID = 0
7,615,312 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,726 UART: [idev] --
7,642,047 UART: [ldev] ++
7,642,667 UART: [ldev] CDI.KEYID = 6
7,643,558 UART: [ldev] SUBJECT.KEYID = 5
7,644,780 UART: [ldev] AUTHORITY.KEYID = 7
7,646,022 UART: [ldev] FE.KEYID = 1
7,657,167 UART: [ldev] Erasing FE.KEYID = 1
10,944,885 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,236,921 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,251,536 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,266,337 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,280,838 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,298,973 UART: [ldev] --
13,304,622 UART: [fwproc] Waiting for Commands...
13,306,373 UART: [fwproc] Received command 0x46574c44
13,308,573 UART: [fwproc] Received Image of size 118548 bytes
17,415,433 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,487,637 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,560,825 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,889,849 >>> mbox cmd response: success
17,892,788 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,894,110 UART: [afmc] ++
17,894,707 UART: [afmc] CDI.KEYID = 6
17,895,680 UART: [afmc] SUBJECT.KEYID = 7
17,896,845 UART: [afmc] AUTHORITY.KEYID = 5
21,215,045 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,510,112 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,512,377 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,526,808 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,541,539 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,555,955 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,577,351 UART: [afmc] --
23,580,366 UART: [cold-reset] --
23,584,728 UART: [state] Locking Datavault
23,589,120 UART: [state] Locking PCR0, PCR1 and PCR31
23,590,825 UART: [state] Locking ICCM
23,593,143 UART: [exit] Launching FMC @ 0x40000130
23,601,542 UART:
23,601,789 UART: Running Caliptra FMC ...
23,602,896 UART:
23,603,064 UART: [state] CFI Enabled
23,611,171 UART: [fht] FMC Alias Private Key: 7
25,950,810 UART: [art] Extend RT PCRs Done
25,952,038 UART: [art] Lock RT PCRs Done
25,953,427 UART: [art] Populate DV Done
25,959,014 UART: [fht] FMC Alias Private Key: 7
25,960,615 UART: [art] Derive CDI
25,961,372 UART: [art] Store in slot 0x4
26,004,029 UART: [art] Derive Key Pair
26,005,049 UART: [art] Store priv key in slot 0x5
29,247,055 UART: [art] Derive Key Pair - Done
29,259,908 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,540,134 UART: [art] Erasing AUTHORITY.KEYID = 7
31,541,653 UART: [art] PUB.X = C6B5D541F278488B4371622CBFEB8B0E25ABA76620E2A72E92869FE77643998E5DAC4EF457AB81E9FB1E8A94BE43A722
31,548,896 UART: [art] PUB.Y = D4621B5AC81F530524BB891D44F3DBFC6DE40E87201D03183E32D024A69359D4B6356ED5C8547EC67AAAA9CCA4EBD0DD
31,556,183 UART: [art] SIG.R = 814BBF88EBF97AA946151371036080F057853E9B61F97B5B34685ACEE9D620E2F606E8691CA73F1C0CF4B836E5236EB6
31,563,608 UART: [art] SIG.S = 7C5B819423DD27882DEAC4537BF6A3C02BD1AEA771CD1CF65CFBCD3B7956416DAD0FB9161A94655C150967B010A631AD
32,869,208 UART: Caliptra RT
32,869,933 UART: [state] CFI Enabled
33,002,306 UART: [rt] RT listening for mailbox commands...
33,033,626 UART: [rt]cmd =0x46505652, len=4
33,034,889 UART: [rt] FIPS Version
33,035,927 >>> mbox cmd response data (36 bytes)
33,036,642 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,066,250 UART: [rt]cmd =0x46504c54, len=4
33,067,842 >>> mbox cmd response data (8 bytes)
33,068,193 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,098,192 UART: [rt]cmd =0x46504c67, len=4
33,099,523 >>> mbox cmd response: failed
33,100,635 UART: [rt] FIPS self test
33,101,573 UART: [kat] ++
33,102,024 UART: [kat] sha1
33,106,481 UART: [kat] SHA2-256
33,108,318 UART: [kat] SHA2-384
33,111,138 UART: [kat] SHA2-512-ACC
33,113,356 UART: [kat] ECC-384
36,355,826 UART: [kat] HMAC-384Kdf
36,361,683 UART: [kat] LMS
36,777,339 UART: [kat] --
40,808,081 UART: [rt] Verify complete
40,942,157 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,971,730 UART: [rt]cmd =0x46504c67, len=4
40,973,480 >>> mbox cmd response data (8 bytes)
40,973,831 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,003,541 UART: [rt]cmd =0x49444543, len=4
41,010,559 >>> mbox cmd response data (37 bytes)
41,011,173 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,040,894 UART: [rt]cmd =0x49444549, len=4
41,043,456 >>> mbox cmd response data (104 bytes)
41,044,336 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,074,293 UART: [rt]cmd =0x49444550, len=4
41,085,020 >>> mbox cmd response data (8 bytes)
41,085,496 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,115,267 UART: [rt]cmd =0x4c444556, len=4
41,126,328 >>> mbox cmd response data (687 bytes)
41,129,847 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,159,478 UART: [rt]cmd =0x43455246, len=4
41,172,618 >>> mbox cmd response data (920 bytes)
41,177,186 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,206,993 UART: [rt]cmd =0x43455252, len=4
41,218,248 >>> mbox cmd response data (783 bytes)
41,222,955 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,254,531 UART: [rt]cmd =0x53494756, len=196
42,546,136 >>> mbox cmd response data (8 bytes)
42,546,623 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,577,169 UART: [rt]cmd =0x4d454153, len=108
42,596,599 >>> mbox cmd response data (12 bytes)
42,597,029 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,626,912 UART: [rt]cmd =0x494e464f, len=4
42,631,127 >>> mbox cmd response data (312 bytes)
42,633,628 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,663,989 UART: [rt]cmd =0x54514754, len=24
42,666,432 >>> mbox cmd response data (8 bytes)
42,666,846 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,696,590 UART: [rt]cmd =0x47544744, len=8
42,699,727 >>> mbox cmd response data (104 bytes)
42,700,598 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,730,100 UART: [rt]cmd =0x50435252, len=8
42,731,950 >>> mbox cmd response data (8 bytes)
42,732,273 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,762,194 UART: [rt]cmd =0x50435251, len=36
43,917,524 >>> mbox cmd response data (1848 bytes)
43,926,461 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
43,956,898 UART: [rt]cmd =0x50435245, len=56
43,959,995 >>> mbox cmd response data (8 bytes)
43,960,489 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
43,990,614 UART: [rt]cmd =0x44504543, len=20
44,010,987 >>> mbox cmd response data (44 bytes)
44,011,688 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,041,445 UART: [rt]cmd =0x44504543, len=24
44,068,916 >>> mbox cmd response data (40 bytes)
44,069,597 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,100,348 UART: [rt]cmd =0x44504543, len=96
44,138,060 >>> mbox cmd response data (56 bytes)
44,138,836 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,169,144 UART: [rt]cmd =0x44504543, len=92
52,152,230 >>> mbox cmd response data (6284 bytes)
52,181,346 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,212,288 UART: [rt]cmd =0x44504543, len=136
57,773,860 >>> mbox cmd response data (136 bytes)
57,775,696 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
57,805,850 UART: [rt]cmd =0x44504543, len=40
57,833,428 >>> mbox cmd response data (40 bytes)
57,834,130 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
57,864,091 UART: [rt]cmd =0x44504543, len=28
57,907,053 >>> mbox cmd response data (2076 bytes)
57,917,002 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
57,947,150 UART: [rt]cmd =0x44504543, len=36
57,977,134 >>> mbox cmd response data (24 bytes)
57,977,742 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,007,567 UART: [rt]cmd =0x4453424c, len=4
61,253,808 >>> mbox cmd response data (8 bytes)
61,254,884 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,284,859 UART: [rt]cmd =0x46505344, len=4
61,394,364 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.18s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,290 writing to cptra_bootfsm_go
4,123,991 ready_for_fw is high
4,124,435 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,149,263 >>> mbox cmd response: success
18,152,699 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
23,793,279 UART:
23,793,662 UART: Running Caliptra FMC ...
23,794,829 UART:
23,794,996 UART: [state] CFI Enabled
23,802,987 UART: [fht] FMC Alias Private Key: 7
26,142,082 UART: [art] Extend RT PCRs Done
26,143,326 UART: [art] Lock RT PCRs Done
26,145,150 UART: [art] Populate DV Done
26,150,840 UART: [fht] FMC Alias Private Key: 7
26,152,370 UART: [art] Derive CDI
26,153,137 UART: [art] Store in slot 0x4
26,196,013 UART: [art] Derive Key Pair
26,197,028 UART: [art] Store priv key in slot 0x5
29,438,560 UART: [art] Derive Key Pair - Done
29,451,504 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,731,527 UART: [art] Erasing AUTHORITY.KEYID = 7
31,733,037 UART: [art] PUB.X = F8956C7AC83E155EC312A6BDC3ED078A51FB6CFAD5D4E73C77EA69D8DC0AA05B6A2428D958A1A56981D0E61363AD5AE1
31,740,355 UART: [art] PUB.Y = F2916B617278F9A5ACB281637C31D510010B023FF3CF258BAF965D9DB0D43EF88F3B7B4C00F0918ED498B8BD4E827DD1
31,747,562 UART: [art] SIG.R = 3CB74D8F2EA5EA46D7592649971F59A3C0C2D3C4AD5AAA7B028DC11A7D962637A27897E4E00DB5CC0CC5514DBA6CEBC2
31,755,021 UART: [art] SIG.S = A1636E1069B4313314B962A09950E13ECBAE6D66CABC9470456826ADF85D80F1F177B4B671EB3457AC6F0D791BB9D7FE
33,059,946 UART: Caliptra RT
33,060,660 UART: [state] CFI Enabled
33,193,833 UART: [rt] RT listening for mailbox commands...
33,225,358 UART: [rt]cmd =0x46505652, len=4
33,226,611 UART: [rt] FIPS Version
33,227,774 >>> mbox cmd response data (36 bytes)
33,228,486 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
33,258,463 UART: [rt]cmd =0x46504c54, len=4
33,260,104 >>> mbox cmd response data (8 bytes)
33,260,449 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,290,759 UART: [rt]cmd =0x46504c67, len=4
33,292,089 >>> mbox cmd response: failed
33,292,894 UART: [rt] FIPS self test
33,293,744 UART: [kat] ++
33,294,240 UART: [kat] sha1
33,298,635 UART: [kat] SHA2-256
33,300,478 UART: [kat] SHA2-384
33,303,339 UART: [kat] SHA2-512-ACC
33,305,560 UART: [kat] ECC-384
36,548,357 UART: [kat] HMAC-384Kdf
36,554,294 UART: [kat] LMS
36,969,964 UART: [kat] --
40,978,010 UART: [rt] Verify complete
41,136,680 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,166,773 UART: [rt]cmd =0x46504c67, len=4
41,168,263 >>> mbox cmd response data (8 bytes)
41,168,659 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
41,198,370 UART: [rt]cmd =0x49444543, len=4
41,205,448 >>> mbox cmd response data (37 bytes)
41,206,055 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
41,235,717 UART: [rt]cmd =0x49444549, len=4
41,238,430 >>> mbox cmd response data (104 bytes)
41,239,223 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
41,269,084 UART: [rt]cmd =0x49444550, len=4
41,279,717 >>> mbox cmd response data (8 bytes)
41,280,152 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
41,309,807 UART: [rt]cmd =0x4c444556, len=4
41,320,901 >>> mbox cmd response data (687 bytes)
41,324,438 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
41,354,319 UART: [rt]cmd =0x43455246, len=4
41,367,279 >>> mbox cmd response data (920 bytes)
41,371,844 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
41,401,912 UART: [rt]cmd =0x43455252, len=4
41,413,384 >>> mbox cmd response data (783 bytes)
41,418,092 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
41,449,773 UART: [rt]cmd =0x53494756, len=196
42,741,416 >>> mbox cmd response data (8 bytes)
42,741,918 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
42,772,633 UART: [rt]cmd =0x4d454153, len=108
42,792,129 >>> mbox cmd response data (12 bytes)
42,792,601 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
42,822,364 UART: [rt]cmd =0x494e464f, len=4
42,826,757 >>> mbox cmd response data (312 bytes)
42,828,989 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
42,859,301 UART: [rt]cmd =0x54514754, len=24
42,861,957 >>> mbox cmd response data (8 bytes)
42,862,367 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
42,892,105 UART: [rt]cmd =0x47544744, len=8
42,895,232 >>> mbox cmd response data (104 bytes)
42,896,108 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
42,925,959 UART: [rt]cmd =0x50435252, len=8
42,927,808 >>> mbox cmd response data (8 bytes)
42,928,165 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
42,958,185 UART: [rt]cmd =0x50435251, len=36
44,113,628 >>> mbox cmd response data (1848 bytes)
44,122,534 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
44,152,753 UART: [rt]cmd =0x50435245, len=56
44,155,779 >>> mbox cmd response data (8 bytes)
44,156,249 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
44,186,201 UART: [rt]cmd =0x44504543, len=20
44,206,584 >>> mbox cmd response data (44 bytes)
44,207,303 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
44,237,176 UART: [rt]cmd =0x44504543, len=24
44,264,929 >>> mbox cmd response data (40 bytes)
44,265,610 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
44,296,037 UART: [rt]cmd =0x44504543, len=96
44,334,558 >>> mbox cmd response data (56 bytes)
44,335,338 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
44,365,706 UART: [rt]cmd =0x44504543, len=92
52,347,508 >>> mbox cmd response data (6284 bytes)
52,376,618 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
52,407,674 UART: [rt]cmd =0x44504543, len=136
57,968,609 >>> mbox cmd response data (136 bytes)
57,969,837 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
58,000,338 UART: [rt]cmd =0x44504543, len=40
58,027,879 >>> mbox cmd response data (40 bytes)
58,028,579 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
58,058,599 UART: [rt]cmd =0x44504543, len=28
58,101,722 >>> mbox cmd response data (2076 bytes)
58,111,650 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
58,141,615 UART: [rt]cmd =0x44504543, len=36
58,171,550 >>> mbox cmd response data (24 bytes)
58,172,156 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
58,201,765 UART: [rt]cmd =0x4453424c, len=4
61,447,796 >>> mbox cmd response data (8 bytes)
61,448,357 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
61,477,969 UART: [rt]cmd =0x46505344, len=4
61,588,106 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 3.19s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
192,533 UART:
192,893 UART: Running Caliptra ROM ...
194,125 UART:
194,282 UART: [state] CFI Enabled
265,125 UART: [state] LifecycleState = Unprovisioned
267,110 UART: [state] DebugLocked = No
269,720 UART: [state] WD Timer not started. Device not locked for debugging
273,635 UART: [kat] SHA2-256
453,287 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
464,102 UART: [kat] ++
464,604 UART: [kat] sha1
475,484 UART: [kat] SHA2-256
478,220 UART: [kat] SHA2-384
484,143 UART: [kat] SHA2-512-ACC
486,518 UART: [kat] ECC-384
2,947,287 UART: [kat] HMAC-384Kdf
2,971,161 UART: [kat] LMS
3,447,670 UART: [kat] --
3,451,541 UART: [cold-reset] ++
3,453,842 UART: [fht] FHT @ 0x50003400
3,465,128 UART: [idev] ++
3,465,734 UART: [idev] CDI.KEYID = 6
3,466,664 UART: [idev] SUBJECT.KEYID = 7
3,467,849 UART: [idev] UDS.KEYID = 0
3,468,859 ready_for_fw is high
3,469,090 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,618,113 UART: [idev] Erasing UDS.KEYID = 0
5,990,544 UART: [idev] Sha1 KeyId Algorithm
6,014,175 UART: [idev] --
6,019,854 UART: [ldev] ++
6,020,465 UART: [ldev] CDI.KEYID = 6
6,021,360 UART: [ldev] SUBJECT.KEYID = 5
6,022,494 UART: [ldev] AUTHORITY.KEYID = 7
6,023,790 UART: [ldev] FE.KEYID = 1
6,059,023 UART: [ldev] Erasing FE.KEYID = 1
8,566,029 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,300,898 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,316,767 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,332,627 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,348,222 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,370,362 UART: [ldev] --
10,374,952 UART: [fwproc] Wait for Commands...
10,378,083 UART: [fwproc] Recv command 0x46574c44
10,380,079 UART: [fwproc] Recv'd Img size: 118548 bytes
13,862,588 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,942,509 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,015,548 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,789 >>> mbox cmd response: success
14,346,774 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,348,416 UART: [afmc] ++
14,349,004 UART: [afmc] CDI.KEYID = 6
14,349,926 UART: [afmc] SUBJECT.KEYID = 7
14,351,149 UART: [afmc] AUTHORITY.KEYID = 5
16,897,704 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,619,612 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,621,804 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,637,601 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,653,661 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,669,244 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,693,666 UART: [afmc] --
18,697,704 UART: [cold-reset] --
18,703,301 UART: [state] Locking Datavault
18,708,555 UART: [state] Locking PCR0, PCR1 and PCR31
18,710,260 UART: [state] Locking ICCM
18,712,999 UART: [exit] Launching FMC @ 0x40000130
18,721,409 UART:
18,721,652 UART: Running Caliptra FMC ...
18,722,760 UART:
18,722,941 UART: [state] CFI Enabled
18,777,017 UART: [fht] FMC Alias Private Key: 7
20,543,305 UART: [art] Extend RT PCRs Done
20,544,532 UART: [art] Lock RT PCRs Done
20,546,140 UART: [art] Populate DV Done
20,551,664 UART: [fht] FMC Alias Private Key: 7
20,553,152 UART: [art] Derive CDI
20,553,895 UART: [art] Store in slot 0x4
20,609,558 UART: [art] Derive Key Pair
20,610,599 UART: [art] Store priv key in slot 0x5
23,073,548 UART: [art] Derive Key Pair - Done
23,086,312 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,799,477 UART: [art] Erasing AUTHORITY.KEYID = 7
24,800,994 UART: [art] PUB.X = C93EB9CD135CBAE88B976DDC0ACF25BD5A8F0729AC507DED44FC46C31C3DC81554B74374630FBD8B760CE846B204E16C
24,808,307 UART: [art] PUB.Y = 817F7D30938AF8C16E8A0FBA2E36B1E867621D20EC76BF730B2CEA114D1BC83D05621D1D820869D03BE953071CCB58C1
24,815,549 UART: [art] SIG.R = D1CB99049D8FFDB058817694804DFDDF160D0C33171A4DCD5D72BFA44155072DF89D9B564BCF8E59F681260EAE1FF830
24,822,996 UART: [art] SIG.S = 5AA2AF418BB7E4A80D0A54FD0D3CBE91970563730DD8C74CBF295C175850B758B6612B87962E94C04488EB6ECDAD028F
25,802,506 UART: Caliptra RT
25,803,229 UART: [state] CFI Enabled
25,982,674 UART: [rt] RT listening for mailbox commands...
26,014,196 UART: [rt]cmd =0x46505652, len=4
26,015,458 UART: [rt] FIPS Version
26,016,516 >>> mbox cmd response data (36 bytes)
26,017,207 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,046,789 UART: [rt]cmd =0x46504c54, len=4
26,048,367 >>> mbox cmd response data (8 bytes)
26,048,718 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,079,133 UART: [rt]cmd =0x46504c67, len=4
26,080,556 >>> mbox cmd response: failed
26,081,432 UART: [rt] FIPS self test
26,082,373 UART: [kat] ++
26,082,834 UART: [kat] sha1
26,087,261 UART: [kat] SHA2-256
26,089,066 UART: [kat] SHA2-384
26,092,000 UART: [kat] SHA2-512-ACC
26,094,192 UART: [kat] ECC-384
28,538,981 UART: [kat] HMAC-384Kdf
28,546,203 UART: [kat] LMS
28,755,363 UART: [kat] --
32,134,104 UART: [rt] Verify complete
32,228,208 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,258,297 UART: [rt]cmd =0x46504c67, len=4
32,259,973 >>> mbox cmd response data (8 bytes)
32,260,373 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,290,098 UART: [rt]cmd =0x49444543, len=4
32,296,932 >>> mbox cmd response data (37 bytes)
32,297,524 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,327,128 UART: [rt]cmd =0x49444549, len=4
32,330,005 >>> mbox cmd response data (104 bytes)
32,330,885 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,360,417 UART: [rt]cmd =0x49444550, len=4
32,371,116 >>> mbox cmd response data (8 bytes)
32,371,532 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,401,296 UART: [rt]cmd =0x4c444556, len=4
32,412,490 >>> mbox cmd response data (687 bytes)
32,416,012 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,445,829 UART: [rt]cmd =0x43455246, len=4
32,458,465 >>> mbox cmd response data (888 bytes)
32,462,884 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,492,464 UART: [rt]cmd =0x43455252, len=4
32,503,851 >>> mbox cmd response data (783 bytes)
32,508,609 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,540,223 UART: [rt]cmd =0x53494756, len=196
33,505,795 >>> mbox cmd response data (8 bytes)
33,506,309 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,536,975 UART: [rt]cmd =0x4d454153, len=108
33,556,307 >>> mbox cmd response data (12 bytes)
33,556,785 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,586,685 UART: [rt]cmd =0x494e464f, len=4
33,590,746 >>> mbox cmd response data (312 bytes)
33,593,273 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,623,054 UART: [rt]cmd =0x54514754, len=24
33,625,798 >>> mbox cmd response data (8 bytes)
33,626,225 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,656,052 UART: [rt]cmd =0x47544744, len=8
33,658,931 >>> mbox cmd response data (104 bytes)
33,659,816 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,689,802 UART: [rt]cmd =0x50435252, len=8
33,691,382 >>> mbox cmd response data (8 bytes)
33,691,707 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,721,944 UART: [rt]cmd =0x50435251, len=36
34,630,396 >>> mbox cmd response data (1848 bytes)
34,639,314 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,669,550 UART: [rt]cmd =0x50435245, len=56
34,672,550 >>> mbox cmd response data (8 bytes)
34,673,008 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,702,805 UART: [rt]cmd =0x44504543, len=20
34,723,268 >>> mbox cmd response data (44 bytes)
34,723,959 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,753,770 UART: [rt]cmd =0x44504543, len=24
34,791,616 >>> mbox cmd response data (40 bytes)
34,792,289 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,822,794 UART: [rt]cmd =0x44504543, len=96
34,862,045 >>> mbox cmd response data (56 bytes)
34,862,793 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,893,432 UART: [rt]cmd =0x44504543, len=92
40,993,222 >>> mbox cmd response data (6284 bytes)
41,022,304 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,053,281 UART: [rt]cmd =0x44504543, len=136
45,281,467 >>> mbox cmd response data (136 bytes)
45,282,696 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,312,975 UART: [rt]cmd =0x44504543, len=40
45,351,664 >>> mbox cmd response data (40 bytes)
45,352,349 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,382,178 UART: [rt]cmd =0x44504543, len=28
45,425,108 >>> mbox cmd response data (2076 bytes)
45,435,004 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,465,185 UART: [rt]cmd =0x44504543, len=36
45,494,991 >>> mbox cmd response data (24 bytes)
45,495,556 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,525,385 UART: [rt]cmd =0x4453424c, len=4
48,014,241 >>> mbox cmd response data (8 bytes)
48,014,748 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,044,550 UART: [rt]cmd =0x46505344, len=4
48,154,436 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,602 writing to cptra_bootfsm_go
3,468,797 ready_for_fw is high
3,469,747 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,253,575 >>> mbox cmd response: success
14,257,364 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,536,964 UART:
18,537,803 UART: Running Caliptra FMC ...
18,538,990 UART:
18,539,151 UART: [state] CFI Enabled
18,606,023 UART: [fht] FMC Alias Private Key: 7
20,372,198 UART: [art] Extend RT PCRs Done
20,373,863 UART: [art] Lock RT PCRs Done
20,374,949 UART: [art] Populate DV Done
20,380,246 UART: [fht] FMC Alias Private Key: 7
20,381,801 UART: [art] Derive CDI
20,382,578 UART: [art] Store in slot 0x4
20,440,916 UART: [art] Derive Key Pair
20,441,925 UART: [art] Store priv key in slot 0x5
22,904,746 UART: [art] Derive Key Pair - Done
22,917,889 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,630,827 UART: [art] Erasing AUTHORITY.KEYID = 7
24,632,371 UART: [art] PUB.X = 5BB78AA554EBF08AD7596D5AAFE46DC23BE2D7F51FA53F383DB62B2B2C114F7B1397AF21AF9701A190050B31C6B91F51
24,639,647 UART: [art] PUB.Y = 806A17A4300BF04F0965A2C41792D216C9319831C90FD8B8634AF0CB4782CF8352AC6055AF2EDB51BFD1399D30FEACCB
24,646,837 UART: [art] SIG.R = 111C0A43D2621C9CA82E509AC8F963B794F4539DCF03AFDDC8EBCD70735CF2A9632159566EDE80B3194FB76067678367
24,654,256 UART: [art] SIG.S = B5095828A5D26A2AEF514E616653355DE87B52C365CE8CC51CED753F062E3B5BE9B47E798BB07C923D5D557A48A70FC1
25,632,969 UART: Caliptra RT
25,633,677 UART: [state] CFI Enabled
25,814,327 UART: [rt] RT listening for mailbox commands...
25,845,650 UART: [rt]cmd =0x46505652, len=4
25,846,905 UART: [rt] FIPS Version
25,848,286 >>> mbox cmd response data (36 bytes)
25,849,129 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,878,738 UART: [rt]cmd =0x46504c54, len=4
25,880,166 >>> mbox cmd response data (8 bytes)
25,880,503 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,910,277 UART: [rt]cmd =0x46504c67, len=4
25,911,664 >>> mbox cmd response: failed
25,912,943 UART: [rt] FIPS self test
25,913,882 UART: [kat] ++
25,914,401 UART: [kat] sha1
25,918,826 UART: [kat] SHA2-256
25,920,637 UART: [kat] SHA2-384
25,923,430 UART: [kat] SHA2-512-ACC
25,925,653 UART: [kat] ECC-384
28,369,744 UART: [kat] HMAC-384Kdf
28,396,084 UART: [kat] LMS
28,605,221 UART: [kat] --
31,963,380 UART: [rt] Verify complete
32,051,799 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,081,503 UART: [rt]cmd =0x46504c67, len=4
32,083,154 >>> mbox cmd response data (8 bytes)
32,083,513 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,113,328 UART: [rt]cmd =0x49444543, len=4
32,120,365 >>> mbox cmd response data (37 bytes)
32,120,959 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,150,792 UART: [rt]cmd =0x49444549, len=4
32,153,489 >>> mbox cmd response data (104 bytes)
32,154,377 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,184,143 UART: [rt]cmd =0x49444550, len=4
32,194,524 >>> mbox cmd response data (8 bytes)
32,194,915 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,224,520 UART: [rt]cmd =0x4c444556, len=4
32,235,692 >>> mbox cmd response data (687 bytes)
32,239,216 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,269,250 UART: [rt]cmd =0x43455246, len=4
32,282,015 >>> mbox cmd response data (888 bytes)
32,286,414 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,316,176 UART: [rt]cmd =0x43455252, len=4
32,327,452 >>> mbox cmd response data (783 bytes)
32,332,183 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,363,795 UART: [rt]cmd =0x53494756, len=196
33,329,263 >>> mbox cmd response data (8 bytes)
33,329,756 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,360,367 UART: [rt]cmd =0x4d454153, len=108
33,379,195 >>> mbox cmd response data (12 bytes)
33,379,631 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,409,298 UART: [rt]cmd =0x494e464f, len=4
33,413,504 >>> mbox cmd response data (312 bytes)
33,416,037 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,446,124 UART: [rt]cmd =0x54514754, len=24
33,448,515 >>> mbox cmd response data (8 bytes)
33,448,940 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,478,496 UART: [rt]cmd =0x47544744, len=8
33,481,701 >>> mbox cmd response data (104 bytes)
33,482,560 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,512,081 UART: [rt]cmd =0x50435252, len=8
33,513,920 >>> mbox cmd response data (8 bytes)
33,514,260 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,544,215 UART: [rt]cmd =0x50435251, len=36
34,457,059 >>> mbox cmd response data (1848 bytes)
34,465,950 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,496,264 UART: [rt]cmd =0x50435245, len=56
34,499,184 >>> mbox cmd response data (8 bytes)
34,499,627 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,529,532 UART: [rt]cmd =0x44504543, len=20
34,550,303 >>> mbox cmd response data (44 bytes)
34,551,045 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,581,056 UART: [rt]cmd =0x44504543, len=24
34,618,332 >>> mbox cmd response data (40 bytes)
34,619,032 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,649,634 UART: [rt]cmd =0x44504543, len=96
34,688,646 >>> mbox cmd response data (56 bytes)
34,689,417 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,720,272 UART: [rt]cmd =0x44504543, len=92
40,819,096 >>> mbox cmd response data (6284 bytes)
40,848,364 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,879,534 UART: [rt]cmd =0x44504543, len=136
45,107,287 >>> mbox cmd response data (136 bytes)
45,108,559 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,138,513 UART: [rt]cmd =0x44504543, len=40
45,178,474 >>> mbox cmd response data (40 bytes)
45,179,227 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,209,109 UART: [rt]cmd =0x44504543, len=28
45,251,596 >>> mbox cmd response data (2076 bytes)
45,261,521 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,291,810 UART: [rt]cmd =0x44504543, len=36
45,321,840 >>> mbox cmd response data (24 bytes)
45,322,408 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,351,974 UART: [rt]cmd =0x4453424c, len=4
47,840,625 >>> mbox cmd response data (8 bytes)
47,841,112 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,871,045 UART: [rt]cmd =0x46505344, len=4
47,981,046 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,310 writing to cptra_bootfsm_go
192,589 UART:
192,963 UART: Running Caliptra ROM ...
194,120 UART:
603,839 UART: [state] CFI Enabled
620,068 UART: [state] LifecycleState = Unprovisioned
622,028 UART: [state] DebugLocked = No
623,921 UART: [state] WD Timer not started. Device not locked for debugging
627,965 UART: [kat] SHA2-256
807,569 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
818,362 UART: [kat] ++
818,809 UART: [kat] sha1
829,794 UART: [kat] SHA2-256
832,497 UART: [kat] SHA2-384
839,063 UART: [kat] SHA2-512-ACC
841,372 UART: [kat] ECC-384
3,285,812 UART: [kat] HMAC-384Kdf
3,296,960 UART: [kat] LMS
3,773,505 UART: [kat] --
3,777,868 UART: [cold-reset] ++
3,779,594 UART: [fht] FHT @ 0x50003400
3,792,438 UART: [idev] ++
3,793,055 UART: [idev] CDI.KEYID = 6
3,793,975 UART: [idev] SUBJECT.KEYID = 7
3,795,159 UART: [idev] UDS.KEYID = 0
3,796,216 ready_for_fw is high
3,796,458 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,945,432 UART: [idev] Erasing UDS.KEYID = 0
6,276,591 UART: [idev] Sha1 KeyId Algorithm
6,300,750 UART: [idev] --
6,306,156 UART: [ldev] ++
6,306,730 UART: [ldev] CDI.KEYID = 6
6,307,621 UART: [ldev] SUBJECT.KEYID = 5
6,308,896 UART: [ldev] AUTHORITY.KEYID = 7
6,310,132 UART: [ldev] FE.KEYID = 1
6,322,782 UART: [ldev] Erasing FE.KEYID = 1
8,802,266 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,522,376 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,538,202 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,554,083 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,569,664 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,589,841 UART: [ldev] --
10,595,338 UART: [fwproc] Wait for Commands...
10,597,496 UART: [fwproc] Recv command 0x46574c44
10,599,562 UART: [fwproc] Recv'd Img size: 118548 bytes
14,086,983 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,168,517 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,241,585 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,570,688 >>> mbox cmd response: success
14,573,658 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,574,100 UART: [afmc] ++
14,574,610 UART: [afmc] CDI.KEYID = 6
14,575,490 UART: [afmc] SUBJECT.KEYID = 7
14,576,565 UART: [afmc] AUTHORITY.KEYID = 5
17,081,640 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,802,342 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,804,554 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,820,385 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,836,449 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,851,992 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,875,833 UART: [afmc] --
18,879,596 UART: [cold-reset] --
18,883,354 UART: [state] Locking Datavault
18,889,307 UART: [state] Locking PCR0, PCR1 and PCR31
18,891,015 UART: [state] Locking ICCM
18,892,530 UART: [exit] Launching FMC @ 0x40000130
18,900,926 UART:
18,901,165 UART: Running Caliptra FMC ...
18,902,473 UART:
18,902,652 UART: [state] CFI Enabled
18,910,522 UART: [fht] FMC Alias Private Key: 7
20,676,857 UART: [art] Extend RT PCRs Done
20,678,080 UART: [art] Lock RT PCRs Done
20,679,791 UART: [art] Populate DV Done
20,685,310 UART: [fht] FMC Alias Private Key: 7
20,686,796 UART: [art] Derive CDI
20,687,583 UART: [art] Store in slot 0x4
20,730,287 UART: [art] Derive Key Pair
20,731,288 UART: [art] Store priv key in slot 0x5
23,158,480 UART: [art] Derive Key Pair - Done
23,171,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,877,677 UART: [art] Erasing AUTHORITY.KEYID = 7
24,879,224 UART: [art] PUB.X = 76187FBE7A47C7FD5CE41992C869530D28021FFB5690CF8667B61111F5855A075517E7784DCB57B0E368FA77C0B78428
24,886,420 UART: [art] PUB.Y = E66089BE2DE6A6E4ED26613ABC54922514DB8484A5E3FFFD539DC72E9029FC0F1DB64694C6A90B4C3AF7EBCC70BB4515
24,893,709 UART: [art] SIG.R = 429FE75122C707C7065CA3D49E30961806A578FD8E7666E880756B4F73A111FCC05D7EB4FEF204A5EB54C5C130A8E1BC
24,901,105 UART: [art] SIG.S = 42AB9961F69EE707FEF2F55371D38F0967A7EECF0504DEB90C2F676807B2188C52A6E0EA57118F6102AD0CB9F24828C8
25,879,894 UART: Caliptra RT
25,880,586 UART: [state] CFI Enabled
26,013,572 UART: [rt] RT listening for mailbox commands...
26,045,245 UART: [rt]cmd =0x46505652, len=4
26,046,526 UART: [rt] FIPS Version
26,047,751 >>> mbox cmd response data (36 bytes)
26,048,649 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,078,240 UART: [rt]cmd =0x46504c54, len=4
26,079,555 >>> mbox cmd response data (8 bytes)
26,079,900 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,109,347 UART: [rt]cmd =0x46504c67, len=4
26,110,675 >>> mbox cmd response: failed
26,111,851 UART: [rt] FIPS self test
26,112,783 UART: [kat] ++
26,113,237 UART: [kat] sha1
26,117,713 UART: [kat] SHA2-256
26,119,523 UART: [kat] SHA2-384
26,122,389 UART: [kat] SHA2-512-ACC
26,124,575 UART: [kat] ECC-384
28,551,800 UART: [kat] HMAC-384Kdf
28,557,610 UART: [kat] LMS
28,766,753 UART: [kat] --
32,145,703 UART: [rt] Verify complete
32,249,975 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,279,696 UART: [rt]cmd =0x46504c67, len=4
32,281,382 >>> mbox cmd response data (8 bytes)
32,281,727 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,311,434 UART: [rt]cmd =0x49444543, len=4
32,318,420 >>> mbox cmd response data (37 bytes)
32,319,001 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,348,895 UART: [rt]cmd =0x49444549, len=4
32,351,597 >>> mbox cmd response data (104 bytes)
32,352,406 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,382,222 UART: [rt]cmd =0x49444550, len=4
32,392,827 >>> mbox cmd response data (8 bytes)
32,393,220 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,422,720 UART: [rt]cmd =0x4c444556, len=4
32,433,786 >>> mbox cmd response data (687 bytes)
32,437,330 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,467,080 UART: [rt]cmd =0x43455246, len=4
32,479,623 >>> mbox cmd response data (888 bytes)
32,484,019 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,513,614 UART: [rt]cmd =0x43455252, len=4
32,525,002 >>> mbox cmd response data (782 bytes)
32,529,752 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,561,310 UART: [rt]cmd =0x53494756, len=196
33,526,875 >>> mbox cmd response data (8 bytes)
33,527,363 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,558,353 UART: [rt]cmd =0x4d454153, len=108
33,576,953 >>> mbox cmd response data (12 bytes)
33,577,398 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,607,324 UART: [rt]cmd =0x494e464f, len=4
33,611,544 >>> mbox cmd response data (312 bytes)
33,614,116 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,643,975 UART: [rt]cmd =0x54514754, len=24
33,646,608 >>> mbox cmd response data (8 bytes)
33,647,038 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,676,915 UART: [rt]cmd =0x47544744, len=8
33,679,742 >>> mbox cmd response data (104 bytes)
33,680,596 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,710,269 UART: [rt]cmd =0x50435252, len=8
33,712,427 >>> mbox cmd response data (8 bytes)
33,712,863 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,742,722 UART: [rt]cmd =0x50435251, len=36
34,650,651 >>> mbox cmd response data (1848 bytes)
34,659,541 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,689,969 UART: [rt]cmd =0x50435245, len=56
34,693,023 >>> mbox cmd response data (8 bytes)
34,693,472 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,723,429 UART: [rt]cmd =0x44504543, len=20
34,743,960 >>> mbox cmd response data (44 bytes)
34,744,719 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,774,460 UART: [rt]cmd =0x44504543, len=24
34,802,112 >>> mbox cmd response data (40 bytes)
34,802,779 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,833,281 UART: [rt]cmd =0x44504543, len=96
34,871,435 >>> mbox cmd response data (56 bytes)
34,872,176 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,902,764 UART: [rt]cmd =0x44504543, len=92
40,921,841 >>> mbox cmd response data (6284 bytes)
40,950,924 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,982,088 UART: [rt]cmd =0x44504543, len=136
45,154,550 >>> mbox cmd response data (136 bytes)
45,155,748 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,185,940 UART: [rt]cmd =0x44504543, len=40
45,213,602 >>> mbox cmd response data (40 bytes)
45,214,279 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,244,207 UART: [rt]cmd =0x44504543, len=28
45,287,455 >>> mbox cmd response data (2076 bytes)
45,297,355 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,327,598 UART: [rt]cmd =0x44504543, len=36
45,357,979 >>> mbox cmd response data (24 bytes)
45,358,554 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,388,599 UART: [rt]cmd =0x4453424c, len=4
47,819,588 >>> mbox cmd response data (8 bytes)
47,820,069 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,850,004 UART: [rt]cmd =0x46505344, len=4
47,959,836 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.52s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,422 writing to cptra_bootfsm_go
3,780,971 ready_for_fw is high
3,781,384 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,446,484 >>> mbox cmd response: success
14,449,667 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
18,692,761 UART:
18,693,152 UART: Running Caliptra FMC ...
18,694,410 UART:
18,694,613 UART: [state] CFI Enabled
18,702,288 UART: [fht] FMC Alias Private Key: 7
20,468,824 UART: [art] Extend RT PCRs Done
20,470,056 UART: [art] Lock RT PCRs Done
20,471,760 UART: [art] Populate DV Done
20,476,868 UART: [fht] FMC Alias Private Key: 7
20,478,578 UART: [art] Derive CDI
20,479,320 UART: [art] Store in slot 0x4
20,521,753 UART: [art] Derive Key Pair
20,522,757 UART: [art] Store priv key in slot 0x5
22,949,016 UART: [art] Derive Key Pair - Done
22,962,129 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,668,320 UART: [art] Erasing AUTHORITY.KEYID = 7
24,669,827 UART: [art] PUB.X = 279105E05B660A36C1F71D281B3B061EBBD24D86410E8B79235BA486ADE2486FB719559E8761ADFE3619593048D59D79
24,677,080 UART: [art] PUB.Y = 2999D1F85AE933578B28E508AB8B9CD5D75179ECCEA2468B79529FE0A0F917F92630ACB7A74782D1DAFF5F8BC3BCD022
24,684,385 UART: [art] SIG.R = 552DD13E2B86C09DEADD7A31FD9E74C80D941AD79C3071CB03184DE13459F5FF950DF59678D88360719D541115C400E4
24,691,765 UART: [art] SIG.S = 482E6C2BE93EDC21622E2C8F738E0BB1C3D77FA6240967464918E2F8A5DD7412B8716E85D6A1910CB7D3C2E79B08D955
25,670,286 UART: Caliptra RT
25,671,007 UART: [state] CFI Enabled
25,804,282 UART: [rt] RT listening for mailbox commands...
25,835,583 UART: [rt]cmd =0x46505652, len=4
25,836,913 UART: [rt] FIPS Version
25,838,076 >>> mbox cmd response data (36 bytes)
25,838,697 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
25,868,607 UART: [rt]cmd =0x46504c54, len=4
25,870,253 >>> mbox cmd response data (8 bytes)
25,870,592 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,900,068 UART: [rt]cmd =0x46504c67, len=4
25,901,525 >>> mbox cmd response: failed
25,902,394 UART: [rt] FIPS self test
25,903,244 UART: [kat] ++
25,903,849 UART: [kat] sha1
25,908,146 UART: [kat] SHA2-256
25,909,947 UART: [kat] SHA2-384
25,912,635 UART: [kat] SHA2-512-ACC
25,914,854 UART: [kat] ECC-384
28,342,115 UART: [kat] HMAC-384Kdf
28,347,921 UART: [kat] LMS
28,557,065 UART: [kat] --
31,913,901 UART: [rt] Verify complete
32,040,548 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,070,504 UART: [rt]cmd =0x46504c67, len=4
32,072,173 >>> mbox cmd response data (8 bytes)
32,072,524 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,102,021 UART: [rt]cmd =0x49444543, len=4
32,109,059 >>> mbox cmd response data (37 bytes)
32,109,646 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,139,356 UART: [rt]cmd =0x49444549, len=4
32,142,093 >>> mbox cmd response data (104 bytes)
32,142,985 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,172,692 UART: [rt]cmd =0x49444550, len=4
32,183,181 >>> mbox cmd response data (8 bytes)
32,183,573 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,213,222 UART: [rt]cmd =0x4c444556, len=4
32,224,531 >>> mbox cmd response data (687 bytes)
32,228,076 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,258,146 UART: [rt]cmd =0x43455246, len=4
32,270,693 >>> mbox cmd response data (888 bytes)
32,275,093 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,304,961 UART: [rt]cmd =0x43455252, len=4
32,316,301 >>> mbox cmd response data (782 bytes)
32,321,003 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,352,679 UART: [rt]cmd =0x53494756, len=196
33,317,997 >>> mbox cmd response data (8 bytes)
33,318,493 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,349,047 UART: [rt]cmd =0x4d454153, len=108
33,367,745 >>> mbox cmd response data (12 bytes)
33,368,180 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,397,778 UART: [rt]cmd =0x494e464f, len=4
33,402,111 >>> mbox cmd response data (312 bytes)
33,404,531 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,434,543 UART: [rt]cmd =0x54514754, len=24
33,437,249 >>> mbox cmd response data (8 bytes)
33,437,680 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
33,467,177 UART: [rt]cmd =0x47544744, len=8
33,470,216 >>> mbox cmd response data (104 bytes)
33,471,078 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
33,500,819 UART: [rt]cmd =0x50435252, len=8
33,502,819 >>> mbox cmd response data (8 bytes)
33,503,185 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
33,533,438 UART: [rt]cmd =0x50435251, len=36
34,441,391 >>> mbox cmd response data (1848 bytes)
34,450,316 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
34,480,426 UART: [rt]cmd =0x50435245, len=56
34,483,266 >>> mbox cmd response data (8 bytes)
34,483,713 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
34,513,606 UART: [rt]cmd =0x44504543, len=20
34,534,065 >>> mbox cmd response data (44 bytes)
34,534,753 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
34,564,561 UART: [rt]cmd =0x44504543, len=24
34,591,972 >>> mbox cmd response data (40 bytes)
34,592,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
34,622,975 UART: [rt]cmd =0x44504543, len=96
34,661,674 >>> mbox cmd response data (56 bytes)
34,662,422 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
34,692,677 UART: [rt]cmd =0x44504543, len=92
40,712,591 >>> mbox cmd response data (6284 bytes)
40,741,667 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
40,772,751 UART: [rt]cmd =0x44504543, len=136
44,943,930 >>> mbox cmd response data (136 bytes)
44,945,130 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
44,975,276 UART: [rt]cmd =0x44504543, len=40
45,002,775 >>> mbox cmd response data (40 bytes)
45,003,447 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,033,551 UART: [rt]cmd =0x44504543, len=28
45,076,312 >>> mbox cmd response data (2076 bytes)
45,086,218 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,116,358 UART: [rt]cmd =0x44504543, len=36
45,145,825 >>> mbox cmd response data (24 bytes)
45,146,397 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,176,164 UART: [rt]cmd =0x4453424c, len=4
47,606,979 >>> mbox cmd response data (8 bytes)
47,607,478 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
47,637,141 UART: [rt]cmd =0x46505344, len=4
47,747,128 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.50s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,986 writing to cptra_bootfsm_go
192,219 UART:
192,576 UART: Running Caliptra ROM ...
193,780 UART:
193,938 UART: [state] CFI Enabled
260,954 UART: [state] LifecycleState = Unprovisioned
263,329 UART: [state] DebugLocked = No
265,739 UART: [state] WD Timer not started. Device not locked for debugging
271,005 UART: [kat] SHA2-256
460,897 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,637 UART: [kat] ++
472,119 UART: [kat] sha1
484,732 UART: [kat] SHA2-256
487,762 UART: [kat] SHA2-384
493,493 UART: [kat] SHA2-512-ACC
496,085 UART: [kat] ECC-384
2,948,154 UART: [kat] HMAC-384Kdf
2,972,120 UART: [kat] LMS
3,503,920 UART: [kat] --
3,509,772 UART: [cold-reset] ++
3,511,810 UART: [fht] FHT @ 0x50003400
3,523,891 UART: [idev] ++
3,524,655 UART: [idev] CDI.KEYID = 6
3,525,583 UART: [idev] SUBJECT.KEYID = 7
3,526,769 UART: [idev] UDS.KEYID = 0
3,527,702 ready_for_fw is high
3,527,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,677,035 UART: [idev] Erasing UDS.KEYID = 0
6,051,525 UART: [idev] Sha1 KeyId Algorithm
6,075,212 UART: [idev] --
6,080,727 UART: [ldev] ++
6,081,455 UART: [ldev] CDI.KEYID = 6
6,082,356 UART: [ldev] SUBJECT.KEYID = 5
6,083,526 UART: [ldev] AUTHORITY.KEYID = 7
6,084,714 UART: [ldev] FE.KEYID = 1
6,123,500 UART: [ldev] Erasing FE.KEYID = 1
8,631,452 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,367,935 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,383,125 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,398,375 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,413,490 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,434,256 UART: [ldev] --
10,440,234 UART: [fwproc] Wait for Commands...
10,442,237 UART: [fwproc] Recv command 0x46574c44
10,444,504 UART: [fwproc] Recv'd Img size: 118548 bytes
13,941,849 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,015,364 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,138,986 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,698,732 >>> mbox cmd response: success
14,701,765 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,703,201 UART: [afmc] ++
14,703,843 UART: [afmc] CDI.KEYID = 6
14,705,147 UART: [afmc] SUBJECT.KEYID = 7
14,706,499 UART: [afmc] AUTHORITY.KEYID = 5
17,238,248 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,964,004 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,965,924 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,981,007 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,996,152 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,011,059 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,034,230 UART: [afmc] --
19,038,369 UART: [cold-reset] --
19,042,637 UART: [state] Locking Datavault
19,048,450 UART: [state] Locking PCR0, PCR1 and PCR31
19,050,596 UART: [state] Locking ICCM
19,053,510 UART: [exit] Launching FMC @ 0x40000130
19,062,185 UART:
19,062,453 UART: Running Caliptra FMC ...
19,063,562 UART:
19,063,727 UART: [state] CFI Enabled
19,120,980 UART: [fht] FMC Alias Private Key: 7
20,908,797 UART: [art] Extend RT PCRs Done
20,910,010 UART: [art] Lock RT PCRs Done
20,911,718 UART: [art] Populate DV Done
20,917,241 UART: [fht] FMC Alias Private Key: 7
20,918,780 UART: [art] Derive CDI
20,919,518 UART: [art] Store in slot 0x4
20,981,926 UART: [art] Derive Key Pair
20,982,973 UART: [art] Store priv key in slot 0x5
23,445,606 UART: [art] Derive Key Pair - Done
23,458,441 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,171,851 UART: [art] Erasing AUTHORITY.KEYID = 7
25,173,350 UART: [art] PUB.X = 2FFFAAE440FB6AE54D19F49581299EEB678AB1155040AE90FE6CA0F89020E76AD01C542BECBA8D3856FD1C03F10A1F3F
25,180,673 UART: [art] PUB.Y = 3A43B333A569A94EF085ED0BBB16EF6D81CC6D5CFE0FA4395841416B0D1CA3BBBA981199E83B36D89AB8D3B127D2BC4B
25,187,932 UART: [art] SIG.R = 101DDE5F8649D3F0B7AB7C072AB627F45C188A1520ABE679424BFD9DF3787B805AD8A94CAA9DA48A1AC27FA469A2658F
25,195,334 UART: [art] SIG.S = FBBFB6CD0C0E6556A5D05EE970D2D802CFD9FA2148DA8A29E643875BAF40974901C7D73006EC4D52F5A9FD03D2EA552A
26,174,418 UART: Caliptra RT
26,175,130 UART: [state] CFI Enabled
26,354,161 UART: [rt] RT listening for mailbox commands...
26,385,467 UART: [rt]cmd =0x46505652, len=4
26,386,720 UART: [rt] FIPS Version
26,387,824 >>> mbox cmd response data (36 bytes)
26,388,556 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,418,336 UART: [rt]cmd =0x46504c54, len=4
26,419,688 >>> mbox cmd response data (8 bytes)
26,420,034 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,450,492 UART: [rt]cmd =0x46504c67, len=4
26,451,784 >>> mbox cmd response: failed
26,452,581 UART: [rt] FIPS self test
26,453,537 UART: [kat] ++
26,453,993 UART: [kat] sha1
26,458,387 UART: [kat] SHA2-256
26,460,182 UART: [kat] SHA2-384
26,463,072 UART: [kat] SHA2-512-ACC
26,465,291 UART: [kat] ECC-384
28,909,921 UART: [kat] HMAC-384Kdf
28,915,924 UART: [kat] LMS
29,125,038 UART: [kat] --
32,503,219 UART: [rt] Verify complete
32,591,247 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,620,982 UART: [rt]cmd =0x46504c67, len=4
32,622,461 >>> mbox cmd response data (8 bytes)
32,622,838 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,652,661 UART: [rt]cmd =0x49444543, len=4
32,659,676 >>> mbox cmd response data (37 bytes)
32,660,288 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,690,114 UART: [rt]cmd =0x49444549, len=4
32,692,773 >>> mbox cmd response data (104 bytes)
32,693,563 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,723,117 UART: [rt]cmd =0x49444550, len=4
32,733,695 >>> mbox cmd response data (8 bytes)
32,734,109 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,763,761 UART: [rt]cmd =0x4c444556, len=4
32,774,835 >>> mbox cmd response data (687 bytes)
32,778,345 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,808,414 UART: [rt]cmd =0x43455246, len=4
32,820,938 >>> mbox cmd response data (888 bytes)
32,825,359 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,855,208 UART: [rt]cmd =0x43455252, len=4
32,866,718 >>> mbox cmd response data (783 bytes)
32,871,415 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,902,890 UART: [rt]cmd =0x53494756, len=196
33,868,127 >>> mbox cmd response data (8 bytes)
33,868,624 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,899,124 UART: [rt]cmd =0x4d454153, len=108
33,918,065 >>> mbox cmd response data (12 bytes)
33,918,501 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,948,219 UART: [rt]cmd =0x494e464f, len=4
33,952,589 >>> mbox cmd response data (312 bytes)
33,954,960 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,985,090 UART: [rt]cmd =0x54514754, len=24
33,987,792 >>> mbox cmd response data (8 bytes)
33,988,206 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,017,995 UART: [rt]cmd =0x47544744, len=8
34,020,904 >>> mbox cmd response data (104 bytes)
34,021,764 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,051,640 UART: [rt]cmd =0x50435252, len=8
34,053,505 >>> mbox cmd response data (8 bytes)
34,053,840 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,083,807 UART: [rt]cmd =0x50435251, len=36
35,003,225 >>> mbox cmd response data (1848 bytes)
35,012,143 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,042,466 UART: [rt]cmd =0x50435245, len=56
35,045,689 >>> mbox cmd response data (8 bytes)
35,046,160 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,076,006 UART: [rt]cmd =0x44504543, len=20
35,096,369 >>> mbox cmd response data (44 bytes)
35,097,063 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,127,037 UART: [rt]cmd =0x44504543, len=24
35,164,551 >>> mbox cmd response data (40 bytes)
35,165,224 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,195,922 UART: [rt]cmd =0x44504543, len=96
35,234,933 >>> mbox cmd response data (56 bytes)
35,235,731 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,266,201 UART: [rt]cmd =0x44504543, len=92
41,364,422 >>> mbox cmd response data (6284 bytes)
41,393,505 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,424,586 UART: [rt]cmd =0x44504543, len=136
45,654,296 >>> mbox cmd response data (136 bytes)
45,655,600 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,685,719 UART: [rt]cmd =0x44504543, len=40
45,723,356 >>> mbox cmd response data (40 bytes)
45,724,032 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,754,269 UART: [rt]cmd =0x44504543, len=28
45,796,899 >>> mbox cmd response data (2076 bytes)
45,806,833 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,837,064 UART: [rt]cmd =0x44504543, len=36
45,866,618 >>> mbox cmd response data (24 bytes)
45,867,235 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,897,084 UART: [rt]cmd =0x4453424c, len=4
48,385,465 >>> mbox cmd response data (8 bytes)
48,385,951 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,415,625 UART: [rt]cmd =0x46505344, len=4
48,525,890 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.54s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,970 writing to cptra_bootfsm_go
3,438,583 ready_for_fw is high
3,438,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,850,657 >>> mbox cmd response: success
14,854,047 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,153,688 UART:
19,154,080 UART: Running Caliptra FMC ...
19,155,325 UART:
19,155,506 UART: [state] CFI Enabled
19,224,591 UART: [fht] FMC Alias Private Key: 7
20,991,154 UART: [art] Extend RT PCRs Done
20,992,381 UART: [art] Lock RT PCRs Done
20,993,966 UART: [art] Populate DV Done
20,999,543 UART: [fht] FMC Alias Private Key: 7
21,001,251 UART: [art] Derive CDI
21,002,108 UART: [art] Store in slot 0x4
21,057,338 UART: [art] Derive Key Pair
21,058,378 UART: [art] Store priv key in slot 0x5
23,521,366 UART: [art] Derive Key Pair - Done
23,534,585 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,247,470 UART: [art] Erasing AUTHORITY.KEYID = 7
25,249,114 UART: [art] PUB.X = F5DDB0B9F2304C94F72BA4CB92110770C325AB2761760FBC433D7FF182CB2279836AE80A00165EDA9D4632350DFA5FF8
25,256,214 UART: [art] PUB.Y = 5C408A7E1726C3501B033191D4476C417334071137927BABB1A38443EE8DB1B1D63666AAA6B9C180281C8389B6979584
25,263,430 UART: [art] SIG.R = 2E8202C3D08957A635955AF103167188068A60AEFD21C879F646B9665D00587675DA013612E4F976AED8C27F8FB67FB7
25,270,782 UART: [art] SIG.S = DA168692594849F95021BF306355847B9D111DB3C9A813BB685D0B4011D5149761CD3288E2EF3BE6B906EA4CA47D00F5
26,249,894 UART: Caliptra RT
26,250,617 UART: [state] CFI Enabled
26,431,675 UART: [rt] RT listening for mailbox commands...
26,463,408 UART: [rt]cmd =0x46505652, len=4
26,464,690 UART: [rt] FIPS Version
26,466,023 >>> mbox cmd response data (36 bytes)
26,466,825 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,496,777 UART: [rt]cmd =0x46504c54, len=4
26,498,360 >>> mbox cmd response data (8 bytes)
26,498,743 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,528,722 UART: [rt]cmd =0x46504c67, len=4
26,530,172 >>> mbox cmd response: failed
26,531,079 UART: [rt] FIPS self test
26,532,024 UART: [kat] ++
26,532,532 UART: [kat] sha1
26,536,726 UART: [kat] SHA2-256
26,538,527 UART: [kat] SHA2-384
26,541,364 UART: [kat] SHA2-512-ACC
26,543,581 UART: [kat] ECC-384
28,986,843 UART: [kat] HMAC-384Kdf
29,013,839 UART: [kat] LMS
29,223,005 UART: [kat] --
32,580,346 UART: [rt] Verify complete
32,669,113 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,698,846 UART: [rt]cmd =0x46504c67, len=4
32,700,308 >>> mbox cmd response data (8 bytes)
32,700,660 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,730,688 UART: [rt]cmd =0x49444543, len=4
32,737,728 >>> mbox cmd response data (37 bytes)
32,738,314 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,767,972 UART: [rt]cmd =0x49444549, len=4
32,770,629 >>> mbox cmd response data (104 bytes)
32,771,427 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,801,082 UART: [rt]cmd =0x49444550, len=4
32,811,579 >>> mbox cmd response data (8 bytes)
32,811,987 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,841,741 UART: [rt]cmd =0x4c444556, len=4
32,852,998 >>> mbox cmd response data (687 bytes)
32,856,574 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,886,434 UART: [rt]cmd =0x43455246, len=4
32,899,095 >>> mbox cmd response data (888 bytes)
32,903,506 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,933,368 UART: [rt]cmd =0x43455252, len=4
32,944,927 >>> mbox cmd response data (783 bytes)
32,949,653 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,981,267 UART: [rt]cmd =0x53494756, len=196
33,946,376 >>> mbox cmd response data (8 bytes)
33,946,849 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,977,448 UART: [rt]cmd =0x4d454153, len=108
33,996,098 >>> mbox cmd response data (12 bytes)
33,996,546 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
34,026,304 UART: [rt]cmd =0x494e464f, len=4
34,030,529 >>> mbox cmd response data (312 bytes)
34,032,768 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,062,884 UART: [rt]cmd =0x54514754, len=24
34,065,321 >>> mbox cmd response data (8 bytes)
34,065,676 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,095,499 UART: [rt]cmd =0x47544744, len=8
34,098,443 >>> mbox cmd response data (104 bytes)
34,099,425 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,129,392 UART: [rt]cmd =0x50435252, len=8
34,131,116 >>> mbox cmd response data (8 bytes)
34,131,468 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,161,480 UART: [rt]cmd =0x50435251, len=36
35,076,645 >>> mbox cmd response data (1848 bytes)
35,085,578 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,116,137 UART: [rt]cmd =0x50435245, len=56
35,119,259 >>> mbox cmd response data (8 bytes)
35,119,722 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,149,621 UART: [rt]cmd =0x44504543, len=20
35,170,183 >>> mbox cmd response data (44 bytes)
35,170,929 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,201,165 UART: [rt]cmd =0x44504543, len=24
35,237,787 >>> mbox cmd response data (40 bytes)
35,238,448 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,269,003 UART: [rt]cmd =0x44504543, len=96
35,307,654 >>> mbox cmd response data (56 bytes)
35,308,406 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,338,790 UART: [rt]cmd =0x44504543, len=92
41,438,287 >>> mbox cmd response data (6284 bytes)
41,467,460 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,498,616 UART: [rt]cmd =0x44504543, len=136
45,725,520 >>> mbox cmd response data (136 bytes)
45,726,734 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,756,861 UART: [rt]cmd =0x44504543, len=40
45,794,932 >>> mbox cmd response data (40 bytes)
45,795,633 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,825,781 UART: [rt]cmd =0x44504543, len=28
45,868,759 >>> mbox cmd response data (2076 bytes)
45,878,668 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,908,813 UART: [rt]cmd =0x44504543, len=36
45,938,122 >>> mbox cmd response data (24 bytes)
45,938,705 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,968,585 UART: [rt]cmd =0x4453424c, len=4
48,458,481 >>> mbox cmd response data (8 bytes)
48,458,971 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,488,909 UART: [rt]cmd =0x46505344, len=4
48,598,661 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.55s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,241 writing to cptra_bootfsm_go
192,405 UART:
192,768 UART: Running Caliptra ROM ...
193,869 UART:
603,456 UART: [state] CFI Enabled
618,325 UART: [state] LifecycleState = Unprovisioned
620,357 UART: [state] DebugLocked = No
621,611 UART: [state] WD Timer not started. Device not locked for debugging
625,380 UART: [kat] SHA2-256
815,209 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,006 UART: [kat] ++
826,621 UART: [kat] sha1
838,429 UART: [kat] SHA2-256
841,468 UART: [kat] SHA2-384
847,608 UART: [kat] SHA2-512-ACC
850,195 UART: [kat] ECC-384
3,294,386 UART: [kat] HMAC-384Kdf
3,307,286 UART: [kat] LMS
3,839,134 UART: [kat] --
3,843,351 UART: [cold-reset] ++
3,844,792 UART: [fht] FHT @ 0x50003400
3,856,251 UART: [idev] ++
3,856,925 UART: [idev] CDI.KEYID = 6
3,857,817 UART: [idev] SUBJECT.KEYID = 7
3,859,073 UART: [idev] UDS.KEYID = 0
3,859,994 ready_for_fw is high
3,860,211 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,009,542 UART: [idev] Erasing UDS.KEYID = 0
6,338,884 UART: [idev] Sha1 KeyId Algorithm
6,362,016 UART: [idev] --
6,366,827 UART: [ldev] ++
6,367,517 UART: [ldev] CDI.KEYID = 6
6,368,452 UART: [ldev] SUBJECT.KEYID = 5
6,369,614 UART: [ldev] AUTHORITY.KEYID = 7
6,370,794 UART: [ldev] FE.KEYID = 1
6,380,630 UART: [ldev] Erasing FE.KEYID = 1
8,861,633 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,576,573 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,591,761 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,606,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,622,057 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,643,548 UART: [ldev] --
10,648,234 UART: [fwproc] Wait for Commands...
10,649,727 UART: [fwproc] Recv command 0x46574c44
10,652,063 UART: [fwproc] Recv'd Img size: 118548 bytes
14,152,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,233,856 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,357,451 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,917,602 >>> mbox cmd response: success
14,920,582 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
14,921,643 UART: [afmc] ++
14,922,356 UART: [afmc] CDI.KEYID = 6
14,923,469 UART: [afmc] SUBJECT.KEYID = 7
14,925,024 UART: [afmc] AUTHORITY.KEYID = 5
17,424,287 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,144,580 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,146,559 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,161,678 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,176,799 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,191,701 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,214,087 UART: [afmc] --
19,216,917 UART: [cold-reset] --
19,221,822 UART: [state] Locking Datavault
19,227,892 UART: [state] Locking PCR0, PCR1 and PCR31
19,230,099 UART: [state] Locking ICCM
19,232,449 UART: [exit] Launching FMC @ 0x40000130
19,241,124 UART:
19,241,364 UART: Running Caliptra FMC ...
19,242,474 UART:
19,242,635 UART: [state] CFI Enabled
19,250,791 UART: [fht] FMC Alias Private Key: 7
21,016,920 UART: [art] Extend RT PCRs Done
21,018,149 UART: [art] Lock RT PCRs Done
21,019,511 UART: [art] Populate DV Done
21,025,049 UART: [fht] FMC Alias Private Key: 7
21,026,599 UART: [art] Derive CDI
21,027,367 UART: [art] Store in slot 0x4
21,070,205 UART: [art] Derive Key Pair
21,071,255 UART: [art] Store priv key in slot 0x5
23,498,174 UART: [art] Derive Key Pair - Done
23,510,965 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,217,292 UART: [art] Erasing AUTHORITY.KEYID = 7
25,218,795 UART: [art] PUB.X = 8F23DB2A643C23DC11635533501A79AF41674B50052B10CC79DA37E902F976A91B156072C1B4EFDFA4A4E52CE3F11CCE
25,226,103 UART: [art] PUB.Y = 161E0C31151B157D03399576693BA4BA4716706DE521C71A971F032482AEDB56ECDC9D0D589A930BB618BF1E11A507CB
25,233,333 UART: [art] SIG.R = FF34C4F32E81FF72CF23A19EFA44EFD8FC6C2F79B22BD3F5521C4E04C528248E4E96C9E97F21DF952028A9FBFB074B2D
25,240,722 UART: [art] SIG.S = C74FF3060786555148B7150AAEAC95E1F955A3617967A85D6B4A648C8B049B2A49A5FA4242AC64389E3F1462D1D2CD24
26,219,908 UART: Caliptra RT
26,220,623 UART: [state] CFI Enabled
26,354,499 UART: [rt] RT listening for mailbox commands...
26,385,886 UART: [rt]cmd =0x46505652, len=4
26,387,144 UART: [rt] FIPS Version
26,388,527 >>> mbox cmd response data (36 bytes)
26,389,219 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,418,974 UART: [rt]cmd =0x46504c54, len=4
26,420,601 >>> mbox cmd response data (8 bytes)
26,420,958 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,450,725 UART: [rt]cmd =0x46504c67, len=4
26,452,023 >>> mbox cmd response: failed
26,453,200 UART: [rt] FIPS self test
26,454,137 UART: [kat] ++
26,454,594 UART: [kat] sha1
26,459,014 UART: [kat] SHA2-256
26,460,817 UART: [kat] SHA2-384
26,463,711 UART: [kat] SHA2-512-ACC
26,465,898 UART: [kat] ECC-384
28,892,978 UART: [kat] HMAC-384Kdf
28,899,054 UART: [kat] LMS
29,108,211 UART: [kat] --
32,485,579 UART: [rt] Verify complete
32,590,733 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,620,587 UART: [rt]cmd =0x46504c67, len=4
32,622,068 >>> mbox cmd response data (8 bytes)
32,622,418 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,652,078 UART: [rt]cmd =0x49444543, len=4
32,658,882 >>> mbox cmd response data (37 bytes)
32,659,474 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,689,238 UART: [rt]cmd =0x49444549, len=4
32,692,004 >>> mbox cmd response data (104 bytes)
32,692,792 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,722,557 UART: [rt]cmd =0x49444550, len=4
32,733,109 >>> mbox cmd response data (8 bytes)
32,733,550 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,763,461 UART: [rt]cmd =0x4c444556, len=4
32,774,512 >>> mbox cmd response data (687 bytes)
32,778,036 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,807,681 UART: [rt]cmd =0x43455246, len=4
32,820,424 >>> mbox cmd response data (888 bytes)
32,824,862 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,854,445 UART: [rt]cmd =0x43455252, len=4
32,865,693 >>> mbox cmd response data (784 bytes)
32,870,425 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,901,818 UART: [rt]cmd =0x53494756, len=196
33,867,250 >>> mbox cmd response data (8 bytes)
33,867,776 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,898,601 UART: [rt]cmd =0x4d454153, len=108
33,917,163 >>> mbox cmd response data (12 bytes)
33,917,592 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
33,947,374 UART: [rt]cmd =0x494e464f, len=4
33,951,749 >>> mbox cmd response data (312 bytes)
33,954,245 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
33,984,223 UART: [rt]cmd =0x54514754, len=24
33,986,785 >>> mbox cmd response data (8 bytes)
33,987,210 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,017,003 UART: [rt]cmd =0x47544744, len=8
34,019,872 >>> mbox cmd response data (104 bytes)
34,020,746 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,050,763 UART: [rt]cmd =0x50435252, len=8
34,052,613 >>> mbox cmd response data (8 bytes)
34,052,978 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,082,671 UART: [rt]cmd =0x50435251, len=36
34,990,627 >>> mbox cmd response data (1848 bytes)
34,999,536 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,029,751 UART: [rt]cmd =0x50435245, len=56
35,032,992 >>> mbox cmd response data (8 bytes)
35,033,435 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,063,350 UART: [rt]cmd =0x44504543, len=20
35,083,909 >>> mbox cmd response data (44 bytes)
35,084,671 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,114,580 UART: [rt]cmd =0x44504543, len=24
35,142,298 >>> mbox cmd response data (40 bytes)
35,143,009 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,173,664 UART: [rt]cmd =0x44504543, len=96
35,212,224 >>> mbox cmd response data (56 bytes)
35,213,032 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,243,629 UART: [rt]cmd =0x44504543, len=92
41,262,562 >>> mbox cmd response data (6284 bytes)
41,291,824 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,322,941 UART: [rt]cmd =0x44504543, len=136
45,495,136 >>> mbox cmd response data (136 bytes)
45,496,356 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,526,513 UART: [rt]cmd =0x44504543, len=40
45,553,633 >>> mbox cmd response data (40 bytes)
45,554,314 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,584,190 UART: [rt]cmd =0x44504543, len=28
45,626,761 >>> mbox cmd response data (2076 bytes)
45,636,711 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,666,847 UART: [rt]cmd =0x44504543, len=36
45,696,941 >>> mbox cmd response data (24 bytes)
45,697,550 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,727,270 UART: [rt]cmd =0x4453424c, len=4
48,158,217 >>> mbox cmd response data (8 bytes)
48,158,712 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,188,554 UART: [rt]cmd =0x46505344, len=4
48,298,558 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,365 writing to cptra_bootfsm_go
3,758,248 ready_for_fw is high
3,758,807 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,042,603 >>> mbox cmd response: success
15,045,613 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
19,298,217 UART:
19,298,631 UART: Running Caliptra FMC ...
19,299,809 UART:
19,299,995 UART: [state] CFI Enabled
19,307,705 UART: [fht] FMC Alias Private Key: 7
21,074,275 UART: [art] Extend RT PCRs Done
21,075,511 UART: [art] Lock RT PCRs Done
21,077,068 UART: [art] Populate DV Done
21,082,548 UART: [fht] FMC Alias Private Key: 7
21,084,100 UART: [art] Derive CDI
21,084,868 UART: [art] Store in slot 0x4
21,127,368 UART: [art] Derive Key Pair
21,128,415 UART: [art] Store priv key in slot 0x5
23,555,705 UART: [art] Derive Key Pair - Done
23,568,726 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,275,164 UART: [art] Erasing AUTHORITY.KEYID = 7
25,276,679 UART: [art] PUB.X = C73C7287691ABEEF780546B490AABCC4D53592AF5D1491B8DEDF4F4F261B7752B0373C0B8E55399BC4E1C84E33CC5225
25,283,938 UART: [art] PUB.Y = 01E937F24CADF3309D6303FE40940E8FDD61BA9749A02CF41AC63BEB0E0A6A750D4C2A173A24E083103769AF02576536
25,291,148 UART: [art] SIG.R = D59DEEA0D3A9F21B1D61FB4CAEBA87BA715F0317E482EEC8F18AF6E3373E9CD8EAADD1F9CBC2986E3A5ADE818D7896FB
25,298,619 UART: [art] SIG.S = 4E602195D5820CD76FAA4E11F1834D8337FE6F28F0A3CFAC176556C134897EEB9898611F24A737B3840DBF3B66AFEB23
26,277,442 UART: Caliptra RT
26,278,140 UART: [state] CFI Enabled
26,411,036 UART: [rt] RT listening for mailbox commands...
26,442,401 UART: [rt]cmd =0x46505652, len=4
26,443,652 UART: [rt] FIPS Version
26,444,924 >>> mbox cmd response data (36 bytes)
26,445,677 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
26,475,691 UART: [rt]cmd =0x46504c54, len=4
26,477,368 >>> mbox cmd response data (8 bytes)
26,477,714 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,507,526 UART: [rt]cmd =0x46504c67, len=4
26,508,815 >>> mbox cmd response: failed
26,510,085 UART: [rt] FIPS self test
26,511,016 UART: [kat] ++
26,511,526 UART: [kat] sha1
26,515,918 UART: [kat] SHA2-256
26,517,729 UART: [kat] SHA2-384
26,520,452 UART: [kat] SHA2-512-ACC
26,522,666 UART: [kat] ECC-384
28,949,733 UART: [kat] HMAC-384Kdf
28,955,604 UART: [kat] LMS
29,164,751 UART: [kat] --
32,523,276 UART: [rt] Verify complete
32,648,009 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,677,973 UART: [rt]cmd =0x46504c67, len=4
32,679,511 >>> mbox cmd response data (8 bytes)
32,679,860 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
32,709,524 UART: [rt]cmd =0x49444543, len=4
32,716,485 >>> mbox cmd response data (37 bytes)
32,717,082 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
32,746,744 UART: [rt]cmd =0x49444549, len=4
32,749,526 >>> mbox cmd response data (104 bytes)
32,750,391 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
32,780,211 UART: [rt]cmd =0x49444550, len=4
32,790,865 >>> mbox cmd response data (8 bytes)
32,791,307 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
32,821,072 UART: [rt]cmd =0x4c444556, len=4
32,832,206 >>> mbox cmd response data (687 bytes)
32,835,716 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
32,865,255 UART: [rt]cmd =0x43455246, len=4
32,878,043 >>> mbox cmd response data (888 bytes)
32,882,460 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
32,912,257 UART: [rt]cmd =0x43455252, len=4
32,923,450 >>> mbox cmd response data (783 bytes)
32,928,160 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
32,959,782 UART: [rt]cmd =0x53494756, len=196
33,925,493 >>> mbox cmd response data (8 bytes)
33,926,014 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
33,956,844 UART: [rt]cmd =0x4d454153, len=108
33,975,791 >>> mbox cmd response data (12 bytes)
33,976,220 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
34,005,887 UART: [rt]cmd =0x494e464f, len=4
34,010,267 >>> mbox cmd response data (312 bytes)
34,012,560 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
34,042,802 UART: [rt]cmd =0x54514754, len=24
34,045,566 >>> mbox cmd response data (8 bytes)
34,045,991 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
34,075,872 UART: [rt]cmd =0x47544744, len=8
34,078,729 >>> mbox cmd response data (104 bytes)
34,079,599 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
34,109,267 UART: [rt]cmd =0x50435252, len=8
34,111,390 >>> mbox cmd response data (8 bytes)
34,111,812 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
34,141,910 UART: [rt]cmd =0x50435251, len=36
35,049,488 >>> mbox cmd response data (1848 bytes)
35,058,410 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
35,088,686 UART: [rt]cmd =0x50435245, len=56
35,091,824 >>> mbox cmd response data (8 bytes)
35,092,283 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
35,122,081 UART: [rt]cmd =0x44504543, len=20
35,142,311 >>> mbox cmd response data (44 bytes)
35,143,022 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
35,172,934 UART: [rt]cmd =0x44504543, len=24
35,200,597 >>> mbox cmd response data (40 bytes)
35,201,304 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
35,231,844 UART: [rt]cmd =0x44504543, len=96
35,270,798 >>> mbox cmd response data (56 bytes)
35,271,562 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
35,302,094 UART: [rt]cmd =0x44504543, len=92
41,321,934 >>> mbox cmd response data (6284 bytes)
41,351,191 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
41,382,251 UART: [rt]cmd =0x44504543, len=136
45,555,155 >>> mbox cmd response data (136 bytes)
45,556,340 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
45,586,676 UART: [rt]cmd =0x44504543, len=40
45,614,099 >>> mbox cmd response data (40 bytes)
45,614,775 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
45,644,850 UART: [rt]cmd =0x44504543, len=28
45,687,753 >>> mbox cmd response data (2076 bytes)
45,697,676 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
45,727,807 UART: [rt]cmd =0x44504543, len=36
45,757,403 >>> mbox cmd response data (24 bytes)
45,758,009 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
45,787,899 UART: [rt]cmd =0x4453424c, len=4
48,218,822 >>> mbox cmd response data (8 bytes)
48,219,331 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
48,249,165 UART: [rt]cmd =0x46505344, len=4
48,359,050 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 2.53s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,998 UART: [state] LifecycleState = Unprovisioned
85,653 UART: [state] DebugLocked = No
86,373 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,989 UART: [kat] SHA2-256
881,920 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,035 UART: [kat] ++
886,187 UART: [kat] sha1
890,427 UART: [kat] SHA2-256
892,365 UART: [kat] SHA2-384
895,018 UART: [kat] SHA2-512-ACC
896,919 UART: [kat] ECC-384
902,390 UART: [kat] HMAC-384Kdf
906,896 UART: [kat] LMS
1,475,092 UART: [kat] --
1,476,179 UART: [cold-reset] ++
1,476,517 UART: [fht] Storing FHT @ 0x50003400
1,479,126 UART: [idev] ++
1,479,294 UART: [idev] CDI.KEYID = 6
1,479,654 UART: [idev] SUBJECT.KEYID = 7
1,480,078 UART: [idev] UDS.KEYID = 0
1,480,423 ready_for_fw is high
1,480,423 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,068 UART: [idev] Erasing UDS.KEYID = 0
1,504,484 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,128 UART: [idev] --
1,514,245 UART: [ldev] ++
1,514,413 UART: [ldev] CDI.KEYID = 6
1,514,776 UART: [ldev] SUBJECT.KEYID = 5
1,515,202 UART: [ldev] AUTHORITY.KEYID = 7
1,515,665 UART: [ldev] FE.KEYID = 1
1,520,937 UART: [ldev] Erasing FE.KEYID = 1
1,546,284 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,901 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,617 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,508 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,220 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,220 UART: [ldev] --
1,585,627 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 118548 bytes
2,931,681 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,319 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,537 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,758 >>> mbox cmd response: success
3,129,758 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,130,870 UART: [afmc] ++
3,131,038 UART: [afmc] CDI.KEYID = 6
3,131,400 UART: [afmc] SUBJECT.KEYID = 7
3,131,825 UART: [afmc] AUTHORITY.KEYID = 5
3,166,794 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,098 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,878 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,587 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,470 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,153 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,209,143 UART: [afmc] --
3,210,141 UART: [cold-reset] --
3,210,719 UART: [state] Locking Datavault
3,211,946 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,550 UART: [state] Locking ICCM
3,213,108 UART: [exit] Launching FMC @ 0x40000130
3,218,438 UART:
3,218,454 UART: Running Caliptra FMC ...
3,218,862 UART:
3,218,916 UART: [state] CFI Enabled
3,229,522 UART: [fht] FMC Alias Private Key: 7
3,348,574 UART: [art] Extend RT PCRs Done
3,349,002 UART: [art] Lock RT PCRs Done
3,350,842 UART: [art] Populate DV Done
3,359,103 UART: [fht] FMC Alias Private Key: 7
3,360,091 UART: [art] Derive CDI
3,360,371 UART: [art] Store in slot 0x4
3,445,511 UART: [art] Derive Key Pair
3,445,871 UART: [art] Store priv key in slot 0x5
3,458,768 UART: [art] Derive Key Pair - Done
3,473,785 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,454 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,219 UART: [art] PUB.X = 317EEA051305B0B3835FAF582765137C1A855BD3B0BF4F9840A9DAB42EFA2D797453F3C866DC18923DD68C7D4E68D904
3,496,986 UART: [art] PUB.Y = 733A8EFD28FCE64379B4CF4832161C536AC9D55822032FA8C7604FA243F7E17BE69B8B446C411949289626410CE774BE
3,503,928 UART: [art] SIG.R = 4C0898AFF5B0D83349FC37FFAF671AFD6D7C1B0837BA955567C940A42E5E4BF23E9B33C9A3A3D393EF4B93F1FFAA431B
3,510,712 UART: [art] SIG.S = FE7DEADE68DBBF0683526A411406001F214E909DD269E92A49E7BD2C06A8E66630A022EE901EDCB3AF82228E42C3605E
3,534,541 UART: Caliptra RT
3,534,792 UART: [state] CFI Enabled
3,655,000 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,406 UART: [rt]cmd =0x46505652, len=4
3,686,066 UART: [rt] FIPS Version
3,687,049 >>> mbox cmd response data (36 bytes)
3,687,050 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,716,507 UART: [rt]cmd =0x46504c54, len=4
3,717,765 >>> mbox cmd response data (8 bytes)
3,717,766 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,747,617 UART: [rt]cmd =0x46504c67, len=4
3,748,711 >>> mbox cmd response: failed
3,749,029 UART: [rt] FIPS self test
3,749,360 UART: [kat] ++
3,749,512 UART: [kat] sha1
3,753,695 UART: [kat] SHA2-256
3,755,625 UART: [kat] SHA2-384
3,758,574 UART: [kat] SHA2-512-ACC
3,760,469 UART: [kat] ECC-384
3,769,904 UART: [kat] HMAC-384Kdf
3,774,538 UART: [kat] LMS
4,349,766 UART: [kat] --
6,621,089 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,628,423 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,657,851 UART: [rt]cmd =0x46504c67, len=4
6,659,092 >>> mbox cmd response data (8 bytes)
6,659,093 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,688,408 UART: [rt]cmd =0x49444543, len=4
6,695,001 >>> mbox cmd response data (37 bytes)
6,695,002 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,724,219 UART: [rt]cmd =0x49444549, len=4
6,726,736 >>> mbox cmd response data (104 bytes)
6,726,737 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,756,068 UART: [rt]cmd =0x49444550, len=4
6,766,083 >>> mbox cmd response data (8 bytes)
6,766,084 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,795,421 UART: [rt]cmd =0x4c444556, len=4
6,805,819 >>> mbox cmd response data (687 bytes)
6,805,820 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,835,341 UART: [rt]cmd =0x43455246, len=4
6,847,507 >>> mbox cmd response data (920 bytes)
6,847,508 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,877,009 UART: [rt]cmd =0x43455252, len=4
6,887,900 >>> mbox cmd response data (783 bytes)
6,887,901 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,918,470 UART: [rt]cmd =0x53494756, len=196
6,923,826 >>> mbox cmd response data (8 bytes)
6,923,827 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,953,880 UART: [rt]cmd =0x4d454153, len=108
6,974,416 >>> mbox cmd response data (12 bytes)
6,974,417 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,003,882 UART: [rt]cmd =0x494e464f, len=4
7,007,638 >>> mbox cmd response data (312 bytes)
7,007,639 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,037,350 UART: [rt]cmd =0x54514754, len=24
7,039,838 >>> mbox cmd response data (8 bytes)
7,039,839 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,069,334 UART: [rt]cmd =0x47544744, len=8
7,071,852 >>> mbox cmd response data (104 bytes)
7,071,853 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,101,356 UART: [rt]cmd =0x50435252, len=8
7,102,934 >>> mbox cmd response data (8 bytes)
7,102,935 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,132,410 UART: [rt]cmd =0x50435251, len=36
7,299,556 >>> mbox cmd response data (1848 bytes)
7,299,557 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,329,350 UART: [rt]cmd =0x50435245, len=56
7,332,703 >>> mbox cmd response data (8 bytes)
7,332,704 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,362,249 UART: [rt]cmd =0x44504543, len=20
7,383,499 >>> mbox cmd response data (44 bytes)
7,383,500 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,412,935 UART: [rt]cmd =0x44504543, len=24
7,440,622 >>> mbox cmd response data (40 bytes)
7,440,623 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,470,546 UART: [rt]cmd =0x44504543, len=96
7,508,993 >>> mbox cmd response data (56 bytes)
7,508,994 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,539,063 UART: [rt]cmd =0x44504543, len=92
7,768,237 >>> mbox cmd response data (6284 bytes)
7,768,238 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,798,499 UART: [rt]cmd =0x44504543, len=136
7,864,995 >>> mbox cmd response data (136 bytes)
7,864,996 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,894,781 UART: [rt]cmd =0x44504543, len=40
7,922,064 >>> mbox cmd response data (40 bytes)
7,922,065 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,951,378 UART: [rt]cmd =0x44504543, len=28
7,995,229 >>> mbox cmd response data (2076 bytes)
7,995,230 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,024,637 UART: [rt]cmd =0x44504543, len=36
8,055,034 >>> mbox cmd response data (24 bytes)
8,055,035 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,084,242 UART: [rt]cmd =0x4453424c, len=4
8,101,914 >>> mbox cmd response data (8 bytes)
8,101,915 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,131,464 UART: [rt]cmd =0x46505344, len=4
8,239,997 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.46s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,801 ready_for_fw is high
1,362,801 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,980,414 >>> mbox cmd response: success
2,980,414 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,041,859 UART:
3,041,875 UART: Running Caliptra FMC ...
3,042,283 UART:
3,042,337 UART: [state] CFI Enabled
3,053,107 UART: [fht] FMC Alias Private Key: 7
3,172,903 UART: [art] Extend RT PCRs Done
3,173,331 UART: [art] Lock RT PCRs Done
3,174,665 UART: [art] Populate DV Done
3,182,790 UART: [fht] FMC Alias Private Key: 7
3,183,854 UART: [art] Derive CDI
3,184,134 UART: [art] Store in slot 0x4
3,269,806 UART: [art] Derive Key Pair
3,270,166 UART: [art] Store priv key in slot 0x5
3,283,109 UART: [art] Derive Key Pair - Done
3,297,998 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,312,987 UART: [art] Erasing AUTHORITY.KEYID = 7
3,313,752 UART: [art] PUB.X = E9C99319395DF804A8CC2B607C2117E626B2F6F7D87598002BA5F09A3328390A584A264F0B1D735BC58872A1F482305B
3,320,485 UART: [art] PUB.Y = 4F40E1B08AD68E2F7F90A4B75066C4B3E9CE51B0B5B386CD787B020CEDF2D1D17CB85B6EB1DFF097F081CF907074482F
3,327,445 UART: [art] SIG.R = 74C85A1B8BD9B0F16E1F506FA14338E382C45F3F0BCFF87877EBEC80A13CA9ED225688BCCD0BCCD78A0B919A0F0B1B51
3,334,222 UART: [art] SIG.S = E504BA2901A30DE89374EE5B0C6C26A3B0E13A16A9B832D5EBD93A25E394396759AE0FC64A3A64D9173D235981B4F1D1
3,358,399 UART: Caliptra RT
3,358,650 UART: [state] CFI Enabled
3,479,876 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,210 UART: [rt]cmd =0x46505652, len=4
3,510,870 UART: [rt] FIPS Version
3,511,895 >>> mbox cmd response data (36 bytes)
3,511,896 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,335 UART: [rt]cmd =0x46504c54, len=4
3,542,487 >>> mbox cmd response data (8 bytes)
3,542,488 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,572,163 UART: [rt]cmd =0x46504c67, len=4
3,573,103 >>> mbox cmd response: failed
3,573,269 UART: [rt] FIPS self test
3,573,600 UART: [kat] ++
3,573,752 UART: [kat] sha1
3,577,961 UART: [kat] SHA2-256
3,579,891 UART: [kat] SHA2-384
3,582,506 UART: [kat] SHA2-512-ACC
3,584,401 UART: [kat] ECC-384
3,594,200 UART: [kat] HMAC-384Kdf
3,598,896 UART: [kat] LMS
4,174,124 UART: [kat] --
6,337,443 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,342,826 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,372,380 UART: [rt]cmd =0x46504c67, len=4
6,373,605 >>> mbox cmd response data (8 bytes)
6,373,606 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,402,845 UART: [rt]cmd =0x49444543, len=4
6,409,372 >>> mbox cmd response data (37 bytes)
6,409,373 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,754 UART: [rt]cmd =0x49444549, len=4
6,441,049 >>> mbox cmd response data (104 bytes)
6,441,050 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,470,427 UART: [rt]cmd =0x49444550, len=4
6,480,780 >>> mbox cmd response data (8 bytes)
6,480,781 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,510,008 UART: [rt]cmd =0x4c444556, len=4
6,520,666 >>> mbox cmd response data (687 bytes)
6,520,667 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,549,866 UART: [rt]cmd =0x43455246, len=4
6,562,348 >>> mbox cmd response data (920 bytes)
6,562,349 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,591,928 UART: [rt]cmd =0x43455252, len=4
6,602,677 >>> mbox cmd response data (783 bytes)
6,602,678 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,633,505 UART: [rt]cmd =0x53494756, len=196
6,638,713 >>> mbox cmd response data (8 bytes)
6,638,714 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,668,895 UART: [rt]cmd =0x4d454153, len=108
6,690,355 >>> mbox cmd response data (12 bytes)
6,690,356 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,719,621 UART: [rt]cmd =0x494e464f, len=4
6,723,165 >>> mbox cmd response data (312 bytes)
6,723,166 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,752,563 UART: [rt]cmd =0x54514754, len=24
6,754,885 >>> mbox cmd response data (8 bytes)
6,754,886 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,784,517 UART: [rt]cmd =0x47544744, len=8
6,787,177 >>> mbox cmd response data (104 bytes)
6,787,178 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,816,459 UART: [rt]cmd =0x50435252, len=8
6,817,927 >>> mbox cmd response data (8 bytes)
6,817,928 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,847,549 UART: [rt]cmd =0x50435251, len=36
7,015,135 >>> mbox cmd response data (1848 bytes)
7,015,136 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,045,019 UART: [rt]cmd =0x50435245, len=56
7,048,756 >>> mbox cmd response data (8 bytes)
7,048,757 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,078,408 UART: [rt]cmd =0x44504543, len=20
7,099,284 >>> mbox cmd response data (44 bytes)
7,099,285 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,128,616 UART: [rt]cmd =0x44504543, len=24
7,155,891 >>> mbox cmd response data (40 bytes)
7,155,892 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,185,995 UART: [rt]cmd =0x44504543, len=96
7,224,012 >>> mbox cmd response data (56 bytes)
7,224,013 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,254,070 UART: [rt]cmd =0x44504543, len=92
7,483,204 >>> mbox cmd response data (6284 bytes)
7,483,205 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,513,334 UART: [rt]cmd =0x44504543, len=136
7,579,560 >>> mbox cmd response data (136 bytes)
7,579,561 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,609,314 UART: [rt]cmd =0x44504543, len=40
7,636,619 >>> mbox cmd response data (40 bytes)
7,636,620 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,666,029 UART: [rt]cmd =0x44504543, len=28
7,709,482 >>> mbox cmd response data (2076 bytes)
7,709,483 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,739,072 UART: [rt]cmd =0x44504543, len=36
7,769,117 >>> mbox cmd response data (24 bytes)
7,769,118 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,798,359 UART: [rt]cmd =0x4453424c, len=4
7,815,547 >>> mbox cmd response data (8 bytes)
7,815,548 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,844,835 UART: [rt]cmd =0x46505344, len=4
7,952,984 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.31s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,293 UART: [state] LifecycleState = Unprovisioned
85,948 UART: [state] DebugLocked = No
86,614 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,254 UART: [kat] SHA2-256
882,185 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,300 UART: [kat] ++
886,452 UART: [kat] sha1
890,700 UART: [kat] SHA2-256
892,638 UART: [kat] SHA2-384
895,367 UART: [kat] SHA2-512-ACC
897,268 UART: [kat] ECC-384
902,673 UART: [kat] HMAC-384Kdf
907,341 UART: [kat] LMS
1,475,537 UART: [kat] --
1,476,476 UART: [cold-reset] ++
1,477,038 UART: [fht] Storing FHT @ 0x50003400
1,479,649 UART: [idev] ++
1,479,817 UART: [idev] CDI.KEYID = 6
1,480,177 UART: [idev] SUBJECT.KEYID = 7
1,480,601 UART: [idev] UDS.KEYID = 0
1,480,946 ready_for_fw is high
1,480,946 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,963 UART: [idev] Erasing UDS.KEYID = 0
1,506,057 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,679 UART: [idev] --
1,515,858 UART: [ldev] ++
1,516,026 UART: [ldev] CDI.KEYID = 6
1,516,389 UART: [ldev] SUBJECT.KEYID = 5
1,516,815 UART: [ldev] AUTHORITY.KEYID = 7
1,517,278 UART: [ldev] FE.KEYID = 1
1,522,604 UART: [ldev] Erasing FE.KEYID = 1
1,548,493 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,562,102 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,818 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,709 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,421 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,475 UART: [ldev] --
1,587,824 UART: [fwproc] Waiting for Commands...
1,588,637 UART: [fwproc] Received command 0x46574c44
1,589,428 UART: [fwproc] Received Image of size 118548 bytes
2,933,934 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,600 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,818 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,067 >>> mbox cmd response: success
3,133,067 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,134,189 UART: [afmc] ++
3,134,357 UART: [afmc] CDI.KEYID = 6
3,134,719 UART: [afmc] SUBJECT.KEYID = 7
3,135,144 UART: [afmc] AUTHORITY.KEYID = 5
3,170,459 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,733 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,513 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,222 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,105 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,788 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,648 UART: [afmc] --
3,213,684 UART: [cold-reset] --
3,214,382 UART: [state] Locking Datavault
3,215,483 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,087 UART: [state] Locking ICCM
3,216,671 UART: [exit] Launching FMC @ 0x40000130
3,222,001 UART:
3,222,017 UART: Running Caliptra FMC ...
3,222,425 UART:
3,222,568 UART: [state] CFI Enabled
3,233,016 UART: [fht] FMC Alias Private Key: 7
3,351,658 UART: [art] Extend RT PCRs Done
3,352,086 UART: [art] Lock RT PCRs Done
3,353,806 UART: [art] Populate DV Done
3,361,975 UART: [fht] FMC Alias Private Key: 7
3,363,041 UART: [art] Derive CDI
3,363,321 UART: [art] Store in slot 0x4
3,448,829 UART: [art] Derive Key Pair
3,449,189 UART: [art] Store priv key in slot 0x5
3,462,648 UART: [art] Derive Key Pair - Done
3,477,684 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,883 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,648 UART: [art] PUB.X = 81F6A27BE569E9899387054B229C2309286CFBCAC86915364E05BE84AC19280765BEF7C5F2B2BB40CBF7682F002CAA09
3,500,385 UART: [art] PUB.Y = 98F7721D03F30E62A7B978590C9D73345ED25C639FF1365638C25721DDC58DDAF9A586F69AB9C19A1278B21D06C3C4F7
3,507,325 UART: [art] SIG.R = 7A2DFDE4EB4E23C111719C6A0147C471E1F50F6996E1F7684525C057BCABF258DA5D88F01BFABFFBE4CF02D91063A9A3
3,514,104 UART: [art] SIG.S = 84C1282C4EAF3B0E84201F146396D999490F463977C0D55BB623A2B8AF33624B010F8E5038A487768164FBD266D20E25
3,537,675 UART: Caliptra RT
3,538,018 UART: [state] CFI Enabled
3,658,720 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,116 UART: [rt]cmd =0x46505652, len=4
3,689,776 UART: [rt] FIPS Version
3,690,911 >>> mbox cmd response data (36 bytes)
3,690,912 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,720,431 UART: [rt]cmd =0x46504c54, len=4
3,721,537 >>> mbox cmd response data (8 bytes)
3,721,538 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,751,295 UART: [rt]cmd =0x46504c67, len=4
3,752,327 >>> mbox cmd response: failed
3,752,495 UART: [rt] FIPS self test
3,752,826 UART: [kat] ++
3,752,978 UART: [kat] sha1
3,757,213 UART: [kat] SHA2-256
3,759,143 UART: [kat] SHA2-384
3,762,078 UART: [kat] SHA2-512-ACC
3,763,973 UART: [kat] ECC-384
3,774,044 UART: [kat] HMAC-384Kdf
3,778,786 UART: [kat] LMS
4,354,014 UART: [kat] --
6,624,555 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,632,039 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,661,441 UART: [rt]cmd =0x46504c67, len=4
6,662,518 >>> mbox cmd response data (8 bytes)
6,662,519 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,691,852 UART: [rt]cmd =0x49444543, len=4
6,698,227 >>> mbox cmd response data (37 bytes)
6,698,228 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,727,351 UART: [rt]cmd =0x49444549, len=4
6,729,640 >>> mbox cmd response data (104 bytes)
6,729,641 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,758,972 UART: [rt]cmd =0x49444550, len=4
6,769,075 >>> mbox cmd response data (8 bytes)
6,769,076 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,798,463 UART: [rt]cmd =0x4c444556, len=4
6,808,967 >>> mbox cmd response data (687 bytes)
6,808,968 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,838,321 UART: [rt]cmd =0x43455246, len=4
6,850,725 >>> mbox cmd response data (920 bytes)
6,850,726 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,880,035 UART: [rt]cmd =0x43455252, len=4
6,891,124 >>> mbox cmd response data (783 bytes)
6,891,125 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,921,880 UART: [rt]cmd =0x53494756, len=196
6,927,328 >>> mbox cmd response data (8 bytes)
6,927,329 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,957,182 UART: [rt]cmd =0x4d454153, len=108
6,977,720 >>> mbox cmd response data (12 bytes)
6,977,721 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,007,164 UART: [rt]cmd =0x494e464f, len=4
7,010,712 >>> mbox cmd response data (312 bytes)
7,010,713 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,040,068 UART: [rt]cmd =0x54514754, len=24
7,042,198 >>> mbox cmd response data (8 bytes)
7,042,199 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,071,838 UART: [rt]cmd =0x47544744, len=8
7,074,398 >>> mbox cmd response data (104 bytes)
7,074,399 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,103,634 UART: [rt]cmd =0x50435252, len=8
7,104,782 >>> mbox cmd response data (8 bytes)
7,104,783 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,320 UART: [rt]cmd =0x50435251, len=36
7,301,820 >>> mbox cmd response data (1848 bytes)
7,301,821 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,331,466 UART: [rt]cmd =0x50435245, len=56
7,334,931 >>> mbox cmd response data (8 bytes)
7,334,932 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,364,417 UART: [rt]cmd =0x44504543, len=20
7,385,259 >>> mbox cmd response data (44 bytes)
7,385,260 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,414,611 UART: [rt]cmd =0x44504543, len=24
7,441,802 >>> mbox cmd response data (40 bytes)
7,441,803 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,471,734 UART: [rt]cmd =0x44504543, len=96
7,510,549 >>> mbox cmd response data (56 bytes)
7,510,550 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,540,467 UART: [rt]cmd =0x44504543, len=92
7,769,211 >>> mbox cmd response data (6284 bytes)
7,769,212 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,799,337 UART: [rt]cmd =0x44504543, len=136
7,866,965 >>> mbox cmd response data (136 bytes)
7,866,966 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,896,455 UART: [rt]cmd =0x44504543, len=40
7,923,908 >>> mbox cmd response data (40 bytes)
7,923,909 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,953,414 UART: [rt]cmd =0x44504543, len=28
7,997,147 >>> mbox cmd response data (2076 bytes)
7,997,148 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,026,611 UART: [rt]cmd =0x44504543, len=36
8,057,172 >>> mbox cmd response data (24 bytes)
8,057,173 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,086,692 UART: [rt]cmd =0x4453424c, len=4
8,103,728 >>> mbox cmd response data (8 bytes)
8,103,729 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
8,133,044 UART: [rt]cmd =0x46505344, len=4
8,241,581 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.59s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,556 ready_for_fw is high
1,362,556 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,211 >>> mbox cmd response: success
2,981,211 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,043,060 UART:
3,043,076 UART: Running Caliptra FMC ...
3,043,484 UART:
3,043,627 UART: [state] CFI Enabled
3,054,343 UART: [fht] FMC Alias Private Key: 7
3,172,997 UART: [art] Extend RT PCRs Done
3,173,425 UART: [art] Lock RT PCRs Done
3,175,177 UART: [art] Populate DV Done
3,183,334 UART: [fht] FMC Alias Private Key: 7
3,184,364 UART: [art] Derive CDI
3,184,644 UART: [art] Store in slot 0x4
3,270,504 UART: [art] Derive Key Pair
3,270,864 UART: [art] Store priv key in slot 0x5
3,284,217 UART: [art] Derive Key Pair - Done
3,299,246 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,389 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,154 UART: [art] PUB.X = EEF6E8E05CC3A75DC0B91DB2549BA535ECE8780551BC9C5DACA45499C9536ADE2A57F84BA8E7B9631D361F752C894B7B
3,321,939 UART: [art] PUB.Y = 172D9F13F07B72BBEE8EE35BB31206BE61A731A7E85896D2081AE7905258697536A7A46CFF4A1E3F693E8E6590D44FEB
3,328,889 UART: [art] SIG.R = B94FBD4BBCA3484A06E08AF26ED7D10858439ED0F871723EC085E0DFA2D939CD98FB86BC8C1128CCF948650EEED47E3B
3,335,670 UART: [art] SIG.S = C973665474E8E55998F25CA91B887E69F1329E73B1A029E7256F2F9AAF1B8D4257419917B9E7D20D8B4EBB8C49831759
3,359,007 UART: Caliptra RT
3,359,350 UART: [state] CFI Enabled
3,479,587 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,401 UART: [rt]cmd =0x46505652, len=4
3,511,061 UART: [rt] FIPS Version
3,511,912 >>> mbox cmd response data (36 bytes)
3,511,913 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,541,458 UART: [rt]cmd =0x46504c54, len=4
3,542,760 >>> mbox cmd response data (8 bytes)
3,542,761 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,572,640 UART: [rt]cmd =0x46504c67, len=4
3,573,550 >>> mbox cmd response: failed
3,573,874 UART: [rt] FIPS self test
3,574,205 UART: [kat] ++
3,574,357 UART: [kat] sha1
3,578,460 UART: [kat] SHA2-256
3,580,390 UART: [kat] SHA2-384
3,583,071 UART: [kat] SHA2-512-ACC
3,584,966 UART: [kat] ECC-384
3,594,903 UART: [kat] HMAC-384Kdf
3,599,697 UART: [kat] LMS
4,174,925 UART: [kat] --
6,339,036 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,343,273 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,372,545 UART: [rt]cmd =0x46504c67, len=4
6,373,662 >>> mbox cmd response data (8 bytes)
6,373,663 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,403,166 UART: [rt]cmd =0x49444543, len=4
6,409,759 >>> mbox cmd response data (37 bytes)
6,409,760 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,981 UART: [rt]cmd =0x49444549, len=4
6,441,100 >>> mbox cmd response data (104 bytes)
6,441,101 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,470,674 UART: [rt]cmd =0x49444550, len=4
6,480,692 >>> mbox cmd response data (8 bytes)
6,480,693 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,510,074 UART: [rt]cmd =0x4c444556, len=4
6,520,506 >>> mbox cmd response data (687 bytes)
6,520,507 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,549,810 UART: [rt]cmd =0x43455246, len=4
6,562,230 >>> mbox cmd response data (920 bytes)
6,562,231 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,591,386 UART: [rt]cmd =0x43455252, len=4
6,602,362 >>> mbox cmd response data (784 bytes)
6,602,363 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,632,936 UART: [rt]cmd =0x53494756, len=196
6,638,520 >>> mbox cmd response data (8 bytes)
6,638,521 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,668,558 UART: [rt]cmd =0x4d454153, len=108
6,689,276 >>> mbox cmd response data (12 bytes)
6,689,277 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,718,490 UART: [rt]cmd =0x494e464f, len=4
6,722,106 >>> mbox cmd response data (312 bytes)
6,722,107 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,751,546 UART: [rt]cmd =0x54514754, len=24
6,753,716 >>> mbox cmd response data (8 bytes)
6,753,717 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,783,182 UART: [rt]cmd =0x47544744, len=8
6,785,656 >>> mbox cmd response data (104 bytes)
6,785,657 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,815,112 UART: [rt]cmd =0x50435252, len=8
6,816,662 >>> mbox cmd response data (8 bytes)
6,816,663 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,846,258 UART: [rt]cmd =0x50435251, len=36
7,013,722 >>> mbox cmd response data (1848 bytes)
7,013,723 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,043,432 UART: [rt]cmd =0x50435245, len=56
7,047,103 >>> mbox cmd response data (8 bytes)
7,047,104 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,076,501 UART: [rt]cmd =0x44504543, len=20
7,097,061 >>> mbox cmd response data (44 bytes)
7,097,062 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,126,593 UART: [rt]cmd =0x44504543, len=24
7,154,230 >>> mbox cmd response data (40 bytes)
7,154,231 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,184,234 UART: [rt]cmd =0x44504543, len=96
7,222,345 >>> mbox cmd response data (56 bytes)
7,222,346 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,252,249 UART: [rt]cmd =0x44504543, len=92
7,480,508 >>> mbox cmd response data (6284 bytes)
7,480,509 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,510,412 UART: [rt]cmd =0x44504543, len=136
7,577,374 >>> mbox cmd response data (136 bytes)
7,577,375 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,607,118 UART: [rt]cmd =0x44504543, len=40
7,634,461 >>> mbox cmd response data (40 bytes)
7,634,462 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,663,757 UART: [rt]cmd =0x44504543, len=28
7,707,222 >>> mbox cmd response data (2076 bytes)
7,707,223 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,736,726 UART: [rt]cmd =0x44504543, len=36
7,767,179 >>> mbox cmd response data (24 bytes)
7,767,180 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,796,587 UART: [rt]cmd =0x4453424c, len=4
7,813,987 >>> mbox cmd response data (8 bytes)
7,813,988 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,843,321 UART: [rt]cmd =0x46505344, len=4
7,951,628 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 2.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,288 UART: [state] LifecycleState = Unprovisioned
85,943 UART: [state] DebugLocked = No
86,589 UART: [state] WD Timer not started. Device not locked for debugging
87,786 UART: [kat] SHA2-256
891,336 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,440 UART: [kat] ++
895,592 UART: [kat] sha1
900,016 UART: [kat] SHA2-256
901,956 UART: [kat] SHA2-384
904,513 UART: [kat] SHA2-512-ACC
906,414 UART: [kat] ECC-384
916,129 UART: [kat] HMAC-384Kdf
920,709 UART: [kat] LMS
1,169,021 UART: [kat] --
1,170,108 UART: [cold-reset] ++
1,170,686 UART: [fht] FHT @ 0x50003400
1,173,250 UART: [idev] ++
1,173,418 UART: [idev] CDI.KEYID = 6
1,173,779 UART: [idev] SUBJECT.KEYID = 7
1,174,204 UART: [idev] UDS.KEYID = 0
1,174,550 ready_for_fw is high
1,174,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,817 UART: [idev] Erasing UDS.KEYID = 0
1,199,971 UART: [idev] Sha1 KeyId Algorithm
1,208,667 UART: [idev] --
1,209,848 UART: [ldev] ++
1,210,016 UART: [ldev] CDI.KEYID = 6
1,210,380 UART: [ldev] SUBJECT.KEYID = 5
1,210,807 UART: [ldev] AUTHORITY.KEYID = 7
1,211,270 UART: [ldev] FE.KEYID = 1
1,216,472 UART: [ldev] Erasing FE.KEYID = 1
1,243,465 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,909 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,625 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,514 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,226 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,286 UART: [ldev] --
1,282,645 UART: [fwproc] Wait for Commands...
1,283,454 UART: [fwproc] Recv command 0x46574c44
1,284,187 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,326 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,205 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,380 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,547 >>> mbox cmd response: success
2,827,547 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,747 UART: [afmc] ++
2,828,915 UART: [afmc] CDI.KEYID = 6
2,829,278 UART: [afmc] SUBJECT.KEYID = 7
2,829,704 UART: [afmc] AUTHORITY.KEYID = 5
2,864,519 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,808 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,557 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,267 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,148 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,849 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,906,648 UART: [afmc] --
2,907,703 UART: [cold-reset] --
2,908,405 UART: [state] Locking Datavault
2,909,690 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,294 UART: [state] Locking ICCM
2,910,922 UART: [exit] Launching FMC @ 0x40000130
2,916,252 UART:
2,916,268 UART: Running Caliptra FMC ...
2,916,676 UART:
2,916,730 UART: [state] CFI Enabled
2,926,884 UART: [fht] FMC Alias Private Key: 7
3,045,400 UART: [art] Extend RT PCRs Done
3,045,828 UART: [art] Lock RT PCRs Done
3,047,510 UART: [art] Populate DV Done
3,055,629 UART: [fht] FMC Alias Private Key: 7
3,056,797 UART: [art] Derive CDI
3,057,077 UART: [art] Store in slot 0x4
3,143,044 UART: [art] Derive Key Pair
3,143,404 UART: [art] Store priv key in slot 0x5
3,156,374 UART: [art] Derive Key Pair - Done
3,171,173 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,590 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,355 UART: [art] PUB.X = 7FD2153F66500B29F9D8B68C7C9726B8AAB5C27DAE15A9CCBDA09C68897F2FF1012CCA3ADA45A07D03C6FB715F05E9AF
3,194,135 UART: [art] PUB.Y = 6AF4C75A8177B83FDD3D40EE0F7E8459977C8815CB991402BF4B118E815366C8ABF74FE567BED361DDF72015E043A874
3,201,085 UART: [art] SIG.R = 65A839C3E50DDF84AD48B3B962745DA59EA3808B12E21E20F8E5F2D53F8E92DE84337B54EEA84DEEDA3F06651F282A67
3,207,861 UART: [art] SIG.S = E5147D6BFF71BBC7712A5B0DBBA77BE3D2ED8489250563522250B8F28294CDD69AD9EE46055A706C0A6FF45AE9A6B7BA
3,231,377 UART: Caliptra RT
3,231,628 UART: [state] CFI Enabled
3,351,699 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,431 UART: [rt]cmd =0x46505652, len=4
3,383,091 UART: [rt] FIPS Version
3,384,266 >>> mbox cmd response data (36 bytes)
3,384,267 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,524 UART: [rt]cmd =0x46504c54, len=4
3,414,780 >>> mbox cmd response data (8 bytes)
3,414,781 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,444,560 UART: [rt]cmd =0x46504c67, len=4
3,445,472 >>> mbox cmd response: failed
3,445,750 UART: [rt] FIPS self test
3,446,081 UART: [kat] ++
3,446,233 UART: [kat] sha1
3,450,534 UART: [kat] SHA2-256
3,452,464 UART: [kat] SHA2-384
3,455,207 UART: [kat] SHA2-512-ACC
3,457,102 UART: [kat] ECC-384
3,466,885 UART: [kat] HMAC-384Kdf
3,471,440 UART: [kat] LMS
3,731,200 UART: [kat] --
6,009,449 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,015,215 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,044,711 UART: [rt]cmd =0x46504c67, len=4
6,046,054 >>> mbox cmd response data (8 bytes)
6,046,055 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,075,286 UART: [rt]cmd =0x49444543, len=4
6,081,899 >>> mbox cmd response data (37 bytes)
6,081,900 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,111,369 UART: [rt]cmd =0x49444549, len=4
6,113,484 >>> mbox cmd response data (104 bytes)
6,113,485 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,142,824 UART: [rt]cmd =0x49444550, len=4
6,152,931 >>> mbox cmd response data (8 bytes)
6,152,932 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,257 UART: [rt]cmd =0x4c444556, len=4
6,192,627 >>> mbox cmd response data (687 bytes)
6,192,628 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,221,903 UART: [rt]cmd =0x43455246, len=4
6,233,964 >>> mbox cmd response data (888 bytes)
6,233,965 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,263,262 UART: [rt]cmd =0x43455252, len=4
6,274,297 >>> mbox cmd response data (783 bytes)
6,274,298 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,304,659 UART: [rt]cmd =0x53494756, len=196
6,310,133 >>> mbox cmd response data (8 bytes)
6,310,134 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,340,173 UART: [rt]cmd =0x4d454153, len=108
6,361,027 >>> mbox cmd response data (12 bytes)
6,361,028 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,639 UART: [rt]cmd =0x494e464f, len=4
6,394,269 >>> mbox cmd response data (312 bytes)
6,394,270 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,423,719 UART: [rt]cmd =0x54514754, len=24
6,426,117 >>> mbox cmd response data (8 bytes)
6,426,118 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,571 UART: [rt]cmd =0x47544744, len=8
6,458,085 >>> mbox cmd response data (104 bytes)
6,458,086 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,487,457 UART: [rt]cmd =0x50435252, len=8
6,489,277 >>> mbox cmd response data (8 bytes)
6,489,278 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,921 UART: [rt]cmd =0x50435251, len=36
6,686,293 >>> mbox cmd response data (1848 bytes)
6,686,294 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,715,795 UART: [rt]cmd =0x50435245, len=56
6,719,124 >>> mbox cmd response data (8 bytes)
6,719,125 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,748,694 UART: [rt]cmd =0x44504543, len=20
6,769,614 >>> mbox cmd response data (44 bytes)
6,769,615 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,799,154 UART: [rt]cmd =0x44504543, len=24
6,826,423 >>> mbox cmd response data (40 bytes)
6,826,424 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,856,143 UART: [rt]cmd =0x44504543, len=96
6,894,980 >>> mbox cmd response data (56 bytes)
6,894,981 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,925,142 UART: [rt]cmd =0x44504543, len=92
7,154,344 >>> mbox cmd response data (6284 bytes)
7,154,345 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,184,542 UART: [rt]cmd =0x44504543, len=136
7,251,640 >>> mbox cmd response data (136 bytes)
7,251,641 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,281,142 UART: [rt]cmd =0x44504543, len=40
7,308,111 >>> mbox cmd response data (40 bytes)
7,308,112 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,337,511 UART: [rt]cmd =0x44504543, len=28
7,381,144 >>> mbox cmd response data (2076 bytes)
7,381,145 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,410,728 UART: [rt]cmd =0x44504543, len=36
7,440,911 >>> mbox cmd response data (24 bytes)
7,440,912 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,470,089 UART: [rt]cmd =0x4453424c, len=4
7,487,001 >>> mbox cmd response data (8 bytes)
7,487,002 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,516,487 UART: [rt]cmd =0x46505344, len=4
7,625,282 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.49s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,838 ready_for_fw is high
1,058,838 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,796 >>> mbox cmd response: success
2,677,796 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,969 UART:
2,740,985 UART: Running Caliptra FMC ...
2,741,393 UART:
2,741,447 UART: [state] CFI Enabled
2,751,749 UART: [fht] FMC Alias Private Key: 7
2,870,291 UART: [art] Extend RT PCRs Done
2,870,719 UART: [art] Lock RT PCRs Done
2,872,263 UART: [art] Populate DV Done
2,880,576 UART: [fht] FMC Alias Private Key: 7
2,881,716 UART: [art] Derive CDI
2,881,996 UART: [art] Store in slot 0x4
2,967,531 UART: [art] Derive Key Pair
2,967,891 UART: [art] Store priv key in slot 0x5
2,980,635 UART: [art] Derive Key Pair - Done
2,995,259 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,764 UART: [art] Erasing AUTHORITY.KEYID = 7
3,011,529 UART: [art] PUB.X = 098E29D4CD7986112DEF20C2D4A18CE129BF4446C4B237A8DAC19ED7B0253B6640038466BA172CAEBFF210DC16DA9C00
3,018,283 UART: [art] PUB.Y = E47C5955D3386E6BBF561126BF48438F3A2FFAE283472FCF66515B21C9BFD8788EC7C832B8AD13F29AD38930807A8C91
3,025,239 UART: [art] SIG.R = 2E6CBA4F09512CEA0525C2A91A50D5312A46E5F46F085D94312EC5222BCD11606E02420A5418ECED300D670E1706ABEC
3,031,991 UART: [art] SIG.S = E9A320CEEDCF8CFA5ACA28EC040ACA2A8CACC1D021A31380471D85B97BFE71B17742821C76A719B7A0A5442B62EB3F5B
3,056,327 UART: Caliptra RT
3,056,578 UART: [state] CFI Enabled
3,176,067 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,765 UART: [rt]cmd =0x46505652, len=4
3,207,425 UART: [rt] FIPS Version
3,208,288 >>> mbox cmd response data (36 bytes)
3,208,289 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,396 UART: [rt]cmd =0x46504c54, len=4
3,238,574 >>> mbox cmd response data (8 bytes)
3,238,575 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,268,080 UART: [rt]cmd =0x46504c67, len=4
3,269,004 >>> mbox cmd response: failed
3,269,198 UART: [rt] FIPS self test
3,269,529 UART: [kat] ++
3,269,681 UART: [kat] sha1
3,273,918 UART: [kat] SHA2-256
3,275,848 UART: [kat] SHA2-384
3,278,437 UART: [kat] SHA2-512-ACC
3,280,332 UART: [kat] ECC-384
3,290,037 UART: [kat] HMAC-384Kdf
3,294,542 UART: [kat] LMS
3,554,302 UART: [kat] --
5,729,271 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,738,757 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,768,115 UART: [rt]cmd =0x46504c67, len=4
5,769,260 >>> mbox cmd response data (8 bytes)
5,769,261 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,798,758 UART: [rt]cmd =0x49444543, len=4
5,805,069 >>> mbox cmd response data (37 bytes)
5,805,070 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,834,511 UART: [rt]cmd =0x49444549, len=4
5,836,838 >>> mbox cmd response data (104 bytes)
5,836,839 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,866,108 UART: [rt]cmd =0x49444550, len=4
5,876,019 >>> mbox cmd response data (8 bytes)
5,876,020 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,905,375 UART: [rt]cmd =0x4c444556, len=4
5,915,909 >>> mbox cmd response data (687 bytes)
5,915,910 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,945,107 UART: [rt]cmd =0x43455246, len=4
5,957,192 >>> mbox cmd response data (888 bytes)
5,957,193 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,986,630 UART: [rt]cmd =0x43455252, len=4
5,997,601 >>> mbox cmd response data (783 bytes)
5,997,602 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,028,083 UART: [rt]cmd =0x53494756, len=196
6,033,653 >>> mbox cmd response data (8 bytes)
6,033,654 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,063,805 UART: [rt]cmd =0x4d454153, len=108
6,084,961 >>> mbox cmd response data (12 bytes)
6,084,962 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,114,283 UART: [rt]cmd =0x494e464f, len=4
6,118,007 >>> mbox cmd response data (312 bytes)
6,118,008 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,147,293 UART: [rt]cmd =0x54514754, len=24
6,149,333 >>> mbox cmd response data (8 bytes)
6,149,334 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,178,821 UART: [rt]cmd =0x47544744, len=8
6,181,239 >>> mbox cmd response data (104 bytes)
6,181,240 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,210,531 UART: [rt]cmd =0x50435252, len=8
6,212,193 >>> mbox cmd response data (8 bytes)
6,212,194 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,241,769 UART: [rt]cmd =0x50435251, len=36
6,409,217 >>> mbox cmd response data (1848 bytes)
6,409,218 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,438,975 UART: [rt]cmd =0x50435245, len=56
6,442,644 >>> mbox cmd response data (8 bytes)
6,442,645 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,472,186 UART: [rt]cmd =0x44504543, len=20
6,493,176 >>> mbox cmd response data (44 bytes)
6,493,177 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,522,696 UART: [rt]cmd =0x44504543, len=24
6,550,333 >>> mbox cmd response data (40 bytes)
6,550,334 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,580,275 UART: [rt]cmd =0x44504543, len=96
6,618,956 >>> mbox cmd response data (56 bytes)
6,618,957 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,649,040 UART: [rt]cmd =0x44504543, len=92
6,877,204 >>> mbox cmd response data (6284 bytes)
6,877,205 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,907,416 UART: [rt]cmd =0x44504543, len=136
6,974,424 >>> mbox cmd response data (136 bytes)
6,974,425 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,003,962 UART: [rt]cmd =0x44504543, len=40
7,031,269 >>> mbox cmd response data (40 bytes)
7,031,270 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,061,099 UART: [rt]cmd =0x44504543, len=28
7,104,566 >>> mbox cmd response data (2076 bytes)
7,104,567 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,110 UART: [rt]cmd =0x44504543, len=36
7,164,363 >>> mbox cmd response data (24 bytes)
7,164,364 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,193,977 UART: [rt]cmd =0x4453424c, len=4
7,212,147 >>> mbox cmd response data (8 bytes)
7,212,148 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,241,543 UART: [rt]cmd =0x46505344, len=4
7,350,248 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.21s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,291 UART: [state] LifecycleState = Unprovisioned
85,946 UART: [state] DebugLocked = No
86,604 UART: [state] WD Timer not started. Device not locked for debugging
87,955 UART: [kat] SHA2-256
891,505 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,609 UART: [kat] ++
895,761 UART: [kat] sha1
900,199 UART: [kat] SHA2-256
902,139 UART: [kat] SHA2-384
904,824 UART: [kat] SHA2-512-ACC
906,725 UART: [kat] ECC-384
916,148 UART: [kat] HMAC-384Kdf
920,712 UART: [kat] LMS
1,169,024 UART: [kat] --
1,169,785 UART: [cold-reset] ++
1,170,175 UART: [fht] FHT @ 0x50003400
1,172,847 UART: [idev] ++
1,173,015 UART: [idev] CDI.KEYID = 6
1,173,376 UART: [idev] SUBJECT.KEYID = 7
1,173,801 UART: [idev] UDS.KEYID = 0
1,174,147 ready_for_fw is high
1,174,147 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,182,142 UART: [idev] Erasing UDS.KEYID = 0
1,198,962 UART: [idev] Sha1 KeyId Algorithm
1,207,828 UART: [idev] --
1,208,687 UART: [ldev] ++
1,208,855 UART: [ldev] CDI.KEYID = 6
1,209,219 UART: [ldev] SUBJECT.KEYID = 5
1,209,646 UART: [ldev] AUTHORITY.KEYID = 7
1,210,109 UART: [ldev] FE.KEYID = 1
1,215,639 UART: [ldev] Erasing FE.KEYID = 1
1,241,894 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,610 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,326 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,215 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,927 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,957 UART: [ldev] --
1,281,194 UART: [fwproc] Wait for Commands...
1,281,781 UART: [fwproc] Recv command 0x46574c44
1,282,514 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,847 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,488 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,663 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,888 >>> mbox cmd response: success
2,825,888 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,826,958 UART: [afmc] ++
2,827,126 UART: [afmc] CDI.KEYID = 6
2,827,489 UART: [afmc] SUBJECT.KEYID = 7
2,827,915 UART: [afmc] AUTHORITY.KEYID = 5
2,863,390 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,487 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,236 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,946 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,827 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,528 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,343 UART: [afmc] --
2,906,392 UART: [cold-reset] --
2,907,482 UART: [state] Locking Datavault
2,908,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,201 UART: [state] Locking ICCM
2,909,651 UART: [exit] Launching FMC @ 0x40000130
2,914,981 UART:
2,914,997 UART: Running Caliptra FMC ...
2,915,405 UART:
2,915,548 UART: [state] CFI Enabled
2,926,272 UART: [fht] FMC Alias Private Key: 7
3,045,460 UART: [art] Extend RT PCRs Done
3,045,888 UART: [art] Lock RT PCRs Done
3,047,490 UART: [art] Populate DV Done
3,055,559 UART: [fht] FMC Alias Private Key: 7
3,056,541 UART: [art] Derive CDI
3,056,821 UART: [art] Store in slot 0x4
3,142,510 UART: [art] Derive Key Pair
3,142,870 UART: [art] Store priv key in slot 0x5
3,155,628 UART: [art] Derive Key Pair - Done
3,170,476 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,019 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,784 UART: [art] PUB.X = 08A6D52B0BDC59A71131E7528FFED45A5367F54F766A98D21634F2935B92076A7F1E008A880B643881DE51716CE57CED
3,193,520 UART: [art] PUB.Y = C615B559AFE5C261DEFB8D424A5A7E285626A3A3C13F933E780F983B2BBCF5B11ABE11EF82EBDB044A3C774DAEDC7115
3,200,486 UART: [art] SIG.R = 9A900C3A1BDC96C22C0AB75715C7AA71A6C364D60B7A9B51FB78C13003ABEF234A60C78ECC0358D7195417E3CF66E688
3,207,251 UART: [art] SIG.S = C50D504D966DFB201CC2DB953A4345D0BAE666975A0BA1DC452B5D22DC8DA03AE75E2F33BB359F356AC145D37BD4B3E3
3,231,655 UART: Caliptra RT
3,231,998 UART: [state] CFI Enabled
3,351,524 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,198 UART: [rt]cmd =0x46505652, len=4
3,382,858 UART: [rt] FIPS Version
3,383,949 >>> mbox cmd response data (36 bytes)
3,383,950 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,413,303 UART: [rt]cmd =0x46504c54, len=4
3,414,449 >>> mbox cmd response data (8 bytes)
3,414,450 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,443,979 UART: [rt]cmd =0x46504c67, len=4
3,445,017 >>> mbox cmd response: failed
3,445,333 UART: [rt] FIPS self test
3,445,664 UART: [kat] ++
3,445,816 UART: [kat] sha1
3,450,031 UART: [kat] SHA2-256
3,451,961 UART: [kat] SHA2-384
3,454,866 UART: [kat] SHA2-512-ACC
3,456,761 UART: [kat] ECC-384
3,466,530 UART: [kat] HMAC-384Kdf
3,471,025 UART: [kat] LMS
3,730,785 UART: [kat] --
6,008,910 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,014,760 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,044,036 UART: [rt]cmd =0x46504c67, len=4
6,045,269 >>> mbox cmd response data (8 bytes)
6,045,270 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,074,657 UART: [rt]cmd =0x49444543, len=4
6,081,164 >>> mbox cmd response data (37 bytes)
6,081,165 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,110,258 UART: [rt]cmd =0x49444549, len=4
6,112,615 >>> mbox cmd response data (104 bytes)
6,112,616 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,142,199 UART: [rt]cmd =0x49444550, len=4
6,152,205 >>> mbox cmd response data (8 bytes)
6,152,206 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,181,581 UART: [rt]cmd =0x4c444556, len=4
6,192,107 >>> mbox cmd response data (687 bytes)
6,192,108 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,221,387 UART: [rt]cmd =0x43455246, len=4
6,233,338 >>> mbox cmd response data (888 bytes)
6,233,339 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,262,774 UART: [rt]cmd =0x43455252, len=4
6,273,636 >>> mbox cmd response data (784 bytes)
6,273,637 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,304,138 UART: [rt]cmd =0x53494756, len=196
6,309,902 >>> mbox cmd response data (8 bytes)
6,309,903 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,339,980 UART: [rt]cmd =0x4d454153, len=108
6,361,052 >>> mbox cmd response data (12 bytes)
6,361,053 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,580 UART: [rt]cmd =0x494e464f, len=4
6,394,378 >>> mbox cmd response data (312 bytes)
6,394,379 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,423,840 UART: [rt]cmd =0x54514754, len=24
6,425,912 >>> mbox cmd response data (8 bytes)
6,425,913 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,270 UART: [rt]cmd =0x47544744, len=8
6,457,932 >>> mbox cmd response data (104 bytes)
6,457,933 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,487,368 UART: [rt]cmd =0x50435252, len=8
6,488,856 >>> mbox cmd response data (8 bytes)
6,488,857 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,584 UART: [rt]cmd =0x50435251, len=36
6,685,950 >>> mbox cmd response data (1848 bytes)
6,685,951 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,715,676 UART: [rt]cmd =0x50435245, len=56
6,719,013 >>> mbox cmd response data (8 bytes)
6,719,014 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,748,437 UART: [rt]cmd =0x44504543, len=20
6,769,275 >>> mbox cmd response data (44 bytes)
6,769,276 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,798,737 UART: [rt]cmd =0x44504543, len=24
6,826,502 >>> mbox cmd response data (40 bytes)
6,826,503 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,856,388 UART: [rt]cmd =0x44504543, len=96
6,895,375 >>> mbox cmd response data (56 bytes)
6,895,376 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,925,463 UART: [rt]cmd =0x44504543, len=92
7,156,141 >>> mbox cmd response data (6284 bytes)
7,156,142 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,186,295 UART: [rt]cmd =0x44504543, len=136
7,254,129 >>> mbox cmd response data (136 bytes)
7,254,130 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,283,539 UART: [rt]cmd =0x44504543, len=40
7,310,804 >>> mbox cmd response data (40 bytes)
7,310,805 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,340,290 UART: [rt]cmd =0x44504543, len=28
7,383,821 >>> mbox cmd response data (2076 bytes)
7,383,822 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,413,269 UART: [rt]cmd =0x44504543, len=36
7,443,918 >>> mbox cmd response data (24 bytes)
7,443,919 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,473,186 UART: [rt]cmd =0x4453424c, len=4
7,491,280 >>> mbox cmd response data (8 bytes)
7,491,281 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,520,552 UART: [rt]cmd =0x46505344, len=4
7,629,219 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,915 ready_for_fw is high
1,058,915 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,585 >>> mbox cmd response: success
2,678,585 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,352 UART:
2,740,368 UART: Running Caliptra FMC ...
2,740,776 UART:
2,740,919 UART: [state] CFI Enabled
2,751,713 UART: [fht] FMC Alias Private Key: 7
2,870,499 UART: [art] Extend RT PCRs Done
2,870,927 UART: [art] Lock RT PCRs Done
2,872,841 UART: [art] Populate DV Done
2,881,148 UART: [fht] FMC Alias Private Key: 7
2,882,326 UART: [art] Derive CDI
2,882,606 UART: [art] Store in slot 0x4
2,968,115 UART: [art] Derive Key Pair
2,968,475 UART: [art] Store priv key in slot 0x5
2,982,059 UART: [art] Derive Key Pair - Done
2,996,776 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,120 UART: [art] PUB.X = EF7FEF52B74E4C0781D0AD678711ABE61F938B1C62805EB726DC2C6C44B579C2B7AE473199F64E5132F56F6CAD7AA398
3,019,899 UART: [art] PUB.Y = DA60367042608737406E757C3BC353BF4B2FF35332096E37263424913392472F0EA5359D6F0EEDCD4B1004C4DEC8076E
3,026,828 UART: [art] SIG.R = 6F95F827150282A9F6143B7E79127CAB84240F6D9F3915F32E35AF0052BAAAA291026DA56CFEC8BFAE5CC5AD712CAE41
3,033,581 UART: [art] SIG.S = AF20EA31FD79559DDCA4C99B668FF78FEF861584151D76F916DACE19B6735769F710873A1C8C39ECFAFE8603A74D260A
3,057,011 UART: Caliptra RT
3,057,354 UART: [state] CFI Enabled
3,176,485 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,207,065 UART: [rt]cmd =0x46505652, len=4
3,207,725 UART: [rt] FIPS Version
3,208,640 >>> mbox cmd response data (36 bytes)
3,208,641 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,238,102 UART: [rt]cmd =0x46504c54, len=4
3,239,402 >>> mbox cmd response data (8 bytes)
3,239,403 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,268,868 UART: [rt]cmd =0x46504c67, len=4
3,269,658 >>> mbox cmd response: failed
3,269,924 UART: [rt] FIPS self test
3,270,255 UART: [kat] ++
3,270,407 UART: [kat] sha1
3,274,660 UART: [kat] SHA2-256
3,276,590 UART: [kat] SHA2-384
3,279,327 UART: [kat] SHA2-512-ACC
3,281,222 UART: [kat] ECC-384
3,291,105 UART: [kat] HMAC-384Kdf
3,295,864 UART: [kat] LMS
3,555,624 UART: [kat] --
5,730,689 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,739,411 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,768,733 UART: [rt]cmd =0x46504c67, len=4
5,770,008 >>> mbox cmd response data (8 bytes)
5,770,009 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,799,346 UART: [rt]cmd =0x49444543, len=4
5,805,657 >>> mbox cmd response data (37 bytes)
5,805,658 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,835,027 UART: [rt]cmd =0x49444549, len=4
5,837,288 >>> mbox cmd response data (104 bytes)
5,837,289 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,866,778 UART: [rt]cmd =0x49444550, len=4
5,876,871 >>> mbox cmd response data (8 bytes)
5,876,872 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,906,037 UART: [rt]cmd =0x4c444556, len=4
5,916,635 >>> mbox cmd response data (687 bytes)
5,916,636 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,945,783 UART: [rt]cmd =0x43455246, len=4
5,957,674 >>> mbox cmd response data (888 bytes)
5,957,675 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,986,880 UART: [rt]cmd =0x43455252, len=4
5,997,699 >>> mbox cmd response data (783 bytes)
5,997,700 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,028,405 UART: [rt]cmd =0x53494756, len=196
6,033,699 >>> mbox cmd response data (8 bytes)
6,033,700 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,063,713 UART: [rt]cmd =0x4d454153, len=108
6,085,019 >>> mbox cmd response data (12 bytes)
6,085,020 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,114,493 UART: [rt]cmd =0x494e464f, len=4
6,118,113 >>> mbox cmd response data (312 bytes)
6,118,114 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,147,525 UART: [rt]cmd =0x54514754, len=24
6,149,653 >>> mbox cmd response data (8 bytes)
6,149,654 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,179,115 UART: [rt]cmd =0x47544744, len=8
6,181,551 >>> mbox cmd response data (104 bytes)
6,181,552 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,210,943 UART: [rt]cmd =0x50435252, len=8
6,212,625 >>> mbox cmd response data (8 bytes)
6,212,626 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,242,365 UART: [rt]cmd =0x50435251, len=36
6,409,653 >>> mbox cmd response data (1848 bytes)
6,409,654 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,439,613 UART: [rt]cmd =0x50435245, len=56
6,443,250 >>> mbox cmd response data (8 bytes)
6,443,251 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,472,850 UART: [rt]cmd =0x44504543, len=20
6,493,734 >>> mbox cmd response data (44 bytes)
6,493,735 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,523,202 UART: [rt]cmd =0x44504543, len=24
6,551,101 >>> mbox cmd response data (40 bytes)
6,551,102 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,581,125 UART: [rt]cmd =0x44504543, len=96
6,619,104 >>> mbox cmd response data (56 bytes)
6,619,105 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,649,118 UART: [rt]cmd =0x44504543, len=92
6,877,797 >>> mbox cmd response data (6284 bytes)
6,877,798 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,908,021 UART: [rt]cmd =0x44504543, len=136
6,975,253 >>> mbox cmd response data (136 bytes)
6,975,254 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,004,711 UART: [rt]cmd =0x44504543, len=40
7,031,880 >>> mbox cmd response data (40 bytes)
7,031,881 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,061,380 UART: [rt]cmd =0x44504543, len=28
7,104,785 >>> mbox cmd response data (2076 bytes)
7,104,786 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,227 UART: [rt]cmd =0x44504543, len=36
7,164,388 >>> mbox cmd response data (24 bytes)
7,164,389 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,193,782 UART: [rt]cmd =0x4453424c, len=4
7,210,606 >>> mbox cmd response data (8 bytes)
7,210,607 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,239,910 UART: [rt]cmd =0x46505344, len=4
7,348,443 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.38s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,940 UART: [state] LifecycleState = Unprovisioned
85,595 UART: [state] DebugLocked = No
86,163 UART: [state] WD Timer not started. Device not locked for debugging
87,288 UART: [kat] SHA2-256
892,938 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,063 UART: [kat] ++
897,215 UART: [kat] sha1
901,475 UART: [kat] SHA2-256
903,415 UART: [kat] SHA2-384
906,094 UART: [kat] SHA2-512-ACC
907,995 UART: [kat] ECC-384
917,918 UART: [kat] HMAC-384Kdf
922,520 UART: [kat] LMS
1,170,848 UART: [kat] --
1,171,589 UART: [cold-reset] ++
1,172,057 UART: [fht] FHT @ 0x50003400
1,174,812 UART: [idev] ++
1,174,980 UART: [idev] CDI.KEYID = 6
1,175,340 UART: [idev] SUBJECT.KEYID = 7
1,175,764 UART: [idev] UDS.KEYID = 0
1,176,109 ready_for_fw is high
1,176,109 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,714 UART: [idev] Erasing UDS.KEYID = 0
1,201,107 UART: [idev] Sha1 KeyId Algorithm
1,209,533 UART: [idev] --
1,210,441 UART: [ldev] ++
1,210,609 UART: [ldev] CDI.KEYID = 6
1,210,972 UART: [ldev] SUBJECT.KEYID = 5
1,211,398 UART: [ldev] AUTHORITY.KEYID = 7
1,211,861 UART: [ldev] FE.KEYID = 1
1,217,293 UART: [ldev] Erasing FE.KEYID = 1
1,243,700 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,343 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,059 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,950 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,662 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,763 UART: [ldev] --
1,283,182 UART: [fwproc] Wait for Commands...
1,283,786 UART: [fwproc] Recv command 0x46574c44
1,284,514 UART: [fwproc] Recv'd Img size: 118548 bytes
2,628,297 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,098 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,665 >>> mbox cmd response: success
2,827,665 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,925 UART: [afmc] ++
2,829,093 UART: [afmc] CDI.KEYID = 6
2,829,455 UART: [afmc] SUBJECT.KEYID = 7
2,829,880 UART: [afmc] AUTHORITY.KEYID = 5
2,864,283 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,880,126 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,874 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,583 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,892,466 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,898,167 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,995 UART: [afmc] --
2,906,879 UART: [cold-reset] --
2,907,711 UART: [state] Locking Datavault
2,908,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,909,232 UART: [state] Locking ICCM
2,909,888 UART: [exit] Launching FMC @ 0x40000130
2,915,218 UART:
2,915,234 UART: Running Caliptra FMC ...
2,915,642 UART:
2,915,696 UART: [state] CFI Enabled
2,926,312 UART: [fht] FMC Alias Private Key: 7
3,045,296 UART: [art] Extend RT PCRs Done
3,045,724 UART: [art] Lock RT PCRs Done
3,047,176 UART: [art] Populate DV Done
3,055,327 UART: [fht] FMC Alias Private Key: 7
3,056,309 UART: [art] Derive CDI
3,056,589 UART: [art] Store in slot 0x4
3,142,686 UART: [art] Derive Key Pair
3,143,046 UART: [art] Store priv key in slot 0x5
3,156,364 UART: [art] Derive Key Pair - Done
3,171,201 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,186,304 UART: [art] Erasing AUTHORITY.KEYID = 7
3,187,069 UART: [art] PUB.X = AC921734EF8B8214163C1F1ECF7242261AB89FC2A81A5CE54777BFCA57F7554E81BBFB07728F5A913CE5CA9878C136CC
3,193,848 UART: [art] PUB.Y = 080F368B1D96CF0912C8AA1655301F8B3C8732D9BB244055AE566F5230B3A82D060C13CA2A50226AD28286F4C4CA2838
3,200,781 UART: [art] SIG.R = 1C04F1CF5D2129053EB7C8A71F1EB1D30FB0A667AB72DB659F4AA821C82CFF4ED70F7E1CD44C7FC3BE5E5FE3A24C8859
3,207,563 UART: [art] SIG.S = 14109FF5F75CCFD165B117876F28C38F8D4C0D826BFFCD9854793874ED1F1CE4833ADBD500CE30D9C94566A585912913
3,231,350 UART: Caliptra RT
3,231,601 UART: [state] CFI Enabled
3,351,237 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,909 UART: [rt]cmd =0x46505652, len=4
3,382,569 UART: [rt] FIPS Version
3,383,790 >>> mbox cmd response data (36 bytes)
3,383,791 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,412,978 UART: [rt]cmd =0x46504c54, len=4
3,414,090 >>> mbox cmd response data (8 bytes)
3,414,091 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,443,592 UART: [rt]cmd =0x46504c67, len=4
3,444,512 >>> mbox cmd response: failed
3,444,770 UART: [rt] FIPS self test
3,445,101 UART: [kat] ++
3,445,253 UART: [kat] sha1
3,449,422 UART: [kat] SHA2-256
3,451,352 UART: [kat] SHA2-384
3,454,175 UART: [kat] SHA2-512-ACC
3,456,070 UART: [kat] ECC-384
3,465,883 UART: [kat] HMAC-384Kdf
3,470,618 UART: [kat] LMS
3,730,378 UART: [kat] --
6,011,801 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,014,255 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,043,541 UART: [rt]cmd =0x46504c67, len=4
6,044,756 >>> mbox cmd response data (8 bytes)
6,044,757 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,074,270 UART: [rt]cmd =0x49444543, len=4
6,080,645 >>> mbox cmd response data (37 bytes)
6,080,646 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,109,947 UART: [rt]cmd =0x49444549, len=4
6,112,314 >>> mbox cmd response data (104 bytes)
6,112,315 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,141,464 UART: [rt]cmd =0x49444550, len=4
6,151,566 >>> mbox cmd response data (8 bytes)
6,151,567 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,180,828 UART: [rt]cmd =0x4c444556, len=4
6,191,198 >>> mbox cmd response data (687 bytes)
6,191,199 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,220,434 UART: [rt]cmd =0x43455246, len=4
6,232,521 >>> mbox cmd response data (888 bytes)
6,232,522 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,262,079 UART: [rt]cmd =0x43455252, len=4
6,272,814 >>> mbox cmd response data (782 bytes)
6,272,815 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,303,272 UART: [rt]cmd =0x53494756, len=196
6,308,176 >>> mbox cmd response data (8 bytes)
6,308,177 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,338,088 UART: [rt]cmd =0x4d454153, len=108
6,358,594 >>> mbox cmd response data (12 bytes)
6,358,595 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,388,126 UART: [rt]cmd =0x494e464f, len=4
6,391,694 >>> mbox cmd response data (312 bytes)
6,391,695 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,421,294 UART: [rt]cmd =0x54514754, len=24
6,423,402 >>> mbox cmd response data (8 bytes)
6,423,403 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,452,558 UART: [rt]cmd =0x47544744, len=8
6,455,126 >>> mbox cmd response data (104 bytes)
6,455,127 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,484,456 UART: [rt]cmd =0x50435252, len=8
6,485,942 >>> mbox cmd response data (8 bytes)
6,485,943 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,515,488 UART: [rt]cmd =0x50435251, len=36
6,682,756 >>> mbox cmd response data (1848 bytes)
6,682,757 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,712,390 UART: [rt]cmd =0x50435245, len=56
6,715,729 >>> mbox cmd response data (8 bytes)
6,715,730 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,745,091 UART: [rt]cmd =0x44504543, len=20
6,766,133 >>> mbox cmd response data (44 bytes)
6,766,134 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,795,879 UART: [rt]cmd =0x44504543, len=24
6,823,644 >>> mbox cmd response data (40 bytes)
6,823,645 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,853,672 UART: [rt]cmd =0x44504543, len=96
6,891,297 >>> mbox cmd response data (56 bytes)
6,891,298 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,921,323 UART: [rt]cmd =0x44504543, len=92
7,149,751 >>> mbox cmd response data (6284 bytes)
7,149,752 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,179,931 UART: [rt]cmd =0x44504543, len=136
7,246,715 >>> mbox cmd response data (136 bytes)
7,246,716 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,276,367 UART: [rt]cmd =0x44504543, len=40
7,303,852 >>> mbox cmd response data (40 bytes)
7,303,853 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,333,362 UART: [rt]cmd =0x44504543, len=28
7,376,879 >>> mbox cmd response data (2076 bytes)
7,376,880 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,406,681 UART: [rt]cmd =0x44504543, len=36
7,436,674 >>> mbox cmd response data (24 bytes)
7,436,675 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,466,210 UART: [rt]cmd =0x4453424c, len=4
7,484,040 >>> mbox cmd response data (8 bytes)
7,484,041 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,513,398 UART: [rt]cmd =0x46505344, len=4
7,621,521 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,025 ready_for_fw is high
1,060,025 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,894 >>> mbox cmd response: success
2,679,894 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,515 UART:
2,741,531 UART: Running Caliptra FMC ...
2,741,939 UART:
2,741,993 UART: [state] CFI Enabled
2,752,691 UART: [fht] FMC Alias Private Key: 7
2,871,509 UART: [art] Extend RT PCRs Done
2,871,937 UART: [art] Lock RT PCRs Done
2,873,547 UART: [art] Populate DV Done
2,881,704 UART: [fht] FMC Alias Private Key: 7
2,882,858 UART: [art] Derive CDI
2,883,138 UART: [art] Store in slot 0x4
2,968,769 UART: [art] Derive Key Pair
2,969,129 UART: [art] Store priv key in slot 0x5
2,982,213 UART: [art] Derive Key Pair - Done
2,996,948 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,297 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,062 UART: [art] PUB.X = E679E399B046915DF80D100B4592B38920069BDC4CEC3C5A44AE2F0EB679E6826164FCA461499C22263347DF9D3195CF
3,019,820 UART: [art] PUB.Y = B24E176985440856C601083237201376305E03C0E9130C98B53071845880F7757759FF8BB26D0B1CD729B6C62F346D94
3,026,732 UART: [art] SIG.R = 59ABEF4439C94D186B7315FD22E72626F3AED3CA4618D641143D9DD58F639DA323D218E23176AD420503962657B8804B
3,033,492 UART: [art] SIG.S = 10633CDBD4BD7CCB82C985B28CADC67FAFEE3415E732D38E9FA2B03D20B98F6199C9D8C4440889CDA76C881278F34A74
3,057,367 UART: Caliptra RT
3,057,618 UART: [state] CFI Enabled
3,177,640 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,214 UART: [rt]cmd =0x46505652, len=4
3,208,874 UART: [rt] FIPS Version
3,210,039 >>> mbox cmd response data (36 bytes)
3,210,040 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,239,323 UART: [rt]cmd =0x46504c54, len=4
3,240,615 >>> mbox cmd response data (8 bytes)
3,240,616 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,270,497 UART: [rt]cmd =0x46504c67, len=4
3,271,453 >>> mbox cmd response: failed
3,271,675 UART: [rt] FIPS self test
3,272,006 UART: [kat] ++
3,272,158 UART: [kat] sha1
3,276,315 UART: [kat] SHA2-256
3,278,245 UART: [kat] SHA2-384
3,280,908 UART: [kat] SHA2-512-ACC
3,282,803 UART: [kat] ECC-384
3,292,728 UART: [kat] HMAC-384Kdf
3,297,477 UART: [kat] LMS
3,557,237 UART: [kat] --
5,732,360 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,741,206 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,770,226 UART: [rt]cmd =0x46504c67, len=4
5,771,425 >>> mbox cmd response data (8 bytes)
5,771,426 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,800,833 UART: [rt]cmd =0x49444543, len=4
5,807,262 >>> mbox cmd response data (37 bytes)
5,807,263 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,836,668 UART: [rt]cmd =0x49444549, len=4
5,839,015 >>> mbox cmd response data (104 bytes)
5,839,016 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,868,303 UART: [rt]cmd =0x49444550, len=4
5,878,501 >>> mbox cmd response data (8 bytes)
5,878,502 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,907,841 UART: [rt]cmd =0x4c444556, len=4
5,918,353 >>> mbox cmd response data (687 bytes)
5,918,354 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,947,465 UART: [rt]cmd =0x43455246, len=4
5,959,608 >>> mbox cmd response data (888 bytes)
5,959,609 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,988,794 UART: [rt]cmd =0x43455252, len=4
5,999,627 >>> mbox cmd response data (782 bytes)
5,999,628 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,030,389 UART: [rt]cmd =0x53494756, len=196
6,035,783 >>> mbox cmd response data (8 bytes)
6,035,784 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,065,855 UART: [rt]cmd =0x4d454153, len=108
6,086,775 >>> mbox cmd response data (12 bytes)
6,086,776 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,116,105 UART: [rt]cmd =0x494e464f, len=4
6,120,001 >>> mbox cmd response data (312 bytes)
6,120,002 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,149,357 UART: [rt]cmd =0x54514754, len=24
6,151,425 >>> mbox cmd response data (8 bytes)
6,151,426 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,180,917 UART: [rt]cmd =0x47544744, len=8
6,183,447 >>> mbox cmd response data (104 bytes)
6,183,448 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,212,841 UART: [rt]cmd =0x50435252, len=8
6,214,337 >>> mbox cmd response data (8 bytes)
6,214,338 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,243,557 UART: [rt]cmd =0x50435251, len=36
6,410,995 >>> mbox cmd response data (1848 bytes)
6,410,996 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,440,631 UART: [rt]cmd =0x50435245, len=56
6,443,926 >>> mbox cmd response data (8 bytes)
6,443,927 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,473,424 UART: [rt]cmd =0x44504543, len=20
6,494,456 >>> mbox cmd response data (44 bytes)
6,494,457 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,523,840 UART: [rt]cmd =0x44504543, len=24
6,551,475 >>> mbox cmd response data (40 bytes)
6,551,476 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,581,371 UART: [rt]cmd =0x44504543, len=96
6,619,618 >>> mbox cmd response data (56 bytes)
6,619,619 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,649,458 UART: [rt]cmd =0x44504543, len=92
6,879,120 >>> mbox cmd response data (6284 bytes)
6,879,121 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,909,124 UART: [rt]cmd =0x44504543, len=136
6,975,284 >>> mbox cmd response data (136 bytes)
6,975,285 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,005,056 UART: [rt]cmd =0x44504543, len=40
7,032,411 >>> mbox cmd response data (40 bytes)
7,032,412 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,061,963 UART: [rt]cmd =0x44504543, len=28
7,105,116 >>> mbox cmd response data (2076 bytes)
7,105,117 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,134,618 UART: [rt]cmd =0x44504543, len=36
7,164,711 >>> mbox cmd response data (24 bytes)
7,164,712 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,194,011 UART: [rt]cmd =0x4453424c, len=4
7,211,887 >>> mbox cmd response data (8 bytes)
7,211,888 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,241,403 UART: [rt]cmd =0x46505344, len=4
7,350,248 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.29s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,715 UART: [state] LifecycleState = Unprovisioned
86,370 UART: [state] DebugLocked = No
86,912 UART: [state] WD Timer not started. Device not locked for debugging
88,265 UART: [kat] SHA2-256
893,915 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,040 UART: [kat] ++
898,192 UART: [kat] sha1
902,550 UART: [kat] SHA2-256
904,490 UART: [kat] SHA2-384
907,217 UART: [kat] SHA2-512-ACC
909,118 UART: [kat] ECC-384
918,779 UART: [kat] HMAC-384Kdf
923,355 UART: [kat] LMS
1,171,683 UART: [kat] --
1,172,658 UART: [cold-reset] ++
1,173,160 UART: [fht] FHT @ 0x50003400
1,175,853 UART: [idev] ++
1,176,021 UART: [idev] CDI.KEYID = 6
1,176,381 UART: [idev] SUBJECT.KEYID = 7
1,176,805 UART: [idev] UDS.KEYID = 0
1,177,150 ready_for_fw is high
1,177,150 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,184,505 UART: [idev] Erasing UDS.KEYID = 0
1,201,168 UART: [idev] Sha1 KeyId Algorithm
1,209,608 UART: [idev] --
1,210,810 UART: [ldev] ++
1,210,978 UART: [ldev] CDI.KEYID = 6
1,211,341 UART: [ldev] SUBJECT.KEYID = 5
1,211,767 UART: [ldev] AUTHORITY.KEYID = 7
1,212,230 UART: [ldev] FE.KEYID = 1
1,217,352 UART: [ldev] Erasing FE.KEYID = 1
1,243,863 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,392 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,108 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,999 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,711 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,694 UART: [ldev] --
1,283,107 UART: [fwproc] Wait for Commands...
1,283,773 UART: [fwproc] Recv command 0x46574c44
1,284,501 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,808 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,875 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,045 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,314 >>> mbox cmd response: success
2,827,314 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,456 UART: [afmc] ++
2,828,624 UART: [afmc] CDI.KEYID = 6
2,828,986 UART: [afmc] SUBJECT.KEYID = 7
2,829,411 UART: [afmc] AUTHORITY.KEYID = 5
2,865,064 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,553 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,301 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,010 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,893 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,594 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,482 UART: [afmc] --
2,908,564 UART: [cold-reset] --
2,909,590 UART: [state] Locking Datavault
2,910,927 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,531 UART: [state] Locking ICCM
2,912,045 UART: [exit] Launching FMC @ 0x40000130
2,917,375 UART:
2,917,391 UART: Running Caliptra FMC ...
2,917,799 UART:
2,917,942 UART: [state] CFI Enabled
2,928,160 UART: [fht] FMC Alias Private Key: 7
3,047,036 UART: [art] Extend RT PCRs Done
3,047,464 UART: [art] Lock RT PCRs Done
3,048,816 UART: [art] Populate DV Done
3,056,765 UART: [fht] FMC Alias Private Key: 7
3,057,695 UART: [art] Derive CDI
3,057,975 UART: [art] Store in slot 0x4
3,144,232 UART: [art] Derive Key Pair
3,144,592 UART: [art] Store priv key in slot 0x5
3,157,470 UART: [art] Derive Key Pair - Done
3,172,624 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,077 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,842 UART: [art] PUB.X = F7DEDA495AEE854E8D23776A72B670928907CEBF6073C719BBC01445460A679BEDCF57948C6331BD67CD985E00B7A750
3,195,590 UART: [art] PUB.Y = 7A16024201909F2C867740A7610903AB7D479F32056366CB07DB8156B79089FB6D12993965EB68E7FE7AF8A099139B03
3,202,507 UART: [art] SIG.R = 7A7E6E5E5C64D64D7A72AFF788562FDBC4B032DD35DC09CE864C34B3846CB90A1492FC46D566AC20B4F6A80403F75E1E
3,209,279 UART: [art] SIG.S = 2EE819A7AD52FCBD8A1D10253A8416EF9B4981577B94A68959F707334388757FEC4C2F9331E2B5C5028B2762852FD246
3,233,349 UART: Caliptra RT
3,233,692 UART: [state] CFI Enabled
3,353,232 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,666 UART: [rt]cmd =0x46505652, len=4
3,384,326 UART: [rt] FIPS Version
3,385,411 >>> mbox cmd response data (36 bytes)
3,385,412 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,414,843 UART: [rt]cmd =0x46504c54, len=4
3,415,843 >>> mbox cmd response data (8 bytes)
3,415,844 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,445,745 UART: [rt]cmd =0x46504c67, len=4
3,446,519 >>> mbox cmd response: failed
3,446,681 UART: [rt] FIPS self test
3,447,012 UART: [kat] ++
3,447,164 UART: [kat] sha1
3,451,395 UART: [kat] SHA2-256
3,453,325 UART: [kat] SHA2-384
3,456,238 UART: [kat] SHA2-512-ACC
3,458,133 UART: [kat] ECC-384
3,468,062 UART: [kat] HMAC-384Kdf
3,472,853 UART: [kat] LMS
3,732,613 UART: [kat] --
6,014,210 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,016,262 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,045,564 UART: [rt]cmd =0x46504c67, len=4
6,046,645 >>> mbox cmd response data (8 bytes)
6,046,646 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,076,063 UART: [rt]cmd =0x49444543, len=4
6,082,460 >>> mbox cmd response data (37 bytes)
6,082,461 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,111,738 UART: [rt]cmd =0x49444549, len=4
6,114,021 >>> mbox cmd response data (104 bytes)
6,114,022 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,143,227 UART: [rt]cmd =0x49444550, len=4
6,153,425 >>> mbox cmd response data (8 bytes)
6,153,426 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,182,937 UART: [rt]cmd =0x4c444556, len=4
6,193,341 >>> mbox cmd response data (687 bytes)
6,193,342 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,222,753 UART: [rt]cmd =0x43455246, len=4
6,234,728 >>> mbox cmd response data (888 bytes)
6,234,729 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,264,088 UART: [rt]cmd =0x43455252, len=4
6,274,995 >>> mbox cmd response data (782 bytes)
6,274,996 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,305,639 UART: [rt]cmd =0x53494756, len=196
6,311,297 >>> mbox cmd response data (8 bytes)
6,311,298 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,379 UART: [rt]cmd =0x4d454153, len=108
6,361,571 >>> mbox cmd response data (12 bytes)
6,361,572 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,390,959 UART: [rt]cmd =0x494e464f, len=4
6,394,679 >>> mbox cmd response data (312 bytes)
6,394,680 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,424,319 UART: [rt]cmd =0x54514754, len=24
6,426,597 >>> mbox cmd response data (8 bytes)
6,426,598 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,455,965 UART: [rt]cmd =0x47544744, len=8
6,458,529 >>> mbox cmd response data (104 bytes)
6,458,530 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,487,797 UART: [rt]cmd =0x50435252, len=8
6,489,497 >>> mbox cmd response data (8 bytes)
6,489,498 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,518,923 UART: [rt]cmd =0x50435251, len=36
6,686,487 >>> mbox cmd response data (1848 bytes)
6,686,488 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,716,215 UART: [rt]cmd =0x50435245, len=56
6,719,900 >>> mbox cmd response data (8 bytes)
6,719,901 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,749,604 UART: [rt]cmd =0x44504543, len=20
6,770,364 >>> mbox cmd response data (44 bytes)
6,770,365 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,799,926 UART: [rt]cmd =0x44504543, len=24
6,827,463 >>> mbox cmd response data (40 bytes)
6,827,464 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,857,591 UART: [rt]cmd =0x44504543, len=96
6,896,054 >>> mbox cmd response data (56 bytes)
6,896,055 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,925,870 UART: [rt]cmd =0x44504543, len=92
7,155,215 >>> mbox cmd response data (6284 bytes)
7,155,216 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,185,507 UART: [rt]cmd =0x44504543, len=136
7,252,663 >>> mbox cmd response data (136 bytes)
7,252,664 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,282,439 UART: [rt]cmd =0x44504543, len=40
7,309,992 >>> mbox cmd response data (40 bytes)
7,309,993 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,339,538 UART: [rt]cmd =0x44504543, len=28
7,383,061 >>> mbox cmd response data (2076 bytes)
7,383,062 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,412,549 UART: [rt]cmd =0x44504543, len=36
7,443,054 >>> mbox cmd response data (24 bytes)
7,443,055 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,472,356 UART: [rt]cmd =0x4453424c, len=4
7,489,692 >>> mbox cmd response data (8 bytes)
7,489,693 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,519,020 UART: [rt]cmd =0x46505344, len=4
7,627,325 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.41s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,624 ready_for_fw is high
1,060,624 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,680,135 >>> mbox cmd response: success
2,680,135 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,741,556 UART:
2,741,572 UART: Running Caliptra FMC ...
2,741,980 UART:
2,742,123 UART: [state] CFI Enabled
2,753,001 UART: [fht] FMC Alias Private Key: 7
2,871,485 UART: [art] Extend RT PCRs Done
2,871,913 UART: [art] Lock RT PCRs Done
2,873,469 UART: [art] Populate DV Done
2,881,800 UART: [fht] FMC Alias Private Key: 7
2,882,878 UART: [art] Derive CDI
2,883,158 UART: [art] Store in slot 0x4
2,968,917 UART: [art] Derive Key Pair
2,969,277 UART: [art] Store priv key in slot 0x5
2,982,073 UART: [art] Derive Key Pair - Done
2,996,772 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,121 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,886 UART: [art] PUB.X = 31EDA92EEE9233B5935F512B914EEC143BC4649A43BA9D159E69FCE748CD701636FA203F2356BE0A8466FAC3B077C7E1
3,019,663 UART: [art] PUB.Y = 0B72E6304812C07704D3DEC0450DBBEA760024AB4E0D3A70B219B67B8E32AA0272C0B23F9A305C1D18CC3E8B33EF6965
3,026,584 UART: [art] SIG.R = 7C557322F357B657055665D2FEB7D229A0F244E5DE24ABA89D3618F951C2ABD9AA32C6B9A82770F02A3655A628B56DFC
3,033,357 UART: [art] SIG.S = C9125BA6807AB87FDB6DC80ED0C2D75C41D7BF03758405F2070079F0BC9F104E2006A75B00323FB0C0BADA6EB7A64C6B
3,056,588 UART: Caliptra RT
3,056,931 UART: [state] CFI Enabled
3,175,922 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,680 UART: [rt]cmd =0x46505652, len=4
3,207,340 UART: [rt] FIPS Version
3,208,505 >>> mbox cmd response data (36 bytes)
3,208,506 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,237,825 UART: [rt]cmd =0x46504c54, len=4
3,239,023 >>> mbox cmd response data (8 bytes)
3,239,024 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,268,727 UART: [rt]cmd =0x46504c67, len=4
3,269,743 >>> mbox cmd response: failed
3,269,869 UART: [rt] FIPS self test
3,270,200 UART: [kat] ++
3,270,352 UART: [kat] sha1
3,274,685 UART: [kat] SHA2-256
3,276,615 UART: [kat] SHA2-384
3,279,282 UART: [kat] SHA2-512-ACC
3,281,177 UART: [kat] ECC-384
3,291,148 UART: [kat] HMAC-384Kdf
3,295,863 UART: [kat] LMS
3,555,623 UART: [kat] --
5,731,442 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,739,496 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,768,760 UART: [rt]cmd =0x46504c67, len=4
5,769,761 >>> mbox cmd response data (8 bytes)
5,769,762 <<< Executing mbox cmd 0x49444543 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,799,183 UART: [rt]cmd =0x49444543, len=4
5,805,564 >>> mbox cmd response data (37 bytes)
5,805,565 <<< Executing mbox cmd 0x49444549 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,834,810 UART: [rt]cmd =0x49444549, len=4
5,837,283 >>> mbox cmd response data (104 bytes)
5,837,284 <<< Executing mbox cmd 0x49444550 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,866,721 UART: [rt]cmd =0x49444550, len=4
5,876,762 >>> mbox cmd response data (8 bytes)
5,876,763 <<< Executing mbox cmd 0x4c444556 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,906,224 UART: [rt]cmd =0x4c444556, len=4
5,916,804 >>> mbox cmd response data (687 bytes)
5,916,805 <<< Executing mbox cmd 0x43455246 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,946,400 UART: [rt]cmd =0x43455246, len=4
5,958,469 >>> mbox cmd response data (888 bytes)
5,958,470 <<< Executing mbox cmd 0x43455252 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,987,521 UART: [rt]cmd =0x43455252, len=4
5,998,358 >>> mbox cmd response data (783 bytes)
5,998,359 <<< Executing mbox cmd 0x53494756 (196 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,028,836 UART: [rt]cmd =0x53494756, len=196
6,034,516 >>> mbox cmd response data (8 bytes)
6,034,517 <<< Executing mbox cmd 0x4d454153 (108 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,064,578 UART: [rt]cmd =0x4d454153, len=108
6,085,414 >>> mbox cmd response data (12 bytes)
6,085,415 <<< Executing mbox cmd 0x494e464f (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,114,736 UART: [rt]cmd =0x494e464f, len=4
6,118,504 >>> mbox cmd response data (312 bytes)
6,118,505 <<< Executing mbox cmd 0x54514754 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,148,124 UART: [rt]cmd =0x54514754, len=24
6,150,352 >>> mbox cmd response data (8 bytes)
6,150,353 <<< Executing mbox cmd 0x47544744 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,179,576 UART: [rt]cmd =0x47544744, len=8
6,182,170 >>> mbox cmd response data (104 bytes)
6,182,171 <<< Executing mbox cmd 0x50435252 (8 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,211,476 UART: [rt]cmd =0x50435252, len=8
6,212,880 >>> mbox cmd response data (8 bytes)
6,212,881 <<< Executing mbox cmd 0x50435251 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,242,656 UART: [rt]cmd =0x50435251, len=36
6,410,120 >>> mbox cmd response data (1848 bytes)
6,410,121 <<< Executing mbox cmd 0x50435245 (56 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,439,720 UART: [rt]cmd =0x50435245, len=56
6,443,217 >>> mbox cmd response data (8 bytes)
6,443,218 <<< Executing mbox cmd 0x44504543 (20 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,472,705 UART: [rt]cmd =0x44504543, len=20
6,493,577 >>> mbox cmd response data (44 bytes)
6,493,578 <<< Executing mbox cmd 0x44504543 (24 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,522,923 UART: [rt]cmd =0x44504543, len=24
6,550,698 >>> mbox cmd response data (40 bytes)
6,550,699 <<< Executing mbox cmd 0x44504543 (96 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,580,782 UART: [rt]cmd =0x44504543, len=96
6,619,221 >>> mbox cmd response data (56 bytes)
6,619,222 <<< Executing mbox cmd 0x44504543 (92 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,649,029 UART: [rt]cmd =0x44504543, len=92
6,877,545 >>> mbox cmd response data (6284 bytes)
6,877,546 <<< Executing mbox cmd 0x44504543 (136 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,907,635 UART: [rt]cmd =0x44504543, len=136
6,973,875 >>> mbox cmd response data (136 bytes)
6,973,876 <<< Executing mbox cmd 0x44504543 (40 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,003,567 UART: [rt]cmd =0x44504543, len=40
7,031,114 >>> mbox cmd response data (40 bytes)
7,031,115 <<< Executing mbox cmd 0x44504543 (28 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,060,536 UART: [rt]cmd =0x44504543, len=28
7,104,053 >>> mbox cmd response data (2076 bytes)
7,104,054 <<< Executing mbox cmd 0x44504543 (36 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,133,445 UART: [rt]cmd =0x44504543, len=36
7,163,582 >>> mbox cmd response data (24 bytes)
7,163,583 <<< Executing mbox cmd 0x4453424c (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,192,914 UART: [rt]cmd =0x4453424c, len=4
7,209,972 >>> mbox cmd response data (8 bytes)
7,209,973 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
7,239,320 UART: [rt]cmd =0x46505344, len=4
7,348,083 >>> mbox cmd response data (8 bytes)
test services::execute_all_services_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 2.30s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,915 writing to cptra_bootfsm_go
192,016 UART:
192,405 UART: Running Caliptra ROM ...
193,562 UART:
193,721 UART: [state] CFI Enabled
263,669 UART: [state] LifecycleState = Unprovisioned
265,613 UART: [state] DebugLocked = No
267,745 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
272,647 UART: [kat] SHA2-256
442,379 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,842 UART: [kat] ++
453,430 UART: [kat] sha1
465,400 UART: [kat] SHA2-256
468,106 UART: [kat] SHA2-384
473,546 UART: [kat] SHA2-512-ACC
475,940 UART: [kat] ECC-384
2,767,646 UART: [kat] HMAC-384Kdf
2,798,407 UART: [kat] LMS
3,988,753 UART: [kat] --
3,992,887 UART: [cold-reset] ++
3,994,615 UART: [fht] Storing FHT @ 0x50003400
4,005,831 UART: [idev] ++
4,006,400 UART: [idev] CDI.KEYID = 6
4,007,349 UART: [idev] SUBJECT.KEYID = 7
4,008,572 UART: [idev] UDS.KEYID = 0
4,009,768 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,032,097 UART: [idev] Erasing UDS.KEYID = 0
7,345,595 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,412 UART: [idev] --
7,370,916 UART: [ldev] ++
7,371,541 UART: [ldev] CDI.KEYID = 6
7,372,434 UART: [ldev] SUBJECT.KEYID = 5
7,373,652 UART: [ldev] AUTHORITY.KEYID = 7
7,374,814 UART: [ldev] FE.KEYID = 1
7,419,434 UART: [ldev] Erasing FE.KEYID = 1
10,751,069 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,420 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,030 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,075,834 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,346 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,108,470 UART: [ldev] --
13,113,032 UART: [fwproc] Waiting for Commands...
13,115,737 UART: [fwproc] Received command 0x46504c54
13,118,198 UART: [kat] SHA2-256
13,287,878 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,298,205 UART: [kat] ++
13,298,666 UART: [kat] sha1
13,311,385 UART: [kat] SHA2-256
13,314,128 UART: [kat] SHA2-384
13,319,247 UART: [kat] SHA2-512-ACC
13,321,649 UART: [kat] ECC-384
15,605,357 UART: [kat] HMAC-384Kdf
15,618,874 UART: [kat] LMS
16,808,339 UART: [kat] --
16,809,197 >>> mbox cmd response data (8 bytes)
16,809,682 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,810,790 UART: [fwproc] Received command 0x46504c67
16,813,435 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.84s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,062 writing to cptra_bootfsm_go
3,802,260 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,370,058 >>> mbox cmd response data (8 bytes)
16,370,839 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,372,843 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.82s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,219 writing to cptra_bootfsm_go
192,568 UART:
192,960 UART: Running Caliptra ROM ...
194,118 UART:
603,725 UART: [state] CFI Enabled
618,137 UART: [state] LifecycleState = Unprovisioned
620,047 UART: [state] DebugLocked = No
623,001 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,428 UART: [kat] SHA2-256
797,173 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,715 UART: [kat] ++
808,167 UART: [kat] sha1
819,152 UART: [kat] SHA2-256
821,822 UART: [kat] SHA2-384
827,322 UART: [kat] SHA2-512-ACC
829,669 UART: [kat] ECC-384
3,113,428 UART: [kat] HMAC-384Kdf
3,126,232 UART: [kat] LMS
4,316,372 UART: [kat] --
4,322,825 UART: [cold-reset] ++
4,324,613 UART: [fht] Storing FHT @ 0x50003400
4,336,546 UART: [idev] ++
4,337,156 UART: [idev] CDI.KEYID = 6
4,338,085 UART: [idev] SUBJECT.KEYID = 7
4,339,320 UART: [idev] UDS.KEYID = 0
4,340,339 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
4,357,366 UART: [idev] Erasing UDS.KEYID = 0
7,630,999 UART: [idev] Using Sha1 for KeyId Algorithm
7,651,626 UART: [idev] --
7,655,580 UART: [ldev] ++
7,656,160 UART: [ldev] CDI.KEYID = 6
7,657,128 UART: [ldev] SUBJECT.KEYID = 5
7,658,298 UART: [ldev] AUTHORITY.KEYID = 7
7,659,622 UART: [ldev] FE.KEYID = 1
7,671,630 UART: [ldev] Erasing FE.KEYID = 1
10,965,785 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,260,885 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,275,481 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,290,287 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,304,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,323,408 UART: [ldev] --
13,328,739 UART: [fwproc] Waiting for Commands...
13,330,793 UART: [fwproc] Received command 0x46504c54
13,333,257 UART: [kat] SHA2-256
13,502,885 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
13,513,255 UART: [kat] ++
13,513,743 UART: [kat] sha1
13,524,961 UART: [kat] SHA2-256
13,527,663 UART: [kat] SHA2-384
13,534,431 UART: [kat] SHA2-512-ACC
13,536,833 UART: [kat] ECC-384
15,822,721 UART: [kat] HMAC-384Kdf
15,834,082 UART: [kat] LMS
17,023,497 UART: [kat] --
17,024,225 >>> mbox cmd response data (8 bytes)
17,024,689 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
17,025,194 UART: [fwproc] Received command 0x46504c67
17,027,844 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.85s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,275 writing to cptra_bootfsm_go
4,129,806 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
16,533,637 >>> mbox cmd response data (8 bytes)
16,534,358 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
16,535,970 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 0.83s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,232 writing to cptra_bootfsm_go
192,480 UART:
192,857 UART: Running Caliptra ROM ...
194,042 UART:
194,202 UART: [state] CFI Enabled
262,592 UART: [state] LifecycleState = Unprovisioned
264,546 UART: [state] DebugLocked = No
267,443 UART: [state] WD Timer not started. Device not locked for debugging
271,684 UART: [kat] SHA2-256
451,326 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,117 UART: [kat] ++
462,660 UART: [kat] sha1
475,082 UART: [kat] SHA2-256
477,765 UART: [kat] SHA2-384
483,700 UART: [kat] SHA2-512-ACC
486,100 UART: [kat] ECC-384
2,946,696 UART: [kat] HMAC-384Kdf
2,969,925 UART: [kat] LMS
3,446,438 UART: [kat] --
3,451,082 UART: [cold-reset] ++
3,453,409 UART: [fht] FHT @ 0x50003400
3,466,066 UART: [idev] ++
3,466,639 UART: [idev] CDI.KEYID = 6
3,467,607 UART: [idev] SUBJECT.KEYID = 7
3,468,824 UART: [idev] UDS.KEYID = 0
3,469,869 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,499,007 UART: [idev] Erasing UDS.KEYID = 0
5,985,012 UART: [idev] Sha1 KeyId Algorithm
6,008,842 UART: [idev] --
6,012,661 UART: [ldev] ++
6,013,250 UART: [ldev] CDI.KEYID = 6
6,014,164 UART: [ldev] SUBJECT.KEYID = 5
6,015,386 UART: [ldev] AUTHORITY.KEYID = 7
6,016,646 UART: [ldev] FE.KEYID = 1
6,056,789 UART: [ldev] Erasing FE.KEYID = 1
8,564,401 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,585 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,459 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,317 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,861 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,522 UART: [ldev] --
10,373,254 UART: [fwproc] Wait for Commands...
10,376,117 UART: [fwproc] Recv command 0x46504c54
10,378,380 UART: [kat] SHA2-256
10,558,097 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,569,092 UART: [kat] ++
10,569,750 UART: [kat] sha1
10,581,784 UART: [kat] SHA2-256
10,584,485 UART: [kat] SHA2-384
10,590,494 UART: [kat] SHA2-512-ACC
10,592,847 UART: [kat] ECC-384
13,037,757 UART: [kat] HMAC-384Kdf
13,061,755 UART: [kat] LMS
13,538,225 UART: [kat] --
13,538,924 >>> mbox cmd response data (8 bytes)
13,539,425 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,540,481 UART: [fwproc] Recv command 0x46504c67
13,542,922 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,182 writing to cptra_bootfsm_go
3,459,442 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,448,327 >>> mbox cmd response data (8 bytes)
13,449,100 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,450,455 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,212 writing to cptra_bootfsm_go
192,518 UART:
192,893 UART: Running Caliptra ROM ...
194,003 UART:
603,505 UART: [state] CFI Enabled
620,034 UART: [state] LifecycleState = Unprovisioned
621,955 UART: [state] DebugLocked = No
624,796 UART: [state] WD Timer not started. Device not locked for debugging
628,609 UART: [kat] SHA2-256
808,262 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
819,070 UART: [kat] ++
819,529 UART: [kat] sha1
829,670 UART: [kat] SHA2-256
832,340 UART: [kat] SHA2-384
838,009 UART: [kat] SHA2-512-ACC
840,425 UART: [kat] ECC-384
3,283,909 UART: [kat] HMAC-384Kdf
3,296,481 UART: [kat] LMS
3,773,002 UART: [kat] --
3,775,759 UART: [cold-reset] ++
3,777,495 UART: [fht] FHT @ 0x50003400
3,787,272 UART: [idev] ++
3,787,884 UART: [idev] CDI.KEYID = 6
3,788,919 UART: [idev] SUBJECT.KEYID = 7
3,790,093 UART: [idev] UDS.KEYID = 0
3,791,099 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,807,559 UART: [idev] Erasing UDS.KEYID = 0
6,271,233 UART: [idev] Sha1 KeyId Algorithm
6,293,988 UART: [idev] --
6,297,389 UART: [ldev] ++
6,297,964 UART: [ldev] CDI.KEYID = 6
6,298,874 UART: [ldev] SUBJECT.KEYID = 5
6,300,089 UART: [ldev] AUTHORITY.KEYID = 7
6,301,327 UART: [ldev] FE.KEYID = 1
6,313,330 UART: [ldev] Erasing FE.KEYID = 1
8,791,984 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,511,642 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,527,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,543,339 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,558,907 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,581,522 UART: [ldev] --
10,586,736 UART: [fwproc] Wait for Commands...
10,588,935 UART: [fwproc] Recv command 0x46504c54
10,591,266 UART: [kat] SHA2-256
10,770,936 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
10,781,939 UART: [kat] ++
10,782,404 UART: [kat] sha1
10,793,185 UART: [kat] SHA2-256
10,795,885 UART: [kat] SHA2-384
10,801,223 UART: [kat] SHA2-512-ACC
10,803,576 UART: [kat] ECC-384
13,244,463 UART: [kat] HMAC-384Kdf
13,256,900 UART: [kat] LMS
13,733,422 UART: [kat] --
13,734,073 >>> mbox cmd response data (8 bytes)
13,734,506 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,735,560 UART: [fwproc] Recv command 0x46504c67
13,738,011 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,989 writing to cptra_bootfsm_go
3,781,821 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,636,114 >>> mbox cmd response data (8 bytes)
13,636,773 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,638,654 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
192,062 UART:
192,419 UART: Running Caliptra ROM ...
193,521 UART:
193,670 UART: [state] CFI Enabled
262,290 UART: [state] LifecycleState = Unprovisioned
264,664 UART: [state] DebugLocked = No
267,135 UART: [state] WD Timer not started. Device not locked for debugging
271,754 UART: [kat] SHA2-256
461,643 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
472,447 UART: [kat] ++
473,113 UART: [kat] sha1
484,720 UART: [kat] SHA2-256
487,732 UART: [kat] SHA2-384
492,960 UART: [kat] SHA2-512-ACC
495,523 UART: [kat] ECC-384
2,948,902 UART: [kat] HMAC-384Kdf
2,971,564 UART: [kat] LMS
3,503,328 UART: [kat] --
3,505,956 UART: [cold-reset] ++
3,508,283 UART: [fht] FHT @ 0x50003400
3,521,159 UART: [idev] ++
3,521,848 UART: [idev] CDI.KEYID = 6
3,522,878 UART: [idev] SUBJECT.KEYID = 7
3,523,993 UART: [idev] UDS.KEYID = 0
3,524,995 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,543,118 UART: [idev] Erasing UDS.KEYID = 0
6,027,700 UART: [idev] Sha1 KeyId Algorithm
6,049,213 UART: [idev] --
6,053,939 UART: [ldev] ++
6,054,633 UART: [ldev] CDI.KEYID = 6
6,055,523 UART: [ldev] SUBJECT.KEYID = 5
6,056,743 UART: [ldev] AUTHORITY.KEYID = 7
6,057,928 UART: [ldev] FE.KEYID = 1
6,099,586 UART: [ldev] Erasing FE.KEYID = 1
8,606,841 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,341,206 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,356,412 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,634 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,762 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,407,790 UART: [ldev] --
10,412,954 UART: [fwproc] Wait for Commands...
10,415,978 UART: [fwproc] Recv command 0x46504c54
10,418,567 UART: [kat] SHA2-256
10,608,346 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,619,071 UART: [kat] ++
10,619,610 UART: [kat] sha1
10,632,174 UART: [kat] SHA2-256
10,635,198 UART: [kat] SHA2-384
10,641,513 UART: [kat] SHA2-512-ACC
10,644,089 UART: [kat] ECC-384
13,101,196 UART: [kat] HMAC-384Kdf
13,123,315 UART: [kat] LMS
13,655,138 UART: [kat] --
13,655,840 >>> mbox cmd response data (8 bytes)
13,656,296 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,656,909 UART: [fwproc] Recv command 0x46504c67
13,659,464 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,910 writing to cptra_bootfsm_go
3,415,117 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,359,251 >>> mbox cmd response data (8 bytes)
13,360,082 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,361,391 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.67s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,258 writing to cptra_bootfsm_go
192,393 UART:
192,757 UART: Running Caliptra ROM ...
193,921 UART:
603,612 UART: [state] CFI Enabled
619,384 UART: [state] LifecycleState = Unprovisioned
621,797 UART: [state] DebugLocked = No
623,782 UART: [state] WD Timer not started. Device not locked for debugging
628,579 UART: [kat] SHA2-256
818,455 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
829,224 UART: [kat] ++
829,758 UART: [kat] sha1
841,667 UART: [kat] SHA2-256
844,688 UART: [kat] SHA2-384
851,486 UART: [kat] SHA2-512-ACC
854,053 UART: [kat] ECC-384
3,297,900 UART: [kat] HMAC-384Kdf
3,310,329 UART: [kat] LMS
3,842,161 UART: [kat] --
3,847,129 UART: [cold-reset] ++
3,849,387 UART: [fht] FHT @ 0x50003400
3,859,723 UART: [idev] ++
3,860,481 UART: [idev] CDI.KEYID = 6
3,861,394 UART: [idev] SUBJECT.KEYID = 7
3,862,616 UART: [idev] UDS.KEYID = 0
3,863,665 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,880,117 UART: [idev] Erasing UDS.KEYID = 0
6,342,336 UART: [idev] Sha1 KeyId Algorithm
6,365,412 UART: [idev] --
6,370,487 UART: [ldev] ++
6,371,168 UART: [ldev] CDI.KEYID = 6
6,372,052 UART: [ldev] SUBJECT.KEYID = 5
6,373,271 UART: [ldev] AUTHORITY.KEYID = 7
6,374,637 UART: [ldev] FE.KEYID = 1
6,385,257 UART: [ldev] Erasing FE.KEYID = 1
8,864,587 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,583,687 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,598,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,069 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,194 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,650,572 UART: [ldev] --
10,655,357 UART: [fwproc] Wait for Commands...
10,656,980 UART: [fwproc] Recv command 0x46504c54
10,659,578 UART: [kat] SHA2-256
10,849,381 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
10,860,116 UART: [kat] ++
10,860,670 UART: [kat] sha1
10,871,727 UART: [kat] SHA2-256
10,874,761 UART: [kat] SHA2-384
10,881,025 UART: [kat] SHA2-512-ACC
10,883,657 UART: [kat] ECC-384
13,325,747 UART: [kat] HMAC-384Kdf
13,338,836 UART: [kat] LMS
13,870,718 UART: [kat] --
13,871,404 >>> mbox cmd response data (8 bytes)
13,871,879 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,872,821 UART: [fwproc] Recv command 0x46504c67
13,875,326 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.70s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,176 writing to cptra_bootfsm_go
3,748,352 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
13,580,442 >>> mbox cmd response data (8 bytes)
13,581,149 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
13,582,718 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,122 UART: [state] LifecycleState = Unprovisioned
85,777 UART: [state] DebugLocked = No
86,453 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,007 UART: [kat] SHA2-256
881,938 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,053 UART: [kat] ++
886,205 UART: [kat] sha1
890,357 UART: [kat] SHA2-256
892,295 UART: [kat] SHA2-384
895,046 UART: [kat] SHA2-512-ACC
896,947 UART: [kat] ECC-384
902,814 UART: [kat] HMAC-384Kdf
907,370 UART: [kat] LMS
1,475,566 UART: [kat] --
1,476,335 UART: [cold-reset] ++
1,476,823 UART: [fht] Storing FHT @ 0x50003400
1,479,766 UART: [idev] ++
1,479,934 UART: [idev] CDI.KEYID = 6
1,480,294 UART: [idev] SUBJECT.KEYID = 7
1,480,718 UART: [idev] UDS.KEYID = 0
1,481,063 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,489,066 UART: [idev] Erasing UDS.KEYID = 0
1,505,386 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,164 UART: [idev] --
1,515,321 UART: [ldev] ++
1,515,489 UART: [ldev] CDI.KEYID = 6
1,515,852 UART: [ldev] SUBJECT.KEYID = 5
1,516,278 UART: [ldev] AUTHORITY.KEYID = 7
1,516,741 UART: [ldev] FE.KEYID = 1
1,522,169 UART: [ldev] Erasing FE.KEYID = 1
1,547,862 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,789 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,505 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,396 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,108 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,136 UART: [ldev] --
1,587,401 UART: [fwproc] Waiting for Commands...
1,588,120 UART: [fwproc] Received command 0x46504c54
1,589,027 UART: [kat] SHA2-256
2,382,958 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,073 UART: [kat] ++
2,387,225 UART: [kat] sha1
2,391,549 UART: [kat] SHA2-256
2,393,487 UART: [kat] SHA2-384
2,396,058 UART: [kat] SHA2-512-ACC
2,397,958 UART: [kat] ECC-384
2,403,877 UART: [kat] HMAC-384Kdf
2,408,485 UART: [kat] LMS
2,976,681 UART: [kat] --
2,976,919 >>> mbox cmd response data (8 bytes)
2,976,920 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,092 UART: [fwproc] Received command 0x46504c67
2,978,046 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.82s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,093 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,039 >>> mbox cmd response data (8 bytes)
2,716,040 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,716,394 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,479 UART: [state] LifecycleState = Unprovisioned
86,134 UART: [state] DebugLocked = No
86,860 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,720 UART: [kat] SHA2-256
892,658 UART: [kat] SHA2-384
895,651 UART: [kat] SHA2-512-ACC
897,552 UART: [kat] ECC-384
903,303 UART: [kat] HMAC-384Kdf
907,813 UART: [kat] LMS
1,476,009 UART: [kat] --
1,476,716 UART: [cold-reset] ++
1,477,252 UART: [fht] Storing FHT @ 0x50003400
1,479,899 UART: [idev] ++
1,480,067 UART: [idev] CDI.KEYID = 6
1,480,427 UART: [idev] SUBJECT.KEYID = 7
1,480,851 UART: [idev] UDS.KEYID = 0
1,481,196 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,488,713 UART: [idev] Erasing UDS.KEYID = 0
1,505,761 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,513 UART: [idev] --
1,515,698 UART: [ldev] ++
1,515,866 UART: [ldev] CDI.KEYID = 6
1,516,229 UART: [ldev] SUBJECT.KEYID = 5
1,516,655 UART: [ldev] AUTHORITY.KEYID = 7
1,517,118 UART: [ldev] FE.KEYID = 1
1,522,770 UART: [ldev] Erasing FE.KEYID = 1
1,548,329 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,992 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,708 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,573,599 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,579,311 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,586,345 UART: [ldev] --
1,587,788 UART: [fwproc] Waiting for Commands...
1,588,655 UART: [fwproc] Received command 0x46504c54
1,589,562 UART: [kat] SHA2-256
2,383,493 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
2,387,608 UART: [kat] ++
2,387,760 UART: [kat] sha1
2,391,832 UART: [kat] SHA2-256
2,393,770 UART: [kat] SHA2-384
2,396,449 UART: [kat] SHA2-512-ACC
2,398,349 UART: [kat] ECC-384
2,404,324 UART: [kat] HMAC-384Kdf
2,408,820 UART: [kat] LMS
2,977,016 UART: [kat] --
2,977,254 >>> mbox cmd response data (8 bytes)
2,977,255 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,977,529 UART: [fwproc] Received command 0x46504c67
2,978,483 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.87s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,306 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,716,906 >>> mbox cmd response data (8 bytes)
2,716,907 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,717,291 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 0.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,384 UART: [state] LifecycleState = Unprovisioned
86,039 UART: [state] DebugLocked = No
86,737 UART: [state] WD Timer not started. Device not locked for debugging
88,028 UART: [kat] SHA2-256
891,578 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,682 UART: [kat] ++
895,834 UART: [kat] sha1
900,220 UART: [kat] SHA2-256
902,160 UART: [kat] SHA2-384
904,799 UART: [kat] SHA2-512-ACC
906,700 UART: [kat] ECC-384
916,477 UART: [kat] HMAC-384Kdf
921,013 UART: [kat] LMS
1,169,325 UART: [kat] --
1,170,362 UART: [cold-reset] ++
1,170,792 UART: [fht] FHT @ 0x50003400
1,173,282 UART: [idev] ++
1,173,450 UART: [idev] CDI.KEYID = 6
1,173,811 UART: [idev] SUBJECT.KEYID = 7
1,174,236 UART: [idev] UDS.KEYID = 0
1,174,582 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,182,053 UART: [idev] Erasing UDS.KEYID = 0
1,198,713 UART: [idev] Sha1 KeyId Algorithm
1,207,623 UART: [idev] --
1,208,588 UART: [ldev] ++
1,208,756 UART: [ldev] CDI.KEYID = 6
1,209,120 UART: [ldev] SUBJECT.KEYID = 5
1,209,547 UART: [ldev] AUTHORITY.KEYID = 7
1,210,010 UART: [ldev] FE.KEYID = 1
1,215,104 UART: [ldev] Erasing FE.KEYID = 1
1,241,799 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,847 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,563 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,452 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,164 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,356 UART: [ldev] --
1,280,807 UART: [fwproc] Wait for Commands...
1,281,548 UART: [fwproc] Recv command 0x46504c54
1,282,399 UART: [kat] SHA2-256
2,085,949 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,090,053 UART: [kat] ++
2,090,205 UART: [kat] sha1
2,094,639 UART: [kat] SHA2-256
2,096,579 UART: [kat] SHA2-384
2,099,142 UART: [kat] SHA2-512-ACC
2,101,042 UART: [kat] ECC-384
2,111,233 UART: [kat] HMAC-384Kdf
2,115,823 UART: [kat] LMS
2,364,135 UART: [kat] --
2,364,376 >>> mbox cmd response data (8 bytes)
2,364,377 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,558 UART: [fwproc] Recv command 0x46504c67
2,365,459 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.80s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,500 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,203 >>> mbox cmd response data (8 bytes)
2,111,204 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,111,648 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.66s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,217 UART: [state] LifecycleState = Unprovisioned
85,872 UART: [state] DebugLocked = No
86,356 UART: [state] WD Timer not started. Device not locked for debugging
87,495 UART: [kat] SHA2-256
891,045 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,149 UART: [kat] ++
895,301 UART: [kat] sha1
899,611 UART: [kat] SHA2-256
901,551 UART: [kat] SHA2-384
904,254 UART: [kat] SHA2-512-ACC
906,155 UART: [kat] ECC-384
915,716 UART: [kat] HMAC-384Kdf
920,372 UART: [kat] LMS
1,168,684 UART: [kat] --
1,169,593 UART: [cold-reset] ++
1,170,093 UART: [fht] FHT @ 0x50003400
1,172,893 UART: [idev] ++
1,173,061 UART: [idev] CDI.KEYID = 6
1,173,422 UART: [idev] SUBJECT.KEYID = 7
1,173,847 UART: [idev] UDS.KEYID = 0
1,174,193 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,181,740 UART: [idev] Erasing UDS.KEYID = 0
1,199,358 UART: [idev] Sha1 KeyId Algorithm
1,208,402 UART: [idev] --
1,209,377 UART: [ldev] ++
1,209,545 UART: [ldev] CDI.KEYID = 6
1,209,909 UART: [ldev] SUBJECT.KEYID = 5
1,210,336 UART: [ldev] AUTHORITY.KEYID = 7
1,210,799 UART: [ldev] FE.KEYID = 1
1,215,945 UART: [ldev] Erasing FE.KEYID = 1
1,241,908 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,338 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,054 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,655 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,539 UART: [ldev] --
1,280,746 UART: [fwproc] Wait for Commands...
1,281,431 UART: [fwproc] Recv command 0x46504c54
1,282,282 UART: [kat] SHA2-256
2,085,832 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
2,089,936 UART: [kat] ++
2,090,088 UART: [kat] sha1
2,094,206 UART: [kat] SHA2-256
2,096,146 UART: [kat] SHA2-384
2,098,843 UART: [kat] SHA2-512-ACC
2,100,743 UART: [kat] ECC-384
2,110,698 UART: [kat] HMAC-384Kdf
2,115,332 UART: [kat] LMS
2,363,644 UART: [kat] --
2,363,885 >>> mbox cmd response data (8 bytes)
2,363,886 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,364,081 UART: [fwproc] Recv command 0x46504c67
2,364,982 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.78s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,533 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,036 >>> mbox cmd response data (8 bytes)
2,112,037 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,367 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,844 UART: [state] LifecycleState = Unprovisioned
85,499 UART: [state] DebugLocked = No
86,101 UART: [state] WD Timer not started. Device not locked for debugging
87,274 UART: [kat] SHA2-256
892,924 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,049 UART: [kat] ++
897,201 UART: [kat] sha1
901,421 UART: [kat] SHA2-256
903,361 UART: [kat] SHA2-384
906,064 UART: [kat] SHA2-512-ACC
907,965 UART: [kat] ECC-384
917,560 UART: [kat] HMAC-384Kdf
922,022 UART: [kat] LMS
1,170,350 UART: [kat] --
1,171,249 UART: [cold-reset] ++
1,171,695 UART: [fht] FHT @ 0x50003400
1,174,406 UART: [idev] ++
1,174,574 UART: [idev] CDI.KEYID = 6
1,174,934 UART: [idev] SUBJECT.KEYID = 7
1,175,358 UART: [idev] UDS.KEYID = 0
1,175,703 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,183,632 UART: [idev] Erasing UDS.KEYID = 0
1,200,253 UART: [idev] Sha1 KeyId Algorithm
1,208,615 UART: [idev] --
1,209,641 UART: [ldev] ++
1,209,809 UART: [ldev] CDI.KEYID = 6
1,210,172 UART: [ldev] SUBJECT.KEYID = 5
1,210,598 UART: [ldev] AUTHORITY.KEYID = 7
1,211,061 UART: [ldev] FE.KEYID = 1
1,216,229 UART: [ldev] Erasing FE.KEYID = 1
1,242,658 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,663 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,379 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,270 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,982 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,893 UART: [ldev] --
1,282,252 UART: [fwproc] Wait for Commands...
1,282,822 UART: [fwproc] Recv command 0x46504c54
1,283,668 UART: [kat] SHA2-256
2,089,318 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,093,443 UART: [kat] ++
2,093,595 UART: [kat] sha1
2,097,715 UART: [kat] SHA2-256
2,099,655 UART: [kat] SHA2-384
2,102,246 UART: [kat] SHA2-512-ACC
2,104,146 UART: [kat] ECC-384
2,113,931 UART: [kat] HMAC-384Kdf
2,118,343 UART: [kat] LMS
2,366,671 UART: [kat] --
2,366,909 >>> mbox cmd response data (8 bytes)
2,366,910 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,367,057 UART: [fwproc] Recv command 0x46504c67
2,367,950 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.70s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,949 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,111,556 >>> mbox cmd response data (8 bytes)
2,111,557 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,112,043 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,487 UART: [state] LifecycleState = Unprovisioned
86,142 UART: [state] DebugLocked = No
86,732 UART: [state] WD Timer not started. Device not locked for debugging
87,905 UART: [kat] SHA2-256
893,555 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,680 UART: [kat] ++
897,832 UART: [kat] sha1
902,050 UART: [kat] SHA2-256
903,990 UART: [kat] SHA2-384
906,655 UART: [kat] SHA2-512-ACC
908,556 UART: [kat] ECC-384
918,155 UART: [kat] HMAC-384Kdf
922,797 UART: [kat] LMS
1,171,125 UART: [kat] --
1,172,070 UART: [cold-reset] ++
1,172,628 UART: [fht] FHT @ 0x50003400
1,175,223 UART: [idev] ++
1,175,391 UART: [idev] CDI.KEYID = 6
1,175,751 UART: [idev] SUBJECT.KEYID = 7
1,176,175 UART: [idev] UDS.KEYID = 0
1,176,520 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
1,184,381 UART: [idev] Erasing UDS.KEYID = 0
1,201,120 UART: [idev] Sha1 KeyId Algorithm
1,209,636 UART: [idev] --
1,210,554 UART: [ldev] ++
1,210,722 UART: [ldev] CDI.KEYID = 6
1,211,085 UART: [ldev] SUBJECT.KEYID = 5
1,211,511 UART: [ldev] AUTHORITY.KEYID = 7
1,211,974 UART: [ldev] FE.KEYID = 1
1,217,354 UART: [ldev] Erasing FE.KEYID = 1
1,243,801 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,480 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,196 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,087 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,799 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,822 UART: [ldev] --
1,283,267 UART: [fwproc] Wait for Commands...
1,283,983 UART: [fwproc] Recv command 0x46504c54
1,284,829 UART: [kat] SHA2-256
2,090,479 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
2,094,604 UART: [kat] ++
2,094,756 UART: [kat] sha1
2,099,038 UART: [kat] SHA2-256
2,100,978 UART: [kat] SHA2-384
2,103,813 UART: [kat] SHA2-512-ACC
2,105,713 UART: [kat] ECC-384
2,115,472 UART: [kat] HMAC-384Kdf
2,120,054 UART: [kat] LMS
2,368,382 UART: [kat] --
2,368,620 >>> mbox cmd response data (8 bytes)
2,368,621 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,368,828 UART: [fwproc] Recv command 0x46504c67
2,369,721 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.75s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,082 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,112,805 >>> mbox cmd response data (8 bytes)
2,112,806 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
2,113,050 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rom ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 0.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,998 writing to cptra_bootfsm_go
192,158 UART:
192,526 UART: Running Caliptra ROM ...
193,651 UART:
193,800 UART: [state] CFI Enabled
267,064 UART: [state] LifecycleState = Unprovisioned
268,985 UART: [state] DebugLocked = No
271,523 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
276,890 UART: [kat] SHA2-256
446,593 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
457,116 UART: [kat] ++
457,650 UART: [kat] sha1
468,887 UART: [kat] SHA2-256
471,564 UART: [kat] SHA2-384
478,481 UART: [kat] SHA2-512-ACC
480,852 UART: [kat] ECC-384
2,770,077 UART: [kat] HMAC-384Kdf
2,801,899 UART: [kat] LMS
3,992,221 UART: [kat] --
3,997,251 UART: [cold-reset] ++
3,998,341 UART: [fht] Storing FHT @ 0x50003400
4,009,916 UART: [idev] ++
4,010,493 UART: [idev] CDI.KEYID = 6
4,011,381 UART: [idev] SUBJECT.KEYID = 7
4,012,634 UART: [idev] UDS.KEYID = 0
4,013,647 ready_for_fw is high
4,013,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,163,325 UART: [idev] Erasing UDS.KEYID = 0
7,348,950 UART: [idev] Using Sha1 for KeyId Algorithm
7,371,068 UART: [idev] --
7,375,018 UART: [ldev] ++
7,375,594 UART: [ldev] CDI.KEYID = 6
7,376,559 UART: [ldev] SUBJECT.KEYID = 5
7,377,775 UART: [ldev] AUTHORITY.KEYID = 7
7,379,014 UART: [ldev] FE.KEYID = 1
7,405,289 UART: [ldev] Erasing FE.KEYID = 1
10,738,949 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,053,957 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,068,515 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,083,362 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,097,911 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,116,271 UART: [ldev] --
13,120,618 UART: [fwproc] Waiting for Commands...
13,122,288 UART: [fwproc] Received command 0x46574c44
13,124,474 UART: [fwproc] Received Image of size 118548 bytes
17,239,638 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,315,277 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,388,466 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,717,372 >>> mbox cmd response: success
17,717,854 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,720,810 UART: [afmc] ++
17,721,454 UART: [afmc] CDI.KEYID = 6
17,722,372 UART: [afmc] SUBJECT.KEYID = 7
17,723,588 UART: [afmc] AUTHORITY.KEYID = 5
21,089,019 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,399,174 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,401,434 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,415,931 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,430,613 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,445,012 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,467,193 UART: [afmc] --
23,470,756 UART: [cold-reset] --
23,474,674 UART: [state] Locking Datavault
23,480,623 UART: [state] Locking PCR0, PCR1 and PCR31
23,482,381 UART: [state] Locking ICCM
23,483,396 UART: [exit] Launching FMC @ 0x40000130
23,491,779 UART:
23,492,029 UART: Running Caliptra FMC ...
23,493,139 UART:
23,493,300 UART: [state] CFI Enabled
23,558,681 UART: [fht] FMC Alias Private Key: 7
25,899,323 UART: [art] Extend RT PCRs Done
25,900,546 UART: [art] Lock RT PCRs Done
25,902,212 UART: [art] Populate DV Done
25,907,896 UART: [fht] FMC Alias Private Key: 7
25,909,597 UART: [art] Derive CDI
25,910,413 UART: [art] Store in slot 0x4
25,967,168 UART: [art] Derive Key Pair
25,968,200 UART: [art] Store priv key in slot 0x5
29,260,543 UART: [art] Derive Key Pair - Done
29,273,431 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,555,538 UART: [art] Erasing AUTHORITY.KEYID = 7
31,557,036 UART: [art] PUB.X = 412E9E30DD53E94A0A6F71B4757F0679A025E23724058C85FB29337FAF45E88B04122257E60F89B458E3890C797778A1
31,564,328 UART: [art] PUB.Y = FA8DD8C8F92F8D6CDB3DEEECC233865C83F7691F120BE276B78094338806F1F7A7257A51FDDE4FE1075CEA2F48E18CA2
31,571,558 UART: [art] SIG.R = B5EF1058A23CB27A18AC619B1F8A6E99DE809374C627F53450BBD7210CD7B81D8B0536EDB2ECA8B42BB212717A4FCC7F
31,578,959 UART: [art] SIG.S = FE5AF3B29344028565AFB1E4A3945EACCA2E4BBAA3E5E39E72D952B85FEB697CB95E8C656702911288AA844016456BFF
32,884,127 UART: Caliptra RT
32,884,825 UART: [state] CFI Enabled
33,062,865 UART: [rt] RT listening for mailbox commands...
33,094,158 UART: [rt]cmd =0x46504c54, len=4
33,095,766 >>> mbox cmd response data (8 bytes)
33,096,220 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,126,313 UART: [rt]cmd =0x46504c67, len=4
33,127,624 >>> mbox cmd response: failed
33,128,966 UART: [rt] FIPS self test
33,129,904 UART: [kat] ++
33,130,350 UART: [kat] sha1
33,134,737 UART: [kat] SHA2-256
33,136,538 UART: [kat] SHA2-384
33,139,257 UART: [kat] SHA2-512-ACC
33,141,476 UART: [kat] ECC-384
36,405,172 UART: [kat] HMAC-384Kdf
36,412,983 UART: [kat] LMS
36,828,662 UART: [kat] --
40,859,291 UART: [rt] Verify complete
40,969,997 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,999,801 UART: [rt]cmd =0x46504c67, len=4
41,001,314 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,783,132 ready_for_fw is high
3,783,550 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,970,066 >>> mbox cmd response: success
17,970,884 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,655,511 UART:
23,655,930 UART: Running Caliptra FMC ...
23,657,064 UART:
23,657,227 UART: [state] CFI Enabled
23,725,673 UART: [fht] FMC Alias Private Key: 7
26,066,092 UART: [art] Extend RT PCRs Done
26,067,339 UART: [art] Lock RT PCRs Done
26,069,048 UART: [art] Populate DV Done
26,074,367 UART: [fht] FMC Alias Private Key: 7
26,075,964 UART: [art] Derive CDI
26,076,787 UART: [art] Store in slot 0x4
26,133,973 UART: [art] Derive Key Pair
26,134,976 UART: [art] Store priv key in slot 0x5
29,418,487 UART: [art] Derive Key Pair - Done
29,431,566 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,720,812 UART: [art] Erasing AUTHORITY.KEYID = 7
31,722,316 UART: [art] PUB.X = EE7AEEF07177CD5B0C7F982AA73BFE8A480943E2BDC27DE361948D6991031AEFB6B5AA063DD260F3C67A37A3D849EC99
31,729,646 UART: [art] PUB.Y = 0432EFBA3B2AF68EF0F49287824CC2DB0BC4A9D3F376C8996AB170FEF024A185E089C8B27AF92049C68022AB60FB50D7
31,736,907 UART: [art] SIG.R = 0B46BA1BF13CEE7FFDAEE580E4FF49B7F40C523108C4FB795F01B09A82D108857618580AEEC8384C5C3AF331307C4AC7
31,744,337 UART: [art] SIG.S = ADDC5E9CF46C61533C22E0F594FAF630F0F0119454C67C86EB8B27EC0FB1E933596F4DAE617C02313DA513A4C04B8BB3
33,049,102 UART: Caliptra RT
33,049,834 UART: [state] CFI Enabled
33,228,819 UART: [rt] RT listening for mailbox commands...
33,260,350 UART: [rt]cmd =0x46504c54, len=4
33,262,017 >>> mbox cmd response data (8 bytes)
33,262,440 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,292,527 UART: [rt]cmd =0x46504c67, len=4
33,293,818 >>> mbox cmd response: failed
33,294,681 UART: [rt] FIPS self test
33,295,613 UART: [kat] ++
33,296,065 UART: [kat] sha1
33,300,424 UART: [kat] SHA2-256
33,302,231 UART: [kat] SHA2-384
33,305,006 UART: [kat] SHA2-512-ACC
33,307,235 UART: [kat] ECC-384
36,571,682 UART: [kat] HMAC-384Kdf
36,580,102 UART: [kat] LMS
36,995,738 UART: [kat] --
41,004,766 UART: [rt] Verify complete
41,136,128 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,165,928 UART: [rt]cmd =0x46504c67, len=4
41,167,411 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
4,987 writing to cptra_bootfsm_go
194,189 UART:
194,542 UART: Running Caliptra ROM ...
195,638 UART:
605,289 UART: [state] CFI Enabled
616,039 UART: [state] LifecycleState = Unprovisioned
617,923 UART: [state] DebugLocked = No
620,296 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,234 UART: [kat] SHA2-256
794,997 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
805,569 UART: [kat] ++
806,032 UART: [kat] sha1
817,268 UART: [kat] SHA2-256
819,997 UART: [kat] SHA2-384
825,790 UART: [kat] SHA2-512-ACC
828,164 UART: [kat] ECC-384
3,112,813 UART: [kat] HMAC-384Kdf
3,123,855 UART: [kat] LMS
4,313,982 UART: [kat] --
4,319,065 UART: [cold-reset] ++
4,320,158 UART: [fht] Storing FHT @ 0x50003400
4,332,739 UART: [idev] ++
4,333,347 UART: [idev] CDI.KEYID = 6
4,334,268 UART: [idev] SUBJECT.KEYID = 7
4,335,524 UART: [idev] UDS.KEYID = 0
4,336,607 ready_for_fw is high
4,336,853 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,485,716 UART: [idev] Erasing UDS.KEYID = 0
7,622,950 UART: [idev] Using Sha1 for KeyId Algorithm
7,644,869 UART: [idev] --
7,648,970 UART: [ldev] ++
7,649,547 UART: [ldev] CDI.KEYID = 6
7,650,518 UART: [ldev] SUBJECT.KEYID = 5
7,651,740 UART: [ldev] AUTHORITY.KEYID = 7
7,652,977 UART: [ldev] FE.KEYID = 1
7,663,465 UART: [ldev] Erasing FE.KEYID = 1
10,952,873 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,244,153 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,258,747 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,273,540 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,288,076 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,897 UART: [ldev] --
13,311,688 UART: [fwproc] Waiting for Commands...
13,314,711 UART: [fwproc] Received command 0x46574c44
13,316,900 UART: [fwproc] Received Image of size 118548 bytes
17,420,530 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,500,181 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,573,352 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
17,902,077 >>> mbox cmd response: success
17,902,523 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
17,907,105 UART: [afmc] ++
17,907,693 UART: [afmc] CDI.KEYID = 6
17,908,606 UART: [afmc] SUBJECT.KEYID = 7
17,909,830 UART: [afmc] AUTHORITY.KEYID = 5
21,224,609 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,518,437 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,520,704 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,535,157 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,549,840 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,564,242 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,586,519 UART: [afmc] --
23,589,629 UART: [cold-reset] --
23,593,332 UART: [state] Locking Datavault
23,598,270 UART: [state] Locking PCR0, PCR1 and PCR31
23,600,028 UART: [state] Locking ICCM
23,601,267 UART: [exit] Launching FMC @ 0x40000130
23,609,659 UART:
23,609,912 UART: Running Caliptra FMC ...
23,611,028 UART:
23,611,212 UART: [state] CFI Enabled
23,619,705 UART: [fht] FMC Alias Private Key: 7
25,959,573 UART: [art] Extend RT PCRs Done
25,960,797 UART: [art] Lock RT PCRs Done
25,962,529 UART: [art] Populate DV Done
25,967,842 UART: [fht] FMC Alias Private Key: 7
25,969,438 UART: [art] Derive CDI
25,970,182 UART: [art] Store in slot 0x4
26,012,721 UART: [art] Derive Key Pair
26,013,767 UART: [art] Store priv key in slot 0x5
29,255,396 UART: [art] Derive Key Pair - Done
29,268,631 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,548,593 UART: [art] Erasing AUTHORITY.KEYID = 7
31,550,109 UART: [art] PUB.X = 50074874E9485388E2F50E184648641400A6486158070C8614EE5EF6A8C3867621C6E6E68E5A9D2512B25FB8B85BB0F9
31,557,298 UART: [art] PUB.Y = 81A076B0EC2AEE6399FD531B50F0E0933866E1DCBFBB49A1D6FC6BB3BABA657F95DE1A990DCE087DB3F5868DBDC6B2DE
31,564,638 UART: [art] SIG.R = AFD6F444AD075307A9EA1FF4CDE7D72DF8E2F19C161C550F99CD2377A894210C04A46041F1B0565941FC428C84448575
31,571,971 UART: [art] SIG.S = 228C0A3202CF73E29BA1520286820CF22CEE79C1D3F26F8D52B6C0BC2C4879988046B4926FCCC6801666DA6BBDD1D5A2
32,876,958 UART: Caliptra RT
32,877,676 UART: [state] CFI Enabled
33,011,782 UART: [rt] RT listening for mailbox commands...
33,043,217 UART: [rt]cmd =0x46504c54, len=4
33,044,831 >>> mbox cmd response data (8 bytes)
33,045,273 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,075,313 UART: [rt]cmd =0x46504c67, len=4
33,076,614 >>> mbox cmd response: failed
33,077,755 UART: [rt] FIPS self test
33,078,696 UART: [kat] ++
33,079,158 UART: [kat] sha1
33,083,385 UART: [kat] SHA2-256
33,085,183 UART: [kat] SHA2-384
33,088,075 UART: [kat] SHA2-512-ACC
33,090,302 UART: [kat] ECC-384
36,332,984 UART: [kat] HMAC-384Kdf
36,339,003 UART: [kat] LMS
36,754,639 UART: [kat] --
40,783,823 UART: [rt] Verify complete
40,919,141 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
40,949,213 UART: [rt]cmd =0x46504c67, len=4
40,950,589 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.16s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,353 writing to cptra_bootfsm_go
4,128,461 ready_for_fw is high
4,129,110 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
18,163,146 >>> mbox cmd response: success
18,163,769 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
23,803,572 UART:
23,804,008 UART: Running Caliptra FMC ...
23,805,151 UART:
23,805,312 UART: [state] CFI Enabled
23,812,768 UART: [fht] FMC Alias Private Key: 7
26,152,769 UART: [art] Extend RT PCRs Done
26,154,005 UART: [art] Lock RT PCRs Done
26,155,456 UART: [art] Populate DV Done
26,160,982 UART: [fht] FMC Alias Private Key: 7
26,162,587 UART: [art] Derive CDI
26,163,331 UART: [art] Store in slot 0x4
26,206,367 UART: [art] Derive Key Pair
26,207,415 UART: [art] Store priv key in slot 0x5
29,449,873 UART: [art] Derive Key Pair - Done
29,463,204 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,743,278 UART: [art] Erasing AUTHORITY.KEYID = 7
31,744,798 UART: [art] PUB.X = BD87DBB8DDD749EBAD199EBD5F155ECB88AC61F6E0AD13BC70F56731A29A113D7873E468C494F7E660E61C0F368BDDF8
31,752,068 UART: [art] PUB.Y = 92623A5AB83BB17DB01922C6EF5C4BE078A42B464534A9A7A5F1A159D905DE53334A05B85C83DB48855FFC456AC88FF1
31,759,350 UART: [art] SIG.R = E29DFB350483B47A94D808AA723156F14E7AC1433DB579DBE238F728DBA25AC474E1B67F0DF7E75628AAEA9657E9CD4F
31,766,764 UART: [art] SIG.S = 4DA7A4D071779E88CEE4703D10A1BAF5C9CBA38462D0E97E67C31DE3B13746EA344AEF300C0F7B716094D95B18C6AF9E
33,071,624 UART: Caliptra RT
33,072,335 UART: [state] CFI Enabled
33,206,032 UART: [rt] RT listening for mailbox commands...
33,237,483 UART: [rt]cmd =0x46504c54, len=4
33,239,093 >>> mbox cmd response data (8 bytes)
33,239,525 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
33,269,663 UART: [rt]cmd =0x46504c67, len=4
33,270,960 >>> mbox cmd response: failed
33,271,996 UART: [rt] FIPS self test
33,272,934 UART: [kat] ++
33,273,389 UART: [kat] sha1
33,277,884 UART: [kat] SHA2-256
33,279,664 UART: [kat] SHA2-384
33,282,551 UART: [kat] SHA2-512-ACC
33,284,781 UART: [kat] ECC-384
36,527,441 UART: [kat] HMAC-384Kdf
36,533,149 UART: [kat] LMS
36,948,815 UART: [kat] --
40,958,240 UART: [rt] Verify complete
41,115,254 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
41,145,049 UART: [rt]cmd =0x46504c67, len=4
41,146,639 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 2.17s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,065 writing to cptra_bootfsm_go
192,242 UART:
192,634 UART: Running Caliptra ROM ...
193,801 UART:
193,952 UART: [state] CFI Enabled
268,420 UART: [state] LifecycleState = Unprovisioned
270,424 UART: [state] DebugLocked = No
272,325 UART: [state] WD Timer not started. Device not locked for debugging
276,521 UART: [kat] SHA2-256
456,195 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
466,931 UART: [kat] ++
467,390 UART: [kat] sha1
478,199 UART: [kat] SHA2-256
480,930 UART: [kat] SHA2-384
485,433 UART: [kat] SHA2-512-ACC
487,806 UART: [kat] ECC-384
2,945,929 UART: [kat] HMAC-384Kdf
2,969,984 UART: [kat] LMS
3,446,508 UART: [kat] --
3,454,065 UART: [cold-reset] ++
3,455,084 UART: [fht] FHT @ 0x50003400
3,467,638 UART: [idev] ++
3,468,219 UART: [idev] CDI.KEYID = 6
3,469,134 UART: [idev] SUBJECT.KEYID = 7
3,470,391 UART: [idev] UDS.KEYID = 0
3,471,323 ready_for_fw is high
3,471,521 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,620,587 UART: [idev] Erasing UDS.KEYID = 0
5,988,494 UART: [idev] Sha1 KeyId Algorithm
6,011,748 UART: [idev] --
6,015,706 UART: [ldev] ++
6,016,291 UART: [ldev] CDI.KEYID = 6
6,017,212 UART: [ldev] SUBJECT.KEYID = 5
6,018,430 UART: [ldev] AUTHORITY.KEYID = 7
6,019,678 UART: [ldev] FE.KEYID = 1
6,057,357 UART: [ldev] Erasing FE.KEYID = 1
8,562,218 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,091 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,314,996 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,330,846 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,346,433 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,368,301 UART: [ldev] --
10,373,534 UART: [fwproc] Wait for Commands...
10,376,668 UART: [fwproc] Recv command 0x46574c44
10,378,715 UART: [fwproc] Recv'd Img size: 118548 bytes
13,865,044 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,943,344 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,016,367 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,343,944 >>> mbox cmd response: success
14,344,409 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,348,884 UART: [afmc] ++
14,349,470 UART: [afmc] CDI.KEYID = 6
14,350,389 UART: [afmc] SUBJECT.KEYID = 7
14,351,610 UART: [afmc] AUTHORITY.KEYID = 5
16,891,757 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,614,471 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,616,713 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,632,508 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,648,548 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,664,105 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,688,280 UART: [afmc] --
18,692,273 UART: [cold-reset] --
18,694,957 UART: [state] Locking Datavault
18,699,345 UART: [state] Locking PCR0, PCR1 and PCR31
18,701,103 UART: [state] Locking ICCM
18,703,273 UART: [exit] Launching FMC @ 0x40000130
18,711,729 UART:
18,711,969 UART: Running Caliptra FMC ...
18,713,077 UART:
18,713,249 UART: [state] CFI Enabled
18,770,292 UART: [fht] FMC Alias Private Key: 7
20,537,227 UART: [art] Extend RT PCRs Done
20,538,447 UART: [art] Lock RT PCRs Done
20,540,176 UART: [art] Populate DV Done
20,545,809 UART: [fht] FMC Alias Private Key: 7
20,547,458 UART: [art] Derive CDI
20,548,293 UART: [art] Store in slot 0x4
20,602,955 UART: [art] Derive Key Pair
20,603,991 UART: [art] Store priv key in slot 0x5
23,066,892 UART: [art] Derive Key Pair - Done
23,079,777 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,793,647 UART: [art] Erasing AUTHORITY.KEYID = 7
24,795,162 UART: [art] PUB.X = 7A4250A960857CA4734D166634E5C10AFD199F9CCE46755ADF5211F89F6303F88CFC4631AA30611B111D6D41F3395E34
24,802,367 UART: [art] PUB.Y = 4BFB8586CEDD336C0811340677EF3D21D592C1C652B57BFA2DC518A49BAB321E679AC475421A331CCDD47024EC0508A2
24,809,658 UART: [art] SIG.R = C940C1E89DF231C10ABD99E948DF04875BF33CF20572D0BD22B2FF35BA9DF285858AD14A92F6C32774A620A49136D02C
24,817,063 UART: [art] SIG.S = B1C251313750764DE56E2F912285ADB5F92F5F183478D48E23E0DC1F979B3B6761B6871447FEE212532A14C2E93D035D
25,795,872 UART: Caliptra RT
25,796,573 UART: [state] CFI Enabled
25,976,903 UART: [rt] RT listening for mailbox commands...
26,008,142 UART: [rt]cmd =0x46504c54, len=4
26,009,675 >>> mbox cmd response data (8 bytes)
26,010,094 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,040,114 UART: [rt]cmd =0x46504c67, len=4
26,041,489 >>> mbox cmd response: failed
26,042,456 UART: [rt] FIPS self test
26,043,389 UART: [kat] ++
26,043,848 UART: [kat] sha1
26,048,400 UART: [kat] SHA2-256
26,050,197 UART: [kat] SHA2-384
26,053,187 UART: [kat] SHA2-512-ACC
26,055,413 UART: [kat] ECC-384
28,489,192 UART: [kat] HMAC-384Kdf
28,515,400 UART: [kat] LMS
28,724,544 UART: [kat] --
32,102,676 UART: [rt] Verify complete
32,180,187 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,209,977 UART: [rt]cmd =0x46504c67, len=4
32,211,326 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,031 writing to cptra_bootfsm_go
3,460,738 ready_for_fw is high
3,461,159 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,238,447 >>> mbox cmd response: success
14,239,100 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,533,141 UART:
18,533,534 UART: Running Caliptra FMC ...
18,534,696 UART:
18,534,854 UART: [state] CFI Enabled
18,600,586 UART: [fht] FMC Alias Private Key: 7
20,367,551 UART: [art] Extend RT PCRs Done
20,368,913 UART: [art] Lock RT PCRs Done
20,370,193 UART: [art] Populate DV Done
20,375,681 UART: [fht] FMC Alias Private Key: 7
20,377,276 UART: [art] Derive CDI
20,378,023 UART: [art] Store in slot 0x4
20,433,365 UART: [art] Derive Key Pair
20,434,376 UART: [art] Store priv key in slot 0x5
22,897,582 UART: [art] Derive Key Pair - Done
22,910,967 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,622,547 UART: [art] Erasing AUTHORITY.KEYID = 7
24,624,061 UART: [art] PUB.X = C290BF21F59023A46A7EF5508501D041D091C7422C69EC67F00B0DA0D2ACA857DE13807515A64A6FCB83A889D5A04DE2
24,631,334 UART: [art] PUB.Y = 68281EF6C1F87D966CE02119E07D633C1436553FE9B855E3C00B48BE9EAAE057A47F17EACFC19ADEF7EAF24CD6F024A8
24,638,583 UART: [art] SIG.R = 31A08492C0BB59004263894AE069D7196A1BBA1ABACA84F558EA9068BB11752548391020147E32BC4C4AFE020B2A1C97
24,645,977 UART: [art] SIG.S = 9FB1472EE61FDCCF49D09B893403783D4E9C81D4F96AC14E41B4E6F4F8E71150AF3AD45AD1C50B27A2B5C6E2C4E4F581
25,625,098 UART: Caliptra RT
25,625,808 UART: [state] CFI Enabled
25,806,892 UART: [rt] RT listening for mailbox commands...
25,838,373 UART: [rt]cmd =0x46504c54, len=4
25,840,133 >>> mbox cmd response data (8 bytes)
25,840,556 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,870,538 UART: [rt]cmd =0x46504c67, len=4
25,871,889 >>> mbox cmd response: failed
25,873,202 UART: [rt] FIPS self test
25,874,140 UART: [kat] ++
25,874,591 UART: [kat] sha1
25,879,022 UART: [kat] SHA2-256
25,880,829 UART: [kat] SHA2-384
25,883,617 UART: [kat] SHA2-512-ACC
25,885,837 UART: [kat] ECC-384
28,319,105 UART: [kat] HMAC-384Kdf
28,346,127 UART: [kat] LMS
28,555,265 UART: [kat] --
31,914,411 UART: [rt] Verify complete
32,011,020 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,040,984 UART: [rt]cmd =0x46504c67, len=4
32,042,577 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,492 writing to cptra_bootfsm_go
192,650 UART:
193,039 UART: Running Caliptra ROM ...
194,274 UART:
603,725 UART: [state] CFI Enabled
618,056 UART: [state] LifecycleState = Unprovisioned
620,033 UART: [state] DebugLocked = No
622,359 UART: [state] WD Timer not started. Device not locked for debugging
626,403 UART: [kat] SHA2-256
806,078 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,799 UART: [kat] ++
817,355 UART: [kat] sha1
828,662 UART: [kat] SHA2-256
831,328 UART: [kat] SHA2-384
836,685 UART: [kat] SHA2-512-ACC
839,058 UART: [kat] ECC-384
3,281,574 UART: [kat] HMAC-384Kdf
3,294,680 UART: [kat] LMS
3,771,186 UART: [kat] --
3,773,722 UART: [cold-reset] ++
3,775,098 UART: [fht] FHT @ 0x50003400
3,786,606 UART: [idev] ++
3,787,189 UART: [idev] CDI.KEYID = 6
3,788,231 UART: [idev] SUBJECT.KEYID = 7
3,789,411 UART: [idev] UDS.KEYID = 0
3,790,344 ready_for_fw is high
3,790,566 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,939,428 UART: [idev] Erasing UDS.KEYID = 0
6,268,807 UART: [idev] Sha1 KeyId Algorithm
6,293,247 UART: [idev] --
6,298,139 UART: [ldev] ++
6,298,728 UART: [ldev] CDI.KEYID = 6
6,299,644 UART: [ldev] SUBJECT.KEYID = 5
6,300,867 UART: [ldev] AUTHORITY.KEYID = 7
6,302,125 UART: [ldev] FE.KEYID = 1
6,313,590 UART: [ldev] Erasing FE.KEYID = 1
8,793,132 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,514,897 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,530,785 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,546,631 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,562,197 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,583,847 UART: [ldev] --
10,588,794 UART: [fwproc] Wait for Commands...
10,590,788 UART: [fwproc] Recv command 0x46574c44
10,592,784 UART: [fwproc] Recv'd Img size: 118548 bytes
14,073,649 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,154,243 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,227,268 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,554,841 >>> mbox cmd response: success
14,555,274 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,558,850 UART: [afmc] ++
14,559,436 UART: [afmc] CDI.KEYID = 6
14,560,404 UART: [afmc] SUBJECT.KEYID = 7
14,561,628 UART: [afmc] AUTHORITY.KEYID = 5
17,071,102 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,792,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,795,149 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,810,969 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,827,040 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,842,632 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,866,997 UART: [afmc] --
18,871,581 UART: [cold-reset] --
18,876,254 UART: [state] Locking Datavault
18,880,798 UART: [state] Locking PCR0, PCR1 and PCR31
18,882,503 UART: [state] Locking ICCM
18,883,986 UART: [exit] Launching FMC @ 0x40000130
18,892,404 UART:
18,892,643 UART: Running Caliptra FMC ...
18,893,670 UART:
18,893,820 UART: [state] CFI Enabled
18,902,085 UART: [fht] FMC Alias Private Key: 7
20,668,604 UART: [art] Extend RT PCRs Done
20,669,834 UART: [art] Lock RT PCRs Done
20,671,305 UART: [art] Populate DV Done
20,676,449 UART: [fht] FMC Alias Private Key: 7
20,678,047 UART: [art] Derive CDI
20,678,867 UART: [art] Store in slot 0x4
20,721,591 UART: [art] Derive Key Pair
20,722,634 UART: [art] Store priv key in slot 0x5
23,149,725 UART: [art] Derive Key Pair - Done
23,162,517 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,868,723 UART: [art] Erasing AUTHORITY.KEYID = 7
24,870,262 UART: [art] PUB.X = 2DB1D790942394947EC859C905B7F943B2FFF98B2C66E06BA28B836C7C4C91C43507D5DA728209A83F912C843F2AB703
24,877,451 UART: [art] PUB.Y = C7B2E6A1FA63B1846974AB0A02D3D129C4DBFE1D8A2D18BB858CB5D5F02E6D2B2843A1C1F74E6281DF4FD103C8514E58
24,884,743 UART: [art] SIG.R = ADF4F85BABD0843D9EFBB38C87377D7004A3807598A7FDC59BF771003B48B5053773F745E884CA5BD88B7AF02C4CBB31
24,892,133 UART: [art] SIG.S = 9215B4676885BB113B021A7F56C74C3C599C8C518157273FAFD1F3712B39A65FFE3F378B1AA45B7AFF1630CF9E8CBC77
25,871,424 UART: Caliptra RT
25,872,122 UART: [state] CFI Enabled
26,005,294 UART: [rt] RT listening for mailbox commands...
26,036,870 UART: [rt]cmd =0x46504c54, len=4
26,038,350 >>> mbox cmd response data (8 bytes)
26,038,771 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,068,869 UART: [rt]cmd =0x46504c67, len=4
26,070,193 >>> mbox cmd response: failed
26,070,893 UART: [rt] FIPS self test
26,071,829 UART: [kat] ++
26,072,286 UART: [kat] sha1
26,076,561 UART: [kat] SHA2-256
26,078,390 UART: [kat] SHA2-384
26,081,280 UART: [kat] SHA2-512-ACC
26,083,499 UART: [kat] ECC-384
28,510,679 UART: [kat] HMAC-384Kdf
28,516,744 UART: [kat] LMS
28,725,880 UART: [kat] --
32,104,074 UART: [rt] Verify complete
32,208,668 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,238,402 UART: [rt]cmd =0x46504c67, len=4
32,240,072 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.73s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,374 writing to cptra_bootfsm_go
3,776,944 ready_for_fw is high
3,777,387 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,436,753 >>> mbox cmd response: success
14,437,458 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
18,687,542 UART:
18,687,933 UART: Running Caliptra FMC ...
18,689,094 UART:
18,689,258 UART: [state] CFI Enabled
18,697,205 UART: [fht] FMC Alias Private Key: 7
20,462,929 UART: [art] Extend RT PCRs Done
20,464,155 UART: [art] Lock RT PCRs Done
20,465,863 UART: [art] Populate DV Done
20,471,283 UART: [fht] FMC Alias Private Key: 7
20,472,940 UART: [art] Derive CDI
20,473,687 UART: [art] Store in slot 0x4
20,516,779 UART: [art] Derive Key Pair
20,517,821 UART: [art] Store priv key in slot 0x5
22,945,169 UART: [art] Derive Key Pair - Done
22,958,296 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,664,576 UART: [art] Erasing AUTHORITY.KEYID = 7
24,666,089 UART: [art] PUB.X = A9284FF91650EF10082D121123DC17D6612DDB2F572A6B110AD93F4DA4C13E19AD4F2F175517D23D3794865980B52E9B
24,673,332 UART: [art] PUB.Y = F4E65CC3DAF982946D77F6D94D10B0639F4A8A7269D9ECDD1C1B104C7E35E280677DEDBB387111A207C39ACE9F060D71
24,680,609 UART: [art] SIG.R = 5EA862C2DB033001D5DF69ABEB42656EB948F4C1CCB88E6F991E37190D9F78B71484AA5C28F4A6925A1A1A48F07EF178
24,688,015 UART: [art] SIG.S = 9D8F3356C9CE8EFAB2ABC8A9EC7EEB8B15F512A9A901515604BD171CCE7056D08394EBF63C864102FA87A87390DD1D0A
25,667,360 UART: Caliptra RT
25,668,050 UART: [state] CFI Enabled
25,800,737 UART: [rt] RT listening for mailbox commands...
25,832,209 UART: [rt]cmd =0x46504c54, len=4
25,833,685 >>> mbox cmd response data (8 bytes)
25,834,083 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
25,863,956 UART: [rt]cmd =0x46504c67, len=4
25,865,359 >>> mbox cmd response: failed
25,866,701 UART: [rt] FIPS self test
25,867,637 UART: [kat] ++
25,868,112 UART: [kat] sha1
25,872,374 UART: [kat] SHA2-256
25,874,175 UART: [kat] SHA2-384
25,877,067 UART: [kat] SHA2-512-ACC
25,879,264 UART: [kat] ECC-384
28,306,459 UART: [kat] HMAC-384Kdf
28,312,427 UART: [kat] LMS
28,521,561 UART: [kat] --
31,879,811 UART: [rt] Verify complete
32,003,928 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,033,884 UART: [rt]cmd =0x46504c67, len=4
32,035,421 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.72s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,016 writing to cptra_bootfsm_go
192,171 UART:
192,554 UART: Running Caliptra ROM ...
194,144 UART:
194,308 UART: [state] CFI Enabled
265,571 UART: [state] LifecycleState = Unprovisioned
267,970 UART: [state] DebugLocked = No
270,790 UART: [state] WD Timer not started. Device not locked for debugging
275,048 UART: [kat] SHA2-256
464,941 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
475,681 UART: [kat] ++
476,166 UART: [kat] sha1
488,111 UART: [kat] SHA2-256
491,131 UART: [kat] SHA2-384
498,269 UART: [kat] SHA2-512-ACC
500,860 UART: [kat] ECC-384
2,949,449 UART: [kat] HMAC-384Kdf
2,972,986 UART: [kat] LMS
3,504,731 UART: [kat] --
3,509,226 UART: [cold-reset] ++
3,510,525 UART: [fht] FHT @ 0x50003400
3,520,806 UART: [idev] ++
3,521,394 UART: [idev] CDI.KEYID = 6
3,522,309 UART: [idev] SUBJECT.KEYID = 7
3,523,492 UART: [idev] UDS.KEYID = 0
3,524,425 ready_for_fw is high
3,524,648 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
3,673,732 UART: [idev] Erasing UDS.KEYID = 0
6,030,526 UART: [idev] Sha1 KeyId Algorithm
6,052,677 UART: [idev] --
6,056,928 UART: [ldev] ++
6,057,627 UART: [ldev] CDI.KEYID = 6
6,058,519 UART: [ldev] SUBJECT.KEYID = 5
6,059,679 UART: [ldev] AUTHORITY.KEYID = 7
6,060,919 UART: [ldev] FE.KEYID = 1
6,102,359 UART: [ldev] Erasing FE.KEYID = 1
8,604,853 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,344,166 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,359,355 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,374,566 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,389,680 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,410,044 UART: [ldev] --
10,414,935 UART: [fwproc] Wait for Commands...
10,417,575 UART: [fwproc] Recv command 0x46574c44
10,419,835 UART: [fwproc] Recv'd Img size: 118548 bytes
13,917,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,997,381 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,120,987 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,680,739 >>> mbox cmd response: success
14,681,175 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,684,128 UART: [afmc] ++
14,684,879 UART: [afmc] CDI.KEYID = 6
14,686,069 UART: [afmc] SUBJECT.KEYID = 7
14,687,506 UART: [afmc] AUTHORITY.KEYID = 5
17,216,511 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,938,579 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,940,479 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,955,584 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,970,717 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,985,622 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,010,419 UART: [afmc] --
19,014,575 UART: [cold-reset] --
19,019,202 UART: [state] Locking Datavault
19,024,136 UART: [state] Locking PCR0, PCR1 and PCR31
19,026,328 UART: [state] Locking ICCM
19,028,540 UART: [exit] Launching FMC @ 0x40000130
19,037,215 UART:
19,037,455 UART: Running Caliptra FMC ...
19,038,484 UART:
19,038,634 UART: [state] CFI Enabled
19,098,607 UART: [fht] FMC Alias Private Key: 7
20,864,379 UART: [art] Extend RT PCRs Done
20,865,604 UART: [art] Lock RT PCRs Done
20,867,203 UART: [art] Populate DV Done
20,872,831 UART: [fht] FMC Alias Private Key: 7
20,874,475 UART: [art] Derive CDI
20,875,213 UART: [art] Store in slot 0x4
20,931,362 UART: [art] Derive Key Pair
20,932,401 UART: [art] Store priv key in slot 0x5
23,394,827 UART: [art] Derive Key Pair - Done
23,408,039 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,120,803 UART: [art] Erasing AUTHORITY.KEYID = 7
25,122,310 UART: [art] PUB.X = 587004143EE3C4C493021BE6D722C0AB429C921997DF860331B48662E13701BD8FBC131225B73EB7FAD626B6E344E73E
25,129,567 UART: [art] PUB.Y = 440AA6339FF785116462CEC015A78B85E64A9E8C97A5F8A933E0238EEB9F53182D1090635AC5F3DDF5850E44DD1D45B3
25,136,871 UART: [art] SIG.R = C10D30FD1D3A97E9EDEDC46EE926F753FCA54B20B9E190090B1CA32F387426D90BC5CC00A9BC879D2910F038A7640653
25,144,214 UART: [art] SIG.S = 3954460F27E8E21D503652313779EF3D51F927A7BD830CBA4D9360ACE081D9868ED71F9B42D6092C1646A5DFC54D829F
26,123,194 UART: Caliptra RT
26,123,889 UART: [state] CFI Enabled
26,304,291 UART: [rt] RT listening for mailbox commands...
26,335,705 UART: [rt]cmd =0x46504c54, len=4
26,337,343 >>> mbox cmd response data (8 bytes)
26,337,765 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,367,955 UART: [rt]cmd =0x46504c67, len=4
26,369,275 >>> mbox cmd response: failed
26,370,383 UART: [rt] FIPS self test
26,371,322 UART: [kat] ++
26,371,775 UART: [kat] sha1
26,375,996 UART: [kat] SHA2-256
26,377,793 UART: [kat] SHA2-384
26,380,374 UART: [kat] SHA2-512-ACC
26,382,589 UART: [kat] ECC-384
28,816,941 UART: [kat] HMAC-384Kdf
28,843,964 UART: [kat] LMS
29,053,097 UART: [kat] --
32,431,922 UART: [rt] Verify complete
32,508,599 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,538,617 UART: [rt]cmd =0x46504c67, len=4
32,540,069 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,772 writing to cptra_bootfsm_go
3,440,492 ready_for_fw is high
3,440,899 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
14,827,400 >>> mbox cmd response: success
14,827,944 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,113,082 UART:
19,113,468 UART: Running Caliptra FMC ...
19,114,701 UART:
19,114,883 UART: [state] CFI Enabled
19,173,166 UART: [fht] FMC Alias Private Key: 7
20,939,195 UART: [art] Extend RT PCRs Done
20,940,421 UART: [art] Lock RT PCRs Done
20,942,116 UART: [art] Populate DV Done
20,947,482 UART: [fht] FMC Alias Private Key: 7
20,948,974 UART: [art] Derive CDI
20,949,764 UART: [art] Store in slot 0x4
21,006,470 UART: [art] Derive Key Pair
21,007,512 UART: [art] Store priv key in slot 0x5
23,470,442 UART: [art] Derive Key Pair - Done
23,483,494 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,196,083 UART: [art] Erasing AUTHORITY.KEYID = 7
25,197,586 UART: [art] PUB.X = 0A5BF0E6D7F95987F67E2766F626C598CF71B5557D61FDE3B77ABD2A6FD89158C7DFCC4F5409BA376F89746A905F5A64
25,204,905 UART: [art] PUB.Y = F238F59724FD648E96D2B1A1BD52BDA6F03CCBBE394EA0C625B98EC4A7F5660BDD98ED1A90BBA915B2042AFCF15FA2FB
25,212,177 UART: [art] SIG.R = 9A9FFB5A670CA583BDF68ACE4A67AD5636653B25E5C6AA14367ED3ABDDE613CB05937505789423C665BF4CE068FCA710
25,219,582 UART: [art] SIG.S = 16CFC91132220F6F6C1D2C09141C17AB25615F2BDB4DD60E4BEC952FA1EFCA3C763A9BD1CA951632C5E2FB395E284389
26,199,062 UART: Caliptra RT
26,199,780 UART: [state] CFI Enabled
26,379,512 UART: [rt] RT listening for mailbox commands...
26,410,876 UART: [rt]cmd =0x46504c54, len=4
26,412,494 >>> mbox cmd response data (8 bytes)
26,412,905 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,443,241 UART: [rt]cmd =0x46504c67, len=4
26,444,594 >>> mbox cmd response: failed
26,445,597 UART: [rt] FIPS self test
26,446,528 UART: [kat] ++
26,446,984 UART: [kat] sha1
26,451,410 UART: [kat] SHA2-256
26,453,205 UART: [kat] SHA2-384
26,456,038 UART: [kat] SHA2-512-ACC
26,458,234 UART: [kat] ECC-384
28,892,759 UART: [kat] HMAC-384Kdf
28,919,514 UART: [kat] LMS
29,128,675 UART: [kat] --
32,486,799 UART: [rt] Verify complete
32,584,080 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,613,884 UART: [rt]cmd =0x46504c67, len=4
32,615,525 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,216 writing to cptra_bootfsm_go
192,490 UART:
192,844 UART: Running Caliptra ROM ...
193,932 UART:
603,636 UART: [state] CFI Enabled
616,377 UART: [state] LifecycleState = Unprovisioned
618,759 UART: [state] DebugLocked = No
620,390 UART: [state] WD Timer not started. Device not locked for debugging
625,424 UART: [kat] SHA2-256
815,336 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
826,079 UART: [kat] ++
826,643 UART: [kat] sha1
837,166 UART: [kat] SHA2-256
840,254 UART: [kat] SHA2-384
845,895 UART: [kat] SHA2-512-ACC
848,487 UART: [kat] ECC-384
3,290,794 UART: [kat] HMAC-384Kdf
3,303,515 UART: [kat] LMS
3,835,344 UART: [kat] --
3,840,609 UART: [cold-reset] ++
3,841,773 UART: [fht] FHT @ 0x50003400
3,853,701 UART: [idev] ++
3,854,415 UART: [idev] CDI.KEYID = 6
3,855,395 UART: [idev] SUBJECT.KEYID = 7
3,856,577 UART: [idev] UDS.KEYID = 0
3,857,485 ready_for_fw is high
3,857,725 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
4,006,694 UART: [idev] Erasing UDS.KEYID = 0
6,328,499 UART: [idev] Sha1 KeyId Algorithm
6,350,669 UART: [idev] --
6,355,534 UART: [ldev] ++
6,356,221 UART: [ldev] CDI.KEYID = 6
6,357,109 UART: [ldev] SUBJECT.KEYID = 5
6,358,328 UART: [ldev] AUTHORITY.KEYID = 7
6,359,564 UART: [ldev] FE.KEYID = 1
6,369,001 UART: [ldev] Erasing FE.KEYID = 1
8,850,329 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,571,542 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,586,734 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,601,943 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,617,075 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,636,398 UART: [ldev] --
10,642,410 UART: [fwproc] Wait for Commands...
10,645,603 UART: [fwproc] Recv command 0x46574c44
10,647,874 UART: [fwproc] Recv'd Img size: 118548 bytes
14,143,769 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,225,547 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,349,204 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
14,909,617 >>> mbox cmd response: success
14,910,031 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
14,913,100 UART: [afmc] ++
14,913,792 UART: [afmc] CDI.KEYID = 6
14,914,988 UART: [afmc] SUBJECT.KEYID = 7
14,916,433 UART: [afmc] AUTHORITY.KEYID = 5
17,416,456 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,139,170 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,141,150 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,156,235 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,171,399 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,186,281 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,211,329 UART: [afmc] --
19,214,781 UART: [cold-reset] --
19,218,707 UART: [state] Locking Datavault
19,224,720 UART: [state] Locking PCR0, PCR1 and PCR31
19,226,916 UART: [state] Locking ICCM
19,228,694 UART: [exit] Launching FMC @ 0x40000130
19,237,377 UART:
19,237,615 UART: Running Caliptra FMC ...
19,238,724 UART:
19,238,879 UART: [state] CFI Enabled
19,246,979 UART: [fht] FMC Alias Private Key: 7
21,013,361 UART: [art] Extend RT PCRs Done
21,014,593 UART: [art] Lock RT PCRs Done
21,016,007 UART: [art] Populate DV Done
21,021,324 UART: [fht] FMC Alias Private Key: 7
21,022,974 UART: [art] Derive CDI
21,023,795 UART: [art] Store in slot 0x4
21,066,503 UART: [art] Derive Key Pair
21,067,554 UART: [art] Store priv key in slot 0x5
23,494,293 UART: [art] Derive Key Pair - Done
23,507,450 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,213,594 UART: [art] Erasing AUTHORITY.KEYID = 7
25,215,101 UART: [art] PUB.X = 314EA4773626FDE17ADB70B6549722FD5D4B8A51AFB680C0C97B7E47FB608C9C946CCB1CF184E19F3E0D192C0BAD9543
25,222,400 UART: [art] PUB.Y = 8290E40F690DFB7DE42D0E1F8421780B2C5C7400E09AADF82FF3696649530969C4FE662D0E7256C34353D885F87C9DA5
25,229,638 UART: [art] SIG.R = F33F008B7575753C37ABDF7FEB06E6E6821CED71383B9245705FAE1607CDF2504F4365EB240CC6BFF6E485E375F61211
25,236,975 UART: [art] SIG.S = 796F1313109C230C4ECEB99E7DF2E620AE08D6E46534441D32C322B9751D41508CF2C149943ED505AC5221FC8CD39D87
26,216,015 UART: Caliptra RT
26,216,728 UART: [state] CFI Enabled
26,348,524 UART: [rt] RT listening for mailbox commands...
26,379,799 UART: [rt]cmd =0x46504c54, len=4
26,381,443 >>> mbox cmd response data (8 bytes)
26,381,854 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,412,056 UART: [rt]cmd =0x46504c67, len=4
26,413,486 >>> mbox cmd response: failed
26,414,733 UART: [rt] FIPS self test
26,415,671 UART: [kat] ++
26,416,122 UART: [kat] sha1
26,420,542 UART: [kat] SHA2-256
26,422,337 UART: [kat] SHA2-384
26,425,115 UART: [kat] SHA2-512-ACC
26,427,328 UART: [kat] ECC-384
28,854,624 UART: [kat] HMAC-384Kdf
28,860,426 UART: [kat] LMS
29,069,545 UART: [kat] --
32,448,439 UART: [rt] Verify complete
32,551,483 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,581,202 UART: [rt]cmd =0x46504c67, len=4
32,582,781 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.74s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,239 writing to cptra_bootfsm_go
3,752,368 ready_for_fw is high
3,752,836 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,049,416 >>> mbox cmd response: success
15,050,132 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
19,305,851 UART:
19,306,229 UART: Running Caliptra FMC ...
19,307,362 UART:
19,307,520 UART: [state] CFI Enabled
19,315,362 UART: [fht] FMC Alias Private Key: 7
21,081,320 UART: [art] Extend RT PCRs Done
21,082,576 UART: [art] Lock RT PCRs Done
21,084,185 UART: [art] Populate DV Done
21,089,610 UART: [fht] FMC Alias Private Key: 7
21,091,265 UART: [art] Derive CDI
21,092,014 UART: [art] Store in slot 0x4
21,134,677 UART: [art] Derive Key Pair
21,135,726 UART: [art] Store priv key in slot 0x5
23,562,442 UART: [art] Derive Key Pair - Done
23,575,236 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,281,414 UART: [art] Erasing AUTHORITY.KEYID = 7
25,282,925 UART: [art] PUB.X = 57DF133AA4B39C11588245493A8BC824A5C3B1752D33F1A5003FFEA75C5176039C8D354AF5B18B1D53849A8C6FF1FF68
25,290,199 UART: [art] PUB.Y = CD0E2EC6A39D4692EED80F03DC4C326217CFC876E65F65E89DF89021B0BF67CF378D6ECB63FBE9A97F86A0C4CFCB0A0F
25,297,471 UART: [art] SIG.R = 0E427161B8A35F997D938443E010A6C951D16E4BF3EEC521A67C66591DE84910154EA8430F43F4982E4DC18B210CAD74
25,304,869 UART: [art] SIG.S = A73B9D6076E79CEE223392BDE73F937B5588D92A0E2C250A147D8E3C87DEA72541DF60D1E0FB60B38839B2607A19C8E7
26,283,785 UART: Caliptra RT
26,284,498 UART: [state] CFI Enabled
26,416,874 UART: [rt] RT listening for mailbox commands...
26,448,239 UART: [rt]cmd =0x46504c54, len=4
26,449,773 >>> mbox cmd response data (8 bytes)
26,450,182 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
26,479,678 UART: [rt]cmd =0x46504c67, len=4
26,480,972 >>> mbox cmd response: failed
26,481,966 UART: [rt] FIPS self test
26,482,842 UART: [kat] ++
26,483,290 UART: [kat] sha1
26,487,737 UART: [kat] SHA2-256
26,489,554 UART: [kat] SHA2-384
26,492,470 UART: [kat] SHA2-512-ACC
26,494,661 UART: [kat] ECC-384
28,922,042 UART: [kat] HMAC-384Kdf
28,927,713 UART: [kat] LMS
29,136,883 UART: [kat] --
32,496,409 UART: [rt] Verify complete
32,620,385 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
32,650,067 UART: [rt]cmd =0x46504c67, len=4
32,651,685 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.75s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,404 UART: [state] LifecycleState = Unprovisioned
86,059 UART: [state] DebugLocked = No
86,565 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,189 UART: [kat] SHA2-256
882,120 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,235 UART: [kat] ++
886,387 UART: [kat] sha1
890,629 UART: [kat] SHA2-256
892,567 UART: [kat] SHA2-384
895,244 UART: [kat] SHA2-512-ACC
897,145 UART: [kat] ECC-384
902,844 UART: [kat] HMAC-384Kdf
907,330 UART: [kat] LMS
1,475,526 UART: [kat] --
1,476,435 UART: [cold-reset] ++
1,476,839 UART: [fht] Storing FHT @ 0x50003400
1,479,638 UART: [idev] ++
1,479,806 UART: [idev] CDI.KEYID = 6
1,480,166 UART: [idev] SUBJECT.KEYID = 7
1,480,590 UART: [idev] UDS.KEYID = 0
1,480,935 ready_for_fw is high
1,480,935 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,692 UART: [idev] Erasing UDS.KEYID = 0
1,504,836 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,548 UART: [idev] --
1,514,661 UART: [ldev] ++
1,514,829 UART: [ldev] CDI.KEYID = 6
1,515,192 UART: [ldev] SUBJECT.KEYID = 5
1,515,618 UART: [ldev] AUTHORITY.KEYID = 7
1,516,081 UART: [ldev] FE.KEYID = 1
1,521,257 UART: [ldev] Erasing FE.KEYID = 1
1,546,080 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,837 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,553 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,444 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,156 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,180 UART: [ldev] --
1,585,645 UART: [fwproc] Waiting for Commands...
1,586,314 UART: [fwproc] Received command 0x46574c44
1,587,105 UART: [fwproc] Received Image of size 118548 bytes
2,931,395 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,957,247 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,988,465 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,128,874 >>> mbox cmd response: success
3,128,874 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,130,020 UART: [afmc] ++
3,130,188 UART: [afmc] CDI.KEYID = 6
3,130,550 UART: [afmc] SUBJECT.KEYID = 7
3,130,975 UART: [afmc] AUTHORITY.KEYID = 5
3,166,158 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,182,592 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,372 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,081 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,194,964 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,200,647 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,647 UART: [afmc] --
3,209,527 UART: [cold-reset] --
3,210,261 UART: [state] Locking Datavault
3,211,542 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,146 UART: [state] Locking ICCM
3,212,718 UART: [exit] Launching FMC @ 0x40000130
3,218,048 UART:
3,218,064 UART: Running Caliptra FMC ...
3,218,472 UART:
3,218,526 UART: [state] CFI Enabled
3,229,180 UART: [fht] FMC Alias Private Key: 7
3,348,304 UART: [art] Extend RT PCRs Done
3,348,732 UART: [art] Lock RT PCRs Done
3,350,202 UART: [art] Populate DV Done
3,358,531 UART: [fht] FMC Alias Private Key: 7
3,359,651 UART: [art] Derive CDI
3,359,931 UART: [art] Store in slot 0x4
3,445,727 UART: [art] Derive Key Pair
3,446,087 UART: [art] Store priv key in slot 0x5
3,459,308 UART: [art] Derive Key Pair - Done
3,473,996 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,291 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,056 UART: [art] PUB.X = 830E88AB0790F32418FCE45D443B4C438B10C15CFD4B1D58461EA3A1F36EA1F93277A307C45F291C76FFF59F26CFB4A8
3,496,827 UART: [art] PUB.Y = BC1148E556054AA3AF7F2E9849F4C7DD513EAEA12F9D1C8BCA28D9A5118B26CE130B12A8F534D2C1BCC81CE77A5CD9FC
3,503,795 UART: [art] SIG.R = 8E3B551DCE2271791E07191D4A172F1924068701BA60EF1D828DD0A1C449320170531D725F8FE77A92F4E64352962518
3,510,541 UART: [art] SIG.S = D0EDAE607DB15DA39562A4A779F9BFD36736F4E488CC3218AAE42E2956A9128C315996D5F70F732CE3CFC23306E1E04A
3,534,041 UART: Caliptra RT
3,534,292 UART: [state] CFI Enabled
3,655,265 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,615 UART: [rt]cmd =0x46504c54, len=4
3,686,737 >>> mbox cmd response data (8 bytes)
3,686,738 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,716,617 UART: [rt]cmd =0x46504c67, len=4
3,717,625 >>> mbox cmd response: failed
3,717,951 UART: [rt] FIPS self test
3,718,282 UART: [kat] ++
3,718,434 UART: [kat] sha1
3,722,771 UART: [kat] SHA2-256
3,724,701 UART: [kat] SHA2-384
3,727,550 UART: [kat] SHA2-512-ACC
3,729,445 UART: [kat] ECC-384
3,739,054 UART: [kat] HMAC-384Kdf
3,743,580 UART: [kat] LMS
4,318,808 UART: [kat] --
6,589,501 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,597,337 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,626,527 UART: [rt]cmd =0x46504c67, len=4
6,627,500 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,419 ready_for_fw is high
1,362,419 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,979,420 >>> mbox cmd response: success
2,979,420 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,041,357 UART:
3,041,373 UART: Running Caliptra FMC ...
3,041,781 UART:
3,041,835 UART: [state] CFI Enabled
3,052,419 UART: [fht] FMC Alias Private Key: 7
3,171,307 UART: [art] Extend RT PCRs Done
3,171,735 UART: [art] Lock RT PCRs Done
3,173,219 UART: [art] Populate DV Done
3,181,378 UART: [fht] FMC Alias Private Key: 7
3,182,504 UART: [art] Derive CDI
3,182,784 UART: [art] Store in slot 0x4
3,268,466 UART: [art] Derive Key Pair
3,268,826 UART: [art] Store priv key in slot 0x5
3,281,853 UART: [art] Derive Key Pair - Done
3,296,535 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,311,640 UART: [art] Erasing AUTHORITY.KEYID = 7
3,312,405 UART: [art] PUB.X = 277616FF87B653BF57ACAC895A39EE797E9E73F9D7A06C23F6958870C9DADED48B04862D593D88A5EDB8A29BE9FAF743
3,319,186 UART: [art] PUB.Y = A7080A3390AA80AA04965A0EB63211E25DD61E48F7E9614F00C48E8B83CC70E890A412CB2EB548C794067F14281570E5
3,326,097 UART: [art] SIG.R = 7F87B443E762AC5E235A9869077C50A320C97F11E578FCA074674EE242454E437B1BF2A34D57B41D52DA1901E6DC27A5
3,332,861 UART: [art] SIG.S = D9FB06D6C14F85F3F666C69A5D15F7FD0F225DC120981CF36583494DFEA1368C166EE70A0ED032B283EF99A9D8EA45B1
3,357,743 UART: Caliptra RT
3,357,994 UART: [state] CFI Enabled
3,476,916 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,507,380 UART: [rt]cmd =0x46504c54, len=4
3,508,420 >>> mbox cmd response data (8 bytes)
3,508,421 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,538,112 UART: [rt]cmd =0x46504c67, len=4
3,539,158 >>> mbox cmd response: failed
3,539,434 UART: [rt] FIPS self test
3,539,765 UART: [kat] ++
3,539,917 UART: [kat] sha1
3,543,994 UART: [kat] SHA2-256
3,545,924 UART: [kat] SHA2-384
3,548,715 UART: [kat] SHA2-512-ACC
3,550,610 UART: [kat] ECC-384
3,560,363 UART: [kat] HMAC-384Kdf
3,564,907 UART: [kat] LMS
4,140,135 UART: [kat] --
6,303,158 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,308,881 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,338,217 UART: [rt]cmd =0x46504c67, len=4
6,339,462 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,395 UART: [state] LifecycleState = Unprovisioned
86,050 UART: [state] DebugLocked = No
86,560 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,168 UART: [kat] SHA2-256
882,099 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,214 UART: [kat] ++
886,366 UART: [kat] sha1
890,590 UART: [kat] SHA2-256
892,528 UART: [kat] SHA2-384
895,269 UART: [kat] SHA2-512-ACC
897,170 UART: [kat] ECC-384
902,759 UART: [kat] HMAC-384Kdf
907,407 UART: [kat] LMS
1,475,603 UART: [kat] --
1,476,316 UART: [cold-reset] ++
1,476,816 UART: [fht] Storing FHT @ 0x50003400
1,479,557 UART: [idev] ++
1,479,725 UART: [idev] CDI.KEYID = 6
1,480,085 UART: [idev] SUBJECT.KEYID = 7
1,480,509 UART: [idev] UDS.KEYID = 0
1,480,854 ready_for_fw is high
1,480,854 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,488,363 UART: [idev] Erasing UDS.KEYID = 0
1,504,925 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,423 UART: [idev] --
1,514,414 UART: [ldev] ++
1,514,582 UART: [ldev] CDI.KEYID = 6
1,514,945 UART: [ldev] SUBJECT.KEYID = 5
1,515,371 UART: [ldev] AUTHORITY.KEYID = 7
1,515,834 UART: [ldev] FE.KEYID = 1
1,521,092 UART: [ldev] Erasing FE.KEYID = 1
1,546,481 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,972 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,688 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,579 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,291 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,399 UART: [ldev] --
1,585,680 UART: [fwproc] Waiting for Commands...
1,586,355 UART: [fwproc] Received command 0x46574c44
1,587,146 UART: [fwproc] Received Image of size 118548 bytes
2,931,370 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,958,346 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,989,564 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,129,979 >>> mbox cmd response: success
3,129,979 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,130,995 UART: [afmc] ++
3,131,163 UART: [afmc] CDI.KEYID = 6
3,131,525 UART: [afmc] SUBJECT.KEYID = 7
3,131,950 UART: [afmc] AUTHORITY.KEYID = 5
3,166,999 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,183,119 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,183,899 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,189,608 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,195,491 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,201,174 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,208,976 UART: [afmc] --
3,210,000 UART: [cold-reset] --
3,210,890 UART: [state] Locking Datavault
3,211,995 UART: [state] Locking PCR0, PCR1 and PCR31
3,212,599 UART: [state] Locking ICCM
3,213,093 UART: [exit] Launching FMC @ 0x40000130
3,218,423 UART:
3,218,439 UART: Running Caliptra FMC ...
3,218,847 UART:
3,218,990 UART: [state] CFI Enabled
3,229,522 UART: [fht] FMC Alias Private Key: 7
3,348,492 UART: [art] Extend RT PCRs Done
3,348,920 UART: [art] Lock RT PCRs Done
3,350,298 UART: [art] Populate DV Done
3,358,445 UART: [fht] FMC Alias Private Key: 7
3,359,477 UART: [art] Derive CDI
3,359,757 UART: [art] Store in slot 0x4
3,445,737 UART: [art] Derive Key Pair
3,446,097 UART: [art] Store priv key in slot 0x5
3,459,892 UART: [art] Derive Key Pair - Done
3,474,355 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,489,424 UART: [art] Erasing AUTHORITY.KEYID = 7
3,490,189 UART: [art] PUB.X = 0A7C5766DAD0B0388D6863D07D0BD58AAE3A52B9E8DC712B4197482D4F5C2E2867CAEADC981A96F4A851BC46A54D0AB5
3,496,966 UART: [art] PUB.Y = 6D355880402C4A37D33B57CA0E70DB2AD93D5E8908FEBDB999BAE5349895E62FCC38C2BA09C25975840AAD8B12EF594D
3,503,916 UART: [art] SIG.R = 80E9AA478305A3A31B2DDE054CEAB776CC9C7BA0BEB5215FBAB0CC6F9692C2CFFB26B8F44ACF7562C95F346AFE247BD4
3,510,708 UART: [art] SIG.S = 47BE410B1B2842836A0659E2DF44A1C204FA1C1FCC7EC1D7A1A74790504F2449C71CB3A4F06B1CE688E9F2F162293954
3,534,885 UART: Caliptra RT
3,535,228 UART: [state] CFI Enabled
3,655,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,685,648 UART: [rt]cmd =0x46504c54, len=4
3,686,712 >>> mbox cmd response data (8 bytes)
3,686,713 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,716,612 UART: [rt]cmd =0x46504c67, len=4
3,717,776 >>> mbox cmd response: failed
3,718,062 UART: [rt] FIPS self test
3,718,393 UART: [kat] ++
3,718,545 UART: [kat] sha1
3,722,688 UART: [kat] SHA2-256
3,724,618 UART: [kat] SHA2-384
3,727,225 UART: [kat] SHA2-512-ACC
3,729,120 UART: [kat] ECC-384
3,738,809 UART: [kat] HMAC-384Kdf
3,743,431 UART: [kat] LMS
4,318,659 UART: [kat] --
6,589,462 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,597,488 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,626,638 UART: [rt]cmd =0x46504c67, len=4
6,627,927 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.84s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,402 ready_for_fw is high
1,362,402 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,497 >>> mbox cmd response: success
2,981,497 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
3,043,210 UART:
3,043,226 UART: Running Caliptra FMC ...
3,043,634 UART:
3,043,777 UART: [state] CFI Enabled
3,054,493 UART: [fht] FMC Alias Private Key: 7
3,173,035 UART: [art] Extend RT PCRs Done
3,173,463 UART: [art] Lock RT PCRs Done
3,174,833 UART: [art] Populate DV Done
3,183,054 UART: [fht] FMC Alias Private Key: 7
3,184,146 UART: [art] Derive CDI
3,184,426 UART: [art] Store in slot 0x4
3,270,250 UART: [art] Derive Key Pair
3,270,610 UART: [art] Store priv key in slot 0x5
3,283,975 UART: [art] Derive Key Pair - Done
3,298,909 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,516 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,281 UART: [art] PUB.X = 1F606CEC84EC961632215FE596A39CDF7960EAFFAF148875B52ABAEADB0E715944AD584F6477D8E2CCB87D0C0CFEBCFB
3,322,068 UART: [art] PUB.Y = CC365F65D6285431F067CB0E1F3AF54B010528ED10F7666FA4F9562EA12E0D126E6CFF6D80C8BFD18CA835999DC50FBC
3,329,017 UART: [art] SIG.R = BB1568A8995F0B8E8969C13FC8C2F98F5F548F0F01F24E68774043FE1132FB0D274591A6D15DE279556A2C51D9F15D6F
3,335,777 UART: [art] SIG.S = B580ED71CA0DEC3BBC73C51D5D038D1933DEDCBCADDEDD585319D0C68F91D189C1777A324E8D895890479FFAE73AF1A8
3,359,459 UART: Caliptra RT
3,359,802 UART: [state] CFI Enabled
3,479,383 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,510,103 UART: [rt]cmd =0x46504c54, len=4
3,511,197 >>> mbox cmd response data (8 bytes)
3,511,198 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,541,189 UART: [rt]cmd =0x46504c67, len=4
3,542,209 >>> mbox cmd response: failed
3,542,577 UART: [rt] FIPS self test
3,542,908 UART: [kat] ++
3,543,060 UART: [kat] sha1
3,547,277 UART: [kat] SHA2-256
3,549,207 UART: [kat] SHA2-384
3,551,968 UART: [kat] SHA2-512-ACC
3,553,863 UART: [kat] ECC-384
3,563,818 UART: [kat] HMAC-384Kdf
3,568,370 UART: [kat] LMS
4,143,598 UART: [kat] --
6,307,541 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,311,932 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,341,170 UART: [rt]cmd =0x46504c67, len=4
6,342,439 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,934 UART: [state] LifecycleState = Unprovisioned
85,589 UART: [state] DebugLocked = No
86,103 UART: [state] WD Timer not started. Device not locked for debugging
87,436 UART: [kat] SHA2-256
890,986 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,090 UART: [kat] ++
895,242 UART: [kat] sha1
899,354 UART: [kat] SHA2-256
901,294 UART: [kat] SHA2-384
904,031 UART: [kat] SHA2-512-ACC
905,932 UART: [kat] ECC-384
915,413 UART: [kat] HMAC-384Kdf
920,193 UART: [kat] LMS
1,168,505 UART: [kat] --
1,169,338 UART: [cold-reset] ++
1,169,744 UART: [fht] FHT @ 0x50003400
1,172,238 UART: [idev] ++
1,172,406 UART: [idev] CDI.KEYID = 6
1,172,767 UART: [idev] SUBJECT.KEYID = 7
1,173,192 UART: [idev] UDS.KEYID = 0
1,173,538 ready_for_fw is high
1,173,538 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,433 UART: [idev] Erasing UDS.KEYID = 0
1,198,249 UART: [idev] Sha1 KeyId Algorithm
1,207,167 UART: [idev] --
1,208,078 UART: [ldev] ++
1,208,246 UART: [ldev] CDI.KEYID = 6
1,208,610 UART: [ldev] SUBJECT.KEYID = 5
1,209,037 UART: [ldev] AUTHORITY.KEYID = 7
1,209,500 UART: [ldev] FE.KEYID = 1
1,214,590 UART: [ldev] Erasing FE.KEYID = 1
1,241,213 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,037 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,753 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,642 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,354 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,394 UART: [ldev] --
1,280,673 UART: [fwproc] Wait for Commands...
1,281,390 UART: [fwproc] Recv command 0x46574c44
1,282,123 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,908 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,652,567 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,683,742 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,005 >>> mbox cmd response: success
2,824,005 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,825,237 UART: [afmc] ++
2,825,405 UART: [afmc] CDI.KEYID = 6
2,825,768 UART: [afmc] SUBJECT.KEYID = 7
2,826,194 UART: [afmc] AUTHORITY.KEYID = 5
2,861,279 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,877,852 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,878,601 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,311 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,192 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,895,893 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,903,596 UART: [afmc] --
2,904,621 UART: [cold-reset] --
2,905,525 UART: [state] Locking Datavault
2,906,606 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,210 UART: [state] Locking ICCM
2,907,864 UART: [exit] Launching FMC @ 0x40000130
2,913,194 UART:
2,913,210 UART: Running Caliptra FMC ...
2,913,618 UART:
2,913,672 UART: [state] CFI Enabled
2,924,226 UART: [fht] FMC Alias Private Key: 7
3,044,094 UART: [art] Extend RT PCRs Done
3,044,522 UART: [art] Lock RT PCRs Done
3,046,134 UART: [art] Populate DV Done
3,054,473 UART: [fht] FMC Alias Private Key: 7
3,055,521 UART: [art] Derive CDI
3,055,801 UART: [art] Store in slot 0x4
3,141,384 UART: [art] Derive Key Pair
3,141,744 UART: [art] Store priv key in slot 0x5
3,155,134 UART: [art] Derive Key Pair - Done
3,169,862 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,141 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,906 UART: [art] PUB.X = FD73936356C7FE3F0D18BE4B30F6C44D6BEA48F9CEBB1DFB2324DC9F86986D7A3A16018F7ABF0B0ED629E91D1F0D9449
3,192,681 UART: [art] PUB.Y = 9B00C028A453818FF3DD3DAA3CF1CD14216997C44B2D7F8A7D1753661622FED9357B83F0CB5BE87C232C2F16529130E4
3,199,613 UART: [art] SIG.R = 865EF1564492EEF6C7A7A7041E847F1F6D71D3DA26F583DA5DE1F80717136271174F6B399F4D19E0D57D1AD09B8037DA
3,206,381 UART: [art] SIG.S = 5C63A6F9BD7182F70657A18D336DDDB662859341CDECC7DD3FCEF90172FB69B608D908F84540CA18152FC7F36794D9FC
3,229,567 UART: Caliptra RT
3,229,818 UART: [state] CFI Enabled
3,348,107 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,378,953 UART: [rt]cmd =0x46504c54, len=4
3,380,053 >>> mbox cmd response data (8 bytes)
3,380,054 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,409,345 UART: [rt]cmd =0x46504c67, len=4
3,410,177 >>> mbox cmd response: failed
3,410,463 UART: [rt] FIPS self test
3,410,794 UART: [kat] ++
3,410,946 UART: [kat] sha1
3,415,149 UART: [kat] SHA2-256
3,417,079 UART: [kat] SHA2-384
3,419,904 UART: [kat] SHA2-512-ACC
3,421,799 UART: [kat] ECC-384
3,431,824 UART: [kat] HMAC-384Kdf
3,436,289 UART: [kat] LMS
3,696,049 UART: [kat] --
5,974,960 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,979,920 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,009,144 UART: [rt]cmd =0x46504c67, len=4
6,010,367 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.81s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,278 ready_for_fw is high
1,059,278 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,334 >>> mbox cmd response: success
2,678,334 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,739,263 UART:
2,739,279 UART: Running Caliptra FMC ...
2,739,687 UART:
2,739,741 UART: [state] CFI Enabled
2,749,993 UART: [fht] FMC Alias Private Key: 7
2,868,817 UART: [art] Extend RT PCRs Done
2,869,245 UART: [art] Lock RT PCRs Done
2,870,895 UART: [art] Populate DV Done
2,879,162 UART: [fht] FMC Alias Private Key: 7
2,880,216 UART: [art] Derive CDI
2,880,496 UART: [art] Store in slot 0x4
2,965,945 UART: [art] Derive Key Pair
2,966,305 UART: [art] Store priv key in slot 0x5
2,979,683 UART: [art] Derive Key Pair - Done
2,994,442 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,009,847 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,612 UART: [art] PUB.X = 7EDD3C16D7156F3248657E0118B0CA5E85088ACB796887205B300B0AB658A59753DB2C88CE587D51CC951C5BE7C51962
3,017,370 UART: [art] PUB.Y = EED2D03F967B6A5CA670368B9F1239C0D9AFDD3864BF50D9A066F78C46534922649391BE69B6D16426A39D02F8C35D0C
3,024,318 UART: [art] SIG.R = 921FF606537AFEBDE11706D0EDE9EE08385EB255BFA76616208B7B4062212EB8C9FB0A03705AE960E39103221659B046
3,031,070 UART: [art] SIG.S = C6804E2C335BECFEE6B00B78BC4AFC39D7EF267828B360FCDF4AA439D7F04B65C4AE429356B4C3FCADEF2E537EFA9F94
3,055,373 UART: Caliptra RT
3,055,624 UART: [state] CFI Enabled
3,175,356 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,205,774 UART: [rt]cmd =0x46504c54, len=4
3,206,992 >>> mbox cmd response data (8 bytes)
3,206,993 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,236,564 UART: [rt]cmd =0x46504c67, len=4
3,237,592 >>> mbox cmd response: failed
3,237,776 UART: [rt] FIPS self test
3,238,107 UART: [kat] ++
3,238,259 UART: [kat] sha1
3,242,390 UART: [kat] SHA2-256
3,244,320 UART: [kat] SHA2-384
3,247,165 UART: [kat] SHA2-512-ACC
3,249,060 UART: [kat] ECC-384
3,258,607 UART: [kat] HMAC-384Kdf
3,263,296 UART: [kat] LMS
3,523,056 UART: [kat] --
5,697,689 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,707,345 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,736,419 UART: [rt]cmd =0x46504c67, len=4
5,737,654 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.63s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,567 UART: [state] LifecycleState = Unprovisioned
86,222 UART: [state] DebugLocked = No
86,712 UART: [state] WD Timer not started. Device not locked for debugging
87,867 UART: [kat] SHA2-256
891,417 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,521 UART: [kat] ++
895,673 UART: [kat] sha1
899,847 UART: [kat] SHA2-256
901,787 UART: [kat] SHA2-384
904,354 UART: [kat] SHA2-512-ACC
906,255 UART: [kat] ECC-384
916,234 UART: [kat] HMAC-384Kdf
920,882 UART: [kat] LMS
1,169,194 UART: [kat] --
1,170,065 UART: [cold-reset] ++
1,170,599 UART: [fht] FHT @ 0x50003400
1,173,289 UART: [idev] ++
1,173,457 UART: [idev] CDI.KEYID = 6
1,173,818 UART: [idev] SUBJECT.KEYID = 7
1,174,243 UART: [idev] UDS.KEYID = 0
1,174,589 ready_for_fw is high
1,174,589 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,181,896 UART: [idev] Erasing UDS.KEYID = 0
1,198,598 UART: [idev] Sha1 KeyId Algorithm
1,207,374 UART: [idev] --
1,208,405 UART: [ldev] ++
1,208,573 UART: [ldev] CDI.KEYID = 6
1,208,937 UART: [ldev] SUBJECT.KEYID = 5
1,209,364 UART: [ldev] AUTHORITY.KEYID = 7
1,209,827 UART: [ldev] FE.KEYID = 1
1,215,027 UART: [ldev] Erasing FE.KEYID = 1
1,241,526 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,812 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,528 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,417 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,129 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,199 UART: [ldev] --
1,280,564 UART: [fwproc] Wait for Commands...
1,281,197 UART: [fwproc] Recv command 0x46574c44
1,281,930 UART: [fwproc] Recv'd Img size: 118548 bytes
2,625,565 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,658 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,833 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,825,216 >>> mbox cmd response: success
2,825,216 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,826,286 UART: [afmc] ++
2,826,454 UART: [afmc] CDI.KEYID = 6
2,826,817 UART: [afmc] SUBJECT.KEYID = 7
2,827,243 UART: [afmc] AUTHORITY.KEYID = 5
2,862,766 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,549 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,880,298 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,886,008 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,889 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,590 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,497 UART: [afmc] --
2,906,508 UART: [cold-reset] --
2,907,222 UART: [state] Locking Datavault
2,908,333 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,937 UART: [state] Locking ICCM
2,909,475 UART: [exit] Launching FMC @ 0x40000130
2,914,805 UART:
2,914,821 UART: Running Caliptra FMC ...
2,915,229 UART:
2,915,372 UART: [state] CFI Enabled
2,925,926 UART: [fht] FMC Alias Private Key: 7
3,044,464 UART: [art] Extend RT PCRs Done
3,044,892 UART: [art] Lock RT PCRs Done
3,046,438 UART: [art] Populate DV Done
3,054,535 UART: [fht] FMC Alias Private Key: 7
3,055,575 UART: [art] Derive CDI
3,055,855 UART: [art] Store in slot 0x4
3,141,974 UART: [art] Derive Key Pair
3,142,334 UART: [art] Store priv key in slot 0x5
3,155,612 UART: [art] Derive Key Pair - Done
3,170,334 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,493 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,258 UART: [art] PUB.X = BA09FA6D7B920483ADCE6FA6474AF1556493BB4222782071D775912BE2AC4D600819A431F54EE484CDBA3A90FDCFBF5C
3,193,033 UART: [art] PUB.Y = A9E9723457DCA630216357673859F4B788A4B096995E8592D459F119BEA002D775FB9B50CF5D2CB26718F5093E8A5FE2
3,199,973 UART: [art] SIG.R = C935AC82A06BB9D068AF2B7CD5DEF11CEFADD5556241D7849CDF81A3B83515C085A68E68D8D5DBA06AB8CB747EDB23FE
3,206,769 UART: [art] SIG.S = 66DA6E5373422720DBBB751BAD19980D1FF40BD00D7436EF24E65C3DC961D3292B12013849AB1386FD3C9B37E5B7FC48
3,230,759 UART: Caliptra RT
3,231,102 UART: [state] CFI Enabled
3,351,477 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,843 UART: [rt]cmd =0x46504c54, len=4
3,383,033 >>> mbox cmd response data (8 bytes)
3,383,034 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,412,805 UART: [rt]cmd =0x46504c67, len=4
3,413,881 >>> mbox cmd response: failed
3,414,019 UART: [rt] FIPS self test
3,414,350 UART: [kat] ++
3,414,502 UART: [kat] sha1
3,418,469 UART: [kat] SHA2-256
3,420,399 UART: [kat] SHA2-384
3,423,108 UART: [kat] SHA2-512-ACC
3,425,003 UART: [kat] ECC-384
3,434,620 UART: [kat] HMAC-384Kdf
3,439,277 UART: [kat] LMS
3,699,037 UART: [kat] --
5,976,722 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,983,624 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,012,836 UART: [rt]cmd =0x46504c67, len=4
6,013,837 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.80s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,483 ready_for_fw is high
1,058,483 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,863 >>> mbox cmd response: success
2,677,863 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,739,986 UART:
2,740,002 UART: Running Caliptra FMC ...
2,740,410 UART:
2,740,553 UART: [state] CFI Enabled
2,750,607 UART: [fht] FMC Alias Private Key: 7
2,869,567 UART: [art] Extend RT PCRs Done
2,869,995 UART: [art] Lock RT PCRs Done
2,871,545 UART: [art] Populate DV Done
2,879,848 UART: [fht] FMC Alias Private Key: 7
2,880,836 UART: [art] Derive CDI
2,881,116 UART: [art] Store in slot 0x4
2,967,137 UART: [art] Derive Key Pair
2,967,497 UART: [art] Store priv key in slot 0x5
2,980,959 UART: [art] Derive Key Pair - Done
2,995,801 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,434 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,199 UART: [art] PUB.X = 156595861E142D832DCD8B48FEF9CA9BBFBFF8730A23199BA2703B0F522BA73068BC4EEA8790606F01B8C372DBA67875
3,018,968 UART: [art] PUB.Y = C5F25F6C1C3A1A9C2F9DCD246D829FE05E203A0427D8DD04BF1414BA536551C2F7D2F817AE167A0654DAECA5CD0A7722
3,025,922 UART: [art] SIG.R = 70491FFCD17203F5C240C967131C71C154A9817709C69C60DDE83197E8B60F81DB92C994D6D5D4FDC1F0FB17F4E837F6
3,032,687 UART: [art] SIG.S = A4F7BE4766D099407B40DB41177785432061FFBB7209A08F3DC0296CC1EAFB3B495B7C1DC81C588A8457C06D9DCD88F5
3,056,498 UART: Caliptra RT
3,056,841 UART: [state] CFI Enabled
3,177,410 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,068 UART: [rt]cmd =0x46504c54, len=4
3,209,134 >>> mbox cmd response data (8 bytes)
3,209,135 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,238,628 UART: [rt]cmd =0x46504c67, len=4
3,239,428 >>> mbox cmd response: failed
3,239,556 UART: [rt] FIPS self test
3,239,887 UART: [kat] ++
3,240,039 UART: [kat] sha1
3,244,168 UART: [kat] SHA2-256
3,246,098 UART: [kat] SHA2-384
3,248,775 UART: [kat] SHA2-512-ACC
3,250,670 UART: [kat] ECC-384
3,260,447 UART: [kat] HMAC-384Kdf
3,265,258 UART: [kat] LMS
3,525,018 UART: [kat] --
5,699,733 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,709,181 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,738,437 UART: [rt]cmd =0x46504c67, len=4
5,739,668 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,038 UART: [state] LifecycleState = Unprovisioned
85,693 UART: [state] DebugLocked = No
86,373 UART: [state] WD Timer not started. Device not locked for debugging
87,536 UART: [kat] SHA2-256
893,186 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,311 UART: [kat] ++
897,463 UART: [kat] sha1
901,745 UART: [kat] SHA2-256
903,685 UART: [kat] SHA2-384
906,322 UART: [kat] SHA2-512-ACC
908,223 UART: [kat] ECC-384
917,618 UART: [kat] HMAC-384Kdf
922,170 UART: [kat] LMS
1,170,498 UART: [kat] --
1,171,157 UART: [cold-reset] ++
1,171,671 UART: [fht] FHT @ 0x50003400
1,174,524 UART: [idev] ++
1,174,692 UART: [idev] CDI.KEYID = 6
1,175,052 UART: [idev] SUBJECT.KEYID = 7
1,175,476 UART: [idev] UDS.KEYID = 0
1,175,821 ready_for_fw is high
1,175,821 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,183,624 UART: [idev] Erasing UDS.KEYID = 0
1,200,573 UART: [idev] Sha1 KeyId Algorithm
1,209,101 UART: [idev] --
1,210,117 UART: [ldev] ++
1,210,285 UART: [ldev] CDI.KEYID = 6
1,210,648 UART: [ldev] SUBJECT.KEYID = 5
1,211,074 UART: [ldev] AUTHORITY.KEYID = 7
1,211,537 UART: [ldev] FE.KEYID = 1
1,216,669 UART: [ldev] Erasing FE.KEYID = 1
1,243,142 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,557 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,273 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,876 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,021 UART: [ldev] --
1,282,534 UART: [fwproc] Wait for Commands...
1,283,274 UART: [fwproc] Recv command 0x46574c44
1,284,002 UART: [fwproc] Recv'd Img size: 118548 bytes
2,627,807 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,654,788 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,685,958 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,333 >>> mbox cmd response: success
2,826,333 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,827,585 UART: [afmc] ++
2,827,753 UART: [afmc] CDI.KEYID = 6
2,828,115 UART: [afmc] SUBJECT.KEYID = 7
2,828,540 UART: [afmc] AUTHORITY.KEYID = 5
2,863,141 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,879,116 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,864 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,885,573 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,891,456 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,897,157 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,905,163 UART: [afmc] --
2,906,257 UART: [cold-reset] --
2,907,153 UART: [state] Locking Datavault
2,908,186 UART: [state] Locking PCR0, PCR1 and PCR31
2,908,790 UART: [state] Locking ICCM
2,909,394 UART: [exit] Launching FMC @ 0x40000130
2,914,724 UART:
2,914,740 UART: Running Caliptra FMC ...
2,915,148 UART:
2,915,202 UART: [state] CFI Enabled
2,925,424 UART: [fht] FMC Alias Private Key: 7
3,044,258 UART: [art] Extend RT PCRs Done
3,044,686 UART: [art] Lock RT PCRs Done
3,046,364 UART: [art] Populate DV Done
3,054,547 UART: [fht] FMC Alias Private Key: 7
3,055,563 UART: [art] Derive CDI
3,055,843 UART: [art] Store in slot 0x4
3,141,384 UART: [art] Derive Key Pair
3,141,744 UART: [art] Store priv key in slot 0x5
3,154,306 UART: [art] Derive Key Pair - Done
3,169,181 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,184,666 UART: [art] Erasing AUTHORITY.KEYID = 7
3,185,431 UART: [art] PUB.X = E1BAD8EE752239E8435A0B7F4B4D5279E1585506255CD138E0C9524FEF46CC13330255ABAD8809E47C41F454405FE4E7
3,192,191 UART: [art] PUB.Y = 3CFB097565B91CC6632F8092543969AC3B00778FA92FC2196565DF148CDF7AA312441F2627EBB44B3EEB55A9545D4CB0
3,199,120 UART: [art] SIG.R = CEF62FA0AFFA8FD742076C20A2E5F41F3934197888133B7A7C7FAEDC18E61B2089175759E40299C14F72EED11CB22DDD
3,205,896 UART: [art] SIG.S = F2C64559300665B5EEFAC3B650696C98B53FB427234ECB71E9B9FF5980E21F6A8183FE77441BA9089ACF528148332E57
3,229,752 UART: Caliptra RT
3,230,003 UART: [state] CFI Enabled
3,349,805 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,380,405 UART: [rt]cmd =0x46504c54, len=4
3,381,577 >>> mbox cmd response data (8 bytes)
3,381,578 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,411,357 UART: [rt]cmd =0x46504c67, len=4
3,412,469 >>> mbox cmd response: failed
3,412,621 UART: [rt] FIPS self test
3,412,952 UART: [kat] ++
3,413,104 UART: [kat] sha1
3,417,341 UART: [kat] SHA2-256
3,419,271 UART: [kat] SHA2-384
3,422,126 UART: [kat] SHA2-512-ACC
3,424,021 UART: [kat] ECC-384
3,433,576 UART: [kat] HMAC-384Kdf
3,438,241 UART: [kat] LMS
3,698,001 UART: [kat] --
5,978,328 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,982,212 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,011,294 UART: [rt]cmd =0x46504c67, len=4
6,012,469 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.74s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,461 ready_for_fw is high
1,060,461 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,677,486 >>> mbox cmd response: success
2,677,486 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,738,377 UART:
2,738,393 UART: Running Caliptra FMC ...
2,738,801 UART:
2,738,855 UART: [state] CFI Enabled
2,748,991 UART: [fht] FMC Alias Private Key: 7
2,868,013 UART: [art] Extend RT PCRs Done
2,868,441 UART: [art] Lock RT PCRs Done
2,870,265 UART: [art] Populate DV Done
2,878,600 UART: [fht] FMC Alias Private Key: 7
2,879,546 UART: [art] Derive CDI
2,879,826 UART: [art] Store in slot 0x4
2,965,249 UART: [art] Derive Key Pair
2,965,609 UART: [art] Store priv key in slot 0x5
2,978,493 UART: [art] Derive Key Pair - Done
2,993,444 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,008,977 UART: [art] Erasing AUTHORITY.KEYID = 7
3,009,742 UART: [art] PUB.X = B0C5BC0D8C1ABB65C2B49F346481710926EF92E70316C288B8F4474173F461F115929D1FB96907BCACDDDCE57DC2D717
3,016,508 UART: [art] PUB.Y = 4E7BEB2F70073FB31070E215CE05A74C53C0C2943705A01E94D71697E38194731E16F4C07388F7AF73B20CDC1C28128C
3,023,444 UART: [art] SIG.R = E03103285FEBCF3D5EAFCA276A94A47DFA7656CA514907B53591B6B25440F02AC3444AB957503E4D2C8C1DA9253466D3
3,030,214 UART: [art] SIG.S = 172C73FA5CEAF39930564EB065D474DA5C8C47A8FDD0928944B85B34CA3E64923D423810DC91F57DDB0097FA9CA34D0C
3,053,933 UART: Caliptra RT
3,054,184 UART: [state] CFI Enabled
3,173,533 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,204,023 UART: [rt]cmd =0x46504c54, len=4
3,204,959 >>> mbox cmd response data (8 bytes)
3,204,960 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,234,523 UART: [rt]cmd =0x46504c67, len=4
3,235,629 >>> mbox cmd response: failed
3,235,915 UART: [rt] FIPS self test
3,236,246 UART: [kat] ++
3,236,398 UART: [kat] sha1
3,240,607 UART: [kat] SHA2-256
3,242,537 UART: [kat] SHA2-384
3,245,442 UART: [kat] SHA2-512-ACC
3,247,337 UART: [kat] ECC-384
3,256,906 UART: [kat] HMAC-384Kdf
3,261,549 UART: [kat] LMS
3,521,309 UART: [kat] --
5,696,774 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,705,382 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,734,722 UART: [rt]cmd =0x46504c67, len=4
5,735,917 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.70s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,959 UART: [state] LifecycleState = Unprovisioned
86,614 UART: [state] DebugLocked = No
87,222 UART: [state] WD Timer not started. Device not locked for debugging
88,363 UART: [kat] SHA2-256
894,013 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
898,138 UART: [kat] ++
898,290 UART: [kat] sha1
902,692 UART: [kat] SHA2-256
904,632 UART: [kat] SHA2-384
907,415 UART: [kat] SHA2-512-ACC
909,316 UART: [kat] ECC-384
919,209 UART: [kat] HMAC-384Kdf
923,933 UART: [kat] LMS
1,172,261 UART: [kat] --
1,173,342 UART: [cold-reset] ++
1,173,806 UART: [fht] FHT @ 0x50003400
1,176,463 UART: [idev] ++
1,176,631 UART: [idev] CDI.KEYID = 6
1,176,991 UART: [idev] SUBJECT.KEYID = 7
1,177,415 UART: [idev] UDS.KEYID = 0
1,177,760 ready_for_fw is high
1,177,760 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,185,729 UART: [idev] Erasing UDS.KEYID = 0
1,202,634 UART: [idev] Sha1 KeyId Algorithm
1,210,996 UART: [idev] --
1,212,082 UART: [ldev] ++
1,212,250 UART: [ldev] CDI.KEYID = 6
1,212,613 UART: [ldev] SUBJECT.KEYID = 5
1,213,039 UART: [ldev] AUTHORITY.KEYID = 7
1,213,502 UART: [ldev] FE.KEYID = 1
1,218,552 UART: [ldev] Erasing FE.KEYID = 1
1,244,619 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,098 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,814 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,705 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,417 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,422 UART: [ldev] --
1,283,683 UART: [fwproc] Wait for Commands...
1,284,357 UART: [fwproc] Recv command 0x46574c44
1,285,085 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,888 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,657,667 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,688,837 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,829,236 >>> mbox cmd response: success
2,829,236 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,830,432 UART: [afmc] ++
2,830,600 UART: [afmc] CDI.KEYID = 6
2,830,962 UART: [afmc] SUBJECT.KEYID = 7
2,831,387 UART: [afmc] AUTHORITY.KEYID = 5
2,867,254 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,883,845 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,884,593 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,302 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,185 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,901,886 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,909,846 UART: [afmc] --
2,910,766 UART: [cold-reset] --
2,911,560 UART: [state] Locking Datavault
2,912,597 UART: [state] Locking PCR0, PCR1 and PCR31
2,913,201 UART: [state] Locking ICCM
2,913,655 UART: [exit] Launching FMC @ 0x40000130
2,918,985 UART:
2,919,001 UART: Running Caliptra FMC ...
2,919,409 UART:
2,919,552 UART: [state] CFI Enabled
2,929,846 UART: [fht] FMC Alias Private Key: 7
3,049,492 UART: [art] Extend RT PCRs Done
3,049,920 UART: [art] Lock RT PCRs Done
3,051,632 UART: [art] Populate DV Done
3,060,175 UART: [fht] FMC Alias Private Key: 7
3,061,351 UART: [art] Derive CDI
3,061,631 UART: [art] Store in slot 0x4
3,147,294 UART: [art] Derive Key Pair
3,147,654 UART: [art] Store priv key in slot 0x5
3,161,170 UART: [art] Derive Key Pair - Done
3,175,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,191,465 UART: [art] Erasing AUTHORITY.KEYID = 7
3,192,230 UART: [art] PUB.X = CE4849F4B63C26D4EA456E7C9AECED8133166ACFE8E1849A910EB4A9107C719254F8DCA1BAD6CC1FEAFCA64331CB8120
3,199,019 UART: [art] PUB.Y = 5FDB08EE635DEC472BDACBC76631360BDA8FB3B1A00298FBC6335057BF8C8E2382F248AAEFDABBB8EC6E41B346D55A38
3,205,986 UART: [art] SIG.R = 16ACDFCDE669296A0E648748A552A0076FC5B850E86D97DD1DEC61F2A215665F06E7FFF7385C5CE4F860F4764C02C4AE
3,212,756 UART: [art] SIG.S = 42801C2877274DBBB94A1C5914F6E1D87013982C4AF29561974B46E1408D4C46CCCA98BEB7AC8D7F003E02E53507A6AD
3,236,528 UART: Caliptra RT
3,236,871 UART: [state] CFI Enabled
3,356,091 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,695 UART: [rt]cmd =0x46504c54, len=4
3,387,845 >>> mbox cmd response data (8 bytes)
3,387,846 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,417,549 UART: [rt]cmd =0x46504c67, len=4
3,418,541 >>> mbox cmd response: failed
3,418,821 UART: [rt] FIPS self test
3,419,152 UART: [kat] ++
3,419,304 UART: [kat] sha1
3,423,563 UART: [kat] SHA2-256
3,425,493 UART: [kat] SHA2-384
3,428,390 UART: [kat] SHA2-512-ACC
3,430,285 UART: [kat] ECC-384
3,439,940 UART: [kat] HMAC-384Kdf
3,444,411 UART: [kat] LMS
3,704,171 UART: [kat] --
5,984,348 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,988,284 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
6,017,460 UART: [rt]cmd =0x46504c67, len=4
6,018,729 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.76s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,061,042 ready_for_fw is high
1,061,042 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,817 >>> mbox cmd response: success
2,679,817 <<< Executing mbox cmd 0x46504c54 (4 bytes) from SoC
2,742,572 UART:
2,742,588 UART: Running Caliptra FMC ...
2,742,996 UART:
2,743,139 UART: [state] CFI Enabled
2,753,863 UART: [fht] FMC Alias Private Key: 7
2,872,609 UART: [art] Extend RT PCRs Done
2,873,037 UART: [art] Lock RT PCRs Done
2,874,745 UART: [art] Populate DV Done
2,882,958 UART: [fht] FMC Alias Private Key: 7
2,884,126 UART: [art] Derive CDI
2,884,406 UART: [art] Store in slot 0x4
2,970,387 UART: [art] Derive Key Pair
2,970,747 UART: [art] Store priv key in slot 0x5
2,984,073 UART: [art] Derive Key Pair - Done
2,999,033 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,090 UART: [art] Erasing AUTHORITY.KEYID = 7
3,014,855 UART: [art] PUB.X = B40FC7BABAA1526947B5C4D3BD17853D48EEEA65AB23726F060285D7C5D2AE3C800A12C5E5FFEBB2D668EEDD9A5FE35B
3,021,639 UART: [art] PUB.Y = A05038D4B7E891D0F03BFB813CB44158D2D1F1FB86D52ADF71247B5455D0DF62F7C7BDCF943989C3974B4D9E9C0DB3F1
3,028,600 UART: [art] SIG.R = 2D5F5938244AE9C3EF29C3ACC0E43E6297034BEB820357F3B6BF4300C2BE4436EC8DDAC738B38366EB1811BA9BD799D7
3,035,354 UART: [art] SIG.S = 3D7D07B1E1E6FCCD269E2C950D403C9DA3202242B43E0069E43404E9011295C993CD77548B2C9CCB89F438654737371D
3,059,232 UART: Caliptra RT
3,059,575 UART: [state] CFI Enabled
3,179,317 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,209,783 UART: [rt]cmd =0x46504c54, len=4
3,210,719 >>> mbox cmd response data (8 bytes)
3,210,720 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
3,240,151 UART: [rt]cmd =0x46504c67, len=4
3,241,187 >>> mbox cmd response: failed
3,241,407 UART: [rt] FIPS self test
3,241,738 UART: [kat] ++
3,241,890 UART: [kat] sha1
3,245,905 UART: [kat] SHA2-256
3,247,835 UART: [kat] SHA2-384
3,250,530 UART: [kat] SHA2-512-ACC
3,252,425 UART: [kat] ECC-384
3,262,292 UART: [kat] HMAC-384Kdf
3,267,029 UART: [kat] LMS
3,526,789 UART: [kat] --
5,701,628 UART: [rt] Verify complete
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,710,940 <<< Executing mbox cmd 0x46504c67 (4 bytes) from SoC
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
5,740,386 UART: [rt]cmd =0x46504c67, len=4
5,741,769 >>> mbox cmd response data (8 bytes)
test services::fips_self_test_rt ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.69s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,929 writing to cptra_bootfsm_go
192,181 UART:
192,537 UART: Running Caliptra ROM ...
193,712 UART:
193,867 UART: [state] CFI Enabled
263,333 UART: [state] LifecycleState = Unprovisioned
265,270 UART: [state] DebugLocked = No
266,595 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
271,929 UART: [kat] SHA2-256
441,643 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
452,189 UART: [kat] ++
452,683 UART: [kat] sha1
463,560 UART: [kat] SHA2-256
466,243 UART: [kat] SHA2-384
471,627 UART: [kat] SHA2-512-ACC
473,967 UART: [kat] ECC-384
2,766,985 UART: [kat] HMAC-384Kdf
2,799,971 UART: [kat] LMS
3,990,291 UART: [kat] --
3,994,657 UART: [cold-reset] ++
3,996,485 UART: [fht] Storing FHT @ 0x50003400
4,006,960 UART: [idev] ++
4,007,535 UART: [idev] CDI.KEYID = 6
4,008,512 UART: [idev] SUBJECT.KEYID = 7
4,009,737 UART: [idev] UDS.KEYID = 0
4,010,923 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,033,950 UART: [idev] Erasing UDS.KEYID = 0
7,346,175 UART: [idev] Using Sha1 for KeyId Algorithm
7,367,399 UART: [idev] --
7,371,992 UART: [ldev] ++
7,372,564 UART: [ldev] CDI.KEYID = 6
7,373,697 UART: [ldev] SUBJECT.KEYID = 5
7,374,806 UART: [ldev] AUTHORITY.KEYID = 7
7,375,982 UART: [ldev] FE.KEYID = 1
7,422,804 UART: [ldev] Erasing FE.KEYID = 1
10,757,256 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,071,676 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,086,265 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,101,116 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,115,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,134,884 UART: [ldev] --
13,139,072 UART: [fwproc] Waiting for Commands...
13,141,791 UART: [fwproc] Received command 0x46505652
13,144,195 UART: [rt] FIPS Version
13,145,829 >>> mbox cmd response data (36 bytes)
15,368,895 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,519,303 UART: [fwproc] Received command 0x46574c44
15,521,628 UART: [fwproc] Received Image of size 118548 bytes
19,619,318 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,694,793 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,768,006 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,096,076 >>> mbox cmd response: success
20,096,448 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,100,366 UART: [afmc] ++
20,100,969 UART: [afmc] CDI.KEYID = 6
20,101,887 UART: [afmc] SUBJECT.KEYID = 7
20,103,160 UART: [afmc] AUTHORITY.KEYID = 5
23,465,338 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,765,825 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,768,089 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,782,565 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,797,291 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,811,719 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,834,058 UART: [afmc] --
25,838,738 UART: [cold-reset] --
25,842,708 UART: [state] Locking Datavault
25,849,847 UART: [state] Locking PCR0, PCR1 and PCR31
25,851,611 UART: [state] Locking ICCM
25,854,006 UART: [exit] Launching FMC @ 0x40000130
25,862,405 UART:
25,862,664 UART: Running Caliptra FMC ...
25,864,285 UART:
25,864,451 UART: [state] CFI Enabled
25,925,509 UART: [fht] FMC Alias Private Key: 7
28,266,078 UART: [art] Extend RT PCRs Done
28,267,301 UART: [art] Lock RT PCRs Done
28,269,011 UART: [art] Populate DV Done
28,274,376 UART: [fht] FMC Alias Private Key: 7
28,276,076 UART: [art] Derive CDI
28,276,817 UART: [art] Store in slot 0x4
28,334,154 UART: [art] Derive Key Pair
28,335,154 UART: [art] Store priv key in slot 0x5
31,627,736 UART: [art] Derive Key Pair - Done
31,640,579 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,929,061 UART: [art] Erasing AUTHORITY.KEYID = 7
33,930,571 UART: [art] PUB.X = 2472400F3D382D20234BE5FBF39632B4A08B813FE03E3B5CDDBAF453971F166ECED5F51AC0FC1F9FB6AE3B4E2EA39331
33,937,889 UART: [art] PUB.Y = 39422A71868810BDEEC90FE3ADDA2DF5A2070EE9B8795721B0CD99727CEB0D57DE3A84B8282232FD058F34DF473459EA
33,945,093 UART: [art] SIG.R = 5AA0ABCA58E6CE6B9AA748E76B9C1FF12A0DA0CD47C54542D9EB1FC11C63854E5354E7ABEAB48BBAEC9E96A5E4A66384
33,952,554 UART: [art] SIG.S = 5199FCFD8BE6E430454870DDEDD054C7AB3AF7E2F720FE1687D8263E0DA96E6264E1EDD62423C708215B151A219F5532
35,257,087 UART: Caliptra RT
35,257,805 UART: [state] CFI Enabled
35,437,423 UART: [rt] RT listening for mailbox commands...
35,468,679 UART: [rt]cmd =0x46505652, len=4
35,469,960 UART: [rt] FIPS Version
35,471,121 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,882 writing to cptra_bootfsm_go
3,806,490 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
12,845,814 >>> mbox cmd response data (36 bytes)
15,069,012 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,336,080 >>> mbox cmd response: success
20,336,628 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,017,488 UART:
26,017,876 UART: Running Caliptra FMC ...
26,019,000 UART:
26,019,165 UART: [state] CFI Enabled
26,088,474 UART: [fht] FMC Alias Private Key: 7
28,428,954 UART: [art] Extend RT PCRs Done
28,430,180 UART: [art] Lock RT PCRs Done
28,432,130 UART: [art] Populate DV Done
28,437,481 UART: [fht] FMC Alias Private Key: 7
28,438,970 UART: [art] Derive CDI
28,439,752 UART: [art] Store in slot 0x4
28,496,453 UART: [art] Derive Key Pair
28,497,456 UART: [art] Store priv key in slot 0x5
31,790,467 UART: [art] Derive Key Pair - Done
31,803,524 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,091,629 UART: [art] Erasing AUTHORITY.KEYID = 7
34,093,151 UART: [art] PUB.X = 59BA96261A35AC7283288D2C5D5D1E665387DB6B33F655EFE4F23AD653B851CBED6FDCB3CB5AE6D197B6F0BDE95C6BFA
34,100,405 UART: [art] PUB.Y = 38C99D484277BB82A94D8739F3E3B7DCEC8307FD42DF8893B0108EDC6F1FF9B953115D2D254A85B22DECF268B853E741
34,107,654 UART: [art] SIG.R = 7980BFB357D93BEEC24930CD51C90CBCD3226CD925ADA01C530A7A7A2F8E830D4FA348790D7B6F669633D0B4E1B56B36
34,115,093 UART: [art] SIG.S = 532DABBEEA103E094883FE2ED9266962AA4652FB3CB0576985C0C7EF5CF2641CE5F04DE9492989BDF4FE5520A16CCC33
35,420,013 UART: Caliptra RT
35,420,736 UART: [state] CFI Enabled
35,617,101 UART: [rt] RT listening for mailbox commands...
35,648,672 UART: [rt]cmd =0x46505652, len=4
35,649,950 UART: [rt] FIPS Version
35,650,959 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.79s
running 1 test
0 new_unbooted
38 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,186 writing to cptra_bootfsm_go
192,519 UART:
192,889 UART: Running Caliptra ROM ...
194,005 UART:
603,845 UART: [state] CFI Enabled
618,957 UART: [state] LifecycleState = Unprovisioned
620,883 UART: [state] DebugLocked = No
623,184 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,708 UART: [kat] SHA2-256
797,425 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,986 UART: [kat] ++
808,441 UART: [kat] sha1
818,943 UART: [kat] SHA2-256
821,636 UART: [kat] SHA2-384
826,814 UART: [kat] SHA2-512-ACC
829,200 UART: [kat] ECC-384
3,112,764 UART: [kat] HMAC-384Kdf
3,124,191 UART: [kat] LMS
4,314,274 UART: [kat] --
4,318,177 UART: [cold-reset] ++
4,319,412 UART: [fht] Storing FHT @ 0x50003400
4,331,558 UART: [idev] ++
4,332,131 UART: [idev] CDI.KEYID = 6
4,333,022 UART: [idev] SUBJECT.KEYID = 7
4,334,298 UART: [idev] UDS.KEYID = 0
4,335,404 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
4,346,958 UART: [idev] Erasing UDS.KEYID = 0
7,615,770 UART: [idev] Using Sha1 for KeyId Algorithm
7,637,542 UART: [idev] --
7,640,273 UART: [ldev] ++
7,640,853 UART: [ldev] CDI.KEYID = 6
7,641,830 UART: [ldev] SUBJECT.KEYID = 5
7,643,053 UART: [ldev] AUTHORITY.KEYID = 7
7,644,298 UART: [ldev] FE.KEYID = 1
7,655,441 UART: [ldev] Erasing FE.KEYID = 1
10,946,919 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,241,783 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,256,391 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,271,192 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,285,699 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,305,512 UART: [ldev] --
13,309,596 UART: [fwproc] Waiting for Commands...
13,312,350 UART: [fwproc] Received command 0x46505652
13,314,719 UART: [rt] FIPS Version
13,316,399 >>> mbox cmd response data (36 bytes)
15,541,311 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
15,692,205 UART: [fwproc] Received command 0x46574c44
15,694,527 UART: [fwproc] Received Image of size 118548 bytes
19,795,106 UART: [fwproc] Image verified using Vendor ECC Key Index 0
19,868,308 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
19,941,503 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
20,269,184 >>> mbox cmd response: success
20,269,556 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,273,149 UART: [afmc] ++
20,273,752 UART: [afmc] CDI.KEYID = 6
20,274,674 UART: [afmc] SUBJECT.KEYID = 7
20,275,895 UART: [afmc] AUTHORITY.KEYID = 5
23,593,649 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
25,889,810 UART: [afmc] Erasing AUTHORITY.KEYID = 5
25,892,061 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
25,906,489 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
25,921,213 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
25,935,638 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
25,957,057 UART: [afmc] --
25,961,480 UART: [cold-reset] --
25,966,593 UART: [state] Locking Datavault
25,973,196 UART: [state] Locking PCR0, PCR1 and PCR31
25,974,900 UART: [state] Locking ICCM
25,977,111 UART: [exit] Launching FMC @ 0x40000130
25,985,509 UART:
25,985,781 UART: Running Caliptra FMC ...
25,986,896 UART:
25,987,060 UART: [state] CFI Enabled
25,994,899 UART: [fht] FMC Alias Private Key: 7
28,334,752 UART: [art] Extend RT PCRs Done
28,336,059 UART: [art] Lock RT PCRs Done
28,337,506 UART: [art] Populate DV Done
28,342,709 UART: [fht] FMC Alias Private Key: 7
28,344,416 UART: [art] Derive CDI
28,345,234 UART: [art] Store in slot 0x4
28,387,934 UART: [art] Derive Key Pair
28,388,989 UART: [art] Store priv key in slot 0x5
31,630,849 UART: [art] Derive Key Pair - Done
31,643,919 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
33,924,270 UART: [art] Erasing AUTHORITY.KEYID = 7
33,925,776 UART: [art] PUB.X = 3C941E056178A9470D6EF5062599813F85D57C0C34D70A213797FE0E396CE796D4BED490CB82442E860B691FA563C399
33,933,048 UART: [art] PUB.Y = 4B87384991FDA176C3A9AB446A999DE48296BC525D038765C4BFF94FF9D79277188CDA31BFCBCE167494189591FF1F2B
33,940,285 UART: [art] SIG.R = A4172D0649C4AAA6FBD0B1896078C8B95C7DBEC62190E1ABEEAD0997139BD359640C10C1990798EFEAC63BC9FE8BD01B
33,947,708 UART: [art] SIG.S = 50924BC008D89231808A5393029565E12D52D226021EEBCC8080459BBEC21AE6AD127773BEC385D45712436A581E8552
35,252,904 UART: Caliptra RT
35,253,620 UART: [state] CFI Enabled
35,387,781 UART: [rt] RT listening for mailbox commands...
35,419,215 UART: [rt]cmd =0x46505652, len=4
35,420,476 UART: [rt] FIPS Version
35,421,693 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,227 writing to cptra_bootfsm_go
4,135,087 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
13,049,485 >>> mbox cmd response data (36 bytes)
15,272,156 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
20,545,740 >>> mbox cmd response: success
20,546,276 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
26,186,675 UART:
26,187,075 UART: Running Caliptra FMC ...
26,188,378 UART:
26,188,552 UART: [state] CFI Enabled
26,196,185 UART: [fht] FMC Alias Private Key: 7
28,536,362 UART: [art] Extend RT PCRs Done
28,537,595 UART: [art] Lock RT PCRs Done
28,539,172 UART: [art] Populate DV Done
28,544,695 UART: [fht] FMC Alias Private Key: 7
28,546,251 UART: [art] Derive CDI
28,547,075 UART: [art] Store in slot 0x4
28,589,634 UART: [art] Derive Key Pair
28,590,685 UART: [art] Store priv key in slot 0x5
31,833,023 UART: [art] Derive Key Pair - Done
31,846,084 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
34,125,946 UART: [art] Erasing AUTHORITY.KEYID = 7
34,127,469 UART: [art] PUB.X = 82737E437D0237E34D77250929FBDDB730FF45264E73D52FF6F5DFBBB05FCD5AE072965B982D1BF3630661009EDBE15F
34,134,726 UART: [art] PUB.Y = 253EEFB56173F96FB9D5A07C6802B17C1F4E871E962DD0ED6776A88F99A72BCDDE6079C074043AC6ED7507A620703956
34,141,987 UART: [art] SIG.R = 4CAC7A70C627062FDDCBB4EFF137F88BB4453B7A0B02510915309E7E39B10B34A85244866AC2E44DC92838EB46748BAB
34,149,350 UART: [art] SIG.S = AAD1331E0B0C3B5214F13F338D50B3AAD89B9FA2DA15D57A30F293CAAF39CB88F7CD4E3DAB0E9FD0987DDF2B015091F0
35,455,113 UART: Caliptra RT
35,455,830 UART: [state] CFI Enabled
35,588,378 UART: [rt] RT listening for mailbox commands...
35,619,913 UART: [rt]cmd =0x46505652, len=4
35,621,200 UART: [rt] FIPS Version
35,622,264 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,993 writing to cptra_bootfsm_go
192,325 UART:
192,702 UART: Running Caliptra ROM ...
193,833 UART:
193,985 UART: [state] CFI Enabled
263,773 UART: [state] LifecycleState = Unprovisioned
265,738 UART: [state] DebugLocked = No
268,102 UART: [state] WD Timer not started. Device not locked for debugging
271,650 UART: [kat] SHA2-256
451,342 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
462,117 UART: [kat] ++
462,664 UART: [kat] sha1
473,066 UART: [kat] SHA2-256
475,762 UART: [kat] SHA2-384
481,365 UART: [kat] SHA2-512-ACC
483,705 UART: [kat] ECC-384
2,949,632 UART: [kat] HMAC-384Kdf
2,969,762 UART: [kat] LMS
3,446,241 UART: [kat] --
3,449,172 UART: [cold-reset] ++
3,451,431 UART: [fht] FHT @ 0x50003400
3,461,650 UART: [idev] ++
3,462,218 UART: [idev] CDI.KEYID = 6
3,463,186 UART: [idev] SUBJECT.KEYID = 7
3,464,400 UART: [idev] UDS.KEYID = 0
3,465,503 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,500,263 UART: [idev] Erasing UDS.KEYID = 0
5,982,025 UART: [idev] Sha1 KeyId Algorithm
6,006,447 UART: [idev] --
6,012,502 UART: [ldev] ++
6,013,078 UART: [ldev] CDI.KEYID = 6
6,013,996 UART: [ldev] SUBJECT.KEYID = 5
6,015,216 UART: [ldev] AUTHORITY.KEYID = 7
6,016,454 UART: [ldev] FE.KEYID = 1
6,056,069 UART: [ldev] Erasing FE.KEYID = 1
8,562,127 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,296,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,312,221 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,328,071 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,343,638 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,365,566 UART: [ldev] --
10,370,555 UART: [fwproc] Wait for Commands...
10,373,207 UART: [fwproc] Recv command 0x46505652
10,375,418 UART: [rt] FIPS Version
10,376,983 >>> mbox cmd response data (36 bytes)
12,602,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,752,784 UART: [fwproc] Recv command 0x46574c44
12,754,901 UART: [fwproc] Recv'd Img size: 118548 bytes
16,230,236 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,315,710 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,388,764 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,717,566 >>> mbox cmd response: success
16,717,930 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,722,277 UART: [afmc] ++
16,722,853 UART: [afmc] CDI.KEYID = 6
16,723,838 UART: [afmc] SUBJECT.KEYID = 7
16,725,055 UART: [afmc] AUTHORITY.KEYID = 5
19,257,225 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
20,980,470 UART: [afmc] Erase AUTHORITY.KEYID = 5
20,982,677 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
20,998,523 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,014,537 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,030,119 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,054,374 UART: [afmc] --
21,057,492 UART: [cold-reset] --
21,061,308 UART: [state] Locking Datavault
21,065,620 UART: [state] Locking PCR0, PCR1 and PCR31
21,067,333 UART: [state] Locking ICCM
21,070,083 UART: [exit] Launching FMC @ 0x40000130
21,078,486 UART:
21,078,738 UART: Running Caliptra FMC ...
21,079,794 UART:
21,079,956 UART: [state] CFI Enabled
21,137,158 UART: [fht] FMC Alias Private Key: 7
22,903,743 UART: [art] Extend RT PCRs Done
22,904,974 UART: [art] Lock RT PCRs Done
22,906,519 UART: [art] Populate DV Done
22,911,833 UART: [fht] FMC Alias Private Key: 7
22,913,425 UART: [art] Derive CDI
22,914,171 UART: [art] Store in slot 0x4
22,970,820 UART: [art] Derive Key Pair
22,971,864 UART: [art] Store priv key in slot 0x5
25,434,757 UART: [art] Derive Key Pair - Done
25,447,433 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,159,928 UART: [art] Erasing AUTHORITY.KEYID = 7
27,161,416 UART: [art] PUB.X = FFE677F2858C511127B0317A867CA5D5BD8C2EB78A366238ACF2C2BD334806D81EFADB4CCAC165AD94742B5FDAD63F20
27,168,763 UART: [art] PUB.Y = 688BC51FD8C70315E3E9950FB698271F5F6C58E9C153F7D2035A77C3635BD79EF439C6BA2090ED140DD58690B4C296DE
27,175,958 UART: [art] SIG.R = 2E3EAE5EFC75470F2F74D0E435443B3D02D74A482A9E6AD74E37664F21165B5170EA6776069FA558AC6B6232DED3EC77
27,183,360 UART: [art] SIG.S = C1E03B4BD9ADA286E104EBD6C2E77FACAFBE5C10DB7820641362D386C6A6D633D9BC3FD1CDA9AADE9A6E90AA1550892C
28,162,600 UART: Caliptra RT
28,163,312 UART: [state] CFI Enabled
28,341,788 UART: [rt] RT listening for mailbox commands...
28,373,359 UART: [rt]cmd =0x46505652, len=4
28,374,636 UART: [rt] FIPS Version
28,375,854 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
5,667 writing to cptra_bootfsm_go
3,461,378 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,308,685 >>> mbox cmd response data (36 bytes)
12,532,449 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,641,457 >>> mbox cmd response: success
16,641,999 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
20,920,222 UART:
20,920,617 UART: Running Caliptra FMC ...
20,921,727 UART:
20,921,883 UART: [state] CFI Enabled
20,988,649 UART: [fht] FMC Alias Private Key: 7
22,754,684 UART: [art] Extend RT PCRs Done
22,755,912 UART: [art] Lock RT PCRs Done
22,757,571 UART: [art] Populate DV Done
22,762,886 UART: [fht] FMC Alias Private Key: 7
22,764,489 UART: [art] Derive CDI
22,765,314 UART: [art] Store in slot 0x4
22,820,985 UART: [art] Derive Key Pair
22,822,051 UART: [art] Store priv key in slot 0x5
25,284,871 UART: [art] Derive Key Pair - Done
25,298,158 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,011,593 UART: [art] Erasing AUTHORITY.KEYID = 7
27,013,104 UART: [art] PUB.X = 9415AD32B7939642476A42D1145ED750953E3FD33AC005DCE7C751967D0B1D8B611C4000779DDB58B406DC0F81EA17FF
27,020,368 UART: [art] PUB.Y = E85F6C0E764C1290ED21B2F870B8BBBB9744B6B2066D160D3FD7F9D26D120566C20C7FFBCBFB331B97382B9B7A6D54F4
27,027,643 UART: [art] SIG.R = 75B2652285A3BF2C1F5E28FDB4E541889CC78243988FBC7B206BFBA7E465C8E0DF44A5D88294BFA1AEE325B5DC8168C5
27,035,054 UART: [art] SIG.S = C3D81C41A668CDCC082521C0E5C12EE4998931042005A7242A4383C639CC537D365DF89D5C5B4B025F9499612E27C52D
28,014,290 UART: Caliptra RT
28,015,007 UART: [state] CFI Enabled
28,194,620 UART: [rt] RT listening for mailbox commands...
28,225,927 UART: [rt]cmd =0x46505652, len=4
28,227,179 UART: [rt] FIPS Version
28,228,288 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,236 writing to cptra_bootfsm_go
192,598 UART:
193,017 UART: Running Caliptra ROM ...
194,130 UART:
603,747 UART: [state] CFI Enabled
614,943 UART: [state] LifecycleState = Unprovisioned
616,872 UART: [state] DebugLocked = No
618,413 UART: [state] WD Timer not started. Device not locked for debugging
622,558 UART: [kat] SHA2-256
802,228 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
812,993 UART: [kat] ++
813,474 UART: [kat] sha1
824,515 UART: [kat] SHA2-256
827,205 UART: [kat] SHA2-384
832,659 UART: [kat] SHA2-512-ACC
834,991 UART: [kat] ECC-384
3,279,655 UART: [kat] HMAC-384Kdf
3,292,518 UART: [kat] LMS
3,769,067 UART: [kat] --
3,773,820 UART: [cold-reset] ++
3,775,548 UART: [fht] FHT @ 0x50003400
3,785,671 UART: [idev] ++
3,786,241 UART: [idev] CDI.KEYID = 6
3,787,261 UART: [idev] SUBJECT.KEYID = 7
3,788,478 UART: [idev] UDS.KEYID = 0
3,789,605 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,805,735 UART: [idev] Erasing UDS.KEYID = 0
6,267,172 UART: [idev] Sha1 KeyId Algorithm
6,290,323 UART: [idev] --
6,295,808 UART: [ldev] ++
6,296,388 UART: [ldev] CDI.KEYID = 6
6,297,278 UART: [ldev] SUBJECT.KEYID = 5
6,298,495 UART: [ldev] AUTHORITY.KEYID = 7
6,299,790 UART: [ldev] FE.KEYID = 1
6,310,001 UART: [ldev] Erasing FE.KEYID = 1
8,785,215 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,504,323 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,520,155 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,536,024 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,551,623 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,573,575 UART: [ldev] --
10,579,336 UART: [fwproc] Wait for Commands...
10,581,384 UART: [fwproc] Recv command 0x46505652
10,583,644 UART: [rt] FIPS Version
10,585,157 >>> mbox cmd response data (36 bytes)
12,817,861 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,969,042 UART: [fwproc] Recv command 0x46574c44
12,971,127 UART: [fwproc] Recv'd Img size: 118548 bytes
16,458,480 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,536,662 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,609,690 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
16,937,743 >>> mbox cmd response: success
16,938,111 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
16,942,462 UART: [afmc] ++
16,943,044 UART: [afmc] CDI.KEYID = 6
16,943,993 UART: [afmc] SUBJECT.KEYID = 7
16,945,210 UART: [afmc] AUTHORITY.KEYID = 5
19,448,618 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,172,197 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,174,370 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,190,180 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,206,259 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,221,846 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,246,519 UART: [afmc] --
21,250,410 UART: [cold-reset] --
21,255,217 UART: [state] Locking Datavault
21,260,148 UART: [state] Locking PCR0, PCR1 and PCR31
21,261,903 UART: [state] Locking ICCM
21,263,705 UART: [exit] Launching FMC @ 0x40000130
21,272,100 UART:
21,272,336 UART: Running Caliptra FMC ...
21,273,441 UART:
21,273,601 UART: [state] CFI Enabled
21,281,600 UART: [fht] FMC Alias Private Key: 7
23,047,625 UART: [art] Extend RT PCRs Done
23,048,840 UART: [art] Lock RT PCRs Done
23,050,440 UART: [art] Populate DV Done
23,056,013 UART: [fht] FMC Alias Private Key: 7
23,057,718 UART: [art] Derive CDI
23,058,539 UART: [art] Store in slot 0x4
23,100,790 UART: [art] Derive Key Pair
23,101,840 UART: [art] Store priv key in slot 0x5
25,529,132 UART: [art] Derive Key Pair - Done
25,542,234 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,248,473 UART: [art] Erasing AUTHORITY.KEYID = 7
27,249,966 UART: [art] PUB.X = 766617976BE8473B1D01488CDE0CB72D973BE6C1B6BC9B69E73E9A10616A3D6A51B34F7FF5B86F39A3A408C770A42D12
27,257,262 UART: [art] PUB.Y = A3A51B1A8148483E72AA4E3168C70DE1F4947053A16886BC2197DD4FDCB5AEF4A7CDB19B437C937257AB73D9D4DF7267
27,264,555 UART: [art] SIG.R = E88F6815C1C04DBE6D524A565D0905FEE57529A68B75A8F52B2A3E3B4B2B61699B1E572AA534942B7FFF7F2F76CFA337
27,271,944 UART: [art] SIG.S = 060AF0072027D1E2ABD0E792E8E6F8404A65F9B46B1884FC758BF1D88BEE22037802E9F0919B491D2561D63FDDBD8E45
28,250,946 UART: Caliptra RT
28,251,659 UART: [state] CFI Enabled
28,383,371 UART: [rt] RT listening for mailbox commands...
28,414,629 UART: [rt]cmd =0x46505652, len=4
28,415,886 UART: [rt] FIPS Version
28,417,052 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
6,201 writing to cptra_bootfsm_go
3,782,863 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,497,608 >>> mbox cmd response data (36 bytes)
12,718,930 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
16,825,237 >>> mbox cmd response: success
16,825,710 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,080,175 UART:
21,080,574 UART: Running Caliptra FMC ...
21,081,776 UART:
21,081,947 UART: [state] CFI Enabled
21,089,614 UART: [fht] FMC Alias Private Key: 7
22,855,609 UART: [art] Extend RT PCRs Done
22,856,842 UART: [art] Lock RT PCRs Done
22,858,774 UART: [art] Populate DV Done
22,864,300 UART: [fht] FMC Alias Private Key: 7
22,865,862 UART: [art] Derive CDI
22,866,609 UART: [art] Store in slot 0x4
22,909,367 UART: [art] Derive Key Pair
22,910,375 UART: [art] Store priv key in slot 0x5
25,337,313 UART: [art] Derive Key Pair - Done
25,349,960 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,056,776 UART: [art] Erasing AUTHORITY.KEYID = 7
27,058,290 UART: [art] PUB.X = 7B4CBB53AD6904312B8D4FE7956E8D644CC77EA43A6E2EEE01828012986550C0411967C0E23CEF2908A0BA1A60C4D95B
27,065,560 UART: [art] PUB.Y = 42CA5A2DE4FF7344D9160172B4B46AD39B2F26F053AB9B07F5A468F70D03564DB12BDF9A5623B9CC37A1FFD3576948D0
27,072,868 UART: [art] SIG.R = 48D1347E41747CEB477465B0CBE1704B0E932D2BC5EA548203E0311EA23B020EA5449DDD49755D11EED263AC4F750728
27,080,220 UART: [art] SIG.S = 19B0FA8FC744B7FFD06B65D36D51F12526312AE8934CC4D2786E4DD00B0C1AA8DD9673CFCEFF98D5F4535FED424C7114
28,059,182 UART: Caliptra RT
28,059,898 UART: [state] CFI Enabled
28,193,396 UART: [rt] RT listening for mailbox commands...
28,225,183 UART: [rt]cmd =0x46505652, len=4
28,226,465 UART: [rt] FIPS Version
28,227,523 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,129 writing to cptra_bootfsm_go
192,366 UART:
192,711 UART: Running Caliptra ROM ...
193,860 UART:
194,017 UART: [state] CFI Enabled
263,929 UART: [state] LifecycleState = Unprovisioned
266,353 UART: [state] DebugLocked = No
268,829 UART: [state] WD Timer not started. Device not locked for debugging
273,739 UART: [kat] SHA2-256
463,579 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
474,378 UART: [kat] ++
475,083 UART: [kat] sha1
486,638 UART: [kat] SHA2-256
489,675 UART: [kat] SHA2-384
495,716 UART: [kat] SHA2-512-ACC
498,280 UART: [kat] ECC-384
2,949,138 UART: [kat] HMAC-384Kdf
2,973,592 UART: [kat] LMS
3,505,347 UART: [kat] --
3,510,959 UART: [cold-reset] ++
3,512,574 UART: [fht] FHT @ 0x50003400
3,525,122 UART: [idev] ++
3,525,850 UART: [idev] CDI.KEYID = 6
3,526,774 UART: [idev] SUBJECT.KEYID = 7
3,527,962 UART: [idev] UDS.KEYID = 0
3,529,070 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,545,297 UART: [idev] Erasing UDS.KEYID = 0
6,032,149 UART: [idev] Sha1 KeyId Algorithm
6,055,345 UART: [idev] --
6,059,513 UART: [ldev] ++
6,060,204 UART: [ldev] CDI.KEYID = 6
6,061,122 UART: [ldev] SUBJECT.KEYID = 5
6,062,286 UART: [ldev] AUTHORITY.KEYID = 7
6,063,471 UART: [ldev] FE.KEYID = 1
6,101,037 UART: [ldev] Erasing FE.KEYID = 1
8,609,016 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,340,714 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,355,918 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,371,164 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,386,235 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,406,012 UART: [ldev] --
10,411,837 UART: [fwproc] Wait for Commands...
10,413,999 UART: [fwproc] Recv command 0x46505652
10,416,596 UART: [rt] FIPS Version
10,418,277 >>> mbox cmd response data (36 bytes)
12,644,162 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
12,795,199 UART: [fwproc] Recv command 0x46574c44
12,797,239 UART: [fwproc] Recv'd Img size: 118548 bytes
16,297,094 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,378,534 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,502,175 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,062,789 >>> mbox cmd response: success
17,063,183 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,066,937 UART: [afmc] ++
17,067,633 UART: [afmc] CDI.KEYID = 6
17,068,794 UART: [afmc] SUBJECT.KEYID = 7
17,070,333 UART: [afmc] AUTHORITY.KEYID = 5
19,600,894 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,327,873 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,329,783 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,344,871 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,360,036 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,374,918 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,399,521 UART: [afmc] --
21,402,584 UART: [cold-reset] --
21,406,830 UART: [state] Locking Datavault
21,411,551 UART: [state] Locking PCR0, PCR1 and PCR31
21,413,695 UART: [state] Locking ICCM
21,415,116 UART: [exit] Launching FMC @ 0x40000130
21,423,789 UART:
21,424,029 UART: Running Caliptra FMC ...
21,425,137 UART:
21,425,295 UART: [state] CFI Enabled
21,484,442 UART: [fht] FMC Alias Private Key: 7
23,251,238 UART: [art] Extend RT PCRs Done
23,252,468 UART: [art] Lock RT PCRs Done
23,253,724 UART: [art] Populate DV Done
23,258,982 UART: [fht] FMC Alias Private Key: 7
23,260,632 UART: [art] Derive CDI
23,261,450 UART: [art] Store in slot 0x4
23,318,093 UART: [art] Derive Key Pair
23,319,147 UART: [art] Store priv key in slot 0x5
25,782,373 UART: [art] Derive Key Pair - Done
25,795,076 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,508,072 UART: [art] Erasing AUTHORITY.KEYID = 7
27,509,575 UART: [art] PUB.X = EA8AF9491C7E1120AD377E47B1F6CDA70205623F1B912BF4F76408ACE6A68E765025055FF9BDCE3069EF2BDE28D0D388
27,516,852 UART: [art] PUB.Y = E31A03A7C96756F5ACF3C705B1C93826CB9D9636C439053FB9943730D592EE184DD7B2C020AEDF16FC4E4760825D41F4
27,524,102 UART: [art] SIG.R = 50FD12191387E3A67EBFFCAB520A7782A969E9335CFB6AAAED7B66883F8A28CCCABDB683BEB999C1BBA501CF5BF0D54B
27,531,508 UART: [art] SIG.S = D9E96832B8E111D4F6BACAF865B925A8018FCF2D9B764BBFB23A78C84E3A139A893FA2F618FE5F6FAAA9D2E3B27DCD02
28,510,958 UART: Caliptra RT
28,511,667 UART: [state] CFI Enabled
28,691,271 UART: [rt] RT listening for mailbox commands...
28,722,836 UART: [rt]cmd =0x46505652, len=4
28,724,117 UART: [rt] FIPS Version
28,725,339 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,978 writing to cptra_bootfsm_go
3,439,555 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,246,249 >>> mbox cmd response data (36 bytes)
12,473,432 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,202,563 >>> mbox cmd response: success
17,203,108 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,479,135 UART:
21,479,558 UART: Running Caliptra FMC ...
21,480,675 UART:
21,480,833 UART: [state] CFI Enabled
21,548,800 UART: [fht] FMC Alias Private Key: 7
23,314,884 UART: [art] Extend RT PCRs Done
23,316,106 UART: [art] Lock RT PCRs Done
23,317,440 UART: [art] Populate DV Done
23,322,972 UART: [fht] FMC Alias Private Key: 7
23,324,630 UART: [art] Derive CDI
23,325,456 UART: [art] Store in slot 0x4
23,381,890 UART: [art] Derive Key Pair
23,382,941 UART: [art] Store priv key in slot 0x5
25,846,131 UART: [art] Derive Key Pair - Done
25,859,075 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,572,441 UART: [art] Erasing AUTHORITY.KEYID = 7
27,573,956 UART: [art] PUB.X = 07106182A0157DED0EDA2C2232AB2017C5B0EB08FA7575FD7C592D656A3B19EA0A00D9DB12D6F742C6A551CD6EECEBAC
27,581,208 UART: [art] PUB.Y = 858889137F094367834807B9440E83BEB0378278C6A833D323330E13CEEFEA5314F98E2E91248056F06F806BE0129B99
27,588,421 UART: [art] SIG.R = 33DF1E5DB6F1F232788E764C6E3D45AAFCF3BA9FCADF19D9C693C5CE4FC77CA38276B8BB9F7631D730DE11AE5DCA5DC3
27,595,881 UART: [art] SIG.S = BF100266992F89CA3EE5DE51AA6AC07130D944E05B37DB524E871BE89CCC41576D26F005A8FB6F8DB39FD74B54721B56
28,575,305 UART: Caliptra RT
28,576,021 UART: [state] CFI Enabled
28,755,600 UART: [rt] RT listening for mailbox commands...
28,787,069 UART: [rt]cmd =0x46505652, len=4
28,788,358 UART: [rt] FIPS Version
28,789,424 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,224 writing to cptra_bootfsm_go
192,486 UART:
192,856 UART: Running Caliptra ROM ...
193,959 UART:
603,684 UART: [state] CFI Enabled
618,962 UART: [state] LifecycleState = Unprovisioned
621,321 UART: [state] DebugLocked = No
624,200 UART: [state] WD Timer not started. Device not locked for debugging
629,362 UART: [kat] SHA2-256
819,279 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,042 UART: [kat] ++
830,642 UART: [kat] sha1
842,179 UART: [kat] SHA2-256
845,199 UART: [kat] SHA2-384
851,290 UART: [kat] SHA2-512-ACC
853,852 UART: [kat] ECC-384
3,294,211 UART: [kat] HMAC-384Kdf
3,308,087 UART: [kat] LMS
3,839,906 UART: [kat] --
3,842,995 UART: [cold-reset] ++
3,845,367 UART: [fht] FHT @ 0x50003400
3,857,167 UART: [idev] ++
3,857,854 UART: [idev] CDI.KEYID = 6
3,858,874 UART: [idev] SUBJECT.KEYID = 7
3,859,982 UART: [idev] UDS.KEYID = 0
3,861,084 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,878,380 UART: [idev] Erasing UDS.KEYID = 0
6,339,932 UART: [idev] Sha1 KeyId Algorithm
6,363,511 UART: [idev] --
6,368,701 UART: [ldev] ++
6,369,392 UART: [ldev] CDI.KEYID = 6
6,370,412 UART: [ldev] SUBJECT.KEYID = 5
6,371,523 UART: [ldev] AUTHORITY.KEYID = 7
6,372,703 UART: [ldev] FE.KEYID = 1
6,383,949 UART: [ldev] Erasing FE.KEYID = 1
8,863,100 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,584,358 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,599,552 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,614,746 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,629,884 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,649,431 UART: [ldev] --
10,654,269 UART: [fwproc] Wait for Commands...
10,657,017 UART: [fwproc] Recv command 0x46505652
10,659,617 UART: [rt] FIPS Version
10,661,328 >>> mbox cmd response data (36 bytes)
12,887,968 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
13,039,114 UART: [fwproc] Recv command 0x46574c44
13,041,138 UART: [fwproc] Recv'd Img size: 118548 bytes
16,547,133 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
16,622,234 UART: [fwproc] Load FMC at address 0x40000000 len 20044
16,745,812 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
17,305,633 >>> mbox cmd response: success
17,306,001 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
17,310,137 UART: [afmc] ++
17,310,831 UART: [afmc] CDI.KEYID = 6
17,311,940 UART: [afmc] SUBJECT.KEYID = 7
17,313,487 UART: [afmc] AUTHORITY.KEYID = 5
19,814,755 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
21,537,988 UART: [afmc] Erase AUTHORITY.KEYID = 5
21,539,983 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
21,555,043 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
21,570,208 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
21,585,163 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
21,608,358 UART: [afmc] --
21,612,834 UART: [cold-reset] --
21,616,062 UART: [state] Locking Datavault
21,621,266 UART: [state] Locking PCR0, PCR1 and PCR31
21,623,421 UART: [state] Locking ICCM
21,626,388 UART: [exit] Launching FMC @ 0x40000130
21,635,067 UART:
21,635,310 UART: Running Caliptra FMC ...
21,636,414 UART:
21,636,577 UART: [state] CFI Enabled
21,644,847 UART: [fht] FMC Alias Private Key: 7
23,411,154 UART: [art] Extend RT PCRs Done
23,412,388 UART: [art] Lock RT PCRs Done
23,414,071 UART: [art] Populate DV Done
23,419,595 UART: [fht] FMC Alias Private Key: 7
23,421,318 UART: [art] Derive CDI
23,422,144 UART: [art] Store in slot 0x4
23,464,925 UART: [art] Derive Key Pair
23,465,975 UART: [art] Store priv key in slot 0x5
25,893,175 UART: [art] Derive Key Pair - Done
25,906,248 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,612,579 UART: [art] Erasing AUTHORITY.KEYID = 7
27,614,075 UART: [art] PUB.X = 009D4EFA8209B49BA72E82FDA07017CC8ED2323F40F64B968BFDA2FEC9C4E4E3811AAA8C516FF6EC5EDC7323326C286F
27,621,326 UART: [art] PUB.Y = 7AD6FF6DD00F227161B882E653BE6E1962ECA5B47CFCEAA058E7793D9F4637B196AC0E5CD75FF44373AE41FBE3D639B0
27,628,612 UART: [art] SIG.R = BBC93BD6E43C3C03535F954830E9AC3F2E28B3596660183E2E5755142C2BD19D720218DB9F3A2925C0667C5B16EDDD9B
27,636,005 UART: [art] SIG.S = 9C27CB0E2A7A89E3FC6C20E9ECB265F59332180EA94306690F29CB5FB73D0A45606C99C017DCDDF95C245E7D7A196A4B
28,614,572 UART: Caliptra RT
28,615,297 UART: [state] CFI Enabled
28,747,850 UART: [rt] RT listening for mailbox commands...
28,779,327 UART: [rt]cmd =0x46505652, len=4
28,780,582 UART: [rt] FIPS Version
28,781,712 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,180 writing to cptra_bootfsm_go
3,753,020 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
10,466,826 >>> mbox cmd response data (36 bytes)
12,693,305 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
17,413,177 >>> mbox cmd response: success
17,413,626 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
21,664,737 UART:
21,665,134 UART: Running Caliptra FMC ...
21,666,272 UART:
21,666,434 UART: [state] CFI Enabled
21,674,271 UART: [fht] FMC Alias Private Key: 7
23,440,381 UART: [art] Extend RT PCRs Done
23,441,608 UART: [art] Lock RT PCRs Done
23,443,452 UART: [art] Populate DV Done
23,448,934 UART: [fht] FMC Alias Private Key: 7
23,450,644 UART: [art] Derive CDI
23,451,463 UART: [art] Store in slot 0x4
23,493,901 UART: [art] Derive Key Pair
23,494,943 UART: [art] Store priv key in slot 0x5
25,921,592 UART: [art] Derive Key Pair - Done
25,934,898 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
27,641,066 UART: [art] Erasing AUTHORITY.KEYID = 7
27,642,584 UART: [art] PUB.X = FC13E138FFE57F3A90B018FC71C0A0937D0B904AE2E50A0EFE6A17C672871A0DC639D6AEA3DA6CF973B5100CF8DDA5BD
27,649,832 UART: [art] PUB.Y = 65D56418345AF92D0E9543409CB7AB8A462150D1F271DBECEC962CF240BBB8513AF3F1A094058920DC13EDD429FC4B6E
27,657,139 UART: [art] SIG.R = 2D32FA799FCDD55DCC8F145489738480E5B4AA10B5A226DCEABEFA086C4E47E625F77BF06056711B5E3CAF89336B4E78
27,664,549 UART: [art] SIG.S = 3CBFEFC68CB0D7188A234C77BD656B615DC73468A942D0E5AF1477DAFAC4AC280AF9D7BEFFA53246C743956526C7226A
28,644,129 UART: Caliptra RT
28,644,843 UART: [state] CFI Enabled
28,778,876 UART: [rt] RT listening for mailbox commands...
28,810,180 UART: [rt]cmd =0x46505652, len=4
28,811,445 UART: [rt] FIPS Version
28,812,665 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
84,944 UART: [state] LifecycleState = Unprovisioned
85,599 UART: [state] DebugLocked = No
86,301 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,973 UART: [kat] SHA2-256
881,904 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,019 UART: [kat] ++
886,171 UART: [kat] sha1
890,245 UART: [kat] SHA2-256
892,183 UART: [kat] SHA2-384
894,910 UART: [kat] SHA2-512-ACC
896,811 UART: [kat] ECC-384
902,242 UART: [kat] HMAC-384Kdf
906,948 UART: [kat] LMS
1,475,144 UART: [kat] --
1,476,093 UART: [cold-reset] ++
1,476,489 UART: [fht] Storing FHT @ 0x50003400
1,479,340 UART: [idev] ++
1,479,508 UART: [idev] CDI.KEYID = 6
1,479,868 UART: [idev] SUBJECT.KEYID = 7
1,480,292 UART: [idev] UDS.KEYID = 0
1,480,637 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,487,882 UART: [idev] Erasing UDS.KEYID = 0
1,504,494 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,204 UART: [idev] --
1,514,137 UART: [ldev] ++
1,514,305 UART: [ldev] CDI.KEYID = 6
1,514,668 UART: [ldev] SUBJECT.KEYID = 5
1,515,094 UART: [ldev] AUTHORITY.KEYID = 7
1,515,557 UART: [ldev] FE.KEYID = 1
1,520,497 UART: [ldev] Erasing FE.KEYID = 1
1,545,838 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,559,383 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,099 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,570,990 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,576,702 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,583,674 UART: [ldev] --
1,585,013 UART: [fwproc] Waiting for Commands...
1,585,670 UART: [fwproc] Received command 0x46505652
1,586,552 UART: [rt] FIPS Version
1,587,105 >>> mbox cmd response data (36 bytes)
1,587,106 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,587,250 UART: [fwproc] Received command 0x46574c44
1,588,041 UART: [fwproc] Received Image of size 118548 bytes
2,933,119 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,961,685 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,992,903 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,308 >>> mbox cmd response: success
3,133,308 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,134,340 UART: [afmc] ++
3,134,508 UART: [afmc] CDI.KEYID = 6
3,134,870 UART: [afmc] SUBJECT.KEYID = 7
3,135,295 UART: [afmc] AUTHORITY.KEYID = 5
3,170,946 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,186,834 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,187,614 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,193,323 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,206 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,204,889 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,212,785 UART: [afmc] --
3,213,695 UART: [cold-reset] --
3,214,577 UART: [state] Locking Datavault
3,215,576 UART: [state] Locking PCR0, PCR1 and PCR31
3,216,180 UART: [state] Locking ICCM
3,216,602 UART: [exit] Launching FMC @ 0x40000130
3,221,932 UART:
3,221,948 UART: Running Caliptra FMC ...
3,222,356 UART:
3,222,410 UART: [state] CFI Enabled
3,232,444 UART: [fht] FMC Alias Private Key: 7
3,351,608 UART: [art] Extend RT PCRs Done
3,352,036 UART: [art] Lock RT PCRs Done
3,353,866 UART: [art] Populate DV Done
3,362,083 UART: [fht] FMC Alias Private Key: 7
3,363,183 UART: [art] Derive CDI
3,363,463 UART: [art] Store in slot 0x4
3,449,073 UART: [art] Derive Key Pair
3,449,433 UART: [art] Store priv key in slot 0x5
3,462,202 UART: [art] Derive Key Pair - Done
3,476,964 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,492,487 UART: [art] Erasing AUTHORITY.KEYID = 7
3,493,252 UART: [art] PUB.X = 8ABED859FE5D923402F2D3D269EC8579D7E11E0D6F217483B0043AD9CFF627C4516B8A8FF3AABE542B9197C8376893A1
3,500,021 UART: [art] PUB.Y = 9ADB21786A9DBE7C428DE50E67DC4315369D814B1EB44057177FD9DFD9D5C9CD571D48683381D331456496FBF70F9A66
3,506,969 UART: [art] SIG.R = A2648C95523941DFE60395F51CC590008D0E01CFE679F03DBBFF2E89D5038FC0ADAD371D1200F70AE37B9C8E19954189
3,513,686 UART: [art] SIG.S = E4254B0C05D807064FFA4215AAA42408C51446162FCF94564C6D42BA0A70AB083D311F9A7EB8D9B41A4E294F9183277D
3,537,453 UART: Caliptra RT
3,537,704 UART: [state] CFI Enabled
3,658,879 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,587 UART: [rt]cmd =0x46505652, len=4
3,690,247 UART: [rt] FIPS Version
3,691,200 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.39s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,789 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,952 >>> mbox cmd response data (36 bytes)
1,441,953 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,983,317 >>> mbox cmd response: success
2,983,317 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,044,366 UART:
3,044,382 UART: Running Caliptra FMC ...
3,044,790 UART:
3,044,844 UART: [state] CFI Enabled
3,055,032 UART: [fht] FMC Alias Private Key: 7
3,173,930 UART: [art] Extend RT PCRs Done
3,174,358 UART: [art] Lock RT PCRs Done
3,175,794 UART: [art] Populate DV Done
3,184,055 UART: [fht] FMC Alias Private Key: 7
3,185,203 UART: [art] Derive CDI
3,185,483 UART: [art] Store in slot 0x4
3,271,151 UART: [art] Derive Key Pair
3,271,511 UART: [art] Store priv key in slot 0x5
3,284,862 UART: [art] Derive Key Pair - Done
3,299,546 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,314,839 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,604 UART: [art] PUB.X = E64BA480A211474DE914A6D53FDB6E149AF697DA36EE863594D260C9B429AA7FCAD4B7B2E5279C18D93FDC5368FBC120
3,322,388 UART: [art] PUB.Y = 1E4CF454DFAB786AF585B63FD152B8C185E2C048F5A18CBB3B9C3CE90213E7F77F46FB0AE950C53FFBB50EDD94F74E4A
3,329,353 UART: [art] SIG.R = AB5EECE9B0B9E701A50F75CF115C04454FBA294016879F3D5C48C117A85E61A779E1912756384D90C7DF496AF3397288
3,336,114 UART: [art] SIG.S = 7135D41200670336B191B9AFB39DAC77E441F4F4D8AC80423847A02EEDEC72DDFC6160F63FB232D1169296CAC4E76B0A
3,360,092 UART: Caliptra RT
3,360,343 UART: [state] CFI Enabled
3,480,783 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,103 UART: [rt]cmd =0x46505652, len=4
3,511,763 UART: [rt] FIPS Version
3,512,732 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.28s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,571 UART: [state] LifecycleState = Unprovisioned
86,226 UART: [state] DebugLocked = No
86,780 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,340 UART: [kat] SHA2-256
882,271 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,386 UART: [kat] ++
886,538 UART: [kat] sha1
890,864 UART: [kat] SHA2-256
892,802 UART: [kat] SHA2-384
895,685 UART: [kat] SHA2-512-ACC
897,586 UART: [kat] ECC-384
902,931 UART: [kat] HMAC-384Kdf
907,505 UART: [kat] LMS
1,475,701 UART: [kat] --
1,476,622 UART: [cold-reset] ++
1,477,188 UART: [fht] Storing FHT @ 0x50003400
1,480,141 UART: [idev] ++
1,480,309 UART: [idev] CDI.KEYID = 6
1,480,669 UART: [idev] SUBJECT.KEYID = 7
1,481,093 UART: [idev] UDS.KEYID = 0
1,481,438 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,489,327 UART: [idev] Erasing UDS.KEYID = 0
1,505,777 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,435 UART: [idev] --
1,515,346 UART: [ldev] ++
1,515,514 UART: [ldev] CDI.KEYID = 6
1,515,877 UART: [ldev] SUBJECT.KEYID = 5
1,516,303 UART: [ldev] AUTHORITY.KEYID = 7
1,516,766 UART: [ldev] FE.KEYID = 1
1,522,088 UART: [ldev] Erasing FE.KEYID = 1
1,547,463 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,561,328 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,567,044 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,935 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,647 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,731 UART: [ldev] --
1,587,146 UART: [fwproc] Waiting for Commands...
1,587,877 UART: [fwproc] Received command 0x46505652
1,588,759 UART: [rt] FIPS Version
1,589,312 >>> mbox cmd response data (36 bytes)
1,589,313 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,589,459 UART: [fwproc] Received command 0x46574c44
1,590,250 UART: [fwproc] Received Image of size 118548 bytes
2,936,066 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,962,486 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
2,993,704 UART: [fwproc] Loading Runtime at address 0x40005000 len 92620
3,133,899 >>> mbox cmd response: success
3,133,899 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,135,047 UART: [afmc] ++
3,135,215 UART: [afmc] CDI.KEYID = 6
3,135,577 UART: [afmc] SUBJECT.KEYID = 7
3,136,002 UART: [afmc] AUTHORITY.KEYID = 5
3,171,421 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,187,619 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,188,399 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,194,108 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,199,991 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,205,674 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,213,692 UART: [afmc] --
3,214,702 UART: [cold-reset] --
3,215,748 UART: [state] Locking Datavault
3,216,959 UART: [state] Locking PCR0, PCR1 and PCR31
3,217,563 UART: [state] Locking ICCM
3,218,011 UART: [exit] Launching FMC @ 0x40000130
3,223,341 UART:
3,223,357 UART: Running Caliptra FMC ...
3,223,765 UART:
3,223,908 UART: [state] CFI Enabled
3,234,606 UART: [fht] FMC Alias Private Key: 7
3,353,688 UART: [art] Extend RT PCRs Done
3,354,116 UART: [art] Lock RT PCRs Done
3,355,558 UART: [art] Populate DV Done
3,363,625 UART: [fht] FMC Alias Private Key: 7
3,364,799 UART: [art] Derive CDI
3,365,079 UART: [art] Store in slot 0x4
3,450,899 UART: [art] Derive Key Pair
3,451,259 UART: [art] Store priv key in slot 0x5
3,464,100 UART: [art] Derive Key Pair - Done
3,478,648 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,494,355 UART: [art] Erasing AUTHORITY.KEYID = 7
3,495,120 UART: [art] PUB.X = 6E01D2ED7B677F635CDC153CF4AA41D21FE882AC8709AFB31FFB31B84BA1FA23FA6063D7DC01BB4E3D57F0DD8F902E74
3,501,905 UART: [art] PUB.Y = 9CAFA8A7B77A0B6C63EA4684E85F00531C89E5D2705121B1325D123FB7F8EABD002E3E5ABAD91E5EED1072F59A059035
3,508,817 UART: [art] SIG.R = BD74CB91EC6518C4BFFAE341050427E4C73C082972D84FB6F417DA5F70BAD782728F3D6501FB952E02EC0DD51F9B2ACB
3,515,585 UART: [art] SIG.S = 051DA4E76EB1FF3B51CB04F5D71CCED084A872B80D9F5ED939D9C80AFD192E5E40ABAD7A3EC88C22F22F8494AE1849D0
3,539,143 UART: Caliptra RT
3,539,486 UART: [state] CFI Enabled
3,658,864 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,689,722 UART: [rt]cmd =0x46505652, len=4
3,690,382 UART: [rt] FIPS Version
3,691,523 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.36s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,328 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,441,683 >>> mbox cmd response data (36 bytes)
1,441,684 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,981,744 >>> mbox cmd response: success
2,981,744 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
3,044,041 UART:
3,044,057 UART: Running Caliptra FMC ...
3,044,465 UART:
3,044,608 UART: [state] CFI Enabled
3,055,224 UART: [fht] FMC Alias Private Key: 7
3,174,254 UART: [art] Extend RT PCRs Done
3,174,682 UART: [art] Lock RT PCRs Done
3,176,280 UART: [art] Populate DV Done
3,184,345 UART: [fht] FMC Alias Private Key: 7
3,185,475 UART: [art] Derive CDI
3,185,755 UART: [art] Store in slot 0x4
3,271,657 UART: [art] Derive Key Pair
3,272,017 UART: [art] Store priv key in slot 0x5
3,284,994 UART: [art] Derive Key Pair - Done
3,299,694 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,315,027 UART: [art] Erasing AUTHORITY.KEYID = 7
3,315,792 UART: [art] PUB.X = 4C6E315CE3C851E43C5EF1370052951BCF87F70A652F59116273E2C413CA43F51AD43298CE661E247954166D07A958B1
3,322,528 UART: [art] PUB.Y = 772EFA753FD1BB22BDD7748921C867CA4EBBCD810BD84B1A37B1DEEE62AE7EBF79ED6E3232CA1B629896ADBB4B29FC9C
3,329,505 UART: [art] SIG.R = 54D1A4F63774C18D01E0A31EBA2B8B541E34D86159CF6792A71A5DF7F8DF83B9F8D7F60E17984DBA9AF8ACF2E04C0D11
3,336,282 UART: [art] SIG.S = DFB42817883B616913D9911E8866DCCC363353A3D0833EC088F98CA24B38115FB42436BDEB175BCF04E93A6545E24F7F
3,360,433 UART: Caliptra RT
3,360,776 UART: [state] CFI Enabled
3,481,502 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,511,954 UART: [rt]cmd =0x46505652, len=4
3,512,614 UART: [rt] FIPS Version
3,513,735 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,002 UART: [state] LifecycleState = Unprovisioned
85,657 UART: [state] DebugLocked = No
86,329 UART: [state] WD Timer not started. Device not locked for debugging
87,488 UART: [kat] SHA2-256
891,038 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,142 UART: [kat] ++
895,294 UART: [kat] sha1
899,562 UART: [kat] SHA2-256
901,502 UART: [kat] SHA2-384
904,139 UART: [kat] SHA2-512-ACC
906,040 UART: [kat] ECC-384
915,459 UART: [kat] HMAC-384Kdf
920,197 UART: [kat] LMS
1,168,509 UART: [kat] --
1,169,472 UART: [cold-reset] ++
1,169,814 UART: [fht] FHT @ 0x50003400
1,172,452 UART: [idev] ++
1,172,620 UART: [idev] CDI.KEYID = 6
1,172,981 UART: [idev] SUBJECT.KEYID = 7
1,173,406 UART: [idev] UDS.KEYID = 0
1,173,752 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,181,293 UART: [idev] Erasing UDS.KEYID = 0
1,197,933 UART: [idev] Sha1 KeyId Algorithm
1,206,713 UART: [idev] --
1,207,666 UART: [ldev] ++
1,207,834 UART: [ldev] CDI.KEYID = 6
1,208,198 UART: [ldev] SUBJECT.KEYID = 5
1,208,625 UART: [ldev] AUTHORITY.KEYID = 7
1,209,088 UART: [ldev] FE.KEYID = 1
1,214,096 UART: [ldev] Erasing FE.KEYID = 1
1,240,455 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,253,917 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,259,633 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,265,522 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,271,234 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,278,256 UART: [ldev] --
1,279,523 UART: [fwproc] Wait for Commands...
1,280,264 UART: [fwproc] Recv command 0x46505652
1,281,088 UART: [rt] FIPS Version
1,281,648 >>> mbox cmd response data (36 bytes)
1,281,649 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,281,870 UART: [fwproc] Recv command 0x46574c44
1,282,603 UART: [fwproc] Recv'd Img size: 118548 bytes
2,626,936 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,653,269 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,684,444 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,824,671 >>> mbox cmd response: success
2,824,671 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,825,853 UART: [afmc] ++
2,826,021 UART: [afmc] CDI.KEYID = 6
2,826,384 UART: [afmc] SUBJECT.KEYID = 7
2,826,810 UART: [afmc] AUTHORITY.KEYID = 5
2,861,991 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,878,352 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,879,101 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,884,811 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,890,692 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,896,393 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,904,182 UART: [afmc] --
2,905,047 UART: [cold-reset] --
2,906,091 UART: [state] Locking Datavault
2,907,114 UART: [state] Locking PCR0, PCR1 and PCR31
2,907,718 UART: [state] Locking ICCM
2,908,384 UART: [exit] Launching FMC @ 0x40000130
2,913,714 UART:
2,913,730 UART: Running Caliptra FMC ...
2,914,138 UART:
2,914,192 UART: [state] CFI Enabled
2,924,476 UART: [fht] FMC Alias Private Key: 7
3,044,112 UART: [art] Extend RT PCRs Done
3,044,540 UART: [art] Lock RT PCRs Done
3,045,830 UART: [art] Populate DV Done
3,053,897 UART: [fht] FMC Alias Private Key: 7
3,055,025 UART: [art] Derive CDI
3,055,305 UART: [art] Store in slot 0x4
3,141,180 UART: [art] Derive Key Pair
3,141,540 UART: [art] Store priv key in slot 0x5
3,155,066 UART: [art] Derive Key Pair - Done
3,169,910 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,185,765 UART: [art] Erasing AUTHORITY.KEYID = 7
3,186,530 UART: [art] PUB.X = 1D4FD3173EB05DDE6E002E0151A2B9BD9C19C775E8D6C5398EE4C98EF175B721D443CBD3AACC2F5D7AC453BC56DC7964
3,193,295 UART: [art] PUB.Y = C06399DE4A7746C89C77AB3CD93B13DF55C9E5999F48CB518159A8B247CB52FE45690DB6B69460D42F7FDE8F357C0C65
3,200,247 UART: [art] SIG.R = CD9DC9E8FE43ACEC03EA3B2219ECFE647FDE53E45872BB1BF16FF64532982C8B72AE3A4A8A0C44398EAE594787462FB9
3,207,031 UART: [art] SIG.S = 9F3886D6CFE5A5F71E2EDC79DDC66727C5E977EC9A6743DF53DEFA2D31740E49425AE8F9EC00E1449A8C4F13A892742D
3,230,938 UART: Caliptra RT
3,231,189 UART: [state] CFI Enabled
3,351,009 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,381,257 UART: [rt]cmd =0x46505652, len=4
3,381,917 UART: [rt] FIPS Version
3,383,034 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.43s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,368 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,559 >>> mbox cmd response data (36 bytes)
1,139,560 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,356 >>> mbox cmd response: success
2,678,356 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,011 UART:
2,740,027 UART: Running Caliptra FMC ...
2,740,435 UART:
2,740,489 UART: [state] CFI Enabled
2,751,233 UART: [fht] FMC Alias Private Key: 7
2,870,331 UART: [art] Extend RT PCRs Done
2,870,759 UART: [art] Lock RT PCRs Done
2,872,245 UART: [art] Populate DV Done
2,880,666 UART: [fht] FMC Alias Private Key: 7
2,881,772 UART: [art] Derive CDI
2,882,052 UART: [art] Store in slot 0x4
2,967,971 UART: [art] Derive Key Pair
2,968,331 UART: [art] Store priv key in slot 0x5
2,981,351 UART: [art] Derive Key Pair - Done
2,995,926 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,011,755 UART: [art] Erasing AUTHORITY.KEYID = 7
3,012,520 UART: [art] PUB.X = 5E9A8B6C9C3EB3872F553B237F31917C33B637F0FC8DAE618D153AC7DEDD1DF466DC35EE7CEF57374E737D62B20930BE
3,019,303 UART: [art] PUB.Y = 93F304D780313D93561686E581E7F90D7CB945BC5EE5C05700F65D7205ABB9CB5E06630DE6B292115D53DBF9885768AA
3,026,216 UART: [art] SIG.R = E5404FDB11BE1CC008E4C84A6B7DDE67DAE7F6C6EE44A4B56ABF589F97EF8E21E20150AD7357B5945639F43B6D09ECB7
3,032,997 UART: [art] SIG.S = 9089C9478A2EBC2A442F938E1C7AE05F1AE8F97751252A828E0F09FE9BD3A08FAD9344C498919F92549D577E7625D64A
3,056,563 UART: Caliptra RT
3,056,814 UART: [state] CFI Enabled
3,176,154 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,912 UART: [rt]cmd =0x46505652, len=4
3,207,572 UART: [rt] FIPS Version
3,208,777 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.26s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,529 UART: [state] LifecycleState = Unprovisioned
86,184 UART: [state] DebugLocked = No
86,858 UART: [state] WD Timer not started. Device not locked for debugging
88,009 UART: [kat] SHA2-256
891,559 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,663 UART: [kat] ++
895,815 UART: [kat] sha1
900,023 UART: [kat] SHA2-256
901,963 UART: [kat] SHA2-384
904,820 UART: [kat] SHA2-512-ACC
906,721 UART: [kat] ECC-384
915,976 UART: [kat] HMAC-384Kdf
920,636 UART: [kat] LMS
1,168,948 UART: [kat] --
1,169,877 UART: [cold-reset] ++
1,170,293 UART: [fht] FHT @ 0x50003400
1,172,993 UART: [idev] ++
1,173,161 UART: [idev] CDI.KEYID = 6
1,173,522 UART: [idev] SUBJECT.KEYID = 7
1,173,947 UART: [idev] UDS.KEYID = 0
1,174,293 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,182,136 UART: [idev] Erasing UDS.KEYID = 0
1,199,710 UART: [idev] Sha1 KeyId Algorithm
1,208,636 UART: [idev] --
1,209,851 UART: [ldev] ++
1,210,019 UART: [ldev] CDI.KEYID = 6
1,210,383 UART: [ldev] SUBJECT.KEYID = 5
1,210,810 UART: [ldev] AUTHORITY.KEYID = 7
1,211,273 UART: [ldev] FE.KEYID = 1
1,216,489 UART: [ldev] Erasing FE.KEYID = 1
1,243,150 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,518 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,407 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,119 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,045 UART: [ldev] --
1,282,356 UART: [fwproc] Wait for Commands...
1,283,159 UART: [fwproc] Recv command 0x46505652
1,283,983 UART: [rt] FIPS Version
1,284,543 >>> mbox cmd response data (36 bytes)
1,284,544 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,284,737 UART: [fwproc] Recv command 0x46574c44
1,285,470 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,353 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,655,626 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,686,801 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,826,968 >>> mbox cmd response: success
2,826,968 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,828,192 UART: [afmc] ++
2,828,360 UART: [afmc] CDI.KEYID = 6
2,828,723 UART: [afmc] SUBJECT.KEYID = 7
2,829,149 UART: [afmc] AUTHORITY.KEYID = 5
2,864,972 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,239 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,881,988 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,887,698 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,579 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,280 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,001 UART: [afmc] --
2,907,812 UART: [cold-reset] --
2,908,614 UART: [state] Locking Datavault
2,909,995 UART: [state] Locking PCR0, PCR1 and PCR31
2,910,599 UART: [state] Locking ICCM
2,911,187 UART: [exit] Launching FMC @ 0x40000130
2,916,517 UART:
2,916,533 UART: Running Caliptra FMC ...
2,916,941 UART:
2,917,084 UART: [state] CFI Enabled
2,927,936 UART: [fht] FMC Alias Private Key: 7
3,046,184 UART: [art] Extend RT PCRs Done
3,046,612 UART: [art] Lock RT PCRs Done
3,048,042 UART: [art] Populate DV Done
3,056,421 UART: [fht] FMC Alias Private Key: 7
3,057,365 UART: [art] Derive CDI
3,057,645 UART: [art] Store in slot 0x4
3,143,760 UART: [art] Derive Key Pair
3,144,120 UART: [art] Store priv key in slot 0x5
3,157,412 UART: [art] Derive Key Pair - Done
3,172,221 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,187,918 UART: [art] Erasing AUTHORITY.KEYID = 7
3,188,683 UART: [art] PUB.X = 2F5AB6587D548C70B04AB59C00B8712883D49909DA3A821890B4263181C50DD1EF7B7DB8EBE353DE002A3E8C8EE7B5D0
3,195,411 UART: [art] PUB.Y = 7F690FCC2BC7E000A01478A3E44DEA853976BBE735D432B1F07171545917507B3DE7ED4C6E267845955466EAFC6A465D
3,202,338 UART: [art] SIG.R = 1C619F3B2A4CCE52377F8E6923CB03D4515778A1B641335E5A3C28F039081E048A8CCAD07664641F0EA00DDA0E2FA1EE
3,209,098 UART: [art] SIG.S = 6E38F447F2C58CD3A81722B52613421714DD5657CD4BAFFAAE8840F5ABD457671D2E6DD52E01F08F01603FCBAAB88D91
3,232,494 UART: Caliptra RT
3,232,837 UART: [state] CFI Enabled
3,352,381 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,382,809 UART: [rt]cmd =0x46505652, len=4
3,383,469 UART: [rt] FIPS Version
3,384,536 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.79s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,795 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,010 >>> mbox cmd response data (36 bytes)
1,140,011 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,679,679 >>> mbox cmd response: success
2,679,679 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,740,796 UART:
2,740,812 UART: Running Caliptra FMC ...
2,741,220 UART:
2,741,363 UART: [state] CFI Enabled
2,751,965 UART: [fht] FMC Alias Private Key: 7
2,871,733 UART: [art] Extend RT PCRs Done
2,872,161 UART: [art] Lock RT PCRs Done
2,873,781 UART: [art] Populate DV Done
2,881,908 UART: [fht] FMC Alias Private Key: 7
2,882,862 UART: [art] Derive CDI
2,883,142 UART: [art] Store in slot 0x4
2,968,627 UART: [art] Derive Key Pair
2,968,987 UART: [art] Store priv key in slot 0x5
2,982,855 UART: [art] Derive Key Pair - Done
2,997,311 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,012,612 UART: [art] Erasing AUTHORITY.KEYID = 7
3,013,377 UART: [art] PUB.X = CB193B2954D37A79F172610B39FCB3EE62AE32841B4ABDC84AB71D6C7C374F5494D1FC7CBBD43DDEF739EE6BE8C8E778
3,020,166 UART: [art] PUB.Y = CD431FBAFBFD2129EDD984C5F69E1CCDA56A3C2EB3EE30E485643B9D3F526E8C8CDDCB13C1989F5A603BFCF2CCFA931D
3,027,150 UART: [art] SIG.R = 2FF0DDDA601ED615559C214D140BA499DBACE60120EBBD44562229ED7542D7AABEC81577AE1F338FA26AA6C69301705F
3,033,925 UART: [art] SIG.S = 3CCB9125A912432C590600F56B3F48F213AD3AB400AF812FB28372F973BA44BD1323E04E54887145DAFC2C03B02D2FA2
3,057,345 UART: Caliptra RT
3,057,688 UART: [state] CFI Enabled
3,178,320 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,208,986 UART: [rt]cmd =0x46505652, len=4
3,209,646 UART: [rt] FIPS Version
3,210,849 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.37s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,160 UART: [state] LifecycleState = Unprovisioned
85,815 UART: [state] DebugLocked = No
86,475 UART: [state] WD Timer not started. Device not locked for debugging
87,596 UART: [kat] SHA2-256
893,246 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,371 UART: [kat] ++
897,523 UART: [kat] sha1
901,899 UART: [kat] SHA2-256
903,839 UART: [kat] SHA2-384
906,666 UART: [kat] SHA2-512-ACC
908,567 UART: [kat] ECC-384
918,480 UART: [kat] HMAC-384Kdf
923,148 UART: [kat] LMS
1,171,476 UART: [kat] --
1,172,607 UART: [cold-reset] ++
1,172,939 UART: [fht] FHT @ 0x50003400
1,175,744 UART: [idev] ++
1,175,912 UART: [idev] CDI.KEYID = 6
1,176,272 UART: [idev] SUBJECT.KEYID = 7
1,176,696 UART: [idev] UDS.KEYID = 0
1,177,041 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,228 UART: [idev] Erasing UDS.KEYID = 0
1,201,053 UART: [idev] Sha1 KeyId Algorithm
1,209,499 UART: [idev] --
1,210,599 UART: [ldev] ++
1,210,767 UART: [ldev] CDI.KEYID = 6
1,211,130 UART: [ldev] SUBJECT.KEYID = 5
1,211,556 UART: [ldev] AUTHORITY.KEYID = 7
1,212,019 UART: [ldev] FE.KEYID = 1
1,217,495 UART: [ldev] Erasing FE.KEYID = 1
1,243,702 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,973 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,689 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,268,580 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,292 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,515 UART: [ldev] --
1,282,860 UART: [fwproc] Wait for Commands...
1,283,616 UART: [fwproc] Recv command 0x46505652
1,284,437 UART: [rt] FIPS Version
1,284,991 >>> mbox cmd response data (36 bytes)
1,284,992 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,285,210 UART: [fwproc] Recv command 0x46574c44
1,285,938 UART: [fwproc] Recv'd Img size: 118548 bytes
2,629,761 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,656,592 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,687,762 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,827,989 >>> mbox cmd response: success
2,827,989 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,829,153 UART: [afmc] ++
2,829,321 UART: [afmc] CDI.KEYID = 6
2,829,683 UART: [afmc] SUBJECT.KEYID = 7
2,830,108 UART: [afmc] AUTHORITY.KEYID = 5
2,865,243 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,881,600 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,882,348 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,888,057 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,893,940 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,899,641 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,907,625 UART: [afmc] --
2,908,675 UART: [cold-reset] --
2,909,305 UART: [state] Locking Datavault
2,910,702 UART: [state] Locking PCR0, PCR1 and PCR31
2,911,306 UART: [state] Locking ICCM
2,911,968 UART: [exit] Launching FMC @ 0x40000130
2,917,298 UART:
2,917,314 UART: Running Caliptra FMC ...
2,917,722 UART:
2,917,776 UART: [state] CFI Enabled
2,928,640 UART: [fht] FMC Alias Private Key: 7
3,047,360 UART: [art] Extend RT PCRs Done
3,047,788 UART: [art] Lock RT PCRs Done
3,048,986 UART: [art] Populate DV Done
3,057,209 UART: [fht] FMC Alias Private Key: 7
3,058,223 UART: [art] Derive CDI
3,058,503 UART: [art] Store in slot 0x4
3,144,516 UART: [art] Derive Key Pair
3,144,876 UART: [art] Store priv key in slot 0x5
3,158,098 UART: [art] Derive Key Pair - Done
3,172,955 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,188,546 UART: [art] Erasing AUTHORITY.KEYID = 7
3,189,311 UART: [art] PUB.X = 6CC21F15FED1E644CE244297A33A010C32BCAB9C790E079CABD89685CC3E7BCB8529B0235A3B1F0B693175CCC5DD30E2
3,196,082 UART: [art] PUB.Y = 76579C95D9B377C53C354A474C86A9A8EC4D30BD81AA056534DAA90D72969E656E4E130677CD3D06A79425FF42213B23
3,203,018 UART: [art] SIG.R = 29D568E91549CA8C1331F06572A1ABC889FAB8EB6D05AF485676C5EB6F51C003441D6B39E37CFF157C5ED5918B5F0636
3,209,785 UART: [art] SIG.S = 74245064CC38CBE173A2FC883E1F0C5209B4CC5CAC849DD37C89ED27A6CC634A65FBBF9638147FDB615B8722FE33A576
3,233,595 UART: Caliptra RT
3,233,846 UART: [state] CFI Enabled
3,353,072 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,383,736 UART: [rt]cmd =0x46505652, len=4
3,384,396 UART: [rt] FIPS Version
3,385,429 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,845 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,139,971 >>> mbox cmd response data (36 bytes)
1,139,972 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,678,530 >>> mbox cmd response: success
2,678,530 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,739,995 UART:
2,740,011 UART: Running Caliptra FMC ...
2,740,419 UART:
2,740,473 UART: [state] CFI Enabled
2,750,769 UART: [fht] FMC Alias Private Key: 7
2,869,317 UART: [art] Extend RT PCRs Done
2,869,745 UART: [art] Lock RT PCRs Done
2,871,613 UART: [art] Populate DV Done
2,879,666 UART: [fht] FMC Alias Private Key: 7
2,880,786 UART: [art] Derive CDI
2,881,066 UART: [art] Store in slot 0x4
2,966,919 UART: [art] Derive Key Pair
2,967,279 UART: [art] Store priv key in slot 0x5
2,980,353 UART: [art] Derive Key Pair - Done
2,994,922 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,010,149 UART: [art] Erasing AUTHORITY.KEYID = 7
3,010,914 UART: [art] PUB.X = FCA07B8765E3F7B490FC363B9D6E2697046C1D05A94C7326DF2348D5E50A5F27D761E1C0E21C799E01A7641E30ED49F0
3,017,676 UART: [art] PUB.Y = B3AB5C13FEA4FB568E0B0506F2154CF39EE87105AFAE4115A9A9D7E62D5DC334F0707C31287719A1AB16968328DEAEB5
3,024,626 UART: [art] SIG.R = 418E67F98884F02AD16EC5A7B74CE94EBD2A4D074859DB03184AACE29550A3ED0B7A574241183CC83355F7F988BFD3CC
3,031,397 UART: [art] SIG.S = E5DDB749CE027BF89DE1F2CD4AFC59365F3091A3747A33F96A2B22725D646CD159F4A3269AE8DD0A4F703F4CB2D89EBD
3,055,555 UART: Caliptra RT
3,055,806 UART: [state] CFI Enabled
3,176,409 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,206,919 UART: [rt]cmd =0x46505652, len=4
3,207,579 UART: [rt] FIPS Version
3,208,636 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,459 UART: [state] LifecycleState = Unprovisioned
86,114 UART: [state] DebugLocked = No
86,790 UART: [state] WD Timer not started. Device not locked for debugging
88,059 UART: [kat] SHA2-256
893,709 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,834 UART: [kat] ++
897,986 UART: [kat] sha1
902,154 UART: [kat] SHA2-256
904,094 UART: [kat] SHA2-384
906,771 UART: [kat] SHA2-512-ACC
908,672 UART: [kat] ECC-384
918,593 UART: [kat] HMAC-384Kdf
923,135 UART: [kat] LMS
1,171,463 UART: [kat] --
1,172,398 UART: [cold-reset] ++
1,172,752 UART: [fht] FHT @ 0x50003400
1,175,505 UART: [idev] ++
1,175,673 UART: [idev] CDI.KEYID = 6
1,176,033 UART: [idev] SUBJECT.KEYID = 7
1,176,457 UART: [idev] UDS.KEYID = 0
1,176,802 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,184,203 UART: [idev] Erasing UDS.KEYID = 0
1,200,892 UART: [idev] Sha1 KeyId Algorithm
1,209,514 UART: [idev] --
1,210,396 UART: [ldev] ++
1,210,564 UART: [ldev] CDI.KEYID = 6
1,210,927 UART: [ldev] SUBJECT.KEYID = 5
1,211,353 UART: [ldev] AUTHORITY.KEYID = 7
1,211,816 UART: [ldev] FE.KEYID = 1
1,217,118 UART: [ldev] Erasing FE.KEYID = 1
1,243,757 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,704 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,420 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,311 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,023 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,216 UART: [ldev] --
1,283,665 UART: [fwproc] Wait for Commands...
1,284,471 UART: [fwproc] Recv command 0x46505652
1,285,292 UART: [rt] FIPS Version
1,285,846 >>> mbox cmd response data (36 bytes)
1,285,847 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
1,286,029 UART: [fwproc] Recv command 0x46574c44
1,286,757 UART: [fwproc] Recv'd Img size: 118548 bytes
2,631,744 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,658,613 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,689,783 UART: [fwproc] Load Runtime at address 0x40005000 len 92620
2,830,008 >>> mbox cmd response: success
2,830,008 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,831,234 UART: [afmc] ++
2,831,402 UART: [afmc] CDI.KEYID = 6
2,831,764 UART: [afmc] SUBJECT.KEYID = 7
2,832,189 UART: [afmc] AUTHORITY.KEYID = 5
2,868,096 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,884,463 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,885,211 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,890,920 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,896,803 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,902,504 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,910,292 UART: [afmc] --
2,911,370 UART: [cold-reset] --
2,912,182 UART: [state] Locking Datavault
2,913,469 UART: [state] Locking PCR0, PCR1 and PCR31
2,914,073 UART: [state] Locking ICCM
2,914,619 UART: [exit] Launching FMC @ 0x40000130
2,919,949 UART:
2,919,965 UART: Running Caliptra FMC ...
2,920,373 UART:
2,920,516 UART: [state] CFI Enabled
2,931,062 UART: [fht] FMC Alias Private Key: 7
3,049,418 UART: [art] Extend RT PCRs Done
3,049,846 UART: [art] Lock RT PCRs Done
3,051,518 UART: [art] Populate DV Done
3,059,483 UART: [fht] FMC Alias Private Key: 7
3,060,617 UART: [art] Derive CDI
3,060,897 UART: [art] Store in slot 0x4
3,146,754 UART: [art] Derive Key Pair
3,147,114 UART: [art] Store priv key in slot 0x5
3,160,306 UART: [art] Derive Key Pair - Done
3,174,980 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,190,629 UART: [art] Erasing AUTHORITY.KEYID = 7
3,191,394 UART: [art] PUB.X = DCA157C813B25E3655E53F75DF0F19F7F9E356F6130BD21F2BF60C4FD700542C9725602DDE4ACEBD19400C14A9AC9C21
3,198,142 UART: [art] PUB.Y = 6B10AAD831209AEBAC3ABD33E05E6F8617D48A3A99E0ABF0CC69253560E3537DE68F27C816E3F5D2C051E3431379430F
3,205,097 UART: [art] SIG.R = 9151B0E859E1D7D8251CFBC0D251C67DEF0D6ECC0E4B45EC62C180E7D9AB10F45109F8DF498ECB9BA00CD74A4233B170
3,211,873 UART: [art] SIG.S = D70EE156B6BDF0FCAE36FEA70FE75A03C36C17E3A797DA48327E8EF8E337493DF62075ED07958215FAFBCAB4E1FF90C6
3,235,841 UART: Caliptra RT
3,236,184 UART: [state] CFI Enabled
3,356,030 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,386,816 UART: [rt]cmd =0x46505652, len=4
3,387,476 UART: [rt] FIPS Version
3,388,653 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,880 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
1,140,208 >>> mbox cmd response data (36 bytes)
1,140,209 <<< Executing mbox cmd 0x46574c44 (118548 bytes) from SoC
2,681,607 >>> mbox cmd response: success
2,681,607 <<< Executing mbox cmd 0x46505652 (4 bytes) from SoC
2,743,878 UART:
2,743,894 UART: Running Caliptra FMC ...
2,744,302 UART:
2,744,445 UART: [state] CFI Enabled
2,754,949 UART: [fht] FMC Alias Private Key: 7
2,873,691 UART: [art] Extend RT PCRs Done
2,874,119 UART: [art] Lock RT PCRs Done
2,875,843 UART: [art] Populate DV Done
2,884,036 UART: [fht] FMC Alias Private Key: 7
2,885,060 UART: [art] Derive CDI
2,885,340 UART: [art] Store in slot 0x4
2,970,923 UART: [art] Derive Key Pair
2,971,283 UART: [art] Store priv key in slot 0x5
2,984,369 UART: [art] Derive Key Pair - Done
2,999,283 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,014,754 UART: [art] Erasing AUTHORITY.KEYID = 7
3,015,519 UART: [art] PUB.X = 3D33EE622B776093978A27104FC4F3FCB824430C436698E0F894FC315319D011D3988D8A4E11B298067461DCE8998FF0
3,022,275 UART: [art] PUB.Y = 7B3FF08CDEEB1E869F4DD3A14F68DAE9B3DB818E38C33F3219A65C6053D2011465658A86AF55D589F63E2B541F3CDC3D
3,029,236 UART: [art] SIG.R = EDC6CC4A8919364672ED51E6BBAB5518D3E1E3B86D43B62C6AF069B8E5084B7B736F7E5B947EA92E04756B1FA547515A
3,036,010 UART: [art] SIG.S = B034928C9E787F27179520E9206CD2D4655DFA1936721CE6A8C409B99EA3F6BDDE098452ECA11DD7191DD00EE65238A3
3,059,581 UART: Caliptra RT
3,059,924 UART: [state] CFI Enabled
3,180,244 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,210,352 UART: [rt]cmd =0x46505652, len=4
3,211,012 UART: [rt] FIPS Version
3,212,171 >>> mbox cmd response data (36 bytes)
test services::version_info_update ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.28s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,924 writing to cptra_bootfsm_go
192,118 UART:
192,484 UART: Running Caliptra ROM ...
193,628 UART:
193,776 UART: [state] CFI Enabled
265,024 UART: [state] LifecycleState = Unprovisioned
266,897 UART: [state] DebugLocked = No
269,435 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
274,677 UART: [kat] SHA2-256
444,352 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
454,835 UART: [kat] ++
455,384 UART: [kat] sha1
465,835 UART: [kat] SHA2-256
468,569 UART: [kat] SHA2-384
475,205 UART: [kat] SHA2-512-ACC
477,579 UART: [kat] ECC-384
2,767,098 UART: [kat] HMAC-384Kdf
2,799,637 UART: [kat] LMS
3,989,942 UART: [kat] --
3,995,360 UART: [cold-reset] ++
3,996,443 UART: [fht] Storing FHT @ 0x50003400
4,008,516 UART: [idev] ++
4,009,094 UART: [idev] CDI.KEYID = 6
4,010,013 UART: [idev] SUBJECT.KEYID = 7
4,011,273 UART: [idev] UDS.KEYID = 0
4,012,335 ready_for_fw is high
4,012,583 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,162,843 UART: [idev] Erasing UDS.KEYID = 0
7,345,131 UART: [idev] Using Sha1 for KeyId Algorithm
7,366,600 UART: [idev] --
7,371,033 UART: [ldev] ++
7,371,604 UART: [ldev] CDI.KEYID = 6
7,372,547 UART: [ldev] SUBJECT.KEYID = 5
7,373,818 UART: [ldev] AUTHORITY.KEYID = 7
7,374,973 UART: [ldev] FE.KEYID = 1
7,421,851 UART: [ldev] Erasing FE.KEYID = 1
10,751,797 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,048,623 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,063,148 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,078,028 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,092,529 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,110,847 UART: [ldev] --
13,115,687 UART: [fwproc] Waiting for Commands...
13,118,169 UART: [fwproc] Received command 0x46574c44
13,120,359 UART: [fwproc] Received Image of size 119428 bytes
17,233,309 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,311,224 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,384,425 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,716,315 >>> mbox cmd response: success
17,716,749 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,721,212 UART: [afmc] ++
17,721,801 UART: [afmc] CDI.KEYID = 6
17,722,752 UART: [afmc] SUBJECT.KEYID = 7
17,723,962 UART: [afmc] AUTHORITY.KEYID = 5
21,093,231 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,394,843 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,397,108 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,411,562 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,426,276 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,440,684 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,463,594 UART: [afmc] --
23,467,543 UART: [cold-reset] --
23,471,053 UART: [state] Locking Datavault
23,475,642 UART: [state] Locking PCR0, PCR1 and PCR31
23,477,385 UART: [state] Locking ICCM
23,479,217 UART: [exit] Launching FMC @ 0x40000130
23,487,608 UART:
23,487,844 UART: Running Caliptra FMC ...
23,488,867 UART:
23,489,015 UART: [state] CFI Enabled
23,556,329 UART: [fht] FMC Alias Private Key: 7
25,918,441 UART: [art] Extend RT PCRs Done
25,919,667 UART: [art] Lock RT PCRs Done
25,921,409 UART: [art] Populate DV Done
25,926,958 UART: [fht] FMC Alias Private Key: 7
25,928,593 UART: [art] Derive CDI
25,929,409 UART: [art] Store in slot 0x4
25,985,844 UART: [art] Derive Key Pair
25,986,889 UART: [art] Store priv key in slot 0x5
29,280,169 UART: [art] Derive Key Pair - Done
29,292,723 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,581,441 UART: [art] Erasing AUTHORITY.KEYID = 7
31,582,950 UART: [art] PUB.X = 006A5361646B35965777C151E1E2BC211D051E60C5C109DA34682A717563C4DBC1A2F90A0807114FA696B1EE1D4D6155
31,590,206 UART: [art] PUB.Y = DDB03192BB4B00FA5E0165C1F18409EABE470616577FF3FF3E682DC708FA824D5EBDF1028618073F9C5F3F0DEF1FC948
31,597,404 UART: [art] SIG.R = B930283A7B1FA0E9A08E89FDAB3161528DD66DB73B8C7097E53E7D12FF1631BF051DD90D3099EC579A368EADA968B695
31,604,814 UART: [art] SIG.S = E2136F83531F1C406EB1DE43B25D42B71BB5F9F5817A0FDE32AB987FE1EE5BB4A7C6E4195AD253A75E02D1BFF5D3AC54
32,910,194 UART: Caliptra RT
32,910,903 UART: [state] CFI Enabled
33,087,385 UART: [rt] RT listening for mailbox commands...
33,118,815 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,006 writing to cptra_bootfsm_go
3,786,657 ready_for_fw is high
3,787,294 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
17,989,284 >>> mbox cmd response: success
17,990,023 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,674,436 UART:
23,674,835 UART: Running Caliptra FMC ...
23,675,964 UART:
23,676,141 UART: [state] CFI Enabled
23,740,880 UART: [fht] FMC Alias Private Key: 7
26,081,862 UART: [art] Extend RT PCRs Done
26,083,117 UART: [art] Lock RT PCRs Done
26,084,879 UART: [art] Populate DV Done
26,090,258 UART: [fht] FMC Alias Private Key: 7
26,091,890 UART: [art] Derive CDI
26,092,629 UART: [art] Store in slot 0x4
26,149,945 UART: [art] Derive Key Pair
26,150,987 UART: [art] Store priv key in slot 0x5
29,444,909 UART: [art] Derive Key Pair - Done
29,457,989 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,746,184 UART: [art] Erasing AUTHORITY.KEYID = 7
31,747,693 UART: [art] PUB.X = F3E2060A9AAD3D595530807FCC6672B55D80EE1C33D962151ED516CA186F52A650823F998E7E58D5F136790FEBB73AAE
31,754,949 UART: [art] PUB.Y = F96D4ADC1FDF3E8C68D69E44CC2EFDFDDC520B9F8B4441F1C640F0AA8F8ECB5F7C54F82204D1FFB85D24A83FEBA05FE9
31,762,253 UART: [art] SIG.R = AD127706916C3A1CDCBC3F3647391066BB14B1CB05A60031E2A44E8338923370049985847AF54FE4A22F68BE9565379B
31,769,607 UART: [art] SIG.S = 05F72A775025D26982D5798B903ABFD46060AECC645E53ADA09D26D7B91D0131C00F0210A6BF74D81A10BD3E3C0B31CC
33,074,414 UART: Caliptra RT
33,075,133 UART: [state] CFI Enabled
33,252,811 UART: [rt] RT listening for mailbox commands...
33,284,014 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,246 writing to cptra_bootfsm_go
192,415 UART:
192,787 UART: Running Caliptra ROM ...
193,928 UART:
603,826 UART: [state] CFI Enabled
619,481 UART: [state] LifecycleState = Unprovisioned
621,433 UART: [state] DebugLocked = No
623,613 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
627,626 UART: [kat] SHA2-256
797,354 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
807,897 UART: [kat] ++
808,346 UART: [kat] sha1
819,797 UART: [kat] SHA2-256
822,462 UART: [kat] SHA2-384
828,031 UART: [kat] SHA2-512-ACC
830,364 UART: [kat] ECC-384
3,115,613 UART: [kat] HMAC-384Kdf
3,126,876 UART: [kat] LMS
4,317,056 UART: [kat] --
4,320,450 UART: [cold-reset] ++
4,321,396 UART: [fht] Storing FHT @ 0x50003400
4,332,115 UART: [idev] ++
4,332,689 UART: [idev] CDI.KEYID = 6
4,333,604 UART: [idev] SUBJECT.KEYID = 7
4,334,857 UART: [idev] UDS.KEYID = 0
4,335,875 ready_for_fw is high
4,336,102 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,486,074 UART: [idev] Erasing UDS.KEYID = 0
7,623,086 UART: [idev] Using Sha1 for KeyId Algorithm
7,645,080 UART: [idev] --
7,648,762 UART: [ldev] ++
7,649,355 UART: [ldev] CDI.KEYID = 6
7,650,301 UART: [ldev] SUBJECT.KEYID = 5
7,651,526 UART: [ldev] AUTHORITY.KEYID = 7
7,652,768 UART: [ldev] FE.KEYID = 1
7,664,639 UART: [ldev] Erasing FE.KEYID = 1
10,952,529 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,243,435 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,257,990 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,272,826 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,287,315 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,306,964 UART: [ldev] --
13,311,860 UART: [fwproc] Waiting for Commands...
13,313,967 UART: [fwproc] Received command 0x46574c44
13,316,163 UART: [fwproc] Received Image of size 119428 bytes
17,427,803 UART: [fwproc] Image verified using Vendor ECC Key Index 0
17,506,289 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
17,579,450 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
17,911,820 >>> mbox cmd response: success
17,912,220 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
17,916,629 UART: [afmc] ++
17,917,208 UART: [afmc] CDI.KEYID = 6
17,918,133 UART: [afmc] SUBJECT.KEYID = 7
17,919,415 UART: [afmc] AUTHORITY.KEYID = 5
21,238,225 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
23,533,152 UART: [afmc] Erasing AUTHORITY.KEYID = 5
23,535,424 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
23,549,847 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
23,564,576 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
23,578,989 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
23,600,193 UART: [afmc] --
23,603,256 UART: [cold-reset] --
23,608,157 UART: [state] Locking Datavault
23,612,348 UART: [state] Locking PCR0, PCR1 and PCR31
23,614,097 UART: [state] Locking ICCM
23,616,343 UART: [exit] Launching FMC @ 0x40000130
23,624,721 UART:
23,624,966 UART: Running Caliptra FMC ...
23,626,074 UART:
23,626,241 UART: [state] CFI Enabled
23,634,273 UART: [fht] FMC Alias Private Key: 7
25,974,064 UART: [art] Extend RT PCRs Done
25,975,290 UART: [art] Lock RT PCRs Done
25,976,809 UART: [art] Populate DV Done
25,982,233 UART: [fht] FMC Alias Private Key: 7
25,983,933 UART: [art] Derive CDI
25,984,752 UART: [art] Store in slot 0x4
26,027,106 UART: [art] Derive Key Pair
26,028,158 UART: [art] Store priv key in slot 0x5
29,270,052 UART: [art] Derive Key Pair - Done
29,282,674 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,562,770 UART: [art] Erasing AUTHORITY.KEYID = 7
31,564,317 UART: [art] PUB.X = 08EF4EBE40BC0A76FE30C06AE2CEE4411369E908DF8BF5BEBD8A966959F1349729C5B5223D4CDF9A888CA89F85BB7A5E
31,571,576 UART: [art] PUB.Y = C0D5D0D11EFE47B2B9F1B8FA4A6BA174F588D7DC886C8465F31E6735DDEA810DAB3FD9B66BA2A56518D35CD972473726
31,578,849 UART: [art] SIG.R = 1CCB406DAC0CE2F528159C8597D1D6AB787FDC77361B1B79670C6D2A9F5A77F050A1A080067F5ECF5B9EA04B218124DA
31,586,260 UART: [art] SIG.S = 3986F06D92193D07F0BB1E23E95AB7DDE05B9062973EFC639044E1CB0892B4E89D44E0B60BC6724FC9185A73610F9BC0
32,891,413 UART: Caliptra RT
32,892,117 UART: [state] CFI Enabled
33,025,694 UART: [rt] RT listening for mailbox commands...
33,057,305 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.77s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,217 writing to cptra_bootfsm_go
4,126,723 ready_for_fw is high
4,127,201 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
18,174,952 >>> mbox cmd response: success
18,175,590 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
23,809,231 UART:
23,809,634 UART: Running Caliptra FMC ...
23,810,801 UART:
23,810,963 UART: [state] CFI Enabled
23,818,739 UART: [fht] FMC Alias Private Key: 7
26,158,836 UART: [art] Extend RT PCRs Done
26,160,071 UART: [art] Lock RT PCRs Done
26,161,832 UART: [art] Populate DV Done
26,167,242 UART: [fht] FMC Alias Private Key: 7
26,168,716 UART: [art] Derive CDI
26,169,492 UART: [art] Store in slot 0x4
26,212,068 UART: [art] Derive Key Pair
26,213,121 UART: [art] Store priv key in slot 0x5
29,454,788 UART: [art] Derive Key Pair - Done
29,467,779 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
31,747,995 UART: [art] Erasing AUTHORITY.KEYID = 7
31,749,505 UART: [art] PUB.X = 8CCB7D13DF9991B55CF32C0C6F218D3D11942DD823AAF83210FDF2B41E6468892EDC9716291C9A10DEA2DBDDDD5CB48F
31,756,794 UART: [art] PUB.Y = 0654ED496C3976006A85C1B22E77D1F9A79A1B276F2E9EA7AB08B50B943F1A73562A96886F67385C4C3645C16F432540
31,764,025 UART: [art] SIG.R = A2FCDF4B9D1027B9A12A3C5A43F20A45A797B5154F1EDAD8D7128DD63D5E56B42735D38B5F3A4F68B7F926ECC9A36A5A
31,771,439 UART: [art] SIG.S = 3B88C2CD549948323B5B42A9FB70E502896BEE8A672F4D00CB7D3D0175BCBCBB85ADA9403B991D98902A5D2418E0D1CD
33,077,101 UART: Caliptra RT
33,077,807 UART: [state] CFI Enabled
33,211,442 UART: [rt] RT listening for mailbox commands...
33,242,621 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 83 filtered out; finished in 1.78s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,339 writing to cptra_bootfsm_go
192,479 UART:
192,842 UART: Running Caliptra ROM ...
194,075 UART:
194,242 UART: [state] CFI Enabled
261,626 UART: [state] LifecycleState = Unprovisioned
263,621 UART: [state] DebugLocked = No
265,733 UART: [state] WD Timer not started. Device not locked for debugging
270,271 UART: [kat] SHA2-256
449,908 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
460,660 UART: [kat] ++
461,167 UART: [kat] sha1
471,716 UART: [kat] SHA2-256
474,422 UART: [kat] SHA2-384
480,451 UART: [kat] SHA2-512-ACC
482,829 UART: [kat] ECC-384
2,949,121 UART: [kat] HMAC-384Kdf
2,970,054 UART: [kat] LMS
3,446,544 UART: [kat] --
3,450,426 UART: [cold-reset] ++
3,452,508 UART: [fht] FHT @ 0x50003400
3,463,419 UART: [idev] ++
3,463,989 UART: [idev] CDI.KEYID = 6
3,465,028 UART: [idev] SUBJECT.KEYID = 7
3,466,209 UART: [idev] UDS.KEYID = 0
3,467,143 ready_for_fw is high
3,467,367 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,617,565 UART: [idev] Erasing UDS.KEYID = 0
5,984,969 UART: [idev] Sha1 KeyId Algorithm
6,007,990 UART: [idev] --
6,013,340 UART: [ldev] ++
6,013,931 UART: [ldev] CDI.KEYID = 6
6,014,850 UART: [ldev] SUBJECT.KEYID = 5
6,016,017 UART: [ldev] AUTHORITY.KEYID = 7
6,017,315 UART: [ldev] FE.KEYID = 1
6,056,305 UART: [ldev] Erasing FE.KEYID = 1
8,565,328 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,297,559 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,313,429 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,329,273 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,344,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,366,242 UART: [ldev] --
10,371,834 UART: [fwproc] Wait for Commands...
10,375,181 UART: [fwproc] Recv command 0x46574c44
10,377,172 UART: [fwproc] Recv'd Img size: 119428 bytes
13,875,404 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
13,947,249 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,020,273 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,352,259 >>> mbox cmd response: success
14,352,710 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,356,403 UART: [afmc] ++
14,356,985 UART: [afmc] CDI.KEYID = 6
14,357,940 UART: [afmc] SUBJECT.KEYID = 7
14,359,153 UART: [afmc] AUTHORITY.KEYID = 5
16,889,512 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,612,644 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,614,836 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,630,664 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,646,688 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,662,260 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,686,125 UART: [afmc] --
18,689,145 UART: [cold-reset] --
18,691,547 UART: [state] Locking Datavault
18,695,042 UART: [state] Locking PCR0, PCR1 and PCR31
18,696,787 UART: [state] Locking ICCM
18,698,694 UART: [exit] Launching FMC @ 0x40000130
18,707,125 UART:
18,707,365 UART: Running Caliptra FMC ...
18,708,632 UART:
18,708,814 UART: [state] CFI Enabled
18,770,756 UART: [fht] FMC Alias Private Key: 7
20,536,379 UART: [art] Extend RT PCRs Done
20,537,602 UART: [art] Lock RT PCRs Done
20,539,180 UART: [art] Populate DV Done
20,544,508 UART: [fht] FMC Alias Private Key: 7
20,546,106 UART: [art] Derive CDI
20,546,922 UART: [art] Store in slot 0x4
20,602,813 UART: [art] Derive Key Pair
20,603,877 UART: [art] Store priv key in slot 0x5
23,066,251 UART: [art] Derive Key Pair - Done
23,079,258 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,792,366 UART: [art] Erasing AUTHORITY.KEYID = 7
24,793,873 UART: [art] PUB.X = 8CD8942F10490A7C0CB35DFCF2A9E591B0D75196587E2CBF40BB2DDC02EF2F11D2DAAE1FA20C773703FE708349F4B69E
24,801,168 UART: [art] PUB.Y = 1B4DF41F830D7D7648D54350C1D2CD7E33C5DC352603206574988A84F93469D414F3F4112197159113E65BD184746B58
24,808,373 UART: [art] SIG.R = AC0274B27D28D4B02079D191CF64BBBA1FD565E2CCD2239B806074B88A59396A8D9642AAB86E61600686A124F05C0D31
24,815,742 UART: [art] SIG.S = 9B8FF57395EB73E657896089049E3FA9431E4D77D5A09240943705E8124C5BE2240EB947D23F77F8B533A1FE6EEFDD62
25,794,790 UART: Caliptra RT
25,795,507 UART: [state] CFI Enabled
25,974,856 UART: [rt] RT listening for mailbox commands...
26,006,244 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,972 writing to cptra_bootfsm_go
3,461,862 ready_for_fw is high
3,462,363 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,263,757 >>> mbox cmd response: success
14,264,454 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,565,218 UART:
18,565,628 UART: Running Caliptra FMC ...
18,566,776 UART:
18,566,939 UART: [state] CFI Enabled
18,629,573 UART: [fht] FMC Alias Private Key: 7
20,396,355 UART: [art] Extend RT PCRs Done
20,397,599 UART: [art] Lock RT PCRs Done
20,398,880 UART: [art] Populate DV Done
20,404,134 UART: [fht] FMC Alias Private Key: 7
20,405,846 UART: [art] Derive CDI
20,406,677 UART: [art] Store in slot 0x4
20,462,144 UART: [art] Derive Key Pair
20,463,157 UART: [art] Store priv key in slot 0x5
22,926,474 UART: [art] Derive Key Pair - Done
22,939,491 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,652,440 UART: [art] Erasing AUTHORITY.KEYID = 7
24,653,955 UART: [art] PUB.X = 16A621FB7A0349BAF204A3482B58D56BD09F04D6479B736728BA74C80223DC45D4AA8E4697611DF58E378F6D167EC447
24,661,212 UART: [art] PUB.Y = 60DDD55080AD4DA1C3441CA47BEEFA4F65DFF63F615DA3FB2B29FE94F42B0E568365AB3FEB5A2E159C3C1441DD149A49
24,668,493 UART: [art] SIG.R = A9A1C88D1F75E36142AD2B4C1D21039D6D2491D71664E162C64A54228592E8E56594DEB6E1E4246837505907F41E296E
24,675,866 UART: [art] SIG.S = 7C6D24901C0D71487386818E9C4FFE0A4161B870F49BAFE5D5FF930EA16158D913DA9186DDBAEEBCB500581F3A0DDA13
25,653,994 UART: Caliptra RT
25,654,700 UART: [state] CFI Enabled
25,836,624 UART: [rt] RT listening for mailbox commands...
25,867,901 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,370 writing to cptra_bootfsm_go
192,693 UART:
193,080 UART: Running Caliptra ROM ...
194,306 UART:
604,030 UART: [state] CFI Enabled
618,059 UART: [state] LifecycleState = Unprovisioned
619,862 UART: [state] DebugLocked = No
621,726 UART: [state] WD Timer not started. Device not locked for debugging
625,307 UART: [kat] SHA2-256
804,966 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
815,792 UART: [kat] ++
816,279 UART: [kat] sha1
827,473 UART: [kat] SHA2-256
830,179 UART: [kat] SHA2-384
836,111 UART: [kat] SHA2-512-ACC
838,487 UART: [kat] ECC-384
3,278,865 UART: [kat] HMAC-384Kdf
3,290,845 UART: [kat] LMS
3,767,350 UART: [kat] --
3,771,282 UART: [cold-reset] ++
3,772,720 UART: [fht] FHT @ 0x50003400
3,785,119 UART: [idev] ++
3,785,726 UART: [idev] CDI.KEYID = 6
3,786,646 UART: [idev] SUBJECT.KEYID = 7
3,787,899 UART: [idev] UDS.KEYID = 0
3,788,837 ready_for_fw is high
3,789,067 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,939,184 UART: [idev] Erasing UDS.KEYID = 0
6,266,497 UART: [idev] Sha1 KeyId Algorithm
6,289,462 UART: [idev] --
6,294,755 UART: [ldev] ++
6,295,333 UART: [ldev] CDI.KEYID = 6
6,296,320 UART: [ldev] SUBJECT.KEYID = 5
6,297,489 UART: [ldev] AUTHORITY.KEYID = 7
6,298,726 UART: [ldev] FE.KEYID = 1
6,310,080 UART: [ldev] Erasing FE.KEYID = 1
8,786,805 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,507,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,523,601 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,539,473 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,555,043 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,576,035 UART: [ldev] --
10,581,033 UART: [fwproc] Wait for Commands...
10,583,902 UART: [fwproc] Recv command 0x46574c44
10,585,903 UART: [fwproc] Recv'd Img size: 119428 bytes
14,076,402 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,162,369 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,235,391 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,566,058 >>> mbox cmd response: success
14,566,454 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,570,875 UART: [afmc] ++
14,571,455 UART: [afmc] CDI.KEYID = 6
14,572,568 UART: [afmc] SUBJECT.KEYID = 7
14,573,674 UART: [afmc] AUTHORITY.KEYID = 5
17,079,028 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,804,132 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,806,320 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,822,155 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,838,211 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
18,853,765 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
18,878,403 UART: [afmc] --
18,881,449 UART: [cold-reset] --
18,884,990 UART: [state] Locking Datavault
18,890,382 UART: [state] Locking PCR0, PCR1 and PCR31
18,892,142 UART: [state] Locking ICCM
18,893,434 UART: [exit] Launching FMC @ 0x40000130
18,901,846 UART:
18,902,168 UART: Running Caliptra FMC ...
18,903,292 UART:
18,903,472 UART: [state] CFI Enabled
18,911,812 UART: [fht] FMC Alias Private Key: 7
20,677,792 UART: [art] Extend RT PCRs Done
20,679,015 UART: [art] Lock RT PCRs Done
20,680,400 UART: [art] Populate DV Done
20,685,793 UART: [fht] FMC Alias Private Key: 7
20,687,458 UART: [art] Derive CDI
20,688,275 UART: [art] Store in slot 0x4
20,730,505 UART: [art] Derive Key Pair
20,731,511 UART: [art] Store priv key in slot 0x5
23,157,956 UART: [art] Derive Key Pair - Done
23,170,827 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,876,717 UART: [art] Erasing AUTHORITY.KEYID = 7
24,878,204 UART: [art] PUB.X = B1AA5BD6D57DF52A0F5823D77ABFAEF08C9803D72DD11FC102C1EA29EFA560F5B7E7594C866F70A5B4FB3A7C7AACF97E
24,885,517 UART: [art] PUB.Y = 2BF9DE260112EEA24994BF41FD12108E70D0C22DBA95A12D70D3E12CDA2FDE53575DE347BAAEB3720E2AB70ED13FB06B
24,892,818 UART: [art] SIG.R = 655A65EBA1A585CE95EA62530872D9A0190B1B2A0BE95C0DA3DF823D490F7B066E3AD1FA05D9392EC60ECBDEFBB609A4
24,900,282 UART: [art] SIG.S = 9C9683AE50CDB3E6DFB723EF3E661C8846C52DE9539E5789622FBC86D4A4BDD7225B504CFE8C6D8791E3476F729B4355
25,878,920 UART: Caliptra RT
25,879,634 UART: [state] CFI Enabled
26,013,330 UART: [rt] RT listening for mailbox commands...
26,044,640 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.42s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,382 writing to cptra_bootfsm_go
3,777,061 ready_for_fw is high
3,777,742 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,457,732 >>> mbox cmd response: success
14,458,311 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
18,710,574 UART:
18,710,951 UART: Running Caliptra FMC ...
18,712,102 UART:
18,712,260 UART: [state] CFI Enabled
18,720,152 UART: [fht] FMC Alias Private Key: 7
20,486,621 UART: [art] Extend RT PCRs Done
20,487,848 UART: [art] Lock RT PCRs Done
20,489,501 UART: [art] Populate DV Done
20,494,895 UART: [fht] FMC Alias Private Key: 7
20,496,462 UART: [art] Derive CDI
20,497,197 UART: [art] Store in slot 0x4
20,539,510 UART: [art] Derive Key Pair
20,540,511 UART: [art] Store priv key in slot 0x5
22,967,338 UART: [art] Derive Key Pair - Done
22,980,274 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
24,686,367 UART: [art] Erasing AUTHORITY.KEYID = 7
24,687,876 UART: [art] PUB.X = A64E9A641715AAC06222E021DE944CD2E2E5E1100DD894AC48FD84DF895EED688CD9B08C11AA1F59EF31C1A9AABF18DC
24,695,160 UART: [art] PUB.Y = 349A4F2704083F66B02B1EFCF66763150D1604D007EED21450655252621B8BF42B0EFBB19AC8333EEA101D94B407B9FD
24,702,451 UART: [art] SIG.R = 9B350382F088E29FEF049C24211159919B2AE9F53156262B125D102D2CBECECC169F040B3D4EA1480E7235A449ED0BEC
24,709,792 UART: [art] SIG.S = D5FEEDB9988E10A89C1A627A42DAE45B0B952107DAA54E7780B5ACB710215097B46F6D5022F2051FEC3B0402060C5EDA
25,688,838 UART: Caliptra RT
25,689,540 UART: [state] CFI Enabled
25,822,582 UART: [rt] RT listening for mailbox commands...
25,853,940 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.41s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,971 writing to cptra_bootfsm_go
192,215 UART:
192,577 UART: Running Caliptra ROM ...
193,698 UART:
193,866 UART: [state] CFI Enabled
265,381 UART: [state] LifecycleState = Unprovisioned
267,762 UART: [state] DebugLocked = No
268,956 UART: [state] WD Timer not started. Device not locked for debugging
273,348 UART: [kat] SHA2-256
463,198 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
473,943 UART: [kat] ++
474,425 UART: [kat] sha1
484,878 UART: [kat] SHA2-256
487,897 UART: [kat] SHA2-384
492,905 UART: [kat] SHA2-512-ACC
495,493 UART: [kat] ECC-384
2,950,715 UART: [kat] HMAC-384Kdf
2,971,763 UART: [kat] LMS
3,503,524 UART: [kat] --
3,507,876 UART: [cold-reset] ++
3,509,973 UART: [fht] FHT @ 0x50003400
3,522,380 UART: [idev] ++
3,523,028 UART: [idev] CDI.KEYID = 6
3,524,071 UART: [idev] SUBJECT.KEYID = 7
3,525,256 UART: [idev] UDS.KEYID = 0
3,526,454 ready_for_fw is high
3,526,679 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
3,677,431 UART: [idev] Erasing UDS.KEYID = 0
6,026,887 UART: [idev] Sha1 KeyId Algorithm
6,050,507 UART: [idev] --
6,055,167 UART: [ldev] ++
6,055,863 UART: [ldev] CDI.KEYID = 6
6,056,799 UART: [ldev] SUBJECT.KEYID = 5
6,057,975 UART: [ldev] AUTHORITY.KEYID = 7
6,059,162 UART: [ldev] FE.KEYID = 1
6,100,900 UART: [ldev] Erasing FE.KEYID = 1
8,608,177 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,342,081 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,357,292 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,372,490 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,387,616 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,409,499 UART: [ldev] --
10,414,450 UART: [fwproc] Wait for Commands...
10,416,230 UART: [fwproc] Recv command 0x46574c44
10,418,493 UART: [fwproc] Recv'd Img size: 119428 bytes
13,926,497 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,008,783 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,132,424 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,698,617 >>> mbox cmd response: success
14,699,040 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,701,970 UART: [afmc] ++
14,702,653 UART: [afmc] CDI.KEYID = 6
14,703,834 UART: [afmc] SUBJECT.KEYID = 7
14,705,347 UART: [afmc] AUTHORITY.KEYID = 5
17,238,087 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
18,957,955 UART: [afmc] Erase AUTHORITY.KEYID = 5
18,959,877 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
18,974,971 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
18,990,125 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,005,027 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,028,491 UART: [afmc] --
19,031,820 UART: [cold-reset] --
19,036,314 UART: [state] Locking Datavault
19,039,566 UART: [state] Locking PCR0, PCR1 and PCR31
19,041,718 UART: [state] Locking ICCM
19,043,898 UART: [exit] Launching FMC @ 0x40000130
19,052,571 UART:
19,052,809 UART: Running Caliptra FMC ...
19,053,860 UART:
19,054,017 UART: [state] CFI Enabled
19,116,254 UART: [fht] FMC Alias Private Key: 7
20,883,267 UART: [art] Extend RT PCRs Done
20,884,495 UART: [art] Lock RT PCRs Done
20,885,976 UART: [art] Populate DV Done
20,891,543 UART: [fht] FMC Alias Private Key: 7
20,893,009 UART: [art] Derive CDI
20,893,748 UART: [art] Store in slot 0x4
20,949,497 UART: [art] Derive Key Pair
20,950,542 UART: [art] Store priv key in slot 0x5
23,413,068 UART: [art] Derive Key Pair - Done
23,426,498 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,139,043 UART: [art] Erasing AUTHORITY.KEYID = 7
25,140,553 UART: [art] PUB.X = FBE6E1C8F224AC9425ABDB7CB2AA006CF8221DB143CD3A2704979755F1AEFA81F309D3E62DBD3CB0D0C3C5FE64368FF5
25,147,880 UART: [art] PUB.Y = 750ADCCED0CF033D7E0DC8F377DD7582DA1A7CF92B23D5ABA2615D1009E7E20A38E2F5CA8C8AA9EB532ABDDEF630FBF2
25,155,146 UART: [art] SIG.R = 5AF807F12E82CDBEC00B110759FEFFE15569536DD2E3702E276EDC24BE0E878D96EEE663823263440C575C0B2E4C7201
25,162,516 UART: [art] SIG.S = D9FDB727676E176672ABEFC112C00D5A5CD2503DB6D85F51BF1BAFBB1F46DC29DD31A82D9AAC4ABE2A2A30187C0FA812
26,141,530 UART: Caliptra RT
26,142,228 UART: [state] CFI Enabled
26,322,106 UART: [rt] RT listening for mailbox commands...
26,353,463 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.43s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,987 writing to cptra_bootfsm_go
3,437,784 ready_for_fw is high
3,438,186 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
14,832,993 >>> mbox cmd response: success
14,833,700 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,113,196 UART:
19,113,595 UART: Running Caliptra FMC ...
19,114,776 UART:
19,114,946 UART: [state] CFI Enabled
19,180,274 UART: [fht] FMC Alias Private Key: 7
20,946,927 UART: [art] Extend RT PCRs Done
20,948,150 UART: [art] Lock RT PCRs Done
20,949,854 UART: [art] Populate DV Done
20,955,363 UART: [fht] FMC Alias Private Key: 7
20,956,964 UART: [art] Derive CDI
20,957,732 UART: [art] Store in slot 0x4
21,013,108 UART: [art] Derive Key Pair
21,014,156 UART: [art] Store priv key in slot 0x5
23,476,925 UART: [art] Derive Key Pair - Done
23,489,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,203,732 UART: [art] Erasing AUTHORITY.KEYID = 7
25,205,245 UART: [art] PUB.X = 5A3EEF497972CFCC8582363D33CF75C15DABAD256FD5AD45DAD0919C0C9ED5A26BB46E8C0BF674162463833C6EAE9A1D
25,212,534 UART: [art] PUB.Y = 11440301C4CDC2D3189DD0186B738157E77953C54D1AD747FFD2B3453007E6F13352412278691F41D99614345EB912FB
25,219,975 UART: [art] SIG.R = 8E5A9B94E3FE4C1FCB403B4340DA71B972730E62C7C6A2BB5DB53DB6E1294467517F5B7991442535993F9C829D503AA4
25,227,165 UART: [art] SIG.S = 953A7C5BBF32D4813EAA5DBBBCC043CCDDFD13613DE74F6CE5BB37478CDEBA3C8F125794E7F25E39AD157E8310708CF7
26,205,676 UART: Caliptra RT
26,206,417 UART: [state] CFI Enabled
26,387,927 UART: [rt] RT listening for mailbox commands...
26,418,994 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,256 writing to cptra_bootfsm_go
192,536 UART:
193,240 UART: Running Caliptra ROM ...
194,478 UART:
603,804 UART: [state] CFI Enabled
621,229 UART: [state] LifecycleState = Unprovisioned
623,610 UART: [state] DebugLocked = No
624,863 UART: [state] WD Timer not started. Device not locked for debugging
629,404 UART: [kat] SHA2-256
819,313 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
830,135 UART: [kat] ++
830,585 UART: [kat] sha1
841,347 UART: [kat] SHA2-256
844,409 UART: [kat] SHA2-384
850,134 UART: [kat] SHA2-512-ACC
852,722 UART: [kat] ECC-384
3,295,702 UART: [kat] HMAC-384Kdf
3,308,877 UART: [kat] LMS
3,840,715 UART: [kat] --
3,847,179 UART: [cold-reset] ++
3,849,622 UART: [fht] FHT @ 0x50003400
3,861,464 UART: [idev] ++
3,862,119 UART: [idev] CDI.KEYID = 6
3,863,159 UART: [idev] SUBJECT.KEYID = 7
3,864,271 UART: [idev] UDS.KEYID = 0
3,865,220 ready_for_fw is high
3,865,430 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
4,015,423 UART: [idev] Erasing UDS.KEYID = 0
6,342,074 UART: [idev] Sha1 KeyId Algorithm
6,364,082 UART: [idev] --
6,368,768 UART: [ldev] ++
6,369,465 UART: [ldev] CDI.KEYID = 6
6,370,351 UART: [ldev] SUBJECT.KEYID = 5
6,371,568 UART: [ldev] AUTHORITY.KEYID = 7
6,372,803 UART: [ldev] FE.KEYID = 1
6,383,047 UART: [ldev] Erasing FE.KEYID = 1
8,861,698 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,581,554 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,596,737 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,611,922 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,627,029 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,648,842 UART: [ldev] --
10,654,551 UART: [fwproc] Wait for Commands...
10,657,256 UART: [fwproc] Recv command 0x46574c44
10,659,526 UART: [fwproc] Recv'd Img size: 119428 bytes
14,166,476 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
14,248,479 UART: [fwproc] Load FMC at address 0x40000000 len 20044
14,372,125 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
14,937,820 >>> mbox cmd response: success
14,938,270 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
14,941,406 UART: [afmc] ++
14,942,115 UART: [afmc] CDI.KEYID = 6
14,943,328 UART: [afmc] SUBJECT.KEYID = 7
14,944,782 UART: [afmc] AUTHORITY.KEYID = 5
17,444,862 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
19,167,162 UART: [afmc] Erase AUTHORITY.KEYID = 5
19,169,120 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
19,184,205 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
19,199,372 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
19,214,283 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
19,237,779 UART: [afmc] --
19,241,051 UART: [cold-reset] --
19,244,704 UART: [state] Locking Datavault
19,248,704 UART: [state] Locking PCR0, PCR1 and PCR31
19,250,855 UART: [state] Locking ICCM
19,252,632 UART: [exit] Launching FMC @ 0x40000130
19,261,298 UART:
19,261,559 UART: Running Caliptra FMC ...
19,262,666 UART:
19,262,825 UART: [state] CFI Enabled
19,271,023 UART: [fht] FMC Alias Private Key: 7
21,037,438 UART: [art] Extend RT PCRs Done
21,038,672 UART: [art] Lock RT PCRs Done
21,040,258 UART: [art] Populate DV Done
21,045,585 UART: [fht] FMC Alias Private Key: 7
21,047,048 UART: [art] Derive CDI
21,047,823 UART: [art] Store in slot 0x4
21,090,635 UART: [art] Derive Key Pair
21,091,681 UART: [art] Store priv key in slot 0x5
23,518,909 UART: [art] Derive Key Pair - Done
23,531,961 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,238,449 UART: [art] Erasing AUTHORITY.KEYID = 7
25,239,958 UART: [art] PUB.X = D7130A13D3F06CB4596B8A642FEACE4438B23791203CFDCF2D04AB5E6293B28744DDDB09EA0FD4921DCC8EE0AA9E349B
25,247,267 UART: [art] PUB.Y = D36671BB68E5D391895D54CD833DD96570FC9B9C1B429151227E5C7FAF72C163D5D4EC6279E504682882F72D442D5E1F
25,254,512 UART: [art] SIG.R = 08A68E88A174E274FDD5BB8272EA281B68973291AB4CC5AB42B3FB13350D90ECA204DE8C4AF868498D804ECD39494D40
25,261,882 UART: [art] SIG.S = DBB87995241D95DA886B179246551FD305D2436E056CC2E73C28D298275A6D3684B4802C2AD410A643635664B94E0FDD
26,241,078 UART: Caliptra RT
26,241,773 UART: [state] CFI Enabled
26,374,658 UART: [rt] RT listening for mailbox commands...
26,406,535 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,178 writing to cptra_bootfsm_go
3,755,598 ready_for_fw is high
3,756,254 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
15,064,083 >>> mbox cmd response: success
15,064,613 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
19,313,883 UART:
19,314,274 UART: Running Caliptra FMC ...
19,315,455 UART:
19,315,636 UART: [state] CFI Enabled
19,323,302 UART: [fht] FMC Alias Private Key: 7
21,089,355 UART: [art] Extend RT PCRs Done
21,090,581 UART: [art] Lock RT PCRs Done
21,092,160 UART: [art] Populate DV Done
21,097,606 UART: [fht] FMC Alias Private Key: 7
21,099,179 UART: [art] Derive CDI
21,100,005 UART: [art] Store in slot 0x4
21,142,498 UART: [art] Derive Key Pair
21,143,503 UART: [art] Store priv key in slot 0x5
23,569,711 UART: [art] Derive Key Pair - Done
23,582,982 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
25,289,433 UART: [art] Erasing AUTHORITY.KEYID = 7
25,290,944 UART: [art] PUB.X = C3C3BF96511968576BCF08B2BC6314A130907D6E2FBD2089E73460623C356E3A0678BCA07DFADBB707D565138DB123AD
25,298,199 UART: [art] PUB.Y = 54D6DAA06CB338A962A62E8B0506BA0C1C7212897C770B02074090DE04E4C1C9F3CD3BB415BB1BEA2C4C924D266EED9B
25,305,446 UART: [art] SIG.R = D153BAC5BBA234F4FE19F85AF71359D50433A8EAE96482028EF8462788B6AB4B45A4E133CBA0929AB714FE31848FE11D
25,312,900 UART: [art] SIG.S = 9DD5365C12B403249D09DD08A5975B777969DD45240F06B22A54F5F2725A893D3A1F73F37E76D7E490576C18E9B33BFB
26,291,551 UART: Caliptra RT
26,292,261 UART: [state] CFI Enabled
26,425,347 UART: [rt] RT listening for mailbox commands...
26,456,859 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 112 filtered out; finished in 1.44s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,010 UART: [state] LifecycleState = Unprovisioned
85,665 UART: [state] DebugLocked = No
86,251 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,949 UART: [kat] SHA2-256
881,880 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
885,995 UART: [kat] ++
886,147 UART: [kat] sha1
890,539 UART: [kat] SHA2-256
892,477 UART: [kat] SHA2-384
895,272 UART: [kat] SHA2-512-ACC
897,173 UART: [kat] ECC-384
902,638 UART: [kat] HMAC-384Kdf
907,260 UART: [kat] LMS
1,475,456 UART: [kat] --
1,476,405 UART: [cold-reset] ++
1,476,925 UART: [fht] Storing FHT @ 0x50003400
1,479,754 UART: [idev] ++
1,479,922 UART: [idev] CDI.KEYID = 6
1,480,282 UART: [idev] SUBJECT.KEYID = 7
1,480,706 UART: [idev] UDS.KEYID = 0
1,481,051 ready_for_fw is high
1,481,051 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,488,628 UART: [idev] Erasing UDS.KEYID = 0
1,505,322 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,016 UART: [idev] --
1,514,991 UART: [ldev] ++
1,515,159 UART: [ldev] CDI.KEYID = 6
1,515,522 UART: [ldev] SUBJECT.KEYID = 5
1,515,948 UART: [ldev] AUTHORITY.KEYID = 7
1,516,411 UART: [ldev] FE.KEYID = 1
1,521,443 UART: [ldev] Erasing FE.KEYID = 1
1,546,764 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,527 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,243 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,134 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,846 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,780 UART: [ldev] --
1,586,233 UART: [fwproc] Waiting for Commands...
1,587,012 UART: [fwproc] Received command 0x46574c44
1,587,803 UART: [fwproc] Received Image of size 119428 bytes
2,942,905 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,067 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,001,285 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,026 >>> mbox cmd response: success
3,143,026 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,144,058 UART: [afmc] ++
3,144,226 UART: [afmc] CDI.KEYID = 6
3,144,588 UART: [afmc] SUBJECT.KEYID = 7
3,145,013 UART: [afmc] AUTHORITY.KEYID = 5
3,179,658 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,195,724 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,196,504 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,202,213 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,208,096 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,213,779 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,221,807 UART: [afmc] --
3,222,773 UART: [cold-reset] --
3,223,725 UART: [state] Locking Datavault
3,224,532 UART: [state] Locking PCR0, PCR1 and PCR31
3,225,136 UART: [state] Locking ICCM
3,225,772 UART: [exit] Launching FMC @ 0x40000130
3,231,102 UART:
3,231,118 UART: Running Caliptra FMC ...
3,231,526 UART:
3,231,580 UART: [state] CFI Enabled
3,242,170 UART: [fht] FMC Alias Private Key: 7
3,360,654 UART: [art] Extend RT PCRs Done
3,361,082 UART: [art] Lock RT PCRs Done
3,362,426 UART: [art] Populate DV Done
3,370,471 UART: [fht] FMC Alias Private Key: 7
3,371,653 UART: [art] Derive CDI
3,371,933 UART: [art] Store in slot 0x4
3,457,801 UART: [art] Derive Key Pair
3,458,161 UART: [art] Store priv key in slot 0x5
3,471,618 UART: [art] Derive Key Pair - Done
3,486,315 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,501,564 UART: [art] Erasing AUTHORITY.KEYID = 7
3,502,329 UART: [art] PUB.X = 11C58F9485A90349FAFD232691B225B4A881B6C4709A2B496123A87D5401B26DB7BE20AE2B8C2B392385C5A07283CA2C
3,509,093 UART: [art] PUB.Y = AE7C792934592C9DC630787D0B89C6F8DA016D5B29616BD81014CEFFB24469D3187BCAC2C133C251A93663536499A55A
3,516,037 UART: [art] SIG.R = CE1FCB631418EF9C176EDC866B64A3005B8076425DF298394B28CC8FEBFE47E48E738333DC44B5F24D3808960D6A8C8F
3,522,787 UART: [art] SIG.S = CF3579B722384FC9101B4D54A6AEDC98D5EBA88F15AF58704A1B28794B741365F9DB480B02B7FB6C2279669BE6830777
3,547,004 UART: Caliptra RT
3,547,255 UART: [state] CFI Enabled
3,667,104 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,697,386 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,857 ready_for_fw is high
1,362,857 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,142 >>> mbox cmd response: success
2,992,142 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,052,953 UART:
3,052,969 UART: Running Caliptra FMC ...
3,053,377 UART:
3,053,431 UART: [state] CFI Enabled
3,064,019 UART: [fht] FMC Alias Private Key: 7
3,183,055 UART: [art] Extend RT PCRs Done
3,183,483 UART: [art] Lock RT PCRs Done
3,184,697 UART: [art] Populate DV Done
3,193,114 UART: [fht] FMC Alias Private Key: 7
3,194,084 UART: [art] Derive CDI
3,194,364 UART: [art] Store in slot 0x4
3,280,038 UART: [art] Derive Key Pair
3,280,398 UART: [art] Store priv key in slot 0x5
3,294,117 UART: [art] Derive Key Pair - Done
3,308,978 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,324,127 UART: [art] Erasing AUTHORITY.KEYID = 7
3,324,892 UART: [art] PUB.X = EE897EFA7387F48D2C5157F102E9E563B201F84CEA6170147534603586002FBFE98DE2DF3700BD6DAF5BE4A991F659BE
3,331,620 UART: [art] PUB.Y = 7E41A352C16C60FC27BBCE1848184FFEA4BF824D0B5FC3B549DD6EFE06ADAE983B5AA4FFFE3079AE50A3266E3CF292A9
3,338,590 UART: [art] SIG.R = 349285E4AEBD0FABC60CCCE06848A700330B6556E4EA2EC611C638F63AC8DDEBAD0FA6F75A4EAEE4FA13DF90CCE30F07
3,345,350 UART: [art] SIG.S = 8A64FF134C2818243A1DE8E19F8F2470AF111E877A822C168565CAD7DAFF67E3A772459AD9B1F0D3DA1FC195F23ED090
3,369,428 UART: Caliptra RT
3,369,679 UART: [state] CFI Enabled
3,489,809 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,520,283 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,893 UART: [state] LifecycleState = Unprovisioned
86,548 UART: [state] DebugLocked = No
87,274 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,976 UART: [kat] SHA2-256
882,907 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
887,022 UART: [kat] ++
887,174 UART: [kat] sha1
891,540 UART: [kat] SHA2-256
893,478 UART: [kat] SHA2-384
896,225 UART: [kat] SHA2-512-ACC
898,126 UART: [kat] ECC-384
903,975 UART: [kat] HMAC-384Kdf
908,731 UART: [kat] LMS
1,476,927 UART: [kat] --
1,477,842 UART: [cold-reset] ++
1,478,204 UART: [fht] Storing FHT @ 0x50003400
1,480,881 UART: [idev] ++
1,481,049 UART: [idev] CDI.KEYID = 6
1,481,409 UART: [idev] SUBJECT.KEYID = 7
1,481,833 UART: [idev] UDS.KEYID = 0
1,482,178 ready_for_fw is high
1,482,178 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,489,441 UART: [idev] Erasing UDS.KEYID = 0
1,505,721 UART: [idev] Using Sha1 for KeyId Algorithm
1,514,225 UART: [idev] --
1,515,064 UART: [ldev] ++
1,515,232 UART: [ldev] CDI.KEYID = 6
1,515,595 UART: [ldev] SUBJECT.KEYID = 5
1,516,021 UART: [ldev] AUTHORITY.KEYID = 7
1,516,484 UART: [ldev] FE.KEYID = 1
1,521,618 UART: [ldev] Erasing FE.KEYID = 1
1,547,057 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,942 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,566,658 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,572,549 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,578,261 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,585,375 UART: [ldev] --
1,586,866 UART: [fwproc] Waiting for Commands...
1,587,677 UART: [fwproc] Received command 0x46574c44
1,588,468 UART: [fwproc] Received Image of size 119428 bytes
2,943,850 UART: [fwproc] Image verified using Vendor ECC Key Index 0
2,970,946 UART: [fwproc] Loading FMC at address 0x40000000 len 20044
3,002,164 UART: [fwproc] Loading Runtime at address 0x40005000 len 93500
3,143,813 >>> mbox cmd response: success
3,143,813 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,144,905 UART: [afmc] ++
3,145,073 UART: [afmc] CDI.KEYID = 6
3,145,435 UART: [afmc] SUBJECT.KEYID = 7
3,145,860 UART: [afmc] AUTHORITY.KEYID = 5
3,180,875 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
3,197,129 UART: [afmc] Erasing AUTHORITY.KEYID = 5
3,197,909 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
3,203,618 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
3,209,501 UART: [afmc] SIG.R = 66A9A62DE3AA1A73A53715140F270674C132206B9D5B66B217DD77001A1B194E27BB35B70C4DB1D637FC5D5386EC0617
3,215,184 UART: [afmc] SIG.S = FC219B1C5C815704C8541F7AEA1AD55B526DAAF3B37C46117F54E8CB4329025970A2EE5B2D241C0658C744D3C7FB6407
3,223,196 UART: [afmc] --
3,224,300 UART: [cold-reset] --
3,225,454 UART: [state] Locking Datavault
3,226,587 UART: [state] Locking PCR0, PCR1 and PCR31
3,227,191 UART: [state] Locking ICCM
3,227,791 UART: [exit] Launching FMC @ 0x40000130
3,233,121 UART:
3,233,137 UART: Running Caliptra FMC ...
3,233,545 UART:
3,233,688 UART: [state] CFI Enabled
3,244,446 UART: [fht] FMC Alias Private Key: 7
3,363,650 UART: [art] Extend RT PCRs Done
3,364,078 UART: [art] Lock RT PCRs Done
3,365,262 UART: [art] Populate DV Done
3,373,497 UART: [fht] FMC Alias Private Key: 7
3,374,541 UART: [art] Derive CDI
3,374,821 UART: [art] Store in slot 0x4
3,460,289 UART: [art] Derive Key Pair
3,460,649 UART: [art] Store priv key in slot 0x5
3,474,124 UART: [art] Derive Key Pair - Done
3,488,686 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,504,229 UART: [art] Erasing AUTHORITY.KEYID = 7
3,504,994 UART: [art] PUB.X = 6774667063E0542F7B8EA4B3C445D40961C5A2E701E1A7840DB834A7C65B398DC51424F3096BBF92928D717A8DAE7693
3,511,748 UART: [art] PUB.Y = 7DAA39F1634AC62D5F19F7948E8259F774F532BA84873D6B53FEAE38E2BDD62FC38B93BA06625C354D9D1C2403DF806F
3,518,702 UART: [art] SIG.R = 56EF1024F408A15BEBF8D657DE10C261F61FF365FF2F1ED97EA399AFBA82939B483D9C86B6B5665E54FCB1B1EB68BE5C
3,525,489 UART: [art] SIG.S = 002F417DCD0ABB922FBFD980F6AF029AF2D6AD7C2D7C113A64DDF3ED2BA923EBBDA32E5872047698B0D5ED3278C28447
3,549,080 UART: Caliptra RT
3,549,423 UART: [state] CFI Enabled
3,669,760 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,700,154 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.34s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,362,648 ready_for_fw is high
1,362,648 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,992,405 >>> mbox cmd response: success
2,992,405 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
3,054,736 UART:
3,054,752 UART: Running Caliptra FMC ...
3,055,160 UART:
3,055,303 UART: [state] CFI Enabled
3,065,977 UART: [fht] FMC Alias Private Key: 7
3,185,819 UART: [art] Extend RT PCRs Done
3,186,247 UART: [art] Lock RT PCRs Done
3,187,591 UART: [art] Populate DV Done
3,196,032 UART: [fht] FMC Alias Private Key: 7
3,196,964 UART: [art] Derive CDI
3,197,244 UART: [art] Store in slot 0x4
3,283,188 UART: [art] Derive Key Pair
3,283,548 UART: [art] Store priv key in slot 0x5
3,297,277 UART: [art] Derive Key Pair - Done
3,311,870 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,327,489 UART: [art] Erasing AUTHORITY.KEYID = 7
3,328,254 UART: [art] PUB.X = 832A87D4DDC1D91891592EE867082F3CCF3B9461854BD08ECF8BE5886F89FAC282720893BBC7D84D928DF4EF6367085A
3,335,021 UART: [art] PUB.Y = 5B7F61C964A334913E36AB46B03129A2BD4AB8A65B9BD49BD6BAFA88454F4F7EAEA0CC35A31318AAB789CC7247D77E9E
3,341,989 UART: [art] SIG.R = 83F647BC4DF7846776B4091814EC8B05C9796143622B5B91B1895CA181CBE818D364D4C4B28112980FF9184EF0919D36
3,348,742 UART: [art] SIG.S = DCDCBFE513A3FBB619DA5B977400DB5B0C53F4A9FAD7483F2EE82537B7BF5245F8C4E629F964C96BAD2DA9FDF45301DD
3,372,494 UART: Caliptra RT
3,372,837 UART: [state] CFI Enabled
3,493,600 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,524,260 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 82 filtered out; finished in 1.33s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,430 UART: [state] LifecycleState = Unprovisioned
86,085 UART: [state] DebugLocked = No
86,709 UART: [state] WD Timer not started. Device not locked for debugging
87,958 UART: [kat] SHA2-256
891,508 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,612 UART: [kat] ++
895,764 UART: [kat] sha1
899,876 UART: [kat] SHA2-256
901,816 UART: [kat] SHA2-384
904,439 UART: [kat] SHA2-512-ACC
906,340 UART: [kat] ECC-384
915,583 UART: [kat] HMAC-384Kdf
920,145 UART: [kat] LMS
1,168,457 UART: [kat] --
1,169,138 UART: [cold-reset] ++
1,169,666 UART: [fht] FHT @ 0x50003400
1,172,332 UART: [idev] ++
1,172,500 UART: [idev] CDI.KEYID = 6
1,172,861 UART: [idev] SUBJECT.KEYID = 7
1,173,286 UART: [idev] UDS.KEYID = 0
1,173,632 ready_for_fw is high
1,173,632 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,417 UART: [idev] Erasing UDS.KEYID = 0
1,198,283 UART: [idev] Sha1 KeyId Algorithm
1,207,239 UART: [idev] --
1,208,278 UART: [ldev] ++
1,208,446 UART: [ldev] CDI.KEYID = 6
1,208,810 UART: [ldev] SUBJECT.KEYID = 5
1,209,237 UART: [ldev] AUTHORITY.KEYID = 7
1,209,700 UART: [ldev] FE.KEYID = 1
1,215,108 UART: [ldev] Erasing FE.KEYID = 1
1,241,245 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,731 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,447 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,336 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,048 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,144 UART: [ldev] --
1,280,433 UART: [fwproc] Wait for Commands...
1,281,198 UART: [fwproc] Recv command 0x46574c44
1,281,931 UART: [fwproc] Recv'd Img size: 119428 bytes
2,638,074 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,665,677 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,696,852 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,838,417 >>> mbox cmd response: success
2,838,417 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,839,663 UART: [afmc] ++
2,839,831 UART: [afmc] CDI.KEYID = 6
2,840,194 UART: [afmc] SUBJECT.KEYID = 7
2,840,620 UART: [afmc] AUTHORITY.KEYID = 5
2,876,281 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,832 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,893,581 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,899,291 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,905,172 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,873 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,918,680 UART: [afmc] --
2,919,611 UART: [cold-reset] --
2,920,681 UART: [state] Locking Datavault
2,921,628 UART: [state] Locking PCR0, PCR1 and PCR31
2,922,232 UART: [state] Locking ICCM
2,922,660 UART: [exit] Launching FMC @ 0x40000130
2,927,990 UART:
2,928,006 UART: Running Caliptra FMC ...
2,928,414 UART:
2,928,468 UART: [state] CFI Enabled
2,939,266 UART: [fht] FMC Alias Private Key: 7
3,058,080 UART: [art] Extend RT PCRs Done
3,058,508 UART: [art] Lock RT PCRs Done
3,060,304 UART: [art] Populate DV Done
3,068,529 UART: [fht] FMC Alias Private Key: 7
3,069,529 UART: [art] Derive CDI
3,069,809 UART: [art] Store in slot 0x4
3,155,898 UART: [art] Derive Key Pair
3,156,258 UART: [art] Store priv key in slot 0x5
3,169,096 UART: [art] Derive Key Pair - Done
3,183,956 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,313 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,078 UART: [art] PUB.X = 22EDB12021EB091A7FAD344E097DE76B098DC555F3D7F2B20EB1468301B4CAE815DE37CC79409C530C22B102C7E08C1F
3,206,837 UART: [art] PUB.Y = 050DF75B1A76750F11368320B1B7EAF05E1C0FB5E369026CC5368C263DE40220EC16FED3878C389104D6C2B7941F1B37
3,213,766 UART: [art] SIG.R = 9137A17100DBF9BCD62B3E31916C5971337AA53A1D1F20A8F4F0B4FD954A08663ED6D136B3C92169153BC7A1F388EAD0
3,220,517 UART: [art] SIG.S = 6A5378CC2564B1C923271B751EE21BC69600D795E61C0AAE34CF5C1DC744DFEB1D48D6CDA267BD6A32AB8F735360EF11
3,243,524 UART: Caliptra RT
3,243,775 UART: [state] CFI Enabled
3,363,044 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,582 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,064 ready_for_fw is high
1,059,064 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,689,396 >>> mbox cmd response: success
2,689,396 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,751,483 UART:
2,751,499 UART: Running Caliptra FMC ...
2,751,907 UART:
2,751,961 UART: [state] CFI Enabled
2,762,157 UART: [fht] FMC Alias Private Key: 7
2,881,483 UART: [art] Extend RT PCRs Done
2,881,911 UART: [art] Lock RT PCRs Done
2,883,297 UART: [art] Populate DV Done
2,891,738 UART: [fht] FMC Alias Private Key: 7
2,892,842 UART: [art] Derive CDI
2,893,122 UART: [art] Store in slot 0x4
2,979,099 UART: [art] Derive Key Pair
2,979,459 UART: [art] Store priv key in slot 0x5
2,992,883 UART: [art] Derive Key Pair - Done
3,007,757 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,023,330 UART: [art] Erasing AUTHORITY.KEYID = 7
3,024,095 UART: [art] PUB.X = BCF491DA71C628008D2073A58FF06C276AB818F7A374F11FD01AD7CC0BB9CE02D36A7315D0E0819198E71C43D527AAC9
3,030,847 UART: [art] PUB.Y = B9ECC8DFABEB4B82795383A6C033A9F5B594C80EC583319E7DA506570EC0A47D047C6BEC9290508306733E70305F9DA8
3,037,788 UART: [art] SIG.R = 84EF22DD212A15022C1932AAC71812719486F3DF0C364D0E3758F6BEF8CABBC429702480150216D52F7BF9143A9A24EA
3,044,548 UART: [art] SIG.S = 7BFFA9CD06DDA5054F13BB5A8CEAB4A1C82A282BAD633FC570E65B3E70BB126871A0209CF403B3CDB4F6E26824346C85
3,067,909 UART: Caliptra RT
3,068,160 UART: [state] CFI Enabled
3,187,913 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,218,257 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.20s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,169 UART: [state] LifecycleState = Unprovisioned
85,824 UART: [state] DebugLocked = No
86,388 UART: [state] WD Timer not started. Device not locked for debugging
87,591 UART: [kat] SHA2-256
891,141 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,245 UART: [kat] ++
895,397 UART: [kat] sha1
899,661 UART: [kat] SHA2-256
901,601 UART: [kat] SHA2-384
904,150 UART: [kat] SHA2-512-ACC
906,051 UART: [kat] ECC-384
915,492 UART: [kat] HMAC-384Kdf
920,242 UART: [kat] LMS
1,168,554 UART: [kat] --
1,169,359 UART: [cold-reset] ++
1,169,731 UART: [fht] FHT @ 0x50003400
1,172,249 UART: [idev] ++
1,172,417 UART: [idev] CDI.KEYID = 6
1,172,778 UART: [idev] SUBJECT.KEYID = 7
1,173,203 UART: [idev] UDS.KEYID = 0
1,173,549 ready_for_fw is high
1,173,549 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,181,088 UART: [idev] Erasing UDS.KEYID = 0
1,198,106 UART: [idev] Sha1 KeyId Algorithm
1,206,998 UART: [idev] --
1,208,103 UART: [ldev] ++
1,208,271 UART: [ldev] CDI.KEYID = 6
1,208,635 UART: [ldev] SUBJECT.KEYID = 5
1,209,062 UART: [ldev] AUTHORITY.KEYID = 7
1,209,525 UART: [ldev] FE.KEYID = 1
1,214,727 UART: [ldev] Erasing FE.KEYID = 1
1,241,530 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,996 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,712 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,601 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,313 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,391 UART: [ldev] --
1,280,818 UART: [fwproc] Wait for Commands...
1,281,507 UART: [fwproc] Recv command 0x46574c44
1,282,240 UART: [fwproc] Recv'd Img size: 119428 bytes
2,636,115 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,663,558 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,694,733 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,836,436 >>> mbox cmd response: success
2,836,436 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,837,566 UART: [afmc] ++
2,837,734 UART: [afmc] CDI.KEYID = 6
2,838,097 UART: [afmc] SUBJECT.KEYID = 7
2,838,523 UART: [afmc] AUTHORITY.KEYID = 5
2,874,590 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,891,083 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,891,832 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,897,542 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,903,423 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,909,124 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,916,683 UART: [afmc] --
2,917,582 UART: [cold-reset] --
2,918,462 UART: [state] Locking Datavault
2,919,613 UART: [state] Locking PCR0, PCR1 and PCR31
2,920,217 UART: [state] Locking ICCM
2,920,689 UART: [exit] Launching FMC @ 0x40000130
2,926,019 UART:
2,926,035 UART: Running Caliptra FMC ...
2,926,443 UART:
2,926,586 UART: [state] CFI Enabled
2,937,162 UART: [fht] FMC Alias Private Key: 7
3,056,074 UART: [art] Extend RT PCRs Done
3,056,502 UART: [art] Lock RT PCRs Done
3,058,288 UART: [art] Populate DV Done
3,066,725 UART: [fht] FMC Alias Private Key: 7
3,067,833 UART: [art] Derive CDI
3,068,113 UART: [art] Store in slot 0x4
3,154,040 UART: [art] Derive Key Pair
3,154,400 UART: [art] Store priv key in slot 0x5
3,167,174 UART: [art] Derive Key Pair - Done
3,181,773 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,197,186 UART: [art] Erasing AUTHORITY.KEYID = 7
3,197,951 UART: [art] PUB.X = CC6A7578D364C2C9CF5ACB31232F6E02EA0385A92542536B3415C29A1A83B00912E8105C4AFD5202F0EE38D888FD8B2F
3,204,715 UART: [art] PUB.Y = 8B3A6CEEA8F6FC5E6410BB69355378133CF739FF57BF112D02F5CA784DD58D050E63A01B08E5F31A3BC99BFDE2DD55BB
3,211,673 UART: [art] SIG.R = 0608E1F53D5B260FEAEB080609FEFB5091CF3FABEF52C1209124341E1A31916F872E54B816DD9772EF61040EDD13EC9C
3,218,429 UART: [art] SIG.S = DB758CB2CF071BCCB5D2E2988148BC637741C59D9C337AB515C0B1A2A13844F25802003A14BB0869CE56AB72DF31A05B
3,242,518 UART: Caliptra RT
3,242,861 UART: [state] CFI Enabled
3,362,892 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,393,352 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,261 ready_for_fw is high
1,060,261 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,693,299 >>> mbox cmd response: success
2,693,299 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,755,020 UART:
2,755,036 UART: Running Caliptra FMC ...
2,755,444 UART:
2,755,587 UART: [state] CFI Enabled
2,766,237 UART: [fht] FMC Alias Private Key: 7
2,885,425 UART: [art] Extend RT PCRs Done
2,885,853 UART: [art] Lock RT PCRs Done
2,887,607 UART: [art] Populate DV Done
2,895,892 UART: [fht] FMC Alias Private Key: 7
2,896,902 UART: [art] Derive CDI
2,897,182 UART: [art] Store in slot 0x4
2,983,223 UART: [art] Derive Key Pair
2,983,583 UART: [art] Store priv key in slot 0x5
2,997,201 UART: [art] Derive Key Pair - Done
3,012,002 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,027,499 UART: [art] Erasing AUTHORITY.KEYID = 7
3,028,264 UART: [art] PUB.X = 90A1350439FCAE5C9896085F9BB90009C38258C9F141DD8145EC919F3E693AF4BACF4069A61626B179F0A9045EA1D17E
3,035,002 UART: [art] PUB.Y = 4C2101E1308CD792D66EC43208B96727092F528353012E80B6B9F67CA2A9D27269454B64D28F03628C7DC2422E01370D
3,041,919 UART: [art] SIG.R = CDF1DBEBD915B9D3EC8ACC1F586B723299017FCC9A554A718B076D369EEA3EE94F615D094E73951C6D835F856EB556F0
3,048,694 UART: [art] SIG.S = 47A4058CCDA4DE9326C9F926FFED6CE887EDADE0CBB27A978F3B8F5D3BD6934A460781246D6C21702EC091D173167D0F
3,072,355 UART: Caliptra RT
3,072,698 UART: [state] CFI Enabled
3,192,897 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,223,237 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.35s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,252 UART: [state] LifecycleState = Unprovisioned
85,907 UART: [state] DebugLocked = No
86,449 UART: [state] WD Timer not started. Device not locked for debugging
87,716 UART: [kat] SHA2-256
893,366 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,491 UART: [kat] ++
897,643 UART: [kat] sha1
901,743 UART: [kat] SHA2-256
903,683 UART: [kat] SHA2-384
906,334 UART: [kat] SHA2-512-ACC
908,235 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,306 UART: [kat] LMS
1,170,634 UART: [kat] --
1,171,547 UART: [cold-reset] ++
1,172,119 UART: [fht] FHT @ 0x50003400
1,175,024 UART: [idev] ++
1,175,192 UART: [idev] CDI.KEYID = 6
1,175,552 UART: [idev] SUBJECT.KEYID = 7
1,175,976 UART: [idev] UDS.KEYID = 0
1,176,321 ready_for_fw is high
1,176,321 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,184,034 UART: [idev] Erasing UDS.KEYID = 0
1,201,149 UART: [idev] Sha1 KeyId Algorithm
1,209,521 UART: [idev] --
1,210,603 UART: [ldev] ++
1,210,771 UART: [ldev] CDI.KEYID = 6
1,211,134 UART: [ldev] SUBJECT.KEYID = 5
1,211,560 UART: [ldev] AUTHORITY.KEYID = 7
1,212,023 UART: [ldev] FE.KEYID = 1
1,217,173 UART: [ldev] Erasing FE.KEYID = 1
1,243,178 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,369 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,262,085 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,976 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,688 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,751 UART: [ldev] --
1,282,128 UART: [fwproc] Wait for Commands...
1,282,900 UART: [fwproc] Recv command 0x46574c44
1,283,628 UART: [fwproc] Recv'd Img size: 119428 bytes
2,637,999 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,664,580 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,695,750 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,837,441 >>> mbox cmd response: success
2,837,441 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,838,611 UART: [afmc] ++
2,838,779 UART: [afmc] CDI.KEYID = 6
2,839,141 UART: [afmc] SUBJECT.KEYID = 7
2,839,566 UART: [afmc] AUTHORITY.KEYID = 5
2,875,523 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,892,178 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,892,926 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,898,635 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,904,518 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,910,219 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,917,921 UART: [afmc] --
2,918,919 UART: [cold-reset] --
2,919,701 UART: [state] Locking Datavault
2,921,210 UART: [state] Locking PCR0, PCR1 and PCR31
2,921,814 UART: [state] Locking ICCM
2,922,484 UART: [exit] Launching FMC @ 0x40000130
2,927,814 UART:
2,927,830 UART: Running Caliptra FMC ...
2,928,238 UART:
2,928,292 UART: [state] CFI Enabled
2,938,658 UART: [fht] FMC Alias Private Key: 7
3,057,582 UART: [art] Extend RT PCRs Done
3,058,010 UART: [art] Lock RT PCRs Done
3,059,802 UART: [art] Populate DV Done
3,068,291 UART: [fht] FMC Alias Private Key: 7
3,069,363 UART: [art] Derive CDI
3,069,643 UART: [art] Store in slot 0x4
3,155,248 UART: [art] Derive Key Pair
3,155,608 UART: [art] Store priv key in slot 0x5
3,168,882 UART: [art] Derive Key Pair - Done
3,184,096 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,199,451 UART: [art] Erasing AUTHORITY.KEYID = 7
3,200,216 UART: [art] PUB.X = D60E9AE67034768DF627E504AE370786B5FB14C756FDD3F1A6BC34E76F110F1587085CF0F0223C0AE7A63D700761AA63
3,206,969 UART: [art] PUB.Y = E4F1F6D2DA76396BFBA1CF9CC8283C3DBD2E02CC94B9EE83D79BE8411AEBB31663DECDE26DA5B1E1A32AC1F4673A3F77
3,213,946 UART: [art] SIG.R = 1D4165670E73A851A08060499E2D2C23DB9461ECC944ADFBF36717394E9817E3AE92A1C340C1F3A48603733921E55AA9
3,220,706 UART: [art] SIG.S = AF9ED4CD3B5A490208761C261B3E6A66F1930062F7B08F719A64D4C0DDFC36EE19ED18C362E736A97B44D639A2460415
3,244,379 UART: Caliptra RT
3,244,630 UART: [state] CFI Enabled
3,364,373 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,394,567 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.30s
running 1 test
Using hardware-model ModelEmulated trng=External
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,945 ready_for_fw is high
1,059,945 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,650 >>> mbox cmd response: success
2,691,650 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,753,441 UART:
2,753,457 UART: Running Caliptra FMC ...
2,753,865 UART:
2,753,919 UART: [state] CFI Enabled
2,764,403 UART: [fht] FMC Alias Private Key: 7
2,883,617 UART: [art] Extend RT PCRs Done
2,884,045 UART: [art] Lock RT PCRs Done
2,885,687 UART: [art] Populate DV Done
2,894,106 UART: [fht] FMC Alias Private Key: 7
2,895,100 UART: [art] Derive CDI
2,895,380 UART: [art] Store in slot 0x4
2,981,217 UART: [art] Derive Key Pair
2,981,577 UART: [art] Store priv key in slot 0x5
2,994,401 UART: [art] Derive Key Pair - Done
3,009,011 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,024,412 UART: [art] Erasing AUTHORITY.KEYID = 7
3,025,177 UART: [art] PUB.X = D6E073BAB8B946788D37326CF660172663CC2D0E3690BCF0574CA631346AC8A7A8476C018AEB3E0A7AFB636125C9D802
3,031,939 UART: [art] PUB.Y = 76CEDD12446533B986C3765C3D50ED74026C88CA7F4A3B38199AE6DA22E0E93EF9C25A8BE13AC1BBB3A757CA65971CC1
3,038,900 UART: [art] SIG.R = 1F61FCB8FC84314B9825AFD3F57B9F2808B4744258BD535D27C813CB4CFEBF18D198CAD084D512A9075CCAF4CB005740
3,045,654 UART: [art] SIG.S = 6E23FEC0C7BD296E887B83ED129B3510E12BEA4341937F7DFA39B413D25C53DBABE74C9D873C4FB8923652DE46C387ED
3,069,476 UART: Caliptra RT
3,069,727 UART: [state] CFI Enabled
3,189,999 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,220,383 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.25s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,697 UART: [state] LifecycleState = Unprovisioned
86,352 UART: [state] DebugLocked = No
86,988 UART: [state] WD Timer not started. Device not locked for debugging
88,135 UART: [kat] SHA2-256
893,785 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,910 UART: [kat] ++
898,062 UART: [kat] sha1
902,436 UART: [kat] SHA2-256
904,376 UART: [kat] SHA2-384
907,083 UART: [kat] SHA2-512-ACC
908,984 UART: [kat] ECC-384
918,941 UART: [kat] HMAC-384Kdf
923,619 UART: [kat] LMS
1,171,947 UART: [kat] --
1,172,990 UART: [cold-reset] ++
1,173,562 UART: [fht] FHT @ 0x50003400
1,176,387 UART: [idev] ++
1,176,555 UART: [idev] CDI.KEYID = 6
1,176,915 UART: [idev] SUBJECT.KEYID = 7
1,177,339 UART: [idev] UDS.KEYID = 0
1,177,684 ready_for_fw is high
1,177,684 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
1,185,441 UART: [idev] Erasing UDS.KEYID = 0
1,202,430 UART: [idev] Sha1 KeyId Algorithm
1,211,006 UART: [idev] --
1,211,988 UART: [ldev] ++
1,212,156 UART: [ldev] CDI.KEYID = 6
1,212,519 UART: [ldev] SUBJECT.KEYID = 5
1,212,945 UART: [ldev] AUTHORITY.KEYID = 7
1,213,408 UART: [ldev] FE.KEYID = 1
1,218,398 UART: [ldev] Erasing FE.KEYID = 1
1,245,025 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,258,522 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,264,238 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,270,129 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,275,841 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,282,854 UART: [ldev] --
1,284,205 UART: [fwproc] Wait for Commands...
1,284,971 UART: [fwproc] Recv command 0x46574c44
1,285,699 UART: [fwproc] Recv'd Img size: 119428 bytes
2,640,704 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
2,667,403 UART: [fwproc] Load FMC at address 0x40000000 len 20044
2,698,573 UART: [fwproc] Load Runtime at address 0x40005000 len 93500
2,840,258 >>> mbox cmd response: success
2,840,258 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,841,362 UART: [afmc] ++
2,841,530 UART: [afmc] CDI.KEYID = 6
2,841,892 UART: [afmc] SUBJECT.KEYID = 7
2,842,317 UART: [afmc] AUTHORITY.KEYID = 5
2,877,606 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
2,893,947 UART: [afmc] Erase AUTHORITY.KEYID = 5
2,894,695 UART: [afmc] PUB.X = 1A1E031F3C2A659E2139E7DF6670E1E90D97FEBC3C1203BEF6D75BEF024365B671F3E3D8B7D847DE5FF676F125D1A8A4
2,900,404 UART: [afmc] PUB.Y = 3EF64780574A80409DA043153F43FE78D3D12C53530B78ABD3BE2F0583FAF89CD3E32095BC723FA7420EC9E90C69F969
2,906,287 UART: [afmc] SIG.R = A452E59067D5C0286E4C0EBD6A96DE30DA287C6C357296892610C2054496BBC57652E17DE254731722A293751A54846D
2,911,988 UART: [afmc] SIG.S = C296F254035A12D63B2DB22A65B116C47AD38062E461C02DA86A67B80B261CF7E12D9247331B63FAD81EB38285EAB96F
2,919,870 UART: [afmc] --
2,920,782 UART: [cold-reset] --
2,921,594 UART: [state] Locking Datavault
2,922,567 UART: [state] Locking PCR0, PCR1 and PCR31
2,923,171 UART: [state] Locking ICCM
2,923,595 UART: [exit] Launching FMC @ 0x40000130
2,928,925 UART:
2,928,941 UART: Running Caliptra FMC ...
2,929,349 UART:
2,929,492 UART: [state] CFI Enabled
2,940,020 UART: [fht] FMC Alias Private Key: 7
3,059,550 UART: [art] Extend RT PCRs Done
3,059,978 UART: [art] Lock RT PCRs Done
3,061,288 UART: [art] Populate DV Done
3,069,271 UART: [fht] FMC Alias Private Key: 7
3,070,303 UART: [art] Derive CDI
3,070,583 UART: [art] Store in slot 0x4
3,156,090 UART: [art] Derive Key Pair
3,156,450 UART: [art] Store priv key in slot 0x5
3,170,042 UART: [art] Derive Key Pair - Done
3,184,972 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,200,713 UART: [art] Erasing AUTHORITY.KEYID = 7
3,201,478 UART: [art] PUB.X = 49D2329E1FD1A0D47566FCD167F23B91C0EF7619C2F68A1BC00D631C7766EE31D3568B00AAE07BADC738EC572B7B951A
3,208,235 UART: [art] PUB.Y = 0576F160C575E694710F2E884EAA7ABD06F05B6C3EBBBDFC85EE768CCAFD723DEFA27B416469150057909748E3F0C7DC
3,215,168 UART: [art] SIG.R = 5F0BCB8A24591D8301CBE26CEB1C954100BAD068A6895BCDEFE3A3803B45896512329977EB0E0DC0B1B7DE07656380C2
3,221,909 UART: [art] SIG.S = 020BBC572263431B510BCF1066AF0F96979FCD4894790E0F6683F82A0CEA789F12EFCC30BA52A274CDDDBBC336CEB522
3,245,848 UART: Caliptra RT
3,246,191 UART: [state] CFI Enabled
3,366,043 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,396,565 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.27s
running 1 test
Using hardware-model ModelEmulated trng=Internal
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,082 ready_for_fw is high
1,060,082 <<< Executing mbox cmd 0x46574c44 (119428 bytes) from SoC
2,691,241 >>> mbox cmd response: success
2,691,241 <<< Executing mbox cmd 0x46505344 (4 bytes) from SoC
2,754,216 UART:
2,754,232 UART: Running Caliptra FMC ...
2,754,640 UART:
2,754,783 UART: [state] CFI Enabled
2,765,621 UART: [fht] FMC Alias Private Key: 7
2,884,135 UART: [art] Extend RT PCRs Done
2,884,563 UART: [art] Lock RT PCRs Done
2,885,731 UART: [art] Populate DV Done
2,894,168 UART: [fht] FMC Alias Private Key: 7
2,895,236 UART: [art] Derive CDI
2,895,516 UART: [art] Store in slot 0x4
2,981,225 UART: [art] Derive Key Pair
2,981,585 UART: [art] Store priv key in slot 0x5
2,994,833 UART: [art] Derive Key Pair - Done
3,009,718 UART: [art] Signing Cert with AUTHORITY.KEYID = 7
3,025,333 UART: [art] Erasing AUTHORITY.KEYID = 7
3,026,098 UART: [art] PUB.X = 641B7CA5FC5EFFD1D90C703A95ECEC6242EC8B34E276FD44F68D2BAE512BB51E18A0FFAC7D15EFCA20A3F913116BEBA9
3,032,895 UART: [art] PUB.Y = 4AE94C3A77AFC8720348EC3C613BDC37EA61229688EF817530EB9A469CB301004CA0C0A170E9CC0BD0F5102D79EEB3EE
3,039,828 UART: [art] SIG.R = 08541A5E821CCA006D0E587613FEA4D34B8636BE7D7A3BDF704ED7FC2E48DA27D937E2330212682EF6853138DEB2FA4C
3,046,577 UART: [art] SIG.S = 5E48721CBAF0DE1164D70EB03FE4C99178FFECC19C5AA65ADED23CCE6463468650FB63CABCF40E2514BA2BAC15C79DCB
3,070,621 UART: Caliptra RT
3,070,964 UART: [state] CFI Enabled
3,190,962 UART: [rt] RT listening for mailbox commands...
handle_trap: cause=8000000b, mtval=0, next_pc=40005c00
3,221,318 UART: [rt]cmd =0x46505344, len=4
test services::zeroize_halt_check_no_output ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 111 filtered out; finished in 1.23s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test tests::test_tracing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.06s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test fmc_alias_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_csr_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.00s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test idevid_csr::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.03s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test ldevid_cert::tests::test_extensions ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.04s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.02s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
test rt_alias_cert::tests::test_cert_signing ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 8 filtered out; finished in 0.01s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,077 writing to cptra_bootfsm_go
192,200 UART:
192,567 UART: Running Caliptra ROM ...
193,743 UART:
193,901 UART: [state] CFI Enabled
265,233 UART: [state] LifecycleState = Unprovisioned
267,231 UART: [state] DebugLocked = No
268,825 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
273,691 UART: [kat] SHA2-256
443,361 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
453,898 UART: [kat] ++
454,350 UART: [kat] sha1
466,076 UART: [kat] SHA2-256
468,729 UART: [kat] SHA2-384
475,849 UART: [kat] SHA2-512-ACC
478,219 UART: [kat] ECC-384
2,770,358 UART: [kat] HMAC-384Kdf
2,799,792 UART: [kat] LMS
3,990,129 UART: [kat] --
3,995,331 UART: [cold-reset] ++
3,997,906 UART: [fht] Storing FHT @ 0x50003400
4,008,391 UART: [idev] ++
4,008,961 UART: [idev] CDI.KEYID = 6
4,009,970 UART: [idev] SUBJECT.KEYID = 7
4,011,151 UART: [idev] UDS.KEYID = 0
4,012,250 ready_for_fw is high
4,012,483 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,033,225 UART: [idev] Erasing UDS.KEYID = 0
7,347,470 UART: [idev] Using Sha1 for KeyId Algorithm
7,369,046 UART: [idev] --
7,372,019 UART: [ldev] ++
7,372,604 UART: [ldev] CDI.KEYID = 6
7,373,578 UART: [ldev] SUBJECT.KEYID = 5
7,374,738 UART: [ldev] AUTHORITY.KEYID = 7
7,376,028 UART: [ldev] FE.KEYID = 1
7,422,017 UART: [ldev] Erasing FE.KEYID = 1
10,755,698 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,046,868 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,061,897 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,076,268 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,090,795 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,109,371 UART: [ldev] --
13,113,714 UART: [fwproc] Waiting for Commands...
13,115,537 UART: [fwproc] Received command 0x46574c44
13,117,727 UART: [fwproc] Received Image of size 9084 bytes
15,889,045 UART: [fwproc] Image verified using Vendor ECC Key Index 0
15,964,772 UART: [fwproc] Loading FMC at address 0x40000000 len 64
15,967,845 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
15,983,897 >>> mbox cmd response: success
15,987,779 UART: [afmc] ++
15,988,357 UART: [afmc] CDI.KEYID = 6
15,989,371 UART: [afmc] SUBJECT.KEYID = 7
15,990,527 UART: [afmc] AUTHORITY.KEYID = 5
19,347,371 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,646,158 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,648,409 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,662,885 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,677,740 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,692,134 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,713,318 UART: [afmc] --
21,717,297 UART: [cold-reset] --
21,722,084 UART: [state] Locking Datavault
21,727,224 UART: [state] Locking PCR0, PCR1 and PCR31
21,728,974 UART: [state] Locking ICCM
21,731,424 UART: [exit] Launching FMC @ 0x40000000
21,739,809 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,745,079 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.22s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,884 writing to cptra_bootfsm_go
3,787,087 ready_for_fw is high
3,787,569 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,738,616 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
37 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,271 writing to cptra_bootfsm_go
192,382 UART:
192,741 UART: Running Caliptra ROM ...
193,871 UART:
603,656 UART: [state] CFI Enabled
617,120 UART: [state] LifecycleState = Unprovisioned
619,075 UART: [state] DebugLocked = No
621,034 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
625,977 UART: [kat] SHA2-256
795,761 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
806,284 UART: [kat] ++
806,758 UART: [kat] sha1
818,131 UART: [kat] SHA2-256
820,863 UART: [kat] SHA2-384
826,786 UART: [kat] SHA2-512-ACC
829,172 UART: [kat] ECC-384
3,112,382 UART: [kat] HMAC-384Kdf
3,124,382 UART: [kat] LMS
4,314,469 UART: [kat] --
4,319,187 UART: [cold-reset] ++
4,321,480 UART: [fht] Storing FHT @ 0x50003400
4,331,958 UART: [idev] ++
4,332,520 UART: [idev] CDI.KEYID = 6
4,333,474 UART: [idev] SUBJECT.KEYID = 7
4,334,714 UART: [idev] UDS.KEYID = 0
4,335,741 ready_for_fw is high
4,335,950 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
4,350,981 UART: [idev] Erasing UDS.KEYID = 0
7,620,997 UART: [idev] Using Sha1 for KeyId Algorithm
7,642,544 UART: [idev] --
7,647,616 UART: [ldev] ++
7,648,200 UART: [ldev] CDI.KEYID = 6
7,649,139 UART: [ldev] SUBJECT.KEYID = 5
7,650,350 UART: [ldev] AUTHORITY.KEYID = 7
7,651,635 UART: [ldev] FE.KEYID = 1
7,662,896 UART: [ldev] Erasing FE.KEYID = 1
10,951,530 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
13,247,201 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
13,261,780 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
13,276,643 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
13,291,160 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
13,309,288 UART: [ldev] --
13,313,573 UART: [fwproc] Waiting for Commands...
13,316,853 UART: [fwproc] Received command 0x46574c44
13,319,033 UART: [fwproc] Received Image of size 9084 bytes
16,089,116 UART: [fwproc] Image verified using Vendor ECC Key Index 0
16,159,299 UART: [fwproc] Loading FMC at address 0x40000000 len 64
16,162,354 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
16,176,834 >>> mbox cmd response: success
16,181,475 UART: [afmc] ++
16,182,051 UART: [afmc] CDI.KEYID = 6
16,182,936 UART: [afmc] SUBJECT.KEYID = 7
16,184,204 UART: [afmc] AUTHORITY.KEYID = 5
19,496,489 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
21,792,655 UART: [afmc] Erasing AUTHORITY.KEYID = 5
21,794,904 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
21,809,368 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
21,824,254 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
21,838,629 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
21,860,549 UART: [afmc] --
21,864,899 UART: [cold-reset] --
21,867,894 UART: [state] Locking Datavault
21,873,195 UART: [state] Locking PCR0, PCR1 and PCR31
21,874,975 UART: [state] Locking ICCM
21,876,645 UART: [exit] Launching FMC @ 0x40000000
21,885,093 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
21,890,417 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.23s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,218 writing to cptra_bootfsm_go
4,124,587 ready_for_fw is high
4,125,034 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
15,923,817 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.21s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,935 writing to cptra_bootfsm_go
192,106 UART:
192,468 UART: Running Caliptra ROM ...
193,610 UART:
193,765 UART: [state] CFI Enabled
265,089 UART: [state] LifecycleState = Unprovisioned
267,085 UART: [state] DebugLocked = No
269,546 UART: [state] WD Timer not started. Device not locked for debugging
273,087 UART: [kat] SHA2-256
452,778 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
463,514 UART: [kat] ++
464,034 UART: [kat] sha1
475,479 UART: [kat] SHA2-256
478,230 UART: [kat] SHA2-384
483,016 UART: [kat] SHA2-512-ACC
485,388 UART: [kat] ECC-384
2,947,994 UART: [kat] HMAC-384Kdf
2,970,978 UART: [kat] LMS
3,447,480 UART: [kat] --
3,451,207 UART: [cold-reset] ++
3,453,357 UART: [fht] FHT @ 0x50003400
3,466,056 UART: [idev] ++
3,466,658 UART: [idev] CDI.KEYID = 6
3,467,546 UART: [idev] SUBJECT.KEYID = 7
3,468,792 UART: [idev] UDS.KEYID = 0
3,469,695 ready_for_fw is high
3,469,892 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,501,745 UART: [idev] Erasing UDS.KEYID = 0
5,987,299 UART: [idev] Sha1 KeyId Algorithm
6,011,934 UART: [idev] --
6,016,645 UART: [ldev] ++
6,017,225 UART: [ldev] CDI.KEYID = 6
6,018,165 UART: [ldev] SUBJECT.KEYID = 5
6,019,331 UART: [ldev] AUTHORITY.KEYID = 7
6,020,618 UART: [ldev] FE.KEYID = 1
6,055,966 UART: [ldev] Erasing FE.KEYID = 1
8,564,895 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,299,998 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,315,825 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,331,706 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,347,294 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,367,645 UART: [ldev] --
10,372,802 UART: [fwproc] Wait for Commands...
10,375,451 UART: [fwproc] Recv command 0x46574c44
10,377,440 UART: [fwproc] Recv'd Img size: 9084 bytes
12,519,569 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,599,878 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,602,801 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,618,413 >>> mbox cmd response: success
12,622,749 UART: [afmc] ++
12,623,325 UART: [afmc] CDI.KEYID = 6
12,624,347 UART: [afmc] SUBJECT.KEYID = 7
12,625,513 UART: [afmc] AUTHORITY.KEYID = 5
15,167,726 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,890,586 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,892,775 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,908,592 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,924,599 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
16,940,118 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
16,964,632 UART: [afmc] --
16,967,579 UART: [cold-reset] --
16,971,027 UART: [state] Locking Datavault
16,976,175 UART: [state] Locking PCR0, PCR1 and PCR31
16,977,877 UART: [state] Locking ICCM
16,980,679 UART: [exit] Launching FMC @ 0x40000000
16,989,126 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
16,994,290 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,956 writing to cptra_bootfsm_go
3,459,531 ready_for_fw is high
3,459,943 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,478,281 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "1c424923bf2991d615ce98f552a57a6bc408791adfaf6b210aaab771a66f9e5ea7ecf6de6f3bec6ea675ca26dc2670bf",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,203 writing to cptra_bootfsm_go
192,449 UART:
192,805 UART: Running Caliptra ROM ...
194,006 UART:
603,680 UART: [state] CFI Enabled
618,155 UART: [state] LifecycleState = Unprovisioned
620,107 UART: [state] DebugLocked = No
621,285 UART: [state] WD Timer not started. Device not locked for debugging
625,834 UART: [kat] SHA2-256
805,498 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
816,272 UART: [kat] ++
816,758 UART: [kat] sha1
826,144 UART: [kat] SHA2-256
828,868 UART: [kat] SHA2-384
835,568 UART: [kat] SHA2-512-ACC
837,949 UART: [kat] ECC-384
3,282,363 UART: [kat] HMAC-384Kdf
3,293,923 UART: [kat] LMS
3,770,449 UART: [kat] --
3,776,671 UART: [cold-reset] ++
3,779,182 UART: [fht] FHT @ 0x50003400
3,790,819 UART: [idev] ++
3,791,396 UART: [idev] CDI.KEYID = 6
3,792,436 UART: [idev] SUBJECT.KEYID = 7
3,793,666 UART: [idev] UDS.KEYID = 0
3,794,715 ready_for_fw is high
3,794,938 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,808,145 UART: [idev] Erasing UDS.KEYID = 0
6,269,289 UART: [idev] Sha1 KeyId Algorithm
6,292,679 UART: [idev] --
6,298,938 UART: [ldev] ++
6,299,511 UART: [ldev] CDI.KEYID = 6
6,300,485 UART: [ldev] SUBJECT.KEYID = 5
6,301,649 UART: [ldev] AUTHORITY.KEYID = 7
6,302,888 UART: [ldev] FE.KEYID = 1
6,313,809 UART: [ldev] Erasing FE.KEYID = 1
8,791,978 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,512,852 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,528,680 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,544,561 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,560,118 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,582,032 UART: [ldev] --
10,586,920 UART: [fwproc] Wait for Commands...
10,589,997 UART: [fwproc] Recv command 0x46574c44
10,592,040 UART: [fwproc] Recv'd Img size: 9084 bytes
12,727,054 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,803,228 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,806,137 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,821,714 >>> mbox cmd response: success
12,826,019 UART: [afmc] ++
12,826,596 UART: [afmc] CDI.KEYID = 6
12,827,619 UART: [afmc] SUBJECT.KEYID = 7
12,828,788 UART: [afmc] AUTHORITY.KEYID = 5
15,333,617 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,052,668 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,054,859 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,070,654 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,086,660 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,102,215 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,126,327 UART: [afmc] --
17,130,420 UART: [cold-reset] --
17,133,908 UART: [state] Locking Datavault
17,138,781 UART: [state] Locking PCR0, PCR1 and PCR31
17,140,544 UART: [state] Locking ICCM
17,141,972 UART: [exit] Launching FMC @ 0x40000000
17,150,366 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,155,544 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "76900995d321429428eba826bcf1596f7f978e0a9c309e145fdf70c80ca2045a3c3de2b79c71a47d87681b4ee5be13ec",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,263 writing to cptra_bootfsm_go
3,774,759 ready_for_fw is high
3,775,413 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,680,488 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,090 writing to cptra_bootfsm_go
192,263 UART:
192,618 UART: Running Caliptra ROM ...
193,800 UART:
193,958 UART: [state] CFI Enabled
261,655 UART: [state] LifecycleState = Unprovisioned
264,068 UART: [state] DebugLocked = No
265,756 UART: [state] WD Timer not started. Device not locked for debugging
271,220 UART: [kat] SHA2-256
461,083 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
471,871 UART: [kat] ++
472,369 UART: [kat] sha1
483,958 UART: [kat] SHA2-256
486,982 UART: [kat] SHA2-384
494,397 UART: [kat] SHA2-512-ACC
496,982 UART: [kat] ECC-384
2,949,451 UART: [kat] HMAC-384Kdf
2,971,264 UART: [kat] LMS
3,503,053 UART: [kat] --
3,506,701 UART: [cold-reset] ++
3,508,422 UART: [fht] FHT @ 0x50003400
3,519,752 UART: [idev] ++
3,520,395 UART: [idev] CDI.KEYID = 6
3,521,426 UART: [idev] SUBJECT.KEYID = 7
3,522,608 UART: [idev] UDS.KEYID = 0
3,523,534 ready_for_fw is high
3,523,746 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,544,579 UART: [idev] Erasing UDS.KEYID = 0
6,026,999 UART: [idev] Sha1 KeyId Algorithm
6,050,215 UART: [idev] --
6,055,240 UART: [ldev] ++
6,055,921 UART: [ldev] CDI.KEYID = 6
6,056,815 UART: [ldev] SUBJECT.KEYID = 5
6,058,226 UART: [ldev] AUTHORITY.KEYID = 7
6,059,424 UART: [ldev] FE.KEYID = 1
6,100,352 UART: [ldev] Erasing FE.KEYID = 1
8,600,828 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,322,645 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,337,862 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,353,084 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,368,203 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,389,172 UART: [ldev] --
10,394,030 UART: [fwproc] Wait for Commands...
10,396,939 UART: [fwproc] Recv command 0x46574c44
10,399,202 UART: [fwproc] Recv'd Img size: 9084 bytes
12,552,447 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,631,808 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,635,320 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,658,816 >>> mbox cmd response: success
12,662,767 UART: [afmc] ++
12,663,400 UART: [afmc] CDI.KEYID = 6
12,664,510 UART: [afmc] SUBJECT.KEYID = 7
12,666,054 UART: [afmc] AUTHORITY.KEYID = 5
15,211,702 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
16,953,672 UART: [afmc] Erase AUTHORITY.KEYID = 5
16,955,567 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
16,970,598 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
16,985,789 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,000,876 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,025,957 UART: [afmc] --
17,028,973 UART: [cold-reset] --
17,031,825 UART: [state] Locking Datavault
17,037,509 UART: [state] Locking PCR0, PCR1 and PCR31
17,039,648 UART: [state] Locking ICCM
17,040,992 UART: [exit] Launching FMC @ 0x40000000
17,049,665 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,055,695 UART: ROM Fatal Error: 0x01050002test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.99s
running 1 test
0 new_unbooted
34 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
2,943 writing to cptra_bootfsm_go
3,438,156 ready_for_fw is high
3,438,566 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,483,100 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.97s
running 1 test
0 new_unbooted
36 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,229 writing to cptra_bootfsm_go
192,478 UART:
192,835 UART: Running Caliptra ROM ...
194,029 UART:
603,649 UART: [state] CFI Enabled
619,106 UART: [state] LifecycleState = Unprovisioned
621,550 UART: [state] DebugLocked = No
622,933 UART: [state] WD Timer not started. Device not locked for debugging
628,334 UART: [kat] SHA2-256
818,204 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
828,962 UART: [kat] ++
829,484 UART: [kat] sha1
840,360 UART: [kat] SHA2-256
843,380 UART: [kat] SHA2-384
848,593 UART: [kat] SHA2-512-ACC
851,202 UART: [kat] ECC-384
3,294,871 UART: [kat] HMAC-384Kdf
3,308,450 UART: [kat] LMS
3,840,270 UART: [kat] --
3,844,336 UART: [cold-reset] ++
3,845,778 UART: [fht] FHT @ 0x50003400
3,856,477 UART: [idev] ++
3,857,198 UART: [idev] CDI.KEYID = 6
3,858,233 UART: [idev] SUBJECT.KEYID = 7
3,859,343 UART: [idev] UDS.KEYID = 0
3,860,288 ready_for_fw is high
3,860,482 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
3,877,538 UART: [idev] Erasing UDS.KEYID = 0
6,336,318 UART: [idev] Sha1 KeyId Algorithm
6,359,170 UART: [idev] --
6,363,815 UART: [ldev] ++
6,364,516 UART: [ldev] CDI.KEYID = 6
6,365,433 UART: [ldev] SUBJECT.KEYID = 5
6,366,601 UART: [ldev] AUTHORITY.KEYID = 7
6,367,792 UART: [ldev] FE.KEYID = 1
6,378,392 UART: [ldev] Erasing FE.KEYID = 1
8,853,267 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
10,572,802 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
10,587,975 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
10,603,198 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
10,618,310 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
10,637,528 UART: [ldev] --
10,642,578 UART: [fwproc] Wait for Commands...
10,644,188 UART: [fwproc] Recv command 0x46574c44
10,646,454 UART: [fwproc] Recv'd Img size: 9084 bytes
12,795,027 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
12,874,828 UART: [fwproc] Load FMC at address 0x40000000 len 64
12,878,359 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
12,901,595 >>> mbox cmd response: success
12,905,735 UART: [afmc] ++
12,906,364 UART: [afmc] CDI.KEYID = 6
12,907,473 UART: [afmc] SUBJECT.KEYID = 7
12,909,018 UART: [afmc] AUTHORITY.KEYID = 5
15,413,284 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
17,137,766 UART: [afmc] Erase AUTHORITY.KEYID = 5
17,139,723 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
17,154,757 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
17,169,943 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
17,185,067 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
17,207,616 UART: [afmc] --
17,211,268 UART: [cold-reset] --
17,214,282 UART: [state] Locking Datavault
17,220,243 UART: [state] Locking PCR0, PCR1 and PCR31
17,222,411 UART: [state] Locking ICCM
17,224,405 UART: [exit] Launching FMC @ 0x40000000
17,233,091 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
17,239,090 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 1.00s
running 1 test
0 new_unbooted
35 ready_for_fuses is high
Using hardware-model ModelFpgaRealtime trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
3,293 writing to cptra_bootfsm_go
3,762,525 ready_for_fw is high
3,763,194 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
12,720,073 >>> mbox cmd response: success
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.98s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,510 UART: [state] CFI Enabled
85,410 UART: [state] LifecycleState = Unprovisioned
86,065 UART: [state] DebugLocked = No
86,743 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
88,405 UART: [kat] SHA2-256
882,336 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,451 UART: [kat] ++
886,603 UART: [kat] sha1
890,801 UART: [kat] SHA2-256
892,739 UART: [kat] SHA2-384
895,520 UART: [kat] SHA2-512-ACC
897,421 UART: [kat] ECC-384
902,812 UART: [kat] HMAC-384Kdf
907,494 UART: [kat] LMS
1,475,690 UART: [kat] --
1,476,615 UART: [cold-reset] ++
1,476,945 UART: [fht] Storing FHT @ 0x50003400
1,479,892 UART: [idev] ++
1,480,060 UART: [idev] CDI.KEYID = 6
1,480,420 UART: [idev] SUBJECT.KEYID = 7
1,480,844 UART: [idev] UDS.KEYID = 0
1,481,189 ready_for_fw is high
1,481,189 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,488,796 UART: [idev] Erasing UDS.KEYID = 0
1,505,114 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,732 UART: [idev] --
1,514,699 UART: [ldev] ++
1,514,867 UART: [ldev] CDI.KEYID = 6
1,515,230 UART: [ldev] SUBJECT.KEYID = 5
1,515,656 UART: [ldev] AUTHORITY.KEYID = 7
1,516,119 UART: [ldev] FE.KEYID = 1
1,520,965 UART: [ldev] Erasing FE.KEYID = 1
1,546,522 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,059 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,775 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,666 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,378 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,500 UART: [ldev] --
1,585,795 UART: [fwproc] Waiting for Commands...
1,586,424 UART: [fwproc] Received command 0x46574c44
1,587,215 UART: [fwproc] Received Image of size 9084 bytes
1,679,070 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,705,184 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,706,348 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,712,429 >>> mbox cmd response: success
1,713,493 UART: [afmc] ++
1,713,661 UART: [afmc] CDI.KEYID = 6
1,714,023 UART: [afmc] SUBJECT.KEYID = 7
1,714,448 UART: [afmc] AUTHORITY.KEYID = 5
1,749,252 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,765,872 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,766,652 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,772,373 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,778,268 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,783,980 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,791,835 UART: [afmc] --
1,792,829 UART: [cold-reset] --
1,793,789 UART: [state] Locking Datavault
1,794,940 UART: [state] Locking PCR0, PCR1 and PCR31
1,795,544 UART: [state] Locking ICCM
1,796,122 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,801,417 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,803,300 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.58s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,361,809 ready_for_fw is high
1,361,809 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,562,979 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "94851338e4ab00ce6ea7e3d0bdd568791545b9b92936a8fd0741a8efced4c79fe75ae98dfbf29014b46b8d566607698b",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,032 UART:
82,048 UART: Running Caliptra ROM ...
82,456 UART:
82,631 UART: [state] CFI Enabled
85,287 UART: [state] LifecycleState = Unprovisioned
85,942 UART: [state] DebugLocked = No
86,442 UART: [state] Watchdog Timer is not started because the device is not locked for debugging
87,986 UART: [kat] SHA2-256
881,917 UART: ROM Digest: 13EA3613A6803431146B6974F1FB3587BD56C8EA0238F3C30B0819270CA848CB
886,032 UART: [kat] ++
886,184 UART: [kat] sha1
890,448 UART: [kat] SHA2-256
892,386 UART: [kat] SHA2-384
894,945 UART: [kat] SHA2-512-ACC
896,846 UART: [kat] ECC-384
902,601 UART: [kat] HMAC-384Kdf
907,297 UART: [kat] LMS
1,475,493 UART: [kat] --
1,476,326 UART: [cold-reset] ++
1,476,898 UART: [fht] Storing FHT @ 0x50003400
1,479,691 UART: [idev] ++
1,479,859 UART: [idev] CDI.KEYID = 6
1,480,219 UART: [idev] SUBJECT.KEYID = 7
1,480,643 UART: [idev] UDS.KEYID = 0
1,480,988 ready_for_fw is high
1,480,988 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,488,323 UART: [idev] Erasing UDS.KEYID = 0
1,505,013 UART: [idev] Using Sha1 for KeyId Algorithm
1,513,681 UART: [idev] --
1,514,804 UART: [ldev] ++
1,514,972 UART: [ldev] CDI.KEYID = 6
1,515,335 UART: [ldev] SUBJECT.KEYID = 5
1,515,761 UART: [ldev] AUTHORITY.KEYID = 7
1,516,224 UART: [ldev] FE.KEYID = 1
1,521,354 UART: [ldev] Erasing FE.KEYID = 1
1,546,777 UART: [ldev] Signing Cert with AUTHORITY.KEYID = 7
1,560,012 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,565,728 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,571,619 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,577,331 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,584,451 UART: [ldev] --
1,585,838 UART: [fwproc] Waiting for Commands...
1,586,573 UART: [fwproc] Received command 0x46574c44
1,587,364 UART: [fwproc] Received Image of size 9084 bytes
1,678,871 UART: [fwproc] Image verified using Vendor ECC Key Index 0
1,707,233 UART: [fwproc] Loading FMC at address 0x40000000 len 64
1,708,397 UART: [fwproc] Loading Runtime at address 0x40005000 len 3136
1,714,368 >>> mbox cmd response: success
1,715,602 UART: [afmc] ++
1,715,770 UART: [afmc] CDI.KEYID = 6
1,716,132 UART: [afmc] SUBJECT.KEYID = 7
1,716,557 UART: [afmc] AUTHORITY.KEYID = 5
1,751,867 UART: [afmc] Signing Cert with AUTHORITY.KEYID = 5
1,768,283 UART: [afmc] Erasing AUTHORITY.KEYID = 5
1,769,063 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,774,784 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,780,679 UART: [afmc] SIG.R = 6723614E2963EB4DD20C1CE768D1A6D474562C91993ED9BC2D156F14AB23204C3EBDF99B6B6B8636483D459A43E7BBF3
1,786,391 UART: [afmc] SIG.S = 2ABD688081869DD07C49230C133A9C39E8E5FB0CECB6BF3B6DFECE109075B3B02F4088157924B10EC6896F2886425055
1,794,136 UART: [afmc] --
1,795,016 UART: [cold-reset] --
1,795,740 UART: [state] Locking Datavault
1,796,965 UART: [state] Locking PCR0, PCR1 and PCR31
1,797,569 UART: [state] Locking ICCM
1,797,991 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,803,286 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,805,169 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.73s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0001, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "e18a393e604230509d468205972185fe1b55e6a39a088a40ecc46c7e82749110e3c0287de565cd735aaf0e3bcf19e003",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,363,208 ready_for_fw is high
1,363,208 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,563,076 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.63s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
85,604 UART: [state] LifecycleState = Unprovisioned
86,259 UART: [state] DebugLocked = No
86,805 UART: [state] WD Timer not started. Device not locked for debugging
88,146 UART: [kat] SHA2-256
891,696 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,800 UART: [kat] ++
895,952 UART: [kat] sha1
900,244 UART: [kat] SHA2-256
902,184 UART: [kat] SHA2-384
904,925 UART: [kat] SHA2-512-ACC
906,826 UART: [kat] ECC-384
916,559 UART: [kat] HMAC-384Kdf
921,115 UART: [kat] LMS
1,169,427 UART: [kat] --
1,170,336 UART: [cold-reset] ++
1,170,788 UART: [fht] FHT @ 0x50003400
1,173,578 UART: [idev] ++
1,173,746 UART: [idev] CDI.KEYID = 6
1,174,107 UART: [idev] SUBJECT.KEYID = 7
1,174,532 UART: [idev] UDS.KEYID = 0
1,174,878 ready_for_fw is high
1,174,878 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,182,243 UART: [idev] Erasing UDS.KEYID = 0
1,198,639 UART: [idev] Sha1 KeyId Algorithm
1,207,353 UART: [idev] --
1,208,390 UART: [ldev] ++
1,208,558 UART: [ldev] CDI.KEYID = 6
1,208,922 UART: [ldev] SUBJECT.KEYID = 5
1,209,349 UART: [ldev] AUTHORITY.KEYID = 7
1,209,812 UART: [ldev] FE.KEYID = 1
1,215,110 UART: [ldev] Erasing FE.KEYID = 1
1,241,271 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,254,733 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,260,449 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,266,338 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,050 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,102 UART: [ldev] --
1,280,307 UART: [fwproc] Wait for Commands...
1,281,026 UART: [fwproc] Recv command 0x46574c44
1,281,759 UART: [fwproc] Recv'd Img size: 9084 bytes
1,372,913 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,399,736 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,400,857 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,406,968 >>> mbox cmd response: success
1,408,126 UART: [afmc] ++
1,408,294 UART: [afmc] CDI.KEYID = 6
1,408,657 UART: [afmc] SUBJECT.KEYID = 7
1,409,083 UART: [afmc] AUTHORITY.KEYID = 5
1,443,709 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,460,368 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,461,117 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,466,839 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,472,732 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,478,424 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,486,151 UART: [afmc] --
1,487,178 UART: [cold-reset] --
1,488,056 UART: [state] Locking Datavault
1,489,309 UART: [state] Locking PCR0, PCR1 and PCR31
1,489,913 UART: [state] Locking ICCM
1,490,489 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,495,784 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,497,667 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,058,602 ready_for_fw is high
1,058,602 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,041 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.69s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "ab1d427e05b73114a0ff084ebfe6812a261618e29dce271cdb2ea97d0066059bb011346f55ba70becb111be690ea48c0",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,379 UART: [state] LifecycleState = Unprovisioned
86,034 UART: [state] DebugLocked = No
86,636 UART: [state] WD Timer not started. Device not locked for debugging
87,803 UART: [kat] SHA2-256
891,353 UART: ROM Digest: 01D05A4D2E92C3599DDEDA945B135099730EBB5F58832800C12BF5F44B49B60A
895,457 UART: [kat] ++
895,609 UART: [kat] sha1
899,757 UART: [kat] SHA2-256
901,697 UART: [kat] SHA2-384
904,436 UART: [kat] SHA2-512-ACC
906,337 UART: [kat] ECC-384
916,012 UART: [kat] HMAC-384Kdf
920,732 UART: [kat] LMS
1,169,044 UART: [kat] --
1,170,171 UART: [cold-reset] ++
1,170,725 UART: [fht] FHT @ 0x50003400
1,173,297 UART: [idev] ++
1,173,465 UART: [idev] CDI.KEYID = 6
1,173,826 UART: [idev] SUBJECT.KEYID = 7
1,174,251 UART: [idev] UDS.KEYID = 0
1,174,597 ready_for_fw is high
1,174,597 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,182,464 UART: [idev] Erasing UDS.KEYID = 0
1,199,580 UART: [idev] Sha1 KeyId Algorithm
1,208,488 UART: [idev] --
1,209,437 UART: [ldev] ++
1,209,605 UART: [ldev] CDI.KEYID = 6
1,209,969 UART: [ldev] SUBJECT.KEYID = 5
1,210,396 UART: [ldev] AUTHORITY.KEYID = 7
1,210,859 UART: [ldev] FE.KEYID = 1
1,216,235 UART: [ldev] Erasing FE.KEYID = 1
1,241,950 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,255,430 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,146 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,035 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,272,747 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,279,773 UART: [ldev] --
1,281,184 UART: [fwproc] Wait for Commands...
1,281,943 UART: [fwproc] Recv command 0x46574c44
1,282,676 UART: [fwproc] Recv'd Img size: 9084 bytes
1,373,754 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,400,103 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,401,224 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,407,319 >>> mbox cmd response: success
1,408,347 UART: [afmc] ++
1,408,515 UART: [afmc] CDI.KEYID = 6
1,408,878 UART: [afmc] SUBJECT.KEYID = 7
1,409,304 UART: [afmc] AUTHORITY.KEYID = 5
1,445,070 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,461,575 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,462,324 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,468,046 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,473,939 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,479,631 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,487,374 UART: [afmc] --
1,488,407 UART: [cold-reset] --
1,489,209 UART: [state] Locking Datavault
1,490,472 UART: [state] Locking PCR0, PCR1 and PCR31
1,491,076 UART: [state] Locking ICCM
1,491,716 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,497,011 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,498,894 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.85s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "c915a0d8903fa960463e653e9c54112c02512cc46486f57852c70ca65b613c7935b3989920c0a870af0ad818e0a0b5f4",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,059,405 ready_for_fw is high
1,059,405 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,261,252 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.72s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,508 UART: [state] CFI Enabled
84,900 UART: [state] LifecycleState = Unprovisioned
85,555 UART: [state] DebugLocked = No
86,281 UART: [state] WD Timer not started. Device not locked for debugging
87,452 UART: [kat] SHA2-256
893,102 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,227 UART: [kat] ++
897,379 UART: [kat] sha1
901,499 UART: [kat] SHA2-256
903,439 UART: [kat] SHA2-384
906,084 UART: [kat] SHA2-512-ACC
907,985 UART: [kat] ECC-384
917,796 UART: [kat] HMAC-384Kdf
922,190 UART: [kat] LMS
1,170,518 UART: [kat] --
1,171,461 UART: [cold-reset] ++
1,171,885 UART: [fht] FHT @ 0x50003400
1,174,604 UART: [idev] ++
1,174,772 UART: [idev] CDI.KEYID = 6
1,175,132 UART: [idev] SUBJECT.KEYID = 7
1,175,556 UART: [idev] UDS.KEYID = 0
1,175,901 ready_for_fw is high
1,175,901 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,183,650 UART: [idev] Erasing UDS.KEYID = 0
1,199,971 UART: [idev] Sha1 KeyId Algorithm
1,208,625 UART: [idev] --
1,209,781 UART: [ldev] ++
1,209,949 UART: [ldev] CDI.KEYID = 6
1,210,312 UART: [ldev] SUBJECT.KEYID = 5
1,210,738 UART: [ldev] AUTHORITY.KEYID = 7
1,211,201 UART: [ldev] FE.KEYID = 1
1,216,171 UART: [ldev] Erasing FE.KEYID = 1
1,242,876 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,256,235 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,261,951 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,267,842 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,273,554 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,280,415 UART: [ldev] --
1,281,770 UART: [fwproc] Wait for Commands...
1,282,462 UART: [fwproc] Recv command 0x46574c44
1,283,190 UART: [fwproc] Recv'd Img size: 9084 bytes
1,373,544 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,400,837 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,401,953 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,407,950 >>> mbox cmd response: success
1,409,012 UART: [afmc] ++
1,409,180 UART: [afmc] CDI.KEYID = 6
1,409,542 UART: [afmc] SUBJECT.KEYID = 7
1,409,967 UART: [afmc] AUTHORITY.KEYID = 5
1,445,325 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,461,778 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,462,526 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,468,247 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,474,142 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,479,834 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,487,642 UART: [afmc] --
1,488,554 UART: [cold-reset] --
1,489,458 UART: [state] Locking Datavault
1,490,697 UART: [state] Locking PCR0, PCR1 and PCR31
1,491,301 UART: [state] Locking ICCM
1,491,965 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,497,260 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,499,143 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.68s
running 1 test
Using hardware-model ModelEmulated trng=External hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,591 ready_for_fw is high
1,060,591 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,260,231 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.64s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "71f54d7806a0a4c5055cf50a78f4286c484fd1bd548443e291722ea6b52ec17e7c10a90380da24a6a6167db88b13fc77",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
82,029 UART:
82,045 UART: Running Caliptra ROM ...
82,453 UART:
82,629 UART: [state] CFI Enabled
85,347 UART: [state] LifecycleState = Unprovisioned
86,002 UART: [state] DebugLocked = No
86,578 UART: [state] WD Timer not started. Device not locked for debugging
87,795 UART: [kat] SHA2-256
893,445 UART: ROM Digest: 0212785561DA4479F3A14AA516C8A6DB0A887B428A3A9053BF5F2EA529A5D6BD
897,570 UART: [kat] ++
897,722 UART: [kat] sha1
901,858 UART: [kat] SHA2-256
903,798 UART: [kat] SHA2-384
906,545 UART: [kat] SHA2-512-ACC
908,446 UART: [kat] ECC-384
918,351 UART: [kat] HMAC-384Kdf
922,875 UART: [kat] LMS
1,171,203 UART: [kat] --
1,172,156 UART: [cold-reset] ++
1,172,554 UART: [fht] FHT @ 0x50003400
1,175,167 UART: [idev] ++
1,175,335 UART: [idev] CDI.KEYID = 6
1,175,695 UART: [idev] SUBJECT.KEYID = 7
1,176,119 UART: [idev] UDS.KEYID = 0
1,176,464 ready_for_fw is high
1,176,464 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,184,425 UART: [idev] Erasing UDS.KEYID = 0
1,201,206 UART: [idev] Sha1 KeyId Algorithm
1,209,682 UART: [idev] --
1,210,770 UART: [ldev] ++
1,210,938 UART: [ldev] CDI.KEYID = 6
1,211,301 UART: [ldev] SUBJECT.KEYID = 5
1,211,727 UART: [ldev] AUTHORITY.KEYID = 7
1,212,190 UART: [ldev] FE.KEYID = 1
1,217,572 UART: [ldev] Erasing FE.KEYID = 1
1,243,957 UART: [ldev] Signing Cert w/ AUTHORITY.KEYID = 7
1,257,526 UART: [ldev] PUB.X = 504D38CA45D997901F48BA333A149A2FB2668B973AAC64D3B79ECC09A663F02ED2FABA133F5FA499677AEB7687C99B25
1,263,242 UART: [ldev] PUB.Y = A5CD31125698B3322C086E4398A591946BF20A3ECEA8EB7D7C23410D49FA877E7ECFBE47BD883BD53D7DA865AC217F1D
1,269,133 UART: [ldev] SIG.R = 9E51FC1FAF9F983A37AD9A33FDB3D96CC41126EDFB2EE0BD656C06A20630F7AB6C54769D2F722B4B8088EE01D6CD5710
1,274,845 UART: [ldev] SIG.S = FC434A98116613BD7A84F734130980C2D552AC2F50544668B5ACE6D7135456D48FA3BED2387A2A26F6449C41B5D86AD0
1,281,906 UART: [ldev] --
1,283,363 UART: [fwproc] Wait for Commands...
1,283,951 UART: [fwproc] Recv command 0x46574c44
1,284,679 UART: [fwproc] Recv'd Img size: 9084 bytes
1,375,137 UART: [fwproc] Img verified w/ Vendor ECC Key Idx 0
1,402,142 UART: [fwproc] Load FMC at address 0x40000000 len 64
1,403,258 UART: [fwproc] Load Runtime at address 0x40005000 len 3136
1,409,185 >>> mbox cmd response: success
1,410,351 UART: [afmc] ++
1,410,519 UART: [afmc] CDI.KEYID = 6
1,410,881 UART: [afmc] SUBJECT.KEYID = 7
1,411,306 UART: [afmc] AUTHORITY.KEYID = 5
1,446,298 UART: [afmc] Signing Cert w/ AUTHORITY.KEYID = 5
1,462,589 UART: [afmc] Erase AUTHORITY.KEYID = 5
1,463,337 UART: [afmc] PUB.X = D295DC2A58FA8F90B21CE21EE8FEAA27FC43F99CB569B9BD2E92D0E97469C75DDB1DC5D4953AB26580D2A68CB703257F
1,469,058 UART: [afmc] PUB.Y = 1B5E444DA3AC3A7CB63CE731630E63326271A74ACC88919B1D6CE1853BC45A2A510D7362BDD9BF43598FB93BE1ECBEF8
1,474,953 UART: [afmc] SIG.R = 6D00B518127763A9527F395C0A7FE4D4BE347B1C65A2789D7D80064CED790342BCBBBBB54140C7DF9BA87F7FBDB712F9
1,480,645 UART: [afmc] SIG.S = 7AA8B41457BD055063A014E7AA08C67B40A8BE359F0157219CF7A81CD4F43EB34910D1A1FAE429DEFB29B814DB200066
1,488,389 UART: [afmc] --
1,489,423 UART: [cold-reset] --
1,490,259 UART: [state] Locking Datavault
1,491,356 UART: [state] Locking PCR0, PCR1 and PCR31
1,491,960 UART: [state] Locking ICCM
1,492,552 UART: [exit] Launching FMC @ 0x40000000
handle_trap: cause=2, mtval=0, next_pc=104
1,497,847 UART: EXCEPTION mcause=0x00000002 mscause=0x00000000 mepc=0x40000000 ra=0x00000000
1,499,730 UART: ROM Fatal Error: 0x01050002
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.55s
running 1 test
Using hardware-model ModelEmulated trng=Internal hw_rev_id={cptra_generation=0x0011, soc_stepping_id=0000}
InitParamsSummary {
rom_sha384: "7af29db7dca485a6ede47cf78330973b97eaba1bb3c0eb7482c73cde8d128d7a151a54d5ecd8b2cc3b1e73bea0910ebd",
obf_key: [0xa0a1a2a3, 0xb0b1b2b3, 0xc0c1c2c3, 0xd0d1d2d3, 0xe0e1e2e3, 0xf0f1f2f3, 0xa4a5a6a7, 0xb4b5b6b7],
security_state: SecurityState(
0,
),
}
Initializing fuses
0 writing to cptra_bootfsm_go
1,060,838 ready_for_fw is high
1,060,838 <<< Executing mbox cmd 0x46574c44 (9084 bytes) from SoC
1,262,058 >>> mbox cmd response: success
handle_trap: cause=2, mtval=0, next_pc=104
test test_zeros ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.56s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_not_found ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.01s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_process_returned_nonzero ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test exec::tests::test_exec_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_create_dir_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.01s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_and_write_success ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.01s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_read_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_delete_error ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempdir_deleted ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_tempfile ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test fs::tests::test_tempfile_drop_on_panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
stderr:
thread 'fs::tests::test_tempfile_drop_on_panic' panicked at 'fake panic', sw-emulator/compliance-test/src/fs.rs:223:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test fs::tests::test_write_failure ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test_check_reference_data ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 12 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_of_arrays ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_of_arrays_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_of_arrays_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_oob_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_oob_panic' panicked at 'register index out of bounds', ureg/src/lib.rs:690:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
running 1 test
test tests::test_reg_array_truncate ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
stdout:
running 1 test
test tests::test_reg_array_truncate_panic - should panic ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 6 filtered out; finished in 0.00s
stderr:
thread 'tests::test_reg_array_truncate_panic' panicked at 'assertion failed: NEW_LEN <= LEN', ureg/src/lib.rs:712:9
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test camel_ident_tests::test_camel_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test generate_enums_test::test_generate_enums ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test snake_ident_tests::test_snake_ident ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 2 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test registerfield_tests::test_mask ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s
running 1 test
test validate::compute_reg_type_name_tests::test ... ok
test result: ok. 1 passed; 0 failed; 0 ignored; 0 measured; 1 filtered out; finished in 0.00s